diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block index fdafe2e5..6caa0f12 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block index 1ede7256..35310a5a 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block index c96aa8c3..c1afe709 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block index f444ac35..58710947 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block index ba7100ea..9345343c 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block index 32ac596f..c2c28cf6 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_6.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_6.block index dc56e276..ee73992f 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_6.block and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_6.block differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block index dc56e276..ee73992f 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block.json index 8174428a..f3d57d46 100644 --- a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block.json +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block.json @@ -949,13 +949,13 @@ }, "signatures": [ { - "signature": "MEQCIB3cjyoQ3eGzwh5nyNCDFEqKTwtEqYQUjk5Ogfoqv2DdAiATd2rZE8G4FpTCdpSeVVGPg+pjZwX5aqSuRulJYr+HjQ==", + "signature": "MEUCIQCYXzn1ZnYJnsjN43D/S9EYzc31KLCSke3AID/salgrLwIgWUTftY/gzmHIfJ7ETcUx/VSvV8P2OQGaWZkOp0VYnlY=", "signature_header": { "creator": { "id_bytes": "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", "mspid": "Org2MSP" }, - "nonce": "+MGHwVyzJ/SdmtpTt8Vu5hQiITy72WT8" + "nonce": "hmgKfYABE83kSpuvCjAfT7VDRzHisv4+" } } ] @@ -965,7 +965,7 @@ "channel_id": "businesschannel", "epoch": "0", "extension": null, - "timestamp": "2019-07-20T02:39:45Z", + "timestamp": "2019-09-24T00:25:06Z", "tls_cert_hash": null, "tx_id": "", "type": 2, @@ -976,11 +976,11 @@ "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", "mspid": "Org2MSP" }, - "nonce": "oyX5/UZc7030A4TjJscBi+8D0YJ2qfv4" + "nonce": "TfwwZYP8xK/NNxUB1enotXfZlzBntLm3" } } }, - "signature": "MEQCIGelMyvJ9ig9qmh57Kf/cssbJdZJS/6LRBayTufzke8iAiB6w1swrZ50H75FQLmX3xI/eGiZa1k27AZchh+VFghBSA==" + "signature": "MEQCIHucar9494+VTQHPstyBMCobfDuNssD+0RP1FUiay0QRAiAYkeolkPiwDNCPMX+nkR+3b13GLigQBO/5Pge3KZenEA==" } }, "header": { @@ -988,7 +988,7 @@ "channel_id": "businesschannel", "epoch": "0", "extension": null, - "timestamp": "2019-07-20T02:39:45Z", + "timestamp": "2019-09-24T00:25:06Z", "tls_cert_hash": null, "tx_id": "", "type": 1, @@ -999,22 +999,22 @@ "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJTZ0F3SUJBZ0lSQUpCRkZSREx6NlVuNy8wd0xVa0pkeE13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmFNRmt4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHCkNDcUdTTTQ5QXdFSEEwSUFCSUJNaUt4bjBMV29WbEx2OFh4YlgxRDQ2ZVZMNmE4cnBWVGNkZ1BlY3E4Y0RwdE4KNE9nc2FKTmpwOTBqS0ZPcENQTzg1V0tLS0J2b2hPbytDQm9aOHBHalRUQkxNQTRHQTFVZER3RUIvd1FFQXdJSApnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJTWQ2M1M5UnZOdXkyWHZ0NkVjWW84dWtYajJVCjRXKzRGclZDSkMvY2dubU9NQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJQXNHeUdKK2RFNEY1NnE4WVVlMFdMSzYKTit2c1hSSERsUnNjTUNCN3l4WGFBaUFzeUpHZDBydFhtYWU5YjNQVi9ldkpOWWVnUlFSY1B3eCtYeGpRREJ4aApRUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", "mspid": "OrdererMSP" }, - "nonce": "1d0cplVLD0MPv5PFGRWN65oSMlvFd3hs" + "nonce": "v6vdIFn5dzMmCeJxPXhxncSE/XzmE2V7" } } }, - "signature": "MEQCIEORlEMqI9HwwojLfXlbdidlJIwViS4fUcFO6Wq6B0+rAiBEMxDZ91zjKIdmQqfu8iYAE+vnGH2iMMEloMsbnqjLQw==" + "signature": "MEQCIFeKoMGChwP5+yt/uhqJmsJIeiWzeZLNnZtf0Tv793Y0AiAXb8UDVaBViEzp699UGSHibAJ9z3tv0qcu5rU1G5xdmg==" } ] }, "header": { - "data_hash": "4ltUcvQmboLLEwalglCz1NczdJdBOfEpqYILehEqF7c=", + "data_hash": "c93VkMgdGLDzfxkfkk8iJskLxMKSwASXR5hp0czNmno=", "number": "2", - "previous_hash": "rW0eqRi6vMr2z47AkOtL+24vxn31Tk19BqbvT5OAH9k=" + "previous_hash": "gdPrg3AZgb/AtLCb02RN720hc20BKE3cc9e0h5bPLtY=" }, "metadata": { "metadata": [ - "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", + "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", "CgIIAg==", "", "CgkKAwECAxAEGAY=", diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block.json-flat.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block.json-flat.json index 9806c6e0..71774776 100644 --- a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block.json-flat.json +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block.json-flat.json @@ -339,38 +339,38 @@ .data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 .data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= .data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 -.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIB3cjyoQ3eGzwh5nyNCDFEqKTwtEqYQUjk5Ogfoqv2DdAiATd2rZE8G4FpTCdpSeVVGPg+pjZwX5aqSuRulJYr+HjQ== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEUCIQCYXzn1ZnYJnsjN43D/S9EYzc31KLCSke3AID/salgrLwIgWUTftY/gzmHIfJ7ETcUx/VSvV8P2OQGaWZkOp0VYnlY= .data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n') .data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org2MSP -.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=+MGHwVyzJ/SdmtpTt8Vu5hQiITy72WT8 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=hmgKfYABE83kSpuvCjAfT7VDRzHisv4+ .data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel .data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 .data.data[0].payload.data.last_update.payload.header.channel_header.extension=None -.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-07-20T02:39:45Z +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-09-24T00:25:06Z .data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None .data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= .data.data[0].payload.data.last_update.payload.header.channel_header.type=2 .data.data[0].payload.data.last_update.payload.header.channel_header.version=0 .data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n') .data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org2MSP -.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=oyX5/UZc7030A4TjJscBi+8D0YJ2qfv4 -.data.data[0].payload.data.last_update.signature=MEQCIGelMyvJ9ig9qmh57Kf/cssbJdZJS/6LRBayTufzke8iAiB6w1swrZ50H75FQLmX3xI/eGiZa1k27AZchh+VFghBSA== +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=TfwwZYP8xK/NNxUB1enotXfZlzBntLm3 +.data.data[0].payload.data.last_update.signature=MEQCIHucar9494+VTQHPstyBMCobfDuNssD+0RP1FUiay0QRAiAYkeolkPiwDNCPMX+nkR+3b13GLigQBO/5Pge3KZenEA== .data.data[0].payload.header.channel_header.channel_id=businesschannel .data.data[0].payload.header.channel_header.epoch=0 .data.data[0].payload.header.channel_header.extension=None -.data.data[0].payload.header.channel_header.timestamp=2019-07-20T02:39:45Z +.data.data[0].payload.header.channel_header.timestamp=2019-09-24T00:25:06Z .data.data[0].payload.header.channel_header.tls_cert_hash=None .data.data[0].payload.header.channel_header.tx_id= .data.data[0].payload.header.channel_header.type=1 .data.data[0].payload.header.channel_header.version=0 .data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n') .data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP -.data.data[0].payload.header.signature_header.nonce=1d0cplVLD0MPv5PFGRWN65oSMlvFd3hs -.data.data[0].signature=MEQCIEORlEMqI9HwwojLfXlbdidlJIwViS4fUcFO6Wq6B0+rAiBEMxDZ91zjKIdmQqfu8iYAE+vnGH2iMMEloMsbnqjLQw== -.header.data_hash=4ltUcvQmboLLEwalglCz1NczdJdBOfEpqYILehEqF7c= +.data.data[0].payload.header.signature_header.nonce=v6vdIFn5dzMmCeJxPXhxncSE/XzmE2V7 +.data.data[0].signature=MEQCIFeKoMGChwP5+yt/uhqJmsJIeiWzeZLNnZtf0Tv793Y0AiAXb8UDVaBViEzp699UGSHibAJ9z3tv0qcu5rU1G5xdmg== +.header.data_hash=c93VkMgdGLDzfxkfkk8iJskLxMKSwASXR5hp0czNmno= .header.number=2 -.header.previous_hash=rW0eqRi6vMr2z47AkOtL+24vxn31Tk19BqbvT5OAH9k= -.metadata.metadata[0]=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 +.header.previous_hash=gdPrg3AZgb/AtLCb02RN720hc20BKE3cc9e0h5bPLtY= +.metadata.metadata[0]=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 .metadata.metadata[1]=CgIIAg== .metadata.metadata[2]= .metadata.metadata[3]=CgkKAwECAxAEGAY= diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta.pb b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta.pb index e25d0087..62e80a3b 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta.pb and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta.pb differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta_env.pb b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta_env.pb index eb2acdcd..3f83c31e 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta_env.pb and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta_env.pb differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block_updated.block.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block_updated.block.json new file mode 100644 index 00000000..7ea5f822 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block_updated.block.json @@ -0,0 +1,743 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQUtpeE9Ya3RvYTVkM3lKODI3dTZuRXd3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3hMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFb0RzUXNkL2UKZ2VzR0NnOEJXcVd5aEtRenQ5T3FKSFRQNUEzRmxxUU56eVhySHlMb040bk5CY3ZuakhGeVdyajRMblEvK05OWgpsODVwMjVscSs5VnFtS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2E3dExQRFpXc3hDcnZPb2VrbEN6R1BnbC9hcjdhUTVOeXlCLzVjdEMrTmd3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFKbTFEajltTGlCbjBUTlFCeXc3QmVqaS9YeFdlUzVucFdub0NVMG03Y1k1QWlCRgoxajg5OWgvc0ttSUVWMnY0eFQ4Uno2Y00vYzU1L0hSTERncnBqaE50Vmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 100, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRYVpzUDR2ZXdOYWZsQ0QvYWdmZ0NHakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURRd01UQTRNVFF3TUZvWERUSTVNRE15T1RBNE1UUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFVDV5VEhSVE1FQzhJWDFmTDNVUzRwVzFuenc3c1J5eHRibFZUSmpVb1dETW0KSWJqeVV2QVpSMlJQSzlpWUNwZ1F5K3ZEQ3djcE9od2dtTUhnZlJGQzhLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnSGdXc1VUMlRvQzlyS1krV3dDSlFkM3E0THNEaDhZVjIrM29TZnpjUEt2a3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSURSaW1pOU9ORGJOOHp2d1VXdFYzTTlDVGJBU04rZEwramtKUTNkSjlYY1VBaUF4CkpmUzVJeGRuVVp5K0xBQU1qU1cyMmxOM2FheGlsNkZ6d01KV3RRN3ltdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-07-19T21:26:48Z", + "tls_cert_hash": null, + "tx_id": "a6faba22e613adaa8102d6c27d264383fd6380b45cd1860c8c876737af1bf39c", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "jPl2ywer8xjoKjfKPayGb/EfQF26FTbL" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "XqU6ii88vY3BThMNTwfhllhZpQ+9hznHV303dDEQnrk=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json new file mode 100644 index 00000000..a7a1e16d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json @@ -0,0 +1,266 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE\nAxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA\nBB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y\naZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU\nBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg\na7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw\nRAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nBXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nuSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv\nbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68\nXFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr\nMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw\nDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh\nb7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk\nt0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nRpYrSwl8s0o=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=100 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm\nIbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2\nfsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5\nMCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq\nhkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2\nfsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5\nMCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq\nhkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-07-19T21:26:48Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=a6faba22e613adaa8102d6c27d264383fd6380b45cd1860c8c876737af1bf39c +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=jPl2ywer8xjoKjfKPayGb/EfQF26FTbL +.data.data[0].signature=None +.header.data_hash=XqU6ii88vY3BThMNTwfhllhZpQ+9hznHV303dDEQnrk= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/original_config.pb b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/original_config.pb index 048f7199..81c64b2b 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/original_config.pb and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/original_config.pb differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block index 63829edd..8675373e 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block differ diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/updated_config.pb b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/updated_config.pb index 3731469a..12dd1c8e 100644 Binary files a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/updated_config.pb and b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/updated_config.pb differ diff --git a/hyperledger_fabric/v1.4.2/raft/logs/dev_all.log b/hyperledger_fabric/v1.4.2/raft/logs/dev_all.log index 2381e88a..7e40d868 100644 --- a/hyperledger_fabric/v1.4.2/raft/logs/dev_all.log +++ b/hyperledger_fabric/v1.4.2/raft/logs/dev_all.log @@ -1,750 +1,1117 @@ -Attaching to peer0.org2.example.com, peer1.org2.example.com, peer1.org1.example.com, peer0.org1.example.com, orderer2.example.com, fabric-cli, orderer1.example.com, orderer0.example.com -peer0.org2.example.com | "2019-07-20 02:39:32.354 UTC [nodeCmd] serve -> INFO 001 Starting peer: -peer0.org2.example.com | Version: 1.4.2 -peer0.org2.example.com | Commit SHA: development build -peer0.org2.example.com | Go version: go1.12.7 -peer0.org2.example.com | OS/Arch: linux/amd64 -peer0.org2.example.com | Chaincode: -peer0.org2.example.com | Base Image Version: 0.4.15 -peer0.org2.example.com | Base Docker Namespace: hyperledger -peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric -peer0.org2.example.com | Docker Namespace: hyperledger" -peer0.org2.example.com | "2019-07-20 02:39:32.355 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" -peer0.org2.example.com | "2019-07-20 02:39:32.355 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" -peer0.org2.example.com | "2019-07-20 02:39:32.422 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" -peer0.org2.example.com | "2019-07-20 02:39:32.485 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" -peer0.org2.example.com | "2019-07-20 02:39:32.486 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.8:7051" -peer0.org2.example.com | "2019-07-20 02:39:32.486 UTC [peer] func1 -> INFO 007 Returning peer0.org2.example.com:7051" -peer0.org2.example.com | "2019-07-20 02:39:32.486 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.8:7051" -peer0.org2.example.com | "2019-07-20 02:39:32.486 UTC [peer] func1 -> INFO 009 Returning peer0.org2.example.com:7051" -peer0.org2.example.com | "2019-07-20 02:39:32.510 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" -peer0.org2.example.com | "2019-07-20 02:39:32.525 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com" -peer0.org2.example.com | "2019-07-20 02:39:32.526 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer0.org2.example.com:7052" -peer0.org2.example.com | "2019-07-20 02:39:32.547 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" -peer0.org2.example.com | "2019-07-20 02:39:32.547 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" -peer0.org2.example.com | "2019-07-20 02:39:32.548 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" -peer0.org2.example.com | "2019-07-20 02:39:32.548 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" -peer0.org2.example.com | "2019-07-20 02:39:32.562 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" -peer0.org2.example.com | "2019-07-20 02:39:32.570 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " -peer0.org2.example.com | "2019-07-20 02:39:32.571 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer0.org2.example.com:7051 started" -peer0.org2.example.com | "2019-07-20 02:39:32.579 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer0.org2.example.com | "2019-07-20 02:39:32.583 UTC [cscc] Init -> INFO 015 Init CSCC" -peer0.org2.example.com | "2019-07-20 02:39:32.583 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer0.org2.example.com | "2019-07-20 02:39:32.584 UTC [qscc] Init -> INFO 017 Init QSCC" -peer0.org2.example.com | "2019-07-20 02:39:32.585 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer0.org2.example.com | "2019-07-20 02:39:32.585 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" -peer0.org2.example.com | "2019-07-20 02:39:32.585 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" -peer0.org2.example.com | "2019-07-20 02:39:32.586 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" -peer0.org2.example.com | "2019-07-20 02:39:32.587 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" -peer0.org2.example.com | "2019-07-20 02:39:32.587 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" -peer0.org2.example.com | "2019-07-20 02:39:32.587 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" -peer0.org2.example.com | "2019-07-20 02:39:32.588 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" -peer0.org2.example.com | "2019-07-20 02:39:32.588 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" -peer0.org2.example.com | "2019-07-20 02:39:32.588 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" -peer0.org2.example.com | "2019-07-20 02:39:32.588 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" -peer1.org1.example.com | "2019-07-20 02:39:31.971 UTC [nodeCmd] serve -> INFO 001 Starting peer: +Attaching to peer0.org1.example.com, peer1.org2.example.com, peer1.org1.example.com, peer0.org2.example.com, orderer2.example.com, orderer1.example.com, orderer0.example.com, fabric-cli +peer0.org1.example.com | "2019-09-24 00:24:38.678 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" +peer0.org1.example.com | "2019-09-24 00:24:38.679 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for peer.BCCSP.PKCS11" +peer0.org1.example.com | "2019-09-24 00:24:38.679 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 00:24:38.680 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for peer.BCCSP.PKCS11.Pin setting to " +peer0.org1.example.com | "2019-09-24 00:24:38.680 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 00:24:38.680 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.PKCS11.Hash setting to " +peer0.org1.example.com | "2019-09-24 00:24:38.680 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 00:24:38.681 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for peer.BCCSP.PKCS11.Security setting to " +peer0.org1.example.com | "2019-09-24 00:24:38.681 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" +peer0.org1.example.com | "2019-09-24 00:24:38.682 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 00:24:38.682 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " +peer0.org1.example.com | "2019-09-24 00:24:38.682 UTC [viperutil] unmarshalJSON -> DEBU 00c Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 00:24:38.682 UTC [viperutil] getKeysRecursively -> DEBU 00d Found real value for peer.BCCSP.PKCS11.Library setting to " +peer0.org1.example.com | "2019-09-24 00:24:38.683 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 00:24:38.683 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for peer.BCCSP.PKCS11.Label setting to " +peer0.org1.example.com | "2019-09-24 00:24:38.683 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +peer0.org1.example.com | "2019-09-24 00:24:38.683 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for peer.BCCSP.Default setting to string SW" +peer0.org1.example.com | "2019-09-24 00:24:38.683 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[string]interface{} value for peer.BCCSP.SW" +peer0.org1.example.com | "2019-09-24 00:24:38.684 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: 256" +peer0.org1.example.com | "2019-09-24 00:24:38.684 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for peer.BCCSP.SW.Security setting to int 256" +peer0.org1.example.com | "2019-09-24 00:24:38.684 UTC [viperutil] getKeysRecursively -> DEBU 015 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" +peer0.org1.example.com | "2019-09-24 00:24:38.684 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" +peer0.org1.example.com | "2019-09-24 00:24:38.684 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " +peer0.org1.example.com | "2019-09-24 00:24:38.684 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +peer0.org1.example.com | "2019-09-24 00:24:38.684 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" +peer0.org1.example.com | "2019-09-24 00:24:38.684 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" +peer0.org1.example.com | "2019-09-24 00:24:38.689 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" +peer0.org1.example.com | "2019-09-24 00:24:38.689 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" +peer0.org1.example.com | "2019-09-24 00:24:38.689 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" +peer0.org1.example.com | "2019-09-24 00:24:38.694 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-09-24 00:24:38.697 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" +peer0.org1.example.com | "2019-09-24 00:24:38.712 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-09-24 00:24:38.716 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" +peer0.org1.example.com | "2019-09-24 00:24:38.722 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" +peer0.org1.example.com | "2019-09-24 00:24:38.725 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" +peer0.org1.example.com | "2019-09-24 00:24:38.727 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" +peer0.org1.example.com | "2019-09-24 00:24:38.727 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" +peer0.org1.example.com | "2019-09-24 00:24:38.731 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-09-24 00:24:38.736 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" +peer0.org1.example.com | "2019-09-24 00:24:38.737 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" +peer0.org1.example.com | "2019-09-24 00:24:38.737 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" +peer0.org1.example.com | "2019-09-24 00:24:38.738 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" +peer0.org1.example.com | "2019-09-24 00:24:38.743 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" +peer0.org1.example.com | "2019-09-24 00:24:38.756 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:24:38.756 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:24:38.758 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" +peer0.org1.example.com | "2019-09-24 00:24:38.759 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:38.759 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:38.759 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:38.759 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer1.org1.example.com | "2019-09-24 00:24:37.485 UTC [nodeCmd] serve -> INFO 001 Starting peer: peer1.org1.example.com | Version: 1.4.2 peer1.org1.example.com | Commit SHA: development build -peer1.org1.example.com | Go version: go1.12.7 +peer1.org1.example.com | Go version: go1.12.9 peer1.org1.example.com | OS/Arch: linux/amd64 peer1.org1.example.com | Chaincode: peer1.org1.example.com | Base Image Version: 0.4.15 peer1.org1.example.com | Base Docker Namespace: hyperledger peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric peer1.org1.example.com | Docker Namespace: hyperledger" -peer1.org1.example.com | "2019-07-20 02:39:31.973 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" -peer1.org1.example.com | "2019-07-20 02:39:31.973 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" -peer1.org1.example.com | "2019-07-20 02:39:32.082 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" -peer1.org1.example.com | "2019-07-20 02:39:32.253 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" -peer1.org1.example.com | "2019-07-20 02:39:32.254 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.6:7051" -peer1.org1.example.com | "2019-07-20 02:39:32.255 UTC [peer] func1 -> INFO 007 Returning peer1.org1.example.com:7051" -peer1.org1.example.com | "2019-07-20 02:39:32.255 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.6:7051" -peer1.org1.example.com | "2019-07-20 02:39:32.255 UTC [peer] func1 -> INFO 009 Returning peer1.org1.example.com:7051" -peer1.org1.example.com | "2019-07-20 02:39:32.303 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" -peer1.org1.example.com | "2019-07-20 02:39:32.322 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com" -peer1.org1.example.com | "2019-07-20 02:39:32.325 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer1.org1.example.com:7052" -peer1.org1.example.com | "2019-07-20 02:39:32.347 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" -peer1.org1.example.com | "2019-07-20 02:39:32.348 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" -peer1.org1.example.com | "2019-07-20 02:39:32.350 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" -peer1.org1.example.com | "2019-07-20 02:39:32.350 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" -peer1.org1.example.com | "2019-07-20 02:39:32.377 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]" -peer1.org1.example.com | "2019-07-20 02:39:32.387 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7, Metadata: " -peer1.org1.example.com | "2019-07-20 02:39:32.388 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer1.org1.example.com:7051 started" -peer1.org1.example.com | "2019-07-20 02:39:32.388 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer1.org1.example.com | "2019-07-20 02:39:32.389 UTC [cscc] Init -> INFO 015 Init CSCC" -peer1.org1.example.com | "2019-07-20 02:39:32.389 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer1.org1.example.com | "2019-07-20 02:39:32.405 UTC [qscc] Init -> INFO 017 Init QSCC" -peer1.org1.example.com | "2019-07-20 02:39:32.406 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer1.org1.example.com | "2019-07-20 02:39:32.408 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" -peer1.org1.example.com | "2019-07-20 02:39:32.410 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" -peer1.org1.example.com | "2019-07-20 02:39:32.414 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" -peer1.org1.example.com | "2019-07-20 02:39:32.419 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" -peer1.org1.example.com | "2019-07-20 02:39:32.424 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" -peer1.org1.example.com | "2019-07-20 02:39:32.425 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" -peer1.org1.example.com | "2019-07-20 02:39:32.426 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" -peer1.org1.example.com | "2019-07-20 02:39:32.426 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" -peer1.org1.example.com | "2019-07-20 02:39:32.426 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" -peer1.org1.example.com | "2019-07-20 02:39:32.427 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" -peer1.org1.example.com | "2019-07-20 02:39:40.889 UTC [endorser] callChaincode -> INFO 023 [][73543c9d] Entry chaincode: name:"cscc" " -peer1.org1.example.com | "2019-07-20 02:39:40.890 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" -peer1.org1.example.com | "2019-07-20 02:39:40.893 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" -peer1.org1.example.com | "2019-07-20 02:39:40.906 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 9ms (state_validation=0ms block_and_pvtdata_commit=4ms state_commit=1ms) commitHash=[]" -peer1.org1.example.com | "2019-07-20 02:39:40.908 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" -peer1.org1.example.com | "2019-07-20 02:39:40.911 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" -peer1.org1.example.com | "2019-07-20 02:39:40.911 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer1.org1.example.com | "2019-07-20 02:39:40.911 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org1MSP for channel businesschannel to learn about" -peer1.org1.example.com | "2019-07-20 02:39:40.933 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" -peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [cscc] Init -> INFO 02d Init CSCC" -peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [qscc] Init -> INFO 02f Init QSCC" -peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" -peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [endorser] callChaincode -> INFO 032 [][73543c9d] Exit chaincode: name:"cscc" (45ms)" -peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45700 grpc.code=OK grpc.call_duration=46.187ms -peer1.org1.example.com | "2019-07-20 02:39:41.691 UTC [endorser] callChaincode -> INFO 034 [][389896d6] Entry chaincode: name:"cscc" " -peer1.org1.example.com | "2019-07-20 02:39:41.693 UTC [endorser] callChaincode -> INFO 035 [][389896d6] Exit chaincode: name:"cscc" (1ms)" -peer1.org1.example.com | "2019-07-20 02:39:41.694 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45708 grpc.code=OK grpc.call_duration=3.1992ms -peer1.org1.example.com | "2019-07-20 02:39:42.398 UTC [endorser] callChaincode -> INFO 037 [][5eef1526] Entry chaincode: name:"qscc" " -peer1.org1.example.com | "2019-07-20 02:39:42.400 UTC [endorser] callChaincode -> INFO 038 [][5eef1526] Exit chaincode: name:"qscc" (2ms)" -peer1.org1.example.com | "2019-07-20 02:39:42.400 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45716 grpc.code=OK grpc.call_duration=2.8672ms -peer1.org1.example.com | "2019-07-20 02:39:45.912 UTC [gossip.channel] reportMembershipChanges -> INFO 03a Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]" -peer1.org1.example.com | "2019-07-20 02:39:46.790 UTC [gossip.election] leaderElection -> INFO 03b a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" -peer1.org2.example.com | "2019-07-20 02:39:31.646 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org1.example.com | "2019-09-24 00:24:37.489 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" +peer1.org1.example.com | "2019-09-24 00:24:37.489 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" +peer1.org1.example.com | "2019-09-24 00:24:37.549 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" +peer1.org1.example.com | "2019-09-24 00:24:37.613 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer1.org1.example.com | "2019-09-24 00:24:37.614 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.5:7051" +peer1.org1.example.com | "2019-09-24 00:24:37.614 UTC [peer] func1 -> INFO 007 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-09-24 00:24:37.614 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.5:7051" +peer1.org1.example.com | "2019-09-24 00:24:37.614 UTC [peer] func1 -> INFO 009 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-09-24 00:24:37.648 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" +peer1.org1.example.com | "2019-09-24 00:24:37.663 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com" +peer1.org1.example.com | "2019-09-24 00:24:37.664 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer1.org1.example.com:7052" +peer1.org1.example.com | "2019-09-24 00:24:37.680 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org1.example.com | "2019-09-24 00:24:37.681 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org1.example.com | "2019-09-24 00:24:37.681 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org1.example.com | "2019-09-24 00:24:37.681 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +peer1.org1.example.com | "2019-09-24 00:24:37.716 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]" +peer1.org1.example.com | "2019-09-24 00:24:37.733 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7, Metadata: " +peer1.org1.example.com | "2019-09-24 00:24:37.735 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer1.org1.example.com:7051 started" +peer1.org1.example.com | "2019-09-24 00:24:37.739 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-09-24 00:24:37.741 UTC [cscc] Init -> INFO 015 Init CSCC" +peer1.org1.example.com | "2019-09-24 00:24:37.741 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-09-24 00:24:37.742 UTC [qscc] Init -> INFO 017 Init QSCC" +peer1.org1.example.com | "2019-09-24 00:24:37.743 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-09-24 00:24:37.743 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer1.org1.example.com | "2019-09-24 00:24:37.743 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" +peer1.org1.example.com | "2019-09-24 00:24:37.745 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org1.example.com | "2019-09-24 00:24:37.745 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" +peer1.org1.example.com | "2019-09-24 00:24:37.746 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-09-24 00:24:37.746 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-09-24 00:24:37.747 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer1.org1.example.com | "2019-09-24 00:24:37.747 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" +peer1.org1.example.com | "2019-09-24 00:24:37.747 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer1.org1.example.com | "2019-09-24 00:24:37.747 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" +peer1.org1.example.com | "2019-09-24 00:24:56.647 UTC [endorser] callChaincode -> INFO 023 [][e7cbb61c] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-09-24 00:24:56.648 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-09-24 00:24:56.651 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" +peer1.org1.example.com | "2019-09-24 00:24:56.670 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 11ms (state_validation=0ms block_and_pvtdata_commit=6ms state_commit=1ms) commitHash=[]" +peer1.org1.example.com | "2019-09-24 00:24:56.684 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-09-24 00:24:56.716 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-09-24 00:24:56.717 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-09-24 00:24:56.717 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-09-24 00:24:56.764 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org1.example.com | "2019-09-24 00:24:56.772 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-09-24 00:24:56.776 UTC [cscc] Init -> INFO 02d Init CSCC" +peer1.org1.example.com | "2019-09-24 00:24:56.776 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-09-24 00:24:56.777 UTC [qscc] Init -> INFO 02f Init QSCC" +peer1.org1.example.com | "2019-09-24 00:24:56.777 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-09-24 00:24:56.777 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer1.org1.example.com | "2019-09-24 00:24:56.778 UTC [endorser] callChaincode -> INFO 032 [][e7cbb61c] Exit chaincode: name:"cscc" (130ms)" +peer1.org1.example.com | "2019-09-24 00:24:56.778 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33424 grpc.code=OK grpc.call_duration=132.3525ms +peer1.org1.example.com | "2019-09-24 00:24:59.878 UTC [endorser] callChaincode -> INFO 034 [][db24e581] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-09-24 00:24:59.879 UTC [endorser] callChaincode -> INFO 035 [][db24e581] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-09-24 00:24:59.880 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33432 grpc.code=OK grpc.call_duration=2.0973ms +peer1.org1.example.com | "2019-09-24 00:25:01.717 UTC [gossip.channel] reportMembershipChanges -> INFO 037 Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-09-24 00:25:02.311 UTC [gossip.election] leaderElection -> INFO 038 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" +peer1.org1.example.com | "2019-09-24 00:25:02.379 UTC [endorser] callChaincode -> INFO 039 [][e6539d86] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-09-24 00:25:02.380 UTC [endorser] callChaincode -> INFO 03a [][e6539d86] Exit chaincode: name:"qscc" (1ms)" +peer1.org1.example.com | "2019-09-24 00:25:02.380 UTC [comm.grpc.server] 1 -> INFO 03b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33446 grpc.code=OK grpc.call_duration=1.2311ms +peer1.org1.example.com | "2019-09-24 00:25:04.545 UTC [gossip.privdata] StoreBlock -> INFO 03c [businesschannel] Received block [1] from buffer" +peer1.org1.example.com | "2019-09-24 00:25:04.593 UTC [gossip.gossip] JoinChan -> INFO 03d Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-09-24 00:25:04.593 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-09-24 00:25:04.601 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-09-24 00:25:04.601 UTC [gossip.service] updateEndpoints -> WARN 040 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-09-24 00:25:04.670 UTC [committer.txvalidator] Validate -> INFO 041 [businesschannel] Validated block [1] in 124ms" +peer1.org1.example.com | "2019-09-24 00:25:04.860 UTC [kvledger] CommitWithPvtData -> INFO 042 [businesschannel] Committed block [1] with 1 transaction(s) in 189ms (state_validation=0ms block_and_pvtdata_commit=174ms state_commit=9ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer1.org1.example.com | "2019-09-24 00:25:05.265 UTC [comm.grpc.server] 1 -> INFO 043 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:07.265Z grpc.peer_address=172.18.0.7:60626 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.1µs +peer1.org1.example.com | "2019-09-24 00:25:05.271 UTC [gossip.gossip] validateMsg -> WARN 044 StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found" +peer1.org1.example.com | "2019-09-24 00:25:05.271 UTC [gossip.gossip] handleMessage -> WARN 045 Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes isn't valid" +peer1.org1.example.com | "2019-09-24 00:25:06.170 UTC [gossip.gossip] validateMsg -> WARN 046 StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found" +peer1.org1.example.com | "2019-09-24 00:25:06.171 UTC [gossip.gossip] handleMessage -> WARN 047 Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes isn't valid" +peer1.org1.example.com | "2019-09-24 00:25:07.200 UTC [gossip.privdata] StoreBlock -> INFO 048 [businesschannel] Received block [2] from buffer" +peer1.org1.example.com | "2019-09-24 00:25:07.213 UTC [gossip.gossip] JoinChan -> INFO 049 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-09-24 00:25:07.213 UTC [gossip.gossip] learnAnchorPeers -> INFO 04a Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-09-24 00:25:07.240 UTC [gossip.gossip] learnAnchorPeers -> INFO 04b Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-09-24 00:25:07.244 UTC [gossip.service] updateEndpoints -> WARN 04c Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-09-24 00:25:07.304 UTC [comm.grpc.server] 1 -> INFO 04d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:60626 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=2.0364324s +peer1.org1.example.com | "2019-09-24 00:25:07.343 UTC [committer.txvalidator] Validate -> INFO 04e [businesschannel] Validated block [2] in 143ms" +peer1.org1.example.com | "2019-09-24 00:25:07.418 UTC [kvledger] CommitWithPvtData -> INFO 04f [businesschannel] Committed block [2] with 1 transaction(s) in 74ms (state_validation=0ms block_and_pvtdata_commit=42ms state_commit=6ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer1.org1.example.com | "2019-09-24 00:25:07.516 UTC [comm.grpc.server] 1 -> INFO 050 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.516Z grpc.peer_address=172.18.0.7:60656 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=146.8µs +peer1.org1.example.com | "2019-09-24 00:25:11.682 UTC [gossip.channel] reportMembershipChanges -> INFO 051 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-09-24 00:25:12.745 UTC [comm.grpc.server] 1 -> INFO 052 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:14.739Z grpc.peer_address=172.18.0.8:53658 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=5.2764ms +peer1.org1.example.com | "2019-09-24 00:25:15.792 UTC [endorser] callChaincode -> INFO 053 [][98ee25d5] Entry chaincode: name:"lscc" " +peer1.org1.example.com | "2019-09-24 00:25:15.793 UTC [lscc] executeInstall -> INFO 054 Installed Chaincode [exp02] Version [1.0] to peer" +peer1.org1.example.com | "2019-09-24 00:25:15.793 UTC [endorser] callChaincode -> INFO 055 [][98ee25d5] Exit chaincode: name:"lscc" (1ms)" +peer1.org1.example.com | "2019-09-24 00:25:15.794 UTC [comm.grpc.server] 1 -> INFO 056 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33532 grpc.code=OK grpc.call_duration=1.5544ms +peer1.org2.example.com | "2019-09-24 00:24:40.352 UTC [nodeCmd] serve -> INFO 001 Starting peer: peer1.org2.example.com | Version: 1.4.2 peer1.org2.example.com | Commit SHA: development build -peer1.org2.example.com | Go version: go1.12.7 +peer1.org2.example.com | Go version: go1.12.9 peer1.org2.example.com | OS/Arch: linux/amd64 peer1.org2.example.com | Chaincode: peer1.org2.example.com | Base Image Version: 0.4.15 peer1.org2.example.com | Base Docker Namespace: hyperledger peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric peer1.org2.example.com | Docker Namespace: hyperledger" -peer1.org2.example.com | "2019-07-20 02:39:31.647 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" -peer1.org2.example.com | "2019-07-20 02:39:31.647 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" -peer1.org2.example.com | "2019-07-20 02:39:31.708 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" -peer1.org2.example.com | "2019-07-20 02:39:31.786 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" -peer1.org2.example.com | "2019-07-20 02:39:31.786 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.7:7051" -peer1.org2.example.com | "2019-07-20 02:39:31.786 UTC [peer] func1 -> INFO 007 Returning peer1.org2.example.com:7051" -peer1.org2.example.com | "2019-07-20 02:39:31.786 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.7:7051" -peer1.org2.example.com | "2019-07-20 02:39:31.790 UTC [peer] func1 -> INFO 009 Returning peer1.org2.example.com:7051" -peer1.org2.example.com | "2019-07-20 02:39:31.807 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" -peer1.org2.example.com | "2019-07-20 02:39:31.820 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com" -peer1.org2.example.com | "2019-07-20 02:39:31.821 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer1.org2.example.com:7052" -peer1.org2.example.com | "2019-07-20 02:39:31.839 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" -peer1.org2.example.com | "2019-07-20 02:39:31.840 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" -peer1.org2.example.com | "2019-07-20 02:39:31.840 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" -peer1.org2.example.com | "2019-07-20 02:39:31.840 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" -peer1.org2.example.com | "2019-07-20 02:39:31.918 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051]" -peer1.org2.example.com | "2019-07-20 02:39:31.939 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: " -peer1.org2.example.com | "2019-07-20 02:39:31.941 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer1.org2.example.com:7051 started" -peer1.org2.example.com | "2019-07-20 02:39:31.943 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer1.org2.example.com | "2019-07-20 02:39:31.945 UTC [cscc] Init -> INFO 015 Init CSCC" -peer1.org2.example.com | "2019-07-20 02:39:31.947 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer1.org2.example.com | "2019-07-20 02:39:31.951 UTC [qscc] Init -> INFO 017 Init QSCC" -peer1.org2.example.com | "2019-07-20 02:39:31.952 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer1.org2.example.com | "2019-07-20 02:39:31.953 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" -peer1.org2.example.com | "2019-07-20 02:39:31.953 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" -peer1.org2.example.com | "2019-07-20 02:39:31.961 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" -peer1.org2.example.com | "2019-07-20 02:39:31.961 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" -peer1.org2.example.com | "2019-07-20 02:39:31.961 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" -peer1.org2.example.com | "2019-07-20 02:39:31.962 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" -peer1.org2.example.com | "2019-07-20 02:39:31.963 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" -peer1.org2.example.com | "2019-07-20 02:39:31.965 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" -peer1.org2.example.com | "2019-07-20 02:39:31.966 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" -peer1.org2.example.com | "2019-07-20 02:39:31.967 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" -peer1.org2.example.com | "2019-07-20 02:39:41.194 UTC [endorser] callChaincode -> INFO 023 [][83b20271] Entry chaincode: name:"cscc" " -peer1.org2.example.com | "2019-07-20 02:39:41.195 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" -peer1.org2.example.com | "2019-07-20 02:39:41.198 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" -peer1.org2.example.com | "2019-07-20 02:39:41.211 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 8ms (state_validation=0ms block_and_pvtdata_commit=4ms state_commit=2ms) commitHash=[]" -peer1.org2.example.com | "2019-07-20 02:39:41.212 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" -peer1.org2.example.com | "2019-07-20 02:39:41.215 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" -peer1.org2.example.com | "2019-07-20 02:39:41.215 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org1MSP for channel businesschannel to learn about" -peer1.org2.example.com | "2019-07-20 02:39:41.215 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer1.org2.example.com | "2019-07-20 02:39:41.230 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" -peer1.org2.example.com | "2019-07-20 02:39:41.231 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer1.org2.example.com | "2019-07-20 02:39:41.232 UTC [cscc] Init -> INFO 02d Init CSCC" -peer1.org2.example.com | "2019-07-20 02:39:41.232 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer1.org2.example.com | "2019-07-20 02:39:41.232 UTC [qscc] Init -> INFO 02f Init QSCC" -peer1.org2.example.com | "2019-07-20 02:39:41.232 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer1.org2.example.com | "2019-07-20 02:39:41.233 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" -peer0.org2.example.com | "2019-07-20 02:39:41.059 UTC [endorser] callChaincode -> INFO 023 [][2935a52e] Entry chaincode: name:"cscc" " -peer0.org2.example.com | "2019-07-20 02:39:41.061 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" -peer0.org2.example.com | "2019-07-20 02:39:41.062 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" -peer0.org2.example.com | "2019-07-20 02:39:41.071 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 6ms (state_validation=0ms block_and_pvtdata_commit=3ms state_commit=1ms) commitHash=[]" -peer0.org2.example.com | "2019-07-20 02:39:41.073 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" -peer0.org2.example.com | "2019-07-20 02:39:41.076 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" -peer0.org2.example.com | "2019-07-20 02:39:41.076 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org1MSP for channel businesschannel to learn about" -peer0.org2.example.com | "2019-07-20 02:39:41.076 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer0.org2.example.com | "2019-07-20 02:39:41.091 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" -peer0.org2.example.com | "2019-07-20 02:39:41.093 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer0.org2.example.com | "2019-07-20 02:39:41.094 UTC [cscc] Init -> INFO 02d Init CSCC" -peer0.org2.example.com | "2019-07-20 02:39:41.094 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer0.org2.example.com | "2019-07-20 02:39:41.094 UTC [qscc] Init -> INFO 02f Init QSCC" -peer0.org2.example.com | "2019-07-20 02:39:41.095 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer0.org2.example.com | "2019-07-20 02:39:41.095 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" -peer0.org2.example.com | "2019-07-20 02:39:41.096 UTC [endorser] callChaincode -> INFO 032 [][2935a52e] Exit chaincode: name:"cscc" (36ms)" -peer0.org2.example.com | "2019-07-20 02:39:41.096 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44620 grpc.code=OK grpc.call_duration=39.0359ms -peer0.org2.example.com | "2019-07-20 02:39:41.805 UTC [endorser] callChaincode -> INFO 034 [][3aa93181] Entry chaincode: name:"cscc" " -peer0.org2.example.com | "2019-07-20 02:39:41.806 UTC [endorser] callChaincode -> INFO 035 [][3aa93181] Exit chaincode: name:"cscc" (1ms)" -peer0.org2.example.com | "2019-07-20 02:39:41.810 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44628 grpc.code=OK grpc.call_duration=7.0027ms -peer0.org2.example.com | "2019-07-20 02:39:42.539 UTC [endorser] callChaincode -> INFO 037 [][90c2c168] Entry chaincode: name:"qscc" " -peer0.org2.example.com | "2019-07-20 02:39:42.540 UTC [endorser] callChaincode -> INFO 038 [][90c2c168] Exit chaincode: name:"qscc" (1ms)" -peer0.org2.example.com | "2019-07-20 02:39:42.540 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44636 grpc.code=OK grpc.call_duration=2.8163ms -peer0.org2.example.com | "2019-07-20 02:39:46.891 UTC [comm.grpc.server] 1 -> INFO 03a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.89Z grpc.peer_address=172.18.0.6:46818 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=96.6µs -peer0.org2.example.com | "2019-07-20 02:39:46.903 UTC [comm.grpc.server] 1 -> INFO 03b streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:56.893Z grpc.peer_address=172.18.0.6:46818 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.8011ms -peer0.org2.example.com | "2019-07-20 02:39:46.911 UTC [comm.grpc.server] 1 -> INFO 03c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.911Z grpc.peer_address=172.18.0.6:46820 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=301.7µs -peer0.org2.example.com | "2019-07-20 02:39:47.040 UTC [comm.grpc.server] 1 -> INFO 03d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.04Z grpc.peer_address=172.18.0.5:41870 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=102.1µs -peer0.org2.example.com | "2019-07-20 02:39:47.055 UTC [comm.grpc.server] 1 -> INFO 03e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.042Z grpc.peer_address=172.18.0.5:41870 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.561ms -peer0.org2.example.com | "2019-07-20 02:39:47.067 UTC [comm.grpc.server] 1 -> INFO 03f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.066Z grpc.peer_address=172.18.0.5:41872 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=273.4µs -peer0.org2.example.com | "2019-07-20 02:39:47.094 UTC [gossip.election] beLeader -> INFO 040 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 : Becoming a leader" -peer0.org2.example.com | "2019-07-20 02:39:47.094 UTC [gossip.service] func1 -> INFO 041 Elected as a leader, starting delivery service for channel businesschannel" -peer0.org2.example.com | "2019-07-20 02:39:47.125 UTC [gossip.privdata] StoreBlock -> INFO 042 [businesschannel] Received block [1] from buffer" -peer0.org2.example.com | "2019-07-20 02:39:47.131 UTC [gossip.gossip] JoinChan -> INFO 043 Joining gossip network of channel businesschannel with 2 organizations" -peer0.org2.example.com | "2019-07-20 02:39:47.131 UTC [gossip.gossip] learnAnchorPeers -> INFO 044 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org2.example.com | "2019-07-20 02:39:47.132 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer0.org2.example.com | "2019-07-20 02:39:47.165 UTC [committer.txvalidator] Validate -> INFO 046 [businesschannel] Validated block [1] in 40ms" -peer0.org2.example.com | "2019-07-20 02:39:47.172 UTC [comm.grpc.server] 1 -> INFO 047 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:41872 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=102.6321ms -peer0.org2.example.com | "2019-07-20 02:39:47.188 UTC [kvledger] CommitWithPvtData -> INFO 048 [businesschannel] Committed block [1] with 1 transaction(s) in 20ms (state_validation=2ms block_and_pvtdata_commit=15ms state_commit=1ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" -peer0.org2.example.com | "2019-07-20 02:39:47.189 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.187Z grpc.peer_address=172.18.0.5:41878 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=846µs -peer0.org2.example.com | "2019-07-20 02:39:47.190 UTC [gossip.privdata] StoreBlock -> INFO 04a [businesschannel] Received block [2] from buffer" -peer0.org2.example.com | "2019-07-20 02:39:47.195 UTC [gossip.gossip] JoinChan -> INFO 04b Joining gossip network of channel businesschannel with 2 organizations" -peer0.org2.example.com | "2019-07-20 02:39:47.203 UTC [gossip.gossip] learnAnchorPeers -> INFO 04c Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer0.org2.example.com | "2019-07-20 02:39:47.204 UTC [gossip.gossip] learnAnchorPeers -> INFO 04d Anchor peer with same endpoint, skipping connecting to myself" -peer0.org2.example.com | "2019-07-20 02:39:47.204 UTC [gossip.gossip] learnAnchorPeers -> INFO 04e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org2.example.com | "2019-07-20 02:39:47.222 UTC [committer.txvalidator] Validate -> INFO 04f [businesschannel] Validated block [2] in 31ms" -peer0.org2.example.com | "2019-07-20 02:39:47.232 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:41878 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=35.1766ms -peer0.org2.example.com | "2019-07-20 02:39:47.244 UTC [kvledger] CommitWithPvtData -> INFO 051 [businesschannel] Committed block [2] with 1 transaction(s) in 20ms (state_validation=1ms block_and_pvtdata_commit=6ms state_commit=3ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" -peer0.org2.example.com | "2019-07-20 02:39:47.276 UTC [comm.grpc.server] 1 -> INFO 052 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.275Z grpc.peer_address=172.18.0.5:41884 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=95.3µs -peer0.org2.example.com | "2019-07-20 02:39:47.385 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.384Z grpc.peer_address=172.18.0.7:59192 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=205.6µs -peer0.org2.example.com | "2019-07-20 02:39:47.391 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:41884 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=109.354ms -peer0.org2.example.com | "2019-07-20 02:39:47.400 UTC [comm.grpc.server] 1 -> INFO 055 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.396Z grpc.peer_address=172.18.0.7:59192 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=4.065ms -peer0.org2.example.com | "2019-07-20 02:39:47.419 UTC [comm.grpc.server] 1 -> INFO 056 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.419Z grpc.peer_address=172.18.0.7:59198 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=120µs -peer0.org2.example.com | "2019-07-20 02:39:47.430 UTC [comm.grpc.server] 1 -> INFO 057 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.428Z grpc.peer_address=172.18.0.5:41900 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=437.2µs -peer0.org2.example.com | "2019-07-20 02:39:49.808 UTC [endorser] callChaincode -> INFO 058 [][2093db94] Entry chaincode: name:"lscc" " -peer0.org2.example.com | "2019-07-20 02:39:49.809 UTC [lscc] executeInstall -> INFO 059 Installed Chaincode [exp02] Version [1.0] to peer" -peer0.org2.example.com | "2019-07-20 02:39:49.809 UTC [endorser] callChaincode -> INFO 05a [][2093db94] Exit chaincode: name:"lscc" (1ms)" -peer0.org2.example.com | "2019-07-20 02:39:49.809 UTC [comm.grpc.server] 1 -> INFO 05b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44702 grpc.code=OK grpc.call_duration=1.3837ms -peer0.org2.example.com | "2019-07-20 02:39:51.076 UTC [gossip.channel] reportMembershipChanges -> INFO 05c Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" -peer0.org2.example.com | "2019-07-20 02:40:22.845 UTC [gossip.privdata] StoreBlock -> INFO 05d [businesschannel] Received block [3] from buffer" -peer0.org2.example.com | "2019-07-20 02:40:22.847 UTC [committer.txvalidator] Validate -> INFO 05e [businesschannel] Validated block [3] in 1ms" -peer0.org2.example.com | "2019-07-20 02:40:22.848 UTC [cceventmgmt] HandleStateUpdates -> INFO 05f Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" -peer0.org2.example.com | "2019-07-20 02:40:22.875 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [3] with 1 transaction(s) in 27ms (state_validation=5ms block_and_pvtdata_commit=15ms state_commit=5ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" -peer0.org2.example.com | "2019-07-20 02:40:26.873 UTC [gossip.privdata] StoreBlock -> INFO 061 [businesschannel] Received block [4] from buffer" -peer0.org2.example.com | "2019-07-20 02:40:26.874 UTC [committer.txvalidator] Validate -> INFO 062 [businesschannel] Validated block [4] in 0ms" -peer0.org2.example.com | "2019-07-20 02:40:26.904 UTC [kvledger] CommitWithPvtData -> INFO 063 [businesschannel] Committed block [4] with 1 transaction(s) in 28ms (state_validation=0ms block_and_pvtdata_commit=12ms state_commit=11ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" -peer0.org2.example.com | "2019-07-20 02:40:29.915 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [5] from buffer" -peer0.org2.example.com | "2019-07-20 02:40:29.916 UTC [committer.txvalidator] Validate -> INFO 065 [businesschannel] Validated block [5] in 0ms" -peer0.org2.example.com | "2019-07-20 02:40:29.938 UTC [kvledger] CommitWithPvtData -> INFO 066 [businesschannel] Committed block [5] with 1 transaction(s) in 19ms (state_validation=0ms block_and_pvtdata_commit=13ms state_commit=3ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" -peer0.org2.example.com | "2019-07-20 02:40:45.297 UTC [comm.grpc.server] 1 -> INFO 067 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.291Z grpc.peer_address=172.18.0.6:46984 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=249.1µs -peer0.org2.example.com | "2019-07-20 02:40:45.300 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:46820 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=58.4550758s -peer0.org2.example.com | "2019-07-20 02:40:45.301 UTC [comm.grpc.server] 1 -> INFO 069 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.299Z grpc.peer_address=172.18.0.6:46984 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.7575ms -peer0.org1.example.com | "2019-07-20 02:39:31.745 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" -peer0.org1.example.com | "2019-07-20 02:39:31.745 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for peer.BCCSP.SW" -peer0.org1.example.com | "2019-07-20 02:39:31.746 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" -peer0.org1.example.com | "2019-07-20 02:39:31.746 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" -peer0.org1.example.com | "2019-07-20 02:39:31.747 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value is not a string: 256" -peer0.org1.example.com | "2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Security setting to int 256" -peer0.org1.example.com | "2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 007 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" -peer0.org1.example.com | "2019-07-20 02:39:31.747 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" -peer0.org1.example.com | "2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " -peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for peer.BCCSP.PKCS11" -peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for peer.BCCSP.PKCS11.Library setting to " -peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Label setting to " -peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Pin setting to " -peer0.org1.example.com | "2019-07-20 02:39:31.749 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for peer.BCCSP.PKCS11.Hash setting to " -peer0.org1.example.com | "2019-07-20 02:39:31.749 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for peer.BCCSP.PKCS11.Security setting to " -peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 015 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" -peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: " -peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " -peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" -peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.Default setting to string SW" -peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" -peer0.org1.example.com | "2019-07-20 02:39:31.770 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" -peer0.org1.example.com | "2019-07-20 02:39:31.770 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" -peer0.org1.example.com | "2019-07-20 02:39:31.770 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" -peer0.org1.example.com | "2019-07-20 02:39:31.784 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" -peer0.org1.example.com | "2019-07-20 02:39:31.791 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" -peer0.org1.example.com | "2019-07-20 02:39:31.807 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" -peer0.org1.example.com | "2019-07-20 02:39:31.811 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" -peer0.org1.example.com | "2019-07-20 02:39:31.815 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" -peer0.org1.example.com | "2019-07-20 02:39:31.819 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" -peer0.org1.example.com | "2019-07-20 02:39:31.819 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" -peer0.org1.example.com | "2019-07-20 02:39:31.819 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" -peer0.org1.example.com | "2019-07-20 02:39:31.823 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" -peer0.org1.example.com | "2019-07-20 02:39:31.826 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" -peer0.org1.example.com | "2019-07-20 02:39:31.828 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" -peer0.org1.example.com | "2019-07-20 02:39:31.828 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" -peer0.org1.example.com | "2019-07-20 02:39:31.830 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" -peer0.org1.example.com | "2019-07-20 02:39:31.834 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" -peer0.org1.example.com | "2019-07-20 02:39:31.840 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" -peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" -peer1.org2.example.com | "2019-07-20 02:39:41.233 UTC [endorser] callChaincode -> INFO 032 [][83b20271] Exit chaincode: name:"cscc" (39ms)" -peer1.org2.example.com | "2019-07-20 02:39:41.233 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49876 grpc.code=OK grpc.call_duration=40.6461ms -peer1.org2.example.com | "2019-07-20 02:39:41.923 UTC [endorser] callChaincode -> INFO 034 [][be628b61] Entry chaincode: name:"cscc" " -peer1.org2.example.com | "2019-07-20 02:39:41.924 UTC [endorser] callChaincode -> INFO 035 [][be628b61] Exit chaincode: name:"cscc" (1ms)" -peer1.org1.example.com | "2019-07-20 02:39:46.830 UTC [gossip.privdata] StoreBlock -> INFO 03c [businesschannel] Received block [1] from buffer" -peer1.org1.example.com | "2019-07-20 02:39:46.835 UTC [gossip.gossip] JoinChan -> INFO 03d Joining gossip network of channel businesschannel with 2 organizations" -peer1.org1.example.com | "2019-07-20 02:39:46.835 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer1.org1.example.com | "2019-07-20 02:39:46.835 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org1.example.com | "2019-07-20 02:39:46.835 UTC [gossip.service] updateEndpoints -> WARN 040 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" -peer1.org1.example.com | "2019-07-20 02:39:46.850 UTC [committer.txvalidator] Validate -> INFO 041 [businesschannel] Validated block [1] in 19ms" -peer1.org1.example.com | "2019-07-20 02:39:46.862 UTC [kvledger] CommitWithPvtData -> INFO 042 [businesschannel] Committed block [1] with 1 transaction(s) in 11ms (state_validation=1ms block_and_pvtdata_commit=6ms state_commit=1ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" -peer1.org1.example.com | "2019-07-20 02:39:46.863 UTC [gossip.privdata] StoreBlock -> INFO 043 [businesschannel] Received block [2] from buffer" -peer1.org1.example.com | "2019-07-20 02:39:46.875 UTC [gossip.gossip] JoinChan -> INFO 044 Joining gossip network of channel businesschannel with 2 organizations" -peer1.org1.example.com | "2019-07-20 02:39:46.875 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org1.example.com | "2019-07-20 02:39:46.875 UTC [gossip.gossip] learnAnchorPeers -> INFO 046 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer1.org1.example.com | "2019-07-20 02:39:46.875 UTC [gossip.service] updateEndpoints -> WARN 047 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" -peer1.org1.example.com | "2019-07-20 02:39:46.901 UTC [committer.txvalidator] Validate -> INFO 048 [businesschannel] Validated block [2] in 37ms" -peer1.org1.example.com | "2019-07-20 02:39:46.926 UTC [kvledger] CommitWithPvtData -> INFO 049 [businesschannel] Committed block [2] with 1 transaction(s) in 24ms (state_validation=0ms block_and_pvtdata_commit=17ms state_commit=4ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" -peer1.org1.example.com | "2019-07-20 02:39:46.950 UTC [gossip.comm] func1 -> WARN 04a peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" -peer1.org1.example.com | "2019-07-20 02:39:46.951 UTC [gossip.discovery] expireDeadMembers -> WARN 04b Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" -peer1.org1.example.com | "2019-07-20 02:39:46.951 UTC [gossip.discovery] expireDeadMembers -> WARN 04c Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " -peer1.org1.example.com | "2019-07-20 02:39:46.951 UTC [gossip.discovery] expireDeadMembers -> WARN 04d Exiting" -peer1.org1.example.com | "2019-07-20 02:39:46.956 UTC [comm.grpc.server] 1 -> INFO 04e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.954Z grpc.peer_address=172.18.0.5:59648 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=92µs -peer1.org1.example.com | "2019-07-20 02:39:49.032 UTC [endorser] callChaincode -> INFO 04f [][73c4622e] Entry chaincode: name:"lscc" " -peer1.org1.example.com | "2019-07-20 02:39:49.033 UTC [lscc] executeInstall -> INFO 050 Installed Chaincode [exp02] Version [1.0] to peer" -peer1.org1.example.com | "2019-07-20 02:39:49.033 UTC [endorser] callChaincode -> INFO 051 [][73c4622e] Exit chaincode: name:"lscc" (1ms)" -peer1.org1.example.com | "2019-07-20 02:39:49.033 UTC [comm.grpc.server] 1 -> INFO 052 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45780 grpc.code=OK grpc.call_duration=1.7228ms -peer1.org1.example.com | "2019-07-20 02:39:50.911 UTC [gossip.channel] reportMembershipChanges -> INFO 053 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ]]" -peer1.org1.example.com | "2019-07-20 02:40:00.877 UTC [gossip.channel] reportMembershipChanges -> INFO 054 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" -peer1.org1.example.com | "2019-07-20 02:40:22.866 UTC [gossip.privdata] StoreBlock -> INFO 055 [businesschannel] Received block [3] from buffer" -peer1.org1.example.com | "2019-07-20 02:40:22.869 UTC [committer.txvalidator] Validate -> INFO 056 [businesschannel] Validated block [3] in 2ms" -peer1.org1.example.com | "2019-07-20 02:40:22.869 UTC [cceventmgmt] HandleStateUpdates -> INFO 057 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" -peer1.org1.example.com | "2019-07-20 02:40:22.887 UTC [kvledger] CommitWithPvtData -> INFO 058 [businesschannel] Committed block [3] with 1 transaction(s) in 18ms (state_validation=6ms block_and_pvtdata_commit=6ms state_commit=1ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" -peer1.org1.example.com | "2019-07-20 02:40:26.898 UTC [gossip.privdata] StoreBlock -> INFO 059 [businesschannel] Received block [4] from buffer" -peer1.org1.example.com | "2019-07-20 02:40:26.900 UTC [committer.txvalidator] Validate -> INFO 05a [businesschannel] Validated block [4] in 1ms" -peer1.org1.example.com | "2019-07-20 02:40:26.930 UTC [kvledger] CommitWithPvtData -> INFO 05b [businesschannel] Committed block [4] with 1 transaction(s) in 29ms (state_validation=0ms block_and_pvtdata_commit=24ms state_commit=2ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" -peer1.org1.example.com | "2019-07-20 02:40:29.921 UTC [gossip.privdata] StoreBlock -> INFO 05c [businesschannel] Received block [5] from buffer" -peer1.org1.example.com | "2019-07-20 02:40:29.923 UTC [committer.txvalidator] Validate -> INFO 05d [businesschannel] Validated block [5] in 1ms" -peer1.org1.example.com | "2019-07-20 02:40:29.934 UTC [kvledger] CommitWithPvtData -> INFO 05e [businesschannel] Committed block [5] with 1 transaction(s) in 10ms (state_validation=0ms block_and_pvtdata_commit=7ms state_commit=1ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" -peer1.org1.example.com | "2019-07-20 02:40:45.208 UTC [gossip.privdata] StoreBlock -> INFO 05f [businesschannel] Received block [6] from buffer" -peer1.org1.example.com | "2019-07-20 02:40:45.211 UTC [cauthdsl] deduplicate -> WARN 060 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer1.org1.example.com | "2019-07-20 02:40:45.211 UTC [cauthdsl] deduplicate -> WARN 061 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer1.org1.example.com | "2019-07-20 02:40:45.253 UTC [gossip.gossip] JoinChan -> INFO 062 Joining gossip network of channel businesschannel with 3 organizations" -peer1.org1.example.com | "2019-07-20 02:40:45.253 UTC [gossip.gossip] learnAnchorPeers -> INFO 063 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer1.org1.example.com | "2019-07-20 02:40:45.253 UTC [gossip.gossip] learnAnchorPeers -> INFO 064 No configured anchor peers of Org3MSP for channel businesschannel to learn about" -peer1.org1.example.com | "2019-07-20 02:40:45.253 UTC [gossip.gossip] learnAnchorPeers -> INFO 065 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org1.example.com | "2019-07-20 02:40:45.254 UTC [gossip.service] updateEndpoints -> WARN 066 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" -peer1.org1.example.com | "2019-07-20 02:40:45.274 UTC [committer.txvalidator] Validate -> INFO 067 [businesschannel] Validated block [6] in 65ms" -peer1.org1.example.com | "2019-07-20 02:40:45.288 UTC [kvledger] CommitWithPvtData -> INFO 068 [businesschannel] Committed block [6] with 1 transaction(s) in 13ms (state_validation=0ms block_and_pvtdata_commit=8ms state_commit=2ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" -peer1.org1.example.com | "2019-07-20 02:40:45.308 UTC [gossip.comm] func1 -> WARN 069 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" -peer1.org1.example.com | "2019-07-20 02:40:45.308 UTC [gossip.discovery] expireDeadMembers -> WARN 06a Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" -peer1.org1.example.com | "2019-07-20 02:40:45.308 UTC [gossip.discovery] expireDeadMembers -> WARN 06b Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " -peer1.org1.example.com | "2019-07-20 02:40:45.308 UTC [gossip.discovery] expireDeadMembers -> WARN 06c Exiting" -peer1.org1.example.com | "2019-07-20 02:40:45.318 UTC [comm.grpc.server] 1 -> INFO 06d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:59648 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=58.4294128s -peer1.org1.example.com | "2019-07-20 02:40:45.843 UTC [gossip.channel] reportMembershipChanges -> INFO 06e Membership view has changed. peers went offline: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" -peer1.org1.example.com | "2019-07-20 02:40:47.026 UTC [comm.grpc.server] 1 -> INFO 06f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:49.026Z grpc.peer_address=172.18.0.8:36574 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=168.6µs -peer1.org1.example.com | "2019-07-20 02:40:50.842 UTC [gossip.channel] reportMembershipChanges -> INFO 070 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer0.org1.example.com:7051]]" -peer1.org1.example.com | "2019-07-20 02:40:59.646 UTC [endorser] callChaincode -> INFO 071 [][35b44e42] Entry chaincode: name:"cscc" " -peer1.org1.example.com | "2019-07-20 02:40:59.646 UTC [endorser] callChaincode -> INFO 072 [][35b44e42] Exit chaincode: name:"cscc" (0ms)" -peer1.org1.example.com | "2019-07-20 02:40:59.647 UTC [comm.grpc.server] 1 -> INFO 073 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45962 grpc.code=OK grpc.call_duration=1.0107ms -peer1.org1.example.com | "2019-07-20 02:41:00.613 UTC [endorser] callChaincode -> INFO 074 [][3e975194] Entry chaincode: name:"qscc" " -peer1.org1.example.com | "2019-07-20 02:41:00.618 UTC [endorser] callChaincode -> INFO 075 [][3e975194] Exit chaincode: name:"qscc" (2ms)" -peer1.org1.example.com | "2019-07-20 02:41:00.624 UTC [comm.grpc.server] 1 -> INFO 076 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45970 grpc.code=OK grpc.call_duration=12.8903ms -peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer1.org2.example.com | "2019-07-20 02:39:41.924 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49884 grpc.code=OK grpc.call_duration=1.4851ms -peer1.org2.example.com | "2019-07-20 02:39:42.683 UTC [endorser] callChaincode -> INFO 037 [][88363cc9] Entry chaincode: name:"qscc" " -peer1.org2.example.com | "2019-07-20 02:39:42.685 UTC [endorser] callChaincode -> INFO 038 [][88363cc9] Exit chaincode: name:"qscc" (2ms)" -peer1.org2.example.com | "2019-07-20 02:39:42.686 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49892 grpc.code=OK grpc.call_duration=3.8474ms -peer1.org2.example.com | "2019-07-20 02:39:47.233 UTC [gossip.election] beLeader -> INFO 03a 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd : Becoming a leader" -peer1.org2.example.com | "2019-07-20 02:39:47.233 UTC [gossip.service] func1 -> INFO 03b Elected as a leader, starting delivery service for channel businesschannel" -peer1.org2.example.com | "2019-07-20 02:39:47.262 UTC [gossip.privdata] StoreBlock -> INFO 03c [businesschannel] Received block [1] from buffer" -peer1.org2.example.com | "2019-07-20 02:39:47.282 UTC [gossip.gossip] JoinChan -> INFO 03d Joining gossip network of channel businesschannel with 2 organizations" -peer1.org2.example.com | "2019-07-20 02:39:47.282 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org2.example.com | "2019-07-20 02:39:47.283 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer1.org2.example.com | "2019-07-20 02:39:47.308 UTC [committer.txvalidator] Validate -> INFO 040 [businesschannel] Validated block [1] in 45ms" -peer1.org2.example.com | "2019-07-20 02:39:47.342 UTC [kvledger] CommitWithPvtData -> INFO 041 [businesschannel] Committed block [1] with 1 transaction(s) in 12ms (state_validation=0ms block_and_pvtdata_commit=7ms state_commit=2ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" -peer1.org2.example.com | "2019-07-20 02:39:47.342 UTC [gossip.privdata] StoreBlock -> INFO 042 [businesschannel] Received block [2] from buffer" -peer1.org2.example.com | "2019-07-20 02:39:47.353 UTC [gossip.gossip] JoinChan -> INFO 043 Joining gossip network of channel businesschannel with 2 organizations" -peer1.org2.example.com | "2019-07-20 02:39:47.354 UTC [gossip.gossip] learnAnchorPeers -> INFO 044 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer1.org2.example.com | "2019-07-20 02:39:47.354 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org2.example.com | "2019-07-20 02:39:47.373 UTC [committer.txvalidator] Validate -> INFO 046 [businesschannel] Validated block [2] in 30ms" -peer1.org2.example.com | "2019-07-20 02:39:47.395 UTC [kvledger] CommitWithPvtData -> INFO 047 [businesschannel] Committed block [2] with 1 transaction(s) in 20ms (state_validation=1ms block_and_pvtdata_commit=14ms state_commit=3ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" -peer1.org2.example.com | "2019-07-20 02:39:47.587 UTC [gossip.comm] func1 -> WARN 048 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" -peer1.org2.example.com | "2019-07-20 02:39:47.587 UTC [gossip.discovery] expireDeadMembers -> WARN 049 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" -peer1.org2.example.com | "2019-07-20 02:39:47.587 UTC [gossip.discovery] expireDeadMembers -> WARN 04a Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " -peer1.org2.example.com | "2019-07-20 02:39:47.587 UTC [gossip.discovery] expireDeadMembers -> WARN 04b Exiting" -peer1.org2.example.com | "2019-07-20 02:39:47.614 UTC [comm.grpc.server] 1 -> INFO 04c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.613Z grpc.peer_address=172.18.0.5:41004 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=112.8µs -peer1.org2.example.com | "2019-07-20 02:39:48.937 UTC [gossip.gossip] validateMsg -> WARN 04d StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes is found invalid: PKIID wasn't found" -peer1.org2.example.com | "2019-07-20 02:39:48.938 UTC [gossip.gossip] handleMessage -> WARN 04e Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes isn't valid" -peer1.org2.example.com | "2019-07-20 02:39:50.346 UTC [endorser] callChaincode -> INFO 04f [][c315d392] Entry chaincode: name:"lscc" " -peer1.org2.example.com | "2019-07-20 02:39:50.347 UTC [lscc] executeInstall -> INFO 050 Installed Chaincode [exp02] Version [1.0] to peer" -peer1.org2.example.com | "2019-07-20 02:39:50.347 UTC [endorser] callChaincode -> INFO 051 [][c315d392] Exit chaincode: name:"lscc" (1ms)" -peer1.org2.example.com | "2019-07-20 02:39:50.347 UTC [comm.grpc.server] 1 -> INFO 052 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49960 grpc.code=OK grpc.call_duration=1.698ms -peer1.org2.example.com | "2019-07-20 02:39:51.215 UTC [gossip.channel] reportMembershipChanges -> INFO 053 Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]]" -peer1.org2.example.com | "2019-07-20 02:39:52.106 UTC [gossip.election] stopBeingLeader -> INFO 054 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd Stopped being a leader" -peer1.org2.example.com | "2019-07-20 02:39:52.107 UTC [gossip.service] func1 -> INFO 055 Renounced leadership, stopping delivery service for channel businesschannel" -peer0.org2.example.com | "2019-07-20 02:40:45.317 UTC [gossip.privdata] StoreBlock -> INFO 06a [businesschannel] Received block [6] from buffer" -peer0.org2.example.com | "2019-07-20 02:40:45.318 UTC [cauthdsl] deduplicate -> WARN 06b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer0.org2.example.com | "2019-07-20 02:40:45.319 UTC [cauthdsl] deduplicate -> WARN 06c De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer1.org2.example.com | "2019-07-20 02:39:52.107 UTC [deliveryClient] try -> WARN 056 Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s" -peer1.org2.example.com | "2019-07-20 02:39:52.107 UTC [blocksProvider] DeliverBlocks -> WARN 057 [businesschannel] Receive error: client is closing" -peer1.org2.example.com | "2019-07-20 02:39:56.920 UTC [comm.grpc.server] 1 -> INFO 058 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:58.919Z grpc.peer_address=172.18.0.6:39470 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=187.3µs -peer1.org2.example.com | "2019-07-20 02:40:01.181 UTC [gossip.channel] reportMembershipChanges -> INFO 059 Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" -peer1.org2.example.com | "2019-07-20 02:40:22.876 UTC [gossip.privdata] StoreBlock -> INFO 05a [businesschannel] Received block [3] from buffer" -peer1.org2.example.com | "2019-07-20 02:40:22.883 UTC [committer.txvalidator] Validate -> INFO 05b [businesschannel] Validated block [3] in 5ms" -peer1.org2.example.com | "2019-07-20 02:40:22.885 UTC [cceventmgmt] HandleStateUpdates -> INFO 05c Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" -peer1.org2.example.com | "2019-07-20 02:40:22.900 UTC [kvledger] CommitWithPvtData -> INFO 05d [businesschannel] Committed block [3] with 1 transaction(s) in 15ms (state_validation=2ms block_and_pvtdata_commit=10ms state_commit=1ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" -peer1.org2.example.com | "2019-07-20 02:40:26.878 UTC [gossip.privdata] StoreBlock -> INFO 05e [businesschannel] Received block [4] from buffer" -peer1.org2.example.com | "2019-07-20 02:40:26.879 UTC [committer.txvalidator] Validate -> INFO 05f [businesschannel] Validated block [4] in 0ms" -peer1.org2.example.com | "2019-07-20 02:40:26.915 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [4] with 1 transaction(s) in 36ms (state_validation=0ms block_and_pvtdata_commit=22ms state_commit=8ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" -peer1.org2.example.com | "2019-07-20 02:40:29.928 UTC [gossip.privdata] StoreBlock -> INFO 061 [businesschannel] Received block [5] from buffer" -peer1.org2.example.com | "2019-07-20 02:40:29.931 UTC [committer.txvalidator] Validate -> INFO 062 [businesschannel] Validated block [5] in 2ms" -peer1.org2.example.com | "2019-07-20 02:40:29.941 UTC [kvledger] CommitWithPvtData -> INFO 063 [businesschannel] Committed block [5] with 1 transaction(s) in 8ms (state_validation=0ms block_and_pvtdata_commit=6ms state_commit=1ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" -peer1.org2.example.com | "2019-07-20 02:40:45.327 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [6] from buffer" -peer1.org2.example.com | "2019-07-20 02:40:45.329 UTC [cauthdsl] deduplicate -> WARN 065 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer1.org2.example.com | "2019-07-20 02:40:45.329 UTC [cauthdsl] deduplicate -> WARN 066 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer1.org2.example.com | "2019-07-20 02:40:45.334 UTC [gossip.gossip] JoinChan -> INFO 067 Joining gossip network of channel businesschannel with 3 organizations" -peer1.org2.example.com | "2019-07-20 02:40:45.335 UTC [gossip.gossip] learnAnchorPeers -> INFO 068 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer1.org2.example.com | "2019-07-20 02:40:45.336 UTC [gossip.gossip] learnAnchorPeers -> INFO 069 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer1.org2.example.com | "2019-07-20 02:40:45.336 UTC [gossip.gossip] learnAnchorPeers -> INFO 06a No configured anchor peers of Org3MSP for channel businesschannel to learn about" -peer1.org2.example.com | "2019-07-20 02:40:45.337 UTC [gossip.service] updateEndpoints -> WARN 06b Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" -peer1.org2.example.com | "2019-07-20 02:40:45.356 UTC [committer.txvalidator] Validate -> INFO 06c [businesschannel] Validated block [6] in 28ms" -peer1.org2.example.com | "2019-07-20 02:40:45.381 UTC [kvledger] CommitWithPvtData -> INFO 06d [businesschannel] Committed block [6] with 1 transaction(s) in 21ms (state_validation=1ms block_and_pvtdata_commit=7ms state_commit=3ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" -peer1.org2.example.com | "2019-07-20 02:40:45.424 UTC [comm.grpc.server] 1 -> INFO 06e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:41004 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=57.8775441s -peer1.org2.example.com | "2019-07-20 02:40:45.466 UTC [comm.grpc.server] 1 -> INFO 06f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.465Z grpc.peer_address=172.18.0.5:41144 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=145.4µs -peer1.org2.example.com | "2019-07-20 02:40:45.989 UTC [gossip.comm] func1 -> WARN 070 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" -peer1.org2.example.com | "2019-07-20 02:40:45.990 UTC [gossip.discovery] expireDeadMembers -> WARN 071 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" -peer1.org2.example.com | "2019-07-20 02:40:45.991 UTC [gossip.discovery] expireDeadMembers -> WARN 072 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " -peer1.org2.example.com | "2019-07-20 02:40:45.991 UTC [gossip.discovery] expireDeadMembers -> WARN 073 Exiting" -peer1.org2.example.com | "2019-07-20 02:40:45.993 UTC [comm.grpc.server] 1 -> INFO 074 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.993Z grpc.peer_address=172.18.0.8:59088 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=185.8µs -peer1.org2.example.com | "2019-07-20 02:40:46.146 UTC [gossip.channel] reportMembershipChanges -> INFO 075 Membership view has changed. peers went offline: [[peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]]" -peer1.org2.example.com | "2019-07-20 02:40:51.145 UTC [gossip.channel] reportMembershipChanges -> INFO 076 Membership view has changed. peers went online: [[peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" -peer1.org2.example.com | "2019-07-20 02:40:59.979 UTC [endorser] callChaincode -> INFO 077 [][155de4c2] Entry chaincode: name:"cscc" " -peer1.org2.example.com | "2019-07-20 02:40:59.983 UTC [endorser] callChaincode -> INFO 078 [][155de4c2] Exit chaincode: name:"cscc" (1ms)" -peer1.org2.example.com | "2019-07-20 02:40:59.983 UTC [comm.grpc.server] 1 -> INFO 079 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50138 grpc.code=OK grpc.call_duration=4.5022ms -peer1.org2.example.com | "2019-07-20 02:41:01.051 UTC [endorser] callChaincode -> INFO 07a [][d685e3ac] Entry chaincode: name:"qscc" " -peer1.org2.example.com | "2019-07-20 02:41:01.052 UTC [endorser] callChaincode -> INFO 07b [][d685e3ac] Exit chaincode: name:"qscc" (1ms)" -peer1.org2.example.com | "2019-07-20 02:41:01.053 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50146 grpc.code=OK grpc.call_duration=1.7483ms -peer0.org2.example.com | "2019-07-20 02:40:45.334 UTC [gossip.gossip] JoinChan -> INFO 06d Joining gossip network of channel businesschannel with 3 organizations" -peer0.org2.example.com | "2019-07-20 02:40:45.335 UTC [gossip.gossip] learnAnchorPeers -> INFO 06e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org2.example.com | "2019-07-20 02:40:45.336 UTC [gossip.gossip] learnAnchorPeers -> INFO 06f Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer0.org2.example.com | "2019-07-20 02:40:45.359 UTC [gossip.gossip] learnAnchorPeers -> INFO 070 Anchor peer with same endpoint, skipping connecting to myself" -peer0.org2.example.com | "2019-07-20 02:40:45.359 UTC [gossip.gossip] learnAnchorPeers -> INFO 071 No configured anchor peers of Org3MSP for channel businesschannel to learn about" -peer0.org2.example.com | "2019-07-20 02:40:45.368 UTC [comm.grpc.server] 1 -> INFO 072 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.368Z grpc.peer_address=172.18.0.7:59338 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=99.9µs -peer0.org2.example.com | "2019-07-20 02:40:45.382 UTC [committer.txvalidator] Validate -> INFO 073 [businesschannel] Validated block [6] in 65ms" -peer0.org2.example.com | "2019-07-20 02:40:45.383 UTC [comm.grpc.server] 1 -> INFO 074 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:59198 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=58.0302337s -peer0.org2.example.com | "2019-07-20 02:40:45.384 UTC [comm.grpc.server] 1 -> INFO 075 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.372Z grpc.peer_address=172.18.0.7:59338 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=11.1845ms -peer0.org2.example.com | "2019-07-20 02:40:45.395 UTC [kvledger] CommitWithPvtData -> INFO 076 [businesschannel] Committed block [6] with 1 transaction(s) in 11ms (state_validation=0ms block_and_pvtdata_commit=7ms state_commit=1ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" -peer0.org2.example.com | "2019-07-20 02:40:45.425 UTC [comm.grpc.server] 1 -> INFO 077 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:41900 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=58.061562s -peer0.org2.example.com | "2019-07-20 02:40:45.489 UTC [comm.grpc.server] 1 -> INFO 078 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.489Z grpc.peer_address=172.18.0.5:42046 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=97.5µs -peer0.org2.example.com | "2019-07-20 02:40:45.530 UTC [comm.grpc.server] 1 -> INFO 079 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.49Z grpc.peer_address=172.18.0.5:42046 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.2124ms -peer0.org2.example.com | "2019-07-20 02:40:45.543 UTC [comm.grpc.server] 1 -> INFO 07a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.543Z grpc.peer_address=172.18.0.5:42048 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=120.4µs -peer0.org2.example.com | "2019-07-20 02:40:46.973 UTC [comm.grpc.server] 1 -> INFO 07b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:48.972Z grpc.peer_address=172.18.0.7:59352 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=112.2µs -peer0.org2.example.com | "2019-07-20 02:40:47.327 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:49.326Z grpc.peer_address=172.18.0.6:47010 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=120.1µs -peer0.org2.example.com | "2019-07-20 02:40:59.789 UTC [endorser] callChaincode -> INFO 07d [][e9f0f596] Entry chaincode: name:"cscc" " -peer0.org2.example.com | "2019-07-20 02:40:59.789 UTC [endorser] callChaincode -> INFO 07e [][e9f0f596] Exit chaincode: name:"cscc" (1ms)" -peer0.org2.example.com | "2019-07-20 02:40:59.790 UTC [comm.grpc.server] 1 -> INFO 07f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44882 grpc.code=OK grpc.call_duration=2.6198ms -peer0.org2.example.com | "2019-07-20 02:41:00.883 UTC [endorser] callChaincode -> INFO 080 [][d33f7db2] Entry chaincode: name:"qscc" " -peer0.org2.example.com | "2019-07-20 02:41:00.885 UTC [endorser] callChaincode -> INFO 081 [][d33f7db2] Exit chaincode: name:"qscc" (2ms)" -peer0.org2.example.com | "2019-07-20 02:41:00.885 UTC [comm.grpc.server] 1 -> INFO 082 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44890 grpc.code=OK grpc.call_duration=2.512ms -orderer1.example.com | 2019-07-20 02:39:29.412 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 -orderer1.example.com | "2019-07-20 02:39:29.589 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: -orderer1.example.com | General.LedgerType = "file" -orderer1.example.com | General.ListenAddress = "0.0.0.0" -orderer1.example.com | General.ListenPort = 7050 -orderer1.example.com | General.TLS.Enabled = true -orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" -orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" -orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] -orderer1.example.com | General.TLS.ClientAuthRequired = false -orderer1.example.com | General.TLS.ClientRootCAs = [] -orderer1.example.com | General.Cluster.ListenAddress = "" -orderer1.example.com | General.Cluster.ListenPort = 0 -orderer1.example.com | General.Cluster.ServerCertificate = "" -orderer1.example.com | General.Cluster.ServerPrivateKey = "" -orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" -orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" -orderer1.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] -orderer1.example.com | General.Cluster.DialTimeout = 5s -orderer1.example.com | General.Cluster.RPCTimeout = 7s -orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 -orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s -orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s -orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s -orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 -orderer1.example.com | General.Cluster.SendBufferSize = 10 -orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s -orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s -orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s -orderer1.example.com | General.Keepalive.ServerTimeout = 20s -orderer1.example.com | General.ConnectionTimeout = 0s -orderer1.example.com | General.GenesisMethod = "file" -orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" -orderer1.example.com | General.SystemChannel = "test-system-channel-name" -orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" -orderer1.example.com | General.Profile.Enabled = false -orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" -orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" -orderer1.example.com | General.LocalMSPID = "OrdererMSP" -orderer1.example.com | General.BCCSP.ProviderName = "SW" -orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 -orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" -orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false -orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" -orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = -orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = -orderer1.example.com | General.BCCSP.PluginOpts = -orderer1.example.com | General.Authentication.TimeWindow = 15m0s -orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" -orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" -orderer1.example.com | RAMLedger.HistorySize = 1000 -orderer1.example.com | Kafka.Retry.ShortInterval = 5s -orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s -orderer1.example.com | Kafka.Retry.LongInterval = 5m0s -orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s -orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s -orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s -orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s -orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 -orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms -orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 -orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms -orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s -orderer1.example.com | Kafka.Verbose = false -orderer1.example.com | Kafka.Version = 0.10.2.0 -orderer1.example.com | Kafka.TLS.Enabled = false -orderer1.example.com | Kafka.TLS.PrivateKey = "" -orderer1.example.com | Kafka.TLS.Certificate = "" -orderer1.example.com | Kafka.TLS.RootCAs = [] -orderer1.example.com | Kafka.TLS.ClientAuthRequired = false -orderer1.example.com | Kafka.TLS.ClientRootCAs = [] -orderer1.example.com | Kafka.SASLPlain.Enabled = false -orderer1.example.com | Kafka.SASLPlain.User = "" -orderer1.example.com | Kafka.SASLPlain.Password = "" -orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 -orderer1.example.com | Debug.BroadcastTraceDir = "" -orderer1.example.com | Debug.DeliverTraceDir = "" -orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] -orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" -orderer1.example.com | Operations.TLS.Enabled = false -orderer1.example.com | Operations.TLS.PrivateKey = "" -orderer1.example.com | Operations.TLS.Certificate = "" -orderer1.example.com | Operations.TLS.RootCAs = [] -orderer1.example.com | Operations.TLS.ClientAuthRequired = false -orderer1.example.com | Operations.TLS.ClientRootCAs = [] -orderer1.example.com | Metrics.Provider = "prometheus" -orderer1.example.com | Metrics.Statsd.Network = "udp" -orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" -orderer1.example.com | Metrics.Statsd.WriteInterval = 30s -orderer1.example.com | Metrics.Statsd.Prefix = """ -orderer1.example.com | "2019-07-20 02:39:29.650 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" -orderer1.example.com | "2019-07-20 02:39:29.736 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" -orderer1.example.com | "2019-07-20 02:39:29.739 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" -orderer1.example.com | "2019-07-20 02:39:29.749 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" -orderer1.example.com | "2019-07-20 02:39:29.836 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" -orderer1.example.com | "2019-07-20 02:39:29.837 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:29.845 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" -orderer1.example.com | "2019-07-20 02:39:29.845 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:29.845 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 3, -orderer1.example.com | Endpoint: orderer2.example.com:7050, -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | ID: 1, -orderer1.example.com | Endpoint: orderer0.example.com:7050, -orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | ]" -orderer1.example.com | "2019-07-20 02:39:29.845 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" -orderer1.example.com | "2019-07-20 02:39:29.846 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" -orderer1.example.com | "2019-07-20 02:39:29.846 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" -orderer1.example.com | "2019-07-20 02:39:29.846 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" -orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 3 exists in both old and new membership for channel testchainid , skipping its deactivation" -orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 1 exists in both old and new membership for channel testchainid , skipping its deactivation" -orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" -orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 2 became follower at term 0" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 2 became follower at term 1" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:29.849 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: -orderer1.example.com | Version: 1.4.2 -orderer1.example.com | Commit SHA: development build -orderer1.example.com | Go version: go1.12.7 -orderer1.example.com | OS/Arch: linux/amd64" -orderer1.example.com | "2019-07-20 02:39:29.849 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" -orderer1.example.com | "2019-07-20 02:39:29.853 UTC [orderer.consensus.etcdraft] apply -> INFO 019 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:29.853 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:29.853 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] Step -> INFO 01c 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:31.011 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 2 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:31.011 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01e 2 became follower at term 2" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:31.011 UTC [orderer.consensus.etcdraft] Step -> INFO 01f 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] run -> INFO 020 raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 021 Raft leader changed: 0 -> 3" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:39.141 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 022 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2 -orderer1.example.com | "2019-07-20 02:39:39.144 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" -orderer1.example.com | "2019-07-20 02:39:39.156 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 024 EvictionSuspicion not set, defaulting to 10m0s" -orderer1.example.com | "2019-07-20 02:39:39.156 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 025 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:39.166 UTC [orderer.commmon.multichannel] newChain -> INFO 026 Created and starting new chain businesschannel" -orderer1.example.com | "2019-07-20 02:39:39.166 UTC [orderer.consensus.etcdraft] Start -> INFO 027 Starting Raft node" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:39.166 UTC [orderer.common.cluster] Configure -> INFO 028 Entering, channel: businesschannel, nodes: [ID: 1, -orderer1.example.com | Endpoint: orderer0.example.com:7050, -orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | ID: 3, -orderer1.example.com | Endpoint: orderer2.example.com:7050, -orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer1.example.com | -----END CERTIFICATE----- -orderer1.example.com | ]" -orderer1.example.com | "2019-07-20 02:39:39.167 UTC [orderer.common.cluster] updateStubInMapping -> INFO 029 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" -orderer1.example.com | "2019-07-20 02:39:39.167 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02a Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" -orderer1.example.com | "2019-07-20 02:39:39.175 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02b Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" -orderer1.example.com | "2019-07-20 02:39:39.176 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02c Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" -orderer1.example.com | "2019-07-20 02:39:39.177 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer1.example.com | "2019-07-20 02:39:39.177 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02e 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer1.example.com | "2019-07-20 02:39:39.177 UTC [orderer.common.cluster] Configure -> INFO 02f Exiting" -orderer1.example.com | "2019-07-20 02:39:39.183 UTC [orderer.consensus.etcdraft] start -> INFO 030 Starting raft node as part of a new channel" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:39.183 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 031 2 became follower at term 0" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:39.183 UTC [orderer.consensus.etcdraft] newRaft -> INFO 032 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:39.183 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 033 2 became follower at term 1" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:39.221 UTC [orderer.consensus.etcdraft] apply -> INFO 034 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:39.222 UTC [orderer.consensus.etcdraft] apply -> INFO 035 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:39.222 UTC [orderer.consensus.etcdraft] apply -> INFO 036 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:40.266 UTC [orderer.consensus.etcdraft] Step -> INFO 037 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:40.279 UTC [orderer.consensus.etcdraft] Step -> INFO 038 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:40.279 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 039 2 became follower at term 2" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:40.279 UTC [orderer.consensus.etcdraft] Step -> INFO 03a 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:40.286 UTC [orderer.consensus.etcdraft] run -> INFO 03b raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:40.287 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 03c Raft leader changed: 0 -> 1" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03d Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:39:45.507 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03e Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:40:22.840 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03f Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:40:26.829 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 040 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:40:29.905 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 041 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:40:45.145 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2 -orderer1.example.com | "2019-07-20 02:40:45.157 UTC [cauthdsl] deduplicate -> WARN 043 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer1.example.com | "2019-07-20 02:40:45.158 UTC [cauthdsl] deduplicate -> WARN 044 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer2.example.com | 2019-07-20 02:39:29.666 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 -orderer2.example.com | "2019-07-20 02:39:29.838 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +peer1.org2.example.com | "2019-09-24 00:24:40.353 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" +peer1.org2.example.com | "2019-09-24 00:24:40.353 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" +peer1.org2.example.com | "2019-09-24 00:24:40.401 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" +peer1.org2.example.com | "2019-09-24 00:24:40.476 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer1.org2.example.com | "2019-09-24 00:24:40.477 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.8:7051" +peer1.org2.example.com | "2019-09-24 00:24:40.477 UTC [peer] func1 -> INFO 007 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-09-24 00:24:40.477 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.8:7051" +peer1.org2.example.com | "2019-09-24 00:24:40.477 UTC [peer] func1 -> INFO 009 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-09-24 00:24:40.514 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" +peer1.org2.example.com | "2019-09-24 00:24:40.542 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com" +peer1.org2.example.com | "2019-09-24 00:24:40.543 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer1.org2.example.com:7052" +peer1.org2.example.com | "2019-09-24 00:24:40.571 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org2.example.com | "2019-09-24 00:24:40.572 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org2.example.com | "2019-09-24 00:24:40.577 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org2.example.com | "2019-09-24 00:24:40.577 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +peer1.org2.example.com | "2019-09-24 00:24:40.617 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-09-24 00:24:40.647 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: " +peer1.org2.example.com | "2019-09-24 00:24:40.649 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer1.org2.example.com:7051 started" +peer1.org2.example.com | "2019-09-24 00:24:40.650 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-09-24 00:24:40.651 UTC [cscc] Init -> INFO 015 Init CSCC" +peer1.org2.example.com | "2019-09-24 00:24:40.651 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-09-24 00:24:40.652 UTC [qscc] Init -> INFO 017 Init QSCC" +peer1.org2.example.com | "2019-09-24 00:24:40.652 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-09-24 00:24:40.652 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer1.org2.example.com | "2019-09-24 00:24:40.652 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" +peer1.org2.example.com | "2019-09-24 00:24:40.653 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org2.example.com | "2019-09-24 00:24:40.653 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" +peer1.org2.example.com | "2019-09-24 00:24:40.654 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-09-24 00:24:40.654 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-09-24 00:24:40.654 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer1.org2.example.com | "2019-09-24 00:24:40.654 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" +peer1.org2.example.com | "2019-09-24 00:24:40.654 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer1.org2.example.com | "2019-09-24 00:24:40.654 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" +peer1.org2.example.com | "2019-09-24 00:24:57.842 UTC [endorser] callChaincode -> INFO 023 [][6c336440] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-09-24 00:24:57.843 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-09-24 00:24:57.848 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" +peer1.org2.example.com | "2019-09-24 00:24:58.134 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 238ms (state_validation=0ms block_and_pvtdata_commit=61ms state_commit=174ms) commitHash=[]" +peer1.org2.example.com | "2019-09-24 00:24:58.139 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-09-24 00:24:58.145 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-09-24 00:24:58.145 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-09-24 00:24:58.145 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-09-24 00:24:58.193 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org2.example.com | "2019-09-24 00:24:58.198 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-09-24 00:24:58.198 UTC [cscc] Init -> INFO 02d Init CSCC" +peer1.org2.example.com | "2019-09-24 00:24:58.198 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-09-24 00:24:58.198 UTC [qscc] Init -> INFO 02f Init QSCC" +peer1.org2.example.com | "2019-09-24 00:24:58.198 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-09-24 00:24:58.198 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer1.org2.example.com | "2019-09-24 00:24:58.199 UTC [endorser] callChaincode -> INFO 032 [][6c336440] Exit chaincode: name:"cscc" (356ms)" +peer1.org2.example.com | "2019-09-24 00:24:58.199 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47226 grpc.code=OK grpc.call_duration=357.6374ms +peer1.org2.example.com | "2019-09-24 00:25:00.608 UTC [endorser] callChaincode -> INFO 034 [][1d396982] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-09-24 00:25:00.609 UTC [endorser] callChaincode -> INFO 035 [][1d396982] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-09-24 00:25:21.682 UTC [gossip.channel] reportMembershipChanges -> INFO 057 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-09-24 00:26:59.111 UTC [gossip.privdata] StoreBlock -> INFO 058 [businesschannel] Received block [3] from buffer" +peer1.org1.example.com | "2019-09-24 00:26:59.113 UTC [committer.txvalidator] Validate -> INFO 059 [businesschannel] Validated block [3] in 2ms" +peer1.org1.example.com | "2019-09-24 00:26:59.113 UTC [cceventmgmt] HandleStateUpdates -> INFO 05a Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org1.example.com | "2019-09-24 00:26:59.127 UTC [kvledger] CommitWithPvtData -> INFO 05b [businesschannel] Committed block [3] with 1 transaction(s) in 13ms (state_validation=1ms block_and_pvtdata_commit=8ms state_commit=1ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer1.org1.example.com | "2019-09-24 00:27:01.989 UTC [gossip.privdata] StoreBlock -> INFO 05c [businesschannel] Received block [4] from buffer" +peer1.org1.example.com | "2019-09-24 00:27:01.990 UTC [committer.txvalidator] Validate -> INFO 05d [businesschannel] Validated block [4] in 0ms" +peer1.org1.example.com | "2019-09-24 00:27:02.001 UTC [kvledger] CommitWithPvtData -> INFO 05e [businesschannel] Committed block [4] with 1 transaction(s) in 11ms (state_validation=0ms block_and_pvtdata_commit=7ms state_commit=2ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer1.org1.example.com | "2019-09-24 00:27:04.563 UTC [gossip.privdata] StoreBlock -> INFO 05f [businesschannel] Received block [5] from buffer" +peer1.org1.example.com | "2019-09-24 00:27:04.566 UTC [committer.txvalidator] Validate -> INFO 060 [businesschannel] Validated block [5] in 2ms" +peer1.org1.example.com | "2019-09-24 00:27:04.585 UTC [kvledger] CommitWithPvtData -> INFO 061 [businesschannel] Committed block [5] with 1 transaction(s) in 18ms (state_validation=1ms block_and_pvtdata_commit=11ms state_commit=2ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer1.org1.example.com | "2019-09-24 00:27:19.472 UTC [gossip.privdata] StoreBlock -> INFO 062 [businesschannel] Received block [6] from buffer" +peer1.org1.example.com | "2019-09-24 00:27:19.474 UTC [cauthdsl] deduplicate -> WARN 063 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-09-24 00:27:19.474 UTC [cauthdsl] deduplicate -> WARN 064 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-09-24 00:27:19.491 UTC [gossip.gossip] JoinChan -> INFO 065 Joining gossip network of channel businesschannel with 3 organizations" +peer1.org1.example.com | "2019-09-24 00:27:19.491 UTC [gossip.gossip] learnAnchorPeers -> INFO 066 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-09-24 00:27:19.492 UTC [gossip.gossip] learnAnchorPeers -> INFO 067 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-09-24 00:27:19.492 UTC [gossip.gossip] learnAnchorPeers -> INFO 068 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-09-24 00:27:19.492 UTC [gossip.service] updateEndpoints -> WARN 069 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-09-24 00:27:19.513 UTC [committer.txvalidator] Validate -> INFO 06a [businesschannel] Validated block [6] in 40ms" +peer1.org1.example.com | "2019-09-24 00:27:19.527 UTC [kvledger] CommitWithPvtData -> INFO 06b [businesschannel] Committed block [6] with 1 transaction(s) in 12ms (state_validation=1ms block_and_pvtdata_commit=7ms state_commit=1ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer1.org1.example.com | "2019-09-24 00:27:19.547 UTC [comm.grpc.server] 1 -> INFO 06c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:60656 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=2m12.1690872s +peer1.org1.example.com | "2019-09-24 00:27:19.578 UTC [gossip.comm] func1 -> WARN 06d peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org1.example.com | "2019-09-24 00:27:19.578 UTC [gossip.discovery] expireDeadMembers -> WARN 06e Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org1.example.com | "2019-09-24 00:27:19.579 UTC [gossip.discovery] expireDeadMembers -> WARN 06f Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org1.example.com | "2019-09-24 00:27:19.579 UTC [gossip.discovery] expireDeadMembers -> WARN 070 Exiting" +peer1.org1.example.com | "2019-09-24 00:27:19.607 UTC [comm.grpc.server] 1 -> INFO 071 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.605Z grpc.peer_address=172.18.0.6:40226 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=898.3µs +peer1.org1.example.com | "2019-09-24 00:27:19.637 UTC [comm.grpc.server] 1 -> INFO 072 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.635Z grpc.peer_address=172.18.0.7:32852 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.941ms +peer1.org1.example.com | "2019-09-24 00:27:19.786 UTC [comm.grpc.server] 1 -> INFO 073 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:32852 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=136.5166ms +peer1.org1.example.com | "2019-09-24 00:27:19.847 UTC [comm.grpc.server] 1 -> INFO 074 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.846Z grpc.peer_address=172.18.0.7:32870 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=101.4µs +peer1.org1.example.com | "2019-09-24 00:27:29.925 UTC [endorser] callChaincode -> INFO 075 [][72679440] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-09-24 00:27:29.925 UTC [endorser] callChaincode -> INFO 076 [][72679440] Exit chaincode: name:"cscc" (0ms)" +peer1.org1.example.com | "2019-09-24 00:27:29.926 UTC [comm.grpc.server] 1 -> INFO 077 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33982 grpc.code=OK grpc.call_duration=3.6687ms +peer1.org1.example.com | "2019-09-24 00:27:30.715 UTC [endorser] callChaincode -> INFO 078 [][55e9abf7] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-09-24 00:27:30.717 UTC [endorser] callChaincode -> INFO 079 [][55e9abf7] Exit chaincode: name:"qscc" (1ms)" +peer1.org1.example.com | "2019-09-24 00:27:30.718 UTC [comm.grpc.server] 1 -> INFO 07a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33990 grpc.code=OK grpc.call_duration=3.0154ms +peer1.org2.example.com | "2019-09-24 00:25:00.609 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47236 grpc.code=OK grpc.call_duration=1.5805ms +peer1.org2.example.com | "2019-09-24 00:25:03.010 UTC [endorser] callChaincode -> INFO 037 [][5f1f2923] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-09-24 00:25:03.012 UTC [endorser] callChaincode -> INFO 038 [][5f1f2923] Exit chaincode: name:"qscc" (2ms)" +peer1.org2.example.com | "2019-09-24 00:25:03.012 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47248 grpc.code=OK grpc.call_duration=2.6876ms +peer1.org2.example.com | "2019-09-24 00:25:04.198 UTC [gossip.election] beLeader -> INFO 03a 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd : Becoming a leader" +peer1.org2.example.com | "2019-09-24 00:25:04.199 UTC [gossip.service] func1 -> INFO 03b Elected as a leader, starting delivery service for channel businesschannel" +peer1.org2.example.com | "2019-09-24 00:25:04.552 UTC [gossip.privdata] StoreBlock -> INFO 03c [businesschannel] Received block [1] from buffer" +peer1.org2.example.com | "2019-09-24 00:25:04.602 UTC [gossip.gossip] JoinChan -> INFO 03d Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-09-24 00:25:04.602 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-09-24 00:25:04.602 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-09-24 00:25:04.713 UTC [committer.txvalidator] Validate -> INFO 040 [businesschannel] Validated block [1] in 149ms" +peer1.org2.example.com | "2019-09-24 00:25:04.869 UTC [kvledger] CommitWithPvtData -> INFO 041 [businesschannel] Committed block [1] with 1 transaction(s) in 155ms (state_validation=9ms block_and_pvtdata_commit=135ms state_commit=8ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer1.org2.example.com | "2019-09-24 00:25:05.228 UTC [gossip.gossip] validateMsg -> WARN 042 StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found" +peer1.org2.example.com | "2019-09-24 00:25:05.228 UTC [gossip.gossip] handleMessage -> WARN 043 Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes isn't valid" +peer1.org2.example.com | "2019-09-24 00:25:07.164 UTC [gossip.privdata] StoreBlock -> INFO 044 [businesschannel] Received block [2] from buffer" +peer1.org2.example.com | "2019-09-24 00:25:07.240 UTC [gossip.gossip] JoinChan -> INFO 045 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-09-24 00:25:07.240 UTC [gossip.gossip] learnAnchorPeers -> INFO 046 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-09-24 00:25:07.240 UTC [gossip.gossip] learnAnchorPeers -> INFO 047 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-09-24 00:25:07.347 UTC [committer.txvalidator] Validate -> INFO 048 [businesschannel] Validated block [2] in 182ms" +peer1.org2.example.com | "2019-09-24 00:25:07.419 UTC [kvledger] CommitWithPvtData -> INFO 049 [businesschannel] Committed block [2] with 1 transaction(s) in 71ms (state_validation=0ms block_and_pvtdata_commit=51ms state_commit=15ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer1.org2.example.com | "2019-09-24 00:25:07.709 UTC [comm.grpc.server] 1 -> INFO 04a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.708Z grpc.peer_address=172.18.0.7:38728 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=135.1µs +peer1.org2.example.com | "2019-09-24 00:25:08.744 UTC [gossip.gossip] validateMsg -> WARN 04b StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes is found invalid: PKIID wasn't found" +peer1.org2.example.com | "2019-09-24 00:25:08.744 UTC [gossip.gossip] handleMessage -> WARN 04c Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes isn't valid" +peer1.org2.example.com | "2019-09-24 00:25:09.265 UTC [gossip.election] stopBeingLeader -> INFO 04d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd Stopped being a leader" +peer1.org2.example.com | "2019-09-24 00:25:09.265 UTC [gossip.service] func1 -> INFO 04e Renounced leadership, stopping delivery service for channel businesschannel" +peer1.org2.example.com | "2019-09-24 00:25:09.266 UTC [deliveryClient] try -> WARN 04f Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s" +peer1.org2.example.com | "2019-09-24 00:25:09.266 UTC [blocksProvider] DeliverBlocks -> WARN 050 [businesschannel] Receive error: client is closing" +peer1.org2.example.com | "2019-09-24 00:25:13.111 UTC [gossip.channel] reportMembershipChanges -> INFO 051 Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]]" +peer1.org2.example.com | "2019-09-24 00:25:18.110 UTC [gossip.channel] reportMembershipChanges -> INFO 052 Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-09-24 00:25:19.492 UTC [endorser] callChaincode -> INFO 053 [][708cc5ec] Entry chaincode: name:"lscc" " +peer1.org2.example.com | "2019-09-24 00:25:19.493 UTC [lscc] executeInstall -> INFO 054 Installed Chaincode [exp02] Version [1.0] to peer" +peer1.org2.example.com | "2019-09-24 00:25:19.494 UTC [endorser] callChaincode -> INFO 055 [][708cc5ec] Exit chaincode: name:"lscc" (1ms)" +peer1.org2.example.com | "2019-09-24 00:25:19.494 UTC [comm.grpc.server] 1 -> INFO 056 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47344 grpc.code=OK grpc.call_duration=2.4903ms +peer1.org2.example.com | "2019-09-24 00:26:59.123 UTC [gossip.privdata] StoreBlock -> INFO 057 [businesschannel] Received block [3] from buffer" +peer1.org2.example.com | "2019-09-24 00:26:59.129 UTC [committer.txvalidator] Validate -> INFO 058 [businesschannel] Validated block [3] in 4ms" +peer1.org2.example.com | "2019-09-24 00:26:59.133 UTC [cceventmgmt] HandleStateUpdates -> INFO 059 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:38.764 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." +peer0.org1.example.com | "2019-09-24 00:24:38.771 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:38.772 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +peer0.org1.example.com | "2019-09-24 00:24:38.772 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:24:38.773 UTC [nodeCmd] serve -> INFO 037 Starting peer: +peer0.org1.example.com | Version: 1.4.2 +peer0.org1.example.com | Commit SHA: development build +peer0.org1.example.com | Go version: go1.12.9 +peer0.org1.example.com | OS/Arch: linux/amd64 +peer0.org1.example.com | Chaincode: +peer0.org1.example.com | Base Image Version: 0.4.15 +peer0.org1.example.com | Base Docker Namespace: hyperledger +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org1.example.com | Docker Namespace: hyperledger" +peer0.org1.example.com | "2019-09-24 00:24:38.774 UTC [msp] GetDefaultSigningIdentity -> DEBU 038 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:38.774 UTC [msp.identity] Sign -> DEBU 039 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +peer0.org1.example.com | "2019-09-24 00:24:38.774 UTC [msp.identity] Sign -> DEBU 03a Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +peer0.org1.example.com | "2019-09-24 00:24:38.774 UTC [ledgermgmt] initialize -> INFO 03b Initializing ledger mgmt" +peer0.org1.example.com | "2019-09-24 00:24:38.774 UTC [kvledger] NewProvider -> INFO 03c Initializing ledger provider" +peer0.org1.example.com | "2019-09-24 00:24:38.775 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03d CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" +peer0.org1.example.com | "2019-09-24 00:24:38.775 UTC [kvledger.util] logDirStatus -> DEBU 03e Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" +peer0.org1.example.com | "2019-09-24 00:24:38.776 UTC [kvledger.util] logDirStatus -> DEBU 03f After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" +peer0.org1.example.com | "2019-09-24 00:24:38.806 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 040 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" +peer0.org1.example.com | "2019-09-24 00:24:38.806 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" +peer0.org1.example.com | "2019-09-24 00:24:38.806 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" +peer0.org1.example.com | "2019-09-24 00:24:38.807 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" +peer0.org1.example.com | "2019-09-24 00:24:38.824 UTC [kvledger.util] CreateDirIfMissing -> DEBU 044 CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/]" +peer0.org1.example.com | "2019-09-24 00:24:38.825 UTC [kvledger.util] logDirStatus -> DEBU 045 Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist" +peer0.org1.example.com | "2019-09-24 00:24:38.825 UTC [kvledger.util] logDirStatus -> DEBU 046 After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists" +peer0.org1.example.com | "2019-09-24 00:24:38.844 UTC [kvledger] NewProvider -> INFO 047 ledger provider Initialized" +peer0.org1.example.com | "2019-09-24 00:24:38.845 UTC [confighistory] newDBProvider -> DEBU 048 Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" +peer0.org1.example.com | "2019-09-24 00:24:38.845 UTC [kvledger.util] CreateDirIfMissing -> DEBU 049 CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" +peer0.org1.example.com | "2019-09-24 00:24:38.845 UTC [kvledger.util] logDirStatus -> DEBU 04a Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" +peer0.org1.example.com | "2019-09-24 00:24:38.846 UTC [kvledger.util] logDirStatus -> DEBU 04b After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" +peer0.org1.example.com | "2019-09-24 00:24:38.871 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" +peer1.org2.example.com | "2019-09-24 00:26:59.146 UTC [kvledger] CommitWithPvtData -> INFO 05a [businesschannel] Committed block [3] with 1 transaction(s) in 12ms (state_validation=1ms block_and_pvtdata_commit=7ms state_commit=1ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer1.org2.example.com | "2019-09-24 00:27:01.992 UTC [gossip.privdata] StoreBlock -> INFO 05b [businesschannel] Received block [4] from buffer" +peer1.org2.example.com | "2019-09-24 00:27:01.995 UTC [committer.txvalidator] Validate -> INFO 05c [businesschannel] Validated block [4] in 1ms" +peer1.org2.example.com | "2019-09-24 00:27:02.011 UTC [kvledger] CommitWithPvtData -> INFO 05d [businesschannel] Committed block [4] with 1 transaction(s) in 14ms (state_validation=0ms block_and_pvtdata_commit=9ms state_commit=3ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer1.org2.example.com | "2019-09-24 00:27:04.570 UTC [gossip.privdata] StoreBlock -> INFO 05e [businesschannel] Received block [5] from buffer" +peer1.org2.example.com | "2019-09-24 00:27:04.571 UTC [committer.txvalidator] Validate -> INFO 05f [businesschannel] Validated block [5] in 0ms" +peer1.org2.example.com | "2019-09-24 00:27:04.584 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [5] with 1 transaction(s) in 12ms (state_validation=0ms block_and_pvtdata_commit=8ms state_commit=1ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer1.org2.example.com | "2019-09-24 00:27:19.657 UTC [gossip.privdata] StoreBlock -> INFO 061 [businesschannel] Received block [6] from buffer" +peer1.org2.example.com | "2019-09-24 00:27:19.659 UTC [cauthdsl] deduplicate -> WARN 062 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-09-24 00:27:19.660 UTC [cauthdsl] deduplicate -> WARN 063 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-09-24 00:27:19.665 UTC [gossip.gossip] JoinChan -> INFO 064 Joining gossip network of channel businesschannel with 3 organizations" +peer1.org2.example.com | "2019-09-24 00:27:19.673 UTC [gossip.gossip] learnAnchorPeers -> INFO 065 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-09-24 00:27:19.674 UTC [gossip.gossip] learnAnchorPeers -> INFO 066 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-09-24 00:27:19.674 UTC [gossip.gossip] learnAnchorPeers -> INFO 067 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-09-24 00:27:19.702 UTC [gossip.service] updateEndpoints -> WARN 068 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-09-24 00:27:19.726 UTC [committer.txvalidator] Validate -> INFO 069 [businesschannel] Validated block [6] in 69ms" +peer1.org2.example.com | "2019-09-24 00:27:19.759 UTC [kvledger] CommitWithPvtData -> INFO 06a [businesschannel] Committed block [6] with 1 transaction(s) in 30ms (state_validation=0ms block_and_pvtdata_commit=26ms state_commit=1ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer1.org2.example.com | "2019-09-24 00:27:19.825 UTC [comm.grpc.server] 1 -> INFO 06b streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:38728 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2m12.2807932s +peer1.org2.example.com | "2019-09-24 00:27:19.849 UTC [comm.grpc.server] 1 -> INFO 06c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.848Z grpc.peer_address=172.18.0.7:39168 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=356.9µs +peer1.org2.example.com | "2019-09-24 00:27:19.892 UTC [comm.grpc.server] 1 -> INFO 06d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.891Z grpc.peer_address=172.18.0.6:35792 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=240.2µs +peer1.org2.example.com | "2019-09-24 00:27:30.191 UTC [endorser] callChaincode -> INFO 06e [][5fb664d6] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-09-24 00:27:30.192 UTC [endorser] callChaincode -> INFO 06f [][5fb664d6] Exit chaincode: name:"cscc" (0ms)" +peer1.org2.example.com | "2019-09-24 00:27:30.192 UTC [comm.grpc.server] 1 -> INFO 070 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47784 grpc.code=OK grpc.call_duration=1.2016ms +peer1.org2.example.com | "2019-09-24 00:27:30.981 UTC [endorser] callChaincode -> INFO 071 [][c29a66be] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-09-24 00:27:30.983 UTC [endorser] callChaincode -> INFO 072 [][c29a66be] Exit chaincode: name:"qscc" (1ms)" +peer1.org2.example.com | "2019-09-24 00:27:30.983 UTC [comm.grpc.server] 1 -> INFO 073 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47792 grpc.code=OK grpc.call_duration=1.9363ms +peer0.org2.example.com | "2019-09-24 00:24:39.642 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org2.example.com | Version: 1.4.2 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.12.9 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Image Version: 0.4.15 +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger" +peer0.org2.example.com | "2019-09-24 00:24:39.645 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" +peer0.org2.example.com | "2019-09-24 00:24:39.645 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" +peer0.org2.example.com | "2019-09-24 00:24:39.750 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" +peer0.org2.example.com | "2019-09-24 00:24:39.862 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer0.org2.example.com | "2019-09-24 00:24:39.863 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.6:7051" +peer0.org2.example.com | "2019-09-24 00:24:39.863 UTC [peer] func1 -> INFO 007 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-09-24 00:24:39.863 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.6:7051" +peer0.org2.example.com | "2019-09-24 00:24:39.863 UTC [peer] func1 -> INFO 009 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-09-24 00:24:39.886 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" +peer0.org2.example.com | "2019-09-24 00:24:39.917 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com" +peer0.org2.example.com | "2019-09-24 00:24:39.917 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer0.org2.example.com:7052" +peer0.org2.example.com | "2019-09-24 00:24:39.930 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-09-24 00:24:39.932 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org2.example.com | "2019-09-24 00:24:39.933 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org2.example.com | "2019-09-24 00:24:39.933 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +peer0.org2.example.com | "2019-09-24 00:24:39.962 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-09-24 00:24:40.017 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer0.org2.example.com | "2019-09-24 00:24:40.018 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer0.org2.example.com:7051 started" +peer0.org2.example.com | "2019-09-24 00:24:40.031 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-09-24 00:24:40.032 UTC [cscc] Init -> INFO 015 Init CSCC" +peer0.org2.example.com | "2019-09-24 00:24:40.033 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-09-24 00:24:40.035 UTC [qscc] Init -> INFO 017 Init QSCC" +peer0.org2.example.com | "2019-09-24 00:24:40.035 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-09-24 00:24:40.035 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org2.example.com | "2019-09-24 00:24:40.035 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" +peer0.org2.example.com | "2019-09-24 00:24:40.038 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org2.example.com | "2019-09-24 00:24:40.038 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" +peer0.org2.example.com | "2019-09-24 00:24:40.038 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-09-24 00:24:40.038 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-09-24 00:24:40.046 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer0.org2.example.com | "2019-09-24 00:24:40.046 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" +peer0.org2.example.com | "2019-09-24 00:24:40.046 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer0.org2.example.com | "2019-09-24 00:24:40.046 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" +peer0.org2.example.com | "2019-09-24 00:24:57.149 UTC [endorser] callChaincode -> INFO 023 [][16d1f050] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-09-24 00:24:57.150 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-09-24 00:24:57.153 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" +peer0.org2.example.com | "2019-09-24 00:24:57.183 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 22ms (state_validation=0ms block_and_pvtdata_commit=9ms state_commit=5ms) commitHash=[]" +peer0.org2.example.com | "2019-09-24 00:24:57.188 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-09-24 00:24:57.210 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-09-24 00:24:57.210 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-09-24 00:24:57.210 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-09-24 00:24:57.269 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org2.example.com | "2019-09-24 00:24:57.281 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-09-24 00:24:57.281 UTC [cscc] Init -> INFO 02d Init CSCC" +peer0.org2.example.com | "2019-09-24 00:24:57.282 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-09-24 00:24:57.282 UTC [qscc] Init -> INFO 02f Init QSCC" +peer0.org2.example.com | "2019-09-24 00:24:57.282 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-09-24 00:24:57.282 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org2.example.com | "2019-09-24 00:24:57.282 UTC [endorser] callChaincode -> INFO 032 [][16d1f050] Exit chaincode: name:"cscc" (133ms)" +peer0.org1.example.com | "2019-09-24 00:24:38.871 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" +peer0.org2.example.com | "2019-09-24 00:24:57.284 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:48214 grpc.code=OK grpc.call_duration=137.0528ms +peer0.org1.example.com | "2019-09-24 00:24:38.872 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" +peer0.org1.example.com | "2019-09-24 00:24:39.267 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" +peer0.org2.example.com | "2019-09-24 00:25:00.367 UTC [endorser] callChaincode -> INFO 034 [][586694d5] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:24:39.267 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" +peer0.org2.example.com | "2019-09-24 00:25:00.368 UTC [endorser] callChaincode -> INFO 035 [][586694d5] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-09-24 00:24:39.267 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" +peer0.org2.example.com | "2019-09-24 00:25:00.368 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:48224 grpc.code=OK grpc.call_duration=1.6125ms +peer0.org1.example.com | "2019-09-24 00:24:39.300 UTC [kvledger.util] CreateDirIfMissing -> DEBU 052 CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" +peer0.org2.example.com | "2019-09-24 00:25:02.693 UTC [endorser] callChaincode -> INFO 037 [][c1b4b843] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:24:39.300 UTC [kvledger.util] logDirStatus -> DEBU 053 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" +peer0.org2.example.com | "2019-09-24 00:25:02.695 UTC [endorser] callChaincode -> INFO 038 [][c1b4b843] Exit chaincode: name:"qscc" (1ms)" +peer0.org1.example.com | "2019-09-24 00:24:39.300 UTC [kvledger.util] logDirStatus -> DEBU 054 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" +peer0.org2.example.com | "2019-09-24 00:25:02.695 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:48236 grpc.code=OK grpc.call_duration=2.881ms +peer0.org1.example.com | "2019-09-24 00:24:39.314 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 055 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" +peer0.org2.example.com | "2019-09-24 00:25:03.277 UTC [gossip.election] beLeader -> INFO 03a 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 : Becoming a leader" +peer0.org1.example.com | "2019-09-24 00:24:39.314 UTC [kvledger.util] CreateDirIfMissing -> DEBU 056 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" +peer0.org2.example.com | "2019-09-24 00:25:03.277 UTC [gossip.service] func1 -> INFO 03b Elected as a leader, starting delivery service for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:24:39.314 UTC [kvledger.util] logDirStatus -> DEBU 057 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" +peer0.org2.example.com | "2019-09-24 00:25:04.702 UTC [gossip.privdata] StoreBlock -> INFO 03c [businesschannel] Received block [1] from buffer" +peer0.org1.example.com | "2019-09-24 00:24:39.314 UTC [kvledger.util] logDirStatus -> DEBU 058 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" +peer0.org2.example.com | "2019-09-24 00:25:04.771 UTC [gossip.gossip] JoinChan -> INFO 03d Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-09-24 00:24:39.363 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 059 Recovering under construction ledger" +peer0.org2.example.com | "2019-09-24 00:25:04.807 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 00:24:39.363 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 05a No under construction ledger found. Quitting recovery" +peer0.org2.example.com | "2019-09-24 00:25:04.828 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-09-24 00:24:39.363 UTC [ledgermgmt] initialize -> INFO 05b ledger mgmt initialized" +peer0.org2.example.com | "2019-09-24 00:25:04.896 UTC [committer.txvalidator] Validate -> INFO 040 [businesschannel] Validated block [1] in 191ms" +peer0.org1.example.com | "2019-09-24 00:24:39.364 UTC [peer] func1 -> INFO 05c Auto-detected peer address: 172.18.0.7:7051" +peer0.org2.example.com | "2019-09-24 00:25:04.920 UTC [kvledger] CommitWithPvtData -> INFO 041 [businesschannel] Committed block [1] with 1 transaction(s) in 19ms (state_validation=0ms block_and_pvtdata_commit=10ms state_commit=2ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer0.org1.example.com | "2019-09-24 00:24:39.364 UTC [peer] func1 -> INFO 05d Returning peer0.org1.example.com:7051" +peer0.org2.example.com | "2019-09-24 00:25:06.170 UTC [gossip.gossip] validateMsg -> WARN 042 StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found" +peer0.org1.example.com | "2019-09-24 00:24:39.364 UTC [peer] func1 -> INFO 05e Auto-detected peer address: 172.18.0.7:7051" +peer0.org2.example.com | "2019-09-24 00:25:06.170 UTC [gossip.gossip] handleMessage -> WARN 043 Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes isn't valid" +peer0.org1.example.com | "2019-09-24 00:24:39.364 UTC [peer] func1 -> INFO 05f Returning peer0.org1.example.com:7051" +peer0.org2.example.com | "2019-09-24 00:25:07.221 UTC [gossip.privdata] StoreBlock -> INFO 044 [businesschannel] Received block [2] from buffer" +peer0.org1.example.com | "2019-09-24 00:24:39.514 UTC [nodeCmd] serve -> INFO 060 Starting peer with TLS enabled" +peer0.org2.example.com | "2019-09-24 00:25:07.246 UTC [gossip.gossip] JoinChan -> INFO 045 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-09-24 00:24:39.536 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 061 Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +peer0.org2.example.com | "2019-09-24 00:25:07.252 UTC [gossip.gossip] learnAnchorPeers -> INFO 046 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 00:24:39.537 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 062 Exit with ccEndpoint: peer0.org1.example.com:7052" +peer0.org2.example.com | "2019-09-24 00:25:07.252 UTC [gossip.gossip] learnAnchorPeers -> INFO 047 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-09-24 00:24:39.566 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: lscc-1.4.2" +peer0.org2.example.com | "2019-09-24 00:25:07.252 UTC [gossip.gossip] learnAnchorPeers -> INFO 048 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 00:24:39.566 UTC [sccapi] registerSysCC -> INFO 064 system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-09-24 00:25:07.315 UTC [committer.txvalidator] Validate -> INFO 049 [businesschannel] Validated block [2] in 93ms" +peer0.org1.example.com | "2019-09-24 00:24:39.566 UTC [inproccontroller] Register -> DEBU 065 Registering chaincode instance: cscc-1.4.2" +peer0.org2.example.com | "2019-09-24 00:25:07.352 UTC [comm.grpc.server] 1 -> INFO 04a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.351Z grpc.peer_address=172.18.0.8:38692 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=150.1µs +peer0.org1.example.com | "2019-09-24 00:24:39.566 UTC [sccapi] registerSysCC -> INFO 066 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org2.example.com | "2019-09-24 00:25:07.360 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.359Z grpc.peer_address=172.18.0.5:46972 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=197.2µs +peer0.org1.example.com | "2019-09-24 00:24:39.570 UTC [inproccontroller] Register -> DEBU 067 Registering chaincode instance: qscc-1.4.2" +peer0.org2.example.com | "2019-09-24 00:25:07.393 UTC [kvledger] CommitWithPvtData -> INFO 04c [businesschannel] Committed block [2] with 1 transaction(s) in 78ms (state_validation=0ms block_and_pvtdata_commit=27ms state_commit=9ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer0.org1.example.com | "2019-09-24 00:24:39.570 UTC [sccapi] registerSysCC -> INFO 068 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org2.example.com | "2019-09-24 00:25:07.419 UTC [comm.grpc.server] 1 -> INFO 04d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:17.36Z grpc.peer_address=172.18.0.8:38692 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=58.2339ms +peer0.org1.example.com | "2019-09-24 00:24:39.572 UTC [sccapi] registerSysCC -> INFO 069 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +peer0.org2.example.com | "2019-09-24 00:25:07.425 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:17.376Z grpc.peer_address=172.18.0.5:46972 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=48.5726ms +peer0.org1.example.com | "2019-09-24 00:24:39.573 UTC [nodeCmd] serve -> DEBU 06a Running peer" +peer0.org2.example.com | "2019-09-24 00:25:07.475 UTC [comm.grpc.server] 1 -> INFO 04f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.474Z grpc.peer_address=172.18.0.5:46978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=130.6µs +peer0.org1.example.com | "2019-09-24 00:24:39.577 UTC [msp] GetDefaultSigningIdentity -> DEBU 06b Obtaining default signing identity" +peer0.org2.example.com | "2019-09-24 00:25:07.491 UTC [comm.grpc.server] 1 -> INFO 050 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.49Z grpc.peer_address=172.18.0.8:38704 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=167.5µs +peer0.org1.example.com | "2019-09-24 00:24:39.578 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[string]interface{} value for peer.handlers" +peer0.org2.example.com | "2019-09-24 00:25:07.506 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.505Z grpc.peer_address=172.18.0.7:44580 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=237.7µs +peer0.org1.example.com | "2019-09-24 00:24:39.578 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" +peer0.org2.example.com | "2019-09-24 00:25:07.697 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:17.532Z grpc.peer_address=172.18.0.7:44580 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=164.5008ms +peer0.org1.example.com | "2019-09-24 00:24:39.578 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" +peer0.org2.example.com | "2019-09-24 00:25:07.767 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.766Z grpc.peer_address=172.18.0.7:44592 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=176.9µs +peer0.org1.example.com | "2019-09-24 00:24:39.578 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" +peer0.org1.example.com | "2019-09-24 00:24:39.578 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" +peer0.org2.example.com | "2019-09-24 00:25:07.831 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:44592 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=53.2141ms +peer0.org1.example.com | "2019-09-24 00:24:39.578 UTC [viperutil] getKeysRecursively -> DEBU 071 Found map[string]interface{} value for peer.handlers.endorsers" +peer0.org2.example.com | "2019-09-24 00:25:12.175 UTC [gossip.channel] reportMembershipChanges -> INFO 055 Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" +peer0.org1.example.com | "2019-09-24 00:24:39.579 UTC [viperutil] getKeysRecursively -> DEBU 072 Found map[string]interface{} value for peer.handlers.endorsers.escc" +peer0.org2.example.com | "2019-09-24 00:25:17.791 UTC [endorser] callChaincode -> INFO 056 [][de70b214] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:24:39.579 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +peer0.org2.example.com | "2019-09-24 00:25:17.792 UTC [lscc] executeInstall -> INFO 057 Installed Chaincode [exp02] Version [1.0] to peer" +peer0.org1.example.com | "2019-09-24 00:24:39.580 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" +peer0.org2.example.com | "2019-09-24 00:25:17.792 UTC [endorser] callChaincode -> INFO 058 [][de70b214] Exit chaincode: name:"lscc" (1ms)" +peer0.org1.example.com | "2019-09-24 00:24:39.584 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value is not a string: " +peer0.org2.example.com | "2019-09-24 00:25:17.792 UTC [comm.grpc.server] 1 -> INFO 059 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:48328 grpc.code=OK grpc.call_duration=1.7055ms +peer0.org1.example.com | "2019-09-24 00:24:39.585 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for peer.handlers.endorsers.escc.library setting to " +peer0.org2.example.com | "2019-09-24 00:26:59.102 UTC [gossip.privdata] StoreBlock -> INFO 05a [businesschannel] Received block [3] from buffer" +peer0.org1.example.com | "2019-09-24 00:24:39.586 UTC [viperutil] getKeysRecursively -> DEBU 077 Found map[string]interface{} value for peer.handlers.validators" +peer0.org2.example.com | "2019-09-24 00:26:59.107 UTC [committer.txvalidator] Validate -> INFO 05b [businesschannel] Validated block [3] in 4ms" +peer0.org1.example.com | "2019-09-24 00:24:39.588 UTC [viperutil] getKeysRecursively -> DEBU 078 Found map[string]interface{} value for peer.handlers.validators.vscc" +peer0.org2.example.com | "2019-09-24 00:26:59.107 UTC [cceventmgmt] HandleStateUpdates -> INFO 05c Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org1.example.com | "2019-09-24 00:24:39.601 UTC [viperutil] unmarshalJSON -> DEBU 079 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +peer0.org2.example.com | "2019-09-24 00:26:59.127 UTC [kvledger] CommitWithPvtData -> INFO 05d [businesschannel] Committed block [3] with 1 transaction(s) in 19ms (state_validation=0ms block_and_pvtdata_commit=9ms state_commit=3ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer0.org1.example.com | "2019-09-24 00:24:39.602 UTC [viperutil] getKeysRecursively -> DEBU 07a Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" +peer0.org2.example.com | "2019-09-24 00:27:01.985 UTC [gossip.privdata] StoreBlock -> INFO 05e [businesschannel] Received block [4] from buffer" +peer0.org1.example.com | "2019-09-24 00:24:39.608 UTC [viperutil] unmarshalJSON -> DEBU 07b Unmarshal JSON: value is not a string: " +peer0.org2.example.com | "2019-09-24 00:27:01.986 UTC [committer.txvalidator] Validate -> INFO 05f [businesschannel] Validated block [4] in 0ms" +peer0.org1.example.com | "2019-09-24 00:24:39.610 UTC [viperutil] getKeysRecursively -> DEBU 07c Found real value for peer.handlers.validators.vscc.library setting to " +peer0.org2.example.com | "2019-09-24 00:27:02.001 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [4] with 1 transaction(s) in 14ms (state_validation=0ms block_and_pvtdata_commit=9ms state_commit=2ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer0.org1.example.com | "2019-09-24 00:24:39.610 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 07d map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" +peer0.org2.example.com | "2019-09-24 00:27:04.564 UTC [gossip.privdata] StoreBlock -> INFO 061 [businesschannel] Received block [5] from buffer" +peer0.org1.example.com | "2019-09-24 00:24:39.628 UTC [gossip.service] func1 -> INFO 07e Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +peer0.org2.example.com | "2019-09-24 00:27:04.567 UTC [committer.txvalidator] Validate -> INFO 062 [businesschannel] Validated block [5] in 2ms" +peer0.org1.example.com | "2019-09-24 00:24:39.631 UTC [msp] DeserializeIdentity -> DEBU 07f Obtaining identity" +peer0.org2.example.com | "2019-09-24 00:27:04.584 UTC [kvledger] CommitWithPvtData -> INFO 063 [businesschannel] Committed block [5] with 1 transaction(s) in 16ms (state_validation=0ms block_and_pvtdata_commit=10ms state_commit=2ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer0.org1.example.com | "2019-09-24 00:24:39.631 UTC [msp.identity] newIdentity -> DEBU 080 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | "2019-09-24 00:27:19.554 UTC [comm.grpc.server] 1 -> INFO 064 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.553Z grpc.peer_address=172.18.0.5:47406 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=114µs +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | "2019-09-24 00:27:19.559 UTC [comm.grpc.server] 1 -> INFO 065 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:46978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2m12.2481694s +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | "2019-09-24 00:27:19.559 UTC [comm.grpc.server] 1 -> INFO 066 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:27:29.557Z grpc.peer_address=172.18.0.5:47406 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.7151ms +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | "2019-09-24 00:27:19.650 UTC [gossip.privdata] StoreBlock -> INFO 067 [businesschannel] Received block [6] from buffer" +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org2.example.com | "2019-09-24 00:27:19.651 UTC [cauthdsl] deduplicate -> WARN 068 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | "2019-09-24 00:27:19.651 UTC [cauthdsl] deduplicate -> WARN 069 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org2.example.com | "2019-09-24 00:27:19.658 UTC [gossip.gossip] JoinChan -> INFO 06a Joining gossip network of channel businesschannel with 3 organizations" +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org2.example.com | "2019-09-24 00:27:19.659 UTC [gossip.gossip] learnAnchorPeers -> INFO 06b Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org2.example.com | "2019-09-24 00:27:19.659 UTC [gossip.gossip] learnAnchorPeers -> INFO 06c Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | "2019-09-24 00:27:19.659 UTC [gossip.gossip] learnAnchorPeers -> INFO 06d No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org2.example.com | "2019-09-24 00:27:19.660 UTC [gossip.gossip] learnAnchorPeers -> INFO 06e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org2.example.com | "2019-09-24 00:27:19.685 UTC [committer.txvalidator] Validate -> INFO 06f [businesschannel] Validated block [6] in 35ms" +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org2.example.com | "2019-09-24 00:27:19.707 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [6] with 1 transaction(s) in 20ms (state_validation=1ms block_and_pvtdata_commit=9ms state_commit=7ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | "2019-09-24 00:27:19.713 UTC [comm.grpc.server] 1 -> INFO 071 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.712Z grpc.peer_address=172.18.0.8:39142 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=211.8µs +peer0.org1.example.com | "2019-09-24 00:24:39.632 UTC [msp] Validate -> DEBU 081 MSP Org1MSP validating identity" +peer0.org2.example.com | "2019-09-24 00:27:19.724 UTC [comm.grpc.server] 1 -> INFO 072 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:27:29.714Z grpc.peer_address=172.18.0.8:39142 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.6514ms +peer0.org1.example.com | "2019-09-24 00:24:39.632 UTC [gossip.gossip] NewGossipService -> INFO 082 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer0.org2.example.com | "2019-09-24 00:27:19.723 UTC [comm.grpc.server] 1 -> INFO 073 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:38704 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2m12.3915156s +peer0.org1.example.com | "2019-09-24 00:24:39.632 UTC [gossip.discovery] periodicalSendAlive -> DEBU 083 Sleeping 5s" +peer0.org2.example.com | "2019-09-24 00:27:19.777 UTC [comm.grpc.server] 1 -> INFO 074 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.777Z grpc.peer_address=172.18.0.7:45026 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=99.7µs +peer0.org1.example.com | "2019-09-24 00:24:39.632 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 084 Sleeping 25s" +peer0.org2.example.com | "2019-09-24 00:27:19.784 UTC [comm.grpc.server] 1 -> INFO 075 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.784Z grpc.peer_address=172.18.0.7:45024 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=87.1µs +peer0.org1.example.com | "2019-09-24 00:24:39.632 UTC [msp] GetDefaultSigningIdentity -> DEBU 085 Obtaining default signing identity" +peer0.org2.example.com | "2019-09-24 00:27:19.791 UTC [comm.grpc.server] 1 -> INFO 076 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:27:29.781Z grpc.peer_address=172.18.0.7:45026 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.7648ms +peer0.org1.example.com | "2019-09-24 00:24:39.632 UTC [msp.identity] Sign -> DEBU 086 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " +peer0.org2.example.com | "2019-09-24 00:27:19.792 UTC [comm.grpc.server] 1 -> INFO 077 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:45024 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.0873ms +peer0.org1.example.com | "2019-09-24 00:24:39.632 UTC [msp.identity] Sign -> DEBU 087 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " +peer0.org2.example.com | "2019-09-24 00:27:19.847 UTC [comm.grpc.server] 1 -> INFO 078 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.846Z grpc.peer_address=172.18.0.7:45028 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=520.3µs +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [gossip.pull] Add -> DEBU 088 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" +peer0.org2.example.com | "2019-09-24 00:27:30.064 UTC [endorser] callChaincode -> INFO 079 [][43684952] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [gossip.gossip] start -> INFO 089 Gossip instance peer0.org1.example.com:7051 started" +peer0.org2.example.com | "2019-09-24 00:27:30.064 UTC [endorser] callChaincode -> INFO 07a [][43684952] Exit chaincode: name:"cscc" (0ms)" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [gossip.gossip] syncDiscovery -> DEBU 08a Entering discovery sync with interval 4s" +peer0.org2.example.com | "2019-09-24 00:27:30.065 UTC [comm.grpc.server] 1 -> INFO 07b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:48772 grpc.code=OK grpc.call_duration=2.1364ms +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [msp] GetDefaultSigningIdentity -> DEBU 08b Obtaining default signing identity" +peer0.org2.example.com | "2019-09-24 00:27:30.851 UTC [endorser] callChaincode -> INFO 07c [][3c61c9d7] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [msp.identity] Sign -> DEBU 08c Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org2.example.com | "2019-09-24 00:27:30.852 UTC [endorser] callChaincode -> INFO 07d [][3c61c9d7] Exit chaincode: name:"qscc" (1ms)" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [msp.identity] Sign -> DEBU 08d Sign: digest: 87CD5FE9BE73F84DEECF12B810FB422CC95B75EDE44440822206D00025EEE7C1 " +peer0.org2.example.com | "2019-09-24 00:27:30.852 UTC [comm.grpc.server] 1 -> INFO 07e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:48780 grpc.code=OK grpc.call_duration=1.2866ms +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [msp] GetDefaultSigningIdentity -> DEBU 08e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [chaincode] LaunchConfig -> DEBU 08f launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [msp.identity] Sign -> DEBU 090 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [chaincode] Start -> DEBU 091 start container: lscc:1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [msp.identity] Sign -> DEBU 092 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [chaincode] Start -> DEBU 093 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [chaincode] Start -> DEBU 094 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.2 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [container] lockContainer -> DEBU 095 waiting for container(lscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [container] lockContainer -> DEBU 096 got container (lscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [gossip.discovery] Connect -> DEBU 097 Skipping connecting to myself" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [inproccontroller] getInstance -> DEBU 098 chaincode instance created for lscc-1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [container] unlockContainer -> DEBU 099 container lock deleted(lscc-1.4.2)" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [container] lockContainer -> DEBU 09a waiting for container(lscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [container] lockContainer -> DEBU 09b got container (lscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [container] unlockContainer -> DEBU 09c container lock deleted(lscc-1.4.2)" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [inproccontroller] func2 -> DEBU 09d chaincode-support started for lscc-1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [inproccontroller] func1 -> DEBU 09e chaincode started for lscc-1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.633 UTC [chaincode] handleMessage -> DEBU 09f [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-09-24 00:24:39.634 UTC [chaincode] HandleRegister -> DEBU 0a0 Received REGISTER in state created" +peer0.org1.example.com | "2019-09-24 00:24:39.634 UTC [chaincode] Register -> DEBU 0a1 registered handler complete for chaincode lscc:1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.634 UTC [chaincode] HandleRegister -> DEBU 0a2 Got REGISTER for chaincodeID = name:"lscc:1.4.2" , sending back REGISTERED" +peer0.org1.example.com | "2019-09-24 00:24:39.634 UTC [chaincode] HandleRegister -> DEBU 0a3 Changed state to established for name:"lscc:1.4.2" " +peer0.org1.example.com | "2019-09-24 00:24:39.634 UTC [chaincode] sendReady -> DEBU 0a4 sending READY for chaincode name:"lscc:1.4.2" " +peer0.org1.example.com | "2019-09-24 00:24:39.634 UTC [chaincode] sendReady -> DEBU 0a5 Changed to state ready for chaincode name:"lscc:1.4.2" " +peer0.org1.example.com | "2019-09-24 00:24:39.634 UTC [chaincode] Launch -> DEBU 0a6 launch complete" +peer0.org1.example.com | "2019-09-24 00:24:39.634 UTC [chaincode] Execute -> DEBU 0a7 Entry" +peer0.org1.example.com | "2019-09-24 00:24:39.634 UTC [chaincode] handleMessage -> DEBU 0a8 [4c9ee884] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:24:39.634 UTC [chaincode] Notify -> DEBU 0a9 [4c9ee884] notifying Txid:4c9ee884-13fa-4d78-a3d9-e2599a1fb5c0, channelID:" +peer0.org1.example.com | "2019-09-24 00:24:39.634 UTC [chaincode] Execute -> DEBU 0aa Exit" +peer0.org1.example.com | "2019-09-24 00:24:39.635 UTC [sccapi] deploySysCC -> INFO 0ab system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-09-24 00:24:39.635 UTC [chaincode] LaunchConfig -> DEBU 0ac launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-09-24 00:24:39.635 UTC [chaincode] Start -> DEBU 0ad start container: cscc:1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.635 UTC [chaincode] Start -> DEBU 0ae start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-09-24 00:24:39.635 UTC [chaincode] Start -> DEBU 0af start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.2 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-09-24 00:24:39.635 UTC [container] lockContainer -> DEBU 0b0 waiting for container(cscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.635 UTC [container] lockContainer -> DEBU 0b1 got container (cscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.635 UTC [inproccontroller] getInstance -> DEBU 0b2 chaincode instance created for cscc-1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [container] unlockContainer -> DEBU 0b3 container lock deleted(cscc-1.4.2)" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [container] lockContainer -> DEBU 0b4 waiting for container(cscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [container] lockContainer -> DEBU 0b5 got container (cscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [container] unlockContainer -> DEBU 0b6 container lock deleted(cscc-1.4.2)" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [inproccontroller] func2 -> DEBU 0b7 chaincode-support started for cscc-1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [inproccontroller] func1 -> DEBU 0b8 chaincode started for cscc-1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] handleMessage -> DEBU 0b9 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] HandleRegister -> DEBU 0ba Received REGISTER in state created" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] Register -> DEBU 0bb registered handler complete for chaincode cscc:1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] HandleRegister -> DEBU 0bc Got REGISTER for chaincodeID = name:"cscc:1.4.2" , sending back REGISTERED" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] HandleRegister -> DEBU 0bd Changed state to established for name:"cscc:1.4.2" " +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] sendReady -> DEBU 0be sending READY for chaincode name:"cscc:1.4.2" " +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] sendReady -> DEBU 0bf Changed to state ready for chaincode name:"cscc:1.4.2" " +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] Launch -> DEBU 0c0 launch complete" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] Execute -> DEBU 0c1 Entry" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [cscc] Init -> INFO 0c2 Init CSCC" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] handleMessage -> DEBU 0c3 [c4e7c39e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] Notify -> DEBU 0c4 [c4e7c39e] notifying Txid:c4e7c39e-a583-43b1-954d-8a9ae27eb47d, channelID:" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [chaincode] Execute -> DEBU 0c5 Exit" +peer0.org1.example.com | "2019-09-24 00:24:39.636 UTC [sccapi] deploySysCC -> INFO 0c6 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [chaincode] LaunchConfig -> DEBU 0c7 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [chaincode] Start -> DEBU 0c8 start container: qscc:1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [chaincode] Start -> DEBU 0c9 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [chaincode] Start -> DEBU 0ca start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.2 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [container] lockContainer -> DEBU 0cb waiting for container(qscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [container] lockContainer -> DEBU 0cc got container (qscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [inproccontroller] getInstance -> DEBU 0cd chaincode instance created for qscc-1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [container] unlockContainer -> DEBU 0ce container lock deleted(qscc-1.4.2)" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [container] lockContainer -> DEBU 0cf waiting for container(qscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [container] lockContainer -> DEBU 0d0 got container (qscc-1.4.2) lock" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [container] unlockContainer -> DEBU 0d1 container lock deleted(qscc-1.4.2)" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [inproccontroller] func2 -> DEBU 0d2 chaincode-support started for qscc-1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [inproccontroller] func1 -> DEBU 0d3 chaincode started for qscc-1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [chaincode] handleMessage -> DEBU 0d4 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [chaincode] HandleRegister -> DEBU 0d5 Received REGISTER in state created" +peer0.org1.example.com | "2019-09-24 00:24:39.637 UTC [chaincode] Register -> DEBU 0d6 registered handler complete for chaincode qscc:1.4.2" +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [chaincode] HandleRegister -> DEBU 0d7 Got REGISTER for chaincodeID = name:"qscc:1.4.2" , sending back REGISTERED" +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [chaincode] HandleRegister -> DEBU 0d8 Changed state to established for name:"qscc:1.4.2" " +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [chaincode] sendReady -> DEBU 0d9 sending READY for chaincode name:"qscc:1.4.2" " +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [chaincode] sendReady -> DEBU 0da Changed to state ready for chaincode name:"qscc:1.4.2" " +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [chaincode] Launch -> DEBU 0db launch complete" +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [chaincode] Execute -> DEBU 0dc Entry" +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [qscc] Init -> INFO 0dd Init QSCC" +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [chaincode] handleMessage -> DEBU 0de [9b393cce] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [chaincode] Notify -> DEBU 0df [9b393cce] notifying Txid:9b393cce-961e-4b01-9bc3-09f7e37e8a58, channelID:" +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [chaincode] Execute -> DEBU 0e0 Exit" +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [sccapi] deploySysCC -> INFO 0e1 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [sccapi] deploySysCC -> INFO 0e2 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [nodeCmd] serve -> INFO 0e3 Deployed system chaincodes" +peer0.org1.example.com | "2019-09-24 00:24:39.638 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0e4 Returning []" +peer0.org1.example.com | "2019-09-24 00:24:39.640 UTC [discovery] NewService -> INFO 0e5 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org1.example.com | "2019-09-24 00:24:39.640 UTC [nodeCmd] registerDiscoveryService -> INFO 0e6 Discovery service activated" +peer0.org1.example.com | "2019-09-24 00:24:39.640 UTC [nodeCmd] serve -> INFO 0e7 Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-09-24 00:24:39.640 UTC [nodeCmd] serve -> INFO 0e8 Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-09-24 00:24:39.641 UTC [kvledger] LoadPreResetHeight -> INFO 0e9 Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer0.org1.example.com | "2019-09-24 00:24:39.641 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ea Loading Pre-reset heights" +peer0.org1.example.com | "2019-09-24 00:24:39.641 UTC [fsblkstorage] preRestHtFiles -> INFO 0eb Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer0.org1.example.com | "2019-09-24 00:24:39.641 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ec Pre-reset heights loaded" +peer0.org1.example.com | "2019-09-24 00:24:40.294 UTC [comm.grpc.server] 1 -> INFO 0ed unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:24:42.292Z grpc.peer_address=172.18.0.5:48998 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=219µs +peer0.org1.example.com | "2019-09-24 00:24:40.297 UTC [msp] GetDefaultSigningIdentity -> DEBU 0ee Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:40.297 UTC [msp.identity] Sign -> DEBU 0ef Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:24:40.297 UTC [msp.identity] Sign -> DEBU 0f0 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:24:40.297 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f1 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:48998" +peer0.org1.example.com | "2019-09-24 00:24:40.298 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f2 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:48998" +peer0.org1.example.com | "2019-09-24 00:24:40.298 UTC [msp] DeserializeIdentity -> DEBU 0f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:24:40.298 UTC [msp.identity] newIdentity -> DEBU 0f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:40.299 UTC [msp] Validate -> DEBU 0f5 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:24:40.299 UTC [msp.identity] Verify -> DEBU 0f6 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-09-24 00:24:40.299 UTC [msp.identity] Verify -> DEBU 0f7 Verify: sig = 00000000 30 45 02 21 00 83 f9 01 d7 95 8f 67 8c b5 7b 58 |0E.!.......g..{X| +peer0.org1.example.com | 00000010 ec 82 ec ad ef fe b4 7d 87 90 ab 88 4f b5 99 1d |.......}....O...| +peer0.org1.example.com | 00000020 3d ea 14 6b 4f 02 20 04 23 5b 33 4d de 27 58 10 |=..kO. .#[3M.'X.| +peer0.org1.example.com | 00000030 4e ef 2f 52 64 34 96 5e e5 ad ed d1 b6 3c c2 60 |N./Rd4.^.....<.`| +peer0.org1.example.com | 00000040 07 8a 4a 9d 57 7c fd |..J.W|.|" +peer0.org1.example.com | "2019-09-24 00:24:40.300 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f8 Authenticated 172.18.0.5:48998" +peer0.org1.example.com | "2019-09-24 00:24:40.300 UTC [gossip.comm] GossipStream -> DEBU 0f9 Servicing 172.18.0.5:48998" +peer0.org1.example.com | "2019-09-24 00:24:40.308 UTC [gossip.comm] readFromStream -> DEBU 0fa Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 00:24:40.308 UTC [gossip.comm] func2 -> DEBU 0fb Client 172.18.0.5:48998 disconnected" +peer0.org1.example.com | "2019-09-24 00:24:40.308 UTC [comm.grpc.server] 1 -> INFO 0fc streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:24:50.296Z grpc.peer_address=172.18.0.5:48998 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.5451ms +peer0.org1.example.com | "2019-09-24 00:24:40.308 UTC [grpc] infof -> DEBU 0fd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:24:40.308 UTC [gossip.comm] writeToStream -> DEBU 0fe Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:24:40.331 UTC [comm.grpc.server] 1 -> INFO 0ff unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:24:42.331Z grpc.peer_address=172.18.0.5:49000 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=178.1µs +peer0.org1.example.com | "2019-09-24 00:24:40.332 UTC [msp] GetDefaultSigningIdentity -> DEBU 100 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:40.332 UTC [msp.identity] Sign -> DEBU 101 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:24:40.332 UTC [msp.identity] Sign -> DEBU 102 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:24:40.333 UTC [gossip.comm] authenticateRemotePeer -> DEBU 103 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:49000" +peer0.org1.example.com | "2019-09-24 00:24:40.333 UTC [gossip.comm] authenticateRemotePeer -> DEBU 104 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49000" +peer0.org1.example.com | "2019-09-24 00:24:40.333 UTC [msp.identity] Verify -> DEBU 105 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-09-24 00:24:40.333 UTC [msp.identity] Verify -> DEBU 106 Verify: sig = 00000000 30 45 02 21 00 8e 3b 1d 78 a3 2a 0d f2 16 f5 56 |0E.!..;.x.*....V| +peer0.org1.example.com | 00000010 35 3e 32 2e 85 33 6d 02 98 bc 5a 0a 53 d1 3b 80 |5>2..3m...Z.S.;.| +peer0.org1.example.com | 00000020 98 1b 8b 7a 79 02 20 23 c5 1e cf 64 03 d2 6b 0e |...zy. #...d..k.| +peer0.org1.example.com | 00000030 49 8d 5b f2 65 9e e2 e8 28 88 34 fd 03 0d 9c 6c |I.[.e...(.4....l| +peer0.org1.example.com | 00000040 37 7a fa 7f 5a 5f ee |7z..Z_.|" +peer0.org1.example.com | "2019-09-24 00:24:40.333 UTC [gossip.comm] authenticateRemotePeer -> DEBU 107 Authenticated 172.18.0.5:49000" +peer0.org1.example.com | "2019-09-24 00:24:40.333 UTC [gossip.comm] GossipStream -> DEBU 108 Servicing 172.18.0.5:49000" +peer0.org1.example.com | "2019-09-24 00:24:40.335 UTC [gossip.gossip] handleMessage -> DEBU 109 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:8112369475667193039 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \013 > > , Envelope: 1108 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:40.335 UTC [gossip.gossip] handleMessage -> DEBU 10a Exiting" +peer0.org1.example.com | "2019-09-24 00:24:40.336 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10b Got message: GossipMessage: nonce:8112369475667193039 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \013 > > , Envelope: 1108 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:40.336 UTC [msp.identity] Verify -> DEBU 10c Verify: digest = 00000000 0b da ec 46 04 af bd 3b e7 b1 54 46 46 b8 95 dc |...F...;..TFF...| +peer0.org1.example.com | 00000010 b0 f0 e0 df bb f0 09 d2 5c 18 af 9e 03 69 f6 f4 |........\....i..|" +peer0.org1.example.com | "2019-09-24 00:24:40.336 UTC [msp.identity] Verify -> DEBU 10d Verify: sig = 00000000 30 44 02 20 0b 3c 51 59 ff 7b 27 47 42 f1 4e 5e |0D. . DEBU 10e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:24:40.336 UTC [msp.identity] Verify -> DEBU 10f Verify: sig = 00000000 30 45 02 21 00 8c d5 ca 27 16 91 f6 9e 87 b3 fe |0E.!....'.......| +peer0.org1.example.com | 00000010 26 3d 45 cd de 19 85 39 63 f8 30 51 14 3f 5e b8 |&=E....9c.0Q.?^.| +peer0.org1.example.com | 00000020 7a a6 43 f0 3f 02 20 60 10 bf 88 96 eb c6 6f 2c |z.C.?. `......o,| +peer0.org1.example.com | 00000030 84 6d 98 b2 58 b1 dc bf d9 39 5f 92 69 76 5e ae |.m..X....9_.iv^.| +peer0.org1.example.com | 00000040 17 95 54 49 b5 3c f5 |..TI.<.|" +peer0.org1.example.com | "2019-09-24 00:24:40.336 UTC [gossip.discovery] handleAliveMessage -> DEBU 110 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:40.336 UTC [gossip.discovery] learnNewMembers -> DEBU 111 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [gossip.discovery] learnNewMembers -> DEBU 112 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [gossip.discovery] learnNewMembers -> DEBU 113 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [gossip.discovery] handleAliveMessage -> DEBU 114 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [gossip.discovery] handleMsgFromComm -> DEBU 115 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [gossip.discovery] sendMemResponse -> DEBU 116 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [msp] GetDefaultSigningIdentity -> DEBU 117 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [msp.identity] Sign -> DEBU 118 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [msp.identity] Sign -> DEBU 119 Sign: digest: BC574E71230FE6EA8CA6DEF7304159CA9CDF9B957FA29795A7988BD25F872911 " +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [msp] GetDefaultSigningIdentity -> DEBU 11a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [msp.identity] Sign -> DEBU 11b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [msp.identity] Sign -> DEBU 11c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:40.337 UTC [gossip.comm] Send -> DEBU 11d Entering, sending GossipMessage: Channel: , nonce: 8112369475667193039, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2197 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:40.338 UTC [gossip.discovery] sendMemResponse -> DEBU 11e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \013 > alive:&\003\237\332\322\021125\026\004@%\366\313(:fUe\301\013\315v\027\320\372,\204q\374" > > " +peer0.org1.example.com | "2019-09-24 00:24:40.338 UTC [gossip.comm] sendToEndpoint -> DEBU 11f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8112369475667193039, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2197 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:40.338 UTC [gossip.comm] sendToEndpoint -> DEBU 120 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:41.700 UTC [gossip.gossip] handleMessage -> DEBU 121 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:41.700 UTC [gossip.pull] HandleMessage -> DEBU 122 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:41.700 UTC [gossip.pull] SendDigest -> DEBU 123 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:24:41.700 UTC [gossip.gossip] handleMessage -> DEBU 124 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:41.705 UTC [gossip.gossip] handleMessage -> DEBU 125 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\004\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\271A\"\354\257\331\335V\217K\363\242\214v\242\376\230\342Q\325\031\005\276\2364K\216\026^eR\231\002 \000\340\260x\273\306\005\367%?J\236\207\034 Y\020\3153!\363\201\204\266\372\253#\2236\213\312\312" secret_envelope: > > , Envelope: 1098 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:41.705 UTC [gossip.gossip] handleMessage -> DEBU 126 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:41.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 127 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\004\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\271A\"\354\257\331\335V\217K\363\242\214v\242\376\230\342Q\325\031\005\276\2364K\216\026^eR\231\002 \000\340\260x\273\306\005\367%?J\236\207\034 Y\020\3153!\363\201\204\266\372\253#\2236\213\312\312" secret_envelope: > > , Envelope: 1098 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:41.705 UTC [msp.identity] Verify -> DEBU 128 Verify: digest = 00000000 fb 9c 76 8f 29 e1 37 bb b6 44 76 e4 cf 7e dd d5 |..v.).7..Dv..~..| +peer0.org1.example.com | 00000010 8c 22 83 3f d5 ee f1 11 88 50 74 e8 6a 88 1f 71 |.".?.....Pt.j..q|" +peer0.org1.example.com | "2019-09-24 00:24:41.705 UTC [msp.identity] Verify -> DEBU 129 Verify: sig = 00000000 30 45 02 21 00 b9 41 22 ec af d9 dd 56 8f 4b f3 |0E.!..A"....V.K.| +peer0.org1.example.com | 00000010 a2 8c 76 a2 fe 98 e2 51 d5 19 05 be 9e 34 4b 8e |..v....Q.....4K.| +peer0.org1.example.com | 00000020 16 5e 65 52 99 02 20 00 e0 b0 78 bb c6 05 f7 25 |.^eR.. ...x....%| +peer0.org1.example.com | 00000030 3f 4a 9e 87 1c 20 59 10 cd 33 21 f3 81 84 b6 fa |?J... Y..3!.....| +peer0.org1.example.com | 00000040 ab 23 93 36 8b ca ca |.#.6...|" +peer0.org1.example.com | "2019-09-24 00:24:41.706 UTC [msp.identity] Verify -> DEBU 12a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:24:41.706 UTC [msp.identity] Verify -> DEBU 12b Verify: sig = 00000000 30 44 02 20 6f e8 43 7a 2d 76 3d 47 ce d0 1a f9 |0D. o.Cz-v=G....| +peer0.org1.example.com | 00000010 5e 8a cf 44 6b 5b 4b df 82 88 cc ae 75 6a ae c4 |^..Dk[K.....uj..| +peer0.org1.example.com | 00000020 cb ab 34 af 02 20 47 cf 5d 55 64 5e fb 71 3c 28 |..4.. G.]Ud^.q<(| +peer0.org1.example.com | 00000030 01 fa 11 f8 6a 4a ff e8 89 1c 79 16 0d 7f 4e 0d |....jJ....y...N.| +peer0.org1.example.com | 00000040 89 f1 ba ca c3 0f |......|" +peer0.org1.example.com | "2019-09-24 00:24:41.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 12c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:41.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 12d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 12f Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 130 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 131 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 132 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 133 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [gossip.discovery] sendMemResponse -> DEBU 134 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [msp] GetDefaultSigningIdentity -> DEBU 135 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [msp.identity] Sign -> DEBU 136 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [msp.identity] Sign -> DEBU 137 Sign: digest: FA103506EC912B2378AB8920DD1CE3957EDFC5073A756E0A0E446C53A9C7E3C8 " +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [msp] GetDefaultSigningIdentity -> DEBU 138 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [msp.identity] Sign -> DEBU 139 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:41.707 UTC [msp.identity] Sign -> DEBU 13a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:41.708 UTC [gossip.comm] Send -> DEBU 13b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:41.708 UTC [gossip.discovery] sendMemResponse -> DEBU 13c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\004\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\271A\"\354\257\331\335V\217K\363\242\214v\242\376\230\342Q\325\031\005\276\2364K\216\026^eR\231\002 \000\340\260x\273\306\005\367%?J\236\207\034 Y\020\3153!\363\201\204\266\372\253#\2236\213\312\312" secret_envelope: > alive: > " +peer0.org1.example.com | "2019-09-24 00:24:41.708 UTC [gossip.comm] sendToEndpoint -> DEBU 13d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:41.708 UTC [gossip.comm] sendToEndpoint -> DEBU 13e Exiting" +peer0.org1.example.com | "2019-09-24 00:24:42.700 UTC [gossip.gossip] handleMessage -> DEBU 13f Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:42.701 UTC [gossip.pull] HandleMessage -> DEBU 140 GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:42.701 UTC [gossip.gossip] handleMessage -> DEBU 141 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:42.701 UTC [gossip.pull] SendRes -> DEBU 142 Sending 1 IDENTITY_MSG items to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:24:42.703 UTC [gossip.gossip] handleMessage -> DEBU 143 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:42.704 UTC [gossip.gossip] handleMessage -> DEBU 144 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:42.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 145 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:42.704 UTC [msp.identity] Verify -> DEBU 146 Verify: digest = 00000000 8a bc 91 fb 80 b7 a8 8b 45 14 29 7b df 10 c7 b2 |........E.){....| +peer0.org1.example.com | 00000010 53 19 b2 96 14 9f 7e 00 4a 3d e9 2b 32 2e 27 17 |S.....~.J=.+2.'.|" +peer0.org1.example.com | "2019-09-24 00:24:42.704 UTC [msp.identity] Verify -> DEBU 147 Verify: sig = 00000000 30 44 02 20 6b d3 4b e5 a6 be c1 b3 6c 39 d0 aa |0D. k.K.....l9..| +peer0.org1.example.com | 00000010 95 dd c8 e3 ce bd d1 29 95 dc 9f 9f 8c c2 1e b4 |.......)........| +peer0.org1.example.com | 00000020 d0 22 ea 6f 02 20 49 f4 69 cf 0c ab bd 51 23 3c |.".o. I.i....Q#<| +peer0.org1.example.com | 00000030 cd 39 0a d8 46 09 00 3f 49 2e a5 e7 82 32 47 25 |.9..F..?I....2G%| +peer0.org1.example.com | 00000040 d3 b2 8e 25 0b 1b |...%..|" +peer0.org1.example.com | "2019-09-24 00:24:42.705 UTC [msp.identity] Verify -> DEBU 148 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:24:42.705 UTC [msp.identity] Verify -> DEBU 149 Verify: sig = 00000000 30 45 02 21 00 ad bc 44 5a fe 0f 4c 75 6e 85 4a |0E.!...DZ..Lun.J| +peer0.org1.example.com | 00000010 9b 29 4c 07 6c 73 0f b7 6d e6 c1 25 3b 17 15 87 |.)L.ls..m..%;...| +peer0.org1.example.com | 00000020 6c 31 a6 c6 44 02 20 1f 42 f9 09 8f 6d 32 43 60 |l1..D. .B...m2C`| +peer0.org1.example.com | 00000030 47 2b 43 04 9e fd 9a 6d da 36 66 e2 ab 30 5e d0 |G+C....m.6f..0^.| +peer0.org1.example.com | 00000040 3d d9 9e bd e4 c3 a8 |=......|" +peer0.org1.example.com | "2019-09-24 00:24:42.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 14a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:42.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 14b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:24:42.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 14c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 00:24:42.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 00:24:42.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 14e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:24:42.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f Exiting" +peer0.org1.example.com | "2019-09-24 00:24:42.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 150 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:42.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 151 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:43.598 UTC [gossip.pull] Hello -> DEBU 152 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:24:43.598 UTC [gossip.comm] Send -> DEBU 153 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:43.598 UTC [gossip.comm] sendToEndpoint -> DEBU 154 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:43.598 UTC [gossip.comm] sendToEndpoint -> DEBU 155 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:43.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 156 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:43.599 UTC [msp.identity] Sign -> DEBU 157 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:24:43.599 UTC [msp.identity] Sign -> DEBU 158 Sign: digest: 7B7C785FAADF6A45ACC9DA97B03BC0A324BF5ED38B07FE967D54963B3F953DC4 " +peer0.org1.example.com | "2019-09-24 00:24:43.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 159 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:43.599 UTC [msp.identity] Sign -> DEBU 15a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:43.599 UTC [msp.identity] Sign -> DEBU 15b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:43.599 UTC [gossip.comm] Send -> DEBU 15c Entering, sending GossipMessage: tag:EMPTY mem_req:\\F\365_\356T\312{\262Q\220\222\311\253\200r\031\373\356\317\r\214@||" secret_envelope: > > , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:43.599 UTC [gossip.comm] sendToEndpoint -> DEBU 15d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\\F\365_\356T\312{\262Q\220\222\311\253\200r\031\373\356\317\r\214@||" secret_envelope: > > , Envelope: 1095 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:43.599 UTC [gossip.comm] sendToEndpoint -> DEBU 15e Exiting" +peer0.org1.example.com | "2019-09-24 00:24:43.600 UTC [gossip.gossip] handleMessage -> DEBU 15f Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:43.600 UTC [gossip.pull] HandleMessage -> DEBU 160 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:43.600 UTC [gossip.gossip] handleMessage -> DEBU 161 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:43.601 UTC [gossip.gossip] handleMessage -> DEBU 162 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:43.601 UTC [gossip.gossip] handleMessage -> DEBU 163 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:43.601 UTC [gossip.discovery] handleMsgFromComm -> DEBU 164 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:43.601 UTC [msp.identity] Verify -> DEBU 165 Verify: digest = 00000000 7b 7c 78 5f aa df 6a 45 ac c9 da 97 b0 3b c0 a3 |{|x_..jE.....;..| +peer0.org1.example.com | 00000010 24 bf 5e d3 8b 07 fe 96 7d 54 96 3b 3f 95 3d c4 |$.^.....}T.;?.=.|" +peer0.org1.example.com | "2019-09-24 00:24:43.601 UTC [msp.identity] Verify -> DEBU 166 Verify: sig = 00000000 30 45 02 21 00 fa ba d4 fe 2d eb 28 82 5e 11 a9 |0E.!.....-.(.^..| +peer0.org1.example.com | 00000010 12 ea ce 91 b0 43 58 e5 37 6c 3a 3f 66 58 83 4e |.....CX.7l:?fX.N| +peer0.org1.example.com | 00000020 bd 45 a3 b9 4a 02 20 7e 69 5a 61 08 0e 3e 5c 46 |.E..J. ~iZa..>\F| +peer0.org1.example.com | 00000030 f5 5f ee 54 ca 7b b2 51 90 92 c9 ab 80 72 19 fb |._.T.{.Q.....r..| +peer0.org1.example.com | 00000040 ee cf 0d 8c 40 7c 7c |....@|||" +peer0.org1.example.com | "2019-09-24 00:24:43.602 UTC [msp.identity] Verify -> DEBU 167 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:24:43.602 UTC [msp.identity] Verify -> DEBU 168 Verify: sig = 00000000 30 45 02 21 00 f2 b0 a3 15 9a 7c 43 3a 9a 9f 0e |0E.!......|C:...| +peer0.org1.example.com | 00000010 43 8d 11 0c 65 c7 56 fd bb dd e6 8f a2 d3 bd 10 |C...e.V.........| +peer0.org1.example.com | 00000020 f8 de c7 48 1d 02 20 67 4f 1c e5 db 6d a3 41 fb |...H.. gO...m.A.| +peer0.org1.example.com | 00000030 8c d7 8c cd ab b7 15 ae 70 68 29 db 7d 31 a9 2f |........ph).}1./| +peer0.org1.example.com | 00000040 0a fd 5e 64 7f 1d 0f |..^d...|" +peer0.org1.example.com | "2019-09-24 00:24:43.602 UTC [gossip.discovery] handleAliveMessage -> DEBU 169 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:43.602 UTC [gossip.discovery] isSentByMe -> DEBU 16a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:43.602 UTC [gossip.discovery] handleAliveMessage -> DEBU 16b Exiting" +peer0.org1.example.com | "2019-09-24 00:24:43.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16c Exiting" +peer0.org1.example.com | "2019-09-24 00:24:44.598 UTC [msp] GetDefaultSigningIdentity -> DEBU 16d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:44.598 UTC [msp.identity] Sign -> DEBU 16e Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:24:44.598 UTC [msp.identity] Sign -> DEBU 16f Sign: digest: 7D5B7401329F61D2E4F43593210381F89685B51397F195808F28F990545B7BDD " +peer0.org1.example.com | "2019-09-24 00:24:44.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 170 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:44.599 UTC [msp.identity] Sign -> DEBU 171 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:44.599 UTC [msp.identity] Sign -> DEBU 172 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:44.599 UTC [gossip.discovery] periodicalSendAlive -> DEBU 173 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:24:44.599 UTC [gossip.pull] SendReq -> DEBU 174 Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:24:44.599 UTC [gossip.comm] Send -> DEBU 175 Entering, sending GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:44.600 UTC [gossip.comm] sendToEndpoint -> DEBU 176 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:44.600 UTC [gossip.comm] sendToEndpoint -> DEBU 177 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:44.601 UTC [gossip.gossip] handleMessage -> DEBU 178 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 5609837395853407952, Envelope: 961 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:44.601 UTC [msp.identity] Verify -> DEBU 179 Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| +peer0.org1.example.com | 00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|" +peer0.org1.example.com | "2019-09-24 00:24:44.602 UTC [msp.identity] Verify -> DEBU 17a Verify: sig = 00000000 30 45 02 21 00 eb 75 b3 6c c4 79 0a be 94 04 1e |0E.!..u.l.y.....| +peer0.org1.example.com | 00000010 48 d7 af ac f1 8e ff c1 b2 48 39 c2 a5 ef ff 3d |H........H9....=| +peer0.org1.example.com | 00000020 55 59 de 67 22 02 20 3b 87 96 44 c6 4e c9 0e 8d |UY.g". ;..D.N...| +peer0.org1.example.com | 00000030 4b 43 a4 38 23 41 34 68 7d e5 ed 4a 28 36 2d 0b |KC.8#A4h}..J(6-.| +peer0.org1.example.com | 00000040 3d 59 04 f6 15 00 eb |=Y.....|" +peer0.org1.example.com | "2019-09-24 00:24:44.602 UTC [gossip.pull] HandleMessage -> DEBU 17b GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 5609837395853407952, Envelope: 961 bytes, Signature: 0 bytes" +orderer1.example.com | 2019-09-24 00:24:33.928 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer1.example.com | "2019-09-24 00:24:34.243 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer1.example.com | General.LedgerType = "file" +orderer1.example.com | General.ListenAddress = "0.0.0.0" +orderer1.example.com | General.ListenPort = 7050 +orderer1.example.com | General.TLS.Enabled = true +orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.TLS.ClientAuthRequired = false +orderer1.example.com | General.TLS.ClientRootCAs = [] +orderer1.example.com | General.Cluster.ListenAddress = "" +orderer1.example.com | General.Cluster.ListenPort = 0 +orderer1.example.com | General.Cluster.ServerCertificate = "" +orderer1.example.com | General.Cluster.ServerPrivateKey = "" +orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.Cluster.DialTimeout = 5s +orderer1.example.com | General.Cluster.RPCTimeout = 7s +orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer1.example.com | General.Cluster.SendBufferSize = 10 +orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer1.example.com | General.Keepalive.ServerTimeout = 20s +orderer1.example.com | General.ConnectionTimeout = 0s +orderer1.example.com | General.GenesisMethod = "file" +orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer1.example.com | General.SystemChannel = "test-system-channel-name" +orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer1.example.com | General.Profile.Enabled = false +orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer1.example.com | General.LocalMSPID = "OrdererMSP" +orderer1.example.com | General.BCCSP.ProviderName = "SW" +orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer1.example.com | General.BCCSP.PluginOpts = +orderer1.example.com | General.Authentication.TimeWindow = 15m0s +orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer1.example.com | RAMLedger.HistorySize = 1000 +orderer1.example.com | Kafka.Retry.ShortInterval = 5s +orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer1.example.com | Kafka.Retry.LongInterval = 5m0s +orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer1.example.com | Kafka.Verbose = false +orderer1.example.com | Kafka.Version = 0.10.2.0 +orderer1.example.com | Kafka.TLS.Enabled = false +orderer1.example.com | Kafka.TLS.PrivateKey = "" +orderer1.example.com | Kafka.TLS.Certificate = "" +orderer1.example.com | Kafka.TLS.RootCAs = [] +orderer1.example.com | Kafka.TLS.ClientAuthRequired = false +orderer1.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.SASLPlain.Enabled = false +orderer1.example.com | Kafka.SASLPlain.User = "" +orderer1.example.com | Kafka.SASLPlain.Password = "" +orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer1.example.com | Debug.BroadcastTraceDir = "" +orderer1.example.com | Debug.DeliverTraceDir = "" +orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer1.example.com | Operations.TLS.Enabled = false +orderer1.example.com | Operations.TLS.PrivateKey = "" +orderer1.example.com | Operations.TLS.Certificate = "" +orderer1.example.com | Operations.TLS.RootCAs = [] +orderer1.example.com | Operations.TLS.ClientAuthRequired = false +orderer1.example.com | Operations.TLS.ClientRootCAs = [] +orderer1.example.com | Metrics.Provider = "prometheus" +orderer1.example.com | Metrics.Statsd.Network = "udp" +orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer1.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | Metrics.Statsd.Prefix = """ +orderer1.example.com | "2019-09-24 00:24:34.357 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer1.example.com | "2019-09-24 00:24:34.566 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer1.example.com | "2019-09-24 00:24:34.570 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer1.example.com | "2019-09-24 00:24:34.585 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" +orderer1.example.com | "2019-09-24 00:24:34.651 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-09-24 00:24:34.657 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:34.670 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" +orderer1.example.com | "2019-09-24 00:24:34.670 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:34.671 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +peer0.org1.example.com | "2019-09-24 00:24:44.602 UTC [gossip.gossip] func2 -> DEBU 17c Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-09-24 00:24:44.602 UTC [gossip.pull] HandleMessage -> DEBU 17d Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" +peer0.org1.example.com | "2019-09-24 00:24:44.602 UTC [gossip.gossip] handleMessage -> DEBU 17e Exiting" +peer0.org1.example.com | "2019-09-24 00:24:44.602 UTC [gossip.comm] Send -> DEBU 17f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:44.603 UTC [gossip.comm] sendToEndpoint -> DEBU 180 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:44.603 UTC [gossip.comm] sendToEndpoint -> DEBU 181 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:45.701 UTC [gossip.gossip] handleMessage -> DEBU 182 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:45.701 UTC [gossip.pull] HandleMessage -> DEBU 183 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:45.701 UTC [gossip.pull] SendDigest -> DEBU 184 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:24:45.701 UTC [gossip.gossip] handleMessage -> DEBU 185 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:45.705 UTC [gossip.gossip] handleMessage -> DEBU 186 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\006\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\355\332\375\302\254\354\207:!\352\352{PLG \n\036\205\357Zj\022\257%]! > > , Envelope: 1098 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:45.705 UTC [gossip.gossip] handleMessage -> DEBU 187 Exiting" +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer0.org1.example.com | "2019-09-24 00:24:45.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\006\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\355\332\375\302\254\354\207:!\352\352{PLG \n\036\205\357Zj\022\257%]! > > , Envelope: 1098 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:45.706 UTC [msp.identity] Verify -> DEBU 189 Verify: digest = 00000000 68 ef ea b7 1f e6 e2 7f b0 91 71 fc 22 7a 1b f0 |h.........q."z..| +peer0.org1.example.com | 00000010 a1 3c 65 68 54 a0 4b f5 1f 6e f2 d0 59 94 92 25 |. DEBU 18a Verify: sig = 00000000 30 45 02 21 00 ed da fd c2 ac ec 87 3a 21 ea ea |0E.!........:!..| +peer0.org1.example.com | 00000010 7b 50 4c 47 20 0a 1e 85 ef 5a 6a 12 af 25 5d 21 |{PLG ....Zj..%]!| +peer0.org1.example.com | 00000020 3c 2f f3 24 45 02 20 51 05 5d 85 6a bc d7 3d 2a | DEBU 18b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:24:45.707 UTC [msp.identity] Verify -> DEBU 18c Verify: sig = 00000000 30 44 02 20 39 1a aa 79 28 07 58 43 8a b1 32 d9 |0D. 9..y(.XC..2.| +peer0.org1.example.com | 00000010 71 94 67 f3 8c d7 19 b7 76 b8 40 b0 87 e9 b9 57 |q.g.....v.@....W| +peer0.org1.example.com | 00000020 6a d8 e5 43 02 20 7d b0 95 a4 45 52 06 52 23 80 |j..C. }...ER.R#.| +peer0.org1.example.com | 00000030 68 78 b3 52 8b c2 27 a6 86 3d 0c 8f 51 00 83 01 |hx.R..'..=..Q...| +peer0.org1.example.com | 00000040 00 08 6f db bc a4 |..o...|" +peer0.org1.example.com | "2019-09-24 00:24:45.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 18d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:45.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:24:45.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 18f updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 00:24:45.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 190 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 00:24:45.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 191 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:24:45.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 192 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:45.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 193 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:45.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 194 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:45.707 UTC [gossip.discovery] sendMemResponse -> DEBU 195 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:24:45.708 UTC [gossip.comm] Send -> DEBU 196 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:45.708 UTC [gossip.discovery] sendMemResponse -> DEBU 197 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\006\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\355\332\375\302\254\354\207:!\352\352{PLG \n\036\205\357Zj\022\257%]! > alive:\317\261\243\302OK\234N\254\263\243$\260\235\205\221A\272u\300\254\3145x\321\006F\263" secret_envelope: > " +peer0.org1.example.com | "2019-09-24 00:24:45.708 UTC [gossip.comm] sendToEndpoint -> DEBU 198 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:45.708 UTC [gossip.comm] sendToEndpoint -> DEBU 199 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:47.599 UTC [gossip.pull] Hello -> DEBU 19a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:24:47.599 UTC [gossip.comm] Send -> DEBU 19b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU 19c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU 19d Exiting" +peer0.org1.example.com | "2019-09-24 00:24:47.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 19e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:47.599 UTC [msp.identity] Sign -> DEBU 19f Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:24:47.599 UTC [msp.identity] Sign -> DEBU 1a0 Sign: digest: F5B095B8495D3518ABCE97992B52C7D701210C1EF44B81CB0E3D48C86D5020C4 " +peer0.org1.example.com | "2019-09-24 00:24:47.600 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:47.600 UTC [msp.identity] Sign -> DEBU 1a2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:47.600 UTC [msp.identity] Sign -> DEBU 1a3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:47.600 UTC [gossip.gossip] handleMessage -> DEBU 1a4 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:47.600 UTC [gossip.pull] HandleMessage -> DEBU 1a5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:47.600 UTC [gossip.gossip] handleMessage -> DEBU 1a6 Exiting" +orderer2.example.com | 2019-09-24 00:24:33.901 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer2.example.com | "2019-09-24 00:24:34.243 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: orderer2.example.com | General.LedgerType = "file" orderer2.example.com | General.ListenAddress = "0.0.0.0" orderer2.example.com | General.ListenPort = 7050 @@ -801,22 +1168,34 @@ Attaching to peer0.org2.example.com, peer1.org2.example.com, peer1.org1.example. orderer2.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s orderer2.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s orderer2.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +peer0.org1.example.com | "2019-09-24 00:24:47.600 UTC [gossip.comm] Send -> DEBU 1a7 Entering, sending GossipMessage: tag:EMPTY mem_req:^\236\314\220\n\010\370\304\274\002 \002\366\225Y\231/g/e\306\2343\025~%\204\311\1773\272m\027f<7\030\260\275\032\316\035y" secret_envelope: > > , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:47.600 UTC [gossip.comm] sendToEndpoint -> DEBU 1a8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:^\236\314\220\n\010\370\304\274\002 \002\366\225Y\231/g/e\306\2343\025~%\204\311\1773\272m\027f<7\030\260\275\032\316\035y" secret_envelope: > > , Envelope: 1094 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:47.600 UTC [gossip.comm] sendToEndpoint -> DEBU 1a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:47.604 UTC [gossip.gossip] handleMessage -> DEBU 1aa Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:47.604 UTC [gossip.gossip] handleMessage -> DEBU 1ab Exiting" +peer0.org1.example.com | "2019-09-24 00:24:47.604 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:47.604 UTC [msp.identity] Verify -> DEBU 1ad Verify: digest = 00000000 f5 b0 95 b8 49 5d 35 18 ab ce 97 99 2b 52 c7 d7 |....I]5.....+R..| +peer0.org1.example.com | 00000010 01 21 0c 1e f4 4b 81 cb 0e 3d 48 c8 6d 50 20 c4 |.!...K...=H.mP .|" +peer0.org1.example.com | "2019-09-24 00:24:47.604 UTC [msp.identity] Verify -> DEBU 1ae Verify: sig = 00000000 30 45 02 21 00 e1 7b 44 9b 03 f3 fa b4 d6 84 29 |0E.!..{D.......)| +peer0.org1.example.com | 00000010 2c bb d4 96 01 09 02 b1 36 10 03 3e 5e 9e cc 90 |,.......6..>^...| +peer0.org1.example.com | 00000020 0a 08 f8 c4 bc 02 20 02 f6 95 59 99 2f 67 2f 65 |...... ...Y./g/e| +peer0.org1.example.com | 00000030 c6 9c 33 15 7e 25 84 c9 7f 33 ba 6d 17 66 3c 37 |..3.~%...3.m.f<7| +peer0.org1.example.com | 00000040 18 b0 bd 1a ce 1d 79 |......y|" +peer0.org1.example.com | "2019-09-24 00:24:47.604 UTC [msp.identity] Verify -> DEBU 1af Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:24:47.604 UTC [msp.identity] Verify -> DEBU 1b0 Verify: sig = 00000000 30 44 02 20 78 84 76 97 09 d9 5c be d4 02 2f 1a |0D. x.v...\.../.| +peer0.org1.example.com | 00000010 10 de b2 a1 d2 d3 4c dc 9b c7 08 c5 da 31 9e 77 |......L......1.w| +peer0.org1.example.com | 00000020 fe 13 02 66 02 20 75 97 53 fd 33 44 44 d4 10 df |...f. u.S.3DD...| +peer0.org1.example.com | 00000030 df 19 22 c9 86 dd 0e 80 be c6 7e 26 b3 49 7a dc |..".......~&.Iz.| +peer0.org1.example.com | 00000040 50 42 19 4f 2d f5 |PB.O-.|" +peer0.org1.example.com | "2019-09-24 00:24:47.604 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:47.605 UTC [gossip.discovery] isSentByMe -> DEBU 1b2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:47.605 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b3 Exiting" orderer2.example.com | Kafka.Retry.Metadata.RetryMax = 3 orderer2.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms orderer2.example.com | Kafka.Retry.Producer.RetryMax = 3 orderer2.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms orderer2.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN orderer2.example.com | Kafka.Verbose = false orderer2.example.com | Kafka.Version = 0.10.2.0 orderer2.example.com | Kafka.TLS.Enabled = false @@ -844,15 +1223,15 @@ Attaching to peer0.org2.example.com, peer1.org2.example.com, peer1.org1.example. orderer2.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" orderer2.example.com | Metrics.Statsd.WriteInterval = 30s orderer2.example.com | Metrics.Statsd.Prefix = """ -orderer2.example.com | "2019-07-20 02:39:29.872 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" -orderer2.example.com | "2019-07-20 02:39:29.937 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" -orderer2.example.com | "2019-07-20 02:39:29.937 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" -orderer2.example.com | "2019-07-20 02:39:29.947 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" -orderer2.example.com | "2019-07-20 02:39:29.990 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" -orderer2.example.com | "2019-07-20 02:39:29.990 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3 -orderer2.example.com | "2019-07-20 02:39:30.014 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" -orderer2.example.com | "2019-07-20 02:39:30.014 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=3 -orderer2.example.com | "2019-07-20 02:39:30.014 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1, +orderer2.example.com | "2019-09-24 00:24:34.436 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer2.example.com | "2019-09-24 00:24:34.575 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer2.example.com | "2019-09-24 00:24:34.578 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer2.example.com | "2019-09-24 00:24:34.609 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" +orderer2.example.com | "2019-09-24 00:24:34.655 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2019-09-24 00:24:34.655 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:34.694 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" +orderer2.example.com | "2019-09-24 00:24:34.694 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:34.694 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1, orderer2.example.com | Endpoint: orderer0.example.com:7050, orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw @@ -917,33428 +1296,47535 @@ Attaching to peer0.org2.example.com, peer1.org2.example.com, peer1.org1.example. orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= orderer2.example.com | -----END CERTIFICATE----- orderer2.example.com | ]" -orderer2.example.com | "2019-07-20 02:39:30.014 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" -orderer2.example.com | "2019-07-20 02:39:30.014 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" -orderer2.example.com | "2019-07-20 02:39:30.015 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" -orderer2.example.com | "2019-07-20 02:39:30.015 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" -orderer2.example.com | "2019-07-20 02:39:30.015 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 2 exists in both old and new membership for channel testchainid , skipping its deactivation" -orderer2.example.com | "2019-07-20 02:39:30.015 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 1 exists in both old and new membership for channel testchainid , skipping its deactivation" -orderer2.example.com | "2019-07-20 02:39:30.037 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" -orderer2.example.com | "2019-07-20 02:39:30.037 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=3 -orderer2.example.com | "2019-07-20 02:39:30.037 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 3 became follower at term 0" channel=testchainid node=3 -orderer2.example.com | "2019-07-20 02:39:30.037 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3 -orderer2.example.com | "2019-07-20 02:39:30.037 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 3 became follower at term 1" channel=testchainid node=3 -orderer2.example.com | "2019-07-20 02:39:30.038 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: -orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for fileledger +orderer2.example.com | "2019-09-24 00:24:34.695 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-09-24 00:24:34.695 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-09-24 00:24:34.703 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-09-24 00:24:34.705 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-09-24 00:24:34.705 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-09-24 00:24:34.706 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-09-24 00:24:34.706 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" +orderer2.example.com | "2019-09-24 00:24:34.706 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:34.706 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 3 became follower at term 0" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:34.706 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:34.706 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 3 became follower at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:34.706 UTC [orderer.consensus.etcdraft] run -> INFO 017 This node is picked to start campaign" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:34.708 UTC [orderer.common.server] Start -> INFO 018 Starting orderer: orderer2.example.com | Version: 1.4.2 -orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value orderer2.example.com | Commit SHA: development build -orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger -orderer2.example.com | Go version: go1.12.7 -orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer2.example.com | Go version: go1.12.9 orderer2.example.com | OS/Arch: linux/amd64" -orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer -orderer2.example.com | "2019-07-20 02:39:30.038 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" -orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 006 Found map[interface{}]interface{} value for ramledger -orderer2.example.com | "2019-07-20 02:39:30.038 UTC [orderer.consensus.etcdraft] run -> INFO 019 This node is picked to start campaign" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: 1000 -orderer2.example.com | "2019-07-20 02:39:30.041 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for ramledger.HistorySize setting to int 1000 -orderer2.example.com | "2019-07-20 02:39:30.041 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[interface{}]interface{} value for kafka -orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for kafka.Topic -orderer2.example.com | "2019-07-20 02:39:30.041 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: 3 -orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for kafka.Topic.ReplicationFactor setting to int 3 -orderer2.example.com | "2019-07-20 02:39:31.007 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 3 is starting a new election at term 1" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: false -orderer2.example.com | "2019-07-20 02:39:31.007 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 01e 3 became pre-candidate at term 1" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for kafka.Verbose setting to bool false -orderer2.example.com | "2019-07-20 02:39:31.007 UTC [orderer.consensus.etcdraft] poll -> INFO 01f 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00f Found map[string]interface{} value for kafka.TLS -orderer2.example.com | "2019-07-20 02:39:31.007 UTC [orderer.consensus.etcdraft] campaign -> INFO 020 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.379 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value is not a string: -orderer2.example.com | "2019-07-20 02:39:31.007 UTC [orderer.consensus.etcdraft] campaign -> INFO 021 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.398 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for kafka.TLS.Certificate setting to -orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] poll -> INFO 022 3 received MsgPreVoteResp from 1 at term 1" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 012 Unmarshal JSON: value is not a string: -orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 023 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 013 Found real value for kafka.TLS.RootCAs setting to -orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 024 3 became candidate at term 2" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: -orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] poll -> INFO 025 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for kafka.TLS.ClientAuthRequired setting to -orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] campaign -> INFO 026 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: -orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] campaign -> INFO 027 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for kafka.TLS.ClientRootCAs setting to -orderer2.example.com | "2019-07-20 02:39:31.012 UTC [orderer.consensus.etcdraft] poll -> INFO 028 3 received MsgVoteResp from 1 at term 2" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: false -orderer2.example.com | "2019-07-20 02:39:31.012 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 029 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for kafka.TLS.Enabled setting to bool false -orderer2.example.com | "2019-07-20 02:39:31.012 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 02a 3 became leader at term 2" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value is not a string: -orderer2.example.com | "2019-07-20 02:39:31.012 UTC [orderer.consensus.etcdraft] run -> INFO 02b raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for kafka.TLS.PrivateKey setting to -orderer2.example.com | "2019-07-20 02:39:31.013 UTC [orderer.consensus.etcdraft] run -> INFO 02c Leader 3 is present, quit campaign" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01c Found map[string]interface{} value for kafka.SASLPlain -orderer2.example.com | "2019-07-20 02:39:31.013 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02d Raft leader changed: 0 -> 3" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 01d Unmarshal JSON: value is not a string: false -orderer2.example.com | "2019-07-20 02:39:31.015 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02e Start accepting requests as Raft leader at block [0]" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01e Found real value for kafka.SASLPlain.Enabled setting to bool false -orderer2.example.com | "2019-07-20 02:39:39.130 UTC [orderer.consensus.etcdraft] propose -> INFO 02f Created block [1], there are 0 blocks in flight" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 01f Unmarshal JSON: value is not a string: -orderer2.example.com | "2019-07-20 02:39:39.130 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 030 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 020 Found real value for kafka.SASLPlain.User setting to -orderer2.example.com | "2019-07-20 02:39:39.137 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 031 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3 -orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value is not a string: -orderer2.example.com | "2019-07-20 02:39:39.139 UTC [fsblkstorage] newBlockfileMgr -> INFO 032 Getting block information from block storage" -orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for kafka.SASLPlain.Password setting to -orderer2.example.com | "2019-07-20 02:39:39.146 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 033 EvictionSuspicion not set, defaulting to 10m0s" -orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value is not a string: -orderer2.example.com | "2019-07-20 02:39:39.147 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 034 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for kafka.Version setting to -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.commmon.multichannel] newChain -> INFO 035 Created and starting new chain businesschannel" -orderer0.example.com | 2019-07-20 02:39:29.401 UTC [viperutil] getKeysRecursively -> DEBU 025 Found map[string]interface{} value for kafka.Retry -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.consensus.etcdraft] Start -> INFO 036 Starting Raft node" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.401 UTC [viperutil] unmarshalJSON -> DEBU 026 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] Configure -> INFO 037 Entering, channel: businesschannel, nodes: [ID: 1, -orderer0.example.com | 2019-07-20 02:39:29.401 UTC [viperutil] getKeysRecursively -> DEBU 027 Found real value for kafka.Retry.ShortTotal setting to string 10m -orderer2.example.com | Endpoint: orderer0.example.com:7050, -orderer0.example.com | 2019-07-20 02:39:29.404 UTC [viperutil] unmarshalJSON -> DEBU 028 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | 2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 029 Found real value for kafka.Retry.LongInterval setting to string 5m -orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer0.example.com | 2019-07-20 02:39:29.405 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value -orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | 2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for kafka.Retry.LongTotal setting to string 12h -orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer0.example.com | 2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 02c Found map[string]interface{} value for kafka.Retry.NetworkTimeouts -orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer0.example.com | 2019-07-20 02:39:29.406 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer0.example.com | 2019-07-20 02:39:29.406 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s -orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer0.example.com | 2019-07-20 02:39:29.406 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer0.example.com | 2019-07-20 02:39:29.406 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s -orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s -orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 033 Found map[string]interface{} value for kafka.Retry.Metadata -orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms -orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value is not a string: 3 -orderer2.example.com | -----END CERTIFICATE----- -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 038 Found map[string]interface{} value for kafka.Retry.Producer -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 039 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03a Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms -peer0.org1.example.com | -----END CERTIFICATE-----" -orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 03b Unmarshal JSON: value is not a string: 3 -peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03c Found real value for kafka.Retry.Producer.RetryMax setting to int 3 -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03d Found map[string]interface{} value for kafka.Retry.Consumer -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm -orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for kafka.Retry.ShortInterval setting to string 5s -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 042 Found map[interface{}]interface{} value for debug -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 043 Unmarshal JSON: value is not a string: -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 044 Found real value for debug.BroadcastTraceDir setting to -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -orderer2.example.com | -----END CERTIFICATE----- -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 045 Unmarshal JSON: value is not a string: -orderer2.example.com | ID: 2, -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 046 Found real value for debug.DeliverTraceDir setting to -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +orderer2.example.com | "2019-09-24 00:24:34.708 UTC [orderer.common.server] Start -> INFO 019 Beginning to serve requests" +orderer2.example.com | "2019-09-24 00:24:34.708 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:34.708 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:34.709 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.707 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 3 is starting a new election at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.707 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 01e 3 became pre-candidate at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.707 UTC [orderer.consensus.etcdraft] poll -> INFO 01f 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 +peer0.org1.example.com | "2019-09-24 00:24:47.605 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:47.704 UTC [gossip.gossip] handleMessage -> DEBU 1b5 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:47.704 UTC [gossip.gossip] handleMessage -> DEBU 1b6 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:47.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:47.704 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b8 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:24:47.704 UTC [msp.identity] Verify -> DEBU 1b9 Verify: digest = 00000000 08 b5 d1 fd 5b da ca e2 6e 9a 58 68 5c 36 ba a2 |....[...n.Xh\6..| +peer0.org1.example.com | 00000010 d2 44 fd 4b 87 23 aa b4 3e cd 10 6c b0 af 5a 32 |.D.K.#..>..l..Z2|" +peer0.org1.example.com | "2019-09-24 00:24:47.704 UTC [msp.identity] Verify -> DEBU 1ba Verify: sig = 00000000 30 44 02 20 19 5a af ea 56 5f 6f 07 99 95 11 cd |0D. .Z..V_o.....| +peer0.org1.example.com | 00000010 f5 8f 01 63 cd 67 83 67 55 62 cd 5b 38 48 f3 c7 |...c.g.gUb.[8H..| +peer0.org1.example.com | 00000020 6c 12 38 4a 02 20 50 14 98 d3 20 4f 6f 6d 16 cc |l.8J. P... Oom..| +peer0.org1.example.com | 00000030 19 a8 fe 56 15 2e 9b 6a 8b f2 e3 cc 23 89 49 61 |...V...j....#.Ia| +peer0.org1.example.com | 00000040 f5 a7 70 27 f5 fb |..p'..|" +peer0.org1.example.com | "2019-09-24 00:24:47.704 UTC [msp.identity] Verify -> DEBU 1bb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:24:47.704 UTC [msp.identity] Verify -> DEBU 1bc Verify: sig = 00000000 30 44 02 20 30 27 67 23 4f aa a4 57 dc d9 95 7d |0D. 0'g#O..W...}| +peer0.org1.example.com | 00000010 d8 12 32 85 2b 19 19 d3 9b 8a 78 83 33 1c 0a a2 |..2.+.....x.3...| +peer0.org1.example.com | 00000020 30 c6 58 db 02 20 40 7f ba 10 84 0f c8 05 99 a1 |0.X.. @.........| +peer0.org1.example.com | 00000030 04 69 30 fd 5e 9a c1 0b 85 6c 1d 10 39 af c4 e9 |.i0.^....l..9...| +peer0.org1.example.com | 00000040 fa 97 56 2f 32 ce |..V/2.|" +peer0.org1.example.com | "2019-09-24 00:24:47.705 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bd Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:47.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 1be Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:24:47.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bf updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:24:47.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c0 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:24:47.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c1 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:24:47.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c2 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:47.705 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c3 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:47.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c4 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:49.600 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c5 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:49.600 UTC [msp.identity] Sign -> DEBU 1c6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151008 " +peer0.org1.example.com | "2019-09-24 00:24:49.600 UTC [msp.identity] Sign -> DEBU 1c7 Sign: digest: 659B7A303EE8FDBCB606023CE839770270D894D321B0A68DF0265B8C89B68FEB " +peer0.org1.example.com | "2019-09-24 00:24:49.600 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c8 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:49.600 UTC [msp.identity] Sign -> DEBU 1c9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:49.600 UTC [msp.identity] Sign -> DEBU 1ca Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:49.600 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1cb Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:24:49.601 UTC [gossip.comm] Send -> DEBU 1cc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:49.601 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:49.602 UTC [gossip.comm] sendToEndpoint -> DEBU 1ce Exiting" +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-09-24 00:24:34.674 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-09-24 00:24:34.674 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-09-24 00:24:34.677 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-09-24 00:24:34.677 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-09-24 00:24:34.678 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-09-24 00:24:34.678 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-09-24 00:24:34.678 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" +orderer1.example.com | "2019-09-24 00:24:34.678 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:34.678 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 2 became follower at term 0" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:34.679 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:34.679 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 2 became follower at term 1" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:34.679 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: +orderer1.example.com | Version: 1.4.2 +orderer1.example.com | Commit SHA: development build +orderer1.example.com | Go version: go1.12.9 +orderer2.example.com | "2019-09-24 00:24:35.707 UTC [orderer.consensus.etcdraft] campaign -> INFO 020 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.707 UTC [orderer.consensus.etcdraft] campaign -> INFO 021 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.710 UTC [orderer.consensus.etcdraft] poll -> INFO 022 3 received MsgPreVoteResp from 2 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.711 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 023 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.711 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 024 3 became candidate at term 2" channel=testchainid node=3 +peer0.org1.example.com | "2019-09-24 00:24:49.701 UTC [gossip.gossip] handleMessage -> DEBU 1cf Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:49.702 UTC [gossip.pull] HandleMessage -> DEBU 1d0 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:49.703 UTC [gossip.pull] SendDigest -> DEBU 1d1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:24:49.703 UTC [gossip.gossip] handleMessage -> DEBU 1d2 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:49.713 UTC [gossip.gossip] handleMessage -> DEBU 1d3 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\010" signature:"0D\002 ~,Q\254\370\225\036_]\205K\023\014]\004\201E\214\253:\217[\205\305D\321\272GA\206\005\267\002 E\355\324\330\276\246 /;\215g\016'\313c\"\321\224\321\016\232\337\245\274\0027\352\307b\247\322N" secret_envelope:W\033\002 ,|\003{u#\026\251\021\013\235\351\233\304\221I\026Q{\0149\257\363\370\213h\332e`,m\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:49.713 UTC [gossip.gossip] handleMessage -> DEBU 1d4 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:49.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\010" signature:"0D\002 ~,Q\254\370\225\036_]\205K\023\014]\004\201E\214\253:\217[\205\305D\321\272GA\206\005\267\002 E\355\324\330\276\246 /;\215g\016'\313c\"\321\224\321\016\232\337\245\274\0027\352\307b\247\322N" secret_envelope:W\033\002 ,|\003{u#\026\251\021\013\235\351\233\304\221I\026Q{\0149\257\363\370\213h\332e`,m\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:49.713 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d6 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:24:49.713 UTC [msp.identity] Verify -> DEBU 1d7 Verify: digest = 00000000 2f 76 08 22 a8 81 1c b6 51 33 0c 2b c1 4f d3 0c |/v."....Q3.+.O..| +peer0.org1.example.com | 00000010 b4 57 ec cc c2 76 60 85 84 e8 14 9c c4 7e 6e 3c |.W...v`......~n<|" +peer0.org1.example.com | "2019-09-24 00:24:49.714 UTC [msp.identity] Verify -> DEBU 1d8 Verify: sig = 00000000 30 44 02 20 7e 2c 51 ac f8 95 1e 5f 5d 85 4b 13 |0D. ~,Q...._].K.| +peer0.org1.example.com | 00000010 0c 5d 04 81 45 8c ab 3a 8f 5b 85 c5 44 d1 ba 47 |.]..E..:.[..D..G| +peer0.org1.example.com | 00000020 41 86 05 b7 02 20 45 ed d4 d8 be a6 20 2f 3b 8d |A.... E..... /;.| +peer0.org1.example.com | 00000030 67 0e 27 cb 63 22 d1 94 d1 0e 9a df a5 bc 02 37 |g.'.c".........7| +peer0.org1.example.com | 00000040 ea c7 62 a7 d2 4e |..b..N|" +peer0.org1.example.com | "2019-09-24 00:24:49.714 UTC [msp.identity] Verify -> DEBU 1d9 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:24:49.714 UTC [msp.identity] Verify -> DEBU 1da Verify: sig = 00000000 30 45 02 21 00 f5 cc 65 1b 67 d7 03 c6 53 66 7a |0E.!...e.g...Sfz| +peer0.org1.example.com | 00000010 96 e7 17 27 93 1c fd c2 28 af 19 67 db 53 27 fc |...'....(..g.S'.| +peer0.org1.example.com | 00000020 ea 9c 3e 57 1b 02 20 2c 7c 03 7b 75 23 16 a9 11 |..>W.. ,|.{u#...| +peer0.org1.example.com | 00000030 0b 9d e9 9b c4 91 49 16 51 7b 0c 39 af f3 f8 8b |......I.Q{.9....| +peer0.org1.example.com | 00000040 68 da 65 60 2c 6d cb |h.e`,m.|" +peer0.org1.example.com | "2019-09-24 00:24:49.714 UTC [gossip.discovery] handleAliveMessage -> DEBU 1db Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:49.715 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:24:49.715 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dd updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:24:49.715 UTC [gossip.discovery] learnExistingMembers -> DEBU 1de Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:24:49.715 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:24:49.715 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e0 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:49.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e1 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:49.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e2 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:49.715 UTC [gossip.discovery] sendMemResponse -> DEBU 1e3 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:24:49.715 UTC [gossip.comm] Send -> DEBU 1e4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +orderer1.example.com | OS/Arch: linux/amd64" +orderer1.example.com | "2019-09-24 00:24:34.679 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" +orderer1.example.com | "2019-09-24 00:24:34.685 UTC [orderer.consensus.etcdraft] apply -> INFO 019 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:34.685 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:34.685 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:35.709 UTC [orderer.consensus.etcdraft] Step -> INFO 01c 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:35.713 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 2 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:35.713 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01e 2 became follower at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:35.713 UTC [orderer.consensus.etcdraft] Step -> INFO 01f 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:35.721 UTC [orderer.consensus.etcdraft] run -> INFO 020 raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:35.727 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 021 Raft leader changed: 0 -> 3" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:53.346 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 022 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 00:24:53.350 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +orderer1.example.com | "2019-09-24 00:24:53.387 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 024 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-09-24 00:24:53.393 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 025 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:53.412 UTC [orderer.commmon.multichannel] newChain -> INFO 026 Created and starting new chain businesschannel" +orderer1.example.com | "2019-09-24 00:24:53.412 UTC [orderer.consensus.etcdraft] Start -> INFO 027 Starting Raft node" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:53.412 UTC [orderer.common.cluster] Configure -> INFO 028 Entering, channel: businesschannel, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +peer0.org1.example.com | "2019-09-24 00:24:49.715 UTC [gossip.discovery] sendMemResponse -> DEBU 1e5 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\010" signature:"0D\002 ~,Q\254\370\225\036_]\205K\023\014]\004\201E\214\253:\217[\205\305D\321\272GA\206\005\267\002 E\355\324\330\276\246 /;\215g\016'\313c\"\321\224\321\016\232\337\245\274\0027\352\307b\247\322N" secret_envelope:W\033\002 ,|\003{u#\026\251\021\013\235\351\233\304\221I\026Q{\0149\257\363\370\213h\332e`,m\313" > > alive: > " +peer0.org1.example.com | "2019-09-24 00:24:49.715 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:49.716 UTC [gossip.comm] sendToEndpoint -> DEBU 1e7 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:51.600 UTC [gossip.pull] Hello -> DEBU 1e8 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:24:51.601 UTC [gossip.comm] Send -> DEBU 1e9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:51.602 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:51.602 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb Exiting" +peer0.org1.example.com | "2019-09-24 00:24:51.605 UTC [gossip.gossip] handleMessage -> DEBU 1ec Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:51.605 UTC [gossip.pull] HandleMessage -> DEBU 1ed GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:51.605 UTC [gossip.gossip] handleMessage -> DEBU 1ee Exiting" +peer0.org1.example.com | "2019-09-24 00:24:51.606 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ef Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:51.606 UTC [msp.identity] Sign -> DEBU 1f0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151009 " +peer0.org1.example.com | "2019-09-24 00:24:51.606 UTC [msp.identity] Sign -> DEBU 1f1 Sign: digest: E9F990DADA4590A7580EC84CEC2264D253DC4BBCEB39ECD573C30D9270EAD568 " +peer0.org1.example.com | "2019-09-24 00:24:51.606 UTC [msp] GetDefaultSigningIdentity -> DEBU 1f2 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:51.606 UTC [msp.identity] Sign -> DEBU 1f3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:51.606 UTC [msp.identity] Sign -> DEBU 1f4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:51.606 UTC [gossip.comm] Send -> DEBU 1f5 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:51.607 UTC [gossip.comm] sendToEndpoint -> DEBU 1f6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:51.607 UTC [gossip.comm] sendToEndpoint -> DEBU 1f7 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:51.628 UTC [gossip.gossip] handleMessage -> DEBU 1f8 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:51.628 UTC [gossip.gossip] handleMessage -> DEBU 1f9 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:51.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:51.629 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fb Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:24:51.629 UTC [msp.identity] Verify -> DEBU 1fc Verify: digest = 00000000 e9 f9 90 da da 45 90 a7 58 0e c8 4c ec 22 64 d2 |.....E..X..L."d.| +peer0.org1.example.com | 00000010 53 dc 4b bc eb 39 ec d5 73 c3 0d 92 70 ea d5 68 |S.K..9..s...p..h|" +peer0.org1.example.com | "2019-09-24 00:24:51.629 UTC [msp.identity] Verify -> DEBU 1fd Verify: sig = 00000000 30 44 02 20 1e 12 f3 75 5b a7 56 8e a3 05 01 81 |0D. ...u[.V.....| +peer0.org1.example.com | 00000010 fd 95 65 4c 8b a1 5d 2f a1 cc ad 9a 82 f4 9a e7 |..eL..]/........| +peer0.org1.example.com | 00000020 8c 85 77 7d 02 20 77 e8 b8 5d d9 62 2b c0 ec 1a |..w}. w..].b+...| +peer0.org1.example.com | 00000030 45 dd bd 02 27 00 c0 d5 a0 68 d0 0e 47 e5 df 6b |E...'....h..G..k| +peer0.org1.example.com | 00000040 d5 c7 97 33 45 82 |...3E.|" +peer0.org1.example.com | "2019-09-24 00:24:51.630 UTC [msp.identity] Verify -> DEBU 1fe Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:24:51.630 UTC [msp.identity] Verify -> DEBU 1ff Verify: sig = 00000000 30 45 02 21 00 f3 cd 8f 14 77 37 27 d7 ca ac e1 |0E.!.....w7'....| +peer0.org1.example.com | 00000010 b8 e6 bb 1d 55 8f 24 ed 12 a0 c3 53 60 47 e5 de |....U.$....S`G..| +peer0.org1.example.com | 00000020 7e 96 a5 2b 81 02 20 22 7e 23 7d f3 68 fa 85 f9 |~..+.. "~#}.h...| +peer0.org1.example.com | 00000030 29 82 a5 e8 8f e7 33 3d 24 82 b5 97 46 46 11 65 |).....3=$...FF.e| +peer0.org1.example.com | 00000040 23 f8 91 c0 f2 aa 90 |#......|" +orderer2.example.com | "2019-09-24 00:24:35.711 UTC [orderer.consensus.etcdraft] poll -> INFO 025 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.711 UTC [orderer.consensus.etcdraft] campaign -> INFO 026 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.711 UTC [orderer.consensus.etcdraft] campaign -> INFO 027 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.716 UTC [orderer.consensus.etcdraft] poll -> INFO 028 3 received MsgVoteResp from 2 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.716 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 029 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.717 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 02a 3 became leader at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.717 UTC [orderer.consensus.etcdraft] run -> INFO 02b raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.720 UTC [orderer.consensus.etcdraft] run -> INFO 02c Leader 3 is present, quit campaign" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.720 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02d Raft leader changed: 0 -> 3" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:35.726 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02e Start accepting requests as Raft leader at block [0]" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:53.156 UTC [orderer.consensus.etcdraft] propose -> INFO 02f Created block [1], there are 0 blocks in flight" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:53.156 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 030 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:53.345 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 031 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 00:24:53.350 UTC [fsblkstorage] newBlockfileMgr -> INFO 032 Getting block information from block storage" +orderer2.example.com | "2019-09-24 00:24:53.446 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 033 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2019-09-24 00:24:53.446 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 034 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.commmon.multichannel] newChain -> INFO 035 Created and starting new chain businesschannel" +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.consensus.etcdraft] Start -> INFO 036 Starting Raft node" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.common.cluster] Configure -> INFO 037 Entering, channel: businesschannel, nodes: [ID: 2, orderer2.example.com | Endpoint: orderer1.example.com:7050, -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 047 Found map[interface{}]interface{} value for operations -peer0.org1.example.com | -----END CERTIFICATE-----" orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -peer0.org1.example.com | "2019-07-20 02:39:31.845 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 -peer0.org1.example.com | "2019-07-20 02:39:31.850 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 04a Found map[string]interface{} value for operations.TLS -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 04b Unmarshal JSON: value is not a string: false -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 04c Found real value for operations.TLS.ClientAuthRequired setting to bool false -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 04d Unmarshal JSON: value is not a string: [] -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | 2019-07-20 02:39:29.409 UTC [viperutil] getKeysRecursively -> DEBU 04e Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | 2019-07-20 02:39:29.409 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value is not a string: false -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | 2019-07-20 02:39:29.409 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for operations.TLS.Enabled setting to bool false -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | 2019-07-20 02:39:29.412 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value is not a string: -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for operations.TLS.Certificate setting to -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for operations.TLS.PrivateKey setting to -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value is not a string: -peer0.org1.example.com | -----END CERTIFICATE-----" orderer2.example.com | -----END CERTIFICATE----- -orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for operations.TLS.RootCAs setting to -peer0.org1.example.com | "2019-07-20 02:39:31.850 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 057 Found map[interface{}]interface{} value for metrics -peer0.org1.example.com | "2019-07-20 02:39:31.850 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 058 Found map[string]interface{} value for metrics.Statsd -peer0.org1.example.com | "2019-07-20 02:39:31.850 UTC [nodeCmd] serve -> INFO 037 Starting peer: orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -peer0.org1.example.com | Version: 1.4.2 orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 -peer0.org1.example.com | Commit SHA: development build orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | 2019-07-20 02:39:29.415 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -peer0.org1.example.com | Go version: go1.12.7 orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | 2019-07-20 02:39:29.416 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for metrics.Statsd.WriteInterval setting to string 30s -peer0.org1.example.com | OS/Arch: linux/amd64 orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | 2019-07-20 02:39:29.416 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value is not a string: -peer0.org1.example.com | Chaincode: orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | 2019-07-20 02:39:29.416 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for metrics.Statsd.Prefix setting to -peer0.org1.example.com | Base Image Version: 0.4.15 orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | 2019-07-20 02:39:29.417 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value -peer0.org1.example.com | Base Docker Namespace: hyperledger orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | 2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for metrics.Statsd.Network setting to string udp -peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | 2019-07-20 02:39:29.417 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value -peer0.org1.example.com | Docker Namespace: hyperledger" orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer0.example.com | 2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for metrics.Provider setting to string prometheus -peer0.org1.example.com | "2019-07-20 02:39:31.851 UTC [msp] GetDefaultSigningIdentity -> DEBU 038 Obtaining default signing identity" orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | 2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 063 Found map[interface{}]interface{} value for consensus -peer0.org1.example.com | "2019-07-20 02:39:31.851 UTC [msp.identity] Sign -> DEBU 039 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 064 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -peer0.org1.example.com | "2019-07-20 02:39:31.851 UTC [msp.identity] Sign -> DEBU 03a Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " orderer2.example.com | -----END CERTIFICATE----- -orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 065 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal -peer0.org1.example.com | "2019-07-20 02:39:31.852 UTC [ledgermgmt] initialize -> INFO 03b Initializing ledger mgmt" -peer0.org1.example.com | "2019-07-20 02:39:31.852 UTC [kvledger] NewProvider -> INFO 03c Initializing ledger provider" +orderer2.example.com | ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-09-24 00:24:53.412 UTC [orderer.common.cluster] updateStubInMapping -> INFO 029 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-09-24 00:24:53.413 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02a Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-09-24 00:24:53.413 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02b Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-09-24 00:24:53.413 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02c Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-09-24 00:24:53.413 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-09-24 00:24:53.413 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02e 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-09-24 00:24:53.413 UTC [orderer.common.cluster] Configure -> INFO 02f Exiting" +orderer1.example.com | "2019-09-24 00:24:53.418 UTC [orderer.consensus.etcdraft] start -> INFO 030 Starting raft node as part of a new channel" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:53.418 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 031 2 became follower at term 0" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:53.418 UTC [orderer.consensus.etcdraft] newRaft -> INFO 032 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:53.420 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 033 2 became follower at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:53.431 UTC [orderer.consensus.etcdraft] apply -> INFO 034 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:53.431 UTC [orderer.consensus.etcdraft] apply -> INFO 035 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:53.432 UTC [orderer.consensus.etcdraft] apply -> INFO 036 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:54.488 UTC [orderer.consensus.etcdraft] Step -> INFO 037 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:54.492 UTC [orderer.consensus.etcdraft] Step -> INFO 038 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:54.492 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 039 2 became follower at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:54.492 UTC [orderer.consensus.etcdraft] Step -> INFO 03a 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:54.500 UTC [orderer.consensus.etcdraft] run -> INFO 03b raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:24:54.502 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 03c Raft leader changed: 0 -> 1" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:25:04.474 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03d Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:25:07.037 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03e Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2 +orderer0.example.com | 2019-09-24 00:24:33.841 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for general +orderer0.example.com | 2019-09-24 00:24:33.857 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.857 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for general.ListenAddress setting to string 0.0.0.0 +orderer0.example.com | 2019-09-24 00:24:33.857 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +orderer0.example.com | 2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 006 Found map[string]interface{} value for general.Profile +orderer0.example.com | 2019-09-24 00:24:33.858 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for general.Profile.Enabled setting to bool false +orderer0.example.com | 2019-09-24 00:24:33.858 UTC [viperutil] unmarshalJSON -> DEBU 009 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 00a Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +orderer0.example.com | 2019-09-24 00:24:33.858 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for general.ListenPort setting to string 7050 +orderer0.example.com | 2019-09-24 00:24:33.858 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for general.GenesisProfile setting to string SampleInsecureSolo +orderer0.example.com | 2019-09-24 00:24:33.859 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.859 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for general.SystemChannel setting to +orderer0.example.com | 2019-09-24 00:24:33.859 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.859 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +orderer0.example.com | 2019-09-24 00:24:33.859 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for general.Authentication +orderer0.example.com | 2019-09-24 00:24:33.859 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.859 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for general.Authentication.TimeWindow setting to string 15m +orderer0.example.com | 2019-09-24 00:24:33.859 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2019-09-24 00:24:33.859 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for general.LedgerType setting to string file +orderer0.example.com | 2019-09-24 00:24:33.860 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.860 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for general.LocalMSPID setting to string OrdererMSP +orderer0.example.com | 2019-09-24 00:24:33.860 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.860 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for general.ConnectionTimeout setting to +orderer0.example.com | 2019-09-24 00:24:33.860 UTC [viperutil] unmarshalJSON -> DEBU 01c Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2019-09-24 00:24:33.860 UTC [viperutil] getKeysRecursively -> DEBU 01d Found real value for general.GenesisMethod setting to string file +orderer0.example.com | 2019-09-24 00:24:33.860 UTC [viperutil] getKeysRecursively -> DEBU 01e Found map[string]interface{} value for general.TLS +orderer0.example.com | 2019-09-24 00:24:33.862 UTC [viperutil] unmarshalJSON -> DEBU 01f Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.864 UTC [viperutil] getKeysRecursively -> DEBU 020 Found real value for general.TLS.ClientRootCAs setting to +orderer0.example.com | 2019-09-24 00:24:33.864 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +orderer0.example.com | 2019-09-24 00:24:33.864 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for general.TLS.Enabled setting to string true +orderer0.example.com | 2019-09-24 00:24:33.865 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.865 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2019-09-24 00:24:33.865 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.865 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2019-09-24 00:24:33.865 UTC [viperutil] unmarshalJSON -> DEBU 027 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.865 UTC [viperutil] getKeysRecursively -> DEBU 028 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2019-09-24 00:24:33.869 UTC [viperutil] unmarshalJSON -> DEBU 029 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 00:24:33.869 UTC [viperutil] getKeysRecursively -> DEBU 02a Found real value for general.TLS.ClientAuthRequired setting to bool false +orderer1.example.com | "2019-09-24 00:25:09.268 UTC [comm.grpc.server] 1 -> INFO 03f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:52324 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=5.0439663s +orderer1.example.com | "2019-09-24 00:26:59.093 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 040 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:27:01.965 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 041 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:27:04.540 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:27:19.439 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 043 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 00:27:19.442 UTC [cauthdsl] deduplicate -> WARN 044 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer1.example.com | "2019-09-24 00:27:19.443 UTC [cauthdsl] deduplicate -> WARN 045 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- orderer2.example.com | ]" -orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -peer0.org1.example.com | "2019-07-20 02:39:31.852 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03d CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] updateStubInMapping -> INFO 038 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" -orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot -peer0.org1.example.com | "2019-07-20 02:39:31.852 UTC [kvledger.util] logDirStatus -> DEBU 03e Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] updateStubInMapping -> INFO 039 Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" -orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 068 Found map[interface{}]interface{} value for general -peer0.org1.example.com | "2019-07-20 02:39:31.852 UTC [kvledger.util] logDirStatus -> DEBU 03f After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03a Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" -orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 069 Unmarshal JSON: value is not a string: -peer0.org1.example.com | "2019-07-20 02:39:31.889 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 040 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03b Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" -orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 06a Found real value for general.ConnectionTimeout setting to -peer0.org1.example.com | "2019-07-20 02:39:31.889 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03c 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 06b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -peer0.org1.example.com | "2019-07-20 02:39:31.889 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03d 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 06c Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block -peer0.org1.example.com | "2019-07-20 02:39:31.889 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] Configure -> INFO 03e Exiting" -orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value -peer0.org1.example.com | "2019-07-20 02:39:31.921 UTC [kvledger.util] CreateDirIfMissing -> DEBU 044 CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/]" -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.consensus.etcdraft] start -> INFO 03f Starting raft node as part of a new channel" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.419 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for general.LocalMSPID setting to string OrdererMSP -peer0.org1.example.com | "2019-07-20 02:39:31.922 UTC [kvledger.util] logDirStatus -> DEBU 045 Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist" -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 040 3 became follower at term 0" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.419 UTC [viperutil] getKeysRecursively -> DEBU 06f Found map[string]interface{} value for general.Authentication -peer0.org1.example.com | "2019-07-20 02:39:31.923 UTC [kvledger.util] logDirStatus -> DEBU 046 After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists" -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.consensus.etcdraft] newRaft -> INFO 041 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.419 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -peer0.org1.example.com | "2019-07-20 02:39:31.983 UTC [kvledger] NewProvider -> INFO 047 ledger provider Initialized" -orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 042 3 became follower at term 1" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.420 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for general.Authentication.TimeWindow setting to string 15m -peer0.org1.example.com | "2019-07-20 02:39:31.984 UTC [confighistory] newDBProvider -> DEBU 048 Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" -orderer2.example.com | "2019-07-20 02:39:39.168 UTC [orderer.consensus.etcdraft] apply -> INFO 043 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.420 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') -peer0.org1.example.com | "2019-07-20 02:39:31.984 UTC [kvledger.util] CreateDirIfMissing -> DEBU 049 CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" -orderer2.example.com | "2019-07-20 02:39:39.173 UTC [orderer.consensus.etcdraft] apply -> INFO 044 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.433 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for general.LedgerType setting to string file -peer0.org1.example.com | "2019-07-20 02:39:31.984 UTC [kvledger.util] logDirStatus -> DEBU 04a Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" -orderer2.example.com | "2019-07-20 02:39:39.173 UTC [orderer.consensus.etcdraft] apply -> INFO 045 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.434 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -peer0.org1.example.com | "2019-07-20 02:39:31.985 UTC [kvledger.util] logDirStatus -> DEBU 04b After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" -orderer2.example.com | "2019-07-20 02:39:40.266 UTC [orderer.consensus.etcdraft] Step -> INFO 046 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp -peer0.org1.example.com | "2019-07-20 02:39:32.009 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" -orderer2.example.com | "2019-07-20 02:39:40.276 UTC [orderer.consensus.etcdraft] Step -> INFO 047 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.435 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string -peer0.org1.example.com | "2019-07-20 02:39:32.009 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" -orderer2.example.com | "2019-07-20 02:39:40.277 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 048 3 became follower at term 2" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for general.ListenPort setting to string 7050 -peer0.org1.example.com | "2019-07-20 02:39:32.010 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" -orderer2.example.com | "2019-07-20 02:39:40.280 UTC [orderer.consensus.etcdraft] Step -> INFO 049 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.435 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') -peer0.org1.example.com | "2019-07-20 02:39:32.035 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" -orderer2.example.com | "2019-07-20 02:39:40.288 UTC [orderer.consensus.etcdraft] run -> INFO 04a raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for general.GenesisMethod setting to string file -peer0.org1.example.com | "2019-07-20 02:39:32.035 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" -orderer2.example.com | "2019-07-20 02:39:40.289 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 04b Raft leader changed: 0 -> 1" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.436 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value is not a string: -peer0.org1.example.com | "2019-07-20 02:39:32.035 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" -orderer2.example.com | "2019-07-20 02:39:43.254 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04c Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.444 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for general.SystemChannel setting to -peer0.org1.example.com | "2019-07-20 02:39:32.055 UTC [kvledger.util] CreateDirIfMissing -> DEBU 052 CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" -orderer2.example.com | "2019-07-20 02:39:45.481 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04d Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.447 UTC [viperutil] getKeysRecursively -> DEBU 07c Found map[string]interface{} value for general.Keepalive -peer0.org1.example.com | "2019-07-20 02:39:32.055 UTC [kvledger.util] logDirStatus -> DEBU 053 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" -orderer2.example.com | "2019-07-20 02:40:22.843 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04e Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3 -orderer0.example.com | 2019-07-20 02:39:29.448 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer2.example.com | "2019-07-20 02:40:26.830 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04f Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3 -peer0.org1.example.com | "2019-07-20 02:39:32.057 UTC [kvledger.util] logDirStatus -> DEBU 054 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" -orderer0.example.com | 2019-07-20 02:39:29.448 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for general.Keepalive.ServerMinInterval setting to string 60s -orderer2.example.com | "2019-07-20 02:40:29.901 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 050 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3 -peer0.org1.example.com | "2019-07-20 02:39:32.080 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 055 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" -orderer0.example.com | 2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 07f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer2.example.com | "2019-07-20 02:40:45.139 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 051 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3 -peer0.org1.example.com | "2019-07-20 02:39:32.080 UTC [kvledger.util] CreateDirIfMissing -> DEBU 056 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" -orderer0.example.com | 2019-07-20 02:39:29.449 UTC [viperutil] getKeysRecursively -> DEBU 080 Found real value for general.Keepalive.ServerInterval setting to string 7200s -orderer2.example.com | "2019-07-20 02:40:45.140 UTC [cauthdsl] deduplicate -> WARN 052 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer0.org1.example.com | "2019-07-20 02:39:32.080 UTC [kvledger.util] logDirStatus -> DEBU 057 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" -orderer0.example.com | 2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -orderer2.example.com | "2019-07-20 02:40:45.140 UTC [cauthdsl] deduplicate -> WARN 053 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer0.org1.example.com | "2019-07-20 02:39:32.081 UTC [kvledger.util] logDirStatus -> DEBU 058 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" -orderer0.example.com | 2019-07-20 02:39:29.449 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for general.Keepalive.ServerTimeout setting to string 20s -peer0.org1.example.com | "2019-07-20 02:39:32.093 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 059 Recovering under construction ledger" -orderer0.example.com | 2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -orderer0.example.com | 2019-07-20 02:39:29.450 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for general.GenesisProfile setting to string SampleInsecureSolo -peer0.org1.example.com | "2019-07-20 02:39:32.093 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 05a No under construction ledger found. Quitting recovery" -orderer0.example.com | 2019-07-20 02:39:29.457 UTC [viperutil] getKeysRecursively -> DEBU 085 Found map[string]interface{} value for general.TLS -peer0.org1.example.com | "2019-07-20 02:39:32.093 UTC [ledgermgmt] initialize -> INFO 05b ledger mgmt initialized" -orderer0.example.com | 2019-07-20 02:39:29.458 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -peer0.org1.example.com | "2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05c Auto-detected peer address: 172.18.0.5:7051" -orderer0.example.com | 2019-07-20 02:39:29.459 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] -peer0.org1.example.com | "2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05d Returning peer0.org1.example.com:7051" -orderer0.example.com | 2019-07-20 02:39:29.460 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value is not a string: false -peer0.org1.example.com | "2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05e Auto-detected peer address: 172.18.0.5:7051" -orderer0.example.com | 2019-07-20 02:39:29.461 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for general.TLS.ClientAuthRequired setting to bool false -peer0.org1.example.com | "2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05f Returning peer0.org1.example.com:7051" -orderer0.example.com | 2019-07-20 02:39:29.461 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value is not a string: -orderer0.example.com | 2019-07-20 02:39:29.462 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for general.TLS.ClientRootCAs setting to -peer0.org1.example.com | "2019-07-20 02:39:32.117 UTC [nodeCmd] serve -> INFO 060 Starting peer with TLS enabled" -orderer0.example.com | 2019-07-20 02:39:29.463 UTC [viperutil] unmarshalJSON -> DEBU 08c Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string -peer0.org1.example.com | "2019-07-20 02:39:32.175 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 061 Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" -orderer0.example.com | 2019-07-20 02:39:29.463 UTC [viperutil] getKeysRecursively -> DEBU 08d Found real value for general.TLS.Enabled setting to string true -peer0.org1.example.com | "2019-07-20 02:39:32.175 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 062 Exit with ccEndpoint: peer0.org1.example.com:7052" -orderer0.example.com | 2019-07-20 02:39:29.463 UTC [viperutil] unmarshalJSON -> DEBU 08e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -peer0.org1.example.com | "2019-07-20 02:39:32.200 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: lscc-1.4.2" -orderer0.example.com | 2019-07-20 02:39:29.464 UTC [viperutil] getKeysRecursively -> DEBU 08f Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key -peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 064 system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" -orderer0.example.com | 2019-07-20 02:39:29.464 UTC [viperutil] unmarshalJSON -> DEBU 090 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [inproccontroller] Register -> DEBU 065 Registering chaincode instance: cscc-1.4.2" -orderer0.example.com | 2019-07-20 02:39:29.464 UTC [viperutil] getKeysRecursively -> DEBU 091 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt -peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 066 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" -orderer0.example.com | 2019-07-20 02:39:29.465 UTC [viperutil] getKeysRecursively -> DEBU 092 Found map[string]interface{} value for general.BCCSP -peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [inproccontroller] Register -> DEBU 067 Registering chaincode instance: qscc-1.4.2" -orderer0.example.com | 2019-07-20 02:39:29.465 UTC [viperutil] getKeysRecursively -> DEBU 093 Found map[string]interface{} value for general.BCCSP.SW -peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 068 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" -peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 069 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" -orderer0.example.com | 2019-07-20 02:39:29.466 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [nodeCmd] serve -> DEBU 06a Running peer" -orderer0.example.com | 2019-07-20 02:39:29.466 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for general.BCCSP.SW.Hash setting to string SHA2 -peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [msp] GetDefaultSigningIdentity -> DEBU 06b Obtaining default signing identity" -orderer0.example.com | 2019-07-20 02:39:29.466 UTC [viperutil] unmarshalJSON -> DEBU 096 Unmarshal JSON: value is not a string: 256 -peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[string]interface{} value for peer.handlers" -orderer0.example.com | 2019-07-20 02:39:29.466 UTC [viperutil] getKeysRecursively -> DEBU 097 Found real value for general.BCCSP.SW.Security setting to int 256 -peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06d Found map[string]interface{} value for peer.handlers.validators" -orderer0.example.com | 2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 098 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore -peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06e Found map[string]interface{} value for peer.handlers.validators.vscc" -orderer0.example.com | 2019-07-20 02:39:29.467 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value is not a string: -peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" -orderer0.example.com | 2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to -peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" -orderer0.example.com | 2019-07-20 02:39:29.467 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value is not a string: " -orderer0.example.com | 2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for general.BCCSP.Default setting to string SW -peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for peer.handlers.validators.vscc.library setting to " -orderer0.example.com | 2019-07-20 02:39:29.468 UTC [viperutil] getKeysRecursively -> DEBU 09d Found map[string]interface{} value for general.Cluster -peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" -orderer0.example.com | 2019-07-20 02:39:29.470 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value is not a string: -peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" -orderer0.example.com | 2019-07-20 02:39:29.471 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for general.Cluster.ListenPort setting to -peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" -orderer0.example.com | 2019-07-20 02:39:29.472 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer0.example.com | 2019-07-20 02:39:29.472 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key -peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" -orderer0.example.com | 2019-07-20 02:39:29.473 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: -peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 077 Found map[string]interface{} value for peer.handlers.endorsers" -orderer0.example.com | 2019-07-20 02:39:29.474 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for general.Cluster.DialTimeout setting to -peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 078 Found map[string]interface{} value for peer.handlers.endorsers.escc" -orderer0.example.com | 2019-07-20 02:39:29.474 UTC [viperutil] unmarshalJSON -> DEBU 0a4 Unmarshal JSON: value is not a string: -peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 079 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" -orderer0.example.com | 2019-07-20 02:39:29.475 UTC [viperutil] getKeysRecursively -> DEBU 0a5 Found real value for general.Cluster.ReplicationRetryTimeout setting to -peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 07a Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" -orderer0.example.com | 2019-07-20 02:39:29.476 UTC [viperutil] unmarshalJSON -> DEBU 0a6 Unmarshal JSON: value is not a string: -peer0.org1.example.com | "2019-07-20 02:39:32.204 UTC [viperutil] unmarshalJSON -> DEBU 07b Unmarshal JSON: value is not a string: " -orderer0.example.com | 2019-07-20 02:39:29.476 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found real value for general.Cluster.ListenAddress setting to -peer0.org1.example.com | "2019-07-20 02:39:32.204 UTC [viperutil] getKeysRecursively -> DEBU 07c Found real value for peer.handlers.endorsers.escc.library setting to " -orderer0.example.com | 2019-07-20 02:39:29.477 UTC [viperutil] unmarshalJSON -> DEBU 0a8 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -peer0.org1.example.com | "2019-07-20 02:39:32.204 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 07d map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" -orderer0.example.com | 2019-07-20 02:39:29.477 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] -peer0.org1.example.com | "2019-07-20 02:39:32.218 UTC [gossip.service] func1 -> INFO 07e Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" -orderer0.example.com | 2019-07-20 02:39:29.477 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value is not a string: -peer0.org1.example.com | "2019-07-20 02:39:32.257 UTC [msp] DeserializeIdentity -> DEBU 07f Obtaining identity" -orderer0.example.com | 2019-07-20 02:39:29.478 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for general.Cluster.ReplicationBufferSize setting to -peer0.org1.example.com | "2019-07-20 02:39:32.258 UTC [msp.identity] newIdentity -> DEBU 080 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | 2019-07-20 02:39:29.479 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value is not a string: -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -orderer0.example.com | 2019-07-20 02:39:29.480 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for general.Cluster.ReplicationPullTimeout setting to -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | 2019-07-20 02:39:29.480 UTC [viperutil] unmarshalJSON -> DEBU 0ae Unmarshal JSON: value is not a string: -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer0.example.com | 2019-07-20 02:39:29.482 UTC [viperutil] getKeysRecursively -> DEBU 0af Found real value for general.Cluster.ServerPrivateKey setting to -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | 2019-07-20 02:39:29.482 UTC [viperutil] unmarshalJSON -> DEBU 0b0 Unmarshal JSON: value is not a string: -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | 2019-07-20 02:39:29.483 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found real value for general.Cluster.ReplicationMaxRetries setting to -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -orderer0.example.com | 2019-07-20 02:39:29.483 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -orderer0.example.com | 2019-07-20 02:39:29.485 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -orderer0.example.com | 2019-07-20 02:39:29.485 UTC [viperutil] unmarshalJSON -> DEBU 0b4 Unmarshal JSON: value is not a string: -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -orderer0.example.com | 2019-07-20 02:39:29.486 UTC [viperutil] getKeysRecursively -> DEBU 0b5 Found real value for general.Cluster.CertExpirationWarningThreshold setting to -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0b6 Unmarshal JSON: value is not a string: -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found real value for general.Cluster.ServerCertificate setting to -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0b8 Unmarshal JSON: value is not a string: 10 -peer0.org1.example.com | -----END CERTIFICATE-----" -orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found real value for general.Cluster.SendBufferSize setting to int 10 -peer0.org1.example.com | "2019-07-20 02:39:32.258 UTC [msp] Validate -> DEBU 081 MSP Org1MSP validating identity" -orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0ba Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0bb Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [gossip.gossip] NewGossipService -> INFO 082 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " -orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0bc Unmarshal JSON: value is not a string: -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [msp] GetDefaultSigningIdentity -> DEBU 083 Obtaining default signing identity" -orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0bd Found real value for general.Cluster.RPCTimeout setting to -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [msp.identity] Sign -> DEBU 084 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " -orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0be Found map[string]interface{} value for general.Profile -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [msp.identity] Sign -> DEBU 085 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " -orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0bf Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [gossip.pull] Add -> DEBU 086 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [chaincode] LaunchConfig -> DEBU 087 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c0 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 088 start container: lscc:1.4.2" -orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0c1 Unmarshal JSON: value is not a string: false -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 089 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c2 Found real value for general.Profile.Enabled setting to bool false -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 08a start container with env: -orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0c3 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info -orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found real value for general.ListenAddress setting to string 0.0.0.0 -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} -peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.2 -peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true -peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key -peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt -peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [container] lockContainer -> DEBU 08b waiting for container(lscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [container] lockContainer -> DEBU 08c got container (lscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [inproccontroller] getInstance -> DEBU 08d chaincode instance created for lscc-1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [container] unlockContainer -> DEBU 08e container lock deleted(lscc-1.4.2)" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [container] lockContainer -> DEBU 08f waiting for container(lscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [container] lockContainer -> DEBU 090 got container (lscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [container] unlockContainer -> DEBU 091 container lock deleted(lscc-1.4.2)" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [gossip.discovery] periodicalSendAlive -> DEBU 092 Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 093 Sleeping 25s" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [gossip.gossip] start -> INFO 094 Gossip instance peer0.org1.example.com:7051 started" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [gossip.discovery] Connect -> DEBU 095 Skipping connecting to myself" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [inproccontroller] func2 -> DEBU 096 chaincode-support started for lscc-1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [gossip.gossip] syncDiscovery -> DEBU 097 Entering discovery sync with interval 4s" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 098 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [msp.identity] Sign -> DEBU 099 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [msp.identity] Sign -> DEBU 09a Sign: digest: 7E3C77047CA93B8C7F731924D75623F5C661C7730339FC5CC4407511CEC80F44 " -peer0.org1.example.com | "2019-07-20 02:39:32.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 09b Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:32.261 UTC [msp.identity] Sign -> DEBU 09c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:32.261 UTC [msp.identity] Sign -> DEBU 09d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:32.261 UTC [inproccontroller] func1 -> DEBU 09e chaincode started for lscc-1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.261 UTC [chaincode] handleMessage -> DEBU 09f [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -peer0.org1.example.com | "2019-07-20 02:39:32.264 UTC [chaincode] HandleRegister -> DEBU 0a0 Received REGISTER in state created" -peer0.org1.example.com | "2019-07-20 02:39:32.264 UTC [chaincode] Register -> DEBU 0a1 registered handler complete for chaincode lscc:1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.264 UTC [chaincode] HandleRegister -> DEBU 0a2 Got REGISTER for chaincodeID = name:"lscc:1.4.2" , sending back REGISTERED" -peer0.org1.example.com | "2019-07-20 02:39:32.265 UTC [chaincode] HandleRegister -> DEBU 0a3 Changed state to established for name:"lscc:1.4.2" " -peer0.org1.example.com | "2019-07-20 02:39:32.265 UTC [chaincode] sendReady -> DEBU 0a4 sending READY for chaincode name:"lscc:1.4.2" " -peer0.org1.example.com | "2019-07-20 02:39:32.265 UTC [chaincode] sendReady -> DEBU 0a5 Changed to state ready for chaincode name:"lscc:1.4.2" " -peer0.org1.example.com | "2019-07-20 02:39:32.266 UTC [chaincode] Launch -> DEBU 0a6 launch complete" -peer0.org1.example.com | "2019-07-20 02:39:32.266 UTC [chaincode] Execute -> DEBU 0a7 Entry" -peer0.org1.example.com | "2019-07-20 02:39:32.266 UTC [chaincode] handleMessage -> DEBU 0a8 [dbe52f5c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:39:32.266 UTC [chaincode] Notify -> DEBU 0a9 [dbe52f5c] notifying Txid:dbe52f5c-537d-44e1-816c-4dfa64df5df7, channelID:" -peer0.org1.example.com | "2019-07-20 02:39:32.266 UTC [chaincode] Execute -> DEBU 0aa Exit" -peer0.org1.example.com | "2019-07-20 02:39:32.267 UTC [sccapi] deploySysCC -> INFO 0ab system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [chaincode] LaunchConfig -> DEBU 0ac launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0ad start container: cscc:1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0ae start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0af start container with env: -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} -peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.2 -peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true -peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key -peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt -peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [container] lockContainer -> DEBU 0b0 waiting for container(cscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [container] lockContainer -> DEBU 0b1 got container (cscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.269 UTC [inproccontroller] getInstance -> DEBU 0b2 chaincode instance created for cscc-1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.269 UTC [container] unlockContainer -> DEBU 0b3 container lock deleted(cscc-1.4.2)" -peer0.org1.example.com | "2019-07-20 02:39:32.269 UTC [container] lockContainer -> DEBU 0b4 waiting for container(cscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [container] lockContainer -> DEBU 0b5 got container (cscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [container] unlockContainer -> DEBU 0b6 container lock deleted(cscc-1.4.2)" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [inproccontroller] func2 -> DEBU 0b7 chaincode-support started for cscc-1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [inproccontroller] func1 -> DEBU 0b8 chaincode started for cscc-1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] handleMessage -> DEBU 0b9 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0ba Received REGISTER in state created" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] Register -> DEBU 0bb registered handler complete for chaincode cscc:1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0bc Got REGISTER for chaincodeID = name:"cscc:1.4.2" , sending back REGISTERED" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0bd Changed state to established for name:"cscc:1.4.2" " -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] sendReady -> DEBU 0be sending READY for chaincode name:"cscc:1.4.2" " -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] sendReady -> DEBU 0bf Changed to state ready for chaincode name:"cscc:1.4.2" " -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] Launch -> DEBU 0c0 launch complete" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] Execute -> DEBU 0c1 Entry" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [cscc] Init -> INFO 0c2 Init CSCC" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] handleMessage -> DEBU 0c3 [dd4774bb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] Notify -> DEBU 0c4 [dd4774bb] notifying Txid:dd4774bb-4464-4743-9294-61e3823b8baa, channelID:" -peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] Execute -> DEBU 0c5 Exit" -peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [sccapi] deploySysCC -> INFO 0c6 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [chaincode] LaunchConfig -> DEBU 0c7 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0c8 start container: qscc:1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0c9 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0ca start container with env: -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} -peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.2 -peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true -peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key -peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt -peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [container] lockContainer -> DEBU 0cb waiting for container(qscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.272 UTC [container] lockContainer -> DEBU 0cc got container (qscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [inproccontroller] getInstance -> DEBU 0cd chaincode instance created for qscc-1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [container] unlockContainer -> DEBU 0ce container lock deleted(qscc-1.4.2)" -peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [container] lockContainer -> DEBU 0cf waiting for container(qscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [container] lockContainer -> DEBU 0d0 got container (qscc-1.4.2) lock" -peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [container] unlockContainer -> DEBU 0d1 container lock deleted(qscc-1.4.2)" -peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [inproccontroller] func2 -> DEBU 0d2 chaincode-support started for qscc-1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [inproccontroller] func1 -> DEBU 0d3 chaincode started for qscc-1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [chaincode] handleMessage -> DEBU 0d4 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [chaincode] HandleRegister -> DEBU 0d5 Received REGISTER in state created" -peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [chaincode] Register -> DEBU 0d6 registered handler complete for chaincode qscc:1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:32.275 UTC [chaincode] HandleRegister -> DEBU 0d7 Got REGISTER for chaincodeID = name:"qscc:1.4.2" , sending back REGISTERED" -peer0.org1.example.com | "2019-07-20 02:39:32.275 UTC [chaincode] HandleRegister -> DEBU 0d8 Changed state to established for name:"qscc:1.4.2" " -peer0.org1.example.com | "2019-07-20 02:39:32.275 UTC [chaincode] sendReady -> DEBU 0d9 sending READY for chaincode name:"qscc:1.4.2" " -peer0.org1.example.com | "2019-07-20 02:39:32.275 UTC [chaincode] sendReady -> DEBU 0da Changed to state ready for chaincode name:"qscc:1.4.2" " -peer0.org1.example.com | "2019-07-20 02:39:32.276 UTC [chaincode] Launch -> DEBU 0db launch complete" -peer0.org1.example.com | "2019-07-20 02:39:32.276 UTC [chaincode] Execute -> DEBU 0dc Entry" -peer0.org1.example.com | "2019-07-20 02:39:32.278 UTC [qscc] Init -> INFO 0dd Init QSCC" -peer0.org1.example.com | "2019-07-20 02:39:32.280 UTC [chaincode] handleMessage -> DEBU 0de [e80edd21] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:39:32.282 UTC [chaincode] Notify -> DEBU 0df [e80edd21] notifying Txid:e80edd21-ca6d-4ff6-8876-1ec3a73be04a, channelID:" -peer0.org1.example.com | "2019-07-20 02:39:32.282 UTC [chaincode] Execute -> DEBU 0e0 Exit" -peer0.org1.example.com | "2019-07-20 02:39:32.282 UTC [sccapi] deploySysCC -> INFO 0e1 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer0.org1.example.com | "2019-07-20 02:39:32.285 UTC [sccapi] deploySysCC -> INFO 0e2 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" -peer0.org1.example.com | "2019-07-20 02:39:32.285 UTC [nodeCmd] serve -> INFO 0e3 Deployed system chaincodes" -peer0.org1.example.com | "2019-07-20 02:39:32.285 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0e4 Returning []" -peer0.org1.example.com | "2019-07-20 02:39:32.287 UTC [discovery] NewService -> INFO 0e5 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" -peer0.org1.example.com | "2019-07-20 02:39:32.288 UTC [nodeCmd] registerDiscoveryService -> INFO 0e6 Discovery service activated" -peer0.org1.example.com | "2019-07-20 02:39:32.289 UTC [nodeCmd] serve -> INFO 0e7 Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" -peer0.org1.example.com | "2019-07-20 02:39:32.289 UTC [nodeCmd] serve -> INFO 0e8 Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" -peer0.org1.example.com | "2019-07-20 02:39:32.297 UTC [kvledger] LoadPreResetHeight -> INFO 0e9 Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" -peer0.org1.example.com | "2019-07-20 02:39:32.298 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ea Loading Pre-reset heights" -peer0.org1.example.com | "2019-07-20 02:39:32.299 UTC [fsblkstorage] preRestHtFiles -> INFO 0eb Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" -peer0.org1.example.com | "2019-07-20 02:39:32.299 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ec Pre-reset heights loaded" -peer0.org1.example.com | "2019-07-20 02:39:32.402 UTC [comm.grpc.server] 1 -> INFO 0ed unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:34.398Z grpc.peer_address=172.18.0.6:33926 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.5235ms -peer0.org1.example.com | "2019-07-20 02:39:32.408 UTC [msp] GetDefaultSigningIdentity -> DEBU 0ee Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:32.409 UTC [msp.identity] Sign -> DEBU 0ef Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:32.409 UTC [msp.identity] Sign -> DEBU 0f0 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:32.411 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f1 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33926" -peer0.org1.example.com | "2019-07-20 02:39:32.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f2 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33926" -peer0.org1.example.com | "2019-07-20 02:39:32.413 UTC [msp] DeserializeIdentity -> DEBU 0f3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:32.414 UTC [msp.identity] newIdentity -> DEBU 0f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:32.416 UTC [msp] Validate -> DEBU 0f5 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:32.419 UTC [msp.identity] Verify -> DEBU 0f6 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-07-20 02:39:32.420 UTC [msp.identity] Verify -> DEBU 0f7 Verify: sig = 00000000 30 44 02 20 62 50 27 ef fd ff 99 f3 fa 9f fb 25 |0D. bP'........%| -peer0.org1.example.com | 00000010 a5 b6 dd 69 14 43 54 dd 2a 89 a8 f7 84 a5 5b 13 |...i.CT.*.....[.| -peer0.org1.example.com | 00000020 cf 71 2b e4 02 20 4f fc b5 89 f4 24 86 29 6b 28 |.q+.. O....$.)k(| -peer0.org1.example.com | 00000030 3a 35 21 ab 22 9e b5 b1 74 3d 09 a4 e6 f7 fc f5 |:5!."...t=......| -peer0.org1.example.com | 00000040 6f 49 7a 82 89 a8 |oIz...|" -peer0.org1.example.com | "2019-07-20 02:39:32.421 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f8 Authenticated 172.18.0.6:33926" -peer0.org1.example.com | "2019-07-20 02:39:32.422 UTC [gossip.comm] GossipStream -> DEBU 0f9 Servicing 172.18.0.6:33926" -peer0.org1.example.com | "2019-07-20 02:39:32.430 UTC [grpc] infof -> DEBU 0fa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:32.430 UTC [gossip.comm] readFromStream -> DEBU 0fb Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:39:32.431 UTC [gossip.comm] func2 -> DEBU 0fc Client 172.18.0.6:33926 disconnected" -peer0.org1.example.com | "2019-07-20 02:39:32.431 UTC [comm.grpc.server] 1 -> INFO 0fd streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:42.407Z grpc.peer_address=172.18.0.6:33926 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.192ms -peer0.org1.example.com | "2019-07-20 02:39:32.431 UTC [gossip.comm] writeToStream -> DEBU 0fe Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:32.454 UTC [comm.grpc.server] 1 -> INFO 0ff unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:34.454Z grpc.peer_address=172.18.0.6:33928 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=197.1µs -peer0.org1.example.com | "2019-07-20 02:39:32.459 UTC [msp] GetDefaultSigningIdentity -> DEBU 100 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:32.459 UTC [msp.identity] Sign -> DEBU 101 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0c5 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress: ListenPort: RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate: ServerPrivateKey:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] -orderer0.example.com | 2019-07-20 02:39:29.489 UTC [localconfig] completeInitialization -> INFO 0c6 Kafka.Version unset, setting to 0.10.2.0 -orderer0.example.com | "2019-07-20 02:39:29.495 UTC [bccsp_sw] openKeyStore -> DEBU 0c7 KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" -orderer0.example.com | "2019-07-20 02:39:29.496 UTC [bccsp] initBCCSP -> DEBU 0c8 Initialize BCCSP [SW]" -orderer0.example.com | "2019-07-20 02:39:29.496 UTC [msp] getPemMaterialFromDir -> DEBU 0c9 Reading directory /var/hyperledger/orderer/msp/signcerts" -orderer0.example.com | "2019-07-20 02:39:29.504 UTC [msp] getPemMaterialFromDir -> DEBU 0ca Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" -orderer0.example.com | "2019-07-20 02:39:29.508 UTC [msp] getPemMaterialFromDir -> DEBU 0cb Reading directory /var/hyperledger/orderer/msp/cacerts" -orderer0.example.com | "2019-07-20 02:39:29.514 UTC [msp] getPemMaterialFromDir -> DEBU 0cc Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" -orderer0.example.com | "2019-07-20 02:39:29.519 UTC [msp] getPemMaterialFromDir -> DEBU 0cd Reading directory /var/hyperledger/orderer/msp/admincerts" -orderer0.example.com | "2019-07-20 02:39:29.544 UTC [msp] getPemMaterialFromDir -> DEBU 0ce Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" -orderer0.example.com | "2019-07-20 02:39:29.565 UTC [msp] getPemMaterialFromDir -> DEBU 0cf Reading directory /var/hyperledger/orderer/msp/intermediatecerts" -orderer0.example.com | "2019-07-20 02:39:29.567 UTC [msp] getMspConfig -> DEBU 0d0 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" -orderer0.example.com | "2019-07-20 02:39:29.567 UTC [msp] getPemMaterialFromDir -> DEBU 0d1 Reading directory /var/hyperledger/orderer/msp/tlscacerts" -orderer0.example.com | "2019-07-20 02:39:29.578 UTC [msp] getPemMaterialFromDir -> DEBU 0d2 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" -orderer0.example.com | "2019-07-20 02:39:29.587 UTC [msp] getPemMaterialFromDir -> DEBU 0d3 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" -orderer0.example.com | "2019-07-20 02:39:29.589 UTC [msp] getMspConfig -> DEBU 0d4 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" -orderer0.example.com | "2019-07-20 02:39:29.589 UTC [msp] getPemMaterialFromDir -> DEBU 0d5 Reading directory /var/hyperledger/orderer/msp/crls" -orderer0.example.com | "2019-07-20 02:39:29.590 UTC [msp] getMspConfig -> DEBU 0d6 crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" -orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp] getMspConfig -> DEBU 0d7 MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" -orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp] newBccspMsp -> DEBU 0d8 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp] New -> DEBU 0d9 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp] loadLocaMSP -> DEBU 0da Created new local MSP" -orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp] Setup -> DEBU 0db Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp.identity] newIdentity -> DEBU 0dc Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.611 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -orderer0.example.com | QQ== -orderer0.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:32.460 UTC [msp.identity] Sign -> DEBU 102 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:32.460 UTC [gossip.comm] authenticateRemotePeer -> DEBU 103 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:33928" -peer0.org1.example.com | "2019-07-20 02:39:32.461 UTC [gossip.comm] authenticateRemotePeer -> DEBU 104 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33928" -peer0.org1.example.com | "2019-07-20 02:39:32.462 UTC [msp.identity] Verify -> DEBU 105 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-07-20 02:39:32.462 UTC [msp.identity] Verify -> DEBU 106 Verify: sig = 00000000 30 45 02 21 00 85 eb 32 2b fe ea 70 97 13 df 66 |0E.!...2+..p...f| -peer0.org1.example.com | 00000010 e9 5c c6 70 13 8f 58 3f 4f 20 49 5a e1 e0 e1 ee |.\.p..X?O IZ....| -peer0.org1.example.com | 00000020 a7 8f cf 97 9f 02 20 4f ba b9 6e f9 d5 5f 68 74 |...... O..n.._ht| -peer0.org1.example.com | 00000030 7e cb 7c 45 6e 42 34 68 ad c6 02 40 62 d9 26 fc |~.|EnB4h...@b.&.| -peer0.org1.example.com | 00000040 b6 09 5f 11 9d 76 7b |.._..v{|" -peer0.org1.example.com | "2019-07-20 02:39:32.462 UTC [gossip.comm] authenticateRemotePeer -> DEBU 107 Authenticated 172.18.0.6:33928" -peer0.org1.example.com | "2019-07-20 02:39:32.462 UTC [gossip.comm] GossipStream -> DEBU 108 Servicing 172.18.0.6:33928" -peer0.org1.example.com | "2019-07-20 02:39:32.472 UTC [gossip.gossip] handleMessage -> DEBU 109 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:3143746311377972350 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > > , Envelope: 1107 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:32.472 UTC [gossip.gossip] handleMessage -> DEBU 10a Exiting" -peer0.org1.example.com | "2019-07-20 02:39:32.473 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10b Got message: GossipMessage: nonce:3143746311377972350 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > > , Envelope: 1107 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:32.477 UTC [msp.identity] Verify -> DEBU 10c Verify: digest = 00000000 36 0d 2b a0 4d e4 ea 95 4f ef f9 af c3 09 b0 27 |6.+.M...O......'| -peer0.org1.example.com | 00000010 b8 80 33 7f 2b 77 a6 c9 a2 75 9a f0 4e fc 58 d7 |..3.+w...u..N.X.|" -peer0.org1.example.com | "2019-07-20 02:39:32.477 UTC [msp.identity] Verify -> DEBU 10d Verify: sig = 00000000 30 44 02 20 25 dd d1 a7 26 c2 43 34 f9 e9 31 43 |0D. %...&.C4..1C| -peer0.org1.example.com | 00000010 4f 3b eb 07 56 1b 0a 3f 54 e2 5c 23 68 4d 40 9c |O;..V..?T.\#hM@.| -peer0.org1.example.com | 00000020 41 1a 2d 55 02 20 37 4c b4 f5 a0 c2 d7 29 1f 75 |A.-U. 7L.....).u| -peer0.org1.example.com | 00000030 0c 56 24 ca a0 d1 b4 fe 97 3e 81 41 d5 c0 75 e5 |.V$......>.A..u.| -peer0.org1.example.com | 00000040 f7 38 75 74 19 67 |.8ut.g|" -orderer0.example.com | "2019-07-20 02:39:29.624 UTC [bccsp_sw] loadPrivateKey -> DEBU 0df Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." -orderer0.example.com | "2019-07-20 02:39:29.630 UTC [msp.identity] newIdentity -> DEBU 0e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -orderer0.example.com | QQ== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.631 UTC [msp] setupSigningIdentity -> DEBU 0e1 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" -orderer0.example.com | "2019-07-20 02:39:29.632 UTC [msp] Validate -> DEBU 0e2 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.633 UTC [orderer.common.server] prettyPrintStruct -> INFO 0e3 Orderer config values: -orderer0.example.com | General.LedgerType = "file" -orderer0.example.com | General.ListenAddress = "0.0.0.0" -orderer0.example.com | General.ListenPort = 7050 -orderer0.example.com | General.TLS.Enabled = true -orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" -orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" -orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] -orderer0.example.com | General.TLS.ClientAuthRequired = false -orderer0.example.com | General.TLS.ClientRootCAs = [] -orderer0.example.com | General.Cluster.ListenAddress = "" -orderer0.example.com | General.Cluster.ListenPort = 0 -orderer0.example.com | General.Cluster.ServerCertificate = "" -orderer0.example.com | General.Cluster.ServerPrivateKey = "" -orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" -orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" -orderer0.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] -orderer0.example.com | General.Cluster.DialTimeout = 5s -orderer0.example.com | General.Cluster.RPCTimeout = 7s -orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 -orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s -orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s -orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s -orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 -orderer0.example.com | General.Cluster.SendBufferSize = 10 -orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s -orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s -orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s -orderer0.example.com | General.Keepalive.ServerTimeout = 20s -orderer0.example.com | General.ConnectionTimeout = 0s -orderer0.example.com | General.GenesisMethod = "file" -orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" -orderer0.example.com | General.SystemChannel = "test-system-channel-name" -orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" -orderer0.example.com | General.Profile.Enabled = false -orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" -orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" -orderer0.example.com | General.LocalMSPID = "OrdererMSP" -orderer0.example.com | General.BCCSP.ProviderName = "SW" -orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 -orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" -orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false -orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" -orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = -orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = -orderer0.example.com | General.BCCSP.PluginOpts = -orderer0.example.com | General.Authentication.TimeWindow = 15m0s -orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" -orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" -orderer0.example.com | RAMLedger.HistorySize = 1000 -orderer0.example.com | Kafka.Retry.ShortInterval = 5s -orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s -orderer0.example.com | Kafka.Retry.LongInterval = 5m0s -orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s -orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s -orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s -orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s -orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 -orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms -orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 -orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms -orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s -orderer0.example.com | Kafka.Verbose = false -orderer0.example.com | Kafka.Version = 0.10.2.0 -orderer0.example.com | Kafka.TLS.Enabled = false -orderer0.example.com | Kafka.TLS.PrivateKey = "" -peer0.org1.example.com | "2019-07-20 02:39:32.482 UTC [msp.identity] Verify -> DEBU 10e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:39:32.482 UTC [msp.identity] Verify -> DEBU 10f Verify: sig = 00000000 30 44 02 20 34 36 e8 01 7a 14 85 df a0 47 d9 b9 |0D. 46..z....G..| -peer0.org1.example.com | 00000010 2e 59 03 c5 a1 0a 2c 4c b5 0f f1 1b ca 87 d9 8e |.Y....,L........| -peer0.org1.example.com | 00000020 79 0b c5 47 02 20 3c 8e 2d e4 2f 26 7c 34 f6 8a |y..G. <.-./&|4..| -peer0.org1.example.com | 00000030 0d f0 9e ca d7 64 cd cb f6 6e c3 e5 da df b4 6b |.....d...n.....k| -peer0.org1.example.com | 00000040 e2 10 6f b9 5e 1c |..o.^.|" -peer0.org1.example.com | "2019-07-20 02:39:32.488 UTC [gossip.discovery] handleAliveMessage -> DEBU 110 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:32.489 UTC [gossip.discovery] learnNewMembers -> DEBU 111 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]}" -peer0.org1.example.com | "2019-07-20 02:39:32.489 UTC [gossip.discovery] learnNewMembers -> DEBU 112 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [gossip.discovery] learnNewMembers -> DEBU 113 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [gossip.discovery] handleAliveMessage -> DEBU 114 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [gossip.discovery] sendMemResponse -> DEBU 115 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU 116 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [msp] GetDefaultSigningIdentity -> DEBU 117 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 118 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 119 Sign: digest: EEDAC9CD7ACBCFE46971DB564C2E5AA365F0897976382B04176023690F93A5FB " -peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [msp] GetDefaultSigningIdentity -> DEBU 11a Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 11b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:32.492 UTC [msp.identity] Sign -> DEBU 11c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:32.492 UTC [gossip.comm] Send -> DEBU 11d Entering, sending GossipMessage: Channel: , nonce: 3143746311377972350, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:32.492 UTC [gossip.discovery] sendMemResponse -> DEBU 11e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > alive:>R\277\2201\255\033\r\002 \005D\200h\362\266?i\207\217q\025\313\330ZC\267\352kq\311\211\343\2617\235\025\000\344\226\210\\" > > " -peer0.org1.example.com | "2019-07-20 02:39:32.492 UTC [gossip.comm] sendToEndpoint -> DEBU 11f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3143746311377972350, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:32.493 UTC [gossip.comm] sendToEndpoint -> DEBU 120 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 121 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:36.263 UTC [msp.identity] Sign -> DEBU 123 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:39:36.263 UTC [msp.identity] Sign -> DEBU 124 Sign: digest: 211019455ECE33402BE8AD1B57D6700DECF3ACD4ED804612AC12B9E9313E91EB " -peer0.org1.example.com | "2019-07-20 02:39:36.263 UTC [gossip.pull] Hello -> DEBU 122 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:36.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 125 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:36.266 UTC [gossip.comm] Send -> DEBU 126 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:36.266 UTC [gossip.comm] sendToEndpoint -> DEBU 127 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.266 UTC [gossip.comm] sendToEndpoint -> DEBU 128 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.267 UTC [msp.identity] Sign -> DEBU 129 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:36.268 UTC [msp.identity] Sign -> DEBU 12b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:36.268 UTC [gossip.gossip] handleMessage -> DEBU 12a Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.269 UTC [gossip.pull] HandleMessage -> DEBU 12c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.269 UTC [gossip.gossip] handleMessage -> DEBU 12d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.269 UTC [gossip.comm] Send -> DEBU 12e Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1093 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:36.270 UTC [gossip.comm] sendToEndpoint -> DEBU 12f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1093 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.270 UTC [gossip.comm] sendToEndpoint -> DEBU 130 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.273 UTC [gossip.gossip] handleMessage -> DEBU 131 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.273 UTC [gossip.gossip] handleMessage -> DEBU 132 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.274 UTC [gossip.discovery] handleMsgFromComm -> DEBU 133 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.274 UTC [msp.identity] Verify -> DEBU 134 Verify: digest = 00000000 21 10 19 45 5e ce 33 40 2b e8 ad 1b 57 d6 70 0d |!..E^.3@+...W.p.| -peer0.org1.example.com | 00000010 ec f3 ac d4 ed 80 46 12 ac 12 b9 e9 31 3e 91 eb |......F.....1>..|" -peer0.org1.example.com | "2019-07-20 02:39:36.275 UTC [msp.identity] Verify -> DEBU 135 Verify: sig = 00000000 30 44 02 20 75 92 f8 13 f9 05 80 6b a6 5a dd 11 |0D. u......k.Z..| -peer0.org1.example.com | 00000010 04 4a 13 44 8c 31 b6 27 0b 7e 7e 52 24 27 16 30 |.J.D.1.'.~~R$'.0| -peer0.org1.example.com | 00000020 78 8c e4 f8 02 20 41 3a 4e a0 89 47 69 8e eb 59 |x.... A:N..Gi..Y| -peer0.org1.example.com | 00000030 02 fd 65 7e bd 0c bb f6 cc 94 6b cb 62 34 e3 66 |..e~......k.b4.f| -peer0.org1.example.com | 00000040 c5 49 92 a5 1b 52 |.I...R|" -peer0.org1.example.com | "2019-07-20 02:39:36.275 UTC [msp.identity] Verify -> DEBU 136 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:39:36.276 UTC [msp.identity] Verify -> DEBU 137 Verify: sig = 00000000 30 44 02 20 6b bc 72 89 6c 1d 1d 1b 36 c1 15 b6 |0D. k.r.l...6...| -peer0.org1.example.com | 00000010 39 dd 83 03 86 77 d8 5a 85 54 25 1b ec c7 43 5d |9....w.Z.T%...C]| -peer0.org1.example.com | 00000020 4a 43 70 ae 02 20 68 98 18 0a 06 aa 57 4c 06 4e |JCp.. h.....WL.N| -peer0.org1.example.com | 00000030 f3 68 07 f4 17 45 97 ba 0b 05 b1 8e 1e 90 1b 32 |.h...E.........2| -peer0.org1.example.com | 00000040 d8 78 a6 6c 8a a2 |.x.l..|" -peer0.org1.example.com | "2019-07-20 02:39:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 138 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.276 UTC [gossip.discovery] isSentByMe -> DEBU 139 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.277 UTC [msp.identity] Verify -> DEBU 13b Verify: digest = 00000000 4f 90 a0 9f b8 cf 4a 75 20 35 a7 40 01 2b f7 da |O.....Ju 5.@.+..| -peer0.org1.example.com | 00000010 51 a2 5b cf 01 b4 45 67 d4 ec 36 3b 03 e3 bd 45 |Q.[...Eg..6;...E|" -peer0.org1.example.com | "2019-07-20 02:39:36.278 UTC [msp.identity] Verify -> DEBU 13c Verify: sig = 00000000 30 44 02 20 1d 01 0c 87 a1 38 7c 87 13 7f fd 4b |0D. .....8|....K| -peer0.org1.example.com | 00000010 8c 72 9b 09 e7 23 ad b2 88 dc 88 6c fc 18 64 06 |.r...#.....l..d.| -peer0.org1.example.com | 00000020 af 43 39 ff 02 20 43 8a c1 20 ed 57 fc 47 32 d8 |.C9.. C.. .W.G2.| -peer0.org1.example.com | 00000030 a8 40 a5 66 3d 51 73 45 c6 08 be 29 fe 34 9b f6 |.@.f=QsE...).4..| -peer0.org1.example.com | 00000040 79 bb 9c 1a e1 1e |y.....|" -peer0.org1.example.com | "2019-07-20 02:39:36.278 UTC [msp.identity] Verify -> DEBU 13d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:39:36.279 UTC [msp.identity] Verify -> DEBU 13e Verify: sig = 00000000 30 44 02 20 16 3c 72 12 9c 25 47 ad 46 87 84 11 |0D. . DEBU 13f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 140 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 141 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -peer0.org1.example.com | "2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 142 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -peer0.org1.example.com | "2019-07-20 02:39:36.281 UTC [gossip.discovery] learnExistingMembers -> DEBU 143 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:36.281 UTC [gossip.discovery] learnExistingMembers -> DEBU 144 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 145 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 146 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.389 UTC [gossip.gossip] handleMessage -> DEBU 147 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.390 UTC [gossip.pull] HandleMessage -> DEBU 148 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.390 UTC [gossip.pull] SendDigest -> DEBU 149 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:39:36.390 UTC [gossip.gossip] handleMessage -> DEBU 14a Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.391 UTC [gossip.gossip] handleMessage -> DEBU 14b Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.391 UTC [gossip.gossip] handleMessage -> DEBU 14c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.392 UTC [msp.identity] Verify -> DEBU 14e Verify: digest = 00000000 d7 41 d0 00 0d a5 df 97 b5 63 d9 35 cc b1 55 f4 |.A.......c.5..U.| -peer0.org1.example.com | 00000010 50 2f ac 24 ca 99 16 8a 79 65 7c 17 76 7e 64 f6 |P/.$....ye|.v~d.|" -peer0.org1.example.com | "2019-07-20 02:39:36.393 UTC [msp.identity] Verify -> DEBU 14f Verify: sig = 00000000 30 45 02 21 00 f7 66 84 2f 80 96 e4 11 e9 98 77 |0E.!..f./......w| -peer0.org1.example.com | 00000010 8e dc 64 69 e2 4b be 65 e2 0d 24 39 a7 5b 1d ec |..di.K.e..$9.[..| -peer0.org1.example.com | 00000020 04 5f aa df a0 02 20 6e 2d f4 71 eb e3 2a 02 f4 |._.... n-.q..*..| -peer0.org1.example.com | 00000030 7a 4f b8 24 68 12 75 49 20 31 26 67 e2 28 a8 d3 |zO.$h.uI 1&g.(..| -peer0.org1.example.com | 00000040 b8 d2 40 56 20 e4 8c |..@V ..|" -peer0.org1.example.com | "2019-07-20 02:39:36.394 UTC [msp.identity] Verify -> DEBU 150 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:39:36.394 UTC [msp.identity] Verify -> DEBU 151 Verify: sig = 00000000 30 45 02 21 00 ff ee 1f 07 ad 2c d2 29 08 25 84 |0E.!......,.).%.| -peer0.org1.example.com | 00000010 6b f2 d5 03 e7 45 a6 c6 5a cb e9 ce c2 9d 9b ac |k....E..Z.......| -peer0.org1.example.com | 00000020 7d ef b8 ab 56 02 20 38 dc 65 7f 35 54 a9 03 6f |}...V. 8.e.5T..o| -peer0.org1.example.com | 00000030 e4 7c 93 22 6f a6 0d 11 70 db 3c f4 86 5a f0 18 |.|."o...p.<..Z..| -peer0.org1.example.com | 00000040 bd d4 8f 94 b4 c0 2e |.......|" -peer0.org1.example.com | "2019-07-20 02:39:36.395 UTC [gossip.discovery] handleAliveMessage -> DEBU 152 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.395 UTC [gossip.discovery] learnExistingMembers -> DEBU 153 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:36.395 UTC [gossip.discovery] learnExistingMembers -> DEBU 154 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -peer0.org1.example.com | "2019-07-20 02:39:36.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 155 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -peer0.org1.example.com | "2019-07-20 02:39:36.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 156 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:36.397 UTC [gossip.discovery] learnExistingMembers -> DEBU 157 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.397 UTC [gossip.discovery] handleAliveMessage -> DEBU 158 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 159 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.397 UTC [gossip.discovery] sendMemResponse -> DEBU 15a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:39:36.398 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:36.398 UTC [msp.identity] Sign -> DEBU 15c Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:39:36.398 UTC [msp.identity] Sign -> DEBU 15d Sign: digest: 9E663365013BAC851079C3A861364AACC5702496BD7AFEF63FF43118C2632810 " -peer0.org1.example.com | "2019-07-20 02:39:36.399 UTC [msp] GetDefaultSigningIdentity -> DEBU 15e Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:36.399 UTC [msp.identity] Sign -> DEBU 15f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:36.400 UTC [msp.identity] Sign -> DEBU 160 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:36.400 UTC [gossip.comm] Send -> DEBU 161 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:36.400 UTC [gossip.comm] sendToEndpoint -> DEBU 162 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:36.400 UTC [gossip.comm] sendToEndpoint -> DEBU 163 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:36.400 UTC [gossip.discovery] sendMemResponse -> DEBU 164 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > alive: > " -peer0.org1.example.com | "2019-07-20 02:39:37.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 165 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 166 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 167 Sign: digest: 6D019AA9062B5A0ABE1771EDAEB34763445AAA0B5583E7B6A2EE3FD1C6026BF9 " -peer0.org1.example.com | "2019-07-20 02:39:37.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 168 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 169 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 16a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:37.262 UTC [gossip.discovery] periodicalSendAlive -> DEBU 16b Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:39:37.268 UTC [gossip.pull] SendReq -> DEBU 16c Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:37.268 UTC [gossip.comm] Send -> DEBU 16d Entering, sending GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:37.269 UTC [gossip.comm] sendToEndpoint -> DEBU 16e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:37.269 UTC [gossip.comm] sendToEndpoint -> DEBU 16f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:37.270 UTC [gossip.comm] Send -> DEBU 170 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:37.271 UTC [gossip.comm] sendToEndpoint -> DEBU 171 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:37.272 UTC [gossip.comm] sendToEndpoint -> DEBU 172 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:37.273 UTC [gossip.gossip] handleMessage -> DEBU 173 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10686706552849004474, Envelope: 962 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:37.274 UTC [msp.identity] Verify -> DEBU 174 Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| -peer0.org1.example.com | 00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|" -peer0.org1.example.com | "2019-07-20 02:39:37.274 UTC [msp.identity] Verify -> DEBU 175 Verify: sig = 00000000 30 45 02 21 00 88 ae 14 68 e2 c9 46 e7 0e 04 37 |0E.!....h..F...7| -peer0.org1.example.com | 00000010 7a cf 20 f4 48 de 51 c5 26 81 c9 7d bf d2 e1 22 |z. .H.Q.&..}..."| -peer0.org1.example.com | 00000020 92 5c db 53 bb 02 20 64 3b 35 98 f1 7a 45 c6 c3 |.\.S.. d;5..zE..| -peer0.org1.example.com | 00000030 6a 90 0c 7a 65 13 3a f8 b1 79 89 ea 5d 3f 80 01 |j..ze.:..y..]?..| -peer0.org1.example.com | 00000040 0f 10 7f 24 b3 f0 1a |...$...|" -peer0.org1.example.com | "2019-07-20 02:39:37.275 UTC [gossip.pull] HandleMessage -> DEBU 176 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10686706552849004474, Envelope: 962 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:37.275 UTC [gossip.gossip] func2 -> DEBU 177 Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -peer0.org1.example.com | "2019-07-20 02:39:37.275 UTC [gossip.pull] HandleMessage -> DEBU 178 Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" -peer0.org1.example.com | "2019-07-20 02:39:37.275 UTC [gossip.gossip] handleMessage -> DEBU 179 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:37.390 UTC [gossip.gossip] handleMessage -> DEBU 17a Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:37.390 UTC [gossip.pull] HandleMessage -> DEBU 17b GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:37.390 UTC [gossip.gossip] handleMessage -> DEBU 17c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:37.391 UTC [gossip.pull] SendRes -> DEBU 17d Sending 1 IDENTITY_MSG items to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:39:37.397 UTC [gossip.gossip] handleMessage -> DEBU 17e Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:37.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:37.397 UTC [gossip.gossip] handleMessage -> DEBU 180 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:37.399 UTC [msp.identity] Verify -> DEBU 181 Verify: digest = 00000000 53 76 f4 8a 78 bb 68 76 6e e7 aa 10 ec 24 f1 3c |Sv..x.hvn....$.<| -peer0.org1.example.com | 00000010 9a dc fc 94 b2 ae 95 73 f5 89 48 e3 4f 0b 30 d5 |.......s..H.O.0.|" -peer0.org1.example.com | "2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 182 Verify: sig = 00000000 30 44 02 20 02 38 29 0a 50 83 ea 0f e0 ac 37 54 |0D. .8).P.....7T| -peer0.org1.example.com | 00000010 fd 34 dd e6 05 20 ca 03 23 b9 06 37 c1 3f 25 88 |.4... ..#..7.?%.| -peer0.org1.example.com | 00000020 f9 5b b2 99 02 20 70 f1 47 d7 b2 fa f0 27 e6 b9 |.[... p.G....'..| -peer0.org1.example.com | 00000030 81 12 b5 bf 5a 74 bd fa dc 25 d5 10 30 76 cd cc |....Zt...%..0v..| -peer0.org1.example.com | 00000040 3f 22 7e 41 c5 f8 |?"~A..|" -peer0.org1.example.com | "2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 183 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 184 Verify: sig = 00000000 30 44 02 20 6a f1 88 46 44 1b 12 fc ee 2d 8c d8 |0D. j..FD....-..| -peer0.org1.example.com | 00000010 a3 00 77 67 93 6e 30 31 a1 89 f5 af e4 d6 0e e5 |..wg.n01........| -peer0.org1.example.com | 00000020 45 95 d3 52 02 20 57 6b a7 19 b6 18 a7 0b 40 0a |E..R. Wk......@.| -peer0.org1.example.com | 00000030 b0 03 22 5f f8 a4 c1 06 1f 8b 7f 6b a9 2f 41 07 |.."_.......k./A.| -peer0.org1.example.com | 00000040 29 0d 5c c2 6c a9 |).\.l.|" -peer0.org1.example.com | "2019-07-20 02:39:37.401 UTC [gossip.discovery] handleAliveMessage -> DEBU 185 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:37.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 186 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 187 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -peer0.org1.example.com | "2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 188 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -peer0.org1.example.com | "2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 189 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 18a Exiting" -peer0.org1.example.com | "2019-07-20 02:39:37.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 18b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:37.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.267 UTC [gossip.pull] Hello -> DEBU 18d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:40.267 UTC [gossip.comm] Send -> DEBU 18e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:40.268 UTC [gossip.comm] sendToEndpoint -> DEBU 18f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.268 UTC [gossip.comm] sendToEndpoint -> DEBU 190 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.274 UTC [gossip.gossip] handleMessage -> DEBU 191 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.274 UTC [gossip.pull] HandleMessage -> DEBU 192 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.274 UTC [gossip.gossip] handleMessage -> DEBU 193 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 194 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:40.293 UTC [msp.identity] Sign -> DEBU 195 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:39:40.293 UTC [msp.identity] Sign -> DEBU 196 Sign: digest: 52A61F90DF58B1B9C98008BF88E86A627536A127FBD4B46A3D7CECBA9D5FD2B8 " -peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 197 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [msp.identity] Sign -> DEBU 198 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [msp.identity] Sign -> DEBU 199 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [gossip.comm] Send -> DEBU 19a Entering, sending GossipMessage: tag:EMPTY mem_req:\320j\220\032/\305\210\373\010\232\242\215\002 \026\307\303|\245\267\352\360\034\034\025\273\323\307\363\241\204\314\231\3143\230J2}[\001\341g\324GQ" secret_envelope: > > , Envelope: 1093 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [gossip.comm] sendToEndpoint -> DEBU 19b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\320j\220\032/\305\210\373\010\232\242\215\002 \026\307\303|\245\267\352\360\034\034\025\273\323\307\363\241\204\314\231\3143\230J2}[\001\341g\324GQ" secret_envelope: > > , Envelope: 1093 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [gossip.comm] sendToEndpoint -> DEBU 19c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.297 UTC [gossip.gossip] handleMessage -> DEBU 19d Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.297 UTC [gossip.gossip] handleMessage -> DEBU 19e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.299 UTC [msp.identity] Verify -> DEBU 1a0 Verify: digest = 00000000 52 a6 1f 90 df 58 b1 b9 c9 80 08 bf 88 e8 6a 62 |R....X........jb| -peer0.org1.example.com | 00000010 75 36 a1 27 fb d4 b4 6a 3d 7c ec ba 9d 5f d2 b8 |u6.'...j=|..._..|" -peer0.org1.example.com | "2019-07-20 02:39:40.299 UTC [msp.identity] Verify -> DEBU 1a1 Verify: sig = 00000000 30 44 02 20 30 c0 15 87 82 16 43 c9 b5 fa 81 b1 |0D. 0.....C.....| -peer0.org1.example.com | 00000010 19 3f 83 60 62 19 16 3e d0 6a 90 1a 2f c5 88 fb |.?.`b..>.j../...| -peer0.org1.example.com | 00000020 08 9a a2 8d 02 20 16 c7 c3 7c a5 b7 ea f0 1c 1c |..... ...|......| -peer0.org1.example.com | 00000030 15 bb d3 c7 f3 a1 84 cc 99 cc 33 98 4a 32 7d 5b |..........3.J2}[| -peer0.org1.example.com | 00000040 01 e1 67 d4 47 51 |..g.GQ|" -peer0.org1.example.com | "2019-07-20 02:39:40.300 UTC [msp.identity] Verify -> DEBU 1a2 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:39:40.300 UTC [msp.identity] Verify -> DEBU 1a3 Verify: sig = 00000000 30 44 02 20 37 37 ec 58 8e 0c a5 9c 84 6d 5c c4 |0D. 77.X.....m\.| -peer0.org1.example.com | 00000010 7b b6 6a 3b 20 7e b9 9d 6f 73 ec 59 d8 36 24 35 |{.j; ~..os.Y.6$5| -peer0.org1.example.com | 00000020 51 91 0a ec 02 20 33 e2 52 de 65 b2 82 95 4a f2 |Q.... 3.R.e...J.| -peer0.org1.example.com | 00000030 da 7d 1d 4d a4 17 07 53 17 83 06 a2 9e 0b 9c 46 |.}.M...S.......F| -peer0.org1.example.com | 00000040 3a 17 38 8b ae 47 |:.8..G|" -peer0.org1.example.com | "2019-07-20 02:39:40.300 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.301 UTC [gossip.discovery] isSentByMe -> DEBU 1a5 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a6 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.301 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.390 UTC [gossip.gossip] handleMessage -> DEBU 1a8 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.390 UTC [gossip.pull] HandleMessage -> DEBU 1a9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.391 UTC [gossip.pull] SendDigest -> DEBU 1aa Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ab Exiting" -orderer0.example.com | Kafka.TLS.Certificate = "" -orderer0.example.com | Kafka.TLS.RootCAs = [] -orderer0.example.com | Kafka.TLS.ClientAuthRequired = false -orderer0.example.com | Kafka.TLS.ClientRootCAs = [] -orderer0.example.com | Kafka.SASLPlain.Enabled = false -orderer0.example.com | Kafka.SASLPlain.User = "" -orderer0.example.com | Kafka.SASLPlain.Password = "" -orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 -orderer0.example.com | Debug.BroadcastTraceDir = "" -orderer0.example.com | Debug.DeliverTraceDir = "" -orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] -orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" -orderer0.example.com | Operations.TLS.Enabled = false -orderer0.example.com | Operations.TLS.PrivateKey = "" -orderer0.example.com | Operations.TLS.Certificate = "" -orderer0.example.com | Operations.TLS.RootCAs = [] -orderer0.example.com | Operations.TLS.ClientAuthRequired = false -orderer0.example.com | Operations.TLS.ClientRootCAs = [] -orderer0.example.com | Metrics.Provider = "prometheus" -orderer0.example.com | Metrics.Statsd.Network = "udp" -orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" -orderer0.example.com | Metrics.Statsd.WriteInterval = 30s -orderer0.example.com | Metrics.Statsd.Prefix = """ -orderer0.example.com | "2019-07-20 02:39:29.645 UTC [common.channelconfig] NewStandardValues -> DEBU 0e4 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:29.645 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e5 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e6 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e7 Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e8 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e9 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0ea Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0eb Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ec Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ed Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ee Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ef Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0f1 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f2 Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0f3 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ac Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > > , Envelope: 1097 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ad Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > > , Envelope: 1097 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.392 UTC [msp.identity] Verify -> DEBU 1af Verify: digest = 00000000 fd 61 48 d7 45 b9 37 7f 14 de 1f 2a a3 e8 c0 99 |.aH.E.7....*....| -peer0.org1.example.com | 00000010 e1 3a 5f de 9a 96 10 77 5a af bf 56 25 69 d3 5b |.:_....wZ..V%i.[|" -peer0.org1.example.com | "2019-07-20 02:39:40.392 UTC [msp.identity] Verify -> DEBU 1b0 Verify: sig = 00000000 30 44 02 20 0f af e6 c7 e6 cd 9b 2b 4c 67 0c 40 |0D. .......+Lg.@| -peer0.org1.example.com | 00000010 4b aa 62 2d 17 f9 28 58 19 d2 67 be 8d 86 76 36 |K.b-..(X..g...v6| -peer0.org1.example.com | 00000020 7d 97 ea 33 02 20 12 49 b2 6b 4e 2d a1 03 0b 37 |}..3. .I.kN-...7| -peer0.org1.example.com | 00000030 c7 79 b4 74 7a 52 ef 57 d3 73 de 34 9a d8 6d 1f |.y.tzR.W.s.4..m.| -peer0.org1.example.com | 00000040 df c9 93 62 15 d9 |...b..|" -peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [msp.identity] Verify -> DEBU 1b1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [msp.identity] Verify -> DEBU 1b2 Verify: sig = 00000000 30 44 02 20 09 83 c1 ba c8 24 75 c5 4e aa a0 a1 |0D. .....$u.N...| -peer0.org1.example.com | 00000010 7c ba 37 37 fe d4 ba a0 d9 3d 03 59 9e 65 a9 42 ||.77.....=.Y.e.B| -peer0.org1.example.com | 00000020 e0 13 d7 25 02 20 2a d8 d1 41 dc cc a7 61 ad 91 |...%. *..A...a..| -peer0.org1.example.com | 00000030 86 72 03 bf a1 5d 43 ef 2c 8e be 3c 6f d4 3d 08 |.r...]C.,.. DEBU 1b3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] validateMSP -> DEBU 0f5 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp] newBccspMsp -> DEBU 0f6 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp] New -> DEBU 0f7 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp] Setup -> DEBU 0f8 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp.identity] newIdentity -> DEBU 0f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp.identity] newIdentity -> DEBU 0fa Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp] Validate -> DEBU 0fb MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.647 UTC [common.channelconfig] NewStandardValues -> DEBU 0fc Initializing protos for *channelconfig.ConsortiumProtos" -orderer0.example.com | "2019-07-20 02:39:29.647 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fd Processing field: ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:29.648 UTC [common.channelconfig] NewStandardValues -> DEBU 0fe Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:29.648 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ff Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.648 UTC [common.channelconfig] validateMSP -> DEBU 100 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.648 UTC [msp] newBccspMsp -> DEBU 101 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.648 UTC [msp] New -> DEBU 102 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.648 UTC [msp] Setup -> DEBU 103 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.648 UTC [msp.identity] newIdentity -> DEBU 104 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.648 UTC [msp.identity] newIdentity -> DEBU 105 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.649 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 106 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.649 UTC [msp] Validate -> DEBU 107 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.649 UTC [msp] getCertificationChain -> DEBU 108 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp] hasOURole -> DEBU 109 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp] getCertificationChain -> DEBU 10a MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.655 UTC [common.channelconfig] NewStandardValues -> DEBU 10b Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:29.655 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10c Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.655 UTC [common.channelconfig] validateMSP -> DEBU 10d Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp] newBccspMsp -> DEBU 10e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp] New -> DEBU 10f Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp] Setup -> DEBU 110 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp.identity] newIdentity -> DEBU 111 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b8 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b9 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] sendMemResponse -> DEBU 1bb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:39:40.394 UTC [gossip.comm] Send -> DEBU 1bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:40.394 UTC [gossip.discovery] sendMemResponse -> DEBU 1bd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > alive: > " -peer0.org1.example.com | "2019-07-20 02:39:40.394 UTC [gossip.comm] sendToEndpoint -> DEBU 1be Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:40.394 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf Exiting" -peer0.org1.example.com | "2019-07-20 02:39:40.708 UTC [endorser] ProcessProposal -> DEBU 1c0 Entering: request from 172.18.0.9:58248" -peer0.org1.example.com | "2019-07-20 02:39:40.709 UTC [protoutils] ValidateProposalMessage -> DEBU 1c1 ValidateProposalMessage starts for signed proposal 0xc000597b30" -peer0.org1.example.com | "2019-07-20 02:39:40.709 UTC [protoutils] validateChannelHeader -> DEBU 1c2 validateChannelHeader info: header type 1" -peer0.org1.example.com | "2019-07-20 02:39:40.710 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c3 begin" -peer0.org1.example.com | "2019-07-20 02:39:40.710 UTC [msp] DeserializeIdentity -> DEBU 1c4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:40.711 UTC [msp.identity] newIdentity -> DEBU 1c5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:40.711 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:39:40.712 UTC [msp] Validate -> DEBU 1c7 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:40.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c8 creator is valid" -peer0.org1.example.com | "2019-07-20 02:39:40.713 UTC [msp.identity] Verify -> DEBU 1c9 Verify: digest = 00000000 86 39 0c 46 13 37 25 e5 80 45 6e 19 f6 61 a8 16 |.9.F.7%..En..a..| -peer0.org1.example.com | 00000010 49 32 fe 1e 99 80 e4 99 d3 b9 aa 2c f1 bb 78 8d |I2.........,..x.|" -peer0.org1.example.com | "2019-07-20 02:39:40.713 UTC [msp.identity] Verify -> DEBU 1ca Verify: sig = 00000000 30 44 02 20 5e 97 26 dc 2d a9 1b 1a fa 68 0d 81 |0D. ^.&.-....h..| -peer0.org1.example.com | 00000010 c4 6b ac d4 11 d8 84 58 c9 63 0c 35 e8 01 6d 0f |.k.....X.c.5..m.| -peer0.org1.example.com | 00000020 a8 83 f9 89 02 20 15 d6 c1 91 3c 1f 7f 98 f9 66 |..... ....<....f| -peer0.org1.example.com | 00000030 e0 db 43 d7 0b f4 e4 49 f1 34 75 7f b6 56 28 ec |..C....I.4u..V(.| -peer0.org1.example.com | 00000040 5c a5 59 88 ad 64 |\.Y..d|" -peer0.org1.example.com | "2019-07-20 02:39:40.714 UTC [protoutils] checkSignatureFromCreator -> DEBU 1cb exits successfully" -peer0.org1.example.com | "2019-07-20 02:39:40.714 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1cc validateChaincodeProposalMessage starts for proposal 0xc0007a8380, header 0xc0007aa460" -peer0.org1.example.com | "2019-07-20 02:39:40.714 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1cd validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:39:40.715 UTC [endorser] preProcess -> DEBU 1ce [][67d06ae1] processing txid: 67d06ae1fc1d7db4d5e0259c1748ab22cb470271d429d94645d1ca2a81fe1bb7" -peer0.org1.example.com | "2019-07-20 02:39:40.715 UTC [endorser] SimulateProposal -> DEBU 1cf [][67d06ae1] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:39:40.715 UTC [endorser] callChaincode -> INFO 1d0 [][67d06ae1] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:39:40.715 UTC [chaincode] Execute -> DEBU 1d1 Entry" -peer0.org1.example.com | "2019-07-20 02:39:40.716 UTC [cscc] Invoke -> DEBU 1d2 Invoke function: JoinChain" -peer0.org1.example.com | "2019-07-20 02:39:40.716 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1d3 Checking if identity satisfies ADMIN role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.717 UTC [msp.identity] Verify -> DEBU 1d4 Verify: digest = 00000000 86 39 0c 46 13 37 25 e5 80 45 6e 19 f6 61 a8 16 |.9.F.7%..En..a..| -peer0.org1.example.com | 00000010 49 32 fe 1e 99 80 e4 99 d3 b9 aa 2c f1 bb 78 8d |I2.........,..x.|" -peer0.org1.example.com | "2019-07-20 02:39:40.717 UTC [msp.identity] Verify -> DEBU 1d5 Verify: sig = 00000000 30 44 02 20 5e 97 26 dc 2d a9 1b 1a fa 68 0d 81 |0D. ^.&.-....h..| -peer0.org1.example.com | 00000010 c4 6b ac d4 11 d8 84 58 c9 63 0c 35 e8 01 6d 0f |.k.....X.c.5..m.| -peer0.org1.example.com | 00000020 a8 83 f9 89 02 20 15 d6 c1 91 3c 1f 7f 98 f9 66 |..... ....<....f| -peer0.org1.example.com | 00000030 e0 db 43 d7 0b f4 e4 49 f1 34 75 7f b6 56 28 ec |..C....I.4u..V(.| -peer0.org1.example.com | 00000040 5c a5 59 88 ad 64 |\.Y..d|" -peer0.org1.example.com | "2019-07-20 02:39:40.718 UTC [ledgermgmt] CreateLedger -> INFO 1d6 Creating ledger [businesschannel] with genesis block" -peer0.org1.example.com | "2019-07-20 02:39:40.719 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1d7 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " -peer0.org1.example.com | "2019-07-20 02:39:40.720 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1d8 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" -peer0.org1.example.com | "2019-07-20 02:39:40.720 UTC [kvledger.util] logDirStatus -> DEBU 1d9 Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" -peer0.org1.example.com | "2019-07-20 02:39:40.721 UTC [kvledger.util] logDirStatus -> DEBU 1da After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" -peer0.org1.example.com | "2019-07-20 02:39:40.721 UTC [fsblkstorage] newBlockfileMgr -> INFO 1db Getting block information from block storage" -peer0.org1.example.com | "2019-07-20 02:39:40.722 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1dc Retrieving checkpoint info from block files" -peer0.org1.example.com | "2019-07-20 02:39:40.722 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1dd retrieveLastFileSuffix()" -peer0.org1.example.com | "2019-07-20 02:39:40.723 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1de retrieveLastFileSuffix() - biggestFileNum = -1" -peer0.org1.example.com | "2019-07-20 02:39:40.723 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1df Last file number found = -1" -peer0.org1.example.com | "2019-07-20 02:39:40.723 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1e0 No block file found" -peer0.org1.example.com | "2019-07-20 02:39:40.723 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1e1 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0005efc40)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [fsblkstorage] newBlockIndex -> DEBU 1e2 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [pvtdatastorage] OpenStore -> DEBU 1e3 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [leveldbhelper] GetIterator -> DEBU 1e4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] newKVLedger -> DEBU 1e5 Creating KVLedger ledgerID=businesschannel: " -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] lastPersistedCommitHash -> DEBU 1e6 Chain is empty" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] newKVLedger -> DEBU 1e7 Register state db for chaincode lifecycle events: false" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] recoverDBs -> DEBU 1e8 Entering recoverDB()" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 1e9 Block storage is empty." -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1ea [businesschannel:] Filtering pvtData of invalidation transactions" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1eb [businesschannel:] Committing pvtData of [0] old blocks to the stateDB" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ec Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ed lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ee Constructing unique pvtData by removing duplicate entries" -peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1ef [businesschannel:] Clearing the bookkeeping information from pvtdatastore" -peer0.org1.example.com | "2019-07-20 02:39:40.726 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f0 Starting to process collection eligibility events" -peer0.org1.example.com | "2019-07-20 02:39:40.726 UTC [leveldbhelper] GetIterator -> DEBU 1f1 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" -peer0.org1.example.com | "2019-07-20 02:39:40.726 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f2 Converted [0] inelligible mising data entries to elligible" -peer0.org1.example.com | "2019-07-20 02:39:40.726 UTC [pvtdatastorage] func1 -> DEBU 1f3 Waiting for collection eligibility event" -peer0.org1.example.com | "2019-07-20 02:39:40.726 UTC [kvledger] CommitWithPvtData -> DEBU 1f4 [businesschannel] Validating state for block [0]" -peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f6 lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f7 Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1f8 ValidateAndPrepareBatch() for block number = [0]" -peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1f9 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [valimpl] preprocessProtoBlock -> DEBU 1fa txType=CONFIG" -peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [valimpl] processNonEndorserTx -> DEBU 1fb Performing custom processing for transaction [txid=], [txType=CONFIG]" -peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [valimpl] processNonEndorserTx -> DEBU 1fc Processor for custom tx processing:&peer.configtxProcessor{}" -peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1fd constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1fe constructing new tx simulator txid = []" -peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [peer] GenerateSimulationResults -> DEBU 1ff Processing CONFIG" -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [peer] processChannelConfigTx -> DEBU 200 channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 201 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [lockbasedtxmgr] Done -> DEBU 202 Done with transaction simulation / query execution []" -peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 203 Block [0] Transaction index [0] TxId [] marked as valid by state validator" -peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [valinternal] ApplyWriteSet -> DEBU 204 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc000695b00)}" -peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 205 validating rwset..." -peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 206 postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 207 ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [kvledger] CommitWithPvtData -> DEBU 208 [businesschannel] Adding CommitHash to the block [0]" -peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [kvledger] CommitWithPvtData -> DEBU 209 [businesschannel] Committing block [0] to storage" -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp.identity] newIdentity -> DEBU 112 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 113 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] Validate -> DEBU 114 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] getCertificationChain -> DEBU 115 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] hasOURole -> DEBU 116 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] getCertificationChain -> DEBU 117 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] Setup -> DEBU 118 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] Setup -> DEBU 119 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11a Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Admins for Channel/Consortiums" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] GetPolicy -> DEBU 12a Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12b Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] GetPolicy -> DEBU 12c Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12d Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12e Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Group] /Channel/Consortiums" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [ledgerstorage] CommitWithPvtData -> DEBU 20a Writing block [0] to pvt block store" -peer0.org1.example.com | "2019-07-20 02:39:40.729 UTC [pvtdatastorage] Prepare -> DEBU 20b Saved 0 private data write sets for block [0]" -peer0.org1.example.com | "2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20c Indexing block [blockNum=0, blockHash=[]byte{0xde, 0xde, 0xd4, 0x2c, 0x3f, 0xc9, 0xd0, 0x46, 0x4d, 0x6c, 0x3a, 0xf6, 0x16, 0x22, 0x29, 0x32, 0x3, 0x44, 0xef, 0x64, 0x10, 0x5f, 0x7f, 0xf6, 0x26, 0x25, 0xe8, 0x71, 0x7d, 0x72, 0x1c, 0xd4} txOffsets= -peer0.org1.example.com | txId=12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898 locPointer=offset=39, bytesLength=23902 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20d Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23902] for tx ID: [12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898] to txid-index" -peer0.org1.example.com | "2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20e Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23902] for tx number:[0] ID: [12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898] to blockNumTranNum index" -peer0.org1.example.com | "2019-07-20 02:39:40.733 UTC [fsblkstorage] updateCheckpoint -> DEBU 20f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23948], isChainEmpty=[false], lastBlockNumber=[0]" -peer0.org1.example.com | "2019-07-20 02:39:40.733 UTC [pvtdatastorage] Commit -> DEBU 210 Committing private data for block [0]" -peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtdatastorage] Commit -> DEBU 211 Committed private data for block [0]" -peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [kvledger] CommitWithPvtData -> DEBU 212 [businesschannel] Committing block [0] transactions to state database" -peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [lockbasedtxmgr] Commit -> DEBU 213 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtdatastorage] func1 -> DEBU 214 Purger started: Purging expired private data till block number [0]" -peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 215 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" -peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 216 Preparing potential purge list working-set for expiringAtBlk [0]" -peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [leveldbhelper] GetIterator -> DEBU 217 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" -peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtdatastorage] func1 -> DEBU 218 Purger finished" -peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [leveldbhelper] GetIterator -> DEBU 219 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" -peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 21a No expiry entry found for expiringAtBlk [0]" -peer0.org1.example.com | "2019-07-20 02:39:40.735 UTC [lockbasedtxmgr] Commit -> DEBU 21b Committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:39:40.735 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 21c Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-07-20 02:39:40.735 UTC [lockbasedtxmgr] Commit -> DEBU 21d Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:39:40.735 UTC [stateleveldb] ApplyUpdates -> DEBU 21e Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -peer0.org1.example.com | "2019-07-20 02:39:40.736 UTC [lockbasedtxmgr] Commit -> DEBU 21f Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-07-20 02:39:40.736 UTC [lockbasedtxmgr] func1 -> DEBU 220 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-07-20 02:39:40.736 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 221 Preparing potential purge list working-set for expiringAtBlk [1]" -peer0.org1.example.com | "2019-07-20 02:39:40.736 UTC [leveldbhelper] GetIterator -> DEBU 222 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" -peer0.org1.example.com | "2019-07-20 02:39:40.737 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 223 No expiry entry found for expiringAtBlk [1]" -peer0.org1.example.com | "2019-07-20 02:39:40.737 UTC [kvledger] CommitWithPvtData -> DEBU 224 [businesschannel] Committing block [0] transactions to history database" -peer0.org1.example.com | "2019-07-20 02:39:40.737 UTC [historyleveldb] Commit -> DEBU 225 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" -peer0.org1.example.com | "2019-07-20 02:39:40.737 UTC [historyleveldb] Commit -> DEBU 226 Skipping transaction [0] since it is not an endorsement transaction" -peer0.org1.example.com | "2019-07-20 02:39:40.738 UTC [historyleveldb] Commit -> DEBU 227 Channel [businesschannel]: Updates committed to history database for blockNo [0]" -peer0.org1.example.com | "2019-07-20 02:39:40.738 UTC [kvledger] CommitWithPvtData -> INFO 228 [businesschannel] Committed block [0] with 1 transaction(s) in 11ms (state_validation=1ms block_and_pvtdata_commit=5ms state_commit=2ms) commitHash=[]" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [ledgermgmt] CreateLedger -> INFO 229 Created ledger [businesschannel] with genesis block" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22a constructing new query executor txid = [0bf7b741-2304-4dbf-9a53-198b20e85df5]" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [stateleveldb] GetState -> DEBU 22b GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [lockbasedtxmgr] Done -> DEBU 22c Done with transaction simulation / query execution [0bf7b741-2304-4dbf-9a53-198b20e85df5]" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 22d Initializing protos for *channelconfig.ChannelProtos" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 22e Processing field: HashingAlgorithm" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 22f Processing field: BlockDataHashingStructure" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 230 Processing field: OrdererAddresses" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 231 Processing field: Consortium" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 232 Processing field: Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 233 Initializing protos for *channelconfig.OrdererProtos" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 234 Processing field: ConsensusType" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 235 Processing field: BatchSize" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 236 Processing field: BatchTimeout" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 237 Processing field: KafkaBrokers" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 238 Processing field: ChannelRestrictions" -peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 239 Processing field: Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 23a Initializing protos for *channelconfig.OrdererOrgProtos" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: Endpoints" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 23c Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] validateMSP -> DEBU 23e Setting up MSP for org OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp] newBccspMsp -> DEBU 23f Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp] New -> DEBU 240 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp] Setup -> DEBU 241 Setting up MSP instance OrdererMSP" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp.identity] newIdentity -> DEBU 242 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp.identity] newIdentity -> DEBU 243 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp] Validate -> DEBU 244 MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 245 Initializing protos for *channelconfig.ApplicationProtos" -peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: ACLs" -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] NewStandardValues -> DEBU 248 Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] NewStandardValues -> DEBU 24a Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24b Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] Validate -> DEBU 24c Anchor peers for org Org1MSP are " -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] validateMSP -> DEBU 24d Setting up MSP for org Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [msp] newBccspMsp -> DEBU 24e Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [msp] New -> DEBU 24f Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [msp] Setup -> DEBU 250 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Policy] /Channel/Consortiums/Admins" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [orderer.common.server] createLedgerFactory -> DEBU 156 Ledger dir: /var/hyperledger/production/orderer" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [kvledger.util] CreateDirIfMissing -> DEBU 157 CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [kvledger.util] logDirStatus -> DEBU 158 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" -orderer0.example.com | "2019-07-20 02:39:29.658 UTC [kvledger.util] logDirStatus -> DEBU 159 After creating dir - [/var/hyperledger/production/orderer/index/] exists" -orderer0.example.com | "2019-07-20 02:39:29.705 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 15a Bootstrapping because no existing channels" -orderer0.example.com | "2019-07-20 02:39:29.705 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 15b Selected bootstrap block, because system channel last config block is nil" -orderer0.example.com | "2019-07-20 02:39:29.706 UTC [common.channelconfig] NewStandardValues -> DEBU 15c Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:29.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:29.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 161 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 162 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 163 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 166 Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 169 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 16b Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] validateMSP -> DEBU 16d Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [msp] newBccspMsp -> DEBU 16e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [msp] New -> DEBU 16f Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [msp] Setup -> DEBU 170 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:29.707 UTC [msp.identity] newIdentity -> DEBU 171 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.708 UTC [msp.identity] newIdentity -> DEBU 172 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [msp.identity] newIdentity -> DEBU 251 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [msp.identity] newIdentity -> DEBU 252 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:40.743 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 253 Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.743 UTC [msp] Validate -> DEBU 254 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:40.743 UTC [msp] getCertificationChain -> DEBU 255 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [msp] hasOURole -> DEBU 256 MSP Org1MSP checking if the identity is a client" -peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [msp] getCertificationChain -> DEBU 257 MSP Org1MSP getting certification chain" -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.708 UTC [msp] Validate -> DEBU 173 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.711 UTC [common.channelconfig] NewStandardValues -> DEBU 174 Initializing protos for *channelconfig.ConsortiumProtos" -orderer0.example.com | "2019-07-20 02:39:29.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175 Processing field: ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:29.711 UTC [common.channelconfig] NewStandardValues -> DEBU 176 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:29.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.711 UTC [common.channelconfig] validateMSP -> DEBU 178 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.712 UTC [msp] newBccspMsp -> DEBU 179 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.712 UTC [msp] New -> DEBU 17a Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.712 UTC [msp] Setup -> DEBU 17b Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.714 UTC [msp.identity] newIdentity -> DEBU 17c Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.714 UTC [msp.identity] newIdentity -> DEBU 17d Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.715 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17e Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.715 UTC [msp] Validate -> DEBU 17f MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.715 UTC [msp] getCertificationChain -> DEBU 180 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.715 UTC [msp] hasOURole -> DEBU 181 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:29.715 UTC [msp] getCertificationChain -> DEBU 182 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.716 UTC [common.channelconfig] NewStandardValues -> DEBU 183 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:29.716 UTC [common.channelconfig] initializeProtosStruct -> DEBU 184 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.716 UTC [common.channelconfig] validateMSP -> DEBU 185 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.718 UTC [msp] newBccspMsp -> DEBU 186 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.718 UTC [msp] New -> DEBU 187 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.718 UTC [msp] Setup -> DEBU 188 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.718 UTC [msp.identity] newIdentity -> DEBU 189 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] NewStandardValues -> DEBU 258 Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] NewStandardValues -> DEBU 25a Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25b Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] Validate -> DEBU 25c Anchor peers for org Org2MSP are " -peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] validateMSP -> DEBU 25d Setting up MSP for org Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [msp] newBccspMsp -> DEBU 25e Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [msp] New -> DEBU 25f Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [msp] Setup -> DEBU 260 Setting up MSP instance Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.745 UTC [msp.identity] newIdentity -> DEBU 261 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:40.745 UTC [msp.identity] newIdentity -> DEBU 262 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 263 Checking if identity satisfies role [CLIENT] for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] Validate -> DEBU 264 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] getCertificationChain -> DEBU 265 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] hasOURole -> DEBU 266 MSP Org2MSP checking if the identity is a client" -peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] getCertificationChain -> DEBU 267 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] Setup -> DEBU 268 Setting up the MSP manager (3 msps)" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [msp] Setup -> DEBU 269 MSP manager setup complete, setup 3 msps" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy Writers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Admins for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Readers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Admins for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy BlockValidation for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Readers for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Writers for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Readers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Writers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Admins for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Endorsement for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 275 Proposed new policy Readers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Writers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Admins for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Endorsement for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Endorsement for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Readers for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Writers for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Admins for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy LifecycleEndorsement for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Admins for Channel" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Readers for Channel" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Writers for Channel" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Group] /Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Value] /Channel/Orderer/Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Value] /Channel/Orderer/BatchSize" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Policy] /Channel/Orderer/Readers" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Policy] /Channel/Orderer/Writers" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Orderer/Admins" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.722 UTC [msp.identity] newIdentity -> DEBU 18a Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.740 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 18b Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.740 UTC [msp] Validate -> DEBU 18c MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.740 UTC [msp] getCertificationChain -> DEBU 18d MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.743 UTC [msp] hasOURole -> DEBU 18e MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:29.744 UTC [msp] getCertificationChain -> DEBU 18f MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.744 UTC [msp] Setup -> DEBU 190 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:29.744 UTC [msp] Setup -> DEBU 191 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 196 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 199 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19b Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19c Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19d Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19e Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19f Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a0 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a1 Proposed new policy Admins for Channel/Consortiums" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a2 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] GetPolicy -> DEBU 1a3 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a4 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] GetPolicy -> DEBU 1a5 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a6 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Value] /Channel/Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Value] /Channel/HashingAlgorithm" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Value] /Channel/OrdererAddresses" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Consortium" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Admins" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Policy] /Channel/Readers" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Policy] /Channel/Writers" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.capabilities] Supported -> DEBU 2ad Application capability V1_4_2 is supported and is enabled" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.capabilities] Supported -> DEBU 2ae Channel capability V1_4_2 is supported and is enabled" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.channelconfig] LogSanityChecks -> DEBU 2af As expected, current configuration has policy '/Channel/Readers'" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b0 As expected, current configuration has policy '/Channel/Writers'" -peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [policies] Manager -> DEBU 2b1 Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b2 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b3 Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b4 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b5 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b6 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b7 As expected, current configuration has policy '/Channel/Application/Readers'" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b8 As expected, current configuration has policy '/Channel/Application/Writers'" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b9 As expected, current configuration has policy '/Channel/Application/Admins'" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2ba Manager Channel looking up path [Orderer]" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bb Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bc Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bd Manager Channel/Orderer looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2be Manager Channel/Orderer has managers OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bf As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c0 As expected, current configuration has policy '/Channel/Orderer/Admins'" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c1 As expected, current configuration has policy '/Channel/Orderer/Writers'" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Group] /Channel/Consortiums" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c4 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c6 Adding to config map: [Policy] /Channel/Consortiums/Admins" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c2 As expected, current configuration has policy '/Channel/Orderer/Readers'" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2c3 Processing new config for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2c4 Calling out because config was updated for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c5 Org1MSP anchor peers: []" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c6 Org2MSP anchor peers: []" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c7 Creating state provider for chainID businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.gossip] JoinChan -> INFO 2c8 Joining gossip network of channel businesschannel with 2 organizations" -peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.gossip] learnAnchorPeers -> INFO 2c9 No configured anchor peers of Org1MSP for channel businesschannel to learn about" -peer0.org1.example.com | "2019-07-20 02:39:40.752 UTC [gossip.gossip] learnAnchorPeers -> INFO 2ca No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer0.org1.example.com | "2019-07-20 02:39:40.752 UTC [peer] updateTrustedRoots -> DEBU 2cb Updating trusted root authorities for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2cc updating root CAs for channel [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2cd adding app root CAs for MSP [Org2MSP]" -peer0.org1.example.com | "2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2ce adding orderer root CAs for MSP [OrdererMSP]" -peer0.org1.example.com | "2019-07-20 02:39:40.761 UTC [peer] buildTrustedRootsForChain -> DEBU 2cf adding app root CAs for MSP [Org1MSP]" -peer0.org1.example.com | "2019-07-20 02:39:40.761 UTC [kvledger.util] CreateDirIfMissing -> DEBU 2d0 CreateDirIfMissing [/var/hyperledger/production/transientStore/]" -peer0.org1.example.com | "2019-07-20 02:39:40.761 UTC [kvledger.util] logDirStatus -> DEBU 2d1 Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" -peer0.org1.example.com | "2019-07-20 02:39:40.761 UTC [kvledger.util] logDirStatus -> DEBU 2d2 After creating dir - [/var/hyperledger/production/transientStore/] exists" -peer0.org1.example.com | "2019-07-20 02:39:40.768 UTC [gossip.service] InitializeChannel -> DEBU 2d3 Creating state provider for chainID businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:40.769 UTC [msp] GetDefaultSigningIdentity -> DEBU 2d4 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:40.769 UTC [msp.identity] Sign -> DEBU 2d5 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " -peer0.org1.example.com | "2019-07-20 02:39:40.769 UTC [msp.identity] Sign -> DEBU 2d6 Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " -peer0.org1.example.com | "2019-07-20 02:39:40.770 UTC [gossip.privdata] NewReconciler -> DEBU 2d7 Private data reconciliation is enabled" -peer0.org1.example.com | "2019-07-20 02:39:40.773 UTC [gossip.state] NewGossipStateProvider -> INFO 2d8 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" -peer0.org1.example.com | "2019-07-20 02:39:40.773 UTC [gossip.state] NewGossipStateProvider -> DEBU 2d9 Updating gossip ledger height to 1" -peer0.org1.example.com | "2019-07-20 02:39:40.774 UTC [msp] GetDefaultSigningIdentity -> DEBU 2da Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:40.774 UTC [msp.identity] Sign -> DEBU 2db Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020801 " -peer0.org1.example.com | "2019-07-20 02:39:40.774 UTC [msp.identity] Sign -> DEBU 2dc Sign: digest: F551A65D8BC362FE114BAD8311222B06D4E2289434A7C37C986E7EEDF1FC6EE9 " -peer0.org1.example.com | "2019-07-20 02:39:40.774 UTC [gossip.service] InitializeChannel -> DEBU 2dd Delivery uses dynamic leader election mechanism, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [peer] InitChain -> DEBU 2de Initializing channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [gossip.election] waitForMembershipStabilization -> DEBU 2df c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [gossip.election] handleMessages -> DEBU 2e0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [nodeCmd] func6 -> DEBU 2e1 Deploying system CC, for channel " -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e2 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e3 constructing new tx simulator txid = [abaa1667-e7a4-43d3-835d-7b3659d3b26c]" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [chaincode] Execute -> DEBU 2e4 Entry" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [chaincode] handleMessage -> DEBU 2e5 [abaa1667] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [chaincode] Notify -> DEBU 2e6 [abaa1667] notifying Txid:abaa1667-e7a4-43d3-835d-7b3659d3b26c, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [chaincode] Execute -> DEBU 2e7 Exit" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [sccapi] deploySysCC -> INFO 2e8 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] Done -> DEBU 2e9 Done with transaction simulation / query execution [abaa1667-e7a4-43d3-835d-7b3659d3b26c]" -peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2ea constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2eb constructing new tx simulator txid = [d8dbf289-e043-4466-a93a-ddccfd1cdab0]" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2ec Entry" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [cscc] Init -> INFO 2ed Init CSCC" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] handleMessage -> DEBU 2ee [d8dbf289] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Notify -> DEBU 2ef [d8dbf289] notifying Txid:d8dbf289-e043-4466-a93a-ddccfd1cdab0, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f0 Exit" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [sccapi] deploySysCC -> INFO 2f1 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] Done -> DEBU 2f2 Done with transaction simulation / query execution [d8dbf289-e043-4466-a93a-ddccfd1cdab0]" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2f3 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2f4 constructing new tx simulator txid = [84e60c06-9d91-4b37-949a-5b212baac3e1]" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f5 Entry" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [qscc] Init -> INFO 2f6 Init QSCC" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c7 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c9 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1ca Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cb Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cc Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cd Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:29.813 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1ce Booted with a genesis block, replication isn't an option" -orderer0.example.com | "2019-07-20 02:39:29.841 UTC [orderer.common.server] initializeServerConfig -> INFO 1cf Starting orderer with TLS enabled" -orderer0.example.com | "2019-07-20 02:39:29.844 UTC [orderer.common.server] configureClusterListener -> INFO 1d0 Cluster listener is not configured, defaulting to use the general listener on port 7050" -orderer0.example.com | "2019-07-20 02:39:29.858 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1d1 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " -orderer0.example.com | "2019-07-20 02:39:29.858 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1d2 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" -orderer0.example.com | "2019-07-20 02:39:29.858 UTC [kvledger.util] logDirStatus -> DEBU 1d3 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" -orderer0.example.com | "2019-07-20 02:39:29.859 UTC [kvledger.util] logDirStatus -> DEBU 1d4 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" -orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] newBlockfileMgr -> INFO 1d5 Getting block information from block storage" -orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d6 Retrieving checkpoint info from block files" -orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d7 retrieveLastFileSuffix()" -orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d8 retrieveLastFileSuffix() - biggestFileNum = -1" -orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d9 Last file number found = -1" -orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1da No block file found" -orderer0.example.com | "2019-07-20 02:39:29.860 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1db Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0000cd5a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -orderer0.example.com | "2019-07-20 02:39:29.862 UTC [fsblkstorage] newBlockIndex -> DEBU 1dc newBlockIndex() - indexItems:[[BlockNum]]" -orderer0.example.com | "2019-07-20 02:39:29.865 UTC [fsblkstorage] indexBlock -> DEBU 1dd Indexing block [blockNum=0, blockHash=[]byte{0x83, 0x7c, 0xec, 0x8, 0xfb, 0x64, 0x69, 0x1e, 0xeb, 0x40, 0x71, 0x16, 0x20, 0xff, 0x7, 0xb7, 0x21, 0x5a, 0x7c, 0x93, 0xa4, 0x25, 0x8e, 0x29, 0x3a, 0x1a, 0x0, 0x5e, 0x0, 0xd6, 0xad, 0x25} txOffsets= -orderer0.example.com | txId=a6faba22e613adaa8102d6c27d264383fd6380b45cd1860c8c876737af1bf39c locPointer=offset=39, bytesLength=18375 -orderer0.example.com | ]" -orderer0.example.com | "2019-07-20 02:39:29.867 UTC [fsblkstorage] updateCheckpoint -> DEBU 1de Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18419], isChainEmpty=[false], lastBlockNumber=[0]" -orderer0.example.com | "2019-07-20 02:39:29.870 UTC [common.channelconfig] NewStandardValues -> DEBU 1df Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:29.873 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e1 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e3 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e7 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e8 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e9 Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ea Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1eb Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1ec Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ed Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1ee Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ef Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] validateMSP -> DEBU 1f0 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [msp] newBccspMsp -> DEBU 1f1 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [msp] New -> DEBU 1f2 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.874 UTC [msp] Setup -> DEBU 1f3 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp.identity] newIdentity -> DEBU 1f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp.identity] newIdentity -> DEBU 1f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] handleMessage -> DEBU 2f7 [84e60c06] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Notify -> DEBU 2f8 [84e60c06] notifying Txid:84e60c06-9d91-4b37-949a-5b212baac3e1, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f9 Exit" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [sccapi] deploySysCC -> INFO 2fa system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" -peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] Done -> DEBU 2fb Done with transaction simulation / query execution [84e60c06-9d91-4b37-949a-5b212baac3e1]" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [sccapi] deploySysCC -> INFO 2fc system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2fd constructing new query executor txid = [af545680-5b62-498c-8287-f67efc9651a5]" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 2fe Returning []" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [lockbasedtxmgr] Done -> DEBU 2ff Done with transaction simulation / query execution [af545680-5b62-498c-8287-f67efc9651a5]" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [msp] GetDefaultSigningIdentity -> DEBU 300 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [msp.identity] Sign -> DEBU 301 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020801 " -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [msp.identity] Sign -> DEBU 302 Sign: digest: 3233FCE6D3C338F4FFECD94AEA4E2C6BC849ED2FC8E7A44AD209E1AC5F954AEE " -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 303 Listeners for channel businesschannel invoked" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [chaincode] handleMessage -> DEBU 304 [67d06ae1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [chaincode] Notify -> DEBU 305 [67d06ae1] notifying Txid:67d06ae1fc1d7db4d5e0259c1748ab22cb470271d429d94645d1ca2a81fe1bb7, channelID:" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [chaincode] Execute -> DEBU 306 Exit" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [endorser] callChaincode -> INFO 307 [][67d06ae1] Exit chaincode: name:"cscc" (62ms)" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [endorser] SimulateProposal -> DEBU 308 [][67d06ae1] Exit" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [endorser] func1 -> DEBU 309 Exit: request from 172.18.0.9:58248" -peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [comm.grpc.server] 1 -> INFO 30a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58248 grpc.code=OK grpc.call_duration=69.3708ms -peer0.org1.example.com | "2019-07-20 02:39:40.783 UTC [grpc] infof -> DEBU 30b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:41.563 UTC [endorser] ProcessProposal -> DEBU 30c Entering: request from 172.18.0.9:58256" -peer0.org1.example.com | "2019-07-20 02:39:41.563 UTC [protoutils] ValidateProposalMessage -> DEBU 30d ValidateProposalMessage starts for signed proposal 0xc00080fea0" -peer0.org1.example.com | "2019-07-20 02:39:41.563 UTC [protoutils] validateChannelHeader -> DEBU 30e validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 30f begin" -peer0.org1.example.com | "2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 310 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 311 creator is valid" -peer0.org1.example.com | "2019-07-20 02:39:41.565 UTC [msp.identity] Verify -> DEBU 312 Verify: digest = 00000000 5a 8e 92 6a 06 30 e7 d7 67 57 c7 c2 b4 f7 5e 8d |Z..j.0..gW....^.| -peer0.org1.example.com | 00000010 56 2c a1 d1 a0 82 bd 6d e4 ad fe 47 74 a3 d6 f8 |V,.....m...Gt...|" -peer0.org1.example.com | "2019-07-20 02:39:41.565 UTC [msp.identity] Verify -> DEBU 313 Verify: sig = 00000000 30 45 02 21 00 ef f9 f7 e0 6f 5b 7d 18 20 1b 65 |0E.!.....o[}. .e| -peer0.org1.example.com | 00000010 07 1c 95 8e 49 c0 84 12 e2 34 b1 e4 a0 a0 1a b2 |....I....4......| -peer0.org1.example.com | 00000020 4e 6f a3 d2 4c 02 20 40 73 ea cd 61 16 06 b5 66 |No..L. @s..a...f| -peer0.org1.example.com | 00000030 7b 7c 72 a3 7b de 72 ec 4a 2f 66 51 59 2e 2a 27 |{|r.{.r.J/fQY.*'| -peer0.org1.example.com | 00000040 24 e3 64 2a 1b 25 7a |$.d*.%z|" -peer0.org1.example.com | "2019-07-20 02:39:41.565 UTC [protoutils] checkSignatureFromCreator -> DEBU 314 exits successfully" -peer0.org1.example.com | "2019-07-20 02:39:41.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 315 validateChaincodeProposalMessage starts for proposal 0xc0007f5730, header 0xc002fdc2d0" -peer0.org1.example.com | "2019-07-20 02:39:41.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 316 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:39:41.566 UTC [endorser] preProcess -> DEBU 317 [][9eb44deb] processing txid: 9eb44debf4dbdeef1f516cd95779b3765395e4af9bee8f05601a789bd6c76e93" -peer0.org1.example.com | "2019-07-20 02:39:41.566 UTC [endorser] SimulateProposal -> DEBU 318 [][9eb44deb] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:39:41.567 UTC [endorser] callChaincode -> INFO 319 [][9eb44deb] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:39:41.567 UTC [chaincode] Execute -> DEBU 31a Entry" -peer0.org1.example.com | "2019-07-20 02:39:41.567 UTC [cscc] Invoke -> DEBU 31b Invoke function: GetChannels" -peer0.org1.example.com | "2019-07-20 02:39:41.568 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 31c Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:41.568 UTC [msp] Validate -> DEBU 31d MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:41.569 UTC [msp.identity] Verify -> DEBU 31e Verify: digest = 00000000 5a 8e 92 6a 06 30 e7 d7 67 57 c7 c2 b4 f7 5e 8d |Z..j.0..gW....^.| -peer0.org1.example.com | 00000010 56 2c a1 d1 a0 82 bd 6d e4 ad fe 47 74 a3 d6 f8 |V,.....m...Gt...|" -peer0.org1.example.com | "2019-07-20 02:39:41.569 UTC [msp.identity] Verify -> DEBU 31f Verify: sig = 00000000 30 45 02 21 00 ef f9 f7 e0 6f 5b 7d 18 20 1b 65 |0E.!.....o[}. .e| -peer0.org1.example.com | 00000010 07 1c 95 8e 49 c0 84 12 e2 34 b1 e4 a0 a0 1a b2 |....I....4......| -peer0.org1.example.com | 00000020 4e 6f a3 d2 4c 02 20 40 73 ea cd 61 16 06 b5 66 |No..L. @s..a...f| -peer0.org1.example.com | 00000030 7b 7c 72 a3 7b de 72 ec 4a 2f 66 51 59 2e 2a 27 |{|r.{.r.J/fQY.*'| -peer0.org1.example.com | 00000040 24 e3 64 2a 1b 25 7a |$.d*.%z|" -peer0.org1.example.com | "2019-07-20 02:39:41.569 UTC [chaincode] handleMessage -> DEBU 320 [9eb44deb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:39:41.570 UTC [chaincode] Notify -> DEBU 321 [9eb44deb] notifying Txid:9eb44debf4dbdeef1f516cd95779b3765395e4af9bee8f05601a789bd6c76e93, channelID:" -peer0.org1.example.com | "2019-07-20 02:39:41.570 UTC [chaincode] Execute -> DEBU 322 Exit" -peer0.org1.example.com | "2019-07-20 02:39:41.570 UTC [endorser] callChaincode -> INFO 323 [][9eb44deb] Exit chaincode: name:"cscc" (3ms)" -peer0.org1.example.com | "2019-07-20 02:39:41.570 UTC [endorser] SimulateProposal -> DEBU 324 [][9eb44deb] Exit" -peer0.org1.example.com | "2019-07-20 02:39:41.571 UTC [endorser] func1 -> DEBU 325 Exit: request from 172.18.0.9:58256" -peer0.org1.example.com | "2019-07-20 02:39:41.571 UTC [comm.grpc.server] 1 -> INFO 326 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58256 grpc.code=OK grpc.call_duration=8.7801ms -peer0.org1.example.com | "2019-07-20 02:39:41.574 UTC [grpc] warningf -> DEBU 327 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58256: read: connection reset by peer" -peer0.org1.example.com | "2019-07-20 02:39:41.574 UTC [grpc] infof -> DEBU 328 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp] Validate -> DEBU 1f6 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.875 UTC [common.channelconfig] NewStandardValues -> DEBU 1f7 Initializing protos for *channelconfig.ConsortiumProtos" -orderer0.example.com | "2019-07-20 02:39:29.875 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f8 Processing field: ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:29.875 UTC [common.channelconfig] NewStandardValues -> DEBU 1f9 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:29.875 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1fa Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.875 UTC [common.channelconfig] validateMSP -> DEBU 1fb Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp] newBccspMsp -> DEBU 1fc Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp] New -> DEBU 1fd Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp] Setup -> DEBU 1fe Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.877 UTC [msp.identity] newIdentity -> DEBU 1ff Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.881 UTC [msp.identity] newIdentity -> DEBU 200 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.882 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 201 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.882 UTC [msp] Validate -> DEBU 202 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.883 UTC [msp] getCertificationChain -> DEBU 203 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.883 UTC [msp] hasOURole -> DEBU 204 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:29.883 UTC [msp] getCertificationChain -> DEBU 205 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.885 UTC [common.channelconfig] NewStandardValues -> DEBU 206 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:29.885 UTC [common.channelconfig] initializeProtosStruct -> DEBU 207 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.885 UTC [common.channelconfig] validateMSP -> DEBU 208 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.885 UTC [msp] newBccspMsp -> DEBU 209 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.885 UTC [msp] New -> DEBU 20a Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.885 UTC [msp] Setup -> DEBU 20b Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.885 UTC [msp.identity] newIdentity -> DEBU 20c Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.886 UTC [msp.identity] newIdentity -> DEBU 20d Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | "2019-07-20 02:39:41.775 UTC [gossip.election] waitForMembershipStabilization -> DEBU 329 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" -peer0.org1.example.com | "2019-07-20 02:39:41.775 UTC [gossip.election] leaderElection -> DEBU 32a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:39:41.776 UTC [gossip.election] propose -> DEBU 32b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:39:41.777 UTC [gossip.election] propose -> DEBU 32c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:39:41.777 UTC [msp] GetDefaultSigningIdentity -> DEBU 32d Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:41.777 UTC [msp.identity] Sign -> DEBU 32e Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08ECCFA2A2ACA5BFD9151001 " -peer0.org1.example.com | "2019-07-20 02:39:41.778 UTC [msp.identity] Sign -> DEBU 32f Sign: digest: FFE9E552AE6C7A4F25D53AB3CEFBB19AA21287B4B9B72999460F48E10242ADC6 " -peer0.org1.example.com | "2019-07-20 02:39:41.778 UTC [gossip.election] waitForInterrupt -> DEBU 330 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:39:42.252 UTC [endorser] ProcessProposal -> DEBU 331 Entering: request from 172.18.0.9:58264" -peer0.org1.example.com | "2019-07-20 02:39:42.252 UTC [protoutils] ValidateProposalMessage -> DEBU 332 ValidateProposalMessage starts for signed proposal 0xc002fb4870" -peer0.org1.example.com | "2019-07-20 02:39:42.252 UTC [protoutils] validateChannelHeader -> DEBU 333 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 334 begin" -peer0.org1.example.com | "2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 335 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 336 creator is valid" -peer0.org1.example.com | "2019-07-20 02:39:42.253 UTC [msp.identity] Verify -> DEBU 337 Verify: digest = 00000000 9a 3d ec 0b 3e c4 0b 06 5e fa 35 50 17 74 3e 82 |.=..>...^.5P.t>.| -peer0.org1.example.com | 00000010 d3 c3 be d7 3e da 25 f6 3b 02 9b e8 84 33 7f 7b |....>.%.;....3.{|" -peer0.org1.example.com | "2019-07-20 02:39:42.254 UTC [msp.identity] Verify -> DEBU 338 Verify: sig = 00000000 30 45 02 21 00 a9 61 f0 99 8a ce 43 14 e1 1c 16 |0E.!..a....C....| -peer0.org1.example.com | 00000010 26 07 5d cd 53 82 97 2d c1 68 cf 33 c8 5e cb 0e |&.].S..-.h.3.^..| -peer0.org1.example.com | 00000020 45 88 65 20 01 02 20 16 7f 13 06 df 6f 73 35 c7 |E.e .. .....os5.| -peer0.org1.example.com | 00000030 38 a8 a6 8b 1d bc 7f d7 6e 67 e6 a1 53 79 91 79 |8.......ng..Sy.y| -peer0.org1.example.com | 00000040 d2 8d 67 ea 7e f1 66 |..g.~.f|" -peer0.org1.example.com | "2019-07-20 02:39:42.254 UTC [protoutils] checkSignatureFromCreator -> DEBU 339 exits successfully" -peer0.org1.example.com | "2019-07-20 02:39:42.254 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33a validateChaincodeProposalMessage starts for proposal 0xc002a5b9d0, header 0xc002fb4c80" -peer0.org1.example.com | "2019-07-20 02:39:42.254 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33b validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:39:42.255 UTC [endorser] preProcess -> DEBU 33c [][56ee910c] processing txid: 56ee910cdf0a549f26997065466a013cf178582da294f11ebf068c1c75a1c885" -peer0.org1.example.com | "2019-07-20 02:39:42.255 UTC [endorser] SimulateProposal -> DEBU 33d [][56ee910c] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:39:42.255 UTC [endorser] callChaincode -> INFO 33e [][56ee910c] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:39:42.256 UTC [chaincode] Execute -> DEBU 33f Entry" -peer0.org1.example.com | "2019-07-20 02:39:42.256 UTC [qscc] Invoke -> DEBU 340 Invoke function: GetChainInfo on chain: businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:42.256 UTC [aclmgmt] CheckACL -> DEBU 341 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -peer0.org1.example.com | "2019-07-20 02:39:42.257 UTC [aclmgmt] CheckACL -> DEBU 342 acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 343 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 344 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 345 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:42.258 UTC [msp] DeserializeIdentity -> DEBU 346 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:42.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 347 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 348 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151008 " -peer0.org1.example.com | "2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 349 Sign: digest: B47A6DBF8403EA2183512FE112A860C1DDCAD57DAF43878D704F7766BFEE800D " -peer0.org1.example.com | "2019-07-20 02:39:42.263 UTC [msp] GetDefaultSigningIdentity -> DEBU 34a Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 34b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:42.264 UTC [msp.identity] Sign -> DEBU 34c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:42.264 UTC [gossip.discovery] periodicalSendAlive -> DEBU 34d Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:39:42.264 UTC [msp.identity] newIdentity -> DEBU 34e Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.886 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 20e Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.886 UTC [msp] Validate -> DEBU 20f MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.887 UTC [msp] getCertificationChain -> DEBU 210 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.887 UTC [msp] hasOURole -> DEBU 211 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:29.887 UTC [msp] getCertificationChain -> DEBU 212 MSP Org2MSP getting certification chain" -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:42.265 UTC [cauthdsl] func1 -> DEBU 34f 0xc003023250 gate 1563590382265478300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:42.265 UTC [cauthdsl] func2 -> DEBU 350 0xc003023250 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:42.265 UTC [cauthdsl] func2 -> DEBU 351 0xc003023250 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:42.266 UTC [cauthdsl] func2 -> DEBU 352 0xc003023250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-07-20 02:39:42.266 UTC [cauthdsl] func2 -> DEBU 353 0xc003023250 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:42.266 UTC [cauthdsl] func1 -> DEBU 355 0xc003023250 gate 1563590382265478300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 356 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 357 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 358 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:42.266 UTC [gossip.comm] Send -> DEBU 354 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:42.268 UTC [cauthdsl] func1 -> DEBU 359 0xc00303e3d0 gate 1563590382267987800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:42.268 UTC [cauthdsl] func2 -> DEBU 35a 0xc00303e3d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:42.268 UTC [cauthdsl] func2 -> DEBU 35b 0xc00303e3d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:42.268 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 35c Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:42.269 UTC [msp] Validate -> DEBU 35d MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:42.269 UTC [msp] getCertificationChain -> DEBU 35e MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:42.269 UTC [cauthdsl] func2 -> DEBU 35f 0xc00303e3d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:42.270 UTC [msp.identity] Verify -> DEBU 360 Verify: digest = 00000000 9a 3d ec 0b 3e c4 0b 06 5e fa 35 50 17 74 3e 82 |.=..>...^.5P.t>.| -peer0.org1.example.com | 00000010 d3 c3 be d7 3e da 25 f6 3b 02 9b e8 84 33 7f 7b |....>.%.;....3.{|" -peer0.org1.example.com | "2019-07-20 02:39:42.270 UTC [msp.identity] Verify -> DEBU 361 Verify: sig = 00000000 30 45 02 21 00 a9 61 f0 99 8a ce 43 14 e1 1c 16 |0E.!..a....C....| -peer0.org1.example.com | 00000010 26 07 5d cd 53 82 97 2d c1 68 cf 33 c8 5e cb 0e |&.].S..-.h.3.^..| -peer0.org1.example.com | 00000020 45 88 65 20 01 02 20 16 7f 13 06 df 6f 73 35 c7 |E.e .. .....os5.| -peer0.org1.example.com | 00000030 38 a8 a6 8b 1d bc 7f d7 6e 67 e6 a1 53 79 91 79 |8.......ng..Sy.y| -peer0.org1.example.com | 00000040 d2 8d 67 ea 7e f1 66 |..g.~.f|" -peer0.org1.example.com | "2019-07-20 02:39:42.270 UTC [cauthdsl] func2 -> DEBU 362 0xc00303e3d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:42.270 UTC [cauthdsl] func1 -> DEBU 363 0xc00303e3d0 gate 1563590382267987800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:42.270 UTC [policies] Evaluate -> DEBU 364 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [msp] Setup -> DEBU 213 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [msp] Setup -> DEBU 214 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 215 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 216 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 217 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 218 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 219 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21a Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21b Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 220 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 221 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 222 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 223 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 224 Proposed new policy Admins for Channel/Consortiums" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 225 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] GetPolicy -> DEBU 226 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 227 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] GetPolicy -> DEBU 228 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 229 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 234 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 235 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 236 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 237 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 238 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 239 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23a Adding to config map: [Group] /Channel/Consortiums" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 240 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 241 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 242 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 243 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 244 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 245 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 246 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 247 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 248 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -peer0.org1.example.com | "2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 366 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 367 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:42.272 UTC [chaincode] handleMessage -> DEBU 368 [56ee910c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:39:42.272 UTC [chaincode] Notify -> DEBU 369 [56ee910c] notifying Txid:56ee910cdf0a549f26997065466a013cf178582da294f11ebf068c1c75a1c885, channelID:" -peer0.org1.example.com | "2019-07-20 02:39:42.272 UTC [chaincode] Execute -> DEBU 36a Exit" -peer0.org1.example.com | "2019-07-20 02:39:42.272 UTC [endorser] callChaincode -> INFO 36b [][56ee910c] Exit chaincode: name:"qscc" (17ms)" -peer0.org1.example.com | "2019-07-20 02:39:42.273 UTC [endorser] SimulateProposal -> DEBU 36c [][56ee910c] Exit" -peer0.org1.example.com | "2019-07-20 02:39:42.273 UTC [endorser] func1 -> DEBU 36d Exit: request from 172.18.0.9:58264" -peer0.org1.example.com | "2019-07-20 02:39:42.273 UTC [comm.grpc.server] 1 -> INFO 36e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58264 grpc.code=OK grpc.call_duration=21.8975ms -peer0.org1.example.com | "2019-07-20 02:39:42.268 UTC [gossip.comm] sendToEndpoint -> DEBU 36f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:42.274 UTC [gossip.comm] sendToEndpoint -> DEBU 370 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:42.277 UTC [grpc] infof -> DEBU 371 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:42.394 UTC [gossip.gossip] handleMessage -> DEBU 372 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:42.395 UTC [gossip.gossip] handleMessage -> DEBU 373 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:42.395 UTC [gossip.discovery] handleMsgFromComm -> DEBU 374 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:42.396 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 375 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:42.397 UTC [msp.identity] Verify -> DEBU 376 Verify: digest = 00000000 a5 1b 09 b7 08 b7 9c 03 2f a6 f0 6b 53 c6 c5 9c |......../..kS...| -peer0.org1.example.com | 00000010 41 51 dd 5c e7 c0 ad 26 1c 06 3b 81 de 3d 0e a0 |AQ.\...&..;..=..|" -peer0.org1.example.com | "2019-07-20 02:39:42.398 UTC [msp.identity] Verify -> DEBU 377 Verify: sig = 00000000 30 44 02 20 5d 74 cf 2c 50 bf 53 12 05 9d ee c8 |0D. ]t.,P.S.....| -peer0.org1.example.com | 00000010 ef 87 fd 42 b6 dc 2b 60 e1 5f 7e 88 57 7f c5 11 |...B..+`._~.W...| -peer0.org1.example.com | 00000020 9a b1 05 dd 02 20 23 59 85 7e e0 d1 cd 6a e1 0f |..... #Y.~...j..| -peer0.org1.example.com | 00000030 be 9a 3b 26 28 cc 60 b1 ec 74 3e ef ae 9b 1f 8e |..;&(.`..t>.....| -peer0.org1.example.com | 00000040 5b ba d6 c3 03 a6 |[.....|" -peer0.org1.example.com | "2019-07-20 02:39:42.400 UTC [msp.identity] Verify -> DEBU 378 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:39:42.401 UTC [msp.identity] Verify -> DEBU 379 Verify: sig = 00000000 30 45 02 21 00 9e d3 4f 5e 97 be b4 1c 21 7f bc |0E.!...O^....!..| -peer0.org1.example.com | 00000010 f1 e3 02 81 c6 d8 12 53 79 d2 6f ae e8 19 b5 8b |.......Sy.o.....| -peer0.org1.example.com | 00000020 2c ce e9 54 0e 02 20 2e ff 04 83 19 c1 c8 2e c8 |,..T.. .........| -peer0.org1.example.com | 00000030 fd ea e6 14 09 64 bc 58 44 e4 e4 b1 28 69 a9 80 |.....d.XD...(i..| -peer0.org1.example.com | 00000040 83 24 e6 0b b6 c8 ce |.$.....|" -peer0.org1.example.com | "2019-07-20 02:39:42.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 37a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:42.403 UTC [gossip.discovery] learnExistingMembers -> DEBU 37b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:42.403 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:42.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:42.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 37e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:42.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 37f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:42.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 380 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:42.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.269 UTC [gossip.pull] Hello -> DEBU 382 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:44.269 UTC [gossip.comm] Send -> DEBU 383 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:44.269 UTC [gossip.comm] sendToEndpoint -> DEBU 384 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.270 UTC [gossip.comm] sendToEndpoint -> DEBU 385 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.271 UTC [gossip.gossip] handleMessage -> DEBU 386 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.272 UTC [gossip.pull] HandleMessage -> DEBU 387 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.272 UTC [gossip.gossip] handleMessage -> DEBU 388 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.296 UTC [msp] GetDefaultSigningIdentity -> DEBU 389 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:44.297 UTC [msp.identity] Sign -> DEBU 38a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151009 " -peer0.org1.example.com | "2019-07-20 02:39:44.298 UTC [msp.identity] Sign -> DEBU 38b Sign: digest: 038845EEB47CE4E506D2E41DBA8A6D4A6F17B929678EF07AE731EBED65C98BB5 " -peer0.org1.example.com | "2019-07-20 02:39:44.299 UTC [msp] GetDefaultSigningIdentity -> DEBU 38c Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:44.299 UTC [msp.identity] Sign -> DEBU 38d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:44.299 UTC [msp.identity] Sign -> DEBU 38e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:44.300 UTC [gossip.comm] Send -> DEBU 38f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:44.301 UTC [gossip.comm] sendToEndpoint -> DEBU 390 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.301 UTC [gossip.comm] sendToEndpoint -> DEBU 391 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [gossip.gossip] handleMessage -> DEBU 392 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [gossip.gossip] handleMessage -> DEBU 393 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 394 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 395 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 249 Adding to config map: [Policy] /Channel/Consortiums/Admins" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24a Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24b Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24c Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24d Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24e Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24f Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 250 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] Next -> DEBU 251 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] newBlockfileStream -> DEBU 252 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 253 Remaining bytes=[18419], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 254 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 255 blockbytes [18416] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] Next -> DEBU 256 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] newBlockfileStream -> DEBU 257 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 258 Remaining bytes=[18419], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 259 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 25a blockbytes [18416] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 25b Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25c Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25d Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25e Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25f Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 260 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 261 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 262 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 263 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 264 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 265 Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 267 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 268 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 269 Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 26a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 26b Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] validateMSP -> DEBU 26c Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.900 UTC [msp] newBccspMsp -> DEBU 26d Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.901 UTC [msp] New -> DEBU 26e Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.901 UTC [msp] Setup -> DEBU 26f Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:29.913 UTC [msp.identity] newIdentity -> DEBU 270 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.913 UTC [msp.identity] newIdentity -> DEBU 271 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.914 UTC [msp] Validate -> DEBU 272 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.914 UTC [common.channelconfig] NewStandardValues -> DEBU 273 Initializing protos for *channelconfig.ConsortiumProtos" -orderer0.example.com | "2019-07-20 02:39:29.914 UTC [common.channelconfig] initializeProtosStruct -> DEBU 274 Processing field: ChannelCreationPolicy" -peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [msp.identity] Verify -> DEBU 396 Verify: digest = 00000000 03 88 45 ee b4 7c e4 e5 06 d2 e4 1d ba 8a 6d 4a |..E..|........mJ| -peer0.org1.example.com | 00000010 6f 17 b9 29 67 8e f0 7a e7 31 eb ed 65 c9 8b b5 |o..)g..z.1..e...|" -peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [msp.identity] Verify -> DEBU 397 Verify: sig = 00000000 30 44 02 20 2c 5e 12 39 e4 8a 65 db db 52 be 9a |0D. ,^.9..e..R..| -peer0.org1.example.com | 00000010 85 a7 f2 10 0c 0b 84 81 f7 70 a1 5a 46 1d 97 f5 |.........p.ZF...| -peer0.org1.example.com | 00000020 ba c0 06 eb 02 20 4b 56 d0 df 22 55 7b 8e ba ce |..... KV.."U{...| -peer0.org1.example.com | 00000030 05 41 7d 81 85 ac bf 95 33 a8 cd f7 1c 59 64 bc |.A}.....3....Yd.| -peer0.org1.example.com | 00000040 75 1b 07 a1 6b 5b |u...k[|" -peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [msp.identity] Verify -> DEBU 398 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [msp.identity] Verify -> DEBU 399 Verify: sig = 00000000 30 45 02 21 00 a9 d3 a4 08 85 bc cb 81 46 84 81 |0E.!.........F..| -peer0.org1.example.com | 00000010 f2 19 50 05 7a 32 f2 b5 b1 e1 82 b4 73 ed b9 43 |..P.z2......s..C| -peer0.org1.example.com | 00000020 6f d3 06 17 d3 02 20 6f 74 bc e8 59 b2 6b f6 f5 |o..... ot..Y.k..| -peer0.org1.example.com | 00000030 ec a8 c5 7c 79 43 bc 3a 19 8a cf 87 77 ac 54 5d |...|yC.:....w.T]| -peer0.org1.example.com | 00000040 48 83 4d 89 38 91 45 |H.M.8.E|" -peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 39a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [gossip.discovery] isSentByMe -> DEBU 39b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 39c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.391 UTC [gossip.gossip] handleMessage -> DEBU 39e Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.392 UTC [gossip.pull] HandleMessage -> DEBU 39f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.392 UTC [gossip.pull] SendDigest -> DEBU 3a0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:39:44.393 UTC [gossip.gossip] handleMessage -> DEBU 3a1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.394 UTC [gossip.gossip] handleMessage -> DEBU 3a2 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.395 UTC [gossip.gossip] handleMessage -> DEBU 3a3 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.395 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.396 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:44.397 UTC [msp.identity] Verify -> DEBU 3a6 Verify: digest = 00000000 29 00 b3 ff 3d 83 b9 68 9c 7f 8a 4f 6b 81 ac ef |)...=..h...Ok...| -peer0.org1.example.com | 00000010 0b cf 38 fc 45 3f 6a e7 04 f6 75 cb 3a 55 56 ad |..8.E?j...u.:UV.|" -peer0.org1.example.com | "2019-07-20 02:39:44.398 UTC [msp.identity] Verify -> DEBU 3a7 Verify: sig = 00000000 30 44 02 20 4d 2a 70 d2 c2 ad 05 12 2e 74 b9 a0 |0D. M*p......t..| -peer0.org1.example.com | 00000010 3c 86 a2 b5 e1 fa c9 69 23 de 37 cb 7e 2d ee 54 |<......i#.7.~-.T| -peer0.org1.example.com | 00000020 00 9b bd 8d 02 20 7f ae cb 63 88 97 ae 11 9d 19 |..... ...c......| -peer0.org1.example.com | 00000030 d6 9b cc 28 8c e5 35 00 e8 1b b1 81 4b 9e 22 e8 |...(..5.....K.".| -peer0.org1.example.com | 00000040 96 17 a6 dd bb e4 |......|" -peer0.org1.example.com | "2019-07-20 02:39:44.399 UTC [msp.identity] Verify -> DEBU 3a8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:39:44.399 UTC [msp.identity] Verify -> DEBU 3a9 Verify: sig = 00000000 30 45 02 21 00 bb 9f 6b 01 a7 03 0f 80 54 b5 50 |0E.!...k.....T.P| -peer0.org1.example.com | 00000010 b8 b3 2e 2b 38 36 7a 6b fa 0c b9 64 5c b6 47 78 |...+86zk...d\.Gx| -peer0.org1.example.com | 00000020 1a 84 a1 ce a3 02 20 36 e1 01 70 16 0f e5 3d 60 |...... 6..p...=`| -peer0.org1.example.com | 00000030 81 a2 55 df 4e 77 4c b1 a8 cc 73 72 b6 d1 22 6d |..U.NwL...sr.."m| -peer0.org1.example.com | 00000040 e6 25 93 37 29 c5 3d |.%.7).=|" -peer0.org1.example.com | "2019-07-20 02:39:44.400 UTC [gossip.discovery] handleAliveMessage -> DEBU 3aa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -orderer0.example.com | "2019-07-20 02:39:29.914 UTC [common.channelconfig] NewStandardValues -> DEBU 275 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:29.914 UTC [common.channelconfig] initializeProtosStruct -> DEBU 276 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.914 UTC [common.channelconfig] validateMSP -> DEBU 277 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.914 UTC [msp] newBccspMsp -> DEBU 278 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.914 UTC [msp] New -> DEBU 279 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.914 UTC [msp] Setup -> DEBU 27a Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.915 UTC [msp.identity] newIdentity -> DEBU 27b Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.915 UTC [msp.identity] newIdentity -> DEBU 27c Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.915 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 27d Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.915 UTC [msp] Validate -> DEBU 27e MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] getCertificationChain -> DEBU 27f MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] hasOURole -> DEBU 280 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] getCertificationChain -> DEBU 281 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.916 UTC [common.channelconfig] NewStandardValues -> DEBU 282 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:29.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 283 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:29.916 UTC [common.channelconfig] validateMSP -> DEBU 284 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] newBccspMsp -> DEBU 285 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] New -> DEBU 286 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] Setup -> DEBU 287 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp.identity] newIdentity -> DEBU 288 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp.identity] newIdentity -> DEBU 289 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | "2019-07-20 02:39:44.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ac updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ae Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3af Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b0 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] sendMemResponse -> DEBU 3b2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.comm] Send -> DEBU 3b3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] sendMemResponse -> DEBU 3b4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > alive:\316\367\016A]\027\374i\355.\302v\372\204\340\306D\320\211Z\305\223\232\002 rH]\370\312\310\322\022\010\323\244<\000;\003\362\030\302O\017g\030\252.WV\320pr0\343\203" > > " -peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.comm] sendToEndpoint -> DEBU 3b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.753 UTC [gossip.comm] Send -> DEBU 3b7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:44.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.755 UTC [gossip.comm] Send -> DEBU 3ba Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:44.755 UTC [gossip.comm] sendToEndpoint -> DEBU 3bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.755 UTC [gossip.comm] sendToEndpoint -> DEBU 3bc Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.756 UTC [gossip.gossip] handleMessage -> DEBU 3bd Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.757 UTC [msp.identity] Verify -> DEBU 3be Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| -peer0.org1.example.com | 00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" -peer0.org1.example.com | "2019-07-20 02:39:44.757 UTC [msp.identity] Verify -> DEBU 3bf Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| -peer0.org1.example.com | 00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| -peer0.org1.example.com | 00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| -peer0.org1.example.com | 00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| -peer0.org1.example.com | 00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" -peer0.org1.example.com | "2019-07-20 02:39:44.760 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:44.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:44.763 UTC [policies] Evaluate -> DEBU 3c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:44.763 UTC [policies] Evaluate -> DEBU 3c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:44.764 UTC [policies] Evaluate -> DEBU 3c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:44.764 UTC [msp] DeserializeIdentity -> DEBU 3c5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:44.765 UTC [msp.identity] newIdentity -> DEBU 3c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 28a Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] Validate -> DEBU 28b MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] getCertificationChain -> DEBU 28c MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] hasOURole -> DEBU 28d MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] getCertificationChain -> DEBU 28e MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] Setup -> DEBU 28f Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [msp] Setup -> DEBU 290 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 291 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 292 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 293 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 294 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 295 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 296 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 297 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 298 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 299 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29a Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29b Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29e Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 29f Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a0 Proposed new policy Admins for Channel/Consortiums" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] GetPolicy -> DEBU 2a1 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a2 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a3 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] GetPolicy -> DEBU 2a4 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a5 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b2 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b4 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b5 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b6 Adding to config map: [Group] /Channel/Consortiums" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b7 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ba Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2be Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2bf Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c5 Adding to config map: [Policy] /Channel/Consortiums/Admins" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c6 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c8 Adding to config map: [Value] /Channel/OrdererAddresses" -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:44.766 UTC [cauthdsl] func1 -> DEBU 3c7 0xc003081da0 gate 1563590384766279600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:44.766 UTC [cauthdsl] func2 -> DEBU 3c8 0xc003081da0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3c9 0xc003081da0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3ca 0xc003081da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3cb 0xc003081da0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:44.768 UTC [cauthdsl] func1 -> DEBU 3cc 0xc003081da0 gate 1563590384766279600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3cd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:44.770 UTC [cauthdsl] func1 -> DEBU 3d0 0xc0030c2f20 gate 1563590384770142000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:44.770 UTC [cauthdsl] func2 -> DEBU 3d1 0xc0030c2f20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:44.770 UTC [cauthdsl] func2 -> DEBU 3d2 0xc0030c2f20 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:44.771 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d3 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:44.771 UTC [msp] Validate -> DEBU 3d4 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:44.771 UTC [msp] getCertificationChain -> DEBU 3d5 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:44.772 UTC [cauthdsl] func2 -> DEBU 3d6 0xc0030c2f20 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:44.772 UTC [msp.identity] Verify -> DEBU 3d7 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| -peer0.org1.example.com | 00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" -peer0.org1.example.com | "2019-07-20 02:39:44.773 UTC [msp.identity] Verify -> DEBU 3d8 Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| -peer0.org1.example.com | 00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| -peer0.org1.example.com | 00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| -peer0.org1.example.com | 00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| -peer0.org1.example.com | 00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" -peer0.org1.example.com | "2019-07-20 02:39:44.773 UTC [cauthdsl] func2 -> DEBU 3d9 0xc0030c2f20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:44.773 UTC [cauthdsl] func1 -> DEBU 3da 0xc0030c2f20 gate 1563590384770142000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:44.773 UTC [policies] Evaluate -> DEBU 3db Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3dd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:44.775 UTC [gossip.gossip] handleMessage -> DEBU 3df Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.913 UTC [gossip.gossip] handleMessage -> DEBU 3e0 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.913 UTC [gossip.gossip] handleMessage -> DEBU 3e1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.914 UTC [gossip.gossip] handleMessage -> DEBU 3e2 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.914 UTC [gossip.pull] HandleMessage -> DEBU 3e3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.915 UTC [gossip.gossip] handleMessage -> DEBU 3e4 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:44.916 UTC [gossip.gossip] handleMessage -> DEBU 3e5 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:44.916 UTC [msp.identity] Verify -> DEBU 3e6 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| -peer0.org1.example.com | 00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" -peer0.org1.example.com | "2019-07-20 02:39:44.916 UTC [msp.identity] Verify -> DEBU 3e7 Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| -peer0.org1.example.com | 00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| -peer0.org1.example.com | 00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| -peer0.org1.example.com | 00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| -peer0.org1.example.com | 00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" -peer0.org1.example.com | "2019-07-20 02:39:44.917 UTC [gossip.gossip] handleMessage -> DEBU 3e8 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:45.756 UTC [gossip.channel] reportMembershipChanges -> INFO 3e9 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" -peer0.org1.example.com | "2019-07-20 02:39:46.780 UTC [gossip.election] waitForInterrupt -> DEBU 3ea c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.781 UTC [gossip.election] beLeader -> INFO 3eb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" -peer0.org1.example.com | "2019-07-20 02:39:46.781 UTC [gossip.service] func1 -> INFO 3ec Elected as a leader, starting delivery service for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:46.782 UTC [deliveryClient] StartDeliverForChannel -> DEBU 3ed This peer will pass blocks from orderer service to other peers for channel businesschannel" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c9 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2ca Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2cb Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2cc Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.channelconfig] LogSanityChecks -> DEBU 2cd As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ce As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-07-20 02:39:29.924 UTC [policies] Manager -> DEBU 2cf Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d0 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d1 Manager Channel has managers Consortiums" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d2 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d3 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d4 Manager Channel has managers Consortiums" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d5 Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d6 Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d7 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d8 As expected, current configuration has policy '/Channel/Orderer/Admins'" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d9 As expected, current configuration has policy '/Channel/Orderer/Writers'" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2da As expected, current configuration has policy '/Channel/Orderer/Readers'" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.capabilities] Supported -> DEBU 2db Orderer capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.capabilities] Supported -> DEBU 2dc Channel capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:29.925 UTC [orderer.common.server] func1 -> DEBU 2dd Executing callback to update root CAs" -orderer0.example.com | "2019-07-20 02:39:29.926 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2de updating root CAs for channel [testchainid]" -orderer0.example.com | "2019-07-20 02:39:29.926 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2df adding app root CAs for MSP [Org2MSP]" -orderer0.example.com | "2019-07-20 02:39:29.927 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e0 adding orderer root CAs for MSP [OrdererMSP]" -orderer0.example.com | "2019-07-20 02:39:29.927 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e1 adding app root CAs for MSP [Org1MSP]" -orderer0.example.com | "2019-07-20 02:39:29.928 UTC [fsblkstorage] Next -> DEBU 2e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-07-20 02:39:29.930 UTC [fsblkstorage] newBlockfileStream -> DEBU 2e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e4 Remaining bytes=[18419], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e5 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e6 blockbytes [18416] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:29.930 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2e7 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" -orderer0.example.com | "2019-07-20 02:39:29.930 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2e8 EvictionSuspicion not set, defaulting to 10m0s" -orderer0.example.com | "2019-07-20 02:39:29.931 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2e9 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.931 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2ea No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.939 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2eb Loading WAL at Term 0 and Index 0" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ec Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ed Appending 0 entries to memory storage" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] Next -> DEBU 2ee Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] newBlockfileStream -> DEBU 2ef newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f0 Remaining bytes=[18419], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f1 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f2 blockbytes [18416] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2f3 [channel: testchainid] Done creating channel support resources" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2f4 Creating system channel msg processor for channel testchainid" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] Next -> DEBU 2f5 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] newBlockfileStream -> DEBU 2f6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f7 Remaining bytes=[18419], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f8 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f9 blockbytes [18416] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.commmon.multichannel] Initialize -> INFO 2fa Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] Start -> INFO 2fb Starting Raft node" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.common.cluster] Configure -> INFO 2fc Entering, channel: testchainid, nodes: [ID: 2, -orderer0.example.com | Endpoint: orderer1.example.com:7050, -orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -peer0.org1.example.com | "2019-07-20 02:39:46.782 UTC [gossip.election] leaderElection -> DEBU 3ee c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.782 UTC [gossip.election] IsLeader -> DEBU 3ef c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:39:46.782 UTC [ConnProducer] NewConnection -> DEBU 3f0 Creating a new connection" -peer0.org1.example.com | "2019-07-20 02:39:46.782 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f1 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:46.783 UTC [msp.identity] Sign -> DEBU 3f2 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510021801 " -peer0.org1.example.com | "2019-07-20 02:39:46.783 UTC [msp.identity] Sign -> DEBU 3f3 Sign: digest: 1432909845E8D004A1C68176560DDCFBA5B49F384912BA88B279E39B18E3C1AA " -peer0.org1.example.com | "2019-07-20 02:39:46.783 UTC [gossip.election] waitForInterrupt -> DEBU 3f4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:39:46.784 UTC [grpc] DialContext -> DEBU 3f5 parsed scheme: """ -peer0.org1.example.com | "2019-07-20 02:39:46.784 UTC [grpc] DialContext -> DEBU 3f6 scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-07-20 02:39:46.785 UTC [grpc] watcher -> DEBU 3f7 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" -peer0.org1.example.com | "2019-07-20 02:39:46.785 UTC [grpc] switchBalancer -> DEBU 3f8 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-07-20 02:39:46.785 UTC [grpc] HandleSubConnStateChange -> DEBU 3f9 pickfirstBalancer: HandleSubConnStateChange: 0xc003124010, CONNECTING" -peer0.org1.example.com | "2019-07-20 02:39:46.786 UTC [gossip.comm] Send -> DEBU 3fa Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:46.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:46.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fc Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.793 UTC [grpc] HandleSubConnStateChange -> DEBU 3fd pickfirstBalancer: HandleSubConnStateChange: 0xc003124010, READY" -peer0.org1.example.com | "2019-07-20 02:39:46.793 UTC [ConnProducer] NewConnection -> DEBU 3fe Connected to {orderer2.example.com:7050 [OrdererMSP]}" -peer0.org1.example.com | "2019-07-20 02:39:46.794 UTC [deliveryClient] connect -> DEBU 3ff Connected to orderer2.example.com:7050" -peer0.org1.example.com | "2019-07-20 02:39:46.794 UTC [deliveryClient] connect -> DEBU 400 Establishing gRPC stream with orderer2.example.com:7050 ..." -peer0.org1.example.com | "2019-07-20 02:39:46.795 UTC [deliveryClient] afterConnect -> DEBU 401 Entering" -peer0.org1.example.com | "2019-07-20 02:39:46.795 UTC [deliveryClient] RequestBlocks -> DEBU 402 Starting deliver with block [1] for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:46.795 UTC [msp] GetDefaultSigningIdentity -> DEBU 403 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:46.796 UTC [msp] GetDefaultSigningIdentity -> DEBU 404 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:46.796 UTC [msp.identity] Sign -> DEBU 405 Sign: plaintext: 0A91070A3D08051A0608F2FDC9E90522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " -peer0.org1.example.com | "2019-07-20 02:39:46.796 UTC [msp.identity] Sign -> DEBU 406 Sign: digest: 953E55B39D6C84B1B8FAB1F76B5216C49716B7C4798A7B67FEFC0A262BE8C43D " -peer0.org1.example.com | "2019-07-20 02:39:46.797 UTC [deliveryClient] afterConnect -> DEBU 407 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 408 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 409 Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [msp] DeserializeIdentity -> DEBU 40d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:46.800 UTC [msp.identity] newIdentity -> DEBU 40e Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJ9PiwMc+yJquw7iESWUUdgwCgYIKoZIzj0EAwIwaTEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -peer0.org1.example.com | CCqGSM49AwEHA0IABJFXeJu8Bn4343K9C/p5zMXGWMf7TRDkm1QTRArOtt2UcwjS -peer0.org1.example.com | hELr0NUrXJ9/itxePp5kcNe1A/SPXSlVbZJb7zyjTTBLMA4GA1UdDwEB/wQEAwIH -peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIBQFxbpf0MCh/Pc/loudY4Bg -peer0.org1.example.com | rIfa+QF858Ffm7hagVV9AiB7x5vl9mUFXWvFJffvBYw0mnUxe0HmAS0C7cpoHJbC -peer0.org1.example.com | dg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [cauthdsl] func1 -> DEBU 40f 0xc0031ba1c0 gate 1563590386800569000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 410 0xc0031ba1c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 411 0xc0031ba1c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 412 Checking if identity satisfies MEMBER role for OrdererMSP" -peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [msp] Validate -> DEBU 413 MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 414 0xc0031ba1c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:46.802 UTC [msp.identity] Verify -> DEBU 415 Verify: digest = 00000000 2a 51 2b 81 9b 58 5f 83 5d 96 56 e0 0c 32 21 62 |*Q+..X_.].V..2!b| -peer0.org1.example.com | 00000010 51 5a 0e 98 23 59 6f 1b 20 3f 1e 94 dd bf e4 00 |QZ..#Yo. ?......|" -peer0.org1.example.com | "2019-07-20 02:39:46.802 UTC [msp.identity] Verify -> DEBU 416 Verify: sig = 00000000 30 45 02 21 00 d6 1f 11 02 a7 d0 fb c5 bd 4f 88 |0E.!..........O.| -peer0.org1.example.com | 00000010 bd ba 48 48 a1 d7 47 1e c2 f0 aa b8 2b b7 60 6b |..HH..G.....+.`k| -peer0.org1.example.com | 00000020 4f 91 ce 17 f8 02 20 03 5d 63 03 23 45 9d dd f2 |O..... .]c.#E...| -peer0.org1.example.com | 00000030 bc 8e ca bd 37 2f 00 73 99 d4 41 bd f1 dd ac 4d |....7/.s..A....M| -peer0.org1.example.com | 00000040 73 6a 36 c3 77 b4 7e |sj6.w.~|" -peer0.org1.example.com | "2019-07-20 02:39:46.802 UTC [cauthdsl] func2 -> DEBU 417 0xc0031ba1c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:46.802 UTC [cauthdsl] func1 -> DEBU 418 0xc0031ba1c0 gate 1563590386800569000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:46.802 UTC [policies] Evaluate -> DEBU 419 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41b Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [blocksProvider] DeliverBlocks -> DEBU 41d [businesschannel] Adding payload to local buffer, blockNum = [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.state] addPayload -> DEBU 41e [businesschannel] Adding payload to local buffer, blockNum = [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.state] deliverPayloads -> DEBU 41f [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.state] deliverPayloads -> DEBU 420 [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.privdata] StoreBlock -> INFO 421 [businesschannel] Received block [1] from buffer" -peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.privdata] StoreBlock -> DEBU 422 [businesschannel] Validating block [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [committer.txvalidator] Validate -> DEBU 423 [businesschannel] START Block Validation for block [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.805 UTC [committer.txvalidator] Validate -> DEBU 424 expecting 1 block validation responses" -peer0.org1.example.com | "2019-07-20 02:39:46.805 UTC [committer.txvalidator] validateTx -> DEBU 425 [businesschannel] validateTx starts for block 0xc0030867c0 env 0xc0030ee6e0 txn 0" -peer0.org1.example.com | "2019-07-20 02:39:46.805 UTC [protoutils] ValidateTransaction -> DEBU 426 ValidateTransactionEnvelope starts for envelope 0xc0030ee6e0" -peer0.org1.example.com | "2019-07-20 02:39:46.805 UTC [protoutils] ValidateTransaction -> DEBU 427 Header is channel_header:"\010\001\032\006\010\357\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\260\250\350f)\323l\022\2223\341\343\230\3354p\225\t9t\013\330h\271" " -peer0.org1.example.com | "2019-07-20 02:39:46.806 UTC [protoutils] validateChannelHeader -> DEBU 428 validateChannelHeader info: header type 1" -peer0.org1.example.com | "2019-07-20 02:39:46.806 UTC [protoutils] checkSignatureFromCreator -> DEBU 429 begin" -peer0.org1.example.com | "2019-07-20 02:39:46.806 UTC [msp] GetManagerForChain -> DEBU 42a Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:39:46.806 UTC [msp] DeserializeIdentity -> DEBU 42b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:46.806 UTC [msp.identity] newIdentity -> DEBU 42c Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -peer0.org1.example.com | QQ== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 42d creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -peer0.org1.example.com | "2019-07-20 02:39:46.807 UTC [msp] Validate -> DEBU 42e MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:46.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 42f creator is valid" -peer0.org1.example.com | "2019-07-20 02:39:46.807 UTC [msp.identity] Verify -> DEBU 430 Verify: digest = 00000000 25 35 ec 33 45 77 c7 37 be bb 38 55 c9 64 6e df |%5.3Ew.7..8U.dn.| -orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | ID: 3, -orderer0.example.com | Endpoint: orderer2.example.com:7050, -orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | ]" -orderer0.example.com | "2019-07-20 02:39:29.941 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fd Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" -orderer0.example.com | "2019-07-20 02:39:29.943 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fe Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" -orderer0.example.com | "2019-07-20 02:39:29.944 UTC [orderer.common.cluster] func1 -> DEBU 2ff Connecting to ID: 2, -orderer0.example.com | Endpoint: orderer1.example.com:7050, -orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -peer0.org1.example.com | 00000010 0b 2d 1f d1 fc fc dd 1e 86 21 54 a6 54 c9 a8 da |.-.......!T.T...|" -peer0.org1.example.com | "2019-07-20 02:39:46.807 UTC [msp.identity] Verify -> DEBU 431 Verify: sig = 00000000 30 44 02 20 3b b3 0e 3c 0b b2 75 13 96 13 37 4c |0D. ;..<..u...7L| -peer0.org1.example.com | 00000010 0c d1 15 d4 40 ff 19 4a 13 ea 8f bd 76 a7 c0 b5 |....@..J....v...| -peer0.org1.example.com | 00000020 aa c5 7c 6a 02 20 62 6a 7d 0c 2b df ed 05 f1 26 |..|j. bj}.+....&| -peer0.org1.example.com | 00000030 6f af 79 9f 81 51 a7 54 83 81 b0 f1 ee 43 39 b1 |o.y..Q.T.....C9.| -peer0.org1.example.com | 00000040 dd aa 68 72 78 34 |..hrx4|" -peer0.org1.example.com | "2019-07-20 02:39:46.808 UTC [protoutils] checkSignatureFromCreator -> DEBU 432 exits successfully" -peer0.org1.example.com | "2019-07-20 02:39:46.808 UTC [protoutils] validateConfigTransaction -> DEBU 433 validateConfigTransaction starts for data 0xc0031de000, header channel_header:"\010\001\032\006\010\357\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030\260\250\350f)\323l\022\2223\341\343\230\3354p\225\t9t\013\330h\271" " -peer0.org1.example.com | "2019-07-20 02:39:46.808 UTC [committer.txvalidator] validateTx -> DEBU 434 Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 435 Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 436 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 437 Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 438 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 439 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43d Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 43e Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 43f Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 440 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 441 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 442 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 443 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 444 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 445 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [common.configtx] verifyDeltaSet -> DEBU 446 Processing change to key: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [common.configtx] policyForItem -> DEBU 447 Getting policy for item Org1MSP with mod_policy Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 448 Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 449 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44a Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44b Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44c Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44d Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44e Manager Channel/Application looking up path [Org1MSP]" -peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44f Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [policies] Manager -> DEBU 450 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [policies] Manager -> DEBU 451 Manager Channel/Application/Org1MSP looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [policies] Evaluate -> DEBU 452 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [cauthdsl] func1 -> DEBU 453 0xc00320f870 gate 1563590386812191300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 454 0xc00320f870 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 455 0xc00320f870 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 456 Checking if identity satisfies ADMIN role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 457 0xc00320f870 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [msp.identity] Verify -> DEBU 458 Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| -peer0.org1.example.com | 00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" -peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [msp.identity] Verify -> DEBU 459 Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| -peer0.org1.example.com | 00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| -peer0.org1.example.com | 00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| -peer0.org1.example.com | 00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| -peer0.org1.example.com | 00000040 b4 14 85 f1 cd 6f 15 |.....o.|" -peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [cauthdsl] func2 -> DEBU 45a 0xc00320f870 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [cauthdsl] func1 -> DEBU 45b 0xc00320f870 gate 1563590386812191300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [policies] Evaluate -> DEBU 45c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [policies] Evaluate -> DEBU 45d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [common.configtx] verifyDeltaSet -> DEBU 45e Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 45f Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 460 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 462 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 463 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.state] addPayload -> DEBU 465 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [blocksProvider] DeliverBlocks -> DEBU 466 [businesschannel] Gossiping block [1], peers number [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.815 UTC [gossip.channel] AddToMsgStore -> DEBU 467 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-07-20 02:39:46.815 UTC [gossip.pull] Add -> DEBU 468 Added 1, total items: 1" -peer0.org1.example.com | "2019-07-20 02:39:46.816 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 469 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:46.816 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 46a Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:46.816 UTC [policies] Evaluate -> DEBU 46b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [policies] Evaluate -> DEBU 46c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [policies] Evaluate -> DEBU 46d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [cauthdsl] func1 -> DEBU 46e 0xc003223060 gate 1563590386817258300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 46f 0xc003223060 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 470 0xc003223060 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 471 0xc003223060 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 464 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [common.configtx] recurseConfigMap -> DEBU 472 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [common.configtx] recurseConfigMap -> DEBU 473 Setting policy for key Readers to " -peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 474 Setting policy for key Writers to " -peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 475 Setting policy for key Admins to " -peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 476 Setting policy for key Endorsement to " -peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 477 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 478 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 479 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47a Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47c Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47d Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47e Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47f Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 480 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 481 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 482 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.channelconfig] NewStandardValues -> DEBU 483 Initializing protos for *channelconfig.ChannelProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 484 Processing field: HashingAlgorithm" -peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 485 Processing field: BlockDataHashingStructure" -peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 486 Processing field: OrdererAddresses" -peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 487 Processing field: Consortium" -peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 488 Processing field: Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] NewStandardValues -> DEBU 489 Initializing protos for *channelconfig.ApplicationProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48a Processing field: ACLs" -peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [msp.identity] Verify -> DEBU 48b Verify: digest = 00000000 ec 21 1e f7 b6 5d f6 9d 41 b5 b2 a5 30 d2 80 0c |.!...]..A...0...| -peer0.org1.example.com | 00000010 19 82 c6 dc a3 34 8b 5b ca 65 18 81 5a 92 65 b6 |.....4.[.e..Z.e.|" -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | for channel testchainid" -orderer0.example.com | "2019-07-20 02:39:29.944 UTC [grpc] DialContext -> DEBU 300 parsed scheme: """ -orderer0.example.com | "2019-07-20 02:39:29.944 UTC [grpc] DialContext -> DEBU 301 scheme "" not registered, fallback to default scheme" -orderer0.example.com | "2019-07-20 02:39:29.945 UTC [grpc] watcher -> DEBU 302 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" -orderer0.example.com | "2019-07-20 02:39:29.945 UTC [grpc] switchBalancer -> DEBU 303 ClientConn switching balancer to "pick_first"" -orderer0.example.com | "2019-07-20 02:39:29.945 UTC [grpc] HandleSubConnStateChange -> DEBU 304 pickfirstBalancer: HandleSubConnStateChange: 0xc00029c220, CONNECTING" -orderer0.example.com | "2019-07-20 02:39:29.945 UTC [orderer.common.cluster] updateStubInMapping -> INFO 305 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" -orderer0.example.com | "2019-07-20 02:39:29.952 UTC [orderer.common.cluster] updateStubInMapping -> INFO 306 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" -orderer0.example.com | "2019-07-20 02:39:29.952 UTC [orderer.common.cluster] func1 -> DEBU 307 Connecting to ID: 3, -orderer0.example.com | Endpoint: orderer2.example.com:7050, -peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [msp.identity] Verify -> DEBU 48c Verify: sig = 00000000 30 44 02 20 68 ec 42 5d 5b 55 ae b4 32 48 79 cd |0D. h.B][U..2Hy.| -peer0.org1.example.com | 00000010 90 85 a8 26 03 4b d1 24 88 ba a3 5a 56 1c bb d5 |...&.K.$...ZV...| -peer0.org1.example.com | 00000020 bc ec 81 46 02 20 35 65 1b 5e 90 17 74 6e 3d 5e |...F. 5e.^..tn=^| -peer0.org1.example.com | 00000030 14 9b c7 91 dd b6 7f 47 59 b9 98 de 50 3a 29 32 |.......GY...P:)2| -peer0.org1.example.com | 00000040 1d bc 73 d9 73 c0 |..s.s.|" -peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48d Processing field: Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [common.channelconfig] NewStandardValues -> DEBU 48e Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 490 Processing field: AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [cauthdsl] func2 -> DEBU 48f 0xc003223060 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [cauthdsl] func1 -> DEBU 491 0xc003223060 gate 1563590386817258300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [common.channelconfig] NewStandardValues -> DEBU 492 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [policies] Evaluate -> DEBU 494 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 495 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [common.channelconfig] initializeProtosStruct -> DEBU 493 Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 496 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 497 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [blocksProvider] DeliverBlocks -> DEBU 498 [businesschannel] Adding payload to local buffer, blockNum = [2]" -peer0.org1.example.com | "2019-07-20 02:39:46.823 UTC [gossip.state] addPayload -> DEBU 49a [businesschannel] Adding payload to local buffer, blockNum = [2]" -peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [common.channelconfig] Validate -> DEBU 499 Anchor peers for org Org1MSP are anchor_peers: " -peer0.org1.example.com | "2019-07-20 02:39:46.823 UTC [common.channelconfig] validateMSP -> DEBU 49b Setting up MSP for org Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.823 UTC [gossip.state] addPayload -> DEBU 49c Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-07-20 02:39:46.823 UTC [msp] newBccspMsp -> DEBU 49d Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.824 UTC [msp] New -> DEBU 49e Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.823 UTC [blocksProvider] DeliverBlocks -> DEBU 49f [businesschannel] Gossiping block [2], peers number [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.824 UTC [gossip.channel] AddToMsgStore -> DEBU 4a0 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-07-20 02:39:46.824 UTC [gossip.pull] Add -> DEBU 4a1 Added 2, total items: 2" -peer0.org1.example.com | "2019-07-20 02:39:46.824 UTC [msp] Setup -> DEBU 4a2 Setting up MSP instance Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.825 UTC [msp.identity] newIdentity -> DEBU 4a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.825 UTC [msp.identity] newIdentity -> DEBU 4a4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.826 UTC [gossip.comm] Send -> DEBU 4a5 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:46.826 UTC [gossip.comm] Send -> DEBU 4a6 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:46.826 UTC [gossip.comm] sendToEndpoint -> DEBU 4a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:46.826 UTC [gossip.comm] sendToEndpoint -> DEBU 4a8 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.827 UTC [gossip.comm] sendToEndpoint -> DEBU 4a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:46.827 UTC [gossip.comm] sendToEndpoint -> DEBU 4aa Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.828 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4ab Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.828 UTC [msp] Validate -> DEBU 4ac MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:46.828 UTC [msp] getCertificationChain -> DEBU 4ad MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [msp] hasOURole -> DEBU 4ae MSP Org1MSP checking if the identity is a client" -peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [msp] getCertificationChain -> DEBU 4af MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] NewStandardValues -> DEBU 4b0 Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b1 Processing field: AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] NewStandardValues -> DEBU 4b2 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b3 Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] Validate -> DEBU 4b4 Anchor peers for org Org2MSP are " -peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] validateMSP -> DEBU 4b5 Setting up MSP for org Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [msp] newBccspMsp -> DEBU 4b6 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [msp] New -> DEBU 4b7 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [msp] Setup -> DEBU 4b8 Setting up MSP instance Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp.identity] newIdentity -> DEBU 4b9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | for channel testchainid" -orderer0.example.com | "2019-07-20 02:39:29.955 UTC [grpc] DialContext -> DEBU 308 parsed scheme: """ -orderer0.example.com | "2019-07-20 02:39:29.955 UTC [grpc] DialContext -> DEBU 309 scheme "" not registered, fallback to default scheme" -orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 30a 2 exists in both old and new membership for channel testchainid , skipping its deactivation" -orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 30b 3 exists in both old and new membership for channel testchainid , skipping its deactivation" -orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.common.cluster] Configure -> INFO 30c Exiting" -orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] start -> DEBU 30d Starting raft node: #peers: 3" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] start -> INFO 30e Starting raft node as part of a new channel" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 30f 1 became follower at term 0" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] newRaft -> INFO 310 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 311 1 became follower at term 1" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.962 UTC [orderer.common.server] Start -> INFO 312 Starting orderer: -orderer0.example.com | Version: 1.4.2 -orderer0.example.com | Commit SHA: development build -orderer0.example.com | Go version: go1.12.7 -orderer0.example.com | OS/Arch: linux/amd64" -orderer0.example.com | "2019-07-20 02:39:29.962 UTC [orderer.common.server] Start -> INFO 313 Beginning to serve requests" -orderer0.example.com | "2019-07-20 02:39:29.970 UTC [grpc] watcher -> DEBU 314 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" -orderer0.example.com | "2019-07-20 02:39:29.971 UTC [grpc] switchBalancer -> DEBU 315 ClientConn switching balancer to "pick_first"" -orderer0.example.com | "2019-07-20 02:39:29.971 UTC [grpc] HandleSubConnStateChange -> DEBU 316 pickfirstBalancer: HandleSubConnStateChange: 0xc00029c240, CONNECTING" -orderer0.example.com | "2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 317 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 318 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 319 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:30.015 UTC [grpc] HandleSubConnStateChange -> DEBU 31a pickfirstBalancer: HandleSubConnStateChange: 0xc00029c220, READY" -orderer0.example.com | "2019-07-20 02:39:30.040 UTC [grpc] HandleSubConnStateChange -> DEBU 31b pickfirstBalancer: HandleSubConnStateChange: 0xc00029c240, READY" -orderer0.example.com | "2019-07-20 02:39:31.007 UTC [orderer.common.cluster] Step -> DEBU 31c Connection from orderer2.example.com(172.18.0.4:54782)" -orderer0.example.com | "2019-07-20 02:39:31.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:31.008 UTC [orderer.consensus.etcdraft] Step -> INFO 31e 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:31.008 UTC [orderer.common.cluster] NewStream -> DEBU 31f Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" -orderer0.example.com | "2019-07-20 02:39:31.008 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 320 Sending msg of 28 bytes to 3 on channel testchainid took 89µs" -orderer0.example.com | "2019-07-20 02:39:31.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " -orderer0.example.com | "2019-07-20 02:39:31.010 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] Step -> INFO 323 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 324 1 became follower at term 2" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] Step -> INFO 325 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:31.011 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 326 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" -orderer0.example.com | "2019-07-20 02:39:31.012 UTC [orderer.common.cluster.step] sendMessage -> DEBU 327 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.8µs " -orderer0.example.com | "2019-07-20 02:39:31.014 UTC [orderer.common.cluster.step] handleMessage -> DEBU 328 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 36" -orderer0.example.com | "2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] run -> INFO 329 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp.identity] newIdentity -> DEBU 4ba Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4bb Checking if identity satisfies role [CLIENT] for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp] Validate -> DEBU 4bc MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp] getCertificationChain -> DEBU 4bd MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp] hasOURole -> DEBU 4be MSP Org2MSP checking if the identity is a client" -peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp] getCertificationChain -> DEBU 4bf MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [common.channelconfig] NewStandardValues -> DEBU 4c0 Initializing protos for *channelconfig.OrdererProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c1 Processing field: ConsensusType" -peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c2 Processing field: BatchSize" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c3 Processing field: BatchTimeout" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c4 Processing field: KafkaBrokers" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c5 Processing field: ChannelRestrictions" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c6 Processing field: Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] NewStandardValues -> DEBU 4c7 Initializing protos for *channelconfig.OrdererOrgProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c8 Processing field: Endpoints" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] NewStandardValues -> DEBU 4c9 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ca Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] validateMSP -> DEBU 4cb Setting up MSP for org OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] newBccspMsp -> DEBU 4cc Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] New -> DEBU 4cd Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4ce Setting up MSP instance OrdererMSP" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp.identity] newIdentity -> DEBU 4cf Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp.identity] newIdentity -> DEBU 4d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] Validate -> DEBU 4d1 MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4d2 Setting up the MSP manager (3 msps)" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4d3 MSP manager setup complete, setup 3 msps" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [policies] NewManagerImpl -> DEBU 4d4 Proposed new policy Readers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy Writers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d6 Proposed new policy Admins for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d7 Proposed new policy Endorsement for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d8 Proposed new policy Admins for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d9 Proposed new policy Endorsement for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4da Proposed new policy Readers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4db Proposed new policy Writers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4dc Proposed new policy Endorsement for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4dd Proposed new policy Readers for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4de Proposed new policy Writers for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4df Proposed new policy Admins for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e0 Proposed new policy LifecycleEndorsement for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e1 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e3 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e4 Proposed new policy BlockValidation for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e5 Proposed new policy Readers for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e6 Proposed new policy Writers for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e7 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32a Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" -orderer0.example.com | "2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " -orderer0.example.com | "2019-07-20 02:39:31.015 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 32c Raft leader changed: 0 -> 3" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:31.015 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32e Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" -orderer0.example.com | "2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.1µs " -orderer0.example.com | "2019-07-20 02:39:31.510 UTC [orderer.common.cluster.step] handleMessage -> DEBU 330 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:31.510 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 331 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" -orderer0.example.com | "2019-07-20 02:39:31.510 UTC [orderer.common.cluster.step] sendMessage -> DEBU 332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.1µs " -orderer0.example.com | "2019-07-20 02:39:32.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 333 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:32.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 334 Sending msg of 28 bytes to 3 on channel testchainid took 27.5µs" -orderer0.example.com | "2019-07-20 02:39:32.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 335 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.4µs " -orderer0.example.com | "2019-07-20 02:39:32.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 336 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:32.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 337 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" -orderer0.example.com | "2019-07-20 02:39:32.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU 338 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.8µs " -orderer0.example.com | "2019-07-20 02:39:33.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 339 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:33.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33a Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" -orderer0.example.com | "2019-07-20 02:39:33.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.6µs " -orderer0.example.com | "2019-07-20 02:39:33.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:33.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33d Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" -orderer0.example.com | "2019-07-20 02:39:33.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.9µs " -orderer0.example.com | "2019-07-20 02:39:34.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:34.010 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 340 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" -orderer0.example.com | "2019-07-20 02:39:34.011 UTC [orderer.common.cluster.step] sendMessage -> DEBU 341 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.8µs " -orderer0.example.com | "2019-07-20 02:39:34.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 342 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:34.508 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 343 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" -orderer0.example.com | "2019-07-20 02:39:34.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU 344 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 298.7µs " -orderer0.example.com | "2019-07-20 02:39:35.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 345 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:35.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 346 Sending msg of 28 bytes to 3 on channel testchainid took 80.2µs" -orderer0.example.com | "2019-07-20 02:39:35.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 347 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.9µs " -orderer0.example.com | "2019-07-20 02:39:35.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 348 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:35.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 349 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" -orderer0.example.com | "2019-07-20 02:39:35.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.1µs " -orderer0.example.com | "2019-07-20 02:39:36.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:36.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34c Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" -orderer0.example.com | "2019-07-20 02:39:36.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " -orderer0.example.com | "2019-07-20 02:39:36.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:36.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34f Sending msg of 28 bytes to 3 on channel testchainid took 14µs" -orderer0.example.com | "2019-07-20 02:39:36.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 350 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.1µs " -orderer0.example.com | "2019-07-20 02:39:37.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 351 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:37.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 352 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" -orderer0.example.com | "2019-07-20 02:39:37.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU 353 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.5µs " -orderer0.example.com | "2019-07-20 02:39:37.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 354 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:37.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 355 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" -orderer0.example.com | "2019-07-20 02:39:37.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 356 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 362.8µs " -orderer0.example.com | "2019-07-20 02:39:38.007 UTC [orderer.common.cluster.step] handleMessage -> DEBU 357 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:38.008 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 358 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" -orderer0.example.com | "2019-07-20 02:39:38.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 359 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.1µs " -orderer0.example.com | "2019-07-20 02:39:38.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:38.509 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35b Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" -orderer0.example.com | "2019-07-20 02:39:38.509 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.3µs " -orderer0.example.com | "2019-07-20 02:39:39.009 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:39.009 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35e Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" -orderer0.example.com | "2019-07-20 02:39:39.009 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " -orderer0.example.com | "2019-07-20 02:39:39.044 UTC [orderer.common.server] Deliver -> DEBU 360 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:39:39.044 UTC [common.deliver] Handle -> DEBU 361 Starting new deliver loop for 172.18.0.9:39028" -orderer0.example.com | "2019-07-20 02:39:39.045 UTC [common.deliver] Handle -> DEBU 362 Attempting to read seek info message from 172.18.0.9:39028" -orderer0.example.com | "2019-07-20 02:39:39.074 UTC [orderer.common.server] Broadcast -> DEBU 363 Starting new Broadcast handler" -orderer0.example.com | "2019-07-20 02:39:39.074 UTC [orderer.common.broadcast] Handle -> DEBU 364 Starting new broadcast loop for 172.18.0.9:39030" -orderer0.example.com | "2019-07-20 02:39:39.076 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 365 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39030" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 366 Processing config update tx with system channel message processor for channel ID businesschannel" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 367 Processing channel create tx for channel businesschannel on system channel testchainid" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] NewStandardValues -> DEBU 368 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 369 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36a Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36b Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36c Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36d Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] NewStandardValues -> DEBU 36e Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36f Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 370 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 371 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 372 Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 373 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 374 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 375 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 376 Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 377 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 378 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] validateMSP -> DEBU 379 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp] newBccspMsp -> DEBU 37a Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp] New -> DEBU 37b Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp] Setup -> DEBU 37c Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp.identity] newIdentity -> DEBU 37d Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp.identity] newIdentity -> DEBU 37e Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp] Validate -> DEBU 37f MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 380 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 381 Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 382 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] NewStandardValues -> DEBU 383 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 384 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] NewStandardValues -> DEBU 385 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 386 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] Validate -> DEBU 387 Anchor peers for org Org1MSP are " -orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] validateMSP -> DEBU 388 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.079 UTC [msp] newBccspMsp -> DEBU 389 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.079 UTC [msp] New -> DEBU 38a Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.079 UTC [msp] Setup -> DEBU 38b Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.080 UTC [msp.identity] newIdentity -> DEBU 38c Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.080 UTC [msp.identity] newIdentity -> DEBU 38d Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.080 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 38e Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] Validate -> DEBU 38f MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] getCertificationChain -> DEBU 390 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] hasOURole -> DEBU 391 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] getCertificationChain -> DEBU 392 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] NewStandardValues -> DEBU 393 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] initializeProtosStruct -> DEBU 394 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] NewStandardValues -> DEBU 395 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] initializeProtosStruct -> DEBU 396 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] Validate -> DEBU 397 Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] validateMSP -> DEBU 398 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] newBccspMsp -> DEBU 399 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] New -> DEBU 39a Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] Setup -> DEBU 39b Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp.identity] newIdentity -> DEBU 39c Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp.identity] newIdentity -> DEBU 39d Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 39e Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] Validate -> DEBU 39f MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] getCertificationChain -> DEBU 3a0 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] hasOURole -> DEBU 3a1 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] getCertificationChain -> DEBU 3a2 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] Setup -> DEBU 3a3 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] Setup -> DEBU 3a4 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:39.082 UTC [policies] NewManagerImpl -> DEBU 3a5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a8 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a9 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3aa Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ab Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ac Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ad Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ae Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3af Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b0 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b1 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b2 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b3 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b4 Proposed new policy ChannelCreationPolicy for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b5 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b6 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b7 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b8 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b9 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3ba Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bb Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bc Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bd Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e8 Proposed new policy Admins for Channel" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e9 Proposed new policy Readers for Channel" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4ea Proposed new policy Writers for Channel" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.844 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.846 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.846 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-07-20 02:39:46.847 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:46.848 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Group] /Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -peer0.org1.example.com | "2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -peer0.org1.example.com | "2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Value] /Channel/Orderer/Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -peer0.org1.example.com | "2019-07-20 02:39:46.853 UTC [comm.grpc.server] 1 -> INFO 50b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.848Z grpc.peer_address=172.18.0.6:33978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=186.8µs -peer0.org1.example.com | "2019-07-20 02:39:46.853 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Value] /Channel/Orderer/BatchSize" -peer0.org1.example.com | "2019-07-20 02:39:46.854 UTC [common.configtx] addToMap -> DEBU 50d Adding to config map: [Policy] /Channel/Orderer/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.854 UTC [common.configtx] addToMap -> DEBU 50e Adding to config map: [Policy] /Channel/Orderer/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.856 UTC [common.configtx] addToMap -> DEBU 50f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:39:46.856 UTC [common.configtx] addToMap -> DEBU 510 Adding to config map: [Policy] /Channel/Orderer/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.857 UTC [common.configtx] addToMap -> DEBU 511 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -peer0.org1.example.com | "2019-07-20 02:39:46.858 UTC [common.configtx] addToMap -> DEBU 513 Adding to config map: [Value] /Channel/OrdererAddresses" -peer0.org1.example.com | "2019-07-20 02:39:46.857 UTC [msp] GetDefaultSigningIdentity -> DEBU 512 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:46.858 UTC [common.configtx] addToMap -> DEBU 514 Adding to config map: [Value] /Channel/Consortium" -peer0.org1.example.com | "2019-07-20 02:39:46.859 UTC [common.configtx] addToMap -> DEBU 516 Adding to config map: [Value] /Channel/Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:46.859 UTC [common.configtx] addToMap -> DEBU 517 Adding to config map: [Value] /Channel/HashingAlgorithm" -peer0.org1.example.com | "2019-07-20 02:39:46.860 UTC [common.configtx] addToMap -> DEBU 518 Adding to config map: [Policy] /Channel/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.859 UTC [msp.identity] Sign -> DEBU 515 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:46.860 UTC [common.configtx] addToMap -> DEBU 519 Adding to config map: [Policy] /Channel/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.861 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Policy] /Channel/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.861 UTC [common.channelconfig] LogSanityChecks -> DEBU 51c As expected, current configuration has policy '/Channel/Readers'" -peer0.org1.example.com | "2019-07-20 02:39:46.861 UTC [msp.identity] Sign -> DEBU 51a Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:46.861 UTC [common.channelconfig] LogSanityChecks -> DEBU 51d As expected, current configuration has policy '/Channel/Writers'" -peer0.org1.example.com | "2019-07-20 02:39:46.862 UTC [policies] Manager -> DEBU 51f Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 520 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 521 Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 522 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 523 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 524 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 525 As expected, current configuration has policy '/Channel/Application/Readers'" -peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 526 As expected, current configuration has policy '/Channel/Application/Writers'" -peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 527 As expected, current configuration has policy '/Channel/Application/Admins'" -peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 528 Manager Channel looking up path [Orderer]" -peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 529 Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 52a Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:39:46.865 UTC [policies] Manager -> DEBU 52b Manager Channel/Orderer looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:46.865 UTC [policies] Manager -> DEBU 52c Manager Channel/Orderer has managers OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -peer0.org1.example.com | "2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52e As expected, current configuration has policy '/Channel/Orderer/Admins'" -peer0.org1.example.com | "2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52f As expected, current configuration has policy '/Channel/Orderer/Writers'" -peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [common.channelconfig] LogSanityChecks -> DEBU 530 As expected, current configuration has policy '/Channel/Orderer/Readers'" -peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [common.capabilities] Supported -> DEBU 531 Application capability V1_4_2 is supported and is enabled" -peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [common.capabilities] Supported -> DEBU 532 Channel capability V1_4_2 is supported and is enabled" -peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [gossip.service] ProcessConfigUpdate -> DEBU 533 Processing new config for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [gossip.service] ProcessConfigUpdate -> DEBU 534 Calling out because config was updated for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [gossip.service] updateAnchors -> DEBU 535 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -peer0.org1.example.com | "2019-07-20 02:39:46.862 UTC [gossip.comm] authenticateRemotePeer -> DEBU 51e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33978" -peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [gossip.service] updateAnchors -> DEBU 536 Org2MSP anchor peers: []" -peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [gossip.service] updateAnchors -> DEBU 537 Creating state provider for chainID businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 538 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 539 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [policies] Evaluate -> DEBU 53a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [gossip.comm] authenticateRemotePeer -> DEBU 53b Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33978" -orderer0.example.com | "2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3be Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3bf Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c3 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c5 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c6 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c7 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c8 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c9 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3ca Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cb Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cc Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d2 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d3 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d8 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d9 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3da Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3db Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3dc Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3dd Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3de Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3df Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e0 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e1 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e2 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e3 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e4 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e5 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e6 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e7 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e8 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e9 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ea Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3eb Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ec Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ed Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ee Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ef Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] addToMap -> DEBU 3f0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] addToMap -> DEBU 3f1 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f2 Processing change to key: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f3 Processing change to key: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f4 Processing change to key: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f5 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f6 Processing change to key: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] policyForItem -> DEBU 3f7 Getting policy for item Application with mod_policy ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:39.089 UTC [policies] Manager -> DEBU 3f8 Manager Channel looking up path []" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3f9 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fa Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fb Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fc Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fd Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fe Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3ff Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 400 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 401 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 402 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 403 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-07-20 02:39:39.090 UTC [msp] DeserializeIdentity -> DEBU 404 Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [msp.identity] newIdentity -> DEBU 405 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func1 -> DEBU 406 0xc000951ac0 gate 1563590379091253900 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 407 0xc000951ac0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 408 0xc000951ac0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 409 Checking if identity satisfies ADMIN role for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 40a 0xc000951ac0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [msp.identity] Verify -> DEBU 40b Verify: digest = 00000000 6f 70 eb 41 19 f6 82 19 30 b7 c5 f4 f6 5f 2f 51 |op.A....0...._/Q| -orderer0.example.com | 00000010 73 b7 46 41 df 6f 6f 5e eb 3f dd 53 b6 12 6b b8 |s.FA.oo^.?.S..k.|" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [msp.identity] Verify -> DEBU 40c Verify: sig = 00000000 30 44 02 20 2f cc 30 9a 07 4c 89 25 66 17 0c a1 |0D. /.0..L.%f...| -orderer0.example.com | 00000010 54 af b6 5e 0d 5b d1 81 28 f0 94 1f f3 89 5e 20 |T..^.[..(.....^ | -orderer0.example.com | 00000020 03 a3 9f 04 02 20 41 e1 b4 72 42 f3 b8 46 df 81 |..... A..rB..F..| -orderer0.example.com | 00000030 1b ef 12 2c f8 be 1f 8b b6 a7 18 1d 99 92 da d2 |...,............| -orderer0.example.com | 00000040 b6 52 e0 6c 82 94 |.R.l..|" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 40d 0xc000951ac0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func1 -> DEBU 40e 0xc000951ac0 gate 1563590379091253900 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 40f Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 410 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 411 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 412 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 413 Processing change to key: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 414 Processing change to key: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 415 Processing change to key: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 416 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 417 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 418 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 419 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41a Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41b Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41c Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41d Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41e Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41f Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 420 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 421 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 422 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 423 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 424 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 425 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 426 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 427 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 428 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 429 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42a Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42b Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.869 UTC [msp.identity] Verify -> DEBU 53d Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-07-20 02:39:46.869 UTC [msp.identity] Verify -> DEBU 53e Verify: sig = 00000000 30 45 02 21 00 e6 68 9d c5 63 b9 1c b9 e7 c5 c3 |0E.!..h..c......| -peer0.org1.example.com | 00000010 94 54 c8 7b 93 fd a5 57 66 d8 c1 b1 b3 4b 3a 64 |.T.{...Wf....K:d| -peer0.org1.example.com | 00000020 f8 81 bf 34 ff 02 20 0d 6a 26 1f c2 fd 8e 9d 27 |...4.. .j&.....'| -peer0.org1.example.com | 00000030 40 36 ac 2e f4 f5 49 b5 cd 2d 36 14 10 59 89 2a |@6....I..-6..Y.*| -peer0.org1.example.com | 00000040 a4 d4 d7 37 c6 5a 5b |...7.Z[|" -peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [policies] Evaluate -> DEBU 53c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [gossip.comm] authenticateRemotePeer -> DEBU 53f Authenticated 172.18.0.6:33978" -peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [gossip.comm] GossipStream -> DEBU 542 Servicing 172.18.0.6:33978" -peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [grpc] infof -> DEBU 543 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [policies] Evaluate -> DEBU 540 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [cauthdsl] func1 -> DEBU 544 0xc00333efd0 gate 1563590386870913500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 545 0xc00333efd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 547 0xc00333efd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 548 0xc00333efd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 549 0xc00333efd0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func1 -> DEBU 54a 0xc00333efd0 gate 1563590386870913500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [gossip.comm] func2 -> DEBU 54f Client 172.18.0.6:33978 disconnected" -peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [gossip.comm] writeToStream -> DEBU 546 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:46.872 UTC [gossip.comm] serviceConnection -> DEBU 552 Closing reading from stream" -peer0.org1.example.com | "2019-07-20 02:39:46.872 UTC [gossip.comm] writeToStream -> DEBU 553 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [gossip.comm] readFromStream -> DEBU 54e Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:39:46.872 UTC [gossip.comm] func2 -> DEBU 554 Client 172.18.0.6:33928 disconnected" -peer0.org1.example.com | "2019-07-20 02:39:46.872 UTC [comm.grpc.server] 1 -> INFO 555 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:33928 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=14.4132261s -peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func1 -> DEBU 550 0xc00333f810 gate 1563590386871972100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 556 0xc00333f810 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 557 0xc00333f810 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 558 0xc00333f810 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [msp.identity] Verify -> DEBU 559 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| -peer0.org1.example.com | 00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" -peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [msp.identity] Verify -> DEBU 55a Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| -peer0.org1.example.com | 00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| -peer0.org1.example.com | 00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| -peer0.org1.example.com | 00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| -peer0.org1.example.com | 00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" -peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [gossip.comm] readFromStream -> DEBU 55b a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -peer0.org1.example.com | "2019-07-20 02:39:46.874 UTC [cauthdsl] func2 -> DEBU 55c 0xc00333f810 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [gossip.gossip] handleMessage -> DEBU 541 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:580165058965807529 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:46.872 UTC [comm.grpc.server] 1 -> INFO 551 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:56.856Z grpc.peer_address=172.18.0.6:33978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.9128ms -peer0.org1.example.com | "2019-07-20 02:39:46.874 UTC [cauthdsl] func1 -> DEBU 55d 0xc00333f810 gate 1563590386871972100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:46.876 UTC [gossip.gossip] handleMessage -> DEBU 55e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55f Got message: GossipMessage: nonce:580165058965807529 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42c Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.093 UTC [msp] GetDefaultSigningIdentity -> DEBU 42d Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:39.093 UTC [msp] GetDefaultSigningIdentity -> DEBU 42e Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:39.093 UTC [msp.identity] Sign -> DEBU 42f Sign: plaintext: 0AD2060A1B08011A0608EBFDC9E90522...4B363125DCAEEC32A278E2CF9DDD8C54 " -peer0.org1.example.com | "2019-07-20 02:39:46.877 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 561 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 562 Verify: digest = 00000000 cd 84 f2 4d a0 ca 90 19 dc e8 13 7f f3 2a 14 d1 |...M.........*..| -peer0.org1.example.com | 00000010 fa d8 d3 a2 37 42 49 99 12 d5 bb 16 8a ad 9a f7 |....7BI.........|" -peer0.org1.example.com | "2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 563 Verify: sig = 00000000 30 45 02 21 00 d0 bf f2 10 6b bf 25 cb 17 78 34 |0E.!.....k.%..x4| -peer0.org1.example.com | 00000010 82 53 3b 90 a3 64 b3 cb be e8 25 7e 7d c5 f6 3e |.S;..d....%~}..>| -peer0.org1.example.com | 00000020 75 1d 94 93 59 02 20 7a 61 9e af a7 1d 69 e2 9d |u...Y. za....i..| -peer0.org1.example.com | 00000030 00 8b ae 7b 47 4b 06 83 4b a4 d4 f5 6d be f6 75 |...{GK..K...m..u| -peer0.org1.example.com | 00000040 fd b2 62 23 5d 5b 7f |..b#][.|" -peer0.org1.example.com | "2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 564 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:39:46.878 UTC [msp.identity] Verify -> DEBU 565 Verify: sig = 00000000 30 44 02 20 04 d5 f4 aa 80 23 d0 2f e4 aa 11 08 |0D. .....#./....| -peer0.org1.example.com | 00000010 50 26 5d 31 5d c6 30 c8 f6 db 9a 50 4e ea a0 10 |P&]1].0....PN...| -peer0.org1.example.com | 00000020 b3 7d d2 0d 02 20 37 3c 15 1c fd 43 09 0d d5 b3 |.}... 7<...C....| -peer0.org1.example.com | 00000030 a7 17 a0 16 69 42 38 04 8c 72 96 9a f8 68 34 89 |....iB8..r...h4.| -peer0.org1.example.com | 00000040 19 01 83 a1 fa 15 |......|" -peer0.org1.example.com | "2019-07-20 02:39:46.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 566 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:46.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 567 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:46.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 568 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 569 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 56a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.876 UTC [policies] Evaluate -> DEBU 560 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.881 UTC [policies] Evaluate -> DEBU 56c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.882 UTC [policies] Evaluate -> DEBU 56d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.882 UTC [policies] Evaluate -> DEBU 56e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.885 UTC [gossip.gossip] JoinChan -> INFO 56f Joining gossip network of channel businesschannel with 2 organizations" -peer0.org1.example.com | "2019-07-20 02:39:46.885 UTC [gossip.gossip] learnAnchorPeers -> INFO 570 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org1.example.com | "2019-07-20 02:39:46.885 UTC [gossip.gossip] learnAnchorPeers -> INFO 571 Anchor peer with same endpoint, skipping connecting to myself" -peer0.org1.example.com | "2019-07-20 02:39:46.887 UTC [gossip.gossip] learnAnchorPeers -> INFO 572 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -peer0.org1.example.com | "2019-07-20 02:39:46.887 UTC [gossip.service] updateEndpoints -> DEBU 573 Updating endpoints for chainID%!(EXTRA string=businesschannel)" -peer0.org1.example.com | "2019-07-20 02:39:46.891 UTC [peer] updateTrustedRoots -> DEBU 574 Updating trusted root authorities for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:46.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 575 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.892 UTC [gossip.discovery] handleMsgFromComm -> DEBU 576 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.892 UTC [gossip.discovery] sendMemResponse -> DEBU 577 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:39:46.896 UTC [gossip.comm] Send -> DEBU 578 Entering, sending GossipMessage: Channel: , nonce: 580165058965807529, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:46.898 UTC [gossip.discovery] sendMemResponse -> DEBU 579 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > alive:\316\367\016A]\027\374i\355.\302v\372\204\340\306D\320\211Z\305\223\232\002 rH]\370\312\310\322\022\010\323\244<\000;\003\362\030\302O\017g\030\252.WV\320pr0\343\203" > > " -peer0.org1.example.com | "2019-07-20 02:39:46.898 UTC [gossip.comm] sendToEndpoint -> DEBU 57a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 580165058965807529, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:46.898 UTC [gossip.comm] createConnection -> DEBU 57b Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:39:46.908 UTC [grpc] DialContext -> DEBU 57c parsed scheme: """ -peer0.org1.example.com | "2019-07-20 02:39:46.908 UTC [grpc] DialContext -> DEBU 57d scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-07-20 02:39:46.908 UTC [grpc] watcher -> DEBU 57e ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" -peer0.org1.example.com | "2019-07-20 02:39:46.908 UTC [grpc] switchBalancer -> DEBU 57f ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-07-20 02:39:46.908 UTC [grpc] HandleSubConnStateChange -> DEBU 580 pickfirstBalancer: HandleSubConnStateChange: 0xc0033ff750, CONNECTING" -peer0.org1.example.com | "2019-07-20 02:39:46.923 UTC [peer] buildTrustedRootsForChain -> DEBU 581 updating root CAs for channel [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:46.923 UTC [peer] buildTrustedRootsForChain -> DEBU 582 adding app root CAs for MSP [Org1MSP]" -peer0.org1.example.com | "2019-07-20 02:39:46.924 UTC [peer] buildTrustedRootsForChain -> DEBU 583 adding app root CAs for MSP [Org2MSP]" -peer0.org1.example.com | "2019-07-20 02:39:46.925 UTC [peer] buildTrustedRootsForChain -> DEBU 584 adding orderer root CAs for MSP [OrdererMSP]" -peer0.org1.example.com | "2019-07-20 02:39:46.927 UTC [committer.txvalidator] validateTx -> DEBU 585 config transaction received for chain businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:46.928 UTC [committer.txvalidator] validateTx -> DEBU 586 [businesschannel] validateTx completes for block 0xc0030867c0 env 0xc0030ee6e0 txn 0" -peer0.org1.example.com | "2019-07-20 02:39:46.928 UTC [committer.txvalidator] Validate -> DEBU 587 got result for idx 0, code 0" -peer0.org1.example.com | "2019-07-20 02:39:46.928 UTC [committer.txvalidator] Validate -> INFO 588 [businesschannel] Validated block [1] in 123ms" -peer0.org1.example.com | "2019-07-20 02:39:46.929 UTC [gossip.privdata] listMissingPrivateData -> DEBU 589 Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-07-20 02:39:46.929 UTC [gossip.privdata] StoreBlock -> DEBU 58a [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-07-20 02:39:46.929 UTC [committer] preCommit -> DEBU 58b Received configuration update, calling CSCC ConfigUpdate" -peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [kvledger] CommitWithPvtData -> DEBU 58c [businesschannel] Validating state for block [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58d Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58e lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58f Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 590 ValidateAndPrepareBatch() for block number = [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 591 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [valimpl] preprocessProtoBlock -> DEBU 592 txType=CONFIG" -peer0.org1.example.com | "2019-07-20 02:39:46.935 UTC [valimpl] processNonEndorserTx -> DEBU 593 Performing custom processing for transaction [txid=], [txType=CONFIG]" -peer0.org1.example.com | "2019-07-20 02:39:46.935 UTC [valimpl] processNonEndorserTx -> DEBU 594 Processor for custom tx processing:&peer.configtxProcessor{}" -peer0.org1.example.com | "2019-07-20 02:39:46.935 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 595 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:39:46.935 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 596 constructing new tx simulator txid = []" -peer0.org1.example.com | "2019-07-20 02:39:46.935 UTC [peer] GenerateSimulationResults -> DEBU 597 Processing CONFIG" -orderer0.example.com | "2019-07-20 02:39:39.094 UTC [msp.identity] Sign -> DEBU 430 Sign: digest: 45DB8F0181D8A44B3CF876A75B80ACD077EDCCFB3B1C9D17C0902192520E8F2D " -orderer0.example.com | "2019-07-20 02:39:39.094 UTC [msp] GetDefaultSigningIdentity -> DEBU 431 Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:39.095 UTC [msp] GetDefaultSigningIdentity -> DEBU 432 Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:39.095 UTC [msp.identity] Sign -> DEBU 433 Sign: plaintext: 0ACE060A1708041A0608EBFDC9E90522...2E42A0C1B566423262986FCA1D7C7999 " -orderer0.example.com | "2019-07-20 02:39:39.095 UTC [msp.identity] Sign -> DEBU 434 Sign: digest: 78B703761D325EE5D5CB13182625C158F15FA370E1078A12E65F558F0ACFA74A " -orderer0.example.com | "2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 435 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 436 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 437 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 438 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 439 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-07-20 02:39:39.096 UTC [msp] DeserializeIdentity -> DEBU 43a Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:39.096 UTC [msp.identity] newIdentity -> DEBU 43b Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -orderer0.example.com | QQ== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.097 UTC [cauthdsl] func1 -> DEBU 43c 0xc000a9b050 gate 1563590379097124100 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:39.097 UTC [cauthdsl] func2 -> DEBU 43d 0xc000a9b050 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:39.097 UTC [cauthdsl] func2 -> DEBU 43e 0xc000a9b050 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:39.097 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 43f Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:39.097 UTC [msp] Validate -> DEBU 440 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.098 UTC [cauthdsl] func2 -> DEBU 441 0xc000a9b050 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:39.098 UTC [msp.identity] Verify -> DEBU 442 Verify: digest = 00000000 78 b7 03 76 1d 32 5e e5 d5 cb 13 18 26 25 c1 58 |x..v.2^.....&%.X| -orderer0.example.com | 00000010 f1 5f a3 70 e1 07 8a 12 e6 5f 55 8f 0a cf a7 4a |._.p....._U....J|" -orderer0.example.com | "2019-07-20 02:39:39.098 UTC [msp.identity] Verify -> DEBU 443 Verify: sig = 00000000 30 45 02 21 00 a0 d9 0a de d9 d8 ac 1e 74 55 78 |0E.!.........tUx| -orderer0.example.com | 00000010 57 2d 4b 72 58 67 8a 2b 9a ba 7a 41 10 2d 03 61 |W-KrXg.+..zA.-.a| -orderer0.example.com | 00000020 bd 19 e8 88 13 02 20 16 bc 09 48 78 d8 29 d9 f6 |...... ...Hx.)..| -orderer0.example.com | 00000030 3a 13 e0 de 8d ca b4 f5 88 1e c0 1b cc 4e 2d 95 |:............N-.| -orderer0.example.com | 00000040 c1 de 25 91 b2 1f b3 |..%....|" -orderer0.example.com | "2019-07-20 02:39:39.098 UTC [cauthdsl] func2 -> DEBU 444 0xc000a9b050 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:39.098 UTC [cauthdsl] func1 -> DEBU 445 0xc000a9b050 gate 1563590379097124100 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 446 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 447 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 448 Signature set satisfies policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 449 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 44a Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 44b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] NewStandardValues -> DEBU 44c Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44d Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44e Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44f Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 450 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 451 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] NewStandardValues -> DEBU 452 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 453 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 454 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 455 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 456 Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 457 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 458 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.100 UTC [common.channelconfig] NewStandardValues -> DEBU 459 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 45a Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:39.100 UTC [common.channelconfig] NewStandardValues -> DEBU 45b Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 45c Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.100 UTC [common.channelconfig] validateMSP -> DEBU 45d Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.100 UTC [msp] newBccspMsp -> DEBU 45e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.100 UTC [msp] New -> DEBU 45f Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.100 UTC [msp] Setup -> DEBU 460 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:39.101 UTC [msp.identity] newIdentity -> DEBU 461 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.102 UTC [msp.identity] newIdentity -> DEBU 462 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.103 UTC [msp] Validate -> DEBU 463 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.106 UTC [common.channelconfig] NewStandardValues -> DEBU 464 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 465 Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 466 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] NewStandardValues -> DEBU 467 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 468 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] NewStandardValues -> DEBU 469 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 46a Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] Validate -> DEBU 46b Anchor peers for org Org1MSP are " -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] validateMSP -> DEBU 46c Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [msp] newBccspMsp -> DEBU 46d Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [msp] New -> DEBU 46e Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [msp] Setup -> DEBU 46f Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.107 UTC [msp.identity] newIdentity -> DEBU 470 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.108 UTC [msp.identity] newIdentity -> DEBU 471 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.108 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 472 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.108 UTC [msp] Validate -> DEBU 473 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.108 UTC [msp] getCertificationChain -> DEBU 474 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.108 UTC [msp] hasOURole -> DEBU 475 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp] getCertificationChain -> DEBU 476 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] NewStandardValues -> DEBU 477 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 478 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] NewStandardValues -> DEBU 479 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 47a Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] Validate -> DEBU 47b Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] validateMSP -> DEBU 47c Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp] newBccspMsp -> DEBU 47d Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp] New -> DEBU 47e Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp] Setup -> DEBU 47f Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp.identity] newIdentity -> DEBU 480 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | "2019-07-20 02:39:46.936 UTC [peer] processChannelConfigTx -> DEBU 598 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -peer0.org1.example.com | "2019-07-20 02:39:46.936 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 599 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [lockbasedtxmgr] Done -> DEBU 59a Done with transaction simulation / query execution []" -peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 59b Block [1] Transaction index [0] TxId [] marked as valid by state validator" -peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [valinternal] ApplyWriteSet -> DEBU 59c txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0034a4340)}" -peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59d validating rwset..." -peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59e postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59f ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-07-20 02:39:46.938 UTC [kvledger] CommitWithPvtData -> DEBU 5a0 [businesschannel] Adding CommitHash to the block [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.938 UTC [kvledger] CommitWithPvtData -> DEBU 5a1 [businesschannel] Committing block [1] to storage" -peer0.org1.example.com | "2019-07-20 02:39:46.938 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5a2 Writing block [1] to pvt block store" -peer0.org1.example.com | "2019-07-20 02:39:46.940 UTC [pvtdatastorage] Prepare -> DEBU 5a3 Saved 0 private data write sets for block [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.941 UTC [fsblkstorage] indexBlock -> DEBU 5a4 Indexing block [blockNum=1, blockHash=[]byte{0xad, 0x6d, 0x1e, 0xa9, 0x18, 0xba, 0xbc, 0xca, 0xf6, 0xcf, 0x8e, 0xc0, 0x90, 0xeb, 0x4b, 0xfb, 0x6e, 0x2f, 0xc6, 0x7d, 0xf5, 0x4e, 0x4d, 0x7d, 0x6, 0xa6, 0xef, 0x4f, 0x93, 0x80, 0x1f, 0xd9} txOffsets= -peer0.org1.example.com | txId=4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94 locPointer=offset=71, bytesLength=22685 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-07-20 02:39:46.941 UTC [fsblkstorage] indexBlock -> DEBU 5a5 Adding txLoc [fileSuffixNum=0, offset=24019, bytesLength=22685] for tx ID: [4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94] to txid-index" -peer0.org1.example.com | "2019-07-20 02:39:46.942 UTC [fsblkstorage] indexBlock -> DEBU 5a6 Adding txLoc [fileSuffixNum=0, offset=24019, bytesLength=22685] for tx number:[0] ID: [4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94] to blockNumTranNum index" -peer0.org1.example.com | "2019-07-20 02:39:46.943 UTC [comm.grpc.server] 1 -> INFO 5a7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.941Z grpc.peer_address=172.18.0.6:33980 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=633.9µs -peer0.org1.example.com | "2019-07-20 02:39:46.943 UTC [fsblkstorage] updateCheckpoint -> DEBU 5a8 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47677], isChainEmpty=[false], lastBlockNumber=[1]" -peer0.org1.example.com | "2019-07-20 02:39:46.944 UTC [pvtdatastorage] Commit -> DEBU 5a9 Committing private data for block [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.945 UTC [msp] GetDefaultSigningIdentity -> DEBU 5aa Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:46.945 UTC [msp.identity] Sign -> DEBU 5ab Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:46.945 UTC [msp.identity] Sign -> DEBU 5ac Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp.identity] newIdentity -> DEBU 481 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 482 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] Validate -> DEBU 483 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] getCertificationChain -> DEBU 484 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] hasOURole -> DEBU 485 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] getCertificationChain -> DEBU 486 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] Setup -> DEBU 487 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] Setup -> DEBU 488 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 489 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48a Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48b Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48c Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48d Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48e Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48f Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 490 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 491 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 492 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 493 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 494 Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 495 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 496 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 497 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 498 Proposed new policy ChannelCreationPolicy for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 499 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49a Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 49b Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49c Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 49d Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49e Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 49f Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a0 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a1 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:46.946 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ad Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33980" -peer0.org1.example.com | "2019-07-20 02:39:46.946 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ae Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33980" -peer0.org1.example.com | "2019-07-20 02:39:46.947 UTC [pvtdatastorage] Commit -> DEBU 5af Committed private data for block [1]" -peer0.org1.example.com | "2019-07-20 02:39:46.947 UTC [msp.identity] Verify -> DEBU 5b0 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-07-20 02:39:46.947 UTC [msp.identity] Verify -> DEBU 5b1 Verify: sig = 00000000 30 45 02 21 00 c6 00 24 ca 9b 7c 79 5f aa f1 d8 |0E.!...$..|y_...| -peer0.org1.example.com | 00000010 49 b1 94 84 23 ca b1 74 68 be 9a 8a f2 af 9e 5b |I...#..th......[| -peer0.org1.example.com | 00000020 44 d8 d5 60 94 02 20 56 85 55 3c fc 1d e8 72 06 |D..`.. V.U<...r.| -peer0.org1.example.com | 00000030 3e a0 b9 ee 08 40 46 4e 05 6d 49 59 75 e1 2e 9d |>....@FN.mIYu...| -peer0.org1.example.com | 00000040 b2 2f ad 1b ae af 10 |./.....|" -peer0.org1.example.com | "2019-07-20 02:39:46.947 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5b2 Authenticated 172.18.0.6:33980" -peer0.org1.example.com | "2019-07-20 02:39:46.947 UTC [gossip.comm] GossipStream -> DEBU 5b3 Servicing 172.18.0.6:33980" -peer0.org1.example.com | "2019-07-20 02:39:46.948 UTC [kvledger] CommitWithPvtData -> DEBU 5b4 [businesschannel] Committing block [1] transactions to state database" -peer0.org1.example.com | "2019-07-20 02:39:46.948 UTC [lockbasedtxmgr] Commit -> DEBU 5b5 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-07-20 02:39:46.950 UTC [lockbasedtxmgr] Commit -> DEBU 5b6 Committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:39:46.950 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5b7 Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-07-20 02:39:46.950 UTC [lockbasedtxmgr] Commit -> DEBU 5b8 Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:39:46.951 UTC [stateleveldb] ApplyUpdates -> DEBU 5b9 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -peer0.org1.example.com | "2019-07-20 02:39:46.952 UTC [grpc] HandleSubConnStateChange -> DEBU 5ba pickfirstBalancer: HandleSubConnStateChange: 0xc0033ff750, READY" -peer0.org1.example.com | "2019-07-20 02:39:46.954 UTC [lockbasedtxmgr] Commit -> DEBU 5bb Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-07-20 02:39:46.954 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5bc Preparing potential purge list working-set for expiringAtBlk [2]" -peer0.org1.example.com | "2019-07-20 02:39:46.954 UTC [leveldbhelper] GetIterator -> DEBU 5bd Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" -peer0.org1.example.com | "2019-07-20 02:39:46.954 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5be No expiry entry found for expiringAtBlk [2]" -peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [lockbasedtxmgr] func1 -> DEBU 5bf launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [grpc] infof -> DEBU 5c0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [kvledger] CommitWithPvtData -> DEBU 5c1 [businesschannel] Committing block [1] transactions to history database" -peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [historyleveldb] Commit -> DEBU 5c3 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" -peer0.org1.example.com | "2019-07-20 02:39:46.956 UTC [historyleveldb] Commit -> DEBU 5c6 Skipping transaction [0] since it is not an endorsement transaction" -peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [gossip.comm] func2 -> DEBU 5c4 Client 172.18.0.6:33980 disconnected" -peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [grpc] infof -> DEBU 5c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [gossip.comm] readFromStream -> DEBU 5c2 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [msp] GetDefaultSigningIdentity -> DEBU 5c7 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [msp.identity] Sign -> DEBU 5ca Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [msp.identity] Sign -> DEBU 5cb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5cc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051" -peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [comm.grpc.server] 1 -> INFO 5c8 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:56.945Z grpc.peer_address=172.18.0.6:33980 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6697ms -peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [gossip.comm] writeToStream -> DEBU 5c9 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:46.958 UTC [historyleveldb] Commit -> DEBU 5cd Channel [businesschannel]: Updates committed to history database for blockNo [1]" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a2 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a7 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4a8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4a9 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4aa Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ab Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ac Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ad Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:46.958 UTC [kvledger] CommitWithPvtData -> INFO 5ce [businesschannel] Committed block [1] with 1 transaction(s) in 28ms (state_validation=8ms block_and_pvtdata_commit=9ms state_commit=7ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" -peer0.org1.example.com | "2019-07-20 02:39:46.959 UTC [msp] GetDefaultSigningIdentity -> DEBU 5cf Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:46.960 UTC [msp.identity] Sign -> DEBU 5d0 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020802 " -peer0.org1.example.com | "2019-07-20 02:39:46.961 UTC [msp.identity] Sign -> DEBU 5d2 Sign: digest: 50DAFA02918444C69E8D5B3E6A35836CE1EA25019336CA398AFA5A43E6AE0493 " -peer0.org1.example.com | "2019-07-20 02:39:46.961 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5d1 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:7051" -peer0.org1.example.com | "2019-07-20 02:39:46.962 UTC [gossip.state] commitBlock -> DEBU 5d3 [businesschannel] Committed block [1] with 1 transaction(s)" -peer0.org1.example.com | "2019-07-20 02:39:46.962 UTC [gossip.state] deliverPayloads -> DEBU 5d4 [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-07-20 02:39:46.962 UTC [gossip.privdata] StoreBlock -> INFO 5d5 [businesschannel] Received block [2] from buffer" -peer0.org1.example.com | "2019-07-20 02:39:46.962 UTC [msp.identity] Verify -> DEBU 5d6 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-07-20 02:39:46.963 UTC [msp.identity] Verify -> DEBU 5d8 Verify: sig = 00000000 30 44 02 20 0b f1 7c cc 6c b4 48 eb 91 f2 f1 19 |0D. ..|.l.H.....| -peer0.org1.example.com | 00000010 fc 62 08 0d 35 3f 49 b2 86 ae c9 a7 9c 71 8e 4c |.b..5?I......q.L| -peer0.org1.example.com | 00000020 96 eb 7a fc 02 20 55 90 38 56 a4 36 e3 ea 32 53 |..z.. U.8V.6..2S| -peer0.org1.example.com | 00000030 77 ab 19 e2 95 fa 1f b2 c3 d4 90 4d 74 5b 9b b5 |w..........Mt[..| -peer0.org1.example.com | 00000040 65 a8 15 be f4 15 |e.....|" -peer0.org1.example.com | "2019-07-20 02:39:46.962 UTC [gossip.privdata] StoreBlock -> DEBU 5d7 [businesschannel] Validating block [2]" -peer0.org1.example.com | "2019-07-20 02:39:46.963 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5d9 Authenticated 172.18.0.6:7051" -peer0.org1.example.com | "2019-07-20 02:39:46.963 UTC [gossip.comm] createConnection -> DEBU 5da Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.963 UTC [gossip.comm] sendToEndpoint -> DEBU 5db Exiting" -peer0.org1.example.com | "2019-07-20 02:39:46.963 UTC [committer.txvalidator] Validate -> DEBU 5dc [businesschannel] START Block Validation for block [2]" -peer0.org1.example.com | "2019-07-20 02:39:46.964 UTC [committer.txvalidator] Validate -> DEBU 5dd expecting 1 block validation responses" -peer0.org1.example.com | "2019-07-20 02:39:46.964 UTC [committer.txvalidator] validateTx -> DEBU 5de [businesschannel] validateTx starts for block 0xc003516200 env 0xc00353d860 txn 0" -peer0.org1.example.com | "2019-07-20 02:39:46.965 UTC [protoutils] ValidateTransaction -> DEBU 5df ValidateTransactionEnvelope starts for envelope 0xc00353d860" -peer0.org1.example.com | "2019-07-20 02:39:46.965 UTC [protoutils] ValidateTransaction -> DEBU 5e0 Header is channel_header:"\010\001\032\006\010\361\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\325\335\034\246UK\017C\017\277\223\305\031\025\215\353\232\0222[\305wxl" " -peer0.org1.example.com | "2019-07-20 02:39:46.965 UTC [protoutils] validateChannelHeader -> DEBU 5e1 validateChannelHeader info: header type 1" -peer0.org1.example.com | "2019-07-20 02:39:46.965 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e2 begin" -peer0.org1.example.com | "2019-07-20 02:39:46.966 UTC [msp] GetManagerForChain -> DEBU 5e3 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:39:46.966 UTC [msp] DeserializeIdentity -> DEBU 5e4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:46.967 UTC [msp.identity] newIdentity -> DEBU 5e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -peer0.org1.example.com | QQ== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.967 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e6 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -peer0.org1.example.com | "2019-07-20 02:39:46.967 UTC [msp] Validate -> DEBU 5e7 MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:46.968 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e8 creator is valid" -peer0.org1.example.com | "2019-07-20 02:39:46.968 UTC [msp.identity] Verify -> DEBU 5e9 Verify: digest = 00000000 9f 6d 09 25 ee 9c 09 29 72 4a 00 54 a3 e7 6f d2 |.m.%...)rJ.T..o.| -peer0.org1.example.com | 00000010 9f 74 37 d2 0d 76 84 7e df a0 07 54 ac b3 e3 a9 |.t7..v.~...T....|" -peer0.org1.example.com | "2019-07-20 02:39:46.968 UTC [msp.identity] Verify -> DEBU 5ea Verify: sig = 00000000 30 44 02 20 43 91 94 43 2a 23 d1 f0 c2 88 cb 7d |0D. C..C*#.....}| -peer0.org1.example.com | 00000010 79 5b 76 27 65 24 8c 15 89 2e 1f 51 c1 4e e9 6a |y[v'e$.....Q.N.j| -peer0.org1.example.com | 00000020 ba 07 4f ab 02 20 44 33 10 d9 f7 5c e3 28 87 66 |..O.. D3...\.(.f| -peer0.org1.example.com | 00000030 42 a7 ee f2 26 00 13 eb e7 18 7d a2 30 c1 25 a0 |B...&.....}.0.%.| -peer0.org1.example.com | 00000040 cb 1b 9e a8 cb 43 |.....C|" -peer0.org1.example.com | "2019-07-20 02:39:46.969 UTC [protoutils] checkSignatureFromCreator -> DEBU 5eb exits successfully" -peer0.org1.example.com | "2019-07-20 02:39:46.969 UTC [protoutils] validateConfigTransaction -> DEBU 5ec validateConfigTransaction starts for data 0xc0035d2000, header channel_header:"\010\001\032\006\010\361\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\325\335\034\246UK\017C\017\277\223\305\031\025\215\353\232\0222[\305wxl" " -peer0.org1.example.com | "2019-07-20 02:39:46.969 UTC [committer.txvalidator] validateTx -> DEBU 5ed Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f0 Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f1 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [common.configtx] verifyDeltaSet -> DEBU 5ff Processing change to key: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [common.configtx] policyForItem -> DEBU 600 Getting policy for item Org2MSP with mod_policy Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [policies] Manager -> DEBU 601 Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [policies] Manager -> DEBU 602 Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 603 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 604 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 605 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 606 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 607 Manager Channel/Application looking up path [Org2MSP]" -peer0.org1.example.com | "2019-07-20 02:39:46.975 UTC [policies] Manager -> DEBU 608 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.975 UTC [policies] Manager -> DEBU 609 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.976 UTC [policies] Manager -> DEBU 60a Manager Channel/Application/Org2MSP looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:46.976 UTC [policies] Evaluate -> DEBU 60b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -peer0.org1.example.com | "2019-07-20 02:39:46.976 UTC [msp] DeserializeIdentity -> DEBU 60c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:46.976 UTC [msp.identity] newIdentity -> DEBU 60d Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.977 UTC [cauthdsl] func1 -> DEBU 60e 0xc003603870 gate 1563590386977559500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:46.977 UTC [cauthdsl] func2 -> DEBU 60f 0xc003603870 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:46.977 UTC [cauthdsl] func2 -> DEBU 610 0xc003603870 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:46.978 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 611 Checking if identity satisfies ADMIN role for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.978 UTC [cauthdsl] func2 -> DEBU 612 0xc003603870 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:46.978 UTC [msp.identity] Verify -> DEBU 613 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| -peer0.org1.example.com | 00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" -peer0.org1.example.com | "2019-07-20 02:39:46.978 UTC [msp.identity] Verify -> DEBU 614 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| -peer0.org1.example.com | 00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| -peer0.org1.example.com | 00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| -peer0.org1.example.com | 00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| -peer0.org1.example.com | 00000040 e9 49 62 bf 87 8d |.Ib...|" -peer0.org1.example.com | "2019-07-20 02:39:46.979 UTC [cauthdsl] func2 -> DEBU 615 0xc003603870 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:46.979 UTC [cauthdsl] func1 -> DEBU 616 0xc003603870 gate 1563590386977559500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:46.979 UTC [policies] Evaluate -> DEBU 617 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.979 UTC [policies] Evaluate -> DEBU 618 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:46.979 UTC [common.configtx] verifyDeltaSet -> DEBU 619 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61a Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61c Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61d Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61e Setting policy for key Admins to " -peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 61f Setting policy for key Endorsement to " -peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 620 Setting policy for key Readers to " -peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 621 Setting policy for key Writers to " -peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 622 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 623 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 624 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 625 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 626 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 627 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 628 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 629 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62a Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62b Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62d Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 62e Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 62f Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 630 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.984 UTC [common.channelconfig] NewStandardValues -> DEBU 631 Initializing protos for *channelconfig.ChannelProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 632 Processing field: HashingAlgorithm" -peer0.org1.example.com | "2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 633 Processing field: BlockDataHashingStructure" -peer0.org1.example.com | "2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 634 Processing field: OrdererAddresses" -peer0.org1.example.com | "2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 635 Processing field: Consortium" -peer0.org1.example.com | "2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 636 Processing field: Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:46.986 UTC [common.channelconfig] NewStandardValues -> DEBU 637 Initializing protos for *channelconfig.ApplicationProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 638 Processing field: ACLs" -peer0.org1.example.com | "2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 639 Processing field: Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:46.987 UTC [common.channelconfig] NewStandardValues -> DEBU 63a Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63b Processing field: AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:46.987 UTC [common.channelconfig] NewStandardValues -> DEBU 63c Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63d Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.987 UTC [common.channelconfig] Validate -> DEBU 63e Anchor peers for org Org1MSP are anchor_peers: " -peer0.org1.example.com | "2019-07-20 02:39:46.988 UTC [common.channelconfig] validateMSP -> DEBU 63f Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b6 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4ba Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bc Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bd Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4be Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bf Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c0 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c1 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c2 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c3 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c4 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c5 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c6 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c7 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c8 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c9 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4ca Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4cb Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4cc Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4cd Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4ce Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4cf Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d0 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d2 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d3 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d4 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d5 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d6 Processing change to key: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d7 Processing change to key: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d8 Processing change to key: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] policyForItem -> DEBU 4d9 Getting policy for item Application with mod_policy ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4da Manager Channel looking up path []" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4db Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4dc Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4dd Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4de Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4df Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e0 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e1 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e2 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [msp] DeserializeIdentity -> DEBU 4e6 Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [msp.identity] newIdentity -> DEBU 4e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | "2019-07-20 02:39:46.988 UTC [msp] newBccspMsp -> DEBU 640 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.988 UTC [msp] New -> DEBU 641 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.988 UTC [msp] Setup -> DEBU 642 Setting up MSP instance Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.988 UTC [msp.identity] newIdentity -> DEBU 643 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.989 UTC [msp.identity] newIdentity -> DEBU 644 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.990 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 645 Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.990 UTC [msp] Validate -> DEBU 646 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:46.990 UTC [msp] getCertificationChain -> DEBU 647 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:46.991 UTC [msp] hasOURole -> DEBU 648 MSP Org1MSP checking if the identity is a client" -peer0.org1.example.com | "2019-07-20 02:39:46.991 UTC [msp] getCertificationChain -> DEBU 649 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:46.991 UTC [common.channelconfig] NewStandardValues -> DEBU 64a Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.991 UTC [common.channelconfig] initializeProtosStruct -> DEBU 64b Processing field: AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:46.991 UTC [common.channelconfig] NewStandardValues -> DEBU 64c Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 64d Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.992 UTC [common.channelconfig] Validate -> DEBU 64e Anchor peers for org Org2MSP are anchor_peers: " -peer0.org1.example.com | "2019-07-20 02:39:46.992 UTC [common.channelconfig] validateMSP -> DEBU 64f Setting up MSP for org Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.992 UTC [msp] newBccspMsp -> DEBU 650 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.993 UTC [msp] New -> DEBU 651 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.993 UTC [msp] Setup -> DEBU 652 Setting up MSP instance Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.994 UTC [msp.identity] newIdentity -> DEBU 653 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.994 UTC [msp.identity] newIdentity -> DEBU 654 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:46.995 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 655 Checking if identity satisfies role [CLIENT] for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.995 UTC [msp] Validate -> DEBU 656 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:46.996 UTC [msp] getCertificationChain -> DEBU 657 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:46.996 UTC [msp] hasOURole -> DEBU 658 MSP Org2MSP checking if the identity is a client" -peer0.org1.example.com | "2019-07-20 02:39:46.997 UTC [msp] getCertificationChain -> DEBU 659 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:46.997 UTC [common.channelconfig] NewStandardValues -> DEBU 65a Initializing protos for *channelconfig.OrdererProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65b Processing field: ConsensusType" -peer0.org1.example.com | "2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65c Processing field: BatchSize" -peer0.org1.example.com | "2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65d Processing field: BatchTimeout" -peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65e Processing field: KafkaBrokers" -peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65f Processing field: ChannelRestrictions" -peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 660 Processing field: Capabilities" -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.114 UTC [cauthdsl] func1 -> DEBU 4e8 0xc000bb8980 gate 1563590379114969000 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4e9 0xc000bb8980 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4ea 0xc000bb8980 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4eb 0xc000bb8980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4ec 0xc000bb8980 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4ed 0xc000bb8980 gate 1563590379114969000 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4ee Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4f1 0xc000bb9b00 gate 1563590379115234200 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f2 0xc000bb9b00 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f3 0xc000bb9b00 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f4 Checking if identity satisfies ADMIN role for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f5 0xc000bb9b00 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [msp.identity] Verify -> DEBU 4f6 Verify: digest = 00000000 6f 70 eb 41 19 f6 82 19 30 b7 c5 f4 f6 5f 2f 51 |op.A....0...._/Q| -orderer0.example.com | 00000010 73 b7 46 41 df 6f 6f 5e eb 3f dd 53 b6 12 6b b8 |s.FA.oo^.?.S..k.|" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [msp.identity] Verify -> DEBU 4f7 Verify: sig = 00000000 30 44 02 20 2f cc 30 9a 07 4c 89 25 66 17 0c a1 |0D. /.0..L.%f...| -orderer0.example.com | 00000010 54 af b6 5e 0d 5b d1 81 28 f0 94 1f f3 89 5e 20 |T..^.[..(.....^ | -orderer0.example.com | 00000020 03 a3 9f 04 02 20 41 e1 b4 72 42 f3 b8 46 df 81 |..... A..rB..F..| -orderer0.example.com | 00000030 1b ef 12 2c f8 be 1f 8b b6 a7 18 1d 99 92 da d2 |...,............| -orderer0.example.com | 00000040 b6 52 e0 6c 82 94 |.R.l..|" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f8 0xc000bb9b00 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4f9 0xc000bb9b00 gate 1563590379115234200 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fa Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fc Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 4fe Processing change to key: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 4ff Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 500 Processing change to key: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 501 Processing change to key: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 502 Processing change to key: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] recurseConfigMap -> DEBU 503 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 504 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 505 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 506 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 507 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 508 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 509 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50a Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50c Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50d Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 50e Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 50f Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] NewStandardValues -> DEBU 661 Initializing protos for *channelconfig.OrdererOrgProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 662 Processing field: Endpoints" -peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] NewStandardValues -> DEBU 663 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 664 Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:39:46.999 UTC [common.channelconfig] validateMSP -> DEBU 665 Setting up MSP for org OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:46.999 UTC [msp] newBccspMsp -> DEBU 666 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.999 UTC [msp] New -> DEBU 667 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:46.999 UTC [msp] Setup -> DEBU 668 Setting up MSP instance OrdererMSP" -peer0.org1.example.com | "2019-07-20 02:39:47.000 UTC [msp.identity] newIdentity -> DEBU 669 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:47.000 UTC [msp.identity] newIdentity -> DEBU 66a Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:47.001 UTC [msp] Validate -> DEBU 66b MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:47.002 UTC [msp] Setup -> DEBU 66c Setting up the MSP manager (3 msps)" -peer0.org1.example.com | "2019-07-20 02:39:47.002 UTC [msp] Setup -> DEBU 66d MSP manager setup complete, setup 3 msps" -peer0.org1.example.com | "2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 66e Proposed new policy Endorsement for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 66f Proposed new policy Readers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 670 Proposed new policy Writers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 671 Proposed new policy Admins for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 672 Proposed new policy Readers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 673 Proposed new policy Writers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 674 Proposed new policy Admins for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.004 UTC [policies] NewManagerImpl -> DEBU 675 Proposed new policy Endorsement for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.006 UTC [policies] NewManagerImpl -> DEBU 676 Proposed new policy Endorsement for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:47.006 UTC [policies] NewManagerImpl -> DEBU 677 Proposed new policy Readers for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 678 Proposed new policy Writers for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 679 Proposed new policy Admins for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 67a Proposed new policy LifecycleEndorsement for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 67b Proposed new policy Readers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67c Proposed new policy Writers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67d Proposed new policy Admins for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67e Proposed new policy Admins for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67f Proposed new policy BlockValidation for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:47.009 UTC [policies] NewManagerImpl -> DEBU 680 Proposed new policy Readers for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:47.009 UTC [policies] NewManagerImpl -> DEBU 681 Proposed new policy Writers for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 682 Proposed new policy Admins for Channel" -peer0.org1.example.com | "2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 683 Proposed new policy Readers for Channel" -peer0.org1.example.com | "2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 684 Proposed new policy Writers for Channel" -peer0.org1.example.com | "2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 685 Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 686 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 687 Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 688 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 689 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68e Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 690 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 691 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 692 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 693 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 694 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 695 Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 696 Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 697 Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 698 Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 699 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69a Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69b Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69c Adding to config map: [Group] /Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -peer0.org1.example.com | "2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -peer0.org1.example.com | "2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a3 Adding to config map: [Value] /Channel/Orderer/Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -peer0.org1.example.com | "2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a5 Adding to config map: [Value] /Channel/Orderer/BatchSize" -peer0.org1.example.com | "2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -peer0.org1.example.com | "2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a7 Adding to config map: [Policy] /Channel/Orderer/Admins" -peer0.org1.example.com | "2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a9 Adding to config map: [Policy] /Channel/Orderer/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6aa Adding to config map: [Policy] /Channel/Orderer/Writers" -peer0.org1.example.com | "2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6ab Adding to config map: [Value] /Channel/Capabilities" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ac Adding to config map: [Value] /Channel/HashingAlgorithm" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ad Adding to config map: [Value] /Channel/BlockDataHashingStructure" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ae Adding to config map: [Value] /Channel/OrdererAddresses" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6af Adding to config map: [Value] /Channel/Consortium" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b0 Adding to config map: [Policy] /Channel/Admins" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b1 Adding to config map: [Policy] /Channel/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b2 Adding to config map: [Policy] /Channel/Writers" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6b3 As expected, current configuration has policy '/Channel/Readers'" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6b4 As expected, current configuration has policy '/Channel/Writers'" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b5 Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b6 Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b7 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b8 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b9 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6ba Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bb As expected, current configuration has policy '/Channel/Application/Readers'" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bc As expected, current configuration has policy '/Channel/Application/Writers'" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bd As expected, current configuration has policy '/Channel/Application/Admins'" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6be Manager Channel looking up path [Orderer]" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6bf Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c0 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c1 Manager Channel/Orderer looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c2 Manager Channel/Orderer has managers OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c3 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -peer0.org1.example.com | "2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c4 As expected, current configuration has policy '/Channel/Orderer/Admins'" -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 510 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 511 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 512 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 513 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 514 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 515 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 516 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 517 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 518 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 519 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] NewStandardValues -> DEBU 51a Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51b Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51c Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51d Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51e Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51f Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] NewStandardValues -> DEBU 520 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 521 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 522 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 523 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 524 Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 525 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 526 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] NewStandardValues -> DEBU 527 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 528 Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] NewStandardValues -> DEBU 529 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 52a Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] validateMSP -> DEBU 52b Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [msp] newBccspMsp -> DEBU 52c Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [msp] New -> DEBU 52d Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [msp] Setup -> DEBU 52e Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [msp.identity] newIdentity -> DEBU 52f Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.118 UTC [msp.identity] newIdentity -> DEBU 530 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [msp] Validate -> DEBU 531 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 532 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 533 Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 534 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 535 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 536 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 537 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 538 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] Validate -> DEBU 539 Anchor peers for org Org2MSP are " -peer0.org1.example.com | "2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c5 As expected, current configuration has policy '/Channel/Orderer/Writers'" -peer0.org1.example.com | "2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c6 As expected, current configuration has policy '/Channel/Orderer/Readers'" -peer0.org1.example.com | "2019-07-20 02:39:47.022 UTC [common.capabilities] Supported -> DEBU 6c7 Application capability V1_4_2 is supported and is enabled" -peer0.org1.example.com | "2019-07-20 02:39:47.022 UTC [common.capabilities] Supported -> DEBU 6c8 Channel capability V1_4_2 is supported and is enabled" -peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6c9 Processing new config for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6ca Calling out because config was updated for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cb Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cc Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" -peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cd Creating state provider for chainID businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ce Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6cf Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.024 UTC [msp] DeserializeIdentity -> DEBU 6d3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.024 UTC [msp.identity] newIdentity -> DEBU 6d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func1 -> DEBU 6d5 0xc0036eb490 gate 1563590387025007200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6d6 0xc0036eb490 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6d7 0xc0036eb490 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6d8 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [msp] Validate -> DEBU 6d9 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [msp] getCertificationChain -> DEBU 6da MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6db 0xc0036eb490 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [msp.identity] Verify -> DEBU 6dc Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| -peer0.org1.example.com | 00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [msp.identity] Verify -> DEBU 6dd Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| -peer0.org1.example.com | 00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| -peer0.org1.example.com | 00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| -peer0.org1.example.com | 00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| -peer0.org1.example.com | 00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6de 0xc0036eb490 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func1 -> DEBU 6df 0xc0036eb490 gate 1563590387025007200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [policies] Evaluate -> DEBU 6e0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.gossip] JoinChan -> INFO 6e4 Joining gossip network of channel businesschannel with 2 organizations" -peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e5 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.discovery] Connect -> DEBU 6e6 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " -peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.discovery] Connect -> DEBU 6e7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e8 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e9 Anchor peer with same endpoint, skipping connecting to myself" -peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.service] updateEndpoints -> DEBU 6ea Updating endpoints for chainID%!(EXTRA string=businesschannel)" -peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [peer] updateTrustedRoots -> DEBU 6eb Updating trusted root authorities for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:47.027 UTC [grpc] DialContext -> DEBU 6ec parsed scheme: """ -peer0.org1.example.com | "2019-07-20 02:39:47.027 UTC [grpc] DialContext -> DEBU 6ed scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-07-20 02:39:47.027 UTC [grpc] watcher -> DEBU 6ee ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -peer0.org1.example.com | "2019-07-20 02:39:47.027 UTC [grpc] switchBalancer -> DEBU 6ef ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-07-20 02:39:47.027 UTC [grpc] HandleSubConnStateChange -> DEBU 6f0 pickfirstBalancer: HandleSubConnStateChange: 0xc0037381a0, CONNECTING" -peer0.org1.example.com | "2019-07-20 02:39:47.039 UTC [grpc] HandleSubConnStateChange -> DEBU 6f1 pickfirstBalancer: HandleSubConnStateChange: 0xc0037381a0, READY" -peer0.org1.example.com | "2019-07-20 02:39:47.041 UTC [msp] GetDefaultSigningIdentity -> DEBU 6f2 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.041 UTC [msp.identity] Sign -> DEBU 6f3 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.041 UTC [msp.identity] Sign -> DEBU 6f4 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.041 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6f5 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.043 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6f6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.043 UTC [msp] DeserializeIdentity -> DEBU 6f7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.043 UTC [msp] DeserializeIdentity -> DEBU 6f8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.043 UTC [msp.identity] newIdentity -> DEBU 6f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:47.044 UTC [msp] Validate -> DEBU 6fa MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:47.044 UTC [msp] getCertificationChain -> DEBU 6fb MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:47.044 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 6fd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 6ff Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 700 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 701 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 702 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 703 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 704 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 705 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 706 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [cauthdsl] func1 -> DEBU 707 0xc00377bc70 gate 1563590387046596900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [cauthdsl] func2 -> DEBU 708 0xc00377bc70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [cauthdsl] func2 -> DEBU 709 0xc00377bc70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 70a 0xc00377bc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 70b 0xc00377bc70 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func1 -> DEBU 70c 0xc00377bc70 gate 1563590387046596900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func1 -> DEBU 710 0xc0037984d0 gate 1563590387047829100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 711 0xc0037984d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 712 0xc0037984d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 713 Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [msp] Validate -> DEBU 714 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [msp] getCertificationChain -> DEBU 715 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [cauthdsl] func2 -> DEBU 716 0xc0037984d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [msp.identity] Verify -> DEBU 717 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [msp.identity] Verify -> DEBU 718 Verify: sig = 00000000 30 45 02 21 00 c5 42 26 31 9b 5f 88 e8 ff 3c af |0E.!..B&1._...<.| -peer0.org1.example.com | 00000010 89 aa 06 67 e2 b6 11 2d 5c 3c 46 9f e7 66 a8 fd |...g...-\..| -peer0.org1.example.com | 00000030 a7 5f c2 d5 fb df 79 1f 8d 4b 32 8f b7 a0 3b de |._....y..K2...;.| -peer0.org1.example.com | 00000040 6d eb ba 3e c2 98 e3 |m..>...|" -peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [cauthdsl] func2 -> DEBU 719 0xc0037984d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [cauthdsl] func1 -> DEBU 71a 0xc0037984d0 gate 1563590387047829100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [policies] Evaluate -> DEBU 71b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [policies] Evaluate -> DEBU 71c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [policies] Evaluate -> DEBU 71d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [policies] Evaluate -> DEBU 71e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [gossip.comm] authenticateRemotePeer -> DEBU 71f Authenticated 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp] DeserializeIdentity -> DEBU 720 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp] GetDefaultSigningIdentity -> DEBU 721 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 722 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915100F " -peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 723 Sign: digest: FD5AEC2A368260611D522F195C3901A89781740BD1E3F90CA9C8FB49E2302DCC " -peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp] GetDefaultSigningIdentity -> DEBU 724 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 725 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:47.050 UTC [msp.identity] Sign -> DEBU 726 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:47.050 UTC [msp] DeserializeIdentity -> DEBU 727 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.050 UTC [gossip.comm] Send -> DEBU 728 Entering, sending GossipMessage: nonce:16868747491599105266 tag:EMPTY mem_req:\335\362\227_4\222\230\364ar\204=\330\272?2G\364\221\002 !\320\326\223\255\030\233\221\006%\336??V\331\020\r\244\273l\226\375i.b\r\210\2039\356\232\001" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:47.050 UTC [gossip.comm] sendToEndpoint -> DEBU 729 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:16868747491599105266 tag:EMPTY mem_req:\335\362\227_4\222\230\364ar\204=\330\272?2G\364\221\002 !\320\326\223\255\030\233\221\006%\336??V\331\020\r\244\273l\226\375i.b\r\210\2039\356\232\001" > > , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.050 UTC [gossip.comm] createConnection -> DEBU 72a Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:39:47.055 UTC [grpc] infof -> DEBU 72b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:47.055 UTC [grpc] DialContext -> DEBU 72c parsed scheme: """ -peer0.org1.example.com | "2019-07-20 02:39:47.055 UTC [grpc] DialContext -> DEBU 72d scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-07-20 02:39:47.055 UTC [grpc] watcher -> DEBU 72e ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -peer0.org1.example.com | "2019-07-20 02:39:47.055 UTC [grpc] switchBalancer -> DEBU 72f ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-07-20 02:39:47.056 UTC [grpc] HandleSubConnStateChange -> DEBU 730 pickfirstBalancer: HandleSubConnStateChange: 0xc0037b9700, CONNECTING" -peer0.org1.example.com | "2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 731 updating root CAs for channel [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 732 adding app root CAs for MSP [Org1MSP]" -peer0.org1.example.com | "2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 733 adding app root CAs for MSP [Org2MSP]" -peer0.org1.example.com | "2019-07-20 02:39:47.059 UTC [peer] buildTrustedRootsForChain -> DEBU 734 adding orderer root CAs for MSP [OrdererMSP]" -peer0.org1.example.com | "2019-07-20 02:39:47.059 UTC [committer.txvalidator] validateTx -> DEBU 735 config transaction received for chain businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:47.059 UTC [committer.txvalidator] validateTx -> DEBU 736 [businesschannel] validateTx completes for block 0xc003516200 env 0xc00353d860 txn 0" -peer0.org1.example.com | "2019-07-20 02:39:47.060 UTC [committer.txvalidator] Validate -> DEBU 737 got result for idx 0, code 0" -peer0.org1.example.com | "2019-07-20 02:39:47.060 UTC [committer.txvalidator] Validate -> INFO 738 [businesschannel] Validated block [2] in 97ms" -peer0.org1.example.com | "2019-07-20 02:39:47.061 UTC [gossip.privdata] listMissingPrivateData -> DEBU 739 Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-07-20 02:39:47.061 UTC [gossip.privdata] StoreBlock -> DEBU 73a [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-07-20 02:39:47.061 UTC [committer] preCommit -> DEBU 73b Received configuration update, calling CSCC ConfigUpdate" -peer0.org1.example.com | "2019-07-20 02:39:47.061 UTC [kvledger] CommitWithPvtData -> DEBU 73c [businesschannel] Validating state for block [2]" -peer0.org1.example.com | "2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73d Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73e lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73f Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-07-20 02:39:47.062 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 740 ValidateAndPrepareBatch() for block number = [2]" -peer0.org1.example.com | "2019-07-20 02:39:47.062 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 741 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:39:47.063 UTC [valimpl] preprocessProtoBlock -> DEBU 742 txType=CONFIG" -peer0.org1.example.com | "2019-07-20 02:39:47.063 UTC [valimpl] processNonEndorserTx -> DEBU 743 Performing custom processing for transaction [txid=], [txType=CONFIG]" -peer0.org1.example.com | "2019-07-20 02:39:47.063 UTC [valimpl] processNonEndorserTx -> DEBU 744 Processor for custom tx processing:&peer.configtxProcessor{}" -peer0.org1.example.com | "2019-07-20 02:39:47.063 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 745 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:39:47.064 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 747 constructing new tx simulator txid = []" -peer0.org1.example.com | "2019-07-20 02:39:47.064 UTC [peer] GenerateSimulationResults -> DEBU 748 Processing CONFIG" -peer0.org1.example.com | "2019-07-20 02:39:47.063 UTC [grpc] HandleSubConnStateChange -> DEBU 746 pickfirstBalancer: HandleSubConnStateChange: 0xc0037b9700, READY" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] validateMSP -> DEBU 53a Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [msp] newBccspMsp -> DEBU 53b Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [msp] New -> DEBU 53c Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.119 UTC [msp] Setup -> DEBU 53d Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp.identity] newIdentity -> DEBU 53e Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp.identity] newIdentity -> DEBU 53f Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 540 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp] Validate -> DEBU 541 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp] getCertificationChain -> DEBU 542 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp] hasOURole -> DEBU 543 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp] getCertificationChain -> DEBU 544 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] NewStandardValues -> DEBU 545 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 546 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] NewStandardValues -> DEBU 547 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 548 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] Validate -> DEBU 549 Anchor peers for org Org1MSP are " -orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] validateMSP -> DEBU 54a Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.121 UTC [msp] newBccspMsp -> DEBU 54b Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.121 UTC [msp] New -> DEBU 54c Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.121 UTC [msp] Setup -> DEBU 54d Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.121 UTC [msp.identity] newIdentity -> DEBU 54e Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.121 UTC [msp.identity] newIdentity -> DEBU 54f Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 550 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] Validate -> DEBU 551 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] getCertificationChain -> DEBU 552 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] hasOURole -> DEBU 553 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] getCertificationChain -> DEBU 554 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] Setup -> DEBU 555 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] Setup -> DEBU 556 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 557 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 558 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 559 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55a Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55b Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55c Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55d Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55e Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55f Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 560 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 561 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 562 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 563 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 564 Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 565 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 566 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 567 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 568 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 569 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56a Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56b Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56c Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56d Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 56e Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 56f Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 570 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 571 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 572 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 573 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 574 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 575 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 576 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 577 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 578 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 579 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57a Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57b Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57c Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57d Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57e Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57f Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 580 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 581 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 582 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 583 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 584 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 585 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 586 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 587 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 588 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 589 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58a Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58b Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58c Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58e Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58f Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 590 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 591 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 592 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 593 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 594 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 595 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 596 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 597 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 598 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 599 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.capabilities] Supported -> DEBU 59a Orderer capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.capabilities] Supported -> DEBU 59b Channel capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:39.126 UTC [orderer.common.cluster] NewStream -> DEBU 59c Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" -orderer0.example.com | "2019-07-20 02:39:39.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 59d Send of SubmitRequest for channel testchainid with payload of size 24752 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " -orderer0.example.com | "2019-07-20 02:39:39.128 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 59e Sending msg of 24752 bytes to 3 on channel testchainid took 439.3µs" -orderer0.example.com | "2019-07-20 02:39:39.128 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 59f [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39030" -orderer0.example.com | "2019-07-20 02:39:39.132 UTC [common.deliver] deliverBlocks -> DEBU 5a0 Rejecting deliver for 172.18.0.9:39028 because channel businesschannel not found" -orderer0.example.com | "2019-07-20 02:39:39.132 UTC [orderer.common.broadcast] Handle -> DEBU 5a1 Received EOF from 172.18.0.9:39030, hangup" -orderer0.example.com | "2019-07-20 02:39:39.132 UTC [orderer.common.server] func1 -> DEBU 5a2 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:39:39.132 UTC [comm.grpc.server] 1 -> INFO 5a3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39028 grpc.code=OK grpc.call_duration=87.743ms -orderer0.example.com | "2019-07-20 02:39:39.132 UTC [orderer.common.server] func1 -> DEBU 5a4 Closing Broadcast stream" -orderer0.example.com | "2019-07-20 02:39:39.132 UTC [comm.grpc.server] 1 -> INFO 5a5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39030 grpc.code=OK grpc.call_duration=58.5325ms -orderer0.example.com | "2019-07-20 02:39:39.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5a6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 24963" -orderer0.example.com | "2019-07-20 02:39:39.136 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5a7 Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" -orderer0.example.com | "2019-07-20 02:39:39.136 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5a8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.7µs " -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5a9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5aa Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5ab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.9µs " -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5ac Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] NewStandardValues -> DEBU 5ad Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ae Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5af Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b0 Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b1 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b2 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] NewStandardValues -> DEBU 5b3 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b4 Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b5 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] NewStandardValues -> DEBU 5b6 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b7 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] NewStandardValues -> DEBU 5b8 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b9 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] Validate -> DEBU 5ba Anchor peers for org Org1MSP are " -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] validateMSP -> DEBU 5bb Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp] newBccspMsp -> DEBU 5bc Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp] New -> DEBU 5bd Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp] Setup -> DEBU 5be Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp.identity] newIdentity -> DEBU 5bf Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp.identity] newIdentity -> DEBU 5c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5c1 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp] Validate -> DEBU 5c2 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] getCertificationChain -> DEBU 5c3 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] hasOURole -> DEBU 5c4 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] getCertificationChain -> DEBU 5c5 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] NewStandardValues -> DEBU 5c6 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c7 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] NewStandardValues -> DEBU 5c8 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c9 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] Validate -> DEBU 5ca Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] validateMSP -> DEBU 5cb Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] newBccspMsp -> DEBU 5cc Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] New -> DEBU 5cd Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] Setup -> DEBU 5ce Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp.identity] newIdentity -> DEBU 5cf Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp.identity] newIdentity -> DEBU 5d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.145 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5d1 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.145 UTC [msp] Validate -> DEBU 5d2 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.145 UTC [msp] getCertificationChain -> DEBU 5d3 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.145 UTC [msp] hasOURole -> DEBU 5d4 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:39.146 UTC [msp] getCertificationChain -> DEBU 5d5 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:39.146 UTC [common.channelconfig] NewStandardValues -> DEBU 5d6 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d7 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d8 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d9 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5da Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5db Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5dc Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] NewStandardValues -> DEBU 5dd Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5de Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] NewStandardValues -> DEBU 5df Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e0 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] validateMSP -> DEBU 5e1 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [msp] newBccspMsp -> DEBU 5e2 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [msp] New -> DEBU 5e3 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [msp] Setup -> DEBU 5e4 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [msp.identity] newIdentity -> DEBU 5e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.151 UTC [msp.identity] newIdentity -> DEBU 5e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | "2019-07-20 02:39:47.065 UTC [peer] processChannelConfigTx -> DEBU 749 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -peer0.org1.example.com | "2019-07-20 02:39:47.066 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 74a Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:39:47.066 UTC [lockbasedtxmgr] Done -> DEBU 74b Done with transaction simulation / query execution []" -peer0.org1.example.com | "2019-07-20 02:39:47.066 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 74c Block [2] Transaction index [0] TxId [] marked as valid by state validator" -peer0.org1.example.com | "2019-07-20 02:39:47.067 UTC [valinternal] ApplyWriteSet -> DEBU 74d txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003862b80)}" -peer0.org1.example.com | "2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74e validating rwset..." -peer0.org1.example.com | "2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74f postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 750 ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-07-20 02:39:47.067 UTC [kvledger] CommitWithPvtData -> DEBU 751 [businesschannel] Adding CommitHash to the block [2]" -peer0.org1.example.com | "2019-07-20 02:39:47.068 UTC [kvledger] CommitWithPvtData -> DEBU 752 [businesschannel] Committing block [2] to storage" -peer0.org1.example.com | "2019-07-20 02:39:47.068 UTC [ledgerstorage] CommitWithPvtData -> DEBU 753 Writing block [2] to pvt block store" -peer0.org1.example.com | "2019-07-20 02:39:47.069 UTC [msp] GetDefaultSigningIdentity -> DEBU 754 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.069 UTC [msp.identity] Sign -> DEBU 755 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.069 UTC [msp.identity] Sign -> DEBU 756 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.069 UTC [gossip.comm] authenticateRemotePeer -> DEBU 757 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.070 UTC [gossip.comm] authenticateRemotePeer -> DEBU 758 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.071 UTC [msp] DeserializeIdentity -> DEBU 759 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.071 UTC [msp] DeserializeIdentity -> DEBU 75a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.071 UTC [msp.identity] newIdentity -> DEBU 75b Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:47.072 UTC [pvtdatastorage] Prepare -> DEBU 75c Saved 0 private data write sets for block [2]" -peer0.org1.example.com | "2019-07-20 02:39:47.072 UTC [msp] Validate -> DEBU 75d MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:47.073 UTC [msp] getCertificationChain -> DEBU 75e MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:47.073 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 75f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.073 UTC [msp] DeserializeIdentity -> DEBU 760 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.073 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 761 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [msp] DeserializeIdentity -> DEBU 762 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 763 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 764 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 765 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 766 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 767 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 768 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [cauthdsl] func1 -> DEBU 769 0xc0038cd0c0 gate 1563590387074883400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [cauthdsl] func2 -> DEBU 76a 0xc0038cd0c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [cauthdsl] func2 -> DEBU 76b 0xc0038cd0c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.075 UTC [cauthdsl] func2 -> DEBU 76c 0xc0038cd0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.075 UTC [cauthdsl] func2 -> DEBU 76d 0xc0038cd0c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.075 UTC [cauthdsl] func1 -> DEBU 76e 0xc0038cd0c0 gate 1563590387074883400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 76f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 770 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 771 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [cauthdsl] func1 -> DEBU 772 0xc0038cd920 gate 1563590387076484600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [cauthdsl] func2 -> DEBU 773 0xc0038cd920 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [cauthdsl] func2 -> DEBU 774 0xc0038cd920 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 775 Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [msp] Validate -> DEBU 776 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:47.077 UTC [msp] getCertificationChain -> DEBU 777 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:47.077 UTC [fsblkstorage] indexBlock -> DEBU 778 Indexing block [blockNum=2, blockHash=[]byte{0xb0, 0xfa, 0x63, 0xe5, 0xe8, 0x64, 0xcd, 0x16, 0x11, 0x80, 0x50, 0x35, 0x2d, 0xad, 0x86, 0x3a, 0xc1, 0x73, 0xcd, 0x98, 0x4c, 0x4b, 0x68, 0x4e, 0x68, 0x76, 0xba, 0xe2, 0x63, 0x2f, 0x8b, 0x3} txOffsets= -peer0.org1.example.com | txId=43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f locPointer=offset=71, bytesLength=22741 -peer0.org1.example.com | ]" -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:39.152 UTC [msp] Validate -> DEBU 5e7 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:39.152 UTC [msp] Setup -> DEBU 5e8 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:39.152 UTC [msp] Setup -> DEBU 5e9 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ea Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5eb Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ec Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ed Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ee Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ef Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f0 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f1 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f2 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f3 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f4 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f5 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f6 Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f7 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f8 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f9 Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fa Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fb Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fc Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fd Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fe Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5ff Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 600 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 606 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 607 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 608 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 609 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60d Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60e Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 610 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 611 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 612 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 613 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 614 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 615 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 616 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 617 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 618 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 619 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61e Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61f Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 620 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 621 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 622 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 623 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 624 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 625 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 626 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 627 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 628 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 629 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62a Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62b Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62c Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 62d As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 62e As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 62f Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 630 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 631 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 632 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 633 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 634 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 635 As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 636 As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 637 As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 638 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 639 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63a Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63b Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63c Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 63d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 63e As expected, current configuration has policy '/Channel/Orderer/Admins'" -orderer0.example.com | "2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 63f As expected, current configuration has policy '/Channel/Orderer/Writers'" -orderer0.example.com | "2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 640 As expected, current configuration has policy '/Channel/Orderer/Readers'" -orderer0.example.com | "2019-07-20 02:39:39.165 UTC [common.capabilities] Supported -> DEBU 641 Orderer capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:39.174 UTC [common.capabilities] Supported -> DEBU 642 Channel capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:39.174 UTC [fsblkstorage] newBlockfileMgr -> DEBU 643 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " -orderer0.example.com | "2019-07-20 02:39:39.174 UTC [kvledger.util] CreateDirIfMissing -> DEBU 644 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" -orderer0.example.com | "2019-07-20 02:39:39.174 UTC [kvledger.util] logDirStatus -> DEBU 645 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" -orderer0.example.com | "2019-07-20 02:39:39.175 UTC [kvledger.util] logDirStatus -> DEBU 646 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" -orderer0.example.com | "2019-07-20 02:39:39.175 UTC [fsblkstorage] newBlockfileMgr -> INFO 647 Getting block information from block storage" -orderer0.example.com | "2019-07-20 02:39:39.175 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 648 Retrieving checkpoint info from block files" -peer0.org1.example.com | "2019-07-20 02:39:47.077 UTC [fsblkstorage] indexBlock -> DEBU 77a Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22741] for tx ID: [43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f] to txid-index" -peer0.org1.example.com | "2019-07-20 02:39:47.078 UTC [fsblkstorage] indexBlock -> DEBU 77b Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22741] for tx number:[0] ID: [43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f] to blockNumTranNum index" -peer0.org1.example.com | "2019-07-20 02:39:47.077 UTC [cauthdsl] func2 -> DEBU 779 0xc0038cd920 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.078 UTC [msp.identity] Verify -> DEBU 77c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:39:47.078 UTC [msp.identity] Verify -> DEBU 77d Verify: sig = 00000000 30 45 02 21 00 b5 08 ec a2 9a f2 02 e8 0d 9f fa |0E.!............| -peer0.org1.example.com | 00000010 be 56 91 95 23 4b 8b fe 8a 0e 32 22 e3 92 90 4c |.V..#K....2"...L| -peer0.org1.example.com | 00000020 9d 28 c3 af c4 02 20 50 74 94 85 0a 43 01 c4 6a |.(.... Pt...C..j| -peer0.org1.example.com | 00000030 16 31 5b dd c4 61 b7 01 a2 1c 97 0c 6f 4b b4 1c |.1[..a......oK..| -peer0.org1.example.com | 00000040 fc 29 ea 1b be 73 4d |.)...sM|" -peer0.org1.example.com | "2019-07-20 02:39:47.078 UTC [cauthdsl] func2 -> DEBU 77e 0xc0038cd920 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.079 UTC [cauthdsl] func1 -> DEBU 77f 0xc0038cd920 gate 1563590387076484600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 780 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 781 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 782 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.079 UTC [fsblkstorage] updateCheckpoint -> DEBU 783 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71461], isChainEmpty=[false], lastBlockNumber=[2]" -peer0.org1.example.com | "2019-07-20 02:39:47.080 UTC [pvtdatastorage] Commit -> DEBU 785 Committing private data for block [2]" -peer0.org1.example.com | "2019-07-20 02:39:47.080 UTC [policies] Evaluate -> DEBU 784 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.080 UTC [gossip.comm] authenticateRemotePeer -> DEBU 786 Authenticated 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.081 UTC [gossip.comm] createConnection -> DEBU 787 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.081 UTC [gossip.comm] sendToEndpoint -> DEBU 788 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.082 UTC [pvtdatastorage] Commit -> DEBU 789 Committed private data for block [2]" -peer0.org1.example.com | "2019-07-20 02:39:47.083 UTC [gossip.comm] func1 -> DEBU 78a Got message: GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.083 UTC [gossip.gossip] handleMessage -> DEBU 78b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.084 UTC [gossip.gossip] handleMessage -> DEBU 78c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.085 UTC [gossip.discovery] handleMsgFromComm -> DEBU 78d Got message: GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.085 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 78e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:47.085 UTC [kvledger] CommitWithPvtData -> DEBU 78f [businesschannel] Committing block [2] transactions to state database" -peer0.org1.example.com | "2019-07-20 02:39:47.085 UTC [lockbasedtxmgr] Commit -> DEBU 790 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-07-20 02:39:47.086 UTC [lockbasedtxmgr] Commit -> DEBU 791 Committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:39:47.086 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 793 Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-07-20 02:39:47.087 UTC [lockbasedtxmgr] Commit -> DEBU 794 Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:39:47.088 UTC [stateleveldb] ApplyUpdates -> DEBU 795 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -peer0.org1.example.com | "2019-07-20 02:39:47.086 UTC [msp.identity] Verify -> DEBU 792 Verify: digest = 00000000 fd 5a ec 2a 36 82 60 61 1d 52 2f 19 5c 39 01 a8 |.Z.*6.`a.R/.\9..| -peer0.org1.example.com | 00000010 97 81 74 0b d1 e3 f9 0c a9 c8 fb 49 e2 30 2d cc |..t........I.0-.|" -peer0.org1.example.com | "2019-07-20 02:39:47.088 UTC [msp.identity] Verify -> DEBU 796 Verify: sig = 00000000 30 44 02 20 67 38 97 b4 58 0a 45 87 30 6f 98 3c |0D. g8..X.E.0o.<| -peer0.org1.example.com | 00000010 3e dd f2 97 5f 34 92 98 f4 61 72 84 3d d8 ba 3f |>..._4...ar.=..?| -peer0.org1.example.com | 00000020 32 47 f4 91 02 20 21 d0 d6 93 ad 18 9b 91 06 25 |2G... !........%| -peer0.org1.example.com | 00000030 de 3f 3f 56 d9 10 0d a4 bb 6c 96 fd 69 2e 62 0d |.??V.....l..i.b.| -peer0.org1.example.com | 00000040 88 83 39 ee 9a 01 |..9...|" -peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [gossip.discovery] handleAliveMessage -> DEBU 797 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [gossip.discovery] isSentByMe -> DEBU 798 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [gossip.discovery] handleAliveMessage -> DEBU 799 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 79a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [msp.identity] Verify -> DEBU 79b Verify: digest = 00000000 33 e9 f7 b7 64 80 eb 44 9f b9 1a 0c c0 54 da b1 |3...d..D.....T..| -peer0.org1.example.com | 00000010 12 a2 7b 21 b9 aa 26 4c 17 09 9a 62 90 51 13 03 |..{!..&L...b.Q..|" -peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [msp.identity] Verify -> DEBU 79c Verify: sig = 00000000 30 44 02 20 57 e9 01 f9 79 01 99 25 40 d2 89 c4 |0D. W...y..%@...| -peer0.org1.example.com | 00000010 39 8d a1 8c 1a f0 a9 da 2a f9 c6 2d 89 88 05 ce |9.......*..-....| -peer0.org1.example.com | 00000020 c5 a5 65 61 02 20 42 ad ad 4a 55 ae d8 0c 59 25 |..ea. B..JU...Y%| -peer0.org1.example.com | 00000030 b0 4b 69 80 7c 07 75 16 89 34 f8 38 ff 79 2a ed |.Ki.|.u..4.8.y*.| -peer0.org1.example.com | 00000040 27 e8 69 10 53 bf |'.i.S.|" -orderer0.example.com | "2019-07-20 02:39:39.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 649 retrieveLastFileSuffix()" -orderer0.example.com | "2019-07-20 02:39:39.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 64a retrieveLastFileSuffix() - biggestFileNum = -1" -orderer0.example.com | "2019-07-20 02:39:39.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 64b Last file number found = -1" -orderer0.example.com | "2019-07-20 02:39:39.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 64c No block file found" -orderer0.example.com | "2019-07-20 02:39:39.176 UTC [fsblkstorage] newBlockfileMgr -> DEBU 64d Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0002be900)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -orderer0.example.com | "2019-07-20 02:39:39.180 UTC [fsblkstorage] newBlockIndex -> DEBU 64e newBlockIndex() - indexItems:[[BlockNum]]" -orderer0.example.com | "2019-07-20 02:39:39.180 UTC [orderer.common.server] func1 -> DEBU 64f Executing callback to update root CAs" -orderer0.example.com | "2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 650 updating root CAs for channel [businesschannel]" -orderer0.example.com | "2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 651 adding app root CAs for MSP [Org1MSP]" -peer0.org1.example.com | "2019-07-20 02:39:47.090 UTC [lockbasedtxmgr] Commit -> DEBU 79d Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-07-20 02:39:47.090 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 79e Preparing potential purge list working-set for expiringAtBlk [3]" -peer0.org1.example.com | "2019-07-20 02:39:47.090 UTC [leveldbhelper] GetIterator -> DEBU 79f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" -peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 7a2 No expiry entry found for expiringAtBlk [3]" -peer0.org1.example.com | "2019-07-20 02:39:47.090 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a4 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a5 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a6 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a8 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.090 UTC [lockbasedtxmgr] func1 -> DEBU 7a1 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-07-20 02:39:47.092 UTC [kvledger] CommitWithPvtData -> DEBU 7aa [businesschannel] Committing block [2] transactions to history database" -peer0.org1.example.com | "2019-07-20 02:39:47.093 UTC [historyleveldb] Commit -> DEBU 7ab Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" -peer0.org1.example.com | "2019-07-20 02:39:47.092 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:47.093 UTC [msp] DeserializeIdentity -> DEBU 7ac Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.093 UTC [historyleveldb] Commit -> DEBU 7ad Skipping transaction [0] since it is not an endorsement transaction" -peer0.org1.example.com | "2019-07-20 02:39:47.095 UTC [historyleveldb] Commit -> DEBU 7ae Channel [businesschannel]: Updates committed to history database for blockNo [2]" -peer0.org1.example.com | "2019-07-20 02:39:47.095 UTC [kvledger] CommitWithPvtData -> INFO 7af [businesschannel] Committed block [2] with 1 transaction(s) in 33ms (state_validation=5ms block_and_pvtdata_commit=17ms state_commit=7ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" -peer0.org1.example.com | "2019-07-20 02:39:47.096 UTC [msp] GetDefaultSigningIdentity -> DEBU 7b0 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.096 UTC [msp.identity] Sign -> DEBU 7b1 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020803 " -peer0.org1.example.com | "2019-07-20 02:39:47.097 UTC [msp.identity] Sign -> DEBU 7b2 Sign: digest: 6120CB6F8FAA033DDE98258E327315924BF1BBCF6DB355D5B4AE64BDA214C726 " -peer0.org1.example.com | "2019-07-20 02:39:47.097 UTC [gossip.state] commitBlock -> DEBU 7b3 [businesschannel] Committed block [2] with 1 transaction(s)" -peer0.org1.example.com | "2019-07-20 02:39:47.094 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.101 UTC [policies] Evaluate -> DEBU 7b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.104 UTC [policies] Evaluate -> DEBU 7b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 652 adding app root CAs for MSP [Org2MSP]" -orderer0.example.com | "2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 653 adding orderer root CAs for MSP [OrdererMSP]" -orderer0.example.com | "2019-07-20 02:39:39.211 UTC [fsblkstorage] indexBlock -> DEBU 654 Indexing block [blockNum=0, blockHash=[]byte{0xde, 0xde, 0xd4, 0x2c, 0x3f, 0xc9, 0xd0, 0x46, 0x4d, 0x6c, 0x3a, 0xf6, 0x16, 0x22, 0x29, 0x32, 0x3, 0x44, 0xef, 0x64, 0x10, 0x5f, 0x7f, 0xf6, 0x26, 0x25, 0xe8, 0x71, 0x7d, 0x72, 0x1c, 0xd4} txOffsets= -orderer0.example.com | txId=12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898 locPointer=offset=39, bytesLength=23902 -orderer0.example.com | ]" -orderer0.example.com | "2019-07-20 02:39:39.228 UTC [fsblkstorage] updateCheckpoint -> DEBU 655 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23947], isChainEmpty=[false], lastBlockNumber=[0]" -orderer0.example.com | "2019-07-20 02:39:39.229 UTC [fsblkstorage] Next -> DEBU 656 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-07-20 02:39:39.230 UTC [fsblkstorage] newBlockfileStream -> DEBU 657 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:39:39.231 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 658 Remaining bytes=[23947], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:39.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 659 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:39:39.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 65a blockbytes [23944] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:39.233 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 65b [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" -orderer0.example.com | "2019-07-20 02:39:39.233 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 65c EvictionSuspicion not set, defaulting to 10m0s" -orderer0.example.com | "2019-07-20 02:39:39.234 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 65d No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.234 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 65e No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.247 UTC [orderer.common.server] Deliver -> DEBU 65f Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:39:39.247 UTC [common.deliver] Handle -> DEBU 660 Starting new deliver loop for 172.18.0.9:39032" -orderer0.example.com | "2019-07-20 02:39:39.247 UTC [common.deliver] Handle -> DEBU 661 Attempting to read seek info message from 172.18.0.9:39032" -orderer0.example.com | "2019-07-20 02:39:39.248 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 662 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.253 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 663 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.253 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 664 Appending 0 entries to memory storage" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.253 UTC [fsblkstorage] Next -> DEBU 665 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-07-20 02:39:39.253 UTC [fsblkstorage] newBlockfileStream -> DEBU 666 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 667 Remaining bytes=[23947], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 668 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 669 blockbytes [23944] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:39.253 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 66a [channel: businesschannel] Done creating channel support resources" -orderer0.example.com | "2019-07-20 02:39:39.254 UTC [orderer.commmon.multichannel] newChain -> INFO 66b Created and starting new chain businesschannel" -orderer0.example.com | "2019-07-20 02:39:39.254 UTC [orderer.consensus.etcdraft] Start -> INFO 66c Starting Raft node" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] Configure -> INFO 66d Entering, channel: businesschannel, nodes: [ID: 2, -orderer0.example.com | Endpoint: orderer1.example.com:7050, -orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | ID: 3, -orderer0.example.com | Endpoint: orderer2.example.com:7050, -orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -peer0.org1.example.com | "2019-07-20 02:39:47.104 UTC [policies] Evaluate -> DEBU 7b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.105 UTC [cauthdsl] func1 -> DEBU 7ba 0xc00390d680 gate 1563590387105027200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bb 0xc00390d680 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bc 0xc00390d680 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bd 0xc00390d680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7be 0xc00390d680 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.107 UTC [cauthdsl] func1 -> DEBU 7bf 0xc00390d680 gate 1563590387105027200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.110 UTC [cauthdsl] func1 -> DEBU 7c3 0xc00390dec0 gate 1563590387110615100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c4 0xc00390dec0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c5 0xc00390dec0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c6 0xc00390dec0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.111 UTC [msp.identity] Verify -> DEBU 7c7 Verify: digest = 00000000 37 29 4f 27 ee 89 d6 8e 32 ef 91 79 4f e2 d1 74 |7)O'....2..yO..t| -peer0.org1.example.com | 00000010 e1 30 0d d1 0e 6b 5d 2b cc 5a 4f 26 a8 22 b3 9a |.0...k]+.ZO&."..|" -peer0.org1.example.com | "2019-07-20 02:39:47.111 UTC [msp.identity] Verify -> DEBU 7c8 Verify: sig = 00000000 30 44 02 20 5b d2 0a 4b b5 fe f2 39 00 65 ef 04 |0D. [..K...9.e..| -peer0.org1.example.com | 00000010 21 a8 70 d5 76 9b b1 b2 df 47 3a 43 7b bc 9b f4 |!.p.v....G:C{...| -peer0.org1.example.com | 00000020 31 35 67 a6 02 20 26 8b da dd f0 b4 9b b5 3e 5f |15g.. &.......>_| -peer0.org1.example.com | 00000030 3f 9a 30 db b8 50 7f bb 51 e2 59 78 e7 cb 9f 73 |?.0..P..Q.Yx...s| -peer0.org1.example.com | 00000040 3c 08 e5 df 73 bf |<...s.|" -peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [cauthdsl] func2 -> DEBU 7c9 0xc00390dec0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [cauthdsl] func1 -> DEBU 7ca 0xc00390dec0 gate 1563590387110615100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.113 UTC [gossip.discovery] handleAliveMessage -> DEBU 7cf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.113 UTC [gossip.discovery] learnNewMembers -> DEBU 7d0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" -peer0.org1.example.com | "2019-07-20 02:39:47.114 UTC [gossip.discovery] learnNewMembers -> DEBU 7d1 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.114 UTC [gossip.discovery] learnNewMembers -> DEBU 7d2 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.115 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d3 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.116 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7d4 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.144 UTC [comm.grpc.server] 1 -> INFO 7d5 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.143Z grpc.peer_address=172.18.0.8:60306 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=346.9µs -peer0.org1.example.com | "2019-07-20 02:39:47.146 UTC [msp] GetDefaultSigningIdentity -> DEBU 7d6 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.146 UTC [msp.identity] Sign -> DEBU 7d7 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.147 UTC [msp.identity] Sign -> DEBU 7d8 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.147 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d9 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60306" -orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -peer0.org1.example.com | "2019-07-20 02:39:47.148 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7da Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60306" -peer0.org1.example.com | "2019-07-20 02:39:47.149 UTC [msp] DeserializeIdentity -> DEBU 7db Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.149 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.150 UTC [msp] DeserializeIdentity -> DEBU 7dd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.150 UTC [grpc] infof -> DEBU 7de transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:47.151 UTC [gossip.comm] func1 -> DEBU 7df Got message: GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.151 UTC [gossip.gossip] handleMessage -> DEBU 7e0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.152 UTC [gossip.gossip] handleMessage -> DEBU 7e1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.152 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7e2 Got message: GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.152 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7e3 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:47.152 UTC [msp] DeserializeIdentity -> DEBU 7e4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.153 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7e5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e6 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e7 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.155 UTC [policies] Evaluate -> DEBU 7e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.155 UTC [policies] Evaluate -> DEBU 7e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [policies] Evaluate -> DEBU 7ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [cauthdsl] func1 -> DEBU 7eb 0xc003988d40 gate 1563590387156212600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ec 0xc003988d40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ed 0xc003988d40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ee 0xc003988d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ef 0xc003988d40 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [cauthdsl] func1 -> DEBU 7f0 0xc003988d40 gate 1563590387156212600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [cauthdsl] func1 -> DEBU 7f4 0xc003989580 gate 1563590387157637200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [cauthdsl] func2 -> DEBU 7f5 0xc003989580 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.158 UTC [cauthdsl] func2 -> DEBU 7f7 0xc003989580 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.159 UTC [cauthdsl] func2 -> DEBU 7f8 0xc003989580 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.159 UTC [msp.identity] Verify -> DEBU 7f9 Verify: digest = 00000000 8d 96 0a e7 f4 d6 9c 6a 41 dd 56 bd 54 37 68 f8 |.......jA.V.T7h.| -peer0.org1.example.com | 00000010 86 5d 33 ca d9 e3 62 54 84 3c 10 d3 48 0d 9f 26 |.]3...bT.<..H..&|" -peer0.org1.example.com | "2019-07-20 02:39:47.159 UTC [msp.identity] Verify -> DEBU 7fa Verify: sig = 00000000 30 45 02 21 00 ba ca 3b 2a 08 32 48 44 89 bb cd |0E.!...;*.2HD...| -peer0.org1.example.com | 00000010 e8 fe d1 bd 03 49 28 e4 c6 9f 33 a6 2f 6e 6a 7f |.....I(...3./nj.| -peer0.org1.example.com | 00000020 33 26 20 63 9b 02 20 36 43 a1 44 d4 f4 33 ff b3 |3& c.. 6C.D..3..| -peer0.org1.example.com | 00000030 a7 62 eb 2f b3 0e 53 6c f0 8e 83 8c ad 34 32 f1 |.b./..Sl.....42.| -peer0.org1.example.com | 00000040 92 8b 10 c6 aa a3 47 |......G|" -peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.159 UTC [cauthdsl] func2 -> DEBU 7fb 0xc003989580 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.159 UTC [cauthdsl] func1 -> DEBU 7fc 0xc003989580 gate 1563590387157637200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7ff Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 800 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [msp] DeserializeIdentity -> DEBU 801 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 802 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 803 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:47.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 804 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 805 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 806 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 807 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 808 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 809 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] sendMemResponse -> DEBU 80a Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:39:47.163 UTC [msp] DeserializeIdentity -> DEBU 80b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.163 UTC [msp] DeserializeIdentity -> DEBU 80c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.163 UTC [gossip.comm] Send -> DEBU 80d Entering, sending GossipMessage: Channel: , nonce: 12908362155311551576, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:47.163 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 80e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 80f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.164 UTC [gossip.discovery] sendMemResponse -> DEBU 810 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\022" signature:"0D\002 W\351\001\371y\001\231%@\322\211\3049\215\241\214\032\360\251\332*\371\306-\211\210\005\316\305\245ea\002 B\255\255JU\256\330\014Y%\260Ki\200|\007u\026\2114\3708\377y*\355'\350i\020S\277" > alive: alive: " -peer0.org1.example.com | "2019-07-20 02:39:47.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 811 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.164 UTC [policies] Evaluate -> DEBU 812 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.164 UTC [policies] Evaluate -> DEBU 813 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.165 UTC [policies] Evaluate -> DEBU 814 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.165 UTC [cauthdsl] func1 -> DEBU 815 0xc0039a7050 gate 1563590387165054700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 816 0xc0039a7050 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 817 0xc0039a7050 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 818 0xc0039a7050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.166 UTC [cauthdsl] func2 -> DEBU 819 0xc0039a7050 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.166 UTC [cauthdsl] func1 -> DEBU 81a 0xc0039a7050 gate 1563590387165054700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.167 UTC [cauthdsl] func1 -> DEBU 81e 0xc0039a7890 gate 1563590387166750100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 81f 0xc0039a7890 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 820 0xc0039a7890 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 821 0xc0039a7890 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.168 UTC [msp.identity] Verify -> DEBU 822 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:39:47.168 UTC [msp.identity] Verify -> DEBU 823 Verify: sig = 00000000 30 44 02 20 6d b6 11 5e b2 8d 15 70 cb a8 c8 d8 |0D. m..^...p....| -peer0.org1.example.com | 00000010 34 91 cf f1 80 6a 2f 1f 8e f7 15 2c bf fe d5 fc |4....j/....,....| -peer0.org1.example.com | 00000020 ee 0a 62 60 02 20 13 35 c4 b1 10 1a 41 2f 2a 16 |..b`. .5....A/*.| -peer0.org1.example.com | 00000030 c7 59 4b ca 7c 04 39 0b 04 c6 06 a2 b2 26 9c 1d |.YK.|.9......&..| -peer0.org1.example.com | 00000040 37 39 f1 c3 85 3d |79...=|" -peer0.org1.example.com | "2019-07-20 02:39:47.169 UTC [cauthdsl] func2 -> DEBU 824 0xc0039a7890 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.169 UTC [cauthdsl] func1 -> DEBU 825 0xc0039a7890 gate 1563590387166750100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.169 UTC [policies] Evaluate -> DEBU 826 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.170 UTC [policies] Evaluate -> DEBU 827 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.170 UTC [policies] Evaluate -> DEBU 828 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.171 UTC [policies] Evaluate -> DEBU 829 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.171 UTC [gossip.comm] authenticateRemotePeer -> DEBU 82a Authenticated 172.18.0.8:60306" -peer0.org1.example.com | "2019-07-20 02:39:47.171 UTC [gossip.comm] GossipStream -> DEBU 82b Servicing 172.18.0.8:60306" -peer0.org1.example.com | "2019-07-20 02:39:47.171 UTC [gossip.comm] writeToStream -> DEBU 82c Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:47.172 UTC [gossip.comm] serviceConnection -> DEBU 82d Closing reading from stream" -peer0.org1.example.com | "2019-07-20 02:39:47.172 UTC [gossip.comm] readFromStream -> DEBU 82e 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -peer0.org1.example.com | "2019-07-20 02:39:47.172 UTC [gossip.comm] readFromStream -> DEBU 82f Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:39:47.173 UTC [gossip.comm] func2 -> DEBU 830 Client 172.18.0.8:60306 disconnected" -peer0.org1.example.com | "2019-07-20 02:39:47.173 UTC [comm.grpc.server] 1 -> INFO 831 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.146Z grpc.peer_address=172.18.0.8:60306 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.0277ms -peer0.org1.example.com | "2019-07-20 02:39:47.173 UTC [gossip.comm] sendToEndpoint -> DEBU 832 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12908362155311551576, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.175 UTC [gossip.comm] createConnection -> DEBU 835 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:39:47.174 UTC [gossip.comm] writeToStream -> DEBU 833 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:47.174 UTC [grpc] infof -> DEBU 834 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:47.178 UTC [grpc] DialContext -> DEBU 836 parsed scheme: """ -peer0.org1.example.com | "2019-07-20 02:39:47.179 UTC [grpc] DialContext -> DEBU 837 scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-07-20 02:39:47.180 UTC [grpc] watcher -> DEBU 838 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -peer0.org1.example.com | "2019-07-20 02:39:47.180 UTC [grpc] switchBalancer -> DEBU 839 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-07-20 02:39:47.180 UTC [grpc] HandleSubConnStateChange -> DEBU 83a pickfirstBalancer: HandleSubConnStateChange: 0xc0039e83b0, CONNECTING" -peer0.org1.example.com | "2019-07-20 02:39:47.187 UTC [grpc] HandleSubConnStateChange -> DEBU 83b pickfirstBalancer: HandleSubConnStateChange: 0xc0039e83b0, READY" -peer0.org1.example.com | "2019-07-20 02:39:47.196 UTC [msp] GetDefaultSigningIdentity -> DEBU 83c Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.196 UTC [msp.identity] Sign -> DEBU 83d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.197 UTC [msp.identity] Sign -> DEBU 83e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.197 UTC [gossip.comm] authenticateRemotePeer -> DEBU 83f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.197 UTC [gossip.comm] authenticateRemotePeer -> DEBU 840 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.198 UTC [msp] DeserializeIdentity -> DEBU 841 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.198 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 842 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.198 UTC [msp] DeserializeIdentity -> DEBU 843 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 844 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.199 UTC [msp] DeserializeIdentity -> DEBU 845 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 846 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 847 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 848 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 849 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 84a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 84b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.201 UTC [cauthdsl] func1 -> DEBU 84c 0xc003a290c0 gate 1563590387201199500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84d 0xc003a290c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84e 0xc003a290c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84f 0xc003a290c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.202 UTC [cauthdsl] func2 -> DEBU 850 0xc003a290c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.202 UTC [cauthdsl] func1 -> DEBU 851 0xc003a290c0 gate 1563590387201199500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.202 UTC [policies] Evaluate -> DEBU 852 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.202 UTC [policies] Evaluate -> DEBU 853 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.203 UTC [policies] Evaluate -> DEBU 854 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.203 UTC [cauthdsl] func1 -> DEBU 855 0xc003a29900 gate 1563590387203096300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.203 UTC [cauthdsl] func2 -> DEBU 856 0xc003a29900 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.204 UTC [cauthdsl] func2 -> DEBU 857 0xc003a29900 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.205 UTC [cauthdsl] func2 -> DEBU 858 0xc003a29900 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.205 UTC [msp.identity] Verify -> DEBU 859 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:39:47.205 UTC [msp.identity] Verify -> DEBU 85a Verify: sig = 00000000 30 45 02 21 00 e9 e4 68 d4 df e3 f8 4d 5a 3a 48 |0E.!...h....MZ:H| -peer0.org1.example.com | 00000010 69 08 ac 7a 81 65 5c ac a8 93 17 b7 50 06 16 b9 |i..z.e\.....P...| -peer0.org1.example.com | 00000020 42 6f 05 0c 4a 02 20 62 cd 76 94 68 20 61 dc f0 |Bo..J. b.v.h a..| -peer0.org1.example.com | 00000030 2e 83 42 5f 09 56 d2 9a df 89 3b 1f f1 67 8c 5e |..B_.V....;..g.^| -peer0.org1.example.com | 00000040 54 84 08 79 53 c7 cb |T..yS..|" -peer0.org1.example.com | "2019-07-20 02:39:47.206 UTC [cauthdsl] func2 -> DEBU 85b 0xc003a29900 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.206 UTC [cauthdsl] func1 -> DEBU 85c 0xc003a29900 gate 1563590387203096300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.206 UTC [policies] Evaluate -> DEBU 85d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.206 UTC [policies] Evaluate -> DEBU 85e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.208 UTC [policies] Evaluate -> DEBU 85f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.209 UTC [policies] Evaluate -> DEBU 860 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.209 UTC [gossip.comm] authenticateRemotePeer -> DEBU 861 Authenticated 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.210 UTC [gossip.comm] createConnection -> DEBU 862 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.210 UTC [gossip.comm] sendToEndpoint -> DEBU 863 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.215 UTC [comm.grpc.server] 1 -> INFO 864 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.214Z grpc.peer_address=172.18.0.8:60310 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=280.1µs -peer0.org1.example.com | "2019-07-20 02:39:47.220 UTC [msp] GetDefaultSigningIdentity -> DEBU 865 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.220 UTC [msp.identity] Sign -> DEBU 866 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.220 UTC [msp.identity] Sign -> DEBU 867 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.221 UTC [gossip.comm] authenticateRemotePeer -> DEBU 868 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60310" -peer0.org1.example.com | "2019-07-20 02:39:47.221 UTC [gossip.comm] authenticateRemotePeer -> DEBU 869 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60310" -peer0.org1.example.com | "2019-07-20 02:39:47.221 UTC [msp] DeserializeIdentity -> DEBU 86a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.222 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.222 UTC [msp] DeserializeIdentity -> DEBU 86c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.222 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [msp] DeserializeIdentity -> DEBU 86e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 870 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 871 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [policies] Evaluate -> DEBU 872 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [policies] Evaluate -> DEBU 873 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.224 UTC [policies] Evaluate -> DEBU 874 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.224 UTC [cauthdsl] func1 -> DEBU 875 0xc003a8c6d0 gate 1563590387224316500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 876 0xc003a8c6d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 877 0xc003a8c6d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 878 0xc003a8c6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.225 UTC [cauthdsl] func2 -> DEBU 879 0xc003a8c6d0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.225 UTC [cauthdsl] func1 -> DEBU 87a 0xc003a8c6d0 gate 1563590387224316500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.226 UTC [cauthdsl] func1 -> DEBU 87e 0xc003a8cf10 gate 1563590387226149600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 87f 0xc003a8cf10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 880 0xc003a8cf10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 881 0xc003a8cf10 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.227 UTC [msp.identity] Verify -> DEBU 882 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:39:47.227 UTC [msp.identity] Verify -> DEBU 883 Verify: sig = 00000000 30 44 02 20 6d d0 06 0a 99 c2 1d 0b e9 3a 86 7e |0D. m........:.~| -peer0.org1.example.com | 00000010 68 d0 40 cb 2f 4e d9 d8 78 cd 47 dd 01 76 b8 9d |h.@./N..x.G..v..| -peer0.org1.example.com | 00000020 f5 70 2e 60 02 20 3d a3 e5 19 8e 4e a7 e1 9f f1 |.p.`. =....N....| -peer0.org1.example.com | 00000030 d8 bc bb ff 20 77 36 db db 14 c8 b4 d4 5d 1a 9a |.... w6......]..| -peer0.org1.example.com | 00000040 ed 38 04 92 47 49 |.8..GI|" -peer0.org1.example.com | "2019-07-20 02:39:47.227 UTC [cauthdsl] func2 -> DEBU 884 0xc003a8cf10 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.227 UTC [cauthdsl] func1 -> DEBU 885 0xc003a8cf10 gate 1563590387226149600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.227 UTC [policies] Evaluate -> DEBU 886 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 887 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 888 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 889 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [gossip.comm] authenticateRemotePeer -> DEBU 88a Authenticated 172.18.0.8:60310" -peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [gossip.comm] GossipStream -> DEBU 88b Servicing 172.18.0.8:60310" -peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [gossip.comm] serviceConnection -> DEBU 88c Closing reading from stream" -peer0.org1.example.com | "2019-07-20 02:39:47.229 UTC [gossip.comm] writeToStream -> DEBU 88d Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:47.229 UTC [gossip.comm] readFromStream -> DEBU 88e 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -peer0.org1.example.com | "2019-07-20 02:39:47.229 UTC [grpc] infof -> DEBU 88f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:47.231 UTC [grpc] infof -> DEBU 890 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:47.231 UTC [gossip.comm] readFromStream -> DEBU 891 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:39:47.231 UTC [gossip.comm] func2 -> DEBU 892 Client 172.18.0.8:60310 disconnected" -peer0.org1.example.com | "2019-07-20 02:39:47.231 UTC [comm.grpc.server] 1 -> INFO 893 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.219Z grpc.peer_address=172.18.0.8:60310 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6668ms -peer0.org1.example.com | "2019-07-20 02:39:47.231 UTC [gossip.comm] writeToStream -> DEBU 894 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 895 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 896 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151010 " -peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 897 Sign: digest: 9E55EC7FB3BB5A09C8F1096E69D65D68FCCE83FB3E49B5C1994EDFEB97B2439D " -peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 898 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 899 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 89a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [gossip.discovery] periodicalSendAlive -> DEBU 89b Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:39:47.267 UTC [msp] DeserializeIdentity -> DEBU 89c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.267 UTC [msp] DeserializeIdentity -> DEBU 89d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.267 UTC [gossip.comm] Send -> DEBU 89e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:47.268 UTC [gossip.comm] Send -> DEBU 89f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a2 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.269 UTC [gossip.comm] createConnection -> DEBU 8a3 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:39:47.270 UTC [grpc] DialContext -> DEBU 8a4 parsed scheme: """ -peer0.org1.example.com | "2019-07-20 02:39:47.270 UTC [grpc] DialContext -> DEBU 8a5 scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-07-20 02:39:47.270 UTC [grpc] watcher -> DEBU 8a6 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -peer0.org1.example.com | "2019-07-20 02:39:47.270 UTC [grpc] switchBalancer -> DEBU 8a7 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-07-20 02:39:47.270 UTC [grpc] HandleSubConnStateChange -> DEBU 8a8 pickfirstBalancer: HandleSubConnStateChange: 0xc003ac52b0, CONNECTING" -peer0.org1.example.com | "2019-07-20 02:39:47.275 UTC [grpc] HandleSubConnStateChange -> DEBU 8a9 pickfirstBalancer: HandleSubConnStateChange: 0xc003ac52b0, READY" -peer0.org1.example.com | "2019-07-20 02:39:47.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 8aa Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.280 UTC [msp.identity] Sign -> DEBU 8ab Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.280 UTC [msp.identity] Sign -> DEBU 8ac Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.280 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ad Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.282 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ae Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.283 UTC [msp] DeserializeIdentity -> DEBU 8af Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.286 UTC [msp] DeserializeIdentity -> DEBU 8b1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.287 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.287 UTC [msp] DeserializeIdentity -> DEBU 8b3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8b5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8b6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.288 UTC [policies] Evaluate -> DEBU 8b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.289 UTC [policies] Evaluate -> DEBU 8b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.290 UTC [policies] Evaluate -> DEBU 8b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.290 UTC [cauthdsl] func1 -> DEBU 8ba 0xc003b22fc0 gate 1563590387290515900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.290 UTC [cauthdsl] func2 -> DEBU 8bb 0xc003b22fc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8bc 0xc003b22fc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8bd 0xc003b22fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8be 0xc003b22fc0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [cauthdsl] func1 -> DEBU 8bf 0xc003b22fc0 gate 1563590387290515900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [policies] Evaluate -> DEBU 8c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [policies] Evaluate -> DEBU 8c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.292 UTC [policies] Evaluate -> DEBU 8c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.292 UTC [cauthdsl] func1 -> DEBU 8c3 0xc003b23800 gate 1563590387292449700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.292 UTC [cauthdsl] func2 -> DEBU 8c4 0xc003b23800 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.292 UTC [cauthdsl] func2 -> DEBU 8c5 0xc003b23800 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.293 UTC [cauthdsl] func2 -> DEBU 8c6 0xc003b23800 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.294 UTC [msp.identity] Verify -> DEBU 8c7 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:39:47.294 UTC [msp.identity] Verify -> DEBU 8c8 Verify: sig = 00000000 30 44 02 20 4b 5d ab 54 15 82 ca 40 c4 e0 84 79 |0D. K].T...@...y| -peer0.org1.example.com | 00000010 5e ca 3d 33 21 b2 3e 8c a7 81 ef 81 3b 80 cd 16 |^.=3!.>.....;...| -peer0.org1.example.com | 00000020 98 81 0e 88 02 20 7d 19 e5 dc 30 31 7d 30 0d 6c |..... }...01}0.l| -peer0.org1.example.com | 00000030 10 f1 6e 61 fc ef 84 93 f5 10 5f 08 5f 1d b7 d6 |..na......_._...| -peer0.org1.example.com | 00000040 f0 0b 6e d9 05 44 |..n..D|" -peer0.org1.example.com | "2019-07-20 02:39:47.294 UTC [cauthdsl] func2 -> DEBU 8c9 0xc003b23800 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.296 UTC [cauthdsl] func1 -> DEBU 8ca 0xc003b23800 gate 1563590387292449700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.296 UTC [policies] Evaluate -> DEBU 8cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8cd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.297 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8cf Authenticated 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.297 UTC [gossip.comm] createConnection -> DEBU 8d0 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.298 UTC [gossip.comm] sendToEndpoint -> DEBU 8d1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.302 UTC [comm.grpc.server] 1 -> INFO 8d2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.301Z grpc.peer_address=172.18.0.7:58950 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=480.6µs -peer0.org1.example.com | "2019-07-20 02:39:47.305 UTC [msp] GetDefaultSigningIdentity -> DEBU 8d3 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.305 UTC [msp.identity] Sign -> DEBU 8d4 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.305 UTC [msp.identity] Sign -> DEBU 8d5 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.306 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d6 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:58950" -peer0.org1.example.com | "2019-07-20 02:39:47.309 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d7 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58950" -peer0.org1.example.com | "2019-07-20 02:39:47.309 UTC [msp] DeserializeIdentity -> DEBU 8d8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.309 UTC [msp] DeserializeIdentity -> DEBU 8d9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.310 UTC [msp.identity] newIdentity -> DEBU 8da Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c -peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv -peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr -peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:47.316 UTC [grpc] infof -> DEBU 8db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:47.318 UTC [msp] Validate -> DEBU 8dc MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:47.319 UTC [msp] getCertificationChain -> DEBU 8dd MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:47.320 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.320 UTC [msp] DeserializeIdentity -> DEBU 8df Obtaining identity" -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | ]" -orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 66e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" -orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 66f Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" -orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] func1 -> DEBU 670 Connecting to ID: 2, -orderer0.example.com | Endpoint: orderer1.example.com:7050, -orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI -orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC -orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | for channel businesschannel" -orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 671 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" -orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 672 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" -orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.common.cluster] func1 -> DEBU 673 Connecting to ID: 3, -orderer0.example.com | Endpoint: orderer2.example.com:7050, -orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- -orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l -orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ -orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh -orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 -orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 -orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ -orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E -orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 -orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq -orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg -orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -orderer0.example.com | -----END CERTIFICATE----- -orderer0.example.com | for channel businesschannel" -orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 674 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 675 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" -orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.common.cluster] Configure -> INFO 676 Exiting" -orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.consensus.etcdraft] start -> DEBU 677 Starting raft node: #peers: 3" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.consensus.etcdraft] start -> INFO 678 Starting raft node as part of a new channel" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 679 1 became follower at term 0" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] newRaft -> INFO 67a newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 67b 1 became follower at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.258 UTC [orderer.consensus.etcdraft] run -> INFO 67c This node is picked to start campaign" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.259 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 67d [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" -orderer0.example.com | "2019-07-20 02:39:39.259 UTC [msp] GetDefaultSigningIdentity -> DEBU 67e Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.321 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.321 UTC [msp] DeserializeIdentity -> DEBU 8e1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.322 UTC [msp] DeserializeIdentity -> DEBU 8e2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8e4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8e5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [cauthdsl] func1 -> DEBU 8e9 0xc003ba0b30 gate 1563590387323532000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8ea 0xc003ba0b30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8eb 0xc003ba0b30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8ec 0xc003ba0b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8ed 0xc003ba0b30 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [cauthdsl] func1 -> DEBU 8ee 0xc003ba0b30 gate 1563590387323532000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8ef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [cauthdsl] func1 -> DEBU 8f2 0xc003ba1390 gate 1563590387324697600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8f3 0xc003ba1390 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8f4 0xc003ba1390 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.325 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8f5 Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.325 UTC [msp] Validate -> DEBU 8f6 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:47.325 UTC [msp] getCertificationChain -> DEBU 8f7 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:47.325 UTC [cauthdsl] func2 -> DEBU 8f8 0xc003ba1390 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:39.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 67f Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:39.261 UTC [msp.identity] Sign -> DEBU 680 Sign: plaintext: 0A00120B0A090A03010203100418050A...077E55C999B3556466F594DE3B047CB5 " -orderer0.example.com | "2019-07-20 02:39:39.261 UTC [msp.identity] Sign -> DEBU 681 Sign: digest: AEA4BEA9C2F4D3EC03C57972E641FFA37F4FFC7DA1BDC0A89540566538A541D6 " -orderer0.example.com | "2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 682 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 683 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 684 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:39.265 UTC [fsblkstorage] indexBlock -> DEBU 685 Indexing block [blockNum=1, blockHash=[]byte{0xf, 0x5c, 0xba, 0x1d, 0x96, 0x7b, 0x97, 0x7d, 0x56, 0xde, 0x67, 0xed, 0x27, 0xfc, 0x3b, 0x1d, 0xb7, 0xa5, 0x53, 0x81, 0xfd, 0xea, 0xcb, 0x6e, 0x75, 0x92, 0x64, 0x72, 0x6a, 0xb2, 0x7b, 0xc6} txOffsets= -orderer0.example.com | txId=2f78a887aca86ed201b3eecf6235b46f50837a1005a59ced8b90e723e89181de locPointer=offset=71, bytesLength=24832 -orderer0.example.com | ]" -orderer0.example.com | "2019-07-20 02:39:39.267 UTC [fsblkstorage] updateCheckpoint -> DEBU 686 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44254], isChainEmpty=[false], lastBlockNumber=[1]" -orderer0.example.com | "2019-07-20 02:39:39.267 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 687 [channel: testchainid] Wrote block [1]" -orderer0.example.com | "2019-07-20 02:39:39.454 UTC [common.deliver] deliverBlocks -> WARN 688 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39032 because of consenter error" -orderer0.example.com | "2019-07-20 02:39:39.455 UTC [orderer.common.server] func1 -> DEBU 689 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:39:39.455 UTC [comm.grpc.server] 1 -> INFO 68a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39032 grpc.code=OK grpc.call_duration=208.0585ms -orderer0.example.com | "2019-07-20 02:39:39.470 UTC [orderer.common.server] Deliver -> DEBU 68b Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:39:39.471 UTC [common.deliver] Handle -> DEBU 68c Starting new deliver loop for 172.18.0.9:39034" -orderer0.example.com | "2019-07-20 02:39:39.471 UTC [common.deliver] Handle -> DEBU 68d Attempting to read seek info message from 172.18.0.9:39034" -orderer0.example.com | "2019-07-20 02:39:39.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 68e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:39.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68f Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" -orderer0.example.com | "2019-07-20 02:39:39.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 690 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.6µs " -orderer0.example.com | "2019-07-20 02:39:39.673 UTC [common.deliver] deliverBlocks -> WARN 691 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39034 because of consenter error" -orderer0.example.com | "2019-07-20 02:39:39.673 UTC [orderer.common.server] func1 -> DEBU 692 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:39:39.673 UTC [comm.grpc.server] 1 -> INFO 693 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39034 grpc.code=OK grpc.call_duration=203.0503ms -orderer0.example.com | "2019-07-20 02:39:39.698 UTC [orderer.common.server] Deliver -> DEBU 694 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:39:39.699 UTC [common.deliver] Handle -> DEBU 695 Starting new deliver loop for 172.18.0.9:39036" -orderer0.example.com | "2019-07-20 02:39:39.699 UTC [common.deliver] Handle -> DEBU 696 Attempting to read seek info message from 172.18.0.9:39036" -orderer0.example.com | "2019-07-20 02:39:39.866 UTC [orderer.common.server] replicateDisabledChains -> DEBU 697 No inactive chains to try to replicate" -orderer0.example.com | "2019-07-20 02:39:39.903 UTC [common.deliver] deliverBlocks -> WARN 698 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39036 because of consenter error" -orderer0.example.com | "2019-07-20 02:39:39.904 UTC [orderer.common.server] func1 -> DEBU 699 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:39:39.904 UTC [comm.grpc.server] 1 -> INFO 69a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39036 grpc.code=OK grpc.call_duration=206.494ms -orderer0.example.com | "2019-07-20 02:39:39.921 UTC [orderer.common.server] Deliver -> DEBU 69b Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:39:39.922 UTC [common.deliver] Handle -> DEBU 69c Starting new deliver loop for 172.18.0.9:39038" -orderer0.example.com | "2019-07-20 02:39:39.922 UTC [common.deliver] Handle -> DEBU 69d Attempting to read seek info message from 172.18.0.9:39038" -orderer0.example.com | "2019-07-20 02:39:40.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 69e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:40.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69f Sending msg of 28 bytes to 3 on channel testchainid took 24.9µs" -orderer0.example.com | "2019-07-20 02:39:40.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90µs " -orderer0.example.com | "2019-07-20 02:39:40.123 UTC [common.deliver] deliverBlocks -> WARN 6a1 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39038 because of consenter error" -orderer0.example.com | "2019-07-20 02:39:40.124 UTC [orderer.common.server] func1 -> DEBU 6a2 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:39:40.124 UTC [comm.grpc.server] 1 -> INFO 6a3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39038 grpc.code=OK grpc.call_duration=202.4616ms -orderer0.example.com | "2019-07-20 02:39:40.149 UTC [orderer.common.server] Deliver -> DEBU 6a4 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:39:40.149 UTC [common.deliver] Handle -> DEBU 6a5 Starting new deliver loop for 172.18.0.9:39040" -orderer0.example.com | "2019-07-20 02:39:40.149 UTC [common.deliver] Handle -> DEBU 6a6 Attempting to read seek info message from 172.18.0.9:39040" -orderer0.example.com | "2019-07-20 02:39:40.259 UTC [orderer.consensus.etcdraft] Step -> INFO 6a7 1 is starting a new election at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.260 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6a8 1 became pre-candidate at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.260 UTC [orderer.consensus.etcdraft] poll -> INFO 6a9 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.261 UTC [orderer.consensus.etcdraft] campaign -> INFO 6aa 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.261 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ab 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.262 UTC [orderer.common.cluster] NewStream -> DEBU 6ac Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" -peer0.org1.example.com | "2019-07-20 02:39:47.325 UTC [msp.identity] Verify -> DEBU 8f9 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-07-20 02:39:47.326 UTC [msp.identity] Verify -> DEBU 8fa Verify: sig = 00000000 30 45 02 21 00 ec 4e f4 b9 c2 ae 88 47 27 4e eb |0E.!..N.....G'N.| -peer0.org1.example.com | 00000010 3f 69 a1 76 5c 36 3a d0 5b 98 46 37 df 28 42 89 |?i.v\6:.[.F7.(B.| -peer0.org1.example.com | 00000020 d0 32 07 7e 32 02 20 4e 19 cc b7 55 d9 c8 ae ad |.2.~2. N...U....| -peer0.org1.example.com | 00000030 f3 11 34 7a 2b c7 7e 6a dc 00 11 ca 5d b1 96 29 |..4z+.~j....]..)| -peer0.org1.example.com | 00000040 28 a0 24 5f 3e b6 6b |(.$_>.k|" -peer0.org1.example.com | "2019-07-20 02:39:47.326 UTC [cauthdsl] func2 -> DEBU 8fb 0xc003ba1390 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.326 UTC [cauthdsl] func1 -> DEBU 8fc 0xc003ba1390 gate 1563590387324697600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.326 UTC [policies] Evaluate -> DEBU 8fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.326 UTC [policies] Evaluate -> DEBU 8fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.327 UTC [policies] Evaluate -> DEBU 8ff Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.327 UTC [policies] Evaluate -> DEBU 900 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.327 UTC [gossip.comm] authenticateRemotePeer -> DEBU 901 Authenticated 172.18.0.7:58950" -peer0.org1.example.com | "2019-07-20 02:39:47.327 UTC [gossip.comm] GossipStream -> DEBU 902 Servicing 172.18.0.7:58950" -peer0.org1.example.com | "2019-07-20 02:39:47.327 UTC [comm.grpc.server] 1 -> INFO 903 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.322Z grpc.peer_address=172.18.0.8:60318 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=284.7µs -peer0.org1.example.com | "2019-07-20 02:39:47.328 UTC [gossip.comm] readFromStream -> DEBU 904 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:39:47.328 UTC [gossip.comm] func2 -> DEBU 905 Client 172.18.0.7:58950 disconnected" -peer0.org1.example.com | "2019-07-20 02:39:47.328 UTC [comm.grpc.server] 1 -> INFO 906 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.305Z grpc.peer_address=172.18.0.7:58950 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.1435ms -peer0.org1.example.com | "2019-07-20 02:39:47.328 UTC [gossip.comm] writeToStream -> DEBU 907 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:47.331 UTC [msp] GetDefaultSigningIdentity -> DEBU 908 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.332 UTC [msp.identity] Sign -> DEBU 909 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.332 UTC [msp.identity] Sign -> DEBU 90a Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.332 UTC [gossip.comm] authenticateRemotePeer -> DEBU 90b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:60318" -peer0.org1.example.com | "2019-07-20 02:39:47.334 UTC [comm.grpc.server] 1 -> INFO 90c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.333Z grpc.peer_address=172.18.0.7:58954 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=495.3µs -peer0.org1.example.com | "2019-07-20 02:39:47.335 UTC [gossip.comm] authenticateRemotePeer -> DEBU 90d Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60318" -peer0.org1.example.com | "2019-07-20 02:39:47.335 UTC [msp] DeserializeIdentity -> DEBU 90e Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:40.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ad Sending msg of 28 bytes to 2 on channel businesschannel took 798.9µs" -orderer0.example.com | "2019-07-20 02:39:40.263 UTC [orderer.common.cluster] NewStream -> DEBU 6ae Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" -orderer0.example.com | "2019-07-20 02:39:40.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6af Sending msg of 28 bytes to 3 on channel businesschannel took 422.9µs" -orderer0.example.com | "2019-07-20 02:39:40.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 253.5µs " -orderer0.example.com | "2019-07-20 02:39:40.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 348.8µs " -orderer0.example.com | "2019-07-20 02:39:40.269 UTC [orderer.common.cluster] Step -> DEBU 6b2 Connection from orderer1.example.com(172.18.0.3:47792)" -orderer0.example.com | "2019-07-20 02:39:40.270 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:40.269 UTC [orderer.common.cluster] Step -> DEBU 6b3 Connection from orderer2.example.com(172.18.0.4:54782)" -orderer0.example.com | "2019-07-20 02:39:40.271 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:40.270 UTC [orderer.consensus.etcdraft] poll -> INFO 6b6 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.271 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6b7 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6b8 1 became candidate at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] poll -> INFO 6b9 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ba 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] campaign -> INFO 6bb 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.275 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bc Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" -orderer0.example.com | "2019-07-20 02:39:40.276 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6be Sending msg of 28 bytes to 2 on channel businesschannel took 13.6µs" -orderer0.example.com | "2019-07-20 02:39:40.276 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.5µs " -orderer0.example.com | "2019-07-20 02:39:40.278 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.8µs " -orderer0.example.com | "2019-07-20 02:39:40.281 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] poll -> INFO 6c1 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6c2 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6c3 1 became leader at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] run -> INFO 6c4 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.284 UTC [orderer.consensus.etcdraft] run -> INFO 6c5 Leader 1 is present, quit campaign" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c6 Sending msg of 36 bytes to 2 on channel businesschannel took 18.1µs" -orderer0.example.com | "2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ca Sending msg of 36 bytes to 3 on channel businesschannel took 9.6µs" -orderer0.example.com | "2019-07-20 02:39:40.287 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cb Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 129.7µs " -orderer0.example.com | "2019-07-20 02:39:40.288 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6cc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:40.285 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c8 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 77.1µs " -orderer0.example.com | "2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6c9 Raft leader changed: 0 -> 1" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.291 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6cd There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.284 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:40.291 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ce Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:40.291 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" -orderer0.example.com | "2019-07-20 02:39:40.291 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 47.8µs " -orderer0.example.com | "2019-07-20 02:39:40.292 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6d1 Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:40.295 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:40.303 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d3 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" -orderer0.example.com | "2019-07-20 02:39:40.303 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.3µs " -orderer0.example.com | "2019-07-20 02:39:40.304 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:40.352 UTC [policies] Evaluate -> DEBU 6d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.336 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 90f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.336 UTC [msp] DeserializeIdentity -> DEBU 910 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.337 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 911 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.337 UTC [msp] DeserializeIdentity -> DEBU 912 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.337 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 913 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 914 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 915 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.340 UTC [gossip.comm] func1 -> DEBU 916 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.340 UTC [gossip.gossip] handleMessage -> DEBU 917 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.340 UTC [gossip.gossip] handleMessage -> DEBU 918 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 919 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 91a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:47.342 UTC [msp.identity] Verify -> DEBU 91b Verify: digest = 00000000 9e 55 ec 7f b3 bb 5a 09 c8 f1 09 6e 69 d6 5d 68 |.U....Z....ni.]h| -peer0.org1.example.com | 00000010 fc ce 83 fb 3e 49 b5 c1 99 4e df eb 97 b2 43 9d |....>I...N....C.|" -peer0.org1.example.com | "2019-07-20 02:39:47.346 UTC [msp.identity] Verify -> DEBU 91c Verify: sig = 00000000 30 44 02 20 18 f2 c2 95 0f c2 43 dd bb 8d 34 53 |0D. ......C...4S| -peer0.org1.example.com | 00000010 3d 2c a9 9a ac d2 45 f8 70 4e 74 8a ae 3b 19 33 |=,....E.pNt..;.3| -peer0.org1.example.com | 00000020 f8 4d f8 b5 02 20 08 b7 2f 8b 20 08 b9 33 38 92 |.M... ../. ..38.| -peer0.org1.example.com | 00000030 a7 08 9b fc ee dc e1 a7 88 8e 4a a3 e7 09 25 2a |..........J...%*| -peer0.org1.example.com | 00000040 48 79 eb c2 aa f7 |Hy....|" -peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [gossip.discovery] isSentByMe -> DEBU 91d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [gossip.discovery] handleMsgFromComm -> DEBU 91e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [msp] GetDefaultSigningIdentity -> DEBU 91f Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [msp.identity] Sign -> DEBU 920 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [msp.identity] Sign -> DEBU 921 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [grpc] infof -> DEBU 922 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 923 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.348 UTC [gossip.comm] authenticateRemotePeer -> DEBU 924 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:58954" -peer0.org1.example.com | "2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 925 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 926 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.349 UTC [gossip.comm] authenticateRemotePeer -> DEBU 927 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58954" -peer0.org1.example.com | "2019-07-20 02:39:47.349 UTC [cauthdsl] func1 -> DEBU 928 0xc003c1c310 gate 1563590387349063600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.349 UTC [msp] DeserializeIdentity -> DEBU 929 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.349 UTC [cauthdsl] func2 -> DEBU 92a 0xc003c1c310 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.349 UTC [cauthdsl] func2 -> DEBU 92b 0xc003c1c310 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 92c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.350 UTC [msp] DeserializeIdentity -> DEBU 92d Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:40.352 UTC [policies] Evaluate -> DEBU 6d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6da == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:39:40.354 UTC [msp] DeserializeIdentity -> DEBU 6db Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:40.354 UTC [msp.identity] newIdentity -> DEBU 6dc Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:40.354 UTC [cauthdsl] func1 -> DEBU 6dd 0xc000b19be0 gate 1563590380354833100 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6de 0xc000b19be0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6df 0xc000b19be0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6e0 0xc000b19be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" -orderer0.example.com | "2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6e1 0xc000b19be0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:40.355 UTC [cauthdsl] func1 -> DEBU 6e2 0xc000b19be0 gate 1563590380354833100 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e3 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] func1 -> DEBU 6e5 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e6 Signature set did not satisfy policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:39:40.357 UTC [policies] Evaluate -> DEBU 6e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:40.357 UTC [policies] Evaluate -> DEBU 6ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:39:40.357 UTC [cauthdsl] func1 -> DEBU 6eb 0xc000b3d210 gate 1563590380357524400 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ec 0xc000b3d210 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ed 0xc000b3d210 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ee 0xc000b3d210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-07-20 02:39:40.358 UTC [cauthdsl] func2 -> DEBU 6ef 0xc000b3d210 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:40.358 UTC [cauthdsl] func1 -> DEBU 6f0 0xc000b3d210 gate 1563590380357524400 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:40.358 UTC [policies] Evaluate -> DEBU 6f1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:40.358 UTC [policies] Evaluate -> DEBU 6f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:40.359 UTC [policies] Evaluate -> DEBU 6f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:39:40.359 UTC [cauthdsl] func1 -> DEBU 6f4 0xc000b3da70 gate 1563590380359582400 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:40.359 UTC [cauthdsl] func2 -> DEBU 6f5 0xc000b3da70 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:40.359 UTC [cauthdsl] func2 -> DEBU 6f6 0xc000b3da70 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:40.359 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6f7 Checking if identity satisfies MEMBER role for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:40.360 UTC [msp] Validate -> DEBU 6f8 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:40.360 UTC [msp] getCertificationChain -> DEBU 6f9 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:40.360 UTC [cauthdsl] func2 -> DEBU 6fa 0xc000b3da70 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:40.360 UTC [msp.identity] Verify -> DEBU 6fb Verify: digest = 00000000 09 2c 72 fc ea 8e d5 fa 55 c5 cb c8 76 a3 20 ed |.,r.....U...v. .| -orderer0.example.com | 00000010 d8 f5 8f 8b c9 a0 b2 66 d3 5a d0 00 9a 3b 5b c3 |.......f.Z...;[.|" -orderer0.example.com | "2019-07-20 02:39:40.360 UTC [msp.identity] Verify -> DEBU 6fc Verify: sig = 00000000 30 44 02 21 00 fe 75 e0 47 08 50 1a 90 6c 0e 42 |0D.!..u.G.P..l.B| -orderer0.example.com | 00000010 dd d4 06 4f f2 2b 0c 8f 75 9f d2 8b 5d 3d 20 f2 |...O.+..u...]= .| -orderer0.example.com | 00000020 66 7b 07 72 98 02 1f 75 ed 66 f7 b4 5b 99 b6 17 |f{.r...u.f..[...| -orderer0.example.com | 00000030 5e fb 78 3d 43 aa 35 b8 31 c3 0c e8 17 00 2f f2 |^.x=C.5.1...../.| -orderer0.example.com | 00000040 eb fe 9f bc 6b fc |....k.|" -orderer0.example.com | "2019-07-20 02:39:40.361 UTC [cauthdsl] func2 -> DEBU 6fd 0xc000b3da70 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:40.361 UTC [cauthdsl] func1 -> DEBU 6fe 0xc000b3da70 gate 1563590380359582400 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 6ff Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 700 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 701 Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 702 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 703 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 704 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:40.362 UTC [common.deliver] deliverBlocks -> DEBU 705 [channel: businesschannel] Received seekInfo (0xc0008d08c0) start: > stop: > from 172.18.0.9:39040" -orderer0.example.com | "2019-07-20 02:39:40.362 UTC [fsblkstorage] Next -> DEBU 706 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -orderer0.example.com | "2019-07-20 02:39:40.362 UTC [fsblkstorage] newBlockfileStream -> DEBU 707 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 708 Remaining bytes=[23947], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 709 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 70a blockbytes [23944] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:40.363 UTC [common.deliver] deliverBlocks -> DEBU 70b [channel: businesschannel] Delivering block for (0xc0008d08c0) for 172.18.0.9:39040" -orderer0.example.com | "2019-07-20 02:39:40.364 UTC [common.deliver] deliverBlocks -> DEBU 70c [channel: businesschannel] Done delivering to 172.18.0.9:39040 for (0xc0008d08c0)" -orderer0.example.com | "2019-07-20 02:39:40.364 UTC [common.deliver] Handle -> DEBU 70d Waiting for new SeekInfo from 172.18.0.9:39040" -orderer0.example.com | "2019-07-20 02:39:40.364 UTC [common.deliver] Handle -> DEBU 70e Attempting to read seek info message from 172.18.0.9:39040" -orderer0.example.com | "2019-07-20 02:39:40.368 UTC [grpc] infof -> DEBU 70f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:40.368 UTC [grpc] warningf -> DEBU 710 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39040: read: connection reset by peer" -orderer0.example.com | "2019-07-20 02:39:40.369 UTC [common.deliver] Handle -> WARN 711 Error reading from 172.18.0.9:39040: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:39:40.369 UTC [orderer.common.server] func1 -> DEBU 712 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:39:40.370 UTC [comm.grpc.server] 1 -> INFO 713 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39040 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=221.1565ms -orderer0.example.com | "2019-07-20 02:39:40.371 UTC [grpc] infof -> DEBU 714 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 715 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 716 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 717 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:40.373 UTC [grpc] infof -> DEBU 718 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:40.373 UTC [grpc] infof -> DEBU 719 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:40.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:40.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71b Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" -orderer0.example.com | "2019-07-20 02:39:40.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52µs " -orderer0.example.com | "2019-07-20 02:39:40.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71d Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" -orderer0.example.com | "2019-07-20 02:39:40.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71e Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" -orderer0.example.com | "2019-07-20 02:39:40.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.2µs " -orderer0.example.com | "2019-07-20 02:39:40.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 720 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62µs " -orderer0.example.com | "2019-07-20 02:39:40.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 721 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:40.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 722 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:41.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 723 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:41.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 724 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" -orderer0.example.com | "2019-07-20 02:39:41.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 725 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " -orderer0.example.com | "2019-07-20 02:39:41.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 726 Sending msg of 28 bytes to 2 on channel businesschannel took 54.9µs" -orderer0.example.com | "2019-07-20 02:39:41.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 727 Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" -orderer0.example.com | "2019-07-20 02:39:41.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 728 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 278µs " -orderer0.example.com | "2019-07-20 02:39:41.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU 729 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.3µs " -peer0.org1.example.com | "2019-07-20 02:39:47.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 92e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -orderer0.example.com | "2019-07-20 02:39:41.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [msp] DeserializeIdentity -> DEBU 92f Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:41.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 930 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -orderer0.example.com | "2019-07-20 02:39:41.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 931 Got policy manager for channel [businesschannel] with flag [true]" -orderer0.example.com | "2019-07-20 02:39:41.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72d Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" -peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 932 Got reader policy for channel [businesschannel] with flag [true]" -orderer0.example.com | "2019-07-20 02:39:41.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 72e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.3µs " -peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [policies] Evaluate -> DEBU 933 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:39:41.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72f Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" -peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [policies] Evaluate -> DEBU 934 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [policies] Evaluate -> DEBU 935 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func1 -> DEBU 936 0xc003c32a80 gate 1563590387352234800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 937 0xc003c32a80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 938 0xc003c32a80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 939 0xc003c32a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 93a 0xc003c32a80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func1 -> DEBU 93b 0xc003c32a80 gate 1563590387352234800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [cauthdsl] func1 -> DEBU 93f 0xc003c332c0 gate 1563590387353411100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 940 0xc003c332c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 941 0xc003c332c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 942 0xc003c332c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [msp.identity] Verify -> DEBU 943 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-07-20 02:39:47.354 UTC [msp.identity] Verify -> DEBU 944 Verify: sig = 00000000 30 44 02 20 65 d6 03 06 2b 67 cb 70 e0 a4 e2 07 |0D. e...+g.p....| -peer0.org1.example.com | 00000010 64 fb a2 19 b3 6c a6 5b 1e cf a2 43 48 39 b0 72 |d....l.[...CH9.r| -peer0.org1.example.com | 00000020 9f df cf 18 02 20 76 23 2e 73 5c ce 38 87 8d 9e |..... v#.s\.8...| -orderer0.example.com | "2019-07-20 02:39:41.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 730 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" -orderer0.example.com | "2019-07-20 02:39:41.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 731 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.7µs " -orderer0.example.com | "2019-07-20 02:39:41.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU 732 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 728µs " -orderer0.example.com | "2019-07-20 02:39:41.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 733 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:41.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 734 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:42.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 735 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:42.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 736 Sending msg of 28 bytes to 3 on channel testchainid took 39.2µs" -orderer0.example.com | "2019-07-20 02:39:42.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 737 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.6µs " -orderer0.example.com | "2019-07-20 02:39:42.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 738 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" -orderer0.example.com | "2019-07-20 02:39:42.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 739 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" -orderer0.example.com | "2019-07-20 02:39:42.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 588.6µs " -orderer0.example.com | "2019-07-20 02:39:42.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 267.5µs " -orderer0.example.com | "2019-07-20 02:39:42.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:42.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:42.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:42.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73f Sending msg of 28 bytes to 3 on channel testchainid took 471.2µs" -orderer0.example.com | "2019-07-20 02:39:42.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 740 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 409.9µs " -orderer0.example.com | "2019-07-20 02:39:42.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 741 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" -orderer0.example.com | "2019-07-20 02:39:42.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 742 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" -orderer0.example.com | "2019-07-20 02:39:42.758 UTC [orderer.common.cluster.step] sendMessage -> DEBU 743 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.6µs " -orderer0.example.com | "2019-07-20 02:39:42.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 744 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.8µs " -orderer0.example.com | "2019-07-20 02:39:42.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 745 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:42.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 746 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:43.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 747 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:43.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 748 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" -orderer0.example.com | "2019-07-20 02:39:43.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 749 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " -orderer0.example.com | "2019-07-20 02:39:43.134 UTC [orderer.common.server] Deliver -> DEBU 74a Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:39:43.134 UTC [common.deliver] Handle -> DEBU 74b Starting new deliver loop for 172.18.0.9:39066" -orderer0.example.com | "2019-07-20 02:39:43.135 UTC [common.deliver] Handle -> DEBU 74c Attempting to read seek info message from 172.18.0.9:39066" -orderer0.example.com | "2019-07-20 02:39:43.157 UTC [orderer.common.server] Broadcast -> DEBU 74d Starting new Broadcast handler" -orderer0.example.com | "2019-07-20 02:39:43.157 UTC [orderer.common.broadcast] Handle -> DEBU 74e Starting new broadcast loop for 172.18.0.9:39068" -orderer0.example.com | "2019-07-20 02:39:43.158 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 74f [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39068" -orderer0.example.com | "2019-07-20 02:39:43.158 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 750 Processing config update message for channel businesschannel" -orderer0.example.com | "2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 751 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 752 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 753 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-07-20 02:39:43.159 UTC [policies] Evaluate -> DEBU 754 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:43.159 UTC [policies] Evaluate -> DEBU 755 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-07-20 02:39:43.159 UTC [cauthdsl] func1 -> DEBU 756 0xc0001a8150 gate 1563590383159486800 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:43.159 UTC [cauthdsl] func2 -> DEBU 757 0xc0001a8150 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 758 0xc0001a8150 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 759 0xc0001a8150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" -peer0.org1.example.com | 00000030 fd 44 e1 03 fb 66 1c 69 f4 a1 b1 f5 1e 2e 2b 2b |.D...f.i......++| -peer0.org1.example.com | 00000040 48 78 ed 05 fc 4d |Hx...M|" -peer0.org1.example.com | "2019-07-20 02:39:47.354 UTC [cauthdsl] func2 -> DEBU 945 0xc003c332c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.354 UTC [cauthdsl] func1 -> DEBU 946 0xc003c332c0 gate 1563590387353411100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.356 UTC [policies] Evaluate -> DEBU 947 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.356 UTC [policies] Evaluate -> DEBU 948 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.357 UTC [policies] Evaluate -> DEBU 949 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.357 UTC [policies] Evaluate -> DEBU 94a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.357 UTC [gossip.comm] authenticateRemotePeer -> DEBU 94b Authenticated 172.18.0.7:58954" -peer0.org1.example.com | "2019-07-20 02:39:47.358 UTC [gossip.comm] GossipStream -> DEBU 94c Servicing 172.18.0.7:58954" -peer0.org1.example.com | "2019-07-20 02:39:47.359 UTC [gossip.gossip] handleMessage -> DEBU 94d Entering, 172.18.0.7:58954 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:9525972632863951429 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.350 UTC [cauthdsl] func2 -> DEBU 94e 0xc003c1c310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.359 UTC [cauthdsl] func2 -> DEBU 94f 0xc003c1c310 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.359 UTC [cauthdsl] func1 -> DEBU 950 0xc003c1c310 gate 1563590387349063600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 953 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 954 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 955 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.362 UTC [cauthdsl] func1 -> DEBU 956 0xc003c1cb50 gate 1563590387362093400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.359 UTC [gossip.gossip] handleMessage -> DEBU 951 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.360 UTC [gossip.discovery] handleMsgFromComm -> DEBU 952 Got message: GossipMessage: nonce:9525972632863951429 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.364 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 957 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:47.364 UTC [msp] DeserializeIdentity -> DEBU 958 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.365 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 959 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 95a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 95b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.366 UTC [policies] Evaluate -> DEBU 95c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.366 UTC [policies] Evaluate -> DEBU 95d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.367 UTC [policies] Evaluate -> DEBU 95e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.367 UTC [cauthdsl] func1 -> DEBU 95f 0xc003c42fa0 gate 1563590387367201200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 960 0xc003c42fa0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 961 0xc003c42fa0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 962 0xc003c42fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 75a 0xc0001a8150 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:43.161 UTC [cauthdsl] func1 -> DEBU 75b 0xc0001a8150 gate 1563590383159486800 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:43.162 UTC [policies] Evaluate -> DEBU 75c Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:43.162 UTC [policies] Evaluate -> DEBU 75d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:43.162 UTC [policies] func1 -> DEBU 75e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -orderer0.example.com | "2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 75f Signature set did not satisfy policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 760 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 761 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-07-20 02:39:43.164 UTC [policies] Evaluate -> DEBU 762 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:43.164 UTC [policies] Evaluate -> DEBU 763 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-07-20 02:39:43.164 UTC [cauthdsl] func1 -> DEBU 764 0xc0001a8f50 gate 1563590383164442500 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 765 0xc0001a8f50 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 766 0xc0001a8f50 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 767 0xc0001a8f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 768 0xc0001a8f50 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:43.165 UTC [cauthdsl] func1 -> DEBU 769 0xc0001a8f50 gate 1563590383164442500 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:43.165 UTC [policies] Evaluate -> DEBU 76a Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.166 UTC [policies] Evaluate -> DEBU 76b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.166 UTC [policies] Evaluate -> DEBU 76c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-07-20 02:39:43.166 UTC [cauthdsl] func1 -> DEBU 76d 0xc0001a9b50 gate 1563590383166471700 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:43.166 UTC [cauthdsl] func2 -> DEBU 76e 0xc0001a9b50 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:43.166 UTC [cauthdsl] func2 -> DEBU 76f 0xc0001a9b50 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:43.167 UTC [cauthdsl] func2 -> DEBU 770 0xc0001a9b50 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:43.167 UTC [msp.identity] Verify -> DEBU 771 Verify: digest = 00000000 f1 1b b5 a4 11 0d ee 67 25 3d 7c 6e 69 a9 1b 10 |.......g%=|ni...| -orderer0.example.com | 00000010 c8 ab 62 3e 3c 3f 38 1c 1b 90 39 69 1e 40 58 73 |..b> DEBU 772 Verify: sig = 00000000 30 45 02 21 00 a5 b2 eb 66 85 66 e3 74 0f c5 bc |0E.!....f.f.t...| -orderer0.example.com | 00000010 6e 5d 06 96 f7 40 aa 52 1f 88 be 6b 38 37 91 26 |n]...@.R...k87.&| -orderer0.example.com | 00000020 b1 4e 79 81 c1 02 20 21 ce 28 3d c0 b1 e8 7b 02 |.Ny... !.(=...{.| -orderer0.example.com | 00000030 3e 75 4f 40 57 45 97 3a f8 7f b4 17 5c 22 85 f4 |>uO@WE.:....\"..| -orderer0.example.com | 00000040 ea d1 33 a7 e2 d5 e5 |..3....|" -orderer0.example.com | "2019-07-20 02:39:43.168 UTC [cauthdsl] func2 -> DEBU 773 0xc0001a9b50 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:43.168 UTC [cauthdsl] func1 -> DEBU 774 0xc0001a9b50 gate 1563590383166471700 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:43.168 UTC [policies] Evaluate -> DEBU 775 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.168 UTC [policies] Evaluate -> DEBU 776 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 777 Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 778 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 779 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 77a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:43.169 UTC [common.configtx] addToMap -> DEBU 77b Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:43.170 UTC [common.configtx] addToMap -> DEBU 77c Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77d Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77e Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 780 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 781 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 782 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 783 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 784 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 785 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 786 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 787 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 788 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 789 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 78a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 78b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] verifyDeltaSet -> DEBU 78c Processing change to key: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] policyForItem -> DEBU 78d Getting policy for item Org1MSP with mod_policy Admins" -orderer0.example.com | "2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 78e Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 78f Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 790 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 791 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 792 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 793 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 794 Manager Channel/Application looking up path [Org1MSP]" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 795 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 796 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 797 Manager Channel/Application/Org1MSP looking up path []" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Evaluate -> DEBU 798 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [cauthdsl] func1 -> DEBU 799 0xc000321400 gate 1563590383174605800 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79a 0xc000321400 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79b 0xc000321400 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 79c Checking if identity satisfies ADMIN role for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79d 0xc000321400 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:43.175 UTC [msp.identity] Verify -> DEBU 79e Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| -orderer0.example.com | 00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" -orderer0.example.com | "2019-07-20 02:39:43.175 UTC [msp.identity] Verify -> DEBU 79f Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| -orderer0.example.com | 00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| -orderer0.example.com | 00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| -orderer0.example.com | 00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| -orderer0.example.com | 00000040 b4 14 85 f1 cd 6f 15 |.....o.|" -orderer0.example.com | "2019-07-20 02:39:43.175 UTC [cauthdsl] func2 -> DEBU 7a0 0xc000321400 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:43.175 UTC [cauthdsl] func1 -> DEBU 7a1 0xc000321400 gate 1563590383174605800 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:43.175 UTC [policies] Evaluate -> DEBU 7a2 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.176 UTC [policies] Evaluate -> DEBU 7a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.176 UTC [common.configtx] verifyDeltaSet -> DEBU 7a4 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.176 UTC [common.configtx] recurseConfigMap -> DEBU 7a5 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.176 UTC [common.configtx] recurseConfigMap -> DEBU 7a6 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a7 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a8 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7aa Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ab Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ac Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ad Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ae Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7af Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7b0 Setting policy for key Readers to " -orderer0.example.com | "2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7b1 Setting policy for key Writers to " -orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b2 Setting policy for key Admins to " -orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b3 Setting policy for key Endorsement to " -orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b4 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b6 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b7 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b8 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b9 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.configtx] recurseConfigMap -> DEBU 7ba Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.configtx] recurseConfigMap -> DEBU 7bb Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7bc Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7bd Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7be Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7bf Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c0 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c1 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7c2 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c3 Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c4 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7c5 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:43.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c6 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.182 UTC [common.channelconfig] NewStandardValues -> DEBU 7c7 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:43.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c8 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:43.182 UTC [common.channelconfig] Validate -> DEBU 7c9 Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:39:43.182 UTC [common.channelconfig] validateMSP -> DEBU 7ca Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.182 UTC [msp] newBccspMsp -> DEBU 7cb Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.182 UTC [msp] New -> DEBU 7cc Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.182 UTC [msp] Setup -> DEBU 7cd Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.183 UTC [msp.identity] newIdentity -> DEBU 7ce Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.184 UTC [msp.identity] newIdentity -> DEBU 7cf Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.185 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7d0 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.185 UTC [msp] Validate -> DEBU 7d1 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:43.185 UTC [msp] getCertificationChain -> DEBU 7d2 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.185 UTC [msp] hasOURole -> DEBU 7d3 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:43.185 UTC [msp] getCertificationChain -> DEBU 7d4 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.185 UTC [common.channelconfig] NewStandardValues -> DEBU 7d5 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:43.185 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d6 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.185 UTC [common.channelconfig] NewStandardValues -> DEBU 7d7 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:43.185 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d8 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:43.186 UTC [common.channelconfig] Validate -> DEBU 7d9 Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-07-20 02:39:43.186 UTC [common.channelconfig] validateMSP -> DEBU 7da Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.186 UTC [msp] newBccspMsp -> DEBU 7db Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.186 UTC [msp] New -> DEBU 7dc Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.186 UTC [msp] Setup -> DEBU 7dd Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.186 UTC [msp.identity] newIdentity -> DEBU 7de Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.186 UTC [msp.identity] newIdentity -> DEBU 7df Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | "2019-07-20 02:39:47.368 UTC [cauthdsl] func2 -> DEBU 963 0xc003c42fa0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.368 UTC [cauthdsl] func1 -> DEBU 964 0xc003c42fa0 gate 1563590387367201200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 965 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 966 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 967 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.369 UTC [cauthdsl] func1 -> DEBU 968 0xc003c437e0 gate 1563590387369590100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.369 UTC [cauthdsl] func2 -> DEBU 969 0xc003c437e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.370 UTC [cauthdsl] func2 -> DEBU 96a 0xc003c437e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.370 UTC [cauthdsl] func2 -> DEBU 96b 0xc003c437e0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.371 UTC [msp.identity] Verify -> DEBU 96c Verify: digest = 00000000 46 0e f5 10 76 fd 59 e6 b3 07 a1 3c a9 b9 14 47 |F...v.Y....<...G| -peer0.org1.example.com | 00000010 6e b4 e5 a5 0e 58 e2 3e 59 e7 90 e0 f0 9d 65 e3 |n....X.>Y.....e.|" -peer0.org1.example.com | "2019-07-20 02:39:47.372 UTC [msp.identity] Verify -> DEBU 96d Verify: sig = 00000000 30 45 02 21 00 b8 8e c9 09 9c 74 bb 27 15 12 64 |0E.!......t.'..d| -peer0.org1.example.com | 00000010 a8 e6 99 91 7a fc 2e 35 65 70 c5 88 dd 13 b9 37 |....z..5ep.....7| -peer0.org1.example.com | 00000020 d6 af fd aa 46 02 20 3d 93 80 67 b2 d9 73 c9 0e |....F. =..g..s..| -peer0.org1.example.com | 00000030 fb ed 14 93 c5 6c 38 74 35 30 1b 71 26 3f 14 68 |.....l8t50.q&?.h| -peer0.org1.example.com | 00000040 47 f0 c3 1c 3c 85 ea |G...<..|" -peer0.org1.example.com | "2019-07-20 02:39:47.372 UTC [cauthdsl] func2 -> DEBU 96e 0xc003c437e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.373 UTC [cauthdsl] func1 -> DEBU 96f 0xc003c437e0 gate 1563590387369590100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 970 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 971 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 972 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.374 UTC [policies] Evaluate -> DEBU 973 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.375 UTC [gossip.discovery] handleAliveMessage -> DEBU 974 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.375 UTC [gossip.discovery] learnNewMembers -> DEBU 975 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}" -peer0.org1.example.com | "2019-07-20 02:39:47.376 UTC [gossip.discovery] learnNewMembers -> DEBU 976 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.376 UTC [gossip.discovery] learnNewMembers -> DEBU 977 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.376 UTC [gossip.discovery] handleAliveMessage -> DEBU 978 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 979 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.377 UTC [gossip.discovery] sendMemResponse -> DEBU 97a Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:39:47.377 UTC [msp] DeserializeIdentity -> DEBU 97b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.378 UTC [msp] DeserializeIdentity -> DEBU 97c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.378 UTC [msp] DeserializeIdentity -> DEBU 97d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.378 UTC [gossip.comm] Send -> DEBU 97e Entering, sending GossipMessage: Channel: , nonce: 9525972632863951429, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:47.378 UTC [gossip.discovery] sendMemResponse -> DEBU 97f Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\022" signature:"0D\002 W\351\001\371y\001\231%@\322\211\3049\215\241\214\032\360\251\332*\371\306-\211\210\005\316\305\245ea\002 B\255\255JU\256\330\014Y%\260Ki\200|\007u\026\2114\3708\377y*\355'\350i\020S\277" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:39:47.379 UTC [gossip.comm] sendToEndpoint -> DEBU 980 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9525972632863951429, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.379 UTC [gossip.comm] sendToEndpoint -> DEBU 981 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.379 UTC [cauthdsl] func2 -> DEBU 982 0xc003c1cb50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.380 UTC [cauthdsl] func2 -> DEBU 983 0xc003c1cb50 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.381 UTC [cauthdsl] func2 -> DEBU 984 0xc003c1cb50 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.382 UTC [msp.identity] Verify -> DEBU 985 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:39:47.382 UTC [msp.identity] Verify -> DEBU 986 Verify: sig = 00000000 30 44 02 20 07 bf 14 d0 c5 d2 c1 f2 ef 16 88 ec |0D. ............| -peer0.org1.example.com | 00000010 81 9a 71 25 b5 56 e4 e9 cb d7 4c 8f 0c 43 f3 48 |..q%.V....L..C.H| -peer0.org1.example.com | 00000020 78 c8 33 85 02 20 60 09 fd ed 42 92 cb d1 d9 df |x.3.. `...B.....| -peer0.org1.example.com | 00000030 d8 6c c3 bb c4 88 49 a4 53 66 c4 e4 0d 33 9f fe |.l....I.Sf...3..| -peer0.org1.example.com | 00000040 71 c7 d1 67 c3 61 |q..g.a|" -peer0.org1.example.com | "2019-07-20 02:39:47.383 UTC [cauthdsl] func2 -> DEBU 987 0xc003c1cb50 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.386 UTC [cauthdsl] func1 -> DEBU 988 0xc003c1cb50 gate 1563590387362093400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.386 UTC [policies] Evaluate -> DEBU 989 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.387 UTC [policies] Evaluate -> DEBU 98a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.387 UTC [policies] Evaluate -> DEBU 98b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.388 UTC [policies] Evaluate -> DEBU 98c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.388 UTC [gossip.comm] authenticateRemotePeer -> DEBU 98d Authenticated 172.18.0.8:60318" -peer0.org1.example.com | "2019-07-20 02:39:47.388 UTC [gossip.comm] GossipStream -> DEBU 98e Servicing 172.18.0.8:60318" -peer0.org1.example.com | "2019-07-20 02:39:47.389 UTC [gossip.comm] writeToStream -> DEBU 98f Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:47.389 UTC [gossip.comm] serviceConnection -> DEBU 990 Closing reading from stream" -peer0.org1.example.com | "2019-07-20 02:39:47.390 UTC [grpc] infof -> DEBU 991 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:47.390 UTC [gossip.comm] readFromStream -> DEBU 992 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -peer0.org1.example.com | "2019-07-20 02:39:47.390 UTC [gossip.comm] readFromStream -> DEBU 993 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:39:47.391 UTC [gossip.comm] func2 -> DEBU 994 Client 172.18.0.8:60318 disconnected" -peer0.org1.example.com | "2019-07-20 02:39:47.391 UTC [comm.grpc.server] 1 -> INFO 995 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60318 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=60.9364ms -peer0.org1.example.com | "2019-07-20 02:39:47.392 UTC [gossip.comm] writeToStream -> DEBU 996 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:47.398 UTC [gossip.comm] func1 -> DEBU 997 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.403 UTC [gossip.gossip] handleMessage -> DEBU 998 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.403 UTC [gossip.gossip] handleMessage -> DEBU 999 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 99a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.404 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 99b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:47.404 UTC [msp.identity] Verify -> DEBU 99c Verify: digest = 00000000 9f d0 26 d1 27 53 cc a4 10 e3 12 24 b9 9c af b5 |..&.'S.....$....| -peer0.org1.example.com | 00000010 d8 75 4f 57 66 75 65 1a 86 7e 3d c1 ec 77 c1 12 |.uOWfue..~=..w..|" -peer0.org1.example.com | "2019-07-20 02:39:47.404 UTC [msp.identity] Verify -> DEBU 99d Verify: sig = 00000000 30 45 02 21 00 82 3a a6 f3 a6 43 fb fa 98 0b 6a |0E.!..:...C....j| -peer0.org1.example.com | 00000010 95 a3 d6 4b 72 16 b6 ec 61 57 e6 00 36 c7 f2 62 |...Kr...aW..6..b| -peer0.org1.example.com | 00000020 05 4f 2e fb 13 02 20 0e 17 15 56 af 2b 49 22 7d |.O.... ...V.+I"}| -peer0.org1.example.com | 00000030 30 66 0f f6 16 cf 2b 65 fb bf 25 25 21 03 0a c8 |0f....+e..%%!...| -peer0.org1.example.com | 00000040 b1 4b 80 07 67 0a ce |.K..g..|" -peer0.org1.example.com | "2019-07-20 02:39:47.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 99e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 99f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a0 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a1 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:47.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a2 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:47.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a3 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.406 UTC [gossip.discovery] handleAliveMessage -> DEBU 9a4 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.406 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9a5 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.407 UTC [msp] DeserializeIdentity -> DEBU 9a6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.408 UTC [msp] DeserializeIdentity -> DEBU 9a7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.409 UTC [msp] DeserializeIdentity -> DEBU 9a8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.409 UTC [gossip.comm] Send -> DEBU 9a9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:47.409 UTC [msp] DeserializeIdentity -> DEBU 9aa Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.410 UTC [gossip.comm] Send -> DEBU 9ab Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:47.411 UTC [gossip.comm] sendToEndpoint -> DEBU 9ac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.412 UTC [gossip.comm] createConnection -> DEBU 9ad Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:39:47.413 UTC [comm.grpc.server] 1 -> INFO 9ae unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.411Z grpc.peer_address=172.18.0.7:58958 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.507ms -peer0.org1.example.com | "2019-07-20 02:39:47.415 UTC [grpc] DialContext -> DEBU 9af parsed scheme: """ -peer0.org1.example.com | "2019-07-20 02:39:47.417 UTC [grpc] DialContext -> DEBU 9b1 scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-07-20 02:39:47.418 UTC [grpc] watcher -> DEBU 9b2 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -peer0.org1.example.com | "2019-07-20 02:39:47.418 UTC [grpc] switchBalancer -> DEBU 9b3 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-07-20 02:39:47.418 UTC [grpc] HandleSubConnStateChange -> DEBU 9b4 pickfirstBalancer: HandleSubConnStateChange: 0xc003cd43a0, CONNECTING" -peer0.org1.example.com | "2019-07-20 02:39:47.415 UTC [gossip.comm] sendToEndpoint -> DEBU 9b0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.419 UTC [gossip.comm] sendToEndpoint -> DEBU 9b5 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.422 UTC [comm.grpc.server] 1 -> INFO 9b6 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.421Z grpc.peer_address=172.18.0.8:60326 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=140.3µs -peer0.org1.example.com | "2019-07-20 02:39:47.425 UTC [msp] GetDefaultSigningIdentity -> DEBU 9b7 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.427 UTC [msp.identity] Sign -> DEBU 9ba Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.426 UTC [msp] GetDefaultSigningIdentity -> DEBU 9b8 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.426 UTC [grpc] HandleSubConnStateChange -> DEBU 9b9 pickfirstBalancer: HandleSubConnStateChange: 0xc003cd43a0, READY" -peer0.org1.example.com | "2019-07-20 02:39:47.427 UTC [msp.identity] Sign -> DEBU 9bb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.428 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9bd Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:58958" -peer0.org1.example.com | "2019-07-20 02:39:47.429 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9be Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58958" -peer0.org1.example.com | "2019-07-20 02:39:47.429 UTC [msp] DeserializeIdentity -> DEBU 9bf Obtaining identity" -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.187 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7e0 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.187 UTC [msp] Validate -> DEBU 7e1 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:43.187 UTC [msp] getCertificationChain -> DEBU 7e2 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.187 UTC [msp] hasOURole -> DEBU 7e3 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:43.187 UTC [msp] getCertificationChain -> DEBU 7e4 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.187 UTC [common.channelconfig] NewStandardValues -> DEBU 7e5 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:43.187 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e6 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e7 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e8 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e9 Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ea Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7eb Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] NewStandardValues -> DEBU 7ec Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ed Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] NewStandardValues -> DEBU 7ee Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ef Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] validateMSP -> DEBU 7f0 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [msp] newBccspMsp -> DEBU 7f1 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [msp] New -> DEBU 7f2 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.188 UTC [msp] Setup -> DEBU 7f3 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:43.189 UTC [msp.identity] newIdentity -> DEBU 7f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.189 UTC [msp.identity] newIdentity -> DEBU 7f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.189 UTC [msp] Validate -> DEBU 7f6 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:43.189 UTC [msp] Setup -> DEBU 7f7 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:43.190 UTC [msp] Setup -> DEBU 7f8 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7f9 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fa Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fb Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fc Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fd Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fe Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7ff Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 800 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 801 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 802 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 803 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 804 Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 805 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 806 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 807 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 808 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 809 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80a Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80b Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80c Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80d Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80e Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80f Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 810 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 811 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 812 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 813 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 814 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 815 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 816 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 817 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 818 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 819 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81a Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81d Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81f Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 820 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 821 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 822 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 823 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 824 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 825 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 826 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 827 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 828 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 829 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82d Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 82e Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 82f Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 830 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 831 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 832 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 833 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 834 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 835 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 836 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 837 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 838 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 839 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83a Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83b Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83c Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.channelconfig] LogSanityChecks -> DEBU 83d As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.channelconfig] LogSanityChecks -> DEBU 83e As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 83f Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 840 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 841 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 842 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 843 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 844 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 845 As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 846 As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 847 As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 848 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 849 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84a Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84b Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84c Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 84d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 84e As expected, current configuration has policy '/Channel/Orderer/Admins'" -orderer0.example.com | "2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 84f As expected, current configuration has policy '/Channel/Orderer/Writers'" -orderer0.example.com | "2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 850 As expected, current configuration has policy '/Channel/Orderer/Readers'" -orderer0.example.com | "2019-07-20 02:39:43.199 UTC [common.capabilities] Supported -> DEBU 851 Orderer capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:43.199 UTC [common.capabilities] Supported -> DEBU 852 Channel capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:43.199 UTC [msp] GetDefaultSigningIdentity -> DEBU 853 Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:43.199 UTC [msp] GetDefaultSigningIdentity -> DEBU 854 Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:43.199 UTC [msp.identity] Sign -> DEBU 855 Sign: plaintext: 0AD2060A1B08011A0608EFFDC9E90522...3AF87FB4175C2285F4EAD133A7E2D5E5 " -orderer0.example.com | "2019-07-20 02:39:43.199 UTC [msp.identity] Sign -> DEBU 856 Sign: digest: 2535EC334577C737BEBB3855C9646EDF0B2D1FD1FCFCDD1E862154A654C9A8DA " -orderer0.example.com | "2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 857 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 858 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 859 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 85a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 85b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-07-20 02:39:43.200 UTC [msp] DeserializeIdentity -> DEBU 85c Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:43.201 UTC [msp.identity] newIdentity -> DEBU 85d Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -orderer0.example.com | QQ== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.201 UTC [cauthdsl] func1 -> DEBU 85e 0xc000c5d020 gate 1563590383201372400 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 85f 0xc000c5d020 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 860 0xc000c5d020 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:43.201 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 861 Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:43.201 UTC [msp] Validate -> DEBU 862 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 863 0xc000c5d020 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:43.202 UTC [msp.identity] Verify -> DEBU 864 Verify: digest = 00000000 25 35 ec 33 45 77 c7 37 be bb 38 55 c9 64 6e df |%5.3Ew.7..8U.dn.| -orderer0.example.com | 00000010 0b 2d 1f d1 fc fc dd 1e 86 21 54 a6 54 c9 a8 da |.-.......!T.T...|" -orderer0.example.com | "2019-07-20 02:39:43.202 UTC [msp.identity] Verify -> DEBU 865 Verify: sig = 00000000 30 44 02 20 3b b3 0e 3c 0b b2 75 13 96 13 37 4c |0D. ;..<..u...7L| -orderer0.example.com | 00000010 0c d1 15 d4 40 ff 19 4a 13 ea 8f bd 76 a7 c0 b5 |....@..J....v...| -orderer0.example.com | 00000020 aa c5 7c 6a 02 20 62 6a 7d 0c 2b df ed 05 f1 26 |..|j. bj}.+....&| -orderer0.example.com | 00000030 6f af 79 9f 81 51 a7 54 83 81 b0 f1 ee 43 39 b1 |o.y..Q.T.....C9.| -orderer0.example.com | 00000040 dd aa 68 72 78 34 |..hrx4|" -orderer0.example.com | "2019-07-20 02:39:43.202 UTC [cauthdsl] func2 -> DEBU 866 0xc000c5d020 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:43.202 UTC [cauthdsl] func1 -> DEBU 867 0xc000c5d020 gate 1563590383201372400 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 868 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 869 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 86a Signature set satisfies policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86c Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:43.203 UTC [orderer.common.msgprocessor] Apply -> DEBU 86e Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel -orderer0.example.com | "2019-07-20 02:39:43.203 UTC [common.channelconfig] NewStandardValues -> DEBU 86f Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 870 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 871 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 872 Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 873 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 874 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 875 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 876 Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 877 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 878 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 879 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 87a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 87b Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] Validate -> DEBU 87c Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] validateMSP -> DEBU 87d Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [msp] newBccspMsp -> DEBU 87e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.204 UTC [msp] New -> DEBU 87f Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.205 UTC [msp] Setup -> DEBU 880 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.205 UTC [msp.identity] newIdentity -> DEBU 881 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.205 UTC [msp.identity] newIdentity -> DEBU 882 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.205 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 883 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.206 UTC [msp] Validate -> DEBU 884 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:43.206 UTC [msp] getCertificationChain -> DEBU 885 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.206 UTC [msp] hasOURole -> DEBU 886 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:43.206 UTC [msp] getCertificationChain -> DEBU 887 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.206 UTC [common.channelconfig] NewStandardValues -> DEBU 888 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:43.206 UTC [common.channelconfig] initializeProtosStruct -> DEBU 889 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.206 UTC [common.channelconfig] NewStandardValues -> DEBU 88a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:43.207 UTC [common.channelconfig] initializeProtosStruct -> DEBU 88b Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:43.207 UTC [common.channelconfig] Validate -> DEBU 88c Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-07-20 02:39:43.207 UTC [common.channelconfig] validateMSP -> DEBU 88d Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.207 UTC [msp] newBccspMsp -> DEBU 88e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.207 UTC [msp] New -> DEBU 88f Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.207 UTC [msp] Setup -> DEBU 890 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.207 UTC [msp.identity] newIdentity -> DEBU 891 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.207 UTC [msp.identity] newIdentity -> DEBU 892 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | "2019-07-20 02:39:47.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.429 UTC [msp] DeserializeIdentity -> DEBU 9c1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.430 UTC [msp] DeserializeIdentity -> DEBU 9c3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.428 UTC [msp.identity] Sign -> DEBU 9bc Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9c5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9c6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.431 UTC [policies] Evaluate -> DEBU 9c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.431 UTC [policies] Evaluate -> DEBU 9c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.431 UTC [msp.identity] Sign -> DEBU 9ca Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.208 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 893 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.208 UTC [msp] Validate -> DEBU 894 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:43.208 UTC [msp] getCertificationChain -> DEBU 895 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.208 UTC [msp] hasOURole -> DEBU 896 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:43.208 UTC [msp] getCertificationChain -> DEBU 897 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.208 UTC [common.channelconfig] NewStandardValues -> DEBU 898 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 899 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89a Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89b Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89c Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89d Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89e Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] NewStandardValues -> DEBU 89f Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a0 Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] NewStandardValues -> DEBU 8a1 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:43.210 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a2 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:43.210 UTC [common.channelconfig] validateMSP -> DEBU 8a3 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.210 UTC [msp] newBccspMsp -> DEBU 8a4 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.210 UTC [msp] New -> DEBU 8a5 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.210 UTC [msp] Setup -> DEBU 8a6 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:43.210 UTC [msp.identity] newIdentity -> DEBU 8a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.211 UTC [msp.identity] newIdentity -> DEBU 8a8 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.211 UTC [msp] Validate -> DEBU 8a9 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:43.213 UTC [msp] Setup -> DEBU 8aa Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:43.214 UTC [msp] Setup -> DEBU 8ab MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ac Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ad Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ae Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8af Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b0 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b1 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b2 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b3 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b4 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b5 Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b6 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b7 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b8 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b9 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8ba Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bb Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bc Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bd Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8be Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8bf Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c0 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c1 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c2 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c3 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c4 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c5 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c7 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8ca Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cb Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cc Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d2 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d3 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d4 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d5 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d6 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d7 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d9 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8da Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8db Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8dc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8dd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8de Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8df Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e0 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e1 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e2 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e3 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e4 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e6 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e7 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e8 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:43.219 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:43.219 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 8f0 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39068" -orderer0.example.com | "2019-07-20 02:39:43.220 UTC [orderer.consensus.etcdraft] propose -> INFO 8f1 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:43.225 UTC [common.deliver] Handle -> WARN 8f2 Error reading from 172.18.0.9:39066: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:39:43.226 UTC [orderer.common.server] func1 -> DEBU 8f3 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:39:43.226 UTC [comm.grpc.server] 1 -> INFO 8f4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39066 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=92.6637ms -orderer0.example.com | "2019-07-20 02:39:43.227 UTC [orderer.common.broadcast] Handle -> WARN 8f5 Error reading from 172.18.0.9:39068: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:39:43.227 UTC [orderer.common.server] func1 -> DEBU 8f6 Closing Broadcast stream" -orderer0.example.com | "2019-07-20 02:39:43.227 UTC [comm.grpc.server] 1 -> INFO 8f7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39068 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=70.1227ms -orderer0.example.com | "2019-07-20 02:39:43.227 UTC [grpc] infof -> DEBU 8f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:43.227 UTC [grpc] infof -> DEBU 8f9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:43.228 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 8fa Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:43.229 UTC [orderer.consensus.etcdraft] 2 -> DEBU 8fb Proposed block [1] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:43.232 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8fc Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer1.example.com(orderer1.example.com:7050) took 95.1µs " -orderer0.example.com | "2019-07-20 02:39:43.232 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fd Sending msg of 22816 bytes to 2 on channel businesschannel took 139.7µs" -orderer0.example.com | "2019-07-20 02:39:43.236 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fe Sending msg of 22816 bytes to 3 on channel businesschannel took 96.2µs" -orderer0.example.com | "2019-07-20 02:39:43.236 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8ff Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer2.example.com(orderer2.example.com:7050) took 91µs " -orderer0.example.com | "2019-07-20 02:39:43.238 UTC [orderer.common.cluster.step] handleMessage -> DEBU 900 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 902 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" -orderer0.example.com | "2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 904 Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" -orderer0.example.com | "2019-07-20 02:39:43.240 UTC [orderer.common.cluster.step] sendMessage -> DEBU 905 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.4µs " -orderer0.example.com | "2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 903 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 916 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] verifyDeltaSet -> DEBU 917 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] verifyDeltaSet -> DEBU 918 Processing change to key: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] policyForItem -> DEBU 919 Getting policy for item Org1MSP with mod_policy Admins" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91a Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91b Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91c Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91d Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91e Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91f Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 920 Manager Channel/Application looking up path [Org1MSP]" -orderer0.example.com | "2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 921 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.243 UTC [policies] Manager -> DEBU 922 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.243 UTC [policies] Manager -> DEBU 923 Manager Channel/Application/Org1MSP looking up path []" -orderer0.example.com | "2019-07-20 02:39:43.243 UTC [policies] Evaluate -> DEBU 924 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-07-20 02:39:43.243 UTC [cauthdsl] func1 -> DEBU 925 0xc000cda8c0 gate 1563590383243353300 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:43.244 UTC [cauthdsl] func2 -> DEBU 926 0xc000cda8c0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:43.245 UTC [cauthdsl] func2 -> DEBU 927 0xc000cda8c0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:43.245 UTC [cauthdsl] func2 -> DEBU 928 0xc000cda8c0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:43.247 UTC [msp.identity] Verify -> DEBU 929 Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| -orderer0.example.com | 00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" -orderer0.example.com | "2019-07-20 02:39:43.247 UTC [msp.identity] Verify -> DEBU 92a Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| -orderer0.example.com | 00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| -orderer0.example.com | 00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| -orderer0.example.com | 00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| -peer0.org1.example.com | "2019-07-20 02:39:47.433 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9cc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60326" -peer0.org1.example.com | "2019-07-20 02:39:47.432 UTC [policies] Evaluate -> DEBU 9c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func1 -> DEBU 9cd 0xc003d45cf0 gate 1563590387435038700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9ce 0xc003d45cf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9cf 0xc003d45cf0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9d0 0xc003d45cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9d1 0xc003d45cf0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func1 -> DEBU 9d2 0xc003d45cf0 gate 1563590387435038700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.436 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9d3 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60326" -peer0.org1.example.com | "2019-07-20 02:39:47.436 UTC [msp] DeserializeIdentity -> DEBU 9d4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.436 UTC [policies] Evaluate -> DEBU 9d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [policies] Evaluate -> DEBU 9d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [policies] Evaluate -> DEBU 9d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [cauthdsl] func1 -> DEBU 9d8 0xc003d6e530 gate 1563590387437254300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9d9 0xc003d6e530 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9da 0xc003d6e530 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9db 0xc003d6e530 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [msp.identity] Verify -> DEBU 9dc Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-07-20 02:39:47.438 UTC [msp.identity] Verify -> DEBU 9dd Verify: sig = 00000000 30 45 02 21 00 a7 34 94 cc b4 6e 33 da 61 32 b7 |0E.!..4...n3.a2.| -peer0.org1.example.com | 00000010 02 32 93 59 79 93 21 66 bc 21 a2 25 1f 29 9e 4d |.2.Yy.!f.!.%.).M| -peer0.org1.example.com | 00000020 2f 7b 19 bf f5 02 20 4b e7 84 35 6f 18 ab 22 08 |/{.... K..5o..".| -peer0.org1.example.com | 00000030 f2 54 e4 20 6c 92 45 59 f2 10 63 8d 47 b2 2b 3c |.T. l.EY..c.G.+<| -peer0.org1.example.com | 00000040 fa db 89 4c 14 94 bf |...L...|" -peer0.org1.example.com | "2019-07-20 02:39:47.438 UTC [cauthdsl] func2 -> DEBU 9de 0xc003d6e530 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.438 UTC [cauthdsl] func1 -> DEBU 9e0 0xc003d6e530 gate 1563590387437254300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.439 UTC [grpc] infof -> DEBU 9e1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:47.438 UTC [policies] Evaluate -> DEBU 9e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9e6 Authenticated 172.18.0.7:58958" -peer0.org1.example.com | "2019-07-20 02:39:47.432 UTC [msp] GetDefaultSigningIdentity -> DEBU 9cb Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [msp.identity] Sign -> DEBU 9e8 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.438 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [gossip.comm] GossipStream -> DEBU 9e7 Servicing 172.18.0.7:58958" -peer0.org1.example.com | "2019-07-20 02:39:47.441 UTC [msp.identity] Sign -> DEBU 9e9 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.441 UTC [msp] DeserializeIdentity -> DEBU 9ea Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [gossip.comm] serviceConnection -> DEBU 9ec Closing reading from stream" -peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [gossip.comm] func2 -> DEBU 9ed Client 172.18.0.7:58954 disconnected" -peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [comm.grpc.server] 1 -> INFO 9ee streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:58954 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=95.2205ms -peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [gossip.comm] serviceConnection -> DEBU 9f1 Closing reading from stream" -peer0.org1.example.com | "2019-07-20 02:39:47.443 UTC [msp] DeserializeIdentity -> DEBU 9f2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.443 UTC [gossip.comm] writeToStream -> DEBU 9f4 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:47.443 UTC [gossip.comm] readFromStream -> DEBU 9f5 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" -peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9eb Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.444 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9f6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.444 UTC [msp] DeserializeIdentity -> DEBU 9f7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.444 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9f8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.444 UTC [msp] DeserializeIdentity -> DEBU 9f9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.445 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.445 UTC [msp] DeserializeIdentity -> DEBU 9fc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9fe Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9ff Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a00 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a01 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.447 UTC [cauthdsl] func1 -> DEBU a03 0xc003da1580 gate 1563590387446997800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [gossip.comm] writeToStream -> DEBU 9f0 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:47.445 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a04 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a05 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.448 UTC [policies] Evaluate -> DEBU a06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.448 UTC [policies] Evaluate -> DEBU a07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.449 UTC [policies] Evaluate -> DEBU a08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.449 UTC [cauthdsl] func1 -> DEBU a09 0xc003d92da0 gate 1563590387449798200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.450 UTC [cauthdsl] func2 -> DEBU a0a 0xc003d92da0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.450 UTC [cauthdsl] func2 -> DEBU a0b 0xc003d92da0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0c 0xc003d92da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0e 0xc003d92da0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [cauthdsl] func1 -> DEBU a0f 0xc003d92da0 gate 1563590387449798200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [grpc] infof -> DEBU a10 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:47.443 UTC [gossip.comm] func2 -> DEBU 9f3 Client 172.18.0.7:58958 disconnected" -peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [policies] Evaluate -> DEBU a11 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.452 UTC [comm.grpc.server] 1 -> INFO a12 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.425Z grpc.peer_address=172.18.0.7:58958 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=26.4571ms -peer0.org1.example.com | "2019-07-20 02:39:47.452 UTC [policies] Evaluate -> DEBU a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.452 UTC [policies] Evaluate -> DEBU a14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0d 0xc003da1580 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.453 UTC [cauthdsl] func1 -> DEBU a15 0xc003d935e0 gate 1563590387452999600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a17 0xc003d935e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a18 0xc003d935e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a19 0xc003d935e0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a16 0xc003da1580 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.454 UTC [cauthdsl] func2 -> DEBU a1b 0xc003da1580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.454 UTC [cauthdsl] func2 -> DEBU a1c 0xc003da1580 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.455 UTC [cauthdsl] func1 -> DEBU a1d 0xc003da1580 gate 1563590387446997800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.454 UTC [msp.identity] Verify -> DEBU a1a Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:39:47.455 UTC [msp.identity] Verify -> DEBU a1e Verify: sig = 00000000 30 44 02 20 7e ef 42 17 4e 75 f7 b1 84 c6 08 ac |0D. ~.B.Nu......| -peer0.org1.example.com | 00000010 f5 93 48 4f 87 36 01 b1 22 a4 ec 7c d4 b4 d1 4d |..HO.6.."..|...M| -peer0.org1.example.com | 00000020 d0 f2 3c c0 02 20 57 66 4f b8 9d bd db 81 1f 00 |..<.. WfO.......| -peer0.org1.example.com | 00000030 7c a0 23 b4 ec 75 81 de 6e 69 1e 7e 23 92 c7 42 ||.#..u..ni.~#..B| -peer0.org1.example.com | 00000040 e3 cc 03 cb 12 6c |.....l|" -peer0.org1.example.com | "2019-07-20 02:39:47.455 UTC [policies] Evaluate -> DEBU a1f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.456 UTC [policies] Evaluate -> DEBU a20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.456 UTC [policies] Evaluate -> DEBU a21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.456 UTC [cauthdsl] func1 -> DEBU a22 0xc003d93c60 gate 1563590387456635500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.456 UTC [cauthdsl] func2 -> DEBU a24 0xc003d93c60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.457 UTC [cauthdsl] func2 -> DEBU a25 0xc003d93c60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.457 UTC [cauthdsl] func2 -> DEBU a26 0xc003d93c60 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.456 UTC [cauthdsl] func2 -> DEBU a23 0xc003d935e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.457 UTC [cauthdsl] func1 -> DEBU a27 0xc003d935e0 gate 1563590387452999600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a28 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a2a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.458 UTC [gossip.comm] authenticateRemotePeer -> DEBU a2c Authenticated 172.18.0.8:60326" -peer0.org1.example.com | "2019-07-20 02:39:47.459 UTC [gossip.comm] GossipStream -> DEBU a2d Servicing 172.18.0.8:60326" -peer0.org1.example.com | "2019-07-20 02:39:47.459 UTC [gossip.comm] readFromStream -> DEBU a2e Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:39:47.459 UTC [gossip.comm] func2 -> DEBU a2f Client 172.18.0.8:60326 disconnected" -peer0.org1.example.com | "2019-07-20 02:39:47.459 UTC [comm.grpc.server] 1 -> INFO a30 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60326 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.3484ms -peer0.org1.example.com | "2019-07-20 02:39:47.460 UTC [gossip.comm] writeToStream -> DEBU a31 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:39:47.457 UTC [msp.identity] Verify -> DEBU a32 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:39:47.460 UTC [msp.identity] Verify -> DEBU a33 Verify: sig = 00000000 30 45 02 21 00 ee 4f fa 86 9e 91 8b 41 9c 03 b0 |0E.!..O.....A...| -peer0.org1.example.com | 00000010 f7 d0 7a ea bf 00 52 e8 69 02 8d 71 88 48 d5 52 |..z...R.i..q.H.R| -peer0.org1.example.com | 00000020 01 44 a3 a1 4a 02 20 39 89 1d b4 e2 32 73 e9 39 |.D..J. 9....2s.9| -peer0.org1.example.com | 00000030 ed 9c 15 0b 93 84 3c c6 20 0b 3b 8e 75 b2 56 74 |......<. .;.u.Vt| -peer0.org1.example.com | 00000040 45 4f 0c d5 22 dd 1c |EO.."..|" -peer0.org1.example.com | "2019-07-20 02:39:47.460 UTC [cauthdsl] func2 -> DEBU a34 0xc003d93c60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.461 UTC [cauthdsl] func1 -> DEBU a35 0xc003d93c60 gate 1563590387456635500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a36 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a38 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.462 UTC [gossip.comm] authenticateRemotePeer -> DEBU a3a Authenticated 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.462 UTC [gossip.comm] createConnection -> DEBU a3b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.462 UTC [gossip.comm] sendToEndpoint -> DEBU a3c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [gossip.comm] func1 -> DEBU a3d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [gossip.gossip] handleMessage -> DEBU a3e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [gossip.gossip] handleMessage -> DEBU a3f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU a40 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU a41 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [msp] DeserializeIdentity -> DEBU a42 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a43 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a44 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a45 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.585 UTC [policies] Evaluate -> DEBU a46 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.585 UTC [policies] Evaluate -> DEBU a47 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a49 0xc003dc5ba0 gate 1563590387586305400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4a 0xc003dc5ba0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4b 0xc003dc5ba0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4c 0xc003dc5ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4d 0xc003dc5ba0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a4e 0xc003dc5ba0 gate 1563590387586305400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a4f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a52 0xc003de63e0 gate 1563590387586913300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a53 0xc003de63e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a54 0xc003de63e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a55 0xc003de63e0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.587 UTC [grpc] infof -> DEBU a56 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [msp.identity] Verify -> DEBU a57 Verify: digest = 00000000 51 9a 6c 48 b8 eb d6 4b 88 88 ea d0 ec 8e 4b 42 |Q.lH...K......KB| -peer0.org1.example.com | 00000010 57 f4 fc 43 04 d0 64 31 4d 50 e0 af 73 83 b9 17 |W..C..d1MP..s...|" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [msp.identity] Verify -> DEBU a58 Verify: sig = 00000000 30 44 02 20 65 d8 95 e0 67 01 de a1 7e ed 23 a0 |0D. e...g...~.#.| -peer0.org1.example.com | 00000010 d2 cb 0b 0a dd 64 02 e8 07 3c d2 2b b1 0a 39 d9 |.....d...<.+..9.| -peer0.org1.example.com | 00000020 9d a3 42 2b 02 20 76 d5 68 8a ff 92 e9 b5 62 28 |..B+. v.h.....b(| -peer0.org1.example.com | 00000030 50 49 6e 8b 2b 6e ba c8 6f 8e 45 15 a3 c5 41 80 |PIn.+n..o.E...A.| -peer0.org1.example.com | 00000040 9d 53 ef fe 7e 10 |.S..~.|" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [cauthdsl] func2 -> DEBU a59 0xc003de63e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [cauthdsl] func1 -> DEBU a5a 0xc003de63e0 gate 1563590387586913300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] handleAliveMessage -> DEBU a5f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a60 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a61 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a62 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a63 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a64 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] handleAliveMessage -> DEBU a65 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU a66 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.596 UTC [gossip.comm] func1 -> DEBU a67 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.596 UTC [gossip.gossip] handleMessage -> DEBU a68 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.596 UTC [gossip.gossip] handleMessage -> DEBU a69 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU a6a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU a6b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a6f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a70 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a71 Obtaining identity" -orderer0.example.com | 00000040 b4 14 85 f1 cd 6f 15 |.....o.|" -orderer0.example.com | "2019-07-20 02:39:43.248 UTC [cauthdsl] func2 -> DEBU 92b 0xc000cda8c0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:43.248 UTC [cauthdsl] func1 -> DEBU 92c 0xc000cda8c0 gate 1563590383243353300 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:43.248 UTC [policies] Evaluate -> DEBU 92d Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.248 UTC [policies] Evaluate -> DEBU 92e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.249 UTC [common.configtx] recurseConfigMap -> DEBU 92f Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.249 UTC [common.configtx] recurseConfigMap -> DEBU 930 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.250 UTC [common.configtx] recurseConfigMap -> DEBU 931 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.250 UTC [orderer.common.cluster.step] sendMessage -> DEBU 932 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 10.4526ms " -orderer0.example.com | "2019-07-20 02:39:43.250 UTC [common.configtx] recurseConfigMap -> DEBU 933 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU 935 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:43.251 UTC [common.configtx] recurseConfigMap -> DEBU 934 Setting policy for key Readers to " -orderer0.example.com | "2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 936 Setting policy for key Writers to " -orderer0.example.com | "2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 937 Setting policy for key Admins to " -orderer0.example.com | "2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 938 Setting policy for key Endorsement to " -orderer0.example.com | "2019-07-20 02:39:43.239 UTC [orderer.common.cluster.step] handleMessage -> DEBU 901 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:43.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 939 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" -orderer0.example.com | "2019-07-20 02:39:43.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU 93a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.7µs " -orderer0.example.com | "2019-07-20 02:39:43.266 UTC [common.configtx] recurseConfigMap -> DEBU 93b Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.268 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 93c Sending msg of 28 bytes to 3 on channel businesschannel took 51.9µs" -orderer0.example.com | "2019-07-20 02:39:43.268 UTC [orderer.common.cluster.step] sendMessage -> DEBU 93d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.3µs " -orderer0.example.com | "2019-07-20 02:39:43.268 UTC [common.configtx] recurseConfigMap -> DEBU 93e Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 93f Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 940 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 941 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 942 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 943 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 944 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 945 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 946 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 947 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 948 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 949 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 94a Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.273 UTC [common.configtx] recurseConfigMap -> DEBU 94b Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:43.273 UTC [common.channelconfig] NewStandardValues -> DEBU 94d Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94e Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94f Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:43.273 UTC [orderer.common.cluster.step] handleMessage -> DEBU 94c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 950 Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 951 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 952 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] NewStandardValues -> DEBU 953 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 954 Processing field: ConsensusType" -peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] Send -> DEBU a72 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a73 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a74 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] Send -> DEBU a75 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a76 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] createConnection -> DEBU a77 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a78 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a79 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.601 UTC [grpc] DialContext -> DEBU a7a parsed scheme: """ -peer0.org1.example.com | "2019-07-20 02:39:47.601 UTC [grpc] DialContext -> DEBU a7b scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-07-20 02:39:47.601 UTC [grpc] watcher -> DEBU a7c ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" -peer0.org1.example.com | "2019-07-20 02:39:47.601 UTC [grpc] switchBalancer -> DEBU a7d ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-07-20 02:39:47.601 UTC [grpc] HandleSubConnStateChange -> DEBU a7e pickfirstBalancer: HandleSubConnStateChange: 0xc003e15e40, CONNECTING" -peer0.org1.example.com | "2019-07-20 02:39:47.613 UTC [grpc] HandleSubConnStateChange -> DEBU a7f pickfirstBalancer: HandleSubConnStateChange: 0xc003e15e40, READY" -peer0.org1.example.com | "2019-07-20 02:39:47.616 UTC [msp] GetDefaultSigningIdentity -> DEBU a80 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:47.616 UTC [msp.identity] Sign -> DEBU a81 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:39:47.616 UTC [msp.identity] Sign -> DEBU a82 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:39:47.616 UTC [gossip.comm] authenticateRemotePeer -> DEBU a83 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [gossip.comm] authenticateRemotePeer -> DEBU a84 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a85 Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 955 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 956 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:43.276 UTC [common.channelconfig] initializeProtosStruct -> DEBU 957 Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:43.276 UTC [common.channelconfig] initializeProtosStruct -> DEBU 958 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 959 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] NewStandardValues -> DEBU 95a Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 95b Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] NewStandardValues -> DEBU 95c Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 95d Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] validateMSP -> DEBU 95e Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.277 UTC [msp] newBccspMsp -> DEBU 95f Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.278 UTC [msp] New -> DEBU 961 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.279 UTC [msp] Setup -> DEBU 962 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:43.280 UTC [msp.identity] newIdentity -> DEBU 963 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.281 UTC [msp.identity] newIdentity -> DEBU 964 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.281 UTC [orderer.common.cluster.step] handleMessage -> DEBU 965 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:43.281 UTC [msp] Validate -> DEBU 966 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:43.282 UTC [common.channelconfig] NewStandardValues -> DEBU 967 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:39:43.278 UTC [orderer.common.cluster.step] handleMessage -> DEBU 960 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:43.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 968 Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 969 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.283 UTC [common.channelconfig] NewStandardValues -> DEBU 96a Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96b Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.283 UTC [common.channelconfig] NewStandardValues -> DEBU 96c Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96d Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:43.284 UTC [common.channelconfig] Validate -> DEBU 96e Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:39:43.284 UTC [common.channelconfig] validateMSP -> DEBU 96f Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.284 UTC [msp] newBccspMsp -> DEBU 970 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.284 UTC [msp] New -> DEBU 971 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.285 UTC [msp] Setup -> DEBU 972 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.285 UTC [msp.identity] newIdentity -> DEBU 973 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.286 UTC [msp.identity] newIdentity -> DEBU 974 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.287 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 975 Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a86 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a87 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a88 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a89 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a8a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.618 UTC [cauthdsl] func1 -> DEBU a90 0xc003e6ed10 gate 1563590387617822800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a91 0xc003e6ed10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a92 0xc003e6ed10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a93 0xc003e6ed10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a94 0xc003e6ed10 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func1 -> DEBU a95 0xc003e6ed10 gate 1563590387617822800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a96 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func1 -> DEBU a99 0xc003e6f550 gate 1563590387619373700 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:43.287 UTC [msp] Validate -> DEBU 976 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:43.287 UTC [msp] getCertificationChain -> DEBU 977 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.288 UTC [msp] hasOURole -> DEBU 978 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:43.288 UTC [msp] getCertificationChain -> DEBU 979 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] NewStandardValues -> DEBU 97a Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97b Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] NewStandardValues -> DEBU 97c Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97d Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] Validate -> DEBU 97e Anchor peers for org Org2MSP are " -orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] validateMSP -> DEBU 97f Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.288 UTC [msp] newBccspMsp -> DEBU 980 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.289 UTC [msp] New -> DEBU 981 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:43.289 UTC [msp] Setup -> DEBU 982 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.289 UTC [msp.identity] newIdentity -> DEBU 983 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.290 UTC [msp.identity] newIdentity -> DEBU 984 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:43.290 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 985 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.290 UTC [msp] Validate -> DEBU 986 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:43.291 UTC [msp] getCertificationChain -> DEBU 987 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.291 UTC [msp] hasOURole -> DEBU 988 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:43.291 UTC [msp] getCertificationChain -> DEBU 989 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:43.291 UTC [msp] Setup -> DEBU 98a Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:43.291 UTC [msp] Setup -> DEBU 98b MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:43.291 UTC [policies] NewManagerImpl -> DEBU 98c Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98d Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98e Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98f Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 990 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 991 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 992 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 993 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 994 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 995 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 996 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.293 UTC [policies] NewManagerImpl -> DEBU 997 Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.293 UTC [policies] NewManagerImpl -> DEBU 998 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 999 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99a Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99b Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99c Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99d Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99e Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99f Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a0 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a1 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a2 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:43.295 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9a 0xc003e6f550 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9b 0xc003e6f550 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9c 0xc003e6f550 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [msp.identity] Verify -> DEBU a9d Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [msp.identity] Verify -> DEBU a9e Verify: sig = 00000000 30 45 02 21 00 c3 13 c2 66 f7 f6 a6 53 8b 6b 86 |0E.!....f...S.k.| -peer0.org1.example.com | 00000010 c3 c3 e2 78 95 a9 22 3a f0 2e 00 bf 94 b5 74 02 |...x..":......t.| -peer0.org1.example.com | 00000020 20 8f bc 10 e4 02 20 50 2f be 78 fd 1d cd 08 72 | ..... P/.x....r| -peer0.org1.example.com | 00000030 58 e9 b7 ba 25 0d 0f 31 0c 59 72 1c 65 7a 12 dc |X...%..1.Yr.ez..| -peer0.org1.example.com | 00000040 af cb a2 d5 8d 70 b5 |.....p.|" -peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [cauthdsl] func2 -> DEBU a9f 0xc003e6f550 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [cauthdsl] func1 -> DEBU aa0 0xc003e6f550 gate 1563590387619373700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:47.621 UTC [gossip.comm] authenticateRemotePeer -> DEBU aa5 Authenticated 172.18.0.7:7051" -peer0.org1.example.com | "2019-07-20 02:39:47.621 UTC [gossip.comm] createConnection -> DEBU aa6 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:47.621 UTC [gossip.comm] sendToEndpoint -> DEBU aa7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.270 UTC [gossip.pull] Hello -> DEBU aa8 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:48.270 UTC [gossip.comm] Send -> DEBU aa9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.pull] Hello -> DEBU aaa Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.comm] Send -> DEBU aab Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.pull] Hello -> DEBU aac Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.comm] Send -> DEBU aad Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.comm] sendToEndpoint -> DEBU aae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.comm] sendToEndpoint -> DEBU aaf Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab3 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.273 UTC [gossip.comm] func1 -> DEBU ab4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.273 UTC [gossip.gossip] handleMessage -> DEBU ab5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.274 UTC [gossip.pull] HandleMessage -> DEBU ab6 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.274 UTC [gossip.gossip] handleMessage -> DEBU ab7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.275 UTC [gossip.comm] func1 -> DEBU ab8 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.275 UTC [gossip.gossip] handleMessage -> DEBU ab9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.275 UTC [gossip.pull] HandleMessage -> DEBU aba GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.275 UTC [gossip.gossip] handleMessage -> DEBU abb Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.281 UTC [gossip.comm] func1 -> DEBU abc Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.281 UTC [gossip.gossip] handleMessage -> DEBU abd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.282 UTC [gossip.pull] HandleMessage -> DEBU abe GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.282 UTC [gossip.gossip] handleMessage -> DEBU abf Exiting" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bb Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ca Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cb Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cc Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cd Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ce Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cf Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d0 As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d1 As expected, current configuration has policy '/Channel/Writers'" -peer0.org1.example.com | "2019-07-20 02:39:48.301 UTC [msp] GetDefaultSigningIdentity -> DEBU ac0 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:48.301 UTC [msp.identity] Sign -> DEBU ac1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151011 " -peer0.org1.example.com | "2019-07-20 02:39:48.302 UTC [msp.identity] Sign -> DEBU ac2 Sign: digest: FFBB9045B582F1F2F605222245833C1B3A2C2C650EF05DD7A6C39D8270C5E845 " -peer0.org1.example.com | "2019-07-20 02:39:48.303 UTC [msp] GetDefaultSigningIdentity -> DEBU ac3 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:48.303 UTC [msp.identity] Sign -> DEBU ac4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:48.304 UTC [msp.identity] Sign -> DEBU ac5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:48.304 UTC [gossip.comm] Send -> DEBU ac6 Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" secret_envelope:\r\256'\274n\363\370\230\035f\330\0038\177{;\256\377\002 8F\034yP\252\315\325\"$0\243b'\371\003\260\0070\327\001\215\007\236\202\357\256=\r\036`\005" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:48.304 UTC [msp] DeserializeIdentity -> DEBU ac7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.305 UTC [gossip.comm] Send -> DEBU ac8 Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:48.305 UTC [msp] DeserializeIdentity -> DEBU ac9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.305 UTC [gossip.comm] Send -> DEBU aca Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acc Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" secret_envelope:\r\256'\274n\363\370\230\035f\330\0038\177{;\256\377\002 8F\034yP\252\315\325\"$0\243b'\371\003\260\0070\327\001\215\007\236\202\357\256=\r\036`\005" > > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU ace Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU ad0 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.309 UTC [gossip.comm] func1 -> DEBU ad1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.310 UTC [gossip.gossip] handleMessage -> DEBU ad2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.310 UTC [gossip.gossip] handleMessage -> DEBU ad3 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.310 UTC [gossip.discovery] handleMsgFromComm -> DEBU ad4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ad5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:48.311 UTC [gossip.comm] func1 -> DEBU ad6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.311 UTC [gossip.comm] func1 -> DEBU ad8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.311 UTC [gossip.gossip] handleMessage -> DEBU ad9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.311 UTC [msp.identity] Verify -> DEBU ad7 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| -peer0.org1.example.com | 00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" -peer0.org1.example.com | "2019-07-20 02:39:48.313 UTC [msp.identity] Verify -> DEBU ada Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| -peer0.org1.example.com | 00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| -peer0.org1.example.com | 00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| -peer0.org1.example.com | 00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d2 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d3 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d4 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d5 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d6 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9d7 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d8 As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d9 As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9da As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9db Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9dc Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9dd Manager Channel has managers Orderer" -peer0.org1.example.com | 00000040 2a 14 7e f4 03 95 |*.~...|" -peer0.org1.example.com | "2019-07-20 02:39:48.314 UTC [gossip.discovery] handleAliveMessage -> DEBU adb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.314 UTC [gossip.discovery] isSentByMe -> DEBU adc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.314 UTC [gossip.discovery] handleAliveMessage -> DEBU add Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.317 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ade Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:48.317 UTC [msp] DeserializeIdentity -> DEBU adf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ae0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ae1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ae2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.319 UTC [cauthdsl] func1 -> DEBU ae6 0xc003e87ff0 gate 1563590388319200400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.319 UTC [cauthdsl] func2 -> DEBU ae7 0xc003e87ff0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.319 UTC [cauthdsl] func2 -> DEBU ae8 0xc003e87ff0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.320 UTC [cauthdsl] func2 -> DEBU ae9 0xc003e87ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:48.320 UTC [cauthdsl] func2 -> DEBU aea 0xc003e87ff0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.321 UTC [cauthdsl] func1 -> DEBU aeb 0xc003e87ff0 gate 1563590388319200400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.321 UTC [cauthdsl] func1 -> DEBU aef 0xc003f10830 gate 1563590388321942500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.322 UTC [cauthdsl] func2 -> DEBU af0 0xc003f10830 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.322 UTC [cauthdsl] func2 -> DEBU af1 0xc003f10830 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.323 UTC [cauthdsl] func2 -> DEBU af2 0xc003f10830 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.323 UTC [msp.identity] Verify -> DEBU af3 Verify: digest = 00000000 dd a6 da a6 83 bb 3d 4d 62 9a 5c b6 79 ea 94 3e |......=Mb.\.y..>| -peer0.org1.example.com | 00000010 51 07 45 5e 71 f1 1a 16 0b 38 83 2a 80 ff b5 f1 |Q.E^q....8.*....|" -peer0.org1.example.com | "2019-07-20 02:39:48.325 UTC [msp.identity] Verify -> DEBU af4 Verify: sig = 00000000 30 44 02 20 50 79 7d 88 3f 03 86 f4 b3 4f 62 86 |0D. Py}.?....Ob.| -peer0.org1.example.com | 00000010 8a 38 18 a2 e6 0f 11 c6 13 fa b4 76 ec 39 45 64 |.8.........v.9Ed| -peer0.org1.example.com | 00000020 ae b3 f0 40 02 20 0f ce 1f 8d d4 23 9c 3e 25 a0 |...@. .....#.>%.| -peer0.org1.example.com | 00000030 01 30 85 29 fd 39 85 ea 54 0e ac 7c bd 5d 42 d7 |.0.).9..T..|.]B.| -peer0.org1.example.com | 00000040 e0 b9 fa 90 d5 f9 |......|" -peer0.org1.example.com | "2019-07-20 02:39:48.326 UTC [cauthdsl] func2 -> DEBU af5 0xc003f10830 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.329 UTC [cauthdsl] func1 -> DEBU af6 0xc003f10830 gate 1563590388321942500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.331 UTC [policies] Evaluate -> DEBU afa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.331 UTC [gossip.discovery] handleAliveMessage -> DEBU afb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afd updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afe Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:48.333 UTC [gossip.discovery] learnExistingMembers -> DEBU aff Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:48.333 UTC [gossip.discovery] learnExistingMembers -> DEBU b00 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.334 UTC [gossip.discovery] handleAliveMessage -> DEBU b01 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.334 UTC [gossip.discovery] handleMsgFromComm -> DEBU b02 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.334 UTC [gossip.discovery] handleMsgFromComm -> DEBU b03 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.335 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b04 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:48.335 UTC [gossip.gossip] handleMessage -> DEBU b05 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.335 UTC [gossip.gossip] handleMessage -> DEBU b06 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.335 UTC [msp.identity] Verify -> DEBU b07 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| -peer0.org1.example.com | 00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" -peer0.org1.example.com | "2019-07-20 02:39:48.335 UTC [msp.identity] Verify -> DEBU b08 Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| -peer0.org1.example.com | 00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| -peer0.org1.example.com | 00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| -peer0.org1.example.com | 00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| -peer0.org1.example.com | 00000040 2a 14 7e f4 03 95 |*.~...|" -peer0.org1.example.com | "2019-07-20 02:39:48.336 UTC [gossip.discovery] handleAliveMessage -> DEBU b09 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.337 UTC [gossip.discovery] isSentByMe -> DEBU b0a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.337 UTC [gossip.discovery] handleAliveMessage -> DEBU b0b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.337 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b0c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:48.337 UTC [msp] DeserializeIdentity -> DEBU b0d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.338 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:48.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b0f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b10 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b11 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9de Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9df Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e0 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e1 As expected, current configuration has policy '/Channel/Orderer/Admins'" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e2 As expected, current configuration has policy '/Channel/Orderer/Writers'" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e3 As expected, current configuration has policy '/Channel/Orderer/Readers'" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.capabilities] Supported -> DEBU 9e4 Orderer capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.capabilities] Supported -> DEBU 9e5 Channel capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [orderer.common.server] func1 -> DEBU 9e6 Executing callback to update root CAs" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e7 updating root CAs for channel [businesschannel]" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e8 adding orderer root CAs for MSP [OrdererMSP]" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e9 adding app root CAs for MSP [Org1MSP]" -orderer0.example.com | "2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9ea adding app root CAs for MSP [Org2MSP]" -orderer0.example.com | "2019-07-20 02:39:43.300 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9eb [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" -orderer0.example.com | "2019-07-20 02:39:43.301 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9ec [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" -orderer0.example.com | "2019-07-20 02:39:43.301 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ed Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:43.302 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ee Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:43.302 UTC [msp.identity] Sign -> DEBU 9ef Sign: plaintext: 0A020801120B0A090A03010203100418...F2CDD8D5A6282CFC0741B2C754C9EB86 " -orderer0.example.com | "2019-07-20 02:39:43.302 UTC [msp.identity] Sign -> DEBU 9f0 Sign: digest: 83FA658AE2186F1919C8D657A3B6EF232379955B505EBBF4C8203590B5F4A732 " -orderer0.example.com | "2019-07-20 02:39:43.304 UTC [fsblkstorage] indexBlock -> DEBU 9f1 Indexing block [blockNum=1, blockHash=[]byte{0xad, 0x6d, 0x1e, 0xa9, 0x18, 0xba, 0xbc, 0xca, 0xf6, 0xcf, 0x8e, 0xc0, 0x90, 0xeb, 0x4b, 0xfb, 0x6e, 0x2f, 0xc6, 0x7d, 0xf5, 0x4e, 0x4d, 0x7d, 0x6, 0xa6, 0xef, 0x4f, 0x93, 0x80, 0x1f, 0xd9} txOffsets= -orderer0.example.com | txId=4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94 locPointer=offset=71, bytesLength=22685 -orderer0.example.com | ]" -orderer0.example.com | "2019-07-20 02:39:43.306 UTC [fsblkstorage] updateCheckpoint -> DEBU 9f2 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47640], isChainEmpty=[false], lastBlockNumber=[1]" -orderer0.example.com | "2019-07-20 02:39:43.306 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 9f3 [channel: businesschannel] Wrote block [1]" -orderer0.example.com | "2019-07-20 02:39:43.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:43.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f5 Sending msg of 28 bytes to 3 on channel testchainid took 212.6µs" -orderer0.example.com | "2019-07-20 02:39:43.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.6µs " -orderer0.example.com | "2019-07-20 02:39:43.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f7 Sending msg of 28 bytes to 2 on channel businesschannel took 49.7µs" -orderer0.example.com | "2019-07-20 02:39:43.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f8 Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" -orderer0.example.com | "2019-07-20 02:39:43.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.9µs " -orderer0.example.com | "2019-07-20 02:39:43.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.5µs " -orderer0.example.com | "2019-07-20 02:39:43.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:43.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:44.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:44.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9fe Sending msg of 28 bytes to 3 on channel testchainid took 32.1µs" -orderer0.example.com | "2019-07-20 02:39:44.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9ff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2788ms " -orderer0.example.com | "2019-07-20 02:39:44.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a00 Sending msg of 28 bytes to 2 on channel businesschannel took 50.3µs" -orderer0.example.com | "2019-07-20 02:39:44.260 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a01 Sending msg of 28 bytes to 3 on channel businesschannel took 112.8µs" -orderer0.example.com | "2019-07-20 02:39:44.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU a02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.4µs " -orderer0.example.com | "2019-07-20 02:39:44.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU a03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 492.5µs " -orderer0.example.com | "2019-07-20 02:39:44.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU a04 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:44.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU a05 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:44.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU a06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:44.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a07 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" -peer0.org1.example.com | "2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.340 UTC [cauthdsl] func1 -> DEBU b14 0xc003f253c0 gate 1563590388340226000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.340 UTC [cauthdsl] func2 -> DEBU b15 0xc003f253c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.340 UTC [cauthdsl] func2 -> DEBU b16 0xc003f253c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.341 UTC [cauthdsl] func2 -> DEBU b17 0xc003f253c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:48.341 UTC [cauthdsl] func2 -> DEBU b18 0xc003f253c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.341 UTC [cauthdsl] func1 -> DEBU b19 0xc003f253c0 gate 1563590388340226000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.341 UTC [policies] Evaluate -> DEBU b1a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.341 UTC [policies] Evaluate -> DEBU b1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.342 UTC [policies] Evaluate -> DEBU b1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.342 UTC [cauthdsl] func1 -> DEBU b1d 0xc003f25c00 gate 1563590388342300800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.342 UTC [cauthdsl] func2 -> DEBU b1e 0xc003f25c00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.342 UTC [cauthdsl] func2 -> DEBU b1f 0xc003f25c00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.343 UTC [cauthdsl] func2 -> DEBU b20 0xc003f25c00 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.343 UTC [msp.identity] Verify -> DEBU b21 Verify: digest = 00000000 83 07 cd 61 c5 95 48 f2 88 fe e8 ac 2f 59 7a 7b |...a..H...../Yz{| -peer0.org1.example.com | 00000010 5f 4d d3 51 85 71 8c 9e 54 a9 d7 0b 3d 29 32 cb |_M.Q.q..T...=)2.|" -peer0.org1.example.com | "2019-07-20 02:39:48.344 UTC [msp.identity] Verify -> DEBU b22 Verify: sig = 00000000 30 45 02 21 00 9f d8 8c b9 60 a6 3c 4e 57 db d6 |0E.!.....`. DEBU b23 0xc003f25c00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.344 UTC [cauthdsl] func1 -> DEBU b24 0xc003f25c00 gate 1563590388342300800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:48.344 UTC [policies] Evaluate -> DEBU b25 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b27 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b28 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b29 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b2a endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" lastAliveTS: 1563590371938894800, 20 but got ts: inc_num:1563590371938894800 seq_num:8 " -peer0.org1.example.com | "2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b2b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.346 UTC [gossip.discovery] handleMsgFromComm -> DEBU b2c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [gossip.discovery] handleMsgFromComm -> DEBU b2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b2e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [endorser] ProcessProposal -> DEBU b2f Entering: request from 172.18.0.9:58326" -peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [protoutils] ValidateProposalMessage -> DEBU b30 ValidateProposalMessage starts for signed proposal 0xc003e3f720" -peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [protoutils] validateChannelHeader -> DEBU b31 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [protoutils] checkSignatureFromCreator -> DEBU b32 begin" -peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [protoutils] checkSignatureFromCreator -> DEBU b33 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [protoutils] checkSignatureFromCreator -> DEBU b34 creator is valid" -peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [msp.identity] Verify -> DEBU b35 Verify: digest = 00000000 61 4e b1 91 45 01 64 14 f4 f8 1d 3d 60 e8 02 8f |aN..E.d....=`...| -peer0.org1.example.com | 00000010 e2 1a 80 0c b6 ea 07 32 b7 8f 09 44 a1 09 b5 08 |.......2...D....|" -peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [msp.identity] Verify -> DEBU b36 Verify: sig = 00000000 30 45 02 21 00 e8 57 06 93 54 ee cd d5 f7 7a 98 |0E.!..W..T....z.| -peer0.org1.example.com | 00000010 e9 0b 87 d6 50 8e c5 d9 c5 44 85 f2 24 76 60 0f |....P....D..$v`.| -peer0.org1.example.com | 00000020 5a e6 e3 ca 4f 02 20 3a 19 54 4b 6d b6 a2 66 6a |Z...O. :.TKm..fj| -peer0.org1.example.com | 00000030 a9 0d 07 cb ca d1 df 11 ec 9d 47 a4 51 75 2c 4c |..........G.Qu,L| -peer0.org1.example.com | 00000040 43 3c 6e 22 ad 26 76 |C DEBU b37 exits successfully" -peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU b38 validateChaincodeProposalMessage starts for proposal 0xc003e368c0, header 0xc003e3fb30" -peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU b39 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [endorser] preProcess -> DEBU b3a [][0b8a6e52] processing txid: 0b8a6e52ac63c86441c5945c21b8b6c5947ea07bddb6b92e8376ce17066117da" -peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [endorser] SimulateProposal -> DEBU b3b [][0b8a6e52] Entry chaincode: name:"lscc" " -orderer0.example.com | "2019-07-20 02:39:44.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU a08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " -orderer0.example.com | "2019-07-20 02:39:44.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a09 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" -orderer0.example.com | "2019-07-20 02:39:44.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0a Sending msg of 28 bytes to 3 on channel businesschannel took 53.7µs" -orderer0.example.com | "2019-07-20 02:39:44.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 786.9µs " -orderer0.example.com | "2019-07-20 02:39:44.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 185.6µs " -orderer0.example.com | "2019-07-20 02:39:44.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:44.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:45.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:45.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a10 Sending msg of 28 bytes to 3 on channel testchainid took 269.8µs" -orderer0.example.com | "2019-07-20 02:39:45.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU a11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.6µs " -orderer0.example.com | "2019-07-20 02:39:45.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a12 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" -orderer0.example.com | "2019-07-20 02:39:45.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a13 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" -orderer0.example.com | "2019-07-20 02:39:45.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU a14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234µs " -orderer0.example.com | "2019-07-20 02:39:45.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU a15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 237.3µs " -orderer0.example.com | "2019-07-20 02:39:45.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU a16 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:45.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU a17 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:45.364 UTC [orderer.common.server] Deliver -> DEBU a18 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:39:45.364 UTC [common.deliver] Handle -> DEBU a19 Starting new deliver loop for 172.18.0.9:39070" -orderer0.example.com | "2019-07-20 02:39:45.364 UTC [common.deliver] Handle -> DEBU a1a Attempting to read seek info message from 172.18.0.9:39070" -orderer0.example.com | "2019-07-20 02:39:45.381 UTC [orderer.common.server] Broadcast -> DEBU a1b Starting new Broadcast handler" -orderer0.example.com | "2019-07-20 02:39:45.381 UTC [orderer.common.broadcast] Handle -> DEBU a1c Starting new broadcast loop for 172.18.0.9:39072" -orderer0.example.com | "2019-07-20 02:39:45.381 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a1d [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39072" -orderer0.example.com | "2019-07-20 02:39:45.381 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a1e Processing config update message for channel businesschannel" -orderer0.example.com | "2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-07-20 02:39:45.383 UTC [policies] Evaluate -> DEBU a22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:45.383 UTC [policies] Evaluate -> DEBU a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-07-20 02:39:45.383 UTC [msp] DeserializeIdentity -> DEBU a24 Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:45.384 UTC [msp.identity] newIdentity -> DEBU a25 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.384 UTC [cauthdsl] func1 -> DEBU a26 0xc000d78fa0 gate 1563590385384567000 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:45.384 UTC [cauthdsl] func2 -> DEBU a27 0xc000d78fa0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:45.384 UTC [cauthdsl] func2 -> DEBU a28 0xc000d78fa0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:45.385 UTC [cauthdsl] func2 -> DEBU a29 0xc000d78fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:39:45.385 UTC [cauthdsl] func2 -> DEBU a2a 0xc000d78fa0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:45.385 UTC [cauthdsl] func1 -> DEBU a2b 0xc000d78fa0 gate 1563590385384567000 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:45.385 UTC [policies] Evaluate -> DEBU a2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.386 UTC [policies] Evaluate -> DEBU a2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.386 UTC [policies] Evaluate -> DEBU a2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-07-20 02:39:45.386 UTC [cauthdsl] func1 -> DEBU a2f 0xc000de6120 gate 1563590385386826000 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:45.387 UTC [cauthdsl] func2 -> DEBU a30 0xc000de6120 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:45.387 UTC [cauthdsl] func2 -> DEBU a31 0xc000de6120 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:45.387 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a32 Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [endorser] callChaincode -> INFO b3c [][0b8a6e52] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [chaincode] Execute -> DEBU b3d Entry" -peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [msp.identity] Verify -> DEBU b3e Verify: digest = 00000000 61 4e b1 91 45 01 64 14 f4 f8 1d 3d 60 e8 02 8f |aN..E.d....=`...| -peer0.org1.example.com | 00000010 e2 1a 80 0c b6 ea 07 32 b7 8f 09 44 a1 09 b5 08 |.......2...D....|" -peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [msp.identity] Verify -> DEBU b3f Verify: sig = 00000000 30 45 02 21 00 e8 57 06 93 54 ee cd d5 f7 7a 98 |0E.!..W..T....z.| -peer0.org1.example.com | 00000010 e9 0b 87 d6 50 8e c5 d9 c5 44 85 f2 24 76 60 0f |....P....D..$v`.| -peer0.org1.example.com | 00000020 5a e6 e3 ca 4f 02 20 3a 19 54 4b 6d b6 a2 66 6a |Z...O. :.TKm..fj| -peer0.org1.example.com | 00000030 a9 0d 07 cb ca d1 df 11 ec 9d 47 a4 51 75 2c 4c |..........G.Qu,L| -peer0.org1.example.com | 00000040 43 3c 6e 22 ad 26 76 |C DEBU b40 Created metadata tar" -peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b41 HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)}" -peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b42 Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]" -peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU b43 constructing new query executor txid = [709da35e-09b3-41d0-8efc-62c5eb9dda45]" -peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [stateleveldb] GetState -> DEBU b44 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [lockbasedtxmgr] Done -> DEBU b45 Done with transaction simulation / query execution [709da35e-09b3-41d0-8efc-62c5eb9dda45]" -peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b46 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts." -peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [lscc] executeInstall -> INFO b47 Installed Chaincode [exp02] Version [1.0] to peer" -peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [chaincode] handleMessage -> DEBU b48 [0b8a6e52] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [chaincode] Notify -> DEBU b49 [0b8a6e52] notifying Txid:0b8a6e52ac63c86441c5945c21b8b6c5947ea07bddb6b92e8376ce17066117da, channelID:" -peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [chaincode] Execute -> DEBU b4a Exit" -peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [endorser] callChaincode -> INFO b4b [][0b8a6e52] Exit chaincode: name:"lscc" (1ms)" -peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [endorser] SimulateProposal -> DEBU b4c [][0b8a6e52] Exit" -peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [endorser] func1 -> DEBU b4d Exit: request from 172.18.0.9:58326" -peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [comm.grpc.server] 1 -> INFO b4e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58326 grpc.code=OK grpc.call_duration=2.9756ms -peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b50 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| -peer0.org1.example.com | 00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" -peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b51 Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| -peer0.org1.example.com | 00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| -peer0.org1.example.com | 00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| -peer0.org1.example.com | 00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| -peer0.org1.example.com | 00000040 2a 14 7e f4 03 95 |*.~...|" -peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b52 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b53 Verify: sig = 00000000 30 44 02 20 4d c5 8f c3 73 8e 7e e4 eb f9 c4 9a |0D. M...s.~.....| -peer0.org1.example.com | 00000010 b2 3e 0d ae 27 bc 6e f3 f8 98 1d 66 d8 03 38 7f |.>..'.n....f..8.| -peer0.org1.example.com | 00000020 7b 3b ae ff 02 20 38 46 1c 79 50 aa cd d5 22 24 |{;... 8F.yP..."$| -peer0.org1.example.com | 00000030 30 a3 62 27 f9 03 b0 07 30 d7 01 8d 07 9e 82 ef |0.b'....0.......| -peer0.org1.example.com | 00000040 ae 3d 0d 1e 60 05 |.=..`.|" -peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [gossip.discovery] handleAliveMessage -> DEBU b54 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [gossip.discovery] isSentByMe -> DEBU b55 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [gossip.discovery] handleAliveMessage -> DEBU b56 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU b57 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [gossip.gossip] handleMessage -> DEBU b4f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.355 UTC [grpc] infof -> DEBU b58 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:48.355 UTC [grpc] warningf -> DEBU b59 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58326: read: connection reset by peer" -peer0.org1.example.com | "2019-07-20 02:39:48.355 UTC [grpc] infof -> DEBU b5a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:39:48.393 UTC [gossip.comm] func1 -> DEBU b5b Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.393 UTC [gossip.comm] func1 -> DEBU b5c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-07-20 02:39:45.387 UTC [msp] Validate -> DEBU a33 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:45.388 UTC [msp] getCertificationChain -> DEBU a34 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.388 UTC [cauthdsl] func2 -> DEBU a35 0xc000de6120 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:45.388 UTC [msp.identity] Verify -> DEBU a36 Verify: digest = 00000000 c5 5a be 1c 29 23 7f 23 39 cf 17 a5 ec 41 e6 c6 |.Z..)#.#9....A..| -orderer0.example.com | 00000010 6f c0 2d c4 a5 ab 38 7c ca 36 84 c1 82 cb 1a ce |o.-...8|.6......|" -orderer0.example.com | "2019-07-20 02:39:45.388 UTC [msp.identity] Verify -> DEBU a37 Verify: sig = 00000000 30 44 02 20 67 a5 33 2b c9 f6 28 3d aa 68 79 ec |0D. g.3+..(=.hy.| -orderer0.example.com | 00000010 a7 ff 72 cb 1b 25 d6 49 4b fe 8b 44 16 b2 4e e7 |..r..%.IK..D..N.| -orderer0.example.com | 00000020 f3 91 ef 22 02 20 7a c3 5b 30 ad 9e 74 1f be 45 |...". z.[0..t..E| -orderer0.example.com | 00000030 40 b9 97 df 12 3f 78 68 99 6b 59 36 ec 06 5c 86 |@....?xh.kY6..\.| -orderer0.example.com | 00000040 1f 95 16 08 41 48 |....AH|" -orderer0.example.com | "2019-07-20 02:39:45.389 UTC [cauthdsl] func2 -> DEBU a38 0xc000de6120 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:45.389 UTC [cauthdsl] func1 -> DEBU a39 0xc000de6120 gate 1563590385386826000 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:45.389 UTC [policies] Evaluate -> DEBU a3a Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.389 UTC [policies] Evaluate -> DEBU a3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3c Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3e Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a48 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] verifyDeltaSet -> DEBU a51 Processing change to key: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] policyForItem -> DEBU a52 Getting policy for item Org2MSP with mod_policy Admins" -orderer0.example.com | "2019-07-20 02:39:45.393 UTC [policies] Manager -> DEBU a53 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a54 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a55 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a56 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a57 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a58 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a59 Manager Channel/Application looking up path [Org2MSP]" -orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a5a Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.395 UTC [policies] Manager -> DEBU a5b Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.395 UTC [policies] Manager -> DEBU a5c Manager Channel/Application/Org2MSP looking up path []" -orderer0.example.com | "2019-07-20 02:39:45.395 UTC [policies] Evaluate -> DEBU a5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -orderer0.example.com | "2019-07-20 02:39:45.396 UTC [cauthdsl] func1 -> DEBU a5e 0xc000f4d0a0 gate 1563590385396347200 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:45.396 UTC [cauthdsl] func2 -> DEBU a5f 0xc000f4d0a0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:45.396 UTC [cauthdsl] func2 -> DEBU a60 0xc000f4d0a0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:45.397 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a61 Checking if identity satisfies ADMIN role for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.397 UTC [cauthdsl] func2 -> DEBU a62 0xc000f4d0a0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:45.397 UTC [msp.identity] Verify -> DEBU a63 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| -orderer0.example.com | 00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" -orderer0.example.com | "2019-07-20 02:39:45.398 UTC [msp.identity] Verify -> DEBU a64 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| -orderer0.example.com | 00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| -orderer0.example.com | 00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| -orderer0.example.com | 00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| -orderer0.example.com | 00000040 e9 49 62 bf 87 8d |.Ib...|" -peer0.org1.example.com | "2019-07-20 02:39:48.393 UTC [gossip.gossip] handleMessage -> DEBU b5d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.395 UTC [gossip.gossip] handleMessage -> DEBU b5e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.395 UTC [gossip.gossip] handleMessage -> DEBU b5f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.396 UTC [gossip.pull] HandleMessage -> DEBU b61 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.396 UTC [gossip.pull] SendDigest -> DEBU b62 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:39:48.396 UTC [gossip.gossip] handleMessage -> DEBU b63 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.396 UTC [gossip.discovery] handleMsgFromComm -> DEBU b60 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b64 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:48.397 UTC [msp.identity] Verify -> DEBU b65 Verify: digest = 00000000 c2 f5 97 4c 33 60 7a 9a ba 24 34 c7 47 2b f2 87 |...L3`z..$4.G+..| -peer0.org1.example.com | 00000010 5b eb d2 29 8c 5d a3 17 21 da c7 6e eb 26 41 c2 |[..).]..!..n.&A.|" -peer0.org1.example.com | "2019-07-20 02:39:48.397 UTC [msp.identity] Verify -> DEBU b66 Verify: sig = 00000000 30 44 02 20 28 3f 67 32 36 59 d6 73 0d 34 83 bb |0D. (?g26Y.s.4..| -peer0.org1.example.com | 00000010 fa c7 21 82 14 81 c9 3b 8e af a9 c0 1f 11 34 43 |..!....;......4C| -peer0.org1.example.com | 00000020 24 1e f6 50 02 20 0e 15 e6 8b 57 da ce 0f e5 19 |$..P. ....W.....| -peer0.org1.example.com | 00000030 6a 7c 6b 21 aa 6b 16 48 e4 ac 51 9b e3 7d 41 4a |j|k!.k.H..Q..}AJ| -peer0.org1.example.com | 00000040 dc a4 f9 81 1a 32 |.....2|" -peer0.org1.example.com | "2019-07-20 02:39:48.398 UTC [msp.identity] Verify -> DEBU b67 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:39:48.398 UTC [msp.identity] Verify -> DEBU b68 Verify: sig = 00000000 30 45 02 21 00 96 a4 ee c3 c1 8e eb b9 d7 c2 9b |0E.!............| -peer0.org1.example.com | 00000010 6b ab d1 8d 5e 9f 5c 75 38 f5 10 ce 52 9c 78 d2 |k...^.\u8...R.x.| -peer0.org1.example.com | 00000020 93 a8 92 24 d3 02 20 2b e2 d7 d4 f8 0a d5 6c 72 |...$.. +......lr| -peer0.org1.example.com | 00000030 59 f3 a0 6c 99 80 0a 10 25 ff fb 32 18 71 14 78 |Y..l....%..2.q.x| -peer0.org1.example.com | 00000040 35 a9 cf 1f 10 be 91 |5......|" -peer0.org1.example.com | "2019-07-20 02:39:48.399 UTC [gossip.discovery] handleAliveMessage -> DEBU b69 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:48.400 UTC [gossip.discovery] learnExistingMembers -> DEBU b6d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:48.400 UTC [gossip.discovery] learnExistingMembers -> DEBU b6e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.400 UTC [gossip.discovery] handleAliveMessage -> DEBU b6f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.400 UTC [gossip.discovery] handleMsgFromComm -> DEBU b70 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.401 UTC [gossip.discovery] sendMemResponse -> DEBU b71 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:39:48.401 UTC [msp] DeserializeIdentity -> DEBU b72 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.401 UTC [msp] DeserializeIdentity -> DEBU b73 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.402 UTC [gossip.comm] Send -> DEBU b74 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:48.402 UTC [gossip.comm] sendToEndpoint -> DEBU b75 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.402 UTC [gossip.comm] sendToEndpoint -> DEBU b76 Exiting" -orderer0.example.com | "2019-07-20 02:39:45.398 UTC [cauthdsl] func2 -> DEBU a65 0xc000f4d0a0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:45.398 UTC [cauthdsl] func1 -> DEBU a66 0xc000f4d0a0 gate 1563590385396347200 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:45.398 UTC [policies] Evaluate -> DEBU a67 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.398 UTC [policies] Evaluate -> DEBU a68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.398 UTC [common.configtx] verifyDeltaSet -> DEBU a69 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6a Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6c Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6d Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6e Setting policy for key Readers to " -orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6f Setting policy for key Writers to " -orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a70 Setting policy for key Admins to " -orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a71 Setting policy for key Endorsement to " -orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a72 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a73 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a74 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a75 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a76 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a77 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a78 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a79 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7a Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7b Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7c Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7d Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.402 UTC [common.configtx] recurseConfigMap -> DEBU a7e Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.configtx] recurseConfigMap -> DEBU a7f Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.configtx] recurseConfigMap -> DEBU a80 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a81 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a82 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a83 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a84 Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a85 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a86 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a87 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a88 Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a89 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a8a Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8b Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a8c Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8d Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] Validate -> DEBU a8e Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:39:45.404 UTC [common.channelconfig] validateMSP -> DEBU a8f Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.404 UTC [msp] newBccspMsp -> DEBU a90 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.404 UTC [msp] New -> DEBU a91 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.404 UTC [msp] Setup -> DEBU a92 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.404 UTC [msp.identity] newIdentity -> DEBU a93 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | "2019-07-20 02:39:48.402 UTC [gossip.discovery] sendMemResponse -> DEBU b77 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > alive: " -peer0.org1.example.com | "2019-07-20 02:39:48.574 UTC [gossip.comm] func1 -> DEBU b78 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.574 UTC [gossip.gossip] handleMessage -> DEBU b79 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.575 UTC [gossip.pull] HandleMessage -> DEBU b7a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.576 UTC [msp] DeserializeIdentity -> DEBU b7b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.576 UTC [msp] DeserializeIdentity -> DEBU b7c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.576 UTC [gossip.pull] SendDigest -> DEBU b7d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:39:48.576 UTC [gossip.gossip] handleMessage -> DEBU b7e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.577 UTC [gossip.comm] func1 -> DEBU b7f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.577 UTC [gossip.gossip] handleMessage -> DEBU b80 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.578 UTC [gossip.gossip] handleMessage -> DEBU b81 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.579 UTC [gossip.discovery] handleMsgFromComm -> DEBU b82 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.579 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b83 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:48.579 UTC [msp] DeserializeIdentity -> DEBU b84 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.580 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b86 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b87 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [cauthdsl] func1 -> DEBU b8b 0xc003f8b790 gate 1563590388581282400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8c 0xc003f8b790 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8d 0xc003f8b790 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8e 0xc003f8b790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8f 0xc003f8b790 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [cauthdsl] func1 -> DEBU b90 0xc003f8b790 gate 1563590388581282400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b91 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [cauthdsl] func1 -> DEBU b94 0xc003f8bfd0 gate 1563590388582493300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [cauthdsl] func2 -> DEBU b95 0xc003f8bfd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [cauthdsl] func2 -> DEBU b96 0xc003f8bfd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.583 UTC [cauthdsl] func2 -> DEBU b97 0xc003f8bfd0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.583 UTC [msp.identity] Verify -> DEBU b98 Verify: digest = 00000000 d6 2f 09 2d ad 6d 35 46 ef 78 7f 01 4b 0a 64 8f |./.-.m5F.x..K.d.| -peer0.org1.example.com | 00000010 9f f9 82 5c 30 f3 ec 10 d1 1f ff e0 65 33 67 99 |...\0.......e3g.|" -peer0.org1.example.com | "2019-07-20 02:39:48.583 UTC [msp.identity] Verify -> DEBU b99 Verify: sig = 00000000 30 43 02 20 70 69 80 5a d5 34 0d b5 26 14 03 10 |0C. pi.Z.4..&...| -peer0.org1.example.com | 00000010 fb 41 16 50 4f 1f b4 ef 20 e7 09 ec c4 47 0a d2 |.A.PO... ....G..| -peer0.org1.example.com | 00000020 25 f4 2f b3 02 1f 78 22 08 c9 cf fd 7b 28 d6 20 |%./...x"....{(. | -peer0.org1.example.com | 00000030 c6 5b 85 e1 a8 08 52 47 d6 21 31 13 1e e1 e1 8e |.[....RG.!1.....| -peer0.org1.example.com | 00000040 32 48 30 50 b8 |2H0P.|" -peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [cauthdsl] func2 -> DEBU b9a 0xc003f8bfd0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [cauthdsl] func1 -> DEBU b9b 0xc003f8bfd0 gate 1563590388582493300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.585 UTC [gossip.discovery] handleAliveMessage -> DEBU ba0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.585 UTC [gossip.discovery] learnExistingMembers -> DEBU ba1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba2 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba3 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba5 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [gossip.discovery] handleAliveMessage -> DEBU ba6 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU ba7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [gossip.discovery] sendMemResponse -> DEBU ba8 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU ba9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU baa Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU bab Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.588 UTC [gossip.comm] Send -> DEBU bac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:48.589 UTC [gossip.comm] sendToEndpoint -> DEBU bad Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.589 UTC [gossip.comm] sendToEndpoint -> DEBU bae Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.589 UTC [gossip.discovery] sendMemResponse -> DEBU baf Exiting, replying with alive: alive:%\240\0010\205)\3759\205\352T\016\254|\275]B\327\340\271\372\220\325\371" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" > alive: " -peer0.org1.example.com | "2019-07-20 02:39:48.752 UTC [msp] DeserializeIdentity -> DEBU bb0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.752 UTC [msp] DeserializeIdentity -> DEBU bb1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.753 UTC [gossip.comm] Send -> DEBU bb2 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:39:48.753 UTC [gossip.comm] sendToEndpoint -> DEBU bb3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.753 UTC [gossip.comm] sendToEndpoint -> DEBU bb4 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.754 UTC [gossip.comm] sendToEndpoint -> DEBU bb5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.754 UTC [gossip.comm] sendToEndpoint -> DEBU bb6 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.755 UTC [gossip.comm] sendToEndpoint -> DEBU bb7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.755 UTC [gossip.comm] sendToEndpoint -> DEBU bb8 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.755 UTC [msp] DeserializeIdentity -> DEBU bb9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.755 UTC [msp] DeserializeIdentity -> DEBU bba Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.756 UTC [gossip.pull] Hello -> DEBU bbb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:48.757 UTC [gossip.comm] Send -> DEBU bbc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:48.757 UTC [gossip.comm] Send -> DEBU bbd Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:39:48.757 UTC [msp] DeserializeIdentity -> DEBU bbe Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.757 UTC [msp] DeserializeIdentity -> DEBU bbf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.758 UTC [gossip.comm] sendToEndpoint -> DEBU bc0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.758 UTC [gossip.comm] sendToEndpoint -> DEBU bc2 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.758 UTC [gossip.comm] func1 -> DEBU bc1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.763 UTC [gossip.comm] func1 -> DEBU bc4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.757 UTC [gossip.comm] sendToEndpoint -> DEBU bc5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.763 UTC [gossip.comm] sendToEndpoint -> DEBU bc6 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.766 UTC [gossip.gossip] handleMessage -> DEBU bc7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bc8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bc9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bca Obtaining identity" -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp.identity] newIdentity -> DEBU a94 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a95 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp] Validate -> DEBU a96 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp] getCertificationChain -> DEBU a97 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp] hasOURole -> DEBU a98 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp] getCertificationChain -> DEBU a99 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] NewStandardValues -> DEBU a9a Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9b Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] NewStandardValues -> DEBU a9c Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9d Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] Validate -> DEBU a9e Anchor peers for org Org2MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] validateMSP -> DEBU a9f Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.406 UTC [msp] newBccspMsp -> DEBU aa0 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.406 UTC [msp] New -> DEBU aa1 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.407 UTC [msp] Setup -> DEBU aa2 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.407 UTC [msp.identity] newIdentity -> DEBU aa3 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:48.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bcb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -orderer0.example.com | "2019-07-20 02:39:45.408 UTC [msp.identity] newIdentity -> DEBU aa4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.409 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU aa5 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.409 UTC [msp] Validate -> DEBU aa6 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:45.410 UTC [msp] getCertificationChain -> DEBU aa7 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.410 UTC [msp] hasOURole -> DEBU aa8 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:45.410 UTC [msp] getCertificationChain -> DEBU aa9 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.411 UTC [common.channelconfig] NewStandardValues -> DEBU aaa Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:45.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU aab Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aac Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aad Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aae Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aaf Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab0 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] NewStandardValues -> DEBU ab1 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab2 Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] NewStandardValues -> DEBU ab3 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab4 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] validateMSP -> DEBU ab5 Setting up MSP for org OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:39:48.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bce Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bcf Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.778 UTC [cauthdsl] func1 -> DEBU bd3 0xc003c5c4e0 gate 1563590388778029000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd4 0xc003c5c4e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd5 0xc003c5c4e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd6 0xc003c5c4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd7 0xc003c5c4e0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.779 UTC [cauthdsl] func1 -> DEBU bd8 0xc003c5c4e0 gate 1563590388778029000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bd9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.779 UTC [cauthdsl] func1 -> DEBU bdc 0xc003c5cd30 gate 1563590388779866400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bdd 0xc003c5cd30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bde 0xc003c5cd30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bdf 0xc003c5cd30 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.780 UTC [msp.identity] Verify -> DEBU be0 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:39:48.781 UTC [msp.identity] Verify -> DEBU be1 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:39:48.781 UTC [cauthdsl] func2 -> DEBU be2 0xc003c5cd30 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.782 UTC [cauthdsl] func1 -> DEBU be3 0xc003c5cd30 gate 1563590388779866400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:48.782 UTC [policies] Evaluate -> DEBU be4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.782 UTC [policies] Evaluate -> DEBU be5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.783 UTC [policies] Evaluate -> DEBU be6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.783 UTC [policies] Evaluate -> DEBU be7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.769 UTC [gossip.comm] sendToEndpoint -> DEBU bcc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.783 UTC [msp] DeserializeIdentity -> DEBU be8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.783 UTC [gossip.comm] sendToEndpoint -> DEBU be9 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bea Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU beb Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [cauthdsl] func1 -> DEBU bef 0xc00369e5e0 gate 1563590388784488600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.762 UTC [gossip.comm] sendToEndpoint -> DEBU bc3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [gossip.comm] sendToEndpoint -> DEBU bf1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.769 UTC [gossip.comm] func1 -> DEBU bcd Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [cauthdsl] func2 -> DEBU bf0 0xc00369e5e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [gossip.comm] func1 -> DEBU bf2 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf3 0xc00369e5e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf4 0xc00369e5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf5 0xc00369e5e0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [cauthdsl] func1 -> DEBU bf6 0xc00369e5e0 gate 1563590388784488600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:39:45.413 UTC [msp] newBccspMsp -> DEBU ab6 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.414 UTC [msp] New -> DEBU ab7 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.414 UTC [msp] Setup -> DEBU ab8 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:45.415 UTC [msp.identity] newIdentity -> DEBU ab9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.415 UTC [msp.identity] newIdentity -> DEBU aba Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.416 UTC [msp] Validate -> DEBU abb MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:45.416 UTC [msp] Setup -> DEBU abc Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:45.416 UTC [msp] Setup -> DEBU abd MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:45.416 UTC [policies] NewManagerImpl -> DEBU abe Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU abf Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac0 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac1 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac2 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac3 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac4 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac5 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac6 Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac7 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac8 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac9 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU aca Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acb Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acc Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acd Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ace Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acf Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ad0 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ad1 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad2 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad3 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad4 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad5 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad6 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad7 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ad9 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ada Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU adb Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU adc Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU add Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ade Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU adf Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae0 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae9 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aea Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aeb Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aec Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aed Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aee Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU af0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU af1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af3 Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af5 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af7 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af9 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afa Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afb Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afc Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afd Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU afe Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU aff Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b00 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b01 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b02 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.channelconfig] LogSanityChecks -> DEBU b03 As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-07-20 02:39:45.428 UTC [common.channelconfig] LogSanityChecks -> DEBU b04 As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b05 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b06 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b07 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b08 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:48.787 UTC [cauthdsl] func1 -> DEBU bfa 0xc003424290 gate 1563590388787778800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfb 0xc003424290 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfc 0xc003424290 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [gossip.comm] func1 -> DEBU bfd Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfe 0xc003424290 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.789 UTC [msp.identity] Verify -> DEBU bff Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:39:48.789 UTC [msp.identity] Verify -> DEBU c00 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:39:48.789 UTC [cauthdsl] func2 -> DEBU c01 0xc003424290 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.790 UTC [cauthdsl] func1 -> DEBU c02 0xc003424290 gate 1563590388787778800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c03 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c05 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c06 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.791 UTC [gossip.gossip] handleMessage -> DEBU c07 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.791 UTC [gossip.gossip] handleMessage -> DEBU c08 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.791 UTC [msp] DeserializeIdentity -> DEBU c09 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.791 UTC [msp] DeserializeIdentity -> DEBU c0a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.792 UTC [msp] DeserializeIdentity -> DEBU c0b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:48.793 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.793 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.793 UTC [policies] Evaluate -> DEBU c0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.794 UTC [policies] Evaluate -> DEBU c10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:48.794 UTC [policies] Evaluate -> DEBU c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.794 UTC [cauthdsl] func1 -> DEBU c12 0xc002f881c0 gate 1563590388794622500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.794 UTC [cauthdsl] func2 -> DEBU c13 0xc002f881c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.795 UTC [cauthdsl] func2 -> DEBU c14 0xc002f881c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.795 UTC [cauthdsl] func2 -> DEBU c15 0xc002f881c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:48.798 UTC [cauthdsl] func2 -> DEBU c16 0xc002f881c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.798 UTC [cauthdsl] func1 -> DEBU c17 0xc002f881c0 gate 1563590388794622500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.798 UTC [policies] Evaluate -> DEBU c18 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.799 UTC [policies] Evaluate -> DEBU c19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.799 UTC [policies] Evaluate -> DEBU c1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.800 UTC [cauthdsl] func1 -> DEBU c1b 0xc002f88a00 gate 1563590388800124500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1c 0xc002f88a00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1d 0xc002f88a00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1e 0xc002f88a00 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.801 UTC [msp.identity] Verify -> DEBU c1f Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:39:48.801 UTC [msp.identity] Verify -> DEBU c20 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:39:48.801 UTC [cauthdsl] func2 -> DEBU c21 0xc002f88a00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.801 UTC [cauthdsl] func1 -> DEBU c22 0xc002f88a00 gate 1563590388800124500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:48.801 UTC [policies] Evaluate -> DEBU c23 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c25 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c26 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [msp] DeserializeIdentity -> DEBU c27 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c28 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c29 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func1 -> DEBU c2d 0xc002f89af0 gate 1563590388803987600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c2e 0xc002f89af0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c2f 0xc002f89af0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c30 0xc002f89af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c31 0xc002f89af0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func1 -> DEBU c32 0xc002f89af0 gate 1563590388803987600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c33 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.805 UTC [cauthdsl] func1 -> DEBU c36 0xc0003dc380 gate 1563590388805933700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c37 0xc0003dc380 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c38 0xc0003dc380 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c39 0xc0003dc380 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.806 UTC [msp.identity] Verify -> DEBU c3a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:39:48.807 UTC [msp.identity] Verify -> DEBU c3b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:39:48.807 UTC [cauthdsl] func2 -> DEBU c3c 0xc0003dc380 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.807 UTC [cauthdsl] func1 -> DEBU c3d 0xc0003dc380 gate 1563590388805933700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:48.807 UTC [policies] Evaluate -> DEBU c3e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c40 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c41 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.808 UTC [gossip.gossip] handleMessage -> DEBU c42 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.808 UTC [gossip.gossip] handleMessage -> DEBU c43 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c44 Verify: digest = 00000000 32 33 fc e6 d3 c3 38 f4 ff ec d9 4a ea 4e 2c 6b |23....8....J.N,k| -peer0.org1.example.com | 00000010 c8 49 ed 2f c8 e7 a4 4a d2 09 e1 ac 5f 95 4a ee |.I./...J...._.J.|" -peer0.org1.example.com | "2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c45 Verify: sig = 00000000 30 44 02 20 1b b4 6d f6 ae 3b cb 37 54 49 5d 88 |0D. ..m..;.7TI].| -peer0.org1.example.com | 00000010 af a0 31 de 23 33 f2 1a 6c d6 b6 5e 78 83 08 ab |..1.#3..l..^x...| -peer0.org1.example.com | 00000020 5f e7 5f df 02 20 4a 91 80 93 fc d7 53 30 81 9c |_._.. J.....S0..| -peer0.org1.example.com | 00000030 0d 16 cc 7c ca c1 59 77 c6 ea 43 74 84 8a ad 37 |...|..Yw..Ct...7| -peer0.org1.example.com | 00000040 36 d7 1f 14 5c d8 |6...\.|" -peer0.org1.example.com | "2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c46 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:39:48.810 UTC [msp.identity] Verify -> DEBU c47 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -orderer0.example.com | "2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b09 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.429 UTC [policies] Manager -> DEBU b0a Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0b As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0c As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0d As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-07-20 02:39:45.429 UTC [policies] Manager -> DEBU b0e Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-07-20 02:39:45.430 UTC [policies] Manager -> DEBU b0f Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:45.430 UTC [policies] Manager -> DEBU b10 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:45.431 UTC [policies] Manager -> DEBU b11 Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-07-20 02:39:45.431 UTC [policies] Manager -> DEBU b12 Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b13 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b14 As expected, current configuration has policy '/Channel/Orderer/Admins'" -orderer0.example.com | "2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b15 As expected, current configuration has policy '/Channel/Orderer/Writers'" -orderer0.example.com | "2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b16 As expected, current configuration has policy '/Channel/Orderer/Readers'" -orderer0.example.com | "2019-07-20 02:39:45.432 UTC [common.capabilities] Supported -> DEBU b17 Orderer capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:45.432 UTC [common.capabilities] Supported -> DEBU b18 Channel capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:45.432 UTC [msp] GetDefaultSigningIdentity -> DEBU b19 Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:45.432 UTC [msp] GetDefaultSigningIdentity -> DEBU b1a Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:45.433 UTC [msp.identity] Sign -> DEBU b1b Sign: plaintext: 0AD2060A1B08011A0608F1FDC9E90522...7868996B5936EC065C861F9516084148 " -orderer0.example.com | "2019-07-20 02:39:45.433 UTC [msp.identity] Sign -> DEBU b1c Sign: digest: 9F6D0925EE9C0929724A0054A3E76FD29F7437D20D76847EDFA00754ACB3E3A9 " -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:39:48.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c48 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c49 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:48.811 UTC [policies] Evaluate -> DEBU c4a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.812 UTC [policies] Evaluate -> DEBU c4b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:48.813 UTC [policies] Evaluate -> DEBU c4c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:48.813 UTC [msp] DeserializeIdentity -> DEBU c4d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.814 UTC [msp.identity] newIdentity -> DEBU c4e Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:48.815 UTC [cauthdsl] func1 -> DEBU c4f 0xc0002ec510 gate 1563590388815103800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:48.815 UTC [cauthdsl] func2 -> DEBU c50 0xc0002ec510 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:48.816 UTC [cauthdsl] func2 -> DEBU c51 0xc0002ec510 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:48.816 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c52 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:48.817 UTC [msp] Validate -> DEBU c53 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:48.818 UTC [msp] getCertificationChain -> DEBU c54 MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:48.819 UTC [cauthdsl] func2 -> DEBU c55 0xc0002ec510 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.820 UTC [msp.identity] Verify -> DEBU c56 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:39:48.820 UTC [msp.identity] Verify -> DEBU c57 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:39:48.821 UTC [cauthdsl] func2 -> DEBU c58 0xc0002ec510 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:48.822 UTC [cauthdsl] func1 -> DEBU c59 0xc0002ec510 gate 1563590388815103800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:48.823 UTC [policies] Evaluate -> DEBU c5a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.823 UTC [policies] Evaluate -> DEBU c5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.824 UTC [policies] Evaluate -> DEBU c5c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.825 UTC [policies] Evaluate -> DEBU c5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:48.825 UTC [gossip.gossip] handleMessage -> DEBU c5e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.826 UTC [gossip.gossip] handleMessage -> DEBU c5f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.826 UTC [gossip.pull] HandleMessage -> DEBU c60 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.826 UTC [gossip.gossip] handleMessage -> DEBU c61 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.827 UTC [gossip.gossip] handleMessage -> DEBU c62 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.827 UTC [msp.identity] Verify -> DEBU c63 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:39:48.827 UTC [msp.identity] Verify -> DEBU c64 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:39:48.828 UTC [msp] DeserializeIdentity -> DEBU c65 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.828 UTC [gossip.gossip] handleMessage -> DEBU c66 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.912 UTC [gossip.comm] func1 -> DEBU c67 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.913 UTC [gossip.gossip] handleMessage -> DEBU c68 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.915 UTC [msp] DeserializeIdentity -> DEBU c69 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.915 UTC [msp] DeserializeIdentity -> DEBU c6a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.916 UTC [gossip.gossip] handleMessage -> DEBU c6b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.927 UTC [gossip.comm] func1 -> DEBU c6c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.928 UTC [gossip.gossip] handleMessage -> DEBU c6d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.928 UTC [gossip.pull] HandleMessage -> DEBU c6e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.929 UTC [gossip.pull] SendDigest -> DEBU c70 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:39:48.929 UTC [gossip.gossip] handleMessage -> DEBU c71 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.929 UTC [gossip.comm] func1 -> DEBU c6f Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.929 UTC [gossip.gossip] handleMessage -> DEBU c72 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.930 UTC [msp.identity] Verify -> DEBU c73 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:39:48.930 UTC [msp.identity] Verify -> DEBU c74 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:39:48.930 UTC [gossip.gossip] handleMessage -> DEBU c75 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:48.937 UTC [gossip.comm] func1 -> DEBU c76 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.937 UTC [gossip.gossip] handleMessage -> DEBU c77 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:48.938 UTC [msp.identity] Verify -> DEBU c78 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:39:48.938 UTC [msp.identity] Verify -> DEBU c79 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:39:48.939 UTC [msp] DeserializeIdentity -> DEBU c7a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:48.939 UTC [gossip.gossip] handleMessage -> DEBU c7b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:49.077 UTC [gossip.comm] func1 -> DEBU c7c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.077 UTC [gossip.gossip] handleMessage -> DEBU c7d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.077 UTC [msp] DeserializeIdentity -> DEBU c7e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.077 UTC [msp] DeserializeIdentity -> DEBU c7f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.078 UTC [msp] DeserializeIdentity -> DEBU c80 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.078 UTC [gossip.gossip] handleMessage -> DEBU c81 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:49.082 UTC [gossip.comm] func1 -> DEBU c82 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.083 UTC [gossip.gossip] handleMessage -> DEBU c83 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.083 UTC [msp] DeserializeIdentity -> DEBU c84 Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:45.433 UTC [policies] Evaluate -> DEBU b1d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-07-20 02:39:45.433 UTC [policies] Evaluate -> DEBU b1e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-07-20 02:39:45.434 UTC [msp] DeserializeIdentity -> DEBU b22 Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:45.434 UTC [msp.identity] newIdentity -> DEBU b23 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -orderer0.example.com | QQ== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.435 UTC [cauthdsl] func1 -> DEBU b24 0xc001032ed0 gate 1563590385435836700 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b25 0xc001032ed0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b26 0xc001032ed0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b27 0xc001032ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b28 0xc001032ed0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:45.436 UTC [cauthdsl] func1 -> DEBU b29 0xc001032ed0 gate 1563590385435836700 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func1 -> DEBU b2d 0xc00105c010 gate 1563590385437043000 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b2e 0xc00105c010 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b2f 0xc00105c010 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b30 0xc00105c010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b31 0xc00105c010 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func1 -> DEBU b32 0xc00105c010 gate 1563590385437043000 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:45.437 UTC [policies] Evaluate -> DEBU b33 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.437 UTC [policies] Evaluate -> DEBU b34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.437 UTC [policies] func1 -> DEBU b35 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" -orderer0.example.com | "2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b36 Signature set did not satisfy policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b3a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-07-20 02:39:45.438 UTC [cauthdsl] func1 -> DEBU b3b 0xc00105cd20 gate 1563590385438562200 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:45.438 UTC [cauthdsl] func2 -> DEBU b3c 0xc00105cd20 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:45.439 UTC [cauthdsl] func2 -> DEBU b3d 0xc00105cd20 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:45.439 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b3e Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:45.439 UTC [msp] Validate -> DEBU b3f MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:45.439 UTC [cauthdsl] func2 -> DEBU b40 0xc00105cd20 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:45.439 UTC [msp.identity] Verify -> DEBU b41 Verify: digest = 00000000 9f 6d 09 25 ee 9c 09 29 72 4a 00 54 a3 e7 6f d2 |.m.%...)rJ.T..o.| -orderer0.example.com | 00000010 9f 74 37 d2 0d 76 84 7e df a0 07 54 ac b3 e3 a9 |.t7..v.~...T....|" -orderer0.example.com | "2019-07-20 02:39:45.439 UTC [msp.identity] Verify -> DEBU b42 Verify: sig = 00000000 30 44 02 20 43 91 94 43 2a 23 d1 f0 c2 88 cb 7d |0D. C..C*#.....}| -orderer0.example.com | 00000010 79 5b 76 27 65 24 8c 15 89 2e 1f 51 c1 4e e9 6a |y[v'e$.....Q.N.j| -orderer0.example.com | 00000020 ba 07 4f ab 02 20 44 33 10 d9 f7 5c e3 28 87 66 |..O.. D3...\.(.f| -orderer0.example.com | 00000030 42 a7 ee f2 26 00 13 eb e7 18 7d a2 30 c1 25 a0 |B...&.....}.0.%.| -orderer0.example.com | 00000040 cb 1b 9e a8 cb 43 |.....C|" -orderer0.example.com | "2019-07-20 02:39:45.440 UTC [cauthdsl] func2 -> DEBU b43 0xc00105cd20 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:45.440 UTC [cauthdsl] func1 -> DEBU b44 0xc00105cd20 gate 1563590385438562200 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b45 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b46 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b47 Signature set satisfies policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b49 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:45.441 UTC [policies] Evaluate -> DEBU b4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c86 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c87 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.085 UTC [cauthdsl] func1 -> DEBU c8b 0xc0002d7a20 gate 1563590389084995900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8c 0xc0002d7a20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8d 0xc0002d7a20 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8e 0xc0002d7a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:49.086 UTC [cauthdsl] func2 -> DEBU c8f 0xc0002d7a20 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:49.086 UTC [cauthdsl] func1 -> DEBU c90 0xc0002d7a20 gate 1563590389084995900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:49.086 UTC [policies] Evaluate -> DEBU c91 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.087 UTC [policies] Evaluate -> DEBU c92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.087 UTC [policies] Evaluate -> DEBU c93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.087 UTC [cauthdsl] func1 -> DEBU c94 0xc00027a260 gate 1563590389087922900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c95 0xc00027a260 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c96 0xc00027a260 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c97 0xc00027a260 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:49.088 UTC [msp.identity] Verify -> DEBU c98 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:39:49.088 UTC [msp.identity] Verify -> DEBU c99 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [cauthdsl] func2 -> DEBU c9a 0xc00027a260 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [cauthdsl] func1 -> DEBU c9b 0xc00027a260 gate 1563590389087922900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.090 UTC [msp] DeserializeIdentity -> DEBU ca0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.090 UTC [gossip.gossip] handleMessage -> DEBU ca1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:49.093 UTC [gossip.comm] func1 -> DEBU ca2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.093 UTC [gossip.gossip] handleMessage -> DEBU ca3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.093 UTC [msp] DeserializeIdentity -> DEBU ca4 Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:45.441 UTC [orderer.common.msgprocessor] Apply -> DEBU b4b Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel -orderer0.example.com | "2019-07-20 02:39:45.441 UTC [common.channelconfig] NewStandardValues -> DEBU b4c Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:45.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4d Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:45.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4e Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4f Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b50 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b51 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] NewStandardValues -> DEBU b52 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b53 Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b54 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] NewStandardValues -> DEBU b55 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] initializeProtosStruct -> DEBU b56 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] NewStandardValues -> DEBU b57 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] initializeProtosStruct -> DEBU b58 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] Validate -> DEBU b59 Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] validateMSP -> DEBU b5a Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.443 UTC [msp] newBccspMsp -> DEBU b5b Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.443 UTC [msp] New -> DEBU b5c Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.443 UTC [msp] Setup -> DEBU b5d Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.443 UTC [msp.identity] newIdentity -> DEBU b5e Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.444 UTC [msp.identity] newIdentity -> DEBU b5f Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.444 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b60 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.445 UTC [msp] Validate -> DEBU b61 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:45.445 UTC [msp] getCertificationChain -> DEBU b62 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.446 UTC [msp] hasOURole -> DEBU b63 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:45.446 UTC [msp] getCertificationChain -> DEBU b64 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.446 UTC [common.channelconfig] NewStandardValues -> DEBU b65 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:45.446 UTC [common.channelconfig] initializeProtosStruct -> DEBU b66 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.446 UTC [common.channelconfig] NewStandardValues -> DEBU b67 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:45.446 UTC [common.channelconfig] initializeProtosStruct -> DEBU b68 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:45.447 UTC [common.channelconfig] Validate -> DEBU b69 Anchor peers for org Org2MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:39:45.447 UTC [common.channelconfig] validateMSP -> DEBU b6a Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.447 UTC [msp] newBccspMsp -> DEBU b6b Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.447 UTC [msp] New -> DEBU b6c Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.447 UTC [msp] Setup -> DEBU b6d Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.447 UTC [msp.identity] newIdentity -> DEBU b6e Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.448 UTC [msp.identity] newIdentity -> DEBU b6f Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | "2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ca5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ca6 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ca7 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:49.094 UTC [policies] Evaluate -> DEBU ca8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [policies] Evaluate -> DEBU ca9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [policies] Evaluate -> DEBU caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [cauthdsl] func1 -> DEBU cab 0xc00027bda0 gate 1563590389095398000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cac 0xc00027bda0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cad 0xc00027bda0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cae 0xc00027bda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:49.096 UTC [cauthdsl] func2 -> DEBU caf 0xc00027bda0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:49.096 UTC [cauthdsl] func1 -> DEBU cb0 0xc00027bda0 gate 1563590389095398000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:49.096 UTC [policies] Evaluate -> DEBU cb1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.096 UTC [policies] Evaluate -> DEBU cb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.097 UTC [policies] Evaluate -> DEBU cb3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.097 UTC [cauthdsl] func1 -> DEBU cb4 0xc0002665e0 gate 1563590389097311700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb5 0xc0002665e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb6 0xc0002665e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb7 0xc0002665e0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:49.098 UTC [msp.identity] Verify -> DEBU cb8 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:39:49.098 UTC [msp.identity] Verify -> DEBU cb9 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:39:49.098 UTC [cauthdsl] func2 -> DEBU cba 0xc0002665e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:49.099 UTC [cauthdsl] func1 -> DEBU cbb 0xc0002665e0 gate 1563590389097311700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbe Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.100 UTC [policies] Evaluate -> DEBU cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.100 UTC [msp] DeserializeIdentity -> DEBU cc0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.100 UTC [gossip.gossip] handleMessage -> DEBU cc1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:49.225 UTC [gossip.comm] func1 -> DEBU cc2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.225 UTC [gossip.gossip] handleMessage -> DEBU cc3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.227 UTC [gossip.gossip] handleMessage -> DEBU cc7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:49.230 UTC [gossip.comm] func1 -> DEBU cc8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.448 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b70 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.448 UTC [msp] Validate -> DEBU b71 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:45.448 UTC [msp] getCertificationChain -> DEBU b72 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [msp] hasOURole -> DEBU b73 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [msp] getCertificationChain -> DEBU b74 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b75 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b76 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b77 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b78 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b79 Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7a Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7b Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b7c Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7d Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b7e Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7f Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:45.450 UTC [common.channelconfig] validateMSP -> DEBU b80 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.450 UTC [msp] newBccspMsp -> DEBU b81 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.450 UTC [msp] New -> DEBU b82 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.450 UTC [msp] Setup -> DEBU b83 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:45.450 UTC [msp.identity] newIdentity -> DEBU b84 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.450 UTC [msp.identity] newIdentity -> DEBU b85 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.451 UTC [msp] Validate -> DEBU b86 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:45.451 UTC [msp] Setup -> DEBU b87 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:45.451 UTC [msp] Setup -> DEBU b88 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:45.451 UTC [policies] NewManagerImpl -> DEBU b89 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.451 UTC [policies] NewManagerImpl -> DEBU b8a Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8b Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8c Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8d Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8e Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8f Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b90 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b91 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b92 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b93 Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b94 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b95 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b96 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b97 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b98 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b99 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9a Proposed new policy BlockValidation for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:39:49.230 UTC [gossip.gossip] handleMessage -> DEBU cc9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.231 UTC [msp] DeserializeIdentity -> DEBU cca Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ccb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ccc Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ccd Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:49.231 UTC [policies] Evaluate -> DEBU cce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [policies] Evaluate -> DEBU ccf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [policies] Evaluate -> DEBU cd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [cauthdsl] func1 -> DEBU cd1 0xc000262860 gate 1563590389232465300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd2 0xc000262860 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd3 0xc000262860 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd4 0xc000262860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:49.233 UTC [cauthdsl] func2 -> DEBU cd5 0xc000262860 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:49.233 UTC [cauthdsl] func1 -> DEBU cd6 0xc000262860 gate 1563590389232465300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:49.233 UTC [policies] Evaluate -> DEBU cd7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.233 UTC [policies] Evaluate -> DEBU cd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [policies] Evaluate -> DEBU cd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [cauthdsl] func1 -> DEBU cda 0xc0002630a0 gate 1563590389234175000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdb 0xc0002630a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdc 0xc0002630a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdd 0xc0002630a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [msp.identity] Verify -> DEBU cde Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:39:49.235 UTC [msp.identity] Verify -> DEBU cdf Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:39:49.235 UTC [cauthdsl] func2 -> DEBU ce0 0xc0002630a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:49.235 UTC [cauthdsl] func1 -> DEBU ce1 0xc0002630a0 gate 1563590389234175000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:49.236 UTC [policies] Evaluate -> DEBU ce2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.236 UTC [policies] Evaluate -> DEBU ce3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.237 UTC [policies] Evaluate -> DEBU ce4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.238 UTC [policies] Evaluate -> DEBU ce5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.239 UTC [msp] DeserializeIdentity -> DEBU ce6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.239 UTC [gossip.gossip] handleMessage -> DEBU ce7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:49.273 UTC [gossip.pull] SendReq -> DEBU ce8 Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:49.274 UTC [gossip.comm] Send -> DEBU ce9 Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:49.275 UTC [gossip.pull] SendReq -> DEBU cea Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9b Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9c Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9d Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9e Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9f Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba0 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba1 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba2 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba3 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba4 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU baa Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bad Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bae Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU baf Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb0 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb1 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb2 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb3 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb4 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb5 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb6 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb7 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bba Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbd Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbe Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbf Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc0 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc1 Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc2 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc4 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc5 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc6 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc7 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc8 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bca Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcb Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcc Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcd Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] propose -> INFO bce Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [orderer.common.broadcast] ProcessMessage -> DEBU bcf [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39072" -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] serveRequest -> INFO bd0 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] 2 -> DEBU bd1 Proposed block [2] to raft consensus" channel=businesschannel node=1 -peer0.org1.example.com | "2019-07-20 02:39:49.275 UTC [gossip.comm] Send -> DEBU cec Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:49.275 UTC [gossip.comm] sendToEndpoint -> DEBU ceb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.276 UTC [gossip.comm] sendToEndpoint -> DEBU ced Exiting" -peer0.org1.example.com | "2019-07-20 02:39:49.276 UTC [gossip.comm] sendToEndpoint -> DEBU cee Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.278 UTC [gossip.comm] sendToEndpoint -> DEBU cef Exiting" -peer0.org1.example.com | "2019-07-20 02:39:49.281 UTC [gossip.comm] func1 -> DEBU cf0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.281 UTC [gossip.gossip] handleMessage -> DEBU cf1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.281 UTC [msp] DeserializeIdentity -> DEBU cf2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.281 UTC [gossip.comm] func1 -> DEBU cf3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.281 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cf4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:49.282 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:49.282 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:49.283 UTC [policies] Evaluate -> DEBU cf7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.284 UTC [policies] Evaluate -> DEBU cf8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:49.284 UTC [policies] Evaluate -> DEBU cf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.286 UTC [cauthdsl] func1 -> DEBU cfa 0xc000228180 gate 1563590389286449300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:49.287 UTC [cauthdsl] func2 -> DEBU cfb 0xc000228180 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:49.287 UTC [cauthdsl] func2 -> DEBU cfc 0xc000228180 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:49.288 UTC [cauthdsl] func2 -> DEBU cfd 0xc000228180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:49.288 UTC [cauthdsl] func2 -> DEBU cfe 0xc000228180 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:49.288 UTC [cauthdsl] func1 -> DEBU cff 0xc000228180 gate 1563590389286449300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.290 UTC [cauthdsl] func1 -> DEBU d03 0xc00020cb70 gate 1563590389290395000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:49.290 UTC [cauthdsl] func2 -> DEBU d04 0xc00020cb70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:49.291 UTC [cauthdsl] func2 -> DEBU d05 0xc00020cb70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:49.292 UTC [cauthdsl] func2 -> DEBU d06 0xc00020cb70 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:49.292 UTC [msp.identity] Verify -> DEBU d07 Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| -peer0.org1.example.com | 00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|" -peer0.org1.example.com | "2019-07-20 02:39:49.293 UTC [msp.identity] Verify -> DEBU d08 Verify: sig = 00000000 30 44 02 20 16 11 2c 76 34 0b 04 99 7d e7 f0 df |0D. ..,v4...}...| -peer0.org1.example.com | 00000010 43 2d 8c 9d e2 09 62 f0 49 8e 3a a0 26 d1 c8 e6 |C-....b.I.:.&...| -peer0.org1.example.com | 00000020 7d 07 c6 57 02 20 66 02 4d 17 39 5f d4 bd 22 ef |}..W. f.M.9_..".| -peer0.org1.example.com | 00000030 56 e0 3b 54 38 80 01 ed 3f a5 90 22 06 14 80 77 |V.;T8...?.."...w| -peer0.org1.example.com | 00000040 bf ae d3 ef 0c ad |......|" -peer0.org1.example.com | "2019-07-20 02:39:49.294 UTC [cauthdsl] func2 -> DEBU d09 0xc00020cb70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:49.295 UTC [cauthdsl] func1 -> DEBU d0a 0xc00020cb70 gate 1563590389290395000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:49.296 UTC [policies] Evaluate -> DEBU d0b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.296 UTC [policies] Evaluate -> DEBU d0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.297 UTC [policies] Evaluate -> DEBU d0d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.297 UTC [policies] Evaluate -> DEBU d0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.298 UTC [msp] DeserializeIdentity -> DEBU d0f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.299 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d10 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:49.300 UTC [gossip.pull] HandleMessage -> DEBU d11 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.301 UTC [msp] DeserializeIdentity -> DEBU d12 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d13 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:49.305 UTC [msp] DeserializeIdentity -> DEBU d14 Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:45.463 UTC [common.deliver] Handle -> WARN bd2 Error reading from 172.18.0.9:39070: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:39:45.463 UTC [orderer.common.server] func1 -> DEBU bd3 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:39:45.463 UTC [comm.grpc.server] 1 -> INFO bd4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39070 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=99.9045ms -orderer0.example.com | "2019-07-20 02:39:45.464 UTC [grpc] infof -> DEBU bd5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.common.broadcast] Handle -> WARN bd6 Error reading from 172.18.0.9:39072: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.common.server] func1 -> DEBU bd7 Closing Broadcast stream" -orderer0.example.com | "2019-07-20 02:39:45.464 UTC [comm.grpc.server] 1 -> INFO bd8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39072 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=83.1023ms -orderer0.example.com | "2019-07-20 02:39:45.464 UTC [grpc] infof -> DEBU bd9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bda Sending msg of 22872 bytes to 2 on channel businesschannel took 19.8µs" -orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bdb Sending msg of 22872 bytes to 3 on channel businesschannel took 14µs" -orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU bdc Send of ConsensusRequest for channel businesschannel with payload of size 22872 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " -orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU bdd Send of ConsensusRequest for channel businesschannel with payload of size 22872 to orderer1.example.com(orderer1.example.com:7050) took 94.8µs " -orderer0.example.com | "2019-07-20 02:39:45.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU bde Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bdf Sending msg of 28 bytes to 2 on channel businesschannel took 9.1µs" -orderer0.example.com | "2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be0 Sending msg of 28 bytes to 3 on channel businesschannel took 48.5µs" -orderer0.example.com | "2019-07-20 02:39:45.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU be1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " -orderer0.example.com | "2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] writeBlock -> INFO be2 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:39:45.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU be3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be4 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be5 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be6 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bea Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU beb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bec Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bed Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bee Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bef Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [common.configtx] verifyDeltaSet -> DEBU bf5 Processing change to key: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [common.configtx] policyForItem -> DEBU bf6 Getting policy for item Org2MSP with mod_policy Admins" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf7 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf8 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf9 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfa Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfb Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfc Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfd Manager Channel/Application looking up path [Org2MSP]" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfe Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bff Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU c00 Manager Channel/Application/Org2MSP looking up path []" -orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Evaluate -> DEBU c01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func1 -> DEBU c02 0xc0011fb840 gate 1563590385474029500 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c03 0xc0011fb840 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c04 0xc0011fb840 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c05 0xc0011fb840 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:45.474 UTC [msp.identity] Verify -> DEBU c06 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| -orderer0.example.com | 00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" -orderer0.example.com | "2019-07-20 02:39:45.474 UTC [msp.identity] Verify -> DEBU c07 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| -orderer0.example.com | 00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| -orderer0.example.com | 00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| -orderer0.example.com | 00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| -orderer0.example.com | 00000040 e9 49 62 bf 87 8d |.Ib...|" -orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c08 0xc0011fb840 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func1 -> DEBU c09 0xc0011fb840 gate 1563590385474029500 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:45.474 UTC [policies] Evaluate -> DEBU c0a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.474 UTC [policies] Evaluate -> DEBU c0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.474 UTC [common.configtx] verifyDeltaSet -> DEBU c0c Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0d Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0e Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0f Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c10 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c11 Setting policy for key Readers to " -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c12 Setting policy for key Writers to " -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c13 Setting policy for key Admins to " -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c14 Setting policy for key Endorsement to " -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c15 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c16 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c17 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c18 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.476 UTC [orderer.common.cluster.step] sendMessage -> DEBU c19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.3075ms " -orderer0.example.com | "2019-07-20 02:39:45.476 UTC [common.configtx] recurseConfigMap -> DEBU c1a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.489 UTC [common.configtx] recurseConfigMap -> DEBU c1b Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.489 UTC [common.configtx] recurseConfigMap -> DEBU c1c Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.490 UTC [common.configtx] recurseConfigMap -> DEBU c1d Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.490 UTC [common.configtx] recurseConfigMap -> DEBU c1e Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.491 UTC [common.configtx] recurseConfigMap -> DEBU c1f Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.491 UTC [common.configtx] recurseConfigMap -> DEBU c20 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.492 UTC [common.configtx] recurseConfigMap -> DEBU c21 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c22 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c23 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:39:49.306 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:49.307 UTC [gossip.gossip] func2 -> DEBU d16 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -peer0.org1.example.com | "2019-07-20 02:39:49.307 UTC [gossip.pull] HandleMessage -> DEBU d17 Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 3" -peer0.org1.example.com | "2019-07-20 02:39:49.308 UTC [gossip.gossip] handleMessage -> DEBU d18 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:49.308 UTC [gossip.gossip] handleMessage -> DEBU d19 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.309 UTC [msp] DeserializeIdentity -> DEBU d1a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.309 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:49.310 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d1c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:49.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d1d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:49.311 UTC [policies] Evaluate -> DEBU d1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.312 UTC [policies] Evaluate -> DEBU d1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:49.313 UTC [policies] Evaluate -> DEBU d20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.313 UTC [cauthdsl] func1 -> DEBU d21 0xc00044e980 gate 1563590389313647700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d22 0xc00044e980 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d23 0xc00044e980 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d24 0xc00044e980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d25 0xc00044e980 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:49.319 UTC [cauthdsl] func1 -> DEBU d26 0xc00044e980 gate 1563590389313647700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:49.320 UTC [policies] Evaluate -> DEBU d27 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.321 UTC [policies] Evaluate -> DEBU d28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.321 UTC [policies] Evaluate -> DEBU d29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:49.322 UTC [cauthdsl] func1 -> DEBU d2a 0xc00044f240 gate 1563590389322117800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:49.322 UTC [cauthdsl] func2 -> DEBU d2b 0xc00044f240 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:49.323 UTC [cauthdsl] func2 -> DEBU d2c 0xc00044f240 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:49.323 UTC [cauthdsl] func2 -> DEBU d2d 0xc00044f240 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:49.324 UTC [msp.identity] Verify -> DEBU d2e Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| -peer0.org1.example.com | 00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|" -peer0.org1.example.com | "2019-07-20 02:39:49.324 UTC [msp.identity] Verify -> DEBU d2f Verify: sig = 00000000 30 45 02 21 00 b2 0f 25 2e 73 2c ce ca bb da 79 |0E.!...%.s,....y| -peer0.org1.example.com | 00000010 49 7b f3 40 32 fb 7b 7e 3c f4 d0 a5 9c 36 14 8a |I{.@2.{~<....6..| -peer0.org1.example.com | 00000020 ca b4 aa d9 f3 02 20 30 b1 bf 9c 24 a5 aa 46 47 |...... 0...$..FG| -peer0.org1.example.com | 00000030 51 70 36 5a 52 b5 25 aa bf 66 3b 36 1d 1e c6 3a |Qp6ZR.%..f;6...:| -peer0.org1.example.com | 00000040 fb ef cf 54 18 2b 4d |...T.+M|" -peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [cauthdsl] func2 -> DEBU d30 0xc00044f240 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [cauthdsl] func1 -> DEBU d31 0xc00044f240 gate 1563590389322117800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d34 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [msp] DeserializeIdentity -> DEBU d36 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [gossip.pull] HandleMessage -> DEBU d38 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [msp] DeserializeIdentity -> DEBU d39 Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c24 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:39:45.494 UTC [common.channelconfig] NewStandardValues -> DEBU c25 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:39:45.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU c26 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:45.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU c27 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c28 Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c29 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2a Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c2b Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2c Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2d Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c2e Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2f Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c30 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d3a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [msp] DeserializeIdentity -> DEBU d3b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d3c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [gossip.gossip] func2 -> DEBU d3d Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [gossip.pull] HandleMessage -> DEBU d3e Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 4" -peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [gossip.gossip] handleMessage -> DEBU d3f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:49.574 UTC [gossip.comm] func1 -> DEBU d40 Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.574 UTC [gossip.gossip] handleMessage -> DEBU d41 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.576 UTC [gossip.pull] HandleMessage -> DEBU d42 GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:49.576 UTC [msp] DeserializeIdentity -> DEBU d43 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:49.577 UTC [gossip.gossip] handleMessage -> DEBU d44 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:49.577 UTC [gossip.pull] SendRes -> DEBU d45 Sending 1 IDENTITY_MSG items to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:39:50.748 UTC [endorser] ProcessProposal -> DEBU d46 Entering: request from 172.18.0.9:58342" -peer0.org1.example.com | "2019-07-20 02:39:50.748 UTC [protoutils] ValidateProposalMessage -> DEBU d47 ValidateProposalMessage starts for signed proposal 0xc0002c0d70" -peer0.org1.example.com | "2019-07-20 02:39:50.749 UTC [protoutils] validateChannelHeader -> DEBU d48 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:39:50.749 UTC [protoutils] checkSignatureFromCreator -> DEBU d49 begin" -peer0.org1.example.com | "2019-07-20 02:39:50.749 UTC [msp] GetManagerForChain -> DEBU d4a Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:39:50.749 UTC [msp] DeserializeIdentity -> DEBU d4b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:50.750 UTC [msp.identity] newIdentity -> DEBU d4c Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:39:50.750 UTC [protoutils] checkSignatureFromCreator -> DEBU d4d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:39:50.750 UTC [msp] Validate -> DEBU d4e MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:50.751 UTC [msp] getCertificationChain -> DEBU d4f MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:39:50.751 UTC [protoutils] checkSignatureFromCreator -> DEBU d50 creator is valid" -peer0.org1.example.com | "2019-07-20 02:39:50.751 UTC [msp.identity] Verify -> DEBU d51 Verify: digest = 00000000 57 7b e2 3e 1d 82 63 42 fa 2c a7 c7 11 dc 39 b2 |W{.>..cB.,....9.| -peer0.org1.example.com | 00000010 dc ed 2f 91 c1 96 75 5b 2c df 5f 10 56 0c e2 b9 |../...u[,._.V...|" -peer0.org1.example.com | "2019-07-20 02:39:50.751 UTC [msp.identity] Verify -> DEBU d52 Verify: sig = 00000000 30 44 02 20 3d c4 f0 de 31 42 86 8f 63 d6 6b 17 |0D. =...1B..c.k.| -peer0.org1.example.com | 00000010 55 c7 bf 46 b6 de 95 5d 1c 12 50 5b 94 cc 44 30 |U..F...]..P[..D0| -peer0.org1.example.com | 00000020 07 64 ae 11 02 20 6c 41 8e 4d a8 49 18 f7 c3 86 |.d... lA.M.I....| -peer0.org1.example.com | 00000030 70 bd 27 76 81 8b cf e3 64 4b f0 b4 bd e3 fa d6 |p.'v....dK......| -peer0.org1.example.com | 00000040 4d 7b 7e 17 65 84 |M{~.e.|" -peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [protoutils] checkSignatureFromCreator -> DEBU d53 exits successfully" -peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d54 validateChaincodeProposalMessage starts for proposal 0xc003982bd0, header 0xc0002c12c0" -peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d55 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [endorser] preProcess -> DEBU d56 [businesschannel][79f74fa3] processing txid: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f" -peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [fsblkstorage] retrieveTransactionByID -> DEBU d57 retrieveTransactionByID() - txId = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" -peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU d58 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU d59 constructing new tx simulator txid = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" -peer0.org1.example.com | "2019-07-20 02:39:50.753 UTC [endorser] SimulateProposal -> DEBU d5a [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:39:50.753 UTC [endorser] callChaincode -> INFO d5b [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:39:50.754 UTC [chaincode] Execute -> DEBU d5c Entry" -peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [chaincode] handleMessage -> DEBU d5d [79f74fa3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [chaincode] HandleTransaction -> DEBU d5e [79f74fa3] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [chaincode] HandleGetState -> DEBU d5f [79f74fa3] getting state for chaincode lscc, key exp02, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [stateleveldb] GetState -> DEBU d60 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [chaincode] HandleGetState -> DEBU d61 [79f74fa3] No state associated with key: exp02. Sending RESPONSE with an empty payload" -peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [chaincode] HandleTransaction -> DEBU d62 [79f74fa3] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:39:50.756 UTC [msp] GetManagerForChain -> DEBU d63 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:39:50.757 UTC [cauthdsl] func1 -> DEBU d64 0xc00042a3a0 gate 1563590390756990200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:50.757 UTC [cauthdsl] func2 -> DEBU d65 0xc00042a3a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:50.757 UTC [cauthdsl] func2 -> DEBU d66 0xc00042a3a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:50.763 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d67 Checking if identity satisfies ADMIN role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:39:50.763 UTC [cauthdsl] func2 -> DEBU d68 0xc00042a3a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:50.763 UTC [msp.identity] Verify -> DEBU d69 Verify: digest = 00000000 57 7b e2 3e 1d 82 63 42 fa 2c a7 c7 11 dc 39 b2 |W{.>..cB.,....9.| -peer0.org1.example.com | 00000010 dc ed 2f 91 c1 96 75 5b 2c df 5f 10 56 0c e2 b9 |../...u[,._.V...|" -peer0.org1.example.com | "2019-07-20 02:39:50.763 UTC [msp.identity] Verify -> DEBU d6a Verify: sig = 00000000 30 44 02 20 3d c4 f0 de 31 42 86 8f 63 d6 6b 17 |0D. =...1B..c.k.| -peer0.org1.example.com | 00000010 55 c7 bf 46 b6 de 95 5d 1c 12 50 5b 94 cc 44 30 |U..F...]..P[..D0| -peer0.org1.example.com | 00000020 07 64 ae 11 02 20 6c 41 8e 4d a8 49 18 f7 c3 86 |.d... lA.M.I....| -peer0.org1.example.com | 00000030 70 bd 27 76 81 8b cf e3 64 4b f0 b4 bd e3 fa d6 |p.'v....dK......| -peer0.org1.example.com | 00000040 4d 7b 7e 17 65 84 |M{~.e.|" -peer0.org1.example.com | "2019-07-20 02:39:50.763 UTC [cauthdsl] func2 -> DEBU d6b 0xc00042a3a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6c 0xc00042a3a0 signed by 1 principal evaluation starts (used [true])" -peer0.org1.example.com | "2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6d 0xc00042a3a0 skipping identity 0 because it has already been used" -peer0.org1.example.com | "2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6e 0xc00042a3a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:50.764 UTC [cauthdsl] func1 -> DEBU d6f 0xc00042a3a0 gate 1563590390756990200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:50.765 UTC [chaincode] handleMessage -> DEBU d70 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:39:50.765 UTC [chaincode] HandleTransaction -> DEBU d71 [79f74fa3] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:39:50.765 UTC [chaincode] HandleTransaction -> DEBU d72 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c31 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] Validate -> DEBU c32 Anchor peers for org Org2MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] validateMSP -> DEBU c33 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [msp] newBccspMsp -> DEBU c34 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [msp] New -> DEBU c35 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.495 UTC [msp] Setup -> DEBU c36 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.496 UTC [msp.identity] newIdentity -> DEBU c37 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.496 UTC [msp.identity] newIdentity -> DEBU c38 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.500 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c39 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.500 UTC [msp] Validate -> DEBU c3a MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:45.500 UTC [msp] getCertificationChain -> DEBU c3b MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.501 UTC [msp] hasOURole -> DEBU c3c MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:45.501 UTC [msp] getCertificationChain -> DEBU c3d MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.501 UTC [common.channelconfig] NewStandardValues -> DEBU c3e Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:39:45.501 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3f Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.501 UTC [common.channelconfig] NewStandardValues -> DEBU c40 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:45.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU c41 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:45.501 UTC [common.channelconfig] initializeProtosStruct -> DEBU c42 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:45.505 UTC [common.channelconfig] Validate -> DEBU c43 Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:39:45.505 UTC [common.channelconfig] validateMSP -> DEBU c44 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.505 UTC [msp] newBccspMsp -> DEBU c45 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.505 UTC [msp] New -> DEBU c46 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.505 UTC [msp] Setup -> DEBU c47 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.505 UTC [msp.identity] newIdentity -> DEBU c48 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.506 UTC [msp.identity] newIdentity -> DEBU c49 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.506 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c4a Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.506 UTC [msp] Validate -> DEBU c4b MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:45.514 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:45.516 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:45.516 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4e Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" -orderer0.example.com | "2019-07-20 02:39:45.515 UTC [msp] getCertificationChain -> DEBU c4f MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.521 UTC [msp] hasOURole -> DEBU c50 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:39:45.521 UTC [msp] getCertificationChain -> DEBU c51 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] NewStandardValues -> DEBU c52 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c53 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c54 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c55 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c56 Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c57 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c58 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.523 UTC [common.channelconfig] NewStandardValues -> DEBU c59 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:39:45.523 UTC [common.channelconfig] initializeProtosStruct -> DEBU c5a Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:39:45.523 UTC [common.channelconfig] NewStandardValues -> DEBU c5b Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:39:45.523 UTC [common.channelconfig] initializeProtosStruct -> DEBU c5c Processing field: MSP" -orderer0.example.com | "2019-07-20 02:39:45.523 UTC [common.channelconfig] validateMSP -> DEBU c5d Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.524 UTC [msp] newBccspMsp -> DEBU c5e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.524 UTC [msp] New -> DEBU c5f Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:39:45.524 UTC [orderer.common.cluster.step] sendMessage -> DEBU c60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " -orderer0.example.com | "2019-07-20 02:39:45.525 UTC [msp] Setup -> DEBU c61 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:39:45.525 UTC [msp.identity] newIdentity -> DEBU c62 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.526 UTC [msp.identity] newIdentity -> DEBU c63 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:45.526 UTC [msp] Validate -> DEBU c64 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [msp] Setup -> DEBU c65 Setting up the MSP manager (3 msps)" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [msp] Setup -> DEBU c66 MSP manager setup complete, setup 3 msps" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c67 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c68 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c69 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6a Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6b Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6c Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6d Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6e Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6f Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c70 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c71 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c72 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c73 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c74 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c75 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c76 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c77 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c78 Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c79 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7a Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7b Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7c Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:39:45.530 UTC [policies] NewManagerImpl -> DEBU c7d Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c7e Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c7f Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c80 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c81 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c82 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c83 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c84 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c85 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c86 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c87 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c88 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c89 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8c Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8e Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c8f Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c90 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c91 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c92 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c93 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c94 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c95 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c96 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c97 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c98 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c99 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9b Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9c Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9f Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca0 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca1 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca2 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca4 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca5 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca7 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca8 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca9 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU caa Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU cab Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.channelconfig] LogSanityChecks -> DEBU cac As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.channelconfig] LogSanityChecks -> DEBU cad As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cae Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU caf Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb0 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb1 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb2 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb3 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb4 As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb5 As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb6 As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb7 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb8 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb9 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cba Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cbb Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbd As expected, current configuration has policy '/Channel/Orderer/Admins'" -orderer0.example.com | "2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbe As expected, current configuration has policy '/Channel/Orderer/Writers'" -orderer0.example.com | "2019-07-20 02:39:45.537 UTC [common.channelconfig] LogSanityChecks -> DEBU cbf As expected, current configuration has policy '/Channel/Orderer/Readers'" -orderer0.example.com | "2019-07-20 02:39:45.537 UTC [common.capabilities] Supported -> DEBU cc0 Orderer capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:45.537 UTC [common.capabilities] Supported -> DEBU cc1 Channel capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:39:45.537 UTC [orderer.common.server] func1 -> DEBU cc2 Executing callback to update root CAs" -orderer0.example.com | "2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc3 updating root CAs for channel [businesschannel]" -orderer0.example.com | "2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc4 adding orderer root CAs for MSP [OrdererMSP]" -orderer0.example.com | "2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc5 adding app root CAs for MSP [Org2MSP]" -orderer0.example.com | "2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc6 adding app root CAs for MSP [Org1MSP]" -orderer0.example.com | "2019-07-20 02:39:45.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cc7 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" -orderer0.example.com | "2019-07-20 02:39:45.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cc8 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -orderer0.example.com | "2019-07-20 02:39:45.538 UTC [msp] GetDefaultSigningIdentity -> DEBU cc9 Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:45.538 UTC [msp] GetDefaultSigningIdentity -> DEBU cca Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:39:45.538 UTC [msp.identity] Sign -> DEBU ccb Sign: plaintext: 0A020802120B0A090A03010203100418...D73374974139F129A9820B7A112A17B7 " -orderer0.example.com | "2019-07-20 02:39:45.538 UTC [msp.identity] Sign -> DEBU ccc Sign: digest: EC2AF97FF1FA7BB4F053EAEFF9365BF57FB7A816189F3740CC5BC0EDB381C885 " -orderer0.example.com | "2019-07-20 02:39:45.541 UTC [fsblkstorage] indexBlock -> DEBU ccd Indexing block [blockNum=2, blockHash=[]byte{0xb0, 0xfa, 0x63, 0xe5, 0xe8, 0x64, 0xcd, 0x16, 0x11, 0x80, 0x50, 0x35, 0x2d, 0xad, 0x86, 0x3a, 0xc1, 0x73, 0xcd, 0x98, 0x4c, 0x4b, 0x68, 0x4e, 0x68, 0x76, 0xba, 0xe2, 0x63, 0x2f, 0x8b, 0x3} txOffsets= -orderer0.example.com | txId=43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f locPointer=offset=71, bytesLength=22741 -orderer0.example.com | ]" -orderer0.example.com | "2019-07-20 02:39:45.542 UTC [fsblkstorage] updateCheckpoint -> DEBU cce Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71390], isChainEmpty=[false], lastBlockNumber=[2]" -orderer0.example.com | "2019-07-20 02:39:45.542 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ccf [channel: businesschannel] Wrote block [2]" -orderer0.example.com | "2019-07-20 02:39:45.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd0 Sending msg of 28 bytes to 2 on channel businesschannel took 29.4µs" -orderer0.example.com | "2019-07-20 02:39:45.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd1 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" -orderer0.example.com | "2019-07-20 02:39:45.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.3µs " -orderer0.example.com | "2019-07-20 02:39:45.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.7µs " -orderer0.example.com | "2019-07-20 02:39:45.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:45.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:46.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:46.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd7 Sending msg of 28 bytes to 3 on channel testchainid took 152.2µs" -orderer0.example.com | "2019-07-20 02:39:46.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.1µs " -orderer0.example.com | "2019-07-20 02:39:46.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd9 Sending msg of 28 bytes to 2 on channel businesschannel took 36.3µs" -orderer0.example.com | "2019-07-20 02:39:46.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cda Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" -orderer0.example.com | "2019-07-20 02:39:46.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 433.1µs " -orderer0.example.com | "2019-07-20 02:39:46.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 661.6µs " -orderer0.example.com | "2019-07-20 02:39:46.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:46.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU cde Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:46.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:46.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce0 Sending msg of 28 bytes to 3 on channel testchainid took 441.5µs" -orderer0.example.com | "2019-07-20 02:39:46.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 263.8µs " -orderer0.example.com | "2019-07-20 02:39:46.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce2 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" -orderer0.example.com | "2019-07-20 02:39:46.760 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" -peer0.org1.example.com | "2019-07-20 02:39:50.766 UTC [lscc] putChaincodeCollectionData -> DEBU d73 No collection configuration specified" -peer0.org1.example.com | "2019-07-20 02:39:50.766 UTC [gossip.channel] reportMembershipChanges -> INFO d74 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" -peer0.org1.example.com | "2019-07-20 02:39:50.766 UTC [chaincode] handleMessage -> DEBU d75 [79f74fa3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:39:50.767 UTC [chaincode] Notify -> DEBU d76 [79f74fa3] notifying Txid:79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:39:50.767 UTC [chaincode] Execute -> DEBU d77 Exit" -peer0.org1.example.com | "2019-07-20 02:39:50.768 UTC [chaincode] LaunchConfig -> DEBU d78 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -peer0.org1.example.com | "2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d79 start container: exp02:1.0" -peer0.org1.example.com | "2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d7a start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -peer0.org1.example.com | "2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d7b start container with env: -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning -peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} -peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02:1.0 -peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true -peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key -peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt -peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -peer0.org1.example.com | "2019-07-20 02:39:50.768 UTC [container] lockContainer -> DEBU d7c waiting for container(exp02-1.0) lock" -peer0.org1.example.com | "2019-07-20 02:39:50.769 UTC [container] lockContainer -> DEBU d7d got container (exp02-1.0) lock" -peer0.org1.example.com | "2019-07-20 02:39:50.769 UTC [dockercontroller] stopInternal -> DEBU d7e stopping container" id=dev-peer0.org1.example.com-exp02-1.0 -peer0.org1.example.com | "2019-07-20 02:39:50.772 UTC [dockercontroller] stopInternal -> DEBU d7f stop container result" error="No such container: dev-peer0.org1.example.com-exp02-1.0" -peer0.org1.example.com | "2019-07-20 02:39:50.772 UTC [dockercontroller] stopInternal -> DEBU d80 killing container" id=dev-peer0.org1.example.com-exp02-1.0 -peer0.org1.example.com | "2019-07-20 02:39:50.775 UTC [dockercontroller] stopInternal -> DEBU d81 kill container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" -peer0.org1.example.com | "2019-07-20 02:39:50.775 UTC [dockercontroller] stopInternal -> DEBU d82 removing container" id=dev-peer0.org1.example.com-exp02-1.0 -peer0.org1.example.com | "2019-07-20 02:39:50.778 UTC [dockercontroller] stopInternal -> DEBU d83 remove container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" -peer0.org1.example.com | "2019-07-20 02:39:50.779 UTC [dockercontroller] createContainer -> DEBU d84 create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 -peer0.org1.example.com | "2019-07-20 02:39:50.779 UTC [dockercontroller] getDockerHostConfig -> DEBU d85 docker container hostconfig NetworkMode: hlf_net" -peer0.org1.example.com | "2019-07-20 02:39:50.785 UTC [chaincode.platform] GenerateDockerfile -> DEBU d86 -peer0.org1.example.com | FROM hyperledger/fabric-baseos:amd64-0.4.15 -peer0.org1.example.com | ADD binpackage.tar /usr/local/bin -peer0.org1.example.com | LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ -peer0.org1.example.com | org.hyperledger.fabric.chaincode.id.version="1.0" \ -peer0.org1.example.com | org.hyperledger.fabric.chaincode.type="GOLANG" \ -peer0.org1.example.com | org.hyperledger.fabric.version="1.4.2" \ -peer0.org1.example.com | org.hyperledger.fabric.base.version="0.4.15" -peer0.org1.example.com | ENV CORE_CHAINCODE_BUILDLEVEL=1.4.2" -peer0.org1.example.com | "2019-07-20 02:39:50.790 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO d87 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" -peer0.org1.example.com | "2019-07-20 02:39:50.791 UTC [chaincode.platform.util] DockerBuild -> DEBU d88 Attempting build with image hyperledger/fabric-ccenv:latest" -peer0.org1.example.com | "2019-07-20 02:39:51.783 UTC [gossip.election] waitForInterrupt -> DEBU d89 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.784 UTC [gossip.election] IsLeader -> DEBU d8a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:39:51.784 UTC [msp] GetDefaultSigningIdentity -> DEBU d8b Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:51.784 UTC [msp.identity] Sign -> DEBU d8c Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510031801 " -peer0.org1.example.com | "2019-07-20 02:39:51.784 UTC [msp.identity] Sign -> DEBU d8d Sign: digest: C125DA54F2FD625A6FF1593601FC46CF784E6611475464A50DC95F7779AC6E7F " -peer0.org1.example.com | "2019-07-20 02:39:51.784 UTC [gossip.election] waitForInterrupt -> DEBU d8e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d8f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d90 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d91 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d92 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [gossip.comm] Send -> DEBU d93 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d94 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d95 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [gossip.comm] sendToEndpoint -> DEBU d96 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [gossip.comm] sendToEndpoint -> DEBU d97 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.954 UTC [gossip.comm] func1 -> DEBU d98 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-07-20 02:39:46.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.2µs " -orderer0.example.com | "2019-07-20 02:39:46.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.2µs " -orderer0.example.com | "2019-07-20 02:39:46.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:46.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:47.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:47.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce9 Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" -orderer0.example.com | "2019-07-20 02:39:47.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU cea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.7µs " -orderer0.example.com | "2019-07-20 02:39:47.109 UTC [orderer.common.server] Deliver -> DEBU ceb Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:39:47.109 UTC [common.deliver] Handle -> DEBU cec Starting new deliver loop for 172.18.0.8:50246" -orderer0.example.com | "2019-07-20 02:39:47.109 UTC [common.deliver] Handle -> DEBU ced Attempting to read seek info message from 172.18.0.8:50246" -orderer0.example.com | "2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cf0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU cf1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU cf2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.112 UTC [msp] DeserializeIdentity -> DEBU cf3 Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:47.113 UTC [msp.identity] newIdentity -> DEBU cf4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:47.114 UTC [cauthdsl] func1 -> DEBU cf5 0xc00098cf70 gate 1563590387113997400 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf6 0xc00098cf70 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf7 0xc00098cf70 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf8 0xc00098cf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf9 0xc00098cf70 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:47.115 UTC [cauthdsl] func1 -> DEBU cfa 0xc00098cf70 gate 1563590387113997400 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfb Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:47.115 UTC [policies] func1 -> DEBU cfd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -orderer0.example.com | "2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfe Signature set did not satisfy policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU cff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d00 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d01 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.117 UTC [cauthdsl] func1 -> DEBU d03 0xc000a9a660 gate 1563590387117229100 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d04 0xc000a9a660 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d05 0xc000a9a660 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d06 0xc000a9a660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:39:47.118 UTC [cauthdsl] func2 -> DEBU d07 0xc000a9a660 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:47.118 UTC [cauthdsl] func1 -> DEBU d08 0xc000a9a660 gate 1563590387117229100 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:47.118 UTC [policies] Evaluate -> DEBU d09 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:47.118 UTC [policies] Evaluate -> DEBU d0a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:47.119 UTC [policies] Evaluate -> DEBU d0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.119 UTC [cauthdsl] func1 -> DEBU d0c 0xc000a9aec0 gate 1563590387119254800 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:47.119 UTC [cauthdsl] func2 -> DEBU d0d 0xc000a9aec0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:47.119 UTC [cauthdsl] func2 -> DEBU d0e 0xc000a9aec0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:47.119 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d0f Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:47.119 UTC [msp] Validate -> DEBU d10 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:47.120 UTC [msp] getCertificationChain -> DEBU d11 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:47.120 UTC [cauthdsl] func2 -> DEBU d12 0xc000a9aec0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:47.121 UTC [msp.identity] Verify -> DEBU d13 Verify: digest = 00000000 3d ed 09 6a 90 8b ae 36 c4 46 b1 80 9b 79 50 eb |=..j...6.F...yP.| -orderer0.example.com | 00000010 e1 9a a4 fa c9 37 7f 0d 0d 0b 13 11 fd b6 13 06 |.....7..........|" -orderer0.example.com | "2019-07-20 02:39:47.121 UTC [msp.identity] Verify -> DEBU d14 Verify: sig = 00000000 30 45 02 21 00 e9 9b b3 fc 5d ce e7 4b 96 63 aa |0E.!.....]..K.c.| -orderer0.example.com | 00000010 14 41 1c 1f 69 50 d4 3a 17 7d 9d 0b cf 58 3f 47 |.A..iP.:.}...X?G| -orderer0.example.com | 00000020 26 70 94 2d 91 02 20 5d 41 9d 07 80 46 e0 d0 bc |&p.-.. ]A...F...| -orderer0.example.com | 00000030 ca 9d b6 fb 58 27 c3 34 1e dc 66 dd 7a ce 6c 67 |....X'.4..f.z.lg| -orderer0.example.com | 00000040 f0 df 1f af fc f3 dc |.......|" -orderer0.example.com | "2019-07-20 02:39:47.121 UTC [cauthdsl] func2 -> DEBU d15 0xc000a9aec0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:47.121 UTC [cauthdsl] func1 -> DEBU d16 0xc000a9aec0 gate 1563590387119254800 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d17 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d18 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d19 Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1b Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:47.122 UTC [common.deliver] deliverBlocks -> DEBU d1d [channel: businesschannel] Received seekInfo (0xc000d15040) start: > stop: > from 172.18.0.8:50246" -orderer0.example.com | "2019-07-20 02:39:47.122 UTC [fsblkstorage] Next -> DEBU d1e Initializing block stream for iterator. itr.maxBlockNumAvailable=2" -orderer0.example.com | "2019-07-20 02:39:47.122 UTC [fsblkstorage] newBlockfileStream -> DEBU d1f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" -orderer0.example.com | "2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d20 Remaining bytes=[47443], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d21 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" -orderer0.example.com | "2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d22 blockbytes [23690] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:47.123 UTC [common.deliver] deliverBlocks -> DEBU d23 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -orderer0.example.com | "2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d24 Remaining bytes=[23750], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d25 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" -orderer0.example.com | "2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d26 blockbytes [23747] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:47.123 UTC [common.deliver] deliverBlocks -> DEBU d27 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -orderer0.example.com | "2019-07-20 02:39:47.124 UTC [fsblkstorage] waitForBlock -> DEBU d28 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -orderer0.example.com | "2019-07-20 02:39:47.246 UTC [orderer.common.server] Deliver -> DEBU d29 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:39:47.246 UTC [common.deliver] Handle -> DEBU d2a Starting new deliver loop for 172.18.0.7:44748" -orderer0.example.com | "2019-07-20 02:39:47.247 UTC [common.deliver] Handle -> DEBU d2b Attempting to read seek info message from 172.18.0.7:44748" -orderer0.example.com | "2019-07-20 02:39:47.247 UTC [policies] Evaluate -> DEBU d2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d30 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.249 UTC [msp] DeserializeIdentity -> DEBU d31 Obtaining identity" -orderer0.example.com | "2019-07-20 02:39:47.249 UTC [msp.identity] newIdentity -> DEBU d32 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy -orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c -orderer0.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv -orderer0.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -orderer0.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr -orderer0.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func1 -> DEBU d33 0xc000372b00 gate 1563590387250332700 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d34 0xc000372b00 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d35 0xc000372b00 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d36 0xc000372b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d37 0xc000372b00 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func1 -> DEBU d38 0xc000372b00 gate 1563590387250332700 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d39 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] func1 -> DEBU d3b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3c Signature set did not satisfy policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func1 -> DEBU d41 0xc0001c8490 gate 1563590387252058500 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d42 0xc0001c8490 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d43 0xc0001c8490 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d44 0xc0001c8490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d45 0xc0001c8490 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func1 -> DEBU d46 0xc0001c8490 gate 1563590387252058500 evaluation fails" -orderer0.example.com | "2019-07-20 02:39:47.252 UTC [policies] Evaluate -> DEBU d47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:47.253 UTC [policies] Evaluate -> DEBU d48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:47.253 UTC [policies] Evaluate -> DEBU d49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:39:47.253 UTC [cauthdsl] func1 -> DEBU d4a 0xc0001c8d20 gate 1563590387253349900 evaluation starts" -orderer0.example.com | "2019-07-20 02:39:47.253 UTC [cauthdsl] func2 -> DEBU d4b 0xc0001c8d20 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:39:47.253 UTC [cauthdsl] func2 -> DEBU d4c 0xc0001c8d20 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:39:47.253 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d4d Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | "2019-07-20 02:39:47.253 UTC [msp] Validate -> DEBU d4e MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:39:47.254 UTC [msp] getCertificationChain -> DEBU d4f MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:39:47.254 UTC [cauthdsl] func2 -> DEBU d50 0xc0001c8d20 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:47.254 UTC [msp.identity] Verify -> DEBU d51 Verify: digest = 00000000 a3 6c 91 0d 93 c2 2b b7 84 4f c8 13 c2 e8 ec ac |.l....+..O......| -orderer0.example.com | 00000010 69 f1 88 f4 ef 83 1f d4 73 fe 27 7c 4d 2c 47 4d |i.......s.'|M,GM|" -orderer0.example.com | "2019-07-20 02:39:47.254 UTC [msp.identity] Verify -> DEBU d52 Verify: sig = 00000000 30 45 02 21 00 8c 87 61 6a 22 10 2f 66 11 6e 4d |0E.!...aj"./f.nM| -orderer0.example.com | 00000010 a3 04 ef 75 b5 e3 22 96 86 ad f2 79 9f ed 05 b1 |...u.."....y....| -orderer0.example.com | 00000020 8d e3 ec 68 9d 02 20 14 82 79 23 28 47 2f f6 12 |...h.. ..y#(G/..| -orderer0.example.com | 00000030 4b 4c 70 b7 45 df ab f5 65 80 5a df 45 e2 e3 8a |KLp.E...e.Z.E...| -orderer0.example.com | 00000040 db 2a f3 7a cd d7 10 |.*.z...|" -orderer0.example.com | "2019-07-20 02:39:47.255 UTC [cauthdsl] func2 -> DEBU d53 0xc0001c8d20 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:39:47.255 UTC [cauthdsl] func1 -> DEBU d54 0xc0001c8d20 gate 1563590387253349900 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d55 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d57 Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d58 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d59 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:47.257 UTC [policies] Evaluate -> DEBU d5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:39:47.257 UTC [common.deliver] deliverBlocks -> DEBU d5b [channel: businesschannel] Received seekInfo (0xc0008d0100) start: > stop: > from 172.18.0.7:44748" -orderer0.example.com | "2019-07-20 02:39:47.257 UTC [fsblkstorage] Next -> DEBU d5c Initializing block stream for iterator. itr.maxBlockNumAvailable=2" -orderer0.example.com | "2019-07-20 02:39:47.257 UTC [fsblkstorage] newBlockfileStream -> DEBU d5d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" -orderer0.example.com | "2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d5e Remaining bytes=[47443], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d5f Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" -orderer0.example.com | "2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d60 blockbytes [23690] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:47.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d61 Sending msg of 28 bytes to 2 on channel businesschannel took 17µs" -orderer0.example.com | "2019-07-20 02:39:47.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d62 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" -orderer0.example.com | "2019-07-20 02:39:47.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.3µs " -orderer0.example.com | "2019-07-20 02:39:47.259 UTC [common.deliver] deliverBlocks -> DEBU d64 [channel: businesschannel] Delivering block for (0xc0008d0100) for 172.18.0.7:44748" -orderer0.example.com | "2019-07-20 02:39:47.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.9µs " -orderer0.example.com | "2019-07-20 02:39:47.259 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d66 Remaining bytes=[23750], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:39:47.259 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d67 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" -orderer0.example.com | "2019-07-20 02:39:47.260 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d68 blockbytes [23747] read from file [0]" -orderer0.example.com | "2019-07-20 02:39:47.260 UTC [common.deliver] deliverBlocks -> DEBU d69 [channel: businesschannel] Delivering block for (0xc0008d0100) for 172.18.0.7:44748" -orderer0.example.com | "2019-07-20 02:39:47.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:47.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:47.274 UTC [fsblkstorage] waitForBlock -> DEBU d6c Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -orderer0.example.com | "2019-07-20 02:39:47.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:47.507 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6e Sending msg of 28 bytes to 3 on channel testchainid took 16µs" -orderer0.example.com | "2019-07-20 02:39:47.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.6µs " -orderer0.example.com | "2019-07-20 02:39:47.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d70 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" -orderer0.example.com | "2019-07-20 02:39:47.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d71 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" -orderer0.example.com | "2019-07-20 02:39:47.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " -orderer0.example.com | "2019-07-20 02:39:47.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.5µs " -orderer0.example.com | "2019-07-20 02:39:47.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU d74 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:47.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU d75 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:48.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU d76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:48.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d77 Sending msg of 28 bytes to 3 on channel testchainid took 549.1µs" -orderer0.example.com | "2019-07-20 02:39:48.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU d78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 435.7µs " -orderer0.example.com | "2019-07-20 02:39:48.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d79 Sending msg of 28 bytes to 2 on channel businesschannel took 110.7µs" -orderer0.example.com | "2019-07-20 02:39:48.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7a Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" -orderer0.example.com | "2019-07-20 02:39:48.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 134.4µs " -orderer0.example.com | "2019-07-20 02:39:48.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.6µs " -orderer0.example.com | "2019-07-20 02:39:48.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:48.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:48.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:48.510 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d80 Sending msg of 28 bytes to 3 on channel testchainid took 1.0259ms" -orderer0.example.com | "2019-07-20 02:39:48.511 UTC [orderer.common.cluster.step] sendMessage -> DEBU d81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192.5µs " -orderer0.example.com | "2019-07-20 02:39:48.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d82 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" -orderer0.example.com | "2019-07-20 02:39:48.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d83 Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" -orderer0.example.com | "2019-07-20 02:39:48.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.2µs " -orderer0.example.com | "2019-07-20 02:39:48.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU d85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.3µs " -orderer0.example.com | "2019-07-20 02:39:48.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU d86 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:48.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU d87 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:49.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU d88 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:49.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d89 Sending msg of 28 bytes to 3 on channel testchainid took 74.6µs" -orderer0.example.com | "2019-07-20 02:39:49.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " -orderer0.example.com | "2019-07-20 02:39:49.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8b Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" -orderer0.example.com | "2019-07-20 02:39:49.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8c Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" -orderer0.example.com | "2019-07-20 02:39:49.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.1µs " -orderer0.example.com | "2019-07-20 02:39:49.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " -orderer0.example.com | "2019-07-20 02:39:49.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:49.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU d90 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:49.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU d91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:49.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d92 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" -orderer0.example.com | "2019-07-20 02:39:49.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU d93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.3µs " -orderer0.example.com | "2019-07-20 02:39:49.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d94 Sending msg of 28 bytes to 2 on channel businesschannel took 92µs" -orderer0.example.com | "2019-07-20 02:39:49.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d95 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" -orderer0.example.com | "2019-07-20 02:39:49.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.8µs " -orderer0.example.com | "2019-07-20 02:39:49.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60µs " -orderer0.example.com | "2019-07-20 02:39:49.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU d98 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:49.766 UTC [orderer.common.cluster.step] handleMessage -> DEBU d99 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:50.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:50.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9b Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" -orderer0.example.com | "2019-07-20 02:39:50.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 623.2µs " -orderer0.example.com | "2019-07-20 02:39:50.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9d Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" -orderer0.example.com | "2019-07-20 02:39:50.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9e Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" -orderer0.example.com | "2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " -orderer0.example.com | "2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] handleMessage -> DEBU da1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:50.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU da2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU da0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 733.7µs " -orderer0.example.com | "2019-07-20 02:39:50.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU da3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:50.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da4 Sending msg of 28 bytes to 3 on channel testchainid took 46µs" -orderer0.example.com | "2019-07-20 02:39:50.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU da5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " -orderer0.example.com | "2019-07-20 02:39:50.744 UTC [orderer.common.server] Broadcast -> DEBU da6 Starting new Broadcast handler" -orderer0.example.com | "2019-07-20 02:39:50.745 UTC [orderer.common.broadcast] Handle -> DEBU da7 Starting new broadcast loop for 172.18.0.9:39140" -orderer0.example.com | "2019-07-20 02:39:50.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da8 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" -orderer0.example.com | "2019-07-20 02:39:50.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da9 Sending msg of 28 bytes to 3 on channel businesschannel took 382.5µs" -orderer0.example.com | "2019-07-20 02:39:50.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU daa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " -orderer0.example.com | "2019-07-20 02:39:50.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU dab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.8µs " -orderer0.example.com | "2019-07-20 02:39:50.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU dac Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:50.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dad Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:51.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU dae Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:51.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daf Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" -orderer0.example.com | "2019-07-20 02:39:51.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU db0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242.2µs " -orderer0.example.com | "2019-07-20 02:39:51.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db1 Sending msg of 28 bytes to 2 on channel businesschannel took 43.3µs" -orderer0.example.com | "2019-07-20 02:39:51.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db2 Sending msg of 28 bytes to 3 on channel businesschannel took 44.3µs" -orderer0.example.com | "2019-07-20 02:39:51.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU db3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " -orderer0.example.com | "2019-07-20 02:39:51.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU db4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.7µs " -orderer0.example.com | "2019-07-20 02:39:51.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU db5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:51.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU db6 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:51.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU db7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:51.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db8 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" -orderer0.example.com | "2019-07-20 02:39:51.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU db9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.9µs " -orderer0.example.com | "2019-07-20 02:39:51.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dba Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" -orderer0.example.com | "2019-07-20 02:39:51.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbb Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" -orderer0.example.com | "2019-07-20 02:39:51.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.6µs " -orderer0.example.com | "2019-07-20 02:39:51.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.345ms " -orderer0.example.com | "2019-07-20 02:39:51.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:51.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:52.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:52.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc1 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" -orderer0.example.com | "2019-07-20 02:39:52.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 546.9µs " -orderer0.example.com | "2019-07-20 02:39:52.108 UTC [common.deliver] deliverBlocks -> DEBU dc3 Context canceled, aborting wait for next block" -orderer0.example.com | "2019-07-20 02:39:52.108 UTC [orderer.common.server] func1 -> DEBU dc4 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:39:52.108 UTC [grpc] infof -> DEBU dc5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc6 Came out of wait. maxAvailaBlockNumber=[2]" -orderer0.example.com | "2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc8 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -orderer0.example.com | "2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc9 Came out of wait. maxAvailaBlockNumber=[2]" -orderer0.example.com | "2019-07-20 02:39:52.109 UTC [comm.grpc.server] 1 -> INFO dc7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.7:44748 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.8632684s -orderer0.example.com | "2019-07-20 02:39:52.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dca Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" -orderer0.example.com | "2019-07-20 02:39:52.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcb Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" -orderer0.example.com | "2019-07-20 02:39:52.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.4µs " -orderer0.example.com | "2019-07-20 02:39:52.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 407µs " -orderer0.example.com | "2019-07-20 02:39:52.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:52.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:52.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:52.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd1 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" -orderer0.example.com | "2019-07-20 02:39:52.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " -orderer0.example.com | "2019-07-20 02:39:52.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd3 Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" -orderer0.example.com | "2019-07-20 02:39:52.760 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd4 Sending msg of 28 bytes to 2 on channel businesschannel took 11.6µs" -orderer0.example.com | "2019-07-20 02:39:52.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 524.6µs " -orderer0.example.com | "2019-07-20 02:39:52.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.7µs " -orderer0.example.com | "2019-07-20 02:39:52.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:52.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:53.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:53.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dda Sending msg of 28 bytes to 3 on channel testchainid took 16µs" -orderer0.example.com | "2019-07-20 02:39:53.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146µs " -orderer0.example.com | "2019-07-20 02:39:53.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddc Sending msg of 28 bytes to 2 on channel businesschannel took 53.2µs" -orderer0.example.com | "2019-07-20 02:39:53.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddd Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" -orderer0.example.com | "2019-07-20 02:39:53.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.3µs " -orderer0.example.com | "2019-07-20 02:39:53.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:53.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU de0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6647ms " -peer0.org1.example.com | "2019-07-20 02:39:51.955 UTC [gossip.comm] func1 -> DEBU d99 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.956 UTC [gossip.comm] func1 -> DEBU d9a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.960 UTC [gossip.gossip] handleMessage -> DEBU d9b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.961 UTC [gossip.gossip] handleMessage -> DEBU d9c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.961 UTC [gossip.gossip] handleMessage -> DEBU d9d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.961 UTC [gossip.discovery] handleMsgFromComm -> DEBU d9e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.961 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d9f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:51.962 UTC [msp] DeserializeIdentity -> DEBU da0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.962 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU da1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:51.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU da2 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:51.963 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU da3 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:51.963 UTC [cauthdsl] func1 -> DEBU da7 0xc00069b140 gate 1563590391963945100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU da8 0xc00069b140 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU da9 0xc00069b140 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU daa 0xc00069b140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:51.965 UTC [cauthdsl] func2 -> DEBU dab 0xc00069b140 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:51.965 UTC [cauthdsl] func1 -> DEBU dac 0xc00069b140 gate 1563590391963945100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:51.965 UTC [policies] Evaluate -> DEBU dad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.966 UTC [policies] Evaluate -> DEBU dae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.966 UTC [policies] Evaluate -> DEBU daf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:51.966 UTC [cauthdsl] func1 -> DEBU db0 0xc00069b9b0 gate 1563590391966552900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:51.966 UTC [cauthdsl] func2 -> DEBU db1 0xc00069b9b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:51.967 UTC [cauthdsl] func2 -> DEBU db2 0xc00069b9b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:51.967 UTC [cauthdsl] func2 -> DEBU db3 0xc00069b9b0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:39:53.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU de1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:53.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU de2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:53.507 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de3 Sending msg of 28 bytes to 3 on channel testchainid took 40.9µs" -orderer0.example.com | "2019-07-20 02:39:53.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU de4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 579.9µs " -orderer0.example.com | "2019-07-20 02:39:53.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de5 Sending msg of 28 bytes to 3 on channel businesschannel took 27.3µs" -orderer0.example.com | "2019-07-20 02:39:53.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.4µs " -orderer0.example.com | "2019-07-20 02:39:53.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de7 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" -orderer0.example.com | "2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] sendMessage -> DEBU de8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4015ms " -orderer0.example.com | "2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dea Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:54.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU deb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:54.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dec Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" -orderer0.example.com | "2019-07-20 02:39:54.009 UTC [orderer.common.cluster.step] sendMessage -> DEBU ded Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 257.9µs " -orderer0.example.com | "2019-07-20 02:39:54.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dee Sending msg of 28 bytes to 2 on channel businesschannel took 52.6µs" -orderer0.example.com | "2019-07-20 02:39:54.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU def Sending msg of 28 bytes to 3 on channel businesschannel took 9.3µs" -orderer0.example.com | "2019-07-20 02:39:54.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 473.2µs " -orderer0.example.com | "2019-07-20 02:39:54.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU df1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127µs " -orderer0.example.com | "2019-07-20 02:39:54.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:54.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU df3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:54.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU df4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:54.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" -orderer0.example.com | "2019-07-20 02:39:54.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU df6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.3µs " -orderer0.example.com | "2019-07-20 02:39:54.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df7 Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" -orderer0.example.com | "2019-07-20 02:39:54.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df8 Sending msg of 28 bytes to 3 on channel businesschannel took 8.4µs" -orderer0.example.com | "2019-07-20 02:39:54.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU df9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.9µs " -orderer0.example.com | "2019-07-20 02:39:54.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.2µs " -orderer0.example.com | "2019-07-20 02:39:54.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:54.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:55.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:55.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfe Sending msg of 28 bytes to 3 on channel testchainid took 15µs" -orderer0.example.com | "2019-07-20 02:39:55.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU dff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.6µs " -orderer0.example.com | "2019-07-20 02:39:55.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e00 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" -orderer0.example.com | "2019-07-20 02:39:55.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e01 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" -orderer0.example.com | "2019-07-20 02:39:55.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 202µs " -orderer0.example.com | "2019-07-20 02:39:55.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1379ms " -orderer0.example.com | "2019-07-20 02:39:55.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:55.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:55.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:55.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" -orderer0.example.com | "2019-07-20 02:39:55.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 469.8µs " -orderer0.example.com | "2019-07-20 02:39:55.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" -orderer0.example.com | "2019-07-20 02:39:55.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0a Sending msg of 28 bytes to 3 on channel businesschannel took 10.5µs" -orderer0.example.com | "2019-07-20 02:39:55.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481µs " -orderer0.example.com | "2019-07-20 02:39:55.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 765.8µs " -orderer0.example.com | "2019-07-20 02:39:55.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:55.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:56.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:56.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" -orderer0.example.com | "2019-07-20 02:39:56.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU e11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.1µs " -orderer0.example.com | "2019-07-20 02:39:56.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" -orderer0.example.com | "2019-07-20 02:39:56.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e13 Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" -orderer0.example.com | "2019-07-20 02:39:56.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " -orderer0.example.com | "2019-07-20 02:39:56.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 405.8µs " -orderer0.example.com | "2019-07-20 02:39:56.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:56.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e17 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:56.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e18 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:56.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 3 on channel testchainid took 161µs" -orderer0.example.com | "2019-07-20 02:39:56.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.4µs " -orderer0.example.com | "2019-07-20 02:39:56.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" -orderer0.example.com | "2019-07-20 02:39:56.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.6µs " -orderer0.example.com | "2019-07-20 02:39:56.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1d Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" -orderer0.example.com | "2019-07-20 02:39:56.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:56.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 605.8µs " -orderer0.example.com | "2019-07-20 02:39:56.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU e20 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:57.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e21 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:57.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" -orderer0.example.com | "2019-07-20 02:39:57.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU e23 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.9µs " -orderer0.example.com | "2019-07-20 02:39:57.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" -orderer0.example.com | "2019-07-20 02:39:57.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e25 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" -orderer0.example.com | "2019-07-20 02:39:57.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " -orderer0.example.com | "2019-07-20 02:39:57.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e27 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.6µs " -orderer0.example.com | "2019-07-20 02:39:57.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:57.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e29 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:57.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:57.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" -orderer0.example.com | "2019-07-20 02:39:57.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 380.4µs " -orderer0.example.com | "2019-07-20 02:39:57.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2d Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" -orderer0.example.com | "2019-07-20 02:39:57.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2e Sending msg of 28 bytes to 3 on channel businesschannel took 29.9µs" -orderer0.example.com | "2019-07-20 02:39:57.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.8µs " -orderer0.example.com | "2019-07-20 02:39:57.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e30 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.1µs " -orderer0.example.com | "2019-07-20 02:39:57.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:57.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e32 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:58.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e33 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:58.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" -orderer0.example.com | "2019-07-20 02:39:58.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU e35 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 454.3µs " -orderer0.example.com | "2019-07-20 02:39:58.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e36 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" -orderer0.example.com | "2019-07-20 02:39:58.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" -orderer0.example.com | "2019-07-20 02:39:58.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 558.2µs " -orderer0.example.com | "2019-07-20 02:39:58.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1584ms " -orderer0.example.com | "2019-07-20 02:39:58.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:58.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:58.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:58.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" -orderer0.example.com | "2019-07-20 02:39:58.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 347.4µs " -orderer0.example.com | "2019-07-20 02:39:58.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" -orderer0.example.com | "2019-07-20 02:39:58.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e40 Sending msg of 28 bytes to 3 on channel businesschannel took 362.7µs" -orderer0.example.com | "2019-07-20 02:39:58.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260.6µs " -orderer0.example.com | "2019-07-20 02:39:58.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 295.2µs " -orderer0.example.com | "2019-07-20 02:39:58.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:58.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:59.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU e45 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:59.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" -orderer0.example.com | "2019-07-20 02:39:59.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.4µs " -orderer0.example.com | "2019-07-20 02:39:59.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 2 on channel businesschannel took 48.1µs" -orderer0.example.com | "2019-07-20 02:39:59.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.8µs " -orderer0.example.com | "2019-07-20 02:39:59.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4a Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" -orderer0.example.com | "2019-07-20 02:39:59.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 43.7µs " -orderer0.example.com | "2019-07-20 02:39:59.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:59.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:59.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:59.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4f Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" -orderer0.example.com | "2019-07-20 02:39:59.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e50 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.2µs " -orderer0.example.com | "2019-07-20 02:39:59.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" -orderer0.example.com | "2019-07-20 02:39:59.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.2µs " -orderer0.example.com | "2019-07-20 02:39:59.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.7µs " -orderer0.example.com | "2019-07-20 02:39:59.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e54 Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" -orderer0.example.com | "2019-07-20 02:39:59.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:59.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:39:59.866 UTC [orderer.common.server] replicateDisabledChains -> DEBU e57 No inactive chains to try to replicate" -orderer0.example.com | "2019-07-20 02:40:00.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e58 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:00.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" -orderer0.example.com | "2019-07-20 02:40:00.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 344.1µs " -orderer0.example.com | "2019-07-20 02:40:00.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5b Sending msg of 28 bytes to 2 on channel businesschannel took 49.9µs" -orderer0.example.com | "2019-07-20 02:40:00.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.9µs " -orderer0.example.com | "2019-07-20 02:40:00.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5d Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" -orderer0.example.com | "2019-07-20 02:40:00.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:00.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " -orderer0.example.com | "2019-07-20 02:40:00.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e60 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:00.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e61 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:00.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e62 Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" -orderer0.example.com | "2019-07-20 02:40:00.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 322.8µs " -orderer0.example.com | "2019-07-20 02:40:00.733 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 2 on channel businesschannel took 41.5µs" -orderer0.example.com | "2019-07-20 02:40:00.733 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e66 Sending msg of 28 bytes to 3 on channel businesschannel took 10.3µs" -orderer0.example.com | "2019-07-20 02:40:00.739 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 408.3µs " -orderer0.example.com | "2019-07-20 02:40:00.741 UTC [orderer.common.cluster.step] sendMessage -> DEBU e67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 859.4µs " -orderer0.example.com | "2019-07-20 02:40:00.742 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:00.743 UTC [orderer.common.cluster.step] handleMessage -> DEBU e69 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:00.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:00.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 3 on channel testchainid took 15µs" -orderer0.example.com | "2019-07-20 02:40:00.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305.1µs " -orderer0.example.com | "2019-07-20 02:40:01.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6d Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" -orderer0.example.com | "2019-07-20 02:40:01.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6e Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" -orderer0.example.com | "2019-07-20 02:40:01.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.9µs " -orderer0.example.com | "2019-07-20 02:40:01.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 777µs " -orderer0.example.com | "2019-07-20 02:40:01.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:01.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU e72 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:01.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU e73 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:01.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" -orderer0.example.com | "2019-07-20 02:40:01.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 397.5µs " -orderer0.example.com | "2019-07-20 02:40:01.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e76 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" -orderer0.example.com | "2019-07-20 02:40:01.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e77 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" -orderer0.example.com | "2019-07-20 02:40:01.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU e78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 633.1µs " -orderer0.example.com | "2019-07-20 02:40:01.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU e79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.6767ms " -peer0.org1.example.com | "2019-07-20 02:39:51.968 UTC [msp.identity] Verify -> DEBU db4 Verify: digest = 00000000 9a 8a 36 66 3a 44 53 60 48 d2 8f ad eb c3 a1 1e |..6f:DS`H.......| -peer0.org1.example.com | 00000010 c7 a1 8f 57 db 61 9d c1 af fd a0 0d 36 8c 83 e9 |...W.a......6...|" -peer0.org1.example.com | "2019-07-20 02:39:51.968 UTC [msp.identity] Verify -> DEBU db5 Verify: sig = 00000000 30 44 02 20 1a f4 32 3b ae 0e 0d 34 bb 01 06 1d |0D. ..2;...4....| -peer0.org1.example.com | 00000010 b2 bc e1 31 95 d9 71 54 41 b7 28 6e 00 8b 67 f1 |...1..qTA.(n..g.| -peer0.org1.example.com | 00000020 9e bd 75 00 02 20 18 ae a5 a6 57 d9 38 c9 79 91 |..u.. ....W.8.y.| -peer0.org1.example.com | 00000030 32 79 72 74 be a9 8e df ad 40 29 41 e3 cc 4f a5 |2yrt.....@)A..O.| -peer0.org1.example.com | 00000040 bd 87 29 80 ca a0 |..)...|" -peer0.org1.example.com | "2019-07-20 02:39:51.968 UTC [cauthdsl] func2 -> DEBU db6 0xc00069b9b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:51.969 UTC [cauthdsl] func1 -> DEBU db7 0xc00069b9b0 gate 1563590391966552900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:51.969 UTC [policies] Evaluate -> DEBU db8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.969 UTC [policies] Evaluate -> DEBU db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.970 UTC [policies] Evaluate -> DEBU dba Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.970 UTC [policies] Evaluate -> DEBU dbb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.971 UTC [gossip.comm] func1 -> DEBU dbc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.972 UTC [gossip.discovery] handleAliveMessage -> DEBU dbd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.972 UTC [gossip.discovery] learnExistingMembers -> DEBU dbe Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dbf updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc0 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc2 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [gossip.discovery] handleAliveMessage -> DEBU dc3 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU dc4 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [gossip.discovery] sendMemResponse -> DEBU dc5 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [gossip.comm] Send -> DEBU dc9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [gossip.discovery] sendMemResponse -> DEBU dca Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.comm] sendToEndpoint -> DEBU dcb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.comm] sendToEndpoint -> DEBU dcc Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dcd Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dce Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.pull] HandleMessage -> DEBU dcf GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd4 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:01.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:01.732 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:01.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:01.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7d Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" -orderer0.example.com | "2019-07-20 02:40:01.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 383.6µs " -orderer0.example.com | "2019-07-20 02:40:02.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7f Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" -orderer0.example.com | "2019-07-20 02:40:02.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e80 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" -orderer0.example.com | "2019-07-20 02:40:02.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU e81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.3µs " -orderer0.example.com | "2019-07-20 02:40:02.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0933ms " -orderer0.example.com | "2019-07-20 02:40:02.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e83 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:02.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e84 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:02.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU e85 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:02.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" -orderer0.example.com | "2019-07-20 02:40:02.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU e87 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 555.4µs " -orderer0.example.com | "2019-07-20 02:40:02.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e88 Sending msg of 28 bytes to 2 on channel businesschannel took 49.6µs" -orderer0.example.com | "2019-07-20 02:40:02.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.2µs " -orderer0.example.com | "2019-07-20 02:40:02.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8a Sending msg of 28 bytes to 3 on channel businesschannel took 6.3µs" -orderer0.example.com | "2019-07-20 02:40:02.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 992.9µs " -orderer0.example.com | "2019-07-20 02:40:02.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:02.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:02.969 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:02.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 3 on channel testchainid took 46.8µs" -orderer0.example.com | "2019-07-20 02:40:02.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e90 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 450.8µs " -orderer0.example.com | "2019-07-20 02:40:03.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e91 Sending msg of 28 bytes to 2 on channel businesschannel took 38.6µs" -orderer0.example.com | "2019-07-20 02:40:03.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e92 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" -orderer0.example.com | "2019-07-20 02:40:03.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.7µs " -orderer0.example.com | "2019-07-20 02:40:03.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e94 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 745.3µs " -orderer0.example.com | "2019-07-20 02:40:03.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU e95 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:03.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e96 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:03.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU e97 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:03.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e98 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" -orderer0.example.com | "2019-07-20 02:40:03.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU e99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 666.2µs " -orderer0.example.com | "2019-07-20 02:40:03.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9a Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" -orderer0.example.com | "2019-07-20 02:40:03.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9b Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" -orderer0.example.com | "2019-07-20 02:40:03.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.8µs " -orderer0.example.com | "2019-07-20 02:40:03.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 610.9µs " -orderer0.example.com | "2019-07-20 02:40:03.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:03.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.pull] SendDigest -> DEBU dd6 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dd7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dd8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.977 UTC [gossip.discovery] handleMsgFromComm -> DEBU dd9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.977 UTC [gossip.gossip] ValidateAliveMsg -> DEBU dda Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:51.977 UTC [msp] DeserializeIdentity -> DEBU ddb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ddc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ddd Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU dde Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU ddf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU de0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU de1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [cauthdsl] func1 -> DEBU de2 0xc0006bbb60 gate 1563590391979879400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [cauthdsl] func2 -> DEBU de3 0xc0006bbb60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [cauthdsl] func2 -> DEBU de4 0xc0006bbb60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU de5 0xc0006bbb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU de6 0xc0006bbb60 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func1 -> DEBU de7 0xc0006bbb60 gate 1563590391979879400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU de8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU de9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU dea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func1 -> DEBU deb 0xc0007323a0 gate 1563590391980879800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU dec 0xc0007323a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU ded 0xc0007323a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU dee 0xc0007323a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:51.981 UTC [msp.identity] Verify -> DEBU def Verify: digest = 00000000 46 20 41 cc 8d 58 2c 2b 0f 57 ff f2 22 90 f5 5f |F A..X,+.W..".._| -peer0.org1.example.com | 00000010 bc ce 6d 92 64 45 bd 5a 06 5a 03 b3 ad a9 94 81 |..m.dE.Z.Z......|" -peer0.org1.example.com | "2019-07-20 02:39:51.981 UTC [msp.identity] Verify -> DEBU df0 Verify: sig = 00000000 30 44 02 20 0e cf c9 77 85 5f 4d 3d 6d 04 af 83 |0D. ...w._M=m...| -peer0.org1.example.com | 00000010 9b 19 c0 51 38 19 6a ee a8 70 f3 6c 64 29 c2 52 |...Q8.j..p.ld).R| -peer0.org1.example.com | 00000020 30 df 6e 4f 02 20 0b 19 89 11 de db 6f 04 b7 5f |0.nO. ......o.._| -peer0.org1.example.com | 00000030 00 ae d2 67 e7 1f 76 d9 e0 ae 82 ab c9 2a 4a 46 |...g..v......*JF| -peer0.org1.example.com | 00000040 7a 3d 72 97 6b c2 |z=r.k.|" -peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [cauthdsl] func2 -> DEBU df1 0xc0007323a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [cauthdsl] func1 -> DEBU df2 0xc0007323a0 gate 1563590391980879800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df8 endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" lastAliveTS: 1563590371938894800, 22 but got ts: inc_num:1563590371938894800 seq_num:21 " -peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df9 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfa Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.983 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.983 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfc Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.983 UTC [gossip.gossip] handleMessage -> DEBU dfd Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU dfe Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU dff Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e00 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e01 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e02 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e03 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e04 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [gossip.comm] Send -> DEBU e05 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e06 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [gossip.comm] Send -> DEBU e07 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e08 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e09 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e0a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e0b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.265 UTC [msp] GetDefaultSigningIdentity -> DEBU e0c Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e0d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151012 " -peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e0e Sign: digest: 15EC745CBC671F78A19C4207B9A2F43A526D8229FE508D1D60C1F4E245B3FB39 " -peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [msp] GetDefaultSigningIdentity -> DEBU e0f Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e10 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e11 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [gossip.discovery] periodicalSendAlive -> DEBU e12 Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:39:52.269 UTC [msp] DeserializeIdentity -> DEBU e13 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.269 UTC [msp] DeserializeIdentity -> DEBU e14 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [msp] DeserializeIdentity -> DEBU e15 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:03.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:03.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" -orderer0.example.com | "2019-07-20 02:40:03.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 492.6µs " -orderer0.example.com | "2019-07-20 02:40:04.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 2 on channel businesschannel took 28.1µs" -orderer0.example.com | "2019-07-20 02:40:04.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea4 Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" -orderer0.example.com | "2019-07-20 02:40:04.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.1µs " -orderer0.example.com | "2019-07-20 02:40:04.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1502ms " -orderer0.example.com | "2019-07-20 02:40:04.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:04.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea8 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:04.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:04.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" -orderer0.example.com | "2019-07-20 02:40:04.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.8µs " -orderer0.example.com | "2019-07-20 02:40:04.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" -orderer0.example.com | "2019-07-20 02:40:04.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ead Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" -orderer0.example.com | "2019-07-20 02:40:04.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU eae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.2µs " -orderer0.example.com | "2019-07-20 02:40:04.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU eaf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 736µs " -orderer0.example.com | "2019-07-20 02:40:04.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:04.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:04.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:04.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" -orderer0.example.com | "2019-07-20 02:40:04.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 566.6µs " -orderer0.example.com | "2019-07-20 02:40:05.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" -orderer0.example.com | "2019-07-20 02:40:05.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156µs " -orderer0.example.com | "2019-07-20 02:40:05.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb7 Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" -orderer0.example.com | "2019-07-20 02:40:05.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:05.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1143ms " -orderer0.example.com | "2019-07-20 02:40:05.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU eba Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:05.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:05.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " -orderer0.example.com | "2019-07-20 02:40:05.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebd Sending msg of 28 bytes to 3 on channel testchainid took 124.3µs" -orderer0.example.com | "2019-07-20 02:40:05.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebe Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" -orderer0.example.com | "2019-07-20 02:40:05.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebf Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" -orderer0.example.com | "2019-07-20 02:40:05.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 317.6µs " -orderer0.example.com | "2019-07-20 02:40:05.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 317.4µs " -orderer0.example.com | "2019-07-20 02:40:05.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:05.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:05.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:05.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec5 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" -orderer0.example.com | "2019-07-20 02:40:05.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.4µs " -orderer0.example.com | "2019-07-20 02:40:06.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec7 Sending msg of 28 bytes to 3 on channel businesschannel took 54.1µs" -orderer0.example.com | "2019-07-20 02:40:06.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.3µs " -orderer0.example.com | "2019-07-20 02:40:06.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec9 Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" -orderer0.example.com | "2019-07-20 02:40:06.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU eca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 574.8µs " -orderer0.example.com | "2019-07-20 02:40:06.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:06.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:06.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:06.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ece Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" -orderer0.example.com | "2019-07-20 02:40:06.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.8µs " -orderer0.example.com | "2019-07-20 02:40:06.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 2 on channel businesschannel took 55µs" -orderer0.example.com | "2019-07-20 02:40:06.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed1 Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" -orderer0.example.com | "2019-07-20 02:40:06.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.5µs " -orderer0.example.com | "2019-07-20 02:40:06.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.4µs " -orderer0.example.com | "2019-07-20 02:40:06.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:06.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:06.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:06.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed7 Sending msg of 28 bytes to 3 on channel testchainid took 29µs" -orderer0.example.com | "2019-07-20 02:40:06.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " -orderer0.example.com | "2019-07-20 02:40:07.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed9 Sending msg of 28 bytes to 2 on channel businesschannel took 43.4µs" -orderer0.example.com | "2019-07-20 02:40:07.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eda Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" -orderer0.example.com | "2019-07-20 02:40:07.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU edb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.5µs " -orderer0.example.com | "2019-07-20 02:40:07.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:07.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU edd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.2615ms " -orderer0.example.com | "2019-07-20 02:40:07.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU ede Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:07.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU edf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:07.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee0 Sending msg of 28 bytes to 3 on channel testchainid took 11.2µs" -orderer0.example.com | "2019-07-20 02:40:07.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.8µs " -orderer0.example.com | "2019-07-20 02:40:07.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" -orderer0.example.com | "2019-07-20 02:40:07.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee3 Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" -orderer0.example.com | "2019-07-20 02:40:07.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.9µs " -orderer0.example.com | "2019-07-20 02:40:07.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 507.7µs " -orderer0.example.com | "2019-07-20 02:40:07.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:07.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:07.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:07.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 3 on channel testchainid took 202.8µs" -orderer0.example.com | "2019-07-20 02:40:07.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU eea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.1µs " -orderer0.example.com | "2019-07-20 02:40:08.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eeb Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" -orderer0.example.com | "2019-07-20 02:40:08.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.6µs " -peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e16 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e17 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [msp] DeserializeIdentity -> DEBU e18 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e19 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e20 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e22 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e23 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e24 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e25 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e26 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e27 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e28 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e29 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e2a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e2b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.273 UTC [gossip.comm] func1 -> DEBU e2c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.273 UTC [gossip.gossip] handleMessage -> DEBU e2d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.273 UTC [gossip.pull] HandleMessage -> DEBU e2e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.273 UTC [gossip.gossip] handleMessage -> DEBU e2f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.274 UTC [gossip.comm] func1 -> DEBU e30 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.274 UTC [gossip.gossip] handleMessage -> DEBU e31 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.274 UTC [gossip.pull] HandleMessage -> DEBU e32 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.274 UTC [gossip.gossip] handleMessage -> DEBU e33 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.275 UTC [gossip.comm] func1 -> DEBU e34 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.275 UTC [gossip.gossip] handleMessage -> DEBU e35 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.275 UTC [gossip.pull] HandleMessage -> DEBU e36 GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.275 UTC [gossip.gossip] handleMessage -> DEBU e37 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp] GetDefaultSigningIdentity -> DEBU e38 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e39 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151013 " -peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3a Sign: digest: 1BDA5E011B2CAD7F0981A1AD9ABD0D9AB25D2311F64929992AB2ABDE510006A5 " -peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp] GetDefaultSigningIdentity -> DEBU e3b Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [gossip.comm] Send -> DEBU e3e Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp] DeserializeIdentity -> DEBU e3f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [gossip.comm] Send -> DEBU e40 Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [msp] DeserializeIdentity -> DEBU e41 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] Send -> DEBU e42 Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e43 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e44 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e45 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e46 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e47 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e48 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.308 UTC [gossip.comm] func1 -> DEBU e49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.308 UTC [gossip.gossip] handleMessage -> DEBU e4a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.gossip] handleMessage -> DEBU e4b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU e4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e4d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e4e Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| -peer0.org1.example.com | 00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" -peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e4f Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| -peer0.org1.example.com | 00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| -peer0.org1.example.com | 00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| -peer0.org1.example.com | 00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| -peer0.org1.example.com | 00000040 3a 67 bb 3e 5f a1 |:g.>_.|" -peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e50 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e51 Verify: sig = 00000000 30 44 02 20 03 d0 6b a7 fc 1b d2 38 6b 11 c8 13 |0D. ..k....8k...| -peer0.org1.example.com | 00000010 2c b4 57 a4 10 59 d3 da a5 30 c8 76 05 4a 82 eb |,.W..Y...0.v.J..| -peer0.org1.example.com | 00000020 d8 2b 80 77 02 20 57 45 64 35 11 d8 a8 70 21 96 |.+.w. WEd5...p!.| -peer0.org1.example.com | 00000030 ae 88 80 6c c9 16 bb 3a c7 71 1b c2 07 ce 60 80 |...l...:.q....`.| -peer0.org1.example.com | 00000040 40 d7 8a 33 0f 7f |@..3..|" -orderer0.example.com | "2019-07-20 02:40:08.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eed Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" -orderer0.example.com | "2019-07-20 02:40:08.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:08.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU eef Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:08.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163µs " -orderer0.example.com | "2019-07-20 02:40:08.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:08.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" -orderer0.example.com | "2019-07-20 02:40:08.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305µs " -orderer0.example.com | "2019-07-20 02:40:08.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef4 Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" -orderer0.example.com | "2019-07-20 02:40:08.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef5 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" -orderer0.example.com | "2019-07-20 02:40:08.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.8µs " -orderer0.example.com | "2019-07-20 02:40:08.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.7µs " -orderer0.example.com | "2019-07-20 02:40:08.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:08.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef9 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:08.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU efa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:08.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 28 bytes to 3 on channel testchainid took 29.6µs" -orderer0.example.com | "2019-07-20 02:40:08.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.6µs " -orderer0.example.com | "2019-07-20 02:40:09.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efd Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" -orderer0.example.com | "2019-07-20 02:40:09.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efe Sending msg of 28 bytes to 2 on channel businesschannel took 9.2µs" -orderer0.example.com | "2019-07-20 02:40:09.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84.4µs " -orderer0.example.com | "2019-07-20 02:40:09.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116µs " -orderer0.example.com | "2019-07-20 02:40:09.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f01 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:09.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f02 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:09.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f03 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:09.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f04 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" -orderer0.example.com | "2019-07-20 02:40:09.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.8µs " -orderer0.example.com | "2019-07-20 02:40:09.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f06 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" -orderer0.example.com | "2019-07-20 02:40:09.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f07 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" -orderer0.example.com | "2019-07-20 02:40:09.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.6µs " -orderer0.example.com | "2019-07-20 02:40:09.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 441.2µs " -orderer0.example.com | "2019-07-20 02:40:09.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:09.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:09.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:09.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 3 on channel testchainid took 13µs" -orderer0.example.com | "2019-07-20 02:40:09.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.6µs " -orderer0.example.com | "2019-07-20 02:40:10.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0f Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" -orderer0.example.com | "2019-07-20 02:40:10.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f10 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" -orderer0.example.com | "2019-07-20 02:40:10.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f11 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.2µs " -orderer0.example.com | "2019-07-20 02:40:10.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:10.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 635.4µs " -orderer0.example.com | "2019-07-20 02:40:10.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f14 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:10.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f15 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:10.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" -orderer0.example.com | "2019-07-20 02:40:10.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231µs " -orderer0.example.com | "2019-07-20 02:40:10.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f18 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" -orderer0.example.com | "2019-07-20 02:40:10.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f19 Sending msg of 28 bytes to 3 on channel businesschannel took 9.2µs" -orderer0.example.com | "2019-07-20 02:40:10.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.6µs " -orderer0.example.com | "2019-07-20 02:40:10.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 182.1µs " -orderer0.example.com | "2019-07-20 02:40:10.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:10.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:10.978 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:10.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1f Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" -orderer0.example.com | "2019-07-20 02:40:10.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU f20 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.2µs " -orderer0.example.com | "2019-07-20 02:40:11.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f21 Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" -orderer0.example.com | "2019-07-20 02:40:11.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f22 Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" -orderer0.example.com | "2019-07-20 02:40:11.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203.9µs " -orderer0.example.com | "2019-07-20 02:40:11.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2578ms " -orderer0.example.com | "2019-07-20 02:40:11.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f25 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:11.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f26 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:11.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f27 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:11.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" -orderer0.example.com | "2019-07-20 02:40:11.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f29 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.6µs " -orderer0.example.com | "2019-07-20 02:40:11.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2a Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" -orderer0.example.com | "2019-07-20 02:40:11.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2b Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" -orderer0.example.com | "2019-07-20 02:40:11.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 443.1µs " -orderer0.example.com | "2019-07-20 02:40:11.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.5µs " -orderer0.example.com | "2019-07-20 02:40:11.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:11.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:11.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f30 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:11.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" -orderer0.example.com | "2019-07-20 02:40:11.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.5µs " -orderer0.example.com | "2019-07-20 02:40:12.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f33 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" -orderer0.example.com | "2019-07-20 02:40:12.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f35 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" -orderer0.example.com | "2019-07-20 02:40:12.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.8µs " -orderer0.example.com | "2019-07-20 02:40:12.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.5µs " -orderer0.example.com | "2019-07-20 02:40:12.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f37 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:12.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU f38 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:12.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f39 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:12.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" -orderer0.example.com | "2019-07-20 02:40:12.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " -orderer0.example.com | "2019-07-20 02:40:12.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3c Sending msg of 28 bytes to 2 on channel businesschannel took 192.3µs" -orderer0.example.com | "2019-07-20 02:40:12.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3d Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" -orderer0.example.com | "2019-07-20 02:40:12.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.9µs " -orderer0.example.com | "2019-07-20 02:40:12.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 467.8µs " -orderer0.example.com | "2019-07-20 02:40:12.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f40 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:12.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU f41 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:12.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:12.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" -orderer0.example.com | "2019-07-20 02:40:12.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.3µs " -orderer0.example.com | "2019-07-20 02:40:13.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f45 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" -orderer0.example.com | "2019-07-20 02:40:13.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f46 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" -orderer0.example.com | "2019-07-20 02:40:13.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98µs " -orderer0.example.com | "2019-07-20 02:40:13.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f48 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:13.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f49 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:13.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.8µs " -orderer0.example.com | "2019-07-20 02:40:13.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:13.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" -orderer0.example.com | "2019-07-20 02:40:13.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " -orderer0.example.com | "2019-07-20 02:40:13.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4e Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" -orderer0.example.com | "2019-07-20 02:40:13.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.8µs " -orderer0.example.com | "2019-07-20 02:40:13.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " -orderer0.example.com | "2019-07-20 02:40:13.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:13.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f52 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" -orderer0.example.com | "2019-07-20 02:40:13.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f53 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:13.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f54 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:13.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" -orderer0.example.com | "2019-07-20 02:40:13.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " -orderer0.example.com | "2019-07-20 02:40:14.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f57 Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" -orderer0.example.com | "2019-07-20 02:40:14.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f59 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" -orderer0.example.com | "2019-07-20 02:40:14.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.7µs " -orderer0.example.com | "2019-07-20 02:40:14.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 232.8µs " -orderer0.example.com | "2019-07-20 02:40:14.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:14.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:14.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:14.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" -orderer0.example.com | "2019-07-20 02:40:14.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.5µs " -orderer0.example.com | "2019-07-20 02:40:14.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f60 Sending msg of 28 bytes to 2 on channel businesschannel took 49.7µs" -orderer0.example.com | "2019-07-20 02:40:14.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f61 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" -orderer0.example.com | "2019-07-20 02:40:14.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.2µs " -orderer0.example.com | "2019-07-20 02:40:14.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.5µs " -orderer0.example.com | "2019-07-20 02:40:14.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f64 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:14.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f65 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:14.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f66 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:14.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" -orderer0.example.com | "2019-07-20 02:40:14.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127µs " -orderer0.example.com | "2019-07-20 02:40:15.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f69 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" -orderer0.example.com | "2019-07-20 02:40:15.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6a Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" -orderer0.example.com | "2019-07-20 02:40:15.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.2µs " -orderer0.example.com | "2019-07-20 02:40:15.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 287.9µs " -orderer0.example.com | "2019-07-20 02:40:15.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:15.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:15.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:15.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f70 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" -orderer0.example.com | "2019-07-20 02:40:15.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f71 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " -orderer0.example.com | "2019-07-20 02:40:15.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f72 Sending msg of 28 bytes to 2 on channel businesschannel took 43.8µs" -orderer0.example.com | "2019-07-20 02:40:15.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f74 Sending msg of 28 bytes to 3 on channel businesschannel took 144.4µs" -orderer0.example.com | "2019-07-20 02:40:15.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 311.7µs " -orderer0.example.com | "2019-07-20 02:40:15.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137µs " -orderer0.example.com | "2019-07-20 02:40:15.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f77 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:15.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:15.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f78 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:15.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f79 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" -orderer0.example.com | "2019-07-20 02:40:15.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.8µs " -orderer0.example.com | "2019-07-20 02:40:16.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7b Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" -orderer0.example.com | "2019-07-20 02:40:16.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7c Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" -orderer0.example.com | "2019-07-20 02:40:16.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109µs " -orderer0.example.com | "2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0763ms " -orderer0.example.com | "2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f80 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:16.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f81 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:16.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 3 on channel testchainid took 11.8µs" -peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.discovery] handleAliveMessage -> DEBU e52 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.discovery] isSentByMe -> DEBU e53 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.discovery] handleAliveMessage -> DEBU e54 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU e55 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.310 UTC [gossip.comm] func1 -> DEBU e56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.310 UTC [gossip.gossip] handleMessage -> DEBU e57 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.310 UTC [gossip.gossip] handleMessage -> DEBU e58 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.310 UTC [gossip.discovery] handleMsgFromComm -> DEBU e59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e5a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [msp.identity] Verify -> DEBU e5b Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| -peer0.org1.example.com | 00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [msp.identity] Verify -> DEBU e5c Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| -peer0.org1.example.com | 00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| -peer0.org1.example.com | 00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| -peer0.org1.example.com | 00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| -peer0.org1.example.com | 00000040 3a 67 bb 3e 5f a1 |:g.>_.|" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU e5d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [gossip.discovery] isSentByMe -> DEBU e5e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU e5f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e60 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [msp] DeserializeIdentity -> DEBU e61 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e63 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e64 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e65 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e66 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e68 0xc00296ef30 gate 1563590392311707800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e69 0xc00296ef30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6a 0xc00296ef30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6b 0xc00296ef30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6c 0xc00296ef30 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e6d 0xc00296ef30 gate 1563590392311707800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e6e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e71 0xc00296f790 gate 1563590392311977800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e72 0xc00296f790 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e73 0xc00296f790 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e74 0xc00296f790 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [msp.identity] Verify -> DEBU e75 Verify: digest = 00000000 d6 2f 09 2d ad 6d 35 46 ef 78 7f 01 4b 0a 64 8f |./.-.m5F.x..K.d.| -peer0.org1.example.com | 00000010 9f f9 82 5c 30 f3 ec 10 d1 1f ff e0 65 33 67 99 |...\0.......e3g.|" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [msp.identity] Verify -> DEBU e76 Verify: sig = 00000000 30 43 02 20 70 69 80 5a d5 34 0d b5 26 14 03 10 |0C. pi.Z.4..&...| -peer0.org1.example.com | 00000010 fb 41 16 50 4f 1f b4 ef 20 e7 09 ec c4 47 0a d2 |.A.PO... ....G..| -peer0.org1.example.com | 00000020 25 f4 2f b3 02 1f 78 22 08 c9 cf fd 7b 28 d6 20 |%./...x"....{(. | -peer0.org1.example.com | 00000030 c6 5b 85 e1 a8 08 52 47 d6 21 31 13 1e e1 e1 8e |.[....RG.!1.....| -peer0.org1.example.com | 00000040 32 48 30 50 b8 |2H0P.|" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e77 0xc00296f790 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [cauthdsl] func1 -> DEBU e78 0xc00296f790 gate 1563590392311977800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e79 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [gossip.discovery] handleAliveMessage -> DEBU e7d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [gossip.discovery] handleAliveMessage -> DEBU e7e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU e7f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.comm] func1 -> DEBU e80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.gossip] handleMessage -> DEBU e81 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.gossip] handleMessage -> DEBU e82 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU e83 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e84 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e85 Verify: digest = 00000000 c2 f5 97 4c 33 60 7a 9a ba 24 34 c7 47 2b f2 87 |...L3`z..$4.G+..| -peer0.org1.example.com | 00000010 5b eb d2 29 8c 5d a3 17 21 da c7 6e eb 26 41 c2 |[..).]..!..n.&A.|" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e86 Verify: sig = 00000000 30 44 02 20 28 3f 67 32 36 59 d6 73 0d 34 83 bb |0D. (?g26Y.s.4..| -peer0.org1.example.com | 00000010 fa c7 21 82 14 81 c9 3b 8e af a9 c0 1f 11 34 43 |..!....;......4C| -peer0.org1.example.com | 00000020 24 1e f6 50 02 20 0e 15 e6 8b 57 da ce 0f e5 19 |$..P. ....W.....| -peer0.org1.example.com | 00000030 6a 7c 6b 21 aa 6b 16 48 e4 ac 51 9b e3 7d 41 4a |j|k!.k.H..Q..}AJ| -orderer0.example.com | "2019-07-20 02:40:16.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f83 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.4µs " -orderer0.example.com | "2019-07-20 02:40:16.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f84 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" -orderer0.example.com | "2019-07-20 02:40:16.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f85 Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" -orderer0.example.com | "2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.6µs " -orderer0.example.com | "2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.5µs " -orderer0.example.com | "2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU f88 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:16.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f89 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:16.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:16.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" -orderer0.example.com | "2019-07-20 02:40:16.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " -orderer0.example.com | "2019-07-20 02:40:17.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8d Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" -orderer0.example.com | "2019-07-20 02:40:17.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8e Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" -orderer0.example.com | "2019-07-20 02:40:17.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.3µs " -orderer0.example.com | "2019-07-20 02:40:17.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.8µs " -orderer0.example.com | "2019-07-20 02:40:17.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:17.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f92 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:17.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f93 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:17.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 3 on channel testchainid took 8.7µs" -orderer0.example.com | "2019-07-20 02:40:17.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f95 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.1µs " -orderer0.example.com | "2019-07-20 02:40:17.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f96 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" -orderer0.example.com | "2019-07-20 02:40:17.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f97 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" -orderer0.example.com | "2019-07-20 02:40:17.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " -orderer0.example.com | "2019-07-20 02:40:17.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.1µs " -orderer0.example.com | "2019-07-20 02:40:17.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:17.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:17.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:17.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 3 on channel testchainid took 8.8µs" -orderer0.example.com | "2019-07-20 02:40:17.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " -orderer0.example.com | "2019-07-20 02:40:18.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9f Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" -orderer0.example.com | "2019-07-20 02:40:18.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" -orderer0.example.com | "2019-07-20 02:40:18.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " -orderer0.example.com | "2019-07-20 02:40:18.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.8µs " -orderer0.example.com | "2019-07-20 02:40:18.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:18.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:18.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:18.473 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa6 Sending msg of 28 bytes to 3 on channel testchainid took 28.6µs" -orderer0.example.com | "2019-07-20 02:40:18.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.3µs " -orderer0.example.com | "2019-07-20 02:40:18.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa8 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" -peer0.org1.example.com | 00000040 dc a4 f9 81 1a 32 |.....2|" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e87 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e88 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e89 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e8a Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| -peer0.org1.example.com | 00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e8b Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| -peer0.org1.example.com | 00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| -peer0.org1.example.com | 00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| -peer0.org1.example.com | 00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| -peer0.org1.example.com | 00000040 3a 67 bb 3e 5f a1 |:g.>_.|" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e8c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] isSentByMe -> DEBU e8d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e8e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e8f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [msp] DeserializeIdentity -> DEBU e90 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e92 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e93 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU e97 0xc002a63200 gate 1563590392314316100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e98 0xc002a63200 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e99 0xc002a63200 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e9a 0xc002a63200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e9b 0xc002a63200 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU e9c 0xc002a63200 gate 1563590392314316100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU ea0 0xc002a63a40 gate 1563590392314593300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea1 0xc002a63a40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea2 0xc002a63a40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea3 0xc002a63a40 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [msp.identity] Verify -> DEBU ea4 Verify: digest = 00000000 9a 8a 36 66 3a 44 53 60 48 d2 8f ad eb c3 a1 1e |..6f:DS`H.......| -peer0.org1.example.com | 00000010 c7 a1 8f 57 db 61 9d c1 af fd a0 0d 36 8c 83 e9 |...W.a......6...|" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [msp.identity] Verify -> DEBU ea5 Verify: sig = 00000000 30 44 02 20 1a f4 32 3b ae 0e 0d 34 bb 01 06 1d |0D. ..2;...4....| -peer0.org1.example.com | 00000010 b2 bc e1 31 95 d9 71 54 41 b7 28 6e 00 8b 67 f1 |...1..qTA.(n..g.| -peer0.org1.example.com | 00000020 9e bd 75 00 02 20 18 ae a5 a6 57 d9 38 c9 79 91 |..u.. ....W.8.y.| -peer0.org1.example.com | 00000030 32 79 72 74 be a9 8e df ad 40 29 41 e3 cc 4f a5 |2yrt.....@)A..O.| -peer0.org1.example.com | 00000040 bd 87 29 80 ca a0 |..)...|" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea6 0xc002a63a40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU ea7 0xc002a63a40 gate 1563590392314593300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU ea8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU ea9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU eaa Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU eab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU eac Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.315 UTC [gossip.discovery] handleAliveMessage -> DEBU ead Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.315 UTC [gossip.discovery] handleMsgFromComm -> DEBU eae Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.391 UTC [gossip.comm] func1 -> DEBU eaf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -orderer0.example.com | "2019-07-20 02:40:18.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa9 Sending msg of 28 bytes to 3 on channel businesschannel took 37.3µs" -orderer0.example.com | "2019-07-20 02:40:18.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU faa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.8µs " -orderer0.example.com | "2019-07-20 02:40:18.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU fab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.9µs " -orderer0.example.com | "2019-07-20 02:40:18.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:18.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:18.972 UTC [orderer.common.cluster.step] handleMessage -> DEBU fae Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:18.972 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 3 on channel testchainid took 16µs" -orderer0.example.com | "2019-07-20 02:40:18.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.6µs " -orderer0.example.com | "2019-07-20 02:40:19.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb1 Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" -orderer0.example.com | "2019-07-20 02:40:19.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" -orderer0.example.com | "2019-07-20 02:40:19.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.4µs " -orderer0.example.com | "2019-07-20 02:40:19.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.7µs " -orderer0.example.com | "2019-07-20 02:40:19.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:19.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:19.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:19.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 3 on channel testchainid took 11.6µs" -orderer0.example.com | "2019-07-20 02:40:19.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.7µs " -orderer0.example.com | "2019-07-20 02:40:19.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fba Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" -orderer0.example.com | "2019-07-20 02:40:19.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbb Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" -orderer0.example.com | "2019-07-20 02:40:19.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " -orderer0.example.com | "2019-07-20 02:40:19.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 36.7µs " -orderer0.example.com | "2019-07-20 02:40:19.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:19.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:19.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:19.972 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" -orderer0.example.com | "2019-07-20 02:40:19.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " -orderer0.example.com | "2019-07-20 02:40:20.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" -orderer0.example.com | "2019-07-20 02:40:20.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc4 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" -orderer0.example.com | "2019-07-20 02:40:20.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87µs " -orderer0.example.com | "2019-07-20 02:40:20.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.6µs " -orderer0.example.com | "2019-07-20 02:40:20.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:20.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:20.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:20.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fca Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" -orderer0.example.com | "2019-07-20 02:40:20.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.7µs " -orderer0.example.com | "2019-07-20 02:40:20.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcc Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" -orderer0.example.com | "2019-07-20 02:40:20.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcd Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" -orderer0.example.com | "2019-07-20 02:40:20.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.5µs " -peer0.org1.example.com | "2019-07-20 02:39:52.391 UTC [gossip.gossip] handleMessage -> DEBU eb0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.391 UTC [gossip.gossip] handleMessage -> DEBU eb1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.391 UTC [gossip.discovery] handleMsgFromComm -> DEBU eb2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.391 UTC [gossip.gossip] ValidateAliveMsg -> DEBU eb3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [msp.identity] Verify -> DEBU eb4 Verify: digest = 00000000 0d 0e 79 e2 c7 a0 b2 f4 86 a8 d7 59 c5 dd ce 25 |..y........Y...%| -peer0.org1.example.com | 00000010 73 3c bf d7 a7 af d9 2e 52 5b de cf 43 6a eb 96 |s<......R[..Cj..|" -peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [msp.identity] Verify -> DEBU eb5 Verify: sig = 00000000 30 44 02 20 74 3e 42 0d ca 82 d8 7f e9 f7 f7 36 |0D. t>B........6| -peer0.org1.example.com | 00000010 73 e8 71 45 b1 d6 b4 e2 95 f6 7c 70 64 be a3 2b |s.qE......|pd..+| -peer0.org1.example.com | 00000020 b8 64 3d 00 02 20 10 16 37 52 19 4a 6c 6c c5 d5 |.d=.. ..7R.Jll..| -peer0.org1.example.com | 00000030 f3 fc 28 f9 ed 79 8c d1 07 97 71 da 9f 41 e3 d2 |..(..y....q..A..| -peer0.org1.example.com | 00000040 8c 20 f4 cc 9f e5 |. ....|" -peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] handleAliveMessage -> DEBU eb6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb8 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb9 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eba Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU ebb Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] handleAliveMessage -> DEBU ebc Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU ebd Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.394 UTC [gossip.comm] func1 -> DEBU ebe Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.394 UTC [gossip.comm] func1 -> DEBU ebf Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.394 UTC [gossip.gossip] handleMessage -> DEBU ec0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.395 UTC [gossip.pull] HandleMessage -> DEBU ec1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.395 UTC [gossip.pull] SendDigest -> DEBU ec2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:39:52.395 UTC [gossip.gossip] handleMessage -> DEBU ec3 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.396 UTC [gossip.gossip] handleMessage -> DEBU ec4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.396 UTC [gossip.gossip] handleMessage -> DEBU ec5 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU ec6 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-07-20 02:40:20.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1387ms " -orderer0.example.com | "2019-07-20 02:40:20.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:20.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:20.814 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fd2 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39140 with txid '79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f' of type ENDORSER_TRANSACTION" -orderer0.example.com | "2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:20.816 UTC [policies] Evaluate -> DEBU fd7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-07-20 02:40:20.816 UTC [msp] DeserializeIdentity -> DEBU fd8 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:20.816 UTC [msp.identity] newIdentity -> DEBU fd9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:20.817 UTC [cauthdsl] func1 -> DEBU fda 0xc000bfa3b0 gate 1563590420817456800 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:20.817 UTC [cauthdsl] func2 -> DEBU fdb 0xc000bfa3b0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:20.819 UTC [cauthdsl] func2 -> DEBU fdc 0xc000bfa3b0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:20.820 UTC [cauthdsl] func2 -> DEBU fdd 0xc000bfa3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" -orderer0.example.com | "2019-07-20 02:40:20.821 UTC [cauthdsl] func2 -> DEBU fde 0xc000bfa3b0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:20.821 UTC [cauthdsl] func1 -> DEBU fdf 0xc000bfa3b0 gate 1563590420817456800 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:20.821 UTC [policies] Evaluate -> DEBU fe0 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:40:20.822 UTC [policies] Evaluate -> DEBU fe1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:40:20.822 UTC [policies] func1 -> DEBU fe2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -orderer0.example.com | "2019-07-20 02:40:20.823 UTC [policies] Evaluate -> DEBU fe3 Signature set did not satisfy policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-07-20 02:40:20.824 UTC [cauthdsl] func1 -> DEBU fe8 0xc000bfb9e0 gate 1563590420824690400 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:20.824 UTC [cauthdsl] func2 -> DEBU fe9 0xc000bfb9e0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:20.825 UTC [cauthdsl] func2 -> DEBU fea 0xc000bfb9e0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:20.825 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU feb Checking if identity satisfies MEMBER role for Org1MSP" -orderer0.example.com | "2019-07-20 02:40:20.825 UTC [msp] Validate -> DEBU fec MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:40:20.826 UTC [msp] getCertificationChain -> DEBU fed MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:20.826 UTC [cauthdsl] func2 -> DEBU fee 0xc000bfb9e0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:20.826 UTC [msp.identity] Verify -> DEBU fef Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| -orderer0.example.com | 00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" -orderer0.example.com | "2019-07-20 02:40:20.826 UTC [msp.identity] Verify -> DEBU ff0 Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| -orderer0.example.com | 00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| -orderer0.example.com | 00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| -orderer0.example.com | 00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| -orderer0.example.com | 00000040 d7 3e d5 8f e5 b0 |.>....|" -orderer0.example.com | "2019-07-20 02:40:20.827 UTC [cauthdsl] func2 -> DEBU ff1 0xc000bfb9e0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:20.827 UTC [cauthdsl] func1 -> DEBU ff2 0xc000bfb9e0 gate 1563590420824690400 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff3 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff5 Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff7 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:20.830 UTC [orderer.common.blockcutter] Ordered -> DEBU ff9 Enqueuing message into batch" -orderer0.example.com | "2019-07-20 02:40:20.830 UTC [orderer.common.broadcast] ProcessMessage -> DEBU ffa [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39140" -peer0.org1.example.com | "2019-07-20 02:39:52.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ec7 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU ec8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU ec9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU eca Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] Send -> DEBU ecb Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [msp] DeserializeIdentity -> DEBU ecc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] Send -> DEBU ecd Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ece Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ecf Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ed0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ed1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.401 UTC [gossip.comm] func1 -> DEBU ed2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.401 UTC [gossip.gossip] handleMessage -> DEBU ed3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.401 UTC [msp.identity] Verify -> DEBU ed4 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| -peer0.org1.example.com | 00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" -peer0.org1.example.com | "2019-07-20 02:39:52.401 UTC [msp.identity] Verify -> DEBU ed5 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| -peer0.org1.example.com | 00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| -peer0.org1.example.com | 00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| -peer0.org1.example.com | 00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| -peer0.org1.example.com | 00000040 77 5f b8 b7 06 c1 |w_....|" -peer0.org1.example.com | "2019-07-20 02:39:52.402 UTC [msp.identity] Verify -> DEBU ed6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:39:52.402 UTC [msp.identity] Verify -> DEBU ed7 Verify: sig = 00000000 30 44 02 20 50 d8 3b 18 9a 9e c0 8a aa f3 df 03 |0D. P.;.........| -peer0.org1.example.com | 00000010 c8 ce 20 d0 e5 43 96 93 79 64 50 6b 2d 04 29 d3 |.. ..C..ydPk-.).| -peer0.org1.example.com | 00000020 79 c1 8f c8 02 20 53 87 e9 bf 2f 79 d1 10 ea c0 |y.... S.../y....| -peer0.org1.example.com | 00000030 19 58 40 c3 d7 61 06 5a f9 77 66 b7 96 3d 57 c8 |.X@..a.Z.wf..=W.| -peer0.org1.example.com | 00000040 dd 94 b9 6b 70 ac |...kp.|" -peer0.org1.example.com | "2019-07-20 02:39:52.403 UTC [gossip.discovery] handleAliveMessage -> DEBU ed8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.403 UTC [gossip.discovery] learnExistingMembers -> DEBU ed9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:52.403 UTC [gossip.discovery] learnExistingMembers -> DEBU eda updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edc Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edd Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.404 UTC [gossip.discovery] handleAliveMessage -> DEBU ede Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU edf Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.discovery] sendMemResponse -> DEBU ee0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [msp] DeserializeIdentity -> DEBU ee1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [msp] DeserializeIdentity -> DEBU ee2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.comm] Send -> DEBU ee3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -orderer0.example.com | "2019-07-20 02:40:20.833 UTC [orderer.common.broadcast] Handle -> WARN ffb Error reading from 172.18.0.9:39140: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:20.834 UTC [orderer.common.server] func1 -> DEBU ffc Closing Broadcast stream" -orderer0.example.com | "2019-07-20 02:40:20.834 UTC [comm.grpc.server] 1 -> INFO ffd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39140 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.1246301s -orderer0.example.com | "2019-07-20 02:40:20.837 UTC [grpc] infof -> DEBU ffe transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:20.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU fff Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:20.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1000 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" -orderer0.example.com | "2019-07-20 02:40:20.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1001 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68µs " -orderer0.example.com | "2019-07-20 02:40:22.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1002 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" -orderer0.example.com | "2019-07-20 02:40:22.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1004 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" -orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1005 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " -orderer0.example.com | "2019-07-20 02:40:22.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1003 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1006 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.3µs " -orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1007 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1008 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" -orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1009 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52µs " -orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 3 on channel testchainid took 12µs" -orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.6µs " -orderer0.example.com | "2019-07-20 02:40:22.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.009 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100e Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" -orderer0.example.com | "2019-07-20 02:40:22.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100f Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" -orderer0.example.com | "2019-07-20 02:40:22.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1010 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 451.9µs " -orderer0.example.com | "2019-07-20 02:40:22.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1011 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.6µs " -orderer0.example.com | "2019-07-20 02:40:22.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1012 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1013 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.473 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1014 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.474 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1015 Sending msg of 28 bytes to 3 on channel testchainid took 22µs" -orderer0.example.com | "2019-07-20 02:40:22.475 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1016 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.9µs " -orderer0.example.com | "2019-07-20 02:40:22.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1017 Sending msg of 28 bytes to 2 on channel businesschannel took 33.7µs" -orderer0.example.com | "2019-07-20 02:40:22.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1018 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 727µs " -orderer0.example.com | "2019-07-20 02:40:22.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1019 Sending msg of 28 bytes to 3 on channel businesschannel took 282.7µs" -orderer0.example.com | "2019-07-20 02:40:22.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.5µs " -orderer0.example.com | "2019-07-20 02:40:22.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.831 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 101d Batch timer expired, creating block" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:22.831 UTC [orderer.consensus.etcdraft] propose -> INFO 101e Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:22.833 UTC [orderer.consensus.etcdraft] 2 -> DEBU 101f Proposed block [3] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:22.835 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1020 Sending msg of 3650 bytes to 2 on channel businesschannel took 16.8µs" -orderer0.example.com | "2019-07-20 02:40:22.835 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1021 Sending msg of 3650 bytes to 3 on channel businesschannel took 21.2µs" -orderer0.example.com | "2019-07-20 02:40:22.835 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1022 Send of ConsensusRequest for channel businesschannel with payload of size 3650 to orderer1.example.com(orderer1.example.com:7050) took 121µs " -orderer0.example.com | "2019-07-20 02:40:22.835 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1023 Send of ConsensusRequest for channel businesschannel with payload of size 3650 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1024 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 2 on channel businesschannel took 10.3µs" -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1026 Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1027 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.8µs " -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1028 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1029 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 102a [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 102b Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 102c Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [msp.identity] Sign -> DEBU 102d Sign: plaintext: 0A020802120B0A090A03010203100418...CB2402E5A0B3BA87B6BF21DA5A95E292 " -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [msp.identity] Sign -> DEBU 102e Sign: digest: 6AFBD00D77A5732785EA5D33CF685F7A83868270E23725D9865CFE05D8FF32A5 " -orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.5µs " -orderer0.example.com | "2019-07-20 02:40:22.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1030 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.842 UTC [fsblkstorage] indexBlock -> DEBU 1031 Indexing block [blockNum=3, blockHash=[]byte{0x18, 0x70, 0x86, 0xed, 0x63, 0x58, 0x1a, 0xe8, 0x75, 0x8c, 0x4e, 0x43, 0x60, 0x90, 0xd4, 0xe2, 0xe5, 0xb8, 0x6b, 0x53, 0x15, 0x11, 0x95, 0xd4, 0xe0, 0xf8, 0xb9, 0xcf, 0x43, 0x25, 0x9d, 0x7f} txOffsets= -orderer0.example.com | txId=79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f locPointer=offset=70, bytesLength=3522 -orderer0.example.com | ]" -orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] updateCheckpoint -> DEBU 1032 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[75919], isChainEmpty=[false], lastBlockNumber=[3]" -orderer0.example.com | "2019-07-20 02:40:22.843 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1033 [channel: businesschannel] Wrote block [3]" -orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] waitForBlock -> DEBU 1034 Came out of wait. maxAvailaBlockNumber=[3]" -orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1035 Remaining bytes=[4529], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1036 Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" -orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1037 blockbytes [4527] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:22.843 UTC [common.deliver] deliverBlocks -> DEBU 1038 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] waitForBlock -> DEBU 1039 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" -orderer0.example.com | "2019-07-20 02:40:22.848 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:22.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103c Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" -orderer0.example.com | "2019-07-20 02:40:22.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.1µs " -orderer0.example.com | "2019-07-20 02:40:23.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103e Sending msg of 28 bytes to 2 on channel businesschannel took 29.8µs" -orderer0.example.com | "2019-07-20 02:40:23.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103f Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" -orderer0.example.com | "2019-07-20 02:40:23.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1040 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.5µs " -orderer0.example.com | "2019-07-20 02:40:23.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1041 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 795.8µs " -orderer0.example.com | "2019-07-20 02:40:23.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1042 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:23.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1043 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:23.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1044 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:23.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1045 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" -orderer0.example.com | "2019-07-20 02:40:23.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1046 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 529.5µs " -orderer0.example.com | "2019-07-20 02:40:23.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" -orderer0.example.com | "2019-07-20 02:40:23.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1048 Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" -orderer0.example.com | "2019-07-20 02:40:23.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1049 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 442.9µs " -orderer0.example.com | "2019-07-20 02:40:23.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 718.6µs " -orderer0.example.com | "2019-07-20 02:40:23.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:23.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:23.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:23.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104e Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" -orderer0.example.com | "2019-07-20 02:40:23.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " -orderer0.example.com | "2019-07-20 02:40:24.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1050 Sending msg of 28 bytes to 2 on channel businesschannel took 44.9µs" -orderer0.example.com | "2019-07-20 02:40:24.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1051 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" -orderer0.example.com | "2019-07-20 02:40:24.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1052 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " -orderer0.example.com | "2019-07-20 02:40:24.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1053 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 682.6µs " -orderer0.example.com | "2019-07-20 02:40:24.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1054 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:24.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1055 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:24.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1056 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:24.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1057 Sending msg of 28 bytes to 3 on channel testchainid took 36.9µs" -orderer0.example.com | "2019-07-20 02:40:24.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1058 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " -orderer0.example.com | "2019-07-20 02:40:24.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1059 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" -orderer0.example.com | "2019-07-20 02:40:24.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105a Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" -orderer0.example.com | "2019-07-20 02:40:24.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.9µs " -orderer0.example.com | "2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.8µs " -orderer0.example.com | "2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:24.772 UTC [orderer.common.server] Broadcast -> DEBU 105f Starting new Broadcast handler" -orderer0.example.com | "2019-07-20 02:40:24.772 UTC [orderer.common.broadcast] Handle -> DEBU 1060 Starting new broadcast loop for 172.18.0.9:39158" -orderer0.example.com | "2019-07-20 02:40:24.808 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1061 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39158 with txid '3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732' of type ENDORSER_TRANSACTION" -orderer0.example.com | "2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1062 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1063 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1064 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-07-20 02:40:24.810 UTC [policies] Evaluate -> DEBU 1065 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:24.810 UTC [policies] Evaluate -> DEBU 1066 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-07-20 02:40:24.810 UTC [cauthdsl] func1 -> DEBU 1067 0xc000fa8c70 gate 1563590424810651600 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:24.810 UTC [cauthdsl] func2 -> DEBU 1068 0xc000fa8c70 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:24.811 UTC [cauthdsl] func2 -> DEBU 1069 0xc000fa8c70 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:24.811 UTC [cauthdsl] func2 -> DEBU 106a 0xc000fa8c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" -orderer0.example.com | "2019-07-20 02:40:24.812 UTC [cauthdsl] func2 -> DEBU 106b 0xc000fa8c70 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:24.812 UTC [cauthdsl] func1 -> DEBU 106c 0xc000fa8c70 gate 1563590424810651600 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:24.812 UTC [policies] Evaluate -> DEBU 106d Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:40:24.812 UTC [policies] Evaluate -> DEBU 106e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:40:24.813 UTC [policies] func1 -> DEBU 106f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -orderer0.example.com | "2019-07-20 02:40:24.813 UTC [policies] Evaluate -> DEBU 1070 Signature set did not satisfy policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:24.813 UTC [policies] Evaluate -> DEBU 1071 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1072 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1073 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1074 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-07-20 02:40:24.815 UTC [cauthdsl] func1 -> DEBU 1075 0xc000fa9960 gate 1563590424814985400 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:24.815 UTC [cauthdsl] func2 -> DEBU 1076 0xc000fa9960 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:24.815 UTC [cauthdsl] func2 -> DEBU 1077 0xc000fa9960 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:24.816 UTC [cauthdsl] func2 -> DEBU 1078 0xc000fa9960 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:24.816 UTC [msp.identity] Verify -> DEBU 1079 Verify: digest = 00000000 97 03 8b 29 3b d7 61 87 c0 b1 9e e0 d5 e5 59 bf |...);.a.......Y.| -orderer0.example.com | 00000010 90 93 46 3e 70 6d ee 67 fe cd 38 32 fe 22 66 b0 |..F>pm.g..82."f.|" -orderer0.example.com | "2019-07-20 02:40:24.816 UTC [msp.identity] Verify -> DEBU 107a Verify: sig = 00000000 30 45 02 21 00 a8 a2 93 b5 4c 8c 0c 6b 3e 06 99 |0E.!.....L..k>..| -orderer0.example.com | 00000010 37 7b a3 55 44 c0 5e fc a4 0d f6 f7 d1 98 27 42 |7{.UD.^.......'B| -orderer0.example.com | 00000020 53 8c 9b 56 17 02 20 42 ff 25 02 18 bc cb 75 a0 |S..V.. B.%....u.| -orderer0.example.com | 00000030 32 02 be 09 df a4 6d ad 1b 05 12 07 ec 58 2d e3 |2.....m......X-.| -orderer0.example.com | 00000040 95 b0 80 c3 bc 80 99 |.......|" -orderer0.example.com | "2019-07-20 02:40:24.817 UTC [cauthdsl] func2 -> DEBU 107b 0xc000fa9960 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:24.817 UTC [cauthdsl] func1 -> DEBU 107c 0xc000fa9960 gate 1563590424814985400 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:24.817 UTC [policies] Evaluate -> DEBU 107d Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 107e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 107f Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 1080 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 1081 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:24.819 UTC [policies] Evaluate -> DEBU 1082 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:24.819 UTC [orderer.common.blockcutter] Ordered -> DEBU 1083 Enqueuing message into batch" -orderer0.example.com | "2019-07-20 02:40:24.820 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1084 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39158" -orderer0.example.com | "2019-07-20 02:40:24.825 UTC [orderer.common.broadcast] Handle -> WARN 1085 Error reading from 172.18.0.9:39158: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:24.825 UTC [orderer.common.server] func1 -> DEBU 1086 Closing Broadcast stream" -orderer0.example.com | "2019-07-20 02:40:24.825 UTC [comm.grpc.server] 1 -> INFO 1087 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39158 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=52.883ms -orderer0.example.com | "2019-07-20 02:40:24.825 UTC [grpc] infof -> DEBU 1088 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:24.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1089 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:24.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108a Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" -orderer0.example.com | "2019-07-20 02:40:24.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 299.6µs " -orderer0.example.com | "2019-07-20 02:40:25.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108c Sending msg of 28 bytes to 2 on channel businesschannel took 47.9µs" -orderer0.example.com | "2019-07-20 02:40:25.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108d Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" -orderer0.example.com | "2019-07-20 02:40:25.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 599µs " -orderer0.example.com | "2019-07-20 02:40:25.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 223.8µs " -orderer0.example.com | "2019-07-20 02:40:25.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1090 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:25.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1091 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:25.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1092 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:25.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1093 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.5µs " -orderer0.example.com | "2019-07-20 02:40:25.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 28 bytes to 3 on channel testchainid took 368.4µs" -orderer0.example.com | "2019-07-20 02:40:25.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1095 Sending msg of 28 bytes to 2 on channel businesschannel took 44.7µs" -orderer0.example.com | "2019-07-20 02:40:25.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1096 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" -orderer0.example.com | "2019-07-20 02:40:25.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1097 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " -orderer0.example.com | "2019-07-20 02:40:25.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1098 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 670.1µs " -orderer0.example.com | "2019-07-20 02:40:25.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1099 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:25.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:25.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:25.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.6µs " -orderer0.example.com | "2019-07-20 02:40:25.973 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109d Sending msg of 28 bytes to 3 on channel testchainid took 1.8469ms" -orderer0.example.com | "2019-07-20 02:40:26.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109e Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" -orderer0.example.com | "2019-07-20 02:40:26.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109f Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" -orderer0.example.com | "2019-07-20 02:40:26.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 356.5µs " -orderer0.example.com | "2019-07-20 02:40:26.226 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.2µs " -orderer0.example.com | "2019-07-20 02:40:26.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:26.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:26.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:26.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a5 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" -orderer0.example.com | "2019-07-20 02:40:26.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.5µs " -orderer0.example.com | "2019-07-20 02:40:26.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a7 Sending msg of 28 bytes to 2 on channel businesschannel took 124.7µs" -orderer0.example.com | "2019-07-20 02:40:26.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a8 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" -orderer0.example.com | "2019-07-20 02:40:26.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 298.8µs " -orderer0.example.com | "2019-07-20 02:40:26.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 276.4µs " -orderer0.example.com | "2019-07-20 02:40:26.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ab Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:26.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:26.820 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 10ad Batch timer expired, creating block" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:26.820 UTC [orderer.consensus.etcdraft] propose -> INFO 10ae Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:26.822 UTC [orderer.consensus.etcdraft] 2 -> DEBU 10af Proposed block [4] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:26.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b0 Sending msg of 3114 bytes to 2 on channel businesschannel took 92.7µs" -orderer0.example.com | "2019-07-20 02:40:26.824 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b1 Sending msg of 3114 bytes to 3 on channel businesschannel took 18µs" -orderer0.example.com | "2019-07-20 02:40:26.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b2 Send of ConsensusRequest for channel businesschannel with payload of size 3114 to orderer1.example.com(orderer1.example.com:7050) took 980.1µs " -orderer0.example.com | "2019-07-20 02:40:26.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b3 Send of ConsensusRequest for channel businesschannel with payload of size 3114 to orderer2.example.com(orderer2.example.com:7050) took 136.3µs " -orderer0.example.com | "2019-07-20 02:40:26.827 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:26.827 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b6 Sending msg of 28 bytes to 2 on channel businesschannel took 15.4µs" -orderer0.example.com | "2019-07-20 02:40:26.828 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b7 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" -orderer0.example.com | "2019-07-20 02:40:26.828 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 10b8 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:26.828 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.5µs " -orderer0.example.com | "2019-07-20 02:40:26.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.2µs " -orderer0.example.com | "2019-07-20 02:40:26.827 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:26.831 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 10bb [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -orderer0.example.com | "2019-07-20 02:40:26.832 UTC [msp] GetDefaultSigningIdentity -> DEBU 10bc Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:40:26.834 UTC [msp] GetDefaultSigningIdentity -> DEBU 10bd Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:40:26.841 UTC [msp.identity] Sign -> DEBU 10be Sign: plaintext: 0A020802120B0A090A03010203100418...52D1A12ABC704D520BFCB3D4E358B2F9 " -orderer0.example.com | "2019-07-20 02:40:26.846 UTC [msp.identity] Sign -> DEBU 10bf Sign: digest: 9216BD0E940C4DE1C355275BEC0E1803FC1B74F267389F1872A2CEC9948411DC " -orderer0.example.com | "2019-07-20 02:40:26.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:26.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:26.859 UTC [fsblkstorage] indexBlock -> DEBU 10c2 Indexing block [blockNum=4, blockHash=[]byte{0xb7, 0x10, 0x53, 0xe8, 0x49, 0x19, 0xe7, 0xf, 0x6f, 0x37, 0xc7, 0x9c, 0x27, 0xaf, 0x1c, 0x10, 0x15, 0x6c, 0xa3, 0xe5, 0x32, 0x4c, 0x6a, 0x2a, 0x4d, 0xc, 0x12, 0xea, 0x60, 0x40, 0x84, 0xb2} txOffsets= -orderer0.example.com | txId=3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 locPointer=offset=70, bytesLength=2986 -orderer0.example.com | ]" -orderer0.example.com | "2019-07-20 02:40:26.871 UTC [fsblkstorage] updateCheckpoint -> DEBU 10c3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[79913], isChainEmpty=[false], lastBlockNumber=[4]" -orderer0.example.com | "2019-07-20 02:40:26.872 UTC [fsblkstorage] waitForBlock -> DEBU 10c4 Came out of wait. maxAvailaBlockNumber=[4]" -orderer0.example.com | "2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c5 Remaining bytes=[3994], Going to peek [8] bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.discovery] sendMemResponse -> DEBU ee4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " -peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.comm] sendToEndpoint -> DEBU ee5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.comm] sendToEndpoint -> DEBU ee6 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.406 UTC [gossip.gossip] handleMessage -> DEBU ee7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU ee8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.406 UTC [gossip.discovery] handleMsgFromComm -> DEBU ee9 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [gossip.comm] func1 -> DEBU eea Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [gossip.gossip] handleMessage -> DEBU eeb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [gossip.pull] HandleMessage -> DEBU eec GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eed Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eee Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eef Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [gossip.pull] SendDigest -> DEBU ef3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [gossip.gossip] handleMessage -> DEBU ef4 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.578 UTC [gossip.comm] func1 -> DEBU ef5 Got message: GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.580 UTC [gossip.gossip] handleMessage -> DEBU ef6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.580 UTC [gossip.gossip] handleMessage -> DEBU ef7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.580 UTC [gossip.discovery] handleMsgFromComm -> DEBU ef8 Got message: GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.581 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ef9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:52.581 UTC [msp] DeserializeIdentity -> DEBU efa Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.581 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU efb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:52.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU efc Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU efd Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.583 UTC [policies] Evaluate -> DEBU efe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.583 UTC [policies] Evaluate -> DEBU eff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:52.584 UTC [policies] Evaluate -> DEBU f00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.584 UTC [cauthdsl] func1 -> DEBU f01 0xc002f5ce70 gate 1563590392584287700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f02 0xc002f5ce70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f03 0xc002f5ce70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f04 0xc002f5ce70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:52.585 UTC [cauthdsl] func2 -> DEBU f05 0xc002f5ce70 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.585 UTC [cauthdsl] func1 -> DEBU f06 0xc002f5ce70 gate 1563590392584287700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f07 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.586 UTC [cauthdsl] func1 -> DEBU f0a 0xc002f5d6b0 gate 1563590392586054100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0b 0xc002f5d6b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0c 0xc002f5d6b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0d 0xc002f5d6b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.587 UTC [msp.identity] Verify -> DEBU f0e Verify: digest = 00000000 4a 76 46 0b 4f 2a e4 ff 21 78 d0 85 80 ae eb 74 |JvF.O*..!x.....t| -peer0.org1.example.com | 00000010 5d 30 24 cc c9 9f 4f ca b6 de ec f2 1f a5 ec 97 |]0$...O.........|" -peer0.org1.example.com | "2019-07-20 02:39:52.587 UTC [msp.identity] Verify -> DEBU f0f Verify: sig = 00000000 30 45 02 21 00 eb 3e 8d 69 89 0c d8 8f f7 5a 50 |0E.!..>.i.....ZP| -peer0.org1.example.com | 00000010 a9 cd 60 cd 06 bb 63 ee f8 40 18 62 d9 6b 8f df |..`...c..@.b.k..| -peer0.org1.example.com | 00000020 a2 0b 90 a6 4b 02 20 79 3e c8 74 e2 42 e5 32 7b |....K. y>.t.B.2{| -peer0.org1.example.com | 00000030 ca 14 da 23 9d 93 28 fe e9 d2 0e f1 be 15 47 61 |...#..(.......Ga| -peer0.org1.example.com | 00000040 6e d8 65 dc d7 b6 e9 |n.e....|" -peer0.org1.example.com | "2019-07-20 02:39:52.588 UTC [cauthdsl] func2 -> DEBU f10 0xc002f5d6b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.588 UTC [cauthdsl] func1 -> DEBU f11 0xc002f5d6b0 gate 1563590392586054100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:52.588 UTC [policies] Evaluate -> DEBU f12 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f14 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.591 UTC [gossip.discovery] handleAliveMessage -> DEBU f16 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.591 UTC [gossip.discovery] learnExistingMembers -> DEBU f17 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f18 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f19 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f1a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f1b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.593 UTC [gossip.discovery] handleAliveMessage -> DEBU f1c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.593 UTC [gossip.discovery] handleMsgFromComm -> DEBU f1d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.593 UTC [gossip.discovery] sendMemResponse -> DEBU f1e Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:39:52.594 UTC [msp] DeserializeIdentity -> DEBU f20 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.595 UTC [msp] DeserializeIdentity -> DEBU f21 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.594 UTC [gossip.comm] func1 -> DEBU f1f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.595 UTC [msp] DeserializeIdentity -> DEBU f22 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.597 UTC [gossip.comm] Send -> DEBU f24 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -orderer0.example.com | "2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c6 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" -orderer0.example.com | "2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c7 blockbytes [3992] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:26.872 UTC [common.deliver] deliverBlocks -> DEBU 10c8 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -orderer0.example.com | "2019-07-20 02:40:26.873 UTC [fsblkstorage] waitForBlock -> DEBU 10c9 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" -orderer0.example.com | "2019-07-20 02:40:26.873 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10ca [channel: businesschannel] Wrote block [4]" -orderer0.example.com | "2019-07-20 02:40:26.974 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:26.975 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cc Sending msg of 28 bytes to 3 on channel testchainid took 35.3µs" -orderer0.example.com | "2019-07-20 02:40:26.977 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " -orderer0.example.com | "2019-07-20 02:40:27.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ce Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" -orderer0.example.com | "2019-07-20 02:40:27.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cf Sending msg of 28 bytes to 3 on channel businesschannel took 23µs" -orderer0.example.com | "2019-07-20 02:40:27.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.4µs " -orderer0.example.com | "2019-07-20 02:40:27.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.5µs " -orderer0.example.com | "2019-07-20 02:40:27.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:27.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:27.478 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:27.481 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d5 Sending msg of 28 bytes to 3 on channel testchainid took 861.8µs" -orderer0.example.com | "2019-07-20 02:40:27.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.2µs " -orderer0.example.com | "2019-07-20 02:40:27.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d7 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" -orderer0.example.com | "2019-07-20 02:40:27.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d8 Sending msg of 28 bytes to 3 on channel businesschannel took 58µs" -orderer0.example.com | "2019-07-20 02:40:27.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320µs " -orderer0.example.com | "2019-07-20 02:40:27.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 191µs " -orderer0.example.com | "2019-07-20 02:40:27.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10db Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:27.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10dc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:27.849 UTC [orderer.common.server] Broadcast -> DEBU 10dd Starting new Broadcast handler" -orderer0.example.com | "2019-07-20 02:40:27.849 UTC [orderer.common.broadcast] Handle -> DEBU 10de Starting new broadcast loop for 172.18.0.9:39172" -orderer0.example.com | "2019-07-20 02:40:27.866 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10df [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39172 with txid 'cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919' of type ENDORSER_TRANSACTION" -orderer0.example.com | "2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-07-20 02:40:27.868 UTC [policies] Evaluate -> DEBU 10e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:27.869 UTC [policies] Evaluate -> DEBU 10e4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-07-20 02:40:27.869 UTC [msp] DeserializeIdentity -> DEBU 10e5 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:27.870 UTC [msp.identity] newIdentity -> DEBU 10e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:27.870 UTC [cauthdsl] func1 -> DEBU 10e7 0xc0011a80e0 gate 1563590427870766300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:27.870 UTC [cauthdsl] func2 -> DEBU 10e8 0xc0011a80e0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:27.871 UTC [cauthdsl] func2 -> DEBU 10e9 0xc0011a80e0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:27.871 UTC [cauthdsl] func2 -> DEBU 10ea 0xc0011a80e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:40:27.872 UTC [cauthdsl] func2 -> DEBU 10eb 0xc0011a80e0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:27.872 UTC [cauthdsl] func1 -> DEBU 10ec 0xc0011a80e0 gate 1563590427870766300 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:27.872 UTC [policies] Evaluate -> DEBU 10ed Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:39:52.596 UTC [gossip.gossip] handleMessage -> DEBU f23 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.597 UTC [gossip.gossip] handleMessage -> DEBU f25 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.597 UTC [gossip.discovery] handleMsgFromComm -> DEBU f26 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.597 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f27 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:52.597 UTC [msp] DeserializeIdentity -> DEBU f28 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f2a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f2b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f2f 0xc002ed18e0 gate 1563590392598463400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f30 0xc002ed18e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f31 0xc002ed18e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f32 0xc002ed18e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f33 0xc002ed18e0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f34 0xc002ed18e0 gate 1563590392598463400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f35 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f38 0xc002fe8120 gate 1563590392598798900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f39 0xc002fe8120 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f3a 0xc002fe8120 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f3b 0xc002fe8120 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [msp.identity] Verify -> DEBU f3c Verify: digest = 00000000 79 30 40 ed d1 f8 6d 03 2e bd d1 77 c6 b7 c6 b2 |y0@...m....w....| -peer0.org1.example.com | 00000010 1b 08 d9 26 3d f2 fb bc 4c 2c 97 63 16 3b 0d 13 |...&=...L,.c.;..|" -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [msp.identity] Verify -> DEBU f3d Verify: sig = 00000000 30 45 02 21 00 a6 80 c1 dd 5d 72 85 0a a3 ec e4 |0E.!.....]r.....| -peer0.org1.example.com | 00000010 cb cb b6 ad 02 4e c7 8d c4 de 48 ee 3c 53 98 f3 |.....N....H. DEBU f3e 0xc002fe8120 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [cauthdsl] func1 -> DEBU f3f 0xc002fe8120 gate 1563590392598798900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f40 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f42 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f44 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f45 endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1563590372570532900, 20 but got ts: inc_num:1563590372570532900 seq_num:19 " -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f46 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU f47 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.comm] sendToEndpoint -> DEBU f48 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.comm] sendToEndpoint -> DEBU f49 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.600 UTC [gossip.comm] func1 -> DEBU f4a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.600 UTC [gossip.gossip] handleMessage -> DEBU f4b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.600 UTC [gossip.gossip] handleMessage -> DEBU f4c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU f4d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU f4e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.601 UTC [gossip.discovery] sendMemResponse -> DEBU f4f Exiting, replying with alive:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " -peer0.org1.example.com | "2019-07-20 02:39:52.601 UTC [gossip.comm] func1 -> DEBU f50 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.603 UTC [gossip.gossip] handleMessage -> DEBU f51 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.603 UTC [gossip.gossip] handleMessage -> DEBU f52 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU f53 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU f54 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f55 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f56 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f57 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f58 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f59 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] Send -> DEBU f5b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] Send -> DEBU f5e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f5f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -orderer0.example.com | "2019-07-20 02:40:27.873 UTC [policies] Evaluate -> DEBU 10ee == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:40:27.873 UTC [policies] func1 -> DEBU 10ef Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -orderer0.example.com | "2019-07-20 02:40:27.877 UTC [policies] Evaluate -> DEBU 10f0 Signature set did not satisfy policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:27.878 UTC [policies] Evaluate -> DEBU 10f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:27.878 UTC [policies] Evaluate -> DEBU 10f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-07-20 02:40:27.879 UTC [policies] Evaluate -> DEBU 10f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:27.880 UTC [policies] Evaluate -> DEBU 10f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-07-20 02:40:27.880 UTC [cauthdsl] func1 -> DEBU 10f5 0xc0011a9710 gate 1563590427880758700 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:27.880 UTC [cauthdsl] func2 -> DEBU 10f6 0xc0011a9710 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:27.881 UTC [cauthdsl] func2 -> DEBU 10f7 0xc0011a9710 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:27.881 UTC [cauthdsl] func2 -> DEBU 10f8 0xc0011a9710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:40:27.882 UTC [cauthdsl] func2 -> DEBU 10f9 0xc0011a9710 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:27.882 UTC [cauthdsl] func1 -> DEBU 10fa 0xc0011a9710 gate 1563590427880758700 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:27.882 UTC [policies] Evaluate -> DEBU 10fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:27.883 UTC [policies] Evaluate -> DEBU 10fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:27.883 UTC [policies] Evaluate -> DEBU 10fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -orderer0.example.com | "2019-07-20 02:40:27.883 UTC [cauthdsl] func1 -> DEBU 10fe 0xc0011a9f70 gate 1563590427883598700 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:27.883 UTC [cauthdsl] func2 -> DEBU 10ff 0xc0011a9f70 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:27.883 UTC [cauthdsl] func2 -> DEBU 1100 0xc0011a9f70 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:27.884 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1101 Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | "2019-07-20 02:40:27.884 UTC [msp] Validate -> DEBU 1102 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:40:27.884 UTC [msp] getCertificationChain -> DEBU 1103 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:27.885 UTC [cauthdsl] func2 -> DEBU 1104 0xc0011a9f70 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:27.885 UTC [msp.identity] Verify -> DEBU 1105 Verify: digest = 00000000 fd 67 c4 b0 85 cb 38 56 50 7e bc 5b 91 c9 58 f5 |.g....8VP~.[..X.| -orderer0.example.com | 00000010 d8 6f d5 69 72 ea 09 87 2f 36 f6 5d 04 12 22 2b |.o.ir.../6.].."+|" -orderer0.example.com | "2019-07-20 02:40:27.885 UTC [msp.identity] Verify -> DEBU 1106 Verify: sig = 00000000 30 44 02 20 6c 40 9e 5f c4 72 dd 46 9b 91 56 5c |0D. l@._.r.F..V\| -orderer0.example.com | 00000010 4c 18 86 1b c3 d0 4f 1a 42 2d 3b 24 98 d0 7e 33 |L.....O.B-;$..~3| -orderer0.example.com | 00000020 8b c1 0d 20 02 20 05 cc d8 dd a6 4e e6 f7 e2 5e |... . .....N...^| -orderer0.example.com | 00000030 96 b7 47 f1 4b d9 8a f6 0a 37 5b 58 02 60 01 93 |..G.K....7[X.`..| -orderer0.example.com | 00000040 f3 e2 8c ca 4c 85 |....L.|" -orderer0.example.com | "2019-07-20 02:40:27.886 UTC [cauthdsl] func2 -> DEBU 1107 0xc0011a9f70 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:27.886 UTC [cauthdsl] func1 -> DEBU 1108 0xc0011a9f70 gate 1563590427883598700 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:27.886 UTC [policies] Evaluate -> DEBU 1109 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:27.887 UTC [policies] Evaluate -> DEBU 110a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:27.887 UTC [policies] Evaluate -> DEBU 110b Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110d Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:27.888 UTC [orderer.common.blockcutter] Ordered -> DEBU 110f Enqueuing message into batch" -orderer0.example.com | "2019-07-20 02:40:27.889 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1110 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39172" -orderer0.example.com | "2019-07-20 02:40:27.897 UTC [grpc] warningf -> DEBU 1111 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39172: read: connection reset by peer" -orderer0.example.com | "2019-07-20 02:40:27.901 UTC [grpc] infof -> DEBU 1112 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:27.902 UTC [orderer.common.broadcast] Handle -> WARN 1113 Error reading from 172.18.0.9:39172: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:27.902 UTC [orderer.common.server] func1 -> DEBU 1114 Closing Broadcast stream" -orderer0.example.com | "2019-07-20 02:40:27.903 UTC [comm.grpc.server] 1 -> INFO 1115 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39172 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.0506ms -orderer0.example.com | "2019-07-20 02:40:27.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1116 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:27.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1117 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" -orderer0.example.com | "2019-07-20 02:40:27.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1118 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.4µs " -orderer0.example.com | "2019-07-20 02:40:28.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" -orderer0.example.com | "2019-07-20 02:40:28.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111b Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" -orderer0.example.com | "2019-07-20 02:40:28.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 405µs " -orderer0.example.com | "2019-07-20 02:40:28.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.9µs " -orderer0.example.com | "2019-07-20 02:40:28.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:28.232 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:28.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:28.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1120 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" -orderer0.example.com | "2019-07-20 02:40:28.474 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1121 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 450.9µs " -orderer0.example.com | "2019-07-20 02:40:28.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 2 on channel businesschannel took 39.2µs" -orderer0.example.com | "2019-07-20 02:40:28.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1123 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" -orderer0.example.com | "2019-07-20 02:40:28.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1124 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.4µs " -orderer0.example.com | "2019-07-20 02:40:28.730 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1125 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0312ms " -orderer0.example.com | "2019-07-20 02:40:28.731 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1126 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:28.732 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1127 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:28.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1128 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:28.974 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1129 Sending msg of 28 bytes to 3 on channel testchainid took 50.1µs" -orderer0.example.com | "2019-07-20 02:40:28.975 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.4µs " -orderer0.example.com | "2019-07-20 02:40:29.226 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112b Sending msg of 28 bytes to 2 on channel businesschannel took 40.1µs" -orderer0.example.com | "2019-07-20 02:40:29.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.2µs " -orderer0.example.com | "2019-07-20 02:40:29.226 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112d Sending msg of 28 bytes to 3 on channel businesschannel took 28.4µs" -orderer0.example.com | "2019-07-20 02:40:29.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 247.4µs " -orderer0.example.com | "2019-07-20 02:40:29.232 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:29.233 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1130 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:29.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1131 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:29.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1132 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" -orderer0.example.com | "2019-07-20 02:40:29.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1133 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " -orderer0.example.com | "2019-07-20 02:40:29.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 28 bytes to 3 on channel businesschannel took 32.1µs" -orderer0.example.com | "2019-07-20 02:40:29.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1135 Sending msg of 28 bytes to 2 on channel businesschannel took 258.8µs" -orderer0.example.com | "2019-07-20 02:40:29.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.3µs " -orderer0.example.com | "2019-07-20 02:40:29.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1137 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 584.7µs " -orderer0.example.com | "2019-07-20 02:40:29.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1138 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:29.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:29.890 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 113a Batch timer expired, creating block" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:29.890 UTC [orderer.consensus.etcdraft] propose -> INFO 113b Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:29.891 UTC [orderer.consensus.etcdraft] 2 -> DEBU 113c Proposed block [5] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:29.894 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 3112 bytes to 3 on channel businesschannel took 17µs" -orderer0.example.com | "2019-07-20 02:40:29.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113f Sending msg of 3112 bytes to 2 on channel businesschannel took 17.3µs" -orderer0.example.com | "2019-07-20 02:40:29.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel businesschannel with payload of size 3112 to orderer2.example.com(orderer2.example.com:7050) took 140.5µs " -orderer0.example.com | "2019-07-20 02:40:29.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1140 Send of ConsensusRequest for channel businesschannel with payload of size 3112 to orderer1.example.com(orderer1.example.com:7050) took 79.2µs " -orderer0.example.com | "2019-07-20 02:40:29.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1141 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:29.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1142 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:29.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1143 Sending msg of 28 bytes to 2 on channel businesschannel took 13.7µs" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f60 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f61 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f62 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.752 UTC [msp] DeserializeIdentity -> DEBU f63 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.752 UTC [msp] DeserializeIdentity -> DEBU f64 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.752 UTC [gossip.comm] Send -> DEBU f65 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.752 UTC [gossip.comm] sendToEndpoint -> DEBU f66 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.752 UTC [gossip.comm] sendToEndpoint -> DEBU f67 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f68 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f69 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f6a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f6b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.754 UTC [gossip.comm] func1 -> DEBU f6c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.754 UTC [gossip.gossip] handleMessage -> DEBU f6e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f6f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f70 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f71 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f72 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:39:52.756 UTC [gossip.comm] func1 -> DEBU f73 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.756 UTC [msp] DeserializeIdentity -> DEBU f74 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.754 UTC [gossip.comm] func1 -> DEBU f6d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.756 UTC [msp] DeserializeIdentity -> DEBU f75 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.757 UTC [msp] DeserializeIdentity -> DEBU f76 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.757 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f77 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:52.758 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f79 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.757 UTC [msp] DeserializeIdentity -> DEBU f78 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:29.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1145 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.2µs " -orderer0.example.com | "2019-07-20 02:40:29.899 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1144 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:29.900 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1146 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -orderer0.example.com | "2019-07-20 02:40:29.900 UTC [msp] GetDefaultSigningIdentity -> DEBU 1147 Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:40:29.900 UTC [msp] GetDefaultSigningIdentity -> DEBU 1148 Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:40:29.900 UTC [msp.identity] Sign -> DEBU 1149 Sign: plaintext: 0A020802120B0A090A03010203100418...03E90289BE6FEC11C4DE24D2242E81F9 " -orderer0.example.com | "2019-07-20 02:40:29.900 UTC [msp.identity] Sign -> DEBU 114a Sign: digest: 0CA473387D6CDB7D787CDA3D7B85AE1D177FA930A3C5FDFB7F504D999C61315F " -orderer0.example.com | "2019-07-20 02:40:29.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114b Sending msg of 28 bytes to 3 on channel businesschannel took 893.6µs" -orderer0.example.com | "2019-07-20 02:40:29.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.5µs " -orderer0.example.com | "2019-07-20 02:40:29.902 UTC [fsblkstorage] indexBlock -> DEBU 114d Indexing block [blockNum=5, blockHash=[]byte{0x91, 0x57, 0x90, 0x2d, 0xf6, 0xfd, 0xb5, 0x4d, 0x5e, 0x9f, 0x17, 0xe5, 0xf6, 0x19, 0x33, 0xf, 0xd2, 0x27, 0x45, 0x3, 0x6c, 0x2, 0x3e, 0x8d, 0x6d, 0x3b, 0xa6, 0x3e, 0x8b, 0x83, 0x1b, 0x53} txOffsets= -orderer0.example.com | txId=cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 locPointer=offset=70, bytesLength=2984 -orderer0.example.com | ]" -orderer0.example.com | "2019-07-20 02:40:29.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:29.905 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:29.906 UTC [fsblkstorage] updateCheckpoint -> DEBU 1150 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[83904], isChainEmpty=[false], lastBlockNumber=[5]" -orderer0.example.com | "2019-07-20 02:40:29.907 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1151 [channel: businesschannel] Wrote block [5]" -orderer0.example.com | "2019-07-20 02:40:29.909 UTC [fsblkstorage] waitForBlock -> DEBU 1152 Came out of wait. maxAvailaBlockNumber=[5]" -orderer0.example.com | "2019-07-20 02:40:29.913 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1153 Remaining bytes=[3991], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:29.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1154 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" -orderer0.example.com | "2019-07-20 02:40:29.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1155 blockbytes [3989] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:29.914 UTC [common.deliver] deliverBlocks -> DEBU 1156 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -orderer0.example.com | "2019-07-20 02:40:29.914 UTC [fsblkstorage] waitForBlock -> DEBU 1157 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -orderer0.example.com | "2019-07-20 02:40:29.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1158 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:29.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1159 Sending msg of 28 bytes to 3 on channel testchainid took 134.1µs" -orderer0.example.com | "2019-07-20 02:40:29.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.4µs " -orderer0.example.com | "2019-07-20 02:40:30.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115b Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" -orderer0.example.com | "2019-07-20 02:40:30.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115c Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" -orderer0.example.com | "2019-07-20 02:40:30.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 408.2µs " -orderer0.example.com | "2019-07-20 02:40:30.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 201.3µs " -orderer0.example.com | "2019-07-20 02:40:30.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:30.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1160 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:30.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1161 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:30.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1162 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" -orderer0.example.com | "2019-07-20 02:40:30.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1163 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " -orderer0.example.com | "2019-07-20 02:40:30.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1164 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" -orderer0.example.com | "2019-07-20 02:40:30.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1165 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" -orderer0.example.com | "2019-07-20 02:40:30.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1166 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 327.6µs " -orderer0.example.com | "2019-07-20 02:40:30.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1167 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 471.7µs " -orderer0.example.com | "2019-07-20 02:40:30.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1168 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:30.698 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1169 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:30.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:30.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116b Sending msg of 28 bytes to 3 on channel testchainid took 316.3µs" -peer0.org1.example.com | "2019-07-20 02:39:52.758 UTC [gossip.pull] Hello -> DEBU f7a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:52.758 UTC [msp] DeserializeIdentity -> DEBU f7b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.759 UTC [msp] DeserializeIdentity -> DEBU f7c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.759 UTC [gossip.comm] Send -> DEBU f7d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU f7e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU f7f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.760 UTC [gossip.comm] func1 -> DEBU f80 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.762 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f81 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.762 UTC [policies] Evaluate -> DEBU f82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.763 UTC [policies] Evaluate -> DEBU f83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:52.763 UTC [policies] Evaluate -> DEBU f84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.763 UTC [cauthdsl] func1 -> DEBU f85 0xc003081170 gate 1563590392763909000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f86 0xc003081170 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f87 0xc003081170 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f88 0xc003081170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f89 0xc003081170 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.765 UTC [cauthdsl] func1 -> DEBU f8a 0xc003081170 gate 1563590392763909000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.765 UTC [policies] Evaluate -> DEBU f8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.766 UTC [policies] Evaluate -> DEBU f8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.766 UTC [policies] Evaluate -> DEBU f8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.767 UTC [cauthdsl] func1 -> DEBU f8e 0xc0030819c0 gate 1563590392767199700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.767 UTC [cauthdsl] func2 -> DEBU f8f 0xc0030819c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.768 UTC [cauthdsl] func2 -> DEBU f90 0xc0030819c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.768 UTC [cauthdsl] func2 -> DEBU f91 0xc0030819c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.769 UTC [msp.identity] Verify -> DEBU f92 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:39:52.769 UTC [msp.identity] Verify -> DEBU f93 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:39:52.770 UTC [cauthdsl] func2 -> DEBU f94 0xc0030819c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.770 UTC [cauthdsl] func1 -> DEBU f95 0xc0030819c0 gate 1563590392767199700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f98 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.771 UTC [policies] Evaluate -> DEBU f99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.771 UTC [gossip.gossip] handleMessage -> DEBU f9a Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.771 UTC [gossip.gossip] handleMessage -> DEBU f9b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.771 UTC [msp] DeserializeIdentity -> DEBU f9c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.772 UTC [msp] DeserializeIdentity -> DEBU f9d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.772 UTC [msp] DeserializeIdentity -> DEBU f9e Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:30.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " -orderer0.example.com | "2019-07-20 02:40:31.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116d Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" -orderer0.example.com | "2019-07-20 02:40:31.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116e Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" -orderer0.example.com | "2019-07-20 02:40:31.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 455.2µs " -orderer0.example.com | "2019-07-20 02:40:31.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1170 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 184.6µs " -orderer0.example.com | "2019-07-20 02:40:31.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1171 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:31.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1172 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:31.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1173 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:31.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1174 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" -orderer0.example.com | "2019-07-20 02:40:31.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1175 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " -orderer0.example.com | "2019-07-20 02:40:31.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1176 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" -orderer0.example.com | "2019-07-20 02:40:31.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1177 Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" -orderer0.example.com | "2019-07-20 02:40:31.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1178 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2436ms " -orderer0.example.com | "2019-07-20 02:40:31.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1179 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.9µs " -orderer0.example.com | "2019-07-20 02:40:31.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:31.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:31.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:31.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117d Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" -orderer0.example.com | "2019-07-20 02:40:31.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.6882ms " -orderer0.example.com | "2019-07-20 02:40:32.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117f Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" -orderer0.example.com | "2019-07-20 02:40:32.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1180 Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" -orderer0.example.com | "2019-07-20 02:40:32.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1181 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.9µs " -orderer0.example.com | "2019-07-20 02:40:32.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1182 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.9µs " -orderer0.example.com | "2019-07-20 02:40:32.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1183 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:32.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1184 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:32.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1185 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:32.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1186 Sending msg of 28 bytes to 3 on channel testchainid took 21.4µs" -orderer0.example.com | "2019-07-20 02:40:32.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1187 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " -orderer0.example.com | "2019-07-20 02:40:32.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1188 Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" -orderer0.example.com | "2019-07-20 02:40:32.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118b Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" -orderer0.example.com | "2019-07-20 02:40:32.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:32.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1189 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 158.9µs " -orderer0.example.com | "2019-07-20 02:40:32.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " -orderer0.example.com | "2019-07-20 02:40:32.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:32.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:32.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118f Sending msg of 28 bytes to 3 on channel testchainid took 51.8µs" -orderer0.example.com | "2019-07-20 02:40:32.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1190 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " -orderer0.example.com | "2019-07-20 02:40:33.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1191 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" -peer0.org1.example.com | "2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f9f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.773 UTC [policies] Evaluate -> DEBU fa2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.773 UTC [policies] Evaluate -> DEBU fa3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:52.774 UTC [policies] Evaluate -> DEBU fa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.774 UTC [cauthdsl] func1 -> DEBU fa5 0xc0030c34d0 gate 1563590392774506200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.774 UTC [cauthdsl] func2 -> DEBU fa6 0xc0030c34d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa7 0xc0030c34d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa8 0xc0030c34d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa9 0xc0030c34d0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.775 UTC [cauthdsl] func1 -> DEBU faa 0xc0030c34d0 gate 1563590392774506200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.775 UTC [policies] Evaluate -> DEBU fab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.776 UTC [policies] Evaluate -> DEBU fac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.776 UTC [policies] Evaluate -> DEBU fad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.777 UTC [cauthdsl] func1 -> DEBU fae 0xc0030c3d10 gate 1563590392776932500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU faf 0xc0030c3d10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU fb0 0xc0030c3d10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU fb1 0xc0030c3d10 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.778 UTC [msp.identity] Verify -> DEBU fb2 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:39:52.778 UTC [msp.identity] Verify -> DEBU fb3 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:39:52.778 UTC [cauthdsl] func2 -> DEBU fb4 0xc0030c3d10 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.778 UTC [cauthdsl] func1 -> DEBU fb5 0xc0030c3d10 gate 1563590392776932500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb8 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fba Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fbb Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fbc Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:39:52.783 UTC [msp.identity] Verify -> DEBU fbd Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:39:52.783 UTC [msp] DeserializeIdentity -> DEBU fbe Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.784 UTC [msp] DeserializeIdentity -> DEBU fbf Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:33.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1192 Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" -orderer0.example.com | "2019-07-20 02:40:33.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1193 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.6µs " -orderer0.example.com | "2019-07-20 02:40:33.204 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1194 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:33.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1195 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 392.4µs " -orderer0.example.com | "2019-07-20 02:40:33.235 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1196 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:33.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1197 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:33.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1198 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " -orderer0.example.com | "2019-07-20 02:40:33.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1199 Sending msg of 28 bytes to 3 on channel testchainid took 111.4µs" -orderer0.example.com | "2019-07-20 02:40:33.617 UTC [orderer.common.server] Deliver -> DEBU 119a Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:33.618 UTC [common.deliver] Handle -> DEBU 119b Starting new deliver loop for 172.18.0.9:39218" -orderer0.example.com | "2019-07-20 02:40:33.618 UTC [common.deliver] Handle -> DEBU 119c Attempting to read seek info message from 172.18.0.9:39218" -orderer0.example.com | "2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 11a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 11a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:33.618 UTC [msp] DeserializeIdentity -> DEBU 11a2 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:33.619 UTC [msp.identity] newIdentity -> DEBU 11a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:33.619 UTC [cauthdsl] func1 -> DEBU 11a4 0xc000f79400 gate 1563590433619571000 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:33.619 UTC [cauthdsl] func2 -> DEBU 11a5 0xc000f79400 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:33.624 UTC [cauthdsl] func2 -> DEBU 11a6 0xc000f79400 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:33.624 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 11a7 Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-07-20 02:40:33.624 UTC [msp] Validate -> DEBU 11a8 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:40:33.625 UTC [cauthdsl] func2 -> DEBU 11a9 0xc000f79400 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:33.626 UTC [msp.identity] Verify -> DEBU 11aa Verify: digest = 00000000 55 c9 26 71 a9 da 8f 39 4f 12 4f 6c f0 e9 45 30 |U.&q...9O.Ol..E0| -orderer0.example.com | 00000010 9c 1f 65 0e 71 cd 0b fc 87 3b 26 9b bf af 0f b7 |..e.q....;&.....|" -orderer0.example.com | "2019-07-20 02:40:33.626 UTC [msp.identity] Verify -> DEBU 11ab Verify: sig = 00000000 30 44 02 20 13 d1 7a 88 5c 59 6e d7 83 10 61 2a |0D. ..z.\Yn...a*| -orderer0.example.com | 00000010 cc d9 b5 7b 34 21 e2 06 ae 3f 74 89 f3 c8 b9 56 |...{4!...?t....V| -orderer0.example.com | 00000020 94 88 ac 9d 02 20 4b 56 d3 98 42 a4 81 45 8c 3b |..... KV..B..E.;| -orderer0.example.com | 00000030 e3 70 af d5 0b bb 8f 15 46 0e 6e 35 cc 57 76 3a |.p......F.n5.Wv:| -orderer0.example.com | 00000040 fe b2 06 79 24 ab |...y$.|" -orderer0.example.com | "2019-07-20 02:40:33.627 UTC [cauthdsl] func2 -> DEBU 11ac 0xc000f79400 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:33.627 UTC [cauthdsl] func1 -> DEBU 11ad 0xc000f79400 gate 1563590433619571000 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:33.628 UTC [policies] Evaluate -> DEBU 11ae Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:33.629 UTC [policies] Evaluate -> DEBU 11af == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:33.631 UTC [policies] Evaluate -> DEBU 11b0 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:33.631 UTC [policies] Evaluate -> DEBU 11b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:33.633 UTC [policies] Evaluate -> DEBU 11b2 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:33.633 UTC [policies] Evaluate -> DEBU 11b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:33.634 UTC [common.deliver] deliverBlocks -> DEBU 11b4 [channel: businesschannel] Received seekInfo (0xc00118d8c0) start: > stop: > from 172.18.0.9:39218" -orderer0.example.com | "2019-07-20 02:40:33.634 UTC [fsblkstorage] Next -> DEBU 11b5 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -orderer0.example.com | "2019-07-20 02:40:33.634 UTC [fsblkstorage] newBlockfileStream -> DEBU 11b6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" -orderer0.example.com | "2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b7 Remaining bytes=[3991], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b8 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" -orderer0.example.com | "2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b9 blockbytes [3989] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:33.635 UTC [common.deliver] deliverBlocks -> DEBU 11ba [channel: businesschannel] Delivering block for (0xc00118d8c0) for 172.18.0.9:39218" -orderer0.example.com | "2019-07-20 02:40:33.636 UTC [common.deliver] deliverBlocks -> DEBU 11bb [channel: businesschannel] Done delivering to 172.18.0.9:39218 for (0xc00118d8c0)" -peer0.org1.example.com | "2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fc0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fc1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fc2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.784 UTC [policies] Evaluate -> DEBU fc3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.785 UTC [policies] Evaluate -> DEBU fc4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:52.785 UTC [policies] Evaluate -> DEBU fc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.785 UTC [cauthdsl] func1 -> DEBU fc6 0xc0030f2380 gate 1563590392785406500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.785 UTC [cauthdsl] func2 -> DEBU fc7 0xc0030f2380 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.785 UTC [cauthdsl] func2 -> DEBU fc8 0xc0030f2380 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.786 UTC [cauthdsl] func2 -> DEBU fc9 0xc0030f2380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:52.787 UTC [cauthdsl] func2 -> DEBU fca 0xc0030f2380 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.787 UTC [cauthdsl] func1 -> DEBU fcb 0xc0030f2380 gate 1563590392785406500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.787 UTC [policies] Evaluate -> DEBU fcc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.787 UTC [policies] Evaluate -> DEBU fcd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.788 UTC [policies] Evaluate -> DEBU fce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.788 UTC [cauthdsl] func1 -> DEBU fcf 0xc0030f2bc0 gate 1563590392788342800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.788 UTC [cauthdsl] func2 -> DEBU fd0 0xc0030f2bc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.788 UTC [cauthdsl] func2 -> DEBU fd1 0xc0030f2bc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.789 UTC [cauthdsl] func2 -> DEBU fd2 0xc0030f2bc0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.789 UTC [msp.identity] Verify -> DEBU fd3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:39:52.789 UTC [msp.identity] Verify -> DEBU fd4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:39:52.789 UTC [cauthdsl] func2 -> DEBU fd5 0xc0030f2bc0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.790 UTC [cauthdsl] func1 -> DEBU fd6 0xc0030f2bc0 gate 1563590392788342800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fda == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.791 UTC [gossip.gossip] handleMessage -> DEBU fdb Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.791 UTC [gossip.gossip] handleMessage -> DEBU fdc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.791 UTC [msp] DeserializeIdentity -> DEBU fdd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.791 UTC [msp] DeserializeIdentity -> DEBU fde Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.792 UTC [msp] DeserializeIdentity -> DEBU fdf Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:33.636 UTC [common.deliver] Handle -> DEBU 11bc Waiting for new SeekInfo from 172.18.0.9:39218" -orderer0.example.com | "2019-07-20 02:40:33.636 UTC [common.deliver] Handle -> DEBU 11bd Attempting to read seek info message from 172.18.0.9:39218" -orderer0.example.com | "2019-07-20 02:40:33.636 UTC [fsblkstorage] waitForBlock -> DEBU 11be Came out of wait. maxAvailaBlockNumber=[5]" -orderer0.example.com | "2019-07-20 02:40:33.637 UTC [fsblkstorage] waitForBlock -> DEBU 11bf Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -orderer0.example.com | "2019-07-20 02:40:33.644 UTC [grpc] warningf -> DEBU 11c0 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39218: read: connection reset by peer" -orderer0.example.com | "2019-07-20 02:40:33.646 UTC [common.deliver] Handle -> WARN 11c1 Error reading from 172.18.0.9:39218: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:33.646 UTC [orderer.common.server] func1 -> DEBU 11c2 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:33.646 UTC [comm.grpc.server] 1 -> INFO 11c3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39218 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.802ms -orderer0.example.com | "2019-07-20 02:40:33.649 UTC [grpc] infof -> DEBU 11c4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:33.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c5 Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" -orderer0.example.com | "2019-07-20 02:40:33.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c6 Sending msg of 28 bytes to 3 on channel businesschannel took 138.9µs" -orderer0.example.com | "2019-07-20 02:40:33.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.8µs " -orderer0.example.com | "2019-07-20 02:40:33.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.1µs " -orderer0.example.com | "2019-07-20 02:40:33.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:33.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ca Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:33.889 UTC [orderer.common.server] Deliver -> DEBU 11cb Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:33.889 UTC [common.deliver] Handle -> DEBU 11cc Starting new deliver loop for 172.18.0.9:39220" -orderer0.example.com | "2019-07-20 02:40:33.889 UTC [common.deliver] Handle -> DEBU 11cd Attempting to read seek info message from 172.18.0.9:39220" -orderer0.example.com | "2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11ce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11cf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:33.891 UTC [policies] Evaluate -> DEBU 11d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:33.891 UTC [policies] Evaluate -> DEBU 11d2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:33.892 UTC [cauthdsl] func1 -> DEBU 11d3 0xc00126b620 gate 1563590433891872700 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d4 0xc00126b620 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d5 0xc00126b620 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d6 0xc00126b620 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:33.892 UTC [msp.identity] Verify -> DEBU 11d7 Verify: digest = 00000000 13 d8 2c 3b 19 3b 56 2b de 29 07 d5 a7 58 51 51 |..,;.;V+.)...XQQ| -orderer0.example.com | 00000010 2c a5 24 fa 2d be 90 7a 13 07 ec bb 28 fa a0 75 |,.$.-..z....(..u|" -orderer0.example.com | "2019-07-20 02:40:33.893 UTC [msp.identity] Verify -> DEBU 11d8 Verify: sig = 00000000 30 44 02 20 38 3b 2b 4e 6c e1 52 68 ba be 33 3f |0D. 8;+Nl.Rh..3?| -orderer0.example.com | 00000010 d6 8c 76 d3 a8 19 dd 8f 42 b8 e8 ab 0b 36 a8 fd |..v.....B....6..| -orderer0.example.com | 00000020 f5 52 77 a7 02 20 62 ec 99 2a c5 17 af 85 b8 4d |.Rw.. b..*.....M| -orderer0.example.com | 00000030 bd c2 ff 9b 55 67 36 1a 52 7f 7c 0a 3e fe 7d 10 |....Ug6.R.|.>.}.| -orderer0.example.com | 00000040 59 05 00 c8 fa 88 |Y.....|" -orderer0.example.com | "2019-07-20 02:40:33.894 UTC [cauthdsl] func2 -> DEBU 11d9 0xc00126b620 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:33.894 UTC [cauthdsl] func1 -> DEBU 11da 0xc00126b620 gate 1563590433891872700 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11db Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11dc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11dd Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11df Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:33.896 UTC [common.deliver] deliverBlocks -> DEBU 11e1 [channel: businesschannel] Received seekInfo (0xc000fe9640) start: > stop: > from 172.18.0.9:39220" -orderer0.example.com | "2019-07-20 02:40:33.896 UTC [fsblkstorage] Next -> DEBU 11e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -orderer0.example.com | "2019-07-20 02:40:33.896 UTC [fsblkstorage] newBlockfileStream -> DEBU 11e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" -orderer0.example.com | "2019-07-20 02:40:33.897 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e4 Remaining bytes=[3991], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:33.897 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e5 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" -orderer0.example.com | "2019-07-20 02:40:33.898 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e6 blockbytes [3989] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:33.899 UTC [common.deliver] deliverBlocks -> DEBU 11e7 [channel: businesschannel] Delivering block for (0xc000fe9640) for 172.18.0.9:39220" -orderer0.example.com | "2019-07-20 02:40:33.900 UTC [common.deliver] deliverBlocks -> DEBU 11e8 [channel: businesschannel] Done delivering to 172.18.0.9:39220 for (0xc000fe9640)" -orderer0.example.com | "2019-07-20 02:40:33.901 UTC [fsblkstorage] waitForBlock -> DEBU 11e9 Came out of wait. maxAvailaBlockNumber=[5]" -peer0.org1.example.com | "2019-07-20 02:39:52.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fe0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:52.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.798 UTC [cauthdsl] func1 -> DEBU fe6 0xc003116730 gate 1563590392797928400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.798 UTC [cauthdsl] func2 -> DEBU fe7 0xc003116730 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.798 UTC [cauthdsl] func2 -> DEBU fe8 0xc003116730 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.799 UTC [cauthdsl] func2 -> DEBU fe9 0xc003116730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:52.799 UTC [cauthdsl] func2 -> DEBU fea 0xc003116730 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.799 UTC [cauthdsl] func1 -> DEBU feb 0xc003116730 gate 1563590392797928400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.799 UTC [policies] Evaluate -> DEBU fec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.799 UTC [policies] Evaluate -> DEBU fed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.800 UTC [policies] Evaluate -> DEBU fee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.800 UTC [cauthdsl] func1 -> DEBU fef 0xc003117090 gate 1563590392800302800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff0 0xc003117090 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff1 0xc003117090 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff2 0xc003117090 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.801 UTC [msp.identity] Verify -> DEBU ff3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:39:52.801 UTC [msp.identity] Verify -> DEBU ff4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:39:52.801 UTC [cauthdsl] func2 -> DEBU ff5 0xc003117090 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.801 UTC [cauthdsl] func1 -> DEBU ff6 0xc003117090 gate 1563590392800302800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ffa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.803 UTC [msp.identity] Verify -> DEBU ffb Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:39:52.803 UTC [msp.identity] Verify -> DEBU ffc Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:39:52.803 UTC [msp] DeserializeIdentity -> DEBU ffd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.804 UTC [msp] DeserializeIdentity -> DEBU ffe Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:33.901 UTC [fsblkstorage] waitForBlock -> DEBU 11ea Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -orderer0.example.com | "2019-07-20 02:40:33.901 UTC [common.deliver] Handle -> DEBU 11eb Waiting for new SeekInfo from 172.18.0.9:39220" -orderer0.example.com | "2019-07-20 02:40:33.902 UTC [common.deliver] Handle -> DEBU 11ec Attempting to read seek info message from 172.18.0.9:39220" -orderer0.example.com | "2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:33.906 UTC [policies] Evaluate -> DEBU 11f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:33.907 UTC [cauthdsl] func1 -> DEBU 11f2 0xc001299650 gate 1563590433907098600 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:33.907 UTC [cauthdsl] func2 -> DEBU 11f3 0xc001299650 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:33.909 UTC [cauthdsl] func2 -> DEBU 11f4 0xc001299650 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:33.909 UTC [cauthdsl] func2 -> DEBU 11f5 0xc001299650 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:33.909 UTC [msp.identity] Verify -> DEBU 11f6 Verify: digest = 00000000 4e 8f 7f 37 eb 86 61 f8 3b a4 3a d5 32 0f a5 e1 |N..7..a.;.:.2...| -orderer0.example.com | 00000010 e7 ad 54 65 39 59 bf 01 7d e9 93 a0 4c e6 69 9c |..Te9Y..}...L.i.|" -orderer0.example.com | "2019-07-20 02:40:33.909 UTC [msp.identity] Verify -> DEBU 11f7 Verify: sig = 00000000 30 44 02 20 2a a1 af a0 ea d8 96 d9 ab 68 52 17 |0D. *........hR.| -orderer0.example.com | 00000010 22 12 bf fa 81 9a 3f 11 f8 78 dc 65 73 ca 36 94 |".....?..x.es.6.| -orderer0.example.com | 00000020 45 c4 79 3f 02 20 14 61 ea 34 83 b9 4c 1e 47 5e |E.y?. .a.4..L.G^| -orderer0.example.com | 00000030 4b a4 44 12 58 29 e9 7c f0 7a ad 65 ab 63 db ad |K.D.X).|.z.e.c..| -orderer0.example.com | 00000040 7f 37 d8 86 95 a8 |.7....|" -orderer0.example.com | "2019-07-20 02:40:33.910 UTC [cauthdsl] func2 -> DEBU 11f8 0xc001299650 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:33.910 UTC [cauthdsl] func1 -> DEBU 11f9 0xc001299650 gate 1563590433907098600 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:33.910 UTC [policies] Evaluate -> DEBU 11fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:33.910 UTC [policies] Evaluate -> DEBU 11fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fc Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fe Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:33.912 UTC [policies] Evaluate -> DEBU 11ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:33.912 UTC [common.deliver] deliverBlocks -> DEBU 1200 [channel: businesschannel] Received seekInfo (0xc000fe9a00) start: > stop: > from 172.18.0.9:39220" -orderer0.example.com | "2019-07-20 02:40:33.912 UTC [fsblkstorage] Next -> DEBU 1201 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -orderer0.example.com | "2019-07-20 02:40:33.912 UTC [fsblkstorage] newBlockfileStream -> DEBU 1202 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" -orderer0.example.com | "2019-07-20 02:40:33.913 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1203 Remaining bytes=[36264], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:33.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1204 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" -orderer0.example.com | "2019-07-20 02:40:33.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1205 blockbytes [23747] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:33.914 UTC [common.deliver] deliverBlocks -> DEBU 1206 [channel: businesschannel] Delivering block for (0xc000fe9a00) for 172.18.0.9:39220" -orderer0.example.com | "2019-07-20 02:40:33.916 UTC [common.deliver] deliverBlocks -> DEBU 1207 [channel: businesschannel] Done delivering to 172.18.0.9:39220 for (0xc000fe9a00)" -orderer0.example.com | "2019-07-20 02:40:33.916 UTC [fsblkstorage] waitForBlock -> DEBU 1208 Came out of wait. maxAvailaBlockNumber=[5]" -orderer0.example.com | "2019-07-20 02:40:33.916 UTC [fsblkstorage] waitForBlock -> DEBU 1209 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -orderer0.example.com | "2019-07-20 02:40:33.917 UTC [common.deliver] Handle -> DEBU 120a Waiting for new SeekInfo from 172.18.0.9:39220" -orderer0.example.com | "2019-07-20 02:40:33.921 UTC [common.deliver] Handle -> DEBU 120b Attempting to read seek info message from 172.18.0.9:39220" -orderer0.example.com | "2019-07-20 02:40:33.927 UTC [common.deliver] Handle -> WARN 120c Error reading from 172.18.0.9:39220: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:33.927 UTC [orderer.common.server] func1 -> DEBU 120d Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:33.927 UTC [comm.grpc.server] 1 -> INFO 120e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39220 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.5069ms -orderer0.example.com | "2019-07-20 02:40:33.927 UTC [grpc] infof -> DEBU 120f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:33.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1210 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:33.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1211 Sending msg of 28 bytes to 3 on channel testchainid took 144.5µs" -orderer0.example.com | "2019-07-20 02:40:33.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1212 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 641.5µs " -orderer0.example.com | "2019-07-20 02:40:34.084 UTC [orderer.common.server] Deliver -> DEBU 1213 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:34.084 UTC [common.deliver] Handle -> DEBU 1214 Starting new deliver loop for 172.18.0.9:39222" -orderer0.example.com | "2019-07-20 02:40:34.084 UTC [common.deliver] Handle -> DEBU 1215 Attempting to read seek info message from 172.18.0.9:39222" -orderer0.example.com | "2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1216 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1217 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1218 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.094 UTC [policies] Evaluate -> DEBU 1219 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1000 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1001 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1002 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1003 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1004 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.805 UTC [cauthdsl] func1 -> DEBU 1005 0xc003125150 gate 1563590392805720700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.805 UTC [cauthdsl] func2 -> DEBU 1006 0xc003125150 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1007 0xc003125150 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1008 0xc003125150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1009 0xc003125150 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.807 UTC [cauthdsl] func1 -> DEBU 100a 0xc003125150 gate 1563590392805720700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:52.807 UTC [policies] Evaluate -> DEBU 100b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.807 UTC [policies] Evaluate -> DEBU 100c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.808 UTC [policies] Evaluate -> DEBU 100d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:52.808 UTC [cauthdsl] func1 -> DEBU 100e 0xc003125b00 gate 1563590392808304900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:52.808 UTC [cauthdsl] func2 -> DEBU 100f 0xc003125b00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:52.808 UTC [cauthdsl] func2 -> DEBU 1010 0xc003125b00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:52.809 UTC [cauthdsl] func2 -> DEBU 1011 0xc003125b00 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.809 UTC [msp.identity] Verify -> DEBU 1012 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:39:52.809 UTC [msp.identity] Verify -> DEBU 1013 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [cauthdsl] func2 -> DEBU 1014 0xc003125b00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [cauthdsl] func1 -> DEBU 1015 0xc003125b00 gate 1563590392808304900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1016 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1018 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1019 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101a Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [gossip.pull] HandleMessage -> DEBU 101c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.912 UTC [gossip.comm] func1 -> DEBU 101e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.912 UTC [gossip.gossip] handleMessage -> DEBU 101f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.912 UTC [msp] DeserializeIdentity -> DEBU 1020 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.912 UTC [msp] DeserializeIdentity -> DEBU 1021 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.912 UTC [gossip.gossip] handleMessage -> DEBU 1022 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.928 UTC [gossip.comm] func1 -> DEBU 1023 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.928 UTC [gossip.gossip] handleMessage -> DEBU 1024 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.928 UTC [gossip.pull] HandleMessage -> DEBU 1025 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.928 UTC [gossip.pull] SendDigest -> DEBU 1026 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:39:52.928 UTC [gossip.gossip] handleMessage -> DEBU 1027 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.954 UTC [gossip.comm] func1 -> DEBU 1028 Got message: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-07-20 02:40:34.094 UTC [policies] Evaluate -> DEBU 121a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.094 UTC [cauthdsl] func1 -> DEBU 121b 0xc0012b7f40 gate 1563590434094666400 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:34.094 UTC [cauthdsl] func2 -> DEBU 121c 0xc0012b7f40 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:34.095 UTC [cauthdsl] func2 -> DEBU 121d 0xc0012b7f40 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:34.095 UTC [cauthdsl] func2 -> DEBU 121e 0xc0012b7f40 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:34.095 UTC [msp.identity] Verify -> DEBU 121f Verify: digest = 00000000 7e 43 fb 52 94 7b bc 04 7f d2 6c 9f 95 25 f7 37 |~C.R.{....l..%.7| -orderer0.example.com | 00000010 cb dd 56 7a 09 c9 84 75 79 b9 ce fe e3 94 b6 a8 |..Vz...uy.......|" -orderer0.example.com | "2019-07-20 02:40:34.096 UTC [msp.identity] Verify -> DEBU 1220 Verify: sig = 00000000 30 44 02 20 30 ff 5b 04 1f bb 8e 30 0c 4b 0d df |0D. 0.[....0.K..| -orderer0.example.com | 00000010 da 16 e8 1e 80 32 90 2a e0 3b c0 b3 17 30 c1 de |.....2.*.;...0..| -orderer0.example.com | 00000020 40 a9 a7 be 02 20 3f 66 5d 22 21 3c bd 50 53 04 |@.... ?f]"!<.PS.| -orderer0.example.com | 00000030 15 d4 8e 53 77 2c e1 82 f2 2a f8 dc f8 92 2c ea |...Sw,...*....,.| -orderer0.example.com | 00000040 bd 03 a8 60 34 1b |...`4.|" -orderer0.example.com | "2019-07-20 02:40:34.103 UTC [cauthdsl] func2 -> DEBU 1221 0xc0012b7f40 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:34.104 UTC [cauthdsl] func1 -> DEBU 1222 0xc0012b7f40 gate 1563590434094666400 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1223 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1224 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1225 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1226 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1227 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:34.105 UTC [common.deliver] deliverBlocks -> DEBU 1229 [channel: businesschannel] Received seekInfo (0xc0013160c0) start: > stop: > from 172.18.0.9:39222" -orderer0.example.com | "2019-07-20 02:40:34.106 UTC [fsblkstorage] Next -> DEBU 122a Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -orderer0.example.com | "2019-07-20 02:40:34.106 UTC [fsblkstorage] newBlockfileStream -> DEBU 122b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:40:34.106 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122c Remaining bytes=[83904], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:34.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122d Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:40:34.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122e blockbytes [23944] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:34.107 UTC [common.deliver] deliverBlocks -> DEBU 122f [channel: businesschannel] Delivering block for (0xc0013160c0) for 172.18.0.9:39222" -orderer0.example.com | "2019-07-20 02:40:34.107 UTC [common.deliver] deliverBlocks -> DEBU 1230 [channel: businesschannel] Done delivering to 172.18.0.9:39222 for (0xc0013160c0)" -orderer0.example.com | "2019-07-20 02:40:34.108 UTC [fsblkstorage] waitForBlock -> DEBU 1231 Came out of wait. maxAvailaBlockNumber=[5]" -orderer0.example.com | "2019-07-20 02:40:34.108 UTC [fsblkstorage] waitForBlock -> DEBU 1232 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -orderer0.example.com | "2019-07-20 02:40:34.109 UTC [common.deliver] Handle -> DEBU 1233 Waiting for new SeekInfo from 172.18.0.9:39222" -orderer0.example.com | "2019-07-20 02:40:34.114 UTC [grpc] infof -> DEBU 1234 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:34.111 UTC [common.deliver] Handle -> DEBU 1235 Attempting to read seek info message from 172.18.0.9:39222" -orderer0.example.com | "2019-07-20 02:40:34.114 UTC [common.deliver] Handle -> WARN 1236 Error reading from 172.18.0.9:39222: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:34.114 UTC [orderer.common.server] func1 -> DEBU 1237 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:34.114 UTC [comm.grpc.server] 1 -> INFO 1238 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39222 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.6095ms -orderer0.example.com | "2019-07-20 02:40:34.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1239 Sending msg of 28 bytes to 2 on channel businesschannel took 73.5µs" -orderer0.example.com | "2019-07-20 02:40:34.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 123a Sending msg of 28 bytes to 3 on channel businesschannel took 32.6µs" -orderer0.example.com | "2019-07-20 02:40:34.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 819.6µs " -orderer0.example.com | "2019-07-20 02:40:34.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.5µs " -orderer0.example.com | "2019-07-20 02:40:34.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:34.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:34.288 UTC [orderer.common.server] Deliver -> DEBU 123f Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:34.288 UTC [common.deliver] Handle -> DEBU 1240 Starting new deliver loop for 172.18.0.9:39224" -orderer0.example.com | "2019-07-20 02:40:34.289 UTC [common.deliver] Handle -> DEBU 1241 Attempting to read seek info message from 172.18.0.9:39224" -orderer0.example.com | "2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1242 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1243 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1244 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1245 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1246 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.290 UTC [cauthdsl] func1 -> DEBU 1247 0xc000266930 gate 1563590434290750100 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:34.290 UTC [cauthdsl] func2 -> DEBU 1248 0xc000266930 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 1249 0xc000266930 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 124a 0xc000266930 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:34.291 UTC [msp.identity] Verify -> DEBU 124b Verify: digest = 00000000 b6 ff ca 28 9e 7c 64 7c 18 2f fe 11 67 9f 5c e6 |...(.|d|./..g.\.| -orderer0.example.com | 00000010 98 c3 94 a2 a5 7c b7 2f 11 b6 5d 99 65 38 31 a1 |.....|./..].e81.|" -orderer0.example.com | "2019-07-20 02:40:34.291 UTC [msp.identity] Verify -> DEBU 124c Verify: sig = 00000000 30 44 02 20 25 76 f6 0c 6b 08 93 d0 c9 c9 8b 6e |0D. %v..k......n| -orderer0.example.com | 00000010 39 ab 6d 08 97 a9 96 eb 84 0f d7 99 67 27 4c c8 |9.m.........g'L.| -orderer0.example.com | 00000020 eb 35 ec 00 02 20 64 0d 0d d0 2b 97 19 7f 7c 97 |.5... d...+...|.| -orderer0.example.com | 00000030 ff 71 2f 38 d7 cb 37 14 b3 79 d5 4d de 0a ef b3 |.q/8..7..y.M....| -orderer0.example.com | 00000040 dd a6 af 00 3d ed |....=.|" -orderer0.example.com | "2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 124d 0xc000266930 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:34.291 UTC [cauthdsl] func1 -> DEBU 124e 0xc000266930 gate 1563590434290750100 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:34.291 UTC [policies] Evaluate -> DEBU 124f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1250 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1251 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1252 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1253 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1254 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:34.293 UTC [common.deliver] deliverBlocks -> DEBU 1255 [channel: businesschannel] Received seekInfo (0xc000d14600) start: > stop: > from 172.18.0.9:39224" -orderer0.example.com | "2019-07-20 02:40:34.293 UTC [fsblkstorage] Next -> DEBU 1256 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -orderer0.example.com | "2019-07-20 02:40:34.293 UTC [fsblkstorage] newBlockfileStream -> DEBU 1257 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" -orderer0.example.com | "2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1258 Remaining bytes=[59957], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1259 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" -orderer0.example.com | "2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 125a blockbytes [23690] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:34.294 UTC [common.deliver] deliverBlocks -> DEBU 125b [channel: businesschannel] Delivering block for (0xc000d14600) for 172.18.0.9:39224" -orderer0.example.com | "2019-07-20 02:40:34.295 UTC [common.deliver] deliverBlocks -> DEBU 125c [channel: businesschannel] Done delivering to 172.18.0.9:39224 for (0xc000d14600)" -orderer0.example.com | "2019-07-20 02:40:34.295 UTC [fsblkstorage] waitForBlock -> DEBU 125d Came out of wait. maxAvailaBlockNumber=[5]" -orderer0.example.com | "2019-07-20 02:40:34.296 UTC [fsblkstorage] waitForBlock -> DEBU 125e Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -orderer0.example.com | "2019-07-20 02:40:34.295 UTC [common.deliver] Handle -> DEBU 125f Waiting for new SeekInfo from 172.18.0.9:39224" -orderer0.example.com | "2019-07-20 02:40:34.296 UTC [common.deliver] Handle -> DEBU 1260 Attempting to read seek info message from 172.18.0.9:39224" -orderer0.example.com | "2019-07-20 02:40:34.304 UTC [common.deliver] Handle -> WARN 1261 Error reading from 172.18.0.9:39224: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:34.304 UTC [orderer.common.server] func1 -> DEBU 1262 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:34.304 UTC [comm.grpc.server] 1 -> INFO 1263 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39224 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.6359ms -orderer0.example.com | "2019-07-20 02:40:34.304 UTC [grpc] infof -> DEBU 1264 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:34.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1265 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:34.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1266 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" -orderer0.example.com | "2019-07-20 02:40:34.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1267 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " -orderer0.example.com | "2019-07-20 02:40:34.458 UTC [orderer.common.server] Deliver -> DEBU 1268 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:34.458 UTC [common.deliver] Handle -> DEBU 1269 Starting new deliver loop for 172.18.0.9:39226" -orderer0.example.com | "2019-07-20 02:40:34.458 UTC [common.deliver] Handle -> DEBU 126a Attempting to read seek info message from 172.18.0.9:39226" -orderer0.example.com | "2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.460 UTC [cauthdsl] func1 -> DEBU 1270 0xc00029c200 gate 1563590434460744000 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1271 0xc00029c200 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1272 0xc00029c200 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1273 0xc00029c200 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:34.461 UTC [msp.identity] Verify -> DEBU 1274 Verify: digest = 00000000 e1 5a 7b 9e 59 a0 ff dd e8 71 0e d6 50 2b b3 6b |.Z{.Y....q..P+.k| -orderer0.example.com | 00000010 eb 35 f7 c1 54 12 29 76 94 77 c8 7a 86 11 61 e3 |.5..T.)v.w.z..a.|" -orderer0.example.com | "2019-07-20 02:40:34.461 UTC [msp.identity] Verify -> DEBU 1275 Verify: sig = 00000000 30 44 02 20 33 2e 3f 3e e0 52 ff 41 fe b5 d3 a0 |0D. 3.?>.R.A....| -orderer0.example.com | 00000010 2d 27 e8 cf 58 7c ed 69 8b d4 f6 3d ab d4 9f a2 |-'..X|.i...=....| -orderer0.example.com | 00000020 c9 0d 27 04 02 20 39 44 87 05 83 70 f7 bd bd be |..'.. 9D...p....| -orderer0.example.com | 00000030 8c db 61 83 e9 1b 08 b9 80 be 5e ca 20 db a9 77 |..a.......^. ..w| -orderer0.example.com | 00000040 e6 dd 8c e8 6f 62 |....ob|" -orderer0.example.com | "2019-07-20 02:40:34.462 UTC [cauthdsl] func2 -> DEBU 1276 0xc00029c200 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:34.462 UTC [cauthdsl] func1 -> DEBU 1277 0xc00029c200 gate 1563590434460744000 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 1278 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 1279 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 127a Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127c Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:34.463 UTC [common.deliver] deliverBlocks -> DEBU 127e [channel: businesschannel] Received seekInfo (0xc00121e580) start: > stop: > from 172.18.0.9:39226" -orderer0.example.com | "2019-07-20 02:40:34.463 UTC [fsblkstorage] Next -> DEBU 127f Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -orderer0.example.com | "2019-07-20 02:40:34.463 UTC [fsblkstorage] newBlockfileStream -> DEBU 1280 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" -orderer0.example.com | "2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1281 Remaining bytes=[36264], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1282 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" -orderer0.example.com | "2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1283 blockbytes [23747] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:34.465 UTC [common.deliver] deliverBlocks -> DEBU 1284 [channel: businesschannel] Delivering block for (0xc00121e580) for 172.18.0.9:39226" -orderer0.example.com | "2019-07-20 02:40:34.466 UTC [common.deliver] deliverBlocks -> DEBU 1285 [channel: businesschannel] Done delivering to 172.18.0.9:39226 for (0xc00121e580)" -orderer0.example.com | "2019-07-20 02:40:34.467 UTC [common.deliver] Handle -> DEBU 1286 Waiting for new SeekInfo from 172.18.0.9:39226" -orderer0.example.com | "2019-07-20 02:40:34.467 UTC [common.deliver] Handle -> DEBU 1287 Attempting to read seek info message from 172.18.0.9:39226" -orderer0.example.com | "2019-07-20 02:40:34.467 UTC [fsblkstorage] waitForBlock -> DEBU 1288 Came out of wait. maxAvailaBlockNumber=[5]" -orderer0.example.com | "2019-07-20 02:40:34.469 UTC [fsblkstorage] waitForBlock -> DEBU 1289 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -orderer0.example.com | "2019-07-20 02:40:34.479 UTC [common.deliver] Handle -> WARN 128a Error reading from 172.18.0.9:39226: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:34.479 UTC [orderer.common.server] func1 -> DEBU 128b Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:34.479 UTC [comm.grpc.server] 1 -> INFO 128c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39226 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.8288ms -orderer0.example.com | "2019-07-20 02:40:34.480 UTC [grpc] infof -> DEBU 128d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:34.685 UTC [orderer.common.server] Deliver -> DEBU 128e Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:34.685 UTC [common.deliver] Handle -> DEBU 128f Starting new deliver loop for 172.18.0.9:39228" -orderer0.example.com | "2019-07-20 02:40:34.685 UTC [common.deliver] Handle -> DEBU 1290 Attempting to read seek info message from 172.18.0.9:39228" -orderer0.example.com | "2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1291 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1292 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1294 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1295 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.687 UTC [cauthdsl] func1 -> DEBU 1296 0xc000bac420 gate 1563590434687004600 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:34.687 UTC [cauthdsl] func2 -> DEBU 1297 0xc000bac420 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:34.687 UTC [cauthdsl] func2 -> DEBU 1298 0xc000bac420 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:34.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.4µs " -orderer0.example.com | "2019-07-20 02:40:34.691 UTC [cauthdsl] func2 -> DEBU 129b 0xc000bac420 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:34.691 UTC [msp.identity] Verify -> DEBU 129c Verify: digest = 00000000 02 a4 1e 39 0d 23 70 6d 9f f9 40 d6 b3 e5 e0 92 |...9.#pm..@.....| -orderer0.example.com | 00000010 ca 59 28 b5 b1 75 d7 fa 41 f1 a7 d7 fb 4d b6 5b |.Y(..u..A....M.[|" -orderer0.example.com | "2019-07-20 02:40:34.692 UTC [msp.identity] Verify -> DEBU 129d Verify: sig = 00000000 30 45 02 21 00 b3 bb c4 d7 0e 11 6a 64 b5 70 f2 |0E.!.......jd.p.| -orderer0.example.com | 00000010 a4 2f 1f 35 ef 03 2f 5c e0 ad e3 d3 2e d4 e2 dc |./.5../\........| -orderer0.example.com | 00000020 77 ce 7d 5c 03 02 20 59 2f 4b 35 61 19 df f7 e0 |w.}\.. Y/K5a....| -orderer0.example.com | 00000030 cb 0d 19 13 68 c4 9a 6f 5d 78 fa 5c f8 68 55 59 |....h..o]x.\.hUY| -orderer0.example.com | 00000040 10 07 f3 98 52 ba fc |....R..|" -orderer0.example.com | "2019-07-20 02:40:34.692 UTC [cauthdsl] func2 -> DEBU 129e 0xc000bac420 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:34.692 UTC [cauthdsl] func1 -> DEBU 129f 0xc000bac420 gate 1563590434687004600 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:34.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a3 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:34.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1299 Sending msg of 28 bytes to 3 on channel businesschannel took 48.8µs" -orderer0.example.com | "2019-07-20 02:40:34.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a5 Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" -peer0.org1.example.com | "2019-07-20 02:39:52.954 UTC [gossip.gossip] handleMessage -> DEBU 1029 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.955 UTC [gossip.pull] HandleMessage -> DEBU 102a GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:52.955 UTC [msp] DeserializeIdentity -> DEBU 102b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:52.955 UTC [gossip.gossip] handleMessage -> DEBU 102c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:52.956 UTC [gossip.pull] SendRes -> DEBU 102d Sending 1 IDENTITY_MSG items to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:39:53.077 UTC [gossip.comm] func1 -> DEBU 102e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:53.077 UTC [gossip.gossip] handleMessage -> DEBU 102f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:53.077 UTC [msp] DeserializeIdentity -> DEBU 1030 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:53.078 UTC [msp] DeserializeIdentity -> DEBU 1031 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:53.078 UTC [msp] DeserializeIdentity -> DEBU 1032 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:53.078 UTC [gossip.gossip] handleMessage -> DEBU 1033 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:53.216 UTC [gossip.comm] func1 -> DEBU 1034 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:53.217 UTC [gossip.gossip] handleMessage -> DEBU 1035 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1036 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1037 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1038 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:53.219 UTC [gossip.gossip] handleMessage -> DEBU 1039 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:55.948 UTC [gossip.comm] func1 -> DEBU 103a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:55.949 UTC [gossip.gossip] handleMessage -> DEBU 103b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:55.949 UTC [gossip.gossip] handleMessage -> DEBU 103c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:55.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:55.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 103e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:55.950 UTC [msp] DeserializeIdentity -> DEBU 103f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1040 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1041 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1042 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:55.951 UTC [policies] Evaluate -> DEBU 1043 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:55.952 UTC [policies] Evaluate -> DEBU 1044 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:55.952 UTC [policies] Evaluate -> DEBU 1045 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:55.952 UTC [cauthdsl] func1 -> DEBU 1046 0xc0032a0750 gate 1563590395952479500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:55.952 UTC [cauthdsl] func2 -> DEBU 1047 0xc0032a0750 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 1048 0xc0032a0750 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 1049 0xc0032a0750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 104a 0xc0032a0750 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:55.953 UTC [cauthdsl] func1 -> DEBU 104b 0xc0032a0750 gate 1563590395952479500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:55.953 UTC [policies] Evaluate -> DEBU 104c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:55.954 UTC [policies] Evaluate -> DEBU 104d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:55.954 UTC [policies] Evaluate -> DEBU 104e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:55.955 UTC [cauthdsl] func1 -> DEBU 1050 0xc0032a0f90 gate 1563590395955130100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:55.955 UTC [cauthdsl] func2 -> DEBU 1051 0xc0032a0f90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:55.954 UTC [gossip.comm] func1 -> DEBU 104f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:55.955 UTC [gossip.gossip] handleMessage -> DEBU 1052 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:55.956 UTC [gossip.pull] HandleMessage -> DEBU 1053 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1054 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1055 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1056 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:55.955 UTC [cauthdsl] func2 -> DEBU 1057 0xc0032a0f90 processing identity 0 with bytes of 114b950" -orderer0.example.com | "2019-07-20 02:40:34.695 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.3µs " -orderer0.example.com | "2019-07-20 02:40:34.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:34.694 UTC [policies] Evaluate -> DEBU 12a8 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:34.697 UTC [policies] Evaluate -> DEBU 12a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:34.698 UTC [common.deliver] deliverBlocks -> DEBU 12aa [channel: businesschannel] Received seekInfo (0xc00121eb80) start: > stop: > from 172.18.0.9:39228" -orderer0.example.com | "2019-07-20 02:40:34.698 UTC [fsblkstorage] Next -> DEBU 12ab Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -orderer0.example.com | "2019-07-20 02:40:34.699 UTC [fsblkstorage] newBlockfileStream -> DEBU 12ac newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71390]" -orderer0.example.com | "2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ad Remaining bytes=[12514], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ae Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" -orderer0.example.com | "2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12af blockbytes [4527] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:34.701 UTC [common.deliver] deliverBlocks -> DEBU 12b0 [channel: businesschannel] Delivering block for (0xc00121eb80) for 172.18.0.9:39228" -orderer0.example.com | "2019-07-20 02:40:34.701 UTC [common.deliver] deliverBlocks -> DEBU 12b1 [channel: businesschannel] Done delivering to 172.18.0.9:39228 for (0xc00121eb80)" -orderer0.example.com | "2019-07-20 02:40:34.702 UTC [common.deliver] Handle -> DEBU 12b2 Waiting for new SeekInfo from 172.18.0.9:39228" -orderer0.example.com | "2019-07-20 02:40:34.702 UTC [common.deliver] Handle -> DEBU 12b3 Attempting to read seek info message from 172.18.0.9:39228" -orderer0.example.com | "2019-07-20 02:40:34.702 UTC [fsblkstorage] waitForBlock -> DEBU 12b4 Came out of wait. maxAvailaBlockNumber=[5]" -orderer0.example.com | "2019-07-20 02:40:34.702 UTC [fsblkstorage] waitForBlock -> DEBU 12b5 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -orderer0.example.com | "2019-07-20 02:40:34.710 UTC [common.deliver] Handle -> WARN 12b6 Error reading from 172.18.0.9:39228: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:34.711 UTC [orderer.common.server] func1 -> DEBU 12b8 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:34.710 UTC [grpc] infof -> DEBU 12b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:34.712 UTC [comm.grpc.server] 1 -> INFO 12b9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39228 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.4236ms -orderer0.example.com | "2019-07-20 02:40:34.873 UTC [orderer.common.server] Deliver -> DEBU 12ba Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:34.873 UTC [common.deliver] Handle -> DEBU 12bb Starting new deliver loop for 172.18.0.9:39230" -orderer0.example.com | "2019-07-20 02:40:34.873 UTC [common.deliver] Handle -> DEBU 12bc Attempting to read seek info message from 172.18.0.9:39230" -orderer0.example.com | "2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12c1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:34.875 UTC [cauthdsl] func1 -> DEBU 12c2 0xc0003215b0 gate 1563590434875079900 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c3 0xc0003215b0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c4 0xc0003215b0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c5 0xc0003215b0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:34.875 UTC [msp.identity] Verify -> DEBU 12c6 Verify: digest = 00000000 0d 6a 08 6e fa 8f 49 c2 62 af 5e b4 fa b8 cf 31 |.j.n..I.b.^....1| -orderer0.example.com | 00000010 9b d4 09 ce 65 9c 3a fe 53 fc 4f f8 fa 94 c5 2e |....e.:.S.O.....|" -orderer0.example.com | "2019-07-20 02:40:34.876 UTC [msp.identity] Verify -> DEBU 12c7 Verify: sig = 00000000 30 45 02 21 00 b3 a8 89 f8 62 5b 5e e1 09 f0 07 |0E.!.....b[^....| -orderer0.example.com | 00000010 73 8d a2 99 7b 67 53 94 f8 56 14 78 9c 08 9f 2a |s...{gS..V.x...*| -orderer0.example.com | 00000020 47 10 0c 83 e2 02 20 57 a8 87 84 de 18 db 18 fd |G..... W........| -orderer0.example.com | 00000030 03 e7 40 b9 1a 50 6e cd 00 44 a2 2e 76 44 95 fb |..@..Pn..D..vD..| -orderer0.example.com | 00000040 94 0c 2a 5b 54 de da |..*[T..|" -orderer0.example.com | "2019-07-20 02:40:34.876 UTC [cauthdsl] func2 -> DEBU 12c8 0xc0003215b0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:34.877 UTC [cauthdsl] func1 -> DEBU 12c9 0xc0003215b0 gate 1563590434875079900 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12ca Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cc Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:34.878 UTC [policies] Evaluate -> DEBU 12ce Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:34.878 UTC [policies] Evaluate -> DEBU 12cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:34.878 UTC [common.deliver] deliverBlocks -> DEBU 12d0 [channel: businesschannel] Received seekInfo (0xc00121f300) start: > stop: > from 172.18.0.9:39230" -orderer0.example.com | "2019-07-20 02:40:34.879 UTC [fsblkstorage] Next -> DEBU 12d1 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -orderer0.example.com | "2019-07-20 02:40:34.879 UTC [fsblkstorage] newBlockfileStream -> DEBU 12d2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75919]" -orderer0.example.com | "2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d3 Remaining bytes=[7985], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d4 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" -peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [cauthdsl] func2 -> DEBU 1059 0xc0032a0f90 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1058 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [msp] DeserializeIdentity -> DEBU 105a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [msp] DeserializeIdentity -> DEBU 105b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [gossip.pull] SendDigest -> DEBU 105c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [gossip.gossip] handleMessage -> DEBU 105d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [msp.identity] Verify -> DEBU 105e Verify: digest = 00000000 32 cd 79 69 26 bd f0 b6 fa 3d 9b 05 4c 4c 9f 63 |2.yi&....=..LL.c| -peer0.org1.example.com | 00000010 24 41 4d c3 5c 68 56 af ce 9f 1b c2 8a 17 de 69 |$AM.\hV........i|" -peer0.org1.example.com | "2019-07-20 02:39:55.958 UTC [msp.identity] Verify -> DEBU 105f Verify: sig = 00000000 30 44 02 20 51 04 be fc db d6 de c6 b6 ae 09 47 |0D. Q..........G| -peer0.org1.example.com | 00000010 f4 3c 44 29 af 53 0d 4b 18 41 dd 7f 84 88 de 6d |. DEBU 1060 0xc0032a0f90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:55.960 UTC [cauthdsl] func1 -> DEBU 1061 0xc0032a0f90 gate 1563590395955130100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:55.960 UTC [policies] Evaluate -> DEBU 1062 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1063 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1064 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1065 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:55.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 1066 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:55.962 UTC [gossip.discovery] learnExistingMembers -> DEBU 1067 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:55.963 UTC [gossip.discovery] learnExistingMembers -> DEBU 1068 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:55.963 UTC [gossip.discovery] learnExistingMembers -> DEBU 1069 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:55.964 UTC [gossip.discovery] learnExistingMembers -> DEBU 106a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:55.964 UTC [gossip.discovery] learnExistingMembers -> DEBU 106b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:55.964 UTC [gossip.discovery] handleAliveMessage -> DEBU 106c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:55.965 UTC [gossip.discovery] handleMsgFromComm -> DEBU 106d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:55.965 UTC [gossip.discovery] sendMemResponse -> DEBU 106e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:39:55.966 UTC [msp] DeserializeIdentity -> DEBU 106f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:55.966 UTC [msp] DeserializeIdentity -> DEBU 1070 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:55.967 UTC [msp] DeserializeIdentity -> DEBU 1071 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:55.967 UTC [gossip.comm] Send -> DEBU 1072 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:55.967 UTC [gossip.comm] sendToEndpoint -> DEBU 1073 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:55.968 UTC [gossip.comm] sendToEndpoint -> DEBU 1074 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:55.967 UTC [gossip.discovery] sendMemResponse -> DEBU 1075 Exiting, replying with alive:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " -peer0.org1.example.com | "2019-07-20 02:39:56.272 UTC [gossip.pull] Hello -> DEBU 1076 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 1077 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.pull] Hello -> DEBU 1078 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 1079 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.pull] Hello -> DEBU 107a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 107b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.comm] sendToEndpoint -> DEBU 107c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.comm] sendToEndpoint -> DEBU 107d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 107e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 107f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 1080 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 1081 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.comm] func1 -> DEBU 1082 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1083 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.pull] HandleMessage -> DEBU 1084 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1085 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.comm] func1 -> DEBU 1086 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1087 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.pull] HandleMessage -> DEBU 1088 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.276 UTC [gossip.gossip] handleMessage -> DEBU 1089 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.277 UTC [gossip.comm] func1 -> DEBU 108a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.277 UTC [gossip.gossip] handleMessage -> DEBU 108b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.277 UTC [gossip.pull] HandleMessage -> DEBU 108c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.277 UTC [gossip.gossip] handleMessage -> DEBU 108d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp] GetDefaultSigningIdentity -> DEBU 108e Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 108f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151014 " -peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1090 Sign: digest: C7D72175B4EA24BE781C5667FDD4D10C6AE41025931EB8B9790DBC66471A6E16 " -peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp] GetDefaultSigningIdentity -> DEBU 1091 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1092 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1093 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1094 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [msp] DeserializeIdentity -> DEBU 1095 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1096 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [msp] DeserializeIdentity -> DEBU 1097 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1098 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [gossip.comm] sendToEndpoint -> DEBU 1099 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [gossip.comm] sendToEndpoint -> DEBU 109a Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109c Exiting" -orderer0.example.com | "2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d5 blockbytes [3992] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:34.880 UTC [common.deliver] deliverBlocks -> DEBU 12d6 [channel: businesschannel] Delivering block for (0xc00121f300) for 172.18.0.9:39230" -orderer0.example.com | "2019-07-20 02:40:34.881 UTC [common.deliver] deliverBlocks -> DEBU 12d7 [channel: businesschannel] Done delivering to 172.18.0.9:39230 for (0xc00121f300)" -orderer0.example.com | "2019-07-20 02:40:34.881 UTC [common.deliver] Handle -> DEBU 12d8 Waiting for new SeekInfo from 172.18.0.9:39230" -orderer0.example.com | "2019-07-20 02:40:34.881 UTC [common.deliver] Handle -> DEBU 12d9 Attempting to read seek info message from 172.18.0.9:39230" -orderer0.example.com | "2019-07-20 02:40:34.881 UTC [fsblkstorage] waitForBlock -> DEBU 12da Came out of wait. maxAvailaBlockNumber=[5]" -orderer0.example.com | "2019-07-20 02:40:34.881 UTC [fsblkstorage] waitForBlock -> DEBU 12db Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -orderer0.example.com | "2019-07-20 02:40:34.889 UTC [grpc] infof -> DEBU 12dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:34.889 UTC [common.deliver] Handle -> WARN 12dd Error reading from 172.18.0.9:39230: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:34.889 UTC [orderer.common.server] func1 -> DEBU 12de Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:34.890 UTC [comm.grpc.server] 1 -> INFO 12df streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39230 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.2245ms -orderer0.example.com | "2019-07-20 02:40:34.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:34.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e1 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" -orderer0.example.com | "2019-07-20 02:40:34.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.6µs " -orderer0.example.com | "2019-07-20 02:40:35.053 UTC [orderer.common.server] Deliver -> DEBU 12e3 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:35.054 UTC [common.deliver] Handle -> DEBU 12e4 Starting new deliver loop for 172.18.0.9:39232" -orderer0.example.com | "2019-07-20 02:40:35.054 UTC [common.deliver] Handle -> DEBU 12e5 Attempting to read seek info message from 172.18.0.9:39232" -orderer0.example.com | "2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12ea == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.055 UTC [cauthdsl] func1 -> DEBU 12eb 0xc000c73a60 gate 1563590435055006700 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ec 0xc000c73a60 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ed 0xc000c73a60 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ee 0xc000c73a60 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:35.056 UTC [msp.identity] Verify -> DEBU 12ef Verify: digest = 00000000 ac a4 e2 6b 85 76 c4 74 3c f2 ed 90 1d 38 82 3b |...k.v.t<....8.;| -orderer0.example.com | 00000010 a0 c5 2e 02 1b bc a5 1e 72 ed 54 a8 a8 51 12 40 |........r.T..Q.@|" -orderer0.example.com | "2019-07-20 02:40:35.056 UTC [msp.identity] Verify -> DEBU 12f0 Verify: sig = 00000000 30 44 02 20 62 a1 1a 7d 4f 7a a7 76 ae 13 c5 ee |0D. b..}Oz.v....| -orderer0.example.com | 00000010 c1 18 b3 61 8e 0b 41 10 63 85 b2 a0 9b d8 0b f0 |...a..A.c.......| -orderer0.example.com | 00000020 e6 4e 6b 9b 02 20 79 f5 a2 9c 06 11 e5 d3 58 50 |.Nk.. y.......XP| -orderer0.example.com | 00000030 19 34 3b 23 73 79 56 ce 3a 78 61 8c 6a 2b 2a b2 |.4;#syV.:xa.j+*.| -orderer0.example.com | 00000040 a8 90 b3 51 05 21 |...Q.!|" -orderer0.example.com | "2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12f1 0xc000c73a60 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:35.057 UTC [cauthdsl] func1 -> DEBU 12f2 0xc000c73a60 gate 1563590435055006700 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f3 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f5 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f7 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:35.058 UTC [policies] Evaluate -> DEBU 12f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.311 UTC [gossip.comm] func1 -> DEBU 109f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.311 UTC [gossip.gossip] handleMessage -> DEBU 10a0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.311 UTC [gossip.gossip] handleMessage -> DEBU 10a1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.311 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10a3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a4 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| -peer0.org1.example.com | 00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" -peer0.org1.example.com | "2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a5 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| -peer0.org1.example.com | 00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| -peer0.org1.example.com | 00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| -peer0.org1.example.com | 00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| -peer0.org1.example.com | 00000040 f9 ac 47 d7 14 7f 16 |..G....|" -peer0.org1.example.com | "2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a7 Verify: sig = 00000000 30 44 02 20 54 7a a3 42 c9 28 88 5a 9e dc 61 40 |0D. Tz.B.(.Z..a@| -peer0.org1.example.com | 00000010 15 60 a5 f4 e5 c7 f4 d7 37 be 0d 99 56 96 14 5b |.`......7...V..[| -peer0.org1.example.com | 00000020 cf f2 3f e9 02 20 53 9a 33 29 47 4f cb 41 b1 ea |..?.. S.3)GO.A..| -peer0.org1.example.com | 00000030 6f ea 5e d7 b6 24 9c 62 ac b3 e6 2c ec 98 74 4b |o.^..$.b...,..tK| -peer0.org1.example.com | 00000040 87 ad b6 4e 77 48 |...NwH|" -peer0.org1.example.com | "2019-07-20 02:39:56.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 10a8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.313 UTC [gossip.discovery] isSentByMe -> DEBU 10a9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 10aa Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10ab Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.314 UTC [gossip.comm] func1 -> DEBU 10ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.314 UTC [gossip.gossip] handleMessage -> DEBU 10ad Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.314 UTC [gossip.gossip] handleMessage -> DEBU 10ae Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.314 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10af Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10b0 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:56.315 UTC [msp.identity] Verify -> DEBU 10b1 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| -peer0.org1.example.com | 00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" -peer0.org1.example.com | "2019-07-20 02:39:56.315 UTC [msp.identity] Verify -> DEBU 10b2 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| -peer0.org1.example.com | 00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| -peer0.org1.example.com | 00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| -peer0.org1.example.com | 00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| -peer0.org1.example.com | 00000040 77 5f b8 b7 06 c1 |w_....|" -peer0.org1.example.com | "2019-07-20 02:39:56.316 UTC [gossip.comm] func1 -> DEBU 10b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.316 UTC [gossip.gossip] handleMessage -> DEBU 10b4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 10b5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 10b6 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10b7 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:56.317 UTC [msp.identity] Verify -> DEBU 10b8 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| -peer0.org1.example.com | 00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" -peer0.org1.example.com | "2019-07-20 02:39:56.317 UTC [msp.identity] Verify -> DEBU 10b9 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| -peer0.org1.example.com | 00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| -orderer0.example.com | "2019-07-20 02:40:35.058 UTC [common.deliver] deliverBlocks -> DEBU 12f9 [channel: businesschannel] Received seekInfo (0xc000d154c0) start: > stop: > from 172.18.0.9:39232" -orderer0.example.com | "2019-07-20 02:40:35.059 UTC [fsblkstorage] Next -> DEBU 12fa Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -orderer0.example.com | "2019-07-20 02:40:35.059 UTC [fsblkstorage] newBlockfileStream -> DEBU 12fb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" -orderer0.example.com | "2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fc Remaining bytes=[3991], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fd Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" -orderer0.example.com | "2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fe blockbytes [3989] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:35.060 UTC [common.deliver] deliverBlocks -> DEBU 12ff [channel: businesschannel] Delivering block for (0xc000d154c0) for 172.18.0.9:39232" -orderer0.example.com | "2019-07-20 02:40:35.060 UTC [common.deliver] deliverBlocks -> DEBU 1300 [channel: businesschannel] Done delivering to 172.18.0.9:39232 for (0xc000d154c0)" -orderer0.example.com | "2019-07-20 02:40:35.061 UTC [common.deliver] Handle -> DEBU 1301 Waiting for new SeekInfo from 172.18.0.9:39232" -orderer0.example.com | "2019-07-20 02:40:35.061 UTC [common.deliver] Handle -> DEBU 1302 Attempting to read seek info message from 172.18.0.9:39232" -orderer0.example.com | "2019-07-20 02:40:35.061 UTC [fsblkstorage] waitForBlock -> DEBU 1303 Came out of wait. maxAvailaBlockNumber=[5]" -orderer0.example.com | "2019-07-20 02:40:35.061 UTC [fsblkstorage] waitForBlock -> DEBU 1304 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -orderer0.example.com | "2019-07-20 02:40:35.067 UTC [common.deliver] Handle -> WARN 1305 Error reading from 172.18.0.9:39232: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:35.067 UTC [orderer.common.server] func1 -> DEBU 1306 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:35.067 UTC [comm.grpc.server] 1 -> INFO 1307 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39232 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8221ms -orderer0.example.com | "2019-07-20 02:40:35.067 UTC [grpc] infof -> DEBU 1308 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:35.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1309 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" -orderer0.example.com | "2019-07-20 02:40:35.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130a Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" -orderer0.example.com | "2019-07-20 02:40:35.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.3µs " -orderer0.example.com | "2019-07-20 02:40:35.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 303.2µs " -orderer0.example.com | "2019-07-20 02:40:35.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:35.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:35.229 UTC [orderer.common.server] Deliver -> DEBU 130f Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:35.229 UTC [common.deliver] Handle -> DEBU 1310 Starting new deliver loop for 172.18.0.9:39234" -orderer0.example.com | "2019-07-20 02:40:35.229 UTC [common.deliver] Handle -> DEBU 1311 Attempting to read seek info message from 172.18.0.9:39234" -orderer0.example.com | "2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1312 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1313 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1314 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1315 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1316 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.230 UTC [msp] DeserializeIdentity -> DEBU 1317 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:35.230 UTC [msp.identity] newIdentity -> DEBU 1318 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:35.231 UTC [cauthdsl] func1 -> DEBU 1319 0xc0003727b0 gate 1563590435231243700 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131a 0xc0003727b0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131b 0xc0003727b0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:35.231 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 131c Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-07-20 02:40:35.231 UTC [msp] Validate -> DEBU 131d MSP OrdererMSP validating identity" -peer0.org1.example.com | 00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| -peer0.org1.example.com | 00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| -peer0.org1.example.com | 00000040 f9 ac 47 d7 14 7f 16 |..G....|" -peer0.org1.example.com | "2019-07-20 02:39:56.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 10ba Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [gossip.discovery] isSentByMe -> DEBU 10bb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [gossip.discovery] handleAliveMessage -> DEBU 10bc Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10bd Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [msp] DeserializeIdentity -> DEBU 10be Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10bf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10c0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10c1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [policies] Evaluate -> DEBU 10c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func1 -> DEBU 10c5 0xc0033ffb60 gate 1563590396319207900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c6 0xc0033ffb60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c7 0xc0033ffb60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c8 0xc0033ffb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c9 0xc0033ffb60 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func1 -> DEBU 10ca 0xc0033ffb60 gate 1563590396319207900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10cb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [policies] Evaluate -> DEBU 10cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [cauthdsl] func1 -> DEBU 10ce 0xc0034a23a0 gate 1563590396320080200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10cf 0xc0034a23a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10d0 0xc0034a23a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10d1 0xc0034a23a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [msp.identity] Verify -> DEBU 10d2 Verify: digest = 00000000 32 cd 79 69 26 bd f0 b6 fa 3d 9b 05 4c 4c 9f 63 |2.yi&....=..LL.c| -peer0.org1.example.com | 00000010 24 41 4d c3 5c 68 56 af ce 9f 1b c2 8a 17 de 69 |$AM.\hV........i|" -peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [msp.identity] Verify -> DEBU 10d3 Verify: sig = 00000000 30 44 02 20 51 04 be fc db d6 de c6 b6 ae 09 47 |0D. Q..........G| -peer0.org1.example.com | 00000010 f4 3c 44 29 af 53 0d 4b 18 41 dd 7f 84 88 de 6d |. DEBU 10d4 0xc0034a23a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [cauthdsl] func1 -> DEBU 10d5 0xc0034a23a0 gate 1563590396320080200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131e 0xc0003727b0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:35.231 UTC [msp.identity] Verify -> DEBU 131f Verify: digest = 00000000 21 3d 69 43 6a 6e 6b f0 67 21 36 03 79 43 b0 c4 |!=iCjnk.g!6.yC..| -orderer0.example.com | 00000010 00 5a b3 48 51 44 03 c7 11 f8 7a a3 64 02 ec d7 |.Z.HQD....z.d...|" -orderer0.example.com | "2019-07-20 02:40:35.231 UTC [msp.identity] Verify -> DEBU 1320 Verify: sig = 00000000 30 45 02 21 00 cb 67 74 a4 b1 dc 3a 46 5a ed d1 |0E.!..gt...:FZ..| -orderer0.example.com | 00000010 c0 11 27 6e d2 fc 73 57 a5 16 e7 57 77 2f 31 ad |..'n..sW...Ww/1.| -orderer0.example.com | 00000020 7d 3e fe bb cc 02 20 16 e8 63 82 c0 a8 3b 0f bd |}>.... ..c...;..| -orderer0.example.com | 00000030 25 b8 3b a6 96 d6 8d 4b b7 2b b4 14 7b 36 4b f0 |%.;....K.+..{6K.| -orderer0.example.com | 00000040 93 6a 99 32 d9 6a d9 |.j.2.j.|" -orderer0.example.com | "2019-07-20 02:40:35.232 UTC [cauthdsl] func2 -> DEBU 1321 0xc0003727b0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:35.232 UTC [cauthdsl] func1 -> DEBU 1322 0xc0003727b0 gate 1563590435231243700 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1323 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1324 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1325 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1326 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1327 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:35.233 UTC [policies] Evaluate -> DEBU 1328 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:35.233 UTC [common.deliver] deliverBlocks -> DEBU 1329 [channel: testchainid] Received seekInfo (0xc00121fd40) start: > stop: > from 172.18.0.9:39234" -orderer0.example.com | "2019-07-20 02:40:35.233 UTC [fsblkstorage] Next -> DEBU 132a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-07-20 02:40:35.233 UTC [fsblkstorage] newBlockfileStream -> DEBU 132b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -orderer0.example.com | "2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132c Remaining bytes=[25835], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132d Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -orderer0.example.com | "2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132e blockbytes [25832] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:35.235 UTC [common.deliver] deliverBlocks -> DEBU 132f [channel: testchainid] Delivering block for (0xc00121fd40) for 172.18.0.9:39234" -orderer0.example.com | "2019-07-20 02:40:35.235 UTC [common.deliver] deliverBlocks -> DEBU 1330 [channel: testchainid] Done delivering to 172.18.0.9:39234 for (0xc00121fd40)" -orderer0.example.com | "2019-07-20 02:40:35.235 UTC [common.deliver] Handle -> DEBU 1331 Waiting for new SeekInfo from 172.18.0.9:39234" -orderer0.example.com | "2019-07-20 02:40:35.235 UTC [common.deliver] Handle -> DEBU 1332 Attempting to read seek info message from 172.18.0.9:39234" -orderer0.example.com | "2019-07-20 02:40:35.240 UTC [common.deliver] Handle -> WARN 1333 Error reading from 172.18.0.9:39234: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:35.240 UTC [orderer.common.server] func1 -> DEBU 1334 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:35.241 UTC [grpc] infof -> DEBU 1336 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:35.240 UTC [comm.grpc.server] 1 -> INFO 1335 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39234 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.5766ms -orderer0.example.com | "2019-07-20 02:40:35.387 UTC [orderer.common.server] Deliver -> DEBU 1337 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:35.387 UTC [common.deliver] Handle -> DEBU 1338 Starting new deliver loop for 172.18.0.9:39236" -orderer0.example.com | "2019-07-20 02:40:35.387 UTC [common.deliver] Handle -> DEBU 1339 Attempting to read seek info message from 172.18.0.9:39236" -orderer0.example.com | "2019-07-20 02:40:35.388 UTC [policies] Evaluate -> DEBU 133a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.388 UTC [policies] Evaluate -> DEBU 133b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.389 UTC [cauthdsl] func1 -> DEBU 133f 0xc000a9aba0 gate 1563590435389465100 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1340 0xc000a9aba0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1341 0xc000a9aba0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1342 0xc000a9aba0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:35.389 UTC [msp.identity] Verify -> DEBU 1343 Verify: digest = 00000000 a3 e8 db 37 f6 15 94 6d cc 5b a8 1f fa 58 84 32 |...7...m.[...X.2| -orderer0.example.com | 00000010 9e b6 7b c3 61 44 5b 13 f9 b5 26 72 c7 d1 3e f6 |..{.aD[...&r..>.|" -orderer0.example.com | "2019-07-20 02:40:35.390 UTC [msp.identity] Verify -> DEBU 1344 Verify: sig = 00000000 30 44 02 20 6c 05 0c e0 64 52 d7 27 1e d3 5b 00 |0D. l...dR.'..[.| -orderer0.example.com | 00000010 0e 37 3e 87 0d 56 dd cd bc 6a f9 6a c6 9a 7f e3 |.7>..V...j.j....| -orderer0.example.com | 00000020 8d 52 4d e4 02 20 46 45 1f 56 83 eb ea 3a 47 23 |.RM.. FE.V...:G#| -orderer0.example.com | 00000030 80 46 c6 40 d8 6c 3d dc ae dc 82 53 d2 b2 6f c7 |.F.@.l=....S..o.| -orderer0.example.com | 00000040 d4 73 3a 68 8c eb |.s:h..|" -orderer0.example.com | "2019-07-20 02:40:35.390 UTC [cauthdsl] func2 -> DEBU 1345 0xc000a9aba0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:35.390 UTC [cauthdsl] func1 -> DEBU 1346 0xc000a9aba0 gate 1563590435389465100 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1347 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1348 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1349 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d8 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 10da Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 10db Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10dc Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.gossip] handleMessage -> DEBU 10de Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10df Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:56.322 UTC [msp.identity] Verify -> DEBU 10e0 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| -peer0.org1.example.com | 00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" -peer0.org1.example.com | "2019-07-20 02:39:56.322 UTC [msp.identity] Verify -> DEBU 10e1 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| -peer0.org1.example.com | 00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| -peer0.org1.example.com | 00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| -peer0.org1.example.com | 00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| -peer0.org1.example.com | 00000040 f9 ac 47 d7 14 7f 16 |..G....|" -peer0.org1.example.com | "2019-07-20 02:39:56.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 10e2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.322 UTC [gossip.discovery] isSentByMe -> DEBU 10e3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 10e4 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.323 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10e5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:56.323 UTC [msp] DeserializeIdentity -> DEBU 10e6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.326 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:56.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10e8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10e9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func1 -> DEBU 10ed 0xc003510a90 gate 1563590396327540900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10ee 0xc003510a90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10ef 0xc003510a90 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10f0 0xc003510a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10f1 0xc003510a90 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func1 -> DEBU 10f2 0xc003510a90 gate 1563590396327540900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134b Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:35.391 UTC [common.deliver] deliverBlocks -> DEBU 134d [channel: testchainid] Received seekInfo (0xc000d15f40) start: > stop: > from 172.18.0.9:39236" -orderer0.example.com | "2019-07-20 02:40:35.391 UTC [fsblkstorage] Next -> DEBU 134e Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-07-20 02:40:35.392 UTC [fsblkstorage] newBlockfileStream -> DEBU 134f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -orderer0.example.com | "2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1350 Remaining bytes=[25835], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1351 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -orderer0.example.com | "2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1352 blockbytes [25832] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:35.392 UTC [common.deliver] deliverBlocks -> DEBU 1353 [channel: testchainid] Delivering block for (0xc000d15f40) for 172.18.0.9:39236" -orderer0.example.com | "2019-07-20 02:40:35.393 UTC [common.deliver] deliverBlocks -> DEBU 1354 [channel: testchainid] Done delivering to 172.18.0.9:39236 for (0xc000d15f40)" -orderer0.example.com | "2019-07-20 02:40:35.393 UTC [common.deliver] Handle -> DEBU 1355 Waiting for new SeekInfo from 172.18.0.9:39236" -orderer0.example.com | "2019-07-20 02:40:35.393 UTC [common.deliver] Handle -> DEBU 1356 Attempting to read seek info message from 172.18.0.9:39236" -orderer0.example.com | "2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1357 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1358 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1359 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 135a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 135b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.397 UTC [cauthdsl] func1 -> DEBU 135c 0xc00098ce00 gate 1563590435397329000 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135d 0xc00098ce00 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135e 0xc00098ce00 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135f 0xc00098ce00 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:35.397 UTC [msp.identity] Verify -> DEBU 1360 Verify: digest = 00000000 68 c4 79 92 c2 31 53 58 65 63 fa cc e1 56 f0 c4 |h.y..1SXec...V..| -orderer0.example.com | 00000010 9d d8 6e 00 df a3 a9 99 e4 54 6f 66 dc 98 8b bb |..n......Tof....|" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [msp.identity] Verify -> DEBU 1361 Verify: sig = 00000000 30 44 02 20 0a 30 2c b9 8b 65 2d bb 3b a0 a8 4f |0D. .0,..e-.;..O| -orderer0.example.com | 00000010 59 46 86 89 be b5 60 b6 1b 99 70 e7 57 b2 9e 05 |YF....`...p.W...| -orderer0.example.com | 00000020 fa 1a af 13 02 20 37 b6 be 8d 11 b7 5f 8c bd ff |..... 7....._...| -orderer0.example.com | 00000030 1c e6 68 15 f4 0b 4b 6e 39 d1 83 1f df 9b 61 57 |..h...Kn9.....aW| -orderer0.example.com | 00000040 1a b3 b6 b9 26 d7 |....&.|" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [cauthdsl] func2 -> DEBU 1362 0xc00098ce00 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [cauthdsl] func1 -> DEBU 1363 0xc00098ce00 gate 1563590435397329000 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1364 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1365 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1366 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1367 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1368 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1369 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [common.deliver] deliverBlocks -> DEBU 136a [channel: testchainid] Received seekInfo (0xc000ba6380) start: > stop: > from 172.18.0.9:39236" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [fsblkstorage] Next -> DEBU 136b Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [fsblkstorage] newBlockfileStream -> DEBU 136c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:40:35.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136d Remaining bytes=[44254], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:35.399 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136e Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:40:35.399 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136f blockbytes [18416] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:35.399 UTC [common.deliver] deliverBlocks -> DEBU 1370 [channel: testchainid] Delivering block for (0xc000ba6380) for 172.18.0.9:39236" -orderer0.example.com | "2019-07-20 02:40:35.399 UTC [common.deliver] deliverBlocks -> DEBU 1371 [channel: testchainid] Done delivering to 172.18.0.9:39236 for (0xc000ba6380)" -orderer0.example.com | "2019-07-20 02:40:35.399 UTC [common.deliver] Handle -> DEBU 1372 Waiting for new SeekInfo from 172.18.0.9:39236" -orderer0.example.com | "2019-07-20 02:40:35.399 UTC [common.deliver] Handle -> DEBU 1373 Attempting to read seek info message from 172.18.0.9:39236" -orderer0.example.com | "2019-07-20 02:40:35.407 UTC [common.deliver] Handle -> WARN 1374 Error reading from 172.18.0.9:39236: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:35.407 UTC [orderer.common.server] func1 -> DEBU 1375 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:35.407 UTC [comm.grpc.server] 1 -> INFO 1376 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39236 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.797ms -orderer0.example.com | "2019-07-20 02:40:35.407 UTC [grpc] infof -> DEBU 1377 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:35.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1378 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:35.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1379 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" -orderer0.example.com | "2019-07-20 02:40:35.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 137a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.1µs " -orderer0.example.com | "2019-07-20 02:40:35.532 UTC [orderer.common.server] Deliver -> DEBU 137b Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:35.532 UTC [common.deliver] Handle -> DEBU 137c Starting new deliver loop for 172.18.0.9:39238" -orderer0.example.com | "2019-07-20 02:40:35.532 UTC [common.deliver] Handle -> DEBU 137d Attempting to read seek info message from 172.18.0.9:39238" -orderer0.example.com | "2019-07-20 02:40:35.532 UTC [policies] Evaluate -> DEBU 137e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 137f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1380 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1381 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1382 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.533 UTC [cauthdsl] func1 -> DEBU 1383 0xc0003d82d0 gate 1563590435533775300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1384 0xc0003d82d0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1385 0xc0003d82d0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1386 0xc0003d82d0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:35.534 UTC [msp.identity] Verify -> DEBU 1387 Verify: digest = 00000000 5f 0f 4a 9d 65 bf b8 72 3a 23 8b 74 bb 3c eb 0a |_.J.e..r:#.t.<..| -orderer0.example.com | 00000010 5c 83 45 be 21 cb b8 82 64 47 77 dc c3 82 94 b1 |\.E.!...dGw.....|" -orderer0.example.com | "2019-07-20 02:40:35.534 UTC [msp.identity] Verify -> DEBU 1388 Verify: sig = 00000000 30 44 02 20 55 dd fb 5f 82 29 2f 02 b4 96 12 2e |0D. U.._.)/.....| -orderer0.example.com | 00000010 cf 06 87 34 fb 14 87 9e f2 d3 4d e1 9a 41 da 1b |...4......M..A..| -orderer0.example.com | 00000020 e9 6c 31 74 02 20 0e c3 35 48 74 a6 7a ba bc c4 |.l1t. ..5Ht.z...| -orderer0.example.com | 00000030 9d ca 57 36 61 08 e0 86 35 25 85 e0 6a 97 1a f0 |..W6a...5%..j...| -orderer0.example.com | 00000040 5f ca 0b ee ae 2b |_....+|" -orderer0.example.com | "2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1389 0xc0003d82d0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:35.535 UTC [cauthdsl] func1 -> DEBU 138a 0xc0003d82d0 gate 1563590435533775300 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:35.535 UTC [policies] Evaluate -> DEBU 138b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.535 UTC [policies] Evaluate -> DEBU 138c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138d Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138f Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 1390 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:35.536 UTC [common.deliver] deliverBlocks -> DEBU 1391 [channel: testchainid] Received seekInfo (0xc0011d5300) start: > stop: > from 172.18.0.9:39238" -orderer0.example.com | "2019-07-20 02:40:35.537 UTC [fsblkstorage] Next -> DEBU 1392 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-07-20 02:40:35.537 UTC [fsblkstorage] newBlockfileStream -> DEBU 1393 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:40:35.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1394 Remaining bytes=[44254], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:35.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1395 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:40:35.538 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1396 blockbytes [18416] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:35.538 UTC [common.deliver] deliverBlocks -> DEBU 1397 [channel: testchainid] Delivering block for (0xc0011d5300) for 172.18.0.9:39238" -orderer0.example.com | "2019-07-20 02:40:35.538 UTC [common.deliver] deliverBlocks -> DEBU 1398 [channel: testchainid] Done delivering to 172.18.0.9:39238 for (0xc0011d5300)" -orderer0.example.com | "2019-07-20 02:40:35.539 UTC [common.deliver] Handle -> DEBU 1399 Waiting for new SeekInfo from 172.18.0.9:39238" -orderer0.example.com | "2019-07-20 02:40:35.539 UTC [common.deliver] Handle -> DEBU 139a Attempting to read seek info message from 172.18.0.9:39238" -orderer0.example.com | "2019-07-20 02:40:35.548 UTC [common.deliver] Handle -> WARN 139b Error reading from 172.18.0.9:39238: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:35.548 UTC [orderer.common.server] func1 -> DEBU 139c Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:35.548 UTC [comm.grpc.server] 1 -> INFO 139d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39238 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.69ms -orderer0.example.com | "2019-07-20 02:40:35.549 UTC [grpc] infof -> DEBU 139e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:35.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 139f Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" -orderer0.example.com | "2019-07-20 02:40:35.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" -orderer0.example.com | "2019-07-20 02:40:35.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " -orderer0.example.com | "2019-07-20 02:40:35.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 336.3µs " -orderer0.example.com | "2019-07-20 02:40:35.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:35.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:35.702 UTC [orderer.common.server] Deliver -> DEBU 13a5 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:35.702 UTC [common.deliver] Handle -> DEBU 13a6 Starting new deliver loop for 172.18.0.9:39240" -orderer0.example.com | "2019-07-20 02:40:35.702 UTC [common.deliver] Handle -> DEBU 13a7 Attempting to read seek info message from 172.18.0.9:39240" -orderer0.example.com | "2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13ac == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:35.703 UTC [cauthdsl] func1 -> DEBU 13ad 0xc00096f690 gate 1563590435702988800 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13ae 0xc00096f690 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13af 0xc00096f690 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13b0 0xc00096f690 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:35.703 UTC [msp.identity] Verify -> DEBU 13b1 Verify: digest = 00000000 19 14 01 e4 ac 98 0d 33 b0 e7 e6 d9 29 ad da 78 |.......3....)..x| -orderer0.example.com | 00000010 5f 7f d8 63 22 18 6f c2 02 98 d1 16 ec c2 3a 40 |_..c".o.......:@|" -orderer0.example.com | "2019-07-20 02:40:35.703 UTC [msp.identity] Verify -> DEBU 13b2 Verify: sig = 00000000 30 45 02 21 00 9a 96 af 90 93 69 2a e6 7c 2d e0 |0E.!......i*.|-.| -peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [cauthdsl] func1 -> DEBU 10f6 0xc0035112d0 gate 1563590396328506100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f7 0xc0035112d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f8 0xc0035112d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f9 0xc0035112d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [msp.identity] Verify -> DEBU 10fa Verify: digest = 00000000 4a 76 46 0b 4f 2a e4 ff 21 78 d0 85 80 ae eb 74 |JvF.O*..!x.....t| -peer0.org1.example.com | 00000010 5d 30 24 cc c9 9f 4f ca b6 de ec f2 1f a5 ec 97 |]0$...O.........|" -peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [msp.identity] Verify -> DEBU 10fb Verify: sig = 00000000 30 45 02 21 00 eb 3e 8d 69 89 0c d8 8f f7 5a 50 |0E.!..>.i.....ZP| -peer0.org1.example.com | 00000010 a9 cd 60 cd 06 bb 63 ee f8 40 18 62 d9 6b 8f df |..`...c..@.b.k..| -peer0.org1.example.com | 00000020 a2 0b 90 a6 4b 02 20 79 3e c8 74 e2 42 e5 32 7b |....K. y>.t.B.2{| -peer0.org1.example.com | 00000030 ca 14 da 23 9d 93 28 fe e9 d2 0e f1 be 15 47 61 |...#..(.......Ga| -peer0.org1.example.com | 00000040 6e d8 65 dc d7 b6 e9 |n.e....|" -peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [cauthdsl] func2 -> DEBU 10fc 0xc0035112d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [cauthdsl] func1 -> DEBU 10fd 0xc0035112d0 gate 1563590396328506100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [policies] Evaluate -> DEBU 10fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [policies] Evaluate -> DEBU 10ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [policies] Evaluate -> DEBU 1100 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [policies] Evaluate -> DEBU 1101 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [gossip.discovery] handleAliveMessage -> DEBU 1102 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [gossip.discovery] handleAliveMessage -> DEBU 1103 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1104 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [msp.identity] Verify -> DEBU 1105 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| -peer0.org1.example.com | 00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" -peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [msp.identity] Verify -> DEBU 1106 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| -peer0.org1.example.com | 00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| -peer0.org1.example.com | 00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| -peer0.org1.example.com | 00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| -peer0.org1.example.com | 00000040 77 5f b8 b7 06 c1 |w_....|" -peer0.org1.example.com | "2019-07-20 02:39:56.331 UTC [gossip.discovery] handleAliveMessage -> DEBU 1107 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.331 UTC [gossip.discovery] handleAliveMessage -> DEBU 1108 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.331 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1109 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.396 UTC [gossip.comm] func1 -> DEBU 110a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.396 UTC [gossip.comm] func1 -> DEBU 110b Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.396 UTC [gossip.gossip] handleMessage -> DEBU 110c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.396 UTC [gossip.pull] HandleMessage -> DEBU 110d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.397 UTC [gossip.pull] SendDigest -> DEBU 110e Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 110f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 1110 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 1111 Exiting" -orderer0.example.com | 00000010 82 36 7d 5e 62 6a 40 ee 39 d4 0a 45 3d 05 fc a7 |.6}^bj@.9..E=...| -orderer0.example.com | 00000020 55 06 db 29 a9 02 20 24 38 5d 25 1f af c8 7e 67 |U..).. $8]%...~g| -orderer0.example.com | 00000030 be 9e 81 7e 9a c9 39 f9 28 bb 1e 72 6c 02 55 cf |...~..9.(..rl.U.| -orderer0.example.com | 00000040 3a 80 84 4b b9 48 5e |:..K.H^|" -orderer0.example.com | "2019-07-20 02:40:35.704 UTC [cauthdsl] func2 -> DEBU 13b3 0xc00096f690 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:35.704 UTC [cauthdsl] func1 -> DEBU 13b4 0xc00096f690 gate 1563590435702988800 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b7 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b9 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:35.705 UTC [policies] Evaluate -> DEBU 13ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:35.705 UTC [common.deliver] deliverBlocks -> DEBU 13bb [channel: testchainid] Received seekInfo (0xc0011d5a80) start: > stop: > from 172.18.0.9:39240" -orderer0.example.com | "2019-07-20 02:40:35.705 UTC [fsblkstorage] Next -> DEBU 13bc Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-07-20 02:40:35.705 UTC [fsblkstorage] newBlockfileStream -> DEBU 13bd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -orderer0.example.com | "2019-07-20 02:40:35.705 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13be Remaining bytes=[25835], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:35.705 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13bf Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -orderer0.example.com | "2019-07-20 02:40:35.706 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13c0 blockbytes [25832] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:35.706 UTC [common.deliver] deliverBlocks -> DEBU 13c1 [channel: testchainid] Delivering block for (0xc0011d5a80) for 172.18.0.9:39240" -orderer0.example.com | "2019-07-20 02:40:35.706 UTC [common.deliver] deliverBlocks -> DEBU 13c2 [channel: testchainid] Done delivering to 172.18.0.9:39240 for (0xc0011d5a80)" -orderer0.example.com | "2019-07-20 02:40:35.706 UTC [common.deliver] Handle -> DEBU 13c3 Waiting for new SeekInfo from 172.18.0.9:39240" -orderer0.example.com | "2019-07-20 02:40:35.706 UTC [common.deliver] Handle -> DEBU 13c4 Attempting to read seek info message from 172.18.0.9:39240" -orderer0.example.com | "2019-07-20 02:40:35.713 UTC [grpc] infof -> DEBU 13c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:35.714 UTC [common.deliver] Handle -> WARN 13c6 Error reading from 172.18.0.9:39240: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:35.714 UTC [orderer.common.server] func1 -> DEBU 13c7 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:35.714 UTC [comm.grpc.server] 1 -> INFO 13c8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39240 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.8108ms -orderer0.example.com | "2019-07-20 02:40:35.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:35.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ca Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" -orderer0.example.com | "2019-07-20 02:40:35.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.7µs " -orderer0.example.com | "2019-07-20 02:40:36.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cc Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" -orderer0.example.com | "2019-07-20 02:40:36.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cd Sending msg of 28 bytes to 3 on channel businesschannel took 31.5µs" -orderer0.example.com | "2019-07-20 02:40:36.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.8µs " -orderer0.example.com | "2019-07-20 02:40:36.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 619µs " -orderer0.example.com | "2019-07-20 02:40:36.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:36.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:36.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:36.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d3 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" -orderer0.example.com | "2019-07-20 02:40:36.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " -orderer0.example.com | "2019-07-20 02:40:36.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d5 Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs" -orderer0.example.com | "2019-07-20 02:40:36.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d6 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" -orderer0.example.com | "2019-07-20 02:40:36.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68µs " -orderer0.example.com | "2019-07-20 02:40:36.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.2µs " -orderer0.example.com | "2019-07-20 02:40:36.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:36.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13da Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:36.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13db Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:36.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13dc Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" -orderer0.example.com | "2019-07-20 02:40:36.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13dd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.6µs " -orderer0.example.com | "2019-07-20 02:40:37.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13de Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" -orderer0.example.com | "2019-07-20 02:40:37.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13df Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" -orderer0.example.com | "2019-07-20 02:40:37.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97µs " -orderer0.example.com | "2019-07-20 02:40:37.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61µs " -orderer0.example.com | "2019-07-20 02:40:37.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:37.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:37.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -peer0.org1.example.com | "2019-07-20 02:39:56.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1112 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.398 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1113 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:56.398 UTC [msp.identity] Verify -> DEBU 1114 Verify: digest = 00000000 30 98 1f 5f 64 29 89 30 5c 59 fd 02 51 76 6f 11 |0.._d).0\Y..Qvo.| -peer0.org1.example.com | 00000010 51 b3 b7 50 f2 ad 2c b0 2d 4c 83 92 45 0e be 49 |Q..P..,.-L..E..I|" -peer0.org1.example.com | "2019-07-20 02:39:56.398 UTC [msp.identity] Verify -> DEBU 1115 Verify: sig = 00000000 30 44 02 20 56 d8 b5 99 4c 20 22 6a d7 3a 6b 8d |0D. V...L "j.:k.| -peer0.org1.example.com | 00000010 d4 16 cb 44 f1 6f 70 bc 74 2e dc 24 7a ee 73 4c |...D.op.t..$z.sL| -peer0.org1.example.com | 00000020 55 87 2c d9 02 20 0e ca 61 aa 61 22 3a d5 77 02 |U.,.. ..a.a":.w.| -peer0.org1.example.com | 00000030 f3 0d 26 7e 64 dd db 40 e9 ec 5d 04 e7 30 a6 db |..&~d..@..]..0..| -peer0.org1.example.com | 00000040 61 aa b2 d8 91 4a |a....J|" -peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [msp.identity] Verify -> DEBU 1116 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [msp.identity] Verify -> DEBU 1117 Verify: sig = 00000000 30 44 02 20 7d 62 a6 cc d7 5f 52 a4 65 41 48 3f |0D. }b..._R.eAH?| -peer0.org1.example.com | 00000010 57 5d 86 7f aa bb ab cc 62 14 9b 0e ef 34 6a a9 |W]......b....4j.| -peer0.org1.example.com | 00000020 4c f0 a6 84 02 20 75 7e 8e 55 ea d1 2d d2 af a3 |L.... u~.U..-...| -peer0.org1.example.com | 00000030 b1 14 f8 02 d7 b5 06 45 61 92 c4 32 7d dc d3 35 |.......Ea..2}..5| -peer0.org1.example.com | 00000040 f1 e6 79 84 c9 f7 |..y...|" -peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [gossip.discovery] handleAliveMessage -> DEBU 1118 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 1119 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [gossip.discovery] learnExistingMembers -> DEBU 111d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [gossip.discovery] handleAliveMessage -> DEBU 111e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [gossip.discovery] handleMsgFromComm -> DEBU 111f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [gossip.discovery] sendMemResponse -> DEBU 1120 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [msp] DeserializeIdentity -> DEBU 1121 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [msp] DeserializeIdentity -> DEBU 1122 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.401 UTC [gossip.comm] Send -> DEBU 1123 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.401 UTC [gossip.discovery] sendMemResponse -> DEBU 1124 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " -peer0.org1.example.com | "2019-07-20 02:39:56.401 UTC [gossip.comm] sendToEndpoint -> DEBU 1125 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.401 UTC [gossip.comm] sendToEndpoint -> DEBU 1126 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.575 UTC [gossip.comm] func1 -> DEBU 1127 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.575 UTC [gossip.gossip] handleMessage -> DEBU 1128 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.577 UTC [gossip.pull] HandleMessage -> DEBU 1129 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.578 UTC [gossip.pull] SendDigest -> DEBU 1130 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:39:56.579 UTC [gossip.gossip] handleMessage -> DEBU 1131 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.581 UTC [gossip.comm] func1 -> DEBU 1132 Got message: GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.582 UTC [gossip.gossip] handleMessage -> DEBU 1133 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.582 UTC [gossip.gossip] handleMessage -> DEBU 1134 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1135 Got message: GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.582 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1136 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:56.582 UTC [msp] DeserializeIdentity -> DEBU 1137 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1138 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1139 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 113a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [cauthdsl] func1 -> DEBU 113e 0xc003647a40 gate 1563590396583810200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [cauthdsl] func2 -> DEBU 113f 0xc003647a40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [cauthdsl] func2 -> DEBU 1140 0xc003647a40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1141 0xc003647a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1142 0xc003647a40 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [cauthdsl] func1 -> DEBU 1143 0xc003647a40 gate 1563590396583810200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1144 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1145 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1146 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [cauthdsl] func1 -> DEBU 1147 0xc0036522b0 gate 1563590396584797100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1148 0xc0036522b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 1149 0xc0036522b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 114a 0xc0036522b0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:37.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e5 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" -orderer0.example.com | "2019-07-20 02:40:37.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.5µs " -orderer0.example.com | "2019-07-20 02:40:37.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e7 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" -orderer0.example.com | "2019-07-20 02:40:37.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e8 Sending msg of 28 bytes to 3 on channel businesschannel took 86.8µs" -orderer0.example.com | "2019-07-20 02:40:37.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.9µs " -orderer0.example.com | "2019-07-20 02:40:37.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " -orderer0.example.com | "2019-07-20 02:40:37.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13eb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:37.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ec Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:37.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ed Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:37.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ee Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" -orderer0.example.com | "2019-07-20 02:40:37.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.9µs " -orderer0.example.com | "2019-07-20 02:40:38.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f0 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" -orderer0.example.com | "2019-07-20 02:40:38.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f1 Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" -orderer0.example.com | "2019-07-20 02:40:38.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.5µs " -orderer0.example.com | "2019-07-20 02:40:38.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.8µs " -orderer0.example.com | "2019-07-20 02:40:38.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:38.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:38.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:38.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f7 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" -orderer0.example.com | "2019-07-20 02:40:38.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.1µs " -orderer0.example.com | "2019-07-20 02:40:38.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f9 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" -orderer0.example.com | "2019-07-20 02:40:38.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fa Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" -orderer0.example.com | "2019-07-20 02:40:38.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.2µs " -orderer0.example.com | "2019-07-20 02:40:38.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.2µs " -orderer0.example.com | "2019-07-20 02:40:38.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fd Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:38.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:38.944 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ff Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:38.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1400 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" -orderer0.example.com | "2019-07-20 02:40:38.944 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1401 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " -orderer0.example.com | "2019-07-20 02:40:39.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1402 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" -orderer0.example.com | "2019-07-20 02:40:39.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1403 Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" -orderer0.example.com | "2019-07-20 02:40:39.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1404 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92µs " -orderer0.example.com | "2019-07-20 02:40:39.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1405 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " -orderer0.example.com | "2019-07-20 02:40:39.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1406 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:39.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1407 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:39.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1408 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:39.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1409 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" -orderer0.example.com | "2019-07-20 02:40:39.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.6µs " -peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [msp.identity] Verify -> DEBU 114b Verify: digest = 00000000 b2 1f d3 c5 78 4e f0 67 c6 95 96 e8 61 8f 1e 7b |....xN.g....a..{| -peer0.org1.example.com | 00000010 8a b5 ce 53 08 01 b1 41 bd 4c 76 92 c5 c2 96 88 |...S...A.Lv.....|" -peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [msp.identity] Verify -> DEBU 114c Verify: sig = 00000000 30 45 02 21 00 d2 17 c8 86 38 cd 80 57 2c 8d 1b |0E.!.....8..W,..| -peer0.org1.example.com | 00000010 b2 32 cc 27 04 ec 32 ce 67 fc b4 e6 fd aa 08 42 |.2.'..2.g......B| -peer0.org1.example.com | 00000020 ce 00 ff ff fe 02 20 35 74 64 e9 dc 2c a7 a5 2e |...... 5td..,...| -peer0.org1.example.com | 00000030 f2 23 3e 5f 6b 39 70 2c 9c 79 bb b7 ee 0a 8a 22 |.#>_k9p,.y....."| -peer0.org1.example.com | 00000040 c2 f7 6b 80 ac 07 af |..k....|" -peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 114d 0xc0036522b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [cauthdsl] func1 -> DEBU 114e 0xc0036522b0 gate 1563590396584797100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [policies] Evaluate -> DEBU 114f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [policies] Evaluate -> DEBU 1150 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [policies] Evaluate -> DEBU 1151 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [policies] Evaluate -> DEBU 1152 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] handleAliveMessage -> DEBU 1153 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1154 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1155 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1156 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1157 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1158 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] handleAliveMessage -> DEBU 1159 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU 115a Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.587 UTC [gossip.discovery] sendMemResponse -> DEBU 115b Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:39:56.587 UTC [msp] DeserializeIdentity -> DEBU 115c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.588 UTC [msp] DeserializeIdentity -> DEBU 115d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.588 UTC [msp] DeserializeIdentity -> DEBU 115e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.588 UTC [gossip.comm] Send -> DEBU 115f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.588 UTC [gossip.discovery] sendMemResponse -> DEBU 1160 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" > alive:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > alive: alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " -peer0.org1.example.com | "2019-07-20 02:39:56.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1161 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1162 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.752 UTC [msp] DeserializeIdentity -> DEBU 1163 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.752 UTC [msp] DeserializeIdentity -> DEBU 1164 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.752 UTC [gossip.comm] Send -> DEBU 1165 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.752 UTC [gossip.comm] sendToEndpoint -> DEBU 1166 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.752 UTC [gossip.comm] sendToEndpoint -> DEBU 1167 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 1168 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 1169 Exiting" -orderer0.example.com | "2019-07-20 02:40:39.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140b Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" -orderer0.example.com | "2019-07-20 02:40:39.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140c Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" -orderer0.example.com | "2019-07-20 02:40:39.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 513.5µs " -orderer0.example.com | "2019-07-20 02:40:39.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.5µs " -orderer0.example.com | "2019-07-20 02:40:39.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:39.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1410 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:39.797 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1411 No inactive chains to try to replicate" -orderer0.example.com | "2019-07-20 02:40:39.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1412 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:39.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1413 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" -orderer0.example.com | "2019-07-20 02:40:39.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1414 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.7µs " -orderer0.example.com | "2019-07-20 02:40:40.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1415 Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" -orderer0.example.com | "2019-07-20 02:40:40.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1416 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" -orderer0.example.com | "2019-07-20 02:40:40.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1417 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.4µs " -orderer0.example.com | "2019-07-20 02:40:40.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1418 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 701.6µs " -orderer0.example.com | "2019-07-20 02:40:40.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1419 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:40.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:40.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:40.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141c Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" -orderer0.example.com | "2019-07-20 02:40:40.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 141d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.6µs " -orderer0.example.com | "2019-07-20 02:40:40.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141e Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" -orderer0.example.com | "2019-07-20 02:40:40.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141f Sending msg of 28 bytes to 3 on channel businesschannel took 6.6µs" -orderer0.example.com | "2019-07-20 02:40:40.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1420 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " -orderer0.example.com | "2019-07-20 02:40:40.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1421 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " -orderer0.example.com | "2019-07-20 02:40:40.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1422 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:40.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1423 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:40.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1424 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:40.939 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1425 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" -orderer0.example.com | "2019-07-20 02:40:40.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1426 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.9µs " -orderer0.example.com | "2019-07-20 02:40:41.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1427 Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" -orderer0.example.com | "2019-07-20 02:40:41.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1428 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120µs " -orderer0.example.com | "2019-07-20 02:40:41.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1429 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" -orderer0.example.com | "2019-07-20 02:40:41.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.4µs " -orderer0.example.com | "2019-07-20 02:40:41.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:41.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:41.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:41.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142e Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" -orderer0.example.com | "2019-07-20 02:40:41.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.1µs " -orderer0.example.com | "2019-07-20 02:40:41.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1430 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" -orderer0.example.com | "2019-07-20 02:40:41.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1431 Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" -peer0.org1.example.com | "2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 116a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 116b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.754 UTC [gossip.comm] func1 -> DEBU 116c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.754 UTC [gossip.gossip] handleMessage -> DEBU 116d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 116e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 116f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 1170 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1171 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1172 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1173 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1174 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1175 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1176 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [cauthdsl] func1 -> DEBU 1177 0xc0036866d0 gate 1563590396755881700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.756 UTC [cauthdsl] func2 -> DEBU 1178 0xc0036866d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.756 UTC [cauthdsl] func2 -> DEBU 1179 0xc0036866d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 117a 0xc0036866d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 117b 0xc0036866d0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [cauthdsl] func1 -> DEBU 117c 0xc0036866d0 gate 1563590396755881700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [cauthdsl] func1 -> DEBU 1180 0xc003687030 gate 1563590396757820400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 1181 0xc003687030 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.758 UTC [cauthdsl] func2 -> DEBU 1182 0xc003687030 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.758 UTC [cauthdsl] func2 -> DEBU 1183 0xc003687030 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.758 UTC [msp.identity] Verify -> DEBU 1184 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:39:56.758 UTC [gossip.comm] func1 -> DEBU 1185 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.759 UTC [gossip.comm] func1 -> DEBU 1186 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.758 UTC [msp.identity] Verify -> DEBU 1187 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [cauthdsl] func2 -> DEBU 1188 0xc003687030 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 1189 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 118a Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:41.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1432 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " -orderer0.example.com | "2019-07-20 02:40:41.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1433 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " -orderer0.example.com | "2019-07-20 02:40:41.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1434 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:41.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1435 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:41.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1436 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:41.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1437 Sending msg of 28 bytes to 3 on channel testchainid took 19µs" -orderer0.example.com | "2019-07-20 02:40:41.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1438 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.7µs " -orderer0.example.com | "2019-07-20 02:40:42.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1439 Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" -orderer0.example.com | "2019-07-20 02:40:42.206 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143c Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" -orderer0.example.com | "2019-07-20 02:40:42.206 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.2µs " -orderer0.example.com | "2019-07-20 02:40:42.201 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.7µs " -orderer0.example.com | "2019-07-20 02:40:42.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:42.207 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:42.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:42.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1440 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" -orderer0.example.com | "2019-07-20 02:40:42.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1441 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 380.7µs " -orderer0.example.com | "2019-07-20 02:40:42.755 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1442 Sending msg of 28 bytes to 3 on channel businesschannel took 128.5µs" -orderer0.example.com | "2019-07-20 02:40:42.755 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1443 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" -orderer0.example.com | "2019-07-20 02:40:42.756 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1444 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 324.3µs " -orderer0.example.com | "2019-07-20 02:40:42.757 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1445 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 492.8µs " -orderer0.example.com | "2019-07-20 02:40:42.769 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1446 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:42.769 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1447 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:42.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1448 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:42.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1449 Sending msg of 28 bytes to 3 on channel testchainid took 107.8µs" -orderer0.example.com | "2019-07-20 02:40:42.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.1µs " -orderer0.example.com | "2019-07-20 02:40:43.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144b Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" -orderer0.example.com | "2019-07-20 02:40:43.209 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144c Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" -orderer0.example.com | "2019-07-20 02:40:43.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.2µs " -orderer0.example.com | "2019-07-20 02:40:43.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.5µs " -orderer0.example.com | "2019-07-20 02:40:43.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:43.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1450 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:43.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1451 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:43.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1452 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" -orderer0.example.com | "2019-07-20 02:40:43.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1453 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175µs " -orderer0.example.com | "2019-07-20 02:40:43.708 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1454 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" -orderer0.example.com | "2019-07-20 02:40:43.709 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1455 Sending msg of 28 bytes to 3 on channel businesschannel took 96.5µs" -orderer0.example.com | "2019-07-20 02:40:43.709 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1456 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.6µs " -peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [gossip.pull] Hello -> DEBU 118b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 118c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.762 UTC [msp] DeserializeIdentity -> DEBU 118d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.762 UTC [gossip.comm] Send -> DEBU 118e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.762 UTC [gossip.comm] sendToEndpoint -> DEBU 118f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1190 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.766 UTC [gossip.comm] func1 -> DEBU 1191 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [cauthdsl] func1 -> DEBU 1192 0xc003687030 gate 1563590396757820400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:56.768 UTC [policies] Evaluate -> DEBU 1193 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.768 UTC [policies] Evaluate -> DEBU 1194 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.769 UTC [policies] Evaluate -> DEBU 1195 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.769 UTC [policies] Evaluate -> DEBU 1196 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.769 UTC [msp.identity] Verify -> DEBU 1197 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:39:56.769 UTC [msp.identity] Verify -> DEBU 1198 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:39:56.770 UTC [msp.identity] Verify -> DEBU 1199 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:39:56.770 UTC [msp.identity] Verify -> DEBU 119a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:39:56.770 UTC [msp] DeserializeIdentity -> DEBU 119b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.770 UTC [msp] DeserializeIdentity -> DEBU 119c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 119d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 119e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 119f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11a3 0xc0036b3740 gate 1563590396772180600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a4 0xc0036b3740 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a5 0xc0036b3740 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a6 0xc0036b3740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a7 0xc0036b3740 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11a8 0xc0036b3740 gate 1563590396772180600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:43.709 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1457 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.5µs " -orderer0.example.com | "2019-07-20 02:40:43.712 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1458 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:43.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1459 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:43.939 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:43.939 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145b Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" -orderer0.example.com | "2019-07-20 02:40:43.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " -orderer0.example.com | "2019-07-20 02:40:44.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145d Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" -orderer0.example.com | "2019-07-20 02:40:44.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145e Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" -orderer0.example.com | "2019-07-20 02:40:44.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " -orderer0.example.com | "2019-07-20 02:40:44.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1460 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " -orderer0.example.com | "2019-07-20 02:40:44.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1461 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:44.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1462 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:44.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1463 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:44.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1464 Sending msg of 28 bytes to 3 on channel testchainid took 47.5µs" -orderer0.example.com | "2019-07-20 02:40:44.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1465 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " -orderer0.example.com | "2019-07-20 02:40:44.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1466 Sending msg of 28 bytes to 2 on channel businesschannel took 39µs" -orderer0.example.com | "2019-07-20 02:40:44.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1467 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" -orderer0.example.com | "2019-07-20 02:40:44.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1468 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.1µs " -orderer0.example.com | "2019-07-20 02:40:44.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1469 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.252ms " -orderer0.example.com | "2019-07-20 02:40:44.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:44.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:44.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:44.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " -orderer0.example.com | "2019-07-20 02:40:44.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 146e Sending msg of 28 bytes to 3 on channel testchainid took 142.3µs" -orderer0.example.com | "2019-07-20 02:40:45.006 UTC [orderer.common.server] Deliver -> DEBU 146f Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:45.006 UTC [common.deliver] Handle -> DEBU 1470 Starting new deliver loop for 172.18.0.9:39242" -orderer0.example.com | "2019-07-20 02:40:45.006 UTC [common.deliver] Handle -> DEBU 1471 Attempting to read seek info message from 172.18.0.9:39242" -orderer0.example.com | "2019-07-20 02:40:45.027 UTC [orderer.common.server] Broadcast -> DEBU 1472 Starting new Broadcast handler" -orderer0.example.com | "2019-07-20 02:40:45.027 UTC [orderer.common.broadcast] Handle -> DEBU 1473 Starting new broadcast loop for 172.18.0.9:39244" -orderer0.example.com | "2019-07-20 02:40:45.028 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1474 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39244" -orderer0.example.com | "2019-07-20 02:40:45.028 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1475 Processing config update message for channel businesschannel" -orderer0.example.com | "2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1476 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1477 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1478 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1479 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 147a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-07-20 02:40:45.030 UTC [cauthdsl] func1 -> DEBU 147b 0xc0008d5e60 gate 1563590445030059300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147c 0xc0008d5e60 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147d 0xc0008d5e60 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147e 0xc0008d5e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" -orderer0.example.com | "2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147f 0xc0008d5e60 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:45.031 UTC [cauthdsl] func1 -> DEBU 1480 0xc0008d5e60 gate 1563590445030059300 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:45.031 UTC [policies] Evaluate -> DEBU 1481 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:40:45.031 UTC [policies] Evaluate -> DEBU 1482 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11ac 0xc0036b3f90 gate 1563590396772895800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11ad 0xc0036b3f90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.773 UTC [cauthdsl] func2 -> DEBU 11ae 0xc0036b3f90 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.773 UTC [cauthdsl] func2 -> DEBU 11af 0xc0036b3f90 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.773 UTC [msp.identity] Verify -> DEBU 11b0 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:39:56.773 UTC [msp.identity] Verify -> DEBU 11b1 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:39:56.776 UTC [cauthdsl] func2 -> DEBU 11b2 0xc0036b3f90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.776 UTC [cauthdsl] func1 -> DEBU 11b3 0xc0036b3f90 gate 1563590396772895800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:56.776 UTC [policies] Evaluate -> DEBU 11b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [gossip.gossip] handleMessage -> DEBU 11b8 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [gossip.gossip] handleMessage -> DEBU 11b9 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [msp.identity] Verify -> DEBU 11ba Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [msp.identity] Verify -> DEBU 11bb Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [msp.identity] Verify -> DEBU 11bc Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [msp.identity] Verify -> DEBU 11bd Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [msp] DeserializeIdentity -> DEBU 11be Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [msp] DeserializeIdentity -> DEBU 11bf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [cauthdsl] func1 -> DEBU 11c6 0xc0036ea820 gate 1563590396778956200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c7 0xc0036ea820 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c8 0xc0036ea820 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c9 0xc0036ea820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11ca 0xc0036ea820 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func1 -> DEBU 11cb 0xc0036ea820 gate 1563590396778956200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func1 -> DEBU 11cf 0xc0036eb080 gate 1563590396779609200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d0 0xc0036eb080 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d1 0xc0036eb080 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d2 0xc0036eb080 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [msp.identity] Verify -> DEBU 11d3 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [msp.identity] Verify -> DEBU 11d4 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [cauthdsl] func2 -> DEBU 11d5 0xc0036eb080 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [cauthdsl] func1 -> DEBU 11d6 0xc0036eb080 gate 1563590396779609200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [gossip.gossip] handleMessage -> DEBU 11db Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [gossip.gossip] handleMessage -> DEBU 11dc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11dd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11de Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11df Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11e1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11e2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.781 UTC [policies] Evaluate -> DEBU 11e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.781 UTC [policies] Evaluate -> DEBU 11e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [policies] Evaluate -> DEBU 11e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func1 -> DEBU 11e6 0xc003798b90 gate 1563590396782191100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e7 0xc003798b90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e8 0xc003798b90 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e9 0xc003798b90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:40:45.031 UTC [policies] func1 -> DEBU 1483 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -orderer0.example.com | "2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1484 Signature set did not satisfy policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1485 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1486 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -orderer0.example.com | "2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1487 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:45.033 UTC [policies] Evaluate -> DEBU 1488 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -orderer0.example.com | "2019-07-20 02:40:45.034 UTC [cauthdsl] func1 -> DEBU 1489 0xc000ff8b60 gate 1563590445034097500 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148a 0xc000ff8b60 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148b 0xc000ff8b60 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148c 0xc000ff8b60 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:45.035 UTC [msp.identity] Verify -> DEBU 148d Verify: digest = 00000000 d7 e2 4c 93 ff 7a b3 77 17 51 c6 90 73 4c d0 56 |..L..z.w.Q..sL.V| -orderer0.example.com | 00000010 38 2e 22 82 94 37 ee e8 42 7e db 1a 70 1b 33 b9 |8."..7..B~..p.3.|" -orderer0.example.com | "2019-07-20 02:40:45.035 UTC [msp.identity] Verify -> DEBU 148e Verify: sig = 00000000 30 45 02 21 00 83 bb 89 24 35 e9 6f 9d ce 34 d2 |0E.!....$5.o..4.| -orderer0.example.com | 00000010 b8 0c 69 a7 39 e5 ba 1c 81 f9 c4 7b 9d a8 bd 53 |..i.9......{...S| -orderer0.example.com | 00000020 ee 9e dd 57 63 02 20 0c e4 bd e5 9c 35 78 1a 06 |...Wc. .....5x..| -orderer0.example.com | 00000030 6c da db e8 5a 85 7e 27 0c 66 30 bb 89 9e b1 8e |l...Z.~'.f0.....| -orderer0.example.com | 00000040 81 d5 3e f4 76 50 e1 |..>.vP.|" -orderer0.example.com | "2019-07-20 02:40:45.036 UTC [cauthdsl] func2 -> DEBU 148f 0xc000ff8b60 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:45.036 UTC [cauthdsl] func1 -> DEBU 1490 0xc000ff8b60 gate 1563590445034097500 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:45.036 UTC [policies] Evaluate -> DEBU 1491 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.036 UTC [policies] Evaluate -> DEBU 1492 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1493 Signature set satisfies policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1494 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1495 Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:45.038 UTC [common.configtx] addToMap -> DEBU 1497 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:40:45.038 UTC [common.configtx] addToMap -> DEBU 1498 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 1499 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 149a Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 149b Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149c Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149d Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149e Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 149f Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 14a0 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 14a1 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a2 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a3 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a4 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a5 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a6 Adding to config map: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a7 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14a8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14a9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14aa Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14ab Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14ac Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14ad Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14ae Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14af Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b1 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b2 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:45.046 UTC [common.configtx] verifyDeltaSet -> DEBU 14b3 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.046 UTC [common.configtx] verifyDeltaSet -> DEBU 14b4 Processing change to key: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.046 UTC [common.configtx] policyForItem -> DEBU 14b5 Getting policy for item Application with mod_policy Admins" -orderer0.example.com | "2019-07-20 02:40:45.046 UTC [policies] Manager -> DEBU 14b6 Manager Channel looking up path []" -orderer0.example.com | "2019-07-20 02:40:45.046 UTC [policies] Manager -> DEBU 14b7 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11ea 0xc003798b90 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func1 -> DEBU 11eb 0xc003798b90 gate 1563590396782191100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [policies] Evaluate -> DEBU 11ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [policies] Evaluate -> DEBU 11ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [policies] Evaluate -> DEBU 11ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [cauthdsl] func1 -> DEBU 11ef 0xc0037993d0 gate 1563590396783331500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f0 0xc0037993d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f1 0xc0037993d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f2 0xc0037993d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [msp.identity] Verify -> DEBU 11f3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [msp.identity] Verify -> DEBU 11f4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [cauthdsl] func2 -> DEBU 11f5 0xc0037993d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [cauthdsl] func1 -> DEBU 11f6 0xc0037993d0 gate 1563590396783331500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.785 UTC [gossip.election] waitForInterrupt -> DEBU 11fb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.785 UTC [gossip.election] IsLeader -> DEBU 11fc c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:39:56.785 UTC [msp] GetDefaultSigningIdentity -> DEBU 11fd Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:56.785 UTC [msp.identity] Sign -> DEBU 11fe Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510041801 " -peer0.org1.example.com | "2019-07-20 02:39:56.786 UTC [msp.identity] Sign -> DEBU 11ff Sign: digest: 3D17F297AE31AB5120D66524527E2DA3C17A877046C3846100F2EEF767D18437 " -peer0.org1.example.com | "2019-07-20 02:39:56.786 UTC [gossip.election] waitForInterrupt -> DEBU 1200 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1201 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1202 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1203 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1204 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [gossip.comm] Send -> DEBU 1205 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1206 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1207 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [gossip.comm] sendToEndpoint -> DEBU 1208 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [gossip.comm] sendToEndpoint -> DEBU 1209 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.791 UTC [msp.identity] Verify -> DEBU 120a Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [msp.identity] Verify -> DEBU 120b Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [msp] DeserializeIdentity -> DEBU 120c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [msp] DeserializeIdentity -> DEBU 120d Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14b8 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14b9 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14ba Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bb Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bc Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bd Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14be Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -orderer0.example.com | "2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -orderer0.example.com | "2019-07-20 02:40:45.048 UTC [cauthdsl] deduplicate -> WARN 14c2 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer0.example.com | "2019-07-20 02:40:45.048 UTC [cauthdsl] func1 -> DEBU 14c3 0xc0008d80c0 gate 1563590445048642600 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c4 0xc0008d80c0 signed by 0 principal evaluation starts (used [false false false])" -orderer0.example.com | "2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c5 0xc0008d80c0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c6 0xc0008d80c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-07-20 02:40:45.049 UTC [cauthdsl] func2 -> DEBU 14c7 0xc0008d80c0 processing identity 1 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.049 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14c8 Checking if identity satisfies ADMIN role for Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.049 UTC [cauthdsl] func2 -> DEBU 14c9 0xc0008d80c0 principal matched by identity 1" -orderer0.example.com | "2019-07-20 02:40:45.049 UTC [msp.identity] Verify -> DEBU 14ca Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| -orderer0.example.com | 00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" -orderer0.example.com | "2019-07-20 02:40:45.049 UTC [msp.identity] Verify -> DEBU 14cb Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| -orderer0.example.com | 00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| -orderer0.example.com | 00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| -orderer0.example.com | 00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| -orderer0.example.com | 00000040 6a a2 e2 e3 7c fb |j...|.|" -orderer0.example.com | "2019-07-20 02:40:45.050 UTC [cauthdsl] func2 -> DEBU 14cc 0xc0008d80c0 principal evaluation succeeds for identity 1" -orderer0.example.com | "2019-07-20 02:40:45.050 UTC [cauthdsl] func1 -> DEBU 14cd 0xc0008d80c0 gate 1563590445048642600 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14ce Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-07-20 02:40:45.050 UTC [cauthdsl] deduplicate -> WARN 14d1 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer0.example.com | "2019-07-20 02:40:45.050 UTC [cauthdsl] func1 -> DEBU 14d2 0xc0008d8ba0 gate 1563590445050800500 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:45.050 UTC [cauthdsl] func2 -> DEBU 14d3 0xc0008d8ba0 signed by 0 principal evaluation starts (used [false false false])" -orderer0.example.com | "2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d4 0xc0008d8ba0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.051 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14d5 Checking if identity satisfies ADMIN role for Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d6 0xc0008d8ba0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:45.051 UTC [msp.identity] Verify -> DEBU 14d7 Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| -orderer0.example.com | 00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" -orderer0.example.com | "2019-07-20 02:40:45.051 UTC [msp.identity] Verify -> DEBU 14d8 Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| -orderer0.example.com | 00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| -orderer0.example.com | 00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| -orderer0.example.com | 00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| -orderer0.example.com | 00000040 ed 0f 29 74 0b 84 |..)t..|" -orderer0.example.com | "2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d9 0xc0008d8ba0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:45.052 UTC [cauthdsl] func1 -> DEBU 14da 0xc0008d8ba0 gate 1563590445050800500 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14db Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14dd Signature set satisfies policy /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14df Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e0 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e1 Processing change to key: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e2 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] verifyDeltaSet -> DEBU 14e3 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e4 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e6 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e7 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e8 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14e9 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14ea Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14eb Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ec Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ee Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ef Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14f0 Setting policy for key Admins to " -orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f1 Setting policy for key Endorsement to " -orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f2 Setting policy for key LifecycleEndorsement to " -orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f3 Setting policy for key Readers to " -orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f4 Setting policy for key Writers to " -orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f5 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f6 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f7 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f8 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fa Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fb Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fc Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fd Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fe Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.channelconfig] NewStandardValues -> DEBU 14ff Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1500 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1501 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1502 Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1503 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1504 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] NewStandardValues -> DEBU 1505 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1506 Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1507 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.059 UTC [common.channelconfig] NewStandardValues -> DEBU 1508 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:40:45.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1509 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.059 UTC [common.channelconfig] NewStandardValues -> DEBU 150a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 150b Processing field: MSP" -orderer0.example.com | "2019-07-20 02:40:45.060 UTC [common.channelconfig] Validate -> DEBU 150c Anchor peers for org Org3MSP are " -orderer0.example.com | "2019-07-20 02:40:45.060 UTC [common.channelconfig] validateMSP -> DEBU 150d Setting up MSP for org Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.060 UTC [msp] newBccspMsp -> DEBU 150e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.060 UTC [msp] New -> DEBU 150f Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.060 UTC [msp] Setup -> DEBU 1510 Setting up MSP instance Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.060 UTC [msp.identity] newIdentity -> DEBU 1511 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 120e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 120f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1210 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1211 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1212 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1213 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 1214 0xc0037d9520 gate 1563590396792537900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1215 0xc0037d9520 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1216 0xc0037d9520 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1217 0xc0037d9520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1218 0xc0037d9520 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 1219 0xc0037d9520 gate 1563590396792537900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 121d 0xc0037d9d60 gate 1563590396792820100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 121e 0xc0037d9d60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 121f 0xc0037d9d60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1220 0xc0037d9d60 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [msp.identity] Verify -> DEBU 1221 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [msp.identity] Verify -> DEBU 1222 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [cauthdsl] func2 -> DEBU 1223 0xc0037d9d60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [cauthdsl] func1 -> DEBU 1224 0xc0037d9d60 gate 1563590396792820100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1225 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1226 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1227 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 1229 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 122a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [gossip.pull] HandleMessage -> DEBU 122b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 122c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.915 UTC [gossip.comm] func1 -> DEBU 122d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.915 UTC [gossip.gossip] handleMessage -> DEBU 122e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.916 UTC [msp] DeserializeIdentity -> DEBU 122f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.917 UTC [msp] DeserializeIdentity -> DEBU 1230 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.918 UTC [gossip.gossip] handleMessage -> DEBU 1231 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.928 UTC [gossip.comm] func1 -> DEBU 1232 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.928 UTC [gossip.gossip] handleMessage -> DEBU 1233 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.929 UTC [gossip.pull] HandleMessage -> DEBU 1234 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.929 UTC [gossip.pull] SendDigest -> DEBU 1235 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:39:56.929 UTC [gossip.gossip] handleMessage -> DEBU 1236 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [gossip.comm] func1 -> DEBU 1237 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [gossip.gossip] handleMessage -> DEBU 1238 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [gossip.gossip] handleMessage -> DEBU 1239 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 123a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 123b Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [msp] DeserializeIdentity -> DEBU 123c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 123d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:56.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 123e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 123f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:56.951 UTC [policies] Evaluate -> DEBU 1240 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1241 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1242 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func1 -> DEBU 1243 0xc00392c970 gate 1563590396952123800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1244 0xc00392c970 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1245 0xc00392c970 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1246 0xc00392c970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1247 0xc00392c970 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func1 -> DEBU 1248 0xc00392c970 gate 1563590396952123800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1249 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 124a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 124b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [cauthdsl] func1 -> DEBU 124c 0xc00392d1b0 gate 1563590396952965700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124d 0xc00392d1b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124e 0xc00392d1b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124f 0xc00392d1b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [msp.identity] Verify -> DEBU 1250 Verify: digest = 00000000 95 48 f5 b0 d8 da f5 ff de 4d dd b1 47 60 28 a7 |.H.......M..G`(.| -peer0.org1.example.com | 00000010 22 6b b6 c5 89 4e 23 53 d6 fc c3 30 7b 27 42 eb |"k...N#S...0{'B.|" -peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [msp.identity] Verify -> DEBU 1251 Verify: sig = 00000000 30 44 02 20 28 f2 eb 53 10 3b 2f 51 c3 97 33 b5 |0D. (..S.;/Q..3.| -peer0.org1.example.com | 00000010 f4 59 4f c6 e1 f0 9d c2 e9 ad ae 44 79 ce 6f a7 |.YO........Dy.o.| -peer0.org1.example.com | 00000020 61 5b eb 9a 02 20 59 2c e5 f2 d3 23 32 f6 71 6a |a[... Y,...#2.qj| -peer0.org1.example.com | 00000030 e1 26 97 7a 1c f9 09 ab 6f f0 84 e2 07 66 63 17 |.&.z....o....fc.| -orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc -orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.061 UTC [msp.identity] newIdentity -> DEBU 1512 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y -orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr -orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky -orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV -orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO -orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ -orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.061 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1513 Checking if identity satisfies role [CLIENT] for Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.061 UTC [msp] Validate -> DEBU 1514 MSP Org3MSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.062 UTC [msp] getCertificationChain -> DEBU 1515 MSP Org3MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.062 UTC [msp] hasOURole -> DEBU 1516 MSP Org3MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:40:45.062 UTC [msp] getCertificationChain -> DEBU 1517 MSP Org3MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.062 UTC [common.channelconfig] NewStandardValues -> DEBU 1518 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:40:45.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1519 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.062 UTC [common.channelconfig] NewStandardValues -> DEBU 151a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU 151b Processing field: MSP" -orderer0.example.com | "2019-07-20 02:40:45.063 UTC [common.channelconfig] Validate -> DEBU 151c Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:40:45.063 UTC [common.channelconfig] validateMSP -> DEBU 151d Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.063 UTC [msp] newBccspMsp -> DEBU 151e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.063 UTC [msp] New -> DEBU 151f Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.063 UTC [msp] Setup -> DEBU 1520 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.064 UTC [msp.identity] newIdentity -> DEBU 1521 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.064 UTC [msp.identity] newIdentity -> DEBU 1522 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.065 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1523 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.066 UTC [msp] Validate -> DEBU 1524 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.066 UTC [msp] getCertificationChain -> DEBU 1525 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.066 UTC [msp] hasOURole -> DEBU 1526 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:40:45.066 UTC [msp] getCertificationChain -> DEBU 1527 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.067 UTC [common.channelconfig] NewStandardValues -> DEBU 1528 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:40:45.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1529 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.067 UTC [common.channelconfig] NewStandardValues -> DEBU 152a Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 152b Processing field: MSP" -orderer0.example.com | "2019-07-20 02:40:45.067 UTC [common.channelconfig] Validate -> DEBU 152c Anchor peers for org Org2MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:40:45.068 UTC [common.channelconfig] validateMSP -> DEBU 152d Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.068 UTC [msp] newBccspMsp -> DEBU 152e Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.068 UTC [msp] New -> DEBU 152f Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.068 UTC [msp] Setup -> DEBU 1530 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.069 UTC [msp.identity] newIdentity -> DEBU 1531 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.070 UTC [msp.identity] newIdentity -> DEBU 1532 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.070 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1533 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.070 UTC [msp] Validate -> DEBU 1534 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.071 UTC [msp] getCertificationChain -> DEBU 1535 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.071 UTC [msp] hasOURole -> DEBU 1536 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:40:45.071 UTC [msp] getCertificationChain -> DEBU 1537 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.072 UTC [common.channelconfig] NewStandardValues -> DEBU 1538 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1539 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153a Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153b Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153c Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153d Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153e Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] NewStandardValues -> DEBU 153f Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1540 Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] NewStandardValues -> DEBU 1541 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1542 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] validateMSP -> DEBU 1543 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.074 UTC [msp] newBccspMsp -> DEBU 1544 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.074 UTC [msp] New -> DEBU 1545 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.074 UTC [msp] Setup -> DEBU 1546 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:40:45.075 UTC [msp.identity] newIdentity -> DEBU 1547 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.075 UTC [msp.identity] newIdentity -> DEBU 1548 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.076 UTC [msp] Validate -> DEBU 1549 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.077 UTC [msp] Setup -> DEBU 154a Setting up the MSP manager (4 msps)" -orderer0.example.com | "2019-07-20 02:40:45.077 UTC [msp] Setup -> DEBU 154b MSP manager setup complete, setup 4 msps" -orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154c Proposed new policy Admins for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154d Proposed new policy Endorsement for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154e Proposed new policy Readers for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154f Proposed new policy Writers for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 1550 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 1551 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1552 Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1553 Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1554 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1555 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1556 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1557 Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1558 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1559 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155a Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155b Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155c Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155d Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155e Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155f Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1560 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1561 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1562 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1563 Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1564 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1565 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1566 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:40:45.080 UTC [common.configtx] addToMap -> DEBU 1567 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:40:45.080 UTC [common.configtx] addToMap -> DEBU 1568 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1569 Adding to config map: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156b Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156c Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156d Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156e Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156f Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1570 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1571 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1572 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1573 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1574 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1575 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1576 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1577 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1578 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1579 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157c Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157d Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 157e Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 157f Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1580 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1581 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1582 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1583 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1584 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1585 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1586 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1587 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1588 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1589 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158b Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158e Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 158f Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1590 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1591 Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1592 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1593 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1594 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1595 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1596 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1597 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1598 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1599 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 159a Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.channelconfig] LogSanityChecks -> DEBU 159b As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.channelconfig] LogSanityChecks -> DEBU 159c As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-07-20 02:40:45.088 UTC [policies] Manager -> DEBU 159d Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:40:45.088 UTC [policies] Manager -> DEBU 159e Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 159f Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a0 Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a1 Manager Channel/Application has managers Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a2 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a3 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a4 As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a5 As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a6 As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a7 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a8 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a9 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15aa Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-07-20 02:40:45.090 UTC [policies] Manager -> DEBU 15ab Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ac As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ad As expected, current configuration has policy '/Channel/Orderer/Admins'" -orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ae As expected, current configuration has policy '/Channel/Orderer/Writers'" -orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15af As expected, current configuration has policy '/Channel/Orderer/Readers'" -orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.capabilities] Supported -> DEBU 15b0 Orderer capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.capabilities] Supported -> DEBU 15b1 Channel capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:40:45.090 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b2 Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:40:45.090 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b3 Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:40:45.091 UTC [msp.identity] Sign -> DEBU 15b4 Sign: plaintext: 0AD2060A1B08011A0608ADFEC9E90522...270C6630BB899EB18E81D53EF47650E1 " -orderer0.example.com | "2019-07-20 02:40:45.091 UTC [msp.identity] Sign -> DEBU 15b5 Sign: digest: E65706ACD2876BC2B6927B61ADD89D93F75A2ABE3D407C2904A013785C74D7B8 " -orderer0.example.com | "2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -orderer0.example.com | "2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -orderer0.example.com | "2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15ba == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -orderer0.example.com | "2019-07-20 02:40:45.091 UTC [msp] DeserializeIdentity -> DEBU 15bb Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:45.092 UTC [msp.identity] newIdentity -> DEBU 15bc Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -orderer0.example.com | QQ== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.092 UTC [cauthdsl] func1 -> DEBU 15bd 0xc001062e00 gate 1563590445092476300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:45.092 UTC [cauthdsl] func2 -> DEBU 15be 0xc001062e00 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:45.092 UTC [cauthdsl] func2 -> DEBU 15bf 0xc001062e00 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.092 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15c0 Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-07-20 02:40:45.092 UTC [msp] Validate -> DEBU 15c1 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.093 UTC [cauthdsl] func2 -> DEBU 15c2 0xc001062e00 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:45.093 UTC [msp.identity] Verify -> DEBU 15c3 Verify: digest = 00000000 e6 57 06 ac d2 87 6b c2 b6 92 7b 61 ad d8 9d 93 |.W....k...{a....| -orderer0.example.com | 00000010 f7 5a 2a be 3d 40 7c 29 04 a0 13 78 5c 74 d7 b8 |.Z*.=@|)...x\t..|" -orderer0.example.com | "2019-07-20 02:40:45.093 UTC [msp.identity] Verify -> DEBU 15c4 Verify: sig = 00000000 30 43 02 1f 74 f5 ee 6a 28 f5 da 8c 41 f5 e2 69 |0C..t..j(...A..i| -orderer0.example.com | 00000010 e8 f9 d2 93 4f c7 61 e5 e2 e1 7b 30 6e bf 8b cc |....O.a...{0n...| -orderer0.example.com | 00000020 f7 f1 cf 02 20 12 d4 eb ba 3b 2f 97 3c df 61 c2 |.... ....;/.<.a.| -orderer0.example.com | 00000030 2d b9 86 81 75 ee 2e b8 a3 6e cb 9c ae 7b 09 34 |-...u....n...{.4| -orderer0.example.com | 00000040 63 b0 56 6b 0a |c.Vk.|" -orderer0.example.com | "2019-07-20 02:40:45.093 UTC [cauthdsl] func2 -> DEBU 15c5 0xc001062e00 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:45.093 UTC [cauthdsl] func1 -> DEBU 15c6 0xc001062e00 gate 1563590445092476300 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:45.093 UTC [policies] Evaluate -> DEBU 15c7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15c9 Signature set satisfies policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15cb Signature set satisfies policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:45.094 UTC [orderer.common.msgprocessor] Apply -> DEBU 15cd Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel -orderer0.example.com | "2019-07-20 02:40:45.094 UTC [common.channelconfig] NewStandardValues -> DEBU 15ce Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15cf Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d0 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d1 Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:40:45.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d2 Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:40:45.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d3 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.096 UTC [common.channelconfig] NewStandardValues -> DEBU 15d4 Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:40:45.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d5 Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:40:45.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d6 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] NewStandardValues -> DEBU 15d7 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d8 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] NewStandardValues -> DEBU 15d9 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15da Processing field: MSP" -orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] Validate -> DEBU 15db Anchor peers for org Org2MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] validateMSP -> DEBU 15dc Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.097 UTC [msp] newBccspMsp -> DEBU 15dd Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.097 UTC [msp] New -> DEBU 15de Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.097 UTC [msp] Setup -> DEBU 15df Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.097 UTC [msp.identity] newIdentity -> DEBU 15e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.098 UTC [msp.identity] newIdentity -> DEBU 15e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.098 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15e2 Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.098 UTC [msp] Validate -> DEBU 15e3 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.098 UTC [msp] getCertificationChain -> DEBU 15e4 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.099 UTC [msp] hasOURole -> DEBU 15e5 MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:40:45.099 UTC [msp] getCertificationChain -> DEBU 15e6 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.099 UTC [common.channelconfig] NewStandardValues -> DEBU 15e7 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:40:45.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e8 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.099 UTC [common.channelconfig] NewStandardValues -> DEBU 15e9 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ea Processing field: MSP" -peer0.org1.example.com | 00000040 bd e5 5b cf b3 77 |..[..w|" -peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [cauthdsl] func2 -> DEBU 1252 0xc00392d1b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [cauthdsl] func1 -> DEBU 1253 0xc00392d1b0 gate 1563590396952965700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1254 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1255 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1256 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1257 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1258 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1259 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125a updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125b Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 125e Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 125f Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [msp] DeserializeIdentity -> DEBU 1260 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1261 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1262 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1263 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1264 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1265 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [gossip.comm] Send -> DEBU 1266 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1267 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [msp] DeserializeIdentity -> DEBU 1268 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [gossip.comm] Send -> DEBU 1269 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.958 UTC [gossip.comm] func1 -> DEBU 126e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.958 UTC [gossip.gossip] handleMessage -> DEBU 126f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.958 UTC [gossip.gossip] handleMessage -> DEBU 1270 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1271 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1272 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.959 UTC [gossip.comm] func1 -> DEBU 1273 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.960 UTC [gossip.gossip] handleMessage -> DEBU 1274 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.960 UTC [gossip.gossip] handleMessage -> DEBU 1275 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:56.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1276 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:56.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1277 Exiting" -orderer0.example.com | "2019-07-20 02:40:45.099 UTC [common.channelconfig] Validate -> DEBU 15eb Anchor peers for org Org3MSP are " -orderer0.example.com | "2019-07-20 02:40:45.100 UTC [common.channelconfig] validateMSP -> DEBU 15ec Setting up MSP for org Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.100 UTC [msp] newBccspMsp -> DEBU 15ed Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:39:57.077 UTC [gossip.comm] func1 -> DEBU 1278 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.077 UTC [gossip.gossip] handleMessage -> DEBU 1279 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.077 UTC [msp] DeserializeIdentity -> DEBU 127a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.078 UTC [msp] DeserializeIdentity -> DEBU 127b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.078 UTC [msp] DeserializeIdentity -> DEBU 127c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.080 UTC [gossip.gossip] handleMessage -> DEBU 127d Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.215 UTC [gossip.comm] func1 -> DEBU 127e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.216 UTC [gossip.gossip] handleMessage -> DEBU 127f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1280 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1281 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1282 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.219 UTC [gossip.gossip] handleMessage -> DEBU 1283 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.261 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 1284 Sleeping 25s" -peer0.org1.example.com | "2019-07-20 02:39:57.266 UTC [msp] GetDefaultSigningIdentity -> DEBU 1285 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:57.266 UTC [msp.identity] Sign -> DEBU 1286 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151015 " -peer0.org1.example.com | "2019-07-20 02:39:57.266 UTC [msp.identity] Sign -> DEBU 1287 Sign: digest: 0002FCB77BD293C038C9723707CBBAC6C32ED8A408B1F1A6C0E74FA9D271B781 " -peer0.org1.example.com | "2019-07-20 02:39:57.267 UTC [msp] GetDefaultSigningIdentity -> DEBU 1288 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:39:57.267 UTC [msp.identity] Sign -> DEBU 1289 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:39:57.267 UTC [msp.identity] Sign -> DEBU 128a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:39:57.267 UTC [gossip.discovery] periodicalSendAlive -> DEBU 128b Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [gossip.comm] Send -> DEBU 128f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 1290 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [gossip.comm] Send -> DEBU 1291 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] Send -> DEBU 1292 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1293 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1294 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1295 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1296 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1297 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1298 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.401 UTC [gossip.comm] func1 -> DEBU 1299 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.402 UTC [gossip.gossip] handleMessage -> DEBU 129a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.403 UTC [gossip.gossip] handleMessage -> DEBU 129b Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 129c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.403 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 129d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [msp.identity] Verify -> DEBU 129e Verify: digest = 00000000 b9 dd c8 c7 6d ff 2b 8a 99 ea 11 e3 44 96 78 ff |....m.+.....D.x.| -peer0.org1.example.com | 00000010 d9 76 8b 02 5f 76 6d 63 c6 65 6a 00 4e 95 50 36 |.v.._vmc.ej.N.P6|" -orderer0.example.com | "2019-07-20 02:40:45.100 UTC [msp] New -> DEBU 15ee Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.100 UTC [msp] Setup -> DEBU 15ef Setting up MSP instance Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.100 UTC [msp.identity] newIdentity -> DEBU 15f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB -orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc -orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.100 UTC [msp.identity] newIdentity -> DEBU 15f1 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y -orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr -orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky -orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV -orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO -orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ -orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.101 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15f2 Checking if identity satisfies role [CLIENT] for Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.101 UTC [msp] Validate -> DEBU 15f3 MSP Org3MSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.101 UTC [msp] getCertificationChain -> DEBU 15f4 MSP Org3MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.101 UTC [msp] hasOURole -> DEBU 15f5 MSP Org3MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:40:45.101 UTC [msp] getCertificationChain -> DEBU 15f6 MSP Org3MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] NewStandardValues -> DEBU 15f7 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f8 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] NewStandardValues -> DEBU 15f9 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15fa Processing field: MSP" -orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] Validate -> DEBU 15fb Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] validateMSP -> DEBU 15fc Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.102 UTC [msp] newBccspMsp -> DEBU 15fd Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.102 UTC [msp] New -> DEBU 15fe Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.102 UTC [msp] Setup -> DEBU 15ff Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.103 UTC [msp.identity] newIdentity -> DEBU 1600 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.103 UTC [msp.identity] newIdentity -> DEBU 1601 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [msp.identity] Verify -> DEBU 129f Verify: sig = 00000000 30 45 02 21 00 b7 49 ab 36 61 f7 81 6d 69 29 bf |0E.!..I.6a..mi).| -peer0.org1.example.com | 00000010 36 52 9d a6 90 5f 3b a2 30 72 6a d9 de 9c 0a 21 |6R..._;.0rj....!| -peer0.org1.example.com | 00000020 7f ff de 82 c7 02 20 49 95 b5 20 20 97 19 91 63 |...... I.. ...c| -peer0.org1.example.com | 00000030 fa c3 66 a3 99 63 96 08 df 8e 9e c2 7b fb b5 14 |..f..c......{...| -peer0.org1.example.com | 00000040 c3 7d 6d 48 06 16 e2 |.}mH...|" -peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [gossip.discovery] handleAliveMessage -> DEBU 12a0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a2 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a3 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:57.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a4 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:57.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a5 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 12a6 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12a7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.412 UTC [gossip.comm] func1 -> DEBU 12a8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12a9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12aa Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12ab Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12ac Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.comm] func1 -> DEBU 12ad Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12ae Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12af Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12b0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12b1 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.comm] Send -> DEBU 12b5 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [msp] DeserializeIdentity -> DEBU 12b6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [gossip.comm] Send -> DEBU 12b7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12b8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12b9 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12ba Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12bb Exiting" -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1602 Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [msp] Validate -> DEBU 1603 MSP Org1MSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [msp] getCertificationChain -> DEBU 1604 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [msp] hasOURole -> DEBU 1605 MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [msp] getCertificationChain -> DEBU 1606 MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] NewStandardValues -> DEBU 1607 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1608 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1609 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160a Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160b Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160c Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160d Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.105 UTC [common.channelconfig] NewStandardValues -> DEBU 160e Initializing protos for *channelconfig.OrdererOrgProtos" -peer0.org1.example.com | "2019-07-20 02:39:57.586 UTC [gossip.comm] func1 -> DEBU 12bc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.586 UTC [gossip.gossip] handleMessage -> DEBU 12bd Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [gossip.gossip] handleMessage -> DEBU 12be Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12bf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 12c0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [msp] DeserializeIdentity -> DEBU 12c1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12c8 0xc003a8cc90 gate 1563590397587995100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12c9 0xc003a8cc90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12ca 0xc003a8cc90 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12cb 0xc003a8cc90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12cc 0xc003a8cc90 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12cd 0xc003a8cc90 gate 1563590397587995100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12ce Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12d1 0xc003a8d4d0 gate 1563590397588716100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12d2 0xc003a8d4d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12d3 0xc003a8d4d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [cauthdsl] func2 -> DEBU 12d4 0xc003a8d4d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [msp.identity] Verify -> DEBU 12d5 Verify: digest = 00000000 83 1d c3 d2 b4 ac 95 19 17 8d fe a1 81 8d 9a e5 |................| -peer0.org1.example.com | 00000010 78 dc 36 0b 00 8c 9a 0e 72 f4 9c f5 4a 9d 7f 0f |x.6.....r...J...|" -peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [msp.identity] Verify -> DEBU 12d6 Verify: sig = 00000000 30 45 02 21 00 9a 40 65 b0 10 da 51 8a f3 ee ac |0E.!..@e...Q....| -peer0.org1.example.com | 00000010 2f 2e 81 a3 c6 f1 57 70 46 e7 e2 5b 12 9d 5a 65 |/.....WpF..[..Ze| -peer0.org1.example.com | 00000020 01 16 95 a8 d3 02 20 37 45 a3 c5 78 bf 84 68 2e |...... 7E..x..h.| -peer0.org1.example.com | 00000030 82 2e 93 c1 30 45 37 59 55 bb b1 42 d7 3d 21 81 |....0E7YU..B.=!.| -orderer0.example.com | "2019-07-20 02:40:45.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160f Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:40:45.105 UTC [common.channelconfig] NewStandardValues -> DEBU 1610 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1611 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:40:45.105 UTC [common.channelconfig] validateMSP -> DEBU 1612 Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.105 UTC [msp] newBccspMsp -> DEBU 1613 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.105 UTC [msp] New -> DEBU 1614 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.106 UTC [msp] Setup -> DEBU 1615 Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:40:45.108 UTC [msp.identity] newIdentity -> DEBU 1616 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.108 UTC [msp.identity] newIdentity -> DEBU 1617 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.109 UTC [msp] Validate -> DEBU 1618 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.109 UTC [msp] Setup -> DEBU 1619 Setting up the MSP manager (4 msps)" -orderer0.example.com | "2019-07-20 02:40:45.109 UTC [msp] Setup -> DEBU 161a MSP manager setup complete, setup 4 msps" -orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161b Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161c Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161d Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161e Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161f Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1620 Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1621 Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1622 Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1623 Proposed new policy Writers for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1624 Proposed new policy Admins for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1625 Proposed new policy Endorsement for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1626 Proposed new policy Readers for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1627 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1628 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1629 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162a Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162b Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162c Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162d Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162e Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162f Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1630 Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1631 Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1632 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1633 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1634 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:40:45.113 UTC [policies] NewManagerImpl -> DEBU 1635 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1636 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1637 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1638 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1639 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163a Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163f Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 1640 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1641 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1642 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1643 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1644 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1645 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1646 Adding to config map: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1647 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 1648 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 1649 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164a Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164c Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164d Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164e Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164f Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1650 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1651 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1652 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1653 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1654 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1655 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1656 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1657 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 1658 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 1659 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 165a Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 165b Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165d Adding to config map: [Value] /Channel/Orderer/Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165f Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1660 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1661 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1662 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1663 Adding to config map: [Value] /Channel/Capabilities" -peer0.org1.example.com | 00000040 0c 75 ab 99 6c ad bd |.u..l..|" -peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [cauthdsl] func2 -> DEBU 12d7 0xc003a8d4d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [cauthdsl] func1 -> DEBU 12d8 0xc003a8d4d0 gate 1563590397588716100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12d9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12db Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 12dd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12de Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12df updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e0 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e2 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 12e3 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12e4 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.595 UTC [msp] DeserializeIdentity -> DEBU 12e5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.595 UTC [msp] DeserializeIdentity -> DEBU 12e6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12ea Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.597 UTC [msp] DeserializeIdentity -> DEBU 12eb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.597 UTC [gossip.comm] Send -> DEBU 12ec Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:57.597 UTC [msp] DeserializeIdentity -> DEBU 12ed Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] Send -> DEBU 12ee Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12ef Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f0 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f2 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] func1 -> DEBU 12f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f5 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12f6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12f7 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.comm] func1 -> DEBU 12f8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f9 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1664 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1665 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1666 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1667 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1668 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1669 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:45.121 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 166a [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39244" -orderer0.example.com | "2019-07-20 02:40:45.122 UTC [orderer.consensus.etcdraft] propose -> INFO 166b Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:45.122 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 166c Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:45.123 UTC [orderer.consensus.etcdraft] 2 -> DEBU 166d Proposed block [6] to raft consensus" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:45.124 UTC [common.deliver] Handle -> WARN 166e Error reading from 172.18.0.9:39242: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:45.124 UTC [orderer.common.server] func1 -> DEBU 166f Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:45.125 UTC [comm.grpc.server] 1 -> INFO 1670 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39242 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=118.9084ms -orderer0.example.com | "2019-07-20 02:40:45.125 UTC [grpc] infof -> DEBU 1671 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:45.125 UTC [orderer.common.broadcast] Handle -> WARN 1672 Error reading from 172.18.0.9:39244: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:45.125 UTC [orderer.common.server] func1 -> DEBU 1673 Closing Broadcast stream" -orderer0.example.com | "2019-07-20 02:40:45.125 UTC [comm.grpc.server] 1 -> INFO 1674 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39244 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=98.4809ms -orderer0.example.com | "2019-07-20 02:40:45.128 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1675 Sending msg of 34005 bytes to 3 on channel businesschannel took 19µs" -orderer0.example.com | "2019-07-20 02:40:45.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1678 Sending msg of 34005 bytes to 2 on channel businesschannel took 13.7µs" -orderer0.example.com | "2019-07-20 02:40:45.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1679 Send of ConsensusRequest for channel businesschannel with payload of size 34005 to orderer1.example.com(orderer1.example.com:7050) took 276.9µs " -orderer0.example.com | "2019-07-20 02:40:45.129 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1676 Send of ConsensusRequest for channel businesschannel with payload of size 34005 to orderer2.example.com(orderer2.example.com:7050) took 644.3µs " -orderer0.example.com | "2019-07-20 02:40:45.131 UTC [grpc] infof -> DEBU 1677 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:45.135 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:45.135 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167b Sending msg of 28 bytes to 2 on channel businesschannel took 12.4µs" -orderer0.example.com | "2019-07-20 02:40:45.135 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167c Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" -orderer0.example.com | "2019-07-20 02:40:45.137 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7105ms " -orderer0.example.com | "2019-07-20 02:40:45.137 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 167e Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 -orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 167f Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1680 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1681 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1682 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1683 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1684 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1685 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1686 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1687 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1688 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1689 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168a Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168b Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168c Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168d Adding to config map: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168e Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168f Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1690 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1691 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1692 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1693 Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1694 Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1695 Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1696 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1697 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1698 Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1699 Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 169a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] verifyDeltaSet -> DEBU 169b Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] verifyDeltaSet -> DEBU 169c Processing change to key: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] policyForItem -> DEBU 169d Getting policy for item Application with mod_policy Admins" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 169e Manager Channel looking up path []" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 169f Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a0 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a1 Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a2 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16a3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66µs " -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a4 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a5 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12fa Exiting" -peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12fb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12fc Exiting" -peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [gossip.comm] func1 -> DEBU 12fd Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [gossip.gossip] handleMessage -> DEBU 12fe Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [gossip.gossip] handleMessage -> DEBU 12ff Exiting" -peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1300 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1301 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [msp] DeserializeIdentity -> DEBU 1302 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1303 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1304 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1305 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1306 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1307 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1308 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [cauthdsl] func1 -> DEBU 1309 0xc003bb2320 gate 1563590399949786200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [cauthdsl] func2 -> DEBU 130a 0xc003bb2320 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [cauthdsl] func2 -> DEBU 130b 0xc003bb2320 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 130c 0xc003bb2320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 130d 0xc003bb2320 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func1 -> DEBU 130e 0xc003bb2320 gate 1563590399949786200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 130f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 1310 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 1311 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func1 -> DEBU 1312 0xc003bb2b90 gate 1563590399950706500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1313 0xc003bb2b90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1314 0xc003bb2b90 processing identity 0 with bytes of 114b950" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a6 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a7 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -orderer0.example.com | "2019-07-20 02:40:45.138 UTC [cauthdsl] deduplicate -> WARN 16ab De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func1 -> DEBU 16ac 0xc000fa71d0 gate 1563590445139011500 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16ad 0xc000fa71d0 signed by 0 principal evaluation starts (used [false false false])" -orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16ae 0xc000fa71d0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16af 0xc000fa71d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16b0 0xc000fa71d0 processing identity 1 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16b1 0xc000fa71d0 principal matched by identity 1" -orderer0.example.com | "2019-07-20 02:40:45.139 UTC [msp.identity] Verify -> DEBU 16b2 Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| -orderer0.example.com | 00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" -orderer0.example.com | "2019-07-20 02:40:45.141 UTC [msp.identity] Verify -> DEBU 16b3 Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| -orderer0.example.com | 00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| -orderer0.example.com | 00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| -orderer0.example.com | 00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| -orderer0.example.com | 00000040 6a a2 e2 e3 7c fb |j...|.|" -orderer0.example.com | "2019-07-20 02:40:45.141 UTC [cauthdsl] func2 -> DEBU 16b4 0xc000fa71d0 principal evaluation succeeds for identity 1" -orderer0.example.com | "2019-07-20 02:40:45.141 UTC [cauthdsl] func1 -> DEBU 16b5 0xc000fa71d0 gate 1563590445139011500 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b6 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -orderer0.example.com | "2019-07-20 02:40:45.143 UTC [cauthdsl] deduplicate -> WARN 16b9 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -orderer0.example.com | "2019-07-20 02:40:45.144 UTC [cauthdsl] func1 -> DEBU 16bb 0xc000fa7890 gate 1563590445144040900 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:45.144 UTC [cauthdsl] func2 -> DEBU 16bc 0xc000fa7890 signed by 0 principal evaluation starts (used [false false false])" -orderer0.example.com | "2019-07-20 02:40:45.145 UTC [cauthdsl] func2 -> DEBU 16bd 0xc000fa7890 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.146 UTC [cauthdsl] func2 -> DEBU 16be 0xc000fa7890 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:45.146 UTC [msp.identity] Verify -> DEBU 16bf Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| -orderer0.example.com | 00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" -orderer0.example.com | "2019-07-20 02:40:45.147 UTC [msp.identity] Verify -> DEBU 16c0 Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| -orderer0.example.com | 00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| -orderer0.example.com | 00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| -orderer0.example.com | 00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| -orderer0.example.com | 00000040 ed 0f 29 74 0b 84 |..)t..|" -orderer0.example.com | "2019-07-20 02:40:45.152 UTC [cauthdsl] func2 -> DEBU 16c1 0xc000fa7890 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:45.153 UTC [cauthdsl] func1 -> DEBU 16c2 0xc000fa7890 gate 1563590445144040900 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c3 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c5 Signature set satisfies policy /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:40:45.155 UTC [policies] Evaluate -> DEBU 16c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:40:45.155 UTC [common.configtx] verifyDeltaSet -> DEBU 16c7 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16c8 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16c9 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16ca Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16cb Processing change to key: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.157 UTC [common.configtx] recurseConfigMap -> DEBU 16cc Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.157 UTC [common.configtx] recurseConfigMap -> DEBU 16cd Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16ce Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16cf Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d1 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d2 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d3 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d4 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d5 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d6 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d8 Setting policy for key Admins to " -orderer0.example.com | "2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16d9 Setting policy for key Endorsement to " -orderer0.example.com | "2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16da Setting policy for key LifecycleEndorsement to " -orderer0.example.com | "2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16db Setting policy for key Readers to " -orderer0.example.com | "2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16dc Setting policy for key Writers to " -orderer0.example.com | "2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16dd Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16de Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16df Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16e0 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16e1 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.162 UTC [common.configtx] recurseConfigMap -> DEBU 16e2 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.162 UTC [common.configtx] recurseConfigMap -> DEBU 16e3 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e4 Setting policy for key Writers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e5 Setting policy for key Admins to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e6 Setting policy for key Readers to policy: mod_policy:"Admins" " -orderer0.example.com | "2019-07-20 02:40:45.164 UTC [common.channelconfig] NewStandardValues -> DEBU 16e7 Initializing protos for *channelconfig.ChannelProtos" -orderer0.example.com | "2019-07-20 02:40:45.164 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e8 Processing field: HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e9 Processing field: BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ea Processing field: OrdererAddresses" -orderer0.example.com | "2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16eb Processing field: Consortium" -orderer0.example.com | "2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ec Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.166 UTC [common.channelconfig] NewStandardValues -> DEBU 16ed Initializing protos for *channelconfig.ApplicationProtos" -orderer0.example.com | "2019-07-20 02:40:45.166 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ee Processing field: ACLs" -orderer0.example.com | "2019-07-20 02:40:45.166 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ef Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.166 UTC [common.channelconfig] NewStandardValues -> DEBU 16f0 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:40:45.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f1 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.167 UTC [common.channelconfig] NewStandardValues -> DEBU 16f2 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f3 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:40:45.167 UTC [common.channelconfig] Validate -> DEBU 16f4 Anchor peers for org Org3MSP are " -orderer0.example.com | "2019-07-20 02:40:45.167 UTC [common.channelconfig] validateMSP -> DEBU 16f5 Setting up MSP for org Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.167 UTC [msp] newBccspMsp -> DEBU 16f6 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.168 UTC [msp] New -> DEBU 16f7 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.168 UTC [msp] Setup -> DEBU 16f8 Setting up MSP instance Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.168 UTC [msp.identity] newIdentity -> DEBU 16f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB -orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc -orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.169 UTC [msp.identity] newIdentity -> DEBU 16fa Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y -orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr -orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky -orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV -orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO -orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ -orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.169 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16fb Checking if identity satisfies role [CLIENT] for Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.170 UTC [msp] Validate -> DEBU 16fc MSP Org3MSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.170 UTC [msp] getCertificationChain -> DEBU 16fd MSP Org3MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16ba Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:45.171 UTC [msp] hasOURole -> DEBU 16fe MSP Org3MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:40:45.171 UTC [msp] getCertificationChain -> DEBU 16ff MSP Org3MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.171 UTC [common.channelconfig] NewStandardValues -> DEBU 1700 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:40:45.171 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1701 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.172 UTC [common.channelconfig] NewStandardValues -> DEBU 1702 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.172 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1703 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:40:45.172 UTC [common.channelconfig] Validate -> DEBU 1704 Anchor peers for org Org1MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:40:45.172 UTC [common.channelconfig] validateMSP -> DEBU 1705 Setting up MSP for org Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.172 UTC [msp] newBccspMsp -> DEBU 1706 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.173 UTC [msp] New -> DEBU 1707 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.173 UTC [msp] Setup -> DEBU 1708 Setting up MSP instance Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.173 UTC [msp.identity] newIdentity -> DEBU 1709 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.174 UTC [msp.identity] newIdentity -> DEBU 170a Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.174 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 170b Checking if identity satisfies role [CLIENT] for Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.175 UTC [msp] Validate -> DEBU 170c MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1315 0xc003bb2b90 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:39:59.951 UTC [msp.identity] Verify -> DEBU 1316 Verify: digest = 00000000 64 e6 bd 9b c4 af c6 3c 24 e1 0e 9a 0b ec e2 3d |d......<$......=| -peer0.org1.example.com | 00000010 03 6e 6c 5f 0b 5e 39 29 da 7d d8 fb 9f 31 b9 c1 |.nl_.^9).}...1..|" -peer0.org1.example.com | "2019-07-20 02:39:59.951 UTC [msp.identity] Verify -> DEBU 1317 Verify: sig = 00000000 30 44 02 20 5f e3 aa 3f 94 4e 5f e6 55 aa 4c d3 |0D. _..?.N_.U.L.| -peer0.org1.example.com | 00000010 04 80 9f 88 f2 43 3b b4 d7 56 e6 8d 67 e9 a7 c7 |.....C;..V..g...| -peer0.org1.example.com | 00000020 ca 23 15 f5 02 20 28 9c 73 a9 00 21 bc bc 00 33 |.#... (.s..!...3| -peer0.org1.example.com | 00000030 13 bd fe 64 e7 c6 33 61 5b 99 5b 42 2c 95 3f a1 |...d..3a[.[B,.?.| -peer0.org1.example.com | 00000040 ad ca ca e5 1e 5a |.....Z|" -peer0.org1.example.com | "2019-07-20 02:39:59.952 UTC [cauthdsl] func2 -> DEBU 1318 0xc003bb2b90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:39:59.952 UTC [cauthdsl] func1 -> DEBU 1319 0xc003bb2b90 gate 1563590399950706500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:39:59.952 UTC [policies] Evaluate -> DEBU 131a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 131e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [gossip.discovery] learnExistingMembers -> DEBU 131f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [gossip.discovery] learnExistingMembers -> DEBU 1320 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1321 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1322 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1323 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1324 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] sendMemResponse -> DEBU 1325 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1326 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1327 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1328 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:59.955 UTC [gossip.comm] Send -> DEBU 1329 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:39:59.956 UTC [gossip.discovery] sendMemResponse -> DEBU 132a Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\031" signature:"0E\002!\000\267I\2536a\367\201mi)\2776R\235\246\220_;\2420rj\331\336\234\n!\177\377\336\202\307\002 I\225\265 \227\031\221c\372\303f\243\231c\226\010\337\216\236\302{\373\265\024\303}mH\006\026\342" > alive: " -peer0.org1.example.com | "2019-07-20 02:39:59.957 UTC [gossip.comm] sendToEndpoint -> DEBU 132b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:59.957 UTC [gossip.comm] sendToEndpoint -> DEBU 132c Exiting" -peer0.org1.example.com | "2019-07-20 02:39:59.957 UTC [gossip.comm] func1 -> DEBU 132d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:59.958 UTC [gossip.gossip] handleMessage -> DEBU 132e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:59.958 UTC [gossip.pull] HandleMessage -> DEBU 132f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1330 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1331 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1332 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1333 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1334 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1335 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:45.175 UTC [msp] getCertificationChain -> DEBU 170d MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.175 UTC [msp] hasOURole -> DEBU 170e MSP Org1MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:40:45.175 UTC [msp] getCertificationChain -> DEBU 170f MSP Org1MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1710 Initializing protos for *channelconfig.ApplicationOrgProtos" -orderer0.example.com | "2019-07-20 02:40:45.176 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1711 Processing field: AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1712 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.176 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1713 Processing field: MSP" -orderer0.example.com | "2019-07-20 02:40:45.176 UTC [common.channelconfig] Validate -> DEBU 1714 Anchor peers for org Org2MSP are anchor_peers: " -orderer0.example.com | "2019-07-20 02:40:45.177 UTC [common.channelconfig] validateMSP -> DEBU 1715 Setting up MSP for org Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.177 UTC [msp] newBccspMsp -> DEBU 1716 Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.177 UTC [msp] New -> DEBU 1717 Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.177 UTC [msp] Setup -> DEBU 1718 Setting up MSP instance Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.177 UTC [msp.identity] newIdentity -> DEBU 1719 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.178 UTC [msp.identity] newIdentity -> DEBU 171a Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | "2019-07-20 02:39:59.959 UTC [gossip.pull] SendDigest -> DEBU 1336 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:39:59.959 UTC [gossip.gossip] handleMessage -> DEBU 1337 Exiting" -peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1338 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.274 UTC [gossip.pull] Hello -> DEBU 1339 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:00.274 UTC [gossip.comm] Send -> DEBU 133a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:00.274 UTC [gossip.pull] Hello -> DEBU 133b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] Send -> DEBU 133c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.pull] Hello -> DEBU 133d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] Send -> DEBU 133e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 133f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1340 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1341 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1342 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1343 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.276 UTC [gossip.comm] sendToEndpoint -> DEBU 1344 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.276 UTC [gossip.comm] func1 -> DEBU 1345 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.277 UTC [gossip.gossip] handleMessage -> DEBU 1346 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.277 UTC [gossip.pull] HandleMessage -> DEBU 1347 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.277 UTC [gossip.gossip] handleMessage -> DEBU 1348 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.278 UTC [gossip.comm] func1 -> DEBU 1349 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.278 UTC [gossip.gossip] handleMessage -> DEBU 134a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.278 UTC [gossip.pull] HandleMessage -> DEBU 134b GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.278 UTC [gossip.gossip] handleMessage -> DEBU 134c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.278 UTC [gossip.comm] func1 -> DEBU 134d Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.279 UTC [gossip.gossip] handleMessage -> DEBU 134e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.178 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 171b Checking if identity satisfies role [CLIENT] for Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.179 UTC [msp] Validate -> DEBU 171c MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.179 UTC [msp] getCertificationChain -> DEBU 171d MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.179 UTC [msp] hasOURole -> DEBU 171e MSP Org2MSP checking if the identity is a client" -orderer0.example.com | "2019-07-20 02:40:45.179 UTC [msp] getCertificationChain -> DEBU 171f MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] NewStandardValues -> DEBU 1720 Initializing protos for *channelconfig.OrdererProtos" -orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1721 Processing field: ConsensusType" -orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1722 Processing field: BatchSize" -orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1723 Processing field: BatchTimeout" -orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1724 Processing field: KafkaBrokers" -orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1725 Processing field: ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:40:45.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1726 Processing field: Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.181 UTC [common.channelconfig] NewStandardValues -> DEBU 1727 Initializing protos for *channelconfig.OrdererOrgProtos" -orderer0.example.com | "2019-07-20 02:40:45.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1728 Processing field: Endpoints" -orderer0.example.com | "2019-07-20 02:40:45.181 UTC [common.channelconfig] NewStandardValues -> DEBU 1729 Initializing protos for *channelconfig.OrganizationProtos" -orderer0.example.com | "2019-07-20 02:40:45.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 172a Processing field: MSP" -orderer0.example.com | "2019-07-20 02:40:45.182 UTC [common.channelconfig] validateMSP -> DEBU 172b Setting up MSP for org OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.182 UTC [msp] newBccspMsp -> DEBU 172c Creating BCCSP-based MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.183 UTC [msp] New -> DEBU 172d Creating Cache-MSP instance" -orderer0.example.com | "2019-07-20 02:40:45.183 UTC [msp] Setup -> DEBU 172e Setting up MSP instance OrdererMSP" -orderer0.example.com | "2019-07-20 02:40:45.184 UTC [msp.identity] newIdentity -> DEBU 172f Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.184 UTC [msp.identity] newIdentity -> DEBU 1730 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.185 UTC [msp] Validate -> DEBU 1731 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.185 UTC [msp] Setup -> DEBU 1732 Setting up the MSP manager (4 msps)" -orderer0.example.com | "2019-07-20 02:40:45.185 UTC [msp] Setup -> DEBU 1733 MSP manager setup complete, setup 4 msps" -orderer0.example.com | "2019-07-20 02:40:45.185 UTC [policies] NewManagerImpl -> DEBU 1734 Proposed new policy Admins for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1735 Proposed new policy Endorsement for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1736 Proposed new policy Readers for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1737 Proposed new policy Writers for Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1738 Proposed new policy Writers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1739 Proposed new policy Admins for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173a Proposed new policy Endorsement for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173b Proposed new policy Readers for Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173c Proposed new policy Admins for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173d Proposed new policy Endorsement for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173e Proposed new policy Readers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173f Proposed new policy Writers for Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.188 UTC [policies] NewManagerImpl -> DEBU 1740 Proposed new policy Readers for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.188 UTC [policies] NewManagerImpl -> DEBU 1741 Proposed new policy Writers for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1744 Proposed new policy Admins for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1745 Proposed new policy Endorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1746 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 259.4µs " -orderer0.example.com | "2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1747 Proposed new policy LifecycleEndorsement for Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1748 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.203 UTC [policies] NewManagerImpl -> DEBU 1749 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.204 UTC [policies] NewManagerImpl -> DEBU 174a Proposed new policy Admins for Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.200 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1742 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:45.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1743 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" -orderer0.example.com | "2019-07-20 02:40:45.206 UTC [policies] NewManagerImpl -> DEBU 174b Proposed new policy Readers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.207 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 174c Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" -orderer0.example.com | "2019-07-20 02:40:45.207 UTC [orderer.common.cluster.step] sendMessage -> DEBU 174d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.5µs " -orderer0.example.com | "2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 174e Proposed new policy Writers for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 174f Proposed new policy Admins for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 1750 Proposed new policy BlockValidation for Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1751 Proposed new policy Writers for Channel" -orderer0.example.com | "2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1752 Proposed new policy Admins for Channel" -orderer0.example.com | "2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1753 Proposed new policy Readers for Channel" -orderer0.example.com | "2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1754 Adding to config map: [Group] /Channel" -orderer0.example.com | "2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1755 Adding to config map: [Group] /Channel/Application" -orderer0.example.com | "2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1756 Adding to config map: [Group] /Channel/Application/Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.211 UTC [common.configtx] addToMap -> DEBU 1757 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.211 UTC [common.configtx] addToMap -> DEBU 1758 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1759 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:45.213 UTC [common.configtx] addToMap -> DEBU 175a Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.215 UTC [common.configtx] addToMap -> DEBU 175b Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.215 UTC [common.configtx] addToMap -> DEBU 175c Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.217 UTC [orderer.common.cluster.step] handleMessage -> DEBU 175d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:45.216 UTC [common.configtx] addToMap -> DEBU 175e Adding to config map: [Group] /Channel/Application/Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 175f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1760 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1761 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1762 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 1763 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 1764 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 1765 Adding to config map: [Group] /Channel/Application/Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.223 UTC [common.configtx] addToMap -> DEBU 1766 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -orderer0.example.com | "2019-07-20 02:40:45.224 UTC [common.configtx] addToMap -> DEBU 1767 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -orderer0.example.com | "2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 1768 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -orderer0.example.com | "2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 1769 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 176a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 176b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -orderer0.example.com | "2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 176c Adding to config map: [Value] /Channel/Application/ACLs" -orderer0.example.com | "2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176d Adding to config map: [Value] /Channel/Application/Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176e Adding to config map: [Policy] /Channel/Application/Admins" -orderer0.example.com | "2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176f Adding to config map: [Policy] /Channel/Application/Endorsement" -orderer0.example.com | "2019-07-20 02:40:45.229 UTC [common.configtx] addToMap -> DEBU 1770 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -orderer0.example.com | "2019-07-20 02:40:45.229 UTC [common.configtx] addToMap -> DEBU 1771 Adding to config map: [Policy] /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:45.230 UTC [common.configtx] addToMap -> DEBU 1772 Adding to config map: [Policy] /Channel/Application/Writers" -orderer0.example.com | "2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1773 Adding to config map: [Group] /Channel/Orderer" -orderer0.example.com | "2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1774 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1775 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -orderer0.example.com | "2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1776 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -orderer0.example.com | "2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1777 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -orderer0.example.com | "2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1778 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:45.233 UTC [common.configtx] addToMap -> DEBU 1779 Adding to config map: [Value] /Channel/Orderer/Capabilities" -peer0.org1.example.com | "2019-07-20 02:40:00.279 UTC [gossip.pull] HandleMessage -> DEBU 134f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.279 UTC [gossip.gossip] handleMessage -> DEBU 1350 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 1351 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1352 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151016 " -peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1353 Sign: digest: 11CA326B0DACA229CE2CE81B0CFFF6F167054870B698D3BCC60F2CCD5EECB3F3 " -peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 1354 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1355 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1356 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [gossip.comm] Send -> DEBU 1357 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [msp] DeserializeIdentity -> DEBU 1358 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [gossip.comm] sendToEndpoint -> DEBU 1359 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [gossip.comm] sendToEndpoint -> DEBU 135a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [gossip.comm] Send -> DEBU 135b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [msp] DeserializeIdentity -> DEBU 135c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.311 UTC [gossip.comm] sendToEndpoint -> DEBU 135d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.311 UTC [gossip.comm] sendToEndpoint -> DEBU 135e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.311 UTC [gossip.comm] Send -> DEBU 135f Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:00.312 UTC [gossip.comm] sendToEndpoint -> DEBU 1360 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.312 UTC [gossip.comm] sendToEndpoint -> DEBU 1361 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.313 UTC [gossip.comm] func1 -> DEBU 1362 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.313 UTC [gossip.gossip] handleMessage -> DEBU 1363 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.313 UTC [gossip.gossip] handleMessage -> DEBU 1364 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1365 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.314 UTC [gossip.comm] func1 -> DEBU 1366 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.314 UTC [gossip.gossip] handleMessage -> DEBU 1367 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1368 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:00.314 UTC [msp.identity] Verify -> DEBU 1369 Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| -peer0.org1.example.com | 00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" -peer0.org1.example.com | "2019-07-20 02:40:00.315 UTC [msp.identity] Verify -> DEBU 136a Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| -peer0.org1.example.com | 00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| -peer0.org1.example.com | 00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| -peer0.org1.example.com | 00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| -peer0.org1.example.com | 00000040 4e d6 49 e1 dd 1b |N.I...|" -peer0.org1.example.com | "2019-07-20 02:40:00.315 UTC [gossip.comm] func1 -> DEBU 136b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 136c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.315 UTC [gossip.discovery] isSentByMe -> DEBU 136d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 136e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 136f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1370 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1371 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.gossip] handleMessage -> DEBU 1372 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.gossip] handleMessage -> DEBU 1373 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [msp.identity] Verify -> DEBU 1374 Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| -peer0.org1.example.com | 00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" -peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [msp.identity] Verify -> DEBU 1375 Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| -peer0.org1.example.com | 00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| -peer0.org1.example.com | 00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| -peer0.org1.example.com | 00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| -peer0.org1.example.com | 00000040 4e d6 49 e1 dd 1b |N.I...|" -peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 1376 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [gossip.discovery] isSentByMe -> DEBU 1377 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 1378 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1379 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [msp] DeserializeIdentity -> DEBU 137a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 137b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 137e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 137f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 1380 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:45.234 UTC [common.configtx] addToMap -> DEBU 177a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -orderer0.example.com | "2019-07-20 02:40:45.234 UTC [common.configtx] addToMap -> DEBU 177b Adding to config map: [Value] /Channel/Orderer/BatchSize" -orderer0.example.com | "2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -orderer0.example.com | "2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -orderer0.example.com | "2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -orderer0.example.com | "2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177f Adding to config map: [Policy] /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1780 Adding to config map: [Policy] /Channel/Orderer/Writers" -orderer0.example.com | "2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1781 Adding to config map: [Policy] /Channel/Orderer/Admins" -orderer0.example.com | "2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1782 Adding to config map: [Value] /Channel/OrdererAddresses" -orderer0.example.com | "2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1783 Adding to config map: [Value] /Channel/Consortium" -orderer0.example.com | "2019-07-20 02:40:45.238 UTC [common.configtx] addToMap -> DEBU 1784 Adding to config map: [Value] /Channel/Capabilities" -orderer0.example.com | "2019-07-20 02:40:45.238 UTC [common.configtx] addToMap -> DEBU 1785 Adding to config map: [Value] /Channel/HashingAlgorithm" -orderer0.example.com | "2019-07-20 02:40:45.239 UTC [common.configtx] addToMap -> DEBU 1786 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -orderer0.example.com | "2019-07-20 02:40:45.239 UTC [common.configtx] addToMap -> DEBU 1787 Adding to config map: [Policy] /Channel/Writers" -orderer0.example.com | "2019-07-20 02:40:45.240 UTC [common.configtx] addToMap -> DEBU 1788 Adding to config map: [Policy] /Channel/Admins" -orderer0.example.com | "2019-07-20 02:40:45.240 UTC [common.configtx] addToMap -> DEBU 1789 Adding to config map: [Policy] /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:45.241 UTC [common.channelconfig] LogSanityChecks -> DEBU 178a As expected, current configuration has policy '/Channel/Readers'" -orderer0.example.com | "2019-07-20 02:40:45.242 UTC [common.channelconfig] LogSanityChecks -> DEBU 178b As expected, current configuration has policy '/Channel/Writers'" -orderer0.example.com | "2019-07-20 02:40:45.242 UTC [policies] Manager -> DEBU 178c Manager Channel looking up path [Application]" -orderer0.example.com | "2019-07-20 02:40:45.242 UTC [policies] Manager -> DEBU 178d Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:40:45.243 UTC [policies] Manager -> DEBU 178e Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:40:45.243 UTC [policies] Manager -> DEBU 178f Manager Channel/Application looking up path []" -orderer0.example.com | "2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1790 Manager Channel/Application has managers Org1MSP" -orderer0.example.com | "2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1791 Manager Channel/Application has managers Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1792 Manager Channel/Application has managers Org3MSP" -orderer0.example.com | "2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1793 As expected, current configuration has policy '/Channel/Application/Readers'" -orderer0.example.com | "2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1794 As expected, current configuration has policy '/Channel/Application/Writers'" -orderer0.example.com | "2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1795 As expected, current configuration has policy '/Channel/Application/Admins'" -orderer0.example.com | "2019-07-20 02:40:45.246 UTC [policies] Manager -> DEBU 1796 Manager Channel looking up path [Orderer]" -orderer0.example.com | "2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1797 Manager Channel has managers Application" -orderer0.example.com | "2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1798 Manager Channel has managers Orderer" -orderer0.example.com | "2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1799 Manager Channel/Orderer looking up path []" -orderer0.example.com | "2019-07-20 02:40:45.248 UTC [policies] Manager -> DEBU 179a Manager Channel/Orderer has managers OrdererOrg" -orderer0.example.com | "2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -orderer0.example.com | "2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179c As expected, current configuration has policy '/Channel/Orderer/Admins'" -orderer0.example.com | "2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179d As expected, current configuration has policy '/Channel/Orderer/Writers'" -orderer0.example.com | "2019-07-20 02:40:45.249 UTC [common.channelconfig] LogSanityChecks -> DEBU 179e As expected, current configuration has policy '/Channel/Orderer/Readers'" -orderer0.example.com | "2019-07-20 02:40:45.250 UTC [common.capabilities] Supported -> DEBU 179f Orderer capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:40:45.250 UTC [common.capabilities] Supported -> DEBU 17a0 Channel capability V1_4_2 is supported and is enabled" -orderer0.example.com | "2019-07-20 02:40:45.250 UTC [orderer.common.server] func1 -> DEBU 17a1 Executing callback to update root CAs" -orderer0.example.com | "2019-07-20 02:40:45.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17a2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:45.250 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a3 updating root CAs for channel [businesschannel]" -orderer0.example.com | "2019-07-20 02:40:45.251 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a4 adding app root CAs for MSP [Org3MSP]" -orderer0.example.com | "2019-07-20 02:40:45.252 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a5 adding app root CAs for MSP [Org1MSP]" -orderer0.example.com | "2019-07-20 02:40:45.253 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a6 adding app root CAs for MSP [Org2MSP]" -orderer0.example.com | "2019-07-20 02:40:45.253 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a7 adding orderer root CAs for MSP [OrdererMSP]" -orderer0.example.com | "2019-07-20 02:40:45.268 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17a8 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" -orderer0.example.com | "2019-07-20 02:40:45.270 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17a9 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" -orderer0.example.com | "2019-07-20 02:40:45.270 UTC [msp] GetDefaultSigningIdentity -> DEBU 17aa Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:40:45.271 UTC [msp] GetDefaultSigningIdentity -> DEBU 17ab Obtaining default signing identity" -orderer0.example.com | "2019-07-20 02:40:45.274 UTC [msp.identity] Sign -> DEBU 17ac Sign: plaintext: 0A020806120B0A090A03010203100418...CAE88F56D183B4805A1EC235F949D7F9 " -orderer0.example.com | "2019-07-20 02:40:45.275 UTC [msp.identity] Sign -> DEBU 17ad Sign: digest: CC6AD12B7A215B899C1845FD388D2A71DF2059FE693C450EC89BAE5083B4D965 " -orderer0.example.com | "2019-07-20 02:40:45.278 UTC [fsblkstorage] indexBlock -> DEBU 17ae Indexing block [blockNum=6, blockHash=[]byte{0xf5, 0xb0, 0x11, 0x46, 0x4, 0x5a, 0x37, 0x6e, 0xe5, 0x9b, 0x7a, 0xb0, 0xf2, 0xf9, 0xaf, 0x42, 0x15, 0x9e, 0x7f, 0x29, 0x6f, 0xe6, 0x3, 0xf4, 0x56, 0x9b, 0xb6, 0x31, 0xa7, 0x9, 0xf1, 0x78} txOffsets= -orderer0.example.com | txId=e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38 locPointer=offset=71, bytesLength=33874 -orderer0.example.com | ]" -orderer0.example.com | "2019-07-20 02:40:45.280 UTC [fsblkstorage] updateCheckpoint -> DEBU 17af Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[118787], isChainEmpty=[false], lastBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:45.280 UTC [fsblkstorage] waitForBlock -> DEBU 17b0 Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:45.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b1 Remaining bytes=[34883], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:45.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b2 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -orderer0.example.com | "2019-07-20 02:40:45.282 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b3 blockbytes [34880] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:45.284 UTC [policies] Evaluate -> DEBU 17b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:45.285 UTC [policies] Evaluate -> DEBU 17b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:45.287 UTC [msp] DeserializeIdentity -> DEBU 17b9 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:45.288 UTC [msp.identity] newIdentity -> DEBU 17ba Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:45.290 UTC [cauthdsl] func1 -> DEBU 17bb 0xc000a9b000 gate 1563590445290446800 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:45.291 UTC [cauthdsl] func2 -> DEBU 17bc 0xc000a9b000 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:45.292 UTC [cauthdsl] func2 -> DEBU 17bd 0xc000a9b000 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.292 UTC [cauthdsl] func2 -> DEBU 17be 0xc000a9b000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:40:45.293 UTC [cauthdsl] func2 -> DEBU 17bf 0xc000a9b000 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:45.293 UTC [cauthdsl] func1 -> DEBU 17c0 0xc000a9b000 gate 1563590445290446800 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:45.293 UTC [policies] Evaluate -> DEBU 17c1 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.294 UTC [policies] Evaluate -> DEBU 17c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.295 UTC [policies] Evaluate -> DEBU 17c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:45.295 UTC [cauthdsl] func1 -> DEBU 17c4 0xc00004e4e0 gate 1563590445295605800 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:45.295 UTC [cauthdsl] func2 -> DEBU 17c5 0xc00004e4e0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:45.297 UTC [cauthdsl] func2 -> DEBU 17c6 0xc00004e4e0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.298 UTC [cauthdsl] func2 -> DEBU 17c7 0xc00004e4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:40:45.298 UTC [cauthdsl] func2 -> DEBU 17c8 0xc00004e4e0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:45.302 UTC [cauthdsl] func1 -> DEBU 17c9 0xc00004e4e0 gate 1563590445295605800 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:45.302 UTC [policies] Evaluate -> DEBU 17ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.302 UTC [policies] Evaluate -> DEBU 17cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.303 UTC [policies] Evaluate -> DEBU 17cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:45.303 UTC [cauthdsl] func1 -> DEBU 17cd 0xc00004f270 gate 1563590445303305800 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:45.303 UTC [cauthdsl] func2 -> DEBU 17ce 0xc00004f270 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:45.304 UTC [cauthdsl] func2 -> DEBU 17cf 0xc00004f270 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:45.304 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17d0 Checking if identity satisfies MEMBER role for Org2MSP" -orderer0.example.com | "2019-07-20 02:40:45.304 UTC [msp] Validate -> DEBU 17d1 MSP Org2MSP validating identity" -orderer0.example.com | "2019-07-20 02:40:45.307 UTC [msp] getCertificationChain -> DEBU 17d2 MSP Org2MSP getting certification chain" -orderer0.example.com | "2019-07-20 02:40:45.309 UTC [cauthdsl] func2 -> DEBU 17d3 0xc00004f270 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:45.309 UTC [msp.identity] Verify -> DEBU 17d4 Verify: digest = 00000000 3d ed 09 6a 90 8b ae 36 c4 46 b1 80 9b 79 50 eb |=..j...6.F...yP.| -orderer0.example.com | 00000010 e1 9a a4 fa c9 37 7f 0d 0d 0b 13 11 fd b6 13 06 |.....7..........|" -orderer0.example.com | "2019-07-20 02:40:45.310 UTC [msp.identity] Verify -> DEBU 17d5 Verify: sig = 00000000 30 45 02 21 00 e9 9b b3 fc 5d ce e7 4b 96 63 aa |0E.!.....]..K.c.| -orderer0.example.com | 00000010 14 41 1c 1f 69 50 d4 3a 17 7d 9d 0b cf 58 3f 47 |.A..iP.:.}...X?G| -orderer0.example.com | 00000020 26 70 94 2d 91 02 20 5d 41 9d 07 80 46 e0 d0 bc |&p.-.. ]A...F...| -orderer0.example.com | 00000030 ca 9d b6 fb 58 27 c3 34 1e dc 66 dd 7a ce 6c 67 |....X'.4..f.z.lg| -orderer0.example.com | 00000040 f0 df 1f af fc f3 dc |.......|" -orderer0.example.com | "2019-07-20 02:40:45.310 UTC [cauthdsl] func2 -> DEBU 17d6 0xc00004f270 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:45.311 UTC [cauthdsl] func1 -> DEBU 17d7 0xc00004f270 gate 1563590445303305800 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:45.311 UTC [policies] Evaluate -> DEBU 17d8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.311 UTC [policies] Evaluate -> DEBU 17d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17da Signature set satisfies policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17dc Signature set satisfies policy /Channel/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func1 -> DEBU 1381 0xc003cd45b0 gate 1563590400318472100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1382 0xc003cd45b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1383 0xc003cd45b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1384 0xc003cd45b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1385 0xc003cd45b0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func1 -> DEBU 1386 0xc003cd45b0 gate 1563590400318472100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 1387 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [policies] Evaluate -> DEBU 1388 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [policies] Evaluate -> DEBU 1389 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [cauthdsl] func1 -> DEBU 138a 0xc003cd4e10 gate 1563590400319460300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138b 0xc003cd4e10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138c 0xc003cd4e10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138d 0xc003cd4e10 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [msp.identity] Verify -> DEBU 138e Verify: digest = 00000000 64 e6 bd 9b c4 af c6 3c 24 e1 0e 9a 0b ec e2 3d |d......<$......=| -peer0.org1.example.com | 00000010 03 6e 6c 5f 0b 5e 39 29 da 7d d8 fb 9f 31 b9 c1 |.nl_.^9).}...1..|" -peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [msp.identity] Verify -> DEBU 138f Verify: sig = 00000000 30 44 02 20 5f e3 aa 3f 94 4e 5f e6 55 aa 4c d3 |0D. _..?.N_.U.L.| -peer0.org1.example.com | 00000010 04 80 9f 88 f2 43 3b b4 d7 56 e6 8d 67 e9 a7 c7 |.....C;..V..g...| -peer0.org1.example.com | 00000020 ca 23 15 f5 02 20 28 9c 73 a9 00 21 bc bc 00 33 |.#... (.s..!...3| -peer0.org1.example.com | 00000030 13 bd fe 64 e7 c6 33 61 5b 99 5b 42 2c 95 3f a1 |...d..3a[.[B,.?.| -peer0.org1.example.com | 00000040 ad ca ca e5 1e 5a |.....Z|" -peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [cauthdsl] func2 -> DEBU 1390 0xc003cd4e10 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [cauthdsl] func1 -> DEBU 1391 0xc003cd4e10 gate 1563590400319460300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1392 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1393 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1394 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1395 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 1396 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 1397 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1398 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.321 UTC [gossip.gossip] handleMessage -> DEBU 139a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1399 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.322 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 139b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:00.322 UTC [msp.identity] Verify -> DEBU 139c Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| -peer0.org1.example.com | 00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" -peer0.org1.example.com | "2019-07-20 02:40:00.322 UTC [msp.identity] Verify -> DEBU 139d Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| -peer0.org1.example.com | 00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| -peer0.org1.example.com | 00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| -peer0.org1.example.com | 00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| -peer0.org1.example.com | 00000040 4e d6 49 e1 dd 1b |N.I...|" -peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [msp.identity] Verify -> DEBU 139e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [msp.identity] Verify -> DEBU 139f Verify: sig = 00000000 30 44 02 20 58 40 7c 49 09 c6 a4 f9 da 59 12 bf |0D. X@|I.....Y..| -peer0.org1.example.com | 00000010 7a 38 1d fb 5d 95 58 26 92 c8 a0 3b 06 3b 03 68 |z8..].X&...;.;.h| -peer0.org1.example.com | 00000020 bd 29 24 99 02 20 33 53 85 b7 ac 4b ef 99 a3 4f |.)$.. 3S...K...O| -peer0.org1.example.com | 00000030 36 7d d1 08 b7 a3 a8 2c 9a 5e 86 92 2f fa 80 c9 |6}.....,.^../...| -peer0.org1.example.com | 00000040 4f 89 be 1b 47 d5 |O...G.|" -peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [gossip.discovery] isSentByMe -> DEBU 13a1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13a3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.395 UTC [gossip.comm] func1 -> DEBU 13a4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.395 UTC [gossip.gossip] handleMessage -> DEBU 13a5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.397 UTC [gossip.pull] HandleMessage -> DEBU 13a6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-07-20 02:40:45.313 UTC [policies] Evaluate -> DEBU 17dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:45.313 UTC [common.deliver] deliverBlocks -> DEBU 17de [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -orderer0.example.com | "2019-07-20 02:40:45.314 UTC [fsblkstorage] waitForBlock -> DEBU 17df Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:45.280 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 17e0 [channel: businesschannel] Wrote block [6]" -orderer0.example.com | "2019-07-20 02:40:45.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:45.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e2 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" -orderer0.example.com | "2019-07-20 02:40:45.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.8µs " -orderer0.example.com | "2019-07-20 02:40:45.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e4 Sending msg of 28 bytes to 2 on channel businesschannel took 35.9µs" -orderer0.example.com | "2019-07-20 02:40:45.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e5 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" -orderer0.example.com | "2019-07-20 02:40:45.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.2µs " -orderer0.example.com | "2019-07-20 02:40:45.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 553.7µs " -orderer0.example.com | "2019-07-20 02:40:45.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:45.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e9 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:45.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17ea Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:45.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17eb Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" -orderer0.example.com | "2019-07-20 02:40:45.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.2µs " -orderer0.example.com | "2019-07-20 02:40:46.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ed Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" -orderer0.example.com | "2019-07-20 02:40:46.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ee Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" -orderer0.example.com | "2019-07-20 02:40:46.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139µs " -orderer0.example.com | "2019-07-20 02:40:46.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.6µs " -orderer0.example.com | "2019-07-20 02:40:46.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:46.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:46.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:46.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f4 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" -orderer0.example.com | "2019-07-20 02:40:46.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.4µs " -orderer0.example.com | "2019-07-20 02:40:46.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" -orderer0.example.com | "2019-07-20 02:40:46.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" -orderer0.example.com | "2019-07-20 02:40:46.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.6µs " -orderer0.example.com | "2019-07-20 02:40:46.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 467µs " -orderer0.example.com | "2019-07-20 02:40:46.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:46.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:46.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:46.940 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17fd Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" -orderer0.example.com | "2019-07-20 02:40:46.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17fe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 545µs " -orderer0.example.com | "2019-07-20 02:40:47.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ff Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" -orderer0.example.com | "2019-07-20 02:40:47.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1800 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" -orderer0.example.com | "2019-07-20 02:40:47.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1801 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.4µs " -orderer0.example.com | "2019-07-20 02:40:47.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1802 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 858.2µs " -orderer0.example.com | "2019-07-20 02:40:47.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1803 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:47.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1804 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:47.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1805 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:47.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1806 Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" -orderer0.example.com | "2019-07-20 02:40:47.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1807 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169µs " -orderer0.example.com | "2019-07-20 02:40:47.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1808 Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" -orderer0.example.com | "2019-07-20 02:40:47.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180a Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" -orderer0.example.com | "2019-07-20 02:40:47.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 180b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.8µs " -orderer0.example.com | "2019-07-20 02:40:47.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1809 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 175.4µs " -orderer0.example.com | "2019-07-20 02:40:47.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:47.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:47.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:47.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180f Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" -orderer0.example.com | "2019-07-20 02:40:47.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1810 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 856.1µs " -orderer0.example.com | "2019-07-20 02:40:48.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1811 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" -orderer0.example.com | "2019-07-20 02:40:48.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1813 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" -orderer0.example.com | "2019-07-20 02:40:48.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1814 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.3µs " -orderer0.example.com | "2019-07-20 02:40:48.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1812 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.1µs " -orderer0.example.com | "2019-07-20 02:40:48.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1815 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:48.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1816 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:48.248 UTC [orderer.common.server] Deliver -> DEBU 1817 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:48.248 UTC [common.deliver] Handle -> DEBU 1818 Starting new deliver loop for 172.18.0.9:39274" -orderer0.example.com | "2019-07-20 02:40:48.248 UTC [common.deliver] Handle -> DEBU 1819 Attempting to read seek info message from 172.18.0.9:39274" -orderer0.example.com | "2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.250 UTC [policies] Evaluate -> DEBU 181d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:48.250 UTC [policies] Evaluate -> DEBU 181e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.250 UTC [msp] DeserializeIdentity -> DEBU 181f Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:48.251 UTC [msp.identity] newIdentity -> DEBU 1820 Creating identity instance for cert -----BEGIN CERTIFICATE----- -orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -orderer0.example.com | -----END CERTIFICATE-----" -orderer0.example.com | "2019-07-20 02:40:48.251 UTC [cauthdsl] func1 -> DEBU 1821 0xc000416840 gate 1563590448251684300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.251 UTC [cauthdsl] func2 -> DEBU 1822 0xc000416840 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.251 UTC [cauthdsl] func2 -> DEBU 1823 0xc000416840 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:48.252 UTC [cauthdsl] func2 -> DEBU 1824 0xc000416840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:48.252 UTC [cauthdsl] func2 -> DEBU 1825 0xc000416840 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.252 UTC [cauthdsl] func1 -> DEBU 1826 0xc000416840 gate 1563590448251684300 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1827 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1828 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1829 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.253 UTC [cauthdsl] func1 -> DEBU 182a 0xc000417b20 gate 1563590448253612300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.253 UTC [cauthdsl] func2 -> DEBU 182b 0xc000417b20 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182c 0xc000417b20 processing identity 0 with bytes of fd0280" -peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.pull] SendDigest -> DEBU 13a7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13a8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.comm] func1 -> DEBU 13a9 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13aa Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13ab Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13ac Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13ad Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:00.400 UTC [msp.identity] Verify -> DEBU 13ae Verify: digest = 00000000 b2 df 75 9a c5 cd b4 29 05 05 d3 7e cd ea ba b1 |..u....)...~....| -peer0.org1.example.com | 00000010 29 a8 a9 25 d2 e9 e4 20 b9 cd 4c 96 94 4b 70 bb |)..%... ..L..Kp.|" -peer0.org1.example.com | "2019-07-20 02:40:00.400 UTC [msp.identity] Verify -> DEBU 13af Verify: sig = 00000000 30 45 02 21 00 ae ba 69 b1 18 cb c3 27 ed 1f 1e |0E.!...i....'...| -peer0.org1.example.com | 00000010 ec 78 6e e7 f4 61 a8 c8 c2 ac ec 49 b9 fa b6 40 |.xn..a.....I...@| -peer0.org1.example.com | 00000020 53 2e 97 6c 1e 02 20 48 5e a8 6c ca f8 d1 22 ac |S..l.. H^.l...".| -peer0.org1.example.com | 00000030 ec 63 b2 b0 1c d9 86 3a 93 25 43 35 79 66 77 5d |.c.....:.%C5yfw]| -peer0.org1.example.com | 00000040 9c 50 f7 27 c9 50 6e |.P.'.Pn|" -peer0.org1.example.com | "2019-07-20 02:40:00.401 UTC [msp.identity] Verify -> DEBU 13b0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:00.401 UTC [msp.identity] Verify -> DEBU 13b1 Verify: sig = 00000000 30 44 02 20 64 44 b6 aa 9f f9 b9 e1 0f 65 2b 3e |0D. dD.......e+>| -peer0.org1.example.com | 00000010 e8 a7 42 e8 6f c5 84 00 11 a8 16 cb e4 dd a3 a3 |..B.o...........| -peer0.org1.example.com | 00000020 45 89 e3 36 02 20 17 a3 1e d3 94 25 da e8 b9 3c |E..6. .....%...<| -peer0.org1.example.com | 00000030 34 a2 f3 f9 fd ea a2 aa a9 af 6f 13 dc 62 cf 4c |4.........o..b.L| -peer0.org1.example.com | 00000040 b4 8b 61 7d f0 f7 |..a}..|" -peer0.org1.example.com | "2019-07-20 02:40:00.401 UTC [gossip.discovery] handleAliveMessage -> DEBU 13b2 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b4 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b5 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b6 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 13b8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13b9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] sendMemResponse -> DEBU 13ba Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [msp] DeserializeIdentity -> DEBU 13bb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [msp] DeserializeIdentity -> DEBU 13bc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.403 UTC [gossip.comm] Send -> DEBU 13bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -orderer0.example.com | "2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182d 0xc000417b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182e 0xc000417b20 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.254 UTC [cauthdsl] func1 -> DEBU 182f 0xc000417b20 gate 1563590448253612300 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.254 UTC [policies] Evaluate -> DEBU 1830 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.254 UTC [policies] Evaluate -> DEBU 1831 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.255 UTC [policies] Evaluate -> DEBU 1832 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.255 UTC [cauthdsl] func1 -> DEBU 1833 0xc00029c6f0 gate 1563590448255311400 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.255 UTC [cauthdsl] func2 -> DEBU 1834 0xc00029c6f0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.255 UTC [cauthdsl] func2 -> DEBU 1835 0xc00029c6f0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:48.256 UTC [cauthdsl] func2 -> DEBU 1836 0xc00029c6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:48.256 UTC [cauthdsl] func2 -> DEBU 1837 0xc00029c6f0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.256 UTC [cauthdsl] func1 -> DEBU 1838 0xc00029c6f0 gate 1563590448255311400 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.256 UTC [policies] Evaluate -> DEBU 1839 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.256 UTC [policies] Evaluate -> DEBU 183a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.257 UTC [policies] func1 -> DEBU 183b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183c Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:48.258 UTC [policies] Evaluate -> DEBU 1840 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.258 UTC [cauthdsl] func1 -> DEBU 1841 0xc0001a9070 gate 1563590448258389800 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.258 UTC [cauthdsl] func2 -> DEBU 1842 0xc0001a9070 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.258 UTC [cauthdsl] func2 -> DEBU 1843 0xc0001a9070 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:48.259 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1844 Checking if identity satisfies MEMBER role for OrdererMSP" -orderer0.example.com | "2019-07-20 02:40:48.259 UTC [msp] Validate -> DEBU 1845 MSP OrdererMSP validating identity" -orderer0.example.com | "2019-07-20 02:40:48.261 UTC [cauthdsl] func2 -> DEBU 1846 0xc0001a9070 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:48.261 UTC [msp.identity] Verify -> DEBU 1847 Verify: digest = 00000000 43 79 dd b3 45 49 f9 30 dc 8b 58 86 ec 01 dc 4f |Cy..EI.0..X....O| -orderer0.example.com | 00000010 44 eb a3 5f 9c b0 b3 42 ed f8 1f f5 39 9f b5 1f |D.._...B....9...|" -orderer0.example.com | "2019-07-20 02:40:48.261 UTC [msp.identity] Verify -> DEBU 1848 Verify: sig = 00000000 30 44 02 20 21 f8 78 31 b1 e9 b0 b5 ac 3c 4d e0 |0D. !.x1.......av.W({*| -orderer0.example.com | 00000030 38 15 f3 3d 0f 71 29 b6 3f 37 8e b2 6c 2f 14 5e |8..=.q).?7..l/.^| -orderer0.example.com | 00000040 13 a1 5c a3 0c cb |..\...|" -orderer0.example.com | "2019-07-20 02:40:48.261 UTC [cauthdsl] func2 -> DEBU 1849 0xc0001a9070 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:48.261 UTC [cauthdsl] func1 -> DEBU 184a 0xc0001a9070 gate 1563590448258389800 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184d Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184f Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 1850 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:48.263 UTC [common.deliver] deliverBlocks -> DEBU 1851 [channel: businesschannel] Received seekInfo (0xc000c51b00) start: > stop: > from 172.18.0.9:39274" -orderer0.example.com | "2019-07-20 02:40:48.263 UTC [fsblkstorage] Next -> DEBU 1852 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:48.263 UTC [fsblkstorage] newBlockfileStream -> DEBU 1853 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -orderer0.example.com | "2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1854 Remaining bytes=[34883], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1855 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -orderer0.example.com | "2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1856 blockbytes [34880] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:48.264 UTC [common.deliver] deliverBlocks -> DEBU 1857 [channel: businesschannel] Delivering block for (0xc000c51b00) for 172.18.0.9:39274" -orderer0.example.com | "2019-07-20 02:40:48.264 UTC [common.deliver] deliverBlocks -> DEBU 1858 [channel: businesschannel] Done delivering to 172.18.0.9:39274 for (0xc000c51b00)" -peer0.org1.example.com | "2019-07-20 02:40:00.403 UTC [gossip.discovery] sendMemResponse -> DEBU 13be Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > alive: " -peer0.org1.example.com | "2019-07-20 02:40:00.403 UTC [gossip.comm] sendToEndpoint -> DEBU 13bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.403 UTC [gossip.comm] sendToEndpoint -> DEBU 13c0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.577 UTC [gossip.comm] func1 -> DEBU 13c1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.577 UTC [gossip.gossip] handleMessage -> DEBU 13c2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.578 UTC [gossip.pull] HandleMessage -> DEBU 13c3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.583 UTC [gossip.comm] func1 -> DEBU 13ca Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.583 UTC [gossip.pull] SendDigest -> DEBU 13cb Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:00.583 UTC [gossip.gossip] handleMessage -> DEBU 13cc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [gossip.gossip] handleMessage -> DEBU 13cd Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [gossip.gossip] handleMessage -> DEBU 13ce Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13cf Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13d0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [msp] DeserializeIdentity -> DEBU 13d1 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:48.265 UTC [fsblkstorage] waitForBlock -> DEBU 1859 Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:48.265 UTC [fsblkstorage] waitForBlock -> DEBU 185a Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:48.265 UTC [common.deliver] Handle -> DEBU 185b Waiting for new SeekInfo from 172.18.0.9:39274" -orderer0.example.com | "2019-07-20 02:40:48.265 UTC [common.deliver] Handle -> DEBU 185c Attempting to read seek info message from 172.18.0.9:39274" -orderer0.example.com | "2019-07-20 02:40:48.268 UTC [common.deliver] Handle -> WARN 185d Error reading from 172.18.0.9:39274: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:48.268 UTC [orderer.common.server] func1 -> DEBU 185e Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:48.270 UTC [comm.grpc.server] 1 -> INFO 185f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39274 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.1953ms -orderer0.example.com | "2019-07-20 02:40:48.271 UTC [grpc] infof -> DEBU 1860 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:48.393 UTC [orderer.common.server] Deliver -> DEBU 1861 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:48.394 UTC [common.deliver] Handle -> DEBU 1862 Starting new deliver loop for 172.18.0.9:39276" -orderer0.example.com | "2019-07-20 02:40:48.394 UTC [common.deliver] Handle -> DEBU 1863 Attempting to read seek info message from 172.18.0.9:39276" -orderer0.example.com | "2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1864 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1865 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1866 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.395 UTC [policies] Evaluate -> DEBU 1867 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:48.395 UTC [policies] Evaluate -> DEBU 1868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.395 UTC [cauthdsl] func1 -> DEBU 1869 0xc000c8c590 gate 1563590448395449600 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.395 UTC [cauthdsl] func2 -> DEBU 186a 0xc000c8c590 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186b 0xc000c8c590 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186c 0xc000c8c590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186d 0xc000c8c590 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.396 UTC [cauthdsl] func1 -> DEBU 186e 0xc000c8c590 gate 1563590448395449600 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 186f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 1870 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 1871 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.397 UTC [cauthdsl] func1 -> DEBU 1872 0xc000c8d110 gate 1563590448397574000 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.397 UTC [cauthdsl] func2 -> DEBU 1873 0xc000c8d110 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.397 UTC [cauthdsl] func2 -> DEBU 1874 0xc000c8d110 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:48.398 UTC [cauthdsl] func2 -> DEBU 1875 0xc000c8d110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:48.398 UTC [cauthdsl] func2 -> DEBU 1876 0xc000c8d110 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.398 UTC [cauthdsl] func1 -> DEBU 1877 0xc000c8d110 gate 1563590448397574000 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 1878 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 1879 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 187a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.399 UTC [cauthdsl] func1 -> DEBU 187b 0xc000c8dac0 gate 1563590448399099800 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187c 0xc000c8dac0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187d 0xc000c8dac0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187e 0xc000c8dac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:48.400 UTC [cauthdsl] func2 -> DEBU 187f 0xc000c8dac0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.400 UTC [cauthdsl] func1 -> DEBU 1880 0xc000c8dac0 gate 1563590448399099800 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.400 UTC [policies] Evaluate -> DEBU 1881 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.400 UTC [policies] Evaluate -> DEBU 1882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.401 UTC [policies] func1 -> DEBU 1883 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1884 Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1885 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1886 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1887 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func1 -> DEBU 13d8 0xc003c1dbf0 gate 1563590400585459000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13d9 0xc003c1dbf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13da 0xc003c1dbf0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13db 0xc003c1dbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13dc 0xc003c1dbf0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func1 -> DEBU 13dd 0xc003c1dbf0 gate 1563590400585459000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [cauthdsl] func1 -> DEBU 13e1 0xc003de6430 gate 1563590400586238400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e2 0xc003de6430 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e3 0xc003de6430 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e4 0xc003de6430 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [msp.identity] Verify -> DEBU 13e5 Verify: digest = 00000000 86 b9 c7 5f ed e5 be f6 d8 85 e9 e3 f2 09 bd b0 |..._............| -peer0.org1.example.com | 00000010 2f 34 3b 45 e9 01 f4 b7 52 25 1c f6 92 75 21 7f |/4;E....R%...u!.|" -peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [msp.identity] Verify -> DEBU 13e6 Verify: sig = 00000000 30 44 02 20 24 c6 14 9d e8 1d 73 3c 83 1a 5e 08 |0D. $.....s<..^.| -peer0.org1.example.com | 00000010 ac 7d f7 5a 94 1a c0 70 a9 5b 20 06 d9 fd ec 3d |.}.Z...p.[ ....=| -peer0.org1.example.com | 00000020 54 30 68 7e 02 20 08 90 da f4 ba 3c 8f 73 53 fa |T0h~. .....<.sS.| -peer0.org1.example.com | 00000030 0e 5b 5b b7 96 90 74 e0 b4 d4 6c 8c 7c d5 ad 4c |.[[...t...l.|..L| -peer0.org1.example.com | 00000040 4b 91 d8 df 33 f5 |K...3.|" -peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [cauthdsl] func2 -> DEBU 13e7 0xc003de6430 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [cauthdsl] func1 -> DEBU 13e8 0xc003de6430 gate 1563590400586238400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13eb Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [gossip.discovery] handleAliveMessage -> DEBU 13ed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ee Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ef updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f0 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13f4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.discovery] sendMemResponse -> DEBU 13f5 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.comm] Send -> DEBU 13f9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -orderer0.example.com | "2019-07-20 02:40:48.402 UTC [policies] Evaluate -> DEBU 1888 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.402 UTC [cauthdsl] func1 -> DEBU 1889 0xc000d6c930 gate 1563590448402309200 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.402 UTC [cauthdsl] func2 -> DEBU 188a 0xc000d6c930 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.402 UTC [cauthdsl] func2 -> DEBU 188b 0xc000d6c930 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:48.403 UTC [cauthdsl] func2 -> DEBU 188c 0xc000d6c930 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:48.403 UTC [msp.identity] Verify -> DEBU 188d Verify: digest = 00000000 76 00 11 52 56 a5 63 2f 81 dc 4f 56 12 a4 66 47 |v..RV.c/..OV..fG| -orderer0.example.com | 00000010 ea 7d 1c 1e 7e 14 7d bb 26 da f2 a4 0f d2 72 3a |.}..~.}.&.....r:|" -peer0.org1.example.com | "2019-07-20 02:40:00.589 UTC [gossip.discovery] sendMemResponse -> DEBU 13fa Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:00.589 UTC [gossip.comm] sendToEndpoint -> DEBU 13fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.589 UTC [gossip.comm] sendToEndpoint -> DEBU 13fc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.717 UTC [msp] DeserializeIdentity -> DEBU 13fd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.717 UTC [msp] DeserializeIdentity -> DEBU 13fe Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] Send -> DEBU 13ff Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1400 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1401 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1402 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1403 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1404 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1405 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.719 UTC [gossip.comm] func1 -> DEBU 1406 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.719 UTC [gossip.gossip] handleMessage -> DEBU 1407 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.719 UTC [msp] DeserializeIdentity -> DEBU 1408 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.721 UTC [msp] DeserializeIdentity -> DEBU 1409 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.721 UTC [msp] DeserializeIdentity -> DEBU 140a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 140b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:00.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 140c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 140d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 140e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 140f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1410 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 1411 0xc003e15bd0 gate 1563590400722307300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1412 0xc003e15bd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1413 0xc003e15bd0 processing identity 0 with bytes of 114b950" -orderer0.example.com | "2019-07-20 02:40:48.403 UTC [msp.identity] Verify -> DEBU 188e Verify: sig = 00000000 30 45 02 21 00 a6 94 90 ea 98 b6 48 bf f6 1b fb |0E.!.......H....| -orderer0.example.com | 00000010 62 f8 a3 5a ab 34 49 e6 89 d9 46 71 aa 9f f6 65 |b..Z.4I...Fq...e| -orderer0.example.com | 00000020 0e d1 22 4f 6c 02 20 70 f3 4b df 89 d1 e9 f1 da |.."Ol. p.K......| -orderer0.example.com | 00000030 14 5e ee 89 f9 0b ec 0e 8b 97 d6 ff 34 f2 20 a1 |.^..........4. .| -orderer0.example.com | 00000040 af 1d 9c 89 33 ec 95 |....3..|" -orderer0.example.com | "2019-07-20 02:40:48.403 UTC [cauthdsl] func2 -> DEBU 188f 0xc000d6c930 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:48.404 UTC [cauthdsl] func1 -> DEBU 1890 0xc000d6c930 gate 1563590448402309200 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1891 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1892 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1893 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1894 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1895 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:48.405 UTC [policies] Evaluate -> DEBU 1896 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:48.405 UTC [common.deliver] deliverBlocks -> DEBU 1897 [channel: businesschannel] Received seekInfo (0xc000088d40) start: > stop: > from 172.18.0.9:39276" -orderer0.example.com | "2019-07-20 02:40:48.405 UTC [fsblkstorage] Next -> DEBU 1898 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:48.406 UTC [fsblkstorage] newBlockfileStream -> DEBU 1899 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -orderer0.example.com | "2019-07-20 02:40:48.406 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189a Remaining bytes=[34883], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:48.406 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189b Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -orderer0.example.com | "2019-07-20 02:40:48.407 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189c blockbytes [34880] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:48.407 UTC [common.deliver] deliverBlocks -> DEBU 189d [channel: businesschannel] Delivering block for (0xc000088d40) for 172.18.0.9:39276" -orderer0.example.com | "2019-07-20 02:40:48.408 UTC [common.deliver] deliverBlocks -> DEBU 189e [channel: businesschannel] Done delivering to 172.18.0.9:39276 for (0xc000088d40)" -orderer0.example.com | "2019-07-20 02:40:48.409 UTC [common.deliver] Handle -> DEBU 189f Waiting for new SeekInfo from 172.18.0.9:39276" -orderer0.example.com | "2019-07-20 02:40:48.409 UTC [common.deliver] Handle -> DEBU 18a1 Attempting to read seek info message from 172.18.0.9:39276" -orderer0.example.com | "2019-07-20 02:40:48.409 UTC [fsblkstorage] waitForBlock -> DEBU 18a0 Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:48.409 UTC [fsblkstorage] waitForBlock -> DEBU 18a2 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:48.412 UTC [common.deliver] Handle -> WARN 18a3 Error reading from 172.18.0.9:39276: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:48.412 UTC [orderer.common.server] func1 -> DEBU 18a4 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:48.412 UTC [comm.grpc.server] 1 -> INFO 18a5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39276 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.1313ms -orderer0.example.com | "2019-07-20 02:40:48.413 UTC [grpc] infof -> DEBU 18a6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:48.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18a7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:48.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18a8 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" -orderer0.example.com | "2019-07-20 02:40:48.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs " -orderer0.example.com | "2019-07-20 02:40:48.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18aa Sending msg of 28 bytes to 2 on channel businesschannel took 49.1µs" -orderer0.example.com | "2019-07-20 02:40:48.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18ab Sending msg of 28 bytes to 3 on channel businesschannel took 120.6µs" -orderer0.example.com | "2019-07-20 02:40:48.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.8µs " -orderer0.example.com | "2019-07-20 02:40:48.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18ad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:48.696 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.9238ms " -orderer0.example.com | "2019-07-20 02:40:48.697 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18af Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:48.849 UTC [orderer.common.server] Deliver -> DEBU 18b0 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:48.850 UTC [common.deliver] Handle -> DEBU 18b1 Starting new deliver loop for 172.18.0.9:39278" -orderer0.example.com | "2019-07-20 02:40:48.850 UTC [common.deliver] Handle -> DEBU 18b2 Attempting to read seek info message from 172.18.0.9:39278" -orderer0.example.com | "2019-07-20 02:40:48.851 UTC [policies] Evaluate -> DEBU 18b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.853 UTC [policies] Evaluate -> DEBU 18b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.854 UTC [cauthdsl] func1 -> DEBU 18b8 0xc000ff7c50 gate 1563590448854776700 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.855 UTC [cauthdsl] func2 -> DEBU 18b9 0xc000ff7c50 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18ba 0xc000ff7c50 processing identity 0 with bytes of fd0280" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1414 0xc003e15bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1415 0xc003e15bd0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 1416 0xc003e15bd0 gate 1563590400722307300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1417 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1418 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1419 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 141a 0xc003e32550 gate 1563590400722785400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141b 0xc003e32550 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141c 0xc003e32550 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.723 UTC [gossip.comm] func1 -> DEBU 141d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141e 0xc003e32550 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.724 UTC [msp.identity] Verify -> DEBU 141f Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:00.724 UTC [msp.identity] Verify -> DEBU 1420 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:00.724 UTC [cauthdsl] func2 -> DEBU 1421 0xc003e32550 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.724 UTC [cauthdsl] func1 -> DEBU 1422 0xc003e32550 gate 1563590400722785400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1423 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1424 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1425 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1426 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1427 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1428 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1429 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:00.727 UTC [msp.identity] Verify -> DEBU 142a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:00.730 UTC [msp] DeserializeIdentity -> DEBU 142b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.730 UTC [msp] DeserializeIdentity -> DEBU 142c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 142d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 142e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 142f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 1430 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18bb 0xc000ff7c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18bc 0xc000ff7c50 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.857 UTC [cauthdsl] func1 -> DEBU 18bd 0xc000ff7c50 gate 1563590448854776700 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.857 UTC [policies] Evaluate -> DEBU 18be Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.857 UTC [policies] Evaluate -> DEBU 18bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.858 UTC [policies] Evaluate -> DEBU 18c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.859 UTC [cauthdsl] func1 -> DEBU 18c1 0xc000bade70 gate 1563590448859499700 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.860 UTC [cauthdsl] func2 -> DEBU 18c2 0xc000bade70 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.860 UTC [cauthdsl] func2 -> DEBU 18c3 0xc000bade70 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:48.861 UTC [cauthdsl] func2 -> DEBU 18c4 0xc000bade70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:48.861 UTC [cauthdsl] func2 -> DEBU 18c5 0xc000bade70 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.862 UTC [cauthdsl] func1 -> DEBU 18c6 0xc000bade70 gate 1563590448859499700 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.862 UTC [policies] Evaluate -> DEBU 18c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.863 UTC [policies] Evaluate -> DEBU 18c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.863 UTC [policies] Evaluate -> DEBU 18c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.865 UTC [cauthdsl] func1 -> DEBU 18ca 0xc000d5a6b0 gate 1563590448865720200 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cb 0xc000d5a6b0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cc 0xc000d5a6b0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cd 0xc000d5a6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18ce 0xc000d5a6b0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.866 UTC [cauthdsl] func1 -> DEBU 18cf 0xc000d5a6b0 gate 1563590448865720200 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] func1 -> DEBU 18d2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d3 Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.868 UTC [policies] Evaluate -> DEBU 18d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:48.868 UTC [policies] Evaluate -> DEBU 18d7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:48.868 UTC [cauthdsl] func1 -> DEBU 18d8 0xc000d5b3a0 gate 1563590448868389000 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18d9 0xc000d5b3a0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18da 0xc000d5b3a0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18db 0xc000d5b3a0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:48.869 UTC [msp.identity] Verify -> DEBU 18dc Verify: digest = 00000000 31 82 70 e0 18 f6 42 43 a0 36 d9 5f 32 fe a1 e1 |1.p...BC.6._2...| -orderer0.example.com | 00000010 8f 05 2b 76 1f 99 e9 8d bb 4f 82 89 3c 22 84 38 |..+v.....O..<".8|" -orderer0.example.com | "2019-07-20 02:40:48.869 UTC [msp.identity] Verify -> DEBU 18dd Verify: sig = 00000000 30 44 02 20 5a de 23 c3 fd 33 e3 f3 88 a6 22 89 |0D. Z.#..3....".| -orderer0.example.com | 00000010 4c 2d 66 90 83 7c 65 39 6e 2f 1c 5c 2d 7e 10 33 |L-f..|e9n/.\-~.3| -orderer0.example.com | 00000020 03 44 ec 08 02 20 4b 25 df 2d 2f e6 ab 69 fa 40 |.D... K%.-/..i.@| -orderer0.example.com | 00000030 39 3a 24 68 c5 fc a1 c3 de e8 96 24 ae 93 5d 1b |9:$h.......$..].| -orderer0.example.com | 00000040 17 ba b3 71 53 8a |...qS.|" -orderer0.example.com | "2019-07-20 02:40:48.870 UTC [cauthdsl] func2 -> DEBU 18de 0xc000d5b3a0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:48.870 UTC [cauthdsl] func1 -> DEBU 18df 0xc000d5b3a0 gate 1563590448868389000 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e2 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e4 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:48.871 UTC [common.deliver] deliverBlocks -> DEBU 18e6 [channel: businesschannel] Received seekInfo (0xc000089740) start: > stop: > from 172.18.0.9:39278" -orderer0.example.com | "2019-07-20 02:40:48.871 UTC [fsblkstorage] Next -> DEBU 18e7 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:48.871 UTC [fsblkstorage] newBlockfileStream -> DEBU 18e8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -orderer0.example.com | "2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18e9 Remaining bytes=[34883], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ea Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -orderer0.example.com | "2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18eb blockbytes [34880] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:48.873 UTC [common.deliver] deliverBlocks -> DEBU 18ec [channel: businesschannel] Delivering block for (0xc000089740) for 172.18.0.9:39278" -orderer0.example.com | "2019-07-20 02:40:48.873 UTC [common.deliver] deliverBlocks -> DEBU 18ed [channel: businesschannel] Done delivering to 172.18.0.9:39278 for (0xc000089740)" -peer0.org1.example.com | "2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 1431 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:00.731 UTC [msp] DeserializeIdentity -> DEBU 1432 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1433 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [gossip.pull] Hello -> DEBU 1434 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1435 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1436 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [gossip.comm] Send -> DEBU 1437 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [gossip.comm] sendToEndpoint -> DEBU 1438 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [gossip.comm] sendToEndpoint -> DEBU 1439 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.738 UTC [gossip.comm] func1 -> DEBU 143a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 143b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.738 UTC [cauthdsl] func1 -> DEBU 143c 0xc003e86d10 gate 1563590400738727800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.739 UTC [gossip.comm] func1 -> DEBU 143d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.739 UTC [cauthdsl] func2 -> DEBU 143e 0xc003e86d10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.739 UTC [cauthdsl] func2 -> DEBU 143f 0xc003e86d10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [cauthdsl] func2 -> DEBU 1440 0xc003e86d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [cauthdsl] func2 -> DEBU 1441 0xc003e86d10 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [cauthdsl] func1 -> DEBU 1442 0xc003e86d10 gate 1563590400738727800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1443 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1444 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1445 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.742 UTC [cauthdsl] func1 -> DEBU 1446 0xc003e87550 gate 1563590400741095900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1447 0xc003e87550 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1448 0xc003e87550 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1449 0xc003e87550 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.743 UTC [msp.identity] Verify -> DEBU 144a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:00.743 UTC [msp.identity] Verify -> DEBU 144b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:00.743 UTC [cauthdsl] func2 -> DEBU 144c 0xc003e87550 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.744 UTC [cauthdsl] func1 -> DEBU 144d 0xc003e87550 gate 1563590400741095900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 144e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 144f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 1450 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.745 UTC [policies] Evaluate -> DEBU 1451 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.747 UTC [gossip.gossip] handleMessage -> DEBU 1452 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.748 UTC [gossip.gossip] handleMessage -> DEBU 1453 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.749 UTC [msp.identity] Verify -> DEBU 1454 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:00.749 UTC [msp.identity] Verify -> DEBU 1455 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:00.750 UTC [msp.identity] Verify -> DEBU 1456 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:00.750 UTC [msp.identity] Verify -> DEBU 1457 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:00.751 UTC [msp] DeserializeIdentity -> DEBU 1458 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.752 UTC [msp] DeserializeIdentity -> DEBU 1459 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:48.874 UTC [fsblkstorage] waitForBlock -> DEBU 18ee Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:48.874 UTC [fsblkstorage] waitForBlock -> DEBU 18ef Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:48.874 UTC [common.deliver] Handle -> DEBU 18f0 Waiting for new SeekInfo from 172.18.0.9:39278" -orderer0.example.com | "2019-07-20 02:40:48.875 UTC [common.deliver] Handle -> DEBU 18f1 Attempting to read seek info message from 172.18.0.9:39278" -orderer0.example.com | "2019-07-20 02:40:48.880 UTC [grpc] infof -> DEBU 18f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:48.880 UTC [common.deliver] Handle -> WARN 18f2 Error reading from 172.18.0.9:39278: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:48.880 UTC [orderer.common.server] func1 -> DEBU 18f4 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:48.881 UTC [comm.grpc.server] 1 -> INFO 18f5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39278 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.5449ms -orderer0.example.com | "2019-07-20 02:40:48.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18f6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:48.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18f7 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" -orderer0.example.com | "2019-07-20 02:40:48.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 247.6µs " -orderer0.example.com | "2019-07-20 02:40:49.046 UTC [orderer.common.server] Deliver -> DEBU 18f9 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:49.046 UTC [common.deliver] Handle -> DEBU 18fa Starting new deliver loop for 172.18.0.9:39280" -orderer0.example.com | "2019-07-20 02:40:49.046 UTC [common.deliver] Handle -> DEBU 18fb Attempting to read seek info message from 172.18.0.9:39280" -orderer0.example.com | "2019-07-20 02:40:49.047 UTC [policies] Evaluate -> DEBU 18fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.047 UTC [policies] Evaluate -> DEBU 18fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 18ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 1900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.049 UTC [cauthdsl] func1 -> DEBU 1901 0xc001099070 gate 1563590449049272500 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1902 0xc001099070 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1903 0xc001099070 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1904 0xc001099070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.050 UTC [cauthdsl] func2 -> DEBU 1905 0xc001099070 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.050 UTC [cauthdsl] func1 -> DEBU 1906 0xc001099070 gate 1563590449049272500 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.050 UTC [policies] Evaluate -> DEBU 1907 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.050 UTC [policies] Evaluate -> DEBU 1908 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.051 UTC [policies] Evaluate -> DEBU 1909 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.051 UTC [cauthdsl] func1 -> DEBU 190a 0xc0010998b0 gate 1563590449051280300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.051 UTC [cauthdsl] func2 -> DEBU 190b 0xc0010998b0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.051 UTC [cauthdsl] func2 -> DEBU 190c 0xc0010998b0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.052 UTC [cauthdsl] func2 -> DEBU 190d 0xc0010998b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.052 UTC [cauthdsl] func2 -> DEBU 190e 0xc0010998b0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.052 UTC [cauthdsl] func1 -> DEBU 190f 0xc0010998b0 gate 1563590449051280300 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1910 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1911 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1912 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.053 UTC [cauthdsl] func1 -> DEBU 1913 0xc0011aa0f0 gate 1563590449053843400 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1914 0xc0011aa0f0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1915 0xc0011aa0f0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1916 0xc0011aa0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1917 0xc0011aa0f0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.054 UTC [cauthdsl] func1 -> DEBU 1918 0xc0011aa0f0 gate 1563590449053843400 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 1919 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 191a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.055 UTC [policies] func1 -> DEBU 191b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 191c Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 1920 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.056 UTC [cauthdsl] func1 -> DEBU 1921 0xc0011aade0 gate 1563590449056710900 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.056 UTC [cauthdsl] func2 -> DEBU 1922 0xc0011aade0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.057 UTC [cauthdsl] func2 -> DEBU 1923 0xc0011aade0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.057 UTC [cauthdsl] func2 -> DEBU 1924 0xc0011aade0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:49.057 UTC [msp.identity] Verify -> DEBU 1925 Verify: digest = 00000000 34 6b 9e 1b 7c a1 91 de 2d 1d 2e 67 e6 3a 92 40 |4k..|...-..g.:.@| -orderer0.example.com | 00000010 1e 77 64 63 ea 52 9c 49 ca b2 0f 72 3d dd 69 26 |.wdc.R.I...r=.i&|" -orderer0.example.com | "2019-07-20 02:40:49.057 UTC [msp.identity] Verify -> DEBU 1926 Verify: sig = 00000000 30 44 02 20 71 79 30 fe a8 5b c8 de 4f 05 26 ea |0D. qy0..[..O.&.| -orderer0.example.com | 00000010 d9 78 59 85 f4 7f 27 73 97 ce 18 75 52 a0 36 4e |.xY...'s...uR.6N| -orderer0.example.com | 00000020 2b 4b e7 d7 02 20 09 24 f6 8c 1c 63 9e b4 d3 58 |+K... .$...c...X| -orderer0.example.com | 00000030 f2 f5 92 09 91 ac 7b 02 5e c8 6c 0b 8b 26 bf e0 |......{.^.l..&..| -orderer0.example.com | 00000040 6b 1f 55 fd 57 95 |k.U.W.|" -orderer0.example.com | "2019-07-20 02:40:49.058 UTC [cauthdsl] func2 -> DEBU 1927 0xc0011aade0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:49.059 UTC [cauthdsl] func1 -> DEBU 1928 0xc0011aade0 gate 1563590449056710900 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:49.059 UTC [policies] Evaluate -> DEBU 1929 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192b Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.061 UTC [policies] Evaluate -> DEBU 192d Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.061 UTC [policies] Evaluate -> DEBU 192e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.062 UTC [common.deliver] deliverBlocks -> DEBU 192f [channel: businesschannel] Received seekInfo (0xc000089d40) start: > stop: > from 172.18.0.9:39280" -orderer0.example.com | "2019-07-20 02:40:49.062 UTC [fsblkstorage] Next -> DEBU 1930 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:49.062 UTC [fsblkstorage] newBlockfileStream -> DEBU 1931 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -orderer0.example.com | "2019-07-20 02:40:49.063 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1932 Remaining bytes=[34883], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:49.063 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1933 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -orderer0.example.com | "2019-07-20 02:40:49.064 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1934 blockbytes [34880] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:49.064 UTC [common.deliver] deliverBlocks -> DEBU 1935 [channel: businesschannel] Delivering block for (0xc000089d40) for 172.18.0.9:39280" -orderer0.example.com | "2019-07-20 02:40:49.064 UTC [common.deliver] deliverBlocks -> DEBU 1936 [channel: businesschannel] Done delivering to 172.18.0.9:39280 for (0xc000089d40)" -orderer0.example.com | "2019-07-20 02:40:49.065 UTC [fsblkstorage] waitForBlock -> DEBU 1937 Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:49.066 UTC [fsblkstorage] waitForBlock -> DEBU 1938 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:49.066 UTC [common.deliver] Handle -> DEBU 1939 Waiting for new SeekInfo from 172.18.0.9:39280" -orderer0.example.com | "2019-07-20 02:40:49.066 UTC [common.deliver] Handle -> DEBU 193a Attempting to read seek info message from 172.18.0.9:39280" -orderer0.example.com | "2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.068 UTC [cauthdsl] func1 -> DEBU 1940 0xc0008bc0a0 gate 1563590449068929800 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1941 0xc0008bc0a0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1942 0xc0008bc0a0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1943 0xc0008bc0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1944 0xc0008bc0a0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.069 UTC [cauthdsl] func1 -> DEBU 1945 0xc0008bc0a0 gate 1563590449068929800 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.069 UTC [policies] Evaluate -> DEBU 1946 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.069 UTC [policies] Evaluate -> DEBU 1947 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.070 UTC [policies] Evaluate -> DEBU 1948 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func1 -> DEBU 1949 0xc0008bc8e0 gate 1563590449070160000 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194a 0xc0008bc8e0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194b 0xc0008bc8e0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194c 0xc0008bc8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194d 0xc0008bc8e0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func1 -> DEBU 194e 0xc0008bc8e0 gate 1563590449070160000 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 194f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 1950 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 1951 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.071 UTC [cauthdsl] func1 -> DEBU 1952 0xc0008bd120 gate 1563590449071603400 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.071 UTC [cauthdsl] func2 -> DEBU 1953 0xc0008bd120 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.071 UTC [cauthdsl] func2 -> DEBU 1954 0xc0008bd120 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.072 UTC [cauthdsl] func2 -> DEBU 1955 0xc0008bd120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.072 UTC [cauthdsl] func2 -> DEBU 1956 0xc0008bd120 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.072 UTC [cauthdsl] func1 -> DEBU 1957 0xc0008bd120 gate 1563590449071603400 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.072 UTC [policies] Evaluate -> DEBU 1958 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.072 UTC [policies] Evaluate -> DEBU 1959 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.072 UTC [policies] func1 -> DEBU 195a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195b Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.073 UTC [cauthdsl] func1 -> DEBU 1960 0xc0008bde10 gate 1563590449073713400 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.073 UTC [cauthdsl] func2 -> DEBU 1961 0xc0008bde10 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.073 UTC [cauthdsl] func2 -> DEBU 1962 0xc0008bde10 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.074 UTC [cauthdsl] func2 -> DEBU 1963 0xc0008bde10 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:49.074 UTC [msp.identity] Verify -> DEBU 1964 Verify: digest = 00000000 69 c2 20 14 9e bd df 67 ef c6 0e ec 06 ff 4a ea |i. ....g......J.| -orderer0.example.com | 00000010 99 ae 80 c3 73 cd c6 11 95 7f 41 4e 44 c3 49 db |....s.....AND.I.|" -orderer0.example.com | "2019-07-20 02:40:49.074 UTC [msp.identity] Verify -> DEBU 1965 Verify: sig = 00000000 30 44 02 20 70 28 b0 88 ca 7f d9 92 c5 ee 60 3c |0D. p(........`<| -orderer0.example.com | 00000010 7c 7d 73 65 fb ef 23 75 b2 51 72 d0 e3 1e 88 ea ||}se..#u.Qr.....| -orderer0.example.com | 00000020 34 b3 d2 4d 02 20 4c 7f ca d9 a7 9d 44 62 e4 50 |4..M. L.....Db.P| -orderer0.example.com | 00000030 3a 91 d3 6a d7 a1 e4 30 f5 8e 62 b4 ec e2 dc 85 |:..j...0..b.....| -orderer0.example.com | 00000040 e9 56 04 a2 52 d7 |.V..R.|" -orderer0.example.com | "2019-07-20 02:40:49.075 UTC [cauthdsl] func2 -> DEBU 1966 0xc0008bde10 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:49.075 UTC [cauthdsl] func1 -> DEBU 1967 0xc0008bde10 gate 1563590449073713400 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:49.075 UTC [policies] Evaluate -> DEBU 1968 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 1969 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196a Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196c Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.076 UTC [common.deliver] deliverBlocks -> DEBU 196e [channel: businesschannel] Received seekInfo (0xc000089f80) start: > stop: > from 172.18.0.9:39280" -orderer0.example.com | "2019-07-20 02:40:49.076 UTC [fsblkstorage] Next -> DEBU 196f Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:49.076 UTC [fsblkstorage] newBlockfileStream -> DEBU 1970 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -orderer0.example.com | "2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1971 Remaining bytes=[34883], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1972 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -orderer0.example.com | "2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1973 blockbytes [34880] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:49.077 UTC [common.deliver] deliverBlocks -> DEBU 1974 [channel: businesschannel] Delivering block for (0xc000089f80) for 172.18.0.9:39280" -orderer0.example.com | "2019-07-20 02:40:49.078 UTC [common.deliver] deliverBlocks -> DEBU 1975 [channel: businesschannel] Done delivering to 172.18.0.9:39280 for (0xc000089f80)" -orderer0.example.com | "2019-07-20 02:40:49.078 UTC [fsblkstorage] waitForBlock -> DEBU 1976 Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:49.078 UTC [common.deliver] Handle -> DEBU 1977 Waiting for new SeekInfo from 172.18.0.9:39280" -orderer0.example.com | "2019-07-20 02:40:49.079 UTC [common.deliver] Handle -> DEBU 1979 Attempting to read seek info message from 172.18.0.9:39280" -orderer0.example.com | "2019-07-20 02:40:49.078 UTC [fsblkstorage] waitForBlock -> DEBU 1978 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:49.085 UTC [common.deliver] Handle -> WARN 197a Error reading from 172.18.0.9:39280: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:49.086 UTC [orderer.common.server] func1 -> DEBU 197b Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:49.086 UTC [comm.grpc.server] 1 -> INFO 197c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39280 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.909ms -orderer0.example.com | "2019-07-20 02:40:49.086 UTC [grpc] infof -> DEBU 197d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:49.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 197e Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" -orderer0.example.com | "2019-07-20 02:40:49.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 197f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116µs " -orderer0.example.com | "2019-07-20 02:40:49.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1980 Sending msg of 28 bytes to 3 on channel businesschannel took 9.2µs" -orderer0.example.com | "2019-07-20 02:40:49.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1981 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.6µs " -orderer0.example.com | "2019-07-20 02:40:49.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1982 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:49.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1983 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:49.227 UTC [orderer.common.server] Deliver -> DEBU 1984 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:49.227 UTC [common.deliver] Handle -> DEBU 1985 Starting new deliver loop for 172.18.0.9:39282" -orderer0.example.com | "2019-07-20 02:40:49.227 UTC [common.deliver] Handle -> DEBU 1986 Attempting to read seek info message from 172.18.0.9:39282" -orderer0.example.com | "2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1987 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1988 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1989 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 198a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.229 UTC [policies] Evaluate -> DEBU 198b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.229 UTC [cauthdsl] func1 -> DEBU 198c 0xc000b1a660 gate 1563590449229303900 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198d 0xc000b1a660 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198e 0xc000b1a660 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198f 0xc000b1a660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.230 UTC [cauthdsl] func2 -> DEBU 1990 0xc000b1a660 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.230 UTC [cauthdsl] func1 -> DEBU 1991 0xc000b1a660 gate 1563590449229303900 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1992 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1993 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1994 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.231 UTC [cauthdsl] func1 -> DEBU 1995 0xc000b1aea0 gate 1563590449231168100 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1996 0xc000b1aea0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1997 0xc000b1aea0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1998 0xc000b1aea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1999 0xc000b1aea0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.232 UTC [cauthdsl] func1 -> DEBU 199a 0xc000b1aea0 gate 1563590449231168100 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.232 UTC [cauthdsl] func1 -> DEBU 199e 0xc000b1b6e0 gate 1563590449232824500 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.232 UTC [cauthdsl] func2 -> DEBU 199f 0xc000b1b6e0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a0 0xc000b1b6e0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a1 0xc000b1b6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a2 0xc000b1b6e0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.233 UTC [cauthdsl] func1 -> DEBU 19a3 0xc000b1b6e0 gate 1563590449232824500 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.233 UTC [policies] Evaluate -> DEBU 19a4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.234 UTC [policies] func1 -> DEBU 19a6 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a7 Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.235 UTC [policies] Evaluate -> DEBU 19aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.235 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.754 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 145a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:00.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 145b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 145c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.756 UTC [policies] Evaluate -> DEBU 145d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.756 UTC [policies] Evaluate -> DEBU 145e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:00.757 UTC [policies] Evaluate -> DEBU 145f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.757 UTC [cauthdsl] func1 -> DEBU 1460 0xc003f4be10 gate 1563590400757245300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1461 0xc003f4be10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1462 0xc003f4be10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1463 0xc003f4be10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:00.758 UTC [cauthdsl] func2 -> DEBU 1464 0xc003f4be10 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.758 UTC [cauthdsl] func1 -> DEBU 1465 0xc003f4be10 gate 1563590400757245300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.758 UTC [policies] Evaluate -> DEBU 1466 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.758 UTC [policies] Evaluate -> DEBU 1467 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.759 UTC [policies] Evaluate -> DEBU 1468 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.759 UTC [cauthdsl] func1 -> DEBU 1469 0xc003f7c6b0 gate 1563590400759673900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.759 UTC [cauthdsl] func2 -> DEBU 146a 0xc003f7c6b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.760 UTC [cauthdsl] func2 -> DEBU 146b 0xc003f7c6b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.760 UTC [cauthdsl] func2 -> DEBU 146c 0xc003f7c6b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.760 UTC [msp.identity] Verify -> DEBU 146d Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:00.760 UTC [msp.identity] Verify -> DEBU 146e Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:00.761 UTC [cauthdsl] func2 -> DEBU 146f 0xc003f7c6b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.761 UTC [cauthdsl] func1 -> DEBU 1470 0xc003f7c6b0 gate 1563590400759673900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:00.761 UTC [policies] Evaluate -> DEBU 1471 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.761 UTC [policies] Evaluate -> DEBU 1472 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.762 UTC [policies] Evaluate -> DEBU 1473 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.762 UTC [policies] Evaluate -> DEBU 1474 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.762 UTC [msp] DeserializeIdentity -> DEBU 1475 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.762 UTC [msp] DeserializeIdentity -> DEBU 1476 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:49.235 UTC [cauthdsl] func1 -> DEBU 19ac 0xc000bf03d0 gate 1563590449235502300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000bf03d0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19ae 0xc000bf03d0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19af 0xc000bf03d0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:49.236 UTC [msp.identity] Verify -> DEBU 19b0 Verify: digest = 00000000 82 c0 89 76 a5 fb 20 65 67 01 37 2f b9 6b 34 26 |...v.. eg.7/.k4&| -orderer0.example.com | 00000010 cf 0d 30 1c ea 6c d5 67 19 7b 6e b3 f4 a3 a6 fd |..0..l.g.{n.....|" -orderer0.example.com | "2019-07-20 02:40:49.236 UTC [msp.identity] Verify -> DEBU 19b1 Verify: sig = 00000000 30 45 02 21 00 87 0b bd 80 5a 66 e5 87 b0 b5 de |0E.!.....Zf.....| -orderer0.example.com | 00000010 95 3a 3c c0 19 6e f9 1e d9 00 9c df ca ab 34 75 |.:<..n........4u| -orderer0.example.com | 00000020 95 51 8d 93 6a 02 20 44 80 f3 85 2b ba 00 e1 8a |.Q..j. D...+....| -orderer0.example.com | 00000030 59 83 1d 31 c4 76 e2 8a 78 f7 32 2e b5 91 83 5e |Y..1.v..x.2....^| -orderer0.example.com | 00000040 1a 63 0b 11 6b ca 49 |.c..k.I|" -orderer0.example.com | "2019-07-20 02:40:49.237 UTC [cauthdsl] func2 -> DEBU 19b2 0xc000bf03d0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:49.237 UTC [cauthdsl] func1 -> DEBU 19b3 0xc000bf03d0 gate 1563590449235502300 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:49.237 UTC [policies] Evaluate -> DEBU 19b4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.237 UTC [policies] Evaluate -> DEBU 19b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b6 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b8 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.238 UTC [common.deliver] deliverBlocks -> DEBU 19ba [channel: businesschannel] Received seekInfo (0xc000ce2840) start: > stop: > from 172.18.0.9:39282" -orderer0.example.com | "2019-07-20 02:40:49.238 UTC [fsblkstorage] Next -> DEBU 19bb Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:49.239 UTC [fsblkstorage] newBlockfileStream -> DEBU 19bc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bd Remaining bytes=[118787], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19be Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bf blockbytes [23944] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:49.239 UTC [common.deliver] deliverBlocks -> DEBU 19c0 [channel: businesschannel] Delivering block for (0xc000ce2840) for 172.18.0.9:39282" -orderer0.example.com | "2019-07-20 02:40:49.240 UTC [common.deliver] deliverBlocks -> DEBU 19c1 [channel: businesschannel] Done delivering to 172.18.0.9:39282 for (0xc000ce2840)" -orderer0.example.com | "2019-07-20 02:40:49.240 UTC [fsblkstorage] waitForBlock -> DEBU 19c2 Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:49.240 UTC [fsblkstorage] waitForBlock -> DEBU 19c3 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:49.241 UTC [common.deliver] Handle -> DEBU 19c4 Waiting for new SeekInfo from 172.18.0.9:39282" -orderer0.example.com | "2019-07-20 02:40:49.241 UTC [common.deliver] Handle -> DEBU 19c5 Attempting to read seek info message from 172.18.0.9:39282" -orderer0.example.com | "2019-07-20 02:40:49.247 UTC [common.deliver] Handle -> WARN 19c6 Error reading from 172.18.0.9:39282: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:49.247 UTC [orderer.common.server] func1 -> DEBU 19c7 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:49.247 UTC [comm.grpc.server] 1 -> INFO 19c8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39282 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.3933ms -orderer0.example.com | "2019-07-20 02:40:49.247 UTC [grpc] infof -> DEBU 19c9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:49.395 UTC [orderer.common.server] Deliver -> DEBU 19ca Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:49.396 UTC [common.deliver] Handle -> DEBU 19cb Starting new deliver loop for 172.18.0.9:39284" -orderer0.example.com | "2019-07-20 02:40:49.396 UTC [common.deliver] Handle -> DEBU 19cc Attempting to read seek info message from 172.18.0.9:39284" -orderer0.example.com | "2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.398 UTC [cauthdsl] func1 -> DEBU 19d2 0xc001108980 gate 1563590449398077800 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d3 0xc001108980 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d4 0xc001108980 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d5 0xc001108980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.399 UTC [cauthdsl] func2 -> DEBU 19d6 0xc001108980 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.399 UTC [cauthdsl] func1 -> DEBU 19d7 0xc001108980 gate 1563590449398077800 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19d8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.399 UTC [cauthdsl] func1 -> DEBU 19db 0xc0011091c0 gate 1563590449399961700 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19dc 0xc0011091c0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19dd 0xc0011091c0 processing identity 0 with bytes of fd0280" -peer0.org1.example.com | "2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1477 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1478 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1479 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.763 UTC [policies] Evaluate -> DEBU 147a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.764 UTC [policies] Evaluate -> DEBU 147b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:00.764 UTC [policies] Evaluate -> DEBU 147c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.764 UTC [cauthdsl] func1 -> DEBU 147d 0xc003f7de80 gate 1563590400764851600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 147e 0xc003f7de80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 147f 0xc003f7de80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 1480 0xc003f7de80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 1481 0xc003f7de80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.765 UTC [cauthdsl] func1 -> DEBU 1482 0xc003f7de80 gate 1563590400764851600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1483 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1484 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1485 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.766 UTC [cauthdsl] func1 -> DEBU 1486 0xc003fc46c0 gate 1563590400766587500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.766 UTC [cauthdsl] func2 -> DEBU 1487 0xc003fc46c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.767 UTC [cauthdsl] func2 -> DEBU 1488 0xc003fc46c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.767 UTC [cauthdsl] func2 -> DEBU 1489 0xc003fc46c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.767 UTC [msp.identity] Verify -> DEBU 148a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:00.767 UTC [msp.identity] Verify -> DEBU 148b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:00.768 UTC [cauthdsl] func2 -> DEBU 148c 0xc003fc46c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.768 UTC [cauthdsl] func1 -> DEBU 148d 0xc003fc46c0 gate 1563590400766587500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 148e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 148f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 1490 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.769 UTC [policies] Evaluate -> DEBU 1491 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.769 UTC [gossip.gossip] handleMessage -> DEBU 1492 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.769 UTC [gossip.gossip] handleMessage -> DEBU 1493 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.770 UTC [gossip.pull] HandleMessage -> DEBU 1494 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.770 UTC [gossip.gossip] handleMessage -> DEBU 1495 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.770 UTC [gossip.gossip] handleMessage -> DEBU 1496 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.770 UTC [msp] DeserializeIdentity -> DEBU 1497 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.771 UTC [msp] DeserializeIdentity -> DEBU 1498 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.771 UTC [msp] DeserializeIdentity -> DEBU 1499 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 149a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 149b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 149c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [cauthdsl] func1 -> DEBU 14a0 0xc003fe90c0 gate 1563590400772916400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a1 0xc003fe90c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a2 0xc003fe90c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a3 0xc003fe90c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a4 0xc003fe90c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.773 UTC [cauthdsl] func1 -> DEBU 14a5 0xc003fe90c0 gate 1563590400772916400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.774 UTC [cauthdsl] func1 -> DEBU 14a9 0xc003fe9900 gate 1563590400774755500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14aa 0xc003fe9900 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14ab 0xc003fe9900 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14ac 0xc003fe9900 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.775 UTC [msp.identity] Verify -> DEBU 14ad Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:00.775 UTC [msp.identity] Verify -> DEBU 14ae Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:00.776 UTC [cauthdsl] func2 -> DEBU 14af 0xc003fe9900 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.776 UTC [cauthdsl] func1 -> DEBU 14b0 0xc003fe9900 gate 1563590400774755500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:00.776 UTC [policies] Evaluate -> DEBU 14b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.777 UTC [msp.identity] Verify -> DEBU 14b5 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:00.778 UTC [msp.identity] Verify -> DEBU 14b6 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -orderer0.example.com | "2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19de 0xc0011091c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19df 0xc0011091c0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.401 UTC [cauthdsl] func1 -> DEBU 19e0 0xc0011091c0 gate 1563590449399961700 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.402 UTC [cauthdsl] func1 -> DEBU 19e4 0xc001109a00 gate 1563590449401966900 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.402 UTC [cauthdsl] func2 -> DEBU 19e5 0xc001109a00 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.402 UTC [cauthdsl] func2 -> DEBU 19e6 0xc001109a00 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.403 UTC [cauthdsl] func2 -> DEBU 19e7 0xc001109a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.403 UTC [cauthdsl] func2 -> DEBU 19e8 0xc001109a00 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.403 UTC [cauthdsl] func1 -> DEBU 19e9 0xc001109a00 gate 1563590449401966900 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.403 UTC [policies] Evaluate -> DEBU 19ea Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.404 UTC [policies] func1 -> DEBU 19ec Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ed Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.405 UTC [policies] Evaluate -> DEBU 19f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.405 UTC [policies] Evaluate -> DEBU 19f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.405 UTC [cauthdsl] func1 -> DEBU 19f2 0xc000de86f0 gate 1563590449405439300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.405 UTC [cauthdsl] func2 -> DEBU 19f3 0xc000de86f0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.405 UTC [cauthdsl] func2 -> DEBU 19f4 0xc000de86f0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.406 UTC [cauthdsl] func2 -> DEBU 19f5 0xc000de86f0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:49.406 UTC [msp.identity] Verify -> DEBU 19f6 Verify: digest = 00000000 8d ef c8 38 dd 25 ee e3 8f e1 10 8f 37 05 1b 07 |...8.%......7...| -orderer0.example.com | 00000010 3a 8c f0 8f a3 05 c2 78 05 48 e8 c1 65 36 9c 6a |:......x.H..e6.j|" -orderer0.example.com | "2019-07-20 02:40:49.406 UTC [msp.identity] Verify -> DEBU 19f7 Verify: sig = 00000000 30 45 02 21 00 e1 d5 0c 44 50 2f 63 e1 b1 b8 2c |0E.!....DP/c...,| -orderer0.example.com | 00000010 03 a3 c2 a9 8f 29 b6 9d 8c 70 5f 06 42 0c ce 40 |.....)...p_.B..@| -orderer0.example.com | 00000020 66 94 91 e5 43 02 20 20 7f d5 e0 d1 c9 db f2 ef |f...C. ........| -orderer0.example.com | 00000030 28 3e ef a7 08 4a 58 9d cb 54 da bc 4f a7 5e bd |(>...JX..T..O.^.| -orderer0.example.com | 00000040 02 79 a1 1c e7 ca 73 |.y....s|" -orderer0.example.com | "2019-07-20 02:40:49.407 UTC [cauthdsl] func2 -> DEBU 19f8 0xc000de86f0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:49.407 UTC [cauthdsl] func1 -> DEBU 19f9 0xc000de86f0 gate 1563590449405439300 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fc Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fe Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.407 UTC [common.deliver] deliverBlocks -> DEBU 1a00 [channel: businesschannel] Received seekInfo (0xc000ce2f80) start: > stop: > from 172.18.0.9:39284" -orderer0.example.com | "2019-07-20 02:40:49.408 UTC [fsblkstorage] Next -> DEBU 1a01 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:49.408 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a02 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" -orderer0.example.com | "2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a03 Remaining bytes=[94840], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a04 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" -orderer0.example.com | "2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a05 blockbytes [23690] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:49.409 UTC [common.deliver] deliverBlocks -> DEBU 1a06 [channel: businesschannel] Delivering block for (0xc000ce2f80) for 172.18.0.9:39284" -orderer0.example.com | "2019-07-20 02:40:49.409 UTC [common.deliver] deliverBlocks -> DEBU 1a07 [channel: businesschannel] Done delivering to 172.18.0.9:39284 for (0xc000ce2f80)" -orderer0.example.com | "2019-07-20 02:40:49.409 UTC [fsblkstorage] waitForBlock -> DEBU 1a08 Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:49.409 UTC [fsblkstorage] waitForBlock -> DEBU 1a09 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:49.409 UTC [common.deliver] Handle -> DEBU 1a0a Waiting for new SeekInfo from 172.18.0.9:39284" -orderer0.example.com | "2019-07-20 02:40:49.410 UTC [common.deliver] Handle -> DEBU 1a0b Attempting to read seek info message from 172.18.0.9:39284" -orderer0.example.com | "2019-07-20 02:40:49.419 UTC [common.deliver] Handle -> WARN 1a0c Error reading from 172.18.0.9:39284: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:49.419 UTC [orderer.common.server] func1 -> DEBU 1a0e Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:49.419 UTC [grpc] infof -> DEBU 1a0d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:00.778 UTC [msp] DeserializeIdentity -> DEBU 14b7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.778 UTC [msp] DeserializeIdentity -> DEBU 14b8 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:49.419 UTC [comm.grpc.server] 1 -> INFO 1a0f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39284 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.9813ms -orderer0.example.com | "2019-07-20 02:40:49.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a10 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:49.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a11 Sending msg of 28 bytes to 3 on channel testchainid took 82.9µs" -orderer0.example.com | "2019-07-20 02:40:49.440 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a12 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 406.5µs " -orderer0.example.com | "2019-07-20 02:40:49.651 UTC [orderer.common.server] Deliver -> DEBU 1a13 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:49.651 UTC [common.deliver] Handle -> DEBU 1a14 Starting new deliver loop for 172.18.0.9:39286" -orderer0.example.com | "2019-07-20 02:40:49.651 UTC [common.deliver] Handle -> DEBU 1a15 Attempting to read seek info message from 172.18.0.9:39286" -orderer0.example.com | "2019-07-20 02:40:49.652 UTC [policies] Evaluate -> DEBU 1a16 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.655 UTC [policies] Evaluate -> DEBU 1a17 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.655 UTC [policies] Evaluate -> DEBU 1a18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.656 UTC [policies] Evaluate -> DEBU 1a19 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.656 UTC [policies] Evaluate -> DEBU 1a1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.656 UTC [cauthdsl] func1 -> DEBU 1a1b 0xc001146f40 gate 1563590449656634100 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.656 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc001146f40 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1d 0xc001146f40 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1e 0xc001146f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1f 0xc001146f40 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.658 UTC [cauthdsl] func1 -> DEBU 1a20 0xc001146f40 gate 1563590449656634100 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a21 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.660 UTC [cauthdsl] func1 -> DEBU 1a24 0xc001147780 gate 1563590449660258300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.660 UTC [cauthdsl] func2 -> DEBU 1a25 0xc001147780 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.661 UTC [cauthdsl] func2 -> DEBU 1a26 0xc001147780 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.662 UTC [cauthdsl] func2 -> DEBU 1a27 0xc001147780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.662 UTC [cauthdsl] func2 -> DEBU 1a28 0xc001147780 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.663 UTC [cauthdsl] func1 -> DEBU 1a29 0xc001147780 gate 1563590449660258300 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.664 UTC [policies] Evaluate -> DEBU 1a2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.664 UTC [policies] Evaluate -> DEBU 1a2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.665 UTC [policies] Evaluate -> DEBU 1a2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.665 UTC [cauthdsl] func1 -> DEBU 1a2d 0xc001147fd0 gate 1563590449665747900 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.665 UTC [cauthdsl] func2 -> DEBU 1a2e 0xc001147fd0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a2f 0xc001147fd0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a30 0xc001147fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a31 0xc001147fd0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.667 UTC [cauthdsl] func1 -> DEBU 1a32 0xc001147fd0 gate 1563590449665747900 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.667 UTC [policies] Evaluate -> DEBU 1a33 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.668 UTC [policies] Evaluate -> DEBU 1a34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.668 UTC [policies] func1 -> DEBU 1a35 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:49.669 UTC [policies] Evaluate -> DEBU 1a36 Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.670 UTC [policies] Evaluate -> DEBU 1a37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.670 UTC [policies] Evaluate -> DEBU 1a38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.671 UTC [policies] Evaluate -> DEBU 1a39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.672 UTC [policies] Evaluate -> DEBU 1a3a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.673 UTC [cauthdsl] func1 -> DEBU 1a3b 0xc000ad15d0 gate 1563590449673204500 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.673 UTC [cauthdsl] func2 -> DEBU 1a3c 0xc000ad15d0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.674 UTC [cauthdsl] func2 -> DEBU 1a3d 0xc000ad15d0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.675 UTC [cauthdsl] func2 -> DEBU 1a3e 0xc000ad15d0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:49.676 UTC [msp.identity] Verify -> DEBU 1a3f Verify: digest = 00000000 6d fd 64 01 29 73 26 c6 8d 78 12 e5 8a 88 92 c4 |m.d.)s&..x......| -orderer0.example.com | 00000010 38 2f 37 72 0e ec 09 0e 08 8a e7 4f be e3 3c e5 |8/7r.......O..<.|" -orderer0.example.com | "2019-07-20 02:40:49.676 UTC [msp.identity] Verify -> DEBU 1a40 Verify: sig = 00000000 30 45 02 21 00 c4 23 85 66 3b 16 a3 d1 d7 66 d9 |0E.!..#.f;....f.| -orderer0.example.com | 00000010 55 74 3a 88 0a bc 26 58 b2 c5 82 ae 0e 1a 37 90 |Ut:...&X......7.| -orderer0.example.com | 00000020 4d f1 5f 36 66 02 20 2f 8d 67 0b 81 bf a2 1f 9d |M._6f. /.g......| -orderer0.example.com | 00000030 4c f3 4a 40 63 da db 0e 77 9e f5 c1 94 40 e6 f3 |L.J@c...w....@..| -peer0.org1.example.com | "2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14b9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14ba Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14bb Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14bd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14be == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.780 UTC [cauthdsl] func1 -> DEBU 14bf 0xc003f94080 gate 1563590400780667200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c0 0xc003f94080 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c1 0xc003f94080 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c2 0xc003f94080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c3 0xc003f94080 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.781 UTC [cauthdsl] func1 -> DEBU 14c4 0xc003f94080 gate 1563590400780667200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func1 -> DEBU 14c8 0xc003f948c0 gate 1563590400782561100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14c9 0xc003f948c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14ca 0xc003f948c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14cb 0xc003f948c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [msp.identity] Verify -> DEBU 14cc Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [msp.identity] Verify -> DEBU 14cd Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14ce 0xc003f948c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func1 -> DEBU 14cf 0xc003f948c0 gate 1563590400782561100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:00.783 UTC [msp.identity] Verify -> DEBU 14d4 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:00.783 UTC [msp.identity] Verify -> DEBU 14d5 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -orderer0.example.com | 00000040 64 14 8a e7 6f 9b 49 |d...o.I|" -orderer0.example.com | "2019-07-20 02:40:49.676 UTC [cauthdsl] func2 -> DEBU 1a41 0xc000ad15d0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:49.677 UTC [cauthdsl] func1 -> DEBU 1a42 0xc000ad15d0 gate 1563590449673204500 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:49.678 UTC [policies] Evaluate -> DEBU 1a43 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.678 UTC [policies] Evaluate -> DEBU 1a44 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.679 UTC [policies] Evaluate -> DEBU 1a45 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.680 UTC [policies] Evaluate -> DEBU 1a46 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.681 UTC [policies] Evaluate -> DEBU 1a47 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.681 UTC [policies] Evaluate -> DEBU 1a48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.682 UTC [common.deliver] deliverBlocks -> DEBU 1a49 [channel: businesschannel] Received seekInfo (0xc000ce3680) start: > stop: > from 172.18.0.9:39286" -orderer0.example.com | "2019-07-20 02:40:49.682 UTC [fsblkstorage] Next -> DEBU 1a4a Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:49.682 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a4b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" -orderer0.example.com | "2019-07-20 02:40:49.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4c Remaining bytes=[71147], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:49.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4d Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" -orderer0.example.com | "2019-07-20 02:40:49.684 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4e blockbytes [23747] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:49.684 UTC [common.deliver] deliverBlocks -> DEBU 1a4f [channel: businesschannel] Delivering block for (0xc000ce3680) for 172.18.0.9:39286" -orderer0.example.com | "2019-07-20 02:40:49.690 UTC [common.deliver] deliverBlocks -> DEBU 1a50 [channel: businesschannel] Done delivering to 172.18.0.9:39286 for (0xc000ce3680)" -orderer0.example.com | "2019-07-20 02:40:49.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a51 Sending msg of 28 bytes to 2 on channel businesschannel took 73.4µs" -orderer0.example.com | "2019-07-20 02:40:49.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a54 Sending msg of 28 bytes to 3 on channel businesschannel took 84.1µs" -orderer0.example.com | "2019-07-20 02:40:49.694 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " -orderer0.example.com | "2019-07-20 02:40:49.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.8µs " -orderer0.example.com | "2019-07-20 02:40:49.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a53 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:49.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a56 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:49.699 UTC [fsblkstorage] waitForBlock -> DEBU 1a57 Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:49.699 UTC [fsblkstorage] waitForBlock -> DEBU 1a58 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:49.700 UTC [common.deliver] Handle -> DEBU 1a59 Waiting for new SeekInfo from 172.18.0.9:39286" -orderer0.example.com | "2019-07-20 02:40:49.700 UTC [common.deliver] Handle -> DEBU 1a5a Attempting to read seek info message from 172.18.0.9:39286" -orderer0.example.com | "2019-07-20 02:40:49.709 UTC [common.deliver] Handle -> WARN 1a5b Error reading from 172.18.0.9:39286: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:49.710 UTC [orderer.common.server] func1 -> DEBU 1a5c Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:49.710 UTC [comm.grpc.server] 1 -> INFO 1a5d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39286 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=59.4656ms -orderer0.example.com | "2019-07-20 02:40:49.712 UTC [grpc] infof -> DEBU 1a5e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:49.887 UTC [orderer.common.server] Deliver -> DEBU 1a5f Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:49.888 UTC [common.deliver] Handle -> DEBU 1a60 Starting new deliver loop for 172.18.0.9:39288" -orderer0.example.com | "2019-07-20 02:40:49.888 UTC [common.deliver] Handle -> DEBU 1a61 Attempting to read seek info message from 172.18.0.9:39288" -orderer0.example.com | "2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.890 UTC [policies] Evaluate -> DEBU 1a66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.890 UTC [cauthdsl] func1 -> DEBU 1a67 0xc001089ef0 gate 1563590449890604200 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.890 UTC [cauthdsl] func2 -> DEBU 1a68 0xc001089ef0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a69 0xc001089ef0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a6a 0xc001089ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a6b 0xc001089ef0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.891 UTC [cauthdsl] func1 -> DEBU 1a6c 0xc001089ef0 gate 1563590449890604200 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.892 UTC [cauthdsl] func1 -> DEBU 1a70 0xc000cd2730 gate 1563590449892826700 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a71 0xc000cd2730 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a72 0xc000cd2730 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a73 0xc000cd2730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a74 0xc000cd2730 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.893 UTC [cauthdsl] func1 -> DEBU 1a75 0xc000cd2730 gate 1563590449892826700 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a76 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.894 UTC [cauthdsl] func1 -> DEBU 1a79 0xc000cd2f70 gate 1563590449894533500 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.894 UTC [cauthdsl] func2 -> DEBU 1a7a 0xc000cd2f70 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.895 UTC [cauthdsl] func2 -> DEBU 1a7b 0xc000cd2f70 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.895 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc000cd2f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:49.896 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc000cd2f70 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.896 UTC [cauthdsl] func1 -> DEBU 1a7e 0xc000cd2f70 gate 1563590449894533500 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:49.896 UTC [policies] Evaluate -> DEBU 1a7f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.896 UTC [policies] Evaluate -> DEBU 1a80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:49.897 UTC [policies] func1 -> DEBU 1a81 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a82 Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a84 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a85 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:49.898 UTC [policies] Evaluate -> DEBU 1a86 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:49.898 UTC [cauthdsl] func1 -> DEBU 1a87 0xc000cd3c60 gate 1563590449898398500 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a88 0xc000cd3c60 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a89 0xc000cd3c60 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a8a 0xc000cd3c60 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:49.899 UTC [msp.identity] Verify -> DEBU 1a8b Verify: digest = 00000000 cc 24 52 2f d6 08 62 09 9d 80 87 87 59 45 d1 ee |.$R/..b.....YE..| -orderer0.example.com | 00000010 c3 65 25 c7 5d 0d 9d e3 54 97 82 53 a7 80 1c b7 |.e%.]...T..S....|" -orderer0.example.com | "2019-07-20 02:40:49.899 UTC [msp.identity] Verify -> DEBU 1a8c Verify: sig = 00000000 30 44 02 20 2d 84 b8 36 d3 99 0b c7 07 a0 82 e8 |0D. -..6........| -orderer0.example.com | 00000010 0f ba f1 08 99 d4 29 b7 60 14 25 e1 d7 4e 44 fc |......).`.%..ND.| -orderer0.example.com | 00000020 df ca 36 b9 02 20 2b 9b 61 70 ea 2c 52 08 65 03 |..6.. +.ap.,R.e.| -orderer0.example.com | 00000030 03 5f 46 e8 ed 09 37 dd 46 cb 66 0d 43 62 9f 72 |._F...7.F.f.Cb.r| -orderer0.example.com | 00000040 cf dc 1d d9 9c 61 |.....a|" -orderer0.example.com | "2019-07-20 02:40:49.900 UTC [cauthdsl] func2 -> DEBU 1a8d 0xc000cd3c60 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:49.900 UTC [cauthdsl] func1 -> DEBU 1a8e 0xc000cd3c60 gate 1563590449898398500 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a8f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a90 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a91 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a93 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a94 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:49.901 UTC [common.deliver] deliverBlocks -> DEBU 1a95 [channel: businesschannel] Received seekInfo (0xc0011d4100) start: > stop: > from 172.18.0.9:39288" -orderer0.example.com | "2019-07-20 02:40:49.901 UTC [fsblkstorage] Next -> DEBU 1a96 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:49.901 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a97 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71390]" -orderer0.example.com | "2019-07-20 02:40:49.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a98 Remaining bytes=[47397], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:49.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a99 Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" -orderer0.example.com | "2019-07-20 02:40:49.902 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a9a blockbytes [4527] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:49.902 UTC [common.deliver] deliverBlocks -> DEBU 1a9b [channel: businesschannel] Delivering block for (0xc0011d4100) for 172.18.0.9:39288" -orderer0.example.com | "2019-07-20 02:40:49.902 UTC [common.deliver] deliverBlocks -> DEBU 1a9c [channel: businesschannel] Done delivering to 172.18.0.9:39288 for (0xc0011d4100)" -orderer0.example.com | "2019-07-20 02:40:49.902 UTC [common.deliver] Handle -> DEBU 1a9d Waiting for new SeekInfo from 172.18.0.9:39288" -orderer0.example.com | "2019-07-20 02:40:49.902 UTC [common.deliver] Handle -> DEBU 1a9e Attempting to read seek info message from 172.18.0.9:39288" -orderer0.example.com | "2019-07-20 02:40:49.903 UTC [fsblkstorage] waitForBlock -> DEBU 1a9f Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:49.903 UTC [fsblkstorage] waitForBlock -> DEBU 1aa0 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:49.911 UTC [common.deliver] Handle -> WARN 1aa1 Error reading from 172.18.0.9:39288: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:49.911 UTC [orderer.common.server] func1 -> DEBU 1aa2 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:49.912 UTC [comm.grpc.server] 1 -> INFO 1aa3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39288 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.309ms -orderer0.example.com | "2019-07-20 02:40:49.912 UTC [grpc] infof -> DEBU 1aa4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:49.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:49.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa6 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" -orderer0.example.com | "2019-07-20 02:40:49.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " -orderer0.example.com | "2019-07-20 02:40:50.087 UTC [orderer.common.server] Deliver -> DEBU 1aa8 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:50.088 UTC [common.deliver] Handle -> DEBU 1aa9 Starting new deliver loop for 172.18.0.9:39290" -orderer0.example.com | "2019-07-20 02:40:50.088 UTC [common.deliver] Handle -> DEBU 1aaa Attempting to read seek info message from 172.18.0.9:39290" -orderer0.example.com | "2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.090 UTC [policies] Evaluate -> DEBU 1aae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.090 UTC [policies] Evaluate -> DEBU 1aaf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.090 UTC [cauthdsl] func1 -> DEBU 1ab0 0xc0012c81e0 gate 1563590450090542200 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.090 UTC [cauthdsl] func2 -> DEBU 1ab1 0xc0012c81e0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.091 UTC [cauthdsl] func2 -> DEBU 1ab2 0xc0012c81e0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.091 UTC [cauthdsl] func2 -> DEBU 1ab3 0xc0012c81e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:50.092 UTC [cauthdsl] func2 -> DEBU 1ab4 0xc0012c81e0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.092 UTC [cauthdsl] func1 -> DEBU 1ab5 0xc0012c81e0 gate 1563590450090542200 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.092 UTC [policies] Evaluate -> DEBU 1ab6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.093 UTC [policies] Evaluate -> DEBU 1ab7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.093 UTC [policies] Evaluate -> DEBU 1ab8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.093 UTC [cauthdsl] func1 -> DEBU 1ab9 0xc0012c8a20 gate 1563590450093382300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1aba 0xc0012c8a20 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1abb 0xc0012c8a20 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1abc 0xc0012c8a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:50.094 UTC [cauthdsl] func2 -> DEBU 1abd 0xc0012c8a20 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.094 UTC [cauthdsl] func1 -> DEBU 1abe 0xc0012c8a20 gate 1563590450093382300 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.094 UTC [policies] Evaluate -> DEBU 1abf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.095 UTC [policies] Evaluate -> DEBU 1ac0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.095 UTC [policies] Evaluate -> DEBU 1ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.095 UTC [cauthdsl] func1 -> DEBU 1ac2 0xc0012c9260 gate 1563590450095879300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac3 0xc0012c9260 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac4 0xc0012c9260 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac5 0xc0012c9260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:50.097 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc0012c9260 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.097 UTC [cauthdsl] func1 -> DEBU 1ac7 0xc0012c9260 gate 1563590450095879300 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.097 UTC [policies] Evaluate -> DEBU 1ac8 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.097 UTC [policies] Evaluate -> DEBU 1ac9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.098 UTC [policies] func1 -> DEBU 1aca Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:50.098 UTC [policies] Evaluate -> DEBU 1acb Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:50.098 UTC [policies] Evaluate -> DEBU 1acc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1acd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1ace This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1acf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.099 UTC [cauthdsl] func1 -> DEBU 1ad0 0xc0012c9f50 gate 1563590450099718300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.099 UTC [cauthdsl] func2 -> DEBU 1ad1 0xc0012c9f50 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.100 UTC [cauthdsl] func2 -> DEBU 1ad2 0xc0012c9f50 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.100 UTC [cauthdsl] func2 -> DEBU 1ad3 0xc0012c9f50 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:50.100 UTC [msp.identity] Verify -> DEBU 1ad4 Verify: digest = 00000000 32 b0 1f 4e 4f 77 71 8c 45 cf a1 1a db 81 73 9b |2..NOwq.E.....s.| -orderer0.example.com | 00000010 14 26 fa 8f a0 33 a0 d5 a4 aa 21 20 77 f3 cb fb |.&...3....! w...|" -orderer0.example.com | "2019-07-20 02:40:50.101 UTC [msp.identity] Verify -> DEBU 1ad5 Verify: sig = 00000000 30 45 02 21 00 fe 90 97 76 f4 f4 19 51 c7 be 69 |0E.!....v...Q..i| -orderer0.example.com | 00000010 b1 0e ae c8 cc ba 84 29 c4 52 79 92 6c ff 4d d1 |.......).Ry.l.M.| -orderer0.example.com | 00000020 7c 21 72 25 8c 02 20 7f 29 7a 69 a3 f6 3e 0b ae ||!r%.. .)zi..>..| -orderer0.example.com | 00000030 8a 5d 38 a7 5b b5 46 02 ea ac 96 62 97 00 96 82 |.]8.[.F....b....| -orderer0.example.com | 00000040 4c 11 ff 0c 60 0d d4 |L...`..|" -orderer0.example.com | "2019-07-20 02:40:50.102 UTC [cauthdsl] func2 -> DEBU 1ad6 0xc0012c9f50 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:50.102 UTC [cauthdsl] func1 -> DEBU 1ad7 0xc0012c9f50 gate 1563590450099718300 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:50.102 UTC [policies] Evaluate -> DEBU 1ad8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.102 UTC [policies] Evaluate -> DEBU 1ad9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1ada Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1adb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1adc Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1add == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.103 UTC [common.deliver] deliverBlocks -> DEBU 1ade [channel: businesschannel] Received seekInfo (0xc0011d52c0) start: > stop: > from 172.18.0.9:39290" -orderer0.example.com | "2019-07-20 02:40:50.104 UTC [fsblkstorage] Next -> DEBU 1adf Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:50.104 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ae0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75919]" -orderer0.example.com | "2019-07-20 02:40:50.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae1 Remaining bytes=[42868], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:50.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae2 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" -orderer0.example.com | "2019-07-20 02:40:50.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae3 blockbytes [3992] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:50.105 UTC [common.deliver] deliverBlocks -> DEBU 1ae4 [channel: businesschannel] Delivering block for (0xc0011d52c0) for 172.18.0.9:39290" -orderer0.example.com | "2019-07-20 02:40:50.105 UTC [common.deliver] deliverBlocks -> DEBU 1ae5 [channel: businesschannel] Done delivering to 172.18.0.9:39290 for (0xc0011d52c0)" -orderer0.example.com | "2019-07-20 02:40:50.106 UTC [fsblkstorage] waitForBlock -> DEBU 1ae6 Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:50.106 UTC [fsblkstorage] waitForBlock -> DEBU 1ae7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:50.106 UTC [common.deliver] Handle -> DEBU 1ae8 Waiting for new SeekInfo from 172.18.0.9:39290" -orderer0.example.com | "2019-07-20 02:40:50.106 UTC [common.deliver] Handle -> DEBU 1ae9 Attempting to read seek info message from 172.18.0.9:39290" -orderer0.example.com | "2019-07-20 02:40:50.114 UTC [common.deliver] Handle -> WARN 1aea Error reading from 172.18.0.9:39290: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:50.114 UTC [orderer.common.server] func1 -> DEBU 1aeb Closing Deliver stream" -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:00.783 UTC [gossip.gossip] handleMessage -> DEBU 14d6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.878 UTC [gossip.comm] func1 -> DEBU 14d7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.878 UTC [gossip.gossip] handleMessage -> DEBU 14d8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.878 UTC [msp] DeserializeIdentity -> DEBU 14d9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.878 UTC [msp] DeserializeIdentity -> DEBU 14da Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:00.878 UTC [gossip.gossip] handleMessage -> DEBU 14db Exiting" -peer0.org1.example.com | "2019-07-20 02:40:00.894 UTC [gossip.comm] func1 -> DEBU 14dc Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.894 UTC [gossip.gossip] handleMessage -> DEBU 14dd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:00.894 UTC [gossip.pull] HandleMessage -> DEBU 14de GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -orderer0.example.com | "2019-07-20 02:40:50.114 UTC [comm.grpc.server] 1 -> INFO 1aec streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39290 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1555ms -orderer0.example.com | "2019-07-20 02:40:50.115 UTC [grpc] infof -> DEBU 1aed transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:50.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aee Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" -orderer0.example.com | "2019-07-20 02:40:50.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aef Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" -orderer0.example.com | "2019-07-20 02:40:50.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1af0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.2µs " -orderer0.example.com | "2019-07-20 02:40:50.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1af1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.8µs " -orderer0.example.com | "2019-07-20 02:40:50.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1af2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:50.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1af3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:50.242 UTC [orderer.common.server] Deliver -> DEBU 1af4 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:50.242 UTC [common.deliver] Handle -> DEBU 1af5 Starting new deliver loop for 172.18.0.9:39292" -orderer0.example.com | "2019-07-20 02:40:50.242 UTC [common.deliver] Handle -> DEBU 1af6 Attempting to read seek info message from 172.18.0.9:39292" -orderer0.example.com | "2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1afa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.245 UTC [policies] Evaluate -> DEBU 1afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.245 UTC [cauthdsl] func1 -> DEBU 1afc 0xc00116c710 gate 1563590450245746300 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1afd 0xc00116c710 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1afe 0xc00116c710 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1aff 0xc00116c710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:50.247 UTC [cauthdsl] func2 -> DEBU 1b00 0xc00116c710 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.247 UTC [cauthdsl] func1 -> DEBU 1b01 0xc00116c710 gate 1563590450245746300 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b02 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.249 UTC [cauthdsl] func1 -> DEBU 1b05 0xc00116cf50 gate 1563590450249209100 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b06 0xc00116cf50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:00.895 UTC [gossip.pull] SendDigest -> DEBU 14df Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:00.895 UTC [gossip.gossip] handleMessage -> DEBU 14e0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.043 UTC [gossip.comm] func1 -> DEBU 14e1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.044 UTC [gossip.gossip] handleMessage -> DEBU 14e2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.044 UTC [msp] DeserializeIdentity -> DEBU 14e3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.045 UTC [msp] DeserializeIdentity -> DEBU 14e4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.045 UTC [msp] DeserializeIdentity -> DEBU 14e5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.046 UTC [gossip.gossip] handleMessage -> DEBU 14e6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.182 UTC [gossip.comm] func1 -> DEBU 14e7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.183 UTC [gossip.gossip] handleMessage -> DEBU 14e8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.183 UTC [msp] DeserializeIdentity -> DEBU 14e9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.183 UTC [msp] DeserializeIdentity -> DEBU 14ea Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.184 UTC [msp] DeserializeIdentity -> DEBU 14eb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.184 UTC [gossip.gossip] handleMessage -> DEBU 14ec Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.752 UTC [gossip.election] waitForInterrupt -> DEBU 14ed c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.752 UTC [gossip.election] IsLeader -> DEBU 14ee c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:01.752 UTC [msp] GetDefaultSigningIdentity -> DEBU 14ef Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:01.752 UTC [msp.identity] Sign -> DEBU 14f0 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510051801 " -peer0.org1.example.com | "2019-07-20 02:40:01.753 UTC [msp.identity] Sign -> DEBU 14f1 Sign: digest: E591A4CF9EA32E358DCA63E1CA940EE9984AD1C9CC3264A0DA2FF9495EA9026B " -peer0.org1.example.com | "2019-07-20 02:40:01.753 UTC [gossip.election] waitForInterrupt -> DEBU 14f2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:01.759 UTC [msp] DeserializeIdentity -> DEBU 14f3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.761 UTC [gossip.comm] Send -> DEBU 14f7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:01.762 UTC [msp] DeserializeIdentity -> DEBU 14f8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.762 UTC [msp] DeserializeIdentity -> DEBU 14f9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.762 UTC [gossip.comm] sendToEndpoint -> DEBU 14fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.762 UTC [gossip.comm] sendToEndpoint -> DEBU 14fb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [gossip.comm] func1 -> DEBU 14fc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [gossip.gossip] handleMessage -> DEBU 14fd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [gossip.gossip] handleMessage -> DEBU 14fe Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14ff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1500 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [msp] DeserializeIdentity -> DEBU 1501 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b07 0xc00116cf50 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b08 0xc00116cf50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:50.250 UTC [cauthdsl] func2 -> DEBU 1b09 0xc00116cf50 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.251 UTC [cauthdsl] func1 -> DEBU 1b0a 0xc00116cf50 gate 1563590450249209100 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.251 UTC [policies] Evaluate -> DEBU 1b0b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.252 UTC [policies] Evaluate -> DEBU 1b0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.252 UTC [policies] Evaluate -> DEBU 1b0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.252 UTC [cauthdsl] func1 -> DEBU 1b0e 0xc00116d790 gate 1563590450252617400 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.252 UTC [cauthdsl] func2 -> DEBU 1b0f 0xc00116d790 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b10 0xc00116d790 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b11 0xc00116d790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b12 0xc00116d790 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.253 UTC [cauthdsl] func1 -> DEBU 1b13 0xc00116d790 gate 1563590450252617400 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.254 UTC [policies] Evaluate -> DEBU 1b14 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.254 UTC [policies] Evaluate -> DEBU 1b15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.254 UTC [policies] func1 -> DEBU 1b16 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b17 Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.256 UTC [policies] Evaluate -> DEBU 1b1b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.256 UTC [cauthdsl] func1 -> DEBU 1b1c 0xc00117c480 gate 1563590450256362000 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.256 UTC [cauthdsl] func2 -> DEBU 1b1d 0xc00117c480 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.256 UTC [cauthdsl] func2 -> DEBU 1b1e 0xc00117c480 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.257 UTC [cauthdsl] func2 -> DEBU 1b1f 0xc00117c480 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:50.257 UTC [msp.identity] Verify -> DEBU 1b20 Verify: digest = 00000000 ad 6d 6e 6f fb 90 19 a4 92 1d 11 87 3f 22 bc a5 |.mno........?"..| -orderer0.example.com | 00000010 da cd cf 6c e4 3c 34 dc fa 7b 28 ce 6c 77 a0 49 |...l.<4..{(.lw.I|" -orderer0.example.com | "2019-07-20 02:40:50.258 UTC [msp.identity] Verify -> DEBU 1b21 Verify: sig = 00000000 30 45 02 21 00 b1 59 d2 0e 97 76 c6 47 00 47 38 |0E.!..Y...v.G.G8| -orderer0.example.com | 00000010 0a d5 e3 9e 61 ef 45 09 c4 7a fb 0d 57 1e 04 84 |....a.E..z..W...| -orderer0.example.com | 00000020 32 7a 3f 5d 34 02 20 0f d3 a3 bd 1e a2 e6 0b 9b |2z?]4. .........| -orderer0.example.com | 00000030 65 ea 40 ae 08 d8 7c d5 0e b7 6c 7e 92 7b cb 08 |e.@...|...l~.{..| -orderer0.example.com | 00000040 fc 9e 2e 0b d2 ff fe |.......|" -orderer0.example.com | "2019-07-20 02:40:50.258 UTC [cauthdsl] func2 -> DEBU 1b22 0xc00117c480 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:50.259 UTC [cauthdsl] func1 -> DEBU 1b23 0xc00117c480 gate 1563590450256362000 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b24 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b25 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b26 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b27 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b28 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.261 UTC [common.deliver] deliverBlocks -> DEBU 1b2a [channel: businesschannel] Received seekInfo (0xc0011d57c0) start: > stop: > from 172.18.0.9:39292" -orderer0.example.com | "2019-07-20 02:40:50.261 UTC [fsblkstorage] Next -> DEBU 1b2b Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:50.261 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b2c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" -orderer0.example.com | "2019-07-20 02:40:50.261 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2d Remaining bytes=[38874], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:50.261 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2e Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" -orderer0.example.com | "2019-07-20 02:40:50.262 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2f blockbytes [3989] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:50.262 UTC [common.deliver] deliverBlocks -> DEBU 1b30 [channel: businesschannel] Delivering block for (0xc0011d57c0) for 172.18.0.9:39292" -orderer0.example.com | "2019-07-20 02:40:50.262 UTC [common.deliver] deliverBlocks -> DEBU 1b31 [channel: businesschannel] Done delivering to 172.18.0.9:39292 for (0xc0011d57c0)" -orderer0.example.com | "2019-07-20 02:40:50.263 UTC [fsblkstorage] waitForBlock -> DEBU 1b32 Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:50.263 UTC [fsblkstorage] waitForBlock -> DEBU 1b33 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:50.263 UTC [common.deliver] Handle -> DEBU 1b34 Waiting for new SeekInfo from 172.18.0.9:39292" -orderer0.example.com | "2019-07-20 02:40:50.264 UTC [common.deliver] Handle -> DEBU 1b35 Attempting to read seek info message from 172.18.0.9:39292" -orderer0.example.com | "2019-07-20 02:40:50.268 UTC [common.deliver] Handle -> WARN 1b36 Error reading from 172.18.0.9:39292: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:50.269 UTC [orderer.common.server] func1 -> DEBU 1b37 Closing Deliver stream" -peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1502 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1503 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1504 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1505 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1506 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [cauthdsl] func1 -> DEBU 1508 0xc0029ef890 gate 1563590401919773100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [cauthdsl] func2 -> DEBU 1509 0xc0029ef890 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [cauthdsl] func2 -> DEBU 150a 0xc0029ef890 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 150b 0xc0029ef890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 150c 0xc0029ef890 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 150d 0xc0029ef890 gate 1563590401919773100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 150e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 150f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 1510 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 1511 0xc0032980d0 gate 1563590401920244600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1512 0xc0032980d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1513 0xc0032980d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1514 0xc0032980d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [msp.identity] Verify -> DEBU 1515 Verify: digest = 00000000 01 6e a2 f4 56 9e 32 2d 9f 4d 9e 02 c5 6d e9 28 |.n..V.2-.M...m.(| -peer0.org1.example.com | 00000010 82 4c 1a 7d a9 37 3b a0 a1 d0 24 8e 58 10 7e 72 |.L.}.7;...$.X.~r|" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [msp.identity] Verify -> DEBU 1516 Verify: sig = 00000000 30 45 02 21 00 ae 66 68 23 a1 f5 68 b8 52 0a 95 |0E.!..fh#..h.R..| -peer0.org1.example.com | 00000010 38 01 2f 29 74 0a ec cf 66 5c b3 e2 e4 4a 07 b6 |8./)t...f\...J..| -peer0.org1.example.com | 00000020 83 43 09 a6 8b 02 20 24 4b 00 91 b7 55 5a 4f fd |.C.... $K...UZO.| -peer0.org1.example.com | 00000030 b0 04 1f d7 42 9d 48 c6 53 0c 2e 60 c7 b9 42 8d |....B.H.S..`..B.| -peer0.org1.example.com | 00000040 60 b0 80 44 f4 c2 73 |`..D..s|" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1517 0xc0032980d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 1518 0xc0032980d0 gate 1563590401920244600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 1519 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 151a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [policies] Evaluate -> DEBU 151b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [policies] Evaluate -> DEBU 151c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 151d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 151e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 151f updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1520 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1521 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1522 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 1523 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1524 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1525 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1526 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1527 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1528 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1529 Obtaining identity" -orderer0.example.com | "2019-07-20 02:40:50.269 UTC [comm.grpc.server] 1 -> INFO 1b38 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39292 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.0425ms -orderer0.example.com | "2019-07-20 02:40:50.270 UTC [grpc] infof -> DEBU 1b39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:50.424 UTC [orderer.common.server] Deliver -> DEBU 1b3a Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:50.424 UTC [common.deliver] Handle -> DEBU 1b3b Starting new deliver loop for 172.18.0.9:39294" -orderer0.example.com | "2019-07-20 02:40:50.424 UTC [common.deliver] Handle -> DEBU 1b3c Attempting to read seek info message from 172.18.0.9:39294" -orderer0.example.com | "2019-07-20 02:40:50.424 UTC [policies] Evaluate -> DEBU 1b3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.425 UTC [cauthdsl] func1 -> DEBU 1b42 0xc000c8cf80 gate 1563590450425970900 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b43 0xc000c8cf80 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b44 0xc000c8cf80 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b45 0xc000c8cf80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b46 0xc000c8cf80 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.427 UTC [cauthdsl] func1 -> DEBU 1b47 0xc000c8cf80 gate 1563590450425970900 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b48 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.427 UTC [cauthdsl] func1 -> DEBU 1b4b 0xc000c8d870 gate 1563590450427863700 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.428 UTC [cauthdsl] func2 -> DEBU 1b4c 0xc000c8d870 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.429 UTC [cauthdsl] func2 -> DEBU 1b4d 0xc000c8d870 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.429 UTC [cauthdsl] func2 -> DEBU 1b4e 0xc000c8d870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:50.430 UTC [cauthdsl] func2 -> DEBU 1b4f 0xc000c8d870 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.430 UTC [cauthdsl] func1 -> DEBU 1b50 0xc000c8d870 gate 1563590450427863700 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b51 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.431 UTC [cauthdsl] func1 -> DEBU 1b54 0xc0002664e0 gate 1563590450431281500 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.431 UTC [cauthdsl] func2 -> DEBU 1b55 0xc0002664e0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.431 UTC [cauthdsl] func2 -> DEBU 1b56 0xc0002664e0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.432 UTC [cauthdsl] func2 -> DEBU 1b57 0xc0002664e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -orderer0.example.com | "2019-07-20 02:40:50.432 UTC [cauthdsl] func2 -> DEBU 1b58 0xc0002664e0 principal evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.432 UTC [cauthdsl] func1 -> DEBU 1b59 0xc0002664e0 gate 1563590450431281500 evaluation fails" -orderer0.example.com | "2019-07-20 02:40:50.432 UTC [policies] Evaluate -> DEBU 1b5a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -orderer0.example.com | "2019-07-20 02:40:50.433 UTC [policies] func1 -> DEBU 1b5c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -orderer0.example.com | "2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5d Signature set did not satisfy policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -orderer0.example.com | "2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.434 UTC [policies] Evaluate -> DEBU 1b60 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.434 UTC [policies] Evaluate -> DEBU 1b61 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.436 UTC [cauthdsl] func1 -> DEBU 1b62 0xc000267480 gate 1563590450436160900 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b63 0xc000267480 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b64 0xc000267480 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b65 0xc000267480 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:50.437 UTC [msp.identity] Verify -> DEBU 1b66 Verify: digest = 00000000 ba d9 a9 0b b2 e1 ef 9e e4 d8 a4 81 20 d2 5f 9a |............ ._.| -orderer0.example.com | 00000010 7a ec 35 c6 f3 41 58 f0 8f 89 6e c2 da 51 22 17 |z.5..AX...n..Q".|" -orderer0.example.com | "2019-07-20 02:40:50.437 UTC [msp.identity] Verify -> DEBU 1b67 Verify: sig = 00000000 30 45 02 21 00 bd 6d c8 49 f3 f8 36 2d cd 65 b6 |0E.!..m.I..6-.e.| -orderer0.example.com | 00000010 f3 cf 80 28 9d a4 fb 93 4a d0 da 3c c8 18 c9 33 |...(....J..<...3| -orderer0.example.com | 00000020 7e c4 1c 3c 28 02 20 29 7b cc f8 2f f9 c8 e4 0d |~..<(. ){../....| -orderer0.example.com | 00000030 13 bd de 1c 1c c1 4d ea ad 83 a6 aa 2e 29 7d 6b |......M......)}k| -orderer0.example.com | 00000040 25 11 ec 4a 56 ff 9e |%..JV..|" -orderer0.example.com | "2019-07-20 02:40:50.437 UTC [cauthdsl] func2 -> DEBU 1b68 0xc000267480 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:50.437 UTC [cauthdsl] func1 -> DEBU 1b69 0xc000267480 gate 1563590450436160900 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6c Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6e Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.440 UTC [common.deliver] deliverBlocks -> DEBU 1b70 [channel: businesschannel] Received seekInfo (0xc000b09180) start: > stop: > from 172.18.0.9:39294" -orderer0.example.com | "2019-07-20 02:40:50.440 UTC [fsblkstorage] Next -> DEBU 1b71 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -orderer0.example.com | "2019-07-20 02:40:50.440 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b72 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -orderer0.example.com | "2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b73 Remaining bytes=[34883], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b74 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -orderer0.example.com | "2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b75 blockbytes [34880] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:50.441 UTC [common.deliver] deliverBlocks -> DEBU 1b76 [channel: businesschannel] Delivering block for (0xc000b09180) for 172.18.0.9:39294" -orderer0.example.com | "2019-07-20 02:40:50.441 UTC [common.deliver] deliverBlocks -> DEBU 1b77 [channel: businesschannel] Done delivering to 172.18.0.9:39294 for (0xc000b09180)" -orderer0.example.com | "2019-07-20 02:40:50.442 UTC [common.deliver] Handle -> DEBU 1b78 Waiting for new SeekInfo from 172.18.0.9:39294" -orderer0.example.com | "2019-07-20 02:40:50.442 UTC [common.deliver] Handle -> DEBU 1b79 Attempting to read seek info message from 172.18.0.9:39294" -orderer0.example.com | "2019-07-20 02:40:50.442 UTC [fsblkstorage] waitForBlock -> DEBU 1b7a Came out of wait. maxAvailaBlockNumber=[6]" -orderer0.example.com | "2019-07-20 02:40:50.442 UTC [fsblkstorage] waitForBlock -> DEBU 1b7b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -orderer0.example.com | "2019-07-20 02:40:50.443 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b7c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:50.443 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7d Sending msg of 28 bytes to 3 on channel testchainid took 21µs" -orderer0.example.com | "2019-07-20 02:40:50.444 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " -orderer0.example.com | "2019-07-20 02:40:50.450 UTC [grpc] infof -> DEBU 1b7f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:50.452 UTC [common.deliver] Handle -> WARN 1b80 Error reading from 172.18.0.9:39294: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:50.453 UTC [orderer.common.server] func1 -> DEBU 1b81 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:50.454 UTC [comm.grpc.server] 1 -> INFO 1b82 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39294 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.2687ms -orderer0.example.com | "2019-07-20 02:40:50.598 UTC [orderer.common.server] Deliver -> DEBU 1b83 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:50.599 UTC [common.deliver] Handle -> DEBU 1b84 Starting new deliver loop for 172.18.0.9:39296" -orderer0.example.com | "2019-07-20 02:40:50.599 UTC [common.deliver] Handle -> DEBU 1b85 Attempting to read seek info message from 172.18.0.9:39296" -orderer0.example.com | "2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.601 UTC [policies] Evaluate -> DEBU 1b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.601 UTC [policies] Evaluate -> DEBU 1b8a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.601 UTC [cauthdsl] func1 -> DEBU 1b8b 0xc000416ad0 gate 1563590450601392800 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8c 0xc000416ad0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8d 0xc000416ad0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8e 0xc000416ad0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:50.602 UTC [msp.identity] Verify -> DEBU 1b8f Verify: digest = 00000000 18 75 b6 fe 13 b8 0d a3 28 ca 3a 8e 58 a0 8f 5d |.u......(.:.X..]| -orderer0.example.com | 00000010 cf 0a a1 93 8d 44 2a 8d 85 57 7d c7 0b 3f 79 70 |.....D*..W}..?yp|" -orderer0.example.com | "2019-07-20 02:40:50.602 UTC [msp.identity] Verify -> DEBU 1b90 Verify: sig = 00000000 30 44 02 20 5b 5f 71 aa fc cf 80 3b db ae e2 b2 |0D. [_q....;....| -orderer0.example.com | 00000010 68 8b a1 8c 4a 99 0a f9 48 80 d5 15 3e 2e 4f 84 |h...J...H...>.O.| -orderer0.example.com | 00000020 86 aa d1 a0 02 20 34 b6 2b ff 5f 55 74 08 13 e6 |..... 4.+._Ut...| -orderer0.example.com | 00000030 8d f1 eb a0 e8 83 e1 fe 7c 3f 35 02 ab 30 ef 55 |........|?5..0.U| -orderer0.example.com | 00000040 66 88 19 a7 b8 d9 |f.....|" -orderer0.example.com | "2019-07-20 02:40:50.602 UTC [cauthdsl] func2 -> DEBU 1b91 0xc000416ad0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:50.603 UTC [cauthdsl] func1 -> DEBU 1b92 0xc000416ad0 gate 1563590450601392800 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:50.603 UTC [policies] Evaluate -> DEBU 1b93 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.603 UTC [policies] Evaluate -> DEBU 1b94 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b95 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b97 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.604 UTC [common.deliver] deliverBlocks -> DEBU 1b99 [channel: testchainid] Received seekInfo (0xc000986440) start: > stop: > from 172.18.0.9:39296" -orderer0.example.com | "2019-07-20 02:40:50.605 UTC [fsblkstorage] Next -> DEBU 1b9a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 152a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [gossip.comm] Send -> DEBU 152b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [msp] DeserializeIdentity -> DEBU 152c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [msp] DeserializeIdentity -> DEBU 152d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [gossip.comm] Send -> DEBU 152e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 152f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 1530 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 1531 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.924 UTC [gossip.comm] sendToEndpoint -> DEBU 1532 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.927 UTC [gossip.comm] func1 -> DEBU 1533 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.928 UTC [gossip.gossip] handleMessage -> DEBU 1534 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.928 UTC [gossip.gossip] handleMessage -> DEBU 1535 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1536 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1537 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.929 UTC [gossip.comm] func1 -> DEBU 1538 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.929 UTC [gossip.gossip] handleMessage -> DEBU 1539 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.929 UTC [gossip.gossip] handleMessage -> DEBU 153a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:01.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 153b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:01.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 153c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 153d Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 153e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151017 " -peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 153f Sign: digest: 52DA398D25C6952AA335AE471E2837386B978F542632A147D2426BCCA07AF961 " -peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 1540 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 1541 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 1542 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1543 Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1544 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1545 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1546 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.243 UTC [gossip.comm] Send -> DEBU 1547 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:02.243 UTC [msp] DeserializeIdentity -> DEBU 1548 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.243 UTC [gossip.comm] Send -> DEBU 154a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:02.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1549 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.244 UTC [gossip.comm] Send -> DEBU 154b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -orderer0.example.com | "2019-07-20 02:40:50.605 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b9b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -orderer0.example.com | "2019-07-20 02:40:50.605 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9c Remaining bytes=[25835], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:50.606 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9d Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -orderer0.example.com | "2019-07-20 02:40:50.606 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9e blockbytes [25832] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:50.606 UTC [common.deliver] deliverBlocks -> DEBU 1b9f [channel: testchainid] Delivering block for (0xc000986440) for 172.18.0.9:39296" -orderer0.example.com | "2019-07-20 02:40:50.607 UTC [common.deliver] deliverBlocks -> DEBU 1ba0 [channel: testchainid] Done delivering to 172.18.0.9:39296 for (0xc000986440)" -orderer0.example.com | "2019-07-20 02:40:50.608 UTC [common.deliver] Handle -> DEBU 1ba1 Waiting for new SeekInfo from 172.18.0.9:39296" -orderer0.example.com | "2019-07-20 02:40:50.608 UTC [common.deliver] Handle -> DEBU 1ba2 Attempting to read seek info message from 172.18.0.9:39296" -orderer0.example.com | "2019-07-20 02:40:50.612 UTC [grpc] warningf -> DEBU 1ba3 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39296: read: connection reset by peer" -orderer0.example.com | "2019-07-20 02:40:50.613 UTC [common.deliver] Handle -> WARN 1ba4 Error reading from 172.18.0.9:39296: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:50.613 UTC [orderer.common.server] func1 -> DEBU 1ba5 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:50.613 UTC [comm.grpc.server] 1 -> INFO 1ba6 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39296 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.0914ms -orderer0.example.com | "2019-07-20 02:40:50.614 UTC [grpc] infof -> DEBU 1ba7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:50.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba8 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" -orderer0.example.com | "2019-07-20 02:40:50.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba9 Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" -orderer0.example.com | "2019-07-20 02:40:50.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1baa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.1µs " -orderer0.example.com | "2019-07-20 02:40:50.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.5µs " -orderer0.example.com | "2019-07-20 02:40:50.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:50.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:50.737 UTC [orderer.common.server] Deliver -> DEBU 1bae Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:50.737 UTC [common.deliver] Handle -> DEBU 1baf Starting new deliver loop for 172.18.0.9:39298" -orderer0.example.com | "2019-07-20 02:40:50.737 UTC [common.deliver] Handle -> DEBU 1bb0 Attempting to read seek info message from 172.18.0.9:39298" -orderer0.example.com | "2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.739 UTC [cauthdsl] func1 -> DEBU 1bb6 0xc000c72da0 gate 1563590450739121400 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb7 0xc000c72da0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb8 0xc000c72da0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb9 0xc000c72da0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:50.739 UTC [msp.identity] Verify -> DEBU 1bba Verify: digest = 00000000 0a 85 05 b7 b3 00 17 04 99 c7 db af d2 c3 fa 54 |...............T| -orderer0.example.com | 00000010 fb e6 80 c8 ad 25 fd 29 1b 75 cd 1f 1a 28 6b 5c |.....%.).u...(k\|" -orderer0.example.com | "2019-07-20 02:40:50.740 UTC [msp.identity] Verify -> DEBU 1bbb Verify: sig = 00000000 30 44 02 20 76 30 8c 8a 34 aa cc 19 da a5 39 84 |0D. v0..4.....9.| -orderer0.example.com | 00000010 6f b6 91 5d 30 19 1c e3 79 62 1d b3 c8 4f 17 fe |o..]0...yb...O..| -orderer0.example.com | 00000020 bd 35 7f a0 02 20 3e 11 e1 63 74 50 df e6 34 0a |.5... >..ctP..4.| -orderer0.example.com | 00000030 28 7f 32 7f ee 06 3b 84 5e 93 73 d7 11 bd da 30 |(.2...;.^.s....0| -orderer0.example.com | 00000040 2c 92 62 a0 ec bc |,.b...|" -orderer0.example.com | "2019-07-20 02:40:50.740 UTC [cauthdsl] func2 -> DEBU 1bbc 0xc000c72da0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:50.740 UTC [cauthdsl] func1 -> DEBU 1bbd 0xc000c72da0 gate 1563590450739121400 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:50.740 UTC [policies] Evaluate -> DEBU 1bbe Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.740 UTC [policies] Evaluate -> DEBU 1bbf == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc0 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc2 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.742 UTC [policies] Evaluate -> DEBU 1bc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.742 UTC [common.deliver] deliverBlocks -> DEBU 1bc4 [channel: testchainid] Received seekInfo (0xc000b09b40) start: > stop: > from 172.18.0.9:39298" -orderer0.example.com | "2019-07-20 02:40:50.742 UTC [fsblkstorage] Next -> DEBU 1bc5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-07-20 02:40:50.742 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bc6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -orderer0.example.com | "2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc7 Remaining bytes=[25835], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc8 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -orderer0.example.com | "2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc9 blockbytes [25832] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:50.743 UTC [common.deliver] deliverBlocks -> DEBU 1bca [channel: testchainid] Delivering block for (0xc000b09b40) for 172.18.0.9:39298" -orderer0.example.com | "2019-07-20 02:40:50.744 UTC [common.deliver] deliverBlocks -> DEBU 1bcb [channel: testchainid] Done delivering to 172.18.0.9:39298 for (0xc000b09b40)" -orderer0.example.com | "2019-07-20 02:40:50.744 UTC [common.deliver] Handle -> DEBU 1bcc Waiting for new SeekInfo from 172.18.0.9:39298" -orderer0.example.com | "2019-07-20 02:40:50.745 UTC [common.deliver] Handle -> DEBU 1bcd Attempting to read seek info message from 172.18.0.9:39298" -orderer0.example.com | "2019-07-20 02:40:50.747 UTC [policies] Evaluate -> DEBU 1bce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.749 UTC [cauthdsl] func1 -> DEBU 1bd3 0xc000bad5a0 gate 1563590450749082200 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd4 0xc000bad5a0 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd5 0xc000bad5a0 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd6 0xc000bad5a0 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:50.749 UTC [msp.identity] Verify -> DEBU 1bd7 Verify: digest = 00000000 24 51 1f a6 fb 56 50 01 c8 df 3b 5d b8 cd bc 4a |$Q...VP...;]...J| -orderer0.example.com | 00000010 39 ed 4d b5 2d ef 5f 2f 5c 7f 3e 53 e0 d5 57 40 |9.M.-._/\.>S..W@|" -orderer0.example.com | "2019-07-20 02:40:50.750 UTC [msp.identity] Verify -> DEBU 1bd8 Verify: sig = 00000000 30 45 02 21 00 f6 d1 cd 4c cc bc 03 bc 7d 3b 55 |0E.!....L....};U| -orderer0.example.com | 00000010 04 a9 aa 70 45 43 74 f5 8a 5e af 01 fa 0e 60 4e |...pECt..^....`N| -orderer0.example.com | 00000020 d3 bc c0 90 c7 02 20 2d d3 23 31 73 65 16 d9 6d |...... -.#1se..m| -orderer0.example.com | 00000030 f6 da 22 90 64 ee d6 00 b2 bf 3b 9f 6b 12 59 73 |..".d.....;.k.Ys| -orderer0.example.com | 00000040 97 36 5e 6c 8e fb 12 |.6^l...|" -orderer0.example.com | "2019-07-20 02:40:50.750 UTC [cauthdsl] func2 -> DEBU 1bd9 0xc000bad5a0 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:50.750 UTC [cauthdsl] func1 -> DEBU 1bda 0xc000bad5a0 gate 1563590450749082200 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:50.750 UTC [policies] Evaluate -> DEBU 1bdb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdd Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdf Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1be0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.752 UTC [common.deliver] deliverBlocks -> DEBU 1be1 [channel: testchainid] Received seekInfo (0xc000986b00) start: > stop: > from 172.18.0.9:39298" -orderer0.example.com | "2019-07-20 02:40:50.752 UTC [fsblkstorage] Next -> DEBU 1be2 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-07-20 02:40:50.752 UTC [fsblkstorage] newBlockfileStream -> DEBU 1be3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:40:50.752 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be4 Remaining bytes=[44254], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:50.752 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be5 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:40:50.753 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be6 blockbytes [18416] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:50.754 UTC [common.deliver] deliverBlocks -> DEBU 1be7 [channel: testchainid] Delivering block for (0xc000986b00) for 172.18.0.9:39298" -peer0.org1.example.com | "2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.245 UTC [gossip.comm] sendToEndpoint -> DEBU 154f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1550 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.364 UTC [gossip.comm] func1 -> DEBU 1551 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.364 UTC [gossip.gossip] handleMessage -> DEBU 1552 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.gossip] handleMessage -> DEBU 1553 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1554 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1555 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [msp.identity] Verify -> DEBU 1556 Verify: digest = 00000000 12 ed 66 37 d8 7d 6d 4a af f4 3b c5 b5 74 a3 82 |..f7.}mJ..;..t..| -peer0.org1.example.com | 00000010 a4 55 75 f0 db 21 d1 0a 5c ed 2f 80 93 fb 4d 92 |.Uu..!..\./...M.|" -peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [msp.identity] Verify -> DEBU 1557 Verify: sig = 00000000 30 44 02 20 55 29 6a d6 d7 c4 9a 7a 22 63 cb 7c |0D. U)j....z"c.|| -peer0.org1.example.com | 00000010 4c 8e 6a 15 40 46 b6 56 87 cb 42 22 ef 19 fa 5d |L.j.@F.V..B"...]| -peer0.org1.example.com | 00000020 ec a2 10 6b 02 20 32 94 4a 8d f1 90 5b e8 6c 72 |...k. 2.J...[.lr| -peer0.org1.example.com | 00000030 18 3b 32 78 3d db e9 e2 44 4c 4c bc 78 f0 f3 4d |.;2x=...DLL.x..M| -peer0.org1.example.com | 00000040 a4 ba 04 56 60 f2 |...V`.|" -peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 1558 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 1559 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 155a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 155b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:02.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 155c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:02.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 155d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 155e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 155f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1560 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1561 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1562 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [gossip.comm] Send -> DEBU 1563 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1564 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [gossip.comm] Send -> DEBU 1565 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1566 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1567 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1568 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1569 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.375 UTC [gossip.comm] func1 -> DEBU 156a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -orderer0.example.com | "2019-07-20 02:40:50.754 UTC [common.deliver] deliverBlocks -> DEBU 1be8 [channel: testchainid] Done delivering to 172.18.0.9:39298 for (0xc000986b00)" -orderer0.example.com | "2019-07-20 02:40:50.754 UTC [common.deliver] Handle -> DEBU 1be9 Waiting for new SeekInfo from 172.18.0.9:39298" -orderer0.example.com | "2019-07-20 02:40:50.754 UTC [common.deliver] Handle -> DEBU 1bea Attempting to read seek info message from 172.18.0.9:39298" -orderer0.example.com | "2019-07-20 02:40:50.761 UTC [common.deliver] Handle -> WARN 1beb Error reading from 172.18.0.9:39298: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:50.761 UTC [orderer.common.server] func1 -> DEBU 1bec Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:50.761 UTC [comm.grpc.server] 1 -> INFO 1bed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39298 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.7807ms -orderer0.example.com | "2019-07-20 02:40:50.762 UTC [grpc] infof -> DEBU 1bee transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:50.852 UTC [orderer.common.server] Deliver -> DEBU 1bef Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:50.853 UTC [common.deliver] Handle -> DEBU 1bf0 Starting new deliver loop for 172.18.0.9:39300" -orderer0.example.com | "2019-07-20 02:40:50.853 UTC [common.deliver] Handle -> DEBU 1bf1 Attempting to read seek info message from 172.18.0.9:39300" -orderer0.example.com | "2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.854 UTC [policies] Evaluate -> DEBU 1bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:50.854 UTC [policies] Evaluate -> DEBU 1bf6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:50.854 UTC [cauthdsl] func1 -> DEBU 1bf7 0xc0001c8150 gate 1563590450854258500 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc0001c8150 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bf9 0xc0001c8150 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bfa 0xc0001c8150 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:50.854 UTC [msp.identity] Verify -> DEBU 1bfb Verify: digest = 00000000 5f 0c 1b 58 f8 c4 de 8f 3c ff 81 9e cb f7 02 e0 |_..X....<.......| -orderer0.example.com | 00000010 72 2e bd 2a 6e 32 fe 5a 5a 13 92 3c 69 3f 43 26 |r..*n2.ZZ.. DEBU 1bfc Verify: sig = 00000000 30 45 02 21 00 a4 ea 63 e2 8a c8 03 41 c9 75 59 |0E.!...c....A.uY| -orderer0.example.com | 00000010 dc 1c df 93 8b 21 60 2c f7 37 e1 df ae b8 e4 52 |.....!`,.7.....R| -orderer0.example.com | 00000020 8a f4 c7 ba 44 02 20 7a 7c 9d 5b 85 fa d6 86 57 |....D. z|.[....W| -orderer0.example.com | 00000030 0f 89 8e c0 86 35 4d 32 04 29 5d 28 3b 7c f4 06 |.....5M2.)](;|..| -orderer0.example.com | 00000040 71 52 90 03 1d 86 9b |qR.....|" -orderer0.example.com | "2019-07-20 02:40:50.855 UTC [cauthdsl] func2 -> DEBU 1bfd 0xc0001c8150 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:50.855 UTC [cauthdsl] func1 -> DEBU 1bfe 0xc0001c8150 gate 1563590450854258500 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1bff Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c00 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c01 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c03 Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.856 UTC [policies] Evaluate -> DEBU 1c04 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:50.856 UTC [common.deliver] deliverBlocks -> DEBU 1c05 [channel: testchainid] Received seekInfo (0xc000ce2280) start: > stop: > from 172.18.0.9:39300" -orderer0.example.com | "2019-07-20 02:40:50.856 UTC [fsblkstorage] Next -> DEBU 1c06 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-07-20 02:40:50.856 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c07 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -orderer0.example.com | "2019-07-20 02:40:50.856 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c08 Remaining bytes=[44254], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:50.856 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c09 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -orderer0.example.com | "2019-07-20 02:40:50.857 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c0a blockbytes [18416] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:50.857 UTC [common.deliver] deliverBlocks -> DEBU 1c0b [channel: testchainid] Delivering block for (0xc000ce2280) for 172.18.0.9:39300" -orderer0.example.com | "2019-07-20 02:40:50.858 UTC [common.deliver] deliverBlocks -> DEBU 1c0c [channel: testchainid] Done delivering to 172.18.0.9:39300 for (0xc000ce2280)" -orderer0.example.com | "2019-07-20 02:40:50.858 UTC [common.deliver] Handle -> DEBU 1c0d Waiting for new SeekInfo from 172.18.0.9:39300" -orderer0.example.com | "2019-07-20 02:40:50.858 UTC [common.deliver] Handle -> DEBU 1c0e Attempting to read seek info message from 172.18.0.9:39300" -orderer0.example.com | "2019-07-20 02:40:50.866 UTC [common.deliver] Handle -> WARN 1c0f Error reading from 172.18.0.9:39300: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:50.866 UTC [orderer.common.server] func1 -> DEBU 1c10 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:50.866 UTC [comm.grpc.server] 1 -> INFO 1c11 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39300 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8498ms -orderer0.example.com | "2019-07-20 02:40:50.867 UTC [grpc] infof -> DEBU 1c12 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:50.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c13 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:50.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c14 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" -orderer0.example.com | "2019-07-20 02:40:50.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " -orderer0.example.com | "2019-07-20 02:40:51.035 UTC [orderer.common.server] Deliver -> DEBU 1c16 Starting new Deliver handler" -orderer0.example.com | "2019-07-20 02:40:51.035 UTC [common.deliver] Handle -> DEBU 1c17 Starting new deliver loop for 172.18.0.9:39302" -orderer0.example.com | "2019-07-20 02:40:51.035 UTC [common.deliver] Handle -> DEBU 1c18 Attempting to read seek info message from 172.18.0.9:39302" -orderer0.example.com | "2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -orderer0.example.com | "2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -orderer0.example.com | "2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -orderer0.example.com | "2019-07-20 02:40:51.037 UTC [policies] Evaluate -> DEBU 1c1d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -orderer0.example.com | "2019-07-20 02:40:51.037 UTC [cauthdsl] func1 -> DEBU 1c1e 0xc000373230 gate 1563590451037212400 evaluation starts" -orderer0.example.com | "2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c1f 0xc000373230 signed by 0 principal evaluation starts (used [false])" -orderer0.example.com | "2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c20 0xc000373230 processing identity 0 with bytes of fd0280" -orderer0.example.com | "2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c21 0xc000373230 principal matched by identity 0" -orderer0.example.com | "2019-07-20 02:40:51.037 UTC [msp.identity] Verify -> DEBU 1c22 Verify: digest = 00000000 ec 0b 12 ab db e7 5a c0 3b 3a 4e 1d 14 80 ee 96 |......Z.;:N.....| -orderer0.example.com | 00000010 ec c8 cd 83 92 dd 48 1f a3 8f f4 e2 62 c9 83 30 |......H.....b..0|" -orderer0.example.com | "2019-07-20 02:40:51.038 UTC [msp.identity] Verify -> DEBU 1c23 Verify: sig = 00000000 30 45 02 21 00 cf ad e9 8e 60 13 07 9a cb 59 40 |0E.!.....`....Y@| -orderer0.example.com | 00000010 ce 5a 42 f8 df 96 f6 5f b3 a6 76 32 77 dd 56 db |.ZB...._..v2w.V.| -orderer0.example.com | 00000020 ac 94 17 4c 1b 02 20 1e 45 13 53 e0 a6 7e 1d 55 |...L.. .E.S..~.U| -orderer0.example.com | 00000030 65 3d 08 38 dd 63 ff b1 e8 a3 1a 7c 58 52 1a 25 |e=.8.c.....|XR.%| -orderer0.example.com | 00000040 14 16 ee 56 dc fd 44 |...V..D|" -orderer0.example.com | "2019-07-20 02:40:51.038 UTC [cauthdsl] func2 -> DEBU 1c24 0xc000373230 principal evaluation succeeds for identity 0" -orderer0.example.com | "2019-07-20 02:40:51.038 UTC [cauthdsl] func1 -> DEBU 1c25 0xc000373230 gate 1563590451037212400 evaluation succeeds" -orderer0.example.com | "2019-07-20 02:40:51.038 UTC [policies] Evaluate -> DEBU 1c26 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-07-20 02:40:02.375 UTC [gossip.gossip] handleMessage -> DEBU 156b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.375 UTC [gossip.gossip] handleMessage -> DEBU 156c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.376 UTC [gossip.comm] func1 -> DEBU 156f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.376 UTC [gossip.gossip] handleMessage -> DEBU 1570 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.376 UTC [gossip.gossip] handleMessage -> DEBU 1571 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1572 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1573 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [gossip.comm] func1 -> DEBU 1574 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [gossip.gossip] handleMessage -> DEBU 1575 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [gossip.gossip] handleMessage -> DEBU 1576 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1577 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1578 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [msp] DeserializeIdentity -> DEBU 1579 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 157a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [cauthdsl] func1 -> DEBU 1580 0xc00350b830 gate 1563590402547835300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1581 0xc00350b830 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1582 0xc00350b830 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1583 0xc00350b830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -orderer0.example.com | "2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c27 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -orderer0.example.com | "2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c28 Signature set satisfies policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -orderer0.example.com | "2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c2a Signature set satisfies policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:51.040 UTC [policies] Evaluate -> DEBU 1c2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -orderer0.example.com | "2019-07-20 02:40:51.040 UTC [common.deliver] deliverBlocks -> DEBU 1c2c [channel: testchainid] Received seekInfo (0xc000ce2c40) start: > stop: > from 172.18.0.9:39302" -orderer0.example.com | "2019-07-20 02:40:51.041 UTC [fsblkstorage] Next -> DEBU 1c2d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -orderer0.example.com | "2019-07-20 02:40:51.041 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c2e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -orderer0.example.com | "2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c2f Remaining bytes=[25835], Going to peek [8] bytes" -orderer0.example.com | "2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c30 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -orderer0.example.com | "2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c31 blockbytes [25832] read from file [0]" -orderer0.example.com | "2019-07-20 02:40:51.043 UTC [common.deliver] deliverBlocks -> DEBU 1c32 [channel: testchainid] Delivering block for (0xc000ce2c40) for 172.18.0.9:39302" -orderer0.example.com | "2019-07-20 02:40:51.043 UTC [common.deliver] deliverBlocks -> DEBU 1c33 [channel: testchainid] Done delivering to 172.18.0.9:39302 for (0xc000ce2c40)" -orderer0.example.com | "2019-07-20 02:40:51.044 UTC [common.deliver] Handle -> DEBU 1c34 Waiting for new SeekInfo from 172.18.0.9:39302" -orderer0.example.com | "2019-07-20 02:40:51.044 UTC [common.deliver] Handle -> DEBU 1c35 Attempting to read seek info message from 172.18.0.9:39302" -orderer0.example.com | "2019-07-20 02:40:51.050 UTC [common.deliver] Handle -> WARN 1c36 Error reading from 172.18.0.9:39302: rpc error: code = Canceled desc = context canceled" -orderer0.example.com | "2019-07-20 02:40:51.050 UTC [orderer.common.server] func1 -> DEBU 1c37 Closing Deliver stream" -orderer0.example.com | "2019-07-20 02:40:51.051 UTC [comm.grpc.server] 1 -> INFO 1c38 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39302 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.9191ms -orderer0.example.com | "2019-07-20 02:40:51.052 UTC [grpc] infof -> DEBU 1c39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -orderer0.example.com | "2019-07-20 02:40:51.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3a Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" -orderer0.example.com | "2019-07-20 02:40:51.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3b Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" -orderer0.example.com | "2019-07-20 02:40:51.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.9µs " -orderer0.example.com | "2019-07-20 02:40:51.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.3µs " -orderer0.example.com | "2019-07-20 02:40:51.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:51.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:51.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c40 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:51.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c41 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" -orderer0.example.com | "2019-07-20 02:40:51.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c42 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.1µs " -orderer0.example.com | "2019-07-20 02:40:51.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c43 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" -orderer0.example.com | "2019-07-20 02:40:51.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c44 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" -orderer0.example.com | "2019-07-20 02:40:51.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " -orderer0.example.com | "2019-07-20 02:40:51.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.4µs " -orderer0.example.com | "2019-07-20 02:40:51.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c47 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:51.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c48 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:51.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c49 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:51.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4a Sending msg of 28 bytes to 3 on channel testchainid took 10.6µs" -orderer0.example.com | "2019-07-20 02:40:51.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.1µs " -orderer0.example.com | "2019-07-20 02:40:52.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4c Sending msg of 28 bytes to 2 on channel businesschannel took 36.4µs" -orderer0.example.com | "2019-07-20 02:40:52.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4d Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" -orderer0.example.com | "2019-07-20 02:40:52.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 395.2µs " -orderer0.example.com | "2019-07-20 02:40:52.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3487ms " -orderer0.example.com | "2019-07-20 02:40:52.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c50 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1584 0xc00350b830 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1585 0xc00350b830 gate 1563590402547835300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1586 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1587 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1588 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1589 0xc0036da070 gate 1563590402548125100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158a 0xc0036da070 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158b 0xc0036da070 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158c 0xc0036da070 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [msp.identity] Verify -> DEBU 158d Verify: digest = 00000000 d6 76 c2 ed a9 5d aa 5d 9f 67 c5 7e 78 4f be 32 |.v...].].g.~xO.2| -peer0.org1.example.com | 00000010 55 06 f7 08 6d fc ce 81 17 8b 24 37 0e 6a 35 2b |U...m.....$7.j5+|" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [msp.identity] Verify -> DEBU 158e Verify: sig = 00000000 30 45 02 21 00 87 a0 1c 2d c8 14 12 6c 23 2e fb |0E.!....-...l#..| -peer0.org1.example.com | 00000010 88 f7 be 3d b8 e4 ce df 25 55 26 31 97 5b 85 91 |...=....%U&1.[..| -peer0.org1.example.com | 00000020 8d 2c 57 61 ee 02 20 72 cc c4 a2 95 38 a3 ca d1 |.,Wa.. r....8...| -peer0.org1.example.com | 00000030 df c2 50 9d 3b 01 f7 f3 9f 82 90 1a 72 57 89 80 |..P.;.......rW..| -peer0.org1.example.com | 00000040 24 92 e5 d3 b9 72 a6 |$....r.|" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158f 0xc0036da070 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1590 0xc0036da070 gate 1563590402548125100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1591 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1592 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1593 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1594 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 1595 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1596 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1597 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1598 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1599 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 159a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 159b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 159c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.555 UTC [msp] DeserializeIdentity -> DEBU 159d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 159e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 159f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] Send -> DEBU 15a3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] Send -> DEBU 15a6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15aa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.558 UTC [gossip.comm] func1 -> DEBU 15ab Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -orderer0.example.com | "2019-07-20 02:40:52.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c51 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:52.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c52 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:52.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c53 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" -orderer0.example.com | "2019-07-20 02:40:52.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.5µs " -orderer0.example.com | "2019-07-20 02:40:52.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c55 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" -orderer0.example.com | "2019-07-20 02:40:52.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c56 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" -orderer0.example.com | "2019-07-20 02:40:52.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.8µs " -orderer0.example.com | "2019-07-20 02:40:52.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.8µs " -orderer0.example.com | "2019-07-20 02:40:52.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c59 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:52.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:52.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:52.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5c Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" -orderer0.example.com | "2019-07-20 02:40:52.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.8µs " -orderer0.example.com | "2019-07-20 02:40:53.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5e Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" -orderer0.example.com | "2019-07-20 02:40:53.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5f Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" -orderer0.example.com | "2019-07-20 02:40:53.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.4µs " -orderer0.example.com | "2019-07-20 02:40:53.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c61 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:53.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.5291ms " -orderer0.example.com | "2019-07-20 02:40:53.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c63 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:53.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c64 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:53.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c65 Sending msg of 28 bytes to 3 on channel testchainid took 740µs" -orderer0.example.com | "2019-07-20 02:40:53.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " -orderer0.example.com | "2019-07-20 02:40:53.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c67 Sending msg of 28 bytes to 2 on channel businesschannel took 37.2µs" -orderer0.example.com | "2019-07-20 02:40:53.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c68 Sending msg of 28 bytes to 3 on channel businesschannel took 26.4µs" -orderer0.example.com | "2019-07-20 02:40:53.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 225µs " -orderer0.example.com | "2019-07-20 02:40:53.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.8µs " -orderer0.example.com | "2019-07-20 02:40:53.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:53.697 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:53.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:53.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c6e Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" -orderer0.example.com | "2019-07-20 02:40:53.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.1µs " -orderer0.example.com | "2019-07-20 02:40:54.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c70 Sending msg of 28 bytes to 2 on channel businesschannel took 30.1µs" -orderer0.example.com | "2019-07-20 02:40:54.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c71 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" -orderer0.example.com | "2019-07-20 02:40:54.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.2µs " -orderer0.example.com | "2019-07-20 02:40:54.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.3µs " -orderer0.example.com | "2019-07-20 02:40:54.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c74 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:54.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c75 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:54.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:54.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c77 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" -orderer0.example.com | "2019-07-20 02:40:54.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60µs " -orderer0.example.com | "2019-07-20 02:40:54.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c79 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" -orderer0.example.com | "2019-07-20 02:40:54.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c7a Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" -orderer0.example.com | "2019-07-20 02:40:54.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " -orderer0.example.com | "2019-07-20 02:40:54.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 36.8µs " -orderer0.example.com | "2019-07-20 02:40:54.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:54.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:54.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:54.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c80 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" -orderer0.example.com | "2019-07-20 02:40:54.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.5µs " -orderer0.example.com | "2019-07-20 02:40:55.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c82 Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" -orderer0.example.com | "2019-07-20 02:40:55.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c83 Sending msg of 28 bytes to 2 on channel businesschannel took 10.9µs" -orderer0.example.com | "2019-07-20 02:40:55.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.8µs " -orderer0.example.com | "2019-07-20 02:40:55.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.2µs " -orderer0.example.com | "2019-07-20 02:40:55.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c86 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:55.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c87 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:55.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c88 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:55.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c89 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" -orderer0.example.com | "2019-07-20 02:40:55.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.6µs " -orderer0.example.com | "2019-07-20 02:40:55.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c8b Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" -orderer0.example.com | "2019-07-20 02:40:55.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c8c Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" -orderer0.example.com | "2019-07-20 02:40:55.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.5µs " -orderer0.example.com | "2019-07-20 02:40:55.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.1µs " -orderer0.example.com | "2019-07-20 02:40:55.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c8f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:55.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c90 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:55.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:55.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c92 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" -orderer0.example.com | "2019-07-20 02:40:55.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59µs " -orderer0.example.com | "2019-07-20 02:40:56.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c94 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" -orderer0.example.com | "2019-07-20 02:40:56.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c95 Sending msg of 28 bytes to 3 on channel businesschannel took 10.1µs" -orderer0.example.com | "2019-07-20 02:40:56.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " -orderer0.example.com | "2019-07-20 02:40:56.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.7µs " -orderer0.example.com | "2019-07-20 02:40:56.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c98 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:56.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c99 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:56.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:56.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 288.1µs " -orderer0.example.com | "2019-07-20 02:40:56.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9c Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" -orderer0.example.com | "2019-07-20 02:40:56.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9d Sending msg of 28 bytes to 2 on channel businesschannel took 50µs" -orderer0.example.com | "2019-07-20 02:40:56.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9e Sending msg of 28 bytes to 3 on channel businesschannel took 47.3µs" -orderer0.example.com | "2019-07-20 02:40:56.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481.9µs " -orderer0.example.com | "2019-07-20 02:40:56.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.7µs " -orderer0.example.com | "2019-07-20 02:40:56.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca1 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:56.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:56.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:56.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca4 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" -orderer0.example.com | "2019-07-20 02:40:56.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.9µs " -orderer0.example.com | "2019-07-20 02:40:57.197 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" -orderer0.example.com | "2019-07-20 02:40:57.198 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca7 Sending msg of 28 bytes to 3 on channel businesschannel took 28.6µs" -orderer0.example.com | "2019-07-20 02:40:57.199 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 398.3µs " -orderer0.example.com | "2019-07-20 02:40:57.199 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 258.4µs " -orderer0.example.com | "2019-07-20 02:40:57.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1caa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:57.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cab Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:57.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cac Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:57.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cad Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" -orderer0.example.com | "2019-07-20 02:40:57.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " -orderer0.example.com | "2019-07-20 02:40:57.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1caf Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" -orderer0.example.com | "2019-07-20 02:40:57.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb0 Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" -orderer0.example.com | "2019-07-20 02:40:57.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.1µs " -orderer0.example.com | "2019-07-20 02:40:57.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.3µs " -orderer0.example.com | "2019-07-20 02:40:57.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:57.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:57.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:57.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb6 Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" -orderer0.example.com | "2019-07-20 02:40:57.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.5µs " -orderer0.example.com | "2019-07-20 02:40:58.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb8 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" -orderer0.example.com | "2019-07-20 02:40:58.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb9 Sending msg of 28 bytes to 3 on channel businesschannel took 61.8µs" -orderer0.example.com | "2019-07-20 02:40:58.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.5µs " -orderer0.example.com | "2019-07-20 02:40:58.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192µs " -orderer0.example.com | "2019-07-20 02:40:58.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:58.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:58.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:58.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cbf Sending msg of 28 bytes to 3 on channel testchainid took 39.8µs" -orderer0.example.com | "2019-07-20 02:40:58.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 347.1µs " -orderer0.example.com | "2019-07-20 02:40:58.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc1 Sending msg of 28 bytes to 2 on channel businesschannel took 29µs" -orderer0.example.com | "2019-07-20 02:40:58.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc2 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" -orderer0.example.com | "2019-07-20 02:40:58.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.6µs " -orderer0.example.com | "2019-07-20 02:40:58.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 535.4µs " -orderer0.example.com | "2019-07-20 02:40:58.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:58.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:58.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:58.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc8 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" -orderer0.example.com | "2019-07-20 02:40:58.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3711ms " -orderer0.example.com | "2019-07-20 02:40:59.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cca Sending msg of 28 bytes to 2 on channel businesschannel took 52.2µs" -orderer0.example.com | "2019-07-20 02:40:59.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ccb Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" -orderer0.example.com | "2019-07-20 02:40:59.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.2µs " -orderer0.example.com | "2019-07-20 02:40:59.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.8µs " -orderer0.example.com | "2019-07-20 02:40:59.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cce Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:59.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ccf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:59.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:59.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd1 Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" -orderer0.example.com | "2019-07-20 02:40:59.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " -orderer0.example.com | "2019-07-20 02:40:59.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd3 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" -orderer0.example.com | "2019-07-20 02:40:59.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd4 Sending msg of 28 bytes to 3 on channel businesschannel took 10.8µs" -orderer0.example.com | "2019-07-20 02:40:59.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.5µs " -orderer0.example.com | "2019-07-20 02:40:59.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3069ms " -orderer0.example.com | "2019-07-20 02:40:59.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:59.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:59.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:40:59.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cda Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" -orderer0.example.com | "2019-07-20 02:40:59.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0973ms " -orderer0.example.com | "2019-07-20 02:41:00.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdc Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" -orderer0.example.com | "2019-07-20 02:41:00.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdd Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" -orderer0.example.com | "2019-07-20 02:41:00.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " -orderer0.example.com | "2019-07-20 02:41:00.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 43.5µs " -orderer0.example.com | "2019-07-20 02:41:00.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:00.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce1 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:00.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:00.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce3 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" -orderer0.example.com | "2019-07-20 02:41:00.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " -orderer0.example.com | "2019-07-20 02:41:00.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce5 Sending msg of 28 bytes to 2 on channel businesschannel took 156.7µs" -orderer0.example.com | "2019-07-20 02:41:00.660 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 279.6µs " -orderer0.example.com | "2019-07-20 02:41:00.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:00.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 438.8µs " -orderer0.example.com | "2019-07-20 02:41:00.662 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce8 Sending msg of 28 bytes to 3 on channel businesschannel took 769.5µs" -orderer0.example.com | "2019-07-20 02:41:00.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cea Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:00.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ceb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:00.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cec Sending msg of 28 bytes to 3 on channel testchainid took 15µs" -orderer0.example.com | "2019-07-20 02:41:00.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ced Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.032ms " -orderer0.example.com | "2019-07-20 02:41:01.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cee Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" -orderer0.example.com | "2019-07-20 02:41:01.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cef Sending msg of 28 bytes to 3 on channel businesschannel took 93.3µs" -orderer0.example.com | "2019-07-20 02:41:01.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.2µs " -orderer0.example.com | "2019-07-20 02:41:01.156 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.7µs " -orderer0.example.com | "2019-07-20 02:41:01.157 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:01.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:01.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:01.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf5 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" -orderer0.example.com | "2019-07-20 02:41:01.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.1µs " -orderer0.example.com | "2019-07-20 02:41:01.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf7 Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" -orderer0.example.com | "2019-07-20 02:41:01.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf8 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" -orderer0.example.com | "2019-07-20 02:41:01.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.2µs " -orderer0.example.com | "2019-07-20 02:41:01.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " -orderer0.example.com | "2019-07-20 02:41:01.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:01.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:01.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:01.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfe Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" -orderer0.example.com | "2019-07-20 02:41:01.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.1µs " -orderer0.example.com | "2019-07-20 02:41:02.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d00 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" -orderer0.example.com | "2019-07-20 02:41:02.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d01 Sending msg of 28 bytes to 3 on channel businesschannel took 7µs" -orderer0.example.com | "2019-07-20 02:41:02.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66µs " -orderer0.example.com | "2019-07-20 02:41:02.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.9µs " -orderer0.example.com | "2019-07-20 02:41:02.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d04 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:02.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d05 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:02.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:02.404 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d07 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" -orderer0.example.com | "2019-07-20 02:41:02.404 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320.7µs " -orderer0.example.com | "2019-07-20 02:41:02.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d09 Sending msg of 28 bytes to 2 on channel businesschannel took 65.9µs" -orderer0.example.com | "2019-07-20 02:41:02.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0a Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" -orderer0.example.com | "2019-07-20 02:41:02.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.4µs " -orderer0.example.com | "2019-07-20 02:41:02.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93µs " -orderer0.example.com | "2019-07-20 02:41:02.662 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:02.664 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:02.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:02.904 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d10 Sending msg of 28 bytes to 3 on channel testchainid took 262.6µs" -orderer0.example.com | "2019-07-20 02:41:02.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 355.9µs " -orderer0.example.com | "2019-07-20 02:41:03.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d12 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" -orderer0.example.com | "2019-07-20 02:41:03.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d13 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" -orderer0.example.com | "2019-07-20 02:41:03.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.1µs " -orderer0.example.com | "2019-07-20 02:41:03.156 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.7µs " -orderer0.example.com | "2019-07-20 02:41:03.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d16 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:03.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d17 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:03.404 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d18 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:03.404 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d19 Sending msg of 28 bytes to 3 on channel testchainid took 46.1µs" -orderer0.example.com | "2019-07-20 02:41:03.405 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 395µs " -orderer0.example.com | "2019-07-20 02:41:03.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1b Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" -orderer0.example.com | "2019-07-20 02:41:03.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1c Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" -orderer0.example.com | "2019-07-20 02:41:03.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " -orderer0.example.com | "2019-07-20 02:41:03.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167.5µs " -orderer0.example.com | "2019-07-20 02:41:03.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d1f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:03.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d20 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:03.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d21 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -orderer0.example.com | "2019-07-20 02:41:03.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d22 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" -orderer0.example.com | "2019-07-20 02:41:03.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d23 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.3µs " -peer0.org1.example.com | "2019-07-20 02:40:02.558 UTC [gossip.gossip] handleMessage -> DEBU 15ac Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.558 UTC [gossip.gossip] handleMessage -> DEBU 15ad Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15ae Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15af Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.559 UTC [gossip.comm] func1 -> DEBU 15b0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.559 UTC [gossip.gossip] handleMessage -> DEBU 15b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.559 UTC [gossip.gossip] handleMessage -> DEBU 15b2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:02.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:02.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:03.914 UTC [gossip.comm] func1 -> DEBU 15b5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:03.914 UTC [gossip.gossip] handleMessage -> DEBU 15b6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:03.915 UTC [gossip.gossip] handleMessage -> DEBU 15b7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:03.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:03.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15b9 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [msp] DeserializeIdentity -> DEBU 15ba Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15bb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bc Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bd Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [cauthdsl] func1 -> DEBU 15c1 0xc0037e93a0 gate 1563590403917788500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [cauthdsl] func2 -> DEBU 15c2 0xc0037e93a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c3 0xc0037e93a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c4 0xc0037e93a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c5 0xc0037e93a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func1 -> DEBU 15c6 0xc0037e93a0 gate 1563590403917788500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func1 -> DEBU 15ca 0xc0037e9be0 gate 1563590403918507600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cb 0xc0037e9be0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cc 0xc0037e9be0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cd 0xc0037e9be0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [msp.identity] Verify -> DEBU 15ce Verify: digest = 00000000 ed a0 7b e2 02 8d a0 60 77 b3 ce d9 25 9a 9d d4 |..{....`w...%...| -peer0.org1.example.com | 00000010 32 a9 ef 45 4b 8b 7e 60 4b 2e 88 d0 60 61 03 e7 |2..EK.~`K...`a..|" -peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [msp.identity] Verify -> DEBU 15cf Verify: sig = 00000000 30 44 02 20 10 4d 8a 1f 60 6a ea e7 59 27 ed 41 |0D. .M..`j..Y'.A| -peer0.org1.example.com | 00000010 bf f4 aa 38 be 45 c1 ed 3b 4a a8 9f 92 b9 67 be |...8.E..;J....g.| -peer0.org1.example.com | 00000020 61 f6 03 e2 02 20 10 ad 2c 33 b8 fc c5 66 15 11 |a.... ..,3...f..| -peer0.org1.example.com | 00000030 6c 82 24 9d 85 fd 69 01 6d 9c 26 b5 f1 a5 d3 1d |l.$...i.m.&.....| -peer0.org1.example.com | 00000040 c0 28 b6 d6 5d 37 |.(..]7|" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [cauthdsl] func2 -> DEBU 15d0 0xc0037e9be0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [cauthdsl] func1 -> DEBU 15d1 0xc0037e9be0 gate 1563590403918507600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 15d6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d8 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d9 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15da Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15db Exiting" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 15dc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15dd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [gossip.discovery] sendMemResponse -> DEBU 15de Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15df Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15e0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15e1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [gossip.comm] Send -> DEBU 15e2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [gossip.discovery] sendMemResponse -> DEBU 15e3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\033" signature:"0D\002 U)j\326\327\304\232z\"c\313|L\216j\025@F\266V\207\313B\"\357\031\372]\354\242\020k\002 2\224J\215\361\220[\350lr\030;2x=\333\351\342DLL\274x\360\363M\244\272\004V`\362" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [gossip.comm] sendToEndpoint -> DEBU 15e4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [gossip.comm] sendToEndpoint -> DEBU 15e5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [gossip.comm] func1 -> DEBU 15e6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [gossip.gossip] handleMessage -> DEBU 15e7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [gossip.pull] HandleMessage -> DEBU 15e8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15e9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ea Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15eb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ec Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ed Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ee Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:03.924 UTC [gossip.pull] SendDigest -> DEBU 15ef Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:03.924 UTC [gossip.gossip] handleMessage -> DEBU 15f0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f1 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f3 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f5 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.comm] sendToEndpoint -> DEBU 15f7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.comm] sendToEndpoint -> DEBU 15f8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15f9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15fd Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.243 UTC [gossip.gossip] handleMessage -> DEBU 1600 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15fe Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15ff Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.244 UTC [gossip.pull] HandleMessage -> DEBU 1601 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.244 UTC [gossip.gossip] handleMessage -> DEBU 1602 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.244 UTC [gossip.gossip] handleMessage -> DEBU 1603 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.245 UTC [gossip.pull] HandleMessage -> DEBU 1604 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.245 UTC [gossip.gossip] handleMessage -> DEBU 1605 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.245 UTC [gossip.gossip] handleMessage -> DEBU 1606 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.246 UTC [gossip.pull] HandleMessage -> DEBU 1607 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.246 UTC [gossip.gossip] handleMessage -> DEBU 1608 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 1609 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:04.277 UTC [msp.identity] Sign -> DEBU 160a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151018 " -peer0.org1.example.com | "2019-07-20 02:40:04.277 UTC [msp.identity] Sign -> DEBU 160b Sign: digest: 93D1F13605203EFCFEF67678C6420F3747E27FD1936093D97526EA62CD9AE28D " -peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 160c Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [msp.identity] Sign -> DEBU 160d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [msp.identity] Sign -> DEBU 160e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 160f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [msp] DeserializeIdentity -> DEBU 1610 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 1611 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [msp] DeserializeIdentity -> DEBU 1612 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 1613 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1614 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1615 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1616 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.279 UTC [gossip.comm] sendToEndpoint -> DEBU 1617 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.comm] func1 -> DEBU 1618 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.gossip] handleMessage -> DEBU 1619 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.gossip] handleMessage -> DEBU 161a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.discovery] handleMsgFromComm -> DEBU 161b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 161c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [msp.identity] Verify -> DEBU 161d Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| -peer0.org1.example.com | 00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [msp.identity] Verify -> DEBU 161e Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| -peer0.org1.example.com | 00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| -peer0.org1.example.com | 00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| -peer0.org1.example.com | 00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| -peer0.org1.example.com | 00000040 5a b2 a9 7e 27 67 |Z..~'g|" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.discovery] handleAliveMessage -> DEBU 161f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.discovery] isSentByMe -> DEBU 1620 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.discovery] handleAliveMessage -> DEBU 1621 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1622 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [msp] DeserializeIdentity -> DEBU 1623 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1624 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1625 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1626 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1627 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1628 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1629 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 162a 0xc003e0ba00 gate 1563590404281511600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162b 0xc003e0ba00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162c 0xc003e0ba00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162d 0xc003e0ba00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162e 0xc003e0ba00 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 162f 0xc003e0ba00 gate 1563590404281511600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1630 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1631 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1632 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 1633 0xc003f84240 gate 1563590404281840000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 1634 0xc003f84240 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 1635 0xc003f84240 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [cauthdsl] func2 -> DEBU 1636 0xc003f84240 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1637 Verify: digest = 00000000 ed a0 7b e2 02 8d a0 60 77 b3 ce d9 25 9a 9d d4 |..{....`w...%...| -peer0.org1.example.com | 00000010 32 a9 ef 45 4b 8b 7e 60 4b 2e 88 d0 60 61 03 e7 |2..EK.~`K...`a..|" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1638 Verify: sig = 00000000 30 44 02 20 10 4d 8a 1f 60 6a ea e7 59 27 ed 41 |0D. .M..`j..Y'.A| -peer0.org1.example.com | 00000010 bf f4 aa 38 be 45 c1 ed 3b 4a a8 9f 92 b9 67 be |...8.E..;J....g.| -peer0.org1.example.com | 00000020 61 f6 03 e2 02 20 10 ad 2c 33 b8 fc c5 66 15 11 |a.... ..,3...f..| -peer0.org1.example.com | 00000030 6c 82 24 9d 85 fd 69 01 6d 9c 26 b5 f1 a5 d3 1d |l.$...i.m.&.....| -peer0.org1.example.com | 00000040 c0 28 b6 d6 5d 37 |.(..]7|" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [cauthdsl] func2 -> DEBU 1639 0xc003f84240 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [cauthdsl] func1 -> DEBU 163a 0xc003f84240 gate 1563590404281840000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 163f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 1640 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1641 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.comm] func1 -> DEBU 1642 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.gossip] handleMessage -> DEBU 1643 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.gossip] handleMessage -> DEBU 1644 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1645 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1646 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1647 Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| -peer0.org1.example.com | 00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1648 Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| -peer0.org1.example.com | 00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| -peer0.org1.example.com | 00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| -peer0.org1.example.com | 00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| -peer0.org1.example.com | 00000040 5a b2 a9 7e 27 67 |Z..~'g|" -peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 1649 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.283 UTC [gossip.discovery] isSentByMe -> DEBU 164a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 164b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.283 UTC [gossip.discovery] handleMsgFromComm -> DEBU 164c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.comm] sendToEndpoint -> DEBU 164d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.284 UTC [gossip.comm] sendToEndpoint -> DEBU 164e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [gossip.comm] func1 -> DEBU 164f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [gossip.gossip] handleMessage -> DEBU 1650 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [gossip.gossip] handleMessage -> DEBU 1651 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1652 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1653 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [msp.identity] Verify -> DEBU 1654 Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| -peer0.org1.example.com | 00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" -peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [msp.identity] Verify -> DEBU 1655 Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| -peer0.org1.example.com | 00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| -peer0.org1.example.com | 00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| -peer0.org1.example.com | 00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| -peer0.org1.example.com | 00000040 5a b2 a9 7e 27 67 |Z..~'g|" -peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [msp.identity] Verify -> DEBU 1656 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [msp.identity] Verify -> DEBU 1657 Verify: sig = 00000000 30 45 02 21 00 c1 8e d2 c4 0a a7 e6 72 3d a6 38 |0E.!........r=.8| -peer0.org1.example.com | 00000010 0f ed 4d f7 c8 ec bd 0a 7f 2d 0e 1f 54 d9 70 6e |..M......-..T.pn| -peer0.org1.example.com | 00000020 76 b4 c6 ca 9b 02 20 0d c8 ac 59 5e 61 b8 a8 d2 |v..... ...Y^a...| -peer0.org1.example.com | 00000030 d5 11 5d f8 4a c1 95 66 ba 70 72 58 ce 1d 8c 1e |..].J..f.prX....| -peer0.org1.example.com | 00000040 26 8a bc 78 94 f0 33 |&..x..3|" -peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 1658 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [gossip.discovery] isSentByMe -> DEBU 1659 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 165a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 165b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.362 UTC [gossip.comm] func1 -> DEBU 165c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.362 UTC [gossip.gossip] handleMessage -> DEBU 165d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.362 UTC [gossip.pull] HandleMessage -> DEBU 165e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.362 UTC [gossip.pull] SendDigest -> DEBU 165f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:04.362 UTC [gossip.gossip] handleMessage -> DEBU 1660 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.363 UTC [gossip.comm] func1 -> DEBU 1661 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.364 UTC [gossip.gossip] handleMessage -> DEBU 1662 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.365 UTC [gossip.gossip] handleMessage -> DEBU 1663 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1664 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.366 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1665 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:04.366 UTC [msp.identity] Verify -> DEBU 1666 Verify: digest = 00000000 30 9c 61 33 0d 39 d2 88 0b 7d 64 96 99 e0 6f 00 |0.a3.9...}d...o.| -peer0.org1.example.com | 00000010 a6 8d 29 70 ab 8e a8 ef d6 2f d8 b6 8b 78 a4 ac |..)p...../...x..|" -peer0.org1.example.com | "2019-07-20 02:40:04.367 UTC [msp.identity] Verify -> DEBU 1667 Verify: sig = 00000000 30 44 02 20 66 67 dc 1d 84 59 fd 04 16 c6 d1 2a |0D. fg...Y.....*| -peer0.org1.example.com | 00000010 56 a8 c8 ec f2 6b 9d f0 c1 44 a3 35 1f 7e be 31 |V....k...D.5.~.1| -peer0.org1.example.com | 00000020 87 c0 51 9c 02 20 69 67 b6 4d 54 b7 80 c8 00 48 |..Q.. ig.MT....H| -peer0.org1.example.com | 00000030 87 18 f4 2a 54 93 fb cf a2 9d 1d ee a2 47 cd 75 |...*T........G.u| -peer0.org1.example.com | 00000040 d7 40 36 01 9e 5d |.@6..]|" -peer0.org1.example.com | "2019-07-20 02:40:04.367 UTC [msp.identity] Verify -> DEBU 1668 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:04.369 UTC [msp.identity] Verify -> DEBU 1669 Verify: sig = 00000000 30 45 02 21 00 d7 a7 57 78 82 88 75 6e 35 1a 0b |0E.!...Wx..un5..| -peer0.org1.example.com | 00000010 ce 35 8a 83 35 96 a8 d0 ca f2 f0 70 9f 21 0b 28 |.5..5......p.!.(| -peer0.org1.example.com | 00000020 03 ca 0b 36 18 02 20 61 8a 8b 77 39 f4 77 9c 86 |...6.. a..w9.w..| -peer0.org1.example.com | 00000030 09 f2 3c a7 e0 5f 73 56 4c 38 99 d1 b7 25 d0 6a |..<.._sVL8...%.j| -peer0.org1.example.com | 00000040 93 11 2e 59 e1 fa e1 |...Y...|" -peer0.org1.example.com | "2019-07-20 02:40:04.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 166a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 166b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:04.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 166c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.371 UTC [gossip.discovery] handleAliveMessage -> DEBU 1670 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.372 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1671 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.372 UTC [gossip.discovery] sendMemResponse -> DEBU 1672 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:04.372 UTC [msp] DeserializeIdentity -> DEBU 1673 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.372 UTC [msp] DeserializeIdentity -> DEBU 1674 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.373 UTC [gossip.comm] Send -> DEBU 1675 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:04.373 UTC [gossip.discovery] sendMemResponse -> DEBU 1676 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > alive: " -peer0.org1.example.com | "2019-07-20 02:40:04.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1677 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.374 UTC [gossip.comm] sendToEndpoint -> DEBU 1678 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [gossip.comm] func1 -> DEBU 1679 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [gossip.gossip] handleMessage -> DEBU 167a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [gossip.pull] HandleMessage -> DEBU 167b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 1680 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 1681 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [gossip.pull] SendDigest -> DEBU 1682 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [gossip.gossip] handleMessage -> DEBU 1683 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.547 UTC [gossip.comm] func1 -> DEBU 1684 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.548 UTC [gossip.gossip] handleMessage -> DEBU 1685 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.548 UTC [gossip.gossip] handleMessage -> DEBU 1686 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1687 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.548 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1688 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:04.549 UTC [msp] DeserializeIdentity -> DEBU 1689 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.549 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 168a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:04.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 168b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.550 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 168c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.550 UTC [policies] Evaluate -> DEBU 168d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.550 UTC [policies] Evaluate -> DEBU 168e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:04.551 UTC [policies] Evaluate -> DEBU 168f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.551 UTC [cauthdsl] func1 -> DEBU 1690 0xc0030b0240 gate 1563590404551482900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.551 UTC [cauthdsl] func2 -> DEBU 1691 0xc0030b0240 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1692 0xc0030b0240 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1693 0xc0030b0240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1694 0xc0030b0240 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.552 UTC [cauthdsl] func1 -> DEBU 1695 0xc0030b0240 gate 1563590404551482900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1696 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1697 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1698 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.553 UTC [cauthdsl] func1 -> DEBU 1699 0xc0030b0a80 gate 1563590404553822100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169a 0xc0030b0a80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169b 0xc0030b0a80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169c 0xc0030b0a80 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.555 UTC [msp.identity] Verify -> DEBU 169d Verify: digest = 00000000 9a 13 10 4b 51 eb b5 b0 d6 3e 7e d2 f8 2c 85 f6 |...KQ....>~..,..| -peer0.org1.example.com | 00000010 c2 e2 82 51 f4 47 c9 85 c8 16 41 f8 c6 cf 4f 52 |...Q.G....A...OR|" -peer0.org1.example.com | "2019-07-20 02:40:04.555 UTC [msp.identity] Verify -> DEBU 169e Verify: sig = 00000000 30 44 02 20 49 d9 c5 d5 a7 f6 d5 1c ea ec 58 44 |0D. I.........XD| -peer0.org1.example.com | 00000010 d8 21 7c 49 ea cc ab d9 3d 7b 34 06 c3 87 6f e9 |.!|I....={4...o.| -peer0.org1.example.com | 00000020 a7 24 6a 4d 02 20 7e e0 73 cb 60 73 7b 79 03 58 |.$jM. ~.s.`s{y.X| -peer0.org1.example.com | 00000030 b7 8d fd d8 62 61 30 cb 2d d1 76 bb 03 a6 27 77 |....ba0.-.v...'w| -peer0.org1.example.com | 00000040 ea 97 9e 04 9f af |......|" -peer0.org1.example.com | "2019-07-20 02:40:04.556 UTC [cauthdsl] func2 -> DEBU 169f 0xc0030b0a80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.556 UTC [cauthdsl] func1 -> DEBU 16a0 0xc0030b0a80 gate 1563590404553822100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.557 UTC [policies] Evaluate -> DEBU 16a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.557 UTC [gossip.discovery] handleAliveMessage -> DEBU 16a5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.557 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a7 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a8 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16aa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 16ab Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16ac Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.559 UTC [gossip.discovery] sendMemResponse -> DEBU 16ad Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:04.559 UTC [msp] DeserializeIdentity -> DEBU 16ae Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.560 UTC [msp] DeserializeIdentity -> DEBU 16af Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.560 UTC [msp] DeserializeIdentity -> DEBU 16b0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.560 UTC [gossip.comm] Send -> DEBU 16b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:04.560 UTC [gossip.discovery] sendMemResponse -> DEBU 16b2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:04.560 UTC [gossip.comm] sendToEndpoint -> DEBU 16b3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.561 UTC [gossip.comm] sendToEndpoint -> DEBU 16b4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [msp] DeserializeIdentity -> DEBU 16b5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [msp] DeserializeIdentity -> DEBU 16b6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] Send -> DEBU 16b7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16b9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16ba Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16b8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.719 UTC [gossip.comm] func1 -> DEBU 16be Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.720 UTC [gossip.gossip] handleMessage -> DEBU 16c0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.720 UTC [msp] DeserializeIdentity -> DEBU 16c2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.720 UTC [gossip.comm] func1 -> DEBU 16c1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.719 UTC [gossip.comm] func1 -> DEBU 16bf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.721 UTC [msp] DeserializeIdentity -> DEBU 16c3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.721 UTC [msp] DeserializeIdentity -> DEBU 16c4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16c5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16c6 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16c7 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.722 UTC [policies] Evaluate -> DEBU 16c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.723 UTC [policies] Evaluate -> DEBU 16c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:04.723 UTC [policies] Evaluate -> DEBU 16ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.723 UTC [cauthdsl] func1 -> DEBU 16cb 0xc00333b930 gate 1563590404723377000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.726 UTC [cauthdsl] func2 -> DEBU 16cc 0xc00333b930 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.726 UTC [cauthdsl] func2 -> DEBU 16cd 0xc00333b930 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.727 UTC [cauthdsl] func2 -> DEBU 16ce 0xc00333b930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:04.727 UTC [cauthdsl] func2 -> DEBU 16cf 0xc00333b930 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.728 UTC [cauthdsl] func1 -> DEBU 16d0 0xc00333b930 gate 1563590404723377000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.729 UTC [cauthdsl] func1 -> DEBU 16d4 0xc0033ec170 gate 1563590404729020200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d5 0xc0033ec170 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d6 0xc0033ec170 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d7 0xc0033ec170 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.729 UTC [msp.identity] Verify -> DEBU 16d8 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:04.730 UTC [msp.identity] Verify -> DEBU 16d9 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:04.730 UTC [cauthdsl] func2 -> DEBU 16da 0xc0033ec170 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.730 UTC [cauthdsl] func1 -> DEBU 16db 0xc0033ec170 gate 1563590404729020200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:04.730 UTC [policies] Evaluate -> DEBU 16dc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16de Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.732 UTC [msp.identity] Verify -> DEBU 16e0 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:04.732 UTC [msp.identity] Verify -> DEBU 16e1 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:04.733 UTC [msp] DeserializeIdentity -> DEBU 16e2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.733 UTC [msp] DeserializeIdentity -> DEBU 16e3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.733 UTC [gossip.pull] Hello -> DEBU 16e4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:04.734 UTC [msp] DeserializeIdentity -> DEBU 16e5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.734 UTC [msp] DeserializeIdentity -> DEBU 16e6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.734 UTC [gossip.comm] Send -> DEBU 16e7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:04.734 UTC [gossip.comm] sendToEndpoint -> DEBU 16e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.734 UTC [gossip.comm] sendToEndpoint -> DEBU 16e9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.735 UTC [gossip.comm] func1 -> DEBU 16ea Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.735 UTC [msp.identity] Verify -> DEBU 16eb Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:04.736 UTC [msp.identity] Verify -> DEBU 16ec Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:04.737 UTC [msp] DeserializeIdentity -> DEBU 16ed Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.738 UTC [msp] DeserializeIdentity -> DEBU 16ee Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.738 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:04.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16f0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16f1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.739 UTC [policies] Evaluate -> DEBU 16f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.740 UTC [policies] Evaluate -> DEBU 16f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:04.740 UTC [policies] Evaluate -> DEBU 16f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.741 UTC [cauthdsl] func1 -> DEBU 16f5 0xc003976780 gate 1563590404741004700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f6 0xc003976780 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f7 0xc003976780 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f8 0xc003976780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:04.742 UTC [cauthdsl] func2 -> DEBU 16f9 0xc003976780 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.742 UTC [cauthdsl] func1 -> DEBU 16fa 0xc003976780 gate 1563590404741004700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.742 UTC [policies] Evaluate -> DEBU 16fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.743 UTC [policies] Evaluate -> DEBU 16fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.743 UTC [policies] Evaluate -> DEBU 16fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.744 UTC [cauthdsl] func1 -> DEBU 16fe 0xc003976fc0 gate 1563590404743984100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.744 UTC [cauthdsl] func2 -> DEBU 16ff 0xc003976fc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.744 UTC [cauthdsl] func2 -> DEBU 1700 0xc003976fc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.745 UTC [cauthdsl] func2 -> DEBU 1701 0xc003976fc0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.745 UTC [msp.identity] Verify -> DEBU 1702 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:04.746 UTC [msp.identity] Verify -> DEBU 1703 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:04.747 UTC [cauthdsl] func2 -> DEBU 1704 0xc003976fc0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.747 UTC [cauthdsl] func1 -> DEBU 1705 0xc003976fc0 gate 1563590404743984100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:04.747 UTC [policies] Evaluate -> DEBU 1706 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1707 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1708 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1709 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.748 UTC [gossip.gossip] handleMessage -> DEBU 170a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.749 UTC [gossip.gossip] handleMessage -> DEBU 170b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.749 UTC [msp] DeserializeIdentity -> DEBU 170c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.749 UTC [msp] DeserializeIdentity -> DEBU 170d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.750 UTC [msp] DeserializeIdentity -> DEBU 170e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 170f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:04.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1710 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1711 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.753 UTC [policies] Evaluate -> DEBU 1712 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.754 UTC [policies] Evaluate -> DEBU 1713 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:04.754 UTC [policies] Evaluate -> DEBU 1714 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.754 UTC [cauthdsl] func1 -> DEBU 1715 0xc003a36ad0 gate 1563590404754449500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.754 UTC [cauthdsl] func2 -> DEBU 1716 0xc003a36ad0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.754 UTC [cauthdsl] func2 -> DEBU 1717 0xc003a36ad0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [cauthdsl] func2 -> DEBU 1718 0xc003a36ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [cauthdsl] func2 -> DEBU 1719 0xc003a36ad0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [cauthdsl] func1 -> DEBU 171a 0xc003a36ad0 gate 1563590404754449500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.756 UTC [cauthdsl] func1 -> DEBU 171e 0xc003a37310 gate 1563590404756180200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 171f 0xc003a37310 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 1720 0xc003a37310 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 1721 0xc003a37310 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.757 UTC [msp.identity] Verify -> DEBU 1722 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:04.758 UTC [msp.identity] Verify -> DEBU 1723 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:04.758 UTC [cauthdsl] func2 -> DEBU 1724 0xc003a37310 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.758 UTC [cauthdsl] func1 -> DEBU 1725 0xc003a37310 gate 1563590404756180200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:04.758 UTC [policies] Evaluate -> DEBU 1726 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1727 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1728 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1729 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.759 UTC [msp.identity] Verify -> DEBU 172a Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:04.759 UTC [msp.identity] Verify -> DEBU 172b Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:04.760 UTC [msp] DeserializeIdentity -> DEBU 172c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.760 UTC [msp] DeserializeIdentity -> DEBU 172d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 172e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 172f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1730 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.761 UTC [policies] Evaluate -> DEBU 1731 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.761 UTC [policies] Evaluate -> DEBU 1732 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:04.762 UTC [policies] Evaluate -> DEBU 1733 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.762 UTC [cauthdsl] func1 -> DEBU 1734 0xc003a81200 gate 1563590404762213800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1735 0xc003a81200 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1736 0xc003a81200 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1737 0xc003a81200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:04.763 UTC [cauthdsl] func2 -> DEBU 1738 0xc003a81200 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.763 UTC [cauthdsl] func1 -> DEBU 1739 0xc003a81200 gate 1563590404762213800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.764 UTC [cauthdsl] func1 -> DEBU 173d 0xc003a81a40 gate 1563590404764229700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 173e 0xc003a81a40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 173f 0xc003a81a40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 1740 0xc003a81a40 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.766 UTC [msp.identity] Verify -> DEBU 1741 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:04.766 UTC [msp.identity] Verify -> DEBU 1742 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:04.766 UTC [cauthdsl] func2 -> DEBU 1743 0xc003a81a40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.767 UTC [cauthdsl] func1 -> DEBU 1744 0xc003a81a40 gate 1563590404764229700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1745 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1746 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1747 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1748 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.768 UTC [msp.identity] Verify -> DEBU 1749 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:04.769 UTC [msp.identity] Verify -> DEBU 174a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:04.769 UTC [gossip.gossip] handleMessage -> DEBU 174b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.769 UTC [gossip.gossip] handleMessage -> DEBU 174c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174d Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174e Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174f Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:04.771 UTC [msp.identity] Verify -> DEBU 1750 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:04.771 UTC [msp] DeserializeIdentity -> DEBU 1751 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.771 UTC [msp] DeserializeIdentity -> DEBU 1752 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1753 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1754 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1755 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.773 UTC [policies] Evaluate -> DEBU 1756 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.774 UTC [policies] Evaluate -> DEBU 1757 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:04.775 UTC [policies] Evaluate -> DEBU 1758 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.775 UTC [cauthdsl] func1 -> DEBU 1759 0xc003dfe9b0 gate 1563590404775612700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.775 UTC [cauthdsl] func2 -> DEBU 175a 0xc003dfe9b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175b 0xc003dfe9b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175c 0xc003dfe9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175d 0xc003dfe9b0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.777 UTC [cauthdsl] func1 -> DEBU 175e 0xc003dfe9b0 gate 1563590404775612700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 175f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 1760 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.777 UTC [cauthdsl] func1 -> DEBU 1762 0xc003dff1f0 gate 1563590404777929000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1763 0xc003dff1f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1764 0xc003dff1f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1765 0xc003dff1f0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.778 UTC [msp.identity] Verify -> DEBU 1766 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:04.779 UTC [msp.identity] Verify -> DEBU 1767 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:04.779 UTC [cauthdsl] func2 -> DEBU 1768 0xc003dff1f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.779 UTC [cauthdsl] func1 -> DEBU 1769 0xc003dff1f0 gate 1563590404777929000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:04.779 UTC [policies] Evaluate -> DEBU 176a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.780 UTC [policies] Evaluate -> DEBU 176b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.780 UTC [policies] Evaluate -> DEBU 176c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.781 UTC [policies] Evaluate -> DEBU 176d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.781 UTC [msp] DeserializeIdentity -> DEBU 176e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.781 UTC [msp] DeserializeIdentity -> DEBU 176f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1770 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1771 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1772 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1773 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1774 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1775 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.783 UTC [cauthdsl] func1 -> DEBU 1776 0xc003f6e9c0 gate 1563590404783062200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.783 UTC [cauthdsl] func2 -> DEBU 1777 0xc003f6e9c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 1778 0xc003f6e9c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 1779 0xc003f6e9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 177a 0xc003f6e9c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.787 UTC [cauthdsl] func1 -> DEBU 177b 0xc003f6e9c0 gate 1563590404783062200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:04.787 UTC [policies] Evaluate -> DEBU 177c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [policies] Evaluate -> DEBU 177d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [policies] Evaluate -> DEBU 177e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [cauthdsl] func1 -> DEBU 177f 0xc003f6f200 gate 1563590404788468000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1780 0xc003f6f200 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1781 0xc003f6f200 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1782 0xc003f6f200 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.789 UTC [msp.identity] Verify -> DEBU 1783 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:04.789 UTC [msp.identity] Verify -> DEBU 1784 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:04.789 UTC [cauthdsl] func2 -> DEBU 1785 0xc003f6f200 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:04.789 UTC [cauthdsl] func1 -> DEBU 1786 0xc003f6f200 gate 1563590404788468000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1787 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1788 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1789 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 178a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [gossip.gossip] handleMessage -> DEBU 178b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [gossip.gossip] handleMessage -> DEBU 178c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.791 UTC [gossip.pull] HandleMessage -> DEBU 178d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.791 UTC [gossip.gossip] handleMessage -> DEBU 178e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.877 UTC [gossip.comm] func1 -> DEBU 178f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.877 UTC [gossip.gossip] handleMessage -> DEBU 1790 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.877 UTC [msp] DeserializeIdentity -> DEBU 1791 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.878 UTC [msp] DeserializeIdentity -> DEBU 1792 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:04.878 UTC [gossip.gossip] handleMessage -> DEBU 1793 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:04.895 UTC [gossip.comm] func1 -> DEBU 1794 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.895 UTC [gossip.gossip] handleMessage -> DEBU 1795 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.896 UTC [gossip.pull] HandleMessage -> DEBU 1796 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:04.896 UTC [gossip.pull] SendDigest -> DEBU 1797 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:04.896 UTC [gossip.gossip] handleMessage -> DEBU 1798 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:05.042 UTC [gossip.comm] func1 -> DEBU 1799 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:05.042 UTC [gossip.gossip] handleMessage -> DEBU 179a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:05.043 UTC [gossip.gossip] handleMessage -> DEBU 179e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:05.182 UTC [gossip.comm] func1 -> DEBU 179f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:05.182 UTC [gossip.gossip] handleMessage -> DEBU 17a0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:05.182 UTC [msp] DeserializeIdentity -> DEBU 17a1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:05.183 UTC [msp] DeserializeIdentity -> DEBU 17a2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:05.183 UTC [msp] DeserializeIdentity -> DEBU 17a3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:05.183 UTC [gossip.gossip] handleMessage -> DEBU 17a4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.753 UTC [gossip.election] waitForInterrupt -> DEBU 17a5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.754 UTC [gossip.election] IsLeader -> DEBU 17a6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:06.754 UTC [msp] GetDefaultSigningIdentity -> DEBU 17a7 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:06.755 UTC [msp.identity] Sign -> DEBU 17a8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510061801 " -peer0.org1.example.com | "2019-07-20 02:40:06.755 UTC [msp.identity] Sign -> DEBU 17a9 Sign: digest: 0A2417D6F32F0145DB5A6AD97AF07578F0DC3B14FDE2F95001B604A62A4FEC0B " -peer0.org1.example.com | "2019-07-20 02:40:06.756 UTC [gossip.election] waitForInterrupt -> DEBU 17aa c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:06.765 UTC [msp] DeserializeIdentity -> DEBU 17ab Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.765 UTC [msp] DeserializeIdentity -> DEBU 17ac Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17ad Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17ae Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [gossip.comm] Send -> DEBU 17af Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17b0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17b1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [gossip.comm] sendToEndpoint -> DEBU 17b2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [gossip.comm] sendToEndpoint -> DEBU 17b3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.912 UTC [gossip.comm] func1 -> DEBU 17b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [gossip.gossip] handleMessage -> DEBU 17b5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [gossip.gossip] handleMessage -> DEBU 17b6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17b8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [msp] DeserializeIdentity -> DEBU 17b9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17bb Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17bc Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func1 -> DEBU 17c0 0xc00285b7b0 gate 1563590406916398500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c1 0xc00285b7b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c2 0xc00285b7b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c3 0xc00285b7b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c4 0xc00285b7b0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func1 -> DEBU 17c5 0xc00285b7b0 gate 1563590406916398500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [cauthdsl] func1 -> DEBU 17c9 0xc00285bff0 gate 1563590406917178300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17ca 0xc00285bff0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17cb 0xc00285bff0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17cc 0xc00285bff0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [msp.identity] Verify -> DEBU 17cd Verify: digest = 00000000 ab 03 83 d7 43 bb 1b 61 cb e1 88 ca 40 df 51 86 |....C..a....@.Q.| -peer0.org1.example.com | 00000010 59 ab 66 81 d9 42 04 49 40 b1 0d cc a6 19 ef 83 |Y.f..B.I@.......|" -peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [msp.identity] Verify -> DEBU 17ce Verify: sig = 00000000 30 44 02 20 47 1b 2a a9 f8 00 a5 85 82 52 d9 32 |0D. G.*......R.2| -peer0.org1.example.com | 00000010 00 d7 35 a3 07 ab 35 92 0a 14 ed 05 56 99 32 2f |..5...5.....V.2/| -peer0.org1.example.com | 00000020 1a 0e 68 72 02 20 44 ca ce 45 de f0 b2 32 75 65 |..hr. D..E...2ue| -peer0.org1.example.com | 00000030 d3 aa 99 f7 5c f2 f4 64 d2 51 4b 03 8c 4d d3 a2 |....\..d.QK..M..| -peer0.org1.example.com | 00000040 e6 f9 a9 92 f0 a0 |......|" -peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [cauthdsl] func2 -> DEBU 17cf 0xc00285bff0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [cauthdsl] func1 -> DEBU 17d0 0xc00285bff0 gate 1563590406917178300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 17d5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d7 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d8 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:06.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:06.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 17da Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 17db Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17dc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [gossip.comm] func1 -> DEBU 17dd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [gossip.gossip] handleMessage -> DEBU 17de Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [gossip.gossip] handleMessage -> DEBU 17df Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [msp] DeserializeIdentity -> DEBU 17e2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [msp] DeserializeIdentity -> DEBU 17e3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [gossip.comm] Send -> DEBU 17e8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17ea Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [gossip.comm] Send -> DEBU 17eb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ed Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ef Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.928 UTC [gossip.comm] func1 -> DEBU 17f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.929 UTC [gossip.gossip] handleMessage -> DEBU 17f1 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.929 UTC [gossip.gossip] handleMessage -> DEBU 17f2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:06.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:06.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f5 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:07.233 UTC [msp.identity] Sign -> DEBU 17f6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151019 " -peer0.org1.example.com | "2019-07-20 02:40:07.233 UTC [msp.identity] Sign -> DEBU 17f7 Sign: digest: A5E5D6E64F8F6C1FAA2BC3C99B4B9AF3B3BA328A9870DDA72718709F7712B546 " -peer0.org1.example.com | "2019-07-20 02:40:07.234 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f8 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:07.234 UTC [msp.identity] Sign -> DEBU 17f9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:07.234 UTC [msp.identity] Sign -> DEBU 17fa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:07.234 UTC [gossip.discovery] periodicalSendAlive -> DEBU 17fb Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:07.237 UTC [msp] DeserializeIdentity -> DEBU 17fc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.238 UTC [msp] DeserializeIdentity -> DEBU 17fd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.238 UTC [gossip.comm] Send -> DEBU 17fe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:07.239 UTC [msp] DeserializeIdentity -> DEBU 17ff Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.239 UTC [gossip.comm] Send -> DEBU 1801 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:07.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1800 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.240 UTC [gossip.comm] sendToEndpoint -> DEBU 1802 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.240 UTC [msp] DeserializeIdentity -> DEBU 1803 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.240 UTC [gossip.comm] Send -> DEBU 1804 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1805 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1806 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1807 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1808 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [gossip.comm] func1 -> DEBU 1809 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [gossip.gossip] handleMessage -> DEBU 180a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [gossip.gossip] handleMessage -> DEBU 180b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 180c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 180d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [msp.identity] Verify -> DEBU 180e Verify: digest = 00000000 2b 9e 49 fe 26 11 78 34 3b 01 7f 16 c9 58 7f 1e |+.I.&.x4;....X..| -peer0.org1.example.com | 00000010 3a 8e 0c 07 25 a0 b2 47 0a 25 8f d9 76 80 4b df |:...%..G.%..v.K.|" -peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [msp.identity] Verify -> DEBU 180f Verify: sig = 00000000 30 44 02 20 68 82 53 1c d9 3b 2c 2e a0 79 ec 11 |0D. h.S..;,..y..| -peer0.org1.example.com | 00000010 ec 2f d5 58 98 b9 1f de 94 04 05 19 9e 95 f6 94 |./.X............| -peer0.org1.example.com | 00000020 3d b3 48 6e 02 20 19 5a 3d 37 bc 13 93 03 49 4b |=.Hn. .Z=7....IK| -peer0.org1.example.com | 00000030 e8 10 46 6b 7a f1 a2 2b 74 55 96 04 95 17 34 4b |..Fkz..+tU....4K| -peer0.org1.example.com | 00000040 e4 f9 7b ba 1c fa |..{...|" -peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 1810 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1811 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1812 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1813 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1814 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1815 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 1816 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1817 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 1818 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 1819 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 181a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.367 UTC [gossip.comm] Send -> DEBU 181b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 181c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.368 UTC [gossip.comm] Send -> DEBU 181d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 181e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 181f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 1820 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 1821 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.369 UTC [gossip.comm] func1 -> DEBU 1822 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.369 UTC [gossip.gossip] handleMessage -> DEBU 1823 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.370 UTC [gossip.gossip] handleMessage -> DEBU 1824 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1825 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1826 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.375 UTC [gossip.comm] func1 -> DEBU 1827 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.375 UTC [gossip.gossip] handleMessage -> DEBU 1828 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.375 UTC [gossip.gossip] handleMessage -> DEBU 1829 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.543 UTC [gossip.comm] func1 -> DEBU 182c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.543 UTC [gossip.gossip] handleMessage -> DEBU 182d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.543 UTC [gossip.gossip] handleMessage -> DEBU 182e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1830 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [msp] DeserializeIdentity -> DEBU 1831 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1832 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1833 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1834 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1835 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1836 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1837 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [cauthdsl] func1 -> DEBU 1838 0xc0037cfbc0 gate 1563590407544965200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1839 0xc0037cfbc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183a 0xc0037cfbc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183b 0xc0037cfbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183c 0xc0037cfbc0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 183d 0xc0037cfbc0 gate 1563590407544965200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 183e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 183f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 1840 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 1841 0xc003dda400 gate 1563590407545389000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1842 0xc003dda400 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1843 0xc003dda400 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1844 0xc003dda400 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [msp.identity] Verify -> DEBU 1845 Verify: digest = 00000000 89 ef ec b6 d9 de 0e eb ae 8e 81 ef af 84 9e ee |................| -peer0.org1.example.com | 00000010 36 ac a6 04 33 0e 2b 52 4d b9 2c 34 25 7e 0a 7c |6...3.+RM.,4%~.||" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [msp.identity] Verify -> DEBU 1846 Verify: sig = 00000000 30 45 02 21 00 ce e7 5e 5d de 20 4b c4 44 7d 85 |0E.!...^]. K.D}.| -peer0.org1.example.com | 00000010 7a a7 49 0c 59 30 fe f8 b8 99 6b 30 a8 dd de 6a |z.I.Y0....k0...j| -peer0.org1.example.com | 00000020 eb 3f 63 a1 7b 02 20 4b 7d d1 a3 68 c7 5b e9 06 |.?c.{. K}..h.[..| -peer0.org1.example.com | 00000030 e1 73 36 2b 25 f4 4e a5 b0 84 a6 e8 65 63 83 b1 |.s6+%.N.....ec..| -peer0.org1.example.com | 00000040 c6 dc 03 7b 71 3b a0 |...{q;.|" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1847 0xc003dda400 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 1848 0xc003dda400 gate 1563590407545389000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 1849 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 184d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 184e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 184f updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.comm] func1 -> DEBU 1850 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.gossip] handleMessage -> DEBU 1851 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1852 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1853 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1854 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 1855 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1856 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.549 UTC [gossip.gossip] handleMessage -> DEBU 1857 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1858 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1859 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.557 UTC [gossip.comm] func1 -> DEBU 185a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.558 UTC [gossip.gossip] handleMessage -> DEBU 185c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.559 UTC [gossip.gossip] handleMessage -> DEBU 185d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.557 UTC [msp] DeserializeIdentity -> DEBU 185b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.569 UTC [msp] DeserializeIdentity -> DEBU 185e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 185f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1860 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1861 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1862 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [gossip.comm] Send -> DEBU 1863 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1864 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1865 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [gossip.comm] Send -> DEBU 1866 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [gossip.comm] sendToEndpoint -> DEBU 1867 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [gossip.comm] sendToEndpoint -> DEBU 1868 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.571 UTC [gossip.comm] sendToEndpoint -> DEBU 1869 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.571 UTC [gossip.comm] sendToEndpoint -> DEBU 186a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 186b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.590 UTC [gossip.discovery] handleMsgFromComm -> DEBU 186c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.915 UTC [gossip.comm] func1 -> DEBU 186d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [gossip.gossip] handleMessage -> DEBU 186e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [gossip.gossip] handleMessage -> DEBU 186f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1870 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1871 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [msp] DeserializeIdentity -> DEBU 1872 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1873 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1874 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1875 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [policies] Evaluate -> DEBU 1876 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [policies] Evaluate -> DEBU 1877 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1878 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1879 0xc0004f5660 gate 1563590407917042800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187a 0xc0004f5660 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187b 0xc0004f5660 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187c 0xc0004f5660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187d 0xc0004f5660 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 187e 0xc0004f5660 gate 1563590407917042800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 187f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1880 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1881 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1882 0xc0004f5ea0 gate 1563590407917520700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1883 0xc0004f5ea0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1884 0xc0004f5ea0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1885 0xc0004f5ea0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [msp.identity] Verify -> DEBU 1886 Verify: digest = 00000000 90 ad 86 40 6a f3 ad 1a e8 ec 59 b7 18 e6 d4 14 |...@j.....Y.....| -peer0.org1.example.com | 00000010 db 33 79 7f 58 75 39 c1 a1 15 89 cb 0f b2 1c 31 |.3y.Xu9........1|" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [msp.identity] Verify -> DEBU 1887 Verify: sig = 00000000 30 44 02 20 07 ac d3 01 f1 a2 2b 72 7a 68 40 68 |0D. ......+rzh@h| -peer0.org1.example.com | 00000010 76 d0 4d 51 aa 3b de 04 f8 e4 f6 ec 54 82 4f 1b |v.MQ.;......T.O.| -peer0.org1.example.com | 00000020 9f e2 c8 4d 02 20 1d 0e 06 07 f2 ad 93 6b 14 69 |...M. .......k.i| -peer0.org1.example.com | 00000030 bd 8c d8 14 2c fe 35 53 de 54 b8 27 65 b9 78 cf |....,.5S.T.'e.x.| -peer0.org1.example.com | 00000040 bf 3b 9d dd 7b 8e |.;..{.|" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1888 0xc0004f5ea0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1889 0xc0004f5ea0 gate 1563590407917520700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 188a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 188e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 188f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1890 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1891 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1892 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1893 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 1894 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1895 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] sendMemResponse -> DEBU 1896 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1897 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1898 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1899 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.comm] Send -> DEBU 189a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] sendMemResponse -> DEBU 189b Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\035" signature:"0D\002 h\202S\034\331;,.\240y\354\021\354/\325X\230\271\037\336\224\004\005\031\236\225\366\224=\263Hn\002 \031Z=7\274\023\223\003IK\350\020Fkz\361\242+tU\226\004\225\0274K\344\371{\272\034\372" > alive: " -peer0.org1.example.com | "2019-07-20 02:40:07.919 UTC [gossip.comm] sendToEndpoint -> DEBU 189c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.919 UTC [gossip.comm] sendToEndpoint -> DEBU 189d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:07.923 UTC [gossip.comm] func1 -> DEBU 189e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.923 UTC [gossip.gossip] handleMessage -> DEBU 189f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.924 UTC [gossip.pull] HandleMessage -> DEBU 18a0 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:07.925 UTC [gossip.pull] SendDigest -> DEBU 18a7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:07.926 UTC [gossip.gossip] handleMessage -> DEBU 18a8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.242 UTC [gossip.pull] Hello -> DEBU 18a9 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:08.242 UTC [gossip.comm] Send -> DEBU 18aa Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:08.242 UTC [gossip.comm] sendToEndpoint -> DEBU 18ab Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.242 UTC [gossip.comm] sendToEndpoint -> DEBU 18ac Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.243 UTC [gossip.pull] Hello -> DEBU 18ad Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:08.243 UTC [gossip.comm] Send -> DEBU 18ae Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:08.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18af Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18b0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.245 UTC [gossip.comm] func1 -> DEBU 18b1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.246 UTC [gossip.gossip] handleMessage -> DEBU 18b3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.247 UTC [gossip.pull] HandleMessage -> DEBU 18b4 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.246 UTC [gossip.comm] func1 -> DEBU 18b2 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.244 UTC [gossip.pull] Hello -> DEBU 18b5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:08.248 UTC [gossip.comm] Send -> DEBU 18b6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:08.248 UTC [gossip.gossip] handleMessage -> DEBU 18b7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 18b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.249 UTC [gossip.comm] sendToEndpoint -> DEBU 18b9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.249 UTC [gossip.gossip] handleMessage -> DEBU 18ba Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.249 UTC [gossip.pull] HandleMessage -> DEBU 18bb GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.250 UTC [gossip.comm] func1 -> DEBU 18bc Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.249 UTC [gossip.gossip] handleMessage -> DEBU 18bd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.251 UTC [gossip.gossip] handleMessage -> DEBU 18be Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.251 UTC [gossip.pull] HandleMessage -> DEBU 18bf GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.251 UTC [gossip.gossip] handleMessage -> DEBU 18c0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 18c1 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:08.281 UTC [msp.identity] Sign -> DEBU 18c2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101A " -peer0.org1.example.com | "2019-07-20 02:40:08.281 UTC [msp.identity] Sign -> DEBU 18c3 Sign: digest: 15F5DB7AEF8341246A2BBC7FC964B30DB177647422188189177BD277A67DE900 " -peer0.org1.example.com | "2019-07-20 02:40:08.281 UTC [msp] GetDefaultSigningIdentity -> DEBU 18c4 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:08.282 UTC [msp.identity] Sign -> DEBU 18c5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:08.282 UTC [msp.identity] Sign -> DEBU 18c6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:08.283 UTC [gossip.comm] Send -> DEBU 18c7 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:08.284 UTC [gossip.comm] sendToEndpoint -> DEBU 18c8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.284 UTC [gossip.comm] sendToEndpoint -> DEBU 18c9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.284 UTC [msp] DeserializeIdentity -> DEBU 18ca Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.285 UTC [gossip.comm] Send -> DEBU 18cb Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:08.285 UTC [msp] DeserializeIdentity -> DEBU 18cc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.286 UTC [gossip.comm] sendToEndpoint -> DEBU 18cd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.286 UTC [gossip.comm] sendToEndpoint -> DEBU 18ce Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.287 UTC [gossip.comm] func1 -> DEBU 18cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.287 UTC [gossip.gossip] handleMessage -> DEBU 18d0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.287 UTC [gossip.gossip] handleMessage -> DEBU 18d1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18d3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:08.289 UTC [msp.identity] Verify -> DEBU 18d4 Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| -peer0.org1.example.com | 00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" -peer0.org1.example.com | "2019-07-20 02:40:08.289 UTC [msp.identity] Verify -> DEBU 18d5 Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| -peer0.org1.example.com | 00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| -peer0.org1.example.com | 00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| -peer0.org1.example.com | 00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| -peer0.org1.example.com | 00000040 57 8d 5b 84 9d 85 |W.[...|" -peer0.org1.example.com | "2019-07-20 02:40:08.290 UTC [gossip.comm] Send -> DEBU 18d6 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:08.290 UTC [gossip.comm] sendToEndpoint -> DEBU 18d7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.290 UTC [gossip.comm] sendToEndpoint -> DEBU 18d8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.291 UTC [msp.identity] Verify -> DEBU 18d9 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:08.291 UTC [msp.identity] Verify -> DEBU 18da Verify: sig = 00000000 30 44 02 20 74 eb 3c 0c 7c c3 90 9e 45 15 01 99 |0D. t.<.|...E...| -peer0.org1.example.com | 00000010 dd 06 cc c3 60 41 fa 97 b9 82 48 9d f4 11 28 00 |....`A....H...(.| -peer0.org1.example.com | 00000020 b5 48 cc 08 02 20 5a 13 df a9 89 2f b2 65 11 ea |.H... Z..../.e..| -peer0.org1.example.com | 00000030 a4 39 33 13 0d 1b ba ac 0e 2a 1d 37 dc e0 c6 4d |.93......*.7...M| -peer0.org1.example.com | 00000040 d5 14 8c 44 a2 85 |...D..|" -peer0.org1.example.com | "2019-07-20 02:40:08.293 UTC [gossip.discovery] handleAliveMessage -> DEBU 18db Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.293 UTC [gossip.discovery] isSentByMe -> DEBU 18dd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.293 UTC [gossip.discovery] handleAliveMessage -> DEBU 18de Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.293 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18df Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.293 UTC [gossip.comm] func1 -> DEBU 18dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [gossip.gossip] handleMessage -> DEBU 18e0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [gossip.gossip] handleMessage -> DEBU 18e1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18e2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18e3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [gossip.comm] func1 -> DEBU 18e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [msp.identity] Verify -> DEBU 18e5 Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| -peer0.org1.example.com | 00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" -peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [msp.identity] Verify -> DEBU 18e6 Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| -peer0.org1.example.com | 00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| -peer0.org1.example.com | 00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| -peer0.org1.example.com | 00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| -peer0.org1.example.com | 00000040 57 8d 5b 84 9d 85 |W.[...|" -peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [gossip.gossip] handleMessage -> DEBU 18e7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 18e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [gossip.discovery] isSentByMe -> DEBU 18e9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 18ea Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18eb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ec Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18ed Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [msp] DeserializeIdentity -> DEBU 18ee Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [gossip.gossip] handleMessage -> DEBU 18f5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [cauthdsl] func1 -> DEBU 18f6 0xc0039e1d20 gate 1563590408297550800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [cauthdsl] func2 -> DEBU 18f7 0xc0039e1d20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [cauthdsl] func2 -> DEBU 18f8 0xc0039e1d20 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [cauthdsl] func2 -> DEBU 18f9 0xc0039e1d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [cauthdsl] func2 -> DEBU 18fa 0xc0039e1d20 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [cauthdsl] func1 -> DEBU 18fb 0xc0039e1d20 gate 1563590408297550800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [cauthdsl] func1 -> DEBU 18ff 0xc003b9a560 gate 1563590408299015200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1900 0xc003b9a560 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1901 0xc003b9a560 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1902 0xc003b9a560 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [msp.identity] Verify -> DEBU 1903 Verify: digest = 00000000 90 ad 86 40 6a f3 ad 1a e8 ec 59 b7 18 e6 d4 14 |...@j.....Y.....| -peer0.org1.example.com | 00000010 db 33 79 7f 58 75 39 c1 a1 15 89 cb 0f b2 1c 31 |.3y.Xu9........1|" -peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [msp.identity] Verify -> DEBU 1904 Verify: sig = 00000000 30 44 02 20 07 ac d3 01 f1 a2 2b 72 7a 68 40 68 |0D. ......+rzh@h| -peer0.org1.example.com | 00000010 76 d0 4d 51 aa 3b de 04 f8 e4 f6 ec 54 82 4f 1b |v.MQ.;......T.O.| -peer0.org1.example.com | 00000020 9f e2 c8 4d 02 20 1d 0e 06 07 f2 ad 93 6b 14 69 |...M. .......k.i| -peer0.org1.example.com | 00000030 bd 8c d8 14 2c fe 35 53 de 54 b8 27 65 b9 78 cf |....,.5S.T.'e.x.| -peer0.org1.example.com | 00000040 bf 3b 9d dd 7b 8e |.;..{.|" -peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [cauthdsl] func2 -> DEBU 1905 0xc003b9a560 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [cauthdsl] func1 -> DEBU 1906 0xc003b9a560 gate 1563590408299015200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1907 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1908 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1909 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 190a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 190b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 190c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.301 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 190d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [msp.identity] Verify -> DEBU 190e Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| -peer0.org1.example.com | 00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" -peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [msp.identity] Verify -> DEBU 190f Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| -peer0.org1.example.com | 00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| -peer0.org1.example.com | 00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| -peer0.org1.example.com | 00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| -peer0.org1.example.com | 00000040 57 8d 5b 84 9d 85 |W.[...|" -peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1910 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [gossip.discovery] isSentByMe -> DEBU 1911 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1912 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1913 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.363 UTC [gossip.comm] func1 -> DEBU 1914 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.363 UTC [gossip.gossip] handleMessage -> DEBU 1915 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.364 UTC [gossip.pull] HandleMessage -> DEBU 1916 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.365 UTC [gossip.pull] SendDigest -> DEBU 1917 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:08.365 UTC [gossip.gossip] handleMessage -> DEBU 1918 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.367 UTC [gossip.comm] func1 -> DEBU 1919 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.367 UTC [gossip.gossip] handleMessage -> DEBU 191a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.367 UTC [gossip.gossip] handleMessage -> DEBU 191b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.368 UTC [gossip.discovery] handleMsgFromComm -> DEBU 191c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.368 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 191d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:08.369 UTC [msp.identity] Verify -> DEBU 191e Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| -peer0.org1.example.com | 00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" -peer0.org1.example.com | "2019-07-20 02:40:08.369 UTC [msp.identity] Verify -> DEBU 191f Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| -peer0.org1.example.com | 00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| -peer0.org1.example.com | 00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| -peer0.org1.example.com | 00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| -peer0.org1.example.com | 00000040 d6 7b d1 42 f8 2d |.{.B.-|" -peer0.org1.example.com | "2019-07-20 02:40:08.370 UTC [msp.identity] Verify -> DEBU 1920 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:08.370 UTC [msp.identity] Verify -> DEBU 1921 Verify: sig = 00000000 30 45 02 21 00 83 3b 64 33 c2 24 ca 8f 63 e9 05 |0E.!..;d3.$..c..| -peer0.org1.example.com | 00000010 e8 18 37 56 ba a0 c0 14 82 44 d6 2d 8b 04 25 94 |..7V.....D.-..%.| -peer0.org1.example.com | 00000020 71 1d a3 86 33 02 20 51 61 00 a2 7a 14 09 e7 60 |q...3. Qa..z...`| -peer0.org1.example.com | 00000030 3e c7 9d 10 99 cb 0d 88 9d 11 94 58 4e 25 ef e5 |>..........XN%..| -peer0.org1.example.com | 00000040 0b 09 5f c7 9c 27 cb |.._..'.|" -peer0.org1.example.com | "2019-07-20 02:40:08.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 1922 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 1923 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:08.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 1924 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1925 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1926 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1927 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 1928 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1929 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.374 UTC [gossip.discovery] sendMemResponse -> DEBU 192a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:08.374 UTC [msp] DeserializeIdentity -> DEBU 192b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.375 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.375 UTC [gossip.comm] Send -> DEBU 192d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:08.375 UTC [gossip.comm] sendToEndpoint -> DEBU 192e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.376 UTC [gossip.comm] sendToEndpoint -> DEBU 192f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.376 UTC [gossip.discovery] sendMemResponse -> DEBU 1930 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > alive: " -peer0.org1.example.com | "2019-07-20 02:40:08.552 UTC [gossip.comm] func1 -> DEBU 1931 Got message: GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.552 UTC [gossip.comm] func1 -> DEBU 1932 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.552 UTC [gossip.gossip] handleMessage -> DEBU 1933 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.552 UTC [gossip.gossip] handleMessage -> DEBU 1934 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.553 UTC [gossip.gossip] handleMessage -> DEBU 1935 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.553 UTC [gossip.pull] HandleMessage -> DEBU 1937 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.553 UTC [msp] DeserializeIdentity -> DEBU 1938 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.553 UTC [msp] DeserializeIdentity -> DEBU 1939 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.553 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1936 Got message: GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [gossip.pull] SendDigest -> DEBU 193e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:08.555 UTC [gossip.gossip] handleMessage -> DEBU 193f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1940 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:08.555 UTC [msp] DeserializeIdentity -> DEBU 1941 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.555 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1942 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:08.555 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1943 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.556 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1944 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1945 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1946 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1947 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.557 UTC [cauthdsl] func1 -> DEBU 1948 0xc00377da70 gate 1563590408557288200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.557 UTC [cauthdsl] func2 -> DEBU 1949 0xc00377da70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.557 UTC [cauthdsl] func2 -> DEBU 194a 0xc00377da70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.558 UTC [cauthdsl] func2 -> DEBU 194b 0xc00377da70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:08.558 UTC [cauthdsl] func2 -> DEBU 194c 0xc00377da70 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.558 UTC [cauthdsl] func1 -> DEBU 194d 0xc00377da70 gate 1563590408557288200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 194e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 194f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 1950 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.559 UTC [cauthdsl] func1 -> DEBU 1951 0xc002a002b0 gate 1563590408559753700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.559 UTC [cauthdsl] func2 -> DEBU 1952 0xc002a002b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.560 UTC [cauthdsl] func2 -> DEBU 1953 0xc002a002b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.560 UTC [cauthdsl] func2 -> DEBU 1954 0xc002a002b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.560 UTC [msp.identity] Verify -> DEBU 1955 Verify: digest = 00000000 9b 11 f7 ad fc d3 ff 01 32 75 4a e1 30 0a b5 4a |........2uJ.0..J| -peer0.org1.example.com | 00000010 7d 75 ac e0 57 ae 2d bc 93 54 5e 39 8a 31 d0 d2 |}u..W.-..T^9.1..|" -peer0.org1.example.com | "2019-07-20 02:40:08.561 UTC [msp.identity] Verify -> DEBU 1956 Verify: sig = 00000000 30 45 02 21 00 89 70 53 2d 1c 3e cc 34 ee ff 2e |0E.!..pS-.>.4...| -peer0.org1.example.com | 00000010 7c 76 70 0d 8e cf 4b f8 28 93 5b d1 9a e7 9f 43 ||vp...K.(.[....C| -peer0.org1.example.com | 00000020 c8 2d 86 94 a0 02 20 39 0f 8d d0 e2 8f 44 1b ee |.-.... 9.....D..| -peer0.org1.example.com | 00000030 28 84 53 fa 8f 45 81 c7 3e 5f 51 f4 46 ec 79 ce |(.S..E..>_Q.F.y.| -peer0.org1.example.com | 00000040 73 b2 78 be 11 5f 01 |s.x.._.|" -peer0.org1.example.com | "2019-07-20 02:40:08.561 UTC [cauthdsl] func2 -> DEBU 1957 0xc002a002b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.561 UTC [cauthdsl] func1 -> DEBU 1958 0xc002a002b0 gate 1563590408559753700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:08.562 UTC [policies] Evaluate -> DEBU 1959 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.562 UTC [policies] Evaluate -> DEBU 195a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.563 UTC [policies] Evaluate -> DEBU 195b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.563 UTC [policies] Evaluate -> DEBU 195c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 195d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 195e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 195f updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 1960 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:08.565 UTC [gossip.discovery] learnExistingMembers -> DEBU 1961 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:08.565 UTC [gossip.discovery] learnExistingMembers -> DEBU 1962 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.565 UTC [gossip.discovery] handleAliveMessage -> DEBU 1963 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1964 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [gossip.discovery] sendMemResponse -> DEBU 1965 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1966 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1967 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1968 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [gossip.comm] Send -> DEBU 1969 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [gossip.discovery] sendMemResponse -> DEBU 196a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" > alive:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:08.567 UTC [gossip.comm] sendToEndpoint -> DEBU 196b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.567 UTC [gossip.comm] sendToEndpoint -> DEBU 196c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.718 UTC [msp] DeserializeIdentity -> DEBU 196d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.718 UTC [msp] DeserializeIdentity -> DEBU 196e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.719 UTC [gossip.comm] Send -> DEBU 196f Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1970 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1971 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1972 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1973 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.720 UTC [gossip.comm] sendToEndpoint -> DEBU 1974 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.720 UTC [gossip.comm] sendToEndpoint -> DEBU 1975 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.722 UTC [gossip.comm] func1 -> DEBU 1976 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.722 UTC [gossip.gossip] handleMessage -> DEBU 1979 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.721 UTC [gossip.comm] func1 -> DEBU 1977 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.722 UTC [gossip.comm] func1 -> DEBU 1978 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.723 UTC [msp.identity] Verify -> DEBU 197a Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:08.724 UTC [msp.identity] Verify -> DEBU 197b Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:08.728 UTC [msp.identity] Verify -> DEBU 197c Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:08.728 UTC [msp.identity] Verify -> DEBU 197d Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:08.729 UTC [msp] DeserializeIdentity -> DEBU 197e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.729 UTC [msp] DeserializeIdentity -> DEBU 197f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1980 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1981 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1982 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.730 UTC [policies] Evaluate -> DEBU 1983 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.730 UTC [policies] Evaluate -> DEBU 1984 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:08.731 UTC [policies] Evaluate -> DEBU 1985 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.731 UTC [cauthdsl] func1 -> DEBU 1986 0xc0034afbb0 gate 1563590408731275000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.731 UTC [cauthdsl] func2 -> DEBU 1987 0xc0034afbb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.731 UTC [cauthdsl] func2 -> DEBU 1988 0xc0034afbb0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.732 UTC [cauthdsl] func2 -> DEBU 1989 0xc0034afbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:08.732 UTC [cauthdsl] func2 -> DEBU 198a 0xc0034afbb0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.732 UTC [cauthdsl] func1 -> DEBU 198b 0xc0034afbb0 gate 1563590408731275000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.733 UTC [policies] Evaluate -> DEBU 198c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.733 UTC [policies] Evaluate -> DEBU 198d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.734 UTC [policies] Evaluate -> DEBU 198e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.734 UTC [cauthdsl] func1 -> DEBU 198f 0xc0039d43f0 gate 1563590408734954700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1990 0xc0039d43f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1991 0xc0039d43f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.735 UTC [msp] DeserializeIdentity -> DEBU 1992 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1993 0xc0039d43f0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.736 UTC [msp] DeserializeIdentity -> DEBU 1994 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.736 UTC [gossip.pull] Hello -> DEBU 1995 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:08.736 UTC [msp.identity] Verify -> DEBU 1996 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:08.736 UTC [msp.identity] Verify -> DEBU 1998 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:08.736 UTC [msp] DeserializeIdentity -> DEBU 1997 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.737 UTC [msp] DeserializeIdentity -> DEBU 1999 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.738 UTC [gossip.comm] Send -> DEBU 199a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:08.738 UTC [gossip.comm] sendToEndpoint -> DEBU 199b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.738 UTC [cauthdsl] func2 -> DEBU 199c 0xc0039d43f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.738 UTC [cauthdsl] func1 -> DEBU 199d 0xc0039d43f0 gate 1563590408734954700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:08.739 UTC [policies] Evaluate -> DEBU 199f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.740 UTC [policies] Evaluate -> DEBU 19a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.738 UTC [gossip.comm] sendToEndpoint -> DEBU 199e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.740 UTC [gossip.comm] func1 -> DEBU 19a1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.740 UTC [policies] Evaluate -> DEBU 19a2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.742 UTC [policies] Evaluate -> DEBU 19a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.742 UTC [msp] DeserializeIdentity -> DEBU 19a4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.743 UTC [msp] DeserializeIdentity -> DEBU 19a5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.743 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:08.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a7 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a8 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.746 UTC [cauthdsl] func1 -> DEBU 19ac 0xc0039d5be0 gate 1563590408746044200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.746 UTC [cauthdsl] func2 -> DEBU 19ad 0xc0039d5be0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.746 UTC [cauthdsl] func2 -> DEBU 19ae 0xc0039d5be0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.749 UTC [cauthdsl] func2 -> DEBU 19af 0xc0039d5be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:08.750 UTC [cauthdsl] func2 -> DEBU 19b0 0xc0039d5be0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.750 UTC [cauthdsl] func1 -> DEBU 19b1 0xc0039d5be0 gate 1563590408746044200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.750 UTC [policies] Evaluate -> DEBU 19b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.750 UTC [policies] Evaluate -> DEBU 19b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.751 UTC [policies] Evaluate -> DEBU 19b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.751 UTC [cauthdsl] func1 -> DEBU 19b5 0xc002940420 gate 1563590408751898400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b6 0xc002940420 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b7 0xc002940420 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b8 0xc002940420 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.752 UTC [msp.identity] Verify -> DEBU 19b9 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:08.752 UTC [msp.identity] Verify -> DEBU 19ba Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:08.753 UTC [cauthdsl] func2 -> DEBU 19bb 0xc002940420 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.753 UTC [cauthdsl] func1 -> DEBU 19bc 0xc002940420 gate 1563590408751898400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:08.753 UTC [policies] Evaluate -> DEBU 19bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19bf Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.754 UTC [gossip.gossip] handleMessage -> DEBU 19c1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.754 UTC [gossip.gossip] handleMessage -> DEBU 19c2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19c7 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19c8 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.757 UTC [cauthdsl] func1 -> DEBU 19cc 0xc002941f30 gate 1563590408757681600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.757 UTC [cauthdsl] func2 -> DEBU 19cd 0xc002941f30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19ce 0xc002941f30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19cf 0xc002941f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19d0 0xc002941f30 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.758 UTC [cauthdsl] func1 -> DEBU 19d1 0xc002941f30 gate 1563590408757681600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.758 UTC [policies] Evaluate -> DEBU 19d2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.759 UTC [policies] Evaluate -> DEBU 19d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.759 UTC [policies] Evaluate -> DEBU 19d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.759 UTC [cauthdsl] func1 -> DEBU 19d5 0xc002a7c770 gate 1563590408759598600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.759 UTC [cauthdsl] func2 -> DEBU 19d6 0xc002a7c770 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.760 UTC [cauthdsl] func2 -> DEBU 19d7 0xc002a7c770 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.760 UTC [cauthdsl] func2 -> DEBU 19d8 0xc002a7c770 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.760 UTC [msp.identity] Verify -> DEBU 19d9 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:08.760 UTC [msp.identity] Verify -> DEBU 19da Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:08.762 UTC [cauthdsl] func2 -> DEBU 19db 0xc002a7c770 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.762 UTC [cauthdsl] func1 -> DEBU 19dc 0xc002a7c770 gate 1563590408759598600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:08.763 UTC [policies] Evaluate -> DEBU 19dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.763 UTC [policies] Evaluate -> DEBU 19de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.764 UTC [policies] Evaluate -> DEBU 19df Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.764 UTC [policies] Evaluate -> DEBU 19e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.764 UTC [msp.identity] Verify -> DEBU 19e1 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:08.764 UTC [msp.identity] Verify -> DEBU 19e2 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:08.765 UTC [msp.identity] Verify -> DEBU 19e3 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:08.768 UTC [msp.identity] Verify -> DEBU 19e4 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:08.768 UTC [msp] DeserializeIdentity -> DEBU 19e5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.769 UTC [msp] DeserializeIdentity -> DEBU 19e6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19e8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19e9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.771 UTC [cauthdsl] func1 -> DEBU 19ed 0xc002ef4d80 gate 1563590408771180700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19ee 0xc002ef4d80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19ef 0xc002ef4d80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19f0 0xc002ef4d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:08.772 UTC [cauthdsl] func2 -> DEBU 19f1 0xc002ef4d80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.772 UTC [cauthdsl] func1 -> DEBU 19f2 0xc002ef4d80 gate 1563590408771180700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.773 UTC [cauthdsl] func1 -> DEBU 19f6 0xc002ef55c0 gate 1563590408773095200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f7 0xc002ef55c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f8 0xc002ef55c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f9 0xc002ef55c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.773 UTC [msp.identity] Verify -> DEBU 19fa Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:08.774 UTC [msp.identity] Verify -> DEBU 19fb Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:08.774 UTC [cauthdsl] func2 -> DEBU 19fc 0xc002ef55c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.774 UTC [cauthdsl] func1 -> DEBU 19fd 0xc002ef55c0 gate 1563590408773095200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:08.774 UTC [policies] Evaluate -> DEBU 19fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.774 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.775 UTC [policies] Evaluate -> DEBU 1a00 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.775 UTC [policies] Evaluate -> DEBU 1a01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.775 UTC [gossip.gossip] handleMessage -> DEBU 1a02 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.775 UTC [gossip.gossip] handleMessage -> DEBU 1a03 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.775 UTC [msp] DeserializeIdentity -> DEBU 1a04 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.776 UTC [msp] DeserializeIdentity -> DEBU 1a05 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.776 UTC [msp] DeserializeIdentity -> DEBU 1a06 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.776 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a07 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:08.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a08 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a09 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.777 UTC [policies] Evaluate -> DEBU 1a0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.777 UTC [policies] Evaluate -> DEBU 1a0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func1 -> DEBU 1a0d 0xc0038b70d0 gate 1563590408779421800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a0e 0xc0038b70d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a0f 0xc0038b70d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a10 0xc0038b70d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a11 0xc0038b70d0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func1 -> DEBU 1a12 0xc0038b70d0 gate 1563590408779421800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a13 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func1 -> DEBU 1a16 0xc0038b7910 gate 1563590408780043400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a17 0xc0038b7910 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a18 0xc0038b7910 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a19 0xc0038b7910 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [msp.identity] Verify -> DEBU 1a1a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [msp.identity] Verify -> DEBU 1a1b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc0038b7910 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func1 -> DEBU 1a1d 0xc0038b7910 gate 1563590408780043400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a1e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a20 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.784 UTC [msp.identity] Verify -> DEBU 1a22 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:08.784 UTC [msp.identity] Verify -> DEBU 1a23 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:08.784 UTC [msp] DeserializeIdentity -> DEBU 1a24 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.785 UTC [msp] DeserializeIdentity -> DEBU 1a25 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a26 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a27 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a28 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a29 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a2a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.788 UTC [cauthdsl] func1 -> DEBU 1a2c 0xc003b1b800 gate 1563590408787939000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2d 0xc003b1b800 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2e 0xc003b1b800 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2f 0xc003b1b800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:08.789 UTC [cauthdsl] func2 -> DEBU 1a30 0xc003b1b800 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.789 UTC [cauthdsl] func1 -> DEBU 1a31 0xc003b1b800 gate 1563590408787939000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:08.789 UTC [policies] Evaluate -> DEBU 1a32 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.790 UTC [policies] Evaluate -> DEBU 1a33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.790 UTC [policies] Evaluate -> DEBU 1a34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:08.790 UTC [cauthdsl] func1 -> DEBU 1a35 0xc003c2c040 gate 1563590408790644700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:08.790 UTC [cauthdsl] func2 -> DEBU 1a36 0xc003c2c040 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:08.791 UTC [cauthdsl] func2 -> DEBU 1a37 0xc003c2c040 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:08.791 UTC [cauthdsl] func2 -> DEBU 1a38 0xc003c2c040 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.791 UTC [msp.identity] Verify -> DEBU 1a39 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:08.792 UTC [msp.identity] Verify -> DEBU 1a3a Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:08.792 UTC [cauthdsl] func2 -> DEBU 1a3b 0xc003c2c040 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:08.792 UTC [cauthdsl] func1 -> DEBU 1a3c 0xc003c2c040 gate 1563590408790644700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:08.792 UTC [policies] Evaluate -> DEBU 1a3d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.795 UTC [policies] Evaluate -> DEBU 1a3e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.795 UTC [policies] Evaluate -> DEBU 1a3f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.796 UTC [policies] Evaluate -> DEBU 1a40 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:08.796 UTC [msp.identity] Verify -> DEBU 1a41 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:08.797 UTC [msp.identity] Verify -> DEBU 1a42 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:08.797 UTC [gossip.gossip] handleMessage -> DEBU 1a43 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.798 UTC [gossip.gossip] handleMessage -> DEBU 1a44 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.798 UTC [gossip.pull] HandleMessage -> DEBU 1a45 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.798 UTC [gossip.gossip] handleMessage -> DEBU 1a46 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.880 UTC [gossip.comm] func1 -> DEBU 1a47 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.880 UTC [gossip.gossip] handleMessage -> DEBU 1a48 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.880 UTC [msp] DeserializeIdentity -> DEBU 1a49 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.880 UTC [msp] DeserializeIdentity -> DEBU 1a4a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:08.881 UTC [gossip.gossip] handleMessage -> DEBU 1a4b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:08.898 UTC [gossip.comm] func1 -> DEBU 1a4c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.898 UTC [gossip.gossip] handleMessage -> DEBU 1a4d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.899 UTC [gossip.pull] HandleMessage -> DEBU 1a4e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:08.899 UTC [gossip.pull] SendDigest -> DEBU 1a4f Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:08.899 UTC [gossip.gossip] handleMessage -> DEBU 1a50 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:09.042 UTC [gossip.comm] func1 -> DEBU 1a51 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:09.042 UTC [gossip.gossip] handleMessage -> DEBU 1a52 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:09.043 UTC [msp] DeserializeIdentity -> DEBU 1a53 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:09.043 UTC [msp] DeserializeIdentity -> DEBU 1a54 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:09.044 UTC [msp] DeserializeIdentity -> DEBU 1a55 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:09.044 UTC [gossip.gossip] handleMessage -> DEBU 1a56 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:09.181 UTC [gossip.comm] func1 -> DEBU 1a57 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:09.181 UTC [gossip.gossip] handleMessage -> DEBU 1a58 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a59 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a5a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a5b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:09.186 UTC [gossip.gossip] handleMessage -> DEBU 1a5c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.757 UTC [gossip.election] waitForInterrupt -> DEBU 1a5d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.757 UTC [gossip.election] IsLeader -> DEBU 1a5e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:11.758 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a5f Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:11.758 UTC [msp.identity] Sign -> DEBU 1a60 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510071801 " -peer0.org1.example.com | "2019-07-20 02:40:11.758 UTC [msp.identity] Sign -> DEBU 1a61 Sign: digest: F32453B093A8FCF0DB1ACDFCB1A2A453D65AA6A20827F5C70258714B6F5C027F " -peer0.org1.example.com | "2019-07-20 02:40:11.759 UTC [gossip.election] waitForInterrupt -> DEBU 1a62 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:11.760 UTC [msp] DeserializeIdentity -> DEBU 1a63 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a64 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a65 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a66 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.762 UTC [gossip.comm] Send -> DEBU 1a67 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:11.762 UTC [msp] DeserializeIdentity -> DEBU 1a68 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.762 UTC [msp] DeserializeIdentity -> DEBU 1a69 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1a6a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1a6b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.918 UTC [gossip.comm] func1 -> DEBU 1a6c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.919 UTC [gossip.comm] func1 -> DEBU 1a6d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.919 UTC [gossip.gossip] handleMessage -> DEBU 1a6e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.920 UTC [gossip.gossip] handleMessage -> DEBU 1a6f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.920 UTC [gossip.gossip] handleMessage -> DEBU 1a70 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a71 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.921 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a72 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:11.921 UTC [msp] DeserializeIdentity -> DEBU 1a73 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a74 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a75 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a76 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a77 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a78 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:11.924 UTC [cauthdsl] func1 -> DEBU 1a7a 0xc0007176f0 gate 1563590411924029300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7b 0xc0007176f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc0007176f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc0007176f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7e 0xc0007176f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:11.925 UTC [cauthdsl] func1 -> DEBU 1a7f 0xc0007176f0 gate 1563590411924029300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a80 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:11.926 UTC [cauthdsl] func1 -> DEBU 1a83 0xc000717f30 gate 1563590411925987300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:11.926 UTC [cauthdsl] func2 -> DEBU 1a84 0xc000717f30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:11.926 UTC [cauthdsl] func2 -> DEBU 1a85 0xc000717f30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:11.927 UTC [cauthdsl] func2 -> DEBU 1a86 0xc000717f30 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:11.927 UTC [msp.identity] Verify -> DEBU 1a87 Verify: digest = 00000000 50 6e 7f af 28 57 0b 0c 11 6e 47 2f e1 0f dc 57 |Pn..(W...nG/...W| -peer0.org1.example.com | 00000010 cc 63 30 d8 ae 7d 4d b3 63 dc 69 a5 59 4b 3d 58 |.c0..}M.c.i.YK=X|" -peer0.org1.example.com | "2019-07-20 02:40:11.928 UTC [msp.identity] Verify -> DEBU 1a88 Verify: sig = 00000000 30 44 02 20 30 3b da be 0a 27 22 9d b7 14 c7 49 |0D. 0;...'"....I| -peer0.org1.example.com | 00000010 2f 7c 84 d0 d8 8b 25 f3 7c 6d 8a 46 4b 3a 47 97 |/|....%.|m.FK:G.| -peer0.org1.example.com | 00000020 f1 91 20 77 02 20 7e 62 fe 43 56 ab 37 87 cd bf |.. w. ~b.CV.7...| -peer0.org1.example.com | 00000030 21 7b d2 24 5e 56 76 9a d9 b2 c7 19 33 8b 6c 46 |!{.$^Vv.....3.lF| -peer0.org1.example.com | 00000040 e2 11 bc 09 bb 1a |......|" -peer0.org1.example.com | "2019-07-20 02:40:11.931 UTC [cauthdsl] func2 -> DEBU 1a89 0xc000717f30 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:11.931 UTC [cauthdsl] func1 -> DEBU 1a8a 0xc000717f30 gate 1563590411925987300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:11.931 UTC [policies] Evaluate -> DEBU 1a8b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.932 UTC [policies] Evaluate -> DEBU 1a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.932 UTC [gossip.comm] func1 -> DEBU 1a8d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.933 UTC [gossip.comm] func1 -> DEBU 1a8e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.933 UTC [policies] Evaluate -> DEBU 1a8f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.933 UTC [policies] Evaluate -> DEBU 1a90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a91 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a92 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a93 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a94 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:11.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a95 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:11.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a96 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a97 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a98 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.936 UTC [gossip.gossip] handleMessage -> DEBU 1a99 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.936 UTC [gossip.gossip] handleMessage -> DEBU 1a9a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a9b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.937 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a9c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:11.938 UTC [gossip.comm] func1 -> DEBU 1a9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.937 UTC [msp] DeserializeIdentity -> DEBU 1a9e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.938 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a9f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:11.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1aa0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:11.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1aa1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:11.940 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:11.941 UTC [policies] Evaluate -> DEBU 1aa3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:11.942 UTC [policies] Evaluate -> DEBU 1aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:11.943 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc000745fe0 gate 1563590411943047600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc000745fe0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc000745fe0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa8 0xc000745fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:11.944 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc000745fe0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:11.944 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc000745fe0 gate 1563590411943047600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:11.945 UTC [policies] Evaluate -> DEBU 1aab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.945 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aad Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aae Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aaf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.947 UTC [msp] DeserializeIdentity -> DEBU 1ab0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.947 UTC [msp] DeserializeIdentity -> DEBU 1ab1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.948 UTC [msp] DeserializeIdentity -> DEBU 1ab2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.951 UTC [msp] DeserializeIdentity -> DEBU 1ab3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.951 UTC [gossip.comm] Send -> DEBU 1ab4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:11.951 UTC [policies] Evaluate -> DEBU 1ab5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:11.951 UTC [msp] DeserializeIdentity -> DEBU 1ab6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ab8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ab9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.952 UTC [gossip.comm] Send -> DEBU 1aba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:11.953 UTC [gossip.comm] sendToEndpoint -> DEBU 1abb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.952 UTC [cauthdsl] func1 -> DEBU 1ab7 0xc0028aa820 gate 1563590411952008400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:11.954 UTC [gossip.comm] sendToEndpoint -> DEBU 1abc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.954 UTC [cauthdsl] func2 -> DEBU 1abd 0xc0028aa820 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:11.954 UTC [cauthdsl] func2 -> DEBU 1abe 0xc0028aa820 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:11.955 UTC [cauthdsl] func2 -> DEBU 1abf 0xc0028aa820 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:11.955 UTC [msp.identity] Verify -> DEBU 1ac0 Verify: digest = 00000000 96 c8 c6 7e ce 1f c8 b1 ef b8 07 eb 56 d0 d7 aa |...~........V...| -peer0.org1.example.com | 00000010 4a 4a d9 74 ae 8e 75 a4 4b 4b 7d c5 9e dd c7 a7 |JJ.t..u.KK}.....|" -peer0.org1.example.com | "2019-07-20 02:40:11.955 UTC [msp.identity] Verify -> DEBU 1ac1 Verify: sig = 00000000 30 45 02 21 00 b3 a8 f4 fb e1 17 c4 eb e2 78 0e |0E.!..........x.| -peer0.org1.example.com | 00000010 4c ef 59 f9 64 c5 f6 79 6c 21 7b 4c 36 11 88 72 |L.Y.d..yl!{L6..r| -peer0.org1.example.com | 00000020 0c 88 fd c8 9c 02 20 4c f6 d0 cb 54 00 e3 9e e5 |...... L...T....| -peer0.org1.example.com | 00000030 1d 7e 07 44 9c 16 4b 16 be 15 31 f6 f8 f5 87 58 |.~.D..K...1....X| -peer0.org1.example.com | 00000040 86 a4 e1 59 be af ec |...Y...|" -peer0.org1.example.com | "2019-07-20 02:40:11.956 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc0028aa820 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:11.956 UTC [cauthdsl] func1 -> DEBU 1ac3 0xc0028aa820 gate 1563590411952008400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.958 UTC [policies] Evaluate -> DEBU 1ac7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ac8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1aca updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acb Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acc Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ace Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1acf Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ad0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ad1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.960 UTC [gossip.gossip] handleMessage -> DEBU 1ad2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.960 UTC [gossip.discovery] sendMemResponse -> DEBU 1ad3 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:11.961 UTC [msp] DeserializeIdentity -> DEBU 1ad4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.960 UTC [gossip.gossip] handleMessage -> DEBU 1ad5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.961 UTC [gossip.gossip] handleMessage -> DEBU 1ad6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.961 UTC [gossip.gossip] handleMessage -> DEBU 1ad7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ad8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [gossip.pull] HandleMessage -> DEBU 1ad9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ada Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1adb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1adc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1add Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ade Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.963 UTC [gossip.comm] Send -> DEBU 1adf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:11.963 UTC [msp] DeserializeIdentity -> DEBU 1ae0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.963 UTC [msp] DeserializeIdentity -> DEBU 1ae1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:11.964 UTC [gossip.discovery] sendMemResponse -> DEBU 1ae2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" > alive:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:11.964 UTC [gossip.pull] SendDigest -> DEBU 1ae3 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:11.964 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.973 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:11.973 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:11.969 UTC [gossip.gossip] handleMessage -> DEBU 1ae8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.234 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ae9 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:12.234 UTC [msp.identity] Sign -> DEBU 1aea Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101B " -peer0.org1.example.com | "2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aeb Sign: digest: CE2B4F1AA88EC06B4B4F6D52277AAB84EFF3B9035584D68F654AC7DBFF895133 " -peer0.org1.example.com | "2019-07-20 02:40:12.235 UTC [msp] GetDefaultSigningIdentity -> DEBU 1aec Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aed Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aee Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:12.236 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1aef Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.241 UTC [gossip.comm] Send -> DEBU 1af3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [msp] DeserializeIdentity -> DEBU 1af4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] Send -> DEBU 1af5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] Send -> DEBU 1af6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1afa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1afb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1afc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1afd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1afe Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1aff Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1b00 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1b01 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1b02 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b03 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b04 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b05 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b06 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b07 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.251 UTC [gossip.comm] sendToEndpoint -> DEBU 1b08 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.251 UTC [gossip.comm] func1 -> DEBU 1b09 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.252 UTC [gossip.gossip] handleMessage -> DEBU 1b0c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.253 UTC [gossip.pull] HandleMessage -> DEBU 1b0d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.251 UTC [gossip.comm] func1 -> DEBU 1b0a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.252 UTC [gossip.comm] func1 -> DEBU 1b0b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.254 UTC [gossip.gossip] handleMessage -> DEBU 1b0e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.255 UTC [gossip.gossip] handleMessage -> DEBU 1b0f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.255 UTC [gossip.pull] HandleMessage -> DEBU 1b10 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.256 UTC [gossip.gossip] handleMessage -> DEBU 1b11 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.256 UTC [gossip.gossip] handleMessage -> DEBU 1b12 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.257 UTC [gossip.pull] HandleMessage -> DEBU 1b13 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.257 UTC [gossip.gossip] handleMessage -> DEBU 1b14 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.290 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b15 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:12.290 UTC [msp.identity] Sign -> DEBU 1b16 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101C " -peer0.org1.example.com | "2019-07-20 02:40:12.290 UTC [msp.identity] Sign -> DEBU 1b17 Sign: digest: C3F5706A375F12EA1C08F465EF91D9C4D06CEAE01B18956347B9FBEA6DE181AD " -peer0.org1.example.com | "2019-07-20 02:40:12.290 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b18 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [msp.identity] Sign -> DEBU 1b19 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [msp.identity] Sign -> DEBU 1b1a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [msp] DeserializeIdentity -> DEBU 1b1b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [gossip.comm] Send -> DEBU 1b1c Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [msp] DeserializeIdentity -> DEBU 1b1d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [gossip.comm] Send -> DEBU 1b1e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.292 UTC [gossip.comm] Send -> DEBU 1b1f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b20 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b21 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b23 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1b24 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.comm] func1 -> DEBU 1b26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.gossip] handleMessage -> DEBU 1b27 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.gossip] handleMessage -> DEBU 1b28 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b29 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b2a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [msp.identity] Verify -> DEBU 1b2b Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| -peer0.org1.example.com | 00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" -peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [msp.identity] Verify -> DEBU 1b2c Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| -peer0.org1.example.com | 00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| -peer0.org1.example.com | 00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| -peer0.org1.example.com | 00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| -peer0.org1.example.com | 00000040 7f 1e c1 c8 ad 63 |.....c|" -peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b2d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [gossip.discovery] isSentByMe -> DEBU 1b2e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b2f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b30 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [msp] DeserializeIdentity -> DEBU 1b31 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.comm] sendToEndpoint -> DEBU 1b32 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:12.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b34 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b35 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.297 UTC [policies] Evaluate -> DEBU 1b36 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.297 UTC [gossip.comm] func1 -> DEBU 1b37 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.297 UTC [gossip.gossip] handleMessage -> DEBU 1b38 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.297 UTC [policies] Evaluate -> DEBU 1b39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.comm] func1 -> DEBU 1b25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.298 UTC [policies] Evaluate -> DEBU 1b3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.298 UTC [cauthdsl] func1 -> DEBU 1b3b 0xc003719970 gate 1563590412298571800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.298 UTC [cauthdsl] func2 -> DEBU 1b3c 0xc003719970 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3d 0xc003719970 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3e 0xc003719970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3f 0xc003719970 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.299 UTC [cauthdsl] func1 -> DEBU 1b40 0xc003719970 gate 1563590412298571800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b41 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.301 UTC [cauthdsl] func1 -> DEBU 1b44 0xc002a0a1b0 gate 1563590412300947700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.301 UTC [cauthdsl] func2 -> DEBU 1b45 0xc002a0a1b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.301 UTC [cauthdsl] func2 -> DEBU 1b46 0xc002a0a1b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.302 UTC [cauthdsl] func2 -> DEBU 1b47 0xc002a0a1b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.302 UTC [msp.identity] Verify -> DEBU 1b48 Verify: digest = 00000000 9b 11 f7 ad fc d3 ff 01 32 75 4a e1 30 0a b5 4a |........2uJ.0..J| -peer0.org1.example.com | 00000010 7d 75 ac e0 57 ae 2d bc 93 54 5e 39 8a 31 d0 d2 |}u..W.-..T^9.1..|" -peer0.org1.example.com | "2019-07-20 02:40:12.302 UTC [msp.identity] Verify -> DEBU 1b49 Verify: sig = 00000000 30 45 02 21 00 89 70 53 2d 1c 3e cc 34 ee ff 2e |0E.!..pS-.>.4...| -peer0.org1.example.com | 00000010 7c 76 70 0d 8e cf 4b f8 28 93 5b d1 9a e7 9f 43 ||vp...K.(.[....C| -peer0.org1.example.com | 00000020 c8 2d 86 94 a0 02 20 39 0f 8d d0 e2 8f 44 1b ee |.-.... 9.....D..| -peer0.org1.example.com | 00000030 28 84 53 fa 8f 45 81 c7 3e 5f 51 f4 46 ec 79 ce |(.S..E..>_Q.F.y.| -peer0.org1.example.com | 00000040 73 b2 78 be 11 5f 01 |s.x.._.|" -peer0.org1.example.com | "2019-07-20 02:40:12.303 UTC [cauthdsl] func2 -> DEBU 1b4a 0xc002a0a1b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.303 UTC [cauthdsl] func1 -> DEBU 1b4b 0xc002a0a1b0 gate 1563590412300947700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:12.303 UTC [policies] Evaluate -> DEBU 1b4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.303 UTC [policies] Evaluate -> DEBU 1b4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.304 UTC [policies] Evaluate -> DEBU 1b4e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.304 UTC [policies] Evaluate -> DEBU 1b4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b50 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b51 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.305 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b52 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:12.305 UTC [msp.identity] Verify -> DEBU 1b53 Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| -peer0.org1.example.com | 00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" -peer0.org1.example.com | "2019-07-20 02:40:12.306 UTC [msp.identity] Verify -> DEBU 1b54 Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| -peer0.org1.example.com | 00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| -peer0.org1.example.com | 00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| -peer0.org1.example.com | 00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| -peer0.org1.example.com | 00000040 d6 7b d1 42 f8 2d |.{.B.-|" -peer0.org1.example.com | "2019-07-20 02:40:12.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b55 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b56 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.306 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b57 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.307 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.307 UTC [gossip.gossip] handleMessage -> DEBU 1b59 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.307 UTC [gossip.gossip] handleMessage -> DEBU 1b5b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.307 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b5a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:12.308 UTC [msp.identity] Verify -> DEBU 1b5c Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| -peer0.org1.example.com | 00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" -peer0.org1.example.com | "2019-07-20 02:40:12.308 UTC [msp.identity] Verify -> DEBU 1b5d Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| -peer0.org1.example.com | 00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| -peer0.org1.example.com | 00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| -peer0.org1.example.com | 00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| -peer0.org1.example.com | 00000040 d6 7b d1 42 f8 2d |.{.B.-|" -peer0.org1.example.com | "2019-07-20 02:40:12.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.309 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b60 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:12.309 UTC [msp.identity] Verify -> DEBU 1b61 Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| -peer0.org1.example.com | 00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" -peer0.org1.example.com | "2019-07-20 02:40:12.310 UTC [msp.identity] Verify -> DEBU 1b62 Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| -peer0.org1.example.com | 00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| -peer0.org1.example.com | 00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| -peer0.org1.example.com | 00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| -peer0.org1.example.com | 00000040 7f 1e c1 c8 ad 63 |.....c|" -peer0.org1.example.com | "2019-07-20 02:40:12.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b63 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.311 UTC [gossip.discovery] isSentByMe -> DEBU 1b64 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b65 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b66 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:12.312 UTC [msp] DeserializeIdentity -> DEBU 1b67 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.312 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:12.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b69 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b6a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.314 UTC [cauthdsl] func1 -> DEBU 1b6e 0xc00354dc50 gate 1563590412314160000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.314 UTC [cauthdsl] func2 -> DEBU 1b6f 0xc00354dc50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b70 0xc00354dc50 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b71 0xc00354dc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b72 0xc00354dc50 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.316 UTC [cauthdsl] func1 -> DEBU 1b73 0xc00354dc50 gate 1563590412314160000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b74 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b75 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.317 UTC [cauthdsl] func1 -> DEBU 1b77 0xc00357a490 gate 1563590412317137700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b78 0xc00357a490 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b79 0xc00357a490 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b7a 0xc00357a490 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.318 UTC [msp.identity] Verify -> DEBU 1b7b Verify: digest = 00000000 96 c8 c6 7e ce 1f c8 b1 ef b8 07 eb 56 d0 d7 aa |...~........V...| -peer0.org1.example.com | 00000010 4a 4a d9 74 ae 8e 75 a4 4b 4b 7d c5 9e dd c7 a7 |JJ.t..u.KK}.....|" -peer0.org1.example.com | "2019-07-20 02:40:12.318 UTC [msp.identity] Verify -> DEBU 1b7c Verify: sig = 00000000 30 45 02 21 00 b3 a8 f4 fb e1 17 c4 eb e2 78 0e |0E.!..........x.| -peer0.org1.example.com | 00000010 4c ef 59 f9 64 c5 f6 79 6c 21 7b 4c 36 11 88 72 |L.Y.d..yl!{L6..r| -peer0.org1.example.com | 00000020 0c 88 fd c8 9c 02 20 4c f6 d0 cb 54 00 e3 9e e5 |...... L...T....| -peer0.org1.example.com | 00000030 1d 7e 07 44 9c 16 4b 16 be 15 31 f6 f8 f5 87 58 |.~.D..K...1....X| -peer0.org1.example.com | 00000040 86 a4 e1 59 be af ec |...Y...|" -peer0.org1.example.com | "2019-07-20 02:40:12.318 UTC [cauthdsl] func2 -> DEBU 1b7d 0xc00357a490 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.318 UTC [cauthdsl] func1 -> DEBU 1b7e 0xc00357a490 gate 1563590412317137700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b7f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b81 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b82 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.320 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b83 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.320 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b84 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.320 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b85 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.320 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b86 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.321 UTC [gossip.gossip] handleMessage -> DEBU 1b87 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.321 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b88 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:12.321 UTC [msp.identity] Verify -> DEBU 1b89 Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| -peer0.org1.example.com | 00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" -peer0.org1.example.com | "2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8a Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| -peer0.org1.example.com | 00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| -peer0.org1.example.com | 00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| -peer0.org1.example.com | 00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| -peer0.org1.example.com | 00000040 7f 1e c1 c8 ad 63 |.....c|" -peer0.org1.example.com | "2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8b Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8c Verify: sig = 00000000 30 44 02 20 54 2e 65 d6 93 d7 c1 d0 66 50 bb 01 |0D. T.e.....fP..| -peer0.org1.example.com | 00000010 53 9c 76 4e 3a a7 3d ea de 4f 2e 55 3f 96 b0 eb |S.vN:.=..O.U?...| -peer0.org1.example.com | 00000020 06 cb 91 62 02 20 16 5c 55 3b 21 dc e0 72 c6 fd |...b. .\U;!..r..| -peer0.org1.example.com | 00000030 b5 c0 af 55 79 1e f7 77 3d e7 90 d7 5a cb 4b 4a |...Uy..w=...Z.KJ| -peer0.org1.example.com | 00000040 1f 38 45 26 f6 1a |.8E&..|" -peer0.org1.example.com | "2019-07-20 02:40:12.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.323 UTC [gossip.discovery] isSentByMe -> DEBU 1b8e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.324 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b90 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.363 UTC [gossip.comm] func1 -> DEBU 1b91 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.363 UTC [gossip.comm] func1 -> DEBU 1b92 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b93 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.364 UTC [gossip.pull] HandleMessage -> DEBU 1b94 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.364 UTC [gossip.pull] SendDigest -> DEBU 1b95 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b96 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b97 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.365 UTC [gossip.gossip] handleMessage -> DEBU 1b98 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b99 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.366 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b9a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:12.366 UTC [msp.identity] Verify -> DEBU 1b9b Verify: digest = 00000000 23 57 6d cb 67 c3 2b 1d 54 04 2e 4e ff d1 34 7d |#Wm.g.+.T..N..4}| -peer0.org1.example.com | 00000010 d7 e7 66 fa 16 70 4b fa 68 e1 8c b2 cc 2a 6e fa |..f..pK.h....*n.|" -peer0.org1.example.com | "2019-07-20 02:40:12.366 UTC [msp.identity] Verify -> DEBU 1b9c Verify: sig = 00000000 30 45 02 21 00 c8 5c 77 c3 da f1 17 ec 7e fc e2 |0E.!..\w.....~..| -peer0.org1.example.com | 00000010 d5 59 46 ce e0 e9 46 ac 65 e4 3b ee 86 b2 1a a9 |.YF...F.e.;.....| -peer0.org1.example.com | 00000020 0f 53 c5 f4 28 02 20 13 84 7b 1c bb 4a 9a ec d8 |.S..(. ..{..J...| -peer0.org1.example.com | 00000030 f6 85 ac 6d 5f 6a 69 59 cc bc b0 a3 b5 56 de 70 |...m_jiY.....V.p| -peer0.org1.example.com | 00000040 99 97 b9 75 f0 27 d7 |...u.'.|" -peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b9d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b9e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b9f updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba0 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba1 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ba3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.369 UTC [gossip.comm] func1 -> DEBU 1ba5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.369 UTC [gossip.gossip] handleMessage -> DEBU 1ba6 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.369 UTC [gossip.gossip] handleMessage -> DEBU 1ba7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.369 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba8 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.369 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ba9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:12.370 UTC [msp.identity] Verify -> DEBU 1baa Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| -peer0.org1.example.com | 00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" -peer0.org1.example.com | "2019-07-20 02:40:12.370 UTC [msp.identity] Verify -> DEBU 1bab Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| -peer0.org1.example.com | 00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| -peer0.org1.example.com | 00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| -peer0.org1.example.com | 00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| -peer0.org1.example.com | 00000040 29 a8 53 68 a7 11 7c |).Sh..||" -peer0.org1.example.com | "2019-07-20 02:40:12.371 UTC [msp.identity] Verify -> DEBU 1bac Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:12.373 UTC [msp.identity] Verify -> DEBU 1bb0 Verify: sig = 00000000 30 44 02 20 7a 2f 52 da 3d 89 6f 10 c3 4f de e2 |0D. z/R.=.o..O..| -peer0.org1.example.com | 00000010 0b 43 6f c1 1f 1f ec b9 c8 f5 85 ce c8 0f f8 16 |.Co.............| -peer0.org1.example.com | 00000020 ee 50 27 2b 02 20 06 b4 ca fc 1f a1 09 20 95 71 |.P'+. ....... .q| -peer0.org1.example.com | 00000030 9e 98 3d 8d 6b 01 1b d5 c0 cc 02 26 78 e3 c3 66 |..=.k......&x..f| -peer0.org1.example.com | 00000040 ee 82 e2 40 c7 fe |...@..|" -peer0.org1.example.com | "2019-07-20 02:40:12.374 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bb1 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.373 UTC [gossip.comm] func1 -> DEBU 1bad Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.374 UTC [gossip.gossip] handleMessage -> DEBU 1bb2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.372 UTC [msp] DeserializeIdentity -> DEBU 1bae Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [gossip.comm] Send -> DEBU 1bb5 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [gossip.comm] Send -> DEBU 1bb7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [gossip.comm] sendToEndpoint -> DEBU 1bb8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [gossip.comm] sendToEndpoint -> DEBU 1bb9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.373 UTC [gossip.comm] func1 -> DEBU 1baf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.376 UTC [gossip.comm] sendToEndpoint -> DEBU 1bba Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.376 UTC [gossip.comm] sendToEndpoint -> DEBU 1bbb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.376 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbd updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbe Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbf Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bc0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bc1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.discovery] sendMemResponse -> DEBU 1bc8 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc9 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.379 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bca Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.379 UTC [msp] DeserializeIdentity -> DEBU 1bcb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.379 UTC [msp] DeserializeIdentity -> DEBU 1bcc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.380 UTC [gossip.comm] Send -> DEBU 1bcd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.385 UTC [gossip.discovery] sendMemResponse -> DEBU 1bce Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > alive: " -peer0.org1.example.com | "2019-07-20 02:40:12.385 UTC [gossip.comm] sendToEndpoint -> DEBU 1bcf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.386 UTC [gossip.comm] sendToEndpoint -> DEBU 1bd0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.comm] func1 -> DEBU 1bd1 Got message: GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.comm] func1 -> DEBU 1bd2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.pull] HandleMessage -> DEBU 1bd6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [msp] DeserializeIdentity -> DEBU 1bd7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bd8 Got message: GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.553 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bda Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:12.553 UTC [msp] DeserializeIdentity -> DEBU 1bdb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.554 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bdc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:12.553 UTC [msp] DeserializeIdentity -> DEBU 1bd9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.554 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bdd Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.555 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.556 UTC [policies] Evaluate -> DEBU 1be1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.555 UTC [gossip.comm] func1 -> DEBU 1bde Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.555 UTC [msp] DeserializeIdentity -> DEBU 1bdf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.557 UTC [policies] Evaluate -> DEBU 1be2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [policies] Evaluate -> DEBU 1be3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [cauthdsl] func1 -> DEBU 1be4 0xc00055fac0 gate 1563590412558214000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be5 0xc00055fac0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be6 0xc00055fac0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [msp] DeserializeIdentity -> DEBU 1be7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be8 0xc00055fac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1be9 0xc00055fac0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func1 -> DEBU 1bea 0xc00055fac0 gate 1563590412558214000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1beb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1bec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1bed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func1 -> DEBU 1bee 0xc003730300 gate 1563590412559502000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bef 0xc003730300 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bf0 0xc003730300 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bf1 0xc003730300 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [msp.identity] Verify -> DEBU 1bf2 Verify: digest = 00000000 93 35 0e c2 25 f8 8a 17 84 64 01 ba d1 61 30 28 |.5..%....d...a0(| -peer0.org1.example.com | 00000010 b5 d2 27 ff 33 d5 f1 4e b1 90 cd a3 fc 9b fc 89 |..'.3..N........|" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [msp.identity] Verify -> DEBU 1bf3 Verify: sig = 00000000 30 45 02 21 00 97 1c 21 96 43 13 8c 1b a5 a6 8f |0E.!...!.C......| -peer0.org1.example.com | 00000010 b0 3b 1e c0 4c 6f cb e7 5d 45 3c a0 3e 1a bc dc |.;..Lo..]E<.>...| -peer0.org1.example.com | 00000020 ae b8 ac 8b bb 02 20 07 94 11 5c 1b 70 81 82 3d |...... ...\.p..=| -peer0.org1.example.com | 00000030 73 04 51 d7 01 9d 13 a3 91 dc 85 4a 61 1f ee 8e |s.Q........Ja...| -peer0.org1.example.com | 00000040 85 50 2f a9 4f 9d e4 |.P/.O..|" -peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [msp] DeserializeIdentity -> DEBU 1bf4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [cauthdsl] func2 -> DEBU 1bf5 0xc003730300 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [cauthdsl] func1 -> DEBU 1bf7 0xc003730300 gate 1563590412559502000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bf8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bf9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bfa Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.561 UTC [policies] Evaluate -> DEBU 1bfb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.561 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bfc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bfd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:12.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bfe updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bff Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c00 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c01 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [msp] DeserializeIdentity -> DEBU 1bf6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c02 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c04 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.563 UTC [gossip.discovery] sendMemResponse -> DEBU 1c05 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c06 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c07 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c08 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.565 UTC [gossip.comm] Send -> DEBU 1c09 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.565 UTC [gossip.discovery] sendMemResponse -> DEBU 1c0a Exiting, replying with alive:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" > alive: " -peer0.org1.example.com | "2019-07-20 02:40:12.563 UTC [gossip.pull] SendDigest -> DEBU 1c03 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:12.566 UTC [gossip.comm] func1 -> DEBU 1c0c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.566 UTC [gossip.comm] sendToEndpoint -> DEBU 1c0b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.567 UTC [gossip.comm] sendToEndpoint -> DEBU 1c0d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.568 UTC [gossip.comm] func1 -> DEBU 1c0e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.567 UTC [gossip.gossip] handleMessage -> DEBU 1c0f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.569 UTC [gossip.gossip] handleMessage -> DEBU 1c10 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.569 UTC [gossip.gossip] handleMessage -> DEBU 1c11 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.570 UTC [gossip.gossip] handleMessage -> DEBU 1c12 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.570 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c13 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.570 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c14 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:12.570 UTC [msp] DeserializeIdentity -> DEBU 1c15 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:12.572 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c17 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.573 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c18 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.575 UTC [cauthdsl] func1 -> DEBU 1c1c 0xc003353c60 gate 1563590412575447700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1d 0xc003353c60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1e 0xc003353c60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1f 0xc003353c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:12.577 UTC [cauthdsl] func2 -> DEBU 1c20 0xc003353c60 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.578 UTC [cauthdsl] func1 -> DEBU 1c21 0xc003353c60 gate 1563590412575447700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.578 UTC [policies] Evaluate -> DEBU 1c22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.578 UTC [policies] Evaluate -> DEBU 1c23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.579 UTC [policies] Evaluate -> DEBU 1c24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.579 UTC [cauthdsl] func1 -> DEBU 1c25 0xc003a0e4a0 gate 1563590412579715600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.579 UTC [cauthdsl] func2 -> DEBU 1c26 0xc003a0e4a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.580 UTC [cauthdsl] func2 -> DEBU 1c27 0xc003a0e4a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.580 UTC [cauthdsl] func2 -> DEBU 1c28 0xc003a0e4a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.580 UTC [msp.identity] Verify -> DEBU 1c29 Verify: digest = 00000000 66 b2 e9 33 b3 06 f3 39 07 4d 86 da 59 b0 71 77 |f..3...9.M..Y.qw| -peer0.org1.example.com | 00000010 7d 39 cd ea 94 b5 78 5d 7f cf 90 72 ef 81 fd 1b |}9....x]...r....|" -peer0.org1.example.com | "2019-07-20 02:40:12.580 UTC [msp.identity] Verify -> DEBU 1c2a Verify: sig = 00000000 30 45 02 21 00 f6 4b 80 fe 8f dd 13 d4 75 98 e8 |0E.!..K......u..| -peer0.org1.example.com | 00000010 62 4c 0a 3f a4 40 ce 0e a6 37 f3 07 a8 12 7b 89 |bL.?.@...7....{.| -peer0.org1.example.com | 00000020 71 8e c3 08 97 02 20 68 c8 a5 95 a0 9a ea 4a b9 |q..... h......J.| -peer0.org1.example.com | 00000030 49 c3 90 cb d1 bc ea cc e4 de 8d aa 91 fd a0 ac |I...............| -peer0.org1.example.com | 00000040 4f 98 d6 d9 41 a2 3d |O...A.=|" -peer0.org1.example.com | "2019-07-20 02:40:12.581 UTC [cauthdsl] func2 -> DEBU 1c2b 0xc003a0e4a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.581 UTC [cauthdsl] func1 -> DEBU 1c2c 0xc003a0e4a0 gate 1563590412579715600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:12.581 UTC [policies] Evaluate -> DEBU 1c2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c2f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c31 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c32 endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1563590372570532900, 29 but got ts: inc_num:1563590372570532900 seq_num:28 " -peer0.org1.example.com | "2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c33 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.583 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c34 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c35 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c37 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c36 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c38 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c39 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c3a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c3b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.588 UTC [msp] DeserializeIdentity -> DEBU 1c3c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.588 UTC [msp] DeserializeIdentity -> DEBU 1c3d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.589 UTC [msp] DeserializeIdentity -> DEBU 1c3e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.589 UTC [msp] DeserializeIdentity -> DEBU 1c3f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c40 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c41 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c42 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.591 UTC [gossip.comm] Send -> DEBU 1c43 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.591 UTC [msp] DeserializeIdentity -> DEBU 1c44 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.591 UTC [gossip.comm] sendToEndpoint -> DEBU 1c45 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.591 UTC [gossip.comm] sendToEndpoint -> DEBU 1c46 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.592 UTC [gossip.comm] Send -> DEBU 1c47 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.592 UTC [gossip.comm] sendToEndpoint -> DEBU 1c48 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.592 UTC [gossip.comm] sendToEndpoint -> DEBU 1c49 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.717 UTC [msp] DeserializeIdentity -> DEBU 1c4a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.718 UTC [msp] DeserializeIdentity -> DEBU 1c4b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.718 UTC [gossip.comm] Send -> DEBU 1c4c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c51 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c50 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.720 UTC [gossip.comm] func1 -> DEBU 1c52 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.722 UTC [gossip.comm] func1 -> DEBU 1c53 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1c54 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.722 UTC [gossip.gossip] handleMessage -> DEBU 1c55 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.722 UTC [msp] DeserializeIdentity -> DEBU 1c56 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.723 UTC [msp] DeserializeIdentity -> DEBU 1c57 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.723 UTC [msp] DeserializeIdentity -> DEBU 1c58 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.723 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c59 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c5a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c5b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func1 -> DEBU 1c5f 0xc003be0760 gate 1563590412724456500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c60 0xc003be0760 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c61 0xc003be0760 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c62 0xc003be0760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c63 0xc003be0760 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func1 -> DEBU 1c64 0xc003be0760 gate 1563590412724456500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c65 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.725 UTC [cauthdsl] func1 -> DEBU 1c68 0xc003be0fa0 gate 1563590412725972500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c69 0xc003be0fa0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c6a 0xc003be0fa0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c6b 0xc003be0fa0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.726 UTC [msp.identity] Verify -> DEBU 1c6c Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:12.726 UTC [msp.identity] Verify -> DEBU 1c6d Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:12.727 UTC [cauthdsl] func2 -> DEBU 1c6e 0xc003be0fa0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.727 UTC [cauthdsl] func1 -> DEBU 1c6f 0xc003be0fa0 gate 1563590412725972500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:12.727 UTC [policies] Evaluate -> DEBU 1c70 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.727 UTC [policies] Evaluate -> DEBU 1c71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.729 UTC [policies] Evaluate -> DEBU 1c72 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.729 UTC [policies] Evaluate -> DEBU 1c73 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.729 UTC [msp.identity] Verify -> DEBU 1c74 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:12.730 UTC [msp.identity] Verify -> DEBU 1c76 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:12.730 UTC [msp] DeserializeIdentity -> DEBU 1c77 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.731 UTC [msp] DeserializeIdentity -> DEBU 1c78 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.729 UTC [gossip.comm] func1 -> DEBU 1c75 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.731 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c79 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.732 UTC [policies] Evaluate -> DEBU 1c7c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.733 UTC [policies] Evaluate -> DEBU 1c7d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:12.733 UTC [policies] Evaluate -> DEBU 1c7e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.733 UTC [cauthdsl] func1 -> DEBU 1c7f 0xc000676470 gate 1563590412733754100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c80 0xc000676470 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c81 0xc000676470 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c82 0xc000676470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c83 0xc000676470 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.734 UTC [cauthdsl] func1 -> DEBU 1c84 0xc000676470 gate 1563590412733754100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c85 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c87 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.735 UTC [cauthdsl] func1 -> DEBU 1c88 0xc000676cb0 gate 1563590412735845900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c89 0xc000676cb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c8a 0xc000676cb0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c8b 0xc000676cb0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.736 UTC [msp.identity] Verify -> DEBU 1c8c Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:12.737 UTC [msp.identity] Verify -> DEBU 1c8d Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:12.737 UTC [cauthdsl] func2 -> DEBU 1c8e 0xc000676cb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.737 UTC [cauthdsl] func1 -> DEBU 1c8f 0xc000676cb0 gate 1563590412735845900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c92 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.739 UTC [msp] DeserializeIdentity -> DEBU 1c94 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.739 UTC [msp] DeserializeIdentity -> DEBU 1c95 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.739 UTC [gossip.pull] Hello -> DEBU 1c96 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:12.740 UTC [msp] DeserializeIdentity -> DEBU 1c97 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.740 UTC [msp.identity] Verify -> DEBU 1c98 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:12.740 UTC [msp] DeserializeIdentity -> DEBU 1c99 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.740 UTC [gossip.comm] Send -> DEBU 1c9a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.742 UTC [gossip.comm] func1 -> DEBU 1c9d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.740 UTC [msp.identity] Verify -> DEBU 1c9e Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:12.743 UTC [gossip.gossip] handleMessage -> DEBU 1c9f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.744 UTC [gossip.gossip] handleMessage -> DEBU 1ca0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.744 UTC [msp.identity] Verify -> DEBU 1ca1 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:12.744 UTC [msp.identity] Verify -> DEBU 1ca2 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:12.745 UTC [msp.identity] Verify -> DEBU 1ca3 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:12.745 UTC [msp.identity] Verify -> DEBU 1ca4 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:12.746 UTC [msp] DeserializeIdentity -> DEBU 1ca5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.746 UTC [msp] DeserializeIdentity -> DEBU 1ca6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.746 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ca7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:12.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.747 UTC [policies] Evaluate -> DEBU 1caa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.748 UTC [policies] Evaluate -> DEBU 1cab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:12.748 UTC [policies] Evaluate -> DEBU 1cac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.748 UTC [cauthdsl] func1 -> DEBU 1cad 0xc002ee5c20 gate 1563590412748635200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.748 UTC [cauthdsl] func2 -> DEBU 1cae 0xc002ee5c20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1caf 0xc002ee5c20 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1cb0 0xc002ee5c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1cb1 0xc002ee5c20 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.749 UTC [cauthdsl] func1 -> DEBU 1cb2 0xc002ee5c20 gate 1563590412748635200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.750 UTC [cauthdsl] func1 -> DEBU 1cb6 0xc003106460 gate 1563590412750893400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb7 0xc003106460 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb8 0xc003106460 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb9 0xc003106460 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.752 UTC [msp.identity] Verify -> DEBU 1cba Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:12.752 UTC [msp.identity] Verify -> DEBU 1cbb Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:12.752 UTC [cauthdsl] func2 -> DEBU 1cbc 0xc003106460 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.753 UTC [cauthdsl] func1 -> DEBU 1cbd 0xc003106460 gate 1563590412750893400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:12.753 UTC [policies] Evaluate -> DEBU 1cbe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.753 UTC [policies] Evaluate -> DEBU 1cbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.754 UTC [policies] Evaluate -> DEBU 1cc0 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.754 UTC [policies] Evaluate -> DEBU 1cc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.755 UTC [msp] DeserializeIdentity -> DEBU 1cc2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.755 UTC [msp] DeserializeIdentity -> DEBU 1cc3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.755 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:12.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cc5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cc6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.757 UTC [cauthdsl] func1 -> DEBU 1cca 0xc003107c30 gate 1563590412757102400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccb 0xc003107c30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccc 0xc003107c30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccd 0xc003107c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:12.758 UTC [cauthdsl] func2 -> DEBU 1cce 0xc003107c30 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.758 UTC [cauthdsl] func1 -> DEBU 1ccf 0xc003107c30 gate 1563590412757102400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.759 UTC [cauthdsl] func1 -> DEBU 1cd3 0xc003202470 gate 1563590412759144400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd4 0xc003202470 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd5 0xc003202470 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd6 0xc003202470 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.760 UTC [msp.identity] Verify -> DEBU 1cd7 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:12.760 UTC [msp.identity] Verify -> DEBU 1cd8 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:12.760 UTC [cauthdsl] func2 -> DEBU 1cd9 0xc003202470 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.761 UTC [cauthdsl] func1 -> DEBU 1cda 0xc003202470 gate 1563590412759144400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:12.761 UTC [policies] Evaluate -> DEBU 1cdb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.761 UTC [policies] Evaluate -> DEBU 1cdc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.762 UTC [policies] Evaluate -> DEBU 1cdd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.762 UTC [policies] Evaluate -> DEBU 1cde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.762 UTC [gossip.gossip] handleMessage -> DEBU 1cdf Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.762 UTC [gossip.gossip] handleMessage -> DEBU 1ce0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.762 UTC [msp] DeserializeIdentity -> DEBU 1ce1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.763 UTC [msp] DeserializeIdentity -> DEBU 1ce2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.763 UTC [msp] DeserializeIdentity -> DEBU 1ce3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.763 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ce4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:12.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ce5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ce6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.764 UTC [policies] Evaluate -> DEBU 1ce7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.765 UTC [policies] Evaluate -> DEBU 1ce8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:12.765 UTC [policies] Evaluate -> DEBU 1ce9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.766 UTC [cauthdsl] func1 -> DEBU 1cea 0xc003203f80 gate 1563590412766367800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.766 UTC [cauthdsl] func2 -> DEBU 1ceb 0xc003203f80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.766 UTC [cauthdsl] func2 -> DEBU 1cec 0xc003203f80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.767 UTC [cauthdsl] func2 -> DEBU 1ced 0xc003203f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:12.767 UTC [cauthdsl] func2 -> DEBU 1cee 0xc003203f80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.767 UTC [cauthdsl] func1 -> DEBU 1cef 0xc003203f80 gate 1563590412766367800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.767 UTC [policies] Evaluate -> DEBU 1cf0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.768 UTC [policies] Evaluate -> DEBU 1cf1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.768 UTC [policies] Evaluate -> DEBU 1cf2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.768 UTC [cauthdsl] func1 -> DEBU 1cf3 0xc0032127c0 gate 1563590412768604100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.768 UTC [cauthdsl] func2 -> DEBU 1cf4 0xc0032127c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.769 UTC [cauthdsl] func2 -> DEBU 1cf5 0xc0032127c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.769 UTC [cauthdsl] func2 -> DEBU 1cf6 0xc0032127c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.769 UTC [msp.identity] Verify -> DEBU 1cf7 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:12.769 UTC [msp.identity] Verify -> DEBU 1cf8 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:12.770 UTC [cauthdsl] func2 -> DEBU 1cf9 0xc0032127c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.770 UTC [cauthdsl] func1 -> DEBU 1cfa 0xc0032127c0 gate 1563590412768604100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:12.771 UTC [policies] Evaluate -> DEBU 1cfb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.771 UTC [policies] Evaluate -> DEBU 1cfc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.772 UTC [policies] Evaluate -> DEBU 1cfd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.772 UTC [policies] Evaluate -> DEBU 1cfe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.772 UTC [msp.identity] Verify -> DEBU 1cff Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d00 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d01 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d02 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:12.774 UTC [msp] DeserializeIdentity -> DEBU 1d03 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.775 UTC [msp] DeserializeIdentity -> DEBU 1d04 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d06 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d07 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:12.775 UTC [policies] Evaluate -> DEBU 1d08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.776 UTC [policies] Evaluate -> DEBU 1d09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:12.776 UTC [policies] Evaluate -> DEBU 1d0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.777 UTC [cauthdsl] func1 -> DEBU 1d0b 0xc003968dd0 gate 1563590412777229200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0c 0xc003968dd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0d 0xc003968dd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0e 0xc003968dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:12.778 UTC [cauthdsl] func2 -> DEBU 1d0f 0xc003968dd0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.778 UTC [cauthdsl] func1 -> DEBU 1d10 0xc003968dd0 gate 1563590412777229200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:12.778 UTC [policies] Evaluate -> DEBU 1d11 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.779 UTC [policies] Evaluate -> DEBU 1d12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.779 UTC [policies] Evaluate -> DEBU 1d13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:12.779 UTC [cauthdsl] func1 -> DEBU 1d14 0xc003969610 gate 1563590412779480700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:12.779 UTC [cauthdsl] func2 -> DEBU 1d15 0xc003969610 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:12.779 UTC [cauthdsl] func2 -> DEBU 1d16 0xc003969610 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:12.780 UTC [cauthdsl] func2 -> DEBU 1d17 0xc003969610 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.780 UTC [msp.identity] Verify -> DEBU 1d18 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:12.780 UTC [msp.identity] Verify -> DEBU 1d19 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:12.781 UTC [cauthdsl] func2 -> DEBU 1d1a 0xc003969610 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:12.781 UTC [cauthdsl] func1 -> DEBU 1d1b 0xc003969610 gate 1563590412779480700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:12.781 UTC [policies] Evaluate -> DEBU 1d1c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.781 UTC [policies] Evaluate -> DEBU 1d1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.782 UTC [policies] Evaluate -> DEBU 1d1e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.782 UTC [policies] Evaluate -> DEBU 1d1f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:12.782 UTC [gossip.gossip] handleMessage -> DEBU 1d20 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.782 UTC [gossip.gossip] handleMessage -> DEBU 1d21 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.783 UTC [gossip.pull] HandleMessage -> DEBU 1d22 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.783 UTC [gossip.gossip] handleMessage -> DEBU 1d23 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.878 UTC [gossip.comm] func1 -> DEBU 1d24 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.879 UTC [gossip.gossip] handleMessage -> DEBU 1d25 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.880 UTC [msp] DeserializeIdentity -> DEBU 1d26 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.880 UTC [msp] DeserializeIdentity -> DEBU 1d27 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:12.880 UTC [gossip.gossip] handleMessage -> DEBU 1d28 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:12.899 UTC [gossip.comm] func1 -> DEBU 1d29 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.899 UTC [gossip.gossip] handleMessage -> DEBU 1d2a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.900 UTC [gossip.pull] HandleMessage -> DEBU 1d2b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:12.900 UTC [gossip.pull] SendDigest -> DEBU 1d2c Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:12.900 UTC [gossip.gossip] handleMessage -> DEBU 1d2d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:13.047 UTC [gossip.comm] func1 -> DEBU 1d2e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:13.047 UTC [gossip.gossip] handleMessage -> DEBU 1d2f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:13.047 UTC [msp] DeserializeIdentity -> DEBU 1d30 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:13.048 UTC [msp] DeserializeIdentity -> DEBU 1d31 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:13.048 UTC [msp] DeserializeIdentity -> DEBU 1d32 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:13.048 UTC [gossip.gossip] handleMessage -> DEBU 1d33 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:13.181 UTC [gossip.comm] func1 -> DEBU 1d34 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:13.184 UTC [gossip.gossip] handleMessage -> DEBU 1d35 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d36 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d37 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d38 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:13.185 UTC [gossip.gossip] handleMessage -> DEBU 1d39 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:15.752 UTC [chaincode.platform.util] DockerBuild -> DEBU 1d3a Build output is # examples/chaincode/go/chaincode_example02 -peer0.org1.example.com | /tmp/go-link-111193500/000001.o: In function `pluginOpen': -peer0.org1.example.com | /workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -peer0.org1.example.com | /tmp/go-link-111193500/000021.o: In function `mygetgrouplist': -peer0.org1.example.com | /workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -peer0.org1.example.com | /tmp/go-link-111193500/000020.o: In function `mygetgrgid_r': -peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -peer0.org1.example.com | /tmp/go-link-111193500/000020.o: In function `mygetgrnam_r': -peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -peer0.org1.example.com | /tmp/go-link-111193500/000020.o: In function `mygetpwnam_r': -peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -peer0.org1.example.com | /tmp/go-link-111193500/000020.o: In function `mygetpwuid_r': -peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -peer0.org1.example.com | /tmp/go-link-111193500/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': -peer0.org1.example.com | /tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking" -peer0.org1.example.com | "2019-07-20 02:40:15.921 UTC [gossip.comm] func1 -> DEBU 1d3b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:15.922 UTC [gossip.gossip] handleMessage -> DEBU 1d3c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:15.922 UTC [gossip.gossip] handleMessage -> DEBU 1d3d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:15.922 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d3e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:15.922 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d3f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:15.922 UTC [msp] DeserializeIdentity -> DEBU 1d40 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:15.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d41 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:15.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d42 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:15.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d43 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d44 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d45 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d46 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:15.925 UTC [cauthdsl] func1 -> DEBU 1d47 0xc003fc5100 gate 1563590415925224500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d48 0xc003fc5100 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d49 0xc003fc5100 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d4a 0xc003fc5100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:15.926 UTC [cauthdsl] func2 -> DEBU 1d4b 0xc003fc5100 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:15.926 UTC [cauthdsl] func1 -> DEBU 1d4c 0xc003fc5100 gate 1563590415925224500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:15.927 UTC [cauthdsl] func1 -> DEBU 1d50 0xc003fc5940 gate 1563590415927346400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:15.927 UTC [cauthdsl] func2 -> DEBU 1d51 0xc003fc5940 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:15.929 UTC [cauthdsl] func2 -> DEBU 1d52 0xc003fc5940 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:15.931 UTC [cauthdsl] func2 -> DEBU 1d53 0xc003fc5940 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:15.931 UTC [msp.identity] Verify -> DEBU 1d54 Verify: digest = 00000000 44 70 96 6d 08 eb 0e 01 af ca 46 e3 23 2e 6e 2a |Dp.m......F.#.n*| -peer0.org1.example.com | 00000010 74 22 20 a5 ee 9e 36 37 01 7a 39 01 b2 ef 07 a2 |t" ...67.z9.....|" -peer0.org1.example.com | "2019-07-20 02:40:15.931 UTC [msp.identity] Verify -> DEBU 1d55 Verify: sig = 00000000 30 45 02 21 00 ae 53 71 0d e6 d6 d7 4e 55 75 7a |0E.!..Sq....NUuz| -peer0.org1.example.com | 00000010 1c 3a 1f f9 ea 9b 65 f2 db 7f 1d 5f d9 92 97 5f |.:....e...._..._| -peer0.org1.example.com | 00000020 ef 05 77 85 8b 02 20 1e 07 05 1f fc b7 b9 b6 e8 |..w... .........| -peer0.org1.example.com | 00000030 87 4f d1 44 d5 d4 00 14 5a 56 49 53 11 44 be 5f |.O.D....ZVIS.D._| -peer0.org1.example.com | 00000040 e1 ea 1b 14 b1 d0 68 |......h|" -peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [cauthdsl] func2 -> DEBU 1d56 0xc003fc5940 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [cauthdsl] func1 -> DEBU 1d57 0xc003fc5940 gate 1563590415927346400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d58 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d59 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d5a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d5b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d5c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5e updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5f Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d60 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:15.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d61 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:15.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d62 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:15.934 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d63 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:15.934 UTC [gossip.discovery] sendMemResponse -> DEBU 1d64 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:15.934 UTC [msp] DeserializeIdentity -> DEBU 1d65 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:15.935 UTC [msp] DeserializeIdentity -> DEBU 1d66 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:15.935 UTC [msp] DeserializeIdentity -> DEBU 1d67 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:15.935 UTC [gossip.comm] Send -> DEBU 1d68 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:15.936 UTC [gossip.comm] sendToEndpoint -> DEBU 1d69 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:15.936 UTC [gossip.comm] sendToEndpoint -> DEBU 1d6a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:15.937 UTC [gossip.discovery] sendMemResponse -> DEBU 1d6b Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" > alive:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [gossip.comm] func1 -> DEBU 1d6c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [gossip.gossip] handleMessage -> DEBU 1d6d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [gossip.pull] HandleMessage -> DEBU 1d6e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d6f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d70 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d71 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d72 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d73 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d74 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:15.940 UTC [gossip.pull] SendDigest -> DEBU 1d75 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:15.940 UTC [gossip.gossip] handleMessage -> DEBU 1d76 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.250 UTC [gossip.pull] Hello -> DEBU 1d77 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d78 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.251 UTC [gossip.pull] Hello -> DEBU 1d79 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d7a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.251 UTC [gossip.pull] Hello -> DEBU 1d7b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d7c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.253 UTC [gossip.comm] sendToEndpoint -> DEBU 1d80 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.253 UTC [gossip.comm] sendToEndpoint -> DEBU 1d81 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.254 UTC [gossip.comm] sendToEndpoint -> DEBU 1d82 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.255 UTC [gossip.comm] func1 -> DEBU 1d83 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.255 UTC [gossip.gossip] handleMessage -> DEBU 1d84 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.255 UTC [gossip.pull] HandleMessage -> DEBU 1d85 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.255 UTC [gossip.gossip] handleMessage -> DEBU 1d86 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.256 UTC [gossip.comm] func1 -> DEBU 1d87 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.256 UTC [gossip.gossip] handleMessage -> DEBU 1d88 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.256 UTC [gossip.pull] HandleMessage -> DEBU 1d89 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.257 UTC [gossip.gossip] handleMessage -> DEBU 1d8a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.257 UTC [gossip.comm] func1 -> DEBU 1d8b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.257 UTC [gossip.gossip] handleMessage -> DEBU 1d8c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.257 UTC [gossip.pull] HandleMessage -> DEBU 1d8d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.258 UTC [gossip.gossip] handleMessage -> DEBU 1d8e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp] GetDefaultSigningIdentity -> DEBU 1d8f Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d90 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101D " -peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d91 Sign: digest: EAF7A22AF5CA8E0579A0B66E67EF7FD85BB66BB3C7E606070BF191AB7011B33B " -peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp] GetDefaultSigningIdentity -> DEBU 1d92 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d93 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d94 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [gossip.comm] Send -> DEBU 1d95 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp] DeserializeIdentity -> DEBU 1d96 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] Send -> DEBU 1d97 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [msp] DeserializeIdentity -> DEBU 1d98 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] Send -> DEBU 1d99 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.297 UTC [gossip.comm] func1 -> DEBU 1da0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.297 UTC [gossip.gossip] handleMessage -> DEBU 1da1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.297 UTC [gossip.gossip] handleMessage -> DEBU 1da2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.298 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.298 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1da4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:16.298 UTC [msp.identity] Verify -> DEBU 1da5 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| -peer0.org1.example.com | 00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" -peer0.org1.example.com | "2019-07-20 02:40:16.298 UTC [msp.identity] Verify -> DEBU 1da6 Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| -peer0.org1.example.com | 00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| -peer0.org1.example.com | 00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| -peer0.org1.example.com | 00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| -peer0.org1.example.com | 00000040 ef b1 c2 24 bf d1 2d |...$..-|" -peer0.org1.example.com | "2019-07-20 02:40:16.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.299 UTC [gossip.discovery] isSentByMe -> DEBU 1da8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.299 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1daa Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:16.299 UTC [msp] DeserializeIdentity -> DEBU 1dab Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1dac Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dad Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dae Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.300 UTC [policies] Evaluate -> DEBU 1daf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.300 UTC [policies] Evaluate -> DEBU 1db0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:16.301 UTC [policies] Evaluate -> DEBU 1db1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1db2 0xc003e15250 gate 1563590416301899900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db3 0xc003e15250 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db4 0xc003e15250 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db5 0xc003e15250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db6 0xc003e15250 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1db7 0xc003e15250 gate 1563590416301899900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1db8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1dba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1dbb 0xc003e15bc0 gate 1563590416302711000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbc 0xc003e15bc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbd 0xc003e15bc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbe 0xc003e15bc0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [msp.identity] Verify -> DEBU 1dbf Verify: digest = 00000000 93 35 0e c2 25 f8 8a 17 84 64 01 ba d1 61 30 28 |.5..%....d...a0(| -peer0.org1.example.com | 00000010 b5 d2 27 ff 33 d5 f1 4e b1 90 cd a3 fc 9b fc 89 |..'.3..N........|" -peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [msp.identity] Verify -> DEBU 1dc0 Verify: sig = 00000000 30 45 02 21 00 97 1c 21 96 43 13 8c 1b a5 a6 8f |0E.!...!.C......| -peer0.org1.example.com | 00000010 b0 3b 1e c0 4c 6f cb e7 5d 45 3c a0 3e 1a bc dc |.;..Lo..]E<.>...| -peer0.org1.example.com | 00000020 ae b8 ac 8b bb 02 20 07 94 11 5c 1b 70 81 82 3d |...... ...\.p..=| -peer0.org1.example.com | 00000030 73 04 51 d7 01 9d 13 a3 91 dc 85 4a 61 1f ee 8e |s.Q........Ja...| -peer0.org1.example.com | 00000040 85 50 2f a9 4f 9d e4 |.P/.O..|" -peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [cauthdsl] func2 -> DEBU 1dc1 0xc003e15bc0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [cauthdsl] func1 -> DEBU 1dc2 0xc003e15bc0 gate 1563590416302711000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dc9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [msp.identity] Verify -> DEBU 1dca Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| -peer0.org1.example.com | 00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" -peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [msp.identity] Verify -> DEBU 1dcb Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| -peer0.org1.example.com | 00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| -peer0.org1.example.com | 00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| -peer0.org1.example.com | 00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| -peer0.org1.example.com | 00000040 29 a8 53 68 a7 11 7c |).Sh..||" -peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dcc Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dcd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dce Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.305 UTC [gossip.comm] func1 -> DEBU 1dcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.305 UTC [gossip.gossip] handleMessage -> DEBU 1dd0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.305 UTC [gossip.gossip] handleMessage -> DEBU 1dd1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dd2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dd3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [msp.identity] Verify -> DEBU 1dd4 Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| -peer0.org1.example.com | 00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" -peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [msp.identity] Verify -> DEBU 1dd5 Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| -peer0.org1.example.com | 00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| -peer0.org1.example.com | 00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| -peer0.org1.example.com | 00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| -peer0.org1.example.com | 00000040 29 a8 53 68 a7 11 7c |).Sh..||" -peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dd6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dd7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dd8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:16.307 UTC [msp.identity] Verify -> DEBU 1dd9 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| -peer0.org1.example.com | 00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" -peer0.org1.example.com | "2019-07-20 02:40:16.307 UTC [msp.identity] Verify -> DEBU 1dda Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| -peer0.org1.example.com | 00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| -peer0.org1.example.com | 00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| -peer0.org1.example.com | 00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| -peer0.org1.example.com | 00000040 ef b1 c2 24 bf d1 2d |...$..-|" -peer0.org1.example.com | "2019-07-20 02:40:16.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ddb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.307 UTC [gossip.discovery] isSentByMe -> DEBU 1ddc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ddd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dde Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [msp] DeserializeIdentity -> DEBU 1ddf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1de0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [cauthdsl] func1 -> DEBU 1de6 0xc003dc1ac0 gate 1563590416308814200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [cauthdsl] func2 -> DEBU 1de7 0xc003dc1ac0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [cauthdsl] func2 -> DEBU 1de8 0xc003dc1ac0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1de9 0xc003dc1ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1dea 0xc003dc1ac0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [cauthdsl] func1 -> DEBU 1deb 0xc003dc1ac0 gate 1563590416308814200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1dec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1ded == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1dee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [cauthdsl] func1 -> DEBU 1def 0xc003d44300 gate 1563590416309552900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1df0 0xc003d44300 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df1 0xc003d44300 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df2 0xc003d44300 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.310 UTC [msp.identity] Verify -> DEBU 1df3 Verify: digest = 00000000 44 70 96 6d 08 eb 0e 01 af ca 46 e3 23 2e 6e 2a |Dp.m......F.#.n*| -peer0.org1.example.com | 00000010 74 22 20 a5 ee 9e 36 37 01 7a 39 01 b2 ef 07 a2 |t" ...67.z9.....|" -peer0.org1.example.com | "2019-07-20 02:40:16.310 UTC [msp.identity] Verify -> DEBU 1df4 Verify: sig = 00000000 30 45 02 21 00 ae 53 71 0d e6 d6 d7 4e 55 75 7a |0E.!..Sq....NUuz| -peer0.org1.example.com | 00000010 1c 3a 1f f9 ea 9b 65 f2 db 7f 1d 5f d9 92 97 5f |.:....e...._..._| -peer0.org1.example.com | 00000020 ef 05 77 85 8b 02 20 1e 07 05 1f fc b7 b9 b6 e8 |..w... .........| -peer0.org1.example.com | 00000030 87 4f d1 44 d5 d4 00 14 5a 56 49 53 11 44 be 5f |.O.D....ZVIS.D._| -peer0.org1.example.com | 00000040 e1 ea 1b 14 b1 d0 68 |......h|" -peer0.org1.example.com | "2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df5 0xc003d44300 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [cauthdsl] func1 -> DEBU 1df6 0xc003d44300 gate 1563590416309552900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1dfa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dfb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dfc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dfd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.comm] func1 -> DEBU 1dfe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.gossip] handleMessage -> DEBU 1dff Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.gossip] handleMessage -> DEBU 1e00 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e01 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e02 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:16.313 UTC [msp.identity] Verify -> DEBU 1e03 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| -peer0.org1.example.com | 00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" -peer0.org1.example.com | "2019-07-20 02:40:16.313 UTC [msp.identity] Verify -> DEBU 1e04 Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| -peer0.org1.example.com | 00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| -peer0.org1.example.com | 00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| -peer0.org1.example.com | 00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| -peer0.org1.example.com | 00000040 ef b1 c2 24 bf d1 2d |...$..-|" -peer0.org1.example.com | "2019-07-20 02:40:16.314 UTC [msp.identity] Verify -> DEBU 1e05 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:16.314 UTC [msp.identity] Verify -> DEBU 1e06 Verify: sig = 00000000 30 44 02 20 7f f1 98 24 6f 3d ca 92 29 ba d5 f2 |0D. ...$o=..)...| -peer0.org1.example.com | 00000010 f7 19 e4 f9 b8 9a 6d 7e 18 4c 64 f1 11 1b be 71 |......m~.Ld....q| -peer0.org1.example.com | 00000020 5f 69 1e ba 02 20 42 95 c2 21 f1 b1 c1 dd b2 5c |_i... B..!.....\| -peer0.org1.example.com | 00000030 5b ba f5 ff 92 bc f2 b8 98 ee 4d b5 db 17 fd 8c |[.........M.....| -peer0.org1.example.com | 00000040 22 a4 3f 78 a3 a7 |".?x..|" -peer0.org1.example.com | "2019-07-20 02:40:16.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e07 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.315 UTC [gossip.discovery] isSentByMe -> DEBU 1e08 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e09 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e0a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.373 UTC [gossip.comm] func1 -> DEBU 1e0b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.373 UTC [gossip.comm] func1 -> DEBU 1e0c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.374 UTC [gossip.gossip] handleMessage -> DEBU 1e0d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.374 UTC [gossip.pull] HandleMessage -> DEBU 1e0e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.pull] SendDigest -> DEBU 1e0f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e10 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e11 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e12 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e13 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e14 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:16.376 UTC [msp.identity] Verify -> DEBU 1e15 Verify: digest = 00000000 d4 88 79 4c ab ef ec 5b 4c fc 3a 9e ed 6b 4d 0b |..yL...[L.:..kM.| -peer0.org1.example.com | 00000010 78 12 ce 61 78 05 ed 1e ea 74 26 40 4f 96 7f 21 |x..ax....t&@O..!|" -peer0.org1.example.com | "2019-07-20 02:40:16.376 UTC [msp.identity] Verify -> DEBU 1e16 Verify: sig = 00000000 30 45 02 21 00 ff 6b 12 d9 6e bc fe cb 4e a6 87 |0E.!..k..n...N..| -peer0.org1.example.com | 00000010 1a a3 8c 53 e7 1b f2 4e 35 a5 5e fb 70 03 cf cd |...S...N5.^.p...| -peer0.org1.example.com | 00000020 df 98 12 fc 8c 02 20 6f 81 c0 48 ae 61 09 d7 fe |...... o..H.a...| -peer0.org1.example.com | 00000030 d2 5e eb 81 bd 02 12 a4 9e 76 ab d0 1d ed 52 40 |.^.......v....R@| -peer0.org1.example.com | 00000040 be 83 ab ee 51 8a e3 |....Q..|" -peer0.org1.example.com | "2019-07-20 02:40:16.377 UTC [msp.identity] Verify -> DEBU 1e17 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:16.377 UTC [msp.identity] Verify -> DEBU 1e18 Verify: sig = 00000000 30 45 02 21 00 c5 1a 8f 3f 40 5f c4 67 33 2a eb |0E.!....?@_.g3*.| -peer0.org1.example.com | 00000010 ca 9d 80 53 5b a8 d3 3e 03 44 07 ca 3a 73 4e 75 |...S[..>.D..:sNu| -peer0.org1.example.com | 00000020 d4 02 79 a9 95 02 20 07 d6 08 69 cf f9 09 4e ab |..y... ...i...N.| -peer0.org1.example.com | 00000030 a8 83 77 48 68 7b e5 86 58 5c d3 b8 53 d1 0d 6f |..wHh{..X\..S..o| -peer0.org1.example.com | 00000040 67 44 ae d0 62 a0 d9 |gD..b..|" -peer0.org1.example.com | "2019-07-20 02:40:16.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e19 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:16.381 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:16.381 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.381 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e1f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.382 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e20 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.382 UTC [gossip.discovery] sendMemResponse -> DEBU 1e21 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:16.389 UTC [msp] DeserializeIdentity -> DEBU 1e22 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.389 UTC [msp] DeserializeIdentity -> DEBU 1e23 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.390 UTC [gossip.comm] Send -> DEBU 1e24 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.390 UTC [gossip.discovery] sendMemResponse -> DEBU 1e25 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > alive: " -peer0.org1.example.com | "2019-07-20 02:40:16.390 UTC [gossip.comm] sendToEndpoint -> DEBU 1e26 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.390 UTC [gossip.comm] sendToEndpoint -> DEBU 1e27 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.551 UTC [gossip.comm] func1 -> DEBU 1e28 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.554 UTC [gossip.gossip] handleMessage -> DEBU 1e29 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.554 UTC [gossip.pull] HandleMessage -> DEBU 1e2a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e30 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [gossip.pull] SendDigest -> DEBU 1e31 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [gossip.gossip] handleMessage -> DEBU 1e32 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [gossip.comm] func1 -> DEBU 1e33 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.556 UTC [gossip.gossip] handleMessage -> DEBU 1e34 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.556 UTC [gossip.gossip] handleMessage -> DEBU 1e35 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e36 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.556 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e37 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:16.556 UTC [msp] DeserializeIdentity -> DEBU 1e38 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e3a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e3b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [cauthdsl] func1 -> DEBU 1e3f 0xc003c5c0b0 gate 1563590416557187600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e40 0xc003c5c0b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e41 0xc003c5c0b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e42 0xc003c5c0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:16.558 UTC [cauthdsl] func2 -> DEBU 1e43 0xc003c5c0b0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.558 UTC [cauthdsl] func1 -> DEBU 1e44 0xc003c5c0b0 gate 1563590416557187600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.558 UTC [policies] Evaluate -> DEBU 1e45 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func1 -> DEBU 1e48 0xc003c5c900 gate 1563590416559132400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e49 0xc003c5c900 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4a 0xc003c5c900 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4b 0xc003c5c900 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [msp.identity] Verify -> DEBU 1e4c Verify: digest = 00000000 61 a3 4c 02 09 c8 78 79 d5 52 cf cd c1 b5 88 0d |a.L...xy.R......| -peer0.org1.example.com | 00000010 9c 8e b8 05 37 19 ef af 13 62 ce ee 3d 5b f8 dd |....7....b..=[..|" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [msp.identity] Verify -> DEBU 1e4d Verify: sig = 00000000 30 44 02 20 0f cb ae d7 9d 43 db d7 6b 83 72 5b |0D. .....C..k.r[| -peer0.org1.example.com | 00000010 30 9c ae d6 c3 a9 46 c1 82 2c 7e 40 77 7b c0 44 |0.....F..,~@w{.D| -peer0.org1.example.com | 00000020 62 c5 a3 ab 02 20 2b 76 9d f6 21 dd e2 da f0 c7 |b.... +v..!.....| -peer0.org1.example.com | 00000030 ea 69 d3 40 25 84 b9 cb 68 43 69 26 c2 39 b8 2e |.i.@%...hCi&.9..| -peer0.org1.example.com | 00000040 2a bb af f6 89 1e |*.....|" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4e 0xc003c5c900 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func1 -> DEBU 1e4f 0xc003c5c900 gate 1563590416559132400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e50 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e52 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e54 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e55 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e56 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e57 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e58 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:16.560 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e59 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.560 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e5a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.560 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e5b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.561 UTC [gossip.discovery] sendMemResponse -> DEBU 1e5c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:16.561 UTC [msp] DeserializeIdentity -> DEBU 1e5d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [msp] DeserializeIdentity -> DEBU 1e5e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [msp] DeserializeIdentity -> DEBU 1e5f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [gossip.comm] Send -> DEBU 1e60 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [gossip.discovery] sendMemResponse -> DEBU 1e61 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [gossip.comm] sendToEndpoint -> DEBU 1e62 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [gossip.comm] sendToEndpoint -> DEBU 1e63 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [msp] DeserializeIdentity -> DEBU 1e64 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [msp] DeserializeIdentity -> DEBU 1e65 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [gossip.comm] Send -> DEBU 1e66 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e67 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e68 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e69 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.723 UTC [gossip.comm] func1 -> DEBU 1e6d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.723 UTC [gossip.gossip] handleMessage -> DEBU 1e6e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e6f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e70 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e71 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e73 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e74 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func1 -> DEBU 1e78 0xc003bb2470 gate 1563590416726517700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e79 0xc003bb2470 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7a 0xc003bb2470 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7b 0xc003bb2470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7c 0xc003bb2470 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func1 -> DEBU 1e7d 0xc003bb2470 gate 1563590416726517700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e7e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func1 -> DEBU 1e81 0xc003bb2cd0 gate 1563590416727128300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e82 0xc003bb2cd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e83 0xc003bb2cd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e84 0xc003bb2cd0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [msp.identity] Verify -> DEBU 1e85 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [msp.identity] Verify -> DEBU 1e86 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e87 0xc003bb2cd0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func1 -> DEBU 1e88 0xc003bb2cd0 gate 1563590416727128300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8d Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8e Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e90 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [msp] DeserializeIdentity -> DEBU 1e91 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [msp] DeserializeIdentity -> DEBU 1e92 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e93 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e94 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e95 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [policies] Evaluate -> DEBU 1e96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [policies] Evaluate -> DEBU 1e97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1e98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1e99 0xc003b67400 gate 1563590416730027400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9a 0xc003b67400 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9b 0xc003b67400 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9c 0xc003b67400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9d 0xc003b67400 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1e9e 0xc003b67400 gate 1563590416730027400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1e9f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1ea0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1ea1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1ea2 0xc003b67c40 gate 1563590416730842400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1ea3 0xc003b67c40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1ea4 0xc003b67c40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [cauthdsl] func2 -> DEBU 1ea5 0xc003b67c40 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [msp.identity] Verify -> DEBU 1ea6 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [msp.identity] Verify -> DEBU 1ea7 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [cauthdsl] func2 -> DEBU 1ea8 0xc003b67c40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [cauthdsl] func1 -> DEBU 1ea9 0xc003b67c40 gate 1563590416730842400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [policies] Evaluate -> DEBU 1eaa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [policies] Evaluate -> DEBU 1eab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.732 UTC [policies] Evaluate -> DEBU 1eac Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.732 UTC [policies] Evaluate -> DEBU 1ead == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.732 UTC [gossip.gossip] handleMessage -> DEBU 1eae Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.732 UTC [gossip.comm] func1 -> DEBU 1eaf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.732 UTC [gossip.gossip] handleMessage -> DEBU 1eb0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.733 UTC [msp] DeserializeIdentity -> DEBU 1eb1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.736 UTC [msp] DeserializeIdentity -> DEBU 1eb2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.737 UTC [msp] DeserializeIdentity -> DEBU 1eb3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1eb4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eb5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eb6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.739 UTC [policies] Evaluate -> DEBU 1eb7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.741 UTC [policies] Evaluate -> DEBU 1eb8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:16.741 UTC [policies] Evaluate -> DEBU 1eb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func1 -> DEBU 1eba 0xc003aa58d0 gate 1563590416742339500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebb 0xc003aa58d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebc 0xc003aa58d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebd 0xc003aa58d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebe 0xc003aa58d0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func1 -> DEBU 1ebf 0xc003aa58d0 gate 1563590416742339500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [policies] Evaluate -> DEBU 1ec0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.748 UTC [policies] Evaluate -> DEBU 1ec1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.748 UTC [policies] Evaluate -> DEBU 1ec2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.748 UTC [msp] DeserializeIdentity -> DEBU 1ec3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.748 UTC [msp] DeserializeIdentity -> DEBU 1ec4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [gossip.pull] Hello -> DEBU 1ec5 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [msp] DeserializeIdentity -> DEBU 1ec6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [msp] DeserializeIdentity -> DEBU 1ec7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [gossip.comm] Send -> DEBU 1ec8 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [gossip.comm] sendToEndpoint -> DEBU 1ec9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [gossip.comm] sendToEndpoint -> DEBU 1eca Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [gossip.comm] func1 -> DEBU 1ecb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.748 UTC [cauthdsl] func1 -> DEBU 1ecc 0xc003a8c110 gate 1563590416748113900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ecd 0xc003a8c110 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ece 0xc003a8c110 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ecf 0xc003a8c110 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [msp.identity] Verify -> DEBU 1ed0 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [msp.identity] Verify -> DEBU 1ed1 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [cauthdsl] func2 -> DEBU 1ed2 0xc003a8c110 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [cauthdsl] func1 -> DEBU 1ed3 0xc003a8c110 gate 1563590416748113900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [msp.identity] Verify -> DEBU 1ed8 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [msp.identity] Verify -> DEBU 1ed9 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:16.751 UTC [msp] DeserializeIdentity -> DEBU 1eda Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.751 UTC [msp] DeserializeIdentity -> DEBU 1edb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.754 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1edc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:16.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1edd Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ede Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.755 UTC [policies] Evaluate -> DEBU 1edf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.756 UTC [policies] Evaluate -> DEBU 1ee0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:16.756 UTC [policies] Evaluate -> DEBU 1ee1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.756 UTC [cauthdsl] func1 -> DEBU 1ee2 0xc0039c2b00 gate 1563590416756518800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee3 0xc0039c2b00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee4 0xc0039c2b00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee5 0xc0039c2b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:16.758 UTC [cauthdsl] func2 -> DEBU 1ee6 0xc0039c2b00 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.758 UTC [cauthdsl] func1 -> DEBU 1ee7 0xc0039c2b00 gate 1563590416756518800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.758 UTC [policies] Evaluate -> DEBU 1ee8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.758 UTC [policies] Evaluate -> DEBU 1ee9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.759 UTC [policies] Evaluate -> DEBU 1eea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.760 UTC [cauthdsl] func1 -> DEBU 1eeb 0xc0039c3340 gate 1563590416760566000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.760 UTC [cauthdsl] func2 -> DEBU 1eec 0xc0039c3340 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.761 UTC [cauthdsl] func2 -> DEBU 1eed 0xc0039c3340 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.761 UTC [cauthdsl] func2 -> DEBU 1eee 0xc0039c3340 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.761 UTC [msp.identity] Verify -> DEBU 1eef Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [msp.identity] Verify -> DEBU 1ef0 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [cauthdsl] func2 -> DEBU 1ef1 0xc0039c3340 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [cauthdsl] func1 -> DEBU 1ef2 0xc0039c3340 gate 1563590416760566000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.763 UTC [msp.identity] Verify -> DEBU 1ef7 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:16.763 UTC [msp.identity] Verify -> DEBU 1ef8 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:16.765 UTC [gossip.gossip] handleMessage -> DEBU 1ef9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.765 UTC [gossip.gossip] handleMessage -> DEBU 1efa Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.766 UTC [msp.identity] Verify -> DEBU 1efb Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:16.766 UTC [msp.identity] Verify -> DEBU 1efc Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:16.767 UTC [msp.identity] Verify -> DEBU 1efd Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:16.767 UTC [msp.identity] Verify -> DEBU 1efe Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:16.768 UTC [msp] DeserializeIdentity -> DEBU 1eff Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.768 UTC [msp] DeserializeIdentity -> DEBU 1f00 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f01 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f02 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f03 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.770 UTC [policies] Evaluate -> DEBU 1f04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.772 UTC [policies] Evaluate -> DEBU 1f05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:16.773 UTC [policies] Evaluate -> DEBU 1f06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.774 UTC [cauthdsl] func1 -> DEBU 1f07 0xc0039382d0 gate 1563590416774009200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f08 0xc0039382d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f09 0xc0039382d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f0a 0xc0039382d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [cauthdsl] func2 -> DEBU 1f0b 0xc0039382d0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [cauthdsl] func1 -> DEBU 1f0c 0xc0039382d0 gate 1563590416774009200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [cauthdsl] func1 -> DEBU 1f10 0xc003938b10 gate 1563590416775804700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [cauthdsl] func2 -> DEBU 1f11 0xc003938b10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f12 0xc003938b10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f13 0xc003938b10 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [msp.identity] Verify -> DEBU 1f14 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [msp.identity] Verify -> DEBU 1f15 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f16 0xc003938b10 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [cauthdsl] func1 -> DEBU 1f17 0xc003938b10 gate 1563590416775804700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f1a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [policies] Evaluate -> DEBU 1f1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [msp] DeserializeIdentity -> DEBU 1f1c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [msp] DeserializeIdentity -> DEBU 1f1d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f1e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f1f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f20 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [policies] Evaluate -> DEBU 1f21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f24 0xc00392c2f0 gate 1563590416778246900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f25 0xc00392c2f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f26 0xc00392c2f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f27 0xc00392c2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f28 0xc00392c2f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f29 0xc00392c2f0 gate 1563590416778246900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f2d 0xc00392cb40 gate 1563590416778963500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f2e 0xc00392cb40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f2f 0xc00392cb40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f30 0xc00392cb40 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [msp.identity] Verify -> DEBU 1f31 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [msp.identity] Verify -> DEBU 1f32 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f33 0xc00392cb40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [cauthdsl] func1 -> DEBU 1f34 0xc00392cb40 gate 1563590416778963500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f35 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f37 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.780 UTC [gossip.gossip] handleMessage -> DEBU 1f39 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.780 UTC [gossip.election] waitForInterrupt -> DEBU 1f3a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.781 UTC [gossip.election] IsLeader -> DEBU 1f3c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:16.781 UTC [msp] GetDefaultSigningIdentity -> DEBU 1f3d Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:16.782 UTC [msp.identity] Sign -> DEBU 1f3e Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510081801 " -peer0.org1.example.com | "2019-07-20 02:40:16.782 UTC [msp.identity] Sign -> DEBU 1f3f Sign: digest: 72C061B50037B049C617D6280701E32A01DAC65D803A3817D50E2C07CBCF1128 " -peer0.org1.example.com | "2019-07-20 02:40:16.783 UTC [gossip.election] waitForInterrupt -> DEBU 1f40 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:16.780 UTC [gossip.comm] func1 -> DEBU 1f3b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.783 UTC [gossip.gossip] handleMessage -> DEBU 1f41 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.783 UTC [gossip.pull] HandleMessage -> DEBU 1f42 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.784 UTC [gossip.gossip] handleMessage -> DEBU 1f43 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.791 UTC [msp] DeserializeIdentity -> DEBU 1f44 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f45 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f46 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f47 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [gossip.comm] Send -> DEBU 1f48 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f49 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f4a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.793 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.793 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.881 UTC [gossip.comm] func1 -> DEBU 1f4d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.881 UTC [gossip.gossip] handleMessage -> DEBU 1f4e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.881 UTC [msp] DeserializeIdentity -> DEBU 1f4f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.882 UTC [msp] DeserializeIdentity -> DEBU 1f50 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.882 UTC [gossip.gossip] handleMessage -> DEBU 1f51 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.900 UTC [gossip.comm] func1 -> DEBU 1f52 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.900 UTC [gossip.gossip] handleMessage -> DEBU 1f53 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.900 UTC [gossip.pull] HandleMessage -> DEBU 1f54 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.900 UTC [gossip.pull] SendDigest -> DEBU 1f55 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:16.900 UTC [gossip.gossip] handleMessage -> DEBU 1f56 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.916 UTC [gossip.comm] func1 -> DEBU 1f57 Got message: GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.916 UTC [gossip.gossip] handleMessage -> DEBU 1f58 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.916 UTC [gossip.gossip] handleMessage -> DEBU 1f59 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f5a Got message: GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f5b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:16.917 UTC [msp.identity] Verify -> DEBU 1f5c Verify: digest = 00000000 cc 35 f5 ac a4 a9 a4 14 67 4a 65 c3 39 7e 1b 4c |.5......gJe.9~.L| -peer0.org1.example.com | 00000010 b4 ca 28 e0 ed 43 61 87 bf c3 02 2b dc 47 31 8b |..(..Ca....+.G1.|" -peer0.org1.example.com | "2019-07-20 02:40:16.917 UTC [msp.identity] Verify -> DEBU 1f5d Verify: sig = 00000000 30 44 02 20 1b 0b b3 f9 28 4a 21 28 f9 0a f6 a7 |0D. ....(J!(....| -peer0.org1.example.com | 00000010 6b 49 ef 9c dc 3e 3d 78 e7 49 de 89 55 7b cc ac |kI...>=x.I..U{..| -peer0.org1.example.com | 00000020 40 7e b3 42 02 20 03 55 3c 12 32 0a 46 ef c1 3e |@~.B. .U<.2.F..>| -peer0.org1.example.com | 00000030 76 89 d8 1f c4 21 6f 41 32 da 89 db 40 98 0e 19 |v....!oA2...@...| -peer0.org1.example.com | 00000040 83 ac 72 d8 de 1a |..r...|" -peer0.org1.example.com | "2019-07-20 02:40:16.918 UTC [msp.identity] Verify -> DEBU 1f5e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:16.918 UTC [msp.identity] Verify -> DEBU 1f5f Verify: sig = 00000000 30 44 02 20 59 aa 69 60 a2 b7 28 11 ed 8e c6 e0 |0D. Y.i`..(.....| -peer0.org1.example.com | 00000010 9d 39 d7 71 f5 7a 50 15 2e ff 79 5b 2c 82 76 c3 |.9.q.zP...y[,.v.| -peer0.org1.example.com | 00000020 44 9d 41 10 02 20 08 02 8e a9 c9 63 76 d1 a3 9b |D.A.. .....cv...| -peer0.org1.example.com | 00000030 1d d8 aa ff c3 c1 1d 85 be 4a 0b 7b ad 3d 2b f2 |.........J.{.=+.| -peer0.org1.example.com | 00000040 f0 a1 ae 0e d6 80 |......|" -peer0.org1.example.com | "2019-07-20 02:40:16.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f60 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.919 UTC [gossip.discovery] sendMemResponse -> DEBU 1f61 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:16.920 UTC [msp] DeserializeIdentity -> DEBU 1f62 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.920 UTC [msp] DeserializeIdentity -> DEBU 1f63 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.921 UTC [gossip.comm] Send -> DEBU 1f64 Entering, sending GossipMessage: Channel: , nonce: 8464964237863176812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.921 UTC [gossip.discovery] sendMemResponse -> DEBU 1f65 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > alive: " -peer0.org1.example.com | "2019-07-20 02:40:16.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1f66 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8464964237863176812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1f67 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.923 UTC [gossip.comm] func1 -> DEBU 1f68 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.923 UTC [gossip.gossip] handleMessage -> DEBU 1f69 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [gossip.gossip] handleMessage -> DEBU 1f6a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f6c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [msp] DeserializeIdentity -> DEBU 1f6d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f6f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f70 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [policies] Evaluate -> DEBU 1f71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func1 -> DEBU 1f74 0xc0037d9190 gate 1563590416925101500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f75 0xc0037d9190 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f76 0xc0037d9190 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f77 0xc0037d9190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f78 0xc0037d9190 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func1 -> DEBU 1f79 0xc0037d9190 gate 1563590416925101500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func1 -> DEBU 1f7d 0xc0037d9b00 gate 1563590416926021500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc0037d9b00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f7f 0xc0037d9b00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f80 0xc0037d9b00 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [msp.identity] Verify -> DEBU 1f81 Verify: digest = 00000000 6f 20 d1 54 54 e5 8d cd 14 6f 29 8a b0 8d 95 d0 |o .TT....o).....| -peer0.org1.example.com | 00000010 79 06 49 40 e2 b7 79 61 a1 4e e7 45 b0 b6 63 94 |y.I@..ya.N.E..c.|" -peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [msp.identity] Verify -> DEBU 1f82 Verify: sig = 00000000 30 44 02 20 0d fd 3d 30 79 8b 3f 71 79 fe 7e c4 |0D. ..=0y.?qy.~.| -peer0.org1.example.com | 00000010 f5 8b 90 0f 6d 3d ba cb dd 7e 38 02 35 f8 00 7c |....m=...~8.5..|| -peer0.org1.example.com | 00000020 44 13 d1 5a 02 20 2d 08 29 5e 88 60 a5 df 74 42 |D..Z. -.)^.`..tB| -peer0.org1.example.com | 00000030 d5 86 92 f6 b4 c1 56 80 49 14 fe 08 f8 5d ac 40 |......V.I....].@| -peer0.org1.example.com | 00000040 58 94 67 ac 1a 38 |X.g..8|" -peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f83 0xc0037d9b00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func1 -> DEBU 1f84 0xc0037d9b00 gate 1563590416926021500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [policies] Evaluate -> DEBU 1f85 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [policies] Evaluate -> DEBU 1f86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [policies] Evaluate -> DEBU 1f87 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [policies] Evaluate -> DEBU 1f88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f89 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8b updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8c Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:16.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:16.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f8f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f90 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.comm] func1 -> DEBU 1f91 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.gossip] handleMessage -> DEBU 1f92 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.gossip] handleMessage -> DEBU 1f93 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f94 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f95 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.930 UTC [gossip.comm] func1 -> DEBU 1f96 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.930 UTC [gossip.gossip] handleMessage -> DEBU 1f97 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.930 UTC [gossip.gossip] handleMessage -> DEBU 1f98 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f99 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f9a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1f9f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1fa0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1fa1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] Send -> DEBU 1fa2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [msp] DeserializeIdentity -> DEBU 1fa3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] Send -> DEBU 1fa4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.057 UTC [gossip.comm] func1 -> DEBU 1fa9 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.058 UTC [gossip.gossip] handleMessage -> DEBU 1faa Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.058 UTC [msp] DeserializeIdentity -> DEBU 1fab Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.059 UTC [msp] DeserializeIdentity -> DEBU 1fac Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.059 UTC [msp] DeserializeIdentity -> DEBU 1fad Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.060 UTC [gossip.gossip] handleMessage -> DEBU 1fae Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.182 UTC [gossip.comm] func1 -> DEBU 1faf Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.182 UTC [gossip.gossip] handleMessage -> DEBU 1fb0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.182 UTC [msp] DeserializeIdentity -> DEBU 1fb1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.182 UTC [msp] DeserializeIdentity -> DEBU 1fb2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.183 UTC [msp] DeserializeIdentity -> DEBU 1fb3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.183 UTC [gossip.gossip] handleMessage -> DEBU 1fb4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [gossip.comm] func1 -> DEBU 1fb5 Got message: GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [gossip.gossip] handleMessage -> DEBU 1fb6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [gossip.gossip] handleMessage -> DEBU 1fb7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fb8 Got message: GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fb9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [msp] DeserializeIdentity -> DEBU 1fba Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fbb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fbc Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fbd Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fbe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fbf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func1 -> DEBU 1fc1 0xc0036c4420 gate 1563590417199586800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc2 0xc0036c4420 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc3 0xc0036c4420 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc4 0xc0036c4420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc5 0xc0036c4420 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func1 -> DEBU 1fc6 0xc0036c4420 gate 1563590417199586800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func1 -> DEBU 1fca 0xc0036c4c70 gate 1563590417200134700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcb 0xc0036c4c70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcc 0xc0036c4c70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcd 0xc0036c4c70 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [msp.identity] Verify -> DEBU 1fce Verify: digest = 00000000 ed 7b 4d 70 98 46 1b c4 26 38 67 46 2b e8 f7 ee |.{Mp.F..&8gF+...| -peer0.org1.example.com | 00000010 e9 fe bf f7 97 9c fb 5c 5d 41 75 7d 10 21 3c 16 |.......\]Au}.!<.|" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [msp.identity] Verify -> DEBU 1fcf Verify: sig = 00000000 30 45 02 21 00 ee 7f 00 3b f4 4c 90 d6 03 4f 4e |0E.!....;.L...ON| -peer0.org1.example.com | 00000010 e3 33 89 44 c6 7d 49 6d 81 e2 5c f4 e6 f4 f6 0d |.3.D.}Im..\.....| -peer0.org1.example.com | 00000020 5f 3e fc e3 a5 02 20 5c c5 05 6f 1b fe e4 b8 57 |_>.... \..o....W| -peer0.org1.example.com | 00000030 68 2b 8b 2a f1 5d 4b ae dc ff 35 81 87 26 21 ff |h+.*.]K...5..&!.| -peer0.org1.example.com | 00000040 d7 1a 0f e0 c2 4e d7 |.....N.|" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fd0 0xc0036c4c70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func1 -> DEBU 1fd1 0xc0036c4c70 gate 1563590417200134700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [policies] Evaluate -> DEBU 1fd5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fd6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [gossip.discovery] sendMemResponse -> DEBU 1fd7 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fd8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fd9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fda Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [gossip.comm] Send -> DEBU 1fdb Entering, sending GossipMessage: Channel: , nonce: 9439307332943569821, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:17.202 UTC [gossip.discovery] sendMemResponse -> DEBU 1fdc Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" > alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:17.202 UTC [gossip.comm] sendToEndpoint -> DEBU 1fdd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9439307332943569821, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.202 UTC [gossip.comm] sendToEndpoint -> DEBU 1fde Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fdf Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101E " -peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe1 Sign: digest: AAF36FAB600E8E5D6DFD21332E6C75166CB3FE373AC44A50CD1CD54E3F06C093 " -peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fe2 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1fe5 Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.244 UTC [gossip.comm] Send -> DEBU 1fe9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:17.244 UTC [gossip.comm] Send -> DEBU 1fea Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [msp] DeserializeIdentity -> DEBU 1feb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] Send -> DEBU 1fec Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fed Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fee Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fef Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.361 UTC [gossip.comm] func1 -> DEBU 1ff3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [gossip.gossip] handleMessage -> DEBU 1ff4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [gossip.gossip] handleMessage -> DEBU 1ff5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ff6 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ff7 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [msp.identity] Verify -> DEBU 1ff8 Verify: digest = 00000000 0d 6e 69 b8 fb 0f 8c 32 85 95 ab 75 32 b2 e4 bd |.ni....2...u2...| -peer0.org1.example.com | 00000010 a6 9a b4 b6 36 ad d9 a8 a4 ee 55 fe 0a 63 f2 0c |....6.....U..c..|" -peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [msp.identity] Verify -> DEBU 1ff9 Verify: sig = 00000000 30 44 02 20 5d 4e 0e 9a cf 91 95 00 ca 60 15 91 |0D. ]N.......`..| -peer0.org1.example.com | 00000010 1d 35 18 08 83 81 13 37 91 87 8b 8a 37 f9 b6 67 |.5.....7....7..g| -peer0.org1.example.com | 00000020 aa 87 e5 47 02 20 07 17 ea 01 93 e6 d3 27 36 b2 |...G. .......'6.| -peer0.org1.example.com | 00000030 b8 ee 42 d4 15 f0 35 a9 88 dc 8f 89 73 5e 14 46 |..B...5.....s^.F| -peer0.org1.example.com | 00000040 a4 f9 c8 ec 3e 2e |....>.|" -peer0.org1.example.com | "2019-07-20 02:40:17.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ffa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.363 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffc updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffd Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffe Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fff Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] handleAliveMessage -> DEBU 2000 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2001 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2002 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2003 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2004 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.369 UTC [gossip.comm] Send -> DEBU 2005 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:17.369 UTC [msp] DeserializeIdentity -> DEBU 2006 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.370 UTC [gossip.comm] Send -> DEBU 2007 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:17.370 UTC [gossip.comm] sendToEndpoint -> DEBU 2008 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.371 UTC [gossip.comm] sendToEndpoint -> DEBU 2009 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.372 UTC [gossip.comm] sendToEndpoint -> DEBU 200a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.372 UTC [gossip.comm] sendToEndpoint -> DEBU 200b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.372 UTC [gossip.comm] func1 -> DEBU 200c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.373 UTC [gossip.gossip] handleMessage -> DEBU 200d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.373 UTC [gossip.gossip] handleMessage -> DEBU 200e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 200f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2010 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.374 UTC [gossip.comm] func1 -> DEBU 2011 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.375 UTC [gossip.gossip] handleMessage -> DEBU 2012 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.375 UTC [gossip.gossip] handleMessage -> DEBU 2013 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2014 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2015 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [gossip.comm] func1 -> DEBU 2016 Got message: GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [gossip.gossip] handleMessage -> DEBU 2017 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [gossip.gossip] handleMessage -> DEBU 2018 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2019 Got message: GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 201a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [msp] DeserializeIdentity -> DEBU 201b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 201c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 201f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 2020 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 2021 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:17.410 UTC [cauthdsl] func1 -> DEBU 2022 0xc003687320 gate 1563590417410060500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2023 0xc003687320 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2024 0xc003687320 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2025 0xc003687320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:17.411 UTC [cauthdsl] func2 -> DEBU 2026 0xc003687320 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:17.411 UTC [cauthdsl] func1 -> DEBU 2027 0xc003687320 gate 1563590417410060500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:17.411 UTC [policies] Evaluate -> DEBU 2028 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.412 UTC [policies] Evaluate -> DEBU 2029 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [policies] Evaluate -> DEBU 202a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [cauthdsl] func1 -> DEBU 202b 0xc003687b60 gate 1563590417413050900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202c 0xc003687b60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202d 0xc003687b60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202e 0xc003687b60 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [msp.identity] Verify -> DEBU 202f Verify: digest = 00000000 8a 2b f9 43 5b 7a ef 10 f4 24 ff a7 f6 54 4d af |.+.C[z...$...TM.| -peer0.org1.example.com | 00000010 ae 4b 85 11 6d 31 72 f5 50 32 2c 76 c5 a6 bb 21 |.K..m1r.P2,v...!|" -peer0.org1.example.com | "2019-07-20 02:40:17.414 UTC [msp.identity] Verify -> DEBU 2030 Verify: sig = 00000000 30 45 02 21 00 bf f5 f2 c7 b0 3e 98 23 0c 5d 27 |0E.!......>.#.]'| -peer0.org1.example.com | 00000010 c1 3b 50 34 b7 9a 5c 1a f0 66 33 51 2d f0 a0 a6 |.;P4..\..f3Q-...| -peer0.org1.example.com | 00000020 7d f1 c9 3a 5e 02 20 77 e8 d0 30 d7 86 49 83 8b |}..:^. w..0..I..| -peer0.org1.example.com | 00000030 93 94 16 f9 5d ca b8 ee 42 dc 57 24 b5 99 ff 52 |....]...B.W$...R| -peer0.org1.example.com | 00000040 d9 df 71 f8 c1 ba 89 |..q....|" -peer0.org1.example.com | "2019-07-20 02:40:17.414 UTC [cauthdsl] func2 -> DEBU 2031 0xc003687b60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:17.414 UTC [cauthdsl] func1 -> DEBU 2032 0xc003687b60 gate 1563590417413050900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:17.414 UTC [policies] Evaluate -> DEBU 2033 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2034 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2035 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2036 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2037 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [gossip.discovery] sendMemResponse -> DEBU 2038 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [msp] DeserializeIdentity -> DEBU 2039 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.416 UTC [msp] DeserializeIdentity -> DEBU 203a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.416 UTC [msp] DeserializeIdentity -> DEBU 203b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.416 UTC [gossip.comm] Send -> DEBU 203c Entering, sending GossipMessage: Channel: , nonce: 15329209394983020561, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:17.416 UTC [gossip.discovery] sendMemResponse -> DEBU 203d Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\"" signature:"0D\002 ]N\016\232\317\221\225\000\312`\025\221\0355\030\010\203\201\0237\221\207\213\2127\371\266g\252\207\345G\002 \007\027\352\001\223\346\323'6\262\270\356B\324\025\3605\251\210\334\217\211s^\024F\244\371\310\354>." > alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:17.417 UTC [gossip.comm] sendToEndpoint -> DEBU 203e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15329209394983020561, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.417 UTC [gossip.comm] sendToEndpoint -> DEBU 203f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [gossip.comm] func1 -> DEBU 2040 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [gossip.gossip] handleMessage -> DEBU 2041 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [gossip.gossip] handleMessage -> DEBU 2042 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2043 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2044 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [msp] DeserializeIdentity -> DEBU 2045 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2046 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2047 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2048 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 2049 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 204a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 204b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 204c 0xc003652100 gate 1563590417571983300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204d 0xc003652100 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204e 0xc003652100 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204f 0xc003652100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2050 0xc003652100 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 2051 0xc003652100 gate 1563590417571983300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2052 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2053 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2054 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 2055 0xc003652980 gate 1563590417572451200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2056 0xc003652980 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2057 0xc003652980 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2058 0xc003652980 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [msp.identity] Verify -> DEBU 2059 Verify: digest = 00000000 3c 58 51 70 7b 27 28 b6 1f 1d e5 56 0b 6e 05 a9 | DEBU 205a Verify: sig = 00000000 30 45 02 21 00 e8 5b a8 e3 61 3d 94 a3 0b 9b b7 |0E.!..[..a=.....| -peer0.org1.example.com | 00000010 c4 11 ff a2 e6 01 24 1a 00 42 ff e1 9d 2e 83 b5 |......$..B......| -peer0.org1.example.com | 00000020 94 91 d1 45 fb 02 20 63 c4 6d 0d df 72 21 dc 83 |...E.. c.m..r!..| -peer0.org1.example.com | 00000030 97 7e 46 bc 53 2a 98 fb 9e da 35 8e 5c 85 0d 16 |.~F.S*....5.\...| -peer0.org1.example.com | 00000040 a6 b4 c2 b2 f8 a4 45 |......E|" -peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [cauthdsl] func2 -> DEBU 205b 0xc003652980 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [cauthdsl] func1 -> DEBU 205c 0xc003652980 gate 1563590417572451200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 2060 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [gossip.discovery] handleAliveMessage -> DEBU 2061 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2062 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2063 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2064 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:17.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2065 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:17.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2066 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.574 UTC [gossip.discovery] handleAliveMessage -> DEBU 2067 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.574 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2068 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 2069 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [gossip.comm] Send -> DEBU 206f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [msp] DeserializeIdentity -> DEBU 2070 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [msp] DeserializeIdentity -> DEBU 2071 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [gossip.comm] Send -> DEBU 2072 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2073 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2074 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.comm] sendToEndpoint -> DEBU 2075 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.comm] sendToEndpoint -> DEBU 2076 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.comm] func1 -> DEBU 2077 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.gossip] handleMessage -> DEBU 2078 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.gossip] handleMessage -> DEBU 2079 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.583 UTC [gossip.comm] func1 -> DEBU 207c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.583 UTC [gossip.gossip] handleMessage -> DEBU 207d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.584 UTC [gossip.gossip] handleMessage -> DEBU 207e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:17.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:17.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2080 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:19.640 UTC [dockercontroller] deployImage -> DEBU 2081 Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4" -peer0.org1.example.com | "2019-07-20 02:40:19.640 UTC [dockercontroller] createContainer -> DEBU 2082 create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 -peer0.org1.example.com | "2019-07-20 02:40:19.640 UTC [dockercontroller] getDockerHostConfig -> DEBU 2083 docker container hostconfig NetworkMode: hlf_net" -peer0.org1.example.com | "2019-07-20 02:40:19.758 UTC [dockercontroller] createContainer -> DEBU 2084 created container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 -peer0.org1.example.com | "2019-07-20 02:40:19.926 UTC [gossip.comm] func1 -> DEBU 2085 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:19.926 UTC [gossip.gossip] handleMessage -> DEBU 2086 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:19.926 UTC [gossip.gossip] handleMessage -> DEBU 2087 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:19.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2088 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:19.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2089 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:19.928 UTC [msp] DeserializeIdentity -> DEBU 208a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 208b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 208e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 208f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 2090 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:19.931 UTC [cauthdsl] func1 -> DEBU 2091 0xc003510770 gate 1563590419930912600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:19.931 UTC [cauthdsl] func2 -> DEBU 2092 0xc003510770 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2093 0xc003510770 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2094 0xc003510770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2095 0xc003510770 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:19.933 UTC [cauthdsl] func1 -> DEBU 2096 0xc003510770 gate 1563590419930912600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2097 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2098 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2099 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:19.934 UTC [cauthdsl] func1 -> DEBU 209a 0xc003510fb0 gate 1563590419934803200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209b 0xc003510fb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209c 0xc003510fb0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209d 0xc003510fb0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:19.935 UTC [msp.identity] Verify -> DEBU 209e Verify: digest = 00000000 69 15 c1 32 fe 05 00 01 e0 ca cb 9e 0d 07 0e b4 |i..2............| -peer0.org1.example.com | 00000010 0a d6 75 ad dd b3 2a 43 0b 9e cd a0 66 88 7a a6 |..u...*C....f.z.|" -peer0.org1.example.com | "2019-07-20 02:40:19.936 UTC [msp.identity] Verify -> DEBU 209f Verify: sig = 00000000 30 44 02 20 7b b0 f7 de 15 b6 9c 02 4e 80 5a ca |0D. {.......N.Z.| -peer0.org1.example.com | 00000010 11 09 d2 35 ab b0 f2 9b 92 67 af 53 8c 13 81 27 |...5.....g.S...'| -peer0.org1.example.com | 00000020 41 03 12 9b 02 20 40 93 4a 0c 63 6f e1 d7 8a 87 |A.... @.J.co....| -peer0.org1.example.com | 00000030 06 22 2d 9f e4 94 d6 cf 63 60 4c db e6 c5 78 f5 |."-.....c`L...x.| -peer0.org1.example.com | 00000040 2b 6e 18 e1 a9 c6 |+n....|" -peer0.org1.example.com | "2019-07-20 02:40:19.936 UTC [cauthdsl] func2 -> DEBU 20a0 0xc003510fb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:19.936 UTC [cauthdsl] func1 -> DEBU 20a1 0xc003510fb0 gate 1563590419934803200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:19.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 20a6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:19.938 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:19.938 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a8 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:19.939 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a9 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:19.939 UTC [gossip.discovery] learnExistingMembers -> DEBU 20aa Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:19.944 UTC [gossip.comm] func1 -> DEBU 20ab Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:19.944 UTC [gossip.gossip] handleMessage -> DEBU 20ac Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:19.944 UTC [gossip.pull] HandleMessage -> DEBU 20ad GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:19.945 UTC [msp] DeserializeIdentity -> DEBU 20ae Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:19.946 UTC [msp] DeserializeIdentity -> DEBU 20af Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:19.946 UTC [gossip.discovery] learnExistingMembers -> DEBU 20b0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:19.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 20b1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:19.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20b2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:19.946 UTC [msp] DeserializeIdentity -> DEBU 20b3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [gossip.pull] SendDigest -> DEBU 20b8 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [gossip.gossip] handleMessage -> DEBU 20b9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [gossip.discovery] sendMemResponse -> DEBU 20b7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20ba Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20bb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20bc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:19.949 UTC [gossip.comm] Send -> DEBU 20bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:19.949 UTC [gossip.discovery] sendMemResponse -> DEBU 20be Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\"" signature:"0D\002 ]N\016\232\317\221\225\000\312`\025\221\0355\030\010\203\201\0237\221\207\213\2127\371\266g\252\207\345G\002 \007\027\352\001\223\346\323'6\262\270\356B\324\025\3605\251\210\334\217\211s^\024F\244\371\310\354>." > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:19.949 UTC [gossip.comm] sendToEndpoint -> DEBU 20bf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:19.950 UTC [gossip.comm] sendToEndpoint -> DEBU 20c0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:20.252 UTC [gossip.comm] Send -> DEBU 20c2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:20.252 UTC [gossip.comm] Send -> DEBU 20c4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] Send -> DEBU 20c6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20ca Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20cb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20cc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.254 UTC [gossip.comm] func1 -> DEBU 20cd Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20ce Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.pull] HandleMessage -> DEBU 20cf GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20d0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.comm] func1 -> DEBU 20d1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20d2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.pull] HandleMessage -> DEBU 20d3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.256 UTC [gossip.comm] func1 -> DEBU 20d5 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.256 UTC [gossip.pull] HandleMessage -> DEBU 20d7 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 20d9 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:20.293 UTC [msp.identity] Sign -> DEBU 20da Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101F " -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20db Sign: digest: 504B6EC17B1E1B1D8BBAD474EBAC421C80C37F85D67DE2002BF8519639289328 " -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 20dc Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20dd Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20de Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20df Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp] DeserializeIdentity -> DEBU 20e0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20e1 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp] DeserializeIdentity -> DEBU 20e2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20e5 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.comm] func1 -> DEBU 20ea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20eb Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20ec Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20ee Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20ef Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| -peer0.org1.example.com | 00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20f0 Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| -peer0.org1.example.com | 00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| -peer0.org1.example.com | 00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| -peer0.org1.example.com | 00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| -peer0.org1.example.com | 00000040 12 14 a9 de 14 fb |......|" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] handleAliveMessage -> DEBU 20f1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] isSentByMe -> DEBU 20f2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] handleAliveMessage -> DEBU 20f3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20f4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.comm] func1 -> DEBU 20f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20f6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20f7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20f8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20f9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20fa Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| -peer0.org1.example.com | 00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [msp.identity] Verify -> DEBU 20fb Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| -peer0.org1.example.com | 00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| -peer0.org1.example.com | 00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| -peer0.org1.example.com | 00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| -peer0.org1.example.com | 00000040 12 14 a9 de 14 fb |......|" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [gossip.discovery] handleAliveMessage -> DEBU 20fc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [gossip.discovery] isSentByMe -> DEBU 20fd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [gossip.discovery] handleAliveMessage -> DEBU 20fe Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20ff Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [msp] DeserializeIdentity -> DEBU 2100 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2101 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2102 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2103 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2104 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2105 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2106 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [cauthdsl] func1 -> DEBU 2107 0xc0033b32f0 gate 1563590420298565800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [cauthdsl] func2 -> DEBU 2108 0xc0033b32f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [cauthdsl] func2 -> DEBU 2109 0xc0033b32f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [gossip.comm] func1 -> DEBU 210a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [gossip.gossip] handleMessage -> DEBU 210b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [cauthdsl] func2 -> DEBU 210c 0xc0033b32f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [cauthdsl] func2 -> DEBU 210d 0xc0033b32f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [cauthdsl] func1 -> DEBU 210e 0xc0033b32f0 gate 1563590420298565800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 210f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 2110 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 2111 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [cauthdsl] func1 -> DEBU 2112 0xc0033b3b30 gate 1563590420300966200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2113 0xc0033b3b30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2114 0xc0033b3b30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2115 0xc0033b3b30 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [msp.identity] Verify -> DEBU 2116 Verify: digest = 00000000 69 15 c1 32 fe 05 00 01 e0 ca cb 9e 0d 07 0e b4 |i..2............| -peer0.org1.example.com | 00000010 0a d6 75 ad dd b3 2a 43 0b 9e cd a0 66 88 7a a6 |..u...*C....f.z.|" -peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [msp.identity] Verify -> DEBU 2117 Verify: sig = 00000000 30 44 02 20 7b b0 f7 de 15 b6 9c 02 4e 80 5a ca |0D. {.......N.Z.| -peer0.org1.example.com | 00000010 11 09 d2 35 ab b0 f2 9b 92 67 af 53 8c 13 81 27 |...5.....g.S...'| -peer0.org1.example.com | 00000020 41 03 12 9b 02 20 40 93 4a 0c 63 6f e1 d7 8a 87 |A.... @.J.co....| -peer0.org1.example.com | 00000030 06 22 2d 9f e4 94 d6 cf 63 60 4c db e6 c5 78 f5 |."-.....c`L...x.| -peer0.org1.example.com | 00000040 2b 6e 18 e1 a9 c6 |+n....|" -peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2118 0xc0033b3b30 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [cauthdsl] func1 -> DEBU 2119 0xc0033b3b30 gate 1563590420300966200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [policies] Evaluate -> DEBU 211a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [policies] Evaluate -> DEBU 211b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.302 UTC [policies] Evaluate -> DEBU 211c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.302 UTC [policies] Evaluate -> DEBU 211d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 211e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 211f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2120 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2121 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2122 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2123 Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| -peer0.org1.example.com | 00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" -peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2124 Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| -peer0.org1.example.com | 00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| -peer0.org1.example.com | 00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| -peer0.org1.example.com | 00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| -peer0.org1.example.com | 00000040 12 14 a9 de 14 fb |......|" -peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2125 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2126 Verify: sig = 00000000 30 44 02 20 2d ba 51 f4 8a 64 9d 24 9e 51 64 d0 |0D. -.Q..d.$.Qd.| -peer0.org1.example.com | 00000010 43 09 85 6d e2 51 b3 cb 56 0c 62 ba 3c 11 f8 03 |C..m.Q..V.b.<...| -peer0.org1.example.com | 00000020 d6 72 b4 ef 02 20 7f 19 2b ab 8c e3 a1 5a 6b f0 |.r... ..+....Zk.| -peer0.org1.example.com | 00000030 58 b0 bc d6 1a b0 46 0e 6c 40 a3 8e 54 73 5a 63 |X.....F.l@..TsZc| -peer0.org1.example.com | 00000040 e3 11 28 fd 0a 7d |..(..}|" -peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 2127 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.discovery] isSentByMe -> DEBU 2128 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 2129 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.gossip] handleMessage -> DEBU 212a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 212b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.367 UTC [gossip.comm] func1 -> DEBU 212c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.368 UTC [gossip.gossip] handleMessage -> DEBU 212d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.368 UTC [gossip.pull] HandleMessage -> DEBU 212e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.369 UTC [gossip.pull] SendDigest -> DEBU 212f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:20.369 UTC [gossip.gossip] handleMessage -> DEBU 2130 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.371 UTC [gossip.comm] func1 -> DEBU 2131 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.371 UTC [gossip.gossip] handleMessage -> DEBU 2132 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [gossip.gossip] handleMessage -> DEBU 2133 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2134 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2135 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2136 Verify: digest = 00000000 c7 31 e2 19 58 a3 f6 b8 be 34 34 a8 ec 5c e8 9d |.1..X....44..\..| -peer0.org1.example.com | 00000010 48 9d ae 36 36 cd ca 8e b1 2f 46 d6 54 bc 3f 26 |H..66..../F.T.?&|" -peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2137 Verify: sig = 00000000 30 44 02 20 06 ca bf c0 84 51 4e 9b 01 3e ed 97 |0D. .....QN..>..| -peer0.org1.example.com | 00000010 a9 b1 1e c9 d4 6d ea ea d7 71 9d 86 c9 c3 31 f7 |.....m...q....1.| -peer0.org1.example.com | 00000020 a5 48 b6 4b 02 20 4c 13 b3 73 b7 34 1f 9c 7d 04 |.H.K. L..s.4..}.| -peer0.org1.example.com | 00000030 96 e1 6a c7 90 c8 3f 1d 94 1a 87 9e 1f 17 ef 0d |..j...?.........| -peer0.org1.example.com | 00000040 30 2a 69 1a 73 9b |0*i.s.|" -peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2138 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2139 Verify: sig = 00000000 30 44 02 20 29 a2 f3 b7 4d 89 32 2f 55 be 24 6b |0D. )...M.2/U.$k| -peer0.org1.example.com | 00000010 a0 8f 76 7a 42 fe 14 ea 54 38 0c ce ec 7f 15 f8 |..vzB...T8......| -peer0.org1.example.com | 00000020 77 fa a1 66 02 20 2f 1e f8 f2 a5 dd 0e a0 98 bd |w..f. /.........| -peer0.org1.example.com | 00000030 9f 8d 04 a3 0f 45 ec 8f ca ce 47 dd d1 40 75 05 |.....E....G..@u.| -peer0.org1.example.com | 00000040 dc b3 82 63 e5 b7 |...c..|" -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 213a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 2140 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2141 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] sendMemResponse -> DEBU 2142 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [msp] DeserializeIdentity -> DEBU 2143 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [msp] DeserializeIdentity -> DEBU 2144 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.comm] Send -> DEBU 2145 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:20.374 UTC [gossip.discovery] sendMemResponse -> DEBU 2146 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > alive: " -peer0.org1.example.com | "2019-07-20 02:40:20.374 UTC [gossip.comm] sendToEndpoint -> DEBU 2147 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.374 UTC [gossip.comm] sendToEndpoint -> DEBU 2148 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.554 UTC [gossip.comm] func1 -> DEBU 2149 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.554 UTC [gossip.gossip] handleMessage -> DEBU 214a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.554 UTC [gossip.pull] HandleMessage -> DEBU 214b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.556 UTC [msp] DeserializeIdentity -> DEBU 214f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.557 UTC [msp] DeserializeIdentity -> DEBU 2150 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.557 UTC [msp] DeserializeIdentity -> DEBU 2151 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.557 UTC [gossip.pull] SendDigest -> DEBU 2152 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:20.560 UTC [gossip.gossip] handleMessage -> DEBU 2153 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.561 UTC [gossip.comm] func1 -> DEBU 2154 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.561 UTC [gossip.gossip] handleMessage -> DEBU 2155 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.561 UTC [gossip.gossip] handleMessage -> DEBU 2156 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2157 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.562 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2158 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:20.562 UTC [msp] DeserializeIdentity -> DEBU 2159 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 215a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 215b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 215c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.563 UTC [policies] Evaluate -> DEBU 215d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.564 UTC [policies] Evaluate -> DEBU 215e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:20.564 UTC [policies] Evaluate -> DEBU 215f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.564 UTC [cauthdsl] func1 -> DEBU 2160 0xc0033afa80 gate 1563590420564792700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.564 UTC [cauthdsl] func2 -> DEBU 2161 0xc0033afa80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2162 0xc0033afa80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2163 0xc0033afa80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2164 0xc0033afa80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.565 UTC [cauthdsl] func1 -> DEBU 2165 0xc0033afa80 gate 1563590420564792700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.565 UTC [policies] Evaluate -> DEBU 2166 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.566 UTC [policies] Evaluate -> DEBU 2167 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.566 UTC [policies] Evaluate -> DEBU 2168 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.567 UTC [cauthdsl] func1 -> DEBU 2169 0xc0031ba2c0 gate 1563590420566867700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.568 UTC [cauthdsl] func2 -> DEBU 216a 0xc0031ba2c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.568 UTC [cauthdsl] func2 -> DEBU 216b 0xc0031ba2c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.570 UTC [cauthdsl] func2 -> DEBU 216c 0xc0031ba2c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.570 UTC [msp.identity] Verify -> DEBU 216d Verify: digest = 00000000 4d fc 0e 77 db 69 88 31 38 93 68 0f 5b 04 f2 09 |M..w.i.18.h.[...| -peer0.org1.example.com | 00000010 32 12 51 3d 70 3f 48 33 49 68 c7 26 13 26 87 d2 |2.Q=p?H3Ih.&.&..|" -peer0.org1.example.com | "2019-07-20 02:40:20.571 UTC [msp.identity] Verify -> DEBU 216e Verify: sig = 00000000 30 44 02 20 37 87 1a 84 16 b7 93 5f e8 af ad 0a |0D. 7......_....| -peer0.org1.example.com | 00000010 f4 b9 98 82 65 c0 32 e7 28 d3 08 27 11 4b e5 5f |....e.2.(..'.K._| -peer0.org1.example.com | 00000020 3b 36 e7 6d 02 20 4f 3c 7b cf 53 62 27 64 57 33 |;6.m. O<{.Sb'dW3| -peer0.org1.example.com | 00000030 b6 77 3a b7 1e f7 19 4a 9c 09 0b 4d dd c7 f1 f0 |.w:....J...M....| -peer0.org1.example.com | 00000040 0a e3 d1 be 6e f3 |....n.|" -peer0.org1.example.com | "2019-07-20 02:40:20.571 UTC [cauthdsl] func2 -> DEBU 216f 0xc0031ba2c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.572 UTC [cauthdsl] func1 -> DEBU 2170 0xc0031ba2c0 gate 1563590420566867700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:20.572 UTC [policies] Evaluate -> DEBU 2171 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2172 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2173 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2174 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.573 UTC [gossip.discovery] handleAliveMessage -> DEBU 2175 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2176 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:20.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2177 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 2178 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 2179 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 217a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.576 UTC [gossip.discovery] handleAliveMessage -> DEBU 217b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.578 UTC [gossip.discovery] sendMemResponse -> DEBU 217c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.580 UTC [gossip.comm] Send -> DEBU 2180 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:20.580 UTC [gossip.discovery] sendMemResponse -> DEBU 2181 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:20.580 UTC [gossip.comm] sendToEndpoint -> DEBU 2182 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.580 UTC [gossip.comm] sendToEndpoint -> DEBU 2183 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.580 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2184 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.676 UTC [dockercontroller] Start -> DEBU 2185 Started container dev-peer0.org1.example.com-exp02-1.0" -peer0.org1.example.com | "2019-07-20 02:40:20.676 UTC [container] unlockContainer -> DEBU 2186 container lock deleted(exp02-1.0)" -peer0.org1.example.com | "2019-07-20 02:40:20.676 UTC [container] lockContainer -> DEBU 2187 waiting for container(exp02-1.0) lock" -peer0.org1.example.com | "2019-07-20 02:40:20.676 UTC [container] lockContainer -> DEBU 2188 got container (exp02-1.0) lock" -peer0.org1.example.com | "2019-07-20 02:40:20.676 UTC [container] unlockContainer -> DEBU 2189 container lock deleted(exp02-1.0)" -peer0.org1.example.com | "2019-07-20 02:40:20.717 UTC [msp] DeserializeIdentity -> DEBU 218a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.719 UTC [msp] DeserializeIdentity -> DEBU 218b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.720 UTC [gossip.comm] Send -> DEBU 218c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:20.720 UTC [gossip.comm] sendToEndpoint -> DEBU 218d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.721 UTC [gossip.comm] sendToEndpoint -> DEBU 218e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 218f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 2190 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.728 UTC [gossip.comm] func1 -> DEBU 2191 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.729 UTC [gossip.gossip] handleMessage -> DEBU 2194 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.728 UTC [gossip.comm] func1 -> DEBU 2192 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 2193 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.729 UTC [msp] DeserializeIdentity -> DEBU 2195 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.731 UTC [msp] DeserializeIdentity -> DEBU 2197 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.732 UTC [msp] DeserializeIdentity -> DEBU 2199 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.730 UTC [gossip.comm] sendToEndpoint -> DEBU 2196 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.732 UTC [gossip.comm] func1 -> DEBU 2198 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.735 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 219a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:20.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 219b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 219c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.743 UTC [cauthdsl] func1 -> DEBU 21a0 0xc003125d80 gate 1563590420743984900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a1 0xc003125d80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a2 0xc003125d80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a3 0xc003125d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a4 0xc003125d80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [cauthdsl] func1 -> DEBU 21a5 0xc003125d80 gate 1563590420743984900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [policies] Evaluate -> DEBU 21a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.745 UTC [policies] Evaluate -> DEBU 21a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.745 UTC [policies] Evaluate -> DEBU 21a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.745 UTC [cauthdsl] func1 -> DEBU 21a9 0xc0031165c0 gate 1563590420745495300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.745 UTC [cauthdsl] func2 -> DEBU 21aa 0xc0031165c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.746 UTC [cauthdsl] func2 -> DEBU 21ab 0xc0031165c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.746 UTC [cauthdsl] func2 -> DEBU 21ac 0xc0031165c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.746 UTC [msp.identity] Verify -> DEBU 21ad Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:20.746 UTC [msp.identity] Verify -> DEBU 21ae Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:20.747 UTC [cauthdsl] func2 -> DEBU 21af 0xc0031165c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.747 UTC [cauthdsl] func1 -> DEBU 21b0 0xc0031165c0 gate 1563590420745495300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:20.747 UTC [policies] Evaluate -> DEBU 21b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.748 UTC [policies] Evaluate -> DEBU 21b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.748 UTC [policies] Evaluate -> DEBU 21b3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.749 UTC [policies] Evaluate -> DEBU 21b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.749 UTC [msp] DeserializeIdentity -> DEBU 21b5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.750 UTC [msp] DeserializeIdentity -> DEBU 21b6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.751 UTC [gossip.pull] Hello -> DEBU 21b7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:20.752 UTC [msp] DeserializeIdentity -> DEBU 21b8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.753 UTC [msp] DeserializeIdentity -> DEBU 21b9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.754 UTC [gossip.comm] Send -> DEBU 21ba Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:20.756 UTC [msp.identity] Verify -> DEBU 21bb Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:20.756 UTC [msp.identity] Verify -> DEBU 21bc Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:20.756 UTC [gossip.comm] sendToEndpoint -> DEBU 21bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.758 UTC [gossip.comm] sendToEndpoint -> DEBU 21be Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.759 UTC [msp.identity] Verify -> DEBU 21bf Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:20.759 UTC [msp.identity] Verify -> DEBU 21c0 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:20.760 UTC [gossip.comm] func1 -> DEBU 21c1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.761 UTC [msp] DeserializeIdentity -> DEBU 21c2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.761 UTC [msp] DeserializeIdentity -> DEBU 21c3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.766 UTC [cauthdsl] func1 -> DEBU 21ca 0xc0030f3a30 gate 1563590420766558700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.766 UTC [cauthdsl] func2 -> DEBU 21cb 0xc0030f3a30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21cc 0xc0030f3a30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21cd 0xc0030f3a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21ce 0xc0030f3a30 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.767 UTC [cauthdsl] func1 -> DEBU 21cf 0xc0030f3a30 gate 1563590420766558700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.768 UTC [cauthdsl] func1 -> DEBU 21d3 0xc0030da2c0 gate 1563590420768941600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d4 0xc0030da2c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d5 0xc0030da2c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d6 0xc0030da2c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.769 UTC [msp.identity] Verify -> DEBU 21d7 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:20.769 UTC [msp.identity] Verify -> DEBU 21d8 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:20.770 UTC [cauthdsl] func2 -> DEBU 21d9 0xc0030da2c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.770 UTC [cauthdsl] func1 -> DEBU 21da 0xc0030da2c0 gate 1563590420768941600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:20.770 UTC [policies] Evaluate -> DEBU 21db Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21dd Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.771 UTC [gossip.gossip] handleMessage -> DEBU 21df Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.771 UTC [gossip.gossip] handleMessage -> DEBU 21e0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.772 UTC [msp.identity] Verify -> DEBU 21e1 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:20.772 UTC [msp.identity] Verify -> DEBU 21e2 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:20.776 UTC [chaincode.accesscontrol] authenticate -> DEBU 21e3 Chaincode exp02:1.0 's authentication is authorized" -peer0.org1.example.com | "2019-07-20 02:40:20.776 UTC [msp.identity] Verify -> DEBU 21e4 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:20.776 UTC [msp.identity] Verify -> DEBU 21e5 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:20.776 UTC [chaincode] handleMessage -> DEBU 21e6 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [msp] DeserializeIdentity -> DEBU 21e7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [msp] DeserializeIdentity -> DEBU 21e8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21ea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21eb Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [chaincode] HandleRegister -> DEBU 21e9 Received REGISTER in state created" -peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [chaincode] Register -> DEBU 21ed registered handler complete for chaincode exp02:1.0" -peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21ec Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.778 UTC [chaincode] HandleRegister -> DEBU 21ef Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED" -peer0.org1.example.com | "2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21f2 0xc003046bc0 gate 1563590420779005600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f3 0xc003046bc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f4 0xc003046bc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f5 0xc003046bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f6 0xc003046bc0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21f7 0xc003046bc0 gate 1563590420779005600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21f8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [chaincode] HandleRegister -> DEBU 21f9 Changed state to established for name:"exp02:1.0" " -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [chaincode] sendReady -> DEBU 21fc sending READY for chaincode name:"exp02:1.0" " -peer0.org1.example.com | "2019-07-20 02:40:20.780 UTC [chaincode] sendReady -> DEBU 21fe Changed to state ready for chaincode name:"exp02:1.0" " -peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21fd 0xc003047400 gate 1563590420779979600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.780 UTC [cauthdsl] func2 -> DEBU 21ff 0xc003047400 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.781 UTC [cauthdsl] func2 -> DEBU 2200 0xc003047400 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.781 UTC [cauthdsl] func2 -> DEBU 2202 0xc003047400 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.781 UTC [chaincode] Launch -> DEBU 2201 launch complete" -peer0.org1.example.com | "2019-07-20 02:40:20.781 UTC [chaincode] Execute -> DEBU 2203 Entry" -peer0.org1.example.com | "2019-07-20 02:40:20.781 UTC [msp.identity] Verify -> DEBU 2204 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:20.782 UTC [msp.identity] Verify -> DEBU 2205 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:20.782 UTC [cauthdsl] func2 -> DEBU 2206 0xc003047400 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.782 UTC [cauthdsl] func1 -> DEBU 2207 0xc003047400 gate 1563590420779979600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 2208 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 2209 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 220a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 220b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [msp] DeserializeIdentity -> DEBU 220c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [msp] DeserializeIdentity -> DEBU 220d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 220e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 220f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2210 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2211 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2212 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2213 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [cauthdsl] func1 -> DEBU 2214 0xc002fe9900 gate 1563590420784745900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2215 0xc002fe9900 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2216 0xc002fe9900 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2217 0xc002fe9900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2218 0xc002fe9900 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [cauthdsl] func1 -> DEBU 2219 0xc002fe9900 gate 1563590420784745900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [cauthdsl] func1 -> DEBU 221d 0xc002fae140 gate 1563590420785168500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [cauthdsl] func2 -> DEBU 221e 0xc002fae140 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.786 UTC [cauthdsl] func2 -> DEBU 221f 0xc002fae140 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.786 UTC [cauthdsl] func2 -> DEBU 2220 0xc002fae140 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.786 UTC [msp.identity] Verify -> DEBU 2221 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:20.786 UTC [msp.identity] Verify -> DEBU 2222 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:20.787 UTC [chaincode] handleMessage -> DEBU 2223 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:20.788 UTC [chaincode] HandleTransaction -> DEBU 2224 [79f74fa3] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:20.788 UTC [chaincode] HandleTransaction -> DEBU 2225 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:20.790 UTC [cauthdsl] func2 -> DEBU 2226 0xc002fae140 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.791 UTC [chaincode] handleMessage -> DEBU 2227 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:20.791 UTC [cauthdsl] func1 -> DEBU 2228 0xc002fae140 gate 1563590420785168500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:20.792 UTC [policies] Evaluate -> DEBU 2229 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.792 UTC [policies] Evaluate -> DEBU 222a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.793 UTC [policies] Evaluate -> DEBU 222b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.793 UTC [policies] Evaluate -> DEBU 222c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.794 UTC [gossip.gossip] handleMessage -> DEBU 222d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.794 UTC [gossip.gossip] handleMessage -> DEBU 222f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.793 UTC [chaincode] HandleTransaction -> DEBU 222e [79f74fa3] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:20.794 UTC [chaincode] HandleTransaction -> DEBU 2230 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:20.794 UTC [msp] DeserializeIdentity -> DEBU 2231 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.795 UTC [msp] DeserializeIdentity -> DEBU 2232 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.795 UTC [msp] DeserializeIdentity -> DEBU 2233 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.796 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2235 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:20.796 UTC [chaincode] handleMessage -> DEBU 2234 [79f74fa3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:20.796 UTC [chaincode] Notify -> DEBU 2236 [79f74fa3] notifying Txid:79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:20.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2237 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2239 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.798 UTC [policies] Evaluate -> DEBU 223a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.797 UTC [chaincode] Execute -> DEBU 2238 Exit" -peer0.org1.example.com | "2019-07-20 02:40:20.798 UTC [endorser] callChaincode -> INFO 223b [businesschannel][79f74fa3] Exit chaincode: name:"lscc" (30079ms)" -peer0.org1.example.com | "2019-07-20 02:40:20.799 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 223c Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:20.799 UTC [lockbasedtxmgr] Done -> DEBU 223d Done with transaction simulation / query execution [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" -peer0.org1.example.com | "2019-07-20 02:40:20.800 UTC [endorser] SimulateProposal -> DEBU 223e [businesschannel][79f74fa3] Exit" -peer0.org1.example.com | "2019-07-20 02:40:20.800 UTC [endorser] endorseProposal -> DEBU 223f [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:20.801 UTC [endorser] endorseProposal -> DEBU 2240 [businesschannel][79f74fa3] escc for chaincode name:"lscc" is escc" -peer0.org1.example.com | "2019-07-20 02:40:20.802 UTC [endorser] EndorseWithPlugin -> DEBU 2241 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:20.798 UTC [policies] Evaluate -> DEBU 2242 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:20.802 UTC [policies] Evaluate -> DEBU 2243 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.802 UTC [cauthdsl] func1 -> DEBU 2244 0xc002f89090 gate 1563590420802657900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2245 0xc002f89090 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2246 0xc002f89090 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [msp.identity] Sign -> DEBU 2247 Sign: plaintext: 0A204790835E071B71CF339AE73C7888...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [msp.identity] Sign -> DEBU 2248 Sign: digest: 37DFF638163BF053F0A202081D973D9C0328932F16905D7CA07D4DFD41588ED9 " -peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2249 0xc002f89090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 224a 0xc002f89090 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [cauthdsl] func1 -> DEBU 224c 0xc002f89090 gate 1563590420802657900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [cauthdsl] func1 -> DEBU 2250 0xc002f898d0 gate 1563590420804830700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2251 0xc002f898d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2252 0xc002f898d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2253 0xc002f898d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [msp.identity] Verify -> DEBU 2254 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [msp.identity] Verify -> DEBU 2255 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [endorser] EndorseWithPlugin -> DEBU 224b Exiting {plugin: escc, channel: businesschannel, tx: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [endorser] endorseProposal -> DEBU 2256 [businesschannel][79f74fa3] Exit" -peer0.org1.example.com | "2019-07-20 02:40:20.806 UTC [cauthdsl] func2 -> DEBU 2257 0xc002f898d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.806 UTC [cauthdsl] func1 -> DEBU 2258 0xc002f898d0 gate 1563590420804830700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:20.806 UTC [lockbasedtxmgr] Done -> DEBU 2259 Done with transaction simulation / query execution [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" -peer0.org1.example.com | "2019-07-20 02:40:20.806 UTC [endorser] func1 -> DEBU 225b Exit: request from 172.18.0.9:58342" -peer0.org1.example.com | "2019-07-20 02:40:20.806 UTC [policies] Evaluate -> DEBU 225a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.808 UTC [comm.grpc.server] 1 -> INFO 225c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58342 grpc.code=OK grpc.call_duration=30.0944849s -peer0.org1.example.com | "2019-07-20 02:40:20.808 UTC [policies] Evaluate -> DEBU 225d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.809 UTC [policies] Evaluate -> DEBU 225e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.809 UTC [policies] Evaluate -> DEBU 225f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.809 UTC [msp.identity] Verify -> DEBU 2260 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:20.809 UTC [msp.identity] Verify -> DEBU 2261 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [msp] DeserializeIdentity -> DEBU 2262 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [msp] DeserializeIdentity -> DEBU 2263 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2264 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2265 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2266 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2267 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2268 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2269 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [cauthdsl] func1 -> DEBU 226a 0xc002f5d760 gate 1563590420810881700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [cauthdsl] func2 -> DEBU 226b 0xc002f5d760 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [cauthdsl] func2 -> DEBU 226c 0xc002f5d760 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 226d 0xc002f5d760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 226e 0xc002f5d760 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [cauthdsl] func1 -> DEBU 226f 0xc002f5d760 gate 1563590420810881700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2270 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2271 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2272 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [cauthdsl] func1 -> DEBU 2273 0xc002f5dfa0 gate 1563590420811537400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 2274 0xc002f5dfa0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:20.812 UTC [cauthdsl] func2 -> DEBU 2275 0xc002f5dfa0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:20.812 UTC [cauthdsl] func2 -> DEBU 2276 0xc002f5dfa0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.812 UTC [msp.identity] Verify -> DEBU 2277 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:20.812 UTC [msp.identity] Verify -> DEBU 2278 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:20.813 UTC [cauthdsl] func2 -> DEBU 2279 0xc002f5dfa0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:20.813 UTC [cauthdsl] func1 -> DEBU 227a 0xc002f5dfa0 gate 1563590420811537400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.814 UTC [policies] Evaluate -> DEBU 227e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:20.814 UTC [msp.identity] Verify -> DEBU 227f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:20.814 UTC [msp.identity] Verify -> DEBU 2280 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:20.820 UTC [gossip.gossip] handleMessage -> DEBU 2281 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.822 UTC [gossip.gossip] handleMessage -> DEBU 2282 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.823 UTC [gossip.pull] HandleMessage -> DEBU 2283 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.823 UTC [gossip.gossip] handleMessage -> DEBU 2284 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.842 UTC [grpc] infof -> DEBU 2286 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:20.834 UTC [grpc] infof -> DEBU 2285 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:20.878 UTC [gossip.comm] func1 -> DEBU 2287 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.878 UTC [gossip.gossip] handleMessage -> DEBU 2288 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.879 UTC [msp] DeserializeIdentity -> DEBU 2289 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.879 UTC [msp] DeserializeIdentity -> DEBU 228a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:20.879 UTC [gossip.gossip] handleMessage -> DEBU 228b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:20.908 UTC [gossip.comm] func1 -> DEBU 228c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.908 UTC [gossip.gossip] handleMessage -> DEBU 228d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.908 UTC [gossip.pull] HandleMessage -> DEBU 228e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:20.909 UTC [gossip.pull] SendDigest -> DEBU 228f Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:20.909 UTC [gossip.gossip] handleMessage -> DEBU 2290 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:21.998 UTC [gossip.election] waitForInterrupt -> DEBU 2291 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [gossip.election] IsLeader -> DEBU 2292 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] GetDefaultSigningIdentity -> DEBU 2293 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp.identity] Sign -> DEBU 2294 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510091801 " -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp.identity] Sign -> DEBU 2295 Sign: digest: CE53D14C8BDD185163EA86423928464BF5E2185940EB5A7C1CC04771A58293DC " -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [gossip.election] waitForInterrupt -> DEBU 2296 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2297 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2298 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2299 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [gossip.comm] Send -> DEBU 229b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.000 UTC [gossip.comm] sendToEndpoint -> DEBU 229e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.000 UTC [gossip.comm] sendToEndpoint -> DEBU 229f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [gossip.comm] func1 -> DEBU 22a0 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [gossip.gossip] handleMessage -> DEBU 22a1 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [gossip.gossip] handleMessage -> DEBU 22a5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.comm] func1 -> DEBU 22a6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.comm] func1 -> DEBU 22a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22a8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22a9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22aa Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22ab Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ac Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ae Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22af Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 22b0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22b1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22b3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22b4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [cauthdsl] func1 -> DEBU 22b8 0xc002a63060 gate 1563590422022870600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [cauthdsl] func2 -> DEBU 22b9 0xc002a63060 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22ba 0xc002a63060 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22bb 0xc002a63060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22bc 0xc002a63060 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func1 -> DEBU 22bd 0xc002a63060 gate 1563590422022870600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22be Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func1 -> DEBU 22c1 0xc002a638a0 gate 1563590422023224000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c2 0xc002a638a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c3 0xc002a638a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c4 0xc002a638a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [msp.identity] Verify -> DEBU 22c5 Verify: digest = 00000000 f1 6e e7 89 d4 c4 bf 8c dc 6f 4c f9 de 91 05 dc |.n.......oL.....| -peer0.org1.example.com | 00000010 be 94 5d 61 2b 3b 79 e7 74 d5 f4 43 28 c3 69 87 |..]a+;y.t..C(.i.|" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [msp.identity] Verify -> DEBU 22c6 Verify: sig = 00000000 30 45 02 21 00 db 8d bb 55 89 30 0e f0 d8 88 d0 |0E.!....U.0.....| -peer0.org1.example.com | 00000010 5f 43 0c 7e e3 ea fb 4e 5b 9f 9b 55 57 38 ac 77 |_C.~...N[..UW8.w| -peer0.org1.example.com | 00000020 a3 2c 55 96 b0 02 20 46 95 b9 cd af 51 5b b0 41 |.,U... F....Q[.A| -peer0.org1.example.com | 00000030 07 0c e5 83 af e3 f8 89 b4 12 34 97 80 00 64 f7 |..........4...d.| -peer0.org1.example.com | 00000040 e2 79 b7 7e 3c 11 19 |.y.~<..|" -peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c7 0xc002a638a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [cauthdsl] func1 -> DEBU 22c8 0xc002a638a0 gate 1563590422023224000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22c9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22cb Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] handleAliveMessage -> DEBU 22cd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22ce Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22cf updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d0 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] handleAliveMessage -> DEBU 22d3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22d4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.comm] func1 -> DEBU 22d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.gossip] handleMessage -> DEBU 22d6 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22d7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.gossip] handleMessage -> DEBU 22d8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22d9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22da Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22db Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22dc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22dd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22de Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22df Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22e0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] Send -> DEBU 22e1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22e2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] Send -> DEBU 22e3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.028 UTC [gossip.comm] func1 -> DEBU 22e8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.029 UTC [gossip.gossip] handleMessage -> DEBU 22e9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.029 UTC [gossip.gossip] handleMessage -> DEBU 22ea Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22eb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.030 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22ec Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.227 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 22ed Sleeping 25s" -peer0.org1.example.com | "2019-07-20 02:40:22.238 UTC [msp] GetDefaultSigningIdentity -> DEBU 22ee Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:22.238 UTC [msp.identity] Sign -> DEBU 22ef Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151020 " -peer0.org1.example.com | "2019-07-20 02:40:22.239 UTC [msp.identity] Sign -> DEBU 22f0 Sign: digest: EBDDB8E92477E63EEFA2BA9C61E1DAD7F517C2858787E52C7D65FB4EDC778900 " -peer0.org1.example.com | "2019-07-20 02:40:22.239 UTC [msp] GetDefaultSigningIdentity -> DEBU 22f1 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:22.240 UTC [msp.identity] Sign -> DEBU 22f2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:22.240 UTC [msp.identity] Sign -> DEBU 22f3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:22.241 UTC [gossip.discovery] periodicalSendAlive -> DEBU 22f4 Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22f8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22f9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [msp] DeserializeIdentity -> DEBU 22fa Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22fb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [gossip.comm] sendToEndpoint -> DEBU 22fc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [gossip.comm] sendToEndpoint -> DEBU 22fd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.245 UTC [gossip.comm] sendToEndpoint -> DEBU 22fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.245 UTC [gossip.comm] sendToEndpoint -> DEBU 22ff Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.246 UTC [gossip.comm] sendToEndpoint -> DEBU 2300 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.247 UTC [gossip.comm] sendToEndpoint -> DEBU 2301 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.342 UTC [endorser] ProcessProposal -> DEBU 2302 Entering: request from 172.18.0.9:58352" -peer0.org1.example.com | "2019-07-20 02:40:22.342 UTC [protoutils] ValidateProposalMessage -> DEBU 2303 ValidateProposalMessage starts for signed proposal 0xc003370280" -peer0.org1.example.com | "2019-07-20 02:40:22.342 UTC [protoutils] validateChannelHeader -> DEBU 2304 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:22.342 UTC [protoutils] checkSignatureFromCreator -> DEBU 2305 begin" -peer0.org1.example.com | "2019-07-20 02:40:22.343 UTC [msp] GetManagerForChain -> DEBU 2306 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:22.343 UTC [protoutils] checkSignatureFromCreator -> DEBU 2307 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:22.343 UTC [protoutils] checkSignatureFromCreator -> DEBU 2308 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:22.343 UTC [msp.identity] Verify -> DEBU 2309 Verify: digest = 00000000 e0 8f e0 d0 af 31 29 3b 49 09 2b a8 a7 61 ce e3 |.....1);I.+..a..| -peer0.org1.example.com | 00000010 2f be 78 94 05 52 4b 05 88 55 28 ef 2d 50 f7 08 |/.x..RK..U(.-P..|" -peer0.org1.example.com | "2019-07-20 02:40:22.344 UTC [msp.identity] Verify -> DEBU 230a Verify: sig = 00000000 30 45 02 21 00 98 65 5c aa e4 35 ba 8a 33 e6 42 |0E.!..e\..5..3.B| -peer0.org1.example.com | 00000010 8b 3d 5b c9 57 39 65 a8 10 b3 7b f6 1f 6d 23 8e |.=[.W9e...{..m#.| -peer0.org1.example.com | 00000020 58 63 d6 da 94 02 20 21 46 82 7a 61 42 18 46 9a |Xc.... !F.zaB.F.| -peer0.org1.example.com | 00000030 0d 90 a8 31 e2 88 25 c1 8f 13 61 1a 13 c5 19 4b |...1..%...a....K| -peer0.org1.example.com | 00000040 b6 15 f0 b9 47 21 01 |....G!.|" -peer0.org1.example.com | "2019-07-20 02:40:22.344 UTC [protoutils] checkSignatureFromCreator -> DEBU 230b exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:22.344 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 230c validateChaincodeProposalMessage starts for proposal 0xc0005b4460, header 0xc003370690" -peer0.org1.example.com | "2019-07-20 02:40:22.344 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 230d validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:22.344 UTC [endorser] preProcess -> DEBU 230e [businesschannel][862a1339] processing txid: 862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457" -peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 230f retrieveTransactionByID() - txId = [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" -peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [aclmgmt] CheckACL -> DEBU 2310 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [aclmgmt] CheckACL -> DEBU 2311 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2312 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2313 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2314 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [cauthdsl] func1 -> DEBU 2315 0xc0029331a0 gate 1563590422345723200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [cauthdsl] func2 -> DEBU 2316 0xc0029331a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [cauthdsl] func2 -> DEBU 2317 0xc0029331a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2318 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [msp] Validate -> DEBU 2319 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [msp] getCertificationChain -> DEBU 231a MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [cauthdsl] func2 -> DEBU 231b 0xc0029331a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [msp.identity] Verify -> DEBU 231c Verify: digest = 00000000 e0 8f e0 d0 af 31 29 3b 49 09 2b a8 a7 61 ce e3 |.....1);I.+..a..| -peer0.org1.example.com | 00000010 2f be 78 94 05 52 4b 05 88 55 28 ef 2d 50 f7 08 |/.x..RK..U(.-P..|" -peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [msp.identity] Verify -> DEBU 231d Verify: sig = 00000000 30 45 02 21 00 98 65 5c aa e4 35 ba 8a 33 e6 42 |0E.!..e\..5..3.B| -peer0.org1.example.com | 00000010 8b 3d 5b c9 57 39 65 a8 10 b3 7b f6 1f 6d 23 8e |.=[.W9e...{..m#.| -peer0.org1.example.com | 00000020 58 63 d6 da 94 02 20 21 46 82 7a 61 42 18 46 9a |Xc.... !F.zaB.F.| -peer0.org1.example.com | 00000030 0d 90 a8 31 e2 88 25 c1 8f 13 61 1a 13 c5 19 4b |...1..%...a....K| -peer0.org1.example.com | 00000040 b6 15 f0 b9 47 21 01 |....G!.|" -peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [cauthdsl] func2 -> DEBU 231e 0xc0029331a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [cauthdsl] func1 -> DEBU 231f 0xc0029331a0 gate 1563590422345723200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2320 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2321 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2322 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2323 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2324 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2325 constructing new tx simulator txid = [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" -peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [endorser] SimulateProposal -> DEBU 2326 [businesschannel][862a1339] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [stateleveldb] GetState -> DEBU 2327 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [endorser] SimulateProposal -> DEBU 2328 [businesschannel][862a1339] Exit" -peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] Done -> DEBU 2329 Done with transaction simulation / query execution [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" -peer0.org1.example.com | "2019-07-20 02:40:22.348 UTC [endorser] func1 -> DEBU 232a Exit: request from 172.18.0.9:58352" -peer0.org1.example.com | "2019-07-20 02:40:22.348 UTC [comm.grpc.server] 1 -> INFO 232b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58352 grpc.code=OK grpc.call_duration=6.0452ms -peer0.org1.example.com | "2019-07-20 02:40:22.351 UTC [grpc] warningf -> DEBU 232c transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58352: read: connection reset by peer" -peer0.org1.example.com | "2019-07-20 02:40:22.351 UTC [grpc] infof -> DEBU 232d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:22.352 UTC [grpc] infof -> DEBU 232e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:22.367 UTC [gossip.comm] func1 -> DEBU 232f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.367 UTC [gossip.gossip] handleMessage -> DEBU 2330 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.367 UTC [gossip.gossip] handleMessage -> DEBU 2331 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.368 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2332 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.368 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2333 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:22.368 UTC [msp.identity] Verify -> DEBU 2334 Verify: digest = 00000000 68 b2 ce e5 1a bc 7e 9c ac ef cd f9 94 e8 b1 1b |h.....~.........| -peer0.org1.example.com | 00000010 11 db 9d 96 e8 0f b2 db 97 c0 3b 77 50 37 88 64 |..........;wP7.d|" -peer0.org1.example.com | "2019-07-20 02:40:22.368 UTC [msp.identity] Verify -> DEBU 2335 Verify: sig = 00000000 30 45 02 21 00 af dd 12 0b 63 b8 e1 6e 01 6d 74 |0E.!.....c..n.mt| -peer0.org1.example.com | 00000010 a8 2b 6e bc 79 4b b0 d6 d9 5f 71 27 51 10 ad 99 |.+n.yK..._q'Q...| -peer0.org1.example.com | 00000020 a0 f6 24 e5 cb 02 20 77 89 1b 62 25 94 dc 07 38 |..$... w..b%...8| -peer0.org1.example.com | 00000030 28 6b 54 70 20 5e 3c a5 cd 0a 98 8e fd 9d 53 53 |(kTp ^<.......SS| -peer0.org1.example.com | 00000040 9b 69 e8 69 aa 5c b8 |.i.i.\.|" -peer0.org1.example.com | "2019-07-20 02:40:22.369 UTC [gossip.discovery] handleAliveMessage -> DEBU 2336 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.369 UTC [gossip.discovery] learnExistingMembers -> DEBU 2337 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 2338 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 2339 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 233a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 233b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 233c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 233d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 233e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 233f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 2340 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.371 UTC [gossip.comm] Send -> DEBU 2341 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 2342 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.372 UTC [gossip.comm] Send -> DEBU 2343 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2344 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2345 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2346 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.373 UTC [gossip.comm] sendToEndpoint -> DEBU 2347 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.377 UTC [gossip.comm] func1 -> DEBU 2348 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.377 UTC [gossip.gossip] handleMessage -> DEBU 2349 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.378 UTC [gossip.gossip] handleMessage -> DEBU 234b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 234c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 234d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.378 UTC [gossip.comm] func1 -> DEBU 234a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.379 UTC [gossip.gossip] handleMessage -> DEBU 234e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.380 UTC [gossip.gossip] handleMessage -> DEBU 234f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2350 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2351 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.556 UTC [gossip.comm] func1 -> DEBU 2352 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.556 UTC [gossip.gossip] handleMessage -> DEBU 2353 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.556 UTC [gossip.gossip] handleMessage -> DEBU 2354 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2355 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.556 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2356 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:22.557 UTC [msp] DeserializeIdentity -> DEBU 2357 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2358 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2359 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 235a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [cauthdsl] func1 -> DEBU 235e 0xc0007d4190 gate 1563590422558401200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [cauthdsl] func2 -> DEBU 235f 0xc0007d4190 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [cauthdsl] func2 -> DEBU 2360 0xc0007d4190 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:22.559 UTC [cauthdsl] func2 -> DEBU 2361 0xc0007d4190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:22.559 UTC [cauthdsl] func2 -> DEBU 2362 0xc0007d4190 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:22.559 UTC [cauthdsl] func1 -> DEBU 2363 0xc0007d4190 gate 1563590422558401200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:22.559 UTC [policies] Evaluate -> DEBU 2364 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.560 UTC [policies] Evaluate -> DEBU 2365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.560 UTC [policies] Evaluate -> DEBU 2366 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:22.560 UTC [cauthdsl] func1 -> DEBU 2367 0xc0007d4a30 gate 1563590422560915000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 2368 0xc0007d4a30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 2369 0xc0007d4a30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 236a 0xc0007d4a30 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [msp.identity] Verify -> DEBU 236b Verify: digest = 00000000 46 8b 7b d6 90 39 0f 79 17 a9 b3 43 a0 14 fe 74 |F.{..9.y...C...t| -peer0.org1.example.com | 00000010 e4 2c e5 e6 6f 82 c6 fb ed 5b 3f c5 df fd 1b 32 |.,..o....[?....2|" -peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [msp.identity] Verify -> DEBU 236c Verify: sig = 00000000 30 44 02 20 16 a5 c2 0e 55 8a f8 e7 7a b4 06 29 |0D. ....U...z..)| -peer0.org1.example.com | 00000010 05 4f 88 83 a2 d5 8f f8 0d 68 ae 6a 17 d7 45 0c |.O.......h.j..E.| -peer0.org1.example.com | 00000020 a2 35 17 2b 02 20 51 ce ab c4 fc 0b d4 69 e8 65 |.5.+. Q......i.e| -peer0.org1.example.com | 00000030 66 09 be 24 f4 e1 8e f1 8f 5f 09 d4 7b d8 c5 ac |f..$....._..{...| -peer0.org1.example.com | 00000040 49 bc 10 5e 80 94 |I..^..|" -peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 236d 0xc0007d4a30 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [cauthdsl] func1 -> DEBU 236e 0xc0007d4a30 gate 1563590422560915000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [policies] Evaluate -> DEBU 236f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2370 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2371 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2372 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 2373 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2374 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2375 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2376 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2377 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2378 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 2379 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.comm] func1 -> DEBU 237b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.gossip] handleMessage -> DEBU 237c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.gossip] handleMessage -> DEBU 237d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.comm] func1 -> DEBU 2380 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.565 UTC [gossip.gossip] handleMessage -> DEBU 2381 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.565 UTC [gossip.gossip] handleMessage -> DEBU 2382 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.565 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2383 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.565 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2384 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.565 UTC [msp] DeserializeIdentity -> DEBU 2385 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2386 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2387 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2388 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2389 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 238a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] Send -> DEBU 238b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [msp] DeserializeIdentity -> DEBU 238c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [msp] DeserializeIdentity -> DEBU 238d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] Send -> DEBU 238e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 238f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2390 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2391 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2392 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2393 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2394 Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2395 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2396 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2397 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [msp] DeserializeIdentity -> DEBU 2398 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [msp.identity] newIdentity -> DEBU 2399 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJ9PiwMc+yJquw7iESWUUdgwCgYIKoZIzj0EAwIwaTEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -peer0.org1.example.com | CCqGSM49AwEHA0IABJFXeJu8Bn4343K9C/p5zMXGWMf7TRDkm1QTRArOtt2UcwjS -peer0.org1.example.com | hELr0NUrXJ9/itxePp5kcNe1A/SPXSlVbZJb7zyjTTBLMA4GA1UdDwEB/wQEAwIH -peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIBQFxbpf0MCh/Pc/loudY4Bg -peer0.org1.example.com | rIfa+QF858Ffm7hagVV9AiB7x5vl9mUFXWvFJffvBYw0mnUxe0HmAS0C7cpoHJbC -peer0.org1.example.com | dg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [cauthdsl] func1 -> DEBU 239a 0xc0007338d0 gate 1563590422852774600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [cauthdsl] func2 -> DEBU 239b 0xc0007338d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [cauthdsl] func2 -> DEBU 239c 0xc0007338d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 239d Checking if identity satisfies MEMBER role for OrdererMSP" -peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [msp] Validate -> DEBU 239e MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [cauthdsl] func2 -> DEBU 239f 0xc0007338d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [msp.identity] Verify -> DEBU 23a0 Verify: digest = 00000000 8c b8 01 77 65 0b a3 0a 0a fc 6f 48 84 dd 2f 3f |...we.....oH../?| -peer0.org1.example.com | 00000010 f7 69 6f 14 28 21 3d 73 f7 2d d8 56 d4 4e 22 80 |.io.(!=s.-.V.N".|" -peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [msp.identity] Verify -> DEBU 23a1 Verify: sig = 00000000 30 44 02 20 2f ab 29 ad 54 0d 53 67 d2 ab 50 ad |0D. /.).T.Sg..P.| -peer0.org1.example.com | 00000010 c5 98 64 da 4e 92 02 d8 f9 73 20 b4 ff 23 5c a5 |..d.N....s ..#\.| -peer0.org1.example.com | 00000020 ff 27 12 3e 02 20 0f ac fb c2 41 bc 8d bb 20 08 |.'.>. ....A... .| -peer0.org1.example.com | 00000030 16 c9 b0 a9 58 0b fb cb 0e a5 08 54 64 68 40 27 |....X......Tdh@'| -peer0.org1.example.com | 00000040 7f 8c df 1b 24 f0 |....$.|" -peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [cauthdsl] func2 -> DEBU 23a2 0xc0007338d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [cauthdsl] func1 -> DEBU 23a3 0xc0007338d0 gate 1563590422852774600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a6 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:40:22.855 UTC [policies] Evaluate -> DEBU 23a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:40:22.855 UTC [blocksProvider] DeliverBlocks -> DEBU 23a8 [businesschannel] Adding payload to local buffer, blockNum = [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.855 UTC [gossip.state] addPayload -> DEBU 23a9 [businesschannel] Adding payload to local buffer, blockNum = [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [gossip.state] addPayload -> DEBU 23aa Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [gossip.state] deliverPayloads -> DEBU 23ab [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [gossip.state] deliverPayloads -> DEBU 23ac [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [gossip.privdata] StoreBlock -> INFO 23ad [businesschannel] Received block [3] from buffer" -peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [gossip.privdata] StoreBlock -> DEBU 23af [businesschannel] Validating block [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.857 UTC [committer.txvalidator] Validate -> DEBU 23b0 [businesschannel] START Block Validation for block [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.857 UTC [committer.txvalidator] Validate -> DEBU 23b1 expecting 1 block validation responses" -peer0.org1.example.com | "2019-07-20 02:40:22.857 UTC [committer.txvalidator] validateTx -> DEBU 23b2 [businesschannel] validateTx starts for block 0xc0006949c0 env 0xc003371810 txn 0" -peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [blocksProvider] DeliverBlocks -> DEBU 23ae [businesschannel] Gossiping block [3], peers number [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.857 UTC [protoutils] ValidateTransaction -> DEBU 23b3 ValidateTransactionEnvelope starts for envelope 0xc003371810" -peer0.org1.example.com | "2019-07-20 02:40:22.858 UTC [protoutils] ValidateTransaction -> DEBU 23b4 Header is channel_header:"\010\003\032\014\010\366\375\311\351\005\020\344\375\271\344\002\"\017businesschannel*@79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\036E\311&g*\274\n\233\335{\344\252\031\357M\361y\350\340\236\3666" " -peer0.org1.example.com | "2019-07-20 02:40:22.858 UTC [protoutils] validateChannelHeader -> DEBU 23b5 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:22.858 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b6 begin" -peer0.org1.example.com | "2019-07-20 02:40:22.859 UTC [msp] GetManagerForChain -> DEBU 23b7 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:22.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b8 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:22.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b9 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:22.859 UTC [msp.identity] Verify -> DEBU 23ba Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| -peer0.org1.example.com | 00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" -peer0.org1.example.com | "2019-07-20 02:40:22.860 UTC [msp.identity] Verify -> DEBU 23bb Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| -peer0.org1.example.com | 00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| -peer0.org1.example.com | 00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| -peer0.org1.example.com | 00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| -peer0.org1.example.com | 00000040 d7 3e d5 8f e5 b0 |.>....|" -peer0.org1.example.com | "2019-07-20 02:40:22.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 23bc exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:22.860 UTC [protoutils] validateEndorserTransaction -> DEBU 23bd validateEndorserTransaction starts for data 0xc00323ca80, header channel_header:"\010\003\032\014\010\366\375\311\351\005\020\344\375\271\344\002\"\017businesschannel*@79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\036E\311&g*\274\n\233\335{\344\252\031\357M\361y\350\340\236\3666" " -peer0.org1.example.com | "2019-07-20 02:40:22.860 UTC [protoutils] validateEndorserTransaction -> DEBU 23be validateEndorserTransaction info: there are 1 actions" -peer0.org1.example.com | "2019-07-20 02:40:22.861 UTC [protoutils] validateEndorserTransaction -> DEBU 23bf validateEndorserTransaction info: signature header is valid" -peer0.org1.example.com | "2019-07-20 02:40:22.858 UTC [gossip.channel] AddToMsgStore -> DEBU 23c0 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-07-20 02:40:22.861 UTC [protoutils] ValidateTransaction -> DEBU 23c1 ValidateTransactionEnvelope returns err %!s()" -peer0.org1.example.com | "2019-07-20 02:40:22.861 UTC [committer.txvalidator] validateTx -> DEBU 23c2 Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:22.861 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 23c3 retrieveTransactionByID() - txId = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" -peer0.org1.example.com | "2019-07-20 02:40:22.862 UTC [committer.txvalidator] validateTx -> DEBU 23c4 Validating transaction vscc tx validate" -peer0.org1.example.com | "2019-07-20 02:40:22.862 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 23c5 [businesschannel] VSCCValidateTx starts for bytes 0xc003bad000" -peer0.org1.example.com | "2019-07-20 02:40:22.862 UTC [gossip.pull] Add -> DEBU 23c6 Added 3, total items: 3" -peer0.org1.example.com | "2019-07-20 02:40:22.862 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 23c7 Validating Tx 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" -peer0.org1.example.com | "2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23c8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23c9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23ca Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23cb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.863 UTC [gossip.comm] Send -> DEBU 23cc Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:22.864 UTC [msp] DeserializeIdentity -> DEBU 23cd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.864 UTC [msp] DeserializeIdentity -> DEBU 23ce Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.864 UTC [gossip.comm] sendToEndpoint -> DEBU 23cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:22.864 UTC [gossip.comm] sendToEndpoint -> DEBU 23d0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:22.869 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23d1 constructing new query executor txid = [dd0ee138-c617-46cb-98a9-fae76c835f47]" -peer0.org1.example.com | "2019-07-20 02:40:22.870 UTC [lockbasedtxmgr] Done -> DEBU 23d2 Done with transaction simulation / query execution [dd0ee138-c617-46cb-98a9-fae76c835f47]" -peer0.org1.example.com | "2019-07-20 02:40:22.871 UTC [msp] DeserializeIdentity -> DEBU 23d3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:22.872 UTC [msp.identity] newIdentity -> DEBU 23d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:22.873 UTC [cauthdsl] func1 -> DEBU 23d5 0xc0006bb9b0 gate 1563590422873396500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:22.873 UTC [cauthdsl] func2 -> DEBU 23d6 0xc0006bb9b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:22.873 UTC [cauthdsl] func2 -> DEBU 23d7 0xc0006bb9b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:22.873 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 23d8 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:22.873 UTC [msp] Validate -> DEBU 23d9 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:22.876 UTC [msp] getCertificationChain -> DEBU 23da MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:22.877 UTC [cauthdsl] func2 -> DEBU 23db 0xc0006bb9b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.877 UTC [msp.identity] Verify -> DEBU 23dc Verify: digest = 00000000 37 df f6 38 16 3b f0 53 f0 a2 02 08 1d 97 3d 9c |7..8.;.S......=.| -peer0.org1.example.com | 00000010 03 28 93 2f 16 90 5d 7c a0 7d 4d fd 41 58 8e d9 |.(./..]|.}M.AX..|" -peer0.org1.example.com | "2019-07-20 02:40:22.878 UTC [msp.identity] Verify -> DEBU 23dd Verify: sig = 00000000 30 43 02 20 1b 72 18 31 bd 18 67 a2 cd 03 ca 91 |0C. .r.1..g.....| -peer0.org1.example.com | 00000010 cb 37 6c 80 76 45 b9 6c f3 20 09 f6 4b 83 fd 0d |.7l.vE.l. ..K...| -peer0.org1.example.com | 00000020 34 a4 1b 10 02 1f 2e cb 8a df 0f 19 1b 54 e4 9a |4............T..| -peer0.org1.example.com | 00000030 d8 18 2b f3 83 42 4a 03 5a 19 be 2b 47 b4 bb c4 |..+..BJ.Z..+G...| -peer0.org1.example.com | 00000040 df f8 47 dc 1f |..G..|" -peer0.org1.example.com | "2019-07-20 02:40:22.880 UTC [cauthdsl] func2 -> DEBU 23de 0xc0006bb9b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.880 UTC [cauthdsl] func2 -> DEBU 23df 0xc0006bb9b0 signed by 1 principal evaluation starts (used [true])" -peer0.org1.example.com | "2019-07-20 02:40:22.881 UTC [cauthdsl] func2 -> DEBU 23e0 0xc0006bb9b0 skipping identity 0 because it has already been used" -peer0.org1.example.com | "2019-07-20 02:40:22.881 UTC [cauthdsl] func2 -> DEBU 23e1 0xc0006bb9b0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:22.881 UTC [cauthdsl] func1 -> DEBU 23e2 0xc0006bb9b0 gate 1563590422873396500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:22.882 UTC [vscc] Validate -> DEBU 23e3 VSCC info: doing special validation for LSCC" -peer0.org1.example.com | "2019-07-20 02:40:22.882 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e4 VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" -peer0.org1.example.com | "2019-07-20 02:40:22.882 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e5 VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" -peer0.org1.example.com | "2019-07-20 02:40:22.883 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e6 Namespace exp02" -peer0.org1.example.com | "2019-07-20 02:40:22.883 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e7 Namespace lscc" -peer0.org1.example.com | "2019-07-20 02:40:22.884 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23e8 constructing new query executor txid = [9c8ac5d0-30f8-430f-a1a6-a6ef74648923]" -peer0.org1.example.com | "2019-07-20 02:40:22.884 UTC [stateleveldb] GetState -> DEBU 23e9 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:22.884 UTC [lockbasedtxmgr] Done -> DEBU 23ea Done with transaction simulation / query execution [9c8ac5d0-30f8-430f-a1a6-a6ef74648923]" -peer0.org1.example.com | "2019-07-20 02:40:22.884 UTC [vscc] ValidateLSCCInvocation -> DEBU 23eb Validating deploy for cc exp02 version 1.0" -peer0.org1.example.com | "2019-07-20 02:40:22.886 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23ec constructing new query executor txid = [82bb1a55-4f36-491e-9f0c-a5955335d197]" -peer0.org1.example.com | "2019-07-20 02:40:22.886 UTC [stateleveldb] GetState -> DEBU 23ed GetState(). ns=lscc, key=exp02~collection" -peer0.org1.example.com | "2019-07-20 02:40:22.886 UTC [lockbasedtxmgr] Done -> DEBU 23ee Done with transaction simulation / query execution [82bb1a55-4f36-491e-9f0c-a5955335d197]" -peer0.org1.example.com | "2019-07-20 02:40:22.887 UTC [cauthdsl] func1 -> DEBU 23ef 0xc000587cd0 gate 1563590422887178600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f0 0xc000587cd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f1 0xc000587cd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f2 0xc000587cd0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [msp.identity] Verify -> DEBU 23f3 Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| -peer0.org1.example.com | 00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" -peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [msp.identity] Verify -> DEBU 23f4 Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| -peer0.org1.example.com | 00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| -peer0.org1.example.com | 00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| -peer0.org1.example.com | 00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| -peer0.org1.example.com | 00000040 d7 3e d5 8f e5 b0 |.>....|" -peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f5 0xc000587cd0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f6 0xc000587cd0 signed by 1 principal evaluation starts (used [true])" -peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f7 0xc000587cd0 skipping identity 0 because it has already been used" -peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f8 0xc000587cd0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [cauthdsl] func1 -> DEBU 23f9 0xc000587cd0 gate 1563590422887178600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [vscc] Validate -> DEBU 23fa block 3, namespace: lscc, tx 0 validation results is: " -peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 23fb Transaction 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f appears to be valid" -peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 23fc [businesschannel] VSCCValidateTx completes env bytes 0xc003bad000" -peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [committer.txvalidator] validateTx -> DEBU 23fd [businesschannel] validateTx completes for block 0xc0006949c0 env 0xc003371810 txn 0" -peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [committer.txvalidator] Validate -> DEBU 23fe got result for idx 0, code 0" -peer0.org1.example.com | "2019-07-20 02:40:22.891 UTC [committer.txvalidator] Validate -> INFO 23ff [businesschannel] Validated block [3] in 34ms" -peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2400 Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [gossip.privdata] StoreBlock -> DEBU 2401 [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [kvledger] CommitWithPvtData -> DEBU 2402 [businesschannel] Validating state for block [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2403 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2404 lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2405 Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-07-20 02:40:22.893 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2406 ValidateAndPrepareBatch() for block number = [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.893 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2407 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:40:22.893 UTC [valimpl] preprocessProtoBlock -> DEBU 2408 txType=ENDORSER_TRANSACTION" -peer0.org1.example.com | "2019-07-20 02:40:22.894 UTC [stateleveldb] GetState -> DEBU 2409 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:22.894 UTC [statebasedval] validateKVRead -> DEBU 240a Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -peer0.org1.example.com | "2019-07-20 02:40:22.894 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 240b Block [3] Transaction index [0] TxId [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] marked as valid by state validator" -peer0.org1.example.com | "2019-07-20 02:40:22.894 UTC [valinternal] ApplyWriteSet -> DEBU 240c txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc000258880), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0002588c0), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc000258900)}" -peer0.org1.example.com | "2019-07-20 02:40:22.894 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240d validating rwset..." -peer0.org1.example.com | "2019-07-20 02:40:22.895 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240e postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:40:22.895 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240f ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-07-20 02:40:22.895 UTC [cceventmgmt] HandleStateUpdates -> DEBU 2410 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc00309b4a0)}}" -peer0.org1.example.com | "2019-07-20 02:40:22.896 UTC [cceventmgmt] HandleStateUpdates -> INFO 2411 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" -peer0.org1.example.com | "2019-07-20 02:40:22.896 UTC [stateleveldb] GetState -> DEBU 2412 GetState(). ns=lscc, key=exp02~collection" -peer0.org1.example.com | "2019-07-20 02:40:22.896 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 2413 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" -peer0.org1.example.com | "2019-07-20 02:40:22.897 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU 2414 Created metadata tar" -peer0.org1.example.com | "2019-07-20 02:40:22.897 UTC [discovery.lifecycle] HandleChaincodeDeploy -> DEBU 2415 Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}" -peer0.org1.example.com | "2019-07-20 02:40:22.897 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 2416 Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" -peer0.org1.example.com | "2019-07-20 02:40:22.897 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2417 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})}" -peer0.org1.example.com | "2019-07-20 02:40:22.897 UTC [stateleveldb] GetState -> DEBU 2418 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:22.898 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2419 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 201 201 124 213 209 131 170 90 214 236 213 79 201 15 102 244 57 138 217 224 48 255 78 38 213 53 156 203 16 22 213 204 2 32 92 73 198 4 5 111 56 38 126 201 24 110 29 201 66 1 202 46 128 237 231 125 50 102 55 17 170 129 77 248 168 103]} 0x15231a0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0007d3200 0xc0007d0ba0 {{0 0} 0 0 0 0} {false}})]}" -peer0.org1.example.com | "2019-07-20 02:40:22.898 UTC [stateleveldb] GetState -> DEBU 241a GetState(). ns=lscc, key=exp02~collection" -peer0.org1.example.com | "2019-07-20 02:40:22.898 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 241b Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00049f160})}" -peer0.org1.example.com | "2019-07-20 02:40:22.899 UTC [kvledger] CommitWithPvtData -> DEBU 241c [businesschannel] Adding CommitHash to the block [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.899 UTC [kvledger] CommitWithPvtData -> DEBU 241d [businesschannel] Committing block [3] to storage" -peer0.org1.example.com | "2019-07-20 02:40:22.899 UTC [ledgerstorage] CommitWithPvtData -> DEBU 241e Writing block [3] to pvt block store" -peer0.org1.example.com | "2019-07-20 02:40:22.901 UTC [pvtdatastorage] Prepare -> DEBU 241f Saved 0 private data write sets for block [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.903 UTC [fsblkstorage] indexBlock -> DEBU 2420 Indexing block [blockNum=3, blockHash=[]byte{0x18, 0x70, 0x86, 0xed, 0x63, 0x58, 0x1a, 0xe8, 0x75, 0x8c, 0x4e, 0x43, 0x60, 0x90, 0xd4, 0xe2, 0xe5, 0xb8, 0x6b, 0x53, 0x15, 0x11, 0x95, 0xd4, 0xe0, 0xf8, 0xb9, 0xcf, 0x43, 0x25, 0x9d, 0x7f} txOffsets= -peer0.org1.example.com | txId=79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f locPointer=offset=70, bytesLength=3522 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-07-20 02:40:22.903 UTC [fsblkstorage] indexBlock -> DEBU 2421 Adding txLoc [fileSuffixNum=0, offset=71531, bytesLength=3522] for tx ID: [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] to txid-index" -peer0.org1.example.com | "2019-07-20 02:40:22.904 UTC [fsblkstorage] indexBlock -> DEBU 2422 Adding txLoc [fileSuffixNum=0, offset=71531, bytesLength=3522] for tx number:[0] ID: [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] to blockNumTranNum index" -peer0.org1.example.com | "2019-07-20 02:40:22.907 UTC [fsblkstorage] updateCheckpoint -> DEBU 2423 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76025], isChainEmpty=[false], lastBlockNumber=[3]" -peer0.org1.example.com | "2019-07-20 02:40:22.908 UTC [pvtdatastorage] Commit -> DEBU 2424 Committing private data for block [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.910 UTC [pvtdatastorage] Commit -> DEBU 2425 Committed private data for block [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.911 UTC [kvledger] CommitWithPvtData -> DEBU 2426 [businesschannel] Committing block [3] transactions to state database" -peer0.org1.example.com | "2019-07-20 02:40:22.911 UTC [lockbasedtxmgr] Commit -> DEBU 2427 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:22.912 UTC [lockbasedtxmgr] Commit -> DEBU 2428 Committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:22.912 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2429 Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-07-20 02:40:22.912 UTC [lockbasedtxmgr] Commit -> DEBU 242a Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:22.913 UTC [stateleveldb] ApplyUpdates -> DEBU 242b Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -peer0.org1.example.com | "2019-07-20 02:40:22.914 UTC [stateleveldb] ApplyUpdates -> DEBU 242c Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -peer0.org1.example.com | "2019-07-20 02:40:22.914 UTC [stateleveldb] ApplyUpdates -> DEBU 242d Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}]" -peer0.org1.example.com | "2019-07-20 02:40:22.916 UTC [lockbasedtxmgr] Commit -> DEBU 242e Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-07-20 02:40:22.916 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 242f Preparing potential purge list working-set for expiringAtBlk [4]" -peer0.org1.example.com | "2019-07-20 02:40:22.916 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2430 constructing new query executor txid = [3b620695-cd97-4774-aa6c-670f7a63026d]" -peer0.org1.example.com | "2019-07-20 02:40:22.917 UTC [discovery.lifecycle] queryChaincodeDefinitions -> DEBU 2431 Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]" -peer0.org1.example.com | "2019-07-20 02:40:22.917 UTC [stateleveldb] GetState -> DEBU 2432 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:22.917 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 2433 Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}]" -peer0.org1.example.com | "2019-07-20 02:40:22.917 UTC [lockbasedtxmgr] Done -> DEBU 2434 Done with transaction simulation / query execution [3b620695-cd97-4774-aa6c-670f7a63026d]" -peer0.org1.example.com | "2019-07-20 02:40:22.918 UTC [discovery.lifecycle] processPendingUpdate -> DEBU 2435 Updating channel businesschannel with [name:"exp02" version:"1.0" ]" -peer0.org1.example.com | "2019-07-20 02:40:22.918 UTC [msp] GetDefaultSigningIdentity -> DEBU 2436 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:22.918 UTC [msp.identity] Sign -> DEBU 2437 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08031A0C0A0565787030321203312E30 " -peer0.org1.example.com | "2019-07-20 02:40:22.919 UTC [msp.identity] Sign -> DEBU 2438 Sign: digest: F57E1C530C7035E35585EC6DB2FD52DEB073123D88DCDEDA3469126395DE6470 " -peer0.org1.example.com | "2019-07-20 02:40:22.920 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 2439 Listeners for channel businesschannel invoked" -peer0.org1.example.com | "2019-07-20 02:40:22.916 UTC [leveldbhelper] GetIterator -> DEBU 243a Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" -peer0.org1.example.com | "2019-07-20 02:40:22.920 UTC [lockbasedtxmgr] func1 -> DEBU 243b launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-07-20 02:40:22.920 UTC [kvledger] CommitWithPvtData -> DEBU 243c [businesschannel] Committing block [3] transactions to history database" -peer0.org1.example.com | "2019-07-20 02:40:22.920 UTC [historyleveldb] Commit -> DEBU 243d Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" -peer0.org1.example.com | "2019-07-20 02:40:22.920 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 243e No expiry entry found for expiringAtBlk [4]" -peer0.org1.example.com | "2019-07-20 02:40:22.922 UTC [historyleveldb] Commit -> DEBU 243f Channel [businesschannel]: Updates committed to history database for blockNo [3]" -peer0.org1.example.com | "2019-07-20 02:40:22.922 UTC [kvledger] CommitWithPvtData -> INFO 2440 [businesschannel] Committed block [3] with 1 transaction(s) in 30ms (state_validation=6ms block_and_pvtdata_commit=11ms state_commit=9ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" -peer0.org1.example.com | "2019-07-20 02:40:22.923 UTC [msp] GetDefaultSigningIdentity -> DEBU 2441 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:22.923 UTC [msp.identity] Sign -> DEBU 2442 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08041A0C0A0565787030321203312E30 " -peer0.org1.example.com | "2019-07-20 02:40:22.923 UTC [msp.identity] Sign -> DEBU 2443 Sign: digest: BF89A0C215F21F47A90AE4FECE47C8598012A62D55BBCAD57DA7449BE32BD4F1 " -peer0.org1.example.com | "2019-07-20 02:40:22.923 UTC [gossip.state] commitBlock -> DEBU 2444 [businesschannel] Committed block [3] with 1 transaction(s)" -peer0.org1.example.com | "2019-07-20 02:40:23.929 UTC [gossip.comm] func1 -> DEBU 2445 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:23.930 UTC [gossip.gossip] handleMessage -> DEBU 2446 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:23.931 UTC [gossip.gossip] handleMessage -> DEBU 2447 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:23.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2448 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:23.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2449 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:23.933 UTC [msp] DeserializeIdentity -> DEBU 244a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:23.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 244b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:23.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 244c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:23.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 244d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:23.936 UTC [policies] Evaluate -> DEBU 244e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:23.937 UTC [policies] Evaluate -> DEBU 244f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:23.937 UTC [policies] Evaluate -> DEBU 2450 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:23.938 UTC [cauthdsl] func1 -> DEBU 2451 0xc00049b6c0 gate 1563590423938160300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:23.938 UTC [cauthdsl] func2 -> DEBU 2452 0xc00049b6c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:23.938 UTC [cauthdsl] func2 -> DEBU 2453 0xc00049b6c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 2454 0xc00049b6c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 2455 0xc00049b6c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [cauthdsl] func1 -> DEBU 2456 0xc00049b6c0 gate 1563590423938160300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2457 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2458 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2459 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [cauthdsl] func1 -> DEBU 245a 0xc00049bf00 gate 1563590423939786700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 245b 0xc00049bf00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 245c 0xc00049bf00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 245d 0xc00049bf00 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:23.940 UTC [msp.identity] Verify -> DEBU 245e Verify: digest = 00000000 31 01 b5 67 4c 33 cb f4 36 80 ff cb e1 f9 1d 73 |1..gL3..6......s| -peer0.org1.example.com | 00000010 f9 9b 49 64 38 02 b9 2e b6 09 35 4b 89 8f 7c 6a |..Id8.....5K..|j|" -peer0.org1.example.com | "2019-07-20 02:40:23.940 UTC [msp.identity] Verify -> DEBU 245f Verify: sig = 00000000 30 45 02 21 00 cb d8 3b 0a 47 60 c8 63 0b 30 33 |0E.!...;.G`.c.03| -peer0.org1.example.com | 00000010 ef fa 63 02 a9 3c e8 cf 92 f2 91 89 ff 4c 4d fd |..c..<.......LM.| -peer0.org1.example.com | 00000020 fe f9 12 55 7e 02 20 17 e7 93 62 80 25 1f 8c 59 |...U~. ...b.%..Y| -peer0.org1.example.com | 00000030 87 34 55 f3 9d 50 97 0c 4a 64 57 4d 7c c9 fe 03 |.4U..P..JdWM|...| -peer0.org1.example.com | 00000040 16 dd 0a 2d 86 f3 96 |...-...|" -peer0.org1.example.com | "2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 2460 0xc00049bf00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:23.941 UTC [cauthdsl] func1 -> DEBU 2461 0xc00049bf00 gate 1563590423939786700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2462 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2463 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2464 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:23.942 UTC [policies] Evaluate -> DEBU 2465 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:23.942 UTC [gossip.discovery] handleAliveMessage -> DEBU 2466 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:23.942 UTC [gossip.discovery] learnExistingMembers -> DEBU 2467 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 2468 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 2469 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 246a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 246b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:23.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 246c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:23.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 246d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:23.944 UTC [gossip.discovery] sendMemResponse -> DEBU 246e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:23.944 UTC [msp] DeserializeIdentity -> DEBU 246f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:23.945 UTC [gossip.comm] func1 -> DEBU 2470 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:23.945 UTC [gossip.gossip] handleMessage -> DEBU 2471 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:23.945 UTC [gossip.pull] HandleMessage -> DEBU 2473 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2474 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:23.945 UTC [msp] DeserializeIdentity -> DEBU 2472 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2475 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2476 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2477 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2478 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:23.947 UTC [msp] DeserializeIdentity -> DEBU 2479 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:23.947 UTC [msp] DeserializeIdentity -> DEBU 247a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:23.948 UTC [gossip.pull] SendDigest -> DEBU 247b Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:23.948 UTC [gossip.gossip] handleMessage -> DEBU 247c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:23.948 UTC [gossip.comm] Send -> DEBU 247d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:23.949 UTC [gossip.comm] sendToEndpoint -> DEBU 247e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:23.949 UTC [gossip.comm] sendToEndpoint -> DEBU 247f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:23.949 UTC [gossip.discovery] sendMemResponse -> DEBU 2480 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020$" signature:"0E\002!\000\257\335\022\013c\270\341n\001mt\250+n\274yK\260\326\331_q'Q\020\255\231\240\366$\345\313\002 w\211\033b%\224\334\0078(kTp ^<\245\315\n\230\216\375\235SS\233i\350i\252\\\270" > alive: alive: alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " -peer0.org1.example.com | "2019-07-20 02:40:24.254 UTC [gossip.pull] Hello -> DEBU 2481 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:24.254 UTC [gossip.comm] Send -> DEBU 2482 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:24.254 UTC [gossip.pull] Hello -> DEBU 2483 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:24.254 UTC [gossip.comm] Send -> DEBU 2484 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:24.255 UTC [gossip.pull] Hello -> DEBU 2485 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:24.255 UTC [gossip.comm] Send -> DEBU 2486 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:24.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2487 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2488 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 2489 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 248a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.257 UTC [gossip.comm] func1 -> DEBU 248b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.258 UTC [gossip.gossip] handleMessage -> DEBU 248c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.258 UTC [gossip.pull] HandleMessage -> DEBU 248d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.258 UTC [gossip.gossip] handleMessage -> DEBU 248e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 248f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.259 UTC [gossip.comm] func1 -> DEBU 2490 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.259 UTC [gossip.gossip] handleMessage -> DEBU 2491 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.259 UTC [gossip.pull] HandleMessage -> DEBU 2492 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.260 UTC [gossip.gossip] handleMessage -> DEBU 2493 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.259 UTC [gossip.comm] sendToEndpoint -> DEBU 2494 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.262 UTC [gossip.comm] func1 -> DEBU 2495 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.262 UTC [gossip.gossip] handleMessage -> DEBU 2496 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.262 UTC [gossip.pull] HandleMessage -> DEBU 2497 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.262 UTC [gossip.gossip] handleMessage -> DEBU 2498 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 2499 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151021 " -peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249b Sign: digest: 086E8AFDC0D95B46BA6F5676E9FFC6D08AB168E789B5C7D3982A0EFD3FDED97B " -peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 249c Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 249f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [msp] DeserializeIdentity -> DEBU 24a0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 24a1 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [msp] DeserializeIdentity -> DEBU 24a2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 24a3 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU 24a4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU 24a5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.299 UTC [gossip.comm] func1 -> DEBU 24aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.299 UTC [gossip.gossip] handleMessage -> DEBU 24ab Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.300 UTC [gossip.gossip] handleMessage -> DEBU 24ac Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.300 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.300 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24ae Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:24.301 UTC [msp.identity] Verify -> DEBU 24af Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| -peer0.org1.example.com | 00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" -peer0.org1.example.com | "2019-07-20 02:40:24.301 UTC [msp.identity] Verify -> DEBU 24b0 Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| -peer0.org1.example.com | 00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| -peer0.org1.example.com | 00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| -peer0.org1.example.com | 00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| -peer0.org1.example.com | 00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" -peer0.org1.example.com | "2019-07-20 02:40:24.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.302 UTC [gossip.discovery] isSentByMe -> DEBU 24b2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.303 UTC [gossip.comm] func1 -> DEBU 24b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.304 UTC [gossip.gossip] handleMessage -> DEBU 24b6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.303 UTC [gossip.comm] func1 -> DEBU 24b5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.305 UTC [gossip.gossip] handleMessage -> DEBU 24b9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.306 UTC [gossip.gossip] handleMessage -> DEBU 24ba Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24bb Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:24.306 UTC [msp.identity] Verify -> DEBU 24bc Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| -peer0.org1.example.com | 00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" -peer0.org1.example.com | "2019-07-20 02:40:24.307 UTC [msp.identity] Verify -> DEBU 24bd Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| -peer0.org1.example.com | 00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| -peer0.org1.example.com | 00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| -peer0.org1.example.com | 00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| -peer0.org1.example.com | 00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" -peer0.org1.example.com | "2019-07-20 02:40:24.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 24be Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.307 UTC [gossip.discovery] isSentByMe -> DEBU 24bf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 24c0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.308 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24c1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:24.308 UTC [msp] DeserializeIdentity -> DEBU 24c2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24c4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24c5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [cauthdsl] func1 -> DEBU 24c9 0xc00044ebf0 gate 1563590424309885400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24ca 0xc00044ebf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cb 0xc00044ebf0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cc 0xc00044ebf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cd 0xc00044ebf0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [cauthdsl] func1 -> DEBU 24ce 0xc00044ebf0 gate 1563590424309885400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24cf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [cauthdsl] func1 -> DEBU 24d2 0xc00044f580 gate 1563590424310987600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d3 0xc00044f580 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d4 0xc00044f580 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d5 0xc00044f580 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [msp.identity] Verify -> DEBU 24d6 Verify: digest = 00000000 31 01 b5 67 4c 33 cb f4 36 80 ff cb e1 f9 1d 73 |1..gL3..6......s| -peer0.org1.example.com | 00000010 f9 9b 49 64 38 02 b9 2e b6 09 35 4b 89 8f 7c 6a |..Id8.....5K..|j|" -peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [msp.identity] Verify -> DEBU 24d7 Verify: sig = 00000000 30 45 02 21 00 cb d8 3b 0a 47 60 c8 63 0b 30 33 |0E.!...;.G`.c.03| -peer0.org1.example.com | 00000010 ef fa 63 02 a9 3c e8 cf 92 f2 91 89 ff 4c 4d fd |..c..<.......LM.| -peer0.org1.example.com | 00000020 fe f9 12 55 7e 02 20 17 e7 93 62 80 25 1f 8c 59 |...U~. ...b.%..Y| -peer0.org1.example.com | 00000030 87 34 55 f3 9d 50 97 0c 4a 64 57 4d 7c c9 fe 03 |.4U..P..JdWM|...| -peer0.org1.example.com | 00000040 16 dd 0a 2d 86 f3 96 |...-...|" -peer0.org1.example.com | "2019-07-20 02:40:24.312 UTC [cauthdsl] func2 -> DEBU 24d8 0xc00044f580 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.312 UTC [cauthdsl] func1 -> DEBU 24d9 0xc00044f580 gate 1563590424310987600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.312 UTC [policies] Evaluate -> DEBU 24da Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24dc Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 24de Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 24df Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24e0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24e1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24e2 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:24.314 UTC [gossip.gossip] handleMessage -> DEBU 24e3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e4 Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| -peer0.org1.example.com | 00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" -peer0.org1.example.com | "2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e5 Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| -peer0.org1.example.com | 00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| -peer0.org1.example.com | 00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| -peer0.org1.example.com | 00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| -peer0.org1.example.com | 00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" -peer0.org1.example.com | "2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e7 Verify: sig = 00000000 30 44 02 20 0e 9c 8d a2 0e f2 2a e5 9b b6 17 d3 |0D. ......*.....| -peer0.org1.example.com | 00000010 ac 3a c0 37 a4 0a 51 12 b7 f2 a7 78 69 65 16 5d |.:.7..Q....xie.]| -peer0.org1.example.com | 00000020 22 16 c0 19 02 20 74 42 a4 00 5d 04 90 54 fb b3 |".... tB..]..T..| -peer0.org1.example.com | 00000030 18 89 61 bb 4b a0 27 eb c0 7a 18 20 6b a9 6e 5b |..a.K.'..z. k.n[| -peer0.org1.example.com | 00000040 76 47 a5 81 e4 57 |vG...W|" -peer0.org1.example.com | "2019-07-20 02:40:24.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 24e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.316 UTC [gossip.discovery] isSentByMe -> DEBU 24e9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 24ea Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24eb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.369 UTC [gossip.comm] func1 -> DEBU 24ec Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.369 UTC [gossip.gossip] handleMessage -> DEBU 24ed Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.369 UTC [gossip.pull] HandleMessage -> DEBU 24ee GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.370 UTC [gossip.pull] SendDigest -> DEBU 24ef Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:24.370 UTC [gossip.gossip] handleMessage -> DEBU 24f0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.374 UTC [gossip.comm] func1 -> DEBU 24f1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.374 UTC [gossip.gossip] handleMessage -> DEBU 24f2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.374 UTC [gossip.gossip] handleMessage -> DEBU 24f3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24f4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.375 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24f5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:24.375 UTC [msp.identity] Verify -> DEBU 24f6 Verify: digest = 00000000 f7 db 21 ce dd da b6 c7 68 b1 be dc 17 69 4a 9b |..!.....h....iJ.| -peer0.org1.example.com | 00000010 4e 1c 08 d7 64 40 fd 34 71 bb af 05 ca b4 96 37 |N...d@.4q......7|" -peer0.org1.example.com | "2019-07-20 02:40:24.375 UTC [msp.identity] Verify -> DEBU 24f7 Verify: sig = 00000000 30 45 02 21 00 a9 5d 61 2b f5 ac c6 63 89 4e fb |0E.!..]a+...c.N.| -peer0.org1.example.com | 00000010 6d 08 85 da 52 55 17 cc 93 8d 2f 40 5a 31 27 6f |m...RU..../@Z1'o| -peer0.org1.example.com | 00000020 60 28 81 78 28 02 20 34 05 05 23 bd 08 70 b9 c6 |`(.x(. 4..#..p..| -peer0.org1.example.com | 00000030 14 de 52 b0 16 16 d2 21 c8 66 04 9a 5e 48 b1 6b |..R....!.f..^H.k| -peer0.org1.example.com | 00000040 f9 63 98 57 62 85 db |.c.Wb..|" -peer0.org1.example.com | "2019-07-20 02:40:24.376 UTC [msp.identity] Verify -> DEBU 24f8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:24.376 UTC [msp.identity] Verify -> DEBU 24f9 Verify: sig = 00000000 30 44 02 20 6f fe ab d1 9b f0 4b c4 7e fe 0f 5a |0D. o.....K.~..Z| -peer0.org1.example.com | 00000010 68 f2 ab 5a db a3 02 fa 13 ad bd 37 e4 49 a3 01 |h..Z.......7.I..| -peer0.org1.example.com | 00000020 f3 3a bb 13 02 20 65 1d ea 2a 8c 94 ee 54 27 11 |.:... e..*...T'.| -peer0.org1.example.com | 00000030 5b eb 0f c2 00 78 d8 2c 50 e9 96 8d 9c 0d 8c 79 |[....x.,P......y| -peer0.org1.example.com | 00000040 b8 75 1a 8a eb 03 |.u....|" -peer0.org1.example.com | "2019-07-20 02:40:24.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 24fa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:24.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fc updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:24.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fd Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:24.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fe Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:24.379 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ff Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.379 UTC [gossip.discovery] handleAliveMessage -> DEBU 2500 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2501 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.380 UTC [gossip.discovery] sendMemResponse -> DEBU 2502 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:24.380 UTC [msp] DeserializeIdentity -> DEBU 2503 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.381 UTC [msp] DeserializeIdentity -> DEBU 2504 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.381 UTC [gossip.comm] Send -> DEBU 2505 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:24.382 UTC [gossip.discovery] sendMemResponse -> DEBU 2506 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " -peer0.org1.example.com | "2019-07-20 02:40:24.382 UTC [gossip.comm] sendToEndpoint -> DEBU 2507 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.382 UTC [gossip.comm] sendToEndpoint -> DEBU 2508 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.542 UTC [endorser] ProcessProposal -> DEBU 2509 Entering: request from 172.18.0.9:58356" -peer0.org1.example.com | "2019-07-20 02:40:24.542 UTC [protoutils] ValidateProposalMessage -> DEBU 250a ValidateProposalMessage starts for signed proposal 0xc002fdc370" -peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [protoutils] validateChannelHeader -> DEBU 250b validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250c begin" -peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [msp] GetManagerForChain -> DEBU 250d Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250e creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250f creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [msp.identity] Verify -> DEBU 2510 Verify: digest = 00000000 58 7a 40 a8 1f a6 1a 91 47 ca 3e 0a 16 21 04 d4 |Xz@.....G.>..!..| -peer0.org1.example.com | 00000010 50 81 e6 1a c7 b8 02 31 bd ed ec fb 2e 9b 76 97 |P......1......v.|" -peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [msp.identity] Verify -> DEBU 2511 Verify: sig = 00000000 30 44 02 20 23 05 67 c0 e5 2d a1 66 f7 7d 78 1d |0D. #.g..-.f.}x.| -peer0.org1.example.com | 00000010 96 1d 47 4a e1 2d 67 6a 3c 16 a0 24 24 f8 b9 bd |..GJ.-gj<..$$...| -peer0.org1.example.com | 00000020 bf 64 ac 69 02 20 63 23 39 44 87 4f 15 ad 73 6f |.d.i. c#9D.O..so| -peer0.org1.example.com | 00000030 66 d9 e7 87 c4 71 b3 2d d0 53 14 19 5e 75 10 5d |f....q.-.S..^u.]| -peer0.org1.example.com | 00000040 63 c0 3c 1d 9d 1d |c.<...|" -peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [protoutils] checkSignatureFromCreator -> DEBU 2512 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2513 validateChaincodeProposalMessage starts for proposal 0xc0005e7f80, header 0xc002fdc780" -peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2514 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [endorser] preProcess -> DEBU 2515 [businesschannel][9ced4390] processing txid: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe" -peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2516 retrieveTransactionByID() - txId = [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" -peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [aclmgmt] CheckACL -> DEBU 2517 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [aclmgmt] CheckACL -> DEBU 2518 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 2519 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 251a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 251b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [cauthdsl] func1 -> DEBU 251c 0xc000229d40 gate 1563590424545536000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251d 0xc000229d40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251e 0xc000229d40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251f 0xc000229d40 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.546 UTC [msp.identity] Verify -> DEBU 2520 Verify: digest = 00000000 58 7a 40 a8 1f a6 1a 91 47 ca 3e 0a 16 21 04 d4 |Xz@.....G.>..!..| -peer0.org1.example.com | 00000010 50 81 e6 1a c7 b8 02 31 bd ed ec fb 2e 9b 76 97 |P......1......v.|" -peer0.org1.example.com | "2019-07-20 02:40:24.546 UTC [msp.identity] Verify -> DEBU 2521 Verify: sig = 00000000 30 44 02 20 23 05 67 c0 e5 2d a1 66 f7 7d 78 1d |0D. #.g..-.f.}x.| -peer0.org1.example.com | 00000010 96 1d 47 4a e1 2d 67 6a 3c 16 a0 24 24 f8 b9 bd |..GJ.-gj<..$$...| -peer0.org1.example.com | 00000020 bf 64 ac 69 02 20 63 23 39 44 87 4f 15 ad 73 6f |.d.i. c#9D.O..so| -peer0.org1.example.com | 00000030 66 d9 e7 87 c4 71 b3 2d d0 53 14 19 5e 75 10 5d |f....q.-.S..^u.]| -peer0.org1.example.com | 00000040 63 c0 3c 1d 9d 1d |c.<...|" -peer0.org1.example.com | "2019-07-20 02:40:24.546 UTC [cauthdsl] func2 -> DEBU 2522 0xc000229d40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.546 UTC [cauthdsl] func1 -> DEBU 2523 0xc000229d40 gate 1563590424545536000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.546 UTC [policies] Evaluate -> DEBU 2524 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2525 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2526 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2527 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:24.547 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2528 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:24.548 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2529 constructing new tx simulator txid = [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" -peer0.org1.example.com | "2019-07-20 02:40:24.548 UTC [endorser] SimulateProposal -> DEBU 252a [businesschannel][9ced4390] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:24.548 UTC [stateleveldb] GetState -> DEBU 252b GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:24.549 UTC [ccprovider] GetChaincodeData -> DEBU 252c Getting chaincode data for from cache" -peer0.org1.example.com | "2019-07-20 02:40:24.549 UTC [endorser] callChaincode -> INFO 252d [businesschannel][9ced4390] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:24.549 UTC [chaincode] Execute -> DEBU 252e Entry" -peer0.org1.example.com | "2019-07-20 02:40:24.551 UTC [chaincode] handleMessage -> DEBU 252f [9ced4390] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:24.551 UTC [chaincode] HandleTransaction -> DEBU 2530 [9ced4390] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:24.552 UTC [chaincode] HandleGetState -> DEBU 2531 [9ced4390] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:24.552 UTC [stateleveldb] GetState -> DEBU 2532 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-07-20 02:40:24.552 UTC [chaincode] HandleTransaction -> DEBU 2533 [9ced4390] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:24.554 UTC [gossip.comm] func1 -> DEBU 2534 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.555 UTC [gossip.gossip] handleMessage -> DEBU 2535 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.555 UTC [gossip.pull] HandleMessage -> DEBU 2536 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.555 UTC [msp] DeserializeIdentity -> DEBU 2537 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.555 UTC [msp] DeserializeIdentity -> DEBU 2538 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 2539 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [gossip.pull] SendDigest -> DEBU 253d Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [gossip.gossip] handleMessage -> DEBU 253e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.557 UTC [chaincode] handleMessage -> DEBU 253f [9ced4390] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:24.557 UTC [chaincode] Notify -> DEBU 2540 [9ced4390] notifying Txid:9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:24.558 UTC [chaincode] Execute -> DEBU 2541 Exit" -peer0.org1.example.com | "2019-07-20 02:40:24.558 UTC [endorser] callChaincode -> INFO 2542 [businesschannel][9ced4390] Exit chaincode: name:"exp02" (8ms)" -peer0.org1.example.com | "2019-07-20 02:40:24.558 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2543 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:24.558 UTC [lockbasedtxmgr] Done -> DEBU 2544 Done with transaction simulation / query execution [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" -peer0.org1.example.com | "2019-07-20 02:40:24.558 UTC [endorser] SimulateProposal -> DEBU 2545 [businesschannel][9ced4390] Exit" -peer0.org1.example.com | "2019-07-20 02:40:24.559 UTC [endorser] endorseProposal -> DEBU 2546 [businesschannel][9ced4390] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:24.559 UTC [endorser] endorseProposal -> DEBU 2547 [businesschannel][9ced4390] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-07-20 02:40:24.559 UTC [endorser] EndorseWithPlugin -> DEBU 2548 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:24.560 UTC [gossip.comm] func1 -> DEBU 2549 Got message: GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.565 UTC [msp.identity] Sign -> DEBU 254a Sign: plaintext: 0A2097CB3F03F46412D05C11B69168FC...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:24.566 UTC [msp.identity] Sign -> DEBU 254c Sign: digest: A2BFD1B59AE6A062AA9F49715A99F6F5A4AC22E447B5BA55A700F061CA54F3E7 " -peer0.org1.example.com | "2019-07-20 02:40:24.566 UTC [endorser] EndorseWithPlugin -> DEBU 254d Exiting {plugin: escc, channel: businesschannel, tx: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:24.566 UTC [endorser] endorseProposal -> DEBU 254e [businesschannel][9ced4390] Exit" -peer0.org1.example.com | "2019-07-20 02:40:24.566 UTC [lockbasedtxmgr] Done -> DEBU 254f Done with transaction simulation / query execution [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" -peer0.org1.example.com | "2019-07-20 02:40:24.567 UTC [endorser] func1 -> DEBU 2550 Exit: request from 172.18.0.9:58356" -peer0.org1.example.com | "2019-07-20 02:40:24.566 UTC [gossip.gossip] handleMessage -> DEBU 254b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.567 UTC [comm.grpc.server] 1 -> INFO 2551 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58356 grpc.code=OK grpc.call_duration=25.1225ms -peer0.org1.example.com | "2019-07-20 02:40:24.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2553 Got message: GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2554 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:24.568 UTC [msp] DeserializeIdentity -> DEBU 2555 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.567 UTC [gossip.gossip] handleMessage -> DEBU 2552 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.569 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2556 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:24.569 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2557 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.573 UTC [grpc] infof -> DEBU 2558 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:24.573 UTC [grpc] infof -> DEBU 2559 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:24.572 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 255a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.573 UTC [policies] Evaluate -> DEBU 255b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.573 UTC [policies] Evaluate -> DEBU 255c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.574 UTC [policies] Evaluate -> DEBU 255d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.574 UTC [cauthdsl] func1 -> DEBU 255e 0xc00027b190 gate 1563590424574399600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.574 UTC [cauthdsl] func2 -> DEBU 255f 0xc00027b190 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.574 UTC [cauthdsl] func2 -> DEBU 2560 0xc00027b190 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.575 UTC [cauthdsl] func2 -> DEBU 2561 0xc00027b190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:24.575 UTC [cauthdsl] func2 -> DEBU 2562 0xc00027b190 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.575 UTC [cauthdsl] func1 -> DEBU 2563 0xc00027b190 gate 1563590424574399600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.575 UTC [policies] Evaluate -> DEBU 2564 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.576 UTC [policies] Evaluate -> DEBU 2565 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.576 UTC [policies] Evaluate -> DEBU 2566 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.576 UTC [cauthdsl] func1 -> DEBU 2567 0xc00027ba40 gate 1563590424576595400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.576 UTC [cauthdsl] func2 -> DEBU 2568 0xc00027ba40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.576 UTC [cauthdsl] func2 -> DEBU 2569 0xc00027ba40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.577 UTC [cauthdsl] func2 -> DEBU 256a 0xc00027ba40 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.577 UTC [msp.identity] Verify -> DEBU 256b Verify: digest = 00000000 41 b0 db f9 9c d3 07 22 e0 f1 0f a6 45 df 28 d5 |A......"....E.(.| -peer0.org1.example.com | 00000010 17 04 4e 0f 92 f8 eb 0e 36 59 06 81 4e 27 04 4a |..N.....6Y..N'.J|" -peer0.org1.example.com | "2019-07-20 02:40:24.577 UTC [msp.identity] Verify -> DEBU 256c Verify: sig = 00000000 30 44 02 20 14 8e 2e 3b 7a 79 e9 a8 e3 4d ad a8 |0D. ...;zy...M..| -peer0.org1.example.com | 00000010 da d9 de 22 30 55 a7 77 4a ac 5e 17 7d d4 33 76 |..."0U.wJ.^.}.3v| -peer0.org1.example.com | 00000020 eb 3e bc 24 02 20 48 de 27 64 5d 20 89 e3 ab c6 |.>.$. H.'d] ....| -peer0.org1.example.com | 00000030 85 6e 79 7e 3e 04 4f 44 a9 94 c8 36 46 63 d3 c4 |.ny~>.OD...6Fc..| -peer0.org1.example.com | 00000040 3e 9f 0e e2 b1 ab |>.....|" -peer0.org1.example.com | "2019-07-20 02:40:24.577 UTC [cauthdsl] func2 -> DEBU 256d 0xc00027ba40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [cauthdsl] func1 -> DEBU 256e 0xc00027ba40 gate 1563590424576595400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 256f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2570 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2571 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2572 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [gossip.discovery] handleAliveMessage -> DEBU 2573 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2574 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2575 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2576 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2577 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2578 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] handleAliveMessage -> DEBU 2579 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] handleMsgFromComm -> DEBU 257a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.580 UTC [gossip.discovery] sendMemResponse -> DEBU 257b Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.581 UTC [gossip.comm] Send -> DEBU 257f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:24.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2580 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2581 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.581 UTC [gossip.discovery] sendMemResponse -> DEBU 2582 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" > alive:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > alive: alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " -peer0.org1.example.com | "2019-07-20 02:40:24.717 UTC [msp] DeserializeIdentity -> DEBU 2583 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.717 UTC [msp] DeserializeIdentity -> DEBU 2584 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.718 UTC [gossip.comm] Send -> DEBU 2585 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2586 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2587 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2588 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2589 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.719 UTC [gossip.comm] sendToEndpoint -> DEBU 258a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.719 UTC [gossip.comm] sendToEndpoint -> DEBU 258b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.720 UTC [gossip.comm] func1 -> DEBU 258c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.720 UTC [gossip.gossip] handleMessage -> DEBU 258d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.720 UTC [msp.identity] Verify -> DEBU 258e Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:24.721 UTC [msp.identity] Verify -> DEBU 258f Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:24.721 UTC [msp] DeserializeIdentity -> DEBU 2590 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.722 UTC [msp] DeserializeIdentity -> DEBU 2591 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2592 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2593 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2594 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.722 UTC [policies] Evaluate -> DEBU 2595 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [policies] Evaluate -> DEBU 2596 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [policies] Evaluate -> DEBU 2597 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [cauthdsl] func1 -> DEBU 2598 0xc0002ecf80 gate 1563590424723322000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 2599 0xc0002ecf80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 259b 0xc0002ecf80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [gossip.comm] func1 -> DEBU 259a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 259c 0xc0002ecf80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:24.726 UTC [cauthdsl] func2 -> DEBU 259d 0xc0002ecf80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.726 UTC [cauthdsl] func1 -> DEBU 259e 0xc0002ecf80 gate 1563590424723322000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.726 UTC [msp] DeserializeIdentity -> DEBU 259f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.726 UTC [policies] Evaluate -> DEBU 25a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.727 UTC [msp] DeserializeIdentity -> DEBU 25a1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.727 UTC [gossip.comm] Send -> DEBU 25a3 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:24.727 UTC [gossip.comm] func1 -> DEBU 25a4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.727 UTC [msp] DeserializeIdentity -> DEBU 25a5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.727 UTC [policies] Evaluate -> DEBU 25a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.728 UTC [policies] Evaluate -> DEBU 25a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [cauthdsl] func1 -> DEBU 25a8 0xc0002eda70 gate 1563590424729010500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25a9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25aa 0xc0002eda70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25ac 0xc0002eda70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25ad 0xc0002eda70 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25ae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [msp.identity] Verify -> DEBU 25af Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:24.730 UTC [msp.identity] Verify -> DEBU 25b1 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:24.730 UTC [gossip.comm] sendToEndpoint -> DEBU 25b2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.730 UTC [gossip.comm] sendToEndpoint -> DEBU 25b4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25b0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.730 UTC [cauthdsl] func2 -> DEBU 25b3 0xc0002eda70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.730 UTC [cauthdsl] func1 -> DEBU 25b5 0xc0002eda70 gate 1563590424729010500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b8 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.728 UTC [msp] DeserializeIdentity -> DEBU 25a6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.732 UTC [msp] DeserializeIdentity -> DEBU 25ba Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.735 UTC [msp] DeserializeIdentity -> DEBU 25bb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25ab Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25bc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:24.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25bd Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25be Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.737 UTC [policies] Evaluate -> DEBU 25bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.738 UTC [policies] Evaluate -> DEBU 25c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.738 UTC [policies] Evaluate -> DEBU 25c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.738 UTC [cauthdsl] func1 -> DEBU 25c2 0xc0003dcea0 gate 1563590424738584700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.738 UTC [cauthdsl] func2 -> DEBU 25c3 0xc0003dcea0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c4 0xc0003dcea0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c5 0xc0003dcea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c6 0xc0003dcea0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.739 UTC [cauthdsl] func1 -> DEBU 25c7 0xc0003dcea0 gate 1563590424738584700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.740 UTC [cauthdsl] func1 -> DEBU 25cb 0xc0003dd810 gate 1563590424740711600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25cc 0xc0003dd810 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25cd 0xc0003dd810 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25ce 0xc0003dd810 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.742 UTC [msp.identity] Verify -> DEBU 25cf Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:24.742 UTC [msp.identity] Verify -> DEBU 25d0 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:24.742 UTC [cauthdsl] func2 -> DEBU 25d1 0xc0003dd810 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.743 UTC [cauthdsl] func1 -> DEBU 25d3 0xc0003dd810 gate 1563590424740711600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.743 UTC [policies] Evaluate -> DEBU 25d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.743 UTC [policies] Evaluate -> DEBU 25d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.743 UTC [gossip.comm] func1 -> DEBU 25d2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.745 UTC [policies] Evaluate -> DEBU 25d6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.745 UTC [policies] Evaluate -> DEBU 25d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.746 UTC [msp.identity] Verify -> DEBU 25d8 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -peer0.org1.example.com | "2019-07-20 02:40:24.747 UTC [msp.identity] Verify -> DEBU 25d9 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" -peer0.org1.example.com | "2019-07-20 02:40:24.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25da Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25db Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.750 UTC [cauthdsl] func1 -> DEBU 25df 0xc000716cd0 gate 1563590424750527300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.751 UTC [cauthdsl] func2 -> DEBU 25e0 0xc000716cd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.751 UTC [cauthdsl] func2 -> DEBU 25e1 0xc000716cd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.753 UTC [cauthdsl] func2 -> DEBU 25e2 0xc000716cd0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.754 UTC [msp.identity] Verify -> DEBU 25e3 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -peer0.org1.example.com | "2019-07-20 02:40:24.755 UTC [msp] DeserializeIdentity -> DEBU 25e4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.755 UTC [msp] DeserializeIdentity -> DEBU 25e5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.755 UTC [gossip.pull] Hello -> DEBU 25e7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:24.756 UTC [msp] DeserializeIdentity -> DEBU 25e8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.755 UTC [msp.identity] Verify -> DEBU 25e6 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" -peer0.org1.example.com | "2019-07-20 02:40:24.756 UTC [msp] DeserializeIdentity -> DEBU 25e9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.760 UTC [gossip.comm] Send -> DEBU 25eb Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:24.761 UTC [gossip.comm] sendToEndpoint -> DEBU 25ec Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.757 UTC [cauthdsl] func2 -> DEBU 25ea 0xc000716cd0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.762 UTC [cauthdsl] func1 -> DEBU 25ed 0xc000716cd0 gate 1563590424750527300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.762 UTC [policies] Evaluate -> DEBU 25ef Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.763 UTC [policies] Evaluate -> DEBU 25f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.763 UTC [policies] Evaluate -> DEBU 25f1 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.764 UTC [policies] Evaluate -> DEBU 25f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.764 UTC [gossip.comm] func1 -> DEBU 25f3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.762 UTC [gossip.comm] sendToEndpoint -> DEBU 25ee Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.764 UTC [gossip.gossip] handleMessage -> DEBU 25f4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.766 UTC [gossip.gossip] handleMessage -> DEBU 25f5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.766 UTC [msp] DeserializeIdentity -> DEBU 25f6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.767 UTC [msp.identity] Verify -> DEBU 25f7 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25f8 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25f9 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25fa Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:24.769 UTC [msp] DeserializeIdentity -> DEBU 25fb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.769 UTC [msp] DeserializeIdentity -> DEBU 25fc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25fd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25fe Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25ff Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2600 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2601 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2602 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [cauthdsl] func1 -> DEBU 2603 0xc002963630 gate 1563590424770746900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [cauthdsl] func2 -> DEBU 2604 0xc002963630 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2605 0xc002963630 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2606 0xc002963630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2607 0xc002963630 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [cauthdsl] func1 -> DEBU 2608 0xc002963630 gate 1563590424770746900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 2609 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 260a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 260b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.772 UTC [cauthdsl] func1 -> DEBU 260c 0xc002963e70 gate 1563590424772207200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260d 0xc002963e70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260e 0xc002963e70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260f 0xc002963e70 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.773 UTC [msp.identity] Verify -> DEBU 2610 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -peer0.org1.example.com | "2019-07-20 02:40:24.774 UTC [msp.identity] Verify -> DEBU 2611 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -peer0.org1.example.com | "2019-07-20 02:40:24.774 UTC [cauthdsl] func2 -> DEBU 2612 0xc002963e70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.774 UTC [cauthdsl] func1 -> DEBU 2613 0xc002963e70 gate 1563590424772207200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.774 UTC [policies] Evaluate -> DEBU 2614 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2615 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2616 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2617 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [endorser] ProcessProposal -> DEBU 2618 Entering: request from 172.18.0.9:58360" -peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [msp] DeserializeIdentity -> DEBU 2619 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [protoutils] ValidateProposalMessage -> DEBU 261a ValidateProposalMessage starts for signed proposal 0xc002f51540" -peer0.org1.example.com | "2019-07-20 02:40:24.776 UTC [protoutils] validateChannelHeader -> DEBU 261b validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:24.776 UTC [protoutils] checkSignatureFromCreator -> DEBU 261d begin" -peer0.org1.example.com | "2019-07-20 02:40:24.777 UTC [msp] GetManagerForChain -> DEBU 261e Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:24.777 UTC [protoutils] checkSignatureFromCreator -> DEBU 261f creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:24.777 UTC [protoutils] checkSignatureFromCreator -> DEBU 2620 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:24.776 UTC [msp] DeserializeIdentity -> DEBU 261c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.778 UTC [msp.identity] Verify -> DEBU 2621 Verify: digest = 00000000 d0 3a 89 45 63 c1 72 e5 82 71 9e 16 5d 2a b0 8d |.:.Ec.r..q..]*..| -peer0.org1.example.com | 00000010 eb c5 71 9d 97 9b 2e 42 4a f7 05 59 cf 16 72 a2 |..q....BJ..Y..r.|" -peer0.org1.example.com | "2019-07-20 02:40:24.778 UTC [msp.identity] Verify -> DEBU 2623 Verify: sig = 00000000 30 44 02 20 37 55 b9 46 75 03 f1 7b 01 67 84 ea |0D. 7U.Fu..{.g..| -peer0.org1.example.com | 00000010 1d 2b f7 2b 7d d1 d8 66 ec c7 8d 54 a9 d9 9b ba |.+.+}..f...T....| -peer0.org1.example.com | 00000020 8e b9 d5 68 02 20 2f 08 1b 38 43 79 8c 34 46 93 |...h. /..8Cy.4F.| -peer0.org1.example.com | 00000030 e4 36 35 b2 49 53 b2 b1 6f 67 16 75 6e 31 a7 24 |.65.IS..og.un1.$| -peer0.org1.example.com | 00000040 5f 7c d9 ad 57 d3 |_|..W.|" -peer0.org1.example.com | "2019-07-20 02:40:24.778 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2622 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [protoutils] checkSignatureFromCreator -> DEBU 2624 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2626 validateChaincodeProposalMessage starts for proposal 0xc0001485b0, header 0xc002f51950" -peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2627 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [endorser] preProcess -> DEBU 2628 [businesschannel][3cf6d7e2] processing txid: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732" -peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2629 retrieveTransactionByID() - txId = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" -peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2625 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 262b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.780 UTC [aclmgmt] CheckACL -> DEBU 262a acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-07-20 02:40:24.781 UTC [aclmgmt] CheckACL -> DEBU 262e acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2630 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2631 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2632 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.781 UTC [cauthdsl] func1 -> DEBU 2633 0xc003a0e750 gate 1563590424781804600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2634 0xc003a0e750 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2635 0xc003a0e750 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2636 0xc003a0e750 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [msp.identity] Verify -> DEBU 2638 Verify: digest = 00000000 d0 3a 89 45 63 c1 72 e5 82 71 9e 16 5d 2a b0 8d |.:.Ec.r..q..]*..| -peer0.org1.example.com | 00000010 eb c5 71 9d 97 9b 2e 42 4a f7 05 59 cf 16 72 a2 |..q....BJ..Y..r.|" -peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [cauthdsl] func1 -> DEBU 2637 0xc003a0eb00 gate 1563590424782522000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [msp.identity] Verify -> DEBU 2639 Verify: sig = 00000000 30 44 02 20 37 55 b9 46 75 03 f1 7b 01 67 84 ea |0D. 7U.Fu..{.g..| -peer0.org1.example.com | 00000010 1d 2b f7 2b 7d d1 d8 66 ec c7 8d 54 a9 d9 9b ba |.+.+}..f...T....| -peer0.org1.example.com | 00000020 8e b9 d5 68 02 20 2f 08 1b 38 43 79 8c 34 46 93 |...h. /..8Cy.4F.| -peer0.org1.example.com | 00000030 e4 36 35 b2 49 53 b2 b1 6f 67 16 75 6e 31 a7 24 |.65.IS..og.un1.$| -peer0.org1.example.com | 00000040 5f 7c d9 ad 57 d3 |_|..W.|" -peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263a 0xc003a0eb00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263c 0xc003a0eb00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263b 0xc003a0e750 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [cauthdsl] func1 -> DEBU 263d 0xc003a0e750 gate 1563590424781804600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [policies] Evaluate -> DEBU 263e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [policies] Evaluate -> DEBU 2640 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263f 0xc003a0eb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2641 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:24.784 UTC [cauthdsl] func2 -> DEBU 2642 0xc003a0eb00 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.784 UTC [cauthdsl] func1 -> DEBU 2644 0xc003a0eb00 gate 1563590424782522000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2645 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2643 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [policies] Evaluate -> DEBU 2646 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [policies] Evaluate -> DEBU 2647 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2648 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2649 constructing new tx simulator txid = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" -peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [endorser] SimulateProposal -> DEBU 264b [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [stateleveldb] GetState -> DEBU 264c GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [ccprovider] GetChaincodeData -> DEBU 264d Getting chaincode data for from cache" -peer0.org1.example.com | "2019-07-20 02:40:24.786 UTC [endorser] callChaincode -> INFO 264e [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:24.786 UTC [chaincode] Execute -> DEBU 264f Entry" -peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [cauthdsl] func1 -> DEBU 264a 0xc00055f7a0 gate 1563590424785318600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.787 UTC [chaincode] handleMessage -> DEBU 2651 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2650 0xc00055f7a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2652 0xc00055f7a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2653 0xc00055f7a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.787 UTC [chaincode] HandleTransaction -> DEBU 2654 [3cf6d7e2] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:24.788 UTC [chaincode] HandleGetState -> DEBU 2656 [3cf6d7e2] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:24.788 UTC [stateleveldb] GetState -> DEBU 2657 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-07-20 02:40:24.788 UTC [chaincode] HandleTransaction -> DEBU 2658 [3cf6d7e2] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:24.788 UTC [msp.identity] Verify -> DEBU 2655 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -peer0.org1.example.com | "2019-07-20 02:40:24.788 UTC [msp.identity] Verify -> DEBU 2659 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" -peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [cauthdsl] func2 -> DEBU 265a 0xc00055f7a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [cauthdsl] func1 -> DEBU 265b 0xc00055f7a0 gate 1563590424785318600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [msp] DeserializeIdentity -> DEBU 2661 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2662 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2663 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2664 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2665 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2666 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [cauthdsl] func1 -> DEBU 2667 0xc003b4cc60 gate 1563590424790742400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [cauthdsl] func2 -> DEBU 2668 0xc003b4cc60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [cauthdsl] func2 -> DEBU 2669 0xc003b4cc60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [cauthdsl] func2 -> DEBU 266a 0xc003b4cc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [cauthdsl] func2 -> DEBU 266b 0xc003b4cc60 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [cauthdsl] func1 -> DEBU 266c 0xc003b4cc60 gate 1563590424790742400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [chaincode] handleMessage -> DEBU 2660 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.792 UTC [cauthdsl] func1 -> DEBU 2671 0xc003b4d510 gate 1563590424792004600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2672 0xc003b4d510 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2673 0xc003b4d510 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2674 0xc003b4d510 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.792 UTC [msp.identity] Verify -> DEBU 2675 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [chaincode] HandleTransaction -> DEBU 2670 [3cf6d7e2] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:24.793 UTC [chaincode] HandleGetState -> DEBU 2676 [3cf6d7e2] getting state for chaincode exp02, key b, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:24.794 UTC [stateleveldb] GetState -> DEBU 2677 GetState(). ns=exp02, key=b" -peer0.org1.example.com | "2019-07-20 02:40:24.794 UTC [chaincode] HandleTransaction -> DEBU 2678 [3cf6d7e2] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:24.793 UTC [msp.identity] Verify -> DEBU 2679 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" -peer0.org1.example.com | "2019-07-20 02:40:24.795 UTC [cauthdsl] func2 -> DEBU 267a 0xc003b4d510 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.795 UTC [cauthdsl] func1 -> DEBU 267b 0xc003b4d510 gate 1563590424792004600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.796 UTC [policies] Evaluate -> DEBU 267f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.796 UTC [gossip.gossip] handleMessage -> DEBU 2680 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.796 UTC [gossip.gossip] handleMessage -> DEBU 2681 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.796 UTC [msp] DeserializeIdentity -> DEBU 2682 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.797 UTC [msp.identity] Verify -> DEBU 2683 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -peer0.org1.example.com | "2019-07-20 02:40:24.797 UTC [msp.identity] Verify -> DEBU 2684 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" -peer0.org1.example.com | "2019-07-20 02:40:24.797 UTC [msp] DeserializeIdentity -> DEBU 2685 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.797 UTC [msp] DeserializeIdentity -> DEBU 2686 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2687 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2689 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 268a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [cauthdsl] func1 -> DEBU 268e 0xc0036e5740 gate 1563590424799839700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 268f 0xc0036e5740 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2690 0xc0036e5740 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2691 0xc0036e5740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2692 0xc0036e5740 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func1 -> DEBU 2693 0xc0036e5740 gate 1563590424799839700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2694 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2695 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2696 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func1 -> DEBU 2697 0xc0036e5f80 gate 1563590424800963900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.798 UTC [chaincode] handleMessage -> DEBU 2688 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 2698 0xc0036e5f80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.801 UTC [chaincode] HandleTransaction -> DEBU 2699 [3cf6d7e2] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 269a 0xc0036e5f80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.801 UTC [chaincode] HandleTransaction -> DEBU 269b [3cf6d7e2] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 269c 0xc0036e5f80 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.802 UTC [msp.identity] Verify -> DEBU 269e Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -peer0.org1.example.com | "2019-07-20 02:40:24.802 UTC [chaincode] handleMessage -> DEBU 269d [3cf6d7e2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:24.803 UTC [chaincode] HandleTransaction -> DEBU 269f [3cf6d7e2] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:24.802 UTC [msp.identity] Verify -> DEBU 26a0 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -peer0.org1.example.com | "2019-07-20 02:40:24.803 UTC [chaincode] HandleTransaction -> DEBU 26a1 [3cf6d7e2] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [chaincode] handleMessage -> DEBU 26a3 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [chaincode] Notify -> DEBU 26a4 [3cf6d7e2] notifying Txid:3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [chaincode] Execute -> DEBU 26a5 Exit" -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [endorser] callChaincode -> INFO 26a6 [businesschannel][3cf6d7e2] Exit chaincode: name:"exp02" (18ms)" -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 26a7 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [lockbasedtxmgr] Done -> DEBU 26a8 Done with transaction simulation / query execution [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [endorser] SimulateProposal -> DEBU 26a9 [businesschannel][3cf6d7e2] Exit" -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [endorser] endorseProposal -> DEBU 26aa [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [endorser] endorseProposal -> DEBU 26ab [businesschannel][3cf6d7e2] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [endorser] EndorseWithPlugin -> DEBU 26ac Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [msp.identity] Sign -> DEBU 26ad Sign: plaintext: 0A20D3E5EF20BE3985D0A70F10BC9838...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [msp.identity] Sign -> DEBU 26ae Sign: digest: 4C3F23D107F594129EEAAB4C73111C5D8F880DCB0AF0F51BEE8DA03F26D71281 " -peer0.org1.example.com | "2019-07-20 02:40:24.805 UTC [endorser] EndorseWithPlugin -> DEBU 26af Exiting {plugin: escc, channel: businesschannel, tx: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:24.805 UTC [endorser] endorseProposal -> DEBU 26b0 [businesschannel][3cf6d7e2] Exit" -peer0.org1.example.com | "2019-07-20 02:40:24.805 UTC [lockbasedtxmgr] Done -> DEBU 26b1 Done with transaction simulation / query execution [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" -peer0.org1.example.com | "2019-07-20 02:40:24.806 UTC [endorser] func1 -> DEBU 26b2 Exit: request from 172.18.0.9:58360" -peer0.org1.example.com | "2019-07-20 02:40:24.806 UTC [comm.grpc.server] 1 -> INFO 26b3 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58360 grpc.code=OK grpc.call_duration=30.9885ms -peer0.org1.example.com | "2019-07-20 02:40:24.803 UTC [cauthdsl] func2 -> DEBU 26a2 0xc0036e5f80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.807 UTC [cauthdsl] func1 -> DEBU 26b4 0xc0036e5f80 gate 1563590424800963900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.807 UTC [policies] Evaluate -> DEBU 26b5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.807 UTC [policies] Evaluate -> DEBU 26b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.808 UTC [policies] Evaluate -> DEBU 26b7 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.808 UTC [policies] Evaluate -> DEBU 26b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.820 UTC [msp.identity] Verify -> DEBU 26b9 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -peer0.org1.example.com | "2019-07-20 02:40:24.820 UTC [msp.identity] Verify -> DEBU 26ba Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" -peer0.org1.example.com | "2019-07-20 02:40:24.822 UTC [msp] DeserializeIdentity -> DEBU 26bb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.822 UTC [msp] DeserializeIdentity -> DEBU 26bc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26be Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26bf Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [cauthdsl] func1 -> DEBU 26c3 0xc0036e1f60 gate 1563590424823548200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c4 0xc0036e1f60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c5 0xc0036e1f60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c6 0xc0036e1f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c7 0xc0036e1f60 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [cauthdsl] func1 -> DEBU 26c8 0xc0036e1f60 gate 1563590424823548200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [cauthdsl] func1 -> DEBU 26cc 0xc0038e07a0 gate 1563590424824490800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26cd 0xc0038e07a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26ce 0xc0038e07a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26cf 0xc0038e07a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.825 UTC [msp.identity] Verify -> DEBU 26d0 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| -peer0.org1.example.com | 00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" -peer0.org1.example.com | "2019-07-20 02:40:24.825 UTC [msp.identity] Verify -> DEBU 26d1 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| -peer0.org1.example.com | 00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| -peer0.org1.example.com | 00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| -peer0.org1.example.com | 00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| -peer0.org1.example.com | 00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" -peer0.org1.example.com | "2019-07-20 02:40:24.826 UTC [cauthdsl] func2 -> DEBU 26d2 0xc0038e07a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.826 UTC [cauthdsl] func1 -> DEBU 26d3 0xc0038e07a0 gate 1563590424824490800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [msp] DeserializeIdentity -> DEBU 26d8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26d9 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26da Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [cauthdsl] func1 -> DEBU 26de 0xc0038e1880 gate 1563590424827881200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26df 0xc0038e1880 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e0 0xc0038e1880 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e1 0xc0038e1880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e2 0xc0038e1880 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [cauthdsl] func1 -> DEBU 26e3 0xc0038e1880 gate 1563590424827881200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:24.829 UTC [cauthdsl] func1 -> DEBU 26e7 0xc00393e0c0 gate 1563590424828998600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:24.830 UTC [cauthdsl] func2 -> DEBU 26e8 0xc00393e0c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:24.831 UTC [cauthdsl] func2 -> DEBU 26e9 0xc00393e0c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:24.831 UTC [cauthdsl] func2 -> DEBU 26ea 0xc00393e0c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.833 UTC [grpc] infof -> DEBU 26eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:24.833 UTC [grpc] infof -> DEBU 26ec transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:24.833 UTC [msp.identity] Verify -> DEBU 26ed Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| -peer0.org1.example.com | 00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" -peer0.org1.example.com | "2019-07-20 02:40:24.834 UTC [msp.identity] Verify -> DEBU 26ee Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| -peer0.org1.example.com | 00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| -peer0.org1.example.com | 00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| -peer0.org1.example.com | 00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| -peer0.org1.example.com | 00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" -peer0.org1.example.com | "2019-07-20 02:40:24.835 UTC [cauthdsl] func2 -> DEBU 26ef 0xc00393e0c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:24.835 UTC [cauthdsl] func1 -> DEBU 26f0 0xc00393e0c0 gate 1563590424828998600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:24.835 UTC [policies] Evaluate -> DEBU 26f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:24.836 UTC [gossip.gossip] handleMessage -> DEBU 26f5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.837 UTC [gossip.gossip] handleMessage -> DEBU 26f6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.838 UTC [msp.identity] Verify -> DEBU 26f7 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| -peer0.org1.example.com | 00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" -peer0.org1.example.com | "2019-07-20 02:40:24.839 UTC [msp.identity] Verify -> DEBU 26f8 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| -peer0.org1.example.com | 00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| -peer0.org1.example.com | 00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| -peer0.org1.example.com | 00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| -peer0.org1.example.com | 00000040 bb 08 c9 6d 24 57 fb |...m$W.|" -peer0.org1.example.com | "2019-07-20 02:40:24.839 UTC [msp] DeserializeIdentity -> DEBU 26f9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.839 UTC [gossip.gossip] handleMessage -> DEBU 26fa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.839 UTC [gossip.gossip] handleMessage -> DEBU 26fb Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.840 UTC [gossip.pull] HandleMessage -> DEBU 26fc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.840 UTC [gossip.gossip] handleMessage -> DEBU 26fd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.878 UTC [gossip.comm] func1 -> DEBU 26fe Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.878 UTC [gossip.gossip] handleMessage -> DEBU 26ff Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.880 UTC [msp] DeserializeIdentity -> DEBU 2700 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.880 UTC [msp] DeserializeIdentity -> DEBU 2701 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.881 UTC [gossip.gossip] handleMessage -> DEBU 2702 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.886 UTC [gossip.comm] func1 -> DEBU 2703 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.886 UTC [gossip.gossip] handleMessage -> DEBU 2704 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.887 UTC [msp.identity] Verify -> DEBU 2705 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -peer0.org1.example.com | "2019-07-20 02:40:24.887 UTC [msp.identity] Verify -> DEBU 2706 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" -peer0.org1.example.com | "2019-07-20 02:40:24.887 UTC [gossip.gossip] handleMessage -> DEBU 2707 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.893 UTC [gossip.comm] func1 -> DEBU 2708 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.893 UTC [gossip.gossip] handleMessage -> DEBU 270a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.894 UTC [msp.identity] Verify -> DEBU 270b Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -peer0.org1.example.com | "2019-07-20 02:40:24.894 UTC [msp.identity] Verify -> DEBU 270c Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" -peer0.org1.example.com | "2019-07-20 02:40:24.893 UTC [gossip.comm] func1 -> DEBU 2709 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.894 UTC [msp] DeserializeIdentity -> DEBU 270d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.895 UTC [gossip.gossip] handleMessage -> DEBU 270e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.895 UTC [gossip.gossip] handleMessage -> DEBU 270f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.895 UTC [msp.identity] Verify -> DEBU 2710 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -peer0.org1.example.com | "2019-07-20 02:40:24.895 UTC [msp.identity] Verify -> DEBU 2711 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" -peer0.org1.example.com | "2019-07-20 02:40:24.896 UTC [msp] DeserializeIdentity -> DEBU 2712 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:24.896 UTC [gossip.gossip] handleMessage -> DEBU 2713 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:24.902 UTC [gossip.comm] func1 -> DEBU 2714 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.903 UTC [gossip.gossip] handleMessage -> DEBU 2715 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.903 UTC [gossip.pull] HandleMessage -> DEBU 2716 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:24.903 UTC [gossip.pull] SendDigest -> DEBU 2717 Sending BLOCK_MSG digest: [3 1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:24.904 UTC [gossip.gossip] handleMessage -> DEBU 2718 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:25.024 UTC [endorser] ProcessProposal -> DEBU 2719 Entering: request from 172.18.0.9:58366" -peer0.org1.example.com | "2019-07-20 02:40:25.025 UTC [protoutils] ValidateProposalMessage -> DEBU 271a ValidateProposalMessage starts for signed proposal 0xc0029a5d10" -peer0.org1.example.com | "2019-07-20 02:40:25.025 UTC [protoutils] validateChannelHeader -> DEBU 271b validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:25.026 UTC [protoutils] checkSignatureFromCreator -> DEBU 271c begin" -peer0.org1.example.com | "2019-07-20 02:40:25.026 UTC [msp] GetManagerForChain -> DEBU 271d Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:25.026 UTC [msp] DeserializeIdentity -> DEBU 271e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.027 UTC [msp.identity] newIdentity -> DEBU 271f Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:25.028 UTC [protoutils] checkSignatureFromCreator -> DEBU 2720 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -peer0.org1.example.com | "2019-07-20 02:40:25.028 UTC [msp] Validate -> DEBU 2721 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:25.029 UTC [msp] getCertificationChain -> DEBU 2722 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:25.029 UTC [protoutils] checkSignatureFromCreator -> DEBU 2723 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:25.029 UTC [msp.identity] Verify -> DEBU 2724 Verify: digest = 00000000 1a 72 dc bd 22 9d ce 42 23 dc 31 1e cb ab c5 44 |.r.."..B#.1....D| -peer0.org1.example.com | 00000010 32 91 e1 c3 ca 33 1a 63 3d e3 8d 58 28 7d b5 12 |2....3.c=..X(}..|" -peer0.org1.example.com | "2019-07-20 02:40:25.030 UTC [msp.identity] Verify -> DEBU 2725 Verify: sig = 00000000 30 44 02 20 66 25 b5 25 13 52 60 f0 15 e4 d2 17 |0D. f%.%.R`.....| -peer0.org1.example.com | 00000010 df a6 46 b6 09 c6 0a d5 db c7 c3 3b 8a 81 e0 f4 |..F........;....| -peer0.org1.example.com | 00000020 f4 71 03 49 02 20 5d 06 96 80 7b 06 1c 2e fa 98 |.q.I. ]...{.....| -peer0.org1.example.com | 00000030 9a 11 ca b9 10 35 3b 52 ac 86 12 9a 90 11 fa a7 |.....5;R........| -peer0.org1.example.com | 00000040 62 a9 01 cd 92 74 |b....t|" -peer0.org1.example.com | "2019-07-20 02:40:25.030 UTC [protoutils] checkSignatureFromCreator -> DEBU 2726 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:25.030 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2727 validateChaincodeProposalMessage starts for proposal 0xc000122f50, header 0xc00080e140" -peer0.org1.example.com | "2019-07-20 02:40:25.030 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2728 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:25.031 UTC [endorser] preProcess -> DEBU 2729 [businesschannel][fe4517b7] processing txid: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a" -peer0.org1.example.com | "2019-07-20 02:40:25.031 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 272a retrieveTransactionByID() - txId = [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" -peer0.org1.example.com | "2019-07-20 02:40:25.031 UTC [aclmgmt] CheckACL -> DEBU 272b acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-07-20 02:40:25.032 UTC [aclmgmt] CheckACL -> DEBU 272c acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.033 UTC [cauthdsl] func1 -> DEBU 2730 0xc003e0d260 gate 1563590425033105300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2731 0xc003e0d260 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2732 0xc003e0d260 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2733 0xc003e0d260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:25.034 UTC [cauthdsl] func2 -> DEBU 2734 0xc003e0d260 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:25.034 UTC [cauthdsl] func1 -> DEBU 2735 0xc003e0d260 gate 1563590425033105300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2736 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2737 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2738 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [cauthdsl] func1 -> DEBU 2739 0xc003e0dac0 gate 1563590425034719300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [cauthdsl] func2 -> DEBU 273a 0xc003e0dac0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [cauthdsl] func2 -> DEBU 273b 0xc003e0dac0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 273c Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [msp] Validate -> DEBU 273d MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [msp] getCertificationChain -> DEBU 273e MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:25.036 UTC [cauthdsl] func2 -> DEBU 273f 0xc003e0dac0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:25.036 UTC [msp.identity] Verify -> DEBU 2740 Verify: digest = 00000000 1a 72 dc bd 22 9d ce 42 23 dc 31 1e cb ab c5 44 |.r.."..B#.1....D| -peer0.org1.example.com | 00000010 32 91 e1 c3 ca 33 1a 63 3d e3 8d 58 28 7d b5 12 |2....3.c=..X(}..|" -peer0.org1.example.com | "2019-07-20 02:40:25.036 UTC [msp.identity] Verify -> DEBU 2741 Verify: sig = 00000000 30 44 02 20 66 25 b5 25 13 52 60 f0 15 e4 d2 17 |0D. f%.%.R`.....| -peer0.org1.example.com | 00000010 df a6 46 b6 09 c6 0a d5 db c7 c3 3b 8a 81 e0 f4 |..F........;....| -peer0.org1.example.com | 00000020 f4 71 03 49 02 20 5d 06 96 80 7b 06 1c 2e fa 98 |.q.I. ]...{.....| -peer0.org1.example.com | 00000030 9a 11 ca b9 10 35 3b 52 ac 86 12 9a 90 11 fa a7 |.....5;R........| -peer0.org1.example.com | 00000040 62 a9 01 cd 92 74 |b....t|" -peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [cauthdsl] func2 -> DEBU 2742 0xc003e0dac0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [cauthdsl] func1 -> DEBU 2743 0xc003e0dac0 gate 1563590425034719300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2744 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2745 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2746 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2747 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2748 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:25.038 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2749 constructing new tx simulator txid = [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" -peer0.org1.example.com | "2019-07-20 02:40:25.038 UTC [endorser] SimulateProposal -> DEBU 274a [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:25.038 UTC [stateleveldb] GetState -> DEBU 274b GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:25.038 UTC [ccprovider] GetChaincodeData -> DEBU 274c Getting chaincode data for from cache" -peer0.org1.example.com | "2019-07-20 02:40:25.038 UTC [endorser] callChaincode -> INFO 274d [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:25.039 UTC [chaincode] Execute -> DEBU 274e Entry" -peer0.org1.example.com | "2019-07-20 02:40:25.040 UTC [chaincode] handleMessage -> DEBU 274f [fe4517b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:25.040 UTC [chaincode] HandleTransaction -> DEBU 2750 [fe4517b7] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:25.040 UTC [chaincode] HandleGetState -> DEBU 2751 [fe4517b7] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:25.040 UTC [stateleveldb] GetState -> DEBU 2752 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-07-20 02:40:25.040 UTC [chaincode] HandleTransaction -> DEBU 2753 [fe4517b7] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:25.041 UTC [chaincode] handleMessage -> DEBU 2754 [fe4517b7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:25.042 UTC [chaincode] Notify -> DEBU 2755 [fe4517b7] notifying Txid:fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:25.045 UTC [gossip.comm] func1 -> DEBU 2756 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:25.046 UTC [gossip.gossip] handleMessage -> DEBU 2757 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 2758 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 2759 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 275a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.047 UTC [gossip.gossip] handleMessage -> DEBU 275b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:25.047 UTC [chaincode] Execute -> DEBU 275c Exit" -peer0.org1.example.com | "2019-07-20 02:40:25.047 UTC [endorser] callChaincode -> INFO 275d [businesschannel][fe4517b7] Exit chaincode: name:"exp02" (9ms)" -peer0.org1.example.com | "2019-07-20 02:40:25.047 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 275e Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [lockbasedtxmgr] Done -> DEBU 275f Done with transaction simulation / query execution [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" -peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [endorser] SimulateProposal -> DEBU 2760 [businesschannel][fe4517b7] Exit" -peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [endorser] endorseProposal -> DEBU 2761 [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [endorser] endorseProposal -> DEBU 2762 [businesschannel][fe4517b7] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [endorser] EndorseWithPlugin -> DEBU 2763 Entering endorsement for {plugin: escc, channel: businesschannel, tx: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [msp.identity] Sign -> DEBU 2764 Sign: plaintext: 0A2086BA17C4AAFC9D029031ABC2FFF8...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [msp.identity] Sign -> DEBU 2765 Sign: digest: B49E3AD54A8ED894AD092B2726AC8FBC2C4B98C786E0D4605E7E46CC2F7AAA90 " -peer0.org1.example.com | "2019-07-20 02:40:25.049 UTC [endorser] EndorseWithPlugin -> DEBU 2766 Exiting {plugin: escc, channel: businesschannel, tx: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:25.049 UTC [endorser] endorseProposal -> DEBU 2767 [businesschannel][fe4517b7] Exit" -peer0.org1.example.com | "2019-07-20 02:40:25.050 UTC [lockbasedtxmgr] Done -> DEBU 2768 Done with transaction simulation / query execution [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" -peer0.org1.example.com | "2019-07-20 02:40:25.050 UTC [endorser] func1 -> DEBU 2769 Exit: request from 172.18.0.9:58366" -peer0.org1.example.com | "2019-07-20 02:40:25.050 UTC [comm.grpc.server] 1 -> INFO 276a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58366 grpc.code=OK grpc.call_duration=26.8375ms -peer0.org1.example.com | "2019-07-20 02:40:25.051 UTC [gossip.comm] func1 -> DEBU 276b Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:25.051 UTC [gossip.gossip] handleMessage -> DEBU 276c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [msp] DeserializeIdentity -> DEBU 276d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 276e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 276f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2770 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2771 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2772 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2773 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [cauthdsl] func1 -> DEBU 2774 0xc003fcb870 gate 1563590425052956900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2775 0xc003fcb870 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2776 0xc003fcb870 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2777 0xc003fcb870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2778 0xc003fcb870 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func1 -> DEBU 2779 0xc003fcb870 gate 1563590425052956900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func1 -> DEBU 277d 0xc00400e0b0 gate 1563590425053935600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:25.054 UTC [cauthdsl] func2 -> DEBU 277e 0xc00400e0b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:25.054 UTC [cauthdsl] func2 -> DEBU 277f 0xc00400e0b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:25.057 UTC [cauthdsl] func2 -> DEBU 2780 0xc00400e0b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:25.057 UTC [grpc] infof -> DEBU 2781 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:25.057 UTC [msp.identity] Verify -> DEBU 2782 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -peer0.org1.example.com | "2019-07-20 02:40:25.058 UTC [msp.identity] Verify -> DEBU 2783 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" -peer0.org1.example.com | "2019-07-20 02:40:25.059 UTC [cauthdsl] func2 -> DEBU 2784 0xc00400e0b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:25.059 UTC [cauthdsl] func1 -> DEBU 2785 0xc00400e0b0 gate 1563590425053935600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:25.059 UTC [policies] Evaluate -> DEBU 2786 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2787 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2788 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2789 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.060 UTC [msp] DeserializeIdentity -> DEBU 278a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.060 UTC [gossip.gossip] handleMessage -> DEBU 278b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:25.061 UTC [gossip.comm] func1 -> DEBU 278c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:25.061 UTC [gossip.gossip] handleMessage -> DEBU 278d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:25.061 UTC [msp] DeserializeIdentity -> DEBU 278e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.062 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 278f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:25.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2791 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:25.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2792 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2793 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.062 UTC [grpc] infof -> DEBU 2790 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2794 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2795 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.065 UTC [cauthdsl] func1 -> DEBU 2796 0xc003e81ea0 gate 1563590425064986200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2797 0xc003e81ea0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2798 0xc003e81ea0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2799 0xc003e81ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:25.066 UTC [cauthdsl] func2 -> DEBU 279a 0xc003e81ea0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:25.066 UTC [cauthdsl] func1 -> DEBU 279b 0xc003e81ea0 gate 1563590425064986200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.069 UTC [cauthdsl] func1 -> DEBU 279f 0xc0006386e0 gate 1563590425068282800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a0 0xc0006386e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a1 0xc0006386e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a2 0xc0006386e0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:25.070 UTC [msp.identity] Verify -> DEBU 27a3 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -peer0.org1.example.com | "2019-07-20 02:40:25.071 UTC [msp.identity] Verify -> DEBU 27a4 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" -peer0.org1.example.com | "2019-07-20 02:40:25.072 UTC [cauthdsl] func2 -> DEBU 27a5 0xc0006386e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:25.072 UTC [cauthdsl] func1 -> DEBU 27a6 0xc0006386e0 gate 1563590425068282800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:25.072 UTC [policies] Evaluate -> DEBU 27a7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.073 UTC [policies] Evaluate -> DEBU 27a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.074 UTC [policies] Evaluate -> DEBU 27a9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.074 UTC [policies] Evaluate -> DEBU 27aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.075 UTC [msp] DeserializeIdentity -> DEBU 27ab Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.075 UTC [gossip.gossip] handleMessage -> DEBU 27ac Exiting" -peer0.org1.example.com | "2019-07-20 02:40:25.183 UTC [gossip.comm] func1 -> DEBU 27ad Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:25.183 UTC [gossip.gossip] handleMessage -> DEBU 27ae Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27af Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27b0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27b1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.186 UTC [gossip.gossip] handleMessage -> DEBU 27b2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:25.192 UTC [gossip.comm] func1 -> DEBU 27b3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:25.193 UTC [gossip.gossip] handleMessage -> DEBU 27b4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:25.193 UTC [msp] DeserializeIdentity -> DEBU 27b5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27b6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b7 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b8 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func1 -> DEBU 27bc 0xc0007504a0 gate 1563590425196036400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27bd 0xc0007504a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27be 0xc0007504a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27bf 0xc0007504a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27c0 0xc0007504a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func1 -> DEBU 27c1 0xc0007504a0 gate 1563590425196036400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func1 -> DEBU 27c5 0xc000750ce0 gate 1563590425196986500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c6 0xc000750ce0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c7 0xc000750ce0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c8 0xc000750ce0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [msp.identity] Verify -> DEBU 27c9 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| -peer0.org1.example.com | 00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" -peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [msp.identity] Verify -> DEBU 27ca Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| -peer0.org1.example.com | 00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| -peer0.org1.example.com | 00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| -peer0.org1.example.com | 00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| -peer0.org1.example.com | 00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" -peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27cb 0xc000750ce0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func1 -> DEBU 27cc 0xc000750ce0 gate 1563590425196986500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27cf Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.198 UTC [policies] Evaluate -> DEBU 27d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:25.198 UTC [msp] DeserializeIdentity -> DEBU 27d1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:25.198 UTC [gossip.gossip] handleMessage -> DEBU 27d2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:26.844 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27d3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:26.845 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27d4 Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:26.846 UTC [policies] Evaluate -> DEBU 27d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-07-20 02:40:26.846 UTC [policies] Evaluate -> DEBU 27d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:26.847 UTC [policies] Evaluate -> DEBU 27d7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:26.847 UTC [cauthdsl] func1 -> DEBU 27d8 0xc000639f40 gate 1563590426847433500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:26.847 UTC [cauthdsl] func2 -> DEBU 27d9 0xc000639f40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:26.848 UTC [cauthdsl] func2 -> DEBU 27da 0xc000639f40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:26.848 UTC [cauthdsl] func2 -> DEBU 27db 0xc000639f40 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:26.848 UTC [msp.identity] Verify -> DEBU 27dc Verify: digest = 00000000 a0 cc 22 24 a6 fd 41 ca a8 ab e4 54 29 1b 01 20 |.."$..A....T).. | -peer0.org1.example.com | 00000010 a1 aa a0 ab 2c b6 6c 16 c4 77 ff 3d e4 2f 4b 00 |....,.l..w.=./K.|" -peer0.org1.example.com | "2019-07-20 02:40:26.849 UTC [msp.identity] Verify -> DEBU 27dd Verify: sig = 00000000 30 44 02 20 49 e5 40 e2 01 5a 4d b2 0b b1 d9 96 |0D. I.@..ZM.....| -peer0.org1.example.com | 00000010 eb ef c0 39 d8 5f 4a bf 19 95 66 d7 1b 7e 23 e4 |...9._J...f..~#.| -peer0.org1.example.com | 00000020 86 75 35 11 02 20 4a bc 32 6c e8 b3 58 8f 09 cd |.u5.. J.2l..X...| -peer0.org1.example.com | 00000030 cb 09 71 17 d5 13 8e 95 96 9a 8c 1d d1 91 07 86 |..q.............| -peer0.org1.example.com | 00000040 93 23 b1 9d cd 6e |.#...n|" -peer0.org1.example.com | "2019-07-20 02:40:26.849 UTC [cauthdsl] func2 -> DEBU 27de 0xc000639f40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:26.850 UTC [cauthdsl] func1 -> DEBU 27df 0xc000639f40 gate 1563590426847433500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:26.850 UTC [policies] Evaluate -> DEBU 27e0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:40:26.850 UTC [policies] Evaluate -> DEBU 27e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:40:26.851 UTC [policies] Evaluate -> DEBU 27e2 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:40:26.851 UTC [policies] Evaluate -> DEBU 27e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:40:26.852 UTC [blocksProvider] DeliverBlocks -> DEBU 27e4 [businesschannel] Adding payload to local buffer, blockNum = [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.852 UTC [gossip.state] addPayload -> DEBU 27e5 [businesschannel] Adding payload to local buffer, blockNum = [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.853 UTC [gossip.state] addPayload -> DEBU 27e6 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-07-20 02:40:26.853 UTC [blocksProvider] DeliverBlocks -> DEBU 27e8 [businesschannel] Gossiping block [4], peers number [3]" -peer0.org1.example.com | "2019-07-20 02:40:26.853 UTC [gossip.state] deliverPayloads -> DEBU 27e7 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.854 UTC [gossip.state] deliverPayloads -> DEBU 27e9 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-07-20 02:40:26.854 UTC [gossip.privdata] StoreBlock -> INFO 27ea [businesschannel] Received block [4] from buffer" -peer0.org1.example.com | "2019-07-20 02:40:26.857 UTC [gossip.privdata] StoreBlock -> DEBU 27eb [businesschannel] Validating block [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.858 UTC [committer.txvalidator] Validate -> DEBU 27ec [businesschannel] START Block Validation for block [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.858 UTC [committer.txvalidator] Validate -> DEBU 27ed expecting 1 block validation responses" -peer0.org1.example.com | "2019-07-20 02:40:26.858 UTC [committer.txvalidator] validateTx -> DEBU 27ee [businesschannel] validateTx starts for block 0xc0004858c0 env 0xc0028bdc20 txn 0" -peer0.org1.example.com | "2019-07-20 02:40:26.859 UTC [protoutils] ValidateTransaction -> DEBU 27ef ValidateTransactionEnvelope starts for envelope 0xc0028bdc20" -peer0.org1.example.com | "2019-07-20 02:40:26.859 UTC [protoutils] ValidateTransaction -> DEBU 27f0 Header is channel_header:"\010\003\032\014\010\230\376\311\351\005\020\200\222\363\360\002\"\017businesschannel*@3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030ZM\234\320}XST\361\312\344\252\267\352Gt\026d\332\211=k_\312" " -peer0.org1.example.com | "2019-07-20 02:40:26.859 UTC [protoutils] validateChannelHeader -> DEBU 27f1 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:26.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f2 begin" -peer0.org1.example.com | "2019-07-20 02:40:26.860 UTC [msp] GetManagerForChain -> DEBU 27f3 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:26.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f4 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:26.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f5 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:26.861 UTC [msp.identity] Verify -> DEBU 27f6 Verify: digest = 00000000 97 03 8b 29 3b d7 61 87 c0 b1 9e e0 d5 e5 59 bf |...);.a.......Y.| -peer0.org1.example.com | 00000010 90 93 46 3e 70 6d ee 67 fe cd 38 32 fe 22 66 b0 |..F>pm.g..82."f.|" -peer0.org1.example.com | "2019-07-20 02:40:26.862 UTC [msp.identity] Verify -> DEBU 27f7 Verify: sig = 00000000 30 45 02 21 00 a8 a2 93 b5 4c 8c 0c 6b 3e 06 99 |0E.!.....L..k>..| -peer0.org1.example.com | 00000010 37 7b a3 55 44 c0 5e fc a4 0d f6 f7 d1 98 27 42 |7{.UD.^.......'B| -peer0.org1.example.com | 00000020 53 8c 9b 56 17 02 20 42 ff 25 02 18 bc cb 75 a0 |S..V.. B.%....u.| -peer0.org1.example.com | 00000030 32 02 be 09 df a4 6d ad 1b 05 12 07 ec 58 2d e3 |2.....m......X-.| -peer0.org1.example.com | 00000040 95 b0 80 c3 bc 80 99 |.......|" -peer0.org1.example.com | "2019-07-20 02:40:26.862 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f8 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:26.862 UTC [protoutils] validateEndorserTransaction -> DEBU 27f9 validateEndorserTransaction starts for data 0xc003bdf000, header channel_header:"\010\003\032\014\010\230\376\311\351\005\020\200\222\363\360\002\"\017businesschannel*@3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030ZM\234\320}XST\361\312\344\252\267\352Gt\026d\332\211=k_\312" " -peer0.org1.example.com | "2019-07-20 02:40:26.863 UTC [protoutils] validateEndorserTransaction -> DEBU 27fa validateEndorserTransaction info: there are 1 actions" -peer0.org1.example.com | "2019-07-20 02:40:26.863 UTC [protoutils] validateEndorserTransaction -> DEBU 27fb validateEndorserTransaction info: signature header is valid" -peer0.org1.example.com | "2019-07-20 02:40:26.863 UTC [protoutils] ValidateTransaction -> DEBU 27fc ValidateTransactionEnvelope returns err %!s()" -peer0.org1.example.com | "2019-07-20 02:40:26.863 UTC [committer.txvalidator] validateTx -> DEBU 27fd Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:26.863 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 27fe retrieveTransactionByID() - txId = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" -peer0.org1.example.com | "2019-07-20 02:40:26.864 UTC [committer.txvalidator] validateTx -> DEBU 27ff Validating transaction vscc tx validate" -peer0.org1.example.com | "2019-07-20 02:40:26.864 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2800 [businesschannel] VSCCValidateTx starts for bytes 0xc0004e2400" -peer0.org1.example.com | "2019-07-20 02:40:26.864 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2801 constructing new query executor txid = [f398664c-20c2-4d41-9183-fecba403f08a]" -peer0.org1.example.com | "2019-07-20 02:40:26.864 UTC [stateleveldb] GetState -> DEBU 2802 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:26.865 UTC [lockbasedtxmgr] Done -> DEBU 2803 Done with transaction simulation / query execution [f398664c-20c2-4d41-9183-fecba403f08a]" -peer0.org1.example.com | "2019-07-20 02:40:26.865 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2804 Validating Tx 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" -peer0.org1.example.com | "2019-07-20 02:40:26.867 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2805 constructing new query executor txid = [5b17155b-dc37-4fcd-8594-53903d419501]" -peer0.org1.example.com | "2019-07-20 02:40:26.867 UTC [lockbasedtxmgr] Done -> DEBU 2806 Done with transaction simulation / query execution [5b17155b-dc37-4fcd-8594-53903d419501]" -peer0.org1.example.com | "2019-07-20 02:40:26.868 UTC [cauthdsl] func1 -> DEBU 2807 0xc002f478a0 gate 1563590426868447500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:26.869 UTC [cauthdsl] func2 -> DEBU 2808 0xc002f478a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:26.870 UTC [gossip.channel] AddToMsgStore -> DEBU 2809 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-07-20 02:40:26.870 UTC [gossip.pull] Add -> DEBU 280b Added 4, total items: 4" -peer0.org1.example.com | "2019-07-20 02:40:26.870 UTC [cauthdsl] func2 -> DEBU 280a 0xc002f478a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:26.872 UTC [cauthdsl] func2 -> DEBU 280c 0xc002f478a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:26.872 UTC [msp.identity] Verify -> DEBU 280d Verify: digest = 00000000 4c 3f 23 d1 07 f5 94 12 9e ea ab 4c 73 11 1c 5d |L?#........Ls..]| -peer0.org1.example.com | 00000010 8f 88 0d cb 0a f0 f5 1b ee 8d a0 3f 26 d7 12 81 |...........?&...|" -peer0.org1.example.com | "2019-07-20 02:40:26.872 UTC [msp.identity] Verify -> DEBU 280e Verify: sig = 00000000 30 45 02 21 00 a3 09 11 68 b6 4a cf cc b2 e0 16 |0E.!....h.J.....| -peer0.org1.example.com | 00000010 4f a8 02 f4 78 43 81 2a f3 c7 ea 8b 34 ed 79 ca |O...xC.*....4.y.| -peer0.org1.example.com | 00000020 71 f2 e0 ca 94 02 20 3c f5 44 47 2d ce fc 85 9c |q..... <.DG-....| -peer0.org1.example.com | 00000030 56 18 25 fa 92 95 2f e5 42 a2 94 96 01 72 d3 5b |V.%.../.B....r.[| -peer0.org1.example.com | 00000040 67 e8 13 66 51 b3 6b |g..fQ.k|" -peer0.org1.example.com | "2019-07-20 02:40:26.872 UTC [cauthdsl] func2 -> DEBU 280f 0xc002f478a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2810 0xc002f478a0 signed by 1 principal evaluation starts (used [true])" -peer0.org1.example.com | "2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2811 0xc002f478a0 skipping identity 0 because it has already been used" -peer0.org1.example.com | "2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2812 0xc002f478a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:26.873 UTC [cauthdsl] func1 -> DEBU 2813 0xc002f478a0 gate 1563590426868447500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:26.873 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2814 constructing new query executor txid = [b411b15d-1b46-48d3-be14-dbe98f8da76f]" -peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [lockbasedtxmgr] Done -> DEBU 2815 Done with transaction simulation / query execution [b411b15d-1b46-48d3-be14-dbe98f8da76f]" -peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [vscc] Validate -> DEBU 2816 block 4, namespace: exp02, tx 0 validation results is: " -peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2817 Transaction 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 appears to be valid" -peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2818 [businesschannel] VSCCValidateTx completes env bytes 0xc0004e2400" -peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [committer.txvalidator] validateTx -> DEBU 2819 [businesschannel] validateTx completes for block 0xc0004858c0 env 0xc0028bdc20 txn 0" -peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [committer.txvalidator] Validate -> DEBU 281a got result for idx 0, code 0" -peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [committer.txvalidator] Validate -> INFO 281b [businesschannel] Validated block [4] in 18ms" -peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [gossip.privdata] listMissingPrivateData -> DEBU 281c Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [gossip.privdata] StoreBlock -> DEBU 281d [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-07-20 02:40:26.877 UTC [kvledger] CommitWithPvtData -> DEBU 281e [businesschannel] Validating state for block [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.880 UTC [msp] DeserializeIdentity -> DEBU 281f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:26.877 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2820 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-07-20 02:40:26.882 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2821 lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-07-20 02:40:26.883 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2822 Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-07-20 02:40:26.883 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2823 ValidateAndPrepareBatch() for block number = [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.884 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2824 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:40:26.884 UTC [valimpl] preprocessProtoBlock -> DEBU 2825 txType=ENDORSER_TRANSACTION" -peer0.org1.example.com | "2019-07-20 02:40:26.885 UTC [msp] DeserializeIdentity -> DEBU 2826 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:26.886 UTC [stateleveldb] GetState -> DEBU 2827 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-07-20 02:40:26.886 UTC [statebasedval] validateKVRead -> DEBU 2828 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" -peer0.org1.example.com | "2019-07-20 02:40:26.886 UTC [msp] DeserializeIdentity -> DEBU 2829 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:26.886 UTC [msp] DeserializeIdentity -> DEBU 282a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:26.886 UTC [stateleveldb] GetState -> DEBU 282b GetState(). ns=exp02, key=b" -peer0.org1.example.com | "2019-07-20 02:40:26.887 UTC [gossip.comm] Send -> DEBU 282c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:26.887 UTC [statebasedval] validateKVRead -> DEBU 282d Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" -peer0.org1.example.com | "2019-07-20 02:40:26.887 UTC [msp] DeserializeIdentity -> DEBU 282e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:26.887 UTC [stateleveldb] GetState -> DEBU 282f GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:26.890 UTC [statebasedval] validateKVRead -> DEBU 2830 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" -peer0.org1.example.com | "2019-07-20 02:40:26.890 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2831 Block [4] Transaction index [0] TxId [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] marked as valid by state validator" -peer0.org1.example.com | "2019-07-20 02:40:26.890 UTC [valinternal] ApplyWriteSet -> DEBU 2832 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003020a40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003020b00)}" -peer0.org1.example.com | "2019-07-20 02:40:26.890 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2833 validating rwset..." -peer0.org1.example.com | "2019-07-20 02:40:26.891 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2834 postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:40:26.887 UTC [msp] DeserializeIdentity -> DEBU 2835 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:26.893 UTC [gossip.comm] sendToEndpoint -> DEBU 2836 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:26.893 UTC [gossip.comm] sendToEndpoint -> DEBU 2837 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:26.891 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2838 ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-07-20 02:40:26.895 UTC [kvledger] CommitWithPvtData -> DEBU 2839 [businesschannel] Adding CommitHash to the block [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.896 UTC [kvledger] CommitWithPvtData -> DEBU 283a [businesschannel] Committing block [4] to storage" -peer0.org1.example.com | "2019-07-20 02:40:26.896 UTC [ledgerstorage] CommitWithPvtData -> DEBU 283b Writing block [4] to pvt block store" -peer0.org1.example.com | "2019-07-20 02:40:26.903 UTC [pvtdatastorage] Prepare -> DEBU 283c Saved 0 private data write sets for block [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283d Indexing block [blockNum=4, blockHash=[]byte{0xb7, 0x10, 0x53, 0xe8, 0x49, 0x19, 0xe7, 0xf, 0x6f, 0x37, 0xc7, 0x9c, 0x27, 0xaf, 0x1c, 0x10, 0x15, 0x6c, 0xa3, 0xe5, 0x32, 0x4c, 0x6a, 0x2a, 0x4d, 0xc, 0x12, 0xea, 0x60, 0x40, 0x84, 0xb2} txOffsets= -peer0.org1.example.com | txId=3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 locPointer=offset=70, bytesLength=2986 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283e Adding txLoc [fileSuffixNum=0, offset=76095, bytesLength=2986] for tx ID: [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] to txid-index" -peer0.org1.example.com | "2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283f Adding txLoc [fileSuffixNum=0, offset=76095, bytesLength=2986] for tx number:[0] ID: [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] to blockNumTranNum index" -peer0.org1.example.com | "2019-07-20 02:40:26.918 UTC [fsblkstorage] updateCheckpoint -> DEBU 2840 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80053], isChainEmpty=[false], lastBlockNumber=[4]" -peer0.org1.example.com | "2019-07-20 02:40:26.918 UTC [pvtdatastorage] Commit -> DEBU 2841 Committing private data for block [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [pvtdatastorage] Commit -> DEBU 2842 Committed private data for block [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [kvledger] CommitWithPvtData -> DEBU 2843 [businesschannel] Committing block [4] transactions to state database" -peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2844 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2845 Committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2846 Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2847 Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:26.925 UTC [stateleveldb] ApplyUpdates -> DEBU 2848 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -peer0.org1.example.com | "2019-07-20 02:40:26.925 UTC [stateleveldb] ApplyUpdates -> DEBU 2849 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [lockbasedtxmgr] Commit -> DEBU 284a Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 284b Preparing potential purge list working-set for expiringAtBlk [5]" -peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [lockbasedtxmgr] func1 -> DEBU 284c launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [kvledger] CommitWithPvtData -> DEBU 284d [businesschannel] Committing block [4] transactions to history database" -peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [historyleveldb] Commit -> DEBU 284e Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" -peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [leveldbhelper] GetIterator -> DEBU 284f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" -peer0.org1.example.com | "2019-07-20 02:40:26.929 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2850 No expiry entry found for expiringAtBlk [5]" -peer0.org1.example.com | "2019-07-20 02:40:26.930 UTC [historyleveldb] Commit -> DEBU 2851 Channel [businesschannel]: Updates committed to history database for blockNo [4]" -peer0.org1.example.com | "2019-07-20 02:40:26.931 UTC [kvledger] CommitWithPvtData -> INFO 2852 [businesschannel] Committed block [4] with 1 transaction(s) in 54ms (state_validation=18ms block_and_pvtdata_commit=28ms state_commit=4ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" -peer0.org1.example.com | "2019-07-20 02:40:26.931 UTC [msp] GetDefaultSigningIdentity -> DEBU 2853 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:26.931 UTC [msp.identity] Sign -> DEBU 2854 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08051A0C0A0565787030321203312E30 " -peer0.org1.example.com | "2019-07-20 02:40:26.931 UTC [msp.identity] Sign -> DEBU 2855 Sign: digest: 9F8F9BA187E3D7AD25ADAB380D04A58C6823AADBBC650640B818D6D17BCA764A " -peer0.org1.example.com | "2019-07-20 02:40:26.931 UTC [gossip.state] commitBlock -> DEBU 2856 [businesschannel] Committed block [4] with 1 transaction(s)" -peer0.org1.example.com | "2019-07-20 02:40:26.999 UTC [gossip.election] waitForInterrupt -> DEBU 2857 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.000 UTC [gossip.election] IsLeader -> DEBU 2858 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:27.000 UTC [msp] GetDefaultSigningIdentity -> DEBU 2859 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:27.001 UTC [msp.identity] Sign -> DEBU 285a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100A1801 " -peer0.org1.example.com | "2019-07-20 02:40:27.002 UTC [msp.identity] Sign -> DEBU 285b Sign: digest: 3C12A3CEC5CB7423F2D05CC1CB64C08F1FCFA25938DE5509242BEFFCB1D03575 " -peer0.org1.example.com | "2019-07-20 02:40:27.002 UTC [gossip.election] waitForInterrupt -> DEBU 285c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:27.006 UTC [gossip.comm] func1 -> DEBU 285d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.008 UTC [gossip.gossip] handleMessage -> DEBU 285e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.009 UTC [gossip.gossip] handleMessage -> DEBU 285f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2860 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.010 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2861 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:27.010 UTC [msp] DeserializeIdentity -> DEBU 2862 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.011 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2863 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:27.012 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2864 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:27.012 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2865 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:27.012 UTC [policies] Evaluate -> DEBU 2866 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.013 UTC [policies] Evaluate -> DEBU 2867 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:27.013 UTC [policies] Evaluate -> DEBU 2868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.013 UTC [cauthdsl] func1 -> DEBU 2869 0xc0033ef6f0 gate 1563590427013372300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:27.013 UTC [cauthdsl] func2 -> DEBU 286a 0xc0033ef6f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:27.013 UTC [cauthdsl] func2 -> DEBU 286b 0xc0033ef6f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:27.015 UTC [cauthdsl] func2 -> DEBU 286c 0xc0033ef6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:27.015 UTC [cauthdsl] func2 -> DEBU 286d 0xc0033ef6f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:27.016 UTC [cauthdsl] func1 -> DEBU 286f 0xc0033ef6f0 gate 1563590427013372300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2870 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.015 UTC [gossip.comm] func1 -> DEBU 286e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2871 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2873 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [cauthdsl] func1 -> DEBU 2874 0xc00379a040 gate 1563590427018048500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2875 0xc00379a040 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2876 0xc00379a040 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2877 0xc00379a040 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [msp.identity] Verify -> DEBU 2878 Verify: digest = 00000000 34 5c 18 02 4e f3 bc fb b1 a1 29 a4 92 63 c8 d0 |4\..N.....)..c..| -peer0.org1.example.com | 00000010 e0 62 df a1 90 fd 41 a8 c7 18 5c 3e 5a 8d c5 6e |.b....A...\>Z..n|" -peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [msp.identity] Verify -> DEBU 2879 Verify: sig = 00000000 30 44 02 20 23 4e fb c3 d2 e3 f4 cc da f4 e2 3f |0D. #N.........?| -peer0.org1.example.com | 00000010 f6 47 89 14 6b f5 4f 8e cc fb 18 d3 0b 6f c4 c5 |.G..k.O......o..| -peer0.org1.example.com | 00000020 5b e7 ec 8d 02 20 77 89 48 b5 92 de 13 26 6e 5e |[.... w.H....&n^| -peer0.org1.example.com | 00000030 ee ba a7 b1 33 d2 36 d5 4b 6a 61 14 23 18 6e 25 |....3.6.Kja.#.n%| -peer0.org1.example.com | 00000040 99 37 43 15 a0 09 |.7C...|" -peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 287a 0xc00379a040 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [cauthdsl] func1 -> DEBU 287b 0xc00379a040 gate 1563590427018048500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [gossip.discovery] handleAliveMessage -> DEBU 2880 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2881 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2882 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2883 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2884 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2885 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] handleAliveMessage -> DEBU 2886 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2887 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.017 UTC [gossip.gossip] handleMessage -> DEBU 2872 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.gossip] handleMessage -> DEBU 2888 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2889 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 288a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [gossip.comm] Send -> DEBU 288f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2890 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2891 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2892 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2893 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2894 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2895 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.024 UTC [gossip.comm] Send -> DEBU 2897 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:27.024 UTC [msp] DeserializeIdentity -> DEBU 2898 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [msp] DeserializeIdentity -> DEBU 2899 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.comm] Send -> DEBU 289a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 289b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 289c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.024 UTC [gossip.comm] func1 -> DEBU 2896 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.gossip] handleMessage -> DEBU 289d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.gossip] handleMessage -> DEBU 289e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28a0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 28a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 28a2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.024 UTC [gossip.comm] sendToEndpoint -> DEBU 28a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.026 UTC [gossip.comm] sendToEndpoint -> DEBU 28a4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.244 UTC [msp] GetDefaultSigningIdentity -> DEBU 28a5 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151022 " -peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a7 Sign: digest: 819BDFE46E1A1EE055D1141FFDE3D7554AF2B24B2F62ECB0CFC09CC56E885EFA " -peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [msp] GetDefaultSigningIdentity -> DEBU 28a8 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28aa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [gossip.discovery] periodicalSendAlive -> DEBU 28ab Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28ac Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28ad Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.324 UTC [gossip.comm] Send -> DEBU 28ae Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28af Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] Send -> DEBU 28b0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [msp] DeserializeIdentity -> DEBU 28b1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] Send -> DEBU 28b2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.326 UTC [gossip.comm] sendToEndpoint -> DEBU 28b7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.326 UTC [gossip.comm] sendToEndpoint -> DEBU 28b8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.401 UTC [gossip.comm] func1 -> DEBU 28b9 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.401 UTC [gossip.gossip] handleMessage -> DEBU 28ba Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.401 UTC [gossip.gossip] handleMessage -> DEBU 28bb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28bc Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.402 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28bd Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:27.404 UTC [msp.identity] Verify -> DEBU 28be Verify: digest = 00000000 d5 d4 12 8c 11 af 11 2f f8 85 73 66 a1 82 f1 bf |......./..sf....| -peer0.org1.example.com | 00000010 e7 f9 2c af 71 30 28 38 89 7d ec df 43 e1 3e dc |..,.q0(8.}..C.>.|" -peer0.org1.example.com | "2019-07-20 02:40:27.404 UTC [msp.identity] Verify -> DEBU 28bf Verify: sig = 00000000 30 45 02 21 00 a9 07 c0 0f 0b 35 ba 37 ea 31 e4 |0E.!......5.7.1.| -peer0.org1.example.com | 00000010 7a db a5 7b 94 0f 9d 2e 5e be 4d a6 e6 b3 fa b5 |z..{....^.M.....| -peer0.org1.example.com | 00000020 ff dc 30 61 b0 02 20 62 ea df c6 5d 10 5a d8 82 |..0a.. b...].Z..| -peer0.org1.example.com | 00000030 38 99 7a 54 45 3a 92 96 e7 41 e9 cd 67 42 f0 dc |8.zTE:...A..gB..| -peer0.org1.example.com | 00000040 e0 8c 56 a8 ed 17 da |..V....|" -peer0.org1.example.com | "2019-07-20 02:40:27.405 UTC [msp.identity] Verify -> DEBU 28c0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:27.405 UTC [msp.identity] Verify -> DEBU 28c1 Verify: sig = 00000000 30 45 02 21 00 fe b4 65 c5 5b 87 1f 40 11 77 34 |0E.!...e.[..@.w4| -peer0.org1.example.com | 00000010 39 85 1b 3a 7f 13 47 91 b3 31 12 bd 5d 72 cf a7 |9..:..G..1..]r..| -peer0.org1.example.com | 00000020 cf e8 ee 6d b2 02 20 37 91 77 c8 95 05 19 2f 4e |...m.. 7.w..../N| -peer0.org1.example.com | 00000030 68 b2 a6 a1 ea e5 9f f9 d1 e7 7b cd 79 ac 9e 50 |h.........{.y..P| -peer0.org1.example.com | 00000040 c6 0e 51 df e0 84 85 |..Q....|" -peer0.org1.example.com | "2019-07-20 02:40:27.411 UTC [gossip.comm] func1 -> DEBU 28c2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.412 UTC [gossip.comm] func1 -> DEBU 28c4 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.412 UTC [gossip.gossip] handleMessage -> DEBU 28c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.408 UTC [gossip.discovery] handleAliveMessage -> DEBU 28c3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c7 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c8 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:27.419 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c9 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:27.419 UTC [gossip.discovery] learnExistingMembers -> DEBU 28ca Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.419 UTC [gossip.discovery] handleAliveMessage -> DEBU 28cb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.419 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28cc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.419 UTC [gossip.gossip] handleMessage -> DEBU 28cd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.gossip] handleMessage -> DEBU 28ce Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28cf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.gossip] handleMessage -> DEBU 28d1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.429 UTC [msp] DeserializeIdentity -> DEBU 28d4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.430 UTC [msp] DeserializeIdentity -> DEBU 28d5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [msp] DeserializeIdentity -> DEBU 28d6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [gossip.comm] Send -> DEBU 28d7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [msp] DeserializeIdentity -> DEBU 28d8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [gossip.comm] Send -> DEBU 28d9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [gossip.comm] sendToEndpoint -> DEBU 28da Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [gossip.comm] sendToEndpoint -> DEBU 28db Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.432 UTC [gossip.comm] sendToEndpoint -> DEBU 28dc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.432 UTC [gossip.comm] sendToEndpoint -> DEBU 28dd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.551 UTC [endorser] ProcessProposal -> DEBU 28de Entering: request from 172.18.0.9:58370" -peer0.org1.example.com | "2019-07-20 02:40:27.551 UTC [protoutils] ValidateProposalMessage -> DEBU 28df ValidateProposalMessage starts for signed proposal 0xc000596280" -peer0.org1.example.com | "2019-07-20 02:40:27.552 UTC [protoutils] validateChannelHeader -> DEBU 28e0 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:27.552 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e1 begin" -peer0.org1.example.com | "2019-07-20 02:40:27.552 UTC [msp] GetManagerForChain -> DEBU 28e2 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:27.553 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e3 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -peer0.org1.example.com | "2019-07-20 02:40:27.554 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e4 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:27.554 UTC [msp.identity] Verify -> DEBU 28e5 Verify: digest = 00000000 1b 56 5f d0 6c cc 26 db 51 8e f0 35 dc 66 83 a6 |.V_.l.&.Q..5.f..| -peer0.org1.example.com | 00000010 db 62 2e 19 d8 63 bc aa 22 54 24 95 e8 88 90 cb |.b...c.."T$.....|" -peer0.org1.example.com | "2019-07-20 02:40:27.555 UTC [msp.identity] Verify -> DEBU 28e6 Verify: sig = 00000000 30 45 02 21 00 b9 f1 57 3a 84 f5 ca 68 f2 de 84 |0E.!...W:...h...| -peer0.org1.example.com | 00000010 73 4f a7 75 11 6b 5f ef 34 d9 86 b8 6e ea 3c 9d |sO.u.k_.4...n.<.| -peer0.org1.example.com | 00000020 2a 38 5f eb 9d 02 20 3e 21 dc c6 3d 5d 5e b6 38 |*8_... >!..=]^.8| -peer0.org1.example.com | 00000030 fa 0a 44 9e 4d 79 0f a2 46 9f 4b 5d 94 4e f3 cd |..D.My..F.K].N..| -peer0.org1.example.com | 00000040 5b 92 39 ce 65 b4 56 |[.9.e.V|" -peer0.org1.example.com | "2019-07-20 02:40:27.555 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e7 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:27.556 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28e8 validateChaincodeProposalMessage starts for proposal 0xc000406700, header 0xc000596690" -peer0.org1.example.com | "2019-07-20 02:40:27.561 UTC [gossip.comm] func1 -> DEBU 28e9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.565 UTC [gossip.gossip] handleMessage -> DEBU 28ea Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.566 UTC [gossip.gossip] handleMessage -> DEBU 28eb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.567 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28ec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28ed Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:27.568 UTC [msp] DeserializeIdentity -> DEBU 28ee Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.570 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:27.576 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f2 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:27.576 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f3 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:27.575 UTC [gossip.comm] func1 -> DEBU 28f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.576 UTC [gossip.comm] func1 -> DEBU 28f1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.578 UTC [policies] Evaluate -> DEBU 28f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.579 UTC [gossip.gossip] handleMessage -> DEBU 28f5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.582 UTC [policies] Evaluate -> DEBU 28f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:27.565 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28f7 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:27.584 UTC [endorser] preProcess -> DEBU 28f9 [businesschannel][45a41d79] processing txid: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81" -peer0.org1.example.com | "2019-07-20 02:40:27.584 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28fa retrieveTransactionByID() - txId = [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" -peer0.org1.example.com | "2019-07-20 02:40:27.585 UTC [aclmgmt] CheckACL -> DEBU 28fb acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-07-20 02:40:27.584 UTC [policies] Evaluate -> DEBU 28f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.585 UTC [aclmgmt] CheckACL -> DEBU 28fc acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-07-20 02:40:27.587 UTC [policies] Evaluate -> DEBU 28fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.587 UTC [policies] Evaluate -> DEBU 28ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:27.586 UTC [cauthdsl] func1 -> DEBU 28fd 0xc003ab5ab0 gate 1563590427586480900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:27.588 UTC [policies] Evaluate -> DEBU 2900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.589 UTC [cauthdsl] func1 -> DEBU 2902 0xc002858240 gate 1563590427589122400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:27.589 UTC [cauthdsl] func2 -> DEBU 2903 0xc002858240 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:27.588 UTC [cauthdsl] func2 -> DEBU 2901 0xc003ab5ab0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2904 0xc003ab5ab0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2905 0xc003ab5ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2906 0xc003ab5ab0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [cauthdsl] func1 -> DEBU 2907 0xc003ab5ab0 gate 1563590427586480900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [policies] Evaluate -> DEBU 2909 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [policies] Evaluate -> DEBU 290a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [policies] Evaluate -> DEBU 290b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [cauthdsl] func1 -> DEBU 290c 0xc002858a80 gate 1563590427601207400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290d 0xc002858a80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290e 0xc002858a80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290f 0xc002858a80 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [msp.identity] Verify -> DEBU 2910 Verify: digest = 00000000 f9 8d f8 ea 20 e1 4b 0a 33 89 a1 4a e1 65 16 14 |.... .K.3..J.e..| -peer0.org1.example.com | 00000010 88 2f 4e e4 e9 4e 05 f1 4a 0b f0 5e ea 5a cb c5 |./N..N..J..^.Z..|" -peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [msp.identity] Verify -> DEBU 2911 Verify: sig = 00000000 30 45 02 21 00 df e9 99 b7 18 e6 f2 5b 89 92 70 |0E.!........[..p| -peer0.org1.example.com | 00000010 3a 70 57 71 5c 8f c3 19 89 a0 3b 81 8b 21 bc 6d |:pWq\.....;..!.m| -peer0.org1.example.com | 00000020 b4 24 3a 2a 10 02 20 53 cb f9 11 e8 15 28 46 8f |.$:*.. S.....(F.| -peer0.org1.example.com | 00000030 e5 66 9f cf 35 99 71 f1 2a 66 f8 0c aa cd c3 35 |.f..5.q.*f.....5| -peer0.org1.example.com | 00000040 cf 6b 12 ea 09 cb eb |.k.....|" -peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 2912 0xc002858a80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:27.602 UTC [cauthdsl] func1 -> DEBU 2913 0xc002858a80 gate 1563590427601207400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:27.602 UTC [policies] Evaluate -> DEBU 2914 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.602 UTC [policies] Evaluate -> DEBU 2915 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.603 UTC [policies] Evaluate -> DEBU 2916 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.603 UTC [policies] Evaluate -> DEBU 2917 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.603 UTC [gossip.discovery] handleAliveMessage -> DEBU 2918 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.603 UTC [gossip.discovery] learnExistingMembers -> DEBU 2919 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291a updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291b Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:27.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 291d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.605 UTC [gossip.discovery] handleAliveMessage -> DEBU 291e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.605 UTC [gossip.discovery] handleMsgFromComm -> DEBU 291f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2908 0xc002858240 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:27.606 UTC [cauthdsl] func2 -> DEBU 2920 0xc002858240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:27.606 UTC [cauthdsl] func2 -> DEBU 2922 0xc002858240 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [cauthdsl] func1 -> DEBU 2924 0xc002858240 gate 1563590427589122400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2925 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2926 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2927 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [cauthdsl] func1 -> DEBU 2928 0xc00295c3f0 gate 1563590427607262800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [cauthdsl] func2 -> DEBU 2929 0xc00295c3f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [cauthdsl] func2 -> DEBU 292a 0xc00295c3f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:27.606 UTC [gossip.gossip] handleMessage -> DEBU 2923 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.606 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2921 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.610 UTC [cauthdsl] func2 -> DEBU 292b 0xc00295c3f0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:27.611 UTC [msp.identity] Verify -> DEBU 292e Verify: digest = 00000000 1b 56 5f d0 6c cc 26 db 51 8e f0 35 dc 66 83 a6 |.V_.l.&.Q..5.f..| -peer0.org1.example.com | 00000010 db 62 2e 19 d8 63 bc aa 22 54 24 95 e8 88 90 cb |.b...c.."T$.....|" -peer0.org1.example.com | "2019-07-20 02:40:27.611 UTC [msp.identity] Verify -> DEBU 292f Verify: sig = 00000000 30 45 02 21 00 b9 f1 57 3a 84 f5 ca 68 f2 de 84 |0E.!...W:...h...| -peer0.org1.example.com | 00000010 73 4f a7 75 11 6b 5f ef 34 d9 86 b8 6e ea 3c 9d |sO.u.k_.4...n.<.| -peer0.org1.example.com | 00000020 2a 38 5f eb 9d 02 20 3e 21 dc c6 3d 5d 5e b6 38 |*8_... >!..=]^.8| -peer0.org1.example.com | 00000030 fa 0a 44 9e 4d 79 0f a2 46 9f 4b 5d 94 4e f3 cd |..D.My..F.K].N..| -peer0.org1.example.com | 00000040 5b 92 39 ce 65 b4 56 |[.9.e.V|" -peer0.org1.example.com | "2019-07-20 02:40:27.611 UTC [cauthdsl] func2 -> DEBU 2930 0xc00295c3f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:27.610 UTC [gossip.gossip] handleMessage -> DEBU 292c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.610 UTC [gossip.discovery] handleMsgFromComm -> DEBU 292d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.612 UTC [cauthdsl] func1 -> DEBU 2931 0xc00295c3f0 gate 1563590427607262800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:27.612 UTC [policies] Evaluate -> DEBU 2934 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2935 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2936 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2937 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.612 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2932 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2939 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.613 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2938 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:27.616 UTC [msp] DeserializeIdentity -> DEBU 293a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.617 UTC [msp] DeserializeIdentity -> DEBU 293b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.617 UTC [msp] DeserializeIdentity -> DEBU 293c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.617 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2940 constructing new tx simulator txid = [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" -peer0.org1.example.com | "2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 2941 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.619 UTC [gossip.comm] Send -> DEBU 2942 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:27.619 UTC [msp] DeserializeIdentity -> DEBU 2943 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.619 UTC [endorser] SimulateProposal -> DEBU 2944 [businesschannel][45a41d79] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:27.620 UTC [gossip.comm] Send -> DEBU 2945 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:27.620 UTC [stateleveldb] GetState -> DEBU 2946 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:27.620 UTC [gossip.comm] sendToEndpoint -> DEBU 2947 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.621 UTC [gossip.comm] sendToEndpoint -> DEBU 2949 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.620 UTC [gossip.comm] sendToEndpoint -> DEBU 2948 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.621 UTC [gossip.comm] sendToEndpoint -> DEBU 294a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.612 UTC [gossip.gossip] handleMessage -> DEBU 2933 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.623 UTC [ccprovider] GetChaincodeData -> DEBU 294b Getting chaincode data for from cache" -peer0.org1.example.com | "2019-07-20 02:40:27.623 UTC [endorser] callChaincode -> INFO 294c [businesschannel][45a41d79] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:27.626 UTC [chaincode] Execute -> DEBU 294d Entry" -peer0.org1.example.com | "2019-07-20 02:40:27.630 UTC [chaincode] handleMessage -> DEBU 294e [45a41d79] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:27.631 UTC [chaincode] HandleTransaction -> DEBU 294f [45a41d79] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:27.631 UTC [chaincode] HandleGetState -> DEBU 2950 [45a41d79] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:27.632 UTC [stateleveldb] GetState -> DEBU 2951 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-07-20 02:40:27.632 UTC [chaincode] HandleTransaction -> DEBU 2952 [45a41d79] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [chaincode] handleMessage -> DEBU 2953 [45a41d79] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [chaincode] Notify -> DEBU 2954 [45a41d79] notifying Txid:45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [chaincode] Execute -> DEBU 2955 Exit" -peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [endorser] callChaincode -> INFO 2956 [businesschannel][45a41d79] Exit chaincode: name:"exp02" (9ms)" -peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2957 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [lockbasedtxmgr] Done -> DEBU 2958 Done with transaction simulation / query execution [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" -peer0.org1.example.com | "2019-07-20 02:40:27.635 UTC [endorser] SimulateProposal -> DEBU 2959 [businesschannel][45a41d79] Exit" -peer0.org1.example.com | "2019-07-20 02:40:27.635 UTC [endorser] endorseProposal -> DEBU 295a [businesschannel][45a41d79] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:27.635 UTC [endorser] endorseProposal -> DEBU 295b [businesschannel][45a41d79] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-07-20 02:40:27.635 UTC [endorser] EndorseWithPlugin -> DEBU 295c Entering endorsement for {plugin: escc, channel: businesschannel, tx: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:27.635 UTC [msp.identity] Sign -> DEBU 295d Sign: plaintext: 0A206ADFF19A06A8EA4B5E0424063B24...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:27.636 UTC [msp.identity] Sign -> DEBU 295e Sign: digest: 8F0962501C35270F72ECE8639758C3F453AD626CECD34429CC2E661F87E2C9DE " -peer0.org1.example.com | "2019-07-20 02:40:27.636 UTC [endorser] EndorseWithPlugin -> DEBU 295f Exiting {plugin: escc, channel: businesschannel, tx: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:27.636 UTC [endorser] endorseProposal -> DEBU 2960 [businesschannel][45a41d79] Exit" -peer0.org1.example.com | "2019-07-20 02:40:27.636 UTC [lockbasedtxmgr] Done -> DEBU 2961 Done with transaction simulation / query execution [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" -peer0.org1.example.com | "2019-07-20 02:40:27.637 UTC [endorser] func1 -> DEBU 2962 Exit: request from 172.18.0.9:58370" -peer0.org1.example.com | "2019-07-20 02:40:27.637 UTC [comm.grpc.server] 1 -> INFO 2963 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58370 grpc.code=OK grpc.call_duration=86.3296ms -peer0.org1.example.com | "2019-07-20 02:40:27.644 UTC [grpc] infof -> DEBU 2964 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:27.647 UTC [grpc] infof -> DEBU 2965 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [endorser] ProcessProposal -> DEBU 2966 Entering: request from 172.18.0.9:58374" -peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [protoutils] ValidateProposalMessage -> DEBU 2967 ValidateProposalMessage starts for signed proposal 0xc0005976d0" -peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [protoutils] validateChannelHeader -> DEBU 2968 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [protoutils] checkSignatureFromCreator -> DEBU 2969 begin" -peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [msp] GetManagerForChain -> DEBU 296a Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [protoutils] checkSignatureFromCreator -> DEBU 296b creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -peer0.org1.example.com | "2019-07-20 02:40:27.840 UTC [protoutils] checkSignatureFromCreator -> DEBU 296c creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:27.840 UTC [msp.identity] Verify -> DEBU 296d Verify: digest = 00000000 c3 11 3a ce 05 0b b6 c2 ee e7 c5 b9 8c 52 af 4f |..:..........R.O| -peer0.org1.example.com | 00000010 01 b8 4d b3 96 45 0d 73 57 33 f8 30 e7 f2 d8 85 |..M..E.sW3.0....|" -peer0.org1.example.com | "2019-07-20 02:40:27.840 UTC [msp.identity] Verify -> DEBU 296e Verify: sig = 00000000 30 44 02 20 55 6e 07 e3 f7 18 b8 fa 3e f3 8c 86 |0D. Un......>...| -peer0.org1.example.com | 00000010 20 be 8a 77 f9 6e 40 7a eb 3b c0 dc 85 c4 58 e1 | ..w.n@z.;....X.| -peer0.org1.example.com | 00000020 d3 ba f8 0c 02 20 43 86 89 2d 35 a2 bc 95 c0 b8 |..... C..-5.....| -peer0.org1.example.com | 00000030 dc 39 22 70 33 9a 19 9a 51 40 70 61 c8 73 dc 3f |.9"p3...Q@pa.s.?| -peer0.org1.example.com | 00000040 ba 33 01 2b 88 5d |.3.+.]|" -peer0.org1.example.com | "2019-07-20 02:40:27.840 UTC [protoutils] checkSignatureFromCreator -> DEBU 296f exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:27.841 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2970 validateChaincodeProposalMessage starts for proposal 0xc000406fc0, header 0xc000597ae0" -peer0.org1.example.com | "2019-07-20 02:40:27.841 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2971 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:27.841 UTC [endorser] preProcess -> DEBU 2972 [businesschannel][cf18601c] processing txid: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919" -peer0.org1.example.com | "2019-07-20 02:40:27.842 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2973 retrieveTransactionByID() - txId = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" -peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [aclmgmt] CheckACL -> DEBU 2974 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [aclmgmt] CheckACL -> DEBU 2975 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2976 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2977 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2978 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [cauthdsl] func1 -> DEBU 2979 0xc003493650 gate 1563590427843609300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [cauthdsl] func2 -> DEBU 297a 0xc003493650 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297b 0xc003493650 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297c 0xc003493650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297d 0xc003493650 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [cauthdsl] func1 -> DEBU 297e 0xc003493650 gate 1563590427843609300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 297f Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 2980 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 2981 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [cauthdsl] func1 -> DEBU 2982 0xc003493e90 gate 1563590427844684100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2983 0xc003493e90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2984 0xc003493e90 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2985 0xc003493e90 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [msp.identity] Verify -> DEBU 2986 Verify: digest = 00000000 c3 11 3a ce 05 0b b6 c2 ee e7 c5 b9 8c 52 af 4f |..:..........R.O| -peer0.org1.example.com | 00000010 01 b8 4d b3 96 45 0d 73 57 33 f8 30 e7 f2 d8 85 |..M..E.sW3.0....|" -peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [msp.identity] Verify -> DEBU 2987 Verify: sig = 00000000 30 44 02 20 55 6e 07 e3 f7 18 b8 fa 3e f3 8c 86 |0D. Un......>...| -peer0.org1.example.com | 00000010 20 be 8a 77 f9 6e 40 7a eb 3b c0 dc 85 c4 58 e1 | ..w.n@z.;....X.| -peer0.org1.example.com | 00000020 d3 ba f8 0c 02 20 43 86 89 2d 35 a2 bc 95 c0 b8 |..... C..-5.....| -peer0.org1.example.com | 00000030 dc 39 22 70 33 9a 19 9a 51 40 70 61 c8 73 dc 3f |.9"p3...Q@pa.s.?| -peer0.org1.example.com | 00000040 ba 33 01 2b 88 5d |.3.+.]|" -peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2988 0xc003493e90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:27.846 UTC [cauthdsl] func1 -> DEBU 2989 0xc003493e90 gate 1563590427844684100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298a Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298c Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [policies] Evaluate -> DEBU 298d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 298e constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 298f constructing new tx simulator txid = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" -peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [endorser] SimulateProposal -> DEBU 2990 [businesschannel][cf18601c] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [stateleveldb] GetState -> DEBU 2991 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [ccprovider] GetChaincodeData -> DEBU 2992 Getting chaincode data for from cache" -peer0.org1.example.com | "2019-07-20 02:40:27.848 UTC [endorser] callChaincode -> INFO 2993 [businesschannel][cf18601c] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:27.848 UTC [chaincode] Execute -> DEBU 2994 Entry" -peer0.org1.example.com | "2019-07-20 02:40:27.850 UTC [chaincode] handleMessage -> DEBU 2995 [cf18601c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:27.850 UTC [chaincode] HandleTransaction -> DEBU 2996 [cf18601c] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:27.850 UTC [chaincode] HandleGetState -> DEBU 2997 [cf18601c] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:27.850 UTC [stateleveldb] GetState -> DEBU 2998 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-07-20 02:40:27.850 UTC [chaincode] HandleTransaction -> DEBU 2999 [cf18601c] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:27.851 UTC [chaincode] handleMessage -> DEBU 299a [cf18601c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:27.851 UTC [chaincode] HandleTransaction -> DEBU 299b [cf18601c] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:27.852 UTC [chaincode] HandleGetState -> DEBU 299c [cf18601c] getting state for chaincode exp02, key b, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:27.852 UTC [stateleveldb] GetState -> DEBU 299d GetState(). ns=exp02, key=b" -peer0.org1.example.com | "2019-07-20 02:40:27.852 UTC [chaincode] HandleTransaction -> DEBU 299e [cf18601c] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:27.853 UTC [chaincode] handleMessage -> DEBU 299f [cf18601c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:27.853 UTC [chaincode] HandleTransaction -> DEBU 29a0 [cf18601c] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:27.854 UTC [chaincode] HandleTransaction -> DEBU 29a1 [cf18601c] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:27.855 UTC [chaincode] handleMessage -> DEBU 29a2 [cf18601c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:27.855 UTC [chaincode] HandleTransaction -> DEBU 29a3 [cf18601c] handling PUT_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:27.856 UTC [chaincode] HandleTransaction -> DEBU 29a4 [cf18601c] Completed PUT_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:27.858 UTC [chaincode] handleMessage -> DEBU 29a5 [cf18601c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:27.858 UTC [chaincode] Notify -> DEBU 29a6 [cf18601c] notifying Txid:cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:27.858 UTC [chaincode] Execute -> DEBU 29a7 Exit" -peer0.org1.example.com | "2019-07-20 02:40:27.859 UTC [endorser] callChaincode -> INFO 29a8 [businesschannel][cf18601c] Exit chaincode: name:"exp02" (11ms)" -peer0.org1.example.com | "2019-07-20 02:40:27.859 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 29a9 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:27.861 UTC [lockbasedtxmgr] Done -> DEBU 29aa Done with transaction simulation / query execution [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" -peer0.org1.example.com | "2019-07-20 02:40:27.861 UTC [endorser] SimulateProposal -> DEBU 29ab [businesschannel][cf18601c] Exit" -peer0.org1.example.com | "2019-07-20 02:40:27.861 UTC [endorser] endorseProposal -> DEBU 29ac [businesschannel][cf18601c] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:27.862 UTC [endorser] endorseProposal -> DEBU 29ad [businesschannel][cf18601c] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-07-20 02:40:27.862 UTC [endorser] EndorseWithPlugin -> DEBU 29ae Entering endorsement for {plugin: escc, channel: businesschannel, tx: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:27.862 UTC [msp.identity] Sign -> DEBU 29af Sign: plaintext: 0A208F6E376BDBC55C3AA7239AA1D8FF...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:27.862 UTC [msp.identity] Sign -> DEBU 29b0 Sign: digest: C6E111A0177E2C9B0B87802FB0AF0B6B419E7EC6C5CFFDAFEC9A9218AC29ED00 " -peer0.org1.example.com | "2019-07-20 02:40:27.863 UTC [endorser] EndorseWithPlugin -> DEBU 29b1 Exiting {plugin: escc, channel: businesschannel, tx: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:27.863 UTC [endorser] endorseProposal -> DEBU 29b2 [businesschannel][cf18601c] Exit" -peer0.org1.example.com | "2019-07-20 02:40:27.863 UTC [lockbasedtxmgr] Done -> DEBU 29b3 Done with transaction simulation / query execution [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" -peer0.org1.example.com | "2019-07-20 02:40:27.863 UTC [endorser] func1 -> DEBU 29b4 Exit: request from 172.18.0.9:58374" -peer0.org1.example.com | "2019-07-20 02:40:27.863 UTC [comm.grpc.server] 1 -> INFO 29b5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58374 grpc.code=OK grpc.call_duration=24.3051ms -peer0.org1.example.com | "2019-07-20 02:40:27.897 UTC [grpc] infof -> DEBU 29b6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:27.898 UTC [grpc] infof -> DEBU 29b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:27.932 UTC [gossip.comm] func1 -> DEBU 29b8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.933 UTC [gossip.gossip] handleMessage -> DEBU 29b9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.933 UTC [gossip.gossip] handleMessage -> DEBU 29ba Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.934 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29bb Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29bc Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:27.935 UTC [msp] DeserializeIdentity -> DEBU 29bd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.936 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:27.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29bf Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func1 -> DEBU 29c4 0xc0037d00b0 gate 1563590427937259900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c5 0xc0037d00b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c6 0xc0037d00b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c7 0xc0037d00b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c8 0xc0037d00b0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func1 -> DEBU 29c9 0xc0037d00b0 gate 1563590427937259900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [cauthdsl] func1 -> DEBU 29cd 0xc0037d08f0 gate 1563590427939010500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29ce 0xc0037d08f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29cf 0xc0037d08f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29d0 0xc0037d08f0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [msp.identity] Verify -> DEBU 29d1 Verify: digest = 00000000 44 7e e5 24 1a e0 8b 4c c7 85 ea 43 02 f3 73 0d |D~.$...L...C..s.| -peer0.org1.example.com | 00000010 ee 85 7e 9c cb af b6 05 57 83 87 05 7e 4e 25 d8 |..~.....W...~N%.|" -peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [msp.identity] Verify -> DEBU 29d2 Verify: sig = 00000000 30 44 02 20 2b bf 05 66 a2 a0 25 38 81 fc 86 73 |0D. +..f..%8...s| -peer0.org1.example.com | 00000010 dc 3f 28 4b b8 b5 54 d8 cc e7 30 66 79 20 f8 b0 |.?(K..T...0fy ..| -peer0.org1.example.com | 00000020 6e b4 c1 23 02 20 50 86 69 b7 c5 1f 6d 81 53 81 |n..#. P.i...m.S.| -peer0.org1.example.com | 00000030 3c 67 7b 04 48 0a f7 1a 05 79 1c 48 a9 70 09 49 | DEBU 29d3 0xc0037d08f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [cauthdsl] func1 -> DEBU 29d4 0xc0037d08f0 gate 1563590427939010500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d7 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 29d9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 29da Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29db updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29dc Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29dd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29de Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 29df Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.951 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29e0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.951 UTC [gossip.discovery] sendMemResponse -> DEBU 29e1 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:27.951 UTC [msp] DeserializeIdentity -> DEBU 29e2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.952 UTC [msp] DeserializeIdentity -> DEBU 29e3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.952 UTC [msp] DeserializeIdentity -> DEBU 29e4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.952 UTC [gossip.comm] Send -> DEBU 29e5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:27.952 UTC [gossip.comm] sendToEndpoint -> DEBU 29e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.953 UTC [gossip.comm] sendToEndpoint -> DEBU 29e7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:27.953 UTC [gossip.discovery] sendMemResponse -> DEBU 29e8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020&" signature:"0E\002!\000\251\007\300\017\0135\2727\3521\344z\333\245{\224\017\235.^\276M\246\346\263\372\265\377\3340a\260\002 b\352\337\306]\020Z\330\2028\231zTE:\222\226\347A\351\315gB\360\334\340\214V\250\355\027\332" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:27.964 UTC [gossip.comm] func1 -> DEBU 29e9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.964 UTC [gossip.gossip] handleMessage -> DEBU 29ea Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.965 UTC [gossip.pull] HandleMessage -> DEBU 29eb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:27.966 UTC [msp] DeserializeIdentity -> DEBU 29ec Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.966 UTC [msp] DeserializeIdentity -> DEBU 29ed Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.967 UTC [msp] DeserializeIdentity -> DEBU 29ee Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.967 UTC [msp] DeserializeIdentity -> DEBU 29ef Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.968 UTC [msp] DeserializeIdentity -> DEBU 29f0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.968 UTC [msp] DeserializeIdentity -> DEBU 29f1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:27.973 UTC [gossip.pull] SendDigest -> DEBU 29f2 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:27.973 UTC [gossip.gossip] handleMessage -> DEBU 29f3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [endorser] ProcessProposal -> DEBU 29f4 Entering: request from 172.18.0.9:58380" -peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [protoutils] ValidateProposalMessage -> DEBU 29f5 ValidateProposalMessage starts for signed proposal 0xc00040e8c0" -peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [protoutils] validateChannelHeader -> DEBU 29f6 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29f7 begin" -peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [msp] GetManagerForChain -> DEBU 29f8 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29f9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29fa creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [msp.identity] Verify -> DEBU 29fb Verify: digest = 00000000 f7 63 6d 9c e3 0f 6f 49 34 31 c5 75 f8 cc 73 59 |.cm...oI41.u..sY| -peer0.org1.example.com | 00000010 3e 44 6c 0a ca 0b fa 16 82 5a 9e 34 f7 de cc 56 |>Dl......Z.4...V|" -peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [msp.identity] Verify -> DEBU 29fc Verify: sig = 00000000 30 44 02 20 76 ce ba 3c 46 66 e0 65 1c c7 ae 70 |0D. v.. DEBU 29fd exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29fe validateChaincodeProposalMessage starts for proposal 0xc00015e460, header 0xc00040ed20" -peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29ff validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [endorser] preProcess -> DEBU 2a00 [businesschannel][cc800e57] processing txid: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0" -peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2a01 retrieveTransactionByID() - txId = [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" -peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [aclmgmt] CheckACL -> DEBU 2a02 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [aclmgmt] CheckACL -> DEBU 2a03 acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [cauthdsl] func1 -> DEBU 2a07 0xc003dfe5b0 gate 1563590428112919900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [cauthdsl] func2 -> DEBU 2a08 0xc003dfe5b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [cauthdsl] func2 -> DEBU 2a09 0xc003dfe5b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [cauthdsl] func2 -> DEBU 2a0a 0xc003dfe5b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [msp.identity] Verify -> DEBU 2a0b Verify: digest = 00000000 f7 63 6d 9c e3 0f 6f 49 34 31 c5 75 f8 cc 73 59 |.cm...oI41.u..sY| -peer0.org1.example.com | 00000010 3e 44 6c 0a ca 0b fa 16 82 5a 9e 34 f7 de cc 56 |>Dl......Z.4...V|" -peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [msp.identity] Verify -> DEBU 2a0c Verify: sig = 00000000 30 44 02 20 76 ce ba 3c 46 66 e0 65 1c c7 ae 70 |0D. v.. DEBU 2a0d 0xc003dfe5b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [cauthdsl] func1 -> DEBU 2a0e 0xc003dfe5b0 gate 1563590428112919900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a0f Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a11 Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a12 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2a13 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2a14 constructing new tx simulator txid = [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" -peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [endorser] SimulateProposal -> DEBU 2a15 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [stateleveldb] GetState -> DEBU 2a16 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [ccprovider] GetChaincodeData -> DEBU 2a17 Getting chaincode data for from cache" -peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [endorser] callChaincode -> INFO 2a18 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [chaincode] Execute -> DEBU 2a19 Entry" -peer0.org1.example.com | "2019-07-20 02:40:28.115 UTC [chaincode] handleMessage -> DEBU 2a1a [cc800e57] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:28.115 UTC [chaincode] HandleTransaction -> DEBU 2a1b [cc800e57] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:28.115 UTC [chaincode] HandleGetState -> DEBU 2a1c [cc800e57] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [stateleveldb] GetState -> DEBU 2a1d GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [chaincode] HandleTransaction -> DEBU 2a1e [cc800e57] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [chaincode] handleMessage -> DEBU 2a1f [cc800e57] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [chaincode] Notify -> DEBU 2a20 [cc800e57] notifying Txid:cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [chaincode] Execute -> DEBU 2a21 Exit" -peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [endorser] callChaincode -> INFO 2a22 [businesschannel][cc800e57] Exit chaincode: name:"exp02" (2ms)" -peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2a23 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [lockbasedtxmgr] Done -> DEBU 2a24 Done with transaction simulation / query execution [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" -peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [endorser] SimulateProposal -> DEBU 2a25 [businesschannel][cc800e57] Exit" -peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [endorser] endorseProposal -> DEBU 2a26 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [endorser] endorseProposal -> DEBU 2a27 [businesschannel][cc800e57] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [endorser] EndorseWithPlugin -> DEBU 2a28 Entering endorsement for {plugin: escc, channel: businesschannel, tx: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [msp.identity] Sign -> DEBU 2a29 Sign: plaintext: 0A203057560B0313BBF17756CE01CD7D...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [msp.identity] Sign -> DEBU 2a2a Sign: digest: 6133F8EA9F116FF8A82DC6B0FBFF17BB6F8709BD253A81A79A71CB31DE79DE43 " -peer0.org1.example.com | "2019-07-20 02:40:28.118 UTC [endorser] EndorseWithPlugin -> DEBU 2a2b Exiting {plugin: escc, channel: businesschannel, tx: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:28.118 UTC [endorser] endorseProposal -> DEBU 2a2c [businesschannel][cc800e57] Exit" -peer0.org1.example.com | "2019-07-20 02:40:28.118 UTC [lockbasedtxmgr] Done -> DEBU 2a2d Done with transaction simulation / query execution [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" -peer0.org1.example.com | "2019-07-20 02:40:28.118 UTC [endorser] func1 -> DEBU 2a2e Exit: request from 172.18.0.9:58380" -peer0.org1.example.com | "2019-07-20 02:40:28.118 UTC [comm.grpc.server] 1 -> INFO 2a2f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58380 grpc.code=OK grpc.call_duration=7.2891ms -peer0.org1.example.com | "2019-07-20 02:40:28.121 UTC [grpc] infof -> DEBU 2a30 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:28.121 UTC [grpc] infof -> DEBU 2a31 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:28.256 UTC [gossip.pull] Hello -> DEBU 2a32 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:28.257 UTC [gossip.comm] Send -> DEBU 2a33 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:28.259 UTC [gossip.pull] Hello -> DEBU 2a34 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:28.259 UTC [gossip.comm] Send -> DEBU 2a35 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:28.260 UTC [gossip.pull] Hello -> DEBU 2a36 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:28.260 UTC [gossip.comm] Send -> DEBU 2a37 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:28.261 UTC [gossip.comm] sendToEndpoint -> DEBU 2a38 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.261 UTC [gossip.comm] sendToEndpoint -> DEBU 2a39 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.263 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.264 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.264 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.265 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.264 UTC [gossip.comm] func1 -> DEBU 2a3c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.265 UTC [gossip.gossip] handleMessage -> DEBU 2a3f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.266 UTC [gossip.pull] HandleMessage -> DEBU 2a40 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.266 UTC [gossip.gossip] handleMessage -> DEBU 2a41 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.266 UTC [gossip.comm] func1 -> DEBU 2a42 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.267 UTC [gossip.gossip] handleMessage -> DEBU 2a43 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.267 UTC [gossip.pull] HandleMessage -> DEBU 2a44 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.267 UTC [gossip.comm] func1 -> DEBU 2a45 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.267 UTC [gossip.gossip] handleMessage -> DEBU 2a46 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.268 UTC [gossip.gossip] handleMessage -> DEBU 2a47 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.268 UTC [gossip.pull] HandleMessage -> DEBU 2a48 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.268 UTC [gossip.gossip] handleMessage -> DEBU 2a49 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.297 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a4a Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:28.298 UTC [msp.identity] Sign -> DEBU 2a4b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151023 " -peer0.org1.example.com | "2019-07-20 02:40:28.298 UTC [msp.identity] Sign -> DEBU 2a4c Sign: digest: DD566ACBCC6F0F4BF5C93A6D9969AB3470634D6F878390F8EAAA43682E300636 " -peer0.org1.example.com | "2019-07-20 02:40:28.299 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a4d Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:28.299 UTC [msp.identity] Sign -> DEBU 2a4e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:28.300 UTC [msp.identity] Sign -> DEBU 2a4f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:28.300 UTC [gossip.comm] Send -> DEBU 2a50 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:28.301 UTC [msp] DeserializeIdentity -> DEBU 2a51 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.301 UTC [gossip.comm] Send -> DEBU 2a52 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:28.302 UTC [gossip.comm] sendToEndpoint -> DEBU 2a53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.302 UTC [gossip.comm] sendToEndpoint -> DEBU 2a54 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.302 UTC [msp] DeserializeIdentity -> DEBU 2a55 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.302 UTC [gossip.comm] Send -> DEBU 2a56 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 2a57 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 2a58 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.305 UTC [gossip.comm] func1 -> DEBU 2a59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.305 UTC [gossip.gossip] handleMessage -> DEBU 2a5a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.305 UTC [gossip.gossip] handleMessage -> DEBU 2a5b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.305 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.306 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a5e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:28.311 UTC [gossip.comm] func1 -> DEBU 2a60 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.311 UTC [gossip.gossip] handleMessage -> DEBU 2a61 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.311 UTC [gossip.comm] func1 -> DEBU 2a62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.311 UTC [msp.identity] Verify -> DEBU 2a63 Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| -peer0.org1.example.com | 00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" -peer0.org1.example.com | "2019-07-20 02:40:28.312 UTC [msp.identity] Verify -> DEBU 2a64 Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| -peer0.org1.example.com | 00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| -peer0.org1.example.com | 00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| -peer0.org1.example.com | 00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| -peer0.org1.example.com | 00000040 54 e8 23 31 4c ad 20 |T.#1L. |" -peer0.org1.example.com | "2019-07-20 02:40:28.312 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a65 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.312 UTC [gossip.discovery] isSentByMe -> DEBU 2a66 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a67 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a68 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a69 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.314 UTC [gossip.gossip] handleMessage -> DEBU 2a6a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.314 UTC [gossip.gossip] handleMessage -> DEBU 2a6c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a6b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:28.314 UTC [msp.identity] Verify -> DEBU 2a6d Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| -peer0.org1.example.com | 00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" -peer0.org1.example.com | "2019-07-20 02:40:28.315 UTC [msp.identity] Verify -> DEBU 2a6e Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| -peer0.org1.example.com | 00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| -peer0.org1.example.com | 00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| -peer0.org1.example.com | 00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| -peer0.org1.example.com | 00000040 54 e8 23 31 4c ad 20 |T.#1L. |" -peer0.org1.example.com | "2019-07-20 02:40:28.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a6f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.316 UTC [gossip.discovery] isSentByMe -> DEBU 2a70 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a71 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a72 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:28.316 UTC [msp] DeserializeIdentity -> DEBU 2a73 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a74 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a75 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a76 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a77 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a78 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func1 -> DEBU 2a7a 0xc0004eff30 gate 1563590428318061300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7b 0xc0004eff30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7c 0xc0004eff30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7d 0xc0004eff30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7e 0xc0004eff30 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func1 -> DEBU 2a7f 0xc0004eff30 gate 1563590428318061300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [policies] Evaluate -> DEBU 2a80 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.319 UTC [policies] Evaluate -> DEBU 2a81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.319 UTC [policies] Evaluate -> DEBU 2a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.319 UTC [cauthdsl] func1 -> DEBU 2a83 0xc000556770 gate 1563590428319543900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.319 UTC [cauthdsl] func2 -> DEBU 2a84 0xc000556770 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.319 UTC [cauthdsl] func2 -> DEBU 2a85 0xc000556770 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.320 UTC [cauthdsl] func2 -> DEBU 2a86 0xc000556770 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.320 UTC [msp.identity] Verify -> DEBU 2a87 Verify: digest = 00000000 44 7e e5 24 1a e0 8b 4c c7 85 ea 43 02 f3 73 0d |D~.$...L...C..s.| -peer0.org1.example.com | 00000010 ee 85 7e 9c cb af b6 05 57 83 87 05 7e 4e 25 d8 |..~.....W...~N%.|" -peer0.org1.example.com | "2019-07-20 02:40:28.320 UTC [msp.identity] Verify -> DEBU 2a88 Verify: sig = 00000000 30 44 02 20 2b bf 05 66 a2 a0 25 38 81 fc 86 73 |0D. +..f..%8...s| -peer0.org1.example.com | 00000010 dc 3f 28 4b b8 b5 54 d8 cc e7 30 66 79 20 f8 b0 |.?(K..T...0fy ..| -peer0.org1.example.com | 00000020 6e b4 c1 23 02 20 50 86 69 b7 c5 1f 6d 81 53 81 |n..#. P.i...m.S.| -peer0.org1.example.com | 00000030 3c 67 7b 04 48 0a f7 1a 05 79 1c 48 a9 70 09 49 | DEBU 2a89 0xc000556770 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.320 UTC [cauthdsl] func1 -> DEBU 2a8a 0xc000556770 gate 1563590428319543900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a8f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a90 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.322 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a91 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.322 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.322 UTC [gossip.gossip] handleMessage -> DEBU 2a93 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.323 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a94 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:28.324 UTC [msp.identity] Verify -> DEBU 2a95 Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| -peer0.org1.example.com | 00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" -peer0.org1.example.com | "2019-07-20 02:40:28.326 UTC [msp.identity] Verify -> DEBU 2a96 Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| -peer0.org1.example.com | 00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| -peer0.org1.example.com | 00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| -peer0.org1.example.com | 00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| -peer0.org1.example.com | 00000040 54 e8 23 31 4c ad 20 |T.#1L. |" -peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [msp.identity] Verify -> DEBU 2a97 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [msp.identity] Verify -> DEBU 2a98 Verify: sig = 00000000 30 45 02 21 00 ad 7b 41 8f d5 3d 54 c2 64 5f 84 |0E.!..{A..=T.d_.| -peer0.org1.example.com | 00000010 05 26 86 79 15 e2 67 05 70 51 4e e3 47 b4 f3 8a |.&.y..g.pQN.G...| -peer0.org1.example.com | 00000020 a3 1a 1a a3 7a 02 20 76 54 21 e8 2d e2 d2 d3 47 |....z. vT!.-...G| -peer0.org1.example.com | 00000030 65 80 54 e2 59 47 47 d3 ee 0b c4 f4 bc 92 51 fc |e.T.YGG.......Q.| -peer0.org1.example.com | 00000040 6b 5e 10 f1 dc fd 42 |k^....B|" -peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a99 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [gossip.discovery] isSentByMe -> DEBU 2a9a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a9b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a9c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.367 UTC [gossip.comm] func1 -> DEBU 2a9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.368 UTC [gossip.gossip] handleMessage -> DEBU 2a9e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.368 UTC [gossip.pull] HandleMessage -> DEBU 2a9f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.369 UTC [gossip.pull] SendDigest -> DEBU 2aa0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:28.369 UTC [gossip.gossip] handleMessage -> DEBU 2aa1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.389 UTC [gossip.comm] func1 -> DEBU 2aa2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.389 UTC [gossip.gossip] handleMessage -> DEBU 2aa3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.390 UTC [gossip.gossip] handleMessage -> DEBU 2aa4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.390 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aa5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.394 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aa6 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:28.394 UTC [msp.identity] Verify -> DEBU 2aa7 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| -peer0.org1.example.com | 00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" -peer0.org1.example.com | "2019-07-20 02:40:28.394 UTC [msp.identity] Verify -> DEBU 2aa8 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| -peer0.org1.example.com | 00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| -peer0.org1.example.com | 00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| -peer0.org1.example.com | 00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| -peer0.org1.example.com | 00000040 26 61 82 2d 44 90 |&a.-D.|" -peer0.org1.example.com | "2019-07-20 02:40:28.395 UTC [msp.identity] Verify -> DEBU 2aa9 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:28.395 UTC [msp.identity] Verify -> DEBU 2aaa Verify: sig = 00000000 30 45 02 21 00 f5 8a 76 70 1b 9e 13 5b bc 43 19 |0E.!...vp...[.C.| -peer0.org1.example.com | 00000010 06 6f c9 d9 d1 12 64 6a 6c 56 fd 82 e1 aa 45 37 |.o....djlV....E7| -peer0.org1.example.com | 00000020 94 52 38 8e 4a 02 20 32 69 7f 61 06 4a 6c 28 0e |.R8.J. 2i.a.Jl(.| -peer0.org1.example.com | 00000030 1a 1c 48 26 9b a1 07 62 f4 21 8b e4 98 7b ff e0 |..H&...b.!...{..| -peer0.org1.example.com | 00000040 d1 fd 28 be 2f 8e af |..(./..|" -peer0.org1.example.com | "2019-07-20 02:40:28.396 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aab Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aac Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aad updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aae Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aaf Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:28.397 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ab0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.397 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ab1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.398 UTC [gossip.discovery] sendMemResponse -> DEBU 2ab2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:28.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ab3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.398 UTC [msp] DeserializeIdentity -> DEBU 2ab4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.398 UTC [msp] DeserializeIdentity -> DEBU 2ab5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.398 UTC [gossip.comm] Send -> DEBU 2ab6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:28.399 UTC [gossip.discovery] sendMemResponse -> DEBU 2ab7 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > alive: " -peer0.org1.example.com | "2019-07-20 02:40:28.399 UTC [gossip.comm] sendToEndpoint -> DEBU 2ab8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.399 UTC [gossip.comm] sendToEndpoint -> DEBU 2ab9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.554 UTC [gossip.comm] func1 -> DEBU 2aba Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [gossip.gossip] handleMessage -> DEBU 2abb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [gossip.pull] HandleMessage -> DEBU 2abc GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abe Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.557 UTC [gossip.pull] SendDigest -> DEBU 2ac3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:28.557 UTC [gossip.gossip] handleMessage -> DEBU 2ac4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [gossip.comm] func1 -> DEBU 2ac5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [gossip.gossip] handleMessage -> DEBU 2ac6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [gossip.gossip] handleMessage -> DEBU 2ac7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ac8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ac9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [msp] DeserializeIdentity -> DEBU 2aca Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2acb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2acc Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2acd Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2ace == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2acf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [cauthdsl] func1 -> DEBU 2ad1 0xc0034f2890 gate 1563590428568875200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad2 0xc0034f2890 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad3 0xc0034f2890 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad4 0xc0034f2890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2ad5 0xc0034f2890 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ad6 0xc0034f2890 gate 1563590428568875200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ada 0xc0034f30d0 gate 1563590428569180700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2adb 0xc0034f30d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2adc 0xc0034f30d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2add 0xc0034f30d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [msp.identity] Verify -> DEBU 2ade Verify: digest = 00000000 40 2b f7 73 71 07 be 3d 8d 3a 01 a9 b4 d9 fe 90 |@+.sq..=.:......| -peer0.org1.example.com | 00000010 6a c1 c7 c4 33 6e df 0b 76 66 29 af 56 ed 7d 4b |j...3n..vf).V.}K|" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [msp.identity] Verify -> DEBU 2adf Verify: sig = 00000000 30 45 02 21 00 fa 09 c8 75 e9 29 5a 14 9b e7 0e |0E.!....u.)Z....| -peer0.org1.example.com | 00000010 f7 c6 4f 84 1c 13 a9 62 61 1b b7 fb 37 3c d6 d3 |..O....ba...7<..| -peer0.org1.example.com | 00000020 69 a4 91 ec 0e 02 20 37 8d c7 64 07 a9 83 4d de |i..... 7..d...M.| -peer0.org1.example.com | 00000030 20 7b 6c 93 82 bc 01 d2 47 d7 f6 50 ad 2c 70 72 | {l.....G..P.,pr| -peer0.org1.example.com | 00000040 73 f1 a6 87 33 15 00 |s...3..|" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2ae0 0xc0034f30d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ae1 0xc0034f30d0 gate 1563590428569180700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ae6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae8 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae9 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aea Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aeb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aec Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aed Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] sendMemResponse -> DEBU 2aee Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2aef Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2af0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2af1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.comm] Send -> DEBU 2af2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] sendMemResponse -> DEBU 2af3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:28.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2af4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2af5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.719 UTC [msp] DeserializeIdentity -> DEBU 2af6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.719 UTC [msp] DeserializeIdentity -> DEBU 2af7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] Send -> DEBU 2af8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2af9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afe Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.723 UTC [gossip.comm] func1 -> DEBU 2aff Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.727 UTC [gossip.gossip] handleMessage -> DEBU 2b00 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.728 UTC [gossip.comm] func1 -> DEBU 2b01 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.731 UTC [gossip.comm] func1 -> DEBU 2b02 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.733 UTC [msp] DeserializeIdentity -> DEBU 2b03 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.733 UTC [msp] DeserializeIdentity -> DEBU 2b05 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [gossip.comm] Send -> DEBU 2b06 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [msp] DeserializeIdentity -> DEBU 2b07 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [msp] DeserializeIdentity -> DEBU 2b08 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b09 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.735 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.733 UTC [msp.identity] Verify -> DEBU 2b04 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| -peer0.org1.example.com | 00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" -peer0.org1.example.com | "2019-07-20 02:40:28.736 UTC [msp.identity] Verify -> DEBU 2b0f Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| -peer0.org1.example.com | 00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| -peer0.org1.example.com | 00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| -peer0.org1.example.com | 00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| -peer0.org1.example.com | 00000040 bb 08 c9 6d 24 57 fb |...m$W.|" -peer0.org1.example.com | "2019-07-20 02:40:28.736 UTC [msp] DeserializeIdentity -> DEBU 2b10 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.736 UTC [msp] DeserializeIdentity -> DEBU 2b11 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b12 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b13 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b14 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.737 UTC [policies] Evaluate -> DEBU 2b15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.737 UTC [policies] Evaluate -> DEBU 2b16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [policies] Evaluate -> DEBU 2b17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func1 -> DEBU 2b18 0xc0032f5cb0 gate 1563590428738122700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b19 0xc0032f5cb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1a 0xc0032f5cb0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1b 0xc0032f5cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1c 0xc0032f5cb0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func1 -> DEBU 2b1d 0xc0032f5cb0 gate 1563590428738122700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [policies] Evaluate -> DEBU 2b1e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.739 UTC [policies] Evaluate -> DEBU 2b1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.739 UTC [policies] Evaluate -> DEBU 2b20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.739 UTC [cauthdsl] func1 -> DEBU 2b21 0xc003ba24f0 gate 1563590428739538400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.739 UTC [cauthdsl] func2 -> DEBU 2b22 0xc003ba24f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.739 UTC [cauthdsl] func2 -> DEBU 2b23 0xc003ba24f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.741 UTC [cauthdsl] func2 -> DEBU 2b24 0xc003ba24f0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.741 UTC [msp.identity] Verify -> DEBU 2b25 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| -peer0.org1.example.com | 00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" -peer0.org1.example.com | "2019-07-20 02:40:28.736 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.745 UTC [msp.identity] Verify -> DEBU 2b26 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| -peer0.org1.example.com | 00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| -peer0.org1.example.com | 00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| -peer0.org1.example.com | 00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| -peer0.org1.example.com | 00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" -peer0.org1.example.com | "2019-07-20 02:40:28.746 UTC [cauthdsl] func2 -> DEBU 2b27 0xc003ba24f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.746 UTC [cauthdsl] func1 -> DEBU 2b28 0xc003ba24f0 gate 1563590428739538400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b29 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b2b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.748 UTC [policies] Evaluate -> DEBU 2b2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.748 UTC [msp] DeserializeIdentity -> DEBU 2b2d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.749 UTC [msp] DeserializeIdentity -> DEBU 2b2e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b2f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b30 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b31 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b32 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b33 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.752 UTC [cauthdsl] func1 -> DEBU 2b35 0xc003ba3cc0 gate 1563590428752408800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.752 UTC [cauthdsl] func2 -> DEBU 2b36 0xc003ba3cc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.752 UTC [cauthdsl] func2 -> DEBU 2b37 0xc003ba3cc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [cauthdsl] func2 -> DEBU 2b38 0xc003ba3cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [cauthdsl] func2 -> DEBU 2b39 0xc003ba3cc0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [cauthdsl] func1 -> DEBU 2b3a 0xc003ba3cc0 gate 1563590428752408800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [cauthdsl] func1 -> DEBU 2b3e 0xc003d68500 gate 1563590428754307100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b3f 0xc003d68500 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b40 0xc003d68500 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b41 0xc003d68500 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [msp.identity] Verify -> DEBU 2b42 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [msp.identity] Verify -> DEBU 2b43 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" -peer0.org1.example.com | "2019-07-20 02:40:28.755 UTC [cauthdsl] func2 -> DEBU 2b44 0xc003d68500 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.755 UTC [cauthdsl] func1 -> DEBU 2b45 0xc003d68500 gate 1563590428754307100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.755 UTC [policies] Evaluate -> DEBU 2b46 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.755 UTC [policies] Evaluate -> DEBU 2b47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.756 UTC [policies] Evaluate -> DEBU 2b48 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.756 UTC [policies] Evaluate -> DEBU 2b49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.757 UTC [msp.identity] Verify -> DEBU 2b4a Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2b4b Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -peer0.org1.example.com | "2019-07-20 02:40:28.757 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b4c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.757 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b4d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.757 UTC [policies] Evaluate -> DEBU 2b4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.757 UTC [policies] Evaluate -> DEBU 2b4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.758 UTC [policies] Evaluate -> DEBU 2b50 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.758 UTC [cauthdsl] func1 -> DEBU 2b51 0xc003d69c00 gate 1563590428758639500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b52 0xc003d69c00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b53 0xc003d69c00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b54 0xc003d69c00 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.759 UTC [msp.identity] Verify -> DEBU 2b55 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2b56 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -peer0.org1.example.com | "2019-07-20 02:40:28.760 UTC [cauthdsl] func2 -> DEBU 2b57 0xc003d69c00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.760 UTC [cauthdsl] func1 -> DEBU 2b58 0xc003d69c00 gate 1563590428758639500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b59 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b5b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.761 UTC [policies] Evaluate -> DEBU 2b5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.761 UTC [gossip.gossip] handleMessage -> DEBU 2b5d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.762 UTC [gossip.gossip] handleMessage -> DEBU 2b5f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.762 UTC [msp] DeserializeIdentity -> DEBU 2b60 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.761 UTC [msp] DeserializeIdentity -> DEBU 2b5e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.762 UTC [msp] DeserializeIdentity -> DEBU 2b61 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.763 UTC [gossip.pull] Hello -> DEBU 2b62 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:28.763 UTC [msp.identity] Verify -> DEBU 2b63 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| -peer0.org1.example.com | 00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" -peer0.org1.example.com | "2019-07-20 02:40:28.763 UTC [msp.identity] Verify -> DEBU 2b64 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| -peer0.org1.example.com | 00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| -peer0.org1.example.com | 00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| -peer0.org1.example.com | 00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| -peer0.org1.example.com | 00000040 bb 08 c9 6d 24 57 fb |...m$W.|" -peer0.org1.example.com | "2019-07-20 02:40:28.763 UTC [msp] DeserializeIdentity -> DEBU 2b65 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.764 UTC [msp] DeserializeIdentity -> DEBU 2b66 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.764 UTC [gossip.comm] Send -> DEBU 2b67 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:28.764 UTC [gossip.comm] sendToEndpoint -> DEBU 2b68 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.764 UTC [gossip.comm] sendToEndpoint -> DEBU 2b69 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.765 UTC [gossip.comm] func1 -> DEBU 2b6a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.765 UTC [msp.identity] Verify -> DEBU 2b6b Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -peer0.org1.example.com | "2019-07-20 02:40:28.765 UTC [msp.identity] Verify -> DEBU 2b6c Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" -peer0.org1.example.com | "2019-07-20 02:40:28.766 UTC [msp] DeserializeIdentity -> DEBU 2b6d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.766 UTC [msp] DeserializeIdentity -> DEBU 2b6e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b6f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b70 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b71 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.767 UTC [policies] Evaluate -> DEBU 2b72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.768 UTC [policies] Evaluate -> DEBU 2b73 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.768 UTC [policies] Evaluate -> DEBU 2b74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.768 UTC [cauthdsl] func1 -> DEBU 2b75 0xc0039e9890 gate 1563590428768410700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.768 UTC [cauthdsl] func2 -> DEBU 2b76 0xc0039e9890 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b77 0xc0039e9890 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b78 0xc0039e9890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b79 0xc0039e9890 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func1 -> DEBU 2b7a 0xc0039e9890 gate 1563590428768410700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func1 -> DEBU 2b7e 0xc003efa0d0 gate 1563590428769550200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b7f 0xc003efa0d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b80 0xc003efa0d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b81 0xc003efa0d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [msp.identity] Verify -> DEBU 2b82 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| -peer0.org1.example.com | 00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" -peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [msp.identity] Verify -> DEBU 2b83 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| -peer0.org1.example.com | 00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| -peer0.org1.example.com | 00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| -peer0.org1.example.com | 00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| -peer0.org1.example.com | 00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" -peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [cauthdsl] func2 -> DEBU 2b84 0xc003efa0d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [cauthdsl] func1 -> DEBU 2b85 0xc003efa0d0 gate 1563590428769550200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b88 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.771 UTC [policies] Evaluate -> DEBU 2b89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.771 UTC [msp] DeserializeIdentity -> DEBU 2b8a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.771 UTC [msp] DeserializeIdentity -> DEBU 2b8b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b8c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:28.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b8d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b8e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [cauthdsl] func1 -> DEBU 2b92 0xc003efb8a0 gate 1563590428772520400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [cauthdsl] func2 -> DEBU 2b93 0xc003efb8a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.773 UTC [cauthdsl] func2 -> DEBU 2b94 0xc003efb8a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.773 UTC [cauthdsl] func2 -> DEBU 2b95 0xc003efb8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:28.774 UTC [cauthdsl] func2 -> DEBU 2b96 0xc003efb8a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.774 UTC [cauthdsl] func1 -> DEBU 2b97 0xc003efb8a0 gate 1563590428772520400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.774 UTC [policies] Evaluate -> DEBU 2b98 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.775 UTC [policies] Evaluate -> DEBU 2b99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.775 UTC [policies] Evaluate -> DEBU 2b9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.775 UTC [cauthdsl] func1 -> DEBU 2b9b 0xc0006be0e0 gate 1563590428775611400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.775 UTC [cauthdsl] func2 -> DEBU 2b9c 0xc0006be0e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.775 UTC [cauthdsl] func2 -> DEBU 2b9d 0xc0006be0e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.776 UTC [cauthdsl] func2 -> DEBU 2b9e 0xc0006be0e0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.776 UTC [msp.identity] Verify -> DEBU 2b9f Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -peer0.org1.example.com | "2019-07-20 02:40:28.776 UTC [msp.identity] Verify -> DEBU 2ba0 Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" -peer0.org1.example.com | "2019-07-20 02:40:28.777 UTC [cauthdsl] func2 -> DEBU 2ba1 0xc0006be0e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [cauthdsl] func1 -> DEBU 2ba2 0xc0006be0e0 gate 1563590428775611400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [msp] DeserializeIdentity -> DEBU 2ba7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ba8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ba9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2baa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2bab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2bac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [cauthdsl] func1 -> DEBU 2bad 0xc0006bf1c0 gate 1563590428779691300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [cauthdsl] func2 -> DEBU 2bae 0xc0006bf1c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2baf 0xc0006bf1c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb0 0xc0006bf1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb1 0xc0006bf1c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func1 -> DEBU 2bb2 0xc0006bf1c0 gate 1563590428779691300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func1 -> DEBU 2bb6 0xc0006bfa00 gate 1563590428780810500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb7 0xc0006bfa00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bb8 0xc0006bfa00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bb9 0xc0006bfa00 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [msp.identity] Verify -> DEBU 2bba Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [msp.identity] Verify -> DEBU 2bbb Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" -peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bbc 0xc0006bfa00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [cauthdsl] func1 -> DEBU 2bbd 0xc0006bfa00 gate 1563590428780810500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bbe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bc0 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [gossip.gossip] handleMessage -> DEBU 2bc2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [gossip.gossip] handleMessage -> DEBU 2bc3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [msp] DeserializeIdentity -> DEBU 2bc4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.783 UTC [msp.identity] Verify -> DEBU 2bc5 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| -peer0.org1.example.com | 00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" -peer0.org1.example.com | "2019-07-20 02:40:28.783 UTC [msp.identity] Verify -> DEBU 2bc6 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| -peer0.org1.example.com | 00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| -peer0.org1.example.com | 00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| -peer0.org1.example.com | 00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| -peer0.org1.example.com | 00000040 bb 08 c9 6d 24 57 fb |...m$W.|" -peer0.org1.example.com | "2019-07-20 02:40:28.784 UTC [msp.identity] Verify -> DEBU 2bc7 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -peer0.org1.example.com | "2019-07-20 02:40:28.784 UTC [msp.identity] Verify -> DEBU 2bc8 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" -peer0.org1.example.com | "2019-07-20 02:40:28.784 UTC [msp] DeserializeIdentity -> DEBU 2bc9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.784 UTC [msp] DeserializeIdentity -> DEBU 2bca Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bcb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcc Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcd Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [cauthdsl] func1 -> DEBU 2bd1 0xc0007fc350 gate 1563590428785776500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [cauthdsl] func2 -> DEBU 2bd2 0xc0007fc350 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd3 0xc0007fc350 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd4 0xc0007fc350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd5 0xc0007fc350 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [cauthdsl] func1 -> DEBU 2bd6 0xc0007fc350 gate 1563590428785776500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [cauthdsl] func1 -> DEBU 2bda 0xc0007fcb90 gate 1563590428786851300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdb 0xc0007fcb90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdc 0xc0007fcb90 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdd 0xc0007fcb90 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.787 UTC [msp.identity] Verify -> DEBU 2bde Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -peer0.org1.example.com | "2019-07-20 02:40:28.787 UTC [msp.identity] Verify -> DEBU 2bdf Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" -peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [cauthdsl] func2 -> DEBU 2be0 0xc0007fcb90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [cauthdsl] func1 -> DEBU 2be1 0xc0007fcb90 gate 1563590428786851300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [msp] DeserializeIdentity -> DEBU 2be6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.789 UTC [msp] DeserializeIdentity -> DEBU 2be7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2be8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be9 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bea Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.789 UTC [policies] Evaluate -> DEBU 2beb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.790 UTC [policies] Evaluate -> DEBU 2bec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.790 UTC [policies] Evaluate -> DEBU 2bed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.791 UTC [cauthdsl] func1 -> DEBU 2bee 0xc00080a360 gate 1563590428791136600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.791 UTC [cauthdsl] func2 -> DEBU 2bef 0xc00080a360 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.791 UTC [cauthdsl] func2 -> DEBU 2bf0 0xc00080a360 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.793 UTC [cauthdsl] func2 -> DEBU 2bf1 0xc00080a360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:28.793 UTC [cauthdsl] func2 -> DEBU 2bf2 0xc00080a360 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.793 UTC [cauthdsl] func1 -> DEBU 2bf3 0xc00080a360 gate 1563590428791136600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.793 UTC [policies] Evaluate -> DEBU 2bf4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [policies] Evaluate -> DEBU 2bf5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [policies] Evaluate -> DEBU 2bf6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [cauthdsl] func1 -> DEBU 2bf7 0xc00080aba0 gate 1563590428794390900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bf8 0xc00080aba0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bf9 0xc00080aba0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bfa 0xc00080aba0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [msp.identity] Verify -> DEBU 2bfb Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| -peer0.org1.example.com | 00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" -peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [msp.identity] Verify -> DEBU 2bfc Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| -peer0.org1.example.com | 00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2bfd 0xc00080aba0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [cauthdsl] func1 -> DEBU 2bfe 0xc00080aba0 gate 1563590428794390900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2bff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c00 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c01 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [msp] DeserializeIdentity -> DEBU 2c03 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c04 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c05 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [cauthdsl] func1 -> DEBU 2c09 0xc00080bc80 gate 1563590428796725600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [cauthdsl] func2 -> DEBU 2c0a 0xc00080bc80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [cauthdsl] func2 -> DEBU 2c0b 0xc00080bc80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [cauthdsl] func2 -> DEBU 2c0c 0xc00080bc80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [cauthdsl] func2 -> DEBU 2c0d 0xc00080bc80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [cauthdsl] func1 -> DEBU 2c0e 0xc00080bc80 gate 1563590428796725600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c0f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [cauthdsl] func1 -> DEBU 2c12 0xc0028aa4c0 gate 1563590428797791000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c13 0xc0028aa4c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c14 0xc0028aa4c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c15 0xc0028aa4c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [msp.identity] Verify -> DEBU 2c16 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| -peer0.org1.example.com | 00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" -peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [msp.identity] Verify -> DEBU 2c17 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| -peer0.org1.example.com | 00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2c18 0xc0028aa4c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [cauthdsl] func1 -> DEBU 2c19 0xc0028aa4c0 gate 1563590428797791000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [gossip.gossip] handleMessage -> DEBU 2c1e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [gossip.gossip] handleMessage -> DEBU 2c1f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [gossip.pull] HandleMessage -> DEBU 2c20 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.800 UTC [gossip.gossip] handleMessage -> DEBU 2c21 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.878 UTC [gossip.comm] func1 -> DEBU 2c22 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.878 UTC [gossip.gossip] handleMessage -> DEBU 2c23 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.879 UTC [msp] DeserializeIdentity -> DEBU 2c24 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.881 UTC [msp] DeserializeIdentity -> DEBU 2c25 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.882 UTC [gossip.gossip] handleMessage -> DEBU 2c26 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.885 UTC [gossip.comm] func1 -> DEBU 2c27 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.885 UTC [gossip.gossip] handleMessage -> DEBU 2c28 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.886 UTC [msp.identity] Verify -> DEBU 2c29 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c2a Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -peer0.org1.example.com | "2019-07-20 02:40:28.886 UTC [gossip.gossip] handleMessage -> DEBU 2c2b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.889 UTC [gossip.comm] func1 -> DEBU 2c2c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.889 UTC [gossip.gossip] handleMessage -> DEBU 2c2d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.889 UTC [msp.identity] Verify -> DEBU 2c2e Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c2f Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -peer0.org1.example.com | "2019-07-20 02:40:28.890 UTC [msp] DeserializeIdentity -> DEBU 2c30 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.890 UTC [gossip.gossip] handleMessage -> DEBU 2c31 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.899 UTC [gossip.comm] func1 -> DEBU 2c32 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.900 UTC [gossip.gossip] handleMessage -> DEBU 2c33 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.900 UTC [msp.identity] Verify -> DEBU 2c34 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c35 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -peer0.org1.example.com | "2019-07-20 02:40:28.901 UTC [msp] DeserializeIdentity -> DEBU 2c36 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:28.901 UTC [gossip.gossip] handleMessage -> DEBU 2c37 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:28.903 UTC [gossip.comm] func1 -> DEBU 2c38 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.903 UTC [gossip.gossip] handleMessage -> DEBU 2c39 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.904 UTC [gossip.pull] HandleMessage -> DEBU 2c3a GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:28.904 UTC [gossip.pull] SendDigest -> DEBU 2c3b Sending BLOCK_MSG digest: [1 2 3 4] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:28.904 UTC [gossip.gossip] handleMessage -> DEBU 2c3c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:29.045 UTC [gossip.comm] func1 -> DEBU 2c3d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:29.046 UTC [gossip.gossip] handleMessage -> DEBU 2c3e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:29.046 UTC [msp] DeserializeIdentity -> DEBU 2c3f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.046 UTC [msp] DeserializeIdentity -> DEBU 2c40 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.047 UTC [msp] DeserializeIdentity -> DEBU 2c41 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.047 UTC [gossip.gossip] handleMessage -> DEBU 2c42 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:29.049 UTC [gossip.comm] func1 -> DEBU 2c43 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:29.049 UTC [gossip.gossip] handleMessage -> DEBU 2c44 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:29.049 UTC [msp] DeserializeIdentity -> DEBU 2c45 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c47 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c48 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c49 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c4a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [cauthdsl] func1 -> DEBU 2c4c 0xc002a37700 gate 1563590429050765400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [cauthdsl] func2 -> DEBU 2c4d 0xc002a37700 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c4e 0xc002a37700 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c4f 0xc002a37700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c50 0xc002a37700 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [cauthdsl] func1 -> DEBU 2c51 0xc002a37700 gate 1563590429050765400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c52 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [cauthdsl] func1 -> DEBU 2c55 0xc002a37f40 gate 1563590429052725600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [cauthdsl] func2 -> DEBU 2c56 0xc002a37f40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c57 0xc002a37f40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c58 0xc002a37f40 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [msp.identity] Verify -> DEBU 2c59 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [msp.identity] Verify -> DEBU 2c5a Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" -peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c5b 0xc002a37f40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [cauthdsl] func1 -> DEBU 2c5c 0xc002a37f40 gate 1563590429052725600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [policies] Evaluate -> DEBU 2c5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [policies] Evaluate -> DEBU 2c5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.054 UTC [policies] Evaluate -> DEBU 2c5f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.054 UTC [policies] Evaluate -> DEBU 2c60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.054 UTC [msp] DeserializeIdentity -> DEBU 2c61 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.054 UTC [gossip.gossip] handleMessage -> DEBU 2c62 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:29.062 UTC [gossip.comm] func1 -> DEBU 2c63 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:29.063 UTC [gossip.gossip] handleMessage -> DEBU 2c64 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:29.063 UTC [msp] DeserializeIdentity -> DEBU 2c65 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c67 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c68 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:29.064 UTC [policies] Evaluate -> DEBU 2c69 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:29.064 UTC [policies] Evaluate -> DEBU 2c6a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [policies] Evaluate -> DEBU 2c6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [cauthdsl] func1 -> DEBU 2c6c 0xc003c761e0 gate 1563590429065560400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6d 0xc003c761e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6e 0xc003c761e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6f 0xc003c761e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c70 0xc003c761e0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [cauthdsl] func1 -> DEBU 2c71 0xc003c761e0 gate 1563590429065560400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c72 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [cauthdsl] func1 -> DEBU 2c75 0xc003c76a20 gate 1563590429066647500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [cauthdsl] func2 -> DEBU 2c76 0xc003c76a20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [cauthdsl] func2 -> DEBU 2c77 0xc003c76a20 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:29.067 UTC [cauthdsl] func2 -> DEBU 2c78 0xc003c76a20 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:29.067 UTC [msp.identity] Verify -> DEBU 2c79 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -peer0.org1.example.com | "2019-07-20 02:40:29.067 UTC [msp.identity] Verify -> DEBU 2c7a Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" -peer0.org1.example.com | "2019-07-20 02:40:29.067 UTC [cauthdsl] func2 -> DEBU 2c7b 0xc003c76a20 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [cauthdsl] func1 -> DEBU 2c7c 0xc003c76a20 gate 1563590429066647500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c80 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [msp] DeserializeIdentity -> DEBU 2c81 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [gossip.gossip] handleMessage -> DEBU 2c82 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:29.184 UTC [gossip.comm] func1 -> DEBU 2c83 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:29.185 UTC [gossip.gossip] handleMessage -> DEBU 2c84 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:29.185 UTC [msp] DeserializeIdentity -> DEBU 2c85 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.186 UTC [msp] DeserializeIdentity -> DEBU 2c86 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.186 UTC [msp] DeserializeIdentity -> DEBU 2c87 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.187 UTC [gossip.gossip] handleMessage -> DEBU 2c88 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:29.195 UTC [gossip.comm] func1 -> DEBU 2c89 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:29.195 UTC [gossip.gossip] handleMessage -> DEBU 2c8a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:29.195 UTC [msp] DeserializeIdentity -> DEBU 2c8b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.196 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c8c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:29.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:29.197 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:29.197 UTC [policies] Evaluate -> DEBU 2c8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:29.197 UTC [policies] Evaluate -> DEBU 2c90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [policies] Evaluate -> DEBU 2c91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [cauthdsl] func1 -> DEBU 2c92 0xc003b89a10 gate 1563590429198298900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c93 0xc003b89a10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c94 0xc003b89a10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c95 0xc003b89a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c96 0xc003b89a10 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [cauthdsl] func1 -> DEBU 2c97 0xc003b89a10 gate 1563590429198298900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c98 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [cauthdsl] func1 -> DEBU 2c9b 0xc003e72250 gate 1563590429199406700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9c 0xc003e72250 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9d 0xc003e72250 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9e 0xc003e72250 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [msp.identity] Verify -> DEBU 2c9f Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| -peer0.org1.example.com | 00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" -peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [msp.identity] Verify -> DEBU 2ca0 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| -peer0.org1.example.com | 00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2ca1 0xc003e72250 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [cauthdsl] func1 -> DEBU 2ca2 0xc003e72250 gate 1563590429199406700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:29.201 UTC [msp] DeserializeIdentity -> DEBU 2ca7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.201 UTC [gossip.gossip] handleMessage -> DEBU 2ca8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2ca9 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2caa Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cad == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [cauthdsl] func1 -> DEBU 2cae 0xc002a0e280 gate 1563590429907908700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2caf 0xc002a0e280 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2cb0 0xc002a0e280 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2cb1 0xc002a0e280 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:29.908 UTC [msp.identity] Verify -> DEBU 2cb2 Verify: digest = 00000000 66 5c 55 fa 92 62 2b cc 22 38 bc 5a ab e1 99 8b |f\U..b+."8.Z....| -peer0.org1.example.com | 00000010 a3 7e ed 8d 7b d3 7a 83 e9 52 e5 4a 62 c6 47 33 |.~..{.z..R.Jb.G3|" -peer0.org1.example.com | "2019-07-20 02:40:29.908 UTC [msp.identity] Verify -> DEBU 2cb3 Verify: sig = 00000000 30 44 02 20 01 7e e9 fb f8 ac ac 13 48 6c 04 13 |0D. .~......Hl..| -peer0.org1.example.com | 00000010 74 73 0e 9a ff 6d 09 40 fc 70 78 8b 24 00 cf 5b |ts...m.@.px.$..[| -peer0.org1.example.com | 00000020 e4 01 16 96 02 20 12 c1 64 09 0f 0d 76 d3 a3 a3 |..... ..d...v...| -peer0.org1.example.com | 00000030 43 0b 17 03 66 2e f7 a8 fa 41 d8 8d 8d 6f 8a 41 |C...f....A...o.A| -peer0.org1.example.com | 00000040 f7 d3 15 33 5c e9 |...3\.|" -peer0.org1.example.com | "2019-07-20 02:40:29.909 UTC [cauthdsl] func2 -> DEBU 2cb4 0xc002a0e280 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:29.909 UTC [cauthdsl] func1 -> DEBU 2cb5 0xc002a0e280 gate 1563590429907908700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb8 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [blocksProvider] DeliverBlocks -> DEBU 2cba [businesschannel] Adding payload to local buffer, blockNum = [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [gossip.state] addPayload -> DEBU 2cbb [businesschannel] Adding payload to local buffer, blockNum = [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [gossip.state] addPayload -> DEBU 2cbc Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [blocksProvider] DeliverBlocks -> DEBU 2cbd [businesschannel] Gossiping block [5], peers number [3]" -peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.channel] AddToMsgStore -> DEBU 2cbe Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.pull] Add -> DEBU 2cbf Added 5, total items: 5" -peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.state] deliverPayloads -> DEBU 2cc0 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.state] deliverPayloads -> DEBU 2cc1 [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.privdata] StoreBlock -> INFO 2cc2 [businesschannel] Received block [5] from buffer" -peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.privdata] StoreBlock -> DEBU 2cc3 [businesschannel] Validating block [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [committer.txvalidator] Validate -> DEBU 2cc4 [businesschannel] START Block Validation for block [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [committer.txvalidator] Validate -> DEBU 2cc5 expecting 1 block validation responses" -peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [committer.txvalidator] validateTx -> DEBU 2cc6 [businesschannel] validateTx starts for block 0xc003329000 env 0xc003de9680 txn 0" -peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] ValidateTransaction -> DEBU 2cc7 ValidateTransactionEnvelope starts for envelope 0xc003de9680" -peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] ValidateTransaction -> DEBU 2cc8 Header is channel_header:"\010\003\032\014\010\233\376\311\351\005\020\220\347\200\220\003\"\017businesschannel*@cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030T\242E]U\237\367\261\027o\270\362U\3555\232A\214\205`\377\361\333\315" " -peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] validateChannelHeader -> DEBU 2cc9 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2cca begin" -peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [msp] GetManagerForChain -> DEBU 2ccb Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ccc creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ccd creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [msp.identity] Verify -> DEBU 2cce Verify: digest = 00000000 fd 67 c4 b0 85 cb 38 56 50 7e bc 5b 91 c9 58 f5 |.g....8VP~.[..X.| -peer0.org1.example.com | 00000010 d8 6f d5 69 72 ea 09 87 2f 36 f6 5d 04 12 22 2b |.o.ir.../6.].."+|" -peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [msp.identity] Verify -> DEBU 2ccf Verify: sig = 00000000 30 44 02 20 6c 40 9e 5f c4 72 dd 46 9b 91 56 5c |0D. l@._.r.F..V\| -peer0.org1.example.com | 00000010 4c 18 86 1b c3 d0 4f 1a 42 2d 3b 24 98 d0 7e 33 |L.....O.B-;$..~3| -peer0.org1.example.com | 00000020 8b c1 0d 20 02 20 05 cc d8 dd a6 4e e6 f7 e2 5e |... . .....N...^| -peer0.org1.example.com | 00000030 96 b7 47 f1 4b d9 8a f6 0a 37 5b 58 02 60 01 93 |..G.K....7[X.`..| -peer0.org1.example.com | 00000040 f3 e2 8c ca 4c 85 |....L.|" -peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2cd0 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd1 validateEndorserTransaction starts for data 0xc003d9d000, header channel_header:"\010\003\032\014\010\233\376\311\351\005\020\220\347\200\220\003\"\017businesschannel*@cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030T\242E]U\237\367\261\027o\270\362U\3555\232A\214\205`\377\361\333\315" " -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd2 validateEndorserTransaction info: there are 1 actions" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd3 validateEndorserTransaction info: signature header is valid" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [protoutils] ValidateTransaction -> DEBU 2cd4 ValidateTransactionEnvelope returns err %!s()" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [committer.txvalidator] validateTx -> DEBU 2cd5 Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2cd6 retrieveTransactionByID() - txId = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [committer.txvalidator] validateTx -> DEBU 2cd7 Validating transaction vscc tx validate" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2cd8 [businesschannel] VSCCValidateTx starts for bytes 0xc002a09000" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cd9 constructing new query executor txid = [365099c3-1ff9-40c5-8e22-ed3d0d6ee917]" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [stateleveldb] GetState -> DEBU 2cda GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] Done -> DEBU 2cdb Done with transaction simulation / query execution [365099c3-1ff9-40c5-8e22-ed3d0d6ee917]" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2cdc Validating Tx cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cdd constructing new query executor txid = [2cf0f7a6-6bdd-4975-9d35-90dac5c02c2d]" -peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] Done -> DEBU 2cde Done with transaction simulation / query execution [2cf0f7a6-6bdd-4975-9d35-90dac5c02c2d]" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func1 -> DEBU 2cdf 0xc00354b270 gate 1563590429913996900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce0 0xc00354b270 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce1 0xc00354b270 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce2 0xc00354b270 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [msp.identity] Verify -> DEBU 2ce3 Verify: digest = 00000000 c6 e1 11 a0 17 7e 2c 9b 0b 87 80 2f b0 af 0b 6b |.....~,..../...k| -peer0.org1.example.com | 00000010 41 9e 7e c6 c5 cf fd af ec 9a 92 18 ac 29 ed 00 |A.~..........)..|" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [msp.identity] Verify -> DEBU 2ce4 Verify: sig = 00000000 30 44 02 20 0c fc 56 28 ee eb 1a f1 d8 0f 5b 52 |0D. ..V(......[R| -peer0.org1.example.com | 00000010 91 0d 11 5c ab d0 c8 22 b9 b6 e5 18 a2 a5 e5 03 |...\..."........| -peer0.org1.example.com | 00000020 e3 e5 89 8a 02 20 61 9b 09 2a c0 01 99 74 e1 30 |..... a..*...t.0| -peer0.org1.example.com | 00000030 6e 6a 3e cb e8 8b b1 71 d4 cd 93 8b 96 db ba 79 |nj>....q.......y| -peer0.org1.example.com | 00000040 83 ae 49 e9 5e 8d |..I.^.|" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce5 0xc00354b270 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce6 0xc00354b270 signed by 1 principal evaluation starts (used [true])" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce7 0xc00354b270 skipping identity 0 because it has already been used" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce8 0xc00354b270 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func1 -> DEBU 2ce9 0xc00354b270 gate 1563590429913996900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cea constructing new query executor txid = [03a5760c-b4b0-4828-893f-cb7c8d6c1a4f]" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [lockbasedtxmgr] Done -> DEBU 2ceb Done with transaction simulation / query execution [03a5760c-b4b0-4828-893f-cb7c8d6c1a4f]" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [vscc] Validate -> DEBU 2cec block 5, namespace: exp02, tx 0 validation results is: " -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2ced Transaction cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 appears to be valid" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2cee [businesschannel] VSCCValidateTx completes env bytes 0xc002a09000" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [committer.txvalidator] validateTx -> DEBU 2cef [businesschannel] validateTx completes for block 0xc003329000 env 0xc003de9680 txn 0" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [committer.txvalidator] Validate -> DEBU 2cf0 got result for idx 0, code 0" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [committer.txvalidator] Validate -> INFO 2cf1 [businesschannel] Validated block [5] in 2ms" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2cf2 Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [gossip.privdata] StoreBlock -> DEBU 2cf3 [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [kvledger] CommitWithPvtData -> DEBU 2cf4 [businesschannel] Validating state for block [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf6 lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf7 Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2cf8 ValidateAndPrepareBatch() for block number = [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2cf9 preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [valimpl] preprocessProtoBlock -> DEBU 2cfa txType=ENDORSER_TRANSACTION" -peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cfb GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2cfc Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" -peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cfd GetState(). ns=exp02, key=b" -peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2cfe Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" -peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cff GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2d00 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" -peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2d01 Block [5] Transaction index [0] TxId [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] marked as valid by state validator" -peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [valinternal] ApplyWriteSet -> DEBU 2d02 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0034a4240), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0034a4280)}" -peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d03 validating rwset..." -peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d04 postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [msp] DeserializeIdentity -> DEBU 2d05 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d06 ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [msp] DeserializeIdentity -> DEBU 2d07 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [kvledger] CommitWithPvtData -> DEBU 2d08 [businesschannel] Adding CommitHash to the block [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [kvledger] CommitWithPvtData -> DEBU 2d09 [businesschannel] Committing block [5] to storage" -peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2d0b Writing block [5] to pvt block store" -peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [gossip.comm] Send -> DEBU 2d0d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [gossip.comm] sendToEndpoint -> DEBU 2d10 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [gossip.comm] sendToEndpoint -> DEBU 2d11 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:29.920 UTC [pvtdatastorage] Prepare -> DEBU 2d12 Saved 0 private data write sets for block [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.924 UTC [fsblkstorage] indexBlock -> DEBU 2d13 Indexing block [blockNum=5, blockHash=[]byte{0x91, 0x57, 0x90, 0x2d, 0xf6, 0xfd, 0xb5, 0x4d, 0x5e, 0x9f, 0x17, 0xe5, 0xf6, 0x19, 0x33, 0xf, 0xd2, 0x27, 0x45, 0x3, 0x6c, 0x2, 0x3e, 0x8d, 0x6d, 0x3b, 0xa6, 0x3e, 0x8b, 0x83, 0x1b, 0x53} txOffsets= -peer0.org1.example.com | txId=cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 locPointer=offset=70, bytesLength=2984 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-07-20 02:40:29.924 UTC [fsblkstorage] indexBlock -> DEBU 2d14 Adding txLoc [fileSuffixNum=0, offset=80123, bytesLength=2984] for tx ID: [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] to txid-index" -peer0.org1.example.com | "2019-07-20 02:40:29.925 UTC [fsblkstorage] indexBlock -> DEBU 2d15 Adding txLoc [fileSuffixNum=0, offset=80123, bytesLength=2984] for tx number:[0] ID: [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] to blockNumTranNum index" -peer0.org1.example.com | "2019-07-20 02:40:29.935 UTC [fsblkstorage] updateCheckpoint -> DEBU 2d16 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84079], isChainEmpty=[false], lastBlockNumber=[5]" -peer0.org1.example.com | "2019-07-20 02:40:29.935 UTC [pvtdatastorage] Commit -> DEBU 2d17 Committing private data for block [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.939 UTC [pvtdatastorage] Commit -> DEBU 2d18 Committed private data for block [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.940 UTC [kvledger] CommitWithPvtData -> DEBU 2d19 [businesschannel] Committing block [5] transactions to state database" -peer0.org1.example.com | "2019-07-20 02:40:29.940 UTC [lockbasedtxmgr] Commit -> DEBU 2d1a lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:29.940 UTC [lockbasedtxmgr] Commit -> DEBU 2d1b Committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:29.941 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2d1c Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-07-20 02:40:29.941 UTC [lockbasedtxmgr] Commit -> DEBU 2d1d Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:29.941 UTC [stateleveldb] ApplyUpdates -> DEBU 2d1e Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -peer0.org1.example.com | "2019-07-20 02:40:29.941 UTC [stateleveldb] ApplyUpdates -> DEBU 2d1f Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [lockbasedtxmgr] Commit -> DEBU 2d20 Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2d21 Preparing potential purge list working-set for expiringAtBlk [6]" -peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [leveldbhelper] GetIterator -> DEBU 2d22 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" -peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2d23 No expiry entry found for expiringAtBlk [6]" -peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [lockbasedtxmgr] func1 -> DEBU 2d24 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [kvledger] CommitWithPvtData -> DEBU 2d25 [businesschannel] Committing block [5] transactions to history database" -peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [historyleveldb] Commit -> DEBU 2d26 Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" -peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [historyleveldb] Commit -> DEBU 2d27 Channel [businesschannel]: Updates committed to history database for blockNo [5]" -peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [kvledger] CommitWithPvtData -> INFO 2d28 [businesschannel] Committed block [5] with 1 transaction(s) in 28ms (state_validation=2ms block_and_pvtdata_commit=21ms state_commit=3ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" -peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [msp] GetDefaultSigningIdentity -> DEBU 2d29 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [msp.identity] Sign -> DEBU 2d2a Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08061A0C0A0565787030321203312E30 " -peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [msp.identity] Sign -> DEBU 2d2b Sign: digest: 16B6E3422440EF1113CC2D5AD11B5698025C5C42F9054C40FB3B8C581A28CBBD " -peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [gossip.state] commitBlock -> DEBU 2d2c [businesschannel] Committed block [5] with 1 transaction(s)" -peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [endorser] ProcessProposal -> DEBU 2d2d Entering: request from 172.18.0.9:58384" -peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [protoutils] ValidateProposalMessage -> DEBU 2d2e ValidateProposalMessage starts for signed proposal 0xc003e3fd10" -peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [protoutils] validateChannelHeader -> DEBU 2d2f validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d30 begin" -peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [msp] GetManagerForChain -> DEBU 2d31 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d32 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d33 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [msp.identity] Verify -> DEBU 2d34 Verify: digest = 00000000 5e d6 18 3c 0a 79 f0 77 2c 02 9c da da 10 31 d1 |^..<.y.w,.....1.| -peer0.org1.example.com | 00000010 ae fc 2f 5c 1f d7 4a 3c 1f 83 6a e3 49 aa 67 b4 |../\..J<..j.I.g.|" -peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [msp.identity] Verify -> DEBU 2d35 Verify: sig = 00000000 30 44 02 20 5e 94 09 02 ac 34 fe f7 23 67 4b 2f |0D. ^....4..#gK/| -peer0.org1.example.com | 00000010 17 03 0d 5b ea 9d 8f 0f 1c 53 eb 47 91 94 72 1c |...[.....S.G..r.| -peer0.org1.example.com | 00000020 72 f4 06 67 02 20 05 74 bf 98 60 85 b6 95 4a 32 |r..g. .t..`...J2| -peer0.org1.example.com | 00000030 41 5a d3 a2 b9 c9 ed 4f 05 56 74 d1 2e fc c6 42 |AZ.....O.Vt....B| -peer0.org1.example.com | 00000040 3d a5 8c db 81 e3 |=.....|" -peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d36 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d37 validateChaincodeProposalMessage starts for proposal 0xc0029acd90, header 0xc003fb8190" -peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d38 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [endorser] preProcess -> DEBU 2d39 [businesschannel][2fec28c6] processing txid: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933" -peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2d3a retrieveTransactionByID() - txId = [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" -peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [aclmgmt] CheckACL -> DEBU 2d3b acl policy /Channel/Application/Writers found in config for resource peer/Propose" -peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [aclmgmt] CheckACL -> DEBU 2d3c acl check(/Channel/Application/Writers)" -peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [cauthdsl] func1 -> DEBU 2d40 0xc00376f160 gate 1563590430283118800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d41 0xc00376f160 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d42 0xc00376f160 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d43 0xc00376f160 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [msp.identity] Verify -> DEBU 2d44 Verify: digest = 00000000 5e d6 18 3c 0a 79 f0 77 2c 02 9c da da 10 31 d1 |^..<.y.w,.....1.| -peer0.org1.example.com | 00000010 ae fc 2f 5c 1f d7 4a 3c 1f 83 6a e3 49 aa 67 b4 |../\..J<..j.I.g.|" -peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [msp.identity] Verify -> DEBU 2d45 Verify: sig = 00000000 30 44 02 20 5e 94 09 02 ac 34 fe f7 23 67 4b 2f |0D. ^....4..#gK/| -peer0.org1.example.com | 00000010 17 03 0d 5b ea 9d 8f 0f 1c 53 eb 47 91 94 72 1c |...[.....S.G..r.| -peer0.org1.example.com | 00000020 72 f4 06 67 02 20 05 74 bf 98 60 85 b6 95 4a 32 |r..g. .t..`...J2| -peer0.org1.example.com | 00000030 41 5a d3 a2 b9 c9 ed 4f 05 56 74 d1 2e fc c6 42 |AZ.....O.Vt....B| -peer0.org1.example.com | 00000040 3d a5 8c db 81 e3 |=.....|" -peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [cauthdsl] func2 -> DEBU 2d46 0xc00376f160 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [cauthdsl] func1 -> DEBU 2d47 0xc00376f160 gate 1563590430283118800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d48 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d4a Signature set satisfies policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2d4c constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2d4d constructing new tx simulator txid = [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" -peer0.org1.example.com | "2019-07-20 02:40:30.285 UTC [endorser] SimulateProposal -> DEBU 2d4e [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:30.285 UTC [stateleveldb] GetState -> DEBU 2d4f GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:30.285 UTC [ccprovider] GetChaincodeData -> DEBU 2d50 Getting chaincode data for from cache" -peer0.org1.example.com | "2019-07-20 02:40:30.285 UTC [endorser] callChaincode -> INFO 2d51 [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:30.285 UTC [chaincode] Execute -> DEBU 2d52 Entry" -peer0.org1.example.com | "2019-07-20 02:40:30.287 UTC [chaincode] handleMessage -> DEBU 2d53 [2fec28c6] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:30.287 UTC [chaincode] HandleTransaction -> DEBU 2d54 [2fec28c6] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:30.287 UTC [chaincode] HandleGetState -> DEBU 2d55 [2fec28c6] getting state for chaincode exp02, key a, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:30.287 UTC [stateleveldb] GetState -> DEBU 2d56 GetState(). ns=exp02, key=a" -peer0.org1.example.com | "2019-07-20 02:40:30.287 UTC [chaincode] HandleTransaction -> DEBU 2d57 [2fec28c6] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:30.288 UTC [chaincode] handleMessage -> DEBU 2d58 [2fec28c6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [chaincode] Notify -> DEBU 2d59 [2fec28c6] notifying Txid:2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [chaincode] Execute -> DEBU 2d5a Exit" -peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [endorser] callChaincode -> INFO 2d5b [businesschannel][2fec28c6] Exit chaincode: name:"exp02" (4ms)" -peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2d5c Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [lockbasedtxmgr] Done -> DEBU 2d5d Done with transaction simulation / query execution [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" -peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [endorser] SimulateProposal -> DEBU 2d5e [businesschannel][2fec28c6] Exit" -peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [endorser] endorseProposal -> DEBU 2d5f [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " -peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [endorser] endorseProposal -> DEBU 2d60 [businesschannel][2fec28c6] escc for chaincode name:"exp02" is escc" -peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [endorser] EndorseWithPlugin -> DEBU 2d61 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [msp.identity] Sign -> DEBU 2d62 Sign: plaintext: 0A2074EF80C23BC6C4E8567CCE74AA7C...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [msp.identity] Sign -> DEBU 2d63 Sign: digest: E1CA0B783FA631FD149AA90726F9DC6674E11EE6CAB366B0DAF3B9701126138F " -peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [endorser] EndorseWithPlugin -> DEBU 2d64 Exiting {plugin: escc, channel: businesschannel, tx: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, chaincode: exp02}" -peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [endorser] endorseProposal -> DEBU 2d65 [businesschannel][2fec28c6] Exit" -peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [lockbasedtxmgr] Done -> DEBU 2d66 Done with transaction simulation / query execution [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" -peer0.org1.example.com | "2019-07-20 02:40:30.291 UTC [endorser] func1 -> DEBU 2d67 Exit: request from 172.18.0.9:58384" -peer0.org1.example.com | "2019-07-20 02:40:30.291 UTC [comm.grpc.server] 1 -> INFO 2d68 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58384 grpc.code=OK grpc.call_duration=11.2701ms -peer0.org1.example.com | "2019-07-20 02:40:30.296 UTC [grpc] infof -> DEBU 2d69 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:30.296 UTC [grpc] infof -> DEBU 2d6a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:30.661 UTC [endorser] ProcessProposal -> DEBU 2d6b Entering: request from 172.18.0.9:58388" -peer0.org1.example.com | "2019-07-20 02:40:30.661 UTC [protoutils] ValidateProposalMessage -> DEBU 2d6c ValidateProposalMessage starts for signed proposal 0xc003fb92c0" -peer0.org1.example.com | "2019-07-20 02:40:30.661 UTC [protoutils] validateChannelHeader -> DEBU 2d6d validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d6e begin" -peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [msp] GetManagerForChain -> DEBU 2d6f Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d70 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d71 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [msp.identity] Verify -> DEBU 2d72 Verify: digest = 00000000 97 7d 67 d5 9d eb 92 a2 0f 91 da 67 a9 90 f4 5d |.}g........g...]| -peer0.org1.example.com | 00000010 d3 1e 49 9f 76 9b 9f d4 26 a2 00 b8 95 53 56 b0 |..I.v...&....SV.|" -peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [msp.identity] Verify -> DEBU 2d73 Verify: sig = 00000000 30 44 02 20 48 1e 42 5b da 30 13 bb e6 06 f3 43 |0D. H.B[.0.....C| -peer0.org1.example.com | 00000010 4e 6f b4 35 bf 1d 2a b7 57 79 12 a5 02 fd 6a 3c |No.5..*.Wy....j<| -peer0.org1.example.com | 00000020 5f 64 00 aa 02 20 57 ce 70 9a 14 76 2a 5f e6 a5 |_d... W.p..v*_..| -peer0.org1.example.com | 00000030 8e 13 a4 7f 93 00 62 dc b4 11 9c 96 d7 3f 00 f7 |......b......?..| -peer0.org1.example.com | 00000040 09 34 4d cd e2 e3 |.4M...|" -peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d74 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d75 validateChaincodeProposalMessage starts for proposal 0xc0029ad2d0, header 0xc003fb96d0" -peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d76 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [endorser] preProcess -> DEBU 2d77 [businesschannel][3bd567df] processing txid: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649" -peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2d78 retrieveTransactionByID() - txId = [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" -peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2d79 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2d7a constructing new tx simulator txid = [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" -peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [endorser] SimulateProposal -> DEBU 2d7b [businesschannel][3bd567df] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [endorser] callChaincode -> INFO 2d7c [businesschannel][3bd567df] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [chaincode] Execute -> DEBU 2d7d Entry" -peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [aclmgmt] CheckACL -> DEBU 2d7e acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists" -peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [aclmgmt] CheckACL -> DEBU 2d7f acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [policies] Evaluate -> DEBU 2d80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [policies] Evaluate -> DEBU 2d81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [policies] Evaluate -> DEBU 2d82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func1 -> DEBU 2d83 0xc003209920 gate 1563590430665096900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d84 0xc003209920 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d85 0xc003209920 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d86 0xc003209920 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [msp.identity] Verify -> DEBU 2d87 Verify: digest = 00000000 97 7d 67 d5 9d eb 92 a2 0f 91 da 67 a9 90 f4 5d |.}g........g...]| -peer0.org1.example.com | 00000010 d3 1e 49 9f 76 9b 9f d4 26 a2 00 b8 95 53 56 b0 |..I.v...&....SV.|" -peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [msp.identity] Verify -> DEBU 2d88 Verify: sig = 00000000 30 44 02 20 48 1e 42 5b da 30 13 bb e6 06 f3 43 |0D. H.B[.0.....C| -peer0.org1.example.com | 00000010 4e 6f b4 35 bf 1d 2a b7 57 79 12 a5 02 fd 6a 3c |No.5..*.Wy....j<| -peer0.org1.example.com | 00000020 5f 64 00 aa 02 20 57 ce 70 9a 14 76 2a 5f e6 a5 |_d... W.p..v*_..| -peer0.org1.example.com | 00000030 8e 13 a4 7f 93 00 62 dc b4 11 9c 96 d7 3f 00 f7 |......b......?..| -peer0.org1.example.com | 00000040 09 34 4d cd e2 e3 |.4M...|" -peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d89 0xc003209920 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func1 -> DEBU 2d8a 0xc003209920 gate 1563590430665096900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8b Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [chaincode] handleMessage -> DEBU 2d8f [3bd567df] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [chaincode] HandleTransaction -> DEBU 2d90 [3bd567df] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [chaincode] HandleGetState -> DEBU 2d91 [3bd567df] getting state for chaincode lscc, key exp02, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [stateleveldb] GetState -> DEBU 2d92 GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [chaincode] HandleTransaction -> DEBU 2d93 [3bd567df] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [chaincode] handleMessage -> DEBU 2d94 [3bd567df] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [chaincode] Notify -> DEBU 2d95 [3bd567df] notifying Txid:3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [chaincode] Execute -> DEBU 2d96 Exit" -peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [endorser] callChaincode -> INFO 2d97 [businesschannel][3bd567df] Exit chaincode: name:"lscc" (3ms)" -peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2d98 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [lockbasedtxmgr] Done -> DEBU 2d99 Done with transaction simulation / query execution [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" -peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [endorser] SimulateProposal -> DEBU 2d9a [businesschannel][3bd567df] Exit" -peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [endorser] endorseProposal -> DEBU 2d9b [businesschannel][3bd567df] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [endorser] endorseProposal -> DEBU 2d9c [businesschannel][3bd567df] escc for chaincode name:"lscc" is escc" -peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [endorser] EndorseWithPlugin -> DEBU 2d9d Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [msp.identity] Sign -> DEBU 2d9e Sign: plaintext: 0A20DC3953394B8B040B6D3F4AA63DE2...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [msp.identity] Sign -> DEBU 2d9f Sign: digest: 003A94C9AA19F2A7BD2F4D207C25170F8B0627B182D7989A95B23B911588F6EA " -peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [endorser] EndorseWithPlugin -> DEBU 2da0 Exiting {plugin: escc, channel: businesschannel, tx: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [endorser] endorseProposal -> DEBU 2da1 [businesschannel][3bd567df] Exit" -peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [lockbasedtxmgr] Done -> DEBU 2da2 Done with transaction simulation / query execution [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" -peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [endorser] func1 -> DEBU 2da3 Exit: request from 172.18.0.9:58388" -peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [comm.grpc.server] 1 -> INFO 2da4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58388 grpc.code=OK grpc.call_duration=8.5178ms -peer0.org1.example.com | "2019-07-20 02:40:30.671 UTC [grpc] infof -> DEBU 2da5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:30.672 UTC [grpc] warningf -> DEBU 2da6 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58388: read: connection reset by peer" -peer0.org1.example.com | "2019-07-20 02:40:30.672 UTC [grpc] infof -> DEBU 2da7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:30.847 UTC [endorser] ProcessProposal -> DEBU 2da8 Entering: request from 172.18.0.9:58392" -peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [protoutils] ValidateProposalMessage -> DEBU 2da9 ValidateProposalMessage starts for signed proposal 0xc003ec28c0" -peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [protoutils] validateChannelHeader -> DEBU 2daa validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dab begin" -peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [msp] GetManagerForChain -> DEBU 2dac Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dad creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dae creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [msp.identity] Verify -> DEBU 2daf Verify: digest = 00000000 c1 2e ff b8 10 8a 13 7a d9 e6 50 70 a7 5b 51 82 |.......z..Pp.[Q.| -peer0.org1.example.com | 00000010 88 35 73 4f 94 cb ce df b8 27 1d 78 b9 ba 5e 3f |.5sO.....'.x..^?|" -peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [msp.identity] Verify -> DEBU 2db0 Verify: sig = 00000000 30 44 02 20 3b 72 87 22 7d 62 f5 d7 dc e8 8f 92 |0D. ;r."}b......| -peer0.org1.example.com | 00000010 18 04 94 11 e4 b5 d9 1f 12 d5 d2 b1 96 c6 64 e9 |..............d.| -peer0.org1.example.com | 00000020 b6 ea 84 08 02 20 37 5b 3e b6 14 4f 47 3b 4e 40 |..... 7[>..OG;N@| -peer0.org1.example.com | 00000030 a3 9a ef a3 39 a0 1c 39 9c 9a 62 56 b4 9a 94 03 |....9..9..bV....| -peer0.org1.example.com | 00000040 54 bb 5c 3a bc ba |T.\:..|" -peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [protoutils] checkSignatureFromCreator -> DEBU 2db1 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2db2 validateChaincodeProposalMessage starts for proposal 0xc0029ad730, header 0xc003ec2cd0" -peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2db3 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [endorser] preProcess -> DEBU 2db4 [businesschannel][398ba62b] processing txid: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c" -peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2db5 retrieveTransactionByID() - txId = [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" -peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2db6 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2db7 constructing new tx simulator txid = [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" -peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [endorser] SimulateProposal -> DEBU 2db8 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [endorser] callChaincode -> INFO 2db9 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [chaincode] Execute -> DEBU 2dba Entry" -peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [aclmgmt] CheckACL -> DEBU 2dbb acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec" -peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [aclmgmt] CheckACL -> DEBU 2dbc acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [cauthdsl] func1 -> DEBU 2dc0 0xc003015bc0 gate 1563590430850677600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc1 0xc003015bc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc2 0xc003015bc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc3 0xc003015bc0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [msp.identity] Verify -> DEBU 2dc4 Verify: digest = 00000000 c1 2e ff b8 10 8a 13 7a d9 e6 50 70 a7 5b 51 82 |.......z..Pp.[Q.| -peer0.org1.example.com | 00000010 88 35 73 4f 94 cb ce df b8 27 1d 78 b9 ba 5e 3f |.5sO.....'.x..^?|" -peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [msp.identity] Verify -> DEBU 2dc5 Verify: sig = 00000000 30 44 02 20 3b 72 87 22 7d 62 f5 d7 dc e8 8f 92 |0D. ;r."}b......| -peer0.org1.example.com | 00000010 18 04 94 11 e4 b5 d9 1f 12 d5 d2 b1 96 c6 64 e9 |..............d.| -peer0.org1.example.com | 00000020 b6 ea 84 08 02 20 37 5b 3e b6 14 4f 47 3b 4e 40 |..... 7[>..OG;N@| -peer0.org1.example.com | 00000030 a3 9a ef a3 39 a0 1c 39 9c 9a 62 56 b4 9a 94 03 |....9..9..bV....| -peer0.org1.example.com | 00000040 54 bb 5c 3a bc ba |T.\:..|" -peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [cauthdsl] func2 -> DEBU 2dc6 0xc003015bc0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [cauthdsl] func1 -> DEBU 2dc7 0xc003015bc0 gate 1563590430850677600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dc8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dca Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [policies] Evaluate -> DEBU 2dcb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [chaincode] handleMessage -> DEBU 2dcc [398ba62b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [chaincode] HandleTransaction -> DEBU 2dcd [398ba62b] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [chaincode] HandleGetState -> DEBU 2dce [398ba62b] getting state for chaincode lscc, key exp02, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [stateleveldb] GetState -> DEBU 2dcf GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [chaincode] HandleTransaction -> DEBU 2dd0 [398ba62b] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:30.853 UTC [chaincode] handleMessage -> DEBU 2dd1 [398ba62b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:30.853 UTC [chaincode] Notify -> DEBU 2dd2 [398ba62b] notifying Txid:398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:30.853 UTC [chaincode] Execute -> DEBU 2dd3 Exit" -peer0.org1.example.com | "2019-07-20 02:40:30.853 UTC [endorser] callChaincode -> INFO 2dd4 [businesschannel][398ba62b] Exit chaincode: name:"lscc" (4ms)" -peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2dd5 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [lockbasedtxmgr] Done -> DEBU 2dd6 Done with transaction simulation / query execution [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" -peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [endorser] SimulateProposal -> DEBU 2dd7 [businesschannel][398ba62b] Exit" -peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [endorser] endorseProposal -> DEBU 2dd8 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [endorser] endorseProposal -> DEBU 2dd9 [businesschannel][398ba62b] escc for chaincode name:"lscc" is escc" -peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [endorser] EndorseWithPlugin -> DEBU 2dda Entering endorsement for {plugin: escc, channel: businesschannel, tx: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [msp.identity] Sign -> DEBU 2ddb Sign: plaintext: 0A20676545DA82FF5CBA43B1C4F1D73C...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [msp.identity] Sign -> DEBU 2ddc Sign: digest: 73A9A672040DBAA62B4709F7BB22774A13A4BCAA9164D02857C67C58BBC2A3BB " -peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [endorser] EndorseWithPlugin -> DEBU 2ddd Exiting {plugin: escc, channel: businesschannel, tx: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [endorser] endorseProposal -> DEBU 2dde [businesschannel][398ba62b] Exit" -peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [lockbasedtxmgr] Done -> DEBU 2ddf Done with transaction simulation / query execution [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" -peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [endorser] func1 -> DEBU 2de0 Exit: request from 172.18.0.9:58392" -peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [comm.grpc.server] 1 -> INFO 2de1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58392 grpc.code=OK grpc.call_duration=7.8945ms -peer0.org1.example.com | "2019-07-20 02:40:30.859 UTC [grpc] infof -> DEBU 2de2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:30.860 UTC [grpc] infof -> DEBU 2de3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:31.049 UTC [endorser] ProcessProposal -> DEBU 2de4 Entering: request from 172.18.0.9:58396" -peer0.org1.example.com | "2019-07-20 02:40:31.049 UTC [protoutils] ValidateProposalMessage -> DEBU 2de5 ValidateProposalMessage starts for signed proposal 0xc003ec3cc0" -peer0.org1.example.com | "2019-07-20 02:40:31.049 UTC [protoutils] validateChannelHeader -> DEBU 2de6 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2de7 begin" -peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [msp] GetManagerForChain -> DEBU 2de8 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2de9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dea creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [msp.identity] Verify -> DEBU 2deb Verify: digest = 00000000 1a 67 04 70 62 a6 98 97 4a 91 c1 8e dc b6 5a 9b |.g.pb...J.....Z.| -peer0.org1.example.com | 00000010 c8 0c 26 a7 35 b0 9e 74 ff 9f 62 a5 dc d9 47 21 |..&.5..t..b...G!|" -peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [msp.identity] Verify -> DEBU 2dec Verify: sig = 00000000 30 45 02 21 00 fe 45 d5 50 3c ae 5f c2 c5 73 b0 |0E.!..E.P<._..s.| -peer0.org1.example.com | 00000010 76 19 31 56 27 69 c0 c3 df 7a ed 95 0e 37 fd 61 |v.1V'i...z...7.a| -peer0.org1.example.com | 00000020 87 3c 13 7e 70 02 20 07 a5 1c 63 f7 a7 2e bf d6 |.<.~p. ...c.....| -peer0.org1.example.com | 00000030 f0 2d d4 65 e8 be 5f 1d 07 95 29 43 9e 25 19 95 |.-.e.._...)C.%..| -peer0.org1.example.com | 00000040 10 aa 91 93 85 f8 de |.......|" -peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ded exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2dee validateChaincodeProposalMessage starts for proposal 0xc0029adc00, header 0xc0029960f0" -peer0.org1.example.com | "2019-07-20 02:40:31.051 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2def validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.051 UTC [endorser] preProcess -> DEBU 2df0 [businesschannel][f13255af] processing txid: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac" -peer0.org1.example.com | "2019-07-20 02:40:31.051 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2df1 retrieveTransactionByID() - txId = [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" -peer0.org1.example.com | "2019-07-20 02:40:31.051 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2df2 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:31.051 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2df3 constructing new tx simulator txid = [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" -peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [endorser] SimulateProposal -> DEBU 2df4 [businesschannel][f13255af] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [endorser] callChaincode -> INFO 2df5 [businesschannel][f13255af] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [chaincode] Execute -> DEBU 2df6 Entry" -peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [aclmgmt] CheckACL -> DEBU 2df7 acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData" -peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [aclmgmt] CheckACL -> DEBU 2df8 acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2df9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2dfa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2dfb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func1 -> DEBU 2dfc 0xc002883cb0 gate 1563590431053104100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dfd 0xc002883cb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dfe 0xc002883cb0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dff 0xc002883cb0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [msp.identity] Verify -> DEBU 2e00 Verify: digest = 00000000 1a 67 04 70 62 a6 98 97 4a 91 c1 8e dc b6 5a 9b |.g.pb...J.....Z.| -peer0.org1.example.com | 00000010 c8 0c 26 a7 35 b0 9e 74 ff 9f 62 a5 dc d9 47 21 |..&.5..t..b...G!|" -peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [msp.identity] Verify -> DEBU 2e01 Verify: sig = 00000000 30 45 02 21 00 fe 45 d5 50 3c ae 5f c2 c5 73 b0 |0E.!..E.P<._..s.| -peer0.org1.example.com | 00000010 76 19 31 56 27 69 c0 c3 df 7a ed 95 0e 37 fd 61 |v.1V'i...z...7.a| -peer0.org1.example.com | 00000020 87 3c 13 7e 70 02 20 07 a5 1c 63 f7 a7 2e bf d6 |.<.~p. ...c.....| -peer0.org1.example.com | 00000030 f0 2d d4 65 e8 be 5f 1d 07 95 29 43 9e 25 19 95 |.-.e.._...)C.%..| -peer0.org1.example.com | 00000040 10 aa 91 93 85 f8 de |.......|" -peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2e02 0xc002883cb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func1 -> DEBU 2e03 0xc002883cb0 gate 1563590431053104100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e04 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e05 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e06 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e07 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.054 UTC [chaincode] handleMessage -> DEBU 2e08 [f13255af] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:31.055 UTC [chaincode] HandleTransaction -> DEBU 2e09 [f13255af] handling GET_STATE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:31.055 UTC [chaincode] HandleGetState -> DEBU 2e0a [f13255af] getting state for chaincode lscc, key exp02, channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:31.055 UTC [stateleveldb] GetState -> DEBU 2e0b GetState(). ns=lscc, key=exp02" -peer0.org1.example.com | "2019-07-20 02:40:31.055 UTC [chaincode] HandleTransaction -> DEBU 2e0c [f13255af] Completed GET_STATE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:31.056 UTC [chaincode] handleMessage -> DEBU 2e0d [f13255af] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:31.056 UTC [chaincode] Notify -> DEBU 2e0e [f13255af] notifying Txid:f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:31.056 UTC [chaincode] Execute -> DEBU 2e0f Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.056 UTC [endorser] callChaincode -> INFO 2e10 [businesschannel][f13255af] Exit chaincode: name:"lscc" (4ms)" -peer0.org1.example.com | "2019-07-20 02:40:31.056 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e11 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [lockbasedtxmgr] Done -> DEBU 2e12 Done with transaction simulation / query execution [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" -peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [endorser] SimulateProposal -> DEBU 2e13 [businesschannel][f13255af] Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [endorser] endorseProposal -> DEBU 2e14 [businesschannel][f13255af] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [endorser] endorseProposal -> DEBU 2e15 [businesschannel][f13255af] escc for chaincode name:"lscc" is escc" -peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [endorser] EndorseWithPlugin -> DEBU 2e16 Entering endorsement for {plugin: escc, channel: businesschannel, tx: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [msp.identity] Sign -> DEBU 2e17 Sign: plaintext: 0A20DF588A2AEA060081019D422F1E99...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:31.058 UTC [msp.identity] Sign -> DEBU 2e18 Sign: digest: 5FB5760DFBC5340411F4B7D072CF6CC8CD1031849D3597442E767CC02492CC07 " -peer0.org1.example.com | "2019-07-20 02:40:31.058 UTC [endorser] EndorseWithPlugin -> DEBU 2e19 Exiting {plugin: escc, channel: businesschannel, tx: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:31.058 UTC [endorser] endorseProposal -> DEBU 2e1a [businesschannel][f13255af] Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.058 UTC [lockbasedtxmgr] Done -> DEBU 2e1b Done with transaction simulation / query execution [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" -peer0.org1.example.com | "2019-07-20 02:40:31.058 UTC [endorser] func1 -> DEBU 2e1c Exit: request from 172.18.0.9:58396" -peer0.org1.example.com | "2019-07-20 02:40:31.059 UTC [comm.grpc.server] 1 -> INFO 2e1d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58396 grpc.code=OK grpc.call_duration=9.768ms -peer0.org1.example.com | "2019-07-20 02:40:31.062 UTC [grpc] infof -> DEBU 2e1e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:31.063 UTC [grpc] infof -> DEBU 2e1f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [endorser] ProcessProposal -> DEBU 2e20 Entering: request from 172.18.0.9:58400" -peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [protoutils] ValidateProposalMessage -> DEBU 2e21 ValidateProposalMessage starts for signed proposal 0xc002997180" -peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [protoutils] validateChannelHeader -> DEBU 2e22 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e23 begin" -peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [msp] GetManagerForChain -> DEBU 2e24 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e25 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e26 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [msp.identity] Verify -> DEBU 2e27 Verify: digest = 00000000 14 99 d2 66 9e c3 35 26 ae d4 50 7d ac 82 40 41 |...f..5&..P}..@A| -peer0.org1.example.com | 00000010 aa 63 90 aa 72 c5 d1 4d 61 45 96 7c 0c 4d e2 6e |.c..r..MaE.|.M.n|" -peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [msp.identity] Verify -> DEBU 2e28 Verify: sig = 00000000 30 45 02 21 00 95 4b ba f8 fb 04 c0 e1 f8 cd e1 |0E.!..K.........| -peer0.org1.example.com | 00000010 38 eb 46 ae 85 74 38 33 02 e1 2e d1 ea 50 de d0 |8.F..t83.....P..| -peer0.org1.example.com | 00000020 a6 24 5d b2 48 02 20 31 08 c8 7d 1d e0 28 0a 51 |.$].H. 1..}..(.Q| -peer0.org1.example.com | 00000030 d9 8e cb e6 45 63 87 d4 8b 85 ac a9 44 0a 4a 19 |....Ec......D.J.| -peer0.org1.example.com | 00000040 2f 17 bc cb d3 14 14 |/......|" -peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e29 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e2a validateChaincodeProposalMessage starts for proposal 0xc002a5a0e0, header 0xc002997590" -peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e2b validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [endorser] preProcess -> DEBU 2e2c [businesschannel][3d993208] processing txid: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5" -peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e2d retrieveTransactionByID() - txId = [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" -peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e2e constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e2f constructing new tx simulator txid = [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" -peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [endorser] SimulateProposal -> DEBU 2e30 [businesschannel][3d993208] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [endorser] callChaincode -> INFO 2e31 [businesschannel][3d993208] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [chaincode] Execute -> DEBU 2e32 Entry" -peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [msp.identity] Verify -> DEBU 2e33 Verify: digest = 00000000 14 99 d2 66 9e c3 35 26 ae d4 50 7d ac 82 40 41 |...f..5&..P}..@A| -peer0.org1.example.com | 00000010 aa 63 90 aa 72 c5 d1 4d 61 45 96 7c 0c 4d e2 6e |.c..r..MaE.|.M.n|" -peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [msp.identity] Verify -> DEBU 2e34 Verify: sig = 00000000 30 45 02 21 00 95 4b ba f8 fb 04 c0 e1 f8 cd e1 |0E.!..K.........| -peer0.org1.example.com | 00000010 38 eb 46 ae 85 74 38 33 02 e1 2e d1 ea 50 de d0 |8.F..t83.....P..| -peer0.org1.example.com | 00000020 a6 24 5d b2 48 02 20 31 08 c8 7d 1d e0 28 0a 51 |.$].H. 1..}..(.Q| -peer0.org1.example.com | 00000030 d9 8e cb e6 45 63 87 d4 8b 85 ac a9 44 0a 4a 19 |....Ec......D.J.| -peer0.org1.example.com | 00000040 2f 17 bc cb d3 14 14 |/......|" -peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [chaincode] handleMessage -> DEBU 2e35 [3d993208] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [chaincode] Notify -> DEBU 2e36 [3d993208] notifying Txid:3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [chaincode] Execute -> DEBU 2e37 Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] callChaincode -> INFO 2e38 [businesschannel][3d993208] Exit chaincode: name:"lscc" (1ms)" -peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e39 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [lockbasedtxmgr] Done -> DEBU 2e3a Done with transaction simulation / query execution [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" -peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] SimulateProposal -> DEBU 2e3b [businesschannel][3d993208] Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e3c [businesschannel][3d993208] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e3d [businesschannel][3d993208] escc for chaincode name:"lscc" is escc" -peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] EndorseWithPlugin -> DEBU 2e3e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [msp.identity] Sign -> DEBU 2e3f Sign: plaintext: 0A209E2BEBF5810375D1E37635180076...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [msp.identity] Sign -> DEBU 2e40 Sign: digest: 363FCCE3F7DEB930D82E10E0E713734CE9239405AC545754A93FD1B6565EFB75 " -peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] EndorseWithPlugin -> DEBU 2e41 Exiting {plugin: escc, channel: businesschannel, tx: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e42 [businesschannel][3d993208] Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.204 UTC [lockbasedtxmgr] Done -> DEBU 2e43 Done with transaction simulation / query execution [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" -peer0.org1.example.com | "2019-07-20 02:40:31.204 UTC [endorser] func1 -> DEBU 2e44 Exit: request from 172.18.0.9:58400" -peer0.org1.example.com | "2019-07-20 02:40:31.204 UTC [comm.grpc.server] 1 -> INFO 2e45 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58400 grpc.code=OK grpc.call_duration=4.198ms -peer0.org1.example.com | "2019-07-20 02:40:31.207 UTC [grpc] infof -> DEBU 2e46 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:31.207 UTC [grpc] infof -> DEBU 2e47 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:31.352 UTC [endorser] ProcessProposal -> DEBU 2e48 Entering: request from 172.18.0.9:58404" -peer0.org1.example.com | "2019-07-20 02:40:31.352 UTC [protoutils] ValidateProposalMessage -> DEBU 2e49 ValidateProposalMessage starts for signed proposal 0xc00399e690" -peer0.org1.example.com | "2019-07-20 02:40:31.352 UTC [protoutils] validateChannelHeader -> DEBU 2e4a validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:31.352 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4b begin" -peer0.org1.example.com | "2019-07-20 02:40:31.352 UTC [msp] GetManagerForChain -> DEBU 2e4c Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4e creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [msp.identity] Verify -> DEBU 2e4f Verify: digest = 00000000 77 41 14 34 63 ad 27 1e e3 ee 18 4f 8a 36 b2 89 |wA.4c.'....O.6..| -peer0.org1.example.com | 00000010 d9 ca 87 b4 ce 08 5f 15 ae 55 bd 64 24 f0 da e8 |......_..U.d$...|" -peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [msp.identity] Verify -> DEBU 2e50 Verify: sig = 00000000 30 45 02 21 00 fb d9 85 24 63 ca d1 96 95 5e 9f |0E.!....$c....^.| -peer0.org1.example.com | 00000010 34 88 fd 08 fa 07 ba 25 55 fe 90 5d 47 f8 15 79 |4......%U..]G..y| -peer0.org1.example.com | 00000020 11 db 91 f6 30 02 20 32 23 11 66 11 96 1f ad e1 |....0. 2#.f.....| -peer0.org1.example.com | 00000030 3b 07 49 49 18 f6 f7 79 29 68 ac 7b df de 77 50 |;.II...y)h.{..wP| -peer0.org1.example.com | 00000040 2f d2 8f aa 25 45 75 |/...%Eu|" -peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e51 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e52 validateChaincodeProposalMessage starts for proposal 0xc002a5ad90, header 0xc00399eaa0" -peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e53 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [endorser] preProcess -> DEBU 2e54 [businesschannel][7925c232] processing txid: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3" -peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e55 retrieveTransactionByID() - txId = [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" -peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e56 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e57 constructing new tx simulator txid = [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" -peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [endorser] SimulateProposal -> DEBU 2e58 [businesschannel][7925c232] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [endorser] callChaincode -> INFO 2e59 [businesschannel][7925c232] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [chaincode] Execute -> DEBU 2e5a Entry" -peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [aclmgmt] CheckACL -> DEBU 2e5b acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes" -peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [aclmgmt] CheckACL -> DEBU 2e5c acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [policies] Evaluate -> DEBU 2e5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [policies] Evaluate -> DEBU 2e5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func1 -> DEBU 2e60 0xc003810b80 gate 1563590431355085800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e61 0xc003810b80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e62 0xc003810b80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e63 0xc003810b80 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [msp.identity] Verify -> DEBU 2e64 Verify: digest = 00000000 77 41 14 34 63 ad 27 1e e3 ee 18 4f 8a 36 b2 89 |wA.4c.'....O.6..| -peer0.org1.example.com | 00000010 d9 ca 87 b4 ce 08 5f 15 ae 55 bd 64 24 f0 da e8 |......_..U.d$...|" -peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [msp.identity] Verify -> DEBU 2e65 Verify: sig = 00000000 30 45 02 21 00 fb d9 85 24 63 ca d1 96 95 5e 9f |0E.!....$c....^.| -peer0.org1.example.com | 00000010 34 88 fd 08 fa 07 ba 25 55 fe 90 5d 47 f8 15 79 |4......%U..]G..y| -peer0.org1.example.com | 00000020 11 db 91 f6 30 02 20 32 23 11 66 11 96 1f ad e1 |....0. 2#.f.....| -peer0.org1.example.com | 00000030 3b 07 49 49 18 f6 f7 79 29 68 ac 7b df de 77 50 |;.II...y)h.{..wP| -peer0.org1.example.com | 00000040 2f d2 8f aa 25 45 75 |/...%Eu|" -peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e66 0xc003810b80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func1 -> DEBU 2e67 0xc003810b80 gate 1563590431355085800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e68 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [policies] Evaluate -> DEBU 2e6a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [policies] Evaluate -> DEBU 2e6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [chaincode] handleMessage -> DEBU 2e6c [7925c232] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [chaincode] HandleTransaction -> DEBU 2e6d [7925c232] handling GET_STATE_BY_RANGE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [leveldbhelper] GetIterator -> DEBU 2e6e Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}]" -peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [rwsetutil] AddResult -> DEBU 2e6f Adding a result" -peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [chaincode] HandleGetStateByRange -> DEBU 2e70 Got keys and values. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e71 [7925c232] Completed GET_STATE_BY_RANGE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:31.365 UTC [chaincode] handleMessage -> DEBU 2e72 [7925c232] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready" -peer0.org1.example.com | "2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e73 [7925c232] handling QUERY_STATE_CLOSE from chaincode" -peer0.org1.example.com | "2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e74 [7925c232] Completed QUERY_STATE_CLOSE. Sending RESPONSE" -peer0.org1.example.com | "2019-07-20 02:40:31.365 UTC [chaincode] handleMessage -> DEBU 2e75 [7925c232] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [chaincode] Notify -> DEBU 2e76 [7925c232] notifying Txid:7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [chaincode] Execute -> DEBU 2e77 Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [endorser] callChaincode -> INFO 2e78 [businesschannel][7925c232] Exit chaincode: name:"lscc" (12ms)" -peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e79 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [lockbasedtxmgr] Done -> DEBU 2e7a Done with transaction simulation / query execution [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" -peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [endorser] SimulateProposal -> DEBU 2e7b [businesschannel][7925c232] Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [endorser] endorseProposal -> DEBU 2e7c [businesschannel][7925c232] Entry chaincode: name:"lscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.367 UTC [endorser] endorseProposal -> DEBU 2e7d [businesschannel][7925c232] escc for chaincode name:"lscc" is escc" -peer0.org1.example.com | "2019-07-20 02:40:31.367 UTC [endorser] EndorseWithPlugin -> DEBU 2e7e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:31.367 UTC [msp.identity] Sign -> DEBU 2e7f Sign: plaintext: 0A209AF619A7859ADC410AEE54B475C5...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:31.367 UTC [msp.identity] Sign -> DEBU 2e80 Sign: digest: 66D9F0AE6A8B6D0BDFA74EC725FED4FAB07281773EC61CB4846DDF0E5D851AEF " -peer0.org1.example.com | "2019-07-20 02:40:31.367 UTC [endorser] EndorseWithPlugin -> DEBU 2e81 Exiting {plugin: escc, channel: businesschannel, tx: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, chaincode: lscc}" -peer0.org1.example.com | "2019-07-20 02:40:31.368 UTC [endorser] endorseProposal -> DEBU 2e82 [businesschannel][7925c232] Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.368 UTC [lockbasedtxmgr] Done -> DEBU 2e83 Done with transaction simulation / query execution [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" -peer0.org1.example.com | "2019-07-20 02:40:31.368 UTC [endorser] func1 -> DEBU 2e84 Exit: request from 172.18.0.9:58404" -peer0.org1.example.com | "2019-07-20 02:40:31.368 UTC [comm.grpc.server] 1 -> INFO 2e85 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58404 grpc.code=OK grpc.call_duration=16.3707ms -peer0.org1.example.com | "2019-07-20 02:40:31.375 UTC [grpc] infof -> DEBU 2e86 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:31.375 UTC [grpc] infof -> DEBU 2e87 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:31.719 UTC [endorser] ProcessProposal -> DEBU 2e88 Entering: request from 172.18.0.9:58408" -peer0.org1.example.com | "2019-07-20 02:40:31.719 UTC [protoutils] ValidateProposalMessage -> DEBU 2e89 ValidateProposalMessage starts for signed proposal 0xc003d22410" -peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [protoutils] validateChannelHeader -> DEBU 2e8a validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8b begin" -peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [msp] GetManagerForChain -> DEBU 2e8c Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8e creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [msp.identity] Verify -> DEBU 2e8f Verify: digest = 00000000 f3 76 3b 29 1f a0 88 e0 7e 8e a9 4e 87 4a 62 9b |.v;)....~..N.Jb.| -peer0.org1.example.com | 00000010 f0 0f 57 5c 4d e6 bd 4c 15 bd ce f8 e0 77 ab 37 |..W\M..L.....w.7|" -peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [msp.identity] Verify -> DEBU 2e90 Verify: sig = 00000000 30 44 02 20 6f c2 7c 09 cc 43 00 70 86 8e b2 4b |0D. o.|..C.p...K| -peer0.org1.example.com | 00000010 fc a6 ce f6 79 d3 bc db 9a cc 2e 00 58 c5 26 eb |....y.......X.&.| -peer0.org1.example.com | 00000020 fb 4f c1 92 02 20 0f c4 96 3d 20 f8 05 23 86 7d |.O... ...= ..#.}| -peer0.org1.example.com | 00000030 66 6e c2 32 12 9c f0 50 22 92 d8 03 f5 bb 76 62 |fn.2...P".....vb| -peer0.org1.example.com | 00000040 d1 d0 19 37 df b2 |...7..|" -peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e91 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e92 validateChaincodeProposalMessage starts for proposal 0xc0029ac1c0, header 0xc003d22870" -peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e93 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [endorser] preProcess -> DEBU 2e94 [businesschannel][dd8fd934] processing txid: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a" -peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e95 retrieveTransactionByID() - txId = [dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a]" -peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [endorser] SimulateProposal -> DEBU 2e96 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [endorser] callChaincode -> INFO 2e97 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [chaincode] Execute -> DEBU 2e98 Entry" -peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [qscc] Invoke -> DEBU 2e99 Invoke function: GetChainInfo on chain: businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [aclmgmt] CheckACL -> DEBU 2e9a acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [aclmgmt] CheckACL -> DEBU 2e9b acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [cauthdsl] func1 -> DEBU 2e9f 0xc003b4c0c0 gate 1563590431722676400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [cauthdsl] func2 -> DEBU 2ea0 0xc003b4c0c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [cauthdsl] func2 -> DEBU 2ea1 0xc003b4c0c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [cauthdsl] func2 -> DEBU 2ea2 0xc003b4c0c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [msp.identity] Verify -> DEBU 2ea3 Verify: digest = 00000000 f3 76 3b 29 1f a0 88 e0 7e 8e a9 4e 87 4a 62 9b |.v;)....~..N.Jb.| -peer0.org1.example.com | 00000010 f0 0f 57 5c 4d e6 bd 4c 15 bd ce f8 e0 77 ab 37 |..W\M..L.....w.7|" -peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [msp.identity] Verify -> DEBU 2ea4 Verify: sig = 00000000 30 44 02 20 6f c2 7c 09 cc 43 00 70 86 8e b2 4b |0D. o.|..C.p...K| -peer0.org1.example.com | 00000010 fc a6 ce f6 79 d3 bc db 9a cc 2e 00 58 c5 26 eb |....y.......X.&.| -peer0.org1.example.com | 00000020 fb 4f c1 92 02 20 0f c4 96 3d 20 f8 05 23 86 7d |.O... ...= ..#.}| -peer0.org1.example.com | 00000030 66 6e c2 32 12 9c f0 50 22 92 d8 03 f5 bb 76 62 |fn.2...P".....vb| -peer0.org1.example.com | 00000040 d1 d0 19 37 df b2 |...7..|" -peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [cauthdsl] func2 -> DEBU 2ea5 0xc003b4c0c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [cauthdsl] func1 -> DEBU 2ea6 0xc003b4c0c0 gate 1563590431722676400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea7 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [policies] Evaluate -> DEBU 2eaa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [chaincode] handleMessage -> DEBU 2eab [dd8fd934] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [chaincode] Notify -> DEBU 2eac [dd8fd934] notifying Txid:dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [chaincode] Execute -> DEBU 2ead Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [endorser] callChaincode -> INFO 2eae [businesschannel][dd8fd934] Exit chaincode: name:"qscc" (2ms)" -peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [endorser] SimulateProposal -> DEBU 2eaf [businesschannel][dd8fd934] Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [endorser] endorseProposal -> DEBU 2eb0 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [endorser] endorseProposal -> DEBU 2eb1 [businesschannel][dd8fd934] escc for chaincode name:"qscc" is escc" -peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [endorser] EndorseWithPlugin -> DEBU 2eb2 Entering endorsement for {plugin: escc, channel: businesschannel, tx: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, chaincode: qscc}" -peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [msp.identity] Sign -> DEBU 2eb3 Sign: plaintext: 0A2070FDD43188AE8CAE2BB47E6B654F...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [msp.identity] Sign -> DEBU 2eb4 Sign: digest: FDDD85326B9859D771E0B5898B5DF6BDBAF7EE9E62BB1F52B98D226C565011A3 " -peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [endorser] EndorseWithPlugin -> DEBU 2eb5 Exiting {plugin: escc, channel: businesschannel, tx: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, chaincode: qscc}" -peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [endorser] endorseProposal -> DEBU 2eb6 [businesschannel][dd8fd934] Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [endorser] func1 -> DEBU 2eb7 Exit: request from 172.18.0.9:58408" -peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [comm.grpc.server] 1 -> INFO 2eb8 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58408 grpc.code=OK grpc.call_duration=6.2471ms -peer0.org1.example.com | "2019-07-20 02:40:31.728 UTC [grpc] infof -> DEBU 2eb9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:31.728 UTC [grpc] infof -> DEBU 2eba transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:31.873 UTC [endorser] ProcessProposal -> DEBU 2ebb Entering: request from 172.18.0.9:58412" -peer0.org1.example.com | "2019-07-20 02:40:31.873 UTC [protoutils] ValidateProposalMessage -> DEBU 2ebc ValidateProposalMessage starts for signed proposal 0xc003d23950" -peer0.org1.example.com | "2019-07-20 02:40:31.873 UTC [protoutils] validateChannelHeader -> DEBU 2ebd validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:31.873 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ebe begin" -peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [msp] GetManagerForChain -> DEBU 2ebf Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ec0 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ec1 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [msp.identity] Verify -> DEBU 2ec2 Verify: digest = 00000000 86 1a 70 e6 b0 17 55 f5 b1 1c fa 99 b5 c1 50 dc |..p...U.......P.| -peer0.org1.example.com | 00000010 ef f1 79 c3 1c fa f0 35 ad 15 f5 3c 97 48 92 00 |..y....5...<.H..|" -peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [msp.identity] Verify -> DEBU 2ec3 Verify: sig = 00000000 30 45 02 21 00 cc e3 3a 87 2c 19 de 52 4a 85 64 |0E.!...:.,..RJ.d| -peer0.org1.example.com | 00000010 a7 8d b7 02 1d 56 09 5a 54 e9 b6 9f 8b 1f e9 50 |.....V.ZT......P| -peer0.org1.example.com | 00000020 4f cd 3e 7a db 02 20 01 43 4d 9d bc f9 2f f0 a9 |O.>z.. .CM.../..| -peer0.org1.example.com | 00000030 38 93 42 20 72 e9 78 7f d0 5f 43 47 3c 6a d7 d1 |8.B r.x.._CG DEBU 2ec4 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2ec5 validateChaincodeProposalMessage starts for proposal 0xc0029ac620, header 0xc003d23db0" -peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2ec6 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [endorser] preProcess -> DEBU 2ec7 [businesschannel][b2c8af94] processing txid: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67" -peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2ec8 retrieveTransactionByID() - txId = [b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67]" -peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [endorser] SimulateProposal -> DEBU 2ec9 [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [endorser] callChaincode -> INFO 2eca [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [chaincode] Execute -> DEBU 2ecb Entry" -peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [qscc] Invoke -> DEBU 2ecc Invoke function: GetBlockByNumber on chain: businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [aclmgmt] CheckACL -> DEBU 2ecd acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" -peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [aclmgmt] CheckACL -> DEBU 2ece acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ecf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ed0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ed1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [cauthdsl] func1 -> DEBU 2ed2 0xc0003ddce0 gate 1563590431876580200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [cauthdsl] func2 -> DEBU 2ed3 0xc0003ddce0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [cauthdsl] func2 -> DEBU 2ed4 0xc0003ddce0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [cauthdsl] func2 -> DEBU 2ed5 0xc0003ddce0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [msp.identity] Verify -> DEBU 2ed6 Verify: digest = 00000000 86 1a 70 e6 b0 17 55 f5 b1 1c fa 99 b5 c1 50 dc |..p...U.......P.| -peer0.org1.example.com | 00000010 ef f1 79 c3 1c fa f0 35 ad 15 f5 3c 97 48 92 00 |..y....5...<.H..|" -peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [msp.identity] Verify -> DEBU 2ed7 Verify: sig = 00000000 30 45 02 21 00 cc e3 3a 87 2c 19 de 52 4a 85 64 |0E.!...:.,..RJ.d| -peer0.org1.example.com | 00000010 a7 8d b7 02 1d 56 09 5a 54 e9 b6 9f 8b 1f e9 50 |.....V.ZT......P| -peer0.org1.example.com | 00000020 4f cd 3e 7a db 02 20 01 43 4d 9d bc f9 2f f0 a9 |O.>z.. .CM.../..| -peer0.org1.example.com | 00000030 38 93 42 20 72 e9 78 7f d0 5f 43 47 3c 6a d7 d1 |8.B r.x.._CG DEBU 2ed8 0xc0003ddce0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [cauthdsl] func1 -> DEBU 2ed9 0xc0003ddce0 gate 1563590431876580200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2eda Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2edb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2edc Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.878 UTC [policies] Evaluate -> DEBU 2edd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.878 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 2ede retrieveBlockByNumber() - blockNum = [2]" -peer0.org1.example.com | "2019-07-20 02:40:31.878 UTC [fsblkstorage] newBlockfileStream -> DEBU 2edf newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47677]" -peer0.org1.example.com | "2019-07-20 02:40:31.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ee0 Remaining bytes=[36402], Going to peek [8] bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ee1 Returning blockbytes - length=[23781], placementInfo={fileNum=[0], startOffset=[47677], bytesOffset=[47680]}" -peer0.org1.example.com | "2019-07-20 02:40:31.879 UTC [chaincode] handleMessage -> DEBU 2ee2 [b2c8af94] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:31.879 UTC [chaincode] Notify -> DEBU 2ee3 [b2c8af94] notifying Txid:b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:31.879 UTC [chaincode] Execute -> DEBU 2ee4 Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.879 UTC [endorser] callChaincode -> INFO 2ee5 [businesschannel][b2c8af94] Exit chaincode: name:"qscc" (4ms)" -peer0.org1.example.com | "2019-07-20 02:40:31.879 UTC [endorser] SimulateProposal -> DEBU 2ee6 [businesschannel][b2c8af94] Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.880 UTC [endorser] endorseProposal -> DEBU 2ee7 [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:40:31.880 UTC [endorser] endorseProposal -> DEBU 2ee8 [businesschannel][b2c8af94] escc for chaincode name:"qscc" is escc" -peer0.org1.example.com | "2019-07-20 02:40:31.880 UTC [endorser] EndorseWithPlugin -> DEBU 2ee9 Entering endorsement for {plugin: escc, channel: businesschannel, tx: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, chaincode: qscc}" -peer0.org1.example.com | "2019-07-20 02:40:31.880 UTC [msp.identity] Sign -> DEBU 2eea Sign: plaintext: 0A2036A3CDEF14D19587AB9EF2BCE767...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:31.881 UTC [msp.identity] Sign -> DEBU 2eeb Sign: digest: C4F9350E47494E49BCA826CFABD27DC035B15BABCC5B92822587F660B0B5F404 " -peer0.org1.example.com | "2019-07-20 02:40:31.881 UTC [endorser] EndorseWithPlugin -> DEBU 2eec Exiting {plugin: escc, channel: businesschannel, tx: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, chaincode: qscc}" -peer0.org1.example.com | "2019-07-20 02:40:31.881 UTC [endorser] endorseProposal -> DEBU 2eed [businesschannel][b2c8af94] Exit" -peer0.org1.example.com | "2019-07-20 02:40:31.881 UTC [endorser] func1 -> DEBU 2eee Exit: request from 172.18.0.9:58412" -peer0.org1.example.com | "2019-07-20 02:40:31.882 UTC [comm.grpc.server] 1 -> INFO 2eef unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58412 grpc.code=OK grpc.call_duration=8.8663ms -peer0.org1.example.com | "2019-07-20 02:40:31.887 UTC [grpc] infof -> DEBU 2ef0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:31.887 UTC [grpc] warningf -> DEBU 2ef1 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58412: read: connection reset by peer" -peer0.org1.example.com | "2019-07-20 02:40:31.887 UTC [grpc] infof -> DEBU 2ef2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:31.899 UTC [gossip.comm] func1 -> DEBU 2ef3 Got message: GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.899 UTC [gossip.gossip] handleMessage -> DEBU 2ef4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.900 UTC [gossip.gossip] handleMessage -> DEBU 2ef5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ef6 Got message: GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ef7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:31.900 UTC [msp] DeserializeIdentity -> DEBU 2ef8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ef9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efa Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efb Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.902 UTC [cauthdsl] func1 -> DEBU 2eff 0xc0002defe0 gate 1563590431902859400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f00 0xc0002defe0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f01 0xc0002defe0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f02 0xc0002defe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f03 0xc0002defe0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func1 -> DEBU 2f04 0xc0002defe0 gate 1563590431902859400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func1 -> DEBU 2f08 0xc0002df830 gate 1563590431904830900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f09 0xc0002df830 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f0a 0xc0002df830 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f0b 0xc0002df830 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [msp.identity] Verify -> DEBU 2f0c Verify: digest = 00000000 4a 3c a8 97 ce 24 57 51 8e 87 51 64 33 0f 25 92 |J<...$WQ..Qd3.%.| -peer0.org1.example.com | 00000010 d8 a5 69 b9 1a 02 bf 17 f5 e4 d6 78 8a 4c 44 3c |..i........x.LD<|" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [msp.identity] Verify -> DEBU 2f0d Verify: sig = 00000000 30 45 02 21 00 e7 e9 e4 66 f3 56 fa 3e 9d 43 8d |0E.!....f.V.>.C.| -peer0.org1.example.com | 00000010 c9 39 a6 3b ef 67 3f 6f 88 29 cb 62 a9 23 d5 4c |.9.;.g?o.).b.#.L| -peer0.org1.example.com | 00000020 ba 6f a8 e8 aa 02 20 7a 33 30 08 47 98 6c 93 c9 |.o.... z30.G.l..| -peer0.org1.example.com | 00000030 29 e1 b6 ab 0c 04 cf 3b 7b 3a 5a e4 e1 9a 9b 6b |)......;{:Z....k| -peer0.org1.example.com | 00000040 61 ae 3f 2f 04 68 dc |a.?/.h.|" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [cauthdsl] func2 -> DEBU 2f0e 0xc0002df830 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [cauthdsl] func1 -> DEBU 2f0f 0xc0002df830 gate 1563590431904830900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f12 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f14 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f15 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f16 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f17 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f18 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f19 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f1a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f1b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] sendMemResponse -> DEBU 2f1c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [msp] DeserializeIdentity -> DEBU 2f1d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [msp] DeserializeIdentity -> DEBU 2f1e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [msp] DeserializeIdentity -> DEBU 2f1f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [gossip.comm] Send -> DEBU 2f20 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [gossip.discovery] sendMemResponse -> DEBU 2f21 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" > alive: alive:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > alive: " -peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [gossip.comm] sendToEndpoint -> DEBU 2f22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [gossip.comm] sendToEndpoint -> DEBU 2f23 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.931 UTC [gossip.comm] func1 -> DEBU 2f24 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.931 UTC [gossip.gossip] handleMessage -> DEBU 2f25 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.931 UTC [gossip.pull] HandleMessage -> DEBU 2f26 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.931 UTC [msp] DeserializeIdentity -> DEBU 2f27 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f28 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f29 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.933 UTC [gossip.pull] SendDigest -> DEBU 2f2d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:31.933 UTC [gossip.gossip] handleMessage -> DEBU 2f2e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [gossip.election] waitForInterrupt -> DEBU 2f2f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [gossip.election] IsLeader -> DEBU 2f30 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f31 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [msp.identity] Sign -> DEBU 2f32 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100B1801 " -peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [msp.identity] Sign -> DEBU 2f33 Sign: digest: 2F26E4B97497DB1253FB70B9B9C3E2C6F0505DF73F214674042C23DD57685088 " -peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [gossip.election] waitForInterrupt -> DEBU 2f34 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [gossip.comm] func1 -> DEBU 2f35 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [gossip.gossip] handleMessage -> DEBU 2f36 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [gossip.gossip] handleMessage -> DEBU 2f37 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f38 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f39 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [msp] DeserializeIdentity -> DEBU 2f3a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f3c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f3d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.975 UTC [cauthdsl] func1 -> DEBU 2f41 0xc000267050 gate 1563590431975107500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:31.975 UTC [cauthdsl] func2 -> DEBU 2f42 0xc000267050 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f43 0xc000267050 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f44 0xc000267050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f45 0xc000267050 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [cauthdsl] func1 -> DEBU 2f46 0xc000267050 gate 1563590431975107500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func1 -> DEBU 2f4a 0xc0002678d0 gate 1563590431976993400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4b 0xc0002678d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4c 0xc0002678d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4d 0xc0002678d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [msp.identity] Verify -> DEBU 2f4e Verify: digest = 00000000 0b 08 da b1 e5 fb 95 4c 01 d7 21 e0 a3 01 36 58 |.......L..!...6X| -peer0.org1.example.com | 00000010 13 e9 fe e7 af 03 d2 1b 72 3d 58 a9 50 b9 92 9e |........r=X.P...|" -peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [msp.identity] Verify -> DEBU 2f4f Verify: sig = 00000000 30 45 02 21 00 80 78 32 b8 90 6b ec fc c7 70 c0 |0E.!..x2..k...p.| -peer0.org1.example.com | 00000010 50 95 d1 12 8f e0 41 8b 80 19 9d bc c7 7d 24 f3 |P.....A......}$.| -peer0.org1.example.com | 00000020 e6 f7 30 50 84 02 20 5d b3 a7 9c e9 7a 6b b0 66 |..0P.. ]....zk.f| -peer0.org1.example.com | 00000030 0b 1c a9 aa 1b 3f 6b 33 fa e0 3e c4 3a 77 06 49 |.....?k3..>.:w.I| -peer0.org1.example.com | 00000040 ad 06 35 1a 4b 87 1e |..5.K..|" -peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f50 0xc0002678d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func1 -> DEBU 2f51 0xc0002678d0 gate 1563590431976993400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f52 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f54 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:31.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f56 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f57 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f58 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f59 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f5a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f5b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f5c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f5d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.comm] func1 -> DEBU 2f5e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [msp] DeserializeIdentity -> DEBU 2f5f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.gossip] handleMessage -> DEBU 2f60 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f61 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f62 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f63 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f64 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f65 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f66 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.comm] Send -> DEBU 2f68 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.comm] func1 -> DEBU 2f67 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f69 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f6a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f6b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f6c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f6d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f70 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f71 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f72 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [gossip.comm] Send -> DEBU 2f73 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f74 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f75 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [gossip.comm] Send -> DEBU 2f76 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2f77 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2f78 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.983 UTC [gossip.comm] sendToEndpoint -> DEBU 2f79 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.985 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:31.984 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:31.985 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.226 UTC [gossip.pull] Hello -> DEBU 2f7d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:32.227 UTC [gossip.comm] Send -> DEBU 2f7e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.227 UTC [gossip.pull] Hello -> DEBU 2f7f Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:32.227 UTC [gossip.comm] Send -> DEBU 2f80 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.227 UTC [gossip.pull] Hello -> DEBU 2f81 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] Send -> DEBU 2f83 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f84 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f85 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f86 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f87 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.227 UTC [gossip.comm] sendToEndpoint -> DEBU 2f82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f88 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f89 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f8a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f8b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.230 UTC [gossip.gossip] handleMessage -> DEBU 2f8c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.231 UTC [gossip.pull] HandleMessage -> DEBU 2f8d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.231 UTC [gossip.gossip] handleMessage -> DEBU 2f8e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.231 UTC [gossip.gossip] handleMessage -> DEBU 2f8f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.232 UTC [gossip.pull] HandleMessage -> DEBU 2f90 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f91 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f92 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.232 UTC [gossip.pull] HandleMessage -> DEBU 2f93 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f94 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.268 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f95 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:32.268 UTC [msp.identity] Sign -> DEBU 2f96 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151024 " -peer0.org1.example.com | "2019-07-20 02:40:32.268 UTC [msp.identity] Sign -> DEBU 2f97 Sign: digest: 11880CBF20E9DB2890F54E010AACD2C7F187ED0030E16E6018FEB365E8332922 " -peer0.org1.example.com | "2019-07-20 02:40:32.269 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f98 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:32.269 UTC [msp.identity] Sign -> DEBU 2f99 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:32.269 UTC [msp.identity] Sign -> DEBU 2f9a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:32.269 UTC [msp] DeserializeIdentity -> DEBU 2f9b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.269 UTC [gossip.comm] Send -> DEBU 2f9c Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [msp] DeserializeIdentity -> DEBU 2f9d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] Send -> DEBU 2f9e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] Send -> DEBU 2f9f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.271 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.273 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.273 UTC [gossip.comm] func1 -> DEBU 2fa7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.272 UTC [gossip.comm] func1 -> DEBU 2fa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2fa8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2fa9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2faa Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.274 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.274 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fac Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fad Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| -peer0.org1.example.com | 00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" -peer0.org1.example.com | "2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fae Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| -peer0.org1.example.com | 00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| -peer0.org1.example.com | 00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| -peer0.org1.example.com | 00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| -peer0.org1.example.com | 00000040 2f 63 20 e5 1e f8 |/c ...|" -peer0.org1.example.com | "2019-07-20 02:40:32.275 UTC [gossip.comm] func1 -> DEBU 2faf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fb0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:32.276 UTC [msp.identity] Verify -> DEBU 2fb1 Verify: sig = 00000000 30 44 02 20 02 0e 0b f7 41 03 4f 30 6b c2 7e 44 |0D. ....A.O0k.~D| -peer0.org1.example.com | 00000010 e6 e7 27 82 f5 81 a2 72 0e 8c 08 b3 3b 39 9e 10 |..'....r....;9..| -peer0.org1.example.com | 00000020 37 a2 5f 39 02 20 7b 0d 90 0c 12 0b 34 94 7f 69 |7._9. {.....4..i| -peer0.org1.example.com | 00000030 16 b8 7f 74 d7 c8 92 18 39 d4 02 65 b9 e2 06 33 |...t....9..e...3| -peer0.org1.example.com | 00000040 7d 37 1e 54 64 9f |}7.Td.|" -peer0.org1.example.com | "2019-07-20 02:40:32.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fb2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.277 UTC [gossip.discovery] isSentByMe -> DEBU 2fb3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fb4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.278 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.278 UTC [gossip.gossip] handleMessage -> DEBU 2fb6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.278 UTC [gossip.gossip] handleMessage -> DEBU 2fb7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 2fb8 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:32.279 UTC [msp.identity] Sign -> DEBU 2fba Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151025 " -peer0.org1.example.com | "2019-07-20 02:40:32.279 UTC [msp.identity] Sign -> DEBU 2fbb Sign: digest: 8009FFDB913E4C620E5BA94DB01E28E781CF96B1CDF79A2614F455E82EFAB0DD " -peer0.org1.example.com | "2019-07-20 02:40:32.279 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 2fbc Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:32.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fbd Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:32.280 UTC [msp.identity] Sign -> DEBU 2fbe Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:32.280 UTC [msp.identity] Sign -> DEBU 2fbf Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:32.280 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2fc0 Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:32.281 UTC [msp.identity] Verify -> DEBU 2fc1 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| -peer0.org1.example.com | 00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" -peer0.org1.example.com | "2019-07-20 02:40:32.281 UTC [msp.identity] Verify -> DEBU 2fc2 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| -peer0.org1.example.com | 00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| -peer0.org1.example.com | 00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| -peer0.org1.example.com | 00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| -peer0.org1.example.com | 00000040 26 61 82 2d 44 90 |&a.-D.|" -peer0.org1.example.com | "2019-07-20 02:40:32.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fc3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fc4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fc5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:32.282 UTC [msp.identity] Verify -> DEBU 2fc6 Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| -peer0.org1.example.com | 00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" -peer0.org1.example.com | "2019-07-20 02:40:32.283 UTC [msp.identity] Verify -> DEBU 2fc7 Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| -peer0.org1.example.com | 00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| -peer0.org1.example.com | 00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| -peer0.org1.example.com | 00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| -peer0.org1.example.com | 00000040 2f 63 20 e5 1e f8 |/c ...|" -peer0.org1.example.com | "2019-07-20 02:40:32.283 UTC [msp] DeserializeIdentity -> DEBU 2fc8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.283 UTC [msp] DeserializeIdentity -> DEBU 2fc9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fca Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.283 UTC [gossip.discovery] isSentByMe -> DEBU 2fcb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fcc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fcd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fd0 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:32.284 UTC [gossip.comm] Send -> DEBU 2fce Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.285 UTC [msp] DeserializeIdentity -> DEBU 2fd1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.285 UTC [gossip.comm] Send -> DEBU 2fd2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.285 UTC [msp] DeserializeIdentity -> DEBU 2fd3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.285 UTC [msp.identity] Verify -> DEBU 2fd4 Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| -peer0.org1.example.com | 00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" -peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [msp.identity] Verify -> DEBU 2fd5 Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| -peer0.org1.example.com | 00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| -peer0.org1.example.com | 00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| -peer0.org1.example.com | 00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| -peer0.org1.example.com | 00000040 2f 63 20 e5 1e f8 |/c ...|" -peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [gossip.comm] Send -> DEBU 2fd6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fdb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fdc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fde Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fda Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.287 UTC [gossip.discovery] isSentByMe -> DEBU 2fdf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fe0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fe1 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:32.288 UTC [msp] DeserializeIdentity -> DEBU 2fe2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fe3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe4 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe5 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.289 UTC [policies] Evaluate -> DEBU 2fe6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.289 UTC [policies] Evaluate -> DEBU 2fe7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.290 UTC [policies] Evaluate -> DEBU 2fe8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.290 UTC [cauthdsl] func1 -> DEBU 2fe9 0xc00019d7a0 gate 1563590432290108200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.287 UTC [gossip.gossip] handleMessage -> DEBU 2fdd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.290 UTC [cauthdsl] func2 -> DEBU 2fea 0xc00019d7a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.292 UTC [cauthdsl] func2 -> DEBU 2feb 0xc00019d7a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.293 UTC [cauthdsl] func2 -> DEBU 2fec 0xc00019d7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:32.293 UTC [cauthdsl] func2 -> DEBU 2fed 0xc00019d7a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.293 UTC [cauthdsl] func1 -> DEBU 2fee 0xc00019d7a0 gate 1563590432290108200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.293 UTC [policies] Evaluate -> DEBU 2fef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [policies] Evaluate -> DEBU 2ff0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [policies] Evaluate -> DEBU 2ff1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [cauthdsl] func1 -> DEBU 2ff2 0xc00042a050 gate 1563590432294502100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff3 0xc00042a050 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff4 0xc00042a050 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff5 0xc00042a050 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.295 UTC [msp.identity] Verify -> DEBU 2ff6 Verify: digest = 00000000 40 2b f7 73 71 07 be 3d 8d 3a 01 a9 b4 d9 fe 90 |@+.sq..=.:......| -peer0.org1.example.com | 00000010 6a c1 c7 c4 33 6e df 0b 76 66 29 af 56 ed 7d 4b |j...3n..vf).V.}K|" -peer0.org1.example.com | "2019-07-20 02:40:32.295 UTC [msp.identity] Verify -> DEBU 2ff7 Verify: sig = 00000000 30 45 02 21 00 fa 09 c8 75 e9 29 5a 14 9b e7 0e |0E.!....u.)Z....| -peer0.org1.example.com | 00000010 f7 c6 4f 84 1c 13 a9 62 61 1b b7 fb 37 3c d6 d3 |..O....ba...7<..| -peer0.org1.example.com | 00000020 69 a4 91 ec 0e 02 20 37 8d c7 64 07 a9 83 4d de |i..... 7..d...M.| -peer0.org1.example.com | 00000030 20 7b 6c 93 82 bc 01 d2 47 d7 f6 50 ad 2c 70 72 | {l.....G..P.,pr| -peer0.org1.example.com | 00000040 73 f1 a6 87 33 15 00 |s...3..|" -peer0.org1.example.com | "2019-07-20 02:40:32.295 UTC [cauthdsl] func2 -> DEBU 2ff8 0xc00042a050 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.295 UTC [cauthdsl] func1 -> DEBU 2ff9 0xc00042a050 gate 1563590432294502100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.296 UTC [policies] Evaluate -> DEBU 2ffa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffc Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ffe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fff Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.299 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3000 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:32.300 UTC [msp.identity] Verify -> DEBU 3001 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| -peer0.org1.example.com | 00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" -peer0.org1.example.com | "2019-07-20 02:40:32.300 UTC [msp.identity] Verify -> DEBU 3002 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| -peer0.org1.example.com | 00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| -peer0.org1.example.com | 00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| -peer0.org1.example.com | 00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| -peer0.org1.example.com | 00000040 26 61 82 2d 44 90 |&a.-D.|" -peer0.org1.example.com | "2019-07-20 02:40:32.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 3003 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.303 UTC [gossip.discovery] handleAliveMessage -> DEBU 3004 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.303 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3005 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.333 UTC [gossip.comm] func1 -> DEBU 3006 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.335 UTC [gossip.gossip] handleMessage -> DEBU 3007 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.335 UTC [gossip.pull] HandleMessage -> DEBU 3008 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.335 UTC [gossip.pull] SendDigest -> DEBU 3009 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:32.335 UTC [gossip.gossip] handleMessage -> DEBU 300a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.340 UTC [gossip.comm] func1 -> DEBU 300b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.340 UTC [gossip.gossip] handleMessage -> DEBU 300c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.340 UTC [gossip.gossip] handleMessage -> DEBU 300d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 300e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 300f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:32.342 UTC [msp.identity] Verify -> DEBU 3010 Verify: digest = 00000000 3a ad df f3 f8 21 1b 66 29 6b 93 bb b0 c7 a9 21 |:....!.f)k.....!| -peer0.org1.example.com | 00000010 46 2b bb 2d 1d d2 a4 ed fe 33 aa 85 73 15 bf db |F+.-.....3..s...|" -peer0.org1.example.com | "2019-07-20 02:40:32.342 UTC [msp.identity] Verify -> DEBU 3011 Verify: sig = 00000000 30 44 02 20 2e e6 c6 e9 6a 39 29 84 0d 01 e4 17 |0D. ....j9).....| -peer0.org1.example.com | 00000010 3b cd 3a 85 91 34 dd 08 ce 3a 69 bd 38 8a bc 58 |;.:..4...:i.8..X| -peer0.org1.example.com | 00000020 4c 26 68 2d 02 20 50 b3 06 d9 47 f8 a1 69 f9 fc |L&h-. P...G..i..| -peer0.org1.example.com | 00000030 f0 d3 c4 6f 96 ad 6a 95 06 b1 09 08 7f cb 32 2e |...o..j.......2.| -peer0.org1.example.com | 00000040 03 99 3a 23 cf 54 |..:#.T|" -peer0.org1.example.com | "2019-07-20 02:40:32.343 UTC [gossip.discovery] handleAliveMessage -> DEBU 3012 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3013 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3014 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3015 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3016 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3017 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.346 UTC [gossip.discovery] handleAliveMessage -> DEBU 3018 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.346 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3019 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.347 UTC [gossip.comm] func1 -> DEBU 301a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.347 UTC [gossip.gossip] handleMessage -> DEBU 301b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.347 UTC [gossip.gossip] handleMessage -> DEBU 301c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.348 UTC [gossip.discovery] handleMsgFromComm -> DEBU 301d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.348 UTC [gossip.discovery] handleMsgFromComm -> DEBU 301e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.348 UTC [msp] DeserializeIdentity -> DEBU 301f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.349 UTC [msp] DeserializeIdentity -> DEBU 3020 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.349 UTC [gossip.comm] Send -> DEBU 3021 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.349 UTC [msp] DeserializeIdentity -> DEBU 3022 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.349 UTC [gossip.comm] Send -> DEBU 3023 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3024 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3025 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3026 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3027 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.357 UTC [gossip.comm] func1 -> DEBU 3028 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.357 UTC [gossip.gossip] handleMessage -> DEBU 3029 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.358 UTC [gossip.gossip] handleMessage -> DEBU 302a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.358 UTC [gossip.discovery] handleMsgFromComm -> DEBU 302b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.359 UTC [gossip.discovery] handleMsgFromComm -> DEBU 302c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.361 UTC [gossip.comm] func1 -> DEBU 302d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.361 UTC [gossip.gossip] handleMessage -> DEBU 302e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.361 UTC [gossip.gossip] handleMessage -> DEBU 302f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.363 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3030 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.363 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3031 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:32.364 UTC [msp.identity] Verify -> DEBU 3032 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| -peer0.org1.example.com | 00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" -peer0.org1.example.com | "2019-07-20 02:40:32.364 UTC [msp.identity] Verify -> DEBU 3033 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| -peer0.org1.example.com | 00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| -peer0.org1.example.com | 00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| -peer0.org1.example.com | 00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| -peer0.org1.example.com | 00000040 b4 3a 38 0a 45 dc |.:8.E.|" -peer0.org1.example.com | "2019-07-20 02:40:32.365 UTC [msp.identity] Verify -> DEBU 3034 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:32.366 UTC [msp.identity] Verify -> DEBU 3035 Verify: sig = 00000000 30 45 02 21 00 d7 b3 77 b9 9c a8 b7 cf 62 94 14 |0E.!...w.....b..| -peer0.org1.example.com | 00000010 1e 48 d0 65 39 ba 66 d5 56 10 15 e8 3a 6c d0 4b |.H.e9.f.V...:l.K| -peer0.org1.example.com | 00000020 5a 40 9d bd 3d 02 20 40 35 bb 23 40 27 a8 c3 2b |Z@..=. @5.#@'..+| -peer0.org1.example.com | 00000030 fa 62 36 d6 d0 83 75 12 06 71 21 86 8a 1b 62 d4 |.b6...u..q!...b.| -peer0.org1.example.com | 00000040 b5 0a 81 7a bb ca 3a |...z..:|" -peer0.org1.example.com | "2019-07-20 02:40:32.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 3036 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 3037 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:32.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 3038 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 303d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 303e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.366 UTC [endorser] ProcessProposal -> DEBU 3039 Entering: request from 172.18.0.9:58416" -peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [protoutils] ValidateProposalMessage -> DEBU 3040 ValidateProposalMessage starts for signed proposal 0xc000193f40" -peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [gossip.discovery] sendMemResponse -> DEBU 303f Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [protoutils] validateChannelHeader -> DEBU 3041 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3042 begin" -peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [msp] DeserializeIdentity -> DEBU 3043 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [msp] GetManagerForChain -> DEBU 3044 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3045 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3047 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:32.369 UTC [msp.identity] Verify -> DEBU 3048 Verify: digest = 00000000 e3 1b 8c 63 39 bc 00 d4 f5 b2 a3 1d 7d d3 0f a3 |...c9.......}...| -peer0.org1.example.com | 00000010 ae 8d fc ba dd af 14 e9 c1 34 c8 93 af 43 1c 75 |.........4...C.u|" -peer0.org1.example.com | "2019-07-20 02:40:32.369 UTC [msp.identity] Verify -> DEBU 3049 Verify: sig = 00000000 30 45 02 21 00 e7 fa f0 2a cd b9 76 e3 3a bb 6d |0E.!....*..v.:.m| -peer0.org1.example.com | 00000010 c6 32 06 b5 16 3b 03 de 3d aa 28 33 f4 6f 6b da |.2...;..=.(3.ok.| -peer0.org1.example.com | 00000020 b0 76 96 0b f9 02 20 64 6b c9 76 46 8b d4 8e 22 |.v.... dk.vF..."| -peer0.org1.example.com | 00000030 03 f9 c9 24 cc 48 f5 e4 4c 3b 09 09 ad 0b df 46 |...$.H..L;.....F| -peer0.org1.example.com | 00000040 78 fa ad 48 80 25 b3 |x..H.%.|" -peer0.org1.example.com | "2019-07-20 02:40:32.369 UTC [protoutils] checkSignatureFromCreator -> DEBU 304a exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:32.369 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304b validateChaincodeProposalMessage starts for proposal 0xc00015fc00, header 0xc0003b4780" -peer0.org1.example.com | "2019-07-20 02:40:32.369 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304c validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [msp] DeserializeIdentity -> DEBU 3046 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [endorser] preProcess -> DEBU 304d [businesschannel][334c0366] processing txid: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed" -peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 304f retrieveTransactionByID() - txId = [334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed]" -peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [endorser] SimulateProposal -> DEBU 3050 [businesschannel][334c0366] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [endorser] callChaincode -> INFO 3051 [businesschannel][334c0366] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [chaincode] Execute -> DEBU 3052 Entry" -peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [gossip.comm] Send -> DEBU 304e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [cscc] Invoke -> DEBU 3053 Invoke function: GetConfigBlock" -peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [aclmgmt] CheckACL -> DEBU 3054 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" -peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [aclmgmt] CheckACL -> DEBU 3055 acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [gossip.discovery] sendMemResponse -> DEBU 3056 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " -peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [policies] Evaluate -> DEBU 3057 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.372 UTC [policies] Evaluate -> DEBU 3059 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.372 UTC [policies] Evaluate -> DEBU 305a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.372 UTC [cauthdsl] func1 -> DEBU 305b 0xc00027f080 gate 1563590432372481400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.372 UTC [cauthdsl] func2 -> DEBU 305c 0xc00027f080 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.373 UTC [cauthdsl] func2 -> DEBU 305d 0xc00027f080 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [gossip.comm] sendToEndpoint -> DEBU 3058 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.373 UTC [cauthdsl] func2 -> DEBU 305e 0xc00027f080 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.373 UTC [msp.identity] Verify -> DEBU 3060 Verify: digest = 00000000 e3 1b 8c 63 39 bc 00 d4 f5 b2 a3 1d 7d d3 0f a3 |...c9.......}...| -peer0.org1.example.com | 00000010 ae 8d fc ba dd af 14 e9 c1 34 c8 93 af 43 1c 75 |.........4...C.u|" -peer0.org1.example.com | "2019-07-20 02:40:32.373 UTC [msp.identity] Verify -> DEBU 3061 Verify: sig = 00000000 30 45 02 21 00 e7 fa f0 2a cd b9 76 e3 3a bb 6d |0E.!....*..v.:.m| -peer0.org1.example.com | 00000010 c6 32 06 b5 16 3b 03 de 3d aa 28 33 f4 6f 6b da |.2...;..=.(3.ok.| -peer0.org1.example.com | 00000020 b0 76 96 0b f9 02 20 64 6b c9 76 46 8b d4 8e 22 |.v.... dk.vF..."| -peer0.org1.example.com | 00000030 03 f9 c9 24 cc 48 f5 e4 4c 3b 09 09 ad 0b df 46 |...$.H..L;.....F| -peer0.org1.example.com | 00000040 78 fa ad 48 80 25 b3 |x..H.%.|" -peer0.org1.example.com | "2019-07-20 02:40:32.374 UTC [cauthdsl] func2 -> DEBU 3062 0xc00027f080 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.374 UTC [cauthdsl] func1 -> DEBU 3063 0xc00027f080 gate 1563590432372481400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.373 UTC [gossip.comm] sendToEndpoint -> DEBU 305f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.374 UTC [policies] Evaluate -> DEBU 3064 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3065 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3066 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3067 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.375 UTC [chaincode] handleMessage -> DEBU 3068 [334c0366] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:32.376 UTC [chaincode] Notify -> DEBU 3069 [334c0366] notifying Txid:334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:32.376 UTC [chaincode] Execute -> DEBU 306a Exit" -peer0.org1.example.com | "2019-07-20 02:40:32.376 UTC [endorser] callChaincode -> INFO 306b [businesschannel][334c0366] Exit chaincode: name:"cscc" (6ms)" -peer0.org1.example.com | "2019-07-20 02:40:32.376 UTC [endorser] SimulateProposal -> DEBU 306c [businesschannel][334c0366] Exit" -peer0.org1.example.com | "2019-07-20 02:40:32.377 UTC [endorser] endorseProposal -> DEBU 306d [businesschannel][334c0366] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:40:32.377 UTC [endorser] endorseProposal -> DEBU 306e [businesschannel][334c0366] escc for chaincode name:"cscc" is escc" -peer0.org1.example.com | "2019-07-20 02:40:32.377 UTC [endorser] EndorseWithPlugin -> DEBU 306f Entering endorsement for {plugin: escc, channel: businesschannel, tx: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, chaincode: cscc}" -peer0.org1.example.com | "2019-07-20 02:40:32.377 UTC [msp.identity] Sign -> DEBU 3070 Sign: plaintext: 0A20C5D1BC40D3FB83F8358FF9F638BD...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:32.377 UTC [msp.identity] Sign -> DEBU 3071 Sign: digest: 0D1E7E24711E974B88D241D66A8434CBF47F1068E52FEF7D15CD5BA472B2DBFF " -peer0.org1.example.com | "2019-07-20 02:40:32.378 UTC [endorser] EndorseWithPlugin -> DEBU 3072 Exiting {plugin: escc, channel: businesschannel, tx: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, chaincode: cscc}" -peer0.org1.example.com | "2019-07-20 02:40:32.378 UTC [endorser] endorseProposal -> DEBU 3073 [businesschannel][334c0366] Exit" -peer0.org1.example.com | "2019-07-20 02:40:32.378 UTC [endorser] func1 -> DEBU 3074 Exit: request from 172.18.0.9:58416" -peer0.org1.example.com | "2019-07-20 02:40:32.378 UTC [comm.grpc.server] 1 -> INFO 3075 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58416 grpc.code=OK grpc.call_duration=12.304ms -peer0.org1.example.com | "2019-07-20 02:40:32.386 UTC [grpc] infof -> DEBU 3076 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:32.387 UTC [grpc] infof -> DEBU 3077 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:32.522 UTC [gossip.comm] func1 -> DEBU 3078 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [gossip.gossip] handleMessage -> DEBU 3079 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [gossip.pull] HandleMessage -> DEBU 307a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 3080 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [gossip.pull] SendDigest -> DEBU 3081 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [gossip.gossip] handleMessage -> DEBU 3082 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.526 UTC [gossip.comm] func1 -> DEBU 3083 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [gossip.gossip] handleMessage -> DEBU 3084 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [gossip.gossip] handleMessage -> DEBU 3085 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3086 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3087 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [msp] DeserializeIdentity -> DEBU 3088 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3089 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 308a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 308b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 308f 0xc0005866d0 gate 1563590432528178000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3090 0xc0005866d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3091 0xc0005866d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3092 0xc0005866d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3093 0xc0005866d0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 3094 0xc0005866d0 gate 1563590432528178000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3095 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3096 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3097 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 3098 0xc000586f10 gate 1563590432528554400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3099 0xc000586f10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 309a 0xc000586f10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 309b 0xc000586f10 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [msp.identity] Verify -> DEBU 309c Verify: digest = 00000000 75 6b 5a 52 d7 9b 9c d1 44 a1 76 b9 44 34 63 21 |ukZR....D.v.D4c!| -peer0.org1.example.com | 00000010 86 cb 91 26 5b 43 76 58 40 1e 88 3d 21 f8 e0 dd |...&[CvX@..=!...|" -peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [msp.identity] Verify -> DEBU 309d Verify: sig = 00000000 30 44 02 20 79 1d 35 71 ba 2e 6f 5e 9c a6 04 a9 |0D. y.5q..o^....| -peer0.org1.example.com | 00000010 22 a8 43 04 e4 cf 7d bd 7a 24 a9 62 17 04 48 f9 |".C...}.z$.b..H.| -peer0.org1.example.com | 00000020 df 3a a5 c2 02 20 4e a2 d3 80 b7 b7 43 df db 5d |.:... N.....C..]| -peer0.org1.example.com | 00000030 7c 93 b9 73 1c e2 93 90 04 1c d9 f3 a7 9c 62 a3 ||..s..........b.| -peer0.org1.example.com | 00000040 ad fe ce c4 0b 32 |.....2|" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [cauthdsl] func2 -> DEBU 309e 0xc000586f10 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [cauthdsl] func1 -> DEBU 309f 0xc000586f10 gate 1563590432528554400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 30a4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a6 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a7 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 30aa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ab Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ac Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ad Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ae Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.538 UTC [gossip.comm] func1 -> DEBU 30af Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.comm] func1 -> DEBU 30b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.543 UTC [gossip.comm] func1 -> DEBU 30b9 Got message: GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.543 UTC [gossip.gossip] handleMessage -> DEBU 30ba Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.543 UTC [gossip.gossip] handleMessage -> DEBU 30bb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30bc Got message: GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.543 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30bd Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:32.544 UTC [msp] DeserializeIdentity -> DEBU 30be Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 30bf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30c0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30c1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [cauthdsl] func1 -> DEBU 30c5 0xc0006bb3e0 gate 1563590432546561200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c6 0xc0006bb3e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c7 0xc0006bb3e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c8 0xc0006bb3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30c9 0xc0006bb3e0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [cauthdsl] func1 -> DEBU 30ca 0xc0006bb3e0 gate 1563590432546561200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [cauthdsl] func1 -> DEBU 30ce 0xc0006bbc60 gate 1563590432547577600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30cf 0xc0006bbc60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30d0 0xc0006bbc60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.548 UTC [cauthdsl] func2 -> DEBU 30d1 0xc0006bbc60 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.548 UTC [msp.identity] Verify -> DEBU 30d2 Verify: digest = 00000000 d2 d4 95 34 c5 7c dd ee c2 94 69 b1 d1 26 4c d7 |...4.|....i..&L.| -peer0.org1.example.com | 00000010 40 ff ea 97 8d 6f 55 a3 e4 ff 62 0d 3e 07 5e ef |@....oU...b.>.^.|" -peer0.org1.example.com | "2019-07-20 02:40:32.548 UTC [msp.identity] Verify -> DEBU 30d3 Verify: sig = 00000000 30 45 02 21 00 f3 38 c9 26 96 2b 11 5d 0b 81 e2 |0E.!..8.&.+.]...| -peer0.org1.example.com | 00000010 04 af 5e 83 86 28 b7 3e 16 29 cd 2e 39 ff 8a c0 |..^..(.>.)..9...| -peer0.org1.example.com | 00000020 22 4b 64 33 65 02 20 46 9d 23 cf 2f 09 f4 e8 9f |"Kd3e. F.#./....| -peer0.org1.example.com | 00000030 51 37 80 5d 43 19 94 67 36 d7 f3 1a 4d 7d cf a7 |Q7.]C..g6...M}..| -peer0.org1.example.com | 00000040 a7 1d 12 7a d0 f4 9a |...z...|" -peer0.org1.example.com | "2019-07-20 02:40:32.549 UTC [cauthdsl] func2 -> DEBU 30d4 0xc0006bbc60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.549 UTC [cauthdsl] func1 -> DEBU 30d5 0xc0006bbc60 gate 1563590432547577600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.554 UTC [msp] DeserializeIdentity -> DEBU 30d8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d9 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.555 UTC [policies] Evaluate -> DEBU 30db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.555 UTC [gossip.discovery] handleAliveMessage -> DEBU 30dc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.555 UTC [msp] DeserializeIdentity -> DEBU 30da Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.556 UTC [msp] DeserializeIdentity -> DEBU 30dd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.557 UTC [gossip.comm] Send -> DEBU 30de Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.558 UTC [msp] DeserializeIdentity -> DEBU 30df Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.558 UTC [msp] DeserializeIdentity -> DEBU 30e0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.558 UTC [gossip.comm] Send -> DEBU 30e1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e4 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e7 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.562 UTC [gossip.comm] sendToEndpoint -> DEBU 30ea Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 30eb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ec Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.564 UTC [gossip.discovery] sendMemResponse -> DEBU 30ed Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:32.564 UTC [msp] DeserializeIdentity -> DEBU 30ee Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.566 UTC [msp] DeserializeIdentity -> DEBU 30ef Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.567 UTC [msp] DeserializeIdentity -> DEBU 30f0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.567 UTC [gossip.comm] Send -> DEBU 30f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.568 UTC [gossip.discovery] sendMemResponse -> DEBU 30f2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" > alive:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > alive:\304:w\006I\255\0065\032K\207\036" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " -peer0.org1.example.com | "2019-07-20 02:40:32.568 UTC [gossip.comm] sendToEndpoint -> DEBU 30f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.568 UTC [gossip.comm] sendToEndpoint -> DEBU 30f4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.682 UTC [msp] DeserializeIdentity -> DEBU 30f5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.682 UTC [msp] DeserializeIdentity -> DEBU 30f6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] Send -> DEBU 30f7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30f8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30f9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.685 UTC [gossip.comm] sendToEndpoint -> DEBU 30fd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.685 UTC [gossip.comm] func1 -> DEBU 30fe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.685 UTC [gossip.gossip] handleMessage -> DEBU 30ff Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.686 UTC [msp] DeserializeIdentity -> DEBU 3100 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.686 UTC [gossip.comm] func1 -> DEBU 3101 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.688 UTC [gossip.comm] func1 -> DEBU 3102 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.693 UTC [msp] DeserializeIdentity -> DEBU 3103 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3104 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [gossip.comm] Send -> DEBU 3105 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3106 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3107 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [gossip.comm] sendToEndpoint -> DEBU 3108 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [gossip.comm] sendToEndpoint -> DEBU 3109 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.696 UTC [msp.identity] Verify -> DEBU 310e Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| -peer0.org1.example.com | 00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" -peer0.org1.example.com | "2019-07-20 02:40:32.696 UTC [msp.identity] Verify -> DEBU 310f Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| -peer0.org1.example.com | 00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| -peer0.org1.example.com | 00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| -peer0.org1.example.com | 00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| -peer0.org1.example.com | 00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" -peer0.org1.example.com | "2019-07-20 02:40:32.697 UTC [msp.identity] Verify -> DEBU 3110 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 3111 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -peer0.org1.example.com | "2019-07-20 02:40:32.704 UTC [msp] DeserializeIdentity -> DEBU 3112 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.708 UTC [msp] DeserializeIdentity -> DEBU 3113 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3114 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:32.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3115 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3116 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.712 UTC [policies] Evaluate -> DEBU 3117 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.712 UTC [policies] Evaluate -> DEBU 3118 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.713 UTC [policies] Evaluate -> DEBU 3119 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.713 UTC [cauthdsl] func1 -> DEBU 311a 0xc0007d57f0 gate 1563590432713529700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.713 UTC [cauthdsl] func2 -> DEBU 311b 0xc0007d57f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311c 0xc0007d57f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311d 0xc0007d57f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311e 0xc0007d57f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.714 UTC [cauthdsl] func1 -> DEBU 311f 0xc0007d57f0 gate 1563590432713529700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.714 UTC [policies] Evaluate -> DEBU 3120 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [policies] Evaluate -> DEBU 3121 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [policies] Evaluate -> DEBU 3122 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [cauthdsl] func1 -> DEBU 3123 0xc00289c050 gate 1563590432715391700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3124 0xc00289c050 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3125 0xc00289c050 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3126 0xc00289c050 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.716 UTC [msp.identity] Verify -> DEBU 3127 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| -peer0.org1.example.com | 00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" -peer0.org1.example.com | "2019-07-20 02:40:32.716 UTC [msp.identity] Verify -> DEBU 3128 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| -peer0.org1.example.com | 00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 3129 0xc00289c050 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.716 UTC [cauthdsl] func1 -> DEBU 312a 0xc00289c050 gate 1563590432715391700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.716 UTC [policies] Evaluate -> DEBU 312b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [msp] DeserializeIdentity -> DEBU 312f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [msp] DeserializeIdentity -> DEBU 3130 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3131 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3132 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3133 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.718 UTC [policies] Evaluate -> DEBU 3134 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.718 UTC [policies] Evaluate -> DEBU 3135 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.719 UTC [policies] Evaluate -> DEBU 3136 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.719 UTC [cauthdsl] func1 -> DEBU 3137 0xc00289d970 gate 1563590432719715300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 3138 0xc00289d970 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 3139 0xc00289d970 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 313a 0xc00289d970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 313b 0xc00289d970 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.721 UTC [cauthdsl] func1 -> DEBU 313c 0xc00289d970 gate 1563590432719715300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [cauthdsl] func1 -> DEBU 3140 0xc002932230 gate 1563590432722409700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3141 0xc002932230 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3142 0xc002932230 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3143 0xc002932230 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [msp.identity] Verify -> DEBU 3144 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [msp.identity] Verify -> DEBU 3145 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [cauthdsl] func2 -> DEBU 3146 0xc002932230 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [cauthdsl] func1 -> DEBU 3147 0xc002932230 gate 1563590432722409700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 3148 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 3149 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 314a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 314b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [msp] DeserializeIdentity -> DEBU 314c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 314d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 314e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 314f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 3150 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 3151 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func1 -> DEBU 3152 0xc002933360 gate 1563590432725069500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3153 0xc002933360 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3154 0xc002933360 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3155 0xc002933360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3156 0xc002933360 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func1 -> DEBU 3157 0xc002933360 gate 1563590432725069500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [policies] Evaluate -> DEBU 3158 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [policies] Evaluate -> DEBU 3159 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.726 UTC [policies] Evaluate -> DEBU 315a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.727 UTC [cauthdsl] func1 -> DEBU 315b 0xc002933ba0 gate 1563590432727412100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.728 UTC [cauthdsl] func2 -> DEBU 315c 0xc002933ba0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.728 UTC [cauthdsl] func2 -> DEBU 315d 0xc002933ba0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.729 UTC [cauthdsl] func2 -> DEBU 315e 0xc002933ba0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.729 UTC [msp.identity] Verify -> DEBU 315f Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:32.729 UTC [msp.identity] Verify -> DEBU 3160 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:32.729 UTC [cauthdsl] func2 -> DEBU 3161 0xc002933ba0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.729 UTC [cauthdsl] func1 -> DEBU 3162 0xc002933ba0 gate 1563590432727412100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3163 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3164 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3165 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3166 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [gossip.gossip] handleMessage -> DEBU 3167 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [gossip.gossip] handleMessage -> DEBU 3168 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [msp] DeserializeIdentity -> DEBU 3169 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.731 UTC [msp.identity] Verify -> DEBU 316a Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| -peer0.org1.example.com | 00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" -peer0.org1.example.com | "2019-07-20 02:40:32.731 UTC [msp.identity] Verify -> DEBU 316b Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| -peer0.org1.example.com | 00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| -peer0.org1.example.com | 00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| -peer0.org1.example.com | 00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| -peer0.org1.example.com | 00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" -peer0.org1.example.com | "2019-07-20 02:40:32.732 UTC [msp.identity] Verify -> DEBU 316c Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 316d Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -peer0.org1.example.com | "2019-07-20 02:40:32.733 UTC [msp] DeserializeIdentity -> DEBU 316e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.733 UTC [msp] DeserializeIdentity -> DEBU 316f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3170 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3171 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3172 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3173 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3174 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3175 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [cauthdsl] func1 -> DEBU 3176 0xc0029d46a0 gate 1563590432734680100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [cauthdsl] func2 -> DEBU 3177 0xc0029d46a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [cauthdsl] func2 -> DEBU 3178 0xc0029d46a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.737 UTC [msp] DeserializeIdentity -> DEBU 3179 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.741 UTC [msp] DeserializeIdentity -> DEBU 317a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.741 UTC [gossip.pull] Hello -> DEBU 317b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:32.741 UTC [msp] DeserializeIdentity -> DEBU 317c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.742 UTC [msp] DeserializeIdentity -> DEBU 317d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.743 UTC [gossip.comm] Send -> DEBU 317e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:32.744 UTC [gossip.comm] sendToEndpoint -> DEBU 317f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3180 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.740 UTC [cauthdsl] func2 -> DEBU 3181 0xc0029d46a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:32.747 UTC [cauthdsl] func2 -> DEBU 3182 0xc0029d46a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.749 UTC [cauthdsl] func1 -> DEBU 3183 0xc0029d46a0 gate 1563590432734680100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.749 UTC [policies] Evaluate -> DEBU 3185 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.749 UTC [gossip.comm] func1 -> DEBU 3184 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.751 UTC [policies] Evaluate -> DEBU 3186 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.752 UTC [policies] Evaluate -> DEBU 3187 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.752 UTC [cauthdsl] func1 -> DEBU 3188 0xc0029d4ee0 gate 1563590432752494900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.752 UTC [cauthdsl] func2 -> DEBU 3189 0xc0029d4ee0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.752 UTC [cauthdsl] func2 -> DEBU 318a 0xc0029d4ee0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.753 UTC [cauthdsl] func2 -> DEBU 318b 0xc0029d4ee0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.753 UTC [msp.identity] Verify -> DEBU 318c Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -peer0.org1.example.com | "2019-07-20 02:40:32.753 UTC [msp.identity] Verify -> DEBU 318d Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" -peer0.org1.example.com | "2019-07-20 02:40:32.754 UTC [cauthdsl] func2 -> DEBU 318e 0xc0029d4ee0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.755 UTC [cauthdsl] func1 -> DEBU 318f 0xc0029d4ee0 gate 1563590432752494900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.755 UTC [policies] Evaluate -> DEBU 3190 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.756 UTC [policies] Evaluate -> DEBU 3191 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.757 UTC [policies] Evaluate -> DEBU 3192 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.757 UTC [policies] Evaluate -> DEBU 3193 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.757 UTC [msp] DeserializeIdentity -> DEBU 3194 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.757 UTC [msp] DeserializeIdentity -> DEBU 3195 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3196 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:32.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3197 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3198 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.766 UTC [policies] Evaluate -> DEBU 3199 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.767 UTC [policies] Evaluate -> DEBU 319a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.768 UTC [policies] Evaluate -> DEBU 319b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.769 UTC [cauthdsl] func1 -> DEBU 319c 0xc002a626c0 gate 1563590432769533600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.769 UTC [cauthdsl] func2 -> DEBU 319d 0xc002a626c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.770 UTC [cauthdsl] func2 -> DEBU 319e 0xc002a626c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.770 UTC [cauthdsl] func2 -> DEBU 319f 0xc002a626c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:32.771 UTC [cauthdsl] func2 -> DEBU 31a0 0xc002a626c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.771 UTC [cauthdsl] func1 -> DEBU 31a1 0xc002a626c0 gate 1563590432769533600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.771 UTC [policies] Evaluate -> DEBU 31a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.772 UTC [policies] Evaluate -> DEBU 31a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.773 UTC [policies] Evaluate -> DEBU 31a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.773 UTC [cauthdsl] func1 -> DEBU 31a5 0xc002a63010 gate 1563590432773220600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.773 UTC [cauthdsl] func2 -> DEBU 31a6 0xc002a63010 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.774 UTC [cauthdsl] func2 -> DEBU 31a7 0xc002a63010 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.775 UTC [cauthdsl] func2 -> DEBU 31a8 0xc002a63010 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.775 UTC [msp.identity] Verify -> DEBU 31a9 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:32.775 UTC [msp.identity] Verify -> DEBU 31aa Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:32.776 UTC [cauthdsl] func2 -> DEBU 31ab 0xc002a63010 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.776 UTC [cauthdsl] func1 -> DEBU 31ac 0xc002a63010 gate 1563590432773220600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31af Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.779 UTC [policies] Evaluate -> DEBU 31b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.780 UTC [msp] DeserializeIdentity -> DEBU 31b1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31b2 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31b3 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31b7 0xc002a920f0 gate 1563590432789206000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31b8 0xc002a920f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31b9 0xc002a920f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31ba 0xc002a920f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31bb 0xc002a920f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31bc 0xc002a920f0 gate 1563590432789206000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31bd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31c0 0xc002a92930 gate 1563590432789572500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c1 0xc002a92930 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c2 0xc002a92930 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c3 0xc002a92930 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [msp.identity] Verify -> DEBU 31c4 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [msp.identity] Verify -> DEBU 31c5 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [cauthdsl] func2 -> DEBU 31c6 0xc002a92930 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [cauthdsl] func1 -> DEBU 31c7 0xc002a92930 gate 1563590432789572500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [policies] Evaluate -> DEBU 31c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [policies] Evaluate -> DEBU 31c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.815 UTC [policies] Evaluate -> DEBU 31ca Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.815 UTC [policies] Evaluate -> DEBU 31cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.816 UTC [gossip.gossip] handleMessage -> DEBU 31cc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.816 UTC [gossip.gossip] handleMessage -> DEBU 31cd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.818 UTC [msp.identity] Verify -> DEBU 31ce Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| -peer0.org1.example.com | 00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" -peer0.org1.example.com | "2019-07-20 02:40:32.818 UTC [msp.identity] Verify -> DEBU 31cf Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| -peer0.org1.example.com | 00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| -peer0.org1.example.com | 00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| -peer0.org1.example.com | 00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| -peer0.org1.example.com | 00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" -peer0.org1.example.com | "2019-07-20 02:40:32.820 UTC [msp] DeserializeIdentity -> DEBU 31d0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.820 UTC [msp] DeserializeIdentity -> DEBU 31d1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.822 UTC [policies] Evaluate -> DEBU 31d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.822 UTC [policies] Evaluate -> DEBU 31d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.823 UTC [policies] Evaluate -> DEBU 31d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.824 UTC [cauthdsl] func1 -> DEBU 31d8 0xc002aa0b10 gate 1563590432824014900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.826 UTC [cauthdsl] func2 -> DEBU 31d9 0xc002aa0b10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.826 UTC [cauthdsl] func2 -> DEBU 31da 0xc002aa0b10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [cauthdsl] func2 -> DEBU 31db 0xc002aa0b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [cauthdsl] func2 -> DEBU 31dc 0xc002aa0b10 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [cauthdsl] func1 -> DEBU 31dd 0xc002aa0b10 gate 1563590432824014900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.829 UTC [cauthdsl] func1 -> DEBU 31e1 0xc002aa1350 gate 1563590432829076500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e2 0xc002aa1350 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e3 0xc002aa1350 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e4 0xc002aa1350 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.830 UTC [msp.identity] Verify -> DEBU 31e5 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| -peer0.org1.example.com | 00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" -peer0.org1.example.com | "2019-07-20 02:40:32.830 UTC [msp.identity] Verify -> DEBU 31e6 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| -peer0.org1.example.com | 00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 31e7 0xc002aa1350 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.832 UTC [cauthdsl] func1 -> DEBU 31e8 0xc002aa1350 gate 1563590432829076500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31eb Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.836 UTC [msp] DeserializeIdentity -> DEBU 31ed Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.837 UTC [msp] DeserializeIdentity -> DEBU 31ee Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.837 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [cauthdsl] func1 -> DEBU 31f5 0xc002ed0b50 gate 1563590432838821700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.839 UTC [cauthdsl] func2 -> DEBU 31f6 0xc002ed0b50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.839 UTC [cauthdsl] func2 -> DEBU 31f7 0xc002ed0b50 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.840 UTC [cauthdsl] func2 -> DEBU 31f8 0xc002ed0b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:32.840 UTC [cauthdsl] func2 -> DEBU 31f9 0xc002ed0b50 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.840 UTC [cauthdsl] func1 -> DEBU 31fa 0xc002ed0b50 gate 1563590432838821700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:32.841 UTC [policies] Evaluate -> DEBU 31fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.841 UTC [policies] Evaluate -> DEBU 31fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.861 UTC [policies] Evaluate -> DEBU 31fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.861 UTC [cauthdsl] func1 -> DEBU 31ff 0xc002ed1390 gate 1563590432861553500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.862 UTC [cauthdsl] func2 -> DEBU 3200 0xc002ed1390 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.865 UTC [cauthdsl] func2 -> DEBU 3201 0xc002ed1390 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.850 UTC [gossip.comm] func1 -> DEBU 31fd Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.865 UTC [cauthdsl] func2 -> DEBU 3202 0xc002ed1390 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.868 UTC [msp.identity] Verify -> DEBU 3203 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -peer0.org1.example.com | "2019-07-20 02:40:32.868 UTC [msp.identity] Verify -> DEBU 3204 Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" -peer0.org1.example.com | "2019-07-20 02:40:32.869 UTC [cauthdsl] func2 -> DEBU 3205 0xc002ed1390 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.869 UTC [cauthdsl] func1 -> DEBU 3206 0xc002ed1390 gate 1563590432861553500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3207 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3208 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3209 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 320a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.873 UTC [msp.identity] Verify -> DEBU 320b Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:32.879 UTC [msp.identity] Verify -> DEBU 320c Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 320f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 3210 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 3211 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func1 -> DEBU 3212 0xc002f5cb10 gate 1563590432880334600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3213 0xc002f5cb10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3214 0xc002f5cb10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3215 0xc002f5cb10 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [msp.identity] Verify -> DEBU 3216 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [msp.identity] Verify -> DEBU 3217 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3218 0xc002f5cb10 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func1 -> DEBU 3219 0xc002f5cb10 gate 1563590432880334600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [gossip.gossip] handleMessage -> DEBU 321e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.881 UTC [gossip.gossip] handleMessage -> DEBU 321f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.883 UTC [gossip.comm] func1 -> DEBU 3220 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.884 UTC [gossip.comm] func1 -> DEBU 3221 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.886 UTC [gossip.pull] HandleMessage -> DEBU 3222 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.886 UTC [gossip.gossip] handleMessage -> DEBU 3223 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.886 UTC [gossip.gossip] handleMessage -> DEBU 3224 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.886 UTC [msp] DeserializeIdentity -> DEBU 3225 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.891 UTC [gossip.comm] func1 -> DEBU 3226 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.891 UTC [msp] DeserializeIdentity -> DEBU 3227 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.891 UTC [gossip.comm] func1 -> DEBU 3228 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.892 UTC [gossip.gossip] handleMessage -> DEBU 3229 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.906 UTC [gossip.gossip] handleMessage -> DEBU 322a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.906 UTC [msp.identity] Verify -> DEBU 322b Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:32.908 UTC [msp.identity] Verify -> DEBU 322c Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:32.917 UTC [gossip.gossip] handleMessage -> DEBU 322d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.917 UTC [gossip.gossip] handleMessage -> DEBU 322e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.918 UTC [gossip.pull] HandleMessage -> DEBU 322f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.918 UTC [gossip.pull] SendDigest -> DEBU 3230 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3231 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3232 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [msp.identity] Verify -> DEBU 3233 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [msp.identity] Verify -> DEBU 3234 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [msp] DeserializeIdentity -> DEBU 3235 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3236 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3237 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:32.931 UTC [msp.identity] Verify -> DEBU 3238 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:32.931 UTC [msp.identity] Verify -> DEBU 3239 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:32.931 UTC [msp] DeserializeIdentity -> DEBU 323a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:32.931 UTC [gossip.gossip] handleMessage -> DEBU 323b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:32.997 UTC [endorser] ProcessProposal -> DEBU 323c Entering: request from 172.18.0.9:58420" -peer0.org1.example.com | "2019-07-20 02:40:32.997 UTC [protoutils] ValidateProposalMessage -> DEBU 323d ValidateProposalMessage starts for signed proposal 0xc00080e5f0" -peer0.org1.example.com | "2019-07-20 02:40:32.997 UTC [protoutils] validateChannelHeader -> DEBU 323e validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:32.997 UTC [protoutils] checkSignatureFromCreator -> DEBU 323f begin" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [msp] GetManagerForChain -> DEBU 3240 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [protoutils] checkSignatureFromCreator -> DEBU 3241 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [protoutils] checkSignatureFromCreator -> DEBU 3242 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 3243 Verify: digest = 00000000 8c 8e 59 c1 1a 67 22 ba cb 5d 17 7f 38 30 0d ce |..Y..g"..]..80..| -peer0.org1.example.com | 00000010 66 bb fc ee dc a3 5c 3b 14 72 f7 3e 63 86 d8 18 |f.....\;.r.>c...|" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 3244 Verify: sig = 00000000 30 45 02 21 00 a4 17 dc d8 21 6b 0b cc 0a a3 93 |0E.!.....!k.....| -peer0.org1.example.com | 00000010 d8 b0 72 98 36 a2 3c 42 50 65 8c 68 9f 4f 13 4d |..r.6. DEBU 3245 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3246 validateChaincodeProposalMessage starts for proposal 0xc000407260, header 0xc00080ea50" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3247 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] preProcess -> DEBU 3248 [businesschannel][1bc589c4] processing txid: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3249 retrieveTransactionByID() - txId = [1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53]" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] SimulateProposal -> DEBU 324a [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] callChaincode -> INFO 324b [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [chaincode] Execute -> DEBU 324c Entry" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [cscc] Invoke -> DEBU 324d Invoke function: GetChannels" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 324e Verify: digest = 00000000 8c 8e 59 c1 1a 67 22 ba cb 5d 17 7f 38 30 0d ce |..Y..g"..]..80..| -peer0.org1.example.com | 00000010 66 bb fc ee dc a3 5c 3b 14 72 f7 3e 63 86 d8 18 |f.....\;.r.>c...|" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 324f Verify: sig = 00000000 30 45 02 21 00 a4 17 dc d8 21 6b 0b cc 0a a3 93 |0E.!.....!k.....| -peer0.org1.example.com | 00000010 d8 b0 72 98 36 a2 3c 42 50 65 8c 68 9f 4f 13 4d |..r.6. DEBU 3250 [1bc589c4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [chaincode] Notify -> DEBU 3251 [1bc589c4] notifying Txid:1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, channelID:businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [chaincode] Execute -> DEBU 3252 Exit" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] callChaincode -> INFO 3253 [businesschannel][1bc589c4] Exit chaincode: name:"cscc" (0ms)" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] SimulateProposal -> DEBU 3254 [businesschannel][1bc589c4] Exit" -peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] endorseProposal -> DEBU 3255 [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [endorser] endorseProposal -> DEBU 3256 [businesschannel][1bc589c4] escc for chaincode name:"cscc" is escc" -peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [endorser] EndorseWithPlugin -> DEBU 3257 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, chaincode: cscc}" -peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [msp.identity] Sign -> DEBU 3258 Sign: plaintext: 0A20881317A66318D893408174F0D476...455254494649434154452D2D2D2D2D0A " -peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [msp.identity] Sign -> DEBU 3259 Sign: digest: CC8B57189048DE397745C7CBCF9841266EBCAC1099F471FFCA261265DA217119 " -peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [endorser] EndorseWithPlugin -> DEBU 325a Exiting {plugin: escc, channel: businesschannel, tx: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, chaincode: cscc}" -peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [endorser] endorseProposal -> DEBU 325b [businesschannel][1bc589c4] Exit" -peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [endorser] func1 -> DEBU 325c Exit: request from 172.18.0.9:58420" -peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [comm.grpc.server] 1 -> INFO 325d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58420 grpc.code=OK grpc.call_duration=1.6457ms -peer0.org1.example.com | "2019-07-20 02:40:33.005 UTC [grpc] infof -> DEBU 325e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:33.005 UTC [grpc] infof -> DEBU 325f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:33.008 UTC [gossip.comm] func1 -> DEBU 3260 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:33.008 UTC [gossip.gossip] handleMessage -> DEBU 3261 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:33.008 UTC [msp] DeserializeIdentity -> DEBU 3262 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.009 UTC [msp] DeserializeIdentity -> DEBU 3263 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.009 UTC [msp] DeserializeIdentity -> DEBU 3264 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.009 UTC [gossip.gossip] handleMessage -> DEBU 3265 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:33.019 UTC [gossip.comm] func1 -> DEBU 3266 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:33.020 UTC [gossip.gossip] handleMessage -> DEBU 3267 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [msp] DeserializeIdentity -> DEBU 3268 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3269 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 326f 0xc002fe9bb0 gate 1563590433021464800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3270 0xc002fe9bb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3271 0xc002fe9bb0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3272 0xc002fe9bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3273 0xc002fe9bb0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 3274 0xc002fe9bb0 gate 1563590433021464800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3275 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3276 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3277 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 3278 0xc0030da410 gate 1563590433021793500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3279 0xc0030da410 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 327a 0xc0030da410 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 327b 0xc0030da410 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [msp.identity] Verify -> DEBU 327c Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [msp.identity] Verify -> DEBU 327d Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [cauthdsl] func2 -> DEBU 327e 0xc0030da410 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [cauthdsl] func1 -> DEBU 327f 0xc0030da410 gate 1563590433021793500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3280 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3281 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3282 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3283 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [msp] DeserializeIdentity -> DEBU 3284 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [gossip.gossip] handleMessage -> DEBU 3285 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:33.029 UTC [gossip.comm] func1 -> DEBU 3286 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:33.029 UTC [gossip.gossip] handleMessage -> DEBU 3287 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:33.029 UTC [msp] DeserializeIdentity -> DEBU 3288 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3289 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 328a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 328b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func1 -> DEBU 328f 0xc0030dbf30 gate 1563590433031507100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3290 0xc0030dbf30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3291 0xc0030dbf30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3292 0xc0030dbf30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3293 0xc0030dbf30 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func1 -> DEBU 3294 0xc0030dbf30 gate 1563590433031507100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [policies] Evaluate -> DEBU 3295 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [policies] Evaluate -> DEBU 3296 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [policies] Evaluate -> DEBU 3297 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [cauthdsl] func1 -> DEBU 3298 0xc0030f2770 gate 1563590433032125000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 3299 0xc0030f2770 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329a 0xc0030f2770 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329b 0xc0030f2770 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [msp.identity] Verify -> DEBU 329c Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [msp.identity] Verify -> DEBU 329d Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329e 0xc0030f2770 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [cauthdsl] func1 -> DEBU 329f 0xc0030f2770 gate 1563590433032125000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [msp] DeserializeIdentity -> DEBU 32a4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [gossip.gossip] handleMessage -> DEBU 32a5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:33.151 UTC [gossip.comm] func1 -> DEBU 32a6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:33.152 UTC [gossip.gossip] handleMessage -> DEBU 32a7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32a8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32a9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32aa Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.152 UTC [gossip.gossip] handleMessage -> DEBU 32ab Exiting" -peer0.org1.example.com | "2019-07-20 02:40:33.163 UTC [gossip.comm] func1 -> DEBU 32ac Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:33.165 UTC [gossip.gossip] handleMessage -> DEBU 32ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:33.165 UTC [msp] DeserializeIdentity -> DEBU 32ae Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.165 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:33.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b0 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:33.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b1 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:33.166 UTC [policies] Evaluate -> DEBU 32b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32b5 0xc0031162a0 gate 1563590433175568500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b6 0xc0031162a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b7 0xc0031162a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b8 0xc0031162a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b9 0xc0031162a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32ba 0xc0031162a0 gate 1563590433175568500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32be 0xc003116c00 gate 1563590433175929200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32bf 0xc003116c00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c0 0xc003116c00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c1 0xc003116c00 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [msp.identity] Verify -> DEBU 32c2 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [msp.identity] Verify -> DEBU 32c3 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c4 0xc003116c00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [cauthdsl] func1 -> DEBU 32c5 0xc003116c00 gate 1563590433175929200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c8 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [msp] DeserializeIdentity -> DEBU 32ca Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [gossip.gossip] handleMessage -> DEBU 32cb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [gossip.comm] func1 -> DEBU 32cc Got message: GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [gossip.gossip] handleMessage -> DEBU 32cd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [gossip.gossip] handleMessage -> DEBU 32ce Exiting" -peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32cf Got message: GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32d0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [msp] DeserializeIdentity -> DEBU 32d1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [policies] Evaluate -> DEBU 32d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32d8 0xc003124d50 gate 1563590435902157400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32d9 0xc003124d50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32da 0xc003124d50 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32db 0xc003124d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32dc 0xc003124d50 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32dd 0xc003124d50 gate 1563590435902157400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32e1 0xc003125620 gate 1563590435902535500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e2 0xc003125620 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e3 0xc003125620 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e4 0xc003125620 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [msp.identity] Verify -> DEBU 32e5 Verify: digest = 00000000 97 29 f6 9f 38 86 61 bb 16 0a 4f 52 c6 72 50 9c |.)..8.a...OR.rP.| -peer0.org1.example.com | 00000010 0e 82 23 bc b2 0c d2 17 f9 8f 15 65 06 cd a4 71 |..#........e...q|" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [msp.identity] Verify -> DEBU 32e6 Verify: sig = 00000000 30 45 02 21 00 c4 d2 fc 2d b2 50 19 d8 0e b4 3e |0E.!....-.P....>| -peer0.org1.example.com | 00000010 6c 72 21 ca 32 cc d1 27 26 1c 01 ae 22 d2 5d 8e |lr!.2..'&...".].| -peer0.org1.example.com | 00000020 83 44 e7 1a bd 02 20 3d 6e 75 83 04 f8 9c 46 3d |.D.... =nu....F=| -peer0.org1.example.com | 00000030 86 e4 0e 70 a0 54 bf c3 63 c6 94 97 0d 71 3e cb |...p.T..c....q>.| -peer0.org1.example.com | 00000040 27 bf 33 e5 cf 8a 00 |'.3....|" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e7 0xc003125620 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32e8 0xc003125620 gate 1563590435902535500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32eb Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 32ed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32ee Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32ef updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f0 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32f4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] sendMemResponse -> DEBU 32f5 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.comm] Send -> DEBU 32f9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:35.904 UTC [gossip.discovery] sendMemResponse -> DEBU 32fa Exiting, replying with alive:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > alive:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " -peer0.org1.example.com | "2019-07-20 02:40:35.904 UTC [gossip.comm] sendToEndpoint -> DEBU 32fb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:35.904 UTC [gossip.comm] sendToEndpoint -> DEBU 32fc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [gossip.comm] func1 -> DEBU 32fd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [gossip.gossip] handleMessage -> DEBU 32fe Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [gossip.pull] HandleMessage -> DEBU 32ff GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3300 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3301 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3302 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3303 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:35.931 UTC [msp] DeserializeIdentity -> DEBU 3304 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:35.931 UTC [msp] DeserializeIdentity -> DEBU 3305 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:35.931 UTC [gossip.pull] SendDigest -> DEBU 3306 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:35.931 UTC [gossip.gossip] handleMessage -> DEBU 3307 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 3308 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 3309 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 330a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 330b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 330c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 330d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.comm] sendToEndpoint -> DEBU 330e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 330f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3310 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3312 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3311 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3313 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.comm] func1 -> DEBU 3314 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3315 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.pull] HandleMessage -> DEBU 3316 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3317 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.comm] func1 -> DEBU 3318 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3319 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.pull] HandleMessage -> DEBU 331a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 331b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.242 UTC [gossip.comm] func1 -> DEBU 331c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.242 UTC [gossip.gossip] handleMessage -> DEBU 331d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.242 UTC [gossip.pull] HandleMessage -> DEBU 331e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.242 UTC [gossip.gossip] handleMessage -> DEBU 331f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.270 UTC [msp] GetDefaultSigningIdentity -> DEBU 3320 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3321 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151026 " -peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3322 Sign: digest: BD9726F5555E2FF5198D8FD774556AA7FA82CA21D8859FCBF5A7FCF75D6CA8FE " -peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp] GetDefaultSigningIdentity -> DEBU 3323 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3324 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3325 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [gossip.comm] Send -> DEBU 3326 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp] DeserializeIdentity -> DEBU 3327 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [gossip.comm] Send -> DEBU 3328 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [msp] DeserializeIdentity -> DEBU 3329 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] Send -> DEBU 332a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 3330 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.273 UTC [gossip.comm] func1 -> DEBU 3331 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.273 UTC [gossip.gossip] handleMessage -> DEBU 3332 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.273 UTC [gossip.gossip] handleMessage -> DEBU 3333 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.273 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3334 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.273 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3335 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 3336 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| -peer0.org1.example.com | 00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" -peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 3337 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| -peer0.org1.example.com | 00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| -peer0.org1.example.com | 00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| -peer0.org1.example.com | 00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| -peer0.org1.example.com | 00000040 b4 3a 38 0a 45 dc |.:8.E.|" -peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.discovery] handleAliveMessage -> DEBU 3338 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.discovery] handleAliveMessage -> DEBU 3339 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 333a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.comm] func1 -> DEBU 333b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.gossip] handleMessage -> DEBU 333c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 333d Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| -peer0.org1.example.com | 00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" -peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.comm] func1 -> DEBU 333e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 333f Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| -peer0.org1.example.com | 00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| -peer0.org1.example.com | 00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| -peer0.org1.example.com | 00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| -peer0.org1.example.com | 00000040 bb c9 ea 46 07 8a 5e |...F..^|" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [gossip.discovery] handleAliveMessage -> DEBU 3340 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [gossip.discovery] isSentByMe -> DEBU 3341 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [gossip.discovery] handleAliveMessage -> DEBU 3342 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3343 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [msp] DeserializeIdentity -> DEBU 3344 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3345 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3346 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3347 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3348 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3349 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 334a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func1 -> DEBU 334b 0xc003223710 gate 1563590436275755700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334c 0xc003223710 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334d 0xc003223710 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334e 0xc003223710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334f 0xc003223710 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func1 -> DEBU 3350 0xc003223710 gate 1563590436275755700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3351 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3352 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3353 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func1 -> DEBU 3354 0xc003223f60 gate 1563590436276119600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3355 0xc003223f60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3356 0xc003223f60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3357 0xc003223f60 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3358 Verify: digest = 00000000 97 29 f6 9f 38 86 61 bb 16 0a 4f 52 c6 72 50 9c |.)..8.a...OR.rP.| -peer0.org1.example.com | 00000010 0e 82 23 bc b2 0c d2 17 f9 8f 15 65 06 cd a4 71 |..#........e...q|" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3359 Verify: sig = 00000000 30 45 02 21 00 c4 d2 fc 2d b2 50 19 d8 0e b4 3e |0E.!....-.P....>| -peer0.org1.example.com | 00000010 6c 72 21 ca 32 cc d1 27 26 1c 01 ae 22 d2 5d 8e |lr!.2..'&...".].| -peer0.org1.example.com | 00000020 83 44 e7 1a bd 02 20 3d 6e 75 83 04 f8 9c 46 3d |.D.... =nu....F=| -peer0.org1.example.com | 00000030 86 e4 0e 70 a0 54 bf c3 63 c6 94 97 0d 71 3e cb |...p.T..c....q>.| -peer0.org1.example.com | 00000040 27 bf 33 e5 cf 8a 00 |'.3....|" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 335a 0xc003223f60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func1 -> DEBU 335b 0xc003223f60 gate 1563590436276119600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 3360 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 3361 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3362 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3363 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3364 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3365 Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| -peer0.org1.example.com | 00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.gossip] handleMessage -> DEBU 3366 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.gossip] handleMessage -> DEBU 3367 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3368 Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| -peer0.org1.example.com | 00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| -peer0.org1.example.com | 00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| -peer0.org1.example.com | 00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| -peer0.org1.example.com | 00000040 bb c9 ea 46 07 8a 5e |...F..^|" -peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [msp.identity] Verify -> DEBU 3369 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [msp.identity] Verify -> DEBU 336a Verify: sig = 00000000 30 45 02 21 00 a5 09 35 d9 10 ed dc 71 72 14 b0 |0E.!...5....qr..| -peer0.org1.example.com | 00000010 82 63 5c ab 58 b6 65 75 18 f5 ea 47 eb ea e0 22 |.c\.X.eu...G..."| -peer0.org1.example.com | 00000020 38 8a 66 cb 74 02 20 51 55 63 f4 c9 d9 6f 05 65 |8.f.t. QUc...o.e| -peer0.org1.example.com | 00000030 90 5e b5 2d fb b2 4a 51 63 f8 5c f3 ef 53 a4 a0 |.^.-..JQc.\..S..| -peer0.org1.example.com | 00000040 d9 93 20 d9 c3 e3 02 |.. ....|" -peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 336b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.discovery] isSentByMe -> DEBU 336c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 336d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.discovery] handleMsgFromComm -> DEBU 336e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.discovery] handleMsgFromComm -> DEBU 336f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3370 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.gossip] handleMessage -> DEBU 3371 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3372 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| -peer0.org1.example.com | 00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3373 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| -peer0.org1.example.com | 00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| -peer0.org1.example.com | 00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| -peer0.org1.example.com | 00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| -peer0.org1.example.com | 00000040 b4 3a 38 0a 45 dc |.:8.E.|" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3374 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3375 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3376 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3377 Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| -peer0.org1.example.com | 00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3378 Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| -peer0.org1.example.com | 00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| -peer0.org1.example.com | 00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| -peer0.org1.example.com | 00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| -peer0.org1.example.com | 00000040 bb c9 ea 46 07 8a 5e |...F..^|" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3379 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.discovery] isSentByMe -> DEBU 337a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 337b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 337c Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [msp] DeserializeIdentity -> DEBU 337d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 337e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 337f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3380 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3384 0xc0033fe550 gate 1563590436279236500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3385 0xc0033fe550 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3386 0xc0033fe550 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3387 0xc0033fe550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3388 0xc0033fe550 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3389 0xc0033fe550 gate 1563590436279236500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 338d 0xc0033fefe0 gate 1563590436279489000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 338e 0xc0033fefe0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 338f 0xc0033fefe0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3390 0xc0033fefe0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [msp.identity] Verify -> DEBU 3391 Verify: digest = 00000000 d2 d4 95 34 c5 7c dd ee c2 94 69 b1 d1 26 4c d7 |...4.|....i..&L.| -peer0.org1.example.com | 00000010 40 ff ea 97 8d 6f 55 a3 e4 ff 62 0d 3e 07 5e ef |@....oU...b.>.^.|" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [msp.identity] Verify -> DEBU 3392 Verify: sig = 00000000 30 45 02 21 00 f3 38 c9 26 96 2b 11 5d 0b 81 e2 |0E.!..8.&.+.]...| -peer0.org1.example.com | 00000010 04 af 5e 83 86 28 b7 3e 16 29 cd 2e 39 ff 8a c0 |..^..(.>.)..9...| -peer0.org1.example.com | 00000020 22 4b 64 33 65 02 20 46 9d 23 cf 2f 09 f4 e8 9f |"Kd3e. F.#./....| -peer0.org1.example.com | 00000030 51 37 80 5d 43 19 94 67 36 d7 f3 1a 4d 7d cf a7 |Q7.]C..g6...M}..| -peer0.org1.example.com | 00000040 a7 1d 12 7a d0 f4 9a |...z...|" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3393 0xc0033fefe0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3394 0xc0033fefe0 gate 1563590436279489000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3395 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3396 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3397 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3398 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [gossip.discovery] handleAliveMessage -> DEBU 3399 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [gossip.discovery] handleAliveMessage -> DEBU 339a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [gossip.discovery] handleMsgFromComm -> DEBU 339b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.334 UTC [gossip.comm] func1 -> DEBU 339c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.334 UTC [gossip.gossip] handleMessage -> DEBU 339d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.334 UTC [gossip.pull] HandleMessage -> DEBU 339e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.334 UTC [gossip.pull] SendDigest -> DEBU 339f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:36.334 UTC [gossip.gossip] handleMessage -> DEBU 33a0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.356 UTC [gossip.comm] func1 -> DEBU 33a1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.356 UTC [gossip.gossip] handleMessage -> DEBU 33a2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.356 UTC [gossip.gossip] handleMessage -> DEBU 33a3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.356 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33a4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.356 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33a5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a6 Verify: digest = 00000000 bf e2 70 70 3b c9 af 04 88 68 c0 25 62 b0 c1 87 |..pp;....h.%b...| -peer0.org1.example.com | 00000010 0e 4c 72 03 b6 4d db 15 8a 80 e6 7d b1 e4 f2 77 |.Lr..M.....}...w|" -peer0.org1.example.com | "2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a7 Verify: sig = 00000000 30 44 02 20 28 df c9 fb 93 61 15 b4 ca d0 2e 53 |0D. (....a.....S| -peer0.org1.example.com | 00000010 1f 6b 28 45 16 9c 6a c0 55 0a 61 c0 74 7d b5 30 |.k(E..j.U.a.t}.0| -peer0.org1.example.com | 00000020 b1 8c a7 d5 02 20 7d 03 4d 41 f9 c9 5b dc 85 f5 |..... }.MA..[...| -peer0.org1.example.com | 00000030 24 1b a5 72 0b a9 d2 65 21 a7 a9 d7 66 be ab ab |$..r...e!...f...| -peer0.org1.example.com | 00000040 d5 6d 82 e1 fd f8 |.m....|" -peer0.org1.example.com | "2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a9 Verify: sig = 00000000 30 44 02 20 42 62 be ee 71 e2 97 23 1a 72 f7 54 |0D. Bb..q..#.r.T| -peer0.org1.example.com | 00000010 be 0d 92 c7 64 25 98 b6 48 51 40 33 f5 ba 18 4f |....d%..HQ@3...O| -peer0.org1.example.com | 00000020 b8 38 23 a1 02 20 1d 27 ec 74 10 b6 a3 72 4b 14 |.8#.. .'.t...rK.| -peer0.org1.example.com | 00000030 ae 32 b3 d5 fd 80 18 14 95 3c cf b3 4f bb c5 c1 |.2.......<..O...| -peer0.org1.example.com | 00000040 43 db 68 e8 b6 65 |C.h..e|" -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] handleAliveMessage -> DEBU 33aa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ac updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ad Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ae Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33af Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] handleAliveMessage -> DEBU 33b0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33b1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] sendMemResponse -> DEBU 33b2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [msp] DeserializeIdentity -> DEBU 33b3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [msp] DeserializeIdentity -> DEBU 33b4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.comm] Send -> DEBU 33b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] sendMemResponse -> DEBU 33b6 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " -peer0.org1.example.com | "2019-07-20 02:40:36.359 UTC [gossip.comm] sendToEndpoint -> DEBU 33b7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.359 UTC [gossip.comm] sendToEndpoint -> DEBU 33b8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [gossip.comm] func1 -> DEBU 33b9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [gossip.gossip] handleMessage -> DEBU 33ba Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [gossip.pull] HandleMessage -> DEBU 33bb GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33be Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33c0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33c1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.525 UTC [gossip.pull] SendDigest -> DEBU 33c2 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:36.525 UTC [gossip.gossip] handleMessage -> DEBU 33c3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.544 UTC [gossip.comm] func1 -> DEBU 33c4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.544 UTC [gossip.gossip] handleMessage -> DEBU 33c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [gossip.gossip] handleMessage -> DEBU 33c6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33c7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33c8 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [msp] DeserializeIdentity -> DEBU 33c9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33ca Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33cb Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33cc Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d0 0xc0035100a0 gate 1563590436545487300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d1 0xc0035100a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d2 0xc0035100a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d3 0xc0035100a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d4 0xc0035100a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d5 0xc0035100a0 gate 1563590436545487300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d9 0xc0035108e0 gate 1563590436545752600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33da 0xc0035108e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33db 0xc0035108e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33dc 0xc0035108e0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [msp.identity] Verify -> DEBU 33dd Verify: digest = 00000000 7b 8f 87 ef db 70 1f 05 1f dc 0f ad fb ae e8 3a |{....p.........:| -peer0.org1.example.com | 00000010 7d e3 42 b9 c2 d9 da 90 6f 32 4f b1 c0 e2 97 12 |}.B.....o2O.....|" -peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [msp.identity] Verify -> DEBU 33de Verify: sig = 00000000 30 45 02 21 00 89 81 30 96 cd db 39 a2 b8 66 ff |0E.!...0...9..f.| -peer0.org1.example.com | 00000010 4c 07 4f 87 55 6d dd bf 0b 25 de 6e 64 4d f0 c5 |L.O.Um...%.ndM..| -peer0.org1.example.com | 00000020 0b 47 1a ac 2f 02 20 35 cc ec 2c ca 41 16 06 0e |.G../. 5..,.A...| -peer0.org1.example.com | 00000030 69 26 87 96 ca b0 04 57 a5 4f 0c ae 65 ab 89 cd |i&.....W.O..e...| -peer0.org1.example.com | 00000040 a3 c2 07 ee 3b da 97 |....;..|" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [cauthdsl] func2 -> DEBU 33df 0xc0035108e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [cauthdsl] func1 -> DEBU 33e0 0xc0035108e0 gate 1563590436545752600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 33e5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e7 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e8 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ea Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 33eb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33ec Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] sendMemResponse -> DEBU 33ed Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33ee Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33ef Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33f0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.comm] Send -> DEBU 33f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] sendMemResponse -> DEBU 33f2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" > alive: alive:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.comm] sendToEndpoint -> DEBU 33f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.comm] sendToEndpoint -> DEBU 33f4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.682 UTC [msp] DeserializeIdentity -> DEBU 33f5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [msp] DeserializeIdentity -> DEBU 33f6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] Send -> DEBU 33f7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33f8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33f9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [gossip.comm] func1 -> DEBU 33fe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [gossip.gossip] handleMessage -> DEBU 33ff Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3400 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3401 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3402 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3403 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3404 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3405 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3406 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3407 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3408 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [cauthdsl] func1 -> DEBU 3409 0xc0035b47f0 gate 1563590436684969900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340a 0xc0035b47f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340b 0xc0035b47f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340c 0xc0035b47f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340d 0xc0035b47f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 340e 0xc0035b47f0 gate 1563590436684969900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 340f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 3410 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 3411 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 3412 0xc0035b5040 gate 1563590436685298700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3413 0xc0035b5040 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3414 0xc0035b5040 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3415 0xc0035b5040 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 3416 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 3417 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3418 0xc0035b5040 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 3419 0xc0035b5040 gate 1563590436685298700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 341e Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 341f Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [msp.identity] Verify -> DEBU 3420 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [msp.identity] Verify -> DEBU 3421 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [msp] DeserializeIdentity -> DEBU 3422 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [msp] DeserializeIdentity -> DEBU 3423 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3424 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3425 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3426 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3427 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3428 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3429 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [cauthdsl] func1 -> DEBU 342a 0xc003647650 gate 1563590436686687400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342b 0xc003647650 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342c 0xc003647650 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342d 0xc003647650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342e 0xc003647650 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [cauthdsl] func1 -> DEBU 342f 0xc003647650 gate 1563590436686687400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3430 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3431 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3432 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [cauthdsl] func1 -> DEBU 3433 0xc003647fb0 gate 1563590436687349300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3434 0xc003647fb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3435 0xc003647fb0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3436 0xc003647fb0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [msp.identity] Verify -> DEBU 3437 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [msp.identity] Verify -> DEBU 3438 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [cauthdsl] func2 -> DEBU 3439 0xc003647fb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [cauthdsl] func1 -> DEBU 343a 0xc003647fb0 gate 1563590436687349300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [gossip.gossip] handleMessage -> DEBU 343f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.692 UTC [gossip.comm] func1 -> DEBU 3440 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.692 UTC [gossip.gossip] handleMessage -> DEBU 3441 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3442 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3443 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3444 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3445 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3446 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3447 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3448 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3449 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 344a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 344b 0xc003541730 gate 1563590436693379500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344c 0xc003541730 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344d 0xc003541730 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344e 0xc003541730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344f 0xc003541730 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 3450 0xc003541730 gate 1563590436693379500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3451 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3452 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3453 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 3454 0xc003541f70 gate 1563590436693729200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3455 0xc003541f70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3456 0xc003541f70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3457 0xc003541f70 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [msp.identity] Verify -> DEBU 3458 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [msp.identity] Verify -> DEBU 3459 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [cauthdsl] func2 -> DEBU 345a 0xc003541f70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [cauthdsl] func1 -> DEBU 345b 0xc003541f70 gate 1563590436693729200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3460 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3461 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3462 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3463 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [msp] DeserializeIdentity -> DEBU 3464 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [msp] DeserializeIdentity -> DEBU 3465 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3466 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3467 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3468 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3469 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 346a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 346b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func1 -> DEBU 346c 0xc0036866f0 gate 1563590436695671100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346d 0xc0036866f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346e 0xc0036866f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346f 0xc0036866f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 3470 0xc0036866f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func1 -> DEBU 3471 0xc0036866f0 gate 1563590436695671100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3472 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3473 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 3474 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func1 -> DEBU 3475 0xc003687050 gate 1563590436696063500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3476 0xc003687050 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3477 0xc003687050 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3478 0xc003687050 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [msp.identity] Verify -> DEBU 3479 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [msp.identity] Verify -> DEBU 347a Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 347b 0xc003687050 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func1 -> DEBU 347c 0xc003687050 gate 1563590436696063500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 3480 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [gossip.gossip] handleMessage -> DEBU 3481 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.697 UTC [gossip.comm] func1 -> DEBU 3482 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.697 UTC [gossip.gossip] handleMessage -> DEBU 3483 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3484 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3485 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3486 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3487 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp] DeserializeIdentity -> DEBU 3488 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp] DeserializeIdentity -> DEBU 3489 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 348a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 348b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 348c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3490 0xc00369fb60 gate 1563590436699245600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3491 0xc00369fb60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3492 0xc00369fb60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3493 0xc00369fb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3494 0xc00369fb60 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3495 0xc00369fb60 gate 1563590436699245600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3496 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3497 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3498 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3499 0xc0036b24b0 gate 1563590436699489000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349a 0xc0036b24b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349b 0xc0036b24b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349c 0xc0036b24b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [msp.identity] Verify -> DEBU 349d Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [msp.identity] Verify -> DEBU 349e Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349f 0xc0036b24b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 34a0 0xc0036b24b0 gate 1563590436699489000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [msp] DeserializeIdentity -> DEBU 34a5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [msp] DeserializeIdentity -> DEBU 34a6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34ad 0xc0036b3c80 gate 1563590436700195900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34ae 0xc0036b3c80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34af 0xc0036b3c80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b0 0xc0036b3c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b1 0xc0036b3c80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34b2 0xc0036b3c80 gate 1563590436700195900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34b6 0xc0036c4500 gate 1563590436700460800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b7 0xc0036c4500 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b8 0xc0036c4500 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b9 0xc0036c4500 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [msp.identity] Verify -> DEBU 34ba Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [msp.identity] Verify -> DEBU 34bb Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [cauthdsl] func2 -> DEBU 34bc 0xc0036c4500 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [cauthdsl] func1 -> DEBU 34bd 0xc0036c4500 gate 1563590436700460800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34c0 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [gossip.gossip] handleMessage -> DEBU 34c2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.745 UTC [gossip.pull] Hello -> DEBU 34c5 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.746 UTC [gossip.comm] Send -> DEBU 34c8 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.746 UTC [gossip.comm] sendToEndpoint -> DEBU 34c9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.746 UTC [gossip.comm] sendToEndpoint -> DEBU 34ca Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.747 UTC [gossip.comm] func1 -> DEBU 34cb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.748 UTC [gossip.gossip] handleMessage -> DEBU 34cc Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.749 UTC [gossip.pull] HandleMessage -> DEBU 34cd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.750 UTC [gossip.gossip] handleMessage -> DEBU 34ce Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.844 UTC [gossip.comm] func1 -> DEBU 34cf Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.844 UTC [gossip.gossip] handleMessage -> DEBU 34d0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.844 UTC [msp] DeserializeIdentity -> DEBU 34d1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.844 UTC [msp] DeserializeIdentity -> DEBU 34d2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.845 UTC [gossip.gossip] handleMessage -> DEBU 34d3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.880 UTC [gossip.comm] func1 -> DEBU 34d4 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.880 UTC [gossip.gossip] handleMessage -> DEBU 34d5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.880 UTC [gossip.pull] HandleMessage -> DEBU 34d6 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.880 UTC [gossip.pull] SendDigest -> DEBU 34d7 Sending BLOCK_MSG digest: [4 5 1 2 3] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:36.880 UTC [gossip.gossip] handleMessage -> DEBU 34d8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [gossip.election] waitForInterrupt -> DEBU 34d9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [gossip.election] IsLeader -> DEBU 34da c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [msp] GetDefaultSigningIdentity -> DEBU 34db Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [msp.identity] Sign -> DEBU 34dc Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100C1801 " -peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [msp.identity] Sign -> DEBU 34dd Sign: digest: 1B78485C66C4756B9D42225FAB4CE1C790E01C21A93694B1C2B8F1C403FEBC34 " -peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [gossip.election] waitForInterrupt -> DEBU 34de c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [gossip.comm] func1 -> DEBU 34df Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [gossip.gossip] handleMessage -> DEBU 34e0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [gossip.gossip] handleMessage -> DEBU 34e1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34e3 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [msp] DeserializeIdentity -> DEBU 34e4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34e5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34e6 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34e7 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34eb 0xc0036eb550 gate 1563590436971658300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ec 0xc0036eb550 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ed 0xc0036eb550 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ee 0xc0036eb550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ef 0xc0036eb550 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34f0 0xc0036eb550 gate 1563590436971658300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34f4 0xc0036ebd90 gate 1563590436971953500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f5 0xc0036ebd90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f6 0xc0036ebd90 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f7 0xc0036ebd90 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [msp.identity] Verify -> DEBU 34f8 Verify: digest = 00000000 26 df 49 f8 3f 7b e1 94 4e 01 29 2d c7 af 47 40 |&.I.?{..N.)-..G@| -peer0.org1.example.com | 00000010 4c 78 11 f1 2b f8 e2 79 69 30 ff 55 94 2d 6e 4a |Lx..+..yi0.U.-nJ|" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [msp.identity] Verify -> DEBU 34f9 Verify: sig = 00000000 30 45 02 21 00 df 98 33 75 f9 69 d0 40 55 0a 3b |0E.!...3u.i.@U.;| -peer0.org1.example.com | 00000010 da de 7c a1 0c 38 ed 61 63 71 ba ab 2a 7d 6e a6 |..|..8.acq..*}n.| -peer0.org1.example.com | 00000020 7f 2c 2c 42 8c 02 20 66 14 35 b5 9e f3 a6 dc 45 |.,,B.. f.5.....E| -peer0.org1.example.com | 00000030 13 fd 9f 8e 41 72 6e e2 53 88 4e 4b 1d 8b e2 d2 |....Arn.S.NK....| -peer0.org1.example.com | 00000040 b4 07 5f 1d c2 61 08 |.._..a.|" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34fa 0xc0036ebd90 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [cauthdsl] func1 -> DEBU 34fb 0xc0036ebd90 gate 1563590436971953500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fe Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 3500 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3501 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3502 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3503 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3504 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3505 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 3506 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3507 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3508 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3509 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [gossip.comm] Send -> DEBU 350c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3510 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3511 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3512 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] Send -> DEBU 3513 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3514 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3515 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] Send -> DEBU 3516 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3517 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3518 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3519 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] func1 -> DEBU 351d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.gossip] handleMessage -> DEBU 351e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.gossip] handleMessage -> DEBU 351f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3520 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3521 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.979 UTC [gossip.comm] func1 -> DEBU 3522 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.979 UTC [gossip.gossip] handleMessage -> DEBU 3523 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.979 UTC [gossip.gossip] handleMessage -> DEBU 3524 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:36.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3525 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:36.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3526 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.007 UTC [gossip.comm] func1 -> DEBU 3527 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.007 UTC [gossip.gossip] handleMessage -> DEBU 3528 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 3529 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 352a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 352b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.008 UTC [gossip.gossip] handleMessage -> DEBU 352c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.146 UTC [gossip.comm] func1 -> DEBU 352d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.146 UTC [gossip.gossip] handleMessage -> DEBU 352e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 352f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 3530 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 3531 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.147 UTC [gossip.gossip] handleMessage -> DEBU 3532 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 3533 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3534 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151027 " -peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3535 Sign: digest: EF598D4BA71D68883581531AA57270E0ABB11DBA25246FB693F61EFAC554FFBB " -peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 3536 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3537 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3538 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3539 Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.287 UTC [gossip.comm] Send -> DEBU 353d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] Send -> DEBU 353f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] Send -> DEBU 3540 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3541 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3542 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3543 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3544 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3545 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3546 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.337 UTC [gossip.comm] func1 -> DEBU 3547 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.337 UTC [gossip.gossip] handleMessage -> DEBU 3548 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.337 UTC [gossip.gossip] handleMessage -> DEBU 3549 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.337 UTC [gossip.discovery] handleMsgFromComm -> DEBU 354a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.337 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 354b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [msp.identity] Verify -> DEBU 354c Verify: digest = 00000000 98 8b b6 ea 63 6c 28 c5 81 cc fc 32 bc ba 47 44 |....cl(....2..GD| -peer0.org1.example.com | 00000010 ea 06 ac a5 80 7a 18 18 87 75 03 4d ed 29 ca 31 |.....z...u.M.).1|" -peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [msp.identity] Verify -> DEBU 354d Verify: sig = 00000000 30 45 02 21 00 e4 0c 73 62 cd e2 a3 44 56 f0 91 |0E.!...sb...DV..| -peer0.org1.example.com | 00000010 df b4 11 07 ac ff 34 83 0c 60 55 4a a5 7d fe 3d |......4..`UJ.}.=| -peer0.org1.example.com | 00000020 4d 38 05 0f 3a 02 20 78 12 92 81 07 2e 52 0a c9 |M8..:. x.....R..| -peer0.org1.example.com | 00000030 7f 39 b6 dc 66 ea 24 d3 0d 45 66 11 e6 6e 93 4f |.9..f.$..Ef..n.O| -peer0.org1.example.com | 00000040 51 bb f6 02 a4 ee 6d |Q.....m|" -peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] handleAliveMessage -> DEBU 354e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 354f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3550 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3551 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3552 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3553 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] handleAliveMessage -> DEBU 3554 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3555 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3556 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3557 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3558 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [gossip.comm] Send -> DEBU 3559 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 355a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [gossip.comm] Send -> DEBU 355b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.comm] sendToEndpoint -> DEBU 355f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.comm] func1 -> DEBU 3560 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.gossip] handleMessage -> DEBU 3561 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.gossip] handleMessage -> DEBU 3562 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3563 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3564 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.349 UTC [gossip.comm] func1 -> DEBU 3565 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.349 UTC [gossip.gossip] handleMessage -> DEBU 3566 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.349 UTC [gossip.gossip] handleMessage -> DEBU 3567 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3568 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3569 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.521 UTC [gossip.comm] func1 -> DEBU 356a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.521 UTC [gossip.gossip] handleMessage -> DEBU 356b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.521 UTC [gossip.gossip] handleMessage -> DEBU 356c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 356d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.522 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 356e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:37.522 UTC [msp] DeserializeIdentity -> DEBU 356f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3570 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3571 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3572 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3573 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3574 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3575 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 3576 0xc0039bcdf0 gate 1563590437523295700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3577 0xc0039bcdf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3578 0xc0039bcdf0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3579 0xc0039bcdf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 357a 0xc0039bcdf0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 357b 0xc0039bcdf0 gate 1563590437523295700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 357f 0xc0039bd630 gate 1563590437523623400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3580 0xc0039bd630 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3581 0xc0039bd630 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3582 0xc0039bd630 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [msp.identity] Verify -> DEBU 3583 Verify: digest = 00000000 26 fc 28 ac 88 f9 f3 87 de 93 74 3c 3d 76 8e 42 |&.(.......t<=v.B| -peer0.org1.example.com | 00000010 b5 84 89 8d f7 05 59 de 8b 52 64 19 7f b9 a0 ff |......Y..Rd.....|" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [msp.identity] Verify -> DEBU 3584 Verify: sig = 00000000 30 44 02 20 65 be 11 a3 8d 9c 28 c9 4d 98 c2 b4 |0D. e.....(.M...| -peer0.org1.example.com | 00000010 0d 34 0c 31 29 b9 f4 36 51 01 aa 83 98 69 9f 86 |.4.1)..6Q....i..| -peer0.org1.example.com | 00000020 4a bc c1 f1 02 20 3f 80 eb de c3 95 42 34 e2 f1 |J.... ?.....B4..| -peer0.org1.example.com | 00000030 7e 58 a1 ce 51 ae 5d d4 34 a1 82 2e ca 2c 53 95 |~X..Q.].4....,S.| -peer0.org1.example.com | 00000040 ee 18 7e 26 ce 0a |..~&..|" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3585 0xc0039bd630 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 3586 0xc0039bd630 gate 1563590437523623400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3587 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 3588 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 3589 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 358a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 358b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358d updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358e Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 3590 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 3591 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.526 UTC [gossip.comm] func1 -> DEBU 3592 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.526 UTC [gossip.gossip] handleMessage -> DEBU 3593 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.525 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3594 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.526 UTC [gossip.gossip] handleMessage -> DEBU 3595 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3596 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3597 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.533 UTC [gossip.comm] func1 -> DEBU 3598 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.533 UTC [gossip.gossip] handleMessage -> DEBU 3599 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.533 UTC [gossip.gossip] handleMessage -> DEBU 359a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.535 UTC [msp] DeserializeIdentity -> DEBU 359d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 359e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 359f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [gossip.comm] Send -> DEBU 35a4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [gossip.comm] Send -> DEBU 35a6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35aa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:39.900 UTC [gossip.comm] func1 -> DEBU 35ab Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:39.903 UTC [gossip.gossip] handleMessage -> DEBU 35ac Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:39.903 UTC [gossip.gossip] handleMessage -> DEBU 35ad Exiting" -peer0.org1.example.com | "2019-07-20 02:40:39.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35ae Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:39.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35af Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:39.905 UTC [msp] DeserializeIdentity -> DEBU 35b0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:39.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35b1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:39.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35b2 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:39.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35b3 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:39.907 UTC [cauthdsl] func1 -> DEBU 35b7 0xc003a8ce70 gate 1563590439907231300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35b8 0xc003a8ce70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35b9 0xc003a8ce70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35ba 0xc003a8ce70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:39.909 UTC [cauthdsl] func2 -> DEBU 35bb 0xc003a8ce70 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:39.909 UTC [cauthdsl] func1 -> DEBU 35bc 0xc003a8ce70 gate 1563590439907231300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:39.909 UTC [policies] Evaluate -> DEBU 35bd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:39.910 UTC [policies] Evaluate -> DEBU 35be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:39.910 UTC [policies] Evaluate -> DEBU 35bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:39.910 UTC [cauthdsl] func1 -> DEBU 35c0 0xc003a8d6b0 gate 1563590439910435600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:39.910 UTC [cauthdsl] func2 -> DEBU 35c1 0xc003a8d6b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:39.911 UTC [cauthdsl] func2 -> DEBU 35c2 0xc003a8d6b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:39.911 UTC [cauthdsl] func2 -> DEBU 35c3 0xc003a8d6b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:39.911 UTC [msp.identity] Verify -> DEBU 35c4 Verify: digest = 00000000 07 c5 67 64 18 c9 af 45 eb ea b4 3c e4 72 7f f4 |..gd...E...<.r..| -peer0.org1.example.com | 00000010 a8 65 2a 77 67 3f e6 41 18 ac 7f ff a1 21 68 cd |.e*wg?.A.....!h.|" -peer0.org1.example.com | "2019-07-20 02:40:39.912 UTC [msp.identity] Verify -> DEBU 35c5 Verify: sig = 00000000 30 45 02 21 00 c8 c1 65 36 7e 3f c1 76 7e 65 68 |0E.!...e6~?.v~eh| -peer0.org1.example.com | 00000010 f6 e4 70 a6 3a c2 a8 19 6d 5a 77 2e ef 9e a2 18 |..p.:...mZw.....| -peer0.org1.example.com | 00000020 0e f0 6b 43 e6 02 20 7a 9a 49 ed 81 29 91 fd 63 |..kC.. z.I..)..c| -peer0.org1.example.com | 00000030 ee 2f a2 21 39 66 69 d6 ee cf dd 9c 61 6a de a6 |./.!9fi.....aj..| -peer0.org1.example.com | 00000040 e6 b6 2c 4d af 22 19 |..,M.".|" -peer0.org1.example.com | "2019-07-20 02:40:39.912 UTC [cauthdsl] func2 -> DEBU 35c6 0xc003a8d6b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:39.912 UTC [cauthdsl] func1 -> DEBU 35c7 0xc003a8d6b0 gate 1563590439910435600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:39.912 UTC [policies] Evaluate -> DEBU 35c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35ca Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:39.913 UTC [gossip.discovery] handleAliveMessage -> DEBU 35cc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35cd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ce updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35cf Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35d0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [gossip.discovery] learnExistingMembers -> DEBU 35d1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [gossip.discovery] handleAliveMessage -> DEBU 35d2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35d3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [gossip.discovery] sendMemResponse -> DEBU 35d4 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [msp] DeserializeIdentity -> DEBU 35d5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [msp] DeserializeIdentity -> DEBU 35d6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:39.916 UTC [msp] DeserializeIdentity -> DEBU 35d7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:39.916 UTC [gossip.comm] Send -> DEBU 35d8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:39.916 UTC [gossip.comm] sendToEndpoint -> DEBU 35d9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:39.916 UTC [gossip.comm] sendToEndpoint -> DEBU 35da Exiting" -peer0.org1.example.com | "2019-07-20 02:40:39.916 UTC [gossip.discovery] sendMemResponse -> DEBU 35db Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020+" signature:"0E\002!\000\344\014sb\315\342\243DV\360\221\337\264\021\007\254\3774\203\014`UJ\245}\376=M8\005\017:\002 x\022\222\201\007.R\n\311\1779\266\334f\352$\323\rEf\021\346n\223OQ\273\366\002\244\356m" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:39.932 UTC [gossip.comm] func1 -> DEBU 35dc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:39.932 UTC [gossip.gossip] handleMessage -> DEBU 35dd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:39.932 UTC [gossip.pull] HandleMessage -> DEBU 35de GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:39.932 UTC [msp] DeserializeIdentity -> DEBU 35df Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [gossip.pull] SendDigest -> DEBU 35e5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:39.934 UTC [gossip.gossip] handleMessage -> DEBU 35e6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.231 UTC [gossip.pull] Hello -> DEBU 35e7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:40.231 UTC [gossip.comm] Send -> DEBU 35e8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:40.232 UTC [gossip.comm] sendToEndpoint -> DEBU 35e9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.232 UTC [gossip.comm] sendToEndpoint -> DEBU 35ea Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.comm] func1 -> DEBU 35eb Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.232 UTC [gossip.pull] Hello -> DEBU 35ec Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.comm] Send -> DEBU 35ed Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.pull] Hello -> DEBU 35ee Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.comm] Send -> DEBU 35ef Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.comm] sendToEndpoint -> DEBU 35f0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.comm] sendToEndpoint -> DEBU 35f1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.235 UTC [gossip.comm] sendToEndpoint -> DEBU 35f2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.235 UTC [gossip.comm] sendToEndpoint -> DEBU 35f3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.235 UTC [gossip.gossip] handleMessage -> DEBU 35f4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.236 UTC [gossip.pull] HandleMessage -> DEBU 35f5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.237 UTC [gossip.gossip] handleMessage -> DEBU 35f7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.236 UTC [gossip.comm] func1 -> DEBU 35f6 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.238 UTC [gossip.gossip] handleMessage -> DEBU 35f8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.238 UTC [gossip.pull] HandleMessage -> DEBU 35f9 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.238 UTC [gossip.gossip] handleMessage -> DEBU 35fa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.239 UTC [gossip.comm] func1 -> DEBU 35fb Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.239 UTC [gossip.gossip] handleMessage -> DEBU 35fc Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.239 UTC [gossip.pull] HandleMessage -> DEBU 35fd GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.240 UTC [gossip.gossip] handleMessage -> DEBU 35fe Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.273 UTC [msp] GetDefaultSigningIdentity -> DEBU 35ff Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3600 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151028 " -peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3601 Sign: digest: 0A3BB45DB1F5C8EAA3328930FC5D9B22EF7414C203CE4D29C9118912D79EAC98 " -peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [msp] GetDefaultSigningIdentity -> DEBU 3602 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3603 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3604 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [gossip.comm] Send -> DEBU 3605 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:40.275 UTC [msp] DeserializeIdentity -> DEBU 3606 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.275 UTC [gossip.comm] Send -> DEBU 3607 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:40.275 UTC [msp] DeserializeIdentity -> DEBU 3608 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.276 UTC [gossip.comm] Send -> DEBU 3609 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.277 UTC [gossip.comm] sendToEndpoint -> DEBU 360d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.279 UTC [gossip.comm] sendToEndpoint -> DEBU 360e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.279 UTC [gossip.comm] func1 -> DEBU 3611 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.279 UTC [gossip.gossip] handleMessage -> DEBU 3612 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.279 UTC [gossip.comm] sendToEndpoint -> DEBU 3610 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.280 UTC [gossip.gossip] handleMessage -> DEBU 3613 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.280 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3614 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.281 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3615 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:40.282 UTC [msp.identity] Verify -> DEBU 3616 Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| -peer0.org1.example.com | 00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" -peer0.org1.example.com | "2019-07-20 02:40:40.279 UTC [gossip.comm] func1 -> DEBU 360f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.282 UTC [gossip.gossip] handleMessage -> DEBU 3618 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.282 UTC [gossip.comm] func1 -> DEBU 3617 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.282 UTC [msp.identity] Verify -> DEBU 3619 Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| -peer0.org1.example.com | 00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| -peer0.org1.example.com | 00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| -peer0.org1.example.com | 00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| -peer0.org1.example.com | 00000040 df fe cf 90 da 0d 55 |......U|" -peer0.org1.example.com | "2019-07-20 02:40:40.283 UTC [msp.identity] Verify -> DEBU 361a Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:40.283 UTC [msp.identity] Verify -> DEBU 361b Verify: sig = 00000000 30 45 02 21 00 bd 14 2e 87 ca ed f1 6f d1 29 68 |0E.!........o.)h| -peer0.org1.example.com | 00000010 7d 2a 6f e8 b1 f6 83 ed da fb 4f a9 6d ea 92 5b |}*o.......O.m..[| -peer0.org1.example.com | 00000020 db a3 ff 5d 5f 02 20 12 d9 06 3d f1 de 82 e1 d3 |...]_. ...=.....| -peer0.org1.example.com | 00000030 97 44 5a 18 4c f8 48 62 8a 53 0c ad a5 cc 41 b3 |.DZ.L.Hb.S....A.| -peer0.org1.example.com | 00000040 30 53 5a 99 d3 4d 7f |0SZ..M.|" -peer0.org1.example.com | "2019-07-20 02:40:40.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 361c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.283 UTC [gossip.discovery] isSentByMe -> DEBU 361d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 361e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 361f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3620 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.gossip] handleMessage -> DEBU 3621 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3622 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.gossip] handleMessage -> DEBU 3623 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [msp.identity] Verify -> DEBU 3624 Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| -peer0.org1.example.com | 00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" -peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [msp.identity] Verify -> DEBU 3625 Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| -peer0.org1.example.com | 00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| -peer0.org1.example.com | 00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| -peer0.org1.example.com | 00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| -peer0.org1.example.com | 00000040 df fe cf 90 da 0d 55 |......U|" -peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 3626 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.discovery] isSentByMe -> DEBU 3627 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 3628 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3629 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 362a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 362b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.gossip] handleMessage -> DEBU 362c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [msp.identity] Verify -> DEBU 362d Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| -peer0.org1.example.com | 00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" -peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [msp.identity] Verify -> DEBU 362e Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| -peer0.org1.example.com | 00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| -peer0.org1.example.com | 00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| -peer0.org1.example.com | 00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| -peer0.org1.example.com | 00000040 df fe cf 90 da 0d 55 |......U|" -peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 362f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.discovery] isSentByMe -> DEBU 3630 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3631 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3632 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [msp] DeserializeIdentity -> DEBU 3633 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3634 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3635 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3636 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3637 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3638 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3639 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func1 -> DEBU 363a 0xc003c5cbf0 gate 1563590440286448700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363b 0xc003c5cbf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363c 0xc003c5cbf0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363d 0xc003c5cbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363e 0xc003c5cbf0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func1 -> DEBU 363f 0xc003c5cbf0 gate 1563590440286448700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3640 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3641 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3642 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [cauthdsl] func1 -> DEBU 3643 0xc003c5d430 gate 1563590440287616200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3644 0xc003c5d430 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3645 0xc003c5d430 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3646 0xc003c5d430 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.288 UTC [msp.identity] Verify -> DEBU 3647 Verify: digest = 00000000 07 c5 67 64 18 c9 af 45 eb ea b4 3c e4 72 7f f4 |..gd...E...<.r..| -peer0.org1.example.com | 00000010 a8 65 2a 77 67 3f e6 41 18 ac 7f ff a1 21 68 cd |.e*wg?.A.....!h.|" -peer0.org1.example.com | "2019-07-20 02:40:40.288 UTC [msp.identity] Verify -> DEBU 3648 Verify: sig = 00000000 30 45 02 21 00 c8 c1 65 36 7e 3f c1 76 7e 65 68 |0E.!...e6~?.v~eh| -peer0.org1.example.com | 00000010 f6 e4 70 a6 3a c2 a8 19 6d 5a 77 2e ef 9e a2 18 |..p.:...mZw.....| -peer0.org1.example.com | 00000020 0e f0 6b 43 e6 02 20 7a 9a 49 ed 81 29 91 fd 63 |..kC.. z.I..)..c| -peer0.org1.example.com | 00000030 ee 2f a2 21 39 66 69 d6 ee cf dd 9c 61 6a de a6 |./.!9fi.....aj..| -peer0.org1.example.com | 00000040 e6 b6 2c 4d af 22 19 |..,M.".|" -peer0.org1.example.com | "2019-07-20 02:40:40.288 UTC [cauthdsl] func2 -> DEBU 3649 0xc003c5d430 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.288 UTC [cauthdsl] func1 -> DEBU 364a 0xc003c5d430 gate 1563590440287616200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:40.288 UTC [policies] Evaluate -> DEBU 364b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.289 UTC [policies] Evaluate -> DEBU 364c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.290 UTC [policies] Evaluate -> DEBU 364d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.290 UTC [policies] Evaluate -> DEBU 364e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 364f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 3650 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3651 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.335 UTC [gossip.comm] func1 -> DEBU 3652 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.335 UTC [gossip.gossip] handleMessage -> DEBU 3653 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.336 UTC [gossip.pull] HandleMessage -> DEBU 3654 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.336 UTC [gossip.pull] SendDigest -> DEBU 3655 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:40.337 UTC [gossip.gossip] handleMessage -> DEBU 3656 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.358 UTC [gossip.comm] func1 -> DEBU 3657 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.358 UTC [gossip.gossip] handleMessage -> DEBU 3658 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.359 UTC [gossip.gossip] handleMessage -> DEBU 3659 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.359 UTC [gossip.discovery] handleMsgFromComm -> DEBU 365a Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.360 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 365b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:40.361 UTC [msp.identity] Verify -> DEBU 365c Verify: digest = 00000000 fb dc 02 43 57 88 bb 80 98 63 10 d2 3f 04 93 d2 |...CW....c..?...| -peer0.org1.example.com | 00000010 93 84 7e 83 65 4b 08 94 62 c6 2f 60 b1 ed ae 3b |..~.eK..b./`...;|" -peer0.org1.example.com | "2019-07-20 02:40:40.361 UTC [msp.identity] Verify -> DEBU 365d Verify: sig = 00000000 30 44 02 20 19 8c a5 29 75 ff 31 ca 2c fd 17 48 |0D. ...)u.1.,..H| -peer0.org1.example.com | 00000010 66 f2 fd fd db 73 53 2f 7f 26 3f ef 96 f5 9a bd |f....sS/.&?.....| -peer0.org1.example.com | 00000020 1c 0c 88 e9 02 20 32 8c 99 1d 21 5a de 73 c3 dd |..... 2...!Z.s..| -peer0.org1.example.com | 00000030 36 93 18 43 30 6b cd 7a 56 eb f7 63 2a f9 3f ef |6..C0k.zV..c*.?.| -peer0.org1.example.com | 00000040 b0 4e 51 c0 54 c3 |.NQ.T.|" -peer0.org1.example.com | "2019-07-20 02:40:40.362 UTC [msp.identity] Verify -> DEBU 365e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:40.362 UTC [msp.identity] Verify -> DEBU 365f Verify: sig = 00000000 30 44 02 20 64 89 b2 7f d6 93 e1 aa 26 0e 23 01 |0D. d.......&.#.| -peer0.org1.example.com | 00000010 18 0b f4 7e 51 5a d6 7d 7a aa 6f 90 77 af 57 69 |...~QZ.}z.o.w.Wi| -peer0.org1.example.com | 00000020 c5 20 b3 61 02 20 7e 33 7f 90 90 ec 6f 5e bc 9a |. .a. ~3....o^..| -peer0.org1.example.com | 00000030 cc ff 54 37 03 96 f5 87 ed ce ba 6e fe 55 e8 31 |..T7.......n.U.1| -peer0.org1.example.com | 00000040 01 1c 4b f1 54 f4 |..K.T.|" -peer0.org1.example.com | "2019-07-20 02:40:40.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 3660 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.363 UTC [gossip.discovery] learnExistingMembers -> DEBU 3661 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3662 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3663 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3664 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3665 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.364 UTC [gossip.discovery] handleAliveMessage -> DEBU 3666 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3667 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.365 UTC [gossip.discovery] sendMemResponse -> DEBU 3668 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:40.365 UTC [msp] DeserializeIdentity -> DEBU 3669 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.365 UTC [msp] DeserializeIdentity -> DEBU 366a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.366 UTC [gossip.comm] Send -> DEBU 366b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:40.366 UTC [gossip.discovery] sendMemResponse -> DEBU 366c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > alive: " -peer0.org1.example.com | "2019-07-20 02:40:40.366 UTC [gossip.comm] sendToEndpoint -> DEBU 366d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.367 UTC [gossip.comm] sendToEndpoint -> DEBU 366e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.524 UTC [gossip.comm] func1 -> DEBU 366f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.525 UTC [gossip.gossip] handleMessage -> DEBU 3670 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.525 UTC [gossip.pull] HandleMessage -> DEBU 3671 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.525 UTC [msp] DeserializeIdentity -> DEBU 3672 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.526 UTC [msp] DeserializeIdentity -> DEBU 3673 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.527 UTC [msp] DeserializeIdentity -> DEBU 3674 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.528 UTC [msp] DeserializeIdentity -> DEBU 3675 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.529 UTC [msp] DeserializeIdentity -> DEBU 3676 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.529 UTC [msp] DeserializeIdentity -> DEBU 3677 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.529 UTC [gossip.pull] SendDigest -> DEBU 3678 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:40.529 UTC [gossip.gossip] handleMessage -> DEBU 3679 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.546 UTC [gossip.comm] func1 -> DEBU 367a Got message: GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.546 UTC [gossip.gossip] handleMessage -> DEBU 367b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.546 UTC [gossip.gossip] handleMessage -> DEBU 367c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.547 UTC [gossip.discovery] handleMsgFromComm -> DEBU 367d Got message: GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.547 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 367e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:40.548 UTC [msp] DeserializeIdentity -> DEBU 367f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.548 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3680 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:40.548 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3681 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3682 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3683 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3684 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3685 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 3686 0xc003d44800 gate 1563590440550548800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3687 0xc003d44800 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3688 0xc003d44800 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3689 0xc003d44800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 368a 0xc003d44800 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 368b 0xc003d44800 gate 1563590440550548800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 368f 0xc003d45040 gate 1563590440550925000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3690 0xc003d45040 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3691 0xc003d45040 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3692 0xc003d45040 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [msp.identity] Verify -> DEBU 3693 Verify: digest = 00000000 5f f2 6b 78 bc a6 fb 49 6d f3 62 88 dc 48 6c 55 |_.kx...Im.b..HlU| -peer0.org1.example.com | 00000010 16 57 83 14 e8 fb a8 28 77 08 c6 70 0f 6e 7b dd |.W.....(w..p.n{.|" -peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [msp.identity] Verify -> DEBU 3694 Verify: sig = 00000000 30 44 02 20 54 be fe 36 a5 43 b2 55 ab 8e 71 5e |0D. T..6.C.U..q^| -peer0.org1.example.com | 00000010 39 d1 80 9b 97 1e 33 a3 b0 f2 53 e2 1a c2 f7 d1 |9.....3...S.....| -peer0.org1.example.com | 00000020 f0 0f 25 f9 02 20 34 5c b7 f5 2c 4b 34 49 6c f6 |..%.. 4\..,K4Il.| -peer0.org1.example.com | 00000030 59 f6 21 76 6e 3e 7c 6c 1e 76 0a 10 f5 f6 82 54 |Y.!vn>|l.v.....T| -peer0.org1.example.com | 00000040 45 b1 75 e4 0b 44 |E.u..D|" -peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3695 0xc003d45040 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [cauthdsl] func1 -> DEBU 3696 0xc003d45040 gate 1563590440550925000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [policies] Evaluate -> DEBU 3697 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.552 UTC [policies] Evaluate -> DEBU 3698 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.553 UTC [policies] Evaluate -> DEBU 3699 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.553 UTC [policies] Evaluate -> DEBU 369a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.553 UTC [gossip.discovery] handleAliveMessage -> DEBU 369b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.553 UTC [gossip.discovery] learnExistingMembers -> DEBU 369c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369d updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369e Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 36a0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 36a1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36a2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.555 UTC [gossip.discovery] sendMemResponse -> DEBU 36a3 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:40.555 UTC [msp] DeserializeIdentity -> DEBU 36a4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.556 UTC [msp] DeserializeIdentity -> DEBU 36a5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.556 UTC [msp] DeserializeIdentity -> DEBU 36a6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.556 UTC [gossip.comm] Send -> DEBU 36a7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:40.557 UTC [gossip.discovery] sendMemResponse -> DEBU 36a8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" > alive:|l\036v\n\020\365\366\202TE\261u\344\013D" > alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:40.557 UTC [gossip.comm] sendToEndpoint -> DEBU 36a9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.557 UTC [gossip.comm] sendToEndpoint -> DEBU 36aa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [msp] DeserializeIdentity -> DEBU 36ab Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [msp] DeserializeIdentity -> DEBU 36ac Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] Send -> DEBU 36ad Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36ae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36af Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [gossip.comm] func1 -> DEBU 36b4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [gossip.gossip] handleMessage -> DEBU 36b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b6 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b7 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b8 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b9 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [msp] DeserializeIdentity -> DEBU 36ba Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [msp] DeserializeIdentity -> DEBU 36bb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36bc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36bd Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36be Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func1 -> DEBU 36c2 0xc003dc47c0 gate 1563590440687798600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c3 0xc003dc47c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c4 0xc003dc47c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c5 0xc003dc47c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c6 0xc003dc47c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func1 -> DEBU 36c7 0xc003dc47c0 gate 1563590440687798600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func1 -> DEBU 36cb 0xc003dc5030 gate 1563590440688085400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36cc 0xc003dc5030 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36cd 0xc003dc5030 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36ce 0xc003dc5030 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [msp.identity] Verify -> DEBU 36cf Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [msp.identity] Verify -> DEBU 36d0 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36d1 0xc003dc5030 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func1 -> DEBU 36d2 0xc003dc5030 gate 1563590440688085400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [msp] DeserializeIdentity -> DEBU 36d7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.691 UTC [msp] DeserializeIdentity -> DEBU 36d8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36d9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36da Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36db Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.693 UTC [cauthdsl] func1 -> DEBU 36df 0xc003e14800 gate 1563590440693923400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.693 UTC [cauthdsl] func2 -> DEBU 36e0 0xc003e14800 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e1 0xc003e14800 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e2 0xc003e14800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e3 0xc003e14800 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [cauthdsl] func1 -> DEBU 36e4 0xc003e14800 gate 1563590440693923400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.696 UTC [cauthdsl] func1 -> DEBU 36e8 0xc003e15160 gate 1563590440694341600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.696 UTC [cauthdsl] func2 -> DEBU 36e9 0xc003e15160 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.697 UTC [cauthdsl] func2 -> DEBU 36ea 0xc003e15160 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.697 UTC [cauthdsl] func2 -> DEBU 36eb 0xc003e15160 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.697 UTC [msp.identity] Verify -> DEBU 36ec Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:40.697 UTC [msp.identity] Verify -> DEBU 36ed Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:40.699 UTC [cauthdsl] func2 -> DEBU 36ee 0xc003e15160 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.699 UTC [cauthdsl] func1 -> DEBU 36ef 0xc003e15160 gate 1563590440694341600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [gossip.gossip] handleMessage -> DEBU 36f4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [gossip.comm] func1 -> DEBU 36f5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [gossip.gossip] handleMessage -> DEBU 36f6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36fb Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36fc Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func1 -> DEBU 3700 0xc003e330d0 gate 1563590440700808900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3701 0xc003e330d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3702 0xc003e330d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3703 0xc003e330d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3704 0xc003e330d0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func1 -> DEBU 3705 0xc003e330d0 gate 1563590440700808900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 3706 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3707 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3708 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func1 -> DEBU 3709 0xc003e33910 gate 1563590440701086700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370a 0xc003e33910 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370b 0xc003e33910 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370c 0xc003e33910 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 370d Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 370e Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370f 0xc003e33910 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func1 -> DEBU 3710 0xc003e33910 gate 1563590440701086700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3711 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3712 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3713 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3714 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 3715 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 3716 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [msp.identity] Verify -> DEBU 3717 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [msp.identity] Verify -> DEBU 3718 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [msp] DeserializeIdentity -> DEBU 3719 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [msp] DeserializeIdentity -> DEBU 371a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 371b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 371e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 371f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3720 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 3721 0xc003f4bf90 gate 1563590440702568500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3722 0xc003f4bf90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3723 0xc003f4bf90 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3724 0xc003f4bf90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3725 0xc003f4bf90 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 3726 0xc003f4bf90 gate 1563590440702568500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3727 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3728 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3729 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 372a 0xc003f7c830 gate 1563590440702846900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372b 0xc003f7c830 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372c 0xc003f7c830 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372d 0xc003f7c830 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [msp.identity] Verify -> DEBU 372e Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [msp.identity] Verify -> DEBU 372f Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [cauthdsl] func2 -> DEBU 3730 0xc003f7c830 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [cauthdsl] func1 -> DEBU 3731 0xc003f7c830 gate 1563590440702846900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3732 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3733 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3734 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3735 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [gossip.gossip] handleMessage -> DEBU 3736 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [gossip.comm] func1 -> DEBU 3737 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [gossip.gossip] handleMessage -> DEBU 3738 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [msp] DeserializeIdentity -> DEBU 3739 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [msp] DeserializeIdentity -> DEBU 373a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.707 UTC [gossip.privdata] run -> DEBU 373b Start reconcile missing private info" -peer0.org1.example.com | "2019-07-20 02:40:40.707 UTC [leveldbhelper] GetIterator -> DEBU 373c Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" -peer0.org1.example.com | "2019-07-20 02:40:40.707 UTC [msp] DeserializeIdentity -> DEBU 373d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.707 UTC [gossip.privdata] reconcile -> DEBU 373e Reconciliation cycle finished successfully. no items to reconcile" -peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 373f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3740 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3741 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3742 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3743 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3744 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [cauthdsl] func1 -> DEBU 3745 0xc0029c84a0 gate 1563590440708859500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [cauthdsl] func2 -> DEBU 3746 0xc0029c84a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.712 UTC [cauthdsl] func2 -> DEBU 3747 0xc0029c84a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.713 UTC [cauthdsl] func2 -> DEBU 3748 0xc0029c84a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:40.713 UTC [cauthdsl] func2 -> DEBU 3749 0xc0029c84a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [cauthdsl] func1 -> DEBU 374a 0xc0029c84a0 gate 1563590440708859500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [cauthdsl] func1 -> DEBU 374e 0xc0029c8ce0 gate 1563590440715840100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [cauthdsl] func2 -> DEBU 374f 0xc0029c8ce0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [cauthdsl] func2 -> DEBU 3750 0xc0029c8ce0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [cauthdsl] func2 -> DEBU 3751 0xc0029c8ce0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [msp.identity] Verify -> DEBU 3752 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [msp.identity] Verify -> DEBU 3753 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [cauthdsl] func2 -> DEBU 3754 0xc0029c8ce0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [cauthdsl] func1 -> DEBU 3755 0xc0029c8ce0 gate 1563590440715840100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3756 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3757 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3758 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3759 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.718 UTC [msp.identity] Verify -> DEBU 375a Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:40.718 UTC [msp.identity] Verify -> DEBU 375b Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:40.719 UTC [msp.identity] Verify -> DEBU 375c Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:40.719 UTC [msp.identity] Verify -> DEBU 375d Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [msp] DeserializeIdentity -> DEBU 375e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [msp] DeserializeIdentity -> DEBU 375f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3760 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3761 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3762 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3763 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3764 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3765 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [cauthdsl] func1 -> DEBU 3766 0xc002f47300 gate 1563590440720911600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [cauthdsl] func2 -> DEBU 3767 0xc002f47300 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 3768 0xc002f47300 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 3769 0xc002f47300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 376a 0xc002f47300 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [cauthdsl] func1 -> DEBU 376b 0xc002f47300 gate 1563590440720911600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [cauthdsl] func1 -> DEBU 376f 0xc002f47b50 gate 1563590440727644500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3770 0xc002f47b50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3771 0xc002f47b50 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3772 0xc002f47b50 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [msp.identity] Verify -> DEBU 3773 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [msp.identity] Verify -> DEBU 3774 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [cauthdsl] func2 -> DEBU 3775 0xc002f47b50 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [cauthdsl] func1 -> DEBU 3776 0xc002f47b50 gate 1563590440727644500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3777 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3778 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3779 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 377a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [gossip.gossip] handleMessage -> DEBU 377b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.746 UTC [msp] DeserializeIdentity -> DEBU 377c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.747 UTC [msp] DeserializeIdentity -> DEBU 377d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.748 UTC [gossip.pull] Hello -> DEBU 377e Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:40.748 UTC [msp] DeserializeIdentity -> DEBU 377f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.749 UTC [msp] DeserializeIdentity -> DEBU 3780 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.749 UTC [gossip.comm] Send -> DEBU 3781 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:40.750 UTC [gossip.comm] sendToEndpoint -> DEBU 3782 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.750 UTC [gossip.comm] sendToEndpoint -> DEBU 3783 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.751 UTC [gossip.comm] func1 -> DEBU 3784 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.751 UTC [gossip.gossip] handleMessage -> DEBU 3785 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.751 UTC [gossip.pull] HandleMessage -> DEBU 3786 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.751 UTC [gossip.gossip] handleMessage -> DEBU 3787 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.842 UTC [gossip.comm] func1 -> DEBU 3788 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.843 UTC [gossip.gossip] handleMessage -> DEBU 3789 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.843 UTC [msp] DeserializeIdentity -> DEBU 378a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.843 UTC [msp] DeserializeIdentity -> DEBU 378b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:40.843 UTC [gossip.gossip] handleMessage -> DEBU 378c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:40.881 UTC [gossip.comm] func1 -> DEBU 378d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.882 UTC [gossip.gossip] handleMessage -> DEBU 378e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.882 UTC [gossip.pull] HandleMessage -> DEBU 378f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:40.882 UTC [gossip.pull] SendDigest -> DEBU 3790 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:40.882 UTC [gossip.gossip] handleMessage -> DEBU 3791 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:41.008 UTC [gossip.comm] func1 -> DEBU 3792 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:41.008 UTC [gossip.gossip] handleMessage -> DEBU 3793 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3794 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3795 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3796 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:41.009 UTC [gossip.gossip] handleMessage -> DEBU 3797 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:41.146 UTC [gossip.comm] func1 -> DEBU 3798 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:41.147 UTC [gossip.gossip] handleMessage -> DEBU 3799 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:41.148 UTC [gossip.gossip] handleMessage -> DEBU 379d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:41.977 UTC [gossip.election] waitForInterrupt -> DEBU 379e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:41.977 UTC [gossip.election] IsLeader -> DEBU 379f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:41.977 UTC [msp] GetDefaultSigningIdentity -> DEBU 37a0 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:41.977 UTC [msp.identity] Sign -> DEBU 37a1 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100D1801 " -peer0.org1.example.com | "2019-07-20 02:40:41.978 UTC [msp.identity] Sign -> DEBU 37a2 Sign: digest: 90CF7BA600D99E7061E75602966A7ACEBD4D65E00E52CA59FBA09EBA2578E66C " -peer0.org1.example.com | "2019-07-20 02:40:41.978 UTC [gossip.election] waitForInterrupt -> DEBU 37a3 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:41.982 UTC [gossip.comm] func1 -> DEBU 37a4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:41.982 UTC [gossip.gossip] handleMessage -> DEBU 37a5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:41.982 UTC [gossip.gossip] handleMessage -> DEBU 37a6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:41.982 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37a8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [msp] DeserializeIdentity -> DEBU 37a9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ab Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ac Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [cauthdsl] func1 -> DEBU 37b0 0xc00379b440 gate 1563590441983735900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b1 0xc00379b440 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b2 0xc00379b440 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b3 0xc00379b440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37b4 0xc00379b440 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func1 -> DEBU 37b5 0xc00379b440 gate 1563590441983735900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func1 -> DEBU 37b9 0xc00379bc80 gate 1563590441984447200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37ba 0xc00379bc80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37bb 0xc00379bc80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37bc 0xc00379bc80 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [msp.identity] Verify -> DEBU 37bd Verify: digest = 00000000 6a d4 8c 78 44 12 7c 84 07 4f 31 f8 71 4b 46 8c |j..xD.|..O1.qKF.| -peer0.org1.example.com | 00000010 59 e9 55 6f cb 0a d5 40 e8 f3 82 ba 01 92 53 d7 |Y.Uo...@......S.|" -peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [msp.identity] Verify -> DEBU 37be Verify: sig = 00000000 30 45 02 21 00 d1 61 2a 45 0d fb 73 e0 58 2a 80 |0E.!..a*E..s.X*.| -peer0.org1.example.com | 00000010 a0 53 59 88 00 24 11 25 b3 fa b1 59 ab 5f 88 84 |.SY..$.%...Y._..| -peer0.org1.example.com | 00000020 57 0b f9 a6 c2 02 20 10 64 04 4b 06 fe ec 7b 58 |W..... .d.K...{X| -peer0.org1.example.com | 00000030 2e f0 0a 57 ad fa bd d3 42 6b d8 1b 4f a9 9c 8e |...W....Bk..O...| -peer0.org1.example.com | 00000040 76 03 d0 44 2a 69 f7 |v..D*i.|" -peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [cauthdsl] func2 -> DEBU 37bf 0xc00379bc80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [cauthdsl] func1 -> DEBU 37c0 0xc00379bc80 gate 1563590441984447200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c3 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:41.986 UTC [gossip.discovery] handleAliveMessage -> DEBU 37c5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c7 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c8 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:41.987 UTC [gossip.discovery] learnExistingMembers -> DEBU 37ca Exiting" -peer0.org1.example.com | "2019-07-20 02:40:41.987 UTC [gossip.discovery] handleAliveMessage -> DEBU 37cb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:41.987 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37cc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.004 UTC [gossip.comm] func1 -> DEBU 37cd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.004 UTC [gossip.gossip] handleMessage -> DEBU 37ce Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.004 UTC [gossip.gossip] handleMessage -> DEBU 37cf Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.comm] func1 -> DEBU 37d2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.gossip] handleMessage -> DEBU 37d3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.gossip] handleMessage -> DEBU 37d4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37da Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.comm] Send -> DEBU 37db Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37dc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37dd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37de Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37df Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [gossip.comm] Send -> DEBU 37e2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [gossip.comm] Send -> DEBU 37e5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37eb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.285 UTC [msp] GetDefaultSigningIdentity -> DEBU 37ec Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37ed Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151029 " -peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37ee Sign: digest: 94EFC5E19F8DD13AD2602D31D781B764FAB9DD7174490DFBF95DEC6967F5BDC4 " -peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [msp] GetDefaultSigningIdentity -> DEBU 37ef Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37f0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37f1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [gossip.discovery] periodicalSendAlive -> DEBU 37f2 Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:42.297 UTC [msp] DeserializeIdentity -> DEBU 37f3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.298 UTC [msp] DeserializeIdentity -> DEBU 37f4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.298 UTC [msp] DeserializeIdentity -> DEBU 37f5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.298 UTC [gossip.comm] Send -> DEBU 37f6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:42.299 UTC [msp] DeserializeIdentity -> DEBU 37f7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.299 UTC [gossip.comm] Send -> DEBU 37f8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:42.299 UTC [gossip.comm] Send -> DEBU 37f9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:42.299 UTC [gossip.comm] sendToEndpoint -> DEBU 37fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.299 UTC [gossip.comm] sendToEndpoint -> DEBU 37fb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37ff Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.341 UTC [gossip.comm] func1 -> DEBU 3800 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.342 UTC [gossip.gossip] handleMessage -> DEBU 3801 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.342 UTC [gossip.gossip] handleMessage -> DEBU 3802 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3803 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.343 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3804 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [msp.identity] Verify -> DEBU 3805 Verify: digest = 00000000 6e 25 38 69 35 0a 9a dc 10 bb 95 88 85 ae 8f 00 |n%8i5...........| -peer0.org1.example.com | 00000010 ac be 7b 41 91 22 32 ef ff ac ef b4 6a 54 27 d7 |..{A."2.....jT'.|" -peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [msp.identity] Verify -> DEBU 3806 Verify: sig = 00000000 30 44 02 20 3f 2a 3f 73 a4 52 9b 59 d6 ad d5 53 |0D. ?*?s.R.Y...S| -peer0.org1.example.com | 00000010 e4 6f 34 43 48 06 7a 71 0c 9a c2 bd 2d 7a 1a 29 |.o4CH.zq....-z.)| -peer0.org1.example.com | 00000020 c2 5f 21 fd 02 20 27 4f ba b8 95 b6 ff f8 ec b8 |._!.. 'O........| -peer0.org1.example.com | 00000030 ac 68 dd da f3 b4 bb 76 f4 0e 59 aa 66 14 6f 56 |.h.....v..Y.f.oV| -peer0.org1.example.com | 00000040 4a b8 dd f8 bc 62 |J....b|" -peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] handleAliveMessage -> DEBU 3807 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3808 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3809 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] handleAliveMessage -> DEBU 380d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 380e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.357 UTC [gossip.comm] func1 -> DEBU 380f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.357 UTC [gossip.gossip] handleMessage -> DEBU 3810 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.357 UTC [gossip.gossip] handleMessage -> DEBU 3811 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.357 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3812 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.357 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3813 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3814 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3815 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3816 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [gossip.comm] Send -> DEBU 3817 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [gossip.comm] sendToEndpoint -> DEBU 3818 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [gossip.comm] sendToEndpoint -> DEBU 3819 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.386 UTC [gossip.comm] func1 -> DEBU 381a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.387 UTC [gossip.gossip] handleMessage -> DEBU 381b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.388 UTC [gossip.gossip] handleMessage -> DEBU 381c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.388 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.388 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.389 UTC [msp] DeserializeIdentity -> DEBU 381f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.390 UTC [gossip.comm] Send -> DEBU 3820 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:42.390 UTC [gossip.comm] sendToEndpoint -> DEBU 3821 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.390 UTC [gossip.comm] sendToEndpoint -> DEBU 3822 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.531 UTC [gossip.comm] func1 -> DEBU 3823 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [gossip.gossip] handleMessage -> DEBU 3824 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [gossip.gossip] handleMessage -> DEBU 3825 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3826 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3827 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [msp] DeserializeIdentity -> DEBU 3828 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3829 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [cauthdsl] func1 -> DEBU 382f 0xc003efbca0 gate 1563590442532929200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3830 0xc003efbca0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3831 0xc003efbca0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3832 0xc003efbca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3833 0xc003efbca0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func1 -> DEBU 3834 0xc003efbca0 gate 1563590442532929200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3835 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3836 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3837 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func1 -> DEBU 3838 0xc003e724e0 gate 1563590442533746600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3839 0xc003e724e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 383a 0xc003e724e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 383b 0xc003e724e0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [msp.identity] Verify -> DEBU 383c Verify: digest = 00000000 93 21 6e 6e 92 29 b5 ae 81 18 25 f6 6e 7c 1c 5d |.!nn.)....%.n|.]| -peer0.org1.example.com | 00000010 73 1d 71 0b 62 1d c3 f4 41 1e b3 69 99 7e 47 fa |s.q.b...A..i.~G.|" -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [msp.identity] Verify -> DEBU 383d Verify: sig = 00000000 30 44 02 20 6a 4e e2 fb d7 02 f9 ef 09 ec a2 f4 |0D. jN..........| -peer0.org1.example.com | 00000010 54 a3 d2 b1 5f cf b8 f8 c4 07 15 2c 36 b5 a2 f3 |T..._......,6...| -peer0.org1.example.com | 00000020 52 e7 11 24 02 20 6a 73 aa ea 6b 9b c2 56 de 5c |R..$. js..k..V.\| -peer0.org1.example.com | 00000030 64 6b a0 6d 38 4e d9 ea 0c 2c 50 ff a0 eb 3f 7c |dk.m8N...,P...?|| -peer0.org1.example.com | 00000040 0b 96 59 e7 42 30 |..Y.B0|" -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [cauthdsl] func2 -> DEBU 383e 0xc003e724e0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [cauthdsl] func1 -> DEBU 383f 0xc003e724e0 gate 1563590442533746600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3840 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3841 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3842 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3843 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 3844 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3845 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3846 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3847 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:42.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3848 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:42.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3849 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 384a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.539 UTC [gossip.comm] func1 -> DEBU 384c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.540 UTC [gossip.gossip] handleMessage -> DEBU 384d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.540 UTC [gossip.gossip] handleMessage -> DEBU 384e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3850 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.544 UTC [msp] DeserializeIdentity -> DEBU 3851 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.544 UTC [msp] DeserializeIdentity -> DEBU 3852 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.552 UTC [msp] DeserializeIdentity -> DEBU 3853 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3854 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3855 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3856 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.553 UTC [gossip.comm] Send -> DEBU 3857 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:42.554 UTC [msp] DeserializeIdentity -> DEBU 3858 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.554 UTC [msp] DeserializeIdentity -> DEBU 3859 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:42.561 UTC [gossip.comm] func1 -> DEBU 385a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.561 UTC [gossip.gossip] handleMessage -> DEBU 385b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.566 UTC [gossip.gossip] handleMessage -> DEBU 385c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.567 UTC [gossip.comm] Send -> DEBU 385f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3860 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3861 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3862 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:42.570 UTC [gossip.comm] sendToEndpoint -> DEBU 3863 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:43.903 UTC [gossip.comm] func1 -> DEBU 3864 Got message: GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:43.905 UTC [gossip.gossip] handleMessage -> DEBU 3865 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:43.905 UTC [gossip.gossip] handleMessage -> DEBU 3866 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:43.906 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3867 Got message: GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:43.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3868 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [msp] DeserializeIdentity -> DEBU 3869 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 386a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 386b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 386c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func1 -> DEBU 3870 0xc002fc40e0 gate 1563590443909523300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3871 0xc002fc40e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3872 0xc002fc40e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3873 0xc002fc40e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3874 0xc002fc40e0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func1 -> DEBU 3875 0xc002fc40e0 gate 1563590443909523300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3876 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3877 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3878 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:43.918 UTC [cauthdsl] func1 -> DEBU 3879 0xc002fc4920 gate 1563590443909926800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:43.918 UTC [cauthdsl] func2 -> DEBU 387a 0xc002fc4920 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:43.918 UTC [cauthdsl] func2 -> DEBU 387b 0xc002fc4920 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:43.919 UTC [cauthdsl] func2 -> DEBU 387c 0xc002fc4920 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:43.919 UTC [msp.identity] Verify -> DEBU 387d Verify: digest = 00000000 db 1e 58 a0 2e 84 8b 40 86 92 99 d2 3c d1 0b 66 |..X....@....<..f| -peer0.org1.example.com | 00000010 47 2a 64 fb fa 81 51 a5 82 be 82 74 ca 2d dd a4 |G*d...Q....t.-..|" -peer0.org1.example.com | "2019-07-20 02:40:43.919 UTC [msp.identity] Verify -> DEBU 387e Verify: sig = 00000000 30 44 02 20 3f 84 cf d6 31 37 7e 96 5c 08 97 05 |0D. ?...17~.\...| -peer0.org1.example.com | 00000010 d6 9a 91 15 bd a6 85 4d cf 35 4f 48 c4 19 e2 35 |.......M.5OH...5| -peer0.org1.example.com | 00000020 8c 42 2b 54 02 20 69 a7 da bb c9 3e 28 8e ec 79 |.B+T. i....>(..y| -peer0.org1.example.com | 00000030 29 6f ba 9d 15 bc 0f a6 a4 c0 1a 2b 67 77 0e 77 |)o.........+gw.w| -peer0.org1.example.com | 00000040 34 ca 7e d9 29 ed |4.~.).|" -peer0.org1.example.com | "2019-07-20 02:40:43.923 UTC [cauthdsl] func2 -> DEBU 387f 0xc002fc4920 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [cauthdsl] func1 -> DEBU 3880 0xc002fc4920 gate 1563590443909926800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3881 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3883 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3884 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 3885 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3886 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3887 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3888 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:43.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 3889 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:43.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 388a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:43.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 388b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:43.928 UTC [gossip.discovery] sendMemResponse -> DEBU 388c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:43.928 UTC [msp] DeserializeIdentity -> DEBU 388d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.comm] func1 -> DEBU 388e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.gossip] handleMessage -> DEBU 388f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.pull] HandleMessage -> DEBU 3890 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3891 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3892 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3893 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3894 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3895 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3896 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.pull] SendDigest -> DEBU 3897 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.gossip] handleMessage -> DEBU 3898 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:43.929 UTC [msp] DeserializeIdentity -> DEBU 3899 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 389a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.comm] Send -> DEBU 389b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:43.947 UTC [gossip.discovery] sendMemResponse -> DEBU 389c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020-" signature:"0D\002 ?*?s\244R\233Y\326\255\325S\344o4CH\006zq\014\232\302\275-z\032)\302_!\375\002 'O\272\270\225\266\377\370\354\270\254h\335\332\363\264\273v\364\016Y\252f\024oVJ\270\335\370\274b" > alive: alive:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > alive:9\232\322V\2358\311\017}\365J" > " -peer0.org1.example.com | "2019-07-20 02:40:43.947 UTC [gossip.comm] sendToEndpoint -> DEBU 389d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:43.947 UTC [gossip.comm] sendToEndpoint -> DEBU 389e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:43.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 389f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a0 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a2 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a4 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38aa Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38ab Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38ac Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38ae GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38af Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38b0 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b1 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38b2 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38b4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38b6 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.238 UTC [gossip.gossip] handleMessage -> DEBU 38b7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 38b8 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38b9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915102A " -peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38ba Sign: digest: 78526B430FABB76C2F0EFFB53CC4A7E03B04B1CF0637703092B63814E852806D " -peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 38bb Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38bc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38bd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [gossip.comm] Send -> DEBU 38be Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" secret_envelope:\032+\375\200'\340\023\034}\215\312\323\317b\274\332\205\002 L\325HG^l\224\006E'\373\226\210\022WM\243\225\252\332\306\372Qc\010P\307\343\377,a\201" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp] DeserializeIdentity -> DEBU 38bf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [gossip.comm] Send -> DEBU 38c0 Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [msp] DeserializeIdentity -> DEBU 38c1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] Send -> DEBU 38c2 Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" secret_envelope:\032+\375\200'\340\023\034}\215\312\323\317b\274\332\205\002 L\325HG^l\224\006E'\373\226\210\022WM\243\225\252\332\306\372Qc\010P\307\343\377,a\201" > > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.281 UTC [gossip.comm] func1 -> DEBU 38c9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.gossip] handleMessage -> DEBU 38ca Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.gossip] handleMessage -> DEBU 38cb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38cc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38cd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38ce Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| -peer0.org1.example.com | 00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38cf Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| -peer0.org1.example.com | 00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| -peer0.org1.example.com | 00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| -peer0.org1.example.com | 00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| -peer0.org1.example.com | 00000040 4d 0b be 53 34 dd 71 |M..S4.q|" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38d0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38d1 Verify: sig = 00000000 30 45 02 21 00 e8 97 b9 e2 df a3 5b 1a 44 d3 d2 |0E.!.......[.D..| -peer0.org1.example.com | 00000010 14 6b 2c 3e 1a 2b fd 80 27 e0 13 1c 7d 8d ca d3 |.k,>.+..'...}...| -peer0.org1.example.com | 00000020 cf 62 bc da 85 02 20 4c d5 48 47 5e 6c 94 06 45 |.b.... L.HG^l..E| -peer0.org1.example.com | 00000030 27 fb 96 88 12 57 4d a3 95 aa da c6 fa 51 63 08 |'....WM......Qc.| -peer0.org1.example.com | 00000040 50 c7 e3 ff 2c 61 81 |P...,a.|" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 38d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.discovery] isSentByMe -> DEBU 38d3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 38d4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.comm] func1 -> DEBU 38d6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.gossip] handleMessage -> DEBU 38d7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.gossip] handleMessage -> DEBU 38d8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38da Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [msp.identity] Verify -> DEBU 38db Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| -peer0.org1.example.com | 00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [msp.identity] Verify -> DEBU 38dc Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| -peer0.org1.example.com | 00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| -peer0.org1.example.com | 00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| -peer0.org1.example.com | 00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| -peer0.org1.example.com | 00000040 4d 0b be 53 34 dd 71 |M..S4.q|" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 38dd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.discovery] isSentByMe -> DEBU 38de Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 38df Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38e0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [msp] DeserializeIdentity -> DEBU 38e1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38e2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38e3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38e4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38e8 0xc0032ae3f0 gate 1563590444284004900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38e9 0xc0032ae3f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38ea 0xc0032ae3f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38eb 0xc0032ae3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38ec 0xc0032ae3f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38ed 0xc0032ae3f0 gate 1563590444284004900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38ee Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38f1 0xc0032aec30 gate 1563590444284337300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f2 0xc0032aec30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f3 0xc0032aec30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f4 0xc0032aec30 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [msp.identity] Verify -> DEBU 38f5 Verify: digest = 00000000 db 1e 58 a0 2e 84 8b 40 86 92 99 d2 3c d1 0b 66 |..X....@....<..f| -peer0.org1.example.com | 00000010 47 2a 64 fb fa 81 51 a5 82 be 82 74 ca 2d dd a4 |G*d...Q....t.-..|" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [msp.identity] Verify -> DEBU 38f6 Verify: sig = 00000000 30 44 02 20 3f 84 cf d6 31 37 7e 96 5c 08 97 05 |0D. ?...17~.\...| -peer0.org1.example.com | 00000010 d6 9a 91 15 bd a6 85 4d cf 35 4f 48 c4 19 e2 35 |.......M.5OH...5| -peer0.org1.example.com | 00000020 8c 42 2b 54 02 20 69 a7 da bb c9 3e 28 8e ec 79 |.B+T. i....>(..y| -peer0.org1.example.com | 00000030 29 6f ba 9d 15 bc 0f a6 a4 c0 1a 2b 67 77 0e 77 |)o.........+gw.w| -peer0.org1.example.com | 00000040 34 ca 7e d9 29 ed |4.~.).|" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f7 0xc0032aec30 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38f8 0xc0032aec30 gate 1563590444284337300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38f9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fb Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 38fd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 38fe Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ff Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.comm] func1 -> DEBU 3900 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.gossip] handleMessage -> DEBU 3901 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.gossip] handleMessage -> DEBU 3902 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3903 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3904 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [msp.identity] Verify -> DEBU 3905 Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| -peer0.org1.example.com | 00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" -peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [msp.identity] Verify -> DEBU 3906 Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| -peer0.org1.example.com | 00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| -peer0.org1.example.com | 00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| -peer0.org1.example.com | 00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| -peer0.org1.example.com | 00000040 4d 0b be 53 34 dd 71 |M..S4.q|" -peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3907 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.discovery] isSentByMe -> DEBU 3908 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3909 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 390a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.336 UTC [gossip.comm] func1 -> DEBU 390b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.336 UTC [gossip.gossip] handleMessage -> DEBU 390c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.336 UTC [gossip.pull] HandleMessage -> DEBU 390d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.336 UTC [gossip.pull] SendDigest -> DEBU 390e Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:44.336 UTC [gossip.gossip] handleMessage -> DEBU 390f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.360 UTC [gossip.comm] func1 -> DEBU 3910 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.360 UTC [gossip.gossip] handleMessage -> DEBU 3911 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.360 UTC [gossip.gossip] handleMessage -> DEBU 3912 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3913 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3914 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:44.361 UTC [msp.identity] Verify -> DEBU 3915 Verify: digest = 00000000 05 fc fa 54 47 c8 42 70 a1 2b 49 aa 1c dd b7 c0 |...TG.Bp.+I.....| -peer0.org1.example.com | 00000010 1a af a2 74 05 76 a0 14 ba 99 56 3a 2a 67 0f 2e |...t.v....V:*g..|" -peer0.org1.example.com | "2019-07-20 02:40:44.361 UTC [msp.identity] Verify -> DEBU 3916 Verify: sig = 00000000 30 44 02 20 16 00 3f 59 47 5f 23 40 41 9e 56 ac |0D. ..?YG_#@A.V.| -peer0.org1.example.com | 00000010 c9 2c ed db 73 62 b0 08 7b b0 bd 5c cd 34 9f 00 |.,..sb..{..\.4..| -peer0.org1.example.com | 00000020 83 da e2 5c 02 20 7c 3f de 43 69 c1 a9 7b 57 ee |...\. |?.Ci..{W.| -peer0.org1.example.com | 00000030 a9 5f 73 72 2e bf 10 e7 b2 88 d2 09 eb ea 82 04 |._sr............| -peer0.org1.example.com | 00000040 80 3e 04 d5 ec 6b |.>...k|" -peer0.org1.example.com | "2019-07-20 02:40:44.362 UTC [msp.identity] Verify -> DEBU 3917 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:44.362 UTC [msp.identity] Verify -> DEBU 3918 Verify: sig = 00000000 30 44 02 20 4a 5a 26 af 1f 21 e7 0f c9 b0 4a 42 |0D. JZ&..!....JB| -peer0.org1.example.com | 00000010 7a 0b bd d6 37 7a 7e b6 56 a2 1a 1b 6f 45 e9 c4 |z...7z~.V...oE..| -peer0.org1.example.com | 00000020 25 69 04 88 02 20 5d 50 f8 7b dc fd 7a 5f e6 3e |%i... ]P.{..z_.>| -peer0.org1.example.com | 00000030 ed df de 7e b9 de 0b be 88 fe cc 91 6e 44 c3 4f |...~........nD.O| -peer0.org1.example.com | 00000040 4d 88 17 b9 07 4b |M....K|" -peer0.org1.example.com | "2019-07-20 02:40:44.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 3919 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 391a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:44.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 391b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 391f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.367 UTC [gossip.discovery] sendMemResponse -> DEBU 3920 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:44.367 UTC [msp] DeserializeIdentity -> DEBU 3921 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.368 UTC [msp] DeserializeIdentity -> DEBU 3922 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.368 UTC [gossip.comm] Send -> DEBU 3923 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:44.368 UTC [gossip.discovery] sendMemResponse -> DEBU 3924 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > alive:9\232\322V\2358\311\017}\365J" > " -peer0.org1.example.com | "2019-07-20 02:40:44.368 UTC [gossip.comm] sendToEndpoint -> DEBU 3925 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.368 UTC [gossip.comm] sendToEndpoint -> DEBU 3926 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3927 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.594 UTC [gossip.comm] func1 -> DEBU 3928 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.594 UTC [gossip.gossip] handleMessage -> DEBU 3929 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.595 UTC [gossip.pull] HandleMessage -> DEBU 392a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.595 UTC [msp] DeserializeIdentity -> DEBU 392b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.597 UTC [msp] DeserializeIdentity -> DEBU 392c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.597 UTC [msp] DeserializeIdentity -> DEBU 392d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.600 UTC [msp] DeserializeIdentity -> DEBU 392e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.600 UTC [msp] DeserializeIdentity -> DEBU 392f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.601 UTC [msp] DeserializeIdentity -> DEBU 3930 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.601 UTC [gossip.pull] SendDigest -> DEBU 3931 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:44.601 UTC [gossip.gossip] handleMessage -> DEBU 3932 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.625 UTC [gossip.comm] func1 -> DEBU 3933 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.635 UTC [gossip.gossip] handleMessage -> DEBU 3934 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3935 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3936 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:44.635 UTC [msp] DeserializeIdentity -> DEBU 3937 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.636 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3938 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:44.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3939 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 393a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.638 UTC [cauthdsl] func1 -> DEBU 393e 0xc003c94b80 gate 1563590444637999900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 393f 0xc003c94b80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3940 0xc003c94b80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3941 0xc003c94b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3942 0xc003c94b80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.639 UTC [cauthdsl] func1 -> DEBU 3943 0xc003c94b80 gate 1563590444637999900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.639 UTC [policies] Evaluate -> DEBU 3944 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.639 UTC [policies] Evaluate -> DEBU 3945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.640 UTC [policies] Evaluate -> DEBU 3946 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.640 UTC [cauthdsl] func1 -> DEBU 3947 0xc003c953c0 gate 1563590444640125400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 3948 0xc003c953c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 3949 0xc003c953c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 394a 0xc003c953c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.641 UTC [msp.identity] Verify -> DEBU 394b Verify: digest = 00000000 3b 74 8c 70 3a 0e 1a b2 79 e8 52 db fa 61 da 07 |;t.p:...y.R..a..| -peer0.org1.example.com | 00000010 d8 78 6d 5f 67 5f d6 5e 95 7c 35 77 12 57 28 f2 |.xm_g_.^.|5w.W(.|" -peer0.org1.example.com | "2019-07-20 02:40:44.641 UTC [msp.identity] Verify -> DEBU 394c Verify: sig = 00000000 30 45 02 21 00 f8 a2 a3 57 f1 f9 29 1d 8b b4 9a |0E.!....W..)....| -peer0.org1.example.com | 00000010 88 f8 52 f4 5f e9 b9 2e f4 00 2f 5a 4d e9 e9 3d |..R._...../ZM..=| -peer0.org1.example.com | 00000020 aa 15 ec f7 9f 02 20 43 22 09 5b 58 7e d9 95 a9 |...... C".[X~...| -peer0.org1.example.com | 00000030 6a 44 46 1c b3 33 57 bf 36 30 1e 29 0a 65 ab f8 |jDF..3W.60.).e..| -peer0.org1.example.com | 00000040 e0 c6 6b fc 4e 97 cc |..k.N..|" -peer0.org1.example.com | "2019-07-20 02:40:44.642 UTC [cauthdsl] func2 -> DEBU 394e 0xc003c953c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.643 UTC [cauthdsl] func1 -> DEBU 394f 0xc003c953c0 gate 1563590444640125400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:44.635 UTC [gossip.gossip] handleMessage -> DEBU 394d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3950 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3951 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3952 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3953 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.644 UTC [gossip.discovery] handleAliveMessage -> DEBU 3954 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 3955 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3956 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3957 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3958 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3959 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] handleAliveMessage -> DEBU 395a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 395b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] sendMemResponse -> DEBU 395c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:44.653 UTC [msp] DeserializeIdentity -> DEBU 395d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.654 UTC [msp] DeserializeIdentity -> DEBU 395e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.654 UTC [msp] DeserializeIdentity -> DEBU 395f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.654 UTC [gossip.comm] Send -> DEBU 3960 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:44.655 UTC [gossip.discovery] sendMemResponse -> DEBU 3961 Exiting, replying with alive: alive:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" > alive:9\232\322V\2358\311\017}\365J" > " -peer0.org1.example.com | "2019-07-20 02:40:44.655 UTC [gossip.comm] sendToEndpoint -> DEBU 3962 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.655 UTC [gossip.comm] sendToEndpoint -> DEBU 3963 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.682 UTC [msp] DeserializeIdentity -> DEBU 3964 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.682 UTC [msp] DeserializeIdentity -> DEBU 3965 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.683 UTC [gossip.comm] Send -> DEBU 3966 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3967 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3968 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3969 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 396a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.684 UTC [gossip.comm] sendToEndpoint -> DEBU 396b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.684 UTC [gossip.comm] sendToEndpoint -> DEBU 396c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.685 UTC [gossip.comm] func1 -> DEBU 396d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.685 UTC [gossip.gossip] handleMessage -> DEBU 396e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 396f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 3970 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 3971 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3972 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:44.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3973 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3974 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3975 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3976 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3977 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.688 UTC [cauthdsl] func1 -> DEBU 3978 0xc0032b4e30 gate 1563590444688095000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.688 UTC [cauthdsl] func2 -> DEBU 3979 0xc0032b4e30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.688 UTC [cauthdsl] func2 -> DEBU 397a 0xc0032b4e30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.693 UTC [cauthdsl] func2 -> DEBU 397d 0xc0032b4e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 397e 0xc0032b4e30 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [cauthdsl] func1 -> DEBU 397f 0xc0032b4e30 gate 1563590444688095000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3980 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3981 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3982 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [cauthdsl] func1 -> DEBU 3983 0xc0032b5670 gate 1563590444694800600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 3984 0xc0032b5670 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 3985 0xc0032b5670 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [cauthdsl] func2 -> DEBU 3986 0xc0032b5670 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [msp.identity] Verify -> DEBU 3987 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [msp.identity] Verify -> DEBU 3988 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [cauthdsl] func2 -> DEBU 3989 0xc0032b5670 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [cauthdsl] func1 -> DEBU 398a 0xc0032b5670 gate 1563590444694800600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 398f Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3990 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3991 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3992 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:44.696 UTC [msp] DeserializeIdentity -> DEBU 3993 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [msp] DeserializeIdentity -> DEBU 3994 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3995 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3996 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3997 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 3998 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 3999 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 399a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [cauthdsl] func1 -> DEBU 399b 0xc003331c80 gate 1563590444697832100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [cauthdsl] func2 -> DEBU 399c 0xc003331c80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399d 0xc003331c80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399e 0xc003331c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399f 0xc003331c80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func1 -> DEBU 39a0 0xc003331c80 gate 1563590444697832100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func1 -> DEBU 39a4 0xc0033ce4c0 gate 1563590444698460000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a5 0xc0033ce4c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a6 0xc0033ce4c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a7 0xc0033ce4c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [msp.identity] Verify -> DEBU 39a8 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [msp.identity] Verify -> DEBU 39a9 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [cauthdsl] func2 -> DEBU 39aa 0xc0033ce4c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [cauthdsl] func1 -> DEBU 39ab 0xc0033ce4c0 gate 1563590444698460000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ae Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [gossip.gossip] handleMessage -> DEBU 39b0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.690 UTC [gossip.comm] func1 -> DEBU 397b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [gossip.gossip] handleMessage -> DEBU 39b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b6 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b7 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.700 UTC [policies] Evaluate -> DEBU 39b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.701 UTC [policies] Evaluate -> DEBU 39b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:44.701 UTC [policies] Evaluate -> DEBU 39ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.701 UTC [cauthdsl] func1 -> DEBU 39bb 0xc0033cffe0 gate 1563590444701730900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.690 UTC [gossip.comm] func1 -> DEBU 397c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.704 UTC [cauthdsl] func2 -> DEBU 39bc 0xc0033cffe0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39bd 0xc0033cffe0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39be 0xc0033cffe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39bf 0xc0033cffe0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func1 -> DEBU 39c0 0xc0033cffe0 gate 1563590444701730900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func1 -> DEBU 39c4 0xc003f056c0 gate 1563590444705686500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c5 0xc003f056c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c6 0xc003f056c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c7 0xc003f056c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [msp.identity] Verify -> DEBU 39c8 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [msp.identity] Verify -> DEBU 39c9 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [cauthdsl] func2 -> DEBU 39ca 0xc003f056c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [cauthdsl] func1 -> DEBU 39cb 0xc003f056c0 gate 1563590444705686500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39ce Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d0 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d1 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d2 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d3 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp] DeserializeIdentity -> DEBU 39d4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp] DeserializeIdentity -> DEBU 39d5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39d6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39d7 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39d8 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [cauthdsl] func1 -> DEBU 39dc 0xc003423cd0 gate 1563590444707234900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.708 UTC [cauthdsl] func2 -> DEBU 39dd 0xc003423cd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.708 UTC [cauthdsl] func2 -> DEBU 39de 0xc003423cd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [cauthdsl] func2 -> DEBU 39df 0xc003423cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [cauthdsl] func2 -> DEBU 39e0 0xc003423cd0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [cauthdsl] func1 -> DEBU 39e1 0xc003423cd0 gate 1563590444707234900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.710 UTC [cauthdsl] func1 -> DEBU 39e5 0xc003502510 gate 1563590444710199200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e6 0xc003502510 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e7 0xc003502510 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e8 0xc003502510 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.711 UTC [msp.identity] Verify -> DEBU 39e9 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:44.711 UTC [msp.identity] Verify -> DEBU 39ea Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [cauthdsl] func2 -> DEBU 39eb 0xc003502510 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [cauthdsl] func1 -> DEBU 39ec 0xc003502510 gate 1563590444710199200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ef Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [gossip.gossip] handleMessage -> DEBU 39f1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.713 UTC [gossip.gossip] handleMessage -> DEBU 39f2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.713 UTC [msp.identity] Verify -> DEBU 39f3 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f4 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f5 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f6 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:44.715 UTC [msp] DeserializeIdentity -> DEBU 39f7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.715 UTC [msp] DeserializeIdentity -> DEBU 39f8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.716 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:44.716 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39fa Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39fb Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.717 UTC [policies] Evaluate -> DEBU 39fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.717 UTC [policies] Evaluate -> DEBU 39fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:44.718 UTC [policies] Evaluate -> DEBU 39fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.718 UTC [cauthdsl] func1 -> DEBU 39ff 0xc00350ed60 gate 1563590444718592300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a00 0xc00350ed60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a01 0xc00350ed60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a02 0xc00350ed60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a03 0xc00350ed60 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.719 UTC [cauthdsl] func1 -> DEBU 3a04 0xc00350ed60 gate 1563590444718592300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.720 UTC [policies] Evaluate -> DEBU 3a05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.720 UTC [policies] Evaluate -> DEBU 3a06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.721 UTC [policies] Evaluate -> DEBU 3a07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.721 UTC [cauthdsl] func1 -> DEBU 3a08 0xc00350f5a0 gate 1563590444721413600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.721 UTC [cauthdsl] func2 -> DEBU 3a09 0xc00350f5a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.722 UTC [cauthdsl] func2 -> DEBU 3a0a 0xc00350f5a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.722 UTC [cauthdsl] func2 -> DEBU 3a0b 0xc00350f5a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.722 UTC [msp.identity] Verify -> DEBU 3a0c Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:44.722 UTC [msp.identity] Verify -> DEBU 3a0d Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:44.723 UTC [cauthdsl] func2 -> DEBU 3a0e 0xc00350f5a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.723 UTC [cauthdsl] func1 -> DEBU 3a0f 0xc00350f5a0 gate 1563590444721413600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a12 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.725 UTC [msp] DeserializeIdentity -> DEBU 3a14 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.725 UTC [msp] DeserializeIdentity -> DEBU 3a15 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a17 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a18 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.728 UTC [cauthdsl] func1 -> DEBU 3a1c 0xc003606d70 gate 1563590444728548600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.728 UTC [cauthdsl] func2 -> DEBU 3a1d 0xc003606d70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.729 UTC [cauthdsl] func2 -> DEBU 3a1e 0xc003606d70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.729 UTC [cauthdsl] func2 -> DEBU 3a1f 0xc003606d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:44.730 UTC [cauthdsl] func2 -> DEBU 3a20 0xc003606d70 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.730 UTC [cauthdsl] func1 -> DEBU 3a21 0xc003606d70 gate 1563590444728548600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:44.731 UTC [policies] Evaluate -> DEBU 3a22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.731 UTC [policies] Evaluate -> DEBU 3a23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.732 UTC [policies] Evaluate -> DEBU 3a24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:44.732 UTC [cauthdsl] func1 -> DEBU 3a25 0xc0036075b0 gate 1563590444732725700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:44.733 UTC [cauthdsl] func2 -> DEBU 3a26 0xc0036075b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:44.733 UTC [cauthdsl] func2 -> DEBU 3a27 0xc0036075b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:44.734 UTC [cauthdsl] func2 -> DEBU 3a28 0xc0036075b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.734 UTC [msp.identity] Verify -> DEBU 3a29 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:44.734 UTC [msp.identity] Verify -> DEBU 3a2a Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:44.736 UTC [cauthdsl] func2 -> DEBU 3a2b 0xc0036075b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:44.736 UTC [cauthdsl] func1 -> DEBU 3a2c 0xc0036075b0 gate 1563590444732725700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:44.736 UTC [policies] Evaluate -> DEBU 3a2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a2f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:44.738 UTC [gossip.gossip] handleMessage -> DEBU 3a31 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.751 UTC [msp] DeserializeIdentity -> DEBU 3a32 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.751 UTC [msp] DeserializeIdentity -> DEBU 3a33 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.753 UTC [gossip.pull] Hello -> DEBU 3a34 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:44.753 UTC [msp] DeserializeIdentity -> DEBU 3a35 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.753 UTC [msp] DeserializeIdentity -> DEBU 3a36 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.754 UTC [gossip.comm] Send -> DEBU 3a37 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:44.754 UTC [gossip.comm] sendToEndpoint -> DEBU 3a38 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.754 UTC [gossip.comm] sendToEndpoint -> DEBU 3a39 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.755 UTC [gossip.comm] func1 -> DEBU 3a3a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.755 UTC [gossip.gossip] handleMessage -> DEBU 3a3b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.756 UTC [gossip.pull] HandleMessage -> DEBU 3a3c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.756 UTC [gossip.gossip] handleMessage -> DEBU 3a3d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.855 UTC [gossip.comm] func1 -> DEBU 3a3e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.855 UTC [gossip.gossip] handleMessage -> DEBU 3a3f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.856 UTC [msp] DeserializeIdentity -> DEBU 3a40 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.856 UTC [msp] DeserializeIdentity -> DEBU 3a41 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:44.857 UTC [gossip.gossip] handleMessage -> DEBU 3a42 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:44.898 UTC [gossip.comm] func1 -> DEBU 3a43 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.899 UTC [gossip.gossip] handleMessage -> DEBU 3a44 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.899 UTC [gossip.pull] HandleMessage -> DEBU 3a45 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:44.899 UTC [gossip.pull] SendDigest -> DEBU 3a46 Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:44.900 UTC [gossip.gossip] handleMessage -> DEBU 3a47 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.008 UTC [gossip.comm] func1 -> DEBU 3a48 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.008 UTC [gossip.gossip] handleMessage -> DEBU 3a49 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.008 UTC [msp] DeserializeIdentity -> DEBU 3a4a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.008 UTC [msp] DeserializeIdentity -> DEBU 3a4b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.009 UTC [msp] DeserializeIdentity -> DEBU 3a4c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.009 UTC [gossip.gossip] handleMessage -> DEBU 3a4d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.147 UTC [gossip.comm] func1 -> DEBU 3a4e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.147 UTC [gossip.gossip] handleMessage -> DEBU 3a4f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a50 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a51 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a52 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.149 UTC [gossip.gossip] handleMessage -> DEBU 3a53 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.189 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3a54 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.189 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3a55 Got block validation policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.189 UTC [policies] Evaluate -> DEBU 3a56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -peer0.org1.example.com | "2019-07-20 02:40:45.190 UTC [policies] Evaluate -> DEBU 3a57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.190 UTC [policies] Evaluate -> DEBU 3a58 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.191 UTC [cauthdsl] func1 -> DEBU 3a59 0xc00377e010 gate 1563590445191649300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5a 0xc00377e010 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5b 0xc00377e010 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5c 0xc00377e010 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.192 UTC [msp.identity] Verify -> DEBU 3a5d Verify: digest = 00000000 96 9a dc 26 d2 06 fc 8f 84 64 fa 05 e1 8e 6a 27 |...&.....d....j'| -peer0.org1.example.com | 00000010 d1 ff d3 b3 c0 f2 30 ca d0 c0 63 5e df dd 39 d2 |......0...c^..9.|" -peer0.org1.example.com | "2019-07-20 02:40:45.193 UTC [msp.identity] Verify -> DEBU 3a5e Verify: sig = 00000000 30 45 02 21 00 f1 a2 5b a0 26 b4 0f c5 13 18 a1 |0E.!...[.&......| -peer0.org1.example.com | 00000010 46 65 a7 e0 4a e7 af b6 23 0e a5 b2 a8 2e 3a ae |Fe..J...#.....:.| -peer0.org1.example.com | 00000020 3d c2 90 8d 39 02 20 18 47 1d c1 ff 4a 42 4d d2 |=...9. .G...JBM.| -peer0.org1.example.com | 00000030 60 3e 51 8e 91 f6 0f e4 29 18 5e 13 10 48 63 06 |`>Q.....).^..Hc.| -peer0.org1.example.com | 00000040 b4 dd 5a be 3a a9 aa |..Z.:..|" -peer0.org1.example.com | "2019-07-20 02:40:45.193 UTC [cauthdsl] func2 -> DEBU 3a5f 0xc00377e010 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.193 UTC [cauthdsl] func1 -> DEBU 3a60 0xc00377e010 gate 1563590445191649300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a61 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a62 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a63 Signature set satisfies policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [blocksProvider] DeliverBlocks -> DEBU 3a65 [businesschannel] Adding payload to local buffer, blockNum = [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [gossip.state] addPayload -> DEBU 3a66 [businesschannel] Adding payload to local buffer, blockNum = [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [gossip.state] addPayload -> DEBU 3a67 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [blocksProvider] DeliverBlocks -> DEBU 3a68 [businesschannel] Gossiping block [6], peers number [3]" -peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [gossip.state] deliverPayloads -> DEBU 3a69 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [gossip.state] deliverPayloads -> DEBU 3a6a [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" -peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [gossip.privdata] StoreBlock -> INFO 3a6b [businesschannel] Received block [6] from buffer" -peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [gossip.privdata] StoreBlock -> DEBU 3a6c [businesschannel] Validating block [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [committer.txvalidator] Validate -> DEBU 3a6d [businesschannel] START Block Validation for block [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [committer.txvalidator] Validate -> DEBU 3a6e expecting 1 block validation responses" -peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [committer.txvalidator] validateTx -> DEBU 3a6f [businesschannel] validateTx starts for block 0xc000695640 env 0xc003781400 txn 0" -peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [protoutils] ValidateTransaction -> DEBU 3a70 ValidateTransactionEnvelope starts for envelope 0xc003781400" -peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [gossip.channel] AddToMsgStore -> DEBU 3a71 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes to the block puller" -peer0.org1.example.com | "2019-07-20 02:40:45.197 UTC [gossip.pull] Add -> DEBU 3a73 Added 6, total items: 6" -peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [protoutils] ValidateTransaction -> DEBU 3a72 Header is channel_header:"\010\001\032\006\010\255\376\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030K6t\252\2519\357\227\251\316\177e\325\037\216\234\223<\362\336\241\376\376\217" " -peer0.org1.example.com | "2019-07-20 02:40:45.197 UTC [protoutils] validateChannelHeader -> DEBU 3a74 validateChannelHeader info: header type 1" -peer0.org1.example.com | "2019-07-20 02:40:45.197 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a75 begin" -peer0.org1.example.com | "2019-07-20 02:40:45.198 UTC [msp] GetManagerForChain -> DEBU 3a76 Returning existing manager for channel 'businesschannel'" -peer0.org1.example.com | "2019-07-20 02:40:45.198 UTC [msp] DeserializeIdentity -> DEBU 3a77 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.199 UTC [msp.identity] newIdentity -> DEBU 3a78 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -peer0.org1.example.com | QQ== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:45.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a79 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -peer0.org1.example.com | "2019-07-20 02:40:45.200 UTC [msp] Validate -> DEBU 3a7a MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:45.203 UTC [msp] DeserializeIdentity -> DEBU 3a7b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.204 UTC [gossip.comm] Send -> DEBU 3a7f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:45.205 UTC [msp] DeserializeIdentity -> DEBU 3a80 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.205 UTC [msp] DeserializeIdentity -> DEBU 3a81 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.205 UTC [gossip.comm] sendToEndpoint -> DEBU 3a82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.205 UTC [gossip.comm] sendToEndpoint -> DEBU 3a83 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.205 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a84 creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:45.207 UTC [msp.identity] Verify -> DEBU 3a85 Verify: digest = 00000000 e6 57 06 ac d2 87 6b c2 b6 92 7b 61 ad d8 9d 93 |.W....k...{a....| -peer0.org1.example.com | 00000010 f7 5a 2a be 3d 40 7c 29 04 a0 13 78 5c 74 d7 b8 |.Z*.=@|)...x\t..|" -peer0.org1.example.com | "2019-07-20 02:40:45.207 UTC [msp.identity] Verify -> DEBU 3a86 Verify: sig = 00000000 30 43 02 1f 74 f5 ee 6a 28 f5 da 8c 41 f5 e2 69 |0C..t..j(...A..i| -peer0.org1.example.com | 00000010 e8 f9 d2 93 4f c7 61 e5 e2 e1 7b 30 6e bf 8b cc |....O.a...{0n...| -peer0.org1.example.com | 00000020 f7 f1 cf 02 20 12 d4 eb ba 3b 2f 97 3c df 61 c2 |.... ....;/.<.a.| -peer0.org1.example.com | 00000030 2d b9 86 81 75 ee 2e b8 a3 6e cb 9c ae 7b 09 34 |-...u....n...{.4| -peer0.org1.example.com | 00000040 63 b0 56 6b 0a |c.Vk.|" -peer0.org1.example.com | "2019-07-20 02:40:45.208 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a87 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:45.209 UTC [protoutils] validateConfigTransaction -> DEBU 3a88 validateConfigTransaction starts for data 0xc00305a000, header channel_header:"\010\001\032\006\010\255\376\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030K6t\252\2519\357\227\251\316\177e\325\037\216\234\223<\362\336\241\376\376\217" " -peer0.org1.example.com | "2019-07-20 02:40:45.210 UTC [committer.txvalidator] validateTx -> DEBU 3a89 Transaction is for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:45.214 UTC [common.configtx] addToMap -> DEBU 3a8a Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8b Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8c Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8d Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8e Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8f Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a90 Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a91 Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a92 Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a93 Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a94 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a95 Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a96 Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a97 Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a98 Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a99 Adding to config map: [Group] /Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a9a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 3a9b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9c Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9d Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 3a9f Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 3aa0 Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-07-20 02:40:45.224 UTC [common.configtx] addToMap -> DEBU 3aa1 Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 3aa2 Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 3aa3 Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 3aa4 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 3aa5 Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.227 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa6 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.228 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa7 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.228 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa8 Processing change to key: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:40:45.229 UTC [common.configtx] policyForItem -> DEBU 3aa9 Getting policy for item Application with mod_policy Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.230 UTC [policies] Manager -> DEBU 3aaa Manager Channel looking up path []" -peer0.org1.example.com | "2019-07-20 02:40:45.230 UTC [policies] Manager -> DEBU 3aab Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:40:45.232 UTC [policies] Manager -> DEBU 3aac Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:40:45.233 UTC [policies] Manager -> DEBU 3aad Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-07-20 02:40:45.233 UTC [policies] Manager -> DEBU 3aae Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:40:45.237 UTC [policies] Manager -> DEBU 3aaf Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:40:45.237 UTC [policies] Manager -> DEBU 3ab0 Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-07-20 02:40:45.238 UTC [policies] Manager -> DEBU 3ab1 Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com |[0m "2019-07-20 02:40:45.238 UTC [policies] Manager -> DEBU 3ab2 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.239 UTC [policies] Evaluate -> DEBU 3ab3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -peer0.org1.example.com | "2019-07-20 02:40:45.239 UTC [policies] Evaluate -> DEBU 3ab4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.240 UTC [policies] Evaluate -> DEBU 3ab5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -peer0.org1.example.com | "2019-07-20 02:40:45.241 UTC [cauthdsl] deduplicate -> WARN 3ab6 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer0.org1.example.com | "2019-07-20 02:40:45.241 UTC [cauthdsl] func1 -> DEBU 3ab7 0xc0039f8cc0 gate 1563590445241470500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3ab8 0xc0039f8cc0 signed by 0 principal evaluation starts (used [false false false])" -peer0.org1.example.com | "2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3ab9 0xc0039f8cc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3aba 0xc0039f8cc0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.243 UTC [msp.identity] Verify -> DEBU 3abb Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| -peer0.org1.example.com | 00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" -peer0.org1.example.com | "2019-07-20 02:40:45.243 UTC [msp.identity] Verify -> DEBU 3abc Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| -peer0.org1.example.com | 00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| -peer0.org1.example.com | 00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| -peer0.org1.example.com | 00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| -peer0.org1.example.com | 00000040 ed 0f 29 74 0b 84 |..)t..|" -peer0.org1.example.com | "2019-07-20 02:40:45.244 UTC [cauthdsl] func2 -> DEBU 3abd 0xc0039f8cc0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.244 UTC [cauthdsl] func1 -> DEBU 3abe 0xc0039f8cc0 gate 1563590445241470500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.244 UTC [policies] Evaluate -> DEBU 3abf Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.245 UTC [policies] Evaluate -> DEBU 3ac0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.247 UTC [policies] Evaluate -> DEBU 3ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -peer0.org1.example.com | "2019-07-20 02:40:45.248 UTC [cauthdsl] deduplicate -> WARN 3ac2 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -peer0.org1.example.com | "2019-07-20 02:40:45.248 UTC [cauthdsl] func1 -> DEBU 3ac3 0xc0039f92f0 gate 1563590445248608200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.248 UTC [cauthdsl] func2 -> DEBU 3ac4 0xc0039f92f0 signed by 0 principal evaluation starts (used [false false false])" -peer0.org1.example.com | "2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac5 0xc0039f92f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac6 0xc0039f92f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac7 0xc0039f92f0 processing identity 1 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.250 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3ac8 Checking if identity satisfies ADMIN role for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.251 UTC [cauthdsl] func2 -> DEBU 3ac9 0xc0039f92f0 principal matched by identity 1" -peer0.org1.example.com | "2019-07-20 02:40:45.251 UTC [msp.identity] Verify -> DEBU 3aca Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| -peer0.org1.example.com | 00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" -peer0.org1.example.com | "2019-07-20 02:40:45.252 UTC [msp.identity] Verify -> DEBU 3acb Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| -peer0.org1.example.com | 00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| -peer0.org1.example.com | 00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| -peer0.org1.example.com | 00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| -peer0.org1.example.com | 00000040 6a a2 e2 e3 7c fb |j...|.|" -peer0.org1.example.com | "2019-07-20 02:40:45.261 UTC [cauthdsl] func2 -> DEBU 3acc 0xc0039f92f0 principal evaluation succeeds for identity 1" -peer0.org1.example.com | "2019-07-20 02:40:45.261 UTC [cauthdsl] func1 -> DEBU 3acd 0xc0039f92f0 gate 1563590445248608200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.262 UTC [policies] Evaluate -> DEBU 3ace Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.262 UTC [policies] Evaluate -> DEBU 3acf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.264 UTC [policies] Evaluate -> DEBU 3ad0 Signature set satisfies policy /Channel/Application/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.264 UTC [policies] Evaluate -> DEBU 3ad1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.264 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad2 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad3 Processing change to key: [Group] /Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad4 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad5 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad6 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad7 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad8 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3ad9 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3ada Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3adb Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3adc Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.268 UTC [common.configtx] recurseConfigMap -> DEBU 3add Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.268 UTC [common.configtx] recurseConfigMap -> DEBU 3ade Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3adf Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae0 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae2 Setting policy for key Admins to " -peer0.org1.example.com | "2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae3 Setting policy for key Endorsement to " -peer0.org1.example.com | "2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae4 Setting policy for key LifecycleEndorsement to " -peer0.org1.example.com | "2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae5 Setting policy for key Readers to " -peer0.org1.example.com | "2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae6 Setting policy for key Writers to " -peer0.org1.example.com | "2019-07-20 02:40:45.274 UTC [common.configtx] recurseConfigMap -> DEBU 3ae7 Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.275 UTC [common.configtx] recurseConfigMap -> DEBU 3ae8 Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3ae9 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3aea Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3aeb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.277 UTC [common.configtx] recurseConfigMap -> DEBU 3aec Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.280 UTC [common.configtx] recurseConfigMap -> DEBU 3aed Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.282 UTC [common.configtx] recurseConfigMap -> DEBU 3aee Setting policy for key Readers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.284 UTC [common.configtx] recurseConfigMap -> DEBU 3aef Setting policy for key Writers to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.285 UTC [common.configtx] recurseConfigMap -> DEBU 3af0 Setting policy for key Admins to policy: mod_policy:"Admins" " -peer0.org1.example.com | "2019-07-20 02:40:45.287 UTC [common.channelconfig] NewStandardValues -> DEBU 3af1 Initializing protos for *channelconfig.ChannelProtos" -peer0.org1.example.com | "2019-07-20 02:40:45.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af2 Processing field: HashingAlgorithm" -peer0.org1.example.com | "2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af3 Processing field: BlockDataHashingStructure" -peer0.org1.example.com | "2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af4 Processing field: OrdererAddresses" -peer0.org1.example.com | "2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af5 Processing field: Consortium" -peer0.org1.example.com | "2019-07-20 02:40:45.290 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af6 Processing field: Capabilities" -peer0.org1.example.com | "2019-07-20 02:40:45.291 UTC [common.channelconfig] NewStandardValues -> DEBU 3af7 Initializing protos for *channelconfig.ApplicationProtos" -peer0.org1.example.com | "2019-07-20 02:40:45.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af8 Processing field: ACLs" -peer0.org1.example.com | "2019-07-20 02:40:45.294 UTC [comm.grpc.server] 1 -> INFO 3af9 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.293Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=166.1µs -peer0.org1.example.com | "2019-07-20 02:40:45.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afa Processing field: Capabilities" -peer0.org1.example.com | "2019-07-20 02:40:45.303 UTC [common.channelconfig] NewStandardValues -> DEBU 3afb Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-07-20 02:40:45.304 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afc Processing field: AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:40:45.304 UTC [common.channelconfig] NewStandardValues -> DEBU 3afd Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:40:45.304 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afe Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.304 UTC [common.channelconfig] Validate -> DEBU 3aff Anchor peers for org Org3MSP are " -peer0.org1.example.com | "2019-07-20 02:40:45.305 UTC [common.channelconfig] validateMSP -> DEBU 3b00 Setting up MSP for org Org3MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.305 UTC [msp] newBccspMsp -> DEBU 3b01 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:40:45.306 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b02 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:45.306 UTC [msp.identity] Sign -> DEBU 3b03 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:40:45.306 UTC [msp.identity] Sign -> DEBU 3b04 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:40:45.309 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b05 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:34150" -peer0.org1.example.com | "2019-07-20 02:40:45.310 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b06 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:34150" -peer0.org1.example.com | "2019-07-20 02:40:45.312 UTC [msp.identity] Verify -> DEBU 3b07 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-07-20 02:40:45.312 UTC [msp.identity] Verify -> DEBU 3b08 Verify: sig = 00000000 30 45 02 21 00 be 5f 24 6f 9b 2e 79 cd 7b 8c b2 |0E.!.._$o..y.{..| -peer0.org1.example.com | 00000010 37 cf 5e 2c 50 16 db ab 74 30 02 39 8d 06 6c 42 |7.^,P...t0.9..lB| -peer0.org1.example.com | 00000020 0d e8 3d 51 de 02 20 12 f9 a6 96 80 2e 96 d1 be |..=Q.. .........| -peer0.org1.example.com | 00000030 fd 33 cf 4a 1a f7 4b 07 01 e8 c6 0d e3 58 b3 0e |.3.J..K......X..| -peer0.org1.example.com | 00000040 4b be 81 51 0f c3 af |K..Q...|" -peer0.org1.example.com | "2019-07-20 02:40:45.313 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b09 Authenticated 172.18.0.6:34150" -peer0.org1.example.com | "2019-07-20 02:40:45.313 UTC [gossip.comm] GossipStream -> DEBU 3b0a Servicing 172.18.0.6:34150" -peer0.org1.example.com | "2019-07-20 02:40:45.314 UTC [gossip.comm] serviceConnection -> DEBU 3b0b Closing reading from stream" -peer0.org1.example.com | "2019-07-20 02:40:45.314 UTC [gossip.comm] writeToStream -> DEBU 3b0c Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:40:45.316 UTC [gossip.comm] readFromStream -> DEBU 3b0d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -peer0.org1.example.com | "2019-07-20 02:40:45.305 UTC [msp] New -> DEBU 3b0e Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:40:45.317 UTC [msp] Setup -> DEBU 3b0f Setting up MSP instance Org3MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.317 UTC [grpc] infof -> DEBU 3b10 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:45.318 UTC [gossip.comm] readFromStream -> DEBU 3b11 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:40:45.318 UTC [gossip.comm] func2 -> DEBU 3b12 Client 172.18.0.6:34150 disconnected" -peer0.org1.example.com | "2019-07-20 02:40:45.319 UTC [comm.grpc.server] 1 -> INFO 3b13 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.306Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.9498ms -peer0.org1.example.com | "2019-07-20 02:40:45.319 UTC [grpc] infof -> DEBU 3b14 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:45.319 UTC [gossip.comm] writeToStream -> DEBU 3b15 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:40:45.322 UTC [msp.identity] newIdentity -> DEBU 3b16 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB -peer0.org1.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc -peer0.org1.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:45.322 UTC [msp.identity] newIdentity -> DEBU 3b17 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y -peer0.org1.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr -peer0.org1.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky -peer0.org1.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV -peer0.org1.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO -peer0.org1.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ -peer0.org1.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:45.324 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b18 Checking if identity satisfies role [CLIENT] for Org3MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.324 UTC [msp] Validate -> DEBU 3b19 MSP Org3MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:45.324 UTC [msp] getCertificationChain -> DEBU 3b1a MSP Org3MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [msp] hasOURole -> DEBU 3b1b MSP Org3MSP checking if the identity is a client" -peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [msp] getCertificationChain -> DEBU 3b1c MSP Org3MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [common.channelconfig] NewStandardValues -> DEBU 3b1d Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b1e Processing field: AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [common.channelconfig] NewStandardValues -> DEBU 3b1f Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b20 Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [common.channelconfig] Validate -> DEBU 3b21 Anchor peers for org Org1MSP are anchor_peers: " -peer0.org1.example.com | "2019-07-20 02:40:45.326 UTC [common.channelconfig] validateMSP -> DEBU 3b22 Setting up MSP for org Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.334 UTC [msp] newBccspMsp -> DEBU 3b23 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:40:45.334 UTC [msp] New -> DEBU 3b24 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:40:45.335 UTC [msp] Setup -> DEBU 3b25 Setting up MSP instance Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.337 UTC [msp.identity] newIdentity -> DEBU 3b26 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:45.339 UTC [msp.identity] newIdentity -> DEBU 3b27 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:45.341 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b28 Checking if identity satisfies role [CLIENT] for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.341 UTC [msp] Validate -> DEBU 3b29 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:45.343 UTC [msp] getCertificationChain -> DEBU 3b2a MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:45.345 UTC [msp] hasOURole -> DEBU 3b2b MSP Org1MSP checking if the identity is a client" -peer0.org1.example.com | "2019-07-20 02:40:45.345 UTC [msp] getCertificationChain -> DEBU 3b2c MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:45.346 UTC [common.channelconfig] NewStandardValues -> DEBU 3b2d Initializing protos for *channelconfig.ApplicationOrgProtos" -peer0.org1.example.com | "2019-07-20 02:40:45.346 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b2e Processing field: AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:40:45.347 UTC [common.channelconfig] NewStandardValues -> DEBU 3b2f Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:40:45.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b30 Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.348 UTC [common.channelconfig] Validate -> DEBU 3b31 Anchor peers for org Org2MSP are anchor_peers: " -peer0.org1.example.com | "2019-07-20 02:40:45.348 UTC [common.channelconfig] validateMSP -> DEBU 3b32 Setting up MSP for org Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.348 UTC [msp] newBccspMsp -> DEBU 3b33 Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:40:45.349 UTC [msp] New -> DEBU 3b34 Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:40:45.350 UTC [msp] Setup -> DEBU 3b35 Setting up MSP instance Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.352 UTC [msp.identity] newIdentity -> DEBU 3b36 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:45.352 UTC [msp.identity] newIdentity -> DEBU 3b37 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:45.354 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b38 Checking if identity satisfies role [CLIENT] for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.354 UTC [msp] Validate -> DEBU 3b39 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:45.354 UTC [comm.grpc.server] 1 -> INFO 3b3a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.353Z grpc.peer_address=172.18.0.6:34152 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=525.1µs -peer0.org1.example.com | "2019-07-20 02:40:45.355 UTC [msp] getCertificationChain -> DEBU 3b3b MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:45.357 UTC [msp] hasOURole -> DEBU 3b3c MSP Org2MSP checking if the identity is a client" -peer0.org1.example.com | "2019-07-20 02:40:45.357 UTC [msp] getCertificationChain -> DEBU 3b3d MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:45.357 UTC [common.channelconfig] NewStandardValues -> DEBU 3b3e Initializing protos for *channelconfig.OrdererProtos" -peer0.org1.example.com | "2019-07-20 02:40:45.358 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b3f Processing field: ConsensusType" -peer0.org1.example.com | "2019-07-20 02:40:45.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b41 Processing field: BatchSize" -peer0.org1.example.com | "2019-07-20 02:40:45.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b42 Processing field: BatchTimeout" -peer0.org1.example.com | "2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b43 Processing field: KafkaBrokers" -peer0.org1.example.com | "2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b44 Processing field: ChannelRestrictions" -peer0.org1.example.com | "2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b45 Processing field: Capabilities" -peer0.org1.example.com | "2019-07-20 02:40:45.360 UTC [common.channelconfig] NewStandardValues -> DEBU 3b46 Initializing protos for *channelconfig.OrdererOrgProtos" -peer0.org1.example.com | "2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b47 Processing field: Endpoints" -peer0.org1.example.com | "2019-07-20 02:40:45.358 UTC [comm.grpc.server] 1 -> INFO 3b40 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.355Z grpc.peer_address=172.18.0.7:59100 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.6µs -peer0.org1.example.com | "2019-07-20 02:40:45.361 UTC [common.channelconfig] NewStandardValues -> DEBU 3b48 Initializing protos for *channelconfig.OrganizationProtos" -peer0.org1.example.com | "2019-07-20 02:40:45.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b49 Processing field: MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.361 UTC [common.channelconfig] validateMSP -> DEBU 3b4a Setting up MSP for org OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:40:45.361 UTC [msp] newBccspMsp -> DEBU 3b4b Creating BCCSP-based MSP instance" -peer0.org1.example.com | "2019-07-20 02:40:45.361 UTC [msp] New -> DEBU 3b4c Creating Cache-MSP instance" -peer0.org1.example.com | "2019-07-20 02:40:45.362 UTC [msp] Setup -> DEBU 3b4d Setting up MSP instance OrdererMSP" -peer0.org1.example.com | "2019-07-20 02:40:45.362 UTC [msp.identity] newIdentity -> DEBU 3b4e Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:45.363 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b4f Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:45.364 UTC [msp.identity] Sign -> DEBU 3b51 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:40:45.365 UTC [msp.identity] Sign -> DEBU 3b52 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:40:45.366 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b53 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:45.367 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b54 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:34152" -peer0.org1.example.com | "2019-07-20 02:40:45.367 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b55 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:34152" -peer0.org1.example.com | "2019-07-20 02:40:45.367 UTC [msp.identity] Verify -> DEBU 3b56 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -peer0.org1.example.com | "2019-07-20 02:40:45.368 UTC [msp.identity] Verify -> DEBU 3b57 Verify: sig = 00000000 30 44 02 20 1f f0 4d a2 e6 96 82 59 a5 ec 6b 9c |0D. ..M....Y..k.| -peer0.org1.example.com | 00000010 34 89 fa 02 72 ee 06 88 36 da 46 9c ed 01 62 f5 |4...r...6.F...b.| -peer0.org1.example.com | 00000020 8f e5 fd 27 02 20 09 db aa f3 d2 09 14 81 36 40 |...'. ........6@| -peer0.org1.example.com | 00000030 8c 02 70 d7 6f cd 16 82 bf b9 5b 96 a1 b3 45 a8 |..p.o.....[...E.| -peer0.org1.example.com | 00000040 12 28 f0 7b 8d 41 |.(.{.A|" -peer0.org1.example.com | "2019-07-20 02:40:45.366 UTC [msp.identity] Sign -> DEBU 3b58 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:40:45.368 UTC [msp.identity] Sign -> DEBU 3b59 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:40:45.369 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b5a Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:59100" -peer0.org1.example.com | "2019-07-20 02:40:45.370 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b5b Authenticated 172.18.0.6:34152" -peer0.org1.example.com | "2019-07-20 02:40:45.370 UTC [gossip.comm] GossipStream -> DEBU 3b5c Servicing 172.18.0.6:34152" -peer0.org1.example.com | "2019-07-20 02:40:45.364 UTC [msp.identity] newIdentity -> DEBU 3b50 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:45.373 UTC [msp] Validate -> DEBU 3b5d MSP OrdererMSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:45.373 UTC [msp] Setup -> DEBU 3b5e Setting up the MSP manager (4 msps)" -peer0.org1.example.com | "2019-07-20 02:40:45.373 UTC [msp] Setup -> DEBU 3b5f MSP manager setup complete, setup 4 msps" -peer0.org1.example.com | "2019-07-20 02:40:45.373 UTC [policies] NewManagerImpl -> DEBU 3b60 Proposed new policy Readers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b61 Proposed new policy Writers for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b62 Proposed new policy Admins for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b63 Proposed new policy Endorsement for Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b64 Proposed new policy Admins for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b65 Proposed new policy Endorsement for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b66 Proposed new policy Readers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b67 Proposed new policy Writers for Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b68 Proposed new policy Admins for Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b69 Proposed new policy Endorsement for Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6a Proposed new policy Readers for Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6b Proposed new policy Writers for Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6c Proposed new policy Readers for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6d Proposed new policy Writers for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b6e Proposed new policy Admins for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b6f Proposed new policy Endorsement for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b70 Proposed new policy LifecycleEndorsement for Channel/Application" -peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b71 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b72 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b73 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b74 Proposed new policy Readers for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b75 Proposed new policy Writers for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b76 Proposed new policy Admins for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b77 Proposed new policy BlockValidation for Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b78 Proposed new policy Writers for Channel" -peer0.org1.example.com | "2019-07-20 02:40:45.379 UTC [policies] NewManagerImpl -> DEBU 3b79 Proposed new policy Admins for Channel" -peer0.org1.example.com | "2019-07-20 02:40:45.379 UTC [policies] NewManagerImpl -> DEBU 3b7a Proposed new policy Readers for Channel" -peer0.org1.example.com | "2019-07-20 02:40:45.379 UTC [common.configtx] addToMap -> DEBU 3b7b Adding to config map: [Group] /Channel" -peer0.org1.example.com | "2019-07-20 02:40:45.379 UTC [common.configtx] addToMap -> DEBU 3b7c Adding to config map: [Group] /Channel/Application" -peer0.org1.example.com | "2019-07-20 02:40:45.380 UTC [common.configtx] addToMap -> DEBU 3b7d Adding to config map: [Group] /Channel/Application/Org3MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.380 UTC [common.configtx] addToMap -> DEBU 3b7e Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b7f Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b80 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b81 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b82 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.386 UTC [common.configtx] addToMap -> DEBU 3b83 Adding to config map: [Group] /Channel/Application/Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.386 UTC [common.configtx] addToMap -> DEBU 3b84 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.387 UTC [common.configtx] addToMap -> DEBU 3b85 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b87 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b88 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b89 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8b Adding to config map: [Group] /Channel/Application/Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8c Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -peer0.org1.example.com | "2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b8e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b8f Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b90 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b91 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b92 Adding to config map: [Value] /Channel/Application/ACLs" -peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b93 Adding to config map: [Value] /Channel/Application/Capabilities" -peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b94 Adding to config map: [Policy] /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b95 Adding to config map: [Policy] /Channel/Application/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b96 Adding to config map: [Policy] /Channel/Application/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b97 Adding to config map: [Policy] /Channel/Application/Endorsement" -peer0.org1.example.com | "2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b98 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -peer0.org1.example.com | "2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b99 Adding to config map: [Group] /Channel/Orderer" -peer0.org1.example.com | "2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b9a Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9b Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba0 Adding to config map: [Value] /Channel/Orderer/Capabilities" -peer0.org1.example.com | "2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -peer0.org1.example.com | "2019-07-20 02:40:45.395 UTC [gossip.comm] func1 -> DEBU 3ba2 Got message: GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.372 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b86 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:59100" -peer0.org1.example.com | "2019-07-20 02:40:45.396 UTC [gossip.gossip] handleMessage -> DEBU 3ba4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.396 UTC [gossip.gossip] handleMessage -> DEBU 3ba6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.396 UTC [grpc] infof -> DEBU 3ba7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:45.395 UTC [comm.grpc.server] 1 -> INFO 3b9f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.391Z grpc.peer_address=172.18.0.8:60470 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=406.8µs -peer0.org1.example.com | "2019-07-20 02:40:45.397 UTC [gossip.gossip] handleMessage -> DEBU 3ba8 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:5951314385057450676 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ba9 Got message: GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.396 UTC [msp] DeserializeIdentity -> DEBU 3ba5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba3 Adding to config map: [Value] /Channel/Orderer/BatchSize" -peer0.org1.example.com | "2019-07-20 02:40:45.398 UTC [common.configtx] addToMap -> DEBU 3bab Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -peer0.org1.example.com | "2019-07-20 02:40:45.398 UTC [common.configtx] addToMap -> DEBU 3bac Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -peer0.org1.example.com | "2019-07-20 02:40:45.399 UTC [common.configtx] addToMap -> DEBU 3bad Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -peer0.org1.example.com | "2019-07-20 02:40:45.399 UTC [common.configtx] addToMap -> DEBU 3bae Adding to config map: [Policy] /Channel/Orderer/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3baf Adding to config map: [Policy] /Channel/Orderer/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb0 Adding to config map: [Policy] /Channel/Orderer/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb1 Adding to config map: [Value] /Channel/HashingAlgorithm" -peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb2 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb3 Adding to config map: [Value] /Channel/OrdererAddresses" -peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb4 Adding to config map: [Value] /Channel/Consortium" -peer0.org1.example.com | "2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb5 Adding to config map: [Value] /Channel/Capabilities" -peer0.org1.example.com | "2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb6 Adding to config map: [Policy] /Channel/Writers" -peer0.org1.example.com | "2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb7 Adding to config map: [Policy] /Channel/Admins" -peer0.org1.example.com | "2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb8 Adding to config map: [Policy] /Channel/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.401 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bb9 As expected, current configuration has policy '/Channel/Readers'" -peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bba As expected, current configuration has policy '/Channel/Writers'" -peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbb Manager Channel looking up path [Application]" -peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbc Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbd Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbe Manager Channel/Application looking up path []" -peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbf Manager Channel/Application has managers Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bc0 Manager Channel/Application has managers Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.403 UTC [policies] Manager -> DEBU 3bc1 Manager Channel/Application has managers Org3MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc2 As expected, current configuration has policy '/Channel/Application/Readers'" -peer0.org1.example.com | "2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc3 As expected, current configuration has policy '/Channel/Application/Writers'" -peer0.org1.example.com | "2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc4 As expected, current configuration has policy '/Channel/Application/Admins'" -peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc5 Manager Channel looking up path [Orderer]" -peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc6 Manager Channel has managers Application" -peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc7 Manager Channel has managers Orderer" -peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc8 Manager Channel/Orderer looking up path []" -peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc9 Manager Channel/Orderer has managers OrdererOrg" -peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bca As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcb As expected, current configuration has policy '/Channel/Orderer/Admins'" -peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcc As expected, current configuration has policy '/Channel/Orderer/Writers'" -peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcd As expected, current configuration has policy '/Channel/Orderer/Readers'" -peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [common.capabilities] Supported -> DEBU 3bce Application capability V1_4_2 is supported and is enabled" -peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [common.capabilities] Supported -> DEBU 3bcf Channel capability V1_4_2 is supported and is enabled" -peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3bd0 Processing new config for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3bd1 Calling out because config was updated for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd2 Org3MSP anchor peers: []" -peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd3 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd4 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" -peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd5 Creating state provider for chainID businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [msp] DeserializeIdentity -> DEBU 3bd6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bd7 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bd8 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bd9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func1 -> DEBU 3bdc 0xc003d6ac20 gate 1563590445406453400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bdd 0xc003d6ac20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bde 0xc003d6ac20 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bdf 0xc003d6ac20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3be0 0xc003d6ac20 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func1 -> DEBU 3be1 0xc003d6ac20 gate 1563590445406453400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func1 -> DEBU 3be5 0xc003d6b460 gate 1563590445407305700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be6 0xc003d6b460 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be7 0xc003d6b460 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be8 0xc003d6b460 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [msp.identity] Verify -> DEBU 3be9 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [msp.identity] Verify -> DEBU 3bea Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3beb 0xc003d6b460 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func1 -> DEBU 3bec 0xc003d6b460 gate 1563590445407305700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bef Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [msp] DeserializeIdentity -> DEBU 3bf1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bf2 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bf3 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [cauthdsl] func1 -> DEBU 3bf7 0xc003da0540 gate 1563590445408927800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bf8 0xc003da0540 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bf9 0xc003da0540 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bfa 0xc003da0540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bfb 0xc003da0540 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [cauthdsl] func1 -> DEBU 3bfc 0xc003da0540 gate 1563590445408927800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bfd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bfe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.410 UTC [cauthdsl] func1 -> DEBU 3c00 0xc003da0d80 gate 1563590445409998800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c01 0xc003da0d80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c02 0xc003da0d80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c03 0xc003da0d80 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.410 UTC [msp.identity] Verify -> DEBU 3c04 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [msp.identity] Verify -> DEBU 3c05 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [cauthdsl] func2 -> DEBU 3c06 0xc003da0d80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [cauthdsl] func1 -> DEBU 3c07 0xc003da0d80 gate 1563590445409998800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [policies] Evaluate -> DEBU 3c08 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c09 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [msp] DeserializeIdentity -> DEBU 3c0a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [msp] DeserializeIdentity -> DEBU 3c0d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [msp] GetDefaultSigningIdentity -> DEBU 3c0f Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c10 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c12 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [msp.identity] Sign -> DEBU 3c11 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [msp.identity] Sign -> DEBU 3c14 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c15 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60470" -peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c16 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60470" -peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [msp] DeserializeIdentity -> DEBU 3c17 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c18 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [msp] DeserializeIdentity -> DEBU 3c19 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [msp] DeserializeIdentity -> DEBU 3c1b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [policies] Evaluate -> DEBU 3c1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [policies] Evaluate -> DEBU 3c20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [policies] Evaluate -> DEBU 3c21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func1 -> DEBU 3c22 0xc0032cb6a0 gate 1563590445415359700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c23 0xc0032cb6a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c24 0xc0032cb6a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c25 0xc0032cb6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c26 0xc0032cb6a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func1 -> DEBU 3c27 0xc0032cb6a0 gate 1563590445415359700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c28 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c2a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [cauthdsl] func1 -> DEBU 3c2b 0xc0032cbee0 gate 1563590445416337000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2c 0xc0032cbee0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2d 0xc0032cbee0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2e 0xc0032cbee0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [msp.identity] Verify -> DEBU 3c2f Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [msp.identity] Verify -> DEBU 3c30 Verify: sig = 00000000 30 44 02 20 70 77 0e 41 05 b8 58 44 c5 ef d4 1d |0D. pw.A..XD....| -peer0.org1.example.com | 00000010 4b f0 23 2e 27 24 6e 26 fd 6a 3f e0 b6 46 1c c4 |K.#.'$n&.j?..F..| -peer0.org1.example.com | 00000020 28 04 83 d7 02 20 17 2f 47 a5 c0 02 2e 97 66 9c |(.... ./G.....f.| -peer0.org1.example.com | 00000030 8c 3f d5 3f 6a 11 42 3b 76 cb 41 89 39 f1 3d 56 |.?.?j.B;v.A.9.=V| -peer0.org1.example.com | 00000040 64 af ca 3d fb 2f |d..=./|" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [cauthdsl] func2 -> DEBU 3c31 0xc0032cbee0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [cauthdsl] func1 -> DEBU 3c32 0xc0032cbee0 gate 1563590445416337000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c33 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c35 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c36 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c37 Authenticated 172.18.0.8:60470" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [gossip.comm] GossipStream -> DEBU 3c38 Servicing 172.18.0.8:60470" -peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [policies] Evaluate -> DEBU 3c0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c39 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c3b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c3c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [policies] Evaluate -> DEBU 3c3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [cauthdsl] func1 -> DEBU 3c40 0xc000551290 gate 1563590445418202500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c41 0xc000551290 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c42 0xc000551290 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c43 0xc000551290 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [msp.identity] Verify -> DEBU 3c44 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [msp.identity] Verify -> DEBU 3c45 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c46 0xc000551290 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [cauthdsl] func1 -> DEBU 3c47 0xc000551290 gate 1563590445418202500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c48 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c4a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [gossip.gossip] JoinChan -> INFO 3c4c Joining gossip network of channel businesschannel with 3 organizations" -peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4d No configured anchor peers of Org3MSP for channel businesschannel to learn about" -peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4f Anchor peer with same endpoint, skipping connecting to myself" -peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c50 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -peer0.org1.example.com | "2019-07-20 02:40:45.420 UTC [gossip.discovery] Connect -> DEBU 3c51 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " -peer0.org1.example.com | "2019-07-20 02:40:45.420 UTC [gossip.discovery] Connect -> DEBU 3c52 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.420 UTC [gossip.service] updateEndpoints -> DEBU 3c53 Updating endpoints for chainID%!(EXTRA string=businesschannel)" -peer0.org1.example.com | "2019-07-20 02:40:45.421 UTC [msp] DeserializeIdentity -> DEBU 3c54 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.421 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c55 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.421 UTC [msp] DeserializeIdentity -> DEBU 3c56 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.421 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c57 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.421 UTC [peer] updateTrustedRoots -> DEBU 3c58 Updating trusted root authorities for channel businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [policies] Evaluate -> DEBU 3c13 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.422 UTC [policies] Evaluate -> DEBU 3c59 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.422 UTC [policies] Evaluate -> DEBU 3c5a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.422 UTC [cauthdsl] func1 -> DEBU 3c5b 0xc003a9dac0 gate 1563590445422859400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.422 UTC [cauthdsl] func2 -> DEBU 3c5c 0xc003a9dac0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.422 UTC [cauthdsl] func2 -> DEBU 3c5d 0xc003a9dac0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c5e 0xc003a9dac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c5f 0xc003a9dac0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c60 0xc003a9dac0 gate 1563590445422859400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c61 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c64 0xc0032d0300 gate 1563590445423362000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c65 0xc0032d0300 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c66 0xc0032d0300 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c67 0xc0032d0300 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [msp.identity] Verify -> DEBU 3c68 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [msp.identity] Verify -> DEBU 3c69 Verify: sig = 00000000 30 44 02 20 5a 4b 1c 6b e9 16 61 35 b6 6b cd 1d |0D. ZK.k..a5.k..| -peer0.org1.example.com | 00000010 f8 85 de a9 54 4b da a8 5f a0 5a 65 5c a9 53 be |....TK.._.Ze\.S.| -peer0.org1.example.com | 00000020 87 46 2f 03 02 20 76 56 31 1e 7d 54 8b 82 2d da |.F/.. vV1.}T..-.| -peer0.org1.example.com | 00000030 06 aa ad f2 74 96 12 2b 00 a1 68 56 61 66 27 b1 |....t..+..hVaf'.| -peer0.org1.example.com | 00000040 51 92 4a 15 68 d0 |Q.J.h.|" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c6a 0xc0032d0300 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c6b 0xc0032d0300 gate 1563590445423362000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c70 Authenticated 172.18.0.7:59100" -peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] GossipStream -> DEBU 3c71 Servicing 172.18.0.7:59100" -peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] writeToStream -> DEBU 3c72 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] serviceConnection -> DEBU 3c73 Closing reading from stream" -peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] readFromStream -> DEBU 3c74 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" -peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] readFromStream -> DEBU 3c75 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] func2 -> DEBU 3c76 Client 172.18.0.7:59100 disconnected" -peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [comm.grpc.server] 1 -> INFO 3c77 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.366Z grpc.peer_address=172.18.0.7:59100 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=58.3508ms -peer0.org1.example.com | "2019-07-20 02:40:45.425 UTC [gossip.comm] writeToStream -> DEBU 3c78 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:40:45.425 UTC [grpc] infof -> DEBU 3c79 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:45.425 UTC [gossip.comm] serviceConnection -> DEBU 3c7a Closing reading from stream" -peer0.org1.example.com | "2019-07-20 02:40:45.425 UTC [gossip.comm] writeToStream -> DEBU 3c7b Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:40:45.425 UTC [grpc] infof -> DEBU 3c7c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [gossip.comm] readFromStream -> DEBU 3c7d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -peer0.org1.example.com | "2019-07-20 02:40:45.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3baa Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [msp] DeserializeIdentity -> DEBU 3c7e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c7f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c80 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c81 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [cauthdsl] func1 -> DEBU 3c85 0xc0034ee7d0 gate 1563590445427855200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c86 0xc0034ee7d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c87 0xc0034ee7d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c88 0xc0034ee7d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c89 0xc0034ee7d0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c8a 0xc0034ee7d0 gate 1563590445427855200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c8e 0xc0034ef010 gate 1563590445428220700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c8f 0xc0034ef010 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c90 0xc0034ef010 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c91 0xc0034ef010 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [msp.identity] Verify -> DEBU 3c92 Verify: digest = 00000000 8f ba 57 98 80 8e 2d cd 89 5d 87 b8 08 40 04 45 |..W...-..]...@.E| -peer0.org1.example.com | 00000010 78 ea c3 c0 14 9d af c2 08 bb cc 89 77 3f 3e 87 |x...........w?>.|" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [msp.identity] Verify -> DEBU 3c93 Verify: sig = 00000000 30 45 02 21 00 b5 76 2d 76 60 fc fc 11 01 07 f8 |0E.!..v-v`......| -peer0.org1.example.com | 00000010 62 01 ec d0 14 36 32 55 bd 89 34 ea 51 78 34 96 |b....62U..4.Qx4.| -peer0.org1.example.com | 00000020 95 73 af b0 af 02 20 62 91 f1 ac ad d6 15 2d eb |.s.... b......-.| -peer0.org1.example.com | 00000030 5e d8 69 b6 4a 07 4f f2 0e 52 a8 48 de 81 5b 79 |^.i.J.O..R.H..[y| -peer0.org1.example.com | 00000040 8a df fb b1 35 84 93 |....5..|" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c94 0xc0034ef010 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c95 0xc0034ef010 gate 1563590445428220700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c98 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c9a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9c updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9d Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ca0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca2 Got message: GossipMessage: nonce:5951314385057450676 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ca3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca4 Verify: digest = 00000000 76 c3 3d 3b 53 91 f2 46 7d 87 85 b3 04 32 54 3a |v.=;S..F}....2T:| -peer0.org1.example.com | 00000010 55 f4 c9 e1 39 02 10 ec 22 19 f9 fa 73 85 d3 3b |U...9..."...s..;|" -peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca5 Verify: sig = 00000000 30 45 02 21 00 c2 6e 44 87 e3 45 1a 99 99 6f 73 |0E.!..nD..E...os| -peer0.org1.example.com | 00000010 58 ca 2f 2d 9b 3d 74 9e 37 b8 5a 8b 4c fd b4 9c |X./-.=t.7.Z.L...| -peer0.org1.example.com | 00000020 ea d9 1a 17 e2 02 20 4f 44 4d a2 54 18 1b df 01 |...... ODM.T....| -peer0.org1.example.com | 00000030 34 52 da 63 e7 ff af 66 75 f0 af c2 c1 fc 05 3b |4R.c...fu......;| -peer0.org1.example.com | 00000040 bf d9 c4 e8 12 c3 65 |......e|" -peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca7 Verify: sig = 00000000 30 45 02 21 00 d3 7f 31 bd 6b fd 66 e1 af e4 66 |0E.!...1.k.f...f| -peer0.org1.example.com | 00000010 e3 a5 67 bc dc c8 e0 e8 a1 ae 66 4e c4 e2 59 08 |..g.......fN..Y.| -peer0.org1.example.com | 00000020 4f 5d b5 b4 ec 02 20 11 e0 84 4f 9f 54 96 a0 2d |O].... ...O.T..-| -peer0.org1.example.com | 00000030 cc 52 79 6d bf 62 c4 04 cd 88 93 a2 ed 36 ca f9 |.Rym.b.......6..| -peer0.org1.example.com | 00000040 bd b0 f4 e1 9d 56 e1 |.....V.|" -peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ca8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ca9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3caa updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cab Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cac Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cad Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cae Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3caf Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [msp] DeserializeIdentity -> DEBU 3cb1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [msp] DeserializeIdentity -> DEBU 3cb2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.432 UTC [gossip.comm] Send -> DEBU 3cb3 Entering, sending GossipMessage: Channel: , nonce: 5951314385057450676, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:45.432 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > alive:9\232\322V\2358\311\017}\365J" > " -peer0.org1.example.com | "2019-07-20 02:40:45.433 UTC [gossip.comm] sendToEndpoint -> DEBU 3cb5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5951314385057450676, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.433 UTC [gossip.comm] sendToEndpoint -> DEBU 3cb6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.434 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:45.434 UTC [msp] DeserializeIdentity -> DEBU 3cb8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.435 UTC [msp] DeserializeIdentity -> DEBU 3cb9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.435 UTC [msp] DeserializeIdentity -> DEBU 3cba Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.435 UTC [gossip.comm] Send -> DEBU 3cbb Entering, sending GossipMessage: Channel: , nonce: 4698240984573701261, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:45.436 UTC [gossip.discovery] sendMemResponse -> DEBU 3cbc Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" > alive: alive:9\232\322V\2358\311\017}\365J" > " -peer0.org1.example.com | "2019-07-20 02:40:45.436 UTC [gossip.comm] sendToEndpoint -> DEBU 3cbd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 4698240984573701261, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.436 UTC [gossip.comm] createConnection -> DEBU 3cbe Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:45.441 UTC [grpc] DialContext -> DEBU 3cbf parsed scheme: """ -peer0.org1.example.com | "2019-07-20 02:40:45.441 UTC [grpc] DialContext -> DEBU 3cc0 scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-07-20 02:40:45.442 UTC [grpc] watcher -> DEBU 3cc1 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" -peer0.org1.example.com | "2019-07-20 02:40:45.442 UTC [grpc] switchBalancer -> DEBU 3cc2 ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-07-20 02:40:45.442 UTC [grpc] HandleSubConnStateChange -> DEBU 3cc3 pickfirstBalancer: HandleSubConnStateChange: 0xc003fc60a0, CONNECTING" -peer0.org1.example.com | "2019-07-20 02:40:45.443 UTC [gossip.gossip] handleMessage -> DEBU 3cc4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.445 UTC [gossip.comm] readFromStream -> DEBU 3cc5 Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:40:45.445 UTC [gossip.comm] func2 -> DEBU 3cc6 Client 172.18.0.8:60470 disconnected" -peer0.org1.example.com | "2019-07-20 02:40:45.445 UTC [comm.grpc.server] 1 -> INFO 3cc7 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.411Z grpc.peer_address=172.18.0.8:60470 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5484ms -peer0.org1.example.com | "2019-07-20 02:40:45.446 UTC [grpc] infof -> DEBU 3cc8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:45.446 UTC [gossip.comm] writeToStream -> DEBU 3cc9 Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3cca updating root CAs for channel [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccb adding app root CAs for MSP [Org3MSP]" -peer0.org1.example.com | "2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccc adding app root CAs for MSP [Org1MSP]" -peer0.org1.example.com | "2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccd adding app root CAs for MSP [Org2MSP]" -peer0.org1.example.com | "2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3cce adding orderer root CAs for MSP [OrdererMSP]" -peer0.org1.example.com | "2019-07-20 02:40:45.456 UTC [committer.txvalidator] validateTx -> DEBU 3ccf config transaction received for chain businesschannel" -peer0.org1.example.com | "2019-07-20 02:40:45.456 UTC [committer.txvalidator] validateTx -> DEBU 3cd1 [businesschannel] validateTx completes for block 0xc000695640 env 0xc003781400 txn 0" -peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [committer.txvalidator] Validate -> DEBU 3cd2 got result for idx 0, code 0" -peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [committer.txvalidator] Validate -> INFO 3cd3 [businesschannel] Validated block [6] in 260ms" -peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [gossip.privdata] listMissingPrivateData -> DEBU 3cd4 Retrieving private write sets for 0 transactions from transient store" -peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [gossip.privdata] StoreBlock -> DEBU 3cd5 [businesschannel] No missing collection private write sets to fetch from remote peers" -peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [committer] preCommit -> DEBU 3cd6 Received configuration update, calling CSCC ConfigUpdate" -peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [kvledger] CommitWithPvtData -> DEBU 3cd7 [businesschannel] Validating state for block [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cd8 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cd9 lock acquired on oldBlockCommit for validating read set version against the committed version" -peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cda Validating new block with num trans = [1]" -peer0.org1.example.com | "2019-07-20 02:40:45.458 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cdb ValidateAndPrepareBatch() for block number = [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.458 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cdc preprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [valimpl] preprocessProtoBlock -> DEBU 3cdd txType=CONFIG" -peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [valimpl] processNonEndorserTx -> DEBU 3cde Performing custom processing for transaction [txid=], [txType=CONFIG]" -peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [valimpl] processNonEndorserTx -> DEBU 3cdf Processor for custom tx processing:&peer.configtxProcessor{}" -peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3ce0 constructing new tx simulator" -peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3ce1 constructing new tx simulator txid = []" -peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [peer] GenerateSimulationResults -> DEBU 3ce2 Processing CONFIG" -peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [grpc] DialContext -> DEBU 3ce3 parsed scheme: """ -peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [grpc] DialContext -> DEBU 3ce4 scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [peer] processChannelConfigTx -> DEBU 3ce5 channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3ce7 Simulation completed, getting simulation results" -peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [lockbasedtxmgr] Done -> DEBU 3ce8 Done with transaction simulation / query execution []" -peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 3ce9 Block [6] Transaction index [0] TxId [] marked as valid by state validator" -peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [valinternal] ApplyWriteSet -> DEBU 3cea txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003517ac0)}" -peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3ceb validating rwset..." -peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cec postprocessing ProtoBlock..." -peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3ced ValidateAndPrepareBatch() complete" -peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [kvledger] CommitWithPvtData -> DEBU 3cee [businesschannel] Adding CommitHash to the block [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.462 UTC [kvledger] CommitWithPvtData -> DEBU 3cef [businesschannel] Committing block [6] to storage" -peer0.org1.example.com | "2019-07-20 02:40:45.462 UTC [ledgerstorage] CommitWithPvtData -> DEBU 3cf0 Writing block [6] to pvt block store" -peer0.org1.example.com | "2019-07-20 02:40:45.463 UTC [pvtdatastorage] Prepare -> DEBU 3cf1 Saved 0 private data write sets for block [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.464 UTC [comm.grpc.server] 1 -> INFO 3cf2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.463Z grpc.peer_address=172.18.0.8:60474 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=321.1µs -peer0.org1.example.com | "2019-07-20 02:40:45.456 UTC [grpc] HandleSubConnStateChange -> DEBU 3cd0 pickfirstBalancer: HandleSubConnStateChange: 0xc003fc60a0, READY" -peer0.org1.example.com | "2019-07-20 02:40:45.466 UTC [fsblkstorage] indexBlock -> DEBU 3cf3 Indexing block [blockNum=6, blockHash=[]byte{0xf5, 0xb0, 0x11, 0x46, 0x4, 0x5a, 0x37, 0x6e, 0xe5, 0x9b, 0x7a, 0xb0, 0xf2, 0xf9, 0xaf, 0x42, 0x15, 0x9e, 0x7f, 0x29, 0x6f, 0xe6, 0x3, 0xf4, 0x56, 0x9b, 0xb6, 0x31, 0xa7, 0x9, 0xf1, 0x78} txOffsets= -peer0.org1.example.com | txId=e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38 locPointer=offset=71, bytesLength=33874 -peer0.org1.example.com | ]" -peer0.org1.example.com | "2019-07-20 02:40:45.467 UTC [fsblkstorage] indexBlock -> DEBU 3cf4 Adding txLoc [fileSuffixNum=0, offset=84150, bytesLength=33874] for tx ID: [e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38] to txid-index" -peer0.org1.example.com | "2019-07-20 02:40:45.467 UTC [fsblkstorage] indexBlock -> DEBU 3cf5 Adding txLoc [fileSuffixNum=0, offset=84150, bytesLength=33874] for tx number:[0] ID: [e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38] to blockNumTranNum index" -peer0.org1.example.com | "2019-07-20 02:40:45.468 UTC [msp] GetDefaultSigningIdentity -> DEBU 3cf6 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:45.469 UTC [fsblkstorage] updateCheckpoint -> DEBU 3cf7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[118997], isChainEmpty=[false], lastBlockNumber=[6]" -peer0.org1.example.com | "2019-07-20 02:40:45.469 UTC [msp.identity] Sign -> DEBU 3cf8 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:40:45.469 UTC [msp.identity] Sign -> DEBU 3cfa Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:40:45.470 UTC [msp] GetDefaultSigningIdentity -> DEBU 3cfb Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:45.470 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3cfc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:7051" -peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [grpc] watcher -> DEBU 3ce6 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -peer0.org1.example.com | "2019-07-20 02:40:45.470 UTC [grpc] switchBalancer -> DEBU 3cfe ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-07-20 02:40:45.471 UTC [grpc] HandleSubConnStateChange -> DEBU 3cff pickfirstBalancer: HandleSubConnStateChange: 0xc002f03a40, CONNECTING" -peer0.org1.example.com | "2019-07-20 02:40:45.469 UTC [pvtdatastorage] Commit -> DEBU 3cf9 Committing private data for block [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.470 UTC [msp.identity] Sign -> DEBU 3cfd Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:40:45.474 UTC [msp.identity] Sign -> DEBU 3d00 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:40:45.477 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d02 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:60474" -peer0.org1.example.com | "2019-07-20 02:40:45.478 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d03 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60474" -peer0.org1.example.com | "2019-07-20 02:40:45.478 UTC [msp] DeserializeIdentity -> DEBU 3d04 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.478 UTC [msp] DeserializeIdentity -> DEBU 3d05 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.478 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d06 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:7051" -peer0.org1.example.com | "2019-07-20 02:40:45.481 UTC [msp] DeserializeIdentity -> DEBU 3d08 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.481 UTC [msp] DeserializeIdentity -> DEBU 3d09 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.483 UTC [msp.identity] newIdentity -> DEBU 3d0a Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c -peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv -peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr -peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:45.479 UTC [msp.identity] newIdentity -> DEBU 3d07 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:45.475 UTC [pvtdatastorage] Commit -> DEBU 3d01 Committed private data for block [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.484 UTC [grpc] HandleSubConnStateChange -> DEBU 3d0b pickfirstBalancer: HandleSubConnStateChange: 0xc002f03a40, READY" -peer0.org1.example.com | "2019-07-20 02:40:45.486 UTC [msp] Validate -> DEBU 3d0c MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:45.487 UTC [msp] getCertificationChain -> DEBU 3d0e MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:45.487 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d0f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.487 UTC [msp] DeserializeIdentity -> DEBU 3d10 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d11 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.488 UTC [msp] DeserializeIdentity -> DEBU 3d12 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d13 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d15 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d16 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.489 UTC [policies] Evaluate -> DEBU 3d17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.490 UTC [policies] Evaluate -> DEBU 3d18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [policies] Evaluate -> DEBU 3d1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [cauthdsl] func1 -> DEBU 3d1b 0xc003ef7610 gate 1563590445491328500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1c 0xc003ef7610 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1d 0xc003ef7610 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1e 0xc003ef7610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1f 0xc003ef7610 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [cauthdsl] func1 -> DEBU 3d20 0xc003ef7610 gate 1563590445491328500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [policies] Evaluate -> DEBU 3d21 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.490 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d19 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:45.488 UTC [msp] Validate -> DEBU 3d14 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:45.486 UTC [kvledger] CommitWithPvtData -> DEBU 3d0d [businesschannel] Committing block [6] transactions to state database" -peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [policies] Evaluate -> DEBU 3d22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.493 UTC [policies] Evaluate -> DEBU 3d26 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [msp.identity] Sign -> DEBU 3d23 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:40:45.494 UTC [msp.identity] Sign -> DEBU 3d27 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:40:45.494 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d28 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:40:45.494 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d29 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:40:45.494 UTC [msp] DeserializeIdentity -> DEBU 3d2a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.494 UTC [cauthdsl] func1 -> DEBU 3d2b 0xc003ee11e0 gate 1563590445493562900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d2c 0xc003ee11e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d2d 0xc003ee11e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.495 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d2e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.495 UTC [msp] DeserializeIdentity -> DEBU 3d2f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d30 0xc003ee11e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [cauthdsl] func2 -> DEBU 3d31 0xc003ee11e0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [cauthdsl] func1 -> DEBU 3d32 0xc003ee11e0 gate 1563590445493562900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [msp] DeserializeIdentity -> DEBU 3d34 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d35 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d38 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d39 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.497 UTC [cauthdsl] func1 -> DEBU 3d3c 0xc003ee1a40 gate 1563590445497309900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.497 UTC [cauthdsl] func2 -> DEBU 3d3d 0xc003ee1a40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.497 UTC [cauthdsl] func2 -> DEBU 3d3e 0xc003ee1a40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.498 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d3f Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.498 UTC [msp] Validate -> DEBU 3d40 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:45.499 UTC [msp] getCertificationChain -> DEBU 3d41 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:45.500 UTC [cauthdsl] func2 -> DEBU 3d42 0xc003ee1a40 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.500 UTC [msp.identity] Verify -> DEBU 3d43 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:40:45.500 UTC [msp.identity] Verify -> DEBU 3d44 Verify: sig = 00000000 30 45 02 21 00 cc 72 66 4d f3 aa 62 27 67 82 1d |0E.!..rfM..b'g..| -peer0.org1.example.com | 00000010 99 71 b4 0e 9c a8 af 3e a8 79 15 1c 73 cb bc 67 |.q.....>.y..s..g| -peer0.org1.example.com | 00000020 49 75 71 2b e8 02 20 29 70 7a 3d c2 2f 23 ba 52 |Iuq+.. )pz=./#.R| -peer0.org1.example.com | 00000030 bf 65 fd 50 14 83 46 01 8a f7 ef fd a3 c3 3a 36 |.e.P..F.......:6| -peer0.org1.example.com | 00000040 c9 40 0f 81 41 8b 00 |.@..A..|" -peer0.org1.example.com | "2019-07-20 02:40:45.500 UTC [grpc] infof -> DEBU 3d45 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [lockbasedtxmgr] Commit -> DEBU 3d25 lock acquired on oldBlockCommit for committing regular updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:45.501 UTC [lockbasedtxmgr] Commit -> DEBU 3d46 Committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:45.501 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 3d47 Building the expiry schedules based on the update batch" -peer0.org1.example.com | "2019-07-20 02:40:45.501 UTC [lockbasedtxmgr] Commit -> DEBU 3d48 Write lock acquired for committing updates to state database" -peer0.org1.example.com | "2019-07-20 02:40:45.501 UTC [stateleveldb] ApplyUpdates -> DEBU 3d49 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -peer0.org1.example.com | "2019-07-20 02:40:45.501 UTC [cauthdsl] func2 -> DEBU 3d4a 0xc003ee1a40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.502 UTC [cauthdsl] func1 -> DEBU 3d4b 0xc003ee1a40 gate 1563590445497309900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.502 UTC [policies] Evaluate -> DEBU 3d4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.502 UTC [policies] Evaluate -> DEBU 3d4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.503 UTC [policies] Evaluate -> DEBU 3d4e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.503 UTC [lockbasedtxmgr] Commit -> DEBU 3d4f Updates committed to state database and the write lock is released" -peer0.org1.example.com | "2019-07-20 02:40:45.503 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3d50 Preparing potential purge list working-set for expiringAtBlk [7]" -peer0.org1.example.com | "2019-07-20 02:40:45.503 UTC [leveldbhelper] GetIterator -> DEBU 3d51 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" -peer0.org1.example.com | "2019-07-20 02:40:45.504 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3d52 No expiry entry found for expiringAtBlk [7]" -peer0.org1.example.com | "2019-07-20 02:40:45.504 UTC [lockbasedtxmgr] func1 -> DEBU 3d53 launched the background routine for preparing keys to purge with the next block" -peer0.org1.example.com | "2019-07-20 02:40:45.504 UTC [kvledger] CommitWithPvtData -> DEBU 3d54 [businesschannel] Committing block [6] transactions to history database" -peer0.org1.example.com | "2019-07-20 02:40:45.504 UTC [historyleveldb] Commit -> DEBU 3d55 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" -peer0.org1.example.com | "2019-07-20 02:40:45.504 UTC [historyleveldb] Commit -> DEBU 3d56 Skipping transaction [0] since it is not an endorsement transaction" -peer0.org1.example.com | "2019-07-20 02:40:45.503 UTC [policies] Evaluate -> DEBU 3d57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.506 UTC [historyleveldb] Commit -> DEBU 3d58 Channel [businesschannel]: Updates committed to history database for blockNo [6]" -peer0.org1.example.com | "2019-07-20 02:40:45.506 UTC [kvledger] CommitWithPvtData -> INFO 3d59 [businesschannel] Committed block [6] with 1 transaction(s) in 48ms (state_validation=4ms block_and_pvtdata_commit=24ms state_commit=17ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" -peer0.org1.example.com | "2019-07-20 02:40:45.506 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d5a Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:45.506 UTC [msp.identity] Sign -> DEBU 3d5b Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08071A0C0A0565787030321203312E30 " -peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [msp.identity] Sign -> DEBU 3d5c Sign: digest: 3413AB16E454D4D11A5CF1F1C30B239DD040FF9B6C404041B3848980D2DF491C " -peer0.org1.example.com | "2019-07-20 02:40:45.497 UTC [policies] Evaluate -> DEBU 3d3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [policies] Evaluate -> DEBU 3d5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [gossip.state] commitBlock -> DEBU 3d5e [businesschannel] Committed block [6] with 1 transaction(s)" -peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [msp] getCertificationChain -> DEBU 3d24 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d60 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [msp] DeserializeIdentity -> DEBU 3d61 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [msp] DeserializeIdentity -> DEBU 3d63 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d64 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d65 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d66 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [policies] Evaluate -> DEBU 3d67 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d68 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func1 -> DEBU 3d6a 0xc0030083a0 gate 1563590445509237900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6b 0xc0030083a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6c 0xc0030083a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6d 0xc0030083a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6e 0xc0030083a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func1 -> DEBU 3d6f 0xc0030083a0 gate 1563590445509237900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d70 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d72 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d73 0xc003008c00 gate 1563590445510074100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d74 0xc003008c00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d75 0xc003008c00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d76 0xc003008c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d77 0xc003008c00 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d78 0xc003008c00 gate 1563590445510074100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d79 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d7b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d7c 0xc003009460 gate 1563590445510800100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d7d 0xc003009460 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d7e 0xc003009460 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d7f Checking if identity satisfies MEMBER role for Org2MSP" -peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [msp] Validate -> DEBU 3d80 MSP Org2MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [msp] getCertificationChain -> DEBU 3d81 MSP Org2MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [cauthdsl] func2 -> DEBU 3d82 0xc003009460 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [msp.identity] Verify -> DEBU 3d83 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [msp.identity] Verify -> DEBU 3d84 Verify: sig = 00000000 30 44 02 20 70 4f 30 67 42 46 82 f2 1b 9c a8 81 |0D. pO0gBF......| -peer0.org1.example.com | 00000010 11 8c 1f 81 39 d0 51 f4 ae c4 c7 b9 f0 8a 1d d7 |....9.Q.........| -peer0.org1.example.com | 00000020 b9 02 2d ca 02 20 05 6c ed 25 61 84 a2 6d fd d3 |..-.. .l.%a..m..| -peer0.org1.example.com | 00000030 91 b9 b4 96 f9 d6 b6 9d 33 c7 e6 9f ea ed d9 f4 |........3.......| -peer0.org1.example.com | 00000040 67 d9 13 e9 43 de |g...C.|" -peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [cauthdsl] func2 -> DEBU 3d85 0xc003009460 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [cauthdsl] func1 -> DEBU 3d86 0xc003009460 gate 1563590445510800100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d87 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d89 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d8a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d8b Authenticated 172.18.0.7:7051" -peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [gossip.comm] createConnection -> DEBU 3d8c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d5f Authenticated 172.18.0.8:60474" -peer0.org1.example.com | "2019-07-20 02:40:45.513 UTC [gossip.comm] GossipStream -> DEBU 3d8e Servicing 172.18.0.8:60474" -peer0.org1.example.com | "2019-07-20 02:40:45.513 UTC [gossip.comm] readFromStream -> DEBU 3d8f Got error, aborting: rpc error: code = Canceled desc = context canceled" -peer0.org1.example.com | "2019-07-20 02:40:45.513 UTC [gossip.comm] func2 -> DEBU 3d90 Client 172.18.0.8:60474 disconnected" -peer0.org1.example.com | "2019-07-20 02:40:45.513 UTC [comm.grpc.server] 1 -> INFO 3d91 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60474 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.5281ms -peer0.org1.example.com | "2019-07-20 02:40:45.513 UTC [gossip.gossip] handleMessage -> DEBU 3d92 Entering, 172.18.0.8:60474 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:1447606720863157574 tag:EMPTY mem_req:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > > , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [gossip.gossip] handleMessage -> DEBU 3d94 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d95 Got message: GossipMessage: nonce:1447606720863157574 tag:EMPTY mem_req:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > > , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d96 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [msp] DeserializeIdentity -> DEBU 3d97 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d98 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d99 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d9a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [cauthdsl] func1 -> DEBU 3d9e 0xc003f25a40 gate 1563590445515383000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3d9f 0xc003f25a40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da0 0xc003f25a40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da1 0xc003f25a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da2 0xc003f25a40 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.516 UTC [cauthdsl] func1 -> DEBU 3da3 0xc003f25a40 gate 1563590445515383000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da4 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.517 UTC [cauthdsl] func1 -> DEBU 3da7 0xc003f36280 gate 1563590445516956200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3da8 0xc003f36280 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3da9 0xc003f36280 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3daa 0xc003f36280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3dab 0xc003f36280 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.518 UTC [cauthdsl] func1 -> DEBU 3dac 0xc003f36280 gate 1563590445516956200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3dad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3dae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3daf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.518 UTC [cauthdsl] func1 -> DEBU 3db0 0xc003f36ac0 gate 1563590445518968000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db1 0xc003f36ac0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db2 0xc003f36ac0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db3 0xc003f36ac0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.519 UTC [msp.identity] Verify -> DEBU 3db4 Verify: digest = 00000000 a5 36 9f 8b 2f a8 4d c1 63 6e 58 db 08 90 2e f7 |.6../.M.cnX.....| -peer0.org1.example.com | 00000010 10 64 1f a4 b2 1b e8 16 22 90 1f ef f7 e1 28 f5 |.d......".....(.|" -peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [msp.identity] Verify -> DEBU 3db5 Verify: sig = 00000000 30 45 02 21 00 f8 58 21 d0 7b 04 cb b7 9d 1e 37 |0E.!..X!.{.....7| -peer0.org1.example.com | 00000010 a0 e6 f5 fd 5f eb 98 b0 61 6a 78 ff 57 e0 45 23 |...._...ajx.W.E#| -peer0.org1.example.com | 00000020 1e 3e d0 b2 15 02 20 65 75 64 99 d9 d0 01 28 ab |.>.... eud....(.| -peer0.org1.example.com | 00000030 4c 04 4e bb 5e e6 cc 5d 00 0c 2d 71 1e 01 f4 71 |L.N.^..]..-q...q| -peer0.org1.example.com | 00000040 83 c7 79 dd 2c 1a 7f |..y.,..|" -peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [cauthdsl] func2 -> DEBU 3db6 0xc003f36ac0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [cauthdsl] func1 -> DEBU 3db7 0xc003f36ac0 gate 1563590445518968000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3db8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3dba Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3dbb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.521 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dbc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbe updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbf Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:45.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dc0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:45.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dc1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.522 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.523 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dc3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.523 UTC [gossip.discovery] sendMemResponse -> DEBU 3dc4 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:45.523 UTC [msp] DeserializeIdentity -> DEBU 3dc5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.523 UTC [msp] DeserializeIdentity -> DEBU 3dc6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.524 UTC [msp] DeserializeIdentity -> DEBU 3dc7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.524 UTC [gossip.comm] Send -> DEBU 3dc8 Entering, sending GossipMessage: Channel: , nonce: 1447606720863157574, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:45.524 UTC [gossip.discovery] sendMemResponse -> DEBU 3dc9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" > alive:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > alive: alive:9\232\322V\2358\311\017}\365J" > " -peer0.org1.example.com | "2019-07-20 02:40:45.524 UTC [gossip.comm] sendToEndpoint -> DEBU 3dca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1447606720863157574, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.524 UTC [gossip.comm] createConnection -> DEBU 3dcb Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [gossip.comm] writeToStream -> DEBU 3dcc Closing writing to stream" -peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [policies] Evaluate -> DEBU 3d93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dcd 0xc003e8cbe0 gate 1563590445526119800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dce 0xc003e8cbe0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dcf 0xc003e8cbe0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd0 0xc003e8cbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd1 0xc003e8cbe0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dd2 0xc003e8cbe0 gate 1563590445526119800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd3 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dd6 0xc003e8d420 gate 1563590445526559500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd7 0xc003e8d420 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd8 0xc003e8d420 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd9 0xc003e8d420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dda 0xc003e8d420 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [cauthdsl] func1 -> DEBU 3ddb 0xc003e8d420 gate 1563590445526559500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3ddc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3ddd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3dde == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [cauthdsl] func1 -> DEBU 3ddf 0xc003e8dc60 gate 1563590445527196500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de0 0xc003e8dc60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de1 0xc003e8dc60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de2 0xc003e8dc60 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [grpc] DialContext -> DEBU 3de3 parsed scheme: """ -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [msp.identity] Verify -> DEBU 3de4 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [msp.identity] Verify -> DEBU 3de5 Verify: sig = 00000000 30 44 02 20 15 44 8b 82 00 ab 3b 37 3d 6f 79 e0 |0D. .D....;7=oy.| -peer0.org1.example.com | 00000010 81 20 9b 49 c9 2e 8a 26 7d b6 61 35 f9 29 00 7c |. .I...&}.a5.).|| -peer0.org1.example.com | 00000020 b2 ba a1 71 02 20 42 34 7a 79 64 3c 4b 12 a3 a5 |...q. B4zyd DEBU 3de6 0xc003e8dc60 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [cauthdsl] func1 -> DEBU 3de7 0xc003e8dc60 gate 1563590445527196500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3de8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3de9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3dea Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3deb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3dec Authenticated 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp] DeserializeIdentity -> DEBU 3ded Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp] GetDefaultSigningIdentity -> DEBU 3dee Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3def Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915102F " -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3df0 Sign: digest: FF22BF917C50A5A69FE384EC283EBBAB43EA18EC2DAE339B6AE8BFEA098F946E " -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp] GetDefaultSigningIdentity -> DEBU 3df1 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3df2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:45.529 UTC [msp.identity] Sign -> DEBU 3df3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:45.529 UTC [msp] DeserializeIdentity -> DEBU 3df4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.529 UTC [gossip.comm] Send -> DEBU 3df5 Entering, sending GossipMessage: nonce:276503936147127162 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:45.529 UTC [gossip.comm] sendToEndpoint -> DEBU 3df6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:276503936147127162 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.530 UTC [grpc] infof -> DEBU 3df7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [grpc] DialContext -> DEBU 3df8 scheme "" not registered, fallback to default scheme" -peer0.org1.example.com | "2019-07-20 02:40:45.530 UTC [grpc] watcher -> DEBU 3df9 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -peer0.org1.example.com | "2019-07-20 02:40:45.530 UTC [grpc] switchBalancer -> DEBU 3dfa ClientConn switching balancer to "pick_first"" -peer0.org1.example.com | "2019-07-20 02:40:45.531 UTC [grpc] HandleSubConnStateChange -> DEBU 3dfb pickfirstBalancer: HandleSubConnStateChange: 0xc000610130, CONNECTING" -peer0.org1.example.com | "2019-07-20 02:40:45.542 UTC [grpc] HandleSubConnStateChange -> DEBU 3dfc pickfirstBalancer: HandleSubConnStateChange: 0xc000610130, READY" -peer0.org1.example.com | "2019-07-20 02:40:45.544 UTC [msp] GetDefaultSigningIdentity -> DEBU 3dfd Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:45.544 UTC [msp.identity] Sign -> DEBU 3dfe Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -peer0.org1.example.com | "2019-07-20 02:40:45.545 UTC [msp.identity] Sign -> DEBU 3dff Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -peer0.org1.example.com | "2019-07-20 02:40:45.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e00 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:40:45.547 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e01 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:40:45.547 UTC [msp] DeserializeIdentity -> DEBU 3e02 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.547 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e03 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.551 UTC [msp] DeserializeIdentity -> DEBU 3e04 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [msp] DeserializeIdentity -> DEBU 3e06 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e07 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e08 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e09 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func1 -> DEBU 3e0d 0xc0006e0230 gate 1563590445552375400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e0e 0xc0006e0230 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e0f 0xc0006e0230 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e10 0xc0006e0230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e11 0xc0006e0230 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func1 -> DEBU 3e12 0xc0006e0230 gate 1563590445552375400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e13 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e16 0xc0006e0a70 gate 1563590445553036600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e17 0xc0006e0a70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e18 0xc0006e0a70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e19 0xc0006e0a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e1a 0xc0006e0a70 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e1b 0xc0006e0a70 gate 1563590445553036600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e1f 0xc0006e12b0 gate 1563590445553401800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e20 0xc0006e12b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e21 0xc0006e12b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e22 0xc0006e12b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [msp.identity] Verify -> DEBU 3e23 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [msp.identity] Verify -> DEBU 3e24 Verify: sig = 00000000 30 45 02 21 00 f5 da 01 a3 70 51 a3 33 5f 1a f2 |0E.!.....pQ.3_..| -peer0.org1.example.com | 00000010 ac 08 fc d6 ef 1b 74 df ba ed 57 50 ae 50 ea 05 |......t...WP.P..| -peer0.org1.example.com | 00000020 8a bc 1b 00 2e 02 20 4d 26 16 73 50 ac 0e 33 ce |...... M&.sP..3.| -peer0.org1.example.com | 00000030 54 53 f1 34 5a c6 ca ff 8a 55 a6 11 48 4c 2d ef |TS.4Z....U..HL-.| -peer0.org1.example.com | 00000040 36 54 a9 63 7a a6 da |6T.cz..|" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e25 0xc0006e12b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e26 0xc0006e12b0 gate 1563590445553401800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e27 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e29 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e2a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.554 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e2b Authenticated 172.18.0.8:7051" -peer0.org1.example.com | "2019-07-20 02:40:45.554 UTC [gossip.comm] createConnection -> DEBU 3e2c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.554 UTC [gossip.comm] sendToEndpoint -> DEBU 3e2d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.554 UTC [gossip.comm] sendToEndpoint -> DEBU 3e2e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.557 UTC [gossip.comm] func1 -> DEBU 3e2f Got message: GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.557 UTC [gossip.gossip] handleMessage -> DEBU 3e30 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.557 UTC [gossip.gossip] handleMessage -> DEBU 3e31 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e32 Got message: GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e33 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [msp.identity] Verify -> DEBU 3e34 Verify: digest = 00000000 76 c3 3d 3b 53 91 f2 46 7d 87 85 b3 04 32 54 3a |v.=;S..F}....2T:| -peer0.org1.example.com | 00000010 55 f4 c9 e1 39 02 10 ec 22 19 f9 fa 73 85 d3 3b |U...9..."...s..;|" -peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [msp.identity] Verify -> DEBU 3e35 Verify: sig = 00000000 30 45 02 21 00 c2 6e 44 87 e3 45 1a 99 99 6f 73 |0E.!..nD..E...os| -peer0.org1.example.com | 00000010 58 ca 2f 2d 9b 3d 74 9e 37 b8 5a 8b 4c fd b4 9c |X./-.=t.7.Z.L...| -peer0.org1.example.com | 00000020 ea d9 1a 17 e2 02 20 4f 44 4d a2 54 18 1b df 01 |...... ODM.T....| -peer0.org1.example.com | 00000030 34 52 da 63 e7 ff af 66 75 f0 af c2 c1 fc 05 3b |4R.c...fu......;| -peer0.org1.example.com | 00000040 bf d9 c4 e8 12 c3 65 |......e|" -peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e36 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e37 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e38 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [msp.identity] Verify -> DEBU 3e39 Verify: digest = 00000000 ff 22 bf 91 7c 50 a5 a6 9f e3 84 ec 28 3e bb ab |."..|P......(>..| -peer0.org1.example.com | 00000010 43 ea 18 ec 2d ae 33 9b 6a e8 bf ea 09 8f 94 6e |C...-.3.j......n|" -peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [msp.identity] Verify -> DEBU 3e3a Verify: sig = 00000000 30 45 02 21 00 f5 f5 83 7b ac 43 de e2 2f bf 91 |0E.!....{.C../..| -peer0.org1.example.com | 00000010 a4 b7 be 7d 67 36 c7 16 82 ca 9c 37 61 1d f8 f1 |...}g6.....7a...| -peer0.org1.example.com | 00000020 33 04 07 23 a5 02 20 47 34 61 9f b8 48 46 3b cb |3..#.. G4a..HF;.| -peer0.org1.example.com | 00000030 ad b1 a0 42 7d 88 7a 23 7f d1 1a 87 24 7f 6d 6e |...B}.z#....$.mn| -peer0.org1.example.com | 00000040 e6 e3 c3 b9 9a c7 b5 |.......|" -peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [gossip.discovery] isSentByMe -> DEBU 3e3c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e3e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [msp] DeserializeIdentity -> DEBU 3e3f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e41 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e42 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func1 -> DEBU 3e46 0xc000702730 gate 1563590445560383100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e47 0xc000702730 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e48 0xc000702730 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e49 0xc000702730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e4a 0xc000702730 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func1 -> DEBU 3e4b 0xc000702730 gate 1563590445560383100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e4c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e4f 0xc000702f70 gate 1563590445561132700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e50 0xc000702f70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e51 0xc000702f70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e52 0xc000702f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e53 0xc000702f70 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e54 0xc000702f70 gate 1563590445561132700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e55 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e58 0xc0007037b0 gate 1563590445561877900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e59 0xc0007037b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5a 0xc0007037b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5b 0xc0007037b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [msp.identity] Verify -> DEBU 3e5c Verify: digest = 00000000 8f ba 57 98 80 8e 2d cd 89 5d 87 b8 08 40 04 45 |..W...-..]...@.E| -peer0.org1.example.com | 00000010 78 ea c3 c0 14 9d af c2 08 bb cc 89 77 3f 3e 87 |x...........w?>.|" -peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [msp.identity] Verify -> DEBU 3e5d Verify: sig = 00000000 30 45 02 21 00 b5 76 2d 76 60 fc fc 11 01 07 f8 |0E.!..v-v`......| -peer0.org1.example.com | 00000010 62 01 ec d0 14 36 32 55 bd 89 34 ea 51 78 34 96 |b....62U..4.Qx4.| -peer0.org1.example.com | 00000020 95 73 af b0 af 02 20 62 91 f1 ac ad d6 15 2d eb |.s.... b......-.| -peer0.org1.example.com | 00000030 5e d8 69 b6 4a 07 4f f2 0e 52 a8 48 de 81 5b 79 |^.i.J.O..R.H..[y| -peer0.org1.example.com | 00000040 8a df fb b1 35 84 93 |....5..|" -peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5e 0xc0007037b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [cauthdsl] func1 -> DEBU 3e5f 0xc0007037b0 gate 1563590445561877900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e62 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:45.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e64 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:45.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e65 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:45.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e66 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:46.978 UTC [gossip.election] waitForInterrupt -> DEBU 3e67 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:46.978 UTC [gossip.election] IsLeader -> DEBU 3e68 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:46.978 UTC [msp] GetDefaultSigningIdentity -> DEBU 3e69 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:46.979 UTC [msp.identity] Sign -> DEBU 3e6a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100E1801 " -peer0.org1.example.com | "2019-07-20 02:40:46.979 UTC [msp.identity] Sign -> DEBU 3e6b Sign: digest: C94717FA5498C76CBFD070F87C29A8E58419A2CDB66B3A48BC32D35A9FA13C03 " -peer0.org1.example.com | "2019-07-20 02:40:46.979 UTC [gossip.election] waitForInterrupt -> DEBU 3e6c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:46.981 UTC [msp] DeserializeIdentity -> DEBU 3e70 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:46.981 UTC [gossip.comm] Send -> DEBU 3e71 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:46.981 UTC [msp] DeserializeIdentity -> DEBU 3e72 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:46.982 UTC [gossip.comm] sendToEndpoint -> DEBU 3e73 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:46.982 UTC [gossip.comm] sendToEndpoint -> DEBU 3e74 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:46.982 UTC [msp] DeserializeIdentity -> DEBU 3e75 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:46.997 UTC [gossip.comm] func1 -> DEBU 3e76 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:46.997 UTC [gossip.gossip] handleMessage -> DEBU 3e77 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:46.997 UTC [gossip.gossip] handleMessage -> DEBU 3e78 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:46.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:46.999 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e7a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:46.999 UTC [msp] DeserializeIdentity -> DEBU 3e7b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.000 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e7c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:47.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:47.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:47.001 UTC [policies] Evaluate -> DEBU 3e7f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.001 UTC [policies] Evaluate -> DEBU 3e80 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:47.002 UTC [policies] Evaluate -> DEBU 3e81 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.004 UTC [cauthdsl] func1 -> DEBU 3e82 0xc0006efa40 gate 1563590447004336100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e83 0xc0006efa40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e84 0xc0006efa40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e85 0xc0006efa40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [cauthdsl] func2 -> DEBU 3e86 0xc0006efa40 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [gossip.gossip] handleMessage -> DEBU 3e87 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [cauthdsl] func1 -> DEBU 3e88 0xc0006efa40 gate 1563590447004336100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e89 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func1 -> DEBU 3e8c 0xc000763130 gate 1563590447006150600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8d 0xc000763130 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8e 0xc000763130 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8f 0xc000763130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e90 0xc000763130 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func1 -> DEBU 3e91 0xc000763130 gate 1563590447006150600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e92 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.007 UTC [cauthdsl] func1 -> DEBU 3e95 0xc000763970 gate 1563590447007816600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:47.007 UTC [cauthdsl] func2 -> DEBU 3e96 0xc000763970 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:47.008 UTC [cauthdsl] func2 -> DEBU 3e97 0xc000763970 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:47.008 UTC [cauthdsl] func2 -> DEBU 3e98 0xc000763970 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:47.008 UTC [msp.identity] Verify -> DEBU 3e99 Verify: digest = 00000000 cf 94 cc bf 56 cf f7 61 c6 08 be 0a 5a fa 83 fe |....V..a....Z...| -peer0.org1.example.com | 00000010 db 51 21 ae 39 c6 6a 65 af 46 59 ec aa 84 2e 99 |.Q!.9.je.FY.....|" -peer0.org1.example.com | "2019-07-20 02:40:47.008 UTC [msp.identity] Verify -> DEBU 3e9a Verify: sig = 00000000 30 44 02 20 30 58 3e 03 05 1c 60 f6 aa 1e 0d 5d |0D. 0X>...`....]| -peer0.org1.example.com | 00000010 02 6e 70 7d 5a f5 63 2c 5e dd e7 33 47 95 09 69 |.np}Z.c,^..3G..i| -peer0.org1.example.com | 00000020 dd ad 21 4e 02 20 0b 55 36 0d b2 9c 17 0a b6 ea |..!N. .U6.......| -peer0.org1.example.com | 00000030 1e 76 ba b8 be ad dd 38 9d 50 bc 4a 85 a5 09 b7 |.v.....8.P.J....| -peer0.org1.example.com | 00000040 6a e6 a6 64 bd 14 |j..d..|" -peer0.org1.example.com | "2019-07-20 02:40:47.009 UTC [cauthdsl] func2 -> DEBU 3e9b 0xc000763970 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:47.009 UTC [cauthdsl] func1 -> DEBU 3e9c 0xc000763970 gate 1563590447007816600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:47.009 UTC [policies] Evaluate -> DEBU 3e9d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.009 UTC [policies] Evaluate -> DEBU 3e9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.010 UTC [policies] Evaluate -> DEBU 3e9f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.010 UTC [policies] Evaluate -> DEBU 3ea0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.010 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ea1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea3 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea4 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.012 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ea7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ea8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ea9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.012 UTC [gossip.gossip] handleMessage -> DEBU 3eaa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eab Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.016 UTC [msp] DeserializeIdentity -> DEBU 3eac Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.016 UTC [msp] DeserializeIdentity -> DEBU 3ead Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.017 UTC [msp] DeserializeIdentity -> DEBU 3eae Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eaf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eb0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eb1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [gossip.comm] Send -> DEBU 3eb2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [msp] DeserializeIdentity -> DEBU 3eb3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [msp] DeserializeIdentity -> DEBU 3eb4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [gossip.comm] Send -> DEBU 3eb5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.020 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.193 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 3eba Sleeping 25s" -peer0.org1.example.com | "2019-07-20 02:40:47.287 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ebb Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:47.287 UTC [msp.identity] Sign -> DEBU 3ebc Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151030 " -peer0.org1.example.com | "2019-07-20 02:40:47.287 UTC [msp.identity] Sign -> DEBU 3ebd Sign: digest: F4B2374751D92F8187A330159D35521A45201DE2EE917285D294724B2D5FFEE1 " -peer0.org1.example.com | "2019-07-20 02:40:47.288 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ebe Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:47.288 UTC [msp.identity] Sign -> DEBU 3ebf Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:47.288 UTC [msp.identity] Sign -> DEBU 3ec0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:47.289 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3ec1 Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:47.297 UTC [msp] DeserializeIdentity -> DEBU 3ec2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.297 UTC [msp] DeserializeIdentity -> DEBU 3ec3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.298 UTC [msp] DeserializeIdentity -> DEBU 3ec4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.298 UTC [gossip.comm] Send -> DEBU 3ec5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:47.298 UTC [msp] DeserializeIdentity -> DEBU 3ec6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.299 UTC [gossip.comm] sendToEndpoint -> DEBU 3ec7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.299 UTC [gossip.comm] sendToEndpoint -> DEBU 3ec9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.299 UTC [gossip.comm] Send -> DEBU 3ec8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:47.299 UTC [gossip.comm] Send -> DEBU 3eca Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.301 UTC [gossip.comm] sendToEndpoint -> DEBU 3ece Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.330 UTC [gossip.gossip] handleMessage -> DEBU 3ecf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.330 UTC [gossip.gossip] handleMessage -> DEBU 3ed0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.330 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ed1 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.330 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ed2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:47.331 UTC [msp.identity] Verify -> DEBU 3ed3 Verify: digest = 00000000 c0 8b 97 e5 b3 08 ab 1c 23 62 0d 3c a8 64 f1 4f |........#b.<.d.O| -peer0.org1.example.com | 00000010 12 44 bf 7c 3a 44 dc 2a b4 02 fc ce 31 ca 47 78 |.D.|:D.*....1.Gx|" -peer0.org1.example.com | "2019-07-20 02:40:47.331 UTC [msp.identity] Verify -> DEBU 3ed4 Verify: sig = 00000000 30 45 02 21 00 ea 77 67 83 45 6e 40 a5 3c ac d6 |0E.!..wg.En@.<..| -peer0.org1.example.com | 00000010 74 2c ee 43 4d 48 2f bc 87 08 96 11 2e d9 2c b5 |t,.CMH/.......,.| -peer0.org1.example.com | 00000020 5c 64 72 27 41 02 20 78 2d 65 40 1b b7 cd 24 1d |\dr'A. x-e@...$.| -peer0.org1.example.com | 00000030 0d 4d bb 00 af be 5f 94 8e 7d 97 15 9a d8 5a fb |.M...._..}....Z.| -peer0.org1.example.com | 00000040 97 81 74 60 73 de 2a |..t`s.*|" -peer0.org1.example.com | "2019-07-20 02:40:47.332 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ed5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed7 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed8 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:47.333 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed9 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:47.333 UTC [gossip.discovery] learnExistingMembers -> DEBU 3eda Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.333 UTC [gossip.discovery] handleAliveMessage -> DEBU 3edb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.333 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3edc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3edd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3ede Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3edf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.336 UTC [gossip.comm] Send -> DEBU 3ee0 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:47.336 UTC [msp] DeserializeIdentity -> DEBU 3ee1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.336 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.336 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.336 UTC [gossip.comm] Send -> DEBU 3ee4 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:47.337 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.337 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.342 UTC [gossip.comm] func1 -> DEBU 3ee7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.342 UTC [gossip.gossip] handleMessage -> DEBU 3ee8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.343 UTC [gossip.gossip] handleMessage -> DEBU 3ee9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.343 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eea Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.343 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eeb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.531 UTC [gossip.comm] func1 -> DEBU 3eec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.531 UTC [gossip.gossip] handleMessage -> DEBU 3eed Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.532 UTC [gossip.gossip] handleMessage -> DEBU 3eee Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eef Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.533 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ef0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:47.533 UTC [msp] DeserializeIdentity -> DEBU 3ef1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.533 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ef2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:47.533 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [cauthdsl] func1 -> DEBU 3ef8 0xc003843490 gate 1563590447534529400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [cauthdsl] func2 -> DEBU 3ef9 0xc003843490 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [cauthdsl] func2 -> DEBU 3efa 0xc003843490 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [cauthdsl] func2 -> DEBU 3efb 0xc003843490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [cauthdsl] func2 -> DEBU 3efc 0xc003843490 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [cauthdsl] func1 -> DEBU 3efd 0xc003843490 gate 1563590447534529400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3efe Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3eff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3f00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func1 -> DEBU 3f01 0xc003843cd0 gate 1563590447536109800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f02 0xc003843cd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f03 0xc003843cd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f04 0xc003843cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f05 0xc003843cd0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func1 -> DEBU 3f06 0xc003843cd0 gate 1563590447536109800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f07 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.537 UTC [cauthdsl] func1 -> DEBU 3f0a 0xc00385a510 gate 1563590447537724800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:47.537 UTC [cauthdsl] func2 -> DEBU 3f0b 0xc00385a510 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:47.538 UTC [cauthdsl] func2 -> DEBU 3f0c 0xc00385a510 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:47.538 UTC [cauthdsl] func2 -> DEBU 3f0d 0xc00385a510 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:47.538 UTC [msp.identity] Verify -> DEBU 3f0e Verify: digest = 00000000 c3 1f 8e d6 f3 6b b3 b6 11 47 45 89 17 35 18 ff |.....k...GE..5..| -peer0.org1.example.com | 00000010 b2 3c 16 4b 3a d5 5c 86 f6 fe 41 f9 81 5b f0 40 |.<.K:.\...A..[.@|" -peer0.org1.example.com | "2019-07-20 02:40:47.538 UTC [msp.identity] Verify -> DEBU 3f0f Verify: sig = 00000000 30 44 02 20 10 e7 1b 40 4b be ad e9 7d bc 6c c1 |0D. ...@K...}.l.| -peer0.org1.example.com | 00000010 9e 54 22 95 87 7e fb f0 54 70 a1 5a 24 c4 49 b6 |.T"..~..Tp.Z$.I.| -peer0.org1.example.com | 00000020 87 78 b9 d0 02 20 4c be d5 bc 5a ee 8a a8 17 87 |.x... L...Z.....| -peer0.org1.example.com | 00000030 49 61 f7 ce 43 29 b0 e8 04 28 8c 6e b9 03 73 a0 |Ia..C)...(.n..s.| -peer0.org1.example.com | 00000040 51 42 95 aa 64 92 |QB..d.|" -peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [cauthdsl] func2 -> DEBU 3f10 0xc00385a510 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [cauthdsl] func1 -> DEBU 3f11 0xc00385a510 gate 1563590447537724800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f12 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f14 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f16 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f17 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f18 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f19 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f1a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f1b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f1c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f1d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.542 UTC [gossip.comm] func1 -> DEBU 3f1e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.542 UTC [gossip.gossip] handleMessage -> DEBU 3f1f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.543 UTC [gossip.gossip] handleMessage -> DEBU 3f20 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.543 UTC [gossip.gossip] handleMessage -> DEBU 3f21 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f22 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f23 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f24 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f25 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.544 UTC [gossip.gossip] handleMessage -> DEBU 3f26 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.544 UTC [msp] DeserializeIdentity -> DEBU 3f27 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.544 UTC [msp] DeserializeIdentity -> DEBU 3f28 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f29 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.546 UTC [gossip.comm] Send -> DEBU 3f2d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:47.546 UTC [msp] DeserializeIdentity -> DEBU 3f2e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.546 UTC [msp] DeserializeIdentity -> DEBU 3f2f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.546 UTC [gossip.comm] Send -> DEBU 3f30 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f31 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f32 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f33 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f34 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.938 UTC [gossip.comm] func1 -> DEBU 3f35 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.938 UTC [gossip.gossip] handleMessage -> DEBU 3f36 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.939 UTC [gossip.gossip] handleMessage -> DEBU 3f37 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f38 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.940 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f39 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:47.940 UTC [msp] DeserializeIdentity -> DEBU 3f3a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f3c Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f3d Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:47.941 UTC [policies] Evaluate -> DEBU 3f3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.941 UTC [policies] Evaluate -> DEBU 3f3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [policies] Evaluate -> DEBU 3f40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func1 -> DEBU 3f41 0xc0028e6010 gate 1563590447942285300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f42 0xc0028e6010 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f43 0xc0028e6010 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f44 0xc0028e6010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f45 0xc0028e6010 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func1 -> DEBU 3f46 0xc0028e6010 gate 1563590447942285300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f47 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [cauthdsl] func1 -> DEBU 3f4a 0xc0028e6850 gate 1563590447943384400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4b 0xc0028e6850 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4c 0xc0028e6850 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4d 0xc0028e6850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4e 0xc0028e6850 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [cauthdsl] func1 -> DEBU 3f4f 0xc0028e6850 gate 1563590447943384400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f50 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [cauthdsl] func1 -> DEBU 3f53 0xc0028e7090 gate 1563590447944666000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [cauthdsl] func2 -> DEBU 3f54 0xc0028e7090 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f55 0xc0028e7090 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f56 0xc0028e7090 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [msp.identity] Verify -> DEBU 3f57 Verify: digest = 00000000 82 8a 0c 02 a6 b9 8e b3 5c 66 69 6a d5 56 b4 cc |........\fij.V..| -peer0.org1.example.com | 00000010 7f 8a 2d 1a 82 cc 05 33 81 44 35 ec 18 70 32 e1 |..-....3.D5..p2.|" -peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [msp.identity] Verify -> DEBU 3f58 Verify: sig = 00000000 30 45 02 21 00 c4 f6 b1 01 4b 6e f7 8e fd 08 a1 |0E.!.....Kn.....| -peer0.org1.example.com | 00000010 ee 32 9f 30 af b8 48 d7 f8 ba 7c 96 af 8e b9 be |.2.0..H...|.....| -peer0.org1.example.com | 00000020 88 dc fa 86 27 02 20 1e 73 d4 0f e3 81 8b e9 c5 |....'. .s.......| -peer0.org1.example.com | 00000030 c5 b7 4c 20 fb 94 a9 c4 93 fe a8 36 38 c9 2b 14 |..L .......68.+.| -peer0.org1.example.com | 00000040 d3 ec c6 8c 3d c1 4c |....=.L|" -peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f59 0xc0028e7090 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [cauthdsl] func1 -> DEBU 3f5a 0xc0028e7090 gate 1563590447944666000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5d Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [policies] Evaluate -> DEBU 3f5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f5f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f60 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f61 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f62 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f63 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f64 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f65 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f66 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [gossip.discovery] sendMemResponse -> DEBU 3f67 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f68 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f69 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f6a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [gossip.comm] Send -> DEBU 3f6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [gossip.discovery] sendMemResponse -> DEBU 3f6c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0207" signature:"0E\002!\000\352wg\203En@\245<\254\326t,\356CMH/\274\207\010\226\021.\331,\265\\dr'A\002 x-e@\033\267\315$\035\rM\273\000\257\276_\224\216}\227\025\232\330Z\373\227\201t`s\336*" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:47.954 UTC [gossip.comm] sendToEndpoint -> DEBU 3f6d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.955 UTC [gossip.comm] sendToEndpoint -> DEBU 3f6e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:47.956 UTC [gossip.comm] func1 -> DEBU 3f6f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.956 UTC [gossip.gossip] handleMessage -> DEBU 3f70 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.956 UTC [gossip.pull] HandleMessage -> DEBU 3f71 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f72 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f73 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f74 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f75 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f76 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f77 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:47.959 UTC [gossip.pull] SendDigest -> DEBU 3f78 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:47.959 UTC [gossip.gossip] handleMessage -> DEBU 3f79 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.235 UTC [gossip.pull] Hello -> DEBU 3f7a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:48.235 UTC [gossip.comm] Send -> DEBU 3f7b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:48.236 UTC [gossip.pull] Hello -> DEBU 3f7c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:48.236 UTC [gossip.comm] Send -> DEBU 3f7d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:48.236 UTC [gossip.pull] Hello -> DEBU 3f7e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:48.236 UTC [gossip.comm] Send -> DEBU 3f7f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f80 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f81 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f83 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f84 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f85 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.238 UTC [gossip.comm] func1 -> DEBU 3f86 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.239 UTC [gossip.gossip] handleMessage -> DEBU 3f87 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.240 UTC [gossip.pull] HandleMessage -> DEBU 3f88 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.241 UTC [gossip.gossip] handleMessage -> DEBU 3f8a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.240 UTC [gossip.comm] func1 -> DEBU 3f89 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.242 UTC [gossip.gossip] handleMessage -> DEBU 3f8b Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.242 UTC [gossip.pull] HandleMessage -> DEBU 3f8c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.242 UTC [gossip.gossip] handleMessage -> DEBU 3f8d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.243 UTC [gossip.gossip] handleMessage -> DEBU 3f8e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.243 UTC [gossip.pull] HandleMessage -> DEBU 3f8f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.243 UTC [gossip.gossip] handleMessage -> DEBU 3f90 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f91 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f92 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151031 " -peer0.org1.example.com | "2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f93 Sign: digest: 4F74B096134B36ADCB78D9C03AE46F229A5A99113888D4169E87246C9DD09824 " -peer0.org1.example.com | "2019-07-20 02:40:48.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f94 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f95 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:48.279 UTC [msp.identity] Sign -> DEBU 3f96 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:48.279 UTC [gossip.comm] Send -> DEBU 3f97 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:48.279 UTC [msp] DeserializeIdentity -> DEBU 3f98 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.279 UTC [gossip.comm] Send -> DEBU 3f99 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:48.279 UTC [msp] DeserializeIdentity -> DEBU 3f9a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.280 UTC [gossip.comm] Send -> DEBU 3f9b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:48.280 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.280 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.284 UTC [gossip.comm] func1 -> DEBU 3fa2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.284 UTC [gossip.gossip] handleMessage -> DEBU 3fa3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.284 UTC [gossip.gossip] handleMessage -> DEBU 3fa4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fa6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:48.285 UTC [gossip.comm] func1 -> DEBU 3fa7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.285 UTC [gossip.gossip] handleMessage -> DEBU 3fa8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.285 UTC [msp.identity] Verify -> DEBU 3fa9 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| -peer0.org1.example.com | 00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" -peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [msp.identity] Verify -> DEBU 3faa Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| -peer0.org1.example.com | 00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| -peer0.org1.example.com | 00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| -peer0.org1.example.com | 00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| -peer0.org1.example.com | 00000040 b5 ce 5b 25 de 56 |..[%.V|" -peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fab Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.discovery] isSentByMe -> DEBU 3fac Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fad Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fae Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3faf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fb0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [msp] DeserializeIdentity -> DEBU 3fb1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fb2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fb3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fb4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fb8 0xc00404e2b0 gate 1563590448288246900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fb9 0xc00404e2b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fba 0xc00404e2b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fbb 0xc00404e2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fbc 0xc00404e2b0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fbd 0xc00404e2b0 gate 1563590448288246900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fbe Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fc1 0xc00404eaf0 gate 1563590448288608400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc2 0xc00404eaf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc3 0xc00404eaf0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc4 0xc00404eaf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc5 0xc00404eaf0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fc6 0xc00404eaf0 gate 1563590448288608400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fca 0xc00404f330 gate 1563590448288892800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fcb 0xc00404f330 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fcc 0xc00404f330 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [cauthdsl] func2 -> DEBU 3fcd 0xc00404f330 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fce Verify: digest = 00000000 82 8a 0c 02 a6 b9 8e b3 5c 66 69 6a d5 56 b4 cc |........\fij.V..| -peer0.org1.example.com | 00000010 7f 8a 2d 1a 82 cc 05 33 81 44 35 ec 18 70 32 e1 |..-....3.D5..p2.|" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fcf Verify: sig = 00000000 30 45 02 21 00 c4 f6 b1 01 4b 6e f7 8e fd 08 a1 |0E.!.....Kn.....| -peer0.org1.example.com | 00000010 ee 32 9f 30 af b8 48 d7 f8 ba 7c 96 af 8e b9 be |.2.0..H...|.....| -peer0.org1.example.com | 00000020 88 dc fa 86 27 02 20 1e 73 d4 0f e3 81 8b e9 c5 |....'. .s.......| -peer0.org1.example.com | 00000030 c5 b7 4c 20 fb 94 a9 c4 93 fe a8 36 38 c9 2b 14 |..L .......68.+.| -peer0.org1.example.com | 00000040 d3 ec c6 8c 3d c1 4c |....=.L|" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [cauthdsl] func2 -> DEBU 3fd0 0xc00404f330 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [cauthdsl] func1 -> DEBU 3fd1 0xc00404f330 gate 1563590448288892800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd4 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fd6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fd7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fd8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fd9 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| -peer0.org1.example.com | 00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fda Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| -peer0.org1.example.com | 00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| -peer0.org1.example.com | 00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| -peer0.org1.example.com | 00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| -peer0.org1.example.com | 00000040 b5 ce 5b 25 de 56 |..[%.V|" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fdb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [gossip.discovery] isSentByMe -> DEBU 3fdc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fdd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fde Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fdf Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fe0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fe1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fe2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fe3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe4 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| -peer0.org1.example.com | 00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" -peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe5 Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| -peer0.org1.example.com | 00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| -peer0.org1.example.com | 00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| -peer0.org1.example.com | 00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| -peer0.org1.example.com | 00000040 b5 ce 5b 25 de 56 |..[%.V|" -peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe7 Verify: sig = 00000000 30 45 02 21 00 9d b8 1e 88 45 28 58 1c 6b 97 a2 |0E.!.....E(X.k..| -peer0.org1.example.com | 00000010 07 40 cd 30 8f cc 13 2b 52 fc bd 7f ba 82 f6 b7 |.@.0...+R.......| -peer0.org1.example.com | 00000020 ca ea e8 ff fa 02 20 07 e1 9b b7 a0 ea a7 91 cd |...... .........| -peer0.org1.example.com | 00000030 9f 46 66 da 28 f8 65 b3 65 1b 15 fe f4 a6 ca 62 |.Ff.(.e.e......b| -peer0.org1.example.com | 00000040 66 3d 21 b8 a0 da 43 |f=!...C|" -peer0.org1.example.com | "2019-07-20 02:40:48.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fe8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.294 UTC [gossip.discovery] isSentByMe -> DEBU 3fe9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fea Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3feb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.336 UTC [gossip.gossip] handleMessage -> DEBU 3fec Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.336 UTC [gossip.pull] HandleMessage -> DEBU 3fed GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.336 UTC [gossip.pull] SendDigest -> DEBU 3fee Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:48.337 UTC [gossip.gossip] handleMessage -> DEBU 3fef Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.360 UTC [gossip.gossip] handleMessage -> DEBU 3ff0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.360 UTC [gossip.gossip] handleMessage -> DEBU 3ff1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ff2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ff3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:48.362 UTC [msp.identity] Verify -> DEBU 3ff4 Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| -peer0.org1.example.com | 00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" -peer0.org1.example.com | "2019-07-20 02:40:48.362 UTC [msp.identity] Verify -> DEBU 3ff5 Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| -peer0.org1.example.com | 00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| -peer0.org1.example.com | 00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| -peer0.org1.example.com | 00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| -peer0.org1.example.com | 00000040 78 fb 75 ea c1 36 cc |x.u..6.|" -peer0.org1.example.com | "2019-07-20 02:40:48.364 UTC [msp.identity] Verify -> DEBU 3ff6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:48.364 UTC [msp.identity] Verify -> DEBU 3ff7 Verify: sig = 00000000 30 45 02 21 00 94 e0 00 3e 3a 01 b1 51 f0 f7 8e |0E.!....>:..Q...| -peer0.org1.example.com | 00000010 46 3d 0d 48 fc 27 cc fe f3 27 d5 5c 95 64 3f 93 |F=.H.'...'.\.d?.| -peer0.org1.example.com | 00000020 65 f5 57 cf 0e 02 20 7a 1d 11 1d 3a 13 18 73 b8 |e.W... z...:..s.| -peer0.org1.example.com | 00000030 58 0a c3 bd f3 fc dd 75 f0 16 fb b4 20 62 90 70 |X......u.... b.p| -peer0.org1.example.com | 00000040 2b fa 22 1d f8 89 78 |+."...x|" -peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ff8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffa updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffc Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ffe Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fff Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.366 UTC [gossip.discovery] sendMemResponse -> DEBU 4000 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:48.366 UTC [msp] DeserializeIdentity -> DEBU 4001 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.366 UTC [msp] DeserializeIdentity -> DEBU 4002 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.367 UTC [gossip.comm] Send -> DEBU 4003 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:48.367 UTC [gossip.discovery] sendMemResponse -> DEBU 4004 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > alive: " -peer0.org1.example.com | "2019-07-20 02:40:48.367 UTC [gossip.comm] sendToEndpoint -> DEBU 4005 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.367 UTC [gossip.comm] sendToEndpoint -> DEBU 4006 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [gossip.comm] func1 -> DEBU 4007 Got message: GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [gossip.gossip] handleMessage -> DEBU 4008 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [gossip.gossip] handleMessage -> DEBU 4009 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [gossip.discovery] handleMsgFromComm -> DEBU 400a Got message: GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 400b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [msp] DeserializeIdentity -> DEBU 400c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 400d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4010 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4011 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4012 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4013 0xc0040758f0 gate 1563590448582349900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4014 0xc0040758f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4015 0xc0040758f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4016 0xc0040758f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4017 0xc0040758f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4018 0xc0040758f0 gate 1563590448582349900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4019 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 401a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 401b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 401c 0xc0040ae130 gate 1563590448582767000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401d 0xc0040ae130 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401e 0xc0040ae130 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401f 0xc0040ae130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4020 0xc0040ae130 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4021 0xc0040ae130 gate 1563590448582767000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4022 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4023 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4024 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [cauthdsl] func1 -> DEBU 4025 0xc0040ae970 gate 1563590448583184400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4026 0xc0040ae970 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4027 0xc0040ae970 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4028 0xc0040ae970 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [msp.identity] Verify -> DEBU 4029 Verify: digest = 00000000 c8 4a ac 4f 71 b3 e4 bd 69 2d bb e2 b3 7b 75 dc |.J.Oq...i-...{u.| -peer0.org1.example.com | 00000010 48 0d 1e cf 11 6d 74 d5 b2 c3 cb b7 9b a1 47 43 |H....mt.......GC|" -peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [msp.identity] Verify -> DEBU 402a Verify: sig = 00000000 30 45 02 21 00 b8 46 89 61 0a 7f 6e 80 cd cd 78 |0E.!..F.a..n...x| -peer0.org1.example.com | 00000010 c4 0f 6b 13 9a 5f 51 fc 0f 48 3b 47 47 6a 34 ea |..k.._Q..H;GGj4.| -peer0.org1.example.com | 00000020 c9 87 9f 2b 44 02 20 07 f5 8d a1 90 91 28 70 9a |...+D. ......(p.| -peer0.org1.example.com | 00000030 c7 d4 e1 19 a0 0f 1a f1 78 05 1e 8a 3a 1c 3e 8a |........x...:.>.| -peer0.org1.example.com | 00000040 6c 39 6d f0 af 9f 8c |l9m....|" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [cauthdsl] func2 -> DEBU 402b 0xc0040ae970 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [cauthdsl] func1 -> DEBU 402c 0xc0040ae970 gate 1563590448583184400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 4030 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4031 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4032 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4033 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4034 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4035 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4036 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4037 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4038 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [gossip.discovery] sendMemResponse -> DEBU 4039 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [gossip.comm] Send -> DEBU 403d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [gossip.discovery] sendMemResponse -> DEBU 403e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" > alive:\212l9m\360\257\237\214" > alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [gossip.comm] sendToEndpoint -> DEBU 403f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [gossip.comm] sendToEndpoint -> DEBU 4040 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [gossip.comm] func1 -> DEBU 4041 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [gossip.gossip] handleMessage -> DEBU 4042 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [gossip.pull] HandleMessage -> DEBU 4043 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4044 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4045 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4046 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4047 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4048 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4049 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [gossip.pull] SendDigest -> DEBU 404a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:48.599 UTC [gossip.gossip] handleMessage -> DEBU 404b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.682 UTC [msp] DeserializeIdentity -> DEBU 404c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.682 UTC [msp] DeserializeIdentity -> DEBU 404d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.682 UTC [gossip.comm] Send -> DEBU 404e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 404f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4050 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4051 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4052 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4053 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4054 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.686 UTC [gossip.comm] func1 -> DEBU 4055 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.686 UTC [gossip.gossip] handleMessage -> DEBU 4056 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.686 UTC [msp] DeserializeIdentity -> DEBU 4057 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.691 UTC [msp.identity] Verify -> DEBU 4058 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:48.691 UTC [msp.identity] Verify -> DEBU 4059 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:48.693 UTC [msp.identity] Verify -> DEBU 405a Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:48.693 UTC [msp.identity] Verify -> DEBU 405b Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:48.694 UTC [msp] DeserializeIdentity -> DEBU 405c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.695 UTC [msp] DeserializeIdentity -> DEBU 405d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 405e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:48.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 405f Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.698 UTC [gossip.comm] func1 -> DEBU 4060 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.698 UTC [msp] DeserializeIdentity -> DEBU 4061 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4062 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.699 UTC [gossip.comm] Send -> DEBU 4063 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4064 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4065 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4066 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4067 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4068 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4069 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 406a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 406b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 406c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [policies] Evaluate -> DEBU 406d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [policies] Evaluate -> DEBU 406e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [policies] Evaluate -> DEBU 406f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func1 -> DEBU 4070 0xc0040e7a20 gate 1563590448701695400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4071 0xc0040e7a20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4072 0xc0040e7a20 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4073 0xc0040e7a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4074 0xc0040e7a20 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func1 -> DEBU 4075 0xc0040e7a20 gate 1563590448701695400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4076 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4077 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4078 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4079 0xc0040fe260 gate 1563590448702099200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407a 0xc0040fe260 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407b 0xc0040fe260 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407c 0xc0040fe260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407d 0xc0040fe260 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 407e 0xc0040fe260 gate 1563590448702099200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 407f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4080 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4081 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4082 0xc0040feaa0 gate 1563590448702416400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4083 0xc0040feaa0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4084 0xc0040feaa0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4085 0xc0040feaa0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [msp.identity] Verify -> DEBU 4086 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [msp.identity] Verify -> DEBU 4087 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4088 0xc0040feaa0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4089 0xc0040feaa0 gate 1563590448702416400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.703 UTC [policies] Evaluate -> DEBU 408d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.703 UTC [msp] DeserializeIdentity -> DEBU 408e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.706 UTC [msp] DeserializeIdentity -> DEBU 408f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4090 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4091 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4092 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4093 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4094 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4095 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [cauthdsl] func1 -> DEBU 4096 0xc004112270 gate 1563590448707849800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [cauthdsl] func2 -> DEBU 4097 0xc004112270 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 4098 0xc004112270 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 4099 0xc004112270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 409a 0xc004112270 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 409b 0xc004112270 gate 1563590448707849800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 409f 0xc004112ab0 gate 1563590448708285200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a0 0xc004112ab0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a1 0xc004112ab0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a2 0xc004112ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a3 0xc004112ab0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 40a4 0xc004112ab0 gate 1563590448708285200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 40a8 0xc0041132f0 gate 1563590448708639300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a9 0xc0041132f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40aa 0xc0041132f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40ab 0xc0041132f0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [msp.identity] Verify -> DEBU 40ac Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [msp.identity] Verify -> DEBU 40ad Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [cauthdsl] func2 -> DEBU 40ae 0xc0041132f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [cauthdsl] func1 -> DEBU 40af 0xc0041132f0 gate 1563590448708639300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [msp] DeserializeIdentity -> DEBU 40b4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40b5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40b6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.722 UTC [policies] Evaluate -> DEBU 40b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.722 UTC [policies] Evaluate -> DEBU 40b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40ba 0xc0041283d0 gate 1563590448723144800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bb 0xc0041283d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bc 0xc0041283d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bd 0xc0041283d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40be 0xc0041283d0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40bf 0xc0041283d0 gate 1563590448723144800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40c3 0xc004128c10 gate 1563590448723461300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c4 0xc004128c10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c5 0xc004128c10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c6 0xc004128c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c7 0xc004128c10 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40c8 0xc004128c10 gate 1563590448723461300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40cc 0xc004129450 gate 1563590448723726100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40cd 0xc004129450 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40ce 0xc004129450 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40cf 0xc004129450 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [msp.identity] Verify -> DEBU 40d0 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [msp.identity] Verify -> DEBU 40d1 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [cauthdsl] func2 -> DEBU 40d2 0xc004129450 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [cauthdsl] func1 -> DEBU 40d3 0xc004129450 gate 1563590448723726100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [gossip.gossip] handleMessage -> DEBU 40d8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [gossip.gossip] handleMessage -> DEBU 40d9 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [msp.identity] Verify -> DEBU 40da Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [msp.identity] Verify -> DEBU 40db Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [msp] DeserializeIdentity -> DEBU 40dc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [msp] DeserializeIdentity -> DEBU 40dd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40df Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40e0 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [cauthdsl] func1 -> DEBU 40e4 0xc004133580 gate 1563590448724944600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [cauthdsl] func2 -> DEBU 40e5 0xc004133580 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.725 UTC [cauthdsl] func2 -> DEBU 40e6 0xc004133580 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.726 UTC [cauthdsl] func2 -> DEBU 40e7 0xc004133580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.726 UTC [cauthdsl] func2 -> DEBU 40e8 0xc004133580 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [cauthdsl] func1 -> DEBU 40e9 0xc004133580 gate 1563590448724944600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40ea Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [cauthdsl] func1 -> DEBU 40ed 0xc004133dc0 gate 1563590448727397200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [cauthdsl] func2 -> DEBU 40ee 0xc004133dc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40ef 0xc004133dc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40f0 0xc004133dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40f1 0xc004133dc0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [cauthdsl] func1 -> DEBU 40f2 0xc004133dc0 gate 1563590448727397200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.729 UTC [cauthdsl] func1 -> DEBU 40f6 0xc004150600 gate 1563590448728648400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.729 UTC [cauthdsl] func2 -> DEBU 40f7 0xc004150600 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.731 UTC [cauthdsl] func2 -> DEBU 40f8 0xc004150600 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [cauthdsl] func2 -> DEBU 40f9 0xc004150600 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [msp.identity] Verify -> DEBU 40fa Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [msp.identity] Verify -> DEBU 40fb Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" -peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [cauthdsl] func2 -> DEBU 40fc 0xc004150600 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [cauthdsl] func1 -> DEBU 40fd 0xc004150600 gate 1563590448728648400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [policies] Evaluate -> DEBU 40fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 40ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4100 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4101 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [msp] DeserializeIdentity -> DEBU 4102 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [msp] DeserializeIdentity -> DEBU 4103 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4104 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4105 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4106 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4107 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4108 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4109 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [cauthdsl] func1 -> DEBU 410a 0xc004151dd0 gate 1563590448733828600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410b 0xc004151dd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410c 0xc004151dd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410d 0xc004151dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410e 0xc004151dd0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 410f 0xc004151dd0 gate 1563590448733828600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4110 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4111 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4112 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4113 0xc004162610 gate 1563590448734115800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4114 0xc004162610 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4115 0xc004162610 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4116 0xc004162610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4117 0xc004162610 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4118 0xc004162610 gate 1563590448734115800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4119 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 411a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 411b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 411c 0xc004162e50 gate 1563590448734427300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411d 0xc004162e50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411e 0xc004162e50 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411f 0xc004162e50 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [msp.identity] Verify -> DEBU 4120 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [msp.identity] Verify -> DEBU 4121 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4122 0xc004162e50 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4123 0xc004162e50 gate 1563590448734427300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4124 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4125 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4126 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4127 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [msp.identity] Verify -> DEBU 4128 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [msp.identity] Verify -> DEBU 4129 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412a Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412b Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [msp] DeserializeIdentity -> DEBU 412f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [msp.identity] newIdentity -> DEBU 4130 Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [cauthdsl] func1 -> DEBU 4131 0xc004172550 gate 1563590448735661200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4132 0xc004172550 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4133 0xc004172550 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4134 0xc004172550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4135 0xc004172550 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [cauthdsl] func1 -> DEBU 4136 0xc004172550 gate 1563590448735661200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4137 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4138 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4139 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [cauthdsl] func1 -> DEBU 413a 0xc0041736d0 gate 1563590448738604100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 413b 0xc0041736d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 413c 0xc0041736d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 413d Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [msp] Validate -> DEBU 413e MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [msp] getCertificationChain -> DEBU 413f MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 4140 0xc0041736d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 4141 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 4142 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [cauthdsl] func2 -> DEBU 4143 0xc0041736d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [cauthdsl] func1 -> DEBU 4144 0xc0041736d0 gate 1563590448738604100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4145 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4146 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4147 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4148 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [gossip.gossip] handleMessage -> DEBU 4149 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [gossip.gossip] handleMessage -> DEBU 414a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [msp] DeserializeIdentity -> DEBU 414b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 414c Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 414d Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [msp.identity] Verify -> DEBU 414e Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [msp.identity] Verify -> DEBU 414f Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [msp] DeserializeIdentity -> DEBU 4150 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [msp] DeserializeIdentity -> DEBU 4151 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4152 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4153 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4154 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4155 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4156 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4157 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 4158 0xc0041a23a0 gate 1563590448740710900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 4159 0xc0041a23a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415a 0xc0041a23a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415b 0xc0041a23a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415c 0xc0041a23a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 415d 0xc0041a23a0 gate 1563590448740710900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 415e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 415f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4160 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 4161 0xc0041a2be0 gate 1563590448740959800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 4162 0xc0041a2be0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4163 0xc0041a2be0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4164 0xc0041a2be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4165 0xc0041a2be0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 4166 0xc0041a2be0 gate 1563590448740959800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4167 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4168 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4169 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 416a 0xc0041a3420 gate 1563590448741207600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416b 0xc0041a3420 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416c 0xc0041a3420 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416d 0xc0041a3420 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [msp.identity] Verify -> DEBU 416e Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [msp.identity] Verify -> DEBU 416f Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4170 0xc0041a3420 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 4171 0xc0041a3420 gate 1563590448741207600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4172 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4173 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4174 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4175 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [msp] DeserializeIdentity -> DEBU 4176 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [msp] DeserializeIdentity -> DEBU 4177 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4178 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4179 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 417a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 417e 0xc0041b2bf0 gate 1563590448742219200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 417f 0xc0041b2bf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4180 0xc0041b2bf0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4181 0xc0041b2bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4182 0xc0041b2bf0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4183 0xc0041b2bf0 gate 1563590448742219200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4184 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4185 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4186 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4187 0xc0041b3430 gate 1563590448742640000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4188 0xc0041b3430 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4189 0xc0041b3430 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 418a 0xc0041b3430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 418b 0xc0041b3430 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 418c 0xc0041b3430 gate 1563590448742640000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4190 0xc0041b3c70 gate 1563590448742879200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4191 0xc0041b3c70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4192 0xc0041b3c70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4193 0xc0041b3c70 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.743 UTC [msp.identity] Verify -> DEBU 4194 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:40:48.743 UTC [msp.identity] Verify -> DEBU 4195 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 4196 0xc0041b3c70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 4197 0xc0041b3c70 gate 1563590448742879200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 4198 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 4199 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [msp] DeserializeIdentity -> DEBU 419c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 419d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 419e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41a2 0xc0041c6d50 gate 1563590448744544700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a3 0xc0041c6d50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a4 0xc0041c6d50 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a5 0xc0041c6d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a6 0xc0041c6d50 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41a7 0xc0041c6d50 gate 1563590448744544700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41ab 0xc0041c7590 gate 1563590448744793600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ac 0xc0041c7590 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ad 0xc0041c7590 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ae 0xc0041c7590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41af 0xc0041c7590 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41b0 0xc0041c7590 gate 1563590448744793600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.745 UTC [policies] Evaluate -> DEBU 41b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.745 UTC [policies] Evaluate -> DEBU 41b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:48.745 UTC [cauthdsl] func1 -> DEBU 41b4 0xc0041c7dd0 gate 1563590448745079700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:48.745 UTC [cauthdsl] func2 -> DEBU 41b5 0xc0041c7dd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:48.746 UTC [cauthdsl] func2 -> DEBU 41b6 0xc0041c7dd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:48.746 UTC [cauthdsl] func2 -> DEBU 41b7 0xc0041c7dd0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.746 UTC [msp.identity] Verify -> DEBU 41b8 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [msp.identity] Verify -> DEBU 41b9 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [cauthdsl] func2 -> DEBU 41ba 0xc0041c7dd0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [cauthdsl] func1 -> DEBU 41bb 0xc0041c7dd0 gate 1563590448745079700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41be Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [gossip.gossip] handleMessage -> DEBU 41c0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.755 UTC [gossip.pull] Hello -> DEBU 41c3 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.756 UTC [gossip.comm] Send -> DEBU 41c6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:48.756 UTC [gossip.comm] sendToEndpoint -> DEBU 41c7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.756 UTC [gossip.comm] sendToEndpoint -> DEBU 41c8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.757 UTC [gossip.gossip] handleMessage -> DEBU 41c9 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.758 UTC [gossip.pull] HandleMessage -> DEBU 41ca GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.758 UTC [gossip.gossip] handleMessage -> DEBU 41cb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.842 UTC [gossip.gossip] handleMessage -> DEBU 41cc Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.844 UTC [msp] DeserializeIdentity -> DEBU 41cd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.844 UTC [msp] DeserializeIdentity -> DEBU 41ce Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.850 UTC [gossip.gossip] handleMessage -> DEBU 41cf Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.850 UTC [gossip.gossip] handleMessage -> DEBU 41d0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.852 UTC [gossip.comm] func1 -> DEBU 41d1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.853 UTC [msp.identity] Verify -> DEBU 41d2 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:40:48.853 UTC [msp.identity] Verify -> DEBU 41d3 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:40:48.855 UTC [gossip.gossip] handleMessage -> DEBU 41d4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.855 UTC [gossip.gossip] handleMessage -> DEBU 41d5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.856 UTC [msp.identity] Verify -> DEBU 41d6 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:40:48.856 UTC [msp.identity] Verify -> DEBU 41d7 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:40:48.857 UTC [msp] DeserializeIdentity -> DEBU 41d8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.857 UTC [gossip.gossip] handleMessage -> DEBU 41d9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.859 UTC [gossip.comm] func1 -> DEBU 41da Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.861 UTC [gossip.gossip] handleMessage -> DEBU 41db Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.861 UTC [msp.identity] Verify -> DEBU 41dc Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:40:48.861 UTC [msp.identity] Verify -> DEBU 41dd Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:40:48.862 UTC [msp] DeserializeIdentity -> DEBU 41de Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:48.862 UTC [gossip.gossip] handleMessage -> DEBU 41df Exiting" -peer0.org1.example.com | "2019-07-20 02:40:48.899 UTC [gossip.gossip] handleMessage -> DEBU 41e0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.900 UTC [gossip.pull] HandleMessage -> DEBU 41e1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:48.901 UTC [gossip.pull] SendDigest -> DEBU 41e2 Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:48.901 UTC [gossip.gossip] handleMessage -> DEBU 41e3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:49.008 UTC [gossip.comm] func1 -> DEBU 41e4 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:49.009 UTC [gossip.gossip] handleMessage -> DEBU 41e5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:49.009 UTC [msp] DeserializeIdentity -> DEBU 41e6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.010 UTC [msp] DeserializeIdentity -> DEBU 41e7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.010 UTC [msp] DeserializeIdentity -> DEBU 41e8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.010 UTC [gossip.gossip] handleMessage -> DEBU 41e9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:49.013 UTC [gossip.comm] func1 -> DEBU 41ea Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:49.013 UTC [gossip.gossip] handleMessage -> DEBU 41eb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:49.014 UTC [msp] DeserializeIdentity -> DEBU 41ec Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.014 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:49.014 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ee Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ef Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [cauthdsl] func1 -> DEBU 41f3 0xc00421c6e0 gate 1563590449015768400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [cauthdsl] func2 -> DEBU 41f4 0xc00421c6e0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f5 0xc00421c6e0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f6 0xc00421c6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f7 0xc00421c6e0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.016 UTC [cauthdsl] func1 -> DEBU 41f8 0xc00421c6e0 gate 1563590449015768400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.016 UTC [policies] Evaluate -> DEBU 41f9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [policies] Evaluate -> DEBU 41fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [policies] Evaluate -> DEBU 41fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [cauthdsl] func1 -> DEBU 41fc 0xc00421cf20 gate 1563590449017318300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41fd 0xc00421cf20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41fe 0xc00421cf20 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41ff 0xc00421cf20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 4200 0xc00421cf20 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [cauthdsl] func1 -> DEBU 4201 0xc00421cf20 gate 1563590449017318300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4202 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4203 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4204 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [cauthdsl] func1 -> DEBU 4205 0xc00421d760 gate 1563590449018686100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [cauthdsl] func2 -> DEBU 4206 0xc00421d760 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:49.019 UTC [cauthdsl] func2 -> DEBU 4207 0xc00421d760 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:49.019 UTC [cauthdsl] func2 -> DEBU 4208 0xc00421d760 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:49.019 UTC [msp.identity] Verify -> DEBU 4209 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:40:49.019 UTC [msp.identity] Verify -> DEBU 420a Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:40:49.020 UTC [cauthdsl] func2 -> DEBU 420b 0xc00421d760 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:49.020 UTC [cauthdsl] func1 -> DEBU 420c 0xc00421d760 gate 1563590449018686100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:49.020 UTC [policies] Evaluate -> DEBU 420d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.020 UTC [policies] Evaluate -> DEBU 420e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.021 UTC [policies] Evaluate -> DEBU 420f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.021 UTC [policies] Evaluate -> DEBU 4210 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.021 UTC [msp] DeserializeIdentity -> DEBU 4211 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.021 UTC [gossip.gossip] handleMessage -> DEBU 4212 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:49.022 UTC [gossip.comm] func1 -> DEBU 4213 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:49.022 UTC [gossip.gossip] handleMessage -> DEBU 4214 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:49.022 UTC [msp] DeserializeIdentity -> DEBU 4215 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4216 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4217 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4218 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 4219 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 421a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 421b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [cauthdsl] func1 -> DEBU 421c 0xc00422d230 gate 1563590449023690300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421d 0xc00422d230 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421e 0xc00422d230 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421f 0xc00422d230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4220 0xc00422d230 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func1 -> DEBU 4221 0xc00422d230 gate 1563590449023690300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4222 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4223 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4224 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func1 -> DEBU 4225 0xc00422da70 gate 1563590449024695200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4226 0xc00422da70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4227 0xc00422da70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4228 0xc00422da70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4229 0xc00422da70 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func1 -> DEBU 422a 0xc00422da70 gate 1563590449024695200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func1 -> DEBU 422e 0xc0042442b0 gate 1563590449025626500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 422f 0xc0042442b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4230 0xc0042442b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4231 0xc0042442b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:49.026 UTC [msp.identity] Verify -> DEBU 4232 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:40:49.026 UTC [msp.identity] Verify -> DEBU 4233 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [cauthdsl] func2 -> DEBU 4234 0xc0042442b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [cauthdsl] func1 -> DEBU 4235 0xc0042442b0 gate 1563590449025626500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4236 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4237 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4238 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4239 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [msp] DeserializeIdentity -> DEBU 423a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [gossip.gossip] handleMessage -> DEBU 423b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:49.146 UTC [gossip.comm] func1 -> DEBU 423c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:49.147 UTC [gossip.gossip] handleMessage -> DEBU 423d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:49.147 UTC [msp] DeserializeIdentity -> DEBU 423e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.148 UTC [msp] DeserializeIdentity -> DEBU 423f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.148 UTC [msp] DeserializeIdentity -> DEBU 4240 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.148 UTC [gossip.gossip] handleMessage -> DEBU 4241 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:49.159 UTC [gossip.comm] func1 -> DEBU 4242 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:49.159 UTC [gossip.gossip] handleMessage -> DEBU 4243 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:49.160 UTC [msp] DeserializeIdentity -> DEBU 4244 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4245 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4246 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4247 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 4248 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 4249 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 424a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.162 UTC [cauthdsl] func1 -> DEBU 424b 0xc004245d80 gate 1563590449162855900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424c 0xc004245d80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424d 0xc004245d80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424e 0xc004245d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:49.164 UTC [cauthdsl] func2 -> DEBU 424f 0xc004245d80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.164 UTC [cauthdsl] func1 -> DEBU 4250 0xc004245d80 gate 1563590449162855900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4251 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4252 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4253 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.165 UTC [cauthdsl] func1 -> DEBU 4254 0xc00426a5c0 gate 1563590449165223100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:49.165 UTC [cauthdsl] func2 -> DEBU 4255 0xc00426a5c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4256 0xc00426a5c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4257 0xc00426a5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4258 0xc00426a5c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.166 UTC [cauthdsl] func1 -> DEBU 4259 0xc00426a5c0 gate 1563590449165223100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:49.168 UTC [cauthdsl] func1 -> DEBU 425d 0xc00426ae00 gate 1563590449168326000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:49.168 UTC [cauthdsl] func2 -> DEBU 425e 0xc00426ae00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:49.168 UTC [cauthdsl] func2 -> DEBU 425f 0xc00426ae00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:49.169 UTC [cauthdsl] func2 -> DEBU 4260 0xc00426ae00 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:49.169 UTC [msp.identity] Verify -> DEBU 4261 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:40:49.169 UTC [msp.identity] Verify -> DEBU 4262 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:40:49.170 UTC [cauthdsl] func2 -> DEBU 4263 0xc00426ae00 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:49.170 UTC [cauthdsl] func1 -> DEBU 4264 0xc00426ae00 gate 1563590449168326000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:49.170 UTC [policies] Evaluate -> DEBU 4265 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4266 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4267 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4268 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:49.172 UTC [msp] DeserializeIdentity -> DEBU 4269 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:49.172 UTC [gossip.gossip] handleMessage -> DEBU 426a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:51.933 UTC [gossip.comm] func1 -> DEBU 426b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.933 UTC [gossip.gossip] handleMessage -> DEBU 426c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.933 UTC [gossip.gossip] handleMessage -> DEBU 426d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:51.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU 426e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 426f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [msp] DeserializeIdentity -> DEBU 4270 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4271 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4272 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4273 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4274 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4275 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4276 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [cauthdsl] func1 -> DEBU 4277 0xc0042881f0 gate 1563590451934376800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [cauthdsl] func2 -> DEBU 4278 0xc0042881f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [cauthdsl] func2 -> DEBU 4279 0xc0042881f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:51.938 UTC [cauthdsl] func2 -> DEBU 427a 0xc0042881f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:51.938 UTC [cauthdsl] func2 -> DEBU 427b 0xc0042881f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 427c 0xc0042881f0 gate 1563590451934376800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 4280 0xc004288a30 gate 1563590451939377300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4281 0xc004288a30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4282 0xc004288a30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4283 0xc004288a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4284 0xc004288a30 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 4285 0xc004288a30 gate 1563590451939377300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 4286 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 4287 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [policies] Evaluate -> DEBU 4288 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func1 -> DEBU 4289 0xc004289270 gate 1563590451940033300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428a 0xc004289270 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428b 0xc004289270 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428c 0xc004289270 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [msp.identity] Verify -> DEBU 428d Verify: digest = 00000000 fe b5 10 6f 4b 6c 86 45 a2 e0 2d f2 5e ee 45 a8 |...oKl.E..-.^.E.| -peer0.org1.example.com | 00000010 c3 67 ab 53 5c a7 f3 35 ea 66 82 2a c9 1a b1 e5 |.g.S\..5.f.*....|" -peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [msp.identity] Verify -> DEBU 428e Verify: sig = 00000000 30 44 02 20 49 3a 0d e2 dd 57 ea c9 f8 6c bb 8b |0D. I:...W...l..| -peer0.org1.example.com | 00000010 b0 df f7 01 71 8e b4 67 e0 85 ba cc 62 62 0c 00 |....q..g....bb..| -peer0.org1.example.com | 00000020 bf 58 f7 72 02 20 10 4b 5b d0 1d 18 dd 6e 7f 09 |.X.r. .K[....n..| -peer0.org1.example.com | 00000030 a8 5a 2d a2 67 fa a0 ce a3 55 74 79 9f 76 b9 86 |.Z-.g....Uty.v..| -peer0.org1.example.com | 00000040 0d f5 5a 69 c7 57 |..Zi.W|" -peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428f 0xc004289270 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func1 -> DEBU 4290 0xc004289270 gate 1563590451940033300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [policies] Evaluate -> DEBU 4291 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4292 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4293 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4294 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 4295 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4296 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4297 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4298 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4299 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 429a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 429b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] sendMemResponse -> DEBU 429c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [gossip.comm] Send -> DEBU 42a0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [gossip.discovery] sendMemResponse -> DEBU 42a1 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" > alive:\212l9m\360\257\237\214" > alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [gossip.comm] sendToEndpoint -> DEBU 42a2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [gossip.comm] sendToEndpoint -> DEBU 42a3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:51.951 UTC [gossip.comm] func1 -> DEBU 42a5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.951 UTC [gossip.gossip] handleMessage -> DEBU 42a6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [gossip.pull] HandleMessage -> DEBU 42a7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42a8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42a9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42aa Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ab Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ac Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ad Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [gossip.pull] SendDigest -> DEBU 42ae Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [gossip.gossip] handleMessage -> DEBU 42af Exiting" -peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [gossip.election] waitForInterrupt -> DEBU 42b0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [gossip.election] IsLeader -> DEBU 42b1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [msp] GetDefaultSigningIdentity -> DEBU 42b2 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [msp.identity] Sign -> DEBU 42b3 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100F1801 " -peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [msp.identity] Sign -> DEBU 42b4 Sign: digest: 856682469DC7D1E9347963F414AE0038209189ADEBB806E700FC601EF802B0D4 " -peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [gossip.election] waitForInterrupt -> DEBU 42b5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42b9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [gossip.comm] Send -> DEBU 42ba Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42bb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42bc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [gossip.comm] sendToEndpoint -> DEBU 42bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [gossip.comm] sendToEndpoint -> DEBU 42be Exiting" -peer0.org1.example.com | "2019-07-20 02:40:51.992 UTC [gossip.gossip] handleMessage -> DEBU 42bf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.992 UTC [gossip.gossip] handleMessage -> DEBU 42c0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:51.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42c1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.992 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 42c2 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:51.992 UTC [msp] DeserializeIdentity -> DEBU 42c3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c5 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c6 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [cauthdsl] func1 -> DEBU 42ca 0xc0042c8620 gate 1563590451993384600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cb 0xc0042c8620 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cc 0xc0042c8620 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cd 0xc0042c8620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42ce 0xc0042c8620 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [cauthdsl] func1 -> DEBU 42cf 0xc0042c8620 gate 1563590451993384600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [cauthdsl] func1 -> DEBU 42d3 0xc0042c8e60 gate 1563590451995584800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [cauthdsl] func2 -> DEBU 42d4 0xc0042c8e60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [cauthdsl] func2 -> DEBU 42d5 0xc0042c8e60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42d6 0xc0042c8e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42d7 0xc0042c8e60 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [cauthdsl] func1 -> DEBU 42d8 0xc0042c8e60 gate 1563590451995584800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42d9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [cauthdsl] func1 -> DEBU 42dc 0xc0042c96a0 gate 1563590451996956400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42dd 0xc0042c96a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42de 0xc0042c96a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42df 0xc0042c96a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [msp.identity] Verify -> DEBU 42e0 Verify: digest = 00000000 07 65 f8 b1 46 c6 71 bc 91 63 50 c6 61 e6 b3 0b |.e..F.q..cP.a...| -peer0.org1.example.com | 00000010 a3 db 09 f6 ea e5 83 3f 51 8b 3e fc 4c 29 55 92 |.......?Q.>.L)U.|" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [msp.identity] Verify -> DEBU 42e1 Verify: sig = 00000000 30 45 02 21 00 d4 75 c4 4b 1d b3 ed 99 a8 76 08 |0E.!..u.K.....v.| -peer0.org1.example.com | 00000010 1a 73 87 c0 4c f3 1d d3 80 c8 f5 bd 83 b8 96 64 |.s..L..........d| -peer0.org1.example.com | 00000020 b0 85 bf 62 5c 02 20 64 c7 e6 be ea c5 6b ca bf |...b\. d.....k..| -peer0.org1.example.com | 00000030 bc f6 48 a6 f1 ce a6 12 ff 4f 6b 90 22 f4 d5 2b |..H......Ok."..+| -peer0.org1.example.com | 00000040 f8 91 6e 2e f1 09 c8 |..n....|" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42e2 0xc0042c96a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [cauthdsl] func1 -> DEBU 42e3 0xc0042c96a0 gate 1563590451996956400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [gossip.discovery] handleAliveMessage -> DEBU 42e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42e9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ea updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:51.998 UTC [gossip.comm] func1 -> DEBU 42eb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.998 UTC [gossip.gossip] handleMessage -> DEBU 42ec Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.999 UTC [gossip.comm] func1 -> DEBU 42ed Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ee Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:52.000 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ef Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:52.000 UTC [gossip.discovery] learnExistingMembers -> DEBU 42f0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.000 UTC [gossip.discovery] handleAliveMessage -> DEBU 42f1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.gossip] handleMessage -> DEBU 42f4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.gossip] handleMessage -> DEBU 42f5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.002 UTC [gossip.gossip] handleMessage -> DEBU 42f8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.002 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.009 UTC [msp] DeserializeIdentity -> DEBU 42fa Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 42fe Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 42ff Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 4300 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.012 UTC [gossip.comm] Send -> DEBU 4301 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.012 UTC [msp] DeserializeIdentity -> DEBU 4302 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.012 UTC [gossip.comm] sendToEndpoint -> DEBU 4303 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.012 UTC [gossip.comm] sendToEndpoint -> DEBU 4304 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.012 UTC [msp] DeserializeIdentity -> DEBU 4305 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.013 UTC [gossip.comm] Send -> DEBU 4306 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.014 UTC [gossip.comm] sendToEndpoint -> DEBU 4307 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.014 UTC [gossip.comm] sendToEndpoint -> DEBU 4308 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.237 UTC [gossip.pull] Hello -> DEBU 4309 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.pull] Hello -> DEBU 430b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.pull] Hello -> DEBU 430d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.comm] sendToEndpoint -> DEBU 430f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4310 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4311 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4312 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4313 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4314 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.246 UTC [gossip.gossip] handleMessage -> DEBU 4315 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.246 UTC [gossip.pull] HandleMessage -> DEBU 4316 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.246 UTC [gossip.gossip] handleMessage -> DEBU 4317 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.246 UTC [gossip.comm] func1 -> DEBU 4318 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.249 UTC [gossip.gossip] handleMessage -> DEBU 4319 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.249 UTC [gossip.pull] HandleMessage -> DEBU 431a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.249 UTC [gossip.gossip] handleMessage -> DEBU 431b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.251 UTC [gossip.comm] func1 -> DEBU 431c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.251 UTC [gossip.gossip] handleMessage -> DEBU 431d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.251 UTC [gossip.pull] HandleMessage -> DEBU 431e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.251 UTC [gossip.gossip] handleMessage -> DEBU 431f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 4320 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:52.280 UTC [msp.identity] Sign -> DEBU 4321 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151032 " -peer0.org1.example.com | "2019-07-20 02:40:52.280 UTC [msp.identity] Sign -> DEBU 4322 Sign: digest: 9C399936F2F49BE9EE217CAB54B263EC9A942EB44DBB2EC94B19A5389E400421 " -peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [msp] GetDefaultSigningIdentity -> DEBU 4323 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [msp.identity] Sign -> DEBU 4324 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [msp.identity] Sign -> DEBU 4325 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 4326 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [msp] DeserializeIdentity -> DEBU 4327 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 4328 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [msp] DeserializeIdentity -> DEBU 4329 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 432a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [gossip.comm] sendToEndpoint -> DEBU 432b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [gossip.comm] sendToEndpoint -> DEBU 432c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 4330 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.284 UTC [gossip.comm] func1 -> DEBU 4331 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4332 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4333 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4334 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4335 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4336 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:52.286 UTC [gossip.comm] func1 -> DEBU 4337 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [msp.identity] Verify -> DEBU 4338 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| -peer0.org1.example.com | 00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" -peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [msp.identity] Verify -> DEBU 4339 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| -peer0.org1.example.com | 00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| -peer0.org1.example.com | 00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| -peer0.org1.example.com | 00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| -peer0.org1.example.com | 00000040 ca ca 4e 05 58 db b7 |..N.X..|" -peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 433a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [gossip.discovery] isSentByMe -> DEBU 433b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 433c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 433d Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [msp] DeserializeIdentity -> DEBU 433e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 433f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4340 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4341 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4342 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4343 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4344 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func1 -> DEBU 4345 0xc00432a3d0 gate 1563590452288537200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4346 0xc00432a3d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4347 0xc00432a3d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4348 0xc00432a3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4349 0xc00432a3d0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func1 -> DEBU 434a 0xc00432a3d0 gate 1563590452288537200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 434b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 434c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 434d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func1 -> DEBU 434e 0xc00432ac10 gate 1563590452289139200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 434f 0xc00432ac10 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4350 0xc00432ac10 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4351 0xc00432ac10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4352 0xc00432ac10 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func1 -> DEBU 4353 0xc00432ac10 gate 1563590452289139200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4354 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4355 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4356 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.290 UTC [cauthdsl] func1 -> DEBU 4357 0xc00432b450 gate 1563590452290015700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 4358 0xc00432b450 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 4359 0xc00432b450 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 435a 0xc00432b450 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [msp.identity] Verify -> DEBU 435b Verify: digest = 00000000 c8 4a ac 4f 71 b3 e4 bd 69 2d bb e2 b3 7b 75 dc |.J.Oq...i-...{u.| -peer0.org1.example.com | 00000010 48 0d 1e cf 11 6d 74 d5 b2 c3 cb b7 9b a1 47 43 |H....mt.......GC|" -peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [msp.identity] Verify -> DEBU 435c Verify: sig = 00000000 30 45 02 21 00 b8 46 89 61 0a 7f 6e 80 cd cd 78 |0E.!..F.a..n...x| -peer0.org1.example.com | 00000010 c4 0f 6b 13 9a 5f 51 fc 0f 48 3b 47 47 6a 34 ea |..k.._Q..H;GGj4.| -peer0.org1.example.com | 00000020 c9 87 9f 2b 44 02 20 07 f5 8d a1 90 91 28 70 9a |...+D. ......(p.| -peer0.org1.example.com | 00000030 c7 d4 e1 19 a0 0f 1a f1 78 05 1e 8a 3a 1c 3e 8a |........x...:.>.| -peer0.org1.example.com | 00000040 6c 39 6d f0 af 9f 8c |l9m....|" -peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 435d Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 435e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151033 " -peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 435f Sign: digest: 56A37E8BD80FA015C713558FB7A1BEA1925B1592315D72A856BE5481C7611A3C " -peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 4360 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 4361 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 4362 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4363 Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [cauthdsl] func2 -> DEBU 4364 0xc00432b450 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [cauthdsl] func1 -> DEBU 4365 0xc00432b450 gate 1563590452290015700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4366 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4367 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 4368 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 4369 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 436a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [msp] DeserializeIdentity -> DEBU 436d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 436f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4370 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4371 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4372 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4373 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4374 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4375 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.303 UTC [policies] Evaluate -> DEBU 4376 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 4377 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 4378 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.307 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4379 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:52.308 UTC [msp.identity] Verify -> DEBU 437a Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| -peer0.org1.example.com | 00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" -peer0.org1.example.com | "2019-07-20 02:40:52.308 UTC [msp.identity] Verify -> DEBU 437b Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| -peer0.org1.example.com | 00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| -peer0.org1.example.com | 00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| -peer0.org1.example.com | 00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| -peer0.org1.example.com | 00000040 78 fb 75 ea c1 36 cc |x.u..6.|" -peer0.org1.example.com | "2019-07-20 02:40:52.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 437c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 437d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.308 UTC [gossip.discovery] handleMsgFromComm -> DEBU 437e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU 437f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4380 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [gossip.gossip] handleMessage -> DEBU 4381 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [gossip.gossip] handleMessage -> DEBU 4382 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [msp.identity] Verify -> DEBU 4383 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| -peer0.org1.example.com | 00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" -peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [msp.identity] Verify -> DEBU 4384 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| -peer0.org1.example.com | 00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| -peer0.org1.example.com | 00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| -peer0.org1.example.com | 00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| -peer0.org1.example.com | 00000040 ca ca 4e 05 58 db b7 |..N.X..|" -peer0.org1.example.com | "2019-07-20 02:40:52.310 UTC [msp.identity] Verify -> DEBU 4385 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:52.310 UTC [msp.identity] Verify -> DEBU 4386 Verify: sig = 00000000 30 45 02 21 00 ac e9 d3 31 c4 59 f7 8f ee 15 fd |0E.!....1.Y.....| -peer0.org1.example.com | 00000010 b8 35 b1 54 7e ca e3 c1 6f b0 7c f1 ca 95 16 93 |.5.T~...o.|.....| -peer0.org1.example.com | 00000020 0d 42 7c 4b b6 02 20 5a 8c 15 17 d8 aa 34 2b 40 |.B|K.. Z.....4+@| -peer0.org1.example.com | 00000030 bf 17 cc fb 27 00 a9 b8 a7 2c c2 90 68 f0 48 93 |....'....,..h.H.| -peer0.org1.example.com | 00000040 6f fc 6c b0 0f fb 9e |o.l....|" -peer0.org1.example.com | "2019-07-20 02:40:52.310 UTC [gossip.discovery] handleAliveMessage -> DEBU 4387 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.310 UTC [gossip.discovery] isSentByMe -> DEBU 4388 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 4389 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.311 UTC [gossip.discovery] handleMsgFromComm -> DEBU 438a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 438b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 438c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:52.312 UTC [msp.identity] Verify -> DEBU 438d Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| -peer0.org1.example.com | 00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" -peer0.org1.example.com | "2019-07-20 02:40:52.313 UTC [msp.identity] Verify -> DEBU 438e Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| -peer0.org1.example.com | 00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| -peer0.org1.example.com | 00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| -peer0.org1.example.com | 00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| -peer0.org1.example.com | 00000040 78 fb 75 ea c1 36 cc |x.u..6.|" -peer0.org1.example.com | "2019-07-20 02:40:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU 438f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.314 UTC [gossip.gossip] handleMessage -> DEBU 4390 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU 4391 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.320 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4392 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:52.321 UTC [msp.identity] Verify -> DEBU 4393 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| -peer0.org1.example.com | 00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" -peer0.org1.example.com | "2019-07-20 02:40:52.321 UTC [msp.identity] Verify -> DEBU 4394 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| -peer0.org1.example.com | 00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| -peer0.org1.example.com | 00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| -peer0.org1.example.com | 00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| -peer0.org1.example.com | 00000040 ca ca 4e 05 58 db b7 |..N.X..|" -peer0.org1.example.com | "2019-07-20 02:40:52.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 4395 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.323 UTC [gossip.discovery] isSentByMe -> DEBU 4396 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 4397 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.324 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4398 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.340 UTC [gossip.gossip] handleMessage -> DEBU 4399 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.pull] HandleMessage -> DEBU 439a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.pull] SendDigest -> DEBU 439b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 439f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43a0 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [msp.identity] Verify -> DEBU 43a1 Verify: digest = 00000000 93 a9 43 89 ee 0d 68 00 49 2b fd 2d 56 38 2f d9 |..C...h.I+.-V8/.| -peer0.org1.example.com | 00000010 60 a6 e5 51 a4 21 d6 e7 3d 91 2b 47 dd 19 5f b9 |`..Q.!..=.+G.._.|" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [msp.identity] Verify -> DEBU 43a2 Verify: sig = 00000000 30 45 02 21 00 d8 78 12 32 3a 72 01 c6 8e c3 5b |0E.!..x.2:r....[| -peer0.org1.example.com | 00000010 49 22 72 f1 b7 94 1f 40 54 b7 4d 71 54 dd eb c3 |I"r....@T.MqT...| -peer0.org1.example.com | 00000020 83 16 b9 03 67 02 20 45 12 b8 8f 7f e7 b1 3b 32 |....g. E......;2| -peer0.org1.example.com | 00000030 d2 3e fd cb 57 4a 00 2d de d8 c1 a0 c0 eb 52 12 |.>..WJ.-......R.| -peer0.org1.example.com | 00000040 c3 b9 f7 69 80 1a c3 |...i...|" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 43a3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 43a9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43aa Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.comm] func1 -> DEBU 43ab Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.gossip] handleMessage -> DEBU 43ac Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.gossip] handleMessage -> DEBU 43ad Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43ae Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43af Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.comm] func1 -> DEBU 43b0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.350 UTC [gossip.gossip] handleMessage -> DEBU 43b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.350 UTC [gossip.gossip] handleMessage -> DEBU 43b2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.350 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43b3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.350 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43b4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.350 UTC [msp] DeserializeIdentity -> DEBU 43b5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] Send -> DEBU 43b8 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] Send -> DEBU 43ba Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43be Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [gossip.gossip] handleMessage -> DEBU 43bf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [gossip.gossip] handleMessage -> DEBU 43c0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43c1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > > , Envelope: 272 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43c2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c3 Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| -peer0.org1.example.com | 00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" -peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c4 Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| -peer0.org1.example.com | 00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| -peer0.org1.example.com | 00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| -peer0.org1.example.com | 00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| -peer0.org1.example.com | 00000040 86 01 4f b2 60 e9 82 |..O.`..|" -peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:52.366 UTC [msp.identity] Verify -> DEBU 43c6 Verify: sig = 00000000 30 45 02 21 00 fc 90 ff 73 60 f4 91 6a f6 d9 05 |0E.!....s`..j...| -peer0.org1.example.com | 00000010 be ba 76 e7 61 fe 1c 20 09 c2 f2 59 7e 3f 03 fc |..v.a.. ...Y~?..| -peer0.org1.example.com | 00000020 3f 34 b3 11 5c 02 20 70 8d ab 3f a6 3f 02 0f d4 |?4..\. p..?.?...| -peer0.org1.example.com | 00000030 f2 e8 6e 66 09 5b 59 5e 0a d8 84 09 03 5f 30 41 |..nf.[Y^....._0A| -peer0.org1.example.com | 00000040 cd d0 97 4d 87 3e 7b |...M.>{|" -peer0.org1.example.com | "2019-07-20 02:40:52.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 43c7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43c8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43c9 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43ca Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43cb Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43cc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 43cd Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43ce Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] sendMemResponse -> DEBU 43cf Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [msp] DeserializeIdentity -> DEBU 43d0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [msp] DeserializeIdentity -> DEBU 43d1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.comm] Send -> DEBU 43d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.368 UTC [gossip.discovery] sendMemResponse -> DEBU 43d3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > alive: " -peer0.org1.example.com | "2019-07-20 02:40:52.368 UTC [gossip.comm] sendToEndpoint -> DEBU 43d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.368 UTC [gossip.comm] sendToEndpoint -> DEBU 43d5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.531 UTC [gossip.comm] func1 -> DEBU 43d6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.531 UTC [gossip.gossip] handleMessage -> DEBU 43d7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.531 UTC [gossip.gossip] handleMessage -> DEBU 43d8 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43d9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43da Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [msp] DeserializeIdentity -> DEBU 43db Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43dd Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43de Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43e2 0xc0043ca7a0 gate 1563590452532372000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e3 0xc0043ca7a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e4 0xc0043ca7a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e5 0xc0043ca7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e6 0xc0043ca7a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43e7 0xc0043ca7a0 gate 1563590452532372000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43eb 0xc0043cafe0 gate 1563590452532767400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ec 0xc0043cafe0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ed 0xc0043cafe0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ee 0xc0043cafe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ef 0xc0043cafe0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43f0 0xc0043cafe0 gate 1563590452532767400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func1 -> DEBU 43f4 0xc0043cb820 gate 1563590452533072400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f5 0xc0043cb820 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f6 0xc0043cb820 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f7 0xc0043cb820 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [msp.identity] Verify -> DEBU 43f8 Verify: digest = 00000000 51 64 1f 03 f0 44 db ad 52 2d e9 8b 79 01 5f fe |Qd...D..R-..y._.| -peer0.org1.example.com | 00000010 2e 1a 82 e8 77 5d 22 1d 38 4e 11 32 9b 23 38 50 |....w]".8N.2.#8P|" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [msp.identity] Verify -> DEBU 43f9 Verify: sig = 00000000 30 45 02 21 00 f8 2b 92 2d c8 e1 19 63 85 e4 03 |0E.!..+.-...c...| -peer0.org1.example.com | 00000010 5d c3 86 3d 87 46 73 64 82 8d 98 40 32 96 93 e0 |]..=.Fsd...@2...| -peer0.org1.example.com | 00000020 86 5e 77 4a 3e 02 20 0f ab df 7f 75 cf 31 34 a3 |.^wJ>. ....u.14.| -peer0.org1.example.com | 00000030 7e 0a d3 af d1 87 2e d8 cf cb b4 45 ef 91 da 84 |~..........E....| -peer0.org1.example.com | 00000040 b8 69 c9 aa 31 63 c4 |.i..1c.|" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43fa 0xc0043cb820 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func1 -> DEBU 43fb 0xc0043cb820 gate 1563590452533072400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fe Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 4400 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4401 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4402 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4403 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4404 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4405 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 4406 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4407 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.535 UTC [gossip.gossip] handleMessage -> DEBU 4408 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.535 UTC [gossip.gossip] handleMessage -> DEBU 4409 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 440a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 440b Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4410 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4411 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4412 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] Send -> DEBU 4413 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4414 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] Send -> DEBU 4415 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4416 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4417 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4418 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4419 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.541 UTC [gossip.comm] func1 -> DEBU 441a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.542 UTC [gossip.gossip] handleMessage -> DEBU 441b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.542 UTC [gossip.gossip] handleMessage -> DEBU 441c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 441d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 441e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.585 UTC [gossip.comm] func1 -> DEBU 441f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.585 UTC [gossip.gossip] handleMessage -> DEBU 4420 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.585 UTC [gossip.gossip] handleMessage -> DEBU 4421 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.585 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4422 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4423 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [msp] DeserializeIdentity -> DEBU 4424 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4425 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4426 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4427 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 4428 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 4429 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 442a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [cauthdsl] func1 -> DEBU 442b 0xc0043e5df0 gate 1563590452586824100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [cauthdsl] func2 -> DEBU 442c 0xc0043e5df0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [cauthdsl] func2 -> DEBU 442d 0xc0043e5df0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 442e 0xc0043e5df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 442f 0xc0043e5df0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4430 0xc0043e5df0 gate 1563590452586824100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4431 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4432 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4433 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4434 0xc004400630 gate 1563590452587606200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4435 0xc004400630 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4436 0xc004400630 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4437 0xc004400630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4438 0xc004400630 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4439 0xc004400630 gate 1563590452587606200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [cauthdsl] func1 -> DEBU 443d 0xc004400e70 gate 1563590452588208500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 443e 0xc004400e70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 443f 0xc004400e70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 4440 0xc004400e70 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [msp.identity] Verify -> DEBU 4441 Verify: digest = 00000000 9a 1e bd 6e 4d 65 01 2b 0c 69 d4 f8 79 8e 47 2d |...nMe.+.i..y.G-| -peer0.org1.example.com | 00000010 67 a0 bb 40 a7 4d 60 c7 d5 35 13 31 3e 16 da af |g..@.M`..5.1>...|" -peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [msp.identity] Verify -> DEBU 4442 Verify: sig = 00000000 30 45 02 21 00 d5 bd 52 0f c0 50 6b 79 25 a6 97 |0E.!...R..Pky%..| -peer0.org1.example.com | 00000010 f1 c1 c0 f4 2f b3 3f bb 20 13 bd 5f b3 af da 64 |..../.?. .._...d| -peer0.org1.example.com | 00000020 eb 1f 26 29 a8 02 20 22 eb 33 0a 47 da 64 fd 25 |..&).. ".3.G.d.%| -peer0.org1.example.com | 00000030 10 45 23 aa 2b 5d 25 46 be 86 f8 f9 4b 2b 50 01 |.E#.+]%F....K+P.| -peer0.org1.example.com | 00000040 c2 21 d5 57 32 f2 73 |.!.W2.s|" -peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [cauthdsl] func2 -> DEBU 4443 0xc004400e70 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [cauthdsl] func1 -> DEBU 4444 0xc004400e70 gate 1563590452588208500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4445 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4446 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4447 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4448 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4449 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444b updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444c Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 444f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4450 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.591 UTC [gossip.discovery] sendMemResponse -> DEBU 4451 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:52.591 UTC [msp] DeserializeIdentity -> DEBU 4452 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.592 UTC [msp] DeserializeIdentity -> DEBU 4453 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.592 UTC [msp] DeserializeIdentity -> DEBU 4454 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.592 UTC [gossip.comm] Send -> DEBU 4455 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.593 UTC [gossip.discovery] sendMemResponse -> DEBU 4456 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:52.593 UTC [gossip.comm] sendToEndpoint -> DEBU 4457 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.593 UTC [gossip.comm] sendToEndpoint -> DEBU 4458 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [gossip.comm] func1 -> DEBU 4459 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [gossip.gossip] handleMessage -> DEBU 445a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [gossip.pull] HandleMessage -> DEBU 445b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 4460 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 4461 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [gossip.pull] SendDigest -> DEBU 4462 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [gossip.gossip] handleMessage -> DEBU 4463 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.682 UTC [msp] DeserializeIdentity -> DEBU 4464 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.683 UTC [msp] DeserializeIdentity -> DEBU 4465 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.683 UTC [gossip.comm] Send -> DEBU 4466 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4467 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4468 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4469 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.684 UTC [gossip.comm] sendToEndpoint -> DEBU 446a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.685 UTC [gossip.comm] sendToEndpoint -> DEBU 446b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.685 UTC [gossip.comm] func1 -> DEBU 446c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.685 UTC [gossip.gossip] handleMessage -> DEBU 446d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 446e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 446f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 4470 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4471 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4472 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4473 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4474 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4475 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:52.685 UTC [gossip.comm] sendToEndpoint -> DEBU 4476 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [gossip.comm] func1 -> DEBU 4477 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4478 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func1 -> DEBU 4479 0xc00442b6a0 gate 1563590452693436200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447a 0xc00442b6a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447b 0xc00442b6a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447c 0xc00442b6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447d 0xc00442b6a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func1 -> DEBU 447e 0xc00442b6a0 gate 1563590452693436200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 447f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 4480 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 4481 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.694 UTC [cauthdsl] func1 -> DEBU 4482 0xc00442bee0 gate 1563590452694203000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.694 UTC [cauthdsl] func2 -> DEBU 4483 0xc00442bee0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4484 0xc00442bee0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4485 0xc00442bee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4486 0xc00442bee0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [cauthdsl] func1 -> DEBU 4487 0xc00442bee0 gate 1563590452694203000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 4488 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 4489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 448a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [cauthdsl] func1 -> DEBU 448b 0xc004448720 gate 1563590452696747100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [cauthdsl] func2 -> DEBU 448c 0xc004448720 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [cauthdsl] func2 -> DEBU 448d 0xc004448720 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [cauthdsl] func2 -> DEBU 448e 0xc004448720 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [msp.identity] Verify -> DEBU 448f Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [msp.identity] Verify -> DEBU 4490 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [cauthdsl] func2 -> DEBU 4491 0xc004448720 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [cauthdsl] func1 -> DEBU 4492 0xc004448720 gate 1563590452696747100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [policies] Evaluate -> DEBU 4493 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4494 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4495 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.698 UTC [msp.identity] Verify -> DEBU 4497 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -peer0.org1.example.com | "2019-07-20 02:40:52.698 UTC [msp.identity] Verify -> DEBU 4498 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" -peer0.org1.example.com | "2019-07-20 02:40:52.699 UTC [msp.identity] Verify -> DEBU 4499 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:40:52.699 UTC [msp.identity] Verify -> DEBU 449a Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:40:52.699 UTC [msp] DeserializeIdentity -> DEBU 449b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.699 UTC [msp] DeserializeIdentity -> DEBU 449c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 449d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 449e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 449f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [cauthdsl] func1 -> DEBU 44a3 0xc00445cd30 gate 1563590452700818900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a4 0xc00445cd30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a5 0xc00445cd30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a6 0xc00445cd30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a7 0xc00445cd30 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.701 UTC [cauthdsl] func1 -> DEBU 44a8 0xc00445cd30 gate 1563590452700818900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44a9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [cauthdsl] func1 -> DEBU 44ac 0xc00445d570 gate 1563590452702591600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44ad 0xc00445d570 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44ae 0xc00445d570 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44af 0xc00445d570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [cauthdsl] func2 -> DEBU 44b0 0xc00445d570 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [cauthdsl] func1 -> DEBU 44b1 0xc00445d570 gate 1563590452702591600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [cauthdsl] func1 -> DEBU 44b5 0xc00445ddb0 gate 1563590452703782000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b6 0xc00445ddb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b7 0xc00445ddb0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b8 0xc00445ddb0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.704 UTC [msp.identity] Verify -> DEBU 44b9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:40:52.704 UTC [msp.identity] Verify -> DEBU 44ba Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [cauthdsl] func2 -> DEBU 44bb 0xc00445ddb0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [cauthdsl] func1 -> DEBU 44bc 0xc00445ddb0 gate 1563590452703782000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44bf Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [gossip.gossip] handleMessage -> DEBU 44c1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [gossip.gossip] handleMessage -> DEBU 44c2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c7 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c8 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.707 UTC [policies] Evaluate -> DEBU 44c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [policies] Evaluate -> DEBU 44ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [policies] Evaluate -> DEBU 44cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func1 -> DEBU 44cc 0xc0044738c0 gate 1563590452708236700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44cd 0xc0044738c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44ce 0xc0044738c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44cf 0xc0044738c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44d0 0xc0044738c0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func1 -> DEBU 44d1 0xc0044738c0 gate 1563590452708236700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func1 -> DEBU 44d5 0xc004486100 gate 1563590452709247200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d6 0xc004486100 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d7 0xc004486100 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d8 0xc004486100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d9 0xc004486100 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func1 -> DEBU 44da 0xc004486100 gate 1563590452709247200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44db Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [policies] Evaluate -> DEBU 44dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [policies] Evaluate -> DEBU 44dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [cauthdsl] func1 -> DEBU 44de 0xc004486940 gate 1563590452710265500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44df 0xc004486940 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44e0 0xc004486940 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44e1 0xc004486940 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.711 UTC [msp.identity] Verify -> DEBU 44e2 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:40:52.712 UTC [msp.identity] Verify -> DEBU 44e3 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:40:52.712 UTC [cauthdsl] func2 -> DEBU 44e4 0xc004486940 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.713 UTC [cauthdsl] func1 -> DEBU 44e5 0xc004486940 gate 1563590452710265500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e8 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.714 UTC [msp.identity] Verify -> DEBU 44ea Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -peer0.org1.example.com | "2019-07-20 02:40:52.714 UTC [msp.identity] Verify -> DEBU 44eb Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" -peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [msp.identity] Verify -> DEBU 44ec Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [msp.identity] Verify -> DEBU 44ed Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [msp] DeserializeIdentity -> DEBU 44ee Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [msp] DeserializeIdentity -> DEBU 44ef Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44f0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44f1 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44f2 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [cauthdsl] func1 -> DEBU 44f6 0xc004496f50 gate 1563590452716433600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f7 0xc004496f50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f8 0xc004496f50 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f9 0xc004496f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 44fa 0xc004496f50 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 44fb 0xc004496f50 gate 1563590452716433600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fc Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 44ff 0xc004497790 gate 1563590452717497000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4500 0xc004497790 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4501 0xc004497790 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4502 0xc004497790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4503 0xc004497790 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 4504 0xc004497790 gate 1563590452717497000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4505 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4506 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [cauthdsl] func1 -> DEBU 4508 0xc004497fd0 gate 1563590452718293100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 4509 0xc004497fd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 450a 0xc004497fd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 450b 0xc004497fd0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [msp.identity] Verify -> DEBU 450c Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [msp.identity] Verify -> DEBU 450d Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [cauthdsl] func2 -> DEBU 450e 0xc004497fd0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [cauthdsl] func1 -> DEBU 450f 0xc004497fd0 gate 1563590452718293100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4510 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4511 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4512 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4513 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [gossip.gossip] handleMessage -> DEBU 4514 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [gossip.gossip] handleMessage -> DEBU 4515 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4516 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4517 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4518 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -peer0.org1.example.com | "2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4519 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" -peer0.org1.example.com | "2019-07-20 02:40:52.721 UTC [msp] DeserializeIdentity -> DEBU 451a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.721 UTC [msp] DeserializeIdentity -> DEBU 451b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 451c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 451d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 451e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 451f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 4520 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 4521 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [cauthdsl] func1 -> DEBU 4522 0xc0044c2820 gate 1563590452722251500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [cauthdsl] func2 -> DEBU 4523 0xc0044c2820 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [cauthdsl] func2 -> DEBU 4524 0xc0044c2820 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 4525 0xc0044c2820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 4526 0xc0044c2820 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [cauthdsl] func1 -> DEBU 4527 0xc0044c2820 gate 1563590452722251500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 4528 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 4529 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 452a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [cauthdsl] func1 -> DEBU 452b 0xc0044c3060 gate 1563590452723773300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 452c 0xc0044c3060 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452d 0xc0044c3060 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452e 0xc0044c3060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452f 0xc0044c3060 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.724 UTC [cauthdsl] func1 -> DEBU 4530 0xc0044c3060 gate 1563590452723773300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.724 UTC [policies] Evaluate -> DEBU 4531 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [policies] Evaluate -> DEBU 4532 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [policies] Evaluate -> DEBU 4533 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [cauthdsl] func1 -> DEBU 4534 0xc0044c38a0 gate 1563590452725580700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4535 0xc0044c38a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4536 0xc0044c38a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4537 0xc0044c38a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.726 UTC [msp.identity] Verify -> DEBU 4538 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:40:52.726 UTC [msp.identity] Verify -> DEBU 4539 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [cauthdsl] func2 -> DEBU 453a 0xc0044c38a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [cauthdsl] func1 -> DEBU 453b 0xc0044c38a0 gate 1563590452725580700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453e Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [msp] DeserializeIdentity -> DEBU 4540 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.728 UTC [msp] DeserializeIdentity -> DEBU 4541 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4542 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4543 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4544 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4545 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4546 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4547 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [cauthdsl] func1 -> DEBU 4548 0xc0044d5070 gate 1563590452729448900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [cauthdsl] func2 -> DEBU 4549 0xc0044d5070 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [cauthdsl] func2 -> DEBU 454a 0xc0044d5070 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 454b 0xc0044d5070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 454c 0xc0044d5070 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func1 -> DEBU 454d 0xc0044d5070 gate 1563590452729448900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 454e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 454f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 4550 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func1 -> DEBU 4551 0xc0044d58b0 gate 1563590452730738200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 4552 0xc0044d58b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 4553 0xc0044d58b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 4554 0xc0044d58b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 4555 0xc0044d58b0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func1 -> DEBU 4556 0xc0044d58b0 gate 1563590452730738200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4557 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4558 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4559 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func1 -> DEBU 455a 0xc0044ee0f0 gate 1563590452731709400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 455b 0xc0044ee0f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 455c 0xc0044ee0f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:52.732 UTC [cauthdsl] func2 -> DEBU 455d 0xc0044ee0f0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.732 UTC [msp.identity] Verify -> DEBU 455e Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [msp.identity] Verify -> DEBU 455f Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [cauthdsl] func2 -> DEBU 4560 0xc0044ee0f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [cauthdsl] func1 -> DEBU 4561 0xc0044ee0f0 gate 1563590452731709400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4562 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4563 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4564 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4565 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:52.734 UTC [gossip.gossip] handleMessage -> DEBU 4566 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.758 UTC [msp] DeserializeIdentity -> DEBU 4567 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.758 UTC [msp] DeserializeIdentity -> DEBU 4568 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.758 UTC [gossip.pull] Hello -> DEBU 4569 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:52.759 UTC [msp] DeserializeIdentity -> DEBU 456a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.759 UTC [msp] DeserializeIdentity -> DEBU 456b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.759 UTC [gossip.comm] Send -> DEBU 456c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU 456d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU 456e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.760 UTC [gossip.gossip] handleMessage -> DEBU 456f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.760 UTC [gossip.pull] HandleMessage -> DEBU 4570 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.760 UTC [gossip.gossip] handleMessage -> DEBU 4571 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.843 UTC [gossip.gossip] handleMessage -> DEBU 4572 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.844 UTC [msp] DeserializeIdentity -> DEBU 4573 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.845 UTC [msp] DeserializeIdentity -> DEBU 4574 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:52.845 UTC [gossip.gossip] handleMessage -> DEBU 4575 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:52.900 UTC [gossip.gossip] handleMessage -> DEBU 4576 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.901 UTC [gossip.pull] HandleMessage -> DEBU 4577 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:52.901 UTC [gossip.pull] SendDigest -> DEBU 4578 Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:52.901 UTC [gossip.gossip] handleMessage -> DEBU 4579 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:53.012 UTC [gossip.comm] func1 -> DEBU 457a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:53.013 UTC [gossip.gossip] handleMessage -> DEBU 457b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:53.014 UTC [msp] DeserializeIdentity -> DEBU 457c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:53.014 UTC [msp] DeserializeIdentity -> DEBU 457d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:53.015 UTC [msp] DeserializeIdentity -> DEBU 457e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:53.015 UTC [gossip.gossip] handleMessage -> DEBU 457f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:53.148 UTC [gossip.comm] func1 -> DEBU 4580 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:53.148 UTC [gossip.gossip] handleMessage -> DEBU 4581 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:53.148 UTC [msp] DeserializeIdentity -> DEBU 4582 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:53.151 UTC [msp] DeserializeIdentity -> DEBU 4583 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:53.152 UTC [msp] DeserializeIdentity -> DEBU 4584 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:53.152 UTC [gossip.gossip] handleMessage -> DEBU 4585 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:55.938 UTC [gossip.comm] func1 -> DEBU 4586 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:55.939 UTC [gossip.gossip] handleMessage -> DEBU 4587 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:55.939 UTC [gossip.gossip] handleMessage -> DEBU 4588 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4589 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 458a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [msp] DeserializeIdentity -> DEBU 458b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 458c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458d Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458e Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 458f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4590 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4591 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 4592 0xc004507d60 gate 1563590455940519200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4593 0xc004507d60 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4594 0xc004507d60 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4595 0xc004507d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4596 0xc004507d60 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 4597 0xc004507d60 gate 1563590455940519200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4598 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4599 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 459a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 459b 0xc0045225a0 gate 1563590455940934400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 459c 0xc0045225a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 459d 0xc0045225a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 459e 0xc0045225a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 459f 0xc0045225a0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func1 -> DEBU 45a0 0xc0045225a0 gate 1563590455940934400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func1 -> DEBU 45a4 0xc004522de0 gate 1563590455941246400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 45a5 0xc004522de0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 45a6 0xc004522de0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [cauthdsl] func2 -> DEBU 45a7 0xc004522de0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [msp.identity] Verify -> DEBU 45a8 Verify: digest = 00000000 c5 3f e7 ed 5d ed 6b e6 c4 00 af 76 54 a4 0a bb |.?..].k....vT...| -peer0.org1.example.com | 00000010 0a d6 d0 46 33 68 dd 86 70 ea 9c b2 9f 47 91 8e |...F3h..p....G..|" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [msp.identity] Verify -> DEBU 45a9 Verify: sig = 00000000 30 44 02 20 1f 2c ce 2e 2c 51 39 50 93 9d 7d 62 |0D. .,..,Q9P..}b| -peer0.org1.example.com | 00000010 24 00 9f bc 38 2d 8d 77 fd 62 36 7b db 0f 42 4d |$...8-.w.b6{..BM| -peer0.org1.example.com | 00000020 2d 3a 7c c6 02 20 28 3a 69 09 76 b3 4d d9 24 2b |-:|.. (:i.v.M.$+| -peer0.org1.example.com | 00000030 ce 3b 98 e5 98 83 99 79 8e 0e ae 37 b5 6c 88 07 |.;.....y...7.l..| -peer0.org1.example.com | 00000040 94 ae 7c fe f6 e1 |..|...|" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [cauthdsl] func2 -> DEBU 45aa 0xc004522de0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [cauthdsl] func1 -> DEBU 45ab 0xc004522de0 gate 1563590455941246400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ae Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b2 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b3 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.discovery] sendMemResponse -> DEBU 45b8 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45b9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45ba Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45bb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.comm] Send -> DEBU 45bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.comm] sendToEndpoint -> DEBU 45bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.comm] sendToEndpoint -> DEBU 45be Exiting" -peer0.org1.example.com | "2019-07-20 02:40:55.951 UTC [gossip.discovery] sendMemResponse -> DEBU 45bf Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" > alive: alive: alive: " -peer0.org1.example.com | "2019-07-20 02:40:55.956 UTC [gossip.comm] func1 -> DEBU 45c0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:55.956 UTC [gossip.gossip] handleMessage -> DEBU 45c1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:55.956 UTC [gossip.pull] HandleMessage -> DEBU 45c2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [gossip.pull] SendDigest -> DEBU 45c9 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [gossip.gossip] handleMessage -> DEBU 45ca Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cb Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45cc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cd Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45ce Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cf Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45d0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.244 UTC [gossip.comm] func1 -> DEBU 45d7 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.244 UTC [gossip.gossip] handleMessage -> DEBU 45d8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.244 UTC [gossip.pull] HandleMessage -> DEBU 45d9 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.244 UTC [gossip.gossip] handleMessage -> DEBU 45da Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.245 UTC [gossip.comm] func1 -> DEBU 45db Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.245 UTC [gossip.gossip] handleMessage -> DEBU 45dc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.245 UTC [gossip.pull] HandleMessage -> DEBU 45dd GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.245 UTC [gossip.gossip] handleMessage -> DEBU 45de Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.246 UTC [gossip.gossip] handleMessage -> DEBU 45df Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.246 UTC [gossip.pull] HandleMessage -> DEBU 45e0 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.246 UTC [gossip.gossip] handleMessage -> DEBU 45e1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 45e2 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e3 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151034 " -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e4 Sign: digest: B72C93CD94D2623F267EB63F6E6CA421F900643012C818FE189705252CFDEF4B " -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 45e5 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45e8 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp] DeserializeIdentity -> DEBU 45e9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45ea Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp] DeserializeIdentity -> DEBU 45eb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45ec Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ed Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ef Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45f0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 45f1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 45f2 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f3 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45f6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.comm] func1 -> DEBU 45f7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [gossip.comm] func1 -> DEBU 45f9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fa Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| -peer0.org1.example.com | 00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" -peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fb Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| -peer0.org1.example.com | 00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| -peer0.org1.example.com | 00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| -peer0.org1.example.com | 00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| -peer0.org1.example.com | 00000040 c9 d4 ba fc 26 f5 21 |....&.!|" -peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fd Verify: sig = 00000000 30 44 02 20 5c 6a c8 38 0b 2a 2d ca 3c df 1a 6e |0D. \j.8.*-.<..n| -peer0.org1.example.com | 00000010 b0 94 b2 07 cd 05 94 39 12 2c d3 e9 7d 61 6e 59 |.......9.,..}anY| -peer0.org1.example.com | 00000020 29 d8 a4 18 02 20 21 f4 05 d6 78 ec d3 77 33 89 |).... !...x..w3.| -peer0.org1.example.com | 00000030 2f db cb 10 5c 45 02 7a 54 8b a2 e1 5d 1d 4a 91 |/...\E.zT...].J.| -peer0.org1.example.com | 00000040 83 99 84 4f f2 07 |...O..|" -peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 45fe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [gossip.discovery] isSentByMe -> DEBU 45ff Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 4600 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4601 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4602 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.gossip] handleMessage -> DEBU 4603 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.gossip] handleMessage -> DEBU 4604 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4605 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [msp.identity] Verify -> DEBU 4606 Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| -peer0.org1.example.com | 00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [msp.identity] Verify -> DEBU 4607 Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| -peer0.org1.example.com | 00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| -peer0.org1.example.com | 00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| -peer0.org1.example.com | 00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| -peer0.org1.example.com | 00000040 c9 d4 ba fc 26 f5 21 |....&.!|" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 4608 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.discovery] isSentByMe -> DEBU 4609 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 460a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 460b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [msp] DeserializeIdentity -> DEBU 460c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 460d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 460e Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 460f Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [policies] Evaluate -> DEBU 4610 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4611 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4612 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4613 0xc004590b20 gate 1563590456287229700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4614 0xc004590b20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4615 0xc004590b20 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4616 0xc004590b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4617 0xc004590b20 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4618 0xc004590b20 gate 1563590456287229700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4619 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 461a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 461b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 461c 0xc004591360 gate 1563590456287552100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461d 0xc004591360 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461e 0xc004591360 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461f 0xc004591360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4620 0xc004591360 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4621 0xc004591360 gate 1563590456287552100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4622 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4623 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4624 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4625 0xc004591ba0 gate 1563590456287800000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4626 0xc004591ba0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4627 0xc004591ba0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4628 0xc004591ba0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [msp.identity] Verify -> DEBU 4629 Verify: digest = 00000000 9a 1e bd 6e 4d 65 01 2b 0c 69 d4 f8 79 8e 47 2d |...nMe.+.i..y.G-| -peer0.org1.example.com | 00000010 67 a0 bb 40 a7 4d 60 c7 d5 35 13 31 3e 16 da af |g..@.M`..5.1>...|" -peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [msp.identity] Verify -> DEBU 462a Verify: sig = 00000000 30 45 02 21 00 d5 bd 52 0f c0 50 6b 79 25 a6 97 |0E.!...R..Pky%..| -peer0.org1.example.com | 00000010 f1 c1 c0 f4 2f b3 3f bb 20 13 bd 5f b3 af da 64 |..../.?. .._...d| -peer0.org1.example.com | 00000020 eb 1f 26 29 a8 02 20 22 eb 33 0a 47 da 64 fd 25 |..&).. ".3.G.d.%| -peer0.org1.example.com | 00000030 10 45 23 aa 2b 5d 25 46 be 86 f8 f9 4b 2b 50 01 |.E#.+]%F....K+P.| -peer0.org1.example.com | 00000040 c2 21 d5 57 32 f2 73 |.!.W2.s|" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [cauthdsl] func2 -> DEBU 462b 0xc004591ba0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [cauthdsl] func1 -> DEBU 462c 0xc004591ba0 gate 1563590456287800000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 4630 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4631 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4632 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4633 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 4634 Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| -peer0.org1.example.com | 00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 4635 Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| -peer0.org1.example.com | 00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| -peer0.org1.example.com | 00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| -peer0.org1.example.com | 00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| -peer0.org1.example.com | 00000040 86 01 4f b2 60 e9 82 |..O.`..|" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4636 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4637 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4638 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4639 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.gossip] handleMessage -> DEBU 463a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 463b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 463c Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| -peer0.org1.example.com | 00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" -peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 463d Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| -peer0.org1.example.com | 00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| -peer0.org1.example.com | 00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| -peer0.org1.example.com | 00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| -peer0.org1.example.com | 00000040 86 01 4f b2 60 e9 82 |..O.`..|" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 463e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 463f Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4640 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [msp.identity] Verify -> DEBU 4641 Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| -peer0.org1.example.com | 00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [msp.identity] Verify -> DEBU 4642 Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| -peer0.org1.example.com | 00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| -peer0.org1.example.com | 00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| -peer0.org1.example.com | 00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| -peer0.org1.example.com | 00000040 c9 d4 ba fc 26 f5 21 |....&.!|" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 4643 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.discovery] isSentByMe -> DEBU 4644 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 4645 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4646 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [msp] DeserializeIdentity -> DEBU 4647 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4648 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4649 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 464a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 464e 0xc0045c1640 gate 1563590456289653200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 464f 0xc0045c1640 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4650 0xc0045c1640 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4651 0xc0045c1640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4652 0xc0045c1640 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 4653 0xc0045c1640 gate 1563590456289653200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4654 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4656 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 4657 0xc0045c1e80 gate 1563590456289889200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4658 0xc0045c1e80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4659 0xc0045c1e80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 465a 0xc0045c1e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 465b 0xc0045c1e80 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 465c 0xc0045c1e80 gate 1563590456289889200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 4660 0xc0045d46c0 gate 1563590456290124200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4661 0xc0045d46c0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4662 0xc0045d46c0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4663 0xc0045d46c0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [msp.identity] Verify -> DEBU 4664 Verify: digest = 00000000 c5 3f e7 ed 5d ed 6b e6 c4 00 af 76 54 a4 0a bb |.?..].k....vT...| -peer0.org1.example.com | 00000010 0a d6 d0 46 33 68 dd 86 70 ea 9c b2 9f 47 91 8e |...F3h..p....G..|" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [msp.identity] Verify -> DEBU 4665 Verify: sig = 00000000 30 44 02 20 1f 2c ce 2e 2c 51 39 50 93 9d 7d 62 |0D. .,..,Q9P..}b| -peer0.org1.example.com | 00000010 24 00 9f bc 38 2d 8d 77 fd 62 36 7b db 0f 42 4d |$...8-.w.b6{..BM| -peer0.org1.example.com | 00000020 2d 3a 7c c6 02 20 28 3a 69 09 76 b3 4d d9 24 2b |-:|.. (:i.v.M.$+| -peer0.org1.example.com | 00000030 ce 3b 98 e5 98 83 99 79 8e 0e ae 37 b5 6c 88 07 |.;.....y...7.l..| -peer0.org1.example.com | 00000040 94 ae 7c fe f6 e1 |..|...|" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4666 0xc0045d46c0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 4667 0xc0045d46c0 gate 1563590456290124200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 4668 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 4669 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 466a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 466b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 466c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 466d Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 466e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.345 UTC [gossip.gossip] handleMessage -> DEBU 466f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.345 UTC [gossip.pull] HandleMessage -> DEBU 4670 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.346 UTC [gossip.pull] SendDigest -> DEBU 4671 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:56.346 UTC [gossip.gossip] handleMessage -> DEBU 4672 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.gossip] handleMessage -> DEBU 4673 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.gossip] handleMessage -> DEBU 4674 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4675 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4676 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4677 Verify: digest = 00000000 fa ab 73 5c f5 93 a1 b9 90 e2 8f 60 be 96 af ac |..s\.......`....| -peer0.org1.example.com | 00000010 0d 2e 82 19 75 db 5f 9a 3a 3f ba 59 fb 42 f7 78 |....u._.:?.Y.B.x|" -peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4678 Verify: sig = 00000000 30 45 02 21 00 ff 22 db 53 30 ca 08 2d 4b 6e bc |0E.!..".S0..-Kn.| -peer0.org1.example.com | 00000010 cb e8 e4 ed f2 a2 7e 51 f5 f2 33 63 30 39 09 9b |......~Q..3c09..| -peer0.org1.example.com | 00000020 93 47 20 9f 79 02 20 60 f1 a2 2b f8 d8 d2 5c d7 |.G .y. `..+...\.| -peer0.org1.example.com | 00000030 d5 d5 e1 34 23 fd 9b 89 ea 22 f6 60 17 b7 ce 85 |...4#....".`....| -peer0.org1.example.com | 00000040 78 ba 3e 8b aa b9 d9 |x.>....|" -peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4679 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 467a Verify: sig = 00000000 30 44 02 20 05 cf 79 80 3d 45 b3 f7 3d 3b 60 b3 |0D. ..y.=E..=;`.| -peer0.org1.example.com | 00000010 72 86 c7 75 d4 53 ad 9f 97 86 aa 64 6e 5e 0e 1c |r..u.S.....dn^..| -peer0.org1.example.com | 00000020 a9 90 49 4d 02 20 22 09 d5 04 3f d4 c0 cb b6 62 |..IM. "...?....b| -peer0.org1.example.com | 00000030 cf f5 e6 ae 38 be b6 98 b7 11 56 d2 42 e8 68 ac |....8.....V.B.h.| -peer0.org1.example.com | 00000040 3a d7 07 37 b7 c6 |:..7..|" -peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.discovery] handleAliveMessage -> DEBU 467b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.discovery] learnExistingMembers -> DEBU 467c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.discovery] learnExistingMembers -> DEBU 467d updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 467e Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 467f Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 4680 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] handleAliveMessage -> DEBU 4681 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4682 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] sendMemResponse -> DEBU 4683 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [msp] DeserializeIdentity -> DEBU 4684 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [msp] DeserializeIdentity -> DEBU 4685 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.comm] Send -> DEBU 4686 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] sendMemResponse -> DEBU 4687 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > alive: " -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.comm] sendToEndpoint -> DEBU 4688 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.comm] sendToEndpoint -> DEBU 4689 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.584 UTC [gossip.comm] func1 -> DEBU 468a Got message: GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [gossip.gossip] handleMessage -> DEBU 468b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [gossip.gossip] handleMessage -> DEBU 468c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [gossip.discovery] handleMsgFromComm -> DEBU 468d Got message: GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 468e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [msp] DeserializeIdentity -> DEBU 468f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4690 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4691 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4692 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4693 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4694 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4695 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func1 -> DEBU 4696 0xc00460a820 gate 1563590456585620000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4697 0xc00460a820 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4698 0xc00460a820 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4699 0xc00460a820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 469a 0xc00460a820 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func1 -> DEBU 469b 0xc00460a820 gate 1563590456585620000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func1 -> DEBU 469f 0xc00460b060 gate 1563590456586257100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a0 0xc00460b060 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a1 0xc00460b060 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a2 0xc00460b060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a3 0xc00460b060 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func1 -> DEBU 46a4 0xc00460b060 gate 1563590456586257100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 46a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 46a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.587 UTC [policies] Evaluate -> DEBU 46a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.587 UTC [cauthdsl] func1 -> DEBU 46a8 0xc00460b8a0 gate 1563590456587959800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46a9 0xc00460b8a0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46aa 0xc00460b8a0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46ab 0xc00460b8a0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.590 UTC [msp.identity] Verify -> DEBU 46ac Verify: digest = 00000000 1d ed 21 e4 a5 0c 7e 85 37 55 19 44 7f 43 9b 42 |..!...~.7U.D.C.B| -peer0.org1.example.com | 00000010 a3 96 63 da 16 62 19 0e 1c 46 2f 31 f2 3a 5a 12 |..c..b...F/1.:Z.|" -peer0.org1.example.com | "2019-07-20 02:40:56.590 UTC [msp.identity] Verify -> DEBU 46ad Verify: sig = 00000000 30 44 02 20 4d 93 9d d4 48 e7 d0 dc ac 30 00 94 |0D. M...H....0..| -peer0.org1.example.com | 00000010 97 3e ac 27 2a 5e a5 d6 36 4b f1 ef cf 66 ad df |.>.'*^..6K...f..| -peer0.org1.example.com | 00000020 a5 36 c3 47 02 20 76 dd 44 92 0c 6c a8 3b 8a d8 |.6.G. v.D..l.;..| -peer0.org1.example.com | 00000030 83 a0 dd 52 97 2f cd 8b ab 36 c9 1f 2b e8 45 15 |...R./...6..+.E.| -peer0.org1.example.com | 00000040 bd e8 1f 15 3d e7 |....=.|" -peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [cauthdsl] func2 -> DEBU 46ae 0xc00460b8a0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [cauthdsl] func1 -> DEBU 46af 0xc00460b8a0 gate 1563590456587959800 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [gossip.discovery] handleAliveMessage -> DEBU 46b4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b6 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b7 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.594 UTC [gossip.discovery] handleAliveMessage -> DEBU 46ba Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [gossip.discovery] sendMemResponse -> DEBU 46bc Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46bd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46be Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46bf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [gossip.comm] Send -> DEBU 46c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [gossip.discovery] sendMemResponse -> DEBU 46c1 Exiting, replying with alive:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" > alive: " -peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [gossip.comm] sendToEndpoint -> DEBU 46c2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [gossip.comm] sendToEndpoint -> DEBU 46c3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [gossip.comm] func1 -> DEBU 46c4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [gossip.gossip] handleMessage -> DEBU 46c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [gossip.pull] HandleMessage -> DEBU 46c6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c7 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46ca Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.599 UTC [msp] DeserializeIdentity -> DEBU 46cb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.599 UTC [msp] DeserializeIdentity -> DEBU 46cc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.599 UTC [gossip.pull] SendDigest -> DEBU 46cd Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:40:56.599 UTC [gossip.gossip] handleMessage -> DEBU 46ce Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46bb Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.682 UTC [msp] DeserializeIdentity -> DEBU 46cf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.682 UTC [msp] DeserializeIdentity -> DEBU 46d0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.682 UTC [gossip.comm] Send -> DEBU 46d1 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:40:56.682 UTC [gossip.comm] sendToEndpoint -> DEBU 46d2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.682 UTC [gossip.comm] sendToEndpoint -> DEBU 46d3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.685 UTC [gossip.comm] func1 -> DEBU 46d8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [gossip.gossip] handleMessage -> DEBU 46d9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46da Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46db Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46dc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46de Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46df Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [cauthdsl] func1 -> DEBU 46e3 0xc00461bbc0 gate 1563590456686774400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [cauthdsl] func2 -> DEBU 46e4 0xc00461bbc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e5 0xc00461bbc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e6 0xc00461bbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e7 0xc00461bbc0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46e8 0xc00461bbc0 gate 1563590456686774400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46e9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46ec 0xc00464a400 gate 1563590456687367200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ed 0xc00464a400 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ee 0xc00464a400 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ef 0xc00464a400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46f0 0xc00464a400 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46f1 0xc00464a400 gate 1563590456687367200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.688 UTC [cauthdsl] func1 -> DEBU 46f5 0xc00464ac40 gate 1563590456687994900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f6 0xc00464ac40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f7 0xc00464ac40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f8 0xc00464ac40 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.696 UTC [msp.identity] Verify -> DEBU 46f9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:40:56.696 UTC [msp.identity] Verify -> DEBU 46fa Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:40:56.696 UTC [cauthdsl] func2 -> DEBU 46fb 0xc00464ac40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.696 UTC [cauthdsl] func1 -> DEBU 46fc 0xc00464ac40 gate 1563590456687994900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:56.696 UTC [policies] Evaluate -> DEBU 46fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 46fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 46ff Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 4700 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.697 UTC [msp.identity] Verify -> DEBU 4701 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -peer0.org1.example.com | "2019-07-20 02:40:56.697 UTC [msp.identity] Verify -> DEBU 4702 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" -peer0.org1.example.com | "2019-07-20 02:40:56.698 UTC [msp.identity] Verify -> DEBU 4703 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:40:56.698 UTC [msp.identity] Verify -> DEBU 4704 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:40:56.699 UTC [msp] DeserializeIdentity -> DEBU 4705 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.699 UTC [gossip.comm] func1 -> DEBU 4706 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.699 UTC [msp] DeserializeIdentity -> DEBU 4707 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4708 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4709 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 470a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.700 UTC [policies] Evaluate -> DEBU 470b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 470c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 470d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func1 -> DEBU 470e 0xc004661250 gate 1563590456701197200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 470f 0xc004661250 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4710 0xc004661250 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4711 0xc004661250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4712 0xc004661250 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func1 -> DEBU 4713 0xc004661250 gate 1563590456701197200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4714 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4715 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4716 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4717 0xc004661a90 gate 1563590456702044300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4718 0xc004661a90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4719 0xc004661a90 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 471a 0xc004661a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 471b 0xc004661a90 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 471c 0xc004661a90 gate 1563590456702044300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4720 0xc0046782d0 gate 1563590456702330000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4721 0xc0046782d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4722 0xc0046782d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4723 0xc0046782d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 4724 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 4725 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4726 0xc0046782d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4727 0xc0046782d0 gate 1563590456702330000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 4728 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 4729 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 472a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 472b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [gossip.gossip] handleMessage -> DEBU 472c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [gossip.gossip] handleMessage -> DEBU 472d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 472e Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 472f Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 4730 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 4731 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [msp] DeserializeIdentity -> DEBU 4732 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [msp] DeserializeIdentity -> DEBU 4733 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4734 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4735 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4736 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4737 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4738 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4739 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 473a 0xc00468cb20 gate 1563590456703708200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473b 0xc00468cb20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473c 0xc00468cb20 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473d 0xc00468cb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473e 0xc00468cb20 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 473f 0xc00468cb20 gate 1563590456703708200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4740 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4741 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4742 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 4743 0xc00468d360 gate 1563590456703960000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 4744 0xc00468d360 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4745 0xc00468d360 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4746 0xc00468d360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4747 0xc00468d360 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4748 0xc00468d360 gate 1563590456703960000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4749 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 474a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 474b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 474c 0xc00468dba0 gate 1563590456704206600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474d 0xc00468dba0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474e 0xc00468dba0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474f 0xc00468dba0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [msp.identity] Verify -> DEBU 4750 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [msp.identity] Verify -> DEBU 4751 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4752 0xc00468dba0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4753 0xc00468dba0 gate 1563590456704206600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4754 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4755 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4756 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4757 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [msp] DeserializeIdentity -> DEBU 4758 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [msp] DeserializeIdentity -> DEBU 4759 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 475a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 475b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 475c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4760 0xc0046a1370 gate 1563590456704980700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4761 0xc0046a1370 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4762 0xc0046a1370 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4763 0xc0046a1370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4764 0xc0046a1370 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4765 0xc0046a1370 gate 1563590456704980700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4766 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4767 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4768 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4769 0xc0046a1bb0 gate 1563590456705230500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476a 0xc0046a1bb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476b 0xc0046a1bb0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476c 0xc0046a1bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476d 0xc0046a1bb0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 476e 0xc0046a1bb0 gate 1563590456705230500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 476f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4770 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4771 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4772 0xc0046ae3f0 gate 1563590456705481100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4773 0xc0046ae3f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4774 0xc0046ae3f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4775 0xc0046ae3f0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [msp.identity] Verify -> DEBU 4776 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [msp.identity] Verify -> DEBU 4777 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [cauthdsl] func2 -> DEBU 4778 0xc0046ae3f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [cauthdsl] func1 -> DEBU 4779 0xc0046ae3f0 gate 1563590456705481100 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [gossip.gossip] handleMessage -> DEBU 477e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [gossip.gossip] handleMessage -> DEBU 477f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4780 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4781 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4782 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4783 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4784 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4785 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4786 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4787 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4788 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func1 -> DEBU 4789 0xc0046aff00 gate 1563590456710676900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478a 0xc0046aff00 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478b 0xc0046aff00 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478c 0xc0046aff00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478d 0xc0046aff00 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func1 -> DEBU 478e 0xc0046aff00 gate 1563590456710676900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 478f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4790 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4791 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 4792 0xc0046ce740 gate 1563590456711223700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4793 0xc0046ce740 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4794 0xc0046ce740 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4795 0xc0046ce740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4796 0xc0046ce740 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 4797 0xc0046ce740 gate 1563590456711223700 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4798 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4799 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 479a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 479b 0xc0046cef80 gate 1563590456711529900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479c 0xc0046cef80 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479d 0xc0046cef80 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479e 0xc0046cef80 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [msp.identity] Verify -> DEBU 479f Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [msp.identity] Verify -> DEBU 47a0 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:40:56.713 UTC [cauthdsl] func2 -> DEBU 47a1 0xc0046cef80 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.713 UTC [cauthdsl] func1 -> DEBU 47a2 0xc0046cef80 gate 1563590456711529900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:56.715 UTC [policies] Evaluate -> DEBU 47a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.715 UTC [policies] Evaluate -> DEBU 47a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.723 UTC [policies] Evaluate -> DEBU 47a5 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.723 UTC [policies] Evaluate -> DEBU 47a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.726 UTC [msp.identity] Verify -> DEBU 47a7 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -peer0.org1.example.com | "2019-07-20 02:40:56.727 UTC [msp.identity] Verify -> DEBU 47a8 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" -peer0.org1.example.com | "2019-07-20 02:40:56.730 UTC [msp.identity] Verify -> DEBU 47a9 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:40:56.730 UTC [msp.identity] Verify -> DEBU 47aa Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:40:56.730 UTC [msp] DeserializeIdentity -> DEBU 47ab Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.730 UTC [msp] DeserializeIdentity -> DEBU 47ac Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47ad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47ae Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47af Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47b3 0xc0046df590 gate 1563590456731249300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b4 0xc0046df590 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b5 0xc0046df590 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b6 0xc0046df590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b7 0xc0046df590 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47b8 0xc0046df590 gate 1563590456731249300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47bc 0xc0046dfdd0 gate 1563590456731619200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47bd 0xc0046dfdd0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47be 0xc0046dfdd0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47bf 0xc0046dfdd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47c0 0xc0046dfdd0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47c1 0xc0046dfdd0 gate 1563590456731619200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func1 -> DEBU 47c5 0xc0046f2610 gate 1563590456732071400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c6 0xc0046f2610 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c7 0xc0046f2610 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c8 0xc0046f2610 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [msp.identity] Verify -> DEBU 47c9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [msp.identity] Verify -> DEBU 47ca Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47cb 0xc0046f2610 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func1 -> DEBU 47cc 0xc0046f2610 gate 1563590456732071400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47cf Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [gossip.gossip] handleMessage -> DEBU 47d1 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [gossip.pull] Hello -> DEBU 47d4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d5 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [gossip.comm] Send -> DEBU 47d7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [gossip.comm] sendToEndpoint -> DEBU 47d8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [gossip.comm] sendToEndpoint -> DEBU 47d9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.761 UTC [gossip.gossip] handleMessage -> DEBU 47da Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.761 UTC [gossip.pull] HandleMessage -> DEBU 47db GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.761 UTC [gossip.gossip] handleMessage -> DEBU 47dc Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.843 UTC [gossip.gossip] handleMessage -> DEBU 47dd Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.843 UTC [msp] DeserializeIdentity -> DEBU 47de Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.843 UTC [msp] DeserializeIdentity -> DEBU 47df Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.843 UTC [gossip.gossip] handleMessage -> DEBU 47e0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.904 UTC [gossip.gossip] handleMessage -> DEBU 47e1 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.904 UTC [gossip.pull] HandleMessage -> DEBU 47e2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.905 UTC [gossip.pull] SendDigest -> DEBU 47e3 Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:40:56.905 UTC [gossip.gossip] handleMessage -> DEBU 47e4 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [gossip.election] waitForInterrupt -> DEBU 47e5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [gossip.election] IsLeader -> DEBU 47e6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [msp] GetDefaultSigningIdentity -> DEBU 47e7 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [msp.identity] Sign -> DEBU 47e8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510101801 " -peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [msp.identity] Sign -> DEBU 47e9 Sign: digest: 06C4339B219403DF3CB6A5301108973FE10B0835912113BBA8296AE34A98D8D2 " -peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [gossip.election] waitForInterrupt -> DEBU 47ea c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47eb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ec Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ed Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ee Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [gossip.comm] Send -> DEBU 47ef Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47f0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47f1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [gossip.comm] sendToEndpoint -> DEBU 47f2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [gossip.comm] sendToEndpoint -> DEBU 47f3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [gossip.comm] func1 -> DEBU 47f4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [gossip.gossip] handleMessage -> DEBU 47f5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [gossip.gossip] handleMessage -> DEBU 47f6 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47f8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [msp] DeserializeIdentity -> DEBU 47f9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47fb Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47fc Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4800 0xc00472cd70 gate 1563590456991667300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4801 0xc00472cd70 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4802 0xc00472cd70 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4803 0xc00472cd70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4804 0xc00472cd70 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4805 0xc00472cd70 gate 1563590456991667300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4806 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4807 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4808 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4809 0xc00472d5b0 gate 1563590456991920000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 480a 0xc00472d5b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480b 0xc00472d5b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480c 0xc00472d5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480d 0xc00472d5b0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 480e 0xc00472d5b0 gate 1563590456991920000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 480f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 4810 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 4811 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 4812 0xc00472ddf0 gate 1563590456992222000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4813 0xc00472ddf0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4814 0xc00472ddf0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4815 0xc00472ddf0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [msp.identity] Verify -> DEBU 4816 Verify: digest = 00000000 24 c2 3a 95 db af e0 b6 1a 56 e0 d9 cb e0 f4 e9 |$.:......V......| -peer0.org1.example.com | 00000010 d8 5d bc 2a b8 63 83 cd f7 6d 37 bd 16 5a ce e6 |.].*.c...m7..Z..|" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [msp.identity] Verify -> DEBU 4817 Verify: sig = 00000000 30 45 02 21 00 9f 2c 9a 33 cd 0c 2d d4 a0 d5 3f |0E.!..,.3..-...?| -peer0.org1.example.com | 00000010 bd 17 1a e4 90 6c 53 57 eb 17 0f 56 6a 55 09 7d |.....lSW...VjU.}| -peer0.org1.example.com | 00000020 80 a3 61 17 c7 02 20 37 51 77 a5 ff 73 35 7a b2 |..a... 7Qw..s5z.| -peer0.org1.example.com | 00000030 68 c7 98 54 cd d1 2b 90 81 54 fb 85 98 87 a5 f2 |h..T..+..T......| -peer0.org1.example.com | 00000040 cd bb fa 10 81 05 77 |......w|" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4818 0xc00472ddf0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 4819 0xc00472ddf0 gate 1563590456992222000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] handleAliveMessage -> DEBU 481e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 481f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4820 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4821 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4822 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4823 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] handleAliveMessage -> DEBU 4824 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4825 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.993 UTC [gossip.comm] func1 -> DEBU 4826 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.993 UTC [gossip.gossip] handleMessage -> DEBU 4827 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.993 UTC [gossip.gossip] handleMessage -> DEBU 4828 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4829 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.996 UTC [gossip.gossip] handleMessage -> DEBU 482b Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.996 UTC [gossip.gossip] handleMessage -> DEBU 482c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.005 UTC [msp] DeserializeIdentity -> DEBU 482f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.005 UTC [msp] DeserializeIdentity -> DEBU 4830 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4831 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4832 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4833 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4834 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4835 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [gossip.comm] Send -> DEBU 4836 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4837 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [gossip.comm] Send -> DEBU 4838 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [gossip.comm] sendToEndpoint -> DEBU 4839 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [gossip.comm] sendToEndpoint -> DEBU 483a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.007 UTC [gossip.comm] sendToEndpoint -> DEBU 483b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.007 UTC [gossip.comm] sendToEndpoint -> DEBU 483c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.007 UTC [gossip.comm] func1 -> DEBU 483d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.007 UTC [gossip.gossip] handleMessage -> DEBU 483e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.007 UTC [msp] DeserializeIdentity -> DEBU 483f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.008 UTC [msp] DeserializeIdentity -> DEBU 4840 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.008 UTC [msp] DeserializeIdentity -> DEBU 4841 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.008 UTC [gossip.gossip] handleMessage -> DEBU 4842 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.148 UTC [gossip.comm] func1 -> DEBU 4843 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.148 UTC [gossip.gossip] handleMessage -> DEBU 4844 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.148 UTC [msp] DeserializeIdentity -> DEBU 4845 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.148 UTC [msp] DeserializeIdentity -> DEBU 4846 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.149 UTC [msp] DeserializeIdentity -> DEBU 4847 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.149 UTC [gossip.gossip] handleMessage -> DEBU 4848 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 4849 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:57.295 UTC [msp.identity] Sign -> DEBU 484a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151035 " -peer0.org1.example.com | "2019-07-20 02:40:57.295 UTC [msp.identity] Sign -> DEBU 484b Sign: digest: 1E2D2864C190B8E158F6625B3CCF586244BD30D9DA5BCDDC88828153AA686637 " -peer0.org1.example.com | "2019-07-20 02:40:57.296 UTC [msp] GetDefaultSigningIdentity -> DEBU 484c Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:40:57.296 UTC [msp.identity] Sign -> DEBU 484d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:40:57.296 UTC [msp.identity] Sign -> DEBU 484e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:40:57.296 UTC [gossip.discovery] periodicalSendAlive -> DEBU 484f Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4850 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4851 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4852 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.298 UTC [gossip.comm] Send -> DEBU 4853 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] Send -> DEBU 4854 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [msp] DeserializeIdentity -> DEBU 4855 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] Send -> DEBU 4856 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4857 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4858 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4859 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.340 UTC [gossip.gossip] handleMessage -> DEBU 485d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.gossip] handleMessage -> DEBU 485e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 485f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4860 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [msp.identity] Verify -> DEBU 4861 Verify: digest = 00000000 c3 88 5c 67 b0 0f 5e a2 52 b8 70 38 4f b8 a6 3f |..\g..^.R.p8O..?| -peer0.org1.example.com | 00000010 1c f1 17 3b e4 ce 70 11 db 63 69 c2 e6 f3 fd 92 |...;..p..ci.....|" -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [msp.identity] Verify -> DEBU 4862 Verify: sig = 00000000 30 44 02 20 23 3b 13 fe 9d 99 21 bc 0c 23 34 17 |0D. #;....!..#4.| -peer0.org1.example.com | 00000010 28 43 4c ac c7 86 67 da 5d 8d 0e df 86 63 45 39 |(CL...g.]....cE9| -peer0.org1.example.com | 00000020 a2 0c f1 62 02 20 14 37 bb cd c4 a6 e3 db c2 fb |...b. .7........| -peer0.org1.example.com | 00000030 83 74 aa 46 79 ea 11 39 8c 26 f0 ae 92 61 7a 50 |.t.Fy..9.&...azP| -peer0.org1.example.com | 00000040 90 9b 5c 1c e4 cf |..\...|" -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 4863 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4864 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4865 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4866 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4867 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4868 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 4869 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 486a Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] Send -> DEBU 486e Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] Send -> DEBU 4870 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4871 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4872 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4873 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4874 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.344 UTC [gossip.comm] func1 -> DEBU 4875 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.344 UTC [gossip.gossip] handleMessage -> DEBU 4876 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.344 UTC [gossip.gossip] handleMessage -> DEBU 4877 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4878 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4879 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.351 UTC [gossip.comm] func1 -> DEBU 487a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.351 UTC [gossip.gossip] handleMessage -> DEBU 487b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.351 UTC [gossip.gossip] handleMessage -> DEBU 487c Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487e Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [gossip.comm] func1 -> DEBU 487f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [gossip.gossip] handleMessage -> DEBU 4880 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [gossip.gossip] handleMessage -> DEBU 4881 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4882 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4883 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [msp] DeserializeIdentity -> DEBU 4884 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4885 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4886 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4887 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 4888 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 4889 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 488a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [cauthdsl] func1 -> DEBU 488b 0xc0047a8300 gate 1563590457531851900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488c 0xc0047a8300 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488d 0xc0047a8300 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488e 0xc0047a8300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 488f 0xc0047a8300 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4890 0xc0047a8300 gate 1563590457531851900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4891 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4892 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4893 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4894 0xc0047a8b40 gate 1563590457532213900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4895 0xc0047a8b40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4896 0xc0047a8b40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4897 0xc0047a8b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4898 0xc0047a8b40 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4899 0xc0047a8b40 gate 1563590457532213900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 489d 0xc0047a9380 gate 1563590457532574200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 489e 0xc0047a9380 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 489f 0xc0047a9380 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 48a0 0xc0047a9380 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [msp.identity] Verify -> DEBU 48a1 Verify: digest = 00000000 89 c9 04 02 9b 9c e1 a8 91 bf b0 ae 1d b1 4c a7 |..............L.| -peer0.org1.example.com | 00000010 b7 fd 2f 57 37 90 00 08 24 ef 7e 37 1d 53 21 e4 |../W7...$.~7.S!.|" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [msp.identity] Verify -> DEBU 48a2 Verify: sig = 00000000 30 45 02 21 00 86 03 13 83 09 3d 22 96 40 5c 07 |0E.!......=".@\.| -peer0.org1.example.com | 00000010 cc fd a6 78 83 0e d3 6e 4f 96 fc cb ae 90 52 9b |...x...nO.....R.| -peer0.org1.example.com | 00000020 09 c5 70 0c 88 02 20 21 f0 da 32 e3 1b 9b e1 ed |..p... !..2.....| -peer0.org1.example.com | 00000030 72 5c 8d 98 c8 4d e5 c3 2b 1f d7 c1 cc 62 e5 7c |r\...M..+....b.|| -peer0.org1.example.com | 00000040 e2 18 3a 40 39 24 2d |..:@9$-|" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 48a3 0xc0047a9380 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 48a4 0xc0047a9380 gate 1563590457532574200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 48a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a7 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48aa Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ab updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ac Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ad Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ae Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 48af Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b0 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.comm] func1 -> DEBU 48b1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b3 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b6 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b9 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48ba Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48be Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bf Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48c0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] Send -> DEBU 48c1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48c2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] Send -> DEBU 48c3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c7 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:59.496 UTC [endorser] ProcessProposal -> DEBU 48c8 Entering: request from 172.18.0.9:58510" -peer0.org1.example.com | "2019-07-20 02:40:59.496 UTC [protoutils] ValidateProposalMessage -> DEBU 48c9 ValidateProposalMessage starts for signed proposal 0xc0047f0050" -peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [protoutils] validateChannelHeader -> DEBU 48ca validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cb begin" -peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cc creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cd creator is valid" -peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [msp.identity] Verify -> DEBU 48ce Verify: digest = 00000000 1d 45 9b 93 2d f4 42 d9 52 ca e9 c8 9e 51 27 36 |.E..-.B.R....Q'6| -peer0.org1.example.com | 00000010 cd f7 d8 94 97 25 64 91 6f 72 f7 c9 d6 ae 5f 3e |.....%d.or...._>|" -peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [msp.identity] Verify -> DEBU 48cf Verify: sig = 00000000 30 44 02 20 66 25 c2 bc 03 5b ff 4f 00 30 71 1e |0D. f%...[.O.0q.| -peer0.org1.example.com | 00000010 c2 eb 94 fc 77 b4 95 bb 5c 93 ac c2 53 1f 52 56 |....w...\...S.RV| -peer0.org1.example.com | 00000020 b2 17 a1 61 02 20 7d bc 19 2d 75 66 3c 06 ba 93 |...a. }..-uf<...| -peer0.org1.example.com | 00000030 a0 cc 2e b8 39 5f 5b 16 cc 4b 12 e8 be a0 a9 26 |....9_[..K.....&| -peer0.org1.example.com | 00000040 29 90 0c e3 52 6f |)...Ro|" -peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48d0 exits successfully" -peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 48d1 validateChaincodeProposalMessage starts for proposal 0xc0033408c0, header 0xc0047f0460" -peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 48d2 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [endorser] preProcess -> DEBU 48d3 [][01686455] processing txid: 0168645584149d7d35248ee1e1fa711483c01ad64ac198ad4f760d6114fd0cf9" -peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [endorser] SimulateProposal -> DEBU 48d4 [][01686455] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [endorser] callChaincode -> INFO 48d5 [][01686455] Entry chaincode: name:"cscc" " -peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [chaincode] Execute -> DEBU 48d6 Entry" -peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [cscc] Invoke -> DEBU 48d7 Invoke function: GetChannels" -peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [msp.identity] Verify -> DEBU 48d8 Verify: digest = 00000000 1d 45 9b 93 2d f4 42 d9 52 ca e9 c8 9e 51 27 36 |.E..-.B.R....Q'6| -peer0.org1.example.com | 00000010 cd f7 d8 94 97 25 64 91 6f 72 f7 c9 d6 ae 5f 3e |.....%d.or...._>|" -peer0.org1.example.com | "2019-07-20 02:40:59.499 UTC [msp.identity] Verify -> DEBU 48d9 Verify: sig = 00000000 30 44 02 20 66 25 c2 bc 03 5b ff 4f 00 30 71 1e |0D. f%...[.O.0q.| -peer0.org1.example.com | 00000010 c2 eb 94 fc 77 b4 95 bb 5c 93 ac c2 53 1f 52 56 |....w...\...S.RV| -peer0.org1.example.com | 00000020 b2 17 a1 61 02 20 7d bc 19 2d 75 66 3c 06 ba 93 |...a. }..-uf<...| -peer0.org1.example.com | 00000030 a0 cc 2e b8 39 5f 5b 16 cc 4b 12 e8 be a0 a9 26 |....9_[..K.....&| -peer0.org1.example.com | 00000040 29 90 0c e3 52 6f |)...Ro|" -peer0.org1.example.com | "2019-07-20 02:40:59.499 UTC [chaincode] handleMessage -> DEBU 48da [01686455] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:40:59.500 UTC [chaincode] Notify -> DEBU 48db [01686455] notifying Txid:0168645584149d7d35248ee1e1fa711483c01ad64ac198ad4f760d6114fd0cf9, channelID:" -peer0.org1.example.com | "2019-07-20 02:40:59.500 UTC [chaincode] Execute -> DEBU 48dc Exit" -peer0.org1.example.com | "2019-07-20 02:40:59.500 UTC [endorser] callChaincode -> INFO 48dd [][01686455] Exit chaincode: name:"cscc" (2ms)" -peer0.org1.example.com | "2019-07-20 02:40:59.500 UTC [endorser] SimulateProposal -> DEBU 48de [][01686455] Exit" -peer0.org1.example.com | "2019-07-20 02:40:59.501 UTC [endorser] func1 -> DEBU 48df Exit: request from 172.18.0.9:58510" -peer0.org1.example.com | "2019-07-20 02:40:59.501 UTC [comm.grpc.server] 1 -> INFO 48e0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58510 grpc.code=OK grpc.call_duration=5.3749ms -peer0.org1.example.com | "2019-07-20 02:40:59.508 UTC [grpc] warningf -> DEBU 48e1 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58510: read: connection reset by peer" -peer0.org1.example.com | "2019-07-20 02:40:59.509 UTC [grpc] infof -> DEBU 48e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:40:59.944 UTC [gossip.comm] func1 -> DEBU 48e3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:59.945 UTC [gossip.gossip] handleMessage -> DEBU 48e4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:59.945 UTC [gossip.gossip] handleMessage -> DEBU 48e5 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:59.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48e6 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:59.945 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48e7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:40:59.945 UTC [msp] DeserializeIdentity -> DEBU 48e8 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:59.946 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48e9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:40:59.946 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48ea Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:59.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48eb Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:40:59.947 UTC [policies] Evaluate -> DEBU 48ec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:59.947 UTC [policies] Evaluate -> DEBU 48ed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [policies] Evaluate -> DEBU 48ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [cauthdsl] func1 -> DEBU 48ef 0xc00480cab0 gate 1563590459948105600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f0 0xc00480cab0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f1 0xc00480cab0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f2 0xc00480cab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f3 0xc00480cab0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:59.949 UTC [cauthdsl] func1 -> DEBU 48f4 0xc00480cab0 gate 1563590459948105600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:59.949 UTC [policies] Evaluate -> DEBU 48f5 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:59.949 UTC [policies] Evaluate -> DEBU 48f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:59.950 UTC [policies] Evaluate -> DEBU 48f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:59.950 UTC [cauthdsl] func1 -> DEBU 48f8 0xc00480d2f0 gate 1563590459950225200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48f9 0xc00480d2f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48fa 0xc00480d2f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48fb 0xc00480d2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:40:59.951 UTC [cauthdsl] func2 -> DEBU 48fc 0xc00480d2f0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:59.951 UTC [cauthdsl] func1 -> DEBU 48fd 0xc00480d2f0 gate 1563590459950225200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 48fe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 48ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 4900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:40:59.952 UTC [cauthdsl] func1 -> DEBU 4901 0xc00480db30 gate 1563590459952843400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:40:59.952 UTC [cauthdsl] func2 -> DEBU 4902 0xc00480db30 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:40:59.953 UTC [cauthdsl] func2 -> DEBU 4903 0xc00480db30 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:40:59.953 UTC [cauthdsl] func2 -> DEBU 4904 0xc00480db30 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:40:59.953 UTC [msp.identity] Verify -> DEBU 4905 Verify: digest = 00000000 28 db d2 b9 19 9f d2 cc b1 64 01 a7 ae 30 da 0d |(........d...0..| -peer0.org1.example.com | 00000010 dc 14 c1 d3 3b 3e a7 c7 ba db 5d 59 ac 03 a5 7a |....;>....]Y...z|" -peer0.org1.example.com | "2019-07-20 02:40:59.955 UTC [msp.identity] Verify -> DEBU 4906 Verify: sig = 00000000 30 45 02 21 00 fa 62 e3 aa a8 f9 4f 17 a3 b4 bb |0E.!..b....O....| -peer0.org1.example.com | 00000010 35 04 41 6c fc 6e c1 e6 4a 0b c5 4a a8 db e6 39 |5.Al.n..J..J...9| -peer0.org1.example.com | 00000020 20 b7 db 0a c7 02 20 24 0d af 40 40 54 ee 1f 82 | ..... $..@@T...| -peer0.org1.example.com | 00000030 ce c3 f1 b3 4a 8d 48 6e d9 56 43 68 20 4f d2 ca |....J.Hn.VCh O..| -peer0.org1.example.com | 00000040 6a 9a bd 38 f0 c1 06 |j..8...|" -peer0.org1.example.com | "2019-07-20 02:40:59.956 UTC [cauthdsl] func2 -> DEBU 4907 0xc00480db30 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:40:59.956 UTC [cauthdsl] func1 -> DEBU 4908 0xc00480db30 gate 1563590459952843400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:40:59.956 UTC [policies] Evaluate -> DEBU 4909 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:59.956 UTC [policies] Evaluate -> DEBU 490a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:40:59.957 UTC [policies] Evaluate -> DEBU 490b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:59.957 UTC [policies] Evaluate -> DEBU 490c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:40:59.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 490d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:40:59.958 UTC [gossip.discovery] learnExistingMembers -> DEBU 490e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:40:59.959 UTC [gossip.comm] func1 -> DEBU 490f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4910 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4912 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4913 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4914 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.gossip] handleMessage -> DEBU 4911 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:59.961 UTC [gossip.pull] HandleMessage -> DEBU 4915 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.discovery] handleAliveMessage -> DEBU 4916 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:59.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4918 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:59.961 UTC [msp] DeserializeIdentity -> DEBU 4917 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:59.964 UTC [gossip.discovery] sendMemResponse -> DEBU 4919 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:40:59.967 UTC [msp] DeserializeIdentity -> DEBU 491a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:59.968 UTC [msp] DeserializeIdentity -> DEBU 491b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:59.968 UTC [msp] DeserializeIdentity -> DEBU 491c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:59.969 UTC [gossip.comm] Send -> DEBU 491d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:40:59.969 UTC [gossip.discovery] sendMemResponse -> DEBU 491e Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020<" signature:"0D\002 #;\023\376\235\231!\274\014#4\027(CL\254\307\206g\332]\215\016\337\206cE9\242\014\361b\002 \0247\273\315\304\246\343\333\302\373\203t\252Fy\352\0219\214&\360\256\222azP\220\233\\\034\344\317" > alive: alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " -peer0.org1.example.com | "2019-07-20 02:40:59.969 UTC [gossip.comm] sendToEndpoint -> DEBU 491f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:40:59.969 UTC [gossip.comm] sendToEndpoint -> DEBU 4920 Exiting" -peer0.org1.example.com | "2019-07-20 02:40:59.966 UTC [msp] DeserializeIdentity -> DEBU 4921 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:59.980 UTC [msp] DeserializeIdentity -> DEBU 4922 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:59.980 UTC [msp] DeserializeIdentity -> DEBU 4923 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:59.981 UTC [msp] DeserializeIdentity -> DEBU 4924 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:59.981 UTC [msp] DeserializeIdentity -> DEBU 4925 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:40:59.981 UTC [gossip.pull] SendDigest -> DEBU 4926 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:40:59.982 UTC [gossip.gossip] handleMessage -> DEBU 4927 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.245 UTC [gossip.pull] Hello -> DEBU 4928 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 4929 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.pull] Hello -> DEBU 492a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 492b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.pull] Hello -> DEBU 492c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 492d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 492e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 492f Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4930 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4931 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4932 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4933 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.255 UTC [gossip.comm] func1 -> DEBU 4934 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.255 UTC [gossip.gossip] handleMessage -> DEBU 4935 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.255 UTC [gossip.pull] HandleMessage -> DEBU 4936 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.255 UTC [gossip.gossip] handleMessage -> DEBU 4937 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.258 UTC [gossip.gossip] handleMessage -> DEBU 4938 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.258 UTC [gossip.pull] HandleMessage -> DEBU 4939 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.258 UTC [gossip.gossip] handleMessage -> DEBU 493a Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.259 UTC [gossip.comm] func1 -> DEBU 493b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.262 UTC [gossip.gossip] handleMessage -> DEBU 493c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.263 UTC [gossip.pull] HandleMessage -> DEBU 493d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.263 UTC [gossip.gossip] handleMessage -> DEBU 493e Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp] GetDefaultSigningIdentity -> DEBU 493f Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4940 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151036 " -peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4941 Sign: digest: C2615889418FFCA163D06A93ADDC2E02FFD4AC5E6620C5DE7FC1307F4AC429DB " -peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp] GetDefaultSigningIdentity -> DEBU 4942 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4943 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4944 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4945 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [msp] DeserializeIdentity -> DEBU 4946 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4947 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [msp] DeserializeIdentity -> DEBU 4948 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4949 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494b Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494d Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494f Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.comm] func1 -> DEBU 4950 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.gossip] handleMessage -> DEBU 4951 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.gossip] handleMessage -> DEBU 4952 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4953 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4954 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [msp.identity] Verify -> DEBU 4955 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| -peer0.org1.example.com | 00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" -peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [msp.identity] Verify -> DEBU 4956 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| -peer0.org1.example.com | 00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| -peer0.org1.example.com | 00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| -peer0.org1.example.com | 00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| -peer0.org1.example.com | 00000040 b0 e0 30 43 5c f1 |..0C\.|" -peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.discovery] handleAliveMessage -> DEBU 4957 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.discovery] isSentByMe -> DEBU 4958 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.discovery] handleAliveMessage -> DEBU 4959 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.discovery] handleMsgFromComm -> DEBU 495a Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.comm] func1 -> DEBU 495b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 495c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 495d Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.discovery] handleMsgFromComm -> DEBU 495e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 495f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [msp.identity] Verify -> DEBU 4960 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| -peer0.org1.example.com | 00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" -peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [msp.identity] Verify -> DEBU 4961 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| -peer0.org1.example.com | 00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| -peer0.org1.example.com | 00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| -peer0.org1.example.com | 00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| -peer0.org1.example.com | 00000040 b0 e0 30 43 5c f1 |..0C\.|" -peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 4962 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 4963 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [gossip.discovery] isSentByMe -> DEBU 4964 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 4965 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4966 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [msp] DeserializeIdentity -> DEBU 4967 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4968 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4969 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 496a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 496e 0xc004879410 gate 1563590460294665100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 496f 0xc004879410 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4970 0xc004879410 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4971 0xc004879410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4972 0xc004879410 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 4973 0xc004879410 gate 1563590460294665100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4974 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4975 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4976 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 4977 0xc004879c50 gate 1563590460294955900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4978 0xc004879c50 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4979 0xc004879c50 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 497a 0xc004879c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 497b 0xc004879c50 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 497c 0xc004879c50 gate 1563590460294955900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 4980 0xc004890490 gate 1563590460295191000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4981 0xc004890490 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4982 0xc004890490 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4983 0xc004890490 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4984 Verify: digest = 00000000 28 db d2 b9 19 9f d2 cc b1 64 01 a7 ae 30 da 0d |(........d...0..| -peer0.org1.example.com | 00000010 dc 14 c1 d3 3b 3e a7 c7 ba db 5d 59 ac 03 a5 7a |....;>....]Y...z|" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4985 Verify: sig = 00000000 30 45 02 21 00 fa 62 e3 aa a8 f9 4f 17 a3 b4 bb |0E.!..b....O....| -peer0.org1.example.com | 00000010 35 04 41 6c fc 6e c1 e6 4a 0b c5 4a a8 db e6 39 |5.Al.n..J..J...9| -peer0.org1.example.com | 00000020 20 b7 db 0a c7 02 20 24 0d af 40 40 54 ee 1f 82 | ..... $..@@T...| -peer0.org1.example.com | 00000030 ce c3 f1 b3 4a 8d 48 6e d9 56 43 68 20 4f d2 ca |....J.Hn.VCh O..| -peer0.org1.example.com | 00000040 6a 9a bd 38 f0 c1 06 |j..8...|" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4986 0xc004890490 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 4987 0xc004890490 gate 1563590460295191000 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 4988 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 4989 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 498a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 498b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 498c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 498d Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498e Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4990 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4991 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| -peer0.org1.example.com | 00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" -peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4992 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| -peer0.org1.example.com | 00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| -peer0.org1.example.com | 00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| -peer0.org1.example.com | 00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| -peer0.org1.example.com | 00000040 b0 e0 30 43 5c f1 |..0C\.|" -peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [msp.identity] Verify -> DEBU 4993 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [msp.identity] Verify -> DEBU 4994 Verify: sig = 00000000 30 45 02 21 00 96 b2 43 41 a9 5b 49 00 12 c7 01 |0E.!...CA.[I....| -peer0.org1.example.com | 00000010 b1 b7 69 8f b6 4f de 87 6c 57 3f 98 4e 50 c9 96 |..i..O..lW?.NP..| -peer0.org1.example.com | 00000020 eb 26 5a db a8 02 20 2b 85 b1 b6 cc de 66 6b 9f |.&Z... +.....fk.| -peer0.org1.example.com | 00000030 6e 8b 01 5a 5d 0e aa 9c 3b e4 40 5f 72 d9 5c c6 |n..Z]...;.@_r.\.| -peer0.org1.example.com | 00000040 29 e1 37 c9 f7 62 16 |).7..b.|" -peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 4995 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [gossip.discovery] isSentByMe -> DEBU 4996 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 4997 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4998 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [gossip.gossip] handleMessage -> DEBU 4999 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.339 UTC [gossip.gossip] handleMessage -> DEBU 499a Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.339 UTC [gossip.pull] HandleMessage -> DEBU 499b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.340 UTC [gossip.pull] SendDigest -> DEBU 499c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:41:00.340 UTC [gossip.gossip] handleMessage -> DEBU 499d Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.365 UTC [gossip.gossip] handleMessage -> DEBU 499e Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.365 UTC [gossip.gossip] handleMessage -> DEBU 499f Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49a0 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.367 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49a1 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:41:00.367 UTC [msp.identity] Verify -> DEBU 49a2 Verify: digest = 00000000 49 51 52 bd 11 4a b8 a3 53 97 cd 73 97 50 47 c7 |IQR..J..S..s.PG.| -peer0.org1.example.com | 00000010 f7 19 ff 3e 5b 7b 6b b2 51 fb 37 eb 30 f0 1e 28 |...>[{k.Q.7.0..(|" -peer0.org1.example.com | "2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a3 Verify: sig = 00000000 30 44 02 20 73 e9 4b 88 b7 1d 12 fa 3f c9 c6 07 |0D. s.K.....?...| -peer0.org1.example.com | 00000010 77 4f 29 fc 49 b3 4d 94 aa c1 fe 5a 7f e4 9b c9 |wO).I.M....Z....| -peer0.org1.example.com | 00000020 e7 5a 6f 77 02 20 02 9d c8 ed 33 b4 b0 96 38 17 |.Zow. ....3...8.| -peer0.org1.example.com | 00000030 c8 44 99 10 24 6b b7 b4 19 af f3 64 79 0a 93 b6 |.D..$k.....dy...| -peer0.org1.example.com | 00000040 3d cd a7 65 1a 5b |=..e.[|" -peer0.org1.example.com | "2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -peer0.org1.example.com | "2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a5 Verify: sig = 00000000 30 44 02 20 76 c6 50 b4 a8 c9 a5 a4 5b 7b a9 51 |0D. v.P.....[{.Q| -peer0.org1.example.com | 00000010 94 dc 4e 9c 23 55 71 69 22 82 7f cf 78 9a 1b 78 |..N.#Uqi"...x..x| -peer0.org1.example.com | 00000020 68 ed 47 62 02 20 50 c6 26 68 cd d4 03 08 49 58 |h.Gb. P.&h....IX| -peer0.org1.example.com | 00000030 f2 d2 42 4f 35 7b 20 5a c9 11 20 5b 1c da bb ab |..BO5{ Z.. [....| -peer0.org1.example.com | 00000040 bc 02 fc 5a 8f 1c |...Z..|" -peer0.org1.example.com | "2019-07-20 02:41:00.369 UTC [gossip.discovery] handleAliveMessage -> DEBU 49a6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.369 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a8 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a9 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49aa Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49ab Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.371 UTC [gossip.discovery] handleAliveMessage -> DEBU 49ac Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.371 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49ad Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.371 UTC [gossip.discovery] sendMemResponse -> DEBU 49ae Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -peer0.org1.example.com | "2019-07-20 02:41:00.371 UTC [msp] DeserializeIdentity -> DEBU 49af Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.371 UTC [msp] DeserializeIdentity -> DEBU 49b0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.372 UTC [gossip.comm] Send -> DEBU 49b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:00.372 UTC [gossip.discovery] sendMemResponse -> DEBU 49b2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " -peer0.org1.example.com | "2019-07-20 02:41:00.372 UTC [gossip.comm] sendToEndpoint -> DEBU 49b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.373 UTC [gossip.comm] sendToEndpoint -> DEBU 49b4 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [endorser] ProcessProposal -> DEBU 49b5 Entering: request from 172.18.0.9:58518" -peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [protoutils] ValidateProposalMessage -> DEBU 49b6 ValidateProposalMessage starts for signed proposal 0xc00489c6e0" -peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [protoutils] validateChannelHeader -> DEBU 49b7 validateChannelHeader info: header type 3" -peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49b8 begin" -peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49b9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49ba creator is valid" -peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [msp.identity] Verify -> DEBU 49bb Verify: digest = 00000000 85 00 2b dd e9 4c 92 74 a3 7b 02 7e d0 3c 36 7b |..+..L.t.{.~.<6{| -peer0.org1.example.com | 00000010 7d 25 c4 4a c0 db cf b0 65 6e fd 0c cf 78 58 8c |}%.J....en...xX.|" -peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [msp.identity] Verify -> DEBU 49bc Verify: sig = 00000000 30 45 02 21 00 9a 0f 58 7d c4 e9 ca 5d 48 78 ad |0E.!...X}...]Hx.| -peer0.org1.example.com | 00000010 55 bf ca 8c 70 23 b2 5d 03 22 41 5e cf e8 fb f1 |U...p#.]."A^....| -peer0.org1.example.com | 00000020 66 a9 4c 17 a7 02 20 33 19 b7 28 e3 af ad dc 21 |f.L... 3..(....!| -peer0.org1.example.com | 00000030 68 a6 a7 71 52 4a ed 03 4a 60 6a ad 1a fb 30 1d |h..qRJ..J`j...0.| -peer0.org1.example.com | 00000040 04 80 97 3f 92 44 a1 |...?.D.|" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [protoutils] checkSignatureFromCreator -> DEBU 49bd exits successfully" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 49be validateChaincodeProposalMessage starts for proposal 0xc003acee70, header 0xc00489caf0" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 49bf validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [endorser] preProcess -> DEBU 49c0 [][889970b1] processing txid: 889970b1dd55c6d7693a11bcb651af613bd7efe1575aa44d9c9631b5ded063c7" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [endorser] SimulateProposal -> DEBU 49c1 [][889970b1] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [endorser] callChaincode -> INFO 49c2 [][889970b1] Entry chaincode: name:"qscc" " -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [chaincode] Execute -> DEBU 49c3 Entry" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [qscc] Invoke -> DEBU 49c4 Invoke function: GetChainInfo on chain: businesschannel" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [aclmgmt] CheckACL -> DEBU 49c5 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [aclmgmt] CheckACL -> DEBU 49c6 acl check(/Channel/Application/Readers)" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [msp] DeserializeIdentity -> DEBU 49ca Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [msp.identity] newIdentity -> DEBU 49cb Creating identity instance for cert -----BEGIN CERTIFICATE----- -peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -peer0.org1.example.com | -----END CERTIFICATE-----" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [cauthdsl] func1 -> DEBU 49cc 0xc0048f4830 gate 1563590460455929300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [cauthdsl] func2 -> DEBU 49cd 0xc0048f4830 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49ce 0xc0048f4830 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49cf 0xc0048f4830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d0 0xc0048f4830 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func1 -> DEBU 49d1 0xc0048f4830 gate 1563590460455929300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func1 -> DEBU 49d5 0xc0048f59b0 gate 1563590460456331400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d6 0xc0048f59b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d7 0xc0048f59b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 49d8 Checking if identity satisfies MEMBER role for Org1MSP" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [msp] Validate -> DEBU 49d9 MSP Org1MSP validating identity" -peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [msp] getCertificationChain -> DEBU 49da MSP Org1MSP getting certification chain" -peer0.org1.example.com | "2019-07-20 02:41:00.458 UTC [cauthdsl] func2 -> DEBU 49db 0xc0048f59b0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.458 UTC [msp.identity] Verify -> DEBU 49dc Verify: digest = 00000000 85 00 2b dd e9 4c 92 74 a3 7b 02 7e d0 3c 36 7b |..+..L.t.{.~.<6{| -peer0.org1.example.com | 00000010 7d 25 c4 4a c0 db cf b0 65 6e fd 0c cf 78 58 8c |}%.J....en...xX.|" -peer0.org1.example.com | "2019-07-20 02:41:00.458 UTC [msp.identity] Verify -> DEBU 49dd Verify: sig = 00000000 30 45 02 21 00 9a 0f 58 7d c4 e9 ca 5d 48 78 ad |0E.!...X}...]Hx.| -peer0.org1.example.com | 00000010 55 bf ca 8c 70 23 b2 5d 03 22 41 5e cf e8 fb f1 |U...p#.]."A^....| -peer0.org1.example.com | 00000020 66 a9 4c 17 a7 02 20 33 19 b7 28 e3 af ad dc 21 |f.L... 3..(....!| -peer0.org1.example.com | 00000030 68 a6 a7 71 52 4a ed 03 4a 60 6a ad 1a fb 30 1d |h..qRJ..J`j...0.| -peer0.org1.example.com | 00000040 04 80 97 3f 92 44 a1 |...?.D.|" -peer0.org1.example.com | "2019-07-20 02:41:00.459 UTC [cauthdsl] func2 -> DEBU 49de 0xc0048f59b0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.459 UTC [cauthdsl] func1 -> DEBU 49df 0xc0048f59b0 gate 1563590460456331400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:00.460 UTC [policies] Evaluate -> DEBU 49e0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e2 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [chaincode] handleMessage -> DEBU 49e4 [889970b1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [chaincode] Notify -> DEBU 49e5 [889970b1] notifying Txid:889970b1dd55c6d7693a11bcb651af613bd7efe1575aa44d9c9631b5ded063c7, channelID:" -peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [chaincode] Execute -> DEBU 49e6 Exit" -peer0.org1.example.com | "2019-07-20 02:41:00.462 UTC [endorser] callChaincode -> INFO 49e7 [][889970b1] Exit chaincode: name:"qscc" (7ms)" -peer0.org1.example.com | "2019-07-20 02:41:00.462 UTC [endorser] SimulateProposal -> DEBU 49e8 [][889970b1] Exit" -peer0.org1.example.com | "2019-07-20 02:41:00.462 UTC [endorser] func1 -> DEBU 49e9 Exit: request from 172.18.0.9:58518" -peer0.org1.example.com | "2019-07-20 02:41:00.462 UTC [comm.grpc.server] 1 -> INFO 49ea unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58518 grpc.code=OK grpc.call_duration=8.4046ms -peer0.org1.example.com | "2019-07-20 02:41:00.466 UTC [grpc] infof -> DEBU 49eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [gossip.comm] func1 -> DEBU 49ec Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [gossip.gossip] handleMessage -> DEBU 49ed Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [gossip.gossip] handleMessage -> DEBU 49ee Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49ef Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49f0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:41:00.590 UTC [msp] DeserializeIdentity -> DEBU 49f1 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.600 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:41:00.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49f3 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49f4 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.601 UTC [policies] Evaluate -> DEBU 49f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.601 UTC [policies] Evaluate -> DEBU 49f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:00.602 UTC [policies] Evaluate -> DEBU 49f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.601 UTC [gossip.comm] func1 -> DEBU 49f7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.602 UTC [gossip.gossip] handleMessage -> DEBU 49f9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.603 UTC [gossip.pull] HandleMessage -> DEBU 49fa GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.603 UTC [msp] DeserializeIdentity -> DEBU 49fb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.605 UTC [msp] DeserializeIdentity -> DEBU 49fc Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.612 UTC [msp] DeserializeIdentity -> DEBU 49fd Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.579 UTC [msp] DeserializeIdentity -> DEBU 49fe Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.580 UTC [msp] DeserializeIdentity -> DEBU 49ff Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.580 UTC [msp] DeserializeIdentity -> DEBU 4a00 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.581 UTC [gossip.pull] SendDigest -> DEBU 4a01 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -peer0.org1.example.com | "2019-07-20 02:41:00.581 UTC [gossip.gossip] handleMessage -> DEBU 4a02 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.582 UTC [cauthdsl] func1 -> DEBU 4a03 0xc0048e5110 gate 1563590460582117800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.582 UTC [cauthdsl] func2 -> DEBU 4a04 0xc0048e5110 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.584 UTC [cauthdsl] func2 -> DEBU 4a05 0xc0048e5110 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.584 UTC [cauthdsl] func2 -> DEBU 4a06 0xc0048e5110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.585 UTC [cauthdsl] func2 -> DEBU 4a07 0xc0048e5110 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.585 UTC [cauthdsl] func1 -> DEBU 4a08 0xc0048e5110 gate 1563590460582117800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a09 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a0a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.586 UTC [cauthdsl] func1 -> DEBU 4a0c 0xc0048e5950 gate 1563590460585973400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.586 UTC [cauthdsl] func2 -> DEBU 4a0d 0xc0048e5950 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.587 UTC [cauthdsl] func2 -> DEBU 4a0e 0xc0048e5950 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.587 UTC [cauthdsl] func2 -> DEBU 4a0f 0xc0048e5950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [cauthdsl] func2 -> DEBU 4a10 0xc0048e5950 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [cauthdsl] func1 -> DEBU 4a11 0xc0048e5950 gate 1563590460585973400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [policies] Evaluate -> DEBU 4a12 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [policies] Evaluate -> DEBU 4a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [policies] Evaluate -> DEBU 4a14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [cauthdsl] func1 -> DEBU 4a15 0xc00493c190 gate 1563590460589535900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a16 0xc00493c190 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a17 0xc00493c190 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a18 0xc00493c190 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.590 UTC [msp.identity] Verify -> DEBU 4a19 Verify: digest = 00000000 1d c4 48 eb 09 63 c9 43 1e 9c 1f 98 2a 93 3c 43 |..H..c.C....*. DEBU 4a1a Verify: sig = 00000000 30 44 02 20 6b ea f9 b0 bf 96 e2 a2 ef b3 af aa |0D. k...........| -peer0.org1.example.com | 00000010 cc 76 8c a9 97 a4 50 c7 b8 ea 41 9c 8a 4f b9 76 |.v....P...A..O.v| -peer0.org1.example.com | 00000020 a4 2f dd 96 02 20 1d aa 85 90 7f 83 96 e4 68 d9 |./... ........h.| -peer0.org1.example.com | 00000030 f7 20 c0 66 07 0f b2 7e 51 5f 88 b8 87 e4 29 17 |. .f...~Q_....).| -peer0.org1.example.com | 00000040 d9 96 73 42 71 fb |..sBq.|" -peer0.org1.example.com | "2019-07-20 02:41:00.591 UTC [cauthdsl] func2 -> DEBU 4a1b 0xc00493c190 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.591 UTC [cauthdsl] func1 -> DEBU 4a1c 0xc00493c190 gate 1563590460589535900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:00.591 UTC [policies] Evaluate -> DEBU 4a1d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.591 UTC [policies] Evaluate -> DEBU 4a1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.592 UTC [policies] Evaluate -> DEBU 4a1f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.592 UTC [policies] Evaluate -> DEBU 4a20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.592 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a21 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a22 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:41:00.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a23 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:00.593 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a24 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:00.593 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a25 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:41:00.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a26 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.596 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a27 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a28 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.596 UTC [gossip.discovery] sendMemResponse -> DEBU 4a29 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -peer0.org1.example.com | "2019-07-20 02:41:00.597 UTC [msp] DeserializeIdentity -> DEBU 4a2a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.597 UTC [msp] DeserializeIdentity -> DEBU 4a2b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.598 UTC [msp] DeserializeIdentity -> DEBU 4a2c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.598 UTC [gossip.comm] Send -> DEBU 4a2d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:00.598 UTC [gossip.discovery] sendMemResponse -> DEBU 4a2e Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" > alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " -peer0.org1.example.com | "2019-07-20 02:41:00.598 UTC [gossip.comm] sendToEndpoint -> DEBU 4a2f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.598 UTC [gossip.comm] sendToEndpoint -> DEBU 4a30 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.648 UTC [msp] DeserializeIdentity -> DEBU 4a31 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.648 UTC [msp] DeserializeIdentity -> DEBU 4a32 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.648 UTC [gossip.comm] Send -> DEBU 4a33 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -peer0.org1.example.com | "2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a34 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a35 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a36 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a37 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a38 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.650 UTC [gossip.comm] sendToEndpoint -> DEBU 4a39 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.651 UTC [gossip.comm] func1 -> DEBU 4a3a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.651 UTC [gossip.gossip] handleMessage -> DEBU 4a3b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.651 UTC [msp] DeserializeIdentity -> DEBU 4a3c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.651 UTC [msp] DeserializeIdentity -> DEBU 4a3d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.652 UTC [msp] DeserializeIdentity -> DEBU 4a3e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.653 UTC [gossip.comm] func1 -> DEBU 4a3f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.653 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:41:00.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a41 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a42 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.659 UTC [policies] Evaluate -> DEBU 4a43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.659 UTC [policies] Evaluate -> DEBU 4a44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [policies] Evaluate -> DEBU 4a45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func1 -> DEBU 4a46 0xc004962cc0 gate 1563590460660063900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a47 0xc004962cc0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a48 0xc004962cc0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a49 0xc004962cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a4a 0xc004962cc0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func1 -> DEBU 4a4b 0xc004962cc0 gate 1563590460660063900 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [policies] Evaluate -> DEBU 4a4c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.661 UTC [policies] Evaluate -> DEBU 4a4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.661 UTC [policies] Evaluate -> DEBU 4a4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.662 UTC [cauthdsl] func1 -> DEBU 4a4f 0xc004963500 gate 1563590460662627300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.662 UTC [cauthdsl] func2 -> DEBU 4a50 0xc004963500 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a51 0xc004963500 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a52 0xc004963500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a53 0xc004963500 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func1 -> DEBU 4a54 0xc004963500 gate 1563590460662627300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a55 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func1 -> DEBU 4a58 0xc004963d40 gate 1563590460663562700 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a59 0xc004963d40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.664 UTC [cauthdsl] func2 -> DEBU 4a5a 0xc004963d40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.665 UTC [cauthdsl] func2 -> DEBU 4a5b 0xc004963d40 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.666 UTC [msp.identity] Verify -> DEBU 4a5c Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:41:00.667 UTC [msp.identity] Verify -> DEBU 4a5d Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:41:00.668 UTC [cauthdsl] func2 -> DEBU 4a5e 0xc004963d40 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.668 UTC [cauthdsl] func1 -> DEBU 4a5f 0xc004963d40 gate 1563590460663562700 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:00.668 UTC [policies] Evaluate -> DEBU 4a60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.669 UTC [policies] Evaluate -> DEBU 4a61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.669 UTC [policies] Evaluate -> DEBU 4a62 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.670 UTC [policies] Evaluate -> DEBU 4a63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.678 UTC [msp.identity] Verify -> DEBU 4a64 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -peer0.org1.example.com | "2019-07-20 02:41:00.679 UTC [msp.identity] Verify -> DEBU 4a65 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" -peer0.org1.example.com | "2019-07-20 02:41:00.685 UTC [msp.identity] Verify -> DEBU 4a66 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:41:00.685 UTC [msp.identity] Verify -> DEBU 4a67 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:41:00.692 UTC [msp] DeserializeIdentity -> DEBU 4a68 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.694 UTC [msp] DeserializeIdentity -> DEBU 4a69 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.694 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:41:00.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a6b Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a6c Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [cauthdsl] func1 -> DEBU 4a70 0xc00498a350 gate 1563590460695543200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [cauthdsl] func2 -> DEBU 4a71 0xc00498a350 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [cauthdsl] func2 -> DEBU 4a72 0xc00498a350 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.696 UTC [cauthdsl] func2 -> DEBU 4a73 0xc00498a350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.696 UTC [cauthdsl] func2 -> DEBU 4a74 0xc00498a350 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.696 UTC [cauthdsl] func1 -> DEBU 4a75 0xc00498a350 gate 1563590460695543200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.696 UTC [policies] Evaluate -> DEBU 4a76 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.697 UTC [policies] Evaluate -> DEBU 4a77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.697 UTC [policies] Evaluate -> DEBU 4a78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.697 UTC [cauthdsl] func1 -> DEBU 4a79 0xc00498ab90 gate 1563590460697495500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.697 UTC [cauthdsl] func2 -> DEBU 4a7a 0xc00498ab90 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7b 0xc00498ab90 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7c 0xc00498ab90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7d 0xc00498ab90 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [cauthdsl] func1 -> DEBU 4a7e 0xc00498ab90 gate 1563590460697495500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a7f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a81 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.699 UTC [cauthdsl] func1 -> DEBU 4a82 0xc00498b3d0 gate 1563590460699017400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a83 0xc00498b3d0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a84 0xc00498b3d0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a85 0xc00498b3d0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.702 UTC [msp.identity] Verify -> DEBU 4a86 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:41:00.702 UTC [msp.identity] Verify -> DEBU 4a87 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:41:00.702 UTC [cauthdsl] func2 -> DEBU 4a88 0xc00498b3d0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.703 UTC [cauthdsl] func1 -> DEBU 4a89 0xc00498b3d0 gate 1563590460699017400 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8c Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.704 UTC [policies] Evaluate -> DEBU 4a8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.704 UTC [gossip.gossip] handleMessage -> DEBU 4a8e Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.705 UTC [gossip.gossip] handleMessage -> DEBU 4a8f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.705 UTC [msp.identity] Verify -> DEBU 4a90 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:41:00.705 UTC [msp.identity] Verify -> DEBU 4a91 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:41:00.706 UTC [msp.identity] Verify -> DEBU 4a92 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -peer0.org1.example.com | "2019-07-20 02:41:00.706 UTC [msp.identity] Verify -> DEBU 4a93 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" -peer0.org1.example.com | "2019-07-20 02:41:00.706 UTC [msp] DeserializeIdentity -> DEBU 4a94 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.706 UTC [msp] DeserializeIdentity -> DEBU 4a95 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a97 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a98 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.712 UTC [policies] Evaluate -> DEBU 4a99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [policies] Evaluate -> DEBU 4a9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [policies] Evaluate -> DEBU 4a9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [cauthdsl] func1 -> DEBU 4a9c 0xc004999c20 gate 1563590460713243100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9d 0xc004999c20 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9e 0xc004999c20 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9f 0xc004999c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [cauthdsl] func2 -> DEBU 4aa0 0xc004999c20 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [cauthdsl] func1 -> DEBU 4aa1 0xc004999c20 gate 1563590460713243100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [cauthdsl] func1 -> DEBU 4aa5 0xc0049b8460 gate 1563590460714843000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa6 0xc0049b8460 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa7 0xc0049b8460 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa8 0xc0049b8460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa9 0xc0049b8460 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [cauthdsl] func1 -> DEBU 4aaa 0xc0049b8460 gate 1563590460714843000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.721 UTC [cauthdsl] func1 -> DEBU 4aae 0xc0049b8ca0 gate 1563590460720093200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.721 UTC [cauthdsl] func2 -> DEBU 4aaf 0xc0049b8ca0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.722 UTC [cauthdsl] func2 -> DEBU 4ab0 0xc0049b8ca0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.723 UTC [cauthdsl] func2 -> DEBU 4ab1 0xc0049b8ca0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.723 UTC [msp.identity] Verify -> DEBU 4ab2 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:41:00.723 UTC [msp.identity] Verify -> DEBU 4ab3 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:41:00.723 UTC [cauthdsl] func2 -> DEBU 4ab4 0xc0049b8ca0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.723 UTC [cauthdsl] func1 -> DEBU 4ab5 0xc0049b8ca0 gate 1563590460720093200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab8 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [msp] DeserializeIdentity -> DEBU 4aba Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [msp] DeserializeIdentity -> DEBU 4abb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4abc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4abd Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4abe Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4abf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [policies] Evaluate -> DEBU 4ac0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [policies] Evaluate -> DEBU 4ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [cauthdsl] func1 -> DEBU 4ac2 0xc0049ce470 gate 1563590460725231100 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac3 0xc0049ce470 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac4 0xc0049ce470 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac5 0xc0049ce470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac6 0xc0049ce470 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.726 UTC [cauthdsl] func1 -> DEBU 4ac7 0xc0049ce470 gate 1563590460725231100 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4ac8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4ac9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4aca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.727 UTC [msp] DeserializeIdentity -> DEBU 4acb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.727 UTC [cauthdsl] func1 -> DEBU 4acc 0xc0049cecb0 gate 1563590460727922600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4acd 0xc0049cecb0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ace 0xc0049cecb0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4acf 0xc0049cecb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad0 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [gossip.pull] Hello -> DEBU 4ad1 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ad2 0xc0049cecb0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func1 -> DEBU 4ad3 0xc0049cecb0 gate 1563590460727922600 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func1 -> DEBU 4ad8 0xc0049cf4f0 gate 1563590460728919200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad9 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ada 0xc0049cf4f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4adb 0xc0049cf4f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [gossip.comm] Send -> DEBU 4adc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4add 0xc0049cf4f0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [msp.identity] Verify -> DEBU 4ade Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [msp.identity] Verify -> DEBU 4adf Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae1 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4ae2 0xc0049cf4f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [cauthdsl] func1 -> DEBU 4ae3 0xc0049cf4f0 gate 1563590460728919200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [policies] Evaluate -> DEBU 4ae4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae6 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.732 UTC [gossip.gossip] handleMessage -> DEBU 4ae8 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.732 UTC [gossip.gossip] handleMessage -> DEBU 4ae9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aea Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aeb Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aec Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4aed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4aee Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4aef Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [policies] Evaluate -> DEBU 4af0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [policies] Evaluate -> DEBU 4af1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [policies] Evaluate -> DEBU 4af2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [cauthdsl] func1 -> DEBU 4af3 0xc0049e5000 gate 1563590460734350400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af4 0xc0049e5000 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af5 0xc0049e5000 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af6 0xc0049e5000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af7 0xc0049e5000 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [cauthdsl] func1 -> DEBU 4af8 0xc0049e5000 gate 1563590460734350400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4af9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4afa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [cauthdsl] func1 -> DEBU 4afc 0xc0049e5840 gate 1563590460735722000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [cauthdsl] func2 -> DEBU 4afd 0xc0049e5840 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4afe 0xc0049e5840 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4aff 0xc0049e5840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4b00 0xc0049e5840 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [cauthdsl] func1 -> DEBU 4b01 0xc0049e5840 gate 1563590460735722000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [cauthdsl] func1 -> DEBU 4b05 0xc0049fc080 gate 1563590460736931300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.738 UTC [cauthdsl] func2 -> DEBU 4b06 0xc0049fc080 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.739 UTC [cauthdsl] func2 -> DEBU 4b07 0xc0049fc080 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.740 UTC [cauthdsl] func2 -> DEBU 4b08 0xc0049fc080 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.740 UTC [msp.identity] Verify -> DEBU 4b09 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -peer0.org1.example.com | "2019-07-20 02:41:00.740 UTC [msp.identity] Verify -> DEBU 4b0a Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" -peer0.org1.example.com | "2019-07-20 02:41:00.740 UTC [cauthdsl] func2 -> DEBU 4b0b 0xc0049fc080 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.740 UTC [cauthdsl] func1 -> DEBU 4b0c 0xc0049fc080 gate 1563590460736931300 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0f Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b11 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -peer0.org1.example.com | "2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b12 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" -peer0.org1.example.com | "2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b13 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -peer0.org1.example.com | "2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b14 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" -peer0.org1.example.com | "2019-07-20 02:41:00.748 UTC [msp] DeserializeIdentity -> DEBU 4b15 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.748 UTC [msp] DeserializeIdentity -> DEBU 4b16 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b17 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b18 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b19 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:00.750 UTC [policies] Evaluate -> DEBU 4b1a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.750 UTC [policies] Evaluate -> DEBU 4b1b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [policies] Evaluate -> DEBU 4b1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func1 -> DEBU 4b1d 0xc004a1c690 gate 1563590460751179500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b1e 0xc004a1c690 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b1f 0xc004a1c690 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b20 0xc004a1c690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b21 0xc004a1c690 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func1 -> DEBU 4b22 0xc004a1c690 gate 1563590460751179500 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [policies] Evaluate -> DEBU 4b23 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [policies] Evaluate -> DEBU 4b24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [policies] Evaluate -> DEBU 4b25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [cauthdsl] func1 -> DEBU 4b26 0xc004a1ced0 gate 1563590460752470400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b27 0xc004a1ced0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b28 0xc004a1ced0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b29 0xc004a1ced0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b2a 0xc004a1ced0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [cauthdsl] func1 -> DEBU 4b2b 0xc004a1ced0 gate 1563590460752470400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [cauthdsl] func1 -> DEBU 4b2f 0xc004a1d710 gate 1563590460753743500 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [cauthdsl] func2 -> DEBU 4b30 0xc004a1d710 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [cauthdsl] func2 -> DEBU 4b31 0xc004a1d710 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:00.754 UTC [cauthdsl] func2 -> DEBU 4b32 0xc004a1d710 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.754 UTC [msp.identity] Verify -> DEBU 4b33 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -peer0.org1.example.com | "2019-07-20 02:41:00.754 UTC [msp.identity] Verify -> DEBU 4b34 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -peer0.org1.example.com | "2019-07-20 02:41:00.756 UTC [cauthdsl] func2 -> DEBU 4b35 0xc004a1d710 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:00.756 UTC [cauthdsl] func1 -> DEBU 4b36 0xc004a1d710 gate 1563590460753743500 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:00.756 UTC [policies] Evaluate -> DEBU 4b37 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.757 UTC [policies] Evaluate -> DEBU 4b38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.757 UTC [policies] Evaluate -> DEBU 4b39 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.758 UTC [policies] Evaluate -> DEBU 4b3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:00.758 UTC [gossip.gossip] handleMessage -> DEBU 4b3b Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.758 UTC [gossip.gossip] handleMessage -> DEBU 4b3c Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.758 UTC [gossip.pull] HandleMessage -> DEBU 4b3d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.759 UTC [gossip.gossip] handleMessage -> DEBU 4b3e Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.808 UTC [gossip.gossip] handleMessage -> DEBU 4b3f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.810 UTC [msp] DeserializeIdentity -> DEBU 4b40 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.810 UTC [msp] DeserializeIdentity -> DEBU 4b41 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.811 UTC [gossip.gossip] handleMessage -> DEBU 4b42 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.870 UTC [gossip.gossip] handleMessage -> DEBU 4b43 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.870 UTC [gossip.pull] HandleMessage -> DEBU 4b44 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.870 UTC [gossip.pull] SendDigest -> DEBU 4b45 Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -peer0.org1.example.com | "2019-07-20 02:41:00.870 UTC [gossip.gossip] handleMessage -> DEBU 4b46 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:00.973 UTC [gossip.comm] func1 -> DEBU 4b47 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.973 UTC [gossip.gossip] handleMessage -> DEBU 4b48 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b49 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b4a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b4b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:00.974 UTC [gossip.gossip] handleMessage -> DEBU 4b4c Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.112 UTC [gossip.comm] func1 -> DEBU 4b4d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.112 UTC [gossip.gossip] handleMessage -> DEBU 4b4e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b4f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b50 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b51 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.114 UTC [gossip.gossip] handleMessage -> DEBU 4b52 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.947 UTC [gossip.election] waitForInterrupt -> DEBU 4b53 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.947 UTC [gossip.election] IsLeader -> DEBU 4b54 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -peer0.org1.example.com | "2019-07-20 02:41:01.948 UTC [msp] GetDefaultSigningIdentity -> DEBU 4b55 Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:41:01.948 UTC [msp.identity] Sign -> DEBU 4b56 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510111801 " -peer0.org1.example.com | "2019-07-20 02:41:01.948 UTC [msp.identity] Sign -> DEBU 4b57 Sign: digest: 13139BFAED5AC952836D29D7CC8CC4AA9958FE999331428538CC62CE0C87A090 " -peer0.org1.example.com | "2019-07-20 02:41:01.948 UTC [gossip.election] waitForInterrupt -> DEBU 4b58 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -peer0.org1.example.com | "2019-07-20 02:41:01.951 UTC [msp] DeserializeIdentity -> DEBU 4b59 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.951 UTC [msp] DeserializeIdentity -> DEBU 4b5a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [msp] DeserializeIdentity -> DEBU 4b5b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [msp] DeserializeIdentity -> DEBU 4b5c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [gossip.comm] Send -> DEBU 4b5d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [msp] DeserializeIdentity -> DEBU 4b5e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [msp] DeserializeIdentity -> DEBU 4b5f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [gossip.comm] sendToEndpoint -> DEBU 4b60 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [gossip.comm] sendToEndpoint -> DEBU 4b61 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.965 UTC [gossip.comm] func1 -> DEBU 4b62 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.965 UTC [gossip.gossip] handleMessage -> DEBU 4b63 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.965 UTC [gossip.gossip] handleMessage -> DEBU 4b64 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.965 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b65 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b66 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [msp] DeserializeIdentity -> DEBU 4b67 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b69 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b6a Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [policies] Evaluate -> DEBU 4b6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [policies] Evaluate -> DEBU 4b6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func1 -> DEBU 4b6e 0xc004a5aa40 gate 1563590461967060000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b6f 0xc004a5aa40 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b70 0xc004a5aa40 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b71 0xc004a5aa40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b72 0xc004a5aa40 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func1 -> DEBU 4b73 0xc004a5aa40 gate 1563590461967060000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b74 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b75 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func1 -> DEBU 4b77 0xc004a5b280 gate 1563590461967417400 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b78 0xc004a5b280 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b79 0xc004a5b280 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b7a 0xc004a5b280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b7b 0xc004a5b280 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func1 -> DEBU 4b7c 0xc004a5b280 gate 1563590461967417400 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b7d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func1 -> DEBU 4b80 0xc004a5bac0 gate 1563590461967798200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b81 0xc004a5bac0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b82 0xc004a5bac0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b83 0xc004a5bac0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [msp.identity] Verify -> DEBU 4b84 Verify: digest = 00000000 7d cd e8 10 75 21 af 62 12 96 ee b8 bd 0b 1c 98 |}...u!.b........| -peer0.org1.example.com | 00000010 89 e9 15 06 85 d5 e9 70 fe 57 42 32 69 e5 6f 48 |.......p.WB2i.oH|" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [msp.identity] Verify -> DEBU 4b85 Verify: sig = 00000000 30 44 02 20 1d c5 e4 10 6e 8e 15 9b ca 58 ed ed |0D. ....n....X..| -peer0.org1.example.com | 00000010 14 ed 31 01 52 73 ce 8f 1f a7 e4 83 3b 51 79 6a |..1.Rs......;Qyj| -peer0.org1.example.com | 00000020 fa db 77 24 02 20 1f 05 f6 f3 97 95 17 74 f0 5e |..w$. .......t.^| -peer0.org1.example.com | 00000030 d3 16 83 d3 d4 9e a2 4a 80 c3 44 f8 e7 fc 77 8b |.......J..D...w.| -peer0.org1.example.com | 00000040 d5 d5 da 3c 9d a9 |...<..|" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [cauthdsl] func2 -> DEBU 4b86 0xc004a5bac0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [cauthdsl] func1 -> DEBU 4b87 0xc004a5bac0 gate 1563590461967798200 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [policies] Evaluate -> DEBU 4b88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [policies] Evaluate -> DEBU 4b89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [policies] Evaluate -> DEBU 4b8a Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [policies] Evaluate -> DEBU 4b8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b8c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b8d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b8e updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b8f Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b90 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b91 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b92 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b93 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.973 UTC [msp] DeserializeIdentity -> DEBU 4b94 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.973 UTC [msp] DeserializeIdentity -> DEBU 4b95 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.973 UTC [msp] DeserializeIdentity -> DEBU 4b96 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.974 UTC [msp] DeserializeIdentity -> DEBU 4b97 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.974 UTC [msp] DeserializeIdentity -> DEBU 4b98 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.975 UTC [msp] DeserializeIdentity -> DEBU 4b99 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.975 UTC [msp] DeserializeIdentity -> DEBU 4b9a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] Send -> DEBU 4b9b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [msp] DeserializeIdentity -> DEBU 4b9c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] Send -> DEBU 4b9d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] sendToEndpoint -> DEBU 4b9e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] sendToEndpoint -> DEBU 4b9f Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] sendToEndpoint -> DEBU 4ba0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] sendToEndpoint -> DEBU 4ba1 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] func1 -> DEBU 4ba2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.gossip] handleMessage -> DEBU 4ba3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.gossip] handleMessage -> DEBU 4ba4 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba6 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.977 UTC [gossip.gossip] handleMessage -> DEBU 4ba7 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.978 UTC [gossip.gossip] handleMessage -> DEBU 4ba8 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:01.978 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:01.978 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4baa Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 4bab Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [msp.identity] Sign -> DEBU 4bac Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151037 " -peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [msp.identity] Sign -> DEBU 4bad Sign: digest: 0CA3223A6554DB9F9F39A1E084AB63DBD42A47B643416597373505100274FC57 " -peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 4bae Obtaining default signing identity" -peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [msp.identity] Sign -> DEBU 4baf Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [msp.identity] Sign -> DEBU 4bb0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4bb1 Sleeping 5s" -peer0.org1.example.com | "2019-07-20 02:41:02.266 UTC [msp] DeserializeIdentity -> DEBU 4bb2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.266 UTC [msp] DeserializeIdentity -> DEBU 4bb3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.266 UTC [msp] DeserializeIdentity -> DEBU 4bb4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.266 UTC [gossip.comm] Send -> DEBU 4bb5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [msp] DeserializeIdentity -> DEBU 4bb6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] Send -> DEBU 4bb7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] Send -> DEBU 4bb8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bb9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bba Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bbb Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bbc Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bbd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bbe Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.303 UTC [gossip.gossip] handleMessage -> DEBU 4bbf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.gossip] handleMessage -> DEBU 4bc0 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bc1 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4bc2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [msp.identity] Verify -> DEBU 4bc3 Verify: digest = 00000000 29 ca 0f 62 65 b8 90 f1 50 0b 98 0c e1 07 61 cc |)..be...P.....a.| -peer0.org1.example.com | 00000010 c5 03 53 50 64 c6 5f b1 c9 02 7a 3d bd 61 39 2b |..SPd._...z=.a9+|" -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [msp.identity] Verify -> DEBU 4bc4 Verify: sig = 00000000 30 45 02 21 00 bf a2 64 47 1f b4 28 53 71 eb 43 |0E.!...dG..(Sq.C| -peer0.org1.example.com | 00000010 5f 29 a3 a8 86 18 f4 37 c2 ea ad e1 a2 89 96 6a |_).....7.......j| -peer0.org1.example.com | 00000020 6e 94 60 73 ef 02 20 4f 5a 9b 19 94 1a 1e bb 93 |n.`s.. OZ.......| -peer0.org1.example.com | 00000030 96 b6 64 53 0b c2 ad 6e 6e a9 17 86 6e 1f d5 2d |..dS...nn...n..-| -peer0.org1.example.com | 00000040 cc f0 e3 fa 69 2f 26 |....i/&|" -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bc5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc7 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc8 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc9 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bca Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bcb Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bcc Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.307 UTC [gossip.comm] func1 -> DEBU 4bcd Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.307 UTC [gossip.gossip] handleMessage -> DEBU 4bce Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.307 UTC [gossip.gossip] handleMessage -> DEBU 4bcf Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.307 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bd0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.307 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bd1 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.309 UTC [msp] DeserializeIdentity -> DEBU 4bd2 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.309 UTC [msp] DeserializeIdentity -> DEBU 4bd3 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.309 UTC [msp] DeserializeIdentity -> DEBU 4bd4 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.309 UTC [gossip.comm] Send -> DEBU 4bd5 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [msp] DeserializeIdentity -> DEBU 4bd6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [gossip.comm] Send -> DEBU 4bd7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4bd8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4bd9 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4bda Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4bdb Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.317 UTC [gossip.comm] func1 -> DEBU 4bdc Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.317 UTC [gossip.gossip] handleMessage -> DEBU 4bdd Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.317 UTC [gossip.gossip] handleMessage -> DEBU 4bde Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.317 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bdf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.318 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4be0 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [gossip.comm] func1 -> DEBU 4be1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [gossip.gossip] handleMessage -> DEBU 4be2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [gossip.gossip] handleMessage -> DEBU 4be3 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4be4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4be5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [msp] DeserializeIdentity -> DEBU 4be6 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4be7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4be8 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4be9 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4bea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4beb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4bec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func1 -> DEBU 4bed 0xc004ad0270 gate 1563590462503622200 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func2 -> DEBU 4bee 0xc004ad0270 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func2 -> DEBU 4bef 0xc004ad0270 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func2 -> DEBU 4bf0 0xc004ad0270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func2 -> DEBU 4bf1 0xc004ad0270 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func1 -> DEBU 4bf2 0xc004ad0270 gate 1563590462503622200 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4bf3 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4bf4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4bf5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func1 -> DEBU 4bf6 0xc004ad0ab0 gate 1563590462503967000 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4bf7 0xc004ad0ab0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4bf8 0xc004ad0ab0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4bf9 0xc004ad0ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4bfa 0xc004ad0ab0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func1 -> DEBU 4bfb 0xc004ad0ab0 gate 1563590462503967000 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [policies] Evaluate -> DEBU 4bfc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [policies] Evaluate -> DEBU 4bfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [policies] Evaluate -> DEBU 4bfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func1 -> DEBU 4bff 0xc004ad12f0 gate 1563590462504431900 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4c00 0xc004ad12f0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4c01 0xc004ad12f0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4c02 0xc004ad12f0 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [msp.identity] Verify -> DEBU 4c03 Verify: digest = 00000000 d0 02 84 cb 74 8a 21 d9 19 7f 8e a6 1c e1 4a 45 |....t.!.......JE| -peer0.org1.example.com | 00000010 96 b9 11 bd e5 ab d1 28 2a 71 6d b1 a3 70 da 2e |.......(*qm..p..|" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [msp.identity] Verify -> DEBU 4c04 Verify: sig = 00000000 30 44 02 20 1f dd b9 08 93 16 72 6b 83 bf ec 03 |0D. ......rk....| -peer0.org1.example.com | 00000010 35 78 ec ae 15 da 14 aa 23 fe 94 01 62 67 8e 6a |5x......#...bg.j| -peer0.org1.example.com | 00000020 af 0a e6 99 02 20 11 6d 10 0c 30 3f 2f 72 44 97 |..... .m..0?/rD.| -peer0.org1.example.com | 00000030 ea 26 af 35 ce e3 d7 64 93 e2 e7 a6 81 7d 83 4d |.&.5...d.....}.M| -peer0.org1.example.com | 00000040 bf 21 00 f4 cb b4 |.!....|" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4c05 0xc004ad12f0 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func1 -> DEBU 4c06 0xc004ad12f0 gate 1563590462504431900 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [policies] Evaluate -> DEBU 4c07 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [policies] Evaluate -> DEBU 4c08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:02.507 UTC [gossip.comm] func1 -> DEBU 4c09 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.507 UTC [gossip.gossip] handleMessage -> DEBU 4c0a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.507 UTC [policies] Evaluate -> DEBU 4c0b Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:02.507 UTC [policies] Evaluate -> DEBU 4c0c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c0d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c0e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c0f updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c10 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c11 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c12 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c13 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c14 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c15 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c16 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.gossip] handleMessage -> DEBU 4c17 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.517 UTC [gossip.gossip] handleMessage -> DEBU 4c18 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.518 UTC [gossip.gossip] handleMessage -> DEBU 4c19 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.518 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c1a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.518 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c1b Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.518 UTC [msp] DeserializeIdentity -> DEBU 4c1c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c1d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c1e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c1f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c20 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c21 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c22 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] Send -> DEBU 4c23 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c24 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] Send -> DEBU 4c25 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] sendToEndpoint -> DEBU 4c26 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] sendToEndpoint -> DEBU 4c27 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] sendToEndpoint -> DEBU 4c28 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] sendToEndpoint -> DEBU 4c29 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [gossip.comm] func1 -> DEBU 4c2a Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\256\260\003r\013\361\214\310O\236\020\207IeiJ\323\252)\214X\320\264\023d\323$\364\276\341\260\365\002 '\257\370\336\000\001\222a!\2335\336\377\357\302O\256\301\337\260,u\221J-\225K\026l{\240\260" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [gossip.gossip] handleMessage -> DEBU 4c2b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\256\260\003r\013\361\214\310O\236\020\207IeiJ\323\252)\214X\320\264\023d\323$\364\276\341\260\365\002 '\257\370\336\000\001\222a!\2335\336\377\357\302O\256\301\337\260,u\221J-\225K\026l{\240\260" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [gossip.gossip] handleMessage -> DEBU 4c2c Exiting" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c2d Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\256\260\003r\013\361\214\310O\236\020\207IeiJ\323\252)\214X\320\264\023d\323$\364\276\341\260\365\002 '\257\370\336\000\001\222a!\2335\336\377\357\302O\256\301\337\260,u\221J-\225K\026l{\240\260" > > , Envelope: 166 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c2e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [msp] DeserializeIdentity -> DEBU 4c2f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c30 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c31 Got policy manager for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c32 Got reader policy for channel [businesschannel] with flag [true]" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [policies] Evaluate -> DEBU 4c33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [policies] Evaluate -> DEBU 4c34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [policies] Evaluate -> DEBU 4c35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [cauthdsl] func1 -> DEBU 4c36 0xc004b087b0 gate 1563590463908931800 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c37 0xc004b087b0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c38 0xc004b087b0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c39 0xc004b087b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c3a 0xc004b087b0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func1 -> DEBU 4c3b 0xc004b087b0 gate 1563590463908931800 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c3c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func1 -> DEBU 4c3f 0xc004b08ff0 gate 1563590463909418300 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c40 0xc004b08ff0 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c41 0xc004b08ff0 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c42 0xc004b08ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c43 0xc004b08ff0 principal evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func1 -> DEBU 4c44 0xc004b08ff0 gate 1563590463909418300 evaluation fails" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c45 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func1 -> DEBU 4c48 0xc004b09830 gate 1563590463909744600 evaluation starts" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c49 0xc004b09830 signed by 0 principal evaluation starts (used [false])" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c4a 0xc004b09830 processing identity 0 with bytes of 114b950" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c4b 0xc004b09830 principal matched by identity 0" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [msp.identity] Verify -> DEBU 4c4c Verify: digest = 00000000 e0 13 25 18 e6 02 68 31 8a 7e 00 4a 75 45 d6 94 |..%...h1.~.JuE..| -peer0.org1.example.com | 00000010 cb 59 4c 08 23 6c 5d 8d 66 d6 2f 4d 09 7d 10 65 |.YL.#l].f./M.}.e|" -peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [msp.identity] Verify -> DEBU 4c4d Verify: sig = 00000000 30 45 02 21 00 ae b0 03 72 0b f1 8c c8 4f 9e 10 |0E.!....r....O..| -peer0.org1.example.com | 00000010 87 49 65 69 4a d3 aa 29 8c 58 d0 b4 13 64 d3 24 |.IeiJ..).X...d.$| -peer0.org1.example.com | 00000020 f4 be e1 b0 f5 02 20 27 af f8 de 00 01 92 61 21 |...... '......a!| -peer0.org1.example.com | 00000030 9b 35 de ff ef c2 4f ae c1 df b0 2c 75 91 4a 2d |.5....O....,u.J-| -peer0.org1.example.com | 00000040 95 4b 16 6c 7b a0 b0 |.K.l{..|" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [cauthdsl] func2 -> DEBU 4c4e 0xc004b09830 principal evaluation succeeds for identity 0" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [cauthdsl] func1 -> DEBU 4c4f 0xc004b09830 gate 1563590463909744600 evaluation succeeds" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [policies] Evaluate -> DEBU 4c50 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [policies] Evaluate -> DEBU 4c51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [policies] Evaluate -> DEBU 4c52 Signature set satisfies policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [policies] Evaluate -> DEBU 4c53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c54 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c55 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c56 updating membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c57 Updating aliveness data: membership: timestamp: " -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c58 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c59 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c5a Exiting" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c5b Exiting" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] sendMemResponse -> DEBU 4c5c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [msp] DeserializeIdentity -> DEBU 4c5d Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [msp] DeserializeIdentity -> DEBU 4c5e Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:03.911 UTC [msp] DeserializeIdentity -> DEBU 4c5f Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:03.911 UTC [gossip.comm] Send -> DEBU 4c60 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -peer0.org1.example.com | "2019-07-20 02:41:03.911 UTC [gossip.discovery] sendMemResponse -> DEBU 4c61 Exiting, replying with alive:" signature:"0E\002!\000\256\260\003r\013\361\214\310O\236\020\207IeiJ\323\252)\214X\320\264\023d\323$\364\276\341\260\365\002 '\257\370\336\000\001\222a!\2335\336\377\357\302O\256\301\337\260,u\221J-\225K\026l{\240\260" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020>" signature:"0E\002!\000\277\242dG\037\264(Sq\353C_)\243\250\206\030\3647\302\352\255\341\242\211\226jn\224`s\357\002 OZ\233\031\224\032\036\273\223\226\266dS\013\302\255nn\251\027\206n\037\325-\314\360\343\372i/&" > alive: alive: " -peer0.org1.example.com | "2019-07-20 02:41:03.911 UTC [gossip.comm] sendToEndpoint -> DEBU 4c62 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:03.911 UTC [gossip.comm] sendToEndpoint -> DEBU 4c63 Exiting" -peer0.org1.example.com | "2019-07-20 02:41:03.922 UTC [gossip.comm] func1 -> DEBU 4c64 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:03.922 UTC [gossip.gossip] handleMessage -> DEBU 4c65 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:03.922 UTC [gossip.pull] HandleMessage -> DEBU 4c66 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -peer0.org1.example.com | "2019-07-20 02:41:03.922 UTC [msp] DeserializeIdentity -> DEBU 4c67 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:03.922 UTC [msp] DeserializeIdentity -> DEBU 4c68 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [msp] DeserializeIdentity -> DEBU 4c69 Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [msp] DeserializeIdentity -> DEBU 4c6a Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [msp] DeserializeIdentity -> DEBU 4c6b Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [msp] DeserializeIdentity -> DEBU 4c6c Obtaining identity" -peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [gossip.pull] SendDigest -> DEBU 4c6d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [gossip.gossip] handleMessage -> DEBU 4c6e Exiting" +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.common.cluster] updateStubInMapping -> INFO 038 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.common.cluster] updateStubInMapping -> INFO 039 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03a Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03b Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +peer0.org1.example.com | "2019-09-24 00:24:51.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 200 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:51.631 UTC [gossip.discovery] isSentByMe -> DEBU 201 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:51.631 UTC [gossip.discovery] handleAliveMessage -> DEBU 202 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:51.631 UTC [gossip.discovery] handleMsgFromComm -> DEBU 203 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:52.709 UTC [gossip.gossip] handleMessage -> DEBU 204 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:52.709 UTC [gossip.gossip] handleMessage -> DEBU 205 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:52.709 UTC [gossip.discovery] handleMsgFromComm -> DEBU 206 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:52.709 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 207 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:24:52.709 UTC [msp.identity] Verify -> DEBU 208 Verify: digest = 00000000 dc a1 de d5 fb 1b 7a 13 37 cb 10 d6 ef ff eb 9e |......z.7.......| +peer0.org1.example.com | 00000010 f4 26 17 4b d1 cf 6f a7 df 18 3c 9d 44 dd 45 7b |.&.K..o...<.D.E{|" +peer0.org1.example.com | "2019-09-24 00:24:52.709 UTC [msp.identity] Verify -> DEBU 209 Verify: sig = 00000000 30 45 02 21 00 cc 33 30 40 ef 14 da 2d c1 5e ea |0E.!..30@...-.^.| +peer0.org1.example.com | 00000010 42 ff 2e 8e da 0a 8d c4 13 87 5e 25 9a 81 d4 ef |B.........^%....| +peer0.org1.example.com | 00000020 0e 16 2b 3c ed 02 20 0a 59 67 c1 9e d8 ee 2b 9a |..+<.. .Yg....+.| +peer0.org1.example.com | 00000030 1c 7f 01 27 0c 63 95 75 3b 85 be a3 83 aa 62 6b |...'.c.u;.....bk| +peer0.org1.example.com | 00000040 fd ed e1 85 62 b5 fc |....b..|" +peer0.org1.example.com | "2019-09-24 00:24:52.710 UTC [msp.identity] Verify -> DEBU 20a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:24:52.710 UTC [msp.identity] Verify -> DEBU 20b Verify: sig = 00000000 30 44 02 20 0f ed c3 0a 5f 87 c1 72 89 d7 1b 57 |0D. ...._..r...W| +peer0.org1.example.com | 00000010 a1 7d b4 9b c3 05 52 60 54 78 35 1b cc 69 79 ae |.}....R`Tx5..iy.| +peer0.org1.example.com | 00000020 df de 21 71 02 20 55 d9 e9 d5 da 51 bf c0 45 76 |..!q. U....Q..Ev| +peer0.org1.example.com | 00000030 c4 a4 00 23 e2 de b9 98 d4 6c d0 f5 4b 90 d6 8a |...#.....l..K...| +peer0.org1.example.com | 00000040 02 5e b9 aa bb b2 |.^....|" +peer0.org1.example.com | "2019-09-24 00:24:52.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 20c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:52.711 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:24:52.711 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:24:52.711 UTC [gossip.discovery] learnExistingMembers -> DEBU 20f Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:24:52.711 UTC [gossip.discovery] learnExistingMembers -> DEBU 210 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:24:52.711 UTC [gossip.discovery] learnExistingMembers -> DEBU 211 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:52.711 UTC [gossip.discovery] handleAliveMessage -> DEBU 212 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:52.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 213 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:53.701 UTC [gossip.gossip] handleMessage -> DEBU 214 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:53.701 UTC [gossip.pull] HandleMessage -> DEBU 215 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:53.701 UTC [gossip.pull] SendDigest -> DEBU 216 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:24:53.702 UTC [gossip.gossip] handleMessage -> DEBU 217 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:53.714 UTC [gossip.gossip] handleMessage -> DEBU 218 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\n" signature:"0E\002!\000\335\3070L\025\323\034\016\275\271U\027\324,\302\263\217`\361\255\334\241\317\276n\377\267i\224\266\202L\002 \026\031!Q\033\232~\025x\265\351\001\252\2271\266!\213E\360\2160m\037\252K\205\245\277\276=L" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03c 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.common.cluster] Configure -> INFO 03e Exiting" +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.consensus.etcdraft] start -> INFO 03f Starting raft node as part of a new channel" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 040 3 became follower at term 0" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.consensus.etcdraft] newRaft -> INFO 041 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:53.457 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 042 3 became follower at term 1" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:53.466 UTC [orderer.consensus.etcdraft] apply -> INFO 043 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:53.467 UTC [orderer.consensus.etcdraft] apply -> INFO 044 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:53.467 UTC [orderer.consensus.etcdraft] apply -> INFO 045 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] Step -> INFO 046 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:54.492 UTC [orderer.consensus.etcdraft] Step -> INFO 047 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:54.492 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 048 3 became follower at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:54.492 UTC [orderer.consensus.etcdraft] Step -> INFO 049 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:54.500 UTC [orderer.consensus.etcdraft] run -> INFO 04a raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:24:54.501 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 04b Raft leader changed: 0 -> 1" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:25:04.466 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04c Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:25:07.072 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04d Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:26:59.092 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04e Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:27:01.964 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04f Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:27:04.537 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 050 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:27:19.432 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 051 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 00:27:19.433 UTC [cauthdsl] deduplicate -> WARN 052 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer2.example.com | "2019-09-24 00:27:19.434 UTC [cauthdsl] deduplicate -> WARN 053 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | 2019-09-24 00:24:33.870 UTC [viperutil] getKeysRecursively -> DEBU 02b Found map[string]interface{} value for general.BCCSP +orderer0.example.com | 2019-09-24 00:24:33.870 UTC [viperutil] unmarshalJSON -> DEBU 02c Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.870 UTC [viperutil] getKeysRecursively -> DEBU 02d Found real value for general.BCCSP.Default setting to string SW +orderer0.example.com | 2019-09-24 00:24:33.870 UTC [viperutil] getKeysRecursively -> DEBU 02e Found map[string]interface{} value for general.BCCSP.SW +orderer0.example.com | 2019-09-24 00:24:33.871 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value is not a string: 256 +orderer0.example.com | 2019-09-24 00:24:33.871 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for general.BCCSP.SW.Security setting to int 256 +orderer0.example.com | 2019-09-24 00:24:33.872 UTC [viperutil] getKeysRecursively -> DEBU 031 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +orderer0.example.com | 2019-09-24 00:24:33.873 UTC [viperutil] unmarshalJSON -> DEBU 032 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.873 UTC [viperutil] getKeysRecursively -> DEBU 033 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +orderer0.example.com | 2019-09-24 00:24:33.873 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.873 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +orderer0.example.com | 2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 036 Found map[string]interface{} value for general.Keepalive +orderer0.example.com | 2019-09-24 00:24:33.874 UTC [viperutil] unmarshalJSON -> DEBU 037 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 038 Found real value for general.Keepalive.ServerTimeout setting to string 20s +orderer0.example.com | 2019-09-24 00:24:33.874 UTC [viperutil] unmarshalJSON -> DEBU 039 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 03a Found real value for general.Keepalive.ServerMinInterval setting to string 60s +orderer0.example.com | 2019-09-24 00:24:33.874 UTC [viperutil] unmarshalJSON -> DEBU 03b Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 03c Found real value for general.Keepalive.ServerInterval setting to string 7200s +orderer0.example.com | 2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 03d Found map[string]interface{} value for general.Cluster +orderer0.example.com | 2019-09-24 00:24:33.874 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for general.Cluster.ServerPrivateKey setting to +orderer0.example.com | 2019-09-24 00:24:33.874 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2019-09-24 00:24:33.875 UTC [viperutil] unmarshalJSON -> DEBU 042 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 043 Found real value for general.Cluster.RPCTimeout setting to +orderer0.example.com | 2019-09-24 00:24:33.875 UTC [viperutil] unmarshalJSON -> DEBU 044 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 045 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +orderer0.example.com | 2019-09-24 00:24:33.875 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value is not a string: 10 +orderer0.example.com | 2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for general.Cluster.SendBufferSize setting to int 10 +orderer0.example.com | 2019-09-24 00:24:33.875 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2019-09-24 00:24:33.875 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for general.Cluster.ListenAddress setting to +orderer0.example.com | 2019-09-24 00:24:33.876 UTC [viperutil] unmarshalJSON -> DEBU 04c Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.876 UTC [viperutil] getKeysRecursively -> DEBU 04d Found real value for general.Cluster.DialTimeout setting to +orderer0.example.com | 2019-09-24 00:24:33.876 UTC [viperutil] unmarshalJSON -> DEBU 04e Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.876 UTC [viperutil] getKeysRecursively -> DEBU 04f Found real value for general.Cluster.ReplicationBufferSize setting to +orderer0.example.com | 2019-09-24 00:24:33.876 UTC [viperutil] unmarshalJSON -> DEBU 050 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.876 UTC [viperutil] getKeysRecursively -> DEBU 051 Found real value for general.Cluster.ReplicationPullTimeout setting to +orderer0.example.com | 2019-09-24 00:24:33.877 UTC [viperutil] unmarshalJSON -> DEBU 052 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.877 UTC [viperutil] getKeysRecursively -> DEBU 053 Found real value for general.Cluster.ListenPort setting to +orderer0.example.com | 2019-09-24 00:24:33.877 UTC [viperutil] unmarshalJSON -> DEBU 054 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.877 UTC [viperutil] getKeysRecursively -> DEBU 055 Found real value for general.Cluster.ReplicationRetryTimeout setting to +peer0.org1.example.com | "2019-09-24 00:24:53.715 UTC [gossip.gossip] handleMessage -> DEBU 219 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:53.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21a Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\n" signature:"0E\002!\000\335\3070L\025\323\034\016\275\271U\027\324,\302\263\217`\361\255\334\241\317\276n\377\267i\224\266\202L\002 \026\031!Q\033\232~\025x\265\351\001\252\2271\266!\213E\360\2160m\037\252K\205\245\277\276=L" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:53.715 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:24:53.715 UTC [msp.identity] Verify -> DEBU 21c Verify: digest = 00000000 a1 da 56 c6 71 a2 94 fb 17 46 4b 86 d8 06 f2 55 |..V.q....FK....U| +peer0.org1.example.com | 00000010 11 a3 9b c8 d5 d0 fd 0b 8e 3e 3e a9 da 03 8a 07 |.........>>.....|" +peer0.org1.example.com | "2019-09-24 00:24:53.715 UTC [msp.identity] Verify -> DEBU 21d Verify: sig = 00000000 30 45 02 21 00 dd c7 30 4c 15 d3 1c 0e bd b9 55 |0E.!...0L......U| +peer0.org1.example.com | 00000010 17 d4 2c c2 b3 8f 60 f1 ad dc a1 cf be 6e ff b7 |..,...`......n..| +peer0.org1.example.com | 00000020 69 94 b6 82 4c 02 20 16 19 21 51 1b 9a 7e 15 78 |i...L. ..!Q..~.x| +peer0.org1.example.com | 00000030 b5 e9 01 aa 97 31 b6 21 8b 45 f0 8e 30 6d 1f aa |.....1.!.E..0m..| +peer0.org1.example.com | 00000040 4b 85 a5 bf be 3d 4c |K....=L|" +peer0.org1.example.com | "2019-09-24 00:24:53.716 UTC [msp.identity] Verify -> DEBU 21e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:24:53.717 UTC [msp.identity] Verify -> DEBU 21f Verify: sig = 00000000 30 44 02 20 6b c8 82 75 33 e3 fc ea 12 01 26 01 |0D. k..u3.....&.| +peer0.org1.example.com | 00000010 ae b2 5d 98 ef 14 76 5f cf 6c 1b a3 2f b0 28 7b |..]...v_.l../.({| +peer0.org1.example.com | 00000020 17 6a 4f 52 02 20 34 61 67 76 90 35 5c a1 84 91 |.jOR. 4agv.5\...| +peer0.org1.example.com | 00000030 dc ff 1e 4a 77 73 a3 72 ba f0 11 fc db e8 9c 01 |...Jws.r........| +peer0.org1.example.com | 00000040 a7 66 8f 4c c4 08 |.f.L..|" +peer0.org1.example.com | "2019-09-24 00:24:53.717 UTC [gossip.discovery] handleAliveMessage -> DEBU 220 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:53.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 221 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:24:53.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 222 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:24:53.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 223 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:24:53.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 224 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:24:53.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 225 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:53.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 226 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:53.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:53.718 UTC [gossip.discovery] sendMemResponse -> DEBU 228 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:24:53.718 UTC [gossip.comm] Send -> DEBU 229 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:53.718 UTC [gossip.discovery] sendMemResponse -> DEBU 22a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\n" signature:"0E\002!\000\335\3070L\025\323\034\016\275\271U\027\324,\302\263\217`\361\255\334\241\317\276n\377\267i\224\266\202L\002 \026\031!Q\033\232~\025x\265\351\001\252\2271\266!\213E\360\2160m\037\252K\205\245\277\276=L" secret_envelope: > alive: > " +peer0.org1.example.com | "2019-09-24 00:24:53.718 UTC [gossip.comm] sendToEndpoint -> DEBU 22b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:53.718 UTC [gossip.comm] sendToEndpoint -> DEBU 22c Exiting" +peer0.org1.example.com | "2019-09-24 00:24:54.601 UTC [msp] GetDefaultSigningIdentity -> DEBU 22d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:54.601 UTC [msp.identity] Sign -> DEBU 22e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100A " +peer0.org1.example.com | "2019-09-24 00:24:54.602 UTC [msp.identity] Sign -> DEBU 22f Sign: digest: D680FB7776390040C6727C6659081B2D67D9B7AF7A301102E4D5B44085EE2DE9 " +peer0.org1.example.com | "2019-09-24 00:24:54.602 UTC [msp] GetDefaultSigningIdentity -> DEBU 230 Obtaining default signing identity" +orderer0.example.com | 2019-09-24 00:24:33.877 UTC [viperutil] unmarshalJSON -> DEBU 056 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.877 UTC [viperutil] getKeysRecursively -> DEBU 057 Found real value for general.Cluster.ReplicationMaxRetries setting to +orderer0.example.com | 2019-09-24 00:24:33.877 UTC [viperutil] unmarshalJSON -> DEBU 058 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 059 Found real value for general.Cluster.ServerCertificate setting to +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] unmarshalJSON -> DEBU 05a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 05b Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] unmarshalJSON -> DEBU 05c Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 05d Found real value for general.Cluster.CertExpirationWarningThreshold setting to +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 05e Found map[interface{}]interface{} value for fileledger +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 063 Found map[interface{}]interface{} value for ramledger +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] unmarshalJSON -> DEBU 064 Unmarshal JSON: value is not a string: 1000 +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 065 Found real value for ramledger.HistorySize setting to int 1000 +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 066 Found map[interface{}]interface{} value for kafka +orderer0.example.com | 2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 067 Found map[string]interface{} value for kafka.Topic +orderer0.example.com | 2019-09-24 00:24:33.889 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-09-24 00:24:33.889 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +orderer0.example.com | 2019-09-24 00:24:33.889 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 00:24:33.889 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for kafka.Verbose setting to bool false +orderer0.example.com | 2019-09-24 00:24:33.890 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[string]interface{} value for kafka.TLS +orderer0.example.com | 2019-09-24 00:24:33.890 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 00:24:33.890 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for kafka.TLS.Enabled setting to bool false +orderer0.example.com | 2019-09-24 00:24:33.890 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.892 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for kafka.TLS.PrivateKey setting to +orderer0.example.com | 2019-09-24 00:24:33.892 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.892 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for kafka.TLS.Certificate setting to +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for kafka.TLS.RootCAs setting to +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for kafka.TLS.ClientAuthRequired setting to +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 077 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 078 Found real value for kafka.TLS.ClientRootCAs setting to +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 079 Found map[string]interface{} value for kafka.SASLPlain +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for kafka.SASLPlain.Password setting to +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 07c Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 07d Found real value for kafka.SASLPlain.Enabled setting to bool false +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 07e Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 07f Found real value for kafka.SASLPlain.User setting to +orderer0.example.com | 2019-09-24 00:24:33.894 UTC [viperutil] unmarshalJSON -> DEBU 080 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.894 UTC [viperutil] getKeysRecursively -> DEBU 081 Found real value for kafka.Version setting to +orderer0.example.com | 2019-09-24 00:24:33.894 UTC [viperutil] getKeysRecursively -> DEBU 082 Found map[string]interface{} value for kafka.Retry +orderer0.example.com | 2019-09-24 00:24:33.894 UTC [viperutil] getKeysRecursively -> DEBU 083 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +orderer0.example.com | 2019-09-24 00:24:33.899 UTC [viperutil] unmarshalJSON -> DEBU 084 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.899 UTC [viperutil] getKeysRecursively -> DEBU 085 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +peer0.org1.example.com | "2019-09-24 00:24:54.602 UTC [msp.identity] Sign -> DEBU 231 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:54.602 UTC [msp.identity] Sign -> DEBU 232 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:54.602 UTC [gossip.discovery] periodicalSendAlive -> DEBU 233 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:24:54.606 UTC [gossip.comm] Send -> DEBU 234 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:54.607 UTC [gossip.comm] sendToEndpoint -> DEBU 235 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:54.607 UTC [gossip.comm] sendToEndpoint -> DEBU 236 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:55.602 UTC [gossip.pull] Hello -> DEBU 237 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:24:55.602 UTC [gossip.comm] Send -> DEBU 238 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:55.602 UTC [gossip.comm] sendToEndpoint -> DEBU 239 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:55.602 UTC [gossip.comm] sendToEndpoint -> DEBU 23a Exiting" +peer0.org1.example.com | "2019-09-24 00:24:55.603 UTC [gossip.gossip] handleMessage -> DEBU 23b Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:55.603 UTC [gossip.pull] HandleMessage -> DEBU 23c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:55.604 UTC [gossip.gossip] handleMessage -> DEBU 23d Exiting" +peer0.org1.example.com | "2019-09-24 00:24:55.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 23e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:55.608 UTC [msp.identity] Sign -> DEBU 23f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100B " +peer0.org1.example.com | "2019-09-24 00:24:55.608 UTC [msp.identity] Sign -> DEBU 240 Sign: digest: DBA9DE676A5B47320152C50EE17B49DD2DD84F7FDE16237B35323A8867A9CB30 " +peer0.org1.example.com | "2019-09-24 00:24:55.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 241 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:55.608 UTC [msp.identity] Sign -> DEBU 242 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:55.608 UTC [msp.identity] Sign -> DEBU 243 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:55.609 UTC [gossip.comm] Send -> DEBU 244 Entering, sending GossipMessage: tag:EMPTY mem_req:L\327\252g\007lx\304\"\007\023\346\003\313\313c" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:55.609 UTC [gossip.comm] sendToEndpoint -> DEBU 245 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:L\327\252g\007lx\304\"\007\023\346\003\313\313c" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:55.609 UTC [gossip.comm] sendToEndpoint -> DEBU 246 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:55.619 UTC [gossip.gossip] handleMessage -> DEBU 247 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:55.619 UTC [gossip.gossip] handleMessage -> DEBU 248 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:55.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 249 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:55.620 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:24:55.627 UTC [msp.identity] Verify -> DEBU 24b Verify: digest = 00000000 db a9 de 67 6a 5b 47 32 01 52 c5 0e e1 7b 49 dd |...gj[G2.R...{I.| +peer0.org1.example.com | 00000010 2d d8 4f 7f de 16 23 7b 35 32 3a 88 67 a9 cb 30 |-.O...#{52:.g..0|" +peer0.org1.example.com | "2019-09-24 00:24:55.647 UTC [msp.identity] Verify -> DEBU 24c Verify: sig = 00000000 30 44 02 20 72 4d 15 2b 66 9f 75 21 45 5d 87 52 |0D. rM.+f.u!E].R| +peer0.org1.example.com | 00000010 4e 3a 8d f6 eb 2e 4f 90 25 50 38 11 f4 52 8f fd |N:....O.%P8..R..| +peer0.org1.example.com | 00000020 a0 b7 0c 21 02 20 21 bb 0c 68 3c 25 99 c2 19 07 |...!. !..h<%....| +peer0.org1.example.com | 00000030 c0 79 81 e8 90 3e 4c d7 aa 67 07 6c 78 c4 22 07 |.y...>L..g.lx.".| +peer0.org1.example.com | 00000040 13 e6 03 cb cb 63 |.....c|" +peer0.org1.example.com | "2019-09-24 00:24:55.647 UTC [msp.identity] Verify -> DEBU 24d Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:24:55.648 UTC [msp.identity] Verify -> DEBU 24e Verify: sig = 00000000 30 45 02 21 00 87 7b f1 2e 7e 5d a1 91 b4 56 e6 |0E.!..{..~]...V.| +peer0.org1.example.com | 00000010 09 83 6b 53 c2 e1 ed 18 bc 16 13 b5 ee ed 2d 10 |..kS..........-.| +peer0.org1.example.com | 00000020 3d a0 8e a0 e6 02 20 2e fb e4 03 4a 7e de f0 7f |=..... ....J~...| +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 08a Found map[string]interface{} value for kafka.Retry.Metadata +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 08b Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 08c Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 08d Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 08e Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 08f Found map[string]interface{} value for kafka.Retry.Producer +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 090 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 091 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 092 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 093 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +orderer0.example.com | 2019-09-24 00:24:33.901 UTC [viperutil] getKeysRecursively -> DEBU 094 Found map[string]interface{} value for kafka.Retry.Consumer +orderer0.example.com | 2019-09-24 00:24:33.902 UTC [viperutil] unmarshalJSON -> DEBU 095 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.902 UTC [viperutil] getKeysRecursively -> DEBU 096 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +orderer0.example.com | 2019-09-24 00:24:33.902 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.902 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for kafka.Retry.ShortInterval setting to string 5s +orderer0.example.com | 2019-09-24 00:24:33.902 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.902 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for kafka.Retry.ShortTotal setting to string 10m +orderer0.example.com | 2019-09-24 00:24:33.902 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.902 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for kafka.Retry.LongInterval setting to string 5m +orderer0.example.com | 2019-09-24 00:24:33.902 UTC [viperutil] unmarshalJSON -> DEBU 09d Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.902 UTC [viperutil] getKeysRecursively -> DEBU 09e Found real value for kafka.Retry.LongTotal setting to string 12h +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 09f Found map[interface{}]interface{} value for debug +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for debug.BroadcastTraceDir setting to +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for debug.DeliverTraceDir setting to +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found map[interface{}]interface{} value for operations +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found map[string]interface{} value for operations.TLS +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0a8 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found real value for operations.TLS.Enabled setting to bool false +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for operations.TLS.Certificate setting to +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for operations.TLS.PrivateKey setting to +orderer0.example.com | 2019-09-24 00:24:33.904 UTC [viperutil] unmarshalJSON -> DEBU 0ae Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 00:24:33.904 UTC [viperutil] getKeysRecursively -> DEBU 0af Found real value for operations.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2019-09-24 00:24:33.904 UTC [viperutil] unmarshalJSON -> DEBU 0b0 Unmarshal JSON: value is not a string: [] +orderer0.example.com | 2019-09-24 00:24:33.904 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +orderer0.example.com | 2019-09-24 00:24:33.905 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for operations.TLS.RootCAs setting to +orderer0.example.com | 2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0b4 Found map[interface{}]interface{} value for metrics +orderer0.example.com | 2019-09-24 00:24:33.905 UTC [viperutil] unmarshalJSON -> DEBU 0b5 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0b6 Found real value for metrics.Provider setting to string prometheus +orderer0.example.com | 2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found map[string]interface{} value for metrics.Statsd +orderer0.example.com | 2019-09-24 00:24:33.905 UTC [viperutil] unmarshalJSON -> DEBU 0b8 Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found real value for metrics.Statsd.Network setting to string udp +orderer0.example.com | 2019-09-24 00:24:33.905 UTC [viperutil] unmarshalJSON -> DEBU 0ba Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0bb Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +orderer0.example.com | 2019-09-24 00:24:33.910 UTC [viperutil] unmarshalJSON -> DEBU 0bc Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 00:24:33.910 UTC [viperutil] getKeysRecursively -> DEBU 0bd Found real value for metrics.Statsd.WriteInterval setting to string 30s +orderer0.example.com | 2019-09-24 00:24:33.910 UTC [viperutil] unmarshalJSON -> DEBU 0be Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 00:24:33.910 UTC [viperutil] getKeysRecursively -> DEBU 0bf Found real value for metrics.Statsd.Prefix setting to +orderer0.example.com | 2019-09-24 00:24:33.910 UTC [viperutil] getKeysRecursively -> DEBU 0c0 Found map[interface{}]interface{} value for consensus +orderer0.example.com | 2019-09-24 00:24:33.910 UTC [viperutil] unmarshalJSON -> DEBU 0c1 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.910 UTC [viperutil] getKeysRecursively -> DEBU 0c2 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +orderer0.example.com | 2019-09-24 00:24:33.910 UTC [viperutil] unmarshalJSON -> DEBU 0c3 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 00:24:33.910 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +orderer0.example.com | 2019-09-24 00:24:33.910 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0c5 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress: ListenPort: RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate: ServerPrivateKey:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +orderer0.example.com | 2019-09-24 00:24:33.911 UTC [localconfig] completeInitialization -> INFO 0c6 Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2019-09-24 00:24:33.932 UTC [bccsp_sw] openKeyStore -> DEBU 0c7 KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +orderer0.example.com | "2019-09-24 00:24:33.935 UTC [bccsp] initBCCSP -> DEBU 0c8 Initialize BCCSP [SW]" +orderer0.example.com | "2019-09-24 00:24:33.935 UTC [msp] getPemMaterialFromDir -> DEBU 0c9 Reading directory /var/hyperledger/orderer/msp/signcerts" +orderer0.example.com | "2019-09-24 00:24:33.945 UTC [msp] getPemMaterialFromDir -> DEBU 0ca Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +orderer0.example.com | "2019-09-24 00:24:33.961 UTC [msp] getPemMaterialFromDir -> DEBU 0cb Reading directory /var/hyperledger/orderer/msp/cacerts" +orderer0.example.com | "2019-09-24 00:24:33.973 UTC [msp] getPemMaterialFromDir -> DEBU 0cc Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +orderer0.example.com | "2019-09-24 00:24:34.055 UTC [msp] getPemMaterialFromDir -> DEBU 0cd Reading directory /var/hyperledger/orderer/msp/admincerts" +orderer0.example.com | "2019-09-24 00:24:34.069 UTC [msp] getPemMaterialFromDir -> DEBU 0ce Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +orderer0.example.com | "2019-09-24 00:24:34.079 UTC [msp] getPemMaterialFromDir -> DEBU 0cf Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +orderer0.example.com | "2019-09-24 00:24:34.092 UTC [msp] getMspConfig -> DEBU 0d0 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +orderer0.example.com | "2019-09-24 00:24:34.093 UTC [msp] getPemMaterialFromDir -> DEBU 0d1 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +orderer0.example.com | "2019-09-24 00:24:34.130 UTC [msp] getPemMaterialFromDir -> DEBU 0d2 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +orderer0.example.com | "2019-09-24 00:24:34.182 UTC [msp] getPemMaterialFromDir -> DEBU 0d3 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +orderer0.example.com | "2019-09-24 00:24:34.184 UTC [msp] getMspConfig -> DEBU 0d4 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +orderer0.example.com | "2019-09-24 00:24:34.184 UTC [msp] getPemMaterialFromDir -> DEBU 0d5 Reading directory /var/hyperledger/orderer/msp/crls" +orderer0.example.com | "2019-09-24 00:24:34.185 UTC [msp] getMspConfig -> DEBU 0d6 crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +orderer0.example.com | "2019-09-24 00:24:34.186 UTC [msp] getMspConfig -> DEBU 0d7 MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +orderer0.example.com | "2019-09-24 00:24:34.186 UTC [msp] newBccspMsp -> DEBU 0d8 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.187 UTC [msp] New -> DEBU 0d9 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.187 UTC [msp] loadLocaMSP -> DEBU 0da Created new local MSP" +orderer0.example.com | "2019-09-24 00:24:34.187 UTC [msp] Setup -> DEBU 0db Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:24:34.190 UTC [msp.identity] newIdentity -> DEBU 0dc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | 00000030 c4 e6 e7 75 0d da 67 b5 06 b6 7f 68 5c c9 96 a6 |...u..g....h\...| +peer0.org1.example.com | 00000040 8e 4a b9 cb ad e5 70 |.J....p|" +peer0.org1.example.com | "2019-09-24 00:24:55.654 UTC [gossip.discovery] handleAliveMessage -> DEBU 24f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:55.655 UTC [gossip.discovery] isSentByMe -> DEBU 250 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:55.655 UTC [gossip.discovery] handleAliveMessage -> DEBU 251 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:55.655 UTC [gossip.discovery] handleMsgFromComm -> DEBU 252 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:56.080 UTC [endorser] ProcessProposal -> DEBU 253 Entering: request from 172.18.0.9:50574" +peer0.org1.example.com | "2019-09-24 00:24:56.080 UTC [protoutils] ValidateProposalMessage -> DEBU 254 ValidateProposalMessage starts for signed proposal 0xc002876be0" +peer0.org1.example.com | "2019-09-24 00:24:56.081 UTC [protoutils] validateChannelHeader -> DEBU 255 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-09-24 00:24:56.081 UTC [protoutils] checkSignatureFromCreator -> DEBU 256 begin" +peer0.org1.example.com | "2019-09-24 00:24:56.081 UTC [msp] DeserializeIdentity -> DEBU 257 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:24:56.082 UTC [msp.identity] newIdentity -> DEBU 258 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:56.083 UTC [protoutils] checkSignatureFromCreator -> DEBU 259 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:24:56.083 UTC [msp] Validate -> DEBU 25a MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:24:56.083 UTC [protoutils] checkSignatureFromCreator -> DEBU 25b creator is valid" +peer0.org1.example.com | "2019-09-24 00:24:56.084 UTC [msp.identity] Verify -> DEBU 25c Verify: digest = 00000000 d9 6d 64 89 c9 2f ac 8f df fa 33 db 86 49 7c 1c |.md../....3..I|.| +peer0.org1.example.com | 00000010 6a 14 97 98 f8 f4 08 c7 c3 79 8f 6e db 63 43 dc |j........y.n.cC.|" +peer0.org1.example.com | "2019-09-24 00:24:56.084 UTC [msp.identity] Verify -> DEBU 25d Verify: sig = 00000000 30 44 02 20 29 7d 54 06 d0 20 b4 7f 11 e4 85 fc |0D. )}T.. ......| +peer0.org1.example.com | 00000010 3d 97 ef 53 fd f3 3d 1f 6e 76 d2 c5 c5 4a 2e 15 |=..S..=.nv...J..| +peer0.org1.example.com | 00000020 8d 82 63 3e 02 20 5d 10 ba c4 b0 04 9a 0f 52 e4 |..c>. ].......R.| +peer0.org1.example.com | 00000030 ca bf ba 84 45 f3 8c c3 74 11 42 6c d8 f7 46 c7 |....E...t.Bl..F.| +peer0.org1.example.com | 00000040 57 69 65 59 28 a7 |WieY(.|" +peer0.org1.example.com | "2019-09-24 00:24:56.084 UTC [protoutils] checkSignatureFromCreator -> DEBU 25e exits successfully" +peer0.org1.example.com | "2019-09-24 00:24:56.084 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 25f validateChaincodeProposalMessage starts for proposal 0xc002755dc0, header 0xc0028774f0" +peer0.org1.example.com | "2019-09-24 00:24:56.084 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 260 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:24:56.084 UTC [endorser] preProcess -> DEBU 261 [][a328fb8f] processing txid: a328fb8fd28c939df2f0a906857e3549742ae0eb97293f619422ff975e8aa170" +peer0.org1.example.com | "2019-09-24 00:24:56.084 UTC [endorser] SimulateProposal -> DEBU 262 [][a328fb8f] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:24:56.085 UTC [endorser] callChaincode -> INFO 263 [][a328fb8f] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:24:56.085 UTC [chaincode] Execute -> DEBU 264 Entry" +peer0.org1.example.com | "2019-09-24 00:24:56.085 UTC [cscc] Invoke -> DEBU 265 Invoke function: JoinChain" +peer0.org1.example.com | "2019-09-24 00:24:56.086 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 266 Checking if identity satisfies ADMIN role for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.086 UTC [msp.identity] Verify -> DEBU 267 Verify: digest = 00000000 d9 6d 64 89 c9 2f ac 8f df fa 33 db 86 49 7c 1c |.md../....3..I|.| +peer0.org1.example.com | 00000010 6a 14 97 98 f8 f4 08 c7 c3 79 8f 6e db 63 43 dc |j........y.n.cC.|" +peer0.org1.example.com | "2019-09-24 00:24:56.086 UTC [msp.identity] Verify -> DEBU 268 Verify: sig = 00000000 30 44 02 20 29 7d 54 06 d0 20 b4 7f 11 e4 85 fc |0D. )}T.. ......| +peer0.org1.example.com | 00000010 3d 97 ef 53 fd f3 3d 1f 6e 76 d2 c5 c5 4a 2e 15 |=..S..=.nv...J..| +peer0.org1.example.com | 00000020 8d 82 63 3e 02 20 5d 10 ba c4 b0 04 9a 0f 52 e4 |..c>. ].......R.| +peer0.org1.example.com | 00000030 ca bf ba 84 45 f3 8c c3 74 11 42 6c d8 f7 46 c7 |....E...t.Bl..F.| +peer0.org1.example.com | 00000040 57 69 65 59 28 a7 |WieY(.|" +peer0.org1.example.com | "2019-09-24 00:24:56.086 UTC [ledgermgmt] CreateLedger -> INFO 269 Creating ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-09-24 00:24:56.164 UTC [fsblkstorage] newBlockfileMgr -> DEBU 26a newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +peer0.org1.example.com | "2019-09-24 00:24:56.164 UTC [kvledger.util] CreateDirIfMissing -> DEBU 26b CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" +peer0.org1.example.com | "2019-09-24 00:24:56.164 UTC [kvledger.util] logDirStatus -> DEBU 26c Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" +peer0.org1.example.com | "2019-09-24 00:24:56.164 UTC [kvledger.util] logDirStatus -> DEBU 26d After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" +peer0.org1.example.com | "2019-09-24 00:24:56.164 UTC [fsblkstorage] newBlockfileMgr -> INFO 26e Getting block information from block storage" +peer0.org1.example.com | "2019-09-24 00:24:56.164 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 26f Retrieving checkpoint info from block files" +peer0.org1.example.com | "2019-09-24 00:24:56.164 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 270 retrieveLastFileSuffix()" +peer0.org1.example.com | "2019-09-24 00:24:56.165 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 271 retrieveLastFileSuffix() - biggestFileNum = -1" +peer0.org1.example.com | "2019-09-24 00:24:56.165 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 272 Last file number found = -1" +peer0.org1.example.com | "2019-09-24 00:24:56.165 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 273 No block file found" +peer0.org1.example.com | "2019-09-24 00:24:56.165 UTC [fsblkstorage] newBlockfileMgr -> DEBU 274 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0028e18a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.193 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.230 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.236 UTC [bccsp_sw] loadPrivateKey -> DEBU 0df Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." +orderer0.example.com | "2019-09-24 00:24:34.254 UTC [msp.identity] newIdentity -> DEBU 0e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.255 UTC [msp] setupSigningIdentity -> DEBU 0e1 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +orderer0.example.com | "2019-09-24 00:24:34.255 UTC [msp] Validate -> DEBU 0e2 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.256 UTC [orderer.common.server] prettyPrintStruct -> INFO 0e3 Orderer config values: +orderer0.example.com | General.LedgerType = "file" +orderer0.example.com | General.ListenAddress = "0.0.0.0" +orderer0.example.com | General.ListenPort = 7050 +orderer0.example.com | General.TLS.Enabled = true +orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.TLS.ClientAuthRequired = false +orderer0.example.com | General.TLS.ClientRootCAs = [] +orderer0.example.com | General.Cluster.ListenAddress = "" +orderer0.example.com | General.Cluster.ListenPort = 0 +orderer0.example.com | General.Cluster.ServerCertificate = "" +orderer0.example.com | General.Cluster.ServerPrivateKey = "" +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.Cluster.DialTimeout = 5s +orderer0.example.com | General.Cluster.RPCTimeout = 7s +orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer0.example.com | General.Cluster.SendBufferSize = 10 +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer0.example.com | General.Keepalive.ServerTimeout = 20s +orderer0.example.com | General.ConnectionTimeout = 0s +orderer0.example.com | General.GenesisMethod = "file" +orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer0.example.com | General.SystemChannel = "test-system-channel-name" +orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer0.example.com | General.Profile.Enabled = false +orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer0.example.com | General.LocalMSPID = "OrdererMSP" +orderer0.example.com | General.BCCSP.ProviderName = "SW" +orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer0.example.com | General.BCCSP.PluginOpts = +orderer0.example.com | General.Authentication.TimeWindow = 15m0s +orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer0.example.com | RAMLedger.HistorySize = 1000 +orderer0.example.com | Kafka.Retry.ShortInterval = 5s +orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer0.example.com | Kafka.Retry.LongInterval = 5m0s +orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer0.example.com | Kafka.Verbose = false +orderer0.example.com | Kafka.Version = 0.10.2.0 +orderer0.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | Kafka.TLS.PrivateKey = "" +orderer0.example.com | Kafka.TLS.Certificate = "" +orderer0.example.com | Kafka.TLS.RootCAs = [] +orderer0.example.com | Kafka.TLS.ClientAuthRequired = false +orderer0.example.com | Kafka.TLS.ClientRootCAs = [] +orderer0.example.com | Kafka.SASLPlain.Enabled = false +orderer0.example.com | Kafka.SASLPlain.User = "" +orderer0.example.com | Kafka.SASLPlain.Password = "" +orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer0.example.com | Debug.BroadcastTraceDir = "" +orderer0.example.com | Debug.DeliverTraceDir = "" +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer0.example.com | Operations.TLS.Enabled = false +orderer0.example.com | Operations.TLS.PrivateKey = "" +orderer0.example.com | Operations.TLS.Certificate = "" +orderer0.example.com | Operations.TLS.RootCAs = [] +orderer0.example.com | Operations.TLS.ClientAuthRequired = false +orderer0.example.com | Operations.TLS.ClientRootCAs = [] +orderer0.example.com | Metrics.Provider = "prometheus" +orderer0.example.com | Metrics.Statsd.Network = "udp" +orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer0.example.com | Metrics.Statsd.WriteInterval = 30s +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2019-09-24 00:24:34.292 UTC [common.channelconfig] NewStandardValues -> DEBU 0e4 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:24:34.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e5 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:34.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e6 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:34.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e7 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:34.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e8 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:24:34.294 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e9 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] NewStandardValues -> DEBU 0ea Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0eb Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ec Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ed Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ee Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ef Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] NewStandardValues -> DEBU 0f1 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f2 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] NewStandardValues -> DEBU 0f3 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:34.297 UTC [common.channelconfig] validateMSP -> DEBU 0f5 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.298 UTC [msp] newBccspMsp -> DEBU 0f6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.302 UTC [msp] New -> DEBU 0f7 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.314 UTC [msp] Setup -> DEBU 0f8 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:24:34.314 UTC [msp.identity] newIdentity -> DEBU 0f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.315 UTC [msp.identity] newIdentity -> DEBU 0fa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.315 UTC [msp] Validate -> DEBU 0fb MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.315 UTC [common.channelconfig] NewStandardValues -> DEBU 0fc Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-09-24 00:24:34.315 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fd Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:34.315 UTC [common.channelconfig] NewStandardValues -> DEBU 0fe Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.315 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ff Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:34.315 UTC [common.channelconfig] validateMSP -> DEBU 100 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.315 UTC [msp] newBccspMsp -> DEBU 101 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.315 UTC [msp] New -> DEBU 102 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.315 UTC [msp] Setup -> DEBU 103 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.315 UTC [msp.identity] newIdentity -> DEBU 104 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.316 UTC [msp.identity] newIdentity -> DEBU 105 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.316 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 106 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.316 UTC [msp] Validate -> DEBU 107 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.316 UTC [msp] getCertificationChain -> DEBU 108 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.316 UTC [msp] hasOURole -> DEBU 109 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:34.316 UTC [msp] getCertificationChain -> DEBU 10a MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.316 UTC [common.channelconfig] NewStandardValues -> DEBU 10b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.316 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10c Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:34.316 UTC [common.channelconfig] validateMSP -> DEBU 10d Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.317 UTC [msp] newBccspMsp -> DEBU 10e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.317 UTC [msp] New -> DEBU 10f Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.317 UTC [msp] Setup -> DEBU 110 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.317 UTC [msp.identity] newIdentity -> DEBU 111 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.328 UTC [msp.identity] newIdentity -> DEBU 112 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.329 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 113 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.329 UTC [msp] Validate -> DEBU 114 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [msp] getCertificationChain -> DEBU 115 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [msp] hasOURole -> DEBU 116 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [msp] getCertificationChain -> DEBU 117 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [msp] Setup -> DEBU 118 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [msp] Setup -> DEBU 119 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] GetPolicy -> DEBU 12a Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 12b Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-09-24 00:24:56.168 UTC [fsblkstorage] newBlockIndex -> DEBU 275 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 12c Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-09-24 00:24:56.169 UTC [pvtdatastorage] processCollElgEvents -> DEBU 276 Starting to process collection eligibility events" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] GetPolicy -> DEBU 12d Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +peer0.org1.example.com | "2019-09-24 00:24:56.169 UTC [leveldbhelper] GetIterator -> DEBU 277 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 12e Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-09-24 00:24:56.169 UTC [pvtdatastorage] processCollElgEvents -> DEBU 278 Converted [0] inelligible mising data entries to elligible" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 00:24:56.169 UTC [pvtdatastorage] func1 -> DEBU 279 Waiting for collection eligibility event" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:24:56.169 UTC [pvtdatastorage] OpenStore -> DEBU 27a Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:24:56.169 UTC [leveldbhelper] GetIterator -> DEBU 27b Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.170 UTC [kvledger] newKVLedger -> DEBU 27c Creating KVLedger ledgerID=businesschannel: " +peer0.org1.example.com | "2019-09-24 00:24:56.170 UTC [kvledger] lastPersistedCommitHash -> DEBU 27d Chain is empty" +peer0.org1.example.com | "2019-09-24 00:24:56.170 UTC [kvledger] newKVLedger -> DEBU 27e Register state db for chaincode lifecycle events: false" +peer0.org1.example.com | "2019-09-24 00:24:56.170 UTC [kvledger] recoverDBs -> DEBU 27f Entering recoverDB()" +peer0.org1.example.com | "2019-09-24 00:24:56.170 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 280 Block storage is empty." +peer0.org1.example.com | "2019-09-24 00:24:56.170 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 281 [businesschannel:] Filtering pvtData of invalidation transactions" +peer0.org1.example.com | "2019-09-24 00:24:56.170 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 282 [businesschannel:] Committing pvtData of [0] old blocks to the stateDB" +peer0.org1.example.com | "2019-09-24 00:24:56.170 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 283 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 00:24:56.170 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 284 lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" +peer0.org1.example.com | "2019-09-24 00:24:56.170 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 285 Constructing unique pvtData by removing duplicate entries" +peer0.org1.example.com | "2019-09-24 00:24:56.170 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 286 [businesschannel:] Clearing the bookkeeping information from pvtdatastore" +peer0.org1.example.com | "2019-09-24 00:24:56.177 UTC [kvledger] CommitWithPvtData -> DEBU 287 [businesschannel] Validating state for block [0]" +peer0.org1.example.com | "2019-09-24 00:24:56.177 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 288 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 00:24:56.177 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 289 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 00:24:56.177 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 28a Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 00:24:56.177 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 28b ValidateAndPrepareBatch() for block number = [0]" +peer0.org1.example.com | "2019-09-24 00:24:56.178 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 28c preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:24:56.178 UTC [valimpl] preprocessProtoBlock -> DEBU 28d txType=CONFIG" +peer0.org1.example.com | "2019-09-24 00:24:56.178 UTC [valimpl] processNonEndorserTx -> DEBU 28e Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-09-24 00:24:56.178 UTC [valimpl] processNonEndorserTx -> DEBU 28f Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-09-24 00:24:56.178 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 290 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:24:56.178 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 291 constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-09-24 00:24:56.178 UTC [peer] GenerateSimulationResults -> DEBU 292 Processing CONFIG" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:24:34.341 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:24:34.354 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:34.354 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:34.354 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:34.357 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:34.357 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.357 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:24:34.357 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:24:34.357 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:24:34.358 UTC [orderer.common.server] createLedgerFactory -> DEBU 156 Ledger dir: /var/hyperledger/production/orderer" +orderer0.example.com | "2019-09-24 00:24:34.358 UTC [kvledger.util] CreateDirIfMissing -> DEBU 157 CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +orderer0.example.com | "2019-09-24 00:24:34.358 UTC [kvledger.util] logDirStatus -> DEBU 158 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +orderer0.example.com | "2019-09-24 00:24:34.358 UTC [kvledger.util] logDirStatus -> DEBU 159 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +orderer0.example.com | "2019-09-24 00:24:34.500 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 15a Bootstrapping because no existing channels" +orderer0.example.com | "2019-09-24 00:24:34.504 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 15b Selected bootstrap block, because system channel last config block is nil" +orderer0.example.com | "2019-09-24 00:24:34.505 UTC [common.channelconfig] NewStandardValues -> DEBU 15c Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:24:34.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:34.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:34.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:34.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:24:34.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 161 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.512 UTC [common.channelconfig] NewStandardValues -> DEBU 162 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-09-24 00:24:34.512 UTC [common.channelconfig] initializeProtosStruct -> DEBU 163 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:34.512 UTC [common.channelconfig] NewStandardValues -> DEBU 164 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.512 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:34.512 UTC [common.channelconfig] validateMSP -> DEBU 166 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.512 UTC [msp] newBccspMsp -> DEBU 167 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.512 UTC [msp] New -> DEBU 168 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.512 UTC [msp] Setup -> DEBU 169 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.523 UTC [msp.identity] newIdentity -> DEBU 16a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.524 UTC [msp.identity] newIdentity -> DEBU 16b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.527 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16c Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.527 UTC [msp] Validate -> DEBU 16d MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.528 UTC [msp] getCertificationChain -> DEBU 16e MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.528 UTC [msp] hasOURole -> DEBU 16f MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:34.528 UTC [msp] getCertificationChain -> DEBU 170 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.528 UTC [common.channelconfig] NewStandardValues -> DEBU 171 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 172 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:34.529 UTC [common.channelconfig] validateMSP -> DEBU 173 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.529 UTC [msp] newBccspMsp -> DEBU 174 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.529 UTC [msp] New -> DEBU 175 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.529 UTC [msp] Setup -> DEBU 176 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.529 UTC [msp.identity] newIdentity -> DEBU 177 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.529 UTC [msp.identity] newIdentity -> DEBU 178 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.530 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 179 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.530 UTC [msp] Validate -> DEBU 17a MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.530 UTC [msp] getCertificationChain -> DEBU 17b MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.530 UTC [msp] hasOURole -> DEBU 17c MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:34.530 UTC [msp] getCertificationChain -> DEBU 17d MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.537 UTC [common.channelconfig] NewStandardValues -> DEBU 17e Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:24:34.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:24:34.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 180 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:24:34.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:34.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 182 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:24:34.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 183 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:34.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 184 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.539 UTC [common.channelconfig] NewStandardValues -> DEBU 185 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:24:34.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 186 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:24:34.540 UTC [common.channelconfig] NewStandardValues -> DEBU 187 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.540 UTC [common.channelconfig] initializeProtosStruct -> DEBU 188 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:34.540 UTC [common.channelconfig] validateMSP -> DEBU 189 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.540 UTC [msp] newBccspMsp -> DEBU 18a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.540 UTC [msp] New -> DEBU 18b Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.540 UTC [msp] Setup -> DEBU 18c Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:24:34.540 UTC [msp.identity] newIdentity -> DEBU 18d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.541 UTC [msp.identity] newIdentity -> DEBU 18e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.541 UTC [msp] Validate -> DEBU 18f MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [msp] Setup -> DEBU 190 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [msp] Setup -> DEBU 191 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 196 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 199 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 19b Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 19c Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.543 UTC [policies] NewManagerImpl -> DEBU 19d Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.543 UTC [policies] NewManagerImpl -> DEBU 19e Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.543 UTC [policies] NewManagerImpl -> DEBU 19f Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.548 UTC [policies] NewManagerImpl -> DEBU 1a0 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.548 UTC [policies] NewManagerImpl -> DEBU 1a1 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-09-24 00:24:34.548 UTC [policies] NewManagerImpl -> DEBU 1a2 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:24:34.548 UTC [policies] GetPolicy -> DEBU 1a3 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-09-24 00:24:34.548 UTC [policies] NewManagerImpl -> DEBU 1a4 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:24:34.548 UTC [policies] GetPolicy -> DEBU 1a5 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-09-24 00:24:34.548 UTC [policies] NewManagerImpl -> DEBU 1a6 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:24:34.549 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:24:34.549 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.551 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.552 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:24:34.552 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:24:34.553 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:24:34.553 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:24:34.555 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:24:34.558 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:34.560 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:34.562 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.562 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:24:34.562 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:34.564 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:34.564 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:34.564 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:34.564 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c4 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c6 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c7 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c9 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1ca Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1cb Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:24:34.571 UTC [common.configtx] addToMap -> DEBU 1cc Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:24:34.571 UTC [common.configtx] addToMap -> DEBU 1cd Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:24:34.624 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1ce Booted with a genesis block, replication isn't an option" +orderer0.example.com | "2019-09-24 00:24:34.713 UTC [orderer.common.server] initializeServerConfig -> INFO 1cf Starting orderer with TLS enabled" +orderer0.example.com | "2019-09-24 00:24:34.716 UTC [orderer.common.server] configureClusterListener -> INFO 1d0 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer0.example.com | "2019-09-24 00:24:34.726 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1d1 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +orderer0.example.com | "2019-09-24 00:24:34.726 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1d2 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +orderer0.example.com | "2019-09-24 00:24:34.726 UTC [kvledger.util] logDirStatus -> DEBU 1d3 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +orderer0.example.com | "2019-09-24 00:24:34.726 UTC [kvledger.util] logDirStatus -> DEBU 1d4 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +orderer0.example.com | "2019-09-24 00:24:34.726 UTC [fsblkstorage] newBlockfileMgr -> INFO 1d5 Getting block information from block storage" +orderer0.example.com | "2019-09-24 00:24:34.726 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d6 Retrieving checkpoint info from block files" +orderer0.example.com | "2019-09-24 00:24:34.726 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d7 retrieveLastFileSuffix()" +orderer0.example.com | "2019-09-24 00:24:34.726 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d8 retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2019-09-24 00:24:34.726 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d9 Last file number found = -1" +orderer0.example.com | "2019-09-24 00:24:34.726 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1da No block file found" +orderer0.example.com | "2019-09-24 00:24:34.726 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1db Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000041a40)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2019-09-24 00:24:34.728 UTC [fsblkstorage] newBlockIndex -> DEBU 1dc newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2019-09-24 00:24:34.731 UTC [fsblkstorage] indexBlock -> DEBU 1dd Indexing block [blockNum=0, blockHash=[]byte{0x83, 0x7c, 0xec, 0x8, 0xfb, 0x64, 0x69, 0x1e, 0xeb, 0x40, 0x71, 0x16, 0x20, 0xff, 0x7, 0xb7, 0x21, 0x5a, 0x7c, 0x93, 0xa4, 0x25, 0x8e, 0x29, 0x3a, 0x1a, 0x0, 0x5e, 0x0, 0xd6, 0xad, 0x25} txOffsets= +orderer0.example.com | txId=a6faba22e613adaa8102d6c27d264383fd6380b45cd1860c8c876737af1bf39c locPointer=offset=39, bytesLength=18375 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 00:24:34.734 UTC [fsblkstorage] updateCheckpoint -> DEBU 1de Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18419], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2019-09-24 00:24:34.734 UTC [common.channelconfig] NewStandardValues -> DEBU 1df Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:24:34.734 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e1 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e3 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [common.channelconfig] NewStandardValues -> DEBU 1e7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e8 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [common.channelconfig] validateMSP -> DEBU 1e9 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [msp] newBccspMsp -> DEBU 1ea Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [msp] New -> DEBU 1eb Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [msp] Setup -> DEBU 1ec Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.735 UTC [msp.identity] newIdentity -> DEBU 1ed Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.736 UTC [msp.identity] newIdentity -> DEBU 1ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.736 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1ef Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.736 UTC [msp] Validate -> DEBU 1f0 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.737 UTC [msp] getCertificationChain -> DEBU 1f1 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.737 UTC [msp] hasOURole -> DEBU 1f2 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:34.737 UTC [msp] getCertificationChain -> DEBU 1f3 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.737 UTC [common.channelconfig] NewStandardValues -> DEBU 1f4 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.737 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f5 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:34.737 UTC [common.channelconfig] validateMSP -> DEBU 1f6 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.737 UTC [msp] newBccspMsp -> DEBU 1f7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.737 UTC [msp] New -> DEBU 1f8 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.737 UTC [msp] Setup -> DEBU 1f9 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.738 UTC [msp.identity] newIdentity -> DEBU 1fa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.738 UTC [msp.identity] newIdentity -> DEBU 1fb Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.739 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1fc Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.739 UTC [msp] Validate -> DEBU 1fd MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.739 UTC [msp] getCertificationChain -> DEBU 1fe MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.740 UTC [msp] hasOURole -> DEBU 1ff MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:34.740 UTC [msp] getCertificationChain -> DEBU 200 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.740 UTC [common.channelconfig] NewStandardValues -> DEBU 201 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:24:34.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 202 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:24:34.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 203 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:24:34.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 204 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:34.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 205 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:24:34.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 206 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:34.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 207 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.753 UTC [common.channelconfig] NewStandardValues -> DEBU 208 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:24:34.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 209 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:24:34.753 UTC [common.channelconfig] NewStandardValues -> DEBU 20a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 20b Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:34.753 UTC [common.channelconfig] validateMSP -> DEBU 20c Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:24:56.183 UTC [peer] processChannelConfigTx -> DEBU 293 channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-09-24 00:24:56.183 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 294 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:24:56.184 UTC [lockbasedtxmgr] Done -> DEBU 295 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-09-24 00:24:56.184 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 296 Block [0] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 00:24:56.184 UTC [valinternal] ApplyWriteSet -> DEBU 297 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0029cfb00)}" +peer0.org1.example.com | "2019-09-24 00:24:56.184 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 298 validating rwset..." +peer0.org1.example.com | "2019-09-24 00:24:56.184 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 299 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:24:56.184 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 29a ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 00:24:56.184 UTC [kvledger] CommitWithPvtData -> DEBU 29b [businesschannel] Adding CommitHash to the block [0]" +peer0.org1.example.com | "2019-09-24 00:24:56.184 UTC [kvledger] CommitWithPvtData -> DEBU 29c [businesschannel] Committing block [0] to storage" +peer0.org1.example.com | "2019-09-24 00:24:56.184 UTC [ledgerstorage] CommitWithPvtData -> DEBU 29d Writing block [0] to pvt block store" +peer0.org1.example.com | "2019-09-24 00:24:56.188 UTC [pvtdatastorage] Prepare -> DEBU 29e Saved 0 private data write sets for block [0]" +peer0.org1.example.com | "2019-09-24 00:24:56.190 UTC [fsblkstorage] indexBlock -> DEBU 29f Indexing block [blockNum=0, blockHash=[]byte{0xdc, 0x37, 0x3e, 0x7d, 0xd9, 0x80, 0x34, 0xd8, 0x87, 0x20, 0x13, 0x50, 0x22, 0xb4, 0x68, 0xd5, 0xb6, 0x58, 0x78, 0xbf, 0x32, 0x9f, 0xc8, 0x89, 0x42, 0x2a, 0x5, 0x7a, 0xab, 0xc6, 0x38, 0x47} txOffsets= +peer0.org1.example.com | txId=39c9b622afe3457926bd2f6a5ade166a0d139905e01268fb7cba4a9273bf6dc3 locPointer=offset=39, bytesLength=23903 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 00:24:56.190 UTC [fsblkstorage] indexBlock -> DEBU 2a0 Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23903] for tx ID: [39c9b622afe3457926bd2f6a5ade166a0d139905e01268fb7cba4a9273bf6dc3] to txid-index" +peer0.org1.example.com | "2019-09-24 00:24:56.190 UTC [fsblkstorage] indexBlock -> DEBU 2a1 Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23903] for tx number:[0] ID: [39c9b622afe3457926bd2f6a5ade166a0d139905e01268fb7cba4a9273bf6dc3] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 00:24:56.191 UTC [fsblkstorage] updateCheckpoint -> DEBU 2a2 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23949], isChainEmpty=[false], lastBlockNumber=[0]" +peer0.org1.example.com | "2019-09-24 00:24:56.192 UTC [pvtdatastorage] Commit -> DEBU 2a3 Committing private data for block [0]" +peer0.org1.example.com | "2019-09-24 00:24:56.193 UTC [pvtdatastorage] Commit -> DEBU 2a4 Committed private data for block [0]" +peer0.org1.example.com | "2019-09-24 00:24:56.193 UTC [pvtdatastorage] func1 -> DEBU 2a5 Purger started: Purging expired private data till block number [0]" +peer0.org1.example.com | "2019-09-24 00:24:56.193 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 2a6 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" +peer0.org1.example.com | "2019-09-24 00:24:56.193 UTC [leveldbhelper] GetIterator -> DEBU 2a7 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" +peer0.org1.example.com | "2019-09-24 00:24:56.193 UTC [pvtdatastorage] func1 -> DEBU 2a8 Purger finished" +peer0.org1.example.com | "2019-09-24 00:24:56.193 UTC [kvledger] CommitWithPvtData -> DEBU 2a9 [businesschannel] Committing block [0] transactions to state database" +peer0.org1.example.com | "2019-09-24 00:24:56.193 UTC [lockbasedtxmgr] Commit -> DEBU 2aa lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 00:24:56.194 UTC [lockbasedtxmgr] Commit -> DEBU 2ab Committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:24:56.194 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2ac Preparing potential purge list working-set for expiringAtBlk [0]" +peer0.org1.example.com | "2019-09-24 00:24:56.194 UTC [leveldbhelper] GetIterator -> DEBU 2ad Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" +peer0.org1.example.com | "2019-09-24 00:24:56.194 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2ae No expiry entry found for expiringAtBlk [0]" +peer0.org1.example.com | "2019-09-24 00:24:56.194 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2af Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 00:24:56.194 UTC [lockbasedtxmgr] Commit -> DEBU 2b0 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:24:56.194 UTC [stateleveldb] ApplyUpdates -> DEBU 2b1 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-09-24 00:24:56.196 UTC [lockbasedtxmgr] Commit -> DEBU 2b2 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 00:24:56.196 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2b3 Preparing potential purge list working-set for expiringAtBlk [1]" +peer0.org1.example.com | "2019-09-24 00:24:56.196 UTC [leveldbhelper] GetIterator -> DEBU 2b4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" +peer0.org1.example.com | "2019-09-24 00:24:56.196 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2b5 No expiry entry found for expiringAtBlk [1]" +peer0.org1.example.com | "2019-09-24 00:24:56.196 UTC [lockbasedtxmgr] func1 -> DEBU 2b6 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 00:24:56.196 UTC [kvledger] CommitWithPvtData -> DEBU 2b7 [businesschannel] Committing block [0] transactions to history database" +peer0.org1.example.com | "2019-09-24 00:24:56.197 UTC [historyleveldb] Commit -> DEBU 2b8 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" +peer0.org1.example.com | "2019-09-24 00:24:56.197 UTC [historyleveldb] Commit -> DEBU 2b9 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-09-24 00:24:56.198 UTC [historyleveldb] Commit -> DEBU 2ba Channel [businesschannel]: Updates committed to history database for blockNo [0]" +peer0.org1.example.com | "2019-09-24 00:24:56.198 UTC [kvledger] CommitWithPvtData -> INFO 2bb [businesschannel] Committed block [0] with 1 transaction(s) in 21ms (state_validation=7ms block_and_pvtdata_commit=8ms state_commit=3ms) commitHash=[]" +peer0.org1.example.com | "2019-09-24 00:24:56.200 UTC [ledgermgmt] CreateLedger -> INFO 2bc Created ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-09-24 00:24:56.200 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2bd constructing new query executor txid = [48f0ac2f-1880-4d1c-88cd-f90f833f4849]" +peer0.org1.example.com | "2019-09-24 00:24:56.200 UTC [stateleveldb] GetState -> DEBU 2be GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" +peer0.org1.example.com | "2019-09-24 00:24:56.200 UTC [lockbasedtxmgr] Done -> DEBU 2bf Done with transaction simulation / query execution [48f0ac2f-1880-4d1c-88cd-f90f833f4849]" +peer0.org1.example.com | "2019-09-24 00:24:56.200 UTC [common.channelconfig] NewStandardValues -> DEBU 2c0 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-09-24 00:24:56.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c1 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 00:24:56.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c2 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c3 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c4 Processing field: Consortium" +peer0.org1.example.com | "2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c5 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:24:56.201 UTC [common.channelconfig] NewStandardValues -> DEBU 2c6 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c7 Processing field: ConsensusType" +peer0.org1.example.com | "2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c8 Processing field: BatchSize" +peer0.org1.example.com | "2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c9 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ca Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2cb Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2cc Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:24:56.202 UTC [common.channelconfig] NewStandardValues -> DEBU 2cd Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-09-24 00:24:56.202 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ce Processing field: Endpoints" +peer0.org1.example.com | "2019-09-24 00:24:56.202 UTC [common.channelconfig] NewStandardValues -> DEBU 2cf Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:24:56.202 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2d0 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.202 UTC [common.channelconfig] validateMSP -> DEBU 2d1 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:24:56.202 UTC [msp] newBccspMsp -> DEBU 2d2 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:24:56.202 UTC [msp] New -> DEBU 2d3 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:24:56.202 UTC [msp] Setup -> DEBU 2d4 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-09-24 00:24:56.202 UTC [msp.identity] newIdentity -> DEBU 2d5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:56.202 UTC [msp.identity] newIdentity -> DEBU 2d6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | "2019-09-24 00:24:34.753 UTC [msp] newBccspMsp -> DEBU 20d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.753 UTC [msp] New -> DEBU 20e Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.753 UTC [msp] Setup -> DEBU 20f Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:24:34.761 UTC [msp.identity] newIdentity -> DEBU 210 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.761 UTC [msp.identity] newIdentity -> DEBU 211 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.762 UTC [msp] Validate -> DEBU 212 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.762 UTC [msp] Setup -> DEBU 213 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:24:34.762 UTC [msp] Setup -> DEBU 214 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:24:34.762 UTC [policies] NewManagerImpl -> DEBU 215 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.762 UTC [policies] NewManagerImpl -> DEBU 216 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.762 UTC [policies] NewManagerImpl -> DEBU 217 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 218 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 219 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21a Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21b Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 220 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 221 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 222 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 223 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 224 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] GetPolicy -> DEBU 225 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 226 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] GetPolicy -> DEBU 227 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 228 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:24:34.764 UTC [policies] NewManagerImpl -> DEBU 229 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 234 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 235 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 236 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 237 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:24:34.771 UTC [common.configtx] addToMap -> DEBU 238 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:24:34.771 UTC [common.configtx] addToMap -> DEBU 239 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [msp] Validate -> DEBU 2d7 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [common.channelconfig] NewStandardValues -> DEBU 2d8 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2d9 Processing field: ACLs" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2da Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [common.channelconfig] NewStandardValues -> DEBU 2db Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2dc Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [common.channelconfig] NewStandardValues -> DEBU 2dd Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2de Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [common.channelconfig] Validate -> DEBU 2df Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [common.channelconfig] validateMSP -> DEBU 2e0 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [msp] newBccspMsp -> DEBU 2e1 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [msp] New -> DEBU 2e2 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:24:56.203 UTC [msp] Setup -> DEBU 2e3 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.204 UTC [msp.identity] newIdentity -> DEBU 2e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:56.204 UTC [msp.identity] newIdentity -> DEBU 2e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:56.204 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2e6 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.204 UTC [msp] Validate -> DEBU 2e7 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:24:56.204 UTC [msp] getCertificationChain -> DEBU 2e8 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [msp] hasOURole -> DEBU 2e9 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [msp] getCertificationChain -> DEBU 2ea MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [common.channelconfig] NewStandardValues -> DEBU 2eb Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ec Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [common.channelconfig] NewStandardValues -> DEBU 2ed Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ee Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [common.channelconfig] Validate -> DEBU 2ef Anchor peers for org Org1MSP are " +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [common.channelconfig] validateMSP -> DEBU 2f0 Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [msp] newBccspMsp -> DEBU 2f1 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [msp] New -> DEBU 2f2 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [msp] Setup -> DEBU 2f3 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [msp.identity] newIdentity -> DEBU 2f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:56.205 UTC [msp.identity] newIdentity -> DEBU 2f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | "2019-09-24 00:24:34.771 UTC [common.configtx] addToMap -> DEBU 23a Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-09-24 00:24:34.771 UTC [common.configtx] addToMap -> DEBU 23b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-09-24 00:24:34.771 UTC [common.configtx] addToMap -> DEBU 23c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 23d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 23e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 23f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 240 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 241 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 242 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 243 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 244 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 245 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 246 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 247 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 248 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 249 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24a Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24c Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24d Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24e Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24f Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 250 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:24:34.774 UTC [fsblkstorage] Next -> DEBU 251 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 00:24:34.774 UTC [fsblkstorage] newBlockfileStream -> DEBU 252 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 253 Remaining bytes=[18419], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 254 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 255 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-09-24 00:24:34.774 UTC [fsblkstorage] Next -> DEBU 256 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 00:24:34.774 UTC [fsblkstorage] newBlockfileStream -> DEBU 257 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 258 Remaining bytes=[18419], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 259 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 25a blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-09-24 00:24:34.774 UTC [common.channelconfig] NewStandardValues -> DEBU 25b Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25c Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25d Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25e Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25f Processing field: Consortium" +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:24:56.206 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2f6 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.206 UTC [msp] Validate -> DEBU 2f7 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 260 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] NewStandardValues -> DEBU 261 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 262 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 263 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 264 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 265 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 267 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] NewStandardValues -> DEBU 268 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 269 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] NewStandardValues -> DEBU 26a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 26b Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.206 UTC [msp] getCertificationChain -> DEBU 2f8 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:24:56.206 UTC [msp] hasOURole -> DEBU 2f9 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 00:24:56.206 UTC [msp] getCertificationChain -> DEBU 2fa MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [msp] Setup -> DEBU 2fb Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [msp] Setup -> DEBU 2fc MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 2fd Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 2fe Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 2ff Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 300 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 301 Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 302 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 303 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 304 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 305 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 306 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 307 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 308 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 309 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 30a Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 30b Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 30c Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 30d Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 30e Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 30f Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 310 Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 311 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 312 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 313 Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-09-24 00:24:56.209 UTC [common.configtx] addToMap -> DEBU 314 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 00:24:56.209 UTC [common.configtx] addToMap -> DEBU 315 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 316 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 317 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 318 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 319 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31b Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31c Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31d Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 320 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 321 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 322 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 323 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 324 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 325 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 326 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 327 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 328 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 329 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32b Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32e Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32f Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [common.channelconfig] validateMSP -> DEBU 26c Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [msp] newBccspMsp -> DEBU 26d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.775 UTC [msp] New -> DEBU 26e Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.776 UTC [msp] Setup -> DEBU 26f Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:24:34.787 UTC [msp.identity] newIdentity -> DEBU 270 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.788 UTC [msp.identity] newIdentity -> DEBU 271 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.788 UTC [msp] Validate -> DEBU 272 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.788 UTC [common.channelconfig] NewStandardValues -> DEBU 273 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-09-24 00:24:34.788 UTC [common.channelconfig] initializeProtosStruct -> DEBU 274 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:34.790 UTC [common.channelconfig] NewStandardValues -> DEBU 275 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 276 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:34.792 UTC [common.channelconfig] validateMSP -> DEBU 277 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.792 UTC [msp] newBccspMsp -> DEBU 278 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.801 UTC [msp] New -> DEBU 279 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.801 UTC [msp] Setup -> DEBU 27a Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.801 UTC [msp.identity] newIdentity -> DEBU 27b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.802 UTC [msp.identity] newIdentity -> DEBU 27c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.803 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 27d Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.803 UTC [msp] Validate -> DEBU 27e MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.803 UTC [msp] getCertificationChain -> DEBU 27f MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.803 UTC [msp] hasOURole -> DEBU 280 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:34.803 UTC [msp] getCertificationChain -> DEBU 281 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.804 UTC [common.channelconfig] NewStandardValues -> DEBU 282 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:34.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU 283 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:34.804 UTC [common.channelconfig] validateMSP -> DEBU 284 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.804 UTC [msp] newBccspMsp -> DEBU 285 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.804 UTC [msp] New -> DEBU 286 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:34.804 UTC [msp] Setup -> DEBU 287 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.804 UTC [msp.identity] newIdentity -> DEBU 288 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.804 UTC [msp.identity] newIdentity -> DEBU 289 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:34.805 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 28a Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.805 UTC [msp] Validate -> DEBU 28b MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:34.805 UTC [msp] getCertificationChain -> DEBU 28c MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.805 UTC [msp] hasOURole -> DEBU 28d MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:34.805 UTC [msp] getCertificationChain -> DEBU 28e MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:34.806 UTC [msp] Setup -> DEBU 28f Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [msp] Setup -> DEBU 290 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 291 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 292 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 293 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 294 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 295 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 296 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 297 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 298 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 299 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29a Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29b Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29e Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29f Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 2a0 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [policies] GetPolicy -> DEBU 2a1 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [policies] NewManagerImpl -> DEBU 2a2 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [policies] GetPolicy -> DEBU 2a3 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [policies] NewManagerImpl -> DEBU 2a4 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [policies] NewManagerImpl -> DEBU 2a5 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b2 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b3 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b4 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b6 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b7 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 330 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2ba Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2be Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2bf Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2c0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2c4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:34.810 UTC [common.configtx] addToMap -> DEBU 2c5 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-09-24 00:24:34.810 UTC [common.configtx] addToMap -> DEBU 2c6 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:24:34.810 UTC [common.configtx] addToMap -> DEBU 2c7 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:34.810 UTC [common.configtx] addToMap -> DEBU 2c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:34.810 UTC [common.configtx] addToMap -> DEBU 2c9 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:34.812 UTC [common.configtx] addToMap -> DEBU 2ca Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:24:34.812 UTC [common.configtx] addToMap -> DEBU 2cb Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:24:34.812 UTC [common.configtx] addToMap -> DEBU 2cc Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:24:34.812 UTC [common.channelconfig] LogSanityChecks -> DEBU 2cd As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 00:24:34.812 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ce As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2cf Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2d0 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2d1 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2d2 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2d3 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2d4 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-09-24 00:24:34.813 UTC [policies] Manager -> DEBU 2d5 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 00:24:34.813 UTC [policies] Manager -> DEBU 2d6 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:34.813 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d7 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 00:24:34.813 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d8 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 00:24:34.813 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d9 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 00:24:34.813 UTC [common.channelconfig] LogSanityChecks -> DEBU 2da As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 00:24:34.813 UTC [common.capabilities] Supported -> DEBU 2db Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:24:34.815 UTC [common.capabilities] Supported -> DEBU 2dc Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:24:34.815 UTC [orderer.common.server] func1 -> DEBU 2dd Executing callback to update root CAs" +orderer0.example.com | "2019-09-24 00:24:34.815 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2de updating root CAs for channel [testchainid]" +orderer0.example.com | "2019-09-24 00:24:34.815 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2df adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-09-24 00:24:34.815 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e0 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-09-24 00:24:34.815 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e1 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-09-24 00:24:34.816 UTC [fsblkstorage] Next -> DEBU 2e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 00:24:34.816 UTC [fsblkstorage] newBlockfileStream -> DEBU 2e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:24:34.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e4 Remaining bytes=[18419], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:24:34.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e5 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:24:34.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e6 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-09-24 00:24:34.816 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2e7 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +orderer0.example.com | "2019-09-24 00:24:34.816 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2e8 EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2019-09-24 00:24:34.817 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2e9 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.817 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2ea No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.835 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2eb Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.836 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ec Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.836 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ed Appending 0 entries to memory storage" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.836 UTC [fsblkstorage] Next -> DEBU 2ee Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 00:24:34.836 UTC [fsblkstorage] newBlockfileStream -> DEBU 2ef newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:24:34.836 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f0 Remaining bytes=[18419], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f1 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f2 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2f3 [channel: testchainid] Done creating channel support resources" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2f4 Creating system channel msg processor for channel testchainid" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [fsblkstorage] Next -> DEBU 2f5 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [fsblkstorage] newBlockfileStream -> DEBU 2f6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f7 Remaining bytes=[18419], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f8 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f9 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [orderer.commmon.multichannel] Initialize -> INFO 2fa Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [orderer.consensus.etcdraft] Start -> INFO 2fb Starting Raft node" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [orderer.common.cluster] Configure -> INFO 2fc Entering, channel: testchainid, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fd Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fe Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-09-24 00:24:34.837 UTC [orderer.common.cluster] func1 -> DEBU 2ff Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 331 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 332 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 333 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 334 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 335 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 336 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 337 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 338 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 339 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33a Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33b Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33d Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33e Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33f Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.capabilities] Supported -> DEBU 340 Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.capabilities] Supported -> DEBU 341 Channel capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.channelconfig] LogSanityChecks -> DEBU 342 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [common.channelconfig] LogSanityChecks -> DEBU 343 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [policies] Manager -> DEBU 344 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [policies] Manager -> DEBU 345 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [policies] Manager -> DEBU 346 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [policies] Manager -> DEBU 347 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 00:24:56.217 UTC [policies] Manager -> DEBU 348 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 349 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 34a As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 34b As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 34c As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 34d Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 34e Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 34f Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 350 Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 351 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 352 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 353 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 354 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 355 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [gossip.service] ProcessConfigUpdate -> DEBU 356 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [gossip.service] ProcessConfigUpdate -> DEBU 357 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [gossip.service] updateAnchors -> DEBU 358 Org2MSP anchor peers: []" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [gossip.service] updateAnchors -> DEBU 359 Org1MSP anchor peers: []" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [gossip.service] updateAnchors -> DEBU 35a Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-09-24 00:24:56.218 UTC [gossip.gossip] JoinChan -> INFO 35b Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-09-24 00:24:56.219 UTC [gossip.gossip] learnAnchorPeers -> INFO 35c No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-09-24 00:24:56.219 UTC [gossip.gossip] learnAnchorPeers -> INFO 35d No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-09-24 00:24:56.219 UTC [peer] updateTrustedRoots -> DEBU 35e Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:24:56.259 UTC [peer] buildTrustedRootsForChain -> DEBU 35f updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:24:56.259 UTC [peer] buildTrustedRootsForChain -> DEBU 360 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-09-24 00:24:56.259 UTC [peer] buildTrustedRootsForChain -> DEBU 361 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-09-24 00:24:56.259 UTC [peer] buildTrustedRootsForChain -> DEBU 362 adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-09-24 00:24:56.260 UTC [kvledger.util] CreateDirIfMissing -> DEBU 363 CreateDirIfMissing [/var/hyperledger/production/transientStore/]" +peer0.org1.example.com | "2019-09-24 00:24:56.260 UTC [kvledger.util] logDirStatus -> DEBU 364 Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" +peer0.org1.example.com | "2019-09-24 00:24:56.260 UTC [kvledger.util] logDirStatus -> DEBU 365 After creating dir - [/var/hyperledger/production/transientStore/] exists" +peer0.org1.example.com | "2019-09-24 00:24:56.279 UTC [gossip.service] InitializeChannel -> DEBU 366 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-09-24 00:24:56.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 367 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:56.282 UTC [msp.identity] Sign -> DEBU 368 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +peer0.org1.example.com | "2019-09-24 00:24:56.282 UTC [msp.identity] Sign -> DEBU 369 Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2019-09-24 00:24:34.838 UTC [grpc] DialContext -> DEBU 300 parsed scheme: """ +orderer0.example.com | "2019-09-24 00:24:34.838 UTC [grpc] DialContext -> DEBU 301 scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2019-09-24 00:24:34.839 UTC [orderer.common.cluster] updateStubInMapping -> INFO 302 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer0.example.com | "2019-09-24 00:24:34.839 UTC [orderer.common.cluster] updateStubInMapping -> INFO 303 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-09-24 00:24:34.839 UTC [orderer.common.cluster] func1 -> DEBU 304 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2019-09-24 00:24:34.840 UTC [grpc] DialContext -> DEBU 305 parsed scheme: """ +orderer0.example.com | "2019-09-24 00:24:34.840 UTC [grpc] DialContext -> DEBU 306 scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2019-09-24 00:24:34.840 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 307 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 308 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [orderer.common.cluster] Configure -> INFO 309 Exiting" +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [orderer.consensus.etcdraft] start -> DEBU 30a Starting raft node: #peers: 3" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [orderer.consensus.etcdraft] start -> INFO 30b Starting raft node as part of a new channel" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 30c 1 became follower at term 0" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [orderer.consensus.etcdraft] newRaft -> INFO 30d newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 30e 1 became follower at term 1" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [grpc] watcher -> DEBU 30f ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [grpc] switchBalancer -> DEBU 310 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [orderer.common.server] Start -> INFO 311 Starting orderer: +orderer0.example.com | Version: 1.4.2 +orderer0.example.com | Commit SHA: development build +orderer0.example.com | Go version: go1.12.9 +orderer0.example.com | OS/Arch: linux/amd64" +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [orderer.common.server] Start -> INFO 312 Beginning to serve requests" +orderer0.example.com | "2019-09-24 00:24:34.841 UTC [grpc] HandleSubConnStateChange -> DEBU 313 pickfirstBalancer: HandleSubConnStateChange: 0xc000399530, CONNECTING" +orderer0.example.com | "2019-09-24 00:24:34.843 UTC [grpc] watcher -> DEBU 314 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +orderer0.example.com | "2019-09-24 00:24:34.843 UTC [grpc] switchBalancer -> DEBU 315 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2019-09-24 00:24:34.843 UTC [grpc] HandleSubConnStateChange -> DEBU 316 pickfirstBalancer: HandleSubConnStateChange: 0xc000399a40, CONNECTING" +orderer0.example.com | "2019-09-24 00:24:34.868 UTC [grpc] HandleSubConnStateChange -> DEBU 317 pickfirstBalancer: HandleSubConnStateChange: 0xc000399530, READY" +orderer0.example.com | "2019-09-24 00:24:34.872 UTC [grpc] HandleSubConnStateChange -> DEBU 318 pickfirstBalancer: HandleSubConnStateChange: 0xc000399a40, READY" +orderer0.example.com | "2019-09-24 00:24:34.874 UTC [orderer.consensus.etcdraft] apply -> INFO 319 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.874 UTC [orderer.consensus.etcdraft] apply -> INFO 31a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:34.874 UTC [orderer.consensus.etcdraft] apply -> INFO 31b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:35.714 UTC [orderer.common.cluster] Step -> DEBU 31c Connection from orderer2.example.com(172.18.0.2:49900)" +orderer0.example.com | "2019-09-24 00:24:35.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:35.715 UTC [orderer.consensus.etcdraft] Step -> INFO 31e 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:35.715 UTC [orderer.common.cluster] NewStream -> DEBU 31f Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-09-24 00:24:35.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 320 Sending msg of 28 bytes to 3 on channel testchainid took 132µs" +orderer0.example.com | "2019-09-24 00:24:35.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 774.6µs " +orderer0.example.com | "2019-09-24 00:24:35.721 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:35.721 UTC [orderer.consensus.etcdraft] Step -> INFO 323 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:35.721 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 324 1 became follower at term 2" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:35.721 UTC [orderer.common.cluster.step] handleMessage -> DEBU 325 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 36" +orderer0.example.com | "2019-09-24 00:24:35.721 UTC [orderer.consensus.etcdraft] Step -> INFO 326 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:35.721 UTC [orderer.consensus.etcdraft] run -> INFO 327 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:35.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 328 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +orderer0.example.com | "2019-09-24 00:24:35.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 329 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +orderer0.example.com | "2019-09-24 00:24:35.725 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 32a Raft leader changed: 0 -> 3" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:35.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.6µs " +orderer0.example.com | "2019-09-24 00:24:35.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 39.8µs " +orderer0.example.com | "2019-09-24 00:24:35.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:35.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32e Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +orderer0.example.com | "2019-09-24 00:24:35.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.3µs " +orderer0.example.com | "2019-09-24 00:24:36.208 UTC [orderer.common.cluster.step] handleMessage -> DEBU 330 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:36.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 331 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +orderer0.example.com | "2019-09-24 00:24:36.208 UTC [orderer.common.cluster.step] sendMessage -> DEBU 332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +orderer0.example.com | "2019-09-24 00:24:36.707 UTC [orderer.common.cluster.step] handleMessage -> DEBU 333 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:36.708 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 334 Sending msg of 28 bytes to 3 on channel testchainid took 36.6µs" +orderer0.example.com | "2019-09-24 00:24:36.708 UTC [orderer.common.cluster.step] sendMessage -> DEBU 335 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.4µs " +orderer0.example.com | "2019-09-24 00:24:37.208 UTC [orderer.common.cluster.step] handleMessage -> DEBU 336 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:37.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 337 Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +orderer0.example.com | "2019-09-24 00:24:37.208 UTC [orderer.common.cluster.step] sendMessage -> DEBU 338 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +orderer0.example.com | "2019-09-24 00:24:37.708 UTC [orderer.common.cluster.step] handleMessage -> DEBU 339 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:37.709 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33a Sending msg of 28 bytes to 3 on channel testchainid took 153.9µs" +orderer0.example.com | "2019-09-24 00:24:37.709 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 463.8µs " +orderer0.example.com | "2019-09-24 00:24:38.207 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:38.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33d Sending msg of 28 bytes to 3 on channel testchainid took 53µs" +orderer0.example.com | "2019-09-24 00:24:38.208 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " +orderer0.example.com | "2019-09-24 00:24:38.708 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:38.708 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 340 Sending msg of 28 bytes to 3 on channel testchainid took 22.7µs" +orderer0.example.com | "2019-09-24 00:24:38.708 UTC [orderer.common.cluster.step] sendMessage -> DEBU 341 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.9µs " +orderer0.example.com | "2019-09-24 00:24:39.232 UTC [orderer.common.cluster.step] handleMessage -> DEBU 342 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:39.233 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 343 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2019-09-24 00:24:39.233 UTC [orderer.common.cluster.step] sendMessage -> DEBU 344 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127µs " +peer0.org1.example.com | "2019-09-24 00:24:56.283 UTC [gossip.privdata] NewReconciler -> DEBU 36a Private data reconciliation is enabled" +peer0.org1.example.com | "2019-09-24 00:24:56.293 UTC [gossip.state] NewGossipStateProvider -> INFO 36b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org1.example.com | "2019-09-24 00:24:56.293 UTC [gossip.state] NewGossipStateProvider -> DEBU 36c Updating gossip ledger height to 1" +peer0.org1.example.com | "2019-09-24 00:24:56.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 36d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:56.293 UTC [msp.identity] Sign -> DEBU 36e Sign: plaintext: 18057A5E1214089096D4ACDE83CEE315...624D0F542C442AB5FE8C65C22A020801 " +peer0.org1.example.com | "2019-09-24 00:24:56.294 UTC [msp.identity] Sign -> DEBU 36f Sign: digest: CDBF0E4D892BE4EA1D91E89CAF7539ECBBE09068EF43A7AF159D2E81B8E765A3 " +peer0.org1.example.com | "2019-09-24 00:24:56.294 UTC [gossip.service] InitializeChannel -> DEBU 370 Delivery uses dynamic leader election mechanism, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:24:56.300 UTC [peer] InitChain -> DEBU 371 Initializing channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:24:56.300 UTC [nodeCmd] func6 -> DEBU 372 Deploying system CC, for channel " +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 373 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [gossip.election] waitForMembershipStabilization -> DEBU 374 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 375 constructing new tx simulator txid = [c7763c86-8c8c-4363-8b44-c38cd2a22eae]" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [chaincode] Execute -> DEBU 376 Entry" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [gossip.election] handleMessages -> DEBU 377 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [chaincode] handleMessage -> DEBU 378 [c7763c86] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [chaincode] Notify -> DEBU 379 [c7763c86] notifying Txid:c7763c86-8c8c-4363-8b44-c38cd2a22eae, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [chaincode] Execute -> DEBU 37a Exit" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [sccapi] deploySysCC -> INFO 37b system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [lockbasedtxmgr] Done -> DEBU 37c Done with transaction simulation / query execution [c7763c86-8c8c-4363-8b44-c38cd2a22eae]" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 37d constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 37e constructing new tx simulator txid = [e34b8cf0-f66b-4a31-91fc-89eb05bafd3a]" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [chaincode] Execute -> DEBU 37f Entry" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [cscc] Init -> INFO 380 Init CSCC" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [chaincode] handleMessage -> DEBU 381 [e34b8cf0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [chaincode] Notify -> DEBU 382 [e34b8cf0] notifying Txid:e34b8cf0-f66b-4a31-91fc-89eb05bafd3a, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [chaincode] Execute -> DEBU 383 Exit" +peer0.org1.example.com | "2019-09-24 00:24:56.301 UTC [sccapi] deploySysCC -> INFO 384 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-09-24 00:24:56.302 UTC [lockbasedtxmgr] Done -> DEBU 385 Done with transaction simulation / query execution [e34b8cf0-f66b-4a31-91fc-89eb05bafd3a]" +peer0.org1.example.com | "2019-09-24 00:24:56.302 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 386 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:24:56.302 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 387 constructing new tx simulator txid = [b16845d8-0a86-43cf-841d-c93aea063518]" +peer0.org1.example.com | "2019-09-24 00:24:56.302 UTC [chaincode] Execute -> DEBU 388 Entry" +peer0.org1.example.com | "2019-09-24 00:24:56.302 UTC [qscc] Init -> INFO 389 Init QSCC" +peer0.org1.example.com | "2019-09-24 00:24:56.302 UTC [chaincode] handleMessage -> DEBU 38a [b16845d8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:24:56.302 UTC [chaincode] Notify -> DEBU 38b [b16845d8] notifying Txid:b16845d8-0a86-43cf-841d-c93aea063518, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:24:56.302 UTC [chaincode] Execute -> DEBU 38c Exit" +peer0.org1.example.com | "2019-09-24 00:24:56.302 UTC [sccapi] deploySysCC -> INFO 38d system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-09-24 00:24:56.303 UTC [lockbasedtxmgr] Done -> DEBU 38e Done with transaction simulation / query execution [b16845d8-0a86-43cf-841d-c93aea063518]" +peer0.org1.example.com | "2019-09-24 00:24:56.303 UTC [sccapi] deploySysCC -> INFO 38f system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org1.example.com | "2019-09-24 00:24:56.303 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 390 constructing new query executor txid = [1d660307-ec2b-42bc-81aa-c872e85d55c1]" +peer0.org1.example.com | "2019-09-24 00:24:56.303 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 391 Returning []" +peer0.org1.example.com | "2019-09-24 00:24:56.303 UTC [lockbasedtxmgr] Done -> DEBU 392 Done with transaction simulation / query execution [1d660307-ec2b-42bc-81aa-c872e85d55c1]" +peer0.org1.example.com | "2019-09-24 00:24:56.304 UTC [msp] GetDefaultSigningIdentity -> DEBU 393 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:56.304 UTC [msp.identity] Sign -> DEBU 394 Sign: plaintext: 18057A5E1214089096D4ACDE83CEE315...624D0F542C442AB5FE8C65C22A020801 " +peer0.org1.example.com | "2019-09-24 00:24:56.304 UTC [msp.identity] Sign -> DEBU 395 Sign: digest: 01C383F115D3F7901055D717429985B97166F1685AE0216205125737DD26B1AB " +peer0.org1.example.com | "2019-09-24 00:24:56.304 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 396 Listeners for channel businesschannel invoked" +peer0.org1.example.com | "2019-09-24 00:24:56.304 UTC [chaincode] handleMessage -> DEBU 397 [a328fb8f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:24:56.305 UTC [chaincode] Notify -> DEBU 398 [a328fb8f] notifying Txid:a328fb8fd28c939df2f0a906857e3549742ae0eb97293f619422ff975e8aa170, channelID:" +peer0.org1.example.com | "2019-09-24 00:24:56.305 UTC [chaincode] Execute -> DEBU 399 Exit" +peer0.org1.example.com | "2019-09-24 00:24:56.305 UTC [endorser] callChaincode -> INFO 39a [][a328fb8f] Exit chaincode: name:"cscc" (220ms)" +peer0.org1.example.com | "2019-09-24 00:24:56.305 UTC [endorser] SimulateProposal -> DEBU 39b [][a328fb8f] Exit" +peer0.org1.example.com | "2019-09-24 00:24:56.305 UTC [endorser] func1 -> DEBU 39c Exit: request from 172.18.0.9:50574" +peer0.org1.example.com | "2019-09-24 00:24:56.305 UTC [comm.grpc.server] 1 -> INFO 39d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50574 grpc.code=OK grpc.call_duration=226.4556ms +peer0.org1.example.com | "2019-09-24 00:24:56.318 UTC [grpc] infof -> DEBU 39e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:24:57.301 UTC [gossip.election] waitForMembershipStabilization -> DEBU 39f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" +peer0.org1.example.com | "2019-09-24 00:24:57.301 UTC [gossip.election] leaderElection -> DEBU 3a0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:24:57.301 UTC [gossip.election] propose -> DEBU 3a1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:24:57.301 UTC [gossip.election] propose -> DEBU 3a2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:24:57.301 UTC [msp] GetDefaultSigningIdentity -> DEBU 3a3 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:57.301 UTC [msp.identity] Sign -> DEBU 3a4 Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08F4A5F9D0DE83CEE3151001 " +peer0.org1.example.com | "2019-09-24 00:24:57.302 UTC [msp.identity] Sign -> DEBU 3a5 Sign: digest: 6BE18C4F20FF32A305E27B45001C3F2AFE73594D2FD7CF7E43E3C1A357D97099 " +peer0.org1.example.com | "2019-09-24 00:24:57.302 UTC [gossip.election] waitForInterrupt -> DEBU 3a6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:24:57.707 UTC [gossip.gossip] handleMessage -> DEBU 3a7 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:57.707 UTC [gossip.pull] HandleMessage -> DEBU 3a8 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:57.707 UTC [gossip.pull] SendDigest -> DEBU 3a9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:24:57.707 UTC [gossip.gossip] handleMessage -> DEBU 3aa Exiting" +peer0.org1.example.com | "2019-09-24 00:24:57.749 UTC [gossip.gossip] handleMessage -> DEBU 3ab Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\014" signature:"0E\002!\000\332\3470\350o\310\256U\256p\202\022\343\235\327\314\305a\230\332\037h\317\307Xi\367[\316\313\236^\002 \005\017\340\274\214Q\\\001\313\247\256\364\2363F\032h\202s\211\322\036\225&o>3\267\372\003\234\244" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:57.751 UTC [gossip.gossip] handleMessage -> DEBU 3ac Exiting" +peer0.org1.example.com | "2019-09-24 00:24:57.751 UTC [gossip.gossip] handleMessage -> DEBU 3ad Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:57.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ae Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\014" signature:"0E\002!\000\332\3470\350o\310\256U\256p\202\022\343\235\327\314\305a\230\332\037h\317\307Xi\367[\316\313\236^\002 \005\017\340\274\214Q\\\001\313\247\256\364\2363F\032h\202s\211\322\036\225&o>3\267\372\003\234\244" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:57.754 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3af Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:24:57.756 UTC [msp.identity] Verify -> DEBU 3b0 Verify: digest = 00000000 e1 d8 17 cb 59 51 9c ca f6 7e 3f a2 f7 c6 27 3a |....YQ...~?...':| +peer0.org1.example.com | 00000010 55 e0 e6 07 e6 d3 79 67 0f f9 93 a1 24 ed 81 5a |U.....yg....$..Z|" +peer0.org1.example.com | "2019-09-24 00:24:57.756 UTC [msp.identity] Verify -> DEBU 3b1 Verify: sig = 00000000 30 45 02 21 00 da e7 30 e8 6f c8 ae 55 ae 70 82 |0E.!...0.o..U.p.| +peer0.org1.example.com | 00000010 12 e3 9d d7 cc c5 61 98 da 1f 68 cf c7 58 69 f7 |......a...h..Xi.| +peer0.org1.example.com | 00000020 5b ce cb 9e 5e 02 20 05 0f e0 bc 8c 51 5c 01 cb |[...^. .....Q\..| +peer0.org1.example.com | 00000030 a7 ae f4 9e 33 46 1a 68 82 73 89 d2 1e 95 26 6f |....3F.h.s....&o| +peer0.org1.example.com | 00000040 3e 33 b7 fa 03 9c a4 |>3.....|" +peer0.org1.example.com | "2019-09-24 00:24:57.761 UTC [msp.identity] Verify -> DEBU 3b2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:24:57.761 UTC [msp.identity] Verify -> DEBU 3b3 Verify: sig = 00000000 30 44 02 20 76 78 78 ba 38 24 c4 dc bd 40 c5 2f |0D. vxx.8$...@./| +peer0.org1.example.com | 00000010 af 40 a1 28 2f d4 82 ca 6a 6d dd 5e c4 99 93 49 |.@.(/...jm.^...I| +peer0.org1.example.com | 00000020 54 f0 cd 53 02 20 3f 1c ec e4 9c 28 84 4a ed 9a |T..S. ?....(.J..| +peer0.org1.example.com | 00000030 82 18 c5 8f a6 22 20 0d d1 9d f0 8b 03 7c b9 33 |....." ......|.3| +peer0.org1.example.com | 00000040 4e 16 6c e6 f8 c5 |N.l...|" +peer0.org1.example.com | "2019-09-24 00:24:57.762 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b4 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:57.762 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:24:57.762 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b6 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:24:57.762 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b7 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:24:57.765 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b8 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:24:57.765 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b9 Exiting" +orderer0.example.com | "2019-09-24 00:24:39.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 345 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:39.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 346 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2019-09-24 00:24:39.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 347 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.9µs " +orderer0.example.com | "2019-09-24 00:24:40.210 UTC [orderer.common.cluster.step] handleMessage -> DEBU 348 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:40.210 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 349 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2019-09-24 00:24:40.210 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +orderer0.example.com | "2019-09-24 00:24:40.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:40.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34c Sending msg of 28 bytes to 3 on channel testchainid took 8.7µs" +orderer0.example.com | "2019-09-24 00:24:40.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.1µs " +orderer0.example.com | "2019-09-24 00:24:41.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:41.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34f Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2019-09-24 00:24:41.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 350 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.5µs " +orderer0.example.com | "2019-09-24 00:24:41.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 351 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:41.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 352 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +orderer0.example.com | "2019-09-24 00:24:41.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 353 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.5µs " +orderer0.example.com | "2019-09-24 00:24:42.174 UTC [orderer.common.cluster.step] handleMessage -> DEBU 354 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:42.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 355 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2019-09-24 00:24:42.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 356 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.7µs " +orderer0.example.com | "2019-09-24 00:24:42.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU 357 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:42.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 358 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +orderer0.example.com | "2019-09-24 00:24:42.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 359 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.4µs " +orderer0.example.com | "2019-09-24 00:24:43.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:43.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35b Sending msg of 28 bytes to 3 on channel testchainid took 36.6µs" +orderer0.example.com | "2019-09-24 00:24:43.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.1µs " +orderer0.example.com | "2019-09-24 00:24:43.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:43.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35e Sending msg of 28 bytes to 3 on channel testchainid took 61.6µs" +orderer0.example.com | "2019-09-24 00:24:43.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.9µs " +orderer0.example.com | "2019-09-24 00:24:44.176 UTC [orderer.common.cluster.step] handleMessage -> DEBU 360 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:44.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 361 Sending msg of 28 bytes to 3 on channel testchainid took 46.7µs" +orderer0.example.com | "2019-09-24 00:24:44.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 362 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.8µs " +orderer0.example.com | "2019-09-24 00:24:44.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU 363 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:44.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 364 Sending msg of 28 bytes to 3 on channel testchainid took 36.2µs" +orderer0.example.com | "2019-09-24 00:24:44.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 365 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.9µs " +orderer0.example.com | "2019-09-24 00:24:44.739 UTC [orderer.common.server] replicateDisabledChains -> DEBU 366 No inactive chains to try to replicate" +orderer0.example.com | "2019-09-24 00:24:45.174 UTC [orderer.common.cluster.step] handleMessage -> DEBU 367 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:45.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 368 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +orderer0.example.com | "2019-09-24 00:24:45.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 369 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 542.5µs " +orderer0.example.com | "2019-09-24 00:24:45.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:45.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147µs " +orderer0.example.com | "2019-09-24 00:24:45.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36c Sending msg of 28 bytes to 3 on channel testchainid took 563.2µs" +orderer0.example.com | "2019-09-24 00:24:46.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:46.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36e Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +orderer0.example.com | "2019-09-24 00:24:46.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.8µs " +orderer0.example.com | "2019-09-24 00:24:46.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 370 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:46.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 371 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2019-09-24 00:24:46.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 372 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.7µs " +orderer0.example.com | "2019-09-24 00:24:47.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 373 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:47.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 374 Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +orderer0.example.com | "2019-09-24 00:24:47.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 375 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +orderer0.example.com | "2019-09-24 00:24:47.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU 376 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:47.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 377 Sending msg of 28 bytes to 3 on channel testchainid took 41.4µs" +orderer0.example.com | "2019-09-24 00:24:47.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 378 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.1µs " +orderer0.example.com | "2019-09-24 00:24:48.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 379 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:48.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37a Sending msg of 28 bytes to 3 on channel testchainid took 22.7µs" +orderer0.example.com | "2019-09-24 00:24:48.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80µs " +orderer0.example.com | "2019-09-24 00:24:48.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:48.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37d Sending msg of 28 bytes to 3 on channel testchainid took 29.6µs" +orderer0.example.com | "2019-09-24 00:24:48.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " +orderer0.example.com | "2019-09-24 00:24:49.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:49.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 380 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +orderer0.example.com | "2019-09-24 00:24:49.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 381 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.7µs " +orderer0.example.com | "2019-09-24 00:24:49.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 382 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:49.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 383 Sending msg of 28 bytes to 3 on channel testchainid took 26.4µs" +orderer0.example.com | "2019-09-24 00:24:49.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 384 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +orderer0.example.com | "2019-09-24 00:24:50.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 385 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:50.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 386 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +orderer0.example.com | "2019-09-24 00:24:50.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 387 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.2µs " +orderer0.example.com | "2019-09-24 00:24:50.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 388 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:50.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 389 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +orderer0.example.com | "2019-09-24 00:24:50.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.3µs " +orderer0.example.com | "2019-09-24 00:24:51.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:51.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144µs " +orderer0.example.com | "2019-09-24 00:24:51.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38d Sending msg of 28 bytes to 3 on channel testchainid took 414.9µs" +orderer0.example.com | "2019-09-24 00:24:51.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:51.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38f Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" +orderer0.example.com | "2019-09-24 00:24:51.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 390 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.5µs " +orderer0.example.com | "2019-09-24 00:24:52.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 391 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:52.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 392 Sending msg of 28 bytes to 3 on channel testchainid took 19µs" +peer0.org1.example.com | "2019-09-24 00:24:57.765 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ba Exiting" +peer0.org1.example.com | "2019-09-24 00:24:57.765 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bb Exiting" +peer0.org1.example.com | "2019-09-24 00:24:57.766 UTC [gossip.discovery] sendMemResponse -> DEBU 3bc Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:24:57.766 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bd Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:57.766 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3be Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:24:57.766 UTC [gossip.comm] Send -> DEBU 3bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:57.766 UTC [gossip.discovery] sendMemResponse -> DEBU 3c0 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\014" signature:"0E\002!\000\332\3470\350o\310\256U\256p\202\022\343\235\327\314\305a\230\332\037h\317\307Xi\367[\316\313\236^\002 \005\017\340\274\214Q\\\001\313\247\256\364\2363F\032h\202s\211\322\036\225&o>3\267\372\003\234\244" secret_envelope: > alive: > " +peer0.org1.example.com | "2019-09-24 00:24:57.766 UTC [gossip.comm] sendToEndpoint -> DEBU 3c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:57.766 UTC [msp.identity] Verify -> DEBU 3c2 Verify: digest = 00000000 c0 f3 40 c1 e3 eb 4c 5c b7 7d ba 58 3d 1a 95 f7 |..@...L\.}.X=...| +peer0.org1.example.com | 00000010 76 aa e7 08 15 c6 d7 14 ad 78 21 f4 ab 2e 0a 05 |v........x!.....|" +peer0.org1.example.com | "2019-09-24 00:24:57.766 UTC [gossip.comm] sendToEndpoint -> DEBU 3c3 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:57.766 UTC [msp.identity] Verify -> DEBU 3c4 Verify: sig = 00000000 30 44 02 20 11 ed ae c3 93 39 79 2a 29 15 7f 94 |0D. .....9y*)...| +peer0.org1.example.com | 00000010 2b ec 9a b8 e8 fb e8 8c 23 26 3b 23 88 2c d2 17 |+.......#&;#.,..| +peer0.org1.example.com | 00000020 66 f8 4e 4a 02 20 32 98 6d d6 e9 63 67 ee df 2c |f.NJ. 2.m..cg..,| +peer0.org1.example.com | 00000030 a5 ec c3 fe 9a 97 8a da 73 68 1e 8a 08 4c fe a7 |........sh...L..| +peer0.org1.example.com | 00000040 eb 7a 53 01 b5 4a |.zS..J|" +peer0.org1.example.com | "2019-09-24 00:24:57.767 UTC [msp.identity] Verify -> DEBU 3c5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:24:57.767 UTC [msp.identity] Verify -> DEBU 3c6 Verify: sig = 00000000 30 45 02 21 00 b3 a5 86 b9 2d 6a 62 71 e7 12 fe |0E.!.....-jbq...| +peer0.org1.example.com | 00000010 97 01 d6 5a 4a 5c 28 f4 fc 6f dd ff 21 59 d8 47 |...ZJ\(..o..!Y.G| +peer0.org1.example.com | 00000020 df d8 b3 e5 8c 02 20 27 3c 9e 7b e6 f7 c7 2b c6 |...... '<.{...+.| +peer0.org1.example.com | 00000030 64 a7 75 53 52 b0 d3 d1 4e fa fa c1 47 3d a4 25 |d.uSR...N...G=.%| +peer0.org1.example.com | 00000040 1d 2d 4c ec 60 03 67 |.-L.`.g|" +peer0.org1.example.com | "2019-09-24 00:24:57.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:57.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c8 endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" lastAliveTS: 1569284677733382900, 12 but got ts: inc_num:1569284677733382900 seq_num:11 " +peer0.org1.example.com | "2019-09-24 00:24:57.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c9 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:57.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca Exiting" +peer0.org1.example.com | "2019-09-24 00:24:57.767 UTC [gossip.gossip] handleMessage -> DEBU 3cb Exiting" +peer0.org1.example.com | "2019-09-24 00:24:59.523 UTC [endorser] ProcessProposal -> DEBU 3cc Entering: request from 172.18.0.9:50582" +peer0.org1.example.com | "2019-09-24 00:24:59.523 UTC [protoutils] ValidateProposalMessage -> DEBU 3cd ValidateProposalMessage starts for signed proposal 0xc0031921e0" +peer0.org1.example.com | "2019-09-24 00:24:59.523 UTC [protoutils] validateChannelHeader -> DEBU 3ce validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:24:59.523 UTC [protoutils] checkSignatureFromCreator -> DEBU 3cf begin" +peer0.org1.example.com | "2019-09-24 00:24:59.523 UTC [protoutils] checkSignatureFromCreator -> DEBU 3d0 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:24:59.523 UTC [protoutils] checkSignatureFromCreator -> DEBU 3d1 creator is valid" +peer0.org1.example.com | "2019-09-24 00:24:59.523 UTC [msp.identity] Verify -> DEBU 3d2 Verify: digest = 00000000 7a 9f b6 b5 1a 10 48 80 73 a5 65 2b ae 64 c7 17 |z.....H.s.e+.d..| +peer0.org1.example.com | 00000010 f9 cc 49 c8 9a 03 18 8f 84 64 eb 3b 55 9a 9a 59 |..I......d.;U..Y|" +peer0.org1.example.com | "2019-09-24 00:24:59.524 UTC [msp.identity] Verify -> DEBU 3d3 Verify: sig = 00000000 30 45 02 21 00 98 df f2 26 9d b0 93 58 3e af 01 |0E.!....&...X>..| +peer0.org1.example.com | 00000010 b4 12 07 1c e1 fc 8e 7c c2 ab 52 9f 6f 03 d0 7f |.......|..R.o...| +peer0.org1.example.com | 00000020 3d 60 7f 33 6a 02 20 4d bb 96 84 45 76 c1 e9 97 |=`.3j. M...Ev...| +peer0.org1.example.com | 00000030 ba ec 4f 6f 45 13 38 04 a6 b5 ef 9d 2e 40 0b 6d |..OoE.8......@.m| +peer0.org1.example.com | 00000040 f8 d0 ae 74 62 6b 18 |...tbk.|" +peer0.org1.example.com | "2019-09-24 00:24:59.524 UTC [protoutils] checkSignatureFromCreator -> DEBU 3d4 exits successfully" +peer0.org1.example.com | "2019-09-24 00:24:59.524 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3d5 validateChaincodeProposalMessage starts for proposal 0xc003142690, header 0xc0031925f0" +peer0.org1.example.com | "2019-09-24 00:24:59.524 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3d6 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:24:59.524 UTC [endorser] preProcess -> DEBU 3d7 [][167ca488] processing txid: 167ca488f5f451a717cad4a997a95de59cf3ada9d977d902e54e3ced783802ff" +orderer0.example.com | "2019-09-24 00:24:52.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 393 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.6µs " +orderer0.example.com | "2019-09-24 00:24:52.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 394 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:52.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 395 Sending msg of 28 bytes to 3 on channel testchainid took 47.6µs" +orderer0.example.com | "2019-09-24 00:24:52.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 396 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " +orderer0.example.com | "2019-09-24 00:24:52.839 UTC [orderer.common.server] Deliver -> DEBU 397 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:24:52.839 UTC [common.deliver] Handle -> DEBU 398 Starting new deliver loop for 172.18.0.9:60628" +orderer0.example.com | "2019-09-24 00:24:52.839 UTC [common.deliver] Handle -> DEBU 399 Attempting to read seek info message from 172.18.0.9:60628" +orderer0.example.com | "2019-09-24 00:24:52.959 UTC [orderer.common.server] Broadcast -> DEBU 39a Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 00:24:52.974 UTC [orderer.common.broadcast] Handle -> DEBU 39b Starting new broadcast loop for 172.18.0.9:60630" +orderer0.example.com | "2019-09-24 00:24:52.991 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 39c [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:60630" +orderer0.example.com | "2019-09-24 00:24:52.991 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 39d Processing config update tx with system channel message processor for channel ID businesschannel" +orderer0.example.com | "2019-09-24 00:24:52.991 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 39e Processing channel create tx for channel businesschannel on system channel testchainid" +orderer0.example.com | "2019-09-24 00:24:52.992 UTC [common.channelconfig] NewStandardValues -> DEBU 39f Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a0 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a1 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a2 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a3 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a4 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:52.992 UTC [common.channelconfig] NewStandardValues -> DEBU 3a5 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a6 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a7 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a8 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a9 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3aa Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ab Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [common.channelconfig] NewStandardValues -> DEBU 3ac Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ad Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [common.channelconfig] NewStandardValues -> DEBU 3ae Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [common.channelconfig] validateMSP -> DEBU 3b0 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [msp] newBccspMsp -> DEBU 3b1 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [msp] New -> DEBU 3b2 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [msp] Setup -> DEBU 3b3 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:24:52.993 UTC [msp.identity] newIdentity -> DEBU 3b4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:52.994 UTC [msp.identity] newIdentity -> DEBU 3b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:52.994 UTC [msp] Validate -> DEBU 3b6 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:24:52.994 UTC [common.channelconfig] NewStandardValues -> DEBU 3b7 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:24:52.994 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b8 Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:24:52.994 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b9 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:52.994 UTC [common.channelconfig] NewStandardValues -> DEBU 3ba Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:24:52.994 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bb Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:24:52.994 UTC [common.channelconfig] NewStandardValues -> DEBU 3bc Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:52.994 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bd Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:52.996 UTC [common.channelconfig] Validate -> DEBU 3be Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-09-24 00:24:52.996 UTC [common.channelconfig] validateMSP -> DEBU 3bf Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:24:52.996 UTC [msp] newBccspMsp -> DEBU 3c0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:52.996 UTC [msp] New -> DEBU 3c1 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:52.997 UTC [msp] Setup -> DEBU 3c2 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:24:52.998 UTC [msp.identity] newIdentity -> DEBU 3c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:52.999 UTC [msp.identity] newIdentity -> DEBU 3c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.005 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3c5 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.006 UTC [msp] Validate -> DEBU 3c6 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.013 UTC [msp] getCertificationChain -> DEBU 3c7 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.014 UTC [msp] hasOURole -> DEBU 3c8 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:53.014 UTC [msp] getCertificationChain -> DEBU 3c9 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.014 UTC [common.channelconfig] NewStandardValues -> DEBU 3ca Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:24:53.014 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cb Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:24:53.014 UTC [common.channelconfig] NewStandardValues -> DEBU 3cc Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:53.014 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cd Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:53.014 UTC [common.channelconfig] Validate -> DEBU 3ce Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 00:24:53.014 UTC [common.channelconfig] validateMSP -> DEBU 3cf Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.015 UTC [msp] newBccspMsp -> DEBU 3d0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.015 UTC [msp] New -> DEBU 3d1 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.015 UTC [msp] Setup -> DEBU 3d2 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.015 UTC [msp.identity] newIdentity -> DEBU 3d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.019 UTC [msp.identity] newIdentity -> DEBU 3d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.021 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d5 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.021 UTC [msp] Validate -> DEBU 3d6 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.021 UTC [msp] getCertificationChain -> DEBU 3d7 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.021 UTC [msp] hasOURole -> DEBU 3d8 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:53.021 UTC [msp] getCertificationChain -> DEBU 3d9 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [msp] Setup -> DEBU 3da Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [msp] Setup -> DEBU 3db MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3dc Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3dd Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3de Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3df Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e0 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e1 Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:24:59.524 UTC [endorser] SimulateProposal -> DEBU 3d8 [][167ca488] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:24:59.524 UTC [endorser] callChaincode -> INFO 3d9 [][167ca488] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:24:59.524 UTC [chaincode] Execute -> DEBU 3da Entry" +peer0.org1.example.com | "2019-09-24 00:24:59.524 UTC [cscc] Invoke -> DEBU 3db Invoke function: GetChannels" +peer0.org1.example.com | "2019-09-24 00:24:59.525 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3dc Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:24:59.525 UTC [msp] Validate -> DEBU 3dd MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:24:59.525 UTC [msp.identity] Verify -> DEBU 3de Verify: digest = 00000000 7a 9f b6 b5 1a 10 48 80 73 a5 65 2b ae 64 c7 17 |z.....H.s.e+.d..| +peer0.org1.example.com | 00000010 f9 cc 49 c8 9a 03 18 8f 84 64 eb 3b 55 9a 9a 59 |..I......d.;U..Y|" +peer0.org1.example.com | "2019-09-24 00:24:59.525 UTC [msp.identity] Verify -> DEBU 3df Verify: sig = 00000000 30 45 02 21 00 98 df f2 26 9d b0 93 58 3e af 01 |0E.!....&...X>..| +peer0.org1.example.com | 00000010 b4 12 07 1c e1 fc 8e 7c c2 ab 52 9f 6f 03 d0 7f |.......|..R.o...| +peer0.org1.example.com | 00000020 3d 60 7f 33 6a 02 20 4d bb 96 84 45 76 c1 e9 97 |=`.3j. M...Ev...| +peer0.org1.example.com | 00000030 ba ec 4f 6f 45 13 38 04 a6 b5 ef 9d 2e 40 0b 6d |..OoE.8......@.m| +peer0.org1.example.com | 00000040 f8 d0 ae 74 62 6b 18 |...tbk.|" +peer0.org1.example.com | "2019-09-24 00:24:59.528 UTC [chaincode] handleMessage -> DEBU 3e0 [167ca488] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:24:59.528 UTC [chaincode] Notify -> DEBU 3e1 [167ca488] notifying Txid:167ca488f5f451a717cad4a997a95de59cf3ada9d977d902e54e3ced783802ff, channelID:" +peer0.org1.example.com | "2019-09-24 00:24:59.529 UTC [chaincode] Execute -> DEBU 3e2 Exit" +peer0.org1.example.com | "2019-09-24 00:24:59.529 UTC [endorser] callChaincode -> INFO 3e3 [][167ca488] Exit chaincode: name:"cscc" (5ms)" +peer0.org1.example.com | "2019-09-24 00:24:59.529 UTC [endorser] SimulateProposal -> DEBU 3e4 [][167ca488] Exit" +peer0.org1.example.com | "2019-09-24 00:24:59.529 UTC [endorser] func1 -> DEBU 3e5 Exit: request from 172.18.0.9:50582" +peer0.org1.example.com | "2019-09-24 00:24:59.529 UTC [comm.grpc.server] 1 -> INFO 3e6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50582 grpc.code=OK grpc.call_duration=7.0019ms +peer0.org1.example.com | "2019-09-24 00:24:59.534 UTC [grpc] warningf -> DEBU 3e7 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:50582: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 00:24:59.534 UTC [grpc] infof -> DEBU 3e8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:24:59.605 UTC [msp] GetDefaultSigningIdentity -> DEBU 3e9 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:59.605 UTC [msp.identity] Sign -> DEBU 3ea Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100C " +peer0.org1.example.com | "2019-09-24 00:24:59.605 UTC [msp.identity] Sign -> DEBU 3eb Sign: digest: ABFA635EDAF504F199FA8A814DE93601296E4929127A603AADC655B6752263E1 " +peer0.org1.example.com | "2019-09-24 00:24:59.605 UTC [gossip.pull] Hello -> DEBU 3ed Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:24:59.605 UTC [gossip.comm] Send -> DEBU 3ee Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:59.606 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:59.607 UTC [gossip.comm] sendToEndpoint -> DEBU 3f0 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:59.605 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ec Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:59.607 UTC [msp.identity] Sign -> DEBU 3f1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:59.607 UTC [msp.identity] Sign -> DEBU 3f2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:59.608 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3f3 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:24:59.608 UTC [gossip.comm] Send -> DEBU 3f4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:59.608 UTC [gossip.comm] sendToEndpoint -> DEBU 3f5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:24:59.608 UTC [gossip.comm] sendToEndpoint -> DEBU 3f6 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:59.610 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:59.610 UTC [msp.identity] Sign -> DEBU 3f8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100D " +peer0.org1.example.com | "2019-09-24 00:24:59.610 UTC [msp.identity] Sign -> DEBU 3f9 Sign: digest: BAFCFBACBACC2B7EB6D74262730B18D5771080AD1C7CC0BDE8DC40F55A4FADDF " +peer0.org1.example.com | "2019-09-24 00:24:59.610 UTC [msp] GetDefaultSigningIdentity -> DEBU 3fa Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:24:59.610 UTC [msp.identity] Sign -> DEBU 3fb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:24:59.610 UTC [msp.identity] Sign -> DEBU 3fc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:24:59.610 UTC [gossip.gossip] handleMessage -> DEBU 3fd Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:59.610 UTC [gossip.pull] HandleMessage -> DEBU 3fe GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:59.610 UTC [gossip.gossip] handleMessage -> DEBU 3ff Exiting" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e2 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e3 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e4 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e5 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e6 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e7 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e8 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e9 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3ea Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3eb Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] GetPolicy -> DEBU 3ec Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3ed Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:24:53.023 UTC [policies] GetPolicy -> DEBU 3ee Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:24:53.023 UTC [policies] NewManagerImpl -> DEBU 3ef Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:24:53.023 UTC [policies] GetPolicy -> DEBU 3f0 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:24:53.023 UTC [policies] NewManagerImpl -> DEBU 3f1 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:24:53.023 UTC [common.configtx] addToMap -> DEBU 3f2 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f3 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f4 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3f9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3fa Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3fb Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3ff Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 400 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 401 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 402 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 403 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 404 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 405 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 406 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 407 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 408 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 409 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 40a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 40b Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 40c Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 40d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 40e Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 40f Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 410 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 411 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 412 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 413 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 414 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 415 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 416 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 417 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 418 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 419 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41a Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41b Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41c Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41d Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41e Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41f Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 420 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 421 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 422 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 423 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 424 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 425 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:24:53.041 UTC [common.configtx] addToMap -> DEBU 426 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:24:53.041 UTC [common.configtx] addToMap -> DEBU 427 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:24:53.041 UTC [common.configtx] addToMap -> DEBU 428 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [common.configtx] verifyDeltaSet -> DEBU 429 Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [common.configtx] verifyDeltaSet -> DEBU 42a Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [common.configtx] verifyDeltaSet -> DEBU 42b Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [common.configtx] verifyDeltaSet -> DEBU 42c Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [common.configtx] verifyDeltaSet -> DEBU 42d Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [common.configtx] policyForItem -> DEBU 42e Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 42f Manager Channel looking up path []" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 430 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 431 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 432 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 433 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 434 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 435 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 436 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 437 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.042 UTC [policies] Evaluate -> DEBU 438 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2019-09-24 00:24:53.043 UTC [policies] Evaluate -> DEBU 439 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:24:53.043 UTC [policies] Evaluate -> DEBU 43a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 00:24:53.043 UTC [msp] DeserializeIdentity -> DEBU 43b Obtaining identity" +orderer0.example.com | "2019-09-24 00:24:53.043 UTC [msp.identity] newIdentity -> DEBU 43c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.043 UTC [cauthdsl] func1 -> DEBU 43d 0xc000a9d060 gate 1569284693043613700 evaluation starts" +orderer0.example.com | "2019-09-24 00:24:53.043 UTC [cauthdsl] func2 -> DEBU 43e 0xc000a9d060 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:24:53.043 UTC [cauthdsl] func2 -> DEBU 43f 0xc000a9d060 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:24:53.051 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 440 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.051 UTC [cauthdsl] func2 -> DEBU 441 0xc000a9d060 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:24:53.051 UTC [msp.identity] Verify -> DEBU 442 Verify: digest = 00000000 97 cb e5 e9 ab 5a d5 ab 02 02 b9 b4 2a 82 02 10 |.....Z......*...| +orderer0.example.com | 00000010 39 16 9d 54 d3 f4 e9 fa 77 92 06 8f 66 d8 fb 6b |9..T....w...f..k|" +orderer0.example.com | "2019-09-24 00:24:53.051 UTC [msp.identity] Verify -> DEBU 443 Verify: sig = 00000000 30 45 02 21 00 a7 92 8a ab 0b 51 a6 e0 a6 03 70 |0E.!......Q....p| +orderer0.example.com | 00000010 b8 37 e8 0c 5b cb b3 f9 e8 ce 98 1a 2f 1e de f0 |.7..[......./...| +orderer0.example.com | 00000020 11 73 a7 3d 58 02 20 29 31 6f df d8 62 8a d4 98 |.s.=X. )1o..b...| +orderer0.example.com | 00000030 2e c9 7a 7e ae aa 24 e3 16 a6 37 84 d5 65 19 5d |..z~..$...7..e.]| +orderer0.example.com | 00000040 78 c9 0d 5d 55 94 c5 |x..]U..|" +orderer0.example.com | "2019-09-24 00:24:53.052 UTC [cauthdsl] func2 -> DEBU 444 0xc000a9d060 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:24:53.052 UTC [cauthdsl] func1 -> DEBU 445 0xc000a9d060 gate 1569284693043613700 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:24:53.052 UTC [policies] Evaluate -> DEBU 446 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:53.052 UTC [policies] Evaluate -> DEBU 447 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:53.052 UTC [policies] Evaluate -> DEBU 448 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +peer0.org1.example.com | "2019-09-24 00:24:59.611 UTC [gossip.comm] Send -> DEBU 400 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:24:59.611 UTC [gossip.comm] sendToEndpoint -> DEBU 401 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:59.611 UTC [gossip.comm] sendToEndpoint -> DEBU 402 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:59.619 UTC [gossip.gossip] handleMessage -> DEBU 403 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:59.619 UTC [gossip.gossip] handleMessage -> DEBU 404 Exiting" +peer0.org1.example.com | "2019-09-24 00:24:59.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 405 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:24:59.619 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 406 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:24:59.619 UTC [msp.identity] Verify -> DEBU 407 Verify: digest = 00000000 ba fc fb ac ba cc 2b 7e b6 d7 42 62 73 0b 18 d5 |......+~..Bbs...| +peer0.org1.example.com | 00000010 77 10 80 ad 1c 7c c0 bd e8 dc 40 f5 5a 4f ad df |w....|....@.ZO..|" +peer0.org1.example.com | "2019-09-24 00:24:59.619 UTC [msp.identity] Verify -> DEBU 408 Verify: sig = 00000000 30 44 02 20 70 75 e5 76 33 60 eb 89 09 22 0d 39 |0D. pu.v3`...".9| +peer0.org1.example.com | 00000010 ab ee 6a 50 cf dc 90 62 be ee 11 c9 cc ee 78 d9 |..jP...b......x.| +peer0.org1.example.com | 00000020 b3 75 be db 02 20 37 ab 76 f8 db d3 ec 09 d9 86 |.u... 7.v.......| +peer0.org1.example.com | 00000030 0a 7c c6 82 29 bd dc 54 2d fa 07 84 3b 09 b9 08 |.|..)..T-...;...| +peer0.org1.example.com | 00000040 95 7d 0e 55 e1 6d |.}.U.m|" +peer0.org1.example.com | "2019-09-24 00:24:59.620 UTC [msp.identity] Verify -> DEBU 409 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:24:59.620 UTC [msp.identity] Verify -> DEBU 40a Verify: sig = 00000000 30 45 02 21 00 f8 cf 77 24 69 b9 5c 3d 44 e8 05 |0E.!...w$i.\=D..| +peer0.org1.example.com | 00000010 61 d0 90 40 15 23 b0 37 c6 ff 00 02 22 db bd b6 |a..@.#.7...."...| +peer0.org1.example.com | 00000020 a2 79 4c 87 6d 02 20 34 60 45 31 25 b1 f3 42 df |.yL.m. 4`E1%..B.| +peer0.org1.example.com | 00000030 24 1e a0 e0 1d ad 9b 2f c5 f3 b8 66 e1 6c b1 f6 |$....../...f.l..| +peer0.org1.example.com | 00000040 ee 57 cc da 97 b2 45 |.W....E|" +peer0.org1.example.com | "2019-09-24 00:24:59.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 40b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:59.620 UTC [gossip.discovery] isSentByMe -> DEBU 40c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:24:59.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 40d Exiting" +peer0.org1.example.com | "2019-09-24 00:24:59.620 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:00.219 UTC [gossip.comm] Send -> DEBU 40f Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:00.220 UTC [gossip.comm] sendToEndpoint -> DEBU 410 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:00.220 UTC [gossip.comm] sendToEndpoint -> DEBU 411 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:00.223 UTC [gossip.gossip] handleMessage -> DEBU 412 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:00.224 UTC [msp.identity] Verify -> DEBU 413 Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +peer0.org1.example.com | 00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +peer0.org1.example.com | "2019-09-24 00:25:00.224 UTC [msp.identity] Verify -> DEBU 414 Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +peer0.org1.example.com | 00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +peer0.org1.example.com | 00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +peer0.org1.example.com | 00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +peer0.org1.example.com | 00000040 a8 ad f9 eb 4c ce |....L.|" +peer0.org1.example.com | "2019-09-24 00:25:00.224 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 415 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:00.225 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 416 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:00.225 UTC [policies] Evaluate -> DEBU 417 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:00.225 UTC [policies] Evaluate -> DEBU 418 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:00.225 UTC [policies] Evaluate -> DEBU 419 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:00.225 UTC [msp] DeserializeIdentity -> DEBU 41a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:00.225 UTC [msp.identity] newIdentity -> DEBU 41b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +orderer0.example.com | "2019-09-24 00:24:53.052 UTC [policies] Evaluate -> DEBU 449 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:53.052 UTC [common.configtx] verifyDeltaSet -> DEBU 44a Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:24:53.052 UTC [common.configtx] verifyDeltaSet -> DEBU 44b Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.052 UTC [common.configtx] verifyDeltaSet -> DEBU 44c Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 44d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 44e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 44f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 450 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 451 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 452 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 453 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 454 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 455 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 456 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 457 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 458 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 459 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45c Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45e Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 460 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 462 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.055 UTC [common.configtx] recurseConfigMap -> DEBU 463 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.055 UTC [msp] GetDefaultSigningIdentity -> DEBU 464 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:24:53.055 UTC [msp] GetDefaultSigningIdentity -> DEBU 465 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:24:53.065 UTC [msp.identity] Sign -> DEBU 466 Sign: plaintext: 0AD2060A1B08011A0608D5C4A5EC0522...6A4F9FAD02C1E067FBD1249A945DE0C7 " +orderer0.example.com | "2019-09-24 00:24:53.065 UTC [msp.identity] Sign -> DEBU 467 Sign: digest: 09EB7DC8C9B00BF609E3AF6BCD1D7330DA10151D990739A769F469FFDF4CC6C8 " +orderer0.example.com | "2019-09-24 00:24:53.065 UTC [msp] GetDefaultSigningIdentity -> DEBU 468 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:24:53.065 UTC [msp] GetDefaultSigningIdentity -> DEBU 469 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:24:53.065 UTC [msp.identity] Sign -> DEBU 46a Sign: plaintext: 0ACE060A1708041A0608D5C4A5EC0522...593899E457549282F1269E1AE60707D7 " +orderer0.example.com | "2019-09-24 00:24:53.065 UTC [msp.identity] Sign -> DEBU 46b Sign: digest: 1CC98E8A5C9C4A407A5C9CFF834B8F994EB8F99D90D58AE7B8C56079F910960C " +orderer0.example.com | "2019-09-24 00:24:53.069 UTC [policies] Evaluate -> DEBU 46c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 00:24:53.069 UTC [policies] Evaluate -> DEBU 46d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:24:53.069 UTC [policies] Evaluate -> DEBU 46e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 00:24:53.069 UTC [policies] Evaluate -> DEBU 46f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:24:53.069 UTC [policies] Evaluate -> DEBU 470 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 00:24:53.069 UTC [msp] DeserializeIdentity -> DEBU 471 Obtaining identity" +orderer0.example.com | "2019-09-24 00:24:53.069 UTC [msp.identity] newIdentity -> DEBU 472 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.070 UTC [cauthdsl] func1 -> DEBU 473 0xc000b085f0 gate 1569284693070047800 evaluation starts" +orderer0.example.com | "2019-09-24 00:24:53.070 UTC [cauthdsl] func2 -> DEBU 474 0xc000b085f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:24:53.070 UTC [cauthdsl] func2 -> DEBU 475 0xc000b085f0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:24:53.070 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 476 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 00:24:53.070 UTC [msp] Validate -> DEBU 477 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.070 UTC [cauthdsl] func2 -> DEBU 478 0xc000b085f0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:24:53.070 UTC [msp.identity] Verify -> DEBU 479 Verify: digest = 00000000 1c c9 8e 8a 5c 9c 4a 40 7a 5c 9c ff 83 4b 8f 99 |....\.J@z\...K..| +orderer0.example.com | 00000010 4e b8 f9 9d 90 d5 8a e7 b8 c5 60 79 f9 10 96 0c |N.........`y....|" +orderer0.example.com | "2019-09-24 00:24:53.070 UTC [msp.identity] Verify -> DEBU 47a Verify: sig = 00000000 30 45 02 21 00 8a 8f 08 54 ae fa 21 bb 0e 3a ab |0E.!....T..!..:.| +orderer0.example.com | 00000010 2d c0 92 75 92 e8 b4 10 14 da 39 f5 0c 8f 82 93 |-..u......9.....| +orderer0.example.com | 00000020 2d b3 07 52 80 02 20 6d 92 b2 ec f2 26 c2 d5 92 |-..R.. m....&...| +orderer0.example.com | 00000030 b6 81 16 3c 50 0e 17 79 28 08 fe fb 31 93 ac cc |... DEBU 47b 0xc000b085f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:24:53.070 UTC [cauthdsl] func1 -> DEBU 47c 0xc000b085f0 gate 1569284693070047800 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:24:53.070 UTC [policies] Evaluate -> DEBU 47d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [policies] Evaluate -> DEBU 47e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [policies] Evaluate -> DEBU 47f Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [policies] Evaluate -> DEBU 480 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [policies] Evaluate -> DEBU 481 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [policies] Evaluate -> DEBU 482 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] NewStandardValues -> DEBU 483 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 484 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 485 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 486 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 487 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 488 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] NewStandardValues -> DEBU 489 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48a Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48b Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] NewStandardValues -> DEBU 48c Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48d Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] NewStandardValues -> DEBU 48e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48f Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:53.072 UTC [common.channelconfig] Validate -> DEBU 490 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-09-24 00:24:53.072 UTC [common.channelconfig] validateMSP -> DEBU 491 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.072 UTC [msp] newBccspMsp -> DEBU 492 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.072 UTC [msp] New -> DEBU 493 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.072 UTC [msp] Setup -> DEBU 494 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.072 UTC [msp.identity] newIdentity -> DEBU 495 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.072 UTC [msp.identity] newIdentity -> DEBU 496 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.073 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 497 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.073 UTC [msp] Validate -> DEBU 498 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.073 UTC [msp] getCertificationChain -> DEBU 499 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.073 UTC [msp] hasOURole -> DEBU 49a MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:53.073 UTC [msp] getCertificationChain -> DEBU 49b MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.073 UTC [common.channelconfig] NewStandardValues -> DEBU 49c Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:24:53.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49d Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:24:53.073 UTC [common.channelconfig] NewStandardValues -> DEBU 49e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:53.074 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49f Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:53.074 UTC [common.channelconfig] Validate -> DEBU 4a0 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 00:24:53.074 UTC [common.channelconfig] validateMSP -> DEBU 4a1 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.074 UTC [msp] newBccspMsp -> DEBU 4a2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.074 UTC [msp] New -> DEBU 4a3 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.074 UTC [msp] Setup -> DEBU 4a4 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.078 UTC [msp.identity] newIdentity -> DEBU 4a5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.078 UTC [msp.identity] newIdentity -> DEBU 4a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.078 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4a7 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.078 UTC [msp] Validate -> DEBU 4a8 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.079 UTC [msp] getCertificationChain -> DEBU 4a9 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.079 UTC [msp] hasOURole -> DEBU 4aa MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:53.079 UTC [msp] getCertificationChain -> DEBU 4ab MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.079 UTC [common.channelconfig] NewStandardValues -> DEBU 4ac Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ad Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ae Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4af Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b0 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b1 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b2 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.079 UTC [common.channelconfig] NewStandardValues -> DEBU 4b3 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:24:53.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b4 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:24:53.080 UTC [common.channelconfig] NewStandardValues -> DEBU 4b5 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:53.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b6 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:53.080 UTC [common.channelconfig] validateMSP -> DEBU 4b7 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.080 UTC [msp] newBccspMsp -> DEBU 4b8 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.080 UTC [msp] New -> DEBU 4b9 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.080 UTC [msp] Setup -> DEBU 4ba Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:24:53.081 UTC [msp.identity] newIdentity -> DEBU 4bb Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:00.230 UTC [gossip.comm] Send -> DEBU 41c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:00.231 UTC [gossip.comm] sendToEndpoint -> DEBU 41d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:00.231 UTC [gossip.comm] sendToEndpoint -> DEBU 41e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:00.231 UTC [cauthdsl] func1 -> DEBU 41f 0xc0031cb200 gate 1569284700231881400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:00.231 UTC [cauthdsl] func2 -> DEBU 420 0xc0031cb200 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:00.231 UTC [cauthdsl] func2 -> DEBU 421 0xc0031cb200 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 422 0xc0031cb200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 423 0xc0031cb200 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [cauthdsl] func1 -> DEBU 424 0xc0031cb200 gate 1569284700231881400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 425 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 426 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 427 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [cauthdsl] func1 -> DEBU 428 0xc0031fc380 gate 1569284700232226400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 429 0xc0031fc380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 42a 0xc0031fc380 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 42b Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [msp] Validate -> DEBU 42c MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [msp] getCertificationChain -> DEBU 42d MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 42e 0xc0031fc380 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [msp.identity] Verify -> DEBU 42f Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +peer0.org1.example.com | 00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [msp.identity] Verify -> DEBU 430 Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +peer0.org1.example.com | 00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +peer0.org1.example.com | 00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +peer0.org1.example.com | 00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +peer0.org1.example.com | 00000040 a8 ad f9 eb 4c ce |....L.|" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 431 0xc0031fc380 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [cauthdsl] func1 -> DEBU 432 0xc0031fc380 gate 1569284700232226400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 433 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 434 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 435 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 436 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:00.233 UTC [gossip.gossip] handleMessage -> DEBU 437 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:00.718 UTC [gossip.gossip] handleMessage -> DEBU 438 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:00.718 UTC [gossip.gossip] handleMessage -> DEBU 439 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:00.725 UTC [gossip.gossip] handleMessage -> DEBU 43a Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:00.725 UTC [gossip.pull] HandleMessage -> DEBU 43b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:00.725 UTC [gossip.gossip] handleMessage -> DEBU 43c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:00.727 UTC [gossip.gossip] handleMessage -> DEBU 43d Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:00.727 UTC [msp.identity] Verify -> DEBU 43e Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +peer0.org1.example.com | 00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +peer0.org1.example.com | "2019-09-24 00:25:00.727 UTC [msp.identity] Verify -> DEBU 43f Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +peer0.org1.example.com | 00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +peer0.org1.example.com | 00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +peer0.org1.example.com | 00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +peer0.org1.example.com | 00000040 a8 ad f9 eb 4c ce |....L.|" +peer0.org1.example.com | "2019-09-24 00:25:00.728 UTC [gossip.gossip] handleMessage -> DEBU 440 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:01.220 UTC [gossip.channel] reportMembershipChanges -> INFO 441 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.081 UTC [msp.identity] newIdentity -> DEBU 4bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.081 UTC [msp] Validate -> DEBU 4bd MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.082 UTC [msp] Setup -> DEBU 4be Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:24:53.082 UTC [msp] Setup -> DEBU 4bf MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c0 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c1 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c3 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c4 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c5 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c6 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c7 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4c8 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4c9 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4ca Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4cb Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4cc Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4cd Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4ce Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4cf Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] GetPolicy -> DEBU 4d0 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4d1 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] GetPolicy -> DEBU 4d2 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4d3 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] GetPolicy -> DEBU 4d4 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [common.configtx] addToMap -> DEBU 4d6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:24:53.083 UTC [common.configtx] addToMap -> DEBU 4d7 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4d8 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4d9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4da Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4db Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4dc Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4dd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4de Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4df Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4e0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4e1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e4 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e5 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e6 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e7 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4ea Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:24:53.086 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:24:53.086 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:24:53.086 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:24:53.087 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:24:53.089 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.089 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.089 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.089 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 50b Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] verifyDeltaSet -> DEBU 50d Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [common.configtx] policyForItem -> DEBU 50e Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:53.090 UTC [policies] Manager -> DEBU 50f Manager Channel looking up path []" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 510 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 511 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 512 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 513 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 514 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 515 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 516 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 517 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [policies] Evaluate -> DEBU 518 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [policies] Evaluate -> DEBU 519 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [policies] Evaluate -> DEBU 51a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 00:24:53.091 UTC [msp] DeserializeIdentity -> DEBU 51b Obtaining identity" +orderer0.example.com | "2019-09-24 00:24:53.092 UTC [msp.identity] newIdentity -> DEBU 51c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.092 UTC [cauthdsl] func1 -> DEBU 51d 0xc000befd00 gate 1569284693092963200 evaluation starts" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [cauthdsl] func2 -> DEBU 51e 0xc000befd00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [cauthdsl] func2 -> DEBU 51f 0xc000befd00 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 520 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [cauthdsl] func2 -> DEBU 521 0xc000befd00 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [msp.identity] Verify -> DEBU 522 Verify: digest = 00000000 97 cb e5 e9 ab 5a d5 ab 02 02 b9 b4 2a 82 02 10 |.....Z......*...| +orderer0.example.com | 00000010 39 16 9d 54 d3 f4 e9 fa 77 92 06 8f 66 d8 fb 6b |9..T....w...f..k|" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [msp.identity] Verify -> DEBU 523 Verify: sig = 00000000 30 45 02 21 00 a7 92 8a ab 0b 51 a6 e0 a6 03 70 |0E.!......Q....p| +orderer0.example.com | 00000010 b8 37 e8 0c 5b cb b3 f9 e8 ce 98 1a 2f 1e de f0 |.7..[......./...| +orderer0.example.com | 00000020 11 73 a7 3d 58 02 20 29 31 6f df d8 62 8a d4 98 |.s.=X. )1o..b...| +orderer0.example.com | 00000030 2e c9 7a 7e ae aa 24 e3 16 a6 37 84 d5 65 19 5d |..z~..$...7..e.]| +orderer0.example.com | 00000040 78 c9 0d 5d 55 94 c5 |x..]U..|" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [cauthdsl] func2 -> DEBU 524 0xc000befd00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [cauthdsl] func1 -> DEBU 525 0xc000befd00 gate 1569284693092963200 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [policies] Evaluate -> DEBU 526 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:01.702 UTC [gossip.gossip] handleMessage -> DEBU 442 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:01.702 UTC [gossip.pull] HandleMessage -> DEBU 443 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:01.702 UTC [gossip.pull] SendDigest -> DEBU 444 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:01.702 UTC [gossip.gossip] handleMessage -> DEBU 445 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:01.717 UTC [gossip.gossip] handleMessage -> DEBU 446 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\r" signature:"0D\002 X\242\344\343\\\307\207T&n\373(\032\273`&{\026EM\317\252\262C\220l\226\354\013\250\223a\002 n\025\267\014\325Z\033y3X[\354\313\245L\010\324!\363@\336p\344\207\025\210\253\317\364\364u\250" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:01.717 UTC [gossip.gossip] handleMessage -> DEBU 447 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 448 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\r" signature:"0D\002 X\242\344\343\\\307\207T&n\373(\032\273`&{\026EM\317\252\262C\220l\226\354\013\250\223a\002 n\025\267\014\325Z\033y3X[\354\313\245L\010\324!\363@\336p\344\207\025\210\253\317\364\364u\250" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 449 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [msp.identity] Verify -> DEBU 44a Verify: digest = 00000000 34 3f 0e b4 38 ca 1a 65 e6 37 9d a0 dd 73 e5 e8 |4?..8..e.7...s..| +peer0.org1.example.com | 00000010 29 0d 86 27 34 15 00 ff 6e 58 d1 79 05 9a f3 e6 |)..'4...nX.y....|" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [msp.identity] Verify -> DEBU 44b Verify: sig = 00000000 30 44 02 20 58 a2 e4 e3 5c c7 87 54 26 6e fb 28 |0D. X...\..T&n.(| +peer0.org1.example.com | 00000010 1a bb 60 26 7b 16 45 4d cf aa b2 43 90 6c 96 ec |..`&{.EM...C.l..| +peer0.org1.example.com | 00000020 0b a8 93 61 02 20 6e 15 b7 0c d5 5a 1b 79 33 58 |...a. n....Z.y3X| +peer0.org1.example.com | 00000030 5b ec cb a5 4c 08 d4 21 f3 40 de 70 e4 87 15 88 |[...L..!.@.p....| +peer0.org1.example.com | 00000040 ab cf f4 f4 75 a8 |....u.|" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [msp.identity] Verify -> DEBU 44c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [msp.identity] Verify -> DEBU 44d Verify: sig = 00000000 30 44 02 20 23 f7 a0 a6 90 e1 c8 43 03 8d fe ab |0D. #......C....| +peer0.org1.example.com | 00000010 ec b7 ef ea 23 bc 10 0a 6f 3c 5f d0 47 89 ef a3 |....#...o<_.G...| +peer0.org1.example.com | 00000020 28 d3 9b 9a 02 20 43 fa d6 d8 74 17 9e a6 c1 45 |(.... C...t....E| +peer0.org1.example.com | 00000030 ff 9f 0a 3f 50 c0 87 0b b3 43 f2 97 6d 36 a0 5c |...?P....C..m6.\| +peer0.org1.example.com | 00000040 28 f0 79 6e dd 94 |(.yn..|" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 44e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 44f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 450 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 451 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 452 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 453 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 454 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 455 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:01.718 UTC [gossip.discovery] sendMemResponse -> DEBU 456 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:01.719 UTC [gossip.comm] Send -> DEBU 457 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [policies] Evaluate -> DEBU 527 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [policies] Evaluate -> DEBU 528 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [policies] Evaluate -> DEBU 529 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [common.configtx] verifyDeltaSet -> DEBU 52a Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:24:53.093 UTC [common.configtx] verifyDeltaSet -> DEBU 52b Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.094 UTC [common.configtx] verifyDeltaSet -> DEBU 52c Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:24:53.094 UTC [common.configtx] verifyDeltaSet -> DEBU 52d Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:24:53.094 UTC [common.configtx] verifyDeltaSet -> DEBU 52e Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:24:53.094 UTC [common.configtx] verifyDeltaSet -> DEBU 52f Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:24:53.094 UTC [common.configtx] verifyDeltaSet -> DEBU 530 Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.094 UTC [common.configtx] recurseConfigMap -> DEBU 531 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.094 UTC [common.configtx] recurseConfigMap -> DEBU 532 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 533 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 534 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 535 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 536 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 537 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 538 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 539 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 53a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.105 UTC [common.configtx] recurseConfigMap -> DEBU 53b Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.106 UTC [common.configtx] recurseConfigMap -> DEBU 53c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.106 UTC [common.configtx] recurseConfigMap -> DEBU 53d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.106 UTC [common.configtx] recurseConfigMap -> DEBU 53e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 53f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 540 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 541 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 542 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 543 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 544 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 545 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.108 UTC [common.configtx] recurseConfigMap -> DEBU 546 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.108 UTC [common.configtx] recurseConfigMap -> DEBU 547 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:24:53.112 UTC [common.channelconfig] NewStandardValues -> DEBU 548 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:24:53.112 UTC [common.channelconfig] initializeProtosStruct -> DEBU 549 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:53.112 UTC [common.channelconfig] initializeProtosStruct -> DEBU 54a Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 54b Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 54c Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 54d Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.113 UTC [common.channelconfig] NewStandardValues -> DEBU 54e Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 54f Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 550 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 551 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:53.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 552 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-09-24 00:25:01.719 UTC [gossip.discovery] sendMemResponse -> DEBU 458 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\r" signature:"0D\002 X\242\344\343\\\307\207T&n\373(\032\273`&{\026EM\317\252\262C\220l\226\354\013\250\223a\002 n\025\267\014\325Z\033y3X[\354\313\245L\010\324!\363@\336p\344\207\025\210\253\317\364\364u\250" secret_envelope: > alive:\023Bu\210\022\313\250G\275Y2I\366\340\210\346\341t\303ih\202\026mo\356\353\3046\255\037" secret_envelope:\375\031\354\247J\206\277" > > " +peer0.org1.example.com | "2019-09-24 00:25:01.719 UTC [gossip.comm] sendToEndpoint -> DEBU 459 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:01.719 UTC [gossip.comm] sendToEndpoint -> DEBU 45a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:02.015 UTC [endorser] ProcessProposal -> DEBU 45b Entering: request from 172.18.0.9:50594" +peer0.org1.example.com | "2019-09-24 00:25:02.015 UTC [protoutils] ValidateProposalMessage -> DEBU 45c ValidateProposalMessage starts for signed proposal 0xc0031f2460" +peer0.org1.example.com | "2019-09-24 00:25:02.015 UTC [protoutils] validateChannelHeader -> DEBU 45d validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:25:02.015 UTC [protoutils] checkSignatureFromCreator -> DEBU 45e begin" +peer0.org1.example.com | "2019-09-24 00:25:02.015 UTC [protoutils] checkSignatureFromCreator -> DEBU 45f creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:25:02.016 UTC [protoutils] checkSignatureFromCreator -> DEBU 460 creator is valid" +peer0.org1.example.com | "2019-09-24 00:25:02.016 UTC [msp.identity] Verify -> DEBU 461 Verify: digest = 00000000 55 53 e4 5b 92 bd 4b 00 a2 d0 e1 e3 cd 49 33 22 |US.[..K......I3"| +peer0.org1.example.com | 00000010 13 c5 52 3d 94 81 d2 a4 74 f5 fe 30 19 60 c5 bd |..R=....t..0.`..|" +peer0.org1.example.com | "2019-09-24 00:25:02.016 UTC [msp.identity] Verify -> DEBU 462 Verify: sig = 00000000 30 45 02 21 00 c0 b0 01 ae bd 9e a8 94 bb 8b f4 |0E.!............| +peer0.org1.example.com | 00000010 97 e5 9e 00 8d 2e 4f 94 cd 82 11 dd af a8 94 bf |......O.........| +peer0.org1.example.com | 00000020 c6 11 e8 08 db 02 20 07 c1 f6 b9 f3 b6 45 38 1b |...... ......E8.| +peer0.org1.example.com | 00000030 00 a6 16 b8 52 58 74 be 27 60 db 34 9d ee 63 d0 |....RXt.'`.4..c.| +peer0.org1.example.com | 00000040 d2 57 75 a3 12 74 69 |.Wu..ti|" +peer0.org1.example.com | "2019-09-24 00:25:02.016 UTC [protoutils] checkSignatureFromCreator -> DEBU 463 exits successfully" +peer0.org1.example.com | "2019-09-24 00:25:02.016 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 464 validateChaincodeProposalMessage starts for proposal 0xc003143880, header 0xc0031f2870" +peer0.org1.example.com | "2019-09-24 00:25:02.016 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 465 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:25:02.016 UTC [endorser] preProcess -> DEBU 466 [][18bf9b60] processing txid: 18bf9b60fcbc59b65efd5fea3f16ecaf7278cb17f2f6ed685f8894d149290819" +peer0.org1.example.com | "2019-09-24 00:25:02.016 UTC [endorser] SimulateProposal -> DEBU 467 [][18bf9b60] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:25:02.016 UTC [endorser] callChaincode -> INFO 468 [][18bf9b60] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:25:02.016 UTC [chaincode] Execute -> DEBU 469 Entry" +peer0.org1.example.com | "2019-09-24 00:25:02.017 UTC [qscc] Invoke -> DEBU 46a Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:02.017 UTC [aclmgmt] CheckACL -> DEBU 46b acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-09-24 00:25:02.017 UTC [aclmgmt] CheckACL -> DEBU 46c acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 00:25:02.017 UTC [policies] Evaluate -> DEBU 46d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:02.017 UTC [policies] Evaluate -> DEBU 46e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:02.017 UTC [policies] Evaluate -> DEBU 46f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:02.017 UTC [msp] DeserializeIdentity -> DEBU 470 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:02.018 UTC [msp.identity] newIdentity -> DEBU 471 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:02.018 UTC [cauthdsl] func1 -> DEBU 472 0xc0032690f0 gate 1569284702018489600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:02.018 UTC [cauthdsl] func2 -> DEBU 473 0xc0032690f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:02.018 UTC [cauthdsl] func2 -> DEBU 474 0xc0032690f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:02.018 UTC [cauthdsl] func2 -> DEBU 475 0xc0032690f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-09-24 00:25:02.018 UTC [cauthdsl] func2 -> DEBU 476 0xc0032690f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:02.018 UTC [cauthdsl] func1 -> DEBU 477 0xc0032690f0 gate 1569284702018489600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:02.018 UTC [policies] Evaluate -> DEBU 478 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:02.018 UTC [policies] Evaluate -> DEBU 479 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:02.018 UTC [policies] Evaluate -> DEBU 47a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:02.018 UTC [cauthdsl] func1 -> DEBU 47b 0xc00327e270 gate 1569284702018964500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:02.019 UTC [cauthdsl] func2 -> DEBU 47c 0xc00327e270 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:02.019 UTC [cauthdsl] func2 -> DEBU 47d 0xc00327e270 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:02.019 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 47e Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:02.019 UTC [msp] Validate -> DEBU 47f MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [msp] getCertificationChain -> DEBU 480 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [cauthdsl] func2 -> DEBU 481 0xc00327e270 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [msp.identity] Verify -> DEBU 482 Verify: digest = 00000000 55 53 e4 5b 92 bd 4b 00 a2 d0 e1 e3 cd 49 33 22 |US.[..K......I3"| +peer0.org1.example.com | 00000010 13 c5 52 3d 94 81 d2 a4 74 f5 fe 30 19 60 c5 bd |..R=....t..0.`..|" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [msp.identity] Verify -> DEBU 483 Verify: sig = 00000000 30 45 02 21 00 c0 b0 01 ae bd 9e a8 94 bb 8b f4 |0E.!............| +peer0.org1.example.com | 00000010 97 e5 9e 00 8d 2e 4f 94 cd 82 11 dd af a8 94 bf |......O.........| +peer0.org1.example.com | 00000020 c6 11 e8 08 db 02 20 07 c1 f6 b9 f3 b6 45 38 1b |...... ......E8.| +peer0.org1.example.com | 00000030 00 a6 16 b8 52 58 74 be 27 60 db 34 9d ee 63 d0 |....RXt.'`.4..c.| +peer0.org1.example.com | 00000040 d2 57 75 a3 12 74 69 |.Wu..ti|" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [cauthdsl] func2 -> DEBU 484 0xc00327e270 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [cauthdsl] func1 -> DEBU 485 0xc00327e270 gate 1569284702018964500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [policies] Evaluate -> DEBU 486 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [policies] Evaluate -> DEBU 487 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [policies] Evaluate -> DEBU 488 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [policies] Evaluate -> DEBU 489 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [chaincode] handleMessage -> DEBU 48a [18bf9b60] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [chaincode] Notify -> DEBU 48b [18bf9b60] notifying Txid:18bf9b60fcbc59b65efd5fea3f16ecaf7278cb17f2f6ed685f8894d149290819, channelID:" +peer0.org1.example.com | "2019-09-24 00:25:02.020 UTC [chaincode] Execute -> DEBU 48c Exit" +peer0.org1.example.com | "2019-09-24 00:25:02.021 UTC [endorser] callChaincode -> INFO 48d [][18bf9b60] Exit chaincode: name:"qscc" (4ms)" +peer0.org1.example.com | "2019-09-24 00:25:02.021 UTC [endorser] SimulateProposal -> DEBU 48e [][18bf9b60] Exit" +peer0.org1.example.com | "2019-09-24 00:25:02.021 UTC [endorser] func1 -> DEBU 48f Exit: request from 172.18.0.9:50594" +peer0.org1.example.com | "2019-09-24 00:25:02.021 UTC [comm.grpc.server] 1 -> INFO 490 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50594 grpc.code=OK grpc.call_duration=6.2364ms +peer0.org1.example.com | "2019-09-24 00:25:02.035 UTC [grpc] infof -> DEBU 491 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:02.302 UTC [gossip.election] waitForInterrupt -> DEBU 492 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:02.303 UTC [gossip.election] beLeader -> INFO 493 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +peer0.org1.example.com | "2019-09-24 00:25:02.303 UTC [gossip.service] func1 -> INFO 494 Elected as a leader, starting delivery service for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:02.304 UTC [deliveryClient] StartDeliverForChannel -> DEBU 495 This peer will pass blocks from orderer service to other peers for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:02.304 UTC [gossip.election] leaderElection -> DEBU 496 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:02.304 UTC [gossip.election] IsLeader -> DEBU 497 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:25:02.304 UTC [ConnProducer] NewConnection -> DEBU 498 Creating a new connection" +peer0.org1.example.com | "2019-09-24 00:25:02.304 UTC [msp] GetDefaultSigningIdentity -> DEBU 499 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:02.304 UTC [msp.identity] Sign -> DEBU 49a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510021801 " +peer0.org1.example.com | "2019-09-24 00:25:02.304 UTC [msp.identity] Sign -> DEBU 49b Sign: digest: 16330C4B0ADC798E403D4DE5CE0380A099BBF9F0A5D6CCBF6E2C63B59C937C49 " +peer0.org1.example.com | "2019-09-24 00:25:02.304 UTC [gossip.election] waitForInterrupt -> DEBU 49c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:25:02.306 UTC [grpc] DialContext -> DEBU 49d parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:25:02.306 UTC [grpc] DialContext -> DEBU 49e scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:25:02.306 UTC [grpc] watcher -> DEBU 49f ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +peer0.org1.example.com | "2019-09-24 00:25:02.306 UTC [grpc] switchBalancer -> DEBU 4a0 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:25:02.307 UTC [grpc] HandleSubConnStateChange -> DEBU 4a1 pickfirstBalancer: HandleSubConnStateChange: 0xc0032b1d20, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:25:02.309 UTC [gossip.comm] Send -> DEBU 4a2 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4a4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:02.323 UTC [grpc] HandleSubConnStateChange -> DEBU 4a5 pickfirstBalancer: HandleSubConnStateChange: 0xc0032b1d20, READY" +peer0.org1.example.com | "2019-09-24 00:25:02.324 UTC [ConnProducer] NewConnection -> DEBU 4a6 Connected to {orderer1.example.com:7050 [OrdererMSP]}" +peer0.org1.example.com | "2019-09-24 00:25:02.324 UTC [deliveryClient] connect -> DEBU 4a7 Connected to orderer1.example.com:7050" +orderer0.example.com | "2019-09-24 00:24:53.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 553 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:53.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 554 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.114 UTC [common.channelconfig] NewStandardValues -> DEBU 555 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:24:53.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 556 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:24:53.114 UTC [common.channelconfig] NewStandardValues -> DEBU 557 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:53.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 558 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:53.115 UTC [common.channelconfig] validateMSP -> DEBU 559 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.115 UTC [msp] newBccspMsp -> DEBU 55a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.115 UTC [msp] New -> DEBU 55b Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.115 UTC [msp] Setup -> DEBU 55c Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:24:53.121 UTC [msp.identity] newIdentity -> DEBU 55d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.122 UTC [msp.identity] newIdentity -> DEBU 55e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.122 UTC [msp] Validate -> DEBU 55f MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.123 UTC [common.channelconfig] NewStandardValues -> DEBU 560 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:24:53.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 561 Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:24:53.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 562 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.123 UTC [common.channelconfig] NewStandardValues -> DEBU 563 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:24:53.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 564 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:24:53.123 UTC [common.channelconfig] NewStandardValues -> DEBU 565 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:53.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 566 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:53.123 UTC [common.channelconfig] Validate -> DEBU 567 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-09-24 00:24:53.123 UTC [common.channelconfig] validateMSP -> DEBU 568 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.123 UTC [msp] newBccspMsp -> DEBU 569 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.123 UTC [msp] New -> DEBU 56a Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.124 UTC [msp] Setup -> DEBU 56b Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.124 UTC [msp.identity] newIdentity -> DEBU 56c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.124 UTC [msp.identity] newIdentity -> DEBU 56d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.125 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 56e Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.125 UTC [msp] Validate -> DEBU 56f MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.125 UTC [msp] getCertificationChain -> DEBU 570 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.125 UTC [msp] hasOURole -> DEBU 571 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:53.125 UTC [msp] getCertificationChain -> DEBU 572 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.126 UTC [common.channelconfig] NewStandardValues -> DEBU 573 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:24:53.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU 574 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:24:53.132 UTC [common.channelconfig] NewStandardValues -> DEBU 575 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:53.133 UTC [common.channelconfig] initializeProtosStruct -> DEBU 576 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:53.133 UTC [common.channelconfig] Validate -> DEBU 577 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 00:24:53.133 UTC [common.channelconfig] validateMSP -> DEBU 578 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.133 UTC [msp] newBccspMsp -> DEBU 579 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.133 UTC [msp] New -> DEBU 57a Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.133 UTC [msp] Setup -> DEBU 57b Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.134 UTC [msp.identity] newIdentity -> DEBU 57c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.134 UTC [msp.identity] newIdentity -> DEBU 57d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | "2019-09-24 00:25:02.324 UTC [deliveryClient] connect -> DEBU 4a8 Establishing gRPC stream with orderer1.example.com:7050 ..." +peer0.org1.example.com | "2019-09-24 00:25:02.324 UTC [deliveryClient] afterConnect -> DEBU 4a9 Entering" +peer0.org1.example.com | "2019-09-24 00:25:02.325 UTC [deliveryClient] RequestBlocks -> DEBU 4aa Starting deliver with block [1] for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:02.325 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ab Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:02.328 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ac Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:02.328 UTC [msp.identity] Sign -> DEBU 4ad Sign: plaintext: 0A91070A3D08051A0608DEC4A5EC0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " +peer0.org1.example.com | "2019-09-24 00:25:02.328 UTC [msp.identity] Sign -> DEBU 4ae Sign: digest: 101231B2F73DC3D5EB3249BF16DE04C91E162D2C76EBA3809392C4625FC43D17 " +peer0.org1.example.com | "2019-09-24 00:25:02.328 UTC [deliveryClient] afterConnect -> DEBU 4af Exiting" +peer0.org1.example.com | "2019-09-24 00:25:02.705 UTC [gossip.gossip] handleMessage -> DEBU 4b0 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.135 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 57e Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.135 UTC [msp] Validate -> DEBU 57f MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.135 UTC [msp] getCertificationChain -> DEBU 580 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.135 UTC [msp] hasOURole -> DEBU 581 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:53.135 UTC [msp] getCertificationChain -> DEBU 582 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.135 UTC [msp] Setup -> DEBU 583 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:24:53.135 UTC [msp] Setup -> DEBU 584 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:24:53.135 UTC [policies] NewManagerImpl -> DEBU 585 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 586 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 587 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 588 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 589 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 58a Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 58b Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 58c Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 58d Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 58e Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 58f Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 590 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 591 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 592 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 593 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 594 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 595 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 596 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 59a Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 59b Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [common.configtx] addToMap -> DEBU 59c Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [common.configtx] addToMap -> DEBU 59d Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.141 UTC [common.configtx] addToMap -> DEBU 59e Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.142 UTC [common.configtx] addToMap -> DEBU 59f Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:24:53.142 UTC [common.configtx] addToMap -> DEBU 5a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:24:53.142 UTC [common.configtx] addToMap -> DEBU 5a1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:24:53.143 UTC [common.configtx] addToMap -> DEBU 5a2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:24:53.143 UTC [common.configtx] addToMap -> DEBU 5a3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:24:53.143 UTC [common.configtx] addToMap -> DEBU 5a4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5a5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5a6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5a7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5a8 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5a9 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5aa Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5ab Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5ac Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5ad Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:53.145 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:24:53.151 UTC [common.capabilities] Supported -> DEBU 5c8 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:24:53.151 UTC [common.capabilities] Supported -> DEBU 5c9 Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:24:53.154 UTC [orderer.common.cluster] NewStream -> DEBU 5ca Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +orderer0.example.com | "2019-09-24 00:24:53.154 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 5cb Sending msg of 24753 bytes to 3 on channel testchainid took 673.8µs" +orderer0.example.com | "2019-09-24 00:24:53.154 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 5cc [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:60630" +orderer0.example.com | "2019-09-24 00:24:53.159 UTC [orderer.common.broadcast] Handle -> DEBU 5cd Received EOF from 172.18.0.9:60630, hangup" +orderer0.example.com | "2019-09-24 00:24:53.159 UTC [orderer.common.server] func1 -> DEBU 5ce Closing Broadcast stream" +orderer0.example.com | "2019-09-24 00:24:53.159 UTC [comm.grpc.server] 1 -> INFO 5cf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:60630 grpc.code=OK grpc.call_duration=199.744ms +orderer0.example.com | "2019-09-24 00:24:53.161 UTC [common.deliver] deliverBlocks -> DEBU 5d0 Rejecting deliver for 172.18.0.9:60628 because channel businesschannel not found" +orderer0.example.com | "2019-09-24 00:24:53.161 UTC [orderer.common.server] func1 -> DEBU 5d1 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:24:53.161 UTC [comm.grpc.server] 1 -> INFO 5d2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60628 grpc.code=OK grpc.call_duration=322.0027ms +orderer0.example.com | "2019-09-24 00:24:53.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5d3 Send of SubmitRequest for channel testchainid with payload of size 24753 to orderer2.example.com(orderer2.example.com:7050) took 157.9µs " +orderer0.example.com | "2019-09-24 00:24:53.296 UTC [orderer.common.server] Deliver -> DEBU 5d4 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:24:53.297 UTC [common.deliver] Handle -> DEBU 5d5 Starting new deliver loop for 172.18.0.9:60632" +orderer0.example.com | "2019-09-24 00:24:53.297 UTC [common.deliver] Handle -> DEBU 5d6 Attempting to read seek info message from 172.18.0.9:60632" +orderer0.example.com | "2019-09-24 00:24:53.334 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 24964" +orderer0.example.com | "2019-09-24 00:24:53.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | "2019-09-24 00:25:02.705 UTC [gossip.gossip] handleMessage -> DEBU 4b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:02.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:02.705 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:02.705 UTC [msp.identity] Verify -> DEBU 4b4 Verify: digest = 00000000 58 62 7b 62 cd 7f b6 e2 c4 83 ca dd e6 41 da 84 |Xb{b.........A..| +peer0.org1.example.com | 00000010 ab 64 d6 04 73 af 05 5a 24 35 6e 05 7c 10 a5 ff |.d..s..Z$5n.|...|" +peer0.org1.example.com | "2019-09-24 00:25:02.705 UTC [msp.identity] Verify -> DEBU 4b5 Verify: sig = 00000000 30 45 02 21 00 ed dd 15 67 c4 98 20 ea d3 d8 d7 |0E.!....g.. ....| +peer0.org1.example.com | 00000010 1f e6 b4 e4 59 c2 b8 70 87 eb fd 5d 64 da 9d 39 |....Y..p...]d..9| +peer0.org1.example.com | 00000020 2b 4d 91 62 d8 02 20 23 1e 13 81 d3 36 56 ff e4 |+M.b.. #....6V..| +peer0.org1.example.com | 00000030 26 59 30 bd 1a 43 55 bd 1d 93 27 b6 31 c9 9d 95 |&Y0..CU...'.1...| +peer0.org1.example.com | 00000040 04 ce 16 72 db a2 8a |...r...|" +peer0.org1.example.com | "2019-09-24 00:25:02.706 UTC [msp.identity] Verify -> DEBU 4b6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:02.706 UTC [msp.identity] Verify -> DEBU 4b7 Verify: sig = 00000000 30 44 02 20 44 0a 53 ca 64 05 7e 26 a7 25 de 89 |0D. D.S.d.~&.%..| +peer0.org1.example.com | 00000010 49 0d a3 ee ed 80 92 66 95 aa 5a 1e d2 e2 4f 53 |I......f..Z...OS| +peer0.org1.example.com | 00000020 06 2c 84 03 02 20 39 fe 1b d2 32 ad 87 87 ce a5 |.,... 9...2.....| +peer0.org1.example.com | 00000030 1f cc 10 68 b8 44 0d a9 85 1e ad f5 f2 75 48 37 |...h.D.......uH7| +peer0.org1.example.com | 00000040 38 44 aa d4 47 1a |8D..G.|" +peer0.org1.example.com | "2019-09-24 00:25:02.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:02.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:02.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ba updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:02.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:02.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:02.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:02.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 4be Exiting" +peer0.org1.example.com | "2019-09-24 00:25:02.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:03.607 UTC [gossip.pull] Hello -> DEBU 4c0 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:03.607 UTC [gossip.comm] Send -> DEBU 4c1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:03.607 UTC [gossip.comm] sendToEndpoint -> DEBU 4c2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:03.607 UTC [gossip.comm] sendToEndpoint -> DEBU 4c3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:03.608 UTC [gossip.gossip] handleMessage -> DEBU 4c4 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:03.608 UTC [gossip.pull] HandleMessage -> DEBU 4c5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:03.608 UTC [gossip.gossip] handleMessage -> DEBU 4c6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:03.611 UTC [msp] GetDefaultSigningIdentity -> DEBU 4c7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:03.611 UTC [msp.identity] Sign -> DEBU 4c8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100E " +peer0.org1.example.com | "2019-09-24 00:25:03.611 UTC [msp.identity] Sign -> DEBU 4c9 Sign: digest: 147548AFB50BA67FE01DDBC1E73EF842877143C9F8ADE87B8F8E37896B6197C0 " +peer0.org1.example.com | "2019-09-24 00:25:03.611 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ca Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:03.611 UTC [msp.identity] Sign -> DEBU 4cb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:03.612 UTC [msp.identity] Sign -> DEBU 4cc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:03.612 UTC [gossip.comm] Send -> DEBU 4cd Entering, sending GossipMessage: tag:EMPTY mem_req:\353\247\262" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +orderer0.example.com | "2019-09-24 00:24:53.344 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5d9 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +orderer0.example.com | "2019-09-24 00:24:53.344 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5da Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.9µs " +orderer0.example.com | "2019-09-24 00:24:53.344 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5db Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +orderer0.example.com | "2019-09-24 00:24:53.344 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5dc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67µs " +orderer0.example.com | "2019-09-24 00:24:53.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5dd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:53.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5de Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +orderer0.example.com | "2019-09-24 00:24:53.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5df Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 229.6µs " +orderer0.example.com | "2019-09-24 00:24:53.358 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5e0 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 00:24:53.358 UTC [common.channelconfig] NewStandardValues -> DEBU 5e1 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:24:53.358 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e2 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e3 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e4 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e5 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e6 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] NewStandardValues -> DEBU 5e7 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e8 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e9 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ea Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5eb Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ec Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ed Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] NewStandardValues -> DEBU 5ee Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ef Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] NewStandardValues -> DEBU 5f0 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f1 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:53.359 UTC [common.channelconfig] validateMSP -> DEBU 5f2 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.360 UTC [msp] newBccspMsp -> DEBU 5f3 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.360 UTC [msp] New -> DEBU 5f4 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.360 UTC [msp] Setup -> DEBU 5f5 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:24:53.361 UTC [msp.identity] newIdentity -> DEBU 5f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.361 UTC [msp.identity] newIdentity -> DEBU 5f7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.361 UTC [msp] Validate -> DEBU 5f8 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [common.channelconfig] NewStandardValues -> DEBU 5f9 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fa Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fb Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [common.channelconfig] NewStandardValues -> DEBU 5fc Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fd Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [common.channelconfig] NewStandardValues -> DEBU 5fe Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ff Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [common.channelconfig] Validate -> DEBU 600 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [common.channelconfig] validateMSP -> DEBU 601 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [msp] newBccspMsp -> DEBU 602 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [msp] New -> DEBU 603 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.362 UTC [msp] Setup -> DEBU 604 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:03.612 UTC [gossip.comm] sendToEndpoint -> DEBU 4ce Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\353\247\262" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:03.612 UTC [gossip.comm] sendToEndpoint -> DEBU 4cf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:03.614 UTC [gossip.gossip] handleMessage -> DEBU 4d0 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:03.614 UTC [gossip.gossip] handleMessage -> DEBU 4d1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:03.614 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:03.614 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:03.614 UTC [msp.identity] Verify -> DEBU 4d4 Verify: digest = 00000000 14 75 48 af b5 0b a6 7f e0 1d db c1 e7 3e f8 42 |.uH..........>.B| +peer0.org1.example.com | 00000010 87 71 43 c9 f8 ad e8 7b 8f 8e 37 89 6b 61 97 c0 |.qC....{..7.ka..|" +peer0.org1.example.com | "2019-09-24 00:25:03.614 UTC [msp.identity] Verify -> DEBU 4d5 Verify: sig = 00000000 30 44 02 20 1c a0 36 1f 33 9a 1f 0b d4 d7 39 86 |0D. ..6.3.....9.| +peer0.org1.example.com | 00000010 83 e2 c0 cc 9f 3f 1e 99 de 30 a8 ca 03 37 9b bc |.....?...0...7..| +peer0.org1.example.com | 00000020 2d f9 d5 d1 02 20 14 17 ac 57 e2 02 10 8f 24 42 |-.... ...W....$B| +peer0.org1.example.com | 00000030 56 d0 37 e9 7d 4e af 5d e7 6b 5e 83 a4 ba f4 18 |V.7.}N.].k^.....| +peer0.org1.example.com | 00000040 05 03 3e eb a7 b2 |..>...|" +peer0.org1.example.com | "2019-09-24 00:25:03.615 UTC [msp.identity] Verify -> DEBU 4d6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:03.615 UTC [msp.identity] Verify -> DEBU 4d7 Verify: sig = 00000000 30 44 02 20 20 2d dd 55 4e c3 64 2c 85 19 eb 29 |0D. -.UN.d,...)| +peer0.org1.example.com | 00000010 b8 86 11 be 76 20 a2 61 9b b9 2b 6f 89 2f f4 6f |....v .a..+o./.o| +peer0.org1.example.com | 00000020 18 d8 b1 e2 02 20 10 2e 50 d5 ab a4 23 20 18 b4 |..... ..P...# ..| +peer0.org1.example.com | 00000030 a0 1c fd 4e 45 c8 b9 9c ea 1f 83 9c ed 28 e2 bf |...NE........(..| +peer0.org1.example.com | 00000040 a9 f0 6c 38 e0 79 |..l8.y|" +peer0.org1.example.com | "2019-09-24 00:25:03.616 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:03.616 UTC [gossip.discovery] isSentByMe -> DEBU 4d9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:03.616 UTC [gossip.discovery] handleAliveMessage -> DEBU 4da Exiting" +peer0.org1.example.com | "2019-09-24 00:25:03.617 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4db Exiting" +peer0.org1.example.com | "2019-09-24 00:25:04.219 UTC [gossip.comm] Send -> DEBU 4dc Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:04.220 UTC [gossip.pull] Hello -> DEBU 4dd Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:04.220 UTC [gossip.comm] Send -> DEBU 4de Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:04.220 UTC [gossip.comm] sendToEndpoint -> DEBU 4df Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.220 UTC [gossip.comm] sendToEndpoint -> DEBU 4e0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:04.220 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.220 UTC [gossip.comm] sendToEndpoint -> DEBU 4e2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:04.222 UTC [gossip.gossip] handleMessage -> DEBU 4e3 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.222 UTC [msp.identity] Verify -> DEBU 4e4 Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +peer0.org1.example.com | 00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +peer0.org1.example.com | "2019-09-24 00:25:04.222 UTC [msp.identity] Verify -> DEBU 4e5 Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +peer0.org1.example.com | 00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +peer0.org1.example.com | 00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +peer0.org1.example.com | 00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +peer0.org1.example.com | 00000040 a8 ad f9 eb 4c ce |....L.|" +peer0.org1.example.com | "2019-09-24 00:25:04.223 UTC [msp.identity] Verify -> DEBU 4e6 Verify: digest = 00000000 01 c3 83 f1 15 d3 f7 90 10 55 d7 17 42 99 85 b9 |.........U..B...| +peer0.org1.example.com | 00000010 71 66 f1 68 5a e0 21 62 05 12 57 37 dd 26 b1 ab |qf.hZ.!b..W7.&..|" +peer0.org1.example.com | "2019-09-24 00:25:04.223 UTC [msp.identity] Verify -> DEBU 4e7 Verify: sig = 00000000 30 44 02 20 66 11 5f 81 fb 7e 19 3a 27 09 3f 44 |0D. f._..~.:'.?D| +peer0.org1.example.com | 00000010 c8 f2 51 d0 96 f5 20 e3 a9 1a b8 da 4a 77 ca cb |..Q... .....Jw..| +peer0.org1.example.com | 00000020 f8 90 a1 58 02 20 41 53 30 55 18 a3 7d e6 ac 47 |...X. AS0U..}..G| +peer0.org1.example.com | 00000030 b3 17 48 1d 9d 73 6d 51 e1 46 9e 81 bb dd 43 e3 |..H..smQ.F....C.| +peer0.org1.example.com | 00000040 ca 46 2d 3f 0c cf |.F-?..|" +peer0.org1.example.com | "2019-09-24 00:25:04.223 UTC [gossip.gossip] handleMessage -> DEBU 4e8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:04.515 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 4e9 Got policy manager for channel [businesschannel] with flag [true]" +orderer0.example.com | "2019-09-24 00:24:53.363 UTC [msp.identity] newIdentity -> DEBU 605 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.363 UTC [msp.identity] newIdentity -> DEBU 606 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.364 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 607 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.364 UTC [msp] Validate -> DEBU 608 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [msp] getCertificationChain -> DEBU 609 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [msp] hasOURole -> DEBU 60a MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [msp] getCertificationChain -> DEBU 60b MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [common.channelconfig] NewStandardValues -> DEBU 60c Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU 60d Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [common.channelconfig] NewStandardValues -> DEBU 60e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU 60f Processing field: MSP" +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [common.channelconfig] Validate -> DEBU 610 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [common.channelconfig] validateMSP -> DEBU 611 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [msp] newBccspMsp -> DEBU 612 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [msp] New -> DEBU 613 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:24:53.365 UTC [msp] Setup -> DEBU 614 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.398 UTC [msp.identity] newIdentity -> DEBU 615 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.400 UTC [msp.identity] newIdentity -> DEBU 616 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:53.401 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 617 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.401 UTC [msp] Validate -> DEBU 618 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:53.402 UTC [msp] getCertificationChain -> DEBU 619 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.402 UTC [msp] hasOURole -> DEBU 61a MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:24:53.402 UTC [msp] getCertificationChain -> DEBU 61b MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [msp] Setup -> DEBU 61c Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [msp] Setup -> DEBU 61d MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 61e Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 61f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 620 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 621 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 622 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 623 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 624 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 625 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 626 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.515 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 4ea Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:04.515 UTC [policies] Evaluate -> DEBU 4eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 00:25:04.516 UTC [policies] Evaluate -> DEBU 4ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:04.516 UTC [policies] Evaluate -> DEBU 4ed == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.516 UTC [msp] DeserializeIdentity -> DEBU 4ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.516 UTC [msp.identity] newIdentity -> DEBU 4ef Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org1.example.com | KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO +peer0.org1.example.com | CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM +peer0.org1.example.com | SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q +peer0.org1.example.com | 1A== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:04.516 UTC [cauthdsl] func1 -> DEBU 4f0 0xc003340a50 gate 1569284704516773600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:04.516 UTC [cauthdsl] func2 -> DEBU 4f1 0xc003340a50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:04.517 UTC [cauthdsl] func2 -> DEBU 4f2 0xc003340a50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:04.517 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f3 Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | "2019-09-24 00:25:04.517 UTC [msp] Validate -> DEBU 4f4 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:04.518 UTC [cauthdsl] func2 -> DEBU 4f5 0xc003340a50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.518 UTC [msp.identity] Verify -> DEBU 4f6 Verify: digest = 00000000 d2 1e 72 70 67 b2 06 6d 7c de 9c 54 89 82 75 31 |..rpg..m|..T..u1| +peer0.org1.example.com | 00000010 a3 ca d1 43 4b bd 00 28 43 cd b5 03 06 5d c9 ad |...CK..(C....]..|" +peer0.org1.example.com | "2019-09-24 00:25:04.518 UTC [msp.identity] Verify -> DEBU 4f7 Verify: sig = 00000000 30 44 02 20 11 98 88 db 58 46 3a 75 bf 72 8d 6f |0D. ....XF:u.r.o| +peer0.org1.example.com | 00000010 e9 0b 97 34 f1 60 c2 f7 80 1d b3 e8 52 64 31 ed |...4.`......Rd1.| +peer0.org1.example.com | 00000020 99 a9 c7 02 02 20 61 fd 6b 36 ff 08 bd 18 11 23 |..... a.k6.....#| +peer0.org1.example.com | 00000030 23 46 21 1e a9 64 e5 c9 08 c7 29 50 24 4b 44 ab |#F!..d....)P$KD.| +peer0.org1.example.com | 00000040 f5 3d 76 0b b2 17 |.=v...|" +peer0.org1.example.com | "2019-09-24 00:25:04.518 UTC [cauthdsl] func2 -> DEBU 4f8 0xc003340a50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.519 UTC [cauthdsl] func1 -> DEBU 4f9 0xc003340a50 gate 1569284704516773600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:04.519 UTC [policies] Evaluate -> DEBU 4fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:25:04.519 UTC [policies] Evaluate -> DEBU 4fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:25:04.519 UTC [policies] Evaluate -> DEBU 4fc Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:25:04.519 UTC [policies] Evaluate -> DEBU 4fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:25:04.519 UTC [blocksProvider] DeliverBlocks -> DEBU 4fe [businesschannel] Adding payload to local buffer, blockNum = [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.519 UTC [gossip.state] addPayload -> DEBU 4ff [businesschannel] Adding payload to local buffer, blockNum = [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.523 UTC [gossip.state] deliverPayloads -> DEBU 500 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.523 UTC [gossip.state] addPayload -> DEBU 501 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-09-24 00:25:04.523 UTC [blocksProvider] DeliverBlocks -> DEBU 502 [businesschannel] Gossiping block [1], peers number [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.523 UTC [gossip.channel] AddToMsgStore -> DEBU 503 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23706 bytes, seq: 1}, Envelope: 23739 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 00:25:04.523 UTC [gossip.pull] Add -> DEBU 504 Added 1, total items: 1" +peer0.org1.example.com | "2019-09-24 00:25:04.524 UTC [gossip.state] deliverPayloads -> DEBU 505 [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 00:25:04.524 UTC [gossip.privdata] StoreBlock -> INFO 506 [businesschannel] Received block [1] from buffer" +peer0.org1.example.com | "2019-09-24 00:25:04.524 UTC [gossip.privdata] StoreBlock -> DEBU 507 [businesschannel] Validating block [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.524 UTC [committer.txvalidator] Validate -> DEBU 508 [businesschannel] START Block Validation for block [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.524 UTC [committer.txvalidator] Validate -> DEBU 509 expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 00:25:04.524 UTC [committer.txvalidator] validateTx -> DEBU 50a [businesschannel] validateTx starts for block 0xc003207640 env 0xc003372910 txn 0" +peer0.org1.example.com | "2019-09-24 00:25:04.524 UTC [protoutils] ValidateTransaction -> DEBU 50b ValidateTransactionEnvelope starts for envelope 0xc003372910" +peer0.org1.example.com | "2019-09-24 00:25:04.524 UTC [protoutils] ValidateTransaction -> DEBU 50c Header is channel_header:"\010\001\032\006\010\340\304\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030H[[\271^t\272\032j:L\355q\2311W\251d\226\376\275\317*`" " +peer0.org1.example.com | "2019-09-24 00:25:04.524 UTC [protoutils] validateChannelHeader -> DEBU 50d validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-09-24 00:25:04.524 UTC [protoutils] checkSignatureFromCreator -> DEBU 50e begin" +peer0.org1.example.com | "2019-09-24 00:25:04.525 UTC [msp] GetManagerForChain -> DEBU 50f Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:25:04.525 UTC [msp] DeserializeIdentity -> DEBU 510 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.525 UTC [msp.identity] newIdentity -> DEBU 511 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 627 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 628 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 629 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62a Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62b Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62c Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62d Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62e Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62f Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 630 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 631 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 632 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 633 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 634 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [common.configtx] addToMap -> DEBU 635 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [common.configtx] addToMap -> DEBU 636 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [common.configtx] addToMap -> DEBU 637 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [common.configtx] addToMap -> DEBU 638 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:24:53.404 UTC [common.configtx] addToMap -> DEBU 639 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63d Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63f Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 640 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 641 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 642 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 643 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 644 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 645 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 646 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 647 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 648 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 649 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 64a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 64b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.406 UTC [common.configtx] addToMap -> DEBU 64c Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 64d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 64e Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 64f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 650 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 651 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 652 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 653 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.434 UTC [common.configtx] addToMap -> DEBU 654 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:24:53.434 UTC [common.configtx] addToMap -> DEBU 655 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:24:53.434 UTC [common.configtx] addToMap -> DEBU 656 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:24:53.439 UTC [common.configtx] addToMap -> DEBU 657 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 658 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 659 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65a Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65b Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65c Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65e Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65f Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:04.525 UTC [protoutils] checkSignatureFromCreator -> DEBU 512 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-09-24 00:25:04.525 UTC [msp] Validate -> DEBU 513 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:04.525 UTC [protoutils] checkSignatureFromCreator -> DEBU 514 creator is valid" +peer0.org1.example.com | "2019-09-24 00:25:04.525 UTC [msp.identity] Verify -> DEBU 515 Verify: digest = 00000000 d7 14 e8 2b 94 85 19 a5 c4 c6 05 0c cc 2a 09 90 |...+.........*..| +peer0.org1.example.com | 00000010 b0 cc fb 3e 0b 34 fc ba 21 0e 70 39 e6 70 65 55 |...>.4..!.p9.peU|" +peer0.org1.example.com | "2019-09-24 00:25:04.526 UTC [msp.identity] Verify -> DEBU 516 Verify: sig = 00000000 30 45 02 21 00 9c 2f 49 ca 50 e2 c2 b9 1d bd c4 |0E.!../I.P......| +peer0.org1.example.com | 00000010 29 2b b2 d5 77 08 fe 65 ea 7b b4 a7 88 f3 a9 06 |)+..w..e.{......| +peer0.org1.example.com | 00000020 08 02 e9 88 38 02 20 0e 04 dc 5a a0 be d2 83 e1 |....8. ...Z.....| +peer0.org1.example.com | 00000030 a4 51 e3 80 d1 f7 48 32 17 b4 51 91 23 6c 92 d2 |.Q....H2..Q.#l..| +peer0.org1.example.com | 00000040 f9 3e 14 b4 e1 e7 68 |.>....h|" +peer0.org1.example.com | "2019-09-24 00:25:04.526 UTC [protoutils] checkSignatureFromCreator -> DEBU 517 exits successfully" +peer0.org1.example.com | "2019-09-24 00:25:04.526 UTC [protoutils] validateConfigTransaction -> DEBU 518 validateConfigTransaction starts for data 0xc0033a4000, header channel_header:"\010\001\032\006\010\340\304\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030H[[\271^t\272\032j:L\355q\2311W\251d\226\376\275\317*`" " +peer0.org1.example.com | "2019-09-24 00:25:04.526 UTC [committer.txvalidator] validateTx -> DEBU 519 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:04.530 UTC [common.configtx] addToMap -> DEBU 51a Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 00:25:04.530 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:04.530 UTC [common.configtx] addToMap -> DEBU 51c Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.530 UTC [common.configtx] addToMap -> DEBU 51d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.531 UTC [common.configtx] addToMap -> DEBU 51e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.531 UTC [common.configtx] addToMap -> DEBU 51f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:25:04.531 UTC [common.configtx] addToMap -> DEBU 520 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:04.532 UTC [common.configtx] addToMap -> DEBU 521 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:25:04.532 UTC [common.configtx] addToMap -> DEBU 522 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 00:25:04.532 UTC [common.configtx] addToMap -> DEBU 523 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 524 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 525 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 526 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 527 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 528 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 529 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:04.534 UTC [common.configtx] addToMap -> DEBU 52a Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:25:04.535 UTC [common.configtx] verifyDeltaSet -> DEBU 52b Processing change to key: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.535 UTC [common.configtx] policyForItem -> DEBU 52c Getting policy for item Org1MSP with mod_policy Admins" +peer0.org1.example.com | "2019-09-24 00:25:04.535 UTC [policies] Manager -> DEBU 52d Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 00:25:04.535 UTC [policies] Manager -> DEBU 52e Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:25:04.536 UTC [policies] Manager -> DEBU 52f Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:25:04.536 UTC [policies] Manager -> DEBU 530 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 00:25:04.536 UTC [policies] Manager -> DEBU 531 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.536 UTC [policies] Manager -> DEBU 532 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.537 UTC [policies] Manager -> DEBU 533 Manager Channel/Application looking up path [Org1MSP]" +peer0.org1.example.com | "2019-09-24 00:25:04.537 UTC [policies] Manager -> DEBU 534 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.537 UTC [policies] Manager -> DEBU 535 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.537 UTC [policies] Manager -> DEBU 536 Manager Channel/Application/Org1MSP looking up path []" +peer0.org1.example.com | "2019-09-24 00:25:04.537 UTC [policies] Evaluate -> DEBU 537 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | "2019-09-24 00:25:04.538 UTC [cauthdsl] func1 -> DEBU 538 0xc0033dc420 gate 1569284704538221800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:04.538 UTC [cauthdsl] func2 -> DEBU 539 0xc0033dc420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:04.538 UTC [cauthdsl] func2 -> DEBU 53a 0xc0033dc420 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:04.538 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 53b Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 660 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:24:53.440 UTC [common.channelconfig] LogSanityChecks -> DEBU 661 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 00:24:53.440 UTC [common.channelconfig] LogSanityChecks -> DEBU 662 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 663 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 664 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 665 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 666 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 667 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 668 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 669 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 66a As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 66b As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [policies] Manager -> DEBU 66c Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [policies] Manager -> DEBU 66d Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [policies] Manager -> DEBU 66e Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [policies] Manager -> DEBU 66f Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [policies] Manager -> DEBU 670 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 671 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 672 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 673 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 674 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [common.capabilities] Supported -> DEBU 675 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [common.capabilities] Supported -> DEBU 676 Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [fsblkstorage] newBlockfileMgr -> DEBU 677 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [kvledger.util] CreateDirIfMissing -> DEBU 678 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +orderer0.example.com | "2019-09-24 00:24:53.448 UTC [kvledger.util] logDirStatus -> DEBU 679 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +orderer0.example.com | "2019-09-24 00:24:53.452 UTC [kvledger.util] logDirStatus -> DEBU 67a After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +orderer0.example.com | "2019-09-24 00:24:53.452 UTC [fsblkstorage] newBlockfileMgr -> INFO 67b Getting block information from block storage" +orderer0.example.com | "2019-09-24 00:24:53.452 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 67c Retrieving checkpoint info from block files" +orderer0.example.com | "2019-09-24 00:24:53.453 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 67d retrieveLastFileSuffix()" +orderer0.example.com | "2019-09-24 00:24:53.453 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 67e retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2019-09-24 00:24:53.453 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 67f Last file number found = -1" +orderer0.example.com | "2019-09-24 00:24:53.453 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 680 No block file found" +orderer0.example.com | "2019-09-24 00:24:53.453 UTC [fsblkstorage] newBlockfileMgr -> DEBU 681 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0003bf480)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2019-09-24 00:24:53.465 UTC [fsblkstorage] newBlockIndex -> DEBU 682 newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2019-09-24 00:24:53.465 UTC [orderer.common.server] func1 -> DEBU 683 Executing callback to update root CAs" +orderer0.example.com | "2019-09-24 00:24:53.465 UTC [orderer.common.server] updateTrustedRoots -> DEBU 684 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-09-24 00:24:53.465 UTC [orderer.common.server] updateTrustedRoots -> DEBU 685 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-09-24 00:24:53.465 UTC [orderer.common.server] updateTrustedRoots -> DEBU 686 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-09-24 00:24:53.465 UTC [orderer.common.server] updateTrustedRoots -> DEBU 687 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-09-24 00:24:53.472 UTC [fsblkstorage] indexBlock -> DEBU 688 Indexing block [blockNum=0, blockHash=[]byte{0xdc, 0x37, 0x3e, 0x7d, 0xd9, 0x80, 0x34, 0xd8, 0x87, 0x20, 0x13, 0x50, 0x22, 0xb4, 0x68, 0xd5, 0xb6, 0x58, 0x78, 0xbf, 0x32, 0x9f, 0xc8, 0x89, 0x42, 0x2a, 0x5, 0x7a, 0xab, 0xc6, 0x38, 0x47} txOffsets= +orderer0.example.com | txId=39c9b622afe3457926bd2f6a5ade166a0d139905e01268fb7cba4a9273bf6dc3 locPointer=offset=39, bytesLength=23903 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 00:24:53.475 UTC [fsblkstorage] updateCheckpoint -> DEBU 689 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23948], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2019-09-24 00:24:53.475 UTC [fsblkstorage] Next -> DEBU 68a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 00:24:53.475 UTC [fsblkstorage] newBlockfileStream -> DEBU 68b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:24:53.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68c Remaining bytes=[23948], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:24:53.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68d Returning blockbytes - length=[23945], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:24:53.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68e blockbytes [23945] read from file [0]" +orderer0.example.com | "2019-09-24 00:24:53.475 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 68f [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +orderer0.example.com | "2019-09-24 00:24:53.475 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 690 EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2019-09-24 00:24:53.476 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 691 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +peer0.org1.example.com | "2019-09-24 00:25:04.539 UTC [cauthdsl] func2 -> DEBU 53c 0xc0033dc420 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.540 UTC [msp.identity] Verify -> DEBU 53d Verify: digest = 00000000 1c cd 68 b8 33 39 c3 f7 d8 bf 6f 21 20 3c 57 2b |..h.39....o! DEBU 53e Verify: sig = 00000000 30 44 02 20 3f 2d 41 bf df 48 de ab 3b 9f f2 6a |0D. ?-A..H..;..j| +peer0.org1.example.com | 00000010 1c b4 f9 16 f1 15 f3 9b 4e 9f 15 e8 29 65 8f 9b |........N...)e..| +peer0.org1.example.com | 00000020 87 2f 31 cd 02 20 40 64 26 9c 61 b6 4b 3f 60 9d |./1.. @d&.a.K?`.| +peer0.org1.example.com | 00000030 b0 4f 81 19 be bf 2f 49 3d 39 ca e7 6a cb ce 8c |.O..../I=9..j...| +peer0.org1.example.com | 00000040 db 89 e6 d0 87 84 |......|" +peer0.org1.example.com | "2019-09-24 00:25:04.540 UTC [cauthdsl] func2 -> DEBU 53f 0xc0033dc420 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.540 UTC [cauthdsl] func1 -> DEBU 540 0xc0033dc420 gate 1569284704538221800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:04.540 UTC [policies] Evaluate -> DEBU 541 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:04.540 UTC [policies] Evaluate -> DEBU 542 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:04.540 UTC [common.configtx] verifyDeltaSet -> DEBU 543 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:25:04.541 UTC [common.configtx] recurseConfigMap -> DEBU 544 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.541 UTC [common.configtx] recurseConfigMap -> DEBU 545 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.541 UTC [common.configtx] recurseConfigMap -> DEBU 546 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 547 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 548 Setting policy for key Readers to " +peer0.org1.example.com | "2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 549 Setting policy for key Writers to " +peer0.org1.example.com | "2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 54a Setting policy for key Admins to " +peer0.org1.example.com | "2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 54b Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-09-24 00:25:04.542 UTC [gossip.comm] Send -> DEBU 54c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23706 bytes, seq: 1}, Envelope: 23739 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 54d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.543 UTC [gossip.comm] sendToEndpoint -> DEBU 54e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23706 bytes, seq: 1}, Envelope: 23739 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.543 UTC [gossip.comm] sendToEndpoint -> DEBU 54f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:04.554 UTC [common.configtx] recurseConfigMap -> DEBU 550 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.555 UTC [common.configtx] recurseConfigMap -> DEBU 551 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.555 UTC [common.configtx] recurseConfigMap -> DEBU 552 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.580 UTC [common.configtx] recurseConfigMap -> DEBU 553 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.580 UTC [common.configtx] recurseConfigMap -> DEBU 554 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.580 UTC [common.configtx] recurseConfigMap -> DEBU 555 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.580 UTC [common.configtx] recurseConfigMap -> DEBU 556 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.581 UTC [common.configtx] recurseConfigMap -> DEBU 557 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.581 UTC [common.configtx] recurseConfigMap -> DEBU 558 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.configtx] recurseConfigMap -> DEBU 559 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.configtx] recurseConfigMap -> DEBU 55a Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.configtx] recurseConfigMap -> DEBU 55b Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.configtx] recurseConfigMap -> DEBU 55c Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.configtx] recurseConfigMap -> DEBU 55d Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.channelconfig] NewStandardValues -> DEBU 55e Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55f Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 560 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 561 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 562 Processing field: Consortium" +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 563 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:04.586 UTC [common.channelconfig] NewStandardValues -> DEBU 564 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 565 Processing field: ConsensusType" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 566 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:24:53.476 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 692 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.482 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 693 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.482 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 694 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.482 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 695 Appending 0 entries to memory storage" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.482 UTC [fsblkstorage] Next -> DEBU 696 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 00:24:53.483 UTC [fsblkstorage] newBlockfileStream -> DEBU 697 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:24:53.483 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 698 Remaining bytes=[23948], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:24:53.483 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 699 Returning blockbytes - length=[23945], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:24:53.483 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69a blockbytes [23945] read from file [0]" +orderer0.example.com | "2019-09-24 00:24:53.483 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 69b [channel: businesschannel] Done creating channel support resources" +orderer0.example.com | "2019-09-24 00:24:53.483 UTC [orderer.commmon.multichannel] newChain -> INFO 69c Created and starting new chain businesschannel" +orderer0.example.com | "2019-09-24 00:24:53.483 UTC [orderer.consensus.etcdraft] Start -> INFO 69d Starting Raft node" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.483 UTC [orderer.common.cluster] Configure -> INFO 69e Entering, channel: businesschannel, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 00:24:53.484 UTC [orderer.common.cluster] updateStubInMapping -> INFO 69f Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer0.example.com | "2019-09-24 00:24:53.484 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a0 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-09-24 00:24:53.484 UTC [orderer.common.cluster] func1 -> DEBU 6a1 Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 567 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 568 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 569 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56a Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [common.channelconfig] NewStandardValues -> DEBU 56b Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56c Processing field: Endpoints" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [common.channelconfig] NewStandardValues -> DEBU 56d Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56e Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [common.channelconfig] validateMSP -> DEBU 56f Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [msp] newBccspMsp -> DEBU 570 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [msp] New -> DEBU 571 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:04.587 UTC [msp] Setup -> DEBU 572 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-09-24 00:25:04.588 UTC [msp.identity] newIdentity -> DEBU 573 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:04.588 UTC [msp.identity] newIdentity -> DEBU 574 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:04.588 UTC [msp] Validate -> DEBU 575 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:04.588 UTC [common.channelconfig] NewStandardValues -> DEBU 576 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [common.channelconfig] initializeProtosStruct -> DEBU 577 Processing field: ACLs" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [common.channelconfig] initializeProtosStruct -> DEBU 578 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [common.channelconfig] NewStandardValues -> DEBU 579 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57a Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [common.channelconfig] NewStandardValues -> DEBU 57b Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57c Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [common.channelconfig] Validate -> DEBU 57d Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [common.channelconfig] validateMSP -> DEBU 57e Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [msp] newBccspMsp -> DEBU 57f Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [msp] New -> DEBU 580 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [msp] Setup -> DEBU 581 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [msp.identity] newIdentity -> DEBU 582 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:04.589 UTC [msp.identity] newIdentity -> DEBU 583 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:04.590 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 584 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.590 UTC [msp] Validate -> DEBU 585 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:04.590 UTC [msp] getCertificationChain -> DEBU 586 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:04.590 UTC [msp] hasOURole -> DEBU 587 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 00:25:04.590 UTC [msp] getCertificationChain -> DEBU 588 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [common.channelconfig] NewStandardValues -> DEBU 589 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2019-09-24 00:24:53.484 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a2 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer0.example.com | "2019-09-24 00:24:53.484 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a3 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-09-24 00:24:53.485 UTC [orderer.common.cluster] func1 -> DEBU 6a4 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2019-09-24 00:24:53.485 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 6a5 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2019-09-24 00:24:53.485 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 6a6 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2019-09-24 00:24:53.485 UTC [orderer.common.cluster] Configure -> INFO 6a7 Exiting" +orderer0.example.com | "2019-09-24 00:24:53.485 UTC [orderer.consensus.etcdraft] start -> DEBU 6a8 Starting raft node: #peers: 3" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.485 UTC [orderer.consensus.etcdraft] start -> INFO 6a9 Starting raft node as part of a new channel" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.485 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 6aa 1 became follower at term 0" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.485 UTC [orderer.consensus.etcdraft] newRaft -> INFO 6ab newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.485 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 6ac 1 became follower at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.486 UTC [orderer.consensus.etcdraft] run -> INFO 6ad This node is picked to start campaign" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.489 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 6ae [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +orderer0.example.com | "2019-09-24 00:24:53.489 UTC [msp] GetDefaultSigningIdentity -> DEBU 6af Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:24:53.489 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b0 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:24:53.489 UTC [msp.identity] Sign -> DEBU 6b1 Sign: plaintext: 0A00120B0A090A03010203100418050A...68CAAB07ABC0FB0A23180D0ADAB7BFF9 " +orderer0.example.com | "2019-09-24 00:24:53.489 UTC [msp.identity] Sign -> DEBU 6b2 Sign: digest: 06AF196F46B0F85108E214AA01379D2761E3BF88F96E9F76B1FF31AA3A9F5C7B " +orderer0.example.com | "2019-09-24 00:24:53.489 UTC [orderer.consensus.etcdraft] apply -> INFO 6b3 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.490 UTC [orderer.consensus.etcdraft] apply -> INFO 6b4 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.490 UTC [orderer.consensus.etcdraft] apply -> INFO 6b5 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:53.494 UTC [fsblkstorage] indexBlock -> DEBU 6b6 Indexing block [blockNum=1, blockHash=[]byte{0xad, 0xd5, 0xde, 0x39, 0xb6, 0x44, 0xca, 0x2, 0x60, 0x46, 0x0, 0x4f, 0x69, 0xc8, 0xc7, 0x7c, 0x10, 0xfc, 0xef, 0xad, 0x84, 0x40, 0xba, 0x3c, 0xf5, 0x9a, 0x3c, 0xbb, 0x3d, 0xad, 0x41, 0x97} txOffsets= +orderer0.example.com | txId=1c39ff43d54bd1834121dc43dee8b26d313aaeef27bf14648c636484497a42a1 locPointer=offset=71, bytesLength=24833 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 00:24:53.497 UTC [fsblkstorage] updateCheckpoint -> DEBU 6b7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44254], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2019-09-24 00:24:53.497 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 6b8 [channel: testchainid] Wrote block [1]" +orderer0.example.com | "2019-09-24 00:24:53.499 UTC [common.deliver] deliverBlocks -> WARN 6b9 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:60632 because of consenter error" +orderer0.example.com | "2019-09-24 00:24:53.499 UTC [orderer.common.server] func1 -> DEBU 6ba Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:24:53.499 UTC [comm.grpc.server] 1 -> INFO 6bb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60632 grpc.code=OK grpc.call_duration=203.8855ms +orderer0.example.com | "2019-09-24 00:24:53.567 UTC [orderer.common.server] Deliver -> DEBU 6bc Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:24:53.567 UTC [common.deliver] Handle -> DEBU 6bd Starting new deliver loop for 172.18.0.9:60636" +orderer0.example.com | "2019-09-24 00:24:53.567 UTC [common.deliver] Handle -> DEBU 6be Attempting to read seek info message from 172.18.0.9:60636" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58a Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [common.channelconfig] NewStandardValues -> DEBU 58b Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58c Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [common.channelconfig] Validate -> DEBU 58d Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [common.channelconfig] validateMSP -> DEBU 58e Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [msp] newBccspMsp -> DEBU 58f Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [msp] New -> DEBU 590 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [msp] Setup -> DEBU 591 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [msp.identity] newIdentity -> DEBU 592 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [msp.identity] newIdentity -> DEBU 593 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 594 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.591 UTC [msp] Validate -> DEBU 595 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:04.592 UTC [msp] getCertificationChain -> DEBU 596 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:04.592 UTC [msp] hasOURole -> DEBU 597 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 00:25:04.592 UTC [msp] getCertificationChain -> DEBU 598 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:04.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 599 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [msp.identity] Sign -> DEBU 59a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100F " +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [msp.identity] Sign -> DEBU 59b Sign: digest: 073858533E1A3B4D07C8575591739066B064A300CDD4068EB5169E890FF7C592 " +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [msp] GetDefaultSigningIdentity -> DEBU 59c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [msp.identity] Sign -> DEBU 59d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [msp.identity] Sign -> DEBU 59e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [gossip.discovery] periodicalSendAlive -> DEBU 59f Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [gossip.comm] Send -> DEBU 5a0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [gossip.comm] sendToEndpoint -> DEBU 5a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [gossip.comm] sendToEndpoint -> DEBU 5a2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [msp] Setup -> DEBU 5a3 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [msp] Setup -> DEBU 5a4 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-09-24 00:25:04.609 UTC [policies] NewManagerImpl -> DEBU 5a5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5a6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5a7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5a8 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5a9 Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5aa Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5ab Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5ac Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5ad Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5ae Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5af Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b0 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b1 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b2 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b3 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b4 Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b5 Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b6 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:04.611 UTC [policies] NewManagerImpl -> DEBU 5b7 Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:04.611 UTC [policies] NewManagerImpl -> DEBU 5b8 Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:04.611 UTC [policies] NewManagerImpl -> DEBU 5b9 Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-09-24 00:25:04.611 UTC [policies] NewManagerImpl -> DEBU 5ba Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-09-24 00:25:04.611 UTC [policies] NewManagerImpl -> DEBU 5bb Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-09-24 00:25:04.611 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 00:25:04.619 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:25:04.620 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:04.620 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.620 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.623 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:25:04.623 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-09-24 00:25:04.623 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 00:25:04.624 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:04.625 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-09-24 00:25:04.625 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-09-24 00:25:04.626 UTC [common.configtx] addToMap -> DEBU 5c8 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-09-24 00:25:04.627 UTC [common.configtx] addToMap -> DEBU 5c9 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-09-24 00:25:04.627 UTC [common.configtx] addToMap -> DEBU 5ca Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:25:04.635 UTC [common.configtx] addToMap -> DEBU 5cb Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.637 UTC [common.configtx] addToMap -> DEBU 5cc Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-09-24 00:25:04.612 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 5bd Sleeping 25s" +peer0.org1.example.com | "2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5cd Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5ce Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5cf Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5d0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5d1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5d2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5d3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.646 UTC [common.configtx] addToMap -> DEBU 5d4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:25:04.652 UTC [common.configtx] addToMap -> DEBU 5d5 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.655 UTC [common.configtx] addToMap -> DEBU 5d6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.655 UTC [common.configtx] addToMap -> DEBU 5d7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:25:04.667 UTC [common.configtx] addToMap -> DEBU 5d8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:04.672 UTC [common.configtx] addToMap -> DEBU 5d9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:25:04.685 UTC [common.configtx] addToMap -> DEBU 5da Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.695 UTC [common.configtx] addToMap -> DEBU 5db Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-09-24 00:25:04.696 UTC [common.configtx] addToMap -> DEBU 5dc Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:04.727 UTC [gossip.gossip] handleMessage -> DEBU 5dd Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 00:24:53.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6bf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:53.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.5µs " +orderer0.example.com | "2019-09-24 00:24:53.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c1 Sending msg of 28 bytes to 3 on channel testchainid took 32.9µs" +orderer0.example.com | "2019-09-24 00:24:53.769 UTC [common.deliver] deliverBlocks -> WARN 6c2 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:60636 because of consenter error" +orderer0.example.com | "2019-09-24 00:24:53.769 UTC [orderer.common.server] func1 -> DEBU 6c3 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:24:53.769 UTC [comm.grpc.server] 1 -> INFO 6c4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60636 grpc.code=OK grpc.call_duration=203.678ms +orderer0.example.com | "2019-09-24 00:24:53.812 UTC [orderer.common.server] Deliver -> DEBU 6c5 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:24:53.812 UTC [common.deliver] Handle -> DEBU 6c6 Starting new deliver loop for 172.18.0.9:60638" +orderer0.example.com | "2019-09-24 00:24:53.812 UTC [common.deliver] Handle -> DEBU 6c7 Attempting to read seek info message from 172.18.0.9:60638" +orderer0.example.com | "2019-09-24 00:24:54.014 UTC [common.deliver] deliverBlocks -> WARN 6c8 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:60638 because of consenter error" +orderer0.example.com | "2019-09-24 00:24:54.014 UTC [orderer.common.server] func1 -> DEBU 6c9 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:24:54.014 UTC [comm.grpc.server] 1 -> INFO 6ca streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60638 grpc.code=OK grpc.call_duration=202.2582ms +orderer0.example.com | "2019-09-24 00:24:54.063 UTC [orderer.common.server] Deliver -> DEBU 6cb Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:24:54.066 UTC [common.deliver] Handle -> DEBU 6cc Starting new deliver loop for 172.18.0.9:60642" +orderer0.example.com | "2019-09-24 00:24:54.066 UTC [common.deliver] Handle -> DEBU 6cd Attempting to read seek info message from 172.18.0.9:60642" +orderer0.example.com | "2019-09-24 00:24:54.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ce Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:54.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 3 on channel testchainid took 203.6µs" +orderer0.example.com | "2019-09-24 00:24:54.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181µs " +orderer0.example.com | "2019-09-24 00:24:54.264 UTC [common.deliver] deliverBlocks -> WARN 6d1 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:60642 because of consenter error" +orderer0.example.com | "2019-09-24 00:24:54.264 UTC [orderer.common.server] func1 -> DEBU 6d2 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:24:54.264 UTC [comm.grpc.server] 1 -> INFO 6d3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60642 grpc.code=OK grpc.call_duration=200.761ms +orderer0.example.com | "2019-09-24 00:24:54.310 UTC [orderer.common.server] Deliver -> DEBU 6d4 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:24:54.310 UTC [common.deliver] Handle -> DEBU 6d5 Starting new deliver loop for 172.18.0.9:60646" +orderer0.example.com | "2019-09-24 00:24:54.310 UTC [common.deliver] Handle -> DEBU 6d6 Attempting to read seek info message from 172.18.0.9:60646" +orderer0.example.com | "2019-09-24 00:24:54.486 UTC [orderer.consensus.etcdraft] Step -> INFO 6d7 1 is starting a new election at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.486 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6d8 1 became pre-candidate at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.486 UTC [orderer.consensus.etcdraft] poll -> INFO 6d9 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.486 UTC [orderer.consensus.etcdraft] campaign -> INFO 6da 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.486 UTC [orderer.consensus.etcdraft] campaign -> INFO 6db 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.487 UTC [orderer.common.cluster] NewStream -> DEBU 6dc Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-09-24 00:24:54.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6dd Sending msg of 28 bytes to 2 on channel businesschannel took 167.6µs" +orderer0.example.com | "2019-09-24 00:24:54.487 UTC [orderer.common.cluster] NewStream -> DEBU 6de Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-09-24 00:24:54.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6df Sending msg of 28 bytes to 3 on channel businesschannel took 69.2µs" +orderer0.example.com | "2019-09-24 00:24:54.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +orderer0.example.com | "2019-09-24 00:24:54.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.8µs " +orderer0.example.com | "2019-09-24 00:24:54.489 UTC [orderer.common.cluster] Step -> DEBU 6e2 Connection from orderer1.example.com(172.18.0.4:58624)" +orderer0.example.com | "2019-09-24 00:24:54.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] poll -> INFO 6e4 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6e5 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6e6 1 became candidate at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] poll -> INFO 6e7 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] campaign -> INFO 6e8 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] campaign -> INFO 6e9 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.490 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ea Sending msg of 28 bytes to 2 on channel businesschannel took 113.6µs" +orderer0.example.com | "2019-09-24 00:24:54.491 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6eb Sending msg of 28 bytes to 3 on channel businesschannel took 82.2µs" +orderer0.example.com | "2019-09-24 00:24:54.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +orderer0.example.com | "2019-09-24 00:24:54.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53µs " +orderer0.example.com | "2019-09-24 00:24:54.491 UTC [orderer.common.cluster] Step -> DEBU 6ee Connection from orderer2.example.com(172.18.0.2:49900)" +orderer0.example.com | "2019-09-24 00:24:54.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ef Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:54.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:54.493 UTC [orderer.consensus.etcdraft] poll -> INFO 6f1 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.493 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6f2 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.493 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6f3 1 became leader at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.493 UTC [orderer.consensus.etcdraft] run -> INFO 6f4 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:54.499 UTC [orderer.consensus.etcdraft] run -> INFO 6f6 Leader 1 is present, quit campaign" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f7 Sending msg of 36 bytes to 2 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-09-24 00:24:54.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f8 Sending msg of 36 bytes to 3 on channel businesschannel took 14.4µs" +orderer0.example.com | "2019-09-24 00:24:54.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f9 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 91.9µs " +orderer0.example.com | "2019-09-24 00:24:54.500 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6fa Raft leader changed: 0 -> 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.500 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6fb There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fc Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 71.7µs " +orderer0.example.com | "2019-09-24 00:24:54.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6fd Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:54.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fe Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +orderer0.example.com | "2019-09-24 00:24:54.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.7µs " +orderer0.example.com | "2019-09-24 00:24:54.504 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 700 Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:24:54.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 701 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:54.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 702 Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" +orderer0.example.com | "2019-09-24 00:24:54.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 703 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:54.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 704 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2994ms " +orderer0.example.com | "2019-09-24 00:24:54.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 705 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:54.522 UTC [policies] Evaluate -> DEBU 706 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:24:54.522 UTC [policies] Evaluate -> DEBU 707 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:24:54.522 UTC [policies] Evaluate -> DEBU 708 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:24:54.522 UTC [policies] Evaluate -> DEBU 709 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:24:54.522 UTC [policies] Evaluate -> DEBU 70a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:24:54.522 UTC [msp] DeserializeIdentity -> DEBU 70b Obtaining identity" +orderer0.example.com | "2019-09-24 00:24:54.523 UTC [msp.identity] newIdentity -> DEBU 70c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:24:54.523 UTC [cauthdsl] func1 -> DEBU 70d 0xc000c4d810 gate 1569284694523490100 evaluation starts" +orderer0.example.com | "2019-09-24 00:24:54.523 UTC [cauthdsl] func2 -> DEBU 70e 0xc000c4d810 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:24:54.523 UTC [cauthdsl] func2 -> DEBU 70f 0xc000c4d810 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:24:54.523 UTC [cauthdsl] func2 -> DEBU 710 0xc000c4d810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2019-09-24 00:24:54.523 UTC [cauthdsl] func2 -> DEBU 711 0xc000c4d810 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:24:54.524 UTC [cauthdsl] func1 -> DEBU 712 0xc000c4d810 gate 1569284694523490100 evaluation fails" +orderer0.example.com | "2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 713 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 714 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.740 UTC [gossip.gossip] handleMessage -> DEBU 5de Exiting" +peer0.org1.example.com | "2019-09-24 00:25:04.740 UTC [gossip.gossip] handleMessage -> DEBU 5df Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.740 UTC [gossip.pull] HandleMessage -> DEBU 5e0 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.740 UTC [gossip.pull] SendDigest -> DEBU 5e1 Sending BLOCK_MSG digest: [1] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:04.740 UTC [gossip.gossip] handleMessage -> DEBU 5e2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:04.742 UTC [common.configtx] addToMap -> DEBU 5e3 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5ea Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5eb Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5ec Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5ed Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.channelconfig] LogSanityChecks -> DEBU 5f0 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-09-24 00:25:04.743 UTC [common.channelconfig] LogSanityChecks -> DEBU 5f1 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-09-24 00:25:04.748 UTC [policies] Manager -> DEBU 5f2 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 00:25:04.748 UTC [policies] Manager -> DEBU 5f3 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:25:04.749 UTC [policies] Manager -> DEBU 5f4 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:25:04.749 UTC [policies] Manager -> DEBU 5f5 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 00:25:04.749 UTC [policies] Manager -> DEBU 5f6 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.749 UTC [policies] Manager -> DEBU 5f7 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.749 UTC [common.channelconfig] LogSanityChecks -> DEBU 5f8 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-09-24 00:25:04.749 UTC [common.channelconfig] LogSanityChecks -> DEBU 5f9 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-09-24 00:25:04.749 UTC [common.channelconfig] LogSanityChecks -> DEBU 5fa As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-09-24 00:25:04.749 UTC [policies] Manager -> DEBU 5fb Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-09-24 00:25:04.750 UTC [policies] Manager -> DEBU 5fc Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:25:04.750 UTC [policies] Manager -> DEBU 5fd Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:25:04.750 UTC [policies] Manager -> DEBU 5fe Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-09-24 00:25:04.753 UTC [policies] Manager -> DEBU 5ff Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:04.754 UTC [common.channelconfig] LogSanityChecks -> DEBU 600 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-09-24 00:25:04.754 UTC [common.channelconfig] LogSanityChecks -> DEBU 601 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | "2019-09-24 00:25:04.754 UTC [common.channelconfig] LogSanityChecks -> DEBU 602 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | "2019-09-24 00:25:04.754 UTC [common.channelconfig] LogSanityChecks -> DEBU 603 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-09-24 00:25:04.754 UTC [common.capabilities] Supported -> DEBU 604 Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 00:25:04.754 UTC [common.capabilities] Supported -> DEBU 605 Channel capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 00:25:04.754 UTC [gossip.service] ProcessConfigUpdate -> DEBU 606 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:04.754 UTC [gossip.service] ProcessConfigUpdate -> DEBU 607 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:04.754 UTC [gossip.service] updateAnchors -> DEBU 608 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-09-24 00:25:04.755 UTC [gossip.service] updateAnchors -> DEBU 609 Org2MSP anchor peers: []" +peer0.org1.example.com | "2019-09-24 00:25:04.784 UTC [comm.grpc.server] 1 -> INFO 60a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:06.783Z grpc.peer_address=172.18.0.8:34550 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=165.5µs +peer0.org1.example.com | "2019-09-24 00:25:04.800 UTC [comm.grpc.server] 1 -> INFO 60b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:06.798Z grpc.peer_address=172.18.0.5:49082 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=927.6µs +peer0.org1.example.com | "2019-09-24 00:25:04.811 UTC [msp] GetDefaultSigningIdentity -> DEBU 60c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:04.824 UTC [msp.identity] Sign -> DEBU 60d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:04.824 UTC [msp.identity] Sign -> DEBU 60e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +orderer0.example.com | "2019-09-24 00:24:54.524 UTC [policies] func1 -> DEBU 715 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +orderer0.example.com | "2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 716 Signature set did not satisfy policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 717 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 718 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 719 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 71a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:24:54.525 UTC [cauthdsl] func1 -> DEBU 71b 0xc000c6f0a0 gate 1569284694525076900 evaluation starts" +orderer0.example.com | "2019-09-24 00:24:54.525 UTC [cauthdsl] func2 -> DEBU 71c 0xc000c6f0a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:24:54.525 UTC [cauthdsl] func2 -> DEBU 71d 0xc000c6f0a0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:24:54.525 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 71e Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-09-24 00:24:54.525 UTC [msp] Validate -> DEBU 71f MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:24:54.525 UTC [msp] getCertificationChain -> DEBU 720 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:24:54.525 UTC [cauthdsl] func2 -> DEBU 721 0xc000c6f0a0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:24:54.525 UTC [msp.identity] Verify -> DEBU 722 Verify: digest = 00000000 8a d6 1d a6 47 89 ab 4c 40 e7 77 66 36 fe 44 6b |....G..L@.wf6.Dk| +orderer0.example.com | 00000010 fa c1 36 4d 03 1f 6d 5b 28 03 1a 25 6e b6 72 19 |..6M..m[(..%n.r.|" +orderer0.example.com | "2019-09-24 00:24:54.534 UTC [msp.identity] Verify -> DEBU 723 Verify: sig = 00000000 30 45 02 21 00 e0 db 9d 45 32 5d b0 a0 de 22 f7 |0E.!....E2]...".| +orderer0.example.com | 00000010 b5 d5 c0 28 e2 a4 83 92 b9 92 85 21 54 d7 49 a5 |...(.......!T.I.| +orderer0.example.com | 00000020 29 bb ee 7b b4 02 20 13 46 2a 79 d3 b7 36 4c eb |)..{.. .F*y..6L.| +orderer0.example.com | 00000030 b1 80 eb 63 20 ea 64 3e e4 90 a2 cb 07 7f 2a 94 |...c .d>......*.| +orderer0.example.com | 00000040 01 e7 47 0f fe 51 42 |..G..QB|" +orderer0.example.com | "2019-09-24 00:24:54.535 UTC [cauthdsl] func2 -> DEBU 724 0xc000c6f0a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:24:54.537 UTC [cauthdsl] func1 -> DEBU 725 0xc000c6f0a0 gate 1569284694525076900 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:24:54.537 UTC [policies] Evaluate -> DEBU 726 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:54.537 UTC [policies] Evaluate -> DEBU 727 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:24:54.537 UTC [policies] Evaluate -> DEBU 728 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:24:54.537 UTC [policies] Evaluate -> DEBU 729 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:24:54.547 UTC [policies] Evaluate -> DEBU 72a Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:24:54.550 UTC [policies] Evaluate -> DEBU 72b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:24:54.563 UTC [common.deliver] deliverBlocks -> DEBU 72c [channel: businesschannel] Received seekInfo (0xc000c23000) start: > stop: > from 172.18.0.9:60646" +orderer0.example.com | "2019-09-24 00:24:54.563 UTC [fsblkstorage] Next -> DEBU 72d Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 00:24:54.563 UTC [fsblkstorage] newBlockfileStream -> DEBU 72e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:24:54.563 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 72f Remaining bytes=[23948], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:24:54.563 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 730 Returning blockbytes - length=[23945], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:24:54.564 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 731 blockbytes [23945] read from file [0]" +orderer0.example.com | "2019-09-24 00:24:54.564 UTC [common.deliver] deliverBlocks -> DEBU 732 [channel: businesschannel] Delivering block for (0xc000c23000) for 172.18.0.9:60646" +orderer0.example.com | "2019-09-24 00:24:54.571 UTC [common.deliver] deliverBlocks -> DEBU 733 [channel: businesschannel] Done delivering to 172.18.0.9:60646 for (0xc000c23000)" +orderer0.example.com | "2019-09-24 00:24:54.574 UTC [common.deliver] Handle -> DEBU 734 Waiting for new SeekInfo from 172.18.0.9:60646" +orderer0.example.com | "2019-09-24 00:24:54.574 UTC [common.deliver] Handle -> DEBU 735 Attempting to read seek info message from 172.18.0.9:60646" +orderer0.example.com | "2019-09-24 00:24:54.580 UTC [grpc] warningf -> DEBU 736 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:60646: read: connection reset by peer" +orderer0.example.com | "2019-09-24 00:24:54.580 UTC [grpc] infof -> DEBU 737 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:24:54.586 UTC [grpc] infof -> DEBU 738 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:24:54.586 UTC [grpc] infof -> DEBU 739 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:24:54.587 UTC [grpc] infof -> DEBU 73a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:24:54.587 UTC [grpc] infof -> DEBU 73b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:24:54.592 UTC [grpc] infof -> DEBU 73c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:24:54.593 UTC [grpc] infof -> DEBU 73d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:24:54.592 UTC [common.deliver] Handle -> DEBU 73e Received EOF from 172.18.0.9:60646, hangup" +orderer0.example.com | "2019-09-24 00:24:54.593 UTC [orderer.common.server] func1 -> DEBU 73f Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:24:54.593 UTC [comm.grpc.server] 1 -> INFO 740 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60646 grpc.code=OK grpc.call_duration=283.1948ms +orderer0.example.com | "2019-09-24 00:24:54.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU 741 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:54.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 742 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +orderer0.example.com | "2019-09-24 00:24:54.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 743 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 215.8µs " +orderer0.example.com | "2019-09-24 00:24:54.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 744 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +peer0.org1.example.com | "2019-09-24 00:25:04.824 UTC [gossip.comm] authenticateRemotePeer -> DEBU 60f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:34550" +peer0.org1.example.com | "2019-09-24 00:25:04.825 UTC [gossip.comm] authenticateRemotePeer -> DEBU 610 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:34550" +peer0.org1.example.com | "2019-09-24 00:25:04.825 UTC [msp] DeserializeIdentity -> DEBU 611 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.825 UTC [msp] DeserializeIdentity -> DEBU 612 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.825 UTC [msp.identity] newIdentity -> DEBU 613 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:04.826 UTC [msp] Validate -> DEBU 614 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:04.836 UTC [msp] getCertificationChain -> DEBU 616 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:04.836 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 617 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.836 UTC [msp] DeserializeIdentity -> DEBU 618 Obtaining identity" +orderer0.example.com | "2019-09-24 00:24:54.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 745 Sending msg of 28 bytes to 3 on channel businesschannel took 70.8µs" +orderer0.example.com | "2019-09-24 00:24:54.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 746 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.8µs " +orderer0.example.com | "2019-09-24 00:24:54.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 747 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.3µs " +orderer0.example.com | "2019-09-24 00:24:54.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 748 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:54.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 749 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:55.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:55.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74b Sending msg of 28 bytes to 3 on channel testchainid took 26.7µs" +orderer0.example.com | "2019-09-24 00:24:55.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140µs " +orderer0.example.com | "2019-09-24 00:24:55.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74d Sending msg of 28 bytes to 2 on channel businesschannel took 172.7µs" +orderer0.example.com | "2019-09-24 00:24:55.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74e Sending msg of 28 bytes to 3 on channel businesschannel took 19.4µs" +orderer0.example.com | "2019-09-24 00:24:55.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.4µs " +orderer0.example.com | "2019-09-24 00:24:55.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 750 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 683.5µs " +orderer0.example.com | "2019-09-24 00:24:55.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 751 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:55.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 752 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:55.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 753 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:55.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 754 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2019-09-24 00:24:55.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 755 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.1µs " +orderer0.example.com | "2019-09-24 00:24:55.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 756 Sending msg of 28 bytes to 3 on channel businesschannel took 87µs" +orderer0.example.com | "2019-09-24 00:24:55.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 757 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 771.3µs " +orderer0.example.com | "2019-09-24 00:24:55.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 758 Sending msg of 28 bytes to 2 on channel businesschannel took 1.2075ms" +orderer0.example.com | "2019-09-24 00:24:55.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU 759 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.8796ms " +orderer0.example.com | "2019-09-24 00:24:55.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:56.016 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:56.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:56.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75d Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +orderer0.example.com | "2019-09-24 00:24:56.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 373.8µs " +orderer0.example.com | "2019-09-24 00:24:56.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75f Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 00:24:56.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 760 Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" +orderer0.example.com | "2019-09-24 00:24:56.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 761 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.4µs " +orderer0.example.com | "2019-09-24 00:24:56.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 762 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.9µs " +orderer0.example.com | "2019-09-24 00:24:56.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 763 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:56.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 764 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:56.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU 765 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:56.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 766 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +orderer0.example.com | "2019-09-24 00:24:56.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 767 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 216.9µs " +orderer0.example.com | "2019-09-24 00:24:56.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 768 Sending msg of 28 bytes to 2 on channel businesschannel took 44µs" +orderer0.example.com | "2019-09-24 00:24:56.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 769 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-09-24 00:24:56.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.5µs " +orderer0.example.com | "2019-09-24 00:24:56.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.6µs " +orderer0.example.com | "2019-09-24 00:24:56.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU 76c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:56.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU 76d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:57.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 76e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:57.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76f Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +orderer0.example.com | "2019-09-24 00:24:57.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 770 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.1µs " +orderer0.example.com | "2019-09-24 00:24:57.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 771 Sending msg of 28 bytes to 3 on channel businesschannel took 126µs" +orderer0.example.com | "2019-09-24 00:24:57.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 772 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.8µs " +orderer0.example.com | "2019-09-24 00:24:57.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 773 Sending msg of 28 bytes to 2 on channel businesschannel took 129.1µs" +orderer0.example.com | "2019-09-24 00:24:57.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 774 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90µs " +orderer0.example.com | "2019-09-24 00:24:57.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU 775 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:57.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 776 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:57.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU 777 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:57.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 778 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2019-09-24 00:24:57.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 779 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.4µs " +orderer0.example.com | "2019-09-24 00:24:57.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 77a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.5µs " +orderer0.example.com | "2019-09-24 00:24:57.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 77b Sending msg of 28 bytes to 2 on channel businesschannel took 123.9µs" +orderer0.example.com | "2019-09-24 00:24:57.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 77c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.4µs " +orderer0.example.com | "2019-09-24 00:24:57.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 77d Sending msg of 28 bytes to 3 on channel businesschannel took 291.8µs" +orderer0.example.com | "2019-09-24 00:24:57.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 77e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:57.995 UTC [orderer.common.cluster.step] handleMessage -> DEBU 77f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:58.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 780 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:58.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 781 Sending msg of 28 bytes to 3 on channel testchainid took 26.2µs" +orderer0.example.com | "2019-09-24 00:24:58.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 782 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.3µs " +orderer0.example.com | "2019-09-24 00:24:58.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 783 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +orderer0.example.com | "2019-09-24 00:24:58.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 784 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 294.2µs " +orderer0.example.com | "2019-09-24 00:24:58.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 785 Sending msg of 28 bytes to 3 on channel businesschannel took 794.2µs" +orderer0.example.com | "2019-09-24 00:24:58.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU 786 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1264ms " +orderer0.example.com | "2019-09-24 00:24:58.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 787 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:58.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 788 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:58.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 789 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:58.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 78a Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +orderer0.example.com | "2019-09-24 00:24:58.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 78b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.1µs " +orderer0.example.com | "2019-09-24 00:24:58.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 78c Sending msg of 28 bytes to 2 on channel businesschannel took 43.9µs" +orderer0.example.com | "2019-09-24 00:24:58.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 78d Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-09-24 00:24:58.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 78e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.1µs " +orderer0.example.com | "2019-09-24 00:24:58.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 78f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.2µs " +orderer0.example.com | "2019-09-24 00:24:58.987 UTC [orderer.common.cluster.step] handleMessage -> DEBU 790 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:58.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 791 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:59.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 792 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:59.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 793 Sending msg of 28 bytes to 3 on channel testchainid took 20.3µs" +orderer0.example.com | "2019-09-24 00:24:59.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 794 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93µs " +orderer0.example.com | "2019-09-24 00:24:59.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 795 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +orderer0.example.com | "2019-09-24 00:24:59.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 796 Sending msg of 28 bytes to 3 on channel businesschannel took 28.3µs" +orderer0.example.com | "2019-09-24 00:24:59.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 797 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.7µs " +orderer0.example.com | "2019-09-24 00:24:59.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 798 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.8µs " +orderer0.example.com | "2019-09-24 00:24:59.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 799 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:59.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU 79a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:59.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 79b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:59.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 79c Sending msg of 28 bytes to 3 on channel testchainid took 103.1µs" +orderer0.example.com | "2019-09-24 00:24:59.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 79d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.5µs " +orderer0.example.com | "2019-09-24 00:24:59.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 79e Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +orderer0.example.com | "2019-09-24 00:24:59.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 79f Sending msg of 28 bytes to 2 on channel businesschannel took 12.9µs" +orderer0.example.com | "2019-09-24 00:24:59.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.3µs " +orderer0.example.com | "2019-09-24 00:24:59.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.6µs " +orderer0.example.com | "2019-09-24 00:24:59.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7a2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:24:59.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7a3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:00.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7a4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:00.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7a5 Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +orderer0.example.com | "2019-09-24 00:25:00.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7a6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 350.1µs " +orderer0.example.com | "2019-09-24 00:25:00.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7a7 Sending msg of 28 bytes to 3 on channel businesschannel took 23.9µs" +orderer0.example.com | "2019-09-24 00:25:00.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7a8 Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +orderer0.example.com | "2019-09-24 00:25:00.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7a9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.3µs " +orderer0.example.com | "2019-09-24 00:25:00.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 148.8µs " +orderer0.example.com | "2019-09-24 00:25:00.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7ab Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:00.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7ac Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:00.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7ad Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:00.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7ae Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +orderer0.example.com | "2019-09-24 00:25:00.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7af Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " +orderer0.example.com | "2019-09-24 00:25:00.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7b0 Sending msg of 28 bytes to 2 on channel businesschannel took 84µs" +orderer0.example.com | "2019-09-24 00:25:00.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7b1 Sending msg of 28 bytes to 3 on channel businesschannel took 81.6µs" +orderer0.example.com | "2019-09-24 00:25:00.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7b2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81µs " +orderer0.example.com | "2019-09-24 00:25:00.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.3µs " +orderer0.example.com | "2019-09-24 00:25:00.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7b4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:00.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7b5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:01.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7b6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:01.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7b7 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +peer0.org1.example.com | "2019-09-24 00:25:04.836 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 619 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.837 UTC [msp] DeserializeIdentity -> DEBU 61a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.837 UTC [msp] DeserializeIdentity -> DEBU 61b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.837 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 61c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.839 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 61d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:04.843 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 61e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:04.843 UTC [policies] Evaluate -> DEBU 61f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.843 UTC [policies] Evaluate -> DEBU 620 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:04.844 UTC [policies] Evaluate -> DEBU 621 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.844 UTC [cauthdsl] func1 -> DEBU 622 0xc00357bd80 gate 1569284704844238800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:04.844 UTC [cauthdsl] func2 -> DEBU 623 0xc00357bd80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:04.844 UTC [cauthdsl] func2 -> DEBU 624 0xc00357bd80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:04.845 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 625 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.845 UTC [msp] Validate -> DEBU 626 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:04.755 UTC [gossip.service] updateAnchors -> DEBU 615 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [msp] getCertificationChain -> DEBU 627 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [cauthdsl] func2 -> DEBU 628 0xc00357bd80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [msp.identity] Verify -> DEBU 629 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [msp.identity] Verify -> DEBU 62a Verify: sig = 00000000 30 45 02 21 00 d5 cd a5 c9 48 14 8d 1e 7e 46 80 |0E.!.....H...~F.| +peer0.org1.example.com | 00000010 8c df 03 4a 04 e8 d3 22 9a 5e 5a 17 72 99 d5 cf |...J...".^Z.r...| +peer0.org1.example.com | 00000020 5d 7a 08 f1 78 02 20 04 1a b9 aa 7b 26 52 00 4c |]z..x. ....{&R.L| +peer0.org1.example.com | 00000030 fc 28 05 6e 2f 21 b4 7b 13 d2 b3 08 e3 6d 32 6c |.(.n/!.{.....m2l| +peer0.org1.example.com | 00000040 dd 07 3e 6e 73 cd 1d |..>ns..|" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [cauthdsl] func2 -> DEBU 62b 0xc00357bd80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [cauthdsl] func1 -> DEBU 62c 0xc00357bd80 gate 1569284704844238800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 62d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 62e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 62f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 630 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [gossip.comm] authenticateRemotePeer -> DEBU 631 Authenticated 172.18.0.8:34550" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [gossip.comm] GossipStream -> DEBU 632 Servicing 172.18.0.8:34550" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 633 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 634 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 635 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 636 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 637 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func1 -> DEBU 638 0xc003592d80 gate 1569284704863004000 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:01.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7b8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.9µs " +orderer0.example.com | "2019-09-24 00:25:01.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7b9 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +orderer0.example.com | "2019-09-24 00:25:01.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7ba Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-09-24 00:25:01.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7bb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.9µs " +orderer0.example.com | "2019-09-24 00:25:01.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.3µs " +orderer0.example.com | "2019-09-24 00:25:01.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7bd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:01.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7be Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:01.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7bf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:01.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7c0 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-09-24 00:25:01.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7c1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 46.8µs " +orderer0.example.com | "2019-09-24 00:25:01.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7c2 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +orderer0.example.com | "2019-09-24 00:25:01.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7c3 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +orderer0.example.com | "2019-09-24 00:25:01.998 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7c4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 376.2µs " +orderer0.example.com | "2019-09-24 00:25:01.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7c5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.9µs " +orderer0.example.com | "2019-09-24 00:25:02.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7c6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:02.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7c7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:02.174 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7c8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:02.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7c9 Sending msg of 28 bytes to 3 on channel testchainid took 49.5µs" +orderer0.example.com | "2019-09-24 00:25:02.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7ca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.6µs " +orderer0.example.com | "2019-09-24 00:25:02.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7cb Sending msg of 28 bytes to 2 on channel businesschannel took 37µs" +orderer0.example.com | "2019-09-24 00:25:02.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7cc Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-09-24 00:25:02.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.5µs " +orderer0.example.com | "2019-09-24 00:25:02.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.5µs " +orderer0.example.com | "2019-09-24 00:25:02.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7cf Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:02.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7d0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:02.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7d1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:02.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7d2 Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +orderer0.example.com | "2019-09-24 00:25:02.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7d3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.9µs " +orderer0.example.com | "2019-09-24 00:25:02.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7d4 Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +orderer0.example.com | "2019-09-24 00:25:02.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7d5 Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +orderer0.example.com | "2019-09-24 00:25:02.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7d6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.6µs " +orderer0.example.com | "2019-09-24 00:25:02.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.2µs " +orderer0.example.com | "2019-09-24 00:25:02.987 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7d8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:02.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7d9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:03.176 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7da Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:03.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7db Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +orderer0.example.com | "2019-09-24 00:25:03.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7dc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.5µs " +orderer0.example.com | "2019-09-24 00:25:03.294 UTC [orderer.common.server] Deliver -> DEBU 7dd Starting new Deliver handler" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 639 0xc003592d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 63a 0xc003592d80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 63b 0xc003592d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 63c 0xc003592d80 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func1 -> DEBU 63d 0xc003592d80 gate 1569284704863004000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 63e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 63f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 640 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func1 -> DEBU 641 0xc0035935c0 gate 1569284704863281900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 642 0xc0035935c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 643 0xc0035935c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 644 0xc0035935c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [msp.identity] Verify -> DEBU 645 Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +peer0.org1.example.com | 00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [msp.identity] Verify -> DEBU 646 Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +peer0.org1.example.com | 00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +peer0.org1.example.com | 00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +peer0.org1.example.com | 00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +peer0.org1.example.com | 00000040 a8 ad f9 eb 4c ce |....L.|" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 647 0xc0035935c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [cauthdsl] func1 -> DEBU 648 0xc0035935c0 gate 1569284704863281900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 649 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 64a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 64b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 64c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [gossip.gossip] JoinChan -> INFO 64d Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [gossip.gossip] learnAnchorPeers -> INFO 64e No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [gossip.gossip] learnAnchorPeers -> INFO 64f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 00:25:04.863 UTC [gossip.gossip] learnAnchorPeers -> INFO 650 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-09-24 00:25:04.864 UTC [gossip.service] updateEndpoints -> DEBU 651 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-09-24 00:25:04.864 UTC [msp] DeserializeIdentity -> DEBU 652 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.865 UTC [msp] GetDefaultSigningIdentity -> DEBU 653 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:04.865 UTC [msp.identity] Sign -> DEBU 654 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:04.865 UTC [msp.identity] Sign -> DEBU 655 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:04.866 UTC [gossip.comm] authenticateRemotePeer -> DEBU 656 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:49082" +peer0.org1.example.com | "2019-09-24 00:25:04.867 UTC [gossip.comm] authenticateRemotePeer -> DEBU 657 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49082" +orderer0.example.com | "2019-09-24 00:25:03.294 UTC [common.deliver] Handle -> DEBU 7de Starting new deliver loop for 172.18.0.6:42154" +orderer0.example.com | "2019-09-24 00:25:03.294 UTC [common.deliver] Handle -> DEBU 7df Attempting to read seek info message from 172.18.0.6:42154" +orderer0.example.com | "2019-09-24 00:25:03.296 UTC [policies] Evaluate -> DEBU 7e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:25:03.296 UTC [policies] Evaluate -> DEBU 7e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:03.296 UTC [policies] Evaluate -> DEBU 7e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:25:03.296 UTC [policies] Evaluate -> DEBU 7e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:03.296 UTC [policies] Evaluate -> DEBU 7e4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:25:03.296 UTC [msp] DeserializeIdentity -> DEBU 7e5 Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:03.297 UTC [msp.identity] newIdentity -> DEBU 7e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:03.297 UTC [cauthdsl] func1 -> DEBU 7e7 0xc000b75f60 gate 1569284703297512100 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:03.297 UTC [cauthdsl] func2 -> DEBU 7e8 0xc000b75f60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:03.297 UTC [cauthdsl] func2 -> DEBU 7e9 0xc000b75f60 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:03.297 UTC [cauthdsl] func2 -> DEBU 7ea 0xc000b75f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 00:25:03.297 UTC [cauthdsl] func2 -> DEBU 7eb 0xc000b75f60 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:25:03.297 UTC [cauthdsl] func1 -> DEBU 7ec 0xc000b75f60 gate 1569284703297512100 evaluation fails" +orderer0.example.com | "2019-09-24 00:25:03.297 UTC [policies] Evaluate -> DEBU 7ed Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:25:03.297 UTC [policies] Evaluate -> DEBU 7ee == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:25:03.298 UTC [policies] func1 -> DEBU 7ef Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +orderer0.example.com | "2019-09-24 00:25:03.298 UTC [policies] Evaluate -> DEBU 7f0 Signature set did not satisfy policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:25:03.298 UTC [policies] Evaluate -> DEBU 7f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:25:03.298 UTC [policies] Evaluate -> DEBU 7f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:25:03.298 UTC [policies] Evaluate -> DEBU 7f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:03.299 UTC [policies] Evaluate -> DEBU 7f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:25:03.299 UTC [cauthdsl] func1 -> DEBU 7f5 0xc000b555d0 gate 1569284703299540600 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:03.299 UTC [cauthdsl] func2 -> DEBU 7f6 0xc000b555d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:03.299 UTC [cauthdsl] func2 -> DEBU 7f7 0xc000b555d0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:03.299 UTC [cauthdsl] func2 -> DEBU 7f8 0xc000b555d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 00:25:03.299 UTC [cauthdsl] func2 -> DEBU 7f9 0xc000b555d0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:25:03.299 UTC [cauthdsl] func1 -> DEBU 7fa 0xc000b555d0 gate 1569284703299540600 evaluation fails" +orderer0.example.com | "2019-09-24 00:25:03.299 UTC [policies] Evaluate -> DEBU 7fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:03.299 UTC [policies] Evaluate -> DEBU 7fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:03.300 UTC [policies] Evaluate -> DEBU 7fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:25:03.300 UTC [cauthdsl] func1 -> DEBU 7fe 0xc000b55e30 gate 1569284703300119700 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:03.300 UTC [cauthdsl] func2 -> DEBU 7ff 0xc000b55e30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:03.300 UTC [cauthdsl] func2 -> DEBU 800 0xc000b55e30 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:03.300 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 801 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-09-24 00:25:03.300 UTC [msp] Validate -> DEBU 802 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:03.300 UTC [msp] getCertificationChain -> DEBU 803 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:03.301 UTC [cauthdsl] func2 -> DEBU 804 0xc000b55e30 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:25:03.301 UTC [msp.identity] Verify -> DEBU 805 Verify: digest = 00000000 8b 03 97 43 70 c0 92 23 17 5e 03 ee 64 e6 97 15 |...Cp..#.^..d...| +orderer0.example.com | 00000010 02 e5 c8 62 47 03 7b 9c 1d 32 87 82 fc 68 3e 5b |...bG.{..2...h>[|" +orderer0.example.com | "2019-09-24 00:25:03.301 UTC [msp.identity] Verify -> DEBU 806 Verify: sig = 00000000 30 44 02 20 31 f5 c5 93 d4 1d 90 90 18 dd 80 56 |0D. 1..........V| +orderer0.example.com | 00000010 9f 8f ca 24 d5 66 6c 6b 5f a8 6a fb ad 51 78 84 |...$.flk_.j..Qx.| +orderer0.example.com | 00000020 24 d7 ee fc 02 20 1a fe 63 11 78 f6 09 75 ed 1e |$.... ..c.x..u..| +orderer0.example.com | 00000030 ed 55 24 d6 52 91 c4 44 8c 94 19 3e f1 e1 0e 9c |.U$.R..D...>....| +orderer0.example.com | 00000040 9f c8 76 db 78 22 |..v.x"|" +orderer0.example.com | "2019-09-24 00:25:03.301 UTC [cauthdsl] func2 -> DEBU 807 0xc000b55e30 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:25:03.301 UTC [cauthdsl] func1 -> DEBU 808 0xc000b55e30 gate 1569284703300119700 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:25:03.301 UTC [policies] Evaluate -> DEBU 809 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:03.301 UTC [policies] Evaluate -> DEBU 80a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:03.301 UTC [policies] Evaluate -> DEBU 80b Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:25:03.301 UTC [policies] Evaluate -> DEBU 80c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.867 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 658 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.867 UTC [peer] updateTrustedRoots -> DEBU 659 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:04.869 UTC [msp.identity] Verify -> DEBU 65a Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-09-24 00:25:04.869 UTC [msp.identity] Verify -> DEBU 65b Verify: sig = 00000000 30 45 02 21 00 ff 95 5f 02 09 ea a0 bf c0 a6 3e |0E.!..._.......>| +peer0.org1.example.com | 00000010 09 e1 e0 6e 12 24 70 b9 fc 9d 8c 58 e2 40 42 e1 |...n.$p....X.@B.| +peer0.org1.example.com | 00000020 02 ec fc 54 ba 02 20 2c 9a 71 2c 72 53 8f 01 0c |...T.. ,.q,rS...| +peer0.org1.example.com | 00000030 14 27 21 5b e6 30 86 7f e5 04 09 31 a5 a3 b0 ec |.'![.0.....1....| +peer0.org1.example.com | 00000040 75 e7 2a 62 f3 d1 69 |u.*b..i|" +peer0.org1.example.com | "2019-09-24 00:25:04.869 UTC [gossip.comm] authenticateRemotePeer -> DEBU 65c Authenticated 172.18.0.5:49082" +peer0.org1.example.com | "2019-09-24 00:25:04.869 UTC [gossip.comm] GossipStream -> DEBU 65d Servicing 172.18.0.5:49082" +peer0.org1.example.com | "2019-09-24 00:25:04.870 UTC [gossip.comm] serviceConnection -> DEBU 65e Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:25:04.870 UTC [gossip.comm] func2 -> DEBU 65f Client 172.18.0.5:49000 disconnected" +peer0.org1.example.com | "2019-09-24 00:25:04.870 UTC [comm.grpc.server] 1 -> INFO 660 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:49000 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=24.5725286s +peer0.org1.example.com | "2019-09-24 00:25:04.870 UTC [gossip.comm] writeToStream -> DEBU 661 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:04.870 UTC [gossip.comm] serviceConnection -> DEBU 662 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:25:04.870 UTC [gossip.comm] func2 -> DEBU 663 Client 172.18.0.5:49082 disconnected" +peer0.org1.example.com | "2019-09-24 00:25:04.870 UTC [comm.grpc.server] 1 -> INFO 664 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:14.864Z grpc.peer_address=172.18.0.5:49082 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=5.1841ms +peer0.org1.example.com | "2019-09-24 00:25:04.871 UTC [gossip.comm] readFromStream -> DEBU 665 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +peer0.org1.example.com | "2019-09-24 00:25:04.871 UTC [gossip.comm] writeToStream -> DEBU 666 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:04.874 UTC [grpc] infof -> DEBU 667 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:04.875 UTC [grpc] infof -> DEBU 668 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:04.875 UTC [gossip.comm] readFromStream -> DEBU 669 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 00:25:04.875 UTC [gossip.comm] func2 -> DEBU 66a Client 172.18.0.8:34550 disconnected" +peer0.org1.example.com | "2019-09-24 00:25:04.875 UTC [comm.grpc.server] 1 -> INFO 66b streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:14.81Z grpc.peer_address=172.18.0.8:34550 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=64.3527ms +peer0.org1.example.com | "2019-09-24 00:25:04.875 UTC [gossip.comm] writeToStream -> DEBU 66c Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:04.895 UTC [peer] buildTrustedRootsForChain -> DEBU 66d updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.895 UTC [peer] buildTrustedRootsForChain -> DEBU 66e adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-09-24 00:25:04.896 UTC [peer] buildTrustedRootsForChain -> DEBU 66f adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-09-24 00:25:04.896 UTC [peer] buildTrustedRootsForChain -> DEBU 670 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-09-24 00:25:04.896 UTC [committer.txvalidator] validateTx -> DEBU 671 config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:04.897 UTC [committer.txvalidator] Validate -> DEBU 672 got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 00:25:04.897 UTC [committer.txvalidator] Validate -> INFO 673 [businesschannel] Validated block [1] in 372ms" +peer0.org1.example.com | "2019-09-24 00:25:04.897 UTC [gossip.privdata] listMissingPrivateData -> DEBU 674 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 00:25:04.897 UTC [gossip.privdata] StoreBlock -> DEBU 675 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 00:25:04.897 UTC [committer] preCommit -> DEBU 676 Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [kvledger] CommitWithPvtData -> DEBU 677 [businesschannel] Validating state for block [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 678 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 679 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 67a Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 67b ValidateAndPrepareBatch() for block number = [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 67c preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [valimpl] preprocessProtoBlock -> DEBU 67d txType=CONFIG" +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [valimpl] processNonEndorserTx -> DEBU 67e Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [valimpl] processNonEndorserTx -> DEBU 67f Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 680 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 681 constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-09-24 00:25:04.898 UTC [peer] GenerateSimulationResults -> DEBU 682 Processing CONFIG" +orderer0.example.com | "2019-09-24 00:25:03.301 UTC [policies] Evaluate -> DEBU 80d Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:03.302 UTC [policies] Evaluate -> DEBU 80e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:03.302 UTC [common.deliver] deliverBlocks -> DEBU 80f [channel: businesschannel] Received seekInfo (0xc000ac5680) start: > stop: > from 172.18.0.6:42154" +orderer0.example.com | "2019-09-24 00:25:03.305 UTC [fsblkstorage] waitForBlock -> DEBU 810 Going to wait for newer blocks. maxAvailaBlockNumber=[0], waitForBlockNum=[1]" +orderer0.example.com | "2019-09-24 00:25:03.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 811 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +orderer0.example.com | "2019-09-24 00:25:03.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 812 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +orderer0.example.com | "2019-09-24 00:25:03.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 813 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.6µs " +orderer0.example.com | "2019-09-24 00:25:03.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 814 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.7µs " +orderer0.example.com | "2019-09-24 00:25:03.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU 815 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:03.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU 816 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:03.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 817 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:03.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 818 Sending msg of 28 bytes to 3 on channel testchainid took 39.8µs" +orderer0.example.com | "2019-09-24 00:25:03.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 819 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.6µs " +orderer0.example.com | "2019-09-24 00:25:03.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 81a Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +orderer0.example.com | "2019-09-24 00:25:03.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 81b Sending msg of 28 bytes to 3 on channel businesschannel took 52.9µs" +orderer0.example.com | "2019-09-24 00:25:03.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 81c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296µs " +orderer0.example.com | "2019-09-24 00:25:03.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 81d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.9µs " +orderer0.example.com | "2019-09-24 00:25:03.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 81e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:03.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 81f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:04.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 820 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:04.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 821 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +orderer0.example.com | "2019-09-24 00:25:04.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 822 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.7µs " +orderer0.example.com | "2019-09-24 00:25:04.303 UTC [orderer.common.server] Deliver -> DEBU 823 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:25:04.303 UTC [common.deliver] Handle -> DEBU 824 Starting new deliver loop for 172.18.0.9:60684" +orderer0.example.com | "2019-09-24 00:25:04.303 UTC [common.deliver] Handle -> DEBU 825 Attempting to read seek info message from 172.18.0.9:60684" +orderer0.example.com | "2019-09-24 00:25:04.360 UTC [orderer.common.server] Broadcast -> DEBU 826 Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 00:25:04.360 UTC [orderer.common.broadcast] Handle -> DEBU 827 Starting new broadcast loop for 172.18.0.9:60686" +orderer0.example.com | "2019-09-24 00:25:04.360 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 828 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:60686" +orderer0.example.com | "2019-09-24 00:25:04.360 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 829 Processing config update message for channel businesschannel" +orderer0.example.com | "2019-09-24 00:25:04.360 UTC [policies] Evaluate -> DEBU 82a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 00:25:04.360 UTC [policies] Evaluate -> DEBU 82b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:04.360 UTC [policies] Evaluate -> DEBU 82c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 00:25:04.360 UTC [policies] Evaluate -> DEBU 82d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:04.360 UTC [policies] Evaluate -> DEBU 82e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 00:25:04.361 UTC [cauthdsl] func1 -> DEBU 82f 0xc000acda10 gate 1569284704361031900 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:04.361 UTC [cauthdsl] func2 -> DEBU 830 0xc000acda10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:04.361 UTC [cauthdsl] func2 -> DEBU 831 0xc000acda10 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:04.361 UTC [cauthdsl] func2 -> DEBU 832 0xc000acda10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2019-09-24 00:25:04.361 UTC [cauthdsl] func2 -> DEBU 833 0xc000acda10 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:25:04.361 UTC [cauthdsl] func1 -> DEBU 834 0xc000acda10 gate 1569284704361031900 evaluation fails" +orderer0.example.com | "2019-09-24 00:25:04.361 UTC [policies] Evaluate -> DEBU 835 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:04.361 UTC [policies] Evaluate -> DEBU 836 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:04.361 UTC [policies] func1 -> DEBU 837 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2019-09-24 00:25:04.361 UTC [policies] Evaluate -> DEBU 838 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:04.361 UTC [policies] Evaluate -> DEBU 839 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:04.362 UTC [policies] Evaluate -> DEBU 83a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.899 UTC [peer] processChannelConfigTx -> DEBU 683 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-09-24 00:25:04.900 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 684 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:25:04.900 UTC [lockbasedtxmgr] Done -> DEBU 685 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-09-24 00:25:04.900 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 686 Block [1] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 00:25:04.900 UTC [valinternal] ApplyWriteSet -> DEBU 687 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003558140)}" +peer0.org1.example.com | "2019-09-24 00:25:04.900 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 688 validating rwset..." +orderer0.example.com | "2019-09-24 00:25:04.362 UTC [policies] Evaluate -> DEBU 83b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:04.362 UTC [policies] Evaluate -> DEBU 83c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-09-24 00:25:04.362 UTC [cauthdsl] func1 -> DEBU 83d 0xc000870960 gate 1569284704362789800 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:04.362 UTC [cauthdsl] func2 -> DEBU 83e 0xc000870960 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:04.362 UTC [cauthdsl] func2 -> DEBU 83f 0xc000870960 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:04.363 UTC [cauthdsl] func2 -> DEBU 840 0xc000870960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-09-24 00:25:04.363 UTC [cauthdsl] func2 -> DEBU 841 0xc000870960 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:25:04.363 UTC [cauthdsl] func1 -> DEBU 842 0xc000870960 gate 1569284704362789800 evaluation fails" +orderer0.example.com | "2019-09-24 00:25:04.363 UTC [policies] Evaluate -> DEBU 843 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.363 UTC [policies] Evaluate -> DEBU 844 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.363 UTC [policies] Evaluate -> DEBU 845 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 00:25:04.363 UTC [cauthdsl] func1 -> DEBU 846 0xc0008711c0 gate 1569284704363949800 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [cauthdsl] func2 -> DEBU 847 0xc0008711c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [cauthdsl] func2 -> DEBU 848 0xc0008711c0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [cauthdsl] func2 -> DEBU 849 0xc0008711c0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [msp.identity] Verify -> DEBU 84a Verify: digest = 00000000 ee e8 47 d9 8e cd f1 fe 87 84 16 ed 8e 09 c8 eb |..G.............| +orderer0.example.com | 00000010 d5 74 18 3a 30 31 77 8f 57 bb 02 5d 68 35 e5 d0 |.t.:01w.W..]h5..|" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [msp.identity] Verify -> DEBU 84b Verify: sig = 00000000 30 45 02 21 00 c6 05 54 c1 7e 3b ae ca f5 83 da |0E.!...T.~;.....| +orderer0.example.com | 00000010 db 0e 02 ea f9 97 37 82 e3 4a 60 3b ad f4 9e 81 |......7..J`;....| +orderer0.example.com | 00000020 9d fa 54 5c 8e 02 20 59 4a 9b 69 80 20 af 2d b3 |..T\.. YJ.i. .-.| +orderer0.example.com | 00000030 4f 96 d9 63 d5 09 34 6a f6 1c b2 b2 b7 78 83 e9 |O..c..4j.....x..| +orderer0.example.com | 00000040 99 77 ef 1f 7a df 99 |.w..z..|" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [cauthdsl] func2 -> DEBU 84c 0xc0008711c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [cauthdsl] func1 -> DEBU 84d 0xc0008711c0 gate 1569284704363949800 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 84e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 84f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 850 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 851 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 852 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 853 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 854 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 855 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 856 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 857 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 858 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 859 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 85a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 85b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.366 UTC [common.configtx] addToMap -> DEBU 85c Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 85d Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 85e Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 85f Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 860 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 861 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 862 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 863 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [common.configtx] addToMap -> DEBU 864 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [common.configtx] verifyDeltaSet -> DEBU 865 Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [common.configtx] policyForItem -> DEBU 866 Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 867 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 868 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 869 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:25:04.900 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 689 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:25:04.900 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 68a ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 00:25:04.900 UTC [kvledger] CommitWithPvtData -> DEBU 68b [businesschannel] Adding CommitHash to the block [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.900 UTC [kvledger] CommitWithPvtData -> DEBU 68c [businesschannel] Committing block [1] to storage" +peer0.org1.example.com | "2019-09-24 00:25:04.900 UTC [ledgerstorage] CommitWithPvtData -> DEBU 68d Writing block [1] to pvt block store" +peer0.org1.example.com | "2019-09-24 00:25:04.897 UTC [committer.txvalidator] validateTx -> DEBU 68e [businesschannel] validateTx completes for block 0xc003207640 env 0xc003372910 txn 0" +peer0.org1.example.com | "2019-09-24 00:25:04.922 UTC [comm.grpc.server] 1 -> INFO 68f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:06.921Z grpc.peer_address=172.18.0.6:43240 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=155.4µs +peer0.org1.example.com | "2019-09-24 00:25:04.925 UTC [pvtdatastorage] Prepare -> DEBU 690 Saved 0 private data write sets for block [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.942 UTC [comm.grpc.server] 1 -> INFO 691 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:06.941Z grpc.peer_address=172.18.0.8:34556 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=155.3µs +peer0.org1.example.com | "2019-09-24 00:25:04.943 UTC [msp] GetDefaultSigningIdentity -> DEBU 692 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:04.943 UTC [msp.identity] Sign -> DEBU 693 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:04.943 UTC [msp.identity] Sign -> DEBU 694 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:04.943 UTC [gossip.comm] authenticateRemotePeer -> DEBU 695 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43240" +peer0.org1.example.com | "2019-09-24 00:25:04.943 UTC [gossip.comm] authenticateRemotePeer -> DEBU 696 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:43240" +peer0.org1.example.com | "2019-09-24 00:25:04.943 UTC [msp] DeserializeIdentity -> DEBU 697 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.943 UTC [msp] DeserializeIdentity -> DEBU 698 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.944 UTC [msp.identity] newIdentity -> DEBU 699 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:04.948 UTC [fsblkstorage] indexBlock -> DEBU 69a Indexing block [blockNum=1, blockHash=[]byte{0x81, 0xd3, 0xeb, 0x83, 0x70, 0x19, 0x81, 0xbf, 0xc0, 0xb4, 0xb0, 0x9b, 0xd3, 0x64, 0x4d, 0xef, 0x6d, 0x21, 0x73, 0x6d, 0x1, 0x28, 0x4d, 0xdc, 0x73, 0xd7, 0xb4, 0x87, 0x96, 0xcf, 0x2e, 0xd6} txOffsets= +peer0.org1.example.com | txId=91696339b033049ed8d7697c23abc85593d36f57812608fa7cde041ba7fdc82b locPointer=offset=71, bytesLength=22685 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 00:25:04.948 UTC [fsblkstorage] indexBlock -> DEBU 69b Adding txLoc [fileSuffixNum=0, offset=24020, bytesLength=22685] for tx ID: [91696339b033049ed8d7697c23abc85593d36f57812608fa7cde041ba7fdc82b] to txid-index" +peer0.org1.example.com | "2019-09-24 00:25:04.948 UTC [fsblkstorage] indexBlock -> DEBU 69c Adding txLoc [fileSuffixNum=0, offset=24020, bytesLength=22685] for tx number:[0] ID: [91696339b033049ed8d7697c23abc85593d36f57812608fa7cde041ba7fdc82b] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 00:25:04.952 UTC [fsblkstorage] updateCheckpoint -> DEBU 69d Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47677], isChainEmpty=[false], lastBlockNumber=[1]" +peer0.org1.example.com | "2019-09-24 00:25:04.952 UTC [pvtdatastorage] Commit -> DEBU 69e Committing private data for block [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.954 UTC [msp] GetDefaultSigningIdentity -> DEBU 69f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:04.954 UTC [msp.identity] Sign -> DEBU 6a0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:04.954 UTC [msp.identity] Sign -> DEBU 6a1 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86a Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86b Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86c Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86d Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86e Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86f Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 870 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [policies] Evaluate -> DEBU 871 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [cauthdsl] func1 -> DEBU 872 0xc000343e50 gate 1569284704369749200 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [cauthdsl] func2 -> DEBU 873 0xc000343e50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [cauthdsl] func2 -> DEBU 874 0xc000343e50 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 875 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [cauthdsl] func2 -> DEBU 876 0xc000343e50 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:25:04.369 UTC [msp.identity] Verify -> DEBU 877 Verify: digest = 00000000 1c cd 68 b8 33 39 c3 f7 d8 bf 6f 21 20 3c 57 2b |..h.39....o! DEBU 878 Verify: sig = 00000000 30 44 02 20 3f 2d 41 bf df 48 de ab 3b 9f f2 6a |0D. ?-A..H..;..j| +orderer0.example.com | 00000010 1c b4 f9 16 f1 15 f3 9b 4e 9f 15 e8 29 65 8f 9b |........N...)e..| +orderer0.example.com | 00000020 87 2f 31 cd 02 20 40 64 26 9c 61 b6 4b 3f 60 9d |./1.. @d&.a.K?`.| +orderer0.example.com | 00000030 b0 4f 81 19 be bf 2f 49 3d 39 ca e7 6a cb ce 8c |.O..../I=9..j...| +orderer0.example.com | 00000040 db 89 e6 d0 87 84 |......|" +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [cauthdsl] func2 -> DEBU 879 0xc000343e50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [cauthdsl] func1 -> DEBU 87a 0xc000343e50 gate 1569284704369749200 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [policies] Evaluate -> DEBU 87b Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [policies] Evaluate -> DEBU 87c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [common.configtx] verifyDeltaSet -> DEBU 87d Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 87e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 87f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 880 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 881 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 882 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 883 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 884 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 885 Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 886 Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 887 Setting policy for key Endorsement to " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 888 Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 889 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88b Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 890 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 891 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 892 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 893 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 894 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] NewStandardValues -> DEBU 895 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 896 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 897 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 898 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 899 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89a Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] NewStandardValues -> DEBU 89b Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89c Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89d Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89e Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89f Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a0 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a1 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.372 UTC [common.channelconfig] NewStandardValues -> DEBU 8a2 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:25:04.372 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a3 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:25:04.372 UTC [common.channelconfig] NewStandardValues -> DEBU 8a4 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:04.372 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a5 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:04.372 UTC [common.channelconfig] validateMSP -> DEBU 8a6 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.372 UTC [msp] newBccspMsp -> DEBU 8a7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.372 UTC [msp] New -> DEBU 8a8 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.372 UTC [msp] Setup -> DEBU 8a9 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:25:04.372 UTC [msp.identity] newIdentity -> DEBU 8aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.372 UTC [msp.identity] newIdentity -> DEBU 8ab Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | "2019-09-24 00:25:04.954 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:34556" +peer0.org1.example.com | "2019-09-24 00:25:04.955 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a3 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:34556" +peer0.org1.example.com | "2019-09-24 00:25:04.955 UTC [msp] DeserializeIdentity -> DEBU 6a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.955 UTC [msp] DeserializeIdentity -> DEBU 6a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.959 UTC [msp.identity] newIdentity -> DEBU 6a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:04.960 UTC [msp] Validate -> DEBU 6a7 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:04.960 UTC [msp] getCertificationChain -> DEBU 6a8 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:04.960 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.960 UTC [msp] DeserializeIdentity -> DEBU 6aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.960 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6ab Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.961 UTC [msp] DeserializeIdentity -> DEBU 6ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.961 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6ad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.961 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ae Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:04.961 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6af Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:04.961 UTC [policies] Evaluate -> DEBU 6b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.961 UTC [policies] Evaluate -> DEBU 6b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:04.961 UTC [policies] Evaluate -> DEBU 6b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.961 UTC [cauthdsl] func1 -> DEBU 6b3 0xc003750ea0 gate 1569284704961831900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:04.961 UTC [cauthdsl] func2 -> DEBU 6b4 0xc003750ea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:04.961 UTC [cauthdsl] func2 -> DEBU 6b5 0xc003750ea0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:04.962 UTC [cauthdsl] func2 -> DEBU 6b6 0xc003750ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:04.962 UTC [cauthdsl] func2 -> DEBU 6b7 0xc003750ea0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:04.962 UTC [cauthdsl] func1 -> DEBU 6b8 0xc003750ea0 gate 1569284704961831900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:04.962 UTC [policies] Evaluate -> DEBU 6b9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.962 UTC [policies] Evaluate -> DEBU 6ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.962 UTC [policies] Evaluate -> DEBU 6bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.962 UTC [cauthdsl] func1 -> DEBU 6bc 0xc003751700 gate 1569284704962661900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:04.962 UTC [cauthdsl] func2 -> DEBU 6bd 0xc003751700 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:04.962 UTC [cauthdsl] func2 -> DEBU 6be 0xc003751700 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:04.962 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6bf Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.962 UTC [msp] Validate -> DEBU 6c0 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:04.963 UTC [msp] getCertificationChain -> DEBU 6c1 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:04.964 UTC [msp] Validate -> DEBU 6c2 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:04.964 UTC [msp] getCertificationChain -> DEBU 6c3 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:04.964 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.964 UTC [msp] DeserializeIdentity -> DEBU 6c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [msp] DeserializeIdentity -> DEBU 6c7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [msp] DeserializeIdentity -> DEBU 6c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ca Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6cb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [policies] Evaluate -> DEBU 6cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [policies] Evaluate -> DEBU 6cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [policies] Evaluate -> DEBU 6ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [cauthdsl] func1 -> DEBU 6cf 0xc00376acc0 gate 1569284704965670900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [cauthdsl] func2 -> DEBU 6d0 0xc00376acc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [cauthdsl] func2 -> DEBU 6d1 0xc00376acc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [cauthdsl] func2 -> DEBU 6d2 0xc00376acc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [cauthdsl] func2 -> DEBU 6d3 0xc00376acc0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [cauthdsl] func1 -> DEBU 6d4 0xc00376acc0 gate 1569284704965670900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [policies] Evaluate -> DEBU 6d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.965 UTC [policies] Evaluate -> DEBU 6d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [msp] Validate -> DEBU 8ac MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [common.channelconfig] NewStandardValues -> DEBU 8ad Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ae Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8af Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [common.channelconfig] NewStandardValues -> DEBU 8b0 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b1 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [common.channelconfig] NewStandardValues -> DEBU 8b2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b3 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [common.channelconfig] Validate -> DEBU 8b4 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [common.channelconfig] validateMSP -> DEBU 8b5 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [msp] newBccspMsp -> DEBU 8b6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [msp] New -> DEBU 8b7 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [msp] Setup -> DEBU 8b8 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.373 UTC [msp.identity] newIdentity -> DEBU 8b9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [msp.identity] newIdentity -> DEBU 8ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8bb Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [msp] Validate -> DEBU 8bc MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [msp] getCertificationChain -> DEBU 8bd MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [msp] hasOURole -> DEBU 8be MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [msp] getCertificationChain -> DEBU 8bf MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:04.966 UTC [policies] Evaluate -> DEBU 6d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.966 UTC [cauthdsl] func1 -> DEBU 6d8 0xc00376b520 gate 1569284704966040700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:04.967 UTC [cauthdsl] func2 -> DEBU 6d9 0xc003751700 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.967 UTC [msp.identity] Verify -> DEBU 6da Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-09-24 00:25:04.967 UTC [msp.identity] Verify -> DEBU 6db Verify: sig = 00000000 30 45 02 21 00 ae 94 88 79 8d 53 02 79 7f 9e d0 |0E.!....y.S.y...| +peer0.org1.example.com | 00000010 54 de 49 d0 be a8 eb b0 40 81 a3 32 8b 12 bf 48 |T.I.....@..2...H| +peer0.org1.example.com | 00000020 16 9b ef 84 4d 02 20 43 51 d8 f5 8b be 21 33 05 |....M. CQ....!3.| +peer0.org1.example.com | 00000030 e8 4a 21 04 3e b1 cc 6a bd 8a 94 f9 31 6c 74 b6 |.J!.>..j....1lt.| +peer0.org1.example.com | 00000040 2c 42 94 b6 08 b1 39 |,B....9|" +peer0.org1.example.com | "2019-09-24 00:25:04.969 UTC [cauthdsl] func2 -> DEBU 6dc 0xc003751700 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.983 UTC [cauthdsl] func1 -> DEBU 6df 0xc003751700 gate 1569284704962661900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:04.983 UTC [policies] Evaluate -> DEBU 6e0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.983 UTC [policies] Evaluate -> DEBU 6e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.983 UTC [policies] Evaluate -> DEBU 6e2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.983 UTC [policies] Evaluate -> DEBU 6e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.984 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6e4 Authenticated 172.18.0.8:34556" +peer0.org1.example.com | "2019-09-24 00:25:04.984 UTC [gossip.comm] GossipStream -> DEBU 6e5 Servicing 172.18.0.8:34556" +peer0.org1.example.com | "2019-09-24 00:25:04.970 UTC [pvtdatastorage] Commit -> DEBU 6dd Committed private data for block [1]" +peer0.org1.example.com | "2019-09-24 00:25:04.984 UTC [kvledger] CommitWithPvtData -> DEBU 6e6 [businesschannel] Committing block [1] transactions to state database" +peer0.org1.example.com | "2019-09-24 00:25:04.984 UTC [lockbasedtxmgr] Commit -> DEBU 6e7 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 00:25:04.984 UTC [lockbasedtxmgr] Commit -> DEBU 6e8 Committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:25:04.984 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 6e9 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 00:25:04.984 UTC [lockbasedtxmgr] Commit -> DEBU 6ea Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:25:04.984 UTC [stateleveldb] ApplyUpdates -> DEBU 6eb Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-09-24 00:25:04.966 UTC [cauthdsl] func2 -> DEBU 6ec 0xc00376b520 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:04.985 UTC [cauthdsl] func2 -> DEBU 6ed 0xc00376b520 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:04.985 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6ee Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:04.986 UTC [msp] Validate -> DEBU 6ef MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:04.986 UTC [msp] getCertificationChain -> DEBU 6f0 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:04.986 UTC [cauthdsl] func2 -> DEBU 6f1 0xc00376b520 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.986 UTC [msp.identity] Verify -> DEBU 6f2 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-09-24 00:25:04.986 UTC [msp.identity] Verify -> DEBU 6f3 Verify: sig = 00000000 30 44 02 20 47 8c 36 ca 53 83 cf a3 33 d2 4c 83 |0D. G.6.S...3.L.| +peer0.org1.example.com | 00000010 0c fb 79 02 14 21 4e 4b 05 f7 1b c6 e7 96 06 46 |..y..!NK.......F| +peer0.org1.example.com | 00000020 2d 0a 93 a2 02 20 2a 5a 18 c5 50 6d d8 ac 61 ea |-.... *Z..Pm..a.| +peer0.org1.example.com | 00000030 c0 7a b3 43 c6 03 d4 e0 1d 45 a0 5e ef 1d fe 8d |.z.C.....E.^....| +peer0.org1.example.com | 00000040 50 c4 cc cc 07 f7 |P.....|" +peer0.org1.example.com | "2019-09-24 00:25:04.987 UTC [cauthdsl] func2 -> DEBU 6f4 0xc00376b520 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.987 UTC [cauthdsl] func1 -> DEBU 6f5 0xc00376b520 gate 1569284704966040700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:04.987 UTC [policies] Evaluate -> DEBU 6f6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.987 UTC [policies] Evaluate -> DEBU 6f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.987 UTC [policies] Evaluate -> DEBU 6f8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.987 UTC [policies] Evaluate -> DEBU 6f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.987 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6fa Authenticated 172.18.0.6:43240" +peer0.org1.example.com | "2019-09-24 00:25:04.987 UTC [gossip.comm] GossipStream -> DEBU 6fb Servicing 172.18.0.6:43240" +peer0.org1.example.com | "2019-09-24 00:25:04.971 UTC [grpc] infof -> DEBU 6de transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:04.988 UTC [gossip.gossip] handleMessage -> DEBU 6fc Entering, 172.18.0.8:34556 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:3722998364390887568 tag:EMPTY mem_req: > , Envelope: 174 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.988 UTC [gossip.gossip] handleMessage -> DEBU 6fd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:04.990 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6fe Got message: GossipMessage: nonce:3722998364390887568 tag:EMPTY mem_req: > , Envelope: 174 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.990 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6ff Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:04.990 UTC [msp] DeserializeIdentity -> DEBU 700 Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [common.channelconfig] NewStandardValues -> DEBU 8c0 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c1 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [common.channelconfig] NewStandardValues -> DEBU 8c2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c3 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [common.channelconfig] Validate -> DEBU 8c4 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 00:25:04.374 UTC [common.channelconfig] validateMSP -> DEBU 8c5 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.375 UTC [msp] newBccspMsp -> DEBU 8c6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.375 UTC [msp] New -> DEBU 8c7 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.375 UTC [msp] Setup -> DEBU 8c8 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.375 UTC [msp.identity] newIdentity -> DEBU 8c9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.375 UTC [msp.identity] newIdentity -> DEBU 8ca Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.375 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8cb Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.375 UTC [msp] Validate -> DEBU 8cc MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:04.375 UTC [msp] getCertificationChain -> DEBU 8cd MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.382 UTC [msp] hasOURole -> DEBU 8ce MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:04.382 UTC [msp] getCertificationChain -> DEBU 8cf MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.382 UTC [msp] Setup -> DEBU 8d0 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:25:04.382 UTC [msp] Setup -> DEBU 8d1 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:25:04.382 UTC [policies] NewManagerImpl -> DEBU 8d2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.382 UTC [policies] NewManagerImpl -> DEBU 8d3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.382 UTC [policies] NewManagerImpl -> DEBU 8d4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.382 UTC [policies] NewManagerImpl -> DEBU 8d5 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.382 UTC [policies] NewManagerImpl -> DEBU 8d6 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8d7 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8d8 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8d9 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8da Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8db Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8dc Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8dd Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8de Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8df Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e0 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e1 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e2 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e3 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e4 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e5 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e6 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e7 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e8 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 701 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 702 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 703 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [policies] Evaluate -> DEBU 704 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [policies] Evaluate -> DEBU 705 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [policies] Evaluate -> DEBU 706 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [cauthdsl] func1 -> DEBU 707 0xc0037a6120 gate 1569284704991676900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [cauthdsl] func2 -> DEBU 708 0xc0037a6120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [cauthdsl] func2 -> DEBU 709 0xc0037a6120 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [cauthdsl] func2 -> DEBU 70a 0xc0037a6120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [cauthdsl] func2 -> DEBU 70b 0xc0037a6120 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:04.991 UTC [cauthdsl] func1 -> DEBU 70c 0xc0037a6120 gate 1569284704991676900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [policies] Evaluate -> DEBU 70d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [policies] Evaluate -> DEBU 70e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [policies] Evaluate -> DEBU 70f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [cauthdsl] func1 -> DEBU 710 0xc0037a6960 gate 1569284704992229600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [cauthdsl] func2 -> DEBU 711 0xc0037a6960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [cauthdsl] func2 -> DEBU 712 0xc0037a6960 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [cauthdsl] func2 -> DEBU 713 0xc0037a6960 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [msp.identity] Verify -> DEBU 714 Verify: digest = 00000000 ad 71 e5 07 a7 d3 54 5c e3 46 88 c6 43 71 8e 8e |.q....T\.F..Cq..| +peer0.org1.example.com | 00000010 48 a5 4c df 49 58 c6 2c 49 ba ed 33 41 27 88 05 |H.L.IX.,I..3A'..|" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [msp.identity] Verify -> DEBU 715 Verify: sig = 00000000 30 43 02 20 17 e0 35 8d 31 b2 0a 34 30 4d ee 0d |0C. ..5.1..40M..| +peer0.org1.example.com | 00000010 e8 1f 68 ee a4 5a 84 f4 bf 90 65 df a8 3c 7e e3 |..h..Z....e..<~.| +peer0.org1.example.com | 00000020 30 aa 4c 00 02 1f 26 49 f9 2c 6e 70 bd a0 7d 38 |0.L...&I.,np..}8| +peer0.org1.example.com | 00000030 de 0d d1 8d c4 35 1e 6a 41 f3 d9 82 69 99 ed 88 |.....5.jA...i...| +peer0.org1.example.com | 00000040 bc e1 a8 ea 70 |....p|" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [cauthdsl] func2 -> DEBU 716 0xc0037a6960 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [cauthdsl] func1 -> DEBU 717 0xc0037a6960 gate 1569284704992229600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:04.992 UTC [policies] Evaluate -> DEBU 718 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [policies] Evaluate -> DEBU 719 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [policies] Evaluate -> DEBU 71a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [policies] Evaluate -> DEBU 71b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 71c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [gossip.discovery] learnNewMembers -> DEBU 71d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [gossip.discovery] learnNewMembers -> DEBU 71e Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [gossip.discovery] learnNewMembers -> DEBU 71f Exiting" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f5 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f6 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f7 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f8 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f9 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8fa Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8fb Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8fc Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8fd Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 8fe Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 8ff Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 900 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 901 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 902 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 903 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 904 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 916 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 917 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 918 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 919 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 91a Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 91b Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 91c Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 91d Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 91e As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 91f As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 920 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 921 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 922 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 923 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 924 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 925 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 926 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 720 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 721 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [gossip.discovery] sendMemResponse -> DEBU 722 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [msp] DeserializeIdentity -> DEBU 723 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.993 UTC [msp] DeserializeIdentity -> DEBU 724 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:04.994 UTC [gossip.comm] Send -> DEBU 725 Entering, sending GossipMessage: Channel: , nonce: 3722998364390887568, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 495 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:04.994 UTC [gossip.discovery] sendMemResponse -> DEBU 726 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\016" signature:"0E\002!\000\355\335\025g\304\230 \352\323\330\327\037\346\264\344Y\302\270p\207\353\375]d\332\2359+M\221b\330\002 #\036\023\201\3236V\377\344&Y0\275\032CU\275\035\223'\2661\311\235\225\004\316\026r\333\242\212" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:04.994 UTC [gossip.comm] sendToEndpoint -> DEBU 727 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3722998364390887568, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 495 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:04.994 UTC [gossip.comm] sendToEndpoint -> DEBU 728 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.000 UTC [gossip.comm] func2 -> DEBU 729 Client 172.18.0.6:43240 disconnected" +peer0.org1.example.com | "2019-09-24 00:25:05.000 UTC [comm.grpc.server] 1 -> INFO 72a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:14.943Z grpc.peer_address=172.18.0.6:43240 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=57.461ms +peer0.org1.example.com | "2019-09-24 00:25:05.001 UTC [gossip.comm] writeToStream -> DEBU 72b Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:04.994 UTC [gossip.comm] readFromStream -> DEBU 72c Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 00:25:05.015 UTC [lockbasedtxmgr] Commit -> DEBU 72d Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 00:25:05.015 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 72e Preparing potential purge list working-set for expiringAtBlk [2]" +peer0.org1.example.com | "2019-09-24 00:25:05.015 UTC [leveldbhelper] GetIterator -> DEBU 72f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" +peer0.org1.example.com | "2019-09-24 00:25:05.015 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 730 No expiry entry found for expiringAtBlk [2]" +peer0.org1.example.com | "2019-09-24 00:25:05.015 UTC [lockbasedtxmgr] func1 -> DEBU 731 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 00:25:05.016 UTC [kvledger] CommitWithPvtData -> DEBU 732 [businesschannel] Committing block [1] transactions to history database" +peer0.org1.example.com | "2019-09-24 00:25:05.016 UTC [historyleveldb] Commit -> DEBU 733 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" +peer0.org1.example.com | "2019-09-24 00:25:05.016 UTC [historyleveldb] Commit -> DEBU 734 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-09-24 00:25:05.022 UTC [historyleveldb] Commit -> DEBU 735 Channel [businesschannel]: Updates committed to history database for blockNo [1]" +peer0.org1.example.com | "2019-09-24 00:25:05.022 UTC [kvledger] CommitWithPvtData -> INFO 736 [businesschannel] Committed block [1] with 1 transaction(s) in 124ms (state_validation=2ms block_and_pvtdata_commit=83ms state_commit=31ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer0.org1.example.com | "2019-09-24 00:25:05.022 UTC [msp] GetDefaultSigningIdentity -> DEBU 737 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:05.022 UTC [msp.identity] Sign -> DEBU 738 Sign: plaintext: 18057A5E1214089096D4ACDE83CEE315...624D0F542C442AB5FE8C65C22A020802 " +peer0.org1.example.com | "2019-09-24 00:25:05.022 UTC [msp.identity] Sign -> DEBU 739 Sign: digest: 605931849C5B801A041D2CA71F4590E1CBC19ABACD7587840BE76C1F2C4D9524 " +peer0.org1.example.com | "2019-09-24 00:25:05.022 UTC [gossip.state] commitBlock -> DEBU 73a [businesschannel] Committed block [1] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 00:25:05.043 UTC [comm.grpc.server] 1 -> INFO 73b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:07.043Z grpc.peer_address=172.18.0.6:43244 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=156µs +peer0.org1.example.com | "2019-09-24 00:25:05.046 UTC [msp] GetDefaultSigningIdentity -> DEBU 73c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:05.046 UTC [msp.identity] Sign -> DEBU 73d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:05.046 UTC [msp.identity] Sign -> DEBU 73e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 927 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 928 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [common.channelconfig] LogSanityChecks -> DEBU 929 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [common.capabilities] Supported -> DEBU 92a Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [common.capabilities] Supported -> DEBU 92b Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [msp] GetDefaultSigningIdentity -> DEBU 92c Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [msp] GetDefaultSigningIdentity -> DEBU 92d Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [msp.identity] Sign -> DEBU 92e Sign: plaintext: 0AD2060A1B08011A0608E0C4A5EC0522...6AF61CB2B2B77883E99977EF1F7ADF99 " +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [msp.identity] Sign -> DEBU 92f Sign: digest: D714E82B948519A5C4C6050CCC2A0990B0CCFB3E0B34FCBA210E7039E6706555 " +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [policies] Evaluate -> DEBU 930 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [policies] Evaluate -> DEBU 931 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [policies] Evaluate -> DEBU 932 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [policies] Evaluate -> DEBU 933 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [policies] Evaluate -> DEBU 934 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 00:25:04.387 UTC [msp] DeserializeIdentity -> DEBU 935 Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:04.388 UTC [msp.identity] newIdentity -> DEBU 936 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.388 UTC [cauthdsl] func1 -> DEBU 937 0xc0008ec490 gate 1569284704388870000 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:04.388 UTC [cauthdsl] func2 -> DEBU 938 0xc0008ec490 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:04.389 UTC [cauthdsl] func2 -> DEBU 939 0xc0008ec490 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:04.389 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 93a Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 00:25:04.389 UTC [msp] Validate -> DEBU 93b MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:25:04.389 UTC [cauthdsl] func2 -> DEBU 93c 0xc0008ec490 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:25:04.389 UTC [msp.identity] Verify -> DEBU 93d Verify: digest = 00000000 d7 14 e8 2b 94 85 19 a5 c4 c6 05 0c cc 2a 09 90 |...+.........*..| +orderer0.example.com | 00000010 b0 cc fb 3e 0b 34 fc ba 21 0e 70 39 e6 70 65 55 |...>.4..!.p9.peU|" +orderer0.example.com | "2019-09-24 00:25:04.389 UTC [msp.identity] Verify -> DEBU 93e Verify: sig = 00000000 30 45 02 21 00 9c 2f 49 ca 50 e2 c2 b9 1d bd c4 |0E.!../I.P......| +orderer0.example.com | 00000010 29 2b b2 d5 77 08 fe 65 ea 7b b4 a7 88 f3 a9 06 |)+..w..e.{......| +orderer0.example.com | 00000020 08 02 e9 88 38 02 20 0e 04 dc 5a a0 be d2 83 e1 |....8. ...Z.....| +orderer0.example.com | 00000030 a4 51 e3 80 d1 f7 48 32 17 b4 51 91 23 6c 92 d2 |.Q....H2..Q.#l..| +orderer0.example.com | 00000040 f9 3e 14 b4 e1 e7 68 |.>....h|" +orderer0.example.com | "2019-09-24 00:25:04.389 UTC [cauthdsl] func2 -> DEBU 93f 0xc0008ec490 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:25:04.389 UTC [cauthdsl] func1 -> DEBU 940 0xc0008ec490 gate 1569284704388870000 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:25:04.389 UTC [policies] Evaluate -> DEBU 941 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:04.389 UTC [policies] Evaluate -> DEBU 942 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [policies] Evaluate -> DEBU 943 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [policies] Evaluate -> DEBU 944 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [policies] Evaluate -> DEBU 945 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [policies] Evaluate -> DEBU 946 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [orderer.common.msgprocessor] Apply -> DEBU 947 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [common.channelconfig] NewStandardValues -> DEBU 948 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 949 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94a Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94b Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94c Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94d Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [common.channelconfig] NewStandardValues -> DEBU 94e Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94f Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 950 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 951 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 952 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:25:04.391 UTC [common.channelconfig] initializeProtosStruct -> DEBU 953 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:25:04.391 UTC [common.channelconfig] initializeProtosStruct -> DEBU 954 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.391 UTC [common.channelconfig] NewStandardValues -> DEBU 955 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-09-24 00:25:05.046 UTC [gossip.comm] authenticateRemotePeer -> DEBU 73f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:43244" +peer0.org1.example.com | "2019-09-24 00:25:05.047 UTC [gossip.comm] authenticateRemotePeer -> DEBU 740 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:43244" +peer0.org1.example.com | "2019-09-24 00:25:05.047 UTC [msp] DeserializeIdentity -> DEBU 741 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 742 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:05.047 UTC [msp] DeserializeIdentity -> DEBU 743 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 744 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:05.047 UTC [msp] DeserializeIdentity -> DEBU 745 Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:04.391 UTC [common.channelconfig] initializeProtosStruct -> DEBU 956 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:25:04.391 UTC [common.channelconfig] NewStandardValues -> DEBU 957 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:04.391 UTC [common.channelconfig] initializeProtosStruct -> DEBU 958 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:04.391 UTC [common.channelconfig] validateMSP -> DEBU 959 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.391 UTC [msp] newBccspMsp -> DEBU 95a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.391 UTC [msp] New -> DEBU 95b Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.392 UTC [msp] Setup -> DEBU 95c Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:25:04.393 UTC [msp.identity] newIdentity -> DEBU 95d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.394 UTC [msp.identity] newIdentity -> DEBU 95e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.395 UTC [msp] Validate -> DEBU 95f MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:25:04.395 UTC [common.channelconfig] NewStandardValues -> DEBU 960 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:25:04.395 UTC [common.channelconfig] initializeProtosStruct -> DEBU 961 Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:25:04.395 UTC [common.channelconfig] initializeProtosStruct -> DEBU 962 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.395 UTC [common.channelconfig] NewStandardValues -> DEBU 963 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:04.395 UTC [common.channelconfig] initializeProtosStruct -> DEBU 964 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.395 UTC [common.channelconfig] NewStandardValues -> DEBU 965 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:04.395 UTC [common.channelconfig] initializeProtosStruct -> DEBU 966 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:04.395 UTC [common.channelconfig] Validate -> DEBU 967 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:25:04.395 UTC [common.channelconfig] validateMSP -> DEBU 968 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.395 UTC [msp] newBccspMsp -> DEBU 969 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.396 UTC [msp] New -> DEBU 96a Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.396 UTC [msp] Setup -> DEBU 96b Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.396 UTC [msp.identity] newIdentity -> DEBU 96c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.397 UTC [msp.identity] newIdentity -> DEBU 96d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.398 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 96e Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.398 UTC [msp] Validate -> DEBU 96f MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:04.398 UTC [msp] getCertificationChain -> DEBU 970 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.398 UTC [msp] hasOURole -> DEBU 971 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:04.398 UTC [msp] getCertificationChain -> DEBU 972 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.400 UTC [common.channelconfig] NewStandardValues -> DEBU 973 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:04.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 974 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:25:05.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 746 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:05.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 747 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:05.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 748 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:05.047 UTC [policies] Evaluate -> DEBU 749 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [policies] Evaluate -> DEBU 74a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [policies] Evaluate -> DEBU 74b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [cauthdsl] func1 -> DEBU 74c 0xc00381e2c0 gate 1569284705048129800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 74d 0xc00381e2c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 74e 0xc00381e2c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 74f 0xc00381e2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 750 0xc00381e2c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [cauthdsl] func1 -> DEBU 751 0xc00381e2c0 gate 1569284705048129800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [policies] Evaluate -> DEBU 752 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [policies] Evaluate -> DEBU 753 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [policies] Evaluate -> DEBU 754 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [cauthdsl] func1 -> DEBU 755 0xc00381eb00 gate 1569284705048532800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 756 0xc00381eb00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 757 0xc00381eb00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:05.049 UTC [cauthdsl] func2 -> DEBU 758 0xc00381eb00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:05.049 UTC [msp.identity] Verify -> DEBU 759 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-09-24 00:25:05.049 UTC [msp.identity] Verify -> DEBU 75a Verify: sig = 00000000 30 45 02 21 00 9b b1 f8 1f 47 2e 92 0f 69 51 51 |0E.!.....G...iQQ| +peer0.org1.example.com | 00000010 c7 f5 25 e4 a0 74 39 f3 3e a7 72 2e 92 77 1a 53 |..%..t9.>.r..w.S| +peer0.org1.example.com | 00000020 69 d7 33 21 73 02 20 72 46 a1 ae 0a b0 cf 58 e3 |i.3!s. rF.....X.| +peer0.org1.example.com | 00000030 8c 9d 5e c3 99 b9 2c 3c 20 74 5c ba ed e7 c7 16 |..^...,< t\.....| +peer0.org1.example.com | 00000040 60 b3 a2 c6 1c 90 e0 |`......|" +peer0.org1.example.com | "2019-09-24 00:25:05.049 UTC [cauthdsl] func2 -> DEBU 75b 0xc00381eb00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:05.049 UTC [cauthdsl] func1 -> DEBU 75c 0xc00381eb00 gate 1569284705048532800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:05.049 UTC [policies] Evaluate -> DEBU 75d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.049 UTC [policies] Evaluate -> DEBU 75e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.049 UTC [policies] Evaluate -> DEBU 75f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.064 UTC [policies] Evaluate -> DEBU 760 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.064 UTC [gossip.comm] authenticateRemotePeer -> DEBU 761 Authenticated 172.18.0.6:43244" +peer0.org1.example.com | "2019-09-24 00:25:05.064 UTC [gossip.comm] GossipStream -> DEBU 762 Servicing 172.18.0.6:43244" +peer0.org1.example.com | "2019-09-24 00:25:05.065 UTC [gossip.gossip] handleMessage -> DEBU 763 Entering, 172.18.0.6:43244 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:1569254619026009100 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.065 UTC [gossip.gossip] handleMessage -> DEBU 764 Exiting" +orderer0.example.com | "2019-09-24 00:25:04.400 UTC [common.channelconfig] NewStandardValues -> DEBU 975 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:04.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 976 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:04.401 UTC [common.channelconfig] Validate -> DEBU 977 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 00:25:04.401 UTC [common.channelconfig] validateMSP -> DEBU 978 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.401 UTC [msp] newBccspMsp -> DEBU 979 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.401 UTC [msp] New -> DEBU 97a Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.401 UTC [msp] Setup -> DEBU 97b Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.403 UTC [msp.identity] newIdentity -> DEBU 97c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.405 UTC [msp.identity] newIdentity -> DEBU 97d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.408 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 97e Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.408 UTC [msp] Validate -> DEBU 97f MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:04.408 UTC [msp] getCertificationChain -> DEBU 980 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.409 UTC [msp] hasOURole -> DEBU 981 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:04.409 UTC [msp] getCertificationChain -> DEBU 982 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.409 UTC [msp] Setup -> DEBU 983 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:25:04.409 UTC [msp] Setup -> DEBU 984 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:25:04.409 UTC [policies] NewManagerImpl -> DEBU 985 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.409 UTC [policies] NewManagerImpl -> DEBU 986 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.409 UTC [policies] NewManagerImpl -> DEBU 987 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 988 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 989 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98a Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98b Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98c Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98d Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98e Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98f Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 990 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 991 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 992 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 993 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 994 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 995 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 996 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 997 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 998 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 999 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:25:04.411 UTC [policies] NewManagerImpl -> DEBU 99a Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:25:04.411 UTC [policies] NewManagerImpl -> DEBU 99b Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 99c Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 99d Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 99e Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 99f Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 9a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 9a1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 9a2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.413 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.413 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.413 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:04.413 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9bb Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9bc Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:25:04.418 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:04.418 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:04.418 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:25:04.418 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:04.418 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:04.418 UTC [orderer.consensus.etcdraft] propose -> INFO 9c9 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:25:04.418 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 9ca Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:25:04.418 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 9cb [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:60686" +orderer0.example.com | "2019-09-24 00:25:04.419 UTC [orderer.consensus.etcdraft] 2 -> DEBU 9cc Proposed block [1] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:25:04.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9cd Sending msg of 22816 bytes to 3 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-09-24 00:25:04.430 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9ce Sending msg of 22816 bytes to 2 on channel businesschannel took 22.5µs" +orderer0.example.com | "2019-09-24 00:25:04.430 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9cf Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer1.example.com(orderer1.example.com:7050) took 109µs " +orderer0.example.com | "2019-09-24 00:25:04.430 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9d0 Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer2.example.com(orderer2.example.com:7050) took 87µs " +orderer0.example.com | "2019-09-24 00:25:04.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9d1 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:04.440 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9d2 Sending msg of 28 bytes to 2 on channel businesschannel took 41.8µs" +orderer0.example.com | "2019-09-24 00:25:04.440 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9d3 Sending msg of 28 bytes to 3 on channel businesschannel took 44.5µs" +orderer0.example.com | "2019-09-24 00:25:04.440 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.8µs " +orderer0.example.com | "2019-09-24 00:25:04.440 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 9d5 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9d6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9d7 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9d8 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9d9 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9da Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:25:05.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 765 Got message: GossipMessage: nonce:1569254619026009100 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.065 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 766 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:05.065 UTC [msp] DeserializeIdentity -> DEBU 767 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.070 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 768 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:05.070 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 769 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:05.070 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 76a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:05.070 UTC [policies] Evaluate -> DEBU 76b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.070 UTC [policies] Evaluate -> DEBU 76c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:05.070 UTC [policies] Evaluate -> DEBU 76d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.070 UTC [cauthdsl] func1 -> DEBU 76e 0xc0038347e0 gate 1569284705070842700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:05.070 UTC [cauthdsl] func2 -> DEBU 76f 0xc0038347e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:05.070 UTC [cauthdsl] func2 -> DEBU 770 0xc0038347e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [cauthdsl] func2 -> DEBU 771 0xc0038347e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [cauthdsl] func2 -> DEBU 772 0xc0038347e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [cauthdsl] func1 -> DEBU 773 0xc0038347e0 gate 1569284705070842700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [policies] Evaluate -> DEBU 774 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [policies] Evaluate -> DEBU 775 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [policies] Evaluate -> DEBU 776 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [cauthdsl] func1 -> DEBU 777 0xc003835020 gate 1569284705071395100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [cauthdsl] func2 -> DEBU 778 0xc003835020 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [cauthdsl] func2 -> DEBU 779 0xc003835020 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [cauthdsl] func2 -> DEBU 77a 0xc003835020 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [msp.identity] Verify -> DEBU 77b Verify: digest = 00000000 0c 55 88 a7 a2 70 4b 57 b5 be e8 6d d3 36 8d c2 |.U...pKW...m.6..| +peer0.org1.example.com | 00000010 8c cc 57 99 9e 38 5d 46 ee c8 b4 a8 bd 5d 11 e5 |..W..8]F.....]..|" +peer0.org1.example.com | "2019-09-24 00:25:05.071 UTC [msp.identity] Verify -> DEBU 77c Verify: sig = 00000000 30 44 02 20 16 bb 38 80 e7 44 7a 22 f1 4b 2f ee |0D. ..8..Dz".K/.| +peer0.org1.example.com | 00000010 11 21 28 e2 60 0c 2b 72 7a c6 89 ec de 14 ed ea |.!(.`.+rz.......| +peer0.org1.example.com | 00000020 7f c9 63 fc 02 20 4c c8 cf 93 c1 0d 93 bc 5f a2 |..c.. L......._.| +peer0.org1.example.com | 00000030 9a 20 80 d7 33 33 44 98 23 31 e8 b3 96 0e 7d 5d |. ..33D.#1....}]| +peer0.org1.example.com | 00000040 3f d9 f0 80 bb 01 |?.....|" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [cauthdsl] func2 -> DEBU 77d 0xc003835020 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [cauthdsl] func1 -> DEBU 77e 0xc003835020 gate 1569284705071395100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [policies] Evaluate -> DEBU 77f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [policies] Evaluate -> DEBU 780 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [policies] Evaluate -> DEBU 781 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [policies] Evaluate -> DEBU 782 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [gossip.discovery] handleAliveMessage -> DEBU 783 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9db Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9dc Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9dd Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9de Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9df Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e0 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e1 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] verifyDeltaSet -> DEBU 9e7 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] verifyDeltaSet -> DEBU 9e8 Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [common.configtx] policyForItem -> DEBU 9e9 Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2019-09-24 00:25:04.441 UTC [policies] Manager -> DEBU 9ea Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9eb Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9ec Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9ed Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9ee Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9ef Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9f0 Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9f1 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9f2 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9f3 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [policies] Evaluate -> DEBU 9f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [cauthdsl] func1 -> DEBU 9f5 0xc000f35a00 gate 1569284704442547200 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [cauthdsl] func2 -> DEBU 9f6 0xc000f35a00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [cauthdsl] func2 -> DEBU 9f7 0xc000f35a00 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [cauthdsl] func2 -> DEBU 9f8 0xc000f35a00 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:25:04.442 UTC [msp.identity] Verify -> DEBU 9f9 Verify: digest = 00000000 1c cd 68 b8 33 39 c3 f7 d8 bf 6f 21 20 3c 57 2b |..h.39....o! DEBU 9fa Verify: sig = 00000000 30 44 02 20 3f 2d 41 bf df 48 de ab 3b 9f f2 6a |0D. ?-A..H..;..j| +orderer0.example.com | 00000010 1c b4 f9 16 f1 15 f3 9b 4e 9f 15 e8 29 65 8f 9b |........N...)e..| +orderer0.example.com | 00000020 87 2f 31 cd 02 20 40 64 26 9c 61 b6 4b 3f 60 9d |./1.. @d&.a.K?`.| +orderer0.example.com | 00000030 b0 4f 81 19 be bf 2f 49 3d 39 ca e7 6a cb ce 8c |.O..../I=9..j...| +orderer0.example.com | 00000040 db 89 e6 d0 87 84 |......|" +orderer0.example.com | "2019-09-24 00:25:04.443 UTC [cauthdsl] func2 -> DEBU 9fb 0xc000f35a00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:25:04.443 UTC [cauthdsl] func1 -> DEBU 9fc 0xc000f35a00 gate 1569284704442547200 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:25:04.443 UTC [policies] Evaluate -> DEBU 9fd Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.443 UTC [policies] Evaluate -> DEBU 9fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.460 UTC [common.deliver] Handle -> WARN 9ff Error reading from 172.18.0.9:60684: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:25:04.460 UTC [orderer.common.server] func1 -> DEBU a00 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:25:04.460 UTC [comm.grpc.server] 1 -> INFO a01 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60684 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=156.728ms +orderer0.example.com | "2019-09-24 00:25:04.460 UTC [orderer.common.broadcast] Handle -> WARN a02 Error reading from 172.18.0.9:60686: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:25:04.460 UTC [orderer.common.server] func1 -> DEBU a03 Closing Broadcast stream" +orderer0.example.com | "2019-09-24 00:25:04.460 UTC [comm.grpc.server] 1 -> INFO a04 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:60686 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=100.5856ms +orderer0.example.com | "2019-09-24 00:25:04.467 UTC [grpc] infof -> DEBU a05 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:25:04.467 UTC [grpc] infof -> DEBU a06 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:25:04.467 UTC [orderer.common.cluster.step] handleMessage -> DEBU a07 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:04.467 UTC [orderer.common.cluster.step] handleMessage -> DEBU a08 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [orderer.common.cluster.step] sendMessage -> DEBU a09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.7µs " +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0a Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [gossip.discovery] learnNewMembers -> DEBU 784 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [gossip.discovery] learnNewMembers -> DEBU 785 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [gossip.discovery] learnNewMembers -> DEBU 786 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [gossip.discovery] handleAliveMessage -> DEBU 787 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [gossip.discovery] handleMsgFromComm -> DEBU 788 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [gossip.discovery] sendMemResponse -> DEBU 789 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:05.072 UTC [msp] DeserializeIdentity -> DEBU 78a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.073 UTC [msp] DeserializeIdentity -> DEBU 78b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.073 UTC [msp] DeserializeIdentity -> DEBU 78c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.073 UTC [gossip.comm] Send -> DEBU 78d Entering, sending GossipMessage: Channel: , nonce: 1569254619026009100, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:05.073 UTC [gossip.discovery] sendMemResponse -> DEBU 78e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\016" signature:"0E\002!\000\355\335\025g\304\230 \352\323\330\327\037\346\264\344Y\302\270p\207\353\375]d\332\2359+M\221b\330\002 #\036\023\201\3236V\377\344&Y0\275\032CU\275\035\223'\2661\311\235\225\004\316\026r\333\242\212" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:05.073 UTC [gossip.comm] sendToEndpoint -> DEBU 78f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1569254619026009100, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.073 UTC [gossip.comm] sendToEndpoint -> DEBU 790 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.211 UTC [gossip.gossip] handleMessage -> DEBU 791 Entering, 172.18.0.6:43244 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.211 UTC [msp] DeserializeIdentity -> DEBU 792 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.211 UTC [gossip.gossip] handleMessage -> DEBU 793 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.218 UTC [gossip.gossip] handleMessage -> DEBU 794 Entering, 172.18.0.6:43244 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.218 UTC [msp] DeserializeIdentity -> DEBU 795 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.218 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 796 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:05.218 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 797 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 798 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 799 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a10 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a11 Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a12 Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a13 Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a14 Setting policy for key Endorsement to " +orderer0.example.com | "2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a15 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a16 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a17 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a18 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a19 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1c Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1d Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a20 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] NewStandardValues -> DEBU a21 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a22 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a23 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a24 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a25 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a26 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] NewStandardValues -> DEBU a27 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a28 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a29 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a2a Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a2b Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a2c Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a2d Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] NewStandardValues -> DEBU a2e Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a2f Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] NewStandardValues -> DEBU a30 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a31 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:04.470 UTC [common.channelconfig] validateMSP -> DEBU a32 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.489 UTC [msp] newBccspMsp -> DEBU a35 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.489 UTC [msp] New -> DEBU a36 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.489 UTC [msp] Setup -> DEBU a37 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:25:04.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a33 Sending msg of 28 bytes to 2 on channel businesschannel took 34.8µs" +orderer0.example.com | "2019-09-24 00:25:04.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a38 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 79a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 79b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [cauthdsl] func1 -> DEBU 79c 0xc0037fbb10 gate 1569284705219202300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 79d 0xc0037fbb10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 79e 0xc0037fbb10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 79f 0xc0037fbb10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 7a0 0xc0037fbb10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [cauthdsl] func1 -> DEBU 7a1 0xc0037fbb10 gate 1569284705219202300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 7a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 7a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 7a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [cauthdsl] func1 -> DEBU 7a5 0xc003864350 gate 1569284705219793900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 7a6 0xc003864350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 7a7 0xc003864350 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 7a8 0xc003864350 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:05.219 UTC [msp.identity] Verify -> DEBU 7a9 Verify: digest = 00000000 8c 64 c2 57 71 bd 4e 49 a7 31 6f ab 28 9e 18 d2 |.d.Wq.NI.1o.(...| +peer0.org1.example.com | 00000010 06 d1 b5 0f ad 29 54 78 1c 78 c0 ee fd c4 2a f0 |.....)Tx.x....*.|" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [msp.identity] Verify -> DEBU 7aa Verify: sig = 00000000 30 44 02 20 55 e6 9d 11 11 3c 57 86 20 a6 39 ad |0D. U.... DEBU 7ab 0xc003864350 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [cauthdsl] func1 -> DEBU 7ac 0xc003864350 gate 1569284705219793900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7af Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [msp] DeserializeIdentity -> DEBU 7b1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [msp] DeserializeIdentity -> DEBU 7b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [cauthdsl] func1 -> DEBU 7b8 0xc003865530 gate 1569284705221019900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7b9 0xc003865530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7ba 0xc003865530 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7bb 0xc003865530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7bc 0xc003865530 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [cauthdsl] func1 -> DEBU 7bd 0xc003865530 gate 1569284705221019900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [policies] Evaluate -> DEBU 7be Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [policies] Evaluate -> DEBU 7bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [policies] Evaluate -> DEBU 7c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [cauthdsl] func1 -> DEBU 7c1 0xc003865d70 gate 1569284705221520000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7c2 0xc003865d70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7c3 0xc003865d70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7c4 0xc003865d70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [msp.identity] Verify -> DEBU 7c5 Verify: digest = 00000000 8c 64 c2 57 71 bd 4e 49 a7 31 6f ab 28 9e 18 d2 |.d.Wq.NI.1o.(...| +peer0.org1.example.com | 00000010 06 d1 b5 0f ad 29 54 78 1c 78 c0 ee fd c4 2a f0 |.....)Tx.x....*.|" +peer0.org1.example.com | "2019-09-24 00:25:05.221 UTC [msp.identity] Verify -> DEBU 7c6 Verify: sig = 00000000 30 44 02 20 55 e6 9d 11 11 3c 57 86 20 a6 39 ad |0D. U.... DEBU 7c7 0xc003865d70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:05.222 UTC [cauthdsl] func1 -> DEBU 7c8 0xc003865d70 gate 1569284705221520000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:05.222 UTC [policies] Evaluate -> DEBU 7c9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.222 UTC [policies] Evaluate -> DEBU 7ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.490 UTC [msp.identity] newIdentity -> DEBU a39 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU a3a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 500.5µs " +orderer0.example.com | "2019-09-24 00:25:04.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU a34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 349.9µs " +orderer0.example.com | "2019-09-24 00:25:04.490 UTC [msp.identity] newIdentity -> DEBU a3b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU a3c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:04.491 UTC [msp] Validate -> DEBU a3d MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:25:04.492 UTC [common.channelconfig] NewStandardValues -> DEBU a3e Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:25:04.492 UTC [common.channelconfig] initializeProtosStruct -> DEBU a3f Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:25:04.492 UTC [common.channelconfig] initializeProtosStruct -> DEBU a40 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.492 UTC [common.channelconfig] NewStandardValues -> DEBU a41 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:04.493 UTC [common.channelconfig] initializeProtosStruct -> DEBU a42 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.493 UTC [common.channelconfig] NewStandardValues -> DEBU a44 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:04.493 UTC [common.channelconfig] initializeProtosStruct -> DEBU a45 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:04.493 UTC [common.channelconfig] Validate -> DEBU a46 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 00:25:04.493 UTC [common.channelconfig] validateMSP -> DEBU a47 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.493 UTC [msp] newBccspMsp -> DEBU a48 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.493 UTC [msp] New -> DEBU a49 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.493 UTC [msp] Setup -> DEBU a4a Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.494 UTC [msp.identity] newIdentity -> DEBU a4b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.495 UTC [msp.identity] newIdentity -> DEBU a4c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | "2019-09-24 00:25:05.222 UTC [policies] Evaluate -> DEBU 7cb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.222 UTC [policies] Evaluate -> DEBU 7cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.222 UTC [gossip.gossip] handleMessage -> DEBU 7cd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.227 UTC [msp] DeserializeIdentity -> DEBU 7ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.227 UTC [msp] DeserializeIdentity -> DEBU 7cf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.227 UTC [gossip.comm] Send -> DEBU 7d0 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" +peer0.org1.example.com | "2019-09-24 00:25:05.227 UTC [msp] DeserializeIdentity -> DEBU 7d1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.227 UTC [msp] DeserializeIdentity -> DEBU 7d2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.227 UTC [gossip.comm] sendToEndpoint -> DEBU 7d3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.227 UTC [gossip.comm] createConnection -> DEBU 7d4 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:05.228 UTC [gossip.comm] sendToEndpoint -> DEBU 7d5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.228 UTC [gossip.comm] sendToEndpoint -> DEBU 7d6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.230 UTC [grpc] DialContext -> DEBU 7d7 parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:25:05.230 UTC [grpc] DialContext -> DEBU 7d8 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:25:05.230 UTC [grpc] watcher -> DEBU 7d9 ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 00:25:05.230 UTC [grpc] switchBalancer -> DEBU 7da ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:25:05.230 UTC [grpc] HandleSubConnStateChange -> DEBU 7db pickfirstBalancer: HandleSubConnStateChange: 0xc0038aa1d0, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:25:05.264 UTC [grpc] HandleSubConnStateChange -> DEBU 7dc pickfirstBalancer: HandleSubConnStateChange: 0xc0038aa1d0, READY" +peer0.org1.example.com | "2019-09-24 00:25:05.266 UTC [msp] GetDefaultSigningIdentity -> DEBU 7dd Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:05.266 UTC [msp.identity] Sign -> DEBU 7de Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:05.266 UTC [msp.identity] Sign -> DEBU 7df Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:05.266 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7e0 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051" +peer0.org1.example.com | "2019-09-24 00:25:05.269 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7e1 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:7051" +peer0.org1.example.com | "2019-09-24 00:25:05.270 UTC [msp.identity] Verify -> DEBU 7e2 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-09-24 00:25:05.270 UTC [msp.identity] Verify -> DEBU 7e3 Verify: sig = 00000000 30 44 02 20 2f 0c d1 d3 5e ca 97 8b 9a 5e cb 0f |0D. /...^....^..| +peer0.org1.example.com | 00000010 f5 59 0e 75 03 4a 9a ee c2 13 27 c6 ad 95 66 71 |.Y.u.J....'...fq| +peer0.org1.example.com | 00000020 da 5c d1 75 02 20 5c 4b 42 6b 70 82 6c d8 4c e9 |.\.u. \KBkp.l.L.| +peer0.org1.example.com | 00000030 61 3a 0e 66 47 2a 09 a0 ce 72 cf 6e 27 5e b8 d2 |a:.fG*...r.n'^..| +peer0.org1.example.com | 00000040 d6 1b ad 7b 2a 09 |...{*.|" +peer0.org1.example.com | "2019-09-24 00:25:05.270 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7e4 Authenticated 172.18.0.5:7051" +peer0.org1.example.com | "2019-09-24 00:25:05.270 UTC [gossip.comm] createConnection -> DEBU 7e5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.270 UTC [gossip.comm] sendToEndpoint -> DEBU 7e6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.270 UTC [grpc] infof -> DEBU 7e7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:05.657 UTC [gossip.gossip] handleMessage -> DEBU 7e8 Entering, 172.18.0.8:34556 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.657 UTC [gossip.gossip] handleMessage -> DEBU 7e9 Exiting" +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU a43 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:04.496 UTC [orderer.common.cluster.step] handleMessage -> DEBU a4d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:04.506 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a4e Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.506 UTC [msp] Validate -> DEBU a4f MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:04.507 UTC [msp] getCertificationChain -> DEBU a50 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.515 UTC [msp] hasOURole -> DEBU a51 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:04.515 UTC [msp] getCertificationChain -> DEBU a52 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.516 UTC [common.channelconfig] NewStandardValues -> DEBU a53 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:04.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU a54 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.516 UTC [common.channelconfig] NewStandardValues -> DEBU a55 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:25:05.657 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7ea Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.657 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7eb Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:05.658 UTC [msp] DeserializeIdentity -> DEBU 7ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.658 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:05.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7ee Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:05.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7ef Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:05.658 UTC [policies] Evaluate -> DEBU 7f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.658 UTC [policies] Evaluate -> DEBU 7f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:05.658 UTC [policies] Evaluate -> DEBU 7f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.658 UTC [cauthdsl] func1 -> DEBU 7f3 0xc003843b80 gate 1569284705658748200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:05.658 UTC [cauthdsl] func2 -> DEBU 7f4 0xc003843b80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:05.658 UTC [cauthdsl] func2 -> DEBU 7f5 0xc003843b80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [cauthdsl] func2 -> DEBU 7f6 0xc003843b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [cauthdsl] func2 -> DEBU 7f7 0xc003843b80 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [cauthdsl] func1 -> DEBU 7f8 0xc003843b80 gate 1569284705658748200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [policies] Evaluate -> DEBU 7f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [policies] Evaluate -> DEBU 7fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [policies] Evaluate -> DEBU 7fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [cauthdsl] func1 -> DEBU 7fc 0xc0039183c0 gate 1569284705659392600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [cauthdsl] func2 -> DEBU 7fd 0xc0039183c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [cauthdsl] func2 -> DEBU 7fe 0xc0039183c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [cauthdsl] func2 -> DEBU 7ff 0xc0039183c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [msp.identity] Verify -> DEBU 800 Verify: digest = 00000000 24 a1 d8 94 01 f0 41 dd e4 3e 0c 5b 3d c8 8e dc |$.....A..>.[=...| +peer0.org1.example.com | 00000010 9c c4 05 6e 6d ba d0 67 9c cc 7e e3 0f 3f 45 93 |...nm..g..~..?E.|" +peer0.org1.example.com | "2019-09-24 00:25:05.659 UTC [msp.identity] Verify -> DEBU 801 Verify: sig = 00000000 30 44 02 20 12 3b 60 6c c1 2d 39 57 39 1f 03 47 |0D. .;`l.-9W9..G| +peer0.org1.example.com | 00000010 93 88 28 27 b5 ac d6 5a 4b 7f fa 78 87 87 2d 4c |..('...ZK..x..-L| +peer0.org1.example.com | 00000020 cc 98 17 ce 02 20 0c ed 3e 3b c7 07 d5 16 6b a3 |..... ..>;....k.| +peer0.org1.example.com | 00000030 b8 00 e1 32 ba f4 e9 8d 58 8c e0 f1 22 fc d9 b1 |...2....X..."...| +peer0.org1.example.com | 00000040 03 c3 ea 96 dd 27 |.....'|" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [cauthdsl] func2 -> DEBU 802 0xc0039183c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [cauthdsl] func1 -> DEBU 803 0xc0039183c0 gate 1569284705659392600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [policies] Evaluate -> DEBU 804 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [policies] Evaluate -> DEBU 805 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [policies] Evaluate -> DEBU 806 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [policies] Evaluate -> DEBU 807 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [gossip.discovery] handleAliveMessage -> DEBU 808 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 809 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 80a updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 80b Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 80c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 80d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [gossip.discovery] handleAliveMessage -> DEBU 80e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.660 UTC [gossip.discovery] handleMsgFromComm -> DEBU 80f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.665 UTC [msp] DeserializeIdentity -> DEBU 810 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 811 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 812 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 813 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 814 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 815 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 816 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.666 UTC [gossip.comm] Send -> DEBU 817 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 818 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.666 UTC [gossip.comm] Send -> DEBU 819 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:05.667 UTC [gossip.comm] sendToEndpoint -> DEBU 81a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.667 UTC [gossip.comm] sendToEndpoint -> DEBU 81b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.667 UTC [gossip.comm] sendToEndpoint -> DEBU 81c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.667 UTC [gossip.comm] sendToEndpoint -> DEBU 81d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.704 UTC [gossip.comm] func1 -> DEBU 81e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.704 UTC [gossip.gossip] handleMessage -> DEBU 81f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.704 UTC [gossip.pull] HandleMessage -> DEBU 820 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.704 UTC [gossip.pull] SendDigest -> DEBU 821 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:05.704 UTC [gossip.gossip] handleMessage -> DEBU 822 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.721 UTC [gossip.comm] func1 -> DEBU 823 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\022" signature:"0D\002 \032\017-\336\265\302z\337`\362\2674IA#X\226\342\300\301\224TV\353\013\275o\354\354Jx&\002 s\030\363\301\035\2575CH\216\022MW\236/\206\221\272A\2107\342\235\366\202\021\255\206\350P\034s" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.721 UTC [gossip.gossip] handleMessage -> DEBU 824 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\022" signature:"0D\002 \032\017-\336\265\302z\337`\362\2674IA#X\226\342\300\301\224TV\353\013\275o\354\354Jx&\002 s\030\363\301\035\2575CH\216\022MW\236/\206\221\272A\2107\342\235\366\202\021\255\206\350P\034s" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.721 UTC [gossip.gossip] handleMessage -> DEBU 825 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.721 UTC [gossip.discovery] handleMsgFromComm -> DEBU 826 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\022" signature:"0D\002 \032\017-\336\265\302z\337`\362\2674IA#X\226\342\300\301\224TV\353\013\275o\354\354Jx&\002 s\030\363\301\035\2575CH\216\022MW\236/\206\221\272A\2107\342\235\366\202\021\255\206\350P\034s" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 00:25:04.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU a56 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:04.543 UTC [common.channelconfig] Validate -> DEBU a57 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:25:04.545 UTC [common.channelconfig] validateMSP -> DEBU a58 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.546 UTC [msp] newBccspMsp -> DEBU a59 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.554 UTC [msp] New -> DEBU a5a Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:04.554 UTC [msp] Setup -> DEBU a5b Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.555 UTC [msp.identity] newIdentity -> DEBU a5c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.564 UTC [msp.identity] newIdentity -> DEBU a5d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.565 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a5e Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.565 UTC [msp] Validate -> DEBU a5f MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:04.565 UTC [msp] getCertificationChain -> DEBU a60 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.565 UTC [msp] hasOURole -> DEBU a61 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:04.565 UTC [msp] getCertificationChain -> DEBU a62 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.569 UTC [msp] Setup -> DEBU a63 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [msp] Setup -> DEBU a64 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a65 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a66 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a67 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a68 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a69 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6a Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6c Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6d Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6e Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6f Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a70 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a71 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a72 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a73 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a74 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a75 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a76 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a77 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a78 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a79 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a7a Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a7b Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [common.configtx] addToMap -> DEBU a7c Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:04.571 UTC [common.configtx] addToMap -> DEBU a7d Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a7e Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a7f Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a80 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a81 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a82 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a83 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 00:25:05.722 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 827 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:05.722 UTC [msp.identity] Verify -> DEBU 828 Verify: digest = 00000000 0b e9 99 e7 7f e9 32 4e 20 11 0d 53 cd 08 f2 d4 |......2N ..S....| +peer0.org1.example.com | 00000010 34 cc 17 b1 52 1b af f9 1b 92 65 9e f9 84 d1 a2 |4...R.....e.....|" +peer0.org1.example.com | "2019-09-24 00:25:05.722 UTC [msp.identity] Verify -> DEBU 829 Verify: sig = 00000000 30 44 02 20 1a 0f 2d de b5 c2 7a df 60 f2 b7 34 |0D. ..-...z.`..4| +peer0.org1.example.com | 00000010 49 41 23 58 96 e2 c0 c1 94 54 56 eb 0b bd 6f ec |IA#X.....TV...o.| +peer0.org1.example.com | 00000020 ec 4a 78 26 02 20 73 18 f3 c1 1d af 35 43 48 8e |.Jx&. s.....5CH.| +peer0.org1.example.com | 00000030 12 4d 57 9e 2f 86 91 ba 41 88 37 e2 9d f6 82 11 |.MW./...A.7.....| +peer0.org1.example.com | 00000040 ad 86 e8 50 1c 73 |...P.s|" +peer0.org1.example.com | "2019-09-24 00:25:05.723 UTC [msp.identity] Verify -> DEBU 82a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:05.723 UTC [msp.identity] Verify -> DEBU 82b Verify: sig = 00000000 30 44 02 20 22 92 8f e7 bb b4 26 28 98 10 c6 38 |0D. ".....&(...8| +peer0.org1.example.com | 00000010 05 31 5e c9 88 af 17 86 68 2c 4c 4e d8 b9 01 02 |.1^.....h,LN....| +peer0.org1.example.com | 00000020 60 6e 8b 31 02 20 5b 2d af 75 4e c2 a4 9f 04 76 |`n.1. [-.uN....v| +peer0.org1.example.com | 00000030 9f 94 66 8d 6e 70 9e 37 54 2d ce 74 d1 89 55 ff |..f.np.7T-.t..U.| +peer0.org1.example.com | 00000040 f3 90 79 56 38 35 |..yV85|" +peer0.org1.example.com | "2019-09-24 00:25:05.723 UTC [gossip.discovery] handleAliveMessage -> DEBU 82c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 82d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:05.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 82e updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:05.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 82f Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:05.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 830 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:05.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 831 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.723 UTC [gossip.discovery] handleAliveMessage -> DEBU 832 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.724 UTC [gossip.discovery] handleMsgFromComm -> DEBU 833 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.725 UTC [gossip.discovery] sendMemResponse -> DEBU 834 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:05.725 UTC [msp] DeserializeIdentity -> DEBU 835 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.725 UTC [msp] DeserializeIdentity -> DEBU 836 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:05.725 UTC [gossip.comm] Send -> DEBU 837 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:05.726 UTC [gossip.comm] sendToEndpoint -> DEBU 838 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:05.726 UTC [gossip.comm] sendToEndpoint -> DEBU 839 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:05.726 UTC [gossip.discovery] sendMemResponse -> DEBU 83a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\022" signature:"0D\002 \032\017-\336\265\302z\337`\362\2674IA#X\226\342\300\301\224TV\353\013\275o\354\354Jx&\002 s\030\363\301\035\2575CH\216\022MW\236/\206\221\272A\2107\342\235\366\202\021\255\206\350P\034s" secret_envelope: > alive: > " +peer0.org1.example.com | "2019-09-24 00:25:06.146 UTC [gossip.gossip] handleMessage -> DEBU 83b Entering, 172.18.0.8:34556 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:06.146 UTC [msp] DeserializeIdentity -> DEBU 83c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:06.146 UTC [msp] DeserializeIdentity -> DEBU 83d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:06.146 UTC [gossip.gossip] handleMessage -> DEBU 83e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:06.150 UTC [gossip.gossip] handleMessage -> DEBU 83f Entering, 172.18.0.8:34556 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:06.151 UTC [msp] DeserializeIdentity -> DEBU 840 Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a84 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a85 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a86 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a87 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a88 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a89 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8a Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8b Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8c Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8d Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a90 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a91 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a92 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a93 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a94 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a95 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a96 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a97 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a98 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a99 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a9a Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a9b Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a9c Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a9d Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a9e Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:25:04.582 UTC [common.configtx] addToMap -> DEBU a9f Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:25:04.582 UTC [common.configtx] addToMap -> DEBU aa0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:25:04.582 UTC [common.configtx] addToMap -> DEBU aa1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:04.582 UTC [common.configtx] addToMap -> DEBU aa2 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:04.582 UTC [common.configtx] addToMap -> DEBU aa3 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [common.configtx] addToMap -> DEBU aa4 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [common.configtx] addToMap -> DEBU aa5 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [common.configtx] addToMap -> DEBU aa6 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [common.configtx] addToMap -> DEBU aa7 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [common.configtx] addToMap -> DEBU aa8 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [common.channelconfig] LogSanityChecks -> DEBU aa9 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [common.channelconfig] LogSanityChecks -> DEBU aaa As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [policies] Manager -> DEBU aab Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [policies] Manager -> DEBU aac Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [policies] Manager -> DEBU aad Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [policies] Manager -> DEBU aae Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:25:04.583 UTC [policies] Manager -> DEBU aaf Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab0 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.585 UTC [common.channelconfig] LogSanityChecks -> DEBU ab1 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 00:25:04.585 UTC [common.channelconfig] LogSanityChecks -> DEBU ab2 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 00:25:04.585 UTC [common.channelconfig] LogSanityChecks -> DEBU ab3 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab4 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab5 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab6 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab7 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab8 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:04.586 UTC [common.channelconfig] LogSanityChecks -> DEBU ab9 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 00:25:04.595 UTC [common.channelconfig] LogSanityChecks -> DEBU aba As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 00:25:04.595 UTC [common.channelconfig] LogSanityChecks -> DEBU abb As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | "2019-09-24 00:25:06.151 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 841 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:06.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 842 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 843 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 844 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 845 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 846 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [cauthdsl] func1 -> DEBU 847 0xc00396a380 gate 1569284706152243800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 848 0xc00396a380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 849 0xc00396a380 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 84a 0xc00396a380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 84b 0xc00396a380 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [cauthdsl] func1 -> DEBU 84c 0xc00396a380 gate 1569284706152243800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 84d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 84e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 84f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [cauthdsl] func1 -> DEBU 850 0xc00396abc0 gate 1569284706152716600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 851 0xc00396abc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 852 0xc00396abc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 853 0xc00396abc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:06.152 UTC [msp.identity] Verify -> DEBU 854 Verify: digest = 00000000 24 a6 67 ec 93 80 1b 1a f8 a7 1f 3f 02 93 6b 08 |$.g........?..k.| +peer0.org1.example.com | 00000010 3d 1c 5b eb 65 f9 87 47 b6 92 d6 53 36 d1 44 ec |=.[.e..G...S6.D.|" +peer0.org1.example.com | "2019-09-24 00:25:06.153 UTC [msp.identity] Verify -> DEBU 855 Verify: sig = 00000000 30 44 02 20 5a 67 eb 00 01 36 77 60 49 3a cf c9 |0D. Zg...6w`I:..| +peer0.org1.example.com | 00000010 01 18 a3 c8 c6 e9 0a 53 c0 8e 4e 1a 49 bc 73 1c |.......S..N.I.s.| +peer0.org1.example.com | 00000020 b1 8d e9 d5 02 20 7a 22 f4 df cc 5a 24 c7 53 22 |..... z"...Z$.S"| +peer0.org1.example.com | 00000030 18 57 47 00 77 c6 6d 00 59 78 66 79 fa cd 47 0d |.WG.w.m.Yxfy..G.| +peer0.org1.example.com | 00000040 b9 e2 9d e3 78 4a |....xJ|" +peer0.org1.example.com | "2019-09-24 00:25:06.153 UTC [cauthdsl] func2 -> DEBU 856 0xc00396abc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:06.153 UTC [cauthdsl] func1 -> DEBU 857 0xc00396abc0 gate 1569284706152716600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:06.153 UTC [policies] Evaluate -> DEBU 858 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.154 UTC [policies] Evaluate -> DEBU 859 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.154 UTC [policies] Evaluate -> DEBU 85a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.154 UTC [policies] Evaluate -> DEBU 85b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.154 UTC [msp] DeserializeIdentity -> DEBU 85c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:06.154 UTC [msp] DeserializeIdentity -> DEBU 85d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 85e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 85f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [policies] Evaluate -> DEBU 860 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [policies] Evaluate -> DEBU 861 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [policies] Evaluate -> DEBU 862 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [cauthdsl] func1 -> DEBU 863 0xc00396bda0 gate 1569284706155403800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [cauthdsl] func2 -> DEBU 864 0xc00396bda0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [cauthdsl] func2 -> DEBU 865 0xc00396bda0 processing identity 0 with bytes of 114c6c0" +orderer0.example.com | "2019-09-24 00:25:04.595 UTC [common.channelconfig] LogSanityChecks -> DEBU abc As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 00:25:04.595 UTC [common.capabilities] Supported -> DEBU abd Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:25:04.595 UTC [common.capabilities] Supported -> DEBU abe Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:25:04.596 UTC [orderer.common.server] func1 -> DEBU abf Executing callback to update root CAs" +orderer0.example.com | "2019-09-24 00:25:04.596 UTC [orderer.common.server] updateTrustedRoots -> DEBU ac0 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-09-24 00:25:04.596 UTC [orderer.common.server] updateTrustedRoots -> DEBU ac1 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-09-24 00:25:04.596 UTC [orderer.common.server] updateTrustedRoots -> DEBU ac2 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-09-24 00:25:04.596 UTC [orderer.common.server] updateTrustedRoots -> DEBU ac3 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-09-24 00:25:04.597 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU ac4 [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +orderer0.example.com | "2019-09-24 00:25:04.597 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU ac5 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +orderer0.example.com | "2019-09-24 00:25:04.597 UTC [msp] GetDefaultSigningIdentity -> DEBU ac6 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:25:04.597 UTC [msp] GetDefaultSigningIdentity -> DEBU ac7 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:25:04.597 UTC [msp.identity] Sign -> DEBU ac8 Sign: plaintext: 0A020801120B0A090A03010203100418...8321A8CF55AF7F206518C8BBAB146604 " +orderer0.example.com | "2019-09-24 00:25:04.597 UTC [msp.identity] Sign -> DEBU ac9 Sign: digest: 3518D65C54AF7DD4E9CFFCF9D10B5D12D2458CDDEB0BE0BE3CCEE25FAFED86C6 " +orderer0.example.com | "2019-09-24 00:25:04.616 UTC [fsblkstorage] indexBlock -> DEBU aca Indexing block [blockNum=1, blockHash=[]byte{0x81, 0xd3, 0xeb, 0x83, 0x70, 0x19, 0x81, 0xbf, 0xc0, 0xb4, 0xb0, 0x9b, 0xd3, 0x64, 0x4d, 0xef, 0x6d, 0x21, 0x73, 0x6d, 0x1, 0x28, 0x4d, 0xdc, 0x73, 0xd7, 0xb4, 0x87, 0x96, 0xcf, 0x2e, 0xd6} txOffsets= +orderer0.example.com | txId=91696339b033049ed8d7697c23abc85593d36f57812608fa7cde041ba7fdc82b locPointer=offset=71, bytesLength=22685 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 00:25:04.622 UTC [fsblkstorage] updateCheckpoint -> DEBU acb Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47641], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2019-09-24 00:25:04.632 UTC [orderer.commmon.multichannel] commitBlock -> DEBU acc [channel: businesschannel] Wrote block [1]" +orderer0.example.com | "2019-09-24 00:25:04.633 UTC [fsblkstorage] waitForBlock -> DEBU acd Came out of wait. maxAvailaBlockNumber=[1]" +orderer0.example.com | "2019-09-24 00:25:04.633 UTC [fsblkstorage] Next -> DEBU ace Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 00:25:04.633 UTC [fsblkstorage] newBlockfileStream -> DEBU acf newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23948]" +orderer0.example.com | "2019-09-24 00:25:04.633 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ad0 Remaining bytes=[23693], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:25:04.633 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ad1 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23948], bytesOffset=[23951]}" +orderer0.example.com | "2019-09-24 00:25:04.640 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ad2 blockbytes [23690] read from file [0]" +orderer0.example.com | "2019-09-24 00:25:04.646 UTC [policies] Evaluate -> DEBU ad3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:25:04.646 UTC [policies] Evaluate -> DEBU ad4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:04.653 UTC [policies] Evaluate -> DEBU ad5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:25:04.653 UTC [policies] Evaluate -> DEBU ad6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:04.653 UTC [policies] Evaluate -> DEBU ad7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:25:04.653 UTC [msp] DeserializeIdentity -> DEBU ad8 Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:04.653 UTC [msp.identity] newIdentity -> DEBU ad9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:04.654 UTC [cauthdsl] func1 -> DEBU ada 0xc000d86dd0 gate 1569284704654083200 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:04.654 UTC [cauthdsl] func2 -> DEBU adb 0xc000d86dd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:04.654 UTC [cauthdsl] func2 -> DEBU adc 0xc000d86dd0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:04.654 UTC [cauthdsl] func2 -> DEBU add 0xc000d86dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 00:25:04.654 UTC [cauthdsl] func2 -> DEBU ade 0xc000d86dd0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:25:04.665 UTC [cauthdsl] func1 -> DEBU adf 0xc000d86dd0 gate 1569284704654083200 evaluation fails" +orderer0.example.com | "2019-09-24 00:25:04.666 UTC [policies] Evaluate -> DEBU ae0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.666 UTC [policies] Evaluate -> DEBU ae1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.666 UTC [policies] Evaluate -> DEBU ae2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:25:04.666 UTC [cauthdsl] func1 -> DEBU ae3 0xc000d87f50 gate 1569284704666886400 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:04.666 UTC [cauthdsl] func2 -> DEBU ae4 0xc000d87f50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:04.667 UTC [cauthdsl] func2 -> DEBU ae5 0xc000d87f50 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:04.672 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ae6 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-09-24 00:25:04.678 UTC [msp] Validate -> DEBU ae7 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:04.678 UTC [msp] getCertificationChain -> DEBU ae8 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:04.679 UTC [cauthdsl] func2 -> DEBU ae9 0xc000d87f50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [cauthdsl] func2 -> DEBU 866 0xc00396bda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [cauthdsl] func2 -> DEBU 867 0xc00396bda0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [cauthdsl] func1 -> DEBU 868 0xc00396bda0 gate 1569284706155403800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [policies] Evaluate -> DEBU 869 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.155 UTC [policies] Evaluate -> DEBU 86a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.156 UTC [policies] Evaluate -> DEBU 86b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:06.156 UTC [cauthdsl] func1 -> DEBU 86c 0xc00397a5e0 gate 1569284706156108400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:06.156 UTC [cauthdsl] func2 -> DEBU 86d 0xc00397a5e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:06.156 UTC [cauthdsl] func2 -> DEBU 86e 0xc00397a5e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:06.156 UTC [cauthdsl] func2 -> DEBU 86f 0xc00397a5e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:06.156 UTC [msp.identity] Verify -> DEBU 870 Verify: digest = 00000000 24 a6 67 ec 93 80 1b 1a f8 a7 1f 3f 02 93 6b 08 |$.g........?..k.| +peer0.org1.example.com | 00000010 3d 1c 5b eb 65 f9 87 47 b6 92 d6 53 36 d1 44 ec |=.[.e..G...S6.D.|" +peer0.org1.example.com | "2019-09-24 00:25:06.156 UTC [msp.identity] Verify -> DEBU 871 Verify: sig = 00000000 30 44 02 20 5a 67 eb 00 01 36 77 60 49 3a cf c9 |0D. Zg...6w`I:..| +peer0.org1.example.com | 00000010 01 18 a3 c8 c6 e9 0a 53 c0 8e 4e 1a 49 bc 73 1c |.......S..N.I.s.| +peer0.org1.example.com | 00000020 b1 8d e9 d5 02 20 7a 22 f4 df cc 5a 24 c7 53 22 |..... z"...Z$.S"| +peer0.org1.example.com | 00000030 18 57 47 00 77 c6 6d 00 59 78 66 79 fa cd 47 0d |.WG.w.m.Yxfy..G.| +peer0.org1.example.com | 00000040 b9 e2 9d e3 78 4a |....xJ|" +peer0.org1.example.com | "2019-09-24 00:25:06.158 UTC [cauthdsl] func2 -> DEBU 872 0xc00397a5e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:06.158 UTC [cauthdsl] func1 -> DEBU 873 0xc00397a5e0 gate 1569284706156108400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:06.158 UTC [policies] Evaluate -> DEBU 874 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.158 UTC [policies] Evaluate -> DEBU 875 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.158 UTC [policies] Evaluate -> DEBU 876 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.159 UTC [policies] Evaluate -> DEBU 877 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:06.159 UTC [gossip.gossip] handleMessage -> DEBU 878 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:06.168 UTC [msp] DeserializeIdentity -> DEBU 879 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:06.169 UTC [msp] DeserializeIdentity -> DEBU 87a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:06.169 UTC [gossip.comm] Send -> DEBU 87b Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" +peer0.org1.example.com | "2019-09-24 00:25:06.169 UTC [msp] DeserializeIdentity -> DEBU 87c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:06.169 UTC [gossip.comm] sendToEndpoint -> DEBU 87d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:06.169 UTC [msp] DeserializeIdentity -> DEBU 87e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:06.169 UTC [gossip.comm] sendToEndpoint -> DEBU 87f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:06.169 UTC [gossip.comm] sendToEndpoint -> DEBU 880 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:06.170 UTC [gossip.comm] sendToEndpoint -> DEBU 881 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:06.219 UTC [gossip.channel] reportMembershipChanges -> INFO 882 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ]]" +peer0.org1.example.com | "2019-09-24 00:25:07.164 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 883 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.164 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 884 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.164 UTC [policies] Evaluate -> DEBU 885 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 00:25:07.164 UTC [policies] Evaluate -> DEBU 886 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.164 UTC [policies] Evaluate -> DEBU 887 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.164 UTC [msp] DeserializeIdentity -> DEBU 888 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.164 UTC [msp.identity] newIdentity -> DEBU 889 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org1.example.com | KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO +peer0.org1.example.com | CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM +peer0.org1.example.com | SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q +peer0.org1.example.com | 1A== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.165 UTC [cauthdsl] func1 -> DEBU 88a 0xc00397bac0 gate 1569284707165023400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.165 UTC [cauthdsl] func2 -> DEBU 88b 0xc00397bac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.165 UTC [cauthdsl] func2 -> DEBU 88c 0xc00397bac0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.165 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 88d Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 00:25:04.679 UTC [msp.identity] Verify -> DEBU aea Verify: digest = 00000000 8b 03 97 43 70 c0 92 23 17 5e 03 ee 64 e6 97 15 |...Cp..#.^..d...| +orderer0.example.com | 00000010 02 e5 c8 62 47 03 7b 9c 1d 32 87 82 fc 68 3e 5b |...bG.{..2...h>[|" +orderer0.example.com | "2019-09-24 00:25:04.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU aeb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:04.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aec Sending msg of 28 bytes to 3 on channel testchainid took 29.6µs" +orderer0.example.com | "2019-09-24 00:25:04.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU aed Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.6µs " +orderer0.example.com | "2019-09-24 00:25:04.679 UTC [msp.identity] Verify -> DEBU aee Verify: sig = 00000000 30 44 02 20 31 f5 c5 93 d4 1d 90 90 18 dd 80 56 |0D. 1..........V| +orderer0.example.com | 00000010 9f 8f ca 24 d5 66 6c 6b 5f a8 6a fb ad 51 78 84 |...$.flk_.j..Qx.| +orderer0.example.com | 00000020 24 d7 ee fc 02 20 1a fe 63 11 78 f6 09 75 ed 1e |$.... ..c.x..u..| +orderer0.example.com | 00000030 ed 55 24 d6 52 91 c4 44 8c 94 19 3e f1 e1 0e 9c |.U$.R..D...>....| +orderer0.example.com | 00000040 9f c8 76 db 78 22 |..v.x"|" +orderer0.example.com | "2019-09-24 00:25:04.690 UTC [cauthdsl] func2 -> DEBU aef 0xc000d87f50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:25:04.690 UTC [cauthdsl] func1 -> DEBU af0 0xc000d87f50 gate 1569284704666886400 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af3 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af5 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:04.690 UTC [common.deliver] deliverBlocks -> DEBU af7 [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +orderer0.example.com | "2019-09-24 00:25:04.693 UTC [fsblkstorage] waitForBlock -> DEBU af8 Going to wait for newer blocks. maxAvailaBlockNumber=[1], waitForBlockNum=[2]" +orderer0.example.com | "2019-09-24 00:25:04.756 UTC [orderer.common.server] replicateDisabledChains -> DEBU af9 No inactive chains to try to replicate" +orderer0.example.com | "2019-09-24 00:25:04.991 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU afa Sending msg of 28 bytes to 2 on channel businesschannel took 117.5µs" +orderer0.example.com | "2019-09-24 00:25:04.991 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU afb Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-09-24 00:25:04.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU afc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 229.7µs " +orderer0.example.com | "2019-09-24 00:25:04.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU afd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 190.1µs " +orderer0.example.com | "2019-09-24 00:25:05.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU afe Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:05.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU aff Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:05.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU b00 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:05.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b01 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2019-09-24 00:25:05.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU b02 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134µs " +orderer0.example.com | "2019-09-24 00:25:05.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b03 Sending msg of 28 bytes to 2 on channel businesschannel took 80.4µs" +orderer0.example.com | "2019-09-24 00:25:05.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b04 Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-09-24 00:25:05.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU b05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.5µs " +orderer0.example.com | "2019-09-24 00:25:05.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU b06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 176.8µs " +orderer0.example.com | "2019-09-24 00:25:05.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU b07 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:05.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU b08 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:05.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU b09 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:05.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b0a Sending msg of 28 bytes to 3 on channel testchainid took 41.6µs" +orderer0.example.com | "2019-09-24 00:25:05.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU b0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.8µs " +orderer0.example.com | "2019-09-24 00:25:05.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b0c Sending msg of 28 bytes to 2 on channel businesschannel took 128.5µs" +orderer0.example.com | "2019-09-24 00:25:05.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b0d Sending msg of 28 bytes to 3 on channel businesschannel took 52.6µs" +orderer0.example.com | "2019-09-24 00:25:05.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU b0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.8µs " +orderer0.example.com | "2019-09-24 00:25:05.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU b0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 625.6µs " +orderer0.example.com | "2019-09-24 00:25:05.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU b10 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:05.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU b11 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 00:25:07.165 UTC [msp] Validate -> DEBU 88e MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:07.165 UTC [cauthdsl] func2 -> DEBU 88f 0xc00397bac0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.165 UTC [msp.identity] Verify -> DEBU 890 Verify: digest = 00000000 e4 08 df 11 1d 7c 9a 21 73 cb 6a 82 06 ff 83 ed |.....|.!s.j.....| +peer0.org1.example.com | 00000010 43 49 92 a8 41 f4 64 74 99 86 66 ce e0 c1 a3 2c |CI..A.dt..f....,|" +peer0.org1.example.com | "2019-09-24 00:25:07.165 UTC [msp.identity] Verify -> DEBU 891 Verify: sig = 00000000 30 44 02 20 0e 23 80 8c d3 f2 b8 4d 65 dc ec 9e |0D. .#.....Me...| +peer0.org1.example.com | 00000010 ed bf 69 30 aa 9b 31 14 5e 0e 51 21 41 25 cb a8 |..i0..1.^.Q!A%..| +peer0.org1.example.com | 00000020 46 98 e4 66 02 20 69 8e a4 05 6e 12 3a 20 cc 5b |F..f. i...n.: .[| +peer0.org1.example.com | 00000030 5d a4 9d 0f 8e 8c 17 53 d5 e2 de 7e 9c 9b 9a c4 |]......S...~....| +peer0.org1.example.com | 00000040 b3 80 4d 2f b2 69 |..M/.i|" +peer0.org1.example.com | "2019-09-24 00:25:07.170 UTC [cauthdsl] func2 -> DEBU 892 0xc00397bac0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.170 UTC [cauthdsl] func1 -> DEBU 893 0xc00397bac0 gate 1569284707165023400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.170 UTC [policies] Evaluate -> DEBU 894 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:25:07.170 UTC [policies] Evaluate -> DEBU 895 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [policies] Evaluate -> DEBU 896 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [policies] Evaluate -> DEBU 897 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [blocksProvider] DeliverBlocks -> DEBU 898 [businesschannel] Adding payload to local buffer, blockNum = [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [gossip.state] addPayload -> DEBU 899 [businesschannel] Adding payload to local buffer, blockNum = [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [gossip.state] deliverPayloads -> DEBU 89a [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [gossip.state] deliverPayloads -> DEBU 89b [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [gossip.privdata] StoreBlock -> INFO 89c [businesschannel] Received block [2] from buffer" +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [gossip.privdata] StoreBlock -> DEBU 89d [businesschannel] Validating block [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [committer.txvalidator] Validate -> DEBU 89e [businesschannel] START Block Validation for block [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [committer.txvalidator] Validate -> DEBU 89f expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [committer.txvalidator] validateTx -> DEBU 8a0 [businesschannel] validateTx starts for block 0xc0038b0a00 env 0xc00392c8c0 txn 0" +peer0.org1.example.com | "2019-09-24 00:25:07.172 UTC [protoutils] ValidateTransaction -> DEBU 8a1 ValidateTransactionEnvelope starts for envelope 0xc00392c8c0" +peer0.org1.example.com | "2019-09-24 00:25:07.172 UTC [protoutils] ValidateTransaction -> DEBU 8a2 Header is channel_header:"\010\001\032\006\010\342\304\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\277\253\335 Y\371w3&\t\342q=xq\235\304\204\375|\346\023e{" " +peer0.org1.example.com | "2019-09-24 00:25:07.172 UTC [protoutils] validateChannelHeader -> DEBU 8a3 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-09-24 00:25:07.172 UTC [protoutils] checkSignatureFromCreator -> DEBU 8a4 begin" +peer0.org1.example.com | "2019-09-24 00:25:07.172 UTC [msp] GetManagerForChain -> DEBU 8a5 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:25:07.172 UTC [msp] DeserializeIdentity -> DEBU 8a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.172 UTC [msp.identity] newIdentity -> DEBU 8a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.172 UTC [protoutils] checkSignatureFromCreator -> DEBU 8a8 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-09-24 00:25:07.172 UTC [msp] Validate -> DEBU 8a9 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:07.173 UTC [protoutils] checkSignatureFromCreator -> DEBU 8aa creator is valid" +peer0.org1.example.com | "2019-09-24 00:25:07.173 UTC [msp.identity] Verify -> DEBU 8ab Verify: digest = 00000000 19 69 a9 79 a8 64 5a 0c 78 d0 60 11 ea 0c 33 c3 |.i.y.dZ.x.`...3.| +peer0.org1.example.com | 00000010 d2 17 d7 3c 65 fe c1 ea 3c 0f 0f fa 41 1e d6 5f |... DEBU 8ac Verify: sig = 00000000 30 44 02 20 57 8a a0 c1 82 87 03 f9 fb 2b 7f ba |0D. W........+..| +peer0.org1.example.com | 00000010 1a 89 9a c2 48 7a 25 b3 79 92 cd 9d 9b 5f d1 3b |....Hz%.y...._.;| +peer0.org1.example.com | 00000020 fb f7 76 34 02 20 17 6f c5 03 55 a0 55 88 4c e9 |..v4. .o..U.U.L.| +peer0.org1.example.com | 00000030 eb df 54 19 21 e2 6c 02 7d cf 7b 6f d2 a7 2e e6 |..T.!.l.}.{o....| +peer0.org1.example.com | 00000040 b5 35 1b 9c 5d 9a |.5..].|" +peer0.org1.example.com | "2019-09-24 00:25:07.173 UTC [protoutils] checkSignatureFromCreator -> DEBU 8ad exits successfully" +peer0.org1.example.com | "2019-09-24 00:25:07.173 UTC [protoutils] validateConfigTransaction -> DEBU 8ae validateConfigTransaction starts for data 0xc0039e8000, header channel_header:"\010\001\032\006\010\342\304\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030\277\253\335 Y\371w3&\t\342q=xq\235\304\204\375|\346\023e{" " +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [committer.txvalidator] validateTx -> DEBU 8af Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b0 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b1 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b2 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b3 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b8 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b9 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8ba Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8bb Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8bc Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [common.configtx] addToMap -> DEBU 8bd Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [common.configtx] addToMap -> DEBU 8be Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [common.configtx] addToMap -> DEBU 8bf Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [common.configtx] addToMap -> DEBU 8c0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [common.configtx] verifyDeltaSet -> DEBU 8c1 Processing change to key: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [common.configtx] policyForItem -> DEBU 8c2 Getting policy for item Org2MSP with mod_policy Admins" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c3 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c4 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c5 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c6 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c7 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c8 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c9 Manager Channel/Application looking up path [Org2MSP]" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8ca Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8cb Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8cc Manager Channel/Application/Org2MSP looking up path []" +peer0.org1.example.com | "2019-09-24 00:25:07.176 UTC [policies] Evaluate -> DEBU 8cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [msp] DeserializeIdentity -> DEBU 8cf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [msp.identity] newIdentity -> DEBU 8d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [cauthdsl] func1 -> DEBU 8d1 0xc0039c9400 gate 1569284707184426900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [cauthdsl] func2 -> DEBU 8d2 0xc0039c9400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [cauthdsl] func2 -> DEBU 8d3 0xc0039c9400 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8d4 Checking if identity satisfies ADMIN role for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [cauthdsl] func2 -> DEBU 8d5 0xc0039c9400 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [msp.identity] Verify -> DEBU 8d6 Verify: digest = 00000000 c7 15 61 1b b2 95 fa 58 ba 85 fe c1 31 30 21 87 |..a....X....10!.| +peer0.org1.example.com | 00000010 ff ba 08 45 5d c6 ac f3 4c 25 22 ca 2f 17 ea 97 |...E]...L%"./...|" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [msp.identity] Verify -> DEBU 8d7 Verify: sig = 00000000 30 45 02 21 00 98 5f 39 f5 66 76 09 9e c8 cd e3 |0E.!.._9.fv.....| +peer0.org1.example.com | 00000010 70 ff 4b d1 18 cd cd f5 28 b0 92 91 ed c0 20 3f |p.K.....(..... ?| +peer0.org1.example.com | 00000020 ec 6a 58 2b 2f 02 20 59 44 df b5 8f e0 ce 61 c8 |.jX+/. YD.....a.| +peer0.org1.example.com | 00000030 7c 9e c4 4d c5 31 fd 54 af 57 c3 f6 39 01 9a 59 ||..M.1.T.W..9..Y| +peer0.org1.example.com | 00000040 99 0e a7 45 58 9e 56 |...EX.V|" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [cauthdsl] func2 -> DEBU 8d8 0xc0039c9400 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [cauthdsl] func1 -> DEBU 8d9 0xc0039c9400 gate 1569284707184426900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [policies] Evaluate -> DEBU 8da Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [policies] Evaluate -> DEBU 8db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:07.184 UTC [common.configtx] verifyDeltaSet -> DEBU 8dc Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:06.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU b12 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:06.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b13 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +orderer0.example.com | "2019-09-24 00:25:06.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU b14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.9µs " +orderer0.example.com | "2019-09-24 00:25:06.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b15 Sending msg of 28 bytes to 2 on channel businesschannel took 67.5µs" +orderer0.example.com | "2019-09-24 00:25:06.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b16 Sending msg of 28 bytes to 3 on channel businesschannel took 35.4µs" +orderer0.example.com | "2019-09-24 00:25:06.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU b17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 286.9µs " +orderer0.example.com | "2019-09-24 00:25:06.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU b18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 317.8µs " +orderer0.example.com | "2019-09-24 00:25:06.496 UTC [orderer.common.cluster.step] handleMessage -> DEBU b19 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:06.496 UTC [orderer.common.cluster.step] handleMessage -> DEBU b1a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:06.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU b1b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:06.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b1c Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +orderer0.example.com | "2019-09-24 00:25:06.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU b1d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.1µs " +orderer0.example.com | "2019-09-24 00:25:06.827 UTC [orderer.common.server] Deliver -> DEBU b1e Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:25:06.827 UTC [common.deliver] Handle -> DEBU b1f Starting new deliver loop for 172.18.0.9:60704" +orderer0.example.com | "2019-09-24 00:25:06.827 UTC [common.deliver] Handle -> DEBU b20 Attempting to read seek info message from 172.18.0.9:60704" +orderer0.example.com | "2019-09-24 00:25:06.865 UTC [orderer.common.server] Broadcast -> DEBU b21 Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 00:25:06.865 UTC [orderer.common.broadcast] Handle -> DEBU b22 Starting new broadcast loop for 172.18.0.9:60706" +orderer0.example.com | "2019-09-24 00:25:06.865 UTC [orderer.common.broadcast] ProcessMessage -> DEBU b23 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:60706" +orderer0.example.com | "2019-09-24 00:25:06.865 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU b24 Processing config update message for channel businesschannel" +orderer0.example.com | "2019-09-24 00:25:06.868 UTC [policies] Evaluate -> DEBU b25 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 00:25:06.868 UTC [policies] Evaluate -> DEBU b26 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:06.868 UTC [policies] Evaluate -> DEBU b27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 00:25:06.868 UTC [policies] Evaluate -> DEBU b28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:06.868 UTC [policies] Evaluate -> DEBU b29 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 00:25:06.868 UTC [msp] DeserializeIdentity -> DEBU b2a Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:06.869 UTC [msp.identity] newIdentity -> DEBU b2b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.871 UTC [cauthdsl] func1 -> DEBU b2c 0xc000feb3e0 gate 1569284706871312500 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:06.871 UTC [cauthdsl] func2 -> DEBU b2d 0xc000feb3e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:06.872 UTC [cauthdsl] func2 -> DEBU b2e 0xc000feb3e0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:06.872 UTC [cauthdsl] func2 -> DEBU b2f 0xc000feb3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 00:25:06.873 UTC [cauthdsl] func2 -> DEBU b30 0xc000feb3e0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:25:06.875 UTC [cauthdsl] func1 -> DEBU b31 0xc000feb3e0 gate 1569284706871312500 evaluation fails" +orderer0.example.com | "2019-09-24 00:25:06.875 UTC [policies] Evaluate -> DEBU b32 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b33 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:06.876 UTC [policies] func1 -> DEBU b34 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b35 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b36 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b37 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b38 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 00:25:06.876 UTC [cauthdsl] func1 -> DEBU b3a 0xc00104aa10 gate 1569284706876823700 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:06.877 UTC [cauthdsl] func2 -> DEBU b3b 0xc00104aa10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:06.877 UTC [cauthdsl] func2 -> DEBU b3c 0xc00104aa10 processing identity 0 with bytes of fd0d80" +peer0.org1.example.com | "2019-09-24 00:25:07.185 UTC [common.configtx] recurseConfigMap -> DEBU 8dd Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.185 UTC [common.configtx] recurseConfigMap -> DEBU 8de Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.185 UTC [common.configtx] recurseConfigMap -> DEBU 8df Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.185 UTC [common.configtx] recurseConfigMap -> DEBU 8e0 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.171 UTC [gossip.state] addPayload -> DEBU 8ce Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-09-24 00:25:07.188 UTC [blocksProvider] DeliverBlocks -> DEBU 8e1 [businesschannel] Gossiping block [2], peers number [3]" +peer0.org1.example.com | "2019-09-24 00:25:07.188 UTC [gossip.channel] AddToMsgStore -> DEBU 8e2 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23763 bytes, seq: 2}, Envelope: 23796 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 00:25:07.188 UTC [gossip.pull] Add -> DEBU 8e3 Added 2, total items: 2" +peer0.org1.example.com | "2019-09-24 00:25:07.188 UTC [common.configtx] recurseConfigMap -> DEBU 8e4 Setting policy for key Writers to " +peer0.org1.example.com | "2019-09-24 00:25:07.188 UTC [common.configtx] recurseConfigMap -> DEBU 8e5 Setting policy for key Admins to " +peer0.org1.example.com | "2019-09-24 00:25:07.188 UTC [common.configtx] recurseConfigMap -> DEBU 8e6 Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-09-24 00:25:07.188 UTC [common.configtx] recurseConfigMap -> DEBU 8e7 Setting policy for key Readers to " +peer0.org1.example.com | "2019-09-24 00:25:07.193 UTC [common.configtx] recurseConfigMap -> DEBU 8e8 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.193 UTC [common.configtx] recurseConfigMap -> DEBU 8e9 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.194 UTC [gossip.comm] Send -> DEBU 8ee Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23763 bytes, seq: 2}, Envelope: 23796 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.194 UTC [gossip.comm] sendToEndpoint -> DEBU 8f1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23763 bytes, seq: 2}, Envelope: 23796 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.194 UTC [gossip.comm] sendToEndpoint -> DEBU 8f2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.193 UTC [common.configtx] recurseConfigMap -> DEBU 8f3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f4 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f5 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f6 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f7 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f8 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f9 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8fa Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.196 UTC [common.configtx] recurseConfigMap -> DEBU 8fb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.196 UTC [common.configtx] recurseConfigMap -> DEBU 8fc Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.196 UTC [common.configtx] recurseConfigMap -> DEBU 8fd Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.196 UTC [common.configtx] recurseConfigMap -> DEBU 8fe Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.196 UTC [common.configtx] recurseConfigMap -> DEBU 8ff Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:07.197 UTC [common.channelconfig] NewStandardValues -> DEBU 900 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-09-24 00:25:07.197 UTC [common.channelconfig] initializeProtosStruct -> DEBU 901 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 00:25:07.197 UTC [common.channelconfig] initializeProtosStruct -> DEBU 902 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 00:25:07.197 UTC [common.channelconfig] initializeProtosStruct -> DEBU 903 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-09-24 00:25:07.197 UTC [common.channelconfig] initializeProtosStruct -> DEBU 904 Processing field: Consortium" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 905 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] NewStandardValues -> DEBU 906 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 907 Processing field: ConsensusType" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 908 Processing field: BatchSize" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 909 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90a Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90b Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90c Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] NewStandardValues -> DEBU 90d Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90e Processing field: Endpoints" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] NewStandardValues -> DEBU 90f Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 910 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.199 UTC [common.channelconfig] validateMSP -> DEBU 911 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:07.199 UTC [msp] newBccspMsp -> DEBU 912 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:07.199 UTC [msp] New -> DEBU 913 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:07.199 UTC [msp] Setup -> DEBU 914 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-09-24 00:25:07.199 UTC [msp.identity] newIdentity -> DEBU 915 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.199 UTC [msp.identity] newIdentity -> DEBU 916 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.199 UTC [msp] Validate -> DEBU 917 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:07.199 UTC [common.channelconfig] NewStandardValues -> DEBU 918 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-09-24 00:25:07.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 919 Processing field: ACLs" +peer0.org1.example.com | "2019-09-24 00:25:07.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 91a Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:07.200 UTC [common.channelconfig] NewStandardValues -> DEBU 91b Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 00:25:07.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 91c Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:25:07.200 UTC [common.channelconfig] NewStandardValues -> DEBU 91d Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:25:07.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 91e Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.201 UTC [common.channelconfig] Validate -> DEBU 91f Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-09-24 00:25:07.201 UTC [common.channelconfig] validateMSP -> DEBU 920 Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.201 UTC [msp] newBccspMsp -> DEBU 921 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:07.201 UTC [msp] New -> DEBU 922 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:07.201 UTC [msp] Setup -> DEBU 923 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.201 UTC [msp.identity] newIdentity -> DEBU 924 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.201 UTC [msp.identity] newIdentity -> DEBU 925 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.202 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 926 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.202 UTC [msp] Validate -> DEBU 927 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:07.203 UTC [msp] getCertificationChain -> DEBU 928 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:07.204 UTC [msp] hasOURole -> DEBU 929 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 00:25:07.204 UTC [msp] getCertificationChain -> DEBU 92a MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:07.204 UTC [common.channelconfig] NewStandardValues -> DEBU 92b Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 00:25:07.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 92c Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:25:07.204 UTC [common.channelconfig] NewStandardValues -> DEBU 92d Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:25:07.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 92e Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:06.877 UTC [cauthdsl] func2 -> DEBU b3d 0xc00104aa10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 00:25:06.877 UTC [cauthdsl] func2 -> DEBU b3e 0xc00104aa10 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:25:06.878 UTC [cauthdsl] func1 -> DEBU b3f 0xc00104aa10 gate 1569284706876823700 evaluation fails" +orderer0.example.com | "2019-09-24 00:25:06.878 UTC [policies] Evaluate -> DEBU b40 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:06.878 UTC [policies] Evaluate -> DEBU b41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:06.878 UTC [policies] Evaluate -> DEBU b42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-09-24 00:25:06.878 UTC [cauthdsl] func1 -> DEBU b43 0xc00104b270 gate 1569284706878378700 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:06.878 UTC [cauthdsl] func2 -> DEBU b44 0xc00104b270 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:06.878 UTC [cauthdsl] func2 -> DEBU b45 0xc00104b270 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:06.878 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b46 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.878 UTC [msp] Validate -> DEBU b47 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:06.879 UTC [msp] getCertificationChain -> DEBU b48 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:06.879 UTC [cauthdsl] func2 -> DEBU b49 0xc00104b270 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:25:06.879 UTC [msp.identity] Verify -> DEBU b4a Verify: digest = 00000000 ff 3d 48 06 64 1c e0 65 07 17 d4 9c 02 d0 26 f4 |.=H.d..e......&.| +orderer0.example.com | 00000010 fc 66 b7 df 4f e9 4b 22 5d a3 79 a0 9d 27 da 67 |.f..O.K"].y..'.g|" +orderer0.example.com | "2019-09-24 00:25:06.879 UTC [msp.identity] Verify -> DEBU b4b Verify: sig = 00000000 30 44 02 20 7b 9c 6a bf 78 f7 8f 95 4d 01 cf b2 |0D. {.j.x...M...| +orderer0.example.com | 00000010 dc 81 30 2a 1b 7c 3b 8d b2 c0 fe d1 13 f5 15 48 |..0*.|;........H| +orderer0.example.com | 00000020 9a cb 44 11 02 20 18 91 ea 25 90 f8 b0 0c d0 8f |..D.. ...%......| +orderer0.example.com | 00000030 31 7f a7 91 1f b7 6f 5d c6 2e 28 10 04 ef f9 3e |1.....o]..(....>| +orderer0.example.com | 00000040 07 b7 29 97 a7 10 |..)...|" +orderer0.example.com | "2019-09-24 00:25:06.879 UTC [cauthdsl] func2 -> DEBU b4c 0xc00104b270 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:25:06.879 UTC [cauthdsl] func1 -> DEBU b4d 0xc00104b270 gate 1569284706878378700 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b4e Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b50 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b52 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:06.880 UTC [common.configtx] addToMap -> DEBU b54 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:06.880 UTC [common.configtx] addToMap -> DEBU b55 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b56 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b57 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b58 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b59 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5c Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5d Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5e Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b60 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b61 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b62 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [common.configtx] addToMap -> DEBU b63 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [common.configtx] addToMap -> DEBU b64 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [common.configtx] verifyDeltaSet -> DEBU b65 Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [common.configtx] policyForItem -> DEBU b66 Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b67 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b68 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b69 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6a Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6b Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6c Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6d Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6e Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6f Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b70 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-09-24 00:25:06.882 UTC [policies] Evaluate -> DEBU b71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [cauthdsl] func1 -> DEBU b72 0xc00106c1f0 gate 1569284706883031100 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [cauthdsl] func2 -> DEBU b73 0xc00106c1f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.204 UTC [common.channelconfig] Validate -> DEBU 92f Anchor peers for org Org2MSP are anchor_peers: " +peer0.org1.example.com | "2019-09-24 00:25:07.207 UTC [common.channelconfig] validateMSP -> DEBU 930 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.208 UTC [msp] newBccspMsp -> DEBU 931 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:07.208 UTC [msp] New -> DEBU 932 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:25:07.208 UTC [msp] Setup -> DEBU 933 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.225 UTC [msp.identity] newIdentity -> DEBU 934 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.250 UTC [msp.identity] newIdentity -> DEBU 935 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 936 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [msp] Validate -> DEBU 937 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [msp] getCertificationChain -> DEBU 938 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [msp] hasOURole -> DEBU 939 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [msp] getCertificationChain -> DEBU 93a MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [msp] Setup -> DEBU 93b Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [msp] Setup -> DEBU 93c MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 93d Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 93e Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 93f Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 940 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 941 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 942 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 943 Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 944 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 945 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 946 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 947 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 948 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 949 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94a Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94b Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94c Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94d Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94e Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94f Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 950 Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 951 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 952 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 953 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [cauthdsl] func2 -> DEBU b74 0xc00106c1f0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b75 Checking if identity satisfies ADMIN role for Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [cauthdsl] func2 -> DEBU b76 0xc00106c1f0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [msp.identity] Verify -> DEBU b77 Verify: digest = 00000000 c7 15 61 1b b2 95 fa 58 ba 85 fe c1 31 30 21 87 |..a....X....10!.| +orderer0.example.com | 00000010 ff ba 08 45 5d c6 ac f3 4c 25 22 ca 2f 17 ea 97 |...E]...L%"./...|" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [msp.identity] Verify -> DEBU b78 Verify: sig = 00000000 30 45 02 21 00 98 5f 39 f5 66 76 09 9e c8 cd e3 |0E.!.._9.fv.....| +orderer0.example.com | 00000010 70 ff 4b d1 18 cd cd f5 28 b0 92 91 ed c0 20 3f |p.K.....(..... ?| +orderer0.example.com | 00000020 ec 6a 58 2b 2f 02 20 59 44 df b5 8f e0 ce 61 c8 |.jX+/. YD.....a.| +orderer0.example.com | 00000030 7c 9e c4 4d c5 31 fd 54 af 57 c3 f6 39 01 9a 59 ||..M.1.T.W..9..Y| +orderer0.example.com | 00000040 99 0e a7 45 58 9e 56 |...EX.V|" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [cauthdsl] func2 -> DEBU b79 0xc00106c1f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [cauthdsl] func1 -> DEBU b7a 0xc00106c1f0 gate 1569284706883031100 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [policies] Evaluate -> DEBU b7b Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [policies] Evaluate -> DEBU b7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:06.883 UTC [common.configtx] verifyDeltaSet -> DEBU b7d Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b7e Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b7f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b80 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b81 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b82 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b83 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b84 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b85 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b86 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b87 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b88 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b89 Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 00:25:06.886 UTC [common.configtx] recurseConfigMap -> DEBU b8a Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b8b Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b8c Setting policy for key Endorsement to " +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b8d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b8e Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b8f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b90 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b91 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b92 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b93 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b94 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.channelconfig] NewStandardValues -> DEBU b95 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.channelconfig] initializeProtosStruct -> DEBU b96 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.channelconfig] initializeProtosStruct -> DEBU b97 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:06.887 UTC [common.channelconfig] initializeProtosStruct -> DEBU b98 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b99 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b9a Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] NewStandardValues -> DEBU b9b Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b9c Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b9d Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b9e Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b9f Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba0 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba1 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] NewStandardValues -> DEBU ba2 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba3 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] NewStandardValues -> DEBU ba4 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba5 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [common.channelconfig] validateMSP -> DEBU ba6 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [msp] newBccspMsp -> DEBU ba7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [msp] New -> DEBU ba8 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.888 UTC [msp] Setup -> DEBU ba9 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:25:06.893 UTC [msp.identity] newIdentity -> DEBU baa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.893 UTC [msp.identity] newIdentity -> DEBU bab Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.894 UTC [msp] Validate -> DEBU bac MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:25:06.894 UTC [common.channelconfig] NewStandardValues -> DEBU bad Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:25:06.894 UTC [common.channelconfig] initializeProtosStruct -> DEBU bae Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:25:06.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU baf Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.895 UTC [common.channelconfig] NewStandardValues -> DEBU bb0 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:06.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU bb1 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:06.895 UTC [common.channelconfig] NewStandardValues -> DEBU bb2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:06.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU bb3 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:06.896 UTC [common.channelconfig] Validate -> DEBU bb4 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:25:06.896 UTC [common.channelconfig] validateMSP -> DEBU bb5 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.896 UTC [msp] newBccspMsp -> DEBU bb6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.896 UTC [msp] New -> DEBU bb7 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.896 UTC [msp] Setup -> DEBU bb8 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.897 UTC [msp.identity] newIdentity -> DEBU bb9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.897 UTC [msp.identity] newIdentity -> DEBU bba Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.907 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU bbb Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.908 UTC [msp] Validate -> DEBU bbc MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:06.908 UTC [msp] getCertificationChain -> DEBU bbd MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:06.908 UTC [msp] hasOURole -> DEBU bbe MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:06.908 UTC [msp] getCertificationChain -> DEBU bbf MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:06.908 UTC [common.channelconfig] NewStandardValues -> DEBU bc0 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:06.908 UTC [common.channelconfig] initializeProtosStruct -> DEBU bc1 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:06.908 UTC [common.channelconfig] NewStandardValues -> DEBU bc2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:06.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU bc3 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.262 UTC [common.configtx] addToMap -> DEBU 954 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 00:25:07.285 UTC [common.configtx] addToMap -> DEBU 955 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:25:07.285 UTC [common.configtx] addToMap -> DEBU 956 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:07.285 UTC [common.configtx] addToMap -> DEBU 957 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.285 UTC [common.configtx] addToMap -> DEBU 958 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.288 UTC [common.configtx] addToMap -> DEBU 959 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:25:07.290 UTC [common.configtx] addToMap -> DEBU 95a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-09-24 00:25:07.291 UTC [common.configtx] addToMap -> DEBU 95b Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:07.291 UTC [common.configtx] addToMap -> DEBU 95c Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-09-24 00:25:07.292 UTC [common.configtx] addToMap -> DEBU 95d Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:25:06.909 UTC [common.channelconfig] Validate -> DEBU bc4 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:25:06.909 UTC [common.channelconfig] validateMSP -> DEBU bc5 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.909 UTC [msp] newBccspMsp -> DEBU bc6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.909 UTC [msp] New -> DEBU bc7 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.909 UTC [msp] Setup -> DEBU bc8 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.909 UTC [msp.identity] newIdentity -> DEBU bc9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.910 UTC [msp.identity] newIdentity -> DEBU bca Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.911 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU bcb Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.911 UTC [msp] Validate -> DEBU bcc MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:06.911 UTC [msp] getCertificationChain -> DEBU bcd MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [msp] hasOURole -> DEBU bce MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [msp] getCertificationChain -> DEBU bcf MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [msp] Setup -> DEBU bd0 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [msp] Setup -> DEBU bd1 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd5 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd6 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd7 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd8 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd9 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bda Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU bdb Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU bdc Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU bdd Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU bde Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU bdf Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be0 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be1 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be2 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be3 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be4 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be5 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be6 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be7 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be8 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU be9 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bea Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU beb Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bec Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bed Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 00:25:07.292 UTC [common.configtx] addToMap -> DEBU 95e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-09-24 00:25:07.292 UTC [common.configtx] addToMap -> DEBU 95f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 00:25:07.293 UTC [comm.grpc.server] 1 -> INFO 960 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.292Z grpc.peer_address=172.18.0.5:49100 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=190.6µs +peer0.org1.example.com | "2019-09-24 00:25:07.292 UTC [common.configtx] addToMap -> DEBU 961 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-09-24 00:25:07.295 UTC [common.configtx] addToMap -> DEBU 962 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 963 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 964 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 965 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 966 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 967 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 968 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 969 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 96a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 96b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:25:07.298 UTC [msp] GetDefaultSigningIdentity -> DEBU 96c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.298 UTC [msp.identity] Sign -> DEBU 96d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:07.298 UTC [msp.identity] Sign -> DEBU 96e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:07.298 UTC [gossip.comm] authenticateRemotePeer -> DEBU 96f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:49100" +peer0.org1.example.com | "2019-09-24 00:25:07.298 UTC [gossip.comm] authenticateRemotePeer -> DEBU 970 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49100" +peer0.org1.example.com | "2019-09-24 00:25:07.299 UTC [msp.identity] Verify -> DEBU 971 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-09-24 00:25:07.299 UTC [msp.identity] Verify -> DEBU 972 Verify: sig = 00000000 30 45 02 21 00 b7 39 b6 14 d8 22 ef 30 7b 51 ab |0E.!..9...".0{Q.| +peer0.org1.example.com | 00000010 27 eb 54 99 a8 54 07 f1 e5 4d 7c fb 48 44 f2 9a |'.T..T...M|.HD..| +peer0.org1.example.com | 00000020 49 9b 52 54 fd 02 20 56 91 be e3 db 0f 5a 76 8b |I.RT.. V.....Zv.| +peer0.org1.example.com | 00000030 63 fa 4e 2f 6c 8f 54 c4 88 4c cb b7 23 81 c7 34 |c.N/l.T..L..#..4| +peer0.org1.example.com | 00000040 07 93 1a 1e 33 9d ac |....3..|" +peer0.org1.example.com | "2019-09-24 00:25:07.299 UTC [gossip.comm] authenticateRemotePeer -> DEBU 973 Authenticated 172.18.0.5:49100" +peer0.org1.example.com | "2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 974 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.299 UTC [gossip.comm] GossipStream -> DEBU 975 Servicing 172.18.0.5:49100" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [gossip.comm] serviceConnection -> DEBU 976 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [gossip.comm] writeToStream -> DEBU 977 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 978 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 979 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [grpc] infof -> DEBU 97a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 97b Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 97c Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [gossip.comm] readFromStream -> DEBU 97d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 97e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 97f Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 980 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 981 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf2 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bf6 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bf7 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bf8 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bf9 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bfa Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bfb Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bfc Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bfd Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bfe Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bff Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c00 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c01 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c02 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c03 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c04 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c05 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c06 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c07 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c08 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c09 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c0a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c0b Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c0c Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c0d Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c0e Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:25:06.917 UTC [common.configtx] addToMap -> DEBU c0f Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:06.917 UTC [common.configtx] addToMap -> DEBU c10 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.917 UTC [common.configtx] addToMap -> DEBU c11 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [common.configtx] addToMap -> DEBU c12 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [common.configtx] addToMap -> DEBU c13 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [common.configtx] addToMap -> DEBU c14 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [common.configtx] addToMap -> DEBU c15 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [common.configtx] addToMap -> DEBU c16 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [common.channelconfig] LogSanityChecks -> DEBU c17 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [common.channelconfig] LogSanityChecks -> DEBU c18 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c19 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c1a Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c1b Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c1c Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c1d Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c1e Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.919 UTC [common.channelconfig] LogSanityChecks -> DEBU c1f As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 00:25:06.919 UTC [common.channelconfig] LogSanityChecks -> DEBU c20 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 00:25:06.919 UTC [common.channelconfig] LogSanityChecks -> DEBU c21 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 00:25:06.919 UTC [policies] Manager -> DEBU c22 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 00:25:06.919 UTC [policies] Manager -> DEBU c23 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:06.919 UTC [policies] Manager -> DEBU c24 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:25:06.919 UTC [policies] Manager -> DEBU c25 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 00:25:06.919 UTC [policies] Manager -> DEBU c26 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:06.919 UTC [common.channelconfig] LogSanityChecks -> DEBU c27 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 00:25:06.920 UTC [common.channelconfig] LogSanityChecks -> DEBU c28 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 00:25:06.920 UTC [common.channelconfig] LogSanityChecks -> DEBU c29 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 00:25:06.920 UTC [common.channelconfig] LogSanityChecks -> DEBU c2a As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 00:25:06.920 UTC [common.capabilities] Supported -> DEBU c2b Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:25:06.920 UTC [common.capabilities] Supported -> DEBU c2c Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:25:06.920 UTC [msp] GetDefaultSigningIdentity -> DEBU c2d Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:25:06.920 UTC [msp] GetDefaultSigningIdentity -> DEBU c2e Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:25:06.920 UTC [msp.identity] Sign -> DEBU c2f Sign: plaintext: 0AD2060A1B08011A0608E2C4A5EC0522...6F5DC62E281004EFF93E07B72997A710 " +orderer0.example.com | "2019-09-24 00:25:06.921 UTC [msp.identity] Sign -> DEBU c30 Sign: digest: 1969A979A8645A0C78D06011EA0C33C3D217D73C65FEC1EA3C0F0FFA411ED65F " +orderer0.example.com | "2019-09-24 00:25:06.921 UTC [policies] Evaluate -> DEBU c31 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 00:25:06.921 UTC [policies] Evaluate -> DEBU c32 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:06.921 UTC [policies] Evaluate -> DEBU c33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 00:25:06.921 UTC [policies] Evaluate -> DEBU c34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:06.921 UTC [policies] Evaluate -> DEBU c35 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 00:25:06.921 UTC [msp] DeserializeIdentity -> DEBU c36 Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:06.921 UTC [msp.identity] newIdentity -> DEBU c37 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.922 UTC [cauthdsl] func1 -> DEBU c38 0xc001164020 gate 1569284706922227300 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:06.922 UTC [cauthdsl] func2 -> DEBU c39 0xc001164020 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:06.922 UTC [cauthdsl] func2 -> DEBU c3a 0xc001164020 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:06.922 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c3b Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 00:25:06.922 UTC [msp] Validate -> DEBU c3c MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:25:06.922 UTC [cauthdsl] func2 -> DEBU c3d 0xc001164020 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:25:06.922 UTC [msp.identity] Verify -> DEBU c3e Verify: digest = 00000000 19 69 a9 79 a8 64 5a 0c 78 d0 60 11 ea 0c 33 c3 |.i.y.dZ.x.`...3.| +orderer0.example.com | 00000010 d2 17 d7 3c 65 fe c1 ea 3c 0f 0f fa 41 1e d6 5f |... DEBU c3f Verify: sig = 00000000 30 44 02 20 57 8a a0 c1 82 87 03 f9 fb 2b 7f ba |0D. W........+..| +orderer0.example.com | 00000010 1a 89 9a c2 48 7a 25 b3 79 92 cd 9d 9b 5f d1 3b |....Hz%.y...._.;| +orderer0.example.com | 00000020 fb f7 76 34 02 20 17 6f c5 03 55 a0 55 88 4c e9 |..v4. .o..U.U.L.| +orderer0.example.com | 00000030 eb df 54 19 21 e2 6c 02 7d cf 7b 6f d2 a7 2e e6 |..T.!.l.}.{o....| +orderer0.example.com | 00000040 b5 35 1b 9c 5d 9a |.5..].|" +orderer0.example.com | "2019-09-24 00:25:06.923 UTC [cauthdsl] func2 -> DEBU c40 0xc001164020 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:25:06.923 UTC [cauthdsl] func1 -> DEBU c41 0xc001164020 gate 1569284706922227300 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c42 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c43 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c44 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c45 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c46 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c47 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [orderer.common.msgprocessor] Apply -> DEBU c48 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] NewStandardValues -> DEBU c49 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c4a Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c4b Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c4c Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c4d Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c4e Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] NewStandardValues -> DEBU c4f Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c50 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c51 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c52 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c53 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c54 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c55 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] NewStandardValues -> DEBU c56 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c57 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:25:06.925 UTC [common.channelconfig] NewStandardValues -> DEBU c58 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:06.925 UTC [common.channelconfig] initializeProtosStruct -> DEBU c59 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 982 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 983 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 984 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 985 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 986 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 987 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 988 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 989 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98a Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98b Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98c Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98d Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98e Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98f Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 990 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 991 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 992 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 993 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 994 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 995 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 996 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 997 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 998 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 999 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 99a As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 99b Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 99c Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 99d Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 99e Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 99f Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:25:07.306 UTC [common.channelconfig] LogSanityChecks -> DEBU 9a0 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-09-24 00:25:07.306 UTC [common.channelconfig] LogSanityChecks -> DEBU 9a1 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | "2019-09-24 00:25:07.306 UTC [common.channelconfig] LogSanityChecks -> DEBU 9a2 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | "2019-09-24 00:25:07.306 UTC [common.channelconfig] LogSanityChecks -> DEBU 9a3 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-09-24 00:25:07.306 UTC [common.capabilities] Supported -> DEBU 9a4 Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 00:25:07.306 UTC [common.capabilities] Supported -> DEBU 9a5 Channel capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 00:25:07.306 UTC [gossip.service] ProcessConfigUpdate -> DEBU 9a6 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:07.307 UTC [gossip.service] ProcessConfigUpdate -> DEBU 9a7 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:07.307 UTC [gossip.service] updateAnchors -> DEBU 9a8 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-09-24 00:25:07.307 UTC [gossip.election] waitForInterrupt -> DEBU 9a9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.307 UTC [gossip.election] IsLeader -> DEBU 9aa c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:25:07.307 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ab Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.307 UTC [msp.identity] Sign -> DEBU 9ac Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510031801 " +peer0.org1.example.com | "2019-09-24 00:25:07.307 UTC [msp.identity] Sign -> DEBU 9ad Sign: digest: 3454F2E0A59C274436AB7D95996D4DD5FAE89FC84AB984B1676CA37C828C75A6 " +peer0.org1.example.com | "2019-09-24 00:25:07.308 UTC [gossip.election] waitForInterrupt -> DEBU 9ae c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:25:07.308 UTC [gossip.service] updateAnchors -> DEBU 9af Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +peer0.org1.example.com | "2019-09-24 00:25:07.308 UTC [gossip.service] updateAnchors -> DEBU 9b0 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:07.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.308 UTC [grpc] infof -> DEBU 9b2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:07.309 UTC [gossip.comm] readFromStream -> DEBU 9b3 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 00:25:07.309 UTC [gossip.comm] func2 -> DEBU 9b4 Client 172.18.0.5:49100 disconnected" +peer0.org1.example.com | "2019-09-24 00:25:07.309 UTC [comm.grpc.server] 1 -> INFO 9b5 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:17.298Z grpc.peer_address=172.18.0.5:49100 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.9278ms +peer0.org1.example.com | "2019-09-24 00:25:07.310 UTC [gossip.comm] writeToStream -> DEBU 9b6 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:07.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.310 UTC [policies] Evaluate -> DEBU 9b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.310 UTC [policies] Evaluate -> DEBU 9b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.310 UTC [policies] Evaluate -> DEBU 9ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.311 UTC [msp] DeserializeIdentity -> DEBU 9bb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.311 UTC [msp.identity] newIdentity -> DEBU 9bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.316 UTC [cauthdsl] func1 -> DEBU 9bd 0xc003b6f020 gate 1569284707316785300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.316 UTC [cauthdsl] func2 -> DEBU 9be 0xc003b6f020 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.316 UTC [cauthdsl] func2 -> DEBU 9bf 0xc003b6f020 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.317 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9c0 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.317 UTC [msp] Validate -> DEBU 9c1 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:07.317 UTC [msp] getCertificationChain -> DEBU 9c2 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:07.317 UTC [cauthdsl] func2 -> DEBU 9c3 0xc003b6f020 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.317 UTC [msp.identity] Verify -> DEBU 9c4 Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +peer0.org1.example.com | 00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +peer0.org1.example.com | "2019-09-24 00:25:07.317 UTC [msp.identity] Verify -> DEBU 9c5 Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +peer0.org1.example.com | 00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +peer0.org1.example.com | 00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +peer0.org1.example.com | 00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +peer0.org1.example.com | 00000040 a8 ad f9 eb 4c ce |....L.|" +peer0.org1.example.com | "2019-09-24 00:25:07.318 UTC [cauthdsl] func2 -> DEBU 9c6 0xc003b6f020 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.318 UTC [cauthdsl] func1 -> DEBU 9c7 0xc003b6f020 gate 1569284707316785300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.318 UTC [policies] Evaluate -> DEBU 9c8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.318 UTC [policies] Evaluate -> DEBU 9c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.321 UTC [policies] Evaluate -> DEBU 9ca Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.322 UTC [policies] Evaluate -> DEBU 9cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.322 UTC [msp] DeserializeIdentity -> DEBU 9cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9cd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.323 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9ce Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.323 UTC [policies] Evaluate -> DEBU 9cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.326 UTC [policies] Evaluate -> DEBU 9d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.327 UTC [policies] Evaluate -> DEBU 9d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.327 UTC [cauthdsl] func1 -> DEBU 9d2 0xc003b80da0 gate 1569284707327630100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.327 UTC [cauthdsl] func2 -> DEBU 9d3 0xc003b80da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.327 UTC [cauthdsl] func2 -> DEBU 9d4 0xc003b80da0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.327 UTC [cauthdsl] func2 -> DEBU 9d5 0xc003b80da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.327 UTC [cauthdsl] func2 -> DEBU 9d6 0xc003b80da0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.327 UTC [cauthdsl] func1 -> DEBU 9d7 0xc003b80da0 gate 1569284707327630100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.328 UTC [policies] Evaluate -> DEBU 9d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.328 UTC [policies] Evaluate -> DEBU 9d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.328 UTC [policies] Evaluate -> DEBU 9da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.328 UTC [cauthdsl] func1 -> DEBU 9db 0xc003b815e0 gate 1569284707328154600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.328 UTC [cauthdsl] func2 -> DEBU 9dc 0xc003b815e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.328 UTC [cauthdsl] func2 -> DEBU 9dd 0xc003b815e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.328 UTC [cauthdsl] func2 -> DEBU 9de 0xc003b815e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.328 UTC [msp.identity] Verify -> DEBU 9df Verify: digest = 00000000 8c 64 c2 57 71 bd 4e 49 a7 31 6f ab 28 9e 18 d2 |.d.Wq.NI.1o.(...| +peer0.org1.example.com | 00000010 06 d1 b5 0f ad 29 54 78 1c 78 c0 ee fd c4 2a f0 |.....)Tx.x....*.|" +peer0.org1.example.com | "2019-09-24 00:25:07.328 UTC [msp.identity] Verify -> DEBU 9e0 Verify: sig = 00000000 30 44 02 20 55 e6 9d 11 11 3c 57 86 20 a6 39 ad |0D. U.... DEBU 9e1 0xc003b815e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.329 UTC [cauthdsl] func1 -> DEBU 9e2 0xc003b815e0 gate 1569284707328154600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9e5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.329 UTC [msp] DeserializeIdentity -> DEBU 9e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.329 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9e8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.329 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9e9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.333 UTC [policies] Evaluate -> DEBU 9ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.333 UTC [cauthdsl] func1 -> DEBU 9ed 0xc003bba6c0 gate 1569284707333183300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.333 UTC [cauthdsl] func2 -> DEBU 9ee 0xc003bba6c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.333 UTC [cauthdsl] func2 -> DEBU 9ef 0xc003bba6c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.333 UTC [cauthdsl] func2 -> DEBU 9f0 0xc003bba6c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.333 UTC [cauthdsl] func2 -> DEBU 9f1 0xc003bba6c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.333 UTC [cauthdsl] func1 -> DEBU 9f2 0xc003bba6c0 gate 1569284707333183300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.333 UTC [policies] Evaluate -> DEBU 9f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.333 UTC [policies] Evaluate -> DEBU 9f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.333 UTC [policies] Evaluate -> DEBU 9f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.334 UTC [cauthdsl] func1 -> DEBU 9f6 0xc003bbaf00 gate 1569284707333977200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.334 UTC [cauthdsl] func2 -> DEBU 9f7 0xc003bbaf00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.334 UTC [cauthdsl] func2 -> DEBU 9f8 0xc003bbaf00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.343 UTC [cauthdsl] func2 -> DEBU 9f9 0xc003bbaf00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.343 UTC [msp.identity] Verify -> DEBU 9fa Verify: digest = 00000000 24 a6 67 ec 93 80 1b 1a f8 a7 1f 3f 02 93 6b 08 |$.g........?..k.| +peer0.org1.example.com | 00000010 3d 1c 5b eb 65 f9 87 47 b6 92 d6 53 36 d1 44 ec |=.[.e..G...S6.D.|" +peer0.org1.example.com | "2019-09-24 00:25:07.344 UTC [msp.identity] Verify -> DEBU 9fb Verify: sig = 00000000 30 44 02 20 5a 67 eb 00 01 36 77 60 49 3a cf c9 |0D. Zg...6w`I:..| +peer0.org1.example.com | 00000010 01 18 a3 c8 c6 e9 0a 53 c0 8e 4e 1a 49 bc 73 1c |.......S..N.I.s.| +peer0.org1.example.com | 00000020 b1 8d e9 d5 02 20 7a 22 f4 df cc 5a 24 c7 53 22 |..... z"...Z$.S"| +peer0.org1.example.com | 00000030 18 57 47 00 77 c6 6d 00 59 78 66 79 fa cd 47 0d |.WG.w.m.Yxfy..G.| +peer0.org1.example.com | 00000040 b9 e2 9d e3 78 4a |....xJ|" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [cauthdsl] func2 -> DEBU 9fc 0xc003bbaf00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [cauthdsl] func1 -> DEBU 9fd 0xc003bbaf00 gate 1569284707333977200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [policies] Evaluate -> DEBU 9fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [policies] Evaluate -> DEBU 9ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [policies] Evaluate -> DEBU a00 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [policies] Evaluate -> DEBU a01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [gossip.gossip] JoinChan -> INFO a02 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [gossip.gossip] learnAnchorPeers -> INFO a03 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [gossip.gossip] learnAnchorPeers -> INFO a04 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [gossip.gossip] learnAnchorPeers -> INFO a05 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [gossip.discovery] Connect -> DEBU a06 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [gossip.discovery] Connect -> DEBU a07 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.347 UTC [gossip.service] updateEndpoints -> DEBU a08 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-09-24 00:25:07.348 UTC [msp] DeserializeIdentity -> DEBU a09 Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:06.925 UTC [common.channelconfig] validateMSP -> DEBU c5a Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:06.925 UTC [msp] newBccspMsp -> DEBU c5b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.925 UTC [msp] New -> DEBU c5c Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.925 UTC [msp] Setup -> DEBU c5d Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:25:06.932 UTC [msp.identity] newIdentity -> DEBU c5e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.932 UTC [msp.identity] newIdentity -> DEBU c5f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.933 UTC [msp] Validate -> DEBU c60 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:25:06.933 UTC [common.channelconfig] NewStandardValues -> DEBU c61 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:25:06.933 UTC [common.channelconfig] initializeProtosStruct -> DEBU c62 Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:25:06.933 UTC [common.channelconfig] initializeProtosStruct -> DEBU c63 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.933 UTC [common.channelconfig] NewStandardValues -> DEBU c64 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:06.933 UTC [common.channelconfig] initializeProtosStruct -> DEBU c65 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:06.933 UTC [common.channelconfig] NewStandardValues -> DEBU c66 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:06.933 UTC [common.channelconfig] initializeProtosStruct -> DEBU c67 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:06.934 UTC [common.channelconfig] Validate -> DEBU c68 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:25:06.934 UTC [common.channelconfig] validateMSP -> DEBU c69 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.934 UTC [msp] newBccspMsp -> DEBU c6a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.934 UTC [msp] New -> DEBU c6b Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.934 UTC [msp] Setup -> DEBU c6c Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.934 UTC [msp.identity] newIdentity -> DEBU c6d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.934 UTC [msp.identity] newIdentity -> DEBU c6e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.935 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c6f Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.935 UTC [msp] Validate -> DEBU c70 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:06.935 UTC [msp] getCertificationChain -> DEBU c71 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:06.937 UTC [msp] hasOURole -> DEBU c72 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:06.937 UTC [msp] getCertificationChain -> DEBU c73 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:06.937 UTC [common.channelconfig] NewStandardValues -> DEBU c74 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:06.938 UTC [common.channelconfig] initializeProtosStruct -> DEBU c75 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:06.938 UTC [common.channelconfig] NewStandardValues -> DEBU c76 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:06.938 UTC [common.channelconfig] initializeProtosStruct -> DEBU c77 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:06.938 UTC [common.channelconfig] Validate -> DEBU c78 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:25:06.938 UTC [common.channelconfig] validateMSP -> DEBU c79 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.938 UTC [msp] newBccspMsp -> DEBU c7a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.938 UTC [msp] New -> DEBU c7b Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:06.938 UTC [msp] Setup -> DEBU c7c Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.350 UTC [msp] DeserializeIdentity -> DEBU a0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.351 UTC [peer] updateTrustedRoots -> DEBU a0d Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:07.353 UTC [comm.grpc.server] 1 -> INFO a0e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.326Z grpc.peer_address=172.18.0.8:34574 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147.5µs +peer0.org1.example.com | "2019-09-24 00:25:07.354 UTC [msp] DeserializeIdentity -> DEBU a0f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.354 UTC [msp] DeserializeIdentity -> DEBU a10 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.354 UTC [msp] DeserializeIdentity -> DEBU a11 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.354 UTC [msp] DeserializeIdentity -> DEBU a12 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.373 UTC [gossip.comm] Send -> DEBU a13 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.373 UTC [msp] DeserializeIdentity -> DEBU a14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.373 UTC [msp] DeserializeIdentity -> DEBU a15 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.374 UTC [gossip.comm] sendToEndpoint -> DEBU a16 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.374 UTC [gossip.comm] createConnection -> DEBU a17 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:07.389 UTC [grpc] DialContext -> DEBU a18 parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:25:07.389 UTC [grpc] DialContext -> DEBU a19 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:25:07.389 UTC [grpc] watcher -> DEBU a1a ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 00:25:07.389 UTC [grpc] switchBalancer -> DEBU a1b ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:25:07.389 UTC [grpc] HandleSubConnStateChange -> DEBU a1c pickfirstBalancer: HandleSubConnStateChange: 0xc003c22120, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:25:07.396 UTC [grpc] DialContext -> DEBU a1d parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:25:07.396 UTC [grpc] DialContext -> DEBU a1e scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:25:07.401 UTC [grpc] watcher -> DEBU a1f ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 00:25:07.401 UTC [grpc] switchBalancer -> DEBU a20 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:25:07.401 UTC [grpc] HandleSubConnStateChange -> DEBU a21 pickfirstBalancer: HandleSubConnStateChange: 0xc003c42850, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:25:07.414 UTC [msp] GetDefaultSigningIdentity -> DEBU a22 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.414 UTC [msp.identity] Sign -> DEBU a24 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:07.414 UTC [msp.identity] Sign -> DEBU a25 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:07.414 UTC [comm.grpc.server] 1 -> INFO a23 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.414Z grpc.peer_address=172.18.0.6:43264 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=127µs +peer0.org1.example.com | "2019-09-24 00:25:07.416 UTC [gossip.comm] authenticateRemotePeer -> DEBU a26 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:34574" +peer0.org1.example.com | "2019-09-24 00:25:07.424 UTC [gossip.comm] authenticateRemotePeer -> DEBU a27 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:34574" +peer0.org1.example.com | "2019-09-24 00:25:07.424 UTC [msp] DeserializeIdentity -> DEBU a28 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.424 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.430 UTC [msp] DeserializeIdentity -> DEBU a2a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.431 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a2b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.431 UTC [msp] DeserializeIdentity -> DEBU a2c Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:06.947 UTC [msp.identity] newIdentity -> DEBU c7d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.948 UTC [msp.identity] newIdentity -> DEBU c7e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:06.958 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c7f Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.958 UTC [msp] Validate -> DEBU c80 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:06.958 UTC [msp] getCertificationChain -> DEBU c81 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:06.959 UTC [msp] hasOURole -> DEBU c82 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:06.959 UTC [msp] getCertificationChain -> DEBU c83 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:06.959 UTC [msp] Setup -> DEBU c84 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:25:06.959 UTC [msp] Setup -> DEBU c85 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:25:06.959 UTC [policies] NewManagerImpl -> DEBU c86 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:06.959 UTC [policies] NewManagerImpl -> DEBU c87 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:06.959 UTC [policies] NewManagerImpl -> DEBU c88 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c89 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8a Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8b Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8c Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8d Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8e Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8f Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c90 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c91 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c92 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c93 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c94 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c95 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c96 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c97 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c98 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c99 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c9a Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c9b Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c9c Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [common.configtx] addToMap -> DEBU c9d Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:06.961 UTC [common.configtx] addToMap -> DEBU c9e Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU c9f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca0 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca7 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca8 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca9 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU caa Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:25:06.963 UTC [common.configtx] addToMap -> DEBU cab Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cac Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cad Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cae Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU caf Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb0 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb5 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cb6 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cb7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cb8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cb9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cba Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cbb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cbc Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:25:06.986 UTC [common.configtx] addToMap -> DEBU cbd Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.986 UTC [common.configtx] addToMap -> DEBU cbe Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cbf Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc0 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc1 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc2 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc3 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc4 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc5 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc6 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc7 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc8 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc9 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cca Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:25:06.996 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccb Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-09-24 00:25:06.996 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccc Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +orderer0.example.com | "2019-09-24 00:25:06.996 UTC [orderer.consensus.etcdraft] propose -> INFO ccd Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:25:06.996 UTC [orderer.consensus.etcdraft] serveRequest -> INFO cce Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:25:06.996 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.3µs " +orderer0.example.com | "2019-09-24 00:25:06.996 UTC [orderer.common.broadcast] ProcessMessage -> DEBU cd0 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:60706" +orderer0.example.com | "2019-09-24 00:25:07.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.9µs " +orderer0.example.com | "2019-09-24 00:25:07.003 UTC [orderer.common.broadcast] Handle -> WARN cd2 Error reading from 172.18.0.9:60706: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:25:07.003 UTC [orderer.common.server] func1 -> DEBU cd3 Closing Broadcast stream" +orderer0.example.com | "2019-09-24 00:25:07.003 UTC [comm.grpc.server] 1 -> INFO cd4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:60706 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=138.1309ms +orderer0.example.com | "2019-09-24 00:25:07.003 UTC [grpc] infof -> DEBU cd5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:25:07.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.003 UTC [orderer.consensus.etcdraft] 2 -> DEBU cd7 Proposed block [2] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:25:07.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd8 Sending msg of 22873 bytes to 2 on channel businesschannel took 111.4µs" +orderer0.example.com | "2019-09-24 00:25:07.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd9 Sending msg of 22873 bytes to 3 on channel businesschannel took 12.7µs" +orderer0.example.com | "2019-09-24 00:25:07.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU cda Send of ConsensusRequest for channel businesschannel with payload of size 22873 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +orderer0.example.com | "2019-09-24 00:25:07.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdb Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +peer0.org1.example.com | "2019-09-24 00:25:07.432 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a2d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a2e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.436 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a2f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.436 UTC [policies] Evaluate -> DEBU a30 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.436 UTC [policies] Evaluate -> DEBU a31 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.436 UTC [policies] Evaluate -> DEBU a32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.449 UTC [msp] GetDefaultSigningIdentity -> DEBU a33 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.449 UTC [msp.identity] Sign -> DEBU a34 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:07.449 UTC [msp.identity] Sign -> DEBU a35 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:07.454 UTC [gossip.comm] authenticateRemotePeer -> DEBU a36 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43264" +peer0.org1.example.com | "2019-09-24 00:25:07.455 UTC [gossip.comm] authenticateRemotePeer -> DEBU a37 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:43264" +peer0.org1.example.com | "2019-09-24 00:25:07.455 UTC [msp] DeserializeIdentity -> DEBU a38 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.473 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.474 UTC [msp] DeserializeIdentity -> DEBU a3a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.437 UTC [cauthdsl] func1 -> DEBU a3b 0xc003cb29c0 gate 1569284707437540100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a3c 0xc003cb29c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a3d 0xc003cb29c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a3e 0xc003cb29c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a3f 0xc003cb29c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [cauthdsl] func1 -> DEBU a40 0xc003cb29c0 gate 1569284707437540100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [policies] Evaluate -> DEBU a41 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [policies] Evaluate -> DEBU a42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [policies] Evaluate -> DEBU a43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [cauthdsl] func1 -> DEBU a44 0xc003cb3a30 gate 1569284707476705500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a45 0xc003cb3a30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a46 0xc003cb3a30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a47 0xc003cb3a30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.476 UTC [msp.identity] Verify -> DEBU a48 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [msp.identity] Verify -> DEBU a49 Verify: sig = 00000000 30 44 02 20 5f 9d be b8 3b ad 70 eb b5 0c cc 91 |0D. _...;.p.....| +peer0.org1.example.com | 00000010 fa 74 d5 c1 5f 93 df 66 ee d0 84 04 79 50 9a 7c |.t.._..f....yP.|| +peer0.org1.example.com | 00000020 70 6c 36 d2 02 20 22 dd 27 7c b5 e5 a0 58 13 ac |pl6.. ".'|...X..| +peer0.org1.example.com | 00000030 9c 68 4b e0 b8 a1 a5 0d 3a 24 13 3c 1c fe 4f 68 |.hK.....:$.<..Oh| +peer0.org1.example.com | 00000040 08 71 cd e8 57 5b |.q..W[|" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [cauthdsl] func2 -> DEBU a4a 0xc003cb3a30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [cauthdsl] func1 -> DEBU a4b 0xc003cb3a30 gate 1569284707476705500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [policies] Evaluate -> DEBU a4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [policies] Evaluate -> DEBU a4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [policies] Evaluate -> DEBU a4e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [policies] Evaluate -> DEBU a4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [gossip.comm] authenticateRemotePeer -> DEBU a50 Authenticated 172.18.0.8:34574" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [gossip.comm] GossipStream -> DEBU a51 Servicing 172.18.0.8:34574" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [gossip.comm] readFromStream -> DEBU a52 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [gossip.comm] writeToStream -> DEBU a53 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [gossip.comm] serviceConnection -> DEBU a54 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [gossip.comm] func2 -> DEBU a55 Client 172.18.0.8:34556 disconnected" +peer0.org1.example.com | "2019-09-24 00:25:07.477 UTC [comm.grpc.server] 1 -> INFO a56 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:34556 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.5237619s +peer0.org1.example.com | "2019-09-24 00:25:07.478 UTC [gossip.comm] serviceConnection -> DEBU a57 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:25:07.478 UTC [gossip.comm] func2 -> DEBU a58 Client 172.18.0.8:34574 disconnected" +peer0.org1.example.com | "2019-09-24 00:25:07.478 UTC [comm.grpc.server] 1 -> INFO a59 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:17.413Z grpc.peer_address=172.18.0.8:34574 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=63.8145ms +peer0.org1.example.com | "2019-09-24 00:25:07.478 UTC [gossip.comm] writeToStream -> DEBU a5a Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:07.479 UTC [gossip.gossip] handleMessage -> DEBU a5b Entering, 172.18.0.6:43244 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:2696917409125458741 tag:EMPTY mem_req:F\266\2123\307\221DX\265\273\002 \030I\262j\000\365F\007\364\266,?\276\370\236j\014T\246V;\177\362\334\343\213\274\006\274\335:R" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.479 UTC [gossip.gossip] handleMessage -> DEBU a5c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.479 UTC [gossip.discovery] handleMsgFromComm -> DEBU a5d Got message: GossipMessage: nonce:2696917409125458741 tag:EMPTY mem_req:F\266\2123\307\221DX\265\273\002 \030I\262j\000\365F\007\364\266,?\276\370\236j\014T\246V;\177\362\334\343\213\274\006\274\335:R" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.479 UTC [gossip.gossip] ValidateAliveMsg -> DEBU a5e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.479 UTC [msp] DeserializeIdentity -> DEBU a5f Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:07.014 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdc Send of ConsensusRequest for channel businesschannel with payload of size 22873 to orderer1.example.com(orderer1.example.com:7050) took 9.1532ms " +orderer0.example.com | "2019-09-24 00:25:07.014 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.3µs " +orderer0.example.com | "2019-09-24 00:25:07.015 UTC [orderer.common.cluster.step] handleMessage -> DEBU cde Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.016 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdf Sending msg of 28 bytes to 3 on channel businesschannel took 1.2893ms" +orderer0.example.com | "2019-09-24 00:25:07.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.5µs " +orderer0.example.com | "2019-09-24 00:25:07.017 UTC [common.deliver] Handle -> WARN ce1 Error reading from 172.18.0.9:60704: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:25:07.017 UTC [orderer.common.server] func1 -> DEBU ce2 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:25:07.018 UTC [comm.grpc.server] 1 -> INFO ce3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60704 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=191.0169ms +orderer0.example.com | "2019-09-24 00:25:07.018 UTC [grpc] infof -> DEBU ce4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:25:07.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce7 Sending msg of 28 bytes to 2 on channel businesschannel took 11.9µs" +orderer0.example.com | "2019-09-24 00:25:07.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce8 Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +orderer0.example.com | "2019-09-24 00:25:07.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.3µs " +orderer0.example.com | "2019-09-24 00:25:07.019 UTC [orderer.consensus.etcdraft] writeBlock -> INFO cea Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:25:07.019 UTC [common.configtx] addToMap -> DEBU ceb Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cec Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU ced Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cee Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cef Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf3 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf4 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf5 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf7 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cfa Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cfb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:07.020 UTC [common.configtx] verifyDeltaSet -> DEBU cfc Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.021 UTC [common.configtx] policyForItem -> DEBU cfd Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU cfe Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU cff Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU d00 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU d01 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU d02 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU d03 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:07.023 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU d05 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-09-24 00:25:07.028 UTC [policies] Manager -> DEBU d06 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:07.028 UTC [policies] Manager -> DEBU d07 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.028 UTC [policies] Manager -> DEBU d08 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-09-24 00:25:07.028 UTC [policies] Evaluate -> DEBU d09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-09-24 00:25:07.029 UTC [cauthdsl] func1 -> DEBU d0a 0xc000398740 gate 1569284707029305000 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:07.029 UTC [cauthdsl] func2 -> DEBU d0b 0xc000398740 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:07.029 UTC [cauthdsl] func2 -> DEBU d0c 0xc000398740 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:07.029 UTC [cauthdsl] func2 -> DEBU d0d 0xc000398740 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:25:07.029 UTC [msp.identity] Verify -> DEBU d0e Verify: digest = 00000000 c7 15 61 1b b2 95 fa 58 ba 85 fe c1 31 30 21 87 |..a....X....10!.| +orderer0.example.com | 00000010 ff ba 08 45 5d c6 ac f3 4c 25 22 ca 2f 17 ea 97 |...E]...L%"./...|" +orderer0.example.com | "2019-09-24 00:25:07.029 UTC [msp.identity] Verify -> DEBU d0f Verify: sig = 00000000 30 45 02 21 00 98 5f 39 f5 66 76 09 9e c8 cd e3 |0E.!.._9.fv.....| +orderer0.example.com | 00000010 70 ff 4b d1 18 cd cd f5 28 b0 92 91 ed c0 20 3f |p.K.....(..... ?| +orderer0.example.com | 00000020 ec 6a 58 2b 2f 02 20 59 44 df b5 8f e0 ce 61 c8 |.jX+/. YD.....a.| +orderer0.example.com | 00000030 7c 9e c4 4d c5 31 fd 54 af 57 c3 f6 39 01 9a 59 ||..M.1.T.W..9..Y| +orderer0.example.com | 00000040 99 0e a7 45 58 9e 56 |...EX.V|" +orderer0.example.com | "2019-09-24 00:25:07.029 UTC [cauthdsl] func2 -> DEBU d10 0xc000398740 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:25:07.029 UTC [cauthdsl] func1 -> DEBU d11 0xc000398740 gate 1569284707029305000 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:25:07.029 UTC [policies] Evaluate -> DEBU d12 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:07.029 UTC [policies] Evaluate -> DEBU d13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:07.029 UTC [common.configtx] verifyDeltaSet -> DEBU d14 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d15 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d16 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d17 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d18 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d19 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d1a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d1b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d1c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d1d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d1e Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d1f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d20 Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d21 Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d22 Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d23 Setting policy for key Endorsement to " +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d24 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d25 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d26 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU d27 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.7µs " +orderer0.example.com | "2019-09-24 00:25:07.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU d28 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.061 UTC [orderer.common.cluster.step] handleMessage -> DEBU d29 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d2a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.072 UTC [common.configtx] recurseConfigMap -> DEBU d2b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.072 UTC [common.configtx] recurseConfigMap -> DEBU d2c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.072 UTC [common.configtx] recurseConfigMap -> DEBU d2d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.072 UTC [common.configtx] recurseConfigMap -> DEBU d2e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:25:07.072 UTC [common.channelconfig] NewStandardValues -> DEBU d2f Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:25:07.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU d30 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:07.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU d31 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:07.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU d32 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:07.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU d33 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:25:07.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU d34 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:07.073 UTC [common.channelconfig] NewStandardValues -> DEBU d35 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:25:07.074 UTC [common.channelconfig] initializeProtosStruct -> DEBU d36 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:25:07.074 UTC [common.channelconfig] initializeProtosStruct -> DEBU d37 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:25:07.074 UTC [common.channelconfig] initializeProtosStruct -> DEBU d38 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-09-24 00:25:07.475 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a60 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.483 UTC [grpc] infof -> DEBU a61 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:07.497 UTC [comm.grpc.server] 1 -> INFO a62 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.497Z grpc.peer_address=172.18.0.5:49112 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=154.8µs +peer0.org1.example.com | "2019-09-24 00:25:07.499 UTC [grpc] HandleSubConnStateChange -> DEBU a63 pickfirstBalancer: HandleSubConnStateChange: 0xc003c22120, READY" +peer0.org1.example.com | "2019-09-24 00:25:07.500 UTC [grpc] infof -> DEBU a64 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:07.483 UTC [msp] DeserializeIdentity -> DEBU a65 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.505 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a6a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a6b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [policies] Evaluate -> DEBU a6c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [policies] Evaluate -> DEBU a6d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [policies] Evaluate -> DEBU a6e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [cauthdsl] func1 -> DEBU a6f 0xc003d0f720 gate 1569284707510536000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [cauthdsl] func2 -> DEBU a70 0xc003d0f720 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [cauthdsl] func2 -> DEBU a71 0xc003d0f720 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [cauthdsl] func2 -> DEBU a72 0xc003d0f720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [cauthdsl] func2 -> DEBU a73 0xc003d0f720 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [cauthdsl] func1 -> DEBU a74 0xc003d0f720 gate 1569284707510536000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [policies] Evaluate -> DEBU a75 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [policies] Evaluate -> DEBU a76 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [policies] Evaluate -> DEBU a77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [cauthdsl] func1 -> DEBU a78 0xc003d0ff60 gate 1569284707511093500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [cauthdsl] func2 -> DEBU a79 0xc003d0ff60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [cauthdsl] func2 -> DEBU a7a 0xc003d0ff60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [cauthdsl] func2 -> DEBU a7b 0xc003d0ff60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [msp.identity] Verify -> DEBU a7c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [msp.identity] Verify -> DEBU a7d Verify: sig = 00000000 30 45 02 21 00 e0 f6 d2 99 98 4d 2e 1a 4a 98 f7 |0E.!......M..J..| +peer0.org1.example.com | 00000010 29 be f2 16 df 2c 25 a1 d7 c3 8c 8d be 0c 9d d7 |)....,%.........| +peer0.org1.example.com | 00000020 64 2f ba 05 8b 02 20 79 55 ae ef e1 8e 0c 72 76 |d/.... yU.....rv| +peer0.org1.example.com | 00000030 ef 7f 67 a0 ff 57 a5 24 a1 a2 f5 6e ec c3 cf f9 |..g..W.$...n....| +peer0.org1.example.com | 00000040 9e ab bf de f0 87 79 |......y|" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [cauthdsl] func2 -> DEBU a7e 0xc003d0ff60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [cauthdsl] func1 -> DEBU a7f 0xc003d0ff60 gate 1569284707511093500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [policies] Evaluate -> DEBU a80 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [policies] Evaluate -> DEBU a81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [policies] Evaluate -> DEBU a82 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [policies] Evaluate -> DEBU a83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [gossip.comm] authenticateRemotePeer -> DEBU a84 Authenticated 172.18.0.6:43264" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [gossip.comm] GossipStream -> DEBU a85 Servicing 172.18.0.6:43264" +peer0.org1.example.com | "2019-09-24 00:25:07.510 UTC [msp] GetDefaultSigningIdentity -> DEBU a69 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [msp.identity] Sign -> DEBU a86 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [msp.identity] Sign -> DEBU a87 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [gossip.comm] authenticateRemotePeer -> DEBU a88 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.511 UTC [gossip.comm] writeToStream -> DEBU a89 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:07.512 UTC [gossip.comm] serviceConnection -> DEBU a8a Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:25:07.512 UTC [gossip.comm] func2 -> DEBU a8b Client 172.18.0.6:43244 disconnected" +peer0.org1.example.com | "2019-09-24 00:25:07.512 UTC [comm.grpc.server] 1 -> INFO a8c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:43244 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.4658056s +peer0.org1.example.com | "2019-09-24 00:25:07.503 UTC [msp] GetDefaultSigningIdentity -> DEBU a67 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.512 UTC [msp.identity] Sign -> DEBU a8d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:07.512 UTC [msp.identity] Sign -> DEBU a8e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:07.512 UTC [gossip.comm] authenticateRemotePeer -> DEBU a8f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:49112" +peer0.org1.example.com | "2019-09-24 00:25:07.512 UTC [gossip.comm] authenticateRemotePeer -> DEBU a90 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49112" +peer0.org1.example.com | "2019-09-24 00:25:07.513 UTC [msp.identity] Verify -> DEBU a91 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-09-24 00:25:07.513 UTC [msp.identity] Verify -> DEBU a92 Verify: sig = 00000000 30 44 02 20 0f 9a 83 90 08 63 e7 24 21 d7 bb a9 |0D. .....c.$!...| +peer0.org1.example.com | 00000010 ba 53 9d 85 64 f2 4f 92 af c0 71 69 d2 bd 90 d8 |.S..d.O...qi....| +peer0.org1.example.com | 00000020 03 8d c1 42 02 20 64 8d 54 cd 1d 49 c4 af 7e cd |...B. d.T..I..~.| +peer0.org1.example.com | 00000030 95 ef e8 de 0d 67 64 69 61 f3 5d c7 3b 2d 1b 86 |.....gdia.].;-..| +peer0.org1.example.com | 00000040 49 b7 8a 66 50 f9 |I..fP.|" +peer0.org1.example.com | "2019-09-24 00:25:07.513 UTC [gossip.comm] authenticateRemotePeer -> DEBU a93 Authenticated 172.18.0.5:49112" +peer0.org1.example.com | "2019-09-24 00:25:07.513 UTC [gossip.comm] GossipStream -> DEBU a94 Servicing 172.18.0.5:49112" +peer0.org1.example.com | "2019-09-24 00:25:07.513 UTC [gossip.comm] serviceConnection -> DEBU a95 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:25:07.513 UTC [gossip.comm] func2 -> DEBU a96 Client 172.18.0.6:43264 disconnected" +orderer0.example.com | "2019-09-24 00:25:07.074 UTC [common.channelconfig] initializeProtosStruct -> DEBU d39 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:25:07.075 UTC [common.channelconfig] initializeProtosStruct -> DEBU d3a Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:25:07.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.075 UTC [common.channelconfig] initializeProtosStruct -> DEBU d3c Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:07.094 UTC [common.channelconfig] NewStandardValues -> DEBU d3d Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:25:07.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU d3e Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:25:07.094 UTC [common.channelconfig] NewStandardValues -> DEBU d3f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:07.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU d40 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:07.095 UTC [common.channelconfig] validateMSP -> DEBU d41 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:07.095 UTC [msp] newBccspMsp -> DEBU d42 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:07.095 UTC [msp] New -> DEBU d43 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:07.095 UTC [msp] Setup -> DEBU d44 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:25:07.097 UTC [msp.identity] newIdentity -> DEBU d45 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:07.098 UTC [msp.identity] newIdentity -> DEBU d46 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:07.100 UTC [msp] Validate -> DEBU d47 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:25:07.117 UTC [common.channelconfig] NewStandardValues -> DEBU d48 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:25:07.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU d49 Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:25:07.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU d4a Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:25:07.118 UTC [common.channelconfig] NewStandardValues -> DEBU d4b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:07.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU d4c Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:07.118 UTC [common.channelconfig] NewStandardValues -> DEBU d4d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:07.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU d4e Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:07.118 UTC [common.channelconfig] Validate -> DEBU d4f Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:25:07.118 UTC [common.channelconfig] validateMSP -> DEBU d50 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:25:07.118 UTC [msp] newBccspMsp -> DEBU d51 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:07.118 UTC [msp] New -> DEBU d52 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:07.118 UTC [msp] Setup -> DEBU d53 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:25:07.119 UTC [msp.identity] newIdentity -> DEBU d54 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:07.119 UTC [msp.identity] newIdentity -> DEBU d55 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:07.120 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d56 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:25:07.120 UTC [msp] Validate -> DEBU d57 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:07.120 UTC [msp] getCertificationChain -> DEBU d58 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:07.120 UTC [msp] hasOURole -> DEBU d59 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [msp] getCertificationChain -> DEBU d5a MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:07.513 UTC [comm.grpc.server] 1 -> INFO a97 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:17.448Z grpc.peer_address=172.18.0.6:43264 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=64.2558ms +peer0.org1.example.com | "2019-09-24 00:25:07.513 UTC [gossip.comm] readFromStream -> DEBU a98 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-09-24 00:25:07.513 UTC [gossip.comm] writeToStream -> DEBU a99 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:07.514 UTC [grpc] HandleSubConnStateChange -> DEBU a9a pickfirstBalancer: HandleSubConnStateChange: 0xc003c42850, READY" +peer0.org1.example.com | "2019-09-24 00:25:07.501 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a9b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a9c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU a9d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU a9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU a9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [cauthdsl] func1 -> DEBU aa0 0xc003d81670 gate 1569284707515322200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aa1 0xc003d81670 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aa2 0xc003d81670 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aa3 0xc003d81670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aa4 0xc003d81670 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [cauthdsl] func1 -> DEBU aa5 0xc003d81670 gate 1569284707515322200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU aa6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU aa7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU aa8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [cauthdsl] func1 -> DEBU aa9 0xc003d81eb0 gate 1569284707515865200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aaa 0xc003d81eb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aab 0xc003d81eb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aac 0xc003d81eb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.544 UTC [msp] GetDefaultSigningIdentity -> DEBU aad Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.544 UTC [msp.identity] Sign -> DEBU aae Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:07.545 UTC [msp.identity] Sign -> DEBU aaf Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:07.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU ab0 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051" +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [common.channelconfig] NewStandardValues -> DEBU d5b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU d5c Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [common.channelconfig] NewStandardValues -> DEBU d5d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU d5e Processing field: MSP" +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [common.channelconfig] Validate -> DEBU d5f Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [common.channelconfig] validateMSP -> DEBU d60 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [msp] newBccspMsp -> DEBU d61 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [msp] New -> DEBU d62 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [msp] Setup -> DEBU d63 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [msp.identity] newIdentity -> DEBU d64 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:07.121 UTC [msp.identity] newIdentity -> DEBU d65 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:07.139 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d66 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.139 UTC [msp] Validate -> DEBU d67 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:07.140 UTC [msp] getCertificationChain -> DEBU d68 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:07.140 UTC [msp] hasOURole -> DEBU d69 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:25:07.140 UTC [msp] getCertificationChain -> DEBU d6a MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:07.140 UTC [msp] Setup -> DEBU d6b Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 00:25:07.140 UTC [msp] Setup -> DEBU d6c MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 00:25:07.140 UTC [policies] NewManagerImpl -> DEBU d6d Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:07.140 UTC [policies] NewManagerImpl -> DEBU d6e Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d6f Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d70 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d71 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d72 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d73 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d74 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d75 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d76 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d77 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d78 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d79 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d7a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d7b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d7c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d7d Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d7e Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d7f Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d80 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d81 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d82 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d83 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:25:07.142 UTC [common.configtx] addToMap -> DEBU d84 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:25:07.142 UTC [common.configtx] addToMap -> DEBU d85 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:25:07.142 UTC [common.configtx] addToMap -> DEBU d86 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d87 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d88 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d89 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:25:07.551 UTC [gossip.gossip] handleMessage -> DEBU ab1 Entering, 172.18.0.5:49112 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:14269517514587053870 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\030" signature:"0D\002 \017\020iL\331\033\006x\010\201\346\221!\216.\026V=\242NI_\301\357\316\030\364\373\220xX.\002 :\237Q\360)\242\343\256\374\373\375\267^\205\235T\276H\210R\253\222:\243VZ\305\343\013\201\230R" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.551 UTC [grpc] infof -> DEBU ab2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:07.552 UTC [gossip.comm] authenticateRemotePeer -> DEBU ab3 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.552 UTC [msp] DeserializeIdentity -> DEBU ab4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ab5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.572 UTC [gossip.comm] readFromStream -> DEBU ab6 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 00:25:07.572 UTC [gossip.comm] func2 -> DEBU ab7 Client 172.18.0.5:49112 disconnected" +peer0.org1.example.com | "2019-09-24 00:25:07.572 UTC [comm.grpc.server] 1 -> INFO ab8 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:49112 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=68.6173ms +peer0.org1.example.com | "2019-09-24 00:25:07.572 UTC [gossip.comm] authenticateRemotePeer -> DEBU ab9 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.573 UTC [msp.identity] Verify -> DEBU aba Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-09-24 00:25:07.573 UTC [msp.identity] Verify -> DEBU abb Verify: sig = 00000000 30 45 02 21 00 f8 d1 cf 95 7e ae e7 91 fc 78 39 |0E.!.....~....x9| +peer0.org1.example.com | 00000010 59 f8 92 0a cd e1 c2 32 85 94 6e 55 44 59 25 a4 |Y......2..nUDY%.| +peer0.org1.example.com | 00000020 cf 7d a3 d8 f1 02 20 0d 0f ec e1 29 32 39 83 8b |.}.... ....)29..| +peer0.org1.example.com | 00000030 a4 83 c0 0b a0 ce a2 7c 3b 70 a7 1d e7 a3 da df |.......|;p......| +peer0.org1.example.com | 00000040 9f f7 75 f1 43 8d cc |..u.C..|" +peer0.org1.example.com | "2019-09-24 00:25:07.573 UTC [gossip.comm] authenticateRemotePeer -> DEBU abc Authenticated 172.18.0.5:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.573 UTC [gossip.comm] createConnection -> DEBU abd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.573 UTC [gossip.comm] sendToEndpoint -> DEBU abe Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.574 UTC [grpc] infof -> DEBU abf transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:07.574 UTC [gossip.comm] writeToStream -> DEBU ac0 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:07.516 UTC [msp.identity] Verify -> DEBU ac1 Verify: digest = 00000000 f6 ea 57 3c 44 0b db 8c 31 93 68 68 59 30 99 4c |..W DEBU ac2 Verify: sig = 00000000 30 45 02 21 00 9e 15 45 ec 82 da e7 6d 70 23 40 |0E.!...E....mp#@| +peer0.org1.example.com | 00000010 86 96 e7 07 bc 4b dd aa 0b cc 3e 46 b6 8a 33 c7 |.....K....>F..3.| +peer0.org1.example.com | 00000020 91 44 58 b5 bb 02 20 18 49 b2 6a 00 f5 46 07 f4 |.DX... .I.j..F..| +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8d Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8e Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8f Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d90 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d91 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d92 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d93 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d94 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d95 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d96 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d97 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d98 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d99 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9a Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9b Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU da0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU da1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU da2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da5 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da6 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da7 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da9 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU daa Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU dab Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU dac Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU dad Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU dae Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU daf Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU db0 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU db1 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:25:07.145 UTC [common.channelconfig] LogSanityChecks -> DEBU db2 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 00:25:07.146 UTC [common.channelconfig] LogSanityChecks -> DEBU db3 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 00:25:07.157 UTC [policies] Manager -> DEBU db4 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:25:07.157 UTC [policies] Manager -> DEBU db5 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:25:07.162 UTC [policies] Manager -> DEBU db6 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:07.162 UTC [policies] Manager -> DEBU db7 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:25:07.162 UTC [policies] Manager -> DEBU db8 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.162 UTC [policies] Manager -> DEBU db9 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:25:07.162 UTC [common.channelconfig] LogSanityChecks -> DEBU dba As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 00:25:07.162 UTC [common.channelconfig] LogSanityChecks -> DEBU dbb As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [common.channelconfig] LogSanityChecks -> DEBU dbc As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [policies] Manager -> DEBU dbd Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [policies] Manager -> DEBU dbe Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [policies] Manager -> DEBU dbf Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [policies] Manager -> DEBU dc0 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [policies] Manager -> DEBU dc1 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | 00000030 b6 2c 3f be f8 9e 6a 0c 54 a6 56 3b 7f f2 dc e3 |.,?...j.T.V;....| +peer0.org1.example.com | 00000040 8b bc 06 bc dd 3a 52 |.....:R|" +peer0.org1.example.com | "2019-09-24 00:25:07.574 UTC [cauthdsl] func2 -> DEBU ac3 0xc003d81eb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.574 UTC [cauthdsl] func1 -> DEBU ac4 0xc003d81eb0 gate 1569284707515865200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.574 UTC [policies] Evaluate -> DEBU ac5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.574 UTC [policies] Evaluate -> DEBU ac6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.574 UTC [policies] Evaluate -> DEBU ac7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.574 UTC [policies] Evaluate -> DEBU ac8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.574 UTC [gossip.discovery] handleAliveMessage -> DEBU ac9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.575 UTC [gossip.discovery] learnExistingMembers -> DEBU aca Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:07.575 UTC [gossip.discovery] learnExistingMembers -> DEBU acb updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:07.575 UTC [gossip.discovery] learnExistingMembers -> DEBU acc Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:07.575 UTC [gossip.discovery] learnExistingMembers -> DEBU acd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:07.575 UTC [gossip.discovery] learnExistingMembers -> DEBU ace Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.575 UTC [gossip.discovery] handleAliveMessage -> DEBU acf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.575 UTC [gossip.discovery] handleMsgFromComm -> DEBU ad0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.575 UTC [gossip.discovery] handleMsgFromComm -> DEBU ad1 Got message: GossipMessage: nonce:14269517514587053870 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\030" signature:"0D\002 \017\020iL\331\033\006x\010\201\346\221!\216.\026V=\242NI_\301\357\316\030\364\373\220xX.\002 :\237Q\360)\242\343\256\374\373\375\267^\205\235T\276H\210R\253\222:\243VZ\305\343\013\201\230R" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.575 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ad2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.576 UTC [msp.identity] Verify -> DEBU ad3 Verify: digest = 00000000 e1 1b 1e 3c 6f 35 e5 18 ac 76 0e 92 83 36 45 71 |... DEBU ad4 Verify: sig = 00000000 30 44 02 20 0f 10 69 4c d9 1b 06 78 08 81 e6 91 |0D. ..iL...x....| +peer0.org1.example.com | 00000010 21 8e 2e 16 56 3d a2 4e 49 5f c1 ef ce 18 f4 fb |!...V=.NI_......| +peer0.org1.example.com | 00000020 90 78 58 2e 02 20 3a 9f 51 f0 29 a2 e3 ae fc fb |.xX.. :.Q.).....| +peer0.org1.example.com | 00000030 fd b7 5e 85 9d 54 be 48 88 52 ab 92 3a a3 56 5a |..^..T.H.R..:.VZ| +peer0.org1.example.com | 00000040 c5 e3 0b 81 98 52 |.....R|" +peer0.org1.example.com | "2019-09-24 00:25:07.586 UTC [msp.identity] Verify -> DEBU ad5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:07.586 UTC [msp.identity] Verify -> DEBU ad6 Verify: sig = 00000000 30 44 02 20 07 27 3d 58 39 34 ae 52 37 22 2b ed |0D. .'=X94.R7"+.| +peer0.org1.example.com | 00000010 8a 26 6d 4e 1f 0a 08 8a 56 0d ad 31 66 53 1f e3 |.&mN....V..1fS..| +peer0.org1.example.com | 00000020 17 83 34 48 02 20 4e 7a 52 7f 51 ca 1a 0d 48 3d |..4H. NzR.Q...H=| +peer0.org1.example.com | 00000030 73 f3 8f 9c 8a 5b ef 01 f8 ef 7c 80 db 85 d7 77 |s....[....|....w| +peer0.org1.example.com | 00000040 45 86 6d e7 45 18 |E.m.E.|" +peer0.org1.example.com | "2019-09-24 00:25:07.586 UTC [gossip.discovery] handleAliveMessage -> DEBU ad7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ad8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:07.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ad9 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:07.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ada Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:07.587 UTC [gossip.discovery] learnExistingMembers -> DEBU adb Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:07.587 UTC [gossip.discovery] learnExistingMembers -> DEBU adc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.587 UTC [gossip.discovery] handleAliveMessage -> DEBU add Exiting" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [common.channelconfig] LogSanityChecks -> DEBU dc2 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [common.channelconfig] LogSanityChecks -> DEBU dc3 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [common.channelconfig] LogSanityChecks -> DEBU dc4 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [common.channelconfig] LogSanityChecks -> DEBU dc5 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [common.capabilities] Supported -> DEBU dc6 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [common.capabilities] Supported -> DEBU dc7 Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [orderer.common.server] func1 -> DEBU dc8 Executing callback to update root CAs" +orderer0.example.com | "2019-09-24 00:25:07.163 UTC [orderer.common.server] updateTrustedRoots -> DEBU dc9 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-09-24 00:25:07.181 UTC [orderer.common.server] updateTrustedRoots -> DEBU dca adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-09-24 00:25:07.181 UTC [orderer.common.server] updateTrustedRoots -> DEBU dcb adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-09-24 00:25:07.181 UTC [orderer.common.server] updateTrustedRoots -> DEBU dcc adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-09-24 00:25:07.182 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU dcd [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +orderer0.example.com | "2019-09-24 00:25:07.182 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU dce [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-09-24 00:25:07.182 UTC [msp] GetDefaultSigningIdentity -> DEBU dcf Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:25:07.186 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.186 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd1 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-09-24 00:25:07.187 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.9µs " +orderer0.example.com | "2019-09-24 00:25:07.183 UTC [msp] GetDefaultSigningIdentity -> DEBU dd3 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:25:07.187 UTC [msp.identity] Sign -> DEBU dd4 Sign: plaintext: 0A020802120B0A090A03010203100418...C90BC4C292C00497479869D1CCCD9A7A " +orderer0.example.com | "2019-09-24 00:25:07.187 UTC [msp.identity] Sign -> DEBU dd5 Sign: digest: 804EA32B427414F8705766C936C5693443D182604B6219E71F07CCC5AACD76C5 " +orderer0.example.com | "2019-09-24 00:25:07.209 UTC [fsblkstorage] indexBlock -> DEBU dd6 Indexing block [blockNum=2, blockHash=[]byte{0x4e, 0xd0, 0x49, 0x23, 0xb9, 0x3e, 0xc0, 0x5c, 0x31, 0x7d, 0x41, 0xd1, 0x41, 0x9e, 0x85, 0xa3, 0x3a, 0xc, 0xfa, 0x4b, 0xf1, 0xd7, 0x9c, 0x1, 0x39, 0x4c, 0x1f, 0xcb, 0x3c, 0x63, 0xa5, 0x0} txOffsets= +orderer0.example.com | txId=be7e094f4e6114772d86c435c98fa93588deed90dd195d27ecfc6e306eba1cfc locPointer=offset=71, bytesLength=22742 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 00:25:07.210 UTC [fsblkstorage] updateCheckpoint -> DEBU dd7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71391], isChainEmpty=[false], lastBlockNumber=[2]" +orderer0.example.com | "2019-09-24 00:25:07.210 UTC [fsblkstorage] waitForBlock -> DEBU dd9 Came out of wait. maxAvailaBlockNumber=[2]" +orderer0.example.com | "2019-09-24 00:25:07.211 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dda Remaining bytes=[23750], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:25:07.211 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ddb Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47641], bytesOffset=[47644]}" +orderer0.example.com | "2019-09-24 00:25:07.211 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ddc blockbytes [23747] read from file [0]" +orderer0.example.com | "2019-09-24 00:25:07.211 UTC [policies] Evaluate -> DEBU ddd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:25:07.211 UTC [policies] Evaluate -> DEBU dde This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:07.211 UTC [policies] Evaluate -> DEBU ddf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:25:07.211 UTC [policies] Evaluate -> DEBU de0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:25:07.211 UTC [policies] Evaluate -> DEBU de1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:25:07.211 UTC [msp] DeserializeIdentity -> DEBU de2 Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:07.211 UTC [msp.identity] newIdentity -> DEBU de3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [cauthdsl] func1 -> DEBU de4 0xc00118bdc0 gate 1569284707212166900 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU de5 0xc00118bdc0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU de6 0xc00118bdc0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU de7 0xc00118bdc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU de8 0xc00118bdc0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [cauthdsl] func1 -> DEBU de9 0xc00118bdc0 gate 1569284707212166900 evaluation fails" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [policies] Evaluate -> DEBU dea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [policies] Evaluate -> DEBU deb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [policies] Evaluate -> DEBU dec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [cauthdsl] func1 -> DEBU ded 0xc000bfb030 gate 1569284707212714200 evaluation starts" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU dee 0xc000bfb030 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU ade Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.587 UTC [gossip.discovery] sendMemResponse -> DEBU adf Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:07.587 UTC [msp] DeserializeIdentity -> DEBU ae0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.587 UTC [msp] DeserializeIdentity -> DEBU ae1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.588 UTC [gossip.comm] Send -> DEBU ae2 Entering, sending GossipMessage: Channel: , nonce: 14269517514587053870, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.588 UTC [gossip.discovery] sendMemResponse -> DEBU ae3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\030" signature:"0D\002 \017\020iL\331\033\006x\010\201\346\221!\216.\026V=\242NI_\301\357\316\030\364\373\220xX.\002 :\237Q\360)\242\343\256\374\373\375\267^\205\235T\276H\210R\253\222:\243VZ\305\343\013\201\230R" secret_envelope: > alive: > " +peer0.org1.example.com | "2019-09-24 00:25:07.588 UTC [gossip.comm] sendToEndpoint -> DEBU ae4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 14269517514587053870, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.588 UTC [gossip.comm] sendToEndpoint -> DEBU ae5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.588 UTC [gossip.discovery] sendMemResponse -> DEBU ae6 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:07.588 UTC [msp] DeserializeIdentity -> DEBU ae7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.588 UTC [msp] DeserializeIdentity -> DEBU ae8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.588 UTC [msp] DeserializeIdentity -> DEBU ae9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.589 UTC [gossip.comm] Send -> DEBU aea Entering, sending GossipMessage: Channel: , nonce: 2696917409125458741, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.589 UTC [gossip.discovery] sendMemResponse -> DEBU aeb Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\030" signature:"0D\002 \017\020iL\331\033\006x\010\201\346\221!\216.\026V=\242NI_\301\357\316\030\364\373\220xX.\002 :\237Q\360)\242\343\256\374\373\375\267^\205\235T\276H\210R\253\222:\243VZ\305\343\013\201\230R" > alive:;\307\007\325\026k\243\270\000\3412\272\364\351\215X\214\340\361\"\374\331\261\003\303\352\226\335'" > alive:F\266\2123\307\221DX\265\273\002 \030I\262j\000\365F\007\364\266,?\276\370\236j\014T\246V;\177\362\334\343\213\274\006\274\335:R" > alive: " +peer0.org1.example.com | "2019-09-24 00:25:07.589 UTC [gossip.comm] sendToEndpoint -> DEBU aec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 2696917409125458741, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.589 UTC [gossip.comm] createConnection -> DEBU aed Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:07.591 UTC [grpc] DialContext -> DEBU aee parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:25:07.557 UTC [msp] DeserializeIdentity -> DEBU aef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.606 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU af0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.607 UTC [msp] DeserializeIdentity -> DEBU af1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.613 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU af2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.622 UTC [gossip.pull] Hello -> DEBU af3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.622 UTC [gossip.comm] Send -> DEBU af4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.622 UTC [gossip.pull] Hello -> DEBU af5 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.622 UTC [gossip.comm] Send -> DEBU af6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.623 UTC [gossip.pull] Hello -> DEBU af7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.623 UTC [gossip.comm] Send -> DEBU af8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.623 UTC [gossip.comm] sendToEndpoint -> DEBU af9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.623 UTC [gossip.comm] sendToEndpoint -> DEBU afa Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.623 UTC [gossip.comm] sendToEndpoint -> DEBU afb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.623 UTC [gossip.comm] createConnection -> DEBU afc Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:07.629 UTC [grpc] DialContext -> DEBU afd parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:25:07.629 UTC [grpc] DialContext -> DEBU afe scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:25:07.630 UTC [grpc] watcher -> DEBU aff ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 00:25:07.630 UTC [grpc] switchBalancer -> DEBU b00 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:25:07.630 UTC [grpc] HandleSubConnStateChange -> DEBU b01 pickfirstBalancer: HandleSubConnStateChange: 0xc003e50290, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:25:07.631 UTC [gossip.comm] sendToEndpoint -> DEBU b02 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.632 UTC [gossip.gossip] handleMessage -> DEBU b03 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.592 UTC [grpc] DialContext -> DEBU b04 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [grpc] watcher -> DEBU b07 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [grpc] switchBalancer -> DEBU b08 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [msp] GetDefaultSigningIdentity -> DEBU b09 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [grpc] HandleSubConnStateChange -> DEBU b0a pickfirstBalancer: HandleSubConnStateChange: 0xc003e50890, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:25:07.639 UTC [gossip.comm] func1 -> DEBU b05 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [msp.identity] Sign -> DEBU b0b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151015 " +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [msp.identity] Sign -> DEBU b0c Sign: digest: C335C6B5B5F9B706720B30AAB41C78DE0FECBA8131B9AED66365D9EECE16DA8C " +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [gossip.gossip] handleMessage -> DEBU b0d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [msp] GetDefaultSigningIdentity -> DEBU b0e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [gossip.pull] HandleMessage -> DEBU b0f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [msp.identity] Sign -> DEBU b10 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU def 0xc000bfb030 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU df0 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-09-24 00:25:07.212 UTC [msp] Validate -> DEBU df1 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:25:07.213 UTC [msp] getCertificationChain -> DEBU df2 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:07.216 UTC [cauthdsl] func2 -> DEBU df3 0xc000bfb030 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:25:07.216 UTC [msp.identity] Verify -> DEBU df4 Verify: digest = 00000000 8b 03 97 43 70 c0 92 23 17 5e 03 ee 64 e6 97 15 |...Cp..#.^..d...| +orderer0.example.com | 00000010 02 e5 c8 62 47 03 7b 9c 1d 32 87 82 fc 68 3e 5b |...bG.{..2...h>[|" +orderer0.example.com | "2019-09-24 00:25:07.217 UTC [msp.identity] Verify -> DEBU df5 Verify: sig = 00000000 30 44 02 20 31 f5 c5 93 d4 1d 90 90 18 dd 80 56 |0D. 1..........V| +orderer0.example.com | 00000010 9f 8f ca 24 d5 66 6c 6b 5f a8 6a fb ad 51 78 84 |...$.flk_.j..Qx.| +orderer0.example.com | 00000020 24 d7 ee fc 02 20 1a fe 63 11 78 f6 09 75 ed 1e |$.... ..c.x..u..| +orderer0.example.com | 00000030 ed 55 24 d6 52 91 c4 44 8c 94 19 3e f1 e1 0e 9c |.U$.R..D...>....| +orderer0.example.com | 00000040 9f c8 76 db 78 22 |..v.x"|" +orderer0.example.com | "2019-09-24 00:25:07.217 UTC [cauthdsl] func2 -> DEBU df6 0xc000bfb030 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:25:07.217 UTC [cauthdsl] func1 -> DEBU df7 0xc000bfb030 gate 1569284707212714200 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:25:07.217 UTC [policies] Evaluate -> DEBU df8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:07.217 UTC [policies] Evaluate -> DEBU df9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:25:07.217 UTC [policies] Evaluate -> DEBU dfa Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:25:07.217 UTC [policies] Evaluate -> DEBU dfb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:25:07.217 UTC [policies] Evaluate -> DEBU dfc Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:07.218 UTC [policies] Evaluate -> DEBU dfd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:25:07.218 UTC [common.deliver] deliverBlocks -> DEBU dfe [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +orderer0.example.com | "2019-09-24 00:25:07.218 UTC [fsblkstorage] waitForBlock -> DEBU dff Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +orderer0.example.com | "2019-09-24 00:25:07.210 UTC [orderer.commmon.multichannel] commitBlock -> DEBU dd8 [channel: businesschannel] Wrote block [2]" +orderer0.example.com | "2019-09-24 00:25:07.491 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e00 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +orderer0.example.com | "2019-09-24 00:25:07.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e01 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" +orderer0.example.com | "2019-09-24 00:25:07.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.6µs " +orderer0.example.com | "2019-09-24 00:25:07.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU e03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.7µs " +orderer0.example.com | "2019-09-24 00:25:07.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU e06 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2019-09-24 00:25:07.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " +orderer0.example.com | "2019-09-24 00:25:07.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 2 on channel businesschannel took 27.4µs" +orderer0.example.com | "2019-09-24 00:25:07.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0a Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +orderer0.example.com | "2019-09-24 00:25:07.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.8µs " +orderer0.example.com | "2019-09-24 00:25:07.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.3µs " +orderer0.example.com | "2019-09-24 00:25:07.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:07.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:08.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:08.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-09-24 00:25:08.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU e11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +orderer0.example.com | "2019-09-24 00:25:08.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 2 on channel businesschannel took 32.4µs" +orderer0.example.com | "2019-09-24 00:25:08.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e13 Sending msg of 28 bytes to 3 on channel businesschannel took 39.4µs" +orderer0.example.com | "2019-09-24 00:25:08.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " +orderer0.example.com | "2019-09-24 00:25:08.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU e15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.1µs " +orderer0.example.com | "2019-09-24 00:25:08.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:08.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU e17 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:08.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU e18 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:08.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +orderer0.example.com | "2019-09-24 00:25:08.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.3µs " +orderer0.example.com | "2019-09-24 00:25:08.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" +orderer0.example.com | "2019-09-24 00:25:08.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1c Sending msg of 28 bytes to 2 on channel businesschannel took 38.7µs" +orderer0.example.com | "2019-09-24 00:25:08.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.5µs " +orderer0.example.com | "2019-09-24 00:25:08.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 847.8µs " +orderer0.example.com | "2019-09-24 00:25:08.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:08.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU e20 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:09.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU e21 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:09.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +orderer0.example.com | "2019-09-24 00:25:09.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU e23 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " +orderer0.example.com | "2019-09-24 00:25:09.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +orderer0.example.com | "2019-09-24 00:25:09.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e25 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +orderer0.example.com | "2019-09-24 00:25:09.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.6µs " +orderer0.example.com | "2019-09-24 00:25:09.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU e27 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.6µs " +orderer0.example.com | "2019-09-24 00:25:09.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:09.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU e29 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:09.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:09.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.4µs " +orderer0.example.com | "2019-09-24 00:25:09.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 3 on channel testchainid took 127.7µs" +orderer0.example.com | "2019-09-24 00:25:09.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2d Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-09-24 00:25:09.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2e Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-09-24 00:25:09.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.6µs " +orderer0.example.com | "2019-09-24 00:25:09.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU e30 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.1µs " +orderer0.example.com | "2019-09-24 00:25:09.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:09.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU e32 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:10.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU e33 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:10.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +orderer0.example.com | "2019-09-24 00:25:10.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU e35 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.5µs " +orderer0.example.com | "2019-09-24 00:25:10.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e36 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +orderer0.example.com | "2019-09-24 00:25:10.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-09-24 00:25:10.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.4µs " +orderer0.example.com | "2019-09-24 00:25:10.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU e39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.6µs " +orderer0.example.com | "2019-09-24 00:25:10.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:10.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:10.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:10.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2019-09-24 00:25:10.638 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " +orderer0.example.com | "2019-09-24 00:25:10.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 2 on channel businesschannel took 45.4µs" +orderer0.example.com | "2019-09-24 00:25:10.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e40 Sending msg of 28 bytes to 3 on channel businesschannel took 17µs" +orderer0.example.com | "2019-09-24 00:25:10.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 327.3µs " +orderer0.example.com | "2019-09-24 00:25:10.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU e42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.9µs " +orderer0.example.com | "2019-09-24 00:25:10.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:10.959 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:11.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU e45 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:11.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +orderer0.example.com | "2019-09-24 00:25:11.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.3µs " +orderer0.example.com | "2019-09-24 00:25:11.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 2 on channel businesschannel took 46.9µs" +orderer0.example.com | "2019-09-24 00:25:11.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e49 Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" +orderer0.example.com | "2019-09-24 00:25:11.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 846.1µs " +orderer0.example.com | "2019-09-24 00:25:11.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123µs " +orderer0.example.com | "2019-09-24 00:25:11.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:11.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:11.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:11.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4f Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +orderer0.example.com | "2019-09-24 00:25:11.638 UTC [orderer.common.cluster.step] sendMessage -> DEBU e50 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.5µs " +orderer0.example.com | "2019-09-24 00:25:11.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +orderer0.example.com | "2019-09-24 00:25:11.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e52 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-09-24 00:25:11.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.8µs " +orderer0.example.com | "2019-09-24 00:25:11.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.2µs " +orderer0.example.com | "2019-09-24 00:25:11.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:11.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:12.139 UTC [orderer.common.cluster.step] handleMessage -> DEBU e57 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:12.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e58 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +orderer0.example.com | "2019-09-24 00:25:12.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU e59 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " +orderer0.example.com | "2019-09-24 00:25:12.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5a Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-09-24 00:25:12.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5b Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +orderer0.example.com | "2019-09-24 00:25:12.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +orderer0.example.com | "2019-09-24 00:25:12.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.7µs " +orderer0.example.com | "2019-09-24 00:25:12.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:12.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:12.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU e60 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:12.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e61 Sending msg of 28 bytes to 3 on channel testchainid took 100µs" +orderer0.example.com | "2019-09-24 00:25:12.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU e62 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.7µs " +orderer0.example.com | "2019-09-24 00:25:12.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e63 Sending msg of 28 bytes to 2 on channel businesschannel took 37.4µs" +orderer0.example.com | "2019-09-24 00:25:12.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs" +orderer0.example.com | "2019-09-24 00:25:12.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.3µs " +orderer0.example.com | "2019-09-24 00:25:12.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e66 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.6µs " +orderer0.example.com | "2019-09-24 00:25:12.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e67 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:12.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:13.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU e69 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:13.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6a Sending msg of 28 bytes to 3 on channel testchainid took 18.9µs" +orderer0.example.com | "2019-09-24 00:25:13.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " +orderer0.example.com | "2019-09-24 00:25:13.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6c Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-09-24 00:25:13.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6d Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +orderer0.example.com | "2019-09-24 00:25:13.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 873.6µs " +orderer0.example.com | "2019-09-24 00:25:13.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.5µs " +orderer0.example.com | "2019-09-24 00:25:13.457 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:13.465 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:13.642 UTC [orderer.common.cluster.step] handleMessage -> DEBU e72 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:13.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e73 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +orderer0.example.com | "2019-09-24 00:25:13.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e74 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +orderer0.example.com | "2019-09-24 00:25:13.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e75 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +orderer0.example.com | "2019-09-24 00:25:13.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e76 Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +orderer0.example.com | "2019-09-24 00:25:13.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +orderer0.example.com | "2019-09-24 00:25:13.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.3µs " +orderer0.example.com | "2019-09-24 00:25:13.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:13.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:14.152 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:14.152 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7c Sending msg of 28 bytes to 3 on channel testchainid took 45µs" +orderer0.example.com | "2019-09-24 00:25:14.152 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 274µs " +orderer0.example.com | "2019-09-24 00:25:14.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7e Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +orderer0.example.com | "2019-09-24 00:25:14.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7f Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-09-24 00:25:14.465 UTC [orderer.common.cluster.step] sendMessage -> DEBU e80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 134.4µs " +orderer0.example.com | "2019-09-24 00:25:14.465 UTC [orderer.common.cluster.step] sendMessage -> DEBU e81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.7µs " +orderer0.example.com | "2019-09-24 00:25:14.466 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:14.467 UTC [orderer.common.cluster.step] handleMessage -> DEBU e83 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:14.641 UTC [orderer.common.cluster.step] handleMessage -> DEBU e84 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:14.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e85 Sending msg of 28 bytes to 3 on channel testchainid took 39.1µs" +orderer0.example.com | "2019-09-24 00:25:14.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e86 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.6µs " +orderer0.example.com | "2019-09-24 00:25:14.956 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e87 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-09-24 00:25:14.956 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e88 Sending msg of 28 bytes to 3 on channel businesschannel took 91.9µs" +orderer0.example.com | "2019-09-24 00:25:14.957 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.1µs " +orderer0.example.com | "2019-09-24 00:25:14.957 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.2µs " +orderer0.example.com | "2019-09-24 00:25:14.958 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:14.958 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:15.141 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:15.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8e Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2019-09-24 00:25:15.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.4µs " +orderer0.example.com | "2019-09-24 00:25:15.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e90 Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" +orderer0.example.com | "2019-09-24 00:25:15.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e91 Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" +orderer0.example.com | "2019-09-24 00:25:15.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 282.4µs " +orderer0.example.com | "2019-09-24 00:25:15.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU e93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185µs " +orderer0.example.com | "2019-09-24 00:25:15.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e94 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:15.461 UTC [orderer.common.cluster.step] handleMessage -> DEBU e95 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:15.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU e96 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:15.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e97 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" +orderer0.example.com | "2019-09-24 00:25:15.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU e98 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.7µs " +orderer0.example.com | "2019-09-24 00:25:15.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e99 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +orderer0.example.com | "2019-09-24 00:25:15.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9a Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +orderer0.example.com | "2019-09-24 00:25:15.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " +orderer0.example.com | "2019-09-24 00:25:15.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.9µs " +orderer0.example.com | "2019-09-24 00:25:15.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:15.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:16.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:16.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea0 Sending msg of 28 bytes to 3 on channel testchainid took 40.3µs" +orderer0.example.com | "2019-09-24 00:25:16.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.3µs " +orderer0.example.com | "2019-09-24 00:25:16.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea2 Sending msg of 28 bytes to 2 on channel businesschannel took 47.3µs" +orderer0.example.com | "2019-09-24 00:25:16.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +orderer0.example.com | "2019-09-24 00:25:16.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.3µs " +orderer0.example.com | "2019-09-24 00:25:16.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.1µs " +orderer0.example.com | "2019-09-24 00:25:16.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:16.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:16.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:16.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea9 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +orderer0.example.com | "2019-09-24 00:25:16.638 UTC [orderer.common.cluster.step] sendMessage -> DEBU eaa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.8µs " +orderer0.example.com | "2019-09-24 00:25:16.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eab Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 00:25:16.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +orderer0.example.com | "2019-09-24 00:25:16.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ead Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.8µs " +orderer0.example.com | "2019-09-24 00:25:16.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU eae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48µs " +orderer0.example.com | "2019-09-24 00:25:16.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:16.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:17.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:17.139 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb2 Sending msg of 28 bytes to 3 on channel testchainid took 59.5µs" +orderer0.example.com | "2019-09-24 00:25:17.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.8µs " +orderer0.example.com | "2019-09-24 00:25:17.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb4 Sending msg of 28 bytes to 2 on channel businesschannel took 28.4µs" +orderer0.example.com | "2019-09-24 00:25:17.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-09-24 00:25:17.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.8µs " +orderer0.example.com | "2019-09-24 00:25:17.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.7µs " +orderer0.example.com | "2019-09-24 00:25:17.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:17.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:17.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU eba Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:17.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebb Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +orderer0.example.com | "2019-09-24 00:25:17.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.8µs " +orderer0.example.com | "2019-09-24 00:25:17.955 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebd Sending msg of 28 bytes to 2 on channel businesschannel took 42µs" +orderer0.example.com | "2019-09-24 00:25:17.955 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebe Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2019-09-24 00:25:17.955 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.4µs " +orderer0.example.com | "2019-09-24 00:25:17.955 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.6µs " +orderer0.example.com | "2019-09-24 00:25:17.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:17.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:18.139 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:18.139 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec4 Sending msg of 28 bytes to 3 on channel testchainid took 40.6µs" +orderer0.example.com | "2019-09-24 00:25:18.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.4µs " +orderer0.example.com | "2019-09-24 00:25:18.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec6 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-09-24 00:25:18.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec7 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2019-09-24 00:25:18.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +orderer0.example.com | "2019-09-24 00:25:18.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.2µs " +orderer0.example.com | "2019-09-24 00:25:18.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU eca Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:18.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:18.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:18.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecd Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2019-09-24 00:25:18.638 UTC [orderer.common.cluster.step] sendMessage -> DEBU ece Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +orderer0.example.com | "2019-09-24 00:25:18.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecf Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-09-24 00:25:18.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +orderer0.example.com | "2019-09-24 00:25:18.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " +orderer0.example.com | "2019-09-24 00:25:18.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.3µs " +orderer0.example.com | "2019-09-24 00:25:18.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:18.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:19.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:19.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed6 Sending msg of 28 bytes to 3 on channel testchainid took 43.5µs" +orderer0.example.com | "2019-09-24 00:25:19.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " +orderer0.example.com | "2019-09-24 00:25:19.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed8 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" +orderer0.example.com | "2019-09-24 00:25:19.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed9 Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-09-24 00:25:19.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU eda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.6µs " +orderer0.example.com | "2019-09-24 00:25:19.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU edb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.5µs " +orderer0.example.com | "2019-09-24 00:25:19.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:19.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU edd Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:19.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU ede Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:19.645 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edf Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +orderer0.example.com | "2019-09-24 00:25:19.646 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.6µs " +orderer0.example.com | "2019-09-24 00:25:19.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee1 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-09-24 00:25:19.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +orderer0.example.com | "2019-09-24 00:25:19.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 372.5µs " +orderer0.example.com | "2019-09-24 00:25:19.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.9µs " +orderer0.example.com | "2019-09-24 00:25:19.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:19.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:20.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:20.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee8 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +orderer0.example.com | "2019-09-24 00:25:20.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.4µs " +orderer0.example.com | "2019-09-24 00:25:20.460 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eea Sending msg of 28 bytes to 2 on channel businesschannel took 26.7µs" +orderer0.example.com | "2019-09-24 00:25:20.460 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eeb Sending msg of 28 bytes to 3 on channel businesschannel took 675.8µs" +orderer0.example.com | "2019-09-24 00:25:20.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 472.2µs " +orderer0.example.com | "2019-09-24 00:25:20.465 UTC [orderer.common.cluster.step] sendMessage -> DEBU eed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.7593ms " +orderer0.example.com | "2019-09-24 00:25:20.474 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:20.497 UTC [orderer.common.cluster.step] handleMessage -> DEBU eef Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:20.640 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:20.640 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef1 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2019-09-24 00:25:20.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.3µs " +orderer0.example.com | "2019-09-24 00:25:20.893 UTC [orderer.common.server] Broadcast -> DEBU ef3 Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 00:25:20.894 UTC [orderer.common.broadcast] Handle -> DEBU ef4 Starting new broadcast loop for 172.18.0.9:60788" +orderer0.example.com | "2019-09-24 00:25:20.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef5 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1µs" +orderer0.example.com | "2019-09-24 00:25:20.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef6 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +orderer0.example.com | "2019-09-24 00:25:20.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +orderer0.example.com | "2019-09-24 00:25:20.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.5µs " +orderer0.example.com | "2019-09-24 00:25:20.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:20.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU efa Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:21.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU efb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:21.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efc Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +orderer0.example.com | "2019-09-24 00:25:21.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.5µs " +orderer0.example.com | "2019-09-24 00:25:21.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efe Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +orderer0.example.com | "2019-09-24 00:25:21.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eff Sending msg of 28 bytes to 3 on channel businesschannel took 265.7µs" +orderer0.example.com | "2019-09-24 00:25:21.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.1µs " +orderer0.example.com | "2019-09-24 00:25:21.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.9µs " +orderer0.example.com | "2019-09-24 00:25:21.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU f02 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:21.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU f03 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:21.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f04 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:21.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f05 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2019-09-24 00:25:21.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU f06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.6µs " +orderer0.example.com | "2019-09-24 00:25:21.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f07 Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +orderer0.example.com | "2019-09-24 00:25:21.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f08 Sending msg of 28 bytes to 3 on channel businesschannel took 52.8µs" +orderer0.example.com | "2019-09-24 00:25:21.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.4µs " +orderer0.example.com | "2019-09-24 00:25:21.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.7µs " +orderer0.example.com | "2019-09-24 00:25:21.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:21.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:22.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:22.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0e Sending msg of 28 bytes to 3 on channel testchainid took 44.2µs" +orderer0.example.com | "2019-09-24 00:25:22.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182µs " +orderer0.example.com | "2019-09-24 00:25:22.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f10 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +orderer0.example.com | "2019-09-24 00:25:22.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f11 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-09-24 00:25:22.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " +orderer0.example.com | "2019-09-24 00:25:22.455 UTC [orderer.common.cluster.step] sendMessage -> DEBU f13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 751.1µs " +orderer0.example.com | "2019-09-24 00:25:22.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU f14 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:22.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU f15 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:22.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f16 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:22.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f17 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2019-09-24 00:25:22.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " +orderer0.example.com | "2019-09-24 00:25:22.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f19 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-09-24 00:25:22.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1a Sending msg of 28 bytes to 3 on channel businesschannel took 17µs" +orderer0.example.com | "2019-09-24 00:25:22.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.8µs " +orderer0.example.com | "2019-09-24 00:25:22.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109µs " +orderer0.example.com | "2019-09-24 00:25:22.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:22.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:23.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:23.139 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f20 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2019-09-24 00:25:23.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU f21 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 258.3µs " +orderer0.example.com | "2019-09-24 00:25:23.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f22 Sending msg of 28 bytes to 2 on channel businesschannel took 49.5µs" +orderer0.example.com | "2019-09-24 00:25:23.457 UTC [orderer.common.cluster.step] sendMessage -> DEBU f23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 400.3µs " +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [msp.identity] Sign -> DEBU b11 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [gossip.gossip] handleMessage -> DEBU b12 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [gossip.comm] Send -> DEBU b13 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.645 UTC [msp] DeserializeIdentity -> DEBU b14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b06 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [gossip.comm] Send -> DEBU b15 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [msp] DeserializeIdentity -> DEBU b16 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b17 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [gossip.comm] Send -> DEBU b19 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [gossip.comm] sendToEndpoint -> DEBU b1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [cauthdsl] func1 -> DEBU b1d 0xc003e51130 gate 1569284707646417500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [cauthdsl] func2 -> DEBU b1e 0xc003e51130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [gossip.comm] sendToEndpoint -> DEBU b1f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [cauthdsl] func2 -> DEBU b20 0xc003e51130 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [gossip.comm] sendToEndpoint -> DEBU b21 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [cauthdsl] func2 -> DEBU b22 0xc003e51130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [cauthdsl] func2 -> DEBU b23 0xc003e51130 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [cauthdsl] func1 -> DEBU b24 0xc003e51130 gate 1569284707646417500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b25 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.647 UTC [gossip.comm] sendToEndpoint -> DEBU b27 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b28 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.656 UTC [peer] buildTrustedRootsForChain -> DEBU b29 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.657 UTC [peer] buildTrustedRootsForChain -> DEBU b2a adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-09-24 00:25:07.658 UTC [peer] buildTrustedRootsForChain -> DEBU b2b adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-09-24 00:25:07.658 UTC [peer] buildTrustedRootsForChain -> DEBU b2c adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-09-24 00:25:07.663 UTC [committer.txvalidator] validateTx -> DEBU b2d config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:07.663 UTC [committer.txvalidator] validateTx -> DEBU b2e [businesschannel] validateTx completes for block 0xc0038b0a00 env 0xc00392c8c0 txn 0" +orderer0.example.com | "2019-09-24 00:25:23.458 UTC [orderer.common.cluster.step] sendMessage -> DEBU f24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.7µs " +orderer0.example.com | "2019-09-24 00:25:23.458 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f25 Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" +orderer0.example.com | "2019-09-24 00:25:23.460 UTC [orderer.common.cluster.step] handleMessage -> DEBU f26 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:23.460 UTC [orderer.common.cluster.step] handleMessage -> DEBU f27 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:23.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f28 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:23.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f29 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2019-09-24 00:25:23.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71µs " +orderer0.example.com | "2019-09-24 00:25:23.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2b Sending msg of 28 bytes to 2 on channel businesschannel took 37µs" +orderer0.example.com | "2019-09-24 00:25:23.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.3µs " +orderer0.example.com | "2019-09-24 00:25:23.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2d Sending msg of 28 bytes to 3 on channel businesschannel took 50.7µs" +orderer0.example.com | "2019-09-24 00:25:23.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.7µs " +orderer0.example.com | "2019-09-24 00:25:23.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:23.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f30 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:24.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU f31 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:24.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f32 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +orderer0.example.com | "2019-09-24 00:25:24.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.1µs " +orderer0.example.com | "2019-09-24 00:25:24.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f34 Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +orderer0.example.com | "2019-09-24 00:25:24.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f35 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2019-09-24 00:25:24.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.9µs " +orderer0.example.com | "2019-09-24 00:25:24.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.9µs " +orderer0.example.com | "2019-09-24 00:25:24.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU f38 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:24.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f39 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:24.641 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:24.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3b Sending msg of 28 bytes to 3 on channel testchainid took 28µs" +orderer0.example.com | "2019-09-24 00:25:24.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161µs " +orderer0.example.com | "2019-09-24 00:25:24.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3d Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-09-24 00:25:24.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3e Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +orderer0.example.com | "2019-09-24 00:25:24.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.9µs " +orderer0.example.com | "2019-09-24 00:25:24.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.5µs " +orderer0.example.com | "2019-09-24 00:25:24.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f41 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:24.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:25.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU f43 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:25.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f44 Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs" +orderer0.example.com | "2019-09-24 00:25:25.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU f45 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.2µs " +orderer0.example.com | "2019-09-24 00:25:25.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f46 Sending msg of 28 bytes to 2 on channel businesschannel took 41.4µs" +orderer0.example.com | "2019-09-24 00:25:25.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f47 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-09-24 00:25:25.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 290.2µs " +orderer0.example.com | "2019-09-24 00:25:25.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU f49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96µs " +orderer0.example.com | "2019-09-24 00:25:25.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:25.456 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:25.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:25.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4d Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +orderer0.example.com | "2019-09-24 00:25:25.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.3µs " +orderer0.example.com | "2019-09-24 00:25:25.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4f Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-09-24 00:25:25.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f50 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +orderer0.example.com | "2019-09-24 00:25:25.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.9µs " +orderer0.example.com | "2019-09-24 00:25:25.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.1µs " +orderer0.example.com | "2019-09-24 00:25:25.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU f53 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:25.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f54 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:26.141 UTC [orderer.common.cluster.step] handleMessage -> DEBU f55 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:26.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f56 Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +orderer0.example.com | "2019-09-24 00:25:26.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.4µs " +orderer0.example.com | "2019-09-24 00:25:26.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f58 Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +orderer0.example.com | "2019-09-24 00:25:26.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f59 Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +orderer0.example.com | "2019-09-24 00:25:26.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 233.6µs " +orderer0.example.com | "2019-09-24 00:25:26.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 510µs " +orderer0.example.com | "2019-09-24 00:25:26.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:26.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:26.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:26.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5f Sending msg of 28 bytes to 3 on channel testchainid took 125.1µs" +orderer0.example.com | "2019-09-24 00:25:26.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.0841ms " +orderer0.example.com | "2019-09-24 00:25:26.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f61 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-09-24 00:25:26.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f62 Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +orderer0.example.com | "2019-09-24 00:25:26.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108µs " +orderer0.example.com | "2019-09-24 00:25:26.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 190.2µs " +orderer0.example.com | "2019-09-24 00:25:26.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f65 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:26.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f66 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:27.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU f67 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:27.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f68 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2019-09-24 00:25:27.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU f69 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80µs " +orderer0.example.com | "2019-09-24 00:25:27.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6a Sending msg of 28 bytes to 2 on channel businesschannel took 49.3µs" +orderer0.example.com | "2019-09-24 00:25:27.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6b Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs" +orderer0.example.com | "2019-09-24 00:25:27.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.9µs " +orderer0.example.com | "2019-09-24 00:25:27.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.1µs " +orderer0.example.com | "2019-09-24 00:25:27.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:27.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:27.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU f70 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:27.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f71 Sending msg of 28 bytes to 3 on channel testchainid took 23.5µs" +orderer0.example.com | "2019-09-24 00:25:27.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU f72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.5µs " +orderer0.example.com | "2019-09-24 00:25:27.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f73 Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +orderer0.example.com | "2019-09-24 00:25:27.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f74 Sending msg of 28 bytes to 3 on channel businesschannel took 23µs" +orderer0.example.com | "2019-09-24 00:25:27.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " +orderer0.example.com | "2019-09-24 00:25:27.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.6µs " +orderer0.example.com | "2019-09-24 00:25:27.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f77 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:27.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f78 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:28.139 UTC [orderer.common.cluster.step] handleMessage -> DEBU f79 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:28.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7a Sending msg of 28 bytes to 3 on channel testchainid took 92.1µs" +orderer0.example.com | "2019-09-24 00:25:28.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 270.5µs " +orderer0.example.com | "2019-09-24 00:25:28.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7c Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +orderer0.example.com | "2019-09-24 00:25:28.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7d Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +orderer0.example.com | "2019-09-24 00:25:28.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.5µs " +orderer0.example.com | "2019-09-24 00:25:28.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +orderer0.example.com | "2019-09-24 00:25:28.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f80 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:28.465 UTC [orderer.common.cluster.step] handleMessage -> DEBU f81 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:28.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f82 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:28.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f83 Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +orderer0.example.com | "2019-09-24 00:25:28.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.4µs " +orderer0.example.com | "2019-09-24 00:25:28.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f85 Sending msg of 28 bytes to 2 on channel businesschannel took 37.7µs" +orderer0.example.com | "2019-09-24 00:25:28.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f86 Sending msg of 28 bytes to 3 on channel businesschannel took 25.5µs" +orderer0.example.com | "2019-09-24 00:25:28.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.3µs " +orderer0.example.com | "2019-09-24 00:25:28.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.4µs " +orderer0.example.com | "2019-09-24 00:25:28.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f89 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:28.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:29.141 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:29.145 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8c Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" +orderer0.example.com | "2019-09-24 00:25:29.145 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 277.2µs " +orderer0.example.com | "2019-09-24 00:25:29.456 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8e Sending msg of 28 bytes to 2 on channel businesschannel took 142µs" +orderer0.example.com | "2019-09-24 00:25:29.457 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.3µs " +orderer0.example.com | "2019-09-24 00:25:29.457 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f90 Sending msg of 28 bytes to 3 on channel businesschannel took 32µs" +orderer0.example.com | "2019-09-24 00:25:29.458 UTC [orderer.common.cluster.step] sendMessage -> DEBU f91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.3µs " +orderer0.example.com | "2019-09-24 00:25:29.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU f92 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:29.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU f93 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:29.657 UTC [orderer.common.cluster.step] handleMessage -> DEBU f94 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:29.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f95 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +orderer0.example.com | "2019-09-24 00:25:29.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU f96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.4µs " +orderer0.example.com | "2019-09-24 00:25:29.957 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f97 Sending msg of 28 bytes to 2 on channel businesschannel took 64.5µs" +orderer0.example.com | "2019-09-24 00:25:29.958 UTC [orderer.common.cluster.step] sendMessage -> DEBU f99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 346.5µs " +orderer0.example.com | "2019-09-24 00:25:29.958 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " +orderer0.example.com | "2019-09-24 00:25:29.959 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:29.960 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:29.958 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f98 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-09-24 00:25:30.141 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:30.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9e Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2019-09-24 00:25:30.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " +orderer0.example.com | "2019-09-24 00:25:30.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa0 Sending msg of 28 bytes to 2 on channel businesschannel took 213µs" +orderer0.example.com | "2019-09-24 00:25:30.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa1 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2019-09-24 00:25:30.457 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.3µs " +orderer0.example.com | "2019-09-24 00:25:30.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:30.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:30.459 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 6.198ms " +orderer0.example.com | "2019-09-24 00:25:30.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:30.670 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa7 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2019-09-24 00:25:30.670 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.9µs " +orderer0.example.com | "2019-09-24 00:25:30.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa9 Sending msg of 28 bytes to 3 on channel businesschannel took 68.2µs" +orderer0.example.com | "2019-09-24 00:25:30.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faa Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +orderer0.example.com | "2019-09-24 00:25:30.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU fab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 162.1µs " +orderer0.example.com | "2019-09-24 00:25:30.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU fac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.6µs " +orderer0.example.com | "2019-09-24 00:25:30.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU fad Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:30.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU fae Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:31.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU faf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:31.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb0 Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +orderer0.example.com | "2019-09-24 00:25:31.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.8µs " +orderer0.example.com | "2019-09-24 00:25:31.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb2 Sending msg of 28 bytes to 2 on channel businesschannel took 129.5µs" +orderer0.example.com | "2019-09-24 00:25:31.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb3 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +orderer0.example.com | "2019-09-24 00:25:31.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.7µs " +orderer0.example.com | "2019-09-24 00:25:31.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.4µs " +orderer0.example.com | "2019-09-24 00:25:31.465 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:31.465 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:31.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:31.645 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb9 Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +orderer0.example.com | "2019-09-24 00:25:31.645 UTC [orderer.common.cluster.step] sendMessage -> DEBU fba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.8µs " +orderer0.example.com | "2019-09-24 00:25:31.953 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbb Sending msg of 28 bytes to 2 on channel businesschannel took 38.5µs" +orderer0.example.com | "2019-09-24 00:25:31.953 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbc Sending msg of 28 bytes to 3 on channel businesschannel took 25.8µs" +orderer0.example.com | "2019-09-24 00:25:31.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.5µs " +orderer0.example.com | "2019-09-24 00:25:31.955 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 806.3µs " +orderer0.example.com | "2019-09-24 00:25:31.976 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:31.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:32.139 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:32.139 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc2 Sending msg of 28 bytes to 3 on channel testchainid took 32µs" +orderer0.example.com | "2019-09-24 00:25:32.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.5µs " +orderer0.example.com | "2019-09-24 00:25:32.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc4 Sending msg of 28 bytes to 2 on channel businesschannel took 102.3µs" +orderer0.example.com | "2019-09-24 00:25:32.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc5 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +orderer0.example.com | "2019-09-24 00:25:32.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.2µs " +orderer0.example.com | "2019-09-24 00:25:32.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 94.2µs " +orderer0.example.com | "2019-09-24 00:25:32.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc8 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:32.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:32.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU fca Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:32.648 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.8µs " +orderer0.example.com | "2019-09-24 00:25:32.645 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcc Sending msg of 28 bytes to 3 on channel testchainid took 45.3µs" +orderer0.example.com | "2019-09-24 00:25:32.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcd Sending msg of 28 bytes to 2 on channel businesschannel took 144.2µs" +orderer0.example.com | "2019-09-24 00:25:32.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fce Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +orderer0.example.com | "2019-09-24 00:25:32.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.8µs " +orderer0.example.com | "2019-09-24 00:25:32.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 179.3µs " +orderer0.example.com | "2019-09-24 00:25:32.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:32.960 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:33.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:33.139 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd4 Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +orderer0.example.com | "2019-09-24 00:25:33.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " +orderer0.example.com | "2019-09-24 00:25:33.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd6 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-09-24 00:25:33.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd7 Sending msg of 28 bytes to 3 on channel businesschannel took 192.9µs" +orderer0.example.com | "2019-09-24 00:25:33.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.1µs " +orderer0.example.com | "2019-09-24 00:25:33.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.4µs " +orderer0.example.com | "2019-09-24 00:25:33.473 UTC [orderer.common.cluster.step] handleMessage -> DEBU fda Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:33.474 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:33.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:33.640 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdd Sending msg of 28 bytes to 3 on channel testchainid took 30.6µs" +orderer0.example.com | "2019-09-24 00:25:33.640 UTC [orderer.common.cluster.step] sendMessage -> DEBU fde Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122µs " +orderer0.example.com | "2019-09-24 00:25:33.979 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdf Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +orderer0.example.com | "2019-09-24 00:25:33.979 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe0 Sending msg of 28 bytes to 2 on channel businesschannel took 204.7µs" +orderer0.example.com | "2019-09-24 00:25:33.980 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 303.1µs " +orderer0.example.com | "2019-09-24 00:25:33.996 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:33.996 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:33.997 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 16.3346ms " +orderer0.example.com | "2019-09-24 00:25:34.139 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:34.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe6 Sending msg of 28 bytes to 3 on channel testchainid took 61.3µs" +orderer0.example.com | "2019-09-24 00:25:34.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 354.6µs " +orderer0.example.com | "2019-09-24 00:25:34.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe8 Sending msg of 28 bytes to 2 on channel businesschannel took 30.1µs" +orderer0.example.com | "2019-09-24 00:25:34.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe9 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-09-24 00:25:34.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU fea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.3µs " +orderer0.example.com | "2019-09-24 00:25:34.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU feb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.7µs " +orderer0.example.com | "2019-09-24 00:25:34.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU fec Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:34.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU fed Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:34.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU fee Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:34.647 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fef Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +orderer0.example.com | "2019-09-24 00:25:34.647 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.9µs " +orderer0.example.com | "2019-09-24 00:25:34.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff1 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +orderer0.example.com | "2019-09-24 00:25:34.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +orderer0.example.com | "2019-09-24 00:25:34.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +orderer0.example.com | "2019-09-24 00:25:34.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 38.4µs " +orderer0.example.com | "2019-09-24 00:25:34.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:34.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:35.149 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:35.149 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff8 Sending msg of 28 bytes to 3 on channel testchainid took 37.9µs" +orderer0.example.com | "2019-09-24 00:25:35.149 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.5µs " +orderer0.example.com | "2019-09-24 00:25:35.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffa Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +orderer0.example.com | "2019-09-24 00:25:35.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffb Sending msg of 28 bytes to 3 on channel businesschannel took 53.2µs" +orderer0.example.com | "2019-09-24 00:25:35.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.1µs " +orderer0.example.com | "2019-09-24 00:25:35.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.6µs " +orderer0.example.com | "2019-09-24 00:25:35.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffe Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:35.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU fff Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:35.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1000 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:35.664 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1001 Sending msg of 28 bytes to 3 on channel testchainid took 46.7µs" +orderer0.example.com | "2019-09-24 00:25:35.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1002 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 820µs " +orderer0.example.com | "2019-09-24 00:25:35.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1003 Sending msg of 28 bytes to 2 on channel businesschannel took 42.3µs" +orderer0.example.com | "2019-09-24 00:25:35.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1004 Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" +orderer0.example.com | "2019-09-24 00:25:35.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1005 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.1µs " +orderer0.example.com | "2019-09-24 00:25:35.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1006 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.3µs " +orderer0.example.com | "2019-09-24 00:25:35.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1007 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:35.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1008 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:36.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1009 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:36.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +orderer0.example.com | "2019-09-24 00:25:36.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 249µs " +orderer0.example.com | "2019-09-24 00:25:36.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100c Sending msg of 28 bytes to 2 on channel businesschannel took 92.4µs" +orderer0.example.com | "2019-09-24 00:25:36.458 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100e Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +orderer0.example.com | "2019-09-24 00:25:36.459 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.4µs " +orderer0.example.com | "2019-09-24 00:25:36.455 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.3µs " +orderer0.example.com | "2019-09-24 00:25:36.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1010 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:36.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1011 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:36.640 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1012 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:36.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1013 Sending msg of 28 bytes to 3 on channel testchainid took 46.1µs" +orderer0.example.com | "2019-09-24 00:25:36.647 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1014 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.7972ms " +orderer0.example.com | "2019-09-24 00:25:36.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1015 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +orderer0.example.com | "2019-09-24 00:25:36.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1016 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +orderer0.example.com | "2019-09-24 00:25:36.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1017 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 840.5µs " +orderer0.example.com | "2019-09-24 00:25:36.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1018 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.9µs " +orderer0.example.com | "2019-09-24 00:25:36.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1019 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:36.963 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:37.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:37.161 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 236.6µs " +orderer0.example.com | "2019-09-24 00:25:37.161 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101d Sending msg of 28 bytes to 3 on channel testchainid took 46.7µs" +orderer0.example.com | "2019-09-24 00:25:37.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101e Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +orderer0.example.com | "2019-09-24 00:25:37.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101f Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-09-24 00:25:37.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1020 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.6µs " +orderer0.example.com | "2019-09-24 00:25:37.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1021 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.8µs " +orderer0.example.com | "2019-09-24 00:25:37.464 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1022 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:37.464 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1023 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:37.650 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1024 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:37.650 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +orderer0.example.com | "2019-09-24 00:25:37.650 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1026 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " +orderer0.example.com | "2019-09-24 00:25:37.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1027 Sending msg of 28 bytes to 2 on channel businesschannel took 34.2µs" +orderer0.example.com | "2019-09-24 00:25:37.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1028 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +orderer0.example.com | "2019-09-24 00:25:37.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1029 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.8µs " +orderer0.example.com | "2019-09-24 00:25:37.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104.9µs " +orderer0.example.com | "2019-09-24 00:25:37.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:37.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:38.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:38.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102e Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +orderer0.example.com | "2019-09-24 00:25:38.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.2µs " +orderer0.example.com | "2019-09-24 00:25:38.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1030 Sending msg of 28 bytes to 2 on channel businesschannel took 31.3µs" +orderer0.example.com | "2019-09-24 00:25:38.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1031 Sending msg of 28 bytes to 3 on channel businesschannel took 31µs" +orderer0.example.com | "2019-09-24 00:25:38.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1032 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.1µs " +orderer0.example.com | "2019-09-24 00:25:38.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1033 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.3µs " +orderer0.example.com | "2019-09-24 00:25:38.462 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1034 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:38.462 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1035 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:38.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1036 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:38.645 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1037 Sending msg of 28 bytes to 3 on channel testchainid took 115.2µs" +orderer0.example.com | "2019-09-24 00:25:38.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1038 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 582.2µs " +orderer0.example.com | "2019-09-24 00:25:38.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1039 Sending msg of 28 bytes to 2 on channel businesschannel took 28.2µs" +orderer0.example.com | "2019-09-24 00:25:38.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103a Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +orderer0.example.com | "2019-09-24 00:25:38.959 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.5µs " +orderer0.example.com | "2019-09-24 00:25:38.959 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.8µs " +orderer0.example.com | "2019-09-24 00:25:38.964 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:38.965 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:39.148 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:39.149 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1040 Sending msg of 28 bytes to 3 on channel testchainid took 11.1µs" +orderer0.example.com | "2019-09-24 00:25:39.149 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1041 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " +orderer0.example.com | "2019-09-24 00:25:39.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1042 Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" +orderer0.example.com | "2019-09-24 00:25:39.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1043 Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-09-24 00:25:39.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1044 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 318.9µs " +orderer0.example.com | "2019-09-24 00:25:39.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1045 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 132.4µs " +orderer0.example.com | "2019-09-24 00:25:39.457 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1046 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:39.457 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1047 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:39.646 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1048 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:39.647 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1049 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +orderer0.example.com | "2019-09-24 00:25:39.648 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.1µs " +orderer0.example.com | "2019-09-24 00:25:39.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104b Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +orderer0.example.com | "2019-09-24 00:25:39.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104c Sending msg of 28 bytes to 3 on channel businesschannel took 23.9µs" +orderer0.example.com | "2019-09-24 00:25:39.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.8µs " +orderer0.example.com | "2019-09-24 00:25:39.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96µs " +orderer0.example.com | "2019-09-24 00:25:39.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:39.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1050 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:40.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1051 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:40.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1052 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +orderer0.example.com | "2019-09-24 00:25:40.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1053 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.3µs " +orderer0.example.com | "2019-09-24 00:25:40.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1054 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +peer0.org1.example.com | "2019-09-24 00:25:07.663 UTC [committer.txvalidator] Validate -> DEBU b2f got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 00:25:07.663 UTC [committer.txvalidator] Validate -> INFO b30 [businesschannel] Validated block [2] in 491ms" +peer0.org1.example.com | "2019-09-24 00:25:07.663 UTC [gossip.privdata] listMissingPrivateData -> DEBU b31 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 00:25:07.664 UTC [gossip.privdata] StoreBlock -> DEBU b32 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 00:25:07.664 UTC [committer] preCommit -> DEBU b33 Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-09-24 00:25:07.664 UTC [kvledger] CommitWithPvtData -> DEBU b34 [businesschannel] Validating state for block [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.664 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU b35 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 00:25:07.664 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU b36 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 00:25:07.664 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU b37 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 00:25:07.664 UTC [gossip.comm] func1 -> DEBU b38 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.664 UTC [gossip.gossip] handleMessage -> DEBU b39 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.664 UTC [gossip.gossip] handleMessage -> DEBU b3a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.664 UTC [gossip.discovery] handleMsgFromComm -> DEBU b3b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.665 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b3c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.665 UTC [msp.identity] Verify -> DEBU b3d Verify: digest = 00000000 c3 35 c6 b5 b5 f9 b7 06 72 0b 30 aa b4 1c 78 de |.5......r.0...x.| +peer0.org1.example.com | 00000010 0f ec ba 81 31 b9 ae d6 63 65 d9 ee ce 16 da 8c |....1...ce......|" +peer0.org1.example.com | "2019-09-24 00:25:07.665 UTC [msp.identity] Verify -> DEBU b3e Verify: sig = 00000000 30 45 02 21 00 cd 80 4d e9 ce 58 d1 a1 96 98 74 |0E.!...M..X....t| +peer0.org1.example.com | 00000010 44 46 72 c1 2c 2a 00 20 cd c4 48 8e 44 f9 a0 44 |DFr.,*. ..H.D..D| +peer0.org1.example.com | 00000020 66 0d a8 a4 58 02 20 43 ff 46 9b 0a e6 4a fc bb |f...X. C.F...J..| +peer0.org1.example.com | 00000030 db b3 2e 4d 8d 1f 38 e6 07 31 29 8b 94 fa 2e 59 |...M..8..1)....Y| +peer0.org1.example.com | 00000040 1f e7 0e 32 98 46 ad |...2.F.|" +peer0.org1.example.com | "2019-09-24 00:25:07.665 UTC [msp.identity] Verify -> DEBU b3f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:07.665 UTC [msp.identity] Verify -> DEBU b40 Verify: sig = 00000000 30 44 02 20 36 70 83 78 83 e5 37 41 b6 9d 13 e1 |0D. 6p.x..7A....| +peer0.org1.example.com | 00000010 dd 84 55 50 92 30 92 b2 da a4 76 25 1d 15 0c 5c |..UP.0....v%...\| +peer0.org1.example.com | 00000020 c6 31 49 db 02 20 77 ce 4a 3f f7 6b d6 60 e3 08 |.1I.. w.J?.k.`..| +peer0.org1.example.com | 00000030 98 f7 db 0b 93 50 78 db 59 eb 6c d6 6b 08 32 61 |.....Px.Y.l.k.2a| +peer0.org1.example.com | 00000040 8a 16 d3 0b 85 9c |......|" +peer0.org1.example.com | "2019-09-24 00:25:07.665 UTC [gossip.discovery] handleAliveMessage -> DEBU b41 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.665 UTC [gossip.discovery] isSentByMe -> DEBU b42 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.665 UTC [gossip.discovery] handleAliveMessage -> DEBU b43 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU b44 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.664 UTC [valimpl] ValidateAndPrepareBatch -> DEBU b45 ValidateAndPrepareBatch() for block number = [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.669 UTC [valimpl] ValidateAndPrepareBatch -> DEBU b46 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:25:07.650 UTC [cauthdsl] func1 -> DEBU b47 0xc003e51970 gate 1569284707650950300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [cauthdsl] func2 -> DEBU b48 0xc003e51970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [cauthdsl] func2 -> DEBU b49 0xc003e51970 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [cauthdsl] func2 -> DEBU b4a 0xc003e51970 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [valimpl] preprocessProtoBlock -> DEBU b4b txType=CONFIG" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [msp.identity] Verify -> DEBU b4c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [msp.identity] Verify -> DEBU b4d Verify: sig = 00000000 30 44 02 20 08 b3 4d 15 b7 6d d7 68 21 06 50 ac |0D. ..M..m.h!.P.| +peer0.org1.example.com | 00000010 80 67 e4 7a d0 dc d0 46 7e ab 23 3b ec 35 89 dd |.g.z...F~.#;.5..| +peer0.org1.example.com | 00000020 50 60 38 14 02 20 0d cd f2 47 07 dc 29 40 c6 03 |P`8.. ...G..)@..| +peer0.org1.example.com | 00000030 7c 70 16 0b 4a fd 80 28 51 d1 06 32 83 60 52 ab ||p..J..(Q..2.`R.| +peer0.org1.example.com | 00000040 76 bb 04 9b 9a fe |v.....|" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [valimpl] processNonEndorserTx -> DEBU b4e Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [cauthdsl] func2 -> DEBU b4f 0xc003e51970 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [cauthdsl] func1 -> DEBU b50 0xc003e51970 gate 1569284707650950300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [policies] Evaluate -> DEBU b51 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [policies] Evaluate -> DEBU b52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [policies] Evaluate -> DEBU b53 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [policies] Evaluate -> DEBU b54 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [gossip.comm] authenticateRemotePeer -> DEBU b55 Authenticated 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.671 UTC [msp] DeserializeIdentity -> DEBU b56 Obtaining identity" +orderer0.example.com | "2019-09-24 00:25:40.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1055 Sending msg of 28 bytes to 3 on channel businesschannel took 34.8µs" +orderer0.example.com | "2019-09-24 00:25:40.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1056 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.8µs " +orderer0.example.com | "2019-09-24 00:25:40.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1057 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.8µs " +orderer0.example.com | "2019-09-24 00:25:40.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1058 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:40.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1059 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:40.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:40.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105b Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +orderer0.example.com | "2019-09-24 00:25:40.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.9µs " +orderer0.example.com | "2019-09-24 00:25:40.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105d Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" +orderer0.example.com | "2019-09-24 00:25:40.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105e Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-09-24 00:25:40.933 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 326.7µs " +orderer0.example.com | "2019-09-24 00:25:40.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1060 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 247.6µs " +orderer0.example.com | "2019-09-24 00:25:40.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1061 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:40.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1062 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:41.123 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1063 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:41.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1064 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +orderer0.example.com | "2019-09-24 00:25:41.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1065 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.6µs " +orderer0.example.com | "2019-09-24 00:25:41.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1066 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +orderer0.example.com | "2019-09-24 00:25:41.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1067 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-09-24 00:25:41.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1068 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +orderer0.example.com | "2019-09-24 00:25:41.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1069 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.3µs " +orderer0.example.com | "2019-09-24 00:25:41.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:41.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:41.617 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:41.618 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106d Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2019-09-24 00:25:41.618 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.6µs " +orderer0.example.com | "2019-09-24 00:25:41.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106f Sending msg of 28 bytes to 2 on channel businesschannel took 33.5µs" +orderer0.example.com | "2019-09-24 00:25:41.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1070 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2019-09-24 00:25:41.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1071 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116µs " +orderer0.example.com | "2019-09-24 00:25:41.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1072 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.6µs " +orderer0.example.com | "2019-09-24 00:25:41.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1073 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:41.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1074 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:42.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1075 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:42.118 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1076 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +orderer0.example.com | "2019-09-24 00:25:42.118 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1077 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.5µs " +orderer0.example.com | "2019-09-24 00:25:42.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1078 Sending msg of 28 bytes to 2 on channel businesschannel took 130.2µs" +orderer0.example.com | "2019-09-24 00:25:42.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1079 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.1µs " +orderer0.example.com | "2019-09-24 00:25:42.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107a Sending msg of 28 bytes to 3 on channel businesschannel took 118.4µs" +peer0.org1.example.com | "2019-09-24 00:25:07.670 UTC [valimpl] processNonEndorserTx -> DEBU b57 Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-09-24 00:25:07.671 UTC [msp] DeserializeIdentity -> DEBU b58 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.671 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU b59 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:25:07.671 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU b5a constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-09-24 00:25:07.671 UTC [msp.identity] newIdentity -> DEBU b5b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.671 UTC [msp] GetDefaultSigningIdentity -> DEBU b5c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.671 UTC [msp.identity] Sign -> DEBU b5d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151016 " +peer0.org1.example.com | "2019-09-24 00:25:07.671 UTC [msp.identity] Sign -> DEBU b5e Sign: digest: 65FBCB94AD0B30160C1EA43FD4FEEEBFE9348C7FEA0347474595EBE7730E2670 " +peer0.org1.example.com | "2019-09-24 00:25:07.671 UTC [peer] GenerateSimulationResults -> DEBU b5f Processing CONFIG" +peer0.org1.example.com | "2019-09-24 00:25:07.671 UTC [msp] GetDefaultSigningIdentity -> DEBU b60 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.672 UTC [msp.identity] Sign -> DEBU b61 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:07.672 UTC [msp.identity] Sign -> DEBU b62 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:07.672 UTC [msp] DeserializeIdentity -> DEBU b63 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.672 UTC [gossip.comm] Send -> DEBU b65 Entering, sending GossipMessage: nonce:5232390643687232235 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.688 UTC [gossip.comm] sendToEndpoint -> DEBU b66 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:5232390643687232235 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.704 UTC [grpc] HandleSubConnStateChange -> DEBU b67 pickfirstBalancer: HandleSubConnStateChange: 0xc003e50290, READY" +peer0.org1.example.com | "2019-09-24 00:25:07.708 UTC [grpc] infof -> DEBU b68 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:25:42.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.8µs " +orderer0.example.com | "2019-09-24 00:25:42.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:42.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:42.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:42.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107f Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2019-09-24 00:25:42.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1080 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.9µs " +orderer0.example.com | "2019-09-24 00:25:42.921 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1081 Sending msg of 28 bytes to 2 on channel businesschannel took 12.9µs" +orderer0.example.com | "2019-09-24 00:25:42.922 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1082 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-09-24 00:25:42.922 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1083 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " +orderer0.example.com | "2019-09-24 00:25:42.922 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1084 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.7µs " +orderer0.example.com | "2019-09-24 00:25:42.923 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1085 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:42.923 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1086 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:43.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1087 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:43.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1088 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +orderer0.example.com | "2019-09-24 00:25:43.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1089 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +orderer0.example.com | "2019-09-24 00:25:43.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108a Sending msg of 28 bytes to 2 on channel businesschannel took 51.7µs" +orderer0.example.com | "2019-09-24 00:25:43.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108b Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +orderer0.example.com | "2019-09-24 00:25:43.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 212.8µs " +orderer0.example.com | "2019-09-24 00:25:43.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.3µs " +orderer0.example.com | "2019-09-24 00:25:43.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:43.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:43.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1090 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:43.603 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1091 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +orderer0.example.com | "2019-09-24 00:25:43.603 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1092 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.7µs " +orderer0.example.com | "2019-09-24 00:25:43.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1093 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-09-24 00:25:43.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2019-09-24 00:25:43.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1095 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " +orderer0.example.com | "2019-09-24 00:25:43.924 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1096 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.4µs " +orderer0.example.com | "2019-09-24 00:25:43.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1097 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:43.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1098 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:44.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1099 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:44.103 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109a Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +orderer0.example.com | "2019-09-24 00:25:44.104 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.1µs " +orderer0.example.com | "2019-09-24 00:25:44.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109c Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-09-24 00:25:44.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109d Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +orderer0.example.com | "2019-09-24 00:25:44.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.4µs " +orderer0.example.com | "2019-09-24 00:25:44.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.6µs " +orderer0.example.com | "2019-09-24 00:25:44.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:44.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:44.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:44.603 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a3 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +orderer0.example.com | "2019-09-24 00:25:44.604 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.3µs " +orderer0.example.com | "2019-09-24 00:25:44.685 UTC [orderer.common.server] replicateDisabledChains -> DEBU 10a5 No inactive chains to try to replicate" +orderer0.example.com | "2019-09-24 00:25:44.919 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a6 Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" +orderer0.example.com | "2019-09-24 00:25:44.919 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a7 Sending msg of 28 bytes to 3 on channel businesschannel took 23.5µs" +orderer0.example.com | "2019-09-24 00:25:44.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.7µs " +orderer0.example.com | "2019-09-24 00:25:44.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.6µs " +orderer0.example.com | "2019-09-24 00:25:44.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10aa Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:44.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ab Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:45.105 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ac Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:45.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ad Sending msg of 28 bytes to 3 on channel testchainid took 12.3µs" +orderer0.example.com | "2019-09-24 00:25:45.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.8µs " +orderer0.example.com | "2019-09-24 00:25:45.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10af Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +orderer0.example.com | "2019-09-24 00:25:45.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b0 Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +orderer0.example.com | "2019-09-24 00:25:45.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.1µs " +orderer0.example.com | "2019-09-24 00:25:45.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.5µs " +orderer0.example.com | "2019-09-24 00:25:45.431 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:45.432 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:45.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:45.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b6 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +orderer0.example.com | "2019-09-24 00:25:45.603 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.2µs " +orderer0.example.com | "2019-09-24 00:25:45.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b8 Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +orderer0.example.com | "2019-09-24 00:25:45.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b9 Sending msg of 28 bytes to 3 on channel businesschannel took 33.2µs" +orderer0.example.com | "2019-09-24 00:25:45.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.4µs " +orderer0.example.com | "2019-09-24 00:25:45.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70µs " +orderer0.example.com | "2019-09-24 00:25:45.931 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bc Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:45.931 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:46.107 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10be Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:46.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bf Sending msg of 28 bytes to 3 on channel testchainid took 123.5µs" +orderer0.example.com | "2019-09-24 00:25:46.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.6µs " +orderer0.example.com | "2019-09-24 00:25:46.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c1 Sending msg of 28 bytes to 3 on channel businesschannel took 26µs" +orderer0.example.com | "2019-09-24 00:25:46.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c2 Sending msg of 28 bytes to 2 on channel businesschannel took 14.6µs" +orderer0.example.com | "2019-09-24 00:25:46.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.8µs " +orderer0.example.com | "2019-09-24 00:25:46.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 39.8µs " +orderer0.example.com | "2019-09-24 00:25:46.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:46.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:46.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:46.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c8 Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +orderer0.example.com | "2019-09-24 00:25:46.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.5µs " +orderer0.example.com | "2019-09-24 00:25:46.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ca Sending msg of 28 bytes to 2 on channel businesschannel took 30.1µs" +orderer0.example.com | "2019-09-24 00:25:46.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cb Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +orderer0.example.com | "2019-09-24 00:25:46.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 343.8µs " +orderer0.example.com | "2019-09-24 00:25:46.925 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84.4µs " +orderer0.example.com | "2019-09-24 00:25:46.930 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ce Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:46.930 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:47.102 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:47.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d1 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +orderer0.example.com | "2019-09-24 00:25:47.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.7µs " +orderer0.example.com | "2019-09-24 00:25:47.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d3 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +orderer0.example.com | "2019-09-24 00:25:47.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d4 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +orderer0.example.com | "2019-09-24 00:25:47.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.8µs " +orderer0.example.com | "2019-09-24 00:25:47.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " +orderer0.example.com | "2019-09-24 00:25:47.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:47.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:47.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:47.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10da Sending msg of 28 bytes to 3 on channel testchainid took 6.9µs" +orderer0.example.com | "2019-09-24 00:25:47.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10db Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.6µs " +orderer0.example.com | "2019-09-24 00:25:47.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10dc Sending msg of 28 bytes to 2 on channel businesschannel took 58.9µs" +orderer0.example.com | "2019-09-24 00:25:47.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10dd Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-09-24 00:25:47.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10de Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " +orderer0.example.com | "2019-09-24 00:25:47.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.3µs " +orderer0.example.com | "2019-09-24 00:25:47.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:47.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:48.102 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:48.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e3 Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +orderer0.example.com | "2019-09-24 00:25:48.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.1µs " +orderer0.example.com | "2019-09-24 00:25:48.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e5 Sending msg of 28 bytes to 2 on channel businesschannel took 32.4µs" +orderer0.example.com | "2019-09-24 00:25:48.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e6 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +orderer0.example.com | "2019-09-24 00:25:48.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.8µs " +orderer0.example.com | "2019-09-24 00:25:48.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.6µs " +orderer0.example.com | "2019-09-24 00:25:48.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:48.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ea Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:48.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10eb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:48.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ec Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +peer0.org1.example.com | "2019-09-24 00:25:07.684 UTC [peer] processChannelConfigTx -> DEBU b64 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-09-24 00:25:07.708 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU b69 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:25:07.709 UTC [lockbasedtxmgr] Done -> DEBU b6a Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-09-24 00:25:07.709 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU b6b Block [2] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 00:25:07.709 UTC [valinternal] ApplyWriteSet -> DEBU b6c txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003e29a40)}" +peer0.org1.example.com | "2019-09-24 00:25:07.709 UTC [valimpl] ValidateAndPrepareBatch -> DEBU b6d validating rwset..." +peer0.org1.example.com | "2019-09-24 00:25:07.709 UTC [valimpl] ValidateAndPrepareBatch -> DEBU b6e postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:25:07.709 UTC [valimpl] ValidateAndPrepareBatch -> DEBU b6f ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 00:25:07.709 UTC [kvledger] CommitWithPvtData -> DEBU b70 [businesschannel] Adding CommitHash to the block [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.709 UTC [kvledger] CommitWithPvtData -> DEBU b71 [businesschannel] Committing block [2] to storage" +peer0.org1.example.com | "2019-09-24 00:25:07.709 UTC [ledgerstorage] CommitWithPvtData -> DEBU b72 Writing block [2] to pvt block store" +peer0.org1.example.com | "2019-09-24 00:25:07.713 UTC [pvtdatastorage] Prepare -> DEBU b73 Saved 0 private data write sets for block [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.715 UTC [msp] GetDefaultSigningIdentity -> DEBU b74 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.715 UTC [msp.identity] Sign -> DEBU b75 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:07.715 UTC [gossip.comm] func1 -> DEBU b76 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.715 UTC [msp.identity] Sign -> DEBU b77 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:07.716 UTC [gossip.comm] authenticateRemotePeer -> DEBU b78 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.719 UTC [gossip.gossip] handleMessage -> DEBU b79 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.720 UTC [gossip.gossip] handleMessage -> DEBU b7a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU b7b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.728 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b7c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.729 UTC [msp.identity] Verify -> DEBU b7d Verify: digest = 00000000 a0 05 6e 11 9f cf f1 f8 66 9a 82 b2 d0 ec 41 9e |..n.....f.....A.| +orderer0.example.com | "2019-09-24 00:25:48.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ed Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.1µs " +orderer0.example.com | "2019-09-24 00:25:48.914 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ee Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-09-24 00:25:48.914 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ef Sending msg of 28 bytes to 2 on channel businesschannel took 6.1µs" +orderer0.example.com | "2019-09-24 00:25:48.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.5µs " +orderer0.example.com | "2019-09-24 00:25:48.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 45.3µs " +orderer0.example.com | "2019-09-24 00:25:48.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:48.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:49.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:49.103 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f5 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +orderer0.example.com | "2019-09-24 00:25:49.103 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.4µs " +orderer0.example.com | "2019-09-24 00:25:49.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f7 Sending msg of 28 bytes to 2 on channel businesschannel took 47.5µs" +orderer0.example.com | "2019-09-24 00:25:49.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f8 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-09-24 00:25:49.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.8µs " +orderer0.example.com | "2019-09-24 00:25:49.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 255.1µs " +orderer0.example.com | "2019-09-24 00:25:49.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10fb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:49.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10fc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:49.603 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10fd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:49.603 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fe Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +orderer0.example.com | "2019-09-24 00:25:49.603 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.7µs " +orderer0.example.com | "2019-09-24 00:25:49.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1100 Sending msg of 28 bytes to 2 on channel businesschannel took 31.8µs" +orderer0.example.com | "2019-09-24 00:25:49.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1101 Sending msg of 28 bytes to 3 on channel businesschannel took 139.8µs" +orderer0.example.com | "2019-09-24 00:25:49.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1102 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.2µs " +orderer0.example.com | "2019-09-24 00:25:49.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1103 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.4µs " +orderer0.example.com | "2019-09-24 00:25:49.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1104 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:49.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1105 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:50.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1106 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:50.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1107 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +orderer0.example.com | "2019-09-24 00:25:50.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1108 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.7µs " +orderer0.example.com | "2019-09-24 00:25:50.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1109 Sending msg of 28 bytes to 3 on channel businesschannel took 32.8µs" +orderer0.example.com | "2019-09-24 00:25:50.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110a Sending msg of 28 bytes to 2 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-09-24 00:25:50.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.2µs " +orderer0.example.com | "2019-09-24 00:25:50.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 47µs " +orderer0.example.com | "2019-09-24 00:25:50.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:50.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:50.603 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:50.603 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +orderer0.example.com | "2019-09-24 00:25:50.603 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1111 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.7µs " +orderer0.example.com | "2019-09-24 00:25:50.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1112 Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +orderer0.example.com | "2019-09-24 00:25:50.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1113 Sending msg of 28 bytes to 3 on channel businesschannel took 142.4µs" +orderer0.example.com | "2019-09-24 00:25:50.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1114 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.5µs " +orderer0.example.com | "2019-09-24 00:25:50.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1115 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.7µs " +orderer0.example.com | "2019-09-24 00:25:50.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1116 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:50.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1117 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:51.114 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1118 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:51.114 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" +orderer0.example.com | "2019-09-24 00:25:51.115 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0863ms " +orderer0.example.com | "2019-09-24 00:25:51.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111b Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-09-24 00:25:51.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111c Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +orderer0.example.com | "2019-09-24 00:25:51.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +orderer0.example.com | "2019-09-24 00:25:51.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 257.5µs " +orderer0.example.com | "2019-09-24 00:25:51.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:51.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1120 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:51.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1121 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:51.603 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +orderer0.example.com | "2019-09-24 00:25:51.603 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1123 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.1µs " +orderer0.example.com | "2019-09-24 00:25:51.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1124 Sending msg of 28 bytes to 2 on channel businesschannel took 44.4µs" +orderer0.example.com | "2019-09-24 00:25:51.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1125 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-09-24 00:25:51.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1126 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " +orderer0.example.com | "2019-09-24 00:25:51.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1127 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.9µs " +orderer0.example.com | "2019-09-24 00:25:51.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1128 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:51.923 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1129 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:52.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:52.103 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112b Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-09-24 00:25:52.103 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.6µs " +orderer0.example.com | "2019-09-24 00:25:52.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112d Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-09-24 00:25:52.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112e Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2019-09-24 00:25:52.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +orderer0.example.com | "2019-09-24 00:25:52.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1130 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53µs " +orderer0.example.com | "2019-09-24 00:25:52.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1131 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:52.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1132 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:52.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1133 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:52.604 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 28 bytes to 3 on channel testchainid took 76.5µs" +orderer0.example.com | "2019-09-24 00:25:52.604 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1135 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.6µs " +orderer0.example.com | "2019-09-24 00:25:52.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1136 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +orderer0.example.com | "2019-09-24 00:25:52.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1137 Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +orderer0.example.com | "2019-09-24 00:25:52.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1138 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.5µs " +orderer0.example.com | "2019-09-24 00:25:52.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1139 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.4µs " +orderer0.example.com | "2019-09-24 00:25:52.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:52.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:53.104 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:53.105 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 28 bytes to 3 on channel testchainid took 68.9µs" +orderer0.example.com | "2019-09-24 00:25:53.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147µs " +orderer0.example.com | "2019-09-24 00:25:53.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113f Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-09-24 00:25:53.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1140 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.4µs " +orderer0.example.com | "2019-09-24 00:25:53.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1141 Sending msg of 28 bytes to 3 on channel businesschannel took 37.1µs" +orderer0.example.com | "2019-09-24 00:25:53.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1142 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.9µs " +orderer0.example.com | "2019-09-24 00:25:53.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1143 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:53.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1144 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:53.607 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1145 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:53.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1146 Sending msg of 28 bytes to 3 on channel testchainid took 55.8µs" +orderer0.example.com | "2019-09-24 00:25:53.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1147 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +orderer0.example.com | "2019-09-24 00:25:53.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1148 Sending msg of 28 bytes to 2 on channel businesschannel took 52.3µs" +orderer0.example.com | "2019-09-24 00:25:53.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1149 Sending msg of 28 bytes to 3 on channel businesschannel took 77.2µs" +orderer0.example.com | "2019-09-24 00:25:53.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 241.5µs " +orderer0.example.com | "2019-09-24 00:25:53.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 277.5µs " +orderer0.example.com | "2019-09-24 00:25:53.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:53.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:54.105 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:54.105 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114f Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +orderer0.example.com | "2019-09-24 00:25:54.105 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1150 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +orderer0.example.com | "2019-09-24 00:25:54.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1151 Sending msg of 28 bytes to 3 on channel businesschannel took 19.4µs" +orderer0.example.com | "2019-09-24 00:25:54.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1152 Sending msg of 28 bytes to 2 on channel businesschannel took 12.8µs" +orderer0.example.com | "2019-09-24 00:25:54.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1153 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.2µs " +orderer0.example.com | "2019-09-24 00:25:54.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1154 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:54.424 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1155 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:54.422 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1156 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 7.1074ms " +orderer0.example.com | "2019-09-24 00:25:54.605 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1157 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:54.605 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1158 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +orderer0.example.com | "2019-09-24 00:25:54.605 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1159 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109µs " +orderer0.example.com | "2019-09-24 00:25:54.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115a Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-09-24 00:25:54.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115b Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-09-24 00:25:54.920 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.4µs " +orderer0.example.com | "2019-09-24 00:25:54.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64µs " +orderer0.example.com | "2019-09-24 00:25:54.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000010 f5 58 3d c2 6f a0 2f 34 90 eb e1 e1 4e 8e 3e 56 |.X=.o./4....N.>V|" +peer0.org1.example.com | "2019-09-24 00:25:07.729 UTC [msp.identity] Verify -> DEBU b7e Verify: sig = 00000000 30 44 02 20 0b fe 72 44 33 c1 18 60 58 eb 5e d9 |0D. ..rD3..`X.^.| +peer0.org1.example.com | 00000010 cc 3c 86 27 97 7a 00 b7 2a 72 3e 1d 41 7e 4f 5d |.<.'.z..*r>.A~O]| +peer0.org1.example.com | 00000020 45 52 11 81 02 20 3c 00 4d 1f 11 62 23 8b 3e fe |ER... <.M..b#.>.| +peer0.org1.example.com | 00000030 ce 66 64 26 bf 2d 15 0a 55 03 af c9 ef da 27 8c |.fd&.-..U.....'.| +peer0.org1.example.com | 00000040 36 32 39 ce 48 10 |629.H.|" +peer0.org1.example.com | "2019-09-24 00:25:07.729 UTC [gossip.discovery] handleAliveMessage -> DEBU b7f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.729 UTC [gossip.discovery] learnExistingMembers -> DEBU b80 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:07.729 UTC [gossip.discovery] learnExistingMembers -> DEBU b81 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:07.729 UTC [gossip.discovery] learnExistingMembers -> DEBU b82 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:07.729 UTC [gossip.discovery] learnExistingMembers -> DEBU b83 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:07.729 UTC [gossip.discovery] learnExistingMembers -> DEBU b84 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.729 UTC [gossip.discovery] handleAliveMessage -> DEBU b85 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU b86 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.730 UTC [grpc] infof -> DEBU b87 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:07.747 UTC [fsblkstorage] indexBlock -> DEBU b88 Indexing block [blockNum=2, blockHash=[]byte{0x4e, 0xd0, 0x49, 0x23, 0xb9, 0x3e, 0xc0, 0x5c, 0x31, 0x7d, 0x41, 0xd1, 0x41, 0x9e, 0x85, 0xa3, 0x3a, 0xc, 0xfa, 0x4b, 0xf1, 0xd7, 0x9c, 0x1, 0x39, 0x4c, 0x1f, 0xcb, 0x3c, 0x63, 0xa5, 0x0} txOffsets= +peer0.org1.example.com | txId=be7e094f4e6114772d86c435c98fa93588deed90dd195d27ecfc6e306eba1cfc locPointer=offset=71, bytesLength=22742 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 00:25:07.748 UTC [fsblkstorage] indexBlock -> DEBU b8a Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22742] for tx ID: [be7e094f4e6114772d86c435c98fa93588deed90dd195d27ecfc6e306eba1cfc] to txid-index" +peer0.org1.example.com | "2019-09-24 00:25:07.748 UTC [gossip.comm] authenticateRemotePeer -> DEBU b89 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.748 UTC [fsblkstorage] indexBlock -> DEBU b8b Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22742] for tx number:[0] ID: [be7e094f4e6114772d86c435c98fa93588deed90dd195d27ecfc6e306eba1cfc] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 00:25:07.748 UTC [msp] DeserializeIdentity -> DEBU b8c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.748 UTC [msp] DeserializeIdentity -> DEBU b8d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.748 UTC [msp.identity] newIdentity -> DEBU b8e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:07.749 UTC [msp] Validate -> DEBU b8f MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:07.749 UTC [msp] getCertificationChain -> DEBU b90 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:25:54.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:55.107 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1160 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:55.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1161 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +orderer0.example.com | "2019-09-24 00:25:55.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1162 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.2µs " +orderer0.example.com | "2019-09-24 00:25:55.425 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1163 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +orderer0.example.com | "2019-09-24 00:25:55.425 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1164 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +orderer0.example.com | "2019-09-24 00:25:55.425 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1165 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.6µs " +orderer0.example.com | "2019-09-24 00:25:55.425 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1166 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.6µs " +orderer0.example.com | "2019-09-24 00:25:55.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1167 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:55.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1168 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:55.606 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1169 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:55.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116a Sending msg of 28 bytes to 3 on channel testchainid took 23.4µs" +orderer0.example.com | "2019-09-24 00:25:55.606 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87µs " +orderer0.example.com | "2019-09-24 00:25:55.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116c Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +orderer0.example.com | "2019-09-24 00:25:55.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116d Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +orderer0.example.com | "2019-09-24 00:25:55.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.3µs " +orderer0.example.com | "2019-09-24 00:25:55.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.3µs " +orderer0.example.com | "2019-09-24 00:25:55.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1170 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:55.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1171 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:56.115 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1172 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:56.115 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1173 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +orderer0.example.com | "2019-09-24 00:25:56.115 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1174 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.7µs " +orderer0.example.com | "2019-09-24 00:25:56.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1175 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2019-09-24 00:25:56.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1176 Sending msg of 28 bytes to 2 on channel businesschannel took 5.9µs" +orderer0.example.com | "2019-09-24 00:25:56.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1177 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.3µs " +orderer0.example.com | "2019-09-24 00:25:56.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1178 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 41.4µs " +orderer0.example.com | "2019-09-24 00:25:56.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1179 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:56.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:56.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:56.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117c Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-09-24 00:25:56.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " +orderer0.example.com | "2019-09-24 00:25:56.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117e Sending msg of 28 bytes to 2 on channel businesschannel took 94.4µs" +orderer0.example.com | "2019-09-24 00:25:56.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117f Sending msg of 28 bytes to 3 on channel businesschannel took 28.8µs" +orderer0.example.com | "2019-09-24 00:25:56.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1180 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 233.4µs " +orderer0.example.com | "2019-09-24 00:25:56.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1181 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.3µs " +orderer0.example.com | "2019-09-24 00:25:56.923 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1182 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:56.924 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1183 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:57.104 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1184 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:57.104 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1185 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2019-09-24 00:25:57.104 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1186 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.2µs " +orderer0.example.com | "2019-09-24 00:25:57.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1187 Sending msg of 28 bytes to 2 on channel businesschannel took 52.2µs" +orderer0.example.com | "2019-09-24 00:25:57.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1188 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" +orderer0.example.com | "2019-09-24 00:25:57.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1189 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 245.6µs " +orderer0.example.com | "2019-09-24 00:25:57.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.1µs " +orderer0.example.com | "2019-09-24 00:25:57.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:57.430 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:57.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:57.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118e Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +orderer0.example.com | "2019-09-24 00:25:57.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " +orderer0.example.com | "2019-09-24 00:25:57.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1190 Sending msg of 28 bytes to 3 on channel businesschannel took 36µs" +orderer0.example.com | "2019-09-24 00:25:57.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1191 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +orderer0.example.com | "2019-09-24 00:25:57.920 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1192 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.1µs " +orderer0.example.com | "2019-09-24 00:25:57.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1193 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +orderer0.example.com | "2019-09-24 00:25:57.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1194 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:57.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1195 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:58.102 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1196 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:58.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1197 Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +orderer0.example.com | "2019-09-24 00:25:58.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1198 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.8µs " +orderer0.example.com | "2019-09-24 00:25:58.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1199 Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +orderer0.example.com | "2019-09-24 00:25:58.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 119a Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" +orderer0.example.com | "2019-09-24 00:25:58.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.7µs " +orderer0.example.com | "2019-09-24 00:25:58.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 205.6µs " +orderer0.example.com | "2019-09-24 00:25:58.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 119d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:58.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 119e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:58.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 119f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:58.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a0 Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +orderer0.example.com | "2019-09-24 00:25:58.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +orderer0.example.com | "2019-09-24 00:25:58.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a2 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-09-24 00:25:58.919 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a3 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2019-09-24 00:25:58.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " +orderer0.example.com | "2019-09-24 00:25:58.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.3µs " +orderer0.example.com | "2019-09-24 00:25:58.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:58.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:59.105 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:59.105 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a9 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +orderer0.example.com | "2019-09-24 00:25:59.105 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11aa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.4µs " +orderer0.example.com | "2019-09-24 00:25:59.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ab Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +orderer0.example.com | "2019-09-24 00:25:59.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ac Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" +orderer0.example.com | "2019-09-24 00:25:59.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104µs " +orderer0.example.com | "2019-09-24 00:25:59.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.4µs " +orderer0.example.com | "2019-09-24 00:25:59.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11af Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:59.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:59.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:59.604 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b2 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +orderer0.example.com | "2019-09-24 00:25:59.605 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " +orderer0.example.com | "2019-09-24 00:25:59.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b4 Sending msg of 28 bytes to 2 on channel businesschannel took 27.5µs" +orderer0.example.com | "2019-09-24 00:25:59.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b5 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2019-09-24 00:25:59.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " +orderer0.example.com | "2019-09-24 00:25:59.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.4µs " +orderer0.example.com | "2019-09-24 00:25:59.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:25:59.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:00.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ba Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:00.101 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11bb Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +orderer0.example.com | "2019-09-24 00:26:00.101 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11bc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +orderer0.example.com | "2019-09-24 00:26:00.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11bd Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" +orderer0.example.com | "2019-09-24 00:26:00.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11be Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" +orderer0.example.com | "2019-09-24 00:26:00.444 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.9µs " +orderer0.example.com | "2019-09-24 00:26:00.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.9µs " +orderer0.example.com | "2019-09-24 00:26:00.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c1 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:00.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:00.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:00.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c4 Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" +orderer0.example.com | "2019-09-24 00:26:00.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " +orderer0.example.com | "2019-09-24 00:26:00.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c6 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-09-24 00:26:00.919 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c7 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +orderer0.example.com | "2019-09-24 00:26:00.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs " +orderer0.example.com | "2019-09-24 00:26:00.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58µs " +orderer0.example.com | "2019-09-24 00:26:00.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ca Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:00.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11cb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:01.105 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11cc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:01.105 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cd Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +orderer0.example.com | "2019-09-24 00:26:01.105 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ce Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.7µs " +orderer0.example.com | "2019-09-24 00:26:01.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cf Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +orderer0.example.com | "2019-09-24 00:26:01.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d0 Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +orderer0.example.com | "2019-09-24 00:26:01.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +orderer0.example.com | "2019-09-24 00:26:01.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.3µs " +orderer0.example.com | "2019-09-24 00:26:01.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:01.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:01.606 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:01.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d6 Sending msg of 28 bytes to 3 on channel testchainid took 57.8µs" +orderer0.example.com | "2019-09-24 00:26:01.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.4µs " +orderer0.example.com | "2019-09-24 00:26:01.922 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d8 Sending msg of 28 bytes to 2 on channel businesschannel took 49.8µs" +orderer0.example.com | "2019-09-24 00:26:01.922 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d9 Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +orderer0.example.com | "2019-09-24 00:26:01.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.8µs " +orderer0.example.com | "2019-09-24 00:26:01.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11db Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.5µs " +orderer0.example.com | "2019-09-24 00:26:01.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11dc Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:01.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11dd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:02.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11de Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:02.127 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11df Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +orderer0.example.com | "2019-09-24 00:26:02.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.9µs " +orderer0.example.com | "2019-09-24 00:26:02.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e1 Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +orderer0.example.com | "2019-09-24 00:26:02.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e2 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2019-09-24 00:26:02.422 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.2µs " +orderer0.example.com | "2019-09-24 00:26:02.422 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.8µs " +orderer0.example.com | "2019-09-24 00:26:02.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:02.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:02.607 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:02.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e8 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2019-09-24 00:26:02.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64µs " +orderer0.example.com | "2019-09-24 00:26:02.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ea Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +orderer0.example.com | "2019-09-24 00:26:02.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11eb Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-09-24 00:26:02.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.4µs " +orderer0.example.com | "2019-09-24 00:26:02.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 37.5µs " +orderer0.example.com | "2019-09-24 00:26:02.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ee Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:02.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ef Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:03.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:03.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f1 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +orderer0.example.com | "2019-09-24 00:26:03.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82µs " +orderer0.example.com | "2019-09-24 00:26:03.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 00:26:03.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f4 Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +orderer0.example.com | "2019-09-24 00:26:03.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.3µs " +orderer0.example.com | "2019-09-24 00:26:03.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.9µs " +peer0.org1.example.com | "2019-09-24 00:25:07.752 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.755 UTC [msp] DeserializeIdentity -> DEBU b93 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.756 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b94 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.757 UTC [msp] DeserializeIdentity -> DEBU b95 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b97 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b98 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU b99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU b9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU b9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [cauthdsl] func1 -> DEBU b9c 0xc003d80910 gate 1569284707758522500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU b9d 0xc003d80910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU b9e 0xc003d80910 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU b9f 0xc003d80910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU ba0 0xc003d80910 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [cauthdsl] func1 -> DEBU ba1 0xc003d80910 gate 1569284707758522500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU ba2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:26:03.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:03.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:03.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:03.601 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fa Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2019-09-24 00:26:03.601 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.2µs " +orderer0.example.com | "2019-09-24 00:26:03.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fc Sending msg of 28 bytes to 2 on channel businesschannel took 34.1µs" +orderer0.example.com | "2019-09-24 00:26:03.921 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fd Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-09-24 00:26:03.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " +orderer0.example.com | "2019-09-24 00:26:03.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.5µs " +orderer0.example.com | "2019-09-24 00:26:03.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1200 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:03.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1201 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:04.102 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1202 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:04.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1203 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +orderer0.example.com | "2019-09-24 00:26:04.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1204 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.2µs " +orderer0.example.com | "2019-09-24 00:26:04.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1205 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +orderer0.example.com | "2019-09-24 00:26:04.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1206 Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" +orderer0.example.com | "2019-09-24 00:26:04.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1207 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 367µs " +orderer0.example.com | "2019-09-24 00:26:04.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1208 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 388.3µs " +orderer0.example.com | "2019-09-24 00:26:04.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1209 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:04.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:04.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:04.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120c Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2019-09-24 00:26:04.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 120d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.4µs " +orderer0.example.com | "2019-09-24 00:26:04.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120e Sending msg of 28 bytes to 2 on channel businesschannel took 61.3µs" +orderer0.example.com | "2019-09-24 00:26:04.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120f Sending msg of 28 bytes to 3 on channel businesschannel took 7.5µs" +orderer0.example.com | "2019-09-24 00:26:04.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1210 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.6µs " +orderer0.example.com | "2019-09-24 00:26:04.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1211 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.4µs " +orderer0.example.com | "2019-09-24 00:26:04.924 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1212 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:04.924 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1213 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:05.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1214 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:05.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1215 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +orderer0.example.com | "2019-09-24 00:26:05.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1216 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.4µs " +orderer0.example.com | "2019-09-24 00:26:05.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1217 Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs" +orderer0.example.com | "2019-09-24 00:26:05.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1218 Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-09-24 00:26:05.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1219 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124µs " +orderer0.example.com | "2019-09-24 00:26:05.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.6µs " +orderer0.example.com | "2019-09-24 00:26:05.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:05.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:05.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:05.604 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 121e Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2019-09-24 00:26:05.604 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.8µs " +orderer0.example.com | "2019-09-24 00:26:05.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1220 Sending msg of 28 bytes to 2 on channel businesschannel took 82.1µs" +orderer0.example.com | "2019-09-24 00:26:05.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1221 Sending msg of 28 bytes to 3 on channel businesschannel took 532.3µs" +orderer0.example.com | "2019-09-24 00:26:05.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1222 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.6µs " +orderer0.example.com | "2019-09-24 00:26:05.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1223 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192.9µs " +orderer0.example.com | "2019-09-24 00:26:05.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1224 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:05.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1225 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:06.107 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1226 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:06.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1227 Sending msg of 28 bytes to 3 on channel testchainid took 28.3µs" +orderer0.example.com | "2019-09-24 00:26:06.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1228 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 346µs " +orderer0.example.com | "2019-09-24 00:26:06.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1229 Sending msg of 28 bytes to 3 on channel businesschannel took 29.3µs" +orderer0.example.com | "2019-09-24 00:26:06.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122a Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-09-24 00:26:06.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 170.3µs " +orderer0.example.com | "2019-09-24 00:26:06.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.6µs " +orderer0.example.com | "2019-09-24 00:26:06.424 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:06.424 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:06.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:06.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1230 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2019-09-24 00:26:06.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1231 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.1µs " +orderer0.example.com | "2019-09-24 00:26:06.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1232 Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" +orderer0.example.com | "2019-09-24 00:26:06.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1233 Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-09-24 00:26:06.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1234 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +orderer0.example.com | "2019-09-24 00:26:06.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1235 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.8µs " +orderer0.example.com | "2019-09-24 00:26:06.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1236 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:06.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1237 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:07.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1238 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:07.104 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1239 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2019-09-24 00:26:07.104 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 703.8µs " +orderer0.example.com | "2019-09-24 00:26:07.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 123b Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-09-24 00:26:07.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 123c Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-09-24 00:26:07.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.6µs " +orderer0.example.com | "2019-09-24 00:26:07.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.6µs " +orderer0.example.com | "2019-09-24 00:26:07.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:07.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1240 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:07.605 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1241 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:07.605 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1242 Sending msg of 28 bytes to 3 on channel testchainid took 20.3µs" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU ba3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU ba4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [cauthdsl] func1 -> DEBU ba5 0xc003d811d0 gate 1569284707758891700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU ba6 0xc003d811d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU ba7 0xc003d811d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ba8 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [msp] Validate -> DEBU ba9 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [msp] getCertificationChain -> DEBU baa MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [cauthdsl] func2 -> DEBU bab 0xc003d811d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [msp.identity] Verify -> DEBU bac Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [msp.identity] Verify -> DEBU bad Verify: sig = 00000000 30 44 02 20 5d 2e 7a 36 b9 0a 65 ac eb 03 15 b8 |0D. ].z6..e.....| +peer0.org1.example.com | 00000010 89 ac df 26 0c e4 e9 96 e8 80 a2 7d 12 86 2e 08 |...&.......}....| +peer0.org1.example.com | 00000020 ef 20 4a b4 02 20 5a b5 ba 7f 6e 02 7e e8 04 f2 |. J.. Z...n.~...| +peer0.org1.example.com | 00000030 99 19 02 fc 49 11 1e fe 85 9f c8 29 7b 35 71 bb |....I......){5q.| +peer0.org1.example.com | 00000040 e0 3b 32 9c ab 0f |.;2...|" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [cauthdsl] func2 -> DEBU bae 0xc003d811d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [cauthdsl] func1 -> DEBU baf 0xc003d811d0 gate 1569284707758891700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [policies] Evaluate -> DEBU bb0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [policies] Evaluate -> DEBU bb1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [policies] Evaluate -> DEBU bb2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [policies] Evaluate -> DEBU bb3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [gossip.comm] authenticateRemotePeer -> DEBU bb4 Authenticated 172.18.0.8:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [gossip.comm] createConnection -> DEBU bb5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.759 UTC [gossip.comm] sendToEndpoint -> DEBU bb6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.760 UTC [grpc] HandleSubConnStateChange -> DEBU bb7 pickfirstBalancer: HandleSubConnStateChange: 0xc003e50890, READY" +peer0.org1.example.com | "2019-09-24 00:25:07.760 UTC [msp] DeserializeIdentity -> DEBU bb8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.760 UTC [msp] DeserializeIdentity -> DEBU bb9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.760 UTC [msp] DeserializeIdentity -> DEBU bba Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.760 UTC [gossip.comm] Send -> DEBU bbb Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.761 UTC [msp] DeserializeIdentity -> DEBU bbc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.761 UTC [gossip.comm] Send -> DEBU bbd Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:07.778 UTC [gossip.comm] sendToEndpoint -> DEBU bc2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.778 UTC [gossip.comm] sendToEndpoint -> DEBU bc3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.766 UTC [gossip.comm] sendToEndpoint -> DEBU bbe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.752 UTC [fsblkstorage] updateCheckpoint -> DEBU b92 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71462], isChainEmpty=[false], lastBlockNumber=[2]" +peer0.org1.example.com | "2019-09-24 00:25:07.778 UTC [pvtdatastorage] Commit -> DEBU bc4 Committing private data for block [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.766 UTC [gossip.comm] sendToEndpoint -> DEBU bbf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.776 UTC [msp] GetDefaultSigningIdentity -> DEBU bc0 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.778 UTC [msp.identity] Sign -> DEBU bc5 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:07.779 UTC [msp.identity] Sign -> DEBU bc6 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:07.779 UTC [gossip.comm] authenticateRemotePeer -> DEBU bc7 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.777 UTC [gossip.comm] func1 -> DEBU bc1 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 00:26:07.605 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1243 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.9µs " +orderer0.example.com | "2019-09-24 00:26:07.914 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1244 Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +orderer0.example.com | "2019-09-24 00:26:07.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1245 Sending msg of 28 bytes to 3 on channel businesschannel took 24µs" +orderer0.example.com | "2019-09-24 00:26:07.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1246 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186µs " +orderer0.example.com | "2019-09-24 00:26:07.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1247 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.5µs " +orderer0.example.com | "2019-09-24 00:26:07.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1248 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:07.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1249 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:08.115 UTC [orderer.common.cluster.step] handleMessage -> DEBU 124a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:08.115 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124b Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-09-24 00:26:08.116 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260.1µs " +orderer0.example.com | "2019-09-24 00:26:08.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124d Sending msg of 28 bytes to 2 on channel businesschannel took 78.4µs" +orderer0.example.com | "2019-09-24 00:26:08.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124e Sending msg of 28 bytes to 3 on channel businesschannel took 33.9µs" +orderer0.example.com | "2019-09-24 00:26:08.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 243.8µs " +orderer0.example.com | "2019-09-24 00:26:08.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1250 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.2µs " +orderer0.example.com | "2019-09-24 00:26:08.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1251 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:08.424 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1252 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:08.615 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1253 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:08.615 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1254 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +orderer0.example.com | "2019-09-24 00:26:08.615 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1255 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.3µs " +orderer0.example.com | "2019-09-24 00:26:08.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1256 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-09-24 00:26:08.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1257 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.4µs " +orderer0.example.com | "2019-09-24 00:26:08.919 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1258 Sending msg of 28 bytes to 2 on channel businesschannel took 12µs" +orderer0.example.com | "2019-09-24 00:26:08.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1259 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.4µs " +orderer0.example.com | "2019-09-24 00:26:08.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:08.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:09.122 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:09.122 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 125d Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2019-09-24 00:26:09.122 UTC [orderer.common.cluster.step] sendMessage -> DEBU 125e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.3µs " +orderer0.example.com | "2019-09-24 00:26:09.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 125f Sending msg of 28 bytes to 2 on channel businesschannel took 245.7µs" +orderer0.example.com | "2019-09-24 00:26:09.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1260 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +orderer0.example.com | "2019-09-24 00:26:09.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1261 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.4µs " +orderer0.example.com | "2019-09-24 00:26:09.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1262 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:09.420 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1263 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.9µs " +orderer0.example.com | "2019-09-24 00:26:09.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1264 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:09.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1265 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:09.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1266 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +orderer0.example.com | "2019-09-24 00:26:09.627 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1267 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.7µs " +orderer0.example.com | "2019-09-24 00:26:09.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1268 Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +peer0.org1.example.com | "2019-09-24 00:25:07.779 UTC [gossip.comm] func1 -> DEBU bc8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.779 UTC [gossip.gossip] handleMessage -> DEBU bc9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.779 UTC [gossip.pull] HandleMessage -> DEBU bca GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.779 UTC [gossip.gossip] handleMessage -> DEBU bcb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.779 UTC [gossip.gossip] handleMessage -> DEBU bcc Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.779 UTC [gossip.gossip] handleMessage -> DEBU bcd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.779 UTC [gossip.discovery] handleMsgFromComm -> DEBU bce Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.779 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bcf Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.780 UTC [msp.identity] Verify -> DEBU bd0 Verify: digest = 00000000 c3 35 c6 b5 b5 f9 b7 06 72 0b 30 aa b4 1c 78 de |.5......r.0...x.| +peer0.org1.example.com | 00000010 0f ec ba 81 31 b9 ae d6 63 65 d9 ee ce 16 da 8c |....1...ce......|" +peer0.org1.example.com | "2019-09-24 00:25:07.780 UTC [msp.identity] Verify -> DEBU bd1 Verify: sig = 00000000 30 45 02 21 00 cd 80 4d e9 ce 58 d1 a1 96 98 74 |0E.!...M..X....t| +peer0.org1.example.com | 00000010 44 46 72 c1 2c 2a 00 20 cd c4 48 8e 44 f9 a0 44 |DFr.,*. ..H.D..D| +peer0.org1.example.com | 00000020 66 0d a8 a4 58 02 20 43 ff 46 9b 0a e6 4a fc bb |f...X. C.F...J..| +peer0.org1.example.com | 00000030 db b3 2e 4d 8d 1f 38 e6 07 31 29 8b 94 fa 2e 59 |...M..8..1)....Y| +peer0.org1.example.com | 00000040 1f e7 0e 32 98 46 ad |...2.F.|" +peer0.org1.example.com | "2019-09-24 00:25:07.780 UTC [gossip.discovery] handleAliveMessage -> DEBU bd2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.780 UTC [gossip.discovery] isSentByMe -> DEBU bd3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.780 UTC [gossip.discovery] handleAliveMessage -> DEBU bd4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.782 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bd5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.783 UTC [msp] DeserializeIdentity -> DEBU bd6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.783 UTC [msp] Validate -> DEBU bd7 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:07.783 UTC [msp] getCertificationChain -> DEBU bd8 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bd9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bda Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bdb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [policies] Evaluate -> DEBU bdc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [policies] Evaluate -> DEBU bdd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [policies] Evaluate -> DEBU bde == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [cauthdsl] func1 -> DEBU bdf 0xc0035918c0 gate 1569284707784340300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [cauthdsl] func2 -> DEBU be0 0xc0035918c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [cauthdsl] func2 -> DEBU be1 0xc0035918c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [cauthdsl] func2 -> DEBU be2 0xc0035918c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [cauthdsl] func2 -> DEBU be3 0xc0035918c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:26:09.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1269 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-09-24 00:26:09.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 126a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.2µs " +orderer0.example.com | "2019-09-24 00:26:09.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 126b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:09.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 126c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 562.1µs " +orderer0.example.com | "2019-09-24 00:26:09.924 UTC [orderer.common.cluster.step] handleMessage -> DEBU 126d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:10.115 UTC [orderer.common.cluster.step] handleMessage -> DEBU 126e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:10.115 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 126f Sending msg of 28 bytes to 3 on channel testchainid took 61.3µs" +orderer0.example.com | "2019-09-24 00:26:10.115 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1270 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121µs " +orderer0.example.com | "2019-09-24 00:26:10.387 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1271 Sending msg of 28 bytes to 2 on channel businesschannel took 34.1µs" +orderer0.example.com | "2019-09-24 00:26:10.388 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1272 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +orderer0.example.com | "2019-09-24 00:26:10.388 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1273 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.7µs " +orderer0.example.com | "2019-09-24 00:26:10.388 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1274 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.3µs " +orderer0.example.com | "2019-09-24 00:26:10.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1275 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:10.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1276 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:10.572 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1277 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:10.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1278 Sending msg of 28 bytes to 3 on channel testchainid took 282.3µs" +orderer0.example.com | "2019-09-24 00:26:10.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1279 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 241.3µs " +orderer0.example.com | "2019-09-24 00:26:10.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 127a Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +orderer0.example.com | "2019-09-24 00:26:10.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 127b Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +orderer0.example.com | "2019-09-24 00:26:10.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 127c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.5µs " +orderer0.example.com | "2019-09-24 00:26:10.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 127d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.7µs " +orderer0.example.com | "2019-09-24 00:26:10.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 127e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:10.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 127f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:11.119 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1280 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:11.121 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1281 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +orderer0.example.com | "2019-09-24 00:26:11.121 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1282 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.1µs " +orderer0.example.com | "2019-09-24 00:26:11.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1283 Sending msg of 28 bytes to 2 on channel businesschannel took 35.3µs" +orderer0.example.com | "2019-09-24 00:26:11.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1284 Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +orderer0.example.com | "2019-09-24 00:26:11.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1285 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.7µs " +orderer0.example.com | "2019-09-24 00:26:11.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1286 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.6µs " +orderer0.example.com | "2019-09-24 00:26:11.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1287 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:11.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1288 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:11.571 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1289 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:11.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128a Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2019-09-24 00:26:11.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.6µs " +orderer0.example.com | "2019-09-24 00:26:11.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128c Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +orderer0.example.com | "2019-09-24 00:26:11.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128d Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-09-24 00:26:11.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.4µs " +orderer0.example.com | "2019-09-24 00:26:11.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.4µs " +orderer0.example.com | "2019-09-24 00:26:11.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1290 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:11.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1291 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:12.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1292 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:12.085 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1293 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +orderer0.example.com | "2019-09-24 00:26:12.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1294 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.8µs " +orderer0.example.com | "2019-09-24 00:26:12.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1295 Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-09-24 00:26:12.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1296 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +orderer0.example.com | "2019-09-24 00:26:12.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1297 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.6µs " +orderer0.example.com | "2019-09-24 00:26:12.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1298 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.1µs " +orderer0.example.com | "2019-09-24 00:26:12.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1299 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:12.398 UTC [orderer.common.cluster.step] handleMessage -> DEBU 129a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:12.571 UTC [orderer.common.cluster.step] handleMessage -> DEBU 129b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:12.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129c Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +orderer0.example.com | "2019-09-24 00:26:12.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73µs " +orderer0.example.com | "2019-09-24 00:26:12.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129e Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +orderer0.example.com | "2019-09-24 00:26:12.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129f Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +orderer0.example.com | "2019-09-24 00:26:12.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.7µs " +orderer0.example.com | "2019-09-24 00:26:12.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160.7µs " +orderer0.example.com | "2019-09-24 00:26:12.889 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:12.897 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:13.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:13.083 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a5 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +orderer0.example.com | "2019-09-24 00:26:13.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.6µs " +orderer0.example.com | "2019-09-24 00:26:13.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a7 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +orderer0.example.com | "2019-09-24 00:26:13.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a8 Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +orderer0.example.com | "2019-09-24 00:26:13.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.5µs " +orderer0.example.com | "2019-09-24 00:26:13.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 246.8µs " +orderer0.example.com | "2019-09-24 00:26:13.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ab Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:13.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ac Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:13.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ad Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:13.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ae Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2019-09-24 00:26:13.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12af Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.2µs " +orderer0.example.com | "2019-09-24 00:26:13.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b0 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-09-24 00:26:13.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b1 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +orderer0.example.com | "2019-09-24 00:26:13.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.5µs " +orderer0.example.com | "2019-09-24 00:26:13.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.4µs " +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [cauthdsl] func1 -> DEBU be4 0xc0035918c0 gate 1569284707784340300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.784 UTC [policies] Evaluate -> DEBU be5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [policies] Evaluate -> DEBU be6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [policies] Evaluate -> DEBU be7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [cauthdsl] func1 -> DEBU be8 0xc0035d01e0 gate 1569284707785132800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [cauthdsl] func2 -> DEBU be9 0xc0035d01e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [cauthdsl] func2 -> DEBU bea 0xc0035d01e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU beb Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [msp] Validate -> DEBU bec MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [msp] getCertificationChain -> DEBU bed MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [cauthdsl] func2 -> DEBU bee 0xc0035d01e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [msp.identity] Verify -> DEBU bef Verify: digest = 00000000 cf d5 60 b7 3f 76 d5 4e 0c da 16 b9 5b 63 6d e3 |..`.?v.N....[cm.| +peer0.org1.example.com | 00000010 1d 36 2e 9c 6d 29 92 8d b9 99 fd dc c7 2d ae 8f |.6..m).......-..|" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [msp.identity] Verify -> DEBU bf0 Verify: sig = 00000000 30 45 02 21 00 fb 83 e6 4d f4 66 f1 2e 66 f7 97 |0E.!....M.f..f..| +peer0.org1.example.com | 00000010 dc c8 0e 02 84 77 99 95 dd 30 fe 40 b1 6c cb 63 |.....w...0.@.l.c| +peer0.org1.example.com | 00000020 b8 f2 00 c5 9d 02 20 4b 49 c8 01 0d a2 35 28 ef |...... KI....5(.| +peer0.org1.example.com | 00000030 f9 e9 6a 4a 1e 3a df 48 12 4d 36 a3 a8 59 b5 1e |..jJ.:.H.M6..Y..| +peer0.org1.example.com | 00000040 c6 fb 9a f7 3c 9b 8f |....<..|" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [cauthdsl] func2 -> DEBU bf1 0xc0035d01e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [cauthdsl] func1 -> DEBU bf2 0xc0035d01e0 gate 1569284707785132800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [gossip.comm] authenticateRemotePeer -> DEBU bf3 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [msp] DeserializeIdentity -> DEBU bf4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bf5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [msp] DeserializeIdentity -> DEBU bf6 Obtaining identity" +orderer0.example.com | "2019-09-24 00:26:13.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:13.890 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:14.072 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:14.073 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b7 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +orderer0.example.com | "2019-09-24 00:26:14.073 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.8µs " +orderer0.example.com | "2019-09-24 00:26:14.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b9 Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +orderer0.example.com | "2019-09-24 00:26:14.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ba Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +orderer0.example.com | "2019-09-24 00:26:14.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12bb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.8µs " +orderer0.example.com | "2019-09-24 00:26:14.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.3µs " +orderer0.example.com | "2019-09-24 00:26:14.396 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12bd Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:14.396 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12be Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:14.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12bf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:14.583 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.6µs " +orderer0.example.com | "2019-09-24 00:26:14.583 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c1 Sending msg of 28 bytes to 3 on channel testchainid took 591.1µs" +orderer0.example.com | "2019-09-24 00:26:14.889 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c2 Sending msg of 28 bytes to 2 on channel businesschannel took 51.1µs" +orderer0.example.com | "2019-09-24 00:26:14.889 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c3 Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +orderer0.example.com | "2019-09-24 00:26:14.889 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.2µs " +orderer0.example.com | "2019-09-24 00:26:14.889 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58µs " +orderer0.example.com | "2019-09-24 00:26:14.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:14.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:15.069 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:15.070 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c9 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +orderer0.example.com | "2019-09-24 00:26:15.070 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +orderer0.example.com | "2019-09-24 00:26:15.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12cb Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +orderer0.example.com | "2019-09-24 00:26:15.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12cc Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" +orderer0.example.com | "2019-09-24 00:26:15.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.3µs " +orderer0.example.com | "2019-09-24 00:26:15.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.5µs " +orderer0.example.com | "2019-09-24 00:26:15.388 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12cf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:15.388 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:15.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:15.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d2 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +orderer0.example.com | "2019-09-24 00:26:15.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106µs " +orderer0.example.com | "2019-09-24 00:26:15.888 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d4 Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +orderer0.example.com | "2019-09-24 00:26:15.888 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d5 Sending msg of 28 bytes to 2 on channel businesschannel took 11.2µs" +orderer0.example.com | "2019-09-24 00:26:15.888 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.6µs " +orderer0.example.com | "2019-09-24 00:26:15.888 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 41.2µs " +orderer0.example.com | "2019-09-24 00:26:15.889 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:15.889 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bf7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [msp] DeserializeIdentity -> DEBU bf8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bf9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bfa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bfb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [policies] Evaluate -> DEBU bfc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [policies] Evaluate -> DEBU bfd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [policies] Evaluate -> DEBU bfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [cauthdsl] func1 -> DEBU bff 0xc0035f46f0 gate 1569284707798910700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.798 UTC [cauthdsl] func2 -> DEBU c00 0xc0035f46f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c01 0xc0035f46f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c02 0xc0035f46f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c03 0xc0035f46f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [cauthdsl] func1 -> DEBU c04 0xc0035f46f0 gate 1569284707798910700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [cauthdsl] func1 -> DEBU c08 0xc0035f4f30 gate 1569284707799279000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c09 0xc0035f4f30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c0a 0xc0035f4f30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c0b 0xc0035f4f30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [msp.identity] Verify -> DEBU c0c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [msp.identity] Verify -> DEBU c0d Verify: sig = 00000000 30 44 02 20 77 ae 71 6a 87 f8 18 8a 80 ab c3 dd |0D. w.qj........| +peer0.org1.example.com | 00000010 87 c8 9a 9b 1e e3 ba 1d 40 5d 0a 28 b9 26 25 e5 |........@].(.&%.| +peer0.org1.example.com | 00000020 b2 62 d4 39 02 20 0f d7 1d b7 65 4f 3e 45 6e e5 |.b.9. ....eO>En.| +peer0.org1.example.com | 00000030 fc 8b 01 7b 76 8d 9b 4f 12 82 a5 15 01 27 89 54 |...{v..O.....'.T| +peer0.org1.example.com | 00000040 b5 b4 24 35 df 34 |..$5.4|" +orderer0.example.com | "2019-09-24 00:26:16.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12da Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:16.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12db Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +orderer0.example.com | "2019-09-24 00:26:16.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12dc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.3µs " +orderer0.example.com | "2019-09-24 00:26:16.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12dd Sending msg of 28 bytes to 2 on channel businesschannel took 28.8µs" +orderer0.example.com | "2019-09-24 00:26:16.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12de Sending msg of 28 bytes to 3 on channel businesschannel took 6.2µs" +orderer0.example.com | "2019-09-24 00:26:16.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " +orderer0.example.com | "2019-09-24 00:26:16.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.9µs " +orderer0.example.com | "2019-09-24 00:26:16.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e1 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:16.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:16.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:16.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e4 Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +orderer0.example.com | "2019-09-24 00:26:16.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.9µs " +orderer0.example.com | "2019-09-24 00:26:16.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e6 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1µs" +orderer0.example.com | "2019-09-24 00:26:16.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e7 Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +orderer0.example.com | "2019-09-24 00:26:16.882 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.4µs " +orderer0.example.com | "2019-09-24 00:26:16.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.8µs " +orderer0.example.com | "2019-09-24 00:26:16.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ea Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:16.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12eb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:17.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ec Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:17.081 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ed Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2019-09-24 00:26:17.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ee Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62µs " +orderer0.example.com | "2019-09-24 00:26:17.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ef Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +orderer0.example.com | "2019-09-24 00:26:17.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f0 Sending msg of 28 bytes to 3 on channel businesschannel took 21µs" +orderer0.example.com | "2019-09-24 00:26:17.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.1µs " +orderer0.example.com | "2019-09-24 00:26:17.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.9µs " +orderer0.example.com | "2019-09-24 00:26:17.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:17.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:17.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:17.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f6 Sending msg of 28 bytes to 3 on channel testchainid took 38.4µs" +orderer0.example.com | "2019-09-24 00:26:17.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72µs " +orderer0.example.com | "2019-09-24 00:26:17.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f8 Sending msg of 28 bytes to 2 on channel businesschannel took 41.4µs" +orderer0.example.com | "2019-09-24 00:26:17.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f9 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +orderer0.example.com | "2019-09-24 00:26:17.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +orderer0.example.com | "2019-09-24 00:26:17.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.9µs " +orderer0.example.com | "2019-09-24 00:26:17.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:17.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fd Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:18.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fe Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:18.073 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ff Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c0e 0xc0035f4f30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [cauthdsl] func1 -> DEBU c0f 0xc0035f4f30 gate 1569284707799279000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c12 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.800 UTC [gossip.comm] authenticateRemotePeer -> DEBU c14 Authenticated 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:25:07.800 UTC [gossip.comm] createConnection -> DEBU c15 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.800 UTC [gossip.comm] sendToEndpoint -> DEBU c16 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.800 UTC [gossip.comm] sendToEndpoint -> DEBU c17 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.800 UTC [gossip.comm] sendToEndpoint -> DEBU c18 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.800 UTC [gossip.comm] sendToEndpoint -> DEBU c19 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.800 UTC [gossip.comm] sendToEndpoint -> DEBU c1a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.800 UTC [pvtdatastorage] Commit -> DEBU c1b Committed private data for block [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.800 UTC [kvledger] CommitWithPvtData -> DEBU c1c [businesschannel] Committing block [2] transactions to state database" +peer0.org1.example.com | "2019-09-24 00:25:07.800 UTC [lockbasedtxmgr] Commit -> DEBU c1d lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 00:25:07.801 UTC [lockbasedtxmgr] Commit -> DEBU c1e Committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:25:07.801 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU c1f Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 00:25:07.801 UTC [lockbasedtxmgr] Commit -> DEBU c20 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:25:07.801 UTC [stateleveldb] ApplyUpdates -> DEBU c21 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-09-24 00:25:07.807 UTC [comm.grpc.server] 1 -> INFO c22 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.806Z grpc.peer_address=172.18.0.6:43284 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=181.1µs +peer0.org1.example.com | "2019-09-24 00:25:07.808 UTC [lockbasedtxmgr] Commit -> DEBU c23 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 00:25:07.809 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU c24 Preparing potential purge list working-set for expiringAtBlk [3]" +peer0.org1.example.com | "2019-09-24 00:25:07.809 UTC [leveldbhelper] GetIterator -> DEBU c25 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" +peer0.org1.example.com | "2019-09-24 00:25:07.809 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU c26 No expiry entry found for expiringAtBlk [3]" +peer0.org1.example.com | "2019-09-24 00:25:07.809 UTC [lockbasedtxmgr] func1 -> DEBU c27 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 00:25:07.810 UTC [kvledger] CommitWithPvtData -> DEBU c28 [businesschannel] Committing block [2] transactions to history database" +peer0.org1.example.com | "2019-09-24 00:25:07.810 UTC [historyleveldb] Commit -> DEBU c29 Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" +peer0.org1.example.com | "2019-09-24 00:25:07.810 UTC [historyleveldb] Commit -> DEBU c2a Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-09-24 00:25:07.815 UTC [historyleveldb] Commit -> DEBU c2b Channel [businesschannel]: Updates committed to history database for blockNo [2]" +peer0.org1.example.com | "2019-09-24 00:25:07.815 UTC [kvledger] CommitWithPvtData -> INFO c2c [businesschannel] Committed block [2] with 1 transaction(s) in 150ms (state_validation=45ms block_and_pvtdata_commit=91ms state_commit=9ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer0.org1.example.com | "2019-09-24 00:25:07.815 UTC [msp] GetDefaultSigningIdentity -> DEBU c2d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.815 UTC [msp.identity] Sign -> DEBU c2e Sign: plaintext: 18057A5E1214089096D4ACDE83CEE315...624D0F542C442AB5FE8C65C22A020803 " +peer0.org1.example.com | "2019-09-24 00:25:07.815 UTC [msp.identity] Sign -> DEBU c2f Sign: digest: F1EC6BD0D04256418F2D98EB4BDD20C3F493BA47202BD645A992264D12232CFD " +peer0.org1.example.com | "2019-09-24 00:25:07.815 UTC [gossip.state] commitBlock -> DEBU c30 [businesschannel] Committed block [2] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 00:25:07.815 UTC [msp] GetDefaultSigningIdentity -> DEBU c31 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:07.815 UTC [msp.identity] Sign -> DEBU c32 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:25:07.816 UTC [msp.identity] Sign -> DEBU c33 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:25:07.816 UTC [gossip.comm] authenticateRemotePeer -> DEBU c34 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43284" +orderer0.example.com | "2019-09-24 00:26:18.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1300 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " +orderer0.example.com | "2019-09-24 00:26:18.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1301 Sending msg of 28 bytes to 2 on channel businesschannel took 38.1µs" +orderer0.example.com | "2019-09-24 00:26:18.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1302 Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs" +orderer0.example.com | "2019-09-24 00:26:18.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1303 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.3µs " +orderer0.example.com | "2019-09-24 00:26:18.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1304 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.7µs " +orderer0.example.com | "2019-09-24 00:26:18.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1305 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:18.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1306 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:18.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1307 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:18.569 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1308 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2019-09-24 00:26:18.569 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1309 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.7µs " +orderer0.example.com | "2019-09-24 00:26:18.882 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.9µs " +orderer0.example.com | "2019-09-24 00:26:18.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130b Sending msg of 28 bytes to 2 on channel businesschannel took 13.3µs" +orderer0.example.com | "2019-09-24 00:26:18.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130c Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +orderer0.example.com | "2019-09-24 00:26:18.882 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 45.1µs " +orderer0.example.com | "2019-09-24 00:26:18.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:18.884 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:19.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1310 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:19.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1311 Sending msg of 28 bytes to 3 on channel testchainid took 36.6µs" +orderer0.example.com | "2019-09-24 00:26:19.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1312 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.7µs " +orderer0.example.com | "2019-09-24 00:26:19.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1313 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +orderer0.example.com | "2019-09-24 00:26:19.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1314 Sending msg of 28 bytes to 3 on channel businesschannel took 7µs" +orderer0.example.com | "2019-09-24 00:26:19.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1315 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +orderer0.example.com | "2019-09-24 00:26:19.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1316 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 43.7µs " +orderer0.example.com | "2019-09-24 00:26:19.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1317 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:19.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1318 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:19.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1319 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:19.569 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131a Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2019-09-24 00:26:19.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 277.2µs " +orderer0.example.com | "2019-09-24 00:26:19.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131c Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +orderer0.example.com | "2019-09-24 00:26:19.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131d Sending msg of 28 bytes to 3 on channel businesschannel took 35.4µs" +orderer0.example.com | "2019-09-24 00:26:19.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.1µs " +orderer0.example.com | "2019-09-24 00:26:19.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.1µs " +orderer0.example.com | "2019-09-24 00:26:19.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1320 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:19.884 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1321 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:20.071 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1322 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:20.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1323 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +orderer0.example.com | "2019-09-24 00:26:20.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1324 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " +orderer0.example.com | "2019-09-24 00:26:20.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1325 Sending msg of 28 bytes to 2 on channel businesschannel took 49.9µs" +orderer0.example.com | "2019-09-24 00:26:20.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1326 Sending msg of 28 bytes to 3 on channel businesschannel took 51.4µs" +orderer0.example.com | "2019-09-24 00:26:20.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1327 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 204.6µs " +orderer0.example.com | "2019-09-24 00:26:20.386 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1328 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.2µs " +orderer0.example.com | "2019-09-24 00:26:20.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1329 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:20.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:20.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:20.574 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132c Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +orderer0.example.com | "2019-09-24 00:26:20.574 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.5µs " +orderer0.example.com | "2019-09-24 00:26:20.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132e Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +orderer0.example.com | "2019-09-24 00:26:20.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132f Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +orderer0.example.com | "2019-09-24 00:26:20.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1330 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.8µs " +orderer0.example.com | "2019-09-24 00:26:20.886 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1331 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.6µs " +orderer0.example.com | "2019-09-24 00:26:20.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1332 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:20.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1333 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:21.070 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1334 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:21.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1335 Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +orderer0.example.com | "2019-09-24 00:26:21.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1336 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.3µs " +orderer0.example.com | "2019-09-24 00:26:21.388 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1337 Sending msg of 28 bytes to 2 on channel businesschannel took 13.3µs" +orderer0.example.com | "2019-09-24 00:26:21.388 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1338 Sending msg of 28 bytes to 3 on channel businesschannel took 10.4µs" +orderer0.example.com | "2019-09-24 00:26:21.388 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1339 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.3µs " +orderer0.example.com | "2019-09-24 00:26:21.388 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.5µs " +orderer0.example.com | "2019-09-24 00:26:21.389 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:21.389 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:21.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:21.583 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133e Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +orderer0.example.com | "2019-09-24 00:26:21.583 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68µs " +orderer0.example.com | "2019-09-24 00:26:21.896 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1340 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-09-24 00:26:21.896 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1341 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +orderer0.example.com | "2019-09-24 00:26:21.896 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1342 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.6µs " +orderer0.example.com | "2019-09-24 00:26:21.896 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1343 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.4µs " +orderer0.example.com | "2019-09-24 00:26:21.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1344 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:21.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1345 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:22.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1346 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:22.083 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1347 Sending msg of 28 bytes to 3 on channel testchainid took 46.4µs" +orderer0.example.com | "2019-09-24 00:26:22.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1348 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.7µs " +orderer0.example.com | "2019-09-24 00:26:22.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1349 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-09-24 00:26:22.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134a Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +orderer0.example.com | "2019-09-24 00:26:22.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90µs " +peer0.org1.example.com | "2019-09-24 00:25:07.816 UTC [gossip.comm] authenticateRemotePeer -> DEBU c35 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:43284" +peer0.org1.example.com | "2019-09-24 00:25:07.816 UTC [msp] DeserializeIdentity -> DEBU c36 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.785 UTC [policies] Evaluate -> DEBU c37 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.826 UTC [policies] Evaluate -> DEBU c38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [msp] DeserializeIdentity -> DEBU c3a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [msp] DeserializeIdentity -> DEBU c3c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c3d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c3e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c3f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [policies] Evaluate -> DEBU c40 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [policies] Evaluate -> DEBU c41 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.826 UTC [policies] Evaluate -> DEBU c42 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [policies] Evaluate -> DEBU c43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [policies] Evaluate -> DEBU c44 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [cauthdsl] func1 -> DEBU c45 0xc003725da0 gate 1569284707827899900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.827 UTC [cauthdsl] func2 -> DEBU c46 0xc003725da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.828 UTC [gossip.discovery] handleAliveMessage -> DEBU c47 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.828 UTC [cauthdsl] func2 -> DEBU c48 0xc003725da0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.828 UTC [cauthdsl] func2 -> DEBU c49 0xc003725da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.828 UTC [gossip.discovery] handleAliveMessage -> DEBU c4a endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1569284680017232100, 22 but got ts: inc_num:1569284680017232100 seq_num:17 " +peer0.org1.example.com | "2019-09-24 00:25:07.828 UTC [gossip.discovery] handleAliveMessage -> DEBU c4c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.828 UTC [cauthdsl] func2 -> DEBU c4b 0xc003725da0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.828 UTC [cauthdsl] func1 -> DEBU c4d 0xc003725da0 gate 1569284707827899900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.828 UTC [gossip.discovery] handleMsgFromComm -> DEBU c4e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.828 UTC [policies] Evaluate -> DEBU c4f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.828 UTC [policies] Evaluate -> DEBU c50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.828 UTC [policies] Evaluate -> DEBU c51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [cauthdsl] func1 -> DEBU c52 0xc0037905e0 gate 1569284707829022800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [cauthdsl] func2 -> DEBU c53 0xc0037905e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [cauthdsl] func2 -> DEBU c54 0xc0037905e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [cauthdsl] func2 -> DEBU c55 0xc0037905e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [msp.identity] Verify -> DEBU c56 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [msp.identity] Verify -> DEBU c57 Verify: sig = 00000000 30 44 02 20 02 ed d1 c0 df 6d 42 c8 6f bf fd c9 |0D. .....mB.o...| +peer0.org1.example.com | 00000010 9a 9e 94 51 d8 d1 19 c4 51 90 3e c2 ad ff 82 4d |...Q....Q.>....M| +peer0.org1.example.com | 00000020 ff 4a 01 21 02 20 58 a4 9c b0 3d 7c 0f b2 de 3d |.J.!. X...=|...=| +peer0.org1.example.com | 00000030 7f 1b 57 22 36 11 a2 77 27 91 38 d0 68 b5 52 7e |..W"6..w'.8.h.R~| +peer0.org1.example.com | 00000040 aa 52 4a 7e 69 bd |.RJ~i.|" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [cauthdsl] func2 -> DEBU c58 0xc0037905e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [cauthdsl] func1 -> DEBU c59 0xc0037905e0 gate 1569284707829022800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [policies] Evaluate -> DEBU c5a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [policies] Evaluate -> DEBU c5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [policies] Evaluate -> DEBU c5c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [policies] Evaluate -> DEBU c5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [gossip.comm] authenticateRemotePeer -> DEBU c5e Authenticated 172.18.0.6:43284" +peer0.org1.example.com | "2019-09-24 00:25:07.829 UTC [gossip.comm] GossipStream -> DEBU c5f Servicing 172.18.0.6:43284" +peer0.org1.example.com | "2019-09-24 00:25:07.830 UTC [gossip.comm] serviceConnection -> DEBU c60 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:25:07.830 UTC [gossip.comm] writeToStream -> DEBU c61 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:25:07.832 UTC [grpc] infof -> DEBU c62 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:07.832 UTC [gossip.comm] readFromStream -> DEBU c63 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-09-24 00:25:07.832 UTC [gossip.gossip] handleMessage -> DEBU c64 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.832 UTC [gossip.gossip] handleMessage -> DEBU c65 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.832 UTC [gossip.gossip] handleMessage -> DEBU c66 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 00:26:22.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.8µs " +orderer0.example.com | "2019-09-24 00:26:22.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:22.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:22.597 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:22.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1350 Sending msg of 28 bytes to 3 on channel testchainid took 35.3µs" +orderer0.example.com | "2019-09-24 00:26:22.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1351 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121µs " +orderer0.example.com | "2019-09-24 00:26:22.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1352 Sending msg of 28 bytes to 2 on channel businesschannel took 47.3µs" +orderer0.example.com | "2019-09-24 00:26:22.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1353 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2019-09-24 00:26:22.891 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1354 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.5µs " +orderer0.example.com | "2019-09-24 00:26:22.891 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1355 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.6µs " +orderer0.example.com | "2019-09-24 00:26:22.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1356 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:22.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1357 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:23.069 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1358 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:23.069 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1359 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +orderer0.example.com | "2019-09-24 00:26:23.070 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.4µs " +orderer0.example.com | "2019-09-24 00:26:23.396 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 135b Sending msg of 28 bytes to 2 on channel businesschannel took 41.8µs" +orderer0.example.com | "2019-09-24 00:26:23.396 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 135c Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-09-24 00:26:23.396 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +orderer0.example.com | "2019-09-24 00:26:23.396 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.1µs " +orderer0.example.com | "2019-09-24 00:26:23.397 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:23.397 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1360 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:23.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1361 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:23.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1362 Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +orderer0.example.com | "2019-09-24 00:26:23.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1363 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +orderer0.example.com | "2019-09-24 00:26:23.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1364 Sending msg of 28 bytes to 2 on channel businesschannel took 53.2µs" +orderer0.example.com | "2019-09-24 00:26:23.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1365 Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +orderer0.example.com | "2019-09-24 00:26:23.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1366 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.7µs " +orderer0.example.com | "2019-09-24 00:26:23.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1367 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.4µs " +orderer0.example.com | "2019-09-24 00:26:23.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1368 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:23.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1369 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:24.087 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:24.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136b Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2019-09-24 00:26:24.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.2µs " +orderer0.example.com | "2019-09-24 00:26:24.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136d Sending msg of 28 bytes to 2 on channel businesschannel took 59µs" +orderer0.example.com | "2019-09-24 00:26:24.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136e Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2019-09-24 00:26:24.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " +orderer0.example.com | "2019-09-24 00:26:24.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1370 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.8µs " +orderer0.example.com | "2019-09-24 00:26:24.564 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1371 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:24.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1372 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:24.584 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1373 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:24.584 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1374 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +orderer0.example.com | "2019-09-24 00:26:24.585 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1375 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +orderer0.example.com | "2019-09-24 00:26:24.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1376 Sending msg of 28 bytes to 2 on channel businesschannel took 118.8µs" +orderer0.example.com | "2019-09-24 00:26:24.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1377 Sending msg of 28 bytes to 3 on channel businesschannel took 18.3µs" +orderer0.example.com | "2019-09-24 00:26:24.896 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1378 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.9µs " +orderer0.example.com | "2019-09-24 00:26:24.908 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1379 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 5.3739ms " +orderer0.example.com | "2019-09-24 00:26:24.934 UTC [orderer.common.cluster.step] handleMessage -> DEBU 137a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:24.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 137b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:25.117 UTC [orderer.common.cluster.step] handleMessage -> DEBU 137c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:25.119 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 137d Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +orderer0.example.com | "2019-09-24 00:26:25.119 UTC [orderer.common.cluster.step] sendMessage -> DEBU 137e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.7µs " +orderer0.example.com | "2019-09-24 00:26:25.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 137f Sending msg of 28 bytes to 2 on channel businesschannel took 46.5µs" +orderer0.example.com | "2019-09-24 00:26:25.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1380 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 191.3µs " +orderer0.example.com | "2019-09-24 00:26:25.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1381 Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +orderer0.example.com | "2019-09-24 00:26:25.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1382 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 310.2µs " +orderer0.example.com | "2019-09-24 00:26:25.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1383 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:25.441 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1384 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:25.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1385 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:25.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1386 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +orderer0.example.com | "2019-09-24 00:26:25.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1387 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.9µs " +orderer0.example.com | "2019-09-24 00:26:25.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1388 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +orderer0.example.com | "2019-09-24 00:26:25.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1389 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +orderer0.example.com | "2019-09-24 00:26:25.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 138a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.8µs " +orderer0.example.com | "2019-09-24 00:26:25.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 138b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.4µs " +orderer0.example.com | "2019-09-24 00:26:25.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU 138c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:25.905 UTC [orderer.common.cluster.step] handleMessage -> DEBU 138d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:26.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 138e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:26.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 138f Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" +orderer0.example.com | "2019-09-24 00:26:26.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1390 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.4µs " +orderer0.example.com | "2019-09-24 00:26:26.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1391 Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" +orderer0.example.com | "2019-09-24 00:26:26.394 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1392 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +orderer0.example.com | "2019-09-24 00:26:26.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1393 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.1µs " +orderer0.example.com | "2019-09-24 00:26:26.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1394 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +orderer0.example.com | "2019-09-24 00:26:26.398 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1395 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:26.399 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1396 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:26.595 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1397 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:26.596 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1398 Sending msg of 28 bytes to 3 on channel testchainid took 27.4µs" +orderer0.example.com | "2019-09-24 00:26:26.596 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1399 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +orderer0.example.com | "2019-09-24 00:26:26.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 139a Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +orderer0.example.com | "2019-09-24 00:26:26.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 139b Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +orderer0.example.com | "2019-09-24 00:26:26.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 139c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.6µs " +orderer0.example.com | "2019-09-24 00:26:26.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 139d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.4µs " +orderer0.example.com | "2019-09-24 00:26:26.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 139e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:26.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 139f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:27.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:27.100 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a1 Sending msg of 28 bytes to 3 on channel testchainid took 33.1µs" +orderer0.example.com | "2019-09-24 00:26:27.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.5µs " +orderer0.example.com | "2019-09-24 00:26:27.565 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a3 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +orderer0.example.com | "2019-09-24 00:26:27.565 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a4 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-09-24 00:26:27.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.2µs " +orderer0.example.com | "2019-09-24 00:26:27.566 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.4µs " +orderer0.example.com | "2019-09-24 00:26:27.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:27.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:27.612 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a9 Sending msg of 28 bytes to 3 on channel testchainid took 28.3µs" +orderer0.example.com | "2019-09-24 00:26:27.612 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13aa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.4µs " +orderer0.example.com | "2019-09-24 00:26:27.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ab Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:27.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ac Sending msg of 28 bytes to 3 on channel businesschannel took 67.6µs" +orderer0.example.com | "2019-09-24 00:26:27.886 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " +orderer0.example.com | "2019-09-24 00:26:27.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ae Sending msg of 28 bytes to 2 on channel businesschannel took 59µs" +orderer0.example.com | "2019-09-24 00:26:27.887 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13af Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 247.6µs " +orderer0.example.com | "2019-09-24 00:26:27.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:27.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:28.068 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:28.069 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b3 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +orderer0.example.com | "2019-09-24 00:26:28.069 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.3µs " +orderer0.example.com | "2019-09-24 00:26:28.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b5 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +orderer0.example.com | "2019-09-24 00:26:28.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b6 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +orderer0.example.com | "2019-09-24 00:26:28.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120µs " +orderer0.example.com | "2019-09-24 00:26:28.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.5µs " +orderer0.example.com | "2019-09-24 00:26:28.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:28.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ba Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:28.607 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13bb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:28.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bc Sending msg of 28 bytes to 3 on channel testchainid took 20.1µs" +orderer0.example.com | "2019-09-24 00:26:28.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13bd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.2µs " +peer0.org1.example.com | "2019-09-24 00:25:07.832 UTC [gossip.discovery] handleMsgFromComm -> DEBU c67 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.832 UTC [gossip.discovery] handleMsgFromComm -> DEBU c68 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.832 UTC [gossip.discovery] handleMsgFromComm -> DEBU c69 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.832 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c6a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.833 UTC [msp.identity] Verify -> DEBU c6b Verify: digest = 00000000 c3 35 c6 b5 b5 f9 b7 06 72 0b 30 aa b4 1c 78 de |.5......r.0...x.| +peer0.org1.example.com | 00000010 0f ec ba 81 31 b9 ae d6 63 65 d9 ee ce 16 da 8c |....1...ce......|" +peer0.org1.example.com | "2019-09-24 00:25:07.833 UTC [msp.identity] Verify -> DEBU c6c Verify: sig = 00000000 30 45 02 21 00 cd 80 4d e9 ce 58 d1 a1 96 98 74 |0E.!...M..X....t| +peer0.org1.example.com | 00000010 44 46 72 c1 2c 2a 00 20 cd c4 48 8e 44 f9 a0 44 |DFr.,*. ..H.D..D| +peer0.org1.example.com | 00000020 66 0d a8 a4 58 02 20 43 ff 46 9b 0a e6 4a fc bb |f...X. C.F...J..| +peer0.org1.example.com | 00000030 db b3 2e 4d 8d 1f 38 e6 07 31 29 8b 94 fa 2e 59 |...M..8..1)....Y| +peer0.org1.example.com | 00000040 1f e7 0e 32 98 46 ad |...2.F.|" +peer0.org1.example.com | "2019-09-24 00:25:07.833 UTC [gossip.discovery] handleAliveMessage -> DEBU c6d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.833 UTC [gossip.discovery] isSentByMe -> DEBU c6e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.833 UTC [gossip.discovery] handleAliveMessage -> DEBU c6f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.833 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c70 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.833 UTC [msp] DeserializeIdentity -> DEBU c71 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.833 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c73 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c74 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.833 UTC [policies] Evaluate -> DEBU c75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [policies] Evaluate -> DEBU c76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [policies] Evaluate -> DEBU c77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [cauthdsl] func1 -> DEBU c78 0xc0031cb550 gate 1569284707834094900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [cauthdsl] func2 -> DEBU c79 0xc0031cb550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [cauthdsl] func2 -> DEBU c7a 0xc0031cb550 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [cauthdsl] func2 -> DEBU c7b 0xc0031cb550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [cauthdsl] func2 -> DEBU c7c 0xc0031cb550 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [cauthdsl] func1 -> DEBU c7d 0xc0031cb550 gate 1569284707834094900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [policies] Evaluate -> DEBU c7e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [policies] Evaluate -> DEBU c7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [policies] Evaluate -> DEBU c80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [cauthdsl] func1 -> DEBU c81 0xc0031cbd90 gate 1569284707834881000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.834 UTC [cauthdsl] func2 -> DEBU c82 0xc0031cbd90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [cauthdsl] func2 -> DEBU c83 0xc0031cbd90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [cauthdsl] func2 -> DEBU c84 0xc0031cbd90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [msp.identity] Verify -> DEBU c85 Verify: digest = 00000000 fb cf 2d b5 f0 5f 32 79 86 85 7f 19 da 71 f3 7e |..-.._2y.....q.~| +peer0.org1.example.com | 00000010 17 4e 9f 80 1c a9 51 6b 04 ee f0 bb 24 18 bb 4d |.N....Qk....$..M|" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [msp.identity] Verify -> DEBU c86 Verify: sig = 00000000 30 44 02 20 63 1c 61 02 af 88 41 44 e5 7e 46 0a |0D. c.a...AD.~F.| +peer0.org1.example.com | 00000010 03 d8 8f 72 20 93 ea b3 1d ac 7e ed 3a ba be d5 |...r .....~.:...| +peer0.org1.example.com | 00000020 52 66 e6 df 02 20 73 6e 1e 37 e8 42 d0 65 78 ed |Rf... sn.7.B.ex.| +peer0.org1.example.com | 00000030 57 81 31 66 63 de 0a bb 02 66 b6 4c 67 2f 2a c6 |W.1fc....f.Lg/*.| +peer0.org1.example.com | 00000040 5d 0b 38 71 75 d3 |].8qu.|" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [cauthdsl] func2 -> DEBU c87 0xc0031cbd90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [cauthdsl] func1 -> DEBU c88 0xc0031cbd90 gate 1569284707834881000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [policies] Evaluate -> DEBU c89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [policies] Evaluate -> DEBU c8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [policies] Evaluate -> DEBU c8b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [policies] Evaluate -> DEBU c8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [gossip.discovery] handleAliveMessage -> DEBU c8d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.835 UTC [gossip.discovery] learnExistingMembers -> DEBU c8e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:07.836 UTC [gossip.discovery] learnExistingMembers -> DEBU c8f updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:07.836 UTC [gossip.discovery] learnExistingMembers -> DEBU c90 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:07.836 UTC [gossip.discovery] learnExistingMembers -> DEBU c91 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:07.836 UTC [gossip.discovery] learnExistingMembers -> DEBU c92 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.836 UTC [gossip.discovery] handleAliveMessage -> DEBU c93 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.842 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c94 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.844 UTC [gossip.gossip] handleMessage -> DEBU c95 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.844 UTC [gossip.gossip] handleMessage -> DEBU c96 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 5232390643687232235, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.845 UTC [msp] DeserializeIdentity -> DEBU c97 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:07.845 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c98 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c99 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c9a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.845 UTC [policies] Evaluate -> DEBU c9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.845 UTC [policies] Evaluate -> DEBU c9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.845 UTC [policies] Evaluate -> DEBU c9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.845 UTC [cauthdsl] func1 -> DEBU c9e 0xc0028fa1b0 gate 1569284707845926200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.845 UTC [cauthdsl] func2 -> DEBU c9f 0xc0028fa1b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU ca0 0xc0028fa1b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU ca1 0xc0028fa1b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU ca2 0xc0028fa1b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [cauthdsl] func1 -> DEBU ca3 0xc0028fa1b0 gate 1569284707845926200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [policies] Evaluate -> DEBU ca4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [policies] Evaluate -> DEBU ca5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [policies] Evaluate -> DEBU ca6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [cauthdsl] func1 -> DEBU ca7 0xc0028fa9f0 gate 1569284707846556300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU ca8 0xc0028fa9f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU ca9 0xc0028fa9f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU caa 0xc0028fa9f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [msp.identity] Verify -> DEBU cab Verify: digest = 00000000 cf d5 60 b7 3f 76 d5 4e 0c da 16 b9 5b 63 6d e3 |..`.?v.N....[cm.| +peer0.org1.example.com | 00000010 1d 36 2e 9c 6d 29 92 8d b9 99 fd dc c7 2d ae 8f |.6..m).......-..|" +peer0.org1.example.com | "2019-09-24 00:25:07.846 UTC [msp.identity] Verify -> DEBU cac Verify: sig = 00000000 30 45 02 21 00 fb 83 e6 4d f4 66 f1 2e 66 f7 97 |0E.!....M.f..f..| +peer0.org1.example.com | 00000010 dc c8 0e 02 84 77 99 95 dd 30 fe 40 b1 6c cb 63 |.....w...0.@.l.c| +peer0.org1.example.com | 00000020 b8 f2 00 c5 9d 02 20 4b 49 c8 01 0d a2 35 28 ef |...... KI....5(.| +peer0.org1.example.com | 00000030 f9 e9 6a 4a 1e 3a df 48 12 4d 36 a3 a8 59 b5 1e |..jJ.:.H.M6..Y..| +peer0.org1.example.com | 00000040 c6 fb 9a f7 3c 9b 8f |....<..|" +peer0.org1.example.com | "2019-09-24 00:25:07.847 UTC [cauthdsl] func2 -> DEBU cad 0xc0028fa9f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.847 UTC [cauthdsl] func1 -> DEBU cae 0xc0028fa9f0 gate 1569284707846556300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.847 UTC [policies] Evaluate -> DEBU caf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.847 UTC [policies] Evaluate -> DEBU cb0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.847 UTC [policies] Evaluate -> DEBU cb1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.847 UTC [policies] Evaluate -> DEBU cb2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.847 UTC [gossip.discovery] handleAliveMessage -> DEBU cb3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.847 UTC [gossip.discovery] handleAliveMessage -> DEBU cb4 endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1569284680017232100, 22 but got ts: inc_num:1569284680017232100 seq_num:17 " +peer0.org1.example.com | "2019-09-24 00:25:07.847 UTC [gossip.discovery] handleAliveMessage -> DEBU cb5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU cb6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU cb7 Got message: GossipMessage: Channel: , nonce: 5232390643687232235, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.848 UTC [gossip.gossip] ValidateAliveMsg -> DEBU cb8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.848 UTC [msp.identity] Verify -> DEBU cb9 Verify: digest = 00000000 65 fb cb 94 ad 0b 30 16 0c 1e a4 3f d4 fe ee bf |e.....0....?....| +peer0.org1.example.com | 00000010 e9 34 8c 7f ea 03 47 47 45 95 eb e7 73 0e 26 70 |.4....GGE...s.&p|" +peer0.org1.example.com | "2019-09-24 00:25:07.848 UTC [msp.identity] Verify -> DEBU cba Verify: sig = 00000000 30 44 02 20 76 0b d9 d7 52 80 00 b7 09 6e ab fa |0D. v...R....n..| +peer0.org1.example.com | 00000010 90 c4 3b 59 5b b2 72 92 5b 69 7c 07 42 7e 10 eb |..;Y[.r.[i|.B~..| +peer0.org1.example.com | 00000020 00 85 85 d0 02 20 52 aa 53 0a dc 5f 4e e2 b5 90 |..... R.S.._N...| +peer0.org1.example.com | 00000030 35 45 cc c8 6f 08 16 d5 ab 20 f2 b3 18 b7 da 7c |5E..o.... .....|| +peer0.org1.example.com | 00000040 60 89 a6 77 08 8c |`..w..|" +peer0.org1.example.com | "2019-09-24 00:25:07.848 UTC [gossip.discovery] handleAliveMessage -> DEBU cbb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.848 UTC [gossip.discovery] isSentByMe -> DEBU cbc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.848 UTC [gossip.discovery] handleAliveMessage -> DEBU cbd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.849 UTC [gossip.gossip] ValidateAliveMsg -> DEBU cbe Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.849 UTC [msp] DeserializeIdentity -> DEBU cbf Obtaining identity" +orderer0.example.com | "2019-09-24 00:26:28.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13be Sending msg of 28 bytes to 2 on channel businesschannel took 41.7µs" +orderer0.example.com | "2019-09-24 00:26:28.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bf Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2019-09-24 00:26:28.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91µs " +orderer0.example.com | "2019-09-24 00:26:28.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.1µs " +orderer0.example.com | "2019-09-24 00:26:28.897 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:28.897 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:29.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:29.094 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c5 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +orderer0.example.com | "2019-09-24 00:26:29.094 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " +orderer0.example.com | "2019-09-24 00:26:29.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c7 Sending msg of 28 bytes to 2 on channel businesschannel took 28.2µs" +orderer0.example.com | "2019-09-24 00:26:29.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c9 Sending msg of 28 bytes to 3 on channel businesschannel took 33.6µs" +orderer0.example.com | "2019-09-24 00:26:29.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ca Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:29.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 233µs " +orderer0.example.com | "2019-09-24 00:26:29.386 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.4µs " +orderer0.example.com | "2019-09-24 00:26:29.389 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13cc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:29.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13cd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:29.569 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ce Sending msg of 28 bytes to 3 on channel testchainid took 28.8µs" +orderer0.example.com | "2019-09-24 00:26:29.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.2µs " +orderer0.example.com | "2019-09-24 00:26:29.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d0 Sending msg of 28 bytes to 3 on channel businesschannel took 46.8µs" +orderer0.example.com | "2019-09-24 00:26:29.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d1 Sending msg of 28 bytes to 2 on channel businesschannel took 27.6µs" +orderer0.example.com | "2019-09-24 00:26:29.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.2µs " +orderer0.example.com | "2019-09-24 00:26:29.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.6µs " +orderer0.example.com | "2019-09-24 00:26:29.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:29.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:30.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:30.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d7 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +orderer0.example.com | "2019-09-24 00:26:30.075 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.4µs " +orderer0.example.com | "2019-09-24 00:26:30.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d9 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +orderer0.example.com | "2019-09-24 00:26:30.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13da Sending msg of 28 bytes to 3 on channel businesschannel took 18.3µs" +orderer0.example.com | "2019-09-24 00:26:30.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13db Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.6µs " +orderer0.example.com | "2019-09-24 00:26:30.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13dc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 322.9µs " +orderer0.example.com | "2019-09-24 00:26:30.394 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13dd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:30.395 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13de Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:30.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13df Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:30.570 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e0 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2019-09-24 00:26:30.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.6µs " +orderer0.example.com | "2019-09-24 00:26:30.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e2 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +orderer0.example.com | "2019-09-24 00:26:30.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e3 Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" +orderer0.example.com | "2019-09-24 00:26:30.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.9µs " +orderer0.example.com | "2019-09-24 00:26:30.882 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.6µs " +orderer0.example.com | "2019-09-24 00:26:30.884 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:30.884 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:31.069 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:31.069 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e9 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2019-09-24 00:26:31.069 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.8µs " +orderer0.example.com | "2019-09-24 00:26:31.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13eb Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" +orderer0.example.com | "2019-09-24 00:26:31.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ec Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +orderer0.example.com | "2019-09-24 00:26:31.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.5µs " +orderer0.example.com | "2019-09-24 00:26:31.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.4µs " +orderer0.example.com | "2019-09-24 00:26:31.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ef Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:31.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:31.571 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:31.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f2 Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" +orderer0.example.com | "2019-09-24 00:26:31.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.3µs " +orderer0.example.com | "2019-09-24 00:26:31.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f4 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +orderer0.example.com | "2019-09-24 00:26:31.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f5 Sending msg of 28 bytes to 3 on channel businesschannel took 13.2µs" +orderer0.example.com | "2019-09-24 00:26:31.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.2µs " +orderer0.example.com | "2019-09-24 00:26:31.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 344.2µs " +orderer0.example.com | "2019-09-24 00:26:31.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:31.886 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:32.071 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fa Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:32.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fb Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +orderer0.example.com | "2019-09-24 00:26:32.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.5µs " +orderer0.example.com | "2019-09-24 00:26:32.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fd Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +orderer0.example.com | "2019-09-24 00:26:32.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fe Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +orderer0.example.com | "2019-09-24 00:26:32.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.6µs " +orderer0.example.com | "2019-09-24 00:26:32.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1400 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.7µs " +orderer0.example.com | "2019-09-24 00:26:32.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1401 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:32.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1402 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:32.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1403 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:32.570 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1404 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2019-09-24 00:26:32.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1405 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 43.1µs " +orderer0.example.com | "2019-09-24 00:26:32.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1406 Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +orderer0.example.com | "2019-09-24 00:26:32.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1407 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-09-24 00:26:32.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1408 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.6µs " +orderer0.example.com | "2019-09-24 00:26:32.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1409 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.1µs " +orderer0.example.com | "2019-09-24 00:26:32.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:32.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:33.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:33.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140d Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-09-24 00:26:33.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.8µs " +orderer0.example.com | "2019-09-24 00:26:33.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140f Sending msg of 28 bytes to 2 on channel businesschannel took 73.8µs" +orderer0.example.com | "2019-09-24 00:26:33.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1410 Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +orderer0.example.com | "2019-09-24 00:26:33.386 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1411 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.6µs " +orderer0.example.com | "2019-09-24 00:26:33.386 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1412 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.7µs " +orderer0.example.com | "2019-09-24 00:26:33.395 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1413 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:33.395 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1414 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:33.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1415 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:33.569 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1416 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2019-09-24 00:26:33.569 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1417 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.1µs " +orderer0.example.com | "2019-09-24 00:26:33.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1418 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +orderer0.example.com | "2019-09-24 00:26:33.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1419 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +orderer0.example.com | "2019-09-24 00:26:33.882 UTC [orderer.common.cluster.step] sendMessage -> DEBU 141a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " +orderer0.example.com | "2019-09-24 00:26:33.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 141b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.3µs " +orderer0.example.com | "2019-09-24 00:26:33.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:33.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:34.069 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:34.069 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141f Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2019-09-24 00:26:34.070 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1420 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 40.6µs " +orderer0.example.com | "2019-09-24 00:26:34.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1421 Sending msg of 28 bytes to 2 on channel businesschannel took 74.8µs" +orderer0.example.com | "2019-09-24 00:26:34.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1422 Sending msg of 28 bytes to 3 on channel businesschannel took 41µs" +orderer0.example.com | "2019-09-24 00:26:34.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1423 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 265.7µs " +orderer0.example.com | "2019-09-24 00:26:34.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1424 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.5µs " +orderer0.example.com | "2019-09-24 00:26:34.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1425 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:34.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1426 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:34.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1427 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:34.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1428 Sending msg of 28 bytes to 3 on channel testchainid took 26.7µs" +orderer0.example.com | "2019-09-24 00:26:34.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1429 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 41.4µs " +orderer0.example.com | "2019-09-24 00:26:34.886 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.6µs " +orderer0.example.com | "2019-09-24 00:26:34.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142b Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +orderer0.example.com | "2019-09-24 00:26:34.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142c Sending msg of 28 bytes to 3 on channel businesschannel took 17.4µs" +orderer0.example.com | "2019-09-24 00:26:34.886 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.4µs " +orderer0.example.com | "2019-09-24 00:26:34.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:34.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:35.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1430 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:35.077 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1431 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-09-24 00:26:35.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1432 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +orderer0.example.com | "2019-09-24 00:26:35.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1433 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-09-24 00:26:35.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1434 Sending msg of 28 bytes to 3 on channel businesschannel took 56µs" +orderer0.example.com | "2019-09-24 00:26:35.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1435 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97µs " +orderer0.example.com | "2019-09-24 00:26:35.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1436 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.4µs " +orderer0.example.com | "2019-09-24 00:26:35.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1437 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:35.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1438 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:35.570 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1439 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:35.570 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143a Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +orderer0.example.com | "2019-09-24 00:26:35.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.1µs " +orderer0.example.com | "2019-09-24 00:26:35.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143c Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +orderer0.example.com | "2019-09-24 00:26:35.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143d Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-09-24 00:26:35.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.4µs " +orderer0.example.com | "2019-09-24 00:26:35.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 489.4µs " +orderer0.example.com | "2019-09-24 00:26:35.884 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1440 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:35.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1441 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:36.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1442 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:36.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1443 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-09-24 00:26:36.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1444 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.8µs " +orderer0.example.com | "2019-09-24 00:26:36.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1445 Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" +orderer0.example.com | "2019-09-24 00:26:36.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1446 Sending msg of 28 bytes to 3 on channel businesschannel took 7.3µs" +orderer0.example.com | "2019-09-24 00:26:36.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1447 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.7µs " +orderer0.example.com | "2019-09-24 00:26:36.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1448 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " +orderer0.example.com | "2019-09-24 00:26:36.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1449 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:36.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:36.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:36.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144c Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +orderer0.example.com | "2019-09-24 00:26:36.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.8µs " +orderer0.example.com | "2019-09-24 00:26:36.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144e Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +orderer0.example.com | "2019-09-24 00:26:36.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144f Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-09-24 00:26:36.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1450 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +orderer0.example.com | "2019-09-24 00:26:36.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1451 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 38µs " +orderer0.example.com | "2019-09-24 00:26:36.886 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1452 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:36.886 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1453 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:37.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1454 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:37.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1455 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +orderer0.example.com | "2019-09-24 00:26:37.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1456 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.8µs " +orderer0.example.com | "2019-09-24 00:26:37.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1457 Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" +orderer0.example.com | "2019-09-24 00:26:37.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1458 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2019-09-24 00:26:37.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.9µs " +orderer0.example.com | "2019-09-24 00:26:37.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1459 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.4µs " +orderer0.example.com | "2019-09-24 00:26:37.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:37.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:37.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:37.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145e Sending msg of 28 bytes to 3 on channel testchainid took 48.6µs" +orderer0.example.com | "2019-09-24 00:26:37.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +orderer0.example.com | "2019-09-24 00:26:37.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1460 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +orderer0.example.com | "2019-09-24 00:26:37.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1461 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-09-24 00:26:37.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1462 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210µs " +orderer0.example.com | "2019-09-24 00:26:37.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1463 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 165.6µs " +orderer0.example.com | "2019-09-24 00:26:37.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1464 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:37.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1465 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:38.071 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1466 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:38.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1467 Sending msg of 28 bytes to 3 on channel testchainid took 9µs" +orderer0.example.com | "2019-09-24 00:26:38.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1468 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.7µs " +orderer0.example.com | "2019-09-24 00:26:38.389 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1469 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +orderer0.example.com | "2019-09-24 00:26:38.389 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 146a Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +orderer0.example.com | "2019-09-24 00:26:38.389 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.1µs " +orderer0.example.com | "2019-09-24 00:26:38.390 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 901.3µs " +orderer0.example.com | "2019-09-24 00:26:38.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:38.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:38.570 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:38.570 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1470 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2019-09-24 00:26:38.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1471 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.7µs " +orderer0.example.com | "2019-09-24 00:26:38.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1472 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +orderer0.example.com | "2019-09-24 00:26:38.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1473 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.1µs " +orderer0.example.com | "2019-09-24 00:26:38.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1474 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +orderer0.example.com | "2019-09-24 00:26:38.886 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1475 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.6µs " +orderer0.example.com | "2019-09-24 00:26:38.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1476 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:38.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1477 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:39.071 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1478 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:39.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1479 Sending msg of 28 bytes to 3 on channel testchainid took 43.4µs" +orderer0.example.com | "2019-09-24 00:26:39.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +orderer0.example.com | "2019-09-24 00:26:39.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147b Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +orderer0.example.com | "2019-09-24 00:26:39.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147c Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" +orderer0.example.com | "2019-09-24 00:26:39.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.5µs " +orderer0.example.com | "2019-09-24 00:26:39.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.1µs " +orderer0.example.com | "2019-09-24 00:26:39.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:39.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1480 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:39.570 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1481 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:39.570 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1482 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +orderer0.example.com | "2019-09-24 00:26:39.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1483 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.7µs " +orderer0.example.com | "2019-09-24 00:26:39.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1484 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-09-24 00:26:39.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1485 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2019-09-24 00:26:39.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1486 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.5µs " +orderer0.example.com | "2019-09-24 00:26:39.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1487 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104.1µs " +orderer0.example.com | "2019-09-24 00:26:39.886 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1488 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:39.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1489 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:40.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:40.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148b Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +orderer0.example.com | "2019-09-24 00:26:40.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +orderer0.example.com | "2019-09-24 00:26:40.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148d Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +orderer0.example.com | "2019-09-24 00:26:40.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148e Sending msg of 28 bytes to 2 on channel businesschannel took 12.1µs" +orderer0.example.com | "2019-09-24 00:26:40.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.3µs " +orderer0.example.com | "2019-09-24 00:26:40.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1490 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.9µs " +orderer0.example.com | "2019-09-24 00:26:40.353 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1491 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:40.353 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1492 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:40.555 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1493 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:40.555 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1494 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +orderer0.example.com | "2019-09-24 00:26:40.555 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1495 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.3µs " +orderer0.example.com | "2019-09-24 00:26:40.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1496 Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +orderer0.example.com | "2019-09-24 00:26:40.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1497 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +orderer0.example.com | "2019-09-24 00:26:40.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1498 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " +orderer0.example.com | "2019-09-24 00:26:40.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1499 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6578ms " +orderer0.example.com | "2019-09-24 00:26:40.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:40.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:41.039 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:41.039 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149d Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +orderer0.example.com | "2019-09-24 00:26:41.039 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.6µs " +orderer0.example.com | "2019-09-24 00:26:41.350 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149f Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +orderer0.example.com | "2019-09-24 00:26:41.350 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-09-24 00:26:41.351 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +orderer0.example.com | "2019-09-24 00:26:41.351 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.3µs " +orderer0.example.com | "2019-09-24 00:26:41.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:41.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:41.540 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:41.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a6 Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-09-24 00:26:41.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 336.3µs " +orderer0.example.com | "2019-09-24 00:26:41.852 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a8 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-09-24 00:26:41.852 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a9 Sending msg of 28 bytes to 3 on channel businesschannel took 6.2µs" +orderer0.example.com | "2019-09-24 00:26:41.853 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " +orderer0.example.com | "2019-09-24 00:26:41.853 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.5µs " +orderer0.example.com | "2019-09-24 00:26:41.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ac Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:41.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ad Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:42.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ae Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:42.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14af Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +orderer0.example.com | "2019-09-24 00:26:42.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.9µs " +orderer0.example.com | "2019-09-24 00:26:42.352 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b1 Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +orderer0.example.com | "2019-09-24 00:26:42.352 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b2 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-09-24 00:26:42.353 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.9µs " +orderer0.example.com | "2019-09-24 00:26:42.353 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.6µs " +orderer0.example.com | "2019-09-24 00:26:42.355 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:42.355 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:42.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:42.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b8 Sending msg of 28 bytes to 3 on channel testchainid took 27.3µs" +orderer0.example.com | "2019-09-24 00:26:42.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.1µs " +orderer0.example.com | "2019-09-24 00:26:42.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ba Sending msg of 28 bytes to 2 on channel businesschannel took 98.9µs" +orderer0.example.com | "2019-09-24 00:26:42.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bb Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-09-24 00:26:42.853 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3669ms " +orderer0.example.com | "2019-09-24 00:26:42.853 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.8µs " +orderer0.example.com | "2019-09-24 00:26:42.854 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14be Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:42.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14bf Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:43.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:43.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c1 Sending msg of 28 bytes to 3 on channel testchainid took 88.7µs" +orderer0.example.com | "2019-09-24 00:26:43.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 220.5µs " +orderer0.example.com | "2019-09-24 00:26:43.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c3 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-09-24 00:26:43.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c4 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-09-24 00:26:43.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.8µs " +orderer0.example.com | "2019-09-24 00:26:43.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 43.1µs " +orderer0.example.com | "2019-09-24 00:26:43.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:43.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:43.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:43.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ca Sending msg of 28 bytes to 3 on channel testchainid took 58µs" +orderer0.example.com | "2019-09-24 00:26:43.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 211.4µs " +orderer0.example.com | "2019-09-24 00:26:43.851 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cc Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +orderer0.example.com | "2019-09-24 00:26:43.851 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cd Sending msg of 28 bytes to 2 on channel businesschannel took 11.7µs" +orderer0.example.com | "2019-09-24 00:26:43.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.9µs " +orderer0.example.com | "2019-09-24 00:26:43.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.2µs " +orderer0.example.com | "2019-09-24 00:26:43.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:43.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:44.039 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:44.039 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d3 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2019-09-24 00:26:44.039 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +orderer0.example.com | "2019-09-24 00:26:44.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d5 Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-09-24 00:26:44.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d6 Sending msg of 28 bytes to 3 on channel businesschannel took 182.4µs" +orderer0.example.com | "2019-09-24 00:26:44.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.8µs " +orderer0.example.com | "2019-09-24 00:26:44.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 187.9µs " +orderer0.example.com | "2019-09-24 00:26:44.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:44.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14da Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:44.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14db Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:44.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14dc Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +orderer0.example.com | "2019-09-24 00:26:44.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14dd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " +orderer0.example.com | "2019-09-24 00:26:44.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14de Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-09-24 00:26:44.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e0 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +orderer0.example.com | "2019-09-24 00:26:44.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 42µs " +orderer0.example.com | "2019-09-24 00:26:44.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.1µs " +orderer0.example.com | "2019-09-24 00:26:44.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:44.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:45.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:45.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e5 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +orderer0.example.com | "2019-09-24 00:26:45.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.1µs " +orderer0.example.com | "2019-09-24 00:26:45.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e7 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +orderer0.example.com | "2019-09-24 00:26:45.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e9 Sending msg of 28 bytes to 2 on channel businesschannel took 12.5µs" +orderer0.example.com | "2019-09-24 00:26:45.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.1µs " +orderer0.example.com | "2019-09-24 00:26:45.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ea Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:45.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 265µs " +orderer0.example.com | "2019-09-24 00:26:45.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ec Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:45.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ed Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:45.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ee Sending msg of 28 bytes to 3 on channel testchainid took 9.1µs" +orderer0.example.com | "2019-09-24 00:26:45.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +orderer0.example.com | "2019-09-24 00:26:45.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f0 Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" +orderer0.example.com | "2019-09-24 00:26:45.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f1 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +orderer0.example.com | "2019-09-24 00:26:45.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.7µs " +orderer0.example.com | "2019-09-24 00:26:45.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 41.1µs " +orderer0.example.com | "2019-09-24 00:26:45.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:45.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:46.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:46.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f7 Sending msg of 28 bytes to 3 on channel testchainid took 10.6µs" +orderer0.example.com | "2019-09-24 00:26:46.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.8µs " +orderer0.example.com | "2019-09-24 00:26:46.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f9 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-09-24 00:26:46.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160.9µs " +orderer0.example.com | "2019-09-24 00:26:46.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fb Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2019-09-24 00:26:46.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.8µs " +orderer0.example.com | "2019-09-24 00:26:46.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14fd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:46.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14fe Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:46.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ff Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:46.534 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1500 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2019-09-24 00:26:46.534 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1501 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.4µs " +orderer0.example.com | "2019-09-24 00:26:46.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1502 Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +orderer0.example.com | "2019-09-24 00:26:46.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1503 Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" +orderer0.example.com | "2019-09-24 00:26:46.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1504 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.2µs " +orderer0.example.com | "2019-09-24 00:26:46.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1505 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.3µs " +orderer0.example.com | "2019-09-24 00:26:46.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1506 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:46.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1507 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:47.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1508 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:47.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1509 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2019-09-24 00:26:47.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51µs " +orderer0.example.com | "2019-09-24 00:26:47.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150b Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +orderer0.example.com | "2019-09-24 00:26:47.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150c Sending msg of 28 bytes to 3 on channel businesschannel took 6.1µs" +orderer0.example.com | "2019-09-24 00:26:47.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.2µs " +orderer0.example.com | "2019-09-24 00:26:47.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 36.7µs " +orderer0.example.com | "2019-09-24 00:26:47.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 150f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:47.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1510 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:47.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1511 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:47.534 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1512 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +orderer0.example.com | "2019-09-24 00:26:47.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1513 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.4µs " +peer0.org1.example.com | "2019-09-24 00:25:07.849 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cc0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cc1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cc2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.849 UTC [policies] Evaluate -> DEBU cc3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [policies] Evaluate -> DEBU cc4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [policies] Evaluate -> DEBU cc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [cauthdsl] func1 -> DEBU cc6 0xc00296f2f0 gate 1569284707850104300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cc7 0xc00296f2f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cc8 0xc00296f2f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cc9 0xc00296f2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cca 0xc00296f2f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [cauthdsl] func1 -> DEBU ccb 0xc00296f2f0 gate 1569284707850104300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [policies] Evaluate -> DEBU ccc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [policies] Evaluate -> DEBU ccd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [policies] Evaluate -> DEBU cce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [cauthdsl] func1 -> DEBU ccf 0xc00296fb40 gate 1569284707850709200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cd0 0xc00296fb40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cd1 0xc00296fb40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cd2 0xc00296fb40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.850 UTC [msp.identity] Verify -> DEBU cd3 Verify: digest = 00000000 fb cf 2d b5 f0 5f 32 79 86 85 7f 19 da 71 f3 7e |..-.._2y.....q.~| +peer0.org1.example.com | 00000010 17 4e 9f 80 1c a9 51 6b 04 ee f0 bb 24 18 bb 4d |.N....Qk....$..M|" +peer0.org1.example.com | "2019-09-24 00:25:07.851 UTC [msp.identity] Verify -> DEBU cd4 Verify: sig = 00000000 30 44 02 20 63 1c 61 02 af 88 41 44 e5 7e 46 0a |0D. c.a...AD.~F.| +peer0.org1.example.com | 00000010 03 d8 8f 72 20 93 ea b3 1d ac 7e ed 3a ba be d5 |...r .....~.:...| +peer0.org1.example.com | 00000020 52 66 e6 df 02 20 73 6e 1e 37 e8 42 d0 65 78 ed |Rf... sn.7.B.ex.| +peer0.org1.example.com | 00000030 57 81 31 66 63 de 0a bb 02 66 b6 4c 67 2f 2a c6 |W.1fc....f.Lg/*.| +peer0.org1.example.com | 00000040 5d 0b 38 71 75 d3 |].8qu.|" +peer0.org1.example.com | "2019-09-24 00:25:07.851 UTC [cauthdsl] func2 -> DEBU cd5 0xc00296fb40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.851 UTC [cauthdsl] func1 -> DEBU cd6 0xc00296fb40 gate 1569284707850709200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.851 UTC [policies] Evaluate -> DEBU cd7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.851 UTC [policies] Evaluate -> DEBU cd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.851 UTC [policies] Evaluate -> DEBU cd9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.851 UTC [policies] Evaluate -> DEBU cda == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.851 UTC [gossip.discovery] handleAliveMessage -> DEBU cdb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.851 UTC [gossip.discovery] handleAliveMessage -> DEBU cdc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU cdd Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:07.853 UTC [msp] DeserializeIdentity -> DEBU cde Obtaining identity" +orderer0.example.com | "2019-09-24 00:26:47.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1514 Sending msg of 28 bytes to 2 on channel businesschannel took 14.6µs" +orderer0.example.com | "2019-09-24 00:26:47.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1515 Sending msg of 28 bytes to 3 on channel businesschannel took 6.8µs" +orderer0.example.com | "2019-09-24 00:26:47.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1516 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.7µs " +orderer0.example.com | "2019-09-24 00:26:47.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1517 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.9µs " +orderer0.example.com | "2019-09-24 00:26:47.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1518 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:47.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1519 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:48.041 UTC [orderer.common.cluster.step] handleMessage -> DEBU 151a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:48.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 151b Sending msg of 28 bytes to 3 on channel testchainid took 106.6µs" +orderer0.example.com | "2019-09-24 00:26:48.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU 151c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +orderer0.example.com | "2019-09-24 00:26:48.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 151d Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +orderer0.example.com | "2019-09-24 00:26:48.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 151e Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +orderer0.example.com | "2019-09-24 00:26:48.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 151f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +orderer0.example.com | "2019-09-24 00:26:48.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1520 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.7µs " +orderer0.example.com | "2019-09-24 00:26:48.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1521 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:48.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1522 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:48.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1523 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:48.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1524 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +orderer0.example.com | "2019-09-24 00:26:48.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1525 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 699.6µs " +orderer0.example.com | "2019-09-24 00:26:48.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1526 Sending msg of 28 bytes to 3 on channel businesschannel took 76µs" +orderer0.example.com | "2019-09-24 00:26:48.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1527 Sending msg of 28 bytes to 2 on channel businesschannel took 16.8µs" +orderer0.example.com | "2019-09-24 00:26:48.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1528 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.5µs " +orderer0.example.com | "2019-09-24 00:26:48.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1529 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 317.8µs " +orderer0.example.com | "2019-09-24 00:26:48.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 152a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:48.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 152b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:49.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 152c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:49.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 152d Sending msg of 28 bytes to 3 on channel testchainid took 156.3µs" +orderer0.example.com | "2019-09-24 00:26:49.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 152e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +orderer0.example.com | "2019-09-24 00:26:49.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 152f Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +orderer0.example.com | "2019-09-24 00:26:49.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1531 Sending msg of 28 bytes to 3 on channel businesschannel took 152.5µs" +orderer0.example.com | "2019-09-24 00:26:49.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1532 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.3µs " +orderer0.example.com | "2019-09-24 00:26:49.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1530 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 399.4µs " +orderer0.example.com | "2019-09-24 00:26:49.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1534 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:49.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1533 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:49.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1535 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:49.537 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1536 Sending msg of 28 bytes to 3 on channel testchainid took 10.6µs" +orderer0.example.com | "2019-09-24 00:26:49.537 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1537 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.8µs " +orderer0.example.com | "2019-09-24 00:26:49.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1538 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +orderer0.example.com | "2019-09-24 00:26:49.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 153a Sending msg of 28 bytes to 2 on channel businesschannel took 11.9µs" +peer0.org1.example.com | "2019-09-24 00:25:07.853 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cdf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:07.853 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ce0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.853 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ce1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:07.853 UTC [policies] Evaluate -> DEBU ce2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.853 UTC [policies] Evaluate -> DEBU ce3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:07.853 UTC [policies] Evaluate -> DEBU ce4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.853 UTC [cauthdsl] func1 -> DEBU ce5 0xc002a27540 gate 1569284707853853700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.853 UTC [cauthdsl] func2 -> DEBU ce6 0xc002a27540 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.853 UTC [cauthdsl] func2 -> DEBU ce7 0xc002a27540 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.853 UTC [cauthdsl] func2 -> DEBU ce8 0xc002a27540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:07.854 UTC [cauthdsl] func2 -> DEBU ce9 0xc002a27540 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.854 UTC [cauthdsl] func1 -> DEBU cea 0xc002a27540 gate 1569284707853853700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:07.854 UTC [policies] Evaluate -> DEBU ceb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.854 UTC [policies] Evaluate -> DEBU cec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.854 UTC [policies] Evaluate -> DEBU ced == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:07.854 UTC [cauthdsl] func1 -> DEBU cee 0xc002a27de0 gate 1569284707854311600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:07.854 UTC [cauthdsl] func2 -> DEBU cef 0xc002a27de0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:07.854 UTC [cauthdsl] func2 -> DEBU cf0 0xc002a27de0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:07.854 UTC [cauthdsl] func2 -> DEBU cf1 0xc002a27de0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.854 UTC [msp.identity] Verify -> DEBU cf2 Verify: digest = 00000000 cf d5 60 b7 3f 76 d5 4e 0c da 16 b9 5b 63 6d e3 |..`.?v.N....[cm.| +peer0.org1.example.com | 00000010 1d 36 2e 9c 6d 29 92 8d b9 99 fd dc c7 2d ae 8f |.6..m).......-..|" +peer0.org1.example.com | "2019-09-24 00:25:07.854 UTC [msp.identity] Verify -> DEBU cf3 Verify: sig = 00000000 30 45 02 21 00 fb 83 e6 4d f4 66 f1 2e 66 f7 97 |0E.!....M.f..f..| +peer0.org1.example.com | 00000010 dc c8 0e 02 84 77 99 95 dd 30 fe 40 b1 6c cb 63 |.....w...0.@.l.c| +peer0.org1.example.com | 00000020 b8 f2 00 c5 9d 02 20 4b 49 c8 01 0d a2 35 28 ef |...... KI....5(.| +peer0.org1.example.com | 00000030 f9 e9 6a 4a 1e 3a df 48 12 4d 36 a3 a8 59 b5 1e |..jJ.:.H.M6..Y..| +peer0.org1.example.com | 00000040 c6 fb 9a f7 3c 9b 8f |....<..|" +peer0.org1.example.com | "2019-09-24 00:25:07.855 UTC [cauthdsl] func2 -> DEBU cf4 0xc002a27de0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:07.855 UTC [cauthdsl] func1 -> DEBU cf5 0xc002a27de0 gate 1569284707854311600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:07.855 UTC [policies] Evaluate -> DEBU cf6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.855 UTC [policies] Evaluate -> DEBU cf7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.855 UTC [policies] Evaluate -> DEBU cf8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.855 UTC [policies] Evaluate -> DEBU cf9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:07.855 UTC [gossip.discovery] handleAliveMessage -> DEBU cfa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:07.855 UTC [gossip.discovery] handleAliveMessage -> DEBU cfb endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1569284680017232100, 22 but got ts: inc_num:1569284680017232100 seq_num:17 " +peer0.org1.example.com | "2019-09-24 00:25:07.857 UTC [gossip.gossip] handleMessage -> DEBU cfc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.855 UTC [gossip.discovery] handleAliveMessage -> DEBU cfd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU cfe Exiting" +peer0.org1.example.com | "2019-09-24 00:25:07.995 UTC [gossip.gossip] handleMessage -> DEBU cff Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.000 UTC [gossip.pull] HandleMessage -> DEBU d00 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.000 UTC [msp] DeserializeIdentity -> DEBU d01 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.000 UTC [msp] DeserializeIdentity -> DEBU d02 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.001 UTC [gossip.pull] SendDigest -> DEBU d03 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:08.002 UTC [gossip.gossip] handleMessage -> DEBU d04 Exiting" +orderer0.example.com | "2019-09-24 00:26:49.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 153b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.7µs " +orderer0.example.com | "2019-09-24 00:26:49.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1539 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.5µs " +orderer0.example.com | "2019-09-24 00:26:49.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 153c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:49.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 153d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:50.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 153e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:50.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 153f Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +orderer0.example.com | "2019-09-24 00:26:50.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1540 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.2µs " +orderer0.example.com | "2019-09-24 00:26:50.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1541 Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +orderer0.example.com | "2019-09-24 00:26:50.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1542 Sending msg of 28 bytes to 2 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-09-24 00:26:50.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1543 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.8µs " +orderer0.example.com | "2019-09-24 00:26:50.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1544 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.1µs " +orderer0.example.com | "2019-09-24 00:26:50.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1545 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:50.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1546 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:50.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1547 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:50.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1548 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +orderer0.example.com | "2019-09-24 00:26:50.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1549 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85µs " +orderer0.example.com | "2019-09-24 00:26:50.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 154a Sending msg of 28 bytes to 2 on channel businesschannel took 49µs" +orderer0.example.com | "2019-09-24 00:26:50.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 154b Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-09-24 00:26:50.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 154c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 735.3µs " +orderer0.example.com | "2019-09-24 00:26:50.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 154d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210µs " +orderer0.example.com | "2019-09-24 00:26:50.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 154e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:50.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 154f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:51.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1550 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:51.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1551 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +orderer0.example.com | "2019-09-24 00:26:51.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1552 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.1µs " +orderer0.example.com | "2019-09-24 00:26:51.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1553 Sending msg of 28 bytes to 2 on channel businesschannel took 29.4µs" +orderer0.example.com | "2019-09-24 00:26:51.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1554 Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-09-24 00:26:51.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1555 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.2µs " +orderer0.example.com | "2019-09-24 00:26:51.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1556 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84µs " +orderer0.example.com | "2019-09-24 00:26:51.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1557 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:51.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1558 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:51.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1559 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:51.534 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 155a Sending msg of 28 bytes to 3 on channel testchainid took 10.7µs" +orderer0.example.com | "2019-09-24 00:26:51.534 UTC [orderer.common.cluster.step] sendMessage -> DEBU 155b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " +orderer0.example.com | "2019-09-24 00:26:51.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 155c Sending msg of 28 bytes to 2 on channel businesschannel took 17.6µs" +orderer0.example.com | "2019-09-24 00:26:51.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 155d Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2019-09-24 00:26:51.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 155e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.2µs " +orderer0.example.com | "2019-09-24 00:26:51.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 155f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.8µs " +peer0.org1.example.com | "2019-09-24 00:25:08.002 UTC [gossip.gossip] handleMessage -> DEBU d05 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.002 UTC [gossip.gossip] handleMessage -> DEBU d06 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.002 UTC [gossip.discovery] handleMsgFromComm -> DEBU d07 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.002 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d08 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:08.002 UTC [msp] DeserializeIdentity -> DEBU d09 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.002 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:08.002 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d0b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.002 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d0c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.003 UTC [policies] Evaluate -> DEBU d0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.003 UTC [policies] Evaluate -> DEBU d0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:08.003 UTC [policies] Evaluate -> DEBU d0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.003 UTC [cauthdsl] func1 -> DEBU d10 0xc00031e310 gate 1569284708003268900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.003 UTC [cauthdsl] func2 -> DEBU d11 0xc00031e310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.003 UTC [cauthdsl] func2 -> DEBU d12 0xc00031e310 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.003 UTC [cauthdsl] func2 -> DEBU d13 0xc00031e310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:08.003 UTC [cauthdsl] func2 -> DEBU d14 0xc00031e310 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.003 UTC [cauthdsl] func1 -> DEBU d15 0xc00031e310 gate 1569284708003268900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.003 UTC [policies] Evaluate -> DEBU d16 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.003 UTC [policies] Evaluate -> DEBU d17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.004 UTC [policies] Evaluate -> DEBU d18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.004 UTC [cauthdsl] func1 -> DEBU d19 0xc00031eba0 gate 1569284708004521100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.004 UTC [cauthdsl] func2 -> DEBU d1a 0xc00031eba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.004 UTC [cauthdsl] func2 -> DEBU d1b 0xc00031eba0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.004 UTC [cauthdsl] func2 -> DEBU d1c 0xc00031eba0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.004 UTC [msp.identity] Verify -> DEBU d1d Verify: digest = 00000000 02 c9 be 65 c4 e7 58 61 47 2c 55 8d 3c c1 4a b7 |...e..XaG,U.<.J.| +peer0.org1.example.com | 00000010 f3 40 78 78 81 88 a4 a4 cb ea 3c 86 24 b4 8f 22 |.@xx......<.$.."|" +peer0.org1.example.com | "2019-09-24 00:25:08.004 UTC [msp.identity] Verify -> DEBU d1e Verify: sig = 00000000 30 45 02 21 00 a5 1e 1f e0 ed 9c b2 4b 31 a9 4d |0E.!........K1.M| +peer0.org1.example.com | 00000010 bd b6 ac 6b 19 e3 ae 32 ba 26 19 c3 be ed ad ce |...k...2.&......| +peer0.org1.example.com | 00000020 bc 29 f0 53 54 02 20 20 ff 60 1b 7a 7d 85 f9 ef |.).ST. .`.z}...| +peer0.org1.example.com | 00000030 7f 06 d6 96 e1 cd 6b ca 99 9e da 2d a1 03 99 d2 |......k....-....| +peer0.org1.example.com | 00000040 80 bf 5f 83 f6 04 d1 |.._....|" +peer0.org1.example.com | "2019-09-24 00:25:08.005 UTC [cauthdsl] func2 -> DEBU d1f 0xc00031eba0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.005 UTC [cauthdsl] func1 -> DEBU d20 0xc00031eba0 gate 1569284708004521100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:08.005 UTC [policies] Evaluate -> DEBU d21 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:26:51.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1560 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:51.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1561 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:52.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1562 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:52.034 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1563 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2019-09-24 00:26:52.034 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1564 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +orderer0.example.com | "2019-09-24 00:26:52.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1565 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +orderer0.example.com | "2019-09-24 00:26:52.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1566 Sending msg of 28 bytes to 3 on channel businesschannel took 8.3µs" +orderer0.example.com | "2019-09-24 00:26:52.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1567 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.8µs " +orderer0.example.com | "2019-09-24 00:26:52.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1568 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.8µs " +orderer0.example.com | "2019-09-24 00:26:52.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1569 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:52.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 156a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:52.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 156b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:52.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 156c Sending msg of 28 bytes to 3 on channel testchainid took 48.7µs" +orderer0.example.com | "2019-09-24 00:26:52.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 156d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49µs " +orderer0.example.com | "2019-09-24 00:26:52.847 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 156e Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 00:26:52.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 156f Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-09-24 00:26:52.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1570 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121µs " +orderer0.example.com | "2019-09-24 00:26:52.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1571 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.3µs " +orderer0.example.com | "2019-09-24 00:26:52.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1572 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:52.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1573 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:53.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1574 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:53.034 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1575 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2019-09-24 00:26:53.034 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1576 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.8µs " +orderer0.example.com | "2019-09-24 00:26:53.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1577 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +orderer0.example.com | "2019-09-24 00:26:53.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1578 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +orderer0.example.com | "2019-09-24 00:26:53.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1579 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.2µs " +orderer0.example.com | "2019-09-24 00:26:53.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 157a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140.4µs " +orderer0.example.com | "2019-09-24 00:26:53.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 157b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:53.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 157c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:53.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 157d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:53.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 157e Sending msg of 28 bytes to 3 on channel testchainid took 19.8µs" +orderer0.example.com | "2019-09-24 00:26:53.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 157f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 214.3µs " +orderer0.example.com | "2019-09-24 00:26:53.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1580 Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +orderer0.example.com | "2019-09-24 00:26:53.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1581 Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" +orderer0.example.com | "2019-09-24 00:26:53.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1582 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.4µs " +orderer0.example.com | "2019-09-24 00:26:53.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1583 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:53.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1584 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:53.854 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1585 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 5.3196ms " +peer0.org1.example.com | "2019-09-24 00:25:08.005 UTC [policies] Evaluate -> DEBU d22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [policies] Evaluate -> DEBU d23 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [policies] Evaluate -> DEBU d24 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [gossip.discovery] handleAliveMessage -> DEBU d25 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [gossip.discovery] learnExistingMembers -> DEBU d26 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [gossip.discovery] learnExistingMembers -> DEBU d27 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [gossip.discovery] learnExistingMembers -> DEBU d28 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [gossip.discovery] learnExistingMembers -> DEBU d29 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [gossip.discovery] learnExistingMembers -> DEBU d2a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [gossip.discovery] handleAliveMessage -> DEBU d2b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU d2c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [gossip.discovery] sendMemResponse -> DEBU d2d Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:08.006 UTC [msp] DeserializeIdentity -> DEBU d2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.007 UTC [msp] DeserializeIdentity -> DEBU d2f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.007 UTC [msp] DeserializeIdentity -> DEBU d30 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.007 UTC [gossip.comm] Send -> DEBU d31 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:08.007 UTC [gossip.discovery] sendMemResponse -> DEBU d32 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\032" signature:"0D\002 \013\376rD3\301\030`X\353^\331\314<\206'\227z\000\267*r>\035A~O]ER\021\201\002 <\000M\037\021b#\213>\376\316fd&\277-\025\nU\003\257\311\357\332'\214629\316H\020" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:08.007 UTC [gossip.comm] sendToEndpoint -> DEBU d33 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.007 UTC [gossip.comm] sendToEndpoint -> DEBU d34 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.219 UTC [msp] DeserializeIdentity -> DEBU d35 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.219 UTC [msp] DeserializeIdentity -> DEBU d36 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.220 UTC [gossip.comm] Send -> DEBU d37 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d38 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d39 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d3a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d3b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d3c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d3d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.222 UTC [gossip.comm] func1 -> DEBU d3e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.223 UTC [gossip.gossip] handleMessage -> DEBU d3f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.223 UTC [msp.identity] Verify -> DEBU d40 Verify: digest = 00000000 01 c3 83 f1 15 d3 f7 90 10 55 d7 17 42 99 85 b9 |.........U..B...| +peer0.org1.example.com | 00000010 71 66 f1 68 5a e0 21 62 05 12 57 37 dd 26 b1 ab |qf.hZ.!b..W7.&..|" +peer0.org1.example.com | "2019-09-24 00:25:08.223 UTC [msp.identity] Verify -> DEBU d41 Verify: sig = 00000000 30 44 02 20 66 11 5f 81 fb 7e 19 3a 27 09 3f 44 |0D. f._..~.:'.?D| +peer0.org1.example.com | 00000010 c8 f2 51 d0 96 f5 20 e3 a9 1a b8 da 4a 77 ca cb |..Q... .....Jw..| +peer0.org1.example.com | 00000020 f8 90 a1 58 02 20 41 53 30 55 18 a3 7d e6 ac 47 |...X. AS0U..}..G| +peer0.org1.example.com | 00000030 b3 17 48 1d 9d 73 6d 51 e1 46 9e 81 bb dd 43 e3 |..H..smQ.F....C.| +peer0.org1.example.com | 00000040 ca 46 2d 3f 0c cf |.F-?..|" +peer0.org1.example.com | "2019-09-24 00:25:08.224 UTC [msp.identity] Verify -> DEBU d42 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:08.224 UTC [msp.identity] Verify -> DEBU d43 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:08.224 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d44 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.224 UTC [gossip.comm] func1 -> DEBU d45 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.224 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d46 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.224 UTC [policies] Evaluate -> DEBU d47 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.224 UTC [policies] Evaluate -> DEBU d48 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:08.224 UTC [policies] Evaluate -> DEBU d49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.224 UTC [msp] DeserializeIdentity -> DEBU d4a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.224 UTC [msp.identity] newIdentity -> DEBU d4b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:08.225 UTC [cauthdsl] func1 -> DEBU d4c 0xc0001e6920 gate 1569284708225277400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.225 UTC [cauthdsl] func2 -> DEBU d4d 0xc0001e6920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.225 UTC [cauthdsl] func2 -> DEBU d4e 0xc0001e6920 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.225 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d4f Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:08.226 UTC [msp] Validate -> DEBU d50 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:08.226 UTC [msp] getCertificationChain -> DEBU d51 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:08.226 UTC [cauthdsl] func2 -> DEBU d52 0xc0001e6920 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.226 UTC [msp.identity] Verify -> DEBU d53 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:08.226 UTC [msp.identity] Verify -> DEBU d54 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:08.226 UTC [cauthdsl] func2 -> DEBU d55 0xc0001e6920 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.226 UTC [cauthdsl] func1 -> DEBU d56 0xc0001e6920 gate 1569284708225277400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:08.226 UTC [policies] Evaluate -> DEBU d57 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.226 UTC [policies] Evaluate -> DEBU d58 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.226 UTC [policies] Evaluate -> DEBU d59 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.226 UTC [policies] Evaluate -> DEBU d5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [gossip.gossip] handleMessage -> DEBU d5b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [gossip.gossip] handleMessage -> DEBU d5c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [msp] DeserializeIdentity -> DEBU d5d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [msp] DeserializeIdentity -> DEBU d5e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [msp] DeserializeIdentity -> DEBU d5f Obtaining identity" +orderer0.example.com | "2019-09-24 00:26:54.037 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1586 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:54.039 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1587 Sending msg of 28 bytes to 3 on channel testchainid took 136.5µs" +orderer0.example.com | "2019-09-24 00:26:54.039 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1588 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.7µs " +orderer0.example.com | "2019-09-24 00:26:54.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1589 Sending msg of 28 bytes to 2 on channel businesschannel took 31.6µs" +orderer0.example.com | "2019-09-24 00:26:54.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 158a Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" +orderer0.example.com | "2019-09-24 00:26:54.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 158b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.7µs " +orderer0.example.com | "2019-09-24 00:26:54.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 158c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76µs " +orderer0.example.com | "2019-09-24 00:26:54.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 158d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:54.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 158e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:54.537 UTC [orderer.common.cluster.step] handleMessage -> DEBU 158f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:54.537 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1590 Sending msg of 28 bytes to 3 on channel testchainid took 111.3µs" +orderer0.example.com | "2019-09-24 00:26:54.538 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1591 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 434.2µs " +orderer0.example.com | "2019-09-24 00:26:54.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1592 Sending msg of 28 bytes to 2 on channel businesschannel took 38.7µs" +orderer0.example.com | "2019-09-24 00:26:54.850 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1593 Sending msg of 28 bytes to 3 on channel businesschannel took 120.3µs" +orderer0.example.com | "2019-09-24 00:26:54.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1594 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 182.6µs " +orderer0.example.com | "2019-09-24 00:26:54.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1595 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.1µs " +orderer0.example.com | "2019-09-24 00:26:54.854 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1596 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:54.854 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1597 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:55.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1598 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:55.039 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1599 Sending msg of 28 bytes to 3 on channel testchainid took 1.4098ms" +orderer0.example.com | "2019-09-24 00:26:55.040 UTC [orderer.common.cluster.step] sendMessage -> DEBU 159a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.7µs " +orderer0.example.com | "2019-09-24 00:26:55.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 159b Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +orderer0.example.com | "2019-09-24 00:26:55.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 159c Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-09-24 00:26:55.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 159d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.8µs " +orderer0.example.com | "2019-09-24 00:26:55.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 159e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.2µs " +orderer0.example.com | "2019-09-24 00:26:55.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 159f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:55.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15a0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:55.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15a1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:55.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15a2 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +orderer0.example.com | "2019-09-24 00:26:55.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15a3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.6µs " +orderer0.example.com | "2019-09-24 00:26:55.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15a4 Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-09-24 00:26:55.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15a5 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +orderer0.example.com | "2019-09-24 00:26:55.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.8µs " +orderer0.example.com | "2019-09-24 00:26:55.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15a7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 43.2µs " +orderer0.example.com | "2019-09-24 00:26:55.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15a8 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:55.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15a9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:56.040 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15aa Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:56.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15ab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 301.5µs " +orderer0.example.com | "2019-09-24 00:26:56.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ac Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +orderer0.example.com | "2019-09-24 00:26:56.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ad Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-09-24 00:26:56.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ae Sending msg of 28 bytes to 3 on channel businesschannel took 142.4µs" +orderer0.example.com | "2019-09-24 00:26:56.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15af Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 275µs " +orderer0.example.com | "2019-09-24 00:26:56.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2044ms " +orderer0.example.com | "2019-09-24 00:26:56.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15b1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:56.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15b2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:56.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15b3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:56.537 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15b4 Sending msg of 28 bytes to 3 on channel testchainid took 199µs" +orderer0.example.com | "2019-09-24 00:26:56.538 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 328.8µs " +orderer0.example.com | "2019-09-24 00:26:56.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15b6 Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" +orderer0.example.com | "2019-09-24 00:26:56.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15b7 Sending msg of 28 bytes to 3 on channel businesschannel took 25.3µs" +orderer0.example.com | "2019-09-24 00:26:56.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 480.4µs " +orderer0.example.com | "2019-09-24 00:26:56.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 204.3µs " +orderer0.example.com | "2019-09-24 00:26:56.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ba Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:56.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15bb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:57.037 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15bc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:57.037 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15bd Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +orderer0.example.com | "2019-09-24 00:26:57.039 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15be Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 999.6µs " +orderer0.example.com | "2019-09-24 00:26:57.065 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 15bf [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:60788 with txid '220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-09-24 00:26:57.066 UTC [policies] Evaluate -> DEBU 15c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 00:26:57.066 UTC [policies] Evaluate -> DEBU 15c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:26:57.067 UTC [policies] Evaluate -> DEBU 15c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 00:26:57.067 UTC [policies] Evaluate -> DEBU 15c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:26:57.067 UTC [policies] Evaluate -> DEBU 15c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 00:26:57.068 UTC [msp] DeserializeIdentity -> DEBU 15c5 Obtaining identity" +orderer0.example.com | "2019-09-24 00:26:57.068 UTC [msp.identity] newIdentity -> DEBU 15c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:26:57.069 UTC [cauthdsl] func1 -> DEBU 15c7 0xc000177050 gate 1569284817069336000 evaluation starts" +orderer0.example.com | "2019-09-24 00:26:57.069 UTC [cauthdsl] func2 -> DEBU 15c8 0xc000177050 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:26:57.069 UTC [cauthdsl] func2 -> DEBU 15c9 0xc000177050 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:26:57.070 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15ca Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-09-24 00:26:57.070 UTC [msp] Validate -> DEBU 15cb MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:26:57.070 UTC [msp] getCertificationChain -> DEBU 15cc MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:26:57.071 UTC [cauthdsl] func2 -> DEBU 15cd 0xc000177050 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:26:57.075 UTC [msp.identity] Verify -> DEBU 15ce Verify: digest = 00000000 15 f0 bf 5c dd b9 06 29 48 24 cd a2 db 84 36 74 |...\...)H$....6t| +orderer0.example.com | 00000010 4e b5 b9 83 45 11 38 fa 11 fe 61 65 4d e9 c7 c4 |N...E.8...aeM...|" +orderer0.example.com | "2019-09-24 00:26:57.075 UTC [msp.identity] Verify -> DEBU 15cf Verify: sig = 00000000 30 44 02 20 7a d3 96 7d 8e 27 11 63 1c 26 14 b5 |0D. z..}.'.c.&..| +orderer0.example.com | 00000010 bf 60 cc 45 a5 c4 dd 1e c0 d1 0a aa ff 65 1f 43 |.`.E.........e.C| +orderer0.example.com | 00000020 37 33 9a 86 02 20 4c 92 f4 c4 95 34 9c a1 db 0b |73... L....4....| +orderer0.example.com | 00000030 dc d5 2d 9d 34 9d 82 d2 a6 5d c9 ca b1 e9 2d a3 |..-.4....]....-.| +orderer0.example.com | 00000040 39 03 67 3b 57 25 |9.g;W%|" +orderer0.example.com | "2019-09-24 00:26:57.076 UTC [cauthdsl] func2 -> DEBU 15d0 0xc000177050 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d60 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d61 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d62 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [policies] Evaluate -> DEBU d63 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [policies] Evaluate -> DEBU d64 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [policies] Evaluate -> DEBU d65 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [cauthdsl] func1 -> DEBU d66 0xc0001f30f0 gate 1569284708227842100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [cauthdsl] func2 -> DEBU d67 0xc0001f30f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.227 UTC [cauthdsl] func2 -> DEBU d68 0xc0001f30f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d69 0xc0001f30f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d6a 0xc0001f30f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [cauthdsl] func1 -> DEBU d6b 0xc0001f30f0 gate 1569284708227842100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d6c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d6d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d6e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [cauthdsl] func1 -> DEBU d6f 0xc0001f3950 gate 1569284708228206500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d70 0xc0001f3950 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d71 0xc0001f3950 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d72 0xc0001f3950 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [msp.identity] Verify -> DEBU d73 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [msp.identity] Verify -> DEBU d74 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d75 0xc0001f3950 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [cauthdsl] func1 -> DEBU d76 0xc0001f3950 gate 1569284708228206500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d77 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d79 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d7a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [msp] DeserializeIdentity -> DEBU d7b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d7c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d7d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func1 -> DEBU d81 0xc0001c4a30 gate 1569284708229062300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d82 0xc0001c4a30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d83 0xc0001c4a30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d84 0xc0001c4a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d85 0xc0001c4a30 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func1 -> DEBU d86 0xc0001c4a30 gate 1569284708229062300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d87 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func1 -> DEBU d8a 0xc0001c5290 gate 1569284708229349900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d8b 0xc0001c5290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d8c 0xc0001c5290 processing identity 0 with bytes of 114c6c0" +orderer0.example.com | "2019-09-24 00:26:57.076 UTC [cauthdsl] func1 -> DEBU 15d1 0xc000177050 gate 1569284817069336000 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:26:57.077 UTC [policies] Evaluate -> DEBU 15d2 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:26:57.077 UTC [policies] Evaluate -> DEBU 15d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:26:57.078 UTC [policies] Evaluate -> DEBU 15d4 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:26:57.078 UTC [policies] Evaluate -> DEBU 15d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:26:57.079 UTC [policies] Evaluate -> DEBU 15d6 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:26:57.080 UTC [policies] Evaluate -> DEBU 15d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:26:57.080 UTC [orderer.common.blockcutter] Ordered -> DEBU 15d8 Enqueuing message into batch" +orderer0.example.com | "2019-09-24 00:26:57.081 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 15d9 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:60788" +orderer0.example.com | "2019-09-24 00:26:57.084 UTC [grpc] warningf -> DEBU 15da transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:60788: read: connection reset by peer" +orderer0.example.com | "2019-09-24 00:26:57.085 UTC [orderer.common.broadcast] Handle -> WARN 15db Error reading from 172.18.0.9:60788: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:26:57.088 UTC [orderer.common.server] func1 -> DEBU 15dc Closing Broadcast stream" +orderer0.example.com | "2019-09-24 00:26:57.088 UTC [comm.grpc.server] 1 -> INFO 15dd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:60788 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1m36.2988564s +orderer0.example.com | "2019-09-24 00:26:57.089 UTC [grpc] infof -> DEBU 15de transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:26:57.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15df Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-09-24 00:26:57.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15e0 Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +orderer0.example.com | "2019-09-24 00:26:57.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.8µs " +orderer0.example.com | "2019-09-24 00:26:57.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.5µs " +orderer0.example.com | "2019-09-24 00:26:57.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15e3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:57.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15e4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:57.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15e5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:57.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15e6 Sending msg of 28 bytes to 3 on channel testchainid took 44.7µs" +orderer0.example.com | "2019-09-24 00:26:57.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15e7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.5µs " +orderer0.example.com | "2019-09-24 00:26:57.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15e8 Sending msg of 28 bytes to 2 on channel businesschannel took 29.8µs" +orderer0.example.com | "2019-09-24 00:26:57.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15e9 Sending msg of 28 bytes to 3 on channel businesschannel took 302.5µs" +orderer0.example.com | "2019-09-24 00:26:57.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 539.3µs " +orderer0.example.com | "2019-09-24 00:26:57.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 544.9µs " +orderer0.example.com | "2019-09-24 00:26:57.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ec Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:57.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ed Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:58.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ee Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:58.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ef Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +orderer0.example.com | "2019-09-24 00:26:58.037 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.9µs " +orderer0.example.com | "2019-09-24 00:26:58.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f1 Sending msg of 28 bytes to 2 on channel businesschannel took 34.6µs" +orderer0.example.com | "2019-09-24 00:26:58.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f2 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +orderer0.example.com | "2019-09-24 00:26:58.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 913.6µs " +orderer0.example.com | "2019-09-24 00:26:58.351 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.6µs " +orderer0.example.com | "2019-09-24 00:26:58.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:58.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:58.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:58.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f8 Sending msg of 28 bytes to 3 on channel testchainid took 121.9µs" +orderer0.example.com | "2019-09-24 00:26:58.537 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.8µs " +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d8d 0xc0001c5290 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [msp.identity] Verify -> DEBU d8e Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [msp.identity] Verify -> DEBU d8f Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d90 0xc0001c5290 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [cauthdsl] func1 -> DEBU d91 0xc0001c5290 gate 1569284708229349900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.230 UTC [policies] Evaluate -> DEBU d94 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.230 UTC [policies] Evaluate -> DEBU d95 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.230 UTC [gossip.gossip] handleMessage -> DEBU d96 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.230 UTC [gossip.gossip] handleMessage -> DEBU d97 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.230 UTC [msp] DeserializeIdentity -> DEBU d98 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.230 UTC [msp] DeserializeIdentity -> DEBU d99 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.230 UTC [msp] DeserializeIdentity -> DEBU d9a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.230 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d9b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d9c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d9d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU d9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU d9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU da0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [cauthdsl] func1 -> DEBU da1 0xc0001b1370 gate 1569284708231198600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU da2 0xc0001b1370 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU da3 0xc0001b1370 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU da4 0xc0001b1370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU da5 0xc0001b1370 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [cauthdsl] func1 -> DEBU da6 0xc0001b1370 gate 1569284708231198600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU da7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU da8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU da9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [cauthdsl] func1 -> DEBU daa 0xc0001b1c10 gate 1569284708231648100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU dab 0xc0001b1c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU dac 0xc0001b1c10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [cauthdsl] func2 -> DEBU dad 0xc0001b1c10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [msp.identity] Verify -> DEBU dae Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [msp.identity] Verify -> DEBU daf Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +orderer0.example.com | "2019-09-24 00:26:58.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15fa Sending msg of 28 bytes to 2 on channel businesschannel took 31.8µs" +orderer0.example.com | "2019-09-24 00:26:58.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15fb Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-09-24 00:26:58.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 368.2µs " +orderer0.example.com | "2019-09-24 00:26:58.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6237ms " +orderer0.example.com | "2019-09-24 00:26:58.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15fe Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:58.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ff Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:59.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1600 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:59.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1601 Sending msg of 28 bytes to 3 on channel testchainid took 27.8µs" +orderer0.example.com | "2019-09-24 00:26:59.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1602 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.9µs " +orderer0.example.com | "2019-09-24 00:26:59.082 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1603 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:26:59.083 UTC [orderer.consensus.etcdraft] propose -> INFO 1604 Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:26:59.083 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1605 Proposed block [3] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:26:59.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1606 Sending msg of 3652 bytes to 2 on channel businesschannel took 22µs" +orderer0.example.com | "2019-09-24 00:26:59.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1607 Sending msg of 3652 bytes to 3 on channel businesschannel took 15.6µs" +orderer0.example.com | "2019-09-24 00:26:59.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1608 Send of ConsensusRequest for channel businesschannel with payload of size 3652 to orderer1.example.com(orderer1.example.com:7050) took 96.2µs " +orderer0.example.com | "2019-09-24 00:26:59.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1609 Send of ConsensusRequest for channel businesschannel with payload of size 3652 to orderer2.example.com(orderer2.example.com:7050) took 74.3µs " +orderer0.example.com | "2019-09-24 00:26:59.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:59.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:59.091 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 160c Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-09-24 00:26:59.091 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 160d Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:26:59.091 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 160e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-09-24 00:26:59.092 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 160f Sending msg of 28 bytes to 3 on channel businesschannel took 176.5µs" +orderer0.example.com | "2019-09-24 00:26:59.092 UTC [msp] GetDefaultSigningIdentity -> DEBU 1610 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:26:59.092 UTC [msp] GetDefaultSigningIdentity -> DEBU 1611 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:26:59.092 UTC [msp.identity] Sign -> DEBU 1612 Sign: plaintext: 0A020802120B0A090A03010203100418...5841613C987894DEF56AEEBA1BE6039B " +orderer0.example.com | "2019-09-24 00:26:59.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1613 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.5µs " +orderer0.example.com | "2019-09-24 00:26:59.092 UTC [msp.identity] Sign -> DEBU 1614 Sign: digest: D82FCC8554852885DD300DC82A17DE54AF37AA777975C6973FDDF7C059798ED0 " +orderer0.example.com | "2019-09-24 00:26:59.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1615 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.9µs " +orderer0.example.com | "2019-09-24 00:26:59.094 UTC [fsblkstorage] indexBlock -> DEBU 1616 Indexing block [blockNum=3, blockHash=[]byte{0x4a, 0x1f, 0x9f, 0xdf, 0xb8, 0xd6, 0xb4, 0xc9, 0xe9, 0xdf, 0x1, 0x15, 0xf0, 0x70, 0xf5, 0xce, 0xa4, 0xda, 0xbc, 0x48, 0x8d, 0x5e, 0xb5, 0x2, 0x42, 0x64, 0xc9, 0x8a, 0x87, 0x31, 0x17, 0x5e} txOffsets= +orderer0.example.com | txId=220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7 locPointer=offset=70, bytesLength=3524 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 00:26:59.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1617 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:59.095 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1618 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:59.097 UTC [fsblkstorage] updateCheckpoint -> DEBU 1619 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[75922], isChainEmpty=[false], lastBlockNumber=[3]" +orderer0.example.com | "2019-09-24 00:26:59.097 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 161a [channel: businesschannel] Wrote block [3]" +orderer0.example.com | "2019-09-24 00:26:59.098 UTC [fsblkstorage] waitForBlock -> DEBU 161b Came out of wait. maxAvailaBlockNumber=[3]" +orderer0.example.com | "2019-09-24 00:26:59.098 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 161c Remaining bytes=[4531], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:26:59.098 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 161d Returning blockbytes - length=[4529], placementInfo={fileNum=[0], startOffset=[71391], bytesOffset=[71393]}" +orderer0.example.com | "2019-09-24 00:26:59.098 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 161e blockbytes [4529] read from file [0]" +orderer0.example.com | "2019-09-24 00:26:59.098 UTC [common.deliver] deliverBlocks -> DEBU 161f [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +orderer0.example.com | "2019-09-24 00:26:59.099 UTC [fsblkstorage] waitForBlock -> DEBU 1620 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +orderer0.example.com | "2019-09-24 00:26:59.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1621 Sending msg of 28 bytes to 2 on channel businesschannel took 66.4µs" +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [cauthdsl] func2 -> DEBU db0 0xc0001b1c10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [cauthdsl] func1 -> DEBU db1 0xc0001b1c10 gate 1569284708231648100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU db2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU db3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU db4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU db5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [msp] DeserializeIdentity -> DEBU db6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU db9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU dba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU dbb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [cauthdsl] func1 -> DEBU dbc 0xc00019acf0 gate 1569284708233025200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [cauthdsl] func2 -> DEBU dbd 0xc00019acf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [cauthdsl] func2 -> DEBU dbe 0xc00019acf0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [cauthdsl] func2 -> DEBU dbf 0xc00019acf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [cauthdsl] func2 -> DEBU dc0 0xc00019acf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [cauthdsl] func1 -> DEBU dc1 0xc00019acf0 gate 1569284708233025200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [policies] Evaluate -> DEBU dc2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [policies] Evaluate -> DEBU dc3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [policies] Evaluate -> DEBU dc4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [msp] DeserializeIdentity -> DEBU dc5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [msp] DeserializeIdentity -> DEBU dc6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [gossip.comm] Send -> DEBU dc7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:08.234 UTC [msp] DeserializeIdentity -> DEBU dc8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.234 UTC [msp] DeserializeIdentity -> DEBU dc9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dcb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dcc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dcd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dcf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.233 UTC [cauthdsl] func1 -> DEBU dd0 0xc00019b560 gate 1569284708233415200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.263 UTC [msp] DeserializeIdentity -> DEBU dd1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.272 UTC [msp] DeserializeIdentity -> DEBU dd2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.272 UTC [gossip.pull] Hello -> DEBU dd3 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:08.273 UTC [msp] DeserializeIdentity -> DEBU dd4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.273 UTC [msp] DeserializeIdentity -> DEBU dd5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.273 UTC [gossip.comm] Send -> DEBU dd6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:08.273 UTC [gossip.comm] sendToEndpoint -> DEBU dd7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.273 UTC [gossip.comm] sendToEndpoint -> DEBU dd8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.275 UTC [gossip.comm] func1 -> DEBU dd9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.242 UTC [cauthdsl] func2 -> DEBU dda 0xc00019b560 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.276 UTC [cauthdsl] func2 -> DEBU ddb 0xc00019b560 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [cauthdsl] func2 -> DEBU ddc 0xc00019b560 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:26:59.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1622 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.9µs " +orderer0.example.com | "2019-09-24 00:26:59.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1623 Sending msg of 28 bytes to 3 on channel businesschannel took 75.9µs" +orderer0.example.com | "2019-09-24 00:26:59.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1624 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 691.4µs " +orderer0.example.com | "2019-09-24 00:26:59.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1625 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:59.353 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1626 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:59.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1627 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:59.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1628 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +orderer0.example.com | "2019-09-24 00:26:59.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1629 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.4µs " +orderer0.example.com | "2019-09-24 00:26:59.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162a Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 00:26:59.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162b Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +orderer0.example.com | "2019-09-24 00:26:59.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.6µs " +orderer0.example.com | "2019-09-24 00:26:59.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 177.2µs " +orderer0.example.com | "2019-09-24 00:26:59.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:59.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:26:59.921 UTC [orderer.common.server] Broadcast -> DEBU 1630 Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 00:26:59.921 UTC [orderer.common.broadcast] Handle -> DEBU 1631 Starting new broadcast loop for 172.18.0.9:32830" +orderer0.example.com | "2019-09-24 00:26:59.949 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1632 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:32830 with txid 'b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-09-24 00:26:59.949 UTC [policies] Evaluate -> DEBU 1633 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 00:26:59.949 UTC [policies] Evaluate -> DEBU 1634 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:26:59.949 UTC [policies] Evaluate -> DEBU 1635 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 00:26:59.949 UTC [policies] Evaluate -> DEBU 1636 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:26:59.950 UTC [policies] Evaluate -> DEBU 1637 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 00:26:59.950 UTC [cauthdsl] func1 -> DEBU 1638 0xc001360a70 gate 1569284819950477800 evaluation starts" +orderer0.example.com | "2019-09-24 00:26:59.950 UTC [cauthdsl] func2 -> DEBU 1639 0xc001360a70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:26:59.950 UTC [cauthdsl] func2 -> DEBU 163a 0xc001360a70 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:26:59.951 UTC [cauthdsl] func2 -> DEBU 163b 0xc001360a70 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:26:59.951 UTC [msp.identity] Verify -> DEBU 163c Verify: digest = 00000000 e0 75 77 75 d9 9f 3d 58 7f 7b 89 c8 6c 7c 3d 87 |.uwu..=X.{..l|=.| +orderer0.example.com | 00000010 ee 69 47 6d 9c a9 fa 5f bc e7 15 da c1 e9 1a c6 |.iGm..._........|" +orderer0.example.com | "2019-09-24 00:26:59.952 UTC [msp.identity] Verify -> DEBU 163d Verify: sig = 00000000 30 45 02 21 00 98 10 68 fe 99 12 3f 4d 85 bc f1 |0E.!...h...?M...| +orderer0.example.com | 00000010 1b 9f e9 28 a4 4f 34 bb 37 96 5f d9 5a 8f 4e 20 |...(.O4.7._.Z.N | +orderer0.example.com | 00000020 22 14 25 a1 e5 02 20 74 c4 77 b3 85 f3 88 2a 22 |".%... t.w....*"| +orderer0.example.com | 00000030 5a ce 19 dd a5 f9 ac a0 25 e5 a3 14 ab 4c 22 45 |Z.......%....L"E| +orderer0.example.com | 00000040 49 0f e8 05 47 5a 62 |I...GZb|" +orderer0.example.com | "2019-09-24 00:26:59.953 UTC [cauthdsl] func2 -> DEBU 163e 0xc001360a70 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:26:59.953 UTC [cauthdsl] func1 -> DEBU 163f 0xc001360a70 gate 1569284819950477800 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:26:59.953 UTC [policies] Evaluate -> DEBU 1640 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:26:59.953 UTC [policies] Evaluate -> DEBU 1641 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 1642 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 1643 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 1644 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 1645 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:26:59.954 UTC [orderer.common.blockcutter] Ordered -> DEBU 1646 Enqueuing message into batch" +orderer0.example.com | "2019-09-24 00:26:59.955 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1647 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:32830" +orderer0.example.com | "2019-09-24 00:26:59.959 UTC [orderer.common.broadcast] Handle -> WARN 1648 Error reading from 172.18.0.9:32830: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:26:59.959 UTC [orderer.common.server] func1 -> DEBU 1649 Closing Broadcast stream" +orderer0.example.com | "2019-09-24 00:26:59.959 UTC [comm.grpc.server] 1 -> INFO 164a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:32830 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.2477ms +orderer0.example.com | "2019-09-24 00:26:59.959 UTC [grpc] infof -> DEBU 164b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:00.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:00.037 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 164d Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +orderer0.example.com | "2019-09-24 00:27:00.037 UTC [orderer.common.cluster.step] sendMessage -> DEBU 164e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.6µs " +orderer0.example.com | "2019-09-24 00:27:00.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 164f Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +orderer0.example.com | "2019-09-24 00:27:00.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1650 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +orderer0.example.com | "2019-09-24 00:27:00.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1651 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.5µs " +orderer0.example.com | "2019-09-24 00:27:00.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1652 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 528.6µs " +orderer0.example.com | "2019-09-24 00:27:00.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1653 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:00.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1654 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:00.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1655 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:00.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1656 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +orderer0.example.com | "2019-09-24 00:27:00.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1657 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.8µs " +orderer0.example.com | "2019-09-24 00:27:00.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1658 Sending msg of 28 bytes to 2 on channel businesschannel took 28.7µs" +orderer0.example.com | "2019-09-24 00:27:00.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1659 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-09-24 00:27:00.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.6µs " +orderer0.example.com | "2019-09-24 00:27:00.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.9µs " +orderer0.example.com | "2019-09-24 00:27:00.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 165c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:00.851 UTC [orderer.common.cluster.step] handleMessage -> DEBU 165d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:01.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU 165e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:01.037 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165f Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +orderer0.example.com | "2019-09-24 00:27:01.037 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1660 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.3µs " +orderer0.example.com | "2019-09-24 00:27:01.350 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1661 Sending msg of 28 bytes to 2 on channel businesschannel took 38.3µs" +orderer0.example.com | "2019-09-24 00:27:01.352 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1664 Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-09-24 00:27:01.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1662 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 175.1µs " +orderer0.example.com | "2019-09-24 00:27:01.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1663 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:01.354 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1665 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " +orderer0.example.com | "2019-09-24 00:27:01.355 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1666 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:01.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1667 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:01.537 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1668 Sending msg of 28 bytes to 3 on channel testchainid took 190.4µs" +orderer0.example.com | "2019-09-24 00:27:01.537 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1669 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162µs " +orderer0.example.com | "2019-09-24 00:27:01.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166a Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +orderer0.example.com | "2019-09-24 00:27:01.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166b Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +orderer0.example.com | "2019-09-24 00:27:01.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.7µs " +orderer0.example.com | "2019-09-24 00:27:01.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.9µs " +orderer0.example.com | "2019-09-24 00:27:01.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 166e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:01.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 166f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:01.956 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1670 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:01.957 UTC [orderer.consensus.etcdraft] propose -> INFO 1671 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:01.958 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1672 Proposed block [4] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:01.960 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1673 Sending msg of 3113 bytes to 3 on channel businesschannel took 20.9µs" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [msp.identity] Verify -> DEBU ddd Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [msp.identity] Verify -> DEBU dde Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [cauthdsl] func2 -> DEBU ddf 0xc00019b560 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [cauthdsl] func1 -> DEBU de0 0xc00019b560 gate 1569284708233415200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [policies] Evaluate -> DEBU de1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [policies] Evaluate -> DEBU de2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [policies] Evaluate -> DEBU de3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [policies] Evaluate -> DEBU de4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [gossip.gossip] handleMessage -> DEBU de5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [gossip.gossip] handleMessage -> DEBU de6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [gossip.pull] HandleMessage -> DEBU de7 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.277 UTC [gossip.gossip] handleMessage -> DEBU de8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.623 UTC [gossip.pull] SendReq -> DEBU de9 Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:08.624 UTC [gossip.comm] Send -> DEBU dea Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:08.624 UTC [gossip.comm] sendToEndpoint -> DEBU deb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.624 UTC [gossip.comm] sendToEndpoint -> DEBU dec Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.626 UTC [gossip.comm] func1 -> DEBU ded Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 5972158026555384508, Envelope: 957 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.626 UTC [gossip.gossip] handleMessage -> DEBU dee Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 5972158026555384508, Envelope: 957 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.626 UTC [msp] DeserializeIdentity -> DEBU def Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.626 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU df0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:08.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU df1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU df2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.627 UTC [policies] Evaluate -> DEBU df3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.627 UTC [policies] Evaluate -> DEBU df4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:08.628 UTC [policies] Evaluate -> DEBU df5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.628 UTC [cauthdsl] func1 -> DEBU df6 0xc000050df0 gate 1569284708628443000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.628 UTC [cauthdsl] func2 -> DEBU df7 0xc000050df0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.628 UTC [cauthdsl] func2 -> DEBU df8 0xc000050df0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.628 UTC [cauthdsl] func2 -> DEBU df9 0xc000050df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:08.628 UTC [cauthdsl] func2 -> DEBU dfa 0xc000050df0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.629 UTC [cauthdsl] func1 -> DEBU dfb 0xc000050df0 gate 1569284708628443000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.629 UTC [policies] Evaluate -> DEBU dfc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.629 UTC [policies] Evaluate -> DEBU dfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.629 UTC [policies] Evaluate -> DEBU dfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.629 UTC [cauthdsl] func1 -> DEBU dff 0xc0002cc780 gate 1569284708629653300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.629 UTC [cauthdsl] func2 -> DEBU e00 0xc0002cc780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.629 UTC [cauthdsl] func2 -> DEBU e01 0xc0002cc780 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.629 UTC [cauthdsl] func2 -> DEBU e02 0xc0002cc780 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.630 UTC [msp.identity] Verify -> DEBU e03 Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| +peer0.org1.example.com | 00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|" +peer0.org1.example.com | "2019-09-24 00:25:08.630 UTC [msp.identity] Verify -> DEBU e04 Verify: sig = 00000000 30 45 02 21 00 fd dc ff cf c7 b6 3d 6b 38 fd 37 |0E.!.......=k8.7| +peer0.org1.example.com | 00000010 d1 a2 e1 76 15 71 2f 1b 1b a3 4e 1c b3 ee 2a b4 |...v.q/...N...*.| +peer0.org1.example.com | 00000020 63 28 20 3e c8 02 20 03 96 c3 91 fe a5 5e 17 eb |c( >.. ......^..| +peer0.org1.example.com | 00000030 54 6a 8d f2 6c 1a e6 45 a3 28 c3 8c 2b 9f 40 81 |Tj..l..E.(..+.@.| +peer0.org1.example.com | 00000040 f4 5f d3 ea 6a dc 3e |._..j.>|" +peer0.org1.example.com | "2019-09-24 00:25:08.630 UTC [cauthdsl] func2 -> DEBU e05 0xc0002cc780 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.630 UTC [cauthdsl] func1 -> DEBU e06 0xc0002cc780 gate 1569284708629653300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:08.630 UTC [policies] Evaluate -> DEBU e07 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.631 UTC [policies] Evaluate -> DEBU e08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.631 UTC [policies] Evaluate -> DEBU e09 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.631 UTC [policies] Evaluate -> DEBU e0a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.639 UTC [msp] DeserializeIdentity -> DEBU e0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.640 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:08.640 UTC [gossip.pull] HandleMessage -> DEBU e0d GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 5972158026555384508, Envelope: 957 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.640 UTC [msp] DeserializeIdentity -> DEBU e0e Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:01.960 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1674 Sending msg of 3113 bytes to 2 on channel businesschannel took 17.2µs" +orderer0.example.com | "2019-09-24 00:27:01.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1675 Send of ConsensusRequest for channel businesschannel with payload of size 3113 to orderer1.example.com(orderer1.example.com:7050) took 94µs " +orderer0.example.com | "2019-09-24 00:27:01.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1676 Send of ConsensusRequest for channel businesschannel with payload of size 3113 to orderer2.example.com(orderer2.example.com:7050) took 136.9µs " +orderer0.example.com | "2019-09-24 00:27:01.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1677 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:01.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1678 Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +orderer0.example.com | "2019-09-24 00:27:01.963 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1679 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:01.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167a Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +orderer0.example.com | "2019-09-24 00:27:01.963 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 167b Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:01.963 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.1µs " +orderer0.example.com | "2019-09-24 00:27:01.963 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 167e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-09-24 00:27:01.963 UTC [msp] GetDefaultSigningIdentity -> DEBU 167f Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:27:01.963 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.1µs " +orderer0.example.com | "2019-09-24 00:27:01.964 UTC [msp] GetDefaultSigningIdentity -> DEBU 1680 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:27:01.966 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1681 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:01.967 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1682 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:01.978 UTC [msp.identity] Sign -> DEBU 1683 Sign: plaintext: 0A020802120B0A090A03010203100418...5C44D0FD5767F4FFF385AFF9BBD8DE9E " +orderer0.example.com | "2019-09-24 00:27:01.978 UTC [msp.identity] Sign -> DEBU 1684 Sign: digest: EEA8361ECB3AAAA5836CCA87A104F1248FEE38DDDFEDDCD0A91D0797C12B12C2 " +orderer0.example.com | "2019-09-24 00:27:01.980 UTC [fsblkstorage] indexBlock -> DEBU 1685 Indexing block [blockNum=4, blockHash=[]byte{0x30, 0xba, 0xc, 0xce, 0x16, 0x44, 0x9b, 0xd3, 0x8e, 0x60, 0x58, 0x49, 0x7d, 0x70, 0x47, 0x86, 0x3f, 0xe5, 0x5c, 0x6c, 0xee, 0xce, 0x96, 0x74, 0xe4, 0x15, 0x6b, 0xdc, 0x92, 0x57, 0x14, 0x77} txOffsets= +orderer0.example.com | txId=b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38 locPointer=offset=70, bytesLength=2985 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 00:27:01.982 UTC [fsblkstorage] updateCheckpoint -> DEBU 1686 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[79914], isChainEmpty=[false], lastBlockNumber=[4]" +orderer0.example.com | "2019-09-24 00:27:01.983 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1687 [channel: businesschannel] Wrote block [4]" +orderer0.example.com | "2019-09-24 00:27:01.983 UTC [fsblkstorage] waitForBlock -> DEBU 1688 Came out of wait. maxAvailaBlockNumber=[4]" +orderer0.example.com | "2019-09-24 00:27:01.983 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1689 Remaining bytes=[3992], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:01.984 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 168a Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[75922], bytesOffset=[75924]}" +orderer0.example.com | "2019-09-24 00:27:01.984 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 168b blockbytes [3990] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:01.984 UTC [common.deliver] deliverBlocks -> DEBU 168c [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +orderer0.example.com | "2019-09-24 00:27:01.985 UTC [fsblkstorage] waitForBlock -> DEBU 168d Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +orderer0.example.com | "2019-09-24 00:27:02.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 168e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:02.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 168f Sending msg of 28 bytes to 3 on channel testchainid took 94.9µs" +orderer0.example.com | "2019-09-24 00:27:02.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1690 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.3µs " +orderer0.example.com | "2019-09-24 00:27:02.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1691 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +orderer0.example.com | "2019-09-24 00:27:02.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1692 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2019-09-24 00:27:02.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1693 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.4µs " +orderer0.example.com | "2019-09-24 00:27:02.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1694 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.6µs " +orderer0.example.com | "2019-09-24 00:27:02.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1695 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:02.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1696 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:02.500 UTC [orderer.common.server] Broadcast -> DEBU 1697 Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 00:27:02.500 UTC [orderer.common.broadcast] Handle -> DEBU 1698 Starting new broadcast loop for 172.18.0.9:32844" +orderer0.example.com | "2019-09-24 00:27:02.511 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1699 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:32844 with txid '315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-09-24 00:27:02.511 UTC [policies] Evaluate -> DEBU 169a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 00:27:02.511 UTC [policies] Evaluate -> DEBU 169b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:02.512 UTC [policies] Evaluate -> DEBU 169c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 00:27:02.512 UTC [policies] Evaluate -> DEBU 169d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:02.512 UTC [policies] Evaluate -> DEBU 169e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 00:27:02.512 UTC [msp] DeserializeIdentity -> DEBU 169f Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:02.513 UTC [msp.identity] newIdentity -> DEBU 16a0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:02.514 UTC [cauthdsl] func1 -> DEBU 16a1 0xc000d16960 gate 1569284822514031700 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:02.514 UTC [cauthdsl] func2 -> DEBU 16a2 0xc000d16960 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:02.514 UTC [cauthdsl] func2 -> DEBU 16a3 0xc000d16960 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:02.514 UTC [cauthdsl] func2 -> DEBU 16a4 0xc000d16960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 00:27:02.514 UTC [cauthdsl] func2 -> DEBU 16a5 0xc000d16960 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:02.515 UTC [cauthdsl] func1 -> DEBU 16a6 0xc000d16960 gate 1569284822514031700 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:02.515 UTC [policies] Evaluate -> DEBU 16a7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:02.515 UTC [policies] Evaluate -> DEBU 16a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:02.515 UTC [policies] Evaluate -> DEBU 16a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-09-24 00:27:02.515 UTC [cauthdsl] func1 -> DEBU 16aa 0xc000d17ae0 gate 1569284822515883500 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:02.516 UTC [cauthdsl] func2 -> DEBU 16ab 0xc000d17ae0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:02.516 UTC [cauthdsl] func2 -> DEBU 16ac 0xc000d17ae0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:02.516 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16ad Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-09-24 00:27:02.516 UTC [msp] Validate -> DEBU 16ae MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:27:02.517 UTC [msp] getCertificationChain -> DEBU 16af MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:02.517 UTC [cauthdsl] func2 -> DEBU 16b0 0xc000d17ae0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:02.517 UTC [msp.identity] Verify -> DEBU 16b1 Verify: digest = 00000000 fc be 8d 27 f2 77 89 7c 99 cc 04 4a 85 f8 8d 65 |...'.w.|...J...e| +orderer0.example.com | 00000010 2a 53 4d f7 97 3d b1 11 dc 3d 62 61 a9 f1 4e 09 |*SM..=...=ba..N.|" +orderer0.example.com | "2019-09-24 00:27:02.518 UTC [msp.identity] Verify -> DEBU 16b2 Verify: sig = 00000000 30 45 02 21 00 f7 0b fd 05 a4 5e 7c 76 e3 68 36 |0E.!......^|v.h6| +orderer0.example.com | 00000010 9b e8 3b 60 20 a4 c6 aa c5 1c 7f 38 32 4c a8 0e |..;` ......82L..| +orderer0.example.com | 00000020 0a c1 65 d7 de 02 20 33 73 0f 80 ff 95 92 a0 ee |..e... 3s.......| +orderer0.example.com | 00000030 0a 53 bc 4b 12 a0 42 40 b9 b9 b3 1d ba ea 5c 46 |.S.K..B@......\F| +orderer0.example.com | 00000040 0f 1e 77 3f ef 13 c6 |..w?...|" +orderer0.example.com | "2019-09-24 00:27:02.518 UTC [cauthdsl] func2 -> DEBU 16b3 0xc000d17ae0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:02.519 UTC [cauthdsl] func1 -> DEBU 16b4 0xc000d17ae0 gate 1569284822515883500 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:02.519 UTC [policies] Evaluate -> DEBU 16b5 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:02.519 UTC [policies] Evaluate -> DEBU 16b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:02.520 UTC [policies] Evaluate -> DEBU 16b7 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:02.520 UTC [policies] Evaluate -> DEBU 16b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:02.520 UTC [policies] Evaluate -> DEBU 16b9 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:27:02.521 UTC [policies] Evaluate -> DEBU 16ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:27:02.521 UTC [orderer.common.blockcutter] Ordered -> DEBU 16bb Enqueuing message into batch" +orderer0.example.com | "2019-09-24 00:27:02.522 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 16bc [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:32844" +orderer0.example.com | "2019-09-24 00:27:02.525 UTC [orderer.common.broadcast] Handle -> WARN 16bd Error reading from 172.18.0.9:32844: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:02.526 UTC [orderer.common.server] func1 -> DEBU 16be Closing Broadcast stream" +orderer0.example.com | "2019-09-24 00:27:02.526 UTC [comm.grpc.server] 1 -> INFO 16bf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:32844 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.5209ms +orderer0.example.com | "2019-09-24 00:27:02.527 UTC [grpc] infof -> DEBU 16c0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:02.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16c1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:02.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16c2 Sending msg of 28 bytes to 3 on channel testchainid took 102.4µs" +orderer0.example.com | "2019-09-24 00:27:02.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167µs " +orderer0.example.com | "2019-09-24 00:27:02.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16c4 Sending msg of 28 bytes to 2 on channel businesschannel took 45.3µs" +orderer0.example.com | "2019-09-24 00:27:02.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16c5 Sending msg of 28 bytes to 3 on channel businesschannel took 59.4µs" +orderer0.example.com | "2019-09-24 00:27:02.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 661.9µs " +orderer0.example.com | "2019-09-24 00:27:02.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.5µs " +orderer0.example.com | "2019-09-24 00:27:02.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16c8 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:02.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16c9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:03.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16ca Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:03.037 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16cb Sending msg of 28 bytes to 3 on channel testchainid took 37.6µs" +orderer0.example.com | "2019-09-24 00:27:03.037 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16cc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.3µs " +orderer0.example.com | "2019-09-24 00:27:03.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16cd Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +orderer0.example.com | "2019-09-24 00:27:03.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16ce Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2019-09-24 00:27:03.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 587.7µs " +orderer0.example.com | "2019-09-24 00:27:03.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.4µs " +orderer0.example.com | "2019-09-24 00:27:03.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16d1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:03.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16d2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:03.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16d3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:03.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16d4 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +orderer0.example.com | "2019-09-24 00:27:03.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " +orderer0.example.com | "2019-09-24 00:27:03.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16d6 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" +orderer0.example.com | "2019-09-24 00:27:03.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16d7 Sending msg of 28 bytes to 3 on channel businesschannel took 26.8µs" +orderer0.example.com | "2019-09-24 00:27:03.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108µs " +orderer0.example.com | "2019-09-24 00:27:03.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.2µs " +orderer0.example.com | "2019-09-24 00:27:03.859 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16da Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:03.860 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16db Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:04.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16dc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:04.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16dd Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-09-24 00:27:04.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.4µs " +orderer0.example.com | "2019-09-24 00:27:04.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16df Sending msg of 28 bytes to 2 on channel businesschannel took 53.8µs" +orderer0.example.com | "2019-09-24 00:27:04.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e0 Sending msg of 28 bytes to 3 on channel businesschannel took 49.8µs" +orderer0.example.com | "2019-09-24 00:27:04.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.5µs " +orderer0.example.com | "2019-09-24 00:27:04.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.8µs " +orderer0.example.com | "2019-09-24 00:27:04.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:04.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:04.522 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 16e5 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:04.522 UTC [orderer.consensus.etcdraft] propose -> INFO 16e6 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:04.523 UTC [orderer.consensus.etcdraft] 2 -> DEBU 16e7 Proposed block [5] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:04.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e8 Sending msg of 3113 bytes to 2 on channel businesschannel took 13.5µs" +orderer0.example.com | "2019-09-24 00:27:04.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e9 Sending msg of 3113 bytes to 3 on channel businesschannel took 21.6µs" +orderer0.example.com | "2019-09-24 00:27:04.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16ea Send of ConsensusRequest for channel businesschannel with payload of size 3113 to orderer2.example.com(orderer2.example.com:7050) took 360.4µs " +orderer0.example.com | "2019-09-24 00:27:04.531 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16eb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:04.532 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16ec Sending msg of 28 bytes to 2 on channel businesschannel took 14.6µs" +orderer0.example.com | "2019-09-24 00:27:04.532 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16ed Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +peer0.org1.example.com | "2019-09-24 00:25:08.641 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e0f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:08.641 UTC [msp] DeserializeIdentity -> DEBU e10 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.641 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e11 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:08.642 UTC [gossip.gossip] func2 -> DEBU e12 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-09-24 00:25:08.642 UTC [gossip.pull] HandleMessage -> DEBU e13 Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 3" +peer0.org1.example.com | "2019-09-24 00:25:08.642 UTC [gossip.gossip] handleMessage -> DEBU e14 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.692 UTC [gossip.comm] func1 -> DEBU e15 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.692 UTC [gossip.comm] func1 -> DEBU e16 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.693 UTC [gossip.gossip] handleMessage -> DEBU e17 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.693 UTC [gossip.gossip] handleMessage -> DEBU e18 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.693 UTC [gossip.gossip] handleMessage -> DEBU e19 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.693 UTC [gossip.pull] HandleMessage -> DEBU e1a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.693 UTC [msp] DeserializeIdentity -> DEBU e1b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU e1c Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.694 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e1d Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:08.694 UTC [msp] DeserializeIdentity -> DEBU e1f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.694 UTC [msp] DeserializeIdentity -> DEBU e1e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [msp] DeserializeIdentity -> DEBU e20 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e21 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [msp] DeserializeIdentity -> DEBU e22 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e23 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e24 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [gossip.pull] SendDigest -> DEBU e25 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [policies] Evaluate -> DEBU e26 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [policies] Evaluate -> DEBU e27 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [gossip.gossip] handleMessage -> DEBU e28 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [policies] Evaluate -> DEBU e29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [cauthdsl] func1 -> DEBU e2a 0xc0004c6ce0 gate 1569284708695612200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [cauthdsl] func2 -> DEBU e2b 0xc0004c6ce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [cauthdsl] func2 -> DEBU e2c 0xc0004c6ce0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [cauthdsl] func2 -> DEBU e2d 0xc0004c6ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [cauthdsl] func2 -> DEBU e2e 0xc0004c6ce0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [cauthdsl] func1 -> DEBU e2f 0xc0004c6ce0 gate 1569284708695612200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [policies] Evaluate -> DEBU e30 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.695 UTC [policies] Evaluate -> DEBU e31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.696 UTC [policies] Evaluate -> DEBU e32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:08.696 UTC [cauthdsl] func1 -> DEBU e33 0xc0004c7520 gate 1569284708696657600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:08.696 UTC [cauthdsl] func2 -> DEBU e34 0xc0004c7520 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:08.696 UTC [cauthdsl] func2 -> DEBU e35 0xc0004c7520 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:08.696 UTC [cauthdsl] func2 -> DEBU e36 0xc0004c7520 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:08.697 UTC [msp.identity] Verify -> DEBU e37 Verify: digest = 00000000 ac d4 a6 66 26 ad ca cb 2e b0 31 3c 42 63 8b 5a |...f&.....1 DEBU e38 Verify: sig = 00000000 30 44 02 20 52 bf 8c fd 49 ce 29 dd 00 83 b7 bd |0D. R...I.).....| +peer0.org1.example.com | 00000010 39 21 b9 8f 6a b5 86 fb 6a ec cb ac 25 37 43 d6 |9!..j...j...%7C.| +peer0.org1.example.com | 00000020 11 70 7e a6 02 20 2a b1 c4 56 6f fc 08 59 6a 1d |.p~.. *..Vo..Yj.| +peer0.org1.example.com | 00000030 d0 4d 40 3d 98 6d b1 06 1f 68 84 81 a6 88 0f a6 |.M@=.m...h......| +peer0.org1.example.com | 00000040 9a 67 ac e6 51 a8 |.g..Q.|" +peer0.org1.example.com | "2019-09-24 00:25:08.701 UTC [cauthdsl] func2 -> DEBU e39 0xc0004c7520 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:04.533 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.3µs " +orderer0.example.com | "2019-09-24 00:27:04.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16ef Send of ConsensusRequest for channel businesschannel with payload of size 3113 to orderer1.example.com(orderer1.example.com:7050) took 86.7µs " +orderer0.example.com | "2019-09-24 00:27:04.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.3µs " +orderer0.example.com | "2019-09-24 00:27:04.533 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16f0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:04.533 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 16f1 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:04.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 16f3 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-09-24 00:27:04.543 UTC [msp] GetDefaultSigningIdentity -> DEBU 16f4 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:27:04.547 UTC [msp] GetDefaultSigningIdentity -> DEBU 16f5 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:27:04.550 UTC [msp.identity] Sign -> DEBU 16f6 Sign: plaintext: 0A020802120B0A090A03010203100418...B207A3D722643B81F38BF79026444373 " +orderer0.example.com | "2019-09-24 00:27:04.551 UTC [msp.identity] Sign -> DEBU 16f9 Sign: digest: F17C4D3D8891EBF2499324AEECF75136EB7F64306A3FD5064038D01E1C152D09 " +orderer0.example.com | "2019-09-24 00:27:04.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16f7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:04.553 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16fb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:04.553 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16fc Sending msg of 28 bytes to 3 on channel testchainid took 119.8µs" +orderer0.example.com | "2019-09-24 00:27:04.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16f8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:04.553 UTC [fsblkstorage] indexBlock -> DEBU 16fa Indexing block [blockNum=5, blockHash=[]byte{0x7d, 0x35, 0x9, 0x46, 0xf2, 0x7d, 0x8b, 0xf0, 0x5f, 0x8e, 0xd9, 0xe3, 0x87, 0xa0, 0x69, 0x5, 0xf1, 0x81, 0xfa, 0x34, 0xce, 0x83, 0x96, 0x8, 0x2e, 0xb2, 0x87, 0x9e, 0x15, 0xec, 0x79, 0xc3} txOffsets= +orderer0.example.com | txId=315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0 locPointer=offset=70, bytesLength=2985 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 00:27:04.554 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16fd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 280µs " +orderer0.example.com | "2019-09-24 00:27:04.560 UTC [fsblkstorage] updateCheckpoint -> DEBU 16fe Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[83906], isChainEmpty=[false], lastBlockNumber=[5]" +orderer0.example.com | "2019-09-24 00:27:04.560 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 16ff [channel: businesschannel] Wrote block [5]" +orderer0.example.com | "2019-09-24 00:27:04.560 UTC [fsblkstorage] waitForBlock -> DEBU 1700 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 00:27:04.560 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1701 Remaining bytes=[3992], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:04.560 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1702 Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[79914], bytesOffset=[79916]}" +orderer0.example.com | "2019-09-24 00:27:04.560 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1703 blockbytes [3990] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:04.561 UTC [common.deliver] deliverBlocks -> DEBU 1704 [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +orderer0.example.com | "2019-09-24 00:27:04.562 UTC [fsblkstorage] waitForBlock -> DEBU 1705 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 00:27:04.618 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1706 No inactive chains to try to replicate" +orderer0.example.com | "2019-09-24 00:27:04.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1707 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-09-24 00:27:04.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1708 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.4µs " +orderer0.example.com | "2019-09-24 00:27:04.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1709 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.6µs " +orderer0.example.com | "2019-09-24 00:27:04.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 170a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:04.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 170b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:04.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 170c Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2019-09-24 00:27:05.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU 170d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:05.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 170e Sending msg of 28 bytes to 3 on channel testchainid took 37.2µs" +orderer0.example.com | "2019-09-24 00:27:05.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 170f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.6µs " +orderer0.example.com | "2019-09-24 00:27:05.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1710 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 00:27:05.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1711 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +orderer0.example.com | "2019-09-24 00:27:05.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1712 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 239.6µs " +orderer0.example.com | "2019-09-24 00:27:05.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1713 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.7µs " +orderer0.example.com | "2019-09-24 00:27:05.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1714 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:05.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1715 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 00:25:08.701 UTC [cauthdsl] func1 -> DEBU e3a 0xc0004c7520 gate 1569284708696657600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:08.702 UTC [policies] Evaluate -> DEBU e3b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.702 UTC [policies] Evaluate -> DEBU e3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.702 UTC [policies] Evaluate -> DEBU e3d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.702 UTC [policies] Evaluate -> DEBU e3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:08.702 UTC [gossip.discovery] handleAliveMessage -> DEBU e3f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.702 UTC [gossip.discovery] learnExistingMembers -> DEBU e40 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:08.702 UTC [gossip.discovery] learnExistingMembers -> DEBU e41 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:08.703 UTC [gossip.discovery] learnExistingMembers -> DEBU e42 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:08.703 UTC [gossip.discovery] learnExistingMembers -> DEBU e43 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:08.703 UTC [gossip.discovery] learnExistingMembers -> DEBU e44 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.703 UTC [gossip.discovery] handleAliveMessage -> DEBU e45 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.705 UTC [gossip.discovery] sendMemResponse -> DEBU e46 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:08.705 UTC [msp] DeserializeIdentity -> DEBU e47 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.707 UTC [msp] DeserializeIdentity -> DEBU e48 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.707 UTC [msp] DeserializeIdentity -> DEBU e49 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU e4a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.708 UTC [gossip.comm] Send -> DEBU e4b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:08.708 UTC [gossip.discovery] sendMemResponse -> DEBU e4c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\032" signature:"0D\002 \013\376rD3\301\030`X\353^\331\314<\206'\227z\000\267*r>\035A~O]ER\021\201\002 <\000M\037\021b#\213>\376\316fd&\277-\025\nU\003\257\311\357\332'\214629\316H\020" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:08.708 UTC [gossip.comm] sendToEndpoint -> DEBU e4d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.708 UTC [gossip.comm] sendToEndpoint -> DEBU e4e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.736 UTC [gossip.gossip] handleMessage -> DEBU e4f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.736 UTC [msp.identity] Verify -> DEBU e50 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:08.736 UTC [gossip.comm] func1 -> DEBU e51 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.736 UTC [msp.identity] Verify -> DEBU e52 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:08.736 UTC [gossip.comm] func1 -> DEBU e53 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.737 UTC [gossip.comm] func1 -> DEBU e54 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.737 UTC [msp] DeserializeIdentity -> DEBU e55 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.737 UTC [gossip.gossip] handleMessage -> DEBU e56 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.737 UTC [gossip.gossip] handleMessage -> DEBU e57 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.737 UTC [msp] DeserializeIdentity -> DEBU e58 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.737 UTC [msp] DeserializeIdentity -> DEBU e59 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:08.737 UTC [gossip.gossip] handleMessage -> DEBU e5a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.737 UTC [gossip.gossip] handleMessage -> DEBU e5b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.738 UTC [msp.identity] Verify -> DEBU e5c Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:08.738 UTC [msp.identity] Verify -> DEBU e5d Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:08.738 UTC [gossip.gossip] handleMessage -> DEBU e5e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:08.738 UTC [gossip.gossip] handleMessage -> DEBU e5f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.738 UTC [gossip.pull] HandleMessage -> DEBU e60 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:08.744 UTC [gossip.pull] SendDigest -> DEBU e61 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:08.744 UTC [gossip.gossip] handleMessage -> DEBU e62 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.220 UTC [gossip.gossip] handleMessage -> DEBU e63 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.220 UTC [msp] DeserializeIdentity -> DEBU e64 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.220 UTC [msp] DeserializeIdentity -> DEBU e65 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.220 UTC [msp] DeserializeIdentity -> DEBU e66 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.220 UTC [gossip.gossip] handleMessage -> DEBU e67 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.220 UTC [gossip.gossip] handleMessage -> DEBU e68 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.220 UTC [msp] DeserializeIdentity -> DEBU e69 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.220 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:09.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e6b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e6c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [cauthdsl] func1 -> DEBU e70 0xc000487a60 gate 1569284709221173600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e71 0xc000487a60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e72 0xc000487a60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e73 0xc000487a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e74 0xc000487a60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [cauthdsl] func1 -> DEBU e75 0xc000487a60 gate 1569284709221173600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e76 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [cauthdsl] func1 -> DEBU e79 0xc0003ba2a0 gate 1569284709221568300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e7a 0xc0003ba2a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e7b 0xc0003ba2a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e7c 0xc0003ba2a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:09.235 UTC [gossip.comm] func1 -> DEBU e7d Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.248 UTC [msp.identity] Verify -> DEBU e7e Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:09.248 UTC [msp.identity] Verify -> DEBU e7f Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:09.249 UTC [cauthdsl] func2 -> DEBU e80 0xc0003ba2a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [cauthdsl] func1 -> DEBU e81 0xc0003ba2a0 gate 1569284709221568300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [policies] Evaluate -> DEBU e82 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [policies] Evaluate -> DEBU e83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [policies] Evaluate -> DEBU e84 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [policies] Evaluate -> DEBU e85 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [msp] DeserializeIdentity -> DEBU e86 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [gossip.gossip] handleMessage -> DEBU e87 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [gossip.gossip] handleMessage -> DEBU e88 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [msp] DeserializeIdentity -> DEBU e89 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e8a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e8b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:09.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e8c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e8d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e8e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e8f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [cauthdsl] func1 -> DEBU e90 0xc0003bbdb0 gate 1569284709251128300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [cauthdsl] func2 -> DEBU e91 0xc0003bbdb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [cauthdsl] func2 -> DEBU e92 0xc0003bbdb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [cauthdsl] func2 -> DEBU e93 0xc0003bbdb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [cauthdsl] func2 -> DEBU e94 0xc0003bbdb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [cauthdsl] func1 -> DEBU e95 0xc0003bbdb0 gate 1569284709251128300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e96 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:09.251 UTC [cauthdsl] func1 -> DEBU e99 0xc0003d6a10 gate 1569284709251502700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:09.257 UTC [cauthdsl] func2 -> DEBU e9a 0xc0003d6a10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:09.258 UTC [cauthdsl] func2 -> DEBU e9b 0xc0003d6a10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:09.258 UTC [cauthdsl] func2 -> DEBU e9c 0xc0003d6a10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:09.258 UTC [msp.identity] Verify -> DEBU e9d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:09.258 UTC [msp.identity] Verify -> DEBU e9e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:09.259 UTC [cauthdsl] func2 -> DEBU e9f 0xc0003d6a10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:09.259 UTC [cauthdsl] func1 -> DEBU ea0 0xc0003d6a10 gate 1569284709251502700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:09.259 UTC [policies] Evaluate -> DEBU ea1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.259 UTC [policies] Evaluate -> DEBU ea2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.259 UTC [policies] Evaluate -> DEBU ea3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.259 UTC [policies] Evaluate -> DEBU ea4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:09.259 UTC [msp] DeserializeIdentity -> DEBU ea5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.259 UTC [gossip.gossip] handleMessage -> DEBU ea6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.609 UTC [msp] GetDefaultSigningIdentity -> DEBU ea7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:09.610 UTC [msp.identity] Sign -> DEBU ea8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151017 " +peer0.org1.example.com | "2019-09-24 00:25:09.610 UTC [msp.identity] Sign -> DEBU ea9 Sign: digest: B9A2E193535DBD040AD7B23ED6BBDB3C2E20E76C65A548A9F15E9B12133AC1DB " +peer0.org1.example.com | "2019-09-24 00:25:09.610 UTC [msp] GetDefaultSigningIdentity -> DEBU eaa Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:09.610 UTC [msp.identity] Sign -> DEBU eab Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:09.610 UTC [msp.identity] Sign -> DEBU eac Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:09.610 UTC [gossip.discovery] periodicalSendAlive -> DEBU ead Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:09.617 UTC [msp] DeserializeIdentity -> DEBU eae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.618 UTC [msp] DeserializeIdentity -> DEBU eaf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.618 UTC [msp] DeserializeIdentity -> DEBU eb0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.619 UTC [gossip.comm] Send -> DEBU eb1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:09.619 UTC [msp] DeserializeIdentity -> DEBU eb2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.619 UTC [gossip.comm] Send -> DEBU eb3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:09.619 UTC [gossip.comm] Send -> DEBU eb4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:09.619 UTC [gossip.comm] sendToEndpoint -> DEBU eb5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.619 UTC [gossip.comm] sendToEndpoint -> DEBU eb6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.620 UTC [gossip.comm] sendToEndpoint -> DEBU eb7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.620 UTC [gossip.comm] sendToEndpoint -> DEBU eb8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.620 UTC [gossip.comm] sendToEndpoint -> DEBU eb9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.620 UTC [gossip.comm] sendToEndpoint -> DEBU eba Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.692 UTC [gossip.comm] func1 -> DEBU ebb Got message: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.692 UTC [gossip.gossip] handleMessage -> DEBU ebc Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.692 UTC [gossip.pull] HandleMessage -> DEBU ebd GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.692 UTC [msp] DeserializeIdentity -> DEBU ebe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.692 UTC [msp] DeserializeIdentity -> DEBU ebf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.692 UTC [gossip.gossip] handleMessage -> DEBU ec0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.692 UTC [gossip.pull] SendRes -> DEBU ec1 Sending 2 IDENTITY_MSG items to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:09.706 UTC [gossip.comm] func1 -> DEBU ec2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.706 UTC [gossip.gossip] handleMessage -> DEBU ec3 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.706 UTC [gossip.pull] HandleMessage -> DEBU ec4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.706 UTC [gossip.pull] SendDigest -> DEBU ec5 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:09.706 UTC [gossip.gossip] handleMessage -> DEBU ec6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.730 UTC [gossip.comm] func1 -> DEBU ec7 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" secret_envelope:HC\344\240\354/\236\235\202\347\030~x,8\002 (\370\321\366\246\3500U\177.\201#\332O\232\010\010\204\006\362\207\224\270 \r_. \307\"\3551" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.730 UTC [gossip.gossip] handleMessage -> DEBU ec8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" secret_envelope:HC\344\240\354/\236\235\202\347\030~x,8\002 (\370\321\366\246\3500U\177.\201#\332O\232\010\010\204\006\362\207\224\270 \r_. \307\"\3551" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.731 UTC [gossip.gossip] handleMessage -> DEBU ec9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.731 UTC [gossip.discovery] handleMsgFromComm -> DEBU eca Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" secret_envelope:HC\344\240\354/\236\235\202\347\030~x,8\002 (\370\321\366\246\3500U\177.\201#\332O\232\010\010\204\006\362\207\224\270 \r_. \307\"\3551" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.733 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ecb Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:09.736 UTC [msp.identity] Verify -> DEBU ecc Verify: digest = 00000000 57 61 06 dc fd 2b cc 9e c2 59 bf 13 9d 35 ee 7a |Wa...+...Y...5.z| +peer0.org1.example.com | 00000010 8c 6b 00 23 76 74 16 3d 45 be c5 c4 d5 8f 50 97 |.k.#vt.=E.....P.|" +peer0.org1.example.com | "2019-09-24 00:25:09.736 UTC [msp.identity] Verify -> DEBU ecd Verify: sig = 00000000 30 45 02 21 00 bf 4f 20 51 64 71 44 a7 8f b6 31 |0E.!..O QdqD...1| +peer0.org1.example.com | 00000010 49 f5 b7 6c 5a 4f dc ce 01 02 8d 20 19 51 d3 9f |I..lZO..... .Q..| +peer0.org1.example.com | 00000020 40 4c e4 d7 1f 02 20 34 90 fb c6 ea d9 cf 20 ad |@L.... 4...... .| +peer0.org1.example.com | 00000030 37 4f 7e 50 96 9d 0d f4 0e 00 17 37 89 1e 7c 4a |7O~P.......7..|J| +peer0.org1.example.com | 00000040 b1 56 d3 1d b1 2b fd |.V...+.|" +peer0.org1.example.com | "2019-09-24 00:25:09.736 UTC [msp.identity] Verify -> DEBU ece Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:09.736 UTC [msp.identity] Verify -> DEBU ecf Verify: sig = 00000000 30 45 02 21 00 bc d1 10 37 5b 15 bc 53 34 75 d9 |0E.!....7[..S4u.| +peer0.org1.example.com | 00000010 6b 8c d8 6f e8 3e 48 43 e4 a0 ec 2f 9e 9d 82 e7 |k..o.>HC.../....| +peer0.org1.example.com | 00000020 18 7e 78 2c 38 02 20 28 f8 d1 f6 a6 e8 30 55 7f |.~x,8. (.....0U.| +peer0.org1.example.com | 00000030 2e 81 23 da 4f 9a 08 08 84 06 f2 87 94 b8 20 0d |..#.O......... .| +peer0.org1.example.com | 00000040 5f 2e 20 c7 22 ed 31 |_. .".1|" +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.discovery] handleAliveMessage -> DEBU ed0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.discovery] learnExistingMembers -> DEBU ed1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.discovery] learnExistingMembers -> DEBU ed2 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.discovery] learnExistingMembers -> DEBU ed3 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.discovery] learnExistingMembers -> DEBU ed4 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.discovery] learnExistingMembers -> DEBU ed5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.discovery] handleAliveMessage -> DEBU ed6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.discovery] handleMsgFromComm -> DEBU ed7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.discovery] sendMemResponse -> DEBU ed8 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [msp] DeserializeIdentity -> DEBU ed9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [msp] DeserializeIdentity -> DEBU eda Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.comm] Send -> DEBU edb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.discovery] sendMemResponse -> DEBU edc Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" secret_envelope:HC\344\240\354/\236\235\202\347\030~x,8\002 (\370\321\366\246\3500U\177.\201#\332O\232\010\010\204\006\362\207\224\270 \r_. \307\"\3551" > > alive: " +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.comm] sendToEndpoint -> DEBU edd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:09.737 UTC [gossip.comm] sendToEndpoint -> DEBU ede Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.015 UTC [gossip.gossip] handleMessage -> DEBU edf Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.015 UTC [gossip.gossip] handleMessage -> DEBU ee0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU ee1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.015 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ee2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:10.016 UTC [msp] DeserializeIdentity -> DEBU ee3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.016 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ee4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:10.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ee5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:10.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ee6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:10.016 UTC [policies] Evaluate -> DEBU ee7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:10.016 UTC [policies] Evaluate -> DEBU ee8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:05.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1716 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:05.537 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1717 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2019-09-24 00:27:05.538 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1718 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.5µs " +orderer0.example.com | "2019-09-24 00:27:05.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1719 Sending msg of 28 bytes to 2 on channel businesschannel took 15.9µs" +orderer0.example.com | "2019-09-24 00:27:05.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 171a Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +orderer0.example.com | "2019-09-24 00:27:05.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 171b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109µs " +orderer0.example.com | "2019-09-24 00:27:05.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 171c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 575.9µs " +orderer0.example.com | "2019-09-24 00:27:05.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:05.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:06.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:06.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1720 Sending msg of 28 bytes to 3 on channel testchainid took 289.7µs" +orderer0.example.com | "2019-09-24 00:27:06.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1721 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 265.3µs " +orderer0.example.com | "2019-09-24 00:27:06.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1722 Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-09-24 00:27:06.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1723 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-09-24 00:27:06.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1724 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.8µs " +orderer0.example.com | "2019-09-24 00:27:06.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1725 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.9µs " +orderer0.example.com | "2019-09-24 00:27:06.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1726 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:06.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1727 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:06.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1728 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:06.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1729 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-09-24 00:27:06.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 172a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66µs " +orderer0.example.com | "2019-09-24 00:27:06.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 172b Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +orderer0.example.com | "2019-09-24 00:27:06.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 172c Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +orderer0.example.com | "2019-09-24 00:27:06.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 172d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.7µs " +orderer0.example.com | "2019-09-24 00:27:06.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 172e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 37.1µs " +orderer0.example.com | "2019-09-24 00:27:06.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 172f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:06.851 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1730 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:07.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1731 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:07.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1732 Sending msg of 28 bytes to 3 on channel testchainid took 97µs" +orderer0.example.com | "2019-09-24 00:27:07.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1733 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 214µs " +orderer0.example.com | "2019-09-24 00:27:07.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1734 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +orderer0.example.com | "2019-09-24 00:27:07.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1735 Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs" +orderer0.example.com | "2019-09-24 00:27:07.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1736 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.9µs " +orderer0.example.com | "2019-09-24 00:27:07.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1737 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67µs " +orderer0.example.com | "2019-09-24 00:27:07.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1738 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:07.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1739 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:07.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 173a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:07.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 173b Sending msg of 28 bytes to 3 on channel testchainid took 18µs" +orderer0.example.com | "2019-09-24 00:27:07.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 173c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.6µs " +orderer0.example.com | "2019-09-24 00:27:07.560 UTC [orderer.common.server] Deliver -> DEBU 173d Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:07.560 UTC [common.deliver] Handle -> DEBU 173e Starting new deliver loop for 172.18.0.9:32890" +orderer0.example.com | "2019-09-24 00:27:07.560 UTC [common.deliver] Handle -> DEBU 173f Attempting to read seek info message from 172.18.0.9:32890" +orderer0.example.com | "2019-09-24 00:27:07.562 UTC [policies] Evaluate -> DEBU 1740 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.562 UTC [policies] Evaluate -> DEBU 1741 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:07.562 UTC [policies] Evaluate -> DEBU 1742 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.562 UTC [policies] Evaluate -> DEBU 1743 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:07.563 UTC [policies] Evaluate -> DEBU 1744 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.563 UTC [msp] DeserializeIdentity -> DEBU 1745 Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:07.563 UTC [msp.identity] newIdentity -> DEBU 1746 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:07.564 UTC [cauthdsl] func1 -> DEBU 1747 0xc000b96720 gate 1569284827564668000 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:07.564 UTC [cauthdsl] func2 -> DEBU 1748 0xc000b96720 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:07.565 UTC [cauthdsl] func2 -> DEBU 1749 0xc000b96720 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:07.565 UTC [cauthdsl] func2 -> DEBU 174a 0xc000b96720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:07.565 UTC [cauthdsl] func2 -> DEBU 174b 0xc000b96720 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.565 UTC [cauthdsl] func1 -> DEBU 174c 0xc000b96720 gate 1569284827564668000 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.566 UTC [policies] Evaluate -> DEBU 174d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.566 UTC [policies] Evaluate -> DEBU 174e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.566 UTC [policies] Evaluate -> DEBU 174f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.566 UTC [cauthdsl] func1 -> DEBU 1750 0xc000b97860 gate 1569284827566920100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:07.567 UTC [cauthdsl] func2 -> DEBU 1751 0xc000b97860 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:07.567 UTC [cauthdsl] func2 -> DEBU 1752 0xc000b97860 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:07.567 UTC [cauthdsl] func2 -> DEBU 1753 0xc000b97860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:07.568 UTC [cauthdsl] func2 -> DEBU 1754 0xc000b97860 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.568 UTC [cauthdsl] func1 -> DEBU 1755 0xc000b97860 gate 1569284827566920100 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.568 UTC [policies] Evaluate -> DEBU 1756 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.568 UTC [policies] Evaluate -> DEBU 1757 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.569 UTC [policies] func1 -> DEBU 1758 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:07.569 UTC [policies] Evaluate -> DEBU 1759 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:07.569 UTC [policies] Evaluate -> DEBU 175a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:07.569 UTC [policies] Evaluate -> DEBU 175b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.569 UTC [policies] Evaluate -> DEBU 175c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:07.569 UTC [policies] Evaluate -> DEBU 175d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.570 UTC [cauthdsl] func1 -> DEBU 175e 0xc000c8a570 gate 1569284827570226000 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:07.570 UTC [cauthdsl] func2 -> DEBU 175f 0xc000c8a570 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:07.570 UTC [cauthdsl] func2 -> DEBU 1760 0xc000c8a570 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:07.571 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1761 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 00:27:07.571 UTC [msp] Validate -> DEBU 1762 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:27:07.572 UTC [cauthdsl] func2 -> DEBU 1763 0xc000c8a570 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:07.572 UTC [msp.identity] Verify -> DEBU 1764 Verify: digest = 00000000 c3 a7 c9 3c ae 8d 41 53 b7 0a d2 94 6c a2 e7 e7 |...<..AS....l...| +orderer0.example.com | 00000010 1a 3d 11 73 1f af 77 08 f0 78 f6 90 c7 3f 07 67 |.=.s..w..x...?.g|" +orderer0.example.com | "2019-09-24 00:27:07.572 UTC [msp.identity] Verify -> DEBU 1765 Verify: sig = 00000000 30 45 02 21 00 9c 00 ac 6a 7d 48 5d 07 ed 6d ff |0E.!....j}H]..m.| +orderer0.example.com | 00000010 c2 9c da 57 c3 08 fd 4c 01 86 17 ba ce 83 e1 e0 |...W...L........| +orderer0.example.com | 00000020 3b c0 0c 62 f2 02 20 7f c7 86 ad 07 9a 70 87 10 |;..b.. ......p..| +orderer0.example.com | 00000030 ac 22 82 13 0b 3f b2 b0 dd 86 27 45 9b eb fc ec |."...?....'E....| +orderer0.example.com | 00000040 15 ef 73 a6 2a de ed |..s.*..|" +orderer0.example.com | "2019-09-24 00:27:07.573 UTC [cauthdsl] func2 -> DEBU 1766 0xc000c8a570 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:07.573 UTC [cauthdsl] func1 -> DEBU 1767 0xc000c8a570 gate 1569284827570226000 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:07.573 UTC [policies] Evaluate -> DEBU 1768 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:07.574 UTC [policies] Evaluate -> DEBU 1769 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:07.574 UTC [policies] Evaluate -> DEBU 176a Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:07.574 UTC [policies] Evaluate -> DEBU 176b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:07.575 UTC [policies] Evaluate -> DEBU 176c Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:07.575 UTC [policies] Evaluate -> DEBU 176d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:07.575 UTC [common.deliver] deliverBlocks -> DEBU 176e [channel: businesschannel] Received seekInfo (0xc000cbb180) start: > stop: > from 172.18.0.9:32890" +orderer0.example.com | "2019-09-24 00:27:07.575 UTC [fsblkstorage] Next -> DEBU 176f Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 00:27:07.575 UTC [fsblkstorage] newBlockfileStream -> DEBU 1770 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79914]" +orderer0.example.com | "2019-09-24 00:27:07.576 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1771 Remaining bytes=[3992], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:07.576 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1772 Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[79914], bytesOffset=[79916]}" +orderer0.example.com | "2019-09-24 00:27:07.576 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1773 blockbytes [3990] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:07.576 UTC [common.deliver] deliverBlocks -> DEBU 1774 [channel: businesschannel] Delivering block for (0xc000cbb180) for 172.18.0.9:32890" +orderer0.example.com | "2019-09-24 00:27:07.577 UTC [common.deliver] deliverBlocks -> DEBU 1775 [channel: businesschannel] Done delivering to 172.18.0.9:32890 for (0xc000cbb180)" +orderer0.example.com | "2019-09-24 00:27:07.578 UTC [fsblkstorage] waitForBlock -> DEBU 1776 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 00:27:07.578 UTC [fsblkstorage] waitForBlock -> DEBU 1777 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 00:27:07.578 UTC [common.deliver] Handle -> DEBU 1778 Waiting for new SeekInfo from 172.18.0.9:32890" +orderer0.example.com | "2019-09-24 00:27:07.578 UTC [common.deliver] Handle -> DEBU 1779 Attempting to read seek info message from 172.18.0.9:32890" +orderer0.example.com | "2019-09-24 00:27:07.582 UTC [common.deliver] Handle -> WARN 177a Error reading from 172.18.0.9:32890: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:07.582 UTC [orderer.common.server] func1 -> DEBU 177b Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:07.582 UTC [comm.grpc.server] 1 -> INFO 177c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32890 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.9597ms +orderer0.example.com | "2019-09-24 00:27:07.583 UTC [grpc] infof -> DEBU 177d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:07.824 UTC [orderer.common.server] Deliver -> DEBU 177e Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:07.825 UTC [common.deliver] Handle -> DEBU 177f Starting new deliver loop for 172.18.0.9:32892" +orderer0.example.com | "2019-09-24 00:27:07.825 UTC [common.deliver] Handle -> DEBU 1780 Attempting to read seek info message from 172.18.0.9:32892" +orderer0.example.com | "2019-09-24 00:27:07.826 UTC [policies] Evaluate -> DEBU 1781 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.827 UTC [policies] Evaluate -> DEBU 1782 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:07.827 UTC [policies] Evaluate -> DEBU 1783 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.828 UTC [policies] Evaluate -> DEBU 1784 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:07.829 UTC [policies] Evaluate -> DEBU 1785 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.829 UTC [cauthdsl] func1 -> DEBU 1786 0xc00134a020 gate 1569284827829391300 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:07.829 UTC [cauthdsl] func2 -> DEBU 1787 0xc00134a020 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:07.830 UTC [cauthdsl] func2 -> DEBU 1788 0xc00134a020 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:07.830 UTC [cauthdsl] func2 -> DEBU 1789 0xc00134a020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:07.830 UTC [cauthdsl] func2 -> DEBU 178a 0xc00134a020 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.830 UTC [cauthdsl] func1 -> DEBU 178b 0xc00134a020 gate 1569284827829391300 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.830 UTC [policies] Evaluate -> DEBU 178c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.831 UTC [policies] Evaluate -> DEBU 178d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.831 UTC [policies] Evaluate -> DEBU 178e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.831 UTC [cauthdsl] func1 -> DEBU 178f 0xc00134a860 gate 1569284827831608100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:07.831 UTC [cauthdsl] func2 -> DEBU 1790 0xc00134a860 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:07.831 UTC [cauthdsl] func2 -> DEBU 1791 0xc00134a860 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:07.832 UTC [cauthdsl] func2 -> DEBU 1792 0xc00134a860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:07.832 UTC [cauthdsl] func2 -> DEBU 1793 0xc00134a860 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.832 UTC [cauthdsl] func1 -> DEBU 1794 0xc00134a860 gate 1569284827831608100 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.832 UTC [policies] Evaluate -> DEBU 1795 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.833 UTC [policies] Evaluate -> DEBU 1796 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.833 UTC [policies] func1 -> DEBU 1797 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:07.833 UTC [policies] Evaluate -> DEBU 1798 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:07.833 UTC [policies] Evaluate -> DEBU 1799 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:07.833 UTC [policies] Evaluate -> DEBU 179a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.834 UTC [policies] Evaluate -> DEBU 179b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:07.834 UTC [policies] Evaluate -> DEBU 179c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.834 UTC [cauthdsl] func1 -> DEBU 179d 0xc00134b550 gate 1569284827834421300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:10.016 UTC [policies] Evaluate -> DEBU ee9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:10.016 UTC [cauthdsl] func1 -> DEBU eea 0xc00256b210 gate 1569284710016876600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:10.016 UTC [cauthdsl] func2 -> DEBU eeb 0xc00256b210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:10.016 UTC [cauthdsl] func2 -> DEBU eec 0xc00256b210 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU eed 0xc00256b210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU eee 0xc00256b210 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [cauthdsl] func1 -> DEBU eef 0xc00256b210 gate 1569284710016876600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [policies] Evaluate -> DEBU ef0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [policies] Evaluate -> DEBU ef1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [policies] Evaluate -> DEBU ef2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [cauthdsl] func1 -> DEBU ef3 0xc00256ba50 gate 1569284710017336700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU ef4 0xc00256ba50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU ef5 0xc00256ba50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU ef6 0xc00256ba50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [msp.identity] Verify -> DEBU ef7 Verify: digest = 00000000 9e 72 d2 1a 5c f4 c7 a9 a6 cf 27 77 6b a2 88 df |.r..\.....'wk...| +peer0.org1.example.com | 00000010 83 21 b4 ad 75 00 f8 b8 2a 47 54 80 82 99 28 1c |.!..u...*GT...(.|" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [msp.identity] Verify -> DEBU ef8 Verify: sig = 00000000 30 44 02 20 4a cf 3f 01 9a a5 7e 59 0c c1 38 3f |0D. J.?...~Y..8?| +peer0.org1.example.com | 00000010 d9 ae 02 a9 d0 ea 83 a5 40 7c ab 82 a2 7c fe 1b |........@|...|..| +peer0.org1.example.com | 00000020 19 86 40 da 02 20 04 dd ec 61 07 cf 34 14 54 fb |..@.. ...a..4.T.| +peer0.org1.example.com | 00000030 65 82 13 86 12 a0 ac cc c8 2a 94 1e c1 a8 15 0d |e........*......| +peer0.org1.example.com | 00000040 bd 27 4a df 8c 79 |.'J..y|" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU ef9 0xc00256ba50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:10.017 UTC [cauthdsl] func1 -> DEBU efa 0xc00256ba50 gate 1569284710017336700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [policies] Evaluate -> DEBU efb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [policies] Evaluate -> DEBU efc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [policies] Evaluate -> DEBU efd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [policies] Evaluate -> DEBU efe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [gossip.discovery] handleAliveMessage -> DEBU eff Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [gossip.discovery] learnExistingMembers -> DEBU f00 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [gossip.discovery] learnExistingMembers -> DEBU f01 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [gossip.discovery] learnExistingMembers -> DEBU f02 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [gossip.discovery] learnExistingMembers -> DEBU f03 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [gossip.discovery] learnExistingMembers -> DEBU f04 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [gossip.discovery] handleAliveMessage -> DEBU f05 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.018 UTC [gossip.discovery] handleMsgFromComm -> DEBU f06 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.019 UTC [gossip.comm] func1 -> DEBU f07 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.019 UTC [gossip.gossip] handleMessage -> DEBU f08 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.019 UTC [gossip.gossip] handleMessage -> DEBU f09 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU f0a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU f0b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f0d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f0e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f0f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f10 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f11 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f12 Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:07.834 UTC [cauthdsl] func2 -> DEBU 179e 0xc00134b550 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:07.834 UTC [cauthdsl] func2 -> DEBU 179f 0xc00134b550 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:07.835 UTC [cauthdsl] func2 -> DEBU 17a0 0xc00134b550 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:07.835 UTC [msp.identity] Verify -> DEBU 17a1 Verify: digest = 00000000 dd 73 b6 52 c7 f6 63 97 df 12 80 3c 6e 6b 32 d2 |.s.R..c.... DEBU 17a2 Verify: sig = 00000000 30 45 02 21 00 c5 82 c2 57 23 37 3c e1 2d aa 21 |0E.!....W#7<.-.!| +orderer0.example.com | 00000010 92 17 67 87 f0 16 08 38 19 19 92 c1 78 a7 96 8f |..g....8....x...| +orderer0.example.com | 00000020 83 04 f7 24 fe 02 20 4b f2 35 eb cc 1b 90 7f e3 |...$.. K.5......| +orderer0.example.com | 00000030 ab 94 a7 f2 95 52 b9 79 8b 06 fb 40 0c 20 56 ef |.....R.y...@. V.| +orderer0.example.com | 00000040 bb 3d 9d 03 d6 bf e3 |.=.....|" +orderer0.example.com | "2019-09-24 00:27:07.836 UTC [cauthdsl] func2 -> DEBU 17a3 0xc00134b550 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:07.836 UTC [cauthdsl] func1 -> DEBU 17a4 0xc00134b550 gate 1569284827834421300 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:07.836 UTC [policies] Evaluate -> DEBU 17a5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:07.836 UTC [policies] Evaluate -> DEBU 17a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:07.836 UTC [policies] Evaluate -> DEBU 17a7 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:07.837 UTC [policies] Evaluate -> DEBU 17a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:07.837 UTC [policies] Evaluate -> DEBU 17a9 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:07.837 UTC [policies] Evaluate -> DEBU 17aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:07.838 UTC [common.deliver] deliverBlocks -> DEBU 17ab [channel: businesschannel] Received seekInfo (0xc00088d5c0) start: > stop: > from 172.18.0.9:32892" +orderer0.example.com | "2019-09-24 00:27:07.839 UTC [fsblkstorage] Next -> DEBU 17ac Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 00:27:07.839 UTC [fsblkstorage] newBlockfileStream -> DEBU 17ad newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79914]" +orderer0.example.com | "2019-09-24 00:27:07.839 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17ae Remaining bytes=[3992], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:07.839 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17af Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[79914], bytesOffset=[79916]}" +orderer0.example.com | "2019-09-24 00:27:07.839 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b0 blockbytes [3990] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:07.840 UTC [common.deliver] deliverBlocks -> DEBU 17b1 [channel: businesschannel] Delivering block for (0xc00088d5c0) for 172.18.0.9:32892" +orderer0.example.com | "2019-09-24 00:27:07.840 UTC [common.deliver] deliverBlocks -> DEBU 17b2 [channel: businesschannel] Done delivering to 172.18.0.9:32892 for (0xc00088d5c0)" +orderer0.example.com | "2019-09-24 00:27:07.840 UTC [common.deliver] Handle -> DEBU 17b3 Waiting for new SeekInfo from 172.18.0.9:32892" +orderer0.example.com | "2019-09-24 00:27:07.840 UTC [common.deliver] Handle -> DEBU 17b4 Attempting to read seek info message from 172.18.0.9:32892" +orderer0.example.com | "2019-09-24 00:27:07.840 UTC [fsblkstorage] waitForBlock -> DEBU 17b5 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 00:27:07.840 UTC [fsblkstorage] waitForBlock -> DEBU 17b6 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 00:27:07.841 UTC [policies] Evaluate -> DEBU 17b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.842 UTC [policies] Evaluate -> DEBU 17b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:07.842 UTC [policies] Evaluate -> DEBU 17b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.842 UTC [policies] Evaluate -> DEBU 17ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:07.842 UTC [policies] Evaluate -> DEBU 17bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.842 UTC [cauthdsl] func1 -> DEBU 17bc 0xc00136cd50 gate 1569284827842975100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17bd 0xc00136cd50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17be 0xc00136cd50 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17bf 0xc00136cd50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17c0 0xc00136cd50 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [cauthdsl] func1 -> DEBU 17c1 0xc00136cd50 gate 1569284827842975100 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [policies] Evaluate -> DEBU 17c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [policies] Evaluate -> DEBU 17c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [policies] Evaluate -> DEBU 17c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [cauthdsl] func1 -> DEBU 17c5 0xc00136d590 gate 1569284827843575500 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17c6 0xc00136d590 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17c7 0xc00136d590 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17c8 0xc00136d590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17c9 0xc00136d590 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.843 UTC [cauthdsl] func1 -> DEBU 17ca 0xc00136d590 gate 1569284827843575500 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17cb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] func1 -> DEBU 17cd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17ce Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.021 UTC [gossip.comm] Send -> DEBU f13 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:10.021 UTC [msp] DeserializeIdentity -> DEBU f14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.021 UTC [gossip.comm] Send -> DEBU f15 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:10.021 UTC [gossip.comm] sendToEndpoint -> DEBU f16 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.021 UTC [gossip.comm] sendToEndpoint -> DEBU f17 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.021 UTC [gossip.comm] sendToEndpoint -> DEBU f18 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.021 UTC [gossip.comm] sendToEndpoint -> DEBU f19 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.149 UTC [gossip.comm] func1 -> DEBU f1a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.150 UTC [gossip.gossip] handleMessage -> DEBU f1b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.150 UTC [msp] DeserializeIdentity -> DEBU f1c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.150 UTC [msp] DeserializeIdentity -> DEBU f1d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.150 UTC [msp] DeserializeIdentity -> DEBU f1e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.150 UTC [gossip.gossip] handleMessage -> DEBU f1f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.167 UTC [gossip.comm] func1 -> DEBU f20 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [gossip.gossip] handleMessage -> DEBU f21 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [msp] DeserializeIdentity -> DEBU f22 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f23 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f24 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f25 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f26 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f27 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f28 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [cauthdsl] func1 -> DEBU f29 0xc0003e3de0 gate 1569284710168603700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [cauthdsl] func2 -> DEBU f2a 0xc0003e3de0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [cauthdsl] func2 -> DEBU f2b 0xc0003e3de0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [cauthdsl] func2 -> DEBU f2c 0xc0003e3de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [cauthdsl] func2 -> DEBU f2d 0xc0003e3de0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17d2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [cauthdsl] func1 -> DEBU 17d3 0xc000ab4280 gate 1569284827844382300 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [cauthdsl] func2 -> DEBU 17d4 0xc000ab4280 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [cauthdsl] func2 -> DEBU 17d5 0xc000ab4280 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [cauthdsl] func2 -> DEBU 17d6 0xc000ab4280 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [msp.identity] Verify -> DEBU 17d7 Verify: digest = 00000000 9e e2 b8 02 e5 6a d4 18 a1 d8 cb 96 22 52 d8 27 |.....j......"R.'| +orderer0.example.com | 00000010 21 fb 30 7c 65 4b 76 0f ac d8 ff 18 fa 7e 08 60 |!.0|eKv......~.`|" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [msp.identity] Verify -> DEBU 17d8 Verify: sig = 00000000 30 45 02 21 00 83 7b 1f dc eb fd 30 e6 1e c2 f9 |0E.!..{....0....| +orderer0.example.com | 00000010 a5 a5 c9 e9 16 56 da e6 bd 4c c5 34 a3 6e 60 8b |.....V...L.4.n`.| +orderer0.example.com | 00000020 2b 7b f9 f5 4f 02 20 34 9d 43 19 84 75 06 13 4f |+{..O. 4.C..u..O| +orderer0.example.com | 00000030 14 b7 f0 15 3f 86 8e 63 b1 81 a5 06 3a fb 04 e4 |....?..c....:...| +orderer0.example.com | 00000040 f6 91 65 59 23 d4 8d |..eY#..|" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [cauthdsl] func2 -> DEBU 17d9 0xc000ab4280 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [cauthdsl] func1 -> DEBU 17da 0xc000ab4280 gate 1569284827844382300 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17db Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17dc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17dd Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17df Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:07.844 UTC [common.deliver] deliverBlocks -> DEBU 17e1 [channel: businesschannel] Received seekInfo (0xc000cbb940) start: > stop: > from 172.18.0.9:32892" +orderer0.example.com | "2019-09-24 00:27:07.845 UTC [fsblkstorage] Next -> DEBU 17e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 00:27:07.845 UTC [fsblkstorage] newBlockfileStream -> DEBU 17e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47641]" +orderer0.example.com | "2019-09-24 00:27:07.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17e4 Remaining bytes=[36265], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:07.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17e5 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47641], bytesOffset=[47644]}" +orderer0.example.com | "2019-09-24 00:27:07.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17e6 blockbytes [23747] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:07.845 UTC [common.deliver] deliverBlocks -> DEBU 17e7 [channel: businesschannel] Delivering block for (0xc000cbb940) for 172.18.0.9:32892" +orderer0.example.com | "2019-09-24 00:27:07.845 UTC [common.deliver] deliverBlocks -> DEBU 17e8 [channel: businesschannel] Done delivering to 172.18.0.9:32892 for (0xc000cbb940)" +orderer0.example.com | "2019-09-24 00:27:07.845 UTC [common.deliver] Handle -> DEBU 17e9 Waiting for new SeekInfo from 172.18.0.9:32892" +orderer0.example.com | "2019-09-24 00:27:07.845 UTC [common.deliver] Handle -> DEBU 17ea Attempting to read seek info message from 172.18.0.9:32892" +orderer0.example.com | "2019-09-24 00:27:07.845 UTC [fsblkstorage] waitForBlock -> DEBU 17eb Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 00:27:07.845 UTC [fsblkstorage] waitForBlock -> DEBU 17ec Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 00:27:07.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ed Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +orderer0.example.com | "2019-09-24 00:27:07.850 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ee Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +orderer0.example.com | "2019-09-24 00:27:07.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 269.7µs " +orderer0.example.com | "2019-09-24 00:27:07.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 188.8µs " +orderer0.example.com | "2019-09-24 00:27:07.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:07.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:07.871 UTC [common.deliver] Handle -> WARN 17f3 Error reading from 172.18.0.9:32892: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:07.871 UTC [grpc] infof -> DEBU 17f4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:07.872 UTC [orderer.common.server] func1 -> DEBU 17f5 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:07.873 UTC [comm.grpc.server] 1 -> INFO 17f6 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32892 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=48.141ms +orderer0.example.com | "2019-09-24 00:27:08.001 UTC [orderer.common.server] Deliver -> DEBU 17f7 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:08.001 UTC [common.deliver] Handle -> DEBU 17f8 Starting new deliver loop for 172.18.0.9:32894" +orderer0.example.com | "2019-09-24 00:27:08.002 UTC [common.deliver] Handle -> DEBU 17f9 Attempting to read seek info message from 172.18.0.9:32894" +orderer0.example.com | "2019-09-24 00:27:08.003 UTC [policies] Evaluate -> DEBU 17fa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.003 UTC [policies] Evaluate -> DEBU 17fb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.004 UTC [policies] Evaluate -> DEBU 17fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.004 UTC [policies] Evaluate -> DEBU 17fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.004 UTC [policies] Evaluate -> DEBU 17fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [cauthdsl] func1 -> DEBU f2e 0xc0003e3de0 gate 1569284710168603700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f2f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f30 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f31 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [cauthdsl] func1 -> DEBU f32 0xc002590640 gate 1569284710168944200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:10.168 UTC [cauthdsl] func2 -> DEBU f33 0xc002590640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [cauthdsl] func2 -> DEBU f34 0xc002590640 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [cauthdsl] func2 -> DEBU f35 0xc002590640 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [msp.identity] Verify -> DEBU f36 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [msp.identity] Verify -> DEBU f37 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [cauthdsl] func2 -> DEBU f38 0xc002590640 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [cauthdsl] func1 -> DEBU f39 0xc002590640 gate 1569284710168944200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [policies] Evaluate -> DEBU f3a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [policies] Evaluate -> DEBU f3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [policies] Evaluate -> DEBU f3c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [policies] Evaluate -> DEBU f3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [msp] DeserializeIdentity -> DEBU f3e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.169 UTC [gossip.gossip] handleMessage -> DEBU f3f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.624 UTC [gossip.comm] func1 -> DEBU f40 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [gossip.gossip] handleMessage -> DEBU f41 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [gossip.gossip] handleMessage -> DEBU f42 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU f43 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f44 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [msp] DeserializeIdentity -> DEBU f45 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f47 Got policy manager for channel [businesschannel] with flag [true]" +orderer0.example.com | "2019-09-24 00:27:08.004 UTC [cauthdsl] func1 -> DEBU 17ff 0xc00135f600 gate 1569284828004688800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.004 UTC [cauthdsl] func2 -> DEBU 1800 0xc00135f600 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.005 UTC [cauthdsl] func2 -> DEBU 1801 0xc00135f600 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.005 UTC [cauthdsl] func2 -> DEBU 1802 0xc00135f600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.005 UTC [cauthdsl] func2 -> DEBU 1803 0xc00135f600 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.006 UTC [cauthdsl] func1 -> DEBU 1804 0xc00135f600 gate 1569284828004688800 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.006 UTC [policies] Evaluate -> DEBU 1805 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.006 UTC [policies] Evaluate -> DEBU 1806 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.006 UTC [policies] Evaluate -> DEBU 1807 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.007 UTC [cauthdsl] func1 -> DEBU 1808 0xc00135fe40 gate 1569284828007137800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.007 UTC [cauthdsl] func2 -> DEBU 1809 0xc00135fe40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.007 UTC [cauthdsl] func2 -> DEBU 180a 0xc00135fe40 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.007 UTC [cauthdsl] func2 -> DEBU 180b 0xc00135fe40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.008 UTC [cauthdsl] func2 -> DEBU 180c 0xc00135fe40 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.008 UTC [cauthdsl] func1 -> DEBU 180d 0xc00135fe40 gate 1569284828007137800 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.009 UTC [policies] Evaluate -> DEBU 180e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.009 UTC [policies] Evaluate -> DEBU 180f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.009 UTC [policies] func1 -> DEBU 1810 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:08.010 UTC [policies] Evaluate -> DEBU 1811 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.010 UTC [policies] Evaluate -> DEBU 1812 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.011 UTC [policies] Evaluate -> DEBU 1813 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.011 UTC [policies] Evaluate -> DEBU 1814 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.011 UTC [policies] Evaluate -> DEBU 1815 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.011 UTC [cauthdsl] func1 -> DEBU 1816 0xc001044b30 gate 1569284828011757800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.012 UTC [cauthdsl] func2 -> DEBU 1817 0xc001044b30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.012 UTC [cauthdsl] func2 -> DEBU 1818 0xc001044b30 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.012 UTC [cauthdsl] func2 -> DEBU 1819 0xc001044b30 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:08.012 UTC [msp.identity] Verify -> DEBU 181a Verify: digest = 00000000 7e dc bb a5 c0 07 2d 8f 98 82 64 db 47 a2 be b1 |~.....-...d.G...| +orderer0.example.com | 00000010 cd b2 3e b8 ac 93 df 65 a6 10 74 bd 93 fc 78 81 |..>....e..t...x.|" +orderer0.example.com | "2019-09-24 00:27:08.013 UTC [msp.identity] Verify -> DEBU 181b Verify: sig = 00000000 30 45 02 21 00 c7 f1 6c 5a b6 af f6 29 ad ef 65 |0E.!...lZ...)..e| +orderer0.example.com | 00000010 dc 84 e4 0e 54 5a b8 6f d8 d0 ed ea a8 d9 e3 81 |....TZ.o........| +orderer0.example.com | 00000020 f6 19 ee 6d 3d 02 20 27 52 12 d2 e7 18 df af cd |...m=. 'R.......| +orderer0.example.com | 00000030 fc 77 8a 51 48 97 8a 76 a0 f5 94 2e 47 33 28 6b |.w.QH..v....G3(k| +orderer0.example.com | 00000040 ae cf 98 e1 61 37 d1 |....a7.|" +orderer0.example.com | "2019-09-24 00:27:08.013 UTC [cauthdsl] func2 -> DEBU 181c 0xc001044b30 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:08.014 UTC [cauthdsl] func1 -> DEBU 181d 0xc001044b30 gate 1569284828011757800 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:08.014 UTC [policies] Evaluate -> DEBU 181e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:08.014 UTC [policies] Evaluate -> DEBU 181f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:08.014 UTC [policies] Evaluate -> DEBU 1820 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:08.014 UTC [policies] Evaluate -> DEBU 1821 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:08.015 UTC [policies] Evaluate -> DEBU 1822 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.015 UTC [policies] Evaluate -> DEBU 1823 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.015 UTC [common.deliver] deliverBlocks -> DEBU 1824 [channel: businesschannel] Received seekInfo (0xc00088d880) start: > stop: > from 172.18.0.9:32894" +orderer0.example.com | "2019-09-24 00:27:08.016 UTC [fsblkstorage] Next -> DEBU 1825 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 00:27:08.016 UTC [fsblkstorage] newBlockfileStream -> DEBU 1826 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:27:08.016 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1827 Remaining bytes=[83906], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:08.016 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1828 Returning blockbytes - length=[23945], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:27:08.017 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1829 blockbytes [23945] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:08.017 UTC [common.deliver] deliverBlocks -> DEBU 182a [channel: businesschannel] Delivering block for (0xc00088d880) for 172.18.0.9:32894" +orderer0.example.com | "2019-09-24 00:27:08.017 UTC [common.deliver] deliverBlocks -> DEBU 182b [channel: businesschannel] Done delivering to 172.18.0.9:32894 for (0xc00088d880)" +orderer0.example.com | "2019-09-24 00:27:08.018 UTC [common.deliver] Handle -> DEBU 182c Waiting for new SeekInfo from 172.18.0.9:32894" +orderer0.example.com | "2019-09-24 00:27:08.018 UTC [fsblkstorage] waitForBlock -> DEBU 182d Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 00:27:08.018 UTC [fsblkstorage] waitForBlock -> DEBU 182e Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 00:27:08.018 UTC [common.deliver] Handle -> DEBU 182f Attempting to read seek info message from 172.18.0.9:32894" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f48 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [policies] Evaluate -> DEBU f49 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [policies] Evaluate -> DEBU f4a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [policies] Evaluate -> DEBU f4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [cauthdsl] func1 -> DEBU f4c 0xc0025a03e0 gate 1569284710625775200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [cauthdsl] func2 -> DEBU f4d 0xc0025a03e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [cauthdsl] func2 -> DEBU f4e 0xc0025a03e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:10.625 UTC [cauthdsl] func2 -> DEBU f4f 0xc0025a03e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [cauthdsl] func2 -> DEBU f50 0xc0025a03e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [cauthdsl] func1 -> DEBU f51 0xc0025a03e0 gate 1569284710625775200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f52 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [cauthdsl] func1 -> DEBU f55 0xc0025a0c20 gate 1569284710626152500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [cauthdsl] func2 -> DEBU f56 0xc0025a0c20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [cauthdsl] func2 -> DEBU f57 0xc0025a0c20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [cauthdsl] func2 -> DEBU f58 0xc0025a0c20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [msp.identity] Verify -> DEBU f59 Verify: digest = 00000000 4b 48 73 60 fc b8 38 25 10 9a 45 58 35 93 28 11 |KHs`..8%..EX5.(.| +peer0.org1.example.com | 00000010 8b af 71 be 42 ba f0 91 79 2d 82 41 9d cf 87 7f |..q.B...y-.A....|" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [msp.identity] Verify -> DEBU f5a Verify: sig = 00000000 30 45 02 21 00 8e f5 01 e5 2f 84 92 34 75 c7 fe |0E.!...../..4u..| +peer0.org1.example.com | 00000010 cf 27 c3 80 7f 44 af 19 6a 87 76 b9 97 0c a9 26 |.'...D..j.v....&| +peer0.org1.example.com | 00000020 38 1e 1e c3 e7 02 20 09 97 77 d3 8e 8f eb 3f 8e |8..... ..w....?.| +peer0.org1.example.com | 00000030 63 a0 03 81 19 3d 07 31 6c 91 b5 1a 86 00 f0 77 |c....=.1l......w| +peer0.org1.example.com | 00000040 dc f7 a6 bf 55 50 47 |....UPG|" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [cauthdsl] func2 -> DEBU f5b 0xc0025a0c20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [cauthdsl] func1 -> DEBU f5c 0xc0025a0c20 gate 1569284710626152500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f5f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [gossip.discovery] handleAliveMessage -> DEBU f61 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [gossip.discovery] learnExistingMembers -> DEBU f62 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [gossip.discovery] learnExistingMembers -> DEBU f63 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:10.626 UTC [gossip.discovery] learnExistingMembers -> DEBU f64 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:10.627 UTC [gossip.discovery] learnExistingMembers -> DEBU f65 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:10.627 UTC [gossip.discovery] learnExistingMembers -> DEBU f66 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.627 UTC [gossip.discovery] handleAliveMessage -> DEBU f67 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU f68 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.629 UTC [msp] DeserializeIdentity -> DEBU f69 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.629 UTC [msp] DeserializeIdentity -> DEBU f6a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.631 UTC [msp] DeserializeIdentity -> DEBU f6b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.631 UTC [msp] DeserializeIdentity -> DEBU f6c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.631 UTC [msp] DeserializeIdentity -> DEBU f6d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.631 UTC [msp] DeserializeIdentity -> DEBU f6e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.632 UTC [msp] DeserializeIdentity -> DEBU f6f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.632 UTC [gossip.comm] Send -> DEBU f70 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:10.632 UTC [msp] DeserializeIdentity -> DEBU f71 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:10.632 UTC [gossip.comm] Send -> DEBU f72 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +orderer0.example.com | "2019-09-24 00:27:08.032 UTC [grpc] warningf -> DEBU 1830 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:32894: read: connection reset by peer" +orderer0.example.com | "2019-09-24 00:27:08.033 UTC [common.deliver] Handle -> WARN 1831 Error reading from 172.18.0.9:32894: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:08.033 UTC [orderer.common.server] func1 -> DEBU 1832 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:08.033 UTC [comm.grpc.server] 1 -> INFO 1833 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32894 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.7096ms +orderer0.example.com | "2019-09-24 00:27:08.035 UTC [grpc] infof -> DEBU 1834 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:08.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1835 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:08.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1836 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.9µs " +orderer0.example.com | "2019-09-24 00:27:08.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1837 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2019-09-24 00:27:08.213 UTC [orderer.common.server] Deliver -> DEBU 1838 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:08.214 UTC [common.deliver] Handle -> DEBU 1839 Starting new deliver loop for 172.18.0.9:32896" +orderer0.example.com | "2019-09-24 00:27:08.215 UTC [common.deliver] Handle -> DEBU 183a Attempting to read seek info message from 172.18.0.9:32896" +orderer0.example.com | "2019-09-24 00:27:08.215 UTC [policies] Evaluate -> DEBU 183b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.215 UTC [policies] Evaluate -> DEBU 183c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.215 UTC [policies] Evaluate -> DEBU 183d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.216 UTC [policies] Evaluate -> DEBU 183e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.216 UTC [policies] Evaluate -> DEBU 183f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.216 UTC [cauthdsl] func1 -> DEBU 1840 0xc000bbf110 gate 1569284828216245900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.216 UTC [cauthdsl] func2 -> DEBU 1841 0xc000bbf110 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.216 UTC [cauthdsl] func2 -> DEBU 1842 0xc000bbf110 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.216 UTC [cauthdsl] func2 -> DEBU 1843 0xc000bbf110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.216 UTC [cauthdsl] func2 -> DEBU 1844 0xc000bbf110 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.216 UTC [cauthdsl] func1 -> DEBU 1845 0xc000bbf110 gate 1569284828216245900 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.216 UTC [policies] Evaluate -> DEBU 1846 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.216 UTC [policies] Evaluate -> DEBU 1847 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.217 UTC [policies] Evaluate -> DEBU 1848 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.217 UTC [cauthdsl] func1 -> DEBU 1849 0xc000bbf950 gate 1569284828217116900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.217 UTC [cauthdsl] func2 -> DEBU 184a 0xc000bbf950 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.217 UTC [cauthdsl] func2 -> DEBU 184b 0xc000bbf950 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.217 UTC [cauthdsl] func2 -> DEBU 184c 0xc000bbf950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.217 UTC [cauthdsl] func2 -> DEBU 184d 0xc000bbf950 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.217 UTC [cauthdsl] func1 -> DEBU 184e 0xc000bbf950 gate 1569284828217116900 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.217 UTC [policies] Evaluate -> DEBU 184f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.217 UTC [policies] Evaluate -> DEBU 1850 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.217 UTC [policies] func1 -> DEBU 1851 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:08.217 UTC [policies] Evaluate -> DEBU 1852 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.218 UTC [policies] Evaluate -> DEBU 1853 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.218 UTC [policies] Evaluate -> DEBU 1854 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.218 UTC [policies] Evaluate -> DEBU 1855 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.218 UTC [policies] Evaluate -> DEBU 1856 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.218 UTC [cauthdsl] func1 -> DEBU 1857 0xc000f30640 gate 1569284828218471900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.218 UTC [cauthdsl] func2 -> DEBU 1858 0xc000f30640 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.218 UTC [cauthdsl] func2 -> DEBU 1859 0xc000f30640 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.219 UTC [cauthdsl] func2 -> DEBU 185a 0xc000f30640 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:08.219 UTC [msp.identity] Verify -> DEBU 185b Verify: digest = 00000000 5c 47 11 77 5e 52 88 77 a4 b5 4f 69 d8 eb 40 33 |\G.w^R.w..Oi..@3| +orderer0.example.com | 00000010 85 ca 10 1a 8c 0c 4c b4 6d 14 39 67 6e 20 d1 3a |......L.m.9gn .:|" +orderer0.example.com | "2019-09-24 00:27:08.219 UTC [msp.identity] Verify -> DEBU 185c Verify: sig = 00000000 30 45 02 21 00 c4 0d 78 99 71 95 77 a3 a6 b1 75 |0E.!...x.q.w...u| +orderer0.example.com | 00000010 8b 35 ff bc 53 e4 72 6e 36 92 93 22 9e da 32 5b |.5..S.rn6.."..2[| +orderer0.example.com | 00000020 59 8c e0 9e c0 02 20 4f 27 6b b6 90 8c 0e 6e e4 |Y..... O'k....n.| +orderer0.example.com | 00000030 87 44 57 bc 85 f6 90 4a 81 55 d8 18 f7 7a a6 b5 |.DW....J.U...z..| +orderer0.example.com | 00000040 7a 08 41 87 90 27 e6 |z.A..'.|" +orderer0.example.com | "2019-09-24 00:27:08.219 UTC [cauthdsl] func2 -> DEBU 185d 0xc000f30640 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:08.219 UTC [cauthdsl] func1 -> DEBU 185e 0xc000f30640 gate 1569284828218471900 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:08.219 UTC [policies] Evaluate -> DEBU 185f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:08.219 UTC [policies] Evaluate -> DEBU 1860 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:08.220 UTC [policies] Evaluate -> DEBU 1861 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 00:25:10.632 UTC [gossip.comm] sendToEndpoint -> DEBU f73 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.632 UTC [gossip.comm] sendToEndpoint -> DEBU f74 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.632 UTC [gossip.comm] sendToEndpoint -> DEBU f76 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.632 UTC [gossip.comm] sendToEndpoint -> DEBU f75 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.641 UTC [gossip.gossip] handleMessage -> DEBU f77 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.641 UTC [gossip.gossip] handleMessage -> DEBU f78 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.641 UTC [gossip.discovery] handleMsgFromComm -> DEBU f79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.641 UTC [gossip.discovery] handleMsgFromComm -> DEBU f7a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.680 UTC [gossip.comm] func1 -> DEBU f7b Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.680 UTC [gossip.gossip] handleMessage -> DEBU f7c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.680 UTC [gossip.pull] HandleMessage -> DEBU f7d GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:10.680 UTC [gossip.gossip] handleMessage -> DEBU f7e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:10.680 UTC [gossip.pull] SendRes -> DEBU f7f Sending 1 IDENTITY_MSG items to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:11.588 UTC [gossip.pull] Hello -> DEBU f80 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:11.588 UTC [gossip.comm] Send -> DEBU f81 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:11.588 UTC [gossip.pull] Hello -> DEBU f82 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:11.588 UTC [gossip.comm] Send -> DEBU f83 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:11.588 UTC [gossip.pull] Hello -> DEBU f84 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:11.589 UTC [gossip.comm] Send -> DEBU f85 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f86 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f87 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f88 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f89 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f8a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f8b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.589 UTC [gossip.comm] func1 -> DEBU f8c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.590 UTC [gossip.gossip] handleMessage -> DEBU f8d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.590 UTC [gossip.pull] HandleMessage -> DEBU f8e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.590 UTC [gossip.gossip] handleMessage -> DEBU f8f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.590 UTC [gossip.gossip] handleMessage -> DEBU f90 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 00:27:08.220 UTC [policies] Evaluate -> DEBU 1862 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:08.220 UTC [policies] Evaluate -> DEBU 1863 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.220 UTC [policies] Evaluate -> DEBU 1864 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.220 UTC [common.deliver] deliverBlocks -> DEBU 1865 [channel: businesschannel] Received seekInfo (0xc00088dfc0) start: > stop: > from 172.18.0.9:32896" +orderer0.example.com | "2019-09-24 00:27:08.220 UTC [fsblkstorage] Next -> DEBU 1866 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 00:27:08.220 UTC [fsblkstorage] newBlockfileStream -> DEBU 1867 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23948]" +orderer0.example.com | "2019-09-24 00:27:08.220 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1868 Remaining bytes=[59958], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:08.220 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1869 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23948], bytesOffset=[23951]}" +orderer0.example.com | "2019-09-24 00:27:08.221 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186a blockbytes [23690] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:08.221 UTC [common.deliver] deliverBlocks -> DEBU 186b [channel: businesschannel] Delivering block for (0xc00088dfc0) for 172.18.0.9:32896" +orderer0.example.com | "2019-09-24 00:27:08.221 UTC [common.deliver] deliverBlocks -> DEBU 186c [channel: businesschannel] Done delivering to 172.18.0.9:32896 for (0xc00088dfc0)" +orderer0.example.com | "2019-09-24 00:27:08.221 UTC [fsblkstorage] waitForBlock -> DEBU 186d Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 00:27:08.222 UTC [fsblkstorage] waitForBlock -> DEBU 186e Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 00:27:08.222 UTC [common.deliver] Handle -> DEBU 186f Waiting for new SeekInfo from 172.18.0.9:32896" +orderer0.example.com | "2019-09-24 00:27:08.222 UTC [common.deliver] Handle -> DEBU 1870 Attempting to read seek info message from 172.18.0.9:32896" +orderer0.example.com | "2019-09-24 00:27:08.230 UTC [grpc] infof -> DEBU 1871 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:08.230 UTC [common.deliver] Handle -> WARN 1872 Error reading from 172.18.0.9:32896: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:08.230 UTC [orderer.common.server] func1 -> DEBU 1873 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:08.230 UTC [comm.grpc.server] 1 -> INFO 1874 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32896 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.0237ms +orderer0.example.com | "2019-09-24 00:27:08.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1875 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +orderer0.example.com | "2019-09-24 00:27:08.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1876 Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +orderer0.example.com | "2019-09-24 00:27:08.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1877 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.2µs " +orderer0.example.com | "2019-09-24 00:27:08.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1878 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 170.8µs " +orderer0.example.com | "2019-09-24 00:27:08.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1879 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:08.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 187a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:08.387 UTC [orderer.common.server] Deliver -> DEBU 187b Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:08.387 UTC [common.deliver] Handle -> DEBU 187c Starting new deliver loop for 172.18.0.9:32898" +orderer0.example.com | "2019-09-24 00:27:08.388 UTC [common.deliver] Handle -> DEBU 187d Attempting to read seek info message from 172.18.0.9:32898" +orderer0.example.com | "2019-09-24 00:27:08.389 UTC [policies] Evaluate -> DEBU 187e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.389 UTC [policies] Evaluate -> DEBU 187f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.389 UTC [policies] Evaluate -> DEBU 1880 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.390 UTC [policies] Evaluate -> DEBU 1881 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.390 UTC [policies] Evaluate -> DEBU 1882 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.390 UTC [cauthdsl] func1 -> DEBU 1883 0xc000dce340 gate 1569284828390676500 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.390 UTC [cauthdsl] func2 -> DEBU 1884 0xc000dce340 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.391 UTC [cauthdsl] func2 -> DEBU 1885 0xc000dce340 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.391 UTC [cauthdsl] func2 -> DEBU 1886 0xc000dce340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.391 UTC [cauthdsl] func2 -> DEBU 1887 0xc000dce340 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.391 UTC [cauthdsl] func1 -> DEBU 1888 0xc000dce340 gate 1569284828390676500 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.392 UTC [policies] Evaluate -> DEBU 1889 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.392 UTC [policies] Evaluate -> DEBU 188a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.392 UTC [policies] Evaluate -> DEBU 188b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.392 UTC [cauthdsl] func1 -> DEBU 188c 0xc000dceb80 gate 1569284828392583200 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.392 UTC [cauthdsl] func2 -> DEBU 188d 0xc000dceb80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.393 UTC [cauthdsl] func2 -> DEBU 188e 0xc000dceb80 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.393 UTC [cauthdsl] func2 -> DEBU 188f 0xc000dceb80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.393 UTC [cauthdsl] func2 -> DEBU 1890 0xc000dceb80 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.394 UTC [cauthdsl] func1 -> DEBU 1891 0xc000dceb80 gate 1569284828392583200 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.394 UTC [policies] Evaluate -> DEBU 1892 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:11.591 UTC [gossip.comm] func1 -> DEBU f91 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.592 UTC [gossip.pull] HandleMessage -> DEBU f92 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.592 UTC [gossip.gossip] handleMessage -> DEBU f93 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.592 UTC [gossip.gossip] handleMessage -> DEBU f94 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.593 UTC [gossip.pull] HandleMessage -> DEBU f95 GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.593 UTC [gossip.gossip] handleMessage -> DEBU f96 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.611 UTC [msp] GetDefaultSigningIdentity -> DEBU f97 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:11.611 UTC [msp.identity] Sign -> DEBU f98 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151018 " +peer0.org1.example.com | "2019-09-24 00:25:11.612 UTC [msp.identity] Sign -> DEBU f99 Sign: digest: F67F7C35E08E4704650CFFBF1E4D9CDA984C7869B74E50137FF90D908800971C " +peer0.org1.example.com | "2019-09-24 00:25:11.612 UTC [msp] GetDefaultSigningIdentity -> DEBU f9a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:11.612 UTC [msp.identity] Sign -> DEBU f9b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:11.612 UTC [msp.identity] Sign -> DEBU f9c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:11.612 UTC [gossip.comm] Send -> DEBU f9d Entering, sending GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:11.612 UTC [msp] DeserializeIdentity -> DEBU f9e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:11.613 UTC [gossip.comm] Send -> DEBU f9f Entering, sending GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:11.613 UTC [msp] DeserializeIdentity -> DEBU fa0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:11.613 UTC [gossip.comm] Send -> DEBU fa1 Entering, sending GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:11.613 UTC [gossip.comm] sendToEndpoint -> DEBU fa2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.613 UTC [gossip.comm] sendToEndpoint -> DEBU fa3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.613 UTC [gossip.comm] sendToEndpoint -> DEBU fa4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.613 UTC [gossip.comm] sendToEndpoint -> DEBU fa5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.614 UTC [gossip.comm] sendToEndpoint -> DEBU fa6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.614 UTC [gossip.comm] sendToEndpoint -> DEBU fa7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.617 UTC [gossip.gossip] handleMessage -> DEBU fa8 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.617 UTC [gossip.gossip] handleMessage -> DEBU fa9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU faa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.618 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fab Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:11.619 UTC [gossip.comm] func1 -> DEBU fac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.619 UTC [gossip.gossip] handleMessage -> DEBU fad Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.619 UTC [msp.identity] Verify -> DEBU fae Verify: digest = 00000000 f6 7f 7c 35 e0 8e 47 04 65 0c ff bf 1e 4d 9c da |..|5..G.e....M..| +peer0.org1.example.com | 00000010 98 4c 78 69 b7 4e 50 13 7f f9 0d 90 88 00 97 1c |.Lxi.NP.........|" +peer0.org1.example.com | "2019-09-24 00:25:11.620 UTC [msp.identity] Verify -> DEBU faf Verify: sig = 00000000 30 44 02 20 74 bf 0e b8 7e de 4e 2e 65 be 35 47 |0D. t...~.N.e.5G| +peer0.org1.example.com | 00000010 62 06 6d c0 3e 47 b3 1a 67 0b 83 fe f0 2e 69 50 |b.m.>G..g.....iP| +peer0.org1.example.com | 00000020 9f 85 84 16 02 20 5c 7d 00 eb 53 80 2a 4e e2 7e |..... \}..S.*N.~| +peer0.org1.example.com | 00000030 9c be 8c 87 4b 82 27 f7 3b 8b 75 43 b9 ee f7 22 |....K.'.;.uC..."| +peer0.org1.example.com | 00000040 c2 e3 68 6d 3f 47 |..hm?G|" +peer0.org1.example.com | "2019-09-24 00:25:11.620 UTC [gossip.comm] func1 -> DEBU fb0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.621 UTC [gossip.discovery] handleAliveMessage -> DEBU fb1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.621 UTC [gossip.discovery] isSentByMe -> DEBU fb2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.621 UTC [gossip.discovery] handleAliveMessage -> DEBU fb3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.621 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fb4 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:11.628 UTC [msp.identity] Verify -> DEBU fb5 Verify: digest = 00000000 57 61 06 dc fd 2b cc 9e c2 59 bf 13 9d 35 ee 7a |Wa...+...Y...5.z| +peer0.org1.example.com | 00000010 8c 6b 00 23 76 74 16 3d 45 be c5 c4 d5 8f 50 97 |.k.#vt.=E.....P.|" +peer0.org1.example.com | "2019-09-24 00:25:11.628 UTC [msp.identity] Verify -> DEBU fb6 Verify: sig = 00000000 30 45 02 21 00 bf 4f 20 51 64 71 44 a7 8f b6 31 |0E.!..O QdqD...1| +peer0.org1.example.com | 00000010 49 f5 b7 6c 5a 4f dc ce 01 02 8d 20 19 51 d3 9f |I..lZO..... .Q..| +peer0.org1.example.com | 00000020 40 4c e4 d7 1f 02 20 34 90 fb c6 ea d9 cf 20 ad |@L.... 4...... .| +peer0.org1.example.com | 00000030 37 4f 7e 50 96 9d 0d f4 0e 00 17 37 89 1e 7c 4a |7O~P.......7..|J| +peer0.org1.example.com | 00000040 b1 56 d3 1d b1 2b fd |.V...+.|" +peer0.org1.example.com | "2019-09-24 00:25:11.628 UTC [gossip.discovery] handleAliveMessage -> DEBU fb7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.628 UTC [gossip.discovery] handleAliveMessage -> DEBU fb8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.629 UTC [gossip.gossip] handleMessage -> DEBU fba Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.629 UTC [gossip.gossip] handleMessage -> DEBU fbb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU fbc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.629 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fbd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:11.630 UTC [msp.identity] Verify -> DEBU fbe Verify: digest = 00000000 f6 7f 7c 35 e0 8e 47 04 65 0c ff bf 1e 4d 9c da |..|5..G.e....M..| +peer0.org1.example.com | 00000010 98 4c 78 69 b7 4e 50 13 7f f9 0d 90 88 00 97 1c |.Lxi.NP.........|" +peer0.org1.example.com | "2019-09-24 00:25:11.630 UTC [msp.identity] Verify -> DEBU fbf Verify: sig = 00000000 30 44 02 20 74 bf 0e b8 7e de 4e 2e 65 be 35 47 |0D. t...~.N.e.5G| +peer0.org1.example.com | 00000010 62 06 6d c0 3e 47 b3 1a 67 0b 83 fe f0 2e 69 50 |b.m.>G..g.....iP| +peer0.org1.example.com | 00000020 9f 85 84 16 02 20 5c 7d 00 eb 53 80 2a 4e e2 7e |..... \}..S.*N.~| +peer0.org1.example.com | 00000030 9c be 8c 87 4b 82 27 f7 3b 8b 75 43 b9 ee f7 22 |....K.'.;.uC..."| +peer0.org1.example.com | 00000040 c2 e3 68 6d 3f 47 |..hm?G|" +peer0.org1.example.com | "2019-09-24 00:25:11.630 UTC [msp.identity] Verify -> DEBU fc0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:11.630 UTC [msp.identity] Verify -> DEBU fc1 Verify: sig = 00000000 30 44 02 20 12 60 f4 bf 4d 44 2e bb 38 fb 35 de |0D. .`..MD..8.5.| +peer0.org1.example.com | 00000010 f5 eb 21 e6 52 a4 a7 24 c7 82 c3 f5 af 2b d3 b9 |..!.R..$.....+..| +peer0.org1.example.com | 00000020 68 61 fa 20 02 20 24 08 ef b7 02 05 09 74 b7 86 |ha. . $......t..| +peer0.org1.example.com | 00000030 93 09 f3 65 9e 77 bb f3 fe 94 01 fd 71 c8 69 61 |...e.w......q.ia| +peer0.org1.example.com | 00000040 af 51 92 ed 78 37 |.Q..x7|" +peer0.org1.example.com | "2019-09-24 00:25:11.630 UTC [gossip.discovery] handleAliveMessage -> DEBU fc2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.630 UTC [gossip.discovery] isSentByMe -> DEBU fc3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.631 UTC [gossip.discovery] handleAliveMessage -> DEBU fc4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.631 UTC [gossip.discovery] handleMsgFromComm -> DEBU fc5 Exiting" +orderer0.example.com | "2019-09-24 00:27:08.394 UTC [policies] Evaluate -> DEBU 1893 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.394 UTC [policies] func1 -> DEBU 1894 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:08.395 UTC [policies] Evaluate -> DEBU 1895 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.395 UTC [policies] Evaluate -> DEBU 1896 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.395 UTC [policies] Evaluate -> DEBU 1897 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.396 UTC [policies] Evaluate -> DEBU 1898 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.396 UTC [policies] Evaluate -> DEBU 1899 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.396 UTC [cauthdsl] func1 -> DEBU 189a 0xc000dcf870 gate 1569284828396485400 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.396 UTC [cauthdsl] func2 -> DEBU 189b 0xc000dcf870 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.397 UTC [cauthdsl] func2 -> DEBU 189c 0xc000dcf870 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.397 UTC [cauthdsl] func2 -> DEBU 189d 0xc000dcf870 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:08.398 UTC [msp.identity] Verify -> DEBU 189e Verify: digest = 00000000 d6 b5 2f 0a cd c1 e8 a2 51 54 86 56 16 75 25 47 |../.....QT.V.u%G| +orderer0.example.com | 00000010 da 7d 1c 83 4f a3 ae 49 81 0d 02 20 a8 4b d0 4d |.}..O..I... .K.M|" +orderer0.example.com | "2019-09-24 00:27:08.398 UTC [msp.identity] Verify -> DEBU 189f Verify: sig = 00000000 30 44 02 20 2c 98 4a c5 49 fa de 48 58 49 a1 03 |0D. ,.J.I..HXI..| +orderer0.example.com | 00000010 7f b8 59 53 29 f6 24 1e 05 9c 67 c5 1d d8 08 91 |..YS).$...g.....| +orderer0.example.com | 00000020 9e fc 7d 0e 02 20 41 64 c2 5f b1 50 d5 f3 41 43 |..}.. Ad._.P..AC| +orderer0.example.com | 00000030 be 96 8f ba aa a0 81 ae f7 c2 fe a3 b0 aa d1 e0 |................| +orderer0.example.com | 00000040 2a 2d 7e b3 56 d6 |*-~.V.|" +orderer0.example.com | "2019-09-24 00:27:08.398 UTC [cauthdsl] func2 -> DEBU 18a0 0xc000dcf870 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:08.399 UTC [cauthdsl] func1 -> DEBU 18a1 0xc000dcf870 gate 1569284828396485400 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:08.399 UTC [policies] Evaluate -> DEBU 18a2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:08.399 UTC [policies] Evaluate -> DEBU 18a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:08.399 UTC [policies] Evaluate -> DEBU 18a4 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:08.400 UTC [policies] Evaluate -> DEBU 18a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:08.400 UTC [policies] Evaluate -> DEBU 18a6 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.400 UTC [policies] Evaluate -> DEBU 18a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.400 UTC [common.deliver] deliverBlocks -> DEBU 18a8 [channel: businesschannel] Received seekInfo (0xc000b3e780) start: > stop: > from 172.18.0.9:32898" +orderer0.example.com | "2019-09-24 00:27:08.401 UTC [fsblkstorage] Next -> DEBU 18a9 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 00:27:08.401 UTC [fsblkstorage] newBlockfileStream -> DEBU 18aa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47641]" +orderer0.example.com | "2019-09-24 00:27:08.401 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ab Remaining bytes=[36265], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:08.402 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ac Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47641], bytesOffset=[47644]}" +orderer0.example.com | "2019-09-24 00:27:08.402 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ad blockbytes [23747] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:08.403 UTC [common.deliver] deliverBlocks -> DEBU 18ae [channel: businesschannel] Delivering block for (0xc000b3e780) for 172.18.0.9:32898" +orderer0.example.com | "2019-09-24 00:27:08.403 UTC [common.deliver] deliverBlocks -> DEBU 18af [channel: businesschannel] Done delivering to 172.18.0.9:32898 for (0xc000b3e780)" +orderer0.example.com | "2019-09-24 00:27:08.404 UTC [fsblkstorage] waitForBlock -> DEBU 18b0 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 00:27:08.404 UTC [fsblkstorage] waitForBlock -> DEBU 18b1 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 00:27:08.404 UTC [common.deliver] Handle -> DEBU 18b2 Waiting for new SeekInfo from 172.18.0.9:32898" +orderer0.example.com | "2019-09-24 00:27:08.404 UTC [common.deliver] Handle -> DEBU 18b3 Attempting to read seek info message from 172.18.0.9:32898" +orderer0.example.com | "2019-09-24 00:27:08.410 UTC [grpc] infof -> DEBU 18b4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:08.411 UTC [common.deliver] Handle -> WARN 18b5 Error reading from 172.18.0.9:32898: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:08.411 UTC [orderer.common.server] func1 -> DEBU 18b6 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:08.412 UTC [comm.grpc.server] 1 -> INFO 18b7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32898 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.6194ms +orderer0.example.com | "2019-09-24 00:27:08.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18b8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:08.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18b9 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +orderer0.example.com | "2019-09-24 00:27:08.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 313.5µs " +orderer0.example.com | "2019-09-24 00:27:08.547 UTC [orderer.common.server] Deliver -> DEBU 18bb Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:08.547 UTC [common.deliver] Handle -> DEBU 18bc Starting new deliver loop for 172.18.0.9:32900" +orderer0.example.com | "2019-09-24 00:27:08.547 UTC [common.deliver] Handle -> DEBU 18bd Attempting to read seek info message from 172.18.0.9:32900" +orderer0.example.com | "2019-09-24 00:27:08.549 UTC [policies] Evaluate -> DEBU 18be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.549 UTC [policies] Evaluate -> DEBU 18bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.550 UTC [policies] Evaluate -> DEBU 18c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.551 UTC [policies] Evaluate -> DEBU 18c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.552 UTC [policies] Evaluate -> DEBU 18c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:11.631 UTC [gossip.gossip] handleMessage -> DEBU fc6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.631 UTC [gossip.discovery] handleMsgFromComm -> DEBU fc7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.631 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fc8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:11.632 UTC [msp.identity] Verify -> DEBU fc9 Verify: digest = 00000000 f6 7f 7c 35 e0 8e 47 04 65 0c ff bf 1e 4d 9c da |..|5..G.e....M..| +peer0.org1.example.com | 00000010 98 4c 78 69 b7 4e 50 13 7f f9 0d 90 88 00 97 1c |.Lxi.NP.........|" +peer0.org1.example.com | "2019-09-24 00:25:11.632 UTC [msp.identity] Verify -> DEBU fca Verify: sig = 00000000 30 44 02 20 74 bf 0e b8 7e de 4e 2e 65 be 35 47 |0D. t...~.N.e.5G| +peer0.org1.example.com | 00000010 62 06 6d c0 3e 47 b3 1a 67 0b 83 fe f0 2e 69 50 |b.m.>G..g.....iP| +peer0.org1.example.com | 00000020 9f 85 84 16 02 20 5c 7d 00 eb 53 80 2a 4e e2 7e |..... \}..S.*N.~| +peer0.org1.example.com | 00000030 9c be 8c 87 4b 82 27 f7 3b 8b 75 43 b9 ee f7 22 |....K.'.;.uC..."| +peer0.org1.example.com | 00000040 c2 e3 68 6d 3f 47 |..hm?G|" +peer0.org1.example.com | "2019-09-24 00:25:11.632 UTC [gossip.discovery] handleAliveMessage -> DEBU fcb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.632 UTC [gossip.discovery] isSentByMe -> DEBU fcc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.632 UTC [gossip.discovery] handleAliveMessage -> DEBU fcd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.632 UTC [gossip.discovery] handleMsgFromComm -> DEBU fce Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.957 UTC [gossip.gossip] handleMessage -> DEBU fcf Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.957 UTC [gossip.pull] HandleMessage -> DEBU fd0 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.957 UTC [msp] DeserializeIdentity -> DEBU fd1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:11.957 UTC [msp] DeserializeIdentity -> DEBU fd2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:11.957 UTC [msp] DeserializeIdentity -> DEBU fd3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:11.957 UTC [msp] DeserializeIdentity -> DEBU fd4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:11.958 UTC [gossip.pull] SendDigest -> DEBU fd5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:11.958 UTC [gossip.gossip] handleMessage -> DEBU fd6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.972 UTC [gossip.gossip] handleMessage -> DEBU fd7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.972 UTC [gossip.gossip] handleMessage -> DEBU fd8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU fd9 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.972 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fda Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:11.972 UTC [msp] DeserializeIdentity -> DEBU fdb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:11.973 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fdc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +orderer0.example.com | "2019-09-24 00:27:08.552 UTC [cauthdsl] func1 -> DEBU 18c3 0xc00118df80 gate 1569284828552316200 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.552 UTC [cauthdsl] func2 -> DEBU 18c4 0xc00118df80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.552 UTC [cauthdsl] func2 -> DEBU 18c5 0xc00118df80 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.553 UTC [cauthdsl] func2 -> DEBU 18c6 0xc00118df80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.553 UTC [cauthdsl] func2 -> DEBU 18c7 0xc00118df80 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.553 UTC [cauthdsl] func1 -> DEBU 18c8 0xc00118df80 gate 1569284828552316200 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.553 UTC [policies] Evaluate -> DEBU 18c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.553 UTC [policies] Evaluate -> DEBU 18ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.554 UTC [policies] Evaluate -> DEBU 18cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.554 UTC [cauthdsl] func1 -> DEBU 18cc 0xc00089e7c0 gate 1569284828554367200 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.554 UTC [cauthdsl] func2 -> DEBU 18cd 0xc00089e7c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.554 UTC [cauthdsl] func2 -> DEBU 18ce 0xc00089e7c0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.555 UTC [cauthdsl] func2 -> DEBU 18cf 0xc00089e7c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.555 UTC [cauthdsl] func2 -> DEBU 18d0 0xc00089e7c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.555 UTC [cauthdsl] func1 -> DEBU 18d1 0xc00089e7c0 gate 1569284828554367200 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.555 UTC [policies] Evaluate -> DEBU 18d2 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.556 UTC [policies] Evaluate -> DEBU 18d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.556 UTC [policies] func1 -> DEBU 18d4 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:08.556 UTC [policies] Evaluate -> DEBU 18d5 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.557 UTC [policies] Evaluate -> DEBU 18d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.557 UTC [policies] Evaluate -> DEBU 18d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.557 UTC [policies] Evaluate -> DEBU 18d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.558 UTC [policies] Evaluate -> DEBU 18d9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.558 UTC [cauthdsl] func1 -> DEBU 18da 0xc00089f4b0 gate 1569284828558208600 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.558 UTC [cauthdsl] func2 -> DEBU 18db 0xc00089f4b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.558 UTC [cauthdsl] func2 -> DEBU 18dc 0xc00089f4b0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.558 UTC [cauthdsl] func2 -> DEBU 18dd 0xc00089f4b0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:08.559 UTC [msp.identity] Verify -> DEBU 18de Verify: digest = 00000000 c2 54 0f 70 e2 99 58 5a e2 4f 6e a4 43 89 3f 2c |.T.p..XZ.On.C.?,| +orderer0.example.com | 00000010 4b d0 6e 68 fc 50 30 85 4e 23 1f 75 23 e6 9e 92 |K.nh.P0.N#.u#...|" +orderer0.example.com | "2019-09-24 00:27:08.559 UTC [msp.identity] Verify -> DEBU 18df Verify: sig = 00000000 30 45 02 21 00 c1 60 8d 37 54 75 83 ae 67 df 4f |0E.!..`.7Tu..g.O| +orderer0.example.com | 00000010 f2 21 18 56 d7 48 52 0d e7 1a a8 61 18 72 1e 27 |.!.V.HR....a.r.'| +orderer0.example.com | 00000020 bc 67 79 1c 03 02 20 68 55 97 9b 22 7d 97 f2 fa |.gy... hU.."}...| +orderer0.example.com | 00000030 b6 cf 8e 6f 39 25 a8 04 97 84 dc ae 06 e5 29 71 |...o9%........)q| +orderer0.example.com | 00000040 3f 35 ad 78 cc fc 89 |?5.x...|" +orderer0.example.com | "2019-09-24 00:27:08.559 UTC [cauthdsl] func2 -> DEBU 18e0 0xc00089f4b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:08.559 UTC [cauthdsl] func1 -> DEBU 18e1 0xc00089f4b0 gate 1569284828558208600 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e4 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e6 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.561 UTC [common.deliver] deliverBlocks -> DEBU 18e8 [channel: businesschannel] Received seekInfo (0xc000b3ee40) start: > stop: > from 172.18.0.9:32900" +orderer0.example.com | "2019-09-24 00:27:08.561 UTC [fsblkstorage] Next -> DEBU 18e9 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 00:27:08.561 UTC [fsblkstorage] newBlockfileStream -> DEBU 18ea newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71391]" +orderer0.example.com | "2019-09-24 00:27:08.561 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18eb Remaining bytes=[12515], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:08.561 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ec Returning blockbytes - length=[4529], placementInfo={fileNum=[0], startOffset=[71391], bytesOffset=[71393]}" +orderer0.example.com | "2019-09-24 00:27:08.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ed blockbytes [4529] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:08.562 UTC [common.deliver] deliverBlocks -> DEBU 18ee [channel: businesschannel] Delivering block for (0xc000b3ee40) for 172.18.0.9:32900" +orderer0.example.com | "2019-09-24 00:27:08.562 UTC [common.deliver] deliverBlocks -> DEBU 18ef [channel: businesschannel] Done delivering to 172.18.0.9:32900 for (0xc000b3ee40)" +peer0.org1.example.com | "2019-09-24 00:25:11.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fdd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:11.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fde Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:11.973 UTC [policies] Evaluate -> DEBU fdf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:11.973 UTC [policies] Evaluate -> DEBU fe0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:11.973 UTC [policies] Evaluate -> DEBU fe1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:11.973 UTC [cauthdsl] func1 -> DEBU fe2 0xc002758b70 gate 1569284711973536400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fe3 0xc002758b70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fe4 0xc002758b70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fe5 0xc002758b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fe6 0xc002758b70 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [cauthdsl] func1 -> DEBU fe7 0xc002758b70 gate 1569284711973536400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [policies] Evaluate -> DEBU fe8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [policies] Evaluate -> DEBU fe9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [policies] Evaluate -> DEBU fea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [cauthdsl] func1 -> DEBU feb 0xc0027593b0 gate 1569284711974595300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fec 0xc0027593b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fed 0xc0027593b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fee 0xc0027593b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:11.974 UTC [msp.identity] Verify -> DEBU fef Verify: digest = 00000000 19 49 48 11 29 aa b8 5b 6a d0 46 ec 68 7f 36 d3 |.IH.)..[j.F.h.6.| +peer0.org1.example.com | 00000010 7a e8 33 cc 39 18 05 cb 3a cf 88 f3 d4 b2 de 4b |z.3.9...:......K|" +peer0.org1.example.com | "2019-09-24 00:25:11.975 UTC [msp.identity] Verify -> DEBU ff0 Verify: sig = 00000000 30 45 02 21 00 f3 f2 9e 59 25 f2 ee ad d2 b7 83 |0E.!....Y%......| +peer0.org1.example.com | 00000010 7a 80 c3 1a fd 60 c5 e0 5d 0d 27 d7 44 69 07 52 |z....`..].'.Di.R| +peer0.org1.example.com | 00000020 97 f4 4d c4 f7 02 20 23 07 7c bd a0 d8 80 ee 8c |..M... #.|......| +peer0.org1.example.com | 00000030 f9 bd 5d ba 66 06 dd b9 6e bc e4 2f 16 ee 40 7f |..].f...n../..@.| +peer0.org1.example.com | 00000040 6e 28 08 38 54 76 4d |n(.8TvM|" +peer0.org1.example.com | "2019-09-24 00:25:11.975 UTC [cauthdsl] func2 -> DEBU ff1 0xc0027593b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:11.975 UTC [cauthdsl] func1 -> DEBU ff2 0xc0027593b0 gate 1569284711974595300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:11.975 UTC [policies] Evaluate -> DEBU ff3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:11.975 UTC [policies] Evaluate -> DEBU ff4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:11.975 UTC [policies] Evaluate -> DEBU ff5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:11.975 UTC [policies] Evaluate -> DEBU ff6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:11.976 UTC [gossip.discovery] handleAliveMessage -> DEBU ff7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.976 UTC [gossip.discovery] learnExistingMembers -> DEBU ff8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:11.976 UTC [gossip.discovery] learnExistingMembers -> DEBU ff9 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:11.976 UTC [gossip.discovery] learnExistingMembers -> DEBU ffa Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:11.976 UTC [gossip.discovery] learnExistingMembers -> DEBU ffb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:11.983 UTC [gossip.discovery] learnExistingMembers -> DEBU ffc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.983 UTC [gossip.discovery] handleAliveMessage -> DEBU ffd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.983 UTC [gossip.discovery] sendMemResponse -> DEBU ffe Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:11.983 UTC [msp] DeserializeIdentity -> DEBU fff Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:11.983 UTC [msp] DeserializeIdentity -> DEBU 1000 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:11.983 UTC [msp] DeserializeIdentity -> DEBU 1001 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:11.983 UTC [gossip.comm] Send -> DEBU 1002 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:11.984 UTC [gossip.discovery] sendMemResponse -> DEBU 1003 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:11.984 UTC [gossip.comm] sendToEndpoint -> DEBU 1004 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:11.984 UTC [gossip.comm] sendToEndpoint -> DEBU 1005 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:11.983 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1006 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.184 UTC [msp] DeserializeIdentity -> DEBU 1007 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.184 UTC [msp] DeserializeIdentity -> DEBU 1008 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.184 UTC [gossip.comm] Send -> DEBU 1009 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:12.184 UTC [gossip.comm] sendToEndpoint -> DEBU 100a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.184 UTC [gossip.comm] sendToEndpoint -> DEBU 100b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.185 UTC [gossip.comm] sendToEndpoint -> DEBU 100c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.185 UTC [gossip.comm] sendToEndpoint -> DEBU 100d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.185 UTC [gossip.comm] sendToEndpoint -> DEBU 100e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.185 UTC [gossip.comm] sendToEndpoint -> DEBU 100f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.186 UTC [gossip.comm] func1 -> DEBU 1010 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 551 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.186 UTC [gossip.gossip] handleMessage -> DEBU 1011 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 551 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.187 UTC [msp.identity] Verify -> DEBU 1012 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:12.187 UTC [msp.identity] Verify -> DEBU 1013 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:12.187 UTC [msp.identity] Verify -> DEBU 1014 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:12.187 UTC [msp.identity] Verify -> DEBU 1015 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:12.187 UTC [msp] DeserializeIdentity -> DEBU 1016 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.187 UTC [msp] DeserializeIdentity -> DEBU 1017 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1018 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1019 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 101a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 101b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 101c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 101d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [cauthdsl] func1 -> DEBU 101e 0xc002a2e4d0 gate 1569284712188506100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 101f 0xc002a2e4d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 1020 0xc002a2e4d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 1021 0xc002a2e4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 1022 0xc002a2e4d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [cauthdsl] func1 -> DEBU 1023 0xc002a2e4d0 gate 1569284712188506100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 1024 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 1025 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 1026 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [cauthdsl] func1 -> DEBU 1027 0xc002a2ee00 gate 1569284712188831900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 1028 0xc002a2ee00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 1029 0xc002a2ee00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 102a 0xc002a2ee00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [msp.identity] Verify -> DEBU 102b Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [msp.identity] Verify -> DEBU 102c Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [cauthdsl] func2 -> DEBU 102d 0xc002a2ee00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [cauthdsl] func1 -> DEBU 102e 0xc002a2ee00 gate 1569284712188831900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [policies] Evaluate -> DEBU 102f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [policies] Evaluate -> DEBU 1030 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [policies] Evaluate -> DEBU 1031 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [policies] Evaluate -> DEBU 1032 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [gossip.gossip] handleMessage -> DEBU 1033 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [gossip.gossip] handleMessage -> DEBU 1034 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [msp] DeserializeIdentity -> DEBU 1035 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [msp] DeserializeIdentity -> DEBU 1036 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.189 UTC [msp] DeserializeIdentity -> DEBU 1037 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1038 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1039 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 103a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 103b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 103c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 103d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func1 -> DEBU 103e 0xc002aa49e0 gate 1569284712190369000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 103f 0xc002aa49e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 1040 0xc002aa49e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 1041 0xc002aa49e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 1042 0xc002aa49e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func1 -> DEBU 1043 0xc002aa49e0 gate 1569284712190369000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 1044 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 1045 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 1046 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func1 -> DEBU 1047 0xc002aa5220 gate 1569284712190651300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 1048 0xc002aa5220 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 1049 0xc002aa5220 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 104a 0xc002aa5220 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [msp.identity] Verify -> DEBU 104b Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [msp.identity] Verify -> DEBU 104c Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 104d 0xc002aa5220 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.190 UTC [cauthdsl] func1 -> DEBU 104e 0xc002aa5220 gate 1569284712190651300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:12.191 UTC [policies] Evaluate -> DEBU 104f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.191 UTC [policies] Evaluate -> DEBU 1050 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.191 UTC [policies] Evaluate -> DEBU 1051 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.191 UTC [policies] Evaluate -> DEBU 1052 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.195 UTC [msp.identity] Verify -> DEBU 1053 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:12.195 UTC [msp.identity] Verify -> DEBU 1054 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [msp.identity] Verify -> DEBU 1055 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [msp.identity] Verify -> DEBU 1056 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [msp] DeserializeIdentity -> DEBU 1057 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [msp] DeserializeIdentity -> DEBU 1058 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1059 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 105a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 105b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [policies] Evaluate -> DEBU 105c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [policies] Evaluate -> DEBU 105d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [policies] Evaluate -> DEBU 105e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [cauthdsl] func1 -> DEBU 105f 0xc002b479d0 gate 1569284712196783500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [cauthdsl] func2 -> DEBU 1060 0xc002b479d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [cauthdsl] func2 -> DEBU 1061 0xc002b479d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [cauthdsl] func2 -> DEBU 1062 0xc002b479d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [cauthdsl] func2 -> DEBU 1063 0xc002b479d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.196 UTC [cauthdsl] func1 -> DEBU 1064 0xc002b479d0 gate 1569284712196783500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1065 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1066 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1067 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [cauthdsl] func1 -> DEBU 1068 0xc002bda210 gate 1569284712197111900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [cauthdsl] func2 -> DEBU 1069 0xc002bda210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [cauthdsl] func2 -> DEBU 106a 0xc002bda210 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [cauthdsl] func2 -> DEBU 106b 0xc002bda210 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [msp.identity] Verify -> DEBU 106c Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [msp.identity] Verify -> DEBU 106d Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [cauthdsl] func2 -> DEBU 106e 0xc002bda210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [cauthdsl] func1 -> DEBU 106f 0xc002bda210 gate 1569284712197111900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1070 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1071 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1072 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1073 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.197 UTC [gossip.gossip] handleMessage -> DEBU 1074 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.201 UTC [gossip.comm] func1 -> DEBU 1075 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [gossip.gossip] handleMessage -> DEBU 1076 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [msp] DeserializeIdentity -> DEBU 1077 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [msp] DeserializeIdentity -> DEBU 1078 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [msp] DeserializeIdentity -> DEBU 1079 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 107a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 107b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 107c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [policies] Evaluate -> DEBU 107d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [policies] Evaluate -> DEBU 107e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [policies] Evaluate -> DEBU 107f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [cauthdsl] func1 -> DEBU 1080 0xc002bdbe90 gate 1569284712202694900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [cauthdsl] func2 -> DEBU 1081 0xc002bdbe90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [cauthdsl] func2 -> DEBU 1082 0xc002bdbe90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [cauthdsl] func2 -> DEBU 1083 0xc002bdbe90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [cauthdsl] func2 -> DEBU 1084 0xc002bdbe90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [cauthdsl] func1 -> DEBU 1085 0xc002bdbe90 gate 1569284712202694900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [policies] Evaluate -> DEBU 1086 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.202 UTC [policies] Evaluate -> DEBU 1087 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [policies] Evaluate -> DEBU 1088 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [cauthdsl] func1 -> DEBU 1089 0xc002bea7e0 gate 1569284712203041800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [cauthdsl] func2 -> DEBU 108a 0xc002bea7e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [cauthdsl] func2 -> DEBU 108b 0xc002bea7e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [cauthdsl] func2 -> DEBU 108c 0xc002bea7e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [msp.identity] Verify -> DEBU 108d Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [msp.identity] Verify -> DEBU 108e Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [cauthdsl] func2 -> DEBU 108f 0xc002bea7e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [cauthdsl] func1 -> DEBU 1090 0xc002bea7e0 gate 1569284712203041800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [policies] Evaluate -> DEBU 1091 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [policies] Evaluate -> DEBU 1092 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [policies] Evaluate -> DEBU 1093 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [policies] Evaluate -> DEBU 1094 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [msp.identity] Verify -> DEBU 1095 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:12.203 UTC [msp.identity] Verify -> DEBU 1096 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:12.204 UTC [msp] DeserializeIdentity -> DEBU 1097 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.204 UTC [msp] DeserializeIdentity -> DEBU 1098 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1099 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 109a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 109b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 109c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 109d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 109e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [cauthdsl] func1 -> DEBU 109f 0xc002c16710 gate 1569284712210323700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10a0 0xc002c16710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10a1 0xc002c16710 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10a2 0xc002c16710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10a3 0xc002c16710 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [cauthdsl] func1 -> DEBU 10a4 0xc002c16710 gate 1569284712210323700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 10a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 10a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 10a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [cauthdsl] func1 -> DEBU 10a8 0xc002c16f50 gate 1569284712210805300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10a9 0xc002c16f50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10aa 0xc002c16f50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10ab 0xc002c16f50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.211 UTC [msp.identity] Verify -> DEBU 10ac Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:12.211 UTC [msp.identity] Verify -> DEBU 10ad Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:12.213 UTC [cauthdsl] func2 -> DEBU 10ae 0xc002c16f50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.213 UTC [cauthdsl] func1 -> DEBU 10af 0xc002c16f50 gate 1569284712210805300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:12.213 UTC [policies] Evaluate -> DEBU 10b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.213 UTC [policies] Evaluate -> DEBU 10b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.213 UTC [policies] Evaluate -> DEBU 10b2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.213 UTC [policies] Evaluate -> DEBU 10b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.213 UTC [gossip.gossip] handleMessage -> DEBU 10b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.239 UTC [msp] DeserializeIdentity -> DEBU 10b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.239 UTC [msp] DeserializeIdentity -> DEBU 10b6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.239 UTC [gossip.pull] Hello -> DEBU 10b7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:12.239 UTC [msp] DeserializeIdentity -> DEBU 10b8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.239 UTC [msp] DeserializeIdentity -> DEBU 10b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.239 UTC [gossip.comm] Send -> DEBU 10ba Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:12.239 UTC [gossip.comm] sendToEndpoint -> DEBU 10bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.239 UTC [gossip.comm] sendToEndpoint -> DEBU 10bc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.241 UTC [gossip.comm] func1 -> DEBU 10bd Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.241 UTC [gossip.gossip] handleMessage -> DEBU 10be Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.241 UTC [gossip.pull] HandleMessage -> DEBU 10bf GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.241 UTC [gossip.gossip] handleMessage -> DEBU 10c0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.273 UTC [gossip.election] waitForInterrupt -> DEBU 10c1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.273 UTC [gossip.election] IsLeader -> DEBU 10c2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:25:12.273 UTC [msp] GetDefaultSigningIdentity -> DEBU 10c3 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:12.273 UTC [msp.identity] Sign -> DEBU 10c4 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510041801 " +peer0.org1.example.com | "2019-09-24 00:25:12.273 UTC [msp.identity] Sign -> DEBU 10c5 Sign: digest: F284D7C8A1BEBC1E64A8FE39ACD1741FE342C5383D0E18F17522AF39CB9E6E48 " +peer0.org1.example.com | "2019-09-24 00:25:12.274 UTC [gossip.election] waitForInterrupt -> DEBU 10c6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10c7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10ca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.276 UTC [gossip.comm] Send -> DEBU 10cb Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.277 UTC [gossip.comm] sendToEndpoint -> DEBU 10ce Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.277 UTC [gossip.comm] sendToEndpoint -> DEBU 10cf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.589 UTC [gossip.pull] SendReq -> DEBU 10d0 Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:12.589 UTC [gossip.comm] Send -> DEBU 10d1 Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:12.589 UTC [gossip.comm] sendToEndpoint -> DEBU 10d2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.590 UTC [gossip.comm] sendToEndpoint -> DEBU 10d3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.591 UTC [gossip.gossip] handleMessage -> DEBU 10d4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2496699800459247914, Envelope: 957 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.591 UTC [msp] DeserializeIdentity -> DEBU 10d5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.591 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10d6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:12.591 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10d7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.591 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10d8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.591 UTC [policies] Evaluate -> DEBU 10d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.591 UTC [policies] Evaluate -> DEBU 10da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:12.591 UTC [policies] Evaluate -> DEBU 10db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.591 UTC [cauthdsl] func1 -> DEBU 10dc 0xc003049ba0 gate 1569284712591643800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.591 UTC [cauthdsl] func2 -> DEBU 10dd 0xc003049ba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.591 UTC [cauthdsl] func2 -> DEBU 10de 0xc003049ba0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [cauthdsl] func2 -> DEBU 10df 0xc003049ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [cauthdsl] func2 -> DEBU 10e0 0xc003049ba0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [cauthdsl] func1 -> DEBU 10e1 0xc003049ba0 gate 1569284712591643800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [policies] Evaluate -> DEBU 10e2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [policies] Evaluate -> DEBU 10e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [policies] Evaluate -> DEBU 10e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [cauthdsl] func1 -> DEBU 10e5 0xc0030d83e0 gate 1569284712592494900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [cauthdsl] func2 -> DEBU 10e6 0xc0030d83e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [cauthdsl] func2 -> DEBU 10e7 0xc0030d83e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [cauthdsl] func2 -> DEBU 10e8 0xc0030d83e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [msp.identity] Verify -> DEBU 10e9 Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| +peer0.org1.example.com | 00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|" +peer0.org1.example.com | "2019-09-24 00:25:12.592 UTC [msp.identity] Verify -> DEBU 10ea Verify: sig = 00000000 30 45 02 21 00 d8 3e a2 7e 93 d7 c6 50 21 87 90 |0E.!..>.~...P!..| +peer0.org1.example.com | 00000010 80 ef cf d7 1e a9 ec af 68 ad b0 be 61 dd f9 2a |........h...a..*| +peer0.org1.example.com | 00000020 79 9d 5a ed 8d 02 20 1f 36 68 e4 49 42 43 8e 6e |y.Z... .6h.IBC.n| +peer0.org1.example.com | 00000030 50 93 3d 32 cb 11 f3 43 c3 29 95 32 c5 e7 ec 2a |P.=2...C.).2...*| +peer0.org1.example.com | 00000040 2d 36 2e ee f5 df 11 |-6.....|" +peer0.org1.example.com | "2019-09-24 00:25:12.593 UTC [cauthdsl] func2 -> DEBU 10eb 0xc0030d83e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.593 UTC [cauthdsl] func1 -> DEBU 10ec 0xc0030d83e0 gate 1569284712592494900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:12.593 UTC [policies] Evaluate -> DEBU 10ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.593 UTC [policies] Evaluate -> DEBU 10ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.593 UTC [policies] Evaluate -> DEBU 10ef Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.593 UTC [policies] Evaluate -> DEBU 10f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.593 UTC [msp] DeserializeIdentity -> DEBU 10f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.594 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:12.594 UTC [gossip.pull] HandleMessage -> DEBU 10f3 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2496699800459247914, Envelope: 957 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.594 UTC [msp] DeserializeIdentity -> DEBU 10f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.594 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:12.594 UTC [msp] DeserializeIdentity -> DEBU 10f6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.595 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10f7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:12.595 UTC [gossip.gossip] func2 -> DEBU 10f8 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-09-24 00:25:12.595 UTC [gossip.pull] HandleMessage -> DEBU 10f9 Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 4" +peer0.org1.example.com | "2019-09-24 00:25:12.596 UTC [gossip.gossip] handleMessage -> DEBU 10fa Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.645 UTC [gossip.comm] func1 -> DEBU 10fb Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.646 UTC [gossip.gossip] handleMessage -> DEBU 10fc Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.646 UTC [gossip.gossip] handleMessage -> DEBU 10fd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10fe Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.646 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10ff Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:12.646 UTC [msp] DeserializeIdentity -> DEBU 1100 Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:08.562 UTC [fsblkstorage] waitForBlock -> DEBU 18f0 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 00:27:08.563 UTC [fsblkstorage] waitForBlock -> DEBU 18f1 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 00:27:08.563 UTC [common.deliver] Handle -> DEBU 18f2 Waiting for new SeekInfo from 172.18.0.9:32900" +orderer0.example.com | "2019-09-24 00:27:08.563 UTC [common.deliver] Handle -> DEBU 18f3 Attempting to read seek info message from 172.18.0.9:32900" +orderer0.example.com | "2019-09-24 00:27:08.569 UTC [grpc] infof -> DEBU 18f4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:08.569 UTC [common.deliver] Handle -> WARN 18f5 Error reading from 172.18.0.9:32900: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:08.569 UTC [orderer.common.server] func1 -> DEBU 18f6 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:08.569 UTC [comm.grpc.server] 1 -> INFO 18f7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32900 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.3493ms +orderer0.example.com | "2019-09-24 00:27:08.722 UTC [orderer.common.server] Deliver -> DEBU 18f8 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:08.722 UTC [common.deliver] Handle -> DEBU 18f9 Starting new deliver loop for 172.18.0.9:32902" +orderer0.example.com | "2019-09-24 00:27:08.722 UTC [common.deliver] Handle -> DEBU 18fa Attempting to read seek info message from 172.18.0.9:32902" +orderer0.example.com | "2019-09-24 00:27:08.722 UTC [policies] Evaluate -> DEBU 18fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 18fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 18fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 18fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 18ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [cauthdsl] func1 -> DEBU 1900 0xc000aea170 gate 1569284828723116800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 1901 0xc000aea170 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 1902 0xc000aea170 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 1903 0xc000aea170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 1904 0xc000aea170 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [cauthdsl] func1 -> DEBU 1905 0xc000aea170 gate 1569284828723116800 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 1906 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 1907 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 1908 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [cauthdsl] func1 -> DEBU 1909 0xc000aea9b0 gate 1569284828723812900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 190a 0xc000aea9b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 190b 0xc000aea9b0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 190c 0xc000aea9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [cauthdsl] func2 -> DEBU 190d 0xc000aea9b0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [cauthdsl] func1 -> DEBU 190e 0xc000aea9b0 gate 1569284828723812900 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 190f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1910 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [policies] func1 -> DEBU 1911 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1912 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1913 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1914 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1915 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1916 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [cauthdsl] func1 -> DEBU 1917 0xc000aeb6a0 gate 1569284828724706400 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [cauthdsl] func2 -> DEBU 1918 0xc000aeb6a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [cauthdsl] func2 -> DEBU 1919 0xc000aeb6a0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [cauthdsl] func2 -> DEBU 191a 0xc000aeb6a0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:08.724 UTC [msp.identity] Verify -> DEBU 191b Verify: digest = 00000000 92 92 66 2f a3 de b5 9b c4 a1 c2 f3 4d e2 5e 07 |..f/........M.^.| +orderer0.example.com | 00000010 02 15 b8 5a 03 96 cf 46 48 5f 68 de 67 37 c5 40 |...Z...FH_h.g7.@|" +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [msp.identity] Verify -> DEBU 191c Verify: sig = 00000000 30 44 02 20 7c 7c 68 90 c8 83 2e ab 29 e8 a3 8f |0D. ||h.....)...| +orderer0.example.com | 00000010 d7 29 56 da b3 bf be 28 91 a5 b7 ce 9a 7a f8 46 |.)V....(.....z.F| +orderer0.example.com | 00000020 2a 63 f1 04 02 20 47 e5 3f a4 b0 ab 20 9f 79 e4 |*c... G.?... .y.| +orderer0.example.com | 00000030 36 2b 0c ec dd f0 f8 7f 48 1a 9b e2 65 4f 6f a3 |6+......H...eOo.| +orderer0.example.com | 00000040 53 57 15 06 84 49 |SW...I|" +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [cauthdsl] func2 -> DEBU 191d 0xc000aeb6a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [cauthdsl] func1 -> DEBU 191e 0xc000aeb6a0 gate 1569284828724706400 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 191f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1101 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1102 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1103 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 1104 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 1105 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 1106 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [cauthdsl] func1 -> DEBU 1107 0xc0030ef900 gate 1569284712647388000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 1108 0xc0030ef900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 1109 0xc0030ef900 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 110a 0xc0030ef900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 110b 0xc0030ef900 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [cauthdsl] func1 -> DEBU 110c 0xc0030ef900 gate 1569284712647388000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 110d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 110e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 110f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [cauthdsl] func1 -> DEBU 1110 0xc003112140 gate 1569284712647696800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 1111 0xc003112140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 1112 0xc003112140 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 1113 0xc003112140 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [msp.identity] Verify -> DEBU 1114 Verify: digest = 00000000 cd 7b 68 02 88 eb 7f 8e 4c 83 28 22 fe 83 7e bd |.{h.....L.("..~.| +peer0.org1.example.com | 00000010 f5 3b 8c c1 40 f8 8a b0 54 91 0b b9 7b 0a 80 b2 |.;..@...T...{...|" +peer0.org1.example.com | "2019-09-24 00:25:12.647 UTC [msp.identity] Verify -> DEBU 1115 Verify: sig = 00000000 30 45 02 21 00 94 ac b6 e1 2a 5b 03 b1 c2 df bf |0E.!.....*[.....| +peer0.org1.example.com | 00000010 dd 65 18 5b 65 34 63 d4 18 84 b6 d3 d9 a5 69 97 |.e.[e4c.......i.| +peer0.org1.example.com | 00000020 b8 ad a2 fe bd 02 20 50 d3 8f 51 db 6c 94 a3 03 |...... P..Q.l...| +peer0.org1.example.com | 00000030 d9 6f 32 a5 96 94 11 85 d3 bb d1 d6 b9 14 19 0a |.o2.............| +peer0.org1.example.com | 00000040 03 09 46 e9 77 5f 8a |..F.w_.|" +peer0.org1.example.com | "2019-09-24 00:25:12.648 UTC [cauthdsl] func2 -> DEBU 1116 0xc003112140 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:12.648 UTC [cauthdsl] func1 -> DEBU 1117 0xc003112140 gate 1569284712647696800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:12.648 UTC [policies] Evaluate -> DEBU 1118 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.648 UTC [policies] Evaluate -> DEBU 1119 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.648 UTC [policies] Evaluate -> DEBU 111a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.648 UTC [policies] Evaluate -> DEBU 111b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 111c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.650 UTC [gossip.comm] func1 -> DEBU 111e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.650 UTC [gossip.gossip] handleMessage -> DEBU 111f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.650 UTC [gossip.pull] HandleMessage -> DEBU 1120 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.650 UTC [msp] DeserializeIdentity -> DEBU 1121 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.650 UTC [msp] DeserializeIdentity -> DEBU 1122 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.650 UTC [msp] DeserializeIdentity -> DEBU 1123 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.650 UTC [msp] DeserializeIdentity -> DEBU 1124 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.651 UTC [msp] DeserializeIdentity -> DEBU 1125 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.652 UTC [msp] DeserializeIdentity -> DEBU 1126 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.652 UTC [gossip.pull] SendDigest -> DEBU 1127 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:12.652 UTC [gossip.gossip] handleMessage -> DEBU 1128 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 111d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:12.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 1129 updating membership: timestamp: " +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 1920 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 1921 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 112a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:12.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 112b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:12.653 UTC [gossip.discovery] learnExistingMembers -> DEBU 112c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.653 UTC [gossip.discovery] handleAliveMessage -> DEBU 112d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.653 UTC [gossip.discovery] sendMemResponse -> DEBU 112e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:12.653 UTC [msp] DeserializeIdentity -> DEBU 112f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.654 UTC [msp] DeserializeIdentity -> DEBU 1130 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.654 UTC [msp] DeserializeIdentity -> DEBU 1131 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.654 UTC [gossip.comm] Send -> DEBU 1132 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:12.654 UTC [gossip.discovery] sendMemResponse -> DEBU 1133 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:12.654 UTC [gossip.comm] sendToEndpoint -> DEBU 1134 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.654 UTC [gossip.comm] sendToEndpoint -> DEBU 1135 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1136 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.685 UTC [gossip.comm] func1 -> DEBU 1137 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.685 UTC [gossip.comm] func1 -> DEBU 1138 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.685 UTC [gossip.gossip] handleMessage -> DEBU 1139 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.685 UTC [gossip.gossip] handleMessage -> DEBU 113a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.685 UTC [gossip.gossip] handleMessage -> DEBU 113b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.686 UTC [msp] DeserializeIdentity -> DEBU 113c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.686 UTC [msp] DeserializeIdentity -> DEBU 113d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.686 UTC [gossip.gossip] handleMessage -> DEBU 113e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 113f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.686 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1140 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:12.686 UTC [msp.identity] Verify -> DEBU 1141 Verify: digest = 00000000 31 e7 51 83 1b aa 56 6f 44 b9 12 14 3d 96 bd 97 |1.Q...VoD...=...| +peer0.org1.example.com | 00000010 79 fc b6 77 30 be 27 a8 59 56 54 9e fe e2 25 12 |y..w0.'.YVT...%.|" +peer0.org1.example.com | "2019-09-24 00:25:12.686 UTC [msp.identity] Verify -> DEBU 1142 Verify: sig = 00000000 30 45 02 21 00 f4 81 89 e2 b7 aa b1 40 40 25 68 |0E.!........@@%h| +peer0.org1.example.com | 00000010 93 e7 34 fe d0 a1 14 75 10 9d e3 0c 39 cf f5 69 |..4....u....9..i| +peer0.org1.example.com | 00000020 0c 44 44 ce ec 02 20 5a bf 9c 64 96 5e 46 b3 ef |.DD... Z..d.^F..| +peer0.org1.example.com | 00000030 ef bf 80 d3 f7 30 32 b3 ca ce 69 fd e8 46 9a 07 |.....02...i..F..| +peer0.org1.example.com | 00000040 1e 40 26 c7 dd 53 a6 |.@&..S.|" +peer0.org1.example.com | "2019-09-24 00:25:12.687 UTC [gossip.discovery] handleAliveMessage -> DEBU 1143 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 1144 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:12.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 1145 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:12.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 1146 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:12.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 1147 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:12.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 1148 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.687 UTC [gossip.discovery] handleAliveMessage -> DEBU 1149 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.687 UTC [gossip.discovery] handleMsgFromComm -> DEBU 114a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.689 UTC [msp] DeserializeIdentity -> DEBU 114b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.690 UTC [msp] DeserializeIdentity -> DEBU 114c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.690 UTC [msp] DeserializeIdentity -> DEBU 114d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.690 UTC [gossip.comm] Send -> DEBU 114e Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:12.691 UTC [msp] DeserializeIdentity -> DEBU 114f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:12.706 UTC [gossip.comm] Send -> DEBU 1150 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:12.706 UTC [gossip.comm] sendToEndpoint -> DEBU 1151 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.706 UTC [gossip.comm] sendToEndpoint -> DEBU 1152 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.706 UTC [gossip.comm] sendToEndpoint -> DEBU 1153 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.706 UTC [gossip.comm] sendToEndpoint -> DEBU 1154 Exiting" +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 1922 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 1923 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 1924 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [common.deliver] deliverBlocks -> DEBU 1925 [channel: businesschannel] Received seekInfo (0xc000ac4a40) start: > stop: > from 172.18.0.9:32902" +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [fsblkstorage] Next -> DEBU 1926 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 00:27:08.725 UTC [fsblkstorage] newBlockfileStream -> DEBU 1927 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75922]" +orderer0.example.com | "2019-09-24 00:27:08.726 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1928 Remaining bytes=[7984], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:08.726 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1929 Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[75922], bytesOffset=[75924]}" +orderer0.example.com | "2019-09-24 00:27:08.726 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 192a blockbytes [3990] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:08.726 UTC [common.deliver] deliverBlocks -> DEBU 192b [channel: businesschannel] Delivering block for (0xc000ac4a40) for 172.18.0.9:32902" +orderer0.example.com | "2019-09-24 00:27:08.726 UTC [common.deliver] deliverBlocks -> DEBU 192c [channel: businesschannel] Done delivering to 172.18.0.9:32902 for (0xc000ac4a40)" +orderer0.example.com | "2019-09-24 00:27:08.726 UTC [common.deliver] Handle -> DEBU 192d Waiting for new SeekInfo from 172.18.0.9:32902" +orderer0.example.com | "2019-09-24 00:27:08.726 UTC [common.deliver] Handle -> DEBU 192e Attempting to read seek info message from 172.18.0.9:32902" +orderer0.example.com | "2019-09-24 00:27:08.726 UTC [fsblkstorage] waitForBlock -> DEBU 192f Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 00:27:08.726 UTC [fsblkstorage] waitForBlock -> DEBU 1930 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 00:27:08.735 UTC [common.deliver] Handle -> WARN 1931 Error reading from 172.18.0.9:32902: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:08.735 UTC [orderer.common.server] func1 -> DEBU 1932 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:08.736 UTC [comm.grpc.server] 1 -> INFO 1933 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32902 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.7635ms +orderer0.example.com | "2019-09-24 00:27:08.737 UTC [grpc] infof -> DEBU 1934 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:08.847 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1935 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +orderer0.example.com | "2019-09-24 00:27:08.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1936 Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" +orderer0.example.com | "2019-09-24 00:27:08.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1937 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 313.9µs " +orderer0.example.com | "2019-09-24 00:27:08.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1938 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:08.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1939 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3132ms " +orderer0.example.com | "2019-09-24 00:27:08.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 193a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:08.915 UTC [orderer.common.server] Deliver -> DEBU 193b Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:08.915 UTC [common.deliver] Handle -> DEBU 193c Starting new deliver loop for 172.18.0.9:32904" +orderer0.example.com | "2019-09-24 00:27:08.915 UTC [common.deliver] Handle -> DEBU 193d Attempting to read seek info message from 172.18.0.9:32904" +orderer0.example.com | "2019-09-24 00:27:08.916 UTC [policies] Evaluate -> DEBU 193e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.916 UTC [policies] Evaluate -> DEBU 193f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.916 UTC [policies] Evaluate -> DEBU 1940 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.916 UTC [policies] Evaluate -> DEBU 1941 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.916 UTC [policies] Evaluate -> DEBU 1942 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.916 UTC [cauthdsl] func1 -> DEBU 1943 0xc0008addc0 gate 1569284828916592800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.916 UTC [cauthdsl] func2 -> DEBU 1944 0xc0008addc0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.916 UTC [cauthdsl] func2 -> DEBU 1945 0xc0008addc0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.916 UTC [cauthdsl] func2 -> DEBU 1946 0xc0008addc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.917 UTC [cauthdsl] func2 -> DEBU 1947 0xc0008addc0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.917 UTC [cauthdsl] func1 -> DEBU 1948 0xc0008addc0 gate 1569284828916592800 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.917 UTC [policies] Evaluate -> DEBU 1949 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.917 UTC [policies] Evaluate -> DEBU 194a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.917 UTC [policies] Evaluate -> DEBU 194b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.917 UTC [cauthdsl] func1 -> DEBU 194c 0xc001338600 gate 1569284828917855000 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.917 UTC [cauthdsl] func2 -> DEBU 194d 0xc001338600 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.917 UTC [cauthdsl] func2 -> DEBU 194e 0xc001338600 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.918 UTC [cauthdsl] func2 -> DEBU 194f 0xc001338600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:08.918 UTC [cauthdsl] func2 -> DEBU 1950 0xc001338600 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.918 UTC [cauthdsl] func1 -> DEBU 1951 0xc001338600 gate 1569284828917855000 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1952 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1953 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:08.918 UTC [policies] func1 -> DEBU 1954 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1955 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1956 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1957 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1958 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:08.919 UTC [policies] Evaluate -> DEBU 1959 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:08.919 UTC [cauthdsl] func1 -> DEBU 195a 0xc0013392f0 gate 1569284828919133900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:08.919 UTC [cauthdsl] func2 -> DEBU 195b 0xc0013392f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:08.919 UTC [cauthdsl] func2 -> DEBU 195c 0xc0013392f0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:08.919 UTC [cauthdsl] func2 -> DEBU 195d 0xc0013392f0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:08.920 UTC [msp.identity] Verify -> DEBU 195e Verify: digest = 00000000 32 cf 48 3c 69 3c 02 f4 38 b0 9c 84 2d 58 d7 5f |2.H DEBU 195f Verify: sig = 00000000 30 44 02 20 54 55 4d fc 1a 8f 37 fe fa 65 52 74 |0D. TUM...7..eRt| +orderer0.example.com | 00000010 15 3d 57 90 84 22 af e0 da fb 86 9f 99 0c 99 d2 |.=W.."..........| +orderer0.example.com | 00000020 f2 d8 b1 9f 02 20 16 5f cf 75 19 62 85 1f e0 63 |..... ._.u.b...c| +orderer0.example.com | 00000030 29 42 de 7a 8f 6b 2c 11 eb 88 01 61 26 3d 1e 90 |)B.z.k,....a&=..| +orderer0.example.com | 00000040 c4 88 61 87 cf 3b |..a..;|" +orderer0.example.com | "2019-09-24 00:27:08.920 UTC [cauthdsl] func2 -> DEBU 1960 0xc0013392f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:08.920 UTC [cauthdsl] func1 -> DEBU 1961 0xc0013392f0 gate 1569284828919133900 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:08.920 UTC [policies] Evaluate -> DEBU 1962 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:08.920 UTC [policies] Evaluate -> DEBU 1963 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:08.921 UTC [policies] Evaluate -> DEBU 1964 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 00:25:12.708 UTC [gossip.gossip] handleMessage -> DEBU 1155 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.709 UTC [gossip.gossip] handleMessage -> DEBU 1156 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1157 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.720 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1158 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.721 UTC [gossip.comm] func1 -> DEBU 1159 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.723 UTC [gossip.gossip] handleMessage -> DEBU 115a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.724 UTC [gossip.pull] HandleMessage -> DEBU 115b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.724 UTC [gossip.pull] SendDigest -> DEBU 115c Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:12.724 UTC [gossip.gossip] handleMessage -> DEBU 115d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.724 UTC [gossip.comm] func1 -> DEBU 115e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.724 UTC [gossip.gossip] handleMessage -> DEBU 115f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.724 UTC [gossip.gossip] handleMessage -> DEBU 1160 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:12.725 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1161 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:12.725 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1162 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:13.179 UTC [gossip.gossip] handleMessage -> DEBU 1163 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:13.179 UTC [msp] DeserializeIdentity -> DEBU 1164 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:13.179 UTC [msp] DeserializeIdentity -> DEBU 1165 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:13.179 UTC [msp] DeserializeIdentity -> DEBU 1166 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:13.179 UTC [gossip.gossip] handleMessage -> DEBU 1167 Exiting" +orderer0.example.com | "2019-09-24 00:27:08.921 UTC [policies] Evaluate -> DEBU 1965 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:08.921 UTC [policies] Evaluate -> DEBU 1966 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.921 UTC [policies] Evaluate -> DEBU 1967 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:08.921 UTC [common.deliver] deliverBlocks -> DEBU 1968 [channel: businesschannel] Received seekInfo (0xc000b3fe40) start: > stop: > from 172.18.0.9:32904" +orderer0.example.com | "2019-09-24 00:27:08.921 UTC [fsblkstorage] Next -> DEBU 1969 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 00:27:08.921 UTC [fsblkstorage] newBlockfileStream -> DEBU 196a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79914]" +orderer0.example.com | "2019-09-24 00:27:08.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196b Remaining bytes=[3992], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:08.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196c Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[79914], bytesOffset=[79916]}" +orderer0.example.com | "2019-09-24 00:27:08.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196d blockbytes [3990] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:08.922 UTC [common.deliver] deliverBlocks -> DEBU 196e [channel: businesschannel] Delivering block for (0xc000b3fe40) for 172.18.0.9:32904" +orderer0.example.com | "2019-09-24 00:27:08.923 UTC [common.deliver] deliverBlocks -> DEBU 196f [channel: businesschannel] Done delivering to 172.18.0.9:32904 for (0xc000b3fe40)" +orderer0.example.com | "2019-09-24 00:27:08.923 UTC [common.deliver] Handle -> DEBU 1970 Waiting for new SeekInfo from 172.18.0.9:32904" +orderer0.example.com | "2019-09-24 00:27:08.923 UTC [common.deliver] Handle -> DEBU 1971 Attempting to read seek info message from 172.18.0.9:32904" +orderer0.example.com | "2019-09-24 00:27:08.923 UTC [fsblkstorage] waitForBlock -> DEBU 1972 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 00:27:08.923 UTC [fsblkstorage] waitForBlock -> DEBU 1973 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 00:27:08.931 UTC [common.deliver] Handle -> WARN 1974 Error reading from 172.18.0.9:32904: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:08.932 UTC [grpc] infof -> DEBU 1975 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:08.931 UTC [orderer.common.server] func1 -> DEBU 1976 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:08.932 UTC [comm.grpc.server] 1 -> INFO 1977 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32904 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.2677ms +orderer0.example.com | "2019-09-24 00:27:09.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1978 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:09.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1979 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2019-09-24 00:27:09.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 197a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " +orderer0.example.com | "2019-09-24 00:27:09.087 UTC [orderer.common.server] Deliver -> DEBU 197b Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:09.088 UTC [common.deliver] Handle -> DEBU 197c Starting new deliver loop for 172.18.0.9:32906" +orderer0.example.com | "2019-09-24 00:27:09.089 UTC [common.deliver] Handle -> DEBU 197d Attempting to read seek info message from 172.18.0.9:32906" +orderer0.example.com | "2019-09-24 00:27:09.090 UTC [policies] Evaluate -> DEBU 197e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.091 UTC [policies] Evaluate -> DEBU 197f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:09.091 UTC [policies] Evaluate -> DEBU 1980 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.092 UTC [policies] Evaluate -> DEBU 1981 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:09.092 UTC [policies] Evaluate -> DEBU 1982 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:13.671 UTC [gossip.comm] func1 -> DEBU 1168 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:13.671 UTC [gossip.gossip] handleMessage -> DEBU 1169 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:13.671 UTC [gossip.pull] HandleMessage -> DEBU 116a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:13.671 UTC [gossip.pull] SendDigest -> DEBU 116b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:13.671 UTC [gossip.gossip] handleMessage -> DEBU 116c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:13.688 UTC [gossip.comm] func1 -> DEBU 116d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:13.688 UTC [gossip.gossip] handleMessage -> DEBU 116e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:13.688 UTC [gossip.gossip] handleMessage -> DEBU 116f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:13.688 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1170 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1171 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [msp.identity] Verify -> DEBU 1172 Verify: digest = 00000000 ff 13 c1 de 85 f4 6e 52 51 6e d6 0a a8 2c 1d 6e |......nRQn...,.n| +peer0.org1.example.com | 00000010 2c 29 a2 8d 1f 5b 45 14 3f 5c ba a2 32 54 49 d0 |,)...[E.?\..2TI.|" +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [msp.identity] Verify -> DEBU 1173 Verify: sig = 00000000 30 45 02 21 00 d3 6e e2 b3 04 c6 48 76 12 04 71 |0E.!..n....Hv..q| +peer0.org1.example.com | 00000010 5d bc 29 18 9f 9a 8a a2 e5 35 09 ec bc 11 00 88 |].)......5......| +peer0.org1.example.com | 00000020 c6 b3 b5 00 6d 02 20 3d 43 ab 18 b2 99 42 41 0a |....m. =C....BA.| +peer0.org1.example.com | 00000030 d6 91 af ca 03 94 c0 65 f0 42 86 bc 7d 10 45 86 |.......e.B..}.E.| +peer0.org1.example.com | 00000040 53 7e 1e 2f d7 f6 0e |S~./...|" +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [msp.identity] Verify -> DEBU 1174 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [msp.identity] Verify -> DEBU 1175 Verify: sig = 00000000 30 44 02 20 47 9e 87 a0 c5 ce 60 83 10 56 e6 b7 |0D. G.....`..V..| +peer0.org1.example.com | 00000010 06 e8 7e 57 39 29 cc 49 8c ba 6c 76 5c 44 91 43 |..~W9).I..lv\D.C| +peer0.org1.example.com | 00000020 4c 46 76 13 02 20 15 d1 f9 2e f4 d5 81 b7 b4 7b |LFv.. .........{| +peer0.org1.example.com | 00000030 00 ad ec 29 dc 9b 12 93 c3 ae ef 56 d8 21 37 71 |...).......V.!7q| +peer0.org1.example.com | 00000040 7b 5a 1a 97 6d c6 |{Z..m.|" +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [gossip.discovery] handleAliveMessage -> DEBU 1176 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 1177 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 1178 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 1179 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 117a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 117b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:13.689 UTC [gossip.discovery] handleAliveMessage -> DEBU 117c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:13.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 117d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:13.690 UTC [gossip.discovery] sendMemResponse -> DEBU 117e Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:13.690 UTC [msp] DeserializeIdentity -> DEBU 117f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:13.690 UTC [msp] DeserializeIdentity -> DEBU 1180 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:13.690 UTC [gossip.comm] Send -> DEBU 1181 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:13.690 UTC [gossip.discovery] sendMemResponse -> DEBU 1182 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:25:13.690 UTC [gossip.comm] sendToEndpoint -> DEBU 1183 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:13.690 UTC [gossip.comm] sendToEndpoint -> DEBU 1184 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:13.714 UTC [endorser] ProcessProposal -> DEBU 1185 Entering: request from 172.18.0.9:50674" +peer0.org1.example.com | "2019-09-24 00:25:13.714 UTC [protoutils] ValidateProposalMessage -> DEBU 1186 ValidateProposalMessage starts for signed proposal 0xc0026dd270" +peer0.org1.example.com | "2019-09-24 00:25:13.714 UTC [protoutils] validateChannelHeader -> DEBU 1187 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:25:13.714 UTC [protoutils] checkSignatureFromCreator -> DEBU 1188 begin" +peer0.org1.example.com | "2019-09-24 00:25:13.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 1189 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:25:13.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 118a creator is valid" +peer0.org1.example.com | "2019-09-24 00:25:13.715 UTC [msp.identity] Verify -> DEBU 118b Verify: digest = 00000000 3b 9d 97 7b 94 27 f2 81 1b 7d 3f df e3 5a d5 a0 |;..{.'...}?..Z..| +peer0.org1.example.com | 00000010 24 f3 61 04 bf 1a e5 93 db 01 24 6e e5 d9 48 1b |$.a.......$n..H.|" +peer0.org1.example.com | "2019-09-24 00:25:13.715 UTC [msp.identity] Verify -> DEBU 118c Verify: sig = 00000000 30 45 02 21 00 f5 52 83 d0 f8 41 37 9b a3 02 ac |0E.!..R...A7....| +peer0.org1.example.com | 00000010 12 8a 4c af 98 96 18 bd 86 81 68 da 6b 73 79 f3 |..L.......h.ksy.| +peer0.org1.example.com | 00000020 73 74 63 7c 04 02 20 76 7a 40 1a c9 10 e7 54 c1 |stc|.. vz@....T.| +peer0.org1.example.com | 00000030 e6 38 4a 6e bb 70 97 f4 5e 06 f8 0b 57 5b 5d 82 |.8Jn.p..^...W[].| +peer0.org1.example.com | 00000040 f5 ce 05 c0 dc fe 1c |.......|" +peer0.org1.example.com | "2019-09-24 00:25:13.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 118d exits successfully" +peer0.org1.example.com | "2019-09-24 00:25:13.715 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 118e validateChaincodeProposalMessage starts for proposal 0xc0004309a0, header 0xc0026dd680" +peer0.org1.example.com | "2019-09-24 00:25:13.715 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 118f validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:25:13.715 UTC [endorser] preProcess -> DEBU 1190 [][4d1e320b] processing txid: 4d1e320b6c28f547581497d8ece9c0ca721f55df4ae7b77e8e6e0eb1a7794add" +peer0.org1.example.com | "2019-09-24 00:25:13.715 UTC [endorser] SimulateProposal -> DEBU 1191 [][4d1e320b] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:25:13.715 UTC [endorser] callChaincode -> INFO 1192 [][4d1e320b] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:25:13.715 UTC [chaincode] Execute -> DEBU 1193 Entry" +peer0.org1.example.com | "2019-09-24 00:25:13.717 UTC [msp.identity] Verify -> DEBU 1194 Verify: digest = 00000000 3b 9d 97 7b 94 27 f2 81 1b 7d 3f df e3 5a d5 a0 |;..{.'...}?..Z..| +peer0.org1.example.com | 00000010 24 f3 61 04 bf 1a e5 93 db 01 24 6e e5 d9 48 1b |$.a.......$n..H.|" +peer0.org1.example.com | "2019-09-24 00:25:13.717 UTC [msp.identity] Verify -> DEBU 1195 Verify: sig = 00000000 30 45 02 21 00 f5 52 83 d0 f8 41 37 9b a3 02 ac |0E.!..R...A7....| +peer0.org1.example.com | 00000010 12 8a 4c af 98 96 18 bd 86 81 68 da 6b 73 79 f3 |..L.......h.ksy.| +peer0.org1.example.com | 00000020 73 74 63 7c 04 02 20 76 7a 40 1a c9 10 e7 54 c1 |stc|.. vz@....T.| +peer0.org1.example.com | 00000030 e6 38 4a 6e bb 70 97 f4 5e 06 f8 0b 57 5b 5d 82 |.8Jn.p..^...W[].| +peer0.org1.example.com | 00000040 f5 ce 05 c0 dc fe 1c |.......|" +peer0.org1.example.com | "2019-09-24 00:25:13.718 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU 1196 Created metadata tar" +peer0.org1.example.com | "2019-09-24 00:25:13.718 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU 1197 HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)}" +peer0.org1.example.com | "2019-09-24 00:25:13.718 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU 1198 Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]" +peer0.org1.example.com | "2019-09-24 00:25:13.718 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1199 constructing new query executor txid = [362bbcc0-c1c0-4a12-8edd-e4defeed28ea]" +peer0.org1.example.com | "2019-09-24 00:25:13.718 UTC [stateleveldb] GetState -> DEBU 119a GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:25:13.718 UTC [lockbasedtxmgr] Done -> DEBU 119b Done with transaction simulation / query execution [362bbcc0-c1c0-4a12-8edd-e4defeed28ea]" +peer0.org1.example.com | "2019-09-24 00:25:13.718 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU 119c Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts." +peer0.org1.example.com | "2019-09-24 00:25:13.718 UTC [lscc] executeInstall -> INFO 119d Installed Chaincode [exp02] Version [1.0] to peer" +peer0.org1.example.com | "2019-09-24 00:25:13.719 UTC [chaincode] handleMessage -> DEBU 119e [4d1e320b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:25:13.719 UTC [chaincode] Notify -> DEBU 119f [4d1e320b] notifying Txid:4d1e320b6c28f547581497d8ece9c0ca721f55df4ae7b77e8e6e0eb1a7794add, channelID:" +peer0.org1.example.com | "2019-09-24 00:25:13.719 UTC [chaincode] Execute -> DEBU 11a0 Exit" +orderer0.example.com | "2019-09-24 00:27:09.092 UTC [msp] DeserializeIdentity -> DEBU 1983 Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:09.093 UTC [msp.identity] newIdentity -> DEBU 1984 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:09.093 UTC [cauthdsl] func1 -> DEBU 1985 0xc00131b540 gate 1569284829093883000 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:09.094 UTC [cauthdsl] func2 -> DEBU 1986 0xc00131b540 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:09.094 UTC [cauthdsl] func2 -> DEBU 1987 0xc00131b540 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:09.094 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1988 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 00:27:09.094 UTC [msp] Validate -> DEBU 1989 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:27:09.095 UTC [cauthdsl] func2 -> DEBU 198a 0xc00131b540 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:09.095 UTC [msp.identity] Verify -> DEBU 198b Verify: digest = 00000000 83 a9 6d 54 00 e0 7d d4 58 07 7d de ad 4b 10 ad |..mT..}.X.}..K..| +orderer0.example.com | 00000010 fa 69 94 0f 75 9c 8e e6 9d ea 84 9a 18 30 73 a7 |.i..u........0s.|" +orderer0.example.com | "2019-09-24 00:27:09.096 UTC [msp.identity] Verify -> DEBU 198c Verify: sig = 00000000 30 44 02 20 48 50 05 06 6f c1 d5 4c 5c af 62 ec |0D. HP..o..L\.b.| +orderer0.example.com | 00000010 bc b7 1e 82 a8 0a 8b 43 77 f4 c6 2d f3 48 1a ed |.......Cw..-.H..| +orderer0.example.com | 00000020 c3 b7 d3 96 02 20 2a e9 b8 5b 18 94 9b 28 d8 8b |..... *..[...(..| +orderer0.example.com | 00000030 f1 29 dc c0 9b a7 7e 72 10 9a 77 e0 f9 78 d2 0e |.)....~r..w..x..| +orderer0.example.com | 00000040 74 d2 90 2b 66 d2 |t..+f.|" +orderer0.example.com | "2019-09-24 00:27:09.096 UTC [cauthdsl] func2 -> DEBU 198d 0xc00131b540 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:09.097 UTC [cauthdsl] func1 -> DEBU 198e 0xc00131b540 gate 1569284829093883000 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:09.097 UTC [policies] Evaluate -> DEBU 198f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:09.097 UTC [policies] Evaluate -> DEBU 1990 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:09.098 UTC [policies] Evaluate -> DEBU 1991 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:09.098 UTC [policies] Evaluate -> DEBU 1992 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:09.098 UTC [policies] Evaluate -> DEBU 1993 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:09.098 UTC [policies] Evaluate -> DEBU 1994 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:09.099 UTC [common.deliver] deliverBlocks -> DEBU 1995 [channel: testchainid] Received seekInfo (0xc000ac5940) start: > stop: > from 172.18.0.9:32906" +orderer0.example.com | "2019-09-24 00:27:09.099 UTC [fsblkstorage] Next -> DEBU 1996 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 00:27:09.099 UTC [fsblkstorage] newBlockfileStream -> DEBU 1997 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-09-24 00:27:09.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1998 Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:09.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1999 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-09-24 00:27:09.101 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 199a blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:09.101 UTC [common.deliver] deliverBlocks -> DEBU 199b [channel: testchainid] Delivering block for (0xc000ac5940) for 172.18.0.9:32906" +orderer0.example.com | "2019-09-24 00:27:09.101 UTC [common.deliver] deliverBlocks -> DEBU 199c [channel: testchainid] Done delivering to 172.18.0.9:32906 for (0xc000ac5940)" +orderer0.example.com | "2019-09-24 00:27:09.102 UTC [common.deliver] Handle -> DEBU 199d Waiting for new SeekInfo from 172.18.0.9:32906" +orderer0.example.com | "2019-09-24 00:27:09.103 UTC [common.deliver] Handle -> DEBU 199e Attempting to read seek info message from 172.18.0.9:32906" +orderer0.example.com | "2019-09-24 00:27:09.105 UTC [grpc] infof -> DEBU 199f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:09.105 UTC [common.deliver] Handle -> WARN 19a0 Error reading from 172.18.0.9:32906: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:09.106 UTC [orderer.common.server] func1 -> DEBU 19a1 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:09.106 UTC [comm.grpc.server] 1 -> INFO 19a2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32906 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.9542ms +orderer0.example.com | "2019-09-24 00:27:09.266 UTC [orderer.common.server] Deliver -> DEBU 19a3 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:09.266 UTC [common.deliver] Handle -> DEBU 19a4 Starting new deliver loop for 172.18.0.9:32908" +orderer0.example.com | "2019-09-24 00:27:09.266 UTC [common.deliver] Handle -> DEBU 19a5 Attempting to read seek info message from 172.18.0.9:32908" +orderer0.example.com | "2019-09-24 00:27:09.268 UTC [policies] Evaluate -> DEBU 19a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.268 UTC [policies] Evaluate -> DEBU 19a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:09.268 UTC [policies] Evaluate -> DEBU 19a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.269 UTC [policies] Evaluate -> DEBU 19a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:09.269 UTC [policies] Evaluate -> DEBU 19aa == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.269 UTC [cauthdsl] func1 -> DEBU 19ab 0xc000ffe6c0 gate 1569284829269642900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:09.269 UTC [cauthdsl] func2 -> DEBU 19ac 0xc000ffe6c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:09.270 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000ffe6c0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:09.270 UTC [cauthdsl] func2 -> DEBU 19ae 0xc000ffe6c0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:09.271 UTC [msp.identity] Verify -> DEBU 19af Verify: digest = 00000000 29 35 d3 b4 58 fc 62 b4 27 76 65 d4 47 c7 89 e9 |)5..X.b.'ve.G...| +orderer0.example.com | 00000010 54 3d 50 c5 5d 3b 74 ea 3e 81 bd 7e b8 bc f5 36 |T=P.];t.>..~...6|" +orderer0.example.com | "2019-09-24 00:27:09.271 UTC [msp.identity] Verify -> DEBU 19b0 Verify: sig = 00000000 30 45 02 21 00 e7 65 a6 99 ea 94 da 88 34 ac da |0E.!..e......4..| +orderer0.example.com | 00000010 29 c2 a0 d0 61 5d 97 9a e9 5d 60 bb c6 43 53 a5 |)...a]...]`..CS.| +orderer0.example.com | 00000020 cd f9 c2 d1 1f 02 20 06 7e 5a 1f 6b 78 4a 6d 72 |...... .~Z.kxJmr| +orderer0.example.com | 00000030 72 11 0b fd 4b 1f 57 61 7e 65 c1 20 e3 b0 ec 4d |r...K.Wa~e. ...M| +orderer0.example.com | 00000040 6d c7 2a af 8b c3 1a |m.*....|" +orderer0.example.com | "2019-09-24 00:27:09.272 UTC [cauthdsl] func2 -> DEBU 19b1 0xc000ffe6c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:09.272 UTC [cauthdsl] func1 -> DEBU 19b2 0xc000ffe6c0 gate 1569284829269642900 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:09.272 UTC [policies] Evaluate -> DEBU 19b3 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:09.273 UTC [policies] Evaluate -> DEBU 19b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:09.273 UTC [policies] Evaluate -> DEBU 19b5 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:09.273 UTC [policies] Evaluate -> DEBU 19b6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:09.274 UTC [policies] Evaluate -> DEBU 19b7 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:09.274 UTC [policies] Evaluate -> DEBU 19b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:09.274 UTC [common.deliver] deliverBlocks -> DEBU 19b9 [channel: testchainid] Received seekInfo (0xc000231d80) start: > stop: > from 172.18.0.9:32908" +orderer0.example.com | "2019-09-24 00:27:09.275 UTC [fsblkstorage] Next -> DEBU 19ba Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 00:27:09.275 UTC [fsblkstorage] newBlockfileStream -> DEBU 19bb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-09-24 00:27:09.276 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bc Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:09.276 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bd Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-09-24 00:27:09.277 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19be blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:09.277 UTC [common.deliver] deliverBlocks -> DEBU 19bf [channel: testchainid] Delivering block for (0xc000231d80) for 172.18.0.9:32908" +orderer0.example.com | "2019-09-24 00:27:09.277 UTC [common.deliver] deliverBlocks -> DEBU 19c0 [channel: testchainid] Done delivering to 172.18.0.9:32908 for (0xc000231d80)" +orderer0.example.com | "2019-09-24 00:27:09.278 UTC [common.deliver] Handle -> DEBU 19c1 Waiting for new SeekInfo from 172.18.0.9:32908" +orderer0.example.com | "2019-09-24 00:27:09.278 UTC [common.deliver] Handle -> DEBU 19c2 Attempting to read seek info message from 172.18.0.9:32908" +orderer0.example.com | "2019-09-24 00:27:09.280 UTC [policies] Evaluate -> DEBU 19c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.280 UTC [policies] Evaluate -> DEBU 19c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:09.280 UTC [policies] Evaluate -> DEBU 19c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.281 UTC [policies] Evaluate -> DEBU 19c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:09.281 UTC [policies] Evaluate -> DEBU 19c7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.281 UTC [cauthdsl] func1 -> DEBU 19c8 0xc000da4f10 gate 1569284829281383000 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:09.281 UTC [cauthdsl] func2 -> DEBU 19c9 0xc000da4f10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:09.281 UTC [cauthdsl] func2 -> DEBU 19ca 0xc000da4f10 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:09.281 UTC [cauthdsl] func2 -> DEBU 19cb 0xc000da4f10 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:09.281 UTC [msp.identity] Verify -> DEBU 19cc Verify: digest = 00000000 40 77 60 2c 68 89 b8 3f 14 c8 4b 29 35 54 10 ca |@w`,h..?..K)5T..| +orderer0.example.com | 00000010 20 ed 45 e0 97 d0 df a9 d4 d1 99 5c 86 0a 62 a6 | .E........\..b.|" +orderer0.example.com | "2019-09-24 00:27:09.281 UTC [msp.identity] Verify -> DEBU 19cd Verify: sig = 00000000 30 45 02 21 00 91 1e 4f e7 83 f6 ba f8 ca 9b 38 |0E.!...O.......8| +orderer0.example.com | 00000010 e5 05 dc be 4e ac 5d 69 2c 01 60 68 0b e2 36 4d |....N.]i,.`h..6M| +orderer0.example.com | 00000020 25 13 c2 86 a5 02 20 17 86 76 1e 99 07 70 1d f5 |%..... ..v...p..| +orderer0.example.com | 00000030 d7 f7 12 d7 6a 64 52 60 5f bb d7 55 ba 79 ba 0f |....jdR`_..U.y..| +orderer0.example.com | 00000040 82 fe 56 43 64 cf 79 |..VCd.y|" +orderer0.example.com | "2019-09-24 00:27:09.282 UTC [cauthdsl] func2 -> DEBU 19ce 0xc000da4f10 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:09.282 UTC [cauthdsl] func1 -> DEBU 19cf 0xc000da4f10 gate 1569284829281383000 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:09.282 UTC [policies] Evaluate -> DEBU 19d0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:09.282 UTC [policies] Evaluate -> DEBU 19d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:09.282 UTC [policies] Evaluate -> DEBU 19d2 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:09.282 UTC [policies] Evaluate -> DEBU 19d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:09.283 UTC [policies] Evaluate -> DEBU 19d4 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:09.283 UTC [policies] Evaluate -> DEBU 19d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:09.283 UTC [common.deliver] deliverBlocks -> DEBU 19d6 [channel: testchainid] Received seekInfo (0xc000ac5c00) start: > stop: > from 172.18.0.9:32908" +orderer0.example.com | "2019-09-24 00:27:09.283 UTC [fsblkstorage] Next -> DEBU 19d7 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 00:27:09.283 UTC [fsblkstorage] newBlockfileStream -> DEBU 19d8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:27:09.283 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d9 Remaining bytes=[44254], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:09.283 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19da Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:27:09.283 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19db blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:09.284 UTC [common.deliver] deliverBlocks -> DEBU 19dc [channel: testchainid] Delivering block for (0xc000ac5c00) for 172.18.0.9:32908" +orderer0.example.com | "2019-09-24 00:27:09.284 UTC [common.deliver] deliverBlocks -> DEBU 19dd [channel: testchainid] Done delivering to 172.18.0.9:32908 for (0xc000ac5c00)" +orderer0.example.com | "2019-09-24 00:27:09.284 UTC [common.deliver] Handle -> DEBU 19de Waiting for new SeekInfo from 172.18.0.9:32908" +orderer0.example.com | "2019-09-24 00:27:09.284 UTC [common.deliver] Handle -> DEBU 19df Attempting to read seek info message from 172.18.0.9:32908" +orderer0.example.com | "2019-09-24 00:27:09.292 UTC [grpc] infof -> DEBU 19e0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:09.292 UTC [common.deliver] Handle -> WARN 19e1 Error reading from 172.18.0.9:32908: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:09.294 UTC [orderer.common.server] func1 -> DEBU 19e2 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:09.294 UTC [comm.grpc.server] 1 -> INFO 19e3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32908 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.0157ms +orderer0.example.com | "2019-09-24 00:27:09.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e4 Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +orderer0.example.com | "2019-09-24 00:27:09.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e5 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +orderer0.example.com | "2019-09-24 00:27:09.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.4µs " +orderer0.example.com | "2019-09-24 00:27:09.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.9µs " +orderer0.example.com | "2019-09-24 00:27:09.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:09.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:09.414 UTC [orderer.common.server] Deliver -> DEBU 19ea Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:09.414 UTC [common.deliver] Handle -> DEBU 19eb Starting new deliver loop for 172.18.0.9:32910" +orderer0.example.com | "2019-09-24 00:27:09.414 UTC [common.deliver] Handle -> DEBU 19ec Attempting to read seek info message from 172.18.0.9:32910" +orderer0.example.com | "2019-09-24 00:27:09.415 UTC [policies] Evaluate -> DEBU 19ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.415 UTC [policies] Evaluate -> DEBU 19ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:09.415 UTC [policies] Evaluate -> DEBU 19ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.415 UTC [policies] Evaluate -> DEBU 19f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:09.415 UTC [policies] Evaluate -> DEBU 19f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.415 UTC [cauthdsl] func1 -> DEBU 19f2 0xc0011c3030 gate 1569284829415340000 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:09.415 UTC [cauthdsl] func2 -> DEBU 19f3 0xc0011c3030 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:09.415 UTC [cauthdsl] func2 -> DEBU 19f4 0xc0011c3030 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:09.415 UTC [cauthdsl] func2 -> DEBU 19f5 0xc0011c3030 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:09.415 UTC [msp.identity] Verify -> DEBU 19f6 Verify: digest = 00000000 5a 25 5f 07 c7 7c 04 8f 47 9c 07 06 3a ad 7b 81 |Z%_..|..G...:.{.| +orderer0.example.com | 00000010 ba bd 5f a3 30 26 0a 86 fe 90 60 3e 67 b9 fb a3 |.._.0&....`>g...|" +orderer0.example.com | "2019-09-24 00:27:09.415 UTC [msp.identity] Verify -> DEBU 19f7 Verify: sig = 00000000 30 44 02 20 2d 5d 81 55 ae 80 8d 3a 18 50 0b e5 |0D. -].U...:.P..| +orderer0.example.com | 00000010 14 b6 b6 78 30 7c 3a 9b a2 83 d0 ea 14 dc 59 c1 |...x0|:.......Y.| +orderer0.example.com | 00000020 29 c0 1f ee 02 20 26 4f f0 d0 24 19 a6 aa 5e a4 |).... &O..$...^.| +orderer0.example.com | 00000030 96 43 00 c3 ab 4e 9c ac f1 ac d7 24 a1 39 83 a2 |.C...N.....$.9..| +orderer0.example.com | 00000040 17 b2 31 af 45 1d |..1.E.|" +orderer0.example.com | "2019-09-24 00:27:09.416 UTC [cauthdsl] func2 -> DEBU 19f8 0xc0011c3030 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:09.416 UTC [cauthdsl] func1 -> DEBU 19f9 0xc0011c3030 gate 1569284829415340000 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19fc Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19fe Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:09.416 UTC [common.deliver] deliverBlocks -> DEBU 1a00 [channel: testchainid] Received seekInfo (0xc0001d2fc0) start: > stop: > from 172.18.0.9:32910" +orderer0.example.com | "2019-09-24 00:27:09.416 UTC [fsblkstorage] Next -> DEBU 1a01 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 00:27:09.416 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a02 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:27:09.417 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a03 Remaining bytes=[44254], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:09.418 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a04 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:27:09.418 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a05 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:09.420 UTC [common.deliver] deliverBlocks -> DEBU 1a06 [channel: testchainid] Delivering block for (0xc0001d2fc0) for 172.18.0.9:32910" +orderer0.example.com | "2019-09-24 00:27:09.420 UTC [common.deliver] deliverBlocks -> DEBU 1a07 [channel: testchainid] Done delivering to 172.18.0.9:32910 for (0xc0001d2fc0)" +orderer0.example.com | "2019-09-24 00:27:09.420 UTC [common.deliver] Handle -> DEBU 1a08 Waiting for new SeekInfo from 172.18.0.9:32910" +orderer0.example.com | "2019-09-24 00:27:09.420 UTC [common.deliver] Handle -> DEBU 1a09 Attempting to read seek info message from 172.18.0.9:32910" +orderer0.example.com | "2019-09-24 00:27:09.435 UTC [grpc] infof -> DEBU 1a0a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:09.436 UTC [common.deliver] Handle -> WARN 1a0b Error reading from 172.18.0.9:32910: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:09.436 UTC [orderer.common.server] func1 -> DEBU 1a0c Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:09.436 UTC [comm.grpc.server] 1 -> INFO 1a0d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32910 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.4979ms +orderer0.example.com | "2019-09-24 00:27:09.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a0e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:09.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0f Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2019-09-24 00:27:09.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.4µs " +orderer0.example.com | "2019-09-24 00:27:09.584 UTC [orderer.common.server] Deliver -> DEBU 1a11 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:09.584 UTC [common.deliver] Handle -> DEBU 1a12 Starting new deliver loop for 172.18.0.9:32912" +orderer0.example.com | "2019-09-24 00:27:09.584 UTC [common.deliver] Handle -> DEBU 1a13 Attempting to read seek info message from 172.18.0.9:32912" +orderer0.example.com | "2019-09-24 00:27:09.584 UTC [policies] Evaluate -> DEBU 1a14 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.584 UTC [policies] Evaluate -> DEBU 1a15 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:09.584 UTC [policies] Evaluate -> DEBU 1a16 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.584 UTC [policies] Evaluate -> DEBU 1a17 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:09.584 UTC [policies] Evaluate -> DEBU 1a18 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [cauthdsl] func1 -> DEBU 1a19 0xc000c7d280 gate 1569284829585040100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [cauthdsl] func2 -> DEBU 1a1a 0xc000c7d280 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [cauthdsl] func2 -> DEBU 1a1b 0xc000c7d280 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc000c7d280 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [msp.identity] Verify -> DEBU 1a1d Verify: digest = 00000000 f4 b4 a7 fd 53 4e 52 4a 24 c0 fb 7f f9 f5 93 43 |....SNRJ$......C| +orderer0.example.com | 00000010 f0 04 a9 89 8a ff 2f 2e 63 a7 33 ea f2 ac 73 d3 |....../.c.3...s.|" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [msp.identity] Verify -> DEBU 1a1e Verify: sig = 00000000 30 45 02 21 00 fa 17 de 6e 79 62 00 90 be 2c f9 |0E.!....nyb...,.| +orderer0.example.com | 00000010 10 54 6b 59 15 05 89 0c 6e 4b 5a 0e db 1f 0c d9 |.TkY....nKZ.....| +orderer0.example.com | 00000020 1f 3a ea 57 26 02 20 59 50 99 4b 65 7a 60 ec a8 |.:.W&. YP.Kez`..| +orderer0.example.com | 00000030 f1 6e 6b 47 27 f2 cc 00 04 d4 7e fd 0a b1 78 76 |.nkG'.....~...xv| +orderer0.example.com | 00000040 c2 da 6e 62 c7 7d 8e |..nb.}.|" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [cauthdsl] func2 -> DEBU 1a1f 0xc000c7d280 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [cauthdsl] func1 -> DEBU 1a20 0xc000c7d280 gate 1569284829585040100 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a21 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a22 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a23 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a24 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a25 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a26 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:09.585 UTC [common.deliver] deliverBlocks -> DEBU 1a27 [channel: testchainid] Received seekInfo (0xc000ac4340) start: > stop: > from 172.18.0.9:32912" +orderer0.example.com | "2019-09-24 00:27:09.586 UTC [fsblkstorage] Next -> DEBU 1a28 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 00:27:09.586 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a29 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-09-24 00:27:09.586 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a2a Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:09.586 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a2b Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-09-24 00:27:09.586 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a2c blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:09.586 UTC [common.deliver] deliverBlocks -> DEBU 1a2d [channel: testchainid] Delivering block for (0xc000ac4340) for 172.18.0.9:32912" +orderer0.example.com | "2019-09-24 00:27:09.586 UTC [common.deliver] deliverBlocks -> DEBU 1a2e [channel: testchainid] Done delivering to 172.18.0.9:32912 for (0xc000ac4340)" +orderer0.example.com | "2019-09-24 00:27:09.586 UTC [common.deliver] Handle -> DEBU 1a2f Waiting for new SeekInfo from 172.18.0.9:32912" +orderer0.example.com | "2019-09-24 00:27:09.586 UTC [common.deliver] Handle -> DEBU 1a30 Attempting to read seek info message from 172.18.0.9:32912" +orderer0.example.com | "2019-09-24 00:27:09.597 UTC [common.deliver] Handle -> WARN 1a31 Error reading from 172.18.0.9:32912: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:09.597 UTC [orderer.common.server] func1 -> DEBU 1a32 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:09.598 UTC [comm.grpc.server] 1 -> INFO 1a33 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32912 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8207ms +orderer0.example.com | "2019-09-24 00:27:09.602 UTC [grpc] infof -> DEBU 1a34 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:09.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a35 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +orderer0.example.com | "2019-09-24 00:27:09.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a36 Sending msg of 28 bytes to 3 on channel businesschannel took 38.2µs" +orderer0.example.com | "2019-09-24 00:27:09.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234.9µs " +orderer0.example.com | "2019-09-24 00:27:09.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 499.7µs " +orderer0.example.com | "2019-09-24 00:27:09.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a39 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 00:25:13.719 UTC [endorser] callChaincode -> INFO 11a1 [][4d1e320b] Exit chaincode: name:"lscc" (4ms)" +peer0.org1.example.com | "2019-09-24 00:25:13.719 UTC [endorser] SimulateProposal -> DEBU 11a2 [][4d1e320b] Exit" +peer0.org1.example.com | "2019-09-24 00:25:13.719 UTC [endorser] func1 -> DEBU 11a3 Exit: request from 172.18.0.9:50674" +peer0.org1.example.com | "2019-09-24 00:25:13.719 UTC [comm.grpc.server] 1 -> INFO 11a4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50674 grpc.code=OK grpc.call_duration=5.143ms +peer0.org1.example.com | "2019-09-24 00:25:13.725 UTC [grpc] infof -> DEBU 11a5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:13.726 UTC [grpc] warningf -> DEBU 11a6 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:50674: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 00:25:13.726 UTC [grpc] infof -> DEBU 11a7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:25:14.115 UTC [gossip.comm] func1 -> DEBU 11a8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:14.115 UTC [gossip.gossip] handleMessage -> DEBU 11a9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:14.116 UTC [msp] DeserializeIdentity -> DEBU 11aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:14.116 UTC [msp] DeserializeIdentity -> DEBU 11ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:14.116 UTC [msp] DeserializeIdentity -> DEBU 11ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:14.116 UTC [gossip.gossip] handleMessage -> DEBU 11ad Exiting" +peer0.org1.example.com | "2019-09-24 00:25:14.576 UTC [msp] GetDefaultSigningIdentity -> DEBU 11ae Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:14.576 UTC [msp.identity] Sign -> DEBU 11af Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151019 " +peer0.org1.example.com | "2019-09-24 00:25:14.576 UTC [msp.identity] Sign -> DEBU 11b0 Sign: digest: 6C8D40E36138785034A40F2D5712F65247A24F48E7D03FB6854DC914EC2C9ACD " +peer0.org1.example.com | "2019-09-24 00:25:14.577 UTC [msp] GetDefaultSigningIdentity -> DEBU 11b1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:14.577 UTC [msp.identity] Sign -> DEBU 11b2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:14.577 UTC [msp.identity] Sign -> DEBU 11b3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:14.577 UTC [gossip.discovery] periodicalSendAlive -> DEBU 11b4 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:14.582 UTC [msp] DeserializeIdentity -> DEBU 11b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:14.582 UTC [msp] DeserializeIdentity -> DEBU 11b6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:14.582 UTC [msp] DeserializeIdentity -> DEBU 11b7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:14.582 UTC [gossip.comm] Send -> DEBU 11b8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:14.582 UTC [msp] DeserializeIdentity -> DEBU 11b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:14.582 UTC [gossip.comm] Send -> DEBU 11ba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:14.582 UTC [gossip.comm] Send -> DEBU 11bb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:14.582 UTC [gossip.comm] sendToEndpoint -> DEBU 11bc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:14.582 UTC [gossip.comm] sendToEndpoint -> DEBU 11bd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:14.582 UTC [gossip.comm] sendToEndpoint -> DEBU 11be Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:14.582 UTC [gossip.comm] sendToEndpoint -> DEBU 11bf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:14.583 UTC [gossip.comm] sendToEndpoint -> DEBU 11c0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:14.583 UTC [gossip.comm] sendToEndpoint -> DEBU 11c1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:14.991 UTC [gossip.gossip] handleMessage -> DEBU 11c2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:14.991 UTC [gossip.gossip] handleMessage -> DEBU 11c3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:14.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11c4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:14.991 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11c5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:14.991 UTC [msp] DeserializeIdentity -> DEBU 11c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [cauthdsl] func1 -> DEBU 11cd 0xc00320baf0 gate 1569284714992317800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11ce 0xc00320baf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11cf 0xc00320baf0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11d0 0xc00320baf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11d1 0xc00320baf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [cauthdsl] func1 -> DEBU 11d2 0xc00320baf0 gate 1569284714992317800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11d3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [cauthdsl] func1 -> DEBU 11d6 0xc003296330 gate 1569284714992828900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11d7 0xc003296330 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11d8 0xc003296330 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11d9 0xc003296330 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:14.992 UTC [msp.identity] Verify -> DEBU 11da Verify: digest = 00000000 ca 5d 87 87 a9 8d a9 8f a0 a6 3a 87 7a ef 78 52 |.]........:.z.xR| +peer0.org1.example.com | 00000010 9e 7b 01 82 e6 a9 d8 fb 08 ac ac d8 91 c8 1e 77 |.{.............w|" +peer0.org1.example.com | "2019-09-24 00:25:14.993 UTC [msp.identity] Verify -> DEBU 11db Verify: sig = 00000000 30 44 02 20 3f 72 1e 31 c6 60 7a ba 61 d3 83 d0 |0D. ?r.1.`z.a...| +peer0.org1.example.com | 00000010 c0 93 d7 79 06 b5 11 2d e5 d4 5e 24 47 a4 b9 3b |...y...-..^$G..;| +peer0.org1.example.com | 00000020 87 2e 8c 93 02 20 07 17 0b 21 7b 82 9d 26 e0 e8 |..... ...!{..&..| +peer0.org1.example.com | 00000030 7e 7c 99 5a 57 79 85 0a b7 ec 14 21 d3 5c e1 94 |~|.ZWy.....!.\..| +peer0.org1.example.com | 00000040 cf 2c 5e 7e e0 d2 |.,^~..|" +peer0.org1.example.com | "2019-09-24 00:25:14.994 UTC [cauthdsl] func2 -> DEBU 11dc 0xc003296330 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:14.994 UTC [cauthdsl] func1 -> DEBU 11dd 0xc003296330 gate 1569284714992828900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:15.003 UTC [policies] Evaluate -> DEBU 11df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.003 UTC [policies] Evaluate -> DEBU 11e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.002 UTC [gossip.comm] func1 -> DEBU 11de Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.003 UTC [gossip.gossip] handleMessage -> DEBU 11e1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.009 UTC [policies] Evaluate -> DEBU 11e2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.009 UTC [policies] Evaluate -> DEBU 11e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.009 UTC [gossip.discovery] handleAliveMessage -> DEBU 11e4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 11e5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:15.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 11e6 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:15.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 11e7 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:15.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 11e8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:15.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 11e9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.009 UTC [gossip.discovery] handleAliveMessage -> DEBU 11ea Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11eb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.010 UTC [gossip.gossip] handleMessage -> DEBU 11ed Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ee Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.020 UTC [gossip.comm] func1 -> DEBU 11ef Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.020 UTC [gossip.gossip] handleMessage -> DEBU 11f0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.020 UTC [gossip.gossip] handleMessage -> DEBU 11f1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11f2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11f3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11fa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [gossip.comm] Send -> DEBU 11fb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11fc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [gossip.comm] Send -> DEBU 11fd Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [gossip.comm] sendToEndpoint -> DEBU 11fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.021 UTC [gossip.comm] sendToEndpoint -> DEBU 11ff Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.022 UTC [gossip.comm] sendToEndpoint -> DEBU 1200 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.022 UTC [gossip.comm] sendToEndpoint -> DEBU 1201 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.597 UTC [gossip.pull] Hello -> DEBU 1202 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:15.598 UTC [gossip.comm] Send -> DEBU 1203 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:15.598 UTC [gossip.pull] Hello -> DEBU 1204 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:15.598 UTC [gossip.comm] Send -> DEBU 1205 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:15.598 UTC [gossip.pull] Hello -> DEBU 1206 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:15.598 UTC [gossip.comm] Send -> DEBU 1207 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 1208 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 1209 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 120a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 120b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 120c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 120d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.602 UTC [gossip.comm] func1 -> DEBU 120e Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.603 UTC [gossip.gossip] handleMessage -> DEBU 120f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.603 UTC [gossip.pull] HandleMessage -> DEBU 1210 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.603 UTC [gossip.gossip] handleMessage -> DEBU 1211 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.603 UTC [gossip.comm] func1 -> DEBU 1212 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.603 UTC [gossip.gossip] handleMessage -> DEBU 1213 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.603 UTC [gossip.pull] HandleMessage -> DEBU 1214 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.603 UTC [gossip.gossip] handleMessage -> DEBU 1215 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.604 UTC [gossip.gossip] handleMessage -> DEBU 1216 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.604 UTC [gossip.pull] HandleMessage -> DEBU 1217 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.604 UTC [gossip.gossip] handleMessage -> DEBU 1218 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.620 UTC [msp] GetDefaultSigningIdentity -> DEBU 1219 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:15.620 UTC [msp.identity] Sign -> DEBU 121a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101A " +peer0.org1.example.com | "2019-09-24 00:25:15.620 UTC [msp.identity] Sign -> DEBU 121b Sign: digest: 1D0062C637380982BD27D65B4096CE84FECBBE536DB7DC6CF166AA08C8CC5712 " +peer0.org1.example.com | "2019-09-24 00:25:15.621 UTC [msp] GetDefaultSigningIdentity -> DEBU 121c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:15.621 UTC [msp.identity] Sign -> DEBU 121d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:15.621 UTC [msp.identity] Sign -> DEBU 121e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:15.621 UTC [gossip.comm] Send -> DEBU 121f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:15.621 UTC [msp] DeserializeIdentity -> DEBU 1220 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.621 UTC [gossip.comm] Send -> DEBU 1221 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:15.621 UTC [msp] DeserializeIdentity -> DEBU 1222 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.621 UTC [gossip.comm] Send -> DEBU 1223 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1224 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1225 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1226 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1227 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1228 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1229 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.624 UTC [gossip.comm] func1 -> DEBU 122a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.624 UTC [gossip.gossip] handleMessage -> DEBU 122b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.624 UTC [gossip.gossip] handleMessage -> DEBU 122c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.624 UTC [gossip.discovery] handleMsgFromComm -> DEBU 122d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.624 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 122e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:15.625 UTC [msp.identity] Verify -> DEBU 122f Verify: digest = 00000000 1d 00 62 c6 37 38 09 82 bd 27 d6 5b 40 96 ce 84 |..b.78...'.[@...| +peer0.org1.example.com | 00000010 fe cb be 53 6d b7 dc 6c f1 66 aa 08 c8 cc 57 12 |...Sm..l.f....W.|" +peer0.org1.example.com | "2019-09-24 00:25:15.625 UTC [msp.identity] Verify -> DEBU 1230 Verify: sig = 00000000 30 45 02 21 00 91 c2 5e 0e 00 50 40 6a 32 a1 ca |0E.!...^..P@j2..| +peer0.org1.example.com | 00000010 b6 a1 b0 28 0b e7 fc 0a a2 0f c3 0c 12 5f e6 78 |...(........._.x| +peer0.org1.example.com | 00000020 be 41 21 eb 4c 02 20 16 d7 c6 49 2b 3c b8 9a d6 |.A!.L. ...I+<...| +peer0.org1.example.com | 00000030 fb bb 44 43 1d 45 d8 ca 01 4f 14 4b 87 08 45 1b |..DC.E...O.K..E.| +peer0.org1.example.com | 00000040 4d 4c ec 83 de 30 06 |ML...0.|" +peer0.org1.example.com | "2019-09-24 00:25:15.625 UTC [msp.identity] Verify -> DEBU 1231 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:15.625 UTC [msp.identity] Verify -> DEBU 1232 Verify: sig = 00000000 30 45 02 21 00 ef 48 3c 39 1d 4f 9e ba 30 d8 47 |0E.!..H<9.O..0.G| +peer0.org1.example.com | 00000010 0d 4d 33 db db 53 c7 71 0a 02 7b cf 3d ef 7b e5 |.M3..S.q..{.=.{.| +peer0.org1.example.com | 00000020 a5 50 aa 20 cb 02 20 11 9d e4 fd d2 7d a8 c7 23 |.P. .. .....}..#| +peer0.org1.example.com | 00000030 e1 f0 eb 49 8b ca aa 03 39 a4 d9 6d 9e 62 6e 6b |...I....9..m.bnk| +peer0.org1.example.com | 00000040 e0 c5 2b 69 e7 d3 5a |..+i..Z|" +peer0.org1.example.com | "2019-09-24 00:25:15.625 UTC [gossip.discovery] handleAliveMessage -> DEBU 1233 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.625 UTC [gossip.discovery] isSentByMe -> DEBU 1234 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.625 UTC [gossip.discovery] handleAliveMessage -> DEBU 1235 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1236 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.632 UTC [gossip.gossip] handleMessage -> DEBU 1237 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.632 UTC [gossip.gossip] handleMessage -> DEBU 1238 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.632 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1239 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.632 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 123a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:15.632 UTC [msp.identity] Verify -> DEBU 123b Verify: digest = 00000000 1d 00 62 c6 37 38 09 82 bd 27 d6 5b 40 96 ce 84 |..b.78...'.[@...| +peer0.org1.example.com | 00000010 fe cb be 53 6d b7 dc 6c f1 66 aa 08 c8 cc 57 12 |...Sm..l.f....W.|" +peer0.org1.example.com | "2019-09-24 00:25:15.632 UTC [msp.identity] Verify -> DEBU 123c Verify: sig = 00000000 30 45 02 21 00 91 c2 5e 0e 00 50 40 6a 32 a1 ca |0E.!...^..P@j2..| +peer0.org1.example.com | 00000010 b6 a1 b0 28 0b e7 fc 0a a2 0f c3 0c 12 5f e6 78 |...(........._.x| +peer0.org1.example.com | 00000020 be 41 21 eb 4c 02 20 16 d7 c6 49 2b 3c b8 9a d6 |.A!.L. ...I+<...| +orderer0.example.com | "2019-09-24 00:27:09.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:10.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:10.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3c Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +orderer0.example.com | "2019-09-24 00:27:10.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.2µs " +orderer0.example.com | "2019-09-24 00:27:10.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3e Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-09-24 00:27:10.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3f Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +orderer0.example.com | "2019-09-24 00:27:10.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.1µs " +orderer0.example.com | "2019-09-24 00:27:10.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.4µs " +orderer0.example.com | "2019-09-24 00:27:10.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a42 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:10.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a43 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:10.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a44 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:10.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a45 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2019-09-24 00:27:10.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54µs " +orderer0.example.com | "2019-09-24 00:27:10.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a47 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-09-24 00:27:10.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a48 Sending msg of 28 bytes to 3 on channel businesschannel took 66.4µs" +orderer0.example.com | "2019-09-24 00:27:10.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.9µs " +orderer0.example.com | "2019-09-24 00:27:10.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.9µs " +orderer0.example.com | "2019-09-24 00:27:10.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a4b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:10.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a4c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:11.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a4d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:11.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a4e Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +orderer0.example.com | "2019-09-24 00:27:11.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.8µs " +orderer0.example.com | "2019-09-24 00:27:11.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a50 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +orderer0.example.com | "2019-09-24 00:27:11.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a51 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-09-24 00:27:11.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.6µs " +orderer0.example.com | "2019-09-24 00:27:11.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.5µs " +orderer0.example.com | "2019-09-24 00:27:11.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a54 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:11.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a55 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:11.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a56 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:11.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a57 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +orderer0.example.com | "2019-09-24 00:27:11.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165µs " +orderer0.example.com | "2019-09-24 00:27:11.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a59 Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +orderer0.example.com | "2019-09-24 00:27:11.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a5a Sending msg of 28 bytes to 3 on channel businesschannel took 8.2µs" +orderer0.example.com | "2019-09-24 00:27:11.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " +orderer0.example.com | "2019-09-24 00:27:11.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 343µs " +orderer0.example.com | "2019-09-24 00:27:11.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a5d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:11.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a5e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:12.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a5f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:12.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a60 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2019-09-24 00:27:12.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.9µs " +orderer0.example.com | "2019-09-24 00:27:12.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a62 Sending msg of 28 bytes to 2 on channel businesschannel took 142.3µs" +orderer0.example.com | "2019-09-24 00:27:12.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a63 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2019-09-24 00:27:12.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.5µs " +orderer0.example.com | "2019-09-24 00:27:12.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 305.2µs " +orderer0.example.com | "2019-09-24 00:27:12.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a66 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:12.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a67 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:12.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a68 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:12.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a69 Sending msg of 28 bytes to 3 on channel testchainid took 77.6µs" +orderer0.example.com | "2019-09-24 00:27:12.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.2µs " +orderer0.example.com | "2019-09-24 00:27:12.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6b Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +orderer0.example.com | "2019-09-24 00:27:12.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6c Sending msg of 28 bytes to 3 on channel businesschannel took 9.1µs" +orderer0.example.com | "2019-09-24 00:27:12.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.6µs " +orderer0.example.com | "2019-09-24 00:27:12.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.5µs " +orderer0.example.com | "2019-09-24 00:27:12.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a6f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:12.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a70 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:13.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a71 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:13.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a72 Sending msg of 28 bytes to 3 on channel testchainid took 130.5µs" +orderer0.example.com | "2019-09-24 00:27:13.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.9µs " +orderer0.example.com | "2019-09-24 00:27:13.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a74 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +orderer0.example.com | "2019-09-24 00:27:13.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a75 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +orderer0.example.com | "2019-09-24 00:27:13.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.3µs " +orderer0.example.com | "2019-09-24 00:27:13.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.5µs " +orderer0.example.com | "2019-09-24 00:27:13.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a78 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:13.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a79 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:13.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a7a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:13.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a7b Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +orderer0.example.com | "2019-09-24 00:27:13.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.1µs " +orderer0.example.com | "2019-09-24 00:27:13.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a7d Sending msg of 28 bytes to 3 on channel businesschannel took 42.3µs" +orderer0.example.com | "2019-09-24 00:27:13.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a7e Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +orderer0.example.com | "2019-09-24 00:27:13.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102µs " +orderer0.example.com | "2019-09-24 00:27:13.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.1µs " +orderer0.example.com | "2019-09-24 00:27:13.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a81 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:13.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a82 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:13.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a83 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:13.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a84 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2019-09-24 00:27:14.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.6µs " +orderer0.example.com | "2019-09-24 00:27:14.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a86 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-09-24 00:27:14.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a87 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +orderer0.example.com | "2019-09-24 00:27:14.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.1µs " +orderer0.example.com | "2019-09-24 00:27:14.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.3µs " +orderer0.example.com | "2019-09-24 00:27:14.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a8a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:14.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a8b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:14.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a8c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:14.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8d Sending msg of 28 bytes to 3 on channel testchainid took 51.1µs" +orderer0.example.com | "2019-09-24 00:27:14.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a8e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs " +orderer0.example.com | "2019-09-24 00:27:14.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8f Sending msg of 28 bytes to 2 on channel businesschannel took 52.6µs" +orderer0.example.com | "2019-09-24 00:27:14.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a90 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +orderer0.example.com | "2019-09-24 00:27:14.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.6µs " +orderer0.example.com | "2019-09-24 00:27:14.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.9µs " +orderer0.example.com | "2019-09-24 00:27:14.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a93 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:14.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a94 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:15.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a95 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:15.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a96 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +orderer0.example.com | "2019-09-24 00:27:15.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.7µs " +orderer0.example.com | "2019-09-24 00:27:15.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a99 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-09-24 00:27:15.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a9a Sending msg of 28 bytes to 2 on channel businesschannel took 9.4µs" +orderer0.example.com | "2019-09-24 00:27:15.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.7µs " +orderer0.example.com | "2019-09-24 00:27:15.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +orderer0.example.com | "2019-09-24 00:27:15.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:15.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:15.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:15.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a9f Sending msg of 28 bytes to 3 on channel testchainid took 86.2µs" +orderer0.example.com | "2019-09-24 00:27:15.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58µs " +orderer0.example.com | "2019-09-24 00:27:15.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa1 Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +orderer0.example.com | "2019-09-24 00:27:15.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa2 Sending msg of 28 bytes to 2 on channel businesschannel took 11.8µs" +orderer0.example.com | "2019-09-24 00:27:15.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.2µs " +orderer0.example.com | "2019-09-24 00:27:15.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.4µs " +orderer0.example.com | "2019-09-24 00:27:15.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:15.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:16.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:16.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa8 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +orderer0.example.com | "2019-09-24 00:27:16.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.7µs " +orderer0.example.com | "2019-09-24 00:27:16.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aaa Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +orderer0.example.com | "2019-09-24 00:27:16.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aab Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +orderer0.example.com | "2019-09-24 00:27:16.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 547.5µs " +orderer0.example.com | "2019-09-24 00:27:16.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aad Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:16.316 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 513.4µs " +orderer0.example.com | "2019-09-24 00:27:16.318 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aaf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:16.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:16.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ab1 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +orderer0.example.com | "2019-09-24 00:27:16.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 725.6µs " +orderer0.example.com | "2019-09-24 00:27:16.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ab3 Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +orderer0.example.com | "2019-09-24 00:27:16.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.9µs " +orderer0.example.com | "2019-09-24 00:27:16.815 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.9µs " +orderer0.example.com | "2019-09-24 00:27:16.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:16.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ab7 Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +orderer0.example.com | "2019-09-24 00:27:16.817 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:17.013 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:17.013 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aba Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +orderer0.example.com | "2019-09-24 00:27:17.013 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1abb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.3µs " +orderer0.example.com | "2019-09-24 00:27:17.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1abc Sending msg of 28 bytes to 2 on channel businesschannel took 27.2µs" +orderer0.example.com | "2019-09-24 00:27:17.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1abd Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-09-24 00:27:17.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1abe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.8µs " +orderer0.example.com | "2019-09-24 00:27:17.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1abf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.1µs " +orderer0.example.com | "2019-09-24 00:27:17.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ac0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:17.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ac1 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:17.499 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ac2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:17.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ac3 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2019-09-24 00:27:17.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ac4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " +orderer0.example.com | "2019-09-24 00:27:17.816 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ac5 Sending msg of 28 bytes to 2 on channel businesschannel took 1.6301ms" +orderer0.example.com | "2019-09-24 00:27:17.816 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ac6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +orderer0.example.com | "2019-09-24 00:27:17.817 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ac7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 302.1µs " +orderer0.example.com | "2019-09-24 00:27:17.817 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ac8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.5µs " +orderer0.example.com | "2019-09-24 00:27:17.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ac9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:17.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aca Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:17.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1acb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:18.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1acc Sending msg of 28 bytes to 3 on channel testchainid took 40.7µs" +orderer0.example.com | "2019-09-24 00:27:18.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1acd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.3µs " +orderer0.example.com | "2019-09-24 00:27:18.317 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ace Sending msg of 28 bytes to 3 on channel businesschannel took 29.5µs" +orderer0.example.com | "2019-09-24 00:27:18.317 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1acf Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +orderer0.example.com | "2019-09-24 00:27:18.318 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ad0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98µs " +orderer0.example.com | "2019-09-24 00:27:18.318 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ad1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.6µs " +orderer0.example.com | "2019-09-24 00:27:18.319 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ad2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:18.319 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ad3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:18.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ad4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:18.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ad5 Sending msg of 28 bytes to 3 on channel testchainid took 18µs" +orderer0.example.com | "2019-09-24 00:27:18.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ad6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.6µs " +orderer0.example.com | "2019-09-24 00:27:18.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ad7 Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" +orderer0.example.com | "2019-09-24 00:27:18.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ad8 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2019-09-24 00:27:18.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ad9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.6µs " +orderer0.example.com | "2019-09-24 00:27:18.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ada Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.4µs " +orderer0.example.com | "2019-09-24 00:27:18.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1adb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:18.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1adc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:19.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1add Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:19.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ade Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +orderer0.example.com | "2019-09-24 00:27:19.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1adf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.8µs " +orderer0.example.com | "2019-09-24 00:27:19.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ae0 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-09-24 00:27:19.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ae1 Sending msg of 28 bytes to 2 on channel businesschannel took 13.1µs" +orderer0.example.com | "2019-09-24 00:27:19.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ae2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 347.9µs " +orderer0.example.com | "2019-09-24 00:27:19.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ae3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.6µs " +orderer0.example.com | "2019-09-24 00:27:19.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:19.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:19.354 UTC [orderer.common.server] Deliver -> DEBU 1ae6 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:19.354 UTC [common.deliver] Handle -> DEBU 1ae7 Starting new deliver loop for 172.18.0.9:32914" +orderer0.example.com | "2019-09-24 00:27:19.354 UTC [common.deliver] Handle -> DEBU 1ae8 Attempting to read seek info message from 172.18.0.9:32914" +orderer0.example.com | "2019-09-24 00:27:19.364 UTC [orderer.common.server] Broadcast -> DEBU 1ae9 Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 00:27:19.364 UTC [orderer.common.broadcast] Handle -> DEBU 1aea Starting new broadcast loop for 172.18.0.9:32916" +orderer0.example.com | "2019-09-24 00:27:19.365 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1aeb [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:32916" +orderer0.example.com | "2019-09-24 00:27:19.365 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1aec Processing config update message for channel businesschannel" +orderer0.example.com | "2019-09-24 00:27:19.365 UTC [policies] Evaluate -> DEBU 1aed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 00:27:19.365 UTC [policies] Evaluate -> DEBU 1aee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:19.365 UTC [policies] Evaluate -> DEBU 1aef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 00:27:19.365 UTC [policies] Evaluate -> DEBU 1af0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:19.365 UTC [policies] Evaluate -> DEBU 1af1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 00:27:19.365 UTC [cauthdsl] func1 -> DEBU 1af2 0xc000b55210 gate 1569284839365789800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:19.365 UTC [cauthdsl] func2 -> DEBU 1af3 0xc000b55210 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:19.365 UTC [cauthdsl] func2 -> DEBU 1af4 0xc000b55210 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:19.365 UTC [cauthdsl] func2 -> DEBU 1af5 0xc000b55210 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [msp.identity] Verify -> DEBU 1af6 Verify: digest = 00000000 32 dc 61 be 75 20 6f 4b 63 be 3f 2e b3 9a a0 e1 |2.a.u oKc.?.....| +orderer0.example.com | 00000010 43 c9 04 95 04 db 65 4f 3a 11 aa ca d9 c3 ed e7 |C.....eO:.......|" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [msp.identity] Verify -> DEBU 1af7 Verify: sig = 00000000 30 45 02 21 00 aa 47 b6 5e db fe b3 b3 5a b7 50 |0E.!..G.^....Z.P| +orderer0.example.com | 00000010 31 e9 ff c6 7c 57 e2 06 5c b9 e5 c9 d9 55 dc 16 |1...|W..\....U..| +orderer0.example.com | 00000020 66 14 a4 36 d0 02 20 4b 8e f4 46 3c 3e d2 50 67 |f..6.. K..F<>.Pg| +orderer0.example.com | 00000030 c4 0b b9 d1 f9 2e b2 3b 51 0d 95 37 f5 86 63 a9 |.......;Q..7..c.| +orderer0.example.com | 00000040 b5 ff 8f a9 ea 68 ae |.....h.|" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [cauthdsl] func2 -> DEBU 1af8 0xc000b55210 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [cauthdsl] func1 -> DEBU 1af9 0xc000b55210 gate 1569284839365789800 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1afa Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1afb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1afc Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | 00000030 fb bb 44 43 1d 45 d8 ca 01 4f 14 4b 87 08 45 1b |..DC.E...O.K..E.| +peer0.org1.example.com | 00000040 4d 4c ec 83 de 30 06 |ML...0.|" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [gossip.discovery] handleAliveMessage -> DEBU 123d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [gossip.discovery] isSentByMe -> DEBU 123e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [gossip.discovery] handleAliveMessage -> DEBU 123f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1240 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [msp] DeserializeIdentity -> DEBU 1241 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1242 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1243 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1244 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [policies] Evaluate -> DEBU 1245 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [policies] Evaluate -> DEBU 1246 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [policies] Evaluate -> DEBU 1247 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [cauthdsl] func1 -> DEBU 1248 0xc0033412d0 gate 1569284715633748700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [cauthdsl] func2 -> DEBU 1249 0xc0033412d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [cauthdsl] func2 -> DEBU 124a 0xc0033412d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:15.633 UTC [cauthdsl] func2 -> DEBU 124b 0xc0033412d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [cauthdsl] func2 -> DEBU 124c 0xc0033412d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [cauthdsl] func1 -> DEBU 124d 0xc0033412d0 gate 1569284715633748700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [policies] Evaluate -> DEBU 124e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [policies] Evaluate -> DEBU 124f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [policies] Evaluate -> DEBU 1250 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [cauthdsl] func1 -> DEBU 1251 0xc003341b10 gate 1569284715634216900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [cauthdsl] func2 -> DEBU 1252 0xc003341b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [cauthdsl] func2 -> DEBU 1253 0xc003341b10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [cauthdsl] func2 -> DEBU 1254 0xc003341b10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [msp.identity] Verify -> DEBU 1255 Verify: digest = 00000000 cd 7b 68 02 88 eb 7f 8e 4c 83 28 22 fe 83 7e bd |.{h.....L.("..~.| +peer0.org1.example.com | 00000010 f5 3b 8c c1 40 f8 8a b0 54 91 0b b9 7b 0a 80 b2 |.;..@...T...{...|" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [msp.identity] Verify -> DEBU 1256 Verify: sig = 00000000 30 45 02 21 00 94 ac b6 e1 2a 5b 03 b1 c2 df bf |0E.!.....*[.....| +peer0.org1.example.com | 00000010 dd 65 18 5b 65 34 63 d4 18 84 b6 d3 d9 a5 69 97 |.e.[e4c.......i.| +peer0.org1.example.com | 00000020 b8 ad a2 fe bd 02 20 50 d3 8f 51 db 6c 94 a3 03 |...... P..Q.l...| +peer0.org1.example.com | 00000030 d9 6f 32 a5 96 94 11 85 d3 bb d1 d6 b9 14 19 0a |.o2.............| +peer0.org1.example.com | 00000040 03 09 46 e9 77 5f 8a |..F.w_.|" +peer0.org1.example.com | "2019-09-24 00:25:15.634 UTC [cauthdsl] func2 -> DEBU 1257 0xc003341b10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:15.635 UTC [cauthdsl] func1 -> DEBU 1258 0xc003341b10 gate 1569284715634216900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:15.635 UTC [policies] Evaluate -> DEBU 1259 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.635 UTC [policies] Evaluate -> DEBU 125a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.635 UTC [policies] Evaluate -> DEBU 125b Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1afd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1afe Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1aff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [common.configtx] addToMap -> DEBU 1b00 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [common.configtx] addToMap -> DEBU 1b01 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [common.configtx] addToMap -> DEBU 1b02 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.366 UTC [common.configtx] addToMap -> DEBU 1b03 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b04 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b05 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b06 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b07 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b08 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b09 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b0a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b0b Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b0c Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b0d Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b0e Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b0f Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b10 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b11 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b12 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b13 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b14 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b15 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b16 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b17 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b18 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b19 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b1a Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b1b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] verifyDeltaSet -> DEBU 1b1c Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.368 UTC [common.configtx] verifyDeltaSet -> DEBU 1b1d Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [common.configtx] verifyDeltaSet -> DEBU 1b1e Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [common.configtx] verifyDeltaSet -> DEBU 1b1f Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [common.configtx] verifyDeltaSet -> DEBU 1b20 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [common.configtx] policyForItem -> DEBU 1b21 Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b22 Manager Channel looking up path []" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b23 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b24 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b25 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b26 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b27 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b28 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b29 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b2a Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Evaluate -> DEBU 1b2b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Evaluate -> DEBU 1b2c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [policies] Evaluate -> DEBU 1b2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [cauthdsl] deduplicate -> WARN 1b2e De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-09-24 00:27:19.369 UTC [cauthdsl] func1 -> DEBU 1b2f 0xc000b1cde0 gate 1569284839369899400 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:19.370 UTC [cauthdsl] func2 -> DEBU 1b30 0xc000b1cde0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-09-24 00:27:19.370 UTC [cauthdsl] func2 -> DEBU 1b31 0xc000b1cde0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:19.370 UTC [cauthdsl] func2 -> DEBU 1b32 0xc000b1cde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [cauthdsl] func2 -> DEBU 1b33 0xc000b1cde0 processing identity 1 with bytes of fd0d80" +peer0.org1.example.com | "2019-09-24 00:25:15.635 UTC [policies] Evaluate -> DEBU 125c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.635 UTC [gossip.discovery] handleAliveMessage -> DEBU 125d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.635 UTC [gossip.discovery] handleAliveMessage -> DEBU 125e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 125f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:15.635 UTC [msp.identity] Verify -> DEBU 1260 Verify: digest = 00000000 ff 13 c1 de 85 f4 6e 52 51 6e d6 0a a8 2c 1d 6e |......nRQn...,.n| +peer0.org1.example.com | 00000010 2c 29 a2 8d 1f 5b 45 14 3f 5c ba a2 32 54 49 d0 |,)...[E.?\..2TI.|" +peer0.org1.example.com | "2019-09-24 00:25:15.636 UTC [msp.identity] Verify -> DEBU 1261 Verify: sig = 00000000 30 45 02 21 00 d3 6e e2 b3 04 c6 48 76 12 04 71 |0E.!..n....Hv..q| +peer0.org1.example.com | 00000010 5d bc 29 18 9f 9a 8a a2 e5 35 09 ec bc 11 00 88 |].)......5......| +peer0.org1.example.com | 00000020 c6 b3 b5 00 6d 02 20 3d 43 ab 18 b2 99 42 41 0a |....m. =C....BA.| +peer0.org1.example.com | 00000030 d6 91 af ca 03 94 c0 65 f0 42 86 bc 7d 10 45 86 |.......e.B..}.E.| +peer0.org1.example.com | 00000040 53 7e 1e 2f d7 f6 0e |S~./...|" +peer0.org1.example.com | "2019-09-24 00:25:15.636 UTC [gossip.discovery] handleAliveMessage -> DEBU 1262 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.636 UTC [gossip.discovery] handleAliveMessage -> DEBU 1263 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.636 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1264 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.637 UTC [gossip.comm] func1 -> DEBU 1265 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.637 UTC [gossip.gossip] handleMessage -> DEBU 1266 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.637 UTC [gossip.gossip] handleMessage -> DEBU 1267 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1268 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.638 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1269 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:15.638 UTC [msp.identity] Verify -> DEBU 126a Verify: digest = 00000000 1d 00 62 c6 37 38 09 82 bd 27 d6 5b 40 96 ce 84 |..b.78...'.[@...| +peer0.org1.example.com | 00000010 fe cb be 53 6d b7 dc 6c f1 66 aa 08 c8 cc 57 12 |...Sm..l.f....W.|" +peer0.org1.example.com | "2019-09-24 00:25:15.638 UTC [msp.identity] Verify -> DEBU 126b Verify: sig = 00000000 30 45 02 21 00 91 c2 5e 0e 00 50 40 6a 32 a1 ca |0E.!...^..P@j2..| +peer0.org1.example.com | 00000010 b6 a1 b0 28 0b e7 fc 0a a2 0f c3 0c 12 5f e6 78 |...(........._.x| +peer0.org1.example.com | 00000020 be 41 21 eb 4c 02 20 16 d7 c6 49 2b 3c b8 9a d6 |.A!.L. ...I+<...| +peer0.org1.example.com | 00000030 fb bb 44 43 1d 45 d8 ca 01 4f 14 4b 87 08 45 1b |..DC.E...O.K..E.| +peer0.org1.example.com | 00000040 4d 4c ec 83 de 30 06 |ML...0.|" +peer0.org1.example.com | "2019-09-24 00:25:15.639 UTC [gossip.discovery] handleAliveMessage -> DEBU 126c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.639 UTC [gossip.discovery] isSentByMe -> DEBU 126d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.639 UTC [gossip.discovery] handleAliveMessage -> DEBU 126e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.639 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 126f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:15.648 UTC [msp] DeserializeIdentity -> DEBU 1270 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1271 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1272 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1273 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 1274 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 1275 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 1276 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [cauthdsl] func1 -> DEBU 1277 0xc0037a6fd0 gate 1569284715649351300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 1278 0xc0037a6fd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 1279 0xc0037a6fd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 127a 0xc0037a6fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 127b 0xc0037a6fd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [cauthdsl] func1 -> DEBU 127c 0xc0037a6fd0 gate 1569284715649351300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 127d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 127e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 127f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [cauthdsl] func1 -> DEBU 1280 0xc0037a7820 gate 1569284715649678200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 1281 0xc0037a7820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 1283 0xc0037a7820 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 1284 0xc0037a7820 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:15.648 UTC [gossip.comm] func1 -> DEBU 1282 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [msp.identity] Verify -> DEBU 1285 Verify: digest = 00000000 75 9a 5a 1c 6f 13 65 e4 9e 0c c8 19 66 6a 08 18 |u.Z.o.e.....fj..| +peer0.org1.example.com | 00000010 2c 7d 7b 62 4b de f7 a8 d9 d1 9e 6a 69 bc fe fe |,}{bK......ji...|" +peer0.org1.example.com | "2019-09-24 00:25:15.649 UTC [msp.identity] Verify -> DEBU 1286 Verify: sig = 00000000 30 44 02 20 18 ab 91 c4 cd 6f 82 96 04 1a 82 65 |0D. .....o.....e| +peer0.org1.example.com | 00000010 17 d2 20 33 8d ed 42 a6 81 93 ae 85 b7 78 d1 95 |.. 3..B......x..| +peer0.org1.example.com | 00000020 2a 7d 2f 5d 02 20 5a 07 fb 72 58 7f 36 3c 49 86 |*}/]. Z..rX.6 DEBU 1287 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [cauthdsl] func2 -> DEBU 1288 0xc0037a7820 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [cauthdsl] func1 -> DEBU 1289 0xc0037a7820 gate 1569284715649678200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [policies] Evaluate -> DEBU 128a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [policies] Evaluate -> DEBU 128b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [policies] Evaluate -> DEBU 128c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [policies] Evaluate -> DEBU 128d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 128e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 128f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 1290 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 1291 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 1292 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 1293 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 1294 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1295 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [gossip.comm] func1 -> DEBU 1296 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1297 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1b34 Checking if identity satisfies ADMIN role for Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [cauthdsl] func2 -> DEBU 1b35 0xc000b1cde0 principal matched by identity 1" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [msp.identity] Verify -> DEBU 1b36 Verify: digest = 00000000 b9 ca 25 b9 18 4b 4c cb f9 ed 69 2e e4 b0 01 32 |..%..KL...i....2| +orderer0.example.com | 00000010 7e d5 0e 8f db 9c d1 12 47 66 47 e2 f9 42 f2 92 |~.......GfG..B..|" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [msp.identity] Verify -> DEBU 1b37 Verify: sig = 00000000 30 44 02 20 6f 93 cb 0e 30 b4 01 2a 3e 5c 70 08 |0D. o...0..*>\p.| +orderer0.example.com | 00000010 f4 b3 a7 c6 8d d3 d2 16 33 9b 93 be 91 8a 0e 0a |........3.......| +orderer0.example.com | 00000020 14 03 96 82 02 20 25 f6 18 45 c0 ea 93 0a be f5 |..... %..E......| +orderer0.example.com | 00000030 1d 09 80 60 65 19 94 68 46 86 00 e0 07 4b 6c 2e |...`e..hF....Kl.| +orderer0.example.com | 00000040 99 b4 f8 c0 85 d3 |......|" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [cauthdsl] func2 -> DEBU 1b38 0xc000b1cde0 principal evaluation succeeds for identity 1" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [cauthdsl] func1 -> DEBU 1b39 0xc000b1cde0 gate 1569284839369899400 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [policies] Evaluate -> DEBU 1b3a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [policies] Evaluate -> DEBU 1b3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [policies] Evaluate -> DEBU 1b3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [cauthdsl] deduplicate -> WARN 1b3d De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-09-24 00:27:19.371 UTC [cauthdsl] func1 -> DEBU 1b3e 0xc000b1d740 gate 1569284839371938900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [cauthdsl] func2 -> DEBU 1b3f 0xc000b1d740 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [cauthdsl] func2 -> DEBU 1b40 0xc000b1d740 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1b41 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [cauthdsl] func2 -> DEBU 1b42 0xc000b1d740 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [msp.identity] Verify -> DEBU 1b43 Verify: digest = 00000000 48 77 a9 76 ae c6 d0 00 08 e1 87 61 5a 35 3b 84 |Hw.v.......aZ5;.| +orderer0.example.com | 00000010 16 95 5c 0b c0 a8 fc c1 cf 92 2d eb 73 05 3b 4a |..\.......-.s.;J|" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [msp.identity] Verify -> DEBU 1b44 Verify: sig = 00000000 30 44 02 20 4c 82 9e d8 a1 76 a3 a3 75 1d 20 c9 |0D. L....v..u. .| +orderer0.example.com | 00000010 3e 86 10 3b d1 1d 25 b5 e5 d4 bc e4 42 6b 38 bd |>..;..%.....Bk8.| +orderer0.example.com | 00000020 f6 ad d6 81 02 20 68 bc f4 5b 2d ee d1 96 32 c3 |..... h..[-...2.| +orderer0.example.com | 00000030 97 14 67 8c 23 1e 47 0f c7 05 3b 29 c9 13 7b 07 |..g.#.G...;)..{.| +orderer0.example.com | 00000040 8f a7 92 fd d1 08 |......|" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [cauthdsl] func2 -> DEBU 1b45 0xc000b1d740 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [cauthdsl] func1 -> DEBU 1b46 0xc000b1d740 gate 1569284839371938900 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [policies] Evaluate -> DEBU 1b47 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [policies] Evaluate -> DEBU 1b48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [policies] Evaluate -> DEBU 1b49 Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [policies] Evaluate -> DEBU 1b4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:27:19.372 UTC [common.configtx] verifyDeltaSet -> DEBU 1b4b Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.373 UTC [common.configtx] verifyDeltaSet -> DEBU 1b4c Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b4d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b4e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b4f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b50 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b51 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b52 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b53 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b54 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b55 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b56 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b57 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b58 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b59 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5a Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5b Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1298 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:15.650 UTC [msp] DeserializeIdentity -> DEBU 1299 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.651 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 129a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:15.651 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 129b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:15.663 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 129c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:15.663 UTC [policies] Evaluate -> DEBU 129d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.663 UTC [policies] Evaluate -> DEBU 129e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:15.663 UTC [policies] Evaluate -> DEBU 129f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.663 UTC [cauthdsl] func1 -> DEBU 12a0 0xc0037b9870 gate 1569284715663423900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:15.663 UTC [cauthdsl] func2 -> DEBU 12a1 0xc0037b9870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:15.663 UTC [cauthdsl] func2 -> DEBU 12a2 0xc0037b9870 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:15.663 UTC [cauthdsl] func2 -> DEBU 12a3 0xc0037b9870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:15.663 UTC [cauthdsl] func2 -> DEBU 12a4 0xc0037b9870 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:15.664 UTC [cauthdsl] func1 -> DEBU 12a5 0xc0037b9870 gate 1569284715663423900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:15.664 UTC [policies] Evaluate -> DEBU 12a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.664 UTC [policies] Evaluate -> DEBU 12a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.664 UTC [policies] Evaluate -> DEBU 12a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.664 UTC [cauthdsl] func1 -> DEBU 12a9 0xc0037fa0b0 gate 1569284715664455600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:15.664 UTC [cauthdsl] func2 -> DEBU 12aa 0xc0037fa0b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:15.664 UTC [cauthdsl] func2 -> DEBU 12ab 0xc0037fa0b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:15.664 UTC [cauthdsl] func2 -> DEBU 12ac 0xc0037fa0b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:15.664 UTC [msp.identity] Verify -> DEBU 12ad Verify: digest = 00000000 75 9a 5a 1c 6f 13 65 e4 9e 0c c8 19 66 6a 08 18 |u.Z.o.e.....fj..| +peer0.org1.example.com | 00000010 2c 7d 7b 62 4b de f7 a8 d9 d1 9e 6a 69 bc fe fe |,}{bK......ji...|" +peer0.org1.example.com | "2019-09-24 00:25:15.664 UTC [msp.identity] Verify -> DEBU 12ae Verify: sig = 00000000 30 44 02 20 18 ab 91 c4 cd 6f 82 96 04 1a 82 65 |0D. .....o.....e| +peer0.org1.example.com | 00000010 17 d2 20 33 8d ed 42 a6 81 93 ae 85 b7 78 d1 95 |.. 3..B......x..| +peer0.org1.example.com | 00000020 2a 7d 2f 5d 02 20 5a 07 fb 72 58 7f 36 3c 49 86 |*}/]. Z..rX.6 DEBU 12af 0xc0037fa0b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:15.664 UTC [cauthdsl] func1 -> DEBU 12b0 0xc0037fa0b0 gate 1569284715664455600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:15.665 UTC [policies] Evaluate -> DEBU 12b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.665 UTC [policies] Evaluate -> DEBU 12b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.665 UTC [policies] Evaluate -> DEBU 12b3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.665 UTC [policies] Evaluate -> DEBU 12b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 12b5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 12b6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.665 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12b7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.665 UTC [gossip.gossip] handleMessage -> DEBU 12b8 Exiting" +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b60 Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b61 Setting policy for key Endorsement to " +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b62 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b63 Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b64 Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b65 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b66 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b67 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] NewStandardValues -> DEBU 1b68 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b69 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b6a Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b6b Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b6c Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b6d Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] NewStandardValues -> DEBU 1b6e Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b6f Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b70 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b71 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b72 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b73 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:27:19.376 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b74 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.376 UTC [common.channelconfig] NewStandardValues -> DEBU 1b75 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.376 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b76 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:27:19.376 UTC [common.channelconfig] NewStandardValues -> DEBU 1b77 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:27:19.376 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b78 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:27:19.376 UTC [common.channelconfig] validateMSP -> DEBU 1b79 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.376 UTC [msp] newBccspMsp -> DEBU 1b7a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.376 UTC [msp] New -> DEBU 1b7b Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.376 UTC [msp] Setup -> DEBU 1b7c Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:27:19.376 UTC [msp.identity] newIdentity -> DEBU 1b7d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.377 UTC [msp.identity] newIdentity -> DEBU 1b7e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.377 UTC [msp] Validate -> DEBU 1b7f MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.377 UTC [common.channelconfig] NewStandardValues -> DEBU 1b80 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:27:19.377 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b81 Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:27:19.377 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b82 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.377 UTC [common.channelconfig] NewStandardValues -> DEBU 1b83 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.377 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b84 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.377 UTC [common.channelconfig] NewStandardValues -> DEBU 1b85 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:27:19.377 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b86 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:25:15.665 UTC [gossip.gossip] handleMessage -> DEBU 12b9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.666 UTC [gossip.gossip] handleMessage -> DEBU 12ba Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.666 UTC [gossip.gossip] handleMessage -> DEBU 12bb Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12bc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12bd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12be Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12bf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.666 UTC [gossip.gossip] handleMessage -> DEBU 12c0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.668 UTC [msp] DeserializeIdentity -> DEBU 12c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.669 UTC [gossip.comm] Send -> DEBU 12c8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:15.670 UTC [msp] DeserializeIdentity -> DEBU 12c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.676 UTC [msp] DeserializeIdentity -> DEBU 12ca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.677 UTC [gossip.comm] Send -> DEBU 12cb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:15.688 UTC [gossip.comm] sendToEndpoint -> DEBU 12cc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.688 UTC [gossip.comm] sendToEndpoint -> DEBU 12cd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.689 UTC [gossip.comm] sendToEndpoint -> DEBU 12ce Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.689 UTC [gossip.comm] sendToEndpoint -> DEBU 12cf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.958 UTC [gossip.gossip] handleMessage -> DEBU 12d0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.958 UTC [gossip.pull] HandleMessage -> DEBU 12d1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.958 UTC [gossip.pull] SendDigest -> DEBU 12d8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:15.958 UTC [gossip.gossip] handleMessage -> DEBU 12d9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.971 UTC [gossip.gossip] handleMessage -> DEBU 12da Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [gossip.gossip] handleMessage -> DEBU 12db Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12dc Got message: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 12dd Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [msp] DeserializeIdentity -> DEBU 12de Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:19.378 UTC [common.channelconfig] Validate -> DEBU 1b87 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:27:19.378 UTC [common.channelconfig] validateMSP -> DEBU 1b88 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.378 UTC [msp] newBccspMsp -> DEBU 1b89 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.378 UTC [msp] New -> DEBU 1b8a Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.378 UTC [msp] Setup -> DEBU 1b8b Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.378 UTC [msp.identity] newIdentity -> DEBU 1b8c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.378 UTC [msp.identity] newIdentity -> DEBU 1b8d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.379 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1b8e Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.379 UTC [msp] Validate -> DEBU 1b8f MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.379 UTC [msp] getCertificationChain -> DEBU 1b90 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.379 UTC [msp] hasOURole -> DEBU 1b91 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:27:19.379 UTC [msp] getCertificationChain -> DEBU 1b92 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.379 UTC [common.channelconfig] NewStandardValues -> DEBU 1b93 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.380 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b94 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.380 UTC [common.channelconfig] NewStandardValues -> DEBU 1b95 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:27:19.380 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b96 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:27:19.380 UTC [common.channelconfig] Validate -> DEBU 1b97 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:27:19.380 UTC [common.channelconfig] validateMSP -> DEBU 1b98 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.380 UTC [msp] newBccspMsp -> DEBU 1b99 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.380 UTC [msp] New -> DEBU 1b9a Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.380 UTC [msp] Setup -> DEBU 1b9b Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.380 UTC [msp.identity] newIdentity -> DEBU 1b9c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.381 UTC [msp.identity] newIdentity -> DEBU 1b9d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.381 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1b9e Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.381 UTC [msp] Validate -> DEBU 1b9f MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.382 UTC [msp] getCertificationChain -> DEBU 1ba0 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.382 UTC [msp] hasOURole -> DEBU 1ba1 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:27:19.382 UTC [msp] getCertificationChain -> DEBU 1ba2 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.382 UTC [common.channelconfig] NewStandardValues -> DEBU 1ba3 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.382 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ba4 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.382 UTC [common.channelconfig] NewStandardValues -> DEBU 1ba5 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:27:19.382 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ba6 Processing field: MSP" +orderer0.example.com | "2019-09-24 00:27:19.382 UTC [common.channelconfig] Validate -> DEBU 1ba7 Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-09-24 00:27:19.383 UTC [common.channelconfig] validateMSP -> DEBU 1ba8 Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.383 UTC [msp] newBccspMsp -> DEBU 1ba9 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.383 UTC [msp] New -> DEBU 1baa Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.383 UTC [msp] Setup -> DEBU 1bab Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.383 UTC [msp.identity] newIdentity -> DEBU 1bac Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.383 UTC [msp.identity] newIdentity -> DEBU 1bad Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.384 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1bae Checking if identity satisfies role [CLIENT] for Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.384 UTC [msp] Validate -> DEBU 1baf MSP Org3MSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.384 UTC [msp] getCertificationChain -> DEBU 1bb0 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.384 UTC [msp] hasOURole -> DEBU 1bb1 MSP Org3MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [msp] getCertificationChain -> DEBU 1bb2 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [msp] Setup -> DEBU 1bb3 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [msp] Setup -> DEBU 1bb4 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bb5 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bb6 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bb7 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bb8 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bb9 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bba Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bbb Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bbc Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bbd Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bbe Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bbf Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc0 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc1 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc2 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc3 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc4 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc5 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc6 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc7 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc8 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc9 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bca Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bcb Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [policies] NewManagerImpl -> DEBU 1bcc Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [policies] NewManagerImpl -> DEBU 1bcd Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [policies] NewManagerImpl -> DEBU 1bce Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [policies] NewManagerImpl -> DEBU 1bcf Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd0 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd1 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd3 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bd8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bd9 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bda Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bdb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bdc Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bdd Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bde Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bdf Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1be0 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1be1 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1be2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be3 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be8 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be9 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1bea Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1beb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1bec Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1bed Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bee Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bef Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf0 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf4 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf5 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf6 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf7 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf8 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bfa Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bfb Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bfc Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bfd Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bfe Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.configtx] addToMap -> DEBU 1bff Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.configtx] addToMap -> DEBU 1c00 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.configtx] addToMap -> DEBU 1c01 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.configtx] addToMap -> DEBU 1c02 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.configtx] addToMap -> DEBU 1c03 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c04 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c05 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c06 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c07 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c08 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c09 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c0a Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c0b Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c0c Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c0d As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c0e As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c0f As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c10 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c11 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c12 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c13 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c14 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c15 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c16 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c17 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c18 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.capabilities] Supported -> DEBU 1c19 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:27:19.391 UTC [common.capabilities] Supported -> DEBU 1c1a Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c1b Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c1c Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [msp.identity] Sign -> DEBU 1c1d Sign: plaintext: 0AD2060A1B08011A0608E7C5A5EC0522...3B510D9537F58663A9B5FF8FA9EA68AE " +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [msp.identity] Sign -> DEBU 1c1e Sign: digest: A14F26245C6061CD27A88408726E759ACDF40A72BBA24542728C087E71E7C73D " +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [policies] Evaluate -> DEBU 1c1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [policies] Evaluate -> DEBU 1c20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [policies] Evaluate -> DEBU 1c21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [policies] Evaluate -> DEBU 1c22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [policies] Evaluate -> DEBU 1c23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [msp] DeserializeIdentity -> DEBU 1c24 Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [msp.identity] newIdentity -> DEBU 1c25 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.392 UTC [cauthdsl] func1 -> DEBU 1c26 0xc0011c3980 gate 1569284839392958500 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c27 0xc0011c3980 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c28 0xc0011c3980 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c29 0xc0011c3980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c2a 0xc0011c3980 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:19.393 UTC [cauthdsl] func1 -> DEBU 1c2b 0xc0011c3980 gate 1569284839392958500 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:19.393 UTC [policies] Evaluate -> DEBU 1c2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.393 UTC [policies] Evaluate -> DEBU 1c2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.393 UTC [policies] Evaluate -> DEBU 1c2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-09-24 00:27:19.393 UTC [cauthdsl] func1 -> DEBU 1c2f 0xc0012eaac0 gate 1569284839393342200 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c30 0xc0012eaac0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c31 0xc0012eaac0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:19.394 UTC [cauthdsl] func2 -> DEBU 1c32 0xc0012eaac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:19.394 UTC [cauthdsl] func2 -> DEBU 1c33 0xc0012eaac0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:19.394 UTC [cauthdsl] func1 -> DEBU 1c34 0xc0012eaac0 gate 1569284839393342200 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:19.394 UTC [policies] Evaluate -> DEBU 1c35 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.394 UTC [policies] Evaluate -> DEBU 1c36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.394 UTC [policies] func1 -> DEBU 1c37 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +orderer0.example.com | "2019-09-24 00:27:19.394 UTC [policies] Evaluate -> DEBU 1c38 Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:19.394 UTC [policies] Evaluate -> DEBU 1c39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:19.394 UTC [policies] Evaluate -> DEBU 1c3a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 00:27:19.395 UTC [policies] Evaluate -> DEBU 1c3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:19.395 UTC [policies] Evaluate -> DEBU 1c3c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 00:27:19.395 UTC [cauthdsl] func1 -> DEBU 1c3d 0xc0012eb850 gate 1569284839395154600 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:19.395 UTC [cauthdsl] func2 -> DEBU 1c3e 0xc0012eb850 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:19.395 UTC [cauthdsl] func2 -> DEBU 1c3f 0xc0012eb850 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:19.395 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c40 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 00:27:19.395 UTC [msp] Validate -> DEBU 1c41 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.395 UTC [cauthdsl] func2 -> DEBU 1c42 0xc0012eb850 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:19.396 UTC [msp.identity] Verify -> DEBU 1c43 Verify: digest = 00000000 a1 4f 26 24 5c 60 61 cd 27 a8 84 08 72 6e 75 9a |.O&$\`a.'...rnu.| +orderer0.example.com | 00000010 cd f4 0a 72 bb a2 45 42 72 8c 08 7e 71 e7 c7 3d |...r..EBr..~q..=|" +orderer0.example.com | "2019-09-24 00:27:19.396 UTC [msp.identity] Verify -> DEBU 1c44 Verify: sig = 00000000 30 45 02 21 00 be 77 61 11 1c 31 7b 61 9b bf e1 |0E.!..wa..1{a...| +orderer0.example.com | 00000010 aa 50 c3 32 1f a8 e6 f4 32 fd a2 0e 40 09 a2 92 |.P.2....2...@...| +orderer0.example.com | 00000020 69 66 73 16 58 02 20 69 a4 df 24 de 15 ff 27 59 |ifs.X. i..$...'Y| +orderer0.example.com | 00000030 84 0c ff 42 07 92 94 a9 95 18 98 aa 50 21 03 cb |...B........P!..| +orderer0.example.com | 00000040 d1 d1 df 9a 80 67 53 |.....gS|" +orderer0.example.com | "2019-09-24 00:27:19.396 UTC [cauthdsl] func2 -> DEBU 1c45 0xc0012eb850 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:19.396 UTC [cauthdsl] func1 -> DEBU 1c46 0xc0012eb850 gate 1569284839395154600 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c47 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c48 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c49 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c4b Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c4c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 00:27:19.397 UTC [orderer.common.msgprocessor] Apply -> DEBU 1c4d Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-09-24 00:27:19.397 UTC [common.channelconfig] NewStandardValues -> DEBU 1c4e Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c4f Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c50 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c51 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c52 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c53 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.397 UTC [common.channelconfig] NewStandardValues -> DEBU 1c54 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c55 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c56 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c57 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c58 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c59 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5a Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [common.channelconfig] NewStandardValues -> DEBU 1c5b Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5c Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [common.channelconfig] NewStandardValues -> DEBU 1c5d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5e Processing field: MSP" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [common.channelconfig] validateMSP -> DEBU 1c5f Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [msp] newBccspMsp -> DEBU 1c60 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [msp] New -> DEBU 1c61 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.398 UTC [msp] Setup -> DEBU 1c62 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:27:19.399 UTC [msp.identity] newIdentity -> DEBU 1c63 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.399 UTC [msp.identity] newIdentity -> DEBU 1c64 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.399 UTC [msp] Validate -> DEBU 1c65 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.399 UTC [common.channelconfig] NewStandardValues -> DEBU 1c66 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:27:19.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c67 Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:27:19.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c68 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.400 UTC [common.channelconfig] NewStandardValues -> DEBU 1c69 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6a Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.400 UTC [common.channelconfig] NewStandardValues -> DEBU 1c6b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:27:19.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6c Processing field: MSP" +orderer0.example.com | "2019-09-24 00:27:19.400 UTC [common.channelconfig] Validate -> DEBU 1c6d Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-09-24 00:27:19.400 UTC [common.channelconfig] validateMSP -> DEBU 1c6e Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.400 UTC [msp] newBccspMsp -> DEBU 1c6f Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.400 UTC [msp] New -> DEBU 1c70 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.401 UTC [msp] Setup -> DEBU 1c71 Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.401 UTC [msp.identity] newIdentity -> DEBU 1c72 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.401 UTC [msp.identity] newIdentity -> DEBU 1c73 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.402 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c74 Checking if identity satisfies role [CLIENT] for Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.402 UTC [msp] Validate -> DEBU 1c75 MSP Org3MSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.402 UTC [msp] getCertificationChain -> DEBU 1c76 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.402 UTC [msp] hasOURole -> DEBU 1c77 MSP Org3MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:27:19.402 UTC [msp] getCertificationChain -> DEBU 1c78 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.402 UTC [common.channelconfig] NewStandardValues -> DEBU 1c79 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7a Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.403 UTC [common.channelconfig] NewStandardValues -> DEBU 1c7b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:27:19.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7c Processing field: MSP" +orderer0.example.com | "2019-09-24 00:27:19.403 UTC [common.channelconfig] Validate -> DEBU 1c7d Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:27:19.403 UTC [common.channelconfig] validateMSP -> DEBU 1c7e Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.403 UTC [msp] newBccspMsp -> DEBU 1c7f Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.403 UTC [msp] New -> DEBU 1c80 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.403 UTC [msp] Setup -> DEBU 1c81 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.403 UTC [msp.identity] newIdentity -> DEBU 1c82 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.404 UTC [msp.identity] newIdentity -> DEBU 1c83 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12e0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12e1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [cauthdsl] func1 -> DEBU 12e5 0xc0038355d0 gate 1569284715972567800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12e6 0xc0038355d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12e7 0xc0038355d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12e8 0xc0038355d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12e9 0xc0038355d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [cauthdsl] func1 -> DEBU 12ea 0xc0038355d0 gate 1569284715972567800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12eb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [cauthdsl] func1 -> DEBU 12ee 0xc003835e20 gate 1569284715972904800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12ef 0xc003835e20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12f0 0xc003835e20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [cauthdsl] func2 -> DEBU 12f1 0xc003835e20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [msp.identity] Verify -> DEBU 12f2 Verify: digest = 00000000 c0 a2 c7 f3 29 34 1e 7e a3 e8 cc 14 e1 74 3f 79 |....)4.~.....t?y| +peer0.org1.example.com | 00000010 7a 26 e4 fa 20 24 d3 62 60 75 69 95 b0 14 53 c1 |z&.. $.b`ui...S.|" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [msp.identity] Verify -> DEBU 12f3 Verify: sig = 00000000 30 44 02 20 7d 35 a7 c8 81 d1 aa f7 ec 07 60 53 |0D. }5........`S| +peer0.org1.example.com | 00000010 15 1b 7f 69 ee 05 07 75 b8 bf ac 63 fd 48 cc 89 |...i...u...c.H..| +peer0.org1.example.com | 00000020 36 d1 49 f2 02 20 70 49 01 99 e4 82 d8 de c1 ba |6.I.. pI........| +peer0.org1.example.com | 00000030 22 e5 3a 80 1d ba df 50 40 40 17 68 a2 17 b9 06 |".:....P@@.h....| +peer0.org1.example.com | 00000040 06 a5 bb c8 60 3e |....`>|" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [cauthdsl] func2 -> DEBU 12f4 0xc003835e20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [cauthdsl] func1 -> DEBU 12f5 0xc003835e20 gate 1569284715972904800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [policies] Evaluate -> DEBU 12f6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [policies] Evaluate -> DEBU 12f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [policies] Evaluate -> DEBU 12f8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [policies] Evaluate -> DEBU 12f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [gossip.discovery] handleAliveMessage -> DEBU 12fa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 12fb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 12fc updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 12fd Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 12fe Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 12ff Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [gossip.discovery] handleAliveMessage -> DEBU 1300 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1301 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:15.973 UTC [gossip.discovery] sendMemResponse -> DEBU 1302 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:15.974 UTC [msp] DeserializeIdentity -> DEBU 1303 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.974 UTC [msp] DeserializeIdentity -> DEBU 1304 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.974 UTC [msp] DeserializeIdentity -> DEBU 1305 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:15.974 UTC [gossip.comm] Send -> DEBU 1306 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:15.974 UTC [gossip.discovery] sendMemResponse -> DEBU 1307 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" > alive: alive:" > alive: " +peer0.org1.example.com | "2019-09-24 00:25:15.974 UTC [gossip.comm] sendToEndpoint -> DEBU 1308 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:15.974 UTC [gossip.comm] sendToEndpoint -> DEBU 1309 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.190 UTC [msp] DeserializeIdentity -> DEBU 130a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.190 UTC [msp] DeserializeIdentity -> DEBU 130b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.190 UTC [gossip.comm] Send -> DEBU 130c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 130d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 130e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 130f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1310 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1311 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1312 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.195 UTC [gossip.comm] func1 -> DEBU 1313 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.202 UTC [gossip.gossip] handleMessage -> DEBU 1314 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.202 UTC [msp] DeserializeIdentity -> DEBU 1315 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.202 UTC [msp] DeserializeIdentity -> DEBU 1316 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.202 UTC [msp] DeserializeIdentity -> DEBU 1317 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.202 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1318 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:16.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1319 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 131a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 131b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 131c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 131d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [cauthdsl] func1 -> DEBU 131e 0xc0039051b0 gate 1569284716203281800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 131f 0xc0039051b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 1320 0xc0039051b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 1321 0xc0039051b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 1322 0xc0039051b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [cauthdsl] func1 -> DEBU 1323 0xc0039051b0 gate 1569284716203281800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 1324 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 1325 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 1326 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [cauthdsl] func1 -> DEBU 1327 0xc0039059f0 gate 1569284716203704200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 1328 0xc0039059f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 1329 0xc0039059f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.204 UTC [cauthdsl] func2 -> DEBU 132a 0xc0039059f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.204 UTC [msp.identity] Verify -> DEBU 132b Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:16.204 UTC [msp.identity] Verify -> DEBU 132c Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:16.204 UTC [cauthdsl] func2 -> DEBU 132d 0xc0039059f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.204 UTC [cauthdsl] func1 -> DEBU 132e 0xc0039059f0 gate 1569284716203704200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:16.204 UTC [policies] Evaluate -> DEBU 132f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.205 UTC [policies] Evaluate -> DEBU 1330 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.205 UTC [policies] Evaluate -> DEBU 1331 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.205 UTC [policies] Evaluate -> DEBU 1332 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.206 UTC [msp.identity] Verify -> DEBU 1333 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:16.206 UTC [msp.identity] Verify -> DEBU 1334 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:16.207 UTC [msp] DeserializeIdentity -> DEBU 1335 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.207 UTC [msp] DeserializeIdentity -> DEBU 1336 Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:19.404 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c84 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.404 UTC [msp] Validate -> DEBU 1c85 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [msp] getCertificationChain -> DEBU 1c86 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [msp] hasOURole -> DEBU 1c87 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [msp] getCertificationChain -> DEBU 1c88 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [common.channelconfig] NewStandardValues -> DEBU 1c89 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c8a Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [common.channelconfig] NewStandardValues -> DEBU 1c8b Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:25:16.207 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1337 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:16.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1338 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1339 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.207 UTC [policies] Evaluate -> DEBU 133a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.207 UTC [policies] Evaluate -> DEBU 133b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:16.207 UTC [policies] Evaluate -> DEBU 133c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.208 UTC [cauthdsl] func1 -> DEBU 133d 0xc0039198f0 gate 1569284716208155300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.208 UTC [cauthdsl] func2 -> DEBU 133e 0xc0039198f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.208 UTC [cauthdsl] func2 -> DEBU 133f 0xc0039198f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.208 UTC [cauthdsl] func2 -> DEBU 1340 0xc0039198f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:16.208 UTC [cauthdsl] func2 -> DEBU 1341 0xc0039198f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.208 UTC [cauthdsl] func1 -> DEBU 1342 0xc0039198f0 gate 1569284716208155300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.208 UTC [policies] Evaluate -> DEBU 1343 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.225 UTC [policies] Evaluate -> DEBU 1344 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.225 UTC [policies] Evaluate -> DEBU 1345 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.225 UTC [cauthdsl] func1 -> DEBU 1346 0xc00393e130 gate 1569284716225687600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.225 UTC [cauthdsl] func2 -> DEBU 1347 0xc00393e130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.225 UTC [cauthdsl] func2 -> DEBU 1348 0xc00393e130 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.226 UTC [cauthdsl] func2 -> DEBU 1349 0xc00393e130 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.226 UTC [msp.identity] Verify -> DEBU 134a Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:16.227 UTC [msp.identity] Verify -> DEBU 134b Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:16.228 UTC [cauthdsl] func2 -> DEBU 134c 0xc00393e130 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.228 UTC [cauthdsl] func1 -> DEBU 134d 0xc00393e130 gate 1569284716225687600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:16.229 UTC [policies] Evaluate -> DEBU 134e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.229 UTC [policies] Evaluate -> DEBU 134f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.229 UTC [policies] Evaluate -> DEBU 1350 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.230 UTC [policies] Evaluate -> DEBU 1351 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.234 UTC [gossip.comm] func1 -> DEBU 1352 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 551 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.236 UTC [msp.identity] Verify -> DEBU 1353 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:16.256 UTC [msp.identity] Verify -> DEBU 1354 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:16.256 UTC [gossip.gossip] handleMessage -> DEBU 1355 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.257 UTC [gossip.gossip] handleMessage -> DEBU 1356 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.257 UTC [msp] DeserializeIdentity -> DEBU 1357 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.257 UTC [msp] DeserializeIdentity -> DEBU 1358 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.257 UTC [msp] DeserializeIdentity -> DEBU 1359 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.257 UTC [msp] DeserializeIdentity -> DEBU 135a Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c8c Processing field: MSP" +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [common.channelconfig] Validate -> DEBU 1c8d Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [common.channelconfig] validateMSP -> DEBU 1c8e Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [msp] newBccspMsp -> DEBU 1c8f Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [msp] New -> DEBU 1c90 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.405 UTC [msp] Setup -> DEBU 1c91 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.406 UTC [msp.identity] newIdentity -> DEBU 1c92 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.406 UTC [msp.identity] newIdentity -> DEBU 1c93 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.406 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c94 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.406 UTC [msp] Validate -> DEBU 1c95 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.406 UTC [msp] getCertificationChain -> DEBU 1c96 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [msp] hasOURole -> DEBU 1c97 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [msp] getCertificationChain -> DEBU 1c98 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [msp] Setup -> DEBU 1c99 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [msp] Setup -> DEBU 1c9a MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1c9b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1c9c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1c9d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1c9e Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1c9f Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1ca0 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1ca1 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1ca2 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1ca3 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca4 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca5 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca6 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca7 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca8 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca9 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1caa Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cab Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cac Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cad Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cae Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1caf Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb0 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb1 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb2 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb3 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb4 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb5 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cb6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cb7 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cb8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cb9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-09-24 00:25:16.257 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 135b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:16.257 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 135c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.257 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 135d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.257 UTC [msp] DeserializeIdentity -> DEBU 135e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.257 UTC [policies] Evaluate -> DEBU 135f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [policies] Evaluate -> DEBU 1360 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [policies] Evaluate -> DEBU 1361 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [gossip.pull] Hello -> DEBU 1362 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func1 -> DEBU 1363 0xc003a14d00 gate 1569284716258093500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 1364 0xc003a14d00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 1365 0xc003a14d00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 1366 0xc003a14d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 1367 0xc003a14d00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func1 -> DEBU 1368 0xc003a14d00 gate 1569284716258093500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [policies] Evaluate -> DEBU 1369 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [policies] Evaluate -> DEBU 136a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [policies] Evaluate -> DEBU 136b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func1 -> DEBU 136c 0xc003a15540 gate 1569284716258464700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 136d 0xc003a15540 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 136e 0xc003a15540 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 136f 0xc003a15540 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [msp.identity] Verify -> DEBU 1370 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [msp.identity] Verify -> DEBU 1371 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 1372 0xc003a15540 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.258 UTC [cauthdsl] func1 -> DEBU 1373 0xc003a15540 gate 1569284716258464700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:16.259 UTC [policies] Evaluate -> DEBU 1374 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.259 UTC [policies] Evaluate -> DEBU 1375 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.259 UTC [policies] Evaluate -> DEBU 1376 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.259 UTC [policies] Evaluate -> DEBU 1377 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.259 UTC [msp.identity] Verify -> DEBU 1378 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:16.259 UTC [msp.identity] Verify -> DEBU 1379 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:16.259 UTC [msp.identity] Verify -> DEBU 137a Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:16.259 UTC [msp.identity] Verify -> DEBU 137b Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [msp] DeserializeIdentity -> DEBU 137c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [msp] DeserializeIdentity -> DEBU 137d Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cba Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cbb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cbc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cbd Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cbe Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cbf Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc0 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc3 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc4 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc5 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc6 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc7 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc8 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cca Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1ccb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1ccc Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1ccd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cce Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1ccf Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd4 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cda Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cdb Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cdc Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cdd Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cde Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cdf Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1ce0 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1ce1 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1ce2 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1ce3 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1ce4 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:27:19.413 UTC [common.configtx] addToMap -> DEBU 1ce5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:27:19.413 UTC [common.configtx] addToMap -> DEBU 1ce6 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:27:19.413 UTC [common.configtx] addToMap -> DEBU 1ce7 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:27:19.413 UTC [common.configtx] addToMap -> DEBU 1ce8 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:27:19.413 UTC [common.configtx] addToMap -> DEBU 1ce9 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:19.413 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1cea [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:32916" +orderer0.example.com | "2019-09-24 00:27:19.413 UTC [orderer.consensus.etcdraft] propose -> INFO 1ceb Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:19.413 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 1cec Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:19.413 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1ced Proposed block [6] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:19.418 UTC [orderer.common.broadcast] Handle -> WARN 1cee Error reading from 172.18.0.9:32916: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:19.418 UTC [orderer.common.server] func1 -> DEBU 1cef Closing Broadcast stream" +orderer0.example.com | "2019-09-24 00:27:19.418 UTC [comm.grpc.server] 1 -> INFO 1cf0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:32916 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.1667ms +orderer0.example.com | "2019-09-24 00:27:19.418 UTC [grpc] infof -> DEBU 1cf1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:19.418 UTC [common.deliver] Handle -> WARN 1cf2 Error reading from 172.18.0.9:32914: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:19.418 UTC [orderer.common.server] func1 -> DEBU 1cf3 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:19.418 UTC [comm.grpc.server] 1 -> INFO 1cf4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32914 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=64.1171ms +orderer0.example.com | "2019-09-24 00:27:19.418 UTC [grpc] infof -> DEBU 1cf5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:19.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf6 Sending msg of 34008 bytes to 3 on channel businesschannel took 68.5µs" +orderer0.example.com | "2019-09-24 00:27:19.422 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf7 Send of ConsensusRequest for channel businesschannel with payload of size 34008 to orderer2.example.com(orderer2.example.com:7050) took 150.9µs " +orderer0.example.com | "2019-09-24 00:27:19.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf8 Sending msg of 34008 bytes to 2 on channel businesschannel took 50.3µs" +orderer0.example.com | "2019-09-24 00:27:19.423 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf9 Send of ConsensusRequest for channel businesschannel with payload of size 34008 to orderer1.example.com(orderer1.example.com:7050) took 99.8µs " +orderer0.example.com | "2019-09-24 00:27:19.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfa Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:19.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfb Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-09-24 00:27:19.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfc Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2019-09-24 00:27:19.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.4µs " +orderer0.example.com | "2019-09-24 00:27:19.430 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1cfe Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 00:27:19.431 UTC [common.configtx] addToMap -> DEBU 1cff Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:27:19.431 UTC [common.configtx] addToMap -> DEBU 1d00 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.431 UTC [common.configtx] addToMap -> DEBU 1d01 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.431 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d02 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:19.431 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.6µs " +orderer0.example.com | "2019-09-24 00:27:19.431 UTC [common.configtx] addToMap -> DEBU 1d03 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.438 UTC [common.configtx] addToMap -> DEBU 1d05 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:27:19.440 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d06 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:19.440 UTC [common.configtx] addToMap -> DEBU 1d07 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.441 UTC [common.configtx] addToMap -> DEBU 1d08 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:27:19.442 UTC [common.configtx] addToMap -> DEBU 1d09 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.442 UTC [common.configtx] addToMap -> DEBU 1d0a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:27:19.443 UTC [common.configtx] addToMap -> DEBU 1d0b Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:19.444 UTC [common.configtx] addToMap -> DEBU 1d0c Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:19.445 UTC [common.configtx] addToMap -> DEBU 1d0e Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:27:19.443 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:19.450 UTC [common.configtx] addToMap -> DEBU 1d0f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.451 UTC [common.configtx] addToMap -> DEBU 1d10 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.451 UTC [common.configtx] addToMap -> DEBU 1d11 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.452 UTC [common.configtx] addToMap -> DEBU 1d12 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.452 UTC [common.configtx] addToMap -> DEBU 1d13 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.452 UTC [common.configtx] addToMap -> DEBU 1d14 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.453 UTC [common.configtx] addToMap -> DEBU 1d15 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.453 UTC [common.configtx] addToMap -> DEBU 1d16 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.453 UTC [common.configtx] addToMap -> DEBU 1d17 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.453 UTC [common.configtx] addToMap -> DEBU 1d18 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:27:19.454 UTC [common.configtx] addToMap -> DEBU 1d19 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.454 UTC [common.configtx] addToMap -> DEBU 1d1a Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:27:19.454 UTC [common.configtx] addToMap -> DEBU 1d1b Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.455 UTC [common.configtx] addToMap -> DEBU 1d1c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:27:19.456 UTC [common.configtx] addToMap -> DEBU 1d1d Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:19.456 UTC [common.configtx] addToMap -> DEBU 1d1e Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:19.456 UTC [common.configtx] verifyDeltaSet -> DEBU 1d1f Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.457 UTC [common.configtx] verifyDeltaSet -> DEBU 1d20 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.457 UTC [common.configtx] verifyDeltaSet -> DEBU 1d21 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.458 UTC [common.configtx] verifyDeltaSet -> DEBU 1d22 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.458 UTC [common.configtx] verifyDeltaSet -> DEBU 1d23 Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.458 UTC [common.configtx] verifyDeltaSet -> DEBU 1d24 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.459 UTC [common.configtx] verifyDeltaSet -> DEBU 1d25 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.459 UTC [common.configtx] policyForItem -> DEBU 1d26 Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-09-24 00:27:19.460 UTC [policies] Manager -> DEBU 1d27 Manager Channel looking up path []" +orderer0.example.com | "2019-09-24 00:27:19.460 UTC [policies] Manager -> DEBU 1d28 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:27:19.460 UTC [policies] Manager -> DEBU 1d29 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:27:19.460 UTC [policies] Manager -> DEBU 1d2a Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:27:19.460 UTC [policies] Manager -> DEBU 1d2b Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:27:19.461 UTC [policies] Manager -> DEBU 1d2c Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:27:19.461 UTC [policies] Manager -> DEBU 1d2d Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:27:19.461 UTC [policies] Manager -> DEBU 1d2e Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.461 UTC [policies] Manager -> DEBU 1d2f Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.461 UTC [policies] Evaluate -> DEBU 1d30 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-09-24 00:27:19.462 UTC [policies] Evaluate -> DEBU 1d31 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:19.462 UTC [policies] Evaluate -> DEBU 1d32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-09-24 00:27:19.462 UTC [cauthdsl] deduplicate -> WARN 1d33 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-09-24 00:27:19.462 UTC [cauthdsl] func1 -> DEBU 1d34 0xc000d92870 gate 1569284839462649600 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:19.462 UTC [cauthdsl] func2 -> DEBU 1d35 0xc000d92870 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-09-24 00:27:19.467 UTC [cauthdsl] func2 -> DEBU 1d36 0xc000d92870 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:19.481 UTC [cauthdsl] func2 -> DEBU 1d37 0xc000d92870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-09-24 00:27:19.482 UTC [cauthdsl] func2 -> DEBU 1d38 0xc000d92870 processing identity 1 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:19.482 UTC [cauthdsl] func2 -> DEBU 1d39 0xc000d92870 principal matched by identity 1" +orderer0.example.com | "2019-09-24 00:27:19.482 UTC [msp.identity] Verify -> DEBU 1d3a Verify: digest = 00000000 b9 ca 25 b9 18 4b 4c cb f9 ed 69 2e e4 b0 01 32 |..%..KL...i....2| +orderer0.example.com | 00000010 7e d5 0e 8f db 9c d1 12 47 66 47 e2 f9 42 f2 92 |~.......GfG..B..|" +orderer0.example.com | "2019-09-24 00:27:19.483 UTC [msp.identity] Verify -> DEBU 1d3b Verify: sig = 00000000 30 44 02 20 6f 93 cb 0e 30 b4 01 2a 3e 5c 70 08 |0D. o...0..*>\p.| +orderer0.example.com | 00000010 f4 b3 a7 c6 8d d3 d2 16 33 9b 93 be 91 8a 0e 0a |........3.......| +orderer0.example.com | 00000020 14 03 96 82 02 20 25 f6 18 45 c0 ea 93 0a be f5 |..... %..E......| +orderer0.example.com | 00000030 1d 09 80 60 65 19 94 68 46 86 00 e0 07 4b 6c 2e |...`e..hF....Kl.| +orderer0.example.com | 00000040 99 b4 f8 c0 85 d3 |......|" +orderer0.example.com | "2019-09-24 00:27:19.484 UTC [cauthdsl] func2 -> DEBU 1d3c 0xc000d92870 principal evaluation succeeds for identity 1" +orderer0.example.com | "2019-09-24 00:27:19.485 UTC [cauthdsl] func1 -> DEBU 1d3d 0xc000d92870 gate 1569284839462649600 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:19.486 UTC [policies] Evaluate -> DEBU 1d3e Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.486 UTC [policies] Evaluate -> DEBU 1d3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.486 UTC [policies] Evaluate -> DEBU 1d40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 00:27:19.487 UTC [cauthdsl] deduplicate -> WARN 1d41 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-09-24 00:27:19.487 UTC [cauthdsl] func1 -> DEBU 1d42 0xc000d92ea0 gate 1569284839487852200 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:19.488 UTC [cauthdsl] func2 -> DEBU 1d43 0xc000d92ea0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-09-24 00:27:19.488 UTC [cauthdsl] func2 -> DEBU 1d44 0xc000d92ea0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:19.489 UTC [cauthdsl] func2 -> DEBU 1d45 0xc000d92ea0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:19.489 UTC [msp.identity] Verify -> DEBU 1d46 Verify: digest = 00000000 48 77 a9 76 ae c6 d0 00 08 e1 87 61 5a 35 3b 84 |Hw.v.......aZ5;.| +orderer0.example.com | 00000010 16 95 5c 0b c0 a8 fc c1 cf 92 2d eb 73 05 3b 4a |..\.......-.s.;J|" +orderer0.example.com | "2019-09-24 00:27:19.490 UTC [msp.identity] Verify -> DEBU 1d47 Verify: sig = 00000000 30 44 02 20 4c 82 9e d8 a1 76 a3 a3 75 1d 20 c9 |0D. L....v..u. .| +orderer0.example.com | 00000010 3e 86 10 3b d1 1d 25 b5 e5 d4 bc e4 42 6b 38 bd |>..;..%.....Bk8.| +orderer0.example.com | 00000020 f6 ad d6 81 02 20 68 bc f4 5b 2d ee d1 96 32 c3 |..... h..[-...2.| +orderer0.example.com | 00000030 97 14 67 8c 23 1e 47 0f c7 05 3b 29 c9 13 7b 07 |..g.#.G...;)..{.| +orderer0.example.com | 00000040 8f a7 92 fd d1 08 |......|" +orderer0.example.com | "2019-09-24 00:27:19.490 UTC [cauthdsl] func2 -> DEBU 1d48 0xc000d92ea0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:19.490 UTC [cauthdsl] func1 -> DEBU 1d49 0xc000d92ea0 gate 1569284839487852200 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 1d4a Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 1d4b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 1d4c Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 1d4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:27:19.492 UTC [common.configtx] recurseConfigMap -> DEBU 1d4e Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 137e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1380 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 1381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 1382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 1383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [cauthdsl] func1 -> DEBU 1384 0xc003a61b60 gate 1569284716260501100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [cauthdsl] func2 -> DEBU 1385 0xc003a61b60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [cauthdsl] func2 -> DEBU 1386 0xc003a61b60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [cauthdsl] func2 -> DEBU 1387 0xc003a61b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [cauthdsl] func2 -> DEBU 1388 0xc003a61b60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [cauthdsl] func1 -> DEBU 1389 0xc003a61b60 gate 1569284716260501100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 138a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 138b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 138c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [cauthdsl] func1 -> DEBU 138d 0xc003a743d0 gate 1569284716260893600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.260 UTC [cauthdsl] func2 -> DEBU 138e 0xc003a743d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.261 UTC [cauthdsl] func2 -> DEBU 138f 0xc003a743d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.261 UTC [cauthdsl] func2 -> DEBU 1390 0xc003a743d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.261 UTC [msp.identity] Verify -> DEBU 1391 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:16.274 UTC [msp.identity] Verify -> DEBU 1393 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +[36mpeer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:16.263 UTC [msp] DeserializeIdentity -> DEBU 1392 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.278 UTC [msp] DeserializeIdentity -> DEBU 1394 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.279 UTC [gossip.comm] Send -> DEBU 1395 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:16.279 UTC [gossip.comm] sendToEndpoint -> DEBU 1396 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.280 UTC [gossip.comm] sendToEndpoint -> DEBU 1397 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.287 UTC [gossip.comm] func1 -> DEBU 1398 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.314 UTC [cauthdsl] func2 -> DEBU 1399 0xc003a743d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.314 UTC [cauthdsl] func1 -> DEBU 139a 0xc003a743d0 gate 1569284716260893600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:16.314 UTC [policies] Evaluate -> DEBU 139b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.315 UTC [policies] Evaluate -> DEBU 139c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.315 UTC [policies] Evaluate -> DEBU 139d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.315 UTC [policies] Evaluate -> DEBU 139e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.315 UTC [gossip.gossip] handleMessage -> DEBU 139f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.315 UTC [gossip.gossip] handleMessage -> DEBU 13a0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 551 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 00:27:19.494 UTC [common.configtx] recurseConfigMap -> DEBU 1d4f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.495 UTC [common.configtx] recurseConfigMap -> DEBU 1d50 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.496 UTC [common.configtx] recurseConfigMap -> DEBU 1d51 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.496 UTC [common.configtx] recurseConfigMap -> DEBU 1d52 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.497 UTC [common.configtx] recurseConfigMap -> DEBU 1d53 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.497 UTC [common.configtx] recurseConfigMap -> DEBU 1d54 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.498 UTC [common.configtx] recurseConfigMap -> DEBU 1d55 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.498 UTC [common.configtx] recurseConfigMap -> DEBU 1d56 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.499 UTC [common.configtx] recurseConfigMap -> DEBU 1d57 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.501 UTC [common.configtx] recurseConfigMap -> DEBU 1d59 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d58 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:19.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d5a Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +orderer0.example.com | "2019-09-24 00:27:19.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.3µs " +orderer0.example.com | "2019-09-24 00:27:19.506 UTC [common.configtx] recurseConfigMap -> DEBU 1d5c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.508 UTC [common.configtx] recurseConfigMap -> DEBU 1d5d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.509 UTC [common.configtx] recurseConfigMap -> DEBU 1d5e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.512 UTC [common.configtx] recurseConfigMap -> DEBU 1d5f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.513 UTC [common.configtx] recurseConfigMap -> DEBU 1d60 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.514 UTC [common.configtx] recurseConfigMap -> DEBU 1d61 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.514 UTC [common.configtx] recurseConfigMap -> DEBU 1d62 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.514 UTC [common.configtx] recurseConfigMap -> DEBU 1d63 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.515 UTC [common.configtx] recurseConfigMap -> DEBU 1d64 Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 00:27:19.515 UTC [common.configtx] recurseConfigMap -> DEBU 1d65 Setting policy for key Endorsement to " +orderer0.example.com | "2019-09-24 00:27:19.515 UTC [common.configtx] recurseConfigMap -> DEBU 1d66 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-09-24 00:27:19.516 UTC [common.configtx] recurseConfigMap -> DEBU 1d67 Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 00:27:19.516 UTC [common.configtx] recurseConfigMap -> DEBU 1d68 Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 00:27:19.516 UTC [common.configtx] recurseConfigMap -> DEBU 1d69 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.517 UTC [common.configtx] recurseConfigMap -> DEBU 1d6a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.517 UTC [common.configtx] recurseConfigMap -> DEBU 1d6b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 00:27:19.518 UTC [common.channelconfig] NewStandardValues -> DEBU 1d6c Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 00:27:19.519 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6d Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:27:19.519 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6e Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:27:19.520 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6f Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 00:27:19.520 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d70 Processing field: Consortium" +orderer0.example.com | "2019-09-24 00:27:19.520 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d71 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.521 UTC [common.channelconfig] NewStandardValues -> DEBU 1d72 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 00:27:19.521 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d73 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 00:27:19.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d74 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 00:27:19.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d75 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 00:27:19.523 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d76 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 00:27:19.524 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d77 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:27:19.524 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d78 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.524 UTC [common.channelconfig] NewStandardValues -> DEBU 1d79 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.525 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d7a Processing field: Endpoints" +orderer0.example.com | "2019-09-24 00:27:19.525 UTC [common.channelconfig] NewStandardValues -> DEBU 1d7b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:27:19.526 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d7c Processing field: MSP" +orderer0.example.com | "2019-09-24 00:27:19.526 UTC [common.channelconfig] validateMSP -> DEBU 1d7d Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.527 UTC [msp] newBccspMsp -> DEBU 1d7e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.527 UTC [msp] New -> DEBU 1d7f Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.528 UTC [msp] Setup -> DEBU 1d80 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 00:27:19.528 UTC [msp.identity] newIdentity -> DEBU 1d81 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.532 UTC [msp.identity] newIdentity -> DEBU 1d82 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.535 UTC [msp] Validate -> DEBU 1d83 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.541 UTC [common.channelconfig] NewStandardValues -> DEBU 1d84 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 00:27:19.542 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d85 Processing field: ACLs" +orderer0.example.com | "2019-09-24 00:27:19.542 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d86 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.542 UTC [common.channelconfig] NewStandardValues -> DEBU 1d87 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.545 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d88 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.546 UTC [common.channelconfig] NewStandardValues -> DEBU 1d89 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:27:19.547 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d8a Processing field: MSP" +orderer0.example.com | "2019-09-24 00:27:19.547 UTC [common.channelconfig] Validate -> DEBU 1d8b Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:27:19.547 UTC [common.channelconfig] validateMSP -> DEBU 1d8c Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.547 UTC [msp] newBccspMsp -> DEBU 1d8d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.547 UTC [msp] New -> DEBU 1d8e Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.547 UTC [msp] Setup -> DEBU 1d8f Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.547 UTC [msp.identity] newIdentity -> DEBU 1d90 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.547 UTC [msp.identity] newIdentity -> DEBU 1d91 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.551 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1d92 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.552 UTC [msp] Validate -> DEBU 1d93 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.552 UTC [msp] getCertificationChain -> DEBU 1d94 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.553 UTC [msp] hasOURole -> DEBU 1d95 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:27:19.553 UTC [msp] getCertificationChain -> DEBU 1d96 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.555 UTC [common.channelconfig] NewStandardValues -> DEBU 1d97 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.555 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d98 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.555 UTC [common.channelconfig] NewStandardValues -> DEBU 1d99 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:27:19.555 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d9a Processing field: MSP" +orderer0.example.com | "2019-09-24 00:27:19.555 UTC [common.channelconfig] Validate -> DEBU 1d9b Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 00:27:19.556 UTC [common.channelconfig] validateMSP -> DEBU 1d9c Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.556 UTC [msp] newBccspMsp -> DEBU 1d9d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.556 UTC [msp] New -> DEBU 1d9e Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.556 UTC [msp] Setup -> DEBU 1d9f Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.557 UTC [msp.identity] newIdentity -> DEBU 1da0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.557 UTC [msp.identity] newIdentity -> DEBU 1da1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | "2019-09-24 00:25:16.316 UTC [msp.identity] Verify -> DEBU 13a1 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:16.316 UTC [msp.identity] Verify -> DEBU 13a2 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:16.316 UTC [msp.identity] Verify -> DEBU 13a3 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:16.316 UTC [msp.identity] Verify -> DEBU 13a4 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:16.317 UTC [msp] DeserializeIdentity -> DEBU 13a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.317 UTC [msp] DeserializeIdentity -> DEBU 13a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13a8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13a9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [cauthdsl] func1 -> DEBU 13ad 0xc003a89450 gate 1569284716318351000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13ae 0xc003a89450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13af 0xc003a89450 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13b0 0xc003a89450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13b1 0xc003a89450 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [cauthdsl] func1 -> DEBU 13b2 0xc003a89450 gate 1569284716318351000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [cauthdsl] func1 -> DEBU 13b6 0xc003a89dc0 gate 1569284716318673900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13b7 0xc003a89dc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13b8 0xc003a89dc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13b9 0xc003a89dc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [msp.identity] Verify -> DEBU 13ba Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:16.318 UTC [msp.identity] Verify -> DEBU 13bb Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:16.319 UTC [cauthdsl] func2 -> DEBU 13bc 0xc003a89dc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.319 UTC [cauthdsl] func1 -> DEBU 13bd 0xc003a89dc0 gate 1569284716318673900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:16.319 UTC [policies] Evaluate -> DEBU 13be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.558 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1da2 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.558 UTC [msp] Validate -> DEBU 1da3 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.559 UTC [msp] getCertificationChain -> DEBU 1da4 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.559 UTC [msp] hasOURole -> DEBU 1da5 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:27:19.559 UTC [msp] getCertificationChain -> DEBU 1da6 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.560 UTC [common.channelconfig] NewStandardValues -> DEBU 1da7 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 00:27:19.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1da8 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.561 UTC [common.channelconfig] NewStandardValues -> DEBU 1da9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 00:27:19.561 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1daa Processing field: MSP" +orderer0.example.com | "2019-09-24 00:27:19.561 UTC [common.channelconfig] Validate -> DEBU 1dab Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-09-24 00:27:19.561 UTC [common.channelconfig] validateMSP -> DEBU 1dac Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.561 UTC [msp] newBccspMsp -> DEBU 1dad Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.562 UTC [msp] New -> DEBU 1dae Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 00:27:19.562 UTC [msp] Setup -> DEBU 1daf Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.562 UTC [msp.identity] newIdentity -> DEBU 1db0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.563 UTC [msp.identity] newIdentity -> DEBU 1db1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.564 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1db2 Checking if identity satisfies role [CLIENT] for Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.565 UTC [msp] Validate -> DEBU 1db3 MSP Org3MSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.569 UTC [msp] getCertificationChain -> DEBU 1db4 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.570 UTC [msp] hasOURole -> DEBU 1db5 MSP Org3MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 00:27:19.570 UTC [msp] getCertificationChain -> DEBU 1db6 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.570 UTC [msp] Setup -> DEBU 1db7 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-09-24 00:27:19.571 UTC [msp] Setup -> DEBU 1db8 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-09-24 00:27:19.571 UTC [policies] NewManagerImpl -> DEBU 1db9 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.571 UTC [policies] NewManagerImpl -> DEBU 1dba Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.571 UTC [policies] NewManagerImpl -> DEBU 1dbb Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.571 UTC [policies] NewManagerImpl -> DEBU 1dbc Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.572 UTC [policies] NewManagerImpl -> DEBU 1dbd Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.572 UTC [policies] NewManagerImpl -> DEBU 1dbe Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.572 UTC [policies] NewManagerImpl -> DEBU 1dbf Proposed new policy Readers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 00:25:16.319 UTC [policies] Evaluate -> DEBU 13bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.319 UTC [policies] Evaluate -> DEBU 13c0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.319 UTC [policies] Evaluate -> DEBU 13c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.319 UTC [gossip.gossip] handleMessage -> DEBU 13c2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.319 UTC [gossip.gossip] handleMessage -> DEBU 13c3 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.319 UTC [gossip.pull] HandleMessage -> DEBU 13c4 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.319 UTC [gossip.gossip] handleMessage -> DEBU 13c5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.651 UTC [gossip.comm] func1 -> DEBU 13c6 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.651 UTC [gossip.gossip] handleMessage -> DEBU 13c7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.651 UTC [gossip.gossip] handleMessage -> DEBU 13c8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13c9 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.651 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13ca Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:16.651 UTC [msp] DeserializeIdentity -> DEBU 13cb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.651 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:16.651 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13cd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.651 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13ce Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:16.651 UTC [policies] Evaluate -> DEBU 13cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func1 -> DEBU 13d2 0xc003aa3e00 gate 1569284716652060700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13d3 0xc003aa3e00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13d4 0xc003aa3e00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13d5 0xc003aa3e00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13d6 0xc003aa3e00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func1 -> DEBU 13d7 0xc003aa3e00 gate 1569284716652060700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.572 UTC [policies] NewManagerImpl -> DEBU 1dc0 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.573 UTC [policies] NewManagerImpl -> DEBU 1dc1 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.573 UTC [policies] NewManagerImpl -> DEBU 1dc2 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.573 UTC [policies] NewManagerImpl -> DEBU 1dc3 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.573 UTC [policies] NewManagerImpl -> DEBU 1dc4 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.574 UTC [policies] NewManagerImpl -> DEBU 1dc5 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.574 UTC [policies] NewManagerImpl -> DEBU 1dc6 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dc7 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dc8 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dc9 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dca Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dcb Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dcc Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.576 UTC [policies] NewManagerImpl -> DEBU 1dcd Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.576 UTC [policies] NewManagerImpl -> DEBU 1dce Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.576 UTC [policies] NewManagerImpl -> DEBU 1dcf Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.577 UTC [policies] NewManagerImpl -> DEBU 1dd0 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.577 UTC [policies] NewManagerImpl -> DEBU 1dd1 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 00:27:19.577 UTC [policies] NewManagerImpl -> DEBU 1dd2 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 00:27:19.577 UTC [policies] NewManagerImpl -> DEBU 1dd3 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 00:27:19.577 UTC [common.configtx] addToMap -> DEBU 1dd4 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 00:27:19.577 UTC [common.configtx] addToMap -> DEBU 1dd5 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 00:27:19.577 UTC [common.configtx] addToMap -> DEBU 1dd6 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.578 UTC [common.configtx] addToMap -> DEBU 1dd7 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 00:27:19.579 UTC [common.configtx] addToMap -> DEBU 1dd8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:19.579 UTC [common.configtx] addToMap -> DEBU 1dd9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 00:27:19.580 UTC [common.configtx] addToMap -> DEBU 1dda Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 00:27:19.580 UTC [common.configtx] addToMap -> DEBU 1ddb Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.580 UTC [common.configtx] addToMap -> DEBU 1ddc Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 00:27:19.580 UTC [common.configtx] addToMap -> DEBU 1ddd Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 00:27:19.580 UTC [common.configtx] addToMap -> DEBU 1dde Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1ddf Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1de0 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1de1 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1de2 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1de3 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1de4 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 00:27:19.582 UTC [common.configtx] addToMap -> DEBU 1de5 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.582 UTC [common.configtx] addToMap -> DEBU 1de6 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.582 UTC [common.configtx] addToMap -> DEBU 1de7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.582 UTC [common.configtx] addToMap -> DEBU 1de8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.583 UTC [common.configtx] addToMap -> DEBU 1de9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.583 UTC [common.configtx] addToMap -> DEBU 1dea Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.583 UTC [common.configtx] addToMap -> DEBU 1deb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.583 UTC [common.configtx] addToMap -> DEBU 1dec Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func1 -> DEBU 13db 0xc003ac0770 gate 1569284716652342000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13dc 0xc003ac0770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13dd 0xc003ac0770 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13de 0xc003ac0770 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [msp.identity] Verify -> DEBU 13df Verify: digest = 00000000 8a d7 3f 3a 8d eb e3 c4 2e 78 77 f9 3d db 88 04 |..?:.....xw.=...| +peer0.org1.example.com | 00000010 bb 87 aa 8a 7b 07 b5 24 d0 ed 35 2b 80 c3 8b 08 |....{..$..5+....|" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [msp.identity] Verify -> DEBU 13e0 Verify: sig = 00000000 30 45 02 21 00 d6 e6 c3 48 7a 09 90 e3 a3 ed ba |0E.!....Hz......| +peer0.org1.example.com | 00000010 30 e6 d2 9b 58 e1 bd ba 70 6d cb 0b 1c d2 4b ac |0...X...pm....K.| +peer0.org1.example.com | 00000020 d1 7b 90 f7 ba 02 20 0e 8d d0 96 d6 89 99 b8 51 |.{.... ........Q| +peer0.org1.example.com | 00000030 4c 3b 7e 0a 6d df fc 09 1d 78 11 d9 f3 57 61 3f |L;~.m....x...Wa?| +peer0.org1.example.com | 00000040 64 ed 89 86 71 bb de |d...q..|" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13e1 0xc003ac0770 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [cauthdsl] func1 -> DEBU 13e2 0xc003ac0770 gate 1569284716652342000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13e5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [gossip.discovery] handleAliveMessage -> DEBU 13e7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 13e8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:16.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 13e9 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ea Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [gossip.discovery] learnExistingMembers -> DEBU 13eb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ec Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [gossip.discovery] handleAliveMessage -> DEBU 13ed Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13ee Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [gossip.discovery] sendMemResponse -> DEBU 13ef Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [msp] DeserializeIdentity -> DEBU 13f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [msp] DeserializeIdentity -> DEBU 13f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [msp] DeserializeIdentity -> DEBU 13f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [gossip.comm] Send -> DEBU 13f3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [gossip.discovery] sendMemResponse -> DEBU 13f4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" > alive: alive:" > alive: " +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [gossip.comm] sendToEndpoint -> DEBU 13f5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.653 UTC [gossip.comm] sendToEndpoint -> DEBU 13f6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.662 UTC [gossip.comm] func1 -> DEBU 13f7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.662 UTC [gossip.gossip] handleMessage -> DEBU 13f8 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 00:27:19.583 UTC [common.configtx] addToMap -> DEBU 1ded Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.602 UTC [common.configtx] addToMap -> DEBU 1dee Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.602 UTC [common.configtx] addToMap -> DEBU 1def Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.602 UTC [common.configtx] addToMap -> DEBU 1df0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.603 UTC [common.configtx] addToMap -> DEBU 1df1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.603 UTC [common.configtx] addToMap -> DEBU 1df2 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.603 UTC [common.configtx] addToMap -> DEBU 1df3 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 00:27:19.604 UTC [common.configtx] addToMap -> DEBU 1df4 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 00:27:19.604 UTC [common.configtx] addToMap -> DEBU 1df5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1df6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1df7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1df8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1df9 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1dfa Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1dfb Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1dfc Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1dfd Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1dfe Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1dff Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1e00 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1e01 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 00:27:19.607 UTC [common.configtx] addToMap -> DEBU 1e02 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 00:27:19.607 UTC [common.configtx] addToMap -> DEBU 1e03 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 00:27:19.607 UTC [common.configtx] addToMap -> DEBU 1e04 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 00:27:19.607 UTC [common.configtx] addToMap -> DEBU 1e05 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 00:27:19.607 UTC [common.configtx] addToMap -> DEBU 1e06 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:19.608 UTC [common.configtx] addToMap -> DEBU 1e07 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 00:27:19.608 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e08 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 00:27:19.609 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e09 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0a Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0b Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0c Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0d Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0e Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0f Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-09-24 00:27:19.610 UTC [policies] Manager -> DEBU 1e10 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 00:27:19.610 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e11 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 00:27:19.610 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e12 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 00:27:19.610 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e13 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 00:27:19.611 UTC [policies] Manager -> DEBU 1e14 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 00:27:19.611 UTC [policies] Manager -> DEBU 1e15 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 00:27:19.611 UTC [policies] Manager -> DEBU 1e16 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 00:27:19.611 UTC [policies] Manager -> DEBU 1e17 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 00:27:19.611 UTC [policies] Manager -> DEBU 1e18 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 00:27:19.611 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e19 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 00:27:19.612 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e1a As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 00:27:19.612 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e1b As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 00:27:19.612 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e1c As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 00:27:19.612 UTC [common.capabilities] Supported -> DEBU 1e1d Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:27:19.612 UTC [common.capabilities] Supported -> DEBU 1e1e Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 00:27:19.612 UTC [orderer.common.server] func1 -> DEBU 1e1f Executing callback to update root CAs" +orderer0.example.com | "2019-09-24 00:27:19.613 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1e20 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-09-24 00:27:19.613 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1e21 adding app root CAs for MSP [Org3MSP]" +orderer0.example.com | "2019-09-24 00:27:19.613 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1e22 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-09-24 00:27:19.613 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1e23 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-09-24 00:27:19.613 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1e24 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-09-24 00:25:16.662 UTC [gossip.pull] HandleMessage -> DEBU 13f9 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.662 UTC [msp] DeserializeIdentity -> DEBU 13fa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.662 UTC [msp] DeserializeIdentity -> DEBU 13fb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.662 UTC [msp] DeserializeIdentity -> DEBU 13fc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.663 UTC [msp] DeserializeIdentity -> DEBU 13fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.663 UTC [msp] DeserializeIdentity -> DEBU 13fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.663 UTC [msp] DeserializeIdentity -> DEBU 13ff Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.663 UTC [gossip.pull] SendDigest -> DEBU 1400 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:16.663 UTC [gossip.gossip] handleMessage -> DEBU 1401 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.686 UTC [gossip.comm] func1 -> DEBU 1402 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.687 UTC [gossip.gossip] handleMessage -> DEBU 1403 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.687 UTC [msp] DeserializeIdentity -> DEBU 1404 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.687 UTC [msp] DeserializeIdentity -> DEBU 1405 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:16.687 UTC [gossip.gossip] handleMessage -> DEBU 1406 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:16.710 UTC [gossip.comm] func1 -> DEBU 1407 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.710 UTC [gossip.gossip] handleMessage -> DEBU 1408 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.710 UTC [gossip.pull] HandleMessage -> DEBU 1409 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:16.710 UTC [gossip.pull] SendDigest -> DEBU 140a Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:16.710 UTC [gossip.gossip] handleMessage -> DEBU 140b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.180 UTC [gossip.gossip] handleMessage -> DEBU 140c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.180 UTC [msp] DeserializeIdentity -> DEBU 140d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.180 UTC [msp] DeserializeIdentity -> DEBU 140e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.180 UTC [msp] DeserializeIdentity -> DEBU 140f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.180 UTC [gossip.gossip] handleMessage -> DEBU 1410 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.275 UTC [gossip.election] waitForInterrupt -> DEBU 1411 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.275 UTC [gossip.election] IsLeader -> DEBU 1412 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:25:17.275 UTC [msp] GetDefaultSigningIdentity -> DEBU 1413 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:17.275 UTC [msp.identity] Sign -> DEBU 1414 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510051801 " +peer0.org1.example.com | "2019-09-24 00:25:17.275 UTC [msp.identity] Sign -> DEBU 1415 Sign: digest: 27ADD916187E2745B9907F0FC6A73630D7748F5BB95D99A0B81888084EA1AB11 " +peer0.org1.example.com | "2019-09-24 00:25:17.275 UTC [gossip.election] waitForInterrupt -> DEBU 1416 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 1417 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 1418 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 1419 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 141a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.284 UTC [gossip.comm] Send -> DEBU 141b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 141c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 141d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.284 UTC [gossip.comm] sendToEndpoint -> DEBU 141e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.284 UTC [gossip.comm] sendToEndpoint -> DEBU 141f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.674 UTC [gossip.comm] func1 -> DEBU 1420 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.674 UTC [gossip.gossip] handleMessage -> DEBU 1421 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.674 UTC [gossip.pull] HandleMessage -> DEBU 1422 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.674 UTC [gossip.pull] SendDigest -> DEBU 1423 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:17.674 UTC [gossip.gossip] handleMessage -> DEBU 1424 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.691 UTC [gossip.comm] func1 -> DEBU 1425 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.691 UTC [gossip.gossip] handleMessage -> DEBU 1426 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.692 UTC [gossip.gossip] handleMessage -> DEBU 1427 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.692 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1428 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.692 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1429 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:17.692 UTC [msp.identity] Verify -> DEBU 142a Verify: digest = 00000000 cb f6 6a 97 b6 43 98 3c 2d d6 a3 3c e4 6f 7a 6b |..j..C.<-..<.ozk| +peer0.org1.example.com | 00000010 47 83 78 cc 62 df bb 95 33 c0 21 c1 02 44 88 11 |G.x.b...3.!..D..|" +peer0.org1.example.com | "2019-09-24 00:25:17.692 UTC [msp.identity] Verify -> DEBU 142b Verify: sig = 00000000 30 45 02 21 00 ea 16 c1 57 02 b1 ac c6 08 b9 ee |0E.!....W.......| +peer0.org1.example.com | 00000010 91 26 f6 19 1c e3 98 1d 1a a8 b1 67 5b b9 1c a6 |.&.........g[...| +peer0.org1.example.com | 00000020 f0 96 1b 5f 4b 02 20 57 aa 28 a4 4a 22 c1 ec a5 |..._K. W.(.J"...| +peer0.org1.example.com | 00000030 92 2e 2b 33 8a 97 16 2a 41 f3 ba ab bb 4e 60 f7 |..+3...*A....N`.| +peer0.org1.example.com | 00000040 c0 03 a4 e9 97 d7 5e |......^|" +peer0.org1.example.com | "2019-09-24 00:25:17.693 UTC [msp.identity] Verify -> DEBU 142c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:17.693 UTC [msp.identity] Verify -> DEBU 142d Verify: sig = 00000000 30 45 02 21 00 fb d2 29 6d af cf 80 13 72 bd 86 |0E.!...)m....r..| +peer0.org1.example.com | 00000010 af 1d f8 e7 d0 fa 33 1f 7e 72 1d b3 d4 57 6d e7 |......3.~r...Wm.| +peer0.org1.example.com | 00000020 47 6d 40 42 1a 02 20 37 85 19 ef 30 63 e2 03 68 |Gm@B.. 7...0c..h| +peer0.org1.example.com | 00000030 08 d3 54 c7 3f 48 42 f6 42 20 fb ed dc ff a3 4f |..T.?HB.B .....O| +peer0.org1.example.com | 00000040 f6 d3 e7 fa 2f 7f 68 |..../.h|" +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [gossip.discovery] handleAliveMessage -> DEBU 142e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 142f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1430 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1431 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1432 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1433 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [gossip.discovery] handleAliveMessage -> DEBU 1434 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1435 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [gossip.discovery] sendMemResponse -> DEBU 1436 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +orderer0.example.com | "2019-09-24 00:27:19.614 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1e25 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +orderer0.example.com | "2019-09-24 00:27:19.614 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1e26 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +orderer0.example.com | "2019-09-24 00:27:19.615 UTC [msp] GetDefaultSigningIdentity -> DEBU 1e27 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:27:19.615 UTC [msp] GetDefaultSigningIdentity -> DEBU 1e28 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 00:27:19.615 UTC [msp.identity] Sign -> DEBU 1e29 Sign: plaintext: 0A020806120B0A090A03010203100418...19B9FED862AEBF9684AA9597BD65355D " +orderer0.example.com | "2019-09-24 00:27:19.616 UTC [msp.identity] Sign -> DEBU 1e2a Sign: digest: 0DB504992BB2BC4B279886F9D8E65AB64F3AF2822E7651CF5308221B0B32C990 " +orderer0.example.com | "2019-09-24 00:27:19.621 UTC [fsblkstorage] indexBlock -> DEBU 1e2b Indexing block [blockNum=6, blockHash=[]byte{0xdc, 0x84, 0x65, 0x18, 0xe3, 0xc4, 0x6b, 0x5f, 0x9e, 0xf2, 0x8f, 0xdd, 0x75, 0x8a, 0x58, 0xc2, 0xd7, 0x72, 0xdd, 0x0, 0xe9, 0x74, 0x6e, 0x75, 0x79, 0xca, 0xe6, 0xc4, 0x97, 0x98, 0x63, 0x3e} txOffsets= +orderer0.example.com | txId=82a4197750a6c2e6027683be3495c6368937bcbe60f9626d8b78cceca622c16c locPointer=offset=71, bytesLength=33877 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 00:27:19.623 UTC [fsblkstorage] updateCheckpoint -> DEBU 1e2c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[118791], isChainEmpty=[false], lastBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:19.623 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1e2d [channel: businesschannel] Wrote block [6]" +orderer0.example.com | "2019-09-24 00:27:19.623 UTC [fsblkstorage] waitForBlock -> DEBU 1e2e Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:19.624 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e2f Remaining bytes=[34885], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:19.624 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e30 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +orderer0.example.com | "2019-09-24 00:27:19.624 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e31 blockbytes [34882] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:19.625 UTC [policies] Evaluate -> DEBU 1e32 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:19.625 UTC [policies] Evaluate -> DEBU 1e33 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:19.625 UTC [policies] Evaluate -> DEBU 1e34 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:19.625 UTC [policies] Evaluate -> DEBU 1e35 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:19.625 UTC [policies] Evaluate -> DEBU 1e36 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:19.626 UTC [msp] DeserializeIdentity -> DEBU 1e37 Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:19.626 UTC [msp.identity] newIdentity -> DEBU 1e38 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:19.627 UTC [cauthdsl] func1 -> DEBU 1e39 0xc000d0de80 gate 1569284839627699800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:19.628 UTC [cauthdsl] func2 -> DEBU 1e3a 0xc000d0de80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:19.628 UTC [cauthdsl] func2 -> DEBU 1e3b 0xc000d0de80 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:19.628 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e3c Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-09-24 00:27:19.628 UTC [msp] Validate -> DEBU 1e3d MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 00:27:19.629 UTC [msp] getCertificationChain -> DEBU 1e3e MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 00:27:19.629 UTC [cauthdsl] func2 -> DEBU 1e3f 0xc000d0de80 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:19.630 UTC [msp.identity] Verify -> DEBU 1e40 Verify: digest = 00000000 8b 03 97 43 70 c0 92 23 17 5e 03 ee 64 e6 97 15 |...Cp..#.^..d...| +orderer0.example.com | 00000010 02 e5 c8 62 47 03 7b 9c 1d 32 87 82 fc 68 3e 5b |...bG.{..2...h>[|" +orderer0.example.com | "2019-09-24 00:27:19.630 UTC [msp.identity] Verify -> DEBU 1e41 Verify: sig = 00000000 30 44 02 20 31 f5 c5 93 d4 1d 90 90 18 dd 80 56 |0D. 1..........V| +orderer0.example.com | 00000010 9f 8f ca 24 d5 66 6c 6b 5f a8 6a fb ad 51 78 84 |...$.flk_.j..Qx.| +orderer0.example.com | 00000020 24 d7 ee fc 02 20 1a fe 63 11 78 f6 09 75 ed 1e |$.... ..c.x..u..| +orderer0.example.com | 00000030 ed 55 24 d6 52 91 c4 44 8c 94 19 3e f1 e1 0e 9c |.U$.R..D...>....| +orderer0.example.com | 00000040 9f c8 76 db 78 22 |..v.x"|" +orderer0.example.com | "2019-09-24 00:27:19.630 UTC [cauthdsl] func2 -> DEBU 1e42 0xc000d0de80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:19.631 UTC [cauthdsl] func1 -> DEBU 1e43 0xc000d0de80 gate 1569284839627699800 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:19.631 UTC [policies] Evaluate -> DEBU 1e44 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.631 UTC [policies] Evaluate -> DEBU 1e45 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:19.631 UTC [policies] Evaluate -> DEBU 1e46 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:19.632 UTC [policies] Evaluate -> DEBU 1e47 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:19.632 UTC [policies] Evaluate -> DEBU 1e48 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:19.632 UTC [policies] Evaluate -> DEBU 1e49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:19.632 UTC [common.deliver] deliverBlocks -> DEBU 1e4a [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +orderer0.example.com | "2019-09-24 00:27:19.632 UTC [fsblkstorage] waitForBlock -> DEBU 1e4b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:19.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e4c Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-09-24 00:27:19.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e4d Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [msp] DeserializeIdentity -> DEBU 1437 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [msp] DeserializeIdentity -> DEBU 1438 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [gossip.comm] Send -> DEBU 1439 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:17.694 UTC [gossip.discovery] sendMemResponse -> DEBU 143a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:25:17.695 UTC [gossip.comm] sendToEndpoint -> DEBU 143b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.695 UTC [gossip.comm] sendToEndpoint -> DEBU 143c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.701 UTC [gossip.comm] func1 -> DEBU 143d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.701 UTC [gossip.gossip] handleMessage -> DEBU 143e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.701 UTC [gossip.gossip] handleMessage -> DEBU 143f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1440 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.701 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1441 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:17.701 UTC [msp.identity] Verify -> DEBU 1442 Verify: digest = 00000000 6f 9c 4c 87 2a 4a e9 7a 62 6a fc 8a c3 94 d2 22 |o.L.*J.zbj....."| +peer0.org1.example.com | 00000010 d2 65 11 2e ad 16 03 e5 dc e3 fc 87 c6 fe 5a 23 |.e............Z#|" +peer0.org1.example.com | "2019-09-24 00:25:17.701 UTC [msp.identity] Verify -> DEBU 1443 Verify: sig = 00000000 30 45 02 21 00 fe d6 2e 84 68 c2 8f 7b 67 36 f8 |0E.!.....h..{g6.| +peer0.org1.example.com | 00000010 b8 88 51 33 c4 bd fb 78 a8 8c b1 71 83 63 7d 4a |..Q3...x...q.c}J| +peer0.org1.example.com | 00000020 d7 95 8d 85 7c 02 20 0d 52 00 d5 c8 72 88 81 fd |....|. .R...r...| +peer0.org1.example.com | 00000030 0a 45 ca b4 f3 1f 11 0e 15 0c 31 50 7d b2 a1 1f |.E........1P}...| +peer0.org1.example.com | 00000040 be 73 ab 5c 3c 2a 9e |.s.\<*.|" +peer0.org1.example.com | "2019-09-24 00:25:17.702 UTC [gossip.discovery] handleAliveMessage -> DEBU 1444 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.702 UTC [gossip.discovery] handleAliveMessage -> DEBU 1445 endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" lastAliveTS: 1569284677733382900, 31 but got ts: inc_num:1569284677733382900 seq_num:30 " +peer0.org1.example.com | "2019-09-24 00:25:17.702 UTC [gossip.discovery] handleAliveMessage -> DEBU 1446 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1447 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.704 UTC [msp] DeserializeIdentity -> DEBU 1448 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.704 UTC [msp] DeserializeIdentity -> DEBU 1449 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.705 UTC [msp] DeserializeIdentity -> DEBU 144a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.705 UTC [gossip.comm] Send -> DEBU 144b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:17.705 UTC [msp] DeserializeIdentity -> DEBU 144c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:17.705 UTC [gossip.comm] Send -> DEBU 144d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:17.705 UTC [gossip.comm] sendToEndpoint -> DEBU 144e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.705 UTC [gossip.comm] sendToEndpoint -> DEBU 144f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.705 UTC [gossip.comm] sendToEndpoint -> DEBU 1450 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.705 UTC [gossip.comm] sendToEndpoint -> DEBU 1451 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.706 UTC [gossip.comm] func1 -> DEBU 1452 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-09-24 00:27:19.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 200.9µs " +orderer0.example.com | "2019-09-24 00:27:19.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.4µs " +orderer0.example.com | "2019-09-24 00:27:19.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e50 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:19.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e51 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:20.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e52 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:20.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e53 Sending msg of 28 bytes to 3 on channel testchainid took 10.4µs" +orderer0.example.com | "2019-09-24 00:27:20.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 802µs " +orderer0.example.com | "2019-09-24 00:27:20.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e55 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +orderer0.example.com | "2019-09-24 00:27:20.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e56 Sending msg of 28 bytes to 3 on channel businesschannel took 77.6µs" +orderer0.example.com | "2019-09-24 00:27:20.316 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.5µs " +orderer0.example.com | "2019-09-24 00:27:20.316 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.3µs " +orderer0.example.com | "2019-09-24 00:27:20.319 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e59 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:20.320 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e5a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:20.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e5b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:20.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5c Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +orderer0.example.com | "2019-09-24 00:27:20.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 491.6µs " +orderer0.example.com | "2019-09-24 00:27:20.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5e Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" +orderer0.example.com | "2019-09-24 00:27:20.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5f Sending msg of 28 bytes to 3 on channel businesschannel took 183µs" +orderer0.example.com | "2019-09-24 00:27:20.815 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 869.1µs " +orderer0.example.com | "2019-09-24 00:27:20.815 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e61 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.6µs " +orderer0.example.com | "2019-09-24 00:27:20.817 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e62 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:20.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e63 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:21.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e64 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:21.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e65 Sending msg of 28 bytes to 3 on channel testchainid took 11.6µs" +orderer0.example.com | "2019-09-24 00:27:21.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.4µs " +orderer0.example.com | "2019-09-24 00:27:21.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e67 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-09-24 00:27:21.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e68 Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-09-24 00:27:21.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 361.7µs " +orderer0.example.com | "2019-09-24 00:27:21.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:21.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:21.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 768.5µs " +orderer0.example.com | "2019-09-24 00:27:21.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:21.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e6e Sending msg of 28 bytes to 3 on channel testchainid took 23.8µs" +orderer0.example.com | "2019-09-24 00:27:21.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.2µs " +orderer0.example.com | "2019-09-24 00:27:21.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e70 Sending msg of 28 bytes to 2 on channel businesschannel took 174.2µs" +orderer0.example.com | "2019-09-24 00:27:21.815 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e71 Sending msg of 28 bytes to 3 on channel businesschannel took 219.8µs" +orderer0.example.com | "2019-09-24 00:27:21.816 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 232µs " +orderer0.example.com | "2019-09-24 00:27:21.816 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 516.6µs " +peer0.org1.example.com | "2019-09-24 00:25:17.706 UTC [gossip.gossip] handleMessage -> DEBU 1453 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.706 UTC [gossip.gossip] handleMessage -> DEBU 1454 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.706 UTC [gossip.gossip] handleMessage -> DEBU 1455 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1456 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1457 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1458 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:17.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1459 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:17.706 UTC [gossip.gossip] handleMessage -> DEBU 145a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:18.112 UTC [gossip.comm] func1 -> DEBU 145b Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:18.112 UTC [gossip.gossip] handleMessage -> DEBU 145c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:18.112 UTC [msp] DeserializeIdentity -> DEBU 145d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:18.112 UTC [msp] DeserializeIdentity -> DEBU 145e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:18.113 UTC [msp] DeserializeIdentity -> DEBU 145f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:18.113 UTC [gossip.gossip] handleMessage -> DEBU 1460 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.578 UTC [msp] GetDefaultSigningIdentity -> DEBU 1461 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:19.578 UTC [msp.identity] Sign -> DEBU 1462 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101B " +peer0.org1.example.com | "2019-09-24 00:25:19.578 UTC [msp.identity] Sign -> DEBU 1463 Sign: digest: CF97C4BC73A64F3E28E55454106319178B975805CDEFE51338D72D7F86455B35 " +peer0.org1.example.com | "2019-09-24 00:25:19.579 UTC [msp] GetDefaultSigningIdentity -> DEBU 1464 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:19.579 UTC [msp.identity] Sign -> DEBU 1465 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:19.579 UTC [msp.identity] Sign -> DEBU 1466 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:19.580 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1467 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:19.588 UTC [msp] DeserializeIdentity -> DEBU 1468 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.588 UTC [msp] DeserializeIdentity -> DEBU 1469 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.588 UTC [msp] DeserializeIdentity -> DEBU 146a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.588 UTC [gossip.comm] Send -> DEBU 146b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:19.589 UTC [gossip.comm] Send -> DEBU 146c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:19.589 UTC [msp] DeserializeIdentity -> DEBU 146d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.589 UTC [gossip.comm] Send -> DEBU 146e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:19.589 UTC [gossip.comm] sendToEndpoint -> DEBU 146f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1470 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1471 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.590 UTC [gossip.comm] sendToEndpoint -> DEBU 1472 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.590 UTC [gossip.comm] sendToEndpoint -> DEBU 1473 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.590 UTC [gossip.comm] sendToEndpoint -> DEBU 1474 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.599 UTC [gossip.pull] Hello -> DEBU 1475 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:19.599 UTC [gossip.comm] Send -> DEBU 1476 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:19.599 UTC [gossip.pull] Hello -> DEBU 1477 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:19.599 UTC [gossip.comm] Send -> DEBU 1478 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:19.602 UTC [gossip.pull] Hello -> DEBU 1479 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +orderer0.example.com | "2019-09-24 00:27:21.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e74 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:21.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e75 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:22.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e76 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:22.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e77 Sending msg of 28 bytes to 3 on channel testchainid took 19.8µs" +orderer0.example.com | "2019-09-24 00:27:22.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.9µs " +orderer0.example.com | "2019-09-24 00:27:22.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e79 Sending msg of 28 bytes to 3 on channel businesschannel took 34.9µs" +orderer0.example.com | "2019-09-24 00:27:22.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e7a Sending msg of 28 bytes to 2 on channel businesschannel took 26.7µs" +orderer0.example.com | "2019-09-24 00:27:22.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.4µs " +orderer0.example.com | "2019-09-24 00:27:22.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " +orderer0.example.com | "2019-09-24 00:27:22.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:22.318 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:22.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:22.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e80 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2019-09-24 00:27:22.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.3µs " +orderer0.example.com | "2019-09-24 00:27:22.554 UTC [orderer.common.server] Deliver -> DEBU 1e82 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:22.554 UTC [common.deliver] Handle -> DEBU 1e83 Starting new deliver loop for 172.18.0.9:32946" +orderer0.example.com | "2019-09-24 00:27:22.554 UTC [common.deliver] Handle -> DEBU 1e84 Attempting to read seek info message from 172.18.0.9:32946" +orderer0.example.com | "2019-09-24 00:27:22.554 UTC [policies] Evaluate -> DEBU 1e85 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.554 UTC [policies] Evaluate -> DEBU 1e86 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:22.555 UTC [policies] Evaluate -> DEBU 1e87 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.555 UTC [policies] Evaluate -> DEBU 1e88 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:22.556 UTC [policies] Evaluate -> DEBU 1e89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.556 UTC [msp] DeserializeIdentity -> DEBU 1e8a Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:22.556 UTC [msp.identity] newIdentity -> DEBU 1e8b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 00:27:22.558 UTC [cauthdsl] func1 -> DEBU 1e8c 0xc000d3cbd0 gate 1569284842558268100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:22.558 UTC [cauthdsl] func2 -> DEBU 1e8d 0xc000d3cbd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:22.558 UTC [cauthdsl] func2 -> DEBU 1e8e 0xc000d3cbd0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:22.558 UTC [cauthdsl] func2 -> DEBU 1e8f 0xc000d3cbd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:22.559 UTC [cauthdsl] func2 -> DEBU 1e90 0xc000d3cbd0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.559 UTC [cauthdsl] func1 -> DEBU 1e91 0xc000d3cbd0 gate 1569284842558268100 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.559 UTC [policies] Evaluate -> DEBU 1e92 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.559 UTC [policies] Evaluate -> DEBU 1e93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.559 UTC [policies] Evaluate -> DEBU 1e94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.559 UTC [cauthdsl] func1 -> DEBU 1e95 0xc000d3dd10 gate 1569284842559917800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:22.560 UTC [cauthdsl] func2 -> DEBU 1e96 0xc000d3dd10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:22.560 UTC [cauthdsl] func2 -> DEBU 1e97 0xc000d3dd10 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:22.560 UTC [cauthdsl] func2 -> DEBU 1e98 0xc000d3dd10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:22.560 UTC [cauthdsl] func2 -> DEBU 1e99 0xc000d3dd10 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.561 UTC [cauthdsl] func1 -> DEBU 1e9a 0xc000d3dd10 gate 1569284842559917800 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.561 UTC [policies] Evaluate -> DEBU 1e9b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.561 UTC [policies] Evaluate -> DEBU 1e9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.561 UTC [policies] Evaluate -> DEBU 1e9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.562 UTC [cauthdsl] func1 -> DEBU 1e9e 0xc001022570 gate 1569284842562017800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:22.562 UTC [cauthdsl] func2 -> DEBU 1e9f 0xc001022570 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:22.562 UTC [cauthdsl] func2 -> DEBU 1ea0 0xc001022570 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:22.562 UTC [cauthdsl] func2 -> DEBU 1ea1 0xc001022570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:22.562 UTC [cauthdsl] func2 -> DEBU 1ea2 0xc001022570 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.562 UTC [cauthdsl] func1 -> DEBU 1ea3 0xc001022570 gate 1569284842562017800 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.563 UTC [policies] Evaluate -> DEBU 1ea4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.563 UTC [policies] Evaluate -> DEBU 1ea5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.563 UTC [policies] func1 -> DEBU 1ea6 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:22.563 UTC [policies] Evaluate -> DEBU 1ea7 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:22.563 UTC [policies] Evaluate -> DEBU 1ea8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:22.564 UTC [policies] Evaluate -> DEBU 1ea9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.564 UTC [policies] Evaluate -> DEBU 1eaa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:22.564 UTC [policies] Evaluate -> DEBU 1eab == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.564 UTC [cauthdsl] func1 -> DEBU 1eac 0xc001023280 gate 1569284842564648800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:22.564 UTC [cauthdsl] func2 -> DEBU 1ead 0xc001023280 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:22.564 UTC [cauthdsl] func2 -> DEBU 1eae 0xc001023280 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:22.565 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1eaf Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 00:27:22.565 UTC [msp] Validate -> DEBU 1eb0 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 00:27:22.565 UTC [cauthdsl] func2 -> DEBU 1eb1 0xc001023280 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:22.566 UTC [msp.identity] Verify -> DEBU 1eb2 Verify: digest = 00000000 96 18 25 28 7a 2c 7a b8 69 b7 25 db c3 a4 a3 b0 |..%(z,z.i.%.....| +orderer0.example.com | 00000010 1a 88 29 69 f7 fe 90 2b 2b dd c4 03 80 dc f1 c4 |..)i...++.......|" +orderer0.example.com | "2019-09-24 00:27:22.566 UTC [msp.identity] Verify -> DEBU 1eb3 Verify: sig = 00000000 30 45 02 21 00 9a 62 1b 40 86 7c 75 0a 74 da a7 |0E.!..b.@.|u.t..| +orderer0.example.com | 00000010 90 de 13 51 84 e6 42 6c 09 7b 8c bd c8 e5 aa f4 |...Q..Bl.{......| +orderer0.example.com | 00000020 c6 0d b7 4d 80 02 20 63 7d bc 1a f6 74 45 32 92 |...M.. c}...tE2.| +orderer0.example.com | 00000030 60 6d d4 b9 51 25 6e 21 1d 51 14 25 c3 cf 29 62 |`m..Q%n!.Q.%..)b| +orderer0.example.com | 00000040 75 0f 17 64 f4 88 bf |u..d...|" +orderer0.example.com | "2019-09-24 00:27:22.566 UTC [cauthdsl] func2 -> DEBU 1eb4 0xc001023280 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:22.566 UTC [cauthdsl] func1 -> DEBU 1eb5 0xc001023280 gate 1569284842564648800 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:22.566 UTC [policies] Evaluate -> DEBU 1eb6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:22.567 UTC [policies] Evaluate -> DEBU 1eb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:22.567 UTC [policies] Evaluate -> DEBU 1eb8 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:22.567 UTC [policies] Evaluate -> DEBU 1eb9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:22.567 UTC [policies] Evaluate -> DEBU 1eba Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:22.567 UTC [policies] Evaluate -> DEBU 1ebb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:22.567 UTC [common.deliver] deliverBlocks -> DEBU 1ebc [channel: businesschannel] Received seekInfo (0xc00130e480) start: > stop: > from 172.18.0.9:32946" +orderer0.example.com | "2019-09-24 00:27:22.567 UTC [fsblkstorage] Next -> DEBU 1ebd Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 00:27:22.567 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ebe newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +orderer0.example.com | "2019-09-24 00:27:22.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ebf Remaining bytes=[34885], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:22.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ec0 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +orderer0.example.com | "2019-09-24 00:27:22.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ec1 blockbytes [34882] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:22.568 UTC [common.deliver] deliverBlocks -> DEBU 1ec2 [channel: businesschannel] Delivering block for (0xc00130e480) for 172.18.0.9:32946" +orderer0.example.com | "2019-09-24 00:27:22.569 UTC [common.deliver] deliverBlocks -> DEBU 1ec3 [channel: businesschannel] Done delivering to 172.18.0.9:32946 for (0xc00130e480)" +orderer0.example.com | "2019-09-24 00:27:22.569 UTC [common.deliver] Handle -> DEBU 1ec4 Waiting for new SeekInfo from 172.18.0.9:32946" +orderer0.example.com | "2019-09-24 00:27:22.569 UTC [common.deliver] Handle -> DEBU 1ec5 Attempting to read seek info message from 172.18.0.9:32946" +orderer0.example.com | "2019-09-24 00:27:22.570 UTC [fsblkstorage] waitForBlock -> DEBU 1ec6 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:22.570 UTC [fsblkstorage] waitForBlock -> DEBU 1ec7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:22.577 UTC [common.deliver] Handle -> WARN 1ec8 Error reading from 172.18.0.9:32946: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:22.577 UTC [orderer.common.server] func1 -> DEBU 1ec9 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:22.577 UTC [comm.grpc.server] 1 -> INFO 1eca streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32946 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.7396ms +orderer0.example.com | "2019-09-24 00:27:22.577 UTC [grpc] infof -> DEBU 1ecb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:22.699 UTC [orderer.common.server] Deliver -> DEBU 1ecc Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:22.699 UTC [common.deliver] Handle -> DEBU 1ecd Starting new deliver loop for 172.18.0.9:32948" +orderer0.example.com | "2019-09-24 00:27:22.700 UTC [common.deliver] Handle -> DEBU 1ece Attempting to read seek info message from 172.18.0.9:32948" +orderer0.example.com | "2019-09-24 00:27:22.702 UTC [policies] Evaluate -> DEBU 1ecf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.702 UTC [policies] Evaluate -> DEBU 1ed0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:19.602 UTC [gossip.comm] Send -> DEBU 147a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 147b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 147c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 147d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 147e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 147f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 1480 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.604 UTC [gossip.comm] func1 -> DEBU 1481 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.604 UTC [gossip.gossip] handleMessage -> DEBU 1482 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.605 UTC [gossip.pull] HandleMessage -> DEBU 1483 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.605 UTC [gossip.gossip] handleMessage -> DEBU 1484 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.610 UTC [gossip.comm] func1 -> DEBU 1485 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.610 UTC [gossip.gossip] handleMessage -> DEBU 1486 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.610 UTC [gossip.pull] HandleMessage -> DEBU 1487 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.610 UTC [gossip.gossip] handleMessage -> DEBU 1488 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.618 UTC [gossip.gossip] handleMessage -> DEBU 1489 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.621 UTC [gossip.pull] HandleMessage -> DEBU 148a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.622 UTC [gossip.gossip] handleMessage -> DEBU 148b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.622 UTC [msp] GetDefaultSigningIdentity -> DEBU 148c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:19.622 UTC [msp.identity] Sign -> DEBU 148d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101C " +peer0.org1.example.com | "2019-09-24 00:25:19.622 UTC [msp.identity] Sign -> DEBU 148e Sign: digest: EA8364BE66517A45B36DA20A851B6A0F6280430F9169B1FB4F5290A05CC3F383 " +peer0.org1.example.com | "2019-09-24 00:25:19.622 UTC [msp] GetDefaultSigningIdentity -> DEBU 148f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:19.622 UTC [msp.identity] Sign -> DEBU 1490 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:19.622 UTC [msp.identity] Sign -> DEBU 1491 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:19.622 UTC [msp] DeserializeIdentity -> DEBU 1492 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.623 UTC [gossip.comm] Send -> DEBU 1493 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:19.623 UTC [msp] DeserializeIdentity -> DEBU 1494 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.623 UTC [gossip.comm] Send -> DEBU 1495 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:19.623 UTC [gossip.comm] Send -> DEBU 1496 Entering, sending GossipMessage: tag:EMPTY mem_req:\205}\\D\251\252$\200\310\031\002 I\337X\273\017\221\307\370r]\311\023\331E\220\352\205m\362\3571\220\032R\316\000\221v;#`\344" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:19.623 UTC [gossip.comm] sendToEndpoint -> DEBU 1497 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.623 UTC [gossip.comm] sendToEndpoint -> DEBU 1498 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\205}\\D\251\252$\200\310\031\002 I\337X\273\017\221\307\370r]\311\023\331E\220\352\205m\362\3571\220\032R\316\000\221v;#`\344" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.623 UTC [gossip.comm] sendToEndpoint -> DEBU 1499 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.623 UTC [gossip.comm] sendToEndpoint -> DEBU 149a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.629 UTC [gossip.comm] func1 -> DEBU 149b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.629 UTC [gossip.gossip] handleMessage -> DEBU 149c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.629 UTC [gossip.gossip] handleMessage -> DEBU 149d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU 149e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.629 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 149f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:19.629 UTC [msp.identity] Verify -> DEBU 14a0 Verify: digest = 00000000 ea 83 64 be 66 51 7a 45 b3 6d a2 0a 85 1b 6a 0f |..d.fQzE.m....j.| +peer0.org1.example.com | 00000010 62 80 43 0f 91 69 b1 fb 4f 52 90 a0 5c c3 f3 83 |b.C..i..OR..\...|" +peer0.org1.example.com | "2019-09-24 00:25:19.629 UTC [msp.identity] Verify -> DEBU 14a1 Verify: sig = 00000000 30 44 02 20 0a 64 0f e6 c9 46 e1 c5 65 34 c0 20 |0D. .d...F..e4. | +peer0.org1.example.com | 00000010 07 94 54 5d 3a 71 42 53 23 9a 96 f3 d2 2a f2 ed |..T]:qBS#....*..| +peer0.org1.example.com | 00000020 61 24 61 96 02 20 32 09 74 0a 4b 90 da fb fa 17 |a$a.. 2.t.K.....| +peer0.org1.example.com | 00000030 44 17 5a 0e 63 72 90 37 4c 8f 13 f3 66 4c 80 f6 |D.Z.cr.7L...fL..| +peer0.org1.example.com | 00000040 01 09 ec 39 9a d4 |...9..|" +peer0.org1.example.com | "2019-09-24 00:25:19.630 UTC [msp.identity] Verify -> DEBU 14a2 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:19.630 UTC [msp.identity] Verify -> DEBU 14a3 Verify: sig = 00000000 30 45 02 21 00 d7 e4 b4 ef 59 02 0d 6d 12 f5 6a |0E.!.....Y..m..j| +peer0.org1.example.com | 00000010 de 8b 50 58 6b 9b f2 d7 a1 6a 3e 85 7d 5c 44 a9 |..PXk....j>.}\D.| +peer0.org1.example.com | 00000020 aa 24 80 c8 19 02 20 49 df 58 bb 0f 91 c7 f8 72 |.$.... I.X.....r| +peer0.org1.example.com | 00000030 5d c9 13 d9 45 90 ea 85 6d f2 ef 31 90 1a 52 ce |]...E...m..1..R.| +peer0.org1.example.com | 00000040 00 91 76 3b 23 60 e4 |..v;#`.|" +peer0.org1.example.com | "2019-09-24 00:25:19.623 UTC [gossip.comm] sendToEndpoint -> DEBU 14a4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 14a5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.630 UTC [gossip.comm] sendToEndpoint -> DEBU 14a6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.630 UTC [gossip.discovery] isSentByMe -> DEBU 14a7 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 14a8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.635 UTC [gossip.comm] func1 -> DEBU 14aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.636 UTC [gossip.gossip] handleMessage -> DEBU 14ab Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.636 UTC [gossip.gossip] handleMessage -> DEBU 14ac Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.637 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14ae Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:19.642 UTC [msp.identity] Verify -> DEBU 14af Verify: digest = 00000000 ea 83 64 be 66 51 7a 45 b3 6d a2 0a 85 1b 6a 0f |..d.fQzE.m....j.| +peer0.org1.example.com | 00000010 62 80 43 0f 91 69 b1 fb 4f 52 90 a0 5c c3 f3 83 |b.C..i..OR..\...|" +peer0.org1.example.com | "2019-09-24 00:25:19.642 UTC [msp.identity] Verify -> DEBU 14b0 Verify: sig = 00000000 30 44 02 20 0a 64 0f e6 c9 46 e1 c5 65 34 c0 20 |0D. .d...F..e4. | +peer0.org1.example.com | 00000010 07 94 54 5d 3a 71 42 53 23 9a 96 f3 d2 2a f2 ed |..T]:qBS#....*..| +peer0.org1.example.com | 00000020 61 24 61 96 02 20 32 09 74 0a 4b 90 da fb fa 17 |a$a.. 2.t.K.....| +peer0.org1.example.com | 00000030 44 17 5a 0e 63 72 90 37 4c 8f 13 f3 66 4c 80 f6 |D.Z.cr.7L...fL..| +peer0.org1.example.com | 00000040 01 09 ec 39 9a d4 |...9..|" +peer0.org1.example.com | "2019-09-24 00:25:19.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 14b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.647 UTC [gossip.discovery] isSentByMe -> DEBU 14b2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 14b3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.647 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14b4 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:19.647 UTC [gossip.gossip] handleMessage -> DEBU 14b5 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.647 UTC [msp] DeserializeIdentity -> DEBU 14b6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.648 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14b7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:19.648 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14b8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:19.648 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14b9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:19.648 UTC [policies] Evaluate -> DEBU 14ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.648 UTC [policies] Evaluate -> DEBU 14bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:19.648 UTC [policies] Evaluate -> DEBU 14bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.648 UTC [cauthdsl] func1 -> DEBU 14bd 0xc003c8d0c0 gate 1569284719648571100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:19.648 UTC [cauthdsl] func2 -> DEBU 14be 0xc003c8d0c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:19.648 UTC [cauthdsl] func2 -> DEBU 14bf 0xc003c8d0c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:19.648 UTC [cauthdsl] func2 -> DEBU 14c0 0xc003c8d0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:19.648 UTC [cauthdsl] func2 -> DEBU 14c1 0xc003c8d0c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:19.649 UTC [cauthdsl] func1 -> DEBU 14c2 0xc003c8d0c0 gate 1569284719648571100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:19.649 UTC [policies] Evaluate -> DEBU 14c3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.659 UTC [policies] Evaluate -> DEBU 14c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.659 UTC [policies] Evaluate -> DEBU 14c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.659 UTC [cauthdsl] func1 -> DEBU 14c6 0xc003c8d900 gate 1569284719659723000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:19.659 UTC [cauthdsl] func2 -> DEBU 14c7 0xc003c8d900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:19.660 UTC [cauthdsl] func2 -> DEBU 14c8 0xc003c8d900 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:19.660 UTC [cauthdsl] func2 -> DEBU 14c9 0xc003c8d900 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:19.660 UTC [msp.identity] Verify -> DEBU 14ca Verify: digest = 00000000 c0 a2 c7 f3 29 34 1e 7e a3 e8 cc 14 e1 74 3f 79 |....)4.~.....t?y| +peer0.org1.example.com | 00000010 7a 26 e4 fa 20 24 d3 62 60 75 69 95 b0 14 53 c1 |z&.. $.b`ui...S.|" +peer0.org1.example.com | "2019-09-24 00:25:19.660 UTC [msp.identity] Verify -> DEBU 14cb Verify: sig = 00000000 30 44 02 20 7d 35 a7 c8 81 d1 aa f7 ec 07 60 53 |0D. }5........`S| +peer0.org1.example.com | 00000010 15 1b 7f 69 ee 05 07 75 b8 bf ac 63 fd 48 cc 89 |...i...u...c.H..| +peer0.org1.example.com | 00000020 36 d1 49 f2 02 20 70 49 01 99 e4 82 d8 de c1 ba |6.I.. pI........| +peer0.org1.example.com | 00000030 22 e5 3a 80 1d ba df 50 40 40 17 68 a2 17 b9 06 |".:....P@@.h....| +peer0.org1.example.com | 00000040 06 a5 bb c8 60 3e |....`>|" +peer0.org1.example.com | "2019-09-24 00:25:19.660 UTC [cauthdsl] func2 -> DEBU 14cc 0xc003c8d900 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:19.660 UTC [cauthdsl] func1 -> DEBU 14cd 0xc003c8d900 gate 1569284719659723000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:19.660 UTC [policies] Evaluate -> DEBU 14ce Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.660 UTC [policies] Evaluate -> DEBU 14cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.660 UTC [policies] Evaluate -> DEBU 14d0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.660 UTC [policies] Evaluate -> DEBU 14d1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.661 UTC [gossip.discovery] handleAliveMessage -> DEBU 14d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.661 UTC [gossip.discovery] handleAliveMessage -> DEBU 14d3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.664 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14d4 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:19.665 UTC [msp.identity] Verify -> DEBU 14d5 Verify: digest = 00000000 cb f6 6a 97 b6 43 98 3c 2d d6 a3 3c e4 6f 7a 6b |..j..C.<-..<.ozk| +peer0.org1.example.com | 00000010 47 83 78 cc 62 df bb 95 33 c0 21 c1 02 44 88 11 |G.x.b...3.!..D..|" +peer0.org1.example.com | "2019-09-24 00:25:19.665 UTC [msp.identity] Verify -> DEBU 14d6 Verify: sig = 00000000 30 45 02 21 00 ea 16 c1 57 02 b1 ac c6 08 b9 ee |0E.!....W.......| +peer0.org1.example.com | 00000010 91 26 f6 19 1c e3 98 1d 1a a8 b1 67 5b b9 1c a6 |.&.........g[...| +peer0.org1.example.com | 00000020 f0 96 1b 5f 4b 02 20 57 aa 28 a4 4a 22 c1 ec a5 |..._K. W.(.J"...| +peer0.org1.example.com | 00000030 92 2e 2b 33 8a 97 16 2a 41 f3 ba ab bb 4e 60 f7 |..+3...*A....N`.| +peer0.org1.example.com | 00000040 c0 03 a4 e9 97 d7 5e |......^|" +peer0.org1.example.com | "2019-09-24 00:25:19.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 14d7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 14d8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.665 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.665 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.665 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14db Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:19.666 UTC [msp.identity] Verify -> DEBU 14dc Verify: digest = 00000000 ea 83 64 be 66 51 7a 45 b3 6d a2 0a 85 1b 6a 0f |..d.fQzE.m....j.| +peer0.org1.example.com | 00000010 62 80 43 0f 91 69 b1 fb 4f 52 90 a0 5c c3 f3 83 |b.C..i..OR..\...|" +peer0.org1.example.com | "2019-09-24 00:25:19.666 UTC [msp.identity] Verify -> DEBU 14dd Verify: sig = 00000000 30 44 02 20 0a 64 0f e6 c9 46 e1 c5 65 34 c0 20 |0D. .d...F..e4. | +peer0.org1.example.com | 00000010 07 94 54 5d 3a 71 42 53 23 9a 96 f3 d2 2a f2 ed |..T]:qBS#....*..| +peer0.org1.example.com | 00000020 61 24 61 96 02 20 32 09 74 0a 4b 90 da fb fa 17 |a$a.. 2.t.K.....| +peer0.org1.example.com | 00000030 44 17 5a 0e 63 72 90 37 4c 8f 13 f3 66 4c 80 f6 |D.Z.cr.7L...fL..| +peer0.org1.example.com | 00000040 01 09 ec 39 9a d4 |...9..|" +peer0.org1.example.com | "2019-09-24 00:25:19.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 14de Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.666 UTC [gossip.discovery] isSentByMe -> DEBU 14df Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 14e0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.666 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14e1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:19.666 UTC [msp] DeserializeIdentity -> DEBU 14e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.666 UTC [gossip.gossip] handleMessage -> DEBU 14e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.667 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14e4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:19.671 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14e5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:19.671 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14e6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:19.671 UTC [policies] Evaluate -> DEBU 14e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.671 UTC [policies] Evaluate -> DEBU 14e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:19.671 UTC [policies] Evaluate -> DEBU 14e9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.671 UTC [cauthdsl] func1 -> DEBU 14ea 0xc003d0eb20 gate 1569284719671951800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14eb 0xc003d0eb20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14ec 0xc003d0eb20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14ed 0xc003d0eb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14ee 0xc003d0eb20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [cauthdsl] func1 -> DEBU 14ef 0xc003d0eb20 gate 1569284719671951800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14f0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [cauthdsl] func1 -> DEBU 14f3 0xc003d0f390 gate 1569284719672271400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14f4 0xc003d0f390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14f5 0xc003d0f390 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14f6 0xc003d0f390 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [msp.identity] Verify -> DEBU 14f7 Verify: digest = 00000000 8a d7 3f 3a 8d eb e3 c4 2e 78 77 f9 3d db 88 04 |..?:.....xw.=...| +peer0.org1.example.com | 00000010 bb 87 aa 8a 7b 07 b5 24 d0 ed 35 2b 80 c3 8b 08 |....{..$..5+....|" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [msp.identity] Verify -> DEBU 14f8 Verify: sig = 00000000 30 45 02 21 00 d6 e6 c3 48 7a 09 90 e3 a3 ed ba |0E.!....Hz......| +peer0.org1.example.com | 00000010 30 e6 d2 9b 58 e1 bd ba 70 6d cb 0b 1c d2 4b ac |0...X...pm....K.| +peer0.org1.example.com | 00000020 d1 7b 90 f7 ba 02 20 0e 8d d0 96 d6 89 99 b8 51 |.{.... ........Q| +peer0.org1.example.com | 00000030 4c 3b 7e 0a 6d df fc 09 1d 78 11 d9 f3 57 61 3f |L;~.m....x...Wa?| +peer0.org1.example.com | 00000040 64 ed 89 86 71 bb de |d...q..|" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14f9 0xc003d0f390 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [cauthdsl] func1 -> DEBU 14fa 0xc003d0f390 gate 1569284719672271400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14fb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14fd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [gossip.discovery] handleAliveMessage -> DEBU 14ff Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.672 UTC [gossip.discovery] handleAliveMessage -> DEBU 1500 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.673 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1501 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:19.673 UTC [msp.identity] Verify -> DEBU 1502 Verify: digest = 00000000 cb f6 6a 97 b6 43 98 3c 2d d6 a3 3c e4 6f 7a 6b |..j..C.<-..<.ozk| +peer0.org1.example.com | 00000010 47 83 78 cc 62 df bb 95 33 c0 21 c1 02 44 88 11 |G.x.b...3.!..D..|" +peer0.org1.example.com | "2019-09-24 00:25:19.673 UTC [msp.identity] Verify -> DEBU 1503 Verify: sig = 00000000 30 45 02 21 00 ea 16 c1 57 02 b1 ac c6 08 b9 ee |0E.!....W.......| +peer0.org1.example.com | 00000010 91 26 f6 19 1c e3 98 1d 1a a8 b1 67 5b b9 1c a6 |.&.........g[...| +peer0.org1.example.com | 00000020 f0 96 1b 5f 4b 02 20 57 aa 28 a4 4a 22 c1 ec a5 |..._K. W.(.J"...| +peer0.org1.example.com | 00000030 92 2e 2b 33 8a 97 16 2a 41 f3 ba ab bb 4e 60 f7 |..+3...*A....N`.| +peer0.org1.example.com | 00000040 c0 03 a4 e9 97 d7 5e |......^|" +peer0.org1.example.com | "2019-09-24 00:25:19.673 UTC [gossip.discovery] handleAliveMessage -> DEBU 1504 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.673 UTC [gossip.discovery] handleAliveMessage -> DEBU 1505 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1506 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.967 UTC [gossip.gossip] handleMessage -> DEBU 1507 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.967 UTC [gossip.pull] HandleMessage -> DEBU 1508 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.967 UTC [msp] DeserializeIdentity -> DEBU 1509 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.975 UTC [msp] DeserializeIdentity -> DEBU 150a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.975 UTC [msp] DeserializeIdentity -> DEBU 150b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.975 UTC [msp] DeserializeIdentity -> DEBU 150c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.975 UTC [msp] DeserializeIdentity -> DEBU 150d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.975 UTC [msp] DeserializeIdentity -> DEBU 150e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.975 UTC [gossip.pull] SendDigest -> DEBU 150f Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:19.975 UTC [gossip.gossip] handleMessage -> DEBU 1510 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.975 UTC [gossip.gossip] handleMessage -> DEBU 1511 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [gossip.gossip] handleMessage -> DEBU 1512 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1513 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1514 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [msp] DeserializeIdentity -> DEBU 1515 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1516 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1517 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1518 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [policies] Evaluate -> DEBU 1519 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [policies] Evaluate -> DEBU 151a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [policies] Evaluate -> DEBU 151b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [cauthdsl] func1 -> DEBU 151c 0xc003d5c630 gate 1569284719976802900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [cauthdsl] func2 -> DEBU 151d 0xc003d5c630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:19.976 UTC [cauthdsl] func2 -> DEBU 151e 0xc003d5c630 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 151f 0xc003d5c630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 1520 0xc003d5c630 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [cauthdsl] func1 -> DEBU 1521 0xc003d5c630 gate 1569284719976802900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [policies] Evaluate -> DEBU 1522 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [policies] Evaluate -> DEBU 1523 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [policies] Evaluate -> DEBU 1524 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [cauthdsl] func1 -> DEBU 1525 0xc003d5ce80 gate 1569284719977374900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 1526 0xc003d5ce80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 1527 0xc003d5ce80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 1528 0xc003d5ce80 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:22.703 UTC [policies] Evaluate -> DEBU 1ed1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.703 UTC [policies] Evaluate -> DEBU 1ed2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:22.703 UTC [policies] Evaluate -> DEBU 1ed3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.703 UTC [cauthdsl] func1 -> DEBU 1ed4 0xc001003260 gate 1569284842703787100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:22.703 UTC [cauthdsl] func2 -> DEBU 1ed5 0xc001003260 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:22.704 UTC [cauthdsl] func2 -> DEBU 1ed6 0xc001003260 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:22.704 UTC [cauthdsl] func2 -> DEBU 1ed7 0xc001003260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:22.704 UTC [cauthdsl] func2 -> DEBU 1ed8 0xc001003260 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.704 UTC [cauthdsl] func1 -> DEBU 1ed9 0xc001003260 gate 1569284842703787100 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.704 UTC [policies] Evaluate -> DEBU 1eda Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.705 UTC [policies] Evaluate -> DEBU 1edb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.705 UTC [policies] Evaluate -> DEBU 1edc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.705 UTC [cauthdsl] func1 -> DEBU 1edd 0xc001003b50 gate 1569284842705317400 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:22.705 UTC [cauthdsl] func2 -> DEBU 1ede 0xc001003b50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:22.705 UTC [cauthdsl] func2 -> DEBU 1edf 0xc001003b50 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:22.705 UTC [cauthdsl] func2 -> DEBU 1ee0 0xc001003b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:22.706 UTC [cauthdsl] func2 -> DEBU 1ee1 0xc001003b50 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.706 UTC [cauthdsl] func1 -> DEBU 1ee2 0xc001003b50 gate 1569284842705317400 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.706 UTC [policies] Evaluate -> DEBU 1ee3 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.706 UTC [policies] Evaluate -> DEBU 1ee4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.706 UTC [policies] Evaluate -> DEBU 1ee5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.706 UTC [cauthdsl] func1 -> DEBU 1ee6 0xc000af8390 gate 1569284842706628000 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:22.706 UTC [cauthdsl] func2 -> DEBU 1ee7 0xc000af8390 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:22.706 UTC [cauthdsl] func2 -> DEBU 1ee8 0xc000af8390 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:22.706 UTC [cauthdsl] func2 -> DEBU 1ee9 0xc000af8390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:22.707 UTC [cauthdsl] func2 -> DEBU 1eea 0xc000af8390 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.707 UTC [cauthdsl] func1 -> DEBU 1eeb 0xc000af8390 gate 1569284842706628000 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:22.707 UTC [policies] Evaluate -> DEBU 1eec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.707 UTC [policies] Evaluate -> DEBU 1eed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:22.707 UTC [policies] func1 -> DEBU 1eee Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:22.707 UTC [policies] Evaluate -> DEBU 1eef Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:22.707 UTC [policies] Evaluate -> DEBU 1ef0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:22.707 UTC [policies] Evaluate -> DEBU 1ef1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.708 UTC [policies] Evaluate -> DEBU 1ef2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:22.708 UTC [policies] Evaluate -> DEBU 1ef3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:22.708 UTC [cauthdsl] func1 -> DEBU 1ef4 0xc000af9080 gate 1569284842708383800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:22.708 UTC [cauthdsl] func2 -> DEBU 1ef5 0xc000af9080 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:22.708 UTC [cauthdsl] func2 -> DEBU 1ef6 0xc000af9080 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:22.708 UTC [cauthdsl] func2 -> DEBU 1ef7 0xc000af9080 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:22.708 UTC [msp.identity] Verify -> DEBU 1ef8 Verify: digest = 00000000 f2 d4 d5 23 9b 9d 15 9c 23 1b 6f 0c fe 54 e5 de |...#....#.o..T..| +orderer0.example.com | 00000010 9b 66 6f 3a 7c 7e 07 44 db f2 eb 00 a1 a2 34 86 |.fo:|~.D......4.|" +orderer0.example.com | "2019-09-24 00:27:22.709 UTC [msp.identity] Verify -> DEBU 1ef9 Verify: sig = 00000000 30 44 02 20 61 50 6b 1c 43 37 92 9f 13 fc 4a 14 |0D. aPk.C7....J.| +orderer0.example.com | 00000010 da f2 f0 07 13 36 c4 29 4e de c2 92 04 dc 66 03 |.....6.)N.....f.| +orderer0.example.com | 00000020 c5 66 95 aa 02 20 3d 53 53 be 29 2c 85 61 6e 27 |.f... =SS.),.an'| +orderer0.example.com | 00000030 3e e0 c1 38 9e b0 41 30 3e a3 29 95 df b7 82 3c |>..8..A0>.)....<| +orderer0.example.com | 00000040 4d 09 10 52 2d c1 |M..R-.|" +orderer0.example.com | "2019-09-24 00:27:22.709 UTC [cauthdsl] func2 -> DEBU 1efa 0xc000af9080 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:22.709 UTC [cauthdsl] func1 -> DEBU 1efb 0xc000af9080 gate 1569284842708383800 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:22.709 UTC [policies] Evaluate -> DEBU 1efc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:22.709 UTC [policies] Evaluate -> DEBU 1efd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:22.709 UTC [policies] Evaluate -> DEBU 1efe Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:22.710 UTC [policies] Evaluate -> DEBU 1eff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:22.710 UTC [policies] Evaluate -> DEBU 1f00 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:22.710 UTC [policies] Evaluate -> DEBU 1f01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:22.710 UTC [common.deliver] deliverBlocks -> DEBU 1f02 [channel: businesschannel] Received seekInfo (0xc0001d2a00) start: > stop: > from 172.18.0.9:32948" +orderer0.example.com | "2019-09-24 00:27:22.711 UTC [fsblkstorage] Next -> DEBU 1f03 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [msp.identity] Verify -> DEBU 1529 Verify: digest = 00000000 cc 86 df 7b 56 75 55 16 7f 00 f3 eb f8 e9 d1 ea |...{VuU.........| +peer0.org1.example.com | 00000010 3e 98 e4 50 94 2d 23 18 6f 8d 98 3f 25 6f cb 5e |>..P.-#.o..?%o.^|" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [msp.identity] Verify -> DEBU 152a Verify: sig = 00000000 30 44 02 20 19 23 f2 02 a8 df 4e 56 a8 e9 79 d5 |0D. .#....NV..y.| +peer0.org1.example.com | 00000010 58 54 7e b8 4d ce b7 0d 8a 5e 5a 7b 16 01 f4 da |XT~.M....^Z{....| +peer0.org1.example.com | 00000020 3b 24 b2 a8 02 20 2c 5d 4d b0 23 e0 54 87 13 09 |;$... ,]M.#.T...| +peer0.org1.example.com | 00000030 b9 e7 4e 48 be 06 b0 6b a5 03 6d 7e 0b b7 bd 33 |..NH...k..m~...3| +peer0.org1.example.com | 00000040 cb 7f ba eb fc 37 |.....7|" +peer0.org1.example.com | "2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 152b 0xc003d5ce80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [cauthdsl] func1 -> DEBU 152c 0xc003d5ce80 gate 1569284719977374900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [policies] Evaluate -> DEBU 152d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [policies] Evaluate -> DEBU 152e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [policies] Evaluate -> DEBU 152f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [policies] Evaluate -> DEBU 1530 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [gossip.discovery] handleAliveMessage -> DEBU 1531 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 1532 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 1533 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 1534 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 1535 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 1536 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [gossip.discovery] handleAliveMessage -> DEBU 1537 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1538 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.978 UTC [gossip.discovery] sendMemResponse -> DEBU 1539 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:19.979 UTC [msp] DeserializeIdentity -> DEBU 153a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.979 UTC [msp] DeserializeIdentity -> DEBU 153b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.979 UTC [msp] DeserializeIdentity -> DEBU 153c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:19.979 UTC [gossip.comm] Send -> DEBU 153d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:19.979 UTC [gossip.discovery] sendMemResponse -> DEBU 153e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:19.979 UTC [gossip.comm] sendToEndpoint -> DEBU 153f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.979 UTC [gossip.comm] sendToEndpoint -> DEBU 1540 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.997 UTC [gossip.gossip] handleMessage -> DEBU 1541 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [gossip.gossip] handleMessage -> DEBU 1542 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1543 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1544 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [msp] DeserializeIdentity -> DEBU 1545 Obtaining identity" +orderer0.example.com | "2019-09-24 00:27:22.711 UTC [fsblkstorage] newBlockfileStream -> DEBU 1f04 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +orderer0.example.com | "2019-09-24 00:27:22.711 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f05 Remaining bytes=[34885], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:22.711 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f06 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +orderer0.example.com | "2019-09-24 00:27:22.711 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f07 blockbytes [34882] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:22.712 UTC [common.deliver] deliverBlocks -> DEBU 1f08 [channel: businesschannel] Delivering block for (0xc0001d2a00) for 172.18.0.9:32948" +orderer0.example.com | "2019-09-24 00:27:22.712 UTC [common.deliver] deliverBlocks -> DEBU 1f09 [channel: businesschannel] Done delivering to 172.18.0.9:32948 for (0xc0001d2a00)" +orderer0.example.com | "2019-09-24 00:27:22.712 UTC [fsblkstorage] waitForBlock -> DEBU 1f0a Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:22.713 UTC [fsblkstorage] waitForBlock -> DEBU 1f0b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:22.712 UTC [common.deliver] Handle -> DEBU 1f0c Waiting for new SeekInfo from 172.18.0.9:32948" +orderer0.example.com | "2019-09-24 00:27:22.713 UTC [common.deliver] Handle -> DEBU 1f0d Attempting to read seek info message from 172.18.0.9:32948" +orderer0.example.com | "2019-09-24 00:27:22.717 UTC [grpc] infof -> DEBU 1f0e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:22.717 UTC [common.deliver] Handle -> WARN 1f0f Error reading from 172.18.0.9:32948: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:22.717 UTC [orderer.common.server] func1 -> DEBU 1f10 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:22.717 UTC [comm.grpc.server] 1 -> INFO 1f11 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32948 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.1965ms +orderer0.example.com | "2019-09-24 00:27:22.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f12 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-09-24 00:27:22.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f13 Sending msg of 28 bytes to 3 on channel businesschannel took 24µs" +orderer0.example.com | "2019-09-24 00:27:22.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.8µs " +orderer0.example.com | "2019-09-24 00:27:22.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.5µs " +orderer0.example.com | "2019-09-24 00:27:22.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f16 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:22.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f17 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:22.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f18 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:22.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f19 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2019-09-24 00:27:22.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.1µs " +orderer0.example.com | "2019-09-24 00:27:23.135 UTC [orderer.common.server] Deliver -> DEBU 1f1b Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:23.136 UTC [common.deliver] Handle -> DEBU 1f1c Starting new deliver loop for 172.18.0.9:32950" +orderer0.example.com | "2019-09-24 00:27:23.136 UTC [common.deliver] Handle -> DEBU 1f1d Attempting to read seek info message from 172.18.0.9:32950" +orderer0.example.com | "2019-09-24 00:27:23.137 UTC [policies] Evaluate -> DEBU 1f1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.137 UTC [policies] Evaluate -> DEBU 1f1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.138 UTC [policies] Evaluate -> DEBU 1f20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.138 UTC [policies] Evaluate -> DEBU 1f21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.138 UTC [policies] Evaluate -> DEBU 1f22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.138 UTC [cauthdsl] func1 -> DEBU 1f23 0xc00131b9a0 gate 1569284843138765900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.139 UTC [cauthdsl] func2 -> DEBU 1f24 0xc00131b9a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.139 UTC [cauthdsl] func2 -> DEBU 1f25 0xc00131b9a0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.139 UTC [cauthdsl] func2 -> DEBU 1f26 0xc00131b9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.140 UTC [cauthdsl] func2 -> DEBU 1f27 0xc00131b9a0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.140 UTC [cauthdsl] func1 -> DEBU 1f28 0xc00131b9a0 gate 1569284843138765900 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.140 UTC [policies] Evaluate -> DEBU 1f29 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.140 UTC [policies] Evaluate -> DEBU 1f2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.140 UTC [policies] Evaluate -> DEBU 1f2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.141 UTC [cauthdsl] func1 -> DEBU 1f2c 0xc000cc8280 gate 1569284843140962100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.141 UTC [cauthdsl] func2 -> DEBU 1f2d 0xc000cc8280 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.141 UTC [cauthdsl] func2 -> DEBU 1f2e 0xc000cc8280 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.141 UTC [cauthdsl] func2 -> DEBU 1f2f 0xc000cc8280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.142 UTC [cauthdsl] func2 -> DEBU 1f30 0xc000cc8280 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.142 UTC [cauthdsl] func1 -> DEBU 1f31 0xc000cc8280 gate 1569284843140962100 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.142 UTC [policies] Evaluate -> DEBU 1f32 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.142 UTC [policies] Evaluate -> DEBU 1f33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1546 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1547 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1548 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 1549 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 154a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 154b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [cauthdsl] func1 -> DEBU 154c 0xc003de39a0 gate 1569284719998576000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 154d 0xc003de39a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 154e 0xc003de39a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 154f 0xc003de39a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 1550 0xc003de39a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [cauthdsl] func1 -> DEBU 1551 0xc003de39a0 gate 1569284719998576000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 1552 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 1553 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 1554 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [cauthdsl] func1 -> DEBU 1555 0xc003e061e0 gate 1569284719998884100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 1556 0xc003e061e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 1557 0xc003e061e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 1558 0xc003e061e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [msp.identity] Verify -> DEBU 1559 Verify: digest = 00000000 2e f4 bc 3c e2 70 b6 97 56 47 ce 34 8d 1f 83 62 |...<.p..VG.4...b| +peer0.org1.example.com | 00000010 42 4e 4a d0 e3 4b 0a 15 b8 e2 b8 7f 16 c9 c3 19 |BNJ..K..........|" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [msp.identity] Verify -> DEBU 155a Verify: sig = 00000000 30 45 02 21 00 c9 92 00 07 17 5b e9 dd a6 10 14 |0E.!......[.....| +peer0.org1.example.com | 00000010 72 ea a3 92 f7 d4 1f d8 c3 86 75 ff d8 f7 a8 97 |r.........u.....| +peer0.org1.example.com | 00000020 40 59 17 53 37 02 20 74 ad 35 b0 ed 31 f7 5e 7e |@Y.S7. t.5..1.^~| +peer0.org1.example.com | 00000030 97 52 f7 18 9f 64 10 d9 ba bf 50 40 cb b8 9b 76 |.R...d....P@...v| +peer0.org1.example.com | 00000040 ae e4 b5 d9 9b 27 83 |.....'.|" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [cauthdsl] func2 -> DEBU 155b 0xc003e061e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [cauthdsl] func1 -> DEBU 155c 0xc003e061e0 gate 1569284719998884100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [policies] Evaluate -> DEBU 155d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [policies] Evaluate -> DEBU 155e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [policies] Evaluate -> DEBU 155f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [policies] Evaluate -> DEBU 1560 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [gossip.discovery] handleAliveMessage -> DEBU 1561 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 1562 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 1563 updating membership: timestamp: " +orderer0.example.com | "2019-09-24 00:27:23.142 UTC [policies] Evaluate -> DEBU 1f34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.143 UTC [cauthdsl] func1 -> DEBU 1f35 0xc000cc8b20 gate 1569284843143194700 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.143 UTC [cauthdsl] func2 -> DEBU 1f36 0xc000cc8b20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.143 UTC [cauthdsl] func2 -> DEBU 1f37 0xc000cc8b20 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.144 UTC [cauthdsl] func2 -> DEBU 1f38 0xc000cc8b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.144 UTC [cauthdsl] func2 -> DEBU 1f39 0xc000cc8b20 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.144 UTC [cauthdsl] func1 -> DEBU 1f3a 0xc000cc8b20 gate 1569284843143194700 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.145 UTC [policies] Evaluate -> DEBU 1f3b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.145 UTC [policies] Evaluate -> DEBU 1f3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.146 UTC [policies] func1 -> DEBU 1f3d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:23.146 UTC [policies] Evaluate -> DEBU 1f3e Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.146 UTC [policies] Evaluate -> DEBU 1f3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.146 UTC [policies] Evaluate -> DEBU 1f40 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.146 UTC [policies] Evaluate -> DEBU 1f41 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.147 UTC [policies] Evaluate -> DEBU 1f42 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.148 UTC [cauthdsl] func1 -> DEBU 1f43 0xc000cc9810 gate 1569284843147978400 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.148 UTC [cauthdsl] func2 -> DEBU 1f44 0xc000cc9810 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.148 UTC [cauthdsl] func2 -> DEBU 1f45 0xc000cc9810 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.148 UTC [cauthdsl] func2 -> DEBU 1f46 0xc000cc9810 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:23.148 UTC [msp.identity] Verify -> DEBU 1f47 Verify: digest = 00000000 bd ae 27 d2 10 d8 ed fb 3e c0 26 3e 9a 4f 73 27 |..'.....>.&>.Os'| +orderer0.example.com | 00000010 47 0b dd a0 77 e7 b8 da 25 29 c4 84 88 37 0f c0 |G...w...%)...7..|" +orderer0.example.com | "2019-09-24 00:27:23.149 UTC [msp.identity] Verify -> DEBU 1f48 Verify: sig = 00000000 30 45 02 21 00 9b d0 af 27 a3 7e 89 57 83 38 cb |0E.!....'.~.W.8.| +orderer0.example.com | 00000010 ac 19 7a fa cd 82 32 c8 96 8a 7e b0 1f fa fb bd |..z...2...~.....| +orderer0.example.com | 00000020 7d 36 72 ec 33 02 20 16 07 ea 9a 9e 0e 9f ab 87 |}6r.3. .........| +orderer0.example.com | 00000030 d5 9e ac 31 1e 3a 00 7f 72 99 ee 6f ef 80 a9 a9 |...1.:..r..o....| +orderer0.example.com | 00000040 33 64 36 87 5d 13 e4 |3d6.]..|" +orderer0.example.com | "2019-09-24 00:27:23.149 UTC [cauthdsl] func2 -> DEBU 1f49 0xc000cc9810 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:23.149 UTC [cauthdsl] func1 -> DEBU 1f4a 0xc000cc9810 gate 1569284843147978400 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:23.149 UTC [policies] Evaluate -> DEBU 1f4b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.149 UTC [policies] Evaluate -> DEBU 1f4c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.150 UTC [policies] Evaluate -> DEBU 1f4d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.150 UTC [policies] Evaluate -> DEBU 1f4e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.150 UTC [policies] Evaluate -> DEBU 1f4f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.150 UTC [policies] Evaluate -> DEBU 1f50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.150 UTC [common.deliver] deliverBlocks -> DEBU 1f51 [channel: businesschannel] Received seekInfo (0xc0002c4e80) start: > stop: > from 172.18.0.9:32950" +orderer0.example.com | "2019-09-24 00:27:23.150 UTC [fsblkstorage] Next -> DEBU 1f52 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 00:27:23.151 UTC [fsblkstorage] newBlockfileStream -> DEBU 1f53 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +orderer0.example.com | "2019-09-24 00:27:23.151 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f54 Remaining bytes=[34885], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:23.151 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f55 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +orderer0.example.com | "2019-09-24 00:27:23.151 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f56 blockbytes [34882] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:23.152 UTC [common.deliver] deliverBlocks -> DEBU 1f57 [channel: businesschannel] Delivering block for (0xc0002c4e80) for 172.18.0.9:32950" +orderer0.example.com | "2019-09-24 00:27:23.152 UTC [common.deliver] deliverBlocks -> DEBU 1f58 [channel: businesschannel] Done delivering to 172.18.0.9:32950 for (0xc0002c4e80)" +orderer0.example.com | "2019-09-24 00:27:23.152 UTC [common.deliver] Handle -> DEBU 1f59 Waiting for new SeekInfo from 172.18.0.9:32950" +orderer0.example.com | "2019-09-24 00:27:23.152 UTC [common.deliver] Handle -> DEBU 1f5a Attempting to read seek info message from 172.18.0.9:32950" +orderer0.example.com | "2019-09-24 00:27:23.152 UTC [fsblkstorage] waitForBlock -> DEBU 1f5b Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:23.152 UTC [fsblkstorage] waitForBlock -> DEBU 1f5c Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:23.155 UTC [grpc] infof -> DEBU 1f5d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:23.155 UTC [common.deliver] Handle -> WARN 1f5e Error reading from 172.18.0.9:32950: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:23.155 UTC [orderer.common.server] func1 -> DEBU 1f5f Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:23.155 UTC [comm.grpc.server] 1 -> INFO 1f60 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32950 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.0944ms +orderer0.example.com | "2019-09-24 00:27:23.297 UTC [orderer.common.server] Deliver -> DEBU 1f61 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:23.297 UTC [common.deliver] Handle -> DEBU 1f62 Starting new deliver loop for 172.18.0.9:32952" +orderer0.example.com | "2019-09-24 00:27:23.297 UTC [common.deliver] Handle -> DEBU 1f63 Attempting to read seek info message from 172.18.0.9:32952" +orderer0.example.com | "2019-09-24 00:27:23.299 UTC [policies] Evaluate -> DEBU 1f64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 1564 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 1565 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 1566 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [gossip.discovery] handleAliveMessage -> DEBU 1567 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:19.999 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1568 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 1569 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 156a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 156b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 156c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 156d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 156e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.004 UTC [gossip.comm] Send -> DEBU 156f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 1570 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 1571 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.004 UTC [gossip.comm] Send -> DEBU 1572 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:20.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1573 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1574 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1575 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1576 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.005 UTC [gossip.comm] func1 -> DEBU 1577 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.005 UTC [gossip.gossip] handleMessage -> DEBU 1578 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.006 UTC [gossip.gossip] handleMessage -> DEBU 1579 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU 157a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU 157b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.007 UTC [gossip.comm] func1 -> DEBU 157c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.007 UTC [gossip.gossip] handleMessage -> DEBU 157d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.007 UTC [gossip.gossip] handleMessage -> DEBU 157e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 157f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1580 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.187 UTC [msp] DeserializeIdentity -> DEBU 1581 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.188 UTC [msp] DeserializeIdentity -> DEBU 1582 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.188 UTC [gossip.comm] Send -> DEBU 1583 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1584 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1585 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1586 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1587 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1588 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 00:27:23.299 UTC [policies] Evaluate -> DEBU 1f65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.299 UTC [policies] Evaluate -> DEBU 1f66 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.299 UTC [policies] Evaluate -> DEBU 1f67 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.300 UTC [policies] Evaluate -> DEBU 1f68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.300 UTC [cauthdsl] func1 -> DEBU 1f69 0xc000bfa320 gate 1569284843300228500 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.300 UTC [cauthdsl] func2 -> DEBU 1f6a 0xc000bfa320 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.300 UTC [cauthdsl] func2 -> DEBU 1f6b 0xc000bfa320 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.301 UTC [cauthdsl] func2 -> DEBU 1f6c 0xc000bfa320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.301 UTC [cauthdsl] func2 -> DEBU 1f6d 0xc000bfa320 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.301 UTC [cauthdsl] func1 -> DEBU 1f6e 0xc000bfa320 gate 1569284843300228500 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.301 UTC [policies] Evaluate -> DEBU 1f6f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.301 UTC [policies] Evaluate -> DEBU 1f70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.301 UTC [policies] Evaluate -> DEBU 1f71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.301 UTC [cauthdsl] func1 -> DEBU 1f72 0xc000bfab60 gate 1569284843301580900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.301 UTC [cauthdsl] func2 -> DEBU 1f73 0xc000bfab60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.302 UTC [cauthdsl] func2 -> DEBU 1f74 0xc000bfab60 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.302 UTC [cauthdsl] func2 -> DEBU 1f75 0xc000bfab60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.302 UTC [cauthdsl] func2 -> DEBU 1f76 0xc000bfab60 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.302 UTC [cauthdsl] func1 -> DEBU 1f77 0xc000bfab60 gate 1569284843301580900 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.302 UTC [policies] Evaluate -> DEBU 1f78 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.302 UTC [policies] Evaluate -> DEBU 1f79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.302 UTC [policies] Evaluate -> DEBU 1f7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.303 UTC [cauthdsl] func1 -> DEBU 1f7b 0xc000bfb470 gate 1569284843303063300 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.303 UTC [cauthdsl] func2 -> DEBU 1f7c 0xc000bfb470 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.303 UTC [cauthdsl] func2 -> DEBU 1f7d 0xc000bfb470 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.303 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc000bfb470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.303 UTC [cauthdsl] func2 -> DEBU 1f7f 0xc000bfb470 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.303 UTC [cauthdsl] func1 -> DEBU 1f80 0xc000bfb470 gate 1569284843303063300 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.304 UTC [policies] Evaluate -> DEBU 1f81 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.304 UTC [policies] Evaluate -> DEBU 1f82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.304 UTC [policies] func1 -> DEBU 1f83 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:23.304 UTC [policies] Evaluate -> DEBU 1f84 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.304 UTC [policies] Evaluate -> DEBU 1f85 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.304 UTC [policies] Evaluate -> DEBU 1f86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.305 UTC [policies] Evaluate -> DEBU 1f87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.305 UTC [policies] Evaluate -> DEBU 1f88 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.305 UTC [cauthdsl] func1 -> DEBU 1f89 0xc000bc2180 gate 1569284843305515600 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.305 UTC [cauthdsl] func2 -> DEBU 1f8a 0xc000bc2180 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.305 UTC [cauthdsl] func2 -> DEBU 1f8b 0xc000bc2180 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.305 UTC [cauthdsl] func2 -> DEBU 1f8c 0xc000bc2180 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:23.305 UTC [msp.identity] Verify -> DEBU 1f8d Verify: digest = 00000000 3b d8 d2 6f 97 f7 ca 69 bd c3 06 57 70 02 e9 6b |;..o...i...Wp..k| +orderer0.example.com | 00000010 7e 77 f5 e2 cb b4 82 7b aa 10 39 f3 8c 44 38 c3 |~w.....{..9..D8.|" +orderer0.example.com | "2019-09-24 00:27:23.306 UTC [msp.identity] Verify -> DEBU 1f8e Verify: sig = 00000000 30 45 02 21 00 8a 84 ac 54 3b cd cf c5 2f 8f cf |0E.!....T;.../..| +orderer0.example.com | 00000010 95 11 a8 61 0c 5c 14 24 6b ae 7b f9 12 b0 59 8e |...a.\.$k.{...Y.| +orderer0.example.com | 00000020 59 dc c0 8c 82 02 20 58 b0 6e 5d b4 4f 4b 53 ec |Y..... X.n].OKS.| +orderer0.example.com | 00000030 87 07 1a 49 ff d8 ae f0 f2 3f d3 2f 51 76 b8 9b |...I.....?./Qv..| +orderer0.example.com | 00000040 4d f2 7e 8e e2 f6 cc |M.~....|" +orderer0.example.com | "2019-09-24 00:27:23.306 UTC [cauthdsl] func2 -> DEBU 1f8f 0xc000bc2180 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:23.306 UTC [cauthdsl] func1 -> DEBU 1f90 0xc000bc2180 gate 1569284843305515600 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:23.306 UTC [policies] Evaluate -> DEBU 1f91 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.306 UTC [policies] Evaluate -> DEBU 1f92 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.306 UTC [policies] Evaluate -> DEBU 1f93 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.307 UTC [policies] Evaluate -> DEBU 1f94 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.307 UTC [policies] Evaluate -> DEBU 1f95 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.307 UTC [policies] Evaluate -> DEBU 1f96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.307 UTC [common.deliver] deliverBlocks -> DEBU 1f97 [channel: businesschannel] Received seekInfo (0xc0002c5380) start: > stop: > from 172.18.0.9:32952" +peer0.org1.example.com | "2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1589 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.189 UTC [gossip.comm] func1 -> DEBU 158a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.189 UTC [gossip.gossip] handleMessage -> DEBU 158b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.189 UTC [msp] DeserializeIdentity -> DEBU 158c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.189 UTC [msp] DeserializeIdentity -> DEBU 158d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.189 UTC [msp] DeserializeIdentity -> DEBU 158e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 158f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1590 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1591 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 1592 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 1593 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 1594 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [cauthdsl] func1 -> DEBU 1595 0xc003e17960 gate 1569284720190301700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 1596 0xc003e17960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 1597 0xc003e17960 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 1598 0xc003e17960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 1599 0xc003e17960 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [cauthdsl] func1 -> DEBU 159a 0xc003e17960 gate 1569284720190301700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 159b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 159c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 159d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [cauthdsl] func1 -> DEBU 159e 0xc003e241a0 gate 1569284720190744700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 159f 0xc003e241a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 15a0 0xc003e241a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 15a1 0xc003e241a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [msp.identity] Verify -> DEBU 15a2 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:20.190 UTC [msp.identity] Verify -> DEBU 15a3 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:20.191 UTC [cauthdsl] func2 -> DEBU 15a4 0xc003e241a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.193 UTC [gossip.comm] func1 -> DEBU 15a5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.195 UTC [cauthdsl] func1 -> DEBU 15a6 0xc003e241a0 gate 1569284720190744700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:20.195 UTC [policies] Evaluate -> DEBU 15a7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.195 UTC [policies] Evaluate -> DEBU 15a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.195 UTC [policies] Evaluate -> DEBU 15a9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.195 UTC [policies] Evaluate -> DEBU 15aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.307 UTC [fsblkstorage] Next -> DEBU 1f98 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 00:27:23.307 UTC [fsblkstorage] newBlockfileStream -> DEBU 1f99 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +orderer0.example.com | "2019-09-24 00:27:23.307 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f9a Remaining bytes=[34885], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:23.308 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f9b Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +orderer0.example.com | "2019-09-24 00:27:23.308 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f9c blockbytes [34882] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:23.308 UTC [common.deliver] deliverBlocks -> DEBU 1f9d [channel: businesschannel] Delivering block for (0xc0002c5380) for 172.18.0.9:32952" +orderer0.example.com | "2019-09-24 00:27:23.308 UTC [common.deliver] deliverBlocks -> DEBU 1f9e [channel: businesschannel] Done delivering to 172.18.0.9:32952 for (0xc0002c5380)" +orderer0.example.com | "2019-09-24 00:27:23.308 UTC [common.deliver] Handle -> DEBU 1f9f Waiting for new SeekInfo from 172.18.0.9:32952" +orderer0.example.com | "2019-09-24 00:27:23.308 UTC [common.deliver] Handle -> DEBU 1fa0 Attempting to read seek info message from 172.18.0.9:32952" +orderer0.example.com | "2019-09-24 00:27:23.309 UTC [fsblkstorage] waitForBlock -> DEBU 1fa1 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:23.309 UTC [fsblkstorage] waitForBlock -> DEBU 1fa2 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:23.311 UTC [policies] Evaluate -> DEBU 1fa3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.311 UTC [policies] Evaluate -> DEBU 1fa4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.311 UTC [policies] Evaluate -> DEBU 1fa5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.311 UTC [policies] Evaluate -> DEBU 1fa6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.311 UTC [policies] Evaluate -> DEBU 1fa7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.312 UTC [cauthdsl] func1 -> DEBU 1fa8 0xc000c4db50 gate 1569284843312108000 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.312 UTC [cauthdsl] func2 -> DEBU 1fa9 0xc000c4db50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.312 UTC [cauthdsl] func2 -> DEBU 1faa 0xc000c4db50 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.313 UTC [cauthdsl] func2 -> DEBU 1fab 0xc000c4db50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.313 UTC [cauthdsl] func2 -> DEBU 1fac 0xc000c4db50 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.313 UTC [cauthdsl] func1 -> DEBU 1fad 0xc000c4db50 gate 1569284843312108000 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.313 UTC [policies] Evaluate -> DEBU 1faf Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.313 UTC [policies] Evaluate -> DEBU 1fb0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.314 UTC [policies] Evaluate -> DEBU 1fb2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 304.3µs " +orderer0.example.com | "2019-09-24 00:27:23.314 UTC [cauthdsl] func1 -> DEBU 1fb3 0xc000ba43b0 gate 1569284843314099200 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.314 UTC [cauthdsl] func2 -> DEBU 1fb4 0xc000ba43b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.314 UTC [cauthdsl] func2 -> DEBU 1fb5 0xc000ba43b0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.315 UTC [cauthdsl] func2 -> DEBU 1fb6 0xc000ba43b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.315 UTC [cauthdsl] func2 -> DEBU 1fb7 0xc000ba43b0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.315 UTC [cauthdsl] func1 -> DEBU 1fb8 0xc000ba43b0 gate 1569284843314099200 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.315 UTC [policies] Evaluate -> DEBU 1fb9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.315 UTC [policies] Evaluate -> DEBU 1fba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.315 UTC [policies] Evaluate -> DEBU 1fbb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.315 UTC [cauthdsl] func1 -> DEBU 1fbc 0xc000b745c0 gate 1569284843315859600 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.316 UTC [cauthdsl] func2 -> DEBU 1fbd 0xc000b745c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.316 UTC [cauthdsl] func2 -> DEBU 1fbe 0xc000b745c0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.316 UTC [cauthdsl] func2 -> DEBU 1fbf 0xc000b745c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.316 UTC [cauthdsl] func2 -> DEBU 1fc0 0xc000b745c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.316 UTC [cauthdsl] func1 -> DEBU 1fc1 0xc000b745c0 gate 1569284843315859600 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.316 UTC [policies] Evaluate -> DEBU 1fc2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.316 UTC [policies] Evaluate -> DEBU 1fc3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.316 UTC [policies] func1 -> DEBU 1fc4 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:23.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fc5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:23.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fae Sending msg of 28 bytes to 2 on channel businesschannel took 44.9µs" +orderer0.example.com | "2019-09-24 00:27:23.317 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fc6 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2019-09-24 00:27:23.318 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.8µs " +orderer0.example.com | "2019-09-24 00:27:23.317 UTC [policies] Evaluate -> DEBU 1fc8 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.318 UTC [policies] Evaluate -> DEBU 1fc9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.318 UTC [policies] Evaluate -> DEBU 1fca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.319 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fcb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:23.319 UTC [policies] Evaluate -> DEBU 1fcc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.319 UTC [policies] Evaluate -> DEBU 1fcd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.320 UTC [cauthdsl] func1 -> DEBU 1fce 0xc000b75350 gate 1569284843320010700 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.320 UTC [cauthdsl] func2 -> DEBU 1fcf 0xc000b75350 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.320 UTC [cauthdsl] func2 -> DEBU 1fd0 0xc000b75350 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.320 UTC [cauthdsl] func2 -> DEBU 1fd1 0xc000b75350 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:23.320 UTC [msp.identity] Verify -> DEBU 1fd2 Verify: digest = 00000000 77 78 d2 bc 1a 44 01 ae f2 89 02 df a6 b7 50 3a |wx...D........P:| +orderer0.example.com | 00000010 35 29 71 11 9e 67 ed 14 1d db ac f1 c4 d1 57 cd |5)q..g........W.|" +orderer0.example.com | "2019-09-24 00:27:23.320 UTC [msp.identity] Verify -> DEBU 1fd3 Verify: sig = 00000000 30 45 02 21 00 aa 35 74 d7 8a 96 ae 70 39 f5 77 |0E.!..5t....p9.w| +orderer0.example.com | 00000010 14 32 30 4a 46 4b e5 ef 36 8b c8 62 fd 6c 04 31 |.20JFK..6..b.l.1| +orderer0.example.com | 00000020 7b e5 92 0f 38 02 20 2d c4 58 24 bd 47 d6 99 99 |{...8. -.X$.G...| +orderer0.example.com | 00000030 a6 ed 0c 27 75 f5 8b 09 94 16 4a 47 0b e7 3c 4e |...'u.....JG.. DEBU 1fd4 0xc000b75350 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:23.320 UTC [cauthdsl] func1 -> DEBU 1fd5 0xc000b75350 gate 1569284843320010700 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fd6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fd7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fd8 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fd9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fda Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fdb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.321 UTC [common.deliver] deliverBlocks -> DEBU 1fdc [channel: businesschannel] Received seekInfo (0xc0001d3dc0) start: > stop: > from 172.18.0.9:32952" +orderer0.example.com | "2019-09-24 00:27:23.321 UTC [fsblkstorage] Next -> DEBU 1fdd Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 00:27:23.322 UTC [fsblkstorage] newBlockfileStream -> DEBU 1fde newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +orderer0.example.com | "2019-09-24 00:27:23.322 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1fdf Remaining bytes=[34885], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:23.322 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1fe0 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +orderer0.example.com | "2019-09-24 00:27:23.322 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1fe1 blockbytes [34882] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:23.322 UTC [common.deliver] deliverBlocks -> DEBU 1fe2 [channel: businesschannel] Delivering block for (0xc0001d3dc0) for 172.18.0.9:32952" +orderer0.example.com | "2019-09-24 00:27:23.322 UTC [common.deliver] deliverBlocks -> DEBU 1fe3 [channel: businesschannel] Done delivering to 172.18.0.9:32952 for (0xc0001d3dc0)" +orderer0.example.com | "2019-09-24 00:27:23.323 UTC [fsblkstorage] waitForBlock -> DEBU 1fe5 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:23.323 UTC [fsblkstorage] waitForBlock -> DEBU 1fe6 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:23.323 UTC [common.deliver] Handle -> DEBU 1fe4 Waiting for new SeekInfo from 172.18.0.9:32952" +orderer0.example.com | "2019-09-24 00:27:23.323 UTC [common.deliver] Handle -> DEBU 1fe7 Attempting to read seek info message from 172.18.0.9:32952" +orderer0.example.com | "2019-09-24 00:27:23.331 UTC [grpc] warningf -> DEBU 1fe8 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:32952: read: connection reset by peer" +orderer0.example.com | "2019-09-24 00:27:23.331 UTC [grpc] infof -> DEBU 1fe9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:23.332 UTC [common.deliver] Handle -> WARN 1fea Error reading from 172.18.0.9:32952: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:23.332 UTC [orderer.common.server] func1 -> DEBU 1feb Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:23.332 UTC [comm.grpc.server] 1 -> INFO 1fec streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32952 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.2301ms +orderer0.example.com | "2019-09-24 00:27:23.458 UTC [orderer.common.server] Deliver -> DEBU 1fed Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:23.458 UTC [common.deliver] Handle -> DEBU 1fee Starting new deliver loop for 172.18.0.9:32954" +orderer0.example.com | "2019-09-24 00:27:23.458 UTC [common.deliver] Handle -> DEBU 1fef Attempting to read seek info message from 172.18.0.9:32954" +orderer0.example.com | "2019-09-24 00:27:23.460 UTC [policies] Evaluate -> DEBU 1ff0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.460 UTC [policies] Evaluate -> DEBU 1ff1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.460 UTC [policies] Evaluate -> DEBU 1ff2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.461 UTC [policies] Evaluate -> DEBU 1ff3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.461 UTC [policies] Evaluate -> DEBU 1ff4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.461 UTC [cauthdsl] func1 -> DEBU 1ff5 0xc000ba5da0 gate 1569284843461561100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.461 UTC [cauthdsl] func2 -> DEBU 1ff6 0xc000ba5da0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.462 UTC [cauthdsl] func2 -> DEBU 1ff7 0xc000ba5da0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.462 UTC [cauthdsl] func2 -> DEBU 1ff8 0xc000ba5da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.462 UTC [cauthdsl] func2 -> DEBU 1ff9 0xc000ba5da0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.462 UTC [cauthdsl] func1 -> DEBU 1ffa 0xc000ba5da0 gate 1569284843461561100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.195 UTC [msp.identity] Verify -> DEBU 15ab Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:20.196 UTC [msp.identity] Verify -> DEBU 15ac Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:20.196 UTC [msp] DeserializeIdentity -> DEBU 15ad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.196 UTC [msp] DeserializeIdentity -> DEBU 15ae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.196 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:20.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15b0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15b1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.197 UTC [policies] Evaluate -> DEBU 15b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.197 UTC [policies] Evaluate -> DEBU 15b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:20.197 UTC [policies] Evaluate -> DEBU 15b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.197 UTC [cauthdsl] func1 -> DEBU 15b5 0xc003e400e0 gate 1569284720197325900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.197 UTC [cauthdsl] func2 -> DEBU 15b6 0xc003e400e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.197 UTC [cauthdsl] func2 -> DEBU 15b7 0xc003e400e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.197 UTC [cauthdsl] func2 -> DEBU 15b8 0xc003e400e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:20.202 UTC [cauthdsl] func2 -> DEBU 15b9 0xc003e400e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.202 UTC [cauthdsl] func1 -> DEBU 15ba 0xc003e400e0 gate 1569284720197325900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.202 UTC [policies] Evaluate -> DEBU 15bb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.202 UTC [policies] Evaluate -> DEBU 15bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.202 UTC [policies] Evaluate -> DEBU 15bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.202 UTC [cauthdsl] func1 -> DEBU 15be 0xc003e40920 gate 1569284720202607500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.202 UTC [cauthdsl] func2 -> DEBU 15bf 0xc003e40920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.203 UTC [cauthdsl] func2 -> DEBU 15c0 0xc003e40920 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.203 UTC [cauthdsl] func2 -> DEBU 15c1 0xc003e40920 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.203 UTC [msp.identity] Verify -> DEBU 15c2 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:20.203 UTC [msp.identity] Verify -> DEBU 15c3 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:20.203 UTC [cauthdsl] func2 -> DEBU 15c4 0xc003e40920 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.203 UTC [cauthdsl] func1 -> DEBU 15c5 0xc003e40920 gate 1569284720202607500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:20.203 UTC [policies] Evaluate -> DEBU 15c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.203 UTC [policies] Evaluate -> DEBU 15c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.203 UTC [policies] Evaluate -> DEBU 15c8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.204 UTC [policies] Evaluate -> DEBU 15c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.204 UTC [msp.identity] Verify -> DEBU 15ca Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +orderer0.example.com | "2019-09-24 00:27:23.462 UTC [policies] Evaluate -> DEBU 1ffb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.463 UTC [policies] Evaluate -> DEBU 1ffc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.463 UTC [policies] Evaluate -> DEBU 1ffd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.463 UTC [cauthdsl] func1 -> DEBU 1ffe 0xc000b085e0 gate 1569284843463503500 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.463 UTC [cauthdsl] func2 -> DEBU 1fff 0xc000b085e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.463 UTC [cauthdsl] func2 -> DEBU 2000 0xc000b085e0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.464 UTC [cauthdsl] func2 -> DEBU 2001 0xc000b085e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.464 UTC [cauthdsl] func2 -> DEBU 2002 0xc000b085e0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.464 UTC [cauthdsl] func1 -> DEBU 2003 0xc000b085e0 gate 1569284843463503500 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.465 UTC [policies] Evaluate -> DEBU 2004 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.466 UTC [policies] Evaluate -> DEBU 2005 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.466 UTC [policies] Evaluate -> DEBU 2006 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.466 UTC [cauthdsl] func1 -> DEBU 2007 0xc000b08f20 gate 1569284843466502800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.466 UTC [cauthdsl] func2 -> DEBU 2008 0xc000b08f20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.467 UTC [cauthdsl] func2 -> DEBU 2009 0xc000b08f20 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.467 UTC [cauthdsl] func2 -> DEBU 200a 0xc000b08f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.467 UTC [cauthdsl] func2 -> DEBU 200b 0xc000b08f20 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.467 UTC [cauthdsl] func1 -> DEBU 200c 0xc000b08f20 gate 1569284843466502800 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.467 UTC [policies] Evaluate -> DEBU 200d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.468 UTC [policies] Evaluate -> DEBU 200e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.468 UTC [policies] func1 -> DEBU 200f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:23.469 UTC [policies] Evaluate -> DEBU 2010 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.469 UTC [policies] Evaluate -> DEBU 2011 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.469 UTC [policies] Evaluate -> DEBU 2012 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.469 UTC [policies] Evaluate -> DEBU 2013 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.469 UTC [policies] Evaluate -> DEBU 2014 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.469 UTC [cauthdsl] func1 -> DEBU 2015 0xc000b09c10 gate 1569284843469936800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.470 UTC [cauthdsl] func2 -> DEBU 2016 0xc000b09c10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.470 UTC [cauthdsl] func2 -> DEBU 2017 0xc000b09c10 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.470 UTC [cauthdsl] func2 -> DEBU 2018 0xc000b09c10 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:23.470 UTC [msp.identity] Verify -> DEBU 2019 Verify: digest = 00000000 d3 f9 d5 71 08 d2 37 02 66 3c 83 20 fd 1c 52 e2 |...q..7.f<. ..R.| +orderer0.example.com | 00000010 5a 0a c2 da dd 29 5d 6b 1a 77 18 d2 e9 bd 10 a7 |Z....)]k.w......|" +orderer0.example.com | "2019-09-24 00:27:23.471 UTC [msp.identity] Verify -> DEBU 201a Verify: sig = 00000000 30 44 02 20 2f a7 05 4f cb 87 81 51 5a 55 13 1b |0D. /..O...QZU..| +orderer0.example.com | 00000010 7d 49 af db 1f bb 2a f0 94 f3 b8 57 a4 24 30 ac |}I....*....W.$0.| +orderer0.example.com | 00000020 82 2d 4d 33 02 20 3f cb ae d2 8b 49 ec e0 b5 9c |.-M3. ?....I....| +orderer0.example.com | 00000030 39 d9 4e ce 17 11 d4 c6 33 e3 b2 05 45 40 44 b6 |9.N.....3...E@D.| +orderer0.example.com | 00000040 21 a7 e5 b2 d1 db |!.....|" +orderer0.example.com | "2019-09-24 00:27:23.471 UTC [cauthdsl] func2 -> DEBU 201b 0xc000b09c10 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:23.471 UTC [cauthdsl] func1 -> DEBU 201c 0xc000b09c10 gate 1569284843469936800 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 201d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 201e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 201f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 2020 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 2021 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 2022 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.472 UTC [common.deliver] deliverBlocks -> DEBU 2023 [channel: businesschannel] Received seekInfo (0xc001186400) start: > stop: > from 172.18.0.9:32954" +orderer0.example.com | "2019-09-24 00:27:23.472 UTC [fsblkstorage] Next -> DEBU 2024 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 00:27:23.472 UTC [fsblkstorage] newBlockfileStream -> DEBU 2025 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:27:23.472 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2026 Remaining bytes=[118791], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:23.473 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2027 Returning blockbytes - length=[23945], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:27:23.473 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2028 blockbytes [23945] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:23.473 UTC [common.deliver] deliverBlocks -> DEBU 2029 [channel: businesschannel] Delivering block for (0xc001186400) for 172.18.0.9:32954" +orderer0.example.com | "2019-09-24 00:27:23.474 UTC [common.deliver] deliverBlocks -> DEBU 202a [channel: businesschannel] Done delivering to 172.18.0.9:32954 for (0xc001186400)" +orderer0.example.com | "2019-09-24 00:27:23.474 UTC [common.deliver] Handle -> DEBU 202b Waiting for new SeekInfo from 172.18.0.9:32954" +orderer0.example.com | "2019-09-24 00:27:23.474 UTC [common.deliver] Handle -> DEBU 202c Attempting to read seek info message from 172.18.0.9:32954" +orderer0.example.com | "2019-09-24 00:27:23.474 UTC [fsblkstorage] waitForBlock -> DEBU 202d Came out of wait. maxAvailaBlockNumber=[6]" +peer0.org1.example.com | "2019-09-24 00:25:20.204 UTC [msp.identity] Verify -> DEBU 15cb Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:20.204 UTC [gossip.gossip] handleMessage -> DEBU 15cc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.204 UTC [gossip.gossip] handleMessage -> DEBU 15cd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.205 UTC [msp.identity] Verify -> DEBU 15ce Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:20.205 UTC [msp.identity] Verify -> DEBU 15cf Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:20.205 UTC [msp.identity] Verify -> DEBU 15d0 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:20.205 UTC [msp.identity] Verify -> DEBU 15d1 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:20.205 UTC [msp] DeserializeIdentity -> DEBU 15d2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.206 UTC [msp] DeserializeIdentity -> DEBU 15d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.207 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15d4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:20.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15d5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15d6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.207 UTC [policies] Evaluate -> DEBU 15d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.207 UTC [policies] Evaluate -> DEBU 15d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:20.207 UTC [policies] Evaluate -> DEBU 15d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.207 UTC [cauthdsl] func1 -> DEBU 15da 0xc003e51c50 gate 1569284720207733900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15db 0xc003e51c50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15dc 0xc003e51c50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15dd 0xc003e51c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15de 0xc003e51c50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [cauthdsl] func1 -> DEBU 15df 0xc003e51c50 gate 1569284720207733900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [policies] Evaluate -> DEBU 15e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [policies] Evaluate -> DEBU 15e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [policies] Evaluate -> DEBU 15e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [cauthdsl] func1 -> DEBU 15e3 0xc003e8c5a0 gate 1569284720215451700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15e4 0xc003e8c5a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15e5 0xc003e8c5a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15e6 0xc003e8c5a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [msp.identity] Verify -> DEBU 15e7 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +orderer0.example.com | "2019-09-24 00:27:23.474 UTC [fsblkstorage] waitForBlock -> DEBU 202e Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:23.490 UTC [grpc] infof -> DEBU 202f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:23.490 UTC [common.deliver] Handle -> WARN 2030 Error reading from 172.18.0.9:32954: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:23.490 UTC [orderer.common.server] func1 -> DEBU 2031 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:23.491 UTC [comm.grpc.server] 1 -> INFO 2032 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32954 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.5315ms +orderer0.example.com | "2019-09-24 00:27:23.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2033 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:23.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2034 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2019-09-24 00:27:23.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2035 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.8µs " +orderer0.example.com | "2019-09-24 00:27:23.653 UTC [orderer.common.server] Deliver -> DEBU 2036 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:23.653 UTC [common.deliver] Handle -> DEBU 2037 Starting new deliver loop for 172.18.0.9:32956" +orderer0.example.com | "2019-09-24 00:27:23.653 UTC [common.deliver] Handle -> DEBU 2038 Attempting to read seek info message from 172.18.0.9:32956" +orderer0.example.com | "2019-09-24 00:27:23.654 UTC [policies] Evaluate -> DEBU 2039 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.654 UTC [policies] Evaluate -> DEBU 203a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.654 UTC [policies] Evaluate -> DEBU 203b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.654 UTC [policies] Evaluate -> DEBU 203c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.655 UTC [policies] Evaluate -> DEBU 203d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.655 UTC [cauthdsl] func1 -> DEBU 203e 0xc00088e010 gate 1569284843655273500 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.655 UTC [cauthdsl] func2 -> DEBU 203f 0xc00088e010 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.656 UTC [cauthdsl] func2 -> DEBU 2040 0xc00088e010 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.657 UTC [cauthdsl] func2 -> DEBU 2041 0xc00088e010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.657 UTC [cauthdsl] func2 -> DEBU 2042 0xc00088e010 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.657 UTC [cauthdsl] func1 -> DEBU 2043 0xc00088e010 gate 1569284843655273500 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.657 UTC [policies] Evaluate -> DEBU 2044 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.657 UTC [policies] Evaluate -> DEBU 2045 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.657 UTC [policies] Evaluate -> DEBU 2046 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.658 UTC [cauthdsl] func1 -> DEBU 2047 0xc00088e960 gate 1569284843658033900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.658 UTC [cauthdsl] func2 -> DEBU 2048 0xc00088e960 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.658 UTC [cauthdsl] func2 -> DEBU 2049 0xc00088e960 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.658 UTC [cauthdsl] func2 -> DEBU 204a 0xc00088e960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.658 UTC [cauthdsl] func2 -> DEBU 204b 0xc00088e960 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.658 UTC [cauthdsl] func1 -> DEBU 204c 0xc00088e960 gate 1569284843658033900 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.658 UTC [policies] Evaluate -> DEBU 204d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.658 UTC [policies] Evaluate -> DEBU 204e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.658 UTC [policies] Evaluate -> DEBU 204f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.659 UTC [cauthdsl] func1 -> DEBU 2050 0xc00088f300 gate 1569284843659029100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.659 UTC [cauthdsl] func2 -> DEBU 2051 0xc00088f300 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.659 UTC [cauthdsl] func2 -> DEBU 2052 0xc00088f300 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.659 UTC [cauthdsl] func2 -> DEBU 2053 0xc00088f300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.659 UTC [cauthdsl] func2 -> DEBU 2054 0xc00088f300 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.659 UTC [cauthdsl] func1 -> DEBU 2055 0xc00088f300 gate 1569284843659029100 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.659 UTC [policies] Evaluate -> DEBU 2056 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.659 UTC [policies] Evaluate -> DEBU 2057 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.659 UTC [policies] func1 -> DEBU 2058 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:23.660 UTC [policies] Evaluate -> DEBU 2059 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.660 UTC [policies] Evaluate -> DEBU 205a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.660 UTC [policies] Evaluate -> DEBU 205b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.660 UTC [policies] Evaluate -> DEBU 205c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.660 UTC [policies] Evaluate -> DEBU 205d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.660 UTC [cauthdsl] func1 -> DEBU 205e 0xc00088fff0 gate 1569284843660665100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.660 UTC [cauthdsl] func2 -> DEBU 205f 0xc00088fff0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.660 UTC [cauthdsl] func2 -> DEBU 2060 0xc00088fff0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.660 UTC [cauthdsl] func2 -> DEBU 2061 0xc00088fff0 principal matched by identity 0" +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:20.215 UTC [msp.identity] Verify -> DEBU 15e8 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:20.216 UTC [cauthdsl] func2 -> DEBU 15e9 0xc003e8c5a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.216 UTC [cauthdsl] func1 -> DEBU 15ea 0xc003e8c5a0 gate 1569284720215451700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:20.219 UTC [policies] Evaluate -> DEBU 15eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.219 UTC [policies] Evaluate -> DEBU 15ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.219 UTC [policies] Evaluate -> DEBU 15ed Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.219 UTC [policies] Evaluate -> DEBU 15ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.219 UTC [msp] DeserializeIdentity -> DEBU 15ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.220 UTC [msp] DeserializeIdentity -> DEBU 15f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.221 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15f1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:20.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15f2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15f3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.229 UTC [policies] Evaluate -> DEBU 15f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.229 UTC [policies] Evaluate -> DEBU 15f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:20.229 UTC [policies] Evaluate -> DEBU 15f6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.229 UTC [cauthdsl] func1 -> DEBU 15f7 0xc003e8dfb0 gate 1569284720229747700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.229 UTC [cauthdsl] func2 -> DEBU 15f8 0xc003e8dfb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.230 UTC [cauthdsl] func2 -> DEBU 15f9 0xc003e8dfb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.230 UTC [cauthdsl] func2 -> DEBU 15fa 0xc003e8dfb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:20.230 UTC [cauthdsl] func2 -> DEBU 15fb 0xc003e8dfb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.230 UTC [cauthdsl] func1 -> DEBU 15fc 0xc003e8dfb0 gate 1569284720229747700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.230 UTC [policies] Evaluate -> DEBU 15fd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.230 UTC [policies] Evaluate -> DEBU 15fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.230 UTC [policies] Evaluate -> DEBU 15ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.230 UTC [cauthdsl] func1 -> DEBU 1600 0xc003ed47f0 gate 1569284720230668900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.230 UTC [cauthdsl] func2 -> DEBU 1601 0xc003ed47f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.231 UTC [cauthdsl] func2 -> DEBU 1602 0xc003ed47f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.231 UTC [cauthdsl] func2 -> DEBU 1603 0xc003ed47f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.231 UTC [msp.identity] Verify -> DEBU 1604 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:20.231 UTC [msp.identity] Verify -> DEBU 1605 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:20.231 UTC [cauthdsl] func2 -> DEBU 1606 0xc003ed47f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.231 UTC [cauthdsl] func1 -> DEBU 1607 0xc003ed47f0 gate 1569284720230668900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:20.231 UTC [policies] Evaluate -> DEBU 1608 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.231 UTC [policies] Evaluate -> DEBU 1609 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.231 UTC [policies] Evaluate -> DEBU 160a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.232 UTC [policies] Evaluate -> DEBU 160b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.232 UTC [gossip.gossip] handleMessage -> DEBU 160c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.232 UTC [gossip.gossip] handleMessage -> DEBU 160d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.232 UTC [msp] DeserializeIdentity -> DEBU 160e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.232 UTC [msp] DeserializeIdentity -> DEBU 160f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.232 UTC [msp] DeserializeIdentity -> DEBU 1610 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1611 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1612 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1613 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [policies] Evaluate -> DEBU 1614 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [policies] Evaluate -> DEBU 1615 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [policies] Evaluate -> DEBU 1616 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [cauthdsl] func1 -> DEBU 1617 0xc003edc330 gate 1569284720233647700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [cauthdsl] func2 -> DEBU 1618 0xc003edc330 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [cauthdsl] func2 -> DEBU 1619 0xc003edc330 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [cauthdsl] func2 -> DEBU 161a 0xc003edc330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [cauthdsl] func2 -> DEBU 161b 0xc003edc330 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [cauthdsl] func1 -> DEBU 161c 0xc003edc330 gate 1569284720233647700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [policies] Evaluate -> DEBU 161d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.233 UTC [policies] Evaluate -> DEBU 161e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [policies] Evaluate -> DEBU 161f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [cauthdsl] func1 -> DEBU 1620 0xc003edcb80 gate 1569284720234103100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [cauthdsl] func2 -> DEBU 1621 0xc003edcb80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [cauthdsl] func2 -> DEBU 1622 0xc003edcb80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [cauthdsl] func2 -> DEBU 1623 0xc003edcb80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [msp.identity] Verify -> DEBU 1624 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [msp.identity] Verify -> DEBU 1625 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [cauthdsl] func2 -> DEBU 1626 0xc003edcb80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [cauthdsl] func1 -> DEBU 1627 0xc003edcb80 gate 1569284720234103100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [policies] Evaluate -> DEBU 1628 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [policies] Evaluate -> DEBU 1629 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [policies] Evaluate -> DEBU 162a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.234 UTC [policies] Evaluate -> DEBU 162b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.661 UTC [msp.identity] Verify -> DEBU 2062 Verify: digest = 00000000 77 cf d1 ff d0 ef 21 dc cc 6e 33 38 23 b3 7a c0 |w.....!..n38#.z.| +orderer0.example.com | 00000010 6a 58 92 c3 95 34 cc 72 e0 b0 8f 6d d1 77 21 76 |jX...4.r...m.w!v|" +orderer0.example.com | "2019-09-24 00:27:23.661 UTC [msp.identity] Verify -> DEBU 2063 Verify: sig = 00000000 30 44 02 20 04 69 84 d2 8a f7 01 11 3d cc 9e f4 |0D. .i......=...| +orderer0.example.com | 00000010 41 53 e6 3c 68 6d 20 3f 77 5e ff 1a fa 95 bd a9 |AS. DEBU 2064 0xc00088fff0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:23.661 UTC [cauthdsl] func1 -> DEBU 2065 0xc00088fff0 gate 1569284843660665100 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:23.661 UTC [policies] Evaluate -> DEBU 2066 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.661 UTC [policies] Evaluate -> DEBU 2067 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.661 UTC [policies] Evaluate -> DEBU 2068 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.662 UTC [policies] Evaluate -> DEBU 2069 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.662 UTC [policies] Evaluate -> DEBU 206a Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.662 UTC [policies] Evaluate -> DEBU 206b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.662 UTC [common.deliver] deliverBlocks -> DEBU 206c [channel: businesschannel] Received seekInfo (0xc0008f2340) start: > stop: > from 172.18.0.9:32956" +orderer0.example.com | "2019-09-24 00:27:23.662 UTC [fsblkstorage] Next -> DEBU 206d Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 00:27:23.662 UTC [fsblkstorage] newBlockfileStream -> DEBU 206e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23948]" +orderer0.example.com | "2019-09-24 00:27:23.662 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 206f Remaining bytes=[94843], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:23.663 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2070 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23948], bytesOffset=[23951]}" +orderer0.example.com | "2019-09-24 00:27:23.663 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2071 blockbytes [23690] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:23.663 UTC [common.deliver] deliverBlocks -> DEBU 2072 [channel: businesschannel] Delivering block for (0xc0008f2340) for 172.18.0.9:32956" +orderer0.example.com | "2019-09-24 00:27:23.663 UTC [common.deliver] deliverBlocks -> DEBU 2073 [channel: businesschannel] Done delivering to 172.18.0.9:32956 for (0xc0008f2340)" +orderer0.example.com | "2019-09-24 00:27:23.664 UTC [common.deliver] Handle -> DEBU 2074 Waiting for new SeekInfo from 172.18.0.9:32956" +orderer0.example.com | "2019-09-24 00:27:23.664 UTC [common.deliver] Handle -> DEBU 2076 Attempting to read seek info message from 172.18.0.9:32956" +orderer0.example.com | "2019-09-24 00:27:23.664 UTC [fsblkstorage] waitForBlock -> DEBU 2075 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:23.664 UTC [fsblkstorage] waitForBlock -> DEBU 2077 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:23.671 UTC [common.deliver] Handle -> WARN 2078 Error reading from 172.18.0.9:32956: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:23.672 UTC [orderer.common.server] func1 -> DEBU 207a Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:23.672 UTC [comm.grpc.server] 1 -> INFO 207b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32956 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.9623ms +orderer0.example.com | "2019-09-24 00:27:23.671 UTC [grpc] infof -> DEBU 2079 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:23.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 207c Sending msg of 28 bytes to 2 on channel businesschannel took 15.3µs" +orderer0.example.com | "2019-09-24 00:27:23.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 207d Sending msg of 28 bytes to 3 on channel businesschannel took 7.3µs" +orderer0.example.com | "2019-09-24 00:27:23.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 207e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.2µs " +orderer0.example.com | "2019-09-24 00:27:23.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 207f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.1µs " +orderer0.example.com | "2019-09-24 00:27:23.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2080 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:23.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2081 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:23.824 UTC [orderer.common.server] Deliver -> DEBU 2082 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:23.824 UTC [common.deliver] Handle -> DEBU 2083 Starting new deliver loop for 172.18.0.9:32958" +orderer0.example.com | "2019-09-24 00:27:23.824 UTC [common.deliver] Handle -> DEBU 2084 Attempting to read seek info message from 172.18.0.9:32958" +orderer0.example.com | "2019-09-24 00:27:23.825 UTC [policies] Evaluate -> DEBU 2085 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.825 UTC [policies] Evaluate -> DEBU 2086 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.826 UTC [policies] Evaluate -> DEBU 2087 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.826 UTC [policies] Evaluate -> DEBU 2088 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.826 UTC [policies] Evaluate -> DEBU 2089 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.826 UTC [cauthdsl] func1 -> DEBU 208a 0xc000176f30 gate 1569284843826939100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.827 UTC [cauthdsl] func2 -> DEBU 208b 0xc000176f30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.827 UTC [cauthdsl] func2 -> DEBU 208c 0xc000176f30 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.828 UTC [cauthdsl] func2 -> DEBU 208d 0xc000176f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.828 UTC [cauthdsl] func2 -> DEBU 208e 0xc000176f30 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.828 UTC [cauthdsl] func1 -> DEBU 208f 0xc000176f30 gate 1569284843826939100 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.828 UTC [policies] Evaluate -> DEBU 2090 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.828 UTC [policies] Evaluate -> DEBU 2091 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.828 UTC [policies] Evaluate -> DEBU 2092 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.829 UTC [cauthdsl] func1 -> DEBU 2093 0xc0001778c0 gate 1569284843829172800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.829 UTC [cauthdsl] func2 -> DEBU 2094 0xc0001778c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.829 UTC [cauthdsl] func2 -> DEBU 2095 0xc0001778c0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.830 UTC [cauthdsl] func2 -> DEBU 2096 0xc0001778c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.830 UTC [cauthdsl] func2 -> DEBU 2097 0xc0001778c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.830 UTC [cauthdsl] func1 -> DEBU 2098 0xc0001778c0 gate 1569284843829172800 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.830 UTC [policies] Evaluate -> DEBU 2099 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.831 UTC [policies] Evaluate -> DEBU 209a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.831 UTC [policies] Evaluate -> DEBU 209b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.831 UTC [cauthdsl] func1 -> DEBU 209c 0xc000283e20 gate 1569284843831678500 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.832 UTC [cauthdsl] func2 -> DEBU 209d 0xc000283e20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.832 UTC [cauthdsl] func2 -> DEBU 209e 0xc000283e20 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.832 UTC [cauthdsl] func2 -> DEBU 209f 0xc000283e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:23.833 UTC [cauthdsl] func2 -> DEBU 20a0 0xc000283e20 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.833 UTC [cauthdsl] func1 -> DEBU 20a1 0xc000283e20 gate 1569284843831678500 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:23.833 UTC [policies] Evaluate -> DEBU 20a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.833 UTC [policies] Evaluate -> DEBU 20a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:23.834 UTC [policies] func1 -> DEBU 20a4 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:23.834 UTC [policies] Evaluate -> DEBU 20a5 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.834 UTC [policies] Evaluate -> DEBU 20a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:23.834 UTC [policies] Evaluate -> DEBU 20a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.834 UTC [policies] Evaluate -> DEBU 20a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:23.834 UTC [policies] Evaluate -> DEBU 20a9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:23.835 UTC [cauthdsl] func1 -> DEBU 20aa 0xc0003c4b40 gate 1569284843834993900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:23.835 UTC [cauthdsl] func2 -> DEBU 20ab 0xc0003c4b40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:23.835 UTC [cauthdsl] func2 -> DEBU 20ac 0xc0003c4b40 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:23.835 UTC [cauthdsl] func2 -> DEBU 20ad 0xc0003c4b40 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:23.835 UTC [msp.identity] Verify -> DEBU 20ae Verify: digest = 00000000 79 fe 64 fb 75 72 bb b3 a6 aa 91 f8 49 34 e7 36 |y.d.ur......I4.6| +orderer0.example.com | 00000010 b9 16 0f 05 be a0 51 bb 7b 8d a4 20 8f 72 72 ec |......Q.{.. .rr.|" +orderer0.example.com | "2019-09-24 00:27:23.835 UTC [msp.identity] Verify -> DEBU 20af Verify: sig = 00000000 30 44 02 20 46 c7 4f d3 f6 2b 6a b9 9b c7 41 d0 |0D. F.O..+j...A.| +orderer0.example.com | 00000010 90 e3 45 c6 f2 45 04 8f 43 17 f2 17 1b b3 37 10 |..E..E..C.....7.| +orderer0.example.com | 00000020 9a be c7 f0 02 20 0e ab ba 3d 99 7c 56 0b 72 1d |..... ...=.|V.r.| +orderer0.example.com | 00000030 ea 18 71 1f 16 99 07 8d 2b 2b 23 71 24 1c 24 6c |..q.....++#q$.$l| +orderer0.example.com | 00000040 12 45 fb 23 b5 8b |.E.#..|" +orderer0.example.com | "2019-09-24 00:27:23.836 UTC [cauthdsl] func2 -> DEBU 20b0 0xc0003c4b40 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:23.854 UTC [cauthdsl] func1 -> DEBU 20b1 0xc0003c4b40 gate 1569284843834993900 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:23.854 UTC [policies] Evaluate -> DEBU 20b2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.854 UTC [policies] Evaluate -> DEBU 20b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:23.856 UTC [policies] Evaluate -> DEBU 20b4 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.856 UTC [policies] Evaluate -> DEBU 20b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:23.857 UTC [policies] Evaluate -> DEBU 20b6 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.857 UTC [policies] Evaluate -> DEBU 20b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:23.857 UTC [common.deliver] deliverBlocks -> DEBU 20b8 [channel: businesschannel] Received seekInfo (0xc0008f2c80) start: > stop: > from 172.18.0.9:32958" +orderer0.example.com | "2019-09-24 00:27:23.857 UTC [fsblkstorage] Next -> DEBU 20b9 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 00:27:23.857 UTC [fsblkstorage] newBlockfileStream -> DEBU 20ba newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47641]" +orderer0.example.com | "2019-09-24 00:27:23.858 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 20bb Remaining bytes=[71150], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:23.858 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 20bc Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47641], bytesOffset=[47644]}" +orderer0.example.com | "2019-09-24 00:27:23.858 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 20bd blockbytes [23747] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:23.859 UTC [common.deliver] deliverBlocks -> DEBU 20be [channel: businesschannel] Delivering block for (0xc0008f2c80) for 172.18.0.9:32958" +orderer0.example.com | "2019-09-24 00:27:23.859 UTC [common.deliver] deliverBlocks -> DEBU 20bf [channel: businesschannel] Done delivering to 172.18.0.9:32958 for (0xc0008f2c80)" +orderer0.example.com | "2019-09-24 00:27:23.860 UTC [fsblkstorage] waitForBlock -> DEBU 20c0 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:23.860 UTC [fsblkstorage] waitForBlock -> DEBU 20c1 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:23.859 UTC [common.deliver] Handle -> DEBU 20c2 Waiting for new SeekInfo from 172.18.0.9:32958" +orderer0.example.com | "2019-09-24 00:27:23.861 UTC [common.deliver] Handle -> DEBU 20c3 Attempting to read seek info message from 172.18.0.9:32958" +orderer0.example.com | "2019-09-24 00:27:23.867 UTC [grpc] infof -> DEBU 20c4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:23.868 UTC [common.deliver] Handle -> WARN 20c5 Error reading from 172.18.0.9:32958: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:23.868 UTC [orderer.common.server] func1 -> DEBU 20c6 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:23.868 UTC [comm.grpc.server] 1 -> INFO 20c7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32958 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.8304ms +orderer0.example.com | "2019-09-24 00:27:23.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 20c8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:24.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 20c9 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-09-24 00:27:24.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 20ca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +orderer0.example.com | "2019-09-24 00:27:24.033 UTC [orderer.common.server] Deliver -> DEBU 20cb Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:24.033 UTC [common.deliver] Handle -> DEBU 20cc Starting new deliver loop for 172.18.0.9:32960" +orderer0.example.com | "2019-09-24 00:27:24.033 UTC [common.deliver] Handle -> DEBU 20cd Attempting to read seek info message from 172.18.0.9:32960" +orderer0.example.com | "2019-09-24 00:27:24.034 UTC [policies] Evaluate -> DEBU 20ce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.034 UTC [policies] Evaluate -> DEBU 20cf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.035 UTC [policies] Evaluate -> DEBU 20d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.035 UTC [policies] Evaluate -> DEBU 20d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.035 UTC [policies] Evaluate -> DEBU 20d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.035 UTC [cauthdsl] func1 -> DEBU 20d3 0xc000398f50 gate 1569284844035585700 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.035 UTC [cauthdsl] func2 -> DEBU 20d4 0xc000398f50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.036 UTC [cauthdsl] func2 -> DEBU 20d5 0xc000398f50 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.036 UTC [cauthdsl] func2 -> DEBU 20d6 0xc000398f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.036 UTC [cauthdsl] func2 -> DEBU 20d7 0xc000398f50 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.036 UTC [cauthdsl] func1 -> DEBU 20d8 0xc000398f50 gate 1569284844035585700 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.037 UTC [policies] Evaluate -> DEBU 20d9 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.037 UTC [policies] Evaluate -> DEBU 20da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.037 UTC [policies] Evaluate -> DEBU 20db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.037 UTC [cauthdsl] func1 -> DEBU 20dc 0xc0003998e0 gate 1569284844037539500 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.037 UTC [cauthdsl] func2 -> DEBU 20dd 0xc0003998e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.037 UTC [cauthdsl] func2 -> DEBU 20de 0xc0003998e0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.037 UTC [cauthdsl] func2 -> DEBU 20df 0xc0003998e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.038 UTC [cauthdsl] func2 -> DEBU 20e0 0xc0003998e0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.038 UTC [cauthdsl] func1 -> DEBU 20e1 0xc0003998e0 gate 1569284844037539500 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.038 UTC [policies] Evaluate -> DEBU 20e2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.038 UTC [policies] Evaluate -> DEBU 20e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.038 UTC [policies] Evaluate -> DEBU 20e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.038 UTC [cauthdsl] func1 -> DEBU 20e5 0xc000c7c1c0 gate 1569284844038857600 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.039 UTC [cauthdsl] func2 -> DEBU 20e6 0xc000c7c1c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.039 UTC [cauthdsl] func2 -> DEBU 20e7 0xc000c7c1c0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.039 UTC [cauthdsl] func2 -> DEBU 20e8 0xc000c7c1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.040 UTC [cauthdsl] func2 -> DEBU 20e9 0xc000c7c1c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.040 UTC [cauthdsl] func1 -> DEBU 20ea 0xc000c7c1c0 gate 1569284844038857600 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20eb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.040 UTC [policies] func1 -> DEBU 20ed Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20ee Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.041 UTC [policies] Evaluate -> DEBU 20f2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.041 UTC [cauthdsl] func1 -> DEBU 20f3 0xc000c7cfc0 gate 1569284844041108200 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.041 UTC [cauthdsl] func2 -> DEBU 20f4 0xc000c7cfc0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.041 UTC [cauthdsl] func2 -> DEBU 20f5 0xc000c7cfc0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.041 UTC [cauthdsl] func2 -> DEBU 20f6 0xc000c7cfc0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:24.041 UTC [msp.identity] Verify -> DEBU 20f7 Verify: digest = 00000000 18 dd 95 1d 5a 27 57 43 d9 ff f8 0e 8f 65 f3 c1 |....Z'WC.....e..| +orderer0.example.com | 00000010 34 02 8b 18 60 e1 60 89 27 d2 9b 0a 2a 34 9b df |4...`.`.'...*4..|" +orderer0.example.com | "2019-09-24 00:27:24.041 UTC [msp.identity] Verify -> DEBU 20f8 Verify: sig = 00000000 30 44 02 20 53 39 03 58 83 60 f3 4d c6 e0 fe ff |0D. S9.X.`.M....| +orderer0.example.com | 00000010 ca be 92 0e 7e 80 92 dc 5e c6 f6 b2 1c 85 66 c3 |....~...^.....f.| +orderer0.example.com | 00000020 80 2f 74 fe 02 20 62 3f 13 dd 01 ac 80 78 b5 4f |./t.. b?.....x.O| +orderer0.example.com | 00000030 e5 75 18 6d 97 d2 3e db 62 36 26 5b 1f 3a 70 ec |.u.m..>.b6&[.:p.| +orderer0.example.com | 00000040 c4 df ba 0d e3 e6 |......|" +orderer0.example.com | "2019-09-24 00:27:24.041 UTC [cauthdsl] func2 -> DEBU 20f9 0xc000c7cfc0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:24.042 UTC [cauthdsl] func1 -> DEBU 20fa 0xc000c7cfc0 gate 1569284844041108200 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 20fb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 20fc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 20fd Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 20fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 20ff Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 2100 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.042 UTC [common.deliver] deliverBlocks -> DEBU 2101 [channel: businesschannel] Received seekInfo (0xc001186dc0) start: > stop: > from 172.18.0.9:32960" +orderer0.example.com | "2019-09-24 00:27:24.042 UTC [fsblkstorage] Next -> DEBU 2102 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 00:27:24.043 UTC [fsblkstorage] newBlockfileStream -> DEBU 2103 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71391]" +orderer0.example.com | "2019-09-24 00:27:24.043 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2104 Remaining bytes=[47400], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:24.043 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2105 Returning blockbytes - length=[4529], placementInfo={fileNum=[0], startOffset=[71391], bytesOffset=[71393]}" +orderer0.example.com | "2019-09-24 00:27:24.043 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2106 blockbytes [4529] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:24.043 UTC [common.deliver] deliverBlocks -> DEBU 2107 [channel: businesschannel] Delivering block for (0xc001186dc0) for 172.18.0.9:32960" +orderer0.example.com | "2019-09-24 00:27:24.043 UTC [common.deliver] deliverBlocks -> DEBU 2108 [channel: businesschannel] Done delivering to 172.18.0.9:32960 for (0xc001186dc0)" +orderer0.example.com | "2019-09-24 00:27:24.043 UTC [fsblkstorage] waitForBlock -> DEBU 2109 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:24.044 UTC [fsblkstorage] waitForBlock -> DEBU 210a Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:24.043 UTC [common.deliver] Handle -> DEBU 210b Waiting for new SeekInfo from 172.18.0.9:32960" +orderer0.example.com | "2019-09-24 00:27:24.044 UTC [common.deliver] Handle -> DEBU 210c Attempting to read seek info message from 172.18.0.9:32960" +orderer0.example.com | "2019-09-24 00:27:24.073 UTC [common.deliver] Handle -> WARN 210d Error reading from 172.18.0.9:32960: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:24.073 UTC [orderer.common.server] func1 -> DEBU 210f Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:24.073 UTC [comm.grpc.server] 1 -> INFO 2110 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32960 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.5142ms +orderer0.example.com | "2019-09-24 00:27:24.073 UTC [grpc] infof -> DEBU 210e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:24.221 UTC [orderer.common.server] Deliver -> DEBU 2111 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:24.221 UTC [common.deliver] Handle -> DEBU 2112 Starting new deliver loop for 172.18.0.9:32962" +orderer0.example.com | "2019-09-24 00:27:24.221 UTC [common.deliver] Handle -> DEBU 2113 Attempting to read seek info message from 172.18.0.9:32962" +orderer0.example.com | "2019-09-24 00:27:24.222 UTC [policies] Evaluate -> DEBU 2114 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.222 UTC [policies] Evaluate -> DEBU 2115 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.222 UTC [policies] Evaluate -> DEBU 2116 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.222 UTC [policies] Evaluate -> DEBU 2117 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.222 UTC [policies] Evaluate -> DEBU 2118 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.222 UTC [cauthdsl] func1 -> DEBU 2119 0xc0010f15b0 gate 1569284844222979200 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.223 UTC [cauthdsl] func2 -> DEBU 211a 0xc0010f15b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.223 UTC [cauthdsl] func2 -> DEBU 211b 0xc0010f15b0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.223 UTC [cauthdsl] func2 -> DEBU 211c 0xc0010f15b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.223 UTC [cauthdsl] func2 -> DEBU 211d 0xc0010f15b0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.223 UTC [cauthdsl] func1 -> DEBU 211e 0xc0010f15b0 gate 1569284844222979200 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.223 UTC [policies] Evaluate -> DEBU 211f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.223 UTC [policies] Evaluate -> DEBU 2120 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.223 UTC [policies] Evaluate -> DEBU 2121 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.224 UTC [cauthdsl] func1 -> DEBU 2122 0xc0010f1e20 gate 1569284844224076200 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.224 UTC [cauthdsl] func2 -> DEBU 2123 0xc0010f1e20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.224 UTC [cauthdsl] func2 -> DEBU 2124 0xc0010f1e20 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.224 UTC [cauthdsl] func2 -> DEBU 2125 0xc0010f1e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.224 UTC [cauthdsl] func2 -> DEBU 2126 0xc0010f1e20 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.224 UTC [cauthdsl] func1 -> DEBU 2127 0xc0010f1e20 gate 1569284844224076200 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.224 UTC [policies] Evaluate -> DEBU 2128 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.224 UTC [policies] Evaluate -> DEBU 2129 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.224 UTC [policies] Evaluate -> DEBU 212a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.224 UTC [cauthdsl] func1 -> DEBU 212b 0xc000dca670 gate 1569284844224884700 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.224 UTC [cauthdsl] func2 -> DEBU 212c 0xc000dca670 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.225 UTC [cauthdsl] func2 -> DEBU 212d 0xc000dca670 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.225 UTC [cauthdsl] func2 -> DEBU 212e 0xc000dca670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.225 UTC [cauthdsl] func2 -> DEBU 212f 0xc000dca670 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.225 UTC [cauthdsl] func1 -> DEBU 2130 0xc000dca670 gate 1569284844224884700 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2131 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2132 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.225 UTC [policies] func1 -> DEBU 2133 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2134 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2135 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2136 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2137 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.226 UTC [policies] Evaluate -> DEBU 2138 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.226 UTC [cauthdsl] func1 -> DEBU 2139 0xc000dcb590 gate 1569284844226113800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.226 UTC [cauthdsl] func2 -> DEBU 213a 0xc000dcb590 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.226 UTC [cauthdsl] func2 -> DEBU 213b 0xc000dcb590 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.226 UTC [cauthdsl] func2 -> DEBU 213c 0xc000dcb590 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:24.227 UTC [msp.identity] Verify -> DEBU 213d Verify: digest = 00000000 62 b4 95 63 b4 ad 97 59 56 44 7b d5 23 d3 56 93 |b..c...YVD{.#.V.| +orderer0.example.com | 00000010 f8 11 ca 89 85 10 dd 24 5c 41 ce ff f9 bd 07 1e |.......$\A......|" +orderer0.example.com | "2019-09-24 00:27:24.227 UTC [msp.identity] Verify -> DEBU 213e Verify: sig = 00000000 30 44 02 20 3f b1 22 e8 f7 7c a6 76 d1 34 a6 09 |0D. ?."..|.v.4..| +orderer0.example.com | 00000010 5c 65 34 33 25 00 40 90 e1 17 90 21 37 6f 28 91 |\e43%.@....!7o(.| +orderer0.example.com | 00000020 20 82 a4 dc 02 20 2b 9d f8 9a 9e 1c aa 3a f2 28 | .... +......:.(| +orderer0.example.com | 00000030 24 59 ef 45 e9 f4 1d a1 7d f1 5c 3e 9f 3a f8 b4 |$Y.E....}.\>.:..| +orderer0.example.com | 00000040 15 47 b3 6e e8 fc |.G.n..|" +orderer0.example.com | "2019-09-24 00:27:24.227 UTC [cauthdsl] func2 -> DEBU 213f 0xc000dcb590 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:24.227 UTC [cauthdsl] func1 -> DEBU 2140 0xc000dcb590 gate 1569284844226113800 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2141 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2142 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2143 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2144 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2145 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2146 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.228 UTC [common.deliver] deliverBlocks -> DEBU 2147 [channel: businesschannel] Received seekInfo (0xc0010e2140) start: > stop: > from 172.18.0.9:32962" +orderer0.example.com | "2019-09-24 00:27:24.228 UTC [fsblkstorage] Next -> DEBU 2148 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 00:27:24.228 UTC [fsblkstorage] newBlockfileStream -> DEBU 2149 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75922]" +orderer0.example.com | "2019-09-24 00:27:24.228 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 214a Remaining bytes=[42869], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:24.228 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 214b Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[75922], bytesOffset=[75924]}" +orderer0.example.com | "2019-09-24 00:27:24.228 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 214c blockbytes [3990] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:24.228 UTC [common.deliver] deliverBlocks -> DEBU 214d [channel: businesschannel] Delivering block for (0xc0010e2140) for 172.18.0.9:32962" +orderer0.example.com | "2019-09-24 00:27:24.229 UTC [common.deliver] deliverBlocks -> DEBU 214e [channel: businesschannel] Done delivering to 172.18.0.9:32962 for (0xc0010e2140)" +orderer0.example.com | "2019-09-24 00:27:24.229 UTC [fsblkstorage] waitForBlock -> DEBU 214f Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:24.229 UTC [fsblkstorage] waitForBlock -> DEBU 2150 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:24.229 UTC [common.deliver] Handle -> DEBU 2151 Waiting for new SeekInfo from 172.18.0.9:32962" +orderer0.example.com | "2019-09-24 00:27:24.229 UTC [common.deliver] Handle -> DEBU 2152 Attempting to read seek info message from 172.18.0.9:32962" +orderer0.example.com | "2019-09-24 00:27:24.235 UTC [grpc] infof -> DEBU 2153 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:24.235 UTC [common.deliver] Handle -> WARN 2154 Error reading from 172.18.0.9:32962: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:24.235 UTC [orderer.common.server] func1 -> DEBU 2155 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:24.236 UTC [comm.grpc.server] 1 -> INFO 2156 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32962 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.1591ms +orderer0.example.com | "2019-09-24 00:27:24.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2157 Sending msg of 28 bytes to 2 on channel businesschannel took 85.3µs" +orderer0.example.com | "2019-09-24 00:27:24.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2158 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106µs " +orderer0.example.com | "2019-09-24 00:27:24.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2159 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:24.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 215a Sending msg of 28 bytes to 3 on channel businesschannel took 1.5181ms" +orderer0.example.com | "2019-09-24 00:27:24.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 215b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +orderer0.example.com | "2019-09-24 00:27:24.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 215c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:24.385 UTC [orderer.common.server] Deliver -> DEBU 215d Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:24.385 UTC [common.deliver] Handle -> DEBU 215e Starting new deliver loop for 172.18.0.9:32964" +orderer0.example.com | "2019-09-24 00:27:24.385 UTC [common.deliver] Handle -> DEBU 215f Attempting to read seek info message from 172.18.0.9:32964" +orderer0.example.com | "2019-09-24 00:27:24.386 UTC [policies] Evaluate -> DEBU 2160 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.386 UTC [policies] Evaluate -> DEBU 2161 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.387 UTC [policies] Evaluate -> DEBU 2162 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.387 UTC [policies] Evaluate -> DEBU 2163 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.387 UTC [policies] Evaluate -> DEBU 2164 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.387 UTC [cauthdsl] func1 -> DEBU 2165 0xc0010d4770 gate 1569284844387981900 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.388 UTC [cauthdsl] func2 -> DEBU 2166 0xc0010d4770 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.388 UTC [cauthdsl] func2 -> DEBU 2167 0xc0010d4770 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.389 UTC [cauthdsl] func2 -> DEBU 2168 0xc0010d4770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.389 UTC [cauthdsl] func2 -> DEBU 2169 0xc0010d4770 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.389 UTC [cauthdsl] func1 -> DEBU 216a 0xc0010d4770 gate 1569284844387981900 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.389 UTC [policies] Evaluate -> DEBU 216b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.389 UTC [policies] Evaluate -> DEBU 216c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.389 UTC [policies] Evaluate -> DEBU 216d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.390 UTC [cauthdsl] func1 -> DEBU 216e 0xc0010d4fb0 gate 1569284844390113100 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.390 UTC [cauthdsl] func2 -> DEBU 216f 0xc0010d4fb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.390 UTC [cauthdsl] func2 -> DEBU 2170 0xc0010d4fb0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.390 UTC [cauthdsl] func2 -> DEBU 2171 0xc0010d4fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.391 UTC [cauthdsl] func2 -> DEBU 2172 0xc0010d4fb0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.391 UTC [cauthdsl] func1 -> DEBU 2173 0xc0010d4fb0 gate 1569284844390113100 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.391 UTC [policies] Evaluate -> DEBU 2174 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.391 UTC [policies] Evaluate -> DEBU 2175 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.392 UTC [policies] Evaluate -> DEBU 2176 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.392 UTC [cauthdsl] func1 -> DEBU 2177 0xc0010d57f0 gate 1569284844392636200 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.393 UTC [cauthdsl] func2 -> DEBU 2178 0xc0010d57f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.393 UTC [cauthdsl] func2 -> DEBU 2179 0xc0010d57f0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.393 UTC [cauthdsl] func2 -> DEBU 217a 0xc0010d57f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.393 UTC [cauthdsl] func2 -> DEBU 217b 0xc0010d57f0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.393 UTC [cauthdsl] func1 -> DEBU 217c 0xc0010d57f0 gate 1569284844392636200 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.394 UTC [policies] Evaluate -> DEBU 217d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.394 UTC [policies] Evaluate -> DEBU 217e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.394 UTC [policies] func1 -> DEBU 217f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:24.394 UTC [policies] Evaluate -> DEBU 2180 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:24.395 UTC [policies] Evaluate -> DEBU 2181 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:24.395 UTC [policies] Evaluate -> DEBU 2182 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.395 UTC [policies] Evaluate -> DEBU 2183 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.395 UTC [policies] Evaluate -> DEBU 2184 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.396 UTC [cauthdsl] func1 -> DEBU 2185 0xc001158640 gate 1569284844395905400 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.396 UTC [cauthdsl] func2 -> DEBU 2186 0xc001158640 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.396 UTC [cauthdsl] func2 -> DEBU 2187 0xc001158640 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.397 UTC [cauthdsl] func2 -> DEBU 2188 0xc001158640 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:24.397 UTC [msp.identity] Verify -> DEBU 2189 Verify: digest = 00000000 34 5f 37 74 b7 9a 3e 86 d7 2d a0 bd 5c be 48 92 |4_7t..>..-..\.H.| +orderer0.example.com | 00000010 80 37 a7 d8 48 6e 71 9f 2b 58 41 e0 cc ce 0e 90 |.7..Hnq.+XA.....|" +orderer0.example.com | "2019-09-24 00:27:24.397 UTC [msp.identity] Verify -> DEBU 218a Verify: sig = 00000000 30 44 02 20 73 e0 4a cd dd aa 66 8e 67 58 97 b2 |0D. s.J...f.gX..| +orderer0.example.com | 00000010 52 df dd a0 d3 0b 22 a7 71 fb e8 0a 27 8b 2f de |R.....".q...'./.| +orderer0.example.com | 00000020 3e 69 b0 7b 02 20 67 5a eb 89 7c 47 20 8e da 5b |>i.{. gZ..|G ..[| +orderer0.example.com | 00000030 66 52 c2 e3 93 ba d6 aa df b0 66 84 af 90 53 ba |fR........f...S.| +orderer0.example.com | 00000040 ec 8d c2 b6 af 99 |......|" +orderer0.example.com | "2019-09-24 00:27:24.398 UTC [cauthdsl] func2 -> DEBU 218b 0xc001158640 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:24.398 UTC [cauthdsl] func1 -> DEBU 218c 0xc001158640 gate 1569284844395905400 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:24.398 UTC [policies] Evaluate -> DEBU 218d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.398 UTC [policies] Evaluate -> DEBU 218e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.398 UTC [policies] Evaluate -> DEBU 218f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.398 UTC [policies] Evaluate -> DEBU 2190 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.399 UTC [policies] Evaluate -> DEBU 2191 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.399 UTC [policies] Evaluate -> DEBU 2192 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.399 UTC [common.deliver] deliverBlocks -> DEBU 2193 [channel: businesschannel] Received seekInfo (0xc0008f3a00) start: > stop: > from 172.18.0.9:32964" +orderer0.example.com | "2019-09-24 00:27:24.399 UTC [fsblkstorage] Next -> DEBU 2194 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 00:27:24.399 UTC [fsblkstorage] newBlockfileStream -> DEBU 2195 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79914]" +orderer0.example.com | "2019-09-24 00:27:24.400 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2196 Remaining bytes=[38877], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:24.400 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2197 Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[79914], bytesOffset=[79916]}" +orderer0.example.com | "2019-09-24 00:27:24.400 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2198 blockbytes [3990] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:24.400 UTC [common.deliver] deliverBlocks -> DEBU 2199 [channel: businesschannel] Delivering block for (0xc0008f3a00) for 172.18.0.9:32964" +orderer0.example.com | "2019-09-24 00:27:24.401 UTC [common.deliver] deliverBlocks -> DEBU 219a [channel: businesschannel] Done delivering to 172.18.0.9:32964 for (0xc0008f3a00)" +orderer0.example.com | "2019-09-24 00:27:24.401 UTC [fsblkstorage] waitForBlock -> DEBU 219b Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:24.401 UTC [fsblkstorage] waitForBlock -> DEBU 219d Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:24.401 UTC [common.deliver] Handle -> DEBU 219c Waiting for new SeekInfo from 172.18.0.9:32964" +orderer0.example.com | "2019-09-24 00:27:24.401 UTC [common.deliver] Handle -> DEBU 219e Attempting to read seek info message from 172.18.0.9:32964" +orderer0.example.com | "2019-09-24 00:27:24.408 UTC [grpc] infof -> DEBU 21a0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:24.408 UTC [common.deliver] Handle -> WARN 219f Error reading from 172.18.0.9:32964: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:24.409 UTC [orderer.common.server] func1 -> DEBU 21a1 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:24.409 UTC [comm.grpc.server] 1 -> INFO 21a2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32964 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.3985ms +orderer0.example.com | "2019-09-24 00:27:24.499 UTC [orderer.common.cluster.step] handleMessage -> DEBU 21a3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:24.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 21a4 Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +orderer0.example.com | "2019-09-24 00:27:24.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 21a5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +orderer0.example.com | "2019-09-24 00:27:24.557 UTC [orderer.common.server] Deliver -> DEBU 21a6 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:24.557 UTC [common.deliver] Handle -> DEBU 21a7 Starting new deliver loop for 172.18.0.9:32966" +orderer0.example.com | "2019-09-24 00:27:24.557 UTC [common.deliver] Handle -> DEBU 21a8 Attempting to read seek info message from 172.18.0.9:32966" +orderer0.example.com | "2019-09-24 00:27:24.558 UTC [policies] Evaluate -> DEBU 21a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.558 UTC [policies] Evaluate -> DEBU 21aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.558 UTC [policies] Evaluate -> DEBU 21ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.558 UTC [policies] Evaluate -> DEBU 21ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.559 UTC [policies] Evaluate -> DEBU 21ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.559 UTC [cauthdsl] func1 -> DEBU 21ae 0xc000f98440 gate 1569284844559122400 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.559 UTC [cauthdsl] func2 -> DEBU 21af 0xc000f98440 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.560 UTC [cauthdsl] func2 -> DEBU 21b0 0xc000f98440 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.560 UTC [cauthdsl] func2 -> DEBU 21b1 0xc000f98440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.560 UTC [cauthdsl] func2 -> DEBU 21b2 0xc000f98440 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.560 UTC [cauthdsl] func1 -> DEBU 21b3 0xc000f98440 gate 1569284844559122400 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.560 UTC [policies] Evaluate -> DEBU 21b4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.561 UTC [policies] Evaluate -> DEBU 21b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.561 UTC [policies] Evaluate -> DEBU 21b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.561 UTC [cauthdsl] func1 -> DEBU 21b7 0xc000f98c80 gate 1569284844561885000 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.562 UTC [cauthdsl] func2 -> DEBU 21b8 0xc000f98c80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.562 UTC [cauthdsl] func2 -> DEBU 21b9 0xc000f98c80 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.562 UTC [cauthdsl] func2 -> DEBU 21ba 0xc000f98c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.562 UTC [cauthdsl] func2 -> DEBU 21bb 0xc000f98c80 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.563 UTC [cauthdsl] func1 -> DEBU 21bc 0xc000f98c80 gate 1569284844561885000 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.563 UTC [policies] Evaluate -> DEBU 21bd Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.563 UTC [policies] Evaluate -> DEBU 21be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.563 UTC [policies] Evaluate -> DEBU 21bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.564 UTC [cauthdsl] func1 -> DEBU 21c0 0xc000f994c0 gate 1569284844564080400 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.564 UTC [cauthdsl] func2 -> DEBU 21c1 0xc000f994c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.564 UTC [cauthdsl] func2 -> DEBU 21c2 0xc000f994c0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.564 UTC [cauthdsl] func2 -> DEBU 21c3 0xc000f994c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 00:27:24.565 UTC [cauthdsl] func2 -> DEBU 21c4 0xc000f994c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.565 UTC [cauthdsl] func1 -> DEBU 21c5 0xc000f994c0 gate 1569284844564080400 evaluation fails" +orderer0.example.com | "2019-09-24 00:27:24.565 UTC [policies] Evaluate -> DEBU 21c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.565 UTC [policies] Evaluate -> DEBU 21c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:24.565 UTC [policies] func1 -> DEBU 21c8 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 00:27:24.566 UTC [policies] Evaluate -> DEBU 21c9 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:24.566 UTC [policies] Evaluate -> DEBU 21ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 00:27:24.566 UTC [policies] Evaluate -> DEBU 21cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.566 UTC [policies] Evaluate -> DEBU 21cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.566 UTC [policies] Evaluate -> DEBU 21cd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.567 UTC [cauthdsl] func1 -> DEBU 21ce 0xc00119c1b0 gate 1569284844567441400 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.567 UTC [cauthdsl] func2 -> DEBU 21cf 0xc00119c1b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.567 UTC [cauthdsl] func2 -> DEBU 21d0 0xc00119c1b0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.569 UTC [cauthdsl] func2 -> DEBU 21d1 0xc00119c1b0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:24.569 UTC [msp.identity] Verify -> DEBU 21d2 Verify: digest = 00000000 56 de 98 b4 6e e0 6d 42 70 52 29 70 27 09 c9 13 |V...n.mBpR)p'...| +orderer0.example.com | 00000010 57 cb 96 67 76 8f 36 3c 94 16 dc 10 fc 4f 32 d4 |W..gv.6<.....O2.|" +orderer0.example.com | "2019-09-24 00:27:24.569 UTC [msp.identity] Verify -> DEBU 21d3 Verify: sig = 00000000 30 45 02 21 00 f9 f1 08 ee 7c 3e 83 32 63 dc 1b |0E.!.....|>.2c..| +orderer0.example.com | 00000010 3d 13 18 7b fc bf c5 5d e6 46 31 22 83 c7 f6 57 |=..{...].F1"...W| +orderer0.example.com | 00000020 ac b3 f6 65 2c 02 20 5d 4f 2a 12 dc a0 2b 92 24 |...e,. ]O*...+.$| +orderer0.example.com | 00000030 20 69 bb 90 b3 5a ba 69 7a 04 7c 23 4a 08 67 92 | i...Z.iz.|#J.g.| +orderer0.example.com | 00000040 d6 7d bb 37 6c 0d 0d |.}.7l..|" +orderer0.example.com | "2019-09-24 00:27:24.570 UTC [cauthdsl] func2 -> DEBU 21d4 0xc00119c1b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:24.570 UTC [cauthdsl] func1 -> DEBU 21d5 0xc00119c1b0 gate 1569284844567441400 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:24.570 UTC [policies] Evaluate -> DEBU 21d6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.570 UTC [policies] Evaluate -> DEBU 21d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.570 UTC [policies] Evaluate -> DEBU 21d8 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.570 UTC [policies] Evaluate -> DEBU 21d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.571 UTC [policies] Evaluate -> DEBU 21da Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.571 UTC [policies] Evaluate -> DEBU 21db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.571 UTC [common.deliver] deliverBlocks -> DEBU 21dc [channel: businesschannel] Received seekInfo (0xc0010e28c0) start: > stop: > from 172.18.0.9:32966" +orderer0.example.com | "2019-09-24 00:27:24.571 UTC [fsblkstorage] Next -> DEBU 21dd Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 00:27:24.571 UTC [fsblkstorage] newBlockfileStream -> DEBU 21de newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +orderer0.example.com | "2019-09-24 00:27:24.572 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 21df Remaining bytes=[34885], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:24.572 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 21e0 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +orderer0.example.com | "2019-09-24 00:27:24.572 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 21e1 blockbytes [34882] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:24.573 UTC [common.deliver] deliverBlocks -> DEBU 21e2 [channel: businesschannel] Delivering block for (0xc0010e28c0) for 172.18.0.9:32966" +orderer0.example.com | "2019-09-24 00:27:24.573 UTC [common.deliver] deliverBlocks -> DEBU 21e3 [channel: businesschannel] Done delivering to 172.18.0.9:32966 for (0xc0010e28c0)" +orderer0.example.com | "2019-09-24 00:27:24.573 UTC [common.deliver] Handle -> DEBU 21e4 Waiting for new SeekInfo from 172.18.0.9:32966" +orderer0.example.com | "2019-09-24 00:27:24.573 UTC [common.deliver] Handle -> DEBU 21e5 Attempting to read seek info message from 172.18.0.9:32966" +orderer0.example.com | "2019-09-24 00:27:24.573 UTC [fsblkstorage] waitForBlock -> DEBU 21e6 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 00:27:24.573 UTC [fsblkstorage] waitForBlock -> DEBU 21e7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 00:27:24.588 UTC [grpc] infof -> DEBU 21e8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:24.588 UTC [common.deliver] Handle -> WARN 21e9 Error reading from 172.18.0.9:32966: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:24.588 UTC [orderer.common.server] func1 -> DEBU 21ea Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:24.588 UTC [comm.grpc.server] 1 -> INFO 21eb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32966 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.7122ms +orderer0.example.com | "2019-09-24 00:27:24.766 UTC [orderer.common.server] Deliver -> DEBU 21ec Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:24.766 UTC [common.deliver] Handle -> DEBU 21ed Starting new deliver loop for 172.18.0.9:32968" +orderer0.example.com | "2019-09-24 00:27:24.766 UTC [common.deliver] Handle -> DEBU 21ee Attempting to read seek info message from 172.18.0.9:32968" +orderer0.example.com | "2019-09-24 00:27:24.766 UTC [policies] Evaluate -> DEBU 21ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.766 UTC [policies] Evaluate -> DEBU 21f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.766 UTC [policies] Evaluate -> DEBU 21f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.766 UTC [policies] Evaluate -> DEBU 21f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.766 UTC [policies] Evaluate -> DEBU 21f3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.766 UTC [cauthdsl] func1 -> DEBU 21f4 0xc000db7d80 gate 1569284844766572800 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.767 UTC [cauthdsl] func2 -> DEBU 21f5 0xc000db7d80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.767 UTC [cauthdsl] func2 -> DEBU 21f6 0xc000db7d80 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.767 UTC [cauthdsl] func2 -> DEBU 21f7 0xc000db7d80 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:24.767 UTC [msp.identity] Verify -> DEBU 21f8 Verify: digest = 00000000 e6 45 eb c0 aa 8e 2c 99 7d 0d 11 cd 68 d4 37 39 |.E....,.}...h.79| +orderer0.example.com | 00000010 9b 5f 05 e2 1a e3 4a 15 6a d1 40 8d 4d 53 50 fc |._....J.j.@.MSP.|" +orderer0.example.com | "2019-09-24 00:27:24.768 UTC [msp.identity] Verify -> DEBU 21f9 Verify: sig = 00000000 30 44 02 20 36 50 75 14 ca 5a 43 6f d6 64 59 c7 |0D. 6Pu..ZCo.dY.| +orderer0.example.com | 00000010 05 49 e3 b3 a1 66 ff 8d cc 2e d7 20 61 9d 72 57 |.I...f..... a.rW| +orderer0.example.com | 00000020 a1 be a0 76 02 20 53 d0 c2 e3 50 5a 80 b7 8b b1 |...v. S...PZ....| +orderer0.example.com | 00000030 80 d0 5f 51 d2 97 90 a6 b6 ee 3b 8f 8c 9b 93 dc |.._Q......;.....| +orderer0.example.com | 00000040 9a 20 17 de d0 d5 |. ....|" +orderer0.example.com | "2019-09-24 00:27:24.768 UTC [cauthdsl] func2 -> DEBU 21fa 0xc000db7d80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:24.768 UTC [cauthdsl] func1 -> DEBU 21fb 0xc000db7d80 gate 1569284844766572800 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 21fc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 21fd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 21fe Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 21ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 2200 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 2201 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.768 UTC [common.deliver] deliverBlocks -> DEBU 2202 [channel: testchainid] Received seekInfo (0xc001004740) start: > stop: > from 172.18.0.9:32968" +orderer0.example.com | "2019-09-24 00:27:24.769 UTC [fsblkstorage] Next -> DEBU 2203 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 00:27:24.769 UTC [fsblkstorage] newBlockfileStream -> DEBU 2204 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-09-24 00:27:24.769 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2205 Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:24.769 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2206 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-09-24 00:27:24.769 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2207 blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:24.769 UTC [common.deliver] deliverBlocks -> DEBU 2208 [channel: testchainid] Delivering block for (0xc001004740) for 172.18.0.9:32968" +orderer0.example.com | "2019-09-24 00:27:24.769 UTC [common.deliver] deliverBlocks -> DEBU 2209 [channel: testchainid] Done delivering to 172.18.0.9:32968 for (0xc001004740)" +orderer0.example.com | "2019-09-24 00:27:24.769 UTC [common.deliver] Handle -> DEBU 220a Waiting for new SeekInfo from 172.18.0.9:32968" +orderer0.example.com | "2019-09-24 00:27:24.769 UTC [common.deliver] Handle -> DEBU 220b Attempting to read seek info message from 172.18.0.9:32968" +orderer0.example.com | "2019-09-24 00:27:24.776 UTC [grpc] infof -> DEBU 220c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:24.776 UTC [common.deliver] Handle -> WARN 220d Error reading from 172.18.0.9:32968: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:24.777 UTC [orderer.common.server] func1 -> DEBU 220e Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:24.777 UTC [comm.grpc.server] 1 -> INFO 220f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32968 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.5257ms +orderer0.example.com | "2019-09-24 00:27:24.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2210 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +orderer0.example.com | "2019-09-24 00:27:24.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2211 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-09-24 00:27:24.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2212 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.2µs " +orderer0.example.com | "2019-09-24 00:27:24.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2213 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.3µs " +orderer0.example.com | "2019-09-24 00:27:24.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2214 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:24.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2215 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:24.962 UTC [orderer.common.server] Deliver -> DEBU 2216 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:24.962 UTC [common.deliver] Handle -> DEBU 2217 Starting new deliver loop for 172.18.0.9:32970" +orderer0.example.com | "2019-09-24 00:27:24.963 UTC [common.deliver] Handle -> DEBU 2218 Attempting to read seek info message from 172.18.0.9:32970" +orderer0.example.com | "2019-09-24 00:27:24.965 UTC [policies] Evaluate -> DEBU 2219 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.965 UTC [policies] Evaluate -> DEBU 221a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.965 UTC [policies] Evaluate -> DEBU 221b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.965 UTC [policies] Evaluate -> DEBU 221c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.965 UTC [policies] Evaluate -> DEBU 221d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.965 UTC [cauthdsl] func1 -> DEBU 221e 0xc000d0cdd0 gate 1569284844965868500 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.966 UTC [cauthdsl] func2 -> DEBU 221f 0xc000d0cdd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.966 UTC [cauthdsl] func2 -> DEBU 2220 0xc000d0cdd0 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.966 UTC [cauthdsl] func2 -> DEBU 2221 0xc000d0cdd0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:24.966 UTC [msp.identity] Verify -> DEBU 2222 Verify: digest = 00000000 e3 8b 4e 0d a1 cc 2c ff 39 15 b6 fa a4 69 e4 26 |..N...,.9....i.&| +orderer0.example.com | 00000010 bc 52 20 e6 97 5e 0d 9c 0a d3 cd 23 86 2e a4 d2 |.R ..^.....#....|" +orderer0.example.com | "2019-09-24 00:27:24.966 UTC [msp.identity] Verify -> DEBU 2223 Verify: sig = 00000000 30 44 02 20 1c 70 65 bc ad c3 07 e3 2c 49 2c 9a |0D. .pe.....,I,.| +orderer0.example.com | 00000010 42 38 b1 93 1a d3 5d bb 2c ac d8 73 21 37 8a d6 |B8....].,..s!7..| +orderer0.example.com | 00000020 4c 17 55 88 02 20 1f 18 cd 80 70 39 14 bc c6 5e |L.U.. ....p9...^| +orderer0.example.com | 00000030 59 fc d4 47 f2 05 cc 6c 09 07 37 47 fe 51 4a 64 |Y..G...l..7G.QJd| +orderer0.example.com | 00000040 ba 6c 59 ed a0 ab |.lY...|" +orderer0.example.com | "2019-09-24 00:27:24.966 UTC [cauthdsl] func2 -> DEBU 2224 0xc000d0cdd0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:24.966 UTC [cauthdsl] func1 -> DEBU 2225 0xc000d0cdd0 gate 1569284844965868500 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:24.966 UTC [policies] Evaluate -> DEBU 2226 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.966 UTC [policies] Evaluate -> DEBU 2227 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.966 UTC [policies] Evaluate -> DEBU 2228 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.967 UTC [policies] Evaluate -> DEBU 2229 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.967 UTC [policies] Evaluate -> DEBU 222a Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.967 UTC [policies] Evaluate -> DEBU 222b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.967 UTC [common.deliver] deliverBlocks -> DEBU 222c [channel: testchainid] Received seekInfo (0xc001004e80) start: > stop: > from 172.18.0.9:32970" +orderer0.example.com | "2019-09-24 00:27:24.967 UTC [fsblkstorage] Next -> DEBU 222d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 00:27:24.967 UTC [fsblkstorage] newBlockfileStream -> DEBU 222e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-09-24 00:27:24.967 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 222f Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2230 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-09-24 00:27:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2231 blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:24.968 UTC [common.deliver] deliverBlocks -> DEBU 2232 [channel: testchainid] Delivering block for (0xc001004e80) for 172.18.0.9:32970" +orderer0.example.com | "2019-09-24 00:27:24.968 UTC [common.deliver] deliverBlocks -> DEBU 2233 [channel: testchainid] Done delivering to 172.18.0.9:32970 for (0xc001004e80)" +orderer0.example.com | "2019-09-24 00:27:24.968 UTC [common.deliver] Handle -> DEBU 2234 Waiting for new SeekInfo from 172.18.0.9:32970" +orderer0.example.com | "2019-09-24 00:27:24.969 UTC [common.deliver] Handle -> DEBU 2235 Attempting to read seek info message from 172.18.0.9:32970" +orderer0.example.com | "2019-09-24 00:27:24.970 UTC [policies] Evaluate -> DEBU 2236 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.970 UTC [policies] Evaluate -> DEBU 2237 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.970 UTC [policies] Evaluate -> DEBU 2238 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.970 UTC [policies] Evaluate -> DEBU 2239 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:24.970 UTC [policies] Evaluate -> DEBU 223a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:24.970 UTC [cauthdsl] func1 -> DEBU 223b 0xc0012ec450 gate 1569284844970592700 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:24.970 UTC [cauthdsl] func2 -> DEBU 223c 0xc0012ec450 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:24.970 UTC [cauthdsl] func2 -> DEBU 223d 0xc0012ec450 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:24.970 UTC [cauthdsl] func2 -> DEBU 223e 0xc0012ec450 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:24.970 UTC [msp.identity] Verify -> DEBU 223f Verify: digest = 00000000 80 ab 40 8e 89 29 3e e4 18 ab 4c 54 04 43 a9 4c |..@..)>...LT.C.L| +orderer0.example.com | 00000010 b6 26 b4 38 e7 76 83 a6 db 7e 45 60 1e 93 88 ce |.&.8.v...~E`....|" +orderer0.example.com | "2019-09-24 00:27:24.971 UTC [msp.identity] Verify -> DEBU 2240 Verify: sig = 00000000 30 44 02 20 35 b2 e3 78 44 00 0a db e9 c9 dc 50 |0D. 5..xD......P| +orderer0.example.com | 00000010 89 a7 a0 5a 5c 15 a8 6b 0c 97 68 0f 7b 00 5f d8 |...Z\..k..h.{._.| +orderer0.example.com | 00000020 bc 20 b0 15 02 20 23 78 87 3d 9d 12 ff fb 13 48 |. ... #x.=.....H| +orderer0.example.com | 00000030 dd d3 c9 ea 01 03 00 29 a0 52 3a 24 66 87 90 b2 |.......).R:$f...| +orderer0.example.com | 00000040 c6 79 d2 df f7 47 |.y...G|" +orderer0.example.com | "2019-09-24 00:27:24.971 UTC [cauthdsl] func2 -> DEBU 2241 0xc0012ec450 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:24.971 UTC [cauthdsl] func1 -> DEBU 2242 0xc0012ec450 gate 1569284844970592700 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2243 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2244 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2245 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2246 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2247 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2248 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:24.972 UTC [common.deliver] deliverBlocks -> DEBU 2249 [channel: testchainid] Received seekInfo (0xc0010e2f80) start: > stop: > from 172.18.0.9:32970" +orderer0.example.com | "2019-09-24 00:27:24.972 UTC [fsblkstorage] Next -> DEBU 224a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 00:27:24.972 UTC [fsblkstorage] newBlockfileStream -> DEBU 224b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:27:24.972 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 224c Remaining bytes=[44254], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:24.972 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 224d Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:27:24.972 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 224e blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:24.972 UTC [common.deliver] deliverBlocks -> DEBU 224f [channel: testchainid] Delivering block for (0xc0010e2f80) for 172.18.0.9:32970" +orderer0.example.com | "2019-09-24 00:27:24.973 UTC [common.deliver] deliverBlocks -> DEBU 2250 [channel: testchainid] Done delivering to 172.18.0.9:32970 for (0xc0010e2f80)" +orderer0.example.com | "2019-09-24 00:27:24.973 UTC [common.deliver] Handle -> DEBU 2251 Waiting for new SeekInfo from 172.18.0.9:32970" +orderer0.example.com | "2019-09-24 00:27:24.973 UTC [common.deliver] Handle -> DEBU 2252 Attempting to read seek info message from 172.18.0.9:32970" +orderer0.example.com | "2019-09-24 00:27:24.981 UTC [common.deliver] Handle -> WARN 2253 Error reading from 172.18.0.9:32970: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:24.981 UTC [orderer.common.server] func1 -> DEBU 2254 Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:24.982 UTC [comm.grpc.server] 1 -> INFO 2255 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32970 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.7482ms +orderer0.example.com | "2019-09-24 00:27:24.982 UTC [grpc] infof -> DEBU 2256 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:24.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2257 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:24.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2258 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2019-09-24 00:27:25.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2259 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 407µs " +orderer0.example.com | "2019-09-24 00:27:25.118 UTC [orderer.common.server] Deliver -> DEBU 225a Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:25.119 UTC [common.deliver] Handle -> DEBU 225b Starting new deliver loop for 172.18.0.9:32972" +orderer0.example.com | "2019-09-24 00:27:25.119 UTC [common.deliver] Handle -> DEBU 225c Attempting to read seek info message from 172.18.0.9:32972" +orderer0.example.com | "2019-09-24 00:27:25.121 UTC [policies] Evaluate -> DEBU 225d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:25.121 UTC [policies] Evaluate -> DEBU 225e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:25.121 UTC [policies] Evaluate -> DEBU 225f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:25.122 UTC [policies] Evaluate -> DEBU 2260 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:25.122 UTC [policies] Evaluate -> DEBU 2261 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:25.122 UTC [cauthdsl] func1 -> DEBU 2262 0xc000d3c950 gate 1569284845122619700 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:25.122 UTC [cauthdsl] func2 -> DEBU 2263 0xc000d3c950 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:25.122 UTC [cauthdsl] func2 -> DEBU 2264 0xc000d3c950 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:25.122 UTC [cauthdsl] func2 -> DEBU 2265 0xc000d3c950 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:25.123 UTC [msp.identity] Verify -> DEBU 2266 Verify: digest = 00000000 c5 f6 4d 14 f1 03 bd e6 4d 85 15 49 45 c6 25 ca |..M.....M..IE.%.| +orderer0.example.com | 00000010 0d ae 6a 59 e4 60 26 7b 88 78 8d e3 0a 9e 01 6b |..jY.`&{.x.....k|" +orderer0.example.com | "2019-09-24 00:27:25.123 UTC [msp.identity] Verify -> DEBU 2267 Verify: sig = 00000000 30 45 02 21 00 f9 35 b8 3e 95 c1 4f 86 19 de 90 |0E.!..5.>..O....| +orderer0.example.com | 00000010 ac 44 0c fb b6 f3 60 b0 3d 35 18 33 06 22 56 eb |.D....`.=5.3."V.| +orderer0.example.com | 00000020 8f a0 dd bd c0 02 20 30 ff 59 25 83 7e ec ac e5 |...... 0.Y%.~...| +orderer0.example.com | 00000030 4c 92 7e ee da 19 55 30 2e 5b 1c 52 46 7f 02 cf |L.~...U0.[.RF...| +orderer0.example.com | 00000040 5e 6e 38 e3 0a 2b 73 |^n8..+s|" +orderer0.example.com | "2019-09-24 00:27:25.124 UTC [cauthdsl] func2 -> DEBU 2268 0xc000d3c950 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:25.124 UTC [cauthdsl] func1 -> DEBU 2269 0xc000d3c950 gate 1569284845122619700 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226c Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226e Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:25.124 UTC [common.deliver] deliverBlocks -> DEBU 2270 [channel: testchainid] Received seekInfo (0xc0010e3340) start: > stop: > from 172.18.0.9:32972" +orderer0.example.com | "2019-09-24 00:27:25.124 UTC [fsblkstorage] Next -> DEBU 2271 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 00:27:25.124 UTC [fsblkstorage] newBlockfileStream -> DEBU 2272 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 00:27:25.125 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2273 Remaining bytes=[44254], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:25.125 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2274 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 00:27:25.125 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2275 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:25.125 UTC [common.deliver] deliverBlocks -> DEBU 2276 [channel: testchainid] Delivering block for (0xc0010e3340) for 172.18.0.9:32972" +orderer0.example.com | "2019-09-24 00:27:25.126 UTC [common.deliver] deliverBlocks -> DEBU 2277 [channel: testchainid] Done delivering to 172.18.0.9:32972 for (0xc0010e3340)" +orderer0.example.com | "2019-09-24 00:27:25.126 UTC [common.deliver] Handle -> DEBU 2278 Waiting for new SeekInfo from 172.18.0.9:32972" +orderer0.example.com | "2019-09-24 00:27:25.127 UTC [common.deliver] Handle -> DEBU 2279 Attempting to read seek info message from 172.18.0.9:32972" +orderer0.example.com | "2019-09-24 00:27:25.134 UTC [common.deliver] Handle -> WARN 227a Error reading from 172.18.0.9:32972: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:25.134 UTC [orderer.common.server] func1 -> DEBU 227b Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:25.134 UTC [comm.grpc.server] 1 -> INFO 227c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32972 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.4666ms +orderer0.example.com | "2019-09-24 00:27:25.134 UTC [grpc] infof -> DEBU 227d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:25.281 UTC [orderer.common.server] Deliver -> DEBU 227e Starting new Deliver handler" +orderer0.example.com | "2019-09-24 00:27:25.281 UTC [common.deliver] Handle -> DEBU 227f Starting new deliver loop for 172.18.0.9:32974" +orderer0.example.com | "2019-09-24 00:27:25.281 UTC [common.deliver] Handle -> DEBU 2280 Attempting to read seek info message from 172.18.0.9:32974" +orderer0.example.com | "2019-09-24 00:27:25.283 UTC [policies] Evaluate -> DEBU 2281 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 00:27:25.283 UTC [policies] Evaluate -> DEBU 2282 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:25.284 UTC [policies] Evaluate -> DEBU 2283 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 00:27:25.284 UTC [policies] Evaluate -> DEBU 2284 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 00:27:25.284 UTC [policies] Evaluate -> DEBU 2285 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 00:27:25.284 UTC [cauthdsl] func1 -> DEBU 2286 0xc001365830 gate 1569284845284340000 evaluation starts" +orderer0.example.com | "2019-09-24 00:27:25.284 UTC [cauthdsl] func2 -> DEBU 2287 0xc001365830 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 00:27:25.284 UTC [cauthdsl] func2 -> DEBU 2288 0xc001365830 processing identity 0 with bytes of fd0d80" +orderer0.example.com | "2019-09-24 00:27:25.284 UTC [cauthdsl] func2 -> DEBU 2289 0xc001365830 principal matched by identity 0" +orderer0.example.com | "2019-09-24 00:27:25.284 UTC [msp.identity] Verify -> DEBU 228a Verify: digest = 00000000 60 a3 72 d9 1f 69 f0 fd 5a e1 56 af 62 06 05 d8 |`.r..i..Z.V.b...| +orderer0.example.com | 00000010 12 b4 c7 95 6a 7a 37 3a 59 c6 7b d1 9c ce 0f e4 |....jz7:Y.{.....|" +orderer0.example.com | "2019-09-24 00:27:25.284 UTC [msp.identity] Verify -> DEBU 228b Verify: sig = 00000000 30 45 02 21 00 fa 0a a0 98 2e 06 f4 37 f2 69 4d |0E.!........7.iM| +orderer0.example.com | 00000010 7e 55 99 76 27 d0 cb 6d c4 1b 0b 1b 32 5b f8 24 |~U.v'..m....2[.$| +orderer0.example.com | 00000020 94 2a e0 90 b7 02 20 77 64 90 bb 87 ee 12 97 e3 |.*.... wd.......| +orderer0.example.com | 00000030 7b 70 3f 78 f5 18 48 cd 7c 31 fa d2 ef b8 ba e5 |{p?x..H.|1......| +orderer0.example.com | 00000040 f6 6e 6f 49 28 58 f7 |.noI(X.|" +orderer0.example.com | "2019-09-24 00:27:25.285 UTC [cauthdsl] func2 -> DEBU 228c 0xc001365830 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 00:27:25.285 UTC [cauthdsl] func1 -> DEBU 228d 0xc001365830 gate 1569284845284340000 evaluation succeeds" +orderer0.example.com | "2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 228e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 228f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 2290 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 2291 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 2292 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 2293 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 00:27:25.286 UTC [common.deliver] deliverBlocks -> DEBU 2294 [channel: testchainid] Received seekInfo (0xc001005800) start: > stop: > from 172.18.0.9:32974" +orderer0.example.com | "2019-09-24 00:27:25.286 UTC [fsblkstorage] Next -> DEBU 2295 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 00:27:25.286 UTC [fsblkstorage] newBlockfileStream -> DEBU 2296 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-09-24 00:27:25.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2297 Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 00:27:25.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2298 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-09-24 00:27:25.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2299 blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-09-24 00:27:25.286 UTC [common.deliver] deliverBlocks -> DEBU 229a [channel: testchainid] Delivering block for (0xc001005800) for 172.18.0.9:32974" +orderer0.example.com | "2019-09-24 00:27:25.287 UTC [common.deliver] deliverBlocks -> DEBU 229b [channel: testchainid] Done delivering to 172.18.0.9:32974 for (0xc001005800)" +orderer0.example.com | "2019-09-24 00:27:25.287 UTC [common.deliver] Handle -> DEBU 229c Waiting for new SeekInfo from 172.18.0.9:32974" +orderer0.example.com | "2019-09-24 00:27:25.287 UTC [common.deliver] Handle -> DEBU 229d Attempting to read seek info message from 172.18.0.9:32974" +orderer0.example.com | "2019-09-24 00:27:25.295 UTC [common.deliver] Handle -> WARN 229e Error reading from 172.18.0.9:32974: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 00:27:25.295 UTC [orderer.common.server] func1 -> DEBU 229f Closing Deliver stream" +orderer0.example.com | "2019-09-24 00:27:25.296 UTC [comm.grpc.server] 1 -> INFO 22a0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32974 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.2148ms +orderer0.example.com | "2019-09-24 00:27:25.296 UTC [grpc] infof -> DEBU 22a1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 00:27:25.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22a2 Sending msg of 28 bytes to 3 on channel businesschannel took 42.9µs" +orderer0.example.com | "2019-09-24 00:27:25.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22a3 Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +orderer0.example.com | "2019-09-24 00:27:25.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " +orderer0.example.com | "2019-09-24 00:27:25.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22a5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 40.8µs " +orderer0.example.com | "2019-09-24 00:27:25.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22a6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:25.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22a7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:25.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22a8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:25.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22a9 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +orderer0.example.com | "2019-09-24 00:27:25.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22aa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.1µs " +orderer0.example.com | "2019-09-24 00:27:25.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22ab Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +orderer0.example.com | "2019-09-24 00:27:25.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22ac Sending msg of 28 bytes to 3 on channel businesschannel took 30µs" +orderer0.example.com | "2019-09-24 00:27:25.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.2µs " +orderer0.example.com | "2019-09-24 00:27:25.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.5µs " +orderer0.example.com | "2019-09-24 00:27:25.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22af Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:25.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22b0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:26.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22b1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:26.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22b2 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +orderer0.example.com | "2019-09-24 00:27:26.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22b3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " +orderer0.example.com | "2019-09-24 00:27:26.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22b4 Sending msg of 28 bytes to 2 on channel businesschannel took 35.4µs" +orderer0.example.com | "2019-09-24 00:27:26.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22b6 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-09-24 00:27:26.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22b7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69µs " +orderer0.example.com | "2019-09-24 00:27:26.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 716.5µs " +orderer0.example.com | "2019-09-24 00:27:26.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22b8 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:26.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22b9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:26.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22ba Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:26.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22bb Sending msg of 28 bytes to 3 on channel testchainid took 8.1µs" +orderer0.example.com | "2019-09-24 00:27:26.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22bc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.8µs " +orderer0.example.com | "2019-09-24 00:27:26.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22bd Sending msg of 28 bytes to 2 on channel businesschannel took 37.1µs" +orderer0.example.com | "2019-09-24 00:27:26.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22be Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +orderer0.example.com | "2019-09-24 00:27:26.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.2µs " +orderer0.example.com | "2019-09-24 00:27:26.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 375.2µs " +orderer0.example.com | "2019-09-24 00:27:26.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22c1 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:26.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22c2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:27.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22c3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:27.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22c4 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +orderer0.example.com | "2019-09-24 00:27:27.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22c5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.9µs " +orderer0.example.com | "2019-09-24 00:27:27.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22c6 Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +orderer0.example.com | "2019-09-24 00:27:27.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22c7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-09-24 00:27:27.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.6µs " +orderer0.example.com | "2019-09-24 00:27:27.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22c9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.2µs " +orderer0.example.com | "2019-09-24 00:27:27.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22ca Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:27.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22cb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:27.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22cc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:27.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.1µs " +orderer0.example.com | "2019-09-24 00:27:27.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22ce Sending msg of 28 bytes to 3 on channel testchainid took 127.1µs" +orderer0.example.com | "2019-09-24 00:27:27.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22cf Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +orderer0.example.com | "2019-09-24 00:27:27.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22d0 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +orderer0.example.com | "2019-09-24 00:27:27.815 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 696.6µs " +orderer0.example.com | "2019-09-24 00:27:27.815 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2172ms " +orderer0.example.com | "2019-09-24 00:27:27.817 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22d3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:27.817 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22d4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:28.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22d5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:28.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22d6 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2019-09-24 00:27:28.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22d7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.7µs " +orderer0.example.com | "2019-09-24 00:27:28.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22d8 Sending msg of 28 bytes to 2 on channel businesschannel took 34.1µs" +orderer0.example.com | "2019-09-24 00:27:28.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22d9 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +orderer0.example.com | "2019-09-24 00:27:28.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.3µs " +orderer0.example.com | "2019-09-24 00:27:28.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22db Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.2µs " +orderer0.example.com | "2019-09-24 00:27:28.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22dc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:28.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22dd Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:28.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22de Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:28.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22df Sending msg of 28 bytes to 3 on channel testchainid took 37.9µs" +orderer0.example.com | "2019-09-24 00:27:28.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22e0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.5µs " +orderer0.example.com | "2019-09-24 00:27:28.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22e1 Sending msg of 28 bytes to 2 on channel businesschannel took 39.1µs" +orderer0.example.com | "2019-09-24 00:27:28.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22e2 Sending msg of 28 bytes to 3 on channel businesschannel took 30.6µs" +orderer0.example.com | "2019-09-24 00:27:28.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.9µs " +orderer0.example.com | "2019-09-24 00:27:28.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.5µs " +orderer0.example.com | "2019-09-24 00:27:28.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22e5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:28.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22e6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:29.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22e7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:29.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22e8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 340.4µs " +orderer0.example.com | "2019-09-24 00:27:29.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22e9 Sending msg of 28 bytes to 3 on channel testchainid took 158.5µs" +orderer0.example.com | "2019-09-24 00:27:29.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22ea Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-09-24 00:27:29.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22eb Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2019-09-24 00:27:29.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 458.4µs " +orderer0.example.com | "2019-09-24 00:27:29.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 223.2µs " +orderer0.example.com | "2019-09-24 00:27:29.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22ee Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:29.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22ef Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:29.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22f0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:29.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22f1 Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-09-24 00:27:29.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22f2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 362.3µs " +orderer0.example.com | "2019-09-24 00:27:29.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22f3 Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +orderer0.example.com | "2019-09-24 00:27:29.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22f4 Sending msg of 28 bytes to 2 on channel businesschannel took 7.9µs" +orderer0.example.com | "2019-09-24 00:27:29.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22f5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.5µs " +orderer0.example.com | "2019-09-24 00:27:29.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 252.1µs " +orderer0.example.com | "2019-09-24 00:27:29.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22f7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:29.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22f8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:30.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22f9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:30.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22fa Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +orderer0.example.com | "2019-09-24 00:27:30.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22fb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471.7µs " +orderer0.example.com | "2019-09-24 00:27:30.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22fc Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +orderer0.example.com | "2019-09-24 00:27:30.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22fd Sending msg of 28 bytes to 3 on channel businesschannel took 165.8µs" +orderer0.example.com | "2019-09-24 00:27:30.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 46.9µs " +orderer0.example.com | "2019-09-24 00:27:30.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.6µs " +orderer0.example.com | "2019-09-24 00:27:30.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2300 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:30.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2301 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:30.499 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2302 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:30.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2303 Sending msg of 28 bytes to 3 on channel testchainid took 1.1952ms" +orderer0.example.com | "2019-09-24 00:27:30.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2304 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.3µs " +orderer0.example.com | "2019-09-24 00:27:30.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2305 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +orderer0.example.com | "2019-09-24 00:27:30.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2306 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-09-24 00:27:30.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2307 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.1µs " +orderer0.example.com | "2019-09-24 00:27:30.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2308 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:30.816 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2309 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6457ms " +orderer0.example.com | "2019-09-24 00:27:30.817 UTC [orderer.common.cluster.step] handleMessage -> DEBU 230a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:31.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 230b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:31.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 230c Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2019-09-24 00:27:31.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 230d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.6µs " +orderer0.example.com | "2019-09-24 00:27:31.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 230e Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +orderer0.example.com | "2019-09-24 00:27:31.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 230f Sending msg of 28 bytes to 3 on channel businesschannel took 7.2µs" +orderer0.example.com | "2019-09-24 00:27:31.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2310 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " +orderer0.example.com | "2019-09-24 00:27:31.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2311 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 38.7µs " +orderer0.example.com | "2019-09-24 00:27:31.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2312 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:31.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2313 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:31.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2314 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:31.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2315 Sending msg of 28 bytes to 3 on channel testchainid took 26.7µs" +orderer0.example.com | "2019-09-24 00:27:31.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2316 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54µs " +orderer0.example.com | "2019-09-24 00:27:31.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2317 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-09-24 00:27:31.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2318 Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-09-24 00:27:31.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2319 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.8µs " +orderer0.example.com | "2019-09-24 00:27:31.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 231a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.2µs " +orderer0.example.com | "2019-09-24 00:27:31.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 231b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:31.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 231c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:31.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 231d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:32.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 231e Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +orderer0.example.com | "2019-09-24 00:27:32.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 231f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.1µs " +orderer0.example.com | "2019-09-24 00:27:32.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2320 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.3µs " +orderer0.example.com | "2019-09-24 00:27:32.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2321 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +orderer0.example.com | "2019-09-24 00:27:32.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2322 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +orderer0.example.com | "2019-09-24 00:27:32.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2323 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.1µs " +orderer0.example.com | "2019-09-24 00:27:32.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2324 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:32.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2325 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:32.499 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2326 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:32.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2327 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-09-24 00:27:32.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2328 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +orderer0.example.com | "2019-09-24 00:27:32.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2329 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +orderer0.example.com | "2019-09-24 00:27:32.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 232a Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" +orderer0.example.com | "2019-09-24 00:27:32.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 232b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +orderer0.example.com | "2019-09-24 00:27:32.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 232c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 38.9µs " +orderer0.example.com | "2019-09-24 00:27:32.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 232d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:32.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 232e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:32.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 232f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:32.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2330 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-09-24 00:27:32.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2331 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 47.1µs " +orderer0.example.com | "2019-09-24 00:27:33.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2332 Sending msg of 28 bytes to 2 on channel businesschannel took 14.9µs" +orderer0.example.com | "2019-09-24 00:27:33.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2333 Sending msg of 28 bytes to 3 on channel businesschannel took 6.4µs" +orderer0.example.com | "2019-09-24 00:27:33.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2334 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.7µs " +orderer0.example.com | "2019-09-24 00:27:33.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2335 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.8µs " +orderer0.example.com | "2019-09-24 00:27:33.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2336 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:33.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2337 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:33.499 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2338 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:33.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2339 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +orderer0.example.com | "2019-09-24 00:27:33.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 233a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.5µs " +orderer0.example.com | "2019-09-24 00:27:33.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 233b Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +orderer0.example.com | "2019-09-24 00:27:33.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 233c Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +orderer0.example.com | "2019-09-24 00:27:33.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 233d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +orderer0.example.com | "2019-09-24 00:27:33.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 233e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 309.1µs " +orderer0.example.com | "2019-09-24 00:27:33.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 233f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 00:25:20.235 UTC [msp.identity] Verify -> DEBU 162c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:20.235 UTC [msp.identity] Verify -> DEBU 162d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:20.235 UTC [msp.identity] Verify -> DEBU 162e Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:20.236 UTC [msp.identity] Verify -> DEBU 162f Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [msp] DeserializeIdentity -> DEBU 1630 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [msp] DeserializeIdentity -> DEBU 1631 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1632 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1633 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1634 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 1635 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 1636 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 1637 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [cauthdsl] func1 -> DEBU 1638 0xc003b78420 gate 1569284720242458200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 1639 0xc003b78420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 163a 0xc003b78420 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 163b 0xc003b78420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 163c 0xc003b78420 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [cauthdsl] func1 -> DEBU 163d 0xc003b78420 gate 1569284720242458200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 163e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 163f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 1640 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [cauthdsl] func1 -> DEBU 1641 0xc003b78c60 gate 1569284720242741400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 1642 0xc003b78c60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 1643 0xc003b78c60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 1644 0xc003b78c60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [msp.identity] Verify -> DEBU 1645 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:20.242 UTC [msp.identity] Verify -> DEBU 1646 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:20.243 UTC [cauthdsl] func2 -> DEBU 1647 0xc003b78c60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.243 UTC [cauthdsl] func1 -> DEBU 1648 0xc003b78c60 gate 1569284720242741400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:20.243 UTC [policies] Evaluate -> DEBU 1649 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 00:27:33.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2340 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:33.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2341 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:34.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2342 Sending msg of 28 bytes to 3 on channel testchainid took 30.6µs" +orderer0.example.com | "2019-09-24 00:27:34.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2343 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 274.3µs " +orderer0.example.com | "2019-09-24 00:27:34.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2344 Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +orderer0.example.com | "2019-09-24 00:27:34.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2345 Sending msg of 28 bytes to 3 on channel businesschannel took 6.6µs" +orderer0.example.com | "2019-09-24 00:27:34.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2346 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.8µs " +orderer0.example.com | "2019-09-24 00:27:34.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2347 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128µs " +orderer0.example.com | "2019-09-24 00:27:34.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2348 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 00:27:34.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2349 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 00:25:20.243 UTC [policies] Evaluate -> DEBU 164a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.243 UTC [policies] Evaluate -> DEBU 164b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.243 UTC [policies] Evaluate -> DEBU 164c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.243 UTC [gossip.gossip] handleMessage -> DEBU 164d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.280 UTC [msp] DeserializeIdentity -> DEBU 164e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.280 UTC [msp] DeserializeIdentity -> DEBU 164f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.280 UTC [gossip.pull] Hello -> DEBU 1650 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:20.280 UTC [msp] DeserializeIdentity -> DEBU 1651 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.280 UTC [msp] DeserializeIdentity -> DEBU 1652 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.280 UTC [gossip.comm] Send -> DEBU 1653 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:20.280 UTC [gossip.comm] sendToEndpoint -> DEBU 1654 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.280 UTC [gossip.comm] sendToEndpoint -> DEBU 1655 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.282 UTC [gossip.comm] func1 -> DEBU 1656 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.282 UTC [gossip.gossip] handleMessage -> DEBU 1657 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.283 UTC [gossip.pull] HandleMessage -> DEBU 1658 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.283 UTC [gossip.gossip] handleMessage -> DEBU 1659 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.628 UTC [gossip.comm] func1 -> DEBU 165a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.628 UTC [gossip.gossip] handleMessage -> DEBU 165b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.628 UTC [gossip.gossip] handleMessage -> DEBU 165c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 165d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.628 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 165e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:20.628 UTC [msp] DeserializeIdentity -> DEBU 165f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1660 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1661 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1662 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 1663 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 1664 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 1665 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [cauthdsl] func1 -> DEBU 1666 0xc003c856c0 gate 1569284720629402300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [cauthdsl] func2 -> DEBU 1667 0xc003c856c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [cauthdsl] func2 -> DEBU 1668 0xc003c856c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [cauthdsl] func2 -> DEBU 1669 0xc003c856c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [cauthdsl] func2 -> DEBU 166a 0xc003c856c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [cauthdsl] func1 -> DEBU 166b 0xc003c856c0 gate 1569284720629402300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 166c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 166d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 166e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.629 UTC [cauthdsl] func1 -> DEBU 166f 0xc003c85f00 gate 1569284720629941000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.630 UTC [cauthdsl] func2 -> DEBU 1670 0xc003c85f00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.630 UTC [cauthdsl] func2 -> DEBU 1671 0xc003c85f00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.630 UTC [cauthdsl] func2 -> DEBU 1672 0xc003c85f00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.630 UTC [msp.identity] Verify -> DEBU 1673 Verify: digest = 00000000 14 2e 50 c2 c6 c6 27 33 17 01 0b 2a a3 c1 87 6a |..P...'3...*...j| +peer0.org1.example.com | 00000010 ad 61 78 15 02 11 d7 1f 31 f2 9a aa ed de 29 21 |.ax.....1.....)!|" +peer0.org1.example.com | "2019-09-24 00:25:20.630 UTC [gossip.gossip] handleMessage -> DEBU 1674 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.630 UTC [msp.identity] Verify -> DEBU 1675 Verify: sig = 00000000 30 45 02 21 00 e2 41 73 6c 0e 73 bf 59 ae de 97 |0E.!..Asl.s.Y...| +peer0.org1.example.com | 00000010 ed 7f ca e1 98 0c cb 79 3f fe 05 27 73 04 27 76 |.......y?..'s.'v| +peer0.org1.example.com | 00000020 ac 3b ff 61 91 02 20 42 e8 01 61 bf 70 a3 be 6d |.;.a.. B..a.p..m| +peer0.org1.example.com | 00000030 46 26 4c b2 ba 9b 95 0a 25 36 19 7c f9 bc 06 85 |F&L.....%6.|....| +peer0.org1.example.com | 00000040 59 f5 e5 66 32 b9 12 |Y..f2..|" +peer0.org1.example.com | "2019-09-24 00:25:20.631 UTC [cauthdsl] func2 -> DEBU 1676 0xc003c85f00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.631 UTC [cauthdsl] func1 -> DEBU 1677 0xc003c85f00 gate 1569284720629941000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:20.631 UTC [policies] Evaluate -> DEBU 1678 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.631 UTC [policies] Evaluate -> DEBU 1679 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.636 UTC [policies] Evaluate -> DEBU 167a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.636 UTC [policies] Evaluate -> DEBU 167b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.636 UTC [gossip.discovery] handleAliveMessage -> DEBU 167c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 167d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:20.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 167e updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:20.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 167f Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:20.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 1680 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:20.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 1681 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 1682 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1683 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1684 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1685 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.637 UTC [msp] DeserializeIdentity -> DEBU 1686 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.637 UTC [gossip.gossip] handleMessage -> DEBU 1687 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 1688 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 1689 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 168a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 168b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 168c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [gossip.comm] Send -> DEBU 168d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [gossip.comm] func1 -> DEBU 168e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1690 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1691 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 168f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [gossip.gossip] handleMessage -> DEBU 1692 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 1693 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [gossip.comm] Send -> DEBU 1694 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [gossip.gossip] handleMessage -> DEBU 1695 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1696 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1697 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.638 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1698 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1699 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.648 UTC [gossip.comm] func1 -> DEBU 169a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.648 UTC [gossip.gossip] handleMessage -> DEBU 169b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.648 UTC [gossip.gossip] handleMessage -> DEBU 169c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 169d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.649 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 169e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:20.649 UTC [msp] DeserializeIdentity -> DEBU 169f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.649 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16a0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:20.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16a1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16a2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:20.649 UTC [policies] Evaluate -> DEBU 16a3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.649 UTC [policies] Evaluate -> DEBU 16a4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:20.649 UTC [policies] Evaluate -> DEBU 16a5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.649 UTC [cauthdsl] func1 -> DEBU 16a6 0xc00255b690 gate 1569284720649648700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.649 UTC [cauthdsl] func2 -> DEBU 16a7 0xc00255b690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.650 UTC [cauthdsl] func2 -> DEBU 16a8 0xc00255b690 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.650 UTC [cauthdsl] func2 -> DEBU 16a9 0xc00255b690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:20.650 UTC [cauthdsl] func2 -> DEBU 16aa 0xc00255b690 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.650 UTC [cauthdsl] func1 -> DEBU 16ab 0xc00255b690 gate 1569284720649648700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.650 UTC [policies] Evaluate -> DEBU 16ac Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.650 UTC [policies] Evaluate -> DEBU 16ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.650 UTC [policies] Evaluate -> DEBU 16ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:20.650 UTC [cauthdsl] func1 -> DEBU 16af 0xc00255bed0 gate 1569284720650703600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.653 UTC [cauthdsl] func2 -> DEBU 16b0 0xc00255bed0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.653 UTC [cauthdsl] func2 -> DEBU 16b1 0xc00255bed0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.653 UTC [cauthdsl] func2 -> DEBU 16b2 0xc00255bed0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.653 UTC [msp.identity] Verify -> DEBU 16b3 Verify: digest = 00000000 7b 27 9f 10 ca 64 de 30 f6 0d db 1f 0d b3 4a 47 |{'...d.0......JG| +peer0.org1.example.com | 00000010 07 63 97 6b 9b c7 0c 12 a2 ca ed f2 19 30 ff 5f |.c.k.........0._|" +peer0.org1.example.com | "2019-09-24 00:25:20.653 UTC [msp.identity] Verify -> DEBU 16b4 Verify: sig = 00000000 30 45 02 21 00 88 3a 1b cb a7 2e 74 82 6e 06 a2 |0E.!..:....t.n..| +peer0.org1.example.com | 00000010 e3 e8 99 b1 33 fb 5d ec 50 ab 94 6a a9 4a ab c0 |....3.].P..j.J..| +peer0.org1.example.com | 00000020 aa 0f c1 65 9b 02 20 61 a6 1e 47 f9 d2 47 0b ce |...e.. a..G..G..| +peer0.org1.example.com | 00000030 b8 bc 82 2d 78 20 52 72 79 87 83 a4 aa 9d 6e 8a |...-x Rry.....n.| +peer0.org1.example.com | 00000040 b9 7d 36 e1 cb 5f dd |.}6.._.|" +peer0.org1.example.com | "2019-09-24 00:25:20.653 UTC [cauthdsl] func2 -> DEBU 16b5 0xc00255bed0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.653 UTC [cauthdsl] func1 -> DEBU 16b6 0xc00255bed0 gate 1569284720650703600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:20.653 UTC [policies] Evaluate -> DEBU 16b7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [policies] Evaluate -> DEBU 16b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [policies] Evaluate -> DEBU 16b9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [policies] Evaluate -> DEBU 16ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [gossip.discovery] handleAliveMessage -> DEBU 16bb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 16bc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 16bd updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 16be Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 16bf Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 16c0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [gossip.discovery] handleAliveMessage -> DEBU 16c1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16c2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.654 UTC [gossip.discovery] sendMemResponse -> DEBU 16c3 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:20.655 UTC [msp] DeserializeIdentity -> DEBU 16c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.655 UTC [msp] DeserializeIdentity -> DEBU 16c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.655 UTC [msp] DeserializeIdentity -> DEBU 16c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.655 UTC [gossip.comm] Send -> DEBU 16c7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:20.655 UTC [gossip.discovery] sendMemResponse -> DEBU 16c8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:20.655 UTC [gossip.comm] sendToEndpoint -> DEBU 16c9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.658 UTC [gossip.comm] sendToEndpoint -> DEBU 16ca Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.665 UTC [gossip.comm] func1 -> DEBU 16cb Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.665 UTC [gossip.gossip] handleMessage -> DEBU 16cc Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.665 UTC [gossip.pull] HandleMessage -> DEBU 16cd GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16cf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16d0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16d1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16d2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.665 UTC [gossip.pull] SendDigest -> DEBU 16d4 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:20.666 UTC [gossip.gossip] handleMessage -> DEBU 16d5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.683 UTC [gossip.comm] func1 -> DEBU 16d6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.683 UTC [gossip.gossip] handleMessage -> DEBU 16d7 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.683 UTC [msp] DeserializeIdentity -> DEBU 16d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.683 UTC [msp] DeserializeIdentity -> DEBU 16d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.684 UTC [gossip.gossip] handleMessage -> DEBU 16da Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.712 UTC [gossip.comm] func1 -> DEBU 16db Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.713 UTC [gossip.gossip] handleMessage -> DEBU 16dc Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.713 UTC [gossip.pull] HandleMessage -> DEBU 16dd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:20.715 UTC [gossip.pull] SendDigest -> DEBU 16de Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:20.716 UTC [gossip.gossip] handleMessage -> DEBU 16df Exiting" +peer0.org1.example.com | "2019-09-24 00:25:20.896 UTC [endorser] ProcessProposal -> DEBU 16e0 Entering: request from 172.18.0.9:50708" +peer0.org1.example.com | "2019-09-24 00:25:20.897 UTC [protoutils] ValidateProposalMessage -> DEBU 16e1 ValidateProposalMessage starts for signed proposal 0xc00311b680" +peer0.org1.example.com | "2019-09-24 00:25:20.897 UTC [protoutils] validateChannelHeader -> DEBU 16e2 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:25:20.897 UTC [protoutils] checkSignatureFromCreator -> DEBU 16e3 begin" +peer0.org1.example.com | "2019-09-24 00:25:20.897 UTC [msp] GetManagerForChain -> DEBU 16e4 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:25:20.897 UTC [msp] DeserializeIdentity -> DEBU 16e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:20.897 UTC [msp.identity] newIdentity -> DEBU 16e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:25:20.897 UTC [protoutils] checkSignatureFromCreator -> DEBU 16e7 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:25:20.898 UTC [msp] Validate -> DEBU 16e8 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:25:20.898 UTC [msp] getCertificationChain -> DEBU 16e9 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:25:20.898 UTC [protoutils] checkSignatureFromCreator -> DEBU 16ea creator is valid" +peer0.org1.example.com | "2019-09-24 00:25:20.898 UTC [msp.identity] Verify -> DEBU 16eb Verify: digest = 00000000 81 54 6e 71 4c 13 01 d2 b2 33 1b fe e2 ce a9 73 |.TnqL....3.....s| +peer0.org1.example.com | 00000010 cf 58 2a 85 1c c4 6b f0 75 56 c3 b7 90 68 82 56 |.X*...k.uV...h.V|" +peer0.org1.example.com | "2019-09-24 00:25:20.898 UTC [msp.identity] Verify -> DEBU 16ec Verify: sig = 00000000 30 45 02 21 00 e9 fc 23 ef 06 c8 84 79 fe 17 bc |0E.!...#....y...| +peer0.org1.example.com | 00000010 08 fc b3 a8 14 bd 21 f6 4d a6 45 61 8b 8c c8 76 |......!.M.Ea...v| +peer0.org1.example.com | 00000020 4f 12 29 bf 92 02 20 12 96 e7 0c 01 cc a7 d4 1a |O.)... .........| +peer0.org1.example.com | 00000030 e4 da 30 95 de da 7a 5e ef 25 5b 73 57 60 95 36 |..0...z^.%[sW`.6| +peer0.org1.example.com | 00000040 8d 82 9e 5b 6f 1b e7 |...[o..|" +peer0.org1.example.com | "2019-09-24 00:25:20.898 UTC [protoutils] checkSignatureFromCreator -> DEBU 16ed exits successfully" +peer0.org1.example.com | "2019-09-24 00:25:20.898 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 16ee validateChaincodeProposalMessage starts for proposal 0xc002704770, header 0xc00311ba90" +peer0.org1.example.com | "2019-09-24 00:25:20.898 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 16ef validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:25:20.898 UTC [endorser] preProcess -> DEBU 16f0 [businesschannel][220bb88b] processing txid: 220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7" +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 16f1 retrieveTransactionByID() - txId = [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7]" +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 16f2 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 16f3 constructing new tx simulator txid = [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7]" +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [endorser] SimulateProposal -> DEBU 16f4 [businesschannel][220bb88b] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [endorser] callChaincode -> INFO 16f5 [businesschannel][220bb88b] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [chaincode] Execute -> DEBU 16f6 Entry" +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [chaincode] handleMessage -> DEBU 16f7 [220bb88b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [chaincode] HandleTransaction -> DEBU 16f8 [220bb88b] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [chaincode] HandleGetState -> DEBU 16f9 [220bb88b] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [stateleveldb] GetState -> DEBU 16fa GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [chaincode] HandleGetState -> DEBU 16fb [220bb88b] No state associated with key: exp02. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-09-24 00:25:20.899 UTC [chaincode] HandleTransaction -> DEBU 16fc [220bb88b] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:25:20.903 UTC [msp] GetManagerForChain -> DEBU 16fd Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:25:20.903 UTC [cauthdsl] func1 -> DEBU 16fe 0xc0033e8ce0 gate 1569284720903654700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:20.903 UTC [cauthdsl] func2 -> DEBU 16ff 0xc0033e8ce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:20.904 UTC [cauthdsl] func2 -> DEBU 1700 0xc0033e8ce0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:20.904 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1701 Checking if identity satisfies ADMIN role for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:25:20.904 UTC [cauthdsl] func2 -> DEBU 1702 0xc0033e8ce0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.904 UTC [msp.identity] Verify -> DEBU 1703 Verify: digest = 00000000 81 54 6e 71 4c 13 01 d2 b2 33 1b fe e2 ce a9 73 |.TnqL....3.....s| +peer0.org1.example.com | 00000010 cf 58 2a 85 1c c4 6b f0 75 56 c3 b7 90 68 82 56 |.X*...k.uV...h.V|" +peer0.org1.example.com | "2019-09-24 00:25:20.904 UTC [msp.identity] Verify -> DEBU 1704 Verify: sig = 00000000 30 45 02 21 00 e9 fc 23 ef 06 c8 84 79 fe 17 bc |0E.!...#....y...| +peer0.org1.example.com | 00000010 08 fc b3 a8 14 bd 21 f6 4d a6 45 61 8b 8c c8 76 |......!.M.Ea...v| +peer0.org1.example.com | 00000020 4f 12 29 bf 92 02 20 12 96 e7 0c 01 cc a7 d4 1a |O.)... .........| +peer0.org1.example.com | 00000030 e4 da 30 95 de da 7a 5e ef 25 5b 73 57 60 95 36 |..0...z^.%[sW`.6| +peer0.org1.example.com | 00000040 8d 82 9e 5b 6f 1b e7 |...[o..|" +peer0.org1.example.com | "2019-09-24 00:25:20.905 UTC [cauthdsl] func2 -> DEBU 1705 0xc0033e8ce0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:20.905 UTC [cauthdsl] func2 -> DEBU 1706 0xc0033e8ce0 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-09-24 00:25:20.905 UTC [cauthdsl] func2 -> DEBU 1707 0xc0033e8ce0 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-09-24 00:25:20.905 UTC [cauthdsl] func2 -> DEBU 1708 0xc0033e8ce0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:20.905 UTC [cauthdsl] func1 -> DEBU 1709 0xc0033e8ce0 gate 1569284720903654700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:20.906 UTC [chaincode] handleMessage -> DEBU 170a [220bb88b] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:25:20.906 UTC [chaincode] HandleTransaction -> DEBU 170b [220bb88b] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:25:20.906 UTC [chaincode] HandleTransaction -> DEBU 170c [220bb88b] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:25:20.906 UTC [lscc] putChaincodeCollectionData -> DEBU 170d No collection configuration specified" +peer0.org1.example.com | "2019-09-24 00:25:20.907 UTC [chaincode] handleMessage -> DEBU 170e [220bb88b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:25:20.907 UTC [chaincode] Notify -> DEBU 170f [220bb88b] notifying Txid:220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:25:20.907 UTC [chaincode] Execute -> DEBU 1710 Exit" +peer0.org1.example.com | "2019-09-24 00:25:20.908 UTC [chaincode] LaunchConfig -> DEBU 1711 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-09-24 00:25:20.908 UTC [chaincode] Start -> DEBU 1712 start container: exp02:1.0" +peer0.org1.example.com | "2019-09-24 00:25:20.908 UTC [chaincode] Start -> DEBU 1713 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-09-24 00:25:20.909 UTC [chaincode] Start -> DEBU 1714 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02:1.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-09-24 00:25:20.909 UTC [container] lockContainer -> DEBU 1715 waiting for container(exp02-1.0) lock" +peer0.org1.example.com | "2019-09-24 00:25:20.909 UTC [container] lockContainer -> DEBU 1716 got container (exp02-1.0) lock" +peer0.org1.example.com | "2019-09-24 00:25:20.910 UTC [dockercontroller] stopInternal -> DEBU 1717 stopping container" id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 00:25:20.930 UTC [dockercontroller] stopInternal -> DEBU 1718 stop container result" error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-09-24 00:25:20.930 UTC [dockercontroller] stopInternal -> DEBU 1719 killing container" id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 00:25:20.963 UTC [dockercontroller] stopInternal -> DEBU 171a kill container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-09-24 00:25:20.963 UTC [dockercontroller] stopInternal -> DEBU 171b removing container" id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 00:25:20.988 UTC [dockercontroller] stopInternal -> DEBU 171c remove container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-09-24 00:25:20.988 UTC [dockercontroller] createContainer -> DEBU 171d create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 00:25:20.988 UTC [dockercontroller] getDockerHostConfig -> DEBU 171e docker container hostconfig NetworkMode: hlf_net" +peer0.org1.example.com | "2019-09-24 00:25:21.066 UTC [chaincode.platform] GenerateDockerfile -> DEBU 171f +peer0.org1.example.com | FROM hyperledger/fabric-baseos:amd64-0.4.15 +peer0.org1.example.com | ADD binpackage.tar /usr/local/bin +peer0.org1.example.com | LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.id.version="1.0" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.type="GOLANG" \ +peer0.org1.example.com | org.hyperledger.fabric.version="1.4.2" \ +peer0.org1.example.com | org.hyperledger.fabric.base.version="0.4.15" +peer0.org1.example.com | ENV CORE_CHAINCODE_BUILDLEVEL=1.4.2" +peer0.org1.example.com | "2019-09-24 00:25:21.088 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 1720 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +peer0.org1.example.com | "2019-09-24 00:25:21.089 UTC [chaincode.platform.util] DockerBuild -> DEBU 1721 Attempting build with image hyperledger/fabric-ccenv:latest" +peer0.org1.example.com | "2019-09-24 00:25:21.183 UTC [gossip.gossip] handleMessage -> DEBU 1722 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:21.183 UTC [msp] DeserializeIdentity -> DEBU 1723 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:21.183 UTC [msp] DeserializeIdentity -> DEBU 1724 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:21.184 UTC [msp] DeserializeIdentity -> DEBU 1725 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:21.184 UTC [gossip.gossip] handleMessage -> DEBU 1726 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:21.673 UTC [gossip.comm] func1 -> DEBU 1727 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:21.673 UTC [gossip.gossip] handleMessage -> DEBU 1728 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:21.674 UTC [gossip.pull] HandleMessage -> DEBU 1729 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:21.674 UTC [gossip.pull] SendDigest -> DEBU 172a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:21.674 UTC [gossip.gossip] handleMessage -> DEBU 172b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:21.691 UTC [gossip.comm] func1 -> DEBU 172c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020 " signature:"0D\002 ;\007\206\032J\240;D?\217\005s\246\274\366\226\226\317+\334\246\363\024i\002\326Y\225!\321\356\230\002 b\220\007\257\342,\310\217\257\274\300\335\001\347F\250\304\177\304\003\024E\232\241\265\213\375\034Z\333\267\300" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:21.692 UTC [gossip.gossip] handleMessage -> DEBU 172d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020 " signature:"0D\002 ;\007\206\032J\240;D?\217\005s\246\274\366\226\226\317+\334\246\363\024i\002\326Y\225!\321\356\230\002 b\220\007\257\342,\310\217\257\274\300\335\001\347F\250\304\177\304\003\024E\232\241\265\213\375\034Z\333\267\300" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:21.692 UTC [gossip.gossip] handleMessage -> DEBU 172e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:21.692 UTC [gossip.discovery] handleMsgFromComm -> DEBU 172f Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020 " signature:"0D\002 ;\007\206\032J\240;D?\217\005s\246\274\366\226\226\317+\334\246\363\024i\002\326Y\225!\321\356\230\002 b\220\007\257\342,\310\217\257\274\300\335\001\347F\250\304\177\304\003\024E\232\241\265\213\375\034Z\333\267\300" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:21.692 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1730 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:21.692 UTC [msp.identity] Verify -> DEBU 1731 Verify: digest = 00000000 bc 0a 41 b7 70 17 85 38 68 3d c5 a6 ad fb cb 0c |..A.p..8h=......| +peer0.org1.example.com | 00000010 c3 4a 60 54 1e 78 b1 85 0c 26 b6 a2 29 a2 3d c7 |.J`T.x...&..).=.|" +peer0.org1.example.com | "2019-09-24 00:25:21.693 UTC [msp.identity] Verify -> DEBU 1732 Verify: sig = 00000000 30 44 02 20 3b 07 86 1a 4a a0 3b 44 3f 8f 05 73 |0D. ;...J.;D?..s| +peer0.org1.example.com | 00000010 a6 bc f6 96 96 cf 2b dc a6 f3 14 69 02 d6 59 95 |......+....i..Y.| +peer0.org1.example.com | 00000020 21 d1 ee 98 02 20 62 90 07 af e2 2c c8 8f af bc |!.... b....,....| +peer0.org1.example.com | 00000030 c0 dd 01 e7 46 a8 c4 7f c4 03 14 45 9a a1 b5 8b |....F......E....| +peer0.org1.example.com | 00000040 fd 1c 5a db b7 c0 |..Z...|" +peer0.org1.example.com | "2019-09-24 00:25:21.693 UTC [msp.identity] Verify -> DEBU 1733 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:21.693 UTC [msp.identity] Verify -> DEBU 1734 Verify: sig = 00000000 30 44 02 20 5a 19 9b 93 36 51 70 8a 28 29 21 e4 |0D. Z...6Qp.()!.| +peer0.org1.example.com | 00000010 68 1a 8e b4 76 f0 a0 8a 50 a4 bc 4d 70 62 55 ab |h...v...P..MpbU.| +peer0.org1.example.com | 00000020 ce 3b 1f 24 02 20 1e 98 b9 ec 33 af d7 cb f8 57 |.;.$. ....3....W| +peer0.org1.example.com | 00000030 ce ab 43 a3 11 c0 e9 80 c9 e8 eb d7 08 f8 d8 5e |..C............^| +peer0.org1.example.com | 00000040 9d fd 6b 8c 32 f7 |..k.2.|" +peer0.org1.example.com | "2019-09-24 00:25:21.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 1735 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:21.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 1736 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:21.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 1737 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:21.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1738 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:21.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1739 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:21.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 173a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:21.694 UTC [gossip.discovery] handleAliveMessage -> DEBU 173b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:21.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 173c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:21.694 UTC [gossip.discovery] sendMemResponse -> DEBU 173d Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:21.694 UTC [msp] DeserializeIdentity -> DEBU 173e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:21.694 UTC [msp] DeserializeIdentity -> DEBU 173f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:21.694 UTC [gossip.comm] Send -> DEBU 1740 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:21.697 UTC [gossip.comm] sendToEndpoint -> DEBU 1741 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:21.698 UTC [gossip.comm] sendToEndpoint -> DEBU 1742 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:21.698 UTC [gossip.discovery] sendMemResponse -> DEBU 1743 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020 " signature:"0D\002 ;\007\206\032J\240;D?\217\005s\246\274\366\226\226\317+\334\246\363\024i\002\326Y\225!\321\356\230\002 b\220\007\257\342,\310\217\257\274\300\335\001\347F\250\304\177\304\003\024E\232\241\265\213\375\034Z\333\267\300" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:25:22.114 UTC [gossip.comm] func1 -> DEBU 1744 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.114 UTC [gossip.gossip] handleMessage -> DEBU 1745 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.114 UTC [msp] DeserializeIdentity -> DEBU 1746 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.115 UTC [msp] DeserializeIdentity -> DEBU 1747 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.115 UTC [msp] DeserializeIdentity -> DEBU 1748 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.115 UTC [gossip.gossip] handleMessage -> DEBU 1749 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.276 UTC [gossip.election] waitForInterrupt -> DEBU 174a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.276 UTC [gossip.election] IsLeader -> DEBU 174b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:25:22.276 UTC [msp] GetDefaultSigningIdentity -> DEBU 174c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:22.276 UTC [msp.identity] Sign -> DEBU 174d Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510061801 " +peer0.org1.example.com | "2019-09-24 00:25:22.276 UTC [msp.identity] Sign -> DEBU 174e Sign: digest: A46BC04CFC8A183CA60690C75412DE299D4E3C6027DDE38FBCDDDE66D82E9DD5 " +peer0.org1.example.com | "2019-09-24 00:25:22.276 UTC [gossip.election] waitForInterrupt -> DEBU 174f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:25:22.285 UTC [msp] DeserializeIdentity -> DEBU 1750 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.285 UTC [msp] DeserializeIdentity -> DEBU 1751 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.285 UTC [msp] DeserializeIdentity -> DEBU 1752 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.286 UTC [msp] DeserializeIdentity -> DEBU 1753 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.286 UTC [gossip.comm] Send -> DEBU 1754 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:22.286 UTC [msp] DeserializeIdentity -> DEBU 1755 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.286 UTC [msp] DeserializeIdentity -> DEBU 1756 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.286 UTC [gossip.comm] sendToEndpoint -> DEBU 1757 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.286 UTC [gossip.comm] sendToEndpoint -> DEBU 1758 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.678 UTC [gossip.comm] func1 -> DEBU 1759 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.678 UTC [gossip.gossip] handleMessage -> DEBU 175a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.678 UTC [gossip.gossip] handleMessage -> DEBU 175b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 175c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.678 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 175d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:22.678 UTC [msp.identity] Verify -> DEBU 175e Verify: digest = 00000000 2a 9f 4d a6 e9 7c 11 b7 87 4f be c2 ed fc ee 9c |*.M..|...O......| +peer0.org1.example.com | 00000010 a7 02 80 10 99 4c 72 9e 33 e9 cd f2 83 9e 6e 95 |.....Lr.3.....n.|" +peer0.org1.example.com | "2019-09-24 00:25:22.678 UTC [msp.identity] Verify -> DEBU 175f Verify: sig = 00000000 30 45 02 21 00 9d cd 16 7f e4 e9 12 84 1f 01 e8 |0E.!............| +peer0.org1.example.com | 00000010 ad 08 e9 2d 5d 35 2c 13 30 53 e4 f2 a6 d6 53 76 |...-]5,.0S....Sv| +peer0.org1.example.com | 00000020 80 a1 de df ff 02 20 59 87 7c 69 85 eb ec 7c 6b |...... Y.|i...|k| +peer0.org1.example.com | 00000030 7c 56 9a 2d 8d be 8a 14 f6 f4 d1 30 04 b8 1c 03 ||V.-.......0....| +peer0.org1.example.com | 00000040 24 a8 cf 28 39 69 12 |$..(9i.|" +peer0.org1.example.com | "2019-09-24 00:25:22.680 UTC [gossip.discovery] handleAliveMessage -> DEBU 1760 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1761 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:22.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1762 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:22.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1763 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:22.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1764 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:22.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1765 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.680 UTC [gossip.discovery] handleAliveMessage -> DEBU 1766 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.681 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1767 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.685 UTC [gossip.comm] func1 -> DEBU 1768 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.685 UTC [gossip.gossip] handleMessage -> DEBU 1769 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.685 UTC [gossip.gossip] handleMessage -> DEBU 176a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 176b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 176c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.686 UTC [msp] DeserializeIdentity -> DEBU 176d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.686 UTC [msp] DeserializeIdentity -> DEBU 176e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.686 UTC [msp] DeserializeIdentity -> DEBU 176f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.686 UTC [gossip.comm] Send -> DEBU 1770 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:22.686 UTC [msp] DeserializeIdentity -> DEBU 1771 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:22.686 UTC [gossip.comm] Send -> DEBU 1772 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:22.686 UTC [gossip.comm] sendToEndpoint -> DEBU 1773 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.686 UTC [gossip.comm] sendToEndpoint -> DEBU 1774 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.687 UTC [gossip.comm] sendToEndpoint -> DEBU 1775 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.687 UTC [gossip.comm] sendToEndpoint -> DEBU 1776 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.692 UTC [gossip.gossip] handleMessage -> DEBU 1777 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.692 UTC [gossip.gossip] handleMessage -> DEBU 1778 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:22.692 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1779 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:22.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 177a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.603 UTC [gossip.pull] Hello -> DEBU 177b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:23.603 UTC [gossip.comm] Send -> DEBU 177c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:23.603 UTC [gossip.pull] Hello -> DEBU 177d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:23.603 UTC [gossip.comm] Send -> DEBU 177e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:23.603 UTC [gossip.pull] Hello -> DEBU 177f Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:23.603 UTC [gossip.comm] Send -> DEBU 1780 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:23.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1781 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1782 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1783 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1784 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1785 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1786 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.606 UTC [gossip.comm] func1 -> DEBU 1787 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.606 UTC [gossip.gossip] handleMessage -> DEBU 1788 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.606 UTC [gossip.pull] HandleMessage -> DEBU 1789 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.606 UTC [gossip.gossip] handleMessage -> DEBU 178a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.608 UTC [gossip.comm] func1 -> DEBU 178b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.608 UTC [gossip.gossip] handleMessage -> DEBU 178c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.608 UTC [gossip.pull] HandleMessage -> DEBU 178d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.608 UTC [gossip.gossip] handleMessage -> DEBU 178e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.609 UTC [gossip.gossip] handleMessage -> DEBU 178f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.609 UTC [gossip.pull] HandleMessage -> DEBU 1790 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.609 UTC [gossip.gossip] handleMessage -> DEBU 1791 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.623 UTC [msp] GetDefaultSigningIdentity -> DEBU 1792 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:23.624 UTC [msp.identity] Sign -> DEBU 1793 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101D " +peer0.org1.example.com | "2019-09-24 00:25:23.624 UTC [msp.identity] Sign -> DEBU 1794 Sign: digest: FDA2D8463471AC97E725208AD2107052F997547547CAAD795690399CD20E947D " +peer0.org1.example.com | "2019-09-24 00:25:23.624 UTC [msp] GetDefaultSigningIdentity -> DEBU 1795 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:23.624 UTC [msp.identity] Sign -> DEBU 1796 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:23.624 UTC [msp.identity] Sign -> DEBU 1797 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:23.625 UTC [gossip.comm] Send -> DEBU 1798 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:23.625 UTC [msp] DeserializeIdentity -> DEBU 1799 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.625 UTC [gossip.comm] Send -> DEBU 179a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:23.625 UTC [gossip.comm] sendToEndpoint -> DEBU 179b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.625 UTC [gossip.comm] sendToEndpoint -> DEBU 179d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.625 UTC [msp] DeserializeIdentity -> DEBU 179c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.625 UTC [gossip.comm] Send -> DEBU 179e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:23.626 UTC [gossip.comm] sendToEndpoint -> DEBU 179f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.627 UTC [gossip.comm] sendToEndpoint -> DEBU 17a0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.628 UTC [gossip.comm] sendToEndpoint -> DEBU 17a1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.628 UTC [gossip.comm] sendToEndpoint -> DEBU 17a2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.628 UTC [gossip.comm] func1 -> DEBU 17a3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.628 UTC [gossip.gossip] handleMessage -> DEBU 17a4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.628 UTC [gossip.gossip] handleMessage -> DEBU 17a5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.628 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17a7 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:23.629 UTC [msp.identity] Verify -> DEBU 17a8 Verify: digest = 00000000 fd a2 d8 46 34 71 ac 97 e7 25 20 8a d2 10 70 52 |...F4q...% ...pR| +peer0.org1.example.com | 00000010 f9 97 54 75 47 ca ad 79 56 90 39 9c d2 0e 94 7d |..TuG..yV.9....}|" +peer0.org1.example.com | "2019-09-24 00:25:23.629 UTC [msp.identity] Verify -> DEBU 17a9 Verify: sig = 00000000 30 45 02 21 00 f9 37 c1 69 38 07 17 02 42 b8 01 |0E.!..7.i8...B..| +peer0.org1.example.com | 00000010 f6 ac 2b 96 f5 e3 02 c2 1b 89 5c 01 cc 87 31 19 |..+.......\...1.| +peer0.org1.example.com | 00000020 b5 c1 20 fd 37 02 20 4c 2f d6 fa 9e 7d 60 ab df |.. .7. L/...}`..| +peer0.org1.example.com | 00000030 b2 61 19 95 ba 46 8d 6f 56 c1 4c 7a 38 a9 ad 63 |.a...F.oV.Lz8..c| +peer0.org1.example.com | 00000040 cb 17 ee e8 79 1c 5d |....y.]|" +peer0.org1.example.com | "2019-09-24 00:25:23.629 UTC [msp.identity] Verify -> DEBU 17aa Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:23.629 UTC [msp.identity] Verify -> DEBU 17ab Verify: sig = 00000000 30 44 02 20 33 7d f7 48 e4 54 5b 82 5e e0 58 10 |0D. 3}.H.T[.^.X.| +peer0.org1.example.com | 00000010 c9 1a c6 2f b4 e4 d4 d8 01 42 c2 6c 22 d3 26 33 |.../.....B.l".&3| +peer0.org1.example.com | 00000020 f5 16 0d 4b 02 20 74 0d 10 46 96 5f 13 63 36 90 |...K. t..F._.c6.| +peer0.org1.example.com | 00000030 de ed 78 ee f0 be a3 e9 36 fe ff 12 4d bd a0 2b |..x.....6...M..+| +peer0.org1.example.com | 00000040 e4 bb 56 88 6e c1 |..V.n.|" +peer0.org1.example.com | "2019-09-24 00:25:23.629 UTC [gossip.comm] func1 -> DEBU 17ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 17ad Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.630 UTC [gossip.gossip] handleMessage -> DEBU 17ae Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.630 UTC [gossip.discovery] isSentByMe -> DEBU 17af Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 17b0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.630 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17b3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:23.634 UTC [gossip.gossip] handleMessage -> DEBU 17b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.637 UTC [msp.identity] Verify -> DEBU 17b5 Verify: digest = 00000000 fd a2 d8 46 34 71 ac 97 e7 25 20 8a d2 10 70 52 |...F4q...% ...pR| +peer0.org1.example.com | 00000010 f9 97 54 75 47 ca ad 79 56 90 39 9c d2 0e 94 7d |..TuG..yV.9....}|" +peer0.org1.example.com | "2019-09-24 00:25:23.647 UTC [msp.identity] Verify -> DEBU 17b7 Verify: sig = 00000000 30 45 02 21 00 f9 37 c1 69 38 07 17 02 42 b8 01 |0E.!..7.i8...B..| +peer0.org1.example.com | 00000010 f6 ac 2b 96 f5 e3 02 c2 1b 89 5c 01 cc 87 31 19 |..+.......\...1.| +peer0.org1.example.com | 00000020 b5 c1 20 fd 37 02 20 4c 2f d6 fa 9e 7d 60 ab df |.. .7. L/...}`..| +peer0.org1.example.com | 00000030 b2 61 19 95 ba 46 8d 6f 56 c1 4c 7a 38 a9 ad 63 |.a...F.oV.Lz8..c| +peer0.org1.example.com | 00000040 cb 17 ee e8 79 1c 5d |....y.]|" +peer0.org1.example.com | "2019-09-24 00:25:23.646 UTC [gossip.gossip] handleMessage -> DEBU 17b6 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 17b8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.648 UTC [gossip.discovery] isSentByMe -> DEBU 17b9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 17ba Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17bb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.649 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17bd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:23.650 UTC [gossip.gossip] handleMessage -> DEBU 17be Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.650 UTC [msp.identity] Verify -> DEBU 17bf Verify: digest = 00000000 fd a2 d8 46 34 71 ac 97 e7 25 20 8a d2 10 70 52 |...F4q...% ...pR| +peer0.org1.example.com | 00000010 f9 97 54 75 47 ca ad 79 56 90 39 9c d2 0e 94 7d |..TuG..yV.9....}|" +peer0.org1.example.com | "2019-09-24 00:25:23.650 UTC [msp.identity] Verify -> DEBU 17c0 Verify: sig = 00000000 30 45 02 21 00 f9 37 c1 69 38 07 17 02 42 b8 01 |0E.!..7.i8...B..| +peer0.org1.example.com | 00000010 f6 ac 2b 96 f5 e3 02 c2 1b 89 5c 01 cc 87 31 19 |..+.......\...1.| +peer0.org1.example.com | 00000020 b5 c1 20 fd 37 02 20 4c 2f d6 fa 9e 7d 60 ab df |.. .7. L/...}`..| +peer0.org1.example.com | 00000030 b2 61 19 95 ba 46 8d 6f 56 c1 4c 7a 38 a9 ad 63 |.a...F.oV.Lz8..c| +peer0.org1.example.com | 00000040 cb 17 ee e8 79 1c 5d |....y.]|" +peer0.org1.example.com | "2019-09-24 00:25:23.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 17c1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.657 UTC [gossip.discovery] isSentByMe -> DEBU 17c2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.657 UTC [gossip.discovery] handleAliveMessage -> DEBU 17c3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.657 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17c4 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:23.657 UTC [msp] DeserializeIdentity -> DEBU 17c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17c7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17c8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [cauthdsl] func1 -> DEBU 17cc 0xc0027b1ce0 gate 1569284723658269100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17cd 0xc0027b1ce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17ce 0xc0027b1ce0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17cf 0xc0027b1ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17d0 0xc0027b1ce0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [cauthdsl] func1 -> DEBU 17d1 0xc0027b1ce0 gate 1569284723658269100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17d2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [cauthdsl] func1 -> DEBU 17d5 0xc0027e8520 gate 1569284723658677800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17d6 0xc0027e8520 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17d7 0xc0027e8520 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17d8 0xc0027e8520 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [msp.identity] Verify -> DEBU 17d9 Verify: digest = 00000000 7b 27 9f 10 ca 64 de 30 f6 0d db 1f 0d b3 4a 47 |{'...d.0......JG| +peer0.org1.example.com | 00000010 07 63 97 6b 9b c7 0c 12 a2 ca ed f2 19 30 ff 5f |.c.k.........0._|" +peer0.org1.example.com | "2019-09-24 00:25:23.658 UTC [msp.identity] Verify -> DEBU 17da Verify: sig = 00000000 30 45 02 21 00 88 3a 1b cb a7 2e 74 82 6e 06 a2 |0E.!..:....t.n..| +peer0.org1.example.com | 00000010 e3 e8 99 b1 33 fb 5d ec 50 ab 94 6a a9 4a ab c0 |....3.].P..j.J..| +peer0.org1.example.com | 00000020 aa 0f c1 65 9b 02 20 61 a6 1e 47 f9 d2 47 0b ce |...e.. a..G..G..| +peer0.org1.example.com | 00000030 b8 bc 82 2d 78 20 52 72 79 87 83 a4 aa 9d 6e 8a |...-x Rry.....n.| +peer0.org1.example.com | 00000040 b9 7d 36 e1 cb 5f dd |.}6.._.|" +peer0.org1.example.com | "2019-09-24 00:25:23.659 UTC [cauthdsl] func2 -> DEBU 17db 0xc0027e8520 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:23.659 UTC [cauthdsl] func1 -> DEBU 17dc 0xc0027e8520 gate 1569284723658677800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:23.659 UTC [policies] Evaluate -> DEBU 17dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.659 UTC [policies] Evaluate -> DEBU 17de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.659 UTC [policies] Evaluate -> DEBU 17df Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.659 UTC [policies] Evaluate -> DEBU 17e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.659 UTC [gossip.discovery] handleAliveMessage -> DEBU 17e1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.659 UTC [gossip.discovery] handleAliveMessage -> DEBU 17e2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.659 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.959 UTC [gossip.gossip] handleMessage -> DEBU 17e4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.959 UTC [gossip.pull] HandleMessage -> DEBU 17e5 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17e9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.959 UTC [gossip.pull] SendDigest -> DEBU 17ec Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:23.959 UTC [gossip.gossip] handleMessage -> DEBU 17ed Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.971 UTC [gossip.gossip] handleMessage -> DEBU 17ee Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.971 UTC [gossip.gossip] handleMessage -> DEBU 17ef Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f0 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.971 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17f1 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:23.971 UTC [msp] DeserializeIdentity -> DEBU 17f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.971 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:23.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17f4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:23.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17f5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 17f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 17f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 17f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func1 -> DEBU 17f9 0xc002b74db0 gate 1569284723972131000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 17fa 0xc002b74db0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 17fb 0xc002b74db0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 17fc 0xc002b74db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 17fd 0xc002b74db0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func1 -> DEBU 17fe 0xc002b74db0 gate 1569284723972131000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 17ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 1800 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 1801 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func1 -> DEBU 1802 0xc002b755f0 gate 1569284723972464500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 1803 0xc002b755f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 1804 0xc002b755f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 1805 0xc002b755f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [msp.identity] Verify -> DEBU 1806 Verify: digest = 00000000 00 6e a2 29 2e 39 1e 44 52 20 63 59 17 c4 71 c9 |.n.).9.DR cY..q.| +peer0.org1.example.com | 00000010 e8 bf 8d 36 fb ff 7e 72 49 ca 50 c9 97 db 11 15 |...6..~rI.P.....|" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [msp.identity] Verify -> DEBU 1807 Verify: sig = 00000000 30 44 02 20 7b 70 f7 e3 6f 32 6b eb f2 60 7e 6f |0D. {p..o2k..`~o| +peer0.org1.example.com | 00000010 db 16 ba 96 98 27 6e 81 0e 7d 67 f3 2e 96 66 68 |.....'n..}g...fh| +peer0.org1.example.com | 00000020 f0 a1 5e 90 02 20 14 42 a0 7f 2c f8 b0 e0 5c 72 |..^.. .B..,...\r| +peer0.org1.example.com | 00000030 82 8e 82 b7 87 be 6e 31 75 77 c0 97 eb 3d d3 f4 |......n1uw...=..| +peer0.org1.example.com | 00000040 39 34 77 d4 48 74 |94w.Ht|" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 1808 0xc002b755f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [cauthdsl] func1 -> DEBU 1809 0xc002b755f0 gate 1569284723972464500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 180a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 180b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 180c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [policies] Evaluate -> DEBU 180d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [gossip.discovery] handleAliveMessage -> DEBU 180e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 180f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 1810 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 1811 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 1812 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 1813 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [gossip.discovery] handleAliveMessage -> DEBU 1814 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1815 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [gossip.discovery] sendMemResponse -> DEBU 1816 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [msp] DeserializeIdentity -> DEBU 1817 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.973 UTC [msp] DeserializeIdentity -> DEBU 1818 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.979 UTC [msp] DeserializeIdentity -> DEBU 1819 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:23.979 UTC [gossip.comm] Send -> DEBU 181a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:23.979 UTC [gossip.discovery] sendMemResponse -> DEBU 181b Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020!" signature:"0E\002!\000\235\315\026\177\344\351\022\204\037\001\350\255\010\351-]5,\0230S\344\362\246\326Sv\200\241\336\337\377\002 Y\207|i\205\353\354|k|V\232-\215\276\212\024\366\364\3210\004\270\034\003$\250\317(9i\022" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:23.980 UTC [gossip.comm] sendToEndpoint -> DEBU 181c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:23.980 UTC [gossip.comm] sendToEndpoint -> DEBU 181d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.189 UTC [msp] DeserializeIdentity -> DEBU 181e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.190 UTC [msp] DeserializeIdentity -> DEBU 181f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.190 UTC [gossip.comm] Send -> DEBU 1820 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1821 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1822 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1823 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1824 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1825 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1826 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [gossip.comm] func1 -> DEBU 1827 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [gossip.gossip] handleMessage -> DEBU 1828 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [msp] DeserializeIdentity -> DEBU 1829 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [msp] DeserializeIdentity -> DEBU 182a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [msp] DeserializeIdentity -> DEBU 182b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 182c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 182d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 182e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [policies] Evaluate -> DEBU 182f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [policies] Evaluate -> DEBU 1830 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [policies] Evaluate -> DEBU 1831 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [cauthdsl] func1 -> DEBU 1832 0xc0032a7130 gate 1569284724192928800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.192 UTC [cauthdsl] func2 -> DEBU 1833 0xc0032a7130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 1834 0xc0032a7130 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 1835 0xc0032a7130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 1836 0xc0032a7130 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [cauthdsl] func1 -> DEBU 1837 0xc0032a7130 gate 1569284724192928800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 1838 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 1839 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 183a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [cauthdsl] func1 -> DEBU 183b 0xc0032a7970 gate 1569284724193253100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 183c 0xc0032a7970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 183d 0xc0032a7970 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 183e 0xc0032a7970 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [msp.identity] Verify -> DEBU 183f Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [msp.identity] Verify -> DEBU 1840 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 1841 0xc0032a7970 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [cauthdsl] func1 -> DEBU 1842 0xc0032a7970 gate 1569284724193253100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 1843 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 1844 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 1845 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [policies] Evaluate -> DEBU 1846 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [msp.identity] Verify -> DEBU 1847 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [msp.identity] Verify -> DEBU 1848 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [msp] DeserializeIdentity -> DEBU 1849 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [msp] DeserializeIdentity -> DEBU 184a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 184b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 184c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 184d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [policies] Evaluate -> DEBU 184e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [policies] Evaluate -> DEBU 184f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [policies] Evaluate -> DEBU 1850 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [cauthdsl] func1 -> DEBU 1851 0xc003813860 gate 1569284724194827300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [cauthdsl] func2 -> DEBU 1852 0xc003813860 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [cauthdsl] func2 -> DEBU 1853 0xc003813860 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.194 UTC [cauthdsl] func2 -> DEBU 1854 0xc003813860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [cauthdsl] func2 -> DEBU 1855 0xc003813860 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [cauthdsl] func1 -> DEBU 1856 0xc003813860 gate 1569284724194827300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1857 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1858 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1859 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [cauthdsl] func1 -> DEBU 185a 0xc003a540a0 gate 1569284724195353500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [cauthdsl] func2 -> DEBU 185b 0xc003a540a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [cauthdsl] func2 -> DEBU 185c 0xc003a540a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [cauthdsl] func2 -> DEBU 185d 0xc003a540a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [msp.identity] Verify -> DEBU 185e Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [msp.identity] Verify -> DEBU 185f Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [cauthdsl] func2 -> DEBU 1860 0xc003a540a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [cauthdsl] func1 -> DEBU 1861 0xc003a540a0 gate 1569284724195353500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1862 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1863 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1864 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.196 UTC [policies] Evaluate -> DEBU 1865 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.197 UTC [msp.identity] Verify -> DEBU 1866 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:24.197 UTC [msp.identity] Verify -> DEBU 1867 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:24.198 UTC [gossip.gossip] handleMessage -> DEBU 1868 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.199 UTC [gossip.comm] func1 -> DEBU 1869 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.200 UTC [gossip.gossip] handleMessage -> DEBU 186a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.204 UTC [msp.identity] Verify -> DEBU 186b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:24.204 UTC [msp.identity] Verify -> DEBU 186c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:24.206 UTC [msp.identity] Verify -> DEBU 186d Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:24.206 UTC [msp.identity] Verify -> DEBU 186e Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:24.207 UTC [msp] DeserializeIdentity -> DEBU 186f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.207 UTC [msp] DeserializeIdentity -> DEBU 1870 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.207 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1871 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:24.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1872 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1873 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.207 UTC [policies] Evaluate -> DEBU 1874 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.207 UTC [policies] Evaluate -> DEBU 1875 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:24.208 UTC [policies] Evaluate -> DEBU 1876 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.208 UTC [cauthdsl] func1 -> DEBU 1877 0xc0033d3170 gate 1569284724208272400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.208 UTC [cauthdsl] func2 -> DEBU 1878 0xc0033d3170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.208 UTC [cauthdsl] func2 -> DEBU 1879 0xc0033d3170 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.208 UTC [cauthdsl] func2 -> DEBU 187a 0xc0033d3170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:24.208 UTC [cauthdsl] func2 -> DEBU 187b 0xc0033d3170 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.208 UTC [cauthdsl] func1 -> DEBU 187c 0xc0033d3170 gate 1569284724208272400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.209 UTC [policies] Evaluate -> DEBU 187d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.209 UTC [policies] Evaluate -> DEBU 187e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.209 UTC [policies] Evaluate -> DEBU 187f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.209 UTC [cauthdsl] func1 -> DEBU 1880 0xc0033d39b0 gate 1569284724209437600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.209 UTC [cauthdsl] func2 -> DEBU 1881 0xc0033d39b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.209 UTC [cauthdsl] func2 -> DEBU 1882 0xc0033d39b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.209 UTC [cauthdsl] func2 -> DEBU 1883 0xc0033d39b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.209 UTC [msp.identity] Verify -> DEBU 1884 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:24.209 UTC [msp.identity] Verify -> DEBU 1885 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:24.210 UTC [cauthdsl] func2 -> DEBU 1886 0xc0033d39b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.210 UTC [cauthdsl] func1 -> DEBU 1887 0xc0033d39b0 gate 1569284724209437600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:24.210 UTC [policies] Evaluate -> DEBU 1888 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.210 UTC [policies] Evaluate -> DEBU 1889 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.210 UTC [policies] Evaluate -> DEBU 188a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.210 UTC [policies] Evaluate -> DEBU 188b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.210 UTC [msp] DeserializeIdentity -> DEBU 188c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.211 UTC [msp] DeserializeIdentity -> DEBU 188d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 188e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 188f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1890 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 1891 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 1892 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 1893 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [cauthdsl] func1 -> DEBU 1894 0xc003685180 gate 1569284724213446300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 1895 0xc003685180 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 1896 0xc003685180 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 1897 0xc003685180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 1898 0xc003685180 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [cauthdsl] func1 -> DEBU 1899 0xc003685180 gate 1569284724213446300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 189a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 189b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 189c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [cauthdsl] func1 -> DEBU 189d 0xc0036859c0 gate 1569284724213901600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 189e 0xc0036859c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 189f 0xc0036859c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [cauthdsl] func2 -> DEBU 18a0 0xc0036859c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [msp.identity] Verify -> DEBU 18a1 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [msp.identity] Verify -> DEBU 18a2 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [cauthdsl] func2 -> DEBU 18a3 0xc0036859c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [cauthdsl] func1 -> DEBU 18a4 0xc0036859c0 gate 1569284724213901600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [policies] Evaluate -> DEBU 18a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [policies] Evaluate -> DEBU 18a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [policies] Evaluate -> DEBU 18a7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [policies] Evaluate -> DEBU 18a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [gossip.gossip] handleMessage -> DEBU 18a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [gossip.gossip] handleMessage -> DEBU 18aa Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [msp] DeserializeIdentity -> DEBU 18ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [msp] DeserializeIdentity -> DEBU 18ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.214 UTC [msp] DeserializeIdentity -> DEBU 18ad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18ae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18af Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18b0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [policies] Evaluate -> DEBU 18b1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [policies] Evaluate -> DEBU 18b2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [policies] Evaluate -> DEBU 18b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [cauthdsl] func1 -> DEBU 18b4 0xc0037194d0 gate 1569284724215641100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [cauthdsl] func2 -> DEBU 18b5 0xc0037194d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [cauthdsl] func2 -> DEBU 18b6 0xc0037194d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [cauthdsl] func2 -> DEBU 18b7 0xc0037194d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [cauthdsl] func2 -> DEBU 18b8 0xc0037194d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.215 UTC [cauthdsl] func1 -> DEBU 18b9 0xc0037194d0 gate 1569284724215641100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.216 UTC [policies] Evaluate -> DEBU 18ba Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.216 UTC [policies] Evaluate -> DEBU 18bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.216 UTC [policies] Evaluate -> DEBU 18bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [cauthdsl] func1 -> DEBU 18bd 0xc003719d10 gate 1569284724216820800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [cauthdsl] func2 -> DEBU 18be 0xc003719d10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [cauthdsl] func2 -> DEBU 18bf 0xc003719d10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [cauthdsl] func2 -> DEBU 18c0 0xc003719d10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [msp.identity] Verify -> DEBU 18c1 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [msp.identity] Verify -> DEBU 18c2 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [cauthdsl] func2 -> DEBU 18c3 0xc003719d10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [cauthdsl] func1 -> DEBU 18c4 0xc003719d10 gate 1569284724216820800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [policies] Evaluate -> DEBU 18c5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [policies] Evaluate -> DEBU 18c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [policies] Evaluate -> DEBU 18c7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.217 UTC [policies] Evaluate -> DEBU 18c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.218 UTC [msp.identity] Verify -> DEBU 18c9 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:24.218 UTC [msp.identity] Verify -> DEBU 18ca Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:24.223 UTC [msp.identity] Verify -> DEBU 18cb Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:24.223 UTC [msp.identity] Verify -> DEBU 18cc Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:24.223 UTC [msp] DeserializeIdentity -> DEBU 18cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.224 UTC [msp] DeserializeIdentity -> DEBU 18ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18cf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18d0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18d1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [policies] Evaluate -> DEBU 18d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [policies] Evaluate -> DEBU 18d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [policies] Evaluate -> DEBU 18d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [cauthdsl] func1 -> DEBU 18d5 0xc00273e320 gate 1569284724225668000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [cauthdsl] func2 -> DEBU 18d6 0xc00273e320 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [cauthdsl] func2 -> DEBU 18d7 0xc00273e320 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [cauthdsl] func2 -> DEBU 18d8 0xc00273e320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [cauthdsl] func2 -> DEBU 18d9 0xc00273e320 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.225 UTC [cauthdsl] func1 -> DEBU 18da 0xc00273e320 gate 1569284724225668000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.226 UTC [policies] Evaluate -> DEBU 18db Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.226 UTC [policies] Evaluate -> DEBU 18dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.226 UTC [policies] Evaluate -> DEBU 18dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.226 UTC [cauthdsl] func1 -> DEBU 18de 0xc00273eb60 gate 1569284724226177800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.226 UTC [cauthdsl] func2 -> DEBU 18df 0xc00273eb60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.226 UTC [cauthdsl] func2 -> DEBU 18e0 0xc00273eb60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.226 UTC [cauthdsl] func2 -> DEBU 18e1 0xc00273eb60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.226 UTC [msp.identity] Verify -> DEBU 18e2 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:24.226 UTC [msp.identity] Verify -> DEBU 18e3 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:24.226 UTC [cauthdsl] func2 -> DEBU 18e4 0xc00273eb60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.226 UTC [cauthdsl] func1 -> DEBU 18e5 0xc00273eb60 gate 1569284724226177800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:24.227 UTC [policies] Evaluate -> DEBU 18e6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.227 UTC [policies] Evaluate -> DEBU 18e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.227 UTC [policies] Evaluate -> DEBU 18e8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.227 UTC [policies] Evaluate -> DEBU 18e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.227 UTC [gossip.gossip] handleMessage -> DEBU 18ea Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.281 UTC [msp] DeserializeIdentity -> DEBU 18eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.281 UTC [msp] DeserializeIdentity -> DEBU 18ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.281 UTC [gossip.pull] Hello -> DEBU 18ed Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:24.281 UTC [msp] DeserializeIdentity -> DEBU 18ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.281 UTC [msp] DeserializeIdentity -> DEBU 18ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.281 UTC [gossip.comm] Send -> DEBU 18f0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:24.282 UTC [gossip.comm] sendToEndpoint -> DEBU 18f1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.282 UTC [gossip.comm] sendToEndpoint -> DEBU 18f2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.283 UTC [gossip.comm] func1 -> DEBU 18f3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.283 UTC [gossip.gossip] handleMessage -> DEBU 18f4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.284 UTC [gossip.pull] HandleMessage -> DEBU 18f5 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.284 UTC [gossip.gossip] handleMessage -> DEBU 18f6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.580 UTC [msp] GetDefaultSigningIdentity -> DEBU 18f7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:24.580 UTC [msp.identity] Sign -> DEBU 18f8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101E " +peer0.org1.example.com | "2019-09-24 00:25:24.580 UTC [msp.identity] Sign -> DEBU 18f9 Sign: digest: 3AF1E38AA5CC19501C0DDD113D0A5C86D2F79DD0B21AAE8DE1B60335488B7AED " +peer0.org1.example.com | "2019-09-24 00:25:24.581 UTC [msp] GetDefaultSigningIdentity -> DEBU 18fa Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:24.581 UTC [msp.identity] Sign -> DEBU 18fb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:24.581 UTC [msp.identity] Sign -> DEBU 18fc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:24.581 UTC [gossip.discovery] periodicalSendAlive -> DEBU 18fd Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:24.586 UTC [msp] DeserializeIdentity -> DEBU 18fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.586 UTC [msp] DeserializeIdentity -> DEBU 18ff Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.586 UTC [gossip.comm] Send -> DEBU 1900 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:24.586 UTC [msp] DeserializeIdentity -> DEBU 1901 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.586 UTC [gossip.comm] Send -> DEBU 1902 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:24.586 UTC [msp] DeserializeIdentity -> DEBU 1903 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.587 UTC [gossip.comm] Send -> DEBU 1904 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 1905 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 1906 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 1907 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 1908 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 1909 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 190a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.600 UTC [gossip.comm] func1 -> DEBU 190b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.600 UTC [gossip.gossip] handleMessage -> DEBU 190c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.600 UTC [gossip.gossip] handleMessage -> DEBU 190d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU 190e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.600 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 190f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:24.601 UTC [msp.identity] Verify -> DEBU 1910 Verify: digest = 00000000 3a f1 e3 8a a5 cc 19 50 1c 0d dd 11 3d 0a 5c 86 |:......P....=.\.| +peer0.org1.example.com | 00000010 d2 f7 9d d0 b2 1a ae 8d e1 b6 03 35 48 8b 7a ed |...........5H.z.|" +peer0.org1.example.com | "2019-09-24 00:25:24.601 UTC [msp.identity] Verify -> DEBU 1911 Verify: sig = 00000000 30 45 02 21 00 f8 2f 5a 05 c4 d7 85 97 ca df 0a |0E.!../Z........| +peer0.org1.example.com | 00000010 7c f7 74 cd 2b ea 67 56 72 c8 21 8d af 9d 92 40 ||.t.+.gVr.!....@| +peer0.org1.example.com | 00000020 b6 29 6d 97 98 02 20 1a 4b 00 de c9 b7 32 11 6e |.)m... .K....2.n| +peer0.org1.example.com | 00000030 f9 49 5b a5 ba d9 c9 32 7b ea e2 9c c4 50 7b 47 |.I[....2{....P{G| +peer0.org1.example.com | 00000040 72 49 71 37 76 9d 08 |rIq7v..|" +peer0.org1.example.com | "2019-09-24 00:25:24.601 UTC [gossip.discovery] isSentByMe -> DEBU 1912 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.601 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1913 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [gossip.comm] func1 -> DEBU 1914 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [gossip.gossip] handleMessage -> DEBU 1915 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [gossip.gossip] handleMessage -> DEBU 1916 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1917 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1918 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [msp] DeserializeIdentity -> DEBU 1919 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 191a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 191b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 191c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [policies] Evaluate -> DEBU 191d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [policies] Evaluate -> DEBU 191e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:24.649 UTC [policies] Evaluate -> DEBU 191f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func1 -> DEBU 1920 0xc003493360 gate 1569284724649989300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 1921 0xc003493360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 1922 0xc003493360 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 1923 0xc003493360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 1924 0xc003493360 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func1 -> DEBU 1925 0xc003493360 gate 1569284724649989300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [policies] Evaluate -> DEBU 1926 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [policies] Evaluate -> DEBU 1927 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [policies] Evaluate -> DEBU 1928 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func1 -> DEBU 1929 0xc003493ba0 gate 1569284724650393300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 192a 0xc003493ba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 192b 0xc003493ba0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 192c 0xc003493ba0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [msp.identity] Verify -> DEBU 192d Verify: digest = 00000000 22 6f b3 69 dd 7a c5 5a 7d cf a2 07 ee d6 ba 7e |"o.i.z.Z}......~| +peer0.org1.example.com | 00000010 d3 97 09 99 39 30 ab 2d e6 1c 59 0e a4 57 10 18 |....90.-..Y..W..|" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [msp.identity] Verify -> DEBU 192e Verify: sig = 00000000 30 44 02 20 37 57 d8 e5 1b 65 cb 50 7b 0d 77 35 |0D. 7W...e.P{.w5| +peer0.org1.example.com | 00000010 3a 49 26 21 84 f6 80 00 b5 fb b9 2e dc f8 b6 98 |:I&!............| +peer0.org1.example.com | 00000020 06 9e 42 a6 02 20 47 99 60 71 ec 7f 0e ba da 07 |..B.. G.`q......| +peer0.org1.example.com | 00000030 7a 4d c8 9a 04 80 e7 97 c9 9f 29 e2 5d 4c c9 90 |zM........).]L..| +peer0.org1.example.com | 00000040 ff c8 97 fb e3 c9 |......|" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 192f 0xc003493ba0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.650 UTC [cauthdsl] func1 -> DEBU 1930 0xc003493ba0 gate 1569284724650393300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:24.651 UTC [policies] Evaluate -> DEBU 1931 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.651 UTC [policies] Evaluate -> DEBU 1932 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.651 UTC [policies] Evaluate -> DEBU 1933 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.651 UTC [policies] Evaluate -> DEBU 1934 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.655 UTC [gossip.discovery] handleAliveMessage -> DEBU 1935 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.655 UTC [gossip.discovery] learnExistingMembers -> DEBU 1936 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:24.656 UTC [gossip.discovery] learnExistingMembers -> DEBU 1937 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:24.656 UTC [gossip.discovery] learnExistingMembers -> DEBU 1938 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:24.656 UTC [gossip.discovery] learnExistingMembers -> DEBU 1939 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:24.656 UTC [gossip.discovery] learnExistingMembers -> DEBU 193a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.657 UTC [gossip.discovery] handleAliveMessage -> DEBU 193b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.657 UTC [gossip.discovery] handleMsgFromComm -> DEBU 193c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.657 UTC [gossip.discovery] sendMemResponse -> DEBU 193d Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:24.657 UTC [msp] DeserializeIdentity -> DEBU 193e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.658 UTC [msp] DeserializeIdentity -> DEBU 193f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.659 UTC [msp] DeserializeIdentity -> DEBU 1940 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.659 UTC [gossip.comm] Send -> DEBU 1941 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:24.660 UTC [gossip.discovery] sendMemResponse -> DEBU 1942 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020!" signature:"0E\002!\000\235\315\026\177\344\351\022\204\037\001\350\255\010\351-]5,\0230S\344\362\246\326Sv\200\241\336\337\377\002 Y\207|i\205\353\354|k|V\232-\215\276\212\024\366\364\3210\004\270\034\003$\250\317(9i\022" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:24.660 UTC [gossip.comm] sendToEndpoint -> DEBU 1943 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.660 UTC [gossip.comm] sendToEndpoint -> DEBU 1944 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.667 UTC [gossip.comm] func1 -> DEBU 1945 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.667 UTC [gossip.gossip] handleMessage -> DEBU 1946 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.667 UTC [gossip.pull] HandleMessage -> DEBU 1947 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 1948 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 1949 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 194a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 194b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 194c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 194d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.667 UTC [gossip.pull] SendDigest -> DEBU 194e Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:24.667 UTC [gossip.gossip] handleMessage -> DEBU 194f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.700 UTC [gossip.comm] func1 -> DEBU 1950 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.706 UTC [gossip.gossip] handleMessage -> DEBU 1951 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.706 UTC [msp] DeserializeIdentity -> DEBU 1952 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.706 UTC [msp] DeserializeIdentity -> DEBU 1953 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.706 UTC [gossip.gossip] handleMessage -> DEBU 1954 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.715 UTC [gossip.comm] func1 -> DEBU 1955 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.715 UTC [gossip.gossip] handleMessage -> DEBU 1956 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.716 UTC [gossip.pull] HandleMessage -> DEBU 1957 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.716 UTC [gossip.pull] SendDigest -> DEBU 1958 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:24.716 UTC [gossip.gossip] handleMessage -> DEBU 1959 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.995 UTC [gossip.gossip] handleMessage -> DEBU 195a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.995 UTC [gossip.gossip] handleMessage -> DEBU 195b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.995 UTC [gossip.discovery] handleMsgFromComm -> DEBU 195c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 195d Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:24.996 UTC [msp] DeserializeIdentity -> DEBU 195e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 195f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1960 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1961 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [policies] Evaluate -> DEBU 1962 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [policies] Evaluate -> DEBU 1963 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [policies] Evaluate -> DEBU 1964 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [cauthdsl] func1 -> DEBU 1965 0xc002ae2640 gate 1569284724997281200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [cauthdsl] func2 -> DEBU 1966 0xc002ae2640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [cauthdsl] func2 -> DEBU 1967 0xc002ae2640 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [cauthdsl] func2 -> DEBU 1968 0xc002ae2640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [cauthdsl] func2 -> DEBU 1969 0xc002ae2640 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [cauthdsl] func1 -> DEBU 196a 0xc002ae2640 gate 1569284724997281200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [policies] Evaluate -> DEBU 196b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.997 UTC [policies] Evaluate -> DEBU 196c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [policies] Evaluate -> DEBU 196d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [cauthdsl] func1 -> DEBU 196e 0xc002ae2e80 gate 1569284724998066000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [cauthdsl] func2 -> DEBU 196f 0xc002ae2e80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [cauthdsl] func2 -> DEBU 1970 0xc002ae2e80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [cauthdsl] func2 -> DEBU 1971 0xc002ae2e80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [msp.identity] Verify -> DEBU 1972 Verify: digest = 00000000 9d 35 63 66 65 e1 97 71 15 56 f2 b9 97 f6 47 53 |.5cfe..q.V....GS| +peer0.org1.example.com | 00000010 eb b6 52 d4 fa 08 a9 2a de a3 80 df 99 70 ad 6b |..R....*.....p.k|" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [msp.identity] Verify -> DEBU 1973 Verify: sig = 00000000 30 44 02 20 28 94 79 bc fd 49 dc b3 bc 94 b7 aa |0D. (.y..I......| +peer0.org1.example.com | 00000010 d6 e5 cf 89 64 b3 bd 38 4f 87 ca 82 57 1a 5c b5 |....d..8O...W.\.| +peer0.org1.example.com | 00000020 1d 4b 4a 2d 02 20 78 4d 97 2e c9 d6 85 a5 6d c8 |.KJ-. xM......m.| +peer0.org1.example.com | 00000030 bf 52 0c 4e 1e 9a 2b 92 fc 8a 70 ea e3 5a 91 31 |.R.N..+...p..Z.1| +peer0.org1.example.com | 00000040 d6 ee 79 13 a5 8d |..y...|" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [cauthdsl] func2 -> DEBU 1974 0xc002ae2e80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [cauthdsl] func1 -> DEBU 1975 0xc002ae2e80 gate 1569284724998066000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [policies] Evaluate -> DEBU 1976 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [policies] Evaluate -> DEBU 1977 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [policies] Evaluate -> DEBU 1978 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [policies] Evaluate -> DEBU 1979 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:24.998 UTC [gossip.discovery] handleAliveMessage -> DEBU 197a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:24.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 197b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:24.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 197c updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:24.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 197d Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:24.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 197e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:24.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 197f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.999 UTC [gossip.discovery] handleAliveMessage -> DEBU 1980 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:24.999 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1981 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.007 UTC [gossip.comm] func1 -> DEBU 1982 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.007 UTC [gossip.gossip] handleMessage -> DEBU 1983 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.007 UTC [gossip.gossip] handleMessage -> DEBU 1984 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1985 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1986 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.009 UTC [gossip.comm] func1 -> DEBU 1987 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.009 UTC [gossip.gossip] handleMessage -> DEBU 1988 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.009 UTC [gossip.gossip] handleMessage -> DEBU 1989 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 198a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 198b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 198c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 198d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 198e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 198f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 1990 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 1991 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.010 UTC [msp] DeserializeIdentity -> DEBU 1992 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.010 UTC [gossip.comm] Send -> DEBU 1993 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:25.010 UTC [msp] DeserializeIdentity -> DEBU 1994 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.010 UTC [gossip.comm] Send -> DEBU 1995 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:25.010 UTC [gossip.comm] sendToEndpoint -> DEBU 1996 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.010 UTC [gossip.comm] sendToEndpoint -> DEBU 1997 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.010 UTC [gossip.comm] sendToEndpoint -> DEBU 1998 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.011 UTC [gossip.comm] sendToEndpoint -> DEBU 1999 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.177 UTC [gossip.gossip] handleMessage -> DEBU 199a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.177 UTC [msp] DeserializeIdentity -> DEBU 199b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.177 UTC [msp] DeserializeIdentity -> DEBU 199c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.177 UTC [msp] DeserializeIdentity -> DEBU 199d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.177 UTC [gossip.gossip] handleMessage -> DEBU 199e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.635 UTC [gossip.comm] func1 -> DEBU 199f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.635 UTC [gossip.gossip] handleMessage -> DEBU 19a0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.635 UTC [gossip.gossip] handleMessage -> DEBU 19a1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19a2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19a3 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [msp] DeserializeIdentity -> DEBU 19a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19a5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [cauthdsl] func1 -> DEBU 19ab 0xc003e98a70 gate 1569284725636564900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [cauthdsl] func2 -> DEBU 19ac 0xc003e98a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [cauthdsl] func2 -> DEBU 19ad 0xc003e98a70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [cauthdsl] func2 -> DEBU 19ae 0xc003e98a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [cauthdsl] func2 -> DEBU 19af 0xc003e98a70 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [cauthdsl] func1 -> DEBU 19b0 0xc003e98a70 gate 1569284725636564900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [cauthdsl] func1 -> DEBU 19b4 0xc003e992b0 gate 1569284725636940100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:25.636 UTC [cauthdsl] func2 -> DEBU 19b5 0xc003e992b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:25.637 UTC [cauthdsl] func2 -> DEBU 19b6 0xc003e992b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:25.637 UTC [cauthdsl] func2 -> DEBU 19b7 0xc003e992b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:25.637 UTC [msp.identity] Verify -> DEBU 19b8 Verify: digest = 00000000 d0 65 75 c7 36 ed d7 8e 8a fb 36 15 c6 fb b4 f8 |.eu.6.....6.....| +peer0.org1.example.com | 00000010 45 78 81 db 93 57 45 db 3f ca 29 50 b1 a3 cd 52 |Ex...WE.?.)P...R|" +peer0.org1.example.com | "2019-09-24 00:25:25.637 UTC [msp.identity] Verify -> DEBU 19b9 Verify: sig = 00000000 30 45 02 21 00 f9 57 71 92 0c 62 c1 ab ab 61 58 |0E.!..Wq..b...aX| +peer0.org1.example.com | 00000010 de 71 19 80 92 d9 73 77 73 3c df f5 0e df ca db |.q....sws<......| +peer0.org1.example.com | 00000020 97 38 d9 6e 79 02 20 22 b1 96 e4 21 12 88 15 3f |.8.ny. "...!...?| +peer0.org1.example.com | 00000030 c9 dd f2 8d 2d a1 1a 05 ad 18 22 a5 bf 0e 42 7e |....-....."...B~| +peer0.org1.example.com | 00000040 34 f9 f0 40 9f bb e9 |4..@...|" +peer0.org1.example.com | "2019-09-24 00:25:25.637 UTC [cauthdsl] func2 -> DEBU 19ba 0xc003e992b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:25.637 UTC [cauthdsl] func1 -> DEBU 19bb 0xc003e992b0 gate 1569284725636940100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:25.637 UTC [policies] Evaluate -> DEBU 19bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:25.637 UTC [policies] Evaluate -> DEBU 19bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:25.637 UTC [policies] Evaluate -> DEBU 19be Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:25.646 UTC [gossip.comm] func1 -> DEBU 19bf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.646 UTC [gossip.gossip] handleMessage -> DEBU 19c0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.637 UTC [policies] Evaluate -> DEBU 19c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:25.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:25.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c4 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:25.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c5 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:25.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:25.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19c9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.648 UTC [gossip.gossip] handleMessage -> DEBU 19ca Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.648 UTC [gossip.gossip] handleMessage -> DEBU 19cb Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19cc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19cd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19ce Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19d0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.649 UTC [gossip.gossip] handleMessage -> DEBU 19cf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.649 UTC [gossip.comm] Send -> DEBU 19d7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:25.650 UTC [msp] DeserializeIdentity -> DEBU 19d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.650 UTC [gossip.comm] sendToEndpoint -> DEBU 19d9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.650 UTC [gossip.comm] sendToEndpoint -> DEBU 19da Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.653 UTC [msp] DeserializeIdentity -> DEBU 19db Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.653 UTC [gossip.comm] Send -> DEBU 19dc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:25.653 UTC [gossip.comm] sendToEndpoint -> DEBU 19dd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.653 UTC [gossip.comm] sendToEndpoint -> DEBU 19de Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.675 UTC [gossip.comm] func1 -> DEBU 19df Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.675 UTC [gossip.gossip] handleMessage -> DEBU 19e0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.675 UTC [gossip.pull] HandleMessage -> DEBU 19e1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.675 UTC [gossip.pull] SendDigest -> DEBU 19e2 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:25.675 UTC [gossip.gossip] handleMessage -> DEBU 19e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.694 UTC [gossip.comm] func1 -> DEBU 19e4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\"" signature:"0E\002!\000\247o_`m\035\313\306\370\275\177\377\347\253\rRT3\257\002^\207d\250\313C\212\255\024\t]\355\002 f\351\204\026\272S\001\326\010\242\237\266\275\353\332\211\022_\244\270\331`1\2543.h\215I\211\3162" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.694 UTC [gossip.gossip] handleMessage -> DEBU 19e5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\"" signature:"0E\002!\000\247o_`m\035\313\306\370\275\177\377\347\253\rRT3\257\002^\207d\250\313C\212\255\024\t]\355\002 f\351\204\026\272S\001\326\010\242\237\266\275\353\332\211\022_\244\270\331`1\2543.h\215I\211\3162" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.694 UTC [gossip.gossip] handleMessage -> DEBU 19e6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19e7 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\"" signature:"0E\002!\000\247o_`m\035\313\306\370\275\177\377\347\253\rRT3\257\002^\207d\250\313C\212\255\024\t]\355\002 f\351\204\026\272S\001\326\010\242\237\266\275\353\332\211\022_\244\270\331`1\2543.h\215I\211\3162" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.694 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19e8 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:25.694 UTC [msp.identity] Verify -> DEBU 19e9 Verify: digest = 00000000 fc 07 cf 64 94 59 32 d5 ee 4c 18 6f 20 cb 21 2f |...d.Y2..L.o .!/| +peer0.org1.example.com | 00000010 39 ed 3e 0a 94 7e 6b 5e 5e c6 7e 0b 66 02 68 5d |9.>..~k^^.~.f.h]|" +peer0.org1.example.com | "2019-09-24 00:25:25.694 UTC [msp.identity] Verify -> DEBU 19ea Verify: sig = 00000000 30 45 02 21 00 a7 6f 5f 60 6d 1d cb c6 f8 bd 7f |0E.!..o_`m......| +peer0.org1.example.com | 00000010 ff e7 ab 0d 52 54 33 af 02 5e 87 64 a8 cb 43 8a |....RT3..^.d..C.| +peer0.org1.example.com | 00000020 ad 14 09 5d ed 02 20 66 e9 84 16 ba 53 01 d6 08 |...].. f....S...| +peer0.org1.example.com | 00000030 a2 9f b6 bd eb da 89 12 5f a4 b8 d9 60 31 ac 33 |........_...`1.3| +peer0.org1.example.com | 00000040 2e 68 8d 49 89 ce 32 |.h.I..2|" +peer0.org1.example.com | "2019-09-24 00:25:25.695 UTC [msp.identity] Verify -> DEBU 19eb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:25.695 UTC [msp.identity] Verify -> DEBU 19ec Verify: sig = 00000000 30 44 02 20 66 b3 3f 24 47 1c f7 23 7a 5a d6 51 |0D. f.?$G..#zZ.Q| +peer0.org1.example.com | 00000010 93 80 96 14 f7 fb 57 14 d2 8f 05 7f 92 65 44 72 |......W......eDr| +peer0.org1.example.com | 00000020 df 0e 36 4d 02 20 5c 2c c7 fc 1c 36 29 3a 74 b2 |..6M. \,...6):t.| +peer0.org1.example.com | 00000030 f4 bb ee 9a f2 26 9f ad 1e dc 2b 09 0a 71 39 74 |.....&....+..q9t| +peer0.org1.example.com | 00000040 9f ed 65 68 31 55 |..eh1U|" +peer0.org1.example.com | "2019-09-24 00:25:25.695 UTC [gossip.discovery] handleAliveMessage -> DEBU 19ed Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ee Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:25.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ef updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:25.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 19f0 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:25.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 19f1 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:25.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 19f2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.695 UTC [gossip.discovery] handleAliveMessage -> DEBU 19f3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.695 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19f4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:25.696 UTC [gossip.discovery] sendMemResponse -> DEBU 19f5 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:25.696 UTC [msp] DeserializeIdentity -> DEBU 19f6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.696 UTC [msp] DeserializeIdentity -> DEBU 19f7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:25.696 UTC [gossip.comm] Send -> DEBU 19f8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:25.696 UTC [gossip.discovery] sendMemResponse -> DEBU 19f9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\"" signature:"0E\002!\000\247o_`m\035\313\306\370\275\177\377\347\253\rRT3\257\002^\207d\250\313C\212\255\024\t]\355\002 f\351\204\026\272S\001\326\010\242\237\266\275\353\332\211\022_\244\270\331`1\2543.h\215I\211\3162" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:25:25.696 UTC [gossip.comm] sendToEndpoint -> DEBU 19fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:25.696 UTC [gossip.comm] sendToEndpoint -> DEBU 19fb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:26.112 UTC [gossip.comm] func1 -> DEBU 19fc Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:26.112 UTC [gossip.gossip] handleMessage -> DEBU 19fd Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:26.112 UTC [msp] DeserializeIdentity -> DEBU 19fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:26.112 UTC [msp] DeserializeIdentity -> DEBU 19ff Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:26.112 UTC [msp] DeserializeIdentity -> DEBU 1a00 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:26.112 UTC [gossip.gossip] handleMessage -> DEBU 1a01 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.277 UTC [gossip.election] waitForInterrupt -> DEBU 1a02 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.277 UTC [gossip.election] IsLeader -> DEBU 1a03 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:25:27.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a04 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:27.277 UTC [msp.identity] Sign -> DEBU 1a05 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510071801 " +peer0.org1.example.com | "2019-09-24 00:25:27.277 UTC [msp.identity] Sign -> DEBU 1a06 Sign: digest: 0DCA41B51AD6E8639BBBADD5223D5C0221337E8B3A8EE737D5AA7EE8B52EB240 " +peer0.org1.example.com | "2019-09-24 00:25:27.278 UTC [gossip.election] waitForInterrupt -> DEBU 1a07 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a08 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a09 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a0a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.279 UTC [gossip.comm] Send -> DEBU 1a0c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a0d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a0e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.279 UTC [gossip.comm] sendToEndpoint -> DEBU 1a0f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.279 UTC [gossip.comm] sendToEndpoint -> DEBU 1a10 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.604 UTC [gossip.pull] Hello -> DEBU 1a11 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:27.604 UTC [gossip.comm] Send -> DEBU 1a12 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:27.604 UTC [gossip.pull] Hello -> DEBU 1a13 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:27.605 UTC [gossip.comm] Send -> DEBU 1a14 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:27.605 UTC [gossip.pull] Hello -> DEBU 1a15 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:27.605 UTC [gossip.comm] Send -> DEBU 1a16 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:27.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1a17 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1a19 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1a18 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.606 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.606 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.610 UTC [gossip.comm] func1 -> DEBU 1a1d Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.610 UTC [gossip.gossip] handleMessage -> DEBU 1a1e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.610 UTC [gossip.pull] HandleMessage -> DEBU 1a1f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.610 UTC [gossip.gossip] handleMessage -> DEBU 1a20 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.610 UTC [gossip.gossip] handleMessage -> DEBU 1a21 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.611 UTC [gossip.pull] HandleMessage -> DEBU 1a22 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.614 UTC [gossip.comm] func1 -> DEBU 1a23 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.614 UTC [gossip.gossip] handleMessage -> DEBU 1a24 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.614 UTC [gossip.gossip] handleMessage -> DEBU 1a25 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.614 UTC [gossip.pull] HandleMessage -> DEBU 1a26 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.614 UTC [gossip.gossip] handleMessage -> DEBU 1a27 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.626 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a28 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:27.626 UTC [msp.identity] Sign -> DEBU 1a29 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101F " +peer0.org1.example.com | "2019-09-24 00:25:27.626 UTC [msp.identity] Sign -> DEBU 1a2a Sign: digest: EC1C60448E796F3DDF1529F66D9191880E5AD1183CFE5E0C752081A1CF35B6F4 " +peer0.org1.example.com | "2019-09-24 00:25:27.626 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a2b Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:27.626 UTC [msp.identity] Sign -> DEBU 1a2c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:27.626 UTC [msp.identity] Sign -> DEBU 1a2d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:27.627 UTC [gossip.comm] Send -> DEBU 1a2e Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:27.627 UTC [msp] DeserializeIdentity -> DEBU 1a2f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.627 UTC [gossip.comm] Send -> DEBU 1a30 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:27.627 UTC [msp] DeserializeIdentity -> DEBU 1a31 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.627 UTC [gossip.comm] Send -> DEBU 1a32 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:27.627 UTC [gossip.comm] sendToEndpoint -> DEBU 1a33 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.627 UTC [gossip.comm] sendToEndpoint -> DEBU 1a34 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.627 UTC [gossip.comm] sendToEndpoint -> DEBU 1a35 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.628 UTC [gossip.comm] sendToEndpoint -> DEBU 1a36 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.631 UTC [gossip.comm] sendToEndpoint -> DEBU 1a37 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.631 UTC [gossip.comm] sendToEndpoint -> DEBU 1a38 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.635 UTC [gossip.gossip] handleMessage -> DEBU 1a39 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.635 UTC [gossip.gossip] handleMessage -> DEBU 1a3a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a3b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a3c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:27.636 UTC [msp.identity] Verify -> DEBU 1a3d Verify: digest = 00000000 ec 1c 60 44 8e 79 6f 3d df 15 29 f6 6d 91 91 88 |..`D.yo=..).m...| +peer0.org1.example.com | 00000010 0e 5a d1 18 3c fe 5e 0c 75 20 81 a1 cf 35 b6 f4 |.Z..<.^.u ...5..|" +peer0.org1.example.com | "2019-09-24 00:25:27.636 UTC [msp.identity] Verify -> DEBU 1a3e Verify: sig = 00000000 30 44 02 20 54 9a 74 29 f4 09 fd b9 56 98 f5 d4 |0D. T.t)....V...| +peer0.org1.example.com | 00000010 1b cc 74 ee 4c 7c 5c 91 26 4e 61 0e 4d 31 7f 10 |..t.L|\.&Na.M1..| +peer0.org1.example.com | 00000020 d7 0f fc 7c 02 20 1c 51 d1 44 ab 47 65 24 0b 54 |...|. .Q.D.Ge$.T| +peer0.org1.example.com | 00000030 2f 5a 64 f2 90 e0 d0 27 97 e2 f0 05 57 ba 1a a4 |/Zd....'....W...| +peer0.org1.example.com | 00000040 39 05 b4 e5 63 d7 |9...c.|" +peer0.org1.example.com | "2019-09-24 00:25:27.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a3f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.637 UTC [gossip.discovery] isSentByMe -> DEBU 1a40 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a41 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.637 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a42 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:27.643 UTC [gossip.comm] func1 -> DEBU 1a43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.644 UTC [gossip.gossip] handleMessage -> DEBU 1a44 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.645 UTC [msp.identity] Verify -> DEBU 1a45 Verify: digest = 00000000 fc 07 cf 64 94 59 32 d5 ee 4c 18 6f 20 cb 21 2f |...d.Y2..L.o .!/| +peer0.org1.example.com | 00000010 39 ed 3e 0a 94 7e 6b 5e 5e c6 7e 0b 66 02 68 5d |9.>..~k^^.~.f.h]|" +peer0.org1.example.com | "2019-09-24 00:25:27.645 UTC [msp.identity] Verify -> DEBU 1a46 Verify: sig = 00000000 30 45 02 21 00 a7 6f 5f 60 6d 1d cb c6 f8 bd 7f |0E.!..o_`m......| +peer0.org1.example.com | 00000010 ff e7 ab 0d 52 54 33 af 02 5e 87 64 a8 cb 43 8a |....RT3..^.d..C.| +peer0.org1.example.com | 00000020 ad 14 09 5d ed 02 20 66 e9 84 16 ba 53 01 d6 08 |...].. f....S...| +peer0.org1.example.com | 00000030 a2 9f b6 bd eb da 89 12 5f a4 b8 d9 60 31 ac 33 |........_...`1.3| +peer0.org1.example.com | 00000040 2e 68 8d 49 89 ce 32 |.h.I..2|" +peer0.org1.example.com | "2019-09-24 00:25:27.644 UTC [gossip.comm] func1 -> DEBU 1a47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.645 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a48 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.645 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a49 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.645 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a4a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.645 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.646 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a4c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:27.646 UTC [gossip.gossip] handleMessage -> DEBU 1a4d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.646 UTC [gossip.gossip] handleMessage -> DEBU 1a4e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.646 UTC [msp.identity] Verify -> DEBU 1a4f Verify: digest = 00000000 ec 1c 60 44 8e 79 6f 3d df 15 29 f6 6d 91 91 88 |..`D.yo=..).m...| +peer0.org1.example.com | 00000010 0e 5a d1 18 3c fe 5e 0c 75 20 81 a1 cf 35 b6 f4 |.Z..<.^.u ...5..|" +peer0.org1.example.com | "2019-09-24 00:25:27.646 UTC [msp.identity] Verify -> DEBU 1a50 Verify: sig = 00000000 30 44 02 20 54 9a 74 29 f4 09 fd b9 56 98 f5 d4 |0D. T.t)....V...| +peer0.org1.example.com | 00000010 1b cc 74 ee 4c 7c 5c 91 26 4e 61 0e 4d 31 7f 10 |..t.L|\.&Na.M1..| +peer0.org1.example.com | 00000020 d7 0f fc 7c 02 20 1c 51 d1 44 ab 47 65 24 0b 54 |...|. .Q.D.Ge$.T| +peer0.org1.example.com | 00000030 2f 5a 64 f2 90 e0 d0 27 97 e2 f0 05 57 ba 1a a4 |/Zd....'....W...| +peer0.org1.example.com | 00000040 39 05 b4 e5 63 d7 |9...c.|" +peer0.org1.example.com | "2019-09-24 00:25:27.647 UTC [msp.identity] Verify -> DEBU 1a51 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:27.647 UTC [msp.identity] Verify -> DEBU 1a52 Verify: sig = 00000000 30 45 02 21 00 86 3f 82 b8 ff 1c 8a e0 c1 97 7c |0E.!..?........|| +peer0.org1.example.com | 00000010 28 c2 65 c6 bf ac a1 a5 81 a3 f9 11 c0 e4 59 b9 |(.e...........Y.| +peer0.org1.example.com | 00000020 af 42 bf 2b b7 02 20 46 b8 0b 8a 00 09 82 57 a0 |.B.+.. F......W.| +peer0.org1.example.com | 00000030 18 10 e1 b2 fd aa f3 19 3b 59 e3 fd 07 90 3c fb |........;Y....<.| +peer0.org1.example.com | 00000040 03 bf 40 08 e9 e0 1a |..@....|" +peer0.org1.example.com | "2019-09-24 00:25:27.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a53 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.647 UTC [gossip.discovery] isSentByMe -> DEBU 1a54 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a55 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a56 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a57 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.647 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a58 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:27.647 UTC [gossip.gossip] handleMessage -> DEBU 1a59 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.647 UTC [msp.identity] Verify -> DEBU 1a5a Verify: digest = 00000000 ec 1c 60 44 8e 79 6f 3d df 15 29 f6 6d 91 91 88 |..`D.yo=..).m...| +peer0.org1.example.com | 00000010 0e 5a d1 18 3c fe 5e 0c 75 20 81 a1 cf 35 b6 f4 |.Z..<.^.u ...5..|" +peer0.org1.example.com | "2019-09-24 00:25:27.648 UTC [msp.identity] Verify -> DEBU 1a5b Verify: sig = 00000000 30 44 02 20 54 9a 74 29 f4 09 fd b9 56 98 f5 d4 |0D. T.t)....V...| +peer0.org1.example.com | 00000010 1b cc 74 ee 4c 7c 5c 91 26 4e 61 0e 4d 31 7f 10 |..t.L|\.&Na.M1..| +peer0.org1.example.com | 00000020 d7 0f fc 7c 02 20 1c 51 d1 44 ab 47 65 24 0b 54 |...|. .Q.D.Ge$.T| +peer0.org1.example.com | 00000030 2f 5a 64 f2 90 e0 d0 27 97 e2 f0 05 57 ba 1a a4 |/Zd....'....W...| +peer0.org1.example.com | 00000040 39 05 b4 e5 63 d7 |9...c.|" +peer0.org1.example.com | "2019-09-24 00:25:27.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a5c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.648 UTC [gossip.discovery] isSentByMe -> DEBU 1a5d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a5e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.648 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a5f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:27.648 UTC [msp.identity] Verify -> DEBU 1a60 Verify: digest = 00000000 fc 07 cf 64 94 59 32 d5 ee 4c 18 6f 20 cb 21 2f |...d.Y2..L.o .!/| +peer0.org1.example.com | 00000010 39 ed 3e 0a 94 7e 6b 5e 5e c6 7e 0b 66 02 68 5d |9.>..~k^^.~.f.h]|" +peer0.org1.example.com | "2019-09-24 00:25:27.648 UTC [msp.identity] Verify -> DEBU 1a61 Verify: sig = 00000000 30 45 02 21 00 a7 6f 5f 60 6d 1d cb c6 f8 bd 7f |0E.!..o_`m......| +peer0.org1.example.com | 00000010 ff e7 ab 0d 52 54 33 af 02 5e 87 64 a8 cb 43 8a |....RT3..^.d..C.| +peer0.org1.example.com | 00000020 ad 14 09 5d ed 02 20 66 e9 84 16 ba 53 01 d6 08 |...].. f....S...| +peer0.org1.example.com | 00000030 a2 9f b6 bd eb da 89 12 5f a4 b8 d9 60 31 ac 33 |........_...`1.3| +peer0.org1.example.com | 00000040 2e 68 8d 49 89 ce 32 |.h.I..2|" +peer0.org1.example.com | "2019-09-24 00:25:27.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a62 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a63 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a64 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.699 UTC [gossip.comm] func1 -> DEBU 1a65 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.699 UTC [gossip.gossip] handleMessage -> DEBU 1a66 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.699 UTC [gossip.gossip] handleMessage -> DEBU 1a67 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.699 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a68 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.699 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a69 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:27.700 UTC [msp.identity] Verify -> DEBU 1a6a Verify: digest = 00000000 c5 5c c2 17 e7 67 d2 39 e1 82 b8 ef f4 cc d1 00 |.\...g.9........| +peer0.org1.example.com | 00000010 c5 6b 44 d1 5b 0a 52 05 5d 02 31 e2 f5 01 20 ac |.kD.[.R.].1... .|" +peer0.org1.example.com | "2019-09-24 00:25:27.700 UTC [msp.identity] Verify -> DEBU 1a6b Verify: sig = 00000000 30 44 02 20 6f b6 1a 60 71 12 96 1d 19 ee bb 13 |0D. o..`q.......| +peer0.org1.example.com | 00000010 7c d5 d7 e6 6d 87 3e f1 37 e9 64 e9 62 dd c5 fc ||...m.>.7.d.b...| +peer0.org1.example.com | 00000020 69 ac 85 78 02 20 32 bf 01 04 39 4e 1e c6 a3 15 |i..x. 2...9N....| +peer0.org1.example.com | 00000030 9d 2f 3d e6 85 27 c2 0b 87 86 d9 d5 ab be dd d5 |./=..'..........| +peer0.org1.example.com | 00000040 78 04 4c 4e e5 26 |x.LN.&|" +peer0.org1.example.com | "2019-09-24 00:25:27.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a6c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a6d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:27.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a6e updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:27.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a6f Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:27.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a70 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:27.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a71 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a72 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a73 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [gossip.gossip] handleMessage -> DEBU 1a74 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [msp] DeserializeIdentity -> DEBU 1a75 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [gossip.gossip] handleMessage -> DEBU 1a76 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [msp] DeserializeIdentity -> DEBU 1a77 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a78 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [msp] DeserializeIdentity -> DEBU 1a79 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a7a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [gossip.comm] Send -> DEBU 1a7b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [msp] DeserializeIdentity -> DEBU 1a7c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [gossip.comm] Send -> DEBU 1a7d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [gossip.comm] sendToEndpoint -> DEBU 1a7e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.711 UTC [gossip.comm] sendToEndpoint -> DEBU 1a7f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.712 UTC [gossip.comm] sendToEndpoint -> DEBU 1a80 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.712 UTC [gossip.comm] sendToEndpoint -> DEBU 1a81 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.714 UTC [gossip.comm] func1 -> DEBU 1a82 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.714 UTC [gossip.gossip] handleMessage -> DEBU 1a83 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.714 UTC [gossip.gossip] handleMessage -> DEBU 1a84 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.714 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a85 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.714 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a86 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.959 UTC [gossip.gossip] handleMessage -> DEBU 1a87 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.959 UTC [gossip.pull] HandleMessage -> DEBU 1a88 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a89 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a8a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a8b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a8c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a8d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a8e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.960 UTC [gossip.pull] SendDigest -> DEBU 1a8f Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:27.960 UTC [gossip.gossip] handleMessage -> DEBU 1a90 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.971 UTC [gossip.gossip] handleMessage -> DEBU 1a91 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.971 UTC [gossip.gossip] handleMessage -> DEBU 1a92 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a93 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.971 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a94 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:27.971 UTC [msp] DeserializeIdentity -> DEBU 1a95 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.971 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:27.972 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a97 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:27.972 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a98 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:27.972 UTC [policies] Evaluate -> DEBU 1a99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:27.972 UTC [policies] Evaluate -> DEBU 1a9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:27.972 UTC [policies] Evaluate -> DEBU 1a9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:27.972 UTC [cauthdsl] func1 -> DEBU 1a9c 0xc0036b52d0 gate 1569284727972446800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:27.972 UTC [cauthdsl] func2 -> DEBU 1a9d 0xc0036b52d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:27.973 UTC [cauthdsl] func2 -> DEBU 1a9e 0xc0036b52d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:27.973 UTC [cauthdsl] func2 -> DEBU 1a9f 0xc0036b52d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:27.973 UTC [cauthdsl] func2 -> DEBU 1aa0 0xc0036b52d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:27.973 UTC [cauthdsl] func1 -> DEBU 1aa1 0xc0036b52d0 gate 1569284727972446800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:27.973 UTC [policies] Evaluate -> DEBU 1aa2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:27.973 UTC [policies] Evaluate -> DEBU 1aa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:27.973 UTC [policies] Evaluate -> DEBU 1aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:27.973 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc0036b5b10 gate 1569284727973715200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:27.973 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc0036b5b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:27.973 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc0036b5b10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:27.974 UTC [cauthdsl] func2 -> DEBU 1aa8 0xc0036b5b10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:27.988 UTC [msp.identity] Verify -> DEBU 1aa9 Verify: digest = 00000000 2c ad ca 91 5c 5a 73 83 c0 f9 2f 31 fd 2b 09 6e |,...\Zs.../1.+.n| +peer0.org1.example.com | 00000010 7b 91 ff d4 cf 66 d4 5d a2 dd 2d cb 8f 58 2d 31 |{....f.]..-..X-1|" +peer0.org1.example.com | "2019-09-24 00:25:27.988 UTC [msp.identity] Verify -> DEBU 1aaa Verify: sig = 00000000 30 45 02 21 00 d8 fb 12 1d be fa a6 8d a3 2d 13 |0E.!..........-.| +peer0.org1.example.com | 00000010 5f e6 34 4e 66 86 7f 6d 33 36 b4 15 eb 73 84 50 |_.4Nf..m36...s.P| +peer0.org1.example.com | 00000020 c5 d4 28 3c 96 02 20 01 13 cb b4 c3 ad 2c a4 6a |..(<.. ......,.j| +peer0.org1.example.com | 00000030 9b ef ea 75 ca 26 cf 89 de c9 5f ee 01 13 b7 d7 |...u.&...._.....| +peer0.org1.example.com | 00000040 af 41 cd ea 6c 14 0b |.A..l..|" +peer0.org1.example.com | "2019-09-24 00:25:27.988 UTC [cauthdsl] func2 -> DEBU 1aab 0xc0036b5b10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:27.988 UTC [cauthdsl] func1 -> DEBU 1aac 0xc0036b5b10 gate 1569284727973715200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:27.988 UTC [policies] Evaluate -> DEBU 1aad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:27.988 UTC [policies] Evaluate -> DEBU 1aae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:27.988 UTC [policies] Evaluate -> DEBU 1aaf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:27.988 UTC [policies] Evaluate -> DEBU 1ab0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:27.989 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ab1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.989 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ab2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:27.989 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ab3 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:27.989 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ab4 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:27.989 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ab5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:27.989 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ab6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.989 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ab7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.990 UTC [gossip.discovery] sendMemResponse -> DEBU 1ab8 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:27.990 UTC [msp] DeserializeIdentity -> DEBU 1ab9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.990 UTC [msp] DeserializeIdentity -> DEBU 1aba Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.990 UTC [msp] DeserializeIdentity -> DEBU 1abb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:27.991 UTC [gossip.comm] Send -> DEBU 1abc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:27.995 UTC [gossip.discovery] sendMemResponse -> DEBU 1abd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020#" signature:"0D\002 o\266\032`q\022\226\035\031\356\273\023|\325\327\346m\207>\3617\351d\351b\335\305\374i\254\205x\002 2\277\001\0049N\036\306\243\025\235/=\346\205'\302\013\207\206\331\325\253\276\335\325x\004LN\345&" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:27.995 UTC [gossip.comm] sendToEndpoint -> DEBU 1abe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:27.995 UTC [gossip.comm] sendToEndpoint -> DEBU 1abf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:27.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ac0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.185 UTC [msp] DeserializeIdentity -> DEBU 1ac1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.186 UTC [msp] DeserializeIdentity -> DEBU 1ac2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.186 UTC [gossip.comm] Send -> DEBU 1ac3 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.188 UTC [gossip.gossip] handleMessage -> DEBU 1aca Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.188 UTC [msp] DeserializeIdentity -> DEBU 1acb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.188 UTC [msp] DeserializeIdentity -> DEBU 1acc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.188 UTC [msp] DeserializeIdentity -> DEBU 1acd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.188 UTC [gossip.comm] func1 -> DEBU 1ace Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.188 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1acf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:28.188 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ad0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.188 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ad1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.188 UTC [policies] Evaluate -> DEBU 1ad2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [policies] Evaluate -> DEBU 1ad3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [policies] Evaluate -> DEBU 1ad4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [cauthdsl] func1 -> DEBU 1ad5 0xc00374fd00 gate 1569284728189232100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ad6 0xc00374fd00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ad7 0xc00374fd00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ad8 0xc00374fd00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ad9 0xc00374fd00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [cauthdsl] func1 -> DEBU 1ada 0xc00374fd00 gate 1569284728189232100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [policies] Evaluate -> DEBU 1adb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [policies] Evaluate -> DEBU 1adc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [policies] Evaluate -> DEBU 1add == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [cauthdsl] func1 -> DEBU 1ade 0xc0038da540 gate 1569284728189712900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1adf 0xc0038da540 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ae0 0xc0038da540 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ae1 0xc0038da540 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.190 UTC [msp.identity] Verify -> DEBU 1ae2 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:28.190 UTC [msp.identity] Verify -> DEBU 1ae3 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:28.190 UTC [cauthdsl] func2 -> DEBU 1ae4 0xc0038da540 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.190 UTC [cauthdsl] func1 -> DEBU 1ae5 0xc0038da540 gate 1569284728189712900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:28.190 UTC [policies] Evaluate -> DEBU 1ae6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.190 UTC [policies] Evaluate -> DEBU 1ae7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.198 UTC [gossip.comm] func1 -> DEBU 1ae8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.191 UTC [policies] Evaluate -> DEBU 1ae9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.199 UTC [policies] Evaluate -> DEBU 1aea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.199 UTC [msp.identity] Verify -> DEBU 1aeb Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:28.199 UTC [msp.identity] Verify -> DEBU 1aec Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:28.199 UTC [msp.identity] Verify -> DEBU 1aed Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [msp.identity] Verify -> DEBU 1aee Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [msp] DeserializeIdentity -> DEBU 1aef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [msp] DeserializeIdentity -> DEBU 1af0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1af1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1af2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1af3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [policies] Evaluate -> DEBU 1af4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [policies] Evaluate -> DEBU 1af5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [policies] Evaluate -> DEBU 1af6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [cauthdsl] func1 -> DEBU 1af7 0xc003c60b50 gate 1569284728200811400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [cauthdsl] func2 -> DEBU 1af8 0xc003c60b50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [cauthdsl] func2 -> DEBU 1af9 0xc003c60b50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.200 UTC [cauthdsl] func2 -> DEBU 1afa 0xc003c60b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:28.201 UTC [cauthdsl] func2 -> DEBU 1afb 0xc003c60b50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.201 UTC [cauthdsl] func1 -> DEBU 1afc 0xc003c60b50 gate 1569284728200811400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.202 UTC [policies] Evaluate -> DEBU 1afd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.203 UTC [policies] Evaluate -> DEBU 1afe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.203 UTC [policies] Evaluate -> DEBU 1aff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.203 UTC [cauthdsl] func1 -> DEBU 1b00 0xc003c61390 gate 1569284728203206700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.203 UTC [cauthdsl] func2 -> DEBU 1b01 0xc003c61390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.203 UTC [cauthdsl] func2 -> DEBU 1b02 0xc003c61390 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.203 UTC [cauthdsl] func2 -> DEBU 1b03 0xc003c61390 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.203 UTC [msp.identity] Verify -> DEBU 1b04 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:28.203 UTC [msp.identity] Verify -> DEBU 1b05 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:28.204 UTC [cauthdsl] func2 -> DEBU 1b06 0xc003c61390 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.204 UTC [cauthdsl] func1 -> DEBU 1b07 0xc003c61390 gate 1569284728203206700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:28.204 UTC [policies] Evaluate -> DEBU 1b08 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.204 UTC [policies] Evaluate -> DEBU 1b09 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.204 UTC [policies] Evaluate -> DEBU 1b0a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.204 UTC [policies] Evaluate -> DEBU 1b0b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.204 UTC [gossip.gossip] handleMessage -> DEBU 1b0c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.205 UTC [gossip.gossip] handleMessage -> DEBU 1b0d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.205 UTC [msp.identity] Verify -> DEBU 1b0e Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:28.205 UTC [msp.identity] Verify -> DEBU 1b0f Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:28.206 UTC [msp.identity] Verify -> DEBU 1b10 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:28.206 UTC [msp.identity] Verify -> DEBU 1b11 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:28.206 UTC [msp] DeserializeIdentity -> DEBU 1b12 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.207 UTC [msp] DeserializeIdentity -> DEBU 1b13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.208 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:28.212 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b15 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.213 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b16 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.213 UTC [policies] Evaluate -> DEBU 1b17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.213 UTC [policies] Evaluate -> DEBU 1b18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:28.213 UTC [policies] Evaluate -> DEBU 1b19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [cauthdsl] func1 -> DEBU 1b1a 0xc003c71be0 gate 1569284728214085200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b1b 0xc003c71be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b1c 0xc003c71be0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b1d 0xc003c71be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b1e 0xc003c71be0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [cauthdsl] func1 -> DEBU 1b1f 0xc003c71be0 gate 1569284728214085200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [policies] Evaluate -> DEBU 1b20 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [policies] Evaluate -> DEBU 1b21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [policies] Evaluate -> DEBU 1b22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [cauthdsl] func1 -> DEBU 1b23 0xc003d08420 gate 1569284728214533000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b24 0xc003d08420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b25 0xc003d08420 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b26 0xc003d08420 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [msp.identity] Verify -> DEBU 1b27 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:28.214 UTC [msp.identity] Verify -> DEBU 1b28 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [cauthdsl] func2 -> DEBU 1b29 0xc003d08420 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [cauthdsl] func1 -> DEBU 1b2a 0xc003d08420 gate 1569284728214533000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b2b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b2d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [msp] DeserializeIdentity -> DEBU 1b2f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [msp] DeserializeIdentity -> DEBU 1b30 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b31 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b32 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b33 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b34 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b35 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b36 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func1 -> DEBU 1b37 0xc003d09bf0 gate 1569284728216016800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b38 0xc003d09bf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b39 0xc003d09bf0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b3a 0xc003d09bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b3b 0xc003d09bf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func1 -> DEBU 1b3c 0xc003d09bf0 gate 1569284728216016800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [policies] Evaluate -> DEBU 1b3d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [policies] Evaluate -> DEBU 1b3e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [policies] Evaluate -> DEBU 1b3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func1 -> DEBU 1b40 0xc000388430 gate 1569284728216502700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b41 0xc000388430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b42 0xc000388430 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b43 0xc000388430 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [msp.identity] Verify -> DEBU 1b44 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [msp.identity] Verify -> DEBU 1b45 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b46 0xc000388430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.216 UTC [cauthdsl] func1 -> DEBU 1b47 0xc000388430 gate 1569284728216502700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [policies] Evaluate -> DEBU 1b48 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [policies] Evaluate -> DEBU 1b49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [policies] Evaluate -> DEBU 1b4a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [policies] Evaluate -> DEBU 1b4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [gossip.gossip] handleMessage -> DEBU 1b4c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [gossip.gossip] handleMessage -> DEBU 1b4d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [msp] DeserializeIdentity -> DEBU 1b4e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [msp] DeserializeIdentity -> DEBU 1b4f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [msp] DeserializeIdentity -> DEBU 1b50 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b51 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b52 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.217 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b53 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b54 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b56 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [cauthdsl] func1 -> DEBU 1b57 0xc000389f40 gate 1569284728218349600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b58 0xc000389f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b59 0xc000389f40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b5a 0xc000389f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b5b 0xc000389f40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [cauthdsl] func1 -> DEBU 1b5c 0xc000389f40 gate 1569284728218349600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b5d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [cauthdsl] func1 -> DEBU 1b60 0xc002b8e780 gate 1569284728218641600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b61 0xc002b8e780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b62 0xc002b8e780 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b63 0xc002b8e780 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [msp.identity] Verify -> DEBU 1b64 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:28.218 UTC [msp.identity] Verify -> DEBU 1b65 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:28.219 UTC [cauthdsl] func2 -> DEBU 1b66 0xc002b8e780 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.219 UTC [cauthdsl] func1 -> DEBU 1b67 0xc002b8e780 gate 1569284728218641600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:28.219 UTC [policies] Evaluate -> DEBU 1b68 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.219 UTC [policies] Evaluate -> DEBU 1b69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.220 UTC [policies] Evaluate -> DEBU 1b6a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.220 UTC [policies] Evaluate -> DEBU 1b6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.221 UTC [msp.identity] Verify -> DEBU 1b6c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:28.221 UTC [msp.identity] Verify -> DEBU 1b6d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:28.221 UTC [msp] DeserializeIdentity -> DEBU 1b6e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.221 UTC [msp] DeserializeIdentity -> DEBU 1b6f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.222 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b70 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:28.222 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b71 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.222 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b72 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.222 UTC [policies] Evaluate -> DEBU 1b73 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.222 UTC [policies] Evaluate -> DEBU 1b74 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:28.222 UTC [policies] Evaluate -> DEBU 1b75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.222 UTC [cauthdsl] func1 -> DEBU 1b76 0xc0034a8670 gate 1569284728222553400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b77 0xc0034a8670 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b78 0xc0034a8670 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b79 0xc0034a8670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b7a 0xc0034a8670 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [cauthdsl] func1 -> DEBU 1b7b 0xc0034a8670 gate 1569284728222553400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [policies] Evaluate -> DEBU 1b7c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [policies] Evaluate -> DEBU 1b7d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [policies] Evaluate -> DEBU 1b7e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [cauthdsl] func1 -> DEBU 1b7f 0xc0034a8eb0 gate 1569284728223540400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b80 0xc0034a8eb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b81 0xc0034a8eb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b82 0xc0034a8eb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.223 UTC [msp.identity] Verify -> DEBU 1b83 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:28.224 UTC [msp.identity] Verify -> DEBU 1b84 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:28.229 UTC [cauthdsl] func2 -> DEBU 1b85 0xc0034a8eb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.229 UTC [cauthdsl] func1 -> DEBU 1b86 0xc0034a8eb0 gate 1569284728223540400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:28.229 UTC [policies] Evaluate -> DEBU 1b87 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.229 UTC [policies] Evaluate -> DEBU 1b88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.229 UTC [policies] Evaluate -> DEBU 1b89 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.229 UTC [policies] Evaluate -> DEBU 1b8a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.229 UTC [msp.identity] Verify -> DEBU 1b8b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:28.230 UTC [msp.identity] Verify -> DEBU 1b8c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:28.230 UTC [gossip.gossip] handleMessage -> DEBU 1b8d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.282 UTC [msp] DeserializeIdentity -> DEBU 1b8e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.282 UTC [msp] DeserializeIdentity -> DEBU 1b8f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.282 UTC [gossip.pull] Hello -> DEBU 1b90 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:28.282 UTC [msp] DeserializeIdentity -> DEBU 1b91 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.283 UTC [msp] DeserializeIdentity -> DEBU 1b92 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.283 UTC [gossip.comm] Send -> DEBU 1b93 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:28.283 UTC [gossip.comm] sendToEndpoint -> DEBU 1b94 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.283 UTC [gossip.comm] sendToEndpoint -> DEBU 1b95 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.285 UTC [gossip.comm] func1 -> DEBU 1b96 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.285 UTC [gossip.gossip] handleMessage -> DEBU 1b97 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.285 UTC [gossip.pull] HandleMessage -> DEBU 1b98 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.285 UTC [gossip.gossip] handleMessage -> DEBU 1b99 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.676 UTC [gossip.comm] func1 -> DEBU 1b9a Got message: GossipMessage: tag:EMPTY mem_req:a\247 \006\3408\253\252\216\037\337\035n\361\201G\211\352\255\231a\034\240u0V\221\002 ~?\376u\035\224\036\231\021\256\020\2305\250tV\306<\215\362\322u\031\226\266\023\020\000\210J\350\246" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.676 UTC [gossip.gossip] handleMessage -> DEBU 1b9b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:a\247 \006\3408\253\252\216\037\337\035n\361\201G\211\352\255\231a\034\240u0V\221\002 ~?\376u\035\224\036\231\021\256\020\2305\250tV\306<\215\362\322u\031\226\266\023\020\000\210J\350\246" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.676 UTC [gossip.gossip] handleMessage -> DEBU 1b9c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b9d Got message: GossipMessage: tag:EMPTY mem_req:a\247 \006\3408\253\252\216\037\337\035n\361\201G\211\352\255\231a\034\240u0V\221\002 ~?\376u\035\224\036\231\021\256\020\2305\250tV\306<\215\362\322u\031\226\266\023\020\000\210J\350\246" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.676 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b9e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:28.676 UTC [msp] DeserializeIdentity -> DEBU 1b9f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.677 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ba0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:28.677 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ba1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.677 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ba2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:28.677 UTC [policies] Evaluate -> DEBU 1ba3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.677 UTC [policies] Evaluate -> DEBU 1ba4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:28.677 UTC [policies] Evaluate -> DEBU 1ba5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.677 UTC [cauthdsl] func1 -> DEBU 1ba6 0xc00358e040 gate 1569284728677954700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1ba7 0xc00358e040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1ba8 0xc00358e040 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1ba9 0xc00358e040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1baa 0xc00358e040 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [cauthdsl] func1 -> DEBU 1bab 0xc00358e040 gate 1569284728677954700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [policies] Evaluate -> DEBU 1bac Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [policies] Evaluate -> DEBU 1bad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [policies] Evaluate -> DEBU 1bae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [cauthdsl] func1 -> DEBU 1baf 0xc00358e880 gate 1569284728678481700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1bb0 0xc00358e880 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1bb1 0xc00358e880 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1bb2 0xc00358e880 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.679 UTC [msp.identity] Verify -> DEBU 1bb3 Verify: digest = 00000000 3c 58 26 8e 1c 9e 53 ce 07 6a 07 cb 1c 9c df 45 | DEBU 1bb4 Verify: sig = 00000000 30 45 02 21 00 c6 e6 9c b9 3e 61 a7 20 06 e0 38 |0E.!.....>a. ..8| +peer0.org1.example.com | 00000010 ab aa 8e 1f df 1d 6e f1 81 47 89 ea ad 99 61 1c |......n..G....a.| +peer0.org1.example.com | 00000020 a0 75 30 56 91 02 20 7e 3f fe 75 1d 94 1e 99 11 |.u0V.. ~?.u.....| +peer0.org1.example.com | 00000030 ae 10 98 35 a8 74 56 c6 3c 8d f2 d2 75 19 96 b6 |...5.tV.<...u...| +peer0.org1.example.com | 00000040 13 10 00 88 4a e8 a6 |....J..|" +peer0.org1.example.com | "2019-09-24 00:25:28.679 UTC [cauthdsl] func2 -> DEBU 1bb5 0xc00358e880 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:28.679 UTC [cauthdsl] func1 -> DEBU 1bb6 0xc00358e880 gate 1569284728678481700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:28.679 UTC [policies] Evaluate -> DEBU 1bb7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.679 UTC [policies] Evaluate -> DEBU 1bb8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.679 UTC [policies] Evaluate -> DEBU 1bb9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.679 UTC [policies] Evaluate -> DEBU 1bba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:28.679 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bbb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.679 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:28.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbd updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:28.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbe Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:28.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbf Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:28.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bc0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.680 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bc1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.680 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.680 UTC [gossip.discovery] sendMemResponse -> DEBU 1bc3 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:28.680 UTC [msp] DeserializeIdentity -> DEBU 1bc4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.680 UTC [msp] DeserializeIdentity -> DEBU 1bc5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.680 UTC [msp] DeserializeIdentity -> DEBU 1bc6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.680 UTC [gossip.comm] Send -> DEBU 1bc7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:28.681 UTC [gossip.discovery] sendMemResponse -> DEBU 1bc8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020#" signature:"0D\002 o\266\032`q\022\226\035\031\356\273\023|\325\327\346m\207>\3617\351d\351b\335\305\374i\254\205x\002 2\277\001\0049N\036\306\243\025\235/=\346\205'\302\013\207\206\331\325\253\276\335\325x\004LN\345&" > alive:a\247 \006\3408\253\252\216\037\337\035n\361\201G\211\352\255\231a\034\240u0V\221\002 ~?\376u\035\224\036\231\021\256\020\2305\250tV\306<\215\362\322u\031\226\266\023\020\000\210J\350\246" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:28.681 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.696 UTC [gossip.comm] func1 -> DEBU 1bca Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.696 UTC [gossip.gossip] handleMessage -> DEBU 1bcb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.697 UTC [msp] DeserializeIdentity -> DEBU 1bcc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.697 UTC [msp] DeserializeIdentity -> DEBU 1bcd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.697 UTC [gossip.gossip] handleMessage -> DEBU 1bce Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.681 UTC [gossip.comm] sendToEndpoint -> DEBU 1bcf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.713 UTC [gossip.comm] func1 -> DEBU 1bd0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.714 UTC [gossip.gossip] handleMessage -> DEBU 1bd1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.714 UTC [gossip.pull] HandleMessage -> DEBU 1bd2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:28.714 UTC [gossip.pull] SendDigest -> DEBU 1bd9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:28.714 UTC [gossip.gossip] handleMessage -> DEBU 1bda Exiting" +peer0.org1.example.com | "2019-09-24 00:25:28.716 UTC [gossip.comm] func1 -> DEBU 1bdb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.716 UTC [gossip.gossip] handleMessage -> DEBU 1bdc Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.716 UTC [gossip.pull] HandleMessage -> DEBU 1bdd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:28.716 UTC [gossip.pull] SendDigest -> DEBU 1bde Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:28.716 UTC [gossip.gossip] handleMessage -> DEBU 1bdf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.180 UTC [gossip.gossip] handleMessage -> DEBU 1be0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.180 UTC [msp] DeserializeIdentity -> DEBU 1be1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:29.180 UTC [msp] DeserializeIdentity -> DEBU 1be2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:29.190 UTC [msp] DeserializeIdentity -> DEBU 1be3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:29.190 UTC [gossip.gossip] handleMessage -> DEBU 1be4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.590 UTC [msp] GetDefaultSigningIdentity -> DEBU 1be5 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:29.590 UTC [msp.identity] Sign -> DEBU 1be6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151020 " +peer0.org1.example.com | "2019-09-24 00:25:29.590 UTC [msp.identity] Sign -> DEBU 1be7 Sign: digest: B7DA4C38B4C848174DCFB1729D2595D63CF5CC25EB0CCEE145B0001FC677ADDC " +peer0.org1.example.com | "2019-09-24 00:25:29.590 UTC [msp] GetDefaultSigningIdentity -> DEBU 1be8 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:29.590 UTC [msp.identity] Sign -> DEBU 1be9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:29.590 UTC [msp.identity] Sign -> DEBU 1bea Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:29.590 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1beb Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:29.603 UTC [msp] DeserializeIdentity -> DEBU 1bec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:29.603 UTC [msp] DeserializeIdentity -> DEBU 1bed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:29.603 UTC [msp] DeserializeIdentity -> DEBU 1bee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:29.603 UTC [gossip.comm] Send -> DEBU 1bef Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:29.603 UTC [msp] DeserializeIdentity -> DEBU 1bf0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:29.603 UTC [gossip.comm] Send -> DEBU 1bf1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:29.603 UTC [gossip.comm] Send -> DEBU 1bf2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:29.603 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.603 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.610 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 1bf9 Sleeping 25s" +peer0.org1.example.com | "2019-09-24 00:25:29.629 UTC [gossip.comm] func1 -> DEBU 1bfa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.629 UTC [gossip.gossip] handleMessage -> DEBU 1bfb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.629 UTC [gossip.gossip] handleMessage -> DEBU 1bfc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bfd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.630 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bfe Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:29.630 UTC [msp.identity] Verify -> DEBU 1bff Verify: digest = 00000000 b7 da 4c 38 b4 c8 48 17 4d cf b1 72 9d 25 95 d6 |..L8..H.M..r.%..| +peer0.org1.example.com | 00000010 3c f5 cc 25 eb 0c ce e1 45 b0 00 1f c6 77 ad dc |<..%....E....w..|" +peer0.org1.example.com | "2019-09-24 00:25:29.630 UTC [msp.identity] Verify -> DEBU 1c00 Verify: sig = 00000000 30 44 02 20 60 73 e9 38 12 44 91 7b ce f3 40 a9 |0D. `s.8.D.{..@.| +peer0.org1.example.com | 00000010 b1 f6 d4 35 6f 5b 20 6e dc 6c 9e 18 6d 87 f6 61 |...5o[ n.l..m..a| +peer0.org1.example.com | 00000020 0e 66 27 89 02 20 1b f2 ac cd da 04 4f b3 4a 05 |.f'.. ......O.J.| +peer0.org1.example.com | 00000030 a9 7c a7 7e 16 bc bb 1b 6f ac 3a 05 bc a7 0e 5a |.|.~....o.:....Z| +peer0.org1.example.com | 00000040 0e 15 f4 67 5e c6 |...g^.|" +peer0.org1.example.com | "2019-09-24 00:25:29.630 UTC [gossip.discovery] isSentByMe -> DEBU 1c01 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c02 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.674 UTC [gossip.comm] func1 -> DEBU 1c03 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.674 UTC [gossip.gossip] handleMessage -> DEBU 1c04 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.674 UTC [gossip.pull] HandleMessage -> DEBU 1c05 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.674 UTC [gossip.pull] SendDigest -> DEBU 1c06 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:29.674 UTC [gossip.gossip] handleMessage -> DEBU 1c07 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.734 UTC [gossip.comm] func1 -> DEBU 1c08 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" secret_envelope:m\002 4\343I\374*44\013N)E,f\200l\002\357\322sz\023_Y\213E\n\374\315\274\007\255\374" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.734 UTC [gossip.gossip] handleMessage -> DEBU 1c09 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" secret_envelope:m\002 4\343I\374*44\013N)E,f\200l\002\357\322sz\023_Y\213E\n\374\315\274\007\255\374" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.734 UTC [gossip.gossip] handleMessage -> DEBU 1c0a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.734 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c0b Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" secret_envelope:m\002 4\343I\374*44\013N)E,f\200l\002\357\322sz\023_Y\213E\n\374\315\274\007\255\374" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.734 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c0c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:29.734 UTC [msp.identity] Verify -> DEBU 1c0d Verify: digest = 00000000 66 1a a0 ac ca 88 be b7 5f 35 d0 d9 2a 12 65 08 |f......._5..*.e.| +peer0.org1.example.com | 00000010 3d 7b f6 22 da 33 ea 24 60 08 9e b3 9d d2 c1 bc |={.".3.$`.......|" +peer0.org1.example.com | "2019-09-24 00:25:29.734 UTC [msp.identity] Verify -> DEBU 1c0e Verify: sig = 00000000 30 45 02 21 00 be f8 88 e2 3d 0a 33 16 f5 ad 18 |0E.!.....=.3....| +peer0.org1.example.com | 00000010 77 6c ab b5 59 eb 1e 03 1e c5 a6 42 ef 8a 7b 3f |wl..Y......B..{?| +peer0.org1.example.com | 00000020 7f 07 f5 64 60 02 20 0d a3 44 23 68 da 71 ac 0e |...d`. ..D#h.q..| +peer0.org1.example.com | 00000030 4e 9d d0 52 fe 5d 16 4c a1 84 48 94 5a a7 3e fc |N..R.].L..H.Z.>.| +peer0.org1.example.com | 00000040 c2 83 7b 80 c6 5a 40 |..{..Z@|" +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [msp.identity] Verify -> DEBU 1c0f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [msp.identity] Verify -> DEBU 1c10 Verify: sig = 00000000 30 45 02 21 00 c8 52 2f 53 3b 4f a2 c0 08 2b 4d |0E.!..R/S;O...+M| +peer0.org1.example.com | 00000010 bb 40 d2 ce 15 74 0f 8a 2f 5c cf 96 37 4f e3 db |.@...t../\..7O..| +peer0.org1.example.com | 00000020 8d 70 11 3e 6d 02 20 34 e3 49 fc 2a 34 34 0b 4e |.p.>m. 4.I.*44.N| +peer0.org1.example.com | 00000030 29 45 2c 66 80 6c 02 ef d2 73 7a 13 5f 59 8b 45 |)E,f.l...sz._Y.E| +peer0.org1.example.com | 00000040 0a fc cd bc 07 ad fc |.......|" +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c11 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c12 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c13 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c14 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c15 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c16 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c17 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c18 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [gossip.discovery] sendMemResponse -> DEBU 1c19 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:29.735 UTC [msp] DeserializeIdentity -> DEBU 1c1a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:29.736 UTC [msp] DeserializeIdentity -> DEBU 1c1b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:29.736 UTC [gossip.comm] Send -> DEBU 1c1c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:29.736 UTC [gossip.discovery] sendMemResponse -> DEBU 1c1d Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" secret_envelope:m\002 4\343I\374*44\013N)E,f\200l\002\357\322sz\023_Y\213E\n\374\315\274\007\255\374" > > alive: " +peer0.org1.example.com | "2019-09-24 00:25:29.736 UTC [gossip.comm] sendToEndpoint -> DEBU 1c1e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.736 UTC [gossip.comm] sendToEndpoint -> DEBU 1c1f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.998 UTC [gossip.gossip] handleMessage -> DEBU 1c20 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.998 UTC [gossip.gossip] handleMessage -> DEBU 1c21 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:29.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c22 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:29.998 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c23 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:29.998 UTC [msp] DeserializeIdentity -> DEBU 1c24 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c25 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c26 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c27 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c28 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c29 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c2a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [cauthdsl] func1 -> DEBU 1c2b 0xc0027e34a0 gate 1569284729999319300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c2c 0xc0027e34a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c2d 0xc0027e34a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c2e 0xc0027e34a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c2f 0xc0027e34a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [cauthdsl] func1 -> DEBU 1c30 0xc0027e34a0 gate 1569284729999319300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c31 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c32 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c33 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [cauthdsl] func1 -> DEBU 1c34 0xc0027e3ce0 gate 1569284729999796000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c35 0xc0027e3ce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c36 0xc0027e3ce0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:30.000 UTC [cauthdsl] func2 -> DEBU 1c37 0xc0027e3ce0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:30.000 UTC [msp.identity] Verify -> DEBU 1c38 Verify: digest = 00000000 50 79 8a fd e1 cc 56 bf 31 03 ec 52 f7 c5 be eb |Py....V.1..R....| +peer0.org1.example.com | 00000010 42 b2 6d 16 c3 10 e0 db 66 a2 2d 9f ed 6d a2 f7 |B.m.....f.-..m..|" +peer0.org1.example.com | "2019-09-24 00:25:30.000 UTC [msp.identity] Verify -> DEBU 1c39 Verify: sig = 00000000 30 45 02 21 00 ea b5 39 2a 82 98 d3 eb 53 a8 dd |0E.!...9*....S..| +peer0.org1.example.com | 00000010 2c 95 13 0d 5b 95 8b 68 22 1d f1 16 f5 c1 87 a8 |,...[..h".......| +peer0.org1.example.com | 00000020 a5 e3 3f 2f 81 02 20 3e b1 a4 46 53 d6 10 47 fb |..?/.. >..FS..G.| +peer0.org1.example.com | 00000030 b7 6a 28 c6 95 67 39 9f 80 b2 a1 22 b4 61 c7 b6 |.j(..g9....".a..| +peer0.org1.example.com | 00000040 d8 ed d1 33 8c 99 9a |...3...|" +peer0.org1.example.com | "2019-09-24 00:25:30.000 UTC [cauthdsl] func2 -> DEBU 1c3a 0xc0027e3ce0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:30.000 UTC [cauthdsl] func1 -> DEBU 1c3b 0xc0027e3ce0 gate 1569284729999796000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:30.000 UTC [policies] Evaluate -> DEBU 1c3c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:30.000 UTC [policies] Evaluate -> DEBU 1c3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:30.000 UTC [policies] Evaluate -> DEBU 1c3e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:30.001 UTC [policies] Evaluate -> DEBU 1c3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:30.009 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c40 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c41 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:30.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c42 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:30.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c43 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:30.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c44 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:30.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c45 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.010 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c46 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c47 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.022 UTC [msp] DeserializeIdentity -> DEBU 1c48 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.022 UTC [msp] DeserializeIdentity -> DEBU 1c49 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.025 UTC [msp] DeserializeIdentity -> DEBU 1c4a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.026 UTC [msp] DeserializeIdentity -> DEBU 1c4b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.026 UTC [msp] DeserializeIdentity -> DEBU 1c4c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.026 UTC [msp] DeserializeIdentity -> DEBU 1c4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.026 UTC [msp] DeserializeIdentity -> DEBU 1c4e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.027 UTC [gossip.comm] Send -> DEBU 1c4f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:30.027 UTC [msp] DeserializeIdentity -> DEBU 1c50 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.027 UTC [gossip.comm] Send -> DEBU 1c51 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:30.027 UTC [gossip.comm] sendToEndpoint -> DEBU 1c52 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.027 UTC [gossip.comm] sendToEndpoint -> DEBU 1c53 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.027 UTC [gossip.comm] sendToEndpoint -> DEBU 1c54 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.027 UTC [gossip.comm] sendToEndpoint -> DEBU 1c55 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.029 UTC [gossip.comm] func1 -> DEBU 1c56 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.032 UTC [gossip.gossip] handleMessage -> DEBU 1c57 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.032 UTC [gossip.gossip] handleMessage -> DEBU 1c58 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.032 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c59 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.032 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c5a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.036 UTC [gossip.comm] func1 -> DEBU 1c5b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.037 UTC [gossip.gossip] handleMessage -> DEBU 1c5c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.037 UTC [gossip.gossip] handleMessage -> DEBU 1c5d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c5e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c5f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.128 UTC [gossip.comm] func1 -> DEBU 1c60 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.129 UTC [gossip.gossip] handleMessage -> DEBU 1c61 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.129 UTC [msp] DeserializeIdentity -> DEBU 1c62 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.129 UTC [msp] DeserializeIdentity -> DEBU 1c63 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.129 UTC [msp] DeserializeIdentity -> DEBU 1c64 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.129 UTC [gossip.gossip] handleMessage -> DEBU 1c65 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.666 UTC [gossip.comm] func1 -> DEBU 1c66 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.671 UTC [gossip.gossip] handleMessage -> DEBU 1c67 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.671 UTC [gossip.gossip] handleMessage -> DEBU 1c68 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.675 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c69 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.675 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c6a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [msp] DeserializeIdentity -> DEBU 1c6b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c6c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c6d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c6e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [policies] Evaluate -> DEBU 1c6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [policies] Evaluate -> DEBU 1c70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [policies] Evaluate -> DEBU 1c71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [cauthdsl] func1 -> DEBU 1c72 0xc0029b38c0 gate 1569284730676673600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [cauthdsl] func2 -> DEBU 1c73 0xc0029b38c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [cauthdsl] func2 -> DEBU 1c74 0xc0029b38c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [cauthdsl] func2 -> DEBU 1c75 0xc0029b38c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [cauthdsl] func2 -> DEBU 1c76 0xc0029b38c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:30.676 UTC [cauthdsl] func1 -> DEBU 1c77 0xc0029b38c0 gate 1569284730676673600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [cauthdsl] func1 -> DEBU 1c7b 0xc00343e100 gate 1569284730677155500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [cauthdsl] func2 -> DEBU 1c7c 0xc00343e100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [cauthdsl] func2 -> DEBU 1c7d 0xc00343e100 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [cauthdsl] func2 -> DEBU 1c7e 0xc00343e100 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [msp.identity] Verify -> DEBU 1c7f Verify: digest = 00000000 1f 2c 71 80 38 14 a0 5e fd 63 93 df 5d ad 72 fd |.,q.8..^.c..].r.| +peer0.org1.example.com | 00000010 7b 79 79 4c e3 85 2c a9 3b 3d 0e d8 df 9c c7 a0 |{yyL..,.;=......|" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [msp.identity] Verify -> DEBU 1c80 Verify: sig = 00000000 30 45 02 21 00 a3 2c 4b 99 73 c8 5f 9a 23 2e 9b |0E.!..,K.s._.#..| +peer0.org1.example.com | 00000010 58 74 e2 60 38 9d d0 85 b7 6a 68 5d 03 81 bf 3a |Xt.`8....jh]...:| +peer0.org1.example.com | 00000020 f6 18 ad 6b 24 02 20 4a 43 b7 61 1e cf 28 0c 4a |...k$. JC.a..(.J| +peer0.org1.example.com | 00000030 7f b5 10 31 b3 15 8c a8 fe e1 68 6b 33 47 9f d9 |...1......hk3G..| +peer0.org1.example.com | 00000040 35 3e 59 f2 f6 a1 56 |5>Y...V|" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [cauthdsl] func2 -> DEBU 1c81 0xc00343e100 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [cauthdsl] func1 -> DEBU 1c82 0xc00343e100 gate 1569284730677155500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c85 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:30.678 UTC [policies] Evaluate -> DEBU 1c86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:30.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c87 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.678 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c88 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:30.678 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c89 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:30.678 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c8a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:30.678 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c8b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:30.678 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c8c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c8d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c8e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.679 UTC [gossip.comm] func1 -> DEBU 1c8f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.679 UTC [gossip.gossip] handleMessage -> DEBU 1c90 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.679 UTC [gossip.gossip] handleMessage -> DEBU 1c91 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.679 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c92 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.679 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c93 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.691 UTC [msp] DeserializeIdentity -> DEBU 1c94 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.691 UTC [msp] DeserializeIdentity -> DEBU 1c95 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.691 UTC [msp] DeserializeIdentity -> DEBU 1c96 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.692 UTC [msp] DeserializeIdentity -> DEBU 1c97 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.692 UTC [msp] DeserializeIdentity -> DEBU 1c98 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.692 UTC [msp] DeserializeIdentity -> DEBU 1c99 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.692 UTC [gossip.comm] Send -> DEBU 1c9a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:30.692 UTC [msp] DeserializeIdentity -> DEBU 1c9b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.692 UTC [msp] DeserializeIdentity -> DEBU 1c9c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:30.693 UTC [gossip.comm] Send -> DEBU 1c9d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:30.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.701 UTC [gossip.gossip] handleMessage -> DEBU 1ca2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.702 UTC [gossip.gossip] handleMessage -> DEBU 1ca3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:30.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ca4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:30.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ca5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.636 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ca6 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:31.636 UTC [msp.identity] Sign -> DEBU 1ca7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151021 " +peer0.org1.example.com | "2019-09-24 00:25:31.636 UTC [msp.identity] Sign -> DEBU 1ca8 Sign: digest: 062B4BBD5E684F6D25B329A8AF60C4002F7355E15E8CDB826737F36564E75759 " +peer0.org1.example.com | "2019-09-24 00:25:31.636 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ca9 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:31.636 UTC [msp.identity] Sign -> DEBU 1caa Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:31.636 UTC [msp.identity] Sign -> DEBU 1cab Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:31.637 UTC [gossip.comm] Send -> DEBU 1cac Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:31.637 UTC [msp] DeserializeIdentity -> DEBU 1cad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:31.637 UTC [gossip.comm] Send -> DEBU 1cae Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:31.637 UTC [msp] DeserializeIdentity -> DEBU 1caf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:31.637 UTC [gossip.comm] Send -> DEBU 1cb0 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:31.637 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.671 UTC [gossip.pull] Hello -> DEBU 1cb7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:31.671 UTC [gossip.comm] Send -> DEBU 1cb8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:31.671 UTC [gossip.pull] Hello -> DEBU 1cb9 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:31.671 UTC [gossip.comm] Send -> DEBU 1cba Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:31.671 UTC [gossip.pull] Hello -> DEBU 1cbb Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:31.671 UTC [gossip.comm] Send -> DEBU 1cbc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:31.671 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.671 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbe Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.672 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.672 UTC [gossip.comm] sendToEndpoint -> DEBU 1cc0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.672 UTC [gossip.comm] sendToEndpoint -> DEBU 1cc1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.672 UTC [gossip.comm] sendToEndpoint -> DEBU 1cc2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.677 UTC [gossip.comm] func1 -> DEBU 1cc3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.677 UTC [gossip.comm] func1 -> DEBU 1cc4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.677 UTC [gossip.gossip] handleMessage -> DEBU 1cc5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.677 UTC [gossip.gossip] handleMessage -> DEBU 1cc6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.677 UTC [gossip.gossip] handleMessage -> DEBU 1cc7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.677 UTC [gossip.pull] HandleMessage -> DEBU 1cc8 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.677 UTC [gossip.gossip] handleMessage -> DEBU 1cc9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.677 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ccb Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [msp.identity] Verify -> DEBU 1ccc Verify: digest = 00000000 66 1a a0 ac ca 88 be b7 5f 35 d0 d9 2a 12 65 08 |f......._5..*.e.| +peer0.org1.example.com | 00000010 3d 7b f6 22 da 33 ea 24 60 08 9e b3 9d d2 c1 bc |={.".3.$`.......|" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [msp.identity] Verify -> DEBU 1ccd Verify: sig = 00000000 30 45 02 21 00 be f8 88 e2 3d 0a 33 16 f5 ad 18 |0E.!.....=.3....| +peer0.org1.example.com | 00000010 77 6c ab b5 59 eb 1e 03 1e c5 a6 42 ef 8a 7b 3f |wl..Y......B..{?| +peer0.org1.example.com | 00000020 7f 07 f5 64 60 02 20 0d a3 44 23 68 da 71 ac 0e |...d`. ..D#h.q..| +peer0.org1.example.com | 00000030 4e 9d d0 52 fe 5d 16 4c a1 84 48 94 5a a7 3e fc |N..R.].L..H.Z.>.| +peer0.org1.example.com | 00000040 c2 83 7b 80 c6 5a 40 |..{..Z@|" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cce Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ccf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cd0 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [msp.identity] Verify -> DEBU 1cd1 Verify: digest = 00000000 06 2b 4b bd 5e 68 4f 6d 25 b3 29 a8 af 60 c4 00 |.+K.^hOm%.)..`..| +peer0.org1.example.com | 00000010 2f 73 55 e1 5e 8c db 82 67 37 f3 65 64 e7 57 59 |/sU.^...g7.ed.WY|" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [msp.identity] Verify -> DEBU 1cd2 Verify: sig = 00000000 30 45 02 21 00 b6 30 1f af 2d a0 a2 8c 9b f1 88 |0E.!..0..-......| +peer0.org1.example.com | 00000010 38 07 e8 61 4e 68 12 16 ad 08 eb eb 97 47 79 f8 |8..aNh.......Gy.| +peer0.org1.example.com | 00000020 b2 a4 d0 1b 13 02 20 1f 67 a7 2b d6 b8 00 12 9f |...... .g.+.....| +peer0.org1.example.com | 00000030 b2 91 bb 50 84 91 68 a7 69 f6 55 ef 16 75 c7 3b |...P..h.i.U..u.;| +peer0.org1.example.com | 00000040 60 d5 09 42 3d 9e a0 |`..B=..|" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cd3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [gossip.discovery] isSentByMe -> DEBU 1cd4 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cd5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cd6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.678 UTC [gossip.comm] func1 -> DEBU 1cd7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.679 UTC [gossip.gossip] handleMessage -> DEBU 1cd8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.679 UTC [gossip.gossip] handleMessage -> DEBU 1cd9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.679 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cda Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.679 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cdb Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:31.679 UTC [msp.identity] Verify -> DEBU 1cdc Verify: digest = 00000000 06 2b 4b bd 5e 68 4f 6d 25 b3 29 a8 af 60 c4 00 |.+K.^hOm%.)..`..| +peer0.org1.example.com | 00000010 2f 73 55 e1 5e 8c db 82 67 37 f3 65 64 e7 57 59 |/sU.^...g7.ed.WY|" +peer0.org1.example.com | "2019-09-24 00:25:31.679 UTC [msp.identity] Verify -> DEBU 1cdd Verify: sig = 00000000 30 45 02 21 00 b6 30 1f af 2d a0 a2 8c 9b f1 88 |0E.!..0..-......| +peer0.org1.example.com | 00000010 38 07 e8 61 4e 68 12 16 ad 08 eb eb 97 47 79 f8 |8..aNh.......Gy.| +peer0.org1.example.com | 00000020 b2 a4 d0 1b 13 02 20 1f 67 a7 2b d6 b8 00 12 9f |...... .g.+.....| +peer0.org1.example.com | 00000030 b2 91 bb 50 84 91 68 a7 69 f6 55 ef 16 75 c7 3b |...P..h.i.U..u.;| +peer0.org1.example.com | 00000040 60 d5 09 42 3d 9e a0 |`..B=..|" +peer0.org1.example.com | "2019-09-24 00:25:31.679 UTC [msp.identity] Verify -> DEBU 1cde Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:31.679 UTC [msp.identity] Verify -> DEBU 1cdf Verify: sig = 00000000 30 45 02 21 00 a3 fa 43 bd bb b6 e5 76 c5 05 ab |0E.!...C....v...| +peer0.org1.example.com | 00000010 c4 ae 64 24 a8 a1 df 4a ea 26 6c a5 b6 52 ea 90 |..d$...J.&l..R..| +peer0.org1.example.com | 00000020 b3 a8 d1 44 25 02 20 3d 69 ca 45 9a 65 bf cf c2 |...D%. =i.E.e...| +peer0.org1.example.com | 00000030 f2 29 ce 2b 58 65 0e 57 47 86 3d 6e cb ce 6a 37 |.).+Xe.WG.=n..j7| +peer0.org1.example.com | 00000040 2c a8 fe a9 7a 52 e3 |,...zR.|" +peer0.org1.example.com | "2019-09-24 00:25:31.679 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ce0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.679 UTC [gossip.discovery] isSentByMe -> DEBU 1ce1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.679 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ce2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.680 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ce3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.709 UTC [gossip.gossip] handleMessage -> DEBU 1ce4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.709 UTC [gossip.pull] HandleMessage -> DEBU 1ce5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.709 UTC [gossip.gossip] handleMessage -> DEBU 1ce6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.709 UTC [gossip.gossip] handleMessage -> DEBU 1ce7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.709 UTC [gossip.gossip] handleMessage -> DEBU 1ce8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.709 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ce9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.710 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cea Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:31.710 UTC [msp.identity] Verify -> DEBU 1ceb Verify: digest = 00000000 06 2b 4b bd 5e 68 4f 6d 25 b3 29 a8 af 60 c4 00 |.+K.^hOm%.)..`..| +peer0.org1.example.com | 00000010 2f 73 55 e1 5e 8c db 82 67 37 f3 65 64 e7 57 59 |/sU.^...g7.ed.WY|" +peer0.org1.example.com | "2019-09-24 00:25:31.710 UTC [gossip.comm] func1 -> DEBU 1cec Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.710 UTC [msp.identity] Verify -> DEBU 1ced Verify: sig = 00000000 30 45 02 21 00 b6 30 1f af 2d a0 a2 8c 9b f1 88 |0E.!..0..-......| +peer0.org1.example.com | 00000010 38 07 e8 61 4e 68 12 16 ad 08 eb eb 97 47 79 f8 |8..aNh.......Gy.| +peer0.org1.example.com | 00000020 b2 a4 d0 1b 13 02 20 1f 67 a7 2b d6 b8 00 12 9f |...... .g.+.....| +peer0.org1.example.com | 00000030 b2 91 bb 50 84 91 68 a7 69 f6 55 ef 16 75 c7 3b |...P..h.i.U..u.;| +peer0.org1.example.com | 00000040 60 d5 09 42 3d 9e a0 |`..B=..|" +peer0.org1.example.com | "2019-09-24 00:25:31.710 UTC [gossip.gossip] handleMessage -> DEBU 1cee Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.711 UTC [gossip.pull] HandleMessage -> DEBU 1cf0 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.719 UTC [gossip.gossip] handleMessage -> DEBU 1cf1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cef Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.719 UTC [gossip.discovery] isSentByMe -> DEBU 1cf2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.720 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cf3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.720 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cf4 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:31.720 UTC [msp.identity] Verify -> DEBU 1cf5 Verify: digest = 00000000 66 1a a0 ac ca 88 be b7 5f 35 d0 d9 2a 12 65 08 |f......._5..*.e.| +peer0.org1.example.com | 00000010 3d 7b f6 22 da 33 ea 24 60 08 9e b3 9d d2 c1 bc |={.".3.$`.......|" +peer0.org1.example.com | "2019-09-24 00:25:31.720 UTC [msp.identity] Verify -> DEBU 1cf6 Verify: sig = 00000000 30 45 02 21 00 be f8 88 e2 3d 0a 33 16 f5 ad 18 |0E.!.....=.3....| +peer0.org1.example.com | 00000010 77 6c ab b5 59 eb 1e 03 1e c5 a6 42 ef 8a 7b 3f |wl..Y......B..{?| +peer0.org1.example.com | 00000020 7f 07 f5 64 60 02 20 0d a3 44 23 68 da 71 ac 0e |...d`. ..D#h.q..| +peer0.org1.example.com | 00000030 4e 9d d0 52 fe 5d 16 4c a1 84 48 94 5a a7 3e fc |N..R.].L..H.Z.>.| +peer0.org1.example.com | 00000040 c2 83 7b 80 c6 5a 40 |..{..Z@|" +peer0.org1.example.com | "2019-09-24 00:25:31.720 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cf7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.720 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cf8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.720 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cf9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.965 UTC [gossip.gossip] handleMessage -> DEBU 1cfa Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.965 UTC [gossip.pull] HandleMessage -> DEBU 1cfb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1cfc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1cfd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1cfe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1cff Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1d00 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1d01 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:31.965 UTC [gossip.pull] SendDigest -> DEBU 1d02 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:31.965 UTC [gossip.gossip] handleMessage -> DEBU 1d03 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.985 UTC [gossip.gossip] handleMessage -> DEBU 1d04 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.985 UTC [gossip.gossip] handleMessage -> DEBU 1d05 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:31.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d06 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:31.986 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d07 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:31.986 UTC [msp] DeserializeIdentity -> DEBU 1d08 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:31.986 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d09 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:31.986 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d0a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:31.986 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d0b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:31.986 UTC [policies] Evaluate -> DEBU 1d0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:31.986 UTC [policies] Evaluate -> DEBU 1d0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:31.995 UTC [policies] Evaluate -> DEBU 1d0e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:31.995 UTC [cauthdsl] func1 -> DEBU 1d0f 0xc0039bd570 gate 1569284731995465800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:31.996 UTC [cauthdsl] func2 -> DEBU 1d10 0xc0039bd570 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:31.996 UTC [cauthdsl] func2 -> DEBU 1d11 0xc0039bd570 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.002 UTC [cauthdsl] func2 -> DEBU 1d12 0xc0039bd570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:32.002 UTC [cauthdsl] func2 -> DEBU 1d13 0xc0039bd570 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.002 UTC [cauthdsl] func1 -> DEBU 1d14 0xc0039bd570 gate 1569284731995465800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.002 UTC [policies] Evaluate -> DEBU 1d15 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.002 UTC [policies] Evaluate -> DEBU 1d16 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.002 UTC [policies] Evaluate -> DEBU 1d17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.002 UTC [cauthdsl] func1 -> DEBU 1d18 0xc0039bddb0 gate 1569284732002476300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.002 UTC [cauthdsl] func2 -> DEBU 1d19 0xc0039bddb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.002 UTC [cauthdsl] func2 -> DEBU 1d1a 0xc0039bddb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.002 UTC [cauthdsl] func2 -> DEBU 1d1b 0xc0039bddb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.002 UTC [msp.identity] Verify -> DEBU 1d1c Verify: digest = 00000000 72 43 b4 4c 5f 8b c9 58 b2 a4 f6 62 ce 73 57 df |rC.L_..X...b.sW.| +peer0.org1.example.com | 00000010 65 3b e3 91 f3 c7 e0 3c 79 a5 55 b5 57 c6 86 97 |e;..... DEBU 1d1d Verify: sig = 00000000 30 44 02 20 08 7a 8d 18 f0 33 eb f5 13 ec c3 44 |0D. .z...3.....D| +peer0.org1.example.com | 00000010 27 d8 54 d5 cf 2f d5 41 dc 36 34 3b f6 7b 0e 04 |'.T../.A.64;.{..| +peer0.org1.example.com | 00000020 9a 0f d7 87 02 20 47 03 5b cc f6 b7 3b c9 a3 9c |..... G.[...;...| +peer0.org1.example.com | 00000030 7f 8b 46 eb 4c 06 af 99 c1 78 6e a0 4a ff 90 68 |..F.L....xn.J..h| +peer0.org1.example.com | 00000040 e2 18 9b c0 d3 fd |......|" +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [cauthdsl] func2 -> DEBU 1d1e 0xc0039bddb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [cauthdsl] func1 -> DEBU 1d1f 0xc0039bddb0 gate 1569284732002476300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [policies] Evaluate -> DEBU 1d20 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [policies] Evaluate -> DEBU 1d21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [policies] Evaluate -> DEBU 1d22 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [policies] Evaluate -> DEBU 1d23 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d24 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d25 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d26 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d27 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d28 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d29 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.003 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d2a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d2b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.004 UTC [gossip.discovery] sendMemResponse -> DEBU 1d2c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:32.004 UTC [msp] DeserializeIdentity -> DEBU 1d2d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.004 UTC [msp] DeserializeIdentity -> DEBU 1d2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.004 UTC [msp] DeserializeIdentity -> DEBU 1d2f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.004 UTC [gossip.comm] Send -> DEBU 1d30 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:32.004 UTC [gossip.discovery] sendMemResponse -> DEBU 1d31 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" > alive:Y\362\366\241V" > alive: " +peer0.org1.example.com | "2019-09-24 00:25:32.004 UTC [gossip.comm] sendToEndpoint -> DEBU 1d32 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.004 UTC [gossip.comm] sendToEndpoint -> DEBU 1d33 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.184 UTC [msp] DeserializeIdentity -> DEBU 1d34 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.184 UTC [msp] DeserializeIdentity -> DEBU 1d35 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.185 UTC [gossip.comm] Send -> DEBU 1d36 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:32.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1d37 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1d38 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1d39 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1d3a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1d3b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1d3c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.186 UTC [gossip.comm] func1 -> DEBU 1d3d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.187 UTC [gossip.gossip] handleMessage -> DEBU 1d3e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.188 UTC [msp.identity] Verify -> DEBU 1d3f Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:32.188 UTC [msp.identity] Verify -> DEBU 1d40 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:32.188 UTC [msp.identity] Verify -> DEBU 1d41 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:32.188 UTC [msp.identity] Verify -> DEBU 1d42 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [msp] DeserializeIdentity -> DEBU 1d43 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [msp] DeserializeIdentity -> DEBU 1d44 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d45 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d46 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d47 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [policies] Evaluate -> DEBU 1d48 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [policies] Evaluate -> DEBU 1d49 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [policies] Evaluate -> DEBU 1d4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [cauthdsl] func1 -> DEBU 1d4b 0xc003063de0 gate 1569284732189706900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [cauthdsl] func2 -> DEBU 1d4c 0xc003063de0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [cauthdsl] func2 -> DEBU 1d4d 0xc003063de0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [cauthdsl] func2 -> DEBU 1d4e 0xc003063de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [cauthdsl] func2 -> DEBU 1d4f 0xc003063de0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.189 UTC [cauthdsl] func1 -> DEBU 1d50 0xc003063de0 gate 1569284732189706900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.190 UTC [policies] Evaluate -> DEBU 1d51 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.190 UTC [policies] Evaluate -> DEBU 1d52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.190 UTC [policies] Evaluate -> DEBU 1d53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.190 UTC [cauthdsl] func1 -> DEBU 1d54 0xc00307c620 gate 1569284732190170400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.190 UTC [cauthdsl] func2 -> DEBU 1d55 0xc00307c620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.190 UTC [cauthdsl] func2 -> DEBU 1d56 0xc00307c620 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.198 UTC [cauthdsl] func2 -> DEBU 1d58 0xc00307c620 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.198 UTC [msp.identity] Verify -> DEBU 1d59 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:32.199 UTC [msp.identity] Verify -> DEBU 1d5a Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:32.199 UTC [cauthdsl] func2 -> DEBU 1d5b 0xc00307c620 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.199 UTC [cauthdsl] func1 -> DEBU 1d5c 0xc00307c620 gate 1569284732190170400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:32.199 UTC [policies] Evaluate -> DEBU 1d5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.198 UTC [gossip.comm] func1 -> DEBU 1d57 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.199 UTC [policies] Evaluate -> DEBU 1d5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.199 UTC [policies] Evaluate -> DEBU 1d5f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.199 UTC [policies] Evaluate -> DEBU 1d60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.199 UTC [msp] DeserializeIdentity -> DEBU 1d61 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.200 UTC [msp] DeserializeIdentity -> DEBU 1d62 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.200 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d63 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:32.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d64 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d65 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.200 UTC [policies] Evaluate -> DEBU 1d66 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.200 UTC [policies] Evaluate -> DEBU 1d67 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:32.200 UTC [policies] Evaluate -> DEBU 1d68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.200 UTC [cauthdsl] func1 -> DEBU 1d69 0xc00307ddf0 gate 1569284732200855900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.200 UTC [cauthdsl] func2 -> DEBU 1d6a 0xc00307ddf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.200 UTC [cauthdsl] func2 -> DEBU 1d6b 0xc00307ddf0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.200 UTC [cauthdsl] func2 -> DEBU 1d6c 0xc00307ddf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:32.201 UTC [cauthdsl] func2 -> DEBU 1d6d 0xc00307ddf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.201 UTC [cauthdsl] func1 -> DEBU 1d6e 0xc00307ddf0 gate 1569284732200855900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d6f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [cauthdsl] func1 -> DEBU 1d72 0xc0028c4630 gate 1569284732209425400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [cauthdsl] func2 -> DEBU 1d73 0xc0028c4630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [cauthdsl] func2 -> DEBU 1d74 0xc0028c4630 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [cauthdsl] func2 -> DEBU 1d75 0xc0028c4630 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [msp.identity] Verify -> DEBU 1d76 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [msp.identity] Verify -> DEBU 1d77 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [cauthdsl] func2 -> DEBU 1d78 0xc0028c4630 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [cauthdsl] func1 -> DEBU 1d79 0xc0028c4630 gate 1569284732209425400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d7a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d7c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d7d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [gossip.gossip] handleMessage -> DEBU 1d7e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [gossip.gossip] handleMessage -> DEBU 1d7f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [msp] DeserializeIdentity -> DEBU 1d80 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [msp] DeserializeIdentity -> DEBU 1d81 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [msp] DeserializeIdentity -> DEBU 1d82 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d83 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d84 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d85 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [policies] Evaluate -> DEBU 1d86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [policies] Evaluate -> DEBU 1d87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [policies] Evaluate -> DEBU 1d88 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [cauthdsl] func1 -> DEBU 1d89 0xc0028d8140 gate 1569284732210692600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [cauthdsl] func2 -> DEBU 1d8a 0xc0028d8140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [cauthdsl] func2 -> DEBU 1d8b 0xc0028d8140 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [cauthdsl] func2 -> DEBU 1d8c 0xc0028d8140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [cauthdsl] func2 -> DEBU 1d8d 0xc0028d8140 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [cauthdsl] func1 -> DEBU 1d8e 0xc0028d8140 gate 1569284732210692600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [policies] Evaluate -> DEBU 1d8f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.210 UTC [policies] Evaluate -> DEBU 1d90 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.211 UTC [policies] Evaluate -> DEBU 1d91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.211 UTC [cauthdsl] func1 -> DEBU 1d92 0xc0028d8980 gate 1569284732211082100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.211 UTC [cauthdsl] func2 -> DEBU 1d93 0xc0028d8980 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.211 UTC [cauthdsl] func2 -> DEBU 1d94 0xc0028d8980 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.211 UTC [cauthdsl] func2 -> DEBU 1d95 0xc0028d8980 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.211 UTC [msp.identity] Verify -> DEBU 1d96 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:32.211 UTC [msp.identity] Verify -> DEBU 1d97 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:32.219 UTC [cauthdsl] func2 -> DEBU 1d98 0xc0028d8980 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.219 UTC [cauthdsl] func1 -> DEBU 1d99 0xc0028d8980 gate 1569284732211082100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:32.219 UTC [policies] Evaluate -> DEBU 1d9a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.219 UTC [policies] Evaluate -> DEBU 1d9b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.219 UTC [policies] Evaluate -> DEBU 1d9c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.219 UTC [policies] Evaluate -> DEBU 1d9d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.220 UTC [msp.identity] Verify -> DEBU 1d9e Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:32.220 UTC [msp.identity] Verify -> DEBU 1d9f Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:32.221 UTC [msp.identity] Verify -> DEBU 1da0 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:32.221 UTC [msp.identity] Verify -> DEBU 1da1 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:32.227 UTC [msp] DeserializeIdentity -> DEBU 1da2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.227 UTC [msp] DeserializeIdentity -> DEBU 1da3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.232 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1da4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:32.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1da5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1da6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.232 UTC [policies] Evaluate -> DEBU 1da7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.233 UTC [policies] Evaluate -> DEBU 1da8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:32.233 UTC [policies] Evaluate -> DEBU 1da9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.233 UTC [cauthdsl] func1 -> DEBU 1daa 0xc000358f90 gate 1569284732233392300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.233 UTC [cauthdsl] func2 -> DEBU 1dab 0xc000358f90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.233 UTC [cauthdsl] func2 -> DEBU 1dac 0xc000358f90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.233 UTC [cauthdsl] func2 -> DEBU 1dad 0xc000358f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:32.233 UTC [cauthdsl] func2 -> DEBU 1dae 0xc000358f90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.233 UTC [cauthdsl] func1 -> DEBU 1daf 0xc000358f90 gate 1569284732233392300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.233 UTC [policies] Evaluate -> DEBU 1db0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.233 UTC [policies] Evaluate -> DEBU 1db1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.233 UTC [policies] Evaluate -> DEBU 1db2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.234 UTC [cauthdsl] func1 -> DEBU 1db3 0xc0003597d0 gate 1569284732234047900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.234 UTC [cauthdsl] func2 -> DEBU 1db4 0xc0003597d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.234 UTC [cauthdsl] func2 -> DEBU 1db5 0xc0003597d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.234 UTC [cauthdsl] func2 -> DEBU 1db6 0xc0003597d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.234 UTC [msp.identity] Verify -> DEBU 1db7 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:32.234 UTC [msp.identity] Verify -> DEBU 1db8 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:32.234 UTC [cauthdsl] func2 -> DEBU 1db9 0xc0003597d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.235 UTC [cauthdsl] func1 -> DEBU 1dba 0xc0003597d0 gate 1569284732234047900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:32.235 UTC [policies] Evaluate -> DEBU 1dbb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.235 UTC [policies] Evaluate -> DEBU 1dbc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.235 UTC [policies] Evaluate -> DEBU 1dbd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.235 UTC [policies] Evaluate -> DEBU 1dbe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.236 UTC [gossip.gossip] handleMessage -> DEBU 1dbf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.236 UTC [gossip.gossip] handleMessage -> DEBU 1dc0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.236 UTC [msp] DeserializeIdentity -> DEBU 1dc1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.236 UTC [msp] DeserializeIdentity -> DEBU 1dc2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.247 UTC [msp] DeserializeIdentity -> DEBU 1dc3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1dc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dc5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dc6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func1 -> DEBU 1dca 0xc0003712e0 gate 1569284732248245800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dcb 0xc0003712e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dcc 0xc0003712e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dcd 0xc0003712e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dce 0xc0003712e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func1 -> DEBU 1dcf 0xc0003712e0 gate 1569284732248245800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func1 -> DEBU 1dd3 0xc000371b20 gate 1569284732248518400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dd4 0xc000371b20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dd5 0xc000371b20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dd6 0xc000371b20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [msp.identity] Verify -> DEBU 1dd7 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [msp.identity] Verify -> DEBU 1dd8 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dd9 0xc000371b20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [cauthdsl] func1 -> DEBU 1dda 0xc000371b20 gate 1569284732248518400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1ddb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.249 UTC [policies] Evaluate -> DEBU 1ddc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.249 UTC [policies] Evaluate -> DEBU 1ddd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.249 UTC [policies] Evaluate -> DEBU 1dde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.249 UTC [msp.identity] Verify -> DEBU 1ddf Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:32.249 UTC [msp.identity] Verify -> DEBU 1de0 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:32.249 UTC [msp] DeserializeIdentity -> DEBU 1de1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.249 UTC [msp] DeserializeIdentity -> DEBU 1de2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1de3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1de6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1de7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1de8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [cauthdsl] func1 -> DEBU 1de9 0xc00298ba10 gate 1569284732250254100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1dea 0xc00298ba10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1deb 0xc00298ba10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1dec 0xc00298ba10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1ded 0xc00298ba10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [cauthdsl] func1 -> DEBU 1dee 0xc00298ba10 gate 1569284732250254100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1def Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1df0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1df1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [cauthdsl] func1 -> DEBU 1df2 0xc002998250 gate 1569284732250623900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1df3 0xc002998250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1df4 0xc002998250 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1df5 0xc002998250 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [msp.identity] Verify -> DEBU 1df6 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:32.250 UTC [msp.identity] Verify -> DEBU 1df7 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:32.251 UTC [cauthdsl] func2 -> DEBU 1df8 0xc002998250 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.251 UTC [cauthdsl] func1 -> DEBU 1df9 0xc002998250 gate 1569284732250623900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:32.251 UTC [policies] Evaluate -> DEBU 1dfa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.251 UTC [policies] Evaluate -> DEBU 1dfb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.259 UTC [policies] Evaluate -> DEBU 1dfc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.259 UTC [policies] Evaluate -> DEBU 1dfd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.259 UTC [msp.identity] Verify -> DEBU 1dfe Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:32.259 UTC [msp.identity] Verify -> DEBU 1dff Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:32.259 UTC [gossip.gossip] handleMessage -> DEBU 1e00 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.278 UTC [gossip.election] waitForInterrupt -> DEBU 1e01 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.278 UTC [gossip.election] IsLeader -> DEBU 1e02 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:25:32.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 1e03 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:32.278 UTC [msp.identity] Sign -> DEBU 1e04 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510081801 " +peer0.org1.example.com | "2019-09-24 00:25:32.278 UTC [msp.identity] Sign -> DEBU 1e05 Sign: digest: C192D69D6678D7648547712111A482516FD92EC0628C47461371F5A16C6A7420 " +peer0.org1.example.com | "2019-09-24 00:25:32.278 UTC [gossip.election] waitForInterrupt -> DEBU 1e06 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:25:32.279 UTC [msp] DeserializeIdentity -> DEBU 1e07 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.279 UTC [msp] DeserializeIdentity -> DEBU 1e08 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.279 UTC [msp] DeserializeIdentity -> DEBU 1e09 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.279 UTC [msp] DeserializeIdentity -> DEBU 1e0a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.279 UTC [gossip.comm] Send -> DEBU 1e0b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:32.279 UTC [msp] DeserializeIdentity -> DEBU 1e0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.280 UTC [msp] DeserializeIdentity -> DEBU 1e0d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.280 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.280 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.285 UTC [msp] DeserializeIdentity -> DEBU 1e10 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.285 UTC [msp] DeserializeIdentity -> DEBU 1e11 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.285 UTC [gossip.pull] Hello -> DEBU 1e12 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:32.285 UTC [msp] DeserializeIdentity -> DEBU 1e13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.285 UTC [msp] DeserializeIdentity -> DEBU 1e14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.285 UTC [gossip.comm] Send -> DEBU 1e15 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:32.285 UTC [gossip.comm] sendToEndpoint -> DEBU 1e16 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.285 UTC [gossip.comm] sendToEndpoint -> DEBU 1e17 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.288 UTC [gossip.comm] func1 -> DEBU 1e18 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.288 UTC [gossip.gossip] handleMessage -> DEBU 1e19 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.289 UTC [gossip.pull] HandleMessage -> DEBU 1e1a GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.290 UTC [gossip.gossip] handleMessage -> DEBU 1e1b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.699 UTC [gossip.comm] func1 -> DEBU 1e1c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.699 UTC [gossip.gossip] handleMessage -> DEBU 1e1d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.700 UTC [msp] DeserializeIdentity -> DEBU 1e1e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.700 UTC [msp] DeserializeIdentity -> DEBU 1e1f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.700 UTC [gossip.gossip] handleMessage -> DEBU 1e20 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.700 UTC [gossip.comm] func1 -> DEBU 1e21 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.700 UTC [gossip.gossip] handleMessage -> DEBU 1e22 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.700 UTC [gossip.gossip] handleMessage -> DEBU 1e23 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e24 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.705 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e25 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:32.705 UTC [msp] DeserializeIdentity -> DEBU 1e26 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.705 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e27 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:32.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e28 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e29 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:32.705 UTC [policies] Evaluate -> DEBU 1e2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.705 UTC [policies] Evaluate -> DEBU 1e2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [policies] Evaluate -> DEBU 1e2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [cauthdsl] func1 -> DEBU 1e2d 0xc002a9d150 gate 1569284732706077400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e2e 0xc002a9d150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e2f 0xc002a9d150 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e30 0xc002a9d150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e31 0xc002a9d150 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [cauthdsl] func1 -> DEBU 1e32 0xc002a9d150 gate 1569284732706077400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [policies] Evaluate -> DEBU 1e33 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [policies] Evaluate -> DEBU 1e34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [policies] Evaluate -> DEBU 1e35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [cauthdsl] func1 -> DEBU 1e36 0xc002a9d990 gate 1569284732706590800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e37 0xc002a9d990 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e38 0xc002a9d990 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e39 0xc002a9d990 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [msp.identity] Verify -> DEBU 1e3a Verify: digest = 00000000 47 fc e8 ff 71 fb 40 9a a0 9b f9 e2 cf 61 17 5f |G...q.@......a._| +peer0.org1.example.com | 00000010 f5 18 a0 31 ac 72 89 04 e2 d3 80 92 49 88 ee 82 |...1.r......I...|" +peer0.org1.example.com | "2019-09-24 00:25:32.706 UTC [msp.identity] Verify -> DEBU 1e3b Verify: sig = 00000000 30 45 02 21 00 96 69 44 d4 d9 3c f5 01 1a 95 88 |0E.!..iD..<.....| +peer0.org1.example.com | 00000010 dd 89 1e 88 03 8a 7d ef 71 ba 61 f4 9d 06 64 18 |......}.q.a...d.| +peer0.org1.example.com | 00000020 e4 4a 70 2b e8 02 20 0c 74 13 bc a0 42 11 11 17 |.Jp+.. .t...B...| +peer0.org1.example.com | 00000030 81 3a 63 d6 48 36 50 e1 55 9c 74 55 83 b5 0a 17 |.:c.H6P.U.tU....| +peer0.org1.example.com | 00000040 56 ff ef 4f 3b 63 b3 |V..O;c.|" +peer0.org1.example.com | "2019-09-24 00:25:32.707 UTC [cauthdsl] func2 -> DEBU 1e3c 0xc002a9d990 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:32.707 UTC [cauthdsl] func1 -> DEBU 1e3d 0xc002a9d990 gate 1569284732706590800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:32.707 UTC [policies] Evaluate -> DEBU 1e3e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.712 UTC [policies] Evaluate -> DEBU 1e3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.714 UTC [gossip.comm] func1 -> DEBU 1e40 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.714 UTC [gossip.gossip] handleMessage -> DEBU 1e41 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.712 UTC [policies] Evaluate -> DEBU 1e42 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.733 UTC [policies] Evaluate -> DEBU 1e43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:32.734 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e44 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e45 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:32.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e46 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:32.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e47 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:32.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e48 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:32.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e49 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.735 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e4a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.737 UTC [gossip.discovery] sendMemResponse -> DEBU 1e4b Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:32.738 UTC [msp] DeserializeIdentity -> DEBU 1e4c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.738 UTC [msp] DeserializeIdentity -> DEBU 1e4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.738 UTC [msp] DeserializeIdentity -> DEBU 1e4e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.738 UTC [gossip.comm] Send -> DEBU 1e4f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:32.738 UTC [gossip.discovery] sendMemResponse -> DEBU 1e50 Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" > alive: " +peer0.org1.example.com | "2019-09-24 00:25:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 1e51 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 1e52 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.738 UTC [gossip.comm] func1 -> DEBU 1e53 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.737 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e54 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e55 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.805 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e56 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:32.806 UTC [msp.identity] Verify -> DEBU 1e57 Verify: digest = 00000000 93 3d 09 b1 ec 1e 30 e8 93 a9 ad cc 4b 5c 23 6d |.=....0.....K\#m| +peer0.org1.example.com | 00000010 a4 e7 f3 88 61 9f d9 3d 4e ef ac 2a 76 b3 b8 80 |....a..=N..*v...|" +peer0.org1.example.com | "2019-09-24 00:25:32.806 UTC [msp.identity] Verify -> DEBU 1e58 Verify: sig = 00000000 30 45 02 21 00 de de 93 e3 a6 4d e9 79 20 52 01 |0E.!......M.y R.| +peer0.org1.example.com | 00000010 fb f8 a0 65 3e 33 71 10 71 db b9 65 d1 cb b2 cf |...e>3q.q..e....| +peer0.org1.example.com | 00000020 7a cf 8b 65 4a 02 20 1c 70 75 93 95 d4 6f d4 a7 |z..eJ. .pu...o..| +peer0.org1.example.com | 00000030 4e e4 fc e0 74 af 56 03 19 62 db 39 0e 9a e4 da |N...t.V..b.9....| +peer0.org1.example.com | 00000040 44 12 2c 51 26 62 d1 |D.,Q&b.|" +peer0.org1.example.com | "2019-09-24 00:25:32.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e59 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e5a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:32.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e5b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:32.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e5c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:32.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e5d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:32.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e5e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.807 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e5f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.807 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e60 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.807 UTC [gossip.gossip] handleMessage -> DEBU 1e61 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.811 UTC [gossip.comm] func1 -> DEBU 1e62 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.819 UTC [msp] DeserializeIdentity -> DEBU 1e63 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.825 UTC [msp] DeserializeIdentity -> DEBU 1e64 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.825 UTC [msp] DeserializeIdentity -> DEBU 1e65 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.826 UTC [gossip.comm] Send -> DEBU 1e66 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:32.826 UTC [msp] DeserializeIdentity -> DEBU 1e67 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.826 UTC [gossip.comm] Send -> DEBU 1e68 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:32.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1e69 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.844 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.844 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.850 UTC [gossip.comm] func1 -> DEBU 1e6d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.850 UTC [gossip.gossip] handleMessage -> DEBU 1e6e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.850 UTC [gossip.pull] HandleMessage -> DEBU 1e6f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e70 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e71 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e72 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e73 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e74 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e75 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:32.850 UTC [gossip.pull] SendDigest -> DEBU 1e76 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:32.850 UTC [gossip.gossip] handleMessage -> DEBU 1e77 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.854 UTC [gossip.gossip] handleMessage -> DEBU 1e78 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.858 UTC [gossip.gossip] handleMessage -> DEBU 1e79 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.858 UTC [gossip.gossip] handleMessage -> DEBU 1e7a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e7b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e7c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e7d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e7e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.859 UTC [gossip.gossip] handleMessage -> DEBU 1e7f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:32.860 UTC [gossip.gossip] handleMessage -> DEBU 1e80 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.860 UTC [gossip.pull] HandleMessage -> DEBU 1e81 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:32.860 UTC [gossip.pull] SendDigest -> DEBU 1e82 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:32.861 UTC [gossip.gossip] handleMessage -> DEBU 1e83 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:33.185 UTC [gossip.gossip] handleMessage -> DEBU 1e84 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:33.192 UTC [msp] DeserializeIdentity -> DEBU 1e85 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:33.192 UTC [msp] DeserializeIdentity -> DEBU 1e86 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:33.192 UTC [msp] DeserializeIdentity -> DEBU 1e87 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:33.192 UTC [gossip.gossip] handleMessage -> DEBU 1e88 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:33.675 UTC [gossip.comm] func1 -> DEBU 1e89 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:33.675 UTC [gossip.gossip] handleMessage -> DEBU 1e8a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:33.675 UTC [gossip.pull] HandleMessage -> DEBU 1e8b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:33.675 UTC [gossip.pull] SendDigest -> DEBU 1e8c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:33.675 UTC [gossip.gossip] handleMessage -> DEBU 1e8d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:33.716 UTC [gossip.comm] func1 -> DEBU 1e8e Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [gossip.gossip] handleMessage -> DEBU 1e8f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [gossip.gossip] handleMessage -> DEBU 1e90 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e91 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e92 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [msp.identity] Verify -> DEBU 1e93 Verify: digest = 00000000 9f 64 6b da 54 f5 97 49 e2 29 0f 5a 79 91 55 17 |.dk.T..I.).Zy.U.| +peer0.org1.example.com | 00000010 f7 35 d2 95 bb 1a 2e cd 1c 08 a1 f4 36 65 f5 f2 |.5..........6e..|" +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [msp.identity] Verify -> DEBU 1e94 Verify: sig = 00000000 30 44 02 20 34 2a 44 d2 38 a7 bc 75 b9 b7 51 0b |0D. 4*D.8..u..Q.| +peer0.org1.example.com | 00000010 68 32 8a f1 8e 94 83 32 a9 d2 c9 c9 10 6b d1 1a |h2.....2.....k..| +peer0.org1.example.com | 00000020 1b 70 99 80 02 20 37 74 5f f8 42 40 00 d0 88 06 |.p... 7t_.B@....| +peer0.org1.example.com | 00000030 9a 38 33 7b e2 f3 dd 8c f4 d6 21 d6 3c 76 41 5d |.83{......!.o.|" +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [msp.identity] Verify -> DEBU 1e95 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [msp.identity] Verify -> DEBU 1e96 Verify: sig = 00000000 30 44 02 20 69 99 be d5 55 2a 34 77 a6 9e 29 40 |0D. i...U*4w..)@| +peer0.org1.example.com | 00000010 ac 38 69 17 a2 e4 b0 8d 17 67 a5 68 9b 3f fb 26 |.8i......g.h.?.&| +peer0.org1.example.com | 00000020 3f 43 c1 7b 02 20 2b 27 8d 31 02 f1 45 11 0d 22 |?C.{. +'.1..E.."| +peer0.org1.example.com | 00000030 27 57 4e 1f 5a 00 35 18 64 9f 64 b9 1c 7f c9 11 |'WN.Z.5.d.d.....| +peer0.org1.example.com | 00000040 fd fa 23 39 4a 1b |..#9J.|" +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e97 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e98 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e99 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:33.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e9a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:33.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e9b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:33.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e9c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:33.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e9d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:33.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e9e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:33.718 UTC [gossip.discovery] sendMemResponse -> DEBU 1e9f Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:33.718 UTC [msp] DeserializeIdentity -> DEBU 1ea0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:33.718 UTC [msp] DeserializeIdentity -> DEBU 1ea1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:33.718 UTC [gossip.comm] Send -> DEBU 1ea2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:33.718 UTC [gossip.discovery] sendMemResponse -> DEBU 1ea3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:25:33.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:33.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:34.117 UTC [gossip.comm] func1 -> DEBU 1ea6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:34.117 UTC [gossip.gossip] handleMessage -> DEBU 1ea7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:34.117 UTC [msp] DeserializeIdentity -> DEBU 1ea8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:34.117 UTC [msp] DeserializeIdentity -> DEBU 1ea9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:34.117 UTC [msp] DeserializeIdentity -> DEBU 1eaa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:34.117 UTC [gossip.gossip] handleMessage -> DEBU 1eab Exiting" +peer0.org1.example.com | "2019-09-24 00:25:34.595 UTC [msp] GetDefaultSigningIdentity -> DEBU 1eac Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:34.595 UTC [msp.identity] Sign -> DEBU 1ead Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151022 " +peer0.org1.example.com | "2019-09-24 00:25:34.595 UTC [msp.identity] Sign -> DEBU 1eae Sign: digest: 03ED023C1D8346C5C8E54EDF05F278B8943E41BC13A2BEF3EA21C6969373116D " +peer0.org1.example.com | "2019-09-24 00:25:34.597 UTC [msp] GetDefaultSigningIdentity -> DEBU 1eaf Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:34.598 UTC [msp.identity] Sign -> DEBU 1eb0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:34.598 UTC [msp.identity] Sign -> DEBU 1eb1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:34.598 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1eb2 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:34.606 UTC [msp] DeserializeIdentity -> DEBU 1eb3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:34.606 UTC [msp] DeserializeIdentity -> DEBU 1eb4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:34.606 UTC [msp] DeserializeIdentity -> DEBU 1eb5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:34.606 UTC [gossip.comm] Send -> DEBU 1eb6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:34.607 UTC [msp] DeserializeIdentity -> DEBU 1eb7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:34.607 UTC [gossip.comm] Send -> DEBU 1eb8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:34.607 UTC [gossip.comm] Send -> DEBU 1eb9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:34.607 UTC [gossip.comm] sendToEndpoint -> DEBU 1eba Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:34.607 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:34.608 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:34.608 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:34.609 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:34.609 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:34.838 UTC [gossip.comm] func1 -> DEBU 1ec0 Got message: GossipMessage: nonce:7888817266797362290 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\021" signature:"0D\002 Wg\010OK\375\333\330\313\227 \375\375\372C\265'}\360\262{\305\354\327\006l;\n\226\204C\261\002 z\221S\276!*H\215\230\007R\210D\006\374\230\276\037\323\031\327\302\364\352\036\223\246z\254IR\211" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:34.838 UTC [gossip.gossip] handleMessage -> DEBU 1ec1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:7888817266797362290 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\021" signature:"0D\002 Wg\010OK\375\333\330\313\227 \375\375\372C\265'}\360\262{\305\354\327\006l;\n\226\204C\261\002 z\221S\276!*H\215\230\007R\210D\006\374\230\276\037\323\031\327\302\364\352\036\223\246z\254IR\211" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:34.838 UTC [gossip.gossip] handleMessage -> DEBU 1ec2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:34.838 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ec3 Got message: GossipMessage: nonce:7888817266797362290 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\021" signature:"0D\002 Wg\010OK\375\333\330\313\227 \375\375\372C\265'}\360\262{\305\354\327\006l;\n\226\204C\261\002 z\221S\276!*H\215\230\007R\210D\006\374\230\276\037\323\031\327\302\364\352\036\223\246z\254IR\211" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:34.838 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ec4 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:34.838 UTC [msp.identity] Verify -> DEBU 1ec5 Verify: digest = 00000000 dd b0 26 b6 95 7a 85 25 e5 4b 9e 9e 0b c1 38 a2 |..&..z.%.K....8.| +peer0.org1.example.com | 00000010 fc 97 86 e6 45 ed 66 bd b7 a3 11 3c 4b e1 56 58 |....E.f.... DEBU 1ec6 Verify: sig = 00000000 30 44 02 20 57 67 08 4f 4b fd db d8 cb 97 20 fd |0D. Wg.OK..... .| +peer0.org1.example.com | 00000010 fd fa 43 b5 27 7d f0 b2 7b c5 ec d7 06 6c 3b 0a |..C.'}..{....l;.| +peer0.org1.example.com | 00000020 96 84 43 b1 02 20 7a 91 53 be 21 2a 48 8d 98 07 |..C.. z.S.!*H...| +peer0.org1.example.com | 00000030 52 88 44 06 fc 98 be 1f d3 19 d7 c2 f4 ea 1e 93 |R.D.............| +peer0.org1.example.com | 00000040 a6 7a ac 49 52 89 |.z.IR.|" +peer0.org1.example.com | "2019-09-24 00:25:34.839 UTC [msp.identity] Verify -> DEBU 1ec7 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:34.840 UTC [msp.identity] Verify -> DEBU 1ec8 Verify: sig = 00000000 30 45 02 21 00 a1 de 92 8f ee 24 31 6d fe 10 f9 |0E.!......$1m...| +peer0.org1.example.com | 00000010 c5 36 19 2e 8a 89 40 95 ba 37 96 6b 99 6c ff f8 |.6....@..7.k.l..| +peer0.org1.example.com | 00000020 ed a2 a7 7c 6f 02 20 48 4b e3 c0 61 83 61 15 0c |...|o. HK..a.a..| +peer0.org1.example.com | 00000030 0f 44 5e d3 cd ae 90 e5 64 18 54 4b c9 e3 99 e5 |.D^.....d.TK....| +peer0.org1.example.com | 00000040 94 99 d8 d6 03 6e c5 |.....n.|" +peer0.org1.example.com | "2019-09-24 00:25:34.840 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ec9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:34.840 UTC [gossip.discovery] sendMemResponse -> DEBU 1eca Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:34.840 UTC [msp] DeserializeIdentity -> DEBU 1ecb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:34.840 UTC [msp] DeserializeIdentity -> DEBU 1ecc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:34.840 UTC [gossip.comm] Send -> DEBU 1ecd Entering, sending GossipMessage: Channel: , nonce: 7888817266797362290, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:34.840 UTC [gossip.discovery] sendMemResponse -> DEBU 1ece Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:25:34.840 UTC [gossip.comm] sendToEndpoint -> DEBU 1ecf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7888817266797362290, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:34.840 UTC [gossip.comm] sendToEndpoint -> DEBU 1ed0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.017 UTC [gossip.gossip] handleMessage -> DEBU 1ed1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.017 UTC [gossip.gossip] handleMessage -> DEBU 1ed2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ed3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.019 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ed4 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:35.019 UTC [msp] DeserializeIdentity -> DEBU 1ed5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.019 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ed6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:35.019 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ed7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:35.019 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ed8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:35.019 UTC [policies] Evaluate -> DEBU 1ed9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:35.019 UTC [policies] Evaluate -> DEBU 1eda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:35.020 UTC [policies] Evaluate -> DEBU 1edb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:35.020 UTC [cauthdsl] func1 -> DEBU 1edc 0xc002a0a7a0 gate 1569284735020642100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:35.020 UTC [cauthdsl] func2 -> DEBU 1edd 0xc002a0a7a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:35.020 UTC [cauthdsl] func2 -> DEBU 1ede 0xc002a0a7a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:35.020 UTC [cauthdsl] func2 -> DEBU 1edf 0xc002a0a7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:35.021 UTC [cauthdsl] func2 -> DEBU 1ee0 0xc002a0a7a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [cauthdsl] func1 -> DEBU 1ee2 0xc002a0a7a0 gate 1569284735020642100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [policies] Evaluate -> DEBU 1ee3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [policies] Evaluate -> DEBU 1ee4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [policies] Evaluate -> DEBU 1ee5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [cauthdsl] func1 -> DEBU 1ee6 0xc002a0afe0 gate 1569284735035429800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:35.034 UTC [gossip.comm] func1 -> DEBU 1ee1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [cauthdsl] func2 -> DEBU 1ee7 0xc002a0afe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [cauthdsl] func2 -> DEBU 1ee8 0xc002a0afe0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [cauthdsl] func2 -> DEBU 1ee9 0xc002a0afe0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [gossip.gossip] handleMessage -> DEBU 1eea Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [msp.identity] Verify -> DEBU 1eeb Verify: digest = 00000000 90 04 a7 1d f2 f3 f7 0d b3 5a 8b 36 59 85 ed ef |.........Z.6Y...| +peer0.org1.example.com | 00000010 d9 7d 9f 1e 6e a4 e8 b9 e8 6a a0 51 80 7f 7b 80 |.}..n....j.Q..{.|" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [msp.identity] Verify -> DEBU 1eec Verify: sig = 00000000 30 44 02 20 50 e0 3b 74 e2 ab c9 20 ba 17 32 8e |0D. P.;t... ..2.| +peer0.org1.example.com | 00000010 35 d4 91 d9 0a 3a ac 42 78 1f 75 7c 4e de 20 1c |5....:.Bx.u|N. .| +peer0.org1.example.com | 00000020 bc 69 5b b3 02 20 69 37 2c c9 69 ef 37 47 ca e6 |.i[.. i7,.i.7G..| +peer0.org1.example.com | 00000030 df 07 d7 b5 91 48 dd f1 88 d9 37 7d 33 59 8c da |.....H....7}3Y..| +peer0.org1.example.com | 00000040 d2 27 f7 df f4 34 |.'...4|" +peer0.org1.example.com | "2019-09-24 00:25:35.035 UTC [cauthdsl] func2 -> DEBU 1eed 0xc002a0afe0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [cauthdsl] func1 -> DEBU 1eee 0xc002a0afe0 gate 1569284735035429800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [policies] Evaluate -> DEBU 1eef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [policies] Evaluate -> DEBU 1ef0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [policies] Evaluate -> DEBU 1ef1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [policies] Evaluate -> DEBU 1ef2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ef3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef5 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef6 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef7 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ef9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.036 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1efa Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.038 UTC [gossip.gossip] handleMessage -> DEBU 1efb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.038 UTC [gossip.comm] func1 -> DEBU 1efc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.038 UTC [gossip.gossip] handleMessage -> DEBU 1efd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1efe Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1eff Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f00 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f01 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.038 UTC [gossip.gossip] handleMessage -> DEBU 1f02 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.045 UTC [msp] DeserializeIdentity -> DEBU 1f03 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.045 UTC [msp] DeserializeIdentity -> DEBU 1f04 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.045 UTC [msp] DeserializeIdentity -> DEBU 1f05 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.046 UTC [msp] DeserializeIdentity -> DEBU 1f06 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.046 UTC [msp] DeserializeIdentity -> DEBU 1f07 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.046 UTC [msp] DeserializeIdentity -> DEBU 1f08 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.046 UTC [msp] DeserializeIdentity -> DEBU 1f09 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.046 UTC [gossip.comm] Send -> DEBU 1f0a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:35.046 UTC [msp] DeserializeIdentity -> DEBU 1f0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.046 UTC [gossip.comm] Send -> DEBU 1f0c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:35.046 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.046 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.046 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.047 UTC [gossip.comm] sendToEndpoint -> DEBU 1f10 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.646 UTC [msp] GetDefaultSigningIdentity -> DEBU 1f11 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:35.646 UTC [msp.identity] Sign -> DEBU 1f12 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151023 " +peer0.org1.example.com | "2019-09-24 00:25:35.646 UTC [msp.identity] Sign -> DEBU 1f13 Sign: digest: 9AB8DAF64C000295D47C3EDE1CDFA7ECEC9CB3C98FA4B1CD34D25C2B8F711CEE " +peer0.org1.example.com | "2019-09-24 00:25:35.646 UTC [msp] GetDefaultSigningIdentity -> DEBU 1f14 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:35.647 UTC [msp.identity] Sign -> DEBU 1f15 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:35.647 UTC [msp.identity] Sign -> DEBU 1f16 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:35.647 UTC [gossip.comm] Send -> DEBU 1f17 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:35.648 UTC [msp] DeserializeIdentity -> DEBU 1f18 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.648 UTC [gossip.comm] Send -> DEBU 1f19 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:35.649 UTC [msp] DeserializeIdentity -> DEBU 1f1a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.693 UTC [gossip.comm] Send -> DEBU 1f1d Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:35.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1f20 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.695 UTC [gossip.comm] sendToEndpoint -> DEBU 1f21 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.697 UTC [gossip.comm] func1 -> DEBU 1f22 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.697 UTC [gossip.comm] func1 -> DEBU 1f23 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.697 UTC [gossip.gossip] handleMessage -> DEBU 1f24 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.697 UTC [gossip.gossip] handleMessage -> DEBU 1f25 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.698 UTC [gossip.gossip] handleMessage -> DEBU 1f26 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f27 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.698 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f28 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:35.698 UTC [msp] DeserializeIdentity -> DEBU 1f29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.703 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f2a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:35.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f2b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f2c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [cauthdsl] func1 -> DEBU 1f30 0xc0027feb40 gate 1569284735704306400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f31 0xc0027feb40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f32 0xc0027feb40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f33 0xc0027feb40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f34 0xc0027feb40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [cauthdsl] func1 -> DEBU 1f35 0xc0027feb40 gate 1569284735704306400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f36 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [cauthdsl] func1 -> DEBU 1f39 0xc0027ff380 gate 1569284735704720900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f3a 0xc0027ff380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f3b 0xc0027ff380 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f3c 0xc0027ff380 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:35.705 UTC [msp.identity] Verify -> DEBU 1f3d Verify: digest = 00000000 ba 42 b4 71 77 83 b6 3c 05 b0 c5 15 ab 2c 44 83 |.B.qw..<.....,D.| +peer0.org1.example.com | 00000010 74 98 c4 77 b0 5d e1 33 79 a3 0b a8 30 aa 2e 43 |t..w.].3y...0..C|" +peer0.org1.example.com | "2019-09-24 00:25:35.705 UTC [msp.identity] Verify -> DEBU 1f3e Verify: sig = 00000000 30 44 02 20 1d d7 b7 34 5d 06 b1 36 60 65 ee c1 |0D. ...4]..6`e..| +peer0.org1.example.com | 00000010 31 13 85 b2 31 10 85 35 75 5e b2 08 4f 71 1c 1c |1...1..5u^..Oq..| +peer0.org1.example.com | 00000020 e1 34 1b 30 02 20 35 ea bf 3c a6 ca c3 38 13 59 |.4.0. 5..<...8.Y| +peer0.org1.example.com | 00000030 df d4 f9 8a 8e 2a 0e 3e cf 09 cf e3 9a 3f 9d 2e |.....*.>.....?..| +peer0.org1.example.com | 00000040 c1 5b 66 3b 42 b1 |.[f;B.|" +peer0.org1.example.com | "2019-09-24 00:25:35.705 UTC [cauthdsl] func2 -> DEBU 1f3f 0xc0027ff380 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:35.707 UTC [gossip.pull] Hello -> DEBU 1f40 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:35.707 UTC [gossip.comm] Send -> DEBU 1f41 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:35.707 UTC [gossip.pull] Hello -> DEBU 1f42 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:35.707 UTC [gossip.comm] Send -> DEBU 1f43 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:35.707 UTC [gossip.pull] Hello -> DEBU 1f44 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:35.707 UTC [gossip.comm] Send -> DEBU 1f45 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:35.707 UTC [gossip.comm] sendToEndpoint -> DEBU 1f46 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.707 UTC [gossip.comm] sendToEndpoint -> DEBU 1f47 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.707 UTC [gossip.comm] sendToEndpoint -> DEBU 1f48 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.707 UTC [gossip.comm] sendToEndpoint -> DEBU 1f49 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.707 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.708 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.705 UTC [cauthdsl] func1 -> DEBU 1f4c 0xc0027ff380 gate 1569284735704720900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:35.708 UTC [policies] Evaluate -> DEBU 1f4d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.708 UTC [gossip.comm] func1 -> DEBU 1f4e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.708 UTC [policies] Evaluate -> DEBU 1f4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.708 UTC [gossip.comm] func1 -> DEBU 1f50 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.708 UTC [policies] Evaluate -> DEBU 1f51 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.708 UTC [policies] Evaluate -> DEBU 1f52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.708 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f53 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f54 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:35.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f55 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:35.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f56 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:35.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f57 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:35.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f58 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f59 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f5a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.713 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f5c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:35.714 UTC [msp.identity] Verify -> DEBU 1f5d Verify: digest = 00000000 9a b8 da f6 4c 00 02 95 d4 7c 3e de 1c df a7 ec |....L....|>.....| +peer0.org1.example.com | 00000010 ec 9c b3 c9 8f a4 b1 cd 34 d2 5c 2b 8f 71 1c ee |........4.\+.q..|" +peer0.org1.example.com | "2019-09-24 00:25:35.714 UTC [msp.identity] Verify -> DEBU 1f5e Verify: sig = 00000000 30 44 02 20 20 95 c3 47 47 f6 78 51 e0 09 42 8a |0D. ..GG.xQ..B.| +peer0.org1.example.com | 00000010 c2 99 c5 03 a0 1e d7 b0 fb af 63 ea 35 15 4d 6f |..........c.5.Mo| +peer0.org1.example.com | 00000020 8c f1 eb 60 02 20 41 75 4d 43 14 6f 73 60 68 69 |...`. AuMC.os`hi| +peer0.org1.example.com | 00000030 56 1d 3c b2 9a 10 80 69 a9 ff 34 d6 c9 9c a7 5e |V.<....i..4....^| +peer0.org1.example.com | 00000040 19 4d c9 d8 13 8d |.M....|" +peer0.org1.example.com | "2019-09-24 00:25:35.714 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f5f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.714 UTC [gossip.discovery] isSentByMe -> DEBU 1f60 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.714 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f61 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.714 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f62 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:35.714 UTC [msp.identity] Verify -> DEBU 1f63 Verify: digest = 00000000 9f 64 6b da 54 f5 97 49 e2 29 0f 5a 79 91 55 17 |.dk.T..I.).Zy.U.| +peer0.org1.example.com | 00000010 f7 35 d2 95 bb 1a 2e cd 1c 08 a1 f4 36 65 f5 f2 |.5..........6e..|" +peer0.org1.example.com | "2019-09-24 00:25:35.714 UTC [msp.identity] Verify -> DEBU 1f64 Verify: sig = 00000000 30 44 02 20 34 2a 44 d2 38 a7 bc 75 b9 b7 51 0b |0D. 4*D.8..u..Q.| +peer0.org1.example.com | 00000010 68 32 8a f1 8e 94 83 32 a9 d2 c9 c9 10 6b d1 1a |h2.....2.....k..| +peer0.org1.example.com | 00000020 1b 70 99 80 02 20 37 74 5f f8 42 40 00 d0 88 06 |.p... 7t_.B@....| +peer0.org1.example.com | 00000030 9a 38 33 7b e2 f3 dd 8c f4 d6 21 d6 3c 76 41 5d |.83{......!.o.|" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f65 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f66 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f67 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.gossip] handleMessage -> DEBU 1f68 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.gossip] handleMessage -> DEBU 1f69 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.gossip] handleMessage -> DEBU 1f6a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.gossip] handleMessage -> DEBU 1f6b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f6d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [msp.identity] Verify -> DEBU 1f6e Verify: digest = 00000000 9a b8 da f6 4c 00 02 95 d4 7c 3e de 1c df a7 ec |....L....|>.....| +peer0.org1.example.com | 00000010 ec 9c b3 c9 8f a4 b1 cd 34 d2 5c 2b 8f 71 1c ee |........4.\+.q..|" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [msp.identity] Verify -> DEBU 1f6f Verify: sig = 00000000 30 44 02 20 20 95 c3 47 47 f6 78 51 e0 09 42 8a |0D. ..GG.xQ..B.| +peer0.org1.example.com | 00000010 c2 99 c5 03 a0 1e d7 b0 fb af 63 ea 35 15 4d 6f |..........c.5.Mo| +peer0.org1.example.com | 00000020 8c f1 eb 60 02 20 41 75 4d 43 14 6f 73 60 68 69 |...`. AuMC.os`hi| +peer0.org1.example.com | 00000030 56 1d 3c b2 9a 10 80 69 a9 ff 34 d6 c9 9c a7 5e |V.<....i..4....^| +peer0.org1.example.com | 00000040 19 4d c9 d8 13 8d |.M....|" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f70 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.discovery] isSentByMe -> DEBU 1f71 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f72 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f73 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [msp.identity] Verify -> DEBU 1f74 Verify: digest = 00000000 9f 64 6b da 54 f5 97 49 e2 29 0f 5a 79 91 55 17 |.dk.T..I.).Zy.U.| +peer0.org1.example.com | 00000010 f7 35 d2 95 bb 1a 2e cd 1c 08 a1 f4 36 65 f5 f2 |.5..........6e..|" +peer0.org1.example.com | "2019-09-24 00:25:35.715 UTC [msp.identity] Verify -> DEBU 1f75 Verify: sig = 00000000 30 44 02 20 34 2a 44 d2 38 a7 bc 75 b9 b7 51 0b |0D. 4*D.8..u..Q.| +peer0.org1.example.com | 00000010 68 32 8a f1 8e 94 83 32 a9 d2 c9 c9 10 6b d1 1a |h2.....2.....k..| +peer0.org1.example.com | 00000020 1b 70 99 80 02 20 37 74 5f f8 42 40 00 d0 88 06 |.p... 7t_.B@....| +peer0.org1.example.com | 00000030 9a 38 33 7b e2 f3 dd 8c f4 d6 21 d6 3c 76 41 5d |.83{......!.o.|" +peer0.org1.example.com | "2019-09-24 00:25:35.716 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f76 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.716 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f77 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f78 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f7a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.716 UTC [gossip.gossip] handleMessage -> DEBU 1f7b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.717 UTC [gossip.gossip] handleMessage -> DEBU 1f7c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.717 UTC [gossip.gossip] handleMessage -> DEBU 1f7d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.717 UTC [gossip.gossip] handleMessage -> DEBU 1f7e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f7f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.717 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f80 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:35.717 UTC [gossip.comm] func1 -> DEBU 1f81 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.717 UTC [msp.identity] Verify -> DEBU 1f82 Verify: digest = 00000000 9a b8 da f6 4c 00 02 95 d4 7c 3e de 1c df a7 ec |....L....|>.....| +peer0.org1.example.com | 00000010 ec 9c b3 c9 8f a4 b1 cd 34 d2 5c 2b 8f 71 1c ee |........4.\+.q..|" +peer0.org1.example.com | "2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f83 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f84 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f85 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f86 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f87 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f88 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.725 UTC [gossip.comm] Send -> DEBU 1f89 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f8a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f8b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.726 UTC [gossip.comm] Send -> DEBU 1f8c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:35.726 UTC [gossip.comm] sendToEndpoint -> DEBU 1f8d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.726 UTC [gossip.comm] sendToEndpoint -> DEBU 1f8e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.726 UTC [gossip.comm] sendToEndpoint -> DEBU 1f8f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.726 UTC [gossip.comm] sendToEndpoint -> DEBU 1f90 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.726 UTC [gossip.comm] func1 -> DEBU 1f91 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.717 UTC [msp.identity] Verify -> DEBU 1f92 Verify: sig = 00000000 30 44 02 20 20 95 c3 47 47 f6 78 51 e0 09 42 8a |0D. ..GG.xQ..B.| +peer0.org1.example.com | 00000010 c2 99 c5 03 a0 1e d7 b0 fb af 63 ea 35 15 4d 6f |..........c.5.Mo| +peer0.org1.example.com | 00000020 8c f1 eb 60 02 20 41 75 4d 43 14 6f 73 60 68 69 |...`. AuMC.os`hi| +peer0.org1.example.com | 00000030 56 1d 3c b2 9a 10 80 69 a9 ff 34 d6 c9 9c a7 5e |V.<....i..4....^| +peer0.org1.example.com | 00000040 19 4d c9 d8 13 8d |.M....|" +peer0.org1.example.com | "2019-09-24 00:25:35.727 UTC [msp.identity] Verify -> DEBU 1f93 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:35.727 UTC [msp.identity] Verify -> DEBU 1f94 Verify: sig = 00000000 30 45 02 21 00 99 4f b8 11 21 56 4a 59 69 2f f6 |0E.!..O..!VJYi/.| +peer0.org1.example.com | 00000010 86 84 a6 71 1b 45 3b bf d6 5b fb 3f a5 b8 83 42 |...q.E;..[.?...B| +peer0.org1.example.com | 00000020 28 1e 85 6d ed 02 20 72 26 9f 7a 92 ba c8 29 31 |(..m.. r&.z...)1| +peer0.org1.example.com | 00000030 31 c8 bb d6 fd 91 1f 6c 53 96 b7 75 bf b7 e8 72 |1......lS..u...r| +peer0.org1.example.com | 00000040 24 bb ff 19 11 73 5b |$....s[|" +peer0.org1.example.com | "2019-09-24 00:25:35.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f95 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.727 UTC [gossip.discovery] isSentByMe -> DEBU 1f96 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f97 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.727 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f98 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.727 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f99 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.727 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f9a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.727 UTC [gossip.gossip] handleMessage -> DEBU 1f9b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.727 UTC [gossip.gossip] handleMessage -> DEBU 1f9c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.728 UTC [gossip.pull] HandleMessage -> DEBU 1f9d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.728 UTC [gossip.gossip] handleMessage -> DEBU 1f9e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.728 UTC [gossip.gossip] handleMessage -> DEBU 1f9f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.728 UTC [gossip.pull] HandleMessage -> DEBU 1fa0 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.728 UTC [gossip.gossip] handleMessage -> DEBU 1fa1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.728 UTC [gossip.gossip] handleMessage -> DEBU 1fa2 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.728 UTC [gossip.pull] HandleMessage -> DEBU 1fa3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.728 UTC [gossip.gossip] handleMessage -> DEBU 1fa4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.970 UTC [gossip.gossip] handleMessage -> DEBU 1fa5 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.970 UTC [gossip.pull] HandleMessage -> DEBU 1fa6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1fa7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1fa8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1fa9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1faa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1fab Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1fac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.974 UTC [gossip.pull] SendDigest -> DEBU 1fad Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:35.974 UTC [gossip.gossip] handleMessage -> DEBU 1fae Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.987 UTC [gossip.gossip] handleMessage -> DEBU 1faf Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.987 UTC [gossip.gossip] handleMessage -> DEBU 1fb0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:35.987 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fb1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:35.988 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fb2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:35.988 UTC [msp] DeserializeIdentity -> DEBU 1fb3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:35.988 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fb4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:35.988 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:35.988 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:35.988 UTC [policies] Evaluate -> DEBU 1fb7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:35.988 UTC [policies] Evaluate -> DEBU 1fb8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [policies] Evaluate -> DEBU 1fb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [cauthdsl] func1 -> DEBU 1fba 0xc003632690 gate 1569284735989073600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [cauthdsl] func2 -> DEBU 1fbb 0xc003632690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [cauthdsl] func2 -> DEBU 1fbc 0xc003632690 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [cauthdsl] func2 -> DEBU 1fbd 0xc003632690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [cauthdsl] func2 -> DEBU 1fbe 0xc003632690 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [cauthdsl] func1 -> DEBU 1fbf 0xc003632690 gate 1569284735989073600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [policies] Evaluate -> DEBU 1fc0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [policies] Evaluate -> DEBU 1fc1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [policies] Evaluate -> DEBU 1fc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [cauthdsl] func1 -> DEBU 1fc3 0xc003632ed0 gate 1569284735989630800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:35.989 UTC [cauthdsl] func2 -> DEBU 1fc4 0xc003632ed0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.006 UTC [cauthdsl] func2 -> DEBU 1fc5 0xc003632ed0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.006 UTC [cauthdsl] func2 -> DEBU 1fc6 0xc003632ed0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.006 UTC [msp.identity] Verify -> DEBU 1fc7 Verify: digest = 00000000 95 9f cd d9 bd 4d 99 70 74 38 c3 1a b8 df 6e 71 |.....M.pt8....nq| +peer0.org1.example.com | 00000010 87 2f 53 f2 bc c9 95 03 5d d7 ee e7 05 d4 04 6d |./S.....]......m|" +peer0.org1.example.com | "2019-09-24 00:25:36.006 UTC [msp.identity] Verify -> DEBU 1fc8 Verify: sig = 00000000 30 44 02 20 35 a4 ee 32 e9 bb 42 2f e3 d3 5b e3 |0D. 5..2..B/..[.| +peer0.org1.example.com | 00000010 31 16 a1 5b 3c b0 31 1a fe df 0d 08 64 ff b7 cf |1..[<.1.....d...| +peer0.org1.example.com | 00000020 1b f8 ce bb 02 20 31 58 97 2e 9f d3 30 a3 4e 99 |..... 1X....0.N.| +peer0.org1.example.com | 00000030 b6 19 96 73 4c 98 df 11 e2 fd ab 25 e5 8e 00 57 |...sL......%...W| +peer0.org1.example.com | 00000040 99 0e 80 0a e3 ac |......|" +peer0.org1.example.com | "2019-09-24 00:25:36.007 UTC [cauthdsl] func2 -> DEBU 1fc9 0xc003632ed0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.007 UTC [cauthdsl] func1 -> DEBU 1fca 0xc003632ed0 gate 1569284735989630800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:36.007 UTC [policies] Evaluate -> DEBU 1fcb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.007 UTC [policies] Evaluate -> DEBU 1fcc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.007 UTC [policies] Evaluate -> DEBU 1fcd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.007 UTC [policies] Evaluate -> DEBU 1fce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.007 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fcf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.007 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fd0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:36.007 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fd1 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:36.008 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fd2 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:36.008 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fd3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:36.008 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fd4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.008 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fd5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.008 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fd6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.008 UTC [gossip.discovery] sendMemResponse -> DEBU 1fd7 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:36.008 UTC [msp] DeserializeIdentity -> DEBU 1fd8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.017 UTC [msp] DeserializeIdentity -> DEBU 1fd9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.017 UTC [msp] DeserializeIdentity -> DEBU 1fda Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.017 UTC [gossip.comm] Send -> DEBU 1fdb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:36.021 UTC [gossip.comm] sendToEndpoint -> DEBU 1fdc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.021 UTC [gossip.comm] sendToEndpoint -> DEBU 1fdd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.021 UTC [gossip.discovery] sendMemResponse -> DEBU 1fde Exiting, replying with alive:\317\t\317\343\232?\235.\301[f;B\261" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" > alive: " +peer0.org1.example.com | "2019-09-24 00:25:36.207 UTC [msp] DeserializeIdentity -> DEBU 1fdf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.207 UTC [msp] DeserializeIdentity -> DEBU 1fe0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.207 UTC [gossip.comm] Send -> DEBU 1fe1 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:36.207 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.207 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.208 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.208 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.208 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.208 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.211 UTC [gossip.comm] func1 -> DEBU 1fe8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.211 UTC [gossip.gossip] handleMessage -> DEBU 1fe9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.212 UTC [msp.identity] Verify -> DEBU 1fea Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:36.212 UTC [msp.identity] Verify -> DEBU 1feb Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:36.212 UTC [msp.identity] Verify -> DEBU 1fec Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:36.212 UTC [msp.identity] Verify -> DEBU 1fed Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:36.213 UTC [msp] DeserializeIdentity -> DEBU 1fee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.213 UTC [msp] DeserializeIdentity -> DEBU 1fef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ff0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ff1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ff2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ff3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ff4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ff5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [cauthdsl] func1 -> DEBU 1ff6 0xc0040bc780 gate 1569284736214592000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [cauthdsl] func2 -> DEBU 1ff7 0xc0040bc780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [cauthdsl] func2 -> DEBU 1ff8 0xc0040bc780 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [cauthdsl] func2 -> DEBU 1ff9 0xc0040bc780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [cauthdsl] func2 -> DEBU 1ffa 0xc0040bc780 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [cauthdsl] func1 -> DEBU 1ffb 0xc0040bc780 gate 1569284736214592000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ffc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ffd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ffe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [cauthdsl] func1 -> DEBU 1fff 0xc0040bcfc0 gate 1569284736215023200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [cauthdsl] func2 -> DEBU 2000 0xc0040bcfc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [cauthdsl] func2 -> DEBU 2001 0xc0040bcfc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [cauthdsl] func2 -> DEBU 2002 0xc0040bcfc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [msp.identity] Verify -> DEBU 2003 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [msp.identity] Verify -> DEBU 2004 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [cauthdsl] func2 -> DEBU 2005 0xc0040bcfc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [cauthdsl] func1 -> DEBU 2006 0xc0040bcfc0 gate 1569284736215023200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [policies] Evaluate -> DEBU 2007 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [policies] Evaluate -> DEBU 2008 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [policies] Evaluate -> DEBU 2009 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [policies] Evaluate -> DEBU 200a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.215 UTC [msp] DeserializeIdentity -> DEBU 200b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.216 UTC [msp] DeserializeIdentity -> DEBU 200c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.216 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 200d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:36.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 200e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 200f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.216 UTC [policies] Evaluate -> DEBU 2010 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.216 UTC [policies] Evaluate -> DEBU 2011 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:36.217 UTC [policies] Evaluate -> DEBU 2012 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.217 UTC [cauthdsl] func1 -> DEBU 2013 0xc0040ce790 gate 1569284736217309600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.217 UTC [cauthdsl] func2 -> DEBU 2014 0xc0040ce790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.217 UTC [cauthdsl] func2 -> DEBU 2015 0xc0040ce790 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.217 UTC [cauthdsl] func2 -> DEBU 2016 0xc0040ce790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:36.217 UTC [cauthdsl] func2 -> DEBU 2017 0xc0040ce790 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.217 UTC [cauthdsl] func1 -> DEBU 2018 0xc0040ce790 gate 1569284736217309600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.231 UTC [policies] Evaluate -> DEBU 2019 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.232 UTC [policies] Evaluate -> DEBU 201a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.232 UTC [policies] Evaluate -> DEBU 201b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.232 UTC [cauthdsl] func1 -> DEBU 201c 0xc0040cefd0 gate 1569284736232174000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.232 UTC [cauthdsl] func2 -> DEBU 201d 0xc0040cefd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.232 UTC [cauthdsl] func2 -> DEBU 201e 0xc0040cefd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.232 UTC [cauthdsl] func2 -> DEBU 201f 0xc0040cefd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.232 UTC [msp.identity] Verify -> DEBU 2020 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:36.232 UTC [msp.identity] Verify -> DEBU 2021 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:36.233 UTC [cauthdsl] func2 -> DEBU 2022 0xc0040cefd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.233 UTC [cauthdsl] func1 -> DEBU 2023 0xc0040cefd0 gate 1569284736232174000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:36.233 UTC [policies] Evaluate -> DEBU 2024 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.233 UTC [policies] Evaluate -> DEBU 2025 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.233 UTC [policies] Evaluate -> DEBU 2026 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.233 UTC [policies] Evaluate -> DEBU 2027 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.233 UTC [gossip.gossip] handleMessage -> DEBU 2028 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.234 UTC [gossip.gossip] handleMessage -> DEBU 2029 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.242 UTC [msp] DeserializeIdentity -> DEBU 202a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.242 UTC [msp] DeserializeIdentity -> DEBU 202b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.243 UTC [msp] DeserializeIdentity -> DEBU 202c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.243 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 202d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:36.243 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 202e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.243 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 202f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.243 UTC [policies] Evaluate -> DEBU 2030 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.243 UTC [policies] Evaluate -> DEBU 2031 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:36.244 UTC [policies] Evaluate -> DEBU 2032 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.244 UTC [cauthdsl] func1 -> DEBU 2033 0xc0040e0b10 gate 1569284736244190800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.244 UTC [cauthdsl] func2 -> DEBU 2034 0xc0040e0b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.251 UTC [gossip.comm] func1 -> DEBU 2035 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.249 UTC [cauthdsl] func2 -> DEBU 2036 0xc0040e0b10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.282 UTC [cauthdsl] func2 -> DEBU 2037 0xc0040e0b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:36.283 UTC [cauthdsl] func2 -> DEBU 2038 0xc0040e0b10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.283 UTC [cauthdsl] func1 -> DEBU 2039 0xc0040e0b10 gate 1569284736244190800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.283 UTC [policies] Evaluate -> DEBU 203a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.284 UTC [policies] Evaluate -> DEBU 203b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.284 UTC [policies] Evaluate -> DEBU 203c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.284 UTC [cauthdsl] func1 -> DEBU 203d 0xc0040e1350 gate 1569284736284765100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.284 UTC [cauthdsl] func2 -> DEBU 203e 0xc0040e1350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.286 UTC [msp] DeserializeIdentity -> DEBU 203f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.286 UTC [msp] DeserializeIdentity -> DEBU 2040 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.286 UTC [gossip.pull] Hello -> DEBU 2041 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:36.287 UTC [msp] DeserializeIdentity -> DEBU 2042 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.287 UTC [msp] DeserializeIdentity -> DEBU 2043 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.287 UTC [gossip.comm] Send -> DEBU 2044 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:36.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2045 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2046 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.289 UTC [gossip.comm] func1 -> DEBU 2047 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.285 UTC [cauthdsl] func2 -> DEBU 2048 0xc0040e1350 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.290 UTC [cauthdsl] func2 -> DEBU 2049 0xc0040e1350 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.292 UTC [msp.identity] Verify -> DEBU 204a Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:36.292 UTC [msp.identity] Verify -> DEBU 204b Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:36.292 UTC [cauthdsl] func2 -> DEBU 204c 0xc0040e1350 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.293 UTC [cauthdsl] func1 -> DEBU 204d 0xc0040e1350 gate 1569284736284765100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:36.293 UTC [policies] Evaluate -> DEBU 204e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.293 UTC [policies] Evaluate -> DEBU 204f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.298 UTC [policies] Evaluate -> DEBU 2050 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.298 UTC [policies] Evaluate -> DEBU 2051 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.299 UTC [msp.identity] Verify -> DEBU 2052 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:36.299 UTC [msp.identity] Verify -> DEBU 2053 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:36.300 UTC [msp.identity] Verify -> DEBU 2054 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:36.300 UTC [msp.identity] Verify -> DEBU 2055 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:36.330 UTC [msp] DeserializeIdentity -> DEBU 2056 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.330 UTC [msp] DeserializeIdentity -> DEBU 2057 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.330 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2058 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:36.330 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2059 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.330 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 205a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.330 UTC [policies] Evaluate -> DEBU 205b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.330 UTC [policies] Evaluate -> DEBU 205c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:36.330 UTC [policies] Evaluate -> DEBU 205d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [cauthdsl] func1 -> DEBU 205e 0xc004103960 gate 1569284736330994700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 205f 0xc004103960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 2060 0xc004103960 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 2061 0xc004103960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 2062 0xc004103960 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [cauthdsl] func1 -> DEBU 2063 0xc004103960 gate 1569284736330994700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [policies] Evaluate -> DEBU 2064 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [policies] Evaluate -> DEBU 2065 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [policies] Evaluate -> DEBU 2066 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [cauthdsl] func1 -> DEBU 2067 0xc0041221a0 gate 1569284736331593700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 2068 0xc0041221a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 2069 0xc0041221a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 206a 0xc0041221a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [msp.identity] Verify -> DEBU 206b Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:36.331 UTC [msp.identity] Verify -> DEBU 206c Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:36.332 UTC [cauthdsl] func2 -> DEBU 206d 0xc0041221a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.332 UTC [cauthdsl] func1 -> DEBU 206e 0xc0041221a0 gate 1569284736331593700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:36.332 UTC [policies] Evaluate -> DEBU 206f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.332 UTC [policies] Evaluate -> DEBU 2070 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.332 UTC [policies] Evaluate -> DEBU 2071 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.332 UTC [policies] Evaluate -> DEBU 2072 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.332 UTC [gossip.gossip] handleMessage -> DEBU 2073 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.332 UTC [gossip.gossip] handleMessage -> DEBU 2074 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.332 UTC [msp] DeserializeIdentity -> DEBU 2075 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.332 UTC [msp] DeserializeIdentity -> DEBU 2076 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.332 UTC [msp] DeserializeIdentity -> DEBU 2077 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.333 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2078 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:36.333 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2079 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.333 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 207a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.333 UTC [policies] Evaluate -> DEBU 207b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.334 UTC [policies] Evaluate -> DEBU 207c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:36.334 UTC [policies] Evaluate -> DEBU 207d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.334 UTC [cauthdsl] func1 -> DEBU 207e 0xc004123cb0 gate 1569284736334344500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.334 UTC [cauthdsl] func2 -> DEBU 207f 0xc004123cb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.335 UTC [cauthdsl] func2 -> DEBU 2080 0xc004123cb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.335 UTC [cauthdsl] func2 -> DEBU 2081 0xc004123cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:36.336 UTC [cauthdsl] func2 -> DEBU 2082 0xc004123cb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.336 UTC [cauthdsl] func1 -> DEBU 2083 0xc004123cb0 gate 1569284736334344500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.336 UTC [policies] Evaluate -> DEBU 2084 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.336 UTC [policies] Evaluate -> DEBU 2085 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.336 UTC [policies] Evaluate -> DEBU 2086 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.336 UTC [cauthdsl] func1 -> DEBU 2087 0xc0041364f0 gate 1569284736336635800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.336 UTC [cauthdsl] func2 -> DEBU 2088 0xc0041364f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.336 UTC [cauthdsl] func2 -> DEBU 2089 0xc0041364f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.337 UTC [cauthdsl] func2 -> DEBU 208a 0xc0041364f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.337 UTC [msp.identity] Verify -> DEBU 208b Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:36.337 UTC [msp.identity] Verify -> DEBU 208c Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:36.337 UTC [cauthdsl] func2 -> DEBU 208d 0xc0041364f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.337 UTC [cauthdsl] func1 -> DEBU 208e 0xc0041364f0 gate 1569284736336635800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:36.337 UTC [policies] Evaluate -> DEBU 208f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.337 UTC [policies] Evaluate -> DEBU 2090 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.337 UTC [policies] Evaluate -> DEBU 2091 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.338 UTC [policies] Evaluate -> DEBU 2092 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.338 UTC [msp.identity] Verify -> DEBU 2093 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:36.338 UTC [msp.identity] Verify -> DEBU 2094 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:36.338 UTC [msp] DeserializeIdentity -> DEBU 2095 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.338 UTC [msp] DeserializeIdentity -> DEBU 2096 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.339 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2097 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:36.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2098 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2099 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.340 UTC [policies] Evaluate -> DEBU 209a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.340 UTC [policies] Evaluate -> DEBU 209b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:36.340 UTC [policies] Evaluate -> DEBU 209c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.340 UTC [cauthdsl] func1 -> DEBU 209d 0xc00414a3e0 gate 1569284736340424100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.340 UTC [cauthdsl] func2 -> DEBU 209e 0xc00414a3e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.340 UTC [cauthdsl] func2 -> DEBU 209f 0xc00414a3e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.382 UTC [cauthdsl] func2 -> DEBU 20a0 0xc00414a3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:36.382 UTC [cauthdsl] func2 -> DEBU 20a1 0xc00414a3e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.382 UTC [cauthdsl] func1 -> DEBU 20a2 0xc00414a3e0 gate 1569284736340424100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.382 UTC [policies] Evaluate -> DEBU 20a3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.382 UTC [policies] Evaluate -> DEBU 20a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.382 UTC [policies] Evaluate -> DEBU 20a5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.382 UTC [cauthdsl] func1 -> DEBU 20a6 0xc00414ac20 gate 1569284736382875800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.382 UTC [cauthdsl] func2 -> DEBU 20a7 0xc00414ac20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.384 UTC [cauthdsl] func2 -> DEBU 20a8 0xc00414ac20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.384 UTC [cauthdsl] func2 -> DEBU 20a9 0xc00414ac20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.385 UTC [msp.identity] Verify -> DEBU 20aa Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:36.385 UTC [msp.identity] Verify -> DEBU 20ab Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:36.385 UTC [cauthdsl] func2 -> DEBU 20ac 0xc00414ac20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.385 UTC [cauthdsl] func1 -> DEBU 20ad 0xc00414ac20 gate 1569284736382875800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:36.386 UTC [policies] Evaluate -> DEBU 20ae Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.386 UTC [policies] Evaluate -> DEBU 20af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.386 UTC [policies] Evaluate -> DEBU 20b0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.386 UTC [policies] Evaluate -> DEBU 20b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.410 UTC [msp.identity] Verify -> DEBU 20b2 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:36.411 UTC [msp.identity] Verify -> DEBU 20b3 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:36.411 UTC [gossip.gossip] handleMessage -> DEBU 20b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.411 UTC [gossip.gossip] handleMessage -> DEBU 20b5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.411 UTC [gossip.pull] HandleMessage -> DEBU 20b6 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.411 UTC [gossip.gossip] handleMessage -> DEBU 20b7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.695 UTC [gossip.comm] func1 -> DEBU 20b8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.696 UTC [gossip.gossip] handleMessage -> DEBU 20b9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.696 UTC [msp] DeserializeIdentity -> DEBU 20ba Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.697 UTC [msp] DeserializeIdentity -> DEBU 20bb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.697 UTC [gossip.gossip] handleMessage -> DEBU 20bc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.719 UTC [gossip.comm] func1 -> DEBU 20bd Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.719 UTC [gossip.gossip] handleMessage -> DEBU 20be Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.719 UTC [gossip.gossip] handleMessage -> DEBU 20bf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20c0 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20c1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [msp] DeserializeIdentity -> DEBU 20c2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20c4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20c5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [cauthdsl] func1 -> DEBU 20c9 0xc0041685c0 gate 1569284736720471300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20ca 0xc0041685c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20cb 0xc0041685c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20cc 0xc0041685c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20cd 0xc0041685c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [cauthdsl] func1 -> DEBU 20ce 0xc0041685c0 gate 1569284736720471300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20cf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [cauthdsl] func1 -> DEBU 20d2 0xc004168e00 gate 1569284736720818700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20d3 0xc004168e00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20d4 0xc004168e00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20d5 0xc004168e00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.720 UTC [msp.identity] Verify -> DEBU 20d6 Verify: digest = 00000000 4a db 2c 8d 8d 21 5a 31 21 54 d6 e0 cd 22 a0 e9 |J.,..!Z1!T..."..| +peer0.org1.example.com | 00000010 e9 a3 bc 63 00 c8 a4 c6 d8 d9 8c b9 72 9b 7f e6 |...c........r...|" +peer0.org1.example.com | "2019-09-24 00:25:36.721 UTC [msp.identity] Verify -> DEBU 20d7 Verify: sig = 00000000 30 44 02 20 68 f7 4e 05 c5 b9 75 32 63 23 6c d9 |0D. h.N...u2c#l.| +peer0.org1.example.com | 00000010 ce 62 c3 9a 2c 3a 55 f8 7e 79 61 c3 6e a6 8f c1 |.b..,:U.~ya.n...| +peer0.org1.example.com | 00000020 29 8f c2 62 02 20 40 33 d5 7d b2 ac 8e c2 04 95 |)..b. @3.}......| +peer0.org1.example.com | 00000030 9b 50 f0 c9 be 6e bd 53 c7 d4 22 2d ab d4 5e 7b |.P...n.S.."-..^{| +peer0.org1.example.com | 00000040 7d 96 a6 65 55 70 |}..eUp|" +peer0.org1.example.com | "2019-09-24 00:25:36.721 UTC [cauthdsl] func2 -> DEBU 20d8 0xc004168e00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:36.726 UTC [cauthdsl] func1 -> DEBU 20d9 0xc004168e00 gate 1569284736720818700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:36.726 UTC [policies] Evaluate -> DEBU 20da Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.726 UTC [policies] Evaluate -> DEBU 20db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.726 UTC [policies] Evaluate -> DEBU 20dc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.727 UTC [policies] Evaluate -> DEBU 20dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:36.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 20de Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 20df Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:36.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e0 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:36.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e1 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:36.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:36.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 20e4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20e5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.728 UTC [gossip.discovery] sendMemResponse -> DEBU 20e6 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:36.748 UTC [gossip.comm] func1 -> DEBU 20e7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.749 UTC [gossip.gossip] handleMessage -> DEBU 20e8 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.749 UTC [gossip.pull] HandleMessage -> DEBU 20e9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.749 UTC [msp] DeserializeIdentity -> DEBU 20ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.749 UTC [msp] DeserializeIdentity -> DEBU 20eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.749 UTC [msp] DeserializeIdentity -> DEBU 20ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.749 UTC [msp] DeserializeIdentity -> DEBU 20ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.749 UTC [msp] DeserializeIdentity -> DEBU 20ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.750 UTC [msp] DeserializeIdentity -> DEBU 20ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.750 UTC [gossip.pull] SendDigest -> DEBU 20f0 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:36.750 UTC [gossip.gossip] handleMessage -> DEBU 20f1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.768 UTC [msp] DeserializeIdentity -> DEBU 20f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.769 UTC [msp] DeserializeIdentity -> DEBU 20f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.769 UTC [msp] DeserializeIdentity -> DEBU 20f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:36.770 UTC [gossip.comm] Send -> DEBU 20f5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:36.776 UTC [gossip.discovery] sendMemResponse -> DEBU 20f6 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:36.776 UTC [gossip.comm] sendToEndpoint -> DEBU 20f7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.776 UTC [gossip.comm] sendToEndpoint -> DEBU 20f8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:36.791 UTC [gossip.comm] func1 -> DEBU 20f9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.791 UTC [gossip.gossip] handleMessage -> DEBU 20fa Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.792 UTC [gossip.pull] HandleMessage -> DEBU 20fb GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:36.792 UTC [gossip.pull] SendDigest -> DEBU 20fc Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:36.792 UTC [gossip.gossip] handleMessage -> DEBU 20fd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.178 UTC [gossip.gossip] handleMessage -> DEBU 20fe Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.178 UTC [msp] DeserializeIdentity -> DEBU 20ff Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.178 UTC [msp] DeserializeIdentity -> DEBU 2100 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.178 UTC [msp] DeserializeIdentity -> DEBU 2101 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.178 UTC [gossip.gossip] handleMessage -> DEBU 2102 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.283 UTC [gossip.election] waitForInterrupt -> DEBU 2103 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.283 UTC [gossip.election] IsLeader -> DEBU 2104 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:25:37.284 UTC [msp] GetDefaultSigningIdentity -> DEBU 2105 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:37.285 UTC [msp.identity] Sign -> DEBU 2106 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510091801 " +peer0.org1.example.com | "2019-09-24 00:25:37.285 UTC [msp.identity] Sign -> DEBU 2107 Sign: digest: 7F5E5A479F4AFE2FB2B8DEC53B487966A12B58A30585EACA733F8C0C74E99C78 " +peer0.org1.example.com | "2019-09-24 00:25:37.286 UTC [gossip.election] waitForInterrupt -> DEBU 2108 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:25:37.305 UTC [msp] DeserializeIdentity -> DEBU 2109 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.322 UTC [msp] DeserializeIdentity -> DEBU 210a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.322 UTC [msp] DeserializeIdentity -> DEBU 210b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.322 UTC [msp] DeserializeIdentity -> DEBU 210c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.322 UTC [gossip.comm] Send -> DEBU 210d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:37.322 UTC [msp] DeserializeIdentity -> DEBU 210e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.323 UTC [msp] DeserializeIdentity -> DEBU 210f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.360 UTC [gossip.comm] sendToEndpoint -> DEBU 2110 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.361 UTC [gossip.comm] sendToEndpoint -> DEBU 2111 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.458 UTC [gossip.comm] func1 -> DEBU 2112 Got message: GossipMessage: nonce:15690997039843866645 tag:EMPTY mem_req:\211\262\222\321\271\234\306f){\276\343w\251\322\221\305\030\014\002 si\375\000Q_ \373\357\303**\234fTw\334\373\316_\332\023\300\252:\263\375\267\271\343\rU" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.458 UTC [gossip.gossip] handleMessage -> DEBU 2113 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:15690997039843866645 tag:EMPTY mem_req:\211\262\222\321\271\234\306f){\276\343w\251\322\221\305\030\014\002 si\375\000Q_ \373\357\303**\234fTw\334\373\316_\332\023\300\252:\263\375\267\271\343\rU" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.458 UTC [gossip.gossip] handleMessage -> DEBU 2114 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.458 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2115 Got message: GossipMessage: nonce:15690997039843866645 tag:EMPTY mem_req:\211\262\222\321\271\234\306f){\276\343w\251\322\221\305\030\014\002 si\375\000Q_ \373\357\303**\234fTw\334\373\316_\332\023\300\252:\263\375\267\271\343\rU" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.458 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2116 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:37.458 UTC [msp] DeserializeIdentity -> DEBU 2117 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.459 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2118 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:37.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2119 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:37.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 211a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:37.459 UTC [policies] Evaluate -> DEBU 211b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:37.459 UTC [policies] Evaluate -> DEBU 211c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:37.459 UTC [policies] Evaluate -> DEBU 211d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:37.459 UTC [cauthdsl] func1 -> DEBU 211e 0xc0041b90d0 gate 1569284737459715900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:37.459 UTC [cauthdsl] func2 -> DEBU 211f 0xc0041b90d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:37.459 UTC [cauthdsl] func2 -> DEBU 2120 0xc0041b90d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:37.459 UTC [cauthdsl] func2 -> DEBU 2121 0xc0041b90d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:37.460 UTC [cauthdsl] func2 -> DEBU 2122 0xc0041b90d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:37.460 UTC [cauthdsl] func1 -> DEBU 2123 0xc0041b90d0 gate 1569284737459715900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:37.460 UTC [policies] Evaluate -> DEBU 2124 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:37.460 UTC [policies] Evaluate -> DEBU 2125 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:37.460 UTC [policies] Evaluate -> DEBU 2126 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:37.460 UTC [cauthdsl] func1 -> DEBU 2127 0xc0041b9910 gate 1569284737460561300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:37.460 UTC [cauthdsl] func2 -> DEBU 2128 0xc0041b9910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:37.461 UTC [cauthdsl] func2 -> DEBU 2129 0xc0041b9910 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:37.461 UTC [cauthdsl] func2 -> DEBU 212a 0xc0041b9910 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:37.461 UTC [msp.identity] Verify -> DEBU 212b Verify: digest = 00000000 fb 4d ac f6 b3 bc 8e c6 7f ec 13 28 75 1a 58 75 |.M.........(u.Xu| +peer0.org1.example.com | 00000010 02 df ad 05 0f 80 d4 e5 6b a0 7e 38 92 f6 cd 7b |........k.~8...{|" +peer0.org1.example.com | "2019-09-24 00:25:37.464 UTC [msp.identity] Verify -> DEBU 212c Verify: sig = 00000000 30 44 02 20 35 db 7d cb de 3d 25 35 34 b2 44 13 |0D. 5.}..=%54.D.| +peer0.org1.example.com | 00000010 3e 89 b2 92 d1 b9 9c c6 66 29 7b be e3 77 a9 d2 |>.......f){..w..| +peer0.org1.example.com | 00000020 91 c5 18 0c 02 20 73 69 fd 00 51 5f 20 fb ef c3 |..... si..Q_ ...| +peer0.org1.example.com | 00000030 2a 2a 9c 66 54 77 dc fb ce 5f da 13 c0 aa 3a b3 |**.fTw..._....:.| +peer0.org1.example.com | 00000040 fd b7 b9 e3 0d 55 |.....U|" +peer0.org1.example.com | "2019-09-24 00:25:37.465 UTC [cauthdsl] func2 -> DEBU 212d 0xc0041b9910 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:37.465 UTC [cauthdsl] func1 -> DEBU 212e 0xc0041b9910 gate 1569284737460561300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:37.465 UTC [policies] Evaluate -> DEBU 212f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:37.465 UTC [policies] Evaluate -> DEBU 2130 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:37.465 UTC [policies] Evaluate -> DEBU 2131 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:37.465 UTC [policies] Evaluate -> DEBU 2132 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:37.465 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2133 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.465 UTC [gossip.discovery] sendMemResponse -> DEBU 2134 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:37.465 UTC [msp] DeserializeIdentity -> DEBU 2135 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.466 UTC [msp] DeserializeIdentity -> DEBU 2136 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.466 UTC [msp] DeserializeIdentity -> DEBU 2137 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.466 UTC [gossip.comm] Send -> DEBU 2138 Entering, sending GossipMessage: Channel: , nonce: 15690997039843866645, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:37.466 UTC [gossip.discovery] sendMemResponse -> DEBU 2139 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:37.466 UTC [gossip.comm] sendToEndpoint -> DEBU 213a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15690997039843866645, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.467 UTC [gossip.comm] sendToEndpoint -> DEBU 213b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.690 UTC [gossip.comm] func1 -> DEBU 213c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.708 UTC [gossip.gossip] handleMessage -> DEBU 213d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.708 UTC [gossip.gossip] handleMessage -> DEBU 213e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.711 UTC [gossip.comm] func1 -> DEBU 213f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.711 UTC [gossip.gossip] handleMessage -> DEBU 2140 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.691 UTC [gossip.comm] func1 -> DEBU 2141 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.712 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2142 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.712 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2143 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:37.713 UTC [msp.identity] Verify -> DEBU 2144 Verify: digest = 00000000 43 2b 33 b0 39 43 45 85 44 b9 ee c0 f7 c8 89 99 |C+3.9CE.D.......| +peer0.org1.example.com | 00000010 dc f0 2b 36 87 2d 49 be 4d 92 c6 5b e7 20 39 24 |..+6.-I.M..[. 9$|" +peer0.org1.example.com | "2019-09-24 00:25:37.713 UTC [msp.identity] Verify -> DEBU 2145 Verify: sig = 00000000 30 44 02 20 4d d2 37 91 3b 1c 8d d8 cd 3c 22 b9 |0D. M.7.;....<".| +peer0.org1.example.com | 00000010 7f ca c3 a7 03 2b c4 7e e9 af a0 95 96 4d 0f 3e |.....+.~.....M.>| +peer0.org1.example.com | 00000020 cf 5c 4e ba 02 20 4b f9 f6 9a e6 23 17 bc 5f f6 |.\N.. K....#.._.| +peer0.org1.example.com | 00000030 ad 83 4e 04 42 d4 b3 1b c2 85 fd 73 96 f8 08 33 |..N.B......s...3| +peer0.org1.example.com | 00000040 8e c9 1a f8 94 15 |......|" +peer0.org1.example.com | "2019-09-24 00:25:37.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 2146 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 2147 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:37.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 2148 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:37.718 UTC [gossip.comm] func1 -> DEBU 2149 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 214a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:37.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 214b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:37.741 UTC [gossip.discovery] learnExistingMembers -> DEBU 214c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.741 UTC [gossip.discovery] handleAliveMessage -> DEBU 214d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 214e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 214f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.749 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2150 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.751 UTC [gossip.gossip] handleMessage -> DEBU 2151 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.751 UTC [msp] DeserializeIdentity -> DEBU 2152 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.752 UTC [msp] DeserializeIdentity -> DEBU 2153 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.752 UTC [msp] DeserializeIdentity -> DEBU 2155 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.752 UTC [gossip.gossip] handleMessage -> DEBU 2154 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.752 UTC [gossip.comm] Send -> DEBU 2156 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:37.752 UTC [gossip.pull] HandleMessage -> DEBU 2157 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.752 UTC [msp] DeserializeIdentity -> DEBU 2158 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.752 UTC [gossip.comm] Send -> DEBU 2159 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:37.752 UTC [gossip.pull] SendDigest -> DEBU 215a Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:37.753 UTC [gossip.comm] sendToEndpoint -> DEBU 215b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.753 UTC [gossip.comm] sendToEndpoint -> DEBU 215c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.753 UTC [gossip.comm] sendToEndpoint -> DEBU 215d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.753 UTC [gossip.comm] sendToEndpoint -> DEBU 215e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.753 UTC [gossip.gossip] handleMessage -> DEBU 215f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.764 UTC [gossip.gossip] handleMessage -> DEBU 2160 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.764 UTC [gossip.gossip] handleMessage -> DEBU 2161 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.764 UTC [gossip.gossip] handleMessage -> DEBU 2162 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.764 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2163 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.765 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2164 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:37.765 UTC [msp.identity] Verify -> DEBU 2165 Verify: digest = 00000000 29 ae 47 1e 93 34 3d ee 13 df c2 f8 91 23 d6 4e |).G..4=......#.N| +peer0.org1.example.com | 00000010 bd 9e 5e 75 59 c7 d2 6b 87 64 b3 28 24 5d f7 07 |..^uY..k.d.($]..|" +peer0.org1.example.com | "2019-09-24 00:25:37.765 UTC [msp.identity] Verify -> DEBU 2166 Verify: sig = 00000000 30 45 02 21 00 f1 91 e1 30 1c b9 80 bc 8d 77 63 |0E.!....0.....wc| +peer0.org1.example.com | 00000010 8a f2 50 a0 02 17 75 0a eb 14 ae 1e ef 0d 01 0e |..P...u.........| +peer0.org1.example.com | 00000020 04 80 1b 51 dc 02 20 56 b1 d6 42 b7 bb 89 23 4c |...Q.. V..B...#L| +peer0.org1.example.com | 00000030 5c b8 73 6d c4 79 f9 4a 5f 15 6e 5a 9a e3 e3 9e |\.sm.y.J_.nZ....| +peer0.org1.example.com | 00000040 1f 09 a2 b8 bd ec c2 |.......|" +peer0.org1.example.com | "2019-09-24 00:25:37.765 UTC [msp.identity] Verify -> DEBU 2167 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:37.765 UTC [msp.identity] Verify -> DEBU 2168 Verify: sig = 00000000 30 44 02 21 00 b7 57 77 2b b3 05 0a 83 f6 31 39 |0D.!..Ww+.....19| +peer0.org1.example.com | 00000010 75 b1 60 dd 37 5c 45 48 4e 74 3d 87 71 f0 e7 f1 |u.`.7\EHNt=.q...| +peer0.org1.example.com | 00000020 82 64 a4 6b 03 02 1f 3c 46 6a 7c 30 e9 74 61 ef |.d.k... DEBU 2169 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.766 UTC [gossip.discovery] learnExistingMembers -> DEBU 216a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:37.766 UTC [gossip.discovery] learnExistingMembers -> DEBU 216b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:37.766 UTC [gossip.discovery] learnExistingMembers -> DEBU 216c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:37.766 UTC [gossip.discovery] learnExistingMembers -> DEBU 216d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:37.766 UTC [gossip.discovery] learnExistingMembers -> DEBU 216e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 216f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2170 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2171 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2172 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.767 UTC [gossip.gossip] handleMessage -> DEBU 2173 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:37.767 UTC [gossip.discovery] sendMemResponse -> DEBU 2174 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:37.767 UTC [msp] DeserializeIdentity -> DEBU 2175 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.767 UTC [msp] DeserializeIdentity -> DEBU 2176 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:37.768 UTC [gossip.comm] Send -> DEBU 2177 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:37.768 UTC [gossip.discovery] sendMemResponse -> DEBU 2178 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:25:37.768 UTC [gossip.comm] sendToEndpoint -> DEBU 2179 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:37.768 UTC [gossip.comm] sendToEndpoint -> DEBU 217a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:38.113 UTC [gossip.comm] func1 -> DEBU 217b Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:38.113 UTC [gossip.gossip] handleMessage -> DEBU 217c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:38.113 UTC [msp] DeserializeIdentity -> DEBU 217d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:38.114 UTC [msp] DeserializeIdentity -> DEBU 217e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:38.114 UTC [msp] DeserializeIdentity -> DEBU 217f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:38.114 UTC [gossip.gossip] handleMessage -> DEBU 2180 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.640 UTC [msp] GetDefaultSigningIdentity -> DEBU 2181 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:39.640 UTC [msp.identity] Sign -> DEBU 2182 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151024 " +peer0.org1.example.com | "2019-09-24 00:25:39.640 UTC [msp.identity] Sign -> DEBU 2183 Sign: digest: 1E7A907B59E785727106382F1B9662AB573DBD2AC4BAABFF48B08F5C2091C90C " +peer0.org1.example.com | "2019-09-24 00:25:39.641 UTC [msp] GetDefaultSigningIdentity -> DEBU 2184 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:39.643 UTC [msp.identity] Sign -> DEBU 2185 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:39.643 UTC [msp.identity] Sign -> DEBU 2186 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:39.644 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2187 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:39.645 UTC [msp] DeserializeIdentity -> DEBU 2188 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.645 UTC [msp] DeserializeIdentity -> DEBU 2189 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.645 UTC [msp] DeserializeIdentity -> DEBU 218a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.656 UTC [gossip.comm] Send -> DEBU 218b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:39.657 UTC [msp] DeserializeIdentity -> DEBU 218c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.657 UTC [gossip.comm] Send -> DEBU 218d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:39.657 UTC [gossip.comm] Send -> DEBU 218e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:39.657 UTC [gossip.comm] sendToEndpoint -> DEBU 218f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.658 UTC [gossip.comm] sendToEndpoint -> DEBU 2190 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.658 UTC [gossip.comm] sendToEndpoint -> DEBU 2191 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.660 UTC [gossip.comm] sendToEndpoint -> DEBU 2193 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.660 UTC [gossip.comm] sendToEndpoint -> DEBU 2192 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.660 UTC [gossip.comm] sendToEndpoint -> DEBU 2194 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.709 UTC [gossip.pull] Hello -> DEBU 2195 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:39.709 UTC [gossip.comm] Send -> DEBU 2196 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:39.709 UTC [gossip.pull] Hello -> DEBU 2197 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:39.709 UTC [gossip.comm] Send -> DEBU 2198 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:39.709 UTC [gossip.pull] Hello -> DEBU 2199 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:39.709 UTC [gossip.comm] Send -> DEBU 219a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:39.709 UTC [gossip.comm] sendToEndpoint -> DEBU 219b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.710 UTC [gossip.comm] sendToEndpoint -> DEBU 219c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.710 UTC [msp] GetDefaultSigningIdentity -> DEBU 219d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:39.710 UTC [msp.identity] Sign -> DEBU 219e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151025 " +peer0.org1.example.com | "2019-09-24 00:25:39.710 UTC [msp.identity] Sign -> DEBU 219f Sign: digest: 21A49982035FDE2CC0A520C734BF71257BFC818EA279ACCA571B0D30554874AD " +peer0.org1.example.com | "2019-09-24 00:25:39.710 UTC [msp] GetDefaultSigningIdentity -> DEBU 21a0 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:39.710 UTC [msp.identity] Sign -> DEBU 21a1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:39.710 UTC [msp.identity] Sign -> DEBU 21a2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:39.711 UTC [gossip.comm] Send -> DEBU 21a3 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:39.711 UTC [msp] DeserializeIdentity -> DEBU 21a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.711 UTC [gossip.comm] Send -> DEBU 21a5 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:39.711 UTC [msp] DeserializeIdentity -> DEBU 21a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.711 UTC [gossip.comm] Send -> DEBU 21a7 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:39.715 UTC [gossip.comm] sendToEndpoint -> DEBU 21a8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21aa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21ab Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21ac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21ad Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21ae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21af Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21b0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.728 UTC [gossip.comm] func1 -> DEBU 21b2 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.730 UTC [gossip.comm] func1 -> DEBU 21b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.730 UTC [gossip.gossip] handleMessage -> DEBU 21b4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.731 UTC [gossip.pull] HandleMessage -> DEBU 21b5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.732 UTC [gossip.gossip] handleMessage -> DEBU 21b6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.732 UTC [gossip.gossip] handleMessage -> DEBU 21b7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.733 UTC [gossip.gossip] handleMessage -> DEBU 21b8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.736 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21ba Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:39.737 UTC [msp.identity] Verify -> DEBU 21bb Verify: digest = 00000000 29 ae 47 1e 93 34 3d ee 13 df c2 f8 91 23 d6 4e |).G..4=......#.N| +peer0.org1.example.com | 00000010 bd 9e 5e 75 59 c7 d2 6b 87 64 b3 28 24 5d f7 07 |..^uY..k.d.($]..|" +peer0.org1.example.com | "2019-09-24 00:25:39.737 UTC [msp.identity] Verify -> DEBU 21bc Verify: sig = 00000000 30 45 02 21 00 f1 91 e1 30 1c b9 80 bc 8d 77 63 |0E.!....0.....wc| +peer0.org1.example.com | 00000010 8a f2 50 a0 02 17 75 0a eb 14 ae 1e ef 0d 01 0e |..P...u.........| +peer0.org1.example.com | 00000020 04 80 1b 51 dc 02 20 56 b1 d6 42 b7 bb 89 23 4c |...Q.. V..B...#L| +peer0.org1.example.com | 00000030 5c b8 73 6d c4 79 f9 4a 5f 15 6e 5a 9a e3 e3 9e |\.sm.y.J_.nZ....| +peer0.org1.example.com | 00000040 1f 09 a2 b8 bd ec c2 |.......|" +peer0.org1.example.com | "2019-09-24 00:25:39.737 UTC [gossip.discovery] handleAliveMessage -> DEBU 21bd Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.737 UTC [gossip.discovery] handleAliveMessage -> DEBU 21be Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.737 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21bf Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:39.737 UTC [msp.identity] Verify -> DEBU 21c0 Verify: digest = 00000000 21 a4 99 82 03 5f de 2c c0 a5 20 c7 34 bf 71 25 |!...._.,.. .4.q%| +peer0.org1.example.com | 00000010 7b fc 81 8e a2 79 ac ca 57 1b 0d 30 55 48 74 ad |{....y..W..0UHt.|" +peer0.org1.example.com | "2019-09-24 00:25:39.737 UTC [msp.identity] Verify -> DEBU 21c1 Verify: sig = 00000000 30 44 02 20 4f 5b b2 e5 98 84 8f 6b 79 1f 60 49 |0D. O[.....ky.`I| +peer0.org1.example.com | 00000010 04 e3 50 21 19 4d 3d be b7 f3 9d fb 73 7f e2 93 |..P!.M=.....s...| +peer0.org1.example.com | 00000020 96 d6 cb a3 02 20 16 03 65 ee eb f6 b8 0c 83 58 |..... ..e......X| +peer0.org1.example.com | 00000030 b8 df 23 45 69 67 94 ef e6 ac 83 27 d3 00 14 f1 |..#Eig.....'....| +peer0.org1.example.com | 00000040 58 2f 50 d5 34 10 |X/P.4.|" +peer0.org1.example.com | "2019-09-24 00:25:39.737 UTC [gossip.discovery] handleAliveMessage -> DEBU 21c2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.737 UTC [gossip.discovery] isSentByMe -> DEBU 21c3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.737 UTC [gossip.discovery] handleAliveMessage -> DEBU 21c4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.737 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21c5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [msp] DeserializeIdentity -> DEBU 21c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [policies] Evaluate -> DEBU 21ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [policies] Evaluate -> DEBU 21cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [policies] Evaluate -> DEBU 21cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [cauthdsl] func1 -> DEBU 21cd 0xc004261280 gate 1569284739738559700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [cauthdsl] func2 -> DEBU 21ce 0xc004261280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [cauthdsl] func2 -> DEBU 21cf 0xc004261280 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [cauthdsl] func2 -> DEBU 21d0 0xc004261280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:39.738 UTC [cauthdsl] func2 -> DEBU 21d1 0xc004261280 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:39.750 UTC [gossip.gossip] handleMessage -> DEBU 21d2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.749 UTC [cauthdsl] func1 -> DEBU 21d3 0xc004261280 gate 1569284739738559700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21d4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [cauthdsl] func1 -> DEBU 21d7 0xc004261ac0 gate 1569284739757312200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [cauthdsl] func2 -> DEBU 21d8 0xc004261ac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [cauthdsl] func2 -> DEBU 21d9 0xc004261ac0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [cauthdsl] func2 -> DEBU 21da 0xc004261ac0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [msp.identity] Verify -> DEBU 21db Verify: digest = 00000000 95 9f cd d9 bd 4d 99 70 74 38 c3 1a b8 df 6e 71 |.....M.pt8....nq| +peer0.org1.example.com | 00000010 87 2f 53 f2 bc c9 95 03 5d d7 ee e7 05 d4 04 6d |./S.....]......m|" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [msp.identity] Verify -> DEBU 21dc Verify: sig = 00000000 30 44 02 20 35 a4 ee 32 e9 bb 42 2f e3 d3 5b e3 |0D. 5..2..B/..[.| +peer0.org1.example.com | 00000010 31 16 a1 5b 3c b0 31 1a fe df 0d 08 64 ff b7 cf |1..[<.1.....d...| +peer0.org1.example.com | 00000020 1b f8 ce bb 02 20 31 58 97 2e 9f d3 30 a3 4e 99 |..... 1X....0.N.| +peer0.org1.example.com | 00000030 b6 19 96 73 4c 98 df 11 e2 fd ab 25 e5 8e 00 57 |...sL......%...W| +peer0.org1.example.com | 00000040 99 0e 80 0a e3 ac |......|" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [cauthdsl] func2 -> DEBU 21dd 0xc004261ac0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [cauthdsl] func1 -> DEBU 21de 0xc004261ac0 gate 1569284739757312200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21e1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.757 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21e5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.758 UTC [gossip.comm] func1 -> DEBU 21e6 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.758 UTC [gossip.comm] func1 -> DEBU 21e7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.751 UTC [gossip.pull] HandleMessage -> DEBU 21e8 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.762 UTC [gossip.gossip] handleMessage -> DEBU 21e9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.763 UTC [gossip.gossip] handleMessage -> DEBU 21ea Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.764 UTC [gossip.gossip] handleMessage -> DEBU 21eb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.764 UTC [gossip.gossip] handleMessage -> DEBU 21ec Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.764 UTC [gossip.pull] HandleMessage -> DEBU 21ed GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.764 UTC [gossip.gossip] handleMessage -> DEBU 21ee Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.764 UTC [gossip.gossip] handleMessage -> DEBU 21ef Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.764 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21f0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.764 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21f1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [msp] DeserializeIdentity -> DEBU 21f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21f4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21f5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 21f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 21f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 21f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [cauthdsl] func1 -> DEBU 21f9 0xc00424fc40 gate 1569284739765403800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 21fa 0xc00424fc40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 21fb 0xc00424fc40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 21fc 0xc00424fc40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 21fd 0xc00424fc40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [cauthdsl] func1 -> DEBU 21fe 0xc00424fc40 gate 1569284739765403800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 21ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 2200 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 2201 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [cauthdsl] func1 -> DEBU 2202 0xc004290480 gate 1569284739765732400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 2203 0xc004290480 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 2204 0xc004290480 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 2205 0xc004290480 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [msp.identity] Verify -> DEBU 2206 Verify: digest = 00000000 4a db 2c 8d 8d 21 5a 31 21 54 d6 e0 cd 22 a0 e9 |J.,..!Z1!T..."..| +peer0.org1.example.com | 00000010 e9 a3 bc 63 00 c8 a4 c6 d8 d9 8c b9 72 9b 7f e6 |...c........r...|" +peer0.org1.example.com | "2019-09-24 00:25:39.765 UTC [msp.identity] Verify -> DEBU 2207 Verify: sig = 00000000 30 44 02 20 68 f7 4e 05 c5 b9 75 32 63 23 6c d9 |0D. h.N...u2c#l.| +peer0.org1.example.com | 00000010 ce 62 c3 9a 2c 3a 55 f8 7e 79 61 c3 6e a6 8f c1 |.b..,:U.~ya.n...| +peer0.org1.example.com | 00000020 29 8f c2 62 02 20 40 33 d5 7d b2 ac 8e c2 04 95 |)..b. @3.}......| +peer0.org1.example.com | 00000030 9b 50 f0 c9 be 6e bd 53 c7 d4 22 2d ab d4 5e 7b |.P...n.S.."-..^{| +peer0.org1.example.com | 00000040 7d 96 a6 65 55 70 |}..eUp|" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [cauthdsl] func2 -> DEBU 2208 0xc004290480 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [cauthdsl] func1 -> DEBU 2209 0xc004290480 gate 1569284739765732400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [policies] Evaluate -> DEBU 220a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [policies] Evaluate -> DEBU 220b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [policies] Evaluate -> DEBU 220c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [policies] Evaluate -> DEBU 220d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [gossip.discovery] handleAliveMessage -> DEBU 220e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [gossip.discovery] handleAliveMessage -> DEBU 220f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2210 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [msp.identity] Verify -> DEBU 2211 Verify: digest = 00000000 29 ae 47 1e 93 34 3d ee 13 df c2 f8 91 23 d6 4e |).G..4=......#.N| +peer0.org1.example.com | 00000010 bd 9e 5e 75 59 c7 d2 6b 87 64 b3 28 24 5d f7 07 |..^uY..k.d.($]..|" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [msp.identity] Verify -> DEBU 2212 Verify: sig = 00000000 30 45 02 21 00 f1 91 e1 30 1c b9 80 bc 8d 77 63 |0E.!....0.....wc| +peer0.org1.example.com | 00000010 8a f2 50 a0 02 17 75 0a eb 14 ae 1e ef 0d 01 0e |..P...u.........| +peer0.org1.example.com | 00000020 04 80 1b 51 dc 02 20 56 b1 d6 42 b7 bb 89 23 4c |...Q.. V..B...#L| +peer0.org1.example.com | 00000030 5c b8 73 6d c4 79 f9 4a 5f 15 6e 5a 9a e3 e3 9e |\.sm.y.J_.nZ....| +peer0.org1.example.com | 00000040 1f 09 a2 b8 bd ec c2 |.......|" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [gossip.discovery] handleAliveMessage -> DEBU 2213 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [gossip.discovery] handleAliveMessage -> DEBU 2214 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.766 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2215 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:39.769 UTC [msp.identity] Verify -> DEBU 2216 Verify: digest = 00000000 21 a4 99 82 03 5f de 2c c0 a5 20 c7 34 bf 71 25 |!...._.,.. .4.q%| +peer0.org1.example.com | 00000010 7b fc 81 8e a2 79 ac ca 57 1b 0d 30 55 48 74 ad |{....y..W..0UHt.|" +peer0.org1.example.com | "2019-09-24 00:25:39.770 UTC [msp.identity] Verify -> DEBU 2217 Verify: sig = 00000000 30 44 02 20 4f 5b b2 e5 98 84 8f 6b 79 1f 60 49 |0D. O[.....ky.`I| +peer0.org1.example.com | 00000010 04 e3 50 21 19 4d 3d be b7 f3 9d fb 73 7f e2 93 |..P!.M=.....s...| +peer0.org1.example.com | 00000020 96 d6 cb a3 02 20 16 03 65 ee eb f6 b8 0c 83 58 |..... ..e......X| +peer0.org1.example.com | 00000030 b8 df 23 45 69 67 94 ef e6 ac 83 27 d3 00 14 f1 |..#Eig.....'....| +peer0.org1.example.com | 00000040 58 2f 50 d5 34 10 |X/P.4.|" +peer0.org1.example.com | "2019-09-24 00:25:39.776 UTC [gossip.discovery] handleAliveMessage -> DEBU 2218 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.776 UTC [gossip.discovery] isSentByMe -> DEBU 2219 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.776 UTC [gossip.discovery] handleAliveMessage -> DEBU 221a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 221b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 221c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.776 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 221d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:39.776 UTC [msp.identity] Verify -> DEBU 221e Verify: digest = 00000000 21 a4 99 82 03 5f de 2c c0 a5 20 c7 34 bf 71 25 |!...._.,.. .4.q%| +peer0.org1.example.com | 00000010 7b fc 81 8e a2 79 ac ca 57 1b 0d 30 55 48 74 ad |{....y..W..0UHt.|" +peer0.org1.example.com | "2019-09-24 00:25:39.776 UTC [msp.identity] Verify -> DEBU 221f Verify: sig = 00000000 30 44 02 20 4f 5b b2 e5 98 84 8f 6b 79 1f 60 49 |0D. O[.....ky.`I| +peer0.org1.example.com | 00000010 04 e3 50 21 19 4d 3d be b7 f3 9d fb 73 7f e2 93 |..P!.M=.....s...| +peer0.org1.example.com | 00000020 96 d6 cb a3 02 20 16 03 65 ee eb f6 b8 0c 83 58 |..... ..e......X| +peer0.org1.example.com | 00000030 b8 df 23 45 69 67 94 ef e6 ac 83 27 d3 00 14 f1 |..#Eig.....'....| +peer0.org1.example.com | 00000040 58 2f 50 d5 34 10 |X/P.4.|" +peer0.org1.example.com | "2019-09-24 00:25:39.777 UTC [msp.identity] Verify -> DEBU 2220 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:39.777 UTC [msp.identity] Verify -> DEBU 2221 Verify: sig = 00000000 30 45 02 21 00 cc 23 b6 6b a9 d8 76 4e 88 18 1e |0E.!..#.k..vN...| +peer0.org1.example.com | 00000010 21 43 0d 93 04 13 66 c3 6f dd 52 7d d1 b5 fd 3c |!C....f.o.R}...<| +peer0.org1.example.com | 00000020 96 0b 54 f9 af 02 20 44 45 88 fa 2d 84 8c d3 47 |..T... DE..-...G| +peer0.org1.example.com | 00000030 8a 45 d4 9e 69 ff f1 01 21 f0 30 15 5d 86 c9 7c |.E..i...!.0.]..|| +peer0.org1.example.com | 00000040 79 1a 19 26 81 bf 0a |y..&...|" +peer0.org1.example.com | "2019-09-24 00:25:39.782 UTC [gossip.discovery] handleAliveMessage -> DEBU 2222 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.782 UTC [gossip.discovery] isSentByMe -> DEBU 2223 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.782 UTC [gossip.discovery] handleAliveMessage -> DEBU 2224 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.782 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2225 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.782 UTC [gossip.gossip] handleMessage -> DEBU 2226 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.970 UTC [gossip.gossip] handleMessage -> DEBU 2227 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.970 UTC [gossip.pull] HandleMessage -> DEBU 2228 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.970 UTC [msp] DeserializeIdentity -> DEBU 2229 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.970 UTC [msp] DeserializeIdentity -> DEBU 222a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.971 UTC [msp] DeserializeIdentity -> DEBU 222b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.971 UTC [msp] DeserializeIdentity -> DEBU 222c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.972 UTC [msp] DeserializeIdentity -> DEBU 222d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.972 UTC [msp] DeserializeIdentity -> DEBU 222e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.973 UTC [gossip.pull] SendDigest -> DEBU 222f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:39.973 UTC [gossip.gossip] handleMessage -> DEBU 2230 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.988 UTC [gossip.gossip] handleMessage -> DEBU 2231 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.988 UTC [gossip.gossip] handleMessage -> DEBU 2232 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:39.988 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2233 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:39.988 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2234 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:39.988 UTC [msp] DeserializeIdentity -> DEBU 2235 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:39.989 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2236 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:39.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2237 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:39.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2238 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:39.989 UTC [policies] Evaluate -> DEBU 2239 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:39.989 UTC [policies] Evaluate -> DEBU 223a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:39.989 UTC [policies] Evaluate -> DEBU 223b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:39.989 UTC [cauthdsl] func1 -> DEBU 223c 0xc004275af0 gate 1569284739989895800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:39.989 UTC [cauthdsl] func2 -> DEBU 223d 0xc004275af0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:39.989 UTC [cauthdsl] func2 -> DEBU 223e 0xc004275af0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:39.990 UTC [cauthdsl] func2 -> DEBU 223f 0xc004275af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:39.990 UTC [cauthdsl] func2 -> DEBU 2240 0xc004275af0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:39.990 UTC [cauthdsl] func1 -> DEBU 2241 0xc004275af0 gate 1569284739989895800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:39.990 UTC [policies] Evaluate -> DEBU 2242 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.990 UTC [policies] Evaluate -> DEBU 2243 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:39.990 UTC [policies] Evaluate -> DEBU 2244 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:39.990 UTC [cauthdsl] func1 -> DEBU 2245 0xc0042d0330 gate 1569284739990703500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:39.990 UTC [cauthdsl] func2 -> DEBU 2246 0xc0042d0330 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:39.990 UTC [cauthdsl] func2 -> DEBU 2247 0xc0042d0330 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:39.991 UTC [cauthdsl] func2 -> DEBU 2248 0xc0042d0330 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.005 UTC [msp.identity] Verify -> DEBU 2249 Verify: digest = 00000000 b5 a4 b6 8d 3a 73 9d 08 77 fe eb 0c 29 60 cf ef |....:s..w...)`..| +peer0.org1.example.com | 00000010 5a bd d1 62 c3 fb d3 92 1e 64 3d b5 46 28 4b a9 |Z..b.....d=.F(K.|" +peer0.org1.example.com | "2019-09-24 00:25:40.005 UTC [msp.identity] Verify -> DEBU 224a Verify: sig = 00000000 30 44 02 20 52 bc 32 66 97 30 50 c4 b9 fd 24 b0 |0D. R.2f.0P...$.| +peer0.org1.example.com | 00000010 ec d0 39 bc b0 62 74 72 a0 60 a3 15 5e 36 59 d1 |..9..btr.`..^6Y.| +peer0.org1.example.com | 00000020 00 bc 0c 58 02 20 44 8e 76 dd 42 7c d2 24 0a 30 |...X. D.v.B|.$.0| +peer0.org1.example.com | 00000030 dd 38 4c 33 02 89 31 36 03 0d 99 3a 9e c1 f5 62 |.8L3..16...:...b| +peer0.org1.example.com | 00000040 6f f0 d6 85 c4 43 |o....C|" +peer0.org1.example.com | "2019-09-24 00:25:40.005 UTC [cauthdsl] func2 -> DEBU 224b 0xc0042d0330 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.005 UTC [cauthdsl] func1 -> DEBU 224c 0xc0042d0330 gate 1569284739990703500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:40.005 UTC [policies] Evaluate -> DEBU 224d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.005 UTC [policies] Evaluate -> DEBU 224e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.005 UTC [policies] Evaluate -> DEBU 224f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.005 UTC [policies] Evaluate -> DEBU 2250 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.005 UTC [gossip.discovery] handleAliveMessage -> DEBU 2251 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 2252 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:40.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 2253 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:40.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 2254 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:40.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 2255 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:40.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 2256 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.006 UTC [gossip.discovery] handleAliveMessage -> DEBU 2257 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2258 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.006 UTC [gossip.discovery] sendMemResponse -> DEBU 2259 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:40.006 UTC [msp] DeserializeIdentity -> DEBU 225a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.006 UTC [msp] DeserializeIdentity -> DEBU 225b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.006 UTC [msp] DeserializeIdentity -> DEBU 225c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.007 UTC [gossip.comm] Send -> DEBU 225d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:40.019 UTC [gossip.comm] sendToEndpoint -> DEBU 225e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.019 UTC [gossip.comm] sendToEndpoint -> DEBU 225f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.019 UTC [gossip.gossip] handleMessage -> DEBU 2260 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.019 UTC [gossip.gossip] handleMessage -> DEBU 2261 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2262 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2263 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [msp] DeserializeIdentity -> DEBU 2264 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2265 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2266 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2267 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [policies] Evaluate -> DEBU 2268 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [policies] Evaluate -> DEBU 2269 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [policies] Evaluate -> DEBU 226a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [cauthdsl] func1 -> DEBU 226b 0xc0042bb960 gate 1569284740020686100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [cauthdsl] func2 -> DEBU 226c 0xc0042bb960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [cauthdsl] func2 -> DEBU 226d 0xc0042bb960 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [cauthdsl] func2 -> DEBU 226e 0xc0042bb960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [cauthdsl] func2 -> DEBU 226f 0xc0042bb960 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [cauthdsl] func1 -> DEBU 2270 0xc0042bb960 gate 1569284740020686100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.020 UTC [policies] Evaluate -> DEBU 2271 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.021 UTC [policies] Evaluate -> DEBU 2272 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.021 UTC [policies] Evaluate -> DEBU 2273 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.038 UTC [cauthdsl] func1 -> DEBU 2274 0xc0042f61a0 gate 1569284740037982500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.038 UTC [cauthdsl] func2 -> DEBU 2275 0xc0042f61a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.038 UTC [cauthdsl] func2 -> DEBU 2276 0xc0042f61a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.038 UTC [cauthdsl] func2 -> DEBU 2277 0xc0042f61a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.038 UTC [msp.identity] Verify -> DEBU 2278 Verify: digest = 00000000 ec df 0e eb 7a ff c7 35 78 2d 5e a5 3b 82 25 83 |....z..5x-^.;.%.| +peer0.org1.example.com | 00000010 e7 6f 4f 0a e6 42 5e 0b b8 19 fb a9 ba f4 a4 74 |.oO..B^........t|" +peer0.org1.example.com | "2019-09-24 00:25:40.038 UTC [msp.identity] Verify -> DEBU 2279 Verify: sig = 00000000 30 44 02 20 1c 4f 50 d9 c4 6b 2d 3c eb 40 83 a4 |0D. .OP..k-<.@..| +peer0.org1.example.com | 00000010 c4 73 9e 7f 19 d6 f0 24 98 26 bc 3c 02 a7 8e 01 |.s.....$.&.<....| +peer0.org1.example.com | 00000020 43 6e bc e8 02 20 1d b8 e0 d3 af fc 6b d6 46 5e |Cn... ......k.F^| +peer0.org1.example.com | 00000030 ac 13 dc 13 01 5f 9c b5 8f ea a1 6d af 7b b9 d4 |....._.....m.{..| +peer0.org1.example.com | 00000040 73 12 4b 4e 75 50 |s.KNuP|" +peer0.org1.example.com | "2019-09-24 00:25:40.038 UTC [cauthdsl] func2 -> DEBU 227a 0xc0042f61a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.039 UTC [cauthdsl] func1 -> DEBU 227b 0xc0042f61a0 gate 1569284740037982500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:40.039 UTC [policies] Evaluate -> DEBU 227c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.039 UTC [policies] Evaluate -> DEBU 227d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.039 UTC [policies] Evaluate -> DEBU 227e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.039 UTC [policies] Evaluate -> DEBU 227f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.039 UTC [gossip.discovery] handleAliveMessage -> DEBU 2280 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 2281 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:40.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 2282 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:40.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 2283 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:40.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 2284 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:40.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 2285 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.040 UTC [gossip.discovery] handleAliveMessage -> DEBU 2286 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2287 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.056 UTC [msp] DeserializeIdentity -> DEBU 2288 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.056 UTC [msp] DeserializeIdentity -> DEBU 2289 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 228a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 228b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 228c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 228d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.065 UTC [gossip.comm] Send -> DEBU 228e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 228f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 2290 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.065 UTC [gossip.comm] Send -> DEBU 2291 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:40.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2292 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2293 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.066 UTC [gossip.comm] sendToEndpoint -> DEBU 2294 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.066 UTC [gossip.comm] sendToEndpoint -> DEBU 2295 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.068 UTC [gossip.comm] func1 -> DEBU 2296 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.068 UTC [gossip.gossip] handleMessage -> DEBU 2297 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.082 UTC [gossip.gossip] handleMessage -> DEBU 2298 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.082 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2299 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.088 UTC [gossip.comm] func1 -> DEBU 229a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.102 UTC [gossip.gossip] handleMessage -> DEBU 229c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.088 UTC [gossip.discovery] sendMemResponse -> DEBU 229b Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" > alive: DEBU 22c7 0xc0043444f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.190 UTC [cauthdsl] func1 -> DEBU 22c8 0xc0043444f0 gate 1569284740190083800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:40.190 UTC [policies] Evaluate -> DEBU 22c9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.190 UTC [policies] Evaluate -> DEBU 22ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.190 UTC [policies] Evaluate -> DEBU 22cb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.191 UTC [policies] Evaluate -> DEBU 22cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.191 UTC [msp] DeserializeIdentity -> DEBU 22cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.194 UTC [msp] DeserializeIdentity -> DEBU 22ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.195 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22cf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:40.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22d0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.204 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22d2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.204 UTC [policies] Evaluate -> DEBU 22d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.204 UTC [policies] Evaluate -> DEBU 22d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:40.204 UTC [policies] Evaluate -> DEBU 22d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.204 UTC [cauthdsl] func1 -> DEBU 22d6 0xc004345e40 gate 1569284740204517400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.204 UTC [cauthdsl] func2 -> DEBU 22d7 0xc004345e40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.204 UTC [cauthdsl] func2 -> DEBU 22d8 0xc004345e40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.204 UTC [cauthdsl] func2 -> DEBU 22d9 0xc004345e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:40.204 UTC [cauthdsl] func2 -> DEBU 22da 0xc004345e40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.204 UTC [cauthdsl] func1 -> DEBU 22db 0xc004345e40 gate 1569284740204517400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.204 UTC [policies] Evaluate -> DEBU 22dc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [cauthdsl] func1 -> DEBU 22df 0xc004358680 gate 1569284740205119700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [cauthdsl] func2 -> DEBU 22e0 0xc004358680 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [cauthdsl] func2 -> DEBU 22e1 0xc004358680 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [cauthdsl] func2 -> DEBU 22e2 0xc004358680 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [msp.identity] Verify -> DEBU 22e3 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [msp.identity] Verify -> DEBU 22e4 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [cauthdsl] func2 -> DEBU 22e5 0xc004358680 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [cauthdsl] func1 -> DEBU 22e6 0xc004358680 gate 1569284740205119700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22e7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22e9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22ea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [gossip.gossip] handleMessage -> DEBU 22eb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.205 UTC [gossip.gossip] handleMessage -> DEBU 22ec Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.206 UTC [msp] DeserializeIdentity -> DEBU 22ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.206 UTC [msp] DeserializeIdentity -> DEBU 22ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.206 UTC [msp] DeserializeIdentity -> DEBU 22ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.206 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22f0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:40.206 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.206 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.206 UTC [policies] Evaluate -> DEBU 22f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.206 UTC [policies] Evaluate -> DEBU 22f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:40.206 UTC [policies] Evaluate -> DEBU 22f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.206 UTC [cauthdsl] func1 -> DEBU 22f6 0xc004370190 gate 1569284740206925600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.206 UTC [cauthdsl] func2 -> DEBU 22f7 0xc004370190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 22f8 0xc004370190 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 22f9 0xc004370190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 22fa 0xc004370190 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [cauthdsl] func1 -> DEBU 22fb 0xc004370190 gate 1569284740206925600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 22fc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 22fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 22fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [cauthdsl] func1 -> DEBU 22ff 0xc0043709d0 gate 1569284740207294900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 2300 0xc0043709d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 2301 0xc0043709d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 2302 0xc0043709d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [msp.identity] Verify -> DEBU 2303 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [msp.identity] Verify -> DEBU 2304 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 2305 0xc0043709d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [cauthdsl] func1 -> DEBU 2306 0xc0043709d0 gate 1569284740207294900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 2307 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 2308 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 2309 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 230a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.208 UTC [msp.identity] Verify -> DEBU 230b Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:40.208 UTC [msp.identity] Verify -> DEBU 230c Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:40.208 UTC [msp.identity] Verify -> DEBU 230d Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:40.208 UTC [msp.identity] Verify -> DEBU 230e Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:40.208 UTC [msp] DeserializeIdentity -> DEBU 230f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.203 UTC [gossip.comm] func1 -> DEBU 22d1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.223 UTC [msp] DeserializeIdentity -> DEBU 2310 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2311 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2312 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2313 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [policies] Evaluate -> DEBU 2314 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [policies] Evaluate -> DEBU 2315 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [policies] Evaluate -> DEBU 2316 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [cauthdsl] func1 -> DEBU 2317 0xc004380fe0 gate 1569284740225564900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [cauthdsl] func2 -> DEBU 2318 0xc004380fe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [cauthdsl] func2 -> DEBU 2319 0xc004380fe0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [cauthdsl] func2 -> DEBU 231a 0xc004380fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [cauthdsl] func2 -> DEBU 231b 0xc004380fe0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [cauthdsl] func1 -> DEBU 231c 0xc004380fe0 gate 1569284740225564900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.225 UTC [policies] Evaluate -> DEBU 231d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.226 UTC [policies] Evaluate -> DEBU 231e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.226 UTC [policies] Evaluate -> DEBU 231f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.226 UTC [cauthdsl] func1 -> DEBU 2320 0xc004381820 gate 1569284740226162300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.226 UTC [cauthdsl] func2 -> DEBU 2321 0xc004381820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.226 UTC [cauthdsl] func2 -> DEBU 2322 0xc004381820 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.226 UTC [cauthdsl] func2 -> DEBU 2323 0xc004381820 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.226 UTC [msp.identity] Verify -> DEBU 2324 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:40.226 UTC [msp.identity] Verify -> DEBU 2325 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:40.227 UTC [cauthdsl] func2 -> DEBU 2326 0xc004381820 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.227 UTC [cauthdsl] func1 -> DEBU 2327 0xc004381820 gate 1569284740226162300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:40.227 UTC [policies] Evaluate -> DEBU 2328 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.227 UTC [policies] Evaluate -> DEBU 2329 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.228 UTC [policies] Evaluate -> DEBU 232a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.228 UTC [policies] Evaluate -> DEBU 232b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.228 UTC [gossip.gossip] handleMessage -> DEBU 232c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.228 UTC [gossip.gossip] handleMessage -> DEBU 232d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.229 UTC [msp] DeserializeIdentity -> DEBU 232e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.229 UTC [msp] DeserializeIdentity -> DEBU 232f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.230 UTC [msp] DeserializeIdentity -> DEBU 2330 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2331 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2332 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2333 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [policies] Evaluate -> DEBU 2334 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [policies] Evaluate -> DEBU 2335 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [policies] Evaluate -> DEBU 2336 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [cauthdsl] func1 -> DEBU 2337 0xc004397330 gate 1569284740235682000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [cauthdsl] func2 -> DEBU 2338 0xc004397330 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [cauthdsl] func2 -> DEBU 2339 0xc004397330 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [cauthdsl] func2 -> DEBU 233a 0xc004397330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [cauthdsl] func2 -> DEBU 233b 0xc004397330 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [cauthdsl] func1 -> DEBU 233c 0xc004397330 gate 1569284740235682000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [policies] Evaluate -> DEBU 233d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.235 UTC [policies] Evaluate -> DEBU 233e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [policies] Evaluate -> DEBU 233f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [cauthdsl] func1 -> DEBU 2340 0xc004397b70 gate 1569284740236052600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [cauthdsl] func2 -> DEBU 2341 0xc004397b70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [cauthdsl] func2 -> DEBU 2342 0xc004397b70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [cauthdsl] func2 -> DEBU 2343 0xc004397b70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [msp.identity] Verify -> DEBU 2344 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [msp.identity] Verify -> DEBU 2345 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [cauthdsl] func2 -> DEBU 2346 0xc004397b70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [cauthdsl] func1 -> DEBU 2347 0xc004397b70 gate 1569284740236052600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [policies] Evaluate -> DEBU 2348 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [policies] Evaluate -> DEBU 2349 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [policies] Evaluate -> DEBU 234a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [policies] Evaluate -> DEBU 234b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [msp.identity] Verify -> DEBU 234c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:40.236 UTC [msp.identity] Verify -> DEBU 234d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [msp] DeserializeIdentity -> DEBU 234e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [msp] DeserializeIdentity -> DEBU 234f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2350 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2351 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2352 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 2353 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 2354 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 2355 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [cauthdsl] func1 -> DEBU 2356 0xc0043b1a60 gate 1569284740237508400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 2357 0xc0043b1a60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 2358 0xc0043b1a60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 2359 0xc0043b1a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 235a 0xc0043b1a60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [cauthdsl] func1 -> DEBU 235b 0xc0043b1a60 gate 1569284740237508400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 235c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 235d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 235e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [cauthdsl] func1 -> DEBU 235f 0xc0043c02a0 gate 1569284740237898100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 2360 0xc0043c02a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 2361 0xc0043c02a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.238 UTC [cauthdsl] func2 -> DEBU 2362 0xc0043c02a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.238 UTC [msp.identity] Verify -> DEBU 2363 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:40.238 UTC [msp.identity] Verify -> DEBU 2364 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:40.241 UTC [cauthdsl] func2 -> DEBU 2365 0xc0043c02a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.241 UTC [cauthdsl] func1 -> DEBU 2366 0xc0043c02a0 gate 1569284740237898100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:40.241 UTC [policies] Evaluate -> DEBU 2367 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.241 UTC [policies] Evaluate -> DEBU 2368 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.241 UTC [policies] Evaluate -> DEBU 2369 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.242 UTC [policies] Evaluate -> DEBU 236a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.242 UTC [msp.identity] Verify -> DEBU 236b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:40.242 UTC [msp.identity] Verify -> DEBU 236c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:40.243 UTC [gossip.gossip] handleMessage -> DEBU 236d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.292 UTC [msp] DeserializeIdentity -> DEBU 236e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.292 UTC [msp] DeserializeIdentity -> DEBU 236f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.292 UTC [gossip.pull] Hello -> DEBU 2370 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:40.292 UTC [msp] DeserializeIdentity -> DEBU 2371 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.293 UTC [msp] DeserializeIdentity -> DEBU 2372 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.293 UTC [gossip.comm] Send -> DEBU 2373 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:40.294 UTC [gossip.comm] sendToEndpoint -> DEBU 2374 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.295 UTC [gossip.comm] sendToEndpoint -> DEBU 2375 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.296 UTC [gossip.comm] func1 -> DEBU 2376 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.296 UTC [gossip.gossip] handleMessage -> DEBU 2377 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.296 UTC [gossip.pull] HandleMessage -> DEBU 2378 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.296 UTC [gossip.gossip] handleMessage -> DEBU 2379 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.706 UTC [gossip.comm] func1 -> DEBU 237a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.711 UTC [gossip.comm] func1 -> DEBU 237b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.711 UTC [gossip.comm] func1 -> DEBU 237c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.711 UTC [gossip.gossip] handleMessage -> DEBU 237d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.711 UTC [gossip.gossip] handleMessage -> DEBU 237e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [gossip.gossip] handleMessage -> DEBU 237f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2380 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2381 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [msp] DeserializeIdentity -> DEBU 2382 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2383 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2384 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2385 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 2386 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 2387 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 2388 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [cauthdsl] func1 -> DEBU 2389 0xc0043ea780 gate 1569284740712506800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 238a 0xc0043ea780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 238b 0xc0043ea780 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 238c 0xc0043ea780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 238d 0xc0043ea780 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [cauthdsl] func1 -> DEBU 238e 0xc0043ea780 gate 1569284740712506800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 238f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 2390 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 2391 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [cauthdsl] func1 -> DEBU 2392 0xc0043eafc0 gate 1569284740712810200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 2393 0xc0043eafc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 2394 0xc0043eafc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 2395 0xc0043eafc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [msp.identity] Verify -> DEBU 2396 Verify: digest = 00000000 f8 6d c3 bb e3 d6 18 83 9b 5f 3e 08 e5 72 6b 60 |.m......._>..rk`| +peer0.org1.example.com | 00000010 b5 ec f0 28 02 c1 85 34 cf b1 30 de f7 3b 85 84 |...(...4..0..;..|" +peer0.org1.example.com | "2019-09-24 00:25:40.712 UTC [msp.identity] Verify -> DEBU 2397 Verify: sig = 00000000 30 45 02 21 00 dc 79 43 ca 09 57 c1 ea 31 31 d8 |0E.!..yC..W..11.| +peer0.org1.example.com | 00000010 7f b0 41 57 14 bd 71 b7 de da 45 e3 5e 07 c8 a8 |..AW..q...E.^...| +peer0.org1.example.com | 00000020 19 ce 14 d5 92 02 20 6a b8 78 88 66 c8 fd 3a 9d |...... j.x.f..:.| +peer0.org1.example.com | 00000030 32 e1 21 cd 03 d9 4f 6f e9 e7 ff 2c cd f6 2c a3 |2.!...Oo...,..,.| +peer0.org1.example.com | 00000040 97 bd 85 09 f0 c4 ea |.......|" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [cauthdsl] func2 -> DEBU 2398 0xc0043eafc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [cauthdsl] func1 -> DEBU 2399 0xc0043eafc0 gate 1569284740712810200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [policies] Evaluate -> DEBU 239a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [policies] Evaluate -> DEBU 239b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [policies] Evaluate -> DEBU 239c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [policies] Evaluate -> DEBU 239d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 239e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 239f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 23a0 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 23a1 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 23a2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 23a3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 23a4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23a5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23a6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 23a7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [msp] DeserializeIdentity -> DEBU 23a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [gossip.discovery] sendMemResponse -> DEBU 23a9 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:40.713 UTC [msp] DeserializeIdentity -> DEBU 23ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23ac Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23ad Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [policies] Evaluate -> DEBU 23ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [msp] DeserializeIdentity -> DEBU 23af Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [policies] Evaluate -> DEBU 23b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [policies] Evaluate -> DEBU 23b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [msp] DeserializeIdentity -> DEBU 23b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [cauthdsl] func1 -> DEBU 23b3 0xc0043fd000 gate 1569284740714224900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [cauthdsl] func2 -> DEBU 23b4 0xc0043fd000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [cauthdsl] func2 -> DEBU 23b5 0xc0043fd000 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [gossip.comm] Send -> DEBU 23b6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [cauthdsl] func2 -> DEBU 23b7 0xc0043fd000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [cauthdsl] func2 -> DEBU 23b8 0xc0043fd000 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [cauthdsl] func1 -> DEBU 23b9 0xc0043fd000 gate 1569284740714224900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:40.714 UTC [gossip.discovery] sendMemResponse -> DEBU 23ba Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" > alive: alive: alive: DEBU 240e Verify: sig = 00000000 30 45 02 21 00 b5 ee fd ab fa 5a 1c cf 01 c3 ae |0E.!......Z.....| +peer0.org1.example.com | 00000010 fc 7c 89 29 23 70 16 e1 4e 12 88 d5 a3 01 21 db |.|.)#p..N.....!.| +peer0.org1.example.com | 00000020 9f 66 58 1c e1 02 20 16 d9 9c ae 69 0e c0 65 64 |.fX... ....i..ed| +peer0.org1.example.com | 00000030 09 9e a6 ee 71 af 9b 2e 51 2c 74 d2 86 5f 17 33 |....q...Q,t.._.3| +peer0.org1.example.com | 00000040 ac c8 79 05 ad 34 1c |..y..4.|" +peer0.org1.example.com | "2019-09-24 00:25:41.798 UTC [gossip.discovery] handleAliveMessage -> DEBU 240f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:41.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 2410 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:41.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 2411 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:41.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 2412 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:41.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 2413 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:41.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 2414 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:41.798 UTC [gossip.discovery] handleAliveMessage -> DEBU 2415 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:41.798 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2416 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:41.798 UTC [gossip.discovery] sendMemResponse -> DEBU 2417 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:41.799 UTC [msp] DeserializeIdentity -> DEBU 2418 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:41.799 UTC [msp] DeserializeIdentity -> DEBU 2419 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:41.799 UTC [gossip.comm] Send -> DEBU 241a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:41.799 UTC [gossip.discovery] sendMemResponse -> DEBU 241b Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020)" signature:"0D\002 W\2112\3269\202\272Y\311\313\300J\363\311\306P\217\346\353\\\366\354c\220Y\323\300\177\303xE\225\002 f\005)2\366R\232\007\300\377}z\0000;\332\261^\023\241hzV4\371\007\301\334\013\027\217\247" secret_envelope: > alive: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:43.683 UTC [msp] DeserializeIdentity -> DEBU 246c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.683 UTC [gossip.comm] Send -> DEBU 246d Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:43.683 UTC [msp] DeserializeIdentity -> DEBU 246e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.683 UTC [gossip.comm] Send -> DEBU 246f Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:43.683 UTC [gossip.comm] sendToEndpoint -> DEBU 2470 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.683 UTC [gossip.comm] sendToEndpoint -> DEBU 2471 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.683 UTC [gossip.comm] sendToEndpoint -> DEBU 2472 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.683 UTC [gossip.comm] sendToEndpoint -> DEBU 2473 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.684 UTC [gossip.comm] sendToEndpoint -> DEBU 2474 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.684 UTC [gossip.comm] sendToEndpoint -> DEBU 2475 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.692 UTC [gossip.comm] func1 -> DEBU 2476 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.692 UTC [gossip.comm] func1 -> DEBU 2477 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.692 UTC [gossip.gossip] handleMessage -> DEBU 2478 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.692 UTC [gossip.pull] HandleMessage -> DEBU 2479 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.692 UTC [gossip.gossip] handleMessage -> DEBU 247a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.692 UTC [gossip.gossip] handleMessage -> DEBU 247b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.692 UTC [gossip.gossip] handleMessage -> DEBU 247c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.692 UTC [gossip.discovery] handleMsgFromComm -> DEBU 247d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.693 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 247e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:43.693 UTC [msp.identity] Verify -> DEBU 247f Verify: digest = 00000000 45 1b 82 8e 93 b8 86 5b fb 88 a9 8e 14 11 21 16 |E......[......!.| +peer0.org1.example.com | 00000010 98 be 42 94 65 cb 2f ec b8 79 2b f1 94 9d 1a 25 |..B.e./..y+....%|" +peer0.org1.example.com | "2019-09-24 00:25:43.693 UTC [msp.identity] Verify -> DEBU 2480 Verify: sig = 00000000 30 45 02 21 00 c6 1a 00 13 43 bf 3c 8b 45 52 7e |0E.!.....C.<.ER~| +peer0.org1.example.com | 00000010 16 6a 97 0a 5a d8 37 15 8a 2c 67 1d 45 ee 27 e7 |.j..Z.7..,g.E.'.| +peer0.org1.example.com | 00000020 05 3c c7 69 79 02 20 59 d1 07 50 e5 cb 8d 81 7e |.<.iy. Y..P....~| +peer0.org1.example.com | 00000030 ef 8c 91 6c 87 09 ce a4 38 1a 95 99 d3 51 5b 2b |...l....8....Q[+| +peer0.org1.example.com | 00000040 ff cb be aa 88 d5 4f |......O|" +peer0.org1.example.com | "2019-09-24 00:25:43.693 UTC [msp.identity] Verify -> DEBU 2481 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:43.693 UTC [msp.identity] Verify -> DEBU 2482 Verify: sig = 00000000 30 45 02 21 00 ff ce 6e 50 c9 49 a4 6d 9e 47 eb |0E.!...nP.I.m.G.| +peer0.org1.example.com | 00000010 3c f3 0e 8b e8 f0 10 5d 7d 40 eb 19 d5 16 ad 98 |<......]}@......| +peer0.org1.example.com | 00000020 95 81 b8 45 72 02 20 33 0f 85 3c e0 7f 16 76 49 |...Er. 3..<...vI| +peer0.org1.example.com | 00000030 91 d9 71 de a5 9b de 61 c4 4b c5 9f 69 f9 7a b6 |..q....a.K..i.z.| +peer0.org1.example.com | 00000040 97 22 f3 23 19 23 a7 |.".#.#.|" +peer0.org1.example.com | "2019-09-24 00:25:43.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 2483 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.693 UTC [gossip.discovery] isSentByMe -> DEBU 2484 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 2485 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2486 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.697 UTC [gossip.gossip] handleMessage -> DEBU 2487 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.697 UTC [gossip.pull] HandleMessage -> DEBU 2488 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.697 UTC [gossip.gossip] handleMessage -> DEBU 2489 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.697 UTC [gossip.gossip] handleMessage -> DEBU 248a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.697 UTC [gossip.gossip] handleMessage -> DEBU 248b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 248c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.697 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 248d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:43.697 UTC [msp.identity] Verify -> DEBU 248e Verify: digest = 00000000 45 1b 82 8e 93 b8 86 5b fb 88 a9 8e 14 11 21 16 |E......[......!.| +peer0.org1.example.com | 00000010 98 be 42 94 65 cb 2f ec b8 79 2b f1 94 9d 1a 25 |..B.e./..y+....%|" +peer0.org1.example.com | "2019-09-24 00:25:43.697 UTC [msp.identity] Verify -> DEBU 248f Verify: sig = 00000000 30 45 02 21 00 c6 1a 00 13 43 bf 3c 8b 45 52 7e |0E.!.....C.<.ER~| +peer0.org1.example.com | 00000010 16 6a 97 0a 5a d8 37 15 8a 2c 67 1d 45 ee 27 e7 |.j..Z.7..,g.E.'.| +peer0.org1.example.com | 00000020 05 3c c7 69 79 02 20 59 d1 07 50 e5 cb 8d 81 7e |.<.iy. Y..P....~| +peer0.org1.example.com | 00000030 ef 8c 91 6c 87 09 ce a4 38 1a 95 99 d3 51 5b 2b |...l....8....Q[+| +peer0.org1.example.com | 00000040 ff cb be aa 88 d5 4f |......O|" +peer0.org1.example.com | "2019-09-24 00:25:43.697 UTC [gossip.discovery] handleAliveMessage -> DEBU 2490 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.697 UTC [gossip.discovery] isSentByMe -> DEBU 2491 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [gossip.discovery] handleAliveMessage -> DEBU 2492 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2493 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [msp] DeserializeIdentity -> DEBU 2494 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2495 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2496 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2497 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [policies] Evaluate -> DEBU 2498 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [policies] Evaluate -> DEBU 2499 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [policies] Evaluate -> DEBU 249a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [cauthdsl] func1 -> DEBU 249b 0xc0044e14d0 gate 1569284743698664500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [cauthdsl] func2 -> DEBU 249c 0xc0044e14d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:43.698 UTC [cauthdsl] func2 -> DEBU 249d 0xc0044e14d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:43.699 UTC [cauthdsl] func2 -> DEBU 249e 0xc0044e14d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:43.700 UTC [cauthdsl] func2 -> DEBU 24a0 0xc0044e14d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:43.701 UTC [cauthdsl] func1 -> DEBU 24a1 0xc0044e14d0 gate 1569284743698664500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:43.702 UTC [policies] Evaluate -> DEBU 24a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.702 UTC [policies] Evaluate -> DEBU 24a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.702 UTC [policies] Evaluate -> DEBU 24a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:43.702 UTC [cauthdsl] func1 -> DEBU 24a5 0xc0044e1d10 gate 1569284743702567100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:43.702 UTC [cauthdsl] func2 -> DEBU 24a6 0xc0044e1d10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:43.702 UTC [cauthdsl] func2 -> DEBU 24a7 0xc0044e1d10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:43.703 UTC [cauthdsl] func2 -> DEBU 24a8 0xc0044e1d10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:43.703 UTC [msp.identity] Verify -> DEBU 24a9 Verify: digest = 00000000 f8 6d c3 bb e3 d6 18 83 9b 5f 3e 08 e5 72 6b 60 |.m......._>..rk`| +peer0.org1.example.com | 00000010 b5 ec f0 28 02 c1 85 34 cf b1 30 de f7 3b 85 84 |...(...4..0..;..|" +peer0.org1.example.com | "2019-09-24 00:25:43.703 UTC [msp.identity] Verify -> DEBU 24aa Verify: sig = 00000000 30 45 02 21 00 dc 79 43 ca 09 57 c1 ea 31 31 d8 |0E.!..yC..W..11.| +peer0.org1.example.com | 00000010 7f b0 41 57 14 bd 71 b7 de da 45 e3 5e 07 c8 a8 |..AW..q...E.^...| +peer0.org1.example.com | 00000020 19 ce 14 d5 92 02 20 6a b8 78 88 66 c8 fd 3a 9d |...... j.x.f..:.| +peer0.org1.example.com | 00000030 32 e1 21 cd 03 d9 4f 6f e9 e7 ff 2c cd f6 2c a3 |2.!...Oo...,..,.| +peer0.org1.example.com | 00000040 97 bd 85 09 f0 c4 ea |.......|" +peer0.org1.example.com | "2019-09-24 00:25:43.699 UTC [gossip.comm] func1 -> DEBU 249f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.704 UTC [gossip.gossip] handleMessage -> DEBU 24ab Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.704 UTC [cauthdsl] func2 -> DEBU 24ac 0xc0044e1d10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:43.704 UTC [cauthdsl] func1 -> DEBU 24ad 0xc0044e1d10 gate 1569284743702567100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:43.704 UTC [policies] Evaluate -> DEBU 24ae Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.704 UTC [policies] Evaluate -> DEBU 24af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.704 UTC [policies] Evaluate -> DEBU 24b0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.704 UTC [policies] Evaluate -> DEBU 24b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.704 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.704 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.705 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24b6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:43.705 UTC [gossip.gossip] handleMessage -> DEBU 24b7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.705 UTC [msp.identity] Verify -> DEBU 24b8 Verify: digest = 00000000 45 1b 82 8e 93 b8 86 5b fb 88 a9 8e 14 11 21 16 |E......[......!.| +peer0.org1.example.com | 00000010 98 be 42 94 65 cb 2f ec b8 79 2b f1 94 9d 1a 25 |..B.e./..y+....%|" +peer0.org1.example.com | "2019-09-24 00:25:43.705 UTC [msp.identity] Verify -> DEBU 24b9 Verify: sig = 00000000 30 45 02 21 00 c6 1a 00 13 43 bf 3c 8b 45 52 7e |0E.!.....C.<.ER~| +peer0.org1.example.com | 00000010 16 6a 97 0a 5a d8 37 15 8a 2c 67 1d 45 ee 27 e7 |.j..Z.7..,g.E.'.| +peer0.org1.example.com | 00000020 05 3c c7 69 79 02 20 59 d1 07 50 e5 cb 8d 81 7e |.<.iy. Y..P....~| +peer0.org1.example.com | 00000030 ef 8c 91 6c 87 09 ce a4 38 1a 95 99 d3 51 5b 2b |...l....8....Q[+| +peer0.org1.example.com | 00000040 ff cb be aa 88 d5 4f |......O|" +peer0.org1.example.com | "2019-09-24 00:25:43.705 UTC [gossip.discovery] handleAliveMessage -> DEBU 24ba Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.705 UTC [gossip.discovery] isSentByMe -> DEBU 24bb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.705 UTC [gossip.discovery] handleAliveMessage -> DEBU 24bc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24bd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.935 UTC [gossip.gossip] handleMessage -> DEBU 24be Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.936 UTC [gossip.pull] HandleMessage -> DEBU 24bf GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.936 UTC [gossip.pull] SendDigest -> DEBU 24c6 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:43.936 UTC [gossip.gossip] handleMessage -> DEBU 24c7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.956 UTC [gossip.gossip] handleMessage -> DEBU 24c8 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [gossip.gossip] handleMessage -> DEBU 24c9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24ca Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24cb Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [msp] DeserializeIdentity -> DEBU 24cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24cd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24ce Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24cf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [policies] Evaluate -> DEBU 24d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [policies] Evaluate -> DEBU 24d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [policies] Evaluate -> DEBU 24d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [cauthdsl] func1 -> DEBU 24d3 0xc00450d150 gate 1569284743959873900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [cauthdsl] func2 -> DEBU 24d4 0xc00450d150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:43.959 UTC [cauthdsl] func2 -> DEBU 24d5 0xc00450d150 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24d6 0xc00450d150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24d7 0xc00450d150 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [cauthdsl] func1 -> DEBU 24d8 0xc00450d150 gate 1569284743959873900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24d9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [cauthdsl] func1 -> DEBU 24dc 0xc00450d990 gate 1569284743960284500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24dd 0xc00450d990 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24de 0xc00450d990 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24df 0xc00450d990 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [msp.identity] Verify -> DEBU 24e0 Verify: digest = 00000000 db 86 45 bb 27 d4 f8 e4 06 39 11 36 9c c6 15 48 |..E.'....9.6...H| +peer0.org1.example.com | 00000010 b2 b8 59 61 c3 43 5d 4c 0a e3 09 0c b1 ba 9b b9 |..Ya.C]L........|" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [msp.identity] Verify -> DEBU 24e1 Verify: sig = 00000000 30 44 02 20 09 48 76 a0 d1 8b 51 7b 6b fd 34 a2 |0D. .Hv...Q{k.4.| +peer0.org1.example.com | 00000010 22 53 bd 03 a9 9e 5b 70 0a 3c 1a de 26 e2 51 5d |"S....[p.<..&.Q]| +peer0.org1.example.com | 00000020 18 c5 e3 ba 02 20 49 e9 e3 09 6b 50 e0 8e 7f 4d |..... I...kP...M| +peer0.org1.example.com | 00000030 5f 73 97 62 b6 6d 4b 50 ea 90 ef d1 c5 04 f8 f8 |_s.b.mKP........| +peer0.org1.example.com | 00000040 92 a2 ef c9 76 c6 |....v.|" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24e2 0xc00450d990 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [cauthdsl] func1 -> DEBU 24e3 0xc00450d990 gate 1569284743960284500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24e4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24e6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:43.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 24e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:43.961 UTC [gossip.discovery] learnExistingMembers -> DEBU 24e9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:43.961 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ea updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:43.961 UTC [gossip.discovery] learnExistingMembers -> DEBU 24eb Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:43.961 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ec Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:43.961 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ed Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 24ee Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.961 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24ef Exiting" +peer0.org1.example.com | "2019-09-24 00:25:43.961 UTC [gossip.discovery] sendMemResponse -> DEBU 24f0 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:43.961 UTC [msp] DeserializeIdentity -> DEBU 24f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.961 UTC [msp] DeserializeIdentity -> DEBU 24f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.962 UTC [msp] DeserializeIdentity -> DEBU 24f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:43.962 UTC [gossip.comm] Send -> DEBU 24f4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:43.962 UTC [gossip.discovery] sendMemResponse -> DEBU 24f5 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020*" signature:"0D\002 \013\177\263\3528\345\245\303\255|d?\330\343\326\364c\271\332CK08\032I2U(\357\023\270\010\002 N\215\236\033\223\267Z&\357#\303\370\310\364\"\253Z%\345\374Z\000\035\364\311\237U\335\313\027\005\260" > alive: alive: alive: DEBU 251a 0xc00453efe0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.157 UTC [cauthdsl] func1 -> DEBU 251b 0xc00453efe0 gate 1569284744156726600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:44.157 UTC [policies] Evaluate -> DEBU 251c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.157 UTC [policies] Evaluate -> DEBU 251d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.157 UTC [policies] Evaluate -> DEBU 251e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.157 UTC [policies] Evaluate -> DEBU 251f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.157 UTC [msp.identity] Verify -> DEBU 2520 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:44.157 UTC [msp.identity] Verify -> DEBU 2521 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [msp.identity] Verify -> DEBU 2522 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [msp.identity] Verify -> DEBU 2523 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [msp] DeserializeIdentity -> DEBU 2524 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [msp] DeserializeIdentity -> DEBU 2525 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2526 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2527 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2528 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [policies] Evaluate -> DEBU 2529 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [policies] Evaluate -> DEBU 252a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [policies] Evaluate -> DEBU 252b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [cauthdsl] func1 -> DEBU 252c 0xc0045575f0 gate 1569284744158867900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [cauthdsl] func2 -> DEBU 252d 0xc0045575f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [cauthdsl] func2 -> DEBU 252e 0xc0045575f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.158 UTC [cauthdsl] func2 -> DEBU 252f 0xc0045575f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [cauthdsl] func2 -> DEBU 2530 0xc0045575f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [cauthdsl] func1 -> DEBU 2531 0xc0045575f0 gate 1569284744158867900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 2532 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 2533 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 2534 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [cauthdsl] func1 -> DEBU 2535 0xc004557e30 gate 1569284744159198600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [cauthdsl] func2 -> DEBU 2536 0xc004557e30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [cauthdsl] func2 -> DEBU 2537 0xc004557e30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [cauthdsl] func2 -> DEBU 2538 0xc004557e30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [msp.identity] Verify -> DEBU 2539 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [msp.identity] Verify -> DEBU 253a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [cauthdsl] func2 -> DEBU 253b 0xc004557e30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [cauthdsl] func1 -> DEBU 253c 0xc004557e30 gate 1569284744159198600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 253d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 253e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 253f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 2540 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [gossip.gossip] handleMessage -> DEBU 2541 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.159 UTC [gossip.comm] func1 -> DEBU 2542 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.160 UTC [gossip.gossip] handleMessage -> DEBU 2543 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.160 UTC [msp.identity] Verify -> DEBU 2544 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:44.160 UTC [msp.identity] Verify -> DEBU 2545 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:44.160 UTC [msp.identity] Verify -> DEBU 2546 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:44.160 UTC [msp.identity] Verify -> DEBU 2547 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [msp] DeserializeIdentity -> DEBU 2548 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [msp] DeserializeIdentity -> DEBU 2549 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 254a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 254b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 254c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [policies] Evaluate -> DEBU 254d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [policies] Evaluate -> DEBU 254e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [policies] Evaluate -> DEBU 254f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [cauthdsl] func1 -> DEBU 2550 0xc0045887e0 gate 1569284744161648400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [cauthdsl] func2 -> DEBU 2551 0xc0045887e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [cauthdsl] func2 -> DEBU 2552 0xc0045887e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [cauthdsl] func2 -> DEBU 2553 0xc0045887e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [cauthdsl] func2 -> DEBU 2554 0xc0045887e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [cauthdsl] func1 -> DEBU 2555 0xc0045887e0 gate 1569284744161648400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [policies] Evaluate -> DEBU 2556 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.161 UTC [policies] Evaluate -> DEBU 2557 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [policies] Evaluate -> DEBU 2558 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [cauthdsl] func1 -> DEBU 2559 0xc004589020 gate 1569284744162078900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [cauthdsl] func2 -> DEBU 255a 0xc004589020 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [cauthdsl] func2 -> DEBU 255b 0xc004589020 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [cauthdsl] func2 -> DEBU 255c 0xc004589020 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [msp.identity] Verify -> DEBU 255d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [msp.identity] Verify -> DEBU 255e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [cauthdsl] func2 -> DEBU 255f 0xc004589020 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [cauthdsl] func1 -> DEBU 2560 0xc004589020 gate 1569284744162078900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [policies] Evaluate -> DEBU 2561 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [policies] Evaluate -> DEBU 2562 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [policies] Evaluate -> DEBU 2563 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.162 UTC [policies] Evaluate -> DEBU 2564 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.175 UTC [gossip.comm] func1 -> DEBU 2565 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.175 UTC [msp] DeserializeIdentity -> DEBU 2566 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.176 UTC [msp] DeserializeIdentity -> DEBU 2567 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.176 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2568 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:44.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2569 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 256a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.176 UTC [policies] Evaluate -> DEBU 256b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.176 UTC [policies] Evaluate -> DEBU 256c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:44.176 UTC [policies] Evaluate -> DEBU 256d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.176 UTC [cauthdsl] func1 -> DEBU 256e 0xc00459c7f0 gate 1569284744176897400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.176 UTC [cauthdsl] func2 -> DEBU 256f 0xc00459c7f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 2570 0xc00459c7f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 2571 0xc00459c7f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 2572 0xc00459c7f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [cauthdsl] func1 -> DEBU 2573 0xc00459c7f0 gate 1569284744176897400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [policies] Evaluate -> DEBU 2574 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [policies] Evaluate -> DEBU 2575 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [policies] Evaluate -> DEBU 2576 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [cauthdsl] func1 -> DEBU 2577 0xc00459d030 gate 1569284744177347500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 2578 0xc00459d030 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 2579 0xc00459d030 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 257a 0xc00459d030 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.177 UTC [msp.identity] Verify -> DEBU 257b Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:44.178 UTC [msp.identity] Verify -> DEBU 257c Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:44.178 UTC [cauthdsl] func2 -> DEBU 257d 0xc00459d030 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.179 UTC [cauthdsl] func1 -> DEBU 257e 0xc00459d030 gate 1569284744177347500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:44.179 UTC [policies] Evaluate -> DEBU 257f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.179 UTC [policies] Evaluate -> DEBU 2580 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.179 UTC [policies] Evaluate -> DEBU 2581 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.179 UTC [policies] Evaluate -> DEBU 2582 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.179 UTC [gossip.gossip] handleMessage -> DEBU 2583 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.179 UTC [gossip.gossip] handleMessage -> DEBU 2584 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.179 UTC [msp] DeserializeIdentity -> DEBU 2585 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.180 UTC [msp] DeserializeIdentity -> DEBU 2586 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.180 UTC [msp] DeserializeIdentity -> DEBU 2587 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.181 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2588 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:44.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2589 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 258a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.181 UTC [policies] Evaluate -> DEBU 258b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.181 UTC [policies] Evaluate -> DEBU 258c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:44.181 UTC [policies] Evaluate -> DEBU 258d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.182 UTC [cauthdsl] func1 -> DEBU 258e 0xc0045b0b40 gate 1569284744182143000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.182 UTC [cauthdsl] func2 -> DEBU 258f 0xc0045b0b40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.182 UTC [cauthdsl] func2 -> DEBU 2590 0xc0045b0b40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.182 UTC [cauthdsl] func2 -> DEBU 2591 0xc0045b0b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:44.182 UTC [cauthdsl] func2 -> DEBU 2592 0xc0045b0b40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.182 UTC [cauthdsl] func1 -> DEBU 2593 0xc0045b0b40 gate 1569284744182143000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.183 UTC [policies] Evaluate -> DEBU 2594 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.183 UTC [policies] Evaluate -> DEBU 2595 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.183 UTC [policies] Evaluate -> DEBU 2596 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.184 UTC [cauthdsl] func1 -> DEBU 2597 0xc0045b1380 gate 1569284744184134300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.184 UTC [cauthdsl] func2 -> DEBU 2598 0xc0045b1380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.184 UTC [cauthdsl] func2 -> DEBU 2599 0xc0045b1380 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.184 UTC [cauthdsl] func2 -> DEBU 259a 0xc0045b1380 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.185 UTC [msp.identity] Verify -> DEBU 259b Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:44.185 UTC [msp.identity] Verify -> DEBU 259c Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:44.186 UTC [cauthdsl] func2 -> DEBU 259d 0xc0045b1380 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.186 UTC [cauthdsl] func1 -> DEBU 259e 0xc0045b1380 gate 1569284744184134300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:44.187 UTC [policies] Evaluate -> DEBU 259f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.187 UTC [policies] Evaluate -> DEBU 25a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.187 UTC [policies] Evaluate -> DEBU 25a1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.187 UTC [policies] Evaluate -> DEBU 25a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.188 UTC [msp.identity] Verify -> DEBU 25a3 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:44.188 UTC [msp.identity] Verify -> DEBU 25a4 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:44.189 UTC [msp] DeserializeIdentity -> DEBU 25a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.192 UTC [msp] DeserializeIdentity -> DEBU 25a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.192 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:44.193 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25a8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.193 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25a9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.193 UTC [policies] Evaluate -> DEBU 25aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.193 UTC [policies] Evaluate -> DEBU 25ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:44.193 UTC [policies] Evaluate -> DEBU 25ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.194 UTC [cauthdsl] func1 -> DEBU 25ad 0xc0045c9270 gate 1569284744193865400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.194 UTC [cauthdsl] func2 -> DEBU 25ae 0xc0045c9270 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.194 UTC [cauthdsl] func2 -> DEBU 25af 0xc0045c9270 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.194 UTC [cauthdsl] func2 -> DEBU 25b0 0xc0045c9270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:44.195 UTC [cauthdsl] func2 -> DEBU 25b1 0xc0045c9270 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.195 UTC [cauthdsl] func1 -> DEBU 25b2 0xc0045c9270 gate 1569284744193865400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.195 UTC [policies] Evaluate -> DEBU 25b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.195 UTC [policies] Evaluate -> DEBU 25b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.195 UTC [policies] Evaluate -> DEBU 25b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.195 UTC [cauthdsl] func1 -> DEBU 25b6 0xc0045c9ab0 gate 1569284744195835300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.195 UTC [cauthdsl] func2 -> DEBU 25b7 0xc0045c9ab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.195 UTC [cauthdsl] func2 -> DEBU 25b8 0xc0045c9ab0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.195 UTC [cauthdsl] func2 -> DEBU 25b9 0xc0045c9ab0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.196 UTC [msp.identity] Verify -> DEBU 25ba Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:44.196 UTC [msp.identity] Verify -> DEBU 25bb Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:44.196 UTC [cauthdsl] func2 -> DEBU 25bc 0xc0045c9ab0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.196 UTC [cauthdsl] func1 -> DEBU 25bd 0xc0045c9ab0 gate 1569284744195835300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:44.196 UTC [policies] Evaluate -> DEBU 25be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.196 UTC [policies] Evaluate -> DEBU 25bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.196 UTC [policies] Evaluate -> DEBU 25c0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.196 UTC [policies] Evaluate -> DEBU 25c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.196 UTC [msp.identity] Verify -> DEBU 25c2 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:44.196 UTC [msp.identity] Verify -> DEBU 25c3 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:44.197 UTC [gossip.gossip] handleMessage -> DEBU 25c4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.262 UTC [msp] DeserializeIdentity -> DEBU 25c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.262 UTC [msp] DeserializeIdentity -> DEBU 25c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.262 UTC [gossip.pull] Hello -> DEBU 25c7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:44.264 UTC [msp] DeserializeIdentity -> DEBU 25c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.264 UTC [msp] DeserializeIdentity -> DEBU 25c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.265 UTC [gossip.comm] Send -> DEBU 25ca Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 25cb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 25cc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.275 UTC [gossip.comm] func1 -> DEBU 25cd Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.275 UTC [gossip.gossip] handleMessage -> DEBU 25ce Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.275 UTC [gossip.pull] HandleMessage -> DEBU 25cf GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.275 UTC [gossip.gossip] handleMessage -> DEBU 25d0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 25d1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:44.608 UTC [msp.identity] Sign -> DEBU 25d2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151027 " +peer0.org1.example.com | "2019-09-24 00:25:44.608 UTC [msp.identity] Sign -> DEBU 25d3 Sign: digest: 89B587F588131632447AA836EF0FC948EDF3E31E434253A9367C8D26DB848E6C " +peer0.org1.example.com | "2019-09-24 00:25:44.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 25d4 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:44.608 UTC [msp.identity] Sign -> DEBU 25d5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:44.608 UTC [msp.identity] Sign -> DEBU 25d6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:44.608 UTC [gossip.discovery] periodicalSendAlive -> DEBU 25d7 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:44.618 UTC [msp] DeserializeIdentity -> DEBU 25d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.618 UTC [msp] DeserializeIdentity -> DEBU 25d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.618 UTC [gossip.comm] Send -> DEBU 25da Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:44.618 UTC [msp] DeserializeIdentity -> DEBU 25db Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.619 UTC [gossip.comm] Send -> DEBU 25dc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:44.619 UTC [msp] DeserializeIdentity -> DEBU 25dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.619 UTC [gossip.comm] Send -> DEBU 25de Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:44.619 UTC [gossip.comm] sendToEndpoint -> DEBU 25df Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.619 UTC [gossip.comm] sendToEndpoint -> DEBU 25e0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.620 UTC [gossip.comm] sendToEndpoint -> DEBU 25e1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.620 UTC [gossip.comm] sendToEndpoint -> DEBU 25e2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.620 UTC [gossip.comm] sendToEndpoint -> DEBU 25e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.620 UTC [gossip.comm] sendToEndpoint -> DEBU 25e4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.634 UTC [gossip.comm] func1 -> DEBU 25e5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.634 UTC [gossip.gossip] handleMessage -> DEBU 25e6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.634 UTC [gossip.gossip] handleMessage -> DEBU 25e7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25e8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25e9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:44.635 UTC [msp.identity] Verify -> DEBU 25ea Verify: digest = 00000000 89 b5 87 f5 88 13 16 32 44 7a a8 36 ef 0f c9 48 |.......2Dz.6...H| +peer0.org1.example.com | 00000010 ed f3 e3 1e 43 42 53 a9 36 7c 8d 26 db 84 8e 6c |....CBS.6|.&...l|" +peer0.org1.example.com | "2019-09-24 00:25:44.635 UTC [msp.identity] Verify -> DEBU 25eb Verify: sig = 00000000 30 44 02 20 2a 99 60 a1 bb 91 80 57 f7 3a c5 bc |0D. *.`....W.:..| +peer0.org1.example.com | 00000010 bc b1 94 a4 61 bb 8d df ba da 14 29 7e 06 ee a0 |....a......)~...| +peer0.org1.example.com | 00000020 34 34 90 8b 02 20 16 19 37 2c ad bf 5e a9 95 4d |44... ..7,..^..M| +peer0.org1.example.com | 00000030 81 67 09 3a b0 a0 cc e5 d7 f4 b7 8b f0 cf c1 36 |.g.:...........6| +peer0.org1.example.com | 00000040 be 19 28 44 37 f3 |..(D7.|" +peer0.org1.example.com | "2019-09-24 00:25:44.636 UTC [gossip.discovery] isSentByMe -> DEBU 25ec Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.636 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25ed Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.648 UTC [gossip.comm] func1 -> DEBU 25ee Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.648 UTC [gossip.gossip] handleMessage -> DEBU 25ef Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.649 UTC [msp] DeserializeIdentity -> DEBU 25f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.649 UTC [msp] DeserializeIdentity -> DEBU 25f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.649 UTC [gossip.gossip] handleMessage -> DEBU 25f2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.690 UTC [gossip.comm] func1 -> DEBU 25f3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.690 UTC [gossip.gossip] handleMessage -> DEBU 25f4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25f5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.691 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25f6 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:44.691 UTC [msp] DeserializeIdentity -> DEBU 25f7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.691 UTC [gossip.gossip] handleMessage -> DEBU 25f8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.691 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:44.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25fa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25fb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.691 UTC [policies] Evaluate -> DEBU 25fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.691 UTC [policies] Evaluate -> DEBU 25fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:44.691 UTC [policies] Evaluate -> DEBU 25fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.691 UTC [cauthdsl] func1 -> DEBU 25ff 0xc004622730 gate 1569284744691971800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 2600 0xc004622730 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 2601 0xc004622730 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 2602 0xc004622730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 2603 0xc004622730 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [cauthdsl] func1 -> DEBU 2604 0xc004622730 gate 1569284744691971800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [policies] Evaluate -> DEBU 2605 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [policies] Evaluate -> DEBU 2606 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [policies] Evaluate -> DEBU 2607 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [cauthdsl] func1 -> DEBU 2608 0xc004622f70 gate 1569284744692544200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 2609 0xc004622f70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 260a 0xc004622f70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 260b 0xc004622f70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [msp.identity] Verify -> DEBU 260c Verify: digest = 00000000 e7 db be cb e9 89 4c 15 9f 00 39 33 f5 a5 c3 df |......L...93....| +peer0.org1.example.com | 00000010 3b 4b d8 b8 05 5f 87 68 b6 11 3a 1b e0 16 15 87 |;K..._.h..:.....|" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [msp.identity] Verify -> DEBU 260d Verify: sig = 00000000 30 45 02 21 00 c7 6e d2 1a 94 39 12 b7 57 c1 3a |0E.!..n...9..W.:| +peer0.org1.example.com | 00000010 d6 85 ac 08 2d de 69 c3 61 b7 19 e3 76 a4 ed 49 |....-.i.a...v..I| +peer0.org1.example.com | 00000020 a3 e2 67 6f e1 02 20 34 74 38 93 fd 3b 68 62 06 |..go.. 4t8..;hb.| +peer0.org1.example.com | 00000030 8b 94 c3 86 c4 08 8b 6d f4 92 fa 87 8a d0 fe 31 |.......m.......1| +peer0.org1.example.com | 00000040 82 d8 50 ee 7c 5c f4 |..P.|\.|" +peer0.org1.example.com | "2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 260e 0xc004622f70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [cauthdsl] func1 -> DEBU 260f 0xc004622f70 gate 1569284744692544200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [policies] Evaluate -> DEBU 2610 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [policies] Evaluate -> DEBU 2611 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [policies] Evaluate -> DEBU 2612 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [policies] Evaluate -> DEBU 2613 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 2614 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2615 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2616 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2617 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2618 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2619 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 261a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 261b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.694 UTC [gossip.discovery] sendMemResponse -> DEBU 261c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:44.694 UTC [msp] DeserializeIdentity -> DEBU 261d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.694 UTC [msp] DeserializeIdentity -> DEBU 261e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.697 UTC [msp] DeserializeIdentity -> DEBU 261f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.697 UTC [gossip.comm] Send -> DEBU 2620 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:44.697 UTC [gossip.discovery] sendMemResponse -> DEBU 2621 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020*" signature:"0D\002 \013\177\263\3528\345\245\303\255|d?\330\343\326\364c\271\332CK08\032I2U(\357\023\270\010\002 N\215\236\033\223\267Z&\357#\303\370\310\364\"\253Z%\345\374Z\000\035\364\311\237U\335\313\027\005\260" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:44.698 UTC [gossip.comm] sendToEndpoint -> DEBU 2622 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.698 UTC [gossip.comm] sendToEndpoint -> DEBU 2623 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.717 UTC [gossip.comm] func1 -> DEBU 2624 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.718 UTC [gossip.gossip] handleMessage -> DEBU 2625 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.718 UTC [gossip.pull] HandleMessage -> DEBU 2626 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.718 UTC [msp] DeserializeIdentity -> DEBU 2627 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.718 UTC [msp] DeserializeIdentity -> DEBU 2628 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.719 UTC [msp] DeserializeIdentity -> DEBU 2629 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.719 UTC [msp] DeserializeIdentity -> DEBU 262a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.719 UTC [msp] DeserializeIdentity -> DEBU 262b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.735 UTC [msp] DeserializeIdentity -> DEBU 262c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.735 UTC [gossip.pull] SendDigest -> DEBU 262d Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:44.735 UTC [gossip.gossip] handleMessage -> DEBU 262e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.773 UTC [gossip.comm] func1 -> DEBU 262f Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.773 UTC [gossip.gossip] handleMessage -> DEBU 2630 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.773 UTC [gossip.pull] HandleMessage -> DEBU 2631 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.773 UTC [gossip.pull] SendDigest -> DEBU 2632 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:44.773 UTC [gossip.gossip] handleMessage -> DEBU 2633 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.972 UTC [gossip.gossip] handleMessage -> DEBU 2634 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.972 UTC [gossip.gossip] handleMessage -> DEBU 2635 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2636 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.973 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2637 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:44.973 UTC [msp] DeserializeIdentity -> DEBU 2638 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.973 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2639 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:44.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 263a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 263b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:44.973 UTC [policies] Evaluate -> DEBU 263c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.973 UTC [policies] Evaluate -> DEBU 263d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:44.973 UTC [policies] Evaluate -> DEBU 263e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.973 UTC [cauthdsl] func1 -> DEBU 263f 0xc004609c60 gate 1569284744973878300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.973 UTC [cauthdsl] func2 -> DEBU 2640 0xc004609c60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.974 UTC [cauthdsl] func2 -> DEBU 2641 0xc004609c60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.974 UTC [cauthdsl] func2 -> DEBU 2642 0xc004609c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:44.974 UTC [cauthdsl] func2 -> DEBU 2643 0xc004609c60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.974 UTC [cauthdsl] func1 -> DEBU 2644 0xc004609c60 gate 1569284744973878300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:44.974 UTC [policies] Evaluate -> DEBU 2645 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.974 UTC [policies] Evaluate -> DEBU 2646 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.974 UTC [policies] Evaluate -> DEBU 2647 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:44.974 UTC [cauthdsl] func1 -> DEBU 2648 0xc00465a4a0 gate 1569284744974945100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:44.975 UTC [cauthdsl] func2 -> DEBU 2649 0xc00465a4a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:44.975 UTC [cauthdsl] func2 -> DEBU 264a 0xc00465a4a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:44.975 UTC [cauthdsl] func2 -> DEBU 264b 0xc00465a4a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.975 UTC [msp.identity] Verify -> DEBU 264c Verify: digest = 00000000 9b 41 6e 6e 12 90 1b 45 7d 49 bb 61 22 35 de 2d |.Ann...E}I.a"5.-| +peer0.org1.example.com | 00000010 98 1b eb af 9f 6b fd bf 7b b4 c4 d5 cb 67 e9 a8 |.....k..{....g..|" +peer0.org1.example.com | "2019-09-24 00:25:44.979 UTC [msp.identity] Verify -> DEBU 264d Verify: sig = 00000000 30 44 02 20 18 dc 75 20 f1 a0 e5 36 5f 35 57 1e |0D. ..u ...6_5W.| +peer0.org1.example.com | 00000010 0e 35 e7 4e ba b2 a2 04 cb 65 a4 10 56 4e 7f 77 |.5.N.....e..VN.w| +peer0.org1.example.com | 00000020 24 19 3f ed 02 20 0c f0 43 d6 b3 63 91 01 e4 b0 |$.?.. ..C..c....| +peer0.org1.example.com | 00000030 14 37 d4 94 93 38 d4 53 d6 2d 32 03 fa c0 62 e2 |.7...8.S.-2...b.| +peer0.org1.example.com | 00000040 38 81 a9 d5 4d 5d |8...M]|" +peer0.org1.example.com | "2019-09-24 00:25:44.979 UTC [cauthdsl] func2 -> DEBU 264e 0xc00465a4a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:44.979 UTC [cauthdsl] func1 -> DEBU 264f 0xc00465a4a0 gate 1569284744974945100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:44.979 UTC [policies] Evaluate -> DEBU 2650 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.979 UTC [policies] Evaluate -> DEBU 2651 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.979 UTC [policies] Evaluate -> DEBU 2652 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.979 UTC [policies] Evaluate -> DEBU 2653 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:44.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 2654 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2655 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:44.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2656 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:44.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2657 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:44.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2658 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:44.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2659 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 265a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 265b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.985 UTC [gossip.comm] func1 -> DEBU 265c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.985 UTC [gossip.gossip] handleMessage -> DEBU 265d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.985 UTC [gossip.gossip] handleMessage -> DEBU 265e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.985 UTC [gossip.discovery] handleMsgFromComm -> DEBU 265f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.985 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2660 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.985 UTC [gossip.comm] func1 -> DEBU 2661 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.985 UTC [gossip.gossip] handleMessage -> DEBU 2662 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.985 UTC [gossip.gossip] handleMessage -> DEBU 2663 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2664 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2665 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.986 UTC [msp] DeserializeIdentity -> DEBU 2666 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.986 UTC [msp] DeserializeIdentity -> DEBU 2667 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.986 UTC [msp] DeserializeIdentity -> DEBU 2668 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.986 UTC [msp] DeserializeIdentity -> DEBU 2669 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.987 UTC [msp] DeserializeIdentity -> DEBU 266a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.987 UTC [msp] DeserializeIdentity -> DEBU 266b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.987 UTC [msp] DeserializeIdentity -> DEBU 266c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.987 UTC [gossip.comm] Send -> DEBU 266d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:44.987 UTC [msp] DeserializeIdentity -> DEBU 266e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:44.988 UTC [gossip.comm] Send -> DEBU 266f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:44.989 UTC [gossip.comm] sendToEndpoint -> DEBU 2670 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.990 UTC [gossip.comm] sendToEndpoint -> DEBU 2671 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:44.990 UTC [gossip.comm] sendToEndpoint -> DEBU 2672 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:44.991 UTC [gossip.comm] sendToEndpoint -> DEBU 2673 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.144 UTC [gossip.gossip] handleMessage -> DEBU 2674 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.144 UTC [msp] DeserializeIdentity -> DEBU 2675 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.144 UTC [msp] DeserializeIdentity -> DEBU 2676 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.145 UTC [msp] DeserializeIdentity -> DEBU 2677 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.145 UTC [gossip.gossip] handleMessage -> DEBU 2678 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.677 UTC [gossip.comm] func1 -> DEBU 2679 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.678 UTC [gossip.gossip] handleMessage -> DEBU 267a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.678 UTC [gossip.pull] HandleMessage -> DEBU 267b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.678 UTC [gossip.pull] SendDigest -> DEBU 267c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:45.678 UTC [gossip.gossip] handleMessage -> DEBU 267d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.707 UTC [gossip.comm] func1 -> DEBU 267e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.707 UTC [gossip.gossip] handleMessage -> DEBU 267f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.707 UTC [gossip.gossip] handleMessage -> DEBU 2680 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2681 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.708 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2682 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:45.708 UTC [msp] DeserializeIdentity -> DEBU 2683 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2684 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:45.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2685 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:45.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2686 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:45.709 UTC [policies] Evaluate -> DEBU 2687 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:45.709 UTC [policies] Evaluate -> DEBU 2688 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:45.709 UTC [policies] Evaluate -> DEBU 2689 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:45.709 UTC [cauthdsl] func1 -> DEBU 268a 0xc00466fe50 gate 1569284745709849900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:45.709 UTC [cauthdsl] func2 -> DEBU 268b 0xc00466fe50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:45.710 UTC [cauthdsl] func2 -> DEBU 268c 0xc00466fe50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:45.721 UTC [gossip.gossip] handleMessage -> DEBU 268d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.710 UTC [cauthdsl] func2 -> DEBU 268e 0xc00466fe50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:45.722 UTC [cauthdsl] func2 -> DEBU 268f 0xc00466fe50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:45.722 UTC [cauthdsl] func1 -> DEBU 2690 0xc00466fe50 gate 1569284745709849900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:45.723 UTC [policies] Evaluate -> DEBU 2691 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:45.723 UTC [policies] Evaluate -> DEBU 2692 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:45.723 UTC [policies] Evaluate -> DEBU 2693 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:45.723 UTC [cauthdsl] func1 -> DEBU 2694 0xc004694690 gate 1569284745723485400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:45.723 UTC [cauthdsl] func2 -> DEBU 2695 0xc004694690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:45.723 UTC [cauthdsl] func2 -> DEBU 2696 0xc004694690 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:45.723 UTC [cauthdsl] func2 -> DEBU 2697 0xc004694690 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:45.723 UTC [msp.identity] Verify -> DEBU 2698 Verify: digest = 00000000 2a d7 20 89 20 a3 8e 02 89 54 df 03 53 43 e8 35 |*. . ....T..SC.5| +peer0.org1.example.com | 00000010 e6 45 0c 0e eb 7f fd 41 77 95 16 63 9b be 2a 47 |.E.....Aw..c..*G|" +peer0.org1.example.com | "2019-09-24 00:25:45.723 UTC [msp.identity] Verify -> DEBU 2699 Verify: sig = 00000000 30 44 02 20 71 58 8e 78 76 1b 29 5b 91 44 49 19 |0D. qX.xv.)[.DI.| +peer0.org1.example.com | 00000010 2c 0b 58 0e 65 fa 2d 91 af ee 75 e0 74 22 4e 18 |,.X.e.-...u.t"N.| +peer0.org1.example.com | 00000020 73 70 ca dd 02 20 4a 49 8f 0a 65 91 5b 9e 32 7d |sp... JI..e.[.2}| +peer0.org1.example.com | 00000030 b0 66 77 2a 89 8d 90 13 98 06 e3 21 8b 95 56 4c |.fw*.......!..VL| +peer0.org1.example.com | 00000040 98 f8 04 dd 35 e8 |....5.|" +peer0.org1.example.com | "2019-09-24 00:25:45.724 UTC [cauthdsl] func2 -> DEBU 269a 0xc004694690 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:45.724 UTC [cauthdsl] func1 -> DEBU 269b 0xc004694690 gate 1569284745723485400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:45.724 UTC [policies] Evaluate -> DEBU 269c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:45.724 UTC [policies] Evaluate -> DEBU 269d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:45.724 UTC [policies] Evaluate -> DEBU 269e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:45.724 UTC [policies] Evaluate -> DEBU 269f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:45.724 UTC [gossip.discovery] handleAliveMessage -> DEBU 26a0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.724 UTC [gossip.discovery] learnExistingMembers -> DEBU 26a1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:45.743 UTC [gossip.comm] func1 -> DEBU 26a2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020+" signature:"0C\002 \020\336=d\001S\304*+gd\206O\206|\025>\\\344~\321\211\034F\000\215q\234\366B\213\260\002\037\022\244hv\264\330 > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.724 UTC [gossip.discovery] learnExistingMembers -> DEBU 26a3 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:45.744 UTC [gossip.discovery] learnExistingMembers -> DEBU 26a4 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:45.744 UTC [gossip.discovery] learnExistingMembers -> DEBU 26a5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:45.744 UTC [gossip.discovery] learnExistingMembers -> DEBU 26a6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.744 UTC [gossip.discovery] handleAliveMessage -> DEBU 26a7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.744 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26a8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26a9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26aa Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.745 UTC [gossip.gossip] handleMessage -> DEBU 26ab Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.745 UTC [gossip.gossip] handleMessage -> DEBU 26ac Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020+" signature:"0C\002 \020\336=d\001S\304*+gd\206O\206|\025>\\\344~\321\211\034F\000\215q\234\366B\213\260\002\037\022\244hv\264\330 > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.745 UTC [gossip.gossip] handleMessage -> DEBU 26ad Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26ae Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020+" signature:"0C\002 \020\336=d\001S\304*+gd\206O\206|\025>\\\344~\321\211\034F\000\215q\234\366B\213\260\002\037\022\244hv\264\330 > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.746 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26af Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:45.746 UTC [msp.identity] Verify -> DEBU 26b0 Verify: digest = 00000000 4f 03 c7 13 35 57 6f 58 02 91 12 d4 ee 7f 7b 74 |O...5WoX......{t| +peer0.org1.example.com | 00000010 de 9a 09 21 9d 05 e0 30 b5 b2 c0 46 9b 96 9b cf |...!...0...F....|" +peer0.org1.example.com | "2019-09-24 00:25:45.746 UTC [msp.identity] Verify -> DEBU 26b1 Verify: sig = 00000000 30 43 02 20 10 de 3d 64 01 53 c4 2a 2b 67 64 86 |0C. ..=d.S.*+gd.| +peer0.org1.example.com | 00000010 4f 86 7c 15 3e 5c e4 7e d1 89 1c 46 00 8d 71 9c |O.|.>\.~...F..q.| +peer0.org1.example.com | 00000020 f6 42 8b b0 02 1f 12 a4 68 76 b4 d8 3c 52 7e 0a |.B......hv.. DEBU 26b2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:45.747 UTC [msp.identity] Verify -> DEBU 26b3 Verify: sig = 00000000 30 45 02 21 00 8c fc 44 af 56 a8 a9 21 45 59 8c |0E.!...D.V..!EY.| +peer0.org1.example.com | 00000010 c2 56 24 d9 08 4d 41 05 e8 cf 56 cf f0 96 44 f5 |.V$..MA...V...D.| +peer0.org1.example.com | 00000020 08 c5 1d 87 68 02 20 60 8a b6 d3 09 b8 84 bd 87 |....h. `........| +peer0.org1.example.com | 00000030 c1 22 74 e3 fe 0e f4 40 90 40 62 89 75 8b 9b ac |."t....@.@b.u...| +peer0.org1.example.com | 00000040 26 ca 1f 17 c2 8e 7f |&......|" +peer0.org1.example.com | "2019-09-24 00:25:45.747 UTC [msp] DeserializeIdentity -> DEBU 26b4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.747 UTC [gossip.discovery] handleAliveMessage -> DEBU 26b5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.747 UTC [msp] DeserializeIdentity -> DEBU 26b6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 26b7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:45.747 UTC [msp] DeserializeIdentity -> DEBU 26b8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 26b9 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:45.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 26ba Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:45.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 26bb Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:45.750 UTC [msp] DeserializeIdentity -> DEBU 26bc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.751 UTC [msp] DeserializeIdentity -> DEBU 26bd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.751 UTC [msp] DeserializeIdentity -> DEBU 26be Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.751 UTC [msp] DeserializeIdentity -> DEBU 26bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.756 UTC [gossip.comm] Send -> DEBU 26c0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:45.756 UTC [msp] DeserializeIdentity -> DEBU 26c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.756 UTC [gossip.comm] Send -> DEBU 26c2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:45.756 UTC [gossip.comm] sendToEndpoint -> DEBU 26c3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.756 UTC [gossip.comm] sendToEndpoint -> DEBU 26c4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.757 UTC [gossip.comm] sendToEndpoint -> DEBU 26c5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.757 UTC [gossip.comm] sendToEndpoint -> DEBU 26c6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.757 UTC [gossip.comm] func1 -> DEBU 26c7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.757 UTC [gossip.gossip] handleMessage -> DEBU 26c8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.757 UTC [gossip.discovery] handleAliveMessage -> DEBU 26ca Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.757 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26cb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.758 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26cc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.758 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26cd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.758 UTC [gossip.gossip] handleMessage -> DEBU 26ce Exiting" +peer0.org1.example.com | "2019-09-24 00:25:45.758 UTC [gossip.discovery] sendMemResponse -> DEBU 26cf Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:45.759 UTC [msp] DeserializeIdentity -> DEBU 26d0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.763 UTC [msp] DeserializeIdentity -> DEBU 26d1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:45.763 UTC [gossip.comm] Send -> DEBU 26d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:45.763 UTC [gossip.discovery] sendMemResponse -> DEBU 26d3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020+" signature:"0C\002 \020\336=d\001S\304*+gd\206O\206|\025>\\\344~\321\211\034F\000\215q\234\366B\213\260\002\037\022\244hv\264\330 > alive: " +peer0.org1.example.com | "2019-09-24 00:25:45.763 UTC [gossip.comm] sendToEndpoint -> DEBU 26d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:45.763 UTC [gossip.comm] sendToEndpoint -> DEBU 26d5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:46.078 UTC [gossip.comm] func1 -> DEBU 26d6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:46.078 UTC [gossip.gossip] handleMessage -> DEBU 26d7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:46.078 UTC [msp] DeserializeIdentity -> DEBU 26d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:46.078 UTC [msp] DeserializeIdentity -> DEBU 26d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:46.078 UTC [msp] DeserializeIdentity -> DEBU 26da Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:46.078 UTC [gossip.gossip] handleMessage -> DEBU 26db Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.274 UTC [gossip.election] waitForInterrupt -> DEBU 26dc c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.274 UTC [gossip.election] IsLeader -> DEBU 26dd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:25:47.274 UTC [msp] GetDefaultSigningIdentity -> DEBU 26de Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:47.274 UTC [msp.identity] Sign -> DEBU 26df Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315100B1801 " +peer0.org1.example.com | "2019-09-24 00:25:47.275 UTC [msp.identity] Sign -> DEBU 26e0 Sign: digest: ED394AFE204F1F7D7155E5C9B74AF7776B2A9654A4B67EFF6F35C99FA2A0275E " +peer0.org1.example.com | "2019-09-24 00:25:47.276 UTC [gossip.election] waitForInterrupt -> DEBU 26e1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:25:47.296 UTC [msp] DeserializeIdentity -> DEBU 26e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.297 UTC [msp] DeserializeIdentity -> DEBU 26e3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.297 UTC [msp] DeserializeIdentity -> DEBU 26e4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.298 UTC [msp] DeserializeIdentity -> DEBU 26e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.298 UTC [gossip.comm] Send -> DEBU 26e6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:47.298 UTC [gossip.comm] sendToEndpoint -> DEBU 26e7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.298 UTC [gossip.comm] sendToEndpoint -> DEBU 26e8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.299 UTC [msp] DeserializeIdentity -> DEBU 26e9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.299 UTC [msp] DeserializeIdentity -> DEBU 26ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.662 UTC [gossip.comm] func1 -> DEBU 26eb Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.681 UTC [gossip.pull] Hello -> DEBU 26ec Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:47.702 UTC [gossip.comm] Send -> DEBU 26ee Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:47.702 UTC [gossip.pull] Hello -> DEBU 26ef Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:47.702 UTC [gossip.comm] Send -> DEBU 26f0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:47.702 UTC [gossip.pull] Hello -> DEBU 26f1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:47.702 UTC [gossip.comm] Send -> DEBU 26f2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:47.702 UTC [gossip.comm] sendToEndpoint -> DEBU 26f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.702 UTC [gossip.comm] sendToEndpoint -> DEBU 26f4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.684 UTC [msp] GetDefaultSigningIdentity -> DEBU 26ed Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:47.702 UTC [msp.identity] Sign -> DEBU 26f5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151028 " +peer0.org1.example.com | "2019-09-24 00:25:47.703 UTC [msp.identity] Sign -> DEBU 26f6 Sign: digest: 5315E1AD23D3C20DD484F3DB79EF7584B5495FC0FB71798C09E0BCBA068BD124 " +peer0.org1.example.com | "2019-09-24 00:25:47.703 UTC [msp] GetDefaultSigningIdentity -> DEBU 26f7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:47.703 UTC [msp.identity] Sign -> DEBU 26f8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:47.703 UTC [msp.identity] Sign -> DEBU 26f9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:47.703 UTC [gossip.comm] Send -> DEBU 26fa Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:47.703 UTC [msp] DeserializeIdentity -> DEBU 26fb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.703 UTC [gossip.comm] Send -> DEBU 26fc Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:47.703 UTC [msp] DeserializeIdentity -> DEBU 26fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.703 UTC [gossip.comm] Send -> DEBU 26fe Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:47.703 UTC [gossip.comm] sendToEndpoint -> DEBU 26ff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.703 UTC [gossip.comm] sendToEndpoint -> DEBU 2700 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2701 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2702 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2703 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2704 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2705 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2706 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.705 UTC [gossip.gossip] handleMessage -> DEBU 2707 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.705 UTC [gossip.gossip] handleMessage -> DEBU 2708 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2709 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.705 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 270a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:47.706 UTC [msp.identity] Verify -> DEBU 270b Verify: digest = 00000000 29 8e 6b 78 71 2e 86 50 eb cd 96 2b 12 42 46 6f |).kxq..P...+.BFo| +peer0.org1.example.com | 00000010 7b ed ea 06 10 09 35 e8 d9 92 fa 56 88 ac 34 b4 |{.....5....V..4.|" +peer0.org1.example.com | "2019-09-24 00:25:47.706 UTC [msp.identity] Verify -> DEBU 270c Verify: sig = 00000000 30 44 02 20 5f 9f 88 18 33 14 f8 eb 3f c7 36 98 |0D. _...3...?.6.| +peer0.org1.example.com | 00000010 dd ee 93 21 12 8c 40 3e e4 b9 ca 34 7a 7d b9 84 |...!..@>...4z}..| +peer0.org1.example.com | 00000020 5b a9 4c c6 02 20 2c 99 f4 60 16 0d c7 15 e5 dc |[.L.. ,..`......| +peer0.org1.example.com | 00000030 a8 d1 49 66 39 fb e7 77 53 aa a4 70 3d e1 eb f6 |..If9..wS..p=...| +peer0.org1.example.com | 00000040 bb b6 dd 82 7d 2b |....}+|" +peer0.org1.example.com | "2019-09-24 00:25:47.706 UTC [gossip.comm] sendToEndpoint -> DEBU 270d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 270e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.706 UTC [gossip.comm] sendToEndpoint -> DEBU 270f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 2710 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:47.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 2711 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:47.706 UTC [gossip.comm] func1 -> DEBU 2712 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 2713 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:47.706 UTC [gossip.gossip] handleMessage -> DEBU 2714 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 2715 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 2716 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 2717 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2718 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2719 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [msp] DeserializeIdentity -> DEBU 271a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 271b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.gossip] handleMessage -> DEBU 271c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [msp] DeserializeIdentity -> DEBU 271d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [msp] DeserializeIdentity -> DEBU 271e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.comm] Send -> DEBU 271f Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [msp] DeserializeIdentity -> DEBU 2720 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.comm] Send -> DEBU 2721 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 2722 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 2723 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 2724 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 2725 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.718 UTC [gossip.comm] func1 -> DEBU 2726 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.718 UTC [gossip.comm] func1 -> DEBU 2727 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [gossip.gossip] handleMessage -> DEBU 2728 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [gossip.pull] HandleMessage -> DEBU 2729 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [gossip.gossip] handleMessage -> DEBU 272a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [gossip.gossip] handleMessage -> DEBU 272b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [gossip.gossip] handleMessage -> DEBU 272c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [gossip.discovery] handleMsgFromComm -> DEBU 272d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 272e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [msp.identity] Verify -> DEBU 272f Verify: digest = 00000000 53 15 e1 ad 23 d3 c2 0d d4 84 f3 db 79 ef 75 84 |S...#.......y.u.| +peer0.org1.example.com | 00000010 b5 49 5f c0 fb 71 79 8c 09 e0 bc ba 06 8b d1 24 |.I_..qy........$|" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [msp.identity] Verify -> DEBU 2730 Verify: sig = 00000000 30 45 02 21 00 ad ba 34 3c ee 91 12 2d a7 15 78 |0E.!...4<...-..x| +peer0.org1.example.com | 00000010 8e 31 cd 25 49 34 6d 6f 35 37 2e fc 82 f9 ae da |.1.%I4mo57......| +peer0.org1.example.com | 00000020 a5 31 d4 86 47 02 20 74 c9 94 9e f0 e6 e0 6a cd |.1..G. t......j.| +peer0.org1.example.com | 00000030 a3 d5 71 5f 57 c3 6f ee 6a a3 c1 17 59 a4 8e 14 |..q_W.o.j...Y...| +peer0.org1.example.com | 00000040 84 2b 13 eb ee b0 0f |.+.....|" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [gossip.discovery] handleAliveMessage -> DEBU 2731 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [gossip.discovery] isSentByMe -> DEBU 2732 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [gossip.discovery] handleAliveMessage -> DEBU 2733 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.719 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2734 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.720 UTC [gossip.comm] func1 -> DEBU 2735 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.720 UTC [gossip.gossip] handleMessage -> DEBU 2736 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.720 UTC [gossip.pull] HandleMessage -> DEBU 2737 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.720 UTC [gossip.gossip] handleMessage -> DEBU 2738 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.728 UTC [gossip.comm] func1 -> DEBU 2739 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.728 UTC [gossip.gossip] handleMessage -> DEBU 273a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.728 UTC [gossip.gossip] handleMessage -> DEBU 273b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 273c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.729 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 273d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:47.729 UTC [msp.identity] Verify -> DEBU 273e Verify: digest = 00000000 53 15 e1 ad 23 d3 c2 0d d4 84 f3 db 79 ef 75 84 |S...#.......y.u.| +peer0.org1.example.com | 00000010 b5 49 5f c0 fb 71 79 8c 09 e0 bc ba 06 8b d1 24 |.I_..qy........$|" +peer0.org1.example.com | "2019-09-24 00:25:47.729 UTC [msp.identity] Verify -> DEBU 273f Verify: sig = 00000000 30 45 02 21 00 ad ba 34 3c ee 91 12 2d a7 15 78 |0E.!...4<...-..x| +peer0.org1.example.com | 00000010 8e 31 cd 25 49 34 6d 6f 35 37 2e fc 82 f9 ae da |.1.%I4mo57......| +peer0.org1.example.com | 00000020 a5 31 d4 86 47 02 20 74 c9 94 9e f0 e6 e0 6a cd |.1..G. t......j.| +peer0.org1.example.com | 00000030 a3 d5 71 5f 57 c3 6f ee 6a a3 c1 17 59 a4 8e 14 |..q_W.o.j...Y...| +peer0.org1.example.com | 00000040 84 2b 13 eb ee b0 0f |.+.....|" +peer0.org1.example.com | "2019-09-24 00:25:47.729 UTC [msp.identity] Verify -> DEBU 2740 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:47.729 UTC [msp.identity] Verify -> DEBU 2741 Verify: sig = 00000000 30 44 02 20 3a c2 a6 57 b8 47 72 eb 3d b8 93 4a |0D. :..W.Gr.=..J| +peer0.org1.example.com | 00000010 b6 82 aa 88 d5 13 00 72 a0 9a 6f ae c4 3b 51 f7 |.......r..o..;Q.| +peer0.org1.example.com | 00000020 d4 71 4a ed 02 20 3d 29 d5 5b 13 3f 49 e8 d9 17 |.qJ.. =).[.?I...| +peer0.org1.example.com | 00000030 8b 4d 47 20 c8 d8 57 5b cf 8b 6b e2 7e ab fb 63 |.MG ..W[..k.~..c| +peer0.org1.example.com | 00000040 5b 13 46 8c 79 96 |[.F.y.|" +peer0.org1.example.com | "2019-09-24 00:25:47.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 2742 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.729 UTC [gossip.discovery] isSentByMe -> DEBU 2743 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 2744 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2745 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.737 UTC [gossip.gossip] handleMessage -> DEBU 2746 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.737 UTC [gossip.pull] HandleMessage -> DEBU 2747 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.737 UTC [gossip.gossip] handleMessage -> DEBU 2748 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.737 UTC [gossip.gossip] handleMessage -> DEBU 2749 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.737 UTC [gossip.gossip] handleMessage -> DEBU 274a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.738 UTC [gossip.discovery] handleMsgFromComm -> DEBU 274b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.738 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 274c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:47.738 UTC [msp.identity] Verify -> DEBU 274d Verify: digest = 00000000 53 15 e1 ad 23 d3 c2 0d d4 84 f3 db 79 ef 75 84 |S...#.......y.u.| +peer0.org1.example.com | 00000010 b5 49 5f c0 fb 71 79 8c 09 e0 bc ba 06 8b d1 24 |.I_..qy........$|" +peer0.org1.example.com | "2019-09-24 00:25:47.738 UTC [msp.identity] Verify -> DEBU 274e Verify: sig = 00000000 30 45 02 21 00 ad ba 34 3c ee 91 12 2d a7 15 78 |0E.!...4<...-..x| +peer0.org1.example.com | 00000010 8e 31 cd 25 49 34 6d 6f 35 37 2e fc 82 f9 ae da |.1.%I4mo57......| +peer0.org1.example.com | 00000020 a5 31 d4 86 47 02 20 74 c9 94 9e f0 e6 e0 6a cd |.1..G. t......j.| +peer0.org1.example.com | 00000030 a3 d5 71 5f 57 c3 6f ee 6a a3 c1 17 59 a4 8e 14 |..q_W.o.j...Y...| +peer0.org1.example.com | 00000040 84 2b 13 eb ee b0 0f |.+.....|" +peer0.org1.example.com | "2019-09-24 00:25:47.738 UTC [gossip.discovery] handleAliveMessage -> DEBU 274f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.738 UTC [gossip.discovery] isSentByMe -> DEBU 2750 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.738 UTC [gossip.discovery] handleAliveMessage -> DEBU 2751 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.738 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2752 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.745 UTC [gossip.gossip] handleMessage -> DEBU 2753 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.745 UTC [gossip.gossip] handleMessage -> DEBU 2754 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2755 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2756 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.936 UTC [gossip.gossip] handleMessage -> DEBU 2757 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.936 UTC [gossip.pull] HandleMessage -> DEBU 2758 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.936 UTC [msp] DeserializeIdentity -> DEBU 2759 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.936 UTC [msp] DeserializeIdentity -> DEBU 275a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.937 UTC [msp] DeserializeIdentity -> DEBU 275b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.937 UTC [msp] DeserializeIdentity -> DEBU 275c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.937 UTC [msp] DeserializeIdentity -> DEBU 275d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.937 UTC [msp] DeserializeIdentity -> DEBU 275e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.937 UTC [gossip.pull] SendDigest -> DEBU 275f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:47.945 UTC [gossip.gossip] handleMessage -> DEBU 2760 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.966 UTC [gossip.gossip] handleMessage -> DEBU 2761 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.966 UTC [gossip.gossip] handleMessage -> DEBU 2762 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2763 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2764 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [msp] DeserializeIdentity -> DEBU 2765 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2766 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2767 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2768 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 2769 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 276a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 276b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [cauthdsl] func1 -> DEBU 276c 0xc00476a040 gate 1569284747967540000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 276d 0xc00476a040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 276e 0xc00476a040 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 276f 0xc00476a040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 2770 0xc00476a040 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [cauthdsl] func1 -> DEBU 2771 0xc00476a040 gate 1569284747967540000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 2772 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 2773 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 2774 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [cauthdsl] func1 -> DEBU 2775 0xc00476a880 gate 1569284747967821100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 2776 0xc00476a880 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 2777 0xc00476a880 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 2778 0xc00476a880 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:47.967 UTC [msp.identity] Verify -> DEBU 2779 Verify: digest = 00000000 69 39 a5 ae 99 f5 e5 86 62 39 e6 60 20 2c 8e 99 |i9......b9.` ,..| +peer0.org1.example.com | 00000010 ff c2 7a df 9c e6 05 21 6a 4d 18 bd d2 5b 4b 81 |..z....!jM...[K.|" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [msp.identity] Verify -> DEBU 277a Verify: sig = 00000000 30 45 02 21 00 a7 86 8d fb b6 c4 18 4f 82 af 0a |0E.!........O...| +peer0.org1.example.com | 00000010 3a dd 12 a8 0d 9a 1d 37 07 4f 6c 9a 9b 44 cc 68 |:......7.Ol..D.h| +peer0.org1.example.com | 00000020 1b cd 52 09 22 02 20 20 18 6b ba 08 5d e1 53 e8 |..R.". .k..].S.| +peer0.org1.example.com | 00000030 ad 22 aa 63 1f e4 bf 2c ce af a2 e4 aa 16 ef f4 |.".c...,........| +peer0.org1.example.com | 00000040 38 5a ed f8 88 8f b1 |8Z.....|" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [cauthdsl] func2 -> DEBU 277b 0xc00476a880 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [cauthdsl] func1 -> DEBU 277c 0xc00476a880 gate 1569284747967821100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [policies] Evaluate -> DEBU 277d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [policies] Evaluate -> DEBU 277e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [policies] Evaluate -> DEBU 277f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [policies] Evaluate -> DEBU 2780 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 2781 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 2782 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 2783 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 2784 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 2785 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 2786 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 2787 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2788 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [gossip.discovery] sendMemResponse -> DEBU 2789 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [msp] DeserializeIdentity -> DEBU 278a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [msp] DeserializeIdentity -> DEBU 278b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [msp] DeserializeIdentity -> DEBU 278c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:47.968 UTC [gossip.comm] Send -> DEBU 278d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:47.969 UTC [gossip.discovery] sendMemResponse -> DEBU 278e Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020," signature:"0D\002 _\237\210\0303\024\370\353?\3076\230\335\356\223!\022\214@>\344\271\3124z}\271\204[\251L\306\002 ,\231\364`\026\r\307\025\345\334\250\321If9\373\347wS\252\244p=\341\353\366\273\266\335\202}+" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:47.969 UTC [gossip.comm] sendToEndpoint -> DEBU 278f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:47.969 UTC [gossip.comm] sendToEndpoint -> DEBU 2790 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.147 UTC [msp] DeserializeIdentity -> DEBU 2791 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.148 UTC [msp] DeserializeIdentity -> DEBU 2792 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.148 UTC [gossip.comm] Send -> DEBU 2793 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:48.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2794 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2795 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2796 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2797 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.149 UTC [gossip.comm] sendToEndpoint -> DEBU 2798 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.149 UTC [gossip.comm] sendToEndpoint -> DEBU 2799 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.150 UTC [gossip.comm] func1 -> DEBU 279a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.150 UTC [gossip.gossip] handleMessage -> DEBU 279b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.150 UTC [gossip.comm] func1 -> DEBU 279c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.150 UTC [msp.identity] Verify -> DEBU 279d Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:48.150 UTC [msp.identity] Verify -> DEBU 279e Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [msp.identity] Verify -> DEBU 279f Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [msp.identity] Verify -> DEBU 27a0 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [msp] DeserializeIdentity -> DEBU 27a1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [msp] DeserializeIdentity -> DEBU 27a2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27a3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27a4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27a5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [cauthdsl] func1 -> DEBU 27a9 0xc0047ac8c0 gate 1569284748151647900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27aa 0xc0047ac8c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27ab 0xc0047ac8c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27ac 0xc0047ac8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27ad 0xc0047ac8c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [cauthdsl] func1 -> DEBU 27ae 0xc0047ac8c0 gate 1569284748151647900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27af Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [cauthdsl] func1 -> DEBU 27b2 0xc0047ad100 gate 1569284748151922800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27b3 0xc0047ad100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27b4 0xc0047ad100 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [cauthdsl] func2 -> DEBU 27b5 0xc0047ad100 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [msp.identity] Verify -> DEBU 27b6 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [msp.identity] Verify -> DEBU 27b7 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [cauthdsl] func2 -> DEBU 27b8 0xc0047ad100 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [cauthdsl] func1 -> DEBU 27b9 0xc0047ad100 gate 1569284748151922800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27ba Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27bc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27bd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [msp] DeserializeIdentity -> DEBU 27be Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [msp] DeserializeIdentity -> DEBU 27bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27c1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27c2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [cauthdsl] func1 -> DEBU 27c6 0xc0047c28d0 gate 1569284748152932400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [cauthdsl] func2 -> DEBU 27c7 0xc0047c28d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.152 UTC [cauthdsl] func2 -> DEBU 27c8 0xc0047c28d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27c9 0xc0047c28d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27ca 0xc0047c28d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [cauthdsl] func1 -> DEBU 27cb 0xc0047c28d0 gate 1569284748152932400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [cauthdsl] func1 -> DEBU 27cf 0xc0047c3110 gate 1569284748153186100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27d0 0xc0047c3110 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27d1 0xc0047c3110 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27d2 0xc0047c3110 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [msp.identity] Verify -> DEBU 27d3 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [msp.identity] Verify -> DEBU 27d4 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27d5 0xc0047c3110 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [cauthdsl] func1 -> DEBU 27d6 0xc0047c3110 gate 1569284748153186100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27d9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [gossip.gossip] handleMessage -> DEBU 27db Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [gossip.gossip] handleMessage -> DEBU 27dc Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [msp] DeserializeIdentity -> DEBU 27dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.153 UTC [msp] DeserializeIdentity -> DEBU 27de Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [msp] DeserializeIdentity -> DEBU 27df Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27e1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27e2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [cauthdsl] func1 -> DEBU 27e6 0xc0047d8c20 gate 1569284748154518800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [cauthdsl] func2 -> DEBU 27e7 0xc0047d8c20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [cauthdsl] func2 -> DEBU 27e8 0xc0047d8c20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [cauthdsl] func2 -> DEBU 27e9 0xc0047d8c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [cauthdsl] func2 -> DEBU 27ea 0xc0047d8c20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [cauthdsl] func1 -> DEBU 27eb 0xc0047d8c20 gate 1569284748154518800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [cauthdsl] func1 -> DEBU 27ef 0xc0047d9460 gate 1569284748154809600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.154 UTC [cauthdsl] func2 -> DEBU 27f0 0xc0047d9460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.164 UTC [cauthdsl] func2 -> DEBU 27f1 0xc0047d9460 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.165 UTC [cauthdsl] func2 -> DEBU 27f2 0xc0047d9460 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.165 UTC [msp.identity] Verify -> DEBU 27f3 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:48.165 UTC [msp.identity] Verify -> DEBU 27f4 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:48.165 UTC [cauthdsl] func2 -> DEBU 27f5 0xc0047d9460 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.165 UTC [cauthdsl] func1 -> DEBU 27f6 0xc0047d9460 gate 1569284748154809600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:48.165 UTC [policies] Evaluate -> DEBU 27f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.165 UTC [policies] Evaluate -> DEBU 27f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.165 UTC [policies] Evaluate -> DEBU 27f9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.165 UTC [policies] Evaluate -> DEBU 27fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.165 UTC [msp.identity] Verify -> DEBU 27fb Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:48.165 UTC [msp.identity] Verify -> DEBU 27fc Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:48.166 UTC [msp.identity] Verify -> DEBU 27fd Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:48.166 UTC [msp.identity] Verify -> DEBU 27fe Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:48.166 UTC [msp] DeserializeIdentity -> DEBU 27ff Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.166 UTC [msp] DeserializeIdentity -> DEBU 2800 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.166 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2801 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:48.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2802 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2803 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.166 UTC [policies] Evaluate -> DEBU 2804 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.167 UTC [policies] Evaluate -> DEBU 2805 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:48.167 UTC [policies] Evaluate -> DEBU 2806 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.167 UTC [cauthdsl] func1 -> DEBU 2807 0xc0047e9a70 gate 1569284748167183700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.167 UTC [cauthdsl] func2 -> DEBU 2808 0xc0047e9a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.167 UTC [cauthdsl] func2 -> DEBU 2809 0xc0047e9a70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.167 UTC [cauthdsl] func2 -> DEBU 280a 0xc0047e9a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:48.167 UTC [cauthdsl] func2 -> DEBU 280b 0xc0047e9a70 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.168 UTC [cauthdsl] func1 -> DEBU 280c 0xc0047e9a70 gate 1569284748167183700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.168 UTC [policies] Evaluate -> DEBU 280d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.168 UTC [policies] Evaluate -> DEBU 280e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.168 UTC [policies] Evaluate -> DEBU 280f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.168 UTC [cauthdsl] func1 -> DEBU 2810 0xc0047fe2b0 gate 1569284748168460900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.168 UTC [cauthdsl] func2 -> DEBU 2811 0xc0047fe2b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.168 UTC [cauthdsl] func2 -> DEBU 2812 0xc0047fe2b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.168 UTC [cauthdsl] func2 -> DEBU 2813 0xc0047fe2b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.168 UTC [msp.identity] Verify -> DEBU 2814 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:48.168 UTC [msp.identity] Verify -> DEBU 2815 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:48.168 UTC [cauthdsl] func2 -> DEBU 2816 0xc0047fe2b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.169 UTC [cauthdsl] func1 -> DEBU 2817 0xc0047fe2b0 gate 1569284748168460900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:48.169 UTC [policies] Evaluate -> DEBU 2818 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.169 UTC [policies] Evaluate -> DEBU 2819 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.169 UTC [policies] Evaluate -> DEBU 281a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.169 UTC [policies] Evaluate -> DEBU 281b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.169 UTC [gossip.gossip] handleMessage -> DEBU 281c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.169 UTC [gossip.gossip] handleMessage -> DEBU 281d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.169 UTC [msp] DeserializeIdentity -> DEBU 281e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.169 UTC [msp] DeserializeIdentity -> DEBU 281f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.169 UTC [msp] DeserializeIdentity -> DEBU 2820 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.181 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2821 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:48.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2822 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2823 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [policies] Evaluate -> DEBU 2824 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [policies] Evaluate -> DEBU 2825 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [policies] Evaluate -> DEBU 2826 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [cauthdsl] func1 -> DEBU 2827 0xc0047ffdc0 gate 1569284748182383100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [cauthdsl] func2 -> DEBU 2828 0xc0047ffdc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [cauthdsl] func2 -> DEBU 2829 0xc0047ffdc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [cauthdsl] func2 -> DEBU 282a 0xc0047ffdc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [cauthdsl] func2 -> DEBU 282b 0xc0047ffdc0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [cauthdsl] func1 -> DEBU 282c 0xc0047ffdc0 gate 1569284748182383100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [policies] Evaluate -> DEBU 282d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.182 UTC [policies] Evaluate -> DEBU 282e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.183 UTC [policies] Evaluate -> DEBU 282f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.183 UTC [cauthdsl] func1 -> DEBU 2830 0xc004816600 gate 1569284748183090300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.183 UTC [cauthdsl] func2 -> DEBU 2831 0xc004816600 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.183 UTC [cauthdsl] func2 -> DEBU 2832 0xc004816600 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.183 UTC [cauthdsl] func2 -> DEBU 2833 0xc004816600 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.183 UTC [msp.identity] Verify -> DEBU 2834 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:48.183 UTC [msp.identity] Verify -> DEBU 2835 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:48.183 UTC [cauthdsl] func2 -> DEBU 2836 0xc004816600 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.183 UTC [cauthdsl] func1 -> DEBU 2837 0xc004816600 gate 1569284748183090300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:48.183 UTC [policies] Evaluate -> DEBU 2838 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.184 UTC [policies] Evaluate -> DEBU 2839 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.184 UTC [policies] Evaluate -> DEBU 283a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.184 UTC [policies] Evaluate -> DEBU 283b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.184 UTC [msp.identity] Verify -> DEBU 283c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:48.189 UTC [msp.identity] Verify -> DEBU 283d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:48.189 UTC [msp] DeserializeIdentity -> DEBU 283e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.190 UTC [msp] DeserializeIdentity -> DEBU 283f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.190 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2840 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:48.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2841 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2842 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.190 UTC [policies] Evaluate -> DEBU 2843 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.190 UTC [policies] Evaluate -> DEBU 2844 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:48.190 UTC [policies] Evaluate -> DEBU 2845 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.190 UTC [cauthdsl] func1 -> DEBU 2846 0xc00482a4f0 gate 1569284748190839400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.190 UTC [cauthdsl] func2 -> DEBU 2847 0xc00482a4f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.190 UTC [cauthdsl] func2 -> DEBU 2848 0xc00482a4f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.191 UTC [cauthdsl] func2 -> DEBU 2849 0xc00482a4f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:48.191 UTC [cauthdsl] func2 -> DEBU 284a 0xc00482a4f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.191 UTC [cauthdsl] func1 -> DEBU 284b 0xc00482a4f0 gate 1569284748190839400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.191 UTC [policies] Evaluate -> DEBU 284c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.191 UTC [policies] Evaluate -> DEBU 284d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.191 UTC [policies] Evaluate -> DEBU 284e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.191 UTC [cauthdsl] func1 -> DEBU 284f 0xc00482ad30 gate 1569284748191448400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.191 UTC [cauthdsl] func2 -> DEBU 2850 0xc00482ad30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.191 UTC [cauthdsl] func2 -> DEBU 2851 0xc00482ad30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.191 UTC [cauthdsl] func2 -> DEBU 2852 0xc00482ad30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.191 UTC [msp.identity] Verify -> DEBU 2853 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:48.196 UTC [msp.identity] Verify -> DEBU 2854 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:48.196 UTC [cauthdsl] func2 -> DEBU 2855 0xc00482ad30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.196 UTC [cauthdsl] func1 -> DEBU 2856 0xc00482ad30 gate 1569284748191448400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:48.196 UTC [policies] Evaluate -> DEBU 2857 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.197 UTC [policies] Evaluate -> DEBU 2858 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.197 UTC [policies] Evaluate -> DEBU 2859 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.197 UTC [policies] Evaluate -> DEBU 285a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.197 UTC [msp.identity] Verify -> DEBU 285b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:48.197 UTC [msp.identity] Verify -> DEBU 285c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:48.198 UTC [gossip.gossip] handleMessage -> DEBU 285d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.266 UTC [msp] DeserializeIdentity -> DEBU 285e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.266 UTC [msp] DeserializeIdentity -> DEBU 285f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.266 UTC [gossip.pull] Hello -> DEBU 2860 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:48.266 UTC [msp] DeserializeIdentity -> DEBU 2861 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.266 UTC [msp] DeserializeIdentity -> DEBU 2862 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.266 UTC [gossip.comm] Send -> DEBU 2863 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:48.266 UTC [gossip.comm] sendToEndpoint -> DEBU 2864 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.266 UTC [gossip.comm] sendToEndpoint -> DEBU 2865 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.275 UTC [gossip.comm] func1 -> DEBU 2866 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.275 UTC [gossip.gossip] handleMessage -> DEBU 2867 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.275 UTC [gossip.pull] HandleMessage -> DEBU 2868 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.275 UTC [gossip.gossip] handleMessage -> DEBU 2869 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.650 UTC [gossip.comm] func1 -> DEBU 286a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.650 UTC [gossip.gossip] handleMessage -> DEBU 286b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.650 UTC [msp] DeserializeIdentity -> DEBU 286c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.651 UTC [msp] DeserializeIdentity -> DEBU 286d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.651 UTC [gossip.gossip] handleMessage -> DEBU 286e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.686 UTC [gossip.comm] func1 -> DEBU 286f Got message: GossipMessage: tag:EMPTY mem_req:\276\017\354^\271(\375\317\263x\221\215\031\r\002 }\375\202\272\377V\313A)\025\343\373\234Ew9H\345I\210\037:\362rQe\276\331\262\341\305c" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.686 UTC [gossip.gossip] handleMessage -> DEBU 2870 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\276\017\354^\271(\375\317\263x\221\215\031\r\002 }\375\202\272\377V\313A)\025\343\373\234Ew9H\345I\210\037:\362rQe\276\331\262\341\305c" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.686 UTC [gossip.gossip] handleMessage -> DEBU 2871 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2872 Got message: GossipMessage: tag:EMPTY mem_req:\276\017\354^\271(\375\317\263x\221\215\031\r\002 }\375\202\272\377V\313A)\025\343\373\234Ew9H\345I\210\037:\362rQe\276\331\262\341\305c" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2873 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [msp] DeserializeIdentity -> DEBU 2874 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2875 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2876 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2877 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [policies] Evaluate -> DEBU 2878 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [policies] Evaluate -> DEBU 2879 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [policies] Evaluate -> DEBU 287a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [cauthdsl] func1 -> DEBU 287b 0xc004841110 gate 1569284748687652600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [cauthdsl] func2 -> DEBU 287c 0xc004841110 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [cauthdsl] func2 -> DEBU 287d 0xc004841110 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [cauthdsl] func2 -> DEBU 287e 0xc004841110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [cauthdsl] func2 -> DEBU 287f 0xc004841110 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.687 UTC [cauthdsl] func1 -> DEBU 2880 0xc004841110 gate 1569284748687652600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 2881 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 2882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 2883 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [cauthdsl] func1 -> DEBU 2884 0xc004841950 gate 1569284748688136900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [cauthdsl] func2 -> DEBU 2885 0xc004841950 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [cauthdsl] func2 -> DEBU 2886 0xc004841950 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [cauthdsl] func2 -> DEBU 2887 0xc004841950 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [msp.identity] Verify -> DEBU 2888 Verify: digest = 00000000 4d c6 84 0d 24 9a 50 35 d6 87 bf 27 91 9e d0 93 |M...$.P5...'....| +peer0.org1.example.com | 00000010 f9 14 59 50 f0 ec c7 13 01 c7 f6 d6 6b 6d 90 14 |..YP........km..|" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [msp.identity] Verify -> DEBU 2889 Verify: sig = 00000000 30 44 02 20 63 ae b4 f4 16 8f 13 aa 1d 71 c2 a0 |0D. c........q..| +peer0.org1.example.com | 00000010 32 20 d8 71 49 3e be 0f ec 5e b9 28 fd cf b3 78 |2 .qI>...^.(...x| +peer0.org1.example.com | 00000020 91 8d 19 0d 02 20 7d fd 82 ba ff 56 cb 41 29 15 |..... }....V.A).| +peer0.org1.example.com | 00000030 e3 fb 9c 45 77 39 48 e5 49 88 1f 3a f2 72 51 65 |...Ew9H.I..:.rQe| +peer0.org1.example.com | 00000040 be d9 b2 e1 c5 63 |.....c|" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [cauthdsl] func2 -> DEBU 288a 0xc004841950 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [cauthdsl] func1 -> DEBU 288b 0xc004841950 gate 1569284748688136900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 288c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 288d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 288e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 288f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [gossip.discovery] handleAliveMessage -> DEBU 2890 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [gossip.discovery] learnExistingMembers -> DEBU 2891 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [gossip.discovery] learnExistingMembers -> DEBU 2892 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:48.688 UTC [gossip.discovery] learnExistingMembers -> DEBU 2893 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 2894 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 2895 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [gossip.discovery] handleAliveMessage -> DEBU 2896 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2897 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [gossip.discovery] sendMemResponse -> DEBU 2898 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [msp] DeserializeIdentity -> DEBU 2899 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [msp] DeserializeIdentity -> DEBU 289a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [msp] DeserializeIdentity -> DEBU 289b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [gossip.comm] Send -> DEBU 289c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [gossip.discovery] sendMemResponse -> DEBU 289d Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020," signature:"0D\002 _\237\210\0303\024\370\353?\3076\230\335\356\223!\022\214@>\344\271\3124z}\271\204[\251L\306\002 ,\231\364`\026\r\307\025\345\334\250\321If9\373\347wS\252\244p=\341\353\366\273\266\335\202}+" > alive:\276\017\354^\271(\375\317\263x\221\215\031\r\002 }\375\202\272\377V\313A)\025\343\373\234Ew9H\345I\210\037:\362rQe\276\331\262\341\305c" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [gossip.comm] sendToEndpoint -> DEBU 289e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.689 UTC [gossip.comm] sendToEndpoint -> DEBU 289f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.717 UTC [gossip.comm] func1 -> DEBU 28a0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.717 UTC [gossip.gossip] handleMessage -> DEBU 28a1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.717 UTC [gossip.pull] HandleMessage -> DEBU 28a2 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.717 UTC [msp] DeserializeIdentity -> DEBU 28a3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.717 UTC [msp] DeserializeIdentity -> DEBU 28a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.717 UTC [msp] DeserializeIdentity -> DEBU 28a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.717 UTC [msp] DeserializeIdentity -> DEBU 28a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.717 UTC [msp] DeserializeIdentity -> DEBU 28a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.718 UTC [msp] DeserializeIdentity -> DEBU 28a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:48.718 UTC [gossip.pull] SendDigest -> DEBU 28a9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:48.718 UTC [gossip.gossip] handleMessage -> DEBU 28aa Exiting" +peer0.org1.example.com | "2019-09-24 00:25:48.773 UTC [gossip.comm] func1 -> DEBU 28ab Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.774 UTC [gossip.gossip] handleMessage -> DEBU 28ac Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.774 UTC [gossip.pull] HandleMessage -> DEBU 28ad GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:48.774 UTC [gossip.pull] SendDigest -> DEBU 28ae Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:48.774 UTC [gossip.gossip] handleMessage -> DEBU 28af Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.156 UTC [gossip.gossip] handleMessage -> DEBU 28b0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.156 UTC [msp] DeserializeIdentity -> DEBU 28b1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.157 UTC [msp] DeserializeIdentity -> DEBU 28b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.157 UTC [msp] DeserializeIdentity -> DEBU 28b3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.157 UTC [gossip.gossip] handleMessage -> DEBU 28b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.610 UTC [msp] GetDefaultSigningIdentity -> DEBU 28b5 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:49.610 UTC [msp.identity] Sign -> DEBU 28b6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151029 " +peer0.org1.example.com | "2019-09-24 00:25:49.610 UTC [msp.identity] Sign -> DEBU 28b7 Sign: digest: E8A3E9941358E82A2DF1CC6F0E5C5A2E6C60885B48D5B2D2A20BB17D3C73FBCC " +peer0.org1.example.com | "2019-09-24 00:25:49.610 UTC [msp] GetDefaultSigningIdentity -> DEBU 28b8 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:49.610 UTC [msp.identity] Sign -> DEBU 28b9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:49.610 UTC [msp.identity] Sign -> DEBU 28ba Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:49.611 UTC [gossip.discovery] periodicalSendAlive -> DEBU 28bb Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:49.613 UTC [msp] DeserializeIdentity -> DEBU 28bc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.614 UTC [msp] DeserializeIdentity -> DEBU 28bd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.614 UTC [msp] DeserializeIdentity -> DEBU 28be Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.618 UTC [gossip.comm] Send -> DEBU 28bf Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:49.618 UTC [gossip.comm] Send -> DEBU 28c0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:49.618 UTC [msp] DeserializeIdentity -> DEBU 28c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.618 UTC [gossip.comm] Send -> DEBU 28c2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:49.618 UTC [gossip.comm] sendToEndpoint -> DEBU 28c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.618 UTC [gossip.comm] sendToEndpoint -> DEBU 28c4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.618 UTC [gossip.comm] sendToEndpoint -> DEBU 28c5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 28c6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 28c7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 28c8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.638 UTC [gossip.comm] func1 -> DEBU 28c9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.638 UTC [gossip.gossip] handleMessage -> DEBU 28ca Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.638 UTC [gossip.gossip] handleMessage -> DEBU 28cb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.638 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28cc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.638 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28cd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:49.638 UTC [msp.identity] Verify -> DEBU 28ce Verify: digest = 00000000 e8 a3 e9 94 13 58 e8 2a 2d f1 cc 6f 0e 5c 5a 2e |.....X.*-..o.\Z.| +peer0.org1.example.com | 00000010 6c 60 88 5b 48 d5 b2 d2 a2 0b b1 7d 3c 73 fb cc |l`.[H......} DEBU 28cf Verify: sig = 00000000 30 45 02 21 00 a2 fe 0e 1c 5c 82 07 94 df 3e 19 |0E.!.....\....>.| +peer0.org1.example.com | 00000010 1e d5 87 6a ee 16 32 82 c1 9b 0a 9c e8 82 ff 07 |...j..2.........| +peer0.org1.example.com | 00000020 e8 dc b8 d1 ba 02 20 7d 10 cc db 77 46 de 8b ba |...... }...wF...| +peer0.org1.example.com | 00000030 4c 45 14 00 4b 43 ab 2b b8 ec 09 34 4e 44 f1 f9 |LE..KC.+...4ND..| +peer0.org1.example.com | 00000040 15 6a bb a9 84 04 50 |.j....P|" +peer0.org1.example.com | "2019-09-24 00:25:49.638 UTC [gossip.discovery] isSentByMe -> DEBU 28d0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.638 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.653 UTC [gossip.gossip] handleMessage -> DEBU 28d2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.653 UTC [gossip.gossip] handleMessage -> DEBU 28d3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.653 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28d5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:49.653 UTC [msp.identity] Verify -> DEBU 28d6 Verify: digest = 00000000 e8 a3 e9 94 13 58 e8 2a 2d f1 cc 6f 0e 5c 5a 2e |.....X.*-..o.\Z.| +peer0.org1.example.com | 00000010 6c 60 88 5b 48 d5 b2 d2 a2 0b b1 7d 3c 73 fb cc |l`.[H......} DEBU 28d7 Verify: sig = 00000000 30 45 02 21 00 a2 fe 0e 1c 5c 82 07 94 df 3e 19 |0E.!.....\....>.| +peer0.org1.example.com | 00000010 1e d5 87 6a ee 16 32 82 c1 9b 0a 9c e8 82 ff 07 |...j..2.........| +peer0.org1.example.com | 00000020 e8 dc b8 d1 ba 02 20 7d 10 cc db 77 46 de 8b ba |...... }...wF...| +peer0.org1.example.com | 00000030 4c 45 14 00 4b 43 ab 2b b8 ec 09 34 4e 44 f1 f9 |LE..KC.+...4ND..| +peer0.org1.example.com | 00000040 15 6a bb a9 84 04 50 |.j....P|" +peer0.org1.example.com | "2019-09-24 00:25:49.653 UTC [gossip.discovery] isSentByMe -> DEBU 28d8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.675 UTC [gossip.comm] func1 -> DEBU 28da Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.675 UTC [gossip.gossip] handleMessage -> DEBU 28db Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.675 UTC [gossip.pull] HandleMessage -> DEBU 28dc GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.675 UTC [gossip.pull] SendDigest -> DEBU 28dd Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:49.675 UTC [gossip.gossip] handleMessage -> DEBU 28de Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.727 UTC [gossip.comm] func1 -> DEBU 28df Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020-" signature:"0E\002!\000\371\351\276\317S)$l\001F\213\332\360\035\023\221\31264dV\t\367\233i-\357yoN\325\222\002 [\372\007\010J\204\2171n-<{\241i\302\374\232\343\207\371\032Kgf\2321,\350\342\301\374\005" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.727 UTC [gossip.gossip] handleMessage -> DEBU 28e0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020-" signature:"0E\002!\000\371\351\276\317S)$l\001F\213\332\360\035\023\221\31264dV\t\367\233i-\357yoN\325\222\002 [\372\007\010J\204\2171n-<{\241i\302\374\232\343\207\371\032Kgf\2321,\350\342\301\374\005" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.728 UTC [gossip.gossip] handleMessage -> DEBU 28e1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28e2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020-" signature:"0E\002!\000\371\351\276\317S)$l\001F\213\332\360\035\023\221\31264dV\t\367\233i-\357yoN\325\222\002 [\372\007\010J\204\2171n-<{\241i\302\374\232\343\207\371\032Kgf\2321,\350\342\301\374\005" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.728 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28e3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:49.728 UTC [msp.identity] Verify -> DEBU 28e4 Verify: digest = 00000000 ed fb 16 d4 43 af 88 8b ee 62 0b 75 a8 5f ba 06 |....C....b.u._..| +peer0.org1.example.com | 00000010 11 fe e3 77 6b ab 0c f2 b2 71 88 4e 6b 6a e1 ef |...wk....q.Nkj..|" +peer0.org1.example.com | "2019-09-24 00:25:49.728 UTC [msp.identity] Verify -> DEBU 28e5 Verify: sig = 00000000 30 45 02 21 00 f9 e9 be cf 53 29 24 6c 01 46 8b |0E.!.....S)$l.F.| +peer0.org1.example.com | 00000010 da f0 1d 13 91 ca 36 34 64 56 09 f7 9b 69 2d ef |......64dV...i-.| +peer0.org1.example.com | 00000020 79 6f 4e d5 92 02 20 5b fa 07 08 4a 84 8f 31 6e |yoN... [...J..1n| +peer0.org1.example.com | 00000030 2d 3c 7b a1 69 c2 fc 9a e3 87 f9 1a 4b 67 66 9a |-<{.i.......Kgf.| +peer0.org1.example.com | 00000040 31 2c e8 e2 c1 fc 05 |1,.....|" +peer0.org1.example.com | "2019-09-24 00:25:49.728 UTC [msp.identity] Verify -> DEBU 28e6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:49.728 UTC [msp.identity] Verify -> DEBU 28e7 Verify: sig = 00000000 30 44 02 20 7b e9 ab e8 e1 cf 31 3b e3 b7 42 e0 |0D. {.....1;..B.| +peer0.org1.example.com | 00000010 95 64 a2 51 95 b7 a2 80 2e 54 2b 27 f1 3b 14 0e |.d.Q.....T+'.;..| +peer0.org1.example.com | 00000020 ab 3c 7b fe 02 20 4d f8 d0 fa 11 18 a3 09 b1 fa |.<{.. M.........| +peer0.org1.example.com | 00000030 d8 3b c0 78 66 5b 27 f4 85 a8 00 50 3f 0d 6b c4 |.;.xf['....P?.k.| +peer0.org1.example.com | 00000040 89 71 ad 1a f6 59 |.q...Y|" +peer0.org1.example.com | "2019-09-24 00:25:49.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 28e8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 28e9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:49.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 28ea updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:49.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 28eb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:49.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 28ec Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:49.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 28ed Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 28ee Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28ef Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.729 UTC [gossip.discovery] sendMemResponse -> DEBU 28f0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:49.729 UTC [msp] DeserializeIdentity -> DEBU 28f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.730 UTC [msp] DeserializeIdentity -> DEBU 28f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.732 UTC [gossip.comm] Send -> DEBU 28f3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:49.733 UTC [gossip.comm] sendToEndpoint -> DEBU 28f4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.733 UTC [gossip.comm] sendToEndpoint -> DEBU 28f5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.733 UTC [gossip.discovery] sendMemResponse -> DEBU 28f6 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020-" signature:"0E\002!\000\371\351\276\317S)$l\001F\213\332\360\035\023\221\31264dV\t\367\233i-\357yoN\325\222\002 [\372\007\010J\204\2171n-<{\241i\302\374\232\343\207\371\032Kgf\2321,\350\342\301\374\005" secret_envelope: > alive:\031\036\325\207j\356\0262\202\301\233\n\234\350\202\377\007\350\334\270\321\272\002 }\020\314\333wF\336\213\272LE\024\000KC\253+\270\354\t4ND\361\371\025j\273\251\204\004P" > " +peer0.org1.example.com | "2019-09-24 00:25:49.976 UTC [gossip.gossip] handleMessage -> DEBU 28f7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.979 UTC [gossip.gossip] handleMessage -> DEBU 28f8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28f9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.979 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28fa Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:49.979 UTC [msp] DeserializeIdentity -> DEBU 28fb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.979 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28fd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28fe Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [policies] Evaluate -> DEBU 28ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [policies] Evaluate -> DEBU 2900 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [policies] Evaluate -> DEBU 2901 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [cauthdsl] func1 -> DEBU 2902 0xc0048d5300 gate 1569284749980348400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [cauthdsl] func2 -> DEBU 2903 0xc0048d5300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [cauthdsl] func2 -> DEBU 2904 0xc0048d5300 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [cauthdsl] func2 -> DEBU 2905 0xc0048d5300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [cauthdsl] func2 -> DEBU 2906 0xc0048d5300 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [cauthdsl] func1 -> DEBU 2907 0xc0048d5300 gate 1569284749980348400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:49.980 UTC [policies] Evaluate -> DEBU 2908 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:49.987 UTC [policies] Evaluate -> DEBU 290a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:49.987 UTC [policies] Evaluate -> DEBU 290b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:49.987 UTC [cauthdsl] func1 -> DEBU 290c 0xc0048d5b40 gate 1569284749987635100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:49.987 UTC [cauthdsl] func2 -> DEBU 290d 0xc0048d5b40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:49.987 UTC [cauthdsl] func2 -> DEBU 290e 0xc0048d5b40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:49.987 UTC [cauthdsl] func2 -> DEBU 290f 0xc0048d5b40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:49.987 UTC [gossip.comm] func1 -> DEBU 2909 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.987 UTC [msp.identity] Verify -> DEBU 2910 Verify: digest = 00000000 0e 05 22 77 1a 6c 2d e5 f4 30 bc 77 d5 08 3f 0c |.."w.l-..0.w..?.| +peer0.org1.example.com | 00000010 8e 2b d5 b5 51 32 d9 64 51 a5 c5 c2 1f 46 3d b0 |.+..Q2.dQ....F=.|" +peer0.org1.example.com | "2019-09-24 00:25:49.987 UTC [gossip.gossip] handleMessage -> DEBU 2911 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.987 UTC [msp.identity] Verify -> DEBU 2912 Verify: sig = 00000000 30 45 02 21 00 e0 22 96 30 31 2e 10 9e b2 79 4c |0E.!..".01....yL| +peer0.org1.example.com | 00000010 14 c7 e4 bb 7b bf 01 3c 72 ee ca ca 9b c3 99 75 |....{.. DEBU 2913 0xc0048d5b40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:49.988 UTC [cauthdsl] func1 -> DEBU 2914 0xc0048d5b40 gate 1569284749987635100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:49.988 UTC [policies] Evaluate -> DEBU 2915 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:49.988 UTC [policies] Evaluate -> DEBU 2916 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:49.988 UTC [policies] Evaluate -> DEBU 2917 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:49.988 UTC [policies] Evaluate -> DEBU 2918 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:49.988 UTC [gossip.discovery] handleAliveMessage -> DEBU 2919 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.988 UTC [gossip.discovery] learnExistingMembers -> DEBU 291a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:49.988 UTC [gossip.discovery] learnExistingMembers -> DEBU 291b updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:49.988 UTC [gossip.discovery] learnExistingMembers -> DEBU 291c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:49.988 UTC [gossip.discovery] learnExistingMembers -> DEBU 291d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:49.988 UTC [gossip.discovery] learnExistingMembers -> DEBU 291e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.989 UTC [gossip.discovery] handleAliveMessage -> DEBU 291f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2920 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2921 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2922 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.989 UTC [gossip.gossip] handleMessage -> DEBU 2923 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.989 UTC [msp] DeserializeIdentity -> DEBU 2924 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.989 UTC [msp] DeserializeIdentity -> DEBU 2925 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.989 UTC [msp] DeserializeIdentity -> DEBU 2926 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.990 UTC [msp] DeserializeIdentity -> DEBU 2927 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.990 UTC [msp] DeserializeIdentity -> DEBU 2928 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.990 UTC [msp] DeserializeIdentity -> DEBU 2929 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.990 UTC [gossip.comm] Send -> DEBU 292a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:49.990 UTC [msp] DeserializeIdentity -> DEBU 292b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.990 UTC [msp] DeserializeIdentity -> DEBU 292c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:49.990 UTC [gossip.comm] Send -> DEBU 292d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:49.990 UTC [gossip.comm] sendToEndpoint -> DEBU 292e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.994 UTC [gossip.comm] sendToEndpoint -> DEBU 2930 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.994 UTC [gossip.comm] func1 -> DEBU 292f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.994 UTC [gossip.comm] sendToEndpoint -> DEBU 2931 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.994 UTC [gossip.comm] sendToEndpoint -> DEBU 2932 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.994 UTC [gossip.gossip] handleMessage -> DEBU 2933 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.995 UTC [gossip.gossip] handleMessage -> DEBU 2934 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:49.995 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2935 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:49.995 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2936 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:50.075 UTC [gossip.comm] func1 -> DEBU 2937 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.075 UTC [gossip.gossip] handleMessage -> DEBU 2938 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.075 UTC [msp] DeserializeIdentity -> DEBU 2939 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.075 UTC [msp] DeserializeIdentity -> DEBU 293a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.075 UTC [msp] DeserializeIdentity -> DEBU 293b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.075 UTC [gossip.gossip] handleMessage -> DEBU 293c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:50.694 UTC [gossip.comm] func1 -> DEBU 293d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.694 UTC [gossip.gossip] handleMessage -> DEBU 293e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.694 UTC [gossip.gossip] handleMessage -> DEBU 293f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:50.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2940 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.695 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2941 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:50.695 UTC [msp] DeserializeIdentity -> DEBU 2942 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2943 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:50.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2944 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:50.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2945 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:50.695 UTC [policies] Evaluate -> DEBU 2946 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:50.695 UTC [policies] Evaluate -> DEBU 2947 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:50.695 UTC [policies] Evaluate -> DEBU 2948 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func1 -> DEBU 2949 0xc0049111d0 gate 1569284750696007800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 294a 0xc0049111d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 294b 0xc0049111d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 294c 0xc0049111d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 294d 0xc0049111d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func1 -> DEBU 294e 0xc0049111d0 gate 1569284750696007800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 294f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 2950 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 2951 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func1 -> DEBU 2952 0xc004911a10 gate 1569284750696436900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 2953 0xc004911a10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 2954 0xc004911a10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 2955 0xc004911a10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [msp.identity] Verify -> DEBU 2956 Verify: digest = 00000000 a7 0a c6 49 a8 92 13 01 db 2c 12 33 34 d3 88 12 |...I.....,.34...| +peer0.org1.example.com | 00000010 da 16 b4 3b 13 0c b4 73 35 12 79 e4 26 42 0a 7d |...;...s5.y.&B.}|" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [msp.identity] Verify -> DEBU 2957 Verify: sig = 00000000 30 44 02 20 43 0a af 63 bb c0 4f d2 05 7e 72 2b |0D. C..c..O..~r+| +peer0.org1.example.com | 00000010 b4 12 76 cc eb 8d 39 9e e1 27 d8 23 1b 8d 26 62 |..v...9..'.#..&b| +peer0.org1.example.com | 00000020 7d 95 b7 c7 02 20 22 4b 67 29 e8 b2 8d 69 77 cb |}.... "Kg)...iw.| +peer0.org1.example.com | 00000030 62 cd e0 ad 41 4c bc 5e 93 de f6 47 ad b4 08 c2 |b...AL.^...G....| +peer0.org1.example.com | 00000040 8b 63 01 1d 50 32 |.c..P2|" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 2958 0xc004911a10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [cauthdsl] func1 -> DEBU 2959 0xc004911a10 gate 1569284750696436900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 295a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 295b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 295c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:50.697 UTC [policies] Evaluate -> DEBU 295d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:50.697 UTC [gossip.discovery] handleAliveMessage -> DEBU 295e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 295f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:50.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 2960 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:50.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 2961 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:50.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 2962 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:50.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 2963 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:50.697 UTC [gossip.discovery] handleAliveMessage -> DEBU 2964 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:50.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2965 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:50.702 UTC [msp] DeserializeIdentity -> DEBU 2966 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.702 UTC [msp] DeserializeIdentity -> DEBU 2967 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.702 UTC [msp] DeserializeIdentity -> DEBU 2968 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.702 UTC [msp] DeserializeIdentity -> DEBU 2969 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.703 UTC [msp] DeserializeIdentity -> DEBU 296a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.703 UTC [msp] DeserializeIdentity -> DEBU 296b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.703 UTC [msp] DeserializeIdentity -> DEBU 296c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.703 UTC [gossip.comm] Send -> DEBU 296d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:50.703 UTC [msp] DeserializeIdentity -> DEBU 296e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:50.703 UTC [gossip.comm] Send -> DEBU 296f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 2970 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 2971 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 2972 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 2973 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:50.714 UTC [gossip.gossip] handleMessage -> DEBU 2974 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.714 UTC [gossip.gossip] handleMessage -> DEBU 2975 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:50.714 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2976 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.714 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2977 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:50.724 UTC [gossip.comm] func1 -> DEBU 2978 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.724 UTC [gossip.gossip] handleMessage -> DEBU 2979 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.724 UTC [gossip.gossip] handleMessage -> DEBU 297a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:50.724 UTC [gossip.discovery] handleMsgFromComm -> DEBU 297b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:50.724 UTC [gossip.discovery] handleMsgFromComm -> DEBU 297c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.707 UTC [gossip.pull] Hello -> DEBU 297d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:51.708 UTC [gossip.comm] Send -> DEBU 297e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:51.708 UTC [gossip.pull] Hello -> DEBU 297f Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:51.708 UTC [gossip.comm] Send -> DEBU 2980 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:51.708 UTC [gossip.pull] Hello -> DEBU 2981 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:51.708 UTC [gossip.comm] Send -> DEBU 2982 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:51.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2983 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2984 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2985 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2986 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2987 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2988 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.711 UTC [msp] GetDefaultSigningIdentity -> DEBU 2989 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:51.711 UTC [msp.identity] Sign -> DEBU 298a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102A " +peer0.org1.example.com | "2019-09-24 00:25:51.711 UTC [msp.identity] Sign -> DEBU 298b Sign: digest: E40B62907C04858CC2D69CE2987AB20234BED471E14D9CD5B9B331B7666E0826 " +peer0.org1.example.com | "2019-09-24 00:25:51.711 UTC [msp] GetDefaultSigningIdentity -> DEBU 298c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:51.711 UTC [msp.identity] Sign -> DEBU 298d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:51.711 UTC [msp.identity] Sign -> DEBU 298e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:51.711 UTC [gossip.comm] Send -> DEBU 298f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:51.711 UTC [msp] DeserializeIdentity -> DEBU 2990 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.711 UTC [gossip.comm] Send -> DEBU 2991 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:51.712 UTC [msp] DeserializeIdentity -> DEBU 2992 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.712 UTC [gossip.comm] Send -> DEBU 2993 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:51.712 UTC [gossip.comm] sendToEndpoint -> DEBU 2994 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.712 UTC [gossip.comm] sendToEndpoint -> DEBU 2995 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.712 UTC [gossip.comm] sendToEndpoint -> DEBU 2996 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.724 UTC [gossip.comm] sendToEndpoint -> DEBU 2997 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.724 UTC [gossip.comm] sendToEndpoint -> DEBU 2998 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.724 UTC [gossip.comm] sendToEndpoint -> DEBU 2999 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.724 UTC [gossip.comm] func1 -> DEBU 299a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.725 UTC [gossip.gossip] handleMessage -> DEBU 299b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.725 UTC [gossip.pull] HandleMessage -> DEBU 299c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.725 UTC [gossip.gossip] handleMessage -> DEBU 299d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.742 UTC [gossip.comm] func1 -> DEBU 299e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.742 UTC [gossip.gossip] handleMessage -> DEBU 299f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.742 UTC [gossip.gossip] handleMessage -> DEBU 29a0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.742 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29a1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.744 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29a2 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:51.744 UTC [msp.identity] Verify -> DEBU 29a3 Verify: digest = 00000000 e4 0b 62 90 7c 04 85 8c c2 d6 9c e2 98 7a b2 02 |..b.|........z..| +peer0.org1.example.com | 00000010 34 be d4 71 e1 4d 9c d5 b9 b3 31 b7 66 6e 08 26 |4..q.M....1.fn.&|" +peer0.org1.example.com | "2019-09-24 00:25:51.744 UTC [msp.identity] Verify -> DEBU 29a4 Verify: sig = 00000000 30 44 02 20 5d c8 9e b1 dd 96 8a e7 69 5c dd 3f |0D. ].......i\.?| +peer0.org1.example.com | 00000010 e7 56 5a fb 09 0e 1c 39 64 8e 70 d0 0a 33 b8 49 |.VZ....9d.p..3.I| +peer0.org1.example.com | 00000020 b9 a0 46 ad 02 20 52 93 a5 80 99 31 1a 07 e2 ed |..F.. R....1....| +peer0.org1.example.com | 00000030 cd e6 1d a0 a1 9b ba 96 ab 0a e7 56 78 2e 6a a7 |...........Vx.j.| +peer0.org1.example.com | 00000040 a7 ee 12 9d 51 87 |....Q.|" +peer0.org1.example.com | "2019-09-24 00:25:51.744 UTC [msp.identity] Verify -> DEBU 29a5 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:51.744 UTC [msp.identity] Verify -> DEBU 29a6 Verify: sig = 00000000 30 45 02 21 00 a4 4d a3 fa 94 0f 00 58 72 00 44 |0E.!..M.....Xr.D| +peer0.org1.example.com | 00000010 c4 e5 bc da 59 ad 7f f1 b6 28 a8 aa 5c 3b 96 08 |....Y....(..\;..| +peer0.org1.example.com | 00000020 77 ae 64 1d 22 02 20 36 b7 a2 57 74 44 a2 25 35 |w.d.". 6..WtD.%5| +peer0.org1.example.com | 00000030 0c 88 40 20 6e c5 52 10 7c 39 bb 0c 69 05 c6 70 |..@ n.R.|9..i..p| +peer0.org1.example.com | 00000040 d5 21 7c 0b 2f 88 70 |.!|./.p|" +peer0.org1.example.com | "2019-09-24 00:25:51.744 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.744 UTC [gossip.discovery] isSentByMe -> DEBU 29a8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.745 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29aa Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.745 UTC [gossip.gossip] handleMessage -> DEBU 29ab Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.745 UTC [gossip.pull] HandleMessage -> DEBU 29ac GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.746 UTC [gossip.gossip] handleMessage -> DEBU 29ad Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.746 UTC [gossip.gossip] handleMessage -> DEBU 29ae Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.746 UTC [gossip.gossip] handleMessage -> DEBU 29af Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.748 UTC [gossip.comm] func1 -> DEBU 29b0 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.749 UTC [gossip.comm] func1 -> DEBU 29b1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.749 UTC [gossip.gossip] handleMessage -> DEBU 29b2 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.749 UTC [gossip.pull] HandleMessage -> DEBU 29b3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.749 UTC [gossip.gossip] handleMessage -> DEBU 29b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.749 UTC [gossip.gossip] handleMessage -> DEBU 29b5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29b6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.759 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29b7 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:51.760 UTC [msp.identity] Verify -> DEBU 29b8 Verify: digest = 00000000 ed fb 16 d4 43 af 88 8b ee 62 0b 75 a8 5f ba 06 |....C....b.u._..| +peer0.org1.example.com | 00000010 11 fe e3 77 6b ab 0c f2 b2 71 88 4e 6b 6a e1 ef |...wk....q.Nkj..|" +peer0.org1.example.com | "2019-09-24 00:25:51.760 UTC [msp.identity] Verify -> DEBU 29b9 Verify: sig = 00000000 30 45 02 21 00 f9 e9 be cf 53 29 24 6c 01 46 8b |0E.!.....S)$l.F.| +peer0.org1.example.com | 00000010 da f0 1d 13 91 ca 36 34 64 56 09 f7 9b 69 2d ef |......64dV...i-.| +peer0.org1.example.com | 00000020 79 6f 4e d5 92 02 20 5b fa 07 08 4a 84 8f 31 6e |yoN... [...J..1n| +peer0.org1.example.com | 00000030 2d 3c 7b a1 69 c2 fc 9a e3 87 f9 1a 4b 67 66 9a |-<{.i.......Kgf.| +peer0.org1.example.com | 00000040 31 2c e8 e2 c1 fc 05 |1,.....|" +peer0.org1.example.com | "2019-09-24 00:25:51.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 29ba Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 29bb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.760 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29bc Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:51.760 UTC [msp.identity] Verify -> DEBU 29bd Verify: digest = 00000000 e4 0b 62 90 7c 04 85 8c c2 d6 9c e2 98 7a b2 02 |..b.|........z..| +peer0.org1.example.com | 00000010 34 be d4 71 e1 4d 9c d5 b9 b3 31 b7 66 6e 08 26 |4..q.M....1.fn.&|" +peer0.org1.example.com | "2019-09-24 00:25:51.760 UTC [msp.identity] Verify -> DEBU 29be Verify: sig = 00000000 30 44 02 20 5d c8 9e b1 dd 96 8a e7 69 5c dd 3f |0D. ].......i\.?| +peer0.org1.example.com | 00000010 e7 56 5a fb 09 0e 1c 39 64 8e 70 d0 0a 33 b8 49 |.VZ....9d.p..3.I| +peer0.org1.example.com | 00000020 b9 a0 46 ad 02 20 52 93 a5 80 99 31 1a 07 e2 ed |..F.. R....1....| +peer0.org1.example.com | 00000030 cd e6 1d a0 a1 9b ba 96 ab 0a e7 56 78 2e 6a a7 |...........Vx.j.| +peer0.org1.example.com | 00000040 a7 ee 12 9d 51 87 |....Q.|" +peer0.org1.example.com | "2019-09-24 00:25:51.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 29bf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.761 UTC [gossip.discovery] isSentByMe -> DEBU 29c0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 29c1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.761 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29c2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.770 UTC [gossip.gossip] handleMessage -> DEBU 29c3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.771 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29c4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.779 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29c5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:51.789 UTC [msp.identity] Verify -> DEBU 29c6 Verify: digest = 00000000 e4 0b 62 90 7c 04 85 8c c2 d6 9c e2 98 7a b2 02 |..b.|........z..| +peer0.org1.example.com | 00000010 34 be d4 71 e1 4d 9c d5 b9 b3 31 b7 66 6e 08 26 |4..q.M....1.fn.&|" +peer0.org1.example.com | "2019-09-24 00:25:51.789 UTC [msp.identity] Verify -> DEBU 29c7 Verify: sig = 00000000 30 44 02 20 5d c8 9e b1 dd 96 8a e7 69 5c dd 3f |0D. ].......i\.?| +peer0.org1.example.com | 00000010 e7 56 5a fb 09 0e 1c 39 64 8e 70 d0 0a 33 b8 49 |.VZ....9d.p..3.I| +peer0.org1.example.com | 00000020 b9 a0 46 ad 02 20 52 93 a5 80 99 31 1a 07 e2 ed |..F.. R....1....| +peer0.org1.example.com | 00000030 cd e6 1d a0 a1 9b ba 96 ab 0a e7 56 78 2e 6a a7 |...........Vx.j.| +peer0.org1.example.com | 00000040 a7 ee 12 9d 51 87 |....Q.|" +peer0.org1.example.com | "2019-09-24 00:25:51.791 UTC [gossip.discovery] handleAliveMessage -> DEBU 29c8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.791 UTC [gossip.discovery] isSentByMe -> DEBU 29c9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.795 UTC [gossip.discovery] handleAliveMessage -> DEBU 29ca Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.795 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29cb Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:51.796 UTC [msp.identity] Verify -> DEBU 29cc Verify: digest = 00000000 ed fb 16 d4 43 af 88 8b ee 62 0b 75 a8 5f ba 06 |....C....b.u._..| +peer0.org1.example.com | 00000010 11 fe e3 77 6b ab 0c f2 b2 71 88 4e 6b 6a e1 ef |...wk....q.Nkj..|" +peer0.org1.example.com | "2019-09-24 00:25:51.796 UTC [msp.identity] Verify -> DEBU 29cd Verify: sig = 00000000 30 45 02 21 00 f9 e9 be cf 53 29 24 6c 01 46 8b |0E.!.....S)$l.F.| +peer0.org1.example.com | 00000010 da f0 1d 13 91 ca 36 34 64 56 09 f7 9b 69 2d ef |......64dV...i-.| +peer0.org1.example.com | 00000020 79 6f 4e d5 92 02 20 5b fa 07 08 4a 84 8f 31 6e |yoN... [...J..1n| +peer0.org1.example.com | 00000030 2d 3c 7b a1 69 c2 fc 9a e3 87 f9 1a 4b 67 66 9a |-<{.i.......Kgf.| +peer0.org1.example.com | 00000040 31 2c e8 e2 c1 fc 05 |1,.....|" +peer0.org1.example.com | "2019-09-24 00:25:51.797 UTC [gossip.discovery] handleAliveMessage -> DEBU 29ce Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.797 UTC [gossip.discovery] handleAliveMessage -> DEBU 29cf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.797 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29d0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.949 UTC [gossip.gossip] handleMessage -> DEBU 29d1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.949 UTC [gossip.pull] HandleMessage -> DEBU 29d2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.949 UTC [gossip.pull] SendDigest -> DEBU 29d9 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:51.949 UTC [gossip.gossip] handleMessage -> DEBU 29da Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.962 UTC [gossip.gossip] handleMessage -> DEBU 29db Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.962 UTC [gossip.gossip] handleMessage -> DEBU 29dc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29dd Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.962 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29de Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:51.962 UTC [msp] DeserializeIdentity -> DEBU 29df Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.968 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:51.968 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29e1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:51.968 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29e2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:51.968 UTC [policies] Evaluate -> DEBU 29e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:51.968 UTC [policies] Evaluate -> DEBU 29e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func1 -> DEBU 29e6 0xc0049a1790 gate 1569284751969079300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29e7 0xc0049a1790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29e8 0xc0049a1790 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29e9 0xc0049a1790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29ea 0xc0049a1790 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func1 -> DEBU 29eb 0xc0049a1790 gate 1569284751969079300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func1 -> DEBU 29ef 0xc0049a1fd0 gate 1569284751969430500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29f0 0xc0049a1fd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29f1 0xc0049a1fd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29f2 0xc0049a1fd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [msp.identity] Verify -> DEBU 29f3 Verify: digest = 00000000 bb 3f a4 60 82 12 87 6d 75 69 59 29 9f 68 c8 cb |.?.`...muiY).h..| +peer0.org1.example.com | 00000010 7a 09 e2 ea bd ed 26 82 59 28 f3 cb f2 5b 3b 66 |z.....&.Y(...[;f|" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [msp.identity] Verify -> DEBU 29f4 Verify: sig = 00000000 30 44 02 20 13 67 85 ba c5 21 2d 90 94 89 5e 20 |0D. .g...!-...^ | +peer0.org1.example.com | 00000010 07 90 a3 4d 8a f7 a0 19 52 90 9c 3f 32 20 61 70 |...M....R..?2 ap| +peer0.org1.example.com | 00000020 dc 32 5e cb 02 20 19 43 1f 57 36 06 dd 8e cc 59 |.2^.. .C.W6....Y| +peer0.org1.example.com | 00000030 ce 3b 60 34 e7 dc e5 fe 9c aa f6 7f 9a 61 6c 78 |.;`4.........alx| +peer0.org1.example.com | 00000040 99 37 fe 56 23 5e |.7.V#^|" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29f5 0xc0049a1fd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [cauthdsl] func1 -> DEBU 29f6 0xc0049a1fd0 gate 1569284751969430500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [policies] Evaluate -> DEBU 29f9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [policies] Evaluate -> DEBU 29fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 29fb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 29fc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 29fd updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 29fe Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 29ff Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a00 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a01 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a02 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.discovery] sendMemResponse -> DEBU 2a03 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [msp] DeserializeIdentity -> DEBU 2a04 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [msp] DeserializeIdentity -> DEBU 2a05 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [msp] DeserializeIdentity -> DEBU 2a06 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.comm] Send -> DEBU 2a07 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.discovery] sendMemResponse -> DEBU 2a08 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020-" signature:"0E\002!\000\371\351\276\317S)$l\001F\213\332\360\035\023\221\31264dV\t\367\233i-\357yoN\325\222\002 [\372\007\010J\204\2171n-<{\241i\302\374\232\343\207\371\032Kgf\2321,\350\342\301\374\005" > alive: alive: alive:\031\036\325\207j\356\0262\202\301\233\n\234\350\202\377\007\350\334\270\321\272\002 }\020\314\333wF\336\213\272LE\024\000KC\253+\270\354\t4ND\361\371\025j\273\251\204\004P" > " +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.comm] sendToEndpoint -> DEBU 2a09 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:51.970 UTC [gossip.comm] sendToEndpoint -> DEBU 2a0a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.147 UTC [msp] DeserializeIdentity -> DEBU 2a0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.147 UTC [msp] DeserializeIdentity -> DEBU 2a0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.147 UTC [gossip.comm] Send -> DEBU 2a0d Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:52.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2a0e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2a0f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2a10 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2a11 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2a12 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.149 UTC [gossip.comm] sendToEndpoint -> DEBU 2a13 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.155 UTC [gossip.comm] func1 -> DEBU 2a14 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.162 UTC [gossip.gossip] handleMessage -> DEBU 2a15 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.162 UTC [msp.identity] Verify -> DEBU 2a16 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:52.162 UTC [msp.identity] Verify -> DEBU 2a17 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:52.163 UTC [msp.identity] Verify -> DEBU 2a18 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:52.163 UTC [msp.identity] Verify -> DEBU 2a19 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:52.163 UTC [msp] DeserializeIdentity -> DEBU 2a1a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.163 UTC [msp] DeserializeIdentity -> DEBU 2a1b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.163 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a1c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:52.163 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a1d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.163 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a1e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.163 UTC [policies] Evaluate -> DEBU 2a1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.163 UTC [policies] Evaluate -> DEBU 2a20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:52.164 UTC [policies] Evaluate -> DEBU 2a21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.164 UTC [gossip.comm] func1 -> DEBU 2a22 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.164 UTC [cauthdsl] func1 -> DEBU 2a23 0xc0049d38a0 gate 1569284752164057000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.164 UTC [cauthdsl] func2 -> DEBU 2a24 0xc0049d38a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.164 UTC [cauthdsl] func2 -> DEBU 2a25 0xc0049d38a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.164 UTC [cauthdsl] func2 -> DEBU 2a26 0xc0049d38a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:52.164 UTC [cauthdsl] func2 -> DEBU 2a27 0xc0049d38a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.164 UTC [cauthdsl] func1 -> DEBU 2a28 0xc0049d38a0 gate 1569284752164057000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.164 UTC [policies] Evaluate -> DEBU 2a29 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.164 UTC [policies] Evaluate -> DEBU 2a2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.164 UTC [policies] Evaluate -> DEBU 2a2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.165 UTC [cauthdsl] func1 -> DEBU 2a2c 0xc0049ec0e0 gate 1569284752165833800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.165 UTC [cauthdsl] func2 -> DEBU 2a2d 0xc0049ec0e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.165 UTC [cauthdsl] func2 -> DEBU 2a2e 0xc0049ec0e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.166 UTC [cauthdsl] func2 -> DEBU 2a2f 0xc0049ec0e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.166 UTC [msp.identity] Verify -> DEBU 2a30 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:52.166 UTC [msp.identity] Verify -> DEBU 2a31 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:52.166 UTC [cauthdsl] func2 -> DEBU 2a32 0xc0049ec0e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.166 UTC [cauthdsl] func1 -> DEBU 2a33 0xc0049ec0e0 gate 1569284752165833800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:52.166 UTC [policies] Evaluate -> DEBU 2a34 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.166 UTC [policies] Evaluate -> DEBU 2a35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.166 UTC [policies] Evaluate -> DEBU 2a36 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.166 UTC [policies] Evaluate -> DEBU 2a37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.166 UTC [msp] DeserializeIdentity -> DEBU 2a38 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.167 UTC [msp] DeserializeIdentity -> DEBU 2a39 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.168 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a3a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:52.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a3b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a3c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.168 UTC [policies] Evaluate -> DEBU 2a3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.168 UTC [policies] Evaluate -> DEBU 2a3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:52.169 UTC [policies] Evaluate -> DEBU 2a3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.172 UTC [cauthdsl] func1 -> DEBU 2a40 0xc0049ed8b0 gate 1569284752172311100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a41 0xc0049ed8b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a42 0xc0049ed8b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a43 0xc0049ed8b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a44 0xc0049ed8b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [cauthdsl] func1 -> DEBU 2a45 0xc0049ed8b0 gate 1569284752172311100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [policies] Evaluate -> DEBU 2a46 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [policies] Evaluate -> DEBU 2a47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [policies] Evaluate -> DEBU 2a48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [cauthdsl] func1 -> DEBU 2a49 0xc004a040f0 gate 1569284752173639100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a4a 0xc004a040f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a4b 0xc004a040f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a4c 0xc004a040f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [msp.identity] Verify -> DEBU 2a4d Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:52.173 UTC [msp.identity] Verify -> DEBU 2a4e Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:52.174 UTC [cauthdsl] func2 -> DEBU 2a4f 0xc004a040f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.174 UTC [cauthdsl] func1 -> DEBU 2a50 0xc004a040f0 gate 1569284752173639100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:52.174 UTC [policies] Evaluate -> DEBU 2a51 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.174 UTC [policies] Evaluate -> DEBU 2a52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.174 UTC [policies] Evaluate -> DEBU 2a53 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.174 UTC [policies] Evaluate -> DEBU 2a54 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.174 UTC [gossip.gossip] handleMessage -> DEBU 2a55 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.174 UTC [gossip.gossip] handleMessage -> DEBU 2a56 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.174 UTC [msp] DeserializeIdentity -> DEBU 2a57 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [msp] DeserializeIdentity -> DEBU 2a58 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [msp] DeserializeIdentity -> DEBU 2a59 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a5a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a5b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a5c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [policies] Evaluate -> DEBU 2a5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [policies] Evaluate -> DEBU 2a5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [policies] Evaluate -> DEBU 2a5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [cauthdsl] func1 -> DEBU 2a60 0xc004a05c00 gate 1569284752220843300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [cauthdsl] func2 -> DEBU 2a61 0xc004a05c00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [cauthdsl] func2 -> DEBU 2a62 0xc004a05c00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.220 UTC [cauthdsl] func2 -> DEBU 2a63 0xc004a05c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [cauthdsl] func2 -> DEBU 2a64 0xc004a05c00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [cauthdsl] func1 -> DEBU 2a65 0xc004a05c00 gate 1569284752220843300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a66 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [cauthdsl] func1 -> DEBU 2a69 0xc004a1c440 gate 1569284752221262100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [cauthdsl] func2 -> DEBU 2a6a 0xc004a1c440 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [cauthdsl] func2 -> DEBU 2a6b 0xc004a1c440 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [cauthdsl] func2 -> DEBU 2a6c 0xc004a1c440 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [msp.identity] Verify -> DEBU 2a6d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [msp.identity] Verify -> DEBU 2a6e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [cauthdsl] func2 -> DEBU 2a6f 0xc004a1c440 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [cauthdsl] func1 -> DEBU 2a70 0xc004a1c440 gate 1569284752221262100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a71 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a72 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a73 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a74 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.222 UTC [msp.identity] Verify -> DEBU 2a75 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:52.222 UTC [msp.identity] Verify -> DEBU 2a76 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:52.222 UTC [msp.identity] Verify -> DEBU 2a77 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:52.222 UTC [msp.identity] Verify -> DEBU 2a78 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:52.222 UTC [msp] DeserializeIdentity -> DEBU 2a79 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [msp] DeserializeIdentity -> DEBU 2a7a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a7b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a7c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a7d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [policies] Evaluate -> DEBU 2a7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [policies] Evaluate -> DEBU 2a7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [policies] Evaluate -> DEBU 2a80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [cauthdsl] func1 -> DEBU 2a81 0xc004a34a50 gate 1569284752223379600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [cauthdsl] func2 -> DEBU 2a82 0xc004a34a50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [cauthdsl] func2 -> DEBU 2a83 0xc004a34a50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [cauthdsl] func2 -> DEBU 2a84 0xc004a34a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [cauthdsl] func2 -> DEBU 2a85 0xc004a34a50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [cauthdsl] func1 -> DEBU 2a86 0xc004a34a50 gate 1569284752223379600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.223 UTC [policies] Evaluate -> DEBU 2a87 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.224 UTC [policies] Evaluate -> DEBU 2a88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.224 UTC [policies] Evaluate -> DEBU 2a89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.224 UTC [cauthdsl] func1 -> DEBU 2a8a 0xc004a35290 gate 1569284752224820200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.224 UTC [cauthdsl] func2 -> DEBU 2a8b 0xc004a35290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.224 UTC [cauthdsl] func2 -> DEBU 2a8c 0xc004a35290 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.224 UTC [cauthdsl] func2 -> DEBU 2a8d 0xc004a35290 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.225 UTC [msp.identity] Verify -> DEBU 2a8e Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:52.225 UTC [msp.identity] Verify -> DEBU 2a8f Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:52.226 UTC [cauthdsl] func2 -> DEBU 2a90 0xc004a35290 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.227 UTC [cauthdsl] func1 -> DEBU 2a91 0xc004a35290 gate 1569284752224820200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:52.227 UTC [policies] Evaluate -> DEBU 2a92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.227 UTC [policies] Evaluate -> DEBU 2a93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.227 UTC [policies] Evaluate -> DEBU 2a94 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.227 UTC [policies] Evaluate -> DEBU 2a95 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.227 UTC [gossip.gossip] handleMessage -> DEBU 2a96 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.227 UTC [gossip.gossip] handleMessage -> DEBU 2a97 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.227 UTC [msp] DeserializeIdentity -> DEBU 2a98 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.228 UTC [msp] DeserializeIdentity -> DEBU 2a99 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.228 UTC [msp] DeserializeIdentity -> DEBU 2a9a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.228 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a9b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:52.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a9c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a9d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.228 UTC [policies] Evaluate -> DEBU 2a9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.228 UTC [policies] Evaluate -> DEBU 2a9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:52.228 UTC [policies] Evaluate -> DEBU 2aa0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.228 UTC [cauthdsl] func1 -> DEBU 2aa1 0xc004a46da0 gate 1569284752228763700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.228 UTC [cauthdsl] func2 -> DEBU 2aa2 0xc004a46da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.228 UTC [cauthdsl] func2 -> DEBU 2aa3 0xc004a46da0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.229 UTC [cauthdsl] func2 -> DEBU 2aa4 0xc004a46da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:52.229 UTC [cauthdsl] func2 -> DEBU 2aa5 0xc004a46da0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.229 UTC [cauthdsl] func1 -> DEBU 2aa6 0xc004a46da0 gate 1569284752228763700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.233 UTC [policies] Evaluate -> DEBU 2aa7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.233 UTC [policies] Evaluate -> DEBU 2aa8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.261 UTC [policies] Evaluate -> DEBU 2aa9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.261 UTC [cauthdsl] func1 -> DEBU 2aaa 0xc004a475e0 gate 1569284752261661100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.261 UTC [cauthdsl] func2 -> DEBU 2aab 0xc004a475e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.265 UTC [cauthdsl] func2 -> DEBU 2aac 0xc004a475e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.265 UTC [cauthdsl] func2 -> DEBU 2aad 0xc004a475e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.265 UTC [msp.identity] Verify -> DEBU 2aae Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:52.265 UTC [msp.identity] Verify -> DEBU 2aaf Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:52.265 UTC [cauthdsl] func2 -> DEBU 2ab0 0xc004a475e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.265 UTC [cauthdsl] func1 -> DEBU 2ab1 0xc004a475e0 gate 1569284752261661100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:52.265 UTC [policies] Evaluate -> DEBU 2ab2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.265 UTC [policies] Evaluate -> DEBU 2ab3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.265 UTC [policies] Evaluate -> DEBU 2ab4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.265 UTC [policies] Evaluate -> DEBU 2ab5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.266 UTC [msp.identity] Verify -> DEBU 2ab6 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:52.266 UTC [msp.identity] Verify -> DEBU 2ab7 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:52.266 UTC [msp] DeserializeIdentity -> DEBU 2ab8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.266 UTC [msp] DeserializeIdentity -> DEBU 2ab9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.285 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2aba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:52.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2abb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2abc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.286 UTC [policies] Evaluate -> DEBU 2abd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.286 UTC [policies] Evaluate -> DEBU 2abe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:52.286 UTC [policies] Evaluate -> DEBU 2abf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.286 UTC [cauthdsl] func1 -> DEBU 2ac0 0xc004a5b4d0 gate 1569284752286781300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.286 UTC [cauthdsl] func2 -> DEBU 2ac1 0xc004a5b4d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.286 UTC [cauthdsl] func2 -> DEBU 2ac2 0xc004a5b4d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.289 UTC [gossip.election] waitForInterrupt -> DEBU 2ac3 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.295 UTC [gossip.election] IsLeader -> DEBU 2ac4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:25:52.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 2ac5 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:52.295 UTC [msp.identity] Sign -> DEBU 2ac6 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315100C1801 " +peer0.org1.example.com | "2019-09-24 00:25:52.295 UTC [msp.identity] Sign -> DEBU 2ac7 Sign: digest: DBD68A8B8209DE8FF69F47F8D0DB9E91C14344794A4400A36A70B30C2BD0F89D " +peer0.org1.example.com | "2019-09-24 00:25:52.296 UTC [gossip.election] waitForInterrupt -> DEBU 2ac8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:25:52.296 UTC [msp] DeserializeIdentity -> DEBU 2ac9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.296 UTC [msp] DeserializeIdentity -> DEBU 2aca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.296 UTC [gossip.pull] Hello -> DEBU 2acb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:52.296 UTC [msp] DeserializeIdentity -> DEBU 2acc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.296 UTC [msp] DeserializeIdentity -> DEBU 2acd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.296 UTC [gossip.comm] Send -> DEBU 2ace Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:52.296 UTC [gossip.comm] sendToEndpoint -> DEBU 2acf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.296 UTC [gossip.comm] sendToEndpoint -> DEBU 2ad0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.297 UTC [msp] DeserializeIdentity -> DEBU 2ad1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.297 UTC [msp] DeserializeIdentity -> DEBU 2ad2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.298 UTC [msp] DeserializeIdentity -> DEBU 2ad3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.298 UTC [msp] DeserializeIdentity -> DEBU 2ad4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.298 UTC [gossip.comm] Send -> DEBU 2ad5 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:52.298 UTC [msp] DeserializeIdentity -> DEBU 2ad6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.298 UTC [msp] DeserializeIdentity -> DEBU 2ad7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.313 UTC [cauthdsl] func2 -> DEBU 2ad8 0xc004a5b4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:52.313 UTC [cauthdsl] func2 -> DEBU 2ad9 0xc004a5b4d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.313 UTC [cauthdsl] func1 -> DEBU 2ada 0xc004a5b4d0 gate 1569284752286781300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.313 UTC [policies] Evaluate -> DEBU 2adb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.313 UTC [policies] Evaluate -> DEBU 2adc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.313 UTC [policies] Evaluate -> DEBU 2add == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.313 UTC [cauthdsl] func1 -> DEBU 2ade 0xc004a5bd10 gate 1569284752313657100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.313 UTC [cauthdsl] func2 -> DEBU 2adf 0xc004a5bd10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.313 UTC [cauthdsl] func2 -> DEBU 2ae0 0xc004a5bd10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.313 UTC [cauthdsl] func2 -> DEBU 2ae1 0xc004a5bd10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.313 UTC [msp.identity] Verify -> DEBU 2ae2 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:52.314 UTC [msp.identity] Verify -> DEBU 2ae3 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:52.314 UTC [cauthdsl] func2 -> DEBU 2ae4 0xc004a5bd10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.314 UTC [cauthdsl] func1 -> DEBU 2ae5 0xc004a5bd10 gate 1569284752313657100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:52.314 UTC [policies] Evaluate -> DEBU 2ae6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.314 UTC [policies] Evaluate -> DEBU 2ae7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.314 UTC [policies] Evaluate -> DEBU 2ae8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.314 UTC [policies] Evaluate -> DEBU 2ae9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.315 UTC [msp.identity] Verify -> DEBU 2aea Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:52.315 UTC [msp.identity] Verify -> DEBU 2aeb Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:52.315 UTC [gossip.gossip] handleMessage -> DEBU 2aec Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.338 UTC [gossip.comm] func1 -> DEBU 2aed Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.339 UTC [gossip.gossip] handleMessage -> DEBU 2aee Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.340 UTC [gossip.pull] HandleMessage -> DEBU 2aef GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.340 UTC [gossip.gossip] handleMessage -> DEBU 2af0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.356 UTC [gossip.comm] sendToEndpoint -> DEBU 2af1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.356 UTC [gossip.comm] sendToEndpoint -> DEBU 2af2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.647 UTC [gossip.comm] func1 -> DEBU 2af3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.647 UTC [gossip.gossip] handleMessage -> DEBU 2af4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.647 UTC [msp] DeserializeIdentity -> DEBU 2af5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.648 UTC [msp] DeserializeIdentity -> DEBU 2af6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.648 UTC [gossip.gossip] handleMessage -> DEBU 2af7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.703 UTC [gossip.comm] func1 -> DEBU 2af8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.703 UTC [gossip.gossip] handleMessage -> DEBU 2af9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.703 UTC [gossip.gossip] handleMessage -> DEBU 2afa Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2afb Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.704 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2afc Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:52.704 UTC [msp.identity] Verify -> DEBU 2afd Verify: digest = 00000000 3d e4 21 eb cf b3 91 0f 6b 17 60 50 60 37 67 15 |=.!.....k.`P`7g.| +peer0.org1.example.com | 00000010 0a 36 a8 79 c1 b4 7f e5 9a c8 d3 79 15 58 0e 20 |.6.y.......y.X. |" +peer0.org1.example.com | "2019-09-24 00:25:52.704 UTC [msp.identity] Verify -> DEBU 2afe Verify: sig = 00000000 30 44 02 20 7e d0 b8 2f 1a 7c a2 c1 17 b0 62 dd |0D. ~../.|....b.| +peer0.org1.example.com | 00000010 2e bc 76 ae 01 a3 ae 43 0a a0 94 27 0e ba 8c b3 |..v....C...'....| +peer0.org1.example.com | 00000020 cd f7 1c b5 02 20 7a 89 0d e6 df e2 26 2d 9d 2d |..... z.....&-.-| +peer0.org1.example.com | 00000030 a4 bc cc 2e 22 aa db c6 b1 b2 71 2b ee fa 8f 6f |....".....q+...o| +peer0.org1.example.com | 00000040 42 43 a2 26 b5 d2 |BC.&..|" +peer0.org1.example.com | "2019-09-24 00:25:52.704 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aff Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.704 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b00 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:52.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b01 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:52.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b02 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:52.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b03 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:52.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b04 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b05 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b06 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.710 UTC [gossip.comm] func1 -> DEBU 2b07 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.710 UTC [gossip.gossip] handleMessage -> DEBU 2b08 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.710 UTC [gossip.gossip] handleMessage -> DEBU 2b09 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b0a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.710 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b0b Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:52.710 UTC [msp] DeserializeIdentity -> DEBU 2b0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b0d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b0e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b0f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [policies] Evaluate -> DEBU 2b10 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [policies] Evaluate -> DEBU 2b11 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [policies] Evaluate -> DEBU 2b12 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [cauthdsl] func1 -> DEBU 2b13 0xc004aa1e60 gate 1569284752711686600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [cauthdsl] func2 -> DEBU 2b14 0xc004aa1e60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [cauthdsl] func2 -> DEBU 2b15 0xc004aa1e60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [cauthdsl] func2 -> DEBU 2b16 0xc004aa1e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [cauthdsl] func2 -> DEBU 2b17 0xc004aa1e60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [cauthdsl] func1 -> DEBU 2b18 0xc004aa1e60 gate 1569284752711686600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [policies] Evaluate -> DEBU 2b19 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.711 UTC [policies] Evaluate -> DEBU 2b1a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.712 UTC [policies] Evaluate -> DEBU 2b1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:52.712 UTC [cauthdsl] func1 -> DEBU 2b1c 0xc004ab66a0 gate 1569284752712055300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:52.712 UTC [cauthdsl] func2 -> DEBU 2b1d 0xc004ab66a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:52.712 UTC [cauthdsl] func2 -> DEBU 2b1e 0xc004ab66a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:52.712 UTC [cauthdsl] func2 -> DEBU 2b1f 0xc004ab66a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.712 UTC [msp.identity] Verify -> DEBU 2b20 Verify: digest = 00000000 fd b2 d7 cd 3e 00 13 4a 55 95 a4 8e f2 98 5b ef |....>..JU.....[.| +peer0.org1.example.com | 00000010 21 8c ec 91 c1 54 de c3 29 4d 3b 32 e8 7a a5 b4 |!....T..)M;2.z..|" +peer0.org1.example.com | "2019-09-24 00:25:52.712 UTC [msp.identity] Verify -> DEBU 2b21 Verify: sig = 00000000 30 44 02 20 08 ba 5d 54 f5 99 e3 d1 cb 43 2e 54 |0D. ..]T.....C.T| +peer0.org1.example.com | 00000010 20 d2 dd ca 5b a8 1c 96 27 22 83 47 6c 6f 0d 05 | ...[...'".Glo..| +peer0.org1.example.com | 00000020 1e be b7 0e 02 20 65 15 3b 21 aa a0 85 b4 73 ba |..... e.;!....s.| +peer0.org1.example.com | 00000030 3c 15 c7 3d 7f 9b a2 47 f3 32 ba f3 9f d3 ea 1b |<..=...G.2......| +peer0.org1.example.com | 00000040 7a 85 7a ac a2 ba |z.z...|" +peer0.org1.example.com | "2019-09-24 00:25:52.735 UTC [gossip.gossip] handleMessage -> DEBU 2b22 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.736 UTC [gossip.comm] func1 -> DEBU 2b23 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.736 UTC [msp] DeserializeIdentity -> DEBU 2b24 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.736 UTC [msp] DeserializeIdentity -> DEBU 2b25 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.739 UTC [msp] DeserializeIdentity -> DEBU 2b26 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.739 UTC [gossip.comm] Send -> DEBU 2b27 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:52.739 UTC [msp] DeserializeIdentity -> DEBU 2b28 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.739 UTC [gossip.comm] Send -> DEBU 2b29 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:52.740 UTC [gossip.comm] sendToEndpoint -> DEBU 2b2a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.740 UTC [gossip.comm] sendToEndpoint -> DEBU 2b2b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.741 UTC [gossip.comm] sendToEndpoint -> DEBU 2b2c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.741 UTC [gossip.comm] sendToEndpoint -> DEBU 2b2d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.741 UTC [cauthdsl] func2 -> DEBU 2b2e 0xc004ab66a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:52.773 UTC [gossip.comm] func1 -> DEBU 2b2f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.742 UTC [cauthdsl] func1 -> DEBU 2b30 0xc004ab66a0 gate 1569284752712055300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:52.775 UTC [policies] Evaluate -> DEBU 2b31 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.775 UTC [policies] Evaluate -> DEBU 2b32 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.775 UTC [policies] Evaluate -> DEBU 2b33 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.775 UTC [policies] Evaluate -> DEBU 2b34 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:52.775 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b35 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b36 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b37 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:52.776 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b38 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:52.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b39 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:52.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b3a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.777 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b3b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.777 UTC [gossip.discovery] sendMemResponse -> DEBU 2b3c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:52.777 UTC [msp] DeserializeIdentity -> DEBU 2b3d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.782 UTC [msp] DeserializeIdentity -> DEBU 2b3e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.782 UTC [msp] DeserializeIdentity -> DEBU 2b3f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.782 UTC [gossip.comm] Send -> DEBU 2b40 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:52.783 UTC [gossip.discovery] sendMemResponse -> DEBU 2b41 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020." signature:"0D\002 ~\320\270/\032|\242\301\027\260b\335.\274v\256\001\243\256C\n\240\224'\016\272\214\263\315\367\034\265\002 z\211\r\346\337\342&-\235-\244\274\314.\"\252\333\306\261\262q+\356\372\217oBC\242&\265\322" > alive: alive:\031\036\325\207j\356\0262\202\301\233\n\234\350\202\377\007\350\334\270\321\272\002 }\020\314\333wF\336\213\272LE\024\000KC\253+\270\354\t4ND\361\371\025j\273\251\204\004P" > " +peer0.org1.example.com | "2019-09-24 00:25:52.783 UTC [gossip.comm] sendToEndpoint -> DEBU 2b42 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.783 UTC [gossip.comm] sendToEndpoint -> DEBU 2b43 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.786 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b44 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [gossip.gossip] handleMessage -> DEBU 2b45 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [gossip.gossip] handleMessage -> DEBU 2b46 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [gossip.pull] HandleMessage -> DEBU 2b47 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b48 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b49 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b4a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b4b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b4c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [gossip.pull] SendDigest -> DEBU 2b4e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [gossip.gossip] handleMessage -> DEBU 2b4f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.787 UTC [gossip.gossip] handleMessage -> DEBU 2b50 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.786 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b51 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.791 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b52 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.792 UTC [gossip.gossip] handleMessage -> DEBU 2b53 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.793 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b54 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.793 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b55 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:52.818 UTC [gossip.comm] func1 -> DEBU 2b56 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.819 UTC [gossip.gossip] handleMessage -> DEBU 2b57 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.819 UTC [gossip.pull] HandleMessage -> DEBU 2b58 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:52.819 UTC [gossip.pull] SendDigest -> DEBU 2b59 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:52.820 UTC [gossip.gossip] handleMessage -> DEBU 2b5a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:53.143 UTC [gossip.gossip] handleMessage -> DEBU 2b5b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:53.143 UTC [msp] DeserializeIdentity -> DEBU 2b5c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:53.144 UTC [msp] DeserializeIdentity -> DEBU 2b5d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:53.144 UTC [msp] DeserializeIdentity -> DEBU 2b5e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:53.144 UTC [gossip.gossip] handleMessage -> DEBU 2b5f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:53.678 UTC [gossip.comm] func1 -> DEBU 2b60 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:53.679 UTC [gossip.gossip] handleMessage -> DEBU 2b61 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:53.679 UTC [gossip.pull] HandleMessage -> DEBU 2b62 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:53.679 UTC [gossip.pull] SendDigest -> DEBU 2b63 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:53.679 UTC [gossip.gossip] handleMessage -> DEBU 2b64 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:53.736 UTC [gossip.comm] func1 -> DEBU 2b65 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" secret_envelope:" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:53.736 UTC [gossip.gossip] handleMessage -> DEBU 2b66 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" secret_envelope:" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:53.736 UTC [gossip.gossip] handleMessage -> DEBU 2b67 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:53.737 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b68 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" secret_envelope:" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:53.737 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b69 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:53.737 UTC [msp.identity] Verify -> DEBU 2b6a Verify: digest = 00000000 a4 e8 45 ea 9d 15 f3 98 5f 79 53 f6 bd 2c 40 42 |..E....._yS..,@B| +peer0.org1.example.com | 00000010 30 db b2 f7 32 0f 9d 37 cc 4d e2 71 5b bc b8 9b |0...2..7.M.q[...|" +peer0.org1.example.com | "2019-09-24 00:25:53.750 UTC [msp.identity] Verify -> DEBU 2b6b Verify: sig = 00000000 30 45 02 21 00 87 94 bd 94 ef f5 e3 3d 5c 66 59 |0E.!........=\fY| +peer0.org1.example.com | 00000010 98 c1 e0 4e 9f 3a 5e f9 bb 67 0a e6 a2 e8 95 58 |...N.:^..g.....X| +peer0.org1.example.com | 00000020 e8 76 55 b9 da 02 20 7c 4e 66 0d e3 80 40 11 7b |.vU... |Nf...@.{| +peer0.org1.example.com | 00000030 ed 80 9c 65 6d 6d af 54 87 b9 6d a3 ce 33 75 df |...emm.T..m..3u.| +peer0.org1.example.com | 00000040 fa 72 a1 08 42 42 05 |.r..BB.|" +peer0.org1.example.com | "2019-09-24 00:25:53.750 UTC [msp.identity] Verify -> DEBU 2b6c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:53.750 UTC [msp.identity] Verify -> DEBU 2b6d Verify: sig = 00000000 30 44 02 20 2a ab 89 4c d8 4c 9b b1 ef a6 49 e2 |0D. *..L.L....I.| +peer0.org1.example.com | 00000010 98 f4 35 36 1e 47 9f 47 e5 44 63 b9 11 fc ed 74 |..56.G.G.Dc....t| +peer0.org1.example.com | 00000020 9a c1 c8 0f 02 20 5f 31 0e f3 0d 04 22 a2 f2 47 |..... _1...."..G| +peer0.org1.example.com | 00000030 02 61 1e cb 64 34 b7 50 96 54 28 ee 2f 35 de 5d |.a..d4.P.T(./5.]| +peer0.org1.example.com | 00000040 14 e4 be df 0a 3e |.....>|" +peer0.org1.example.com | "2019-09-24 00:25:53.752 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b6e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:53.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b6f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:53.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b70 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:53.754 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b71 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b72 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:53.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b73 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:53.785 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b74 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:53.785 UTC [gossip.discovery] sendMemResponse -> DEBU 2b75 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:53.785 UTC [msp] DeserializeIdentity -> DEBU 2b76 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:53.785 UTC [msp] DeserializeIdentity -> DEBU 2b77 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:53.785 UTC [gossip.comm] Send -> DEBU 2b78 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:53.786 UTC [gossip.discovery] sendMemResponse -> DEBU 2b79 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" secret_envelope:" > > alive:\031\036\325\207j\356\0262\202\301\233\n\234\350\202\377\007\350\334\270\321\272\002 }\020\314\333wF\336\213\272LE\024\000KC\253+\270\354\t4ND\361\371\025j\273\251\204\004P" > " +peer0.org1.example.com | "2019-09-24 00:25:53.786 UTC [gossip.comm] sendToEndpoint -> DEBU 2b7a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:53.786 UTC [gossip.comm] sendToEndpoint -> DEBU 2b7b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:53.785 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b7c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.091 UTC [gossip.comm] func1 -> DEBU 2b7d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.091 UTC [gossip.gossip] handleMessage -> DEBU 2b7e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.091 UTC [msp] DeserializeIdentity -> DEBU 2b7f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.092 UTC [msp] DeserializeIdentity -> DEBU 2b80 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.092 UTC [msp] DeserializeIdentity -> DEBU 2b81 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.093 UTC [gossip.gossip] handleMessage -> DEBU 2b82 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.580 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 2b83 Sleeping 25s" +peer0.org1.example.com | "2019-09-24 00:25:54.616 UTC [msp] GetDefaultSigningIdentity -> DEBU 2b84 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:54.616 UTC [msp.identity] Sign -> DEBU 2b85 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102B " +peer0.org1.example.com | "2019-09-24 00:25:54.616 UTC [msp.identity] Sign -> DEBU 2b86 Sign: digest: 7D95D65C53B77F54156C7442BBEC5CB5AAF17B8088BE39AC9E0BD8EBC84905FF " +peer0.org1.example.com | "2019-09-24 00:25:54.616 UTC [msp] GetDefaultSigningIdentity -> DEBU 2b87 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:54.617 UTC [msp.identity] Sign -> DEBU 2b88 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:54.617 UTC [msp.identity] Sign -> DEBU 2b89 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:54.618 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2b8a Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:54.632 UTC [msp] DeserializeIdentity -> DEBU 2b8b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.633 UTC [msp] DeserializeIdentity -> DEBU 2b8c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.633 UTC [gossip.comm] Send -> DEBU 2b8d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:54.633 UTC [msp] DeserializeIdentity -> DEBU 2b8e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.634 UTC [gossip.comm] Send -> DEBU 2b8f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:54.636 UTC [msp] DeserializeIdentity -> DEBU 2b90 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.637 UTC [gossip.comm] Send -> DEBU 2b91 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b92 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b93 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b94 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b95 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b96 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b97 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.977 UTC [gossip.gossip] handleMessage -> DEBU 2b98 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.977 UTC [gossip.gossip] handleMessage -> DEBU 2b99 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.977 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b9a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.977 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b9b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:54.977 UTC [msp] DeserializeIdentity -> DEBU 2b9c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.977 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b9d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:54.977 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b9e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:54.977 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b9f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2ba0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2ba1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2ba2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [cauthdsl] func1 -> DEBU 2ba3 0xc004b3e5d0 gate 1569284754978125200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2ba4 0xc004b3e5d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2ba5 0xc004b3e5d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2ba6 0xc004b3e5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2ba7 0xc004b3e5d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [cauthdsl] func1 -> DEBU 2ba8 0xc004b3e5d0 gate 1569284754978125200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2ba9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2baa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2bab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [cauthdsl] func1 -> DEBU 2bac 0xc004b3ee10 gate 1569284754978631300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2bad 0xc004b3ee10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2bae 0xc004b3ee10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2baf 0xc004b3ee10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:54.979 UTC [msp.identity] Verify -> DEBU 2bb0 Verify: digest = 00000000 4c 66 7c b2 e3 58 6d b7 cc 87 3b 05 44 43 ab d6 |Lf|..Xm...;.DC..| +peer0.org1.example.com | 00000010 b3 4b 9b f0 e2 25 80 11 4a de 14 96 45 63 65 ec |.K...%..J...Ece.|" +peer0.org1.example.com | "2019-09-24 00:25:54.979 UTC [msp.identity] Verify -> DEBU 2bb1 Verify: sig = 00000000 30 45 02 21 00 bb f9 3d 3f 33 c0 75 13 80 62 0f |0E.!...=?3.u..b.| +peer0.org1.example.com | 00000010 b3 df 52 0b 4a 4c 7e 62 17 15 0d 50 34 e3 de ce |..R.JL~b...P4...| +peer0.org1.example.com | 00000020 d6 ff 7c 10 0e 02 20 05 49 3c 77 15 38 d2 b2 13 |..|... .I DEBU 2bb2 0xc004b3ee10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:54.979 UTC [cauthdsl] func1 -> DEBU 2bb3 0xc004b3ee10 gate 1569284754978631300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:54.979 UTC [policies] Evaluate -> DEBU 2bb4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:54.979 UTC [policies] Evaluate -> DEBU 2bb5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:54.979 UTC [policies] Evaluate -> DEBU 2bb6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:54.979 UTC [policies] Evaluate -> DEBU 2bb7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:54.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bb8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bb9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:54.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bba updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:54.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bbb Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:54.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bbc Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:54.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bbd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bbe Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bbf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.984 UTC [msp] DeserializeIdentity -> DEBU 2bc0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.987 UTC [gossip.comm] Send -> DEBU 2bc6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:54.987 UTC [gossip.comm] func1 -> DEBU 2bc7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.988 UTC [msp] DeserializeIdentity -> DEBU 2bc9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:54.988 UTC [gossip.comm] Send -> DEBU 2bca Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:54.988 UTC [gossip.gossip] handleMessage -> DEBU 2bcb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.988 UTC [gossip.comm] sendToEndpoint -> DEBU 2bcc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.988 UTC [gossip.comm] sendToEndpoint -> DEBU 2bcd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.988 UTC [gossip.comm] sendToEndpoint -> DEBU 2bce Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.988 UTC [gossip.gossip] handleMessage -> DEBU 2bcf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.988 UTC [gossip.comm] sendToEndpoint -> DEBU 2bd0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.989 UTC [gossip.comm] func1 -> DEBU 2bd1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.989 UTC [gossip.gossip] handleMessage -> DEBU 2bd2 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.988 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd4 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.992 UTC [gossip.gossip] handleMessage -> DEBU 2bd5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:54.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:54.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.691 UTC [gossip.comm] func1 -> DEBU 2bd8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.691 UTC [gossip.gossip] handleMessage -> DEBU 2bd9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.691 UTC [gossip.gossip] handleMessage -> DEBU 2bda Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bdb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.691 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bdc Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [msp] DeserializeIdentity -> DEBU 2bdd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bde Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bdf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2be1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2be2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2be3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [cauthdsl] func1 -> DEBU 2be4 0xc004b70300 gate 1569284755692446000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2be5 0xc004b70300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2be6 0xc004b70300 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2be7 0xc004b70300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2be8 0xc004b70300 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [cauthdsl] func1 -> DEBU 2be9 0xc004b70300 gate 1569284755692446000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2bea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2beb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2bec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [cauthdsl] func1 -> DEBU 2bed 0xc004b70b40 gate 1569284755692801500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2bee 0xc004b70b40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2bef 0xc004b70b40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2bf0 0xc004b70b40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:55.692 UTC [msp.identity] Verify -> DEBU 2bf1 Verify: digest = 00000000 43 7c b6 a0 d3 60 65 26 3f 41 83 51 0c ee 53 40 |C|...`e&?A.Q..S@| +peer0.org1.example.com | 00000010 4f 9c 45 65 a1 87 fd 98 74 29 51 7a ff 53 a2 80 |O.Ee....t)Qz.S..|" +peer0.org1.example.com | "2019-09-24 00:25:55.693 UTC [msp.identity] Verify -> DEBU 2bf2 Verify: sig = 00000000 30 44 02 20 03 6e 51 fe 03 be 73 23 10 3b 5f 5b |0D. .nQ...s#.;_[| +peer0.org1.example.com | 00000010 d4 e1 76 78 fb e4 79 62 26 54 7a 4a c5 5d a1 48 |..vx..yb&TzJ.].H| +peer0.org1.example.com | 00000020 d0 d4 7b ed 02 20 21 b1 4c 66 c5 5d 3e b2 1a 35 |..{.. !.Lf.]>..5| +peer0.org1.example.com | 00000030 ff 31 5f dc 00 2a 5f 6e 04 ab 38 6a 3f e5 2c b3 |.1_..*_n..8j?.,.| +peer0.org1.example.com | 00000040 bd 45 28 ea d4 eb |.E(...|" +peer0.org1.example.com | "2019-09-24 00:25:55.693 UTC [cauthdsl] func2 -> DEBU 2bf3 0xc004b70b40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:55.693 UTC [cauthdsl] func1 -> DEBU 2bf4 0xc004b70b40 gate 1569284755692801500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:55.693 UTC [policies] Evaluate -> DEBU 2bf5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.693 UTC [policies] Evaluate -> DEBU 2bf6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.693 UTC [policies] Evaluate -> DEBU 2bf7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.693 UTC [policies] Evaluate -> DEBU 2bf8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bf9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bfa Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:55.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bfb updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:55.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bfc Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:55.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bfd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:55.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c00 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.701 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c01 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c02 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.700 UTC [gossip.gossip] handleMessage -> DEBU 2bfe Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.702 UTC [gossip.gossip] handleMessage -> DEBU 2c03 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c04 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c05 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.701 UTC [gossip.comm] func1 -> DEBU 2bff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.702 UTC [gossip.gossip] handleMessage -> DEBU 2c06 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.702 UTC [gossip.gossip] handleMessage -> DEBU 2c07 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c08 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c09 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.708 UTC [msp] DeserializeIdentity -> DEBU 2c0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.708 UTC [gossip.pull] Hello -> DEBU 2c0a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c0d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [gossip.comm] Send -> DEBU 2c0e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c0f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [gossip.pull] Hello -> DEBU 2c10 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c11 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [gossip.comm] Send -> DEBU 2c12 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [gossip.pull] Hello -> DEBU 2c14 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c15 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [gossip.comm] Send -> DEBU 2c16 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [gossip.comm] Send -> DEBU 2c17 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c18 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2c19 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2c1a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [gossip.comm] Send -> DEBU 2c1b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:55.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2c1c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c1d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c1e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c1f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c20 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c21 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c23 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.730 UTC [gossip.comm] func1 -> DEBU 2c25 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.730 UTC [gossip.gossip] handleMessage -> DEBU 2c24 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.730 UTC [gossip.pull] HandleMessage -> DEBU 2c26 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.730 UTC [gossip.gossip] handleMessage -> DEBU 2c27 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.731 UTC [gossip.gossip] handleMessage -> DEBU 2c28 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.731 UTC [gossip.comm] func1 -> DEBU 2c29 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.731 UTC [gossip.pull] HandleMessage -> DEBU 2c2a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.731 UTC [gossip.gossip] handleMessage -> DEBU 2c2b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.731 UTC [gossip.gossip] handleMessage -> DEBU 2c2c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.731 UTC [gossip.pull] HandleMessage -> DEBU 2c2d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.731 UTC [gossip.gossip] handleMessage -> DEBU 2c2e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.733 UTC [msp] GetDefaultSigningIdentity -> DEBU 2c2f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:55.733 UTC [msp.identity] Sign -> DEBU 2c30 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102C " +peer0.org1.example.com | "2019-09-24 00:25:55.733 UTC [msp.identity] Sign -> DEBU 2c31 Sign: digest: BDFBFAE08EA37776862CA67B6B459E61C39B88A92B6E50A609CC5BE06DC555FD " +peer0.org1.example.com | "2019-09-24 00:25:55.733 UTC [msp] GetDefaultSigningIdentity -> DEBU 2c32 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:55.733 UTC [msp.identity] Sign -> DEBU 2c33 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:55.733 UTC [msp.identity] Sign -> DEBU 2c34 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:55.734 UTC [gossip.comm] Send -> DEBU 2c35 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:55.734 UTC [msp] DeserializeIdentity -> DEBU 2c36 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.734 UTC [gossip.comm] Send -> DEBU 2c37 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:55.734 UTC [msp] DeserializeIdentity -> DEBU 2c38 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.740 UTC [gossip.comm] Send -> DEBU 2c39 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:55.741 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.741 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.742 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.742 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.742 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.743 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.791 UTC [gossip.comm] func1 -> DEBU 2c40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.791 UTC [gossip.gossip] handleMessage -> DEBU 2c41 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.791 UTC [gossip.gossip] handleMessage -> DEBU 2c42 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.791 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.792 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c44 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:55.794 UTC [msp.identity] Verify -> DEBU 2c45 Verify: digest = 00000000 bd fb fa e0 8e a3 77 76 86 2c a6 7b 6b 45 9e 61 |......wv.,.{kE.a| +peer0.org1.example.com | 00000010 c3 9b 88 a9 2b 6e 50 a6 09 cc 5b e0 6d c5 55 fd |....+nP...[.m.U.|" +peer0.org1.example.com | "2019-09-24 00:25:55.794 UTC [msp.identity] Verify -> DEBU 2c46 Verify: sig = 00000000 30 44 02 20 2b ac 5c 4f 51 30 bb e4 c1 36 84 92 |0D. +.\OQ0...6..| +peer0.org1.example.com | 00000010 52 02 a2 de 79 a5 9c b3 89 a9 b6 a9 d1 de 2e 0d |R...y...........| +peer0.org1.example.com | 00000020 9e b7 20 d3 02 20 74 9e 82 bb 68 e7 2b 2f 92 3a |.. .. t...h.+/.:| +peer0.org1.example.com | 00000030 08 9e 99 c2 9d cc e4 ec 5f 88 85 23 a7 de 1f 4c |........_..#...L| +peer0.org1.example.com | 00000040 33 85 b2 fb d4 f3 |3.....|" +peer0.org1.example.com | "2019-09-24 00:25:55.908 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c47 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.909 UTC [gossip.discovery] isSentByMe -> DEBU 2c48 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c49 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.909 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c4a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:55.909 UTC [msp.identity] Verify -> DEBU 2c4b Verify: digest = 00000000 a4 e8 45 ea 9d 15 f3 98 5f 79 53 f6 bd 2c 40 42 |..E....._yS..,@B| +peer0.org1.example.com | 00000010 30 db b2 f7 32 0f 9d 37 cc 4d e2 71 5b bc b8 9b |0...2..7.M.q[...|" +peer0.org1.example.com | "2019-09-24 00:25:55.909 UTC [msp.identity] Verify -> DEBU 2c4c Verify: sig = 00000000 30 45 02 21 00 87 94 bd 94 ef f5 e3 3d 5c 66 59 |0E.!........=\fY| +peer0.org1.example.com | 00000010 98 c1 e0 4e 9f 3a 5e f9 bb 67 0a e6 a2 e8 95 58 |...N.:^..g.....X| +peer0.org1.example.com | 00000020 e8 76 55 b9 da 02 20 7c 4e 66 0d e3 80 40 11 7b |.vU... |Nf...@.{| +peer0.org1.example.com | 00000030 ed 80 9c 65 6d 6d af 54 87 b9 6d a3 ce 33 75 df |...emm.T..m..3u.| +peer0.org1.example.com | 00000040 fa 72 a1 08 42 42 05 |.r..BB.|" +peer0.org1.example.com | "2019-09-24 00:25:55.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c4d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c4e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.909 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c4f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.916 UTC [gossip.gossip] handleMessage -> DEBU 2c50 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.918 UTC [gossip.gossip] handleMessage -> DEBU 2c51 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.918 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c53 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:55.918 UTC [msp.identity] Verify -> DEBU 2c54 Verify: digest = 00000000 bd fb fa e0 8e a3 77 76 86 2c a6 7b 6b 45 9e 61 |......wv.,.{kE.a| +peer0.org1.example.com | 00000010 c3 9b 88 a9 2b 6e 50 a6 09 cc 5b e0 6d c5 55 fd |....+nP...[.m.U.|" +peer0.org1.example.com | "2019-09-24 00:25:55.918 UTC [msp.identity] Verify -> DEBU 2c55 Verify: sig = 00000000 30 44 02 20 2b ac 5c 4f 51 30 bb e4 c1 36 84 92 |0D. +.\OQ0...6..| +peer0.org1.example.com | 00000010 52 02 a2 de 79 a5 9c b3 89 a9 b6 a9 d1 de 2e 0d |R...y...........| +peer0.org1.example.com | 00000020 9e b7 20 d3 02 20 74 9e 82 bb 68 e7 2b 2f 92 3a |.. .. t...h.+/.:| +peer0.org1.example.com | 00000030 08 9e 99 c2 9d cc e4 ec 5f 88 85 23 a7 de 1f 4c |........_..#...L| +peer0.org1.example.com | 00000040 33 85 b2 fb d4 f3 |3.....|" +peer0.org1.example.com | "2019-09-24 00:25:55.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c56 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.919 UTC [gossip.discovery] isSentByMe -> DEBU 2c57 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c58 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.919 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c59 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:55.919 UTC [msp.identity] Verify -> DEBU 2c5a Verify: digest = 00000000 a4 e8 45 ea 9d 15 f3 98 5f 79 53 f6 bd 2c 40 42 |..E....._yS..,@B| +peer0.org1.example.com | 00000010 30 db b2 f7 32 0f 9d 37 cc 4d e2 71 5b bc b8 9b |0...2..7.M.q[...|" +peer0.org1.example.com | "2019-09-24 00:25:55.919 UTC [msp.identity] Verify -> DEBU 2c5b Verify: sig = 00000000 30 45 02 21 00 87 94 bd 94 ef f5 e3 3d 5c 66 59 |0E.!........=\fY| +peer0.org1.example.com | 00000010 98 c1 e0 4e 9f 3a 5e f9 bb 67 0a e6 a2 e8 95 58 |...N.:^..g.....X| +peer0.org1.example.com | 00000020 e8 76 55 b9 da 02 20 7c 4e 66 0d e3 80 40 11 7b |.vU... |Nf...@.{| +peer0.org1.example.com | 00000030 ed 80 9c 65 6d 6d af 54 87 b9 6d a3 ce 33 75 df |...emm.T..m..3u.| +peer0.org1.example.com | 00000040 fa 72 a1 08 42 42 05 |.r..BB.|" +peer0.org1.example.com | "2019-09-24 00:25:55.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c5c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c5d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c5e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.924 UTC [gossip.comm] func1 -> DEBU 2c5f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.924 UTC [gossip.gossip] handleMessage -> DEBU 2c60 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.924 UTC [gossip.gossip] handleMessage -> DEBU 2c61 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c63 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:55.924 UTC [msp.identity] Verify -> DEBU 2c64 Verify: digest = 00000000 bd fb fa e0 8e a3 77 76 86 2c a6 7b 6b 45 9e 61 |......wv.,.{kE.a| +peer0.org1.example.com | 00000010 c3 9b 88 a9 2b 6e 50 a6 09 cc 5b e0 6d c5 55 fd |....+nP...[.m.U.|" +peer0.org1.example.com | "2019-09-24 00:25:55.924 UTC [msp.identity] Verify -> DEBU 2c65 Verify: sig = 00000000 30 44 02 20 2b ac 5c 4f 51 30 bb e4 c1 36 84 92 |0D. +.\OQ0...6..| +peer0.org1.example.com | 00000010 52 02 a2 de 79 a5 9c b3 89 a9 b6 a9 d1 de 2e 0d |R...y...........| +peer0.org1.example.com | 00000020 9e b7 20 d3 02 20 74 9e 82 bb 68 e7 2b 2f 92 3a |.. .. t...h.+/.:| +peer0.org1.example.com | 00000030 08 9e 99 c2 9d cc e4 ec 5f 88 85 23 a7 de 1f 4c |........_..#...L| +peer0.org1.example.com | 00000040 33 85 b2 fb d4 f3 |3.....|" +peer0.org1.example.com | "2019-09-24 00:25:55.925 UTC [msp.identity] Verify -> DEBU 2c66 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:55.925 UTC [msp.identity] Verify -> DEBU 2c67 Verify: sig = 00000000 30 45 02 21 00 95 f9 84 94 57 88 c9 c4 dd e5 84 |0E.!.....W......| +peer0.org1.example.com | 00000010 a9 84 97 ce e1 43 aa df a4 c0 ea d8 91 57 5a 31 |.....C.......WZ1| +peer0.org1.example.com | 00000020 70 29 a5 dd aa 02 20 35 7d 66 06 ca b1 b0 92 2f |p).... 5}f...../| +peer0.org1.example.com | 00000030 36 c5 4a 8a 06 fa 7a 6b 85 13 18 e1 12 a1 2e d9 |6.J...zk........| +peer0.org1.example.com | 00000040 45 13 0a 3a 6a b9 f6 |E..:j..|" +peer0.org1.example.com | "2019-09-24 00:25:55.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c68 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.929 UTC [gossip.discovery] isSentByMe -> DEBU 2c69 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c6a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c6b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.950 UTC [gossip.gossip] handleMessage -> DEBU 2c6c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.950 UTC [gossip.pull] HandleMessage -> DEBU 2c6d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c6e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c6f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c70 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c71 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c72 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c73 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.950 UTC [gossip.pull] SendDigest -> DEBU 2c74 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:55.950 UTC [gossip.gossip] handleMessage -> DEBU 2c75 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.972 UTC [gossip.gossip] handleMessage -> DEBU 2c76 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.972 UTC [gossip.gossip] handleMessage -> DEBU 2c77 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c78 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.972 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c79 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:55.972 UTC [msp] DeserializeIdentity -> DEBU 2c7a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c7b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c7c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c7d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [cauthdsl] func1 -> DEBU 2c81 0xc004c06c10 gate 1569284755973386600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [cauthdsl] func2 -> DEBU 2c82 0xc004c06c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [cauthdsl] func2 -> DEBU 2c83 0xc004c06c10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [cauthdsl] func2 -> DEBU 2c84 0xc004c06c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [cauthdsl] func2 -> DEBU 2c85 0xc004c06c10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [cauthdsl] func1 -> DEBU 2c86 0xc004c06c10 gate 1569284755973386600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c87 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [cauthdsl] func1 -> DEBU 2c8a 0xc004c07450 gate 1569284755973822900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:55.973 UTC [cauthdsl] func2 -> DEBU 2c8b 0xc004c07450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:55.974 UTC [cauthdsl] func2 -> DEBU 2c8c 0xc004c07450 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:55.974 UTC [cauthdsl] func2 -> DEBU 2c8d 0xc004c07450 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:55.974 UTC [msp.identity] Verify -> DEBU 2c8e Verify: digest = 00000000 85 ea 17 dd 77 a1 ca e3 45 dc 76 20 67 f1 4b 72 |....w...E.v g.Kr| +peer0.org1.example.com | 00000010 b2 31 3e 97 63 e8 e6 e4 51 0b 8d 47 e5 48 be 28 |.1>.c...Q..G.H.(|" +peer0.org1.example.com | "2019-09-24 00:25:55.974 UTC [msp.identity] Verify -> DEBU 2c8f Verify: sig = 00000000 30 44 02 20 08 2e 17 82 08 54 b1 09 9d 5c 85 d8 |0D. .....T...\..| +peer0.org1.example.com | 00000010 50 b9 5f fb 2c fb 38 9e f4 56 7c b4 b0 5c 16 a5 |P._.,.8..V|..\..| +peer0.org1.example.com | 00000020 48 ea 2d 51 02 20 69 2f 2b 3f 41 b5 dd 4e 19 4c |H.-Q. i/+?A..N.L| +peer0.org1.example.com | 00000030 f9 47 c1 6c 48 63 57 86 fa 84 83 4f b7 21 9a fd |.G.lHcW....O.!..| +peer0.org1.example.com | 00000040 27 6c cb 90 79 3c |'l..y<|" +peer0.org1.example.com | "2019-09-24 00:25:55.980 UTC [cauthdsl] func2 -> DEBU 2c90 0xc004c07450 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:55.980 UTC [cauthdsl] func1 -> DEBU 2c91 0xc004c07450 gate 1569284755973822900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:55.980 UTC [policies] Evaluate -> DEBU 2c92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.980 UTC [policies] Evaluate -> DEBU 2c93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.980 UTC [policies] Evaluate -> DEBU 2c94 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.980 UTC [policies] Evaluate -> DEBU 2c95 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:55.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c96 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c97 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c98 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c99 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c9a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c9b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c9c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c9d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [gossip.discovery] sendMemResponse -> DEBU 2c9e Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [msp] DeserializeIdentity -> DEBU 2c9f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [msp] DeserializeIdentity -> DEBU 2ca0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [msp] DeserializeIdentity -> DEBU 2ca1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [gossip.comm] Send -> DEBU 2ca2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:55.981 UTC [gossip.discovery] sendMemResponse -> DEBU 2ca3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" > alive:\262\0325\3771_\334\000*_n\004\2538j?\345,\263\275E(\352\324\353" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:55.986 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:55.986 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.151 UTC [msp] DeserializeIdentity -> DEBU 2ca6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.152 UTC [msp] DeserializeIdentity -> DEBU 2ca7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.152 UTC [gossip.comm] Send -> DEBU 2ca8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:25:56.152 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.152 UTC [gossip.comm] sendToEndpoint -> DEBU 2caa Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.153 UTC [gossip.comm] sendToEndpoint -> DEBU 2cab Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.154 UTC [gossip.comm] sendToEndpoint -> DEBU 2cac Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.159 UTC [gossip.comm] func1 -> DEBU 2cad Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.160 UTC [gossip.gossip] handleMessage -> DEBU 2cae Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.161 UTC [msp] DeserializeIdentity -> DEBU 2caf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.163 UTC [msp] DeserializeIdentity -> DEBU 2cb0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.163 UTC [msp] DeserializeIdentity -> DEBU 2cb1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.164 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cb2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:56.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cb3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cb4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.164 UTC [policies] Evaluate -> DEBU 2cb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.164 UTC [policies] Evaluate -> DEBU 2cb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:56.164 UTC [policies] Evaluate -> DEBU 2cb7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.164 UTC [cauthdsl] func1 -> DEBU 2cb8 0xc004c38580 gate 1569284756164323200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.164 UTC [cauthdsl] func2 -> DEBU 2cb9 0xc004c38580 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.164 UTC [cauthdsl] func2 -> DEBU 2cba 0xc004c38580 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.164 UTC [cauthdsl] func2 -> DEBU 2cbb 0xc004c38580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:56.169 UTC [cauthdsl] func2 -> DEBU 2cbc 0xc004c38580 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.169 UTC [cauthdsl] func1 -> DEBU 2cbd 0xc004c38580 gate 1569284756164323200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.169 UTC [policies] Evaluate -> DEBU 2cbe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.169 UTC [policies] Evaluate -> DEBU 2cbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [policies] Evaluate -> DEBU 2cc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [cauthdsl] func1 -> DEBU 2cc1 0xc004c38dc0 gate 1569284756170298700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [cauthdsl] func2 -> DEBU 2cc2 0xc004c38dc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [cauthdsl] func2 -> DEBU 2cc3 0xc004c38dc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [cauthdsl] func2 -> DEBU 2cc4 0xc004c38dc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [msp.identity] Verify -> DEBU 2cc5 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [msp.identity] Verify -> DEBU 2cc6 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [cauthdsl] func2 -> DEBU 2cc7 0xc004c38dc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [cauthdsl] func1 -> DEBU 2cc8 0xc004c38dc0 gate 1569284756170298700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [policies] Evaluate -> DEBU 2cc9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [policies] Evaluate -> DEBU 2cca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [policies] Evaluate -> DEBU 2ccb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.170 UTC [policies] Evaluate -> DEBU 2ccc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.171 UTC [msp.identity] Verify -> DEBU 2ccd Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:56.171 UTC [msp.identity] Verify -> DEBU 2cce Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:56.172 UTC [msp] DeserializeIdentity -> DEBU 2ccf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.172 UTC [msp] DeserializeIdentity -> DEBU 2cd0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.172 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cd1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:56.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.179 UTC [policies] Evaluate -> DEBU 2cd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.179 UTC [policies] Evaluate -> DEBU 2cd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:56.179 UTC [policies] Evaluate -> DEBU 2cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.179 UTC [cauthdsl] func1 -> DEBU 2cd9 0xc004c48cb0 gate 1569284756179736100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.179 UTC [cauthdsl] func2 -> DEBU 2cda 0xc004c48cb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.179 UTC [cauthdsl] func2 -> DEBU 2cdb 0xc004c48cb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2cdc 0xc004c48cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2cdd 0xc004c48cb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [cauthdsl] func1 -> DEBU 2cde 0xc004c48cb0 gate 1569284756179736100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2cdf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2ce0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2ce1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [cauthdsl] func1 -> DEBU 2ce2 0xc004c494f0 gate 1569284756180354000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2ce3 0xc004c494f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2ce4 0xc004c494f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2ce5 0xc004c494f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [msp.identity] Verify -> DEBU 2ce6 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [msp.identity] Verify -> DEBU 2ce7 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2ce8 0xc004c494f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [cauthdsl] func1 -> DEBU 2ce9 0xc004c494f0 gate 1569284756180354000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2cea Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2ceb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2cec Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2ced == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.181 UTC [msp.identity] Verify -> DEBU 2cee Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:56.181 UTC [msp.identity] Verify -> DEBU 2cef Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:56.181 UTC [gossip.gossip] handleMessage -> DEBU 2cf0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.173 UTC [gossip.comm] sendToEndpoint -> DEBU 2cd2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.181 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.173 UTC [gossip.comm] func1 -> DEBU 2cd3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.181 UTC [gossip.gossip] handleMessage -> DEBU 2cf2 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.181 UTC [msp.identity] Verify -> DEBU 2cf3 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:56.181 UTC [msp.identity] Verify -> DEBU 2cf4 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [msp.identity] Verify -> DEBU 2cf5 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [msp.identity] Verify -> DEBU 2cf6 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [msp] DeserializeIdentity -> DEBU 2cf7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [msp] DeserializeIdentity -> DEBU 2cf8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cf9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cfa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cfb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [policies] Evaluate -> DEBU 2cfc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [policies] Evaluate -> DEBU 2cfd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [policies] Evaluate -> DEBU 2cfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [cauthdsl] func1 -> DEBU 2cff 0xc004c7c5a0 gate 1569284756182772200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.182 UTC [cauthdsl] func2 -> DEBU 2d00 0xc004c7c5a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.183 UTC [cauthdsl] func2 -> DEBU 2d01 0xc004c7c5a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.183 UTC [cauthdsl] func2 -> DEBU 2d02 0xc004c7c5a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:56.183 UTC [cauthdsl] func2 -> DEBU 2d03 0xc004c7c5a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.183 UTC [cauthdsl] func1 -> DEBU 2d04 0xc004c7c5a0 gate 1569284756182772200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.183 UTC [policies] Evaluate -> DEBU 2d05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.183 UTC [policies] Evaluate -> DEBU 2d06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.183 UTC [policies] Evaluate -> DEBU 2d07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.183 UTC [cauthdsl] func1 -> DEBU 2d08 0xc004c7cde0 gate 1569284756183809200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.184 UTC [cauthdsl] func2 -> DEBU 2d09 0xc004c7cde0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.184 UTC [cauthdsl] func2 -> DEBU 2d0a 0xc004c7cde0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.184 UTC [cauthdsl] func2 -> DEBU 2d0b 0xc004c7cde0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.201 UTC [msp.identity] Verify -> DEBU 2d0c Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:56.202 UTC [msp.identity] Verify -> DEBU 2d0d Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:56.202 UTC [cauthdsl] func2 -> DEBU 2d0e 0xc004c7cde0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.202 UTC [cauthdsl] func1 -> DEBU 2d0f 0xc004c7cde0 gate 1569284756183809200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:56.205 UTC [policies] Evaluate -> DEBU 2d10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.207 UTC [policies] Evaluate -> DEBU 2d11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.207 UTC [policies] Evaluate -> DEBU 2d12 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.207 UTC [policies] Evaluate -> DEBU 2d13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.212 UTC [msp] DeserializeIdentity -> DEBU 2d14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.215 UTC [msp] DeserializeIdentity -> DEBU 2d15 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:56.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d17 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d18 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.251 UTC [policies] Evaluate -> DEBU 2d19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.251 UTC [policies] Evaluate -> DEBU 2d1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:56.251 UTC [policies] Evaluate -> DEBU 2d1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.251 UTC [cauthdsl] func1 -> DEBU 2d1c 0xc004c905e0 gate 1569284756251338800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.251 UTC [cauthdsl] func2 -> DEBU 2d1d 0xc004c905e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.251 UTC [cauthdsl] func2 -> DEBU 2d1e 0xc004c905e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.251 UTC [cauthdsl] func2 -> DEBU 2d1f 0xc004c905e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:56.251 UTC [cauthdsl] func2 -> DEBU 2d20 0xc004c905e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.252 UTC [cauthdsl] func1 -> DEBU 2d21 0xc004c905e0 gate 1569284756251338800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.252 UTC [policies] Evaluate -> DEBU 2d22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.252 UTC [policies] Evaluate -> DEBU 2d23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.252 UTC [policies] Evaluate -> DEBU 2d24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.252 UTC [cauthdsl] func1 -> DEBU 2d25 0xc004c90e20 gate 1569284756252400100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.255 UTC [cauthdsl] func2 -> DEBU 2d26 0xc004c90e20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.256 UTC [cauthdsl] func2 -> DEBU 2d27 0xc004c90e20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.256 UTC [cauthdsl] func2 -> DEBU 2d28 0xc004c90e20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.256 UTC [msp.identity] Verify -> DEBU 2d29 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:56.256 UTC [msp.identity] Verify -> DEBU 2d2a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:56.256 UTC [cauthdsl] func2 -> DEBU 2d2b 0xc004c90e20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.258 UTC [cauthdsl] func1 -> DEBU 2d2c 0xc004c90e20 gate 1569284756252400100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:56.258 UTC [policies] Evaluate -> DEBU 2d2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.258 UTC [policies] Evaluate -> DEBU 2d2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.258 UTC [policies] Evaluate -> DEBU 2d2f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.258 UTC [policies] Evaluate -> DEBU 2d30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.258 UTC [gossip.gossip] handleMessage -> DEBU 2d31 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.258 UTC [gossip.gossip] handleMessage -> DEBU 2d32 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.258 UTC [msp] DeserializeIdentity -> DEBU 2d33 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.259 UTC [msp] DeserializeIdentity -> DEBU 2d34 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.259 UTC [msp] DeserializeIdentity -> DEBU 2d35 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d36 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d37 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d38 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [policies] Evaluate -> DEBU 2d39 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [policies] Evaluate -> DEBU 2d3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [policies] Evaluate -> DEBU 2d3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [cauthdsl] func1 -> DEBU 2d3c 0xc004ca4930 gate 1569284756260546600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [cauthdsl] func2 -> DEBU 2d3d 0xc004ca4930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [cauthdsl] func2 -> DEBU 2d3e 0xc004ca4930 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [cauthdsl] func2 -> DEBU 2d3f 0xc004ca4930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [cauthdsl] func2 -> DEBU 2d40 0xc004ca4930 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.260 UTC [cauthdsl] func1 -> DEBU 2d41 0xc004ca4930 gate 1569284756260546600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.261 UTC [policies] Evaluate -> DEBU 2d42 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.261 UTC [policies] Evaluate -> DEBU 2d43 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.261 UTC [policies] Evaluate -> DEBU 2d44 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.261 UTC [cauthdsl] func1 -> DEBU 2d45 0xc004ca5170 gate 1569284756261322100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.261 UTC [cauthdsl] func2 -> DEBU 2d46 0xc004ca5170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.261 UTC [cauthdsl] func2 -> DEBU 2d47 0xc004ca5170 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.261 UTC [cauthdsl] func2 -> DEBU 2d48 0xc004ca5170 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.261 UTC [msp.identity] Verify -> DEBU 2d49 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:25:56.261 UTC [msp.identity] Verify -> DEBU 2d4a Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:25:56.261 UTC [cauthdsl] func2 -> DEBU 2d4b 0xc004ca5170 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.261 UTC [cauthdsl] func1 -> DEBU 2d4c 0xc004ca5170 gate 1569284756261322100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:56.262 UTC [policies] Evaluate -> DEBU 2d4d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.262 UTC [policies] Evaluate -> DEBU 2d4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.262 UTC [policies] Evaluate -> DEBU 2d4f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.262 UTC [policies] Evaluate -> DEBU 2d50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.262 UTC [msp.identity] Verify -> DEBU 2d51 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:25:56.262 UTC [msp.identity] Verify -> DEBU 2d52 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:25:56.262 UTC [msp.identity] Verify -> DEBU 2d53 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:25:56.262 UTC [msp.identity] Verify -> DEBU 2d54 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:25:56.264 UTC [gossip.privdata] run -> DEBU 2d55 Start reconcile missing private info" +peer0.org1.example.com | "2019-09-24 00:25:56.264 UTC [leveldbhelper] GetIterator -> DEBU 2d56 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +peer0.org1.example.com | "2019-09-24 00:25:56.264 UTC [gossip.privdata] reconcile -> DEBU 2d57 Reconciliation cycle finished successfully. no items to reconcile" +peer0.org1.example.com | "2019-09-24 00:25:56.263 UTC [msp] DeserializeIdentity -> DEBU 2d58 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.268 UTC [msp] DeserializeIdentity -> DEBU 2d59 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.268 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d5a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:56.268 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d5b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.268 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d5c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.268 UTC [policies] Evaluate -> DEBU 2d5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.268 UTC [policies] Evaluate -> DEBU 2d5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:56.268 UTC [policies] Evaluate -> DEBU 2d5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.268 UTC [cauthdsl] func1 -> DEBU 2d60 0xc004cbf780 gate 1569284756268911900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.268 UTC [cauthdsl] func2 -> DEBU 2d61 0xc004cbf780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d62 0xc004cbf780 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d63 0xc004cbf780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d64 0xc004cbf780 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [cauthdsl] func1 -> DEBU 2d65 0xc004cbf780 gate 1569284756268911900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d66 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [cauthdsl] func1 -> DEBU 2d69 0xc004cbffc0 gate 1569284756269247300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d6a 0xc004cbffc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d6b 0xc004cbffc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d6c 0xc004cbffc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [msp.identity] Verify -> DEBU 2d6d Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [msp.identity] Verify -> DEBU 2d6e Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d6f 0xc004cbffc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [cauthdsl] func1 -> DEBU 2d70 0xc004cbffc0 gate 1569284756269247300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d71 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d72 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d73 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d74 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.270 UTC [gossip.gossip] handleMessage -> DEBU 2d75 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.297 UTC [msp] DeserializeIdentity -> DEBU 2d76 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.298 UTC [msp] DeserializeIdentity -> DEBU 2d77 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.298 UTC [gossip.pull] Hello -> DEBU 2d78 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:56.299 UTC [msp] DeserializeIdentity -> DEBU 2d79 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.299 UTC [msp] DeserializeIdentity -> DEBU 2d7a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.299 UTC [gossip.comm] Send -> DEBU 2d7b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:56.300 UTC [gossip.comm] sendToEndpoint -> DEBU 2d7c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.300 UTC [gossip.comm] sendToEndpoint -> DEBU 2d7d Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.315 UTC [gossip.comm] func1 -> DEBU 2d7e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.315 UTC [gossip.gossip] handleMessage -> DEBU 2d7f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.316 UTC [gossip.pull] HandleMessage -> DEBU 2d80 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.316 UTC [gossip.gossip] handleMessage -> DEBU 2d81 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.653 UTC [gossip.comm] func1 -> DEBU 2d82 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.654 UTC [gossip.gossip] handleMessage -> DEBU 2d83 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.654 UTC [msp] DeserializeIdentity -> DEBU 2d84 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.654 UTC [msp] DeserializeIdentity -> DEBU 2d85 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.654 UTC [gossip.gossip] handleMessage -> DEBU 2d86 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.696 UTC [gossip.comm] func1 -> DEBU 2d87 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [gossip.gossip] handleMessage -> DEBU 2d88 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [gossip.gossip] handleMessage -> DEBU 2d89 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d8a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d8b Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [msp] DeserializeIdentity -> DEBU 2d8c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d8d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d8e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d8f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [policies] Evaluate -> DEBU 2d90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [policies] Evaluate -> DEBU 2d91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [policies] Evaluate -> DEBU 2d92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [cauthdsl] func1 -> DEBU 2d93 0xc004cf7020 gate 1569284756697790900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [cauthdsl] func2 -> DEBU 2d94 0xc004cf7020 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [cauthdsl] func2 -> DEBU 2d95 0xc004cf7020 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.697 UTC [cauthdsl] func2 -> DEBU 2d96 0xc004cf7020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [cauthdsl] func2 -> DEBU 2d97 0xc004cf7020 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [cauthdsl] func1 -> DEBU 2d98 0xc004cf7020 gate 1569284756697790900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [policies] Evaluate -> DEBU 2d99 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [policies] Evaluate -> DEBU 2d9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [policies] Evaluate -> DEBU 2d9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [cauthdsl] func1 -> DEBU 2d9c 0xc004cf7860 gate 1569284756698309700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [cauthdsl] func2 -> DEBU 2d9d 0xc004cf7860 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [cauthdsl] func2 -> DEBU 2d9e 0xc004cf7860 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [cauthdsl] func2 -> DEBU 2d9f 0xc004cf7860 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [msp.identity] Verify -> DEBU 2da0 Verify: digest = 00000000 f0 3c 4b 80 f4 27 51 e3 4a 76 d1 55 5a 13 83 ee |. DEBU 2da1 Verify: sig = 00000000 30 44 02 20 07 20 62 0f 6f b3 71 fe a9 1f db 29 |0D. . b.o.q....)| +peer0.org1.example.com | 00000010 c8 24 69 df df 58 3a 1f 51 51 bd cb be 64 c4 e2 |.$i..X:.QQ...d..| +peer0.org1.example.com | 00000020 97 f7 bb 26 02 20 2c 39 21 ba 32 83 f4 30 fd 69 |...&. ,9!.2..0.i| +peer0.org1.example.com | 00000030 a5 a2 c7 cb e1 60 84 f4 a5 2c 09 de 17 fe 0b 0d |.....`...,......| +peer0.org1.example.com | 00000040 33 c0 48 95 0a bf |3.H...|" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [cauthdsl] func2 -> DEBU 2da2 0xc004cf7860 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:56.698 UTC [cauthdsl] func1 -> DEBU 2da3 0xc004cf7860 gate 1569284756698309700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:56.699 UTC [policies] Evaluate -> DEBU 2da4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.699 UTC [policies] Evaluate -> DEBU 2da5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.699 UTC [policies] Evaluate -> DEBU 2da6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.699 UTC [policies] Evaluate -> DEBU 2da7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:56.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 2da8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.699 UTC [gossip.discovery] learnExistingMembers -> DEBU 2da9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:56.699 UTC [gossip.discovery] learnExistingMembers -> DEBU 2daa updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:56.708 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dab Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:56.708 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dac Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:56.708 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dad Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.708 UTC [gossip.discovery] handleAliveMessage -> DEBU 2dae Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.709 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2daf Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.709 UTC [gossip.discovery] sendMemResponse -> DEBU 2db0 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:25:56.709 UTC [msp] DeserializeIdentity -> DEBU 2db1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.709 UTC [msp] DeserializeIdentity -> DEBU 2db2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.709 UTC [msp] DeserializeIdentity -> DEBU 2db3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.709 UTC [gossip.comm] Send -> DEBU 2db4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:56.709 UTC [gossip.discovery] sendMemResponse -> DEBU 2db5 Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" > alive: " +peer0.org1.example.com | "2019-09-24 00:25:56.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2db6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2db7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.746 UTC [gossip.comm] func1 -> DEBU 2db8 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.746 UTC [gossip.gossip] handleMessage -> DEBU 2db9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.747 UTC [gossip.pull] HandleMessage -> DEBU 2dba GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.747 UTC [msp] DeserializeIdentity -> DEBU 2dbb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.747 UTC [msp] DeserializeIdentity -> DEBU 2dbc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.747 UTC [msp] DeserializeIdentity -> DEBU 2dbd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.747 UTC [msp] DeserializeIdentity -> DEBU 2dbe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.747 UTC [msp] DeserializeIdentity -> DEBU 2dbf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.748 UTC [msp] DeserializeIdentity -> DEBU 2dc0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:56.748 UTC [gossip.pull] SendDigest -> DEBU 2dc1 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:25:56.748 UTC [gossip.gossip] handleMessage -> DEBU 2dc2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:56.836 UTC [gossip.comm] func1 -> DEBU 2dc3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.846 UTC [gossip.gossip] handleMessage -> DEBU 2dc4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.847 UTC [gossip.pull] HandleMessage -> DEBU 2dc5 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:56.847 UTC [gossip.pull] SendDigest -> DEBU 2dc6 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:56.847 UTC [gossip.gossip] handleMessage -> DEBU 2dc7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.145 UTC [gossip.gossip] handleMessage -> DEBU 2dc8 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.145 UTC [msp] DeserializeIdentity -> DEBU 2dc9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.145 UTC [msp] DeserializeIdentity -> DEBU 2dca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.145 UTC [msp] DeserializeIdentity -> DEBU 2dcb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.145 UTC [gossip.gossip] handleMessage -> DEBU 2dcc Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.325 UTC [gossip.election] waitForInterrupt -> DEBU 2dcd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.326 UTC [gossip.election] IsLeader -> DEBU 2dce c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:25:57.327 UTC [msp] GetDefaultSigningIdentity -> DEBU 2dcf Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:57.327 UTC [msp.identity] Sign -> DEBU 2dd0 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315100D1801 " +peer0.org1.example.com | "2019-09-24 00:25:57.327 UTC [msp.identity] Sign -> DEBU 2dd1 Sign: digest: 5D492FD2443058A7B6CF9EB35404A285B558EE3F77B318AB9C4BE883E455B9CD " +peer0.org1.example.com | "2019-09-24 00:25:57.328 UTC [gossip.election] waitForInterrupt -> DEBU 2dd2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:25:57.346 UTC [msp] DeserializeIdentity -> DEBU 2dd3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.346 UTC [msp] DeserializeIdentity -> DEBU 2dd4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.347 UTC [msp] DeserializeIdentity -> DEBU 2dd5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.347 UTC [msp] DeserializeIdentity -> DEBU 2dd6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.347 UTC [gossip.comm] Send -> DEBU 2dd7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:57.347 UTC [msp] DeserializeIdentity -> DEBU 2dd8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.347 UTC [msp] DeserializeIdentity -> DEBU 2dd9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.348 UTC [gossip.comm] sendToEndpoint -> DEBU 2dda Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.348 UTC [gossip.comm] sendToEndpoint -> DEBU 2ddb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.680 UTC [gossip.comm] func1 -> DEBU 2ddc Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.681 UTC [gossip.gossip] handleMessage -> DEBU 2ddd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.681 UTC [gossip.gossip] handleMessage -> DEBU 2dde Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.681 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ddf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.681 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2de0 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:57.681 UTC [msp.identity] Verify -> DEBU 2de1 Verify: digest = 00000000 db 9d 98 68 08 05 b3 ab 30 8a 4c 3c 3e b5 90 8b |...h....0.L<>...| +peer0.org1.example.com | 00000010 34 4d 48 8f b3 06 81 47 a1 e7 ad 62 0a bc b5 f6 |4MH....G...b....|" +peer0.org1.example.com | "2019-09-24 00:25:57.681 UTC [msp.identity] Verify -> DEBU 2de2 Verify: sig = 00000000 30 44 02 20 2a 7e 04 b0 d4 e8 62 82 70 8b 6f 75 |0D. *~....b.p.ou| +peer0.org1.example.com | 00000010 4c 06 79 58 0b 05 b0 67 c6 91 29 12 9a 28 d3 fe |L.yX...g..)..(..| +peer0.org1.example.com | 00000020 c4 14 23 de 02 20 0a 72 8b 6b 46 48 16 26 97 75 |..#.. .r.kFH.&.u| +peer0.org1.example.com | 00000030 cd 75 95 fd 4b fe 90 55 b1 6f 88 c0 5b 1a 96 4d |.u..K..U.o..[..M| +peer0.org1.example.com | 00000040 b4 71 4c d2 26 c7 |.qL.&.|" +peer0.org1.example.com | "2019-09-24 00:25:57.681 UTC [gossip.discovery] handleAliveMessage -> DEBU 2de3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.681 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:57.681 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:57.681 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:57.682 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:57.682 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.682 UTC [gossip.discovery] handleAliveMessage -> DEBU 2de9 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.682 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2dea Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.682 UTC [gossip.comm] func1 -> DEBU 2deb Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.682 UTC [gossip.gossip] handleMessage -> DEBU 2dec Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.682 UTC [gossip.pull] HandleMessage -> DEBU 2ded GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.682 UTC [gossip.pull] SendDigest -> DEBU 2dee Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:25:57.682 UTC [gossip.gossip] handleMessage -> DEBU 2def Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.696 UTC [msp] DeserializeIdentity -> DEBU 2df0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.696 UTC [msp] DeserializeIdentity -> DEBU 2df1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.696 UTC [gossip.gossip] handleMessage -> DEBU 2df2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.696 UTC [gossip.gossip] handleMessage -> DEBU 2df3 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.696 UTC [msp] DeserializeIdentity -> DEBU 2df4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.696 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2df5 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.696 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2df6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.696 UTC [gossip.comm] Send -> DEBU 2df7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:57.696 UTC [msp] DeserializeIdentity -> DEBU 2df8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.696 UTC [gossip.comm] Send -> DEBU 2df9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:57.696 UTC [gossip.comm] sendToEndpoint -> DEBU 2dfa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.697 UTC [gossip.comm] sendToEndpoint -> DEBU 2dfb Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.697 UTC [gossip.comm] sendToEndpoint -> DEBU 2dfc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.697 UTC [gossip.comm] sendToEndpoint -> DEBU 2dfd Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.715 UTC [gossip.comm] func1 -> DEBU 2dfe Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.715 UTC [gossip.gossip] handleMessage -> DEBU 2dff Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.715 UTC [gossip.gossip] handleMessage -> DEBU 2e00 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e01 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e02 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.752 UTC [gossip.comm] func1 -> DEBU 2e03 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.752 UTC [gossip.gossip] handleMessage -> DEBU 2e04 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.752 UTC [gossip.gossip] handleMessage -> DEBU 2e05 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e06 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.752 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e07 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:57.752 UTC [msp.identity] Verify -> DEBU 2e08 Verify: digest = 00000000 46 4b a1 80 cb 54 af d2 11 34 2e fd 0f 4b 32 d2 |FK...T...4...K2.| +peer0.org1.example.com | 00000010 eb 5a 35 af a8 d5 37 7f 42 aa 39 a7 f3 e3 18 aa |.Z5...7.B.9.....|" +peer0.org1.example.com | "2019-09-24 00:25:57.753 UTC [msp.identity] Verify -> DEBU 2e09 Verify: sig = 00000000 30 44 02 20 13 55 13 f2 31 f6 11 79 69 94 91 23 |0D. .U..1..yi..#| +peer0.org1.example.com | 00000010 a9 81 5d e6 32 23 5b f9 70 1d 00 04 12 1e 29 53 |..].2#[.p.....)S| +peer0.org1.example.com | 00000020 b2 8b 91 53 02 20 52 c9 7c 65 af 44 ca 76 71 28 |...S. R.|e.D.vq(| +peer0.org1.example.com | 00000030 43 c0 1b 78 6b 1a aa 3f ef 8f 4e e5 38 e8 fc 4c |C..xk..?..N.8..L| +peer0.org1.example.com | 00000040 03 7f 20 16 68 e0 |.. .h.|" +peer0.org1.example.com | "2019-09-24 00:25:57.753 UTC [msp.identity] Verify -> DEBU 2e0a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:25:57.753 UTC [msp.identity] Verify -> DEBU 2e0b Verify: sig = 00000000 30 44 02 20 40 63 5b bf 57 57 c4 df 23 35 98 dd |0D. @c[.WW..#5..| +peer0.org1.example.com | 00000010 45 14 7b 75 7e 90 55 0c e8 54 b8 27 f7 b5 e7 b6 |E.{u~.U..T.'....| +peer0.org1.example.com | 00000020 c8 43 83 f0 02 20 15 5e 59 b7 2d 9a a1 d8 b8 7a |.C... .^Y.-....z| +peer0.org1.example.com | 00000030 a7 f7 3d 40 2b 33 ce 00 47 d2 5f 86 f1 00 0c a5 |..=@+3..G._.....| +peer0.org1.example.com | 00000040 b6 c8 7c df 4b 5d |..|.K]|" +peer0.org1.example.com | "2019-09-24 00:25:57.754 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e0c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e0d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:57.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e0e updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:57.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e0f Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:57.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e10 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:57.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e11 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e12 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.761 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e13 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:57.761 UTC [gossip.discovery] sendMemResponse -> DEBU 2e14 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:25:57.762 UTC [msp] DeserializeIdentity -> DEBU 2e15 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.762 UTC [msp] DeserializeIdentity -> DEBU 2e16 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:57.762 UTC [gossip.comm] Send -> DEBU 2e17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:57.762 UTC [gossip.discovery] sendMemResponse -> DEBU 2e19 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:25:57.762 UTC [gossip.comm] sendToEndpoint -> DEBU 2e18 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:57.763 UTC [gossip.comm] sendToEndpoint -> DEBU 2e1a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:58.081 UTC [gossip.comm] func1 -> DEBU 2e1b Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:58.081 UTC [gossip.gossip] handleMessage -> DEBU 2e1c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:58.081 UTC [msp] DeserializeIdentity -> DEBU 2e1d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:58.081 UTC [msp] DeserializeIdentity -> DEBU 2e1e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:58.082 UTC [msp] DeserializeIdentity -> DEBU 2e1f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:58.082 UTC [gossip.gossip] handleMessage -> DEBU 2e20 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.618 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e21 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:59.619 UTC [msp.identity] Sign -> DEBU 2e22 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102D " +peer0.org1.example.com | "2019-09-24 00:25:59.619 UTC [msp.identity] Sign -> DEBU 2e23 Sign: digest: 37E67C8B1B66F11719C237F89F88A1ACB7FF399359BFD50BBB407816680A712B " +peer0.org1.example.com | "2019-09-24 00:25:59.619 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e24 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:59.619 UTC [msp.identity] Sign -> DEBU 2e25 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:59.619 UTC [msp.identity] Sign -> DEBU 2e26 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:59.619 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2e27 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:25:59.625 UTC [msp] DeserializeIdentity -> DEBU 2e28 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.625 UTC [msp] DeserializeIdentity -> DEBU 2e29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.626 UTC [msp] DeserializeIdentity -> DEBU 2e2a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.626 UTC [gossip.comm] Send -> DEBU 2e2b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:59.626 UTC [gossip.comm] Send -> DEBU 2e2c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:59.627 UTC [msp] DeserializeIdentity -> DEBU 2e2d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.627 UTC [gossip.comm] Send -> DEBU 2e2e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:59.627 UTC [gossip.comm] sendToEndpoint -> DEBU 2e2f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.627 UTC [gossip.comm] sendToEndpoint -> DEBU 2e30 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.627 UTC [gossip.comm] sendToEndpoint -> DEBU 2e31 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.627 UTC [gossip.comm] sendToEndpoint -> DEBU 2e32 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.628 UTC [gossip.comm] sendToEndpoint -> DEBU 2e33 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.629 UTC [gossip.comm] sendToEndpoint -> DEBU 2e34 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.709 UTC [gossip.pull] Hello -> DEBU 2e35 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:59.710 UTC [gossip.comm] Send -> DEBU 2e36 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:59.710 UTC [gossip.pull] Hello -> DEBU 2e37 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:59.710 UTC [gossip.comm] Send -> DEBU 2e38 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:59.710 UTC [gossip.pull] Hello -> DEBU 2e39 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:25:59.710 UTC [gossip.comm] Send -> DEBU 2e3a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:59.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.711 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.711 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.711 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3e Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.711 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.711 UTC [gossip.comm] sendToEndpoint -> DEBU 2e40 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.716 UTC [gossip.gossip] handleMessage -> DEBU 2e41 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.717 UTC [gossip.pull] HandleMessage -> DEBU 2e42 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.717 UTC [gossip.gossip] handleMessage -> DEBU 2e43 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.717 UTC [gossip.comm] func1 -> DEBU 2e44 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.717 UTC [gossip.gossip] handleMessage -> DEBU 2e45 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.717 UTC [gossip.pull] HandleMessage -> DEBU 2e46 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.717 UTC [gossip.gossip] handleMessage -> DEBU 2e47 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.724 UTC [gossip.comm] func1 -> DEBU 2e48 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.724 UTC [gossip.gossip] handleMessage -> DEBU 2e49 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.724 UTC [gossip.pull] HandleMessage -> DEBU 2e4a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.724 UTC [gossip.gossip] handleMessage -> DEBU 2e4b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.754 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e4c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:59.754 UTC [msp.identity] Sign -> DEBU 2e4d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102E " +peer0.org1.example.com | "2019-09-24 00:25:59.754 UTC [msp.identity] Sign -> DEBU 2e4e Sign: digest: 67878D56978A5C483BDE9E0DB761F10D5B0A420BEF74FF25A2C095912C090C69 " +peer0.org1.example.com | "2019-09-24 00:25:59.754 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e4f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:25:59.755 UTC [msp.identity] Sign -> DEBU 2e50 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:25:59.755 UTC [msp.identity] Sign -> DEBU 2e51 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:25:59.755 UTC [gossip.comm] Send -> DEBU 2e52 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:59.755 UTC [msp] DeserializeIdentity -> DEBU 2e53 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.755 UTC [gossip.comm] Send -> DEBU 2e54 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:59.755 UTC [msp] DeserializeIdentity -> DEBU 2e55 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.755 UTC [gossip.comm] Send -> DEBU 2e56 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:59.755 UTC [gossip.comm] sendToEndpoint -> DEBU 2e57 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.755 UTC [gossip.comm] sendToEndpoint -> DEBU 2e58 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.756 UTC [gossip.comm] sendToEndpoint -> DEBU 2e59 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.756 UTC [gossip.comm] sendToEndpoint -> DEBU 2e5a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.756 UTC [gossip.comm] sendToEndpoint -> DEBU 2e5b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.756 UTC [gossip.comm] sendToEndpoint -> DEBU 2e5c Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.767 UTC [gossip.comm] func1 -> DEBU 2e5d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.767 UTC [gossip.gossip] handleMessage -> DEBU 2e5e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.767 UTC [gossip.gossip] handleMessage -> DEBU 2e5f Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e60 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.767 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e61 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:59.767 UTC [msp.identity] Verify -> DEBU 2e62 Verify: digest = 00000000 67 87 8d 56 97 8a 5c 48 3b de 9e 0d b7 61 f1 0d |g..V..\H;....a..| +peer0.org1.example.com | 00000010 5b 0a 42 0b ef 74 ff 25 a2 c0 95 91 2c 09 0c 69 |[.B..t.%....,..i|" +peer0.org1.example.com | "2019-09-24 00:25:59.768 UTC [msp.identity] Verify -> DEBU 2e63 Verify: sig = 00000000 30 44 02 20 27 5b 49 f4 a1 e1 28 7f c0 94 c5 d5 |0D. '[I...(.....| +peer0.org1.example.com | 00000010 99 8b 02 85 33 21 53 8f a2 4f ef f3 9f 6f f2 53 |....3!S..O...o.S| +peer0.org1.example.com | 00000020 8f 96 de 2c 02 20 1a 69 d6 dd f3 39 9a b5 47 fe |...,. .i...9..G.| +peer0.org1.example.com | 00000030 61 ee 3c 11 64 ce 6d 17 d8 22 b1 cf 14 27 f6 00 |a.<.d.m.."...'..| +peer0.org1.example.com | 00000040 f2 25 0c df 7e f8 |.%..~.|" +peer0.org1.example.com | "2019-09-24 00:25:59.768 UTC [msp.identity] Verify -> DEBU 2e64 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:25:59.768 UTC [msp.identity] Verify -> DEBU 2e65 Verify: sig = 00000000 30 45 02 21 00 ff f7 9f cb 30 8b ad 2e 4d f2 d9 |0E.!.....0...M..| +peer0.org1.example.com | 00000010 90 52 f8 1b f0 7e 41 46 4a a7 09 2a 8e b1 0d 5d |.R...~AFJ..*...]| +peer0.org1.example.com | 00000020 73 bb d8 75 0e 02 20 38 ef 2b 38 38 11 42 e6 74 |s..u.. 8.+88.B.t| +peer0.org1.example.com | 00000030 35 00 98 19 f3 e8 64 2c 65 2f 31 3c 03 ca 14 f5 |5.....d,e/1<....| +peer0.org1.example.com | 00000040 a2 cf a4 47 7e 83 17 |...G~..|" +peer0.org1.example.com | "2019-09-24 00:25:59.768 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e66 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.768 UTC [gossip.discovery] isSentByMe -> DEBU 2e67 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.768 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e68 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.768 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e69 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.768 UTC [gossip.gossip] handleMessage -> DEBU 2e6a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.768 UTC [gossip.gossip] handleMessage -> DEBU 2e6b Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.768 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e6c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.768 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e6d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [msp.identity] Verify -> DEBU 2e6e Verify: digest = 00000000 67 87 8d 56 97 8a 5c 48 3b de 9e 0d b7 61 f1 0d |g..V..\H;....a..| +peer0.org1.example.com | 00000010 5b 0a 42 0b ef 74 ff 25 a2 c0 95 91 2c 09 0c 69 |[.B..t.%....,..i|" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [msp.identity] Verify -> DEBU 2e6f Verify: sig = 00000000 30 44 02 20 27 5b 49 f4 a1 e1 28 7f c0 94 c5 d5 |0D. '[I...(.....| +peer0.org1.example.com | 00000010 99 8b 02 85 33 21 53 8f a2 4f ef f3 9f 6f f2 53 |....3!S..O...o.S| +peer0.org1.example.com | 00000020 8f 96 de 2c 02 20 1a 69 d6 dd f3 39 9a b5 47 fe |...,. .i...9..G.| +peer0.org1.example.com | 00000030 61 ee 3c 11 64 ce 6d 17 d8 22 b1 cf 14 27 f6 00 |a.<.d.m.."...'..| +peer0.org1.example.com | 00000040 f2 25 0c df 7e f8 |.%..~.|" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e70 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [gossip.discovery] isSentByMe -> DEBU 2e71 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e72 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e73 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [msp] DeserializeIdentity -> DEBU 2e74 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e76 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e77 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [policies] Evaluate -> DEBU 2e78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [policies] Evaluate -> DEBU 2e79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [policies] Evaluate -> DEBU 2e7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [cauthdsl] func1 -> DEBU 2e7b 0xc004ddd720 gate 1569284759769864500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [cauthdsl] func2 -> DEBU 2e7c 0xc004ddd720 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:59.769 UTC [cauthdsl] func2 -> DEBU 2e7d 0xc004ddd720 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e7e 0xc004ddd720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e7f 0xc004ddd720 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [cauthdsl] func1 -> DEBU 2e80 0xc004ddd720 gate 1569284759769864500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e81 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [cauthdsl] func1 -> DEBU 2e84 0xc004dddf60 gate 1569284759770249600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e85 0xc004dddf60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e86 0xc004dddf60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e87 0xc004dddf60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [msp.identity] Verify -> DEBU 2e88 Verify: digest = 00000000 f0 3c 4b 80 f4 27 51 e3 4a 76 d1 55 5a 13 83 ee |. DEBU 2e89 Verify: sig = 00000000 30 44 02 20 07 20 62 0f 6f b3 71 fe a9 1f db 29 |0D. . b.o.q....)| +peer0.org1.example.com | 00000010 c8 24 69 df df 58 3a 1f 51 51 bd cb be 64 c4 e2 |.$i..X:.QQ...d..| +peer0.org1.example.com | 00000020 97 f7 bb 26 02 20 2c 39 21 ba 32 83 f4 30 fd 69 |...&. ,9!.2..0.i| +peer0.org1.example.com | 00000030 a5 a2 c7 cb e1 60 84 f4 a5 2c 09 de 17 fe 0b 0d |.....`...,......| +peer0.org1.example.com | 00000040 33 c0 48 95 0a bf |3.H...|" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e8a 0xc004dddf60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [cauthdsl] func1 -> DEBU 2e8b 0xc004dddf60 gate 1569284759770249600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e8e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e90 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e91 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e92 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [msp.identity] Verify -> DEBU 2e93 Verify: digest = 00000000 46 4b a1 80 cb 54 af d2 11 34 2e fd 0f 4b 32 d2 |FK...T...4...K2.| +peer0.org1.example.com | 00000010 eb 5a 35 af a8 d5 37 7f 42 aa 39 a7 f3 e3 18 aa |.Z5...7.B.9.....|" +peer0.org1.example.com | "2019-09-24 00:25:59.770 UTC [msp.identity] Verify -> DEBU 2e94 Verify: sig = 00000000 30 44 02 20 13 55 13 f2 31 f6 11 79 69 94 91 23 |0D. .U..1..yi..#| +peer0.org1.example.com | 00000010 a9 81 5d e6 32 23 5b f9 70 1d 00 04 12 1e 29 53 |..].2#[.p.....)S| +peer0.org1.example.com | 00000020 b2 8b 91 53 02 20 52 c9 7c 65 af 44 ca 76 71 28 |...S. R.|e.D.vq(| +peer0.org1.example.com | 00000030 43 c0 1b 78 6b 1a aa 3f ef 8f 4e e5 38 e8 fc 4c |C..xk..?..N.8..L| +peer0.org1.example.com | 00000040 03 7f 20 16 68 e0 |.. .h.|" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e95 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e96 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e97 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.comm] func1 -> DEBU 2e98 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.gossip] handleMessage -> DEBU 2e99 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.gossip] handleMessage -> DEBU 2e9a Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e9b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e9c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [msp.identity] Verify -> DEBU 2e9d Verify: digest = 00000000 67 87 8d 56 97 8a 5c 48 3b de 9e 0d b7 61 f1 0d |g..V..\H;....a..| +peer0.org1.example.com | 00000010 5b 0a 42 0b ef 74 ff 25 a2 c0 95 91 2c 09 0c 69 |[.B..t.%....,..i|" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [msp.identity] Verify -> DEBU 2e9e Verify: sig = 00000000 30 44 02 20 27 5b 49 f4 a1 e1 28 7f c0 94 c5 d5 |0D. '[I...(.....| +peer0.org1.example.com | 00000010 99 8b 02 85 33 21 53 8f a2 4f ef f3 9f 6f f2 53 |....3!S..O...o.S| +peer0.org1.example.com | 00000020 8f 96 de 2c 02 20 1a 69 d6 dd f3 39 9a b5 47 fe |...,. .i...9..G.| +peer0.org1.example.com | 00000030 61 ee 3c 11 64 ce 6d 17 d8 22 b1 cf 14 27 f6 00 |a.<.d.m.."...'..| +peer0.org1.example.com | 00000040 f2 25 0c df 7e f8 |.%..~.|" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e9f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.discovery] isSentByMe -> DEBU 2ea0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ea1 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ea2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [msp] DeserializeIdentity -> DEBU 2ea3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ea4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ea5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ea6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2ea7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2ea8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2ea9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func1 -> DEBU 2eaa 0xc004e09390 gate 1569284759772163300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eab 0xc004e09390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eac 0xc004e09390 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2ead 0xc004e09390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eae 0xc004e09390 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func1 -> DEBU 2eaf 0xc004e09390 gate 1569284759772163300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2eb0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2eb1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2eb2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func1 -> DEBU 2eb3 0xc004e09bd0 gate 1569284759772585600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eb4 0xc004e09bd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eb5 0xc004e09bd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eb6 0xc004e09bd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [msp.identity] Verify -> DEBU 2eb7 Verify: digest = 00000000 85 ea 17 dd 77 a1 ca e3 45 dc 76 20 67 f1 4b 72 |....w...E.v g.Kr| +peer0.org1.example.com | 00000010 b2 31 3e 97 63 e8 e6 e4 51 0b 8d 47 e5 48 be 28 |.1>.c...Q..G.H.(|" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [msp.identity] Verify -> DEBU 2eb8 Verify: sig = 00000000 30 44 02 20 08 2e 17 82 08 54 b1 09 9d 5c 85 d8 |0D. .....T...\..| +peer0.org1.example.com | 00000010 50 b9 5f fb 2c fb 38 9e f4 56 7c b4 b0 5c 16 a5 |P._.,.8..V|..\..| +peer0.org1.example.com | 00000020 48 ea 2d 51 02 20 69 2f 2b 3f 41 b5 dd 4e 19 4c |H.-Q. i/+?A..N.L| +peer0.org1.example.com | 00000030 f9 47 c1 6c 48 63 57 86 fa 84 83 4f b7 21 9a fd |.G.lHcW....O.!..| +peer0.org1.example.com | 00000040 27 6c cb 90 79 3c |'l..y<|" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eb9 0xc004e09bd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:59.772 UTC [cauthdsl] func1 -> DEBU 2eba 0xc004e09bd0 gate 1569284759772585600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [policies] Evaluate -> DEBU 2ebb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [policies] Evaluate -> DEBU 2ebc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [policies] Evaluate -> DEBU 2ebd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [policies] Evaluate -> DEBU 2ebe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ebf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ec0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ec1 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [msp.identity] Verify -> DEBU 2ec2 Verify: digest = 00000000 46 4b a1 80 cb 54 af d2 11 34 2e fd 0f 4b 32 d2 |FK...T...4...K2.| +peer0.org1.example.com | 00000010 eb 5a 35 af a8 d5 37 7f 42 aa 39 a7 f3 e3 18 aa |.Z5...7.B.9.....|" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [msp.identity] Verify -> DEBU 2ec3 Verify: sig = 00000000 30 44 02 20 13 55 13 f2 31 f6 11 79 69 94 91 23 |0D. .U..1..yi..#| +peer0.org1.example.com | 00000010 a9 81 5d e6 32 23 5b f9 70 1d 00 04 12 1e 29 53 |..].2#[.p.....)S| +peer0.org1.example.com | 00000020 b2 8b 91 53 02 20 52 c9 7c 65 af 44 ca 76 71 28 |...S. R.|e.D.vq(| +peer0.org1.example.com | 00000030 43 c0 1b 78 6b 1a aa 3f ef 8f 4e e5 38 e8 fc 4c |C..xk..?..N.8..L| +peer0.org1.example.com | 00000040 03 7f 20 16 68 e0 |.. .h.|" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ec4 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ec5 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.773 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ec6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.950 UTC [gossip.gossip] handleMessage -> DEBU 2ec7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.950 UTC [gossip.pull] HandleMessage -> DEBU 2ec8 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2ec9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2eca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2ecb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2ecc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2ecd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2ece Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.951 UTC [gossip.pull] SendDigest -> DEBU 2ecf Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:25:59.951 UTC [gossip.gossip] handleMessage -> DEBU 2ed0 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [gossip.gossip] handleMessage -> DEBU 2ed1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\020\362D\355\242\352\r\223\355\223\300\346\223\252\345\234\036\2031\007\002 j\36172(\200\242\324\221*k\"\022\3203\020\2510!]\316\234\272\234\323wj\203\202\276<\275" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [gossip.gossip] handleMessage -> DEBU 2ed2 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ed3 Got message: GossipMessage: tag:EMPTY mem_req:\020\362D\355\242\352\r\223\355\223\300\346\223\252\345\234\036\2031\007\002 j\36172(\200\242\324\221*k\"\022\3203\020\2510!]\316\234\272\234\323wj\203\202\276<\275" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ed4 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [msp] DeserializeIdentity -> DEBU 2ed5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ed6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ed7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ed8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [policies] Evaluate -> DEBU 2ed9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [policies] Evaluate -> DEBU 2eda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [policies] Evaluate -> DEBU 2edb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [cauthdsl] func1 -> DEBU 2edc 0xc004e3a390 gate 1569284759975873100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [cauthdsl] func2 -> DEBU 2edd 0xc004e3a390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:59.975 UTC [cauthdsl] func2 -> DEBU 2ede 0xc004e3a390 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2edf 0xc004e3a390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2ee0 0xc004e3a390 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [cauthdsl] func1 -> DEBU 2ee1 0xc004e3a390 gate 1569284759975873100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2ee2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2ee3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2ee4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [cauthdsl] func1 -> DEBU 2ee5 0xc004e3abd0 gate 1569284759976274100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2ee6 0xc004e3abd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2ee7 0xc004e3abd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2ee8 0xc004e3abd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [msp.identity] Verify -> DEBU 2ee9 Verify: digest = 00000000 cd 81 d3 27 c2 e2 ff 95 34 6b fc 0c c7 52 e4 c0 |...'....4k...R..| +peer0.org1.example.com | 00000010 f2 6b 64 cd df 4b db 3d 88 35 8c 67 51 ab e0 1c |.kd..K.=.5.gQ...|" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [msp.identity] Verify -> DEBU 2eea Verify: sig = 00000000 30 44 02 20 34 95 97 6c 8a d5 67 43 bc f4 d3 3e |0D. 4..l..gC...>| +peer0.org1.example.com | 00000010 10 f2 44 ed a2 ea 0d 93 ed 93 c0 e6 93 aa e5 9c |..D.............| +peer0.org1.example.com | 00000020 1e 83 31 07 02 20 6a f1 37 32 28 80 a2 d4 91 2a |..1.. j.72(....*| +peer0.org1.example.com | 00000030 6b 22 12 d0 33 10 a9 30 21 5d ce 9c ba 9c d3 77 |k"..3..0!].....w| +peer0.org1.example.com | 00000040 6a 83 82 be 3c bd |j...<.|" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2eeb 0xc004e3abd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [cauthdsl] func1 -> DEBU 2eec 0xc004e3abd0 gate 1569284759976274100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2eed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2eee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2eef Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2ef0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ef1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ef2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ef3 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ef4 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ef5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ef6 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ef7 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ef8 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [gossip.discovery] sendMemResponse -> DEBU 2ef9 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [msp] DeserializeIdentity -> DEBU 2efa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [msp] DeserializeIdentity -> DEBU 2efb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [msp] DeserializeIdentity -> DEBU 2efc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [gossip.comm] Send -> DEBU 2efd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:25:59.981 UTC [gossip.discovery] sendMemResponse -> DEBU 2efe Exiting, replying with alive:\020\362D\355\242\352\r\223\355\223\300\346\223\252\345\234\036\2031\007\002 j\36172(\200\242\324\221*k\"\022\3203\020\2510!]\316\234\272\234\323wj\203\202\276<\275" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:25:59.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2eff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2f00 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.986 UTC [gossip.gossip] handleMessage -> DEBU 2f01 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.986 UTC [gossip.gossip] handleMessage -> DEBU 2f02 Exiting" +peer0.org1.example.com | "2019-09-24 00:25:59.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f03 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.986 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f04 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:25:59.986 UTC [msp] DeserializeIdentity -> DEBU 2f05 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f07 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f08 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [cauthdsl] func1 -> DEBU 2f0c 0xc004dadd00 gate 1569284759987288000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f0d 0xc004dadd00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f0e 0xc004dadd00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f0f 0xc004dadd00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f10 0xc004dadd00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [cauthdsl] func1 -> DEBU 2f11 0xc004dadd00 gate 1569284759987288000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f12 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [cauthdsl] func1 -> DEBU 2f15 0xc004e6e540 gate 1569284759987664200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f16 0xc004e6e540 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f17 0xc004e6e540 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:25:59.993 UTC [cauthdsl] func2 -> DEBU 2f18 0xc004e6e540 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:25:59.993 UTC [msp.identity] Verify -> DEBU 2f19 Verify: digest = 00000000 0e 31 1f 42 69 46 42 22 c3 4e 61 36 d5 09 c4 7f |.1.BiFB".Na6....| +peer0.org1.example.com | 00000010 81 dd 2f cb 91 d9 63 5c 0b 29 fe 00 d1 d4 a0 95 |../...c\.)......|" +peer0.org1.example.com | "2019-09-24 00:25:59.993 UTC [msp.identity] Verify -> DEBU 2f1a Verify: sig = 00000000 30 45 02 21 00 bd ee 35 f4 a4 e4 23 04 28 2e f3 |0E.!...5...#.(..| +peer0.org1.example.com | 00000010 1f 3c 09 b5 14 98 d3 c2 55 1e c3 27 af 05 82 9b |.<......U..'....| +peer0.org1.example.com | 00000020 4e 82 80 7c 8e 02 20 4f b3 a7 a2 e6 f9 fb d3 d8 |N..|.. O........| +peer0.org1.example.com | 00000030 2f 9e d5 da 41 85 c8 04 e6 83 bf 8c a7 f7 55 94 |/...A.........U.| +peer0.org1.example.com | 00000040 30 3a ed b9 38 78 05 |0:..8x.|" +peer0.org1.example.com | "2019-09-24 00:25:59.993 UTC [cauthdsl] func2 -> DEBU 2f1b 0xc004e6e540 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:25:59.993 UTC [cauthdsl] func1 -> DEBU 2f1c 0xc004e6e540 gate 1569284759987664200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:25:59.993 UTC [policies] Evaluate -> DEBU 2f1d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.993 UTC [policies] Evaluate -> DEBU 2f1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.993 UTC [policies] Evaluate -> DEBU 2f1f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.993 UTC [policies] Evaluate -> DEBU 2f20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:25:59.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f21 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:25:59.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f22 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:25:59.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f23 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:59.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f24 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:25:59.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f25 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:00.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f26 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.001 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f27 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f28 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.003 UTC [msp] DeserializeIdentity -> DEBU 2f29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.003 UTC [msp] DeserializeIdentity -> DEBU 2f2a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.003 UTC [msp] DeserializeIdentity -> DEBU 2f2b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.003 UTC [msp] DeserializeIdentity -> DEBU 2f2c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.003 UTC [msp] DeserializeIdentity -> DEBU 2f2d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.004 UTC [msp] DeserializeIdentity -> DEBU 2f2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.004 UTC [gossip.comm] Send -> DEBU 2f2f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:00.004 UTC [msp] DeserializeIdentity -> DEBU 2f30 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.004 UTC [msp] DeserializeIdentity -> DEBU 2f31 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.004 UTC [gossip.comm] Send -> DEBU 2f32 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:00.004 UTC [gossip.comm] sendToEndpoint -> DEBU 2f33 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.004 UTC [gossip.comm] sendToEndpoint -> DEBU 2f34 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.005 UTC [gossip.comm] sendToEndpoint -> DEBU 2f35 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.005 UTC [gossip.comm] sendToEndpoint -> DEBU 2f36 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.012 UTC [gossip.comm] func1 -> DEBU 2f37 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.014 UTC [gossip.comm] func1 -> DEBU 2f38 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.014 UTC [gossip.gossip] handleMessage -> DEBU 2f39 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.015 UTC [gossip.gossip] handleMessage -> DEBU 2f3a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.015 UTC [gossip.gossip] handleMessage -> DEBU 2f3b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f3c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f3d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f3e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f3f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.015 UTC [gossip.gossip] handleMessage -> DEBU 2f40 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.159 UTC [msp] DeserializeIdentity -> DEBU 2f41 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.160 UTC [msp] DeserializeIdentity -> DEBU 2f42 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.160 UTC [gossip.comm] Send -> DEBU 2f43 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f44 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f45 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f46 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f47 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f48 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f49 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.172 UTC [gossip.comm] func1 -> DEBU 2f4a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [gossip.gossip] handleMessage -> DEBU 2f4b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [msp] DeserializeIdentity -> DEBU 2f4c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [msp] DeserializeIdentity -> DEBU 2f4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [msp] DeserializeIdentity -> DEBU 2f4e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f4f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f50 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f51 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f52 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f53 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [cauthdsl] func1 -> DEBU 2f55 0xc003ffb1f0 gate 1569284760173528600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f56 0xc003ffb1f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f57 0xc003ffb1f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f58 0xc003ffb1f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f59 0xc003ffb1f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [cauthdsl] func1 -> DEBU 2f5a 0xc003ffb1f0 gate 1569284760173528600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f5b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [cauthdsl] func1 -> DEBU 2f5e 0xc003ffba30 gate 1569284760173785700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f5f 0xc003ffba30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f60 0xc003ffba30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f61 0xc003ffba30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [msp.identity] Verify -> DEBU 2f62 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:00.173 UTC [msp.identity] Verify -> DEBU 2f63 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [cauthdsl] func2 -> DEBU 2f64 0xc003ffba30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [cauthdsl] func1 -> DEBU 2f65 0xc003ffba30 gate 1569284760173785700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [policies] Evaluate -> DEBU 2f66 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [policies] Evaluate -> DEBU 2f67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [policies] Evaluate -> DEBU 2f68 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [policies] Evaluate -> DEBU 2f69 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [msp.identity] Verify -> DEBU 2f6a Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [msp.identity] Verify -> DEBU 2f6b Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [msp] DeserializeIdentity -> DEBU 2f6c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [msp] DeserializeIdentity -> DEBU 2f6d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f6f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f70 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.174 UTC [policies] Evaluate -> DEBU 2f71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.176 UTC [policies] Evaluate -> DEBU 2f72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:00.176 UTC [policies] Evaluate -> DEBU 2f73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.176 UTC [cauthdsl] func1 -> DEBU 2f74 0xc003f439d0 gate 1569284760176876400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.177 UTC [cauthdsl] func2 -> DEBU 2f75 0xc003f439d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.177 UTC [cauthdsl] func2 -> DEBU 2f76 0xc003f439d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.177 UTC [cauthdsl] func2 -> DEBU 2f77 0xc003f439d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:00.177 UTC [cauthdsl] func2 -> DEBU 2f78 0xc003f439d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.177 UTC [cauthdsl] func1 -> DEBU 2f79 0xc003f439d0 gate 1569284760176876400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.180 UTC [policies] Evaluate -> DEBU 2f7a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.180 UTC [policies] Evaluate -> DEBU 2f7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.180 UTC [policies] Evaluate -> DEBU 2f7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.181 UTC [cauthdsl] func1 -> DEBU 2f7d 0xc003f06300 gate 1569284760181130000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.181 UTC [cauthdsl] func2 -> DEBU 2f7e 0xc003f06300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.181 UTC [cauthdsl] func2 -> DEBU 2f7f 0xc003f06300 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.181 UTC [cauthdsl] func2 -> DEBU 2f80 0xc003f06300 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.181 UTC [msp.identity] Verify -> DEBU 2f81 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:00.182 UTC [msp.identity] Verify -> DEBU 2f82 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:00.182 UTC [cauthdsl] func2 -> DEBU 2f83 0xc003f06300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.183 UTC [cauthdsl] func1 -> DEBU 2f84 0xc003f06300 gate 1569284760181130000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:00.183 UTC [policies] Evaluate -> DEBU 2f85 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.183 UTC [policies] Evaluate -> DEBU 2f86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.183 UTC [policies] Evaluate -> DEBU 2f87 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.183 UTC [policies] Evaluate -> DEBU 2f88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.184 UTC [gossip.comm] func1 -> DEBU 2f89 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.186 UTC [msp.identity] Verify -> DEBU 2f8a Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:00.186 UTC [msp.identity] Verify -> DEBU 2f8b Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:00.186 UTC [gossip.gossip] handleMessage -> DEBU 2f8c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.186 UTC [gossip.gossip] handleMessage -> DEBU 2f8d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.186 UTC [msp] DeserializeIdentity -> DEBU 2f8e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.186 UTC [msp] DeserializeIdentity -> DEBU 2f8f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.186 UTC [msp] DeserializeIdentity -> DEBU 2f90 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f92 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f93 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [cauthdsl] func1 -> DEBU 2f97 0xc003ed4540 gate 1569284760187323300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2f98 0xc003ed4540 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2f99 0xc003ed4540 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2f9a 0xc003ed4540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2f9b 0xc003ed4540 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [cauthdsl] func1 -> DEBU 2f9c 0xc003ed4540 gate 1569284760187323300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f9d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [cauthdsl] func1 -> DEBU 2fa0 0xc003ed4d80 gate 1569284760187732800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2fa1 0xc003ed4d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2fa2 0xc003ed4d80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2fa3 0xc003ed4d80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [msp.identity] Verify -> DEBU 2fa4 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:00.187 UTC [msp.identity] Verify -> DEBU 2fa5 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:00.188 UTC [cauthdsl] func2 -> DEBU 2fa6 0xc003ed4d80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.188 UTC [cauthdsl] func1 -> DEBU 2fa7 0xc003ed4d80 gate 1569284760187732800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:00.188 UTC [policies] Evaluate -> DEBU 2fa8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.188 UTC [policies] Evaluate -> DEBU 2fa9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.188 UTC [policies] Evaluate -> DEBU 2faa Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.188 UTC [policies] Evaluate -> DEBU 2fab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.188 UTC [msp.identity] Verify -> DEBU 2fac Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:00.188 UTC [msp.identity] Verify -> DEBU 2fad Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [msp.identity] Verify -> DEBU 2fae Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [msp.identity] Verify -> DEBU 2faf Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [msp] DeserializeIdentity -> DEBU 2fb0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [msp] DeserializeIdentity -> DEBU 2fb1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fb2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fb3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fb4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [policies] Evaluate -> DEBU 2fb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [policies] Evaluate -> DEBU 2fb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [policies] Evaluate -> DEBU 2fb7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [cauthdsl] func1 -> DEBU 2fb8 0xc003e8d610 gate 1569284760189754300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.189 UTC [cauthdsl] func2 -> DEBU 2fb9 0xc003e8d610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.193 UTC [cauthdsl] func2 -> DEBU 2fba 0xc003e8d610 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.194 UTC [cauthdsl] func2 -> DEBU 2fbb 0xc003e8d610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:00.194 UTC [cauthdsl] func2 -> DEBU 2fbc 0xc003e8d610 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.194 UTC [cauthdsl] func1 -> DEBU 2fbd 0xc003e8d610 gate 1569284760189754300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.194 UTC [policies] Evaluate -> DEBU 2fbe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.195 UTC [policies] Evaluate -> DEBU 2fbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.195 UTC [policies] Evaluate -> DEBU 2fc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.195 UTC [cauthdsl] func1 -> DEBU 2fc1 0xc003e8de50 gate 1569284760195675200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.196 UTC [cauthdsl] func2 -> DEBU 2fc2 0xc003e8de50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.196 UTC [cauthdsl] func2 -> DEBU 2fc3 0xc003e8de50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.196 UTC [cauthdsl] func2 -> DEBU 2fc4 0xc003e8de50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.196 UTC [msp.identity] Verify -> DEBU 2fc5 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:00.196 UTC [msp.identity] Verify -> DEBU 2fc6 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:00.197 UTC [cauthdsl] func2 -> DEBU 2fc7 0xc003e8de50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.197 UTC [cauthdsl] func1 -> DEBU 2fc8 0xc003e8de50 gate 1569284760195675200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:00.197 UTC [policies] Evaluate -> DEBU 2fc9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.197 UTC [policies] Evaluate -> DEBU 2fca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.198 UTC [policies] Evaluate -> DEBU 2fcb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.198 UTC [policies] Evaluate -> DEBU 2fcc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.198 UTC [gossip.gossip] handleMessage -> DEBU 2fcd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.198 UTC [gossip.gossip] handleMessage -> DEBU 2fce Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.198 UTC [msp.identity] Verify -> DEBU 2fcf Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:00.198 UTC [msp.identity] Verify -> DEBU 2fd0 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:00.198 UTC [msp.identity] Verify -> DEBU 2fd1 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:00.198 UTC [msp.identity] Verify -> DEBU 2fd2 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [msp] DeserializeIdentity -> DEBU 2fd3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [msp] DeserializeIdentity -> DEBU 2fd4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fd5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fd6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fd7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fd8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fd9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fda == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func1 -> DEBU 2fdb 0xc003e407f0 gate 1569284760199315800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fdc 0xc003e407f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fdd 0xc003e407f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fde 0xc003e407f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fdf 0xc003e407f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func1 -> DEBU 2fe0 0xc003e407f0 gate 1569284760199315800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fe1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fe2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fe3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func1 -> DEBU 2fe4 0xc003e41030 gate 1569284760199564100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fe5 0xc003e41030 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fe6 0xc003e41030 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fe7 0xc003e41030 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [msp.identity] Verify -> DEBU 2fe8 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [msp.identity] Verify -> DEBU 2fe9 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fea 0xc003e41030 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [cauthdsl] func1 -> DEBU 2feb 0xc003e41030 gate 1569284760199564100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fee Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2fef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [msp] DeserializeIdentity -> DEBU 2ff0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [msp] DeserializeIdentity -> DEBU 2ff1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ff2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ff3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ff4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2ff5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2ff6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2ff7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func1 -> DEBU 2ff8 0xc003dacac0 gate 1569284760200363200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 2ff9 0xc003dacac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 2ffa 0xc003dacac0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 2ffb 0xc003dacac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 2ffc 0xc003dacac0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func1 -> DEBU 2ffd 0xc003dacac0 gate 1569284760200363200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2ffe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2fff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 3000 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func1 -> DEBU 3001 0xc003dad300 gate 1569284760200601200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 3002 0xc003dad300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 3003 0xc003dad300 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 3004 0xc003dad300 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [msp.identity] Verify -> DEBU 3005 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [msp.identity] Verify -> DEBU 3006 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 3007 0xc003dad300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [cauthdsl] func1 -> DEBU 3008 0xc003dad300 gate 1569284760200601200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 3009 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.201 UTC [policies] Evaluate -> DEBU 300a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.201 UTC [policies] Evaluate -> DEBU 300b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.201 UTC [policies] Evaluate -> DEBU 300c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.201 UTC [gossip.gossip] handleMessage -> DEBU 300d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.304 UTC [msp] DeserializeIdentity -> DEBU 300e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.305 UTC [msp] DeserializeIdentity -> DEBU 300f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.305 UTC [gossip.pull] Hello -> DEBU 3010 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:00.305 UTC [msp] DeserializeIdentity -> DEBU 3011 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.305 UTC [msp] DeserializeIdentity -> DEBU 3012 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.305 UTC [gossip.comm] Send -> DEBU 3013 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:00.306 UTC [gossip.comm] sendToEndpoint -> DEBU 3014 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.306 UTC [gossip.comm] sendToEndpoint -> DEBU 3015 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.317 UTC [gossip.comm] func1 -> DEBU 3016 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.317 UTC [gossip.gossip] handleMessage -> DEBU 3017 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.318 UTC [gossip.pull] HandleMessage -> DEBU 3018 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.318 UTC [gossip.gossip] handleMessage -> DEBU 3019 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.647 UTC [gossip.comm] func1 -> DEBU 301a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.647 UTC [gossip.gossip] handleMessage -> DEBU 301b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.647 UTC [msp] DeserializeIdentity -> DEBU 301c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.647 UTC [msp] DeserializeIdentity -> DEBU 301d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.647 UTC [gossip.gossip] handleMessage -> DEBU 301e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.703 UTC [gossip.comm] func1 -> DEBU 301f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.703 UTC [gossip.gossip] handleMessage -> DEBU 3020 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.703 UTC [gossip.gossip] handleMessage -> DEBU 3021 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3022 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.704 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3023 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:00.704 UTC [msp] DeserializeIdentity -> DEBU 3024 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.704 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3025 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:00.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3026 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3027 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.705 UTC [policies] Evaluate -> DEBU 3028 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.705 UTC [policies] Evaluate -> DEBU 3029 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:00.705 UTC [policies] Evaluate -> DEBU 302a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.705 UTC [cauthdsl] func1 -> DEBU 302b 0xc003d3a6f0 gate 1569284760705342100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.705 UTC [cauthdsl] func2 -> DEBU 302c 0xc003d3a6f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.705 UTC [cauthdsl] func2 -> DEBU 302d 0xc003d3a6f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.705 UTC [cauthdsl] func2 -> DEBU 302e 0xc003d3a6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:00.706 UTC [cauthdsl] func2 -> DEBU 302f 0xc003d3a6f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.720 UTC [cauthdsl] func1 -> DEBU 3033 0xc003d3a6f0 gate 1569284760705342100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.720 UTC [policies] Evaluate -> DEBU 3034 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.720 UTC [policies] Evaluate -> DEBU 3035 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.720 UTC [policies] Evaluate -> DEBU 3036 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.720 UTC [cauthdsl] func1 -> DEBU 3037 0xc003d3af50 gate 1569284760720679200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.720 UTC [cauthdsl] func2 -> DEBU 3038 0xc003d3af50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.720 UTC [cauthdsl] func2 -> DEBU 3039 0xc003d3af50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.720 UTC [cauthdsl] func2 -> DEBU 303a 0xc003d3af50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.720 UTC [msp.identity] Verify -> DEBU 303b Verify: digest = 00000000 c3 3a a3 2c fa 19 b7 75 21 af e2 6c 26 54 fa 72 |.:.,...u!..l&T.r| +peer0.org1.example.com | 00000010 47 c5 01 5d fb 53 ef 19 c5 3f 51 49 55 8d 5f a6 |G..].S...?QIU._.|" +peer0.org1.example.com | "2019-09-24 00:26:00.720 UTC [msp.identity] Verify -> DEBU 303c Verify: sig = 00000000 30 44 02 20 7d 14 db 02 a6 7a 5b b4 e0 bc 7e 39 |0D. }....z[...~9| +peer0.org1.example.com | 00000010 cb 4d 93 2e 6d 3c 7d 3d a1 10 c8 1a bf be 4f b6 |.M..m<}=......O.| +peer0.org1.example.com | 00000020 85 69 b5 b7 02 20 3c f5 69 87 23 f9 ce b1 43 f3 |.i... <.i.#...C.| +peer0.org1.example.com | 00000030 d0 66 60 f0 ba ba 51 a8 67 7a d7 b0 9b 2b b9 98 |.f`...Q.gz...+..| +peer0.org1.example.com | 00000040 af 11 96 e0 2f 8a |..../.|" +peer0.org1.example.com | "2019-09-24 00:26:00.721 UTC [cauthdsl] func2 -> DEBU 303d 0xc003d3af50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.721 UTC [cauthdsl] func1 -> DEBU 303e 0xc003d3af50 gate 1569284760720679200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:00.721 UTC [policies] Evaluate -> DEBU 303f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.721 UTC [policies] Evaluate -> DEBU 3040 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.722 UTC [policies] Evaluate -> DEBU 3041 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.722 UTC [policies] Evaluate -> DEBU 3042 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.722 UTC [gossip.discovery] handleAliveMessage -> DEBU 3043 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.722 UTC [gossip.discovery] learnExistingMembers -> DEBU 3044 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:00.722 UTC [gossip.discovery] learnExistingMembers -> DEBU 3045 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:00.722 UTC [gossip.discovery] learnExistingMembers -> DEBU 3046 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:00.722 UTC [gossip.discovery] learnExistingMembers -> DEBU 3047 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:00.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 3048 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.723 UTC [gossip.discovery] handleAliveMessage -> DEBU 3049 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.723 UTC [gossip.discovery] handleMsgFromComm -> DEBU 304a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.709 UTC [gossip.comm] func1 -> DEBU 3030 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.715 UTC [gossip.gossip] handleMessage -> DEBU 3031 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.723 UTC [gossip.gossip] handleMessage -> DEBU 304b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.723 UTC [gossip.gossip] handleMessage -> DEBU 304c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.723 UTC [gossip.discovery] handleMsgFromComm -> DEBU 304d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.716 UTC [gossip.comm] func1 -> DEBU 3032 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.734 UTC [msp] DeserializeIdentity -> DEBU 304e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 304f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3052 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3053 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [gossip.gossip] handleMessage -> DEBU 3054 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [gossip.gossip] handleMessage -> DEBU 3055 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [gossip.gossip] handleMessage -> DEBU 3056 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [gossip.comm] func1 -> DEBU 3050 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3057 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [gossip.gossip] handleMessage -> DEBU 3058 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3059 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [gossip.pull] HandleMessage -> DEBU 305a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [msp] DeserializeIdentity -> DEBU 305b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 305c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 305d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 305e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 305f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 3060 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3061 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3062 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 3063 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3064 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3065 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 3066 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3067 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [cauthdsl] func1 -> DEBU 3068 0xc003d0fc00 gate 1569284760749346800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [gossip.pull] SendDigest -> DEBU 3069 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 306a 0xc003d0fc00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [gossip.gossip] handleMessage -> DEBU 306b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 306c 0xc003d0fc00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.748 UTC [msp] DeserializeIdentity -> DEBU 3051 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 306d 0xc003d0fc00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 306f 0xc003d0fc00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [cauthdsl] func1 -> DEBU 3070 0xc003d0fc00 gate 1569284760749346800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3071 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 306e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3072 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3073 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [cauthdsl] func1 -> DEBU 3074 0xc003ce2440 gate 1569284760749838800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 3075 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 3076 0xc003ce2440 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 3077 0xc003ce2440 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 3078 0xc003ce2440 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [msp.identity] Verify -> DEBU 3079 Verify: digest = 00000000 da e3 e9 f4 4c 6f 1d d0 04 fa 0f 1e f9 31 cc 82 |....Lo.......1..| +peer0.org1.example.com | 00000010 7e 77 81 82 a3 52 83 cd ae 90 74 ac ec 9f cd c0 |~w...R....t.....|" +peer0.org1.example.com | "2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 307a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [msp.identity] Verify -> DEBU 307b Verify: sig = 00000000 30 44 02 20 2c 89 28 2a 08 0a 94 7a cb c4 fa 34 |0D. ,.(*...z...4| +peer0.org1.example.com | 00000010 2a 64 8f 9b 37 c8 12 3a 17 5e d9 64 32 1d d4 a1 |*d..7..:.^.d2...| +peer0.org1.example.com | 00000020 a3 02 42 1f 02 20 23 16 96 4e 24 a5 72 1b 54 40 |..B.. #..N$.r.T@| +peer0.org1.example.com | 00000030 80 63 e0 ce 3d 4d 77 a0 83 97 3a 57 63 83 71 0b |.c..=Mw...:Wc.q.| +peer0.org1.example.com | 00000040 78 ae b7 6f 3a 46 |x..o:F|" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [msp] DeserializeIdentity -> DEBU 307c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [cauthdsl] func2 -> DEBU 307d 0xc003ce2440 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [cauthdsl] func1 -> DEBU 307e 0xc003ce2440 gate 1569284760749838800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [policies] Evaluate -> DEBU 307f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [policies] Evaluate -> DEBU 3081 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [gossip.comm] Send -> DEBU 3080 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [policies] Evaluate -> DEBU 3082 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [policies] Evaluate -> DEBU 3083 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [msp] DeserializeIdentity -> DEBU 3084 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 3085 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [msp] DeserializeIdentity -> DEBU 3086 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 3087 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [gossip.comm] Send -> DEBU 3088 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [gossip.comm] sendToEndpoint -> DEBU 3089 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [gossip.comm] sendToEndpoint -> DEBU 308a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [gossip.comm] sendToEndpoint -> DEBU 308b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.750 UTC [gossip.comm] sendToEndpoint -> DEBU 308c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 308d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:00.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 308e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:00.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 308f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:00.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 3090 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.758 UTC [gossip.discovery] handleAliveMessage -> DEBU 3091 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.759 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3092 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.759 UTC [gossip.discovery] sendMemResponse -> DEBU 3093 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:00.759 UTC [msp] DeserializeIdentity -> DEBU 3094 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.759 UTC [msp] DeserializeIdentity -> DEBU 3095 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.759 UTC [msp] DeserializeIdentity -> DEBU 3096 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:00.759 UTC [gossip.comm] Send -> DEBU 3097 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:00.760 UTC [gossip.discovery] sendMemResponse -> DEBU 3098 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:00.760 UTC [gossip.comm] sendToEndpoint -> DEBU 3099 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.760 UTC [gossip.comm] sendToEndpoint -> DEBU 309a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:00.849 UTC [gossip.comm] func1 -> DEBU 309b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.849 UTC [gossip.gossip] handleMessage -> DEBU 309c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.850 UTC [gossip.pull] HandleMessage -> DEBU 309d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:00.850 UTC [gossip.pull] SendDigest -> DEBU 309e Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:00.850 UTC [gossip.gossip] handleMessage -> DEBU 309f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:01.149 UTC [gossip.gossip] handleMessage -> DEBU 30a0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:01.149 UTC [msp] DeserializeIdentity -> DEBU 30a1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:01.149 UTC [msp] DeserializeIdentity -> DEBU 30a2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:01.150 UTC [msp] DeserializeIdentity -> DEBU 30a3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:01.150 UTC [gossip.gossip] handleMessage -> DEBU 30a4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:01.685 UTC [gossip.comm] func1 -> DEBU 30a5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:01.685 UTC [gossip.gossip] handleMessage -> DEBU 30a6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:01.685 UTC [gossip.pull] HandleMessage -> DEBU 30a7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:01.685 UTC [gossip.pull] SendDigest -> DEBU 30a8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:01.685 UTC [gossip.gossip] handleMessage -> DEBU 30a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:01.758 UTC [gossip.comm] func1 -> DEBU 30aa Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0202" signature:"0D\002 \010\n\2729\357JK\347\350~\360(\272\260B\3661+o%F\031\313y\310\202\332\203XG0\245\002 F\306by\023\326\264a\372\374Ykj\227W\2560\022\344\350R\332\202\326y\033\3455Z\356\001\023" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:01.759 UTC [gossip.gossip] handleMessage -> DEBU 30ab Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0202" signature:"0D\002 \010\n\2729\357JK\347\350~\360(\272\260B\3661+o%F\031\313y\310\202\332\203XG0\245\002 F\306by\023\326\264a\372\374Ykj\227W\2560\022\344\350R\332\202\326y\033\3455Z\356\001\023" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:01.759 UTC [gossip.gossip] handleMessage -> DEBU 30ac Exiting" +peer0.org1.example.com | "2019-09-24 00:26:01.759 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ad Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0202" signature:"0D\002 \010\n\2729\357JK\347\350~\360(\272\260B\3661+o%F\031\313y\310\202\332\203XG0\245\002 F\306by\023\326\264a\372\374Ykj\227W\2560\022\344\350R\332\202\326y\033\3455Z\356\001\023" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:01.759 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30ae Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:01.759 UTC [msp.identity] Verify -> DEBU 30af Verify: digest = 00000000 88 b4 e1 33 52 8c 5d 92 6c 0d 5d 81 93 7c 70 30 |...3R.].l.]..|p0| +peer0.org1.example.com | 00000010 fb cc 19 f6 b3 95 30 94 b7 31 fc 77 57 37 3b 1b |......0..1.wW7;.|" +peer0.org1.example.com | "2019-09-24 00:26:01.759 UTC [msp.identity] Verify -> DEBU 30b0 Verify: sig = 00000000 30 44 02 20 08 0a ba 39 ef 4a 4b e7 e8 7e f0 28 |0D. ...9.JK..~.(| +peer0.org1.example.com | 00000010 ba b0 42 f6 31 2b 6f 25 46 19 cb 79 c8 82 da 83 |..B.1+o%F..y....| +peer0.org1.example.com | 00000020 58 47 30 a5 02 20 46 c6 62 79 13 d6 b4 61 fa fc |XG0.. F.by...a..| +peer0.org1.example.com | 00000030 59 6b 6a 97 57 ae 30 12 e4 e8 52 da 82 d6 79 1b |Ykj.W.0...R...y.| +peer0.org1.example.com | 00000040 e5 35 5a ee 01 13 |.5Z...|" +peer0.org1.example.com | "2019-09-24 00:26:01.759 UTC [msp.identity] Verify -> DEBU 30b1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:01.759 UTC [msp.identity] Verify -> DEBU 30b2 Verify: sig = 00000000 30 44 02 20 5b 65 2f dc a7 fa d9 27 2e c1 45 11 |0D. [e/....'..E.| +peer0.org1.example.com | 00000010 7e 29 38 db 87 69 18 84 36 fb 7c f1 90 71 e5 cf |~)8..i..6.|..q..| +peer0.org1.example.com | 00000020 44 7e 0b 22 02 20 35 ca e0 4d 56 5b d0 be eb 75 |D~.". 5..MV[...u| +peer0.org1.example.com | 00000030 47 1c 25 13 99 5e df be 75 24 a6 10 19 34 da f0 |G.%..^..u$...4..| +peer0.org1.example.com | 00000040 78 fa 0b 53 c9 9f |x..S..|" +peer0.org1.example.com | "2019-09-24 00:26:01.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 30b3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:01.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 30b4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:01.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 30b5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:01.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 30b6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:01.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 30b7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:01.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 30b8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:01.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 30b9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:01.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ba Exiting" +peer0.org1.example.com | "2019-09-24 00:26:01.760 UTC [gossip.discovery] sendMemResponse -> DEBU 30bb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:01.760 UTC [msp] DeserializeIdentity -> DEBU 30bc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:01.761 UTC [msp] DeserializeIdentity -> DEBU 30bd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:01.761 UTC [gossip.comm] Send -> DEBU 30be Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:01.761 UTC [gossip.discovery] sendMemResponse -> DEBU 30bf Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0202" signature:"0D\002 \010\n\2729\357JK\347\350~\360(\272\260B\3661+o%F\031\313y\310\202\332\203XG0\245\002 F\306by\023\326\264a\372\374Ykj\227W\2560\022\344\350R\332\202\326y\033\3455Z\356\001\023" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:26:01.761 UTC [gossip.comm] sendToEndpoint -> DEBU 30c0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:01.761 UTC [gossip.comm] sendToEndpoint -> DEBU 30c1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.079 UTC [gossip.comm] func1 -> DEBU 30c2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.079 UTC [gossip.gossip] handleMessage -> DEBU 30c3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.079 UTC [msp] DeserializeIdentity -> DEBU 30c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.079 UTC [msp] DeserializeIdentity -> DEBU 30c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.079 UTC [msp] DeserializeIdentity -> DEBU 30c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.080 UTC [gossip.gossip] handleMessage -> DEBU 30c7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.328 UTC [gossip.election] waitForInterrupt -> DEBU 30c8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.328 UTC [gossip.election] IsLeader -> DEBU 30c9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:02.328 UTC [msp] GetDefaultSigningIdentity -> DEBU 30ca Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:02.328 UTC [msp.identity] Sign -> DEBU 30cb Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315100E1801 " +peer0.org1.example.com | "2019-09-24 00:26:02.328 UTC [msp.identity] Sign -> DEBU 30cc Sign: digest: EE5F537C8F7BCB3548FBA2FCA66168115B7E6D6E7417CD9DE4932F6CEA7B6AFB " +peer0.org1.example.com | "2019-09-24 00:26:02.328 UTC [gossip.election] waitForInterrupt -> DEBU 30cd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:02.335 UTC [msp] DeserializeIdentity -> DEBU 30ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.336 UTC [msp] DeserializeIdentity -> DEBU 30cf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.336 UTC [msp] DeserializeIdentity -> DEBU 30d0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.336 UTC [msp] DeserializeIdentity -> DEBU 30d1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.336 UTC [gossip.comm] Send -> DEBU 30d2 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:02.336 UTC [msp] DeserializeIdentity -> DEBU 30d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.336 UTC [msp] DeserializeIdentity -> DEBU 30d4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.336 UTC [gossip.comm] sendToEndpoint -> DEBU 30d5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.336 UTC [gossip.comm] sendToEndpoint -> DEBU 30d6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.684 UTC [gossip.comm] func1 -> DEBU 30d7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.684 UTC [gossip.gossip] handleMessage -> DEBU 30d8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.684 UTC [gossip.gossip] handleMessage -> DEBU 30d9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30da Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.691 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30db Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:02.691 UTC [msp.identity] Verify -> DEBU 30dc Verify: digest = 00000000 f5 5d df 61 1c b3 37 0b 7f ae 79 e9 9a a4 50 de |.].a..7...y...P.| +peer0.org1.example.com | 00000010 40 54 ff dc f3 9e fd 9e 05 ea 25 05 05 b2 5f dc |@T........%..._.|" +peer0.org1.example.com | "2019-09-24 00:26:02.691 UTC [msp.identity] Verify -> DEBU 30dd Verify: sig = 00000000 30 44 02 20 75 9d 99 e0 3e 21 30 70 ce 89 91 74 |0D. u...>!0p...t| +peer0.org1.example.com | 00000010 4b 1a 8c 55 f3 0b 1f 69 ad 29 20 ee 37 c7 60 c2 |K..U...i.) .7.`.| +peer0.org1.example.com | 00000020 85 03 fc 4c 02 20 09 96 38 71 07 2a 7e 77 f3 28 |...L. ..8q.*~w.(| +peer0.org1.example.com | 00000030 47 6b 44 62 22 18 fc e1 cd c8 8a 6f b5 d4 46 9c |GkDb"......o..F.| +peer0.org1.example.com | 00000040 35 d9 51 da fd cf |5.Q...|" +peer0.org1.example.com | "2019-09-24 00:26:02.691 UTC [gossip.discovery] handleAliveMessage -> DEBU 30de Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 30df Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:02.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e0 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:02.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e1 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:02.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e2 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:02.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.691 UTC [gossip.discovery] handleAliveMessage -> DEBU 30e4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30e5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.693 UTC [gossip.gossip] handleMessage -> DEBU 30e6 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.693 UTC [gossip.gossip] handleMessage -> DEBU 30e7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30e8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30e9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.693 UTC [gossip.comm] func1 -> DEBU 30ea Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.693 UTC [gossip.gossip] handleMessage -> DEBU 30eb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.699 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ec Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.699 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ed Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.699 UTC [gossip.gossip] handleMessage -> DEBU 30ee Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.701 UTC [msp] DeserializeIdentity -> DEBU 30ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.701 UTC [msp] DeserializeIdentity -> DEBU 30f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.701 UTC [msp] DeserializeIdentity -> DEBU 30f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.701 UTC [gossip.comm] Send -> DEBU 30f2 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:02.701 UTC [msp] DeserializeIdentity -> DEBU 30f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:02.701 UTC [gossip.comm] Send -> DEBU 30f4 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:02.701 UTC [gossip.comm] sendToEndpoint -> DEBU 30f5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.701 UTC [gossip.comm] sendToEndpoint -> DEBU 30f6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:02.701 UTC [gossip.comm] sendToEndpoint -> DEBU 30f7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:02.701 UTC [gossip.comm] sendToEndpoint -> DEBU 30f8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.pull] Hello -> DEBU 30f9 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.comm] Send -> DEBU 30fa Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.pull] Hello -> DEBU 30fb Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.comm] Send -> DEBU 30fc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.pull] Hello -> DEBU 30fd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.comm] Send -> DEBU 30fe Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 30ff Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 3100 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 3101 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 3102 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 3103 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 3104 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.712 UTC [gossip.gossip] handleMessage -> DEBU 3105 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.712 UTC [gossip.pull] HandleMessage -> DEBU 3106 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.712 UTC [gossip.gossip] handleMessage -> DEBU 3107 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.712 UTC [gossip.comm] func1 -> DEBU 3108 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.713 UTC [gossip.gossip] handleMessage -> DEBU 3109 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.713 UTC [gossip.pull] HandleMessage -> DEBU 310a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.713 UTC [gossip.gossip] handleMessage -> DEBU 310b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.713 UTC [gossip.comm] func1 -> DEBU 310c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.713 UTC [gossip.gossip] handleMessage -> DEBU 310d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.713 UTC [gossip.pull] HandleMessage -> DEBU 310e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.713 UTC [gossip.gossip] handleMessage -> DEBU 310f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.757 UTC [msp] GetDefaultSigningIdentity -> DEBU 3110 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:03.757 UTC [msp.identity] Sign -> DEBU 3111 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102F " +peer0.org1.example.com | "2019-09-24 00:26:03.757 UTC [msp.identity] Sign -> DEBU 3112 Sign: digest: 4E434998860597F8D97C2E5D8ADAB132D736BCBADF555A70F143F8117A8FD516 " +peer0.org1.example.com | "2019-09-24 00:26:03.757 UTC [msp] GetDefaultSigningIdentity -> DEBU 3113 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:03.757 UTC [msp.identity] Sign -> DEBU 3114 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:03.757 UTC [msp.identity] Sign -> DEBU 3115 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:03.758 UTC [msp] DeserializeIdentity -> DEBU 3116 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.758 UTC [gossip.comm] Send -> DEBU 3117 Entering, sending GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:03.758 UTC [gossip.comm] Send -> DEBU 3118 Entering, sending GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:03.758 UTC [msp] DeserializeIdentity -> DEBU 3119 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.758 UTC [gossip.comm] Send -> DEBU 311a Entering, sending GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:03.758 UTC [gossip.comm] sendToEndpoint -> DEBU 311b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.758 UTC [gossip.comm] sendToEndpoint -> DEBU 311c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.758 UTC [gossip.comm] sendToEndpoint -> DEBU 311d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.759 UTC [gossip.comm] sendToEndpoint -> DEBU 311e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.759 UTC [gossip.comm] sendToEndpoint -> DEBU 311f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.759 UTC [gossip.comm] sendToEndpoint -> DEBU 3120 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.761 UTC [gossip.comm] func1 -> DEBU 3121 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.761 UTC [gossip.gossip] handleMessage -> DEBU 3122 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.761 UTC [gossip.gossip] handleMessage -> DEBU 3123 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.761 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3124 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.761 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3125 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:03.761 UTC [msp.identity] Verify -> DEBU 3126 Verify: digest = 00000000 4e 43 49 98 86 05 97 f8 d9 7c 2e 5d 8a da b1 32 |NCI......|.]...2| +peer0.org1.example.com | 00000010 d7 36 bc ba df 55 5a 70 f1 43 f8 11 7a 8f d5 16 |.6...UZp.C..z...|" +peer0.org1.example.com | "2019-09-24 00:26:03.761 UTC [msp.identity] Verify -> DEBU 3127 Verify: sig = 00000000 30 45 02 21 00 93 f6 09 6b 6b 99 b9 b0 69 17 d9 |0E.!....kk...i..| +peer0.org1.example.com | 00000010 6d 24 bd bc 2e a6 77 46 5d 48 71 40 5c 72 6b a8 |m$....wF]Hq@\rk.| +peer0.org1.example.com | 00000020 c4 3e 1f d8 ac 02 20 15 c4 a6 fa e3 f8 f1 19 c9 |.>.... .........| +peer0.org1.example.com | 00000030 68 12 e5 76 64 8c cd 9e 59 28 d1 1d c9 a4 16 2b |h..vd...Y(.....+| +peer0.org1.example.com | 00000040 d4 18 00 e2 0e f5 1c |.......|" +peer0.org1.example.com | "2019-09-24 00:26:03.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 3128 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.761 UTC [gossip.discovery] isSentByMe -> DEBU 3129 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.764 UTC [gossip.discovery] handleAliveMessage -> DEBU 312a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.764 UTC [gossip.discovery] handleMsgFromComm -> DEBU 312b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.764 UTC [gossip.gossip] handleMessage -> DEBU 312c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.764 UTC [gossip.gossip] handleMessage -> DEBU 312d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.764 UTC [gossip.discovery] handleMsgFromComm -> DEBU 312e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.765 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 312f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:03.765 UTC [msp.identity] Verify -> DEBU 3130 Verify: digest = 00000000 4e 43 49 98 86 05 97 f8 d9 7c 2e 5d 8a da b1 32 |NCI......|.]...2| +peer0.org1.example.com | 00000010 d7 36 bc ba df 55 5a 70 f1 43 f8 11 7a 8f d5 16 |.6...UZp.C..z...|" +peer0.org1.example.com | "2019-09-24 00:26:03.765 UTC [msp.identity] Verify -> DEBU 3131 Verify: sig = 00000000 30 45 02 21 00 93 f6 09 6b 6b 99 b9 b0 69 17 d9 |0E.!....kk...i..| +peer0.org1.example.com | 00000010 6d 24 bd bc 2e a6 77 46 5d 48 71 40 5c 72 6b a8 |m$....wF]Hq@\rk.| +peer0.org1.example.com | 00000020 c4 3e 1f d8 ac 02 20 15 c4 a6 fa e3 f8 f1 19 c9 |.>.... .........| +peer0.org1.example.com | 00000030 68 12 e5 76 64 8c cd 9e 59 28 d1 1d c9 a4 16 2b |h..vd...Y(.....+| +peer0.org1.example.com | 00000040 d4 18 00 e2 0e f5 1c |.......|" +peer0.org1.example.com | "2019-09-24 00:26:03.765 UTC [gossip.discovery] handleAliveMessage -> DEBU 3132 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.765 UTC [gossip.discovery] isSentByMe -> DEBU 3133 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.765 UTC [gossip.discovery] handleAliveMessage -> DEBU 3134 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.765 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3135 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:03.765 UTC [msp] DeserializeIdentity -> DEBU 3136 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.765 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3137 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:03.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3138 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3139 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 313a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 313b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 313c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [cauthdsl] func1 -> DEBU 313d 0xc003adb430 gate 1569284763766173300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 313e 0xc003adb430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 313f 0xc003adb430 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 3140 0xc003adb430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 3141 0xc003adb430 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [cauthdsl] func1 -> DEBU 3142 0xc003adb430 gate 1569284763766173300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 3143 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 3144 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 3145 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [cauthdsl] func1 -> DEBU 3146 0xc003adbc70 gate 1569284763766596000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 3147 0xc003adbc70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 3148 0xc003adbc70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 3149 0xc003adbc70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [msp.identity] Verify -> DEBU 314a Verify: digest = 00000000 da e3 e9 f4 4c 6f 1d d0 04 fa 0f 1e f9 31 cc 82 |....Lo.......1..| +peer0.org1.example.com | 00000010 7e 77 81 82 a3 52 83 cd ae 90 74 ac ec 9f cd c0 |~w...R....t.....|" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [msp.identity] Verify -> DEBU 314b Verify: sig = 00000000 30 44 02 20 2c 89 28 2a 08 0a 94 7a cb c4 fa 34 |0D. ,.(*...z...4| +peer0.org1.example.com | 00000010 2a 64 8f 9b 37 c8 12 3a 17 5e d9 64 32 1d d4 a1 |*d..7..:.^.d2...| +peer0.org1.example.com | 00000020 a3 02 42 1f 02 20 23 16 96 4e 24 a5 72 1b 54 40 |..B.. #..N$.r.T@| +peer0.org1.example.com | 00000030 80 63 e0 ce 3d 4d 77 a0 83 97 3a 57 63 83 71 0b |.c..=Mw...:Wc.q.| +peer0.org1.example.com | 00000040 78 ae b7 6f 3a 46 |x..o:F|" +peer0.org1.example.com | "2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 314c 0xc003adbc70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:03.767 UTC [cauthdsl] func1 -> DEBU 314d 0xc003adbc70 gate 1569284763766596000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:03.767 UTC [policies] Evaluate -> DEBU 314e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.767 UTC [policies] Evaluate -> DEBU 314f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.767 UTC [policies] Evaluate -> DEBU 3150 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.767 UTC [policies] Evaluate -> DEBU 3151 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 3152 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 3153 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3154 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.772 UTC [gossip.comm] func1 -> DEBU 3155 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [gossip.gossip] handleMessage -> DEBU 3156 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [gossip.gossip] handleMessage -> DEBU 3157 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3158 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3159 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [msp.identity] Verify -> DEBU 315a Verify: digest = 00000000 4e 43 49 98 86 05 97 f8 d9 7c 2e 5d 8a da b1 32 |NCI......|.]...2| +peer0.org1.example.com | 00000010 d7 36 bc ba df 55 5a 70 f1 43 f8 11 7a 8f d5 16 |.6...UZp.C..z...|" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [msp.identity] Verify -> DEBU 315b Verify: sig = 00000000 30 45 02 21 00 93 f6 09 6b 6b 99 b9 b0 69 17 d9 |0E.!....kk...i..| +peer0.org1.example.com | 00000010 6d 24 bd bc 2e a6 77 46 5d 48 71 40 5c 72 6b a8 |m$....wF]Hq@\rk.| +peer0.org1.example.com | 00000020 c4 3e 1f d8 ac 02 20 15 c4 a6 fa e3 f8 f1 19 c9 |.>.... .........| +peer0.org1.example.com | 00000030 68 12 e5 76 64 8c cd 9e 59 28 d1 1d c9 a4 16 2b |h..vd...Y(.....+| +peer0.org1.example.com | 00000040 d4 18 00 e2 0e f5 1c |.......|" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [msp.identity] Verify -> DEBU 315c Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [msp.identity] Verify -> DEBU 315d Verify: sig = 00000000 30 44 02 20 5e e2 42 91 6f 82 bb 94 db ea 54 bf |0D. ^.B.o.....T.| +peer0.org1.example.com | 00000010 8a 9b bc cf 6a 0d bf 00 b3 de 26 3c cb 2b d7 ee |....j.....&<.+..| +peer0.org1.example.com | 00000020 61 86 42 ad 02 20 01 bf 35 be 76 0d 4f aa 0d b6 |a.B.. ..5.v.O...| +peer0.org1.example.com | 00000030 09 bf 00 39 35 e2 dc 58 1b ef fb 7a 93 12 f0 1a |...95..X...z....| +peer0.org1.example.com | 00000040 83 f6 e2 b7 19 41 |.....A|" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [gossip.discovery] handleAliveMessage -> DEBU 315e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [gossip.discovery] isSentByMe -> DEBU 315f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [gossip.discovery] handleAliveMessage -> DEBU 3160 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.777 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3161 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.950 UTC [gossip.gossip] handleMessage -> DEBU 3162 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.950 UTC [gossip.pull] HandleMessage -> DEBU 3163 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3164 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3165 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3166 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3167 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3168 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3169 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.950 UTC [gossip.pull] SendDigest -> DEBU 316a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:03.950 UTC [gossip.gossip] handleMessage -> DEBU 316b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [gossip.gossip] handleMessage -> DEBU 316c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [gossip.gossip] handleMessage -> DEBU 316d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 316e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 316f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [msp] DeserializeIdentity -> DEBU 3170 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3171 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3172 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3173 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [policies] Evaluate -> DEBU 3174 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [policies] Evaluate -> DEBU 3175 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [policies] Evaluate -> DEBU 3176 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [cauthdsl] func1 -> DEBU 3177 0xc003aa3f70 gate 1569284763975919500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [cauthdsl] func2 -> DEBU 3178 0xc003aa3f70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:03.975 UTC [cauthdsl] func2 -> DEBU 3179 0xc003aa3f70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 317a 0xc003aa3f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 317b 0xc003aa3f70 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [cauthdsl] func1 -> DEBU 317c 0xc003aa3f70 gate 1569284763975919500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 317d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 317e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 317f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [cauthdsl] func1 -> DEBU 3180 0xc003a887e0 gate 1569284763976361500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 3181 0xc003a887e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 3182 0xc003a887e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 3183 0xc003a887e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [msp.identity] Verify -> DEBU 3184 Verify: digest = 00000000 6f 3d 24 be 83 d4 27 39 2a f1 88 29 6a 05 29 46 |o=$...'9*..)j.)F| +peer0.org1.example.com | 00000010 91 11 af 78 63 be eb fe f2 4c c4 8f 7a 3a 3f 4d |...xc....L..z:?M|" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [msp.identity] Verify -> DEBU 3185 Verify: sig = 00000000 30 44 02 20 2d 43 1c cf fb 96 bf cb 46 5a 23 c4 |0D. -C......FZ#.| +peer0.org1.example.com | 00000010 79 6b 35 47 28 0b 78 11 44 30 ea 59 86 97 64 22 |yk5G(.x.D0.Y..d"| +peer0.org1.example.com | 00000020 6b 48 65 33 02 20 76 91 56 e9 72 eb 33 6f bd 99 |kHe3. v.V.r.3o..| +peer0.org1.example.com | 00000030 8f f1 d0 93 87 2b d8 f3 e9 49 f7 2d 0b c6 9d 7f |.....+...I.-....| +peer0.org1.example.com | 00000040 01 45 07 98 f4 87 |.E....|" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 3186 0xc003a887e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [cauthdsl] func1 -> DEBU 3187 0xc003a887e0 gate 1569284763976361500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 3188 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 3189 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 318a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 318b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:03.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 318c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.discovery] learnExistingMembers -> DEBU 318d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.discovery] learnExistingMembers -> DEBU 318e updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.discovery] learnExistingMembers -> DEBU 318f Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.discovery] learnExistingMembers -> DEBU 3190 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.discovery] learnExistingMembers -> DEBU 3191 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 3192 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3193 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.discovery] sendMemResponse -> DEBU 3194 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [msp] DeserializeIdentity -> DEBU 3195 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [msp] DeserializeIdentity -> DEBU 3196 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [msp] DeserializeIdentity -> DEBU 3197 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.comm] Send -> DEBU 3198 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.discovery] sendMemResponse -> DEBU 3199 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0203" signature:"0D\002 u\235\231\340>!0p\316\211\221tK\032\214U\363\013\037i\255) \3567\307`\302\205\003\374L\002 \t\2268q\007*~w\363(GkDb\"\030\374\341\315\310\212o\265\324F\2345\331Q\332\375\317" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.comm] sendToEndpoint -> DEBU 319a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:03.977 UTC [gossip.comm] sendToEndpoint -> DEBU 319b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.148 UTC [msp] DeserializeIdentity -> DEBU 319c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.148 UTC [msp] DeserializeIdentity -> DEBU 319d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.149 UTC [gossip.comm] Send -> DEBU 319e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 319f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 31a0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 31a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 31a2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 31a3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 31a4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.154 UTC [gossip.gossip] handleMessage -> DEBU 31a5 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.154 UTC [msp] DeserializeIdentity -> DEBU 31a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.154 UTC [msp] DeserializeIdentity -> DEBU 31a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.155 UTC [msp] DeserializeIdentity -> DEBU 31a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.155 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:04.155 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31aa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.155 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31ab Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.155 UTC [policies] Evaluate -> DEBU 31ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.155 UTC [policies] Evaluate -> DEBU 31ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:04.155 UTC [policies] Evaluate -> DEBU 31ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.155 UTC [cauthdsl] func1 -> DEBU 31af 0xc003a756e0 gate 1569284764155647600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.157 UTC [gossip.comm] func1 -> DEBU 31b0 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.157 UTC [gossip.comm] func1 -> DEBU 31b1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.159 UTC [cauthdsl] func2 -> DEBU 31b2 0xc003a756e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.159 UTC [cauthdsl] func2 -> DEBU 31b3 0xc003a756e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.159 UTC [cauthdsl] func2 -> DEBU 31b4 0xc003a756e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:04.159 UTC [cauthdsl] func2 -> DEBU 31b5 0xc003a756e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.159 UTC [cauthdsl] func1 -> DEBU 31b6 0xc003a756e0 gate 1569284764155647600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.159 UTC [policies] Evaluate -> DEBU 31b7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.159 UTC [policies] Evaluate -> DEBU 31b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.159 UTC [policies] Evaluate -> DEBU 31b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [cauthdsl] func1 -> DEBU 31ba 0xc003a75f40 gate 1569284764160002300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [cauthdsl] func2 -> DEBU 31bb 0xc003a75f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [cauthdsl] func2 -> DEBU 31bc 0xc003a75f40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [cauthdsl] func2 -> DEBU 31bd 0xc003a75f40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [msp.identity] Verify -> DEBU 31be Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [msp.identity] Verify -> DEBU 31bf Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [cauthdsl] func2 -> DEBU 31c0 0xc003a75f40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [cauthdsl] func1 -> DEBU 31c1 0xc003a75f40 gate 1569284764160002300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [policies] Evaluate -> DEBU 31c2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [policies] Evaluate -> DEBU 31c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [policies] Evaluate -> DEBU 31c4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [policies] Evaluate -> DEBU 31c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [msp.identity] Verify -> DEBU 31c6 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:04.160 UTC [msp.identity] Verify -> DEBU 31c7 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [msp.identity] Verify -> DEBU 31c8 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [msp.identity] Verify -> DEBU 31c9 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [msp] DeserializeIdentity -> DEBU 31ca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [msp] DeserializeIdentity -> DEBU 31cb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31cd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31ce Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [policies] Evaluate -> DEBU 31cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [policies] Evaluate -> DEBU 31d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [policies] Evaluate -> DEBU 31d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [cauthdsl] func1 -> DEBU 31d2 0xc003842580 gate 1569284764161818700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [cauthdsl] func2 -> DEBU 31d3 0xc003842580 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [cauthdsl] func2 -> DEBU 31d4 0xc003842580 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [cauthdsl] func2 -> DEBU 31d5 0xc003842580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:04.161 UTC [cauthdsl] func2 -> DEBU 31d6 0xc003842580 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [cauthdsl] func1 -> DEBU 31d7 0xc003842580 gate 1569284764161818700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [policies] Evaluate -> DEBU 31d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [policies] Evaluate -> DEBU 31d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [policies] Evaluate -> DEBU 31da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [cauthdsl] func1 -> DEBU 31db 0xc003842dd0 gate 1569284764162227200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [cauthdsl] func2 -> DEBU 31dc 0xc003842dd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [cauthdsl] func2 -> DEBU 31dd 0xc003842dd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [cauthdsl] func2 -> DEBU 31de 0xc003842dd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [msp.identity] Verify -> DEBU 31df Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [msp.identity] Verify -> DEBU 31e0 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [cauthdsl] func2 -> DEBU 31e1 0xc003842dd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.162 UTC [cauthdsl] func1 -> DEBU 31e2 0xc003842dd0 gate 1569284764162227200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:04.163 UTC [policies] Evaluate -> DEBU 31e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.163 UTC [policies] Evaluate -> DEBU 31e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.163 UTC [policies] Evaluate -> DEBU 31e5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.163 UTC [policies] Evaluate -> DEBU 31e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.163 UTC [gossip.gossip] handleMessage -> DEBU 31e7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.167 UTC [gossip.gossip] handleMessage -> DEBU 31e8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.170 UTC [msp.identity] Verify -> DEBU 31e9 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:04.170 UTC [msp.identity] Verify -> DEBU 31ea Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:04.172 UTC [msp.identity] Verify -> DEBU 31eb Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:04.173 UTC [msp.identity] Verify -> DEBU 31ec Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:04.174 UTC [msp] DeserializeIdentity -> DEBU 31ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.174 UTC [msp] DeserializeIdentity -> DEBU 31ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.175 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:04.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.175 UTC [policies] Evaluate -> DEBU 31f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.176 UTC [policies] Evaluate -> DEBU 31f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:04.177 UTC [policies] Evaluate -> DEBU 31f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.177 UTC [cauthdsl] func1 -> DEBU 31f5 0xc003835620 gate 1569284764177571400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.177 UTC [cauthdsl] func2 -> DEBU 31f6 0xc003835620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.177 UTC [cauthdsl] func2 -> DEBU 31f7 0xc003835620 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [cauthdsl] func2 -> DEBU 31f8 0xc003835620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [cauthdsl] func2 -> DEBU 31f9 0xc003835620 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [cauthdsl] func1 -> DEBU 31fa 0xc003835620 gate 1569284764177571400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [policies] Evaluate -> DEBU 31fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [policies] Evaluate -> DEBU 31fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [policies] Evaluate -> DEBU 31fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [cauthdsl] func1 -> DEBU 31fe 0xc003835e70 gate 1569284764178544400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [cauthdsl] func2 -> DEBU 31ff 0xc003835e70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [cauthdsl] func2 -> DEBU 3200 0xc003835e70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [cauthdsl] func2 -> DEBU 3201 0xc003835e70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [msp.identity] Verify -> DEBU 3202 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:04.178 UTC [msp.identity] Verify -> DEBU 3203 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [cauthdsl] func2 -> DEBU 3204 0xc003835e70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [cauthdsl] func1 -> DEBU 3205 0xc003835e70 gate 1569284764178544400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3206 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3207 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3208 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3209 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [msp] DeserializeIdentity -> DEBU 320a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [msp] DeserializeIdentity -> DEBU 320b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 320c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 320f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3210 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3211 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.180 UTC [cauthdsl] func1 -> DEBU 3212 0xc0037b9650 gate 1569284764180007400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.180 UTC [cauthdsl] func2 -> DEBU 3213 0xc0037b9650 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.180 UTC [cauthdsl] func2 -> DEBU 3214 0xc0037b9650 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.180 UTC [cauthdsl] func2 -> DEBU 3215 0xc0037b9650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:04.183 UTC [cauthdsl] func2 -> DEBU 3216 0xc0037b9650 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.183 UTC [cauthdsl] func1 -> DEBU 3217 0xc0037b9650 gate 1569284764180007400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [policies] Evaluate -> DEBU 3218 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [policies] Evaluate -> DEBU 3219 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [policies] Evaluate -> DEBU 321a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [cauthdsl] func1 -> DEBU 321b 0xc0037b9e90 gate 1569284764184113900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [cauthdsl] func2 -> DEBU 321c 0xc0037b9e90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [cauthdsl] func2 -> DEBU 321d 0xc0037b9e90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [cauthdsl] func2 -> DEBU 321e 0xc0037b9e90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [msp.identity] Verify -> DEBU 321f Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [msp.identity] Verify -> DEBU 3220 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [cauthdsl] func2 -> DEBU 3221 0xc0037b9e90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [cauthdsl] func1 -> DEBU 3222 0xc0037b9e90 gate 1569284764184113900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:04.184 UTC [policies] Evaluate -> DEBU 3223 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.185 UTC [policies] Evaluate -> DEBU 3224 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.185 UTC [policies] Evaluate -> DEBU 3225 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.185 UTC [policies] Evaluate -> DEBU 3226 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.185 UTC [gossip.gossip] handleMessage -> DEBU 3227 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.185 UTC [gossip.gossip] handleMessage -> DEBU 3228 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.185 UTC [msp] DeserializeIdentity -> DEBU 3229 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.185 UTC [msp] DeserializeIdentity -> DEBU 322a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.185 UTC [msp] DeserializeIdentity -> DEBU 322b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.187 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 322c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:04.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 322d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 322e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.188 UTC [policies] Evaluate -> DEBU 322f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.188 UTC [policies] Evaluate -> DEBU 3230 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:04.188 UTC [policies] Evaluate -> DEBU 3231 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.188 UTC [cauthdsl] func1 -> DEBU 3232 0xc0037a79b0 gate 1569284764188428600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.188 UTC [cauthdsl] func2 -> DEBU 3233 0xc0037a79b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.189 UTC [cauthdsl] func2 -> DEBU 3234 0xc0037a79b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.189 UTC [cauthdsl] func2 -> DEBU 3235 0xc0037a79b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:04.189 UTC [cauthdsl] func2 -> DEBU 3236 0xc0037a79b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.189 UTC [cauthdsl] func1 -> DEBU 3237 0xc0037a79b0 gate 1569284764188428600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.190 UTC [policies] Evaluate -> DEBU 3238 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.190 UTC [policies] Evaluate -> DEBU 3239 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.190 UTC [policies] Evaluate -> DEBU 323a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.191 UTC [cauthdsl] func1 -> DEBU 323b 0xc0037901f0 gate 1569284764191112200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.191 UTC [cauthdsl] func2 -> DEBU 323c 0xc0037901f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.191 UTC [cauthdsl] func2 -> DEBU 323d 0xc0037901f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.191 UTC [cauthdsl] func2 -> DEBU 323e 0xc0037901f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.192 UTC [msp.identity] Verify -> DEBU 323f Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:04.192 UTC [msp.identity] Verify -> DEBU 3240 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:04.192 UTC [cauthdsl] func2 -> DEBU 3241 0xc0037901f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.192 UTC [cauthdsl] func1 -> DEBU 3242 0xc0037901f0 gate 1569284764191112200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:04.192 UTC [policies] Evaluate -> DEBU 3243 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.193 UTC [policies] Evaluate -> DEBU 3244 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.193 UTC [policies] Evaluate -> DEBU 3245 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.193 UTC [policies] Evaluate -> DEBU 3246 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.195 UTC [msp.identity] Verify -> DEBU 3247 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:04.195 UTC [msp.identity] Verify -> DEBU 3248 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:04.195 UTC [msp] DeserializeIdentity -> DEBU 3249 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.195 UTC [msp] DeserializeIdentity -> DEBU 324a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.196 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 324b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:04.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 324c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 324d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.196 UTC [policies] Evaluate -> DEBU 324e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.197 UTC [policies] Evaluate -> DEBU 324f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [policies] Evaluate -> DEBU 3250 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [cauthdsl] func1 -> DEBU 3251 0xc00355a1f0 gate 1569284764198327800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 3252 0xc00355a1f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 3253 0xc00355a1f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 3254 0xc00355a1f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 3255 0xc00355a1f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [cauthdsl] func1 -> DEBU 3256 0xc00355a1f0 gate 1569284764198327800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [policies] Evaluate -> DEBU 3257 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [policies] Evaluate -> DEBU 3258 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [policies] Evaluate -> DEBU 3259 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [cauthdsl] func1 -> DEBU 325a 0xc00355aa30 gate 1569284764198755600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 325b 0xc00355aa30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 325c 0xc00355aa30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 325d 0xc00355aa30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [msp.identity] Verify -> DEBU 325e Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:04.198 UTC [msp.identity] Verify -> DEBU 325f Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:04.202 UTC [cauthdsl] func2 -> DEBU 3260 0xc00355aa30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.202 UTC [cauthdsl] func1 -> DEBU 3261 0xc00355aa30 gate 1569284764198755600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:04.202 UTC [policies] Evaluate -> DEBU 3262 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.202 UTC [policies] Evaluate -> DEBU 3263 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.202 UTC [policies] Evaluate -> DEBU 3264 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.202 UTC [policies] Evaluate -> DEBU 3265 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.202 UTC [msp.identity] Verify -> DEBU 3266 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:04.202 UTC [msp.identity] Verify -> DEBU 3267 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:04.202 UTC [gossip.gossip] handleMessage -> DEBU 3268 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.306 UTC [msp] DeserializeIdentity -> DEBU 3269 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.306 UTC [msp] DeserializeIdentity -> DEBU 326a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.306 UTC [gossip.pull] Hello -> DEBU 326b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:04.306 UTC [msp] DeserializeIdentity -> DEBU 326c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.306 UTC [msp] DeserializeIdentity -> DEBU 326d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.306 UTC [gossip.comm] Send -> DEBU 326e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:04.306 UTC [gossip.comm] sendToEndpoint -> DEBU 326f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.306 UTC [gossip.comm] sendToEndpoint -> DEBU 3270 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.307 UTC [gossip.comm] func1 -> DEBU 3271 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.307 UTC [gossip.gossip] handleMessage -> DEBU 3272 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.307 UTC [gossip.pull] HandleMessage -> DEBU 3273 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.307 UTC [gossip.gossip] handleMessage -> DEBU 3274 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.620 UTC [msp] GetDefaultSigningIdentity -> DEBU 3275 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:04.620 UTC [msp.identity] Sign -> DEBU 3276 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151030 " +peer0.org1.example.com | "2019-09-24 00:26:04.620 UTC [msp.identity] Sign -> DEBU 3277 Sign: digest: CB1B30F4243D64EFD27CDC37E5B0AE47FD3810F328278576147D7FAF38D1D9B2 " +peer0.org1.example.com | "2019-09-24 00:26:04.620 UTC [msp] GetDefaultSigningIdentity -> DEBU 3278 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:04.620 UTC [msp.identity] Sign -> DEBU 3279 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:04.620 UTC [msp.identity] Sign -> DEBU 327a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:04.620 UTC [gossip.discovery] periodicalSendAlive -> DEBU 327b Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:04.629 UTC [msp] DeserializeIdentity -> DEBU 327c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.631 UTC [msp] DeserializeIdentity -> DEBU 327d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.631 UTC [msp] DeserializeIdentity -> DEBU 327e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.632 UTC [gossip.comm] Send -> DEBU 327f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:04.632 UTC [msp] DeserializeIdentity -> DEBU 3280 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.632 UTC [gossip.comm] Send -> DEBU 3281 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:04.632 UTC [gossip.comm] Send -> DEBU 3282 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3283 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3284 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3285 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3286 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3287 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3288 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.647 UTC [gossip.comm] func1 -> DEBU 3289 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.647 UTC [gossip.gossip] handleMessage -> DEBU 328a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.647 UTC [msp] DeserializeIdentity -> DEBU 328b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.648 UTC [msp] DeserializeIdentity -> DEBU 328c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.648 UTC [gossip.gossip] handleMessage -> DEBU 328d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [gossip.comm] func1 -> DEBU 328e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [gossip.gossip] handleMessage -> DEBU 328f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [gossip.gossip] handleMessage -> DEBU 3290 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3291 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3292 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [msp] DeserializeIdentity -> DEBU 3293 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3294 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3295 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3296 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 3297 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 3298 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 3299 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [cauthdsl] func1 -> DEBU 329a 0xc003591240 gate 1569284764725714500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [cauthdsl] func2 -> DEBU 329b 0xc003591240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [cauthdsl] func2 -> DEBU 329c 0xc003591240 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [cauthdsl] func2 -> DEBU 329d 0xc003591240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [cauthdsl] func2 -> DEBU 329e 0xc003591240 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [cauthdsl] func1 -> DEBU 329f 0xc003591240 gate 1569284764725714500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 32a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 32a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 32a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.725 UTC [cauthdsl] func1 -> DEBU 32a3 0xc003591a80 gate 1569284764725977100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [cauthdsl] func2 -> DEBU 32a4 0xc003591a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [cauthdsl] func2 -> DEBU 32a5 0xc003591a80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [cauthdsl] func2 -> DEBU 32a6 0xc003591a80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [msp.identity] Verify -> DEBU 32a7 Verify: digest = 00000000 26 b9 fe 55 d5 80 04 fd 38 f6 fc c2 46 ab 3e e2 |&..U....8...F.>.| +peer0.org1.example.com | 00000010 fc 27 46 6d 0f d3 f2 f6 67 04 e0 f8 5f 8b d7 1e |.'Fm....g..._...|" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [msp.identity] Verify -> DEBU 32a8 Verify: sig = 00000000 30 45 02 21 00 ce 0e 61 14 5b 27 17 2f 60 d5 d7 |0E.!...a.['./`..| +peer0.org1.example.com | 00000010 ba 5e 19 89 4a 53 6c 8b a7 39 37 8f f2 5c 12 25 |.^..JSl..97..\.%| +peer0.org1.example.com | 00000020 ad 44 85 b5 a8 02 20 79 81 a6 d6 a1 8d 08 f7 fb |.D.... y........| +peer0.org1.example.com | 00000030 42 69 10 4a 91 77 c8 90 de e4 47 65 4c 47 80 b2 |Bi.J.w....GeLG..| +peer0.org1.example.com | 00000040 06 67 1c 66 56 dc d3 |.g.fV..|" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [cauthdsl] func2 -> DEBU 32a9 0xc003591a80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [cauthdsl] func1 -> DEBU 32aa 0xc003591a80 gate 1569284764725977100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [policies] Evaluate -> DEBU 32ab Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [policies] Evaluate -> DEBU 32ac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [policies] Evaluate -> DEBU 32ad Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [policies] Evaluate -> DEBU 32ae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [gossip.discovery] handleAliveMessage -> DEBU 32af Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 32b0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 32b1 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 32b2 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 32b3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 32b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [gossip.discovery] handleAliveMessage -> DEBU 32b5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.726 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32b6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.727 UTC [gossip.discovery] sendMemResponse -> DEBU 32b7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:04.727 UTC [msp] DeserializeIdentity -> DEBU 32b8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.727 UTC [msp] DeserializeIdentity -> DEBU 32b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.727 UTC [msp] DeserializeIdentity -> DEBU 32ba Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.727 UTC [gossip.comm] Send -> DEBU 32bb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:04.727 UTC [gossip.discovery] sendMemResponse -> DEBU 32bc Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0203" signature:"0D\002 u\235\231\340>!0p\316\211\221tK\032\214U\363\013\037i\255) \3567\307`\302\205\003\374L\002 \t\2268q\007*~w\363(GkDb\"\030\374\341\315\310\212o\265\324F\2345\331Q\332\375\317" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:04.727 UTC [gossip.comm] sendToEndpoint -> DEBU 32bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.727 UTC [gossip.comm] sendToEndpoint -> DEBU 32be Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.745 UTC [gossip.comm] func1 -> DEBU 32bf Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.745 UTC [gossip.gossip] handleMessage -> DEBU 32c0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.745 UTC [gossip.pull] HandleMessage -> DEBU 32c1 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.745 UTC [msp] DeserializeIdentity -> DEBU 32c2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.746 UTC [msp] DeserializeIdentity -> DEBU 32c3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.746 UTC [msp] DeserializeIdentity -> DEBU 32c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.746 UTC [msp] DeserializeIdentity -> DEBU 32c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.746 UTC [msp] DeserializeIdentity -> DEBU 32c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.746 UTC [msp] DeserializeIdentity -> DEBU 32c7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.746 UTC [gossip.pull] SendDigest -> DEBU 32c8 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:04.746 UTC [gossip.gossip] handleMessage -> DEBU 32c9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.841 UTC [gossip.comm] func1 -> DEBU 32ca Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.841 UTC [gossip.gossip] handleMessage -> DEBU 32cb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.841 UTC [gossip.pull] HandleMessage -> DEBU 32cc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.841 UTC [gossip.pull] SendDigest -> DEBU 32cd Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:04.841 UTC [gossip.gossip] handleMessage -> DEBU 32ce Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.988 UTC [gossip.gossip] handleMessage -> DEBU 32cf Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.988 UTC [gossip.gossip] handleMessage -> DEBU 32d0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.988 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32d1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.988 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32d2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:04.988 UTC [msp] DeserializeIdentity -> DEBU 32d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:04.988 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32d4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:04.988 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.988 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:04.988 UTC [policies] Evaluate -> DEBU 32d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.988 UTC [policies] Evaluate -> DEBU 32d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:04.988 UTC [policies] Evaluate -> DEBU 32d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.989 UTC [cauthdsl] func1 -> DEBU 32da 0xc003341250 gate 1569284764988982600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.989 UTC [cauthdsl] func2 -> DEBU 32db 0xc003341250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.989 UTC [cauthdsl] func2 -> DEBU 32dc 0xc003341250 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.989 UTC [cauthdsl] func2 -> DEBU 32dd 0xc003341250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:04.989 UTC [cauthdsl] func2 -> DEBU 32de 0xc003341250 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.989 UTC [cauthdsl] func1 -> DEBU 32df 0xc003341250 gate 1569284764988982600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:04.989 UTC [policies] Evaluate -> DEBU 32e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.989 UTC [policies] Evaluate -> DEBU 32e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.989 UTC [policies] Evaluate -> DEBU 32e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:04.989 UTC [cauthdsl] func1 -> DEBU 32e3 0xc003341a90 gate 1569284764989780400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:04.990 UTC [cauthdsl] func2 -> DEBU 32e4 0xc003341a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:04.990 UTC [cauthdsl] func2 -> DEBU 32e5 0xc003341a90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:04.990 UTC [cauthdsl] func2 -> DEBU 32e6 0xc003341a90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.990 UTC [msp.identity] Verify -> DEBU 32e7 Verify: digest = 00000000 4d d1 c3 85 f5 86 71 7d 4a b3 b2 ed f4 d4 fc 4a |M.....q}J......J| +peer0.org1.example.com | 00000010 2a cc 69 8c 54 f9 9b cf 2d 58 14 04 03 33 94 fa |*.i.T...-X...3..|" +peer0.org1.example.com | "2019-09-24 00:26:04.990 UTC [msp.identity] Verify -> DEBU 32e8 Verify: sig = 00000000 30 45 02 21 00 9f d3 22 bf 19 8b 8f 10 af 5f 51 |0E.!..."......_Q| +peer0.org1.example.com | 00000010 bf 10 94 c3 05 11 c0 94 f3 6b ef d6 cf df 56 26 |.........k....V&| +peer0.org1.example.com | 00000020 80 83 a1 0b 77 02 20 78 10 36 f6 9a 20 54 75 6c |....w. x.6.. Tul| +peer0.org1.example.com | 00000030 96 ea 49 cb 33 86 13 39 d9 90 a3 0c d7 69 30 c2 |..I.3..9.....i0.| +peer0.org1.example.com | 00000040 ce ed d5 fd ec 46 7f |.....F.|" +peer0.org1.example.com | "2019-09-24 00:26:04.990 UTC [cauthdsl] func2 -> DEBU 32e9 0xc003341a90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:04.990 UTC [cauthdsl] func1 -> DEBU 32ea 0xc003341a90 gate 1569284764989780400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:04.990 UTC [policies] Evaluate -> DEBU 32eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.990 UTC [policies] Evaluate -> DEBU 32ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.990 UTC [policies] Evaluate -> DEBU 32ed Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.990 UTC [policies] Evaluate -> DEBU 32ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:04.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 32ef Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:04.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:04.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f1 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:04.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f2 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:04.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:04.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:04.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32f6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.009 UTC [gossip.comm] func1 -> DEBU 32f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.009 UTC [gossip.gossip] handleMessage -> DEBU 32f8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.009 UTC [gossip.gossip] handleMessage -> DEBU 32f9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32fa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32fb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.010 UTC [gossip.comm] func1 -> DEBU 32fc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.010 UTC [gossip.gossip] handleMessage -> DEBU 32fd Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.010 UTC [gossip.gossip] handleMessage -> DEBU 32fe Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32ff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3300 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.015 UTC [msp] DeserializeIdentity -> DEBU 3301 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3302 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3303 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3304 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3305 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3306 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.016 UTC [gossip.comm] Send -> DEBU 3307 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3308 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3309 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.017 UTC [gossip.comm] Send -> DEBU 330a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:05.017 UTC [gossip.comm] sendToEndpoint -> DEBU 330b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.017 UTC [gossip.comm] sendToEndpoint -> DEBU 330c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.017 UTC [gossip.comm] sendToEndpoint -> DEBU 330d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.017 UTC [gossip.comm] sendToEndpoint -> DEBU 330e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.140 UTC [gossip.gossip] handleMessage -> DEBU 330f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.140 UTC [msp] DeserializeIdentity -> DEBU 3310 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.140 UTC [msp] DeserializeIdentity -> DEBU 3311 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.141 UTC [msp] DeserializeIdentity -> DEBU 3312 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.141 UTC [gossip.gossip] handleMessage -> DEBU 3313 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.689 UTC [gossip.comm] func1 -> DEBU 3314 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.689 UTC [gossip.gossip] handleMessage -> DEBU 3315 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.689 UTC [gossip.pull] HandleMessage -> DEBU 3316 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.689 UTC [gossip.pull] SendDigest -> DEBU 3317 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:05.689 UTC [gossip.gossip] handleMessage -> DEBU 3318 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.702 UTC [gossip.comm] func1 -> DEBU 3319 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.703 UTC [gossip.gossip] handleMessage -> DEBU 331a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.704 UTC [gossip.gossip] handleMessage -> DEBU 331b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 331c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.706 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 331d Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:05.708 UTC [msp] DeserializeIdentity -> DEBU 331e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 331f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3320 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3321 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 3322 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 3323 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 3324 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [cauthdsl] func1 -> DEBU 3325 0xc0032b1510 gate 1569284765711424600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3326 0xc0032b1510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3327 0xc0032b1510 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3328 0xc0032b1510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3329 0xc0032b1510 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [cauthdsl] func1 -> DEBU 332a 0xc0032b1510 gate 1569284765711424600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 332b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 332c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 332d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [cauthdsl] func1 -> DEBU 332e 0xc0032b1da0 gate 1569284765711698400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 332f 0xc0032b1da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3330 0xc0032b1da0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3331 0xc0032b1da0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [msp.identity] Verify -> DEBU 3332 Verify: digest = 00000000 3b 51 3e dd 59 cf 04 a3 9f d2 e0 dd 85 f8 f4 d5 |;Q>.Y...........| +peer0.org1.example.com | 00000010 27 d7 63 0e 71 04 18 84 bb 50 24 55 6c d5 17 73 |'.c.q....P$Ul..s|" +peer0.org1.example.com | "2019-09-24 00:26:05.711 UTC [msp.identity] Verify -> DEBU 3333 Verify: sig = 00000000 30 44 02 20 62 47 8b 3e 14 98 09 c5 b3 df 2d 97 |0D. bG.>......-.| +peer0.org1.example.com | 00000010 a5 f1 35 3e 54 3a b4 ed ab e0 49 e0 8b b3 c2 b1 |..5>T:....I.....| +peer0.org1.example.com | 00000020 b4 a1 52 dc 02 20 1f 81 1e ad 9c e8 32 ab ae c5 |..R.. ......2...| +peer0.org1.example.com | 00000030 1d 62 28 77 90 83 eb e4 0e 62 d1 f7 57 92 cc 29 |.b(w.....b..W..)| +peer0.org1.example.com | 00000040 c9 9b 18 81 5a b1 |....Z.|" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [cauthdsl] func2 -> DEBU 3334 0xc0032b1da0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [cauthdsl] func1 -> DEBU 3335 0xc0032b1da0 gate 1569284765711698400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [policies] Evaluate -> DEBU 3336 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [policies] Evaluate -> DEBU 3337 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [policies] Evaluate -> DEBU 3338 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [policies] Evaluate -> DEBU 3339 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [gossip.discovery] handleAliveMessage -> DEBU 333a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 333b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 333c updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 333d Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 333e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 333f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [gossip.discovery] handleAliveMessage -> DEBU 3340 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.712 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3341 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.721 UTC [msp] DeserializeIdentity -> DEBU 3342 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.721 UTC [msp] DeserializeIdentity -> DEBU 3343 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.721 UTC [msp] DeserializeIdentity -> DEBU 3344 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.721 UTC [msp] DeserializeIdentity -> DEBU 3345 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.722 UTC [msp] DeserializeIdentity -> DEBU 3346 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.722 UTC [msp] DeserializeIdentity -> DEBU 3347 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.722 UTC [msp] DeserializeIdentity -> DEBU 3348 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.728 UTC [gossip.comm] Send -> DEBU 3349 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:05.729 UTC [msp] DeserializeIdentity -> DEBU 334a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.729 UTC [gossip.comm] Send -> DEBU 334b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:05.729 UTC [gossip.comm] sendToEndpoint -> DEBU 334c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.730 UTC [gossip.comm] sendToEndpoint -> DEBU 334d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.730 UTC [gossip.comm] sendToEndpoint -> DEBU 334e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.730 UTC [gossip.comm] sendToEndpoint -> DEBU 334f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.744 UTC [gossip.comm] func1 -> DEBU 3350 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.744 UTC [gossip.gossip] handleMessage -> DEBU 3351 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.745 UTC [gossip.gossip] handleMessage -> DEBU 3352 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3353 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3354 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.746 UTC [gossip.gossip] handleMessage -> DEBU 3355 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.746 UTC [gossip.gossip] handleMessage -> DEBU 3356 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3357 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3358 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.794 UTC [gossip.comm] func1 -> DEBU 3359 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0204" signature:"0E\002!\000\315)5\014\0046d\310u\003\247\017\020LT\215\313'fJ\255\265\353u\312\312\230Wt\230d\323\002 4\347\017\263\246\311\026.&a\265Ob+8\203\225\030\343\356\003^\222!\207%\255R\245\220\006\013" secret_envelope:k\200\244\247\317\376@0p\207\001\316iE&\331\301\034\265\201\221\262q\357\\\324\310@\206\002 *\017v\007ISb\273\017\222:1Vxn%^\256\201\372\301\234c\255+{c\332\202%_\275" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.794 UTC [gossip.gossip] handleMessage -> DEBU 335a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0204" signature:"0E\002!\000\315)5\014\0046d\310u\003\247\017\020LT\215\313'fJ\255\265\353u\312\312\230Wt\230d\323\002 4\347\017\263\246\311\026.&a\265Ob+8\203\225\030\343\356\003^\222!\207%\255R\245\220\006\013" secret_envelope:k\200\244\247\317\376@0p\207\001\316iE&\331\301\034\265\201\221\262q\357\\\324\310@\206\002 *\017v\007ISb\273\017\222:1Vxn%^\256\201\372\301\234c\255+{c\332\202%_\275" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.794 UTC [gossip.gossip] handleMessage -> DEBU 335b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.794 UTC [gossip.discovery] handleMsgFromComm -> DEBU 335c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0204" signature:"0E\002!\000\315)5\014\0046d\310u\003\247\017\020LT\215\313'fJ\255\265\353u\312\312\230Wt\230d\323\002 4\347\017\263\246\311\026.&a\265Ob+8\203\225\030\343\356\003^\222!\207%\255R\245\220\006\013" secret_envelope:k\200\244\247\317\376@0p\207\001\316iE&\331\301\034\265\201\221\262q\357\\\324\310@\206\002 *\017v\007ISb\273\017\222:1Vxn%^\256\201\372\301\234c\255+{c\332\202%_\275" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.794 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 335d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:05.794 UTC [msp.identity] Verify -> DEBU 335e Verify: digest = 00000000 d5 d1 50 ff c3 1d d0 2e ea 05 5a a2 b5 9b 41 14 |..P.......Z...A.| +peer0.org1.example.com | 00000010 6e e0 c8 ab ed fd 94 8c d9 59 e0 3a b5 ff 13 29 |n........Y.:...)|" +peer0.org1.example.com | "2019-09-24 00:26:05.795 UTC [msp.identity] Verify -> DEBU 335f Verify: sig = 00000000 30 45 02 21 00 cd 29 35 0c 04 36 64 c8 75 03 a7 |0E.!..)5..6d.u..| +peer0.org1.example.com | 00000010 0f 10 4c 54 8d cb 27 66 4a ad b5 eb 75 ca ca 98 |..LT..'fJ...u...| +peer0.org1.example.com | 00000020 57 74 98 64 d3 02 20 34 e7 0f b3 a6 c9 16 2e 26 |Wt.d.. 4.......&| +peer0.org1.example.com | 00000030 61 b5 4f 62 2b 38 83 95 18 e3 ee 03 5e 92 21 87 |a.Ob+8......^.!.| +peer0.org1.example.com | 00000040 25 ad 52 a5 90 06 0b |%.R....|" +peer0.org1.example.com | "2019-09-24 00:26:05.795 UTC [msp.identity] Verify -> DEBU 3360 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:05.795 UTC [msp.identity] Verify -> DEBU 3361 Verify: sig = 00000000 30 45 02 21 00 ed 66 3e 6b 80 a4 a7 cf fe 40 30 |0E.!..f>k.....@0| +peer0.org1.example.com | 00000010 70 87 01 ce 69 45 26 d9 c1 1c b5 81 91 b2 71 ef |p...iE&.......q.| +peer0.org1.example.com | 00000020 5c d4 c8 40 86 02 20 2a 0f 76 07 49 53 62 bb 0f |\..@.. *.v.ISb..| +peer0.org1.example.com | 00000030 92 3a 31 56 78 6e 25 5e ae 81 fa c1 9c 63 ad 2b |.:1Vxn%^.....c.+| +peer0.org1.example.com | 00000040 7b 63 da 82 25 5f bd |{c..%_.|" +peer0.org1.example.com | "2019-09-24 00:26:05.795 UTC [gossip.discovery] handleAliveMessage -> DEBU 3362 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 3363 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:05.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 3364 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:05.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 3365 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:05.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 3366 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:05.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 3367 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.795 UTC [gossip.discovery] handleAliveMessage -> DEBU 3368 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.796 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3369 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:05.796 UTC [gossip.discovery] sendMemResponse -> DEBU 336a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:05.796 UTC [msp] DeserializeIdentity -> DEBU 336b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.796 UTC [msp] DeserializeIdentity -> DEBU 336c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:05.796 UTC [gossip.comm] Send -> DEBU 336d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:05.798 UTC [gossip.discovery] sendMemResponse -> DEBU 336e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0204" signature:"0E\002!\000\315)5\014\0046d\310u\003\247\017\020LT\215\313'fJ\255\265\353u\312\312\230Wt\230d\323\002 4\347\017\263\246\311\026.&a\265Ob+8\203\225\030\343\356\003^\222!\207%\255R\245\220\006\013" secret_envelope:k\200\244\247\317\376@0p\207\001\316iE&\331\301\034\265\201\221\262q\357\\\324\310@\206\002 *\017v\007ISb\273\017\222:1Vxn%^\256\201\372\301\234c\255+{c\332\202%_\275" > > alive: " +peer0.org1.example.com | "2019-09-24 00:26:05.798 UTC [gossip.comm] sendToEndpoint -> DEBU 336f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:05.798 UTC [gossip.comm] sendToEndpoint -> DEBU 3370 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:06.097 UTC [gossip.comm] func1 -> DEBU 3371 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:06.098 UTC [gossip.gossip] handleMessage -> DEBU 3372 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:06.098 UTC [msp] DeserializeIdentity -> DEBU 3373 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:06.098 UTC [msp] DeserializeIdentity -> DEBU 3374 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:06.098 UTC [msp] DeserializeIdentity -> DEBU 3375 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:06.098 UTC [gossip.gossip] handleMessage -> DEBU 3376 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.329 UTC [gossip.election] waitForInterrupt -> DEBU 3377 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.329 UTC [gossip.election] IsLeader -> DEBU 3378 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:07.329 UTC [msp] GetDefaultSigningIdentity -> DEBU 3379 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:07.329 UTC [msp.identity] Sign -> DEBU 337a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315100F1801 " +peer0.org1.example.com | "2019-09-24 00:26:07.329 UTC [msp.identity] Sign -> DEBU 337b Sign: digest: 4DE1E9467B74A9B429D911AC5762E260A720DC3CFFDD2714E8A448A22B5D264F " +peer0.org1.example.com | "2019-09-24 00:26:07.329 UTC [gossip.election] waitForInterrupt -> DEBU 337c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:07.338 UTC [msp] DeserializeIdentity -> DEBU 337d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.338 UTC [msp] DeserializeIdentity -> DEBU 337e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.338 UTC [msp] DeserializeIdentity -> DEBU 337f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.338 UTC [msp] DeserializeIdentity -> DEBU 3380 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.338 UTC [gossip.comm] Send -> DEBU 3381 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:07.339 UTC [msp] DeserializeIdentity -> DEBU 3382 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.339 UTC [msp] DeserializeIdentity -> DEBU 3383 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.339 UTC [gossip.comm] sendToEndpoint -> DEBU 3384 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.339 UTC [gossip.comm] sendToEndpoint -> DEBU 3385 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.711 UTC [gossip.pull] Hello -> DEBU 3386 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:07.711 UTC [gossip.comm] Send -> DEBU 3387 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:07.712 UTC [gossip.pull] Hello -> DEBU 3388 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:07.712 UTC [gossip.comm] Send -> DEBU 3389 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:07.716 UTC [gossip.comm] sendToEndpoint -> DEBU 338a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.717 UTC [gossip.comm] sendToEndpoint -> DEBU 338b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.712 UTC [gossip.pull] Hello -> DEBU 338c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:07.719 UTC [gossip.comm] Send -> DEBU 338d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:07.720 UTC [gossip.comm] sendToEndpoint -> DEBU 338e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.720 UTC [gossip.comm] sendToEndpoint -> DEBU 338f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.720 UTC [gossip.comm] sendToEndpoint -> DEBU 3390 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.720 UTC [gossip.comm] sendToEndpoint -> DEBU 3391 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.725 UTC [gossip.comm] func1 -> DEBU 3392 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.725 UTC [gossip.gossip] handleMessage -> DEBU 3393 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.725 UTC [gossip.pull] HandleMessage -> DEBU 3394 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.725 UTC [gossip.gossip] handleMessage -> DEBU 3395 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.726 UTC [gossip.gossip] handleMessage -> DEBU 3396 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.726 UTC [gossip.pull] HandleMessage -> DEBU 3397 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.726 UTC [gossip.gossip] handleMessage -> DEBU 3398 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.746 UTC [gossip.comm] func1 -> DEBU 3399 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.746 UTC [gossip.comm] func1 -> DEBU 339a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.746 UTC [gossip.gossip] handleMessage -> DEBU 339b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.746 UTC [gossip.gossip] handleMessage -> DEBU 339c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.746 UTC [gossip.gossip] handleMessage -> DEBU 339d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.746 UTC [gossip.pull] HandleMessage -> DEBU 339e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.746 UTC [gossip.gossip] handleMessage -> DEBU 339f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33a0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.746 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33a1 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:07.747 UTC [msp.identity] Verify -> DEBU 33a2 Verify: digest = 00000000 af 57 21 df 7d 0d f0 e5 69 dc 0c d0 c2 f5 7c f3 |.W!.}...i.....|.| +peer0.org1.example.com | 00000010 7a 7f 71 7a 58 b0 46 38 bb 47 8d 52 d8 31 45 86 |z.qzX.F8.G.R.1E.|" +peer0.org1.example.com | "2019-09-24 00:26:07.747 UTC [msp.identity] Verify -> DEBU 33a3 Verify: sig = 00000000 30 44 02 20 79 de 18 2c f0 54 b0 c0 71 10 0a 6d |0D. y..,.T..q..m| +peer0.org1.example.com | 00000010 22 3f 4a 66 f8 99 48 4e 3d 6d b5 c6 77 0c 7d 34 |"?Jf..HN=m..w.}4| +peer0.org1.example.com | 00000020 57 6e 25 fa 02 20 52 41 c9 4f ec 74 6b 05 ca c4 |Wn%.. RA.O.tk...| +peer0.org1.example.com | 00000030 00 4a b3 7c f6 73 22 be 4f d7 a8 d6 10 77 f4 89 |.J.|.s".O....w..| +peer0.org1.example.com | 00000040 cf 11 39 37 28 0f |..97(.|" +peer0.org1.example.com | "2019-09-24 00:26:07.745 UTC [gossip.comm] func1 -> DEBU 33a4 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.748 UTC [gossip.gossip] handleMessage -> DEBU 33a5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 33a6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 33a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:07.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 33a8 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:07.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 33a9 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:07.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 33aa Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:07.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ab Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.751 UTC [gossip.discovery] handleAliveMessage -> DEBU 33ac Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.751 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33ad Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.751 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33ae Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.751 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33af Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.751 UTC [gossip.gossip] handleMessage -> DEBU 33b0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.752 UTC [gossip.gossip] handleMessage -> DEBU 33b1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.752 UTC [gossip.gossip] handleMessage -> DEBU 33b2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33b3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.756 UTC [msp] DeserializeIdentity -> DEBU 33b4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.756 UTC [msp] DeserializeIdentity -> DEBU 33b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.757 UTC [msp] DeserializeIdentity -> DEBU 33b6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.757 UTC [gossip.comm] Send -> DEBU 33b7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:07.757 UTC [msp] DeserializeIdentity -> DEBU 33b8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.757 UTC [gossip.comm] Send -> DEBU 33b9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:07.757 UTC [gossip.comm] sendToEndpoint -> DEBU 33ba Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.757 UTC [gossip.comm] sendToEndpoint -> DEBU 33bb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.757 UTC [gossip.comm] sendToEndpoint -> DEBU 33bc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.757 UTC [gossip.comm] sendToEndpoint -> DEBU 33bd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33be Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.772 UTC [msp] GetDefaultSigningIdentity -> DEBU 33bf Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:07.773 UTC [msp.identity] Sign -> DEBU 33c0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151031 " +peer0.org1.example.com | "2019-09-24 00:26:07.773 UTC [msp.identity] Sign -> DEBU 33c1 Sign: digest: 8EBFADE8E504E526AFD1F58F1198FC36C182E1F4E9317A9F37CF4967307CF12B " +peer0.org1.example.com | "2019-09-24 00:26:07.773 UTC [msp] GetDefaultSigningIdentity -> DEBU 33c2 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:07.773 UTC [msp.identity] Sign -> DEBU 33c3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:07.773 UTC [msp.identity] Sign -> DEBU 33c4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:07.773 UTC [gossip.comm] Send -> DEBU 33c5 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:07.773 UTC [msp] DeserializeIdentity -> DEBU 33c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.773 UTC [gossip.comm] Send -> DEBU 33c7 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:07.774 UTC [msp] DeserializeIdentity -> DEBU 33c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.774 UTC [gossip.comm] Send -> DEBU 33c9 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:07.774 UTC [gossip.comm] sendToEndpoint -> DEBU 33ca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.784 UTC [gossip.comm] sendToEndpoint -> DEBU 33cb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.785 UTC [gossip.comm] sendToEndpoint -> DEBU 33cc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.785 UTC [gossip.comm] sendToEndpoint -> DEBU 33cd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.785 UTC [gossip.comm] sendToEndpoint -> DEBU 33ce Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.785 UTC [gossip.comm] sendToEndpoint -> DEBU 33cf Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.805 UTC [gossip.comm] func1 -> DEBU 33d0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.805 UTC [gossip.gossip] handleMessage -> DEBU 33d1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.805 UTC [gossip.gossip] handleMessage -> DEBU 33d2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33d3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.806 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33d4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:07.806 UTC [msp.identity] Verify -> DEBU 33d5 Verify: digest = 00000000 8e bf ad e8 e5 04 e5 26 af d1 f5 8f 11 98 fc 36 |.......&.......6| +peer0.org1.example.com | 00000010 c1 82 e1 f4 e9 31 7a 9f 37 cf 49 67 30 7c f1 2b |.....1z.7.Ig0|.+|" +peer0.org1.example.com | "2019-09-24 00:26:07.806 UTC [msp.identity] Verify -> DEBU 33d6 Verify: sig = 00000000 30 44 02 20 60 57 80 25 0b 83 34 df 2b e6 c5 5c |0D. `W.%..4.+..\| +peer0.org1.example.com | 00000010 54 1d 6c 0b 39 a6 27 ca be 97 da ce e0 2c 92 69 |T.l.9.'......,.i| +peer0.org1.example.com | 00000020 cf 16 33 84 02 20 55 74 e3 d6 c9 9f e2 c5 3f f5 |..3.. Ut......?.| +peer0.org1.example.com | 00000030 cb 5f 9b b4 1c 04 b1 e0 2b 00 1c 9a 72 80 fa 12 |._......+...r...| +peer0.org1.example.com | 00000040 8a 5b 5f 45 0b 61 |.[_E.a|" +peer0.org1.example.com | "2019-09-24 00:26:07.807 UTC [msp.identity] Verify -> DEBU 33d7 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:07.807 UTC [msp.identity] Verify -> DEBU 33d8 Verify: sig = 00000000 30 45 02 21 00 ea ae 09 a3 d9 e5 a1 42 0a 4c b2 |0E.!........B.L.| +peer0.org1.example.com | 00000010 7b e8 25 a0 76 b1 d7 2c 47 60 63 5b 2e f4 d1 df |{.%.v..,G`c[....| +peer0.org1.example.com | 00000020 a4 c1 0b f9 32 02 20 36 8b 63 94 7b 05 a2 6d 68 |....2. 6.c.{..mh| +peer0.org1.example.com | 00000030 ea 27 ce 95 d1 21 a5 0f 2b f4 71 ba b0 23 9e ba |.'...!..+.q..#..| +peer0.org1.example.com | 00000040 2c 6a ae 01 be 5d 3a |,j...]:|" +peer0.org1.example.com | "2019-09-24 00:26:07.809 UTC [gossip.comm] func1 -> DEBU 33d9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.810 UTC [gossip.gossip] handleMessage -> DEBU 33da Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 33db Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.848 UTC [gossip.discovery] isSentByMe -> DEBU 33dc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 33dd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33de Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.849 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33e0 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:07.849 UTC [msp.identity] Verify -> DEBU 33e1 Verify: digest = 00000000 8e bf ad e8 e5 04 e5 26 af d1 f5 8f 11 98 fc 36 |.......&.......6| +peer0.org1.example.com | 00000010 c1 82 e1 f4 e9 31 7a 9f 37 cf 49 67 30 7c f1 2b |.....1z.7.Ig0|.+|" +peer0.org1.example.com | "2019-09-24 00:26:07.849 UTC [msp.identity] Verify -> DEBU 33e2 Verify: sig = 00000000 30 44 02 20 60 57 80 25 0b 83 34 df 2b e6 c5 5c |0D. `W.%..4.+..\| +peer0.org1.example.com | 00000010 54 1d 6c 0b 39 a6 27 ca be 97 da ce e0 2c 92 69 |T.l.9.'......,.i| +peer0.org1.example.com | 00000020 cf 16 33 84 02 20 55 74 e3 d6 c9 9f e2 c5 3f f5 |..3.. Ut......?.| +peer0.org1.example.com | 00000030 cb 5f 9b b4 1c 04 b1 e0 2b 00 1c 9a 72 80 fa 12 |._......+...r...| +peer0.org1.example.com | 00000040 8a 5b 5f 45 0b 61 |.[_E.a|" +peer0.org1.example.com | "2019-09-24 00:26:07.850 UTC [gossip.gossip] handleMessage -> DEBU 33e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.850 UTC [gossip.gossip] handleMessage -> DEBU 33e4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.850 UTC [gossip.discovery] handleAliveMessage -> DEBU 33e5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.850 UTC [gossip.discovery] isSentByMe -> DEBU 33e6 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 33e7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33e8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33e9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33ea Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:07.851 UTC [msp.identity] Verify -> DEBU 33eb Verify: digest = 00000000 8e bf ad e8 e5 04 e5 26 af d1 f5 8f 11 98 fc 36 |.......&.......6| +peer0.org1.example.com | 00000010 c1 82 e1 f4 e9 31 7a 9f 37 cf 49 67 30 7c f1 2b |.....1z.7.Ig0|.+|" +peer0.org1.example.com | "2019-09-24 00:26:07.851 UTC [msp.identity] Verify -> DEBU 33ec Verify: sig = 00000000 30 44 02 20 60 57 80 25 0b 83 34 df 2b e6 c5 5c |0D. `W.%..4.+..\| +peer0.org1.example.com | 00000010 54 1d 6c 0b 39 a6 27 ca be 97 da ce e0 2c 92 69 |T.l.9.'......,.i| +peer0.org1.example.com | 00000020 cf 16 33 84 02 20 55 74 e3 d6 c9 9f e2 c5 3f f5 |..3.. Ut......?.| +peer0.org1.example.com | 00000030 cb 5f 9b b4 1c 04 b1 e0 2b 00 1c 9a 72 80 fa 12 |._......+...r...| +peer0.org1.example.com | 00000040 8a 5b 5f 45 0b 61 |.[_E.a|" +peer0.org1.example.com | "2019-09-24 00:26:07.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 33ed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.852 UTC [gossip.discovery] isSentByMe -> DEBU 33ee Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 33ef Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33f0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.852 UTC [gossip.gossip] handleMessage -> DEBU 33f1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.955 UTC [gossip.gossip] handleMessage -> DEBU 33f2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.955 UTC [gossip.pull] HandleMessage -> DEBU 33f3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.955 UTC [msp] DeserializeIdentity -> DEBU 33f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.955 UTC [msp] DeserializeIdentity -> DEBU 33f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.955 UTC [msp] DeserializeIdentity -> DEBU 33f6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.956 UTC [msp] DeserializeIdentity -> DEBU 33f7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.956 UTC [msp] DeserializeIdentity -> DEBU 33f8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.956 UTC [msp] DeserializeIdentity -> DEBU 33f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.956 UTC [gossip.pull] SendDigest -> DEBU 33fa Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:07.956 UTC [gossip.gossip] handleMessage -> DEBU 33fb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.999 UTC [gossip.gossip] handleMessage -> DEBU 33fc Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.999 UTC [gossip.gossip] handleMessage -> DEBU 33fd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:07.999 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33fe Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:07.999 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33ff Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:07.999 UTC [msp] DeserializeIdentity -> DEBU 3400 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:07.999 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3401 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:07.999 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3402 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:07.999 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3403 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.000 UTC [policies] Evaluate -> DEBU 3404 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.000 UTC [policies] Evaluate -> DEBU 3405 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:08.000 UTC [policies] Evaluate -> DEBU 3406 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.000 UTC [cauthdsl] func1 -> DEBU 3407 0xc0030eeda0 gate 1569284768000267500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.000 UTC [cauthdsl] func2 -> DEBU 3408 0xc0030eeda0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.000 UTC [cauthdsl] func2 -> DEBU 3409 0xc0030eeda0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.000 UTC [cauthdsl] func2 -> DEBU 340a 0xc0030eeda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:08.000 UTC [cauthdsl] func2 -> DEBU 340b 0xc0030eeda0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.000 UTC [cauthdsl] func1 -> DEBU 340c 0xc0030eeda0 gate 1569284768000267500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.004 UTC [policies] Evaluate -> DEBU 340d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.004 UTC [policies] Evaluate -> DEBU 340e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.005 UTC [policies] Evaluate -> DEBU 340f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.005 UTC [cauthdsl] func1 -> DEBU 3410 0xc0030ef5e0 gate 1569284768005142300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.005 UTC [cauthdsl] func2 -> DEBU 3411 0xc0030ef5e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.005 UTC [cauthdsl] func2 -> DEBU 3412 0xc0030ef5e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.005 UTC [cauthdsl] func2 -> DEBU 3413 0xc0030ef5e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.013 UTC [msp.identity] Verify -> DEBU 3414 Verify: digest = 00000000 6d 2d 5d 87 c0 86 57 94 fd 77 55 05 b2 ad 74 8a |m-]...W..wU...t.| +peer0.org1.example.com | 00000010 06 27 b3 c7 6b 41 b0 d2 a8 95 23 ae 5b 33 08 21 |.'..kA....#.[3.!|" +peer0.org1.example.com | "2019-09-24 00:26:08.013 UTC [msp.identity] Verify -> DEBU 3415 Verify: sig = 00000000 30 44 02 20 13 32 9d d3 66 6c 33 18 32 ed 26 fc |0D. .2..fl3.2.&.| +peer0.org1.example.com | 00000010 33 0d 2b 44 3d 38 21 df 0e a6 05 69 4b 4d 50 bb |3.+D=8!....iKMP.| +peer0.org1.example.com | 00000020 d9 0c 97 c0 02 20 49 c3 89 1e b9 10 d3 e1 d6 4f |..... I........O| +peer0.org1.example.com | 00000030 ce dc 53 7e 65 a5 c3 fb 20 07 73 fb 69 ff 55 c2 |..S~e... .s.i.U.| +peer0.org1.example.com | 00000040 90 b1 b5 13 fc ab |......|" +peer0.org1.example.com | "2019-09-24 00:26:08.015 UTC [cauthdsl] func2 -> DEBU 3416 0xc0030ef5e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.015 UTC [cauthdsl] func1 -> DEBU 3417 0xc0030ef5e0 gate 1569284768005142300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:08.015 UTC [policies] Evaluate -> DEBU 3418 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.015 UTC [policies] Evaluate -> DEBU 3419 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.016 UTC [policies] Evaluate -> DEBU 341a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.016 UTC [policies] Evaluate -> DEBU 341b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.016 UTC [gossip.discovery] handleAliveMessage -> DEBU 341c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 341d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:08.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 341e updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:08.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 341f Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:08.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 3420 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:08.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 3421 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.019 UTC [gossip.discovery] handleAliveMessage -> DEBU 3422 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.019 UTC [gossip.discovery] sendMemResponse -> DEBU 3423 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:08.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3424 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.019 UTC [msp] DeserializeIdentity -> DEBU 3425 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.019 UTC [msp] DeserializeIdentity -> DEBU 3426 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.019 UTC [msp] DeserializeIdentity -> DEBU 3427 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.019 UTC [gossip.comm] Send -> DEBU 3428 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:08.020 UTC [gossip.discovery] sendMemResponse -> DEBU 3429 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0205" signature:"0D\002 y\336\030,\360T\260\300q\020\nm\"?Jf\370\231HN=m\265\306w\014}4Wn%\372\002 RA\311O\354tk\005\312\304\000J\263|\366s\"\276O\327\250\326\020w\364\211\317\02197(\017" > alive:\024\230\t\305\263\337-\227\245\3615>T:\264\355\253\340I\340\213\263\302\261\264\241R\334\002 \037\201\036\255\234\3502\253\256\305\035b(w\220\203\353\344\016b\321\367W\222\314)\311\233\030\201Z\261" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:08.020 UTC [gossip.comm] sendToEndpoint -> DEBU 342a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.020 UTC [gossip.comm] sendToEndpoint -> DEBU 342b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.152 UTC [msp] DeserializeIdentity -> DEBU 342c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.153 UTC [msp] DeserializeIdentity -> DEBU 342d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.153 UTC [gossip.comm] Send -> DEBU 342e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 342f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3430 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3431 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3432 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3433 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3434 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.161 UTC [gossip.comm] func1 -> DEBU 3435 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.161 UTC [gossip.gossip] handleMessage -> DEBU 3436 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.161 UTC [msp] DeserializeIdentity -> DEBU 3437 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.161 UTC [msp] DeserializeIdentity -> DEBU 3438 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.161 UTC [msp] DeserializeIdentity -> DEBU 3439 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.161 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 343a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:08.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 343b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 343c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.161 UTC [policies] Evaluate -> DEBU 343d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [policies] Evaluate -> DEBU 343e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [policies] Evaluate -> DEBU 343f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [cauthdsl] func1 -> DEBU 3440 0xc0030d9910 gate 1569284768162124800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 3441 0xc0030d9910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 3442 0xc0030d9910 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 3443 0xc0030d9910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 3444 0xc0030d9910 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [cauthdsl] func1 -> DEBU 3445 0xc0030d9910 gate 1569284768162124800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [policies] Evaluate -> DEBU 3446 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [policies] Evaluate -> DEBU 3447 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [policies] Evaluate -> DEBU 3448 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [cauthdsl] func1 -> DEBU 3449 0xc003048190 gate 1569284768162580800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 344a 0xc003048190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 344b 0xc003048190 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 344c 0xc003048190 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [msp.identity] Verify -> DEBU 344d Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:08.162 UTC [msp.identity] Verify -> DEBU 344e Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:08.163 UTC [cauthdsl] func2 -> DEBU 344f 0xc003048190 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.163 UTC [cauthdsl] func1 -> DEBU 3450 0xc003048190 gate 1569284768162580800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:08.163 UTC [policies] Evaluate -> DEBU 3451 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.163 UTC [policies] Evaluate -> DEBU 3452 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.163 UTC [policies] Evaluate -> DEBU 3453 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.163 UTC [policies] Evaluate -> DEBU 3454 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.163 UTC [msp.identity] Verify -> DEBU 3455 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:08.163 UTC [msp.identity] Verify -> DEBU 3456 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:08.163 UTC [msp] DeserializeIdentity -> DEBU 3457 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.164 UTC [msp] DeserializeIdentity -> DEBU 3458 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.164 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3459 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:08.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 345a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 345b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.164 UTC [policies] Evaluate -> DEBU 345c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.164 UTC [policies] Evaluate -> DEBU 345d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:08.164 UTC [policies] Evaluate -> DEBU 345e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.164 UTC [cauthdsl] func1 -> DEBU 345f 0xc002c16080 gate 1569284768164457100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.164 UTC [cauthdsl] func2 -> DEBU 3460 0xc002c16080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.164 UTC [cauthdsl] func2 -> DEBU 3461 0xc002c16080 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.165 UTC [cauthdsl] func2 -> DEBU 3463 0xc002c16080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:08.165 UTC [cauthdsl] func2 -> DEBU 3464 0xc002c16080 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.165 UTC [cauthdsl] func1 -> DEBU 3465 0xc002c16080 gate 1569284768164457100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.166 UTC [policies] Evaluate -> DEBU 3466 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.166 UTC [policies] Evaluate -> DEBU 3467 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.166 UTC [policies] Evaluate -> DEBU 3468 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.166 UTC [cauthdsl] func1 -> DEBU 3469 0xc002c16900 gate 1569284768166138400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.166 UTC [cauthdsl] func2 -> DEBU 346a 0xc002c16900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.166 UTC [cauthdsl] func2 -> DEBU 346b 0xc002c16900 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.165 UTC [gossip.comm] func1 -> DEBU 3462 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.166 UTC [cauthdsl] func2 -> DEBU 346c 0xc002c16900 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.178 UTC [msp.identity] Verify -> DEBU 346d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:08.178 UTC [msp.identity] Verify -> DEBU 346e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:08.178 UTC [cauthdsl] func2 -> DEBU 346f 0xc002c16900 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [cauthdsl] func1 -> DEBU 3470 0xc002c16900 gate 1569284768166138400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [policies] Evaluate -> DEBU 3471 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [policies] Evaluate -> DEBU 3472 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [policies] Evaluate -> DEBU 3473 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [policies] Evaluate -> DEBU 3474 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [msp.identity] Verify -> DEBU 3475 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [msp.identity] Verify -> DEBU 3476 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [gossip.gossip] handleMessage -> DEBU 3477 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [gossip.gossip] handleMessage -> DEBU 3478 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [msp] DeserializeIdentity -> DEBU 3479 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [msp] DeserializeIdentity -> DEBU 347a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.179 UTC [msp] DeserializeIdentity -> DEBU 347b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.180 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 347c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:08.180 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 347d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.180 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 347e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.180 UTC [policies] Evaluate -> DEBU 347f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.180 UTC [policies] Evaluate -> DEBU 3480 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:08.180 UTC [policies] Evaluate -> DEBU 3481 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.180 UTC [cauthdsl] func1 -> DEBU 3482 0xc002beac90 gate 1569284768180889900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 3483 0xc002beac90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 3484 0xc002beac90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 3485 0xc002beac90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 3486 0xc002beac90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [cauthdsl] func1 -> DEBU 3487 0xc002beac90 gate 1569284768180889900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [policies] Evaluate -> DEBU 3488 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [policies] Evaluate -> DEBU 3489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [policies] Evaluate -> DEBU 348a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [cauthdsl] func1 -> DEBU 348b 0xc002beb4d0 gate 1569284768181401900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 348c 0xc002beb4d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 348d 0xc002beb4d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 348e 0xc002beb4d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.181 UTC [msp.identity] Verify -> DEBU 348f Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:08.182 UTC [msp.identity] Verify -> DEBU 3490 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:08.182 UTC [cauthdsl] func2 -> DEBU 3491 0xc002beb4d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.182 UTC [cauthdsl] func1 -> DEBU 3492 0xc002beb4d0 gate 1569284768181401900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:08.182 UTC [policies] Evaluate -> DEBU 3493 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.182 UTC [policies] Evaluate -> DEBU 3494 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.182 UTC [policies] Evaluate -> DEBU 3495 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.182 UTC [policies] Evaluate -> DEBU 3496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.183 UTC [msp.identity] Verify -> DEBU 3497 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:08.183 UTC [msp.identity] Verify -> DEBU 3498 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:08.194 UTC [msp.identity] Verify -> DEBU 3499 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:08.194 UTC [msp.identity] Verify -> DEBU 349a Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:08.194 UTC [msp] DeserializeIdentity -> DEBU 349b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.194 UTC [msp] DeserializeIdentity -> DEBU 349c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.194 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 349d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 349e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 349f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [cauthdsl] func1 -> DEBU 34a3 0xc002bdbae0 gate 1569284768195238900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34a4 0xc002bdbae0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34a5 0xc002bdbae0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34a6 0xc002bdbae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34a7 0xc002bdbae0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [cauthdsl] func1 -> DEBU 34a8 0xc002bdbae0 gate 1569284768195238900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [cauthdsl] func1 -> DEBU 34ac 0xc002b46330 gate 1569284768195688400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34ad 0xc002b46330 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34ae 0xc002b46330 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34af 0xc002b46330 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [msp.identity] Verify -> DEBU 34b0 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:08.195 UTC [msp.identity] Verify -> DEBU 34b1 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:08.196 UTC [cauthdsl] func2 -> DEBU 34b2 0xc002b46330 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.196 UTC [cauthdsl] func1 -> DEBU 34b3 0xc002b46330 gate 1569284768195688400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:08.196 UTC [policies] Evaluate -> DEBU 34b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.196 UTC [policies] Evaluate -> DEBU 34b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.196 UTC [policies] Evaluate -> DEBU 34b6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.196 UTC [policies] Evaluate -> DEBU 34b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.196 UTC [gossip.gossip] handleMessage -> DEBU 34b8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.197 UTC [gossip.gossip] handleMessage -> DEBU 34b9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.198 UTC [msp.identity] Verify -> DEBU 34ba Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:08.199 UTC [msp.identity] Verify -> DEBU 34bb Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:08.200 UTC [msp.identity] Verify -> DEBU 34bc Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:08.200 UTC [msp.identity] Verify -> DEBU 34bd Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:08.201 UTC [msp] DeserializeIdentity -> DEBU 34be Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.201 UTC [msp] DeserializeIdentity -> DEBU 34bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34c1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34c2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func1 -> DEBU 34c6 0xc002b1abc0 gate 1569284768223399600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34c7 0xc002b1abc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34c8 0xc002b1abc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34c9 0xc002b1abc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34ca 0xc002b1abc0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func1 -> DEBU 34cb 0xc002b1abc0 gate 1569284768223399600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func1 -> DEBU 34cf 0xc002b1b400 gate 1569284768223671600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34d0 0xc002b1b400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34d1 0xc002b1b400 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34d2 0xc002b1b400 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [msp.identity] Verify -> DEBU 34d3 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [msp.identity] Verify -> DEBU 34d4 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34d5 0xc002b1b400 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.223 UTC [cauthdsl] func1 -> DEBU 34d6 0xc002b1b400 gate 1569284768223671600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34d9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [msp] DeserializeIdentity -> DEBU 34db Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [msp] DeserializeIdentity -> DEBU 34dc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34de Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34df Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [cauthdsl] func1 -> DEBU 34e3 0xc002aa4c70 gate 1569284768224525500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34e4 0xc002aa4c70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34e5 0xc002aa4c70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34e6 0xc002aa4c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34e7 0xc002aa4c70 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [cauthdsl] func1 -> DEBU 34e8 0xc002aa4c70 gate 1569284768224525500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34e9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [cauthdsl] func1 -> DEBU 34ec 0xc002aa54b0 gate 1569284768224887200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34ed 0xc002aa54b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34ee 0xc002aa54b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34ef 0xc002aa54b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.225 UTC [msp.identity] Verify -> DEBU 34f0 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:08.225 UTC [msp.identity] Verify -> DEBU 34f1 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:08.225 UTC [cauthdsl] func2 -> DEBU 34f2 0xc002aa54b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.225 UTC [cauthdsl] func1 -> DEBU 34f3 0xc002aa54b0 gate 1569284768224887200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:08.225 UTC [policies] Evaluate -> DEBU 34f4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.225 UTC [policies] Evaluate -> DEBU 34f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.225 UTC [policies] Evaluate -> DEBU 34f6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.225 UTC [policies] Evaluate -> DEBU 34f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.225 UTC [gossip.gossip] handleMessage -> DEBU 34f8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.307 UTC [msp] DeserializeIdentity -> DEBU 34f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.307 UTC [msp] DeserializeIdentity -> DEBU 34fa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.307 UTC [gossip.pull] Hello -> DEBU 34fb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:08.307 UTC [msp] DeserializeIdentity -> DEBU 34fc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.307 UTC [msp] DeserializeIdentity -> DEBU 34fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.307 UTC [gossip.comm] Send -> DEBU 34fe Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:08.307 UTC [gossip.comm] sendToEndpoint -> DEBU 34ff Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.307 UTC [gossip.comm] sendToEndpoint -> DEBU 3500 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.308 UTC [gossip.comm] func1 -> DEBU 3501 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.308 UTC [gossip.gossip] handleMessage -> DEBU 3502 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.308 UTC [gossip.pull] HandleMessage -> DEBU 3503 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.308 UTC [gossip.gossip] handleMessage -> DEBU 3504 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.646 UTC [gossip.comm] func1 -> DEBU 3505 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.646 UTC [gossip.gossip] handleMessage -> DEBU 3506 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.647 UTC [msp] DeserializeIdentity -> DEBU 3507 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.647 UTC [msp] DeserializeIdentity -> DEBU 3508 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.647 UTC [gossip.gossip] handleMessage -> DEBU 3509 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.725 UTC [gossip.comm] func1 -> DEBU 350a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.725 UTC [gossip.gossip] handleMessage -> DEBU 350b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.725 UTC [gossip.gossip] handleMessage -> DEBU 350c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.725 UTC [gossip.discovery] handleMsgFromComm -> DEBU 350d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.725 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 350e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:08.725 UTC [msp] DeserializeIdentity -> DEBU 350f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.725 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3510 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:08.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3511 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3512 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:08.725 UTC [policies] Evaluate -> DEBU 3513 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 3514 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 3515 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func1 -> DEBU 3516 0xc002a2f830 gate 1569284768726079600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3517 0xc002a2f830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3518 0xc002a2f830 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3519 0xc002a2f830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 351a 0xc002a2f830 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func1 -> DEBU 351b 0xc002a2f830 gate 1569284768726079600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 351c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 351d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 351e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func1 -> DEBU 351f 0xc002a26070 gate 1569284768726347400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3520 0xc002a26070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3521 0xc002a26070 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3522 0xc002a26070 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [msp.identity] Verify -> DEBU 3523 Verify: digest = 00000000 dc 13 fd 54 d9 fd 6f ba 30 cf 15 f2 9b 23 8b 6d |...T..o.0....#.m| +peer0.org1.example.com | 00000010 1a 60 26 68 1c 48 e7 a5 78 dc a0 4a c5 ba 69 52 |.`&h.H..x..J..iR|" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [msp.identity] Verify -> DEBU 3524 Verify: sig = 00000000 30 44 02 20 7c 47 2c 82 27 7c a6 e4 4d 17 30 13 |0D. |G,.'|..M.0.| +peer0.org1.example.com | 00000010 df 16 6e 8a cf a9 d0 a9 08 cf 04 d9 ae c4 fc 49 |..n............I| +peer0.org1.example.com | 00000020 03 7b fa e9 02 20 79 8e f0 e9 ae c6 f7 01 5d 33 |.{... y.......]3| +peer0.org1.example.com | 00000030 40 29 94 af 7a 81 99 d3 50 82 45 87 22 1d 28 c4 |@)..z...P.E.".(.| +peer0.org1.example.com | 00000040 2f 2d 9b 83 e6 11 |/-....|" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3525 0xc002a26070 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [cauthdsl] func1 -> DEBU 3526 0xc002a26070 gate 1569284768726347400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 3527 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 3528 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 3529 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 352a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [gossip.discovery] handleAliveMessage -> DEBU 352b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 352c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 352d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 352e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:08.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 352f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:08.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 3530 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 3531 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.727 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3532 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.727 UTC [gossip.discovery] sendMemResponse -> DEBU 3533 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:08.727 UTC [msp] DeserializeIdentity -> DEBU 3534 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.727 UTC [msp] DeserializeIdentity -> DEBU 3535 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.727 UTC [msp] DeserializeIdentity -> DEBU 3536 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.727 UTC [gossip.comm] Send -> DEBU 3537 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:08.727 UTC [gossip.discovery] sendMemResponse -> DEBU 3538 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0205" signature:"0D\002 y\336\030,\360T\260\300q\020\nm\"?Jf\370\231HN=m\265\306w\014}4Wn%\372\002 RA\311O\354tk\005\312\304\000J\263|\366s\"\276O\327\250\326\020w\364\211\317\02197(\017" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:08.727 UTC [gossip.comm] sendToEndpoint -> DEBU 3539 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.727 UTC [gossip.comm] sendToEndpoint -> DEBU 353a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.747 UTC [gossip.comm] func1 -> DEBU 353b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.747 UTC [gossip.gossip] handleMessage -> DEBU 353c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.747 UTC [gossip.pull] HandleMessage -> DEBU 353d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.747 UTC [msp] DeserializeIdentity -> DEBU 353e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.747 UTC [msp] DeserializeIdentity -> DEBU 353f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.747 UTC [msp] DeserializeIdentity -> DEBU 3540 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.747 UTC [msp] DeserializeIdentity -> DEBU 3541 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.747 UTC [msp] DeserializeIdentity -> DEBU 3542 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.748 UTC [msp] DeserializeIdentity -> DEBU 3543 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:08.748 UTC [gossip.pull] SendDigest -> DEBU 3544 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:08.748 UTC [gossip.gossip] handleMessage -> DEBU 3545 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:08.849 UTC [gossip.comm] func1 -> DEBU 3546 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.849 UTC [gossip.gossip] handleMessage -> DEBU 3547 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.849 UTC [gossip.pull] HandleMessage -> DEBU 3548 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:08.849 UTC [gossip.pull] SendDigest -> DEBU 3549 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:08.850 UTC [gossip.gossip] handleMessage -> DEBU 354a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.143 UTC [gossip.gossip] handleMessage -> DEBU 354b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.143 UTC [msp] DeserializeIdentity -> DEBU 354c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.143 UTC [msp] DeserializeIdentity -> DEBU 354d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.143 UTC [msp] DeserializeIdentity -> DEBU 354e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.144 UTC [gossip.gossip] handleMessage -> DEBU 354f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.625 UTC [msp] GetDefaultSigningIdentity -> DEBU 3550 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:09.625 UTC [msp.identity] Sign -> DEBU 3551 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151032 " +peer0.org1.example.com | "2019-09-24 00:26:09.625 UTC [msp.identity] Sign -> DEBU 3552 Sign: digest: 4EAC1F592D305E81128EDA2017A855A3501DD070D3D6087FAB2709EF1D750DC3 " +peer0.org1.example.com | "2019-09-24 00:26:09.625 UTC [msp] GetDefaultSigningIdentity -> DEBU 3553 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:09.625 UTC [msp.identity] Sign -> DEBU 3554 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:09.625 UTC [msp.identity] Sign -> DEBU 3555 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:09.626 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3556 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:09.639 UTC [msp] DeserializeIdentity -> DEBU 3557 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.639 UTC [msp] DeserializeIdentity -> DEBU 3558 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.639 UTC [gossip.comm] Send -> DEBU 3559 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:09.639 UTC [msp] DeserializeIdentity -> DEBU 355a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.639 UTC [gossip.comm] Send -> DEBU 355b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:09.639 UTC [msp] DeserializeIdentity -> DEBU 355c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.639 UTC [gossip.comm] Send -> DEBU 355d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:09.639 UTC [gossip.comm] sendToEndpoint -> DEBU 355e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.639 UTC [gossip.comm] sendToEndpoint -> DEBU 355f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.640 UTC [gossip.comm] sendToEndpoint -> DEBU 3560 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.640 UTC [gossip.comm] sendToEndpoint -> DEBU 3561 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.640 UTC [gossip.comm] sendToEndpoint -> DEBU 3562 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.640 UTC [gossip.comm] sendToEndpoint -> DEBU 3563 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.667 UTC [gossip.comm] func1 -> DEBU 3564 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.667 UTC [gossip.gossip] handleMessage -> DEBU 3565 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.667 UTC [gossip.gossip] handleMessage -> DEBU 3566 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3567 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.667 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3568 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:09.667 UTC [msp.identity] Verify -> DEBU 3569 Verify: digest = 00000000 4e ac 1f 59 2d 30 5e 81 12 8e da 20 17 a8 55 a3 |N..Y-0^.... ..U.| +peer0.org1.example.com | 00000010 50 1d d0 70 d3 d6 08 7f ab 27 09 ef 1d 75 0d c3 |P..p.....'...u..|" +peer0.org1.example.com | "2019-09-24 00:26:09.667 UTC [msp.identity] Verify -> DEBU 356a Verify: sig = 00000000 30 44 02 20 60 4f fb 6a f4 76 30 d1 83 9c e7 8e |0D. `O.j.v0.....| +peer0.org1.example.com | 00000010 1d 8f 20 79 a1 17 96 d4 ce 89 a8 dd 7d 82 6d 54 |.. y........}.mT| +peer0.org1.example.com | 00000020 7b 4e 90 e5 02 20 3a ed f8 38 1d 60 2b f2 bd 6a |{N... :..8.`+..j| +peer0.org1.example.com | 00000030 1f ca aa be 58 3b 28 a1 4e ec 42 1e de 0e a7 e7 |....X;(.N.B.....| +peer0.org1.example.com | 00000040 b5 5e 41 33 ee 92 |.^A3..|" +peer0.org1.example.com | "2019-09-24 00:26:09.667 UTC [gossip.discovery] isSentByMe -> DEBU 356b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 356c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.688 UTC [gossip.comm] func1 -> DEBU 356d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.688 UTC [gossip.gossip] handleMessage -> DEBU 356e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.688 UTC [gossip.pull] HandleMessage -> DEBU 356f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.688 UTC [gossip.pull] SendDigest -> DEBU 3570 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:09.688 UTC [gossip.gossip] handleMessage -> DEBU 3571 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.775 UTC [gossip.comm] func1 -> DEBU 3572 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0206" signature:"0D\002 #\347\220Z4Y\3617\337\336\255v\365\242\215\236+\t\343\321\3359tDz5Dw\362n\013\316\002 \031r\364\001\333Fo\211Hm/\000\326J\346\0174\325\306\322\234\314D\034\230\243\246]\032\370\332\220" secret_envelope:\352\231r\033\276\234\340\32507\227\004\346\312f`\251\340u\257\221CIR\3404K\002 8\342\351\254\213\275]\rp\354R\0009\035\326\262\211n\370\314\204\250\230h/\373\360\251\346\262s\200" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.775 UTC [gossip.gossip] handleMessage -> DEBU 3573 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0206" signature:"0D\002 #\347\220Z4Y\3617\337\336\255v\365\242\215\236+\t\343\321\3359tDz5Dw\362n\013\316\002 \031r\364\001\333Fo\211Hm/\000\326J\346\0174\325\306\322\234\314D\034\230\243\246]\032\370\332\220" secret_envelope:\352\231r\033\276\234\340\32507\227\004\346\312f`\251\340u\257\221CIR\3404K\002 8\342\351\254\213\275]\rp\354R\0009\035\326\262\211n\370\314\204\250\230h/\373\360\251\346\262s\200" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.775 UTC [gossip.gossip] handleMessage -> DEBU 3574 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3575 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0206" signature:"0D\002 #\347\220Z4Y\3617\337\336\255v\365\242\215\236+\t\343\321\3359tDz5Dw\362n\013\316\002 \031r\364\001\333Fo\211Hm/\000\326J\346\0174\325\306\322\234\314D\034\230\243\246]\032\370\332\220" secret_envelope:\352\231r\033\276\234\340\32507\227\004\346\312f`\251\340u\257\221CIR\3404K\002 8\342\351\254\213\275]\rp\354R\0009\035\326\262\211n\370\314\204\250\230h/\373\360\251\346\262s\200" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.776 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3576 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:09.776 UTC [msp.identity] Verify -> DEBU 3577 Verify: digest = 00000000 ef bc d7 22 67 04 c6 9a 2a d1 84 51 bd 89 6b f0 |..."g...*..Q..k.| +peer0.org1.example.com | 00000010 7f df 95 cf 63 f7 0e 97 8c 24 eb 49 ff be c1 7d |....c....$.I...}|" +peer0.org1.example.com | "2019-09-24 00:26:09.776 UTC [msp.identity] Verify -> DEBU 3578 Verify: sig = 00000000 30 44 02 20 23 e7 90 5a 34 59 f1 37 df de ad 76 |0D. #..Z4Y.7...v| +peer0.org1.example.com | 00000010 f5 a2 8d 9e 2b 09 e3 d1 dd 39 74 44 7a 35 44 77 |....+....9tDz5Dw| +peer0.org1.example.com | 00000020 f2 6e 0b ce 02 20 19 72 f4 01 db 46 6f 89 48 6d |.n... .r...Fo.Hm| +peer0.org1.example.com | 00000030 2f 00 d6 4a e6 0f 34 d5 c6 d2 9c cc 44 1c 98 a3 |/..J..4.....D...| +peer0.org1.example.com | 00000040 a6 5d 1a f8 da 90 |.]....|" +peer0.org1.example.com | "2019-09-24 00:26:09.776 UTC [msp.identity] Verify -> DEBU 3579 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:09.776 UTC [msp.identity] Verify -> DEBU 357a Verify: sig = 00000000 30 44 02 20 0a 56 a7 23 3e ea 99 72 1b be 9c e0 |0D. .V.#>..r....| +peer0.org1.example.com | 00000010 d5 30 37 97 04 e6 ca 66 60 a9 e0 75 af 91 43 49 |.07....f`..u..CI| +peer0.org1.example.com | 00000020 52 e0 34 4b 02 20 38 e2 e9 ac 8b bd 5d 0d 70 ec |R.4K. 8.....].p.| +peer0.org1.example.com | 00000030 52 00 39 1d d6 b2 89 6e f8 cc 84 a8 98 68 2f fb |R.9....n.....h/.| +peer0.org1.example.com | 00000040 f0 a9 e6 b2 73 80 |....s.|" +peer0.org1.example.com | "2019-09-24 00:26:09.776 UTC [gossip.discovery] handleAliveMessage -> DEBU 357b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 357c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:09.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 357d updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:09.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 357e Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:09.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 357f Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:09.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 3580 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.777 UTC [gossip.discovery] handleAliveMessage -> DEBU 3581 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.778 UTC [gossip.discovery] sendMemResponse -> DEBU 3582 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:09.779 UTC [msp] DeserializeIdentity -> DEBU 3583 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.779 UTC [msp] DeserializeIdentity -> DEBU 3584 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.779 UTC [gossip.comm] Send -> DEBU 3585 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:09.779 UTC [gossip.discovery] sendMemResponse -> DEBU 3586 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0206" signature:"0D\002 #\347\220Z4Y\3617\337\336\255v\365\242\215\236+\t\343\321\3359tDz5Dw\362n\013\316\002 \031r\364\001\333Fo\211Hm/\000\326J\346\0174\325\306\322\234\314D\034\230\243\246]\032\370\332\220" secret_envelope:\352\231r\033\276\234\340\32507\227\004\346\312f`\251\340u\257\221CIR\3404K\002 8\342\351\254\213\275]\rp\354R\0009\035\326\262\211n\370\314\204\250\230h/\373\360\251\346\262s\200" > > alive: " +peer0.org1.example.com | "2019-09-24 00:26:09.779 UTC [gossip.comm] sendToEndpoint -> DEBU 3587 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.779 UTC [gossip.comm] sendToEndpoint -> DEBU 3588 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.777 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3589 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [gossip.gossip] handleMessage -> DEBU 358a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [gossip.gossip] handleMessage -> DEBU 358b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 358c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 358d Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [msp] DeserializeIdentity -> DEBU 358e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 358f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3590 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3591 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [policies] Evaluate -> DEBU 3592 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [policies] Evaluate -> DEBU 3593 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [policies] Evaluate -> DEBU 3594 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:09.989 UTC [cauthdsl] func1 -> DEBU 3595 0xc0027587d0 gate 1569284769989957600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 3596 0xc0027587d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 3597 0xc0027587d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 3598 0xc0027587d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 3599 0xc0027587d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [cauthdsl] func1 -> DEBU 359a 0xc0027587d0 gate 1569284769989957600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 359b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 359c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 359d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [cauthdsl] func1 -> DEBU 359e 0xc002759010 gate 1569284769990316400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 359f 0xc002759010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 35a0 0xc002759010 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 35a1 0xc002759010 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [msp.identity] Verify -> DEBU 35a2 Verify: digest = 00000000 e7 56 99 ed ba c3 73 67 a7 6c a4 15 2a e5 df 56 |.V....sg.l..*..V| +peer0.org1.example.com | 00000010 6f cb 79 2c 8e 73 11 64 f5 e6 8c 1e 66 3e 2d 25 |o.y,.s.d....f>-%|" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [msp.identity] Verify -> DEBU 35a3 Verify: sig = 00000000 30 45 02 21 00 b9 6f fa 74 58 e8 a4 4d db f9 45 |0E.!..o.tX..M..E| +peer0.org1.example.com | 00000010 0b fd 33 1f 51 32 b8 9a 7a 64 db 3c 64 ed 00 b1 |..3.Q2..zd. DEBU 35a4 0xc002759010 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [cauthdsl] func1 -> DEBU 35a5 0xc002759010 gate 1569284769990316400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 35a6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 35a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 35a8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 35a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:09.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 35aa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:09.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ac updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:09.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ad Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:09.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ae Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:09.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 35af Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 35b0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.996 UTC [msp] DeserializeIdentity -> DEBU 35b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.996 UTC [msp] DeserializeIdentity -> DEBU 35b3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.996 UTC [msp] DeserializeIdentity -> DEBU 35b4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.996 UTC [msp] DeserializeIdentity -> DEBU 35b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.996 UTC [gossip.comm] func1 -> DEBU 35b6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.996 UTC [msp] DeserializeIdentity -> DEBU 35b7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [msp] DeserializeIdentity -> DEBU 35b8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [gossip.gossip] handleMessage -> DEBU 35b9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [gossip.gossip] handleMessage -> DEBU 35ba Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [msp] DeserializeIdentity -> DEBU 35bb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35bc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [gossip.comm] Send -> DEBU 35bd Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35be Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [msp] DeserializeIdentity -> DEBU 35bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [gossip.comm] Send -> DEBU 35c0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [gossip.comm] sendToEndpoint -> DEBU 35c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [gossip.comm] sendToEndpoint -> DEBU 35c2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:09.997 UTC [gossip.comm] sendToEndpoint -> DEBU 35c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:09.998 UTC [gossip.comm] sendToEndpoint -> DEBU 35c4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.007 UTC [gossip.comm] func1 -> DEBU 35c5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.007 UTC [gossip.gossip] handleMessage -> DEBU 35c6 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.007 UTC [gossip.gossip] handleMessage -> DEBU 35c7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35c8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35c9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.085 UTC [gossip.comm] func1 -> DEBU 35ca Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.085 UTC [gossip.gossip] handleMessage -> DEBU 35cb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.085 UTC [msp] DeserializeIdentity -> DEBU 35cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.085 UTC [msp] DeserializeIdentity -> DEBU 35cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.085 UTC [msp] DeserializeIdentity -> DEBU 35ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.085 UTC [gossip.gossip] handleMessage -> DEBU 35cf Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.684 UTC [gossip.comm] func1 -> DEBU 35d0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.685 UTC [gossip.gossip] handleMessage -> DEBU 35d1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.685 UTC [gossip.gossip] handleMessage -> DEBU 35d2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.685 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35d3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.685 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35d4 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:10.685 UTC [msp] DeserializeIdentity -> DEBU 35d5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.685 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35d6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:10.685 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35d7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:10.685 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35d8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:10.685 UTC [policies] Evaluate -> DEBU 35d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:10.685 UTC [policies] Evaluate -> DEBU 35da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [policies] Evaluate -> DEBU 35db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func1 -> DEBU 35dc 0xc0026621e0 gate 1569284770686068300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35dd 0xc0026621e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35de 0xc0026621e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35df 0xc0026621e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35e0 0xc0026621e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func1 -> DEBU 35e1 0xc0026621e0 gate 1569284770686068300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [policies] Evaluate -> DEBU 35e2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [policies] Evaluate -> DEBU 35e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [policies] Evaluate -> DEBU 35e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func1 -> DEBU 35e5 0xc002662b10 gate 1569284770686351300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35e6 0xc002662b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35e7 0xc002662b10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35e8 0xc002662b10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [msp.identity] Verify -> DEBU 35e9 Verify: digest = 00000000 c1 48 ea 30 a0 2e 21 5b 9b c1 d8 1d 1c 42 11 7a |.H.0..![.....B.z| +peer0.org1.example.com | 00000010 3a 37 6f 3b 4e 8d bf 04 43 74 bf 87 48 1f 7c 69 |:7o;N...Ct..H.|i|" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [msp.identity] Verify -> DEBU 35ea Verify: sig = 00000000 30 45 02 21 00 a8 c1 23 89 33 7d fb 94 8f 67 86 |0E.!...#.3}...g.| +peer0.org1.example.com | 00000010 c0 50 c0 ed 4c bb 15 51 0a 9c 4b d3 d0 5b 0b 2a |.P..L..Q..K..[.*| +peer0.org1.example.com | 00000020 90 ec 6c 52 01 02 20 37 59 6b d1 36 b7 06 7e c8 |..lR.. 7Yk.6..~.| +peer0.org1.example.com | 00000030 02 77 ed 94 6d 76 65 c1 63 51 14 39 11 e7 67 be |.w..mve.cQ.9..g.| +peer0.org1.example.com | 00000040 00 8f 10 73 26 5c 73 |...s&\s|" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35eb 0xc002662b10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:10.686 UTC [cauthdsl] func1 -> DEBU 35ec 0xc002662b10 gate 1569284770686351300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [policies] Evaluate -> DEBU 35ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [policies] Evaluate -> DEBU 35ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [policies] Evaluate -> DEBU 35ef Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [policies] Evaluate -> DEBU 35f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 35f1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f3 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f4 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 35f7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35f8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 35f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.comm] func1 -> DEBU 35fa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 35fb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.gossip] handleMessage -> DEBU 35fc Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.gossip] handleMessage -> DEBU 35fd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 35fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35ff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3600 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 3601 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 3602 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.gossip] handleMessage -> DEBU 3603 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 3604 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.gossip] handleMessage -> DEBU 3605 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3606 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.comm] Send -> DEBU 3607 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3608 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 3609 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 360a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.comm] Send -> DEBU 360b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:10.691 UTC [gossip.comm] sendToEndpoint -> DEBU 360c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.692 UTC [gossip.comm] sendToEndpoint -> DEBU 360d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:10.692 UTC [gossip.comm] sendToEndpoint -> DEBU 360e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:10.692 UTC [gossip.comm] sendToEndpoint -> DEBU 360f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.696 UTC [gossip.pull] Hello -> DEBU 3610 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:11.696 UTC [gossip.comm] Send -> DEBU 3611 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:11.696 UTC [gossip.pull] Hello -> DEBU 3612 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:11.696 UTC [gossip.comm] Send -> DEBU 3613 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:11.696 UTC [gossip.pull] Hello -> DEBU 3614 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:11.696 UTC [gossip.comm] Send -> DEBU 3615 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:11.696 UTC [gossip.comm] sendToEndpoint -> DEBU 3616 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.696 UTC [gossip.comm] sendToEndpoint -> DEBU 3617 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.697 UTC [gossip.comm] sendToEndpoint -> DEBU 3618 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.697 UTC [gossip.comm] sendToEndpoint -> DEBU 3619 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.697 UTC [gossip.comm] sendToEndpoint -> DEBU 361a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.697 UTC [gossip.comm] sendToEndpoint -> DEBU 361b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.699 UTC [gossip.comm] func1 -> DEBU 361c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.699 UTC [gossip.gossip] handleMessage -> DEBU 361d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.699 UTC [gossip.pull] HandleMessage -> DEBU 361e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.699 UTC [gossip.gossip] handleMessage -> DEBU 361f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.699 UTC [gossip.gossip] handleMessage -> DEBU 3620 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.699 UTC [gossip.pull] HandleMessage -> DEBU 3621 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.699 UTC [gossip.gossip] handleMessage -> DEBU 3622 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.700 UTC [gossip.comm] func1 -> DEBU 3623 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.700 UTC [gossip.gossip] handleMessage -> DEBU 3624 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.700 UTC [gossip.pull] HandleMessage -> DEBU 3625 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.700 UTC [gossip.gossip] handleMessage -> DEBU 3626 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.846 UTC [msp] GetDefaultSigningIdentity -> DEBU 3627 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:11.846 UTC [msp.identity] Sign -> DEBU 3628 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151033 " +peer0.org1.example.com | "2019-09-24 00:26:11.846 UTC [msp.identity] Sign -> DEBU 3629 Sign: digest: 86B74A24314315E0531EB34E765326DB2B4C16368543722CD721ECD2507704FE " +peer0.org1.example.com | "2019-09-24 00:26:11.846 UTC [msp] GetDefaultSigningIdentity -> DEBU 362a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:11.846 UTC [msp.identity] Sign -> DEBU 362b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:11.846 UTC [msp.identity] Sign -> DEBU 362c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:11.846 UTC [gossip.comm] Send -> DEBU 362d Entering, sending GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:11.847 UTC [msp] DeserializeIdentity -> DEBU 362e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:11.847 UTC [gossip.comm] Send -> DEBU 362f Entering, sending GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:11.847 UTC [msp] DeserializeIdentity -> DEBU 3630 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:11.847 UTC [gossip.comm] Send -> DEBU 3631 Entering, sending GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3632 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3633 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3634 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3635 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3636 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3637 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.850 UTC [gossip.comm] func1 -> DEBU 3638 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.gossip] handleMessage -> DEBU 3639 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.gossip] handleMessage -> DEBU 363a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 363b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 363c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [msp.identity] Verify -> DEBU 363d Verify: digest = 00000000 86 b7 4a 24 31 43 15 e0 53 1e b3 4e 76 53 26 db |..J$1C..S..NvS&.| +peer0.org1.example.com | 00000010 2b 4c 16 36 85 43 72 2c d7 21 ec d2 50 77 04 fe |+L.6.Cr,.!..Pw..|" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [msp.identity] Verify -> DEBU 363e Verify: sig = 00000000 30 45 02 21 00 f6 19 27 e9 bb fd 4c 6c 3d fe a8 |0E.!...'...Ll=..| +peer0.org1.example.com | 00000010 0e 09 a6 0c 1d 7d 3a 03 eb 70 8f 64 91 2f b9 ad |.....}:..p.d./..| +peer0.org1.example.com | 00000020 39 c4 e0 eb 3e 02 20 1d 03 50 0f b6 69 ec 34 5e |9...>. ..P..i.4^| +peer0.org1.example.com | 00000030 06 77 6e 92 fc d5 43 88 b4 58 21 e3 72 f7 bc 57 |.wn...C..X!.r..W| +peer0.org1.example.com | 00000040 2b fa 9b 18 f4 36 d3 |+....6.|" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 363f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.discovery] isSentByMe -> DEBU 3640 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 3641 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3642 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [msp.identity] Verify -> DEBU 3643 Verify: digest = 00000000 ef bc d7 22 67 04 c6 9a 2a d1 84 51 bd 89 6b f0 |..."g...*..Q..k.| +peer0.org1.example.com | 00000010 7f df 95 cf 63 f7 0e 97 8c 24 eb 49 ff be c1 7d |....c....$.I...}|" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [msp.identity] Verify -> DEBU 3644 Verify: sig = 00000000 30 44 02 20 23 e7 90 5a 34 59 f1 37 df de ad 76 |0D. #..Z4Y.7...v| +peer0.org1.example.com | 00000010 f5 a2 8d 9e 2b 09 e3 d1 dd 39 74 44 7a 35 44 77 |....+....9tDz5Dw| +peer0.org1.example.com | 00000020 f2 6e 0b ce 02 20 19 72 f4 01 db 46 6f 89 48 6d |.n... .r...Fo.Hm| +peer0.org1.example.com | 00000030 2f 00 d6 4a e6 0f 34 d5 c6 d2 9c cc 44 1c 98 a3 |/..J..4.....D...| +peer0.org1.example.com | 00000040 a6 5d 1a f8 da 90 |.]....|" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 3645 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 3646 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3647 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.comm] func1 -> DEBU 3648 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.gossip] handleMessage -> DEBU 3649 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.gossip] handleMessage -> DEBU 364a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 364b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.852 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 364c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:11.852 UTC [msp.identity] Verify -> DEBU 364d Verify: digest = 00000000 86 b7 4a 24 31 43 15 e0 53 1e b3 4e 76 53 26 db |..J$1C..S..NvS&.| +peer0.org1.example.com | 00000010 2b 4c 16 36 85 43 72 2c d7 21 ec d2 50 77 04 fe |+L.6.Cr,.!..Pw..|" +peer0.org1.example.com | "2019-09-24 00:26:11.852 UTC [msp.identity] Verify -> DEBU 364e Verify: sig = 00000000 30 45 02 21 00 f6 19 27 e9 bb fd 4c 6c 3d fe a8 |0E.!...'...Ll=..| +peer0.org1.example.com | 00000010 0e 09 a6 0c 1d 7d 3a 03 eb 70 8f 64 91 2f b9 ad |.....}:..p.d./..| +peer0.org1.example.com | 00000020 39 c4 e0 eb 3e 02 20 1d 03 50 0f b6 69 ec 34 5e |9...>. ..P..i.4^| +peer0.org1.example.com | 00000030 06 77 6e 92 fc d5 43 88 b4 58 21 e3 72 f7 bc 57 |.wn...C..X!.r..W| +peer0.org1.example.com | 00000040 2b fa 9b 18 f4 36 d3 |+....6.|" +peer0.org1.example.com | "2019-09-24 00:26:11.852 UTC [msp.identity] Verify -> DEBU 364f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:11.852 UTC [msp.identity] Verify -> DEBU 3650 Verify: sig = 00000000 30 45 02 21 00 97 9b e2 ca fc 9c 34 c0 8b 6a 2c |0E.!.......4..j,| +peer0.org1.example.com | 00000010 1e b0 1c 5d df b7 ed be 27 59 b5 a0 e1 34 5d 5b |...]....'Y...4][| +peer0.org1.example.com | 00000020 fd 9e fe 72 bb 02 20 33 0e 2d 5a 30 f4 c6 ce 00 |...r.. 3.-Z0....| +peer0.org1.example.com | 00000030 c5 bf b6 4b f5 08 0c c9 0e 83 8d 23 b3 c0 af c7 |...K.......#....| +peer0.org1.example.com | 00000040 c1 82 5f a6 fb 34 d7 |.._..4.|" +peer0.org1.example.com | "2019-09-24 00:26:11.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 3651 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.852 UTC [gossip.discovery] isSentByMe -> DEBU 3652 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 3653 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3654 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.857 UTC [gossip.gossip] handleMessage -> DEBU 3655 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.857 UTC [gossip.gossip] handleMessage -> DEBU 3656 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.857 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3657 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.857 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3658 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:11.858 UTC [msp.identity] Verify -> DEBU 3659 Verify: digest = 00000000 ef bc d7 22 67 04 c6 9a 2a d1 84 51 bd 89 6b f0 |..."g...*..Q..k.| +peer0.org1.example.com | 00000010 7f df 95 cf 63 f7 0e 97 8c 24 eb 49 ff be c1 7d |....c....$.I...}|" +peer0.org1.example.com | "2019-09-24 00:26:11.858 UTC [msp.identity] Verify -> DEBU 365a Verify: sig = 00000000 30 44 02 20 23 e7 90 5a 34 59 f1 37 df de ad 76 |0D. #..Z4Y.7...v| +peer0.org1.example.com | 00000010 f5 a2 8d 9e 2b 09 e3 d1 dd 39 74 44 7a 35 44 77 |....+....9tDz5Dw| +peer0.org1.example.com | 00000020 f2 6e 0b ce 02 20 19 72 f4 01 db 46 6f 89 48 6d |.n... .r...Fo.Hm| +peer0.org1.example.com | 00000030 2f 00 d6 4a e6 0f 34 d5 c6 d2 9c cc 44 1c 98 a3 |/..J..4.....D...| +peer0.org1.example.com | 00000040 a6 5d 1a f8 da 90 |.]....|" +peer0.org1.example.com | "2019-09-24 00:26:11.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 365b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 365c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.858 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 365d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:11.858 UTC [msp.identity] Verify -> DEBU 365e Verify: digest = 00000000 86 b7 4a 24 31 43 15 e0 53 1e b3 4e 76 53 26 db |..J$1C..S..NvS&.| +peer0.org1.example.com | 00000010 2b 4c 16 36 85 43 72 2c d7 21 ec d2 50 77 04 fe |+L.6.Cr,.!..Pw..|" +peer0.org1.example.com | "2019-09-24 00:26:11.858 UTC [msp.identity] Verify -> DEBU 365f Verify: sig = 00000000 30 45 02 21 00 f6 19 27 e9 bb fd 4c 6c 3d fe a8 |0E.!...'...Ll=..| +peer0.org1.example.com | 00000010 0e 09 a6 0c 1d 7d 3a 03 eb 70 8f 64 91 2f b9 ad |.....}:..p.d./..| +peer0.org1.example.com | 00000020 39 c4 e0 eb 3e 02 20 1d 03 50 0f b6 69 ec 34 5e |9...>. ..P..i.4^| +peer0.org1.example.com | 00000030 06 77 6e 92 fc d5 43 88 b4 58 21 e3 72 f7 bc 57 |.wn...C..X!.r..W| +peer0.org1.example.com | 00000040 2b fa 9b 18 f4 36 d3 |+....6.|" +peer0.org1.example.com | "2019-09-24 00:26:11.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 3660 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.858 UTC [gossip.discovery] isSentByMe -> DEBU 3661 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:11.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 3662 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:11.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3663 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.008 UTC [gossip.gossip] handleMessage -> DEBU 3664 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.009 UTC [gossip.pull] HandleMessage -> DEBU 3665 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.009 UTC [msp] DeserializeIdentity -> DEBU 3666 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.010 UTC [msp] DeserializeIdentity -> DEBU 3667 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.010 UTC [msp] DeserializeIdentity -> DEBU 3668 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.011 UTC [msp] DeserializeIdentity -> DEBU 3669 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.011 UTC [msp] DeserializeIdentity -> DEBU 366a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.011 UTC [msp] DeserializeIdentity -> DEBU 366b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.012 UTC [gossip.pull] SendDigest -> DEBU 366c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:12.012 UTC [gossip.gossip] handleMessage -> DEBU 366d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.019 UTC [gossip.gossip] handleMessage -> DEBU 366e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.019 UTC [gossip.gossip] handleMessage -> DEBU 366f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3670 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.019 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3671 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:12.019 UTC [msp] DeserializeIdentity -> DEBU 3672 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3673 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3674 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3675 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 3676 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 3677 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 3678 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [cauthdsl] func1 -> DEBU 3679 0xc002582140 gate 1569284772020363200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 367a 0xc002582140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 367b 0xc002582140 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 367c 0xc002582140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 367d 0xc002582140 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [cauthdsl] func1 -> DEBU 367e 0xc002582140 gate 1569284772020363200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 367f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 3680 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 3681 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [cauthdsl] func1 -> DEBU 3682 0xc0025829a0 gate 1569284772020781300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 3683 0xc0025829a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 3684 0xc0025829a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 3685 0xc0025829a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.020 UTC [msp.identity] Verify -> DEBU 3686 Verify: digest = 00000000 e3 55 a2 72 7b 50 2e 86 bd 16 e2 4e c2 e6 70 48 |.U.r{P.....N..pH| +peer0.org1.example.com | 00000010 c9 46 12 24 2c a0 c2 e7 aa 6f da 49 9a de d8 04 |.F.$,....o.I....|" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [msp.identity] Verify -> DEBU 3687 Verify: sig = 00000000 30 45 02 21 00 cb bb 98 19 75 43 f8 fb a5 d8 e1 |0E.!.....uC.....| +peer0.org1.example.com | 00000010 38 96 07 c9 b0 3d c2 9b ad 88 5b af 86 fc f1 0c |8....=....[.....| +peer0.org1.example.com | 00000020 02 f7 01 7a 12 02 20 06 b1 b3 24 19 66 92 4e 35 |...z.. ...$.f.N5| +peer0.org1.example.com | 00000030 80 8c 1f 1b 54 92 3c 22 4d 78 d7 10 9a 33 40 ac |....T.<"Mx...3@.| +peer0.org1.example.com | 00000040 7a 51 58 90 2e 9f b5 |zQX....|" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [cauthdsl] func2 -> DEBU 3688 0xc0025829a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [cauthdsl] func1 -> DEBU 3689 0xc0025829a0 gate 1569284772020781300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [policies] Evaluate -> DEBU 368a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [policies] Evaluate -> DEBU 368b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [policies] Evaluate -> DEBU 368c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [policies] Evaluate -> DEBU 368d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [gossip.discovery] handleAliveMessage -> DEBU 368e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [gossip.discovery] learnExistingMembers -> DEBU 368f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [gossip.discovery] learnExistingMembers -> DEBU 3690 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [gossip.discovery] learnExistingMembers -> DEBU 3691 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [gossip.discovery] learnExistingMembers -> DEBU 3692 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [gossip.discovery] learnExistingMembers -> DEBU 3693 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.021 UTC [gossip.discovery] handleAliveMessage -> DEBU 3694 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.022 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3695 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.022 UTC [gossip.discovery] sendMemResponse -> DEBU 3696 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:12.022 UTC [msp] DeserializeIdentity -> DEBU 3697 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.022 UTC [msp] DeserializeIdentity -> DEBU 3698 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.022 UTC [msp] DeserializeIdentity -> DEBU 3699 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.022 UTC [gossip.comm] Send -> DEBU 369a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:12.022 UTC [gossip.comm] sendToEndpoint -> DEBU 369b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.022 UTC [gossip.comm] sendToEndpoint -> DEBU 369c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.023 UTC [gossip.discovery] sendMemResponse -> DEBU 369d Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0206" signature:"0D\002 #\347\220Z4Y\3617\337\336\255v\365\242\215\236+\t\343\321\3359tDz5Dw\362n\013\316\002 \031r\364\001\333Fo\211Hm/\000\326J\346\0174\325\306\322\234\314D\034\230\243\246]\032\370\332\220" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:12.115 UTC [msp] DeserializeIdentity -> DEBU 369e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.115 UTC [msp] DeserializeIdentity -> DEBU 369f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.115 UTC [gossip.comm] Send -> DEBU 36a0 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:12.115 UTC [gossip.comm] sendToEndpoint -> DEBU 36a1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.115 UTC [gossip.comm] sendToEndpoint -> DEBU 36a2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.116 UTC [gossip.comm] sendToEndpoint -> DEBU 36a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.116 UTC [gossip.comm] sendToEndpoint -> DEBU 36a4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.116 UTC [gossip.comm] sendToEndpoint -> DEBU 36a5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.116 UTC [gossip.comm] sendToEndpoint -> DEBU 36a6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [gossip.gossip] handleMessage -> DEBU 36a7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [msp] DeserializeIdentity -> DEBU 36a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [msp] DeserializeIdentity -> DEBU 36a9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [msp] DeserializeIdentity -> DEBU 36aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36ab Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ac Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ad Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [policies] Evaluate -> DEBU 36ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [policies] Evaluate -> DEBU 36af This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [policies] Evaluate -> DEBU 36b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [cauthdsl] func1 -> DEBU 36b1 0xc00256bc60 gate 1569284772118796000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [cauthdsl] func2 -> DEBU 36b2 0xc00256bc60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.118 UTC [cauthdsl] func2 -> DEBU 36b3 0xc00256bc60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36b4 0xc00256bc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36b5 0xc00256bc60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [cauthdsl] func1 -> DEBU 36b6 0xc00256bc60 gate 1569284772118796000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36b7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [cauthdsl] func1 -> DEBU 36ba 0xc00252a4a0 gate 1569284772119300500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36bb 0xc00252a4a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36bc 0xc00252a4a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36bd 0xc00252a4a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [msp.identity] Verify -> DEBU 36be Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [msp.identity] Verify -> DEBU 36bf Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36c0 0xc00252a4a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [cauthdsl] func1 -> DEBU 36c1 0xc00252a4a0 gate 1569284772119300500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36c2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36c4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.120 UTC [msp.identity] Verify -> DEBU 36c6 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:12.120 UTC [msp.identity] Verify -> DEBU 36c7 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:12.120 UTC [msp.identity] Verify -> DEBU 36c8 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:12.120 UTC [msp.identity] Verify -> DEBU 36c9 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:12.120 UTC [gossip.comm] func1 -> DEBU 36ca Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.122 UTC [gossip.comm] func1 -> DEBU 36cb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.124 UTC [msp] DeserializeIdentity -> DEBU 36cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.124 UTC [msp] DeserializeIdentity -> DEBU 36cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.124 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36ce Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:12.124 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36cf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.124 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36d0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.125 UTC [policies] Evaluate -> DEBU 36d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.125 UTC [policies] Evaluate -> DEBU 36d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:12.125 UTC [policies] Evaluate -> DEBU 36d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.125 UTC [cauthdsl] func1 -> DEBU 36d4 0xc0003e2cd0 gate 1569284772125142100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.125 UTC [cauthdsl] func2 -> DEBU 36d5 0xc0003e2cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.125 UTC [cauthdsl] func2 -> DEBU 36d6 0xc0003e2cd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.125 UTC [cauthdsl] func2 -> DEBU 36d7 0xc0003e2cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [cauthdsl] func2 -> DEBU 36d8 0xc0003e2cd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [cauthdsl] func1 -> DEBU 36d9 0xc0003e2cd0 gate 1569284772125142100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [policies] Evaluate -> DEBU 36da Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [policies] Evaluate -> DEBU 36db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [policies] Evaluate -> DEBU 36dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [cauthdsl] func1 -> DEBU 36dd 0xc0003e3510 gate 1569284772126474100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [cauthdsl] func2 -> DEBU 36de 0xc0003e3510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [cauthdsl] func2 -> DEBU 36df 0xc0003e3510 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [cauthdsl] func2 -> DEBU 36e0 0xc0003e3510 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [msp.identity] Verify -> DEBU 36e1 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [msp.identity] Verify -> DEBU 36e2 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [cauthdsl] func2 -> DEBU 36e3 0xc0003e3510 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.126 UTC [cauthdsl] func1 -> DEBU 36e4 0xc0003e3510 gate 1569284772126474100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:12.133 UTC [policies] Evaluate -> DEBU 36e5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.133 UTC [policies] Evaluate -> DEBU 36e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36e7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36e8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [gossip.gossip] handleMessage -> DEBU 36e9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [gossip.gossip] handleMessage -> DEBU 36ea Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [msp] DeserializeIdentity -> DEBU 36eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [msp] DeserializeIdentity -> DEBU 36ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [msp] DeserializeIdentity -> DEBU 36ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36ee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ef Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36f0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [cauthdsl] func1 -> DEBU 36f4 0xc0003d7470 gate 1569284772134709100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [cauthdsl] func2 -> DEBU 36f5 0xc0003d7470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [cauthdsl] func2 -> DEBU 36f6 0xc0003d7470 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [cauthdsl] func2 -> DEBU 36f7 0xc0003d7470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [cauthdsl] func2 -> DEBU 36f8 0xc0003d7470 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [cauthdsl] func1 -> DEBU 36f9 0xc0003d7470 gate 1569284772134709100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36fa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 36fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 36fc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [cauthdsl] func1 -> DEBU 36fd 0xc0003d7cc0 gate 1569284772135106700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [cauthdsl] func2 -> DEBU 36fe 0xc0003d7cc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [cauthdsl] func2 -> DEBU 36ff 0xc0003d7cc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [cauthdsl] func2 -> DEBU 3700 0xc0003d7cc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [msp.identity] Verify -> DEBU 3701 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [msp.identity] Verify -> DEBU 3702 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [cauthdsl] func2 -> DEBU 3703 0xc0003d7cc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [cauthdsl] func1 -> DEBU 3704 0xc0003d7cc0 gate 1569284772135106700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 3705 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 3706 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 3707 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 3708 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.149 UTC [msp.identity] Verify -> DEBU 3709 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:12.149 UTC [msp.identity] Verify -> DEBU 370a Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [msp] DeserializeIdentity -> DEBU 370b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [msp] DeserializeIdentity -> DEBU 370c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 370d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 370e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 370f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3710 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3711 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3712 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func1 -> DEBU 3713 0xc0003bbd00 gate 1569284772150408700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 3714 0xc0003bbd00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 3715 0xc0003bbd00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 3716 0xc0003bbd00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 3717 0xc0003bbd00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func1 -> DEBU 3718 0xc0003bbd00 gate 1569284772150408700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3719 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 371a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 371b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func1 -> DEBU 371c 0xc000486540 gate 1569284772150663100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 371d 0xc000486540 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 371e 0xc000486540 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 371f 0xc000486540 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [msp.identity] Verify -> DEBU 3720 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [msp.identity] Verify -> DEBU 3721 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 3722 0xc000486540 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [cauthdsl] func1 -> DEBU 3723 0xc000486540 gate 1569284772150663100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3724 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3725 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.151 UTC [policies] Evaluate -> DEBU 3726 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.151 UTC [policies] Evaluate -> DEBU 3727 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 3728 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 3729 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:12.151 UTC [gossip.gossip] handleMessage -> DEBU 372a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.151 UTC [gossip.gossip] handleMessage -> DEBU 372b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 372c Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 372d Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 372e Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 372f Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:12.151 UTC [msp] DeserializeIdentity -> DEBU 3730 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [msp] DeserializeIdentity -> DEBU 3731 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3732 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3733 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3734 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 3735 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 3736 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 3737 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [cauthdsl] func1 -> DEBU 3738 0xc000193660 gate 1569284772152252600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 3739 0xc000193660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 373a 0xc000193660 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 373b 0xc000193660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 373c 0xc000193660 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [cauthdsl] func1 -> DEBU 373d 0xc000193660 gate 1569284772152252600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 373e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 373f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 3740 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [cauthdsl] func1 -> DEBU 3741 0xc000193ec0 gate 1569284772152513600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 3742 0xc000193ec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 3743 0xc000193ec0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 3744 0xc000193ec0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.152 UTC [msp.identity] Verify -> DEBU 3745 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:12.178 UTC [msp.identity] Verify -> DEBU 3746 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [cauthdsl] func2 -> DEBU 3747 0xc000193ec0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [cauthdsl] func1 -> DEBU 3748 0xc000193ec0 gate 1569284772152513600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 3749 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 374a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 374b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 374c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [msp] DeserializeIdentity -> DEBU 374d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [msp] DeserializeIdentity -> DEBU 374e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 374f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3750 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3751 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 3752 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 3753 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:12.181 UTC [policies] Evaluate -> DEBU 3754 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [cauthdsl] func1 -> DEBU 3755 0xc000131810 gate 1569284772182290100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3756 0xc000131810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3757 0xc000131810 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3758 0xc000131810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3759 0xc000131810 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [cauthdsl] func1 -> DEBU 375a 0xc000131810 gate 1569284772182290100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [policies] Evaluate -> DEBU 375b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [policies] Evaluate -> DEBU 375c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [policies] Evaluate -> DEBU 375d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [cauthdsl] func1 -> DEBU 375e 0xc0004c6050 gate 1569284772182740100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 375f 0xc0004c6050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3760 0xc0004c6050 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3761 0xc0004c6050 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [msp.identity] Verify -> DEBU 3762 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:12.182 UTC [msp.identity] Verify -> DEBU 3763 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:12.184 UTC [cauthdsl] func2 -> DEBU 3764 0xc0004c6050 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.184 UTC [cauthdsl] func1 -> DEBU 3765 0xc0004c6050 gate 1569284772182740100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:12.184 UTC [policies] Evaluate -> DEBU 3766 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.184 UTC [policies] Evaluate -> DEBU 3767 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.184 UTC [policies] Evaluate -> DEBU 3768 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.184 UTC [policies] Evaluate -> DEBU 3769 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.184 UTC [gossip.gossip] handleMessage -> DEBU 376a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.283 UTC [msp] DeserializeIdentity -> DEBU 376b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.283 UTC [msp] DeserializeIdentity -> DEBU 376c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.283 UTC [gossip.pull] Hello -> DEBU 376d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:12.283 UTC [msp] DeserializeIdentity -> DEBU 376e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.283 UTC [msp] DeserializeIdentity -> DEBU 376f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.283 UTC [gossip.comm] Send -> DEBU 3770 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:12.283 UTC [gossip.comm] sendToEndpoint -> DEBU 3771 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.283 UTC [gossip.comm] sendToEndpoint -> DEBU 3772 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.285 UTC [gossip.comm] func1 -> DEBU 3773 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.285 UTC [gossip.gossip] handleMessage -> DEBU 3774 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.285 UTC [gossip.pull] HandleMessage -> DEBU 3775 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.285 UTC [gossip.gossip] handleMessage -> DEBU 3776 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.299 UTC [gossip.election] waitForInterrupt -> DEBU 3777 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.299 UTC [gossip.election] IsLeader -> DEBU 3778 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:12.299 UTC [msp] GetDefaultSigningIdentity -> DEBU 3779 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:12.299 UTC [msp.identity] Sign -> DEBU 377a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510101801 " +peer0.org1.example.com | "2019-09-24 00:26:12.299 UTC [msp.identity] Sign -> DEBU 377b Sign: digest: D2CEA75308506C63EF81731B0FAF8ED761C0AD65F46C50C8295210BDEA04D160 " +peer0.org1.example.com | "2019-09-24 00:26:12.300 UTC [gossip.election] waitForInterrupt -> DEBU 377c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:12.305 UTC [msp] DeserializeIdentity -> DEBU 377d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.306 UTC [msp] DeserializeIdentity -> DEBU 377e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.306 UTC [msp] DeserializeIdentity -> DEBU 377f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.306 UTC [msp] DeserializeIdentity -> DEBU 3780 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.306 UTC [gossip.comm] Send -> DEBU 3781 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:12.306 UTC [msp] DeserializeIdentity -> DEBU 3782 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.306 UTC [msp] DeserializeIdentity -> DEBU 3783 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.306 UTC [gossip.comm] sendToEndpoint -> DEBU 3784 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.306 UTC [gossip.comm] sendToEndpoint -> DEBU 3785 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.620 UTC [gossip.comm] func1 -> DEBU 3786 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.621 UTC [gossip.gossip] handleMessage -> DEBU 3787 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.627 UTC [msp] DeserializeIdentity -> DEBU 3788 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.628 UTC [msp] DeserializeIdentity -> DEBU 3789 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.629 UTC [gossip.gossip] handleMessage -> DEBU 378a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.690 UTC [gossip.comm] func1 -> DEBU 378b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.690 UTC [gossip.gossip] handleMessage -> DEBU 378c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.690 UTC [gossip.gossip] handleMessage -> DEBU 378d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 378e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.690 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 378f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:12.692 UTC [msp.identity] Verify -> DEBU 3790 Verify: digest = 00000000 fb ff 06 c6 05 53 f1 39 66 02 1e af 5d c1 98 90 |.....S.9f...]...| +peer0.org1.example.com | 00000010 77 af 66 f1 55 e2 db 27 c5 9b ba 1d 59 10 e9 c8 |w.f.U..'....Y...|" +peer0.org1.example.com | "2019-09-24 00:26:12.692 UTC [msp.identity] Verify -> DEBU 3791 Verify: sig = 00000000 30 45 02 21 00 c7 ec c1 5c 21 5c e0 83 ee aa 3b |0E.!....\!\....;| +peer0.org1.example.com | 00000010 99 33 25 3a e9 f4 fc 8d ae 11 52 e1 bb fc e4 54 |.3%:......R....T| +peer0.org1.example.com | 00000020 41 69 00 b0 c2 02 20 3e 27 50 eb 98 b3 1d bd fc |Ai.... >'P......| +peer0.org1.example.com | 00000030 66 bb 2b 12 2c ee 45 e0 27 8a 2c 02 22 9d ae e9 |f.+.,.E.'.,."...| +peer0.org1.example.com | 00000040 74 a2 19 47 d6 54 62 |t..G.Tb|" +peer0.org1.example.com | "2019-09-24 00:26:12.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 3792 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.702 UTC [gossip.comm] func1 -> DEBU 3793 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.702 UTC [gossip.gossip] handleMessage -> DEBU 3794 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3795 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:12.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 3796 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:12.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 3797 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:12.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 3798 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:12.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 3799 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 379a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 379b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.710 UTC [msp] DeserializeIdentity -> DEBU 379c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.712 UTC [msp] DeserializeIdentity -> DEBU 379d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.714 UTC [msp] DeserializeIdentity -> DEBU 379e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.727 UTC [gossip.comm] func1 -> DEBU 379f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.727 UTC [gossip.comm] func1 -> DEBU 37a0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.727 UTC [gossip.comm] Send -> DEBU 37a1 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:12.727 UTC [msp] DeserializeIdentity -> DEBU 37a2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.727 UTC [gossip.comm] Send -> DEBU 37a3 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:12.727 UTC [gossip.comm] sendToEndpoint -> DEBU 37a4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.727 UTC [gossip.comm] sendToEndpoint -> DEBU 37a5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.727 UTC [gossip.comm] sendToEndpoint -> DEBU 37a6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.727 UTC [gossip.comm] sendToEndpoint -> DEBU 37a7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.728 UTC [gossip.gossip] handleMessage -> DEBU 37a8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.728 UTC [gossip.gossip] handleMessage -> DEBU 37a9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.728 UTC [gossip.pull] HandleMessage -> DEBU 37aa GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.728 UTC [msp] DeserializeIdentity -> DEBU 37ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.729 UTC [msp] DeserializeIdentity -> DEBU 37ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.729 UTC [msp] DeserializeIdentity -> DEBU 37ad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.729 UTC [msp] DeserializeIdentity -> DEBU 37ae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.730 UTC [msp] DeserializeIdentity -> DEBU 37af Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.730 UTC [msp] DeserializeIdentity -> DEBU 37b0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.730 UTC [gossip.pull] SendDigest -> DEBU 37b1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:12.730 UTC [gossip.gossip] handleMessage -> DEBU 37b2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.730 UTC [gossip.gossip] handleMessage -> DEBU 37b3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37b4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37b5 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [msp] DeserializeIdentity -> DEBU 37b6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37b7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [cauthdsl] func1 -> DEBU 37bd 0xc0004fcd70 gate 1569284772732640200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37be 0xc0004fcd70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37bf 0xc0004fcd70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37c0 0xc0004fcd70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37c1 0xc0004fcd70 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [cauthdsl] func1 -> DEBU 37c2 0xc0004fcd70 gate 1569284772732640200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37c3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [cauthdsl] func1 -> DEBU 37c6 0xc0004fd5b0 gate 1569284772732910500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37c7 0xc0004fd5b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37c8 0xc0004fd5b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [cauthdsl] func2 -> DEBU 37c9 0xc0004fd5b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [msp.identity] Verify -> DEBU 37ca Verify: digest = 00000000 96 10 60 22 aa db 3a 9c e7 c4 e8 e0 ef cd 1d fb |..`"..:.........| +peer0.org1.example.com | 00000010 a7 cd bc dd 6c 6f 38 50 d6 14 53 6e c2 de b0 9a |....lo8P..Sn....|" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [msp.identity] Verify -> DEBU 37cb Verify: sig = 00000000 30 45 02 21 00 f8 d4 bb 4d 41 b6 61 7e c8 b1 06 |0E.!....MA.a~...| +peer0.org1.example.com | 00000010 e9 30 ee 10 a5 b5 1f 12 85 43 b4 ea 04 a9 a8 55 |.0.......C.....U| +peer0.org1.example.com | 00000020 e5 82 ba 1d 5f 02 20 23 93 27 cc b5 65 1a 9b f1 |...._. #.'..e...| +peer0.org1.example.com | 00000030 08 c4 ab 5f 2d 58 51 08 6b 54 f0 cf e2 1a 5e 57 |..._-XQ.kT....^W| +peer0.org1.example.com | 00000040 c0 78 ce 66 cf 75 9d |.x.f.u.|" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [cauthdsl] func2 -> DEBU 37cc 0xc0004fd5b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [cauthdsl] func1 -> DEBU 37cd 0xc0004fd5b0 gate 1569284772732910500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [policies] Evaluate -> DEBU 37ce Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [policies] Evaluate -> DEBU 37cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [policies] Evaluate -> DEBU 37d0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [policies] Evaluate -> DEBU 37d1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.discovery] handleAliveMessage -> DEBU 37d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d4 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d5 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.discovery] handleAliveMessage -> DEBU 37d8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37da Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37db Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.gossip] handleMessage -> DEBU 37dc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.gossip] handleMessage -> DEBU 37dd Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.gossip] handleMessage -> DEBU 37de Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.733 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37df Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.734 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37e0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.734 UTC [gossip.discovery] sendMemResponse -> DEBU 37e1 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:12.734 UTC [msp] DeserializeIdentity -> DEBU 37e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.740 UTC [msp] DeserializeIdentity -> DEBU 37e3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.740 UTC [msp] DeserializeIdentity -> DEBU 37e4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:12.740 UTC [gossip.comm] Send -> DEBU 37e5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:12.741 UTC [gossip.discovery] sendMemResponse -> DEBU 37e6 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0207" signature:"0E\002!\000\307\354\301\\!\\\340\203\356\252;\2313%:\351\364\374\215\256\021R\341\273\374\344TAi\000\260\302\002 >'P\353\230\263\035\275\374f\273+\022,\356E\340'\212,\002\"\235\256\351t\242\031G\326Tb" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 37e7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 37e8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:12.822 UTC [gossip.comm] func1 -> DEBU 37e9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.822 UTC [gossip.gossip] handleMessage -> DEBU 37ea Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.823 UTC [gossip.pull] HandleMessage -> DEBU 37eb GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:12.825 UTC [gossip.pull] SendDigest -> DEBU 37ec Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:12.825 UTC [gossip.gossip] handleMessage -> DEBU 37ed Exiting" +peer0.org1.example.com | "2019-09-24 00:26:13.108 UTC [gossip.gossip] handleMessage -> DEBU 37ee Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:13.109 UTC [msp] DeserializeIdentity -> DEBU 37ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:13.110 UTC [msp] DeserializeIdentity -> DEBU 37f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:13.110 UTC [msp] DeserializeIdentity -> DEBU 37f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:13.110 UTC [gossip.gossip] handleMessage -> DEBU 37f2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:13.657 UTC [gossip.comm] func1 -> DEBU 37f3 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:13.659 UTC [gossip.gossip] handleMessage -> DEBU 37f4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:13.659 UTC [gossip.pull] HandleMessage -> DEBU 37f5 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:13.659 UTC [gossip.pull] SendDigest -> DEBU 37f6 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:13.659 UTC [gossip.gossip] handleMessage -> DEBU 37f7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:13.746 UTC [gossip.comm] func1 -> DEBU 37f8 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:13.746 UTC [gossip.gossip] handleMessage -> DEBU 37f9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:13.746 UTC [gossip.gossip] handleMessage -> DEBU 37fa Exiting" +peer0.org1.example.com | "2019-09-24 00:26:13.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37fb Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:13.746 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37fc Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:13.747 UTC [msp.identity] Verify -> DEBU 37fd Verify: digest = 00000000 9f 47 9d 2b 1e f0 b0 d8 55 78 97 87 67 21 53 0c |.G.+....Ux..g!S.| +peer0.org1.example.com | 00000010 37 a8 c6 ea 9b eb a8 58 ec 30 a4 34 08 bc 5a 60 |7......X.0.4..Z`|" +peer0.org1.example.com | "2019-09-24 00:26:13.747 UTC [msp.identity] Verify -> DEBU 37fe Verify: sig = 00000000 30 45 02 21 00 e3 b8 44 16 6c be ad 16 36 58 fa |0E.!...D.l...6X.| +peer0.org1.example.com | 00000010 97 35 a7 f8 21 f7 f4 0b 01 22 5e 7b ed f5 13 95 |.5..!...."^{....| +peer0.org1.example.com | 00000020 f4 f4 f7 cb ac 02 20 54 f7 87 fc 3e 18 29 76 d6 |...... T...>.)v.| +peer0.org1.example.com | 00000030 dc 1b 13 a8 a4 c1 4e c7 a0 00 9d 63 d4 3c 9e 55 |......N....c.<.U| +peer0.org1.example.com | 00000040 49 8d 63 08 3c 68 f1 |I.c. DEBU 37ff Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:13.749 UTC [msp.identity] Verify -> DEBU 3800 Verify: sig = 00000000 30 44 02 20 36 29 63 a9 61 bf f4 97 2e 7b dd 0a |0D. 6)c.a....{..| +peer0.org1.example.com | 00000010 d8 43 cc 61 43 4e 82 2d 2f ca f5 c2 dc 80 3f 9d |.C.aCN.-/.....?.| +peer0.org1.example.com | 00000020 94 de a0 8c 02 20 78 33 67 f7 3f c1 93 57 c0 ab |..... x3g.?..W..| +peer0.org1.example.com | 00000030 fb ca 51 57 43 f4 0f 9f 90 ee d5 ca 4f e6 87 26 |..QWC.......O..&| +peer0.org1.example.com | 00000040 8c d6 3c 33 ea b5 |..<3..|" +peer0.org1.example.com | "2019-09-24 00:26:13.749 UTC [gossip.discovery] handleAliveMessage -> DEBU 3801 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:13.749 UTC [gossip.discovery] learnExistingMembers -> DEBU 3802 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:13.749 UTC [gossip.discovery] learnExistingMembers -> DEBU 3803 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:13.749 UTC [gossip.discovery] learnExistingMembers -> DEBU 3804 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:13.749 UTC [gossip.discovery] learnExistingMembers -> DEBU 3805 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:13.749 UTC [gossip.discovery] learnExistingMembers -> DEBU 3806 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:13.749 UTC [gossip.discovery] handleAliveMessage -> DEBU 3807 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:13.749 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3808 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:13.749 UTC [gossip.discovery] sendMemResponse -> DEBU 3809 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:13.749 UTC [msp] DeserializeIdentity -> DEBU 380a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:13.750 UTC [msp] DeserializeIdentity -> DEBU 380b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:13.750 UTC [gossip.comm] Send -> DEBU 380c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:13.750 UTC [gossip.discovery] sendMemResponse -> DEBU 380d Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 > alive: " +peer0.org1.example.com | "2019-09-24 00:26:13.750 UTC [gossip.comm] sendToEndpoint -> DEBU 380e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:13.750 UTC [gossip.comm] sendToEndpoint -> DEBU 380f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.043 UTC [gossip.comm] func1 -> DEBU 3810 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.047 UTC [gossip.gossip] handleMessage -> DEBU 3811 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.047 UTC [msp] DeserializeIdentity -> DEBU 3812 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.047 UTC [msp] DeserializeIdentity -> DEBU 3813 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.047 UTC [msp] DeserializeIdentity -> DEBU 3814 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.047 UTC [gossip.gossip] handleMessage -> DEBU 3815 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 3816 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:14.601 UTC [msp.identity] Sign -> DEBU 3817 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151034 " +peer0.org1.example.com | "2019-09-24 00:26:14.601 UTC [msp.identity] Sign -> DEBU 3818 Sign: digest: FC31D8E0FCB25DDB45B82524B1FB066F457BBE3F798C820690A3263A3A86ACB5 " +peer0.org1.example.com | "2019-09-24 00:26:14.601 UTC [msp] GetDefaultSigningIdentity -> DEBU 3819 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [msp.identity] Sign -> DEBU 381a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [msp.identity] Sign -> DEBU 381b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [gossip.discovery] periodicalSendAlive -> DEBU 381c Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [msp] DeserializeIdentity -> DEBU 381d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [msp] DeserializeIdentity -> DEBU 381e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [msp] DeserializeIdentity -> DEBU 381f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [gossip.comm] Send -> DEBU 3820 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [msp] DeserializeIdentity -> DEBU 3821 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [gossip.comm] Send -> DEBU 3822 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [gossip.comm] Send -> DEBU 3823 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [gossip.comm] sendToEndpoint -> DEBU 3824 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [gossip.comm] sendToEndpoint -> DEBU 3825 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [gossip.comm] sendToEndpoint -> DEBU 3826 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.602 UTC [gossip.comm] sendToEndpoint -> DEBU 3827 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.607 UTC [gossip.comm] sendToEndpoint -> DEBU 3828 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.607 UTC [gossip.comm] sendToEndpoint -> DEBU 3829 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.958 UTC [gossip.gossip] handleMessage -> DEBU 382a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.958 UTC [gossip.gossip] handleMessage -> DEBU 382b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 382c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.958 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 382d Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [msp] DeserializeIdentity -> DEBU 382e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 382f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3830 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3831 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [policies] Evaluate -> DEBU 3832 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [policies] Evaluate -> DEBU 3833 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [policies] Evaluate -> DEBU 3834 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [cauthdsl] func1 -> DEBU 3835 0xc0001e6f90 gate 1569284774959484900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [cauthdsl] func2 -> DEBU 3836 0xc0001e6f90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [cauthdsl] func2 -> DEBU 3837 0xc0001e6f90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [cauthdsl] func2 -> DEBU 3838 0xc0001e6f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [cauthdsl] func2 -> DEBU 3839 0xc0001e6f90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [cauthdsl] func1 -> DEBU 383a 0xc0001e6f90 gate 1569284774959484900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:14.962 UTC [gossip.comm] func1 -> DEBU 383b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.959 UTC [policies] Evaluate -> DEBU 383c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 383d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 383e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [cauthdsl] func1 -> DEBU 383f 0xc0001e77d0 gate 1569284774968319800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [cauthdsl] func2 -> DEBU 3840 0xc0001e77d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [cauthdsl] func2 -> DEBU 3841 0xc0001e77d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [cauthdsl] func2 -> DEBU 3842 0xc0001e77d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [msp.identity] Verify -> DEBU 3843 Verify: digest = 00000000 b3 a0 80 25 30 5d 3b 5f 95 a9 91 5d 85 72 29 27 |...%0];_...].r)'| +peer0.org1.example.com | 00000010 1a fa 1a 4e 3f 16 46 80 b4 5d 61 8e c2 0a 7e 5b |...N?.F..]a...~[|" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [msp.identity] Verify -> DEBU 3844 Verify: sig = 00000000 30 44 02 20 46 17 a7 f1 a4 29 d8 0a 9e 53 5a ba |0D. F....)...SZ.| +peer0.org1.example.com | 00000010 24 6a 6d 3c bf 4e 29 6e 04 12 8c 40 24 1c a6 bd |$jm<.N)n...@$...| +peer0.org1.example.com | 00000020 6b 86 bc d1 02 20 34 a9 e0 51 4f 0b cc 03 a6 23 |k.... 4..QO....#| +peer0.org1.example.com | 00000030 f2 d6 9c 98 78 06 92 5c 99 ef 94 f6 75 40 4d 52 |....x..\....u@MR| +peer0.org1.example.com | 00000040 0e 9b 09 2c ab 90 |...,..|" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [cauthdsl] func2 -> DEBU 3845 0xc0001e77d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [cauthdsl] func1 -> DEBU 3846 0xc0001e77d0 gate 1569284774968319800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 3847 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 3848 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 3849 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 384a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 384b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 384c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 384d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:14.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 384e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:14.969 UTC [gossip.discovery] learnExistingMembers -> DEBU 384f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:14.969 UTC [gossip.discovery] learnExistingMembers -> DEBU 3850 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.969 UTC [gossip.discovery] handleAliveMessage -> DEBU 3851 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3852 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.969 UTC [gossip.gossip] handleMessage -> DEBU 3853 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.969 UTC [gossip.gossip] handleMessage -> DEBU 3854 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3855 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3856 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.974 UTC [gossip.comm] func1 -> DEBU 3857 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.974 UTC [gossip.gossip] handleMessage -> DEBU 3858 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.974 UTC [gossip.gossip] handleMessage -> DEBU 3859 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.981 UTC [msp] DeserializeIdentity -> DEBU 385c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.982 UTC [msp] DeserializeIdentity -> DEBU 385d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.982 UTC [msp] DeserializeIdentity -> DEBU 385e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.985 UTC [msp] DeserializeIdentity -> DEBU 385f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.986 UTC [msp] DeserializeIdentity -> DEBU 3860 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.986 UTC [msp] DeserializeIdentity -> DEBU 3861 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.986 UTC [msp] DeserializeIdentity -> DEBU 3862 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.986 UTC [gossip.comm] Send -> DEBU 3863 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:14.986 UTC [msp] DeserializeIdentity -> DEBU 3864 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:14.986 UTC [gossip.comm] Send -> DEBU 3865 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:14.986 UTC [gossip.comm] sendToEndpoint -> DEBU 3866 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.986 UTC [gossip.comm] sendToEndpoint -> DEBU 3867 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:14.986 UTC [gossip.comm] sendToEndpoint -> DEBU 3868 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:14.986 UTC [gossip.comm] sendToEndpoint -> DEBU 3869 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.672 UTC [gossip.comm] func1 -> DEBU 386a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.672 UTC [gossip.gossip] handleMessage -> DEBU 386b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.672 UTC [gossip.gossip] handleMessage -> DEBU 386c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 386d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.672 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 386e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:15.672 UTC [msp] DeserializeIdentity -> DEBU 386f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3870 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3871 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3872 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 3873 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 3874 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 3875 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func1 -> DEBU 3876 0xc0001f3850 gate 1569284775673318700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3877 0xc0001f3850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3878 0xc0001f3850 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3879 0xc0001f3850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 387a 0xc0001f3850 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func1 -> DEBU 387b 0xc0001f3850 gate 1569284775673318700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 387c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 387d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 387e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func1 -> DEBU 387f 0xc00031e090 gate 1569284775673603200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3880 0xc00031e090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3881 0xc00031e090 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3882 0xc00031e090 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [msp.identity] Verify -> DEBU 3883 Verify: digest = 00000000 81 4e e1 4c 6a b2 48 4c f3 9e f6 69 25 37 e8 b6 |.N.Lj.HL...i%7..| +peer0.org1.example.com | 00000010 6e f1 9b 56 c1 d7 78 49 17 33 a8 62 23 9a 41 e1 |n..V..xI.3.b#.A.|" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [msp.identity] Verify -> DEBU 3884 Verify: sig = 00000000 30 44 02 20 31 6e 64 19 73 13 50 1c 52 80 bd 23 |0D. 1nd.s.P.R..#| +peer0.org1.example.com | 00000010 90 2d 69 a5 c2 15 d6 c9 7e 7d 5a a3 42 04 88 fe |.-i.....~}Z.B...| +peer0.org1.example.com | 00000020 e1 c6 ba 70 02 20 6f 7c 36 8c c2 6f 16 99 f0 9b |...p. o|6..o....| +peer0.org1.example.com | 00000030 29 21 64 8d 9b 15 a0 a1 2d 0e 19 32 02 fb d4 4d |)!d.....-..2...M| +peer0.org1.example.com | 00000040 12 0c d1 ac ed c4 |......|" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3885 0xc00031e090 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [cauthdsl] func1 -> DEBU 3886 0xc00031e090 gate 1569284775673603200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 3887 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [policies] Evaluate -> DEBU 3888 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [policies] Evaluate -> DEBU 3889 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [policies] Evaluate -> DEBU 388a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.discovery] handleAliveMessage -> DEBU 388b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 388c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 388d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 388e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 388f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 3890 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.discovery] handleAliveMessage -> DEBU 3891 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3892 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.comm] func1 -> DEBU 3893 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.gossip] handleMessage -> DEBU 3894 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.gossip] handleMessage -> DEBU 3895 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3896 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3897 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 3898 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 3899 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 389a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 389b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 389c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 389d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.686 UTC [gossip.comm] Send -> DEBU 389e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 389f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.687 UTC [msp] DeserializeIdentity -> DEBU 38a0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.687 UTC [gossip.comm] Send -> DEBU 38a1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:15.687 UTC [gossip.comm] sendToEndpoint -> DEBU 38a2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.687 UTC [gossip.comm] sendToEndpoint -> DEBU 38a3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.687 UTC [gossip.comm] sendToEndpoint -> DEBU 38a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.687 UTC [gossip.comm] sendToEndpoint -> DEBU 38a5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.690 UTC [gossip.gossip] handleMessage -> DEBU 38a6 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.690 UTC [gossip.gossip] handleMessage -> DEBU 38a7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38a8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.701 UTC [gossip.pull] Hello -> DEBU 38aa Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:15.702 UTC [gossip.comm] Send -> DEBU 38ab Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:15.703 UTC [gossip.pull] Hello -> DEBU 38ac Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:15.703 UTC [gossip.comm] Send -> DEBU 38ad Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:15.703 UTC [gossip.pull] Hello -> DEBU 38ae Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:15.703 UTC [gossip.comm] Send -> DEBU 38af Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.708 UTC [gossip.comm] func1 -> DEBU 38b6 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.708 UTC [gossip.gossip] handleMessage -> DEBU 38b7 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.708 UTC [gossip.pull] HandleMessage -> DEBU 38b8 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.708 UTC [gossip.gossip] handleMessage -> DEBU 38b9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.708 UTC [gossip.comm] func1 -> DEBU 38ba Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.708 UTC [gossip.gossip] handleMessage -> DEBU 38bb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.708 UTC [gossip.pull] HandleMessage -> DEBU 38bc GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.709 UTC [gossip.gossip] handleMessage -> DEBU 38bd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.709 UTC [gossip.gossip] handleMessage -> DEBU 38be Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.709 UTC [gossip.pull] HandleMessage -> DEBU 38bf GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.709 UTC [gossip.gossip] handleMessage -> DEBU 38c0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.853 UTC [msp] GetDefaultSigningIdentity -> DEBU 38c1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:15.853 UTC [msp.identity] Sign -> DEBU 38c2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151035 " +peer0.org1.example.com | "2019-09-24 00:26:15.853 UTC [msp.identity] Sign -> DEBU 38c3 Sign: digest: B8EE086DE181E3C3F687EB6FD42B8FAB810A418A3A56BBBB83E1118E94B42992 " +peer0.org1.example.com | "2019-09-24 00:26:15.853 UTC [msp] GetDefaultSigningIdentity -> DEBU 38c4 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:15.853 UTC [msp.identity] Sign -> DEBU 38c5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:15.853 UTC [msp.identity] Sign -> DEBU 38c6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:15.853 UTC [msp] DeserializeIdentity -> DEBU 38c7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.853 UTC [gossip.comm] Send -> DEBU 38c8 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:15.853 UTC [msp] DeserializeIdentity -> DEBU 38c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.853 UTC [gossip.comm] Send -> DEBU 38ca Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:15.854 UTC [gossip.comm] Send -> DEBU 38cb Entering, sending GossipMessage: tag:EMPTY mem_req:\344\333`Z\r\270\010K\002 8\334\270\271\2075R\212\326\\\251c\026\004%\003P\316\3411\326\315\321\035\244}\250\220\262\023\257\252" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38cc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\344\333`Z\r\270\010K\002 8\334\270\271\2075R\212\326\\\251c\026\004%\003P\316\3411\326\315\321\035\244}\250\220\262\023\257\252" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38cd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38ce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38cf Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38d0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38d1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.855 UTC [gossip.gossip] handleMessage -> DEBU 38d2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.855 UTC [gossip.gossip] handleMessage -> DEBU 38d3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.856 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38d5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:15.857 UTC [msp.identity] Verify -> DEBU 38d6 Verify: digest = 00000000 9f 47 9d 2b 1e f0 b0 d8 55 78 97 87 67 21 53 0c |.G.+....Ux..g!S.| +peer0.org1.example.com | 00000010 37 a8 c6 ea 9b eb a8 58 ec 30 a4 34 08 bc 5a 60 |7......X.0.4..Z`|" +peer0.org1.example.com | "2019-09-24 00:26:15.857 UTC [gossip.comm] func1 -> DEBU 38d8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.857 UTC [gossip.gossip] handleMessage -> DEBU 38da Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.857 UTC [msp.identity] Verify -> DEBU 38d9 Verify: sig = 00000000 30 45 02 21 00 e3 b8 44 16 6c be ad 16 36 58 fa |0E.!...D.l...6X.| +peer0.org1.example.com | 00000010 97 35 a7 f8 21 f7 f4 0b 01 22 5e 7b ed f5 13 95 |.5..!...."^{....| +peer0.org1.example.com | 00000020 f4 f4 f7 cb ac 02 20 54 f7 87 fc 3e 18 29 76 d6 |...... T...>.)v.| +peer0.org1.example.com | 00000030 dc 1b 13 a8 a4 c1 4e c7 a0 00 9d 63 d4 3c 9e 55 |......N....c.<.U| +peer0.org1.example.com | 00000040 49 8d 63 08 3c 68 f1 |I.c. DEBU 38db Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 38dc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.859 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38dd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:15.859 UTC [msp.identity] Verify -> DEBU 38de Verify: digest = 00000000 b8 ee 08 6d e1 81 e3 c3 f6 87 eb 6f d4 2b 8f ab |...m.......o.+..| +peer0.org1.example.com | 00000010 81 0a 41 8a 3a 56 bb bb 83 e1 11 8e 94 b4 29 92 |..A.:V........).|" +peer0.org1.example.com | "2019-09-24 00:26:15.860 UTC [msp.identity] Verify -> DEBU 38df Verify: sig = 00000000 30 44 02 20 08 df d1 9e 5c 63 c8 bb 79 70 5c 0d |0D. ....\c..yp\.| +peer0.org1.example.com | 00000010 5a ba 86 d4 20 bd f5 26 48 07 af c4 ca 81 22 5b |Z... ..&H....."[| +peer0.org1.example.com | 00000020 09 b1 72 c1 02 20 2d a0 3b 71 36 34 54 88 18 49 |..r.. -.;q64T..I| +peer0.org1.example.com | 00000030 f5 8f 75 81 39 73 45 4a 97 a4 47 56 1d a1 02 1e |..u.9sEJ..GV....| +peer0.org1.example.com | 00000040 36 d5 ac 99 99 e5 |6.....|" +peer0.org1.example.com | "2019-09-24 00:26:15.860 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.857 UTC [gossip.comm] func1 -> DEBU 38d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.864 UTC [gossip.discovery] isSentByMe -> DEBU 38e1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.864 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.864 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38e5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:15.864 UTC [msp.identity] Verify -> DEBU 38e6 Verify: digest = 00000000 b8 ee 08 6d e1 81 e3 c3 f6 87 eb 6f d4 2b 8f ab |...m.......o.+..| +peer0.org1.example.com | 00000010 81 0a 41 8a 3a 56 bb bb 83 e1 11 8e 94 b4 29 92 |..A.:V........).|" +peer0.org1.example.com | "2019-09-24 00:26:15.864 UTC [msp.identity] Verify -> DEBU 38e7 Verify: sig = 00000000 30 44 02 20 08 df d1 9e 5c 63 c8 bb 79 70 5c 0d |0D. ....\c..yp\.| +peer0.org1.example.com | 00000010 5a ba 86 d4 20 bd f5 26 48 07 af c4 ca 81 22 5b |Z... ..&H....."[| +peer0.org1.example.com | 00000020 09 b1 72 c1 02 20 2d a0 3b 71 36 34 54 88 18 49 |..r.. -.;q64T..I| +peer0.org1.example.com | 00000030 f5 8f 75 81 39 73 45 4a 97 a4 47 56 1d a1 02 1e |..u.9sEJ..GV....| +peer0.org1.example.com | 00000040 36 d5 ac 99 99 e5 |6.....|" +peer0.org1.example.com | "2019-09-24 00:26:15.864 UTC [msp.identity] Verify -> DEBU 38e8 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:15.864 UTC [msp.identity] Verify -> DEBU 38e9 Verify: sig = 00000000 30 44 02 20 22 bb b0 6a f0 f2 35 03 a9 54 a0 b6 |0D. "..j..5..T..| +peer0.org1.example.com | 00000010 34 48 87 76 14 43 7f 33 0f 0a f9 3e e4 db 60 5a |4H.v.C.3...>..`Z| +peer0.org1.example.com | 00000020 0d b8 08 4b 02 20 38 dc b8 b9 87 35 52 8a d6 5c |...K. 8....5R..\| +peer0.org1.example.com | 00000030 a9 63 16 04 25 03 50 ce e1 31 d6 cd d1 1d a4 7d |.c..%.P..1.....}| +peer0.org1.example.com | 00000040 a8 90 b2 13 af aa |......|" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 38ea Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.discovery] isSentByMe -> DEBU 38eb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 38ec Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ed Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.gossip] handleMessage -> DEBU 38ee Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.gossip] handleMessage -> DEBU 38ef Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.gossip] handleMessage -> DEBU 38f0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38f2 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [msp.identity] Verify -> DEBU 38f3 Verify: digest = 00000000 b8 ee 08 6d e1 81 e3 c3 f6 87 eb 6f d4 2b 8f ab |...m.......o.+..| +peer0.org1.example.com | 00000010 81 0a 41 8a 3a 56 bb bb 83 e1 11 8e 94 b4 29 92 |..A.:V........).|" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [msp.identity] Verify -> DEBU 38f4 Verify: sig = 00000000 30 44 02 20 08 df d1 9e 5c 63 c8 bb 79 70 5c 0d |0D. ....\c..yp\.| +peer0.org1.example.com | 00000010 5a ba 86 d4 20 bd f5 26 48 07 af c4 ca 81 22 5b |Z... ..&H....."[| +peer0.org1.example.com | 00000020 09 b1 72 c1 02 20 2d a0 3b 71 36 34 54 88 18 49 |..r.. -.;q64T..I| +peer0.org1.example.com | 00000030 f5 8f 75 81 39 73 45 4a 97 a4 47 56 1d a1 02 1e |..u.9sEJ..GV....| +peer0.org1.example.com | 00000040 36 d5 ac 99 99 e5 |6.....|" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 38f5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.discovery] isSentByMe -> DEBU 38f6 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 38f7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.866 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38f8 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:15.866 UTC [msp.identity] Verify -> DEBU 38f9 Verify: digest = 00000000 9f 47 9d 2b 1e f0 b0 d8 55 78 97 87 67 21 53 0c |.G.+....Ux..g!S.| +peer0.org1.example.com | 00000010 37 a8 c6 ea 9b eb a8 58 ec 30 a4 34 08 bc 5a 60 |7......X.0.4..Z`|" +peer0.org1.example.com | "2019-09-24 00:26:15.866 UTC [msp.identity] Verify -> DEBU 38fa Verify: sig = 00000000 30 45 02 21 00 e3 b8 44 16 6c be ad 16 36 58 fa |0E.!...D.l...6X.| +peer0.org1.example.com | 00000010 97 35 a7 f8 21 f7 f4 0b 01 22 5e 7b ed f5 13 95 |.5..!...."^{....| +peer0.org1.example.com | 00000020 f4 f4 f7 cb ac 02 20 54 f7 87 fc 3e 18 29 76 d6 |...... T...>.)v.| +peer0.org1.example.com | 00000030 dc 1b 13 a8 a4 c1 4e c7 a0 00 9d 63 d4 3c 9e 55 |......N....c.<.U| +peer0.org1.example.com | 00000040 49 8d 63 08 3c 68 f1 |I.c. DEBU 38fb Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.866 UTC [gossip.discovery] handleAliveMessage -> DEBU 38fc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38fd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:15.925 UTC [gossip.gossip] handleMessage -> DEBU 38fe Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.925 UTC [gossip.pull] HandleMessage -> DEBU 38ff GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:15.925 UTC [msp] DeserializeIdentity -> DEBU 3900 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.925 UTC [msp] DeserializeIdentity -> DEBU 3901 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.926 UTC [msp] DeserializeIdentity -> DEBU 3902 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.926 UTC [msp] DeserializeIdentity -> DEBU 3903 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.926 UTC [msp] DeserializeIdentity -> DEBU 3904 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.926 UTC [msp] DeserializeIdentity -> DEBU 3905 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:15.926 UTC [gossip.pull] SendDigest -> DEBU 3906 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:15.927 UTC [gossip.gossip] handleMessage -> DEBU 3907 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.022 UTC [gossip.gossip] handleMessage -> DEBU 3908 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.022 UTC [gossip.gossip] handleMessage -> DEBU 3909 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.023 UTC [gossip.discovery] handleMsgFromComm -> DEBU 390a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.023 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 390b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:16.023 UTC [msp] DeserializeIdentity -> DEBU 390c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 390d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:16.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 390e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 390f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.023 UTC [policies] Evaluate -> DEBU 3910 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [policies] Evaluate -> DEBU 3911 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [policies] Evaluate -> DEBU 3912 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [cauthdsl] func1 -> DEBU 3913 0xc0038944e0 gate 1569284776024230400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 3914 0xc0038944e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 3915 0xc0038944e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 3916 0xc0038944e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 3917 0xc0038944e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [cauthdsl] func1 -> DEBU 3918 0xc0038944e0 gate 1569284776024230400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [policies] Evaluate -> DEBU 3919 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [policies] Evaluate -> DEBU 391a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [policies] Evaluate -> DEBU 391b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [cauthdsl] func1 -> DEBU 391c 0xc003894d20 gate 1569284776024775000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 391d 0xc003894d20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 391e 0xc003894d20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 391f 0xc003894d20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.024 UTC [msp.identity] Verify -> DEBU 3920 Verify: digest = 00000000 15 02 4b ef d4 34 e7 0d a1 ef 12 4e 6d a3 29 1e |..K..4.....Nm.).| +peer0.org1.example.com | 00000010 d8 9d 6b b7 d5 4b d4 7e dd d3 b1 2e dc b1 62 b1 |..k..K.~......b.|" +peer0.org1.example.com | "2019-09-24 00:26:16.025 UTC [msp.identity] Verify -> DEBU 3921 Verify: sig = 00000000 30 44 02 20 4b 9e 52 0e 7e ef 2d 53 98 ea fc 34 |0D. K.R.~.-S...4| +peer0.org1.example.com | 00000010 92 55 49 98 ca d8 de 90 58 5c cb 01 72 01 bc 0e |.UI.....X\..r...| +peer0.org1.example.com | 00000020 22 63 2d 19 02 20 56 9b 8e e5 54 ee c5 2b 93 6f |"c-.. V...T..+.o| +peer0.org1.example.com | 00000030 5d 4a ff 54 6d 64 e3 7f 07 41 25 ad 9d 34 ce fa |]J.Tmd...A%..4..| +peer0.org1.example.com | 00000040 ff e7 49 19 3d 91 |..I.=.|" +peer0.org1.example.com | "2019-09-24 00:26:16.025 UTC [cauthdsl] func2 -> DEBU 3922 0xc003894d20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.031 UTC [cauthdsl] func1 -> DEBU 3923 0xc003894d20 gate 1569284776024775000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:16.031 UTC [policies] Evaluate -> DEBU 3924 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.031 UTC [policies] Evaluate -> DEBU 3925 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.031 UTC [policies] Evaluate -> DEBU 3926 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.032 UTC [policies] Evaluate -> DEBU 3927 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.032 UTC [gossip.discovery] handleAliveMessage -> DEBU 3928 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.035 UTC [gossip.discovery] learnExistingMembers -> DEBU 3929 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:16.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 392a updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:16.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 392b Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:16.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 392c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:16.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 392d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 392e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 392f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.038 UTC [gossip.discovery] sendMemResponse -> DEBU 3930 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:16.038 UTC [msp] DeserializeIdentity -> DEBU 3931 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.038 UTC [msp] DeserializeIdentity -> DEBU 3932 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.038 UTC [msp] DeserializeIdentity -> DEBU 3933 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.038 UTC [gossip.comm] Send -> DEBU 3934 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:16.039 UTC [gossip.discovery] sendMemResponse -> DEBU 3935 Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 alive: " +peer0.org1.example.com | "2019-09-24 00:26:16.039 UTC [gossip.comm] sendToEndpoint -> DEBU 3936 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.039 UTC [gossip.comm] sendToEndpoint -> DEBU 3937 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.121 UTC [msp] DeserializeIdentity -> DEBU 3938 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.122 UTC [msp] DeserializeIdentity -> DEBU 3939 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.122 UTC [gossip.comm] Send -> DEBU 393a Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:16.122 UTC [gossip.comm] sendToEndpoint -> DEBU 393b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.122 UTC [gossip.comm] sendToEndpoint -> DEBU 393c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.123 UTC [gossip.comm] sendToEndpoint -> DEBU 393d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.123 UTC [gossip.comm] sendToEndpoint -> DEBU 393e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.123 UTC [gossip.comm] sendToEndpoint -> DEBU 393f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.123 UTC [gossip.comm] sendToEndpoint -> DEBU 3940 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.124 UTC [gossip.comm] func1 -> DEBU 3941 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.124 UTC [gossip.gossip] handleMessage -> DEBU 3942 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.125 UTC [msp.identity] Verify -> DEBU 3943 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:16.125 UTC [msp.identity] Verify -> DEBU 3944 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:16.125 UTC [gossip.comm] func1 -> DEBU 3945 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.125 UTC [msp.identity] Verify -> DEBU 3946 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:16.125 UTC [msp.identity] Verify -> DEBU 3947 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:16.125 UTC [msp] DeserializeIdentity -> DEBU 3948 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.125 UTC [msp] DeserializeIdentity -> DEBU 3949 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 394a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 394b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 394c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 394d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 394e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 394f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [cauthdsl] func1 -> DEBU 3950 0xc003352ea0 gate 1569284776129642300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [cauthdsl] func2 -> DEBU 3951 0xc003352ea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [cauthdsl] func2 -> DEBU 3952 0xc003352ea0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [cauthdsl] func2 -> DEBU 3953 0xc003352ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [cauthdsl] func2 -> DEBU 3954 0xc003352ea0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [cauthdsl] func1 -> DEBU 3955 0xc003352ea0 gate 1569284776129642300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 3956 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 3957 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 3958 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [cauthdsl] func1 -> DEBU 3959 0xc0033536e0 gate 1569284776130010900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [cauthdsl] func2 -> DEBU 395a 0xc0033536e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [cauthdsl] func2 -> DEBU 395b 0xc0033536e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [cauthdsl] func2 -> DEBU 395c 0xc0033536e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [msp.identity] Verify -> DEBU 395d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [msp.identity] Verify -> DEBU 395e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [cauthdsl] func2 -> DEBU 395f 0xc0033536e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [cauthdsl] func1 -> DEBU 3960 0xc0033536e0 gate 1569284776130010900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [policies] Evaluate -> DEBU 3961 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [policies] Evaluate -> DEBU 3962 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [policies] Evaluate -> DEBU 3963 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [policies] Evaluate -> DEBU 3964 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [msp] DeserializeIdentity -> DEBU 3965 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [msp] DeserializeIdentity -> DEBU 3966 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3967 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3968 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.130 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3969 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 396a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 396b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 396c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func1 -> DEBU 396d 0xc003c54eb0 gate 1569284776131081500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 396e 0xc003c54eb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 396f 0xc003c54eb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 3970 0xc003c54eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 3971 0xc003c54eb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func1 -> DEBU 3972 0xc003c54eb0 gate 1569284776131081500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 3973 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 3974 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 3975 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func1 -> DEBU 3976 0xc003c556f0 gate 1569284776131343900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 3977 0xc003c556f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 3978 0xc003c556f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 3979 0xc003c556f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [msp.identity] Verify -> DEBU 397a Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [msp.identity] Verify -> DEBU 397b Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 397c 0xc003c556f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [cauthdsl] func1 -> DEBU 397d 0xc003c556f0 gate 1569284776131343900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 397e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 397f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 3980 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 3981 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [gossip.gossip] handleMessage -> DEBU 3982 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [gossip.gossip] handleMessage -> DEBU 3983 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [msp] DeserializeIdentity -> DEBU 3984 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [msp] DeserializeIdentity -> DEBU 3985 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.131 UTC [msp] DeserializeIdentity -> DEBU 3986 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3987 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3988 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3989 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 398a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 398b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 398c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [cauthdsl] func1 -> DEBU 398d 0xc0030d5230 gate 1569284776135504000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 398e 0xc0030d5230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 398f 0xc0030d5230 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 3990 0xc0030d5230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 3991 0xc0030d5230 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [cauthdsl] func1 -> DEBU 3992 0xc0030d5230 gate 1569284776135504000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 3993 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 3994 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 3995 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [cauthdsl] func1 -> DEBU 3996 0xc0030d5a70 gate 1569284776135878000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 3997 0xc0030d5a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 3998 0xc0030d5a70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 3999 0xc0030d5a70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.136 UTC [msp.identity] Verify -> DEBU 399a Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:16.136 UTC [msp.identity] Verify -> DEBU 399b Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:16.136 UTC [cauthdsl] func2 -> DEBU 399c 0xc0030d5a70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.136 UTC [cauthdsl] func1 -> DEBU 399d 0xc0030d5a70 gate 1569284776135878000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:16.136 UTC [policies] Evaluate -> DEBU 399e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.136 UTC [policies] Evaluate -> DEBU 399f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.136 UTC [policies] Evaluate -> DEBU 39a0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.136 UTC [policies] Evaluate -> DEBU 39a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.137 UTC [msp.identity] Verify -> DEBU 39a2 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:16.137 UTC [msp.identity] Verify -> DEBU 39a3 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:16.137 UTC [msp.identity] Verify -> DEBU 39a4 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:16.137 UTC [msp.identity] Verify -> DEBU 39a5 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:16.137 UTC [msp] DeserializeIdentity -> DEBU 39a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.137 UTC [msp] DeserializeIdentity -> DEBU 39a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.137 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39a8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:16.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39a9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39aa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [cauthdsl] func1 -> DEBU 39ae 0xc004aee0a0 gate 1569284776138207100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39af 0xc004aee0a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39b0 0xc004aee0a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39b1 0xc004aee0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39b2 0xc004aee0a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [cauthdsl] func1 -> DEBU 39b3 0xc004aee0a0 gate 1569284776138207100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39b4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [cauthdsl] func1 -> DEBU 39b7 0xc004aee8e0 gate 1569284776138860900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39b8 0xc004aee8e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39b9 0xc004aee8e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.139 UTC [cauthdsl] func2 -> DEBU 39ba 0xc004aee8e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.139 UTC [msp.identity] Verify -> DEBU 39bb Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:16.139 UTC [msp.identity] Verify -> DEBU 39bc Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:16.139 UTC [cauthdsl] func2 -> DEBU 39bd 0xc004aee8e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.139 UTC [cauthdsl] func1 -> DEBU 39be 0xc004aee8e0 gate 1569284776138860900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:16.139 UTC [policies] Evaluate -> DEBU 39bf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.139 UTC [policies] Evaluate -> DEBU 39c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.139 UTC [policies] Evaluate -> DEBU 39c1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.139 UTC [policies] Evaluate -> DEBU 39c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.139 UTC [gossip.gossip] handleMessage -> DEBU 39c3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.140 UTC [gossip.gossip] handleMessage -> DEBU 39c4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.140 UTC [msp] DeserializeIdentity -> DEBU 39c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.140 UTC [msp] DeserializeIdentity -> DEBU 39c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.166 UTC [msp] DeserializeIdentity -> DEBU 39c7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.167 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39c8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:16.167 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39c9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.167 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39ca Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.167 UTC [policies] Evaluate -> DEBU 39cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.167 UTC [policies] Evaluate -> DEBU 39cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:16.167 UTC [policies] Evaluate -> DEBU 39cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.167 UTC [cauthdsl] func1 -> DEBU 39ce 0xc004b52400 gate 1569284776167964800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.168 UTC [cauthdsl] func2 -> DEBU 39cf 0xc004b52400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.168 UTC [cauthdsl] func2 -> DEBU 39d0 0xc004b52400 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.168 UTC [cauthdsl] func2 -> DEBU 39d1 0xc004b52400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:16.168 UTC [cauthdsl] func2 -> DEBU 39d2 0xc004b52400 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.168 UTC [cauthdsl] func1 -> DEBU 39d3 0xc004b52400 gate 1569284776167964800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.168 UTC [policies] Evaluate -> DEBU 39d4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.168 UTC [policies] Evaluate -> DEBU 39d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.168 UTC [policies] Evaluate -> DEBU 39d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.168 UTC [cauthdsl] func1 -> DEBU 39d7 0xc004b52c40 gate 1569284776168650000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.168 UTC [cauthdsl] func2 -> DEBU 39d8 0xc004b52c40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.169 UTC [cauthdsl] func2 -> DEBU 39d9 0xc004b52c40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.169 UTC [cauthdsl] func2 -> DEBU 39da 0xc004b52c40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.169 UTC [msp.identity] Verify -> DEBU 39db Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:16.169 UTC [msp.identity] Verify -> DEBU 39dc Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:16.169 UTC [cauthdsl] func2 -> DEBU 39dd 0xc004b52c40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.169 UTC [cauthdsl] func1 -> DEBU 39de 0xc004b52c40 gate 1569284776168650000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:16.169 UTC [policies] Evaluate -> DEBU 39df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.169 UTC [policies] Evaluate -> DEBU 39e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.170 UTC [policies] Evaluate -> DEBU 39e1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.170 UTC [policies] Evaluate -> DEBU 39e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.172 UTC [msp.identity] Verify -> DEBU 39e3 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:16.172 UTC [msp.identity] Verify -> DEBU 39e4 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:16.172 UTC [msp] DeserializeIdentity -> DEBU 39e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.172 UTC [msp] DeserializeIdentity -> DEBU 39e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39e8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39e9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [cauthdsl] func1 -> DEBU 39ed 0xc004c16b40 gate 1569284776173576900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39ee 0xc004c16b40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39ef 0xc004c16b40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39f0 0xc004c16b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39f1 0xc004c16b40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [cauthdsl] func1 -> DEBU 39f2 0xc004c16b40 gate 1569284776173576900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [cauthdsl] func1 -> DEBU 39f6 0xc004c17380 gate 1569284776173852800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39f7 0xc004c17380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39f8 0xc004c17380 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39f9 0xc004c17380 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.173 UTC [msp.identity] Verify -> DEBU 39fa Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:16.174 UTC [msp.identity] Verify -> DEBU 39fb Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:16.174 UTC [cauthdsl] func2 -> DEBU 39fc 0xc004c17380 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.174 UTC [cauthdsl] func1 -> DEBU 39fd 0xc004c17380 gate 1569284776173852800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:16.174 UTC [policies] Evaluate -> DEBU 39fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.174 UTC [policies] Evaluate -> DEBU 39ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.174 UTC [policies] Evaluate -> DEBU 3a00 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.174 UTC [policies] Evaluate -> DEBU 3a01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.174 UTC [msp.identity] Verify -> DEBU 3a02 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:16.174 UTC [msp.identity] Verify -> DEBU 3a03 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:16.174 UTC [gossip.gossip] handleMessage -> DEBU 3a04 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.283 UTC [msp] DeserializeIdentity -> DEBU 3a05 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.284 UTC [msp] DeserializeIdentity -> DEBU 3a06 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.284 UTC [gossip.pull] Hello -> DEBU 3a07 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:16.284 UTC [msp] DeserializeIdentity -> DEBU 3a08 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.284 UTC [msp] DeserializeIdentity -> DEBU 3a09 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.284 UTC [gossip.comm] Send -> DEBU 3a0a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:16.284 UTC [gossip.comm] sendToEndpoint -> DEBU 3a0b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.284 UTC [gossip.comm] sendToEndpoint -> DEBU 3a0c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.285 UTC [gossip.comm] func1 -> DEBU 3a0d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.285 UTC [gossip.gossip] handleMessage -> DEBU 3a0e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.285 UTC [gossip.pull] HandleMessage -> DEBU 3a0f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.285 UTC [gossip.gossip] handleMessage -> DEBU 3a10 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.615 UTC [gossip.comm] func1 -> DEBU 3a11 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.616 UTC [gossip.gossip] handleMessage -> DEBU 3a12 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.617 UTC [msp] DeserializeIdentity -> DEBU 3a13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.617 UTC [msp] DeserializeIdentity -> DEBU 3a14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.617 UTC [gossip.gossip] handleMessage -> DEBU 3a15 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [gossip.comm] func1 -> DEBU 3a16 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [gossip.gossip] handleMessage -> DEBU 3a17 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [gossip.gossip] handleMessage -> DEBU 3a18 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a19 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a1a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [msp] DeserializeIdentity -> DEBU 3a1b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a1c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a1d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a1e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [policies] Evaluate -> DEBU 3a1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [policies] Evaluate -> DEBU 3a20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [policies] Evaluate -> DEBU 3a21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [cauthdsl] func1 -> DEBU 3a22 0xc004d23bf0 gate 1569284776699945600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.699 UTC [cauthdsl] func2 -> DEBU 3a23 0xc004d23bf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a24 0xc004d23bf0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a25 0xc004d23bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a26 0xc004d23bf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [cauthdsl] func1 -> DEBU 3a27 0xc004d23bf0 gate 1569284776699945600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a28 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a2a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [cauthdsl] func1 -> DEBU 3a2b 0xc004d36430 gate 1569284776700217500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a2c 0xc004d36430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a2d 0xc004d36430 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a2e 0xc004d36430 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [msp.identity] Verify -> DEBU 3a2f Verify: digest = 00000000 a5 ea 15 a9 19 ba 39 bb 97 2a ab 5c b5 ce fe 71 |......9..*.\...q| +peer0.org1.example.com | 00000010 e4 1c 7f e0 83 31 eb b6 64 b5 45 bd 3b 81 df 62 |.....1..d.E.;..b|" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [msp.identity] Verify -> DEBU 3a30 Verify: sig = 00000000 30 45 02 21 00 96 0e 2e 1d 0c 8d 46 75 21 d9 c3 |0E.!.......Fu!..| +peer0.org1.example.com | 00000010 ce 40 72 c2 bf 91 8c 7f 4b 78 6f 25 05 48 20 ba |.@r.....Kxo%.H .| +peer0.org1.example.com | 00000020 61 34 15 69 5e 02 20 36 d7 46 e2 4c 13 c9 df ae |a4.i^. 6.F.L....| +peer0.org1.example.com | 00000030 d6 9d 9b 2a f1 a5 a2 2b 8a a5 24 0c 35 cb 8e 04 |...*...+..$.5...| +peer0.org1.example.com | 00000040 87 c9 63 2f 60 08 11 |..c/`..|" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a31 0xc004d36430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [cauthdsl] func1 -> DEBU 3a32 0xc004d36430 gate 1569284776700217500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a33 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a35 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a36 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a37 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a38 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a39 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a3a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a3b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a3c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a3d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a3e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.700 UTC [gossip.discovery] sendMemResponse -> DEBU 3a3f Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:16.701 UTC [msp] DeserializeIdentity -> DEBU 3a40 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.701 UTC [msp] DeserializeIdentity -> DEBU 3a41 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.701 UTC [msp] DeserializeIdentity -> DEBU 3a42 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.701 UTC [gossip.comm] Send -> DEBU 3a43 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:16.701 UTC [gossip.discovery] sendMemResponse -> DEBU 3a44 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:16.701 UTC [gossip.comm] sendToEndpoint -> DEBU 3a45 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.701 UTC [gossip.comm] sendToEndpoint -> DEBU 3a46 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.720 UTC [gossip.comm] func1 -> DEBU 3a47 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.721 UTC [gossip.gossip] handleMessage -> DEBU 3a48 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.721 UTC [gossip.pull] HandleMessage -> DEBU 3a49 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:16.721 UTC [gossip.pull] SendDigest -> DEBU 3a50 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:16.721 UTC [gossip.gossip] handleMessage -> DEBU 3a51 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:16.820 UTC [gossip.comm] func1 -> DEBU 3a52 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.821 UTC [gossip.gossip] handleMessage -> DEBU 3a53 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.821 UTC [gossip.pull] HandleMessage -> DEBU 3a54 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:16.821 UTC [gossip.pull] SendDigest -> DEBU 3a55 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:16.821 UTC [gossip.gossip] handleMessage -> DEBU 3a56 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.113 UTC [gossip.gossip] handleMessage -> DEBU 3a57 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.113 UTC [msp] DeserializeIdentity -> DEBU 3a58 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.113 UTC [msp] DeserializeIdentity -> DEBU 3a59 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.113 UTC [msp] DeserializeIdentity -> DEBU 3a5a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.113 UTC [gossip.gossip] handleMessage -> DEBU 3a5b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.314 UTC [gossip.election] waitForInterrupt -> DEBU 3a5c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.314 UTC [gossip.election] IsLeader -> DEBU 3a5d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:17.315 UTC [msp] GetDefaultSigningIdentity -> DEBU 3a5e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:17.315 UTC [msp.identity] Sign -> DEBU 3a5f Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510111801 " +peer0.org1.example.com | "2019-09-24 00:26:17.315 UTC [msp.identity] Sign -> DEBU 3a60 Sign: digest: ACD1D0D93BE25799F39ADFECDAABD0580B4E8547A44FC6D67801D67265A37C8D " +peer0.org1.example.com | "2019-09-24 00:26:17.315 UTC [gossip.election] waitForInterrupt -> DEBU 3a61 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:17.315 UTC [msp] DeserializeIdentity -> DEBU 3a62 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.316 UTC [msp] DeserializeIdentity -> DEBU 3a63 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.316 UTC [msp] DeserializeIdentity -> DEBU 3a64 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.316 UTC [msp] DeserializeIdentity -> DEBU 3a65 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.316 UTC [gossip.comm] Send -> DEBU 3a66 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:17.316 UTC [msp] DeserializeIdentity -> DEBU 3a67 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.316 UTC [msp] DeserializeIdentity -> DEBU 3a68 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.319 UTC [gossip.comm] sendToEndpoint -> DEBU 3a69 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.319 UTC [gossip.comm] sendToEndpoint -> DEBU 3a6a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.670 UTC [gossip.comm] func1 -> DEBU 3a6b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.670 UTC [gossip.gossip] handleMessage -> DEBU 3a6c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.670 UTC [gossip.pull] HandleMessage -> DEBU 3a6d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.670 UTC [gossip.pull] SendDigest -> DEBU 3a6e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:17.670 UTC [gossip.gossip] handleMessage -> DEBU 3a6f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.708 UTC [gossip.comm] func1 -> DEBU 3a70 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.708 UTC [gossip.gossip] handleMessage -> DEBU 3a71 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.708 UTC [gossip.gossip] handleMessage -> DEBU 3a72 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a73 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.708 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a74 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:17.708 UTC [msp.identity] Verify -> DEBU 3a75 Verify: digest = 00000000 09 d9 46 47 ef ca 26 fa 09 a9 eb e7 35 3e 35 4a |..FG..&.....5>5J| +peer0.org1.example.com | 00000010 1c ba 09 50 d1 85 41 fb a6 d4 62 32 87 b9 e2 03 |...P..A...b2....|" +peer0.org1.example.com | "2019-09-24 00:26:17.708 UTC [msp.identity] Verify -> DEBU 3a76 Verify: sig = 00000000 30 44 02 20 14 95 fc d6 fe c1 7f 0a 3c 56 6d 69 |0D. ........ DEBU 3a77 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a78 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:17.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a79 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:17.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a7a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:17.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a7b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:17.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a7c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.709 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a7d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.709 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a7e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.717 UTC [gossip.comm] func1 -> DEBU 3a7f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.717 UTC [gossip.gossip] handleMessage -> DEBU 3a80 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.717 UTC [gossip.gossip] handleMessage -> DEBU 3a81 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a82 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a83 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.722 UTC [msp] DeserializeIdentity -> DEBU 3a84 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.722 UTC [msp] DeserializeIdentity -> DEBU 3a85 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.722 UTC [msp] DeserializeIdentity -> DEBU 3a86 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.722 UTC [gossip.comm] Send -> DEBU 3a87 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:17.722 UTC [msp] DeserializeIdentity -> DEBU 3a88 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.722 UTC [gossip.comm] Send -> DEBU 3a89 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:17.722 UTC [gossip.comm] sendToEndpoint -> DEBU 3a8a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.722 UTC [gossip.comm] sendToEndpoint -> DEBU 3a8b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.722 UTC [gossip.comm] sendToEndpoint -> DEBU 3a8c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.722 UTC [gossip.comm] sendToEndpoint -> DEBU 3a8d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.723 UTC [gossip.gossip] handleMessage -> DEBU 3a8e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.723 UTC [gossip.gossip] handleMessage -> DEBU 3a8f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.723 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a90 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.723 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a91 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.751 UTC [gossip.comm] func1 -> DEBU 3a92 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.751 UTC [gossip.gossip] handleMessage -> DEBU 3a93 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.751 UTC [gossip.gossip] handleMessage -> DEBU 3a94 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.751 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a95 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.751 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a96 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:17.751 UTC [msp.identity] Verify -> DEBU 3a97 Verify: digest = 00000000 fb 2a f3 eb 89 58 b6 80 c5 92 ef 78 95 d2 86 59 |.*...X.....x...Y| +peer0.org1.example.com | 00000010 01 86 e5 b0 3b 2c 10 2a de 30 26 94 86 c3 bb fe |....;,.*.0&.....|" +peer0.org1.example.com | "2019-09-24 00:26:17.751 UTC [msp.identity] Verify -> DEBU 3a98 Verify: sig = 00000000 30 45 02 21 00 e1 49 bf 8a 2d ca 99 56 7e e5 d4 |0E.!..I..-..V~..| +peer0.org1.example.com | 00000010 8f 95 53 cd fc 42 5d 73 88 21 15 4c 42 47 24 be |..S..B]s.!.LBG$.| +peer0.org1.example.com | 00000020 47 5c 7f 12 26 02 20 63 58 7d 4e 43 13 aa cb 86 |G\..&. cX}NC....| +peer0.org1.example.com | 00000030 6b 7e 87 1d ef 18 96 44 67 f4 9b ff c1 73 be 77 |k~.....Dg....s.w| +peer0.org1.example.com | 00000040 fa e8 5e bb de 9b 0b |..^....|" +peer0.org1.example.com | "2019-09-24 00:26:17.751 UTC [msp.identity] Verify -> DEBU 3a99 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:17.752 UTC [msp.identity] Verify -> DEBU 3a9a Verify: sig = 00000000 30 44 02 20 68 a5 af a6 e5 23 ac ad f3 49 02 70 |0D. h....#...I.p| +peer0.org1.example.com | 00000010 79 a6 0f 17 75 4f 51 2a ad e6 87 ce 8c ca 05 a9 |y...uOQ*........| +peer0.org1.example.com | 00000020 0f d0 25 2d 02 20 2d 54 7a 2d 29 49 3b 9f 54 22 |..%-. -Tz-)I;.T"| +peer0.org1.example.com | 00000030 78 54 52 3b a7 d4 e5 07 ef f9 c2 1c a6 40 7e 0f |xTR;.........@~.| +peer0.org1.example.com | 00000040 97 dc 1b 91 2e d8 |......|" +peer0.org1.example.com | "2019-09-24 00:26:17.752 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a9b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:17.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9d updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:17.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9e Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:17.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9f Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:17.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aa0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.752 UTC [gossip.discovery] handleAliveMessage -> DEBU 3aa1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3aa2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.753 UTC [gossip.discovery] sendMemResponse -> DEBU 3aa3 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:17.753 UTC [msp] DeserializeIdentity -> DEBU 3aa4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.753 UTC [msp] DeserializeIdentity -> DEBU 3aa5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:17.753 UTC [gossip.comm] Send -> DEBU 3aa6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:17.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3aa7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:17.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3aa8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:17.753 UTC [gossip.discovery] sendMemResponse -> DEBU 3aa9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:26:18.042 UTC [gossip.comm] func1 -> DEBU 3aaa Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:18.042 UTC [gossip.gossip] handleMessage -> DEBU 3aab Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:18.042 UTC [msp] DeserializeIdentity -> DEBU 3aac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:18.043 UTC [msp] DeserializeIdentity -> DEBU 3aad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:18.043 UTC [msp] DeserializeIdentity -> DEBU 3aae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:18.043 UTC [gossip.gossip] handleMessage -> DEBU 3aaf Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.548 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 3ab0 Sleeping 25s" +peer0.org1.example.com | "2019-09-24 00:26:19.602 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ab1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:19.602 UTC [msp.identity] Sign -> DEBU 3ab2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151036 " +peer0.org1.example.com | "2019-09-24 00:26:19.602 UTC [msp.identity] Sign -> DEBU 3ab3 Sign: digest: 82DA5E294701F2327C8E6E635A9F28D7B5BA6DE3C0420427CCBE08BAD944DFE2 " +peer0.org1.example.com | "2019-09-24 00:26:19.603 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ab4 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:19.603 UTC [msp.identity] Sign -> DEBU 3ab5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:19.603 UTC [msp.identity] Sign -> DEBU 3ab6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:19.603 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3ab7 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:19.612 UTC [msp] DeserializeIdentity -> DEBU 3ab8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.612 UTC [msp] DeserializeIdentity -> DEBU 3ab9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.613 UTC [gossip.comm] Send -> DEBU 3aba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:19.613 UTC [msp] DeserializeIdentity -> DEBU 3abb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.613 UTC [gossip.comm] Send -> DEBU 3abc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:19.613 UTC [msp] DeserializeIdentity -> DEBU 3abd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.613 UTC [gossip.comm] Send -> DEBU 3abe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:19.613 UTC [gossip.comm] sendToEndpoint -> DEBU 3abf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.613 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.614 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.614 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.614 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.614 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.pull] Hello -> DEBU 3ac5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.comm] Send -> DEBU 3ac6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.pull] Hello -> DEBU 3ac7 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.comm] Send -> DEBU 3ac8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.pull] Hello -> DEBU 3ac9 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.comm] Send -> DEBU 3aca Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3acb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3acc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3acd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3ace Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3acf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3ad0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.709 UTC [gossip.comm] func1 -> DEBU 3ad1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3ad2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.709 UTC [gossip.pull] HandleMessage -> DEBU 3ad3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.709 UTC [gossip.comm] func1 -> DEBU 3ad4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3ad5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3ad6 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.709 UTC [gossip.pull] HandleMessage -> DEBU 3ad7 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3ad8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3ad9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.709 UTC [gossip.pull] HandleMessage -> DEBU 3ada GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3adb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.854 UTC [msp] GetDefaultSigningIdentity -> DEBU 3adc Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:19.854 UTC [msp.identity] Sign -> DEBU 3add Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151037 " +peer0.org1.example.com | "2019-09-24 00:26:19.854 UTC [msp.identity] Sign -> DEBU 3ade Sign: digest: 381B0F6517855C00328B8BECE96CEB8E0814028813696E07C9DC74C3260C831C " +peer0.org1.example.com | "2019-09-24 00:26:19.854 UTC [msp] GetDefaultSigningIdentity -> DEBU 3adf Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:19.854 UTC [msp.identity] Sign -> DEBU 3ae0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:19.854 UTC [msp.identity] Sign -> DEBU 3ae1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:19.855 UTC [gossip.comm] Send -> DEBU 3ae2 Entering, sending GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:19.855 UTC [msp] DeserializeIdentity -> DEBU 3ae3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.855 UTC [gossip.comm] Send -> DEBU 3ae4 Entering, sending GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:19.855 UTC [msp] DeserializeIdentity -> DEBU 3ae5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.855 UTC [gossip.comm] Send -> DEBU 3ae6 Entering, sending GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3aea Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3aeb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3aec Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.857 UTC [gossip.comm] func1 -> DEBU 3aed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.gossip] handleMessage -> DEBU 3aee Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.gossip] handleMessage -> DEBU 3aef Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3af0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3af1 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [msp.identity] Verify -> DEBU 3af2 Verify: digest = 00000000 38 1b 0f 65 17 85 5c 00 32 8b 8b ec e9 6c eb 8e |8..e..\.2....l..| +peer0.org1.example.com | 00000010 08 14 02 88 13 69 6e 07 c9 dc 74 c3 26 0c 83 1c |.....in...t.&...|" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [msp.identity] Verify -> DEBU 3af3 Verify: sig = 00000000 30 45 02 21 00 a9 ab 3e 04 68 60 45 ff 82 ed 67 |0E.!...>.h`E...g| +peer0.org1.example.com | 00000010 b2 ce d5 ee ac 20 e1 c1 c9 39 4c 26 a9 05 ef 6f |..... ...9L&...o| +peer0.org1.example.com | 00000020 3b 37 1a 2a d6 02 20 3f db d3 52 fa 25 ff c6 63 |;7.*.. ?..R.%..c| +peer0.org1.example.com | 00000030 6e 9d eb 65 65 eb 78 bb 08 90 fa 6a 20 da 16 86 |n..ee.x....j ...| +peer0.org1.example.com | 00000040 18 e3 8b 5e a9 3b 38 |...^.;8|" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [msp.identity] Verify -> DEBU 3af4 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [msp.identity] Verify -> DEBU 3af5 Verify: sig = 00000000 30 44 02 20 0d 03 a3 48 fe 48 24 16 a4 55 88 2f |0D. ...H.H$..U./| +peer0.org1.example.com | 00000010 5f 53 b2 6e 96 ac 0c ef 85 a7 13 77 65 de 92 c0 |_S.n.......we...| +peer0.org1.example.com | 00000020 b8 9e f3 44 02 20 19 ee 62 83 be 8e 6e a3 e4 1e |...D. ..b...n...| +peer0.org1.example.com | 00000030 1f 45 97 0f 24 ed 33 67 f7 aa 98 5a bb cf d0 37 |.E..$.3g...Z...7| +peer0.org1.example.com | 00000040 e7 f0 f0 f8 fd a7 |......|" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 3af6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.discovery] isSentByMe -> DEBU 3af7 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 3af8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3af9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.gossip] handleMessage -> DEBU 3afa Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.gossip] handleMessage -> DEBU 3afb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3afc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.858 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3afd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [msp.identity] Verify -> DEBU 3afe Verify: digest = 00000000 38 1b 0f 65 17 85 5c 00 32 8b 8b ec e9 6c eb 8e |8..e..\.2....l..| +peer0.org1.example.com | 00000010 08 14 02 88 13 69 6e 07 c9 dc 74 c3 26 0c 83 1c |.....in...t.&...|" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [msp.identity] Verify -> DEBU 3aff Verify: sig = 00000000 30 45 02 21 00 a9 ab 3e 04 68 60 45 ff 82 ed 67 |0E.!...>.h`E...g| +peer0.org1.example.com | 00000010 b2 ce d5 ee ac 20 e1 c1 c9 39 4c 26 a9 05 ef 6f |..... ...9L&...o| +peer0.org1.example.com | 00000020 3b 37 1a 2a d6 02 20 3f db d3 52 fa 25 ff c6 63 |;7.*.. ?..R.%..c| +peer0.org1.example.com | 00000030 6e 9d eb 65 65 eb 78 bb 08 90 fa 6a 20 da 16 86 |n..ee.x....j ...| +peer0.org1.example.com | 00000040 18 e3 8b 5e a9 3b 38 |...^.;8|" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b00 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [gossip.discovery] isSentByMe -> DEBU 3b01 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b02 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b03 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [msp] DeserializeIdentity -> DEBU 3b04 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b06 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b07 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [policies] Evaluate -> DEBU 3b08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [policies] Evaluate -> DEBU 3b09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [policies] Evaluate -> DEBU 3b0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [cauthdsl] func1 -> DEBU 3b0b 0xc004de83a0 gate 1569284779859614200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [cauthdsl] func2 -> DEBU 3b0c 0xc004de83a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [cauthdsl] func2 -> DEBU 3b0d 0xc004de83a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [cauthdsl] func2 -> DEBU 3b0e 0xc004de83a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [cauthdsl] func2 -> DEBU 3b0f 0xc004de83a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:19.860 UTC [gossip.comm] func1 -> DEBU 3b10 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.860 UTC [gossip.gossip] handleMessage -> DEBU 3b11 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.859 UTC [cauthdsl] func1 -> DEBU 3b12 0xc004de83a0 gate 1569284779859614200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:19.860 UTC [policies] Evaluate -> DEBU 3b13 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.860 UTC [policies] Evaluate -> DEBU 3b14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.860 UTC [policies] Evaluate -> DEBU 3b15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:19.860 UTC [cauthdsl] func1 -> DEBU 3b16 0xc004de8be0 gate 1569284779860610200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:19.860 UTC [cauthdsl] func2 -> DEBU 3b17 0xc004de8be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:19.860 UTC [cauthdsl] func2 -> DEBU 3b18 0xc004de8be0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:19.860 UTC [cauthdsl] func2 -> DEBU 3b19 0xc004de8be0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:19.860 UTC [msp.identity] Verify -> DEBU 3b1a Verify: digest = 00000000 a5 ea 15 a9 19 ba 39 bb 97 2a ab 5c b5 ce fe 71 |......9..*.\...q| +peer0.org1.example.com | 00000010 e4 1c 7f e0 83 31 eb b6 64 b5 45 bd 3b 81 df 62 |.....1..d.E.;..b|" +peer0.org1.example.com | "2019-09-24 00:26:19.860 UTC [msp.identity] Verify -> DEBU 3b1b Verify: sig = 00000000 30 45 02 21 00 96 0e 2e 1d 0c 8d 46 75 21 d9 c3 |0E.!.......Fu!..| +peer0.org1.example.com | 00000010 ce 40 72 c2 bf 91 8c 7f 4b 78 6f 25 05 48 20 ba |.@r.....Kxo%.H .| +peer0.org1.example.com | 00000020 61 34 15 69 5e 02 20 36 d7 46 e2 4c 13 c9 df ae |a4.i^. 6.F.L....| +peer0.org1.example.com | 00000030 d6 9d 9b 2a f1 a5 a2 2b 8a a5 24 0c 35 cb 8e 04 |...*...+..$.5...| +peer0.org1.example.com | 00000040 87 c9 63 2f 60 08 11 |..c/`..|" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [cauthdsl] func2 -> DEBU 3b1c 0xc004de8be0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [cauthdsl] func1 -> DEBU 3b1d 0xc004de8be0 gate 1569284779860610200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [policies] Evaluate -> DEBU 3b1e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [policies] Evaluate -> DEBU 3b1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [policies] Evaluate -> DEBU 3b20 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [policies] Evaluate -> DEBU 3b21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b22 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b23 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b24 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [msp.identity] Verify -> DEBU 3b25 Verify: digest = 00000000 fb 2a f3 eb 89 58 b6 80 c5 92 ef 78 95 d2 86 59 |.*...X.....x...Y| +peer0.org1.example.com | 00000010 01 86 e5 b0 3b 2c 10 2a de 30 26 94 86 c3 bb fe |....;,.*.0&.....|" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [msp.identity] Verify -> DEBU 3b26 Verify: sig = 00000000 30 45 02 21 00 e1 49 bf 8a 2d ca 99 56 7e e5 d4 |0E.!..I..-..V~..| +peer0.org1.example.com | 00000010 8f 95 53 cd fc 42 5d 73 88 21 15 4c 42 47 24 be |..S..B]s.!.LBG$.| +peer0.org1.example.com | 00000020 47 5c 7f 12 26 02 20 63 58 7d 4e 43 13 aa cb 86 |G\..&. cX}NC....| +peer0.org1.example.com | 00000030 6b 7e 87 1d ef 18 96 44 67 f4 9b ff c1 73 be 77 |k~.....Dg....s.w| +peer0.org1.example.com | 00000040 fa e8 5e bb de 9b 0b |..^....|" +peer0.org1.example.com | "2019-09-24 00:26:19.861 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b27 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b28 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b29 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b2a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b2b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [msp.identity] Verify -> DEBU 3b2c Verify: digest = 00000000 38 1b 0f 65 17 85 5c 00 32 8b 8b ec e9 6c eb 8e |8..e..\.2....l..| +peer0.org1.example.com | 00000010 08 14 02 88 13 69 6e 07 c9 dc 74 c3 26 0c 83 1c |.....in...t.&...|" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [msp.identity] Verify -> DEBU 3b2d Verify: sig = 00000000 30 45 02 21 00 a9 ab 3e 04 68 60 45 ff 82 ed 67 |0E.!...>.h`E...g| +peer0.org1.example.com | 00000010 b2 ce d5 ee ac 20 e1 c1 c9 39 4c 26 a9 05 ef 6f |..... ...9L&...o| +peer0.org1.example.com | 00000020 3b 37 1a 2a d6 02 20 3f db d3 52 fa 25 ff c6 63 |;7.*.. ?..R.%..c| +peer0.org1.example.com | 00000030 6e 9d eb 65 65 eb 78 bb 08 90 fa 6a 20 da 16 86 |n..ee.x....j ...| +peer0.org1.example.com | 00000040 18 e3 8b 5e a9 3b 38 |...^.;8|" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b2e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [gossip.discovery] isSentByMe -> DEBU 3b2f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b30 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b31 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [msp] DeserializeIdentity -> DEBU 3b32 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [gossip.gossip] handleMessage -> DEBU 3b33 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b34 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b35 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:19.862 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b36 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:19.863 UTC [policies] Evaluate -> DEBU 3b37 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:19.863 UTC [policies] Evaluate -> DEBU 3b38 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:19.863 UTC [policies] Evaluate -> DEBU 3b39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:19.863 UTC [cauthdsl] func1 -> DEBU 3b3a 0xc004e41c90 gate 1569284779863187300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:19.863 UTC [cauthdsl] func2 -> DEBU 3b3b 0xc004e41c90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:19.865 UTC [cauthdsl] func2 -> DEBU 3b3c 0xc004e41c90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:19.865 UTC [cauthdsl] func2 -> DEBU 3b3d 0xc004e41c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:19.865 UTC [cauthdsl] func2 -> DEBU 3b3e 0xc004e41c90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:19.865 UTC [cauthdsl] func1 -> DEBU 3b3f 0xc004e41c90 gate 1569284779863187300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:19.865 UTC [policies] Evaluate -> DEBU 3b40 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.865 UTC [policies] Evaluate -> DEBU 3b41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.865 UTC [policies] Evaluate -> DEBU 3b42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:19.866 UTC [cauthdsl] func1 -> DEBU 3b43 0xc0003a84d0 gate 1569284779865981400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:19.866 UTC [cauthdsl] func2 -> DEBU 3b44 0xc0003a84d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:19.866 UTC [cauthdsl] func2 -> DEBU 3b45 0xc0003a84d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:19.866 UTC [cauthdsl] func2 -> DEBU 3b46 0xc0003a84d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:19.866 UTC [msp.identity] Verify -> DEBU 3b47 Verify: digest = 00000000 15 02 4b ef d4 34 e7 0d a1 ef 12 4e 6d a3 29 1e |..K..4.....Nm.).| +peer0.org1.example.com | 00000010 d8 9d 6b b7 d5 4b d4 7e dd d3 b1 2e dc b1 62 b1 |..k..K.~......b.|" +peer0.org1.example.com | "2019-09-24 00:26:19.866 UTC [msp.identity] Verify -> DEBU 3b48 Verify: sig = 00000000 30 44 02 20 4b 9e 52 0e 7e ef 2d 53 98 ea fc 34 |0D. K.R.~.-S...4| +peer0.org1.example.com | 00000010 92 55 49 98 ca d8 de 90 58 5c cb 01 72 01 bc 0e |.UI.....X\..r...| +peer0.org1.example.com | 00000020 22 63 2d 19 02 20 56 9b 8e e5 54 ee c5 2b 93 6f |"c-.. V...T..+.o| +peer0.org1.example.com | 00000030 5d 4a ff 54 6d 64 e3 7f 07 41 25 ad 9d 34 ce fa |]J.Tmd...A%..4..| +peer0.org1.example.com | 00000040 ff e7 49 19 3d 91 |..I.=.|" +peer0.org1.example.com | "2019-09-24 00:26:19.867 UTC [cauthdsl] func2 -> DEBU 3b49 0xc0003a84d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:19.867 UTC [cauthdsl] func1 -> DEBU 3b4a 0xc0003a84d0 gate 1569284779865981400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:19.867 UTC [policies] Evaluate -> DEBU 3b4b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.867 UTC [policies] Evaluate -> DEBU 3b4c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.867 UTC [policies] Evaluate -> DEBU 3b4d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.867 UTC [policies] Evaluate -> DEBU 3b4e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b4f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b50 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.867 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b51 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:19.868 UTC [msp.identity] Verify -> DEBU 3b52 Verify: digest = 00000000 fb 2a f3 eb 89 58 b6 80 c5 92 ef 78 95 d2 86 59 |.*...X.....x...Y| +peer0.org1.example.com | 00000010 01 86 e5 b0 3b 2c 10 2a de 30 26 94 86 c3 bb fe |....;,.*.0&.....|" +peer0.org1.example.com | "2019-09-24 00:26:19.868 UTC [msp.identity] Verify -> DEBU 3b53 Verify: sig = 00000000 30 45 02 21 00 e1 49 bf 8a 2d ca 99 56 7e e5 d4 |0E.!..I..-..V~..| +peer0.org1.example.com | 00000010 8f 95 53 cd fc 42 5d 73 88 21 15 4c 42 47 24 be |..S..B]s.!.LBG$.| +peer0.org1.example.com | 00000020 47 5c 7f 12 26 02 20 63 58 7d 4e 43 13 aa cb 86 |G\..&. cX}NC....| +peer0.org1.example.com | 00000030 6b 7e 87 1d ef 18 96 44 67 f4 9b ff c1 73 be 77 |k~.....Dg....s.w| +peer0.org1.example.com | 00000040 fa e8 5e bb de 9b 0b |..^....|" +peer0.org1.example.com | "2019-09-24 00:26:19.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b54 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b55 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.868 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b56 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.932 UTC [gossip.gossip] handleMessage -> DEBU 3b57 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.932 UTC [gossip.pull] HandleMessage -> DEBU 3b58 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b59 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b5a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b5b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b5c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b5d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b5e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.932 UTC [gossip.pull] SendDigest -> DEBU 3b5f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:19.933 UTC [gossip.gossip] handleMessage -> DEBU 3b60 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.992 UTC [gossip.gossip] handleMessage -> DEBU 3b61 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.992 UTC [gossip.gossip] handleMessage -> DEBU 3b62 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:19.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b63 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:19.993 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b64 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:19.993 UTC [msp] DeserializeIdentity -> DEBU 3b65 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:19.994 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:19.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b67 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:19.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b68 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:19.994 UTC [policies] Evaluate -> DEBU 3b69 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:19.995 UTC [policies] Evaluate -> DEBU 3b6a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:19.995 UTC [policies] Evaluate -> DEBU 3b6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:19.995 UTC [cauthdsl] func1 -> DEBU 3b6c 0xc004cf3f20 gate 1569284779995562700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:19.995 UTC [cauthdsl] func2 -> DEBU 3b6d 0xc004cf3f20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:19.995 UTC [cauthdsl] func2 -> DEBU 3b6e 0xc004cf3f20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:19.996 UTC [cauthdsl] func2 -> DEBU 3b6f 0xc004cf3f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:19.996 UTC [cauthdsl] func2 -> DEBU 3b70 0xc004cf3f20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:19.996 UTC [cauthdsl] func1 -> DEBU 3b71 0xc004cf3f20 gate 1569284779995562700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:19.997 UTC [policies] Evaluate -> DEBU 3b72 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.997 UTC [policies] Evaluate -> DEBU 3b73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:19.997 UTC [policies] Evaluate -> DEBU 3b74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:19.997 UTC [cauthdsl] func1 -> DEBU 3b75 0xc002956760 gate 1569284779997892900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:19.998 UTC [cauthdsl] func2 -> DEBU 3b76 0xc002956760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:19.998 UTC [cauthdsl] func2 -> DEBU 3b77 0xc002956760 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:19.998 UTC [cauthdsl] func2 -> DEBU 3b78 0xc002956760 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:19.998 UTC [msp.identity] Verify -> DEBU 3b79 Verify: digest = 00000000 b0 f4 d0 41 46 51 44 2d 71 43 6b b1 e8 c7 8b a8 |...AFQD-qCk.....| +peer0.org1.example.com | 00000010 f6 43 e2 a7 37 cb 3f 4a af 4a 3d 53 7f 5d 4d 6e |.C..7.?J.J=S.]Mn|" +peer0.org1.example.com | "2019-09-24 00:26:19.999 UTC [msp.identity] Verify -> DEBU 3b7a Verify: sig = 00000000 30 45 02 21 00 97 0c a4 88 06 1a 93 2b e0 bc e2 |0E.!........+...| +peer0.org1.example.com | 00000010 02 ed 82 be 9b d1 f1 c6 26 44 cc 5d ed 40 55 81 |........&D.].@U.| +peer0.org1.example.com | 00000020 f5 1d aa 56 20 02 20 18 ac 0a 6e bb 66 43 a0 51 |...V . ...n.fC.Q| +peer0.org1.example.com | 00000030 d5 a4 75 95 80 46 4e 5f d1 86 cc bd 08 5d 2a cc |..u..FN_.....]*.| +peer0.org1.example.com | 00000040 e2 b1 37 ac d6 82 d8 |..7....|" +peer0.org1.example.com | "2019-09-24 00:26:19.999 UTC [cauthdsl] func2 -> DEBU 3b7b 0xc002956760 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:19.999 UTC [cauthdsl] func1 -> DEBU 3b7c 0xc002956760 gate 1569284779997892900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:20.000 UTC [policies] Evaluate -> DEBU 3b7d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.000 UTC [policies] Evaluate -> DEBU 3b7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.000 UTC [policies] Evaluate -> DEBU 3b7f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.006 UTC [gossip.comm] func1 -> DEBU 3b80 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.005 UTC [policies] Evaluate -> DEBU 3b81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.006 UTC [gossip.gossip] handleMessage -> DEBU 3b82 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.006 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b83 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.006 UTC [gossip.comm] func1 -> DEBU 3b84 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b85 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:20.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b86 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b87 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b88 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b89 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b8a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b8b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b8c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b8d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.gossip] handleMessage -> DEBU 3b8e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.gossip] handleMessage -> DEBU 3b8f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.gossip] handleMessage -> DEBU 3b90 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b91 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b92 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.024 UTC [msp] DeserializeIdentity -> DEBU 3b93 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.024 UTC [msp] DeserializeIdentity -> DEBU 3b94 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.024 UTC [msp] DeserializeIdentity -> DEBU 3b95 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.024 UTC [msp] DeserializeIdentity -> DEBU 3b96 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.025 UTC [msp] DeserializeIdentity -> DEBU 3b97 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.025 UTC [msp] DeserializeIdentity -> DEBU 3b98 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.025 UTC [msp] DeserializeIdentity -> DEBU 3b99 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.025 UTC [gossip.comm] Send -> DEBU 3b9a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:20.025 UTC [msp] DeserializeIdentity -> DEBU 3b9b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.025 UTC [gossip.comm] Send -> DEBU 3b9c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:20.025 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.025 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.025 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.025 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.027 UTC [gossip.gossip] handleMessage -> DEBU 3ba1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.027 UTC [gossip.gossip] handleMessage -> DEBU 3ba2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.027 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ba3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.027 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ba4 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:20.027 UTC [msp] DeserializeIdentity -> DEBU 3ba5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ba6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3ba9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3baa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3bab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [cauthdsl] func1 -> DEBU 3bac 0xc002627a80 gate 1569284780028458100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3bad 0xc002627a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3bae 0xc002627a80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3baf 0xc002627a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3bb0 0xc002627a80 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [cauthdsl] func1 -> DEBU 3bb1 0xc002627a80 gate 1569284780028458100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3bb2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3bb3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3bb4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [cauthdsl] func1 -> DEBU 3bb5 0xc002c002c0 gate 1569284780028888100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3bb6 0xc002c002c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3bb7 0xc002c002c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.029 UTC [cauthdsl] func2 -> DEBU 3bb8 0xc002c002c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.029 UTC [msp.identity] Verify -> DEBU 3bb9 Verify: digest = 00000000 03 58 fc c9 3b 38 4f 8a 43 a9 97 43 8f 3d 13 89 |.X..;8O.C..C.=..| +peer0.org1.example.com | 00000010 22 9d 98 61 1a 30 20 06 49 77 8d bd cf bb a4 69 |"..a.0 .Iw.....i|" +peer0.org1.example.com | "2019-09-24 00:26:20.029 UTC [msp.identity] Verify -> DEBU 3bba Verify: sig = 00000000 30 44 02 20 7b 77 7b 23 6b 9a 0d 47 96 19 ae ed |0D. {w{#k..G....| +peer0.org1.example.com | 00000010 35 44 e2 5b bc 08 30 73 23 46 f3 fb 26 30 40 1d |5D.[..0s#F..&0@.| +peer0.org1.example.com | 00000020 e7 8f a3 37 02 20 58 74 d1 3b 7c 60 13 68 47 12 |...7. Xt.;|`.hG.| +peer0.org1.example.com | 00000030 0c 83 88 cd be 0b b2 7a 07 75 c9 52 94 c3 ce 5d |.......z.u.R...]| +peer0.org1.example.com | 00000040 4c 6a 93 f6 5a bb |Lj..Z.|" +peer0.org1.example.com | "2019-09-24 00:26:20.033 UTC [cauthdsl] func2 -> DEBU 3bbb 0xc002c002c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.037 UTC [cauthdsl] func1 -> DEBU 3bbc 0xc002c002c0 gate 1569284780028888100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:20.037 UTC [policies] Evaluate -> DEBU 3bbd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.037 UTC [policies] Evaluate -> DEBU 3bbe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.037 UTC [policies] Evaluate -> DEBU 3bbf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.037 UTC [policies] Evaluate -> DEBU 3bc0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.037 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bc1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:20.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc3 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:20.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc4 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:20.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:20.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bc7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bc8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.038 UTC [gossip.discovery] sendMemResponse -> DEBU 3bc9 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:20.038 UTC [msp] DeserializeIdentity -> DEBU 3bca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.038 UTC [msp] DeserializeIdentity -> DEBU 3bcb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.038 UTC [msp] DeserializeIdentity -> DEBU 3bcc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.038 UTC [gossip.comm] Send -> DEBU 3bcd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:20.038 UTC [gossip.comm] sendToEndpoint -> DEBU 3bce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.038 UTC [gossip.comm] sendToEndpoint -> DEBU 3bcf Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.038 UTC [gossip.discovery] sendMemResponse -> DEBU 3bd0 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:20.115 UTC [msp] DeserializeIdentity -> DEBU 3bd1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.115 UTC [msp] DeserializeIdentity -> DEBU 3bd2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.119 UTC [gossip.comm] Send -> DEBU 3bd3 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.121 UTC [gossip.comm] func1 -> DEBU 3bda Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.121 UTC [gossip.gossip] handleMessage -> DEBU 3bdb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.121 UTC [msp.identity] Verify -> DEBU 3bdc Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:20.121 UTC [msp.identity] Verify -> DEBU 3bdd Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:20.121 UTC [msp.identity] Verify -> DEBU 3bde Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:20.122 UTC [msp.identity] Verify -> DEBU 3bdf Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:20.124 UTC [msp] DeserializeIdentity -> DEBU 3be0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.124 UTC [msp] DeserializeIdentity -> DEBU 3be1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3be2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3be5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3be6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3be7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [cauthdsl] func1 -> DEBU 3be8 0xc003295930 gate 1569284780125409900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3be9 0xc003295930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3bea 0xc003295930 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3beb 0xc003295930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3bec 0xc003295930 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [cauthdsl] func1 -> DEBU 3bed 0xc003295930 gate 1569284780125409900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3bee Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3bef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3bf0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [cauthdsl] func1 -> DEBU 3bf1 0xc0035b0170 gate 1569284780125835100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3bf2 0xc0035b0170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3bf3 0xc0035b0170 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [cauthdsl] func2 -> DEBU 3bf4 0xc0035b0170 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [msp.identity] Verify -> DEBU 3bf5 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [msp.identity] Verify -> DEBU 3bf6 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [cauthdsl] func2 -> DEBU 3bf7 0xc0035b0170 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [cauthdsl] func1 -> DEBU 3bf8 0xc0035b0170 gate 1569284780125835100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [policies] Evaluate -> DEBU 3bf9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [policies] Evaluate -> DEBU 3bfa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [policies] Evaluate -> DEBU 3bfb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [policies] Evaluate -> DEBU 3bfc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [msp] DeserializeIdentity -> DEBU 3bfd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [msp] DeserializeIdentity -> DEBU 3bfe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3bff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c00 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c01 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.126 UTC [policies] Evaluate -> DEBU 3c02 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [policies] Evaluate -> DEBU 3c03 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [policies] Evaluate -> DEBU 3c04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [cauthdsl] func1 -> DEBU 3c05 0xc0035b1940 gate 1569284780127111700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c06 0xc0035b1940 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c07 0xc0035b1940 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c08 0xc0035b1940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c09 0xc0035b1940 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [cauthdsl] func1 -> DEBU 3c0a 0xc0035b1940 gate 1569284780127111700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [policies] Evaluate -> DEBU 3c0b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [policies] Evaluate -> DEBU 3c0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [policies] Evaluate -> DEBU 3c0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [cauthdsl] func1 -> DEBU 3c0e 0xc00381e180 gate 1569284780127579200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c0f 0xc00381e180 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c10 0xc00381e180 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c11 0xc00381e180 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [msp.identity] Verify -> DEBU 3c12 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [msp.identity] Verify -> DEBU 3c13 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c14 0xc00381e180 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.128 UTC [cauthdsl] func1 -> DEBU 3c15 0xc00381e180 gate 1569284780127579200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:20.128 UTC [policies] Evaluate -> DEBU 3c16 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.128 UTC [policies] Evaluate -> DEBU 3c17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.128 UTC [policies] Evaluate -> DEBU 3c18 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.128 UTC [policies] Evaluate -> DEBU 3c19 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.128 UTC [gossip.gossip] handleMessage -> DEBU 3c1a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.134 UTC [gossip.gossip] handleMessage -> DEBU 3c1b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.134 UTC [msp] DeserializeIdentity -> DEBU 3c1c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.134 UTC [msp] DeserializeIdentity -> DEBU 3c1d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.134 UTC [msp] DeserializeIdentity -> DEBU 3c1e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.134 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:20.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c20 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c21 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.134 UTC [policies] Evaluate -> DEBU 3c22 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [policies] Evaluate -> DEBU 3c23 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [policies] Evaluate -> DEBU 3c24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [cauthdsl] func1 -> DEBU 3c25 0xc00386ca90 gate 1569284780135091800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c26 0xc00386ca90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c27 0xc00386ca90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c28 0xc00386ca90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c29 0xc00386ca90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [cauthdsl] func1 -> DEBU 3c2a 0xc00386ca90 gate 1569284780135091800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [policies] Evaluate -> DEBU 3c2b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [policies] Evaluate -> DEBU 3c2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [policies] Evaluate -> DEBU 3c2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [cauthdsl] func1 -> DEBU 3c2e 0xc00386d2d0 gate 1569284780135631000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c2f 0xc00386d2d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c30 0xc00386d2d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c31 0xc00386d2d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [msp.identity] Verify -> DEBU 3c32 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:20.135 UTC [msp.identity] Verify -> DEBU 3c33 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:20.136 UTC [cauthdsl] func2 -> DEBU 3c34 0xc00386d2d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.136 UTC [cauthdsl] func1 -> DEBU 3c35 0xc00386d2d0 gate 1569284780135631000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:20.136 UTC [policies] Evaluate -> DEBU 3c36 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.136 UTC [policies] Evaluate -> DEBU 3c37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.136 UTC [policies] Evaluate -> DEBU 3c38 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.136 UTC [policies] Evaluate -> DEBU 3c39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.136 UTC [msp.identity] Verify -> DEBU 3c3a Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:20.136 UTC [msp.identity] Verify -> DEBU 3c3b Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:20.137 UTC [msp.identity] Verify -> DEBU 3c3c Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:20.137 UTC [msp.identity] Verify -> DEBU 3c3d Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:20.137 UTC [msp] DeserializeIdentity -> DEBU 3c3e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.137 UTC [msp] DeserializeIdentity -> DEBU 3c3f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.137 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c41 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c42 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [cauthdsl] func1 -> DEBU 3c46 0xc0039898e0 gate 1569284780138299400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [cauthdsl] func2 -> DEBU 3c47 0xc0039898e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [cauthdsl] func2 -> DEBU 3c48 0xc0039898e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [cauthdsl] func2 -> DEBU 3c49 0xc0039898e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [cauthdsl] func2 -> DEBU 3c4a 0xc0039898e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [cauthdsl] func1 -> DEBU 3c4b 0xc0039898e0 gate 1569284780138299400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c4c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [cauthdsl] func1 -> DEBU 3c4f 0xc003b78120 gate 1569284780138827700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.138 UTC [cauthdsl] func2 -> DEBU 3c50 0xc003b78120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [cauthdsl] func2 -> DEBU 3c51 0xc003b78120 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [cauthdsl] func2 -> DEBU 3c52 0xc003b78120 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [msp.identity] Verify -> DEBU 3c53 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [msp.identity] Verify -> DEBU 3c54 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [cauthdsl] func2 -> DEBU 3c55 0xc003b78120 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [cauthdsl] func1 -> DEBU 3c56 0xc003b78120 gate 1569284780138827700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [policies] Evaluate -> DEBU 3c57 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [policies] Evaluate -> DEBU 3c58 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [policies] Evaluate -> DEBU 3c59 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [policies] Evaluate -> DEBU 3c5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [gossip.gossip] handleMessage -> DEBU 3c5b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.139 UTC [gossip.comm] func1 -> DEBU 3c5c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.140 UTC [gossip.gossip] handleMessage -> DEBU 3c5d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.140 UTC [msp] DeserializeIdentity -> DEBU 3c5e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.140 UTC [msp] DeserializeIdentity -> DEBU 3c5f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.140 UTC [msp] DeserializeIdentity -> DEBU 3c60 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.140 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c61 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:20.140 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c62 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c63 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [policies] Evaluate -> DEBU 3c64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [policies] Evaluate -> DEBU 3c65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [policies] Evaluate -> DEBU 3c66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [cauthdsl] func1 -> DEBU 3c67 0xc003b79d90 gate 1569284780141281500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [cauthdsl] func2 -> DEBU 3c68 0xc003b79d90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [cauthdsl] func2 -> DEBU 3c69 0xc003b79d90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [cauthdsl] func2 -> DEBU 3c6a 0xc003b79d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [cauthdsl] func2 -> DEBU 3c6b 0xc003b79d90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [cauthdsl] func1 -> DEBU 3c6c 0xc003b79d90 gate 1569284780141281500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [policies] Evaluate -> DEBU 3c6d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.141 UTC [policies] Evaluate -> DEBU 3c6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.163 UTC [policies] Evaluate -> DEBU 3c6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.163 UTC [cauthdsl] func1 -> DEBU 3c70 0xc003c525d0 gate 1569284780163824700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.164 UTC [cauthdsl] func2 -> DEBU 3c71 0xc003c525d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.164 UTC [cauthdsl] func2 -> DEBU 3c72 0xc003c525d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.164 UTC [cauthdsl] func2 -> DEBU 3c73 0xc003c525d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.164 UTC [msp.identity] Verify -> DEBU 3c74 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:20.164 UTC [msp.identity] Verify -> DEBU 3c75 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:20.165 UTC [cauthdsl] func2 -> DEBU 3c76 0xc003c525d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.165 UTC [cauthdsl] func1 -> DEBU 3c77 0xc003c525d0 gate 1569284780163824700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:20.165 UTC [policies] Evaluate -> DEBU 3c78 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.165 UTC [policies] Evaluate -> DEBU 3c79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.165 UTC [policies] Evaluate -> DEBU 3c7a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.165 UTC [policies] Evaluate -> DEBU 3c7b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.166 UTC [msp.identity] Verify -> DEBU 3c7c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:20.172 UTC [msp.identity] Verify -> DEBU 3c7d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:20.183 UTC [msp] DeserializeIdentity -> DEBU 3c7e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [msp] DeserializeIdentity -> DEBU 3c7f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c80 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c81 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c82 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [policies] Evaluate -> DEBU 3c83 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [policies] Evaluate -> DEBU 3c84 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [policies] Evaluate -> DEBU 3c85 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [cauthdsl] func1 -> DEBU 3c86 0xc003e084c0 gate 1569284780184618400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [cauthdsl] func2 -> DEBU 3c87 0xc003e084c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [cauthdsl] func2 -> DEBU 3c88 0xc003e084c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [cauthdsl] func2 -> DEBU 3c89 0xc003e084c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [cauthdsl] func2 -> DEBU 3c8a 0xc003e084c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [cauthdsl] func1 -> DEBU 3c8b 0xc003e084c0 gate 1569284780184618400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [policies] Evaluate -> DEBU 3c8c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.184 UTC [policies] Evaluate -> DEBU 3c8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.199 UTC [policies] Evaluate -> DEBU 3c8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.199 UTC [cauthdsl] func1 -> DEBU 3c8f 0xc003e08d00 gate 1569284780199362300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.199 UTC [cauthdsl] func2 -> DEBU 3c90 0xc003e08d00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.199 UTC [cauthdsl] func2 -> DEBU 3c91 0xc003e08d00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.199 UTC [cauthdsl] func2 -> DEBU 3c92 0xc003e08d00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.200 UTC [msp.identity] Verify -> DEBU 3c93 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:20.200 UTC [msp.identity] Verify -> DEBU 3c94 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:20.200 UTC [cauthdsl] func2 -> DEBU 3c95 0xc003e08d00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.200 UTC [cauthdsl] func1 -> DEBU 3c96 0xc003e08d00 gate 1569284780199362300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:20.200 UTC [policies] Evaluate -> DEBU 3c97 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.200 UTC [policies] Evaluate -> DEBU 3c98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.200 UTC [policies] Evaluate -> DEBU 3c99 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.200 UTC [policies] Evaluate -> DEBU 3c9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.201 UTC [msp.identity] Verify -> DEBU 3c9b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:20.201 UTC [msp.identity] Verify -> DEBU 3c9c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:20.201 UTC [gossip.gossip] handleMessage -> DEBU 3c9d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.285 UTC [msp] DeserializeIdentity -> DEBU 3c9e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.285 UTC [msp] DeserializeIdentity -> DEBU 3c9f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.285 UTC [gossip.pull] Hello -> DEBU 3ca0 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:20.285 UTC [msp] DeserializeIdentity -> DEBU 3ca1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.285 UTC [msp] DeserializeIdentity -> DEBU 3ca2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.285 UTC [gossip.comm] Send -> DEBU 3ca3 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:20.285 UTC [gossip.comm] sendToEndpoint -> DEBU 3ca4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.285 UTC [gossip.comm] sendToEndpoint -> DEBU 3ca5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.287 UTC [gossip.comm] func1 -> DEBU 3ca6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.287 UTC [gossip.gossip] handleMessage -> DEBU 3ca7 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.287 UTC [gossip.pull] HandleMessage -> DEBU 3ca8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.287 UTC [gossip.gossip] handleMessage -> DEBU 3ca9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.622 UTC [gossip.comm] func1 -> DEBU 3caa Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.622 UTC [gossip.gossip] handleMessage -> DEBU 3cab Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.622 UTC [msp] DeserializeIdentity -> DEBU 3cac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.622 UTC [msp] DeserializeIdentity -> DEBU 3cad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.622 UTC [gossip.gossip] handleMessage -> DEBU 3cae Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.771 UTC [gossip.comm] func1 -> DEBU 3caf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.771 UTC [gossip.comm] func1 -> DEBU 3cb0 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.776 UTC [gossip.gossip] handleMessage -> DEBU 3cb1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.776 UTC [gossip.gossip] handleMessage -> DEBU 3cb2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.776 UTC [gossip.gossip] handleMessage -> DEBU 3cb3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.776 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3cb5 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:20.776 UTC [msp] DeserializeIdentity -> DEBU 3cb6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cb7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cb8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cb9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.777 UTC [policies] Evaluate -> DEBU 3cba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.777 UTC [policies] Evaluate -> DEBU 3cbb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:20.777 UTC [policies] Evaluate -> DEBU 3cbc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.777 UTC [cauthdsl] func1 -> DEBU 3cbd 0xc004c25310 gate 1569284780777815300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.777 UTC [cauthdsl] func2 -> DEBU 3cbe 0xc004c25310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cbf 0xc004c25310 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cc0 0xc004c25310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cc1 0xc004c25310 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [cauthdsl] func1 -> DEBU 3cc2 0xc004c25310 gate 1569284780777815300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [policies] Evaluate -> DEBU 3cc3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [policies] Evaluate -> DEBU 3cc4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [policies] Evaluate -> DEBU 3cc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [cauthdsl] func1 -> DEBU 3cc6 0xc004c25b50 gate 1569284780778275000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cc7 0xc004c25b50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cc8 0xc004c25b50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cc9 0xc004c25b50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [msp.identity] Verify -> DEBU 3cca Verify: digest = 00000000 cc f7 ab 59 c7 d8 c5 6c 65 25 ba 39 4a 0d 5b da |...Y...le%.9J.[.| +peer0.org1.example.com | 00000010 fd 51 59 23 4b 0e 3c 8f d2 b4 16 a2 af 85 d3 88 |.QY#K.<.........|" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [msp.identity] Verify -> DEBU 3ccb Verify: sig = 00000000 30 44 02 20 5c f1 77 5a e0 5a d2 84 bb f3 64 cc |0D. \.wZ.Z....d.| +peer0.org1.example.com | 00000010 23 6e 72 d6 1e 7a 5f 27 8e fd 09 8f a2 7a 68 e1 |#nr..z_'.....zh.| +peer0.org1.example.com | 00000020 5f 00 25 00 02 20 32 ba 78 54 fe 29 0a 06 9e 0f |_.%.. 2.xT.)....| +peer0.org1.example.com | 00000030 c4 66 dd fa 17 8e 67 cf c5 59 37 c7 cb 43 50 3b |.f....g..Y7..CP;| +peer0.org1.example.com | 00000040 12 96 16 b5 c2 50 |.....P|" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3ccc 0xc004c25b50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.778 UTC [cauthdsl] func1 -> DEBU 3ccd 0xc004c25b50 gate 1569284780778275000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [policies] Evaluate -> DEBU 3cce Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [policies] Evaluate -> DEBU 3ccf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [policies] Evaluate -> DEBU 3cd0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [policies] Evaluate -> DEBU 3cd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cd2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cd3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cd4 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cd5 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cd6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cd7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cd8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cd9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cda Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3cdb Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [msp] DeserializeIdentity -> DEBU 3cdc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cdd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:20.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cde Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cdf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:20.799 UTC [policies] Evaluate -> DEBU 3ce3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.792 UTC [msp] DeserializeIdentity -> DEBU 3ce1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.799 UTC [gossip.comm] func1 -> DEBU 3ce2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.832 UTC [gossip.comm] Send -> DEBU 3cea Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:20.833 UTC [msp] DeserializeIdentity -> DEBU 3ceb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.833 UTC [gossip.comm] Send -> DEBU 3cec Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:20.833 UTC [gossip.comm] sendToEndpoint -> DEBU 3ced Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.833 UTC [gossip.comm] sendToEndpoint -> DEBU 3cee Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.833 UTC [gossip.comm] sendToEndpoint -> DEBU 3cef Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.833 UTC [gossip.comm] sendToEndpoint -> DEBU 3cf0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.834 UTC [gossip.comm] func1 -> DEBU 3cf1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.834 UTC [gossip.comm] func1 -> DEBU 3cf2 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.791 UTC [gossip.gossip] handleMessage -> DEBU 3ce0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.842 UTC [gossip.gossip] handleMessage -> DEBU 3cf3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.843 UTC [gossip.pull] HandleMessage -> DEBU 3cf4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.843 UTC [msp] DeserializeIdentity -> DEBU 3cf5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.845 UTC [msp] DeserializeIdentity -> DEBU 3cf6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.845 UTC [msp] DeserializeIdentity -> DEBU 3cf7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.846 UTC [msp] DeserializeIdentity -> DEBU 3cf8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.846 UTC [msp] DeserializeIdentity -> DEBU 3cf9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.846 UTC [msp] DeserializeIdentity -> DEBU 3cfa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.846 UTC [gossip.pull] SendDigest -> DEBU 3cfb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:20.846 UTC [gossip.gossip] handleMessage -> DEBU 3cfc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.846 UTC [gossip.gossip] handleMessage -> DEBU 3cfd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.846 UTC [policies] Evaluate -> DEBU 3cfe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:20.846 UTC [policies] Evaluate -> DEBU 3cff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.846 UTC [cauthdsl] func1 -> DEBU 3d00 0xc00266e870 gate 1569284780846380600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.846 UTC [cauthdsl] func2 -> DEBU 3d01 0xc00266e870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.846 UTC [cauthdsl] func2 -> DEBU 3d02 0xc00266e870 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.850 UTC [cauthdsl] func2 -> DEBU 3d03 0xc00266e870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:20.851 UTC [cauthdsl] func2 -> DEBU 3d04 0xc00266e870 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.851 UTC [cauthdsl] func1 -> DEBU 3d05 0xc00266e870 gate 1569284780846380600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:20.851 UTC [policies] Evaluate -> DEBU 3d06 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.852 UTC [policies] Evaluate -> DEBU 3d07 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.852 UTC [policies] Evaluate -> DEBU 3d08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:20.852 UTC [cauthdsl] func1 -> DEBU 3d09 0xc00266f0b0 gate 1569284780852910100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:20.852 UTC [cauthdsl] func2 -> DEBU 3d0a 0xc00266f0b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:20.853 UTC [cauthdsl] func2 -> DEBU 3d0b 0xc00266f0b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:20.853 UTC [cauthdsl] func2 -> DEBU 3d0c 0xc00266f0b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.853 UTC [msp.identity] Verify -> DEBU 3d0d Verify: digest = 00000000 1d c5 ab fc 18 82 3f 1e 81 fb d3 10 ca 7d ea 25 |......?......}.%| +peer0.org1.example.com | 00000010 f8 5d 47 ab 2a 2c 72 73 af 50 c0 9a de b4 db 9a |.]G.*,rs.P......|" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [msp.identity] Verify -> DEBU 3d0e Verify: sig = 00000000 30 45 02 21 00 d6 ea d6 be 4c ec 40 ac 48 04 2f |0E.!.....L.@.H./| +peer0.org1.example.com | 00000010 ce eb eb 54 0d 69 6f 39 f1 67 f2 71 a8 9b 20 b3 |...T.io9.g.q.. .| +peer0.org1.example.com | 00000020 a1 0d b6 db 18 02 20 03 fe 0d 6f 09 f3 2e c0 7e |...... ...o....~| +peer0.org1.example.com | 00000030 1a 83 fb 11 99 43 e1 ef a8 cc 30 bc b0 1f 01 d4 |.....C....0.....| +peer0.org1.example.com | 00000040 70 19 0f 26 7d 22 82 |p..&}".|" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [cauthdsl] func2 -> DEBU 3d0f 0xc00266f0b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [cauthdsl] func1 -> DEBU 3d10 0xc00266f0b0 gate 1569284780852910100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [policies] Evaluate -> DEBU 3d11 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [policies] Evaluate -> DEBU 3d12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [policies] Evaluate -> DEBU 3d13 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [policies] Evaluate -> DEBU 3d14 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d15 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d16 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d17 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d18 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d19 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d1a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d1b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d1c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.854 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d1d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d1e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [gossip.gossip] handleMessage -> DEBU 3d1f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [gossip.gossip] handleMessage -> DEBU 3d20 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [gossip.pull] HandleMessage -> DEBU 3d21 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [gossip.pull] SendDigest -> DEBU 3d22 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [gossip.gossip] handleMessage -> DEBU 3d23 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [gossip.gossip] handleMessage -> DEBU 3d24 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [gossip.gossip] handleMessage -> DEBU 3d25 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d26 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d27 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [gossip.discovery] sendMemResponse -> DEBU 3d28 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [msp] DeserializeIdentity -> DEBU 3d29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.855 UTC [msp] DeserializeIdentity -> DEBU 3d2a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.856 UTC [msp] DeserializeIdentity -> DEBU 3d2b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:20.856 UTC [gossip.comm] Send -> DEBU 3d2c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:20.856 UTC [gossip.discovery] sendMemResponse -> DEBU 3d2d Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:20.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3d2e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:20.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3d2f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:21.125 UTC [gossip.gossip] handleMessage -> DEBU 3d30 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:21.125 UTC [msp] DeserializeIdentity -> DEBU 3d31 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:21.125 UTC [msp] DeserializeIdentity -> DEBU 3d32 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:21.126 UTC [msp] DeserializeIdentity -> DEBU 3d33 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:21.126 UTC [gossip.gossip] handleMessage -> DEBU 3d34 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:21.668 UTC [gossip.comm] func1 -> DEBU 3d35 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:21.669 UTC [gossip.gossip] handleMessage -> DEBU 3d36 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:21.669 UTC [gossip.pull] HandleMessage -> DEBU 3d37 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:21.669 UTC [gossip.pull] SendDigest -> DEBU 3d38 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:21.669 UTC [gossip.gossip] handleMessage -> DEBU 3d39 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:21.759 UTC [gossip.comm] func1 -> DEBU 3d3a Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020;" signature:"0D\002 [\255\022\177wbJ\357\217\345\205H3BE\n)'Y\3202\2038\215\005\000\346]\223\205\241N\002 \035\354Zm_\321$_m\375z\205K\266l8\2071H?m[\237\266\304\273\034\262\304\244m\022" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [gossip.gossip] handleMessage -> DEBU 3d3b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020;" signature:"0D\002 [\255\022\177wbJ\357\217\345\205H3BE\n)'Y\3202\2038\215\005\000\346]\223\205\241N\002 \035\354Zm_\321$_m\375z\205K\266l8\2071H?m[\237\266\304\273\034\262\304\244m\022" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [gossip.gossip] handleMessage -> DEBU 3d3c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d3d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020;" signature:"0D\002 [\255\022\177wbJ\357\217\345\205H3BE\n)'Y\3202\2038\215\005\000\346]\223\205\241N\002 \035\354Zm_\321$_m\375z\205K\266l8\2071H?m[\237\266\304\273\034\262\304\244m\022" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d3e Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [msp.identity] Verify -> DEBU 3d3f Verify: digest = 00000000 c8 17 4e ac 81 14 d1 e3 32 4d 82 37 0f b9 c6 df |..N.....2M.7....| +peer0.org1.example.com | 00000010 4a 06 fb 21 bf 51 b7 98 e4 2a c6 df 4e 1f 38 e2 |J..!.Q...*..N.8.|" +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [msp.identity] Verify -> DEBU 3d40 Verify: sig = 00000000 30 44 02 20 5b ad 12 7f 77 62 4a ef 8f e5 85 48 |0D. [...wbJ....H| +peer0.org1.example.com | 00000010 33 42 45 0a 29 27 59 d0 32 83 38 8d 05 00 e6 5d |3BE.)'Y.2.8....]| +peer0.org1.example.com | 00000020 93 85 a1 4e 02 20 1d ec 5a 6d 5f d1 24 5f 6d fd |...N. ..Zm_.$_m.| +peer0.org1.example.com | 00000030 7a 85 4b b6 6c 38 87 31 48 3f 6d 5b 9f b6 c4 bb |z.K.l8.1H?m[....| +peer0.org1.example.com | 00000040 1c b2 c4 a4 6d 12 |....m.|" +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [msp.identity] Verify -> DEBU 3d41 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [msp.identity] Verify -> DEBU 3d42 Verify: sig = 00000000 30 45 02 21 00 d7 30 46 82 9f f3 da 93 e1 39 d5 |0E.!..0F......9.| +peer0.org1.example.com | 00000010 99 22 36 69 7b cc 26 4b dc 0a 63 63 43 bd e2 38 |."6i{.&K..ccC..8| +peer0.org1.example.com | 00000020 b4 c6 34 f3 cd 02 20 24 57 7d f5 58 ee 9b a5 2f |..4... $W}.X.../| +peer0.org1.example.com | 00000030 b4 24 f0 ed a7 e6 f6 9a fe e7 58 ae 02 f6 f4 80 |.$........X.....| +peer0.org1.example.com | 00000040 39 5f 7e 47 6c a1 c4 |9_~Gl..|" +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d43 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d44 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d45 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d46 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:21.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d47 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:21.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d48 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:21.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d49 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:21.766 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d4a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:21.766 UTC [gossip.discovery] sendMemResponse -> DEBU 3d4b Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:21.766 UTC [msp] DeserializeIdentity -> DEBU 3d4c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:21.766 UTC [msp] DeserializeIdentity -> DEBU 3d4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:21.766 UTC [gossip.comm] Send -> DEBU 3d4e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:21.766 UTC [gossip.discovery] sendMemResponse -> DEBU 3d4f Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020;" signature:"0D\002 [\255\022\177wbJ\357\217\345\205H3BE\n)'Y\3202\2038\215\005\000\346]\223\205\241N\002 \035\354Zm_\321$_m\375z\205K\266l8\2071H?m[\237\266\304\273\034\262\304\244m\022" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:26:21.766 UTC [gossip.comm] sendToEndpoint -> DEBU 3d50 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:21.766 UTC [gossip.comm] sendToEndpoint -> DEBU 3d51 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:22.054 UTC [gossip.comm] func1 -> DEBU 3d52 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:22.054 UTC [gossip.gossip] handleMessage -> DEBU 3d53 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:22.054 UTC [msp] DeserializeIdentity -> DEBU 3d54 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.054 UTC [msp] DeserializeIdentity -> DEBU 3d55 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.054 UTC [msp] DeserializeIdentity -> DEBU 3d56 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.054 UTC [gossip.gossip] handleMessage -> DEBU 3d57 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:22.317 UTC [gossip.election] waitForInterrupt -> DEBU 3d58 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:22.318 UTC [gossip.election] IsLeader -> DEBU 3d59 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:22.318 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d5a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:22.318 UTC [msp.identity] Sign -> DEBU 3d5b Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510121801 " +peer0.org1.example.com | "2019-09-24 00:26:22.318 UTC [msp.identity] Sign -> DEBU 3d5c Sign: digest: BECA44B6E5DE6E46089D3D09F8FE0C78EDBD35DCF6001BB4E46F88670CC94AE2 " +peer0.org1.example.com | "2019-09-24 00:26:22.319 UTC [gossip.election] waitForInterrupt -> DEBU 3d5d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d5e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d5f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d60 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d61 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.325 UTC [gossip.comm] Send -> DEBU 3d62 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d63 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d64 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.325 UTC [gossip.comm] sendToEndpoint -> DEBU 3d65 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:22.325 UTC [gossip.comm] sendToEndpoint -> DEBU 3d66 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:22.728 UTC [gossip.comm] func1 -> DEBU 3d67 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:22.729 UTC [gossip.gossip] handleMessage -> DEBU 3d68 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:22.729 UTC [gossip.gossip] handleMessage -> DEBU 3d69 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:22.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d6a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:22.729 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d6b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:22.729 UTC [msp.identity] Verify -> DEBU 3d6c Verify: digest = 00000000 bb d7 1d fb 82 35 47 09 ce 42 9d 45 80 48 86 6a |.....5G..B.E.H.j| +peer0.org1.example.com | 00000010 05 a6 34 25 ce d9 38 aa e1 e6 69 35 74 7c 31 dc |..4%..8...i5t|1.|" +peer0.org1.example.com | "2019-09-24 00:26:22.729 UTC [msp.identity] Verify -> DEBU 3d6d Verify: sig = 00000000 30 44 02 20 74 b7 6c 76 35 24 ed db 07 e9 f0 dc |0D. t.lv5$......| +peer0.org1.example.com | 00000010 45 1c 7a fb 2f 9e d4 27 6a f6 5f e2 37 d3 e7 c5 |E.z./..'j._.7...| +peer0.org1.example.com | 00000020 cc d1 7b 2d 02 20 11 e6 71 0b af d9 94 ae 9b 55 |..{-. ..q......U| +peer0.org1.example.com | 00000030 53 c8 18 25 6c 01 ee fa 98 78 1b f6 d2 ec 02 4a |S..%l....x.....J| +peer0.org1.example.com | 00000040 82 81 58 b1 75 34 |..X.u4|" +peer0.org1.example.com | "2019-09-24 00:26:22.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d6e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:22.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d6f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:22.730 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d70 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:22.730 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d71 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:22.730 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d72 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:22.730 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d73 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:22.730 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d74 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:22.730 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d75 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:22.732 UTC [msp] DeserializeIdentity -> DEBU 3d76 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.732 UTC [msp] DeserializeIdentity -> DEBU 3d77 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.732 UTC [msp] DeserializeIdentity -> DEBU 3d78 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.732 UTC [gossip.comm] Send -> DEBU 3d79 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:22.732 UTC [msp] DeserializeIdentity -> DEBU 3d7a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:22.732 UTC [gossip.comm] Send -> DEBU 3d7b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:22.732 UTC [gossip.comm] sendToEndpoint -> DEBU 3d7c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:22.732 UTC [gossip.comm] sendToEndpoint -> DEBU 3d7d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:22.732 UTC [gossip.comm] sendToEndpoint -> DEBU 3d7e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:22.732 UTC [gossip.comm] sendToEndpoint -> DEBU 3d7f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:22.748 UTC [gossip.gossip] handleMessage -> DEBU 3d80 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:22.748 UTC [gossip.gossip] handleMessage -> DEBU 3d81 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:22.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d82 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:22.749 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d83 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.713 UTC [gossip.pull] Hello -> DEBU 3d84 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:23.714 UTC [gossip.comm] Send -> DEBU 3d85 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:23.714 UTC [gossip.pull] Hello -> DEBU 3d86 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:23.714 UTC [gossip.comm] Send -> DEBU 3d87 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:23.714 UTC [gossip.pull] Hello -> DEBU 3d88 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:23.714 UTC [gossip.comm] Send -> DEBU 3d89 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.720 UTC [gossip.comm] func1 -> DEBU 3d90 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.720 UTC [gossip.gossip] handleMessage -> DEBU 3d91 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.720 UTC [gossip.comm] func1 -> DEBU 3d92 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.720 UTC [gossip.pull] HandleMessage -> DEBU 3d93 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.720 UTC [gossip.gossip] handleMessage -> DEBU 3d94 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.721 UTC [gossip.gossip] handleMessage -> DEBU 3d95 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.721 UTC [gossip.pull] HandleMessage -> DEBU 3d96 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.721 UTC [gossip.gossip] handleMessage -> DEBU 3d97 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.721 UTC [gossip.gossip] handleMessage -> DEBU 3d98 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.721 UTC [gossip.pull] HandleMessage -> DEBU 3d99 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.721 UTC [gossip.gossip] handleMessage -> DEBU 3d9a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.856 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d9b Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:23.856 UTC [msp.identity] Sign -> DEBU 3d9c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151038 " +peer0.org1.example.com | "2019-09-24 00:26:23.856 UTC [msp.identity] Sign -> DEBU 3d9d Sign: digest: B3246468FB0C4E61782ABD7762767D6AC1F81F62AC0FD04E88A1CECAFF0A393F " +peer0.org1.example.com | "2019-09-24 00:26:23.857 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d9e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:23.857 UTC [msp.identity] Sign -> DEBU 3d9f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:23.857 UTC [msp.identity] Sign -> DEBU 3da0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:23.858 UTC [msp] DeserializeIdentity -> DEBU 3da1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:23.858 UTC [gossip.comm] Send -> DEBU 3da2 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:23.859 UTC [msp] DeserializeIdentity -> DEBU 3da3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:23.859 UTC [gossip.comm] Send -> DEBU 3da4 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:23.859 UTC [gossip.comm] Send -> DEBU 3da5 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:23.859 UTC [gossip.comm] sendToEndpoint -> DEBU 3da6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.859 UTC [gossip.comm] sendToEndpoint -> DEBU 3da7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.859 UTC [gossip.comm] sendToEndpoint -> DEBU 3da8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.860 UTC [gossip.comm] sendToEndpoint -> DEBU 3da9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.860 UTC [gossip.comm] sendToEndpoint -> DEBU 3daa Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.860 UTC [gossip.comm] sendToEndpoint -> DEBU 3dab Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.863 UTC [gossip.comm] func1 -> DEBU 3dac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.863 UTC [gossip.gossip] handleMessage -> DEBU 3dad Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.863 UTC [gossip.gossip] handleMessage -> DEBU 3dae Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.863 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3daf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.864 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3db0 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:23.864 UTC [msp.identity] Verify -> DEBU 3db1 Verify: digest = 00000000 b3 24 64 68 fb 0c 4e 61 78 2a bd 77 62 76 7d 6a |.$dh..Nax*.wbv}j| +peer0.org1.example.com | 00000010 c1 f8 1f 62 ac 0f d0 4e 88 a1 ce ca ff 0a 39 3f |...b...N......9?|" +peer0.org1.example.com | "2019-09-24 00:26:23.864 UTC [msp.identity] Verify -> DEBU 3db2 Verify: sig = 00000000 30 44 02 20 16 94 b1 a2 e6 a8 a4 e8 d2 e3 9a e4 |0D. ............| +peer0.org1.example.com | 00000010 46 67 55 5b 3a 7a f6 b8 77 20 a1 15 2e 8a 63 46 |FgU[:z..w ....cF| +peer0.org1.example.com | 00000020 65 b4 f7 e2 02 20 6d ae af 21 cb b2 ac 16 da 04 |e.... m..!......| +peer0.org1.example.com | 00000030 8b f5 bc 12 f1 55 93 d6 ff 63 99 7b 29 24 f1 6e |.....U...c.{)$.n| +peer0.org1.example.com | 00000040 ef 07 97 26 f1 f0 |...&..|" +peer0.org1.example.com | "2019-09-24 00:26:23.864 UTC [msp.identity] Verify -> DEBU 3db3 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:23.864 UTC [msp.identity] Verify -> DEBU 3db4 Verify: sig = 00000000 30 45 02 21 00 d7 43 ae 14 ef 8a 5a da b8 37 30 |0E.!..C....Z..70| +peer0.org1.example.com | 00000010 7f 8b ff 49 eb ba 80 7a c9 03 99 ff 63 16 50 de |...I...z....c.P.| +peer0.org1.example.com | 00000020 49 73 52 5c 80 02 20 4f ff df 9e ca c7 30 f6 b4 |IsR\.. O.....0..| +peer0.org1.example.com | 00000030 9f 36 de a3 9c 22 cc d7 ee c9 bf ce 6c fa f2 43 |.6..."......l..C| +peer0.org1.example.com | 00000040 0a 26 35 67 53 63 24 |.&5gSc$|" +peer0.org1.example.com | "2019-09-24 00:26:23.864 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.864 UTC [gossip.discovery] isSentByMe -> DEBU 3db6 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.864 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.865 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3db8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.872 UTC [gossip.gossip] handleMessage -> DEBU 3db9 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.872 UTC [gossip.gossip] handleMessage -> DEBU 3dba Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.873 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dbb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.873 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dbc Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:23.873 UTC [msp.identity] Verify -> DEBU 3dbd Verify: digest = 00000000 b3 24 64 68 fb 0c 4e 61 78 2a bd 77 62 76 7d 6a |.$dh..Nax*.wbv}j| +peer0.org1.example.com | 00000010 c1 f8 1f 62 ac 0f d0 4e 88 a1 ce ca ff 0a 39 3f |...b...N......9?|" +peer0.org1.example.com | "2019-09-24 00:26:23.873 UTC [msp.identity] Verify -> DEBU 3dbe Verify: sig = 00000000 30 44 02 20 16 94 b1 a2 e6 a8 a4 e8 d2 e3 9a e4 |0D. ............| +peer0.org1.example.com | 00000010 46 67 55 5b 3a 7a f6 b8 77 20 a1 15 2e 8a 63 46 |FgU[:z..w ....cF| +peer0.org1.example.com | 00000020 65 b4 f7 e2 02 20 6d ae af 21 cb b2 ac 16 da 04 |e.... m..!......| +peer0.org1.example.com | 00000030 8b f5 bc 12 f1 55 93 d6 ff 63 99 7b 29 24 f1 6e |.....U...c.{)$.n| +peer0.org1.example.com | 00000040 ef 07 97 26 f1 f0 |...&..|" +peer0.org1.example.com | "2019-09-24 00:26:23.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dbf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.874 UTC [gossip.discovery] isSentByMe -> DEBU 3dc0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dc2 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:23.874 UTC [msp] DeserializeIdentity -> DEBU 3dc3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:23.874 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3dc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:23.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dc5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:23.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dc6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:23.874 UTC [policies] Evaluate -> DEBU 3dc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:23.874 UTC [policies] Evaluate -> DEBU 3dc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:23.874 UTC [policies] Evaluate -> DEBU 3dc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:23.875 UTC [cauthdsl] func1 -> DEBU 3dca 0xc0037828c0 gate 1569284783874997200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:23.875 UTC [cauthdsl] func2 -> DEBU 3dcb 0xc0037828c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:23.875 UTC [cauthdsl] func2 -> DEBU 3dcc 0xc0037828c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:23.875 UTC [cauthdsl] func2 -> DEBU 3dcd 0xc0037828c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:23.875 UTC [cauthdsl] func2 -> DEBU 3dce 0xc0037828c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:23.875 UTC [cauthdsl] func1 -> DEBU 3dcf 0xc0037828c0 gate 1569284783874997200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:23.875 UTC [policies] Evaluate -> DEBU 3dd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.876 UTC [policies] Evaluate -> DEBU 3dd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.876 UTC [policies] Evaluate -> DEBU 3dd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:23.876 UTC [cauthdsl] func1 -> DEBU 3dd3 0xc003783100 gate 1569284783876305800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:23.876 UTC [cauthdsl] func2 -> DEBU 3dd4 0xc003783100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:23.876 UTC [cauthdsl] func2 -> DEBU 3dd5 0xc003783100 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:23.876 UTC [cauthdsl] func2 -> DEBU 3dd6 0xc003783100 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:23.876 UTC [msp.identity] Verify -> DEBU 3dd7 Verify: digest = 00000000 1d c5 ab fc 18 82 3f 1e 81 fb d3 10 ca 7d ea 25 |......?......}.%| +peer0.org1.example.com | 00000010 f8 5d 47 ab 2a 2c 72 73 af 50 c0 9a de b4 db 9a |.]G.*,rs.P......|" +peer0.org1.example.com | "2019-09-24 00:26:23.876 UTC [msp.identity] Verify -> DEBU 3dd8 Verify: sig = 00000000 30 45 02 21 00 d6 ea d6 be 4c ec 40 ac 48 04 2f |0E.!.....L.@.H./| +peer0.org1.example.com | 00000010 ce eb eb 54 0d 69 6f 39 f1 67 f2 71 a8 9b 20 b3 |...T.io9.g.q.. .| +peer0.org1.example.com | 00000020 a1 0d b6 db 18 02 20 03 fe 0d 6f 09 f3 2e c0 7e |...... ...o....~| +peer0.org1.example.com | 00000030 1a 83 fb 11 99 43 e1 ef a8 cc 30 bc b0 1f 01 d4 |.....C....0.....| +peer0.org1.example.com | 00000040 70 19 0f 26 7d 22 82 |p..&}".|" +peer0.org1.example.com | "2019-09-24 00:26:23.876 UTC [cauthdsl] func2 -> DEBU 3dd9 0xc003783100 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:23.876 UTC [cauthdsl] func1 -> DEBU 3dda 0xc003783100 gate 1569284783876305800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:23.876 UTC [policies] Evaluate -> DEBU 3ddb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.877 UTC [policies] Evaluate -> DEBU 3ddc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.877 UTC [policies] Evaluate -> DEBU 3ddd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.877 UTC [policies] Evaluate -> DEBU 3dde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ddf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.879 UTC [gossip.comm] func1 -> DEBU 3de0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.880 UTC [gossip.gossip] handleMessage -> DEBU 3de1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 3de2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3de3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.884 UTC [gossip.gossip] handleMessage -> DEBU 3de4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3de5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.889 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3de6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:23.896 UTC [msp.identity] Verify -> DEBU 3de7 Verify: digest = 00000000 b3 24 64 68 fb 0c 4e 61 78 2a bd 77 62 76 7d 6a |.$dh..Nax*.wbv}j| +peer0.org1.example.com | 00000010 c1 f8 1f 62 ac 0f d0 4e 88 a1 ce ca ff 0a 39 3f |...b...N......9?|" +peer0.org1.example.com | "2019-09-24 00:26:23.896 UTC [msp.identity] Verify -> DEBU 3de8 Verify: sig = 00000000 30 44 02 20 16 94 b1 a2 e6 a8 a4 e8 d2 e3 9a e4 |0D. ............| +peer0.org1.example.com | 00000010 46 67 55 5b 3a 7a f6 b8 77 20 a1 15 2e 8a 63 46 |FgU[:z..w ....cF| +peer0.org1.example.com | 00000020 65 b4 f7 e2 02 20 6d ae af 21 cb b2 ac 16 da 04 |e.... m..!......| +peer0.org1.example.com | 00000030 8b f5 bc 12 f1 55 93 d6 ff 63 99 7b 29 24 f1 6e |.....U...c.{)$.n| +peer0.org1.example.com | 00000040 ef 07 97 26 f1 f0 |...&..|" +peer0.org1.example.com | "2019-09-24 00:26:23.896 UTC [gossip.discovery] handleAliveMessage -> DEBU 3de9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.896 UTC [gossip.discovery] isSentByMe -> DEBU 3dea Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.896 UTC [gossip.discovery] handleAliveMessage -> DEBU 3deb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.896 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dec Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [msp] DeserializeIdentity -> DEBU 3ded Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3dee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3def Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3df0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [policies] Evaluate -> DEBU 3df1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [policies] Evaluate -> DEBU 3df2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [policies] Evaluate -> DEBU 3df3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [cauthdsl] func1 -> DEBU 3df4 0xc00359df30 gate 1569284783897744400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [cauthdsl] func2 -> DEBU 3df5 0xc00359df30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [cauthdsl] func2 -> DEBU 3df6 0xc00359df30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [cauthdsl] func2 -> DEBU 3df7 0xc00359df30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [cauthdsl] func2 -> DEBU 3df8 0xc00359df30 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:23.897 UTC [cauthdsl] func1 -> DEBU 3df9 0xc00359df30 gate 1569284783897744400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:23.898 UTC [policies] Evaluate -> DEBU 3dfa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.898 UTC [policies] Evaluate -> DEBU 3dfb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.898 UTC [policies] Evaluate -> DEBU 3dfc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:23.903 UTC [cauthdsl] func1 -> DEBU 3dfd 0xc003b5a770 gate 1569284783903956200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:23.904 UTC [cauthdsl] func2 -> DEBU 3dfe 0xc003b5a770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:23.904 UTC [cauthdsl] func2 -> DEBU 3dff 0xc003b5a770 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:23.904 UTC [cauthdsl] func2 -> DEBU 3e00 0xc003b5a770 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:23.904 UTC [msp.identity] Verify -> DEBU 3e01 Verify: digest = 00000000 03 58 fc c9 3b 38 4f 8a 43 a9 97 43 8f 3d 13 89 |.X..;8O.C..C.=..| +peer0.org1.example.com | 00000010 22 9d 98 61 1a 30 20 06 49 77 8d bd cf bb a4 69 |"..a.0 .Iw.....i|" +peer0.org1.example.com | "2019-09-24 00:26:23.905 UTC [msp.identity] Verify -> DEBU 3e02 Verify: sig = 00000000 30 44 02 20 7b 77 7b 23 6b 9a 0d 47 96 19 ae ed |0D. {w{#k..G....| +peer0.org1.example.com | 00000010 35 44 e2 5b bc 08 30 73 23 46 f3 fb 26 30 40 1d |5D.[..0s#F..&0@.| +peer0.org1.example.com | 00000020 e7 8f a3 37 02 20 58 74 d1 3b 7c 60 13 68 47 12 |...7. Xt.;|`.hG.| +peer0.org1.example.com | 00000030 0c 83 88 cd be 0b b2 7a 07 75 c9 52 94 c3 ce 5d |.......z.u.R...]| +peer0.org1.example.com | 00000040 4c 6a 93 f6 5a bb |Lj..Z.|" +peer0.org1.example.com | "2019-09-24 00:26:23.905 UTC [cauthdsl] func2 -> DEBU 3e03 0xc003b5a770 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:23.905 UTC [cauthdsl] func1 -> DEBU 3e04 0xc003b5a770 gate 1569284783903956200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:23.905 UTC [policies] Evaluate -> DEBU 3e05 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.905 UTC [policies] Evaluate -> DEBU 3e06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.905 UTC [policies] Evaluate -> DEBU 3e07 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.905 UTC [policies] Evaluate -> DEBU 3e08 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:23.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e09 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.906 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e0a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.906 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e0b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:23.941 UTC [gossip.gossip] handleMessage -> DEBU 3e0c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.941 UTC [gossip.pull] HandleMessage -> DEBU 3e0d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e0e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e0f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e10 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e11 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e12 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:23.941 UTC [gossip.pull] SendDigest -> DEBU 3e14 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:23.941 UTC [gossip.gossip] handleMessage -> DEBU 3e15 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.029 UTC [gossip.gossip] handleMessage -> DEBU 3e16 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.029 UTC [gossip.gossip] handleMessage -> DEBU 3e17 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e18 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.030 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e19 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:24.030 UTC [msp] DeserializeIdentity -> DEBU 3e1a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.030 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:24.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e1c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e1d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.030 UTC [policies] Evaluate -> DEBU 3e1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.030 UTC [policies] Evaluate -> DEBU 3e1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:24.030 UTC [policies] Evaluate -> DEBU 3e20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.030 UTC [cauthdsl] func1 -> DEBU 3e21 0xc003fb1000 gate 1569284784030841100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.030 UTC [cauthdsl] func2 -> DEBU 3e22 0xc003fb1000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e23 0xc003fb1000 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e24 0xc003fb1000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e25 0xc003fb1000 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [cauthdsl] func1 -> DEBU 3e26 0xc003fb1000 gate 1569284784030841100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [policies] Evaluate -> DEBU 3e27 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [policies] Evaluate -> DEBU 3e28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [policies] Evaluate -> DEBU 3e29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [cauthdsl] func1 -> DEBU 3e2a 0xc003fb1840 gate 1569284784031374900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e2b 0xc003fb1840 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e2c 0xc003fb1840 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e2d 0xc003fb1840 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [msp.identity] Verify -> DEBU 3e2e Verify: digest = 00000000 80 f8 ba 4c cd 3c 94 e4 f4 6a 22 12 03 87 36 6b |...L.<...j"...6k| +peer0.org1.example.com | 00000010 85 02 43 6d dd 04 7c 73 7b 1a 9e 10 9f 2e 7f 4a |..Cm..|s{......J|" +peer0.org1.example.com | "2019-09-24 00:26:24.031 UTC [msp.identity] Verify -> DEBU 3e2f Verify: sig = 00000000 30 44 02 20 0b ba 75 bc 2b b3 9a df 3a 99 5b e3 |0D. ..u.+...:.[.| +peer0.org1.example.com | 00000010 8b 22 51 be 5f 43 3a c4 ba 2f b0 db 85 99 8e c0 |."Q._C:../......| +peer0.org1.example.com | 00000020 72 9d 7f 1b 02 20 5e f0 65 aa 9c 22 b3 43 1c ec |r.... ^.e..".C..| +peer0.org1.example.com | 00000030 b9 98 33 89 a6 5a 1e ba 30 10 58 99 02 69 1f 16 |..3..Z..0.X..i..| +peer0.org1.example.com | 00000040 24 91 8f cd 61 4f |$...aO|" +peer0.org1.example.com | "2019-09-24 00:26:24.039 UTC [cauthdsl] func2 -> DEBU 3e30 0xc003fb1840 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.039 UTC [cauthdsl] func1 -> DEBU 3e31 0xc003fb1840 gate 1569284784031374900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:24.039 UTC [policies] Evaluate -> DEBU 3e32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.039 UTC [policies] Evaluate -> DEBU 3e33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.039 UTC [policies] Evaluate -> DEBU 3e34 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.039 UTC [policies] Evaluate -> DEBU 3e35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.040 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e36 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e37 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:24.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e38 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:24.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e39 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:24.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e3a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:24.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e3b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.040 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.040 UTC [gossip.discovery] sendMemResponse -> DEBU 3e3d Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:24.040 UTC [msp] DeserializeIdentity -> DEBU 3e3e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.041 UTC [msp] DeserializeIdentity -> DEBU 3e3f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.041 UTC [msp] DeserializeIdentity -> DEBU 3e40 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.041 UTC [gossip.comm] Send -> DEBU 3e41 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:24.041 UTC [gossip.discovery] sendMemResponse -> DEBU 3e42 Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020<" signature:"0D\002 t\267lv5$\355\333\007\351\360\334E\034z\373/\236\324'j\366_\3427\323\347\305\314\321{-\002 \021\346q\013\257\331\224\256\233US\310\030%l\001\356\372\230x\033\366\322\354\002J\202\201X\261u4" > alive: " +peer0.org1.example.com | "2019-09-24 00:26:24.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3e43 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3e44 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e45 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.116 UTC [msp] DeserializeIdentity -> DEBU 3e46 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.116 UTC [msp] DeserializeIdentity -> DEBU 3e47 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.116 UTC [gossip.comm] Send -> DEBU 3e48 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e49 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.120 UTC [gossip.comm] func1 -> DEBU 3e4f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.120 UTC [gossip.gossip] handleMessage -> DEBU 3e50 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.120 UTC [msp.identity] Verify -> DEBU 3e51 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:24.120 UTC [msp.identity] Verify -> DEBU 3e52 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:24.120 UTC [msp.identity] Verify -> DEBU 3e53 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:24.121 UTC [msp.identity] Verify -> DEBU 3e54 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:24.121 UTC [msp] DeserializeIdentity -> DEBU 3e55 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.121 UTC [msp] DeserializeIdentity -> DEBU 3e56 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.121 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e57 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:24.130 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e58 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.130 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e59 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.130 UTC [policies] Evaluate -> DEBU 3e5a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.130 UTC [policies] Evaluate -> DEBU 3e5b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:24.130 UTC [policies] Evaluate -> DEBU 3e5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.130 UTC [cauthdsl] func1 -> DEBU 3e5d 0xc0027b4e90 gate 1569284784130791200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.130 UTC [cauthdsl] func2 -> DEBU 3e5e 0xc0027b4e90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.130 UTC [cauthdsl] func2 -> DEBU 3e5f 0xc0027b4e90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.130 UTC [cauthdsl] func2 -> DEBU 3e60 0xc0027b4e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [cauthdsl] func2 -> DEBU 3e61 0xc0027b4e90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [cauthdsl] func1 -> DEBU 3e62 0xc0027b4e90 gate 1569284784130791200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e63 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e64 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e65 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [cauthdsl] func1 -> DEBU 3e66 0xc0027b56d0 gate 1569284784131262600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [cauthdsl] func2 -> DEBU 3e67 0xc0027b56d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [cauthdsl] func2 -> DEBU 3e68 0xc0027b56d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [cauthdsl] func2 -> DEBU 3e69 0xc0027b56d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [msp.identity] Verify -> DEBU 3e6a Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [msp.identity] Verify -> DEBU 3e6b Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [cauthdsl] func2 -> DEBU 3e6c 0xc0027b56d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [cauthdsl] func1 -> DEBU 3e6d 0xc0027b56d0 gate 1569284784131262600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e6e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e70 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e71 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.144 UTC [gossip.comm] func1 -> DEBU 3e72 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.132 UTC [msp] DeserializeIdentity -> DEBU 3e73 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.152 UTC [msp] DeserializeIdentity -> DEBU 3e74 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.153 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:24.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e76 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e77 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.154 UTC [policies] Evaluate -> DEBU 3e78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.154 UTC [policies] Evaluate -> DEBU 3e79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:24.154 UTC [policies] Evaluate -> DEBU 3e7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.154 UTC [cauthdsl] func1 -> DEBU 3e7b 0xc0027ecea0 gate 1569284784154468300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.154 UTC [cauthdsl] func2 -> DEBU 3e7c 0xc0027ecea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.154 UTC [cauthdsl] func2 -> DEBU 3e7d 0xc0027ecea0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.158 UTC [cauthdsl] func2 -> DEBU 3e7e 0xc0027ecea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:24.158 UTC [cauthdsl] func2 -> DEBU 3e7f 0xc0027ecea0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.160 UTC [cauthdsl] func1 -> DEBU 3e80 0xc0027ecea0 gate 1569284784154468300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.161 UTC [policies] Evaluate -> DEBU 3e81 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.162 UTC [policies] Evaluate -> DEBU 3e82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.162 UTC [policies] Evaluate -> DEBU 3e83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.163 UTC [cauthdsl] func1 -> DEBU 3e84 0xc0027ed6e0 gate 1569284784163189800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.164 UTC [cauthdsl] func2 -> DEBU 3e85 0xc0027ed6e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.165 UTC [cauthdsl] func2 -> DEBU 3e86 0xc0027ed6e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.166 UTC [cauthdsl] func2 -> DEBU 3e87 0xc0027ed6e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.166 UTC [msp.identity] Verify -> DEBU 3e88 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:24.168 UTC [msp.identity] Verify -> DEBU 3e89 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:24.169 UTC [cauthdsl] func2 -> DEBU 3e8a 0xc0027ed6e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.169 UTC [cauthdsl] func1 -> DEBU 3e8b 0xc0027ed6e0 gate 1569284784163189800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:24.169 UTC [policies] Evaluate -> DEBU 3e8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.169 UTC [policies] Evaluate -> DEBU 3e8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.170 UTC [policies] Evaluate -> DEBU 3e8e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.170 UTC [policies] Evaluate -> DEBU 3e8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.170 UTC [gossip.gossip] handleMessage -> DEBU 3e90 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.170 UTC [gossip.gossip] handleMessage -> DEBU 3e91 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.170 UTC [msp] DeserializeIdentity -> DEBU 3e92 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.170 UTC [msp] DeserializeIdentity -> DEBU 3e93 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.180 UTC [msp] DeserializeIdentity -> DEBU 3e94 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e95 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e96 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e97 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3e98 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3e99 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3e9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [cauthdsl] func1 -> DEBU 3e9b 0xc0033b51f0 gate 1569284784187422500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3e9c 0xc0033b51f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3e9d 0xc0033b51f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3e9e 0xc0033b51f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3e9f 0xc0033b51f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [cauthdsl] func1 -> DEBU 3ea0 0xc0033b51f0 gate 1569284784187422500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3ea1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3ea2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3ea3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [cauthdsl] func1 -> DEBU 3ea4 0xc0033b5a30 gate 1569284784187871300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3ea5 0xc0033b5a30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3ea6 0xc0033b5a30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.188 UTC [cauthdsl] func2 -> DEBU 3ea7 0xc0033b5a30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.188 UTC [msp.identity] Verify -> DEBU 3ea8 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:24.188 UTC [msp.identity] Verify -> DEBU 3ea9 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:24.193 UTC [cauthdsl] func2 -> DEBU 3eaa 0xc0033b5a30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.194 UTC [cauthdsl] func1 -> DEBU 3eab 0xc0033b5a30 gate 1569284784187871300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:24.194 UTC [policies] Evaluate -> DEBU 3eac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.194 UTC [policies] Evaluate -> DEBU 3ead == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.194 UTC [policies] Evaluate -> DEBU 3eae Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.194 UTC [policies] Evaluate -> DEBU 3eaf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.195 UTC [msp.identity] Verify -> DEBU 3eb0 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:24.195 UTC [msp.identity] Verify -> DEBU 3eb1 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:24.196 UTC [msp.identity] Verify -> DEBU 3eb2 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:24.196 UTC [msp.identity] Verify -> DEBU 3eb3 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:24.196 UTC [msp] DeserializeIdentity -> DEBU 3eb4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.198 UTC [msp] DeserializeIdentity -> DEBU 3eb5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3eb6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:24.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3eb7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3eb8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.200 UTC [policies] Evaluate -> DEBU 3eb9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.207 UTC [policies] Evaluate -> DEBU 3eba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:24.207 UTC [policies] Evaluate -> DEBU 3ebb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.211 UTC [cauthdsl] func1 -> DEBU 3ebc 0xc003a4a040 gate 1569284784208046700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.212 UTC [cauthdsl] func2 -> DEBU 3ebd 0xc003a4a040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.212 UTC [cauthdsl] func2 -> DEBU 3ebe 0xc003a4a040 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.212 UTC [cauthdsl] func2 -> DEBU 3ebf 0xc003a4a040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:24.212 UTC [cauthdsl] func2 -> DEBU 3ec0 0xc003a4a040 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.212 UTC [cauthdsl] func1 -> DEBU 3ec1 0xc003a4a040 gate 1569284784208046700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.212 UTC [policies] Evaluate -> DEBU 3ec2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.212 UTC [policies] Evaluate -> DEBU 3ec3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.212 UTC [policies] Evaluate -> DEBU 3ec4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.213 UTC [cauthdsl] func1 -> DEBU 3ec5 0xc003a4a880 gate 1569284784213077600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.213 UTC [cauthdsl] func2 -> DEBU 3ec6 0xc003a4a880 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.213 UTC [cauthdsl] func2 -> DEBU 3ec7 0xc003a4a880 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.213 UTC [cauthdsl] func2 -> DEBU 3ec8 0xc003a4a880 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.213 UTC [msp.identity] Verify -> DEBU 3ec9 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:24.213 UTC [msp.identity] Verify -> DEBU 3eca Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:24.213 UTC [cauthdsl] func2 -> DEBU 3ecb 0xc003a4a880 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.213 UTC [cauthdsl] func1 -> DEBU 3ecc 0xc003a4a880 gate 1569284784213077600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:24.213 UTC [policies] Evaluate -> DEBU 3ecd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.213 UTC [policies] Evaluate -> DEBU 3ece == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.214 UTC [policies] Evaluate -> DEBU 3ecf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.214 UTC [policies] Evaluate -> DEBU 3ed0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.214 UTC [gossip.gossip] handleMessage -> DEBU 3ed1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.214 UTC [gossip.gossip] handleMessage -> DEBU 3ed2 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.214 UTC [msp] DeserializeIdentity -> DEBU 3ed3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.214 UTC [msp] DeserializeIdentity -> DEBU 3ed4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.215 UTC [msp] DeserializeIdentity -> DEBU 3ed5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.216 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ed6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:24.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.216 UTC [policies] Evaluate -> DEBU 3ed9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.216 UTC [policies] Evaluate -> DEBU 3eda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:24.216 UTC [policies] Evaluate -> DEBU 3edb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.216 UTC [cauthdsl] func1 -> DEBU 3edc 0xc0046e4390 gate 1569284784216433800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3edd 0xc0046e4390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3ede 0xc0046e4390 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3edf 0xc0046e4390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3ee0 0xc0046e4390 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [cauthdsl] func1 -> DEBU 3ee1 0xc0046e4390 gate 1569284784216433800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [policies] Evaluate -> DEBU 3ee2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [policies] Evaluate -> DEBU 3ee3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [policies] Evaluate -> DEBU 3ee4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [cauthdsl] func1 -> DEBU 3ee5 0xc0046e4bd0 gate 1569284784219578200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3ee6 0xc0046e4bd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3ee7 0xc0046e4bd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3ee8 0xc0046e4bd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.219 UTC [msp.identity] Verify -> DEBU 3ee9 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:24.220 UTC [msp.identity] Verify -> DEBU 3eea Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:24.220 UTC [cauthdsl] func2 -> DEBU 3eeb 0xc0046e4bd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.220 UTC [cauthdsl] func1 -> DEBU 3eec 0xc0046e4bd0 gate 1569284784219578200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:24.220 UTC [policies] Evaluate -> DEBU 3eed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.220 UTC [policies] Evaluate -> DEBU 3eee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.221 UTC [policies] Evaluate -> DEBU 3eef Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.221 UTC [policies] Evaluate -> DEBU 3ef0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.222 UTC [msp.identity] Verify -> DEBU 3ef1 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:24.223 UTC [msp.identity] Verify -> DEBU 3ef2 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:24.223 UTC [msp] DeserializeIdentity -> DEBU 3ef3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.223 UTC [msp] DeserializeIdentity -> DEBU 3ef4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.227 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ef5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:24.227 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.227 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.227 UTC [policies] Evaluate -> DEBU 3ef8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [policies] Evaluate -> DEBU 3ef9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [policies] Evaluate -> DEBU 3efa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [cauthdsl] func1 -> DEBU 3efb 0xc004d00ac0 gate 1569284784228123400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3efc 0xc004d00ac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3efd 0xc004d00ac0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3efe 0xc004d00ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3eff 0xc004d00ac0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [cauthdsl] func1 -> DEBU 3f00 0xc004d00ac0 gate 1569284784228123400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [policies] Evaluate -> DEBU 3f01 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [policies] Evaluate -> DEBU 3f02 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [policies] Evaluate -> DEBU 3f03 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [cauthdsl] func1 -> DEBU 3f04 0xc004d01300 gate 1569284784228587900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3f05 0xc004d01300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3f06 0xc004d01300 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3f07 0xc004d01300 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.229 UTC [msp.identity] Verify -> DEBU 3f08 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:24.229 UTC [msp.identity] Verify -> DEBU 3f09 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:24.229 UTC [cauthdsl] func2 -> DEBU 3f0a 0xc004d01300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.229 UTC [cauthdsl] func1 -> DEBU 3f0b 0xc004d01300 gate 1569284784228587900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:24.229 UTC [policies] Evaluate -> DEBU 3f0c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.229 UTC [policies] Evaluate -> DEBU 3f0d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.229 UTC [policies] Evaluate -> DEBU 3f0e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.229 UTC [policies] Evaluate -> DEBU 3f0f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.229 UTC [msp.identity] Verify -> DEBU 3f10 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:24.229 UTC [msp.identity] Verify -> DEBU 3f11 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:24.230 UTC [gossip.gossip] handleMessage -> DEBU 3f12 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.286 UTC [msp] DeserializeIdentity -> DEBU 3f13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.296 UTC [msp] DeserializeIdentity -> DEBU 3f14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.296 UTC [gossip.pull] Hello -> DEBU 3f15 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:24.296 UTC [msp] DeserializeIdentity -> DEBU 3f16 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.296 UTC [msp] DeserializeIdentity -> DEBU 3f17 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.296 UTC [gossip.comm] Send -> DEBU 3f18 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 3f19 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 3f1a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.299 UTC [gossip.comm] func1 -> DEBU 3f1b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.299 UTC [gossip.gossip] handleMessage -> DEBU 3f1c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.299 UTC [gossip.pull] HandleMessage -> DEBU 3f1d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.299 UTC [gossip.gossip] handleMessage -> DEBU 3f1e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.603 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f1f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:24.604 UTC [msp.identity] Sign -> DEBU 3f20 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151039 " +peer0.org1.example.com | "2019-09-24 00:26:24.604 UTC [msp.identity] Sign -> DEBU 3f21 Sign: digest: D2ED1D16CF82C5D9898CE2DF525579B6B2240550591F75BB06AD6E8AE95C137F " +peer0.org1.example.com | "2019-09-24 00:26:24.604 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f22 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:24.604 UTC [msp.identity] Sign -> DEBU 3f23 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:24.604 UTC [msp.identity] Sign -> DEBU 3f24 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:24.604 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3f25 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:24.650 UTC [gossip.comm] func1 -> DEBU 3f26 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.651 UTC [gossip.gossip] handleMessage -> DEBU 3f27 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.651 UTC [msp] DeserializeIdentity -> DEBU 3f28 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.651 UTC [msp] DeserializeIdentity -> DEBU 3f29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.651 UTC [gossip.gossip] handleMessage -> DEBU 3f2a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.702 UTC [msp] DeserializeIdentity -> DEBU 3f2b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.703 UTC [msp] DeserializeIdentity -> DEBU 3f2c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.703 UTC [msp] DeserializeIdentity -> DEBU 3f2d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.703 UTC [gossip.comm] Send -> DEBU 3f2e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:24.703 UTC [msp] DeserializeIdentity -> DEBU 3f2f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.703 UTC [gossip.comm] Send -> DEBU 3f30 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:24.704 UTC [gossip.comm] Send -> DEBU 3f31 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:24.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3f32 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3f33 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3f34 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3f35 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.708 UTC [gossip.comm] sendToEndpoint -> DEBU 3f36 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.708 UTC [gossip.comm] sendToEndpoint -> DEBU 3f37 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.789 UTC [gossip.comm] func1 -> DEBU 3f38 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.790 UTC [gossip.gossip] handleMessage -> DEBU 3f39 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.790 UTC [gossip.pull] HandleMessage -> DEBU 3f3a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.790 UTC [msp] DeserializeIdentity -> DEBU 3f3b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.790 UTC [msp] DeserializeIdentity -> DEBU 3f3c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.790 UTC [msp] DeserializeIdentity -> DEBU 3f3d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.791 UTC [msp] DeserializeIdentity -> DEBU 3f3e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.791 UTC [msp] DeserializeIdentity -> DEBU 3f3f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.791 UTC [msp] DeserializeIdentity -> DEBU 3f40 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.791 UTC [gossip.pull] SendDigest -> DEBU 3f41 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:24.791 UTC [gossip.gossip] handleMessage -> DEBU 3f42 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.815 UTC [gossip.comm] func1 -> DEBU 3f43 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.815 UTC [gossip.gossip] handleMessage -> DEBU 3f44 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.816 UTC [gossip.gossip] handleMessage -> DEBU 3f45 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f46 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.816 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f47 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:24.816 UTC [msp] DeserializeIdentity -> DEBU 3f48 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f49 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f4a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f4b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f4c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f4d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [cauthdsl] func1 -> DEBU 3f4f 0xc0026fae50 gate 1569284784823514200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f50 0xc0026fae50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f51 0xc0026fae50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f52 0xc0026fae50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f53 0xc0026fae50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [cauthdsl] func1 -> DEBU 3f54 0xc0026fae50 gate 1569284784823514200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f55 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [cauthdsl] func1 -> DEBU 3f58 0xc0026fb690 gate 1569284784823905000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f59 0xc0026fb690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f5a 0xc0026fb690 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [cauthdsl] func2 -> DEBU 3f5b 0xc0026fb690 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [msp.identity] Verify -> DEBU 3f5c Verify: digest = 00000000 04 dc 20 0e c2 f1 91 f5 42 b7 4e 9c 06 0a 88 d7 |.. .....B.N.....| +peer0.org1.example.com | 00000010 65 b5 10 0b 4d ea e4 db fc 92 2e 00 da 76 cc 5c |e...M........v.\|" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [msp.identity] Verify -> DEBU 3f5d Verify: sig = 00000000 30 44 02 20 07 9a fe 04 6c 14 db 8e 5f 1a 2b 12 |0D. ....l..._.+.| +peer0.org1.example.com | 00000010 fd 50 be 3a 78 12 71 ec 5b f2 04 c9 36 92 0d f9 |.P.:x.q.[...6...| +peer0.org1.example.com | 00000020 dd 52 dc e5 02 20 61 73 10 66 e1 9c ca cb 80 70 |.R... as.f.....p| +peer0.org1.example.com | 00000030 88 c5 bf 06 64 f2 c1 ef 12 e7 9e bf cc 8f 09 6a |....d..........j| +peer0.org1.example.com | 00000040 1f c7 73 1b f8 17 |..s...|" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [cauthdsl] func2 -> DEBU 3f5e 0xc0026fb690 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [cauthdsl] func1 -> DEBU 3f5f 0xc0026fb690 gate 1569284784823905000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [policies] Evaluate -> DEBU 3f60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [policies] Evaluate -> DEBU 3f61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [policies] Evaluate -> DEBU 3f62 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [policies] Evaluate -> DEBU 3f63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f64 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f65 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f66 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:24.824 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f67 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:24.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f68 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:24.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f69 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.825 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f6a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.832 UTC [gossip.discovery] sendMemResponse -> DEBU 3f6b Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:24.832 UTC [msp] DeserializeIdentity -> DEBU 3f6c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f6d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.848 UTC [gossip.comm] func1 -> DEBU 3f6e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.848 UTC [gossip.gossip] handleMessage -> DEBU 3f6f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.848 UTC [gossip.pull] HandleMessage -> DEBU 3f70 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.849 UTC [gossip.pull] SendDigest -> DEBU 3f71 Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:24.849 UTC [gossip.gossip] handleMessage -> DEBU 3f72 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.832 UTC [msp] DeserializeIdentity -> DEBU 3f73 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.849 UTC [msp] DeserializeIdentity -> DEBU 3f74 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.849 UTC [gossip.comm] Send -> DEBU 3f75 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:24.849 UTC [gossip.discovery] sendMemResponse -> DEBU 3f76 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020<" signature:"0D\002 t\267lv5$\355\333\007\351\360\334E\034z\373/\236\324'j\366_\3427\323\347\305\314\321{-\002 \021\346q\013\257\331\224\256\233US\310\030%l\001\356\372\230x\033\366\322\354\002J\202\201X\261u4" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:24.849 UTC [gossip.comm] sendToEndpoint -> DEBU 3f77 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.849 UTC [gossip.comm] sendToEndpoint -> DEBU 3f78 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.979 UTC [gossip.gossip] handleMessage -> DEBU 3f79 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.981 UTC [gossip.gossip] handleMessage -> DEBU 3f7a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f7b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.981 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f7c Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:24.981 UTC [msp] DeserializeIdentity -> DEBU 3f7d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:24.983 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:24.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f7f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f80 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:24.983 UTC [policies] Evaluate -> DEBU 3f81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.983 UTC [policies] Evaluate -> DEBU 3f82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:24.983 UTC [policies] Evaluate -> DEBU 3f83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.983 UTC [cauthdsl] func1 -> DEBU 3f84 0xc0033a1e90 gate 1569284784983735900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.983 UTC [cauthdsl] func2 -> DEBU 3f85 0xc0033a1e90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.984 UTC [cauthdsl] func2 -> DEBU 3f86 0xc0033a1e90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.984 UTC [cauthdsl] func2 -> DEBU 3f87 0xc0033a1e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:24.984 UTC [cauthdsl] func2 -> DEBU 3f88 0xc0033a1e90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.984 UTC [cauthdsl] func1 -> DEBU 3f89 0xc0033a1e90 gate 1569284784983735900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:24.984 UTC [policies] Evaluate -> DEBU 3f8a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.984 UTC [policies] Evaluate -> DEBU 3f8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.984 UTC [policies] Evaluate -> DEBU 3f8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:24.984 UTC [cauthdsl] func1 -> DEBU 3f8d 0xc0036826d0 gate 1569284784984814200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:24.984 UTC [cauthdsl] func2 -> DEBU 3f8e 0xc0036826d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:24.984 UTC [cauthdsl] func2 -> DEBU 3f8f 0xc0036826d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:24.985 UTC [cauthdsl] func2 -> DEBU 3f90 0xc0036826d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.985 UTC [msp.identity] Verify -> DEBU 3f91 Verify: digest = 00000000 b9 59 57 b8 cd 8d 7b f4 96 ca 40 6d e9 73 85 6a |.YW...{...@m.s.j| +peer0.org1.example.com | 00000010 9e b2 67 a8 11 d0 0d e5 78 83 5d 3c d0 89 21 b2 |..g.....x.]<..!.|" +peer0.org1.example.com | "2019-09-24 00:26:24.985 UTC [msp.identity] Verify -> DEBU 3f92 Verify: sig = 00000000 30 45 02 21 00 f5 b5 2b f6 d1 a8 e9 82 a8 a3 c8 |0E.!...+........| +peer0.org1.example.com | 00000010 35 6e f2 64 15 e2 3b df e0 b4 73 76 be f1 dc 5e |5n.d..;...sv...^| +peer0.org1.example.com | 00000020 36 1c 60 e6 0e 02 20 08 23 1a 32 55 23 d5 fb 3c |6.`... .#.2U#..<| +peer0.org1.example.com | 00000030 94 7f 26 0c 2f 79 38 38 9b d5 bd 5c fb 07 8c 9f |..&./y88...\....| +peer0.org1.example.com | 00000040 55 77 dc 60 ae 33 bd |Uw.`.3.|" +peer0.org1.example.com | "2019-09-24 00:26:24.985 UTC [cauthdsl] func2 -> DEBU 3f93 0xc0036826d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:24.985 UTC [cauthdsl] func1 -> DEBU 3f94 0xc0036826d0 gate 1569284784984814200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:24.985 UTC [policies] Evaluate -> DEBU 3f95 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.993 UTC [policies] Evaluate -> DEBU 3f96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.993 UTC [policies] Evaluate -> DEBU 3f97 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.993 UTC [policies] Evaluate -> DEBU 3f98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:24.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f99 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:24.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f9a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:24.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f9b updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:24.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f9c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:24.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f9d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:24.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f9e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.994 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f9f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:24.994 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fa0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.009 UTC [gossip.comm] func1 -> DEBU 3fa1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.009 UTC [gossip.gossip] handleMessage -> DEBU 3fa2 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.009 UTC [gossip.gossip] handleMessage -> DEBU 3fa3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fa4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fa5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.009 UTC [msp] DeserializeIdentity -> DEBU 3fa6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3fa7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3fa8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3fa9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3faa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3fab Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.010 UTC [gossip.comm] Send -> DEBU 3fac Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3fad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.011 UTC [msp] DeserializeIdentity -> DEBU 3fae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.011 UTC [gossip.comm] Send -> DEBU 3faf Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:25.011 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.011 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.015 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.015 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.183 UTC [gossip.gossip] handleMessage -> DEBU 3fb4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.183 UTC [msp] DeserializeIdentity -> DEBU 3fb5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.183 UTC [msp] DeserializeIdentity -> DEBU 3fb6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.183 UTC [msp] DeserializeIdentity -> DEBU 3fb7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.183 UTC [gossip.gossip] handleMessage -> DEBU 3fb8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.671 UTC [gossip.comm] func1 -> DEBU 3fb9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.673 UTC [gossip.gossip] handleMessage -> DEBU 3fba Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.679 UTC [gossip.pull] HandleMessage -> DEBU 3fbb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.679 UTC [gossip.pull] SendDigest -> DEBU 3fbc Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:25.679 UTC [gossip.gossip] handleMessage -> DEBU 3fbd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.689 UTC [gossip.comm] func1 -> DEBU 3fbe Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.690 UTC [gossip.gossip] handleMessage -> DEBU 3fbf Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fc0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.694 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fc1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:25.694 UTC [msp] DeserializeIdentity -> DEBU 3fc2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.694 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fc3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:25.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fc4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:25.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fc5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:25.690 UTC [gossip.gossip] handleMessage -> DEBU 3fc7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.695 UTC [policies] Evaluate -> DEBU 3fc6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:25.707 UTC [policies] Evaluate -> DEBU 3fc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:25.708 UTC [policies] Evaluate -> DEBU 3fc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:25.708 UTC [cauthdsl] func1 -> DEBU 3fca 0xc003f323e0 gate 1569284785708384000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:25.709 UTC [cauthdsl] func2 -> DEBU 3fcb 0xc003f323e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:25.709 UTC [cauthdsl] func2 -> DEBU 3fcc 0xc003f323e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:25.709 UTC [cauthdsl] func2 -> DEBU 3fcd 0xc003f323e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:25.709 UTC [cauthdsl] func2 -> DEBU 3fce 0xc003f323e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:25.709 UTC [cauthdsl] func1 -> DEBU 3fcf 0xc003f323e0 gate 1569284785708384000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:25.709 UTC [policies] Evaluate -> DEBU 3fd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:25.709 UTC [policies] Evaluate -> DEBU 3fd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:25.709 UTC [policies] Evaluate -> DEBU 3fd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:25.711 UTC [cauthdsl] func1 -> DEBU 3fd5 0xc003f32e40 gate 1569284785711368600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:25.722 UTC [cauthdsl] func2 -> DEBU 3fd6 0xc003f32e40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:25.722 UTC [cauthdsl] func2 -> DEBU 3fd7 0xc003f32e40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:25.722 UTC [cauthdsl] func2 -> DEBU 3fd8 0xc003f32e40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:25.722 UTC [msp.identity] Verify -> DEBU 3fd9 Verify: digest = 00000000 40 ca a3 c4 f1 af cd b5 6b 0d 2c c3 20 52 00 aa |@.......k.,. R..| +peer0.org1.example.com | 00000010 f0 13 e1 bb 2d d0 6c dd 90 6c 8a a0 00 98 37 5e |....-.l..l....7^|" +peer0.org1.example.com | "2019-09-24 00:26:25.722 UTC [msp.identity] Verify -> DEBU 3fda Verify: sig = 00000000 30 44 02 20 50 9d 10 dc 78 f9 ce 2a 95 e7 c9 15 |0D. P...x..*....| +peer0.org1.example.com | 00000010 01 6e 6a df 25 7c a3 b9 28 17 d1 46 80 14 72 58 |.nj.%|..(..F..rX| +peer0.org1.example.com | 00000020 23 4b 6c 9a 02 20 15 09 aa e9 45 56 be 96 be 4b |#Kl.. ....EV...K| +peer0.org1.example.com | 00000030 b3 48 63 55 77 4c 73 ce 5d 85 b3 82 ce 82 fd 0e |.HcUwLs.].......| +peer0.org1.example.com | 00000040 e0 a5 01 d4 9b 22 |....."|" +peer0.org1.example.com | "2019-09-24 00:26:25.723 UTC [cauthdsl] func2 -> DEBU 3fdb 0xc003f32e40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:25.724 UTC [cauthdsl] func1 -> DEBU 3fdc 0xc003f32e40 gate 1569284785711368600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:25.724 UTC [policies] Evaluate -> DEBU 3fdd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:25.724 UTC [policies] Evaluate -> DEBU 3fde == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:25.725 UTC [policies] Evaluate -> DEBU 3fdf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:25.725 UTC [policies] Evaluate -> DEBU 3fe0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:25.710 UTC [gossip.gossip] handleMessage -> DEBU 3fd3 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.710 UTC [gossip.comm] func1 -> DEBU 3fd4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.822 UTC [gossip.comm] func1 -> DEBU 3fe1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020=" signature:"0D\002 |\020\024\241\377\222\326&\275I\240$\206\250\266E\300\254\262\033O\325\3734\316\230\331\311\254 z\014\002 \005\205\2010\354\020\003j\360\375\004\023v\246\264\014\372mXv\243\356\232*\325\205$\374\217cgY" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.837 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fe2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fe3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:25.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fe4 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:25.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fe5 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:25.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fe6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:25.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fe7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.841 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fe8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.841 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fe9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.841 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fea Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.842 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3feb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.842 UTC [gossip.gossip] handleMessage -> DEBU 3fec Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.842 UTC [gossip.gossip] handleMessage -> DEBU 3fed Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.843 UTC [gossip.gossip] handleMessage -> DEBU 3fee Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fef Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ff0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.851 UTC [gossip.gossip] handleMessage -> DEBU 3ff1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020=" signature:"0D\002 |\020\024\241\377\222\326&\275I\240$\206\250\266E\300\254\262\033O\325\3734\316\230\331\311\254 z\014\002 \005\205\2010\354\020\003j\360\375\004\023v\246\264\014\372mXv\243\356\232*\325\205$\374\217cgY" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.851 UTC [gossip.gossip] handleMessage -> DEBU 3ff2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.854 UTC [msp] DeserializeIdentity -> DEBU 3ff3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.854 UTC [msp] DeserializeIdentity -> DEBU 3ff4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.855 UTC [msp] DeserializeIdentity -> DEBU 3ff5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.855 UTC [msp] DeserializeIdentity -> DEBU 3ff6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.855 UTC [msp] DeserializeIdentity -> DEBU 3ff7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.855 UTC [msp] DeserializeIdentity -> DEBU 3ff8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.855 UTC [msp] DeserializeIdentity -> DEBU 3ff9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.856 UTC [gossip.comm] Send -> DEBU 3ffa Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:25.856 UTC [msp] DeserializeIdentity -> DEBU 3ffb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.856 UTC [gossip.comm] Send -> DEBU 3ffc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:25.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3ffd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3ffe Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3fff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.857 UTC [gossip.comm] sendToEndpoint -> DEBU 4000 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4001 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020=" signature:"0D\002 |\020\024\241\377\222\326&\275I\240$\206\250\266E\300\254\262\033O\325\3734\316\230\331\311\254 z\014\002 \005\205\2010\354\020\003j\360\375\004\023v\246\264\014\372mXv\243\356\232*\325\205$\374\217cgY" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.864 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4002 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:25.869 UTC [msp.identity] Verify -> DEBU 4003 Verify: digest = 00000000 b6 5c 89 56 0f 93 8c e3 9c 51 c2 14 17 ac 40 55 |.\.V.....Q....@U| +peer0.org1.example.com | 00000010 3a af fa 32 5b 6e 71 dd 02 46 3c b4 bb 17 f1 55 |:..2[nq..F<....U|" +peer0.org1.example.com | "2019-09-24 00:26:25.869 UTC [msp.identity] Verify -> DEBU 4004 Verify: sig = 00000000 30 44 02 20 7c 10 14 a1 ff 92 d6 26 bd 49 a0 24 |0D. |......&.I.$| +peer0.org1.example.com | 00000010 86 a8 b6 45 c0 ac b2 1b 4f d5 fb 34 ce 98 d9 c9 |...E....O..4....| +peer0.org1.example.com | 00000020 ac 20 7a 0c 02 20 05 85 81 30 ec 10 03 6a f0 fd |. z.. ...0...j..| +peer0.org1.example.com | 00000030 04 13 76 a6 b4 0c fa 6d 58 76 a3 ee 9a 2a d5 85 |..v....mXv...*..| +peer0.org1.example.com | 00000040 24 fc 8f 63 67 59 |$..cgY|" +peer0.org1.example.com | "2019-09-24 00:26:25.880 UTC [msp.identity] Verify -> DEBU 4005 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:25.881 UTC [msp.identity] Verify -> DEBU 4006 Verify: sig = 00000000 30 44 02 20 62 07 91 33 43 a5 55 59 d6 0a 2e 52 |0D. b..3C.UY...R| +peer0.org1.example.com | 00000010 33 1b e8 61 32 00 a3 a7 af a0 c8 95 d6 59 d5 b0 |3..a2........Y..| +peer0.org1.example.com | 00000020 61 07 ef 31 02 20 56 9e 2b 12 c6 ba 41 f1 26 ee |a..1. V.+...A.&.| +peer0.org1.example.com | 00000030 0a b3 ce 10 7a d4 fa bf 3c 22 2f d5 a7 c8 a7 57 |....z...<"/....W| +peer0.org1.example.com | 00000040 d7 3a 76 1a 85 91 |.:v...|" +peer0.org1.example.com | "2019-09-24 00:26:25.882 UTC [gossip.discovery] handleAliveMessage -> DEBU 4007 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 4008 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:25.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 4009 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:25.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 400a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:25.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 400b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:25.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 400c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.883 UTC [gossip.discovery] handleAliveMessage -> DEBU 400d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 400e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:25.884 UTC [gossip.discovery] sendMemResponse -> DEBU 400f Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:25.884 UTC [msp] DeserializeIdentity -> DEBU 4010 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.884 UTC [msp] DeserializeIdentity -> DEBU 4011 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:25.884 UTC [gossip.comm] Send -> DEBU 4012 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:25.884 UTC [gossip.discovery] sendMemResponse -> DEBU 4013 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020=" signature:"0D\002 |\020\024\241\377\222\326&\275I\240$\206\250\266E\300\254\262\033O\325\3734\316\230\331\311\254 z\014\002 \005\205\2010\354\020\003j\360\375\004\023v\246\264\014\372mXv\243\356\232*\325\205$\374\217cgY" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:26:25.884 UTC [gossip.comm] sendToEndpoint -> DEBU 4014 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:25.885 UTC [gossip.comm] sendToEndpoint -> DEBU 4015 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:26.044 UTC [gossip.comm] func1 -> DEBU 4016 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:26.044 UTC [gossip.gossip] handleMessage -> DEBU 4017 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:26.044 UTC [msp] DeserializeIdentity -> DEBU 4018 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:26.045 UTC [msp] DeserializeIdentity -> DEBU 4019 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:26.045 UTC [msp] DeserializeIdentity -> DEBU 401a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:26.045 UTC [gossip.gossip] handleMessage -> DEBU 401b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.330 UTC [gossip.election] waitForInterrupt -> DEBU 401c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.331 UTC [gossip.election] IsLeader -> DEBU 401d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:27.331 UTC [msp] GetDefaultSigningIdentity -> DEBU 401e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:27.331 UTC [msp.identity] Sign -> DEBU 401f Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510131801 " +peer0.org1.example.com | "2019-09-24 00:26:27.331 UTC [msp.identity] Sign -> DEBU 4020 Sign: digest: 1188372527D82F57BDF3E9760AA6FFA24B435576F52B23E527A9970CA2EC9366 " +peer0.org1.example.com | "2019-09-24 00:26:27.331 UTC [gossip.election] waitForInterrupt -> DEBU 4021 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:27.443 UTC [msp] DeserializeIdentity -> DEBU 4022 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.444 UTC [msp] DeserializeIdentity -> DEBU 4023 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.444 UTC [msp] DeserializeIdentity -> DEBU 4024 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.719 UTC [gossip.pull] Hello -> DEBU 4025 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:27.719 UTC [gossip.comm] Send -> DEBU 4026 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:27.719 UTC [gossip.pull] Hello -> DEBU 4027 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:27.720 UTC [gossip.comm] Send -> DEBU 4028 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:27.721 UTC [gossip.pull] Hello -> DEBU 4029 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:27.721 UTC [gossip.comm] Send -> DEBU 402a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:27.722 UTC [gossip.comm] sendToEndpoint -> DEBU 402b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.724 UTC [gossip.comm] sendToEndpoint -> DEBU 402c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.726 UTC [gossip.comm] sendToEndpoint -> DEBU 402d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.726 UTC [gossip.comm] sendToEndpoint -> DEBU 402e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.732 UTC [gossip.comm] sendToEndpoint -> DEBU 402f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.736 UTC [gossip.comm] sendToEndpoint -> DEBU 4030 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.738 UTC [gossip.comm] func1 -> DEBU 4031 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.738 UTC [gossip.gossip] handleMessage -> DEBU 4032 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.738 UTC [gossip.gossip] handleMessage -> DEBU 4033 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.738 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4034 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.738 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4035 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:27.738 UTC [msp.identity] Verify -> DEBU 4036 Verify: digest = 00000000 71 55 c0 b4 f9 a4 cf 34 41 03 96 74 bd de bf 02 |qU.....4A..t....| +peer0.org1.example.com | 00000010 19 6d 0d b5 f1 91 4d 82 ff 04 c4 6f 88 9f 93 6e |.m....M....o...n|" +peer0.org1.example.com | "2019-09-24 00:26:27.739 UTC [msp.identity] Verify -> DEBU 4037 Verify: sig = 00000000 30 44 02 20 34 7f 50 34 a3 d8 75 c6 e3 d8 86 6e |0D. 4.P4..u....n| +peer0.org1.example.com | 00000010 b5 e3 a6 8c 8e 28 3f 13 6a 08 b0 7d 86 65 7b fe |.....(?.j..}.e{.| +peer0.org1.example.com | 00000020 d7 dd 64 58 02 20 3f b6 c8 e3 7c eb e9 72 b7 85 |..dX. ?...|..r..| +peer0.org1.example.com | 00000030 bd 38 87 48 31 91 50 6b a5 41 1b 61 45 d2 5d c8 |.8.H1.Pk.A.aE.].| +peer0.org1.example.com | 00000040 90 b5 a2 6b e1 e0 |...k..|" +peer0.org1.example.com | "2019-09-24 00:26:27.739 UTC [gossip.discovery] handleAliveMessage -> DEBU 4038 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 4039 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:27.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 403a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:27.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 403b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:27.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 403c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:27.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 403d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.739 UTC [gossip.discovery] handleAliveMessage -> DEBU 403e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.740 UTC [gossip.comm] func1 -> DEBU 403f Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.740 UTC [gossip.gossip] handleMessage -> DEBU 4040 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.740 UTC [gossip.pull] HandleMessage -> DEBU 4041 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.740 UTC [gossip.gossip] handleMessage -> DEBU 4042 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.741 UTC [gossip.comm] func1 -> DEBU 4043 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.741 UTC [gossip.gossip] handleMessage -> DEBU 4044 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.744 UTC [gossip.pull] HandleMessage -> DEBU 4045 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.766 UTC [gossip.gossip] handleMessage -> DEBU 4046 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.769 UTC [gossip.comm] func1 -> DEBU 4047 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.769 UTC [gossip.gossip] handleMessage -> DEBU 4048 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.445 UTC [msp] DeserializeIdentity -> DEBU 4049 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.770 UTC [gossip.comm] Send -> DEBU 404a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:27.771 UTC [gossip.comm] sendToEndpoint -> DEBU 404b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.771 UTC [gossip.comm] sendToEndpoint -> DEBU 404c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.772 UTC [msp] DeserializeIdentity -> DEBU 404d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.772 UTC [msp] DeserializeIdentity -> DEBU 404e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU 404f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.773 UTC [gossip.gossip] handleMessage -> DEBU 4050 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.775 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4051 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.777 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4052 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.783 UTC [msp] DeserializeIdentity -> DEBU 4053 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.784 UTC [msp] DeserializeIdentity -> DEBU 4054 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.784 UTC [msp] DeserializeIdentity -> DEBU 4055 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.784 UTC [gossip.comm] Send -> DEBU 4056 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:27.784 UTC [msp] DeserializeIdentity -> DEBU 4057 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.785 UTC [gossip.comm] Send -> DEBU 4058 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:27.785 UTC [gossip.comm] sendToEndpoint -> DEBU 4059 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.785 UTC [gossip.comm] sendToEndpoint -> DEBU 405a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.785 UTC [gossip.comm] sendToEndpoint -> DEBU 405b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.785 UTC [gossip.comm] sendToEndpoint -> DEBU 405c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.820 UTC [gossip.gossip] handleMessage -> DEBU 405d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.820 UTC [gossip.pull] HandleMessage -> DEBU 405e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.820 UTC [gossip.gossip] handleMessage -> DEBU 405f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.820 UTC [gossip.gossip] handleMessage -> DEBU 4060 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.821 UTC [gossip.gossip] handleMessage -> DEBU 4061 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4062 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4063 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.861 UTC [msp] GetDefaultSigningIdentity -> DEBU 4064 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:27.861 UTC [msp.identity] Sign -> DEBU 4065 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103A " +peer0.org1.example.com | "2019-09-24 00:26:27.861 UTC [msp.identity] Sign -> DEBU 4066 Sign: digest: 6A4BDEE0CAE7DC74B60CDF9EF81CC7735776C5EB0390E97248B909E4FBD1BCEE " +peer0.org1.example.com | "2019-09-24 00:26:27.861 UTC [msp] GetDefaultSigningIdentity -> DEBU 4067 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:27.861 UTC [msp.identity] Sign -> DEBU 4068 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:27.861 UTC [msp.identity] Sign -> DEBU 4069 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:27.861 UTC [msp] DeserializeIdentity -> DEBU 406a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.861 UTC [gossip.comm] Send -> DEBU 406b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:27.862 UTC [gossip.comm] Send -> DEBU 406c Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:27.862 UTC [msp] DeserializeIdentity -> DEBU 406d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.862 UTC [gossip.comm] Send -> DEBU 406e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:27.862 UTC [gossip.comm] sendToEndpoint -> DEBU 406f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4070 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4071 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4072 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4073 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4074 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.875 UTC [gossip.gossip] handleMessage -> DEBU 4075 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.875 UTC [gossip.gossip] handleMessage -> DEBU 4076 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.875 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4077 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.875 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4078 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:27.876 UTC [msp.identity] Verify -> DEBU 4079 Verify: digest = 00000000 6a 4b de e0 ca e7 dc 74 b6 0c df 9e f8 1c c7 73 |jK.....t.......s| +peer0.org1.example.com | 00000010 57 76 c5 eb 03 90 e9 72 48 b9 09 e4 fb d1 bc ee |Wv.....rH.......|" +peer0.org1.example.com | "2019-09-24 00:26:27.876 UTC [msp.identity] Verify -> DEBU 407a Verify: sig = 00000000 30 45 02 21 00 be 2f 6f 02 c2 21 a2 36 39 64 c9 |0E.!../o..!.69d.| +peer0.org1.example.com | 00000010 96 8e 18 85 e6 fe ba d0 86 c5 1a ae 61 69 e0 62 |............ai.b| +peer0.org1.example.com | 00000020 54 be 38 84 84 02 20 21 91 f0 f5 0e 26 fe f1 41 |T.8... !....&..A| +peer0.org1.example.com | 00000030 31 61 78 e0 99 67 43 41 8f 43 33 fa 17 5b 04 6c |1ax..gCA.C3..[.l| +peer0.org1.example.com | 00000040 14 91 bd df 38 aa 84 |....8..|" +peer0.org1.example.com | "2019-09-24 00:26:27.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 407b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.876 UTC [gossip.discovery] isSentByMe -> DEBU 407c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 407d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 407e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.876 UTC [gossip.comm] func1 -> DEBU 407f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.876 UTC [gossip.gossip] handleMessage -> DEBU 4080 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.876 UTC [gossip.gossip] handleMessage -> DEBU 4081 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4082 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.876 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4083 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:27.877 UTC [msp.identity] Verify -> DEBU 4084 Verify: digest = 00000000 6a 4b de e0 ca e7 dc 74 b6 0c df 9e f8 1c c7 73 |jK.....t.......s| +peer0.org1.example.com | 00000010 57 76 c5 eb 03 90 e9 72 48 b9 09 e4 fb d1 bc ee |Wv.....rH.......|" +peer0.org1.example.com | "2019-09-24 00:26:27.877 UTC [msp.identity] Verify -> DEBU 4085 Verify: sig = 00000000 30 45 02 21 00 be 2f 6f 02 c2 21 a2 36 39 64 c9 |0E.!../o..!.69d.| +peer0.org1.example.com | 00000010 96 8e 18 85 e6 fe ba d0 86 c5 1a ae 61 69 e0 62 |............ai.b| +peer0.org1.example.com | 00000020 54 be 38 84 84 02 20 21 91 f0 f5 0e 26 fe f1 41 |T.8... !....&..A| +peer0.org1.example.com | 00000030 31 61 78 e0 99 67 43 41 8f 43 33 fa 17 5b 04 6c |1ax..gCA.C3..[.l| +peer0.org1.example.com | 00000040 14 91 bd df 38 aa 84 |....8..|" +peer0.org1.example.com | "2019-09-24 00:26:27.879 UTC [msp.identity] Verify -> DEBU 4086 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:27.879 UTC [msp.identity] Verify -> DEBU 4087 Verify: sig = 00000000 30 45 02 21 00 84 ed 19 95 f2 90 12 0a 6d 30 df |0E.!.........m0.| +peer0.org1.example.com | 00000010 cb fb 2d 38 60 ae 42 df 8c f5 dd 90 13 f2 cb 44 |..-8`.B........D| +peer0.org1.example.com | 00000020 fc cb b5 57 a7 02 20 1b 60 f5 d9 50 06 3d 0b b4 |...W.. .`..P.=..| +peer0.org1.example.com | 00000030 4b f8 fa fe 7c 96 74 7b e3 3b d1 69 c1 45 ff 78 |K...|.t{.;.i.E.x| +peer0.org1.example.com | 00000040 00 bc 1b 92 67 b0 13 |....g..|" +peer0.org1.example.com | "2019-09-24 00:26:27.880 UTC [gossip.discovery] handleAliveMessage -> DEBU 4088 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.880 UTC [gossip.discovery] isSentByMe -> DEBU 4089 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.880 UTC [gossip.discovery] handleAliveMessage -> DEBU 408a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 408b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.884 UTC [gossip.comm] func1 -> DEBU 408c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.884 UTC [gossip.gossip] handleMessage -> DEBU 408d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.884 UTC [gossip.gossip] handleMessage -> DEBU 408e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 408f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.885 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4090 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:27.885 UTC [msp.identity] Verify -> DEBU 4091 Verify: digest = 00000000 6a 4b de e0 ca e7 dc 74 b6 0c df 9e f8 1c c7 73 |jK.....t.......s| +peer0.org1.example.com | 00000010 57 76 c5 eb 03 90 e9 72 48 b9 09 e4 fb d1 bc ee |Wv.....rH.......|" +peer0.org1.example.com | "2019-09-24 00:26:27.885 UTC [msp.identity] Verify -> DEBU 4092 Verify: sig = 00000000 30 45 02 21 00 be 2f 6f 02 c2 21 a2 36 39 64 c9 |0E.!../o..!.69d.| +peer0.org1.example.com | 00000010 96 8e 18 85 e6 fe ba d0 86 c5 1a ae 61 69 e0 62 |............ai.b| +peer0.org1.example.com | 00000020 54 be 38 84 84 02 20 21 91 f0 f5 0e 26 fe f1 41 |T.8... !....&..A| +peer0.org1.example.com | 00000030 31 61 78 e0 99 67 43 41 8f 43 33 fa 17 5b 04 6c |1ax..gCA.C3..[.l| +peer0.org1.example.com | 00000040 14 91 bd df 38 aa 84 |....8..|" +peer0.org1.example.com | "2019-09-24 00:26:27.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 4093 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.894 UTC [gossip.discovery] isSentByMe -> DEBU 4094 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.894 UTC [gossip.discovery] handleAliveMessage -> DEBU 4095 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.894 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4096 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:27.943 UTC [gossip.gossip] handleMessage -> DEBU 4097 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.944 UTC [gossip.pull] HandleMessage -> DEBU 4098 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:27.944 UTC [msp] DeserializeIdentity -> DEBU 4099 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.944 UTC [msp] DeserializeIdentity -> DEBU 409a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.945 UTC [msp] DeserializeIdentity -> DEBU 409b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.945 UTC [msp] DeserializeIdentity -> DEBU 409c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.945 UTC [msp] DeserializeIdentity -> DEBU 409d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.945 UTC [msp] DeserializeIdentity -> DEBU 409e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:27.945 UTC [gossip.pull] SendDigest -> DEBU 409f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:27.948 UTC [gossip.gossip] handleMessage -> DEBU 40a0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.039 UTC [gossip.gossip] handleMessage -> DEBU 40a1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.039 UTC [gossip.gossip] handleMessage -> DEBU 40a2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.039 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.039 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 40a4 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:28.039 UTC [msp] DeserializeIdentity -> DEBU 40a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40a7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40a8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [cauthdsl] func1 -> DEBU 40ac 0xc002745180 gate 1569284788040434000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [cauthdsl] func2 -> DEBU 40ad 0xc002745180 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [cauthdsl] func2 -> DEBU 40ae 0xc002745180 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [cauthdsl] func2 -> DEBU 40af 0xc002745180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [cauthdsl] func2 -> DEBU 40b0 0xc002745180 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [cauthdsl] func1 -> DEBU 40b1 0xc002745180 gate 1569284788040434000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.041 UTC [cauthdsl] func1 -> DEBU 40b5 0xc0027459c0 gate 1569284788040987100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.041 UTC [cauthdsl] func2 -> DEBU 40b6 0xc0027459c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.041 UTC [cauthdsl] func2 -> DEBU 40b7 0xc0027459c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.041 UTC [cauthdsl] func2 -> DEBU 40b8 0xc0027459c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.041 UTC [msp.identity] Verify -> DEBU 40b9 Verify: digest = 00000000 0b f4 1b 0b 44 49 6a 68 75 6f b8 cc ad 0b 32 ef |....DIjhuo....2.| +peer0.org1.example.com | 00000010 86 61 23 cc 7f ea d1 b2 00 ed 79 ac dd 40 86 04 |.a#.......y..@..|" +peer0.org1.example.com | "2019-09-24 00:26:28.041 UTC [msp.identity] Verify -> DEBU 40ba Verify: sig = 00000000 30 44 02 20 52 00 af b5 58 bc 20 e0 3f c3 c9 98 |0D. R...X. .?...| +peer0.org1.example.com | 00000010 07 0f b1 27 9c 90 35 68 55 9c 64 64 ad 23 57 a0 |...'..5hU.dd.#W.| +peer0.org1.example.com | 00000020 2d 4c 4a c9 02 20 4b b0 56 1f 18 e6 71 ca b2 37 |-LJ.. K.V...q..7| +peer0.org1.example.com | 00000030 03 4a ef 50 9d 21 0a 76 fb 80 6f ab c1 48 a9 71 |.J.P.!.v..o..H.q| +peer0.org1.example.com | 00000040 c5 95 34 6e 4c 79 |..4nLy|" +peer0.org1.example.com | "2019-09-24 00:26:28.041 UTC [cauthdsl] func2 -> DEBU 40bb 0xc0027459c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.041 UTC [cauthdsl] func1 -> DEBU 40bc 0xc0027459c0 gate 1569284788040987100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:28.041 UTC [policies] Evaluate -> DEBU 40bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.063 UTC [policies] Evaluate -> DEBU 40be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.063 UTC [policies] Evaluate -> DEBU 40bf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.063 UTC [policies] Evaluate -> DEBU 40c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.063 UTC [gossip.discovery] handleAliveMessage -> DEBU 40c1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 40c2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:28.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 40c3 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:28.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 40c4 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:28.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 40c5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:28.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 40c6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.064 UTC [gossip.discovery] handleAliveMessage -> DEBU 40c7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.065 UTC [gossip.discovery] sendMemResponse -> DEBU 40c8 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:28.065 UTC [msp] DeserializeIdentity -> DEBU 40c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.065 UTC [msp] DeserializeIdentity -> DEBU 40ca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.065 UTC [msp] DeserializeIdentity -> DEBU 40cb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.065 UTC [gossip.comm] Send -> DEBU 40cc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:28.065 UTC [gossip.discovery] sendMemResponse -> DEBU 40cd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020>" signature:"0D\002 4\177P4\243\330u\306\343\330\206n\265\343\246\214\216(?\023j\010\260}\206e{\376\327\335dX\002 ?\266\310\343|\353\351r\267\205\2758\207H1\221Pk\245A\033aE\322]\310\220\265\242k\341\340" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:28.065 UTC [gossip.comm] sendToEndpoint -> DEBU 40ce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.065 UTC [gossip.comm] sendToEndpoint -> DEBU 40cf Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40d0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.115 UTC [msp] DeserializeIdentity -> DEBU 40d1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.116 UTC [msp] DeserializeIdentity -> DEBU 40d2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.116 UTC [gossip.comm] Send -> DEBU 40d3 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:28.116 UTC [gossip.comm] sendToEndpoint -> DEBU 40d4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.116 UTC [gossip.comm] sendToEndpoint -> DEBU 40d5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.116 UTC [gossip.comm] sendToEndpoint -> DEBU 40d6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.116 UTC [gossip.comm] sendToEndpoint -> DEBU 40d7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.117 UTC [gossip.comm] sendToEndpoint -> DEBU 40d8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.117 UTC [gossip.comm] sendToEndpoint -> DEBU 40d9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.127 UTC [gossip.comm] func1 -> DEBU 40da Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.127 UTC [gossip.gossip] handleMessage -> DEBU 40db Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.128 UTC [msp] DeserializeIdentity -> DEBU 40dc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.128 UTC [msp] DeserializeIdentity -> DEBU 40dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.128 UTC [msp] DeserializeIdentity -> DEBU 40de Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.128 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:28.128 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40e0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.128 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40e1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.128 UTC [policies] Evaluate -> DEBU 40e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [policies] Evaluate -> DEBU 40e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [policies] Evaluate -> DEBU 40e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [cauthdsl] func1 -> DEBU 40e6 0xc004b90f50 gate 1569284788129236400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [cauthdsl] func2 -> DEBU 40e7 0xc004b90f50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [cauthdsl] func2 -> DEBU 40e8 0xc004b90f50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [cauthdsl] func2 -> DEBU 40e9 0xc004b90f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [cauthdsl] func2 -> DEBU 40ea 0xc004b90f50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [cauthdsl] func1 -> DEBU 40eb 0xc004b90f50 gate 1569284788129236400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [policies] Evaluate -> DEBU 40ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [policies] Evaluate -> DEBU 40ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [policies] Evaluate -> DEBU 40ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [cauthdsl] func1 -> DEBU 40ef 0xc004b91790 gate 1569284788129771600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [cauthdsl] func2 -> DEBU 40f0 0xc004b91790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.129 UTC [gossip.comm] func1 -> DEBU 40e5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.130 UTC [cauthdsl] func2 -> DEBU 40f1 0xc004b91790 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.130 UTC [cauthdsl] func2 -> DEBU 40f2 0xc004b91790 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.130 UTC [msp.identity] Verify -> DEBU 40f3 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:28.130 UTC [msp.identity] Verify -> DEBU 40f4 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:28.130 UTC [cauthdsl] func2 -> DEBU 40f5 0xc004b91790 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.131 UTC [cauthdsl] func1 -> DEBU 40f6 0xc004b91790 gate 1569284788129771600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:28.131 UTC [policies] Evaluate -> DEBU 40f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.131 UTC [policies] Evaluate -> DEBU 40f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.131 UTC [policies] Evaluate -> DEBU 40f9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.131 UTC [policies] Evaluate -> DEBU 40fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.131 UTC [msp.identity] Verify -> DEBU 40fb Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:28.132 UTC [msp.identity] Verify -> DEBU 40fc Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:28.136 UTC [msp] DeserializeIdentity -> DEBU 40fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.136 UTC [msp] DeserializeIdentity -> DEBU 40fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.137 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40ff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:28.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4100 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4101 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.137 UTC [policies] Evaluate -> DEBU 4102 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.137 UTC [policies] Evaluate -> DEBU 4103 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:28.137 UTC [policies] Evaluate -> DEBU 4104 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.146 UTC [cauthdsl] func1 -> DEBU 4105 0xc004e15680 gate 1569284788145847400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.148 UTC [cauthdsl] func2 -> DEBU 4106 0xc004e15680 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.149 UTC [cauthdsl] func2 -> DEBU 4107 0xc004e15680 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.149 UTC [cauthdsl] func2 -> DEBU 4108 0xc004e15680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:28.149 UTC [cauthdsl] func2 -> DEBU 4109 0xc004e15680 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.149 UTC [cauthdsl] func1 -> DEBU 410a 0xc004e15680 gate 1569284788145847400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.149 UTC [policies] Evaluate -> DEBU 410b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.149 UTC [policies] Evaluate -> DEBU 410c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.150 UTC [policies] Evaluate -> DEBU 410d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.150 UTC [cauthdsl] func1 -> DEBU 410e 0xc004e15ec0 gate 1569284788150094500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.150 UTC [cauthdsl] func2 -> DEBU 410f 0xc004e15ec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.150 UTC [cauthdsl] func2 -> DEBU 4110 0xc004e15ec0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.151 UTC [cauthdsl] func2 -> DEBU 4111 0xc004e15ec0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.159 UTC [msp.identity] Verify -> DEBU 4112 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:28.159 UTC [msp.identity] Verify -> DEBU 4113 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:28.159 UTC [cauthdsl] func2 -> DEBU 4114 0xc004e15ec0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.162 UTC [cauthdsl] func1 -> DEBU 4115 0xc004e15ec0 gate 1569284788150094500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:28.162 UTC [policies] Evaluate -> DEBU 4116 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.162 UTC [policies] Evaluate -> DEBU 4117 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.163 UTC [policies] Evaluate -> DEBU 4118 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.163 UTC [policies] Evaluate -> DEBU 4119 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.164 UTC [msp.identity] Verify -> DEBU 411a Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:28.169 UTC [msp.identity] Verify -> DEBU 411b Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:28.170 UTC [gossip.gossip] handleMessage -> DEBU 411c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.170 UTC [gossip.gossip] handleMessage -> DEBU 411d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.170 UTC [msp] DeserializeIdentity -> DEBU 411e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.171 UTC [msp] DeserializeIdentity -> DEBU 411f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.176 UTC [msp] DeserializeIdentity -> DEBU 4120 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.177 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4121 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:28.177 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4122 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.177 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4123 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.177 UTC [policies] Evaluate -> DEBU 4124 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.189 UTC [policies] Evaluate -> DEBU 4125 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:28.189 UTC [policies] Evaluate -> DEBU 4126 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.189 UTC [cauthdsl] func1 -> DEBU 4127 0xc002aca0f0 gate 1569284788189851700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.201 UTC [cauthdsl] func2 -> DEBU 4128 0xc002aca0f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.201 UTC [cauthdsl] func2 -> DEBU 4129 0xc002aca0f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.201 UTC [cauthdsl] func2 -> DEBU 412a 0xc002aca0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:28.201 UTC [cauthdsl] func2 -> DEBU 412b 0xc002aca0f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.201 UTC [cauthdsl] func1 -> DEBU 412c 0xc002aca0f0 gate 1569284788189851700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.201 UTC [policies] Evaluate -> DEBU 412d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.201 UTC [policies] Evaluate -> DEBU 412e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.201 UTC [policies] Evaluate -> DEBU 412f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [cauthdsl] func1 -> DEBU 4130 0xc002aca930 gate 1569284788202006600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [cauthdsl] func2 -> DEBU 4131 0xc002aca930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [cauthdsl] func2 -> DEBU 4132 0xc002aca930 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [cauthdsl] func2 -> DEBU 4133 0xc002aca930 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [msp.identity] Verify -> DEBU 4134 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [msp.identity] Verify -> DEBU 4135 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [cauthdsl] func2 -> DEBU 4136 0xc002aca930 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [cauthdsl] func1 -> DEBU 4137 0xc002aca930 gate 1569284788202006600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [policies] Evaluate -> DEBU 4138 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [policies] Evaluate -> DEBU 4139 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [policies] Evaluate -> DEBU 413a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [policies] Evaluate -> DEBU 413b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [msp.identity] Verify -> DEBU 413c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:28.202 UTC [msp.identity] Verify -> DEBU 413d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:28.203 UTC [msp.identity] Verify -> DEBU 413e Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:28.203 UTC [msp.identity] Verify -> DEBU 413f Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:28.203 UTC [msp] DeserializeIdentity -> DEBU 4140 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.203 UTC [msp] DeserializeIdentity -> DEBU 4141 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.203 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4142 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:28.203 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4143 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.203 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4144 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.203 UTC [policies] Evaluate -> DEBU 4145 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.203 UTC [policies] Evaluate -> DEBU 4146 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:28.203 UTC [policies] Evaluate -> DEBU 4147 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.203 UTC [cauthdsl] func1 -> DEBU 4148 0xc002ae0f40 gate 1569284788203985000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 4149 0xc002ae0f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 414a 0xc002ae0f40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 414b 0xc002ae0f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 414c 0xc002ae0f40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [cauthdsl] func1 -> DEBU 414d 0xc002ae0f40 gate 1569284788203985000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [policies] Evaluate -> DEBU 414e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [policies] Evaluate -> DEBU 414f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [policies] Evaluate -> DEBU 4150 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [cauthdsl] func1 -> DEBU 4151 0xc002ae1780 gate 1569284788204466500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 4152 0xc002ae1780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 4153 0xc002ae1780 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 4154 0xc002ae1780 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [msp.identity] Verify -> DEBU 4155 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:28.204 UTC [msp.identity] Verify -> DEBU 4156 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [cauthdsl] func2 -> DEBU 4157 0xc002ae1780 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [cauthdsl] func1 -> DEBU 4158 0xc002ae1780 gate 1569284788204466500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [policies] Evaluate -> DEBU 4159 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [policies] Evaluate -> DEBU 415a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [policies] Evaluate -> DEBU 415b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [policies] Evaluate -> DEBU 415c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [gossip.gossip] handleMessage -> DEBU 415d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [gossip.gossip] handleMessage -> DEBU 415e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [msp.identity] Verify -> DEBU 415f Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [msp.identity] Verify -> DEBU 4160 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [msp.identity] Verify -> DEBU 4161 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:28.205 UTC [msp.identity] Verify -> DEBU 4162 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:28.206 UTC [msp] DeserializeIdentity -> DEBU 4163 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.206 UTC [msp] DeserializeIdentity -> DEBU 4164 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.206 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4165 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:28.206 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4166 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.206 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4167 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.206 UTC [policies] Evaluate -> DEBU 4168 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.206 UTC [policies] Evaluate -> DEBU 4169 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:28.206 UTC [policies] Evaluate -> DEBU 416a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.206 UTC [cauthdsl] func1 -> DEBU 416b 0xc0034cbfd0 gate 1569284788206814600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.206 UTC [cauthdsl] func2 -> DEBU 416c 0xc0034cbfd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.206 UTC [cauthdsl] func2 -> DEBU 416d 0xc0034cbfd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 416e 0xc0034cbfd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 416f 0xc0034cbfd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [cauthdsl] func1 -> DEBU 4170 0xc0034cbfd0 gate 1569284788206814600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [policies] Evaluate -> DEBU 4171 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [policies] Evaluate -> DEBU 4172 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [policies] Evaluate -> DEBU 4173 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [cauthdsl] func1 -> DEBU 4174 0xc00373e810 gate 1569284788207248000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 4175 0xc00373e810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 4176 0xc00373e810 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 4177 0xc00373e810 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [msp.identity] Verify -> DEBU 4178 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [msp.identity] Verify -> DEBU 4179 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 417a 0xc00373e810 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [cauthdsl] func1 -> DEBU 417b 0xc00373e810 gate 1569284788207248000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 417c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 417d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 417e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 417f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [msp] DeserializeIdentity -> DEBU 4180 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [msp] DeserializeIdentity -> DEBU 4181 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4182 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4183 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4184 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 4185 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 4186 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 4187 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [cauthdsl] func1 -> DEBU 4188 0xc00373ffe0 gate 1569284788217011200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 4189 0xc00373ffe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 418a 0xc00373ffe0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 418b 0xc00373ffe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 418c 0xc00373ffe0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [cauthdsl] func1 -> DEBU 418d 0xc00373ffe0 gate 1569284788217011200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [policies] Evaluate -> DEBU 418e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [policies] Evaluate -> DEBU 418f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [policies] Evaluate -> DEBU 4190 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [cauthdsl] func1 -> DEBU 4191 0xc003bda820 gate 1569284788217405000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 4192 0xc003bda820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 4193 0xc003bda820 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 4194 0xc003bda820 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [msp.identity] Verify -> DEBU 4195 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:28.217 UTC [msp.identity] Verify -> DEBU 4196 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:28.218 UTC [cauthdsl] func2 -> DEBU 4197 0xc003bda820 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.218 UTC [cauthdsl] func1 -> DEBU 4198 0xc003bda820 gate 1569284788217405000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:28.218 UTC [policies] Evaluate -> DEBU 4199 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.218 UTC [policies] Evaluate -> DEBU 419a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.218 UTC [policies] Evaluate -> DEBU 419b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.218 UTC [policies] Evaluate -> DEBU 419c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.218 UTC [gossip.gossip] handleMessage -> DEBU 419d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.296 UTC [msp] DeserializeIdentity -> DEBU 419e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.297 UTC [msp] DeserializeIdentity -> DEBU 419f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.297 UTC [gossip.pull] Hello -> DEBU 41a0 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:28.297 UTC [msp] DeserializeIdentity -> DEBU 41a1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.297 UTC [msp] DeserializeIdentity -> DEBU 41a2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.297 UTC [gossip.comm] Send -> DEBU 41a3 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:28.298 UTC [gossip.comm] sendToEndpoint -> DEBU 41a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.298 UTC [gossip.comm] sendToEndpoint -> DEBU 41a5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.299 UTC [gossip.comm] func1 -> DEBU 41a6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.299 UTC [gossip.gossip] handleMessage -> DEBU 41a7 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.299 UTC [gossip.pull] HandleMessage -> DEBU 41a8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.299 UTC [gossip.gossip] handleMessage -> DEBU 41a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.614 UTC [gossip.comm] func1 -> DEBU 41aa Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.614 UTC [gossip.gossip] handleMessage -> DEBU 41ab Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.614 UTC [msp] DeserializeIdentity -> DEBU 41ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.614 UTC [msp] DeserializeIdentity -> DEBU 41ad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.614 UTC [gossip.gossip] handleMessage -> DEBU 41ae Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.772 UTC [gossip.comm] func1 -> DEBU 41af Got message: GossipMessage: tag:EMPTY mem_req:\025\353\306E.\245 S\2669\005\002 \004p\201\357K=\205\004\204JTp\235\247m'ss\335q\271\201\000\216op\353\226\003\212\021\210" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.773 UTC [gossip.gossip] handleMessage -> DEBU 41b0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\025\353\306E.\245 S\2669\005\002 \004p\201\357K=\205\004\204JTp\235\247m'ss\335q\271\201\000\216op\353\226\003\212\021\210" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.780 UTC [gossip.gossip] handleMessage -> DEBU 41b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.780 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41b2 Got message: GossipMessage: tag:EMPTY mem_req:\025\353\306E.\245 S\2669\005\002 \004p\201\357K=\205\004\204JTp\235\247m'ss\335q\271\201\000\216op\353\226\003\212\021\210" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.780 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41b3 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:28.780 UTC [msp] DeserializeIdentity -> DEBU 41b4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41b6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41b7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [cauthdsl] func1 -> DEBU 41bb 0xc003316e40 gate 1569284788781345700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41bc 0xc003316e40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41bd 0xc003316e40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41be 0xc003316e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41bf 0xc003316e40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [cauthdsl] func1 -> DEBU 41c0 0xc003316e40 gate 1569284788781345700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [cauthdsl] func1 -> DEBU 41c4 0xc003317680 gate 1569284788781752100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41c5 0xc003317680 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41c6 0xc003317680 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41c7 0xc003317680 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [msp.identity] Verify -> DEBU 41c8 Verify: digest = 00000000 ab 4b 3d 37 d3 49 1c 61 af a4 87 35 a4 0b 15 53 |.K=7.I.a...5...S| +peer0.org1.example.com | 00000010 b6 d8 35 49 ba fb 5e fe c3 a8 69 91 9a 2c 33 d2 |..5I..^...i..,3.|" +peer0.org1.example.com | "2019-09-24 00:26:28.781 UTC [msp.identity] Verify -> DEBU 41c9 Verify: sig = 00000000 30 44 02 20 7e ad a8 53 69 ac b9 9c 6a ed fd 42 |0D. ~..Si...j..B| +peer0.org1.example.com | 00000010 21 79 ea e7 e1 50 85 33 3e 15 eb c6 45 2e a5 20 |!y...P.3>...E.. | +peer0.org1.example.com | 00000020 53 b6 39 05 02 20 04 70 81 ef 4b 3d 85 04 84 4a |S.9.. .p..K=...J| +peer0.org1.example.com | 00000030 54 70 9d a7 6d 27 73 73 dd 71 b9 81 00 8e 6f 70 |Tp..m'ss.q....op| +peer0.org1.example.com | 00000040 eb 96 03 8a 11 88 |......|" +peer0.org1.example.com | "2019-09-24 00:26:28.782 UTC [cauthdsl] func2 -> DEBU 41ca 0xc003317680 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:28.782 UTC [cauthdsl] func1 -> DEBU 41cb 0xc003317680 gate 1569284788781752100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:28.782 UTC [policies] Evaluate -> DEBU 41cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.787 UTC [policies] Evaluate -> DEBU 41cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [policies] Evaluate -> DEBU 41ce Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [policies] Evaluate -> DEBU 41cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [gossip.discovery] handleAliveMessage -> DEBU 41d0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 41d1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 41d2 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 41d3 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 41d4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 41d5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [gossip.discovery] handleAliveMessage -> DEBU 41d6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41d7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [gossip.discovery] sendMemResponse -> DEBU 41d8 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [msp] DeserializeIdentity -> DEBU 41d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [msp] DeserializeIdentity -> DEBU 41da Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.788 UTC [msp] DeserializeIdentity -> DEBU 41db Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.789 UTC [gossip.comm] Send -> DEBU 41dc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:28.789 UTC [gossip.discovery] sendMemResponse -> DEBU 41dd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020>" signature:"0D\002 4\177P4\243\330u\306\343\330\206n\265\343\246\214\216(?\023j\010\260}\206e{\376\327\335dX\002 ?\266\310\343|\353\351r\267\205\2758\207H1\221Pk\245A\033aE\322]\310\220\265\242k\341\340" > alive:\025\353\306E.\245 S\2669\005\002 \004p\201\357K=\205\004\204JTp\235\247m'ss\335q\271\201\000\216op\353\226\003\212\021\210" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:28.789 UTC [gossip.comm] sendToEndpoint -> DEBU 41de Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.789 UTC [gossip.comm] sendToEndpoint -> DEBU 41df Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.819 UTC [gossip.comm] func1 -> DEBU 41e0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.819 UTC [gossip.gossip] handleMessage -> DEBU 41e1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.819 UTC [gossip.pull] HandleMessage -> DEBU 41e2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.819 UTC [msp] DeserializeIdentity -> DEBU 41e3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.819 UTC [msp] DeserializeIdentity -> DEBU 41e4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.819 UTC [msp] DeserializeIdentity -> DEBU 41e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.819 UTC [msp] DeserializeIdentity -> DEBU 41e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.820 UTC [msp] DeserializeIdentity -> DEBU 41e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.820 UTC [msp] DeserializeIdentity -> DEBU 41e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:28.820 UTC [gossip.pull] SendDigest -> DEBU 41e9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:28.820 UTC [gossip.gossip] handleMessage -> DEBU 41ea Exiting" +peer0.org1.example.com | "2019-09-24 00:26:28.845 UTC [gossip.comm] func1 -> DEBU 41eb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.845 UTC [gossip.gossip] handleMessage -> DEBU 41ec Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.845 UTC [gossip.pull] HandleMessage -> DEBU 41ed GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:28.845 UTC [gossip.pull] SendDigest -> DEBU 41ee Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:28.845 UTC [gossip.gossip] handleMessage -> DEBU 41ef Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.120 UTC [gossip.gossip] handleMessage -> DEBU 41f0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.120 UTC [msp] DeserializeIdentity -> DEBU 41f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.120 UTC [msp] DeserializeIdentity -> DEBU 41f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.120 UTC [msp] DeserializeIdentity -> DEBU 41f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.120 UTC [gossip.gossip] handleMessage -> DEBU 41f4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.605 UTC [msp] GetDefaultSigningIdentity -> DEBU 41f5 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:29.605 UTC [msp.identity] Sign -> DEBU 41f6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103B " +peer0.org1.example.com | "2019-09-24 00:26:29.606 UTC [msp.identity] Sign -> DEBU 41f7 Sign: digest: 742258FFC0F685D84ECC59928F46FC0E95D8A0D6887CF83C52514925FFEFA29A " +peer0.org1.example.com | "2019-09-24 00:26:29.606 UTC [msp] GetDefaultSigningIdentity -> DEBU 41f8 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:29.606 UTC [msp.identity] Sign -> DEBU 41f9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:29.606 UTC [msp.identity] Sign -> DEBU 41fa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:29.607 UTC [gossip.discovery] periodicalSendAlive -> DEBU 41fb Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:29.611 UTC [msp] DeserializeIdentity -> DEBU 41fc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.611 UTC [msp] DeserializeIdentity -> DEBU 41fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.611 UTC [msp] DeserializeIdentity -> DEBU 41fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.614 UTC [gossip.comm] Send -> DEBU 41ff Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:29.614 UTC [msp] DeserializeIdentity -> DEBU 4200 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.614 UTC [gossip.comm] Send -> DEBU 4201 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:29.614 UTC [gossip.comm] Send -> DEBU 4202 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:29.614 UTC [gossip.comm] sendToEndpoint -> DEBU 4203 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.614 UTC [gossip.comm] sendToEndpoint -> DEBU 4204 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.615 UTC [gossip.comm] sendToEndpoint -> DEBU 4205 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.615 UTC [gossip.comm] sendToEndpoint -> DEBU 4206 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.615 UTC [gossip.comm] sendToEndpoint -> DEBU 4207 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.615 UTC [gossip.comm] sendToEndpoint -> DEBU 4208 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.630 UTC [gossip.comm] func1 -> DEBU 4209 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.630 UTC [gossip.gossip] handleMessage -> DEBU 420a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.630 UTC [gossip.gossip] handleMessage -> DEBU 420b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 420c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.630 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 420d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:29.630 UTC [msp.identity] Verify -> DEBU 420e Verify: digest = 00000000 74 22 58 ff c0 f6 85 d8 4e cc 59 92 8f 46 fc 0e |t"X.....N.Y..F..| +peer0.org1.example.com | 00000010 95 d8 a0 d6 88 7c f8 3c 52 51 49 25 ff ef a2 9a |.....|. DEBU 420f Verify: sig = 00000000 30 45 02 21 00 e5 d5 46 15 1f 94 c1 a8 bd b6 b1 |0E.!...F........| +peer0.org1.example.com | 00000010 c4 a2 80 9a 9f a9 98 f2 8b 73 58 b8 33 f1 e4 1d |.........sX.3...| +peer0.org1.example.com | 00000020 e0 8b d3 27 03 02 20 53 04 77 88 f3 54 2c 92 a9 |...'.. S.w..T,..| +peer0.org1.example.com | 00000030 75 60 68 62 66 25 c7 db 60 67 8f 45 60 30 ca 95 |u`hbf%..`g.E`0..| +peer0.org1.example.com | 00000040 4a 29 8c 8a 95 1e 13 |J).....|" +peer0.org1.example.com | "2019-09-24 00:26:29.631 UTC [gossip.discovery] isSentByMe -> DEBU 4210 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.631 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4211 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.635 UTC [gossip.gossip] handleMessage -> DEBU 4212 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.635 UTC [gossip.gossip] handleMessage -> DEBU 4213 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4214 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4215 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:29.635 UTC [msp.identity] Verify -> DEBU 4216 Verify: digest = 00000000 74 22 58 ff c0 f6 85 d8 4e cc 59 92 8f 46 fc 0e |t"X.....N.Y..F..| +peer0.org1.example.com | 00000010 95 d8 a0 d6 88 7c f8 3c 52 51 49 25 ff ef a2 9a |.....|. DEBU 4217 Verify: sig = 00000000 30 45 02 21 00 e5 d5 46 15 1f 94 c1 a8 bd b6 b1 |0E.!...F........| +peer0.org1.example.com | 00000010 c4 a2 80 9a 9f a9 98 f2 8b 73 58 b8 33 f1 e4 1d |.........sX.3...| +peer0.org1.example.com | 00000020 e0 8b d3 27 03 02 20 53 04 77 88 f3 54 2c 92 a9 |...'.. S.w..T,..| +peer0.org1.example.com | 00000030 75 60 68 62 66 25 c7 db 60 67 8f 45 60 30 ca 95 |u`hbf%..`g.E`0..| +peer0.org1.example.com | 00000040 4a 29 8c 8a 95 1e 13 |J).....|" +peer0.org1.example.com | "2019-09-24 00:26:29.635 UTC [gossip.discovery] isSentByMe -> DEBU 4218 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4219 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.672 UTC [gossip.comm] func1 -> DEBU 421a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.672 UTC [gossip.gossip] handleMessage -> DEBU 421b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.672 UTC [gossip.pull] HandleMessage -> DEBU 421c GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.672 UTC [gossip.pull] SendDigest -> DEBU 421d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:29.672 UTC [gossip.gossip] handleMessage -> DEBU 421e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.788 UTC [gossip.comm] func1 -> DEBU 421f Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020?" signature:"0D\002 I\220\267\tH\256k\217\334\246}I)\353\3477\257\267\005\363G\251V\ngm\2579\351J\237\301\002 D\016\r\375@\310\241\325\241\305\307\362\025\220\375\272M\263\262KZ#T\330\374U5\245A#S2" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.788 UTC [gossip.gossip] handleMessage -> DEBU 4220 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020?" signature:"0D\002 I\220\267\tH\256k\217\334\246}I)\353\3477\257\267\005\363G\251V\ngm\2579\351J\237\301\002 D\016\r\375@\310\241\325\241\305\307\362\025\220\375\272M\263\262KZ#T\330\374U5\245A#S2" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.788 UTC [gossip.gossip] handleMessage -> DEBU 4221 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.788 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4222 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020?" signature:"0D\002 I\220\267\tH\256k\217\334\246}I)\353\3477\257\267\005\363G\251V\ngm\2579\351J\237\301\002 D\016\r\375@\310\241\325\241\305\307\362\025\220\375\272M\263\262KZ#T\330\374U5\245A#S2" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.788 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4223 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:29.788 UTC [msp.identity] Verify -> DEBU 4224 Verify: digest = 00000000 41 b2 9a b7 64 05 f4 dc 09 28 f8 50 19 b8 9e 64 |A...d....(.P...d| +peer0.org1.example.com | 00000010 f4 d7 18 49 bb 6b 11 53 ca 2c 96 22 1b 01 e9 50 |...I.k.S.,."...P|" +peer0.org1.example.com | "2019-09-24 00:26:29.788 UTC [msp.identity] Verify -> DEBU 4225 Verify: sig = 00000000 30 44 02 20 49 90 b7 09 48 ae 6b 8f dc a6 7d 49 |0D. I...H.k...}I| +peer0.org1.example.com | 00000010 29 eb e7 37 af b7 05 f3 47 a9 56 0a 67 6d af 39 |)..7....G.V.gm.9| +peer0.org1.example.com | 00000020 e9 4a 9f c1 02 20 44 0e 0d fd 40 c8 a1 d5 a1 c5 |.J... D...@.....| +peer0.org1.example.com | 00000030 c7 f2 15 90 fd ba 4d b3 b2 4b 5a 23 54 d8 fc 55 |......M..KZ#T..U| +peer0.org1.example.com | 00000040 35 a5 41 23 53 32 |5.A#S2|" +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [msp.identity] Verify -> DEBU 4226 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [msp.identity] Verify -> DEBU 4227 Verify: sig = 00000000 30 45 02 21 00 bc 40 8d 81 46 7a 20 17 b8 f2 f1 |0E.!..@..Fz ....| +peer0.org1.example.com | 00000010 c7 e8 7b 79 17 5e 67 b8 34 1c 58 48 ae cf ac f3 |..{y.^g.4.XH....| +peer0.org1.example.com | 00000020 84 00 65 a3 d6 02 20 4f 00 c0 dc 44 62 06 84 ce |..e... O...Db...| +peer0.org1.example.com | 00000030 2f f4 18 63 c0 a8 7f 8f 58 5c 28 d0 e7 44 3a a9 |/..c....X\(..D:.| +peer0.org1.example.com | 00000040 a0 5e 0e 99 a7 74 d7 |.^...t.|" +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [gossip.discovery] handleAliveMessage -> DEBU 4228 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [gossip.discovery] learnExistingMembers -> DEBU 4229 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [gossip.discovery] learnExistingMembers -> DEBU 422a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [gossip.discovery] learnExistingMembers -> DEBU 422b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [gossip.discovery] learnExistingMembers -> DEBU 422c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [gossip.discovery] learnExistingMembers -> DEBU 422d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [gossip.discovery] handleAliveMessage -> DEBU 422e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [gossip.discovery] handleMsgFromComm -> DEBU 422f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [gossip.discovery] sendMemResponse -> DEBU 4230 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [msp] DeserializeIdentity -> DEBU 4231 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.789 UTC [msp] DeserializeIdentity -> DEBU 4232 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.790 UTC [gossip.comm] Send -> DEBU 4233 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:29.790 UTC [gossip.discovery] sendMemResponse -> DEBU 4234 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020?" signature:"0D\002 I\220\267\tH\256k\217\334\246}I)\353\3477\257\267\005\363G\251V\ngm\2579\351J\237\301\002 D\016\r\375@\310\241\325\241\305\307\362\025\220\375\272M\263\262KZ#T\330\374U5\245A#S2" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:26:29.790 UTC [gossip.comm] sendToEndpoint -> DEBU 4235 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.790 UTC [gossip.comm] sendToEndpoint -> DEBU 4236 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.966 UTC [gossip.gossip] handleMessage -> DEBU 4237 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.966 UTC [gossip.gossip] handleMessage -> DEBU 4238 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.966 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4239 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.966 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 423a Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [msp] DeserializeIdentity -> DEBU 423b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 423c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 423d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 423e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 423f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 4240 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 4241 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [cauthdsl] func1 -> DEBU 4242 0xc002bc5460 gate 1569284789967414400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 4243 0xc002bc5460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 4244 0xc002bc5460 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 4245 0xc002bc5460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 4246 0xc002bc5460 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [cauthdsl] func1 -> DEBU 4247 0xc002bc5460 gate 1569284789967414400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 4248 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 4249 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 424a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [cauthdsl] func1 -> DEBU 424b 0xc002bc5ca0 gate 1569284789967797400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 424c 0xc002bc5ca0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 424d 0xc002bc5ca0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 424e 0xc002bc5ca0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [msp.identity] Verify -> DEBU 424f Verify: digest = 00000000 ce 0d b6 e0 d7 6f 67 29 d2 0a 77 c7 cb 53 41 49 |.....og)..w..SAI| +peer0.org1.example.com | 00000010 ff 99 73 83 e8 fe a6 8d 89 98 3a d0 fc a5 40 77 |..s.......:...@w|" +peer0.org1.example.com | "2019-09-24 00:26:29.967 UTC [msp.identity] Verify -> DEBU 4250 Verify: sig = 00000000 30 45 02 21 00 b2 77 7a 5c 78 f7 2b 51 59 9e 53 |0E.!..wz\x.+QY.S| +peer0.org1.example.com | 00000010 eb 7d 94 21 51 e4 20 89 58 8e db d7 7a 66 c8 60 |.}.!Q. .X...zf.`| +peer0.org1.example.com | 00000020 63 e2 0b 4b 00 02 20 6a cf 83 98 30 19 29 fa 96 |c..K.. j...0.)..| +peer0.org1.example.com | 00000030 81 3e 35 ee 98 3f c2 89 04 c9 32 63 ad 46 a5 ae |.>5..?....2c.F..| +peer0.org1.example.com | 00000040 08 85 3c aa 45 e6 b0 |..<.E..|" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [cauthdsl] func2 -> DEBU 4251 0xc002bc5ca0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [cauthdsl] func1 -> DEBU 4252 0xc002bc5ca0 gate 1569284789967797400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [policies] Evaluate -> DEBU 4253 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [policies] Evaluate -> DEBU 4254 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [policies] Evaluate -> DEBU 4255 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [policies] Evaluate -> DEBU 4256 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 4257 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4258 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4259 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 425a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 425b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 425c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 425d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [gossip.discovery] handleMsgFromComm -> DEBU 425e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.968 UTC [gossip.comm] func1 -> DEBU 425f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.969 UTC [gossip.gossip] handleMessage -> DEBU 4260 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.969 UTC [gossip.gossip] handleMessage -> DEBU 4261 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4262 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4263 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.977 UTC [msp] DeserializeIdentity -> DEBU 4264 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.977 UTC [msp] DeserializeIdentity -> DEBU 4265 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.977 UTC [msp] DeserializeIdentity -> DEBU 4266 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.980 UTC [msp] DeserializeIdentity -> DEBU 4267 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.980 UTC [msp] DeserializeIdentity -> DEBU 4268 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.980 UTC [msp] DeserializeIdentity -> DEBU 4269 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.980 UTC [gossip.comm] Send -> DEBU 426a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:29.980 UTC [msp] DeserializeIdentity -> DEBU 426b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.980 UTC [msp] DeserializeIdentity -> DEBU 426c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:29.980 UTC [gossip.comm] Send -> DEBU 426d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:29.981 UTC [gossip.comm] sendToEndpoint -> DEBU 426e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.981 UTC [gossip.comm] sendToEndpoint -> DEBU 426f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.981 UTC [gossip.comm] sendToEndpoint -> DEBU 4270 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.981 UTC [gossip.comm] sendToEndpoint -> DEBU 4271 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.985 UTC [gossip.comm] func1 -> DEBU 4272 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.985 UTC [gossip.gossip] handleMessage -> DEBU 4273 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.986 UTC [gossip.gossip] handleMessage -> DEBU 4274 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:29.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4275 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:29.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4276 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:30.043 UTC [gossip.comm] func1 -> DEBU 4277 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.043 UTC [gossip.gossip] handleMessage -> DEBU 4278 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.043 UTC [msp] DeserializeIdentity -> DEBU 4279 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.043 UTC [msp] DeserializeIdentity -> DEBU 427a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.043 UTC [msp] DeserializeIdentity -> DEBU 427b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.043 UTC [gossip.gossip] handleMessage -> DEBU 427c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:30.687 UTC [gossip.comm] func1 -> DEBU 427d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.687 UTC [gossip.gossip] handleMessage -> DEBU 427e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.687 UTC [gossip.gossip] handleMessage -> DEBU 427f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4280 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4281 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [msp] DeserializeIdentity -> DEBU 4282 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4283 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4284 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4285 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 4286 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 4287 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 4288 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [cauthdsl] func1 -> DEBU 4289 0xc00366bee0 gate 1569284790688551900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [cauthdsl] func2 -> DEBU 428a 0xc00366bee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [cauthdsl] func2 -> DEBU 428b 0xc00366bee0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [cauthdsl] func2 -> DEBU 428c 0xc00366bee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [cauthdsl] func2 -> DEBU 428d 0xc00366bee0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [cauthdsl] func1 -> DEBU 428e 0xc00366bee0 gate 1569284790688551900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 428f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 4290 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 4291 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:30.688 UTC [cauthdsl] func1 -> DEBU 4292 0xc0036b2720 gate 1569284790688924100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [cauthdsl] func2 -> DEBU 4293 0xc0036b2720 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [cauthdsl] func2 -> DEBU 4294 0xc0036b2720 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [cauthdsl] func2 -> DEBU 4295 0xc0036b2720 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [msp.identity] Verify -> DEBU 4296 Verify: digest = 00000000 e1 f1 8f 86 8e 32 0b 91 7f 9a 69 a7 fc 94 7d c1 |.....2....i...}.| +peer0.org1.example.com | 00000010 22 1e 84 1b f6 48 f9 b5 03 d1 04 06 4b 14 32 79 |"....H......K.2y|" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [msp.identity] Verify -> DEBU 4297 Verify: sig = 00000000 30 45 02 21 00 9b 12 9b 30 a4 76 06 b7 6e 07 12 |0E.!....0.v..n..| +peer0.org1.example.com | 00000010 47 99 9b 16 15 bf 06 5c 7e f9 73 98 c6 f1 6c 99 |G......\~.s...l.| +peer0.org1.example.com | 00000020 98 f8 47 64 a5 02 20 6b c4 12 ab c3 66 10 b8 94 |..Gd.. k....f...| +peer0.org1.example.com | 00000030 4b 2d 16 4b 3e a9 d7 fd 25 0d 43 a1 c6 69 2c 6a |K-.K>...%.C..i,j| +peer0.org1.example.com | 00000040 13 57 e7 97 a1 a5 57 |.W....W|" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [gossip.comm] func1 -> DEBU 4298 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [cauthdsl] func2 -> DEBU 4299 0xc0036b2720 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [gossip.gossip] handleMessage -> DEBU 429a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [cauthdsl] func1 -> DEBU 429b 0xc0036b2720 gate 1569284790688924100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [policies] Evaluate -> DEBU 429c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [policies] Evaluate -> DEBU 429d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [policies] Evaluate -> DEBU 429e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:30.689 UTC [policies] Evaluate -> DEBU 429f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:30.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 42a0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 42a1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:30.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 42a2 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:30.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 42a3 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:30.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 42a4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:30.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 42a5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:30.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 42a6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:30.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:30.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:30.690 UTC [gossip.gossip] handleMessage -> DEBU 42aa Exiting" +peer0.org1.example.com | "2019-09-24 00:26:30.695 UTC [msp] DeserializeIdentity -> DEBU 42ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.695 UTC [msp] DeserializeIdentity -> DEBU 42ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.695 UTC [msp] DeserializeIdentity -> DEBU 42ad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.696 UTC [msp] DeserializeIdentity -> DEBU 42ae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.696 UTC [msp] DeserializeIdentity -> DEBU 42af Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.696 UTC [msp] DeserializeIdentity -> DEBU 42b0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.696 UTC [gossip.comm] Send -> DEBU 42b1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:30.696 UTC [msp] DeserializeIdentity -> DEBU 42b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.696 UTC [msp] DeserializeIdentity -> DEBU 42b3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:30.696 UTC [gossip.comm] Send -> DEBU 42b4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:30.696 UTC [gossip.comm] sendToEndpoint -> DEBU 42b5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.696 UTC [gossip.comm] sendToEndpoint -> DEBU 42b6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:30.696 UTC [gossip.comm] sendToEndpoint -> DEBU 42b7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.696 UTC [gossip.comm] sendToEndpoint -> DEBU 42b8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:30.697 UTC [gossip.gossip] handleMessage -> DEBU 42b9 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.697 UTC [gossip.gossip] handleMessage -> DEBU 42ba Exiting" +peer0.org1.example.com | "2019-09-24 00:26:30.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42bb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:30.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42bc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.723 UTC [gossip.pull] Hello -> DEBU 42bd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:31.724 UTC [gossip.comm] Send -> DEBU 42be Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:31.724 UTC [gossip.pull] Hello -> DEBU 42bf Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:31.724 UTC [gossip.comm] Send -> DEBU 42c0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:31.724 UTC [gossip.pull] Hello -> DEBU 42c1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:31.724 UTC [gossip.comm] Send -> DEBU 42c2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.727 UTC [gossip.gossip] handleMessage -> DEBU 42c9 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.727 UTC [gossip.pull] HandleMessage -> DEBU 42ca GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.727 UTC [gossip.gossip] handleMessage -> DEBU 42cb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.727 UTC [gossip.comm] func1 -> DEBU 42cc Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.727 UTC [gossip.gossip] handleMessage -> DEBU 42cd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.727 UTC [gossip.pull] HandleMessage -> DEBU 42ce GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.727 UTC [gossip.gossip] handleMessage -> DEBU 42cf Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.727 UTC [gossip.comm] func1 -> DEBU 42d0 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.728 UTC [gossip.gossip] handleMessage -> DEBU 42d1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.728 UTC [gossip.pull] HandleMessage -> DEBU 42d2 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.728 UTC [gossip.gossip] handleMessage -> DEBU 42d3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.863 UTC [msp] GetDefaultSigningIdentity -> DEBU 42d4 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:31.863 UTC [msp.identity] Sign -> DEBU 42d5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103C " +peer0.org1.example.com | "2019-09-24 00:26:31.863 UTC [msp.identity] Sign -> DEBU 42d6 Sign: digest: 4336717B03DD63794D98BCAF2EAD32DAB9392EE798CFC3480446B66C6DE361C4 " +peer0.org1.example.com | "2019-09-24 00:26:31.863 UTC [msp] GetDefaultSigningIdentity -> DEBU 42d7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:31.863 UTC [msp.identity] Sign -> DEBU 42d8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:31.863 UTC [msp.identity] Sign -> DEBU 42d9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:31.864 UTC [gossip.comm] Send -> DEBU 42da Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:31.864 UTC [msp] DeserializeIdentity -> DEBU 42db Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:31.864 UTC [gossip.comm] sendToEndpoint -> DEBU 42dc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.865 UTC [gossip.comm] sendToEndpoint -> DEBU 42de Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.865 UTC [gossip.comm] Send -> DEBU 42dd Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:31.866 UTC [msp] DeserializeIdentity -> DEBU 42df Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:31.866 UTC [gossip.comm] Send -> DEBU 42e0 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:31.867 UTC [gossip.comm] sendToEndpoint -> DEBU 42e1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.867 UTC [gossip.comm] sendToEndpoint -> DEBU 42e2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.868 UTC [gossip.comm] sendToEndpoint -> DEBU 42e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.868 UTC [gossip.comm] sendToEndpoint -> DEBU 42e4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.872 UTC [gossip.comm] func1 -> DEBU 42e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.872 UTC [gossip.gossip] handleMessage -> DEBU 42e6 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.873 UTC [gossip.gossip] handleMessage -> DEBU 42e7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.873 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42e8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.873 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 42e9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:31.874 UTC [msp.identity] Verify -> DEBU 42ea Verify: digest = 00000000 43 36 71 7b 03 dd 63 79 4d 98 bc af 2e ad 32 da |C6q{..cyM.....2.| +peer0.org1.example.com | 00000010 b9 39 2e e7 98 cf c3 48 04 46 b6 6c 6d e3 61 c4 |.9.....H.F.lm.a.|" +peer0.org1.example.com | "2019-09-24 00:26:31.874 UTC [msp.identity] Verify -> DEBU 42eb Verify: sig = 00000000 30 45 02 21 00 8a dd 4a a7 45 02 95 42 dd 65 df |0E.!...J.E..B.e.| +peer0.org1.example.com | 00000010 11 9f 32 ce e2 0f c3 55 31 3c f1 82 cf 7b 6d df |..2....U1<...{m.| +peer0.org1.example.com | 00000020 08 9c 98 57 b2 02 20 3a 39 4d 1d e8 d0 f0 86 b6 |...W.. :9M......| +peer0.org1.example.com | 00000030 c9 7b bc 42 8f 95 8f 1f 25 2a e1 79 84 47 e3 4c |.{.B....%*.y.G.L| +peer0.org1.example.com | 00000040 80 cd 67 30 a7 c3 d8 |..g0...|" +peer0.org1.example.com | "2019-09-24 00:26:31.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 42ec Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.874 UTC [gossip.discovery] isSentByMe -> DEBU 42ed Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 42ee Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.875 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 42ef Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:31.875 UTC [msp.identity] Verify -> DEBU 42f0 Verify: digest = 00000000 41 b2 9a b7 64 05 f4 dc 09 28 f8 50 19 b8 9e 64 |A...d....(.P...d| +peer0.org1.example.com | 00000010 f4 d7 18 49 bb 6b 11 53 ca 2c 96 22 1b 01 e9 50 |...I.k.S.,."...P|" +peer0.org1.example.com | "2019-09-24 00:26:31.875 UTC [msp.identity] Verify -> DEBU 42f1 Verify: sig = 00000000 30 44 02 20 49 90 b7 09 48 ae 6b 8f dc a6 7d 49 |0D. I...H.k...}I| +peer0.org1.example.com | 00000010 29 eb e7 37 af b7 05 f3 47 a9 56 0a 67 6d af 39 |)..7....G.V.gm.9| +peer0.org1.example.com | 00000020 e9 4a 9f c1 02 20 44 0e 0d fd 40 c8 a1 d5 a1 c5 |.J... D...@.....| +peer0.org1.example.com | 00000030 c7 f2 15 90 fd ba 4d b3 b2 4b 5a 23 54 d8 fc 55 |......M..KZ#T..U| +peer0.org1.example.com | 00000040 35 a5 41 23 53 32 |5.A#S2|" +peer0.org1.example.com | "2019-09-24 00:26:31.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 42f2 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 42f3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.877 UTC [gossip.comm] func1 -> DEBU 42f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.877 UTC [gossip.gossip] handleMessage -> DEBU 42f6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.877 UTC [gossip.gossip] handleMessage -> DEBU 42f7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.877 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.877 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 42f9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:31.878 UTC [msp.identity] Verify -> DEBU 42fa Verify: digest = 00000000 43 36 71 7b 03 dd 63 79 4d 98 bc af 2e ad 32 da |C6q{..cyM.....2.| +peer0.org1.example.com | 00000010 b9 39 2e e7 98 cf c3 48 04 46 b6 6c 6d e3 61 c4 |.9.....H.F.lm.a.|" +peer0.org1.example.com | "2019-09-24 00:26:31.878 UTC [msp.identity] Verify -> DEBU 42fb Verify: sig = 00000000 30 45 02 21 00 8a dd 4a a7 45 02 95 42 dd 65 df |0E.!...J.E..B.e.| +peer0.org1.example.com | 00000010 11 9f 32 ce e2 0f c3 55 31 3c f1 82 cf 7b 6d df |..2....U1<...{m.| +peer0.org1.example.com | 00000020 08 9c 98 57 b2 02 20 3a 39 4d 1d e8 d0 f0 86 b6 |...W.. :9M......| +peer0.org1.example.com | 00000030 c9 7b bc 42 8f 95 8f 1f 25 2a e1 79 84 47 e3 4c |.{.B....%*.y.G.L| +peer0.org1.example.com | 00000040 80 cd 67 30 a7 c3 d8 |..g0...|" +peer0.org1.example.com | "2019-09-24 00:26:31.878 UTC [msp.identity] Verify -> DEBU 42fc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:31.878 UTC [msp.identity] Verify -> DEBU 42fd Verify: sig = 00000000 30 45 02 21 00 90 38 b5 0b ca b0 79 26 ff c9 af |0E.!..8....y&...| +peer0.org1.example.com | 00000010 83 84 f2 6f 6b 5c 39 c4 ed a0 76 62 f2 af 82 dc |...ok\9...vb....| +peer0.org1.example.com | 00000020 c0 bd d2 c0 d8 02 20 7a 59 aa 61 03 48 bb aa ff |...... zY.a.H...| +peer0.org1.example.com | 00000030 71 45 62 77 aa f4 8e bd 92 1a 52 fb 26 4a 7a a5 |qEbw......R.&Jz.| +peer0.org1.example.com | 00000040 d8 d5 8f 9d 60 94 1c |....`..|" +peer0.org1.example.com | "2019-09-24 00:26:31.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 42fe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.879 UTC [gossip.discovery] isSentByMe -> DEBU 42ff Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 4300 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4301 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.882 UTC [gossip.gossip] handleMessage -> DEBU 4302 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.882 UTC [gossip.gossip] handleMessage -> DEBU 4303 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.883 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4304 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.885 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4305 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:31.885 UTC [msp.identity] Verify -> DEBU 4306 Verify: digest = 00000000 43 36 71 7b 03 dd 63 79 4d 98 bc af 2e ad 32 da |C6q{..cyM.....2.| +peer0.org1.example.com | 00000010 b9 39 2e e7 98 cf c3 48 04 46 b6 6c 6d e3 61 c4 |.9.....H.F.lm.a.|" +peer0.org1.example.com | "2019-09-24 00:26:31.886 UTC [msp.identity] Verify -> DEBU 4307 Verify: sig = 00000000 30 45 02 21 00 8a dd 4a a7 45 02 95 42 dd 65 df |0E.!...J.E..B.e.| +peer0.org1.example.com | 00000010 11 9f 32 ce e2 0f c3 55 31 3c f1 82 cf 7b 6d df |..2....U1<...{m.| +peer0.org1.example.com | 00000020 08 9c 98 57 b2 02 20 3a 39 4d 1d e8 d0 f0 86 b6 |...W.. :9M......| +peer0.org1.example.com | 00000030 c9 7b bc 42 8f 95 8f 1f 25 2a e1 79 84 47 e3 4c |.{.B....%*.y.G.L| +peer0.org1.example.com | 00000040 80 cd 67 30 a7 c3 d8 |..g0...|" +peer0.org1.example.com | "2019-09-24 00:26:31.887 UTC [gossip.discovery] handleAliveMessage -> DEBU 4308 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.887 UTC [gossip.discovery] isSentByMe -> DEBU 4309 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 430a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.889 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 430b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:31.889 UTC [msp.identity] Verify -> DEBU 430c Verify: digest = 00000000 41 b2 9a b7 64 05 f4 dc 09 28 f8 50 19 b8 9e 64 |A...d....(.P...d| +peer0.org1.example.com | 00000010 f4 d7 18 49 bb 6b 11 53 ca 2c 96 22 1b 01 e9 50 |...I.k.S.,."...P|" +peer0.org1.example.com | "2019-09-24 00:26:31.890 UTC [msp.identity] Verify -> DEBU 430d Verify: sig = 00000000 30 44 02 20 49 90 b7 09 48 ae 6b 8f dc a6 7d 49 |0D. I...H.k...}I| +peer0.org1.example.com | 00000010 29 eb e7 37 af b7 05 f3 47 a9 56 0a 67 6d af 39 |)..7....G.V.gm.9| +peer0.org1.example.com | 00000020 e9 4a 9f c1 02 20 44 0e 0d fd 40 c8 a1 d5 a1 c5 |.J... D...@.....| +peer0.org1.example.com | 00000030 c7 f2 15 90 fd ba 4d b3 b2 4b 5a 23 54 d8 fc 55 |......M..KZ#T..U| +peer0.org1.example.com | 00000040 35 a5 41 23 53 32 |5.A#S2|" +peer0.org1.example.com | "2019-09-24 00:26:31.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 430e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 430f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.891 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4310 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:31.956 UTC [gossip.gossip] handleMessage -> DEBU 4311 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.956 UTC [gossip.pull] HandleMessage -> DEBU 4312 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:31.956 UTC [msp] DeserializeIdentity -> DEBU 4313 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:31.957 UTC [msp] DeserializeIdentity -> DEBU 4314 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:31.957 UTC [msp] DeserializeIdentity -> DEBU 4315 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:31.957 UTC [msp] DeserializeIdentity -> DEBU 4316 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:31.957 UTC [msp] DeserializeIdentity -> DEBU 4317 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:31.957 UTC [msp] DeserializeIdentity -> DEBU 4318 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:31.957 UTC [gossip.pull] SendDigest -> DEBU 4319 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:31.957 UTC [gossip.gossip] handleMessage -> DEBU 431a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.036 UTC [gossip.gossip] handleMessage -> DEBU 431b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.036 UTC [gossip.gossip] handleMessage -> DEBU 431c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.036 UTC [gossip.discovery] handleMsgFromComm -> DEBU 431d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.036 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 431e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:32.036 UTC [msp] DeserializeIdentity -> DEBU 431f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4320 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4321 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4322 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 4323 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 4324 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 4325 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [cauthdsl] func1 -> DEBU 4326 0xc002b82ea0 gate 1569284792037321400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4327 0xc002b82ea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4328 0xc002b82ea0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4329 0xc002b82ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 432a 0xc002b82ea0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [cauthdsl] func1 -> DEBU 432b 0xc002b82ea0 gate 1569284792037321400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 432c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 432d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 432e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [cauthdsl] func1 -> DEBU 432f 0xc002b836e0 gate 1569284792037703600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4330 0xc002b836e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4331 0xc002b836e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4332 0xc002b836e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [msp.identity] Verify -> DEBU 4333 Verify: digest = 00000000 50 0a 7c 41 1c d8 60 ec c0 34 c4 02 bd 98 46 49 |P.|A..`..4....FI| +peer0.org1.example.com | 00000010 cd 24 29 91 96 d4 50 78 79 6e 2c ca 70 f3 71 88 |.$)...Pxyn,.p.q.|" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [msp.identity] Verify -> DEBU 4334 Verify: sig = 00000000 30 44 02 20 54 ee b4 04 30 3a 42 d3 15 50 d9 d1 |0D. T...0:B..P..| +peer0.org1.example.com | 00000010 a2 cd 76 da 3a f0 1c 89 3f 2e f8 6e 82 d0 c1 e0 |..v.:...?..n....| +peer0.org1.example.com | 00000020 68 e0 18 15 02 20 37 62 d4 9e d1 7c 3c e2 81 9d |h.... 7b...|<...| +peer0.org1.example.com | 00000030 5a 6b e1 ca 63 5b 88 ab d9 f4 8b 27 f3 43 fe eb |Zk..c[.....'.C..| +peer0.org1.example.com | 00000040 d4 e4 02 b3 88 71 |.....q|" +peer0.org1.example.com | "2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4335 0xc002b836e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [cauthdsl] func1 -> DEBU 4336 0xc002b836e0 gate 1569284792037703600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [policies] Evaluate -> DEBU 4337 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [policies] Evaluate -> DEBU 4338 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [policies] Evaluate -> DEBU 4339 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [policies] Evaluate -> DEBU 433a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 433b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 433c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 433d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 433e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 433f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 4340 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 4341 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4342 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.discovery] sendMemResponse -> DEBU 4343 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [msp] DeserializeIdentity -> DEBU 4344 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [msp] DeserializeIdentity -> DEBU 4345 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [msp] DeserializeIdentity -> DEBU 4346 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.comm] Send -> DEBU 4347 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.discovery] sendMemResponse -> DEBU 4348 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020?" signature:"0D\002 I\220\267\tH\256k\217\334\246}I)\353\3477\257\267\005\363G\251V\ngm\2579\351J\237\301\002 D\016\r\375@\310\241\325\241\305\307\362\025\220\375\272M\263\262KZ#T\330\374U5\245A#S2" > alive:" signature:"0E\002!\000\233\022\2330\244v\006\267n\007\022G\231\233\026\025\277\006\\~\371s\230\306\361l\231\230\370Gd\245\002 k\304\022\253\303f\020\270\224K-\026K>\251\327\375%\rC\241\306i,j\023W\347\227\241\245W" > alive: " +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.comm] sendToEndpoint -> DEBU 4349 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.038 UTC [gossip.comm] sendToEndpoint -> DEBU 434a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.115 UTC [msp] DeserializeIdentity -> DEBU 434b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.115 UTC [msp] DeserializeIdentity -> DEBU 434c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.115 UTC [gossip.comm] Send -> DEBU 434d Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:32.115 UTC [gossip.comm] sendToEndpoint -> DEBU 434e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.116 UTC [gossip.comm] sendToEndpoint -> DEBU 434f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.116 UTC [gossip.comm] sendToEndpoint -> DEBU 4350 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.116 UTC [gossip.comm] sendToEndpoint -> DEBU 4351 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.116 UTC [gossip.comm] sendToEndpoint -> DEBU 4352 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.116 UTC [gossip.comm] sendToEndpoint -> DEBU 4353 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [gossip.gossip] handleMessage -> DEBU 4354 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [msp] DeserializeIdentity -> DEBU 4355 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [msp] DeserializeIdentity -> DEBU 4356 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [msp] DeserializeIdentity -> DEBU 4357 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4358 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4359 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 435a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [policies] Evaluate -> DEBU 435b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [policies] Evaluate -> DEBU 435c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [policies] Evaluate -> DEBU 435d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [cauthdsl] func1 -> DEBU 435e 0xc003582880 gate 1569284792117833800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [cauthdsl] func2 -> DEBU 435f 0xc003582880 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [cauthdsl] func2 -> DEBU 4360 0xc003582880 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [cauthdsl] func2 -> DEBU 4361 0xc003582880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [cauthdsl] func2 -> DEBU 4362 0xc003582880 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.117 UTC [cauthdsl] func1 -> DEBU 4363 0xc003582880 gate 1569284792117833800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4364 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4366 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [gossip.comm] func1 -> DEBU 4367 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [cauthdsl] func1 -> DEBU 4368 0xc0035830c0 gate 1569284792118096400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [cauthdsl] func2 -> DEBU 4369 0xc0035830c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [gossip.comm] func1 -> DEBU 436a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [cauthdsl] func2 -> DEBU 436b 0xc0035830c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [cauthdsl] func2 -> DEBU 436c 0xc0035830c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 436d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 436e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [cauthdsl] func2 -> DEBU 436f 0xc0035830c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [cauthdsl] func1 -> DEBU 4370 0xc0035830c0 gate 1569284792118096400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4371 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4372 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4373 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4374 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 4375 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 4376 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 4377 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 4378 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [msp] DeserializeIdentity -> DEBU 4379 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [msp] DeserializeIdentity -> DEBU 437a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 437b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 437c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 437d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 437e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 437f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 4380 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [cauthdsl] func1 -> DEBU 4381 0xc0040056d0 gate 1569284792119441100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 4382 0xc0040056d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 4383 0xc0040056d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 4384 0xc0040056d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 4385 0xc0040056d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [cauthdsl] func1 -> DEBU 4386 0xc0040056d0 gate 1569284792119441100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 4387 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 4388 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 4389 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [cauthdsl] func1 -> DEBU 438a 0xc004005f10 gate 1569284792119780000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 438b 0xc004005f10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 438c 0xc004005f10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 438d 0xc004005f10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.120 UTC [msp.identity] Verify -> DEBU 438e Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:32.120 UTC [msp.identity] Verify -> DEBU 438f Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:32.120 UTC [cauthdsl] func2 -> DEBU 4390 0xc004005f10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.120 UTC [cauthdsl] func1 -> DEBU 4391 0xc004005f10 gate 1569284792119780000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:32.120 UTC [policies] Evaluate -> DEBU 4392 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.120 UTC [policies] Evaluate -> DEBU 4393 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.120 UTC [policies] Evaluate -> DEBU 4394 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.124 UTC [policies] Evaluate -> DEBU 4395 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.124 UTC [gossip.gossip] handleMessage -> DEBU 4396 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.124 UTC [gossip.gossip] handleMessage -> DEBU 4397 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.124 UTC [msp.identity] Verify -> DEBU 4398 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:32.124 UTC [msp.identity] Verify -> DEBU 4399 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [msp.identity] Verify -> DEBU 439a Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [msp.identity] Verify -> DEBU 439b Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [msp] DeserializeIdentity -> DEBU 439c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [msp] DeserializeIdentity -> DEBU 439d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 439e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 439f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43a0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [cauthdsl] func1 -> DEBU 43a4 0xc004b06760 gate 1569284792125677000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [cauthdsl] func2 -> DEBU 43a5 0xc004b06760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [cauthdsl] func2 -> DEBU 43a6 0xc004b06760 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [cauthdsl] func2 -> DEBU 43a7 0xc004b06760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [cauthdsl] func2 -> DEBU 43a8 0xc004b06760 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [cauthdsl] func1 -> DEBU 43a9 0xc004b06760 gate 1569284792125677000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43aa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [cauthdsl] func1 -> DEBU 43ad 0xc004b06fa0 gate 1569284792125936800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.125 UTC [cauthdsl] func2 -> DEBU 43ae 0xc004b06fa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43af 0xc004b06fa0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43b0 0xc004b06fa0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [msp.identity] Verify -> DEBU 43b1 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [msp.identity] Verify -> DEBU 43b2 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43b3 0xc004b06fa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [cauthdsl] func1 -> DEBU 43b4 0xc004b06fa0 gate 1569284792125936800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43b5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43b7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [msp] DeserializeIdentity -> DEBU 43b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [msp] DeserializeIdentity -> DEBU 43ba Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43bb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43bc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43bd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [cauthdsl] func1 -> DEBU 43c1 0xc002734770 gate 1569284792126715100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43c2 0xc002734770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43c3 0xc002734770 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43c4 0xc002734770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43c5 0xc002734770 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [cauthdsl] func1 -> DEBU 43c6 0xc002734770 gate 1569284792126715100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.126 UTC [cauthdsl] func1 -> DEBU 43ca 0xc002734fb0 gate 1569284792126963000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.127 UTC [cauthdsl] func2 -> DEBU 43cb 0xc002734fb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.127 UTC [cauthdsl] func2 -> DEBU 43cc 0xc002734fb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.127 UTC [cauthdsl] func2 -> DEBU 43cd 0xc002734fb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.127 UTC [msp.identity] Verify -> DEBU 43ce Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:32.135 UTC [msp.identity] Verify -> DEBU 43cf Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:32.135 UTC [cauthdsl] func2 -> DEBU 43d0 0xc002734fb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [cauthdsl] func1 -> DEBU 43d1 0xc002734fb0 gate 1569284792126963000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [policies] Evaluate -> DEBU 43d2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [policies] Evaluate -> DEBU 43d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [policies] Evaluate -> DEBU 43d4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [policies] Evaluate -> DEBU 43d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [gossip.gossip] handleMessage -> DEBU 43d6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [gossip.gossip] handleMessage -> DEBU 43d7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [msp] DeserializeIdentity -> DEBU 43d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [msp] DeserializeIdentity -> DEBU 43d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [msp] DeserializeIdentity -> DEBU 43da Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43db Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:32.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43dc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43dd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [policies] Evaluate -> DEBU 43de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [policies] Evaluate -> DEBU 43df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [policies] Evaluate -> DEBU 43e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [cauthdsl] func1 -> DEBU 43e1 0xc0027d6ac0 gate 1569284792137436500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [cauthdsl] func2 -> DEBU 43e2 0xc0027d6ac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [cauthdsl] func2 -> DEBU 43e3 0xc0027d6ac0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [cauthdsl] func2 -> DEBU 43e4 0xc0027d6ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [cauthdsl] func2 -> DEBU 43e5 0xc0027d6ac0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [cauthdsl] func1 -> DEBU 43e6 0xc0027d6ac0 gate 1569284792137436500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [policies] Evaluate -> DEBU 43e7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.137 UTC [policies] Evaluate -> DEBU 43e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.138 UTC [policies] Evaluate -> DEBU 43e9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.140 UTC [cauthdsl] func1 -> DEBU 43ea 0xc0027d7300 gate 1569284792138053300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.140 UTC [cauthdsl] func2 -> DEBU 43eb 0xc0027d7300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.141 UTC [cauthdsl] func2 -> DEBU 43ec 0xc0027d7300 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.141 UTC [cauthdsl] func2 -> DEBU 43ed 0xc0027d7300 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.141 UTC [msp.identity] Verify -> DEBU 43ee Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:32.141 UTC [msp.identity] Verify -> DEBU 43ef Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:32.142 UTC [cauthdsl] func2 -> DEBU 43f0 0xc0027d7300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.142 UTC [cauthdsl] func1 -> DEBU 43f1 0xc0027d7300 gate 1569284792138053300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:32.142 UTC [policies] Evaluate -> DEBU 43f2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.142 UTC [policies] Evaluate -> DEBU 43f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.143 UTC [policies] Evaluate -> DEBU 43f4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.144 UTC [policies] Evaluate -> DEBU 43f5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.159 UTC [msp.identity] Verify -> DEBU 43f6 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:32.159 UTC [msp.identity] Verify -> DEBU 43f7 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:32.159 UTC [msp] DeserializeIdentity -> DEBU 43f8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.159 UTC [msp] DeserializeIdentity -> DEBU 43f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.159 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:32.159 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43fb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.159 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43fc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.159 UTC [policies] Evaluate -> DEBU 43fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.159 UTC [policies] Evaluate -> DEBU 43fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:32.159 UTC [policies] Evaluate -> DEBU 43ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.159 UTC [cauthdsl] func1 -> DEBU 4400 0xc0036f91f0 gate 1569284792159923300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 4401 0xc0036f91f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 4402 0xc0036f91f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 4403 0xc0036f91f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 4404 0xc0036f91f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [cauthdsl] func1 -> DEBU 4405 0xc0036f91f0 gate 1569284792159923300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [policies] Evaluate -> DEBU 4406 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [policies] Evaluate -> DEBU 4407 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [policies] Evaluate -> DEBU 4408 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [cauthdsl] func1 -> DEBU 4409 0xc0036f9a30 gate 1569284792160648200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 440a 0xc0036f9a30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 440b 0xc0036f9a30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 440c 0xc0036f9a30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.160 UTC [msp.identity] Verify -> DEBU 440d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:32.161 UTC [msp.identity] Verify -> DEBU 440e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:32.161 UTC [cauthdsl] func2 -> DEBU 440f 0xc0036f9a30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.161 UTC [cauthdsl] func1 -> DEBU 4410 0xc0036f9a30 gate 1569284792160648200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:32.161 UTC [policies] Evaluate -> DEBU 4411 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.161 UTC [policies] Evaluate -> DEBU 4412 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.161 UTC [policies] Evaluate -> DEBU 4413 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.161 UTC [policies] Evaluate -> DEBU 4414 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.161 UTC [msp.identity] Verify -> DEBU 4415 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:32.161 UTC [msp.identity] Verify -> DEBU 4416 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:32.162 UTC [gossip.gossip] handleMessage -> DEBU 4417 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.299 UTC [msp] DeserializeIdentity -> DEBU 4418 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.300 UTC [msp] DeserializeIdentity -> DEBU 4419 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.300 UTC [gossip.pull] Hello -> DEBU 441a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:32.300 UTC [msp] DeserializeIdentity -> DEBU 441b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.300 UTC [msp] DeserializeIdentity -> DEBU 441c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.301 UTC [gossip.comm] Send -> DEBU 441d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:32.301 UTC [gossip.comm] sendToEndpoint -> DEBU 441e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.301 UTC [gossip.comm] sendToEndpoint -> DEBU 441f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.302 UTC [gossip.comm] func1 -> DEBU 4420 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.302 UTC [gossip.gossip] handleMessage -> DEBU 4421 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.302 UTC [gossip.pull] HandleMessage -> DEBU 4422 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.302 UTC [gossip.gossip] handleMessage -> DEBU 4423 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.331 UTC [gossip.election] waitForInterrupt -> DEBU 4424 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [gossip.election] IsLeader -> DEBU 4425 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [msp] GetDefaultSigningIdentity -> DEBU 4426 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [msp.identity] Sign -> DEBU 4427 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510141801 " +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [msp.identity] Sign -> DEBU 4428 Sign: digest: C9DD537E46A1ED5A8305ED844DF39D23060093E092015F422B77CCFDF99BA21A " +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [gossip.election] waitForInterrupt -> DEBU 4429 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 442a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 442b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 442c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 442d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [gossip.comm] Send -> DEBU 442e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 442f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 4430 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.333 UTC [gossip.comm] sendToEndpoint -> DEBU 4431 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.333 UTC [gossip.comm] sendToEndpoint -> DEBU 4432 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.619 UTC [gossip.comm] func1 -> DEBU 4433 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.619 UTC [gossip.gossip] handleMessage -> DEBU 4434 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.619 UTC [msp] DeserializeIdentity -> DEBU 4435 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.619 UTC [msp] DeserializeIdentity -> DEBU 4436 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.619 UTC [gossip.gossip] handleMessage -> DEBU 4437 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.728 UTC [gossip.comm] func1 -> DEBU 4438 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.728 UTC [gossip.gossip] handleMessage -> DEBU 4439 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [gossip.gossip] handleMessage -> DEBU 443a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 443b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 443c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [msp.identity] Verify -> DEBU 443d Verify: digest = 00000000 db 9c a9 b0 5f e2 bd cd cf 45 1b 1d 2d 48 f5 a7 |...._....E..-H..| +peer0.org1.example.com | 00000010 27 3e 66 84 7a b6 35 2e e8 06 90 8c b9 f9 b0 2e |'>f.z.5.........|" +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [msp.identity] Verify -> DEBU 443e Verify: sig = 00000000 30 45 02 21 00 be 0e 63 c4 8c 2b 76 06 92 50 41 |0E.!...c..+v..PA| +peer0.org1.example.com | 00000010 04 79 36 fa 0a 39 54 b4 ff 60 2f cb 1b 1b 15 b1 |.y6..9T..`/.....| +peer0.org1.example.com | 00000020 e4 bc 19 bb d8 02 20 45 c5 9b 9b 25 d5 c6 0c db |...... E...%....| +peer0.org1.example.com | 00000030 f6 75 e5 8d 42 78 dd 08 54 5b d7 5b 2e 38 01 62 |.u..Bx..T[.[.8.b| +peer0.org1.example.com | 00000040 1b 6f 14 2c 81 fe f5 |.o.,...|" +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 443f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4440 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4441 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4442 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4443 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4444 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 4445 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4446 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.731 UTC [gossip.comm] func1 -> DEBU 4447 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.731 UTC [gossip.gossip] handleMessage -> DEBU 4448 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.732 UTC [gossip.gossip] handleMessage -> DEBU 4449 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.732 UTC [gossip.discovery] handleMsgFromComm -> DEBU 444a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.732 UTC [gossip.discovery] handleMsgFromComm -> DEBU 444b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.737 UTC [msp] DeserializeIdentity -> DEBU 444c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.737 UTC [msp] DeserializeIdentity -> DEBU 444d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.738 UTC [msp] DeserializeIdentity -> DEBU 444e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.738 UTC [gossip.comm] Send -> DEBU 444f Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:32.738 UTC [msp] DeserializeIdentity -> DEBU 4450 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.738 UTC [gossip.comm] Send -> DEBU 4451 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 4452 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 4453 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 4454 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 4455 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.741 UTC [gossip.gossip] handleMessage -> DEBU 4456 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.741 UTC [gossip.gossip] handleMessage -> DEBU 4457 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.741 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4458 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.742 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4459 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.775 UTC [gossip.comm] func1 -> DEBU 445a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.775 UTC [gossip.gossip] handleMessage -> DEBU 445b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.776 UTC [gossip.gossip] handleMessage -> DEBU 445c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 445d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.776 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 445e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:32.776 UTC [msp] DeserializeIdentity -> DEBU 445f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.776 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4460 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:32.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4461 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4462 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 4463 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 4464 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 4465 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [cauthdsl] func1 -> DEBU 4466 0xc003d203b0 gate 1569284792777121600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [cauthdsl] func2 -> DEBU 4467 0xc003d203b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [cauthdsl] func2 -> DEBU 4468 0xc003d203b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [cauthdsl] func2 -> DEBU 4469 0xc003d203b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [cauthdsl] func2 -> DEBU 446a 0xc003d203b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [cauthdsl] func1 -> DEBU 446b 0xc003d203b0 gate 1569284792777121600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 446c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 446d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 446e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:32.777 UTC [cauthdsl] func1 -> DEBU 446f 0xc003d20bf0 gate 1569284792777470800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:32.780 UTC [cauthdsl] func2 -> DEBU 4470 0xc003d20bf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:32.780 UTC [cauthdsl] func2 -> DEBU 4471 0xc003d20bf0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:32.780 UTC [cauthdsl] func2 -> DEBU 4472 0xc003d20bf0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.780 UTC [msp.identity] Verify -> DEBU 4473 Verify: digest = 00000000 89 cf 5a d9 3e c5 5a e3 c5 e7 74 db a6 ad 2b 23 |..Z.>.Z...t...+#| +peer0.org1.example.com | 00000010 4f 01 7f eb 08 67 24 0c c8 63 53 20 55 be 25 c6 |O....g$..cS U.%.|" +peer0.org1.example.com | "2019-09-24 00:26:32.780 UTC [msp.identity] Verify -> DEBU 4474 Verify: sig = 00000000 30 45 02 21 00 8d f3 b6 ad ea 03 36 0a 45 42 fa |0E.!.......6.EB.| +peer0.org1.example.com | 00000010 18 90 eb ba d9 ad 7b ba 4e d3 06 c2 9a 07 c9 b8 |......{.N.......| +peer0.org1.example.com | 00000020 13 74 be ad 08 02 20 55 40 52 75 f6 87 64 87 cf |.t.... U@Ru..d..| +peer0.org1.example.com | 00000030 d8 98 e6 63 05 3b 32 6f f5 f6 e1 4d a9 85 00 1a |...c.;2o...M....| +peer0.org1.example.com | 00000040 5d d6 3c f0 5d 11 6f |].<.].o|" +peer0.org1.example.com | "2019-09-24 00:26:32.780 UTC [cauthdsl] func2 -> DEBU 4475 0xc003d20bf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:32.780 UTC [cauthdsl] func1 -> DEBU 4476 0xc003d20bf0 gate 1569284792777470800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:32.780 UTC [policies] Evaluate -> DEBU 4477 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.783 UTC [policies] Evaluate -> DEBU 4478 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.783 UTC [policies] Evaluate -> DEBU 4479 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.783 UTC [policies] Evaluate -> DEBU 447a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:32.783 UTC [gossip.discovery] handleAliveMessage -> DEBU 447b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.783 UTC [gossip.discovery] learnExistingMembers -> DEBU 447c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:32.783 UTC [gossip.discovery] learnExistingMembers -> DEBU 447d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:32.783 UTC [gossip.discovery] learnExistingMembers -> DEBU 447e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:32.783 UTC [gossip.discovery] learnExistingMembers -> DEBU 447f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:32.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 4480 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.784 UTC [gossip.discovery] handleAliveMessage -> DEBU 4481 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.784 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4482 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.784 UTC [gossip.discovery] sendMemResponse -> DEBU 4483 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:32.784 UTC [msp] DeserializeIdentity -> DEBU 4484 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.784 UTC [msp] DeserializeIdentity -> DEBU 4485 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.784 UTC [msp] DeserializeIdentity -> DEBU 4486 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.784 UTC [gossip.comm] Send -> DEBU 4487 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:32.784 UTC [gossip.comm] sendToEndpoint -> DEBU 4488 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.784 UTC [gossip.comm] sendToEndpoint -> DEBU 4489 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.785 UTC [gossip.discovery] sendMemResponse -> DEBU 448a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020@" signature:"0E\002!\000\276\016c\304\214+v\006\222PA\004y6\372\n9T\264\377`/\313\033\033\025\261\344\274\031\273\330\002 E\305\233\233%\325\306\014\333\366u\345\215Bx\335\010T[\327[.8\001b\033o\024,\201\376\365" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:32.824 UTC [gossip.comm] func1 -> DEBU 448b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.824 UTC [gossip.gossip] handleMessage -> DEBU 448c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.825 UTC [gossip.pull] HandleMessage -> DEBU 448d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 448e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 448f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 4490 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 4491 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 4492 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 4493 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:32.825 UTC [gossip.pull] SendDigest -> DEBU 4494 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:32.825 UTC [gossip.gossip] handleMessage -> DEBU 4495 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:32.871 UTC [gossip.comm] func1 -> DEBU 4496 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.871 UTC [gossip.gossip] handleMessage -> DEBU 4497 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.871 UTC [gossip.pull] HandleMessage -> DEBU 4498 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:32.871 UTC [gossip.pull] SendDigest -> DEBU 4499 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:32.872 UTC [gossip.gossip] handleMessage -> DEBU 449a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:33.112 UTC [gossip.gossip] handleMessage -> DEBU 449b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:33.112 UTC [msp] DeserializeIdentity -> DEBU 449c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:33.112 UTC [msp] DeserializeIdentity -> DEBU 449d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:33.112 UTC [msp] DeserializeIdentity -> DEBU 449e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:33.112 UTC [gossip.gossip] handleMessage -> DEBU 449f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:33.672 UTC [gossip.comm] func1 -> DEBU 44a0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:33.672 UTC [gossip.gossip] handleMessage -> DEBU 44a1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:33.673 UTC [gossip.pull] HandleMessage -> DEBU 44a2 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:33.674 UTC [gossip.pull] SendDigest -> DEBU 44a3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:33.674 UTC [gossip.gossip] handleMessage -> DEBU 44a4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:33.806 UTC [gossip.comm] func1 -> DEBU 44a5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" secret_envelope:\263*\340l\312\212'J\306%\333\036q\372\331x\303b\267D8\022\021\243S\013\355\344\331\341" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:33.806 UTC [gossip.gossip] handleMessage -> DEBU 44a6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" secret_envelope:\263*\340l\312\212'J\306%\333\036q\372\331x\303b\267D8\022\021\243S\013\355\344\331\341" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:33.806 UTC [gossip.gossip] handleMessage -> DEBU 44a7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44a8 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" secret_envelope:\263*\340l\312\212'J\306%\333\036q\372\331x\303b\267D8\022\021\243S\013\355\344\331\341" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44a9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [msp.identity] Verify -> DEBU 44aa Verify: digest = 00000000 01 f7 2c dd a9 9c 86 ed ce 50 fd 46 4a 2b 20 06 |..,......P.FJ+ .| +peer0.org1.example.com | 00000010 9b 0d 3d e6 c5 91 e1 dc 2e 5c d2 fc 45 62 be 70 |..=......\..Eb.p|" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [msp.identity] Verify -> DEBU 44ab Verify: sig = 00000000 30 44 02 20 48 27 b7 11 ce f9 a8 9e d6 f7 1f 9b |0D. H'..........| +peer0.org1.example.com | 00000010 9d 0f 49 fa ac 49 e7 5a eb 05 b8 ae 98 01 f5 3c |..I..I.Z.......<| +peer0.org1.example.com | 00000020 87 32 e4 22 02 20 13 ec de 91 ea 37 a0 51 c6 18 |.2.". .....7.Q..| +peer0.org1.example.com | 00000030 0d 64 7b 24 48 51 52 a2 0f 35 9a 8e 77 63 1e ea |.d{$HQR..5..wc..| +peer0.org1.example.com | 00000040 08 51 02 be e3 a2 |.Q....|" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [msp.identity] Verify -> DEBU 44ac Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [msp.identity] Verify -> DEBU 44ad Verify: sig = 00000000 30 45 02 21 00 8d b9 fa 31 9f cf ba 36 13 96 68 |0E.!....1...6..h| +peer0.org1.example.com | 00000010 cd 2a 07 f3 5b a6 ff f1 c2 e7 ff be b1 80 71 7a |.*..[.........qz| +peer0.org1.example.com | 00000020 39 05 b4 a7 45 02 20 2e 3e b3 2a e0 6c ca 8a 27 |9...E. .>.*.l..'| +peer0.org1.example.com | 00000030 4a c6 25 db 1e 71 fa d9 78 c3 62 b7 44 38 12 11 |J.%..q..x.b.D8..| +peer0.org1.example.com | 00000040 a3 53 0b ed e4 d9 e1 |.S.....|" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [gossip.discovery] handleAliveMessage -> DEBU 44ae Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 44af Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 44b0 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 44b1 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 44b2 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 44b3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [gossip.discovery] handleAliveMessage -> DEBU 44b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44b5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [gossip.discovery] sendMemResponse -> DEBU 44b6 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [msp] DeserializeIdentity -> DEBU 44b7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:33.807 UTC [msp] DeserializeIdentity -> DEBU 44b8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:33.808 UTC [gossip.comm] Send -> DEBU 44b9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:33.808 UTC [gossip.discovery] sendMemResponse -> DEBU 44ba Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" secret_envelope:\263*\340l\312\212'J\306%\333\036q\372\331x\303b\267D8\022\021\243S\013\355\344\331\341" > > alive: " +peer0.org1.example.com | "2019-09-24 00:26:33.808 UTC [gossip.comm] sendToEndpoint -> DEBU 44bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:33.808 UTC [gossip.comm] sendToEndpoint -> DEBU 44bc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.043 UTC [gossip.comm] func1 -> DEBU 44bd Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.043 UTC [gossip.gossip] handleMessage -> DEBU 44be Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.043 UTC [msp] DeserializeIdentity -> DEBU 44bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.043 UTC [msp] DeserializeIdentity -> DEBU 44c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.043 UTC [msp] DeserializeIdentity -> DEBU 44c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.043 UTC [gossip.gossip] handleMessage -> DEBU 44c2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.607 UTC [msp] GetDefaultSigningIdentity -> DEBU 44c3 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:34.607 UTC [msp.identity] Sign -> DEBU 44c4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103D " +peer0.org1.example.com | "2019-09-24 00:26:34.607 UTC [msp.identity] Sign -> DEBU 44c5 Sign: digest: AD5D3DC0694D61255450EC920961F49D57BB2BA0A0F39D59894F580EC3A46E01 " +peer0.org1.example.com | "2019-09-24 00:26:34.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 44c6 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:34.608 UTC [msp.identity] Sign -> DEBU 44c7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:34.608 UTC [msp.identity] Sign -> DEBU 44c8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:34.608 UTC [gossip.discovery] periodicalSendAlive -> DEBU 44c9 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:34.611 UTC [msp] DeserializeIdentity -> DEBU 44ca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [msp] DeserializeIdentity -> DEBU 44cb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [msp] DeserializeIdentity -> DEBU 44cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [gossip.comm] Send -> DEBU 44cd Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [gossip.comm] Send -> DEBU 44ce Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [msp] DeserializeIdentity -> DEBU 44cf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [gossip.comm] Send -> DEBU 44d0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.974 UTC [gossip.gossip] handleMessage -> DEBU 44d7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.974 UTC [gossip.gossip] handleMessage -> DEBU 44d8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44d9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44da Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:34.975 UTC [msp] DeserializeIdentity -> DEBU 44db Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.975 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:34.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44dd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:34.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44df Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:34.976 UTC [policies] Evaluate -> DEBU 44e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:34.976 UTC [gossip.comm] func1 -> DEBU 44de Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [gossip.gossip] handleMessage -> DEBU 44e2 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func1 -> DEBU 44e4 0xc003f5d0f0 gate 1569284794978344600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44e5 0xc003f5d0f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44e6 0xc003f5d0f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44e7 0xc003f5d0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44e8 0xc003f5d0f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func1 -> DEBU 44e9 0xc003f5d0f0 gate 1569284794978344600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [gossip.comm] func1 -> DEBU 44ea Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44eb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func1 -> DEBU 44ee 0xc003f5d930 gate 1569284794978596900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44ef 0xc003f5d930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44f0 0xc003f5d930 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44f1 0xc003f5d930 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [msp.identity] Verify -> DEBU 44f2 Verify: digest = 00000000 fc 55 0c 35 70 4d 80 a5 9e de 55 6f f2 49 19 8f |.U.5pM....Uo.I..| +peer0.org1.example.com | 00000010 32 83 5f 3e c0 01 b3 45 40 a8 c0 27 2a 6e 2d bf |2._>...E@..'*n-.|" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [msp.identity] Verify -> DEBU 44f3 Verify: sig = 00000000 30 44 02 20 27 b5 fe 1e 72 7b f6 ff 7d 80 2d 86 |0D. '...r{..}.-.| +peer0.org1.example.com | 00000010 ae 03 ea 79 bb 0a ad bd 83 14 b1 54 fd 30 2c 69 |...y.......T.0,i| +peer0.org1.example.com | 00000020 ab 0b 6c f8 02 20 00 ca c1 70 28 1f 17 e9 2b ee |..l.. ...p(...+.| +peer0.org1.example.com | 00000030 7e f9 92 30 63 c2 d2 04 83 68 01 71 c0 21 6b 81 |~..0c....h.q.!k.| +peer0.org1.example.com | 00000040 48 d4 2b 33 46 2a |H.+3F*|" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44f4 0xc003f5d930 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [cauthdsl] func1 -> DEBU 44f5 0xc003f5d930 gate 1569284794978596900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44f6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44f8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [policies] Evaluate -> DEBU 44f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 44fa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 44fb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 44fc updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 44fd Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 44fe Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 44ff Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 4500 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4501 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4502 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4503 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.gossip] handleMessage -> DEBU 4504 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.gossip] handleMessage -> DEBU 4505 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.gossip] handleMessage -> DEBU 4506 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4507 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4508 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.986 UTC [msp] DeserializeIdentity -> DEBU 4509 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.988 UTC [msp] DeserializeIdentity -> DEBU 450a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.988 UTC [msp] DeserializeIdentity -> DEBU 450b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.988 UTC [msp] DeserializeIdentity -> DEBU 450c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.988 UTC [msp] DeserializeIdentity -> DEBU 450d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.989 UTC [msp] DeserializeIdentity -> DEBU 450e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.989 UTC [msp] DeserializeIdentity -> DEBU 450f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.989 UTC [gossip.comm] Send -> DEBU 4510 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:34.990 UTC [msp] DeserializeIdentity -> DEBU 4511 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:34.990 UTC [gossip.comm] sendToEndpoint -> DEBU 4512 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.990 UTC [gossip.comm] sendToEndpoint -> DEBU 4513 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:34.990 UTC [gossip.comm] Send -> DEBU 4514 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:34.990 UTC [gossip.comm] sendToEndpoint -> DEBU 4515 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:34.990 UTC [gossip.comm] sendToEndpoint -> DEBU 4516 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.690 UTC [gossip.gossip] handleMessage -> DEBU 4517 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.690 UTC [gossip.gossip] handleMessage -> DEBU 4518 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.690 UTC [gossip.comm] func1 -> DEBU 4519 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.690 UTC [gossip.gossip] handleMessage -> DEBU 451a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 451b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.690 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 451c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:35.690 UTC [msp] DeserializeIdentity -> DEBU 451d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.691 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 451e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:35.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 451f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:35.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4520 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:35.691 UTC [policies] Evaluate -> DEBU 4521 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:35.691 UTC [policies] Evaluate -> DEBU 4522 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:35.691 UTC [policies] Evaluate -> DEBU 4523 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:35.691 UTC [cauthdsl] func1 -> DEBU 4524 0xc004a5d750 gate 1569284795691960900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 4525 0xc004a5d750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 4526 0xc004a5d750 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 4527 0xc004a5d750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 4528 0xc004a5d750 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [cauthdsl] func1 -> DEBU 4529 0xc004a5d750 gate 1569284795691960900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [policies] Evaluate -> DEBU 452a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [policies] Evaluate -> DEBU 452b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [policies] Evaluate -> DEBU 452c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [cauthdsl] func1 -> DEBU 452d 0xc004a5df90 gate 1569284795692697900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 452e 0xc004a5df90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 452f 0xc004a5df90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 4530 0xc004a5df90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [msp.identity] Verify -> DEBU 4531 Verify: digest = 00000000 5e b5 da 40 64 69 c9 08 85 ff d3 21 22 b2 d8 fb |^..@di.....!"...| +peer0.org1.example.com | 00000010 6a a6 bd 15 13 b9 5d f6 db b3 1c dd 84 22 ab 3a |j.....]......".:|" +peer0.org1.example.com | "2019-09-24 00:26:35.692 UTC [msp.identity] Verify -> DEBU 4532 Verify: sig = 00000000 30 44 02 20 36 cd f8 df 9e ad fc 12 24 ec c4 2e |0D. 6.......$...| +peer0.org1.example.com | 00000010 34 91 79 c1 a6 de ed ce c3 d8 0a 40 b6 2c bf 51 |4.y........@.,.Q| +peer0.org1.example.com | 00000020 6e f8 73 77 02 20 52 af 05 38 15 50 85 5c 30 b3 |n.sw. R..8.P.\0.| +peer0.org1.example.com | 00000030 0e 44 bc da ad 50 eb 37 3b 8c 4d 95 d8 e4 1f 2b |.D...P.7;.M....+| +peer0.org1.example.com | 00000040 75 f3 74 d5 e9 10 |u.t...|" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [cauthdsl] func2 -> DEBU 4533 0xc004a5df90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [cauthdsl] func1 -> DEBU 4534 0xc004a5df90 gate 1569284795692697900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [policies] Evaluate -> DEBU 4535 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [policies] Evaluate -> DEBU 4536 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [policies] Evaluate -> DEBU 4537 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [policies] Evaluate -> DEBU 4538 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [gossip.discovery] handleAliveMessage -> DEBU 4539 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 453a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 453b updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 453c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 453d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 453e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [gossip.discovery] handleAliveMessage -> DEBU 453f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4540 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4541 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4542 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.694 UTC [gossip.gossip] handleMessage -> DEBU 4543 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.704 UTC [msp] DeserializeIdentity -> DEBU 4544 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.705 UTC [msp] DeserializeIdentity -> DEBU 4545 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.705 UTC [msp] DeserializeIdentity -> DEBU 4546 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.706 UTC [msp] DeserializeIdentity -> DEBU 4547 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.706 UTC [msp] DeserializeIdentity -> DEBU 4548 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.706 UTC [msp] DeserializeIdentity -> DEBU 4549 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.707 UTC [msp] DeserializeIdentity -> DEBU 454a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.709 UTC [gossip.comm] Send -> DEBU 454b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:35.710 UTC [msp] DeserializeIdentity -> DEBU 454c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.712 UTC [gossip.comm] Send -> DEBU 454d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:35.712 UTC [gossip.comm] sendToEndpoint -> DEBU 454e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.712 UTC [gossip.comm] sendToEndpoint -> DEBU 454f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.713 UTC [gossip.comm] sendToEndpoint -> DEBU 4550 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.713 UTC [gossip.comm] sendToEndpoint -> DEBU 4551 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.713 UTC [gossip.comm] func1 -> DEBU 4552 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.713 UTC [gossip.gossip] handleMessage -> DEBU 4553 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.715 UTC [gossip.gossip] handleMessage -> DEBU 4554 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4555 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4556 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.725 UTC [gossip.pull] Hello -> DEBU 4557 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:35.727 UTC [gossip.comm] Send -> DEBU 4558 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:35.727 UTC [gossip.pull] Hello -> DEBU 4559 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:35.727 UTC [gossip.comm] Send -> DEBU 455a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:35.727 UTC [gossip.pull] Hello -> DEBU 455b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:35.727 UTC [gossip.comm] Send -> DEBU 455c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:35.727 UTC [gossip.comm] sendToEndpoint -> DEBU 455d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.727 UTC [gossip.comm] sendToEndpoint -> DEBU 455e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.728 UTC [gossip.comm] sendToEndpoint -> DEBU 455f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.728 UTC [gossip.comm] sendToEndpoint -> DEBU 4560 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.728 UTC [gossip.comm] sendToEndpoint -> DEBU 4561 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.728 UTC [gossip.comm] sendToEndpoint -> DEBU 4562 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.734 UTC [gossip.gossip] handleMessage -> DEBU 4563 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.734 UTC [gossip.pull] HandleMessage -> DEBU 4564 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.734 UTC [gossip.gossip] handleMessage -> DEBU 4565 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.734 UTC [gossip.comm] func1 -> DEBU 4566 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.734 UTC [gossip.gossip] handleMessage -> DEBU 4567 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.734 UTC [gossip.pull] HandleMessage -> DEBU 4568 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.735 UTC [gossip.gossip] handleMessage -> DEBU 4569 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.736 UTC [gossip.comm] func1 -> DEBU 456a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.736 UTC [gossip.gossip] handleMessage -> DEBU 456b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.736 UTC [gossip.pull] HandleMessage -> DEBU 456c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.736 UTC [gossip.gossip] handleMessage -> DEBU 456d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.868 UTC [msp] GetDefaultSigningIdentity -> DEBU 456e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:35.869 UTC [msp.identity] Sign -> DEBU 456f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103E " +peer0.org1.example.com | "2019-09-24 00:26:35.869 UTC [msp.identity] Sign -> DEBU 4570 Sign: digest: 63E93A48508A6FEC0025660C7A04DB8A5FF0E2BBDAC74A6BA4DB1AC8A625B5F3 " +peer0.org1.example.com | "2019-09-24 00:26:35.869 UTC [msp] GetDefaultSigningIdentity -> DEBU 4571 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:35.869 UTC [msp.identity] Sign -> DEBU 4572 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [msp.identity] Sign -> DEBU 4573 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [gossip.comm] Send -> DEBU 4574 Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [msp] DeserializeIdentity -> DEBU 4575 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [gossip.comm] Send -> DEBU 4576 Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [msp] DeserializeIdentity -> DEBU 4577 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [gossip.comm] Send -> DEBU 4578 Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 4579 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 457a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 457b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 457c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 457d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 457e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.873 UTC [gossip.comm] func1 -> DEBU 457f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.873 UTC [gossip.gossip] handleMessage -> DEBU 4580 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.873 UTC [gossip.gossip] handleMessage -> DEBU 4581 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.873 UTC [gossip.comm] func1 -> DEBU 4582 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.873 UTC [gossip.gossip] handleMessage -> DEBU 4583 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.873 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4584 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.873 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4585 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:35.873 UTC [msp.identity] Verify -> DEBU 4586 Verify: digest = 00000000 63 e9 3a 48 50 8a 6f ec 00 25 66 0c 7a 04 db 8a |c.:HP.o..%f.z...| +peer0.org1.example.com | 00000010 5f f0 e2 bb da c7 4a 6b a4 db 1a c8 a6 25 b5 f3 |_.....Jk.....%..|" +peer0.org1.example.com | "2019-09-24 00:26:35.873 UTC [msp.identity] Verify -> DEBU 4587 Verify: sig = 00000000 30 44 02 20 0c 12 86 4e 93 e2 82 cd 1a 2f a6 33 |0D. ...N...../.3| +peer0.org1.example.com | 00000010 4b 27 c0 19 00 1a 1f e1 9a 54 ef da ad 82 36 00 |K'.......T....6.| +peer0.org1.example.com | 00000020 86 32 98 89 02 20 71 91 e9 17 4c 25 4a 4b 17 63 |.2... q...L%JK.c| +peer0.org1.example.com | 00000030 f9 32 84 b1 84 2d 82 43 a1 49 05 bb 7e bb 04 85 |.2...-.C.I..~...| +peer0.org1.example.com | 00000040 a9 ef 90 7f 8c c1 |......|" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 4588 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.discovery] isSentByMe -> DEBU 4589 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 458a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 458b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [msp.identity] Verify -> DEBU 458c Verify: digest = 00000000 01 f7 2c dd a9 9c 86 ed ce 50 fd 46 4a 2b 20 06 |..,......P.FJ+ .| +peer0.org1.example.com | 00000010 9b 0d 3d e6 c5 91 e1 dc 2e 5c d2 fc 45 62 be 70 |..=......\..Eb.p|" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [msp.identity] Verify -> DEBU 458d Verify: sig = 00000000 30 44 02 20 48 27 b7 11 ce f9 a8 9e d6 f7 1f 9b |0D. H'..........| +peer0.org1.example.com | 00000010 9d 0f 49 fa ac 49 e7 5a eb 05 b8 ae 98 01 f5 3c |..I..I.Z.......<| +peer0.org1.example.com | 00000020 87 32 e4 22 02 20 13 ec de 91 ea 37 a0 51 c6 18 |.2.". .....7.Q..| +peer0.org1.example.com | 00000030 0d 64 7b 24 48 51 52 a2 0f 35 9a 8e 77 63 1e ea |.d{$HQR..5..wc..| +peer0.org1.example.com | 00000040 08 51 02 be e3 a2 |.Q....|" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 458e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 458f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4590 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4591 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4592 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.gossip] handleMessage -> DEBU 4593 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.gossip] handleMessage -> DEBU 4595 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [msp.identity] Verify -> DEBU 4594 Verify: digest = 00000000 63 e9 3a 48 50 8a 6f ec 00 25 66 0c 7a 04 db 8a |c.:HP.o..%f.z...| +peer0.org1.example.com | 00000010 5f f0 e2 bb da c7 4a 6b a4 db 1a c8 a6 25 b5 f3 |_.....Jk.....%..|" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [msp.identity] Verify -> DEBU 4596 Verify: sig = 00000000 30 44 02 20 0c 12 86 4e 93 e2 82 cd 1a 2f a6 33 |0D. ...N...../.3| +peer0.org1.example.com | 00000010 4b 27 c0 19 00 1a 1f e1 9a 54 ef da ad 82 36 00 |K'.......T....6.| +peer0.org1.example.com | 00000020 86 32 98 89 02 20 71 91 e9 17 4c 25 4a 4b 17 63 |.2... q...L%JK.c| +peer0.org1.example.com | 00000030 f9 32 84 b1 84 2d 82 43 a1 49 05 bb 7e bb 04 85 |.2...-.C.I..~...| +peer0.org1.example.com | 00000040 a9 ef 90 7f 8c c1 |......|" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 4597 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.discovery] isSentByMe -> DEBU 4598 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 4599 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 459a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 459b Verify: digest = 00000000 01 f7 2c dd a9 9c 86 ed ce 50 fd 46 4a 2b 20 06 |..,......P.FJ+ .| +peer0.org1.example.com | 00000010 9b 0d 3d e6 c5 91 e1 dc 2e 5c d2 fc 45 62 be 70 |..=......\..Eb.p|" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 459c Verify: sig = 00000000 30 44 02 20 48 27 b7 11 ce f9 a8 9e d6 f7 1f 9b |0D. H'..........| +peer0.org1.example.com | 00000010 9d 0f 49 fa ac 49 e7 5a eb 05 b8 ae 98 01 f5 3c |..I..I.Z.......<| +peer0.org1.example.com | 00000020 87 32 e4 22 02 20 13 ec de 91 ea 37 a0 51 c6 18 |.2.". .....7.Q..| +peer0.org1.example.com | 00000030 0d 64 7b 24 48 51 52 a2 0f 35 9a 8e 77 63 1e ea |.d{$HQR..5..wc..| +peer0.org1.example.com | 00000040 08 51 02 be e3 a2 |.Q....|" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 459d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 459e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [gossip.discovery] handleMsgFromComm -> DEBU 459f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45a0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45a1 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 45a2 Verify: digest = 00000000 63 e9 3a 48 50 8a 6f ec 00 25 66 0c 7a 04 db 8a |c.:HP.o..%f.z...| +peer0.org1.example.com | 00000010 5f f0 e2 bb da c7 4a 6b a4 db 1a c8 a6 25 b5 f3 |_.....Jk.....%..|" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [gossip.gossip] handleMessage -> DEBU 45a3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 45a4 Verify: sig = 00000000 30 44 02 20 0c 12 86 4e 93 e2 82 cd 1a 2f a6 33 |0D. ...N...../.3| +peer0.org1.example.com | 00000010 4b 27 c0 19 00 1a 1f e1 9a 54 ef da ad 82 36 00 |K'.......T....6.| +peer0.org1.example.com | 00000020 86 32 98 89 02 20 71 91 e9 17 4c 25 4a 4b 17 63 |.2... q...L%JK.c| +peer0.org1.example.com | 00000030 f9 32 84 b1 84 2d 82 43 a1 49 05 bb 7e bb 04 85 |.2...-.C.I..~...| +peer0.org1.example.com | 00000040 a9 ef 90 7f 8c c1 |......|" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 45a5 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 45a6 Verify: sig = 00000000 30 45 02 21 00 8e 99 3f 2a af 6c 85 40 0e fe 10 |0E.!...?*.l.@...| +peer0.org1.example.com | 00000010 08 9d 96 e4 74 7c e9 36 bb 07 24 47 a5 b8 90 bb |....t|.6..$G....| +peer0.org1.example.com | 00000020 50 fb 5c 01 ee 02 20 51 a8 cd 35 19 55 f8 51 57 |P.\... Q..5.U.QW| +peer0.org1.example.com | 00000030 f1 aa 35 31 e4 08 f5 ec 8f d4 a3 12 ad f2 74 be |..51..........t.| +peer0.org1.example.com | 00000040 96 92 6f a4 0c 42 52 |..o..BR|" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 45a7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [gossip.discovery] isSentByMe -> DEBU 45a8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 45a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.875 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45aa Exiting" +peer0.org1.example.com | "2019-09-24 00:26:35.961 UTC [gossip.gossip] handleMessage -> DEBU 45ab Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.961 UTC [gossip.pull] HandleMessage -> DEBU 45ac GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:35.961 UTC [msp] DeserializeIdentity -> DEBU 45ad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.961 UTC [msp] DeserializeIdentity -> DEBU 45ae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.962 UTC [msp] DeserializeIdentity -> DEBU 45af Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.962 UTC [msp] DeserializeIdentity -> DEBU 45b0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.962 UTC [msp] DeserializeIdentity -> DEBU 45b1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.962 UTC [msp] DeserializeIdentity -> DEBU 45b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:35.962 UTC [gossip.pull] SendDigest -> DEBU 45b3 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:35.962 UTC [gossip.gossip] handleMessage -> DEBU 45b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.040 UTC [gossip.gossip] handleMessage -> DEBU 45b5 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.040 UTC [gossip.gossip] handleMessage -> DEBU 45b6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.040 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45b8 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:36.040 UTC [msp] DeserializeIdentity -> DEBU 45b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 45ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45bb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45bc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [policies] Evaluate -> DEBU 45bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [policies] Evaluate -> DEBU 45be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [policies] Evaluate -> DEBU 45bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [cauthdsl] func1 -> DEBU 45c0 0xc00385e610 gate 1569284796041705400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [cauthdsl] func2 -> DEBU 45c1 0xc00385e610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [cauthdsl] func2 -> DEBU 45c2 0xc00385e610 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [cauthdsl] func2 -> DEBU 45c3 0xc00385e610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [cauthdsl] func2 -> DEBU 45c4 0xc00385e610 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [cauthdsl] func1 -> DEBU 45c5 0xc00385e610 gate 1569284796041705400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [policies] Evaluate -> DEBU 45c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.041 UTC [policies] Evaluate -> DEBU 45c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [policies] Evaluate -> DEBU 45c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [cauthdsl] func1 -> DEBU 45c9 0xc00385ee50 gate 1569284796042042500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [cauthdsl] func2 -> DEBU 45ca 0xc00385ee50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [cauthdsl] func2 -> DEBU 45cb 0xc00385ee50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [cauthdsl] func2 -> DEBU 45cc 0xc00385ee50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [msp.identity] Verify -> DEBU 45cd Verify: digest = 00000000 4b ab 75 6b 60 22 fc 7a 4e 10 05 92 d2 7a 90 6c |K.uk`".zN....z.l| +peer0.org1.example.com | 00000010 5c 84 ad 99 96 87 cc 58 dc c9 2f 78 85 22 32 9a |\......X../x."2.|" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [msp.identity] Verify -> DEBU 45ce Verify: sig = 00000000 30 44 02 20 5b c5 9d 89 69 30 6b d7 68 fa a2 2d |0D. [...i0k.h..-| +peer0.org1.example.com | 00000010 fc 9d 56 d6 f3 d7 5c d3 93 c8 20 a9 4a 35 7a cc |..V...\... .J5z.| +peer0.org1.example.com | 00000020 46 26 54 59 02 20 0c 86 89 7e 9b 9b 22 97 26 97 |F&TY. ...~..".&.| +peer0.org1.example.com | 00000030 7f ef 2a bd e1 94 9e 72 c1 83 68 35 05 77 09 9e |..*....r..h5.w..| +peer0.org1.example.com | 00000040 b0 0e 04 20 b1 f5 |... ..|" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [cauthdsl] func2 -> DEBU 45cf 0xc00385ee50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [cauthdsl] func1 -> DEBU 45d0 0xc00385ee50 gate 1569284796042042500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [policies] Evaluate -> DEBU 45d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [policies] Evaluate -> DEBU 45d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [policies] Evaluate -> DEBU 45d3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [policies] Evaluate -> DEBU 45d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [gossip.discovery] handleAliveMessage -> DEBU 45d5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [gossip.discovery] learnExistingMembers -> DEBU 45d6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:36.042 UTC [gossip.discovery] learnExistingMembers -> DEBU 45d7 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:36.043 UTC [gossip.discovery] learnExistingMembers -> DEBU 45d8 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:36.043 UTC [gossip.discovery] learnExistingMembers -> DEBU 45d9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:36.043 UTC [gossip.discovery] learnExistingMembers -> DEBU 45da Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.043 UTC [gossip.discovery] handleAliveMessage -> DEBU 45db Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.043 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45dc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.043 UTC [gossip.discovery] sendMemResponse -> DEBU 45dd Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:36.044 UTC [msp] DeserializeIdentity -> DEBU 45de Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.044 UTC [msp] DeserializeIdentity -> DEBU 45df Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.044 UTC [msp] DeserializeIdentity -> DEBU 45e0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.044 UTC [gossip.comm] Send -> DEBU 45e1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:36.044 UTC [gossip.discovery] sendMemResponse -> DEBU 45e2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:36.044 UTC [gossip.comm] sendToEndpoint -> DEBU 45e3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.044 UTC [gossip.comm] sendToEndpoint -> DEBU 45e4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.115 UTC [msp] DeserializeIdentity -> DEBU 45e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.115 UTC [msp] DeserializeIdentity -> DEBU 45e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.115 UTC [gossip.comm] Send -> DEBU 45e7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:36.115 UTC [gossip.comm] sendToEndpoint -> DEBU 45e8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.115 UTC [gossip.comm] sendToEndpoint -> DEBU 45e9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.116 UTC [gossip.comm] sendToEndpoint -> DEBU 45ea Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.116 UTC [gossip.comm] sendToEndpoint -> DEBU 45eb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.116 UTC [gossip.comm] sendToEndpoint -> DEBU 45ec Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.116 UTC [gossip.comm] sendToEndpoint -> DEBU 45ed Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.125 UTC [gossip.comm] func1 -> DEBU 45ee Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.125 UTC [gossip.gossip] handleMessage -> DEBU 45ef Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.125 UTC [msp] DeserializeIdentity -> DEBU 45f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.125 UTC [msp] DeserializeIdentity -> DEBU 45f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.125 UTC [msp] DeserializeIdentity -> DEBU 45f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.125 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 45f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45f4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45f5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 45f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 45f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 45f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func1 -> DEBU 45f9 0xc003066390 gate 1569284796126185000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 45fa 0xc003066390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 45fb 0xc003066390 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 45fc 0xc003066390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 45fd 0xc003066390 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func1 -> DEBU 45fe 0xc003066390 gate 1569284796126185000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 45ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 4600 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 4601 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func1 -> DEBU 4602 0xc003066bd0 gate 1569284796126483400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 4603 0xc003066bd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 4604 0xc003066bd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 4605 0xc003066bd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [msp.identity] Verify -> DEBU 4606 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [msp.identity] Verify -> DEBU 4607 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 4608 0xc003066bd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [cauthdsl] func1 -> DEBU 4609 0xc003066bd0 gate 1569284796126483400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 460a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 460b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [policies] Evaluate -> DEBU 460c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [policies] Evaluate -> DEBU 460d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [msp.identity] Verify -> DEBU 460e Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [msp.identity] Verify -> DEBU 460f Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [msp] DeserializeIdentity -> DEBU 4610 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [msp] DeserializeIdentity -> DEBU 4611 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4612 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4613 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4614 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [policies] Evaluate -> DEBU 4615 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [policies] Evaluate -> DEBU 4616 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [policies] Evaluate -> DEBU 4617 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.127 UTC [cauthdsl] func1 -> DEBU 4618 0xc003078ac0 gate 1569284796127957900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 4619 0xc003078ac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 461a 0xc003078ac0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 461b 0xc003078ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 461c 0xc003078ac0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [cauthdsl] func1 -> DEBU 461d 0xc003078ac0 gate 1569284796127957900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 461e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 461f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 4620 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [cauthdsl] func1 -> DEBU 4621 0xc003079300 gate 1569284796128312800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 4622 0xc003079300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 4623 0xc003079300 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 4624 0xc003079300 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [msp.identity] Verify -> DEBU 4625 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [msp.identity] Verify -> DEBU 4626 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 4627 0xc003079300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [cauthdsl] func1 -> DEBU 4628 0xc003079300 gate 1569284796128312800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 4629 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 462a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 462b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 462c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.128 UTC [msp.identity] Verify -> DEBU 462d Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [msp.identity] Verify -> DEBU 462e Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [gossip.gossip] handleMessage -> DEBU 462f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [gossip.gossip] handleMessage -> DEBU 4630 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [msp] DeserializeIdentity -> DEBU 4631 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [msp] DeserializeIdentity -> DEBU 4632 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [msp] DeserializeIdentity -> DEBU 4633 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4634 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4635 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4636 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [policies] Evaluate -> DEBU 4637 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [policies] Evaluate -> DEBU 4638 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:36.129 UTC [policies] Evaluate -> DEBU 4639 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func1 -> DEBU 463a 0xc003255560 gate 1569284796130000900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 463b 0xc003255560 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 463c 0xc003255560 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 463d 0xc003255560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 463e 0xc003255560 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func1 -> DEBU 463f 0xc003255560 gate 1569284796130000900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 4640 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 4641 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 4642 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func1 -> DEBU 4643 0xc003255da0 gate 1569284796130322600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 4644 0xc003255da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 4645 0xc003255da0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 4646 0xc003255da0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [msp.identity] Verify -> DEBU 4647 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [msp.identity] Verify -> DEBU 4648 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 4649 0xc003255da0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [cauthdsl] func1 -> DEBU 464a 0xc003255da0 gate 1569284796130322600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 464b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 464c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 464d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 464e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.130 UTC [msp.identity] Verify -> DEBU 464f Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [msp.identity] Verify -> DEBU 4650 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [msp.identity] Verify -> DEBU 4651 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [msp.identity] Verify -> DEBU 4652 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [msp] DeserializeIdentity -> DEBU 4653 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [msp] DeserializeIdentity -> DEBU 4654 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4655 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4656 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4657 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [policies] Evaluate -> DEBU 4658 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [policies] Evaluate -> DEBU 4659 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [policies] Evaluate -> DEBU 465a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [cauthdsl] func1 -> DEBU 465b 0xc0028d43b0 gate 1569284796131915900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [cauthdsl] func2 -> DEBU 465c 0xc0028d43b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.131 UTC [cauthdsl] func2 -> DEBU 465d 0xc0028d43b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.132 UTC [cauthdsl] func2 -> DEBU 465e 0xc0028d43b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:36.132 UTC [cauthdsl] func2 -> DEBU 465f 0xc0028d43b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.132 UTC [cauthdsl] func1 -> DEBU 4660 0xc0028d43b0 gate 1569284796131915900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.156 UTC [policies] Evaluate -> DEBU 4661 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.156 UTC [gossip.comm] func1 -> DEBU 4662 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.156 UTC [policies] Evaluate -> DEBU 4663 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.156 UTC [policies] Evaluate -> DEBU 4664 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.156 UTC [cauthdsl] func1 -> DEBU 4665 0xc003846db0 gate 1569284796156924300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [cauthdsl] func2 -> DEBU 4666 0xc003846db0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [cauthdsl] func2 -> DEBU 4667 0xc003846db0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [cauthdsl] func2 -> DEBU 4668 0xc003846db0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [msp.identity] Verify -> DEBU 4669 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [msp.identity] Verify -> DEBU 466a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [cauthdsl] func2 -> DEBU 466b 0xc003846db0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [cauthdsl] func1 -> DEBU 466c 0xc003846db0 gate 1569284796156924300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [policies] Evaluate -> DEBU 466d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [policies] Evaluate -> DEBU 466e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [policies] Evaluate -> DEBU 466f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [policies] Evaluate -> DEBU 4670 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [gossip.gossip] handleMessage -> DEBU 4671 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [gossip.gossip] handleMessage -> DEBU 4672 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [msp.identity] Verify -> DEBU 4673 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:36.157 UTC [msp.identity] Verify -> DEBU 4674 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [msp.identity] Verify -> DEBU 4675 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [msp.identity] Verify -> DEBU 4676 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [msp] DeserializeIdentity -> DEBU 4677 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [msp] DeserializeIdentity -> DEBU 4678 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4679 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 467a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 467b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [policies] Evaluate -> DEBU 467c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [policies] Evaluate -> DEBU 467d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [policies] Evaluate -> DEBU 467e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [cauthdsl] func1 -> DEBU 467f 0xc004c43600 gate 1569284796158612200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [cauthdsl] func2 -> DEBU 4680 0xc004c43600 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [cauthdsl] func2 -> DEBU 4681 0xc004c43600 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [cauthdsl] func2 -> DEBU 4682 0xc004c43600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:36.158 UTC [cauthdsl] func2 -> DEBU 4683 0xc004c43600 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [cauthdsl] func1 -> DEBU 4684 0xc004c43600 gate 1569284796158612200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4685 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4686 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4687 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [cauthdsl] func1 -> DEBU 4688 0xc004c43e40 gate 1569284796164536700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [cauthdsl] func2 -> DEBU 4689 0xc004c43e40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [cauthdsl] func2 -> DEBU 468a 0xc004c43e40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [cauthdsl] func2 -> DEBU 468b 0xc004c43e40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [msp.identity] Verify -> DEBU 468c Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [msp.identity] Verify -> DEBU 468d Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [cauthdsl] func2 -> DEBU 468e 0xc004c43e40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [cauthdsl] func1 -> DEBU 468f 0xc004c43e40 gate 1569284796164536700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4690 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4691 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4692 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4693 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [msp] DeserializeIdentity -> DEBU 4694 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [msp] DeserializeIdentity -> DEBU 4695 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4696 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4697 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4698 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 4699 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 469a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 469b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [cauthdsl] func1 -> DEBU 469c 0xc004c51610 gate 1569284796165514300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 469d 0xc004c51610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 469e 0xc004c51610 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 469f 0xc004c51610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 46a0 0xc004c51610 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [cauthdsl] func1 -> DEBU 46a1 0xc004c51610 gate 1569284796165514300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 46a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 46a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 46a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [cauthdsl] func1 -> DEBU 46a5 0xc004c51e50 gate 1569284796165787400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 46a6 0xc004c51e50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 46a7 0xc004c51e50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 46a8 0xc004c51e50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [msp.identity] Verify -> DEBU 46a9 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:36.165 UTC [msp.identity] Verify -> DEBU 46aa Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:36.166 UTC [cauthdsl] func2 -> DEBU 46ab 0xc004c51e50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.166 UTC [cauthdsl] func1 -> DEBU 46ac 0xc004c51e50 gate 1569284796165787400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:36.166 UTC [policies] Evaluate -> DEBU 46ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.166 UTC [policies] Evaluate -> DEBU 46ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.166 UTC [policies] Evaluate -> DEBU 46af Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.166 UTC [policies] Evaluate -> DEBU 46b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.166 UTC [gossip.gossip] handleMessage -> DEBU 46b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.302 UTC [msp] DeserializeIdentity -> DEBU 46b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.302 UTC [msp] DeserializeIdentity -> DEBU 46b3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.302 UTC [gossip.pull] Hello -> DEBU 46b4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:36.302 UTC [msp] DeserializeIdentity -> DEBU 46b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.302 UTC [msp] DeserializeIdentity -> DEBU 46b6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.302 UTC [gossip.comm] Send -> DEBU 46b7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:36.303 UTC [gossip.comm] sendToEndpoint -> DEBU 46b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.303 UTC [gossip.comm] sendToEndpoint -> DEBU 46b9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.303 UTC [gossip.comm] func1 -> DEBU 46ba Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.304 UTC [gossip.gossip] handleMessage -> DEBU 46bb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.304 UTC [gossip.pull] HandleMessage -> DEBU 46bc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.304 UTC [gossip.gossip] handleMessage -> DEBU 46bd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.622 UTC [gossip.comm] func1 -> DEBU 46be Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.622 UTC [gossip.gossip] handleMessage -> DEBU 46bf Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.622 UTC [msp] DeserializeIdentity -> DEBU 46c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.622 UTC [msp] DeserializeIdentity -> DEBU 46c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.622 UTC [gossip.gossip] handleMessage -> DEBU 46c2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.780 UTC [gossip.comm] func1 -> DEBU 46c3 Got message: GossipMessage: tag:EMPTY mem_req:\261\202\273H=,p\224\305~\013\351\370D9\220lE\253d\313\245\310\233\002 \001[A\201\253\002\no\353:\\\016\024A\312\350\336,\016\367\226\022a4|\t)y5!i\371" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.780 UTC [gossip.gossip] handleMessage -> DEBU 46c4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\261\202\273H=,p\224\305~\013\351\370D9\220lE\253d\313\245\310\233\002 \001[A\201\253\002\no\353:\\\016\024A\312\350\336,\016\367\226\022a4|\t)y5!i\371" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.780 UTC [gossip.gossip] handleMessage -> DEBU 46c5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.780 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46c6 Got message: GossipMessage: tag:EMPTY mem_req:\261\202\273H=,p\224\305~\013\351\370D9\220lE\253d\313\245\310\233\002 \001[A\201\253\002\no\353:\\\016\024A\312\350\336,\016\367\226\022a4|\t)y5!i\371" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.780 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 46c7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:36.780 UTC [msp] DeserializeIdentity -> DEBU 46c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.780 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:36.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46ca Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46cb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:36.780 UTC [policies] Evaluate -> DEBU 46cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func1 -> DEBU 46cf 0xc004484480 gate 1569284796781079100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46d0 0xc004484480 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46d1 0xc004484480 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46d2 0xc004484480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46d3 0xc004484480 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func1 -> DEBU 46d4 0xc004484480 gate 1569284796781079100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func1 -> DEBU 46d8 0xc004484cc0 gate 1569284796781405700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46d9 0xc004484cc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46da 0xc004484cc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46db 0xc004484cc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [msp.identity] Verify -> DEBU 46dc Verify: digest = 00000000 fa b1 d5 ff 21 28 d9 81 f8 f2 f4 15 f7 b3 dd ff |....!(..........| +peer0.org1.example.com | 00000010 a9 e6 e4 fd 01 fc c4 24 c6 7e 15 27 a3 22 eb 3f |.......$.~.'.".?|" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [msp.identity] Verify -> DEBU 46dd Verify: sig = 00000000 30 44 02 20 4f 59 5e 48 ea f5 1a 3e b1 82 bb 48 |0D. OY^H...>...H| +peer0.org1.example.com | 00000010 3d 2c 70 94 c5 7e 0b e9 f8 44 39 90 6c 45 ab 64 |=,p..~...D9.lE.d| +peer0.org1.example.com | 00000020 cb a5 c8 9b 02 20 01 5b 41 81 ab 02 0a 6f eb 3a |..... .[A....o.:| +peer0.org1.example.com | 00000030 5c 0e 14 41 ca e8 de 2c 0e f7 96 12 61 34 7c 09 |\..A...,....a4|.| +peer0.org1.example.com | 00000040 29 79 35 21 69 f9 |)y5!i.|" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46de 0xc004484cc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [cauthdsl] func1 -> DEBU 46df 0xc004484cc0 gate 1569284796781405700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46e0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.782 UTC [policies] Evaluate -> DEBU 46e2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.782 UTC [policies] Evaluate -> DEBU 46e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:36.787 UTC [gossip.discovery] handleAliveMessage -> DEBU 46e4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 46e5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:36.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 46e6 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:36.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 46e7 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:36.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 46e8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:36.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 46e9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.788 UTC [gossip.discovery] handleAliveMessage -> DEBU 46ea Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.788 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46eb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.788 UTC [gossip.discovery] sendMemResponse -> DEBU 46ec Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:36.792 UTC [msp] DeserializeIdentity -> DEBU 46ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.792 UTC [msp] DeserializeIdentity -> DEBU 46ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.792 UTC [msp] DeserializeIdentity -> DEBU 46ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.792 UTC [gossip.comm] Send -> DEBU 46f0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:36.793 UTC [gossip.discovery] sendMemResponse -> DEBU 46f1 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" > alive:\261\202\273H=,p\224\305~\013\351\370D9\220lE\253d\313\245\310\233\002 \001[A\201\253\002\no\353:\\\016\024A\312\350\336,\016\367\226\022a4|\t)y5!i\371" > alive: " +peer0.org1.example.com | "2019-09-24 00:26:36.793 UTC [gossip.comm] sendToEndpoint -> DEBU 46f2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.793 UTC [gossip.comm] sendToEndpoint -> DEBU 46f3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.827 UTC [gossip.comm] func1 -> DEBU 46f4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.828 UTC [gossip.gossip] handleMessage -> DEBU 46f5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.828 UTC [gossip.pull] HandleMessage -> DEBU 46f6 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46f7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46f8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46fa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46fb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46fc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:36.828 UTC [gossip.pull] SendDigest -> DEBU 46fd Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:36.828 UTC [gossip.gossip] handleMessage -> DEBU 46fe Exiting" +peer0.org1.example.com | "2019-09-24 00:26:36.871 UTC [gossip.comm] func1 -> DEBU 46ff Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.871 UTC [gossip.gossip] handleMessage -> DEBU 4700 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.872 UTC [gossip.pull] HandleMessage -> DEBU 4701 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:36.872 UTC [gossip.pull] SendDigest -> DEBU 4702 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:36.872 UTC [gossip.gossip] handleMessage -> DEBU 4703 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.107 UTC [gossip.gossip] handleMessage -> DEBU 4704 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.107 UTC [msp] DeserializeIdentity -> DEBU 4705 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.107 UTC [msp] DeserializeIdentity -> DEBU 4706 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.107 UTC [msp] DeserializeIdentity -> DEBU 4707 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.107 UTC [gossip.gossip] handleMessage -> DEBU 4708 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.333 UTC [gossip.election] waitForInterrupt -> DEBU 4709 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.334 UTC [gossip.election] IsLeader -> DEBU 470a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:37.334 UTC [msp] GetDefaultSigningIdentity -> DEBU 470b Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:37.336 UTC [msp.identity] Sign -> DEBU 470c Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510151801 " +peer0.org1.example.com | "2019-09-24 00:26:37.336 UTC [msp.identity] Sign -> DEBU 470d Sign: digest: 94E2F5D4370D0E4E078E26F893C0EFA05210F1A71C0573FF6A1E88907ABDCE76 " +peer0.org1.example.com | "2019-09-24 00:26:37.336 UTC [gossip.election] waitForInterrupt -> DEBU 470e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:37.336 UTC [msp] DeserializeIdentity -> DEBU 470f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.337 UTC [msp] DeserializeIdentity -> DEBU 4710 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.337 UTC [msp] DeserializeIdentity -> DEBU 4711 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.337 UTC [msp] DeserializeIdentity -> DEBU 4712 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.337 UTC [gossip.comm] Send -> DEBU 4713 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:37.337 UTC [msp] DeserializeIdentity -> DEBU 4714 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.337 UTC [msp] DeserializeIdentity -> DEBU 4715 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.337 UTC [gossip.comm] sendToEndpoint -> DEBU 4716 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.337 UTC [gossip.comm] sendToEndpoint -> DEBU 4717 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.672 UTC [gossip.comm] func1 -> DEBU 4718 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.672 UTC [gossip.gossip] handleMessage -> DEBU 4719 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.672 UTC [gossip.pull] HandleMessage -> DEBU 471a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.672 UTC [gossip.pull] SendDigest -> DEBU 471b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:37.672 UTC [gossip.gossip] handleMessage -> DEBU 471c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.728 UTC [gossip.comm] func1 -> DEBU 471d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.gossip] handleMessage -> DEBU 471e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.gossip] handleMessage -> DEBU 471f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4720 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4721 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [msp.identity] Verify -> DEBU 4722 Verify: digest = 00000000 fb b4 cf 40 4e 76 82 ee 77 ef 2a d7 98 fa 56 53 |...@Nv..w.*...VS| +peer0.org1.example.com | 00000010 28 e1 cd a5 d9 e0 3d d4 04 fd 16 53 21 94 b9 f0 |(.....=....S!...|" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [msp.identity] Verify -> DEBU 4723 Verify: sig = 00000000 30 44 02 20 7d e0 91 69 0d bd e1 aa 9c 1e 15 83 |0D. }..i........| +peer0.org1.example.com | 00000010 9d 04 d4 f6 f4 88 18 d3 1e d4 6d 75 7b ba 23 b7 |..........mu{.#.| +peer0.org1.example.com | 00000020 21 18 b4 29 02 20 68 6a a2 9b bd 13 56 d9 87 4c |!..). hj....V..L| +peer0.org1.example.com | 00000030 4c 50 ce 06 e9 b6 91 53 39 59 38 75 5c a9 e6 d6 |LP.....S9Y8u\...| +peer0.org1.example.com | 00000040 fa f3 8b 05 c4 91 |......|" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 4724 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4725 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4726 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4727 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4728 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4729 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 472a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 472b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.736 UTC [gossip.comm] func1 -> DEBU 472c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.736 UTC [gossip.gossip] handleMessage -> DEBU 472d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.736 UTC [gossip.gossip] handleMessage -> DEBU 472e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.736 UTC [gossip.discovery] handleMsgFromComm -> DEBU 472f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.736 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4730 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.737 UTC [gossip.gossip] handleMessage -> DEBU 4731 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.737 UTC [gossip.gossip] handleMessage -> DEBU 4732 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.737 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4733 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.737 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4734 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.740 UTC [msp] DeserializeIdentity -> DEBU 4735 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.740 UTC [msp] DeserializeIdentity -> DEBU 4736 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.740 UTC [msp] DeserializeIdentity -> DEBU 4737 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.740 UTC [gossip.comm] Send -> DEBU 4738 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:37.741 UTC [msp] DeserializeIdentity -> DEBU 4739 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.741 UTC [gossip.comm] Send -> DEBU 473a Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:37.741 UTC [gossip.comm] sendToEndpoint -> DEBU 473b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.741 UTC [gossip.comm] sendToEndpoint -> DEBU 473c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.741 UTC [gossip.comm] sendToEndpoint -> DEBU 473d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.741 UTC [gossip.comm] sendToEndpoint -> DEBU 473e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.799 UTC [gossip.comm] func1 -> DEBU 473f Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.799 UTC [gossip.gossip] handleMessage -> DEBU 4740 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.799 UTC [gossip.gossip] handleMessage -> DEBU 4741 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.799 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4742 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.799 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4743 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:37.799 UTC [msp.identity] Verify -> DEBU 4744 Verify: digest = 00000000 69 e3 0b 77 ef 4d 95 77 ea 5c 32 df 9c 66 91 96 |i..w.M.w.\2..f..| +peer0.org1.example.com | 00000010 81 94 d8 e4 52 7a 7e b9 59 76 00 95 f1 38 2c f7 |....Rz~.Yv...8,.|" +peer0.org1.example.com | "2019-09-24 00:26:37.799 UTC [msp.identity] Verify -> DEBU 4745 Verify: sig = 00000000 30 44 02 20 7d b4 80 2b e3 21 14 0a 91 c2 f9 a6 |0D. }..+.!......| +peer0.org1.example.com | 00000010 d4 e9 13 b3 2b 51 0b d3 9e 59 44 68 2c a1 24 3b |....+Q...YDh,.$;| +peer0.org1.example.com | 00000020 54 aa fc 62 02 20 0b c0 50 74 85 2e 79 78 34 c3 |T..b. ..Pt..yx4.| +peer0.org1.example.com | 00000030 26 c1 3e 6e e3 c7 62 8d e0 3b 17 3f b6 7c 5e dd |&.>n..b..;.?.|^.| +peer0.org1.example.com | 00000040 b0 a8 25 4b bd 3a |..%K.:|" +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [msp.identity] Verify -> DEBU 4746 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [msp.identity] Verify -> DEBU 4747 Verify: sig = 00000000 30 45 02 21 00 f9 7d 3c 26 01 9b 45 f2 54 8a 49 |0E.!..}<&..E.T.I| +peer0.org1.example.com | 00000010 9d ef ea fb e2 0b f3 29 c7 00 6c a1 9c 13 c0 22 |.......)..l...."| +peer0.org1.example.com | 00000020 19 a4 04 06 ee 02 20 46 82 e4 1c c3 d6 97 19 63 |...... F.......c| +peer0.org1.example.com | 00000030 a0 13 0e 67 cd d5 81 07 35 05 9b 64 4e c8 e3 77 |...g....5..dN..w| +peer0.org1.example.com | 00000040 5a 6c b2 2d c6 6d 6a |Zl.-.mj|" +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [gossip.discovery] handleAliveMessage -> DEBU 4748 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [gossip.discovery] learnExistingMembers -> DEBU 4749 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [gossip.discovery] learnExistingMembers -> DEBU 474a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [gossip.discovery] learnExistingMembers -> DEBU 474b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [gossip.discovery] learnExistingMembers -> DEBU 474c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [gossip.discovery] learnExistingMembers -> DEBU 474d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [gossip.discovery] handleAliveMessage -> DEBU 474e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [gossip.discovery] handleMsgFromComm -> DEBU 474f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [gossip.discovery] sendMemResponse -> DEBU 4750 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:37.800 UTC [msp] DeserializeIdentity -> DEBU 4751 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.801 UTC [msp] DeserializeIdentity -> DEBU 4752 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:37.801 UTC [gossip.comm] Send -> DEBU 4753 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:37.801 UTC [gossip.discovery] sendMemResponse -> DEBU 4754 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:26:37.801 UTC [gossip.comm] sendToEndpoint -> DEBU 4755 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:37.801 UTC [gossip.comm] sendToEndpoint -> DEBU 4756 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:38.045 UTC [gossip.comm] func1 -> DEBU 4757 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:38.045 UTC [gossip.gossip] handleMessage -> DEBU 4758 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:38.045 UTC [msp] DeserializeIdentity -> DEBU 4759 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:38.045 UTC [msp] DeserializeIdentity -> DEBU 475a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:38.045 UTC [msp] DeserializeIdentity -> DEBU 475b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:38.045 UTC [gossip.gossip] handleMessage -> DEBU 475c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 475d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:39.608 UTC [msp.identity] Sign -> DEBU 475e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103F " +peer0.org1.example.com | "2019-09-24 00:26:39.608 UTC [msp.identity] Sign -> DEBU 475f Sign: digest: 7C286A0785191A7506CC89B91F8142CB76B80DAF9712737412B20DB692E68BE1 " +peer0.org1.example.com | "2019-09-24 00:26:39.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 4760 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:39.609 UTC [msp.identity] Sign -> DEBU 4761 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:39.609 UTC [msp.identity] Sign -> DEBU 4762 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:39.609 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4763 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:39.618 UTC [msp] DeserializeIdentity -> DEBU 4764 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.619 UTC [msp] DeserializeIdentity -> DEBU 4765 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.619 UTC [msp] DeserializeIdentity -> DEBU 4766 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.619 UTC [gossip.comm] Send -> DEBU 4767 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:39.619 UTC [msp] DeserializeIdentity -> DEBU 4768 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.619 UTC [gossip.comm] Send -> DEBU 4769 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:39.620 UTC [gossip.comm] Send -> DEBU 476a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 476b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 476c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 476d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 476e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 476f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 4770 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.629 UTC [gossip.gossip] handleMessage -> DEBU 4771 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.629 UTC [gossip.gossip] handleMessage -> DEBU 4772 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4773 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.629 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4774 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:39.629 UTC [msp.identity] Verify -> DEBU 4775 Verify: digest = 00000000 7c 28 6a 07 85 19 1a 75 06 cc 89 b9 1f 81 42 cb ||(j....u......B.| +peer0.org1.example.com | 00000010 76 b8 0d af 97 12 73 74 12 b2 0d b6 92 e6 8b e1 |v.....st........|" +peer0.org1.example.com | "2019-09-24 00:26:39.629 UTC [msp.identity] Verify -> DEBU 4776 Verify: sig = 00000000 30 44 02 20 18 9b 36 87 c7 ee 5f be 08 56 30 72 |0D. ..6..._..V0r| +peer0.org1.example.com | 00000010 ea e3 12 a0 3e c1 bf 96 9f 70 17 27 15 df de 2f |....>....p.'.../| +peer0.org1.example.com | 00000020 d8 43 a9 3f 02 20 26 d0 b6 29 1f d4 46 a5 3a 5c |.C.?. &..)..F.:\| +peer0.org1.example.com | 00000030 73 e0 5e 52 8d 63 e5 3f ff 5c 1e 0f c4 0b 92 e4 |s.^R.c.?.\......| +peer0.org1.example.com | 00000040 13 46 fc 75 44 e6 |.F.uD.|" +peer0.org1.example.com | "2019-09-24 00:26:39.630 UTC [gossip.discovery] isSentByMe -> DEBU 4777 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4778 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.731 UTC [gossip.pull] Hello -> DEBU 4779 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:39.731 UTC [gossip.comm] Send -> DEBU 477a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:39.731 UTC [gossip.pull] Hello -> DEBU 477b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:39.731 UTC [gossip.comm] Send -> DEBU 477c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:39.731 UTC [gossip.pull] Hello -> DEBU 477d Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:39.731 UTC [gossip.comm] Send -> DEBU 477e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:39.731 UTC [gossip.comm] sendToEndpoint -> DEBU 477f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.731 UTC [gossip.comm] sendToEndpoint -> DEBU 4780 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.732 UTC [gossip.comm] sendToEndpoint -> DEBU 4781 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.733 UTC [gossip.comm] sendToEndpoint -> DEBU 4782 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.733 UTC [gossip.comm] sendToEndpoint -> DEBU 4783 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.733 UTC [gossip.comm] sendToEndpoint -> DEBU 4784 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.734 UTC [gossip.gossip] handleMessage -> DEBU 4785 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.734 UTC [gossip.pull] HandleMessage -> DEBU 4786 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.734 UTC [gossip.gossip] handleMessage -> DEBU 4787 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.734 UTC [gossip.comm] func1 -> DEBU 4788 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.734 UTC [gossip.gossip] handleMessage -> DEBU 4789 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.734 UTC [gossip.pull] HandleMessage -> DEBU 478a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.734 UTC [gossip.gossip] handleMessage -> DEBU 478b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.735 UTC [gossip.comm] func1 -> DEBU 478c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.735 UTC [gossip.gossip] handleMessage -> DEBU 478d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.735 UTC [gossip.pull] HandleMessage -> DEBU 478e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.735 UTC [gossip.gossip] handleMessage -> DEBU 478f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.870 UTC [msp] GetDefaultSigningIdentity -> DEBU 4790 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:39.870 UTC [msp.identity] Sign -> DEBU 4791 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151040 " +peer0.org1.example.com | "2019-09-24 00:26:39.870 UTC [msp.identity] Sign -> DEBU 4792 Sign: digest: 8232A6F7C839936D1209AD87DDCEC4BB05386BD1AFC3C82C61053909D4CC6511 " +peer0.org1.example.com | "2019-09-24 00:26:39.871 UTC [msp] GetDefaultSigningIdentity -> DEBU 4793 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:39.871 UTC [msp.identity] Sign -> DEBU 4794 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:39.871 UTC [msp.identity] Sign -> DEBU 4795 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:39.871 UTC [msp] DeserializeIdentity -> DEBU 4796 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.871 UTC [gossip.comm] Send -> DEBU 4797 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:39.871 UTC [gossip.comm] Send -> DEBU 4798 Entering, sending GossipMessage: tag:EMPTY mem_req:BFI\244\346\005!:E\257\002 \033\265l\006\262\372s\004\306\"@\237\0369\222\210nS\007\217x\305\357'\305\247\245\361I\230\270\n" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:39.872 UTC [msp] DeserializeIdentity -> DEBU 4799 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.872 UTC [gossip.comm] Send -> DEBU 479a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 479b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 479c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 479d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 479e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 479f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:BFI\244\346\005!:E\257\002 \033\265l\006\262\372s\004\306\"@\237\0369\222\210nS\007\217x\305\357'\305\247\245\361I\230\270\n" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 47a0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.876 UTC [gossip.comm] func1 -> DEBU 47a1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.876 UTC [gossip.gossip] handleMessage -> DEBU 47a2 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.876 UTC [gossip.gossip] handleMessage -> DEBU 47a3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.876 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47a5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:39.877 UTC [msp.identity] Verify -> DEBU 47a6 Verify: digest = 00000000 82 32 a6 f7 c8 39 93 6d 12 09 ad 87 dd ce c4 bb |.2...9.m........| +peer0.org1.example.com | 00000010 05 38 6b d1 af c3 c8 2c 61 05 39 09 d4 cc 65 11 |.8k....,a.9...e.|" +peer0.org1.example.com | "2019-09-24 00:26:39.877 UTC [msp.identity] Verify -> DEBU 47a7 Verify: sig = 00000000 30 44 02 20 6c 4e b7 5d 74 c5 4c c2 c0 fc 9f b1 |0D. lN.]t.L.....| +peer0.org1.example.com | 00000010 e0 61 e3 c1 5b 39 38 e6 d3 50 83 3f 3c fa 30 03 |.a..[98..P.?<.0.| +peer0.org1.example.com | 00000020 49 36 35 98 02 20 14 02 ac a6 c6 f5 0d 61 4a 60 |I65.. .......aJ`| +peer0.org1.example.com | 00000030 d6 99 b5 f4 be e2 eb 7a 5d 8d 6f a6 b8 d0 c8 b5 |.......z].o.....| +peer0.org1.example.com | 00000040 36 66 31 cb 4e 10 |6f1.N.|" +peer0.org1.example.com | "2019-09-24 00:26:39.877 UTC [msp.identity] Verify -> DEBU 47a8 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:39.877 UTC [msp.identity] Verify -> DEBU 47a9 Verify: sig = 00000000 30 45 02 21 00 d6 e1 ae c4 92 e2 17 e2 90 cb a5 |0E.!............| +peer0.org1.example.com | 00000010 af f5 c6 16 d8 4c fa 2c 18 47 3e 42 46 49 a4 e6 |.....L.,.G>BFI..| +peer0.org1.example.com | 00000020 05 21 3a 45 af 02 20 1b b5 6c 06 b2 fa 73 04 c6 |.!:E.. ..l...s..| +peer0.org1.example.com | 00000030 22 40 9f 1e 39 92 88 6e 53 07 8f 78 c5 ef 27 c5 |"@..9..nS..x..'.| +peer0.org1.example.com | 00000040 a7 a5 f1 49 98 b8 0a |...I...|" +peer0.org1.example.com | "2019-09-24 00:26:39.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 47aa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.877 UTC [gossip.discovery] isSentByMe -> DEBU 47ab Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 47ac Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.877 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47ad Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.877 UTC [gossip.comm] func1 -> DEBU 47ae Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.877 UTC [gossip.gossip] handleMessage -> DEBU 47af Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47b0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.879 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47b1 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:39.879 UTC [msp.identity] Verify -> DEBU 47b2 Verify: digest = 00000000 69 e3 0b 77 ef 4d 95 77 ea 5c 32 df 9c 66 91 96 |i..w.M.w.\2..f..| +peer0.org1.example.com | 00000010 81 94 d8 e4 52 7a 7e b9 59 76 00 95 f1 38 2c f7 |....Rz~.Yv...8,.|" +peer0.org1.example.com | "2019-09-24 00:26:39.879 UTC [msp.identity] Verify -> DEBU 47b3 Verify: sig = 00000000 30 44 02 20 7d b4 80 2b e3 21 14 0a 91 c2 f9 a6 |0D. }..+.!......| +peer0.org1.example.com | 00000010 d4 e9 13 b3 2b 51 0b d3 9e 59 44 68 2c a1 24 3b |....+Q...YDh,.$;| +peer0.org1.example.com | 00000020 54 aa fc 62 02 20 0b c0 50 74 85 2e 79 78 34 c3 |T..b. ..Pt..yx4.| +peer0.org1.example.com | 00000030 26 c1 3e 6e e3 c7 62 8d e0 3b 17 3f b6 7c 5e dd |&.>n..b..;.?.|^.| +peer0.org1.example.com | 00000040 b0 a8 25 4b bd 3a |..%K.:|" +peer0.org1.example.com | "2019-09-24 00:26:39.877 UTC [gossip.gossip] handleMessage -> DEBU 47b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 47b5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 47b6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.879 UTC [gossip.gossip] handleMessage -> DEBU 47b7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.879 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47b8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:39.879 UTC [msp.identity] Verify -> DEBU 47b9 Verify: digest = 00000000 82 32 a6 f7 c8 39 93 6d 12 09 ad 87 dd ce c4 bb |.2...9.m........| +peer0.org1.example.com | 00000010 05 38 6b d1 af c3 c8 2c 61 05 39 09 d4 cc 65 11 |.8k....,a.9...e.|" +peer0.org1.example.com | "2019-09-24 00:26:39.879 UTC [msp.identity] Verify -> DEBU 47ba Verify: sig = 00000000 30 44 02 20 6c 4e b7 5d 74 c5 4c c2 c0 fc 9f b1 |0D. lN.]t.L.....| +peer0.org1.example.com | 00000010 e0 61 e3 c1 5b 39 38 e6 d3 50 83 3f 3c fa 30 03 |.a..[98..P.?<.0.| +peer0.org1.example.com | 00000020 49 36 35 98 02 20 14 02 ac a6 c6 f5 0d 61 4a 60 |I65.. .......aJ`| +peer0.org1.example.com | 00000030 d6 99 b5 f4 be e2 eb 7a 5d 8d 6f a6 b8 d0 c8 b5 |.......z].o.....| +peer0.org1.example.com | 00000040 36 66 31 cb 4e 10 |6f1.N.|" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [gossip.discovery] handleAliveMessage -> DEBU 47bb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [gossip.discovery] isSentByMe -> DEBU 47bc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [gossip.discovery] handleAliveMessage -> DEBU 47bd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47be Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [msp] DeserializeIdentity -> DEBU 47bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47c1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47c2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [cauthdsl] func1 -> DEBU 47c6 0xc003461de0 gate 1569284799880457100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47c7 0xc003461de0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47c8 0xc003461de0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47c9 0xc003461de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47ca 0xc003461de0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [cauthdsl] func1 -> DEBU 47cb 0xc003461de0 gate 1569284799880457100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [cauthdsl] func1 -> DEBU 47cf 0xc003476620 gate 1569284799880712100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47d0 0xc003476620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47d1 0xc003476620 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47d2 0xc003476620 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [msp.identity] Verify -> DEBU 47d3 Verify: digest = 00000000 4b ab 75 6b 60 22 fc 7a 4e 10 05 92 d2 7a 90 6c |K.uk`".zN....z.l| +peer0.org1.example.com | 00000010 5c 84 ad 99 96 87 cc 58 dc c9 2f 78 85 22 32 9a |\......X../x."2.|" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [msp.identity] Verify -> DEBU 47d4 Verify: sig = 00000000 30 44 02 20 5b c5 9d 89 69 30 6b d7 68 fa a2 2d |0D. [...i0k.h..-| +peer0.org1.example.com | 00000010 fc 9d 56 d6 f3 d7 5c d3 93 c8 20 a9 4a 35 7a cc |..V...\... .J5z.| +peer0.org1.example.com | 00000020 46 26 54 59 02 20 0c 86 89 7e 9b 9b 22 97 26 97 |F&TY. ...~..".&.| +peer0.org1.example.com | 00000030 7f ef 2a bd e1 94 9e 72 c1 83 68 35 05 77 09 9e |..*....r..h5.w..| +peer0.org1.example.com | 00000040 b0 0e 04 20 b1 f5 |... ..|" +peer0.org1.example.com | "2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47d5 0xc003476620 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [cauthdsl] func1 -> DEBU 47d6 0xc003476620 gate 1569284799880712100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [policies] Evaluate -> DEBU 47d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [policies] Evaluate -> DEBU 47d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [policies] Evaluate -> DEBU 47d9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [policies] Evaluate -> DEBU 47da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 47db Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 47dc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47dd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47de Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47df Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [gossip.gossip] handleMessage -> DEBU 47e0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [msp.identity] Verify -> DEBU 47e1 Verify: digest = 00000000 69 e3 0b 77 ef 4d 95 77 ea 5c 32 df 9c 66 91 96 |i..w.M.w.\2..f..| +peer0.org1.example.com | 00000010 81 94 d8 e4 52 7a 7e b9 59 76 00 95 f1 38 2c f7 |....Rz~.Yv...8,.|" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [msp.identity] Verify -> DEBU 47e2 Verify: sig = 00000000 30 44 02 20 7d b4 80 2b e3 21 14 0a 91 c2 f9 a6 |0D. }..+.!......| +peer0.org1.example.com | 00000010 d4 e9 13 b3 2b 51 0b d3 9e 59 44 68 2c a1 24 3b |....+Q...YDh,.$;| +peer0.org1.example.com | 00000020 54 aa fc 62 02 20 0b c0 50 74 85 2e 79 78 34 c3 |T..b. ..Pt..yx4.| +peer0.org1.example.com | 00000030 26 c1 3e 6e e3 c7 62 8d e0 3b 17 3f b6 7c 5e dd |&.>n..b..;.?.|^.| +peer0.org1.example.com | 00000040 b0 a8 25 4b bd 3a |..%K.:|" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 47e3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 47e4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47e5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:39.881 UTC [msp.identity] Verify -> DEBU 47e6 Verify: digest = 00000000 82 32 a6 f7 c8 39 93 6d 12 09 ad 87 dd ce c4 bb |.2...9.m........| +peer0.org1.example.com | 00000010 05 38 6b d1 af c3 c8 2c 61 05 39 09 d4 cc 65 11 |.8k....,a.9...e.|" +peer0.org1.example.com | "2019-09-24 00:26:39.882 UTC [msp.identity] Verify -> DEBU 47e7 Verify: sig = 00000000 30 44 02 20 6c 4e b7 5d 74 c5 4c c2 c0 fc 9f b1 |0D. lN.]t.L.....| +peer0.org1.example.com | 00000010 e0 61 e3 c1 5b 39 38 e6 d3 50 83 3f 3c fa 30 03 |.a..[98..P.?<.0.| +peer0.org1.example.com | 00000020 49 36 35 98 02 20 14 02 ac a6 c6 f5 0d 61 4a 60 |I65.. .......aJ`| +peer0.org1.example.com | 00000030 d6 99 b5 f4 be e2 eb 7a 5d 8d 6f a6 b8 d0 c8 b5 |.......z].o.....| +peer0.org1.example.com | 00000040 36 66 31 cb 4e 10 |6f1.N.|" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 47e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [gossip.discovery] isSentByMe -> DEBU 47e9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 47ea Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47eb Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [msp] DeserializeIdentity -> DEBU 47ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47ee Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47ef Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [policies] Evaluate -> DEBU 47f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [policies] Evaluate -> DEBU 47f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [policies] Evaluate -> DEBU 47f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [cauthdsl] func1 -> DEBU 47f3 0xc00034b6d0 gate 1569284799888756600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [cauthdsl] func2 -> DEBU 47f4 0xc00034b6d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [cauthdsl] func2 -> DEBU 47f5 0xc00034b6d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [cauthdsl] func2 -> DEBU 47f6 0xc00034b6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [cauthdsl] func2 -> DEBU 47f7 0xc00034b6d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [cauthdsl] func1 -> DEBU 47f8 0xc00034b6d0 gate 1569284799888756600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [policies] Evaluate -> DEBU 47f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.888 UTC [policies] Evaluate -> DEBU 47fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [policies] Evaluate -> DEBU 47fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [cauthdsl] func1 -> DEBU 47fc 0xc00034bf10 gate 1569284799889047500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [cauthdsl] func2 -> DEBU 47fd 0xc00034bf10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [cauthdsl] func2 -> DEBU 47fe 0xc00034bf10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [cauthdsl] func2 -> DEBU 47ff 0xc00034bf10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [msp.identity] Verify -> DEBU 4800 Verify: digest = 00000000 fa b1 d5 ff 21 28 d9 81 f8 f2 f4 15 f7 b3 dd ff |....!(..........| +peer0.org1.example.com | 00000010 a9 e6 e4 fd 01 fc c4 24 c6 7e 15 27 a3 22 eb 3f |.......$.~.'.".?|" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [msp.identity] Verify -> DEBU 4801 Verify: sig = 00000000 30 44 02 20 4f 59 5e 48 ea f5 1a 3e b1 82 bb 48 |0D. OY^H...>...H| +peer0.org1.example.com | 00000010 3d 2c 70 94 c5 7e 0b e9 f8 44 39 90 6c 45 ab 64 |=,p..~...D9.lE.d| +peer0.org1.example.com | 00000020 cb a5 c8 9b 02 20 01 5b 41 81 ab 02 0a 6f eb 3a |..... .[A....o.:| +peer0.org1.example.com | 00000030 5c 0e 14 41 ca e8 de 2c 0e f7 96 12 61 34 7c 09 |\..A...,....a4|.| +peer0.org1.example.com | 00000040 29 79 35 21 69 f9 |)y5!i.|" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [cauthdsl] func2 -> DEBU 4802 0xc00034bf10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [cauthdsl] func1 -> DEBU 4803 0xc00034bf10 gate 1569284799889047500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [policies] Evaluate -> DEBU 4804 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [policies] Evaluate -> DEBU 4805 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [policies] Evaluate -> DEBU 4806 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [policies] Evaluate -> DEBU 4807 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [gossip.discovery] handleAliveMessage -> DEBU 4808 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [gossip.discovery] handleAliveMessage -> DEBU 4809 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.889 UTC [gossip.discovery] handleMsgFromComm -> DEBU 480a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.943 UTC [gossip.gossip] handleMessage -> DEBU 480b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.943 UTC [gossip.pull] HandleMessage -> DEBU 480c GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 480d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 480e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 480f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 4810 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 4811 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 4812 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.943 UTC [gossip.pull] SendDigest -> DEBU 4813 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:39.943 UTC [gossip.gossip] handleMessage -> DEBU 4814 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.977 UTC [gossip.gossip] handleMessage -> DEBU 4815 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [gossip.gossip] handleMessage -> DEBU 4816 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4817 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4818 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [msp] DeserializeIdentity -> DEBU 4819 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 481a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 481b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 481c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 481d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 481e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 481f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [cauthdsl] func1 -> DEBU 4820 0xc0029e2770 gate 1569284799978515400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 4821 0xc0029e2770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 4822 0xc0029e2770 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 4823 0xc0029e2770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 4824 0xc0029e2770 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [cauthdsl] func1 -> DEBU 4825 0xc0029e2770 gate 1569284799978515400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 4826 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 4827 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 4828 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [cauthdsl] func1 -> DEBU 4829 0xc0029e2fb0 gate 1569284799978819100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 482a 0xc0029e2fb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 482b 0xc0029e2fb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 482c 0xc0029e2fb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [msp.identity] Verify -> DEBU 482d Verify: digest = 00000000 5a 43 5f 28 0f 82 dd 64 18 3f 4b e0 d8 36 4d ed |ZC_(...d.?K..6M.| +peer0.org1.example.com | 00000010 5a 27 87 ee 2b 42 19 56 5c 23 a5 88 a3 4e 43 ed |Z'..+B.V\#...NC.|" +peer0.org1.example.com | "2019-09-24 00:26:39.978 UTC [msp.identity] Verify -> DEBU 482e Verify: sig = 00000000 30 44 02 20 18 1a 01 a6 62 f6 cb ce 27 bd b6 e0 |0D. ....b...'...| +peer0.org1.example.com | 00000010 8b 7c 44 e9 d9 81 eb 80 ed a4 fe 4b 72 5b 1f a7 |.|D........Kr[..| +peer0.org1.example.com | 00000020 12 1a ac 9c 02 20 4b a8 24 f7 e9 37 b2 a0 db 28 |..... K.$..7...(| +peer0.org1.example.com | 00000030 8a ff 15 db 56 f5 7d 9a ac af 5f ae 44 44 70 b1 |....V.}..._.DDp.| +peer0.org1.example.com | 00000040 e5 d2 42 e1 e5 92 |..B...|" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [cauthdsl] func2 -> DEBU 482f 0xc0029e2fb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [cauthdsl] func1 -> DEBU 4830 0xc0029e2fb0 gate 1569284799978819100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [policies] Evaluate -> DEBU 4831 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [policies] Evaluate -> DEBU 4832 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [policies] Evaluate -> DEBU 4833 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [policies] Evaluate -> DEBU 4834 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 4835 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 4836 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 4837 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 4838 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 4839 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 483a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 483b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 483c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [msp] DeserializeIdentity -> DEBU 483d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [msp] DeserializeIdentity -> DEBU 483e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [msp] DeserializeIdentity -> DEBU 483f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.979 UTC [msp] DeserializeIdentity -> DEBU 4840 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.980 UTC [msp] DeserializeIdentity -> DEBU 4841 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.980 UTC [msp] DeserializeIdentity -> DEBU 4842 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.980 UTC [msp] DeserializeIdentity -> DEBU 4843 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.980 UTC [gossip.comm] Send -> DEBU 4844 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:39.980 UTC [msp] DeserializeIdentity -> DEBU 4845 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:39.980 UTC [gossip.comm] Send -> DEBU 4846 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:39.980 UTC [gossip.comm] sendToEndpoint -> DEBU 4847 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.980 UTC [gossip.comm] sendToEndpoint -> DEBU 4848 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.980 UTC [gossip.comm] sendToEndpoint -> DEBU 4849 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.980 UTC [gossip.comm] sendToEndpoint -> DEBU 484a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.988 UTC [gossip.comm] func1 -> DEBU 484b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.988 UTC [gossip.gossip] handleMessage -> DEBU 484c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.988 UTC [gossip.gossip] handleMessage -> DEBU 484d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 484e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 484f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.989 UTC [gossip.comm] func1 -> DEBU 4850 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.989 UTC [gossip.gossip] handleMessage -> DEBU 4851 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.989 UTC [gossip.gossip] handleMessage -> DEBU 4852 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:39.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4853 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:39.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4854 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.044 UTC [gossip.gossip] handleMessage -> DEBU 4855 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.044 UTC [gossip.gossip] handleMessage -> DEBU 4856 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.044 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4857 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.044 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4858 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:40.044 UTC [msp] DeserializeIdentity -> DEBU 4859 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 485a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 485b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 485c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 485d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 485e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 485f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func1 -> DEBU 4860 0xc004b220c0 gate 1569284800045299900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 4861 0xc004b220c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 4862 0xc004b220c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 4863 0xc004b220c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 4864 0xc004b220c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func1 -> DEBU 4865 0xc004b220c0 gate 1569284800045299900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4866 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4867 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func1 -> DEBU 4869 0xc004b22900 gate 1569284800045568000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 486a 0xc004b22900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 486b 0xc004b22900 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 486c 0xc004b22900 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [msp.identity] Verify -> DEBU 486d Verify: digest = 00000000 4e 6d b8 1b 23 95 85 25 3e a8 cc 0a 33 ea 4f 47 |Nm..#..%>...3.OG| +peer0.org1.example.com | 00000010 1b 6e a2 cf 5a 8e 12 90 31 7e a5 83 f9 bb c9 6e |.n..Z...1~.....n|" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [msp.identity] Verify -> DEBU 486e Verify: sig = 00000000 30 45 02 21 00 8d f2 4a d8 f4 06 79 ac fb 76 b1 |0E.!...J...y..v.| +peer0.org1.example.com | 00000010 88 0a 89 61 71 2d a0 55 8d 6c d5 0c 20 68 08 8b |...aq-.U.l.. h..| +peer0.org1.example.com | 00000020 7e 4b b4 46 07 02 20 51 b3 28 20 68 62 23 47 fb |~K.F.. Q.( hb#G.| +peer0.org1.example.com | 00000030 3c a1 ae b9 bc ac 48 ea 03 f1 98 a8 7b 5b 7b b4 |<.....H.....{[{.| +peer0.org1.example.com | 00000040 f9 81 04 b8 5b 45 4e |....[EN|" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 486f 0xc004b22900 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [cauthdsl] func1 -> DEBU 4870 0xc004b22900 gate 1569284800045568000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4871 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4872 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4873 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4874 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.discovery] handleAliveMessage -> DEBU 4875 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 4876 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 4877 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 4878 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 4879 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 487a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.discovery] handleAliveMessage -> DEBU 487b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.discovery] sendMemResponse -> DEBU 487d Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [msp] DeserializeIdentity -> DEBU 487e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [msp] DeserializeIdentity -> DEBU 487f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [msp] DeserializeIdentity -> DEBU 4880 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.comm] Send -> DEBU 4881 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.discovery] sendMemResponse -> DEBU 4882 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" > alive:\261\202\273H=,p\224\305~\013\351\370D9\220lE\253d\313\245\310\233\002 \001[A\201\253\002\no\353:\\\016\024A\312\350\336,\016\367\226\022a4|\t)y5!i\371" > alive: alive:\301\277\226\237p\027'\025\337\336/\330C\251?\002 &\320\266)\037\324F\245:\\s\340^R\215c\345?\377\\\036\017\304\013\222\344\023F\374uD\346" > " +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.comm] sendToEndpoint -> DEBU 4883 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.046 UTC [gossip.comm] sendToEndpoint -> DEBU 4884 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.117 UTC [msp] DeserializeIdentity -> DEBU 4885 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.117 UTC [msp] DeserializeIdentity -> DEBU 4886 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.117 UTC [gossip.comm] Send -> DEBU 4887 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 4888 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 4889 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 488a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 488b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 488c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 488d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.122 UTC [gossip.comm] func1 -> DEBU 488e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.122 UTC [gossip.gossip] handleMessage -> DEBU 488f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.122 UTC [msp] DeserializeIdentity -> DEBU 4890 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.123 UTC [msp] DeserializeIdentity -> DEBU 4891 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.122 UTC [gossip.comm] func1 -> DEBU 4892 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.123 UTC [msp] DeserializeIdentity -> DEBU 4893 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.123 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4894 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:40.123 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4895 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.124 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4896 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.124 UTC [policies] Evaluate -> DEBU 4897 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.124 UTC [policies] Evaluate -> DEBU 4898 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:40.124 UTC [policies] Evaluate -> DEBU 4899 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.124 UTC [cauthdsl] func1 -> DEBU 489a 0xc004b339d0 gate 1569284800124626100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.124 UTC [cauthdsl] func2 -> DEBU 489b 0xc004b339d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.124 UTC [cauthdsl] func2 -> DEBU 489c 0xc004b339d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.124 UTC [cauthdsl] func2 -> DEBU 489d 0xc004b339d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:40.125 UTC [cauthdsl] func2 -> DEBU 489e 0xc004b339d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.125 UTC [cauthdsl] func1 -> DEBU 489f 0xc004b339d0 gate 1569284800124626100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.125 UTC [policies] Evaluate -> DEBU 48a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.125 UTC [policies] Evaluate -> DEBU 48a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.125 UTC [policies] Evaluate -> DEBU 48a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.125 UTC [cauthdsl] func1 -> DEBU 48a3 0xc0034fa210 gate 1569284800125550400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.131 UTC [cauthdsl] func2 -> DEBU 48a4 0xc0034fa210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.131 UTC [cauthdsl] func2 -> DEBU 48a5 0xc0034fa210 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.131 UTC [cauthdsl] func2 -> DEBU 48a6 0xc0034fa210 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.131 UTC [msp.identity] Verify -> DEBU 48a7 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:40.131 UTC [msp.identity] Verify -> DEBU 48a8 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:40.131 UTC [cauthdsl] func2 -> DEBU 48a9 0xc0034fa210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.131 UTC [cauthdsl] func1 -> DEBU 48aa 0xc0034fa210 gate 1569284800125550400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:40.131 UTC [policies] Evaluate -> DEBU 48ab Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.131 UTC [policies] Evaluate -> DEBU 48ac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.131 UTC [policies] Evaluate -> DEBU 48ad Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.131 UTC [policies] Evaluate -> DEBU 48ae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.132 UTC [msp.identity] Verify -> DEBU 48af Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:40.132 UTC [msp.identity] Verify -> DEBU 48b0 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:40.132 UTC [msp] DeserializeIdentity -> DEBU 48b1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.132 UTC [msp] DeserializeIdentity -> DEBU 48b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.132 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48b3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:40.132 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48b4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.132 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48b5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.132 UTC [policies] Evaluate -> DEBU 48b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.132 UTC [policies] Evaluate -> DEBU 48b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:40.132 UTC [policies] Evaluate -> DEBU 48b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.132 UTC [cauthdsl] func1 -> DEBU 48b9 0xc003510100 gate 1569284800132983700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48ba 0xc003510100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48bb 0xc003510100 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48bc 0xc003510100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48bd 0xc003510100 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [cauthdsl] func1 -> DEBU 48be 0xc003510100 gate 1569284800132983700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48bf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [cauthdsl] func1 -> DEBU 48c2 0xc003510940 gate 1569284800133247900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48c3 0xc003510940 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48c4 0xc003510940 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48c5 0xc003510940 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [msp.identity] Verify -> DEBU 48c6 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [msp.identity] Verify -> DEBU 48c7 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48c8 0xc003510940 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [cauthdsl] func1 -> DEBU 48c9 0xc003510940 gate 1569284800133247900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48ca Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48cc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [msp.identity] Verify -> DEBU 48ce Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:40.133 UTC [msp.identity] Verify -> DEBU 48cf Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:40.134 UTC [gossip.gossip] handleMessage -> DEBU 48d0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.134 UTC [gossip.gossip] handleMessage -> DEBU 48d1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.134 UTC [msp.identity] Verify -> DEBU 48d2 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:40.134 UTC [msp.identity] Verify -> DEBU 48d3 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:40.134 UTC [msp.identity] Verify -> DEBU 48d4 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:40.134 UTC [msp.identity] Verify -> DEBU 48d5 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:40.134 UTC [msp] DeserializeIdentity -> DEBU 48d6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.134 UTC [msp] DeserializeIdentity -> DEBU 48d7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.134 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48d8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:40.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48d9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48da Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [cauthdsl] func1 -> DEBU 48de 0xc0035218b0 gate 1569284800135089700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48df 0xc0035218b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48e0 0xc0035218b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48e1 0xc0035218b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48e2 0xc0035218b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [cauthdsl] func1 -> DEBU 48e3 0xc0035218b0 gate 1569284800135089700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48e4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [cauthdsl] func1 -> DEBU 48e7 0xc002a800f0 gate 1569284800135341000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48e8 0xc002a800f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48e9 0xc002a800f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.139 UTC [cauthdsl] func2 -> DEBU 48ea 0xc002a800f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.139 UTC [msp.identity] Verify -> DEBU 48eb Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:40.139 UTC [msp.identity] Verify -> DEBU 48ec Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:40.139 UTC [cauthdsl] func2 -> DEBU 48ed 0xc002a800f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.139 UTC [cauthdsl] func1 -> DEBU 48ee 0xc002a800f0 gate 1569284800135341000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:40.140 UTC [policies] Evaluate -> DEBU 48ef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.140 UTC [policies] Evaluate -> DEBU 48f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.140 UTC [policies] Evaluate -> DEBU 48f1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.140 UTC [policies] Evaluate -> DEBU 48f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.140 UTC [msp] DeserializeIdentity -> DEBU 48f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.140 UTC [msp] DeserializeIdentity -> DEBU 48f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.141 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:40.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48f6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48f7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.141 UTC [policies] Evaluate -> DEBU 48f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.141 UTC [policies] Evaluate -> DEBU 48f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:40.141 UTC [policies] Evaluate -> DEBU 48fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.141 UTC [cauthdsl] func1 -> DEBU 48fb 0xc002a818c0 gate 1569284800141610100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.141 UTC [cauthdsl] func2 -> DEBU 48fc 0xc002a818c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.141 UTC [cauthdsl] func2 -> DEBU 48fd 0xc002a818c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.141 UTC [cauthdsl] func2 -> DEBU 48fe 0xc002a818c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:40.142 UTC [cauthdsl] func2 -> DEBU 48ff 0xc002a818c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.142 UTC [cauthdsl] func1 -> DEBU 4900 0xc002a818c0 gate 1569284800141610100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.142 UTC [policies] Evaluate -> DEBU 4901 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.142 UTC [policies] Evaluate -> DEBU 4902 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.142 UTC [policies] Evaluate -> DEBU 4903 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.142 UTC [cauthdsl] func1 -> DEBU 4904 0xc002a90100 gate 1569284800142736200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.142 UTC [cauthdsl] func2 -> DEBU 4905 0xc002a90100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.143 UTC [cauthdsl] func2 -> DEBU 4906 0xc002a90100 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.143 UTC [cauthdsl] func2 -> DEBU 4907 0xc002a90100 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.143 UTC [msp.identity] Verify -> DEBU 4908 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:40.143 UTC [msp.identity] Verify -> DEBU 4909 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:40.143 UTC [cauthdsl] func2 -> DEBU 490a 0xc002a90100 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.143 UTC [cauthdsl] func1 -> DEBU 490b 0xc002a90100 gate 1569284800142736200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:40.143 UTC [policies] Evaluate -> DEBU 490c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.144 UTC [policies] Evaluate -> DEBU 490d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.144 UTC [policies] Evaluate -> DEBU 490e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.144 UTC [policies] Evaluate -> DEBU 490f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.144 UTC [gossip.gossip] handleMessage -> DEBU 4910 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.144 UTC [gossip.gossip] handleMessage -> DEBU 4911 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.144 UTC [msp] DeserializeIdentity -> DEBU 4912 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.144 UTC [msp] DeserializeIdentity -> DEBU 4913 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [msp] DeserializeIdentity -> DEBU 4914 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4915 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4916 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4917 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 4918 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 4919 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 491a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [cauthdsl] func1 -> DEBU 491b 0xc002a91c10 gate 1569284800145487700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [cauthdsl] func2 -> DEBU 491c 0xc002a91c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [cauthdsl] func2 -> DEBU 491d 0xc002a91c10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [cauthdsl] func2 -> DEBU 491e 0xc002a91c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [cauthdsl] func2 -> DEBU 491f 0xc002a91c10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [cauthdsl] func1 -> DEBU 4920 0xc002a91c10 gate 1569284800145487700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 4921 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 4922 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 4923 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.145 UTC [cauthdsl] func1 -> DEBU 4924 0xc002aa2450 gate 1569284800145972700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.146 UTC [cauthdsl] func2 -> DEBU 4925 0xc002aa2450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.146 UTC [cauthdsl] func2 -> DEBU 4926 0xc002aa2450 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.147 UTC [cauthdsl] func2 -> DEBU 4927 0xc002aa2450 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.148 UTC [msp.identity] Verify -> DEBU 4928 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:40.148 UTC [msp.identity] Verify -> DEBU 4929 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:40.148 UTC [cauthdsl] func2 -> DEBU 492a 0xc002aa2450 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.148 UTC [cauthdsl] func1 -> DEBU 492b 0xc002aa2450 gate 1569284800145972700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:40.148 UTC [policies] Evaluate -> DEBU 492c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.149 UTC [policies] Evaluate -> DEBU 492d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.149 UTC [policies] Evaluate -> DEBU 492e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.149 UTC [policies] Evaluate -> DEBU 492f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.149 UTC [msp.identity] Verify -> DEBU 4930 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:40.149 UTC [msp.identity] Verify -> DEBU 4931 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [msp.identity] Verify -> DEBU 4932 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [msp.identity] Verify -> DEBU 4933 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [msp] DeserializeIdentity -> DEBU 4934 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [msp] DeserializeIdentity -> DEBU 4935 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4936 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4937 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4938 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [policies] Evaluate -> DEBU 4939 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [policies] Evaluate -> DEBU 493a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [policies] Evaluate -> DEBU 493b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [cauthdsl] func1 -> DEBU 493c 0xc004c78a60 gate 1569284800150854800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [cauthdsl] func2 -> DEBU 493d 0xc004c78a60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [cauthdsl] func2 -> DEBU 493e 0xc004c78a60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.150 UTC [cauthdsl] func2 -> DEBU 493f 0xc004c78a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:40.151 UTC [cauthdsl] func2 -> DEBU 4940 0xc004c78a60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.151 UTC [cauthdsl] func1 -> DEBU 4941 0xc004c78a60 gate 1569284800150854800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.151 UTC [policies] Evaluate -> DEBU 4942 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.151 UTC [policies] Evaluate -> DEBU 4943 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.153 UTC [policies] Evaluate -> DEBU 4944 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.153 UTC [cauthdsl] func1 -> DEBU 4945 0xc004c792a0 gate 1569284800153675400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.153 UTC [cauthdsl] func2 -> DEBU 4946 0xc004c792a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.153 UTC [cauthdsl] func2 -> DEBU 4947 0xc004c792a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.153 UTC [cauthdsl] func2 -> DEBU 4948 0xc004c792a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.153 UTC [msp.identity] Verify -> DEBU 4949 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:40.153 UTC [msp.identity] Verify -> DEBU 494a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:40.154 UTC [cauthdsl] func2 -> DEBU 494b 0xc004c792a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.154 UTC [cauthdsl] func1 -> DEBU 494c 0xc004c792a0 gate 1569284800153675400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:40.154 UTC [policies] Evaluate -> DEBU 494d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.154 UTC [policies] Evaluate -> DEBU 494e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.154 UTC [policies] Evaluate -> DEBU 494f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.154 UTC [policies] Evaluate -> DEBU 4950 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.154 UTC [gossip.gossip] handleMessage -> DEBU 4951 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.269 UTC [msp] DeserializeIdentity -> DEBU 4952 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.269 UTC [msp] DeserializeIdentity -> DEBU 4953 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.269 UTC [gossip.pull] Hello -> DEBU 4954 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:40.269 UTC [msp] DeserializeIdentity -> DEBU 4955 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.269 UTC [msp] DeserializeIdentity -> DEBU 4956 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.269 UTC [gossip.comm] Send -> DEBU 4957 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:40.269 UTC [gossip.comm] sendToEndpoint -> DEBU 4958 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.270 UTC [gossip.comm] sendToEndpoint -> DEBU 4959 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.271 UTC [gossip.comm] func1 -> DEBU 495a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.271 UTC [gossip.gossip] handleMessage -> DEBU 495b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.272 UTC [gossip.pull] HandleMessage -> DEBU 495c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.272 UTC [gossip.gossip] handleMessage -> DEBU 495d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.592 UTC [gossip.comm] func1 -> DEBU 495e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.592 UTC [gossip.gossip] handleMessage -> DEBU 495f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.592 UTC [msp] DeserializeIdentity -> DEBU 4960 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.592 UTC [msp] DeserializeIdentity -> DEBU 4961 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.592 UTC [gossip.gossip] handleMessage -> DEBU 4962 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.659 UTC [gossip.comm] func1 -> DEBU 4963 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.659 UTC [gossip.gossip] handleMessage -> DEBU 4964 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.659 UTC [gossip.gossip] handleMessage -> DEBU 4965 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.660 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4966 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.660 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4967 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:40.660 UTC [msp] DeserializeIdentity -> DEBU 4968 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.660 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4969 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:40.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 496a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 496b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.660 UTC [policies] Evaluate -> DEBU 496c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.660 UTC [policies] Evaluate -> DEBU 496d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:40.660 UTC [policies] Evaluate -> DEBU 496e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func1 -> DEBU 496f 0xc004a6c500 gate 1569284800660963900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 4970 0xc004a6c500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 4971 0xc004a6c500 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 4972 0xc004a6c500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 4973 0xc004a6c500 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func1 -> DEBU 4974 0xc004a6c500 gate 1569284800660963900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4975 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4976 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4977 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func1 -> DEBU 4978 0xc004a6cd40 gate 1569284800661321200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 4979 0xc004a6cd40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 497a 0xc004a6cd40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 497b 0xc004a6cd40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [msp.identity] Verify -> DEBU 497c Verify: digest = 00000000 da a6 c4 fc 9a 2c cf 55 59 aa 1c 00 fd c8 6c ef |.....,.UY.....l.| +peer0.org1.example.com | 00000010 f4 79 67 5b 16 e9 49 ce f0 f6 fc 47 69 2a 8f 62 |.yg[..I....Gi*.b|" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [msp.identity] Verify -> DEBU 497d Verify: sig = 00000000 30 44 02 20 57 82 dd c8 af d3 13 de 20 28 cc 16 |0D. W....... (..| +peer0.org1.example.com | 00000010 b0 b2 32 b6 0a 9b 65 fa 58 af 95 61 2b 3d ed 03 |..2...e.X..a+=..| +peer0.org1.example.com | 00000020 15 c8 8a 8d 02 20 04 71 fb 7c b8 2a 62 cb 4b 21 |..... .q.|.*b.K!| +peer0.org1.example.com | 00000030 02 67 90 ff fb 47 70 ce 0a 2b 0e e3 f8 2b 42 da |.g...Gp..+...+B.| +peer0.org1.example.com | 00000040 b5 21 c8 9d ae 12 |.!....|" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 497e 0xc004a6cd40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [cauthdsl] func1 -> DEBU 497f 0xc004a6cd40 gate 1569284800661321200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4980 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4981 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4982 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4983 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.662 UTC [gossip.discovery] handleAliveMessage -> DEBU 4984 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 4985 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:40.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 4986 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:40.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 4987 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:40.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 4988 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:40.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 4989 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 498a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.666 UTC [gossip.comm] func1 -> DEBU 498c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.667 UTC [gossip.gossip] handleMessage -> DEBU 498d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.667 UTC [gossip.gossip] handleMessage -> DEBU 498e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4990 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.668 UTC [msp] DeserializeIdentity -> DEBU 4991 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.669 UTC [gossip.gossip] handleMessage -> DEBU 4992 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.669 UTC [gossip.gossip] handleMessage -> DEBU 4993 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.669 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4994 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.672 UTC [msp] DeserializeIdentity -> DEBU 4995 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.673 UTC [msp] DeserializeIdentity -> DEBU 4996 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.673 UTC [msp] DeserializeIdentity -> DEBU 4997 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.674 UTC [msp] DeserializeIdentity -> DEBU 4998 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.674 UTC [msp] DeserializeIdentity -> DEBU 4999 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.674 UTC [msp] DeserializeIdentity -> DEBU 499a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.674 UTC [gossip.comm] Send -> DEBU 499b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:40.674 UTC [msp] DeserializeIdentity -> DEBU 499c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.674 UTC [gossip.comm] Send -> DEBU 499d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:40.674 UTC [gossip.comm] sendToEndpoint -> DEBU 499e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.674 UTC [gossip.comm] sendToEndpoint -> DEBU 499f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.674 UTC [gossip.comm] sendToEndpoint -> DEBU 49a0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.674 UTC [gossip.comm] sendToEndpoint -> DEBU 49a1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49a2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.749 UTC [gossip.comm] func1 -> DEBU 49a3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.750 UTC [gossip.gossip] handleMessage -> DEBU 49a4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.750 UTC [gossip.gossip] handleMessage -> DEBU 49a5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.750 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49a6 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.750 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49a7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:40.751 UTC [msp] DeserializeIdentity -> DEBU 49a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.751 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:40.751 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49aa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.751 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49ab Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:40.751 UTC [policies] Evaluate -> DEBU 49ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.751 UTC [policies] Evaluate -> DEBU 49ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:40.751 UTC [policies] Evaluate -> DEBU 49ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.751 UTC [cauthdsl] func1 -> DEBU 49af 0xc004a7d9e0 gate 1569284800751925700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.751 UTC [cauthdsl] func2 -> DEBU 49b0 0xc004a7d9e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49b1 0xc004a7d9e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49b2 0xc004a7d9e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49b3 0xc004a7d9e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [cauthdsl] func1 -> DEBU 49b4 0xc004a7d9e0 gate 1569284800751925700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [policies] Evaluate -> DEBU 49b5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [policies] Evaluate -> DEBU 49b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [policies] Evaluate -> DEBU 49b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [cauthdsl] func1 -> DEBU 49b8 0xc004aaa220 gate 1569284800752538400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49b9 0xc004aaa220 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49ba 0xc004aaa220 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49bb 0xc004aaa220 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [msp.identity] Verify -> DEBU 49bc Verify: digest = 00000000 27 2d 47 ab be 8f 96 f7 4d ce 6f a2 18 e7 ea 0b |'-G.....M.o.....| +peer0.org1.example.com | 00000010 81 cf 71 77 76 ef ea ac 82 1b 43 3a 4b f9 c2 6c |..qwv.....C:K..l|" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [msp.identity] Verify -> DEBU 49bd Verify: sig = 00000000 30 45 02 21 00 e2 78 de 35 08 9b 9a 7a a9 25 bc |0E.!..x.5...z.%.| +peer0.org1.example.com | 00000010 cc bb d8 f7 db ca 6c 07 1e aa 44 04 13 31 c4 dc |......l...D..1..| +peer0.org1.example.com | 00000020 37 6b 35 6f 08 02 20 04 8b 60 66 f7 5f f6 56 19 |7k5o.. ..`f._.V.| +peer0.org1.example.com | 00000030 0f ba be 0d 85 67 c3 91 33 7d 63 2b 4a 5d fb 28 |.....g..3}c+J].(| +peer0.org1.example.com | 00000040 eb a6 1d 54 2a 84 35 |...T*.5|" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49be 0xc004aaa220 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [cauthdsl] func1 -> DEBU 49bf 0xc004aaa220 gate 1569284800752538400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [policies] Evaluate -> DEBU 49c0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.752 UTC [policies] Evaluate -> DEBU 49c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.753 UTC [policies] Evaluate -> DEBU 49c2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.753 UTC [policies] Evaluate -> DEBU 49c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:40.753 UTC [gossip.discovery] handleAliveMessage -> DEBU 49c4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 49c5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:40.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 49c6 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:40.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 49c7 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:40.763 UTC [gossip.discovery] learnExistingMembers -> DEBU 49c8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:40.763 UTC [gossip.discovery] learnExistingMembers -> DEBU 49c9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.763 UTC [gossip.discovery] handleAliveMessage -> DEBU 49ca Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.763 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49cb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.764 UTC [gossip.discovery] sendMemResponse -> DEBU 49cc Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:40.764 UTC [msp] DeserializeIdentity -> DEBU 49cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.765 UTC [msp] DeserializeIdentity -> DEBU 49ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.766 UTC [msp] DeserializeIdentity -> DEBU 49cf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.766 UTC [gossip.comm] Send -> DEBU 49d0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:40.768 UTC [gossip.discovery] sendMemResponse -> DEBU 49d1 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" > alive: alive:\301\277\226\237p\027'\025\337\336/\330C\251?\002 &\320\266)\037\324F\245:\\s\340^R\215c\345?\377\\\036\017\304\013\222\344\023F\374uD\346" > " +peer0.org1.example.com | "2019-09-24 00:26:40.768 UTC [gossip.comm] sendToEndpoint -> DEBU 49d2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.768 UTC [gossip.comm] sendToEndpoint -> DEBU 49d3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.796 UTC [gossip.comm] func1 -> DEBU 49d4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.796 UTC [gossip.gossip] handleMessage -> DEBU 49d5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.796 UTC [gossip.pull] HandleMessage -> DEBU 49d6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.796 UTC [msp] DeserializeIdentity -> DEBU 49d7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.796 UTC [msp] DeserializeIdentity -> DEBU 49d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.797 UTC [msp] DeserializeIdentity -> DEBU 49d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.797 UTC [msp] DeserializeIdentity -> DEBU 49da Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.797 UTC [msp] DeserializeIdentity -> DEBU 49db Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.797 UTC [msp] DeserializeIdentity -> DEBU 49dc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:40.797 UTC [gossip.pull] SendDigest -> DEBU 49dd Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:40.797 UTC [gossip.gossip] handleMessage -> DEBU 49de Exiting" +peer0.org1.example.com | "2019-09-24 00:26:40.832 UTC [gossip.comm] func1 -> DEBU 49df Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.833 UTC [gossip.gossip] handleMessage -> DEBU 49e0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.833 UTC [gossip.pull] HandleMessage -> DEBU 49e1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:40.833 UTC [gossip.pull] SendDigest -> DEBU 49e2 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:40.833 UTC [gossip.gossip] handleMessage -> DEBU 49e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:41.076 UTC [gossip.gossip] handleMessage -> DEBU 49e4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:41.076 UTC [msp] DeserializeIdentity -> DEBU 49e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:41.078 UTC [msp] DeserializeIdentity -> DEBU 49e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:41.078 UTC [msp] DeserializeIdentity -> DEBU 49e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:41.078 UTC [gossip.gossip] handleMessage -> DEBU 49e8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:41.643 UTC [gossip.comm] func1 -> DEBU 49e9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:41.644 UTC [gossip.gossip] handleMessage -> DEBU 49ea Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:41.644 UTC [gossip.pull] HandleMessage -> DEBU 49eb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:41.644 UTC [gossip.pull] SendDigest -> DEBU 49ec Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:41.644 UTC [gossip.gossip] handleMessage -> DEBU 49ed Exiting" +peer0.org1.example.com | "2019-09-24 00:26:41.771 UTC [gossip.comm] func1 -> DEBU 49ee Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020D" signature:"0D\002 \022\313\017\2733\314\327\1773+\251\236\313\370\355\343\234\343\343\354\362\367\361\236&\343\017:\214\206\363\372\002 \002\210\316\275\317\266\327\201\275q\273\n\027u\030x-@\377\357\034_P\204\236\3433\205\002\240\3279" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:41.771 UTC [gossip.gossip] handleMessage -> DEBU 49ef Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020D" signature:"0D\002 \022\313\017\2733\314\327\1773+\251\236\313\370\355\343\234\343\343\354\362\367\361\236&\343\017:\214\206\363\372\002 \002\210\316\275\317\266\327\201\275q\273\n\027u\030x-@\377\357\034_P\204\236\3433\205\002\240\3279" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:41.771 UTC [gossip.gossip] handleMessage -> DEBU 49f0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:41.771 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49f1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020D" signature:"0D\002 \022\313\017\2733\314\327\1773+\251\236\313\370\355\343\234\343\343\354\362\367\361\236&\343\017:\214\206\363\372\002 \002\210\316\275\317\266\327\201\275q\273\n\027u\030x-@\377\357\034_P\204\236\3433\205\002\240\3279" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:41.771 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49f2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:41.771 UTC [msp.identity] Verify -> DEBU 49f3 Verify: digest = 00000000 9c a8 21 39 58 f2 80 27 4a db d8 48 bd d2 00 9c |..!9X..'J..H....| +peer0.org1.example.com | 00000010 f1 16 50 6c a3 7e 41 66 93 48 af 29 db 3a 16 96 |..Pl.~Af.H.).:..|" +peer0.org1.example.com | "2019-09-24 00:26:41.771 UTC [msp.identity] Verify -> DEBU 49f4 Verify: sig = 00000000 30 44 02 20 12 cb 0f bb 33 cc d7 7f 33 2b a9 9e |0D. ....3...3+..| +peer0.org1.example.com | 00000010 cb f8 ed e3 9c e3 e3 ec f2 f7 f1 9e 26 e3 0f 3a |............&..:| +peer0.org1.example.com | 00000020 8c 86 f3 fa 02 20 02 88 ce bd cf b6 d7 81 bd 71 |..... .........q| +peer0.org1.example.com | 00000030 bb 0a 17 75 18 78 2d 40 ff ef 1c 5f 50 84 9e e3 |...u.x-@..._P...| +peer0.org1.example.com | 00000040 33 85 02 a0 d7 39 |3....9|" +peer0.org1.example.com | "2019-09-24 00:26:41.771 UTC [msp.identity] Verify -> DEBU 49f5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:41.771 UTC [msp.identity] Verify -> DEBU 49f6 Verify: sig = 00000000 30 45 02 21 00 c9 21 e8 7f 7b f8 a2 ae 36 e8 e7 |0E.!..!..{...6..| +peer0.org1.example.com | 00000010 9b 36 86 52 c0 f4 74 b7 66 d6 49 16 cb ee 92 df |.6.R..t.f.I.....| +peer0.org1.example.com | 00000020 2d 0e a4 2a 53 02 20 2e 5c a5 3b b9 1f 56 fd 98 |-..*S. .\.;..V..| +peer0.org1.example.com | 00000030 81 31 01 4d 38 33 4f 3c da 58 8f e7 d4 b6 a8 c9 |.1.M83O<.X......| +peer0.org1.example.com | 00000040 ca 3c 1b e9 41 64 9e |.<..Ad.|" +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [gossip.discovery] handleAliveMessage -> DEBU 49f7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [gossip.discovery] learnExistingMembers -> DEBU 49f8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [gossip.discovery] learnExistingMembers -> DEBU 49f9 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [gossip.discovery] learnExistingMembers -> DEBU 49fa Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [gossip.discovery] learnExistingMembers -> DEBU 49fb Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [gossip.discovery] learnExistingMembers -> DEBU 49fc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [gossip.discovery] handleAliveMessage -> DEBU 49fd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49fe Exiting" +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [gossip.discovery] sendMemResponse -> DEBU 49ff Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [msp] DeserializeIdentity -> DEBU 4a00 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [msp] DeserializeIdentity -> DEBU 4a01 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:41.772 UTC [gossip.comm] Send -> DEBU 4a02 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:41.773 UTC [gossip.discovery] sendMemResponse -> DEBU 4a03 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020D" signature:"0D\002 \022\313\017\2733\314\327\1773+\251\236\313\370\355\343\234\343\343\354\362\367\361\236&\343\017:\214\206\363\372\002 \002\210\316\275\317\266\327\201\275q\273\n\027u\030x-@\377\357\034_P\204\236\3433\205\002\240\3279" secret_envelope: > alive:\301\277\226\237p\027'\025\337\336/\330C\251?\002 &\320\266)\037\324F\245:\\s\340^R\215c\345?\377\\\036\017\304\013\222\344\023F\374uD\346" > " +peer0.org1.example.com | "2019-09-24 00:26:41.773 UTC [gossip.comm] sendToEndpoint -> DEBU 4a04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:41.773 UTC [gossip.comm] sendToEndpoint -> DEBU 4a05 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:42.008 UTC [gossip.comm] func1 -> DEBU 4a06 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.008 UTC [gossip.gossip] handleMessage -> DEBU 4a07 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.009 UTC [msp] DeserializeIdentity -> DEBU 4a08 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.009 UTC [msp] DeserializeIdentity -> DEBU 4a09 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.009 UTC [msp] DeserializeIdentity -> DEBU 4a0a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.009 UTC [gossip.gossip] handleMessage -> DEBU 4a0b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:42.308 UTC [gossip.election] waitForInterrupt -> DEBU 4a0c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:42.308 UTC [gossip.election] IsLeader -> DEBU 4a0d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:42.308 UTC [msp] GetDefaultSigningIdentity -> DEBU 4a0e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:42.308 UTC [msp.identity] Sign -> DEBU 4a0f Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510161801 " +peer0.org1.example.com | "2019-09-24 00:26:42.308 UTC [msp.identity] Sign -> DEBU 4a10 Sign: digest: DC12558297680A3FC7D81BA40F316A02C2121A94F3861D6EDDA34FB2061DA543 " +peer0.org1.example.com | "2019-09-24 00:26:42.308 UTC [gossip.election] waitForInterrupt -> DEBU 4a11 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:42.308 UTC [msp] DeserializeIdentity -> DEBU 4a12 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.308 UTC [msp] DeserializeIdentity -> DEBU 4a13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.308 UTC [msp] DeserializeIdentity -> DEBU 4a14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.308 UTC [msp] DeserializeIdentity -> DEBU 4a15 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.309 UTC [gossip.comm] Send -> DEBU 4a16 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:42.309 UTC [msp] DeserializeIdentity -> DEBU 4a17 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.309 UTC [msp] DeserializeIdentity -> DEBU 4a18 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.309 UTC [gossip.comm] sendToEndpoint -> DEBU 4a19 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.309 UTC [gossip.comm] sendToEndpoint -> DEBU 4a1a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:42.689 UTC [gossip.comm] func1 -> DEBU 4a1b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.689 UTC [gossip.gossip] handleMessage -> DEBU 4a1c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.689 UTC [gossip.gossip] handleMessage -> DEBU 4a1d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:42.689 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a1e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.689 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a1f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:42.689 UTC [msp.identity] Verify -> DEBU 4a20 Verify: digest = 00000000 e1 8d dc 39 38 3a 08 39 f0 a3 12 1e f3 e8 63 00 |...98:.9......c.| +peer0.org1.example.com | 00000010 50 20 2b db 32 70 45 6d 58 52 b1 6c a0 a0 b7 59 |P +.2pEmXR.l...Y|" +peer0.org1.example.com | "2019-09-24 00:26:42.689 UTC [msp.identity] Verify -> DEBU 4a21 Verify: sig = 00000000 30 45 02 21 00 cf 3c ff e1 8b a8 bd fb 05 28 64 |0E.!..<.......(d| +peer0.org1.example.com | 00000010 dd d6 25 62 1f bf d1 31 ba 04 72 90 67 0f c1 89 |..%b...1..r.g...| +peer0.org1.example.com | 00000020 9d 4b 4f 24 89 02 20 7e bc 57 26 44 c3 81 fe 5e |.KO$.. ~.W&D...^| +peer0.org1.example.com | 00000030 59 8b a0 ed c4 e9 8c 09 84 0e 30 db ef 4b e6 b0 |Y.........0..K..| +peer0.org1.example.com | 00000040 87 f5 c0 8d 00 55 11 |.....U.|" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a22 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a23 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a24 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a25 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a26 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a27 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a28 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a29 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [msp] DeserializeIdentity -> DEBU 4a2a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [msp] DeserializeIdentity -> DEBU 4a2b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [msp] DeserializeIdentity -> DEBU 4a2c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.comm] Send -> DEBU 4a2d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [msp] DeserializeIdentity -> DEBU 4a2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.comm] Send -> DEBU 4a2f Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.comm] sendToEndpoint -> DEBU 4a30 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.comm] sendToEndpoint -> DEBU 4a31 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:42.690 UTC [gossip.comm] sendToEndpoint -> DEBU 4a32 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.691 UTC [gossip.comm] sendToEndpoint -> DEBU 4a33 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:42.701 UTC [gossip.comm] func1 -> DEBU 4a34 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.701 UTC [gossip.gossip] handleMessage -> DEBU 4a35 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.701 UTC [gossip.gossip] handleMessage -> DEBU 4a36 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:42.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a37 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:42.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a38 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.697 UTC [gossip.pull] Hello -> DEBU 4a39 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:43.697 UTC [gossip.comm] Send -> DEBU 4a3a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:43.697 UTC [gossip.pull] Hello -> DEBU 4a3b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:43.697 UTC [gossip.comm] Send -> DEBU 4a3c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:43.698 UTC [gossip.pull] Hello -> DEBU 4a3d Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a3e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a3f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.698 UTC [gossip.comm] Send -> DEBU 4a40 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a41 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a42 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a43 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a44 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.703 UTC [gossip.comm] func1 -> DEBU 4a45 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.703 UTC [gossip.gossip] handleMessage -> DEBU 4a46 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.703 UTC [gossip.pull] HandleMessage -> DEBU 4a47 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.703 UTC [gossip.gossip] handleMessage -> DEBU 4a48 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.703 UTC [gossip.gossip] handleMessage -> DEBU 4a49 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.703 UTC [gossip.pull] HandleMessage -> DEBU 4a4a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.703 UTC [gossip.gossip] handleMessage -> DEBU 4a4b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.703 UTC [gossip.comm] func1 -> DEBU 4a4c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.704 UTC [gossip.gossip] handleMessage -> DEBU 4a4d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.704 UTC [gossip.pull] HandleMessage -> DEBU 4a4e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.704 UTC [gossip.gossip] handleMessage -> DEBU 4a4f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [msp] GetDefaultSigningIdentity -> DEBU 4a50 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [msp.identity] Sign -> DEBU 4a51 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151041 " +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [msp.identity] Sign -> DEBU 4a52 Sign: digest: B8D28E7491E690028C15EA9CFF6BC94CF827EEBD30BD59C78BA22113B7BCA584 " +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [msp] GetDefaultSigningIdentity -> DEBU 4a53 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [msp.identity] Sign -> DEBU 4a54 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [msp.identity] Sign -> DEBU 4a55 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [gossip.comm] Send -> DEBU 4a56 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [msp] DeserializeIdentity -> DEBU 4a57 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [gossip.comm] Send -> DEBU 4a58 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [msp] DeserializeIdentity -> DEBU 4a59 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [gossip.comm] sendToEndpoint -> DEBU 4a5a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [gossip.comm] Send -> DEBU 4a5b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [gossip.comm] sendToEndpoint -> DEBU 4a5c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [gossip.comm] sendToEndpoint -> DEBU 4a5d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.838 UTC [gossip.comm] sendToEndpoint -> DEBU 4a5e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.839 UTC [gossip.comm] sendToEndpoint -> DEBU 4a5f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.839 UTC [gossip.comm] sendToEndpoint -> DEBU 4a60 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.843 UTC [gossip.comm] func1 -> DEBU 4a61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.843 UTC [gossip.gossip] handleMessage -> DEBU 4a62 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.843 UTC [gossip.gossip] handleMessage -> DEBU 4a63 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.843 UTC [gossip.gossip] handleMessage -> DEBU 4a64 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a65 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a66 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [msp.identity] Verify -> DEBU 4a67 Verify: digest = 00000000 b8 d2 8e 74 91 e6 90 02 8c 15 ea 9c ff 6b c9 4c |...t.........k.L| +peer0.org1.example.com | 00000010 f8 27 ee bd 30 bd 59 c7 8b a2 21 13 b7 bc a5 84 |.'..0.Y...!.....|" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [msp.identity] Verify -> DEBU 4a68 Verify: sig = 00000000 30 44 02 20 29 78 cb af da 63 2d 9d bc 7a 48 04 |0D. )x...c-..zH.| +peer0.org1.example.com | 00000010 64 87 da 90 98 e2 38 a9 85 bf e3 46 67 3c 15 40 |d.....8....Fg<.@| +peer0.org1.example.com | 00000020 0a ea 80 92 02 20 6d b6 50 6a c3 0c 56 25 38 d4 |..... m.Pj..V%8.| +peer0.org1.example.com | 00000030 e7 ed 57 22 1f b6 f7 7d 43 22 19 cc ff 46 3d b3 |..W"...}C"...F=.| +peer0.org1.example.com | 00000040 9e b9 73 b9 b7 c0 |..s...|" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a69 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [gossip.discovery] isSentByMe -> DEBU 4a6a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a6b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a6c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [msp] DeserializeIdentity -> DEBU 4a6d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [gossip.comm] func1 -> DEBU 4a6e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a6f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a70 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:43.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a71 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a73 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func1 -> DEBU 4a75 0xc0042d1990 gate 1569284803845111800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a76 0xc0042d1990 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a77 0xc0042d1990 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a78 0xc0042d1990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a79 0xc0042d1990 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func1 -> DEBU 4a7a 0xc0042d1990 gate 1569284803845111800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a7b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func1 -> DEBU 4a7e 0xc0042de1d0 gate 1569284803845408800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a7f 0xc0042de1d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a80 0xc0042de1d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a81 0xc0042de1d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [msp.identity] Verify -> DEBU 4a82 Verify: digest = 00000000 27 2d 47 ab be 8f 96 f7 4d ce 6f a2 18 e7 ea 0b |'-G.....M.o.....| +peer0.org1.example.com | 00000010 81 cf 71 77 76 ef ea ac 82 1b 43 3a 4b f9 c2 6c |..qwv.....C:K..l|" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [msp.identity] Verify -> DEBU 4a83 Verify: sig = 00000000 30 45 02 21 00 e2 78 de 35 08 9b 9a 7a a9 25 bc |0E.!..x.5...z.%.| +peer0.org1.example.com | 00000010 cc bb d8 f7 db ca 6c 07 1e aa 44 04 13 31 c4 dc |......l...D..1..| +peer0.org1.example.com | 00000020 37 6b 35 6f 08 02 20 04 8b 60 66 f7 5f f6 56 19 |7k5o.. ..`f._.V.| +peer0.org1.example.com | 00000030 0f ba be 0d 85 67 c3 91 33 7d 63 2b 4a 5d fb 28 |.....g..3}c+J].(| +peer0.org1.example.com | 00000040 eb a6 1d 54 2a 84 35 |...T*.5|" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a84 0xc0042de1d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [cauthdsl] func1 -> DEBU 4a85 0xc0042de1d0 gate 1569284803845408800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a88 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a8a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a8b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a8c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a8d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.846 UTC [gossip.gossip] handleMessage -> DEBU 4a8e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a8f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:43.846 UTC [gossip.gossip] handleMessage -> DEBU 4a90 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.846 UTC [msp.identity] Verify -> DEBU 4a91 Verify: digest = 00000000 b8 d2 8e 74 91 e6 90 02 8c 15 ea 9c ff 6b c9 4c |...t.........k.L| +peer0.org1.example.com | 00000010 f8 27 ee bd 30 bd 59 c7 8b a2 21 13 b7 bc a5 84 |.'..0.Y...!.....|" +peer0.org1.example.com | "2019-09-24 00:26:43.846 UTC [msp.identity] Verify -> DEBU 4a92 Verify: sig = 00000000 30 44 02 20 29 78 cb af da 63 2d 9d bc 7a 48 04 |0D. )x...c-..zH.| +peer0.org1.example.com | 00000010 64 87 da 90 98 e2 38 a9 85 bf e3 46 67 3c 15 40 |d.....8....Fg<.@| +peer0.org1.example.com | 00000020 0a ea 80 92 02 20 6d b6 50 6a c3 0c 56 25 38 d4 |..... m.Pj..V%8.| +peer0.org1.example.com | 00000030 e7 ed 57 22 1f b6 f7 7d 43 22 19 cc ff 46 3d b3 |..W"...}C"...F=.| +peer0.org1.example.com | 00000040 9e b9 73 b9 b7 c0 |..s...|" +peer0.org1.example.com | "2019-09-24 00:26:43.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a93 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.846 UTC [gossip.discovery] isSentByMe -> DEBU 4a94 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a95 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a96 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:43.847 UTC [msp] DeserializeIdentity -> DEBU 4a97 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:43.847 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a98 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:43.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a99 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:43.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a9a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:43.847 UTC [policies] Evaluate -> DEBU 4a9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:43.847 UTC [policies] Evaluate -> DEBU 4a9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:43.853 UTC [policies] Evaluate -> DEBU 4a9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:43.853 UTC [cauthdsl] func1 -> DEBU 4a9e 0xc0042f68a0 gate 1569284803853435200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:43.853 UTC [cauthdsl] func2 -> DEBU 4a9f 0xc0042f68a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:43.853 UTC [cauthdsl] func2 -> DEBU 4aa0 0xc0042f68a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:43.853 UTC [cauthdsl] func2 -> DEBU 4aa1 0xc0042f68a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:43.853 UTC [cauthdsl] func2 -> DEBU 4aa2 0xc0042f68a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [cauthdsl] func1 -> DEBU 4aa3 0xc0042f68a0 gate 1569284803853435200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4aa4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4aa5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4aa6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [cauthdsl] func1 -> DEBU 4aa7 0xc0042f70e0 gate 1569284803854186600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [cauthdsl] func2 -> DEBU 4aa8 0xc0042f70e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [cauthdsl] func2 -> DEBU 4aa9 0xc0042f70e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [cauthdsl] func2 -> DEBU 4aaa 0xc0042f70e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [msp.identity] Verify -> DEBU 4aab Verify: digest = 00000000 4e 6d b8 1b 23 95 85 25 3e a8 cc 0a 33 ea 4f 47 |Nm..#..%>...3.OG| +peer0.org1.example.com | 00000010 1b 6e a2 cf 5a 8e 12 90 31 7e a5 83 f9 bb c9 6e |.n..Z...1~.....n|" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [msp.identity] Verify -> DEBU 4aac Verify: sig = 00000000 30 45 02 21 00 8d f2 4a d8 f4 06 79 ac fb 76 b1 |0E.!...J...y..v.| +peer0.org1.example.com | 00000010 88 0a 89 61 71 2d a0 55 8d 6c d5 0c 20 68 08 8b |...aq-.U.l.. h..| +peer0.org1.example.com | 00000020 7e 4b b4 46 07 02 20 51 b3 28 20 68 62 23 47 fb |~K.F.. Q.( hb#G.| +peer0.org1.example.com | 00000030 3c a1 ae b9 bc ac 48 ea 03 f1 98 a8 7b 5b 7b b4 |<.....H.....{[{.| +peer0.org1.example.com | 00000040 f9 81 04 b8 5b 45 4e |....[EN|" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [cauthdsl] func2 -> DEBU 4aad 0xc0042f70e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [cauthdsl] func1 -> DEBU 4aae 0xc0042f70e0 gate 1569284803854186600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4aaf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4ab0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4ab1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4ab2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ab3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ab4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ab5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.854 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ab6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.855 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ab7 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:43.855 UTC [msp.identity] Verify -> DEBU 4ab8 Verify: digest = 00000000 b8 d2 8e 74 91 e6 90 02 8c 15 ea 9c ff 6b c9 4c |...t.........k.L| +peer0.org1.example.com | 00000010 f8 27 ee bd 30 bd 59 c7 8b a2 21 13 b7 bc a5 84 |.'..0.Y...!.....|" +peer0.org1.example.com | "2019-09-24 00:26:43.855 UTC [msp.identity] Verify -> DEBU 4ab9 Verify: sig = 00000000 30 44 02 20 29 78 cb af da 63 2d 9d bc 7a 48 04 |0D. )x...c-..zH.| +peer0.org1.example.com | 00000010 64 87 da 90 98 e2 38 a9 85 bf e3 46 67 3c 15 40 |d.....8....Fg<.@| +peer0.org1.example.com | 00000020 0a ea 80 92 02 20 6d b6 50 6a c3 0c 56 25 38 d4 |..... m.Pj..V%8.| +peer0.org1.example.com | 00000030 e7 ed 57 22 1f b6 f7 7d 43 22 19 cc ff 46 3d b3 |..W"...}C"...F=.| +peer0.org1.example.com | 00000040 9e b9 73 b9 b7 c0 |..s...|" +peer0.org1.example.com | "2019-09-24 00:26:43.855 UTC [gossip.gossip] handleMessage -> DEBU 4aba Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.855 UTC [msp.identity] Verify -> DEBU 4abb Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:43.855 UTC [msp.identity] Verify -> DEBU 4abc Verify: sig = 00000000 30 44 02 20 2e 41 36 f4 89 18 da 71 5d e9 d8 93 |0D. .A6....q]...| +peer0.org1.example.com | 00000010 5d 25 d9 f0 69 45 64 29 f5 67 cd ee 3d 7d f2 6e |]%..iEd).g..=}.n| +peer0.org1.example.com | 00000020 6f 97 8d 54 02 20 46 c1 c2 c8 75 5b c4 ab 42 cc |o..T. F...u[..B.| +peer0.org1.example.com | 00000030 88 8a 1f e2 53 4b 25 a3 c4 43 bc 5f 80 5a 39 2d |....SK%..C._.Z9-| +peer0.org1.example.com | 00000040 05 29 03 18 78 0a |.)..x.|" +peer0.org1.example.com | "2019-09-24 00:26:43.855 UTC [gossip.discovery] handleAliveMessage -> DEBU 4abd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.855 UTC [gossip.discovery] isSentByMe -> DEBU 4abe Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.855 UTC [gossip.discovery] handleAliveMessage -> DEBU 4abf Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ac0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:43.909 UTC [gossip.gossip] handleMessage -> DEBU 4ac1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.911 UTC [gossip.pull] HandleMessage -> DEBU 4ac2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:43.911 UTC [gossip.pull] SendDigest -> DEBU 4ac9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:43.911 UTC [gossip.gossip] handleMessage -> DEBU 4aca Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.013 UTC [gossip.gossip] handleMessage -> DEBU 4acb Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.013 UTC [gossip.gossip] handleMessage -> DEBU 4acc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4acd Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.016 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ace Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:44.016 UTC [msp] DeserializeIdentity -> DEBU 4acf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.016 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ad0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:44.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ad1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ad2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.020 UTC [policies] Evaluate -> DEBU 4ad3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.020 UTC [policies] Evaluate -> DEBU 4ad4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:44.020 UTC [policies] Evaluate -> DEBU 4ad5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.020 UTC [cauthdsl] func1 -> DEBU 4ad6 0xc00281a310 gate 1569284804020902100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.020 UTC [cauthdsl] func2 -> DEBU 4ad7 0xc00281a310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.021 UTC [cauthdsl] func2 -> DEBU 4ad8 0xc00281a310 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.021 UTC [cauthdsl] func2 -> DEBU 4ad9 0xc00281a310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [cauthdsl] func2 -> DEBU 4ada 0xc00281a310 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [cauthdsl] func1 -> DEBU 4adb 0xc00281a310 gate 1569284804020902100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4adc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4add == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4ade == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [cauthdsl] func1 -> DEBU 4adf 0xc00281ab50 gate 1569284804022288400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [cauthdsl] func2 -> DEBU 4ae0 0xc00281ab50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [cauthdsl] func2 -> DEBU 4ae1 0xc00281ab50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [cauthdsl] func2 -> DEBU 4ae2 0xc00281ab50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [msp.identity] Verify -> DEBU 4ae3 Verify: digest = 00000000 b1 aa bb c7 67 a1 6d 08 eb 86 c8 9e b4 cc 75 5f |....g.m.......u_| +peer0.org1.example.com | 00000010 d1 1c bc 59 a9 de ea 7b 13 0b 0d a6 0a 65 e9 19 |...Y...{.....e..|" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [msp.identity] Verify -> DEBU 4ae4 Verify: sig = 00000000 30 45 02 21 00 9a b8 0d ea 54 7d d8 fe d0 5e 72 |0E.!.....T}...^r| +peer0.org1.example.com | 00000010 10 0e 19 33 f1 8d 6d 99 44 78 86 05 a3 fe 7e d8 |...3..m.Dx....~.| +peer0.org1.example.com | 00000020 d3 59 ee 62 17 02 20 1b 37 dd 6f 3f 72 e0 99 e0 |.Y.b.. .7.o?r...| +peer0.org1.example.com | 00000030 08 42 09 30 9e 60 9b 77 e8 12 d4 17 66 9c 53 41 |.B.0.`.w....f.SA| +peer0.org1.example.com | 00000040 64 d2 05 d4 a1 df 21 |d.....!|" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [cauthdsl] func2 -> DEBU 4ae5 0xc00281ab50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [cauthdsl] func1 -> DEBU 4ae6 0xc00281ab50 gate 1569284804022288400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4ae7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4ae8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4ae9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4aea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [gossip.discovery] handleAliveMessage -> DEBU 4aeb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aec Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aed updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aee Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aef Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 4af0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [gossip.discovery] handleAliveMessage -> DEBU 4af1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4af2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [gossip.discovery] sendMemResponse -> DEBU 4af3 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [msp] DeserializeIdentity -> DEBU 4af4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [msp] DeserializeIdentity -> DEBU 4af5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [msp] DeserializeIdentity -> DEBU 4af6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [gossip.comm] Send -> DEBU 4af7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:44.023 UTC [gossip.discovery] sendMemResponse -> DEBU 4af8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020E" signature:"0E\002!\000\317<\377\341\213\250\275\373\005(d\335\326%b\037\277\3211\272\004r\220g\017\301\211\235KO$\211\002 ~\274W&D\303\201\376^Y\213\240\355\304\351\214\t\204\0160\333\357K\346\260\207\365\300\215\000U\021" > alive: alive: alive:\301\277\226\237p\027'\025\337\336/\330C\251?\002 &\320\266)\037\324F\245:\\s\340^R\215c\345?\377\\\036\017\304\013\222\344\023F\374uD\346" > " +peer0.org1.example.com | "2019-09-24 00:26:44.024 UTC [gossip.comm] sendToEndpoint -> DEBU 4af9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.024 UTC [gossip.comm] sendToEndpoint -> DEBU 4afa Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.081 UTC [msp] DeserializeIdentity -> DEBU 4afb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.082 UTC [msp] DeserializeIdentity -> DEBU 4afc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.086 UTC [gossip.comm] Send -> DEBU 4afd Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4afe Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4aff Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4b00 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4b01 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4b02 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4b03 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.118 UTC [gossip.comm] func1 -> DEBU 4b04 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.118 UTC [gossip.gossip] handleMessage -> DEBU 4b05 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.119 UTC [msp.identity] Verify -> DEBU 4b06 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:44.119 UTC [msp.identity] Verify -> DEBU 4b07 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:44.120 UTC [msp.identity] Verify -> DEBU 4b08 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:44.120 UTC [msp.identity] Verify -> DEBU 4b09 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:44.120 UTC [msp] DeserializeIdentity -> DEBU 4b0a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.120 UTC [msp] DeserializeIdentity -> DEBU 4b0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.123 UTC [gossip.comm] func1 -> DEBU 4b0c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.126 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b0d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:44.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b0e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b0f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.126 UTC [policies] Evaluate -> DEBU 4b10 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.126 UTC [policies] Evaluate -> DEBU 4b11 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:44.126 UTC [policies] Evaluate -> DEBU 4b12 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.127 UTC [cauthdsl] func1 -> DEBU 4b13 0xc002858420 gate 1569284804127053200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.127 UTC [cauthdsl] func2 -> DEBU 4b14 0xc002858420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.128 UTC [cauthdsl] func2 -> DEBU 4b15 0xc002858420 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.129 UTC [cauthdsl] func2 -> DEBU 4b16 0xc002858420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:44.129 UTC [cauthdsl] func2 -> DEBU 4b17 0xc002858420 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [cauthdsl] func1 -> DEBU 4b18 0xc002858420 gate 1569284804127053200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [policies] Evaluate -> DEBU 4b19 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [policies] Evaluate -> DEBU 4b1a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [policies] Evaluate -> DEBU 4b1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [cauthdsl] func1 -> DEBU 4b1c 0xc002858c60 gate 1569284804130178300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [cauthdsl] func2 -> DEBU 4b1d 0xc002858c60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [cauthdsl] func2 -> DEBU 4b1e 0xc002858c60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [cauthdsl] func2 -> DEBU 4b1f 0xc002858c60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [msp.identity] Verify -> DEBU 4b20 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [msp.identity] Verify -> DEBU 4b21 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [cauthdsl] func2 -> DEBU 4b22 0xc002858c60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.130 UTC [cauthdsl] func1 -> DEBU 4b23 0xc002858c60 gate 1569284804130178300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:44.131 UTC [policies] Evaluate -> DEBU 4b24 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.132 UTC [policies] Evaluate -> DEBU 4b25 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.132 UTC [policies] Evaluate -> DEBU 4b26 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.132 UTC [policies] Evaluate -> DEBU 4b27 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.133 UTC [msp] DeserializeIdentity -> DEBU 4b28 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.133 UTC [msp] DeserializeIdentity -> DEBU 4b29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.133 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b2a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:44.133 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b2b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.133 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b2c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.133 UTC [policies] Evaluate -> DEBU 4b2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.133 UTC [policies] Evaluate -> DEBU 4b2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:44.133 UTC [policies] Evaluate -> DEBU 4b2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.133 UTC [cauthdsl] func1 -> DEBU 4b30 0xc002864430 gate 1569284804133869800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.133 UTC [cauthdsl] func2 -> DEBU 4b31 0xc002864430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.133 UTC [cauthdsl] func2 -> DEBU 4b32 0xc002864430 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b33 0xc002864430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b34 0xc002864430 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [cauthdsl] func1 -> DEBU 4b35 0xc002864430 gate 1569284804133869800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b36 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [cauthdsl] func1 -> DEBU 4b39 0xc002864c70 gate 1569284804134230800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b3a 0xc002864c70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b3b 0xc002864c70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b3c 0xc002864c70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [msp.identity] Verify -> DEBU 4b3d Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [msp.identity] Verify -> DEBU 4b3e Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b3f 0xc002864c70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [cauthdsl] func1 -> DEBU 4b40 0xc002864c70 gate 1569284804134230800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b41 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b43 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b44 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.134 UTC [gossip.gossip] handleMessage -> DEBU 4b45 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.135 UTC [gossip.gossip] handleMessage -> DEBU 4b46 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.135 UTC [msp] DeserializeIdentity -> DEBU 4b47 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.135 UTC [msp] DeserializeIdentity -> DEBU 4b48 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.135 UTC [msp] DeserializeIdentity -> DEBU 4b49 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.135 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b4a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:44.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b4b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b4c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.136 UTC [policies] Evaluate -> DEBU 4b4d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.136 UTC [policies] Evaluate -> DEBU 4b4e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:44.137 UTC [policies] Evaluate -> DEBU 4b4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.137 UTC [cauthdsl] func1 -> DEBU 4b50 0xc0049e0780 gate 1569284804137331000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.137 UTC [cauthdsl] func2 -> DEBU 4b51 0xc0049e0780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.137 UTC [cauthdsl] func2 -> DEBU 4b52 0xc0049e0780 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.137 UTC [cauthdsl] func2 -> DEBU 4b53 0xc0049e0780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:44.137 UTC [cauthdsl] func2 -> DEBU 4b54 0xc0049e0780 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.138 UTC [cauthdsl] func1 -> DEBU 4b55 0xc0049e0780 gate 1569284804137331000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.138 UTC [policies] Evaluate -> DEBU 4b56 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.138 UTC [policies] Evaluate -> DEBU 4b57 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.138 UTC [policies] Evaluate -> DEBU 4b58 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.138 UTC [cauthdsl] func1 -> DEBU 4b59 0xc0049e0fc0 gate 1569284804138773400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.139 UTC [cauthdsl] func2 -> DEBU 4b5a 0xc0049e0fc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.139 UTC [cauthdsl] func2 -> DEBU 4b5b 0xc0049e0fc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.140 UTC [cauthdsl] func2 -> DEBU 4b5c 0xc0049e0fc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.140 UTC [msp.identity] Verify -> DEBU 4b5d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:44.140 UTC [msp.identity] Verify -> DEBU 4b5e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:44.141 UTC [cauthdsl] func2 -> DEBU 4b5f 0xc0049e0fc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.141 UTC [cauthdsl] func1 -> DEBU 4b60 0xc0049e0fc0 gate 1569284804138773400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:44.141 UTC [policies] Evaluate -> DEBU 4b61 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.141 UTC [policies] Evaluate -> DEBU 4b62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.141 UTC [policies] Evaluate -> DEBU 4b63 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.141 UTC [policies] Evaluate -> DEBU 4b64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.143 UTC [msp.identity] Verify -> DEBU 4b65 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:44.143 UTC [msp.identity] Verify -> DEBU 4b66 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:44.143 UTC [msp.identity] Verify -> DEBU 4b67 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:44.143 UTC [msp.identity] Verify -> DEBU 4b68 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:44.144 UTC [msp] DeserializeIdentity -> DEBU 4b69 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.144 UTC [msp] DeserializeIdentity -> DEBU 4b6a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.145 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b6b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:44.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b6c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b6d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.145 UTC [policies] Evaluate -> DEBU 4b6e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.145 UTC [policies] Evaluate -> DEBU 4b6f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:44.145 UTC [policies] Evaluate -> DEBU 4b70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.145 UTC [cauthdsl] func1 -> DEBU 4b71 0xc0049f55d0 gate 1569284804145359800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.145 UTC [cauthdsl] func2 -> DEBU 4b72 0xc0049f55d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.146 UTC [cauthdsl] func2 -> DEBU 4b73 0xc0049f55d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.146 UTC [cauthdsl] func2 -> DEBU 4b74 0xc0049f55d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:44.146 UTC [cauthdsl] func2 -> DEBU 4b75 0xc0049f55d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.146 UTC [cauthdsl] func1 -> DEBU 4b76 0xc0049f55d0 gate 1569284804145359800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.147 UTC [policies] Evaluate -> DEBU 4b77 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.147 UTC [policies] Evaluate -> DEBU 4b78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.147 UTC [policies] Evaluate -> DEBU 4b79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [cauthdsl] func1 -> DEBU 4b7a 0xc0049f5e10 gate 1569284804147986700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [cauthdsl] func2 -> DEBU 4b7b 0xc0049f5e10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [cauthdsl] func2 -> DEBU 4b7c 0xc0049f5e10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [cauthdsl] func2 -> DEBU 4b7d 0xc0049f5e10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [msp.identity] Verify -> DEBU 4b7e Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [msp.identity] Verify -> DEBU 4b7f Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [cauthdsl] func2 -> DEBU 4b80 0xc0049f5e10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [cauthdsl] func1 -> DEBU 4b81 0xc0049f5e10 gate 1569284804147986700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [policies] Evaluate -> DEBU 4b82 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [policies] Evaluate -> DEBU 4b83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [policies] Evaluate -> DEBU 4b84 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [policies] Evaluate -> DEBU 4b85 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [gossip.gossip] handleMessage -> DEBU 4b86 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [gossip.gossip] handleMessage -> DEBU 4b87 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [msp] DeserializeIdentity -> DEBU 4b88 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [msp] DeserializeIdentity -> DEBU 4b89 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [msp] DeserializeIdentity -> DEBU 4b8a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.148 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b8b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b8c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b8d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b90 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [cauthdsl] func1 -> DEBU 4b91 0xc004a0b920 gate 1569284804149146500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b92 0xc004a0b920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b93 0xc004a0b920 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b94 0xc004a0b920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b95 0xc004a0b920 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [cauthdsl] func1 -> DEBU 4b96 0xc004a0b920 gate 1569284804149146500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b97 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b99 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [cauthdsl] func1 -> DEBU 4b9a 0xc004a24160 gate 1569284804149735500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b9b 0xc004a24160 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b9c 0xc004a24160 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b9d 0xc004a24160 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [msp.identity] Verify -> DEBU 4b9e Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [msp.identity] Verify -> DEBU 4b9f Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4ba0 0xc004a24160 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.150 UTC [cauthdsl] func1 -> DEBU 4ba1 0xc004a24160 gate 1569284804149735500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:44.150 UTC [policies] Evaluate -> DEBU 4ba2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.150 UTC [policies] Evaluate -> DEBU 4ba3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.150 UTC [policies] Evaluate -> DEBU 4ba4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.150 UTC [policies] Evaluate -> DEBU 4ba5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.150 UTC [msp.identity] Verify -> DEBU 4ba6 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:44.150 UTC [msp.identity] Verify -> DEBU 4ba7 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:44.150 UTC [msp] DeserializeIdentity -> DEBU 4ba8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.150 UTC [msp] DeserializeIdentity -> DEBU 4ba9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4baa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bab Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bac Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4bad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4bae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4baf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [cauthdsl] func1 -> DEBU 4bb0 0xc004a38050 gate 1569284804151208200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bb1 0xc004a38050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bb2 0xc004a38050 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bb3 0xc004a38050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bb4 0xc004a38050 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [cauthdsl] func1 -> DEBU 4bb5 0xc004a38050 gate 1569284804151208200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4bb6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4bb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4bb8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [cauthdsl] func1 -> DEBU 4bb9 0xc004a38890 gate 1569284804151738500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bba 0xc004a38890 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bbb 0xc004a38890 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bbc 0xc004a38890 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [msp.identity] Verify -> DEBU 4bbd Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:44.151 UTC [msp.identity] Verify -> DEBU 4bbe Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:44.152 UTC [cauthdsl] func2 -> DEBU 4bbf 0xc004a38890 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.152 UTC [cauthdsl] func1 -> DEBU 4bc0 0xc004a38890 gate 1569284804151738500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:44.152 UTC [policies] Evaluate -> DEBU 4bc1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.152 UTC [policies] Evaluate -> DEBU 4bc2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.152 UTC [policies] Evaluate -> DEBU 4bc3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.152 UTC [policies] Evaluate -> DEBU 4bc4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.152 UTC [msp.identity] Verify -> DEBU 4bc5 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:44.152 UTC [msp.identity] Verify -> DEBU 4bc6 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:44.152 UTC [gossip.gossip] handleMessage -> DEBU 4bc7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.273 UTC [msp] DeserializeIdentity -> DEBU 4bc8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.274 UTC [msp] DeserializeIdentity -> DEBU 4bc9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.274 UTC [gossip.pull] Hello -> DEBU 4bca Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:44.274 UTC [msp] DeserializeIdentity -> DEBU 4bcb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.274 UTC [msp] DeserializeIdentity -> DEBU 4bcc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.274 UTC [gossip.comm] Send -> DEBU 4bcd Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:44.274 UTC [gossip.comm] sendToEndpoint -> DEBU 4bce Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.274 UTC [gossip.comm] sendToEndpoint -> DEBU 4bcf Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.275 UTC [gossip.comm] func1 -> DEBU 4bd0 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.276 UTC [gossip.gossip] handleMessage -> DEBU 4bd1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.276 UTC [gossip.pull] HandleMessage -> DEBU 4bd2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.276 UTC [gossip.gossip] handleMessage -> DEBU 4bd3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.514 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 4bd4 Sleeping 25s" +peer0.org1.example.com | "2019-09-24 00:26:44.576 UTC [msp] GetDefaultSigningIdentity -> DEBU 4bd5 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:44.576 UTC [msp.identity] Sign -> DEBU 4bd6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151042 " +peer0.org1.example.com | "2019-09-24 00:26:44.576 UTC [msp.identity] Sign -> DEBU 4bd7 Sign: digest: 2D964D7BCA69451BBBFE44317837151BF77A9F385B78CDEE7880261E02E77576 " +peer0.org1.example.com | "2019-09-24 00:26:44.576 UTC [msp] GetDefaultSigningIdentity -> DEBU 4bd8 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:44.576 UTC [msp.identity] Sign -> DEBU 4bd9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:44.576 UTC [msp.identity] Sign -> DEBU 4bda Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:44.576 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4bdb Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:44.584 UTC [gossip.comm] func1 -> DEBU 4bdc Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.584 UTC [gossip.gossip] handleMessage -> DEBU 4bdd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.584 UTC [msp] DeserializeIdentity -> DEBU 4bde Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.584 UTC [msp] DeserializeIdentity -> DEBU 4bdf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.584 UTC [gossip.gossip] handleMessage -> DEBU 4be0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [msp] DeserializeIdentity -> DEBU 4be1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [msp] DeserializeIdentity -> DEBU 4be2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [msp] DeserializeIdentity -> DEBU 4be3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [gossip.comm] Send -> DEBU 4be4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [gossip.comm] Send -> DEBU 4be5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [msp] DeserializeIdentity -> DEBU 4be6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [gossip.comm] Send -> DEBU 4be7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4be8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4be9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4bea Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4beb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4bec Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4bed Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.760 UTC [gossip.comm] func1 -> DEBU 4bee Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.762 UTC [gossip.gossip] handleMessage -> DEBU 4bef Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.764 UTC [gossip.gossip] handleMessage -> DEBU 4bf0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.765 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bf1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.766 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4bf2 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:44.769 UTC [msp] DeserializeIdentity -> DEBU 4bf3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.770 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4bf4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:44.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bf5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bf6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.772 UTC [policies] Evaluate -> DEBU 4bf7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.772 UTC [policies] Evaluate -> DEBU 4bf8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:44.772 UTC [policies] Evaluate -> DEBU 4bf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.772 UTC [cauthdsl] func1 -> DEBU 4bfa 0xc00467a9d0 gate 1569284804772769500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.773 UTC [cauthdsl] func2 -> DEBU 4bfb 0xc00467a9d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.773 UTC [cauthdsl] func2 -> DEBU 4bfc 0xc00467a9d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.773 UTC [cauthdsl] func2 -> DEBU 4bfd 0xc00467a9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:44.774 UTC [cauthdsl] func2 -> DEBU 4bfe 0xc00467a9d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.774 UTC [cauthdsl] func1 -> DEBU 4bff 0xc00467a9d0 gate 1569284804772769500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.774 UTC [policies] Evaluate -> DEBU 4c00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.775 UTC [policies] Evaluate -> DEBU 4c01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.775 UTC [policies] Evaluate -> DEBU 4c02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.776 UTC [cauthdsl] func1 -> DEBU 4c03 0xc00467b210 gate 1569284804776129500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.776 UTC [cauthdsl] func2 -> DEBU 4c04 0xc00467b210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.777 UTC [cauthdsl] func2 -> DEBU 4c05 0xc00467b210 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.777 UTC [cauthdsl] func2 -> DEBU 4c06 0xc00467b210 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.778 UTC [msp.identity] Verify -> DEBU 4c07 Verify: digest = 00000000 2c 42 54 25 a8 8d 09 0a 0c 52 82 c7 20 2e 03 b6 |,BT%.....R.. ...| +peer0.org1.example.com | 00000010 17 93 6c 67 68 7b c7 35 15 6f 77 94 31 81 ca a7 |..lgh{.5.ow.1...|" +peer0.org1.example.com | "2019-09-24 00:26:44.778 UTC [msp.identity] Verify -> DEBU 4c08 Verify: sig = 00000000 30 44 02 20 40 a3 17 cb 2e a0 1c c8 15 96 74 e7 |0D. @.........t.| +peer0.org1.example.com | 00000010 21 23 2a 80 d6 3d 33 11 3f 73 21 b9 33 64 80 9a |!#*..=3.?s!.3d..| +peer0.org1.example.com | 00000020 5d a7 11 d6 02 20 5b 53 bc 67 5d c9 0f 91 5f 75 |].... [S.g]..._u| +peer0.org1.example.com | 00000030 71 a0 76 ae ed 14 d6 23 91 4b 8b d9 34 54 aa 48 |q.v....#.K..4T.H| +peer0.org1.example.com | 00000040 16 d8 f9 fd aa c5 |......|" +peer0.org1.example.com | "2019-09-24 00:26:44.779 UTC [cauthdsl] func2 -> DEBU 4c09 0xc00467b210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.779 UTC [cauthdsl] func1 -> DEBU 4c0a 0xc00467b210 gate 1569284804776129500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:44.779 UTC [policies] Evaluate -> DEBU 4c0b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.780 UTC [policies] Evaluate -> DEBU 4c0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.780 UTC [policies] Evaluate -> DEBU 4c0d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.780 UTC [policies] Evaluate -> DEBU 4c0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.780 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c0f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c10 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c11 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c12 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c13 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c14 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c15 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c16 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.discovery] sendMemResponse -> DEBU 4c17 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [msp] DeserializeIdentity -> DEBU 4c18 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [msp] DeserializeIdentity -> DEBU 4c19 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [msp] DeserializeIdentity -> DEBU 4c1a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.comm] Send -> DEBU 4c1b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.discovery] sendMemResponse -> DEBU 4c1c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020E" signature:"0E\002!\000\317<\377\341\213\250\275\373\005(d\335\326%b\037\277\3211\272\004r\220g\017\301\211\235KO$\211\002 ~\274W&D\303\201\376^Y\213\240\355\304\351\214\t\204\0160\333\357K\346\260\207\365\300\215\000U\021" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.comm] sendToEndpoint -> DEBU 4c1d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.781 UTC [gossip.comm] sendToEndpoint -> DEBU 4c1e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.794 UTC [gossip.comm] func1 -> DEBU 4c1f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.795 UTC [gossip.gossip] handleMessage -> DEBU 4c20 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.796 UTC [gossip.pull] HandleMessage -> DEBU 4c21 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.796 UTC [msp] DeserializeIdentity -> DEBU 4c22 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.796 UTC [msp] DeserializeIdentity -> DEBU 4c23 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.797 UTC [msp] DeserializeIdentity -> DEBU 4c24 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.798 UTC [msp] DeserializeIdentity -> DEBU 4c25 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.798 UTC [msp] DeserializeIdentity -> DEBU 4c26 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.798 UTC [msp] DeserializeIdentity -> DEBU 4c27 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.799 UTC [gossip.pull] SendDigest -> DEBU 4c28 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:44.799 UTC [gossip.gossip] handleMessage -> DEBU 4c29 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.832 UTC [gossip.comm] func1 -> DEBU 4c2a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.833 UTC [gossip.gossip] handleMessage -> DEBU 4c2b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.833 UTC [gossip.pull] HandleMessage -> DEBU 4c2c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.834 UTC [gossip.pull] SendDigest -> DEBU 4c2d Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:44.834 UTC [gossip.gossip] handleMessage -> DEBU 4c2e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.935 UTC [gossip.gossip] handleMessage -> DEBU 4c2f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.935 UTC [gossip.gossip] handleMessage -> DEBU 4c30 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c31 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c32 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:44.937 UTC [msp] DeserializeIdentity -> DEBU 4c33 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c34 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:44.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c35 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c36 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:44.938 UTC [policies] Evaluate -> DEBU 4c37 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.938 UTC [policies] Evaluate -> DEBU 4c38 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:44.939 UTC [policies] Evaluate -> DEBU 4c3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.938 UTC [gossip.comm] func1 -> DEBU 4c39 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.940 UTC [gossip.gossip] handleMessage -> DEBU 4c3b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.939 UTC [cauthdsl] func1 -> DEBU 4c3c 0xc0046ae860 gate 1569284804939596200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.940 UTC [cauthdsl] func2 -> DEBU 4c3d 0xc0046ae860 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.941 UTC [cauthdsl] func2 -> DEBU 4c3e 0xc0046ae860 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.941 UTC [cauthdsl] func2 -> DEBU 4c3f 0xc0046ae860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:44.942 UTC [cauthdsl] func2 -> DEBU 4c40 0xc0046ae860 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.942 UTC [cauthdsl] func1 -> DEBU 4c41 0xc0046ae860 gate 1569284804939596200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:44.942 UTC [policies] Evaluate -> DEBU 4c42 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c43 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c44 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [cauthdsl] func1 -> DEBU 4c45 0xc0046af0a0 gate 1569284804943467800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [cauthdsl] func2 -> DEBU 4c46 0xc0046af0a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [cauthdsl] func2 -> DEBU 4c47 0xc0046af0a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [cauthdsl] func2 -> DEBU 4c48 0xc0046af0a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [msp.identity] Verify -> DEBU 4c49 Verify: digest = 00000000 ed 5b 8c 00 04 d4 e8 2b 83 b0 c1 24 07 26 cf 6d |.[.....+...$.&.m| +peer0.org1.example.com | 00000010 9c 58 18 3b 4d bd 6d 62 4a 93 08 97 4f b9 fe 59 |.X.;M.mbJ...O..Y|" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [msp.identity] Verify -> DEBU 4c4a Verify: sig = 00000000 30 44 02 20 01 15 39 85 9a 70 12 48 de 78 e7 62 |0D. ..9..p.H.x.b| +peer0.org1.example.com | 00000010 b0 7e e6 4e ed cd 93 45 68 c5 5f 4a 39 08 ca 27 |.~.N...Eh._J9..'| +peer0.org1.example.com | 00000020 a1 08 03 80 02 20 4b 86 58 f4 25 be 67 40 12 5c |..... K.X.%.g@.\| +peer0.org1.example.com | 00000030 b7 32 d3 fe d2 45 08 e0 61 12 d0 8d 2e b0 88 84 |.2...E..a.......| +peer0.org1.example.com | 00000040 73 af 9d e5 ed 2a |s....*|" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [cauthdsl] func2 -> DEBU 4c4b 0xc0046af0a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [cauthdsl] func1 -> DEBU 4c4c 0xc0046af0a0 gate 1569284804943467800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c4d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c4f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:44.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c51 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c52 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:44.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c53 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:44.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c54 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:44.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c55 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:44.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c56 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c57 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c58 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.945 UTC [gossip.comm] func1 -> DEBU 4c59 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c5a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c5c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.946 UTC [gossip.gossip] handleMessage -> DEBU 4c5b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.947 UTC [gossip.gossip] handleMessage -> DEBU 4c5d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.948 UTC [gossip.gossip] handleMessage -> DEBU 4c5e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c5f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c60 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c61 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c62 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c63 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c64 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c65 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c66 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [gossip.comm] Send -> DEBU 4c67 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c68 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c69 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [gossip.comm] Send -> DEBU 4c6a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:44.950 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:44.951 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.075 UTC [gossip.gossip] handleMessage -> DEBU 4c6f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.076 UTC [msp] DeserializeIdentity -> DEBU 4c70 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.077 UTC [msp] DeserializeIdentity -> DEBU 4c71 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.077 UTC [msp] DeserializeIdentity -> DEBU 4c72 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.078 UTC [gossip.gossip] handleMessage -> DEBU 4c73 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.643 UTC [gossip.comm] func1 -> DEBU 4c74 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.643 UTC [gossip.gossip] handleMessage -> DEBU 4c75 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.643 UTC [gossip.pull] HandleMessage -> DEBU 4c76 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.643 UTC [gossip.pull] SendDigest -> DEBU 4c77 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:45.643 UTC [gossip.gossip] handleMessage -> DEBU 4c78 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.669 UTC [gossip.comm] func1 -> DEBU 4c79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.669 UTC [gossip.gossip] handleMessage -> DEBU 4c7a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.669 UTC [gossip.gossip] handleMessage -> DEBU 4c7b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.669 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c7c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.669 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c7d Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:45.669 UTC [msp] DeserializeIdentity -> DEBU 4c7e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.669 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c7f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:45.669 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c80 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:45.669 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c81 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:45.669 UTC [policies] Evaluate -> DEBU 4c82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:45.669 UTC [policies] Evaluate -> DEBU 4c83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func1 -> DEBU 4c85 0xc0040d2930 gate 1569284805670027900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c86 0xc0040d2930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c87 0xc0040d2930 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c88 0xc0040d2930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c89 0xc0040d2930 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func1 -> DEBU 4c8a 0xc0040d2930 gate 1569284805670027900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func1 -> DEBU 4c8e 0xc0040d3170 gate 1569284805670283000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c8f 0xc0040d3170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c90 0xc0040d3170 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c91 0xc0040d3170 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [msp.identity] Verify -> DEBU 4c92 Verify: digest = 00000000 20 07 94 b9 f2 f4 16 ad 6f b4 16 9a 57 93 3a 97 | .......o...W.:.| +peer0.org1.example.com | 00000010 11 c0 b8 b9 dd a0 4d 65 9e 33 d3 e2 23 f0 71 de |......Me.3..#.q.|" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [msp.identity] Verify -> DEBU 4c93 Verify: sig = 00000000 30 45 02 21 00 87 30 8a 1b 3a 0b d0 75 1c 25 e7 |0E.!..0..:..u.%.| +peer0.org1.example.com | 00000010 5c 10 a6 64 2e 95 31 0f 9d d0 35 c2 8f 69 d5 37 |\..d..1...5..i.7| +peer0.org1.example.com | 00000020 da 5a e8 76 be 02 20 4c 11 db 1b b1 ea ac 6d 3a |.Z.v.. L......m:| +peer0.org1.example.com | 00000030 cf f5 a2 eb 9a a8 3e 37 a2 50 fc aa dd d0 f4 0c |......>7.P......| +peer0.org1.example.com | 00000040 d4 67 de 57 f3 84 07 |.g.W...|" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c94 0xc0040d3170 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [cauthdsl] func1 -> DEBU 4c95 0xc0040d3170 gate 1569284805670283000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c98 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c9a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c9b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c9c updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:45.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c9d Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:45.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c9e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:45.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c9f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.671 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ca0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ca1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.671 UTC [gossip.comm] func1 -> DEBU 4ca2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.671 UTC [gossip.gossip] handleMessage -> DEBU 4ca3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.671 UTC [gossip.gossip] handleMessage -> DEBU 4ca4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ca5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ca6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.676 UTC [msp] DeserializeIdentity -> DEBU 4ca7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.677 UTC [gossip.gossip] handleMessage -> DEBU 4ca8 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.677 UTC [gossip.gossip] handleMessage -> DEBU 4ca9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4caa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4cab Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.677 UTC [msp] DeserializeIdentity -> DEBU 4cac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.678 UTC [msp] DeserializeIdentity -> DEBU 4cad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.678 UTC [msp] DeserializeIdentity -> DEBU 4cae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.679 UTC [msp] DeserializeIdentity -> DEBU 4caf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.679 UTC [msp] DeserializeIdentity -> DEBU 4cb0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.679 UTC [msp] DeserializeIdentity -> DEBU 4cb1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.680 UTC [gossip.comm] Send -> DEBU 4cb2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:45.680 UTC [msp] DeserializeIdentity -> DEBU 4cb3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.680 UTC [gossip.comm] sendToEndpoint -> DEBU 4cb4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.680 UTC [gossip.comm] sendToEndpoint -> DEBU 4cb5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.680 UTC [msp] DeserializeIdentity -> DEBU 4cb6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.681 UTC [gossip.comm] Send -> DEBU 4cb7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:45.681 UTC [gossip.comm] sendToEndpoint -> DEBU 4cb8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.681 UTC [gossip.comm] sendToEndpoint -> DEBU 4cb9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [gossip.comm] func1 -> DEBU 4cba Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020F" signature:"0D\002 \010$\335S\343\355\371=\300f\327\230R#\270\262\261\035!\317M\037(m\006\010\032\277\336\255\013\343\002 \n\245Q%5\363V\226\221\\\347?&\274f\237!]\373,G\254<\035\001E_C\234%$\331" secret_envelope:iU9\230awsG\263\"=\207\264\376\005\227D\275>x\002 4\313yg nt\010v\014\353\345`\226\201\354a\345r\272\202\331X\231\200(\333c\355+\013\026" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [gossip.gossip] handleMessage -> DEBU 4cbb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020F" signature:"0D\002 \010$\335S\343\355\371=\300f\327\230R#\270\262\261\035!\317M\037(m\006\010\032\277\336\255\013\343\002 \n\245Q%5\363V\226\221\\\347?&\274f\237!]\373,G\254<\035\001E_C\234%$\331" secret_envelope:iU9\230awsG\263\"=\207\264\376\005\227D\275>x\002 4\313yg nt\010v\014\353\345`\226\201\354a\345r\272\202\331X\231\200(\333c\355+\013\026" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [gossip.gossip] handleMessage -> DEBU 4cbc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4cbd Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020F" signature:"0D\002 \010$\335S\343\355\371=\300f\327\230R#\270\262\261\035!\317M\037(m\006\010\032\277\336\255\013\343\002 \n\245Q%5\363V\226\221\\\347?&\274f\237!]\373,G\254<\035\001E_C\234%$\331" secret_envelope:iU9\230awsG\263\"=\207\264\376\005\227D\275>x\002 4\313yg nt\010v\014\353\345`\226\201\354a\345r\272\202\331X\231\200(\333c\355+\013\026" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4cbe Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [msp.identity] Verify -> DEBU 4cbf Verify: digest = 00000000 6c 22 9c 14 62 a0 1c 6d e1 5d 42 a7 79 27 79 0c |l"..b..m.]B.y'y.| +peer0.org1.example.com | 00000010 66 51 4f e2 1f dd 10 57 28 45 a7 c1 05 1d af 7b |fQO....W(E.....{|" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [msp.identity] Verify -> DEBU 4cc0 Verify: sig = 00000000 30 44 02 20 08 24 dd 53 e3 ed f9 3d c0 66 d7 98 |0D. .$.S...=.f..| +peer0.org1.example.com | 00000010 52 23 b8 b2 b1 1d 21 cf 4d 1f 28 6d 06 08 1a bf |R#....!.M.(m....| +peer0.org1.example.com | 00000020 de ad 0b e3 02 20 0a a5 51 25 35 f3 56 96 91 5c |..... ..Q%5.V..\| +peer0.org1.example.com | 00000030 e7 3f 26 bc 66 9f 21 5d fb 2c 47 ac 3c 1d 01 45 |.?&.f.!].,G.<..E| +peer0.org1.example.com | 00000040 5f 43 9c 25 24 d9 |_C.%$.|" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [msp.identity] Verify -> DEBU 4cc1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [msp.identity] Verify -> DEBU 4cc2 Verify: sig = 00000000 30 45 02 21 00 f9 ef e8 65 9b 45 17 78 3b 92 aa |0E.!....e.E.x;..| +peer0.org1.example.com | 00000010 3e 69 55 39 98 61 77 73 47 b3 22 3d 87 b4 fe 05 |>iU9.awsG."=....| +peer0.org1.example.com | 00000020 97 44 bd 3e 78 02 20 34 cb 79 67 20 6e 74 08 76 |.D.>x. 4.yg nt.v| +peer0.org1.example.com | 00000030 0c eb e5 60 96 81 ec 61 e5 72 ba 82 d9 58 99 80 |...`...a.r...X..| +peer0.org1.example.com | 00000040 28 db 63 ed 2b 0b 16 |(.c.+..|" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 4cc3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cc4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cc5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cc6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cc7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:45.773 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cc8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.774 UTC [gossip.discovery] handleAliveMessage -> DEBU 4cc9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.774 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4cca Exiting" +peer0.org1.example.com | "2019-09-24 00:26:45.774 UTC [gossip.discovery] sendMemResponse -> DEBU 4ccb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:45.774 UTC [msp] DeserializeIdentity -> DEBU 4ccc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.774 UTC [msp] DeserializeIdentity -> DEBU 4ccd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:45.774 UTC [gossip.comm] Send -> DEBU 4cce Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:45.774 UTC [gossip.discovery] sendMemResponse -> DEBU 4ccf Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020F" signature:"0D\002 \010$\335S\343\355\371=\300f\327\230R#\270\262\261\035!\317M\037(m\006\010\032\277\336\255\013\343\002 \n\245Q%5\363V\226\221\\\347?&\274f\237!]\373,G\254<\035\001E_C\234%$\331" secret_envelope:iU9\230awsG\263\"=\207\264\376\005\227D\275>x\002 4\313yg nt\010v\014\353\345`\226\201\354a\345r\272\202\331X\231\200(\333c\355+\013\026" > > alive: " +peer0.org1.example.com | "2019-09-24 00:26:45.774 UTC [gossip.comm] sendToEndpoint -> DEBU 4cd0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:45.774 UTC [gossip.comm] sendToEndpoint -> DEBU 4cd1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:46.008 UTC [gossip.comm] func1 -> DEBU 4cd2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:46.008 UTC [gossip.gossip] handleMessage -> DEBU 4cd3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:46.008 UTC [msp] DeserializeIdentity -> DEBU 4cd4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:46.008 UTC [msp] DeserializeIdentity -> DEBU 4cd5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:46.008 UTC [msp] DeserializeIdentity -> DEBU 4cd6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:46.008 UTC [gossip.gossip] handleMessage -> DEBU 4cd7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.309 UTC [gossip.election] waitForInterrupt -> DEBU 4cd8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.309 UTC [gossip.election] IsLeader -> DEBU 4cd9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:47.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 4cda Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:47.309 UTC [msp.identity] Sign -> DEBU 4cdb Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510171801 " +peer0.org1.example.com | "2019-09-24 00:26:47.309 UTC [msp.identity] Sign -> DEBU 4cdc Sign: digest: 6DCD5F4987FBC9F59CDB322C9AF92032BEFC49AA2C99874D739076A2975DFC8A " +peer0.org1.example.com | "2019-09-24 00:26:47.309 UTC [gossip.election] waitForInterrupt -> DEBU 4cdd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:47.311 UTC [msp] DeserializeIdentity -> DEBU 4cde Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.311 UTC [msp] DeserializeIdentity -> DEBU 4cdf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.311 UTC [msp] DeserializeIdentity -> DEBU 4ce0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.311 UTC [msp] DeserializeIdentity -> DEBU 4ce1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.312 UTC [gossip.comm] Send -> DEBU 4ce2 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:47.312 UTC [msp] DeserializeIdentity -> DEBU 4ce3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.312 UTC [msp] DeserializeIdentity -> DEBU 4ce4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.312 UTC [gossip.comm] sendToEndpoint -> DEBU 4ce5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.312 UTC [gossip.comm] sendToEndpoint -> DEBU 4ce6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.697 UTC [gossip.comm] func1 -> DEBU 4ce7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.697 UTC [gossip.gossip] handleMessage -> DEBU 4ce8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.697 UTC [gossip.gossip] handleMessage -> DEBU 4ce9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4cea Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.698 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ceb Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:47.698 UTC [msp.identity] Verify -> DEBU 4cec Verify: digest = 00000000 06 02 d8 90 d6 a5 d0 fe fb 12 05 45 3d ac f8 de |...........E=...| +peer0.org1.example.com | 00000010 8c db c6 e2 0e e6 6b 33 1b dc da 71 1d 3e a2 f0 |......k3...q.>..|" +peer0.org1.example.com | "2019-09-24 00:26:47.698 UTC [msp.identity] Verify -> DEBU 4ced Verify: sig = 00000000 30 44 02 20 1b d6 24 47 60 21 cb 0a 72 fe 29 34 |0D. ..$G`!..r.)4| +peer0.org1.example.com | 00000010 c1 5d 01 a2 d9 a5 33 7f fe 18 f8 49 c4 0a ed 3b |.]....3....I...;| +peer0.org1.example.com | 00000020 12 4d f3 a8 02 20 5a 37 ed cb 84 48 29 e6 e9 f0 |.M... Z7...H)...| +peer0.org1.example.com | 00000030 e9 3e 98 d1 22 74 27 6d f7 e7 7e 95 f4 50 17 9e |.>.."t'm..~..P..| +peer0.org1.example.com | 00000040 23 42 9a 24 eb 53 |#B.$.S|" +peer0.org1.example.com | "2019-09-24 00:26:47.698 UTC [gossip.discovery] handleAliveMessage -> DEBU 4cee Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cef Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:47.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cf0 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:47.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cf1 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:47.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cf2 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:47.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cf3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.698 UTC [gossip.discovery] handleAliveMessage -> DEBU 4cf4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4cf5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.pull] Hello -> DEBU 4cf6 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.comm] Send -> DEBU 4cf7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.pull] Hello -> DEBU 4cf8 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.comm] Send -> DEBU 4cf9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.pull] Hello -> DEBU 4cfa Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.comm] Send -> DEBU 4cfb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4cfc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4cfd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4cfe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4cff Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4d00 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4d01 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.700 UTC [gossip.comm] func1 -> DEBU 4d02 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.700 UTC [gossip.gossip] handleMessage -> DEBU 4d03 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.700 UTC [gossip.pull] HandleMessage -> DEBU 4d04 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.700 UTC [gossip.gossip] handleMessage -> DEBU 4d05 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.701 UTC [gossip.gossip] handleMessage -> DEBU 4d06 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.701 UTC [gossip.pull] HandleMessage -> DEBU 4d07 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.701 UTC [gossip.gossip] handleMessage -> DEBU 4d08 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.702 UTC [gossip.comm] func1 -> DEBU 4d09 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.702 UTC [gossip.gossip] handleMessage -> DEBU 4d0a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.702 UTC [gossip.pull] HandleMessage -> DEBU 4d0b GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.703 UTC [gossip.gossip] handleMessage -> DEBU 4d0c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.707 UTC [msp] DeserializeIdentity -> DEBU 4d0d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.707 UTC [msp] DeserializeIdentity -> DEBU 4d0e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.707 UTC [msp] DeserializeIdentity -> DEBU 4d0f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.707 UTC [gossip.comm] Send -> DEBU 4d10 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:47.707 UTC [msp] DeserializeIdentity -> DEBU 4d11 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.707 UTC [gossip.comm] Send -> DEBU 4d12 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 4d13 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 4d14 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 4d15 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.708 UTC [gossip.comm] sendToEndpoint -> DEBU 4d16 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.708 UTC [gossip.comm] func1 -> DEBU 4d17 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.708 UTC [gossip.gossip] handleMessage -> DEBU 4d18 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.708 UTC [gossip.gossip] handleMessage -> DEBU 4d19 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d1a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d1b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.710 UTC [gossip.gossip] handleMessage -> DEBU 4d1c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.711 UTC [gossip.gossip] handleMessage -> DEBU 4d1d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d1e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.712 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d1f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 4d20 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:47.839 UTC [msp.identity] Sign -> DEBU 4d21 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151043 " +peer0.org1.example.com | "2019-09-24 00:26:47.839 UTC [msp.identity] Sign -> DEBU 4d22 Sign: digest: 9BB9F7D129E5852699DB5299BDA24F7A602EBBEED83E62481DFE3B1C67C8F1A4 " +peer0.org1.example.com | "2019-09-24 00:26:47.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 4d23 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:47.839 UTC [msp.identity] Sign -> DEBU 4d24 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:47.839 UTC [msp.identity] Sign -> DEBU 4d25 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:47.839 UTC [gossip.comm] Send -> DEBU 4d26 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:47.839 UTC [msp] DeserializeIdentity -> DEBU 4d27 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.839 UTC [gossip.comm] Send -> DEBU 4d28 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:47.840 UTC [msp] DeserializeIdentity -> DEBU 4d29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.840 UTC [gossip.comm] Send -> DEBU 4d2a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d2b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d2c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d2d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d2e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d2f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d30 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.842 UTC [gossip.comm] func1 -> DEBU 4d31 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.843 UTC [gossip.gossip] handleMessage -> DEBU 4d32 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.843 UTC [gossip.gossip] handleMessage -> DEBU 4d33 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.843 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d34 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.843 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d35 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:47.844 UTC [msp.identity] Verify -> DEBU 4d36 Verify: digest = 00000000 9b b9 f7 d1 29 e5 85 26 99 db 52 99 bd a2 4f 7a |....)..&..R...Oz| +peer0.org1.example.com | 00000010 60 2e bb ee d8 3e 62 48 1d fe 3b 1c 67 c8 f1 a4 |`....>bH..;.g...|" +peer0.org1.example.com | "2019-09-24 00:26:47.844 UTC [msp.identity] Verify -> DEBU 4d37 Verify: sig = 00000000 30 44 02 20 09 06 34 90 59 a9 2b 1b c9 04 4c 6b |0D. ..4.Y.+...Lk| +peer0.org1.example.com | 00000010 c2 77 01 c2 65 3c d9 53 52 2c a9 1a 13 1c ee ed |.w..e<.SR,......| +peer0.org1.example.com | 00000020 10 52 4c f9 02 20 5c 24 5e d8 9b d9 cd 48 4b 00 |.RL.. \$^....HK.| +peer0.org1.example.com | 00000030 a4 2a d7 05 4c e5 d5 4a bb ca d5 ad 15 fe d2 85 |.*..L..J........| +peer0.org1.example.com | 00000040 82 f9 2b cf 19 18 |..+...|" +peer0.org1.example.com | "2019-09-24 00:26:47.844 UTC [msp.identity] Verify -> DEBU 4d38 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:47.844 UTC [msp.identity] Verify -> DEBU 4d39 Verify: sig = 00000000 30 44 02 20 5e d0 22 c6 a9 86 c1 54 e0 07 54 51 |0D. ^."....T..TQ| +peer0.org1.example.com | 00000010 0c cf ae fb a4 75 5c 7e 58 db 57 41 e2 52 f8 88 |.....u\~X.WA.R..| +peer0.org1.example.com | 00000020 56 a9 a7 47 02 20 03 49 c7 44 f6 8b 97 1b f9 48 |V..G. .I.D.....H| +peer0.org1.example.com | 00000030 b3 2f 31 ed 8b 44 ea b1 58 db d7 2a 79 8c 37 32 |./1..D..X..*y.72| +peer0.org1.example.com | 00000040 71 13 97 a9 f0 29 |q....)|" +peer0.org1.example.com | "2019-09-24 00:26:47.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d3a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.845 UTC [gossip.discovery] isSentByMe -> DEBU 4d3b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d3c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.845 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d3d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.847 UTC [gossip.gossip] handleMessage -> DEBU 4d3e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.847 UTC [gossip.gossip] handleMessage -> DEBU 4d3f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d41 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:47.847 UTC [msp.identity] Verify -> DEBU 4d42 Verify: digest = 00000000 9b b9 f7 d1 29 e5 85 26 99 db 52 99 bd a2 4f 7a |....)..&..R...Oz| +peer0.org1.example.com | 00000010 60 2e bb ee d8 3e 62 48 1d fe 3b 1c 67 c8 f1 a4 |`....>bH..;.g...|" +peer0.org1.example.com | "2019-09-24 00:26:47.848 UTC [msp.identity] Verify -> DEBU 4d43 Verify: sig = 00000000 30 44 02 20 09 06 34 90 59 a9 2b 1b c9 04 4c 6b |0D. ..4.Y.+...Lk| +peer0.org1.example.com | 00000010 c2 77 01 c2 65 3c d9 53 52 2c a9 1a 13 1c ee ed |.w..e<.SR,......| +peer0.org1.example.com | 00000020 10 52 4c f9 02 20 5c 24 5e d8 9b d9 cd 48 4b 00 |.RL.. \$^....HK.| +peer0.org1.example.com | 00000030 a4 2a d7 05 4c e5 d5 4a bb ca d5 ad 15 fe d2 85 |.*..L..J........| +peer0.org1.example.com | 00000040 82 f9 2b cf 19 18 |..+...|" +peer0.org1.example.com | "2019-09-24 00:26:47.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d44 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.848 UTC [gossip.discovery] isSentByMe -> DEBU 4d45 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d46 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d47 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.851 UTC [gossip.comm] func1 -> DEBU 4d48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.851 UTC [gossip.gossip] handleMessage -> DEBU 4d49 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.851 UTC [gossip.gossip] handleMessage -> DEBU 4d4a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d4c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:47.851 UTC [msp.identity] Verify -> DEBU 4d4d Verify: digest = 00000000 9b b9 f7 d1 29 e5 85 26 99 db 52 99 bd a2 4f 7a |....)..&..R...Oz| +peer0.org1.example.com | 00000010 60 2e bb ee d8 3e 62 48 1d fe 3b 1c 67 c8 f1 a4 |`....>bH..;.g...|" +peer0.org1.example.com | "2019-09-24 00:26:47.851 UTC [msp.identity] Verify -> DEBU 4d4e Verify: sig = 00000000 30 44 02 20 09 06 34 90 59 a9 2b 1b c9 04 4c 6b |0D. ..4.Y.+...Lk| +peer0.org1.example.com | 00000010 c2 77 01 c2 65 3c d9 53 52 2c a9 1a 13 1c ee ed |.w..e<.SR,......| +peer0.org1.example.com | 00000020 10 52 4c f9 02 20 5c 24 5e d8 9b d9 cd 48 4b 00 |.RL.. \$^....HK.| +peer0.org1.example.com | 00000030 a4 2a d7 05 4c e5 d5 4a bb ca d5 ad 15 fe d2 85 |.*..L..J........| +peer0.org1.example.com | 00000040 82 f9 2b cf 19 18 |..+...|" +peer0.org1.example.com | "2019-09-24 00:26:47.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d4f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.852 UTC [gossip.discovery] isSentByMe -> DEBU 4d50 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d51 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d52 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:47.909 UTC [gossip.gossip] handleMessage -> DEBU 4d53 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.909 UTC [gossip.pull] HandleMessage -> DEBU 4d54 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:47.910 UTC [msp] DeserializeIdentity -> DEBU 4d55 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.910 UTC [msp] DeserializeIdentity -> DEBU 4d56 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.911 UTC [msp] DeserializeIdentity -> DEBU 4d57 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.912 UTC [msp] DeserializeIdentity -> DEBU 4d58 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.912 UTC [msp] DeserializeIdentity -> DEBU 4d59 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.913 UTC [msp] DeserializeIdentity -> DEBU 4d5a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:47.913 UTC [gossip.pull] SendDigest -> DEBU 4d5b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:47.914 UTC [gossip.gossip] handleMessage -> DEBU 4d5c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.015 UTC [gossip.gossip] handleMessage -> DEBU 4d5d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.016 UTC [gossip.gossip] handleMessage -> DEBU 4d5e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.018 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d5f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.021 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d60 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:48.022 UTC [msp] DeserializeIdentity -> DEBU 4d61 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:48.024 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d63 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.024 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d64 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.024 UTC [policies] Evaluate -> DEBU 4d65 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.025 UTC [policies] Evaluate -> DEBU 4d66 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:48.025 UTC [policies] Evaluate -> DEBU 4d67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.026 UTC [cauthdsl] func1 -> DEBU 4d68 0xc0041a13f0 gate 1569284808026375000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.026 UTC [cauthdsl] func2 -> DEBU 4d69 0xc0041a13f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.027 UTC [cauthdsl] func2 -> DEBU 4d6a 0xc0041a13f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.027 UTC [cauthdsl] func2 -> DEBU 4d6b 0xc0041a13f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:48.027 UTC [cauthdsl] func2 -> DEBU 4d6c 0xc0041a13f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.028 UTC [cauthdsl] func1 -> DEBU 4d6d 0xc0041a13f0 gate 1569284808026375000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.028 UTC [policies] Evaluate -> DEBU 4d6e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.032 UTC [policies] Evaluate -> DEBU 4d6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.033 UTC [policies] Evaluate -> DEBU 4d70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.042 UTC [cauthdsl] func1 -> DEBU 4d71 0xc0041ae300 gate 1569284808042306700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.042 UTC [cauthdsl] func2 -> DEBU 4d72 0xc0041ae300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.043 UTC [cauthdsl] func2 -> DEBU 4d73 0xc0041ae300 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.043 UTC [cauthdsl] func2 -> DEBU 4d74 0xc0041ae300 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.043 UTC [msp.identity] Verify -> DEBU 4d75 Verify: digest = 00000000 c3 b4 41 1c 49 12 98 53 92 8b 7a 89 16 73 9a 50 |..A.I..S..z..s.P| +peer0.org1.example.com | 00000010 80 74 61 68 b6 30 29 1c c4 5d fe 26 c3 06 92 ec |.tah.0)..].&....|" +peer0.org1.example.com | "2019-09-24 00:26:48.043 UTC [msp.identity] Verify -> DEBU 4d76 Verify: sig = 00000000 30 44 02 20 60 6e 28 c7 43 6e 19 e2 40 06 ba bd |0D. `n(.Cn..@...| +peer0.org1.example.com | 00000010 24 f0 c8 6f 64 80 1d ed ed 28 e8 c0 3c 39 79 e8 |$..od....(..<9y.| +peer0.org1.example.com | 00000020 7f 25 98 f7 02 20 43 b7 3c 4f be 19 d7 39 a2 08 |.%... C. DEBU 4d77 0xc0041ae300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.043 UTC [cauthdsl] func1 -> DEBU 4d78 0xc0041ae300 gate 1569284808042306700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:48.043 UTC [policies] Evaluate -> DEBU 4d79 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.044 UTC [policies] Evaluate -> DEBU 4d7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.044 UTC [policies] Evaluate -> DEBU 4d7b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.044 UTC [policies] Evaluate -> DEBU 4d7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.044 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d7d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.044 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d7e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:48.044 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d7f updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:48.045 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d80 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:48.045 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d81 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:48.045 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d82 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.045 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d83 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.046 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d84 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.046 UTC [gossip.discovery] sendMemResponse -> DEBU 4d85 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:48.047 UTC [msp] DeserializeIdentity -> DEBU 4d86 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.047 UTC [msp] DeserializeIdentity -> DEBU 4d87 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.047 UTC [msp] DeserializeIdentity -> DEBU 4d88 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.047 UTC [gossip.comm] Send -> DEBU 4d89 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:48.048 UTC [gossip.comm] sendToEndpoint -> DEBU 4d8a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.048 UTC [gossip.comm] sendToEndpoint -> DEBU 4d8b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.051 UTC [gossip.discovery] sendMemResponse -> DEBU 4d8c Exiting, replying with alive:7\242P\374\252\335\320\364\014\324g\336W\363\204\007" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020G" signature:"0D\002 \033\326$G`!\313\nr\376)4\301]\001\242\331\2453\177\376\030\370I\304\n\355;\022M\363\250\002 Z7\355\313\204H)\346\351\360\351>\230\321\"t'm\367\347~\225\364P\027\236#B\232$\353S" > alive: " +peer0.org1.example.com | "2019-09-24 00:26:48.081 UTC [msp] DeserializeIdentity -> DEBU 4d8d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.082 UTC [msp] DeserializeIdentity -> DEBU 4d8e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.083 UTC [gossip.comm] Send -> DEBU 4d8f Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:48.083 UTC [gossip.comm] sendToEndpoint -> DEBU 4d90 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.083 UTC [gossip.comm] sendToEndpoint -> DEBU 4d91 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.083 UTC [gossip.comm] sendToEndpoint -> DEBU 4d92 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.084 UTC [gossip.comm] sendToEndpoint -> DEBU 4d93 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.084 UTC [gossip.comm] sendToEndpoint -> DEBU 4d94 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.084 UTC [gossip.comm] sendToEndpoint -> DEBU 4d95 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.085 UTC [gossip.comm] func1 -> DEBU 4d96 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.086 UTC [gossip.gossip] handleMessage -> DEBU 4d97 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.086 UTC [msp] DeserializeIdentity -> DEBU 4d98 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.087 UTC [msp] DeserializeIdentity -> DEBU 4d99 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.088 UTC [msp] DeserializeIdentity -> DEBU 4d9a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.088 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d9b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:48.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d9c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d9d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.088 UTC [policies] Evaluate -> DEBU 4d9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.088 UTC [policies] Evaluate -> DEBU 4d9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:48.088 UTC [policies] Evaluate -> DEBU 4da0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.089 UTC [cauthdsl] func1 -> DEBU 4da1 0xc0041d1770 gate 1569284808089166000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.089 UTC [cauthdsl] func2 -> DEBU 4da2 0xc0041d1770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.089 UTC [cauthdsl] func2 -> DEBU 4da3 0xc0041d1770 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.090 UTC [cauthdsl] func2 -> DEBU 4da4 0xc0041d1770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:48.090 UTC [cauthdsl] func2 -> DEBU 4da5 0xc0041d1770 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.090 UTC [cauthdsl] func1 -> DEBU 4da6 0xc0041d1770 gate 1569284808089166000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.090 UTC [policies] Evaluate -> DEBU 4da7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.090 UTC [policies] Evaluate -> DEBU 4da8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.091 UTC [policies] Evaluate -> DEBU 4da9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.091 UTC [cauthdsl] func1 -> DEBU 4daa 0xc0041d1fb0 gate 1569284808091366300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.091 UTC [cauthdsl] func2 -> DEBU 4dab 0xc0041d1fb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.091 UTC [cauthdsl] func2 -> DEBU 4dac 0xc0041d1fb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.092 UTC [cauthdsl] func2 -> DEBU 4dad 0xc0041d1fb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.092 UTC [msp.identity] Verify -> DEBU 4dae Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:48.092 UTC [msp.identity] Verify -> DEBU 4daf Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:48.093 UTC [cauthdsl] func2 -> DEBU 4db0 0xc0041d1fb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.093 UTC [cauthdsl] func1 -> DEBU 4db1 0xc0041d1fb0 gate 1569284808091366300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:48.093 UTC [policies] Evaluate -> DEBU 4db2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.094 UTC [policies] Evaluate -> DEBU 4db4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.093 UTC [gossip.comm] func1 -> DEBU 4db3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.095 UTC [policies] Evaluate -> DEBU 4db5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.095 UTC [policies] Evaluate -> DEBU 4db6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.096 UTC [msp.identity] Verify -> DEBU 4db7 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:48.096 UTC [msp.identity] Verify -> DEBU 4db8 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:48.096 UTC [msp] DeserializeIdentity -> DEBU 4db9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.097 UTC [msp] DeserializeIdentity -> DEBU 4dba Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.097 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4dbb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:48.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dbc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dbd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.098 UTC [policies] Evaluate -> DEBU 4dbe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.098 UTC [policies] Evaluate -> DEBU 4dbf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:48.099 UTC [policies] Evaluate -> DEBU 4dc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.100 UTC [cauthdsl] func1 -> DEBU 4dc1 0xc0041ebea0 gate 1569284808099875500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.100 UTC [cauthdsl] func2 -> DEBU 4dc2 0xc0041ebea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.100 UTC [cauthdsl] func2 -> DEBU 4dc3 0xc0041ebea0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.101 UTC [cauthdsl] func2 -> DEBU 4dc4 0xc0041ebea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:48.101 UTC [cauthdsl] func2 -> DEBU 4dc5 0xc0041ebea0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.101 UTC [cauthdsl] func1 -> DEBU 4dc6 0xc0041ebea0 gate 1569284808099875500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.102 UTC [policies] Evaluate -> DEBU 4dc7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.102 UTC [policies] Evaluate -> DEBU 4dc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.103 UTC [policies] Evaluate -> DEBU 4dc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.103 UTC [cauthdsl] func1 -> DEBU 4dca 0xc0042046e0 gate 1569284808103448300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.104 UTC [cauthdsl] func2 -> DEBU 4dcb 0xc0042046e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.104 UTC [cauthdsl] func2 -> DEBU 4dcc 0xc0042046e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.104 UTC [cauthdsl] func2 -> DEBU 4dcd 0xc0042046e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.105 UTC [msp.identity] Verify -> DEBU 4dce Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:48.105 UTC [msp.identity] Verify -> DEBU 4dcf Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:48.106 UTC [cauthdsl] func2 -> DEBU 4dd0 0xc0042046e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.106 UTC [cauthdsl] func1 -> DEBU 4dd1 0xc0042046e0 gate 1569284808103448300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:48.106 UTC [policies] Evaluate -> DEBU 4dd2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.108 UTC [policies] Evaluate -> DEBU 4dd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.108 UTC [policies] Evaluate -> DEBU 4dd4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.108 UTC [policies] Evaluate -> DEBU 4dd5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.109 UTC [msp.identity] Verify -> DEBU 4dd6 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:48.109 UTC [msp.identity] Verify -> DEBU 4dd7 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:48.109 UTC [gossip.gossip] handleMessage -> DEBU 4dd8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.109 UTC [gossip.gossip] handleMessage -> DEBU 4dd9 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.109 UTC [msp] DeserializeIdentity -> DEBU 4dda Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.110 UTC [msp] DeserializeIdentity -> DEBU 4ddb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.110 UTC [msp] DeserializeIdentity -> DEBU 4ddc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.110 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ddd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:48.110 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dde Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.110 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ddf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.110 UTC [policies] Evaluate -> DEBU 4de0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.111 UTC [policies] Evaluate -> DEBU 4de1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:48.111 UTC [policies] Evaluate -> DEBU 4de2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.111 UTC [cauthdsl] func1 -> DEBU 4de3 0xc00421e910 gate 1569284808111546800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.111 UTC [cauthdsl] func2 -> DEBU 4de4 0xc00421e910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.111 UTC [cauthdsl] func2 -> DEBU 4de5 0xc00421e910 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.111 UTC [cauthdsl] func2 -> DEBU 4de6 0xc00421e910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:48.112 UTC [cauthdsl] func2 -> DEBU 4de7 0xc00421e910 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.112 UTC [cauthdsl] func1 -> DEBU 4de8 0xc00421e910 gate 1569284808111546800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.112 UTC [policies] Evaluate -> DEBU 4de9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.112 UTC [policies] Evaluate -> DEBU 4dea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.113 UTC [policies] Evaluate -> DEBU 4deb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.113 UTC [cauthdsl] func1 -> DEBU 4dec 0xc00421f150 gate 1569284808113166600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.113 UTC [cauthdsl] func2 -> DEBU 4ded 0xc00421f150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.113 UTC [cauthdsl] func2 -> DEBU 4dee 0xc00421f150 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.113 UTC [cauthdsl] func2 -> DEBU 4def 0xc00421f150 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.114 UTC [msp.identity] Verify -> DEBU 4df0 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:48.114 UTC [msp.identity] Verify -> DEBU 4df1 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:48.115 UTC [cauthdsl] func2 -> DEBU 4df2 0xc00421f150 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.115 UTC [cauthdsl] func1 -> DEBU 4df3 0xc00421f150 gate 1569284808113166600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:48.115 UTC [policies] Evaluate -> DEBU 4df4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.115 UTC [policies] Evaluate -> DEBU 4df5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.115 UTC [policies] Evaluate -> DEBU 4df6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.115 UTC [policies] Evaluate -> DEBU 4df7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.116 UTC [msp.identity] Verify -> DEBU 4df8 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:48.116 UTC [msp.identity] Verify -> DEBU 4df9 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:48.117 UTC [msp.identity] Verify -> DEBU 4dfa Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:48.117 UTC [msp.identity] Verify -> DEBU 4dfb Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:48.117 UTC [msp] DeserializeIdentity -> DEBU 4dfc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.117 UTC [msp] DeserializeIdentity -> DEBU 4dfd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.117 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4dfe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:48.117 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dff Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.117 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e00 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.117 UTC [policies] Evaluate -> DEBU 4e01 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.117 UTC [policies] Evaluate -> DEBU 4e02 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:48.117 UTC [policies] Evaluate -> DEBU 4e03 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.118 UTC [cauthdsl] func1 -> DEBU 4e04 0xc00422b760 gate 1569284808118201200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.118 UTC [cauthdsl] func2 -> DEBU 4e05 0xc00422b760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.118 UTC [cauthdsl] func2 -> DEBU 4e06 0xc00422b760 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.118 UTC [cauthdsl] func2 -> DEBU 4e07 0xc00422b760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:48.119 UTC [cauthdsl] func2 -> DEBU 4e08 0xc00422b760 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.119 UTC [cauthdsl] func1 -> DEBU 4e09 0xc00422b760 gate 1569284808118201200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [policies] Evaluate -> DEBU 4e0a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [policies] Evaluate -> DEBU 4e0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [policies] Evaluate -> DEBU 4e0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [cauthdsl] func1 -> DEBU 4e0d 0xc00422bfa0 gate 1569284808120391400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [cauthdsl] func2 -> DEBU 4e0e 0xc00422bfa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [cauthdsl] func2 -> DEBU 4e0f 0xc00422bfa0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [cauthdsl] func2 -> DEBU 4e10 0xc00422bfa0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [msp.identity] Verify -> DEBU 4e11 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [msp.identity] Verify -> DEBU 4e12 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [cauthdsl] func2 -> DEBU 4e13 0xc00422bfa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [cauthdsl] func1 -> DEBU 4e14 0xc00422bfa0 gate 1569284808120391400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [policies] Evaluate -> DEBU 4e15 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.120 UTC [policies] Evaluate -> DEBU 4e16 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.121 UTC [policies] Evaluate -> DEBU 4e17 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.121 UTC [policies] Evaluate -> DEBU 4e18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.121 UTC [gossip.gossip] handleMessage -> DEBU 4e19 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.121 UTC [gossip.gossip] handleMessage -> DEBU 4e1a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.121 UTC [msp.identity] Verify -> DEBU 4e1b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:48.122 UTC [msp.identity] Verify -> DEBU 4e1c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:48.123 UTC [msp.identity] Verify -> DEBU 4e1d Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:48.123 UTC [msp.identity] Verify -> DEBU 4e1e Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:48.124 UTC [msp] DeserializeIdentity -> DEBU 4e1f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.124 UTC [msp] DeserializeIdentity -> DEBU 4e20 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.125 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e21 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:48.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e22 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e23 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.126 UTC [policies] Evaluate -> DEBU 4e24 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.126 UTC [policies] Evaluate -> DEBU 4e25 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:48.126 UTC [policies] Evaluate -> DEBU 4e26 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.126 UTC [cauthdsl] func1 -> DEBU 4e27 0xc00425e7f0 gate 1569284808126621800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.126 UTC [cauthdsl] func2 -> DEBU 4e28 0xc00425e7f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.127 UTC [cauthdsl] func2 -> DEBU 4e29 0xc00425e7f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.128 UTC [cauthdsl] func2 -> DEBU 4e2a 0xc00425e7f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:48.128 UTC [cauthdsl] func2 -> DEBU 4e2b 0xc00425e7f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.128 UTC [cauthdsl] func1 -> DEBU 4e2c 0xc00425e7f0 gate 1569284808126621800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.128 UTC [policies] Evaluate -> DEBU 4e2d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.129 UTC [policies] Evaluate -> DEBU 4e2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.129 UTC [policies] Evaluate -> DEBU 4e2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.129 UTC [cauthdsl] func1 -> DEBU 4e30 0xc00425f030 gate 1569284808129830900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.129 UTC [cauthdsl] func2 -> DEBU 4e31 0xc00425f030 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.129 UTC [cauthdsl] func2 -> DEBU 4e32 0xc00425f030 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.130 UTC [cauthdsl] func2 -> DEBU 4e33 0xc00425f030 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.130 UTC [msp.identity] Verify -> DEBU 4e34 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:48.131 UTC [msp.identity] Verify -> DEBU 4e35 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:48.131 UTC [cauthdsl] func2 -> DEBU 4e36 0xc00425f030 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.131 UTC [cauthdsl] func1 -> DEBU 4e37 0xc00425f030 gate 1569284808129830900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:48.131 UTC [policies] Evaluate -> DEBU 4e38 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.132 UTC [policies] Evaluate -> DEBU 4e39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.132 UTC [policies] Evaluate -> DEBU 4e3a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.132 UTC [policies] Evaluate -> DEBU 4e3b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.133 UTC [msp] DeserializeIdentity -> DEBU 4e3c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.133 UTC [msp] DeserializeIdentity -> DEBU 4e3d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.133 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e3e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:48.133 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e3f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e40 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.134 UTC [policies] Evaluate -> DEBU 4e41 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.134 UTC [policies] Evaluate -> DEBU 4e42 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:48.134 UTC [policies] Evaluate -> DEBU 4e43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.135 UTC [cauthdsl] func1 -> DEBU 4e44 0xc004272800 gate 1569284808135319900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.135 UTC [cauthdsl] func2 -> DEBU 4e45 0xc004272800 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.136 UTC [cauthdsl] func2 -> DEBU 4e46 0xc004272800 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.136 UTC [cauthdsl] func2 -> DEBU 4e47 0xc004272800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:48.137 UTC [cauthdsl] func2 -> DEBU 4e48 0xc004272800 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.137 UTC [cauthdsl] func1 -> DEBU 4e49 0xc004272800 gate 1569284808135319900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.137 UTC [policies] Evaluate -> DEBU 4e4a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.137 UTC [policies] Evaluate -> DEBU 4e4b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.137 UTC [policies] Evaluate -> DEBU 4e4c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.138 UTC [cauthdsl] func1 -> DEBU 4e4d 0xc004273040 gate 1569284808138036900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.138 UTC [cauthdsl] func2 -> DEBU 4e4e 0xc004273040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.138 UTC [cauthdsl] func2 -> DEBU 4e4f 0xc004273040 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.138 UTC [cauthdsl] func2 -> DEBU 4e50 0xc004273040 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.139 UTC [msp.identity] Verify -> DEBU 4e51 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:48.140 UTC [msp.identity] Verify -> DEBU 4e52 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:48.140 UTC [cauthdsl] func2 -> DEBU 4e53 0xc004273040 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.140 UTC [cauthdsl] func1 -> DEBU 4e54 0xc004273040 gate 1569284808138036900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:48.141 UTC [policies] Evaluate -> DEBU 4e55 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.141 UTC [policies] Evaluate -> DEBU 4e56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.141 UTC [policies] Evaluate -> DEBU 4e57 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.141 UTC [policies] Evaluate -> DEBU 4e58 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.141 UTC [gossip.gossip] handleMessage -> DEBU 4e59 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.275 UTC [msp] DeserializeIdentity -> DEBU 4e5a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.275 UTC [msp] DeserializeIdentity -> DEBU 4e5b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.277 UTC [gossip.pull] Hello -> DEBU 4e5c Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:48.277 UTC [msp] DeserializeIdentity -> DEBU 4e5d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.277 UTC [msp] DeserializeIdentity -> DEBU 4e5e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.278 UTC [gossip.comm] Send -> DEBU 4e5f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:48.278 UTC [gossip.comm] sendToEndpoint -> DEBU 4e60 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.278 UTC [gossip.comm] sendToEndpoint -> DEBU 4e61 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.280 UTC [gossip.comm] func1 -> DEBU 4e62 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.280 UTC [gossip.gossip] handleMessage -> DEBU 4e63 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.280 UTC [gossip.pull] HandleMessage -> DEBU 4e64 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.282 UTC [gossip.gossip] handleMessage -> DEBU 4e65 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.582 UTC [gossip.comm] func1 -> DEBU 4e66 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.582 UTC [gossip.gossip] handleMessage -> DEBU 4e67 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.582 UTC [msp] DeserializeIdentity -> DEBU 4e68 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.582 UTC [msp] DeserializeIdentity -> DEBU 4e69 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.583 UTC [gossip.gossip] handleMessage -> DEBU 4e6a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.761 UTC [gossip.comm] func1 -> DEBU 4e6b Got message: GossipMessage: tag:EMPTY mem_req:\200g\202\302J\220\374\201\220\333\r\345\376;s\244\021\240\3401\367\267\002\033\302\036\271!\246\002 a\036\322NM+\270:\351gS\340\026\374,\210.\235\312(\374Q\000:\274\241\343\337\275/0\257" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.761 UTC [gossip.gossip] handleMessage -> DEBU 4e6c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\200g\202\302J\220\374\201\220\333\r\345\376;s\244\021\240\3401\367\267\002\033\302\036\271!\246\002 a\036\322NM+\270:\351gS\340\026\374,\210.\235\312(\374Q\000:\274\241\343\337\275/0\257" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.764 UTC [gossip.gossip] handleMessage -> DEBU 4e6d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.764 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e6e Got message: GossipMessage: tag:EMPTY mem_req:\200g\202\302J\220\374\201\220\333\r\345\376;s\244\021\240\3401\367\267\002\033\302\036\271!\246\002 a\036\322NM+\270:\351gS\340\026\374,\210.\235\312(\374Q\000:\274\241\343\337\275/0\257" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.764 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e6f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:48.765 UTC [msp] DeserializeIdentity -> DEBU 4e70 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.765 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e71 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:48.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e72 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.766 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e73 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:48.767 UTC [policies] Evaluate -> DEBU 4e74 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.767 UTC [policies] Evaluate -> DEBU 4e75 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:48.767 UTC [policies] Evaluate -> DEBU 4e76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.768 UTC [cauthdsl] func1 -> DEBU 4e77 0xc004287bd0 gate 1569284808768140400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.768 UTC [cauthdsl] func2 -> DEBU 4e78 0xc004287bd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.768 UTC [cauthdsl] func2 -> DEBU 4e79 0xc004287bd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.769 UTC [cauthdsl] func2 -> DEBU 4e7a 0xc004287bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:48.769 UTC [cauthdsl] func2 -> DEBU 4e7b 0xc004287bd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.769 UTC [cauthdsl] func1 -> DEBU 4e7c 0xc004287bd0 gate 1569284808768140400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:48.769 UTC [policies] Evaluate -> DEBU 4e7d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.770 UTC [policies] Evaluate -> DEBU 4e7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.770 UTC [policies] Evaluate -> DEBU 4e7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:48.771 UTC [cauthdsl] func1 -> DEBU 4e80 0xc004702410 gate 1569284808771391700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:48.771 UTC [cauthdsl] func2 -> DEBU 4e81 0xc004702410 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:48.772 UTC [cauthdsl] func2 -> DEBU 4e82 0xc004702410 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:48.772 UTC [cauthdsl] func2 -> DEBU 4e83 0xc004702410 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.773 UTC [msp.identity] Verify -> DEBU 4e84 Verify: digest = 00000000 9c 0e 84 91 a3 84 f4 70 80 3f 5d 73 6c 11 06 b5 |.......p.?]sl...| +peer0.org1.example.com | 00000010 5f e3 54 85 52 c1 dd ed c3 37 1d f9 f5 d0 a9 9a |_.T.R....7......|" +peer0.org1.example.com | "2019-09-24 00:26:48.773 UTC [msp.identity] Verify -> DEBU 4e85 Verify: sig = 00000000 30 44 02 20 57 34 3e 80 67 82 c2 4a 90 fc 81 90 |0D. W4>.g..J....| +peer0.org1.example.com | 00000010 db 0d e5 fe 3b 73 a4 11 a0 e0 31 f7 b7 02 1b c2 |....;s....1.....| +peer0.org1.example.com | 00000020 1e b9 21 a6 02 20 61 1e d2 4e 4d 2b b8 3a e9 67 |..!.. a..NM+.:.g| +peer0.org1.example.com | 00000030 53 e0 16 fc 2c 88 2e 9d ca 28 fc 51 00 3a bc a1 |S...,....(.Q.:..| +peer0.org1.example.com | 00000040 e3 df bd 2f 30 af |.../0.|" +peer0.org1.example.com | "2019-09-24 00:26:48.774 UTC [cauthdsl] func2 -> DEBU 4e86 0xc004702410 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:48.774 UTC [cauthdsl] func1 -> DEBU 4e87 0xc004702410 gate 1569284808771391700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:48.774 UTC [policies] Evaluate -> DEBU 4e88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.775 UTC [policies] Evaluate -> DEBU 4e89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.776 UTC [policies] Evaluate -> DEBU 4e8a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.776 UTC [policies] Evaluate -> DEBU 4e8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:48.776 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e8c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.776 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e8d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:48.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e8e updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:48.778 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e8f Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:48.778 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e90 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:48.778 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e91 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.779 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e92 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.779 UTC [gossip.discovery] sendMemResponse -> DEBU 4e93 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:48.779 UTC [msp] DeserializeIdentity -> DEBU 4e94 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.780 UTC [msp] DeserializeIdentity -> DEBU 4e95 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.780 UTC [msp] DeserializeIdentity -> DEBU 4e96 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.780 UTC [gossip.comm] Send -> DEBU 4e97 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:48.781 UTC [gossip.discovery] sendMemResponse -> DEBU 4e98 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020G" signature:"0D\002 \033\326$G`!\313\nr\376)4\301]\001\242\331\2453\177\376\030\370I\304\n\355;\022M\363\250\002 Z7\355\313\204H)\346\351\360\351>\230\321\"t'm\367\347~\225\364P\027\236#B\232$\353S" > alive:\200g\202\302J\220\374\201\220\333\r\345\376;s\244\021\240\3401\367\267\002\033\302\036\271!\246\002 a\036\322NM+\270:\351gS\340\026\374,\210.\235\312(\374Q\000:\274\241\343\337\275/0\257" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:48.781 UTC [gossip.comm] sendToEndpoint -> DEBU 4e99 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.781 UTC [gossip.comm] sendToEndpoint -> DEBU 4e9a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.779 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e9b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.796 UTC [gossip.comm] func1 -> DEBU 4e9c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.796 UTC [gossip.gossip] handleMessage -> DEBU 4e9d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.796 UTC [gossip.pull] HandleMessage -> DEBU 4e9e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.796 UTC [msp] DeserializeIdentity -> DEBU 4e9f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.797 UTC [msp] DeserializeIdentity -> DEBU 4ea0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.797 UTC [msp] DeserializeIdentity -> DEBU 4ea1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.797 UTC [msp] DeserializeIdentity -> DEBU 4ea2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.797 UTC [msp] DeserializeIdentity -> DEBU 4ea3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.797 UTC [msp] DeserializeIdentity -> DEBU 4ea4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:48.798 UTC [gossip.pull] SendDigest -> DEBU 4ea5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:48.798 UTC [gossip.gossip] handleMessage -> DEBU 4ea6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:48.834 UTC [gossip.comm] func1 -> DEBU 4ea7 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.834 UTC [gossip.gossip] handleMessage -> DEBU 4ea8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.835 UTC [gossip.pull] HandleMessage -> DEBU 4ea9 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:48.835 UTC [gossip.pull] SendDigest -> DEBU 4eaa Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:48.835 UTC [gossip.gossip] handleMessage -> DEBU 4eab Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.073 UTC [gossip.gossip] handleMessage -> DEBU 4eac Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.073 UTC [msp] DeserializeIdentity -> DEBU 4ead Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.074 UTC [msp] DeserializeIdentity -> DEBU 4eae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.075 UTC [msp] DeserializeIdentity -> DEBU 4eaf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.075 UTC [gossip.gossip] handleMessage -> DEBU 4eb0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.578 UTC [msp] GetDefaultSigningIdentity -> DEBU 4eb1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:49.578 UTC [msp.identity] Sign -> DEBU 4eb2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151044 " +peer0.org1.example.com | "2019-09-24 00:26:49.578 UTC [msp.identity] Sign -> DEBU 4eb3 Sign: digest: 82DFFC1FEBBD5C75E08E3E49AC1E63B070B2E335D1197BFF30DB2F52A5BCAC64 " +peer0.org1.example.com | "2019-09-24 00:26:49.578 UTC [msp] GetDefaultSigningIdentity -> DEBU 4eb4 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:49.578 UTC [msp.identity] Sign -> DEBU 4eb5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:49.579 UTC [msp.identity] Sign -> DEBU 4eb6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:49.579 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4eb7 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:49.580 UTC [msp] DeserializeIdentity -> DEBU 4eb8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.580 UTC [msp] DeserializeIdentity -> DEBU 4eb9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.581 UTC [gossip.comm] Send -> DEBU 4eba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:49.581 UTC [msp] DeserializeIdentity -> DEBU 4ebb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.581 UTC [gossip.comm] Send -> DEBU 4ebc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:49.584 UTC [msp] DeserializeIdentity -> DEBU 4ebd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.585 UTC [gossip.comm] Send -> DEBU 4ebe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ebf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ec1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ec0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ec2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ec3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ec4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.646 UTC [gossip.comm] func1 -> DEBU 4ec5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.646 UTC [gossip.gossip] handleMessage -> DEBU 4ec6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.646 UTC [gossip.pull] HandleMessage -> DEBU 4ec7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.647 UTC [gossip.pull] SendDigest -> DEBU 4ec8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:49.648 UTC [gossip.gossip] handleMessage -> DEBU 4ec9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.775 UTC [gossip.comm] func1 -> DEBU 4eca Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020H" signature:"0E\002!\000\257\207~\026\327F|\260\021\214\304^S\224?z\265\323\327\032\0105+\203\353\353J\331\256\367I\010\002 \032\020\355\270}\265\361RB5)\371\200\221\362\257pp\220\277\t\022\"h\263\245\017r\234\377\266\026" secret_envelope:\260\267\312I\227%\022\177\020\000@&\245r\026\331\344A\005\tk\332+C)\317\234e\302\243\305" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.775 UTC [gossip.gossip] handleMessage -> DEBU 4ecb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020H" signature:"0E\002!\000\257\207~\026\327F|\260\021\214\304^S\224?z\265\323\327\032\0105+\203\353\353J\331\256\367I\010\002 \032\020\355\270}\265\361RB5)\371\200\221\362\257pp\220\277\t\022\"h\263\245\017r\234\377\266\026" secret_envelope:\260\267\312I\227%\022\177\020\000@&\245r\026\331\344A\005\tk\332+C)\317\234e\302\243\305" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.776 UTC [gossip.gossip] handleMessage -> DEBU 4ecc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ecd Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020H" signature:"0E\002!\000\257\207~\026\327F|\260\021\214\304^S\224?z\265\323\327\032\0105+\203\353\353J\331\256\367I\010\002 \032\020\355\270}\265\361RB5)\371\200\221\362\257pp\220\277\t\022\"h\263\245\017r\234\377\266\026" secret_envelope:\260\267\312I\227%\022\177\020\000@&\245r\026\331\344A\005\tk\332+C)\317\234e\302\243\305" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.776 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ece Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:49.777 UTC [msp.identity] Verify -> DEBU 4ecf Verify: digest = 00000000 7b 8e fe 82 29 24 31 c1 03 cc 5a 99 d7 ad 1e 75 |{...)$1...Z....u| +peer0.org1.example.com | 00000010 34 d2 69 3f b4 dd 47 8e d8 81 70 5c 79 e3 d6 4c |4.i?..G...p\y..L|" +peer0.org1.example.com | "2019-09-24 00:26:49.778 UTC [msp.identity] Verify -> DEBU 4ed0 Verify: sig = 00000000 30 45 02 21 00 af 87 7e 16 d7 46 7c b0 11 8c c4 |0E.!...~..F|....| +peer0.org1.example.com | 00000010 5e 53 94 3f 7a b5 d3 d7 1a 08 35 2b 83 eb eb 4a |^S.?z.....5+...J| +peer0.org1.example.com | 00000020 d9 ae f7 49 08 02 20 1a 10 ed b8 7d b5 f1 52 42 |...I.. ....}..RB| +peer0.org1.example.com | 00000030 35 29 f9 80 91 f2 af 70 70 90 bf 09 12 22 68 b3 |5).....pp...."h.| +peer0.org1.example.com | 00000040 a5 0f 72 9c ff b6 16 |..r....|" +peer0.org1.example.com | "2019-09-24 00:26:49.779 UTC [msp.identity] Verify -> DEBU 4ed1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:49.779 UTC [msp.identity] Verify -> DEBU 4ed2 Verify: sig = 00000000 30 45 02 21 00 d4 9c 3f 80 0e 60 71 ae 1e d1 65 |0E.!...?..`q...e| +peer0.org1.example.com | 00000010 bf 47 a5 53 8b 8f bf 22 7b eb 08 79 7a f4 56 c4 |.G.S..."{..yz.V.| +peer0.org1.example.com | 00000020 8b 16 42 9d 0d 02 20 3e b0 b7 ca 49 97 25 12 7f |..B... >...I.%..| +peer0.org1.example.com | 00000030 10 00 40 26 a5 72 16 d9 e4 41 05 09 6b da 2b 43 |..@&.r...A..k.+C| +peer0.org1.example.com | 00000040 29 cf 9c 65 c2 a3 c5 |)..e...|" +peer0.org1.example.com | "2019-09-24 00:26:49.780 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ed3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.780 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ed4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:49.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ed5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:49.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ed6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:49.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ed7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:49.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ed8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.782 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ed9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.782 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4eda Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.783 UTC [gossip.discovery] sendMemResponse -> DEBU 4edb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:49.783 UTC [msp] DeserializeIdentity -> DEBU 4edc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.783 UTC [msp] DeserializeIdentity -> DEBU 4edd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.784 UTC [gossip.comm] Send -> DEBU 4ede Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:49.785 UTC [gossip.comm] sendToEndpoint -> DEBU 4ee0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.785 UTC [gossip.comm] sendToEndpoint -> DEBU 4ee1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.785 UTC [gossip.discovery] sendMemResponse -> DEBU 4edf Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020H" signature:"0E\002!\000\257\207~\026\327F|\260\021\214\304^S\224?z\265\323\327\032\0105+\203\353\353J\331\256\367I\010\002 \032\020\355\270}\265\361RB5)\371\200\221\362\257pp\220\277\t\022\"h\263\245\017r\234\377\266\026" secret_envelope:\260\267\312I\227%\022\177\020\000@&\245r\026\331\344A\005\tk\332+C)\317\234e\302\243\305" > > alive: " +peer0.org1.example.com | "2019-09-24 00:26:49.940 UTC [gossip.gossip] handleMessage -> DEBU 4ee2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.941 UTC [gossip.gossip] handleMessage -> DEBU 4ee3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.941 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ee4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.941 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ee5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:49.941 UTC [msp] DeserializeIdentity -> DEBU 4ee6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.941 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ee7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:49.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ee8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:49.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ee9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:49.942 UTC [policies] Evaluate -> DEBU 4eea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:49.942 UTC [policies] Evaluate -> DEBU 4eeb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:49.942 UTC [policies] Evaluate -> DEBU 4eec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:49.942 UTC [cauthdsl] func1 -> DEBU 4eed 0xc004763620 gate 1569284809942356300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:49.942 UTC [cauthdsl] func2 -> DEBU 4eee 0xc004763620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:49.942 UTC [cauthdsl] func2 -> DEBU 4eef 0xc004763620 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:49.942 UTC [cauthdsl] func2 -> DEBU 4ef0 0xc004763620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:49.942 UTC [cauthdsl] func2 -> DEBU 4ef1 0xc004763620 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:49.942 UTC [cauthdsl] func1 -> DEBU 4ef2 0xc004763620 gate 1569284809942356300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:49.943 UTC [policies] Evaluate -> DEBU 4ef3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:49.943 UTC [policies] Evaluate -> DEBU 4ef4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:49.943 UTC [policies] Evaluate -> DEBU 4ef5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:49.943 UTC [cauthdsl] func1 -> DEBU 4ef6 0xc004763e60 gate 1569284809943368200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:49.943 UTC [cauthdsl] func2 -> DEBU 4ef7 0xc004763e60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:49.943 UTC [cauthdsl] func2 -> DEBU 4ef8 0xc004763e60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:49.943 UTC [cauthdsl] func2 -> DEBU 4ef9 0xc004763e60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:49.943 UTC [msp.identity] Verify -> DEBU 4efa Verify: digest = 00000000 50 a1 12 d4 b8 20 a2 da e1 58 ad 0b 52 91 41 c8 |P.... ...X..R.A.| +peer0.org1.example.com | 00000010 a2 46 3d 23 76 23 3d e0 ba 80 6c c1 ea 7f a5 86 |.F=#v#=...l.....|" +peer0.org1.example.com | "2019-09-24 00:26:49.943 UTC [msp.identity] Verify -> DEBU 4efb Verify: sig = 00000000 30 44 02 20 50 14 18 07 3d 88 ea 09 37 65 d3 f6 |0D. P...=...7e..| +peer0.org1.example.com | 00000010 1d 9c d5 4e 3b d4 dc 4d 39 9c fe 37 74 17 1d 93 |...N;..M9..7t...| +peer0.org1.example.com | 00000020 3b 66 82 4e 02 20 37 36 41 d5 68 c5 bb aa 3c 2a |;f.N. 76A.h...<*| +peer0.org1.example.com | 00000030 ae e5 7e 10 df c4 ea 8b bb 0c 32 7c 52 ba 07 40 |..~.......2|R..@| +peer0.org1.example.com | 00000040 f2 57 c4 79 08 00 |.W.y..|" +peer0.org1.example.com | "2019-09-24 00:26:49.944 UTC [cauthdsl] func2 -> DEBU 4efc 0xc004763e60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:49.944 UTC [cauthdsl] func1 -> DEBU 4efd 0xc004763e60 gate 1569284809943368200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:49.944 UTC [policies] Evaluate -> DEBU 4efe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:49.944 UTC [policies] Evaluate -> DEBU 4eff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:49.944 UTC [policies] Evaluate -> DEBU 4f00 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:49.944 UTC [policies] Evaluate -> DEBU 4f01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:49.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f02 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f03 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:49.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f04 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:49.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f05 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:49.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f06 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:49.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f07 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f08 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f09 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.949 UTC [msp] DeserializeIdentity -> DEBU 4f0a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.949 UTC [msp] DeserializeIdentity -> DEBU 4f0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.950 UTC [msp] DeserializeIdentity -> DEBU 4f0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.950 UTC [msp] DeserializeIdentity -> DEBU 4f0d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.951 UTC [msp] DeserializeIdentity -> DEBU 4f0e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.951 UTC [msp] DeserializeIdentity -> DEBU 4f0f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.951 UTC [msp] DeserializeIdentity -> DEBU 4f10 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.951 UTC [gossip.comm] Send -> DEBU 4f11 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:49.952 UTC [msp] DeserializeIdentity -> DEBU 4f12 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:49.953 UTC [gossip.comm] Send -> DEBU 4f13 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:49.953 UTC [gossip.comm] sendToEndpoint -> DEBU 4f14 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.953 UTC [gossip.comm] sendToEndpoint -> DEBU 4f15 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.954 UTC [gossip.comm] sendToEndpoint -> DEBU 4f16 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.954 UTC [gossip.comm] sendToEndpoint -> DEBU 4f17 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.955 UTC [gossip.comm] func1 -> DEBU 4f18 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.955 UTC [gossip.gossip] handleMessage -> DEBU 4f19 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.955 UTC [gossip.gossip] handleMessage -> DEBU 4f1a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f1b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f1c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.957 UTC [gossip.comm] func1 -> DEBU 4f1d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.957 UTC [gossip.gossip] handleMessage -> DEBU 4f1e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.959 UTC [gossip.gossip] handleMessage -> DEBU 4f1f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:49.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f20 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:49.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f21 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:50.009 UTC [gossip.comm] func1 -> DEBU 4f22 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.009 UTC [gossip.gossip] handleMessage -> DEBU 4f23 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.009 UTC [msp] DeserializeIdentity -> DEBU 4f24 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.010 UTC [msp] DeserializeIdentity -> DEBU 4f25 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.011 UTC [msp] DeserializeIdentity -> DEBU 4f26 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.012 UTC [gossip.gossip] handleMessage -> DEBU 4f27 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:50.671 UTC [gossip.comm] func1 -> DEBU 4f28 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.671 UTC [gossip.gossip] handleMessage -> DEBU 4f29 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.671 UTC [gossip.gossip] handleMessage -> DEBU 4f2a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:50.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f2b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.673 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4f2c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:50.673 UTC [msp] DeserializeIdentity -> DEBU 4f2d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.674 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f2e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:50.674 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f2f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:50.674 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f30 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:50.674 UTC [policies] Evaluate -> DEBU 4f31 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:50.675 UTC [policies] Evaluate -> DEBU 4f32 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:50.676 UTC [policies] Evaluate -> DEBU 4f33 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:50.676 UTC [cauthdsl] func1 -> DEBU 4f34 0xc004795c30 gate 1569284810676153400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:50.677 UTC [cauthdsl] func2 -> DEBU 4f35 0xc004795c30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:50.677 UTC [cauthdsl] func2 -> DEBU 4f36 0xc004795c30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:50.678 UTC [cauthdsl] func2 -> DEBU 4f37 0xc004795c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:50.678 UTC [cauthdsl] func2 -> DEBU 4f38 0xc004795c30 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:50.678 UTC [cauthdsl] func1 -> DEBU 4f39 0xc004795c30 gate 1569284810676153400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:50.679 UTC [policies] Evaluate -> DEBU 4f3a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:50.680 UTC [policies] Evaluate -> DEBU 4f3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:50.681 UTC [policies] Evaluate -> DEBU 4f3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:50.681 UTC [cauthdsl] func1 -> DEBU 4f3d 0xc0047b4470 gate 1569284810681277800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:50.681 UTC [cauthdsl] func2 -> DEBU 4f3e 0xc0047b4470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:50.681 UTC [cauthdsl] func2 -> DEBU 4f3f 0xc0047b4470 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:50.682 UTC [cauthdsl] func2 -> DEBU 4f40 0xc0047b4470 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:50.682 UTC [msp.identity] Verify -> DEBU 4f41 Verify: digest = 00000000 5a 44 38 bc 43 ed 91 3e a0 23 4a e1 52 c5 40 37 |ZD8.C..>.#J.R.@7| +peer0.org1.example.com | 00000010 33 b8 29 fd 03 76 72 a7 f8 2d 92 e5 95 19 f7 2d |3.)..vr..-.....-|" +peer0.org1.example.com | "2019-09-24 00:26:50.682 UTC [msp.identity] Verify -> DEBU 4f42 Verify: sig = 00000000 30 45 02 21 00 fb 2a a2 79 1e 10 d1 72 42 1a fc |0E.!..*.y...rB..| +peer0.org1.example.com | 00000010 80 84 e8 49 35 f6 28 b0 11 26 67 c6 85 5b c6 8f |...I5.(..&g..[..| +peer0.org1.example.com | 00000020 43 69 10 f2 53 02 20 2f c5 44 89 80 10 aa 4d 4e |Ci..S. /.D....MN| +peer0.org1.example.com | 00000030 eb 64 ed 52 50 25 7d 7d 50 40 89 9c cf d1 be 25 |.d.RP%}}P@.....%| +peer0.org1.example.com | 00000040 a8 64 7b 25 f6 f1 1d |.d{%...|" +peer0.org1.example.com | "2019-09-24 00:26:50.683 UTC [cauthdsl] func2 -> DEBU 4f43 0xc0047b4470 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:50.683 UTC [cauthdsl] func1 -> DEBU 4f44 0xc0047b4470 gate 1569284810681277800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:50.683 UTC [policies] Evaluate -> DEBU 4f45 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:50.683 UTC [policies] Evaluate -> DEBU 4f46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:50.684 UTC [policies] Evaluate -> DEBU 4f47 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:50.684 UTC [policies] Evaluate -> DEBU 4f48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:50.684 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f49 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.685 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f4a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:50.685 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f4b updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:50.686 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f4c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:50.686 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f4d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:50.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f4e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:50.687 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f4f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:50.688 UTC [gossip.comm] func1 -> DEBU 4f50 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.688 UTC [gossip.gossip] handleMessage -> DEBU 4f51 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.688 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f52 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:50.690 UTC [gossip.gossip] handleMessage -> DEBU 4f53 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:50.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f54 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f55 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:50.693 UTC [gossip.gossip] handleMessage -> DEBU 4f56 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.693 UTC [gossip.gossip] handleMessage -> DEBU 4f57 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:50.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f58 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f59 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:50.698 UTC [msp] DeserializeIdentity -> DEBU 4f5a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.698 UTC [msp] DeserializeIdentity -> DEBU 4f5b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.699 UTC [msp] DeserializeIdentity -> DEBU 4f5c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.699 UTC [msp] DeserializeIdentity -> DEBU 4f5d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.699 UTC [msp] DeserializeIdentity -> DEBU 4f5e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.699 UTC [msp] DeserializeIdentity -> DEBU 4f5f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.699 UTC [msp] DeserializeIdentity -> DEBU 4f60 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.700 UTC [gossip.comm] Send -> DEBU 4f61 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:50.700 UTC [msp] DeserializeIdentity -> DEBU 4f62 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:50.701 UTC [gossip.comm] Send -> DEBU 4f63 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:50.702 UTC [gossip.comm] sendToEndpoint -> DEBU 4f64 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.702 UTC [gossip.comm] sendToEndpoint -> DEBU 4f65 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 4f66 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 4f67 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.474 UTC [chaincode.platform.util] DockerBuild -> DEBU 4f68 Build output is # examples/chaincode/go/chaincode_example02 +peer0.org1.example.com | /tmp/go-link-949351753/000001.o: In function `pluginOpen': +peer0.org1.example.com | /workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-949351753/000021.o: In function `mygetgrouplist': +peer0.org1.example.com | /workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-949351753/000020.o: In function `mygetgrgid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-949351753/000020.o: In function `mygetgrnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-949351753/000020.o: In function `mygetpwnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-949351753/000020.o: In function `mygetpwuid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-949351753/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': +peer0.org1.example.com | /tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking" +peer0.org1.example.com | "2019-09-24 00:26:51.700 UTC [gossip.pull] Hello -> DEBU 4f69 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:51.700 UTC [gossip.comm] Send -> DEBU 4f6a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:51.700 UTC [gossip.pull] Hello -> DEBU 4f6b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:51.700 UTC [gossip.comm] Send -> DEBU 4f6c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:51.701 UTC [gossip.pull] Hello -> DEBU 4f6d Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:51.701 UTC [gossip.comm] Send -> DEBU 4f6e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f6f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f70 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f71 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f72 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f73 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f74 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.703 UTC [gossip.comm] func1 -> DEBU 4f75 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.703 UTC [gossip.gossip] handleMessage -> DEBU 4f76 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.703 UTC [gossip.pull] HandleMessage -> DEBU 4f77 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.703 UTC [gossip.gossip] handleMessage -> DEBU 4f78 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.704 UTC [gossip.comm] func1 -> DEBU 4f79 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.704 UTC [gossip.gossip] handleMessage -> DEBU 4f7a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.704 UTC [gossip.pull] HandleMessage -> DEBU 4f7b GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.704 UTC [gossip.gossip] handleMessage -> DEBU 4f7c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.705 UTC [gossip.gossip] handleMessage -> DEBU 4f7d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.705 UTC [gossip.pull] HandleMessage -> DEBU 4f7e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.705 UTC [gossip.gossip] handleMessage -> DEBU 4f7f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.842 UTC [msp] GetDefaultSigningIdentity -> DEBU 4f80 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:51.842 UTC [msp.identity] Sign -> DEBU 4f81 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151045 " +peer0.org1.example.com | "2019-09-24 00:26:51.842 UTC [msp.identity] Sign -> DEBU 4f82 Sign: digest: C0290D3BACA55E2E94D24D78B44AEEC3C19C16159E6F5F743132DA9298AC17B8 " +peer0.org1.example.com | "2019-09-24 00:26:51.842 UTC [msp] GetDefaultSigningIdentity -> DEBU 4f83 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:51.842 UTC [msp.identity] Sign -> DEBU 4f84 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:51.842 UTC [msp.identity] Sign -> DEBU 4f85 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:51.843 UTC [gossip.comm] Send -> DEBU 4f86 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:51.843 UTC [msp] DeserializeIdentity -> DEBU 4f87 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:51.843 UTC [gossip.comm] Send -> DEBU 4f88 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:51.843 UTC [msp] DeserializeIdentity -> DEBU 4f89 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:51.843 UTC [gossip.comm] Send -> DEBU 4f8a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:51.843 UTC [gossip.comm] sendToEndpoint -> DEBU 4f8b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.843 UTC [gossip.comm] sendToEndpoint -> DEBU 4f8c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.845 UTC [gossip.comm] sendToEndpoint -> DEBU 4f8d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.845 UTC [gossip.comm] sendToEndpoint -> DEBU 4f8e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.846 UTC [gossip.comm] sendToEndpoint -> DEBU 4f90 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.845 UTC [gossip.gossip] handleMessage -> DEBU 4f8f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.846 UTC [gossip.gossip] handleMessage -> DEBU 4f91 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4f93 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:51.846 UTC [msp.identity] Verify -> DEBU 4f94 Verify: digest = 00000000 7b 8e fe 82 29 24 31 c1 03 cc 5a 99 d7 ad 1e 75 |{...)$1...Z....u| +peer0.org1.example.com | 00000010 34 d2 69 3f b4 dd 47 8e d8 81 70 5c 79 e3 d6 4c |4.i?..G...p\y..L|" +peer0.org1.example.com | "2019-09-24 00:26:51.846 UTC [msp.identity] Verify -> DEBU 4f95 Verify: sig = 00000000 30 45 02 21 00 af 87 7e 16 d7 46 7c b0 11 8c c4 |0E.!...~..F|....| +peer0.org1.example.com | 00000010 5e 53 94 3f 7a b5 d3 d7 1a 08 35 2b 83 eb eb 4a |^S.?z.....5+...J| +peer0.org1.example.com | 00000020 d9 ae f7 49 08 02 20 1a 10 ed b8 7d b5 f1 52 42 |...I.. ....}..RB| +peer0.org1.example.com | 00000030 35 29 f9 80 91 f2 af 70 70 90 bf 09 12 22 68 b3 |5).....pp...."h.| +peer0.org1.example.com | 00000040 a5 0f 72 9c ff b6 16 |..r....|" +peer0.org1.example.com | "2019-09-24 00:26:51.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f96 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f97 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4f98 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:51.847 UTC [msp.identity] Verify -> DEBU 4f99 Verify: digest = 00000000 c0 29 0d 3b ac a5 5e 2e 94 d2 4d 78 b4 4a ee c3 |.).;..^...Mx.J..| +peer0.org1.example.com | 00000010 c1 9c 16 15 9e 6f 5f 74 31 32 da 92 98 ac 17 b8 |.....o_t12......|" +peer0.org1.example.com | "2019-09-24 00:26:51.847 UTC [msp.identity] Verify -> DEBU 4f9a Verify: sig = 00000000 30 44 02 20 76 ae 47 5d 19 45 82 62 55 6c be a4 |0D. v.G].E.bUl..| +peer0.org1.example.com | 00000010 3a 7e 59 2e 25 d9 2b 8d 8e 73 34 16 00 c4 72 28 |:~Y.%.+..s4...r(| +peer0.org1.example.com | 00000020 66 e5 56 c1 02 20 2b 22 b6 66 48 8e c2 1f 59 b5 |f.V.. +".fH...Y.| +peer0.org1.example.com | 00000030 52 4c 61 3d de 04 f9 4b 78 b0 63 64 de 56 bb a2 |RLa=...Kx.cd.V..| +peer0.org1.example.com | 00000040 c9 2c d7 d0 54 36 |.,..T6|" +peer0.org1.example.com | "2019-09-24 00:26:51.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f9b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.847 UTC [gossip.discovery] isSentByMe -> DEBU 4f9c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f9d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f9e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.850 UTC [gossip.comm] func1 -> DEBU 4f9f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.850 UTC [gossip.gossip] handleMessage -> DEBU 4fa0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.851 UTC [gossip.gossip] handleMessage -> DEBU 4fa1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fa2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4fa3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:51.851 UTC [msp.identity] Verify -> DEBU 4fa4 Verify: digest = 00000000 c0 29 0d 3b ac a5 5e 2e 94 d2 4d 78 b4 4a ee c3 |.).;..^...Mx.J..| +peer0.org1.example.com | 00000010 c1 9c 16 15 9e 6f 5f 74 31 32 da 92 98 ac 17 b8 |.....o_t12......|" +peer0.org1.example.com | "2019-09-24 00:26:51.851 UTC [msp.identity] Verify -> DEBU 4fa5 Verify: sig = 00000000 30 44 02 20 76 ae 47 5d 19 45 82 62 55 6c be a4 |0D. v.G].E.bUl..| +peer0.org1.example.com | 00000010 3a 7e 59 2e 25 d9 2b 8d 8e 73 34 16 00 c4 72 28 |:~Y.%.+..s4...r(| +peer0.org1.example.com | 00000020 66 e5 56 c1 02 20 2b 22 b6 66 48 8e c2 1f 59 b5 |f.V.. +".fH...Y.| +peer0.org1.example.com | 00000030 52 4c 61 3d de 04 f9 4b 78 b0 63 64 de 56 bb a2 |RLa=...Kx.cd.V..| +peer0.org1.example.com | 00000040 c9 2c d7 d0 54 36 |.,..T6|" +peer0.org1.example.com | "2019-09-24 00:26:51.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fa6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.851 UTC [gossip.discovery] isSentByMe -> DEBU 4fa7 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fa8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4fa9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:51.851 UTC [msp.identity] Verify -> DEBU 4faa Verify: digest = 00000000 7b 8e fe 82 29 24 31 c1 03 cc 5a 99 d7 ad 1e 75 |{...)$1...Z....u| +peer0.org1.example.com | 00000010 34 d2 69 3f b4 dd 47 8e d8 81 70 5c 79 e3 d6 4c |4.i?..G...p\y..L|" +peer0.org1.example.com | "2019-09-24 00:26:51.851 UTC [msp.identity] Verify -> DEBU 4fab Verify: sig = 00000000 30 45 02 21 00 af 87 7e 16 d7 46 7c b0 11 8c c4 |0E.!...~..F|....| +peer0.org1.example.com | 00000010 5e 53 94 3f 7a b5 d3 d7 1a 08 35 2b 83 eb eb 4a |^S.?z.....5+...J| +peer0.org1.example.com | 00000020 d9 ae f7 49 08 02 20 1a 10 ed b8 7d b5 f1 52 42 |...I.. ....}..RB| +peer0.org1.example.com | 00000030 35 29 f9 80 91 f2 af 70 70 90 bf 09 12 22 68 b3 |5).....pp...."h.| +peer0.org1.example.com | 00000040 a5 0f 72 9c ff b6 16 |..r....|" +peer0.org1.example.com | "2019-09-24 00:26:51.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fac Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fad Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fae Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.854 UTC [gossip.comm] sendToEndpoint -> DEBU 4faf Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.856 UTC [gossip.comm] func1 -> DEBU 4fb0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.856 UTC [gossip.gossip] handleMessage -> DEBU 4fb1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.856 UTC [gossip.gossip] handleMessage -> DEBU 4fb2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fb3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.857 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4fb4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:51.857 UTC [msp.identity] Verify -> DEBU 4fb5 Verify: digest = 00000000 c0 29 0d 3b ac a5 5e 2e 94 d2 4d 78 b4 4a ee c3 |.).;..^...Mx.J..| +peer0.org1.example.com | 00000010 c1 9c 16 15 9e 6f 5f 74 31 32 da 92 98 ac 17 b8 |.....o_t12......|" +peer0.org1.example.com | "2019-09-24 00:26:51.857 UTC [msp.identity] Verify -> DEBU 4fb6 Verify: sig = 00000000 30 44 02 20 76 ae 47 5d 19 45 82 62 55 6c be a4 |0D. v.G].E.bUl..| +peer0.org1.example.com | 00000010 3a 7e 59 2e 25 d9 2b 8d 8e 73 34 16 00 c4 72 28 |:~Y.%.+..s4...r(| +peer0.org1.example.com | 00000020 66 e5 56 c1 02 20 2b 22 b6 66 48 8e c2 1f 59 b5 |f.V.. +".fH...Y.| +peer0.org1.example.com | 00000030 52 4c 61 3d de 04 f9 4b 78 b0 63 64 de 56 bb a2 |RLa=...Kx.cd.V..| +peer0.org1.example.com | 00000040 c9 2c d7 d0 54 36 |.,..T6|" +peer0.org1.example.com | "2019-09-24 00:26:51.857 UTC [msp.identity] Verify -> DEBU 4fb7 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:51.858 UTC [msp.identity] Verify -> DEBU 4fb8 Verify: sig = 00000000 30 45 02 21 00 91 7b 8b 1f 0c 08 35 90 cd 82 06 |0E.!..{....5....| +peer0.org1.example.com | 00000010 b8 47 fb ee 0c 48 03 ed 12 9a a3 23 ee 19 fc 1a |.G...H.....#....| +peer0.org1.example.com | 00000020 a2 94 d3 05 1f 02 20 67 f1 91 03 4b c7 ee fb 6a |...... g...K...j| +peer0.org1.example.com | 00000030 58 35 6c 35 8e 89 4b 14 c0 d5 46 18 2f 96 e8 9b |X5l5..K...F./...| +peer0.org1.example.com | 00000040 6b aa fe 88 68 86 5b |k...h.[|" +peer0.org1.example.com | "2019-09-24 00:26:51.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fb9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.862 UTC [gossip.discovery] isSentByMe -> DEBU 4fba Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fbb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fbc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:51.915 UTC [gossip.gossip] handleMessage -> DEBU 4fbd Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.916 UTC [gossip.pull] HandleMessage -> DEBU 4fbe GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:51.916 UTC [msp] DeserializeIdentity -> DEBU 4fbf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:51.916 UTC [msp] DeserializeIdentity -> DEBU 4fc0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:51.916 UTC [msp] DeserializeIdentity -> DEBU 4fc1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:51.917 UTC [msp] DeserializeIdentity -> DEBU 4fc2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:51.917 UTC [msp] DeserializeIdentity -> DEBU 4fc3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:51.917 UTC [msp] DeserializeIdentity -> DEBU 4fc4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:51.918 UTC [gossip.pull] SendDigest -> DEBU 4fc5 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:51.918 UTC [gossip.gossip] handleMessage -> DEBU 4fc6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.015 UTC [gossip.gossip] handleMessage -> DEBU 4fc7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.015 UTC [gossip.gossip] handleMessage -> DEBU 4fc8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fc9 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4fca Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [msp] DeserializeIdentity -> DEBU 4fcb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4fcc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4fcd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4fce Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fcf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fd0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fd1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [cauthdsl] func1 -> DEBU 4fd2 0xc0033e90d0 gate 1569284812016435700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fd3 0xc0033e90d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fd4 0xc0033e90d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fd5 0xc0033e90d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fd6 0xc0033e90d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [cauthdsl] func1 -> DEBU 4fd7 0xc0033e90d0 gate 1569284812016435700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fd8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fd9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fda == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [cauthdsl] func1 -> DEBU 4fdb 0xc0033e9930 gate 1569284812016725300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fdc 0xc0033e9930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fdd 0xc0033e9930 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fde 0xc0033e9930 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [msp.identity] Verify -> DEBU 4fdf Verify: digest = 00000000 fa 7d 7a 07 82 19 0c 74 71 2c c4 14 13 59 9a c8 |.}z....tq,...Y..| +peer0.org1.example.com | 00000010 cc f5 49 13 dc da c3 20 b5 24 63 c6 91 88 12 9b |..I.... .$c.....|" +peer0.org1.example.com | "2019-09-24 00:26:52.016 UTC [msp.identity] Verify -> DEBU 4fe0 Verify: sig = 00000000 30 44 02 20 06 dc 1a be 74 8b 1e f2 6c b7 89 9c |0D. ....t...l...| +peer0.org1.example.com | 00000010 1a 64 08 8c 88 66 4c 22 eb 01 91 d1 7c fe 54 6d |.d...fL"....|.Tm| +peer0.org1.example.com | 00000020 24 53 bb 49 02 20 53 96 84 d7 8c 58 36 88 ca 02 |$S.I. S....X6...| +peer0.org1.example.com | 00000030 22 5a 42 fb 41 8d 90 45 bf af c4 d0 15 36 a1 e0 |"ZB.A..E.....6..| +peer0.org1.example.com | 00000040 b5 e9 39 65 77 7c |..9ew||" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [cauthdsl] func2 -> DEBU 4fe1 0xc0033e9930 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [cauthdsl] func1 -> DEBU 4fe2 0xc0033e9930 gate 1569284812016725300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [policies] Evaluate -> DEBU 4fe3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [policies] Evaluate -> DEBU 4fe4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [policies] Evaluate -> DEBU 4fe5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [policies] Evaluate -> DEBU 4fe6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fe7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 4fe8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 4fe9 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 4fea Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 4feb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 4fec Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fed Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fee Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [gossip.discovery] sendMemResponse -> DEBU 4fef Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [msp] DeserializeIdentity -> DEBU 4ff0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.017 UTC [msp] DeserializeIdentity -> DEBU 4ff1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.018 UTC [msp] DeserializeIdentity -> DEBU 4ff2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.018 UTC [gossip.comm] Send -> DEBU 4ff3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:52.018 UTC [gossip.discovery] sendMemResponse -> DEBU 4ff4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020H" signature:"0E\002!\000\257\207~\026\327F|\260\021\214\304^S\224?z\265\323\327\032\0105+\203\353\353J\331\256\367I\010\002 \032\020\355\270}\265\361RB5)\371\200\221\362\257pp\220\277\t\022\"h\263\245\017r\234\377\266\026" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:52.018 UTC [gossip.comm] sendToEndpoint -> DEBU 4ff5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.018 UTC [gossip.comm] sendToEndpoint -> DEBU 4ff6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.081 UTC [msp] DeserializeIdentity -> DEBU 4ff7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.081 UTC [msp] DeserializeIdentity -> DEBU 4ff8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.081 UTC [gossip.comm] Send -> DEBU 4ff9 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4ffa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4ffb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4ffc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4ffd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4ffe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4fff Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.082 UTC [gossip.comm] func1 -> DEBU 5000 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.082 UTC [gossip.gossip] handleMessage -> DEBU 5001 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.082 UTC [msp.identity] Verify -> DEBU 5002 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:52.082 UTC [msp.identity] Verify -> DEBU 5003 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [msp.identity] Verify -> DEBU 5004 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [msp.identity] Verify -> DEBU 5005 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [msp] DeserializeIdentity -> DEBU 5006 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [msp] DeserializeIdentity -> DEBU 5007 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5008 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5009 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 500a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [policies] Evaluate -> DEBU 500b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [policies] Evaluate -> DEBU 500c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [policies] Evaluate -> DEBU 500d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [cauthdsl] func1 -> DEBU 500e 0xc002b216b0 gate 1569284812083899800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [cauthdsl] func2 -> DEBU 500f 0xc002b216b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [cauthdsl] func2 -> DEBU 5010 0xc002b216b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.083 UTC [cauthdsl] func2 -> DEBU 5011 0xc002b216b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [cauthdsl] func2 -> DEBU 5012 0xc002b216b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [cauthdsl] func1 -> DEBU 5013 0xc002b216b0 gate 1569284812083899800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5014 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5015 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5016 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [cauthdsl] func1 -> DEBU 5017 0xc002b21f00 gate 1569284812084155500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [cauthdsl] func2 -> DEBU 5018 0xc002b21f00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [cauthdsl] func2 -> DEBU 5019 0xc002b21f00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [cauthdsl] func2 -> DEBU 501a 0xc002b21f00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [msp.identity] Verify -> DEBU 501b Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [msp.identity] Verify -> DEBU 501c Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [cauthdsl] func2 -> DEBU 501d 0xc002b21f00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [cauthdsl] func1 -> DEBU 501e 0xc002b21f00 gate 1569284812084155500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 501f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5020 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5021 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5022 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [msp] DeserializeIdentity -> DEBU 5023 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [msp] DeserializeIdentity -> DEBU 5024 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.084 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5025 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5026 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5027 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 5028 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 5029 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 502a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [cauthdsl] func1 -> DEBU 502b 0xc00288f6d0 gate 1569284812085232100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 502c 0xc00288f6d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 502d 0xc00288f6d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 502e 0xc00288f6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 502f 0xc00288f6d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [cauthdsl] func1 -> DEBU 5030 0xc00288f6d0 gate 1569284812085232100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 5031 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 5032 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 5033 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [cauthdsl] func1 -> DEBU 5034 0xc00031e000 gate 1569284812085628900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 5035 0xc00031e000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 5036 0xc00031e000 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 5037 0xc00031e000 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [msp.identity] Verify -> DEBU 5038 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:52.085 UTC [msp.identity] Verify -> DEBU 5039 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:52.086 UTC [cauthdsl] func2 -> DEBU 503a 0xc00031e000 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.086 UTC [cauthdsl] func1 -> DEBU 503b 0xc00031e000 gate 1569284812085628900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:52.086 UTC [policies] Evaluate -> DEBU 503c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.086 UTC [policies] Evaluate -> DEBU 503d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.086 UTC [policies] Evaluate -> DEBU 503e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.086 UTC [policies] Evaluate -> DEBU 503f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.086 UTC [gossip.gossip] handleMessage -> DEBU 5040 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.086 UTC [gossip.gossip] handleMessage -> DEBU 5041 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.086 UTC [msp] DeserializeIdentity -> DEBU 5042 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.086 UTC [msp] DeserializeIdentity -> DEBU 5043 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.086 UTC [msp] DeserializeIdentity -> DEBU 5044 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.087 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5045 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:52.087 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5046 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.087 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5047 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.087 UTC [policies] Evaluate -> DEBU 5048 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.087 UTC [policies] Evaluate -> DEBU 5049 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:52.087 UTC [policies] Evaluate -> DEBU 504a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.087 UTC [cauthdsl] func1 -> DEBU 504b 0xc00031fc90 gate 1569284812087689200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.087 UTC [cauthdsl] func2 -> DEBU 504c 0xc00031fc90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.087 UTC [cauthdsl] func2 -> DEBU 504d 0xc00031fc90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.087 UTC [cauthdsl] func2 -> DEBU 504e 0xc00031fc90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [cauthdsl] func2 -> DEBU 504f 0xc00031fc90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [cauthdsl] func1 -> DEBU 5050 0xc00031fc90 gate 1569284812087689200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [policies] Evaluate -> DEBU 5051 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [policies] Evaluate -> DEBU 5052 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [policies] Evaluate -> DEBU 5053 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [cauthdsl] func1 -> DEBU 5054 0xc00029a500 gate 1569284812088371000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [cauthdsl] func2 -> DEBU 5055 0xc00029a500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [cauthdsl] func2 -> DEBU 5056 0xc00029a500 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [cauthdsl] func2 -> DEBU 5057 0xc00029a500 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [msp.identity] Verify -> DEBU 5058 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [msp.identity] Verify -> DEBU 5059 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [cauthdsl] func2 -> DEBU 505a 0xc00029a500 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.088 UTC [cauthdsl] func1 -> DEBU 505b 0xc00029a500 gate 1569284812088371000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:52.089 UTC [policies] Evaluate -> DEBU 505c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.089 UTC [policies] Evaluate -> DEBU 505d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.089 UTC [policies] Evaluate -> DEBU 505e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.089 UTC [policies] Evaluate -> DEBU 505f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.089 UTC [msp.identity] Verify -> DEBU 5060 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:52.089 UTC [msp.identity] Verify -> DEBU 5061 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:52.089 UTC [msp.identity] Verify -> DEBU 5062 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:52.089 UTC [msp.identity] Verify -> DEBU 5063 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:52.089 UTC [msp] DeserializeIdentity -> DEBU 5064 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.089 UTC [msp] DeserializeIdentity -> DEBU 5065 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5066 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5067 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5068 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 5069 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 506a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 506b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [cauthdsl] func1 -> DEBU 506c 0xc0001e6d40 gate 1569284812090359400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 506d 0xc0001e6d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 506e 0xc0001e6d40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 506f 0xc0001e6d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 5070 0xc0001e6d40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [cauthdsl] func1 -> DEBU 5071 0xc0001e6d40 gate 1569284812090359400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 5072 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 5073 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 5074 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [cauthdsl] func1 -> DEBU 5075 0xc0001e7650 gate 1569284812090734800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 5076 0xc0001e7650 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 5077 0xc0001e7650 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 5078 0xc0001e7650 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [msp.identity] Verify -> DEBU 5079 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:52.090 UTC [msp.identity] Verify -> DEBU 507a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [cauthdsl] func2 -> DEBU 507b 0xc0001e7650 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [cauthdsl] func1 -> DEBU 507c 0xc0001e7650 gate 1569284812090734800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 507d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 507e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 507f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 5080 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [gossip.gossip] handleMessage -> DEBU 5081 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [gossip.comm] func1 -> DEBU 5082 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [gossip.gossip] handleMessage -> DEBU 5083 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [msp] DeserializeIdentity -> DEBU 5084 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [msp] DeserializeIdentity -> DEBU 5085 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [msp] DeserializeIdentity -> DEBU 5086 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5087 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5088 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5089 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 508a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 508b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 508c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func1 -> DEBU 508d 0xc0001f3300 gate 1569284812092007200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 508e 0xc0001f3300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 508f 0xc0001f3300 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 5090 0xc0001f3300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 5091 0xc0001f3300 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func1 -> DEBU 5092 0xc0001f3300 gate 1569284812092007200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 5093 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 5094 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 5095 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func1 -> DEBU 5096 0xc0001f3b50 gate 1569284812092378800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 5097 0xc0001f3b50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 5098 0xc0001f3b50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 5099 0xc0001f3b50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [msp.identity] Verify -> DEBU 509a Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [msp.identity] Verify -> DEBU 509b Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 509c 0xc0001f3b50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [cauthdsl] func1 -> DEBU 509d 0xc0001f3b50 gate 1569284812092378800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 509e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 509f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 50a0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 50a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [msp.identity] Verify -> DEBU 50a2 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [msp.identity] Verify -> DEBU 50a3 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [msp] DeserializeIdentity -> DEBU 50a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [msp] DeserializeIdentity -> DEBU 50a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 50a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 50a7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 50a8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [policies] Evaluate -> DEBU 50a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [policies] Evaluate -> DEBU 50aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [policies] Evaluate -> DEBU 50ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [cauthdsl] func1 -> DEBU 50ac 0xc0001c5be0 gate 1569284812093797800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [cauthdsl] func2 -> DEBU 50ad 0xc0001c5be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [cauthdsl] func2 -> DEBU 50ae 0xc0001c5be0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [cauthdsl] func2 -> DEBU 50af 0xc0001c5be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [cauthdsl] func2 -> DEBU 50b0 0xc0001c5be0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [cauthdsl] func1 -> DEBU 50b1 0xc0001c5be0 gate 1569284812093797800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [policies] Evaluate -> DEBU 50b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.093 UTC [policies] Evaluate -> DEBU 50b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [policies] Evaluate -> DEBU 50b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [cauthdsl] func1 -> DEBU 50b5 0xc0001b0610 gate 1569284812094047000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [cauthdsl] func2 -> DEBU 50b6 0xc0001b0610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [cauthdsl] func2 -> DEBU 50b7 0xc0001b0610 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [cauthdsl] func2 -> DEBU 50b8 0xc0001b0610 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [msp.identity] Verify -> DEBU 50b9 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [msp.identity] Verify -> DEBU 50ba Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [cauthdsl] func2 -> DEBU 50bb 0xc0001b0610 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [cauthdsl] func1 -> DEBU 50bc 0xc0001b0610 gate 1569284812094047000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [policies] Evaluate -> DEBU 50bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [policies] Evaluate -> DEBU 50be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [policies] Evaluate -> DEBU 50bf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [policies] Evaluate -> DEBU 50c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [msp.identity] Verify -> DEBU 50c1 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [msp.identity] Verify -> DEBU 50c2 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:52.094 UTC [gossip.gossip] handleMessage -> DEBU 50c3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.280 UTC [msp] DeserializeIdentity -> DEBU 50c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.280 UTC [msp] DeserializeIdentity -> DEBU 50c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.280 UTC [gossip.pull] Hello -> DEBU 50c6 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:52.280 UTC [msp] DeserializeIdentity -> DEBU 50c7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.280 UTC [msp] DeserializeIdentity -> DEBU 50c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.280 UTC [gossip.comm] Send -> DEBU 50c9 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:52.280 UTC [gossip.comm] sendToEndpoint -> DEBU 50ca Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.280 UTC [gossip.comm] sendToEndpoint -> DEBU 50cb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.281 UTC [gossip.comm] func1 -> DEBU 50cc Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.281 UTC [gossip.gossip] handleMessage -> DEBU 50cd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.281 UTC [gossip.pull] HandleMessage -> DEBU 50ce GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.281 UTC [gossip.gossip] handleMessage -> DEBU 50cf Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.309 UTC [gossip.election] waitForInterrupt -> DEBU 50d0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.309 UTC [gossip.election] IsLeader -> DEBU 50d1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:52.310 UTC [msp] GetDefaultSigningIdentity -> DEBU 50d2 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:52.310 UTC [msp.identity] Sign -> DEBU 50d3 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510181801 " +peer0.org1.example.com | "2019-09-24 00:26:52.310 UTC [msp.identity] Sign -> DEBU 50d4 Sign: digest: 1615B43C94C0C450E8B0ED3E0241E888DA16D6BEEB1B3B1D6BA600A1A75B1576 " +peer0.org1.example.com | "2019-09-24 00:26:52.310 UTC [gossip.election] waitForInterrupt -> DEBU 50d5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50d6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50d7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.317 UTC [gossip.comm] Send -> DEBU 50da Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50db Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50dc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.317 UTC [gossip.comm] sendToEndpoint -> DEBU 50dd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.317 UTC [gossip.comm] sendToEndpoint -> DEBU 50de Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.583 UTC [gossip.comm] func1 -> DEBU 50df Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.583 UTC [gossip.gossip] handleMessage -> DEBU 50e0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.584 UTC [msp] DeserializeIdentity -> DEBU 50e1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.584 UTC [msp] DeserializeIdentity -> DEBU 50e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.584 UTC [gossip.gossip] handleMessage -> DEBU 50e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.704 UTC [gossip.comm] func1 -> DEBU 50e4 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.704 UTC [gossip.gossip] handleMessage -> DEBU 50e5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.704 UTC [gossip.gossip] handleMessage -> DEBU 50e6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50e7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.704 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 50e8 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:52.704 UTC [msp.identity] Verify -> DEBU 50e9 Verify: digest = 00000000 6f 27 fb bc 60 7d f4 67 77 ab ba 9a 89 ba 48 99 |o'..`}.gw.....H.| +peer0.org1.example.com | 00000010 32 77 0f af ea 71 5b 2f 0f ba f4 f2 85 1d 16 f7 |2w...q[/........|" +peer0.org1.example.com | "2019-09-24 00:26:52.704 UTC [msp.identity] Verify -> DEBU 50ea Verify: sig = 00000000 30 44 02 20 4e 3a 95 7f d3 a8 63 3d 35 bc 59 85 |0D. N:....c=5.Y.| +peer0.org1.example.com | 00000010 8e 1a 17 59 c1 7c f9 38 84 95 54 2e ce a3 cf 74 |...Y.|.8..T....t| +peer0.org1.example.com | 00000020 68 31 a6 c1 02 20 5b 20 79 1a ca 5e a1 1a 62 a9 |h1... [ y..^..b.| +peer0.org1.example.com | 00000030 af 68 d6 eb b9 2b a4 a7 1f e3 5d 09 b4 5d 4e 0a |.h...+....]..]N.| +peer0.org1.example.com | 00000040 cb d7 1d ac 47 74 |....Gt|" +peer0.org1.example.com | "2019-09-24 00:26:52.704 UTC [gossip.discovery] handleAliveMessage -> DEBU 50eb Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.704 UTC [gossip.discovery] learnExistingMembers -> DEBU 50ec Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:52.704 UTC [gossip.discovery] learnExistingMembers -> DEBU 50ed updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:52.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 50ee Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:52.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 50ef Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:52.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 50f0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.705 UTC [gossip.discovery] handleAliveMessage -> DEBU 50f1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50f2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.705 UTC [msp] DeserializeIdentity -> DEBU 50f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.705 UTC [msp] DeserializeIdentity -> DEBU 50f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.705 UTC [msp] DeserializeIdentity -> DEBU 50f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.705 UTC [gossip.comm] Send -> DEBU 50f6 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:52.705 UTC [msp] DeserializeIdentity -> DEBU 50f7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.705 UTC [gossip.comm] Send -> DEBU 50f8 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:52.706 UTC [gossip.comm] sendToEndpoint -> DEBU 50f9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.706 UTC [gossip.comm] sendToEndpoint -> DEBU 50fa Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.706 UTC [gossip.comm] sendToEndpoint -> DEBU 50fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.706 UTC [gossip.comm] sendToEndpoint -> DEBU 50fc Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.708 UTC [gossip.comm] func1 -> DEBU 50fd Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.708 UTC [gossip.gossip] handleMessage -> DEBU 50fe Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.708 UTC [gossip.gossip] handleMessage -> DEBU 50ff Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5100 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5101 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.710 UTC [gossip.gossip] handleMessage -> DEBU 5102 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.710 UTC [gossip.gossip] handleMessage -> DEBU 5103 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5104 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5105 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.766 UTC [gossip.comm] func1 -> DEBU 5106 Got message: GossipMessage: tag:EMPTY mem_req:\362\310@6\347U&=\n\006h$\224\206%\223\322-\235\002 kDJ\020\301\3473\372U\223\212\313\272s\027oe\\Gid\311\031\254]N\261\373\016%;\000" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.766 UTC [gossip.gossip] handleMessage -> DEBU 5107 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\362\310@6\347U&=\n\006h$\224\206%\223\322-\235\002 kDJ\020\301\3473\372U\223\212\313\272s\027oe\\Gid\311\031\254]N\261\373\016%;\000" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.766 UTC [gossip.gossip] handleMessage -> DEBU 5108 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.766 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5109 Got message: GossipMessage: tag:EMPTY mem_req:\362\310@6\347U&=\n\006h$\224\206%\223\322-\235\002 kDJ\020\301\3473\372U\223\212\313\272s\027oe\\Gid\311\031\254]N\261\373\016%;\000" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.766 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 510a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:52.766 UTC [msp] DeserializeIdentity -> DEBU 510b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.767 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 510c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:52.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 510d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 510e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:52.767 UTC [policies] Evaluate -> DEBU 510f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.767 UTC [policies] Evaluate -> DEBU 5110 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:52.767 UTC [policies] Evaluate -> DEBU 5111 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.767 UTC [cauthdsl] func1 -> DEBU 5112 0xc000249f30 gate 1569284812767904800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.768 UTC [cauthdsl] func2 -> DEBU 5113 0xc000249f30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.768 UTC [cauthdsl] func2 -> DEBU 5114 0xc000249f30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.768 UTC [cauthdsl] func2 -> DEBU 5115 0xc000249f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:52.768 UTC [cauthdsl] func2 -> DEBU 5116 0xc000249f30 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.769 UTC [cauthdsl] func1 -> DEBU 5117 0xc000249f30 gate 1569284812767904800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:52.769 UTC [policies] Evaluate -> DEBU 5118 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.769 UTC [policies] Evaluate -> DEBU 5119 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.770 UTC [policies] Evaluate -> DEBU 511a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:52.770 UTC [cauthdsl] func1 -> DEBU 511b 0xc0002cc400 gate 1569284812770125000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:52.770 UTC [cauthdsl] func2 -> DEBU 511c 0xc0002cc400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:52.770 UTC [cauthdsl] func2 -> DEBU 511d 0xc0002cc400 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:52.770 UTC [cauthdsl] func2 -> DEBU 511e 0xc0002cc400 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.771 UTC [msp.identity] Verify -> DEBU 511f Verify: digest = 00000000 e5 af 62 a8 39 20 67 f3 ae c0 8e d3 be 28 03 71 |..b.9 g......(.q| +peer0.org1.example.com | 00000010 fa 14 59 00 bc b6 50 47 f4 1e cc b4 08 98 cf 70 |..Y...PG.......p|" +peer0.org1.example.com | "2019-09-24 00:26:52.771 UTC [msp.identity] Verify -> DEBU 5120 Verify: sig = 00000000 30 44 02 20 3d fd 60 53 6f 4f 94 7e 48 28 07 7b |0D. =.`SoO.~H(.{| +peer0.org1.example.com | 00000010 3e f2 c8 40 36 e7 55 26 3d 0a 06 68 24 94 86 25 |>..@6.U&=..h$..%| +peer0.org1.example.com | 00000020 93 d2 2d 9d 02 20 6b 44 4a 10 c1 e7 33 fa 55 93 |..-.. kDJ...3.U.| +peer0.org1.example.com | 00000030 8a cb ba 73 17 6f 65 5c 47 69 64 c9 19 ac 5d 4e |...s.oe\Gid...]N| +peer0.org1.example.com | 00000040 b1 fb 0e 25 3b 00 |...%;.|" +peer0.org1.example.com | "2019-09-24 00:26:52.772 UTC [cauthdsl] func2 -> DEBU 5121 0xc0002cc400 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:52.772 UTC [cauthdsl] func1 -> DEBU 5122 0xc0002cc400 gate 1569284812770125000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:52.772 UTC [policies] Evaluate -> DEBU 5123 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.772 UTC [policies] Evaluate -> DEBU 5124 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.773 UTC [policies] Evaluate -> DEBU 5125 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.773 UTC [policies] Evaluate -> DEBU 5126 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:52.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 5127 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5128 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 5129 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 512a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 512b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 512c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.775 UTC [gossip.discovery] handleAliveMessage -> DEBU 512d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.775 UTC [gossip.discovery] handleMsgFromComm -> DEBU 512e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.776 UTC [gossip.discovery] sendMemResponse -> DEBU 512f Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:52.776 UTC [msp] DeserializeIdentity -> DEBU 5130 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.777 UTC [msp] DeserializeIdentity -> DEBU 5131 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.777 UTC [msp] DeserializeIdentity -> DEBU 5132 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.777 UTC [gossip.comm] Send -> DEBU 5133 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:52.778 UTC [gossip.discovery] sendMemResponse -> DEBU 5134 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020I" signature:"0D\002 N:\225\177\323\250c=5\274Y\205\216\032\027Y\301|\3718\204\225T.\316\243\317th1\246\301\002 [ y\032\312^\241\032b\251\257h\326\353\271+\244\247\037\343]\t\264]N\n\313\327\035\254Gt" > alive:\362\310@6\347U&=\n\006h$\224\206%\223\322-\235\002 kDJ\020\301\3473\372U\223\212\313\272s\027oe\\Gid\311\031\254]N\261\373\016%;\000" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:52.778 UTC [gossip.comm] sendToEndpoint -> DEBU 5135 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.778 UTC [gossip.comm] sendToEndpoint -> DEBU 5136 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.795 UTC [gossip.comm] func1 -> DEBU 5137 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.795 UTC [gossip.gossip] handleMessage -> DEBU 5138 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.795 UTC [gossip.pull] HandleMessage -> DEBU 5139 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:52.795 UTC [gossip.pull] SendDigest -> DEBU 5140 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:52.795 UTC [gossip.gossip] handleMessage -> DEBU 5141 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:52.835 UTC [gossip.comm] func1 -> DEBU 5142 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.835 UTC [gossip.gossip] handleMessage -> DEBU 5143 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.835 UTC [gossip.pull] HandleMessage -> DEBU 5144 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:52.835 UTC [gossip.pull] SendDigest -> DEBU 5145 Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:52.836 UTC [gossip.gossip] handleMessage -> DEBU 5146 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:53.072 UTC [gossip.gossip] handleMessage -> DEBU 5147 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:53.073 UTC [msp] DeserializeIdentity -> DEBU 5148 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:53.073 UTC [msp] DeserializeIdentity -> DEBU 5149 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:53.073 UTC [msp] DeserializeIdentity -> DEBU 514a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:53.074 UTC [gossip.gossip] handleMessage -> DEBU 514b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:53.648 UTC [gossip.comm] func1 -> DEBU 514c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:53.649 UTC [gossip.gossip] handleMessage -> DEBU 514d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:53.649 UTC [gossip.pull] HandleMessage -> DEBU 514e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:53.650 UTC [gossip.pull] SendDigest -> DEBU 514f Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:53.650 UTC [gossip.gossip] handleMessage -> DEBU 5150 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:53.780 UTC [gossip.comm] func1 -> DEBU 5151 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" secret_envelope:`\007\022\243#\247=K\002 Yh\2267 ^((\371w\226\002\373\201\006\024\336\311uz\242\324h\231\304\303l\351\254\222\275\225" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:53.782 UTC [gossip.gossip] handleMessage -> DEBU 5152 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" secret_envelope:`\007\022\243#\247=K\002 Yh\2267 ^((\371w\226\002\373\201\006\024\336\311uz\242\324h\231\304\303l\351\254\222\275\225" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:53.782 UTC [gossip.gossip] handleMessage -> DEBU 5153 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:53.783 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5154 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" secret_envelope:`\007\022\243#\247=K\002 Yh\2267 ^((\371w\226\002\373\201\006\024\336\311uz\242\324h\231\304\303l\351\254\222\275\225" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:53.783 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5155 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:53.783 UTC [msp.identity] Verify -> DEBU 5156 Verify: digest = 00000000 9c fb 93 3f 47 ab 77 72 f6 dd 4e 54 8f a8 61 02 |...?G.wr..NT..a.| +peer0.org1.example.com | 00000010 cf c0 ad 10 26 2c 3e 3b d3 fb b9 12 66 d1 92 d3 |....&,>;....f...|" +peer0.org1.example.com | "2019-09-24 00:26:53.783 UTC [msp.identity] Verify -> DEBU 5157 Verify: sig = 00000000 30 44 02 20 72 63 22 5a bc 4e 15 17 1a 8c cc b7 |0D. rc"Z.N......| +peer0.org1.example.com | 00000010 61 3e 97 04 37 7d 2a 5d 0d a7 7a 3d 9d b6 59 3e |a>..7}*]..z=..Y>| +peer0.org1.example.com | 00000020 4e 59 f0 74 02 20 04 c8 d2 24 1c 99 70 73 bb 9f |NY.t. ...$..ps..| +peer0.org1.example.com | 00000030 0c f8 da fc 68 16 8a 66 1c 2b 23 ca 5e a8 be 2a |....h..f.+#.^..*| +peer0.org1.example.com | 00000040 c5 99 28 25 e1 55 |..(%.U|" +peer0.org1.example.com | "2019-09-24 00:26:53.783 UTC [msp.identity] Verify -> DEBU 5158 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:53.783 UTC [msp.identity] Verify -> DEBU 5159 Verify: sig = 00000000 30 44 02 20 54 d8 13 50 59 47 68 d8 e3 71 39 9c |0D. T..PYGh..q9.| +peer0.org1.example.com | 00000010 9d d3 8b d4 8e f9 f9 ca 96 4c 70 3e 60 07 12 a3 |.........Lp>`...| +peer0.org1.example.com | 00000020 23 a7 3d 4b 02 20 59 68 96 37 20 5e 28 28 f9 77 |#.=K. Yh.7 ^((.w| +peer0.org1.example.com | 00000030 96 02 fb 81 06 14 de c9 75 7a a2 d4 68 99 c4 c3 |........uz..h...| +peer0.org1.example.com | 00000040 6c e9 ac 92 bd 95 |l.....|" +peer0.org1.example.com | "2019-09-24 00:26:53.784 UTC [gossip.discovery] handleAliveMessage -> DEBU 515a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 515b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 515c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 515d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 515e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 515f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:53.784 UTC [gossip.discovery] handleAliveMessage -> DEBU 5160 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:53.785 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5161 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:53.785 UTC [gossip.discovery] sendMemResponse -> DEBU 5162 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:53.786 UTC [msp] DeserializeIdentity -> DEBU 5163 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:53.786 UTC [msp] DeserializeIdentity -> DEBU 5164 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:53.786 UTC [gossip.comm] Send -> DEBU 5165 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:53.787 UTC [gossip.discovery] sendMemResponse -> DEBU 5166 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" secret_envelope:`\007\022\243#\247=K\002 Yh\2267 ^((\371w\226\002\373\201\006\024\336\311uz\242\324h\231\304\303l\351\254\222\275\225" > > alive: " +peer0.org1.example.com | "2019-09-24 00:26:53.787 UTC [gossip.comm] sendToEndpoint -> DEBU 5167 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:53.788 UTC [gossip.comm] sendToEndpoint -> DEBU 5168 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.011 UTC [gossip.comm] func1 -> DEBU 5169 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.011 UTC [gossip.gossip] handleMessage -> DEBU 516a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.012 UTC [msp] DeserializeIdentity -> DEBU 516b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.013 UTC [msp] DeserializeIdentity -> DEBU 516c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.013 UTC [msp] DeserializeIdentity -> DEBU 516d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.013 UTC [gossip.gossip] handleMessage -> DEBU 516e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.582 UTC [msp] GetDefaultSigningIdentity -> DEBU 516f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:54.582 UTC [msp.identity] Sign -> DEBU 5170 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151046 " +peer0.org1.example.com | "2019-09-24 00:26:54.582 UTC [msp.identity] Sign -> DEBU 5171 Sign: digest: 1AAB37099D0A1D0BB17701E34F5A7CCD7A28C2D1BDC9807C665185EF21515C8A " +peer0.org1.example.com | "2019-09-24 00:26:54.583 UTC [msp] GetDefaultSigningIdentity -> DEBU 5172 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:54.583 UTC [msp.identity] Sign -> DEBU 5173 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:54.583 UTC [msp.identity] Sign -> DEBU 5174 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:54.583 UTC [gossip.discovery] periodicalSendAlive -> DEBU 5175 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:54.592 UTC [msp] DeserializeIdentity -> DEBU 5176 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.593 UTC [msp] DeserializeIdentity -> DEBU 5177 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.595 UTC [msp] DeserializeIdentity -> DEBU 5178 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.596 UTC [gossip.comm] Send -> DEBU 5179 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:54.596 UTC [gossip.comm] Send -> DEBU 517a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:54.597 UTC [msp] DeserializeIdentity -> DEBU 517b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.597 UTC [gossip.comm] Send -> DEBU 517c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:54.598 UTC [gossip.comm] sendToEndpoint -> DEBU 517d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.598 UTC [gossip.comm] sendToEndpoint -> DEBU 517e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.598 UTC [gossip.comm] sendToEndpoint -> DEBU 517f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.599 UTC [gossip.comm] sendToEndpoint -> DEBU 5180 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.599 UTC [gossip.comm] sendToEndpoint -> DEBU 5181 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.599 UTC [gossip.comm] sendToEndpoint -> DEBU 5182 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.941 UTC [gossip.gossip] handleMessage -> DEBU 5183 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.942 UTC [gossip.gossip] handleMessage -> DEBU 5184 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5185 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.942 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5186 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:54.943 UTC [msp] DeserializeIdentity -> DEBU 5187 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.944 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5188 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:54.944 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5189 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:54.945 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 518a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:54.946 UTC [policies] Evaluate -> DEBU 518b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:54.946 UTC [gossip.comm] func1 -> DEBU 518c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.948 UTC [gossip.gossip] handleMessage -> DEBU 518d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.948 UTC [gossip.comm] func1 -> DEBU 518e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.946 UTC [policies] Evaluate -> DEBU 518f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:54.949 UTC [policies] Evaluate -> DEBU 5190 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:54.949 UTC [cauthdsl] func1 -> DEBU 5191 0xc000193920 gate 1569284814949918400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:54.950 UTC [cauthdsl] func2 -> DEBU 5192 0xc000193920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:54.950 UTC [cauthdsl] func2 -> DEBU 5193 0xc000193920 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:54.950 UTC [cauthdsl] func2 -> DEBU 5194 0xc000193920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:54.950 UTC [cauthdsl] func2 -> DEBU 5195 0xc000193920 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:54.951 UTC [cauthdsl] func1 -> DEBU 5196 0xc000193920 gate 1569284814949918400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:54.951 UTC [policies] Evaluate -> DEBU 5197 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:54.951 UTC [policies] Evaluate -> DEBU 5198 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:54.951 UTC [policies] Evaluate -> DEBU 5199 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:54.952 UTC [cauthdsl] func1 -> DEBU 519a 0xc0003ba180 gate 1569284814952159600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:54.952 UTC [cauthdsl] func2 -> DEBU 519b 0xc0003ba180 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:54.952 UTC [cauthdsl] func2 -> DEBU 519c 0xc0003ba180 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:54.952 UTC [cauthdsl] func2 -> DEBU 519d 0xc0003ba180 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:54.953 UTC [msp.identity] Verify -> DEBU 519e Verify: digest = 00000000 b0 ea 87 35 e6 c1 63 64 4d 70 40 f9 37 d9 4a 8a |...5..cdMp@.7.J.| +peer0.org1.example.com | 00000010 91 47 df da cf 21 c8 5a 94 93 2b b9 dc d4 c2 02 |.G...!.Z..+.....|" +peer0.org1.example.com | "2019-09-24 00:26:54.953 UTC [msp.identity] Verify -> DEBU 519f Verify: sig = 00000000 30 44 02 20 1c 61 36 bf bf d6 e7 a9 a0 72 9e bd |0D. .a6......r..| +peer0.org1.example.com | 00000010 d8 a2 d7 59 56 99 66 ff b8 d6 7c f4 23 32 70 ef |...YV.f...|.#2p.| +peer0.org1.example.com | 00000020 ef d2 87 4a 02 20 12 03 92 8f 67 a2 9c d0 d4 32 |...J. ....g....2| +peer0.org1.example.com | 00000030 e8 cf 99 ae 4f 71 4e 4e 3b 0c 80 20 c4 5d 3b 69 |....OqNN;.. .];i| +peer0.org1.example.com | 00000040 f7 31 cd 9f fb a2 |.1....|" +peer0.org1.example.com | "2019-09-24 00:26:54.953 UTC [cauthdsl] func2 -> DEBU 51a0 0xc0003ba180 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:54.954 UTC [cauthdsl] func1 -> DEBU 51a1 0xc0003ba180 gate 1569284814952159600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:54.954 UTC [policies] Evaluate -> DEBU 51a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:54.954 UTC [policies] Evaluate -> DEBU 51a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:54.954 UTC [policies] Evaluate -> DEBU 51a4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:54.954 UTC [policies] Evaluate -> DEBU 51a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:54.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 51a6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 51a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:54.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 51a8 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:54.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 51a9 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:54.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 51aa Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:54.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 51ab Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 51ac Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51ad Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51ae Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.956 UTC [gossip.gossip] handleMessage -> DEBU 51af Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.957 UTC [gossip.gossip] handleMessage -> DEBU 51b0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51b2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.957 UTC [gossip.gossip] handleMessage -> DEBU 51b3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.958 UTC [msp] DeserializeIdentity -> DEBU 51b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.958 UTC [msp] DeserializeIdentity -> DEBU 51b6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.958 UTC [msp] DeserializeIdentity -> DEBU 51b7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.958 UTC [msp] DeserializeIdentity -> DEBU 51b8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.958 UTC [msp] DeserializeIdentity -> DEBU 51b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.959 UTC [msp] DeserializeIdentity -> DEBU 51ba Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.959 UTC [msp] DeserializeIdentity -> DEBU 51bb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.959 UTC [gossip.comm] Send -> DEBU 51bc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:54.959 UTC [msp] DeserializeIdentity -> DEBU 51bd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:54.959 UTC [gossip.comm] Send -> DEBU 51be Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:54.960 UTC [gossip.comm] sendToEndpoint -> DEBU 51bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.960 UTC [gossip.comm] sendToEndpoint -> DEBU 51c0 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:54.960 UTC [gossip.comm] sendToEndpoint -> DEBU 51c1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:54.960 UTC [gossip.comm] sendToEndpoint -> DEBU 51c2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.663 UTC [gossip.comm] func1 -> DEBU 51c3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.663 UTC [gossip.gossip] handleMessage -> DEBU 51c4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.663 UTC [gossip.gossip] handleMessage -> DEBU 51c5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.663 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51c6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.663 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 51c7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:55.663 UTC [msp] DeserializeIdentity -> DEBU 51c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 51c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 51ca Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 51cb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [cauthdsl] func1 -> DEBU 51cf 0xc000487fb0 gate 1569284815664631900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [cauthdsl] func2 -> DEBU 51d0 0xc000487fb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [cauthdsl] func2 -> DEBU 51d1 0xc000487fb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [cauthdsl] func2 -> DEBU 51d2 0xc000487fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [cauthdsl] func2 -> DEBU 51d3 0xc000487fb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [cauthdsl] func1 -> DEBU 51d4 0xc000487fb0 gate 1569284815664631900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [cauthdsl] func1 -> DEBU 51d8 0xc0003e2870 gate 1569284815665008600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [cauthdsl] func2 -> DEBU 51d9 0xc0003e2870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [cauthdsl] func2 -> DEBU 51da 0xc0003e2870 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [cauthdsl] func2 -> DEBU 51db 0xc0003e2870 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [msp.identity] Verify -> DEBU 51dc Verify: digest = 00000000 c6 2a 3c e2 7d f3 ec ab ce 49 78 01 30 e0 ec 51 |.*<.}....Ix.0..Q| +peer0.org1.example.com | 00000010 af 16 87 1c 0c e1 e2 67 55 68 57 fe 90 c7 4b 19 |.......gUhW...K.|" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [msp.identity] Verify -> DEBU 51dd Verify: sig = 00000000 30 45 02 21 00 f0 58 08 79 c2 ac b7 a3 d6 61 33 |0E.!..X.y.....a3| +peer0.org1.example.com | 00000010 09 33 49 55 b8 7f 2c cb 8a c1 a9 13 d9 8b 76 da |.3IU..,.......v.| +peer0.org1.example.com | 00000020 be 86 af 70 bf 02 20 58 29 a2 3c e8 2d 9f 82 9e |...p.. X).<.-...| +peer0.org1.example.com | 00000030 6e 46 9f a5 ca 83 e6 2a e3 44 94 93 da 44 83 35 |nF.....*.D...D.5| +peer0.org1.example.com | 00000040 9e 22 35 cc 65 48 ea |."5.eH.|" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [cauthdsl] func2 -> DEBU 51de 0xc0003e2870 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [cauthdsl] func1 -> DEBU 51df 0xc0003e2870 gate 1569284815665008600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [policies] Evaluate -> DEBU 51e0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [policies] Evaluate -> DEBU 51e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [policies] Evaluate -> DEBU 51e2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [policies] Evaluate -> DEBU 51e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 51e4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 51e5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 51e6 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 51e7 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 51e8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 51e9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 51ea Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51eb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.672 UTC [msp] DeserializeIdentity -> DEBU 51ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.672 UTC [gossip.gossip] handleMessage -> DEBU 51ef Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [gossip.gossip] handleMessage -> DEBU 51f1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51f5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [gossip.comm] Send -> DEBU 51f6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51f8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [gossip.comm] Send -> DEBU 51f9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [gossip.comm] sendToEndpoint -> DEBU 51fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [gossip.comm] sendToEndpoint -> DEBU 51fb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.674 UTC [gossip.comm] sendToEndpoint -> DEBU 51fc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.674 UTC [gossip.comm] sendToEndpoint -> DEBU 51fd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.674 UTC [gossip.comm] func1 -> DEBU 51fe Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.674 UTC [gossip.gossip] handleMessage -> DEBU 51ff Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51f7 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5200 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5201 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.676 UTC [gossip.gossip] handleMessage -> DEBU 5202 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.702 UTC [gossip.pull] Hello -> DEBU 5203 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:55.703 UTC [gossip.comm] Send -> DEBU 5204 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:55.703 UTC [gossip.pull] Hello -> DEBU 5205 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:55.703 UTC [gossip.comm] sendToEndpoint -> DEBU 5206 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.703 UTC [gossip.comm] sendToEndpoint -> DEBU 5207 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.703 UTC [gossip.comm] Send -> DEBU 5208 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:55.704 UTC [gossip.comm] sendToEndpoint -> DEBU 5209 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.704 UTC [gossip.comm] sendToEndpoint -> DEBU 520a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.703 UTC [gossip.pull] Hello -> DEBU 520b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:55.706 UTC [gossip.comm] Send -> DEBU 520c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:55.707 UTC [gossip.comm] sendToEndpoint -> DEBU 520d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.707 UTC [gossip.comm] sendToEndpoint -> DEBU 520e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.707 UTC [gossip.gossip] handleMessage -> DEBU 520f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.708 UTC [gossip.comm] func1 -> DEBU 5211 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.709 UTC [gossip.pull] HandleMessage -> DEBU 5212 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.710 UTC [gossip.gossip] handleMessage -> DEBU 5213 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.711 UTC [gossip.gossip] handleMessage -> DEBU 5214 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.708 UTC [gossip.comm] func1 -> DEBU 5210 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.711 UTC [gossip.pull] HandleMessage -> DEBU 5215 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.712 UTC [gossip.gossip] handleMessage -> DEBU 5216 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.712 UTC [gossip.gossip] handleMessage -> DEBU 5217 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.713 UTC [gossip.pull] HandleMessage -> DEBU 5218 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.713 UTC [gossip.gossip] handleMessage -> DEBU 5219 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.843 UTC [msp] GetDefaultSigningIdentity -> DEBU 521a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [msp.identity] Sign -> DEBU 521b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151047 " +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [msp.identity] Sign -> DEBU 521c Sign: digest: 480219121EAB97BC6A2364CCBE3A02E1337B2D54658674B0B96BAEE26C51C08F " +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [msp] GetDefaultSigningIdentity -> DEBU 521d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [msp.identity] Sign -> DEBU 521e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [msp.identity] Sign -> DEBU 521f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [gossip.comm] Send -> DEBU 5220 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [msp] DeserializeIdentity -> DEBU 5221 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [gossip.comm] Send -> DEBU 5222 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [msp] DeserializeIdentity -> DEBU 5223 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [gossip.comm] Send -> DEBU 5224 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 5225 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 5226 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 5227 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 5228 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 5229 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 522a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.846 UTC [gossip.comm] func1 -> DEBU 522b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.846 UTC [gossip.comm] func1 -> DEBU 522c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.846 UTC [gossip.gossip] handleMessage -> DEBU 522d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.846 UTC [gossip.gossip] handleMessage -> DEBU 522e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.846 UTC [gossip.gossip] handleMessage -> DEBU 522f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5230 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5231 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:55.846 UTC [msp.identity] Verify -> DEBU 5232 Verify: digest = 00000000 48 02 19 12 1e ab 97 bc 6a 23 64 cc be 3a 02 e1 |H.......j#d..:..| +peer0.org1.example.com | 00000010 33 7b 2d 54 65 86 74 b0 b9 6b ae e2 6c 51 c0 8f |3{-Te.t..k..lQ..|" +peer0.org1.example.com | "2019-09-24 00:26:55.846 UTC [msp.identity] Verify -> DEBU 5233 Verify: sig = 00000000 30 45 02 21 00 f5 8c bf 09 6e b7 dd 5f ac de f6 |0E.!.....n.._...| +peer0.org1.example.com | 00000010 79 7e 1b 49 35 3a 5f 02 ab ad fe 68 4f c5 f7 90 |y~.I5:_....hO...| +peer0.org1.example.com | 00000020 70 22 42 e0 82 02 20 40 33 12 f7 24 3d 9a 9a 18 |p"B... @3..$=...| +peer0.org1.example.com | 00000030 14 70 d3 f7 78 6c a5 4a 37 74 2c 59 99 98 de 44 |.p..xl.J7t,Y...D| +peer0.org1.example.com | 00000040 02 28 00 04 b6 7b 1d |.(...{.|" +peer0.org1.example.com | "2019-09-24 00:26:55.846 UTC [msp.identity] Verify -> DEBU 5234 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:55.846 UTC [msp.identity] Verify -> DEBU 5235 Verify: sig = 00000000 30 45 02 21 00 a4 dc 2f 6f 6d a2 df 0a f9 1c a1 |0E.!.../om......| +peer0.org1.example.com | 00000010 6d e5 80 e4 5f 74 99 50 2c 7a 32 79 6e ae 7b 46 |m..._t.P,z2yn.{F| +peer0.org1.example.com | 00000020 fa 24 a3 bb 57 02 20 4b 7a 9e 75 a8 15 99 ff a5 |.$..W. Kz.u.....| +peer0.org1.example.com | 00000030 00 64 da e0 18 6b a4 b0 46 a9 16 7c c0 68 d6 3d |.d...k..F..|.h.=| +peer0.org1.example.com | 00000040 a3 71 fe d4 22 e0 bd |.q.."..|" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 5236 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [gossip.discovery] isSentByMe -> DEBU 5237 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 5238 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5239 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 523a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 523b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [msp.identity] Verify -> DEBU 523c Verify: digest = 00000000 48 02 19 12 1e ab 97 bc 6a 23 64 cc be 3a 02 e1 |H.......j#d..:..| +peer0.org1.example.com | 00000010 33 7b 2d 54 65 86 74 b0 b9 6b ae e2 6c 51 c0 8f |3{-Te.t..k..lQ..|" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [msp.identity] Verify -> DEBU 523d Verify: sig = 00000000 30 45 02 21 00 f5 8c bf 09 6e b7 dd 5f ac de f6 |0E.!.....n.._...| +peer0.org1.example.com | 00000010 79 7e 1b 49 35 3a 5f 02 ab ad fe 68 4f c5 f7 90 |y~.I5:_....hO...| +peer0.org1.example.com | 00000020 70 22 42 e0 82 02 20 40 33 12 f7 24 3d 9a 9a 18 |p"B... @3..$=...| +peer0.org1.example.com | 00000030 14 70 d3 f7 78 6c a5 4a 37 74 2c 59 99 98 de 44 |.p..xl.J7t,Y...D| +peer0.org1.example.com | 00000040 02 28 00 04 b6 7b 1d |.(...{.|" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 523e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [gossip.discovery] isSentByMe -> DEBU 523f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 5240 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5241 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:55.851 UTC [msp.identity] Verify -> DEBU 5242 Verify: digest = 00000000 9c fb 93 3f 47 ab 77 72 f6 dd 4e 54 8f a8 61 02 |...?G.wr..NT..a.| +peer0.org1.example.com | 00000010 cf c0 ad 10 26 2c 3e 3b d3 fb b9 12 66 d1 92 d3 |....&,>;....f...|" +peer0.org1.example.com | "2019-09-24 00:26:55.851 UTC [msp.identity] Verify -> DEBU 5243 Verify: sig = 00000000 30 44 02 20 72 63 22 5a bc 4e 15 17 1a 8c cc b7 |0D. rc"Z.N......| +peer0.org1.example.com | 00000010 61 3e 97 04 37 7d 2a 5d 0d a7 7a 3d 9d b6 59 3e |a>..7}*]..z=..Y>| +peer0.org1.example.com | 00000020 4e 59 f0 74 02 20 04 c8 d2 24 1c 99 70 73 bb 9f |NY.t. ...$..ps..| +peer0.org1.example.com | 00000030 0c f8 da fc 68 16 8a 66 1c 2b 23 ca 5e a8 be 2a |....h..f.+#.^..*| +peer0.org1.example.com | 00000040 c5 99 28 25 e1 55 |..(%.U|" +peer0.org1.example.com | "2019-09-24 00:26:55.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 5244 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 5245 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5246 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.852 UTC [gossip.gossip] handleMessage -> DEBU 5247 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.853 UTC [gossip.gossip] handleMessage -> DEBU 5248 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.853 UTC [gossip.gossip] handleMessage -> DEBU 5249 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.853 UTC [gossip.discovery] handleMsgFromComm -> DEBU 524a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.853 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 524b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:55.853 UTC [msp.identity] Verify -> DEBU 524c Verify: digest = 00000000 48 02 19 12 1e ab 97 bc 6a 23 64 cc be 3a 02 e1 |H.......j#d..:..| +peer0.org1.example.com | 00000010 33 7b 2d 54 65 86 74 b0 b9 6b ae e2 6c 51 c0 8f |3{-Te.t..k..lQ..|" +peer0.org1.example.com | "2019-09-24 00:26:55.853 UTC [msp.identity] Verify -> DEBU 524d Verify: sig = 00000000 30 45 02 21 00 f5 8c bf 09 6e b7 dd 5f ac de f6 |0E.!.....n.._...| +peer0.org1.example.com | 00000010 79 7e 1b 49 35 3a 5f 02 ab ad fe 68 4f c5 f7 90 |y~.I5:_....hO...| +peer0.org1.example.com | 00000020 70 22 42 e0 82 02 20 40 33 12 f7 24 3d 9a 9a 18 |p"B... @3..$=...| +peer0.org1.example.com | 00000030 14 70 d3 f7 78 6c a5 4a 37 74 2c 59 99 98 de 44 |.p..xl.J7t,Y...D| +peer0.org1.example.com | 00000040 02 28 00 04 b6 7b 1d |.(...{.|" +peer0.org1.example.com | "2019-09-24 00:26:55.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 524e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.854 UTC [gossip.discovery] isSentByMe -> DEBU 524f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 5250 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.854 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5251 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:55.854 UTC [msp.identity] Verify -> DEBU 5252 Verify: digest = 00000000 9c fb 93 3f 47 ab 77 72 f6 dd 4e 54 8f a8 61 02 |...?G.wr..NT..a.| +peer0.org1.example.com | 00000010 cf c0 ad 10 26 2c 3e 3b d3 fb b9 12 66 d1 92 d3 |....&,>;....f...|" +peer0.org1.example.com | "2019-09-24 00:26:55.854 UTC [msp.identity] Verify -> DEBU 5253 Verify: sig = 00000000 30 44 02 20 72 63 22 5a bc 4e 15 17 1a 8c cc b7 |0D. rc"Z.N......| +peer0.org1.example.com | 00000010 61 3e 97 04 37 7d 2a 5d 0d a7 7a 3d 9d b6 59 3e |a>..7}*]..z=..Y>| +peer0.org1.example.com | 00000020 4e 59 f0 74 02 20 04 c8 d2 24 1c 99 70 73 bb 9f |NY.t. ...$..ps..| +peer0.org1.example.com | 00000030 0c f8 da fc 68 16 8a 66 1c 2b 23 ca 5e a8 be 2a |....h..f.+#.^..*| +peer0.org1.example.com | 00000040 c5 99 28 25 e1 55 |..(%.U|" +peer0.org1.example.com | "2019-09-24 00:26:55.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 5254 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 5255 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.854 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5256 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:55.910 UTC [gossip.gossip] handleMessage -> DEBU 5257 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.910 UTC [gossip.pull] HandleMessage -> DEBU 5258 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 5259 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 525a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 525b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 525c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 525d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 525e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:55.910 UTC [gossip.pull] SendDigest -> DEBU 525f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:55.910 UTC [gossip.gossip] handleMessage -> DEBU 5260 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.018 UTC [gossip.gossip] handleMessage -> DEBU 5261 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.019 UTC [gossip.gossip] handleMessage -> DEBU 5262 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5263 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.019 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5264 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:56.019 UTC [msp] DeserializeIdentity -> DEBU 5265 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.020 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5266 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:56.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5267 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5268 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.020 UTC [policies] Evaluate -> DEBU 5269 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.021 UTC [policies] Evaluate -> DEBU 526a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:56.021 UTC [policies] Evaluate -> DEBU 526b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.022 UTC [cauthdsl] func1 -> DEBU 526c 0xc0025b0bf0 gate 1569284816022137600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.022 UTC [cauthdsl] func2 -> DEBU 526d 0xc0025b0bf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.023 UTC [cauthdsl] func2 -> DEBU 526e 0xc0025b0bf0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.023 UTC [cauthdsl] func2 -> DEBU 526f 0xc0025b0bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:56.023 UTC [cauthdsl] func2 -> DEBU 5270 0xc0025b0bf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.024 UTC [cauthdsl] func1 -> DEBU 5271 0xc0025b0bf0 gate 1569284816022137600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.024 UTC [policies] Evaluate -> DEBU 5272 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.025 UTC [policies] Evaluate -> DEBU 5273 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.025 UTC [policies] Evaluate -> DEBU 5274 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.025 UTC [cauthdsl] func1 -> DEBU 5275 0xc0025b1430 gate 1569284816025965200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.026 UTC [cauthdsl] func2 -> DEBU 5276 0xc0025b1430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.026 UTC [cauthdsl] func2 -> DEBU 5277 0xc0025b1430 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.026 UTC [cauthdsl] func2 -> DEBU 5278 0xc0025b1430 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.026 UTC [msp.identity] Verify -> DEBU 5279 Verify: digest = 00000000 72 e1 88 9c 25 89 8b 20 bf e7 d1 f5 e1 33 cc c6 |r...%.. .....3..| +peer0.org1.example.com | 00000010 db 65 54 00 27 22 5e 48 5b 06 9e 06 a7 50 55 b3 |.eT.'"^H[....PU.|" +peer0.org1.example.com | "2019-09-24 00:26:56.027 UTC [msp.identity] Verify -> DEBU 527a Verify: sig = 00000000 30 44 02 20 58 e0 29 7b f2 d5 15 99 da 3b 91 bb |0D. X.){.....;..| +peer0.org1.example.com | 00000010 e8 3d 99 b1 78 a5 f4 0c 72 62 97 25 48 d0 a2 5a |.=..x...rb.%H..Z| +peer0.org1.example.com | 00000020 75 fc 06 aa 02 20 08 99 a5 8d 7e 33 e1 f7 b2 4d |u.... ....~3...M| +peer0.org1.example.com | 00000030 6a 25 ac 11 8f 99 fe ad 9a 4a 91 28 fe d8 cb 84 |j%.......J.(....| +peer0.org1.example.com | 00000040 47 b7 e5 81 fa 62 |G....b|" +peer0.org1.example.com | "2019-09-24 00:26:56.029 UTC [cauthdsl] func2 -> DEBU 527b 0xc0025b1430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.030 UTC [cauthdsl] func1 -> DEBU 527c 0xc0025b1430 gate 1569284816025965200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:56.030 UTC [policies] Evaluate -> DEBU 527d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.032 UTC [policies] Evaluate -> DEBU 527e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.046 UTC [policies] Evaluate -> DEBU 527f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.047 UTC [policies] Evaluate -> DEBU 5280 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.047 UTC [gossip.discovery] handleAliveMessage -> DEBU 5281 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 5282 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:56.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 5283 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:56.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 5284 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:56.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 5285 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:56.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 5286 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.050 UTC [gossip.discovery] handleAliveMessage -> DEBU 5287 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.050 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5288 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.050 UTC [gossip.discovery] sendMemResponse -> DEBU 5289 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:26:56.051 UTC [msp] DeserializeIdentity -> DEBU 528a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.051 UTC [msp] DeserializeIdentity -> DEBU 528b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.051 UTC [msp] DeserializeIdentity -> DEBU 528c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.051 UTC [gossip.comm] Send -> DEBU 528d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:56.051 UTC [gossip.discovery] sendMemResponse -> DEBU 528e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:56.051 UTC [gossip.comm] sendToEndpoint -> DEBU 528f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.051 UTC [gossip.comm] sendToEndpoint -> DEBU 5290 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.082 UTC [msp] DeserializeIdentity -> DEBU 5291 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.082 UTC [msp] DeserializeIdentity -> DEBU 5292 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.082 UTC [gossip.comm] Send -> DEBU 5293 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:26:56.082 UTC [gossip.comm] sendToEndpoint -> DEBU 5294 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.082 UTC [gossip.comm] sendToEndpoint -> DEBU 5295 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.083 UTC [gossip.comm] sendToEndpoint -> DEBU 5296 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.083 UTC [gossip.comm] sendToEndpoint -> DEBU 5298 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.083 UTC [gossip.comm] sendToEndpoint -> DEBU 5297 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.085 UTC [gossip.comm] func1 -> DEBU 5299 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.086 UTC [gossip.gossip] handleMessage -> DEBU 529b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.086 UTC [msp] DeserializeIdentity -> DEBU 529c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.086 UTC [msp] DeserializeIdentity -> DEBU 529d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.086 UTC [msp] DeserializeIdentity -> DEBU 529e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.086 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 529f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:56.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52a0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52a1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.086 UTC [policies] Evaluate -> DEBU 52a2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.086 UTC [policies] Evaluate -> DEBU 52a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:56.086 UTC [policies] Evaluate -> DEBU 52a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func1 -> DEBU 52a5 0xc00261ceb0 gate 1569284816087026900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52a6 0xc00261ceb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52a7 0xc00261ceb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52a8 0xc00261ceb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52a9 0xc00261ceb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func1 -> DEBU 52aa 0xc00261ceb0 gate 1569284816087026900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [policies] Evaluate -> DEBU 52ab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [policies] Evaluate -> DEBU 52ac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [policies] Evaluate -> DEBU 52ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func1 -> DEBU 52ae 0xc00261d830 gate 1569284816087536000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52af 0xc00261d830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52b0 0xc00261d830 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52b1 0xc00261d830 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [msp.identity] Verify -> DEBU 52b2 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [msp.identity] Verify -> DEBU 52b3 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52b4 0xc00261d830 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [cauthdsl] func1 -> DEBU 52b5 0xc00261d830 gate 1569284816087536000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:56.087 UTC [policies] Evaluate -> DEBU 52b6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [policies] Evaluate -> DEBU 52b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [policies] Evaluate -> DEBU 52b8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [policies] Evaluate -> DEBU 52b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [msp.identity] Verify -> DEBU 52ba Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [msp.identity] Verify -> DEBU 52bb Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [msp] DeserializeIdentity -> DEBU 52bc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [msp] DeserializeIdentity -> DEBU 52bd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 52be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52bf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52c0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [policies] Evaluate -> DEBU 52c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.088 UTC [policies] Evaluate -> DEBU 52c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [policies] Evaluate -> DEBU 52c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [cauthdsl] func1 -> DEBU 52c4 0xc002635930 gate 1569284816089064400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52c5 0xc002635930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52c6 0xc002635930 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52c7 0xc002635930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52c8 0xc002635930 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [cauthdsl] func1 -> DEBU 52c9 0xc002635930 gate 1569284816089064400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [policies] Evaluate -> DEBU 52ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [policies] Evaluate -> DEBU 52cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [policies] Evaluate -> DEBU 52cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [cauthdsl] func1 -> DEBU 52cd 0xc002662170 gate 1569284816089449800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52ce 0xc002662170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52cf 0xc002662170 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52d0 0xc002662170 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [msp.identity] Verify -> DEBU 52d1 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:56.089 UTC [msp.identity] Verify -> DEBU 52d2 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:56.090 UTC [cauthdsl] func2 -> DEBU 52d3 0xc002662170 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.090 UTC [cauthdsl] func1 -> DEBU 52d4 0xc002662170 gate 1569284816089449800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:56.090 UTC [policies] Evaluate -> DEBU 52d5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.091 UTC [policies] Evaluate -> DEBU 52d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.091 UTC [policies] Evaluate -> DEBU 52d7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.091 UTC [policies] Evaluate -> DEBU 52d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.091 UTC [msp.identity] Verify -> DEBU 52d9 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:56.091 UTC [msp.identity] Verify -> DEBU 52da Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:56.091 UTC [gossip.gossip] handleMessage -> DEBU 52db Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.086 UTC [gossip.comm] sendToEndpoint -> DEBU 529a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.092 UTC [gossip.comm] func1 -> DEBU 52dc Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.092 UTC [gossip.gossip] handleMessage -> DEBU 52dd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.097 UTC [msp.identity] Verify -> DEBU 52de Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:56.097 UTC [msp.identity] Verify -> DEBU 52df Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:56.097 UTC [msp.identity] Verify -> DEBU 52e0 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:56.097 UTC [msp.identity] Verify -> DEBU 52e1 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [msp] DeserializeIdentity -> DEBU 52e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [msp] DeserializeIdentity -> DEBU 52e3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 52e4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52e5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52e6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52e9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [cauthdsl] func1 -> DEBU 52ea 0xc0026d8e50 gate 1569284816098466800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52eb 0xc0026d8e50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52ec 0xc0026d8e50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52ed 0xc0026d8e50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52ee 0xc0026d8e50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [cauthdsl] func1 -> DEBU 52ef 0xc0026d8e50 gate 1569284816098466800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52f0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [cauthdsl] func1 -> DEBU 52f3 0xc0026d96e0 gate 1569284816098751200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52f4 0xc0026d96e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52f5 0xc0026d96e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52f6 0xc0026d96e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [msp.identity] Verify -> DEBU 52f7 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:56.098 UTC [msp.identity] Verify -> DEBU 52f8 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 52f9 0xc0026d96e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [cauthdsl] func1 -> DEBU 52fa 0xc0026d96e0 gate 1569284816098751200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 52fb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 52fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 52fd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 52fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [msp] DeserializeIdentity -> DEBU 52ff Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [msp] DeserializeIdentity -> DEBU 5300 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5301 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5302 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5303 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 5304 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 5305 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 5306 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [cauthdsl] func1 -> DEBU 5307 0xc002758f20 gate 1569284816099673000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 5308 0xc002758f20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 5309 0xc002758f20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 530a 0xc002758f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 530b 0xc002758f20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [cauthdsl] func1 -> DEBU 530c 0xc002758f20 gate 1569284816099673000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 530d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 530e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 530f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [cauthdsl] func1 -> DEBU 5310 0xc002759760 gate 1569284816099949100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 5311 0xc002759760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [cauthdsl] func2 -> DEBU 5312 0xc002759760 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [cauthdsl] func2 -> DEBU 5313 0xc002759760 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [msp.identity] Verify -> DEBU 5314 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [msp.identity] Verify -> DEBU 5315 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [cauthdsl] func2 -> DEBU 5316 0xc002759760 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [cauthdsl] func1 -> DEBU 5317 0xc002759760 gate 1569284816099949100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [policies] Evaluate -> DEBU 5318 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [policies] Evaluate -> DEBU 5319 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [policies] Evaluate -> DEBU 531a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [policies] Evaluate -> DEBU 531b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [gossip.gossip] handleMessage -> DEBU 531c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.100 UTC [gossip.gossip] handleMessage -> DEBU 531d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [msp] DeserializeIdentity -> DEBU 531e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [msp] DeserializeIdentity -> DEBU 531f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [msp] DeserializeIdentity -> DEBU 5320 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5321 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5322 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5323 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 5324 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 5325 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 5326 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func1 -> DEBU 5327 0xc0027c72b0 gate 1569284816101370000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5328 0xc0027c72b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5329 0xc0027c72b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 532a 0xc0027c72b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 532b 0xc0027c72b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func1 -> DEBU 532c 0xc0027c72b0 gate 1569284816101370000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 532d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 532e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 532f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func1 -> DEBU 5330 0xc0027c7b00 gate 1569284816101607700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5331 0xc0027c7b00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5332 0xc0027c7b00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5333 0xc0027c7b00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [msp.identity] Verify -> DEBU 5334 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [msp.identity] Verify -> DEBU 5335 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5336 0xc0027c7b00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [cauthdsl] func1 -> DEBU 5337 0xc0027c7b00 gate 1569284816101607700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 5338 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 5339 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 533a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 533b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.102 UTC [msp.identity] Verify -> DEBU 533c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:26:56.102 UTC [msp.identity] Verify -> DEBU 533d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:26:56.102 UTC [msp.identity] Verify -> DEBU 533e Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:26:56.102 UTC [msp.identity] Verify -> DEBU 533f Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:26:56.106 UTC [msp] DeserializeIdentity -> DEBU 5340 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [msp] DeserializeIdentity -> DEBU 5341 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5342 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5343 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5344 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 5345 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 5346 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 5347 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [cauthdsl] func1 -> DEBU 5348 0xc0028fa1d0 gate 1569284816107297100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 5349 0xc0028fa1d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 534a 0xc0028fa1d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 534b 0xc0028fa1d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 534c 0xc0028fa1d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [cauthdsl] func1 -> DEBU 534d 0xc0028fa1d0 gate 1569284816107297100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 534e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 534f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 5350 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [cauthdsl] func1 -> DEBU 5351 0xc0028faa10 gate 1569284816107747100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 5352 0xc0028faa10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 5353 0xc0028faa10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 5354 0xc0028faa10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [msp.identity] Verify -> DEBU 5355 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [msp.identity] Verify -> DEBU 5356 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 5357 0xc0028faa10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.108 UTC [cauthdsl] func1 -> DEBU 5358 0xc0028faa10 gate 1569284816107747100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:56.108 UTC [policies] Evaluate -> DEBU 5359 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.108 UTC [policies] Evaluate -> DEBU 535a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.108 UTC [policies] Evaluate -> DEBU 535b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.108 UTC [policies] Evaluate -> DEBU 535c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.108 UTC [gossip.gossip] handleMessage -> DEBU 535d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.124 UTC [dockercontroller] deployImage -> DEBU 535e Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4" +peer0.org1.example.com | "2019-09-24 00:26:56.124 UTC [dockercontroller] createContainer -> DEBU 535f create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 00:26:56.124 UTC [dockercontroller] getDockerHostConfig -> DEBU 5360 docker container hostconfig NetworkMode: hlf_net" +peer0.org1.example.com | "2019-09-24 00:26:56.198 UTC [gossip.privdata] run -> DEBU 5361 Start reconcile missing private info" +peer0.org1.example.com | "2019-09-24 00:26:56.198 UTC [leveldbhelper] GetIterator -> DEBU 5362 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +peer0.org1.example.com | "2019-09-24 00:26:56.198 UTC [gossip.privdata] reconcile -> DEBU 5363 Reconciliation cycle finished successfully. no items to reconcile" +peer0.org1.example.com | "2019-09-24 00:26:56.217 UTC [dockercontroller] createContainer -> DEBU 5364 created container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 00:26:56.282 UTC [msp] DeserializeIdentity -> DEBU 5365 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.282 UTC [msp] DeserializeIdentity -> DEBU 5366 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.282 UTC [gossip.pull] Hello -> DEBU 5367 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:56.282 UTC [msp] DeserializeIdentity -> DEBU 5368 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.283 UTC [msp] DeserializeIdentity -> DEBU 5369 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.283 UTC [gossip.comm] Send -> DEBU 536a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 536b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 536c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.285 UTC [gossip.comm] func1 -> DEBU 536d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.285 UTC [gossip.gossip] handleMessage -> DEBU 536e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.285 UTC [gossip.pull] HandleMessage -> DEBU 536f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.285 UTC [gossip.gossip] handleMessage -> DEBU 5370 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.579 UTC [gossip.comm] func1 -> DEBU 5371 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.579 UTC [gossip.gossip] handleMessage -> DEBU 5372 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.579 UTC [msp] DeserializeIdentity -> DEBU 5373 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.579 UTC [msp] DeserializeIdentity -> DEBU 5374 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.579 UTC [gossip.gossip] handleMessage -> DEBU 5375 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.772 UTC [gossip.comm] func1 -> DEBU 5376 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.773 UTC [gossip.gossip] handleMessage -> DEBU 5377 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.774 UTC [gossip.gossip] handleMessage -> DEBU 5378 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5379 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.777 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 537a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:56.778 UTC [msp] DeserializeIdentity -> DEBU 537b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.779 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 537c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:56.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 537d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 537e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:56.779 UTC [policies] Evaluate -> DEBU 537f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.779 UTC [policies] Evaluate -> DEBU 5380 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:56.780 UTC [policies] Evaluate -> DEBU 5381 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.780 UTC [cauthdsl] func1 -> DEBU 5382 0xc002aa4d20 gate 1569284816780192100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.780 UTC [cauthdsl] func2 -> DEBU 5383 0xc002aa4d20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.780 UTC [cauthdsl] func2 -> DEBU 5384 0xc002aa4d20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.780 UTC [cauthdsl] func2 -> DEBU 5385 0xc002aa4d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:56.780 UTC [cauthdsl] func2 -> DEBU 5386 0xc002aa4d20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.780 UTC [cauthdsl] func1 -> DEBU 5387 0xc002aa4d20 gate 1569284816780192100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:56.780 UTC [policies] Evaluate -> DEBU 5388 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.780 UTC [policies] Evaluate -> DEBU 5389 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.780 UTC [policies] Evaluate -> DEBU 538a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [cauthdsl] func1 -> DEBU 538b 0xc002aa5560 gate 1569284816781257500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [cauthdsl] func2 -> DEBU 538c 0xc002aa5560 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [cauthdsl] func2 -> DEBU 538d 0xc002aa5560 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [cauthdsl] func2 -> DEBU 538e 0xc002aa5560 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [msp.identity] Verify -> DEBU 538f Verify: digest = 00000000 d6 ac 34 f6 6a 63 e1 ea 4a 28 fa 89 28 0c 32 c3 |..4.jc..J(..(.2.| +peer0.org1.example.com | 00000010 77 0c 7b 38 ae 8a 97 6c 39 95 9d 2b 4a a1 f5 98 |w.{8...l9..+J...|" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [msp.identity] Verify -> DEBU 5390 Verify: sig = 00000000 30 45 02 21 00 9a 81 a4 93 16 50 c1 43 79 7d a8 |0E.!......P.Cy}.| +peer0.org1.example.com | 00000010 f4 00 82 34 42 9c 8b 74 31 ef 2f 3f cc c9 ab 14 |...4B..t1./?....| +peer0.org1.example.com | 00000020 65 25 3a 17 51 02 20 4b ee 35 be 4f 7e 2d de 76 |e%:.Q. K.5.O~-.v| +peer0.org1.example.com | 00000030 9d fe 43 fe a3 6e ee a8 a3 95 d9 9a b8 07 b9 0d |..C..n..........| +peer0.org1.example.com | 00000040 dd b1 e6 27 af 88 e1 |...'...|" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [cauthdsl] func2 -> DEBU 5391 0xc002aa5560 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [cauthdsl] func1 -> DEBU 5392 0xc002aa5560 gate 1569284816781257500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [policies] Evaluate -> DEBU 5393 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [policies] Evaluate -> DEBU 5394 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [policies] Evaluate -> DEBU 5395 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [policies] Evaluate -> DEBU 5396 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [gossip.discovery] handleAliveMessage -> DEBU 5397 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5398 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5399 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 539a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 539b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 539c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [gossip.discovery] handleAliveMessage -> DEBU 539d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.781 UTC [gossip.discovery] handleMsgFromComm -> DEBU 539e Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.782 UTC [gossip.discovery] sendMemResponse -> DEBU 539f Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:26:56.782 UTC [msp] DeserializeIdentity -> DEBU 53a0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.782 UTC [msp] DeserializeIdentity -> DEBU 53a1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.782 UTC [msp] DeserializeIdentity -> DEBU 53a2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.782 UTC [gossip.comm] Send -> DEBU 53a3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:56.782 UTC [gossip.discovery] sendMemResponse -> DEBU 53a4 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:26:56.782 UTC [gossip.comm] sendToEndpoint -> DEBU 53a5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.782 UTC [gossip.comm] sendToEndpoint -> DEBU 53a6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.816 UTC [gossip.comm] func1 -> DEBU 53a7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.816 UTC [gossip.gossip] handleMessage -> DEBU 53a8 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.816 UTC [gossip.pull] HandleMessage -> DEBU 53a9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53ad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53ae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53af Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:56.818 UTC [gossip.pull] SendDigest -> DEBU 53b0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:26:56.818 UTC [gossip.gossip] handleMessage -> DEBU 53b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:56.836 UTC [gossip.comm] func1 -> DEBU 53b2 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.837 UTC [gossip.gossip] handleMessage -> DEBU 53b3 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.838 UTC [gossip.pull] HandleMessage -> DEBU 53b4 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:56.838 UTC [gossip.pull] SendDigest -> DEBU 53b5 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:56.839 UTC [gossip.gossip] handleMessage -> DEBU 53b6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.000 UTC [dockercontroller] Start -> DEBU 53b7 Started container dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-09-24 00:26:57.000 UTC [container] unlockContainer -> DEBU 53b8 container lock deleted(exp02-1.0)" +peer0.org1.example.com | "2019-09-24 00:26:57.000 UTC [container] lockContainer -> DEBU 53b9 waiting for container(exp02-1.0) lock" +peer0.org1.example.com | "2019-09-24 00:26:57.000 UTC [container] lockContainer -> DEBU 53ba got container (exp02-1.0) lock" +peer0.org1.example.com | "2019-09-24 00:26:57.000 UTC [container] unlockContainer -> DEBU 53bb container lock deleted(exp02-1.0)" +peer0.org1.example.com | "2019-09-24 00:26:57.042 UTC [chaincode.accesscontrol] authenticate -> DEBU 53bc Chaincode exp02:1.0 's authentication is authorized" +peer0.org1.example.com | "2019-09-24 00:26:57.042 UTC [chaincode] handleMessage -> DEBU 53bd [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-09-24 00:26:57.042 UTC [chaincode] HandleRegister -> DEBU 53be Received REGISTER in state created" +peer0.org1.example.com | "2019-09-24 00:26:57.043 UTC [chaincode] Register -> DEBU 53bf registered handler complete for chaincode exp02:1.0" +peer0.org1.example.com | "2019-09-24 00:26:57.043 UTC [chaincode] HandleRegister -> DEBU 53c0 Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED" +peer0.org1.example.com | "2019-09-24 00:26:57.044 UTC [chaincode] HandleRegister -> DEBU 53c1 Changed state to established for name:"exp02:1.0" " +peer0.org1.example.com | "2019-09-24 00:26:57.044 UTC [chaincode] sendReady -> DEBU 53c2 sending READY for chaincode name:"exp02:1.0" " +peer0.org1.example.com | "2019-09-24 00:26:57.044 UTC [chaincode] sendReady -> DEBU 53c3 Changed to state ready for chaincode name:"exp02:1.0" " +peer0.org1.example.com | "2019-09-24 00:26:57.045 UTC [chaincode] Launch -> DEBU 53c4 launch complete" +peer0.org1.example.com | "2019-09-24 00:26:57.045 UTC [chaincode] Execute -> DEBU 53c5 Entry" +peer0.org1.example.com | "2019-09-24 00:26:57.047 UTC [chaincode] handleMessage -> DEBU 53c6 [220bb88b] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:26:57.047 UTC [chaincode] HandleTransaction -> DEBU 53c7 [220bb88b] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:26:57.047 UTC [chaincode] HandleTransaction -> DEBU 53c8 [220bb88b] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:26:57.048 UTC [chaincode] handleMessage -> DEBU 53c9 [220bb88b] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:26:57.048 UTC [chaincode] HandleTransaction -> DEBU 53ca [220bb88b] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:26:57.048 UTC [chaincode] HandleTransaction -> DEBU 53cb [220bb88b] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:26:57.049 UTC [chaincode] handleMessage -> DEBU 53cc [220bb88b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:26:57.049 UTC [chaincode] Notify -> DEBU 53cd [220bb88b] notifying Txid:220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:26:57.050 UTC [chaincode] Execute -> DEBU 53ce Exit" +peer0.org1.example.com | "2019-09-24 00:26:57.050 UTC [endorser] callChaincode -> INFO 53cf [businesschannel][220bb88b] Exit chaincode: name:"lscc" (96255ms)" +peer0.org1.example.com | "2019-09-24 00:26:57.051 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 53d0 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:26:57.051 UTC [lockbasedtxmgr] Done -> DEBU 53d1 Done with transaction simulation / query execution [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7]" +peer0.org1.example.com | "2019-09-24 00:26:57.052 UTC [endorser] SimulateProposal -> DEBU 53d2 [businesschannel][220bb88b] Exit" +peer0.org1.example.com | "2019-09-24 00:26:57.052 UTC [endorser] endorseProposal -> DEBU 53d3 [businesschannel][220bb88b] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:26:57.052 UTC [endorser] endorseProposal -> DEBU 53d4 [businesschannel][220bb88b] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 00:26:57.053 UTC [endorser] EndorseWithPlugin -> DEBU 53d5 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:26:57.053 UTC [msp.identity] Sign -> DEBU 53d6 Sign: plaintext: 0A201D646C7BFA107780D56BFD3DC443...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:26:57.053 UTC [msp.identity] Sign -> DEBU 53d7 Sign: digest: 2CEE09FB208174EF40B4EEE835E150E7CB240B6A6008824807409B521EA70105 " +peer0.org1.example.com | "2019-09-24 00:26:57.054 UTC [endorser] EndorseWithPlugin -> DEBU 53d8 Exiting {plugin: escc, channel: businesschannel, tx: 220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:26:57.054 UTC [endorser] endorseProposal -> DEBU 53d9 [businesschannel][220bb88b] Exit" +peer0.org1.example.com | "2019-09-24 00:26:57.054 UTC [lockbasedtxmgr] Done -> DEBU 53da Done with transaction simulation / query execution [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7]" +peer0.org1.example.com | "2019-09-24 00:26:57.054 UTC [endorser] func1 -> DEBU 53db Exit: request from 172.18.0.9:50708" +peer0.org1.example.com | "2019-09-24 00:26:57.055 UTC [comm.grpc.server] 1 -> INFO 53dc unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50708 grpc.code=OK grpc.call_duration=1m36.2623753s +peer0.org1.example.com | "2019-09-24 00:26:57.077 UTC [gossip.gossip] handleMessage -> DEBU 53dd Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.078 UTC [msp] DeserializeIdentity -> DEBU 53de Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.078 UTC [msp] DeserializeIdentity -> DEBU 53df Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.078 UTC [msp] DeserializeIdentity -> DEBU 53e0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.078 UTC [gossip.gossip] handleMessage -> DEBU 53e1 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.084 UTC [grpc] infof -> DEBU 53e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:26:57.084 UTC [grpc] infof -> DEBU 53e3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:26:57.317 UTC [gossip.election] waitForInterrupt -> DEBU 53e4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.317 UTC [gossip.election] IsLeader -> DEBU 53e5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:26:57.317 UTC [msp] GetDefaultSigningIdentity -> DEBU 53e6 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:57.317 UTC [msp.identity] Sign -> DEBU 53e7 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510191801 " +peer0.org1.example.com | "2019-09-24 00:26:57.317 UTC [msp.identity] Sign -> DEBU 53e8 Sign: digest: 2BB2B87ED1763097B2AD90185C58581E361DF282E4AD5C79639CAFFA98A4AD42 " +peer0.org1.example.com | "2019-09-24 00:26:57.318 UTC [gossip.election] waitForInterrupt -> DEBU 53e9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.318 UTC [gossip.comm] Send -> DEBU 53ee Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.318 UTC [gossip.comm] sendToEndpoint -> DEBU 53f1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.318 UTC [gossip.comm] sendToEndpoint -> DEBU 53f2 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.540 UTC [endorser] ProcessProposal -> DEBU 53f3 Entering: request from 172.18.0.9:50974" +peer0.org1.example.com | "2019-09-24 00:26:57.540 UTC [protoutils] ValidateProposalMessage -> DEBU 53f4 ValidateProposalMessage starts for signed proposal 0xc0026a0b90" +peer0.org1.example.com | "2019-09-24 00:26:57.540 UTC [protoutils] validateChannelHeader -> DEBU 53f5 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:26:57.540 UTC [protoutils] checkSignatureFromCreator -> DEBU 53f6 begin" +peer0.org1.example.com | "2019-09-24 00:26:57.540 UTC [msp] GetManagerForChain -> DEBU 53f7 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:26:57.540 UTC [protoutils] checkSignatureFromCreator -> DEBU 53f8 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:26:57.540 UTC [protoutils] checkSignatureFromCreator -> DEBU 53f9 creator is valid" +peer0.org1.example.com | "2019-09-24 00:26:57.540 UTC [msp.identity] Verify -> DEBU 53fa Verify: digest = 00000000 84 59 30 15 5f af 51 20 ac c4 be 85 62 e9 6d f6 |.Y0._.Q ....b.m.| +peer0.org1.example.com | 00000010 97 76 43 78 8a 2c 12 8b 80 9b 10 cd 36 95 f1 5f |.vCx.,......6.._|" +peer0.org1.example.com | "2019-09-24 00:26:57.540 UTC [msp.identity] Verify -> DEBU 53fb Verify: sig = 00000000 30 44 02 20 23 d9 91 cd a9 ce bc da 8c 34 4f df |0D. #........4O.| +peer0.org1.example.com | 00000010 98 7d df 92 3a 59 86 47 bb 94 c3 d5 80 82 54 d7 |.}..:Y.G......T.| +peer0.org1.example.com | 00000020 9d b8 30 b3 02 20 22 a9 57 27 9a 1a 98 cb 15 fa |..0.. ".W'......| +peer0.org1.example.com | 00000030 63 c7 9a 86 cf a4 70 c7 6e be fa c2 d7 51 83 73 |c.....p.n....Q.s| +peer0.org1.example.com | 00000040 db 91 a6 99 d8 a9 |......|" +peer0.org1.example.com | "2019-09-24 00:26:57.540 UTC [protoutils] checkSignatureFromCreator -> DEBU 53fc exits successfully" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 53fd validateChaincodeProposalMessage starts for proposal 0xc000122e00, header 0xc0026a0fa0" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 53fe validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [endorser] preProcess -> DEBU 53ff [businesschannel][ca869c6c] processing txid: ca869c6cb6f4054405f4af660e94edba709b8feb686f61621cd843688f3c7b55" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5400 retrieveTransactionByID() - txId = [ca869c6cb6f4054405f4af660e94edba709b8feb686f61621cd843688f3c7b55]" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [aclmgmt] CheckACL -> DEBU 5401 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [aclmgmt] CheckACL -> DEBU 5402 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [policies] Evaluate -> DEBU 5403 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [policies] Evaluate -> DEBU 5404 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [policies] Evaluate -> DEBU 5405 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [cauthdsl] func1 -> DEBU 5406 0xc002c176e0 gate 1569284817541441500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [cauthdsl] func2 -> DEBU 5407 0xc002c176e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [cauthdsl] func2 -> DEBU 5408 0xc002c176e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5409 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [msp] Validate -> DEBU 540a MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [msp] getCertificationChain -> DEBU 540b MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [cauthdsl] func2 -> DEBU 540c 0xc002c176e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [msp.identity] Verify -> DEBU 540d Verify: digest = 00000000 84 59 30 15 5f af 51 20 ac c4 be 85 62 e9 6d f6 |.Y0._.Q ....b.m.| +peer0.org1.example.com | 00000010 97 76 43 78 8a 2c 12 8b 80 9b 10 cd 36 95 f1 5f |.vCx.,......6.._|" +peer0.org1.example.com | "2019-09-24 00:26:57.541 UTC [msp.identity] Verify -> DEBU 540e Verify: sig = 00000000 30 44 02 20 23 d9 91 cd a9 ce bc da 8c 34 4f df |0D. #........4O.| +peer0.org1.example.com | 00000010 98 7d df 92 3a 59 86 47 bb 94 c3 d5 80 82 54 d7 |.}..:Y.G......T.| +peer0.org1.example.com | 00000020 9d b8 30 b3 02 20 22 a9 57 27 9a 1a 98 cb 15 fa |..0.. ".W'......| +peer0.org1.example.com | 00000030 63 c7 9a 86 cf a4 70 c7 6e be fa c2 d7 51 83 73 |c.....p.n....Q.s| +peer0.org1.example.com | 00000040 db 91 a6 99 d8 a9 |......|" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [cauthdsl] func2 -> DEBU 540f 0xc002c176e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [cauthdsl] func1 -> DEBU 5410 0xc002c176e0 gate 1569284817541441500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [policies] Evaluate -> DEBU 5411 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [policies] Evaluate -> DEBU 5412 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [policies] Evaluate -> DEBU 5413 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [policies] Evaluate -> DEBU 5414 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5415 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5416 constructing new tx simulator txid = [ca869c6cb6f4054405f4af660e94edba709b8feb686f61621cd843688f3c7b55]" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [endorser] SimulateProposal -> DEBU 5417 [businesschannel][ca869c6c] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [stateleveldb] GetState -> DEBU 5418 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [endorser] SimulateProposal -> DEBU 5419 [businesschannel][ca869c6c] Exit" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [lockbasedtxmgr] Done -> DEBU 541a Done with transaction simulation / query execution [ca869c6cb6f4054405f4af660e94edba709b8feb686f61621cd843688f3c7b55]" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [endorser] func1 -> DEBU 541b Exit: request from 172.18.0.9:50974" +peer0.org1.example.com | "2019-09-24 00:26:57.542 UTC [comm.grpc.server] 1 -> INFO 541c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50974 grpc.code=OK grpc.call_duration=2.4216ms +peer0.org1.example.com | "2019-09-24 00:26:57.546 UTC [grpc] infof -> DEBU 541e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:26:57.546 UTC [grpc] infof -> DEBU 541d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:26:57.647 UTC [gossip.comm] func1 -> DEBU 541f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.648 UTC [gossip.gossip] handleMessage -> DEBU 5420 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.648 UTC [gossip.pull] HandleMessage -> DEBU 5421 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.649 UTC [gossip.pull] SendDigest -> DEBU 5422 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:26:57.649 UTC [gossip.gossip] handleMessage -> DEBU 5423 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.700 UTC [gossip.comm] func1 -> DEBU 5424 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.700 UTC [gossip.gossip] handleMessage -> DEBU 5425 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.701 UTC [gossip.gossip] handleMessage -> DEBU 5426 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5427 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.701 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5428 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:57.701 UTC [msp.identity] Verify -> DEBU 5429 Verify: digest = 00000000 48 30 82 ad dc dc 87 52 6e 62 c3 4c 9c 1c f3 a6 |H0.....Rnb.L....| +peer0.org1.example.com | 00000010 c0 1c 44 11 d3 60 57 35 40 2f df 81 cc 34 49 05 |..D..`W5@/...4I.|" +peer0.org1.example.com | "2019-09-24 00:26:57.702 UTC [msp.identity] Verify -> DEBU 542a Verify: sig = 00000000 30 45 02 21 00 fb c8 ad d8 e4 d0 03 bc 49 9a 37 |0E.!.........I.7| +peer0.org1.example.com | 00000010 5d b3 a9 70 22 3e e6 a9 c1 20 e6 7a 02 d3 98 c6 |]..p">... .z....| +peer0.org1.example.com | 00000020 0f a2 97 c4 1c 02 20 4b 7e 7e 61 fa ec 6a ba 1c |...... K~~a..j..| +peer0.org1.example.com | 00000030 82 0b ae f0 d9 21 55 f3 7c 24 f1 5b fa df 89 d3 |.....!U.|$.[....| +peer0.org1.example.com | 00000040 b3 ca 39 b7 94 0a b0 |..9....|" +peer0.org1.example.com | "2019-09-24 00:26:57.702 UTC [gossip.discovery] handleAliveMessage -> DEBU 542b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 542c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:57.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 542d updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:57.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 542e Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:57.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 542f Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:57.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 5430 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.703 UTC [gossip.discovery] handleAliveMessage -> DEBU 5431 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5432 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.708 UTC [msp] DeserializeIdentity -> DEBU 5433 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.708 UTC [msp] DeserializeIdentity -> DEBU 5434 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.710 UTC [msp] DeserializeIdentity -> DEBU 5435 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.710 UTC [gossip.comm] Send -> DEBU 5436 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:57.710 UTC [msp] DeserializeIdentity -> DEBU 5437 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.711 UTC [gossip.comm] Send -> DEBU 5438 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:57.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5439 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.712 UTC [gossip.comm] sendToEndpoint -> DEBU 543a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.713 UTC [gossip.comm] sendToEndpoint -> DEBU 543b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.713 UTC [gossip.comm] sendToEndpoint -> DEBU 543c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.715 UTC [gossip.comm] func1 -> DEBU 543d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.715 UTC [gossip.gossip] handleMessage -> DEBU 543e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.715 UTC [gossip.gossip] handleMessage -> DEBU 543f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5440 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5441 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.717 UTC [gossip.gossip] handleMessage -> DEBU 5442 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.717 UTC [gossip.gossip] handleMessage -> DEBU 5443 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5444 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5445 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.778 UTC [gossip.comm] func1 -> DEBU 5446 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" secret_envelope:\246u\344\224\356>\345{\016\002 f\327\244c\020\266\210\301U4\260\207{\243\232gG\246\272\020\302\246\227\320\202\211\263\371\367@\307M" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.785 UTC [gossip.gossip] handleMessage -> DEBU 5447 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" secret_envelope:\246u\344\224\356>\345{\016\002 f\327\244c\020\266\210\301U4\260\207{\243\232gG\246\272\020\302\246\227\320\202\211\263\371\367@\307M" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.785 UTC [gossip.gossip] handleMessage -> DEBU 5448 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.786 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5449 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" secret_envelope:\246u\344\224\356>\345{\016\002 f\327\244c\020\266\210\301U4\260\207{\243\232gG\246\272\020\302\246\227\320\202\211\263\371\367@\307M" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.786 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 544a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:57.786 UTC [msp.identity] Verify -> DEBU 544b Verify: digest = 00000000 bc 4b da 1a 0e 27 33 ce bb 7e af 9d 12 c8 7b 2a |.K...'3..~....{*| +peer0.org1.example.com | 00000010 37 ab 75 ef bb 5a a7 5e 73 7c 57 a1 70 a8 43 2f |7.u..Z.^s|W.p.C/|" +peer0.org1.example.com | "2019-09-24 00:26:57.786 UTC [msp.identity] Verify -> DEBU 544c Verify: sig = 00000000 30 44 02 20 3b b3 e7 b7 d9 9f 2b e6 6a 20 3a 67 |0D. ;.....+.j :g| +peer0.org1.example.com | 00000010 35 37 22 c8 83 d8 85 68 c7 46 2d 42 a6 80 b7 81 |57"....h.F-B....| +peer0.org1.example.com | 00000020 82 20 4c ab 02 20 72 45 31 63 ed 86 e9 d4 a4 ad |. L.. rE1c......| +peer0.org1.example.com | 00000030 93 bf 57 d8 19 d2 b0 60 f2 fd ef 5b 03 38 a2 2f |..W....`...[.8./| +peer0.org1.example.com | 00000040 ba 4d 73 d5 1c 47 |.Ms..G|" +peer0.org1.example.com | "2019-09-24 00:26:57.787 UTC [msp.identity] Verify -> DEBU 544d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:26:57.787 UTC [msp.identity] Verify -> DEBU 544e Verify: sig = 00000000 30 44 02 20 7a 6c 61 44 89 e4 0f e7 68 78 61 f0 |0D. zlaD....hxa.| +peer0.org1.example.com | 00000010 fa 38 7e a6 d3 2a 8c 64 d4 35 3e a6 75 e4 94 ee |.8~..*.d.5>.u...| +peer0.org1.example.com | 00000020 3e e5 7b 0e 02 20 66 d7 a4 63 10 b6 88 c1 55 34 |>.{.. f..c....U4| +peer0.org1.example.com | 00000030 b0 87 7b a3 9a 67 47 a6 ba 10 c2 a6 97 d0 82 89 |..{..gG.........| +peer0.org1.example.com | 00000040 b3 f9 f7 40 c7 4d |...@.M|" +peer0.org1.example.com | "2019-09-24 00:26:57.787 UTC [gossip.discovery] handleAliveMessage -> DEBU 544f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 5450 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:57.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 5451 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:57.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 5452 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:57.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 5453 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:57.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 5454 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.788 UTC [gossip.discovery] handleAliveMessage -> DEBU 5455 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.788 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5456 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:57.788 UTC [gossip.discovery] sendMemResponse -> DEBU 5457 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:26:57.788 UTC [msp] DeserializeIdentity -> DEBU 5458 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.788 UTC [msp] DeserializeIdentity -> DEBU 5459 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:57.788 UTC [gossip.comm] Send -> DEBU 545a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:57.788 UTC [gossip.comm] sendToEndpoint -> DEBU 545b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:57.788 UTC [gossip.discovery] sendMemResponse -> DEBU 545c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" secret_envelope:\246u\344\224\356>\345{\016\002 f\327\244c\020\266\210\301U4\260\207{\243\232gG\246\272\020\302\246\227\320\202\211\263\371\367@\307M" > > alive: " +peer0.org1.example.com | "2019-09-24 00:26:57.788 UTC [gossip.comm] sendToEndpoint -> DEBU 545d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:58.016 UTC [gossip.comm] func1 -> DEBU 545e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:58.017 UTC [gossip.gossip] handleMessage -> DEBU 545f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:58.017 UTC [msp] DeserializeIdentity -> DEBU 5460 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:58.018 UTC [msp] DeserializeIdentity -> DEBU 5461 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:58.018 UTC [msp] DeserializeIdentity -> DEBU 5462 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:58.019 UTC [gossip.gossip] handleMessage -> DEBU 5463 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.102 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5464 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:59.102 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5465 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:59.102 UTC [policies] Evaluate -> DEBU 5466 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 00:26:59.102 UTC [policies] Evaluate -> DEBU 5467 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [policies] Evaluate -> DEBU 5468 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [msp] DeserializeIdentity -> DEBU 5469 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [msp.identity] newIdentity -> DEBU 546a Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org1.example.com | KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO +peer0.org1.example.com | CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM +peer0.org1.example.com | SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q +peer0.org1.example.com | 1A== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [cauthdsl] func1 -> DEBU 546b 0xc0030d96c0 gate 1569284819103520600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [cauthdsl] func2 -> DEBU 546c 0xc0030d96c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [cauthdsl] func2 -> DEBU 546d 0xc0030d96c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 546e Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [msp] Validate -> DEBU 546f MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [cauthdsl] func2 -> DEBU 5470 0xc0030d96c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [msp.identity] Verify -> DEBU 5471 Verify: digest = 00000000 b3 da e8 26 80 74 2d 43 69 dd ba a6 4f 9b 0d 49 |...&.t-Ci...O..I| +peer0.org1.example.com | 00000010 bd 94 8c 19 c3 64 5f 92 08 1e ae 90 b0 18 bc 36 |.....d_........6|" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [msp.identity] Verify -> DEBU 5472 Verify: sig = 00000000 30 45 02 21 00 83 90 56 b0 7e 63 97 17 5f 29 ef |0E.!...V.~c.._).| +peer0.org1.example.com | 00000010 1d 20 72 54 11 84 05 8c 5f e3 87 69 5b de 1f 41 |. rT...._..i[..A| +peer0.org1.example.com | 00000020 01 f7 3c 42 1b 02 20 60 bd 94 cd fc 96 88 15 1e |.. DEBU 5473 0xc0030d96c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.103 UTC [cauthdsl] func1 -> DEBU 5474 0xc0030d96c0 gate 1569284819103520600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [policies] Evaluate -> DEBU 5475 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [policies] Evaluate -> DEBU 5476 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [policies] Evaluate -> DEBU 5477 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [policies] Evaluate -> DEBU 5478 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [blocksProvider] DeliverBlocks -> DEBU 5479 [businesschannel] Adding payload to local buffer, blockNum = [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [gossip.state] addPayload -> DEBU 547a [businesschannel] Adding payload to local buffer, blockNum = [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [gossip.state] addPayload -> DEBU 547b Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [blocksProvider] DeliverBlocks -> DEBU 547c [businesschannel] Gossiping block [3], peers number [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [gossip.channel] AddToMsgStore -> DEBU 547d Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4545 bytes, seq: 3}, Envelope: 4575 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [gossip.pull] Add -> DEBU 547e Added 3, total items: 3" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [gossip.state] deliverPayloads -> DEBU 547f [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [gossip.state] deliverPayloads -> DEBU 5480 [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [gossip.privdata] StoreBlock -> INFO 5481 [businesschannel] Received block [3] from buffer" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [gossip.privdata] StoreBlock -> DEBU 5482 [businesschannel] Validating block [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [committer.txvalidator] Validate -> DEBU 5483 [businesschannel] START Block Validation for block [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [committer.txvalidator] Validate -> DEBU 5484 expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [committer.txvalidator] validateTx -> DEBU 5485 [businesschannel] validateTx starts for block 0xc003206040 env 0xc002877270 txn 0" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [protoutils] ValidateTransaction -> DEBU 5486 ValidateTransactionEnvelope starts for envelope 0xc002877270" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [protoutils] ValidateTransaction -> DEBU 5487 Header is channel_header:"\010\003\032\014\010\360\304\245\354\005\020\270\307\203\253\003\"\017businesschannel*@220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030`\305\355d\317\353I\ttw\211\364\014\316.\033\021\213\237\021\004\356EN" " +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [protoutils] validateChannelHeader -> DEBU 5488 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [protoutils] checkSignatureFromCreator -> DEBU 5489 begin" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [msp] GetManagerForChain -> DEBU 548a Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [protoutils] checkSignatureFromCreator -> DEBU 548b creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [protoutils] checkSignatureFromCreator -> DEBU 548c creator is valid" +peer0.org1.example.com | "2019-09-24 00:26:59.104 UTC [msp.identity] Verify -> DEBU 548d Verify: digest = 00000000 15 f0 bf 5c dd b9 06 29 48 24 cd a2 db 84 36 74 |...\...)H$....6t| +peer0.org1.example.com | 00000010 4e b5 b9 83 45 11 38 fa 11 fe 61 65 4d e9 c7 c4 |N...E.8...aeM...|" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [msp.identity] Verify -> DEBU 548e Verify: sig = 00000000 30 44 02 20 7a d3 96 7d 8e 27 11 63 1c 26 14 b5 |0D. z..}.'.c.&..| +peer0.org1.example.com | 00000010 bf 60 cc 45 a5 c4 dd 1e c0 d1 0a aa ff 65 1f 43 |.`.E.........e.C| +peer0.org1.example.com | 00000020 37 33 9a 86 02 20 4c 92 f4 c4 95 34 9c a1 db 0b |73... L....4....| +peer0.org1.example.com | 00000030 dc d5 2d 9d 34 9d 82 d2 a6 5d c9 ca b1 e9 2d a3 |..-.4....]....-.| +peer0.org1.example.com | 00000040 39 03 67 3b 57 25 |9.g;W%|" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [protoutils] checkSignatureFromCreator -> DEBU 548f exits successfully" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [protoutils] validateEndorserTransaction -> DEBU 5490 validateEndorserTransaction starts for data 0xc0030faa80, header channel_header:"\010\003\032\014\010\360\304\245\354\005\020\270\307\203\253\003\"\017businesschannel*@220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030`\305\355d\317\353I\ttw\211\364\014\316.\033\021\213\237\021\004\356EN" " +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [protoutils] validateEndorserTransaction -> DEBU 5491 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [protoutils] validateEndorserTransaction -> DEBU 5492 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [protoutils] ValidateTransaction -> DEBU 5493 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [committer.txvalidator] validateTx -> DEBU 5494 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5495 retrieveTransactionByID() - txId = [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7]" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [committer.txvalidator] validateTx -> DEBU 5496 Validating transaction vscc tx validate" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 5497 [businesschannel] VSCCValidateTx starts for bytes 0xc0030fd000" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 5498 Validating Tx 220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5499 constructing new query executor txid = [5a79080d-5440-4242-bae2-5ba7353ec07c]" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [lockbasedtxmgr] Done -> DEBU 549a Done with transaction simulation / query execution [5a79080d-5440-4242-bae2-5ba7353ec07c]" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [msp] DeserializeIdentity -> DEBU 549b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.105 UTC [msp.identity] newIdentity -> DEBU 549c Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 549d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 549e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 549f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 54a0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.109 UTC [gossip.comm] Send -> DEBU 54a1 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4545 bytes, seq: 3}, Envelope: 4575 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 54a2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 54a3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 54a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4545 bytes, seq: 3}, Envelope: 4575 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 54a5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.115 UTC [cauthdsl] func1 -> DEBU 54a6 0xc003112f90 gate 1569284819115229000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:59.115 UTC [cauthdsl] func2 -> DEBU 54a7 0xc003112f90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:59.115 UTC [cauthdsl] func2 -> DEBU 54a8 0xc003112f90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:59.115 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 54a9 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:26:59.116 UTC [msp] Validate -> DEBU 54aa MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:26:59.116 UTC [msp] getCertificationChain -> DEBU 54ab MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:26:59.117 UTC [cauthdsl] func2 -> DEBU 54ac 0xc003112f90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.117 UTC [msp.identity] Verify -> DEBU 54ad Verify: digest = 00000000 2c ee 09 fb 20 81 74 ef 40 b4 ee e8 35 e1 50 e7 |,... .t.@...5.P.| +peer0.org1.example.com | 00000010 cb 24 0b 6a 60 08 82 48 07 40 9b 52 1e a7 01 05 |.$.j`..H.@.R....|" +peer0.org1.example.com | "2019-09-24 00:26:59.117 UTC [msp.identity] Verify -> DEBU 54ae Verify: sig = 00000000 30 45 02 21 00 9c e1 44 44 b6 e6 52 bd 97 bc 03 |0E.!...DD..R....| +peer0.org1.example.com | 00000010 44 ca ab d5 f7 a2 87 61 5c b2 cf a5 a9 87 bc 01 |D......a\.......| +peer0.org1.example.com | 00000020 17 c7 60 96 b2 02 20 12 a6 a9 c9 a3 94 54 1f 9b |..`... ......T..| +peer0.org1.example.com | 00000030 41 e0 d7 ff fa d0 51 4c 53 d6 bd 9d 58 1b fe ca |A.....QLS...X...| +peer0.org1.example.com | 00000040 e2 9a 38 b4 84 20 a8 |..8.. .|" +peer0.org1.example.com | "2019-09-24 00:26:59.118 UTC [cauthdsl] func2 -> DEBU 54af 0xc003112f90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.119 UTC [cauthdsl] func2 -> DEBU 54b0 0xc003112f90 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-09-24 00:26:59.119 UTC [cauthdsl] func2 -> DEBU 54b1 0xc003112f90 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-09-24 00:26:59.119 UTC [cauthdsl] func2 -> DEBU 54b2 0xc003112f90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:59.119 UTC [cauthdsl] func1 -> DEBU 54b3 0xc003112f90 gate 1569284819115229000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:59.120 UTC [vscc] Validate -> DEBU 54b4 VSCC info: doing special validation for LSCC" +peer0.org1.example.com | "2019-09-24 00:26:59.120 UTC [vscc] ValidateLSCCInvocation -> DEBU 54b5 VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +peer0.org1.example.com | "2019-09-24 00:26:59.121 UTC [vscc] ValidateLSCCInvocation -> DEBU 54b6 VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +peer0.org1.example.com | "2019-09-24 00:26:59.121 UTC [vscc] ValidateLSCCInvocation -> DEBU 54b7 Namespace exp02" +peer0.org1.example.com | "2019-09-24 00:26:59.121 UTC [vscc] ValidateLSCCInvocation -> DEBU 54b8 Namespace lscc" +peer0.org1.example.com | "2019-09-24 00:26:59.122 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 54b9 constructing new query executor txid = [c5e3085d-4181-43e6-a067-e35861e40531]" +peer0.org1.example.com | "2019-09-24 00:26:59.123 UTC [stateleveldb] GetState -> DEBU 54ba GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:26:59.123 UTC [lockbasedtxmgr] Done -> DEBU 54bb Done with transaction simulation / query execution [c5e3085d-4181-43e6-a067-e35861e40531]" +peer0.org1.example.com | "2019-09-24 00:26:59.123 UTC [vscc] ValidateLSCCInvocation -> DEBU 54bc Validating deploy for cc exp02 version 1.0" +peer0.org1.example.com | "2019-09-24 00:26:59.123 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 54bd constructing new query executor txid = [ad7e0ec9-d589-4502-8dbd-1e10a3554733]" +peer0.org1.example.com | "2019-09-24 00:26:59.124 UTC [stateleveldb] GetState -> DEBU 54be GetState(). ns=lscc, key=exp02~collection" +peer0.org1.example.com | "2019-09-24 00:26:59.125 UTC [lockbasedtxmgr] Done -> DEBU 54bf Done with transaction simulation / query execution [ad7e0ec9-d589-4502-8dbd-1e10a3554733]" +peer0.org1.example.com | "2019-09-24 00:26:59.125 UTC [cauthdsl] func1 -> DEBU 54c0 0xc003131450 gate 1569284819125638800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:59.125 UTC [cauthdsl] func2 -> DEBU 54c1 0xc003131450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:59.126 UTC [cauthdsl] func2 -> DEBU 54c2 0xc003131450 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:59.126 UTC [cauthdsl] func2 -> DEBU 54c3 0xc003131450 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.127 UTC [msp.identity] Verify -> DEBU 54c4 Verify: digest = 00000000 15 f0 bf 5c dd b9 06 29 48 24 cd a2 db 84 36 74 |...\...)H$....6t| +peer0.org1.example.com | 00000010 4e b5 b9 83 45 11 38 fa 11 fe 61 65 4d e9 c7 c4 |N...E.8...aeM...|" +peer0.org1.example.com | "2019-09-24 00:26:59.128 UTC [msp.identity] Verify -> DEBU 54c5 Verify: sig = 00000000 30 44 02 20 7a d3 96 7d 8e 27 11 63 1c 26 14 b5 |0D. z..}.'.c.&..| +peer0.org1.example.com | 00000010 bf 60 cc 45 a5 c4 dd 1e c0 d1 0a aa ff 65 1f 43 |.`.E.........e.C| +peer0.org1.example.com | 00000020 37 33 9a 86 02 20 4c 92 f4 c4 95 34 9c a1 db 0b |73... L....4....| +peer0.org1.example.com | 00000030 dc d5 2d 9d 34 9d 82 d2 a6 5d c9 ca b1 e9 2d a3 |..-.4....]....-.| +peer0.org1.example.com | 00000040 39 03 67 3b 57 25 |9.g;W%|" +peer0.org1.example.com | "2019-09-24 00:26:59.128 UTC [cauthdsl] func2 -> DEBU 54c6 0xc003131450 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.130 UTC [cauthdsl] func2 -> DEBU 54c7 0xc003131450 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-09-24 00:26:59.130 UTC [cauthdsl] func2 -> DEBU 54c8 0xc003131450 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-09-24 00:26:59.130 UTC [cauthdsl] func2 -> DEBU 54c9 0xc003131450 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:59.131 UTC [cauthdsl] func1 -> DEBU 54ca 0xc003131450 gate 1569284819125638800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:59.131 UTC [vscc] Validate -> DEBU 54cb block 3, namespace: lscc, tx 0 validation results is: " +peer0.org1.example.com | "2019-09-24 00:26:59.131 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 54cc Transaction 220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7 appears to be valid" +peer0.org1.example.com | "2019-09-24 00:26:59.132 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 54cd [businesschannel] VSCCValidateTx completes env bytes 0xc0030fd000" +peer0.org1.example.com | "2019-09-24 00:26:59.132 UTC [committer.txvalidator] validateTx -> DEBU 54ce [businesschannel] validateTx completes for block 0xc003206040 env 0xc002877270 txn 0" +peer0.org1.example.com | "2019-09-24 00:26:59.132 UTC [committer.txvalidator] Validate -> DEBU 54cf got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 00:26:59.133 UTC [committer.txvalidator] Validate -> INFO 54d0 [businesschannel] Validated block [3] in 29ms" +peer0.org1.example.com | "2019-09-24 00:26:59.134 UTC [gossip.privdata] listMissingPrivateData -> DEBU 54d1 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 00:26:59.134 UTC [gossip.privdata] StoreBlock -> DEBU 54d2 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 00:26:59.135 UTC [kvledger] CommitWithPvtData -> DEBU 54d3 [businesschannel] Validating state for block [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.135 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 54d4 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 00:26:59.136 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 54d5 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 00:26:59.136 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 54d6 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 00:26:59.136 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 54d7 ValidateAndPrepareBatch() for block number = [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.137 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 54d8 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:26:59.137 UTC [valimpl] preprocessProtoBlock -> DEBU 54d9 txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-09-24 00:26:59.138 UTC [stateleveldb] GetState -> DEBU 54da GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:26:59.139 UTC [statebasedval] validateKVRead -> DEBU 54db Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-09-24 00:26:59.139 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 54dc Block [3] Transaction index [0] TxId [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 00:26:59.139 UTC [valinternal] ApplyWriteSet -> DEBU 54dd txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003207a00), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003207a40), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc003207a80)}" +peer0.org1.example.com | "2019-09-24 00:26:59.140 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 54de validating rwset..." +peer0.org1.example.com | "2019-09-24 00:26:59.140 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 54df postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:26:59.141 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 54e0 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 00:26:59.141 UTC [cceventmgmt] HandleStateUpdates -> DEBU 54e1 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc002900aa0)}}" +peer0.org1.example.com | "2019-09-24 00:26:59.141 UTC [cceventmgmt] HandleStateUpdates -> INFO 54e2 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org1.example.com | "2019-09-24 00:26:59.142 UTC [stateleveldb] GetState -> DEBU 54e3 GetState(). ns=lscc, key=exp02~collection" +peer0.org1.example.com | "2019-09-24 00:26:59.142 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 54e4 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +peer0.org1.example.com | "2019-09-24 00:26:59.143 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU 54e5 Created metadata tar" +peer0.org1.example.com | "2019-09-24 00:26:59.144 UTC [discovery.lifecycle] HandleChaincodeDeploy -> DEBU 54e6 Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}" +peer0.org1.example.com | "2019-09-24 00:26:59.144 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 54e7 Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +peer0.org1.example.com | "2019-09-24 00:26:59.145 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 54e8 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})}" +peer0.org1.example.com | "2019-09-24 00:26:59.145 UTC [stateleveldb] GetState -> DEBU 54e9 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:26:59.146 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 54ea Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 205 43 158 117 226 166 116 102 194 42 212 5 125 161 50 224 142 64 59 162 160 27 245 157 217 195 25 80 186 189 209 254 2 32 126 155 150 99 124 249 156 64 139 91 202 156 219 247 52 205 187 204 55 94 183 166 15 108 209 135 89 253 84 105 50 8]} 0x1523f10}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002a222d0 0xc0028f6fc0 {{0 0} 0 0 0 0} {false}})]}" +peer0.org1.example.com | "2019-09-24 00:26:59.146 UTC [stateleveldb] GetState -> DEBU 54eb GetState(). ns=lscc, key=exp02~collection" +peer0.org1.example.com | "2019-09-24 00:26:59.147 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 54ec Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc0002c0b60})}" +peer0.org1.example.com | "2019-09-24 00:26:59.147 UTC [kvledger] CommitWithPvtData -> DEBU 54ed [businesschannel] Adding CommitHash to the block [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.147 UTC [kvledger] CommitWithPvtData -> DEBU 54ee [businesschannel] Committing block [3] to storage" +peer0.org1.example.com | "2019-09-24 00:26:59.147 UTC [ledgerstorage] CommitWithPvtData -> DEBU 54ef Writing block [3] to pvt block store" +peer0.org1.example.com | "2019-09-24 00:26:59.149 UTC [pvtdatastorage] Prepare -> DEBU 54f0 Saved 0 private data write sets for block [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.151 UTC [fsblkstorage] indexBlock -> DEBU 54f1 Indexing block [blockNum=3, blockHash=[]byte{0x4a, 0x1f, 0x9f, 0xdf, 0xb8, 0xd6, 0xb4, 0xc9, 0xe9, 0xdf, 0x1, 0x15, 0xf0, 0x70, 0xf5, 0xce, 0xa4, 0xda, 0xbc, 0x48, 0x8d, 0x5e, 0xb5, 0x2, 0x42, 0x64, 0xc9, 0x8a, 0x87, 0x31, 0x17, 0x5e} txOffsets= +peer0.org1.example.com | txId=220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7 locPointer=offset=70, bytesLength=3524 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 00:26:59.151 UTC [fsblkstorage] indexBlock -> DEBU 54f2 Adding txLoc [fileSuffixNum=0, offset=71532, bytesLength=3524] for tx ID: [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7] to txid-index" +peer0.org1.example.com | "2019-09-24 00:26:59.152 UTC [fsblkstorage] indexBlock -> DEBU 54f3 Adding txLoc [fileSuffixNum=0, offset=71532, bytesLength=3524] for tx number:[0] ID: [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 00:26:59.153 UTC [fsblkstorage] updateCheckpoint -> DEBU 54f4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76029], isChainEmpty=[false], lastBlockNumber=[3]" +peer0.org1.example.com | "2019-09-24 00:26:59.153 UTC [pvtdatastorage] Commit -> DEBU 54f5 Committing private data for block [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.154 UTC [pvtdatastorage] Commit -> DEBU 54f6 Committed private data for block [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.155 UTC [kvledger] CommitWithPvtData -> DEBU 54f7 [businesschannel] Committing block [3] transactions to state database" +peer0.org1.example.com | "2019-09-24 00:26:59.155 UTC [lockbasedtxmgr] Commit -> DEBU 54f8 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 00:26:59.155 UTC [lockbasedtxmgr] Commit -> DEBU 54f9 Committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:26:59.155 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 54fa Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 00:26:59.155 UTC [lockbasedtxmgr] Commit -> DEBU 54fb Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:26:59.155 UTC [stateleveldb] ApplyUpdates -> DEBU 54fc Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-09-24 00:26:59.156 UTC [stateleveldb] ApplyUpdates -> DEBU 54fd Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-09-24 00:26:59.156 UTC [stateleveldb] ApplyUpdates -> DEBU 54fe Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}]" +peer0.org1.example.com | "2019-09-24 00:26:59.157 UTC [lockbasedtxmgr] Commit -> DEBU 54ff Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 00:26:59.157 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5500 Preparing potential purge list working-set for expiringAtBlk [4]" +peer0.org1.example.com | "2019-09-24 00:26:59.158 UTC [leveldbhelper] GetIterator -> DEBU 5503 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" +peer0.org1.example.com | "2019-09-24 00:26:59.158 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5501 constructing new query executor txid = [eb6e9761-ab12-4dc7-8b5f-59e722931d13]" +peer0.org1.example.com | "2019-09-24 00:26:59.158 UTC [discovery.lifecycle] queryChaincodeDefinitions -> DEBU 5504 Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]" +peer0.org1.example.com | "2019-09-24 00:26:59.158 UTC [stateleveldb] GetState -> DEBU 5505 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:26:59.159 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 5506 Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}]" +peer0.org1.example.com | "2019-09-24 00:26:59.159 UTC [lockbasedtxmgr] Done -> DEBU 5507 Done with transaction simulation / query execution [eb6e9761-ab12-4dc7-8b5f-59e722931d13]" +peer0.org1.example.com | "2019-09-24 00:26:59.159 UTC [discovery.lifecycle] processPendingUpdate -> DEBU 5508 Updating channel businesschannel with [name:"exp02" version:"1.0" ]" +peer0.org1.example.com | "2019-09-24 00:26:59.159 UTC [msp] GetDefaultSigningIdentity -> DEBU 5509 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:59.159 UTC [msp.identity] Sign -> DEBU 550a Sign: plaintext: 18057A6C1214089096D4ACDE83CEE315...08031A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-09-24 00:26:59.159 UTC [msp.identity] Sign -> DEBU 550b Sign: digest: F5FEDC31C929159FE962EE75FBEED4CF774DF23360B8FAE9CFD21D8C9AC63230 " +peer0.org1.example.com | "2019-09-24 00:26:59.160 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 550c Listeners for channel businesschannel invoked" +peer0.org1.example.com | "2019-09-24 00:26:59.158 UTC [lockbasedtxmgr] func1 -> DEBU 5502 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 00:26:59.160 UTC [kvledger] CommitWithPvtData -> DEBU 550d [businesschannel] Committing block [3] transactions to history database" +peer0.org1.example.com | "2019-09-24 00:26:59.160 UTC [historyleveldb] Commit -> DEBU 550e Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" +peer0.org1.example.com | "2019-09-24 00:26:59.158 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 550f No expiry entry found for expiringAtBlk [4]" +peer0.org1.example.com | "2019-09-24 00:26:59.162 UTC [historyleveldb] Commit -> DEBU 5510 Channel [businesschannel]: Updates committed to history database for blockNo [3]" +peer0.org1.example.com | "2019-09-24 00:26:59.162 UTC [kvledger] CommitWithPvtData -> INFO 5511 [businesschannel] Committed block [3] with 1 transaction(s) in 27ms (state_validation=11ms block_and_pvtdata_commit=7ms state_commit=5ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer0.org1.example.com | "2019-09-24 00:26:59.162 UTC [msp] GetDefaultSigningIdentity -> DEBU 5512 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:59.163 UTC [msp.identity] Sign -> DEBU 5513 Sign: plaintext: 18057A6C1214089096D4ACDE83CEE315...08041A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-09-24 00:26:59.163 UTC [msp.identity] Sign -> DEBU 5514 Sign: digest: F2C6D9C5A2537E4360844BCD73DBDDBCB5FDB085493D4E005AEDFCC6DC58C2D1 " +peer0.org1.example.com | "2019-09-24 00:26:59.163 UTC [gossip.state] commitBlock -> DEBU 5515 [businesschannel] Committed block [3] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 00:26:59.583 UTC [msp] GetDefaultSigningIdentity -> DEBU 5516 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:59.584 UTC [msp.identity] Sign -> DEBU 5517 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151048 " +peer0.org1.example.com | "2019-09-24 00:26:59.584 UTC [msp.identity] Sign -> DEBU 5518 Sign: digest: BD59A898D2539C262D6629D39373F5B0FDA20554820D677084FFCF57DFD7FF2C " +peer0.org1.example.com | "2019-09-24 00:26:59.585 UTC [msp] GetDefaultSigningIdentity -> DEBU 5519 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:59.586 UTC [msp.identity] Sign -> DEBU 551a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:59.586 UTC [msp.identity] Sign -> DEBU 551b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:59.586 UTC [gossip.discovery] periodicalSendAlive -> DEBU 551c Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:26:59.589 UTC [msp] DeserializeIdentity -> DEBU 551d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.590 UTC [msp] DeserializeIdentity -> DEBU 551e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.590 UTC [msp] DeserializeIdentity -> DEBU 551f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.590 UTC [gossip.comm] Send -> DEBU 5520 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.591 UTC [msp] DeserializeIdentity -> DEBU 5521 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.591 UTC [gossip.comm] Send -> DEBU 5522 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.591 UTC [gossip.comm] Send -> DEBU 5523 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.592 UTC [gossip.comm] sendToEndpoint -> DEBU 5524 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.592 UTC [gossip.comm] sendToEndpoint -> DEBU 5525 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.592 UTC [gossip.comm] sendToEndpoint -> DEBU 5526 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.593 UTC [gossip.comm] sendToEndpoint -> DEBU 5527 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.593 UTC [gossip.comm] sendToEndpoint -> DEBU 5528 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.593 UTC [gossip.comm] sendToEndpoint -> DEBU 5529 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.707 UTC [gossip.pull] Hello -> DEBU 552a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:59.708 UTC [gossip.comm] Send -> DEBU 552b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.708 UTC [gossip.pull] Hello -> DEBU 552c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:59.708 UTC [gossip.comm] Send -> DEBU 552d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.708 UTC [gossip.pull] Hello -> DEBU 552e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:26:59.708 UTC [gossip.comm] Send -> DEBU 552f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.708 UTC [gossip.comm] sendToEndpoint -> DEBU 5530 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.709 UTC [gossip.comm] sendToEndpoint -> DEBU 5531 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.709 UTC [gossip.comm] sendToEndpoint -> DEBU 5532 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.709 UTC [gossip.comm] sendToEndpoint -> DEBU 5533 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.709 UTC [gossip.comm] sendToEndpoint -> DEBU 5534 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.710 UTC [gossip.comm] sendToEndpoint -> DEBU 5535 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.711 UTC [gossip.comm] func1 -> DEBU 5536 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.711 UTC [gossip.gossip] handleMessage -> DEBU 5537 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.711 UTC [gossip.pull] HandleMessage -> DEBU 5538 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.712 UTC [gossip.gossip] handleMessage -> DEBU 5539 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.712 UTC [gossip.comm] func1 -> DEBU 553a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.712 UTC [gossip.gossip] handleMessage -> DEBU 553b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.712 UTC [gossip.pull] HandleMessage -> DEBU 553c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.712 UTC [gossip.gossip] handleMessage -> DEBU 553d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.713 UTC [gossip.gossip] handleMessage -> DEBU 553e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.713 UTC [gossip.pull] HandleMessage -> DEBU 553f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.713 UTC [gossip.gossip] handleMessage -> DEBU 5540 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.717 UTC [endorser] ProcessProposal -> DEBU 5541 Entering: request from 172.18.0.9:50978" +peer0.org1.example.com | "2019-09-24 00:26:59.718 UTC [protoutils] ValidateProposalMessage -> DEBU 5542 ValidateProposalMessage starts for signed proposal 0xc0029740a0" +peer0.org1.example.com | "2019-09-24 00:26:59.718 UTC [protoutils] validateChannelHeader -> DEBU 5543 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:26:59.719 UTC [protoutils] checkSignatureFromCreator -> DEBU 5544 begin" +peer0.org1.example.com | "2019-09-24 00:26:59.719 UTC [msp] GetManagerForChain -> DEBU 5545 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:26:59.719 UTC [protoutils] checkSignatureFromCreator -> DEBU 5546 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:26:59.719 UTC [protoutils] checkSignatureFromCreator -> DEBU 5547 creator is valid" +peer0.org1.example.com | "2019-09-24 00:26:59.719 UTC [msp.identity] Verify -> DEBU 5548 Verify: digest = 00000000 3b 02 66 ee c6 9d a6 20 78 77 ac bd 12 0c 4a 62 |;.f.... xw....Jb| +peer0.org1.example.com | 00000010 02 9b 83 92 88 ff 16 96 f1 92 b5 c2 3e 4d a3 b9 |............>M..|" +peer0.org1.example.com | "2019-09-24 00:26:59.720 UTC [msp.identity] Verify -> DEBU 5549 Verify: sig = 00000000 30 44 02 20 0a 42 b0 54 64 b8 b6 42 d4 3b 1b 30 |0D. .B.Td..B.;.0| +peer0.org1.example.com | 00000010 2b 3c d6 51 46 60 cc 08 9d f3 f6 2d 06 44 80 1e |+<.QF`.....-.D..| +peer0.org1.example.com | 00000020 4f 33 f1 30 02 20 0a 84 84 ed db 1a 71 76 1d 00 |O3.0. ......qv..| +peer0.org1.example.com | 00000030 a2 13 f1 fb ae 7a 2f 6c dd 47 32 ed 8f 62 c9 55 |.....z/l.G2..b.U| +peer0.org1.example.com | 00000040 4c a5 9c ca 9f 8d |L.....|" +peer0.org1.example.com | "2019-09-24 00:26:59.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 554a exits successfully" +peer0.org1.example.com | "2019-09-24 00:26:59.720 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 554b validateChaincodeProposalMessage starts for proposal 0xc002705ea0, header 0xc002974550" +peer0.org1.example.com | "2019-09-24 00:26:59.720 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 554c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:26:59.720 UTC [endorser] preProcess -> DEBU 554d [businesschannel][8f136052] processing txid: 8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072" +peer0.org1.example.com | "2019-09-24 00:26:59.721 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 554e retrieveTransactionByID() - txId = [8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072]" +peer0.org1.example.com | "2019-09-24 00:26:59.721 UTC [aclmgmt] CheckACL -> DEBU 554f acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 00:26:59.721 UTC [aclmgmt] CheckACL -> DEBU 5550 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 00:26:59.721 UTC [policies] Evaluate -> DEBU 5551 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.721 UTC [policies] Evaluate -> DEBU 5552 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:59.722 UTC [policies] Evaluate -> DEBU 5553 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.722 UTC [cauthdsl] func1 -> DEBU 5554 0xc003296b30 gate 1569284819722172200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:59.722 UTC [cauthdsl] func2 -> DEBU 5555 0xc003296b30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:59.722 UTC [cauthdsl] func2 -> DEBU 5556 0xc003296b30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:59.722 UTC [cauthdsl] func2 -> DEBU 5557 0xc003296b30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.722 UTC [msp.identity] Verify -> DEBU 5558 Verify: digest = 00000000 3b 02 66 ee c6 9d a6 20 78 77 ac bd 12 0c 4a 62 |;.f.... xw....Jb| +peer0.org1.example.com | 00000010 02 9b 83 92 88 ff 16 96 f1 92 b5 c2 3e 4d a3 b9 |............>M..|" +peer0.org1.example.com | "2019-09-24 00:26:59.723 UTC [msp.identity] Verify -> DEBU 5559 Verify: sig = 00000000 30 44 02 20 0a 42 b0 54 64 b8 b6 42 d4 3b 1b 30 |0D. .B.Td..B.;.0| +peer0.org1.example.com | 00000010 2b 3c d6 51 46 60 cc 08 9d f3 f6 2d 06 44 80 1e |+<.QF`.....-.D..| +peer0.org1.example.com | 00000020 4f 33 f1 30 02 20 0a 84 84 ed db 1a 71 76 1d 00 |O3.0. ......qv..| +peer0.org1.example.com | 00000030 a2 13 f1 fb ae 7a 2f 6c dd 47 32 ed 8f 62 c9 55 |.....z/l.G2..b.U| +peer0.org1.example.com | 00000040 4c a5 9c ca 9f 8d |L.....|" +peer0.org1.example.com | "2019-09-24 00:26:59.723 UTC [cauthdsl] func2 -> DEBU 555a 0xc003296b30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.723 UTC [cauthdsl] func1 -> DEBU 555b 0xc003296b30 gate 1569284819722172200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:59.723 UTC [policies] Evaluate -> DEBU 555c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:26:59.724 UTC [policies] Evaluate -> DEBU 555d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:26:59.724 UTC [policies] Evaluate -> DEBU 555e Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:26:59.724 UTC [policies] Evaluate -> DEBU 555f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:26:59.724 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5560 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:26:59.725 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5561 constructing new tx simulator txid = [8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072]" +peer0.org1.example.com | "2019-09-24 00:26:59.725 UTC [endorser] SimulateProposal -> DEBU 5562 [businesschannel][8f136052] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:26:59.725 UTC [stateleveldb] GetState -> DEBU 5563 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:26:59.726 UTC [ccprovider] GetChaincodeData -> DEBU 5564 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 00:26:59.727 UTC [endorser] callChaincode -> INFO 5565 [businesschannel][8f136052] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:26:59.728 UTC [chaincode] Execute -> DEBU 5566 Entry" +peer0.org1.example.com | "2019-09-24 00:26:59.729 UTC [chaincode] handleMessage -> DEBU 5567 [8f136052] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:26:59.729 UTC [chaincode] HandleTransaction -> DEBU 5568 [8f136052] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:26:59.729 UTC [chaincode] HandleGetState -> DEBU 5569 [8f136052] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:26:59.730 UTC [stateleveldb] GetState -> DEBU 556a GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 00:26:59.730 UTC [chaincode] HandleTransaction -> DEBU 556b [8f136052] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:26:59.730 UTC [chaincode] handleMessage -> DEBU 556c [8f136052] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:26:59.731 UTC [chaincode] Notify -> DEBU 556d [8f136052] notifying Txid:8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:26:59.731 UTC [chaincode] Execute -> DEBU 556e Exit" +peer0.org1.example.com | "2019-09-24 00:26:59.731 UTC [endorser] callChaincode -> INFO 556f [businesschannel][8f136052] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-09-24 00:26:59.731 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5570 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:26:59.731 UTC [lockbasedtxmgr] Done -> DEBU 5571 Done with transaction simulation / query execution [8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072]" +peer0.org1.example.com | "2019-09-24 00:26:59.731 UTC [endorser] SimulateProposal -> DEBU 5572 [businesschannel][8f136052] Exit" +peer0.org1.example.com | "2019-09-24 00:26:59.732 UTC [endorser] endorseProposal -> DEBU 5573 [businesschannel][8f136052] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:26:59.732 UTC [endorser] endorseProposal -> DEBU 5574 [businesschannel][8f136052] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 00:26:59.732 UTC [endorser] EndorseWithPlugin -> DEBU 5575 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:26:59.732 UTC [msp.identity] Sign -> DEBU 5576 Sign: plaintext: 0A20CCC2C0B7640EC66E628140E3198F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:26:59.732 UTC [msp.identity] Sign -> DEBU 5577 Sign: digest: 5EEDCEB720A495755E3C19BC26CF37727DB02358225CCB17B605ED9DE27CFD5B " +peer0.org1.example.com | "2019-09-24 00:26:59.733 UTC [endorser] EndorseWithPlugin -> DEBU 5578 Exiting {plugin: escc, channel: businesschannel, tx: 8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:26:59.733 UTC [endorser] endorseProposal -> DEBU 5579 [businesschannel][8f136052] Exit" +peer0.org1.example.com | "2019-09-24 00:26:59.733 UTC [lockbasedtxmgr] Done -> DEBU 557a Done with transaction simulation / query execution [8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072]" +peer0.org1.example.com | "2019-09-24 00:26:59.733 UTC [endorser] func1 -> DEBU 557b Exit: request from 172.18.0.9:50978" +peer0.org1.example.com | "2019-09-24 00:26:59.734 UTC [comm.grpc.server] 1 -> INFO 557c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50978 grpc.code=OK grpc.call_duration=16.4175ms +peer0.org1.example.com | "2019-09-24 00:26:59.737 UTC [grpc] infof -> DEBU 557d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:26:59.737 UTC [grpc] infof -> DEBU 557e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:26:59.845 UTC [msp] GetDefaultSigningIdentity -> DEBU 557f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:59.845 UTC [msp.identity] Sign -> DEBU 5580 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151049 " +peer0.org1.example.com | "2019-09-24 00:26:59.845 UTC [msp.identity] Sign -> DEBU 5581 Sign: digest: 71D2230F3638FEC95FB125487C4DB245839D26BE02585EBD0E7D2C613EACBF1C " +peer0.org1.example.com | "2019-09-24 00:26:59.845 UTC [msp] GetDefaultSigningIdentity -> DEBU 5582 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:26:59.846 UTC [msp.identity] Sign -> DEBU 5583 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:26:59.846 UTC [msp.identity] Sign -> DEBU 5584 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:26:59.846 UTC [gossip.comm] Send -> DEBU 5585 Entering, sending GossipMessage: tag:EMPTY mem_req:0cza&\034\314\221\377\211\316\304\210P\002 \032\363\317\355\276:\357\366\252\r\272\276\r0\037P\366\302\025\377A\325\373\017W\016\031vi\371\305\325" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.846 UTC [msp] DeserializeIdentity -> DEBU 5586 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.847 UTC [gossip.comm] Send -> DEBU 5587 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.847 UTC [msp] DeserializeIdentity -> DEBU 5588 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.847 UTC [gossip.comm] Send -> DEBU 5589 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.850 UTC [gossip.comm] sendToEndpoint -> DEBU 558a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.850 UTC [gossip.comm] sendToEndpoint -> DEBU 558b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.851 UTC [gossip.comm] sendToEndpoint -> DEBU 558c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:0cza&\034\314\221\377\211\316\304\210P\002 \032\363\317\355\276:\357\366\252\r\272\276\r0\037P\366\302\025\377A\325\373\017W\016\031vi\371\305\325" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.851 UTC [gossip.comm] sendToEndpoint -> DEBU 558d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.851 UTC [gossip.comm] sendToEndpoint -> DEBU 558e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.852 UTC [gossip.comm] sendToEndpoint -> DEBU 558f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.854 UTC [gossip.comm] func1 -> DEBU 5590 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.855 UTC [gossip.gossip] handleMessage -> DEBU 5591 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.855 UTC [gossip.gossip] handleMessage -> DEBU 5592 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5593 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.855 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5594 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:59.856 UTC [msp.identity] Verify -> DEBU 5595 Verify: digest = 00000000 71 d2 23 0f 36 38 fe c9 5f b1 25 48 7c 4d b2 45 |q.#.68.._.%H|M.E| +peer0.org1.example.com | 00000010 83 9d 26 be 02 58 5e bd 0e 7d 2c 61 3e ac bf 1c |..&..X^..},a>...|" +peer0.org1.example.com | "2019-09-24 00:26:59.856 UTC [msp.identity] Verify -> DEBU 5596 Verify: sig = 00000000 30 44 02 20 56 55 80 bc ed 0b 6e ee 84 e4 69 66 |0D. VU....n...if| +peer0.org1.example.com | 00000010 e2 98 8b c6 af d6 7b b6 b2 e1 d1 08 c6 47 ad ec |......{......G..| +peer0.org1.example.com | 00000020 d7 72 f6 e3 02 20 40 69 0c bc e5 44 59 cc 64 04 |.r... @i...DY.d.| +peer0.org1.example.com | 00000030 61 11 da 04 97 7e 47 d2 04 06 a0 db 8e dd 4b 11 |a....~G.......K.| +peer0.org1.example.com | 00000040 ff 55 9a 9a 25 b0 |.U..%.|" +peer0.org1.example.com | "2019-09-24 00:26:59.856 UTC [msp.identity] Verify -> DEBU 5597 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:26:59.856 UTC [msp.identity] Verify -> DEBU 5598 Verify: sig = 00000000 30 45 02 21 00 b8 f6 f8 35 68 1e 5d 47 b0 0b 82 |0E.!....5h.]G...| +peer0.org1.example.com | 00000010 b5 bd 8a 1e c0 c5 3e 30 63 7a 61 26 1c cc 91 ff |......>0cza&....| +peer0.org1.example.com | 00000020 89 ce c4 88 50 02 20 1a f3 cf ed be 3a ef f6 aa |....P. .....:...| +peer0.org1.example.com | 00000030 0d ba be 0d 30 1f 50 f6 c2 15 ff 41 d5 fb 0f 57 |....0.P....A...W| +peer0.org1.example.com | 00000040 0e 19 76 69 f9 c5 d5 |..vi...|" +peer0.org1.example.com | "2019-09-24 00:26:59.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 5599 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.857 UTC [gossip.discovery] isSentByMe -> DEBU 559a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 559b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.857 UTC [gossip.discovery] handleMsgFromComm -> DEBU 559c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.858 UTC [gossip.comm] func1 -> DEBU 559d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.858 UTC [gossip.gossip] handleMessage -> DEBU 559e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.858 UTC [gossip.gossip] handleMessage -> DEBU 559f Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55a0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.858 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55a1 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:59.859 UTC [msp.identity] Verify -> DEBU 55a2 Verify: digest = 00000000 71 d2 23 0f 36 38 fe c9 5f b1 25 48 7c 4d b2 45 |q.#.68.._.%H|M.E| +peer0.org1.example.com | 00000010 83 9d 26 be 02 58 5e bd 0e 7d 2c 61 3e ac bf 1c |..&..X^..},a>...|" +peer0.org1.example.com | "2019-09-24 00:26:59.859 UTC [msp.identity] Verify -> DEBU 55a3 Verify: sig = 00000000 30 44 02 20 56 55 80 bc ed 0b 6e ee 84 e4 69 66 |0D. VU....n...if| +peer0.org1.example.com | 00000010 e2 98 8b c6 af d6 7b b6 b2 e1 d1 08 c6 47 ad ec |......{......G..| +peer0.org1.example.com | 00000020 d7 72 f6 e3 02 20 40 69 0c bc e5 44 59 cc 64 04 |.r... @i...DY.d.| +peer0.org1.example.com | 00000030 61 11 da 04 97 7e 47 d2 04 06 a0 db 8e dd 4b 11 |a....~G.......K.| +peer0.org1.example.com | 00000040 ff 55 9a 9a 25 b0 |.U..%.|" +peer0.org1.example.com | "2019-09-24 00:26:59.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 55a4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.859 UTC [gossip.discovery] isSentByMe -> DEBU 55a5 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.860 UTC [gossip.discovery] handleAliveMessage -> DEBU 55a6 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.860 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55a7 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:59.860 UTC [msp] DeserializeIdentity -> DEBU 55a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.860 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 55a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:59.861 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 55aa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:59.861 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 55ab Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:59.861 UTC [policies] Evaluate -> DEBU 55ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.861 UTC [policies] Evaluate -> DEBU 55ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:59.862 UTC [policies] Evaluate -> DEBU 55ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.862 UTC [cauthdsl] func1 -> DEBU 55af 0xc003388870 gate 1569284819862437500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:59.862 UTC [cauthdsl] func2 -> DEBU 55b0 0xc003388870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:59.863 UTC [cauthdsl] func2 -> DEBU 55b1 0xc003388870 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:59.863 UTC [cauthdsl] func2 -> DEBU 55b2 0xc003388870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:59.863 UTC [cauthdsl] func2 -> DEBU 55b3 0xc003388870 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:59.863 UTC [cauthdsl] func1 -> DEBU 55b4 0xc003388870 gate 1569284819862437500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:59.863 UTC [policies] Evaluate -> DEBU 55b5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.864 UTC [policies] Evaluate -> DEBU 55b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.864 UTC [policies] Evaluate -> DEBU 55b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.864 UTC [cauthdsl] func1 -> DEBU 55b8 0xc0033890b0 gate 1569284819864741200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:59.864 UTC [cauthdsl] func2 -> DEBU 55b9 0xc0033890b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:59.865 UTC [cauthdsl] func2 -> DEBU 55ba 0xc0033890b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:59.865 UTC [cauthdsl] func2 -> DEBU 55bb 0xc0033890b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.865 UTC [msp.identity] Verify -> DEBU 55bc Verify: digest = 00000000 72 e1 88 9c 25 89 8b 20 bf e7 d1 f5 e1 33 cc c6 |r...%.. .....3..| +peer0.org1.example.com | 00000010 db 65 54 00 27 22 5e 48 5b 06 9e 06 a7 50 55 b3 |.eT.'"^H[....PU.|" +peer0.org1.example.com | "2019-09-24 00:26:59.865 UTC [msp.identity] Verify -> DEBU 55bd Verify: sig = 00000000 30 44 02 20 58 e0 29 7b f2 d5 15 99 da 3b 91 bb |0D. X.){.....;..| +peer0.org1.example.com | 00000010 e8 3d 99 b1 78 a5 f4 0c 72 62 97 25 48 d0 a2 5a |.=..x...rb.%H..Z| +peer0.org1.example.com | 00000020 75 fc 06 aa 02 20 08 99 a5 8d 7e 33 e1 f7 b2 4d |u.... ....~3...M| +peer0.org1.example.com | 00000030 6a 25 ac 11 8f 99 fe ad 9a 4a 91 28 fe d8 cb 84 |j%.......J.(....| +peer0.org1.example.com | 00000040 47 b7 e5 81 fa 62 |G....b|" +peer0.org1.example.com | "2019-09-24 00:26:59.866 UTC [cauthdsl] func2 -> DEBU 55be 0xc0033890b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.866 UTC [cauthdsl] func1 -> DEBU 55bf 0xc0033890b0 gate 1569284819864741200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:59.866 UTC [policies] Evaluate -> DEBU 55c0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.866 UTC [policies] Evaluate -> DEBU 55c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.866 UTC [policies] Evaluate -> DEBU 55c2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [policies] Evaluate -> DEBU 55c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 55c4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 55c5 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55c6 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [msp.identity] Verify -> DEBU 55c7 Verify: digest = 00000000 bc 4b da 1a 0e 27 33 ce bb 7e af 9d 12 c8 7b 2a |.K...'3..~....{*| +peer0.org1.example.com | 00000010 37 ab 75 ef bb 5a a7 5e 73 7c 57 a1 70 a8 43 2f |7.u..Z.^s|W.p.C/|" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [msp.identity] Verify -> DEBU 55c8 Verify: sig = 00000000 30 44 02 20 3b b3 e7 b7 d9 9f 2b e6 6a 20 3a 67 |0D. ;.....+.j :g| +peer0.org1.example.com | 00000010 35 37 22 c8 83 d8 85 68 c7 46 2d 42 a6 80 b7 81 |57"....h.F-B....| +peer0.org1.example.com | 00000020 82 20 4c ab 02 20 72 45 31 63 ed 86 e9 d4 a4 ad |. L.. rE1c......| +peer0.org1.example.com | 00000030 93 bf 57 d8 19 d2 b0 60 f2 fd ef 5b 03 38 a2 2f |..W....`...[.8./| +peer0.org1.example.com | 00000040 ba 4d 73 d5 1c 47 |.Ms..G|" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 55c9 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 55ca Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55cb Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [gossip.gossip] handleMessage -> DEBU 55cc Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [gossip.gossip] handleMessage -> DEBU 55cd Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55ce Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55cf Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [msp.identity] Verify -> DEBU 55d0 Verify: digest = 00000000 71 d2 23 0f 36 38 fe c9 5f b1 25 48 7c 4d b2 45 |q.#.68.._.%H|M.E| +peer0.org1.example.com | 00000010 83 9d 26 be 02 58 5e bd 0e 7d 2c 61 3e ac bf 1c |..&..X^..},a>...|" +peer0.org1.example.com | "2019-09-24 00:26:59.867 UTC [msp.identity] Verify -> DEBU 55d1 Verify: sig = 00000000 30 44 02 20 56 55 80 bc ed 0b 6e ee 84 e4 69 66 |0D. VU....n...if| +peer0.org1.example.com | 00000010 e2 98 8b c6 af d6 7b b6 b2 e1 d1 08 c6 47 ad ec |......{......G..| +peer0.org1.example.com | 00000020 d7 72 f6 e3 02 20 40 69 0c bc e5 44 59 cc 64 04 |.r... @i...DY.d.| +peer0.org1.example.com | 00000030 61 11 da 04 97 7e 47 d2 04 06 a0 db 8e dd 4b 11 |a....~G.......K.| +peer0.org1.example.com | 00000040 ff 55 9a 9a 25 b0 |.U..%.|" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 55d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [gossip.discovery] isSentByMe -> DEBU 55d3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 55d4 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55d5 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [msp] DeserializeIdentity -> DEBU 55d6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 55d7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 55d8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 55d9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [cauthdsl] func1 -> DEBU 55dd 0xc0035d0480 gate 1569284819868479100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55de 0xc0035d0480 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55df 0xc0035d0480 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55e0 0xc0035d0480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55e1 0xc0035d0480 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [cauthdsl] func1 -> DEBU 55e2 0xc0035d0480 gate 1569284819868479100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55e3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [cauthdsl] func1 -> DEBU 55e6 0xc0035d0cf0 gate 1569284819868731200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55e7 0xc0035d0cf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55e8 0xc0035d0cf0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55e9 0xc0035d0cf0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [msp.identity] Verify -> DEBU 55ea Verify: digest = 00000000 d6 ac 34 f6 6a 63 e1 ea 4a 28 fa 89 28 0c 32 c3 |..4.jc..J(..(.2.| +peer0.org1.example.com | 00000010 77 0c 7b 38 ae 8a 97 6c 39 95 9d 2b 4a a1 f5 98 |w.{8...l9..+J...|" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [msp.identity] Verify -> DEBU 55eb Verify: sig = 00000000 30 45 02 21 00 9a 81 a4 93 16 50 c1 43 79 7d a8 |0E.!......P.Cy}.| +peer0.org1.example.com | 00000010 f4 00 82 34 42 9c 8b 74 31 ef 2f 3f cc c9 ab 14 |...4B..t1./?....| +peer0.org1.example.com | 00000020 65 25 3a 17 51 02 20 4b ee 35 be 4f 7e 2d de 76 |e%:.Q. K.5.O~-.v| +peer0.org1.example.com | 00000030 9d fe 43 fe a3 6e ee a8 a3 95 d9 9a b8 07 b9 0d |..C..n..........| +peer0.org1.example.com | 00000040 dd b1 e6 27 af 88 e1 |...'...|" +peer0.org1.example.com | "2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55ec 0xc0035d0cf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [cauthdsl] func1 -> DEBU 55ed 0xc0035d0cf0 gate 1569284819868731200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [policies] Evaluate -> DEBU 55ee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [policies] Evaluate -> DEBU 55ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [policies] Evaluate -> DEBU 55f0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [policies] Evaluate -> DEBU 55f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 55f2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 55f3 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55f4 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [msp.identity] Verify -> DEBU 55f5 Verify: digest = 00000000 bc 4b da 1a 0e 27 33 ce bb 7e af 9d 12 c8 7b 2a |.K...'3..~....{*| +peer0.org1.example.com | 00000010 37 ab 75 ef bb 5a a7 5e 73 7c 57 a1 70 a8 43 2f |7.u..Z.^s|W.p.C/|" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [msp.identity] Verify -> DEBU 55f6 Verify: sig = 00000000 30 44 02 20 3b b3 e7 b7 d9 9f 2b e6 6a 20 3a 67 |0D. ;.....+.j :g| +peer0.org1.example.com | 00000010 35 37 22 c8 83 d8 85 68 c7 46 2d 42 a6 80 b7 81 |57"....h.F-B....| +peer0.org1.example.com | 00000020 82 20 4c ab 02 20 72 45 31 63 ed 86 e9 d4 a4 ad |. L.. rE1c......| +peer0.org1.example.com | 00000030 93 bf 57 d8 19 d2 b0 60 f2 fd ef 5b 03 38 a2 2f |..W....`...[.8./| +peer0.org1.example.com | 00000040 ba 4d 73 d5 1c 47 |.Ms..G|" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 55f7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 55f8 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55f9 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.914 UTC [gossip.gossip] handleMessage -> DEBU 55fa Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.914 UTC [gossip.pull] HandleMessage -> DEBU 55fb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.915 UTC [msp] DeserializeIdentity -> DEBU 55fc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.916 UTC [msp] DeserializeIdentity -> DEBU 55fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.916 UTC [msp] DeserializeIdentity -> DEBU 55fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.917 UTC [msp] DeserializeIdentity -> DEBU 55ff Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.917 UTC [msp] DeserializeIdentity -> DEBU 5600 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.918 UTC [msp] DeserializeIdentity -> DEBU 5601 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.918 UTC [gossip.pull] SendDigest -> DEBU 5602 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:26:59.918 UTC [gossip.gossip] handleMessage -> DEBU 5603 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.921 UTC [endorser] ProcessProposal -> DEBU 5604 Entering: request from 172.18.0.9:50982" +peer0.org1.example.com | "2019-09-24 00:26:59.922 UTC [protoutils] ValidateProposalMessage -> DEBU 5605 ValidateProposalMessage starts for signed proposal 0xc0029d9a90" +peer0.org1.example.com | "2019-09-24 00:26:59.922 UTC [protoutils] validateChannelHeader -> DEBU 5606 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:26:59.923 UTC [protoutils] checkSignatureFromCreator -> DEBU 5607 begin" +peer0.org1.example.com | "2019-09-24 00:26:59.923 UTC [msp] GetManagerForChain -> DEBU 5608 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:26:59.923 UTC [protoutils] checkSignatureFromCreator -> DEBU 5609 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:26:59.924 UTC [protoutils] checkSignatureFromCreator -> DEBU 560a creator is valid" +peer0.org1.example.com | "2019-09-24 00:26:59.924 UTC [msp.identity] Verify -> DEBU 560b Verify: digest = 00000000 ef 06 a8 2b 35 7a 60 e7 5a d6 c5 0a 06 6a ea 25 |...+5z`.Z....j.%| +peer0.org1.example.com | 00000010 eb dd d2 77 69 71 95 ad e7 59 e9 29 97 49 9a 65 |...wiq...Y.).I.e|" +peer0.org1.example.com | "2019-09-24 00:26:59.924 UTC [msp.identity] Verify -> DEBU 560c Verify: sig = 00000000 30 45 02 21 00 fc 53 4e 0d 71 d5 6e 8c aa 26 c5 |0E.!..SN.q.n..&.| +peer0.org1.example.com | 00000010 a9 d6 c8 30 dd eb f9 8e c0 ac 3a 7d d6 56 ec c0 |...0......:}.V..| +peer0.org1.example.com | 00000020 5a a8 71 31 ee 02 20 69 02 39 ba 6d 9a da 6a a3 |Z.q1.. i.9.m..j.| +peer0.org1.example.com | 00000030 4f f4 cc e8 43 89 5e a1 e8 e4 ca 41 49 e5 17 e6 |O...C.^....AI...| +peer0.org1.example.com | 00000040 7a 4a 73 de 2d a7 b5 |zJs.-..|" +peer0.org1.example.com | "2019-09-24 00:26:59.925 UTC [protoutils] checkSignatureFromCreator -> DEBU 560d exits successfully" +peer0.org1.example.com | "2019-09-24 00:26:59.925 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 560e validateChaincodeProposalMessage starts for proposal 0xc0029c2cb0, header 0xc0029d9ea0" +peer0.org1.example.com | "2019-09-24 00:26:59.926 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 560f validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:26:59.926 UTC [endorser] preProcess -> DEBU 5610 [businesschannel][b4f910bc] processing txid: b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38" +peer0.org1.example.com | "2019-09-24 00:26:59.926 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5611 retrieveTransactionByID() - txId = [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38]" +peer0.org1.example.com | "2019-09-24 00:26:59.927 UTC [aclmgmt] CheckACL -> DEBU 5612 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 00:26:59.927 UTC [aclmgmt] CheckACL -> DEBU 5613 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 00:26:59.927 UTC [policies] Evaluate -> DEBU 5614 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.927 UTC [policies] Evaluate -> DEBU 5615 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:59.928 UTC [policies] Evaluate -> DEBU 5616 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.928 UTC [cauthdsl] func1 -> DEBU 5617 0xc00355bf00 gate 1569284819928312300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:59.928 UTC [cauthdsl] func2 -> DEBU 5618 0xc00355bf00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:59.928 UTC [cauthdsl] func2 -> DEBU 5619 0xc00355bf00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:59.928 UTC [cauthdsl] func2 -> DEBU 561a 0xc00355bf00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.929 UTC [msp.identity] Verify -> DEBU 561b Verify: digest = 00000000 ef 06 a8 2b 35 7a 60 e7 5a d6 c5 0a 06 6a ea 25 |...+5z`.Z....j.%| +peer0.org1.example.com | 00000010 eb dd d2 77 69 71 95 ad e7 59 e9 29 97 49 9a 65 |...wiq...Y.).I.e|" +peer0.org1.example.com | "2019-09-24 00:26:59.929 UTC [msp.identity] Verify -> DEBU 561c Verify: sig = 00000000 30 45 02 21 00 fc 53 4e 0d 71 d5 6e 8c aa 26 c5 |0E.!..SN.q.n..&.| +peer0.org1.example.com | 00000010 a9 d6 c8 30 dd eb f9 8e c0 ac 3a 7d d6 56 ec c0 |...0......:}.V..| +peer0.org1.example.com | 00000020 5a a8 71 31 ee 02 20 69 02 39 ba 6d 9a da 6a a3 |Z.q1.. i.9.m..j.| +peer0.org1.example.com | 00000030 4f f4 cc e8 43 89 5e a1 e8 e4 ca 41 49 e5 17 e6 |O...C.^....AI...| +peer0.org1.example.com | 00000040 7a 4a 73 de 2d a7 b5 |zJs.-..|" +peer0.org1.example.com | "2019-09-24 00:26:59.929 UTC [cauthdsl] func2 -> DEBU 561d 0xc00355bf00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.930 UTC [cauthdsl] func1 -> DEBU 561e 0xc00355bf00 gate 1569284819928312300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:59.930 UTC [policies] Evaluate -> DEBU 561f Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:26:59.930 UTC [policies] Evaluate -> DEBU 5620 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:26:59.930 UTC [policies] Evaluate -> DEBU 5621 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:26:59.930 UTC [policies] Evaluate -> DEBU 5622 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:26:59.931 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5623 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:26:59.931 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5624 constructing new tx simulator txid = [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38]" +peer0.org1.example.com | "2019-09-24 00:26:59.931 UTC [endorser] SimulateProposal -> DEBU 5625 [businesschannel][b4f910bc] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:26:59.932 UTC [stateleveldb] GetState -> DEBU 5626 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:26:59.932 UTC [ccprovider] GetChaincodeData -> DEBU 5627 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 00:26:59.932 UTC [endorser] callChaincode -> INFO 5628 [businesschannel][b4f910bc] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:26:59.933 UTC [chaincode] Execute -> DEBU 5629 Entry" +peer0.org1.example.com | "2019-09-24 00:26:59.934 UTC [chaincode] handleMessage -> DEBU 562a [b4f910bc] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:26:59.934 UTC [chaincode] HandleTransaction -> DEBU 562b [b4f910bc] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:26:59.935 UTC [chaincode] HandleGetState -> DEBU 562c [b4f910bc] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:26:59.935 UTC [stateleveldb] GetState -> DEBU 562d GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 00:26:59.935 UTC [chaincode] HandleTransaction -> DEBU 562e [b4f910bc] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:26:59.936 UTC [chaincode] handleMessage -> DEBU 562f [b4f910bc] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:26:59.936 UTC [chaincode] HandleTransaction -> DEBU 5630 [b4f910bc] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:26:59.937 UTC [chaincode] HandleGetState -> DEBU 5631 [b4f910bc] getting state for chaincode exp02, key b, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:26:59.937 UTC [stateleveldb] GetState -> DEBU 5632 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-09-24 00:26:59.937 UTC [chaincode] HandleTransaction -> DEBU 5633 [b4f910bc] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:26:59.938 UTC [chaincode] handleMessage -> DEBU 5634 [b4f910bc] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:26:59.938 UTC [chaincode] HandleTransaction -> DEBU 5635 [b4f910bc] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:26:59.938 UTC [chaincode] HandleTransaction -> DEBU 5636 [b4f910bc] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:26:59.939 UTC [chaincode] handleMessage -> DEBU 5637 [b4f910bc] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:26:59.939 UTC [chaincode] HandleTransaction -> DEBU 5638 [b4f910bc] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:26:59.940 UTC [chaincode] HandleTransaction -> DEBU 5639 [b4f910bc] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:26:59.940 UTC [chaincode] handleMessage -> DEBU 563a [b4f910bc] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:26:59.941 UTC [chaincode] Notify -> DEBU 563b [b4f910bc] notifying Txid:b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:26:59.941 UTC [chaincode] Execute -> DEBU 563c Exit" +peer0.org1.example.com | "2019-09-24 00:26:59.941 UTC [endorser] callChaincode -> INFO 563d [businesschannel][b4f910bc] Exit chaincode: name:"exp02" (9ms)" +peer0.org1.example.com | "2019-09-24 00:26:59.941 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 563e Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:26:59.942 UTC [lockbasedtxmgr] Done -> DEBU 563f Done with transaction simulation / query execution [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38]" +peer0.org1.example.com | "2019-09-24 00:26:59.942 UTC [endorser] SimulateProposal -> DEBU 5640 [businesschannel][b4f910bc] Exit" +peer0.org1.example.com | "2019-09-24 00:26:59.942 UTC [endorser] endorseProposal -> DEBU 5641 [businesschannel][b4f910bc] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:26:59.945 UTC [endorser] endorseProposal -> DEBU 5642 [businesschannel][b4f910bc] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 00:26:59.945 UTC [endorser] EndorseWithPlugin -> DEBU 5643 Entering endorsement for {plugin: escc, channel: businesschannel, tx: b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:26:59.946 UTC [msp.identity] Sign -> DEBU 5644 Sign: plaintext: 0A201C8725A0356A84A3C2DE4E22261F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:26:59.946 UTC [msp.identity] Sign -> DEBU 5645 Sign: digest: AF26F2E72D96E2791DD11AADF44D9552FBDD8AF446FA438E23788EA33A7E977D " +peer0.org1.example.com | "2019-09-24 00:26:59.946 UTC [endorser] EndorseWithPlugin -> DEBU 5646 Exiting {plugin: escc, channel: businesschannel, tx: b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:26:59.947 UTC [endorser] endorseProposal -> DEBU 5647 [businesschannel][b4f910bc] Exit" +peer0.org1.example.com | "2019-09-24 00:26:59.947 UTC [lockbasedtxmgr] Done -> DEBU 5648 Done with transaction simulation / query execution [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38]" +peer0.org1.example.com | "2019-09-24 00:26:59.947 UTC [endorser] func1 -> DEBU 5649 Exit: request from 172.18.0.9:50982" +peer0.org1.example.com | "2019-09-24 00:26:59.947 UTC [comm.grpc.server] 1 -> INFO 564a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50982 grpc.code=OK grpc.call_duration=26.5192ms +peer0.org1.example.com | "2019-09-24 00:26:59.949 UTC [gossip.comm] func1 -> DEBU 564b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.950 UTC [gossip.gossip] handleMessage -> DEBU 564c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.950 UTC [gossip.gossip] handleMessage -> DEBU 564d Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.951 UTC [gossip.discovery] handleMsgFromComm -> DEBU 564e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 564f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:26:59.951 UTC [msp] DeserializeIdentity -> DEBU 5650 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.952 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5651 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:26:59.952 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5652 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:59.953 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5653 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 5654 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 5655 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 5656 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.955 UTC [cauthdsl] func1 -> DEBU 5657 0xc0037a7c10 gate 1569284819955403700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:59.955 UTC [cauthdsl] func2 -> DEBU 5658 0xc0037a7c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:59.955 UTC [cauthdsl] func2 -> DEBU 5659 0xc0037a7c10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:59.956 UTC [cauthdsl] func2 -> DEBU 565a 0xc0037a7c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:26:59.956 UTC [cauthdsl] func2 -> DEBU 565b 0xc0037a7c10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:59.957 UTC [cauthdsl] func1 -> DEBU 565c 0xc0037a7c10 gate 1569284819955403700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:26:59.957 UTC [policies] Evaluate -> DEBU 565d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.957 UTC [policies] Evaluate -> DEBU 565e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.957 UTC [policies] Evaluate -> DEBU 565f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:26:59.957 UTC [cauthdsl] func1 -> DEBU 5660 0xc0037b8460 gate 1569284819957831700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:26:59.958 UTC [cauthdsl] func2 -> DEBU 5661 0xc0037b8460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:26:59.958 UTC [cauthdsl] func2 -> DEBU 5662 0xc0037b8460 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:26:59.958 UTC [cauthdsl] func2 -> DEBU 5663 0xc0037b8460 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.958 UTC [msp.identity] Verify -> DEBU 5664 Verify: digest = 00000000 25 dc b1 5f e7 2b 75 72 23 ad e9 8d 43 f8 5d 84 |%.._.+ur#...C.].| +peer0.org1.example.com | 00000010 c3 f0 58 f8 5f 64 c9 29 01 db fc 2e da 5a 41 3d |..X._d.).....ZA=|" +peer0.org1.example.com | "2019-09-24 00:26:59.958 UTC [msp.identity] Verify -> DEBU 5665 Verify: sig = 00000000 30 45 02 21 00 a2 37 f2 b1 21 30 dc 4f f0 82 bf |0E.!..7..!0.O...| +peer0.org1.example.com | 00000010 61 0c b9 57 ba 76 bb 50 bf 6e 27 84 65 71 43 a7 |a..W.v.P.n'.eqC.| +peer0.org1.example.com | 00000020 2d a9 ca 4e 42 02 20 04 13 40 81 23 db 56 b5 90 |-..NB. ..@.#.V..| +peer0.org1.example.com | 00000030 de 2d 8b ca d4 dd 76 cb f9 f5 e8 75 22 d1 01 5e |.-....v....u"..^| +peer0.org1.example.com | 00000040 d9 9e 21 61 99 e4 a0 |..!a...|" +peer0.org1.example.com | "2019-09-24 00:26:59.960 UTC [cauthdsl] func2 -> DEBU 5666 0xc0037b8460 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:26:59.961 UTC [cauthdsl] func1 -> DEBU 5667 0xc0037b8460 gate 1569284819957831700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:26:59.964 UTC [policies] Evaluate -> DEBU 5668 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.965 UTC [policies] Evaluate -> DEBU 5669 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.966 UTC [policies] Evaluate -> DEBU 566a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.967 UTC [policies] Evaluate -> DEBU 566b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:26:59.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 566c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.969 UTC [gossip.discovery] learnExistingMembers -> DEBU 566d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:26:59.969 UTC [gossip.discovery] learnExistingMembers -> DEBU 566e updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:59.969 UTC [gossip.discovery] learnExistingMembers -> DEBU 566f Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:26:59.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 5670 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:26:59.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 5671 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 5672 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5673 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.971 UTC [gossip.gossip] handleMessage -> DEBU 5674 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.972 UTC [gossip.gossip] handleMessage -> DEBU 5675 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5676 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5677 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.973 UTC [gossip.comm] func1 -> DEBU 5678 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.973 UTC [gossip.gossip] handleMessage -> DEBU 5679 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.974 UTC [gossip.gossip] handleMessage -> DEBU 567a Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 567b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 567c Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.975 UTC [msp] DeserializeIdentity -> DEBU 567d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.975 UTC [msp] DeserializeIdentity -> DEBU 567e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.975 UTC [msp] DeserializeIdentity -> DEBU 567f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.977 UTC [msp] DeserializeIdentity -> DEBU 5680 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.978 UTC [msp] DeserializeIdentity -> DEBU 5681 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.979 UTC [msp] DeserializeIdentity -> DEBU 5682 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.980 UTC [msp] DeserializeIdentity -> DEBU 5683 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.981 UTC [gossip.comm] Send -> DEBU 5684 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.982 UTC [msp] DeserializeIdentity -> DEBU 5685 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.982 UTC [msp] DeserializeIdentity -> DEBU 5686 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:26:59.983 UTC [gossip.comm] Send -> DEBU 5687 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:26:59.983 UTC [gossip.comm] sendToEndpoint -> DEBU 5688 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.983 UTC [gossip.comm] sendToEndpoint -> DEBU 5689 Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.984 UTC [gossip.comm] sendToEndpoint -> DEBU 568a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:26:59.984 UTC [gossip.comm] sendToEndpoint -> DEBU 568b Exiting" +peer0.org1.example.com | "2019-09-24 00:26:59.986 UTC [grpc] infof -> DEBU 568c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:26:59.987 UTC [grpc] infof -> DEBU 568d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:00.020 UTC [gossip.gossip] handleMessage -> DEBU 568e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.020 UTC [gossip.gossip] handleMessage -> DEBU 568f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5690 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.020 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5691 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:00.021 UTC [msp] DeserializeIdentity -> DEBU 5692 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.021 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5693 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:00.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5694 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5695 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.021 UTC [policies] Evaluate -> DEBU 5696 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.021 UTC [policies] Evaluate -> DEBU 5697 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.021 UTC [policies] Evaluate -> DEBU 5698 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.021 UTC [cauthdsl] func1 -> DEBU 5699 0xc0038421a0 gate 1569284820021913500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 569a 0xc0038421a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 569b 0xc0038421a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 569c 0xc0038421a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 569d 0xc0038421a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [cauthdsl] func1 -> DEBU 569e 0xc0038421a0 gate 1569284820021913500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [policies] Evaluate -> DEBU 569f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [policies] Evaluate -> DEBU 56a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [policies] Evaluate -> DEBU 56a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [cauthdsl] func1 -> DEBU 56a2 0xc0038429f0 gate 1569284820022604900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 56a3 0xc0038429f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 56a4 0xc0038429f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 56a5 0xc0038429f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.023 UTC [msp.identity] Verify -> DEBU 56a6 Verify: digest = 00000000 4b ac 2c fe c6 af c3 f1 2c 25 65 11 6a cb 80 34 |K.,.....,%e.j..4| +peer0.org1.example.com | 00000010 d0 17 b0 49 0a 9d 01 58 c3 eb fd 45 c3 f3 66 f0 |...I...X...E..f.|" +peer0.org1.example.com | "2019-09-24 00:27:00.023 UTC [msp.identity] Verify -> DEBU 56a7 Verify: sig = 00000000 30 44 02 20 7d 21 7c e8 e8 7f 5e 2f db c9 7a 04 |0D. }!|...^/..z.| +peer0.org1.example.com | 00000010 b1 01 6e 4d 17 af cb fe d0 a0 fb 02 4e a2 03 f6 |..nM........N...| +peer0.org1.example.com | 00000020 29 a1 12 ea 02 20 3c 8b 0e f6 4e e9 03 b0 8a e7 |).... <...N.....| +peer0.org1.example.com | 00000030 84 a9 87 f8 59 79 17 b0 63 23 3a 30 5d 66 e3 47 |....Yy..c#:0]f.G| +peer0.org1.example.com | 00000040 1e 2b 6f 20 d5 a9 |.+o ..|" +peer0.org1.example.com | "2019-09-24 00:27:00.023 UTC [cauthdsl] func2 -> DEBU 56a8 0xc0038429f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.023 UTC [cauthdsl] func1 -> DEBU 56a9 0xc0038429f0 gate 1569284820022604900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.023 UTC [policies] Evaluate -> DEBU 56aa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.023 UTC [policies] Evaluate -> DEBU 56ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.023 UTC [policies] Evaluate -> DEBU 56ac Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.024 UTC [policies] Evaluate -> DEBU 56ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.024 UTC [gossip.discovery] handleAliveMessage -> DEBU 56ae Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 56af Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:00.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b0 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:00.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b1 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:00.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:00.025 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.025 UTC [gossip.discovery] handleAliveMessage -> DEBU 56b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 56b5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.025 UTC [gossip.discovery] sendMemResponse -> DEBU 56b6 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:27:00.025 UTC [msp] DeserializeIdentity -> DEBU 56b7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.026 UTC [msp] DeserializeIdentity -> DEBU 56b8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.026 UTC [msp] DeserializeIdentity -> DEBU 56b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.026 UTC [gossip.comm] Send -> DEBU 56ba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:00.026 UTC [gossip.comm] sendToEndpoint -> DEBU 56bb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.026 UTC [gossip.comm] sendToEndpoint -> DEBU 56bc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.028 UTC [gossip.discovery] sendMemResponse -> DEBU 56bd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:00.080 UTC [msp] DeserializeIdentity -> DEBU 56be Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.081 UTC [msp] DeserializeIdentity -> DEBU 56bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.081 UTC [gossip.comm] Send -> DEBU 56c0 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:00.081 UTC [gossip.comm] sendToEndpoint -> DEBU 56c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.081 UTC [gossip.comm] sendToEndpoint -> DEBU 56c4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.081 UTC [gossip.comm] sendToEndpoint -> DEBU 56c2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.083 UTC [gossip.comm] sendToEndpoint -> DEBU 56c6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.081 UTC [gossip.comm] sendToEndpoint -> DEBU 56c3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.083 UTC [gossip.comm] func1 -> DEBU 56c5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.084 UTC [gossip.comm] sendToEndpoint -> DEBU 56c7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.085 UTC [gossip.comm] func1 -> DEBU 56c8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.084 UTC [gossip.gossip] handleMessage -> DEBU 56c9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.086 UTC [msp.identity] Verify -> DEBU 56ca Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:27:00.087 UTC [msp.identity] Verify -> DEBU 56cb Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:27:00.087 UTC [msp] DeserializeIdentity -> DEBU 56cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.087 UTC [msp] DeserializeIdentity -> DEBU 56cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.088 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 56ce Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:00.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56cf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56d1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.089 UTC [policies] Evaluate -> DEBU 56d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.089 UTC [policies] Evaluate -> DEBU 56d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.088 UTC [msp] DeserializeIdentity -> DEBU 56d0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.090 UTC [policies] Evaluate -> DEBU 56d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.090 UTC [cauthdsl] func1 -> DEBU 56d6 0xc003a15b20 gate 1569284820090587600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.090 UTC [msp] DeserializeIdentity -> DEBU 56d5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.090 UTC [cauthdsl] func2 -> DEBU 56d7 0xc003a15b20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.091 UTC [cauthdsl] func2 -> DEBU 56d9 0xc003a15b20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.091 UTC [cauthdsl] func2 -> DEBU 56da 0xc003a15b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.091 UTC [cauthdsl] func2 -> DEBU 56db 0xc003a15b20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.090 UTC [gossip.comm] Send -> DEBU 56d8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:00.091 UTC [msp] DeserializeIdentity -> DEBU 56dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.091 UTC [cauthdsl] func1 -> DEBU 56dc 0xc003a15b20 gate 1569284820090587600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.092 UTC [gossip.comm] sendToEndpoint -> DEBU 56df Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.092 UTC [gossip.comm] sendToEndpoint -> DEBU 56e1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.092 UTC [gossip.comm] sendToEndpoint -> DEBU 56e2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.093 UTC [gossip.comm] sendToEndpoint -> DEBU 56e4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.092 UTC [policies] Evaluate -> DEBU 56e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.093 UTC [policies] Evaluate -> DEBU 56e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.093 UTC [policies] Evaluate -> DEBU 56e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.094 UTC [cauthdsl] func1 -> DEBU 56e7 0xc003a615a0 gate 1569284820094071900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.092 UTC [msp] DeserializeIdentity -> DEBU 56de Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.093 UTC [gossip.comm] sendToEndpoint -> DEBU 56e3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.095 UTC [gossip.comm] sendToEndpoint -> DEBU 56e8 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.095 UTC [cauthdsl] func2 -> DEBU 56e9 0xc003a615a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.096 UTC [cauthdsl] func2 -> DEBU 56ea 0xc003a615a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.096 UTC [cauthdsl] func2 -> DEBU 56eb 0xc003a615a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.096 UTC [msp.identity] Verify -> DEBU 56ec Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:27:00.096 UTC [msp.identity] Verify -> DEBU 56ed Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:27:00.096 UTC [cauthdsl] func2 -> DEBU 56ee 0xc003a615a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.097 UTC [cauthdsl] func1 -> DEBU 56ef 0xc003a615a0 gate 1569284820094071900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.097 UTC [policies] Evaluate -> DEBU 56f0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.098 UTC [policies] Evaluate -> DEBU 56f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.098 UTC [policies] Evaluate -> DEBU 56f2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.098 UTC [policies] Evaluate -> DEBU 56f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.098 UTC [msp] DeserializeIdentity -> DEBU 56f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.105 UTC [msp] DeserializeIdentity -> DEBU 56f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.106 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 56f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:00.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56f7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56f8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.107 UTC [policies] Evaluate -> DEBU 56f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.109 UTC [policies] Evaluate -> DEBU 56fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.110 UTC [policies] Evaluate -> DEBU 56fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.110 UTC [cauthdsl] func1 -> DEBU 56fc 0xc003a88dd0 gate 1569284820110654000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.111 UTC [cauthdsl] func2 -> DEBU 56fd 0xc003a88dd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.111 UTC [cauthdsl] func2 -> DEBU 56fe 0xc003a88dd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.111 UTC [cauthdsl] func2 -> DEBU 56ff 0xc003a88dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.111 UTC [cauthdsl] func2 -> DEBU 5700 0xc003a88dd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.111 UTC [cauthdsl] func1 -> DEBU 5701 0xc003a88dd0 gate 1569284820110654000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.112 UTC [policies] Evaluate -> DEBU 5702 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.112 UTC [policies] Evaluate -> DEBU 5703 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.112 UTC [policies] Evaluate -> DEBU 5704 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.112 UTC [cauthdsl] func1 -> DEBU 5705 0xc003a89750 gate 1569284820112435300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.112 UTC [cauthdsl] func2 -> DEBU 5706 0xc003a89750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.112 UTC [cauthdsl] func2 -> DEBU 5707 0xc003a89750 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.113 UTC [cauthdsl] func2 -> DEBU 5708 0xc003a89750 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.113 UTC [msp.identity] Verify -> DEBU 5709 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:27:00.113 UTC [msp.identity] Verify -> DEBU 570a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:27:00.113 UTC [cauthdsl] func2 -> DEBU 570b 0xc003a89750 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.113 UTC [cauthdsl] func1 -> DEBU 570c 0xc003a89750 gate 1569284820112435300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.114 UTC [policies] Evaluate -> DEBU 570d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.114 UTC [policies] Evaluate -> DEBU 570e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.114 UTC [policies] Evaluate -> DEBU 570f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.114 UTC [policies] Evaluate -> DEBU 5710 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.114 UTC [msp.identity] Verify -> DEBU 5711 Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +peer0.org1.example.com | 00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +peer0.org1.example.com | "2019-09-24 00:27:00.114 UTC [msp.identity] Verify -> DEBU 5712 Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +peer0.org1.example.com | 00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +peer0.org1.example.com | 00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +peer0.org1.example.com | 00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +peer0.org1.example.com | 00000040 48 4c 21 8e e5 c8 |HL!...|" +peer0.org1.example.com | "2019-09-24 00:27:00.115 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5713 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.115 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5714 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.115 UTC [policies] Evaluate -> DEBU 5715 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.115 UTC [policies] Evaluate -> DEBU 5716 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.115 UTC [policies] Evaluate -> DEBU 5717 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.115 UTC [cauthdsl] func1 -> DEBU 5718 0xc003aa2f70 gate 1569284820115909900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.116 UTC [cauthdsl] func2 -> DEBU 5719 0xc003aa2f70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.116 UTC [cauthdsl] func2 -> DEBU 571a 0xc003aa2f70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.116 UTC [cauthdsl] func2 -> DEBU 571b 0xc003aa2f70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.116 UTC [msp.identity] Verify -> DEBU 571c Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +peer0.org1.example.com | 00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +peer0.org1.example.com | "2019-09-24 00:27:00.116 UTC [msp.identity] Verify -> DEBU 571d Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +peer0.org1.example.com | 00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +peer0.org1.example.com | 00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +peer0.org1.example.com | 00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +peer0.org1.example.com | 00000040 48 4c 21 8e e5 c8 |HL!...|" +peer0.org1.example.com | "2019-09-24 00:27:00.116 UTC [cauthdsl] func2 -> DEBU 571e 0xc003aa2f70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.116 UTC [cauthdsl] func1 -> DEBU 571f 0xc003aa2f70 gate 1569284820115909900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.116 UTC [policies] Evaluate -> DEBU 5720 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.117 UTC [policies] Evaluate -> DEBU 5721 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.117 UTC [policies] Evaluate -> DEBU 5722 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.117 UTC [policies] Evaluate -> DEBU 5723 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.117 UTC [gossip.gossip] handleMessage -> DEBU 5724 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.117 UTC [gossip.gossip] handleMessage -> DEBU 5725 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.117 UTC [msp] DeserializeIdentity -> DEBU 5726 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.118 UTC [msp.identity] Verify -> DEBU 5727 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:27:00.118 UTC [msp.identity] Verify -> DEBU 5728 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:27:00.119 UTC [msp.identity] Verify -> DEBU 5729 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:27:00.119 UTC [msp.identity] Verify -> DEBU 572a Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:27:00.119 UTC [msp] DeserializeIdentity -> DEBU 572b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.120 UTC [msp] DeserializeIdentity -> DEBU 572c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.120 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 572d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:00.120 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 572e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.120 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 572f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.121 UTC [policies] Evaluate -> DEBU 5730 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.121 UTC [policies] Evaluate -> DEBU 5731 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.121 UTC [policies] Evaluate -> DEBU 5732 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.122 UTC [cauthdsl] func1 -> DEBU 5733 0xc003ac1b50 gate 1569284820122075300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.122 UTC [cauthdsl] func2 -> DEBU 5734 0xc003ac1b50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.122 UTC [cauthdsl] func2 -> DEBU 5735 0xc003ac1b50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.123 UTC [cauthdsl] func2 -> DEBU 5736 0xc003ac1b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.123 UTC [cauthdsl] func2 -> DEBU 5737 0xc003ac1b50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.123 UTC [cauthdsl] func1 -> DEBU 5738 0xc003ac1b50 gate 1569284820122075300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.123 UTC [policies] Evaluate -> DEBU 5739 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.123 UTC [policies] Evaluate -> DEBU 573a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.124 UTC [policies] Evaluate -> DEBU 573b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.124 UTC [cauthdsl] func1 -> DEBU 573c 0xc003ada390 gate 1569284820124479000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.124 UTC [cauthdsl] func2 -> DEBU 573d 0xc003ada390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.124 UTC [cauthdsl] func2 -> DEBU 573e 0xc003ada390 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.124 UTC [cauthdsl] func2 -> DEBU 573f 0xc003ada390 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.125 UTC [msp.identity] Verify -> DEBU 5740 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +peer0.org1.example.com | 00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +peer0.org1.example.com | "2019-09-24 00:27:00.125 UTC [msp.identity] Verify -> DEBU 5741 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +peer0.org1.example.com | 00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +peer0.org1.example.com | 00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +peer0.org1.example.com | 00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +peer0.org1.example.com | 00000040 b4 c6 3d ac cd 3e |..=..>|" +peer0.org1.example.com | "2019-09-24 00:27:00.125 UTC [cauthdsl] func2 -> DEBU 5742 0xc003ada390 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.125 UTC [cauthdsl] func1 -> DEBU 5743 0xc003ada390 gate 1569284820124479000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.125 UTC [policies] Evaluate -> DEBU 5744 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.126 UTC [policies] Evaluate -> DEBU 5745 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.126 UTC [policies] Evaluate -> DEBU 5746 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.126 UTC [policies] Evaluate -> DEBU 5747 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.126 UTC [msp] DeserializeIdentity -> DEBU 5748 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.127 UTC [msp] DeserializeIdentity -> DEBU 5749 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.127 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 574a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:00.128 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 574b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.128 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 574c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.128 UTC [policies] Evaluate -> DEBU 574d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.129 UTC [policies] Evaluate -> DEBU 574e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.129 UTC [policies] Evaluate -> DEBU 574f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.129 UTC [cauthdsl] func1 -> DEBU 5750 0xc003adbba0 gate 1569284820129770400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.130 UTC [cauthdsl] func2 -> DEBU 5751 0xc003adbba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.131 UTC [cauthdsl] func2 -> DEBU 5752 0xc003adbba0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.131 UTC [cauthdsl] func2 -> DEBU 5753 0xc003adbba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.132 UTC [cauthdsl] func2 -> DEBU 5754 0xc003adbba0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.132 UTC [cauthdsl] func1 -> DEBU 5755 0xc003adbba0 gate 1569284820129770400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.133 UTC [policies] Evaluate -> DEBU 5756 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.133 UTC [policies] Evaluate -> DEBU 5757 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.133 UTC [policies] Evaluate -> DEBU 5758 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.133 UTC [cauthdsl] func1 -> DEBU 5759 0xc003aec3f0 gate 1569284820133813000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.133 UTC [cauthdsl] func2 -> DEBU 575a 0xc003aec3f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.133 UTC [cauthdsl] func2 -> DEBU 575b 0xc003aec3f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.134 UTC [cauthdsl] func2 -> DEBU 575c 0xc003aec3f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.134 UTC [msp.identity] Verify -> DEBU 575d Verify: digest = 00000000 ae 5f 75 8f b8 79 6b 9c 07 89 8e 59 2a 45 63 02 |._u..yk....Y*Ec.| +peer0.org1.example.com | 00000010 9e fc 44 09 6f e3 0b 6b b2 c4 8a 32 fa ae 08 15 |..D.o..k...2....|" +peer0.org1.example.com | "2019-09-24 00:27:00.135 UTC [msp.identity] Verify -> DEBU 575e Verify: sig = 00000000 30 45 02 21 00 ac 0a c9 b4 53 a1 27 c0 f2 00 68 |0E.!.....S.'...h| +peer0.org1.example.com | 00000010 68 7e a0 00 2f 93 e7 0a a6 e3 81 a9 d3 f9 eb dd |h~../...........| +peer0.org1.example.com | 00000020 97 89 ec 5c e7 02 20 31 be f8 03 6d 39 fd 83 02 |...\.. 1...m9...| +peer0.org1.example.com | 00000030 cb d4 46 a1 d2 8c a1 1c c9 91 16 4b 12 36 36 c1 |..F........K.66.| +peer0.org1.example.com | 00000040 62 ad 3f 03 5c 91 fb |b.?.\..|" +peer0.org1.example.com | "2019-09-24 00:27:00.135 UTC [cauthdsl] func2 -> DEBU 575f 0xc003aec3f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.135 UTC [cauthdsl] func1 -> DEBU 5760 0xc003aec3f0 gate 1569284820133813000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.135 UTC [policies] Evaluate -> DEBU 5761 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.135 UTC [policies] Evaluate -> DEBU 5762 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.136 UTC [policies] Evaluate -> DEBU 5763 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.136 UTC [policies] Evaluate -> DEBU 5764 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.136 UTC [msp] DeserializeIdentity -> DEBU 5765 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5766 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5767 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.136 UTC [policies] Evaluate -> DEBU 5768 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.137 UTC [policies] Evaluate -> DEBU 5769 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.137 UTC [policies] Evaluate -> DEBU 576a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.137 UTC [cauthdsl] func1 -> DEBU 576b 0xc003aed4d0 gate 1569284820137310600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.137 UTC [cauthdsl] func2 -> DEBU 576c 0xc003aed4d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.137 UTC [cauthdsl] func2 -> DEBU 576d 0xc003aed4d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.138 UTC [cauthdsl] func2 -> DEBU 576e 0xc003aed4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.139 UTC [cauthdsl] func2 -> DEBU 576f 0xc003aed4d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.139 UTC [cauthdsl] func1 -> DEBU 5770 0xc003aed4d0 gate 1569284820137310600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.139 UTC [policies] Evaluate -> DEBU 5771 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.139 UTC [policies] Evaluate -> DEBU 5772 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.139 UTC [policies] Evaluate -> DEBU 5773 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.139 UTC [cauthdsl] func1 -> DEBU 5774 0xc003aedd10 gate 1569284820139695500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.139 UTC [cauthdsl] func2 -> DEBU 5775 0xc003aedd10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.139 UTC [cauthdsl] func2 -> DEBU 5776 0xc003aedd10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.140 UTC [cauthdsl] func2 -> DEBU 5777 0xc003aedd10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.140 UTC [msp.identity] Verify -> DEBU 5778 Verify: digest = 00000000 ae 5f 75 8f b8 79 6b 9c 07 89 8e 59 2a 45 63 02 |._u..yk....Y*Ec.| +peer0.org1.example.com | 00000010 9e fc 44 09 6f e3 0b 6b b2 c4 8a 32 fa ae 08 15 |..D.o..k...2....|" +peer0.org1.example.com | "2019-09-24 00:27:00.140 UTC [msp.identity] Verify -> DEBU 5779 Verify: sig = 00000000 30 45 02 21 00 ac 0a c9 b4 53 a1 27 c0 f2 00 68 |0E.!.....S.'...h| +peer0.org1.example.com | 00000010 68 7e a0 00 2f 93 e7 0a a6 e3 81 a9 d3 f9 eb dd |h~../...........| +peer0.org1.example.com | 00000020 97 89 ec 5c e7 02 20 31 be f8 03 6d 39 fd 83 02 |...\.. 1...m9...| +peer0.org1.example.com | 00000030 cb d4 46 a1 d2 8c a1 1c c9 91 16 4b 12 36 36 c1 |..F........K.66.| +peer0.org1.example.com | 00000040 62 ad 3f 03 5c 91 fb |b.?.\..|" +peer0.org1.example.com | "2019-09-24 00:27:00.141 UTC [cauthdsl] func2 -> DEBU 577a 0xc003aedd10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.141 UTC [cauthdsl] func1 -> DEBU 577b 0xc003aedd10 gate 1569284820139695500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.141 UTC [policies] Evaluate -> DEBU 577c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.141 UTC [policies] Evaluate -> DEBU 577d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.141 UTC [policies] Evaluate -> DEBU 577e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.141 UTC [policies] Evaluate -> DEBU 577f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.142 UTC [gossip.gossip] handleMessage -> DEBU 5780 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.142 UTC [gossip.gossip] handleMessage -> DEBU 5781 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.142 UTC [msp] DeserializeIdentity -> DEBU 5782 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.143 UTC [msp.identity] Verify -> DEBU 5783 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +peer0.org1.example.com | 00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +peer0.org1.example.com | "2019-09-24 00:27:00.143 UTC [msp.identity] Verify -> DEBU 5784 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +peer0.org1.example.com | 00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +peer0.org1.example.com | 00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +peer0.org1.example.com | 00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +peer0.org1.example.com | 00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +peer0.org1.example.com | "2019-09-24 00:27:00.144 UTC [msp] DeserializeIdentity -> DEBU 5785 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.144 UTC [msp] DeserializeIdentity -> DEBU 5786 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.145 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5787 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:00.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5788 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5789 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.145 UTC [policies] Evaluate -> DEBU 578a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.145 UTC [policies] Evaluate -> DEBU 578b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.145 UTC [policies] Evaluate -> DEBU 578c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.145 UTC [cauthdsl] func1 -> DEBU 578d 0xc003b43f50 gate 1569284820145620500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.145 UTC [cauthdsl] func2 -> DEBU 578e 0xc003b43f50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.146 UTC [cauthdsl] func2 -> DEBU 578f 0xc003b43f50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.146 UTC [cauthdsl] func2 -> DEBU 5790 0xc003b43f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.146 UTC [cauthdsl] func2 -> DEBU 5791 0xc003b43f50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.146 UTC [cauthdsl] func1 -> DEBU 5792 0xc003b43f50 gate 1569284820145620500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.146 UTC [policies] Evaluate -> DEBU 5793 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.146 UTC [policies] Evaluate -> DEBU 5794 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.146 UTC [policies] Evaluate -> DEBU 5795 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.147 UTC [cauthdsl] func1 -> DEBU 5796 0xc003b6e7a0 gate 1569284820147001800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.147 UTC [cauthdsl] func2 -> DEBU 5797 0xc003b6e7a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.147 UTC [cauthdsl] func2 -> DEBU 5798 0xc003b6e7a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.147 UTC [cauthdsl] func2 -> DEBU 5799 0xc003b6e7a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.147 UTC [msp.identity] Verify -> DEBU 579a Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +peer0.org1.example.com | 00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +peer0.org1.example.com | "2019-09-24 00:27:00.147 UTC [msp.identity] Verify -> DEBU 579b Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +peer0.org1.example.com | 00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +peer0.org1.example.com | 00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +peer0.org1.example.com | 00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +peer0.org1.example.com | 00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +peer0.org1.example.com | "2019-09-24 00:27:00.148 UTC [cauthdsl] func2 -> DEBU 579c 0xc003b6e7a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.148 UTC [cauthdsl] func1 -> DEBU 579d 0xc003b6e7a0 gate 1569284820147001800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.148 UTC [policies] Evaluate -> DEBU 579e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.148 UTC [policies] Evaluate -> DEBU 579f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.148 UTC [policies] Evaluate -> DEBU 57a0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.148 UTC [policies] Evaluate -> DEBU 57a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.149 UTC [msp.identity] Verify -> DEBU 57a2 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +peer0.org1.example.com | 00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +peer0.org1.example.com | "2019-09-24 00:27:00.149 UTC [msp.identity] Verify -> DEBU 57a3 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +peer0.org1.example.com | 00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +peer0.org1.example.com | 00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +peer0.org1.example.com | 00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +peer0.org1.example.com | 00000040 da 50 ba 4a e0 97 94 |.P.J...|" +peer0.org1.example.com | "2019-09-24 00:27:00.150 UTC [msp] DeserializeIdentity -> DEBU 57a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.150 UTC [msp] DeserializeIdentity -> DEBU 57a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.151 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 57a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:00.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 57a7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 57a8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.152 UTC [policies] Evaluate -> DEBU 57a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.153 UTC [policies] Evaluate -> DEBU 57aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.153 UTC [policies] Evaluate -> DEBU 57ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.155 UTC [cauthdsl] func1 -> DEBU 57ac 0xc003b726d0 gate 1569284820155018200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.155 UTC [cauthdsl] func2 -> DEBU 57ad 0xc003b726d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.155 UTC [cauthdsl] func2 -> DEBU 57ae 0xc003b726d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.156 UTC [cauthdsl] func2 -> DEBU 57af 0xc003b726d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.156 UTC [cauthdsl] func2 -> DEBU 57b0 0xc003b726d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.156 UTC [cauthdsl] func1 -> DEBU 57b1 0xc003b726d0 gate 1569284820155018200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.157 UTC [policies] Evaluate -> DEBU 57b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.157 UTC [policies] Evaluate -> DEBU 57b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.157 UTC [policies] Evaluate -> DEBU 57b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.157 UTC [cauthdsl] func1 -> DEBU 57b5 0xc003b72f10 gate 1569284820157164000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.157 UTC [cauthdsl] func2 -> DEBU 57b6 0xc003b72f10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.158 UTC [cauthdsl] func2 -> DEBU 57b7 0xc003b72f10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.158 UTC [cauthdsl] func2 -> DEBU 57b8 0xc003b72f10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.159 UTC [msp.identity] Verify -> DEBU 57b9 Verify: digest = 00000000 98 18 01 21 90 b9 27 a0 6e 99 35 bf 62 79 02 ff |...!..'.n.5.by..| +peer0.org1.example.com | 00000010 10 6e c8 51 84 1c ad 30 db 0f ba 96 ce de c4 39 |.n.Q...0.......9|" +peer0.org1.example.com | "2019-09-24 00:27:00.160 UTC [msp.identity] Verify -> DEBU 57ba Verify: sig = 00000000 30 44 02 20 60 16 7e 53 50 33 ef 00 be 62 71 de |0D. `.~SP3...bq.| +peer0.org1.example.com | 00000010 d8 8d 4b b6 fe 20 fc 62 69 8f b9 25 e5 1a 95 27 |..K.. .bi..%...'| +peer0.org1.example.com | 00000020 b8 88 a5 e2 02 20 30 ab 51 ca 0d 92 81 93 8f 0b |..... 0.Q.......| +peer0.org1.example.com | 00000030 3b 56 ae 2a d8 56 2c 43 44 ed 48 a1 55 81 f9 a2 |;V.*.V,CD.H.U...| +peer0.org1.example.com | 00000040 df 6a 98 44 02 fb |.j.D..|" +peer0.org1.example.com | "2019-09-24 00:27:00.160 UTC [cauthdsl] func2 -> DEBU 57bb 0xc003b72f10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.160 UTC [cauthdsl] func1 -> DEBU 57bc 0xc003b72f10 gate 1569284820157164000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.160 UTC [policies] Evaluate -> DEBU 57bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.160 UTC [policies] Evaluate -> DEBU 57be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.160 UTC [policies] Evaluate -> DEBU 57bf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.160 UTC [endorser] ProcessProposal -> DEBU 57c0 Entering: request from 172.18.0.9:50988" +peer0.org1.example.com | "2019-09-24 00:27:00.160 UTC [policies] Evaluate -> DEBU 57c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.161 UTC [msp] DeserializeIdentity -> DEBU 57c2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.162 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 57c3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.162 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 57c4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.162 UTC [policies] Evaluate -> DEBU 57c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.162 UTC [policies] Evaluate -> DEBU 57c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.163 UTC [policies] Evaluate -> DEBU 57c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.163 UTC [cauthdsl] func1 -> DEBU 57c8 0xc003c22000 gate 1569284820163195600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.163 UTC [cauthdsl] func2 -> DEBU 57c9 0xc003c22000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.163 UTC [cauthdsl] func2 -> DEBU 57ca 0xc003c22000 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.163 UTC [cauthdsl] func2 -> DEBU 57cb 0xc003c22000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.164 UTC [cauthdsl] func2 -> DEBU 57cc 0xc003c22000 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.164 UTC [cauthdsl] func1 -> DEBU 57cd 0xc003c22000 gate 1569284820163195600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.164 UTC [policies] Evaluate -> DEBU 57ce Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.164 UTC [policies] Evaluate -> DEBU 57cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.164 UTC [policies] Evaluate -> DEBU 57d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.165 UTC [cauthdsl] func1 -> DEBU 57d1 0xc003c22840 gate 1569284820164987900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.165 UTC [cauthdsl] func2 -> DEBU 57d2 0xc003c22840 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.165 UTC [cauthdsl] func2 -> DEBU 57d3 0xc003c22840 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.165 UTC [cauthdsl] func2 -> DEBU 57d4 0xc003c22840 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.165 UTC [msp.identity] Verify -> DEBU 57d5 Verify: digest = 00000000 98 18 01 21 90 b9 27 a0 6e 99 35 bf 62 79 02 ff |...!..'.n.5.by..| +peer0.org1.example.com | 00000010 10 6e c8 51 84 1c ad 30 db 0f ba 96 ce de c4 39 |.n.Q...0.......9|" +peer0.org1.example.com | "2019-09-24 00:27:00.165 UTC [msp.identity] Verify -> DEBU 57d6 Verify: sig = 00000000 30 44 02 20 60 16 7e 53 50 33 ef 00 be 62 71 de |0D. `.~SP3...bq.| +peer0.org1.example.com | 00000010 d8 8d 4b b6 fe 20 fc 62 69 8f b9 25 e5 1a 95 27 |..K.. .bi..%...'| +peer0.org1.example.com | 00000020 b8 88 a5 e2 02 20 30 ab 51 ca 0d 92 81 93 8f 0b |..... 0.Q.......| +peer0.org1.example.com | 00000030 3b 56 ae 2a d8 56 2c 43 44 ed 48 a1 55 81 f9 a2 |;V.*.V,CD.H.U...| +peer0.org1.example.com | 00000040 df 6a 98 44 02 fb |.j.D..|" +peer0.org1.example.com | "2019-09-24 00:27:00.166 UTC [cauthdsl] func2 -> DEBU 57d7 0xc003c22840 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.166 UTC [cauthdsl] func1 -> DEBU 57d8 0xc003c22840 gate 1569284820164987900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.166 UTC [policies] Evaluate -> DEBU 57d9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.166 UTC [policies] Evaluate -> DEBU 57da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.166 UTC [policies] Evaluate -> DEBU 57db Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.167 UTC [policies] Evaluate -> DEBU 57dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.167 UTC [gossip.gossip] handleMessage -> DEBU 57dd Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.161 UTC [protoutils] ValidateProposalMessage -> DEBU 57de ValidateProposalMessage starts for signed proposal 0xc002b99400" +peer0.org1.example.com | "2019-09-24 00:27:00.168 UTC [protoutils] validateChannelHeader -> DEBU 57df validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:00.168 UTC [protoutils] checkSignatureFromCreator -> DEBU 57e0 begin" +peer0.org1.example.com | "2019-09-24 00:27:00.168 UTC [msp] GetManagerForChain -> DEBU 57e1 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:00.168 UTC [msp] DeserializeIdentity -> DEBU 57e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.169 UTC [msp.identity] newIdentity -> DEBU 57e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:00.169 UTC [protoutils] checkSignatureFromCreator -> DEBU 57e4 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-09-24 00:27:00.169 UTC [msp] Validate -> DEBU 57e5 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:00.170 UTC [msp] getCertificationChain -> DEBU 57e6 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:00.170 UTC [protoutils] checkSignatureFromCreator -> DEBU 57e7 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:00.170 UTC [msp.identity] Verify -> DEBU 57e8 Verify: digest = 00000000 a9 16 ff a7 dd c6 cb f8 75 91 d8 04 f1 aa ce 07 |........u.......| +peer0.org1.example.com | 00000010 aa e1 95 ec 21 3d c9 1d 37 17 57 02 aa 05 31 be |....!=..7.W...1.|" +peer0.org1.example.com | "2019-09-24 00:27:00.171 UTC [msp.identity] Verify -> DEBU 57e9 Verify: sig = 00000000 30 45 02 21 00 d1 fb fc 55 14 69 d1 10 1e 3e bc |0E.!....U.i...>.| +peer0.org1.example.com | 00000010 ef 93 be 16 a5 8a 87 9c ab 20 7f 4a 69 3a 67 ca |......... .Ji:g.| +peer0.org1.example.com | 00000020 83 82 6e e1 a0 02 20 76 76 32 0c c5 99 f2 47 d4 |..n... vv2....G.| +peer0.org1.example.com | 00000030 ba a2 70 a1 1d d8 c3 28 d8 3c 55 79 32 7b a6 1a |..p....(. DEBU 57ea exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:00.171 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 57eb validateChaincodeProposalMessage starts for proposal 0xc0027c1b90, header 0xc002b99810" +peer0.org1.example.com | "2019-09-24 00:27:00.172 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 57ec validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:00.172 UTC [endorser] preProcess -> DEBU 57ed [businesschannel][c31ed041] processing txid: c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df" +peer0.org1.example.com | "2019-09-24 00:27:00.172 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 57ee retrieveTransactionByID() - txId = [c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df]" +peer0.org1.example.com | "2019-09-24 00:27:00.172 UTC [aclmgmt] CheckACL -> DEBU 57ef acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 00:27:00.173 UTC [aclmgmt] CheckACL -> DEBU 57f0 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 00:27:00.173 UTC [policies] Evaluate -> DEBU 57f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.173 UTC [policies] Evaluate -> DEBU 57f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.173 UTC [policies] Evaluate -> DEBU 57f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.174 UTC [cauthdsl] func1 -> DEBU 57f4 0xc003c42ba0 gate 1569284820174022600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.174 UTC [cauthdsl] func2 -> DEBU 57f5 0xc003c42ba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.174 UTC [cauthdsl] func2 -> DEBU 57f6 0xc003c42ba0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.174 UTC [cauthdsl] func2 -> DEBU 57f7 0xc003c42ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.174 UTC [cauthdsl] func2 -> DEBU 57f8 0xc003c42ba0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.174 UTC [cauthdsl] func1 -> DEBU 57f9 0xc003c42ba0 gate 1569284820174022600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.175 UTC [policies] Evaluate -> DEBU 57fa Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:00.175 UTC [policies] Evaluate -> DEBU 57fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:00.175 UTC [policies] Evaluate -> DEBU 57fc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.175 UTC [cauthdsl] func1 -> DEBU 57fd 0xc003c43400 gate 1569284820175754100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.176 UTC [cauthdsl] func2 -> DEBU 57fe 0xc003c43400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.176 UTC [cauthdsl] func2 -> DEBU 57ff 0xc003c43400 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.176 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5800 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:00.176 UTC [msp] Validate -> DEBU 5801 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:00.176 UTC [msp] getCertificationChain -> DEBU 5802 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:00.177 UTC [cauthdsl] func2 -> DEBU 5803 0xc003c43400 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.177 UTC [msp.identity] Verify -> DEBU 5804 Verify: digest = 00000000 a9 16 ff a7 dd c6 cb f8 75 91 d8 04 f1 aa ce 07 |........u.......| +peer0.org1.example.com | 00000010 aa e1 95 ec 21 3d c9 1d 37 17 57 02 aa 05 31 be |....!=..7.W...1.|" +peer0.org1.example.com | "2019-09-24 00:27:00.177 UTC [msp.identity] Verify -> DEBU 5805 Verify: sig = 00000000 30 45 02 21 00 d1 fb fc 55 14 69 d1 10 1e 3e bc |0E.!....U.i...>.| +peer0.org1.example.com | 00000010 ef 93 be 16 a5 8a 87 9c ab 20 7f 4a 69 3a 67 ca |......... .Ji:g.| +peer0.org1.example.com | 00000020 83 82 6e e1 a0 02 20 76 76 32 0c c5 99 f2 47 d4 |..n... vv2....G.| +peer0.org1.example.com | 00000030 ba a2 70 a1 1d d8 c3 28 d8 3c 55 79 32 7b a6 1a |..p....(. DEBU 5806 0xc003c43400 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.178 UTC [cauthdsl] func1 -> DEBU 5807 0xc003c43400 gate 1569284820175754100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.178 UTC [policies] Evaluate -> DEBU 5808 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:00.178 UTC [policies] Evaluate -> DEBU 5809 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:00.178 UTC [policies] Evaluate -> DEBU 580a Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:00.178 UTC [policies] Evaluate -> DEBU 580b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:00.178 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 580c constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:27:00.179 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 580d constructing new tx simulator txid = [c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df]" +peer0.org1.example.com | "2019-09-24 00:27:00.179 UTC [endorser] SimulateProposal -> DEBU 580e [businesschannel][c31ed041] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:00.179 UTC [stateleveldb] GetState -> DEBU 580f GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:00.179 UTC [ccprovider] GetChaincodeData -> DEBU 5810 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 00:27:00.179 UTC [endorser] callChaincode -> INFO 5811 [businesschannel][c31ed041] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:00.180 UTC [chaincode] Execute -> DEBU 5812 Entry" +peer0.org1.example.com | "2019-09-24 00:27:00.180 UTC [chaincode] handleMessage -> DEBU 5813 [c31ed041] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:00.180 UTC [chaincode] HandleTransaction -> DEBU 5814 [c31ed041] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:00.181 UTC [chaincode] HandleGetState -> DEBU 5815 [c31ed041] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:00.181 UTC [stateleveldb] GetState -> DEBU 5816 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 00:27:00.181 UTC [chaincode] HandleTransaction -> DEBU 5817 [c31ed041] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:00.182 UTC [chaincode] handleMessage -> DEBU 5818 [c31ed041] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:00.182 UTC [chaincode] Notify -> DEBU 5819 [c31ed041] notifying Txid:c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:00.182 UTC [chaincode] Execute -> DEBU 581a Exit" +peer0.org1.example.com | "2019-09-24 00:27:00.182 UTC [endorser] callChaincode -> INFO 581b [businesschannel][c31ed041] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-09-24 00:27:00.182 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 581c Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [lockbasedtxmgr] Done -> DEBU 581d Done with transaction simulation / query execution [c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df]" +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [endorser] SimulateProposal -> DEBU 581e [businesschannel][c31ed041] Exit" +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [endorser] endorseProposal -> DEBU 581f [businesschannel][c31ed041] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [endorser] endorseProposal -> DEBU 5820 [businesschannel][c31ed041] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [endorser] EndorseWithPlugin -> DEBU 5821 Entering endorsement for {plugin: escc, channel: businesschannel, tx: c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [msp.identity] Sign -> DEBU 5822 Sign: plaintext: 0A20E83ACF118B69344F54B8862B6246...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [msp.identity] Sign -> DEBU 5823 Sign: digest: 99BF12EC3BAEAD51CC36092C229AE8D2FCC2917A2E091F6049B26F185B7C69EC " +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [endorser] EndorseWithPlugin -> DEBU 5824 Exiting {plugin: escc, channel: businesschannel, tx: c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [endorser] endorseProposal -> DEBU 5825 [businesschannel][c31ed041] Exit" +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [lockbasedtxmgr] Done -> DEBU 5826 Done with transaction simulation / query execution [c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df]" +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [endorser] func1 -> DEBU 5827 Exit: request from 172.18.0.9:50988" +peer0.org1.example.com | "2019-09-24 00:27:00.183 UTC [comm.grpc.server] 1 -> INFO 5828 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50988 grpc.code=OK grpc.call_duration=23.7261ms +peer0.org1.example.com | "2019-09-24 00:27:00.187 UTC [grpc] infof -> DEBU 5829 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:00.187 UTC [grpc] infof -> DEBU 582a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:00.285 UTC [msp] DeserializeIdentity -> DEBU 582b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.285 UTC [msp] DeserializeIdentity -> DEBU 582c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.286 UTC [gossip.pull] Hello -> DEBU 582d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:00.286 UTC [msp] DeserializeIdentity -> DEBU 582e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.287 UTC [msp] DeserializeIdentity -> DEBU 582f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.287 UTC [gossip.comm] Send -> DEBU 5830 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:00.288 UTC [gossip.comm] sendToEndpoint -> DEBU 5831 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.289 UTC [gossip.comm] sendToEndpoint -> DEBU 5832 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.291 UTC [gossip.comm] func1 -> DEBU 5833 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.292 UTC [gossip.gossip] handleMessage -> DEBU 5834 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.292 UTC [gossip.pull] HandleMessage -> DEBU 5835 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.292 UTC [gossip.gossip] handleMessage -> DEBU 5836 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.580 UTC [gossip.comm] func1 -> DEBU 5837 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.580 UTC [gossip.gossip] handleMessage -> DEBU 5838 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.580 UTC [msp] DeserializeIdentity -> DEBU 5839 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.581 UTC [msp] DeserializeIdentity -> DEBU 583a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.581 UTC [gossip.gossip] handleMessage -> DEBU 583b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.589 UTC [gossip.comm] func1 -> DEBU 583c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.590 UTC [gossip.comm] func1 -> DEBU 583d Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.591 UTC [gossip.gossip] handleMessage -> DEBU 583e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.592 UTC [msp.identity] Verify -> DEBU 583f Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +peer0.org1.example.com | 00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +peer0.org1.example.com | "2019-09-24 00:27:00.592 UTC [msp.identity] Verify -> DEBU 5840 Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +peer0.org1.example.com | 00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +peer0.org1.example.com | 00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +peer0.org1.example.com | 00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +peer0.org1.example.com | 00000040 48 4c 21 8e e5 c8 |HL!...|" +peer0.org1.example.com | "2019-09-24 00:27:00.592 UTC [msp] DeserializeIdentity -> DEBU 5841 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.592 UTC [gossip.gossip] handleMessage -> DEBU 5842 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.593 UTC [gossip.gossip] handleMessage -> DEBU 5843 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.593 UTC [msp.identity] Verify -> DEBU 5844 Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +peer0.org1.example.com | 00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +peer0.org1.example.com | "2019-09-24 00:27:00.593 UTC [msp.identity] Verify -> DEBU 5845 Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +peer0.org1.example.com | 00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +peer0.org1.example.com | 00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +peer0.org1.example.com | 00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +peer0.org1.example.com | 00000040 48 4c 21 8e e5 c8 |HL!...|" +peer0.org1.example.com | "2019-09-24 00:27:00.594 UTC [gossip.gossip] handleMessage -> DEBU 5846 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.594 UTC [gossip.gossip] handleMessage -> DEBU 5847 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.594 UTC [msp.identity] Verify -> DEBU 5848 Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +peer0.org1.example.com | 00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +peer0.org1.example.com | "2019-09-24 00:27:00.594 UTC [msp.identity] Verify -> DEBU 5849 Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +peer0.org1.example.com | 00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +peer0.org1.example.com | 00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +peer0.org1.example.com | 00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +peer0.org1.example.com | 00000040 48 4c 21 8e e5 c8 |HL!...|" +peer0.org1.example.com | "2019-09-24 00:27:00.594 UTC [msp] DeserializeIdentity -> DEBU 584a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.595 UTC [gossip.gossip] handleMessage -> DEBU 584b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.675 UTC [gossip.comm] func1 -> DEBU 584c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.676 UTC [gossip.gossip] handleMessage -> DEBU 584d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.677 UTC [gossip.gossip] handleMessage -> DEBU 584e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 584f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.678 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5850 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:00.678 UTC [msp] DeserializeIdentity -> DEBU 5851 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.679 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5852 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:00.679 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5853 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.679 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5854 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.680 UTC [policies] Evaluate -> DEBU 5855 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.680 UTC [policies] Evaluate -> DEBU 5856 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.681 UTC [policies] Evaluate -> DEBU 5857 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.681 UTC [cauthdsl] func1 -> DEBU 5858 0xc003d3b440 gate 1569284820681861900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.682 UTC [cauthdsl] func2 -> DEBU 5859 0xc003d3b440 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.682 UTC [cauthdsl] func2 -> DEBU 585a 0xc003d3b440 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.682 UTC [cauthdsl] func2 -> DEBU 585b 0xc003d3b440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.683 UTC [cauthdsl] func2 -> DEBU 585c 0xc003d3b440 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.683 UTC [cauthdsl] func1 -> DEBU 585d 0xc003d3b440 gate 1569284820681861900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.685 UTC [gossip.gossip] handleMessage -> DEBU 585e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.686 UTC [gossip.comm] func1 -> DEBU 585f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.687 UTC [policies] Evaluate -> DEBU 5860 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.688 UTC [policies] Evaluate -> DEBU 5861 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.689 UTC [policies] Evaluate -> DEBU 5862 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.689 UTC [cauthdsl] func1 -> DEBU 5863 0xc003d3bc80 gate 1569284820689516000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.689 UTC [cauthdsl] func2 -> DEBU 5864 0xc003d3bc80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.690 UTC [cauthdsl] func2 -> DEBU 5865 0xc003d3bc80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.690 UTC [cauthdsl] func2 -> DEBU 5866 0xc003d3bc80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.690 UTC [msp.identity] Verify -> DEBU 5867 Verify: digest = 00000000 b6 61 2d 97 a1 68 01 48 b9 dc a4 01 52 97 3f 0b |.a-..h.H....R.?.| +peer0.org1.example.com | 00000010 7e 53 26 ff 10 53 77 0b 45 6c 22 31 ce ca 8a 87 |~S&..Sw.El"1....|" +peer0.org1.example.com | "2019-09-24 00:27:00.691 UTC [msp.identity] Verify -> DEBU 5868 Verify: sig = 00000000 30 45 02 21 00 f5 22 ab 0b b4 55 ae b8 e5 d1 27 |0E.!.."...U....'| +peer0.org1.example.com | 00000010 6d e1 c3 89 b3 cc bd 79 43 1e 43 ff f5 ed 31 b1 |m......yC.C...1.| +peer0.org1.example.com | 00000020 44 97 3c 1d a7 02 20 6e 18 70 86 f4 86 7d 78 0a |D.<... n.p...}x.| +peer0.org1.example.com | 00000030 ee 07 cb 1b f3 f1 99 28 32 12 75 c4 d9 2b b9 97 |.......(2.u..+..| +peer0.org1.example.com | 00000040 47 d2 8e 3e cd 95 72 |G..>..r|" +peer0.org1.example.com | "2019-09-24 00:27:00.691 UTC [cauthdsl] func2 -> DEBU 5869 0xc003d3bc80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.692 UTC [cauthdsl] func1 -> DEBU 586a 0xc003d3bc80 gate 1569284820689516000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.692 UTC [policies] Evaluate -> DEBU 586b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.692 UTC [policies] Evaluate -> DEBU 586c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.692 UTC [policies] Evaluate -> DEBU 586d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.693 UTC [policies] Evaluate -> DEBU 586e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 586f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 5870 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:00.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 5871 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:00.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 5872 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:00.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 5873 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:00.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 5874 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.696 UTC [gossip.discovery] handleAliveMessage -> DEBU 5875 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.696 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5876 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.696 UTC [gossip.gossip] handleMessage -> DEBU 5877 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.697 UTC [gossip.gossip] handleMessage -> DEBU 5878 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.696 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5879 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 587a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.698 UTC [gossip.gossip] handleMessage -> DEBU 587b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 587c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 587d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.702 UTC [msp] DeserializeIdentity -> DEBU 587e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.703 UTC [msp] DeserializeIdentity -> DEBU 587f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.703 UTC [msp] DeserializeIdentity -> DEBU 5880 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.704 UTC [msp] DeserializeIdentity -> DEBU 5881 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.704 UTC [msp] DeserializeIdentity -> DEBU 5882 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.705 UTC [msp] DeserializeIdentity -> DEBU 5883 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.705 UTC [msp] DeserializeIdentity -> DEBU 5884 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.706 UTC [gossip.comm] Send -> DEBU 5885 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:00.706 UTC [msp] DeserializeIdentity -> DEBU 5886 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.706 UTC [gossip.comm] Send -> DEBU 5887 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:00.707 UTC [gossip.comm] sendToEndpoint -> DEBU 5888 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.707 UTC [gossip.comm] sendToEndpoint -> DEBU 5889 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.707 UTC [gossip.comm] sendToEndpoint -> DEBU 588a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.707 UTC [gossip.comm] sendToEndpoint -> DEBU 588b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.770 UTC [gossip.comm] func1 -> DEBU 588c Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.772 UTC [gossip.gossip] handleMessage -> DEBU 588d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU 588e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.772 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 588f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:00.773 UTC [msp] DeserializeIdentity -> DEBU 5890 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.773 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5891 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:00.774 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5892 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.774 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5893 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:00.774 UTC [policies] Evaluate -> DEBU 5894 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.775 UTC [policies] Evaluate -> DEBU 5895 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:00.775 UTC [policies] Evaluate -> DEBU 5896 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.776 UTC [cauthdsl] func1 -> DEBU 5897 0xc003e40bf0 gate 1569284820776080000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.777 UTC [cauthdsl] func2 -> DEBU 5898 0xc003e40bf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.777 UTC [cauthdsl] func2 -> DEBU 5899 0xc003e40bf0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.777 UTC [cauthdsl] func2 -> DEBU 589a 0xc003e40bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:00.778 UTC [cauthdsl] func2 -> DEBU 589b 0xc003e40bf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.778 UTC [cauthdsl] func1 -> DEBU 589c 0xc003e40bf0 gate 1569284820776080000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:00.778 UTC [policies] Evaluate -> DEBU 589d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.779 UTC [policies] Evaluate -> DEBU 589e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.779 UTC [policies] Evaluate -> DEBU 589f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:00.779 UTC [cauthdsl] func1 -> DEBU 58a0 0xc003e41550 gate 1569284820779627900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:00.779 UTC [cauthdsl] func2 -> DEBU 58a1 0xc003e41550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:00.779 UTC [cauthdsl] func2 -> DEBU 58a2 0xc003e41550 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:00.779 UTC [cauthdsl] func2 -> DEBU 58a3 0xc003e41550 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.780 UTC [msp.identity] Verify -> DEBU 58a4 Verify: digest = 00000000 60 85 20 4c ad 4c d5 cc c4 1d b2 1a aa 3b 37 90 |`. L.L.......;7.| +peer0.org1.example.com | 00000010 56 9c 46 fd e3 99 f3 9c d4 a2 02 8e 1b ef 41 c3 |V.F...........A.|" +peer0.org1.example.com | "2019-09-24 00:27:00.780 UTC [msp.identity] Verify -> DEBU 58a5 Verify: sig = 00000000 30 45 02 21 00 df e6 30 ae e4 87 a0 60 98 b5 0c |0E.!...0....`...| +peer0.org1.example.com | 00000010 dc e3 89 bc 6b b5 1e 0c b6 e2 3b 33 c2 5a 80 ce |....k.....;3.Z..| +peer0.org1.example.com | 00000020 ce 26 66 75 39 02 20 4f e6 c9 16 d5 d4 e4 ba 1a |.&fu9. O........| +peer0.org1.example.com | 00000030 f5 5c cc 91 74 90 5e 46 6b 3c e5 60 09 0e 53 51 |.\..t.^Fk<.`..SQ| +peer0.org1.example.com | 00000040 95 aa ea 16 61 99 b4 |....a..|" +peer0.org1.example.com | "2019-09-24 00:27:00.780 UTC [cauthdsl] func2 -> DEBU 58a6 0xc003e41550 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:00.780 UTC [cauthdsl] func1 -> DEBU 58a7 0xc003e41550 gate 1569284820779627900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:00.781 UTC [policies] Evaluate -> DEBU 58a8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.781 UTC [policies] Evaluate -> DEBU 58a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [policies] Evaluate -> DEBU 58aa Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [policies] Evaluate -> DEBU 58ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [gossip.discovery] handleAliveMessage -> DEBU 58ac Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 58ad Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 58ae updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 58af Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 58b0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 58b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [gossip.discovery] handleAliveMessage -> DEBU 58b2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [gossip.discovery] handleMsgFromComm -> DEBU 58b3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [gossip.discovery] sendMemResponse -> DEBU 58b4 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [msp] DeserializeIdentity -> DEBU 58b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [msp] DeserializeIdentity -> DEBU 58b6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [msp] DeserializeIdentity -> DEBU 58b7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [gossip.comm] Send -> DEBU 58b8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:00.782 UTC [gossip.discovery] sendMemResponse -> DEBU 58b9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:00.783 UTC [gossip.comm] sendToEndpoint -> DEBU 58ba Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.783 UTC [gossip.comm] sendToEndpoint -> DEBU 58bb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.772 UTC [gossip.gossip] handleMessage -> DEBU 58bc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.817 UTC [gossip.comm] func1 -> DEBU 58bd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.817 UTC [gossip.gossip] handleMessage -> DEBU 58be Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.817 UTC [gossip.pull] HandleMessage -> DEBU 58bf GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.817 UTC [msp] DeserializeIdentity -> DEBU 58c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.817 UTC [msp] DeserializeIdentity -> DEBU 58c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.817 UTC [msp] DeserializeIdentity -> DEBU 58c2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.818 UTC [msp] DeserializeIdentity -> DEBU 58c3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.818 UTC [msp] DeserializeIdentity -> DEBU 58c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.818 UTC [msp] DeserializeIdentity -> DEBU 58c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:00.818 UTC [gossip.pull] SendDigest -> DEBU 58c6 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:27:00.818 UTC [gossip.gossip] handleMessage -> DEBU 58c7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:00.838 UTC [gossip.comm] func1 -> DEBU 58c8 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.838 UTC [gossip.gossip] handleMessage -> DEBU 58c9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.838 UTC [gossip.pull] HandleMessage -> DEBU 58ca GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:00.838 UTC [gossip.pull] SendDigest -> DEBU 58cb Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:00.839 UTC [gossip.gossip] handleMessage -> DEBU 58cc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:01.073 UTC [gossip.gossip] handleMessage -> DEBU 58cd Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.073 UTC [msp] DeserializeIdentity -> DEBU 58ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.073 UTC [msp] DeserializeIdentity -> DEBU 58cf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.073 UTC [msp] DeserializeIdentity -> DEBU 58d0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.074 UTC [gossip.gossip] handleMessage -> DEBU 58d1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:01.082 UTC [gossip.gossip] handleMessage -> DEBU 58d2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.083 UTC [msp] DeserializeIdentity -> DEBU 58d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 58d4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:01.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 58d5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:01.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 58d6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:01.084 UTC [policies] Evaluate -> DEBU 58d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:01.084 UTC [policies] Evaluate -> DEBU 58d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:01.085 UTC [policies] Evaluate -> DEBU 58d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:01.085 UTC [cauthdsl] func1 -> DEBU 58da 0xc003e8d130 gate 1569284821085298800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:01.085 UTC [cauthdsl] func2 -> DEBU 58db 0xc003e8d130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:01.085 UTC [cauthdsl] func2 -> DEBU 58dc 0xc003e8d130 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:01.085 UTC [cauthdsl] func2 -> DEBU 58dd 0xc003e8d130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:01.086 UTC [cauthdsl] func2 -> DEBU 58de 0xc003e8d130 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:01.086 UTC [cauthdsl] func1 -> DEBU 58df 0xc003e8d130 gate 1569284821085298800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:01.086 UTC [policies] Evaluate -> DEBU 58e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.087 UTC [policies] Evaluate -> DEBU 58e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.087 UTC [policies] Evaluate -> DEBU 58e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:01.087 UTC [cauthdsl] func1 -> DEBU 58e3 0xc003e8d970 gate 1569284821087619800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:01.087 UTC [cauthdsl] func2 -> DEBU 58e4 0xc003e8d970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:01.088 UTC [cauthdsl] func2 -> DEBU 58e5 0xc003e8d970 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:01.088 UTC [cauthdsl] func2 -> DEBU 58e6 0xc003e8d970 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:01.088 UTC [msp.identity] Verify -> DEBU 58e7 Verify: digest = 00000000 ae 5f 75 8f b8 79 6b 9c 07 89 8e 59 2a 45 63 02 |._u..yk....Y*Ec.| +peer0.org1.example.com | 00000010 9e fc 44 09 6f e3 0b 6b b2 c4 8a 32 fa ae 08 15 |..D.o..k...2....|" +peer0.org1.example.com | "2019-09-24 00:27:01.088 UTC [msp.identity] Verify -> DEBU 58e8 Verify: sig = 00000000 30 45 02 21 00 ac 0a c9 b4 53 a1 27 c0 f2 00 68 |0E.!.....S.'...h| +peer0.org1.example.com | 00000010 68 7e a0 00 2f 93 e7 0a a6 e3 81 a9 d3 f9 eb dd |h~../...........| +peer0.org1.example.com | 00000020 97 89 ec 5c e7 02 20 31 be f8 03 6d 39 fd 83 02 |...\.. 1...m9...| +peer0.org1.example.com | 00000030 cb d4 46 a1 d2 8c a1 1c c9 91 16 4b 12 36 36 c1 |..F........K.66.| +peer0.org1.example.com | 00000040 62 ad 3f 03 5c 91 fb |b.?.\..|" +peer0.org1.example.com | "2019-09-24 00:27:01.089 UTC [cauthdsl] func2 -> DEBU 58e9 0xc003e8d970 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:01.089 UTC [cauthdsl] func1 -> DEBU 58ea 0xc003e8d970 gate 1569284821087619800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:01.089 UTC [policies] Evaluate -> DEBU 58eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.090 UTC [policies] Evaluate -> DEBU 58ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.092 UTC [policies] Evaluate -> DEBU 58ee Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.092 UTC [policies] Evaluate -> DEBU 58ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.091 UTC [gossip.comm] func1 -> DEBU 58ed Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.092 UTC [msp] DeserializeIdentity -> DEBU 58f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.093 UTC [gossip.gossip] handleMessage -> DEBU 58f1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:01.093 UTC [gossip.gossip] handleMessage -> DEBU 58f2 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.093 UTC [msp] DeserializeIdentity -> DEBU 58f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.094 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 58f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:01.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 58f5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:01.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 58f6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:01.094 UTC [policies] Evaluate -> DEBU 58f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:01.094 UTC [policies] Evaluate -> DEBU 58f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:01.095 UTC [policies] Evaluate -> DEBU 58f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:01.095 UTC [cauthdsl] func1 -> DEBU 58fa 0xc003ed5340 gate 1569284821095438700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:01.095 UTC [cauthdsl] func2 -> DEBU 58fb 0xc003ed5340 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:01.095 UTC [cauthdsl] func2 -> DEBU 58fc 0xc003ed5340 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:01.096 UTC [cauthdsl] func2 -> DEBU 58fd 0xc003ed5340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:01.096 UTC [cauthdsl] func2 -> DEBU 58fe 0xc003ed5340 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:01.096 UTC [cauthdsl] func1 -> DEBU 58ff 0xc003ed5340 gate 1569284821095438700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:01.096 UTC [policies] Evaluate -> DEBU 5900 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.097 UTC [policies] Evaluate -> DEBU 5901 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.097 UTC [policies] Evaluate -> DEBU 5902 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:01.097 UTC [cauthdsl] func1 -> DEBU 5903 0xc003ed5b80 gate 1569284821097780000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:01.098 UTC [cauthdsl] func2 -> DEBU 5904 0xc003ed5b80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:01.098 UTC [cauthdsl] func2 -> DEBU 5905 0xc003ed5b80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:01.098 UTC [cauthdsl] func2 -> DEBU 5906 0xc003ed5b80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:01.098 UTC [msp.identity] Verify -> DEBU 5907 Verify: digest = 00000000 ae 5f 75 8f b8 79 6b 9c 07 89 8e 59 2a 45 63 02 |._u..yk....Y*Ec.| +peer0.org1.example.com | 00000010 9e fc 44 09 6f e3 0b 6b b2 c4 8a 32 fa ae 08 15 |..D.o..k...2....|" +peer0.org1.example.com | "2019-09-24 00:27:01.099 UTC [msp.identity] Verify -> DEBU 5908 Verify: sig = 00000000 30 45 02 21 00 ac 0a c9 b4 53 a1 27 c0 f2 00 68 |0E.!.....S.'...h| +peer0.org1.example.com | 00000010 68 7e a0 00 2f 93 e7 0a a6 e3 81 a9 d3 f9 eb dd |h~../...........| +peer0.org1.example.com | 00000020 97 89 ec 5c e7 02 20 31 be f8 03 6d 39 fd 83 02 |...\.. 1...m9...| +peer0.org1.example.com | 00000030 cb d4 46 a1 d2 8c a1 1c c9 91 16 4b 12 36 36 c1 |..F........K.66.| +peer0.org1.example.com | 00000040 62 ad 3f 03 5c 91 fb |b.?.\..|" +peer0.org1.example.com | "2019-09-24 00:27:01.099 UTC [cauthdsl] func2 -> DEBU 5909 0xc003ed5b80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:01.099 UTC [cauthdsl] func1 -> DEBU 590a 0xc003ed5b80 gate 1569284821097780000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:01.100 UTC [policies] Evaluate -> DEBU 590b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.100 UTC [policies] Evaluate -> DEBU 590c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.100 UTC [policies] Evaluate -> DEBU 590d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.100 UTC [policies] Evaluate -> DEBU 590e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:01.101 UTC [msp] DeserializeIdentity -> DEBU 590f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.101 UTC [gossip.gossip] handleMessage -> DEBU 5910 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:01.648 UTC [gossip.comm] func1 -> DEBU 5911 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.648 UTC [gossip.gossip] handleMessage -> DEBU 5912 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.648 UTC [gossip.pull] HandleMessage -> DEBU 5913 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.648 UTC [gossip.pull] SendDigest -> DEBU 5914 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:01.648 UTC [gossip.gossip] handleMessage -> DEBU 5915 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:01.779 UTC [gossip.comm] func1 -> DEBU 5916 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020M" signature:"0E\002!\000\333\314\310\027Aj\272\317\372\254\234\026\354UY\246\232\315/\224\004\354J\002Ov\264\340Ex\213$\002 jq44\236\217}\"\337\204?\026\356\3523rd\234\223,\377\300p\n)\255\227\373\204\246 ?" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.779 UTC [gossip.gossip] handleMessage -> DEBU 5917 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020M" signature:"0E\002!\000\333\314\310\027Aj\272\317\372\254\234\026\354UY\246\232\315/\224\004\354J\002Ov\264\340Ex\213$\002 jq44\236\217}\"\337\204?\026\356\3523rd\234\223,\377\300p\n)\255\227\373\204\246 ?" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.780 UTC [gossip.gossip] handleMessage -> DEBU 5918 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:01.780 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5919 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020M" signature:"0E\002!\000\333\314\310\027Aj\272\317\372\254\234\026\354UY\246\232\315/\224\004\354J\002Ov\264\340Ex\213$\002 jq44\236\217}\"\337\204?\026\356\3523rd\234\223,\377\300p\n)\255\227\373\204\246 ?" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.780 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 591a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:01.780 UTC [msp.identity] Verify -> DEBU 591b Verify: digest = 00000000 52 5e e8 ef 5a 00 8e 80 16 a3 56 11 66 44 d6 ae |R^..Z.....V.fD..| +peer0.org1.example.com | 00000010 cb 5b c3 a6 29 9a c5 0e 88 d4 a1 db 09 30 50 bd |.[..)........0P.|" +peer0.org1.example.com | "2019-09-24 00:27:01.780 UTC [msp.identity] Verify -> DEBU 591c Verify: sig = 00000000 30 45 02 21 00 db cc c8 17 41 6a ba cf fa ac 9c |0E.!.....Aj.....| +peer0.org1.example.com | 00000010 16 ec 55 59 a6 9a cd 2f 94 04 ec 4a 02 4f 76 b4 |..UY.../...J.Ov.| +peer0.org1.example.com | 00000020 e0 45 78 8b 24 02 20 6a 71 34 34 9e 8f 7d 22 df |.Ex.$. jq44..}".| +peer0.org1.example.com | 00000030 84 3f 16 ee ea 33 72 64 9c 93 2c ff c0 70 0a 29 |.?...3rd..,..p.)| +peer0.org1.example.com | 00000040 ad 97 fb 84 a6 20 3f |..... ?|" +peer0.org1.example.com | "2019-09-24 00:27:01.780 UTC [msp.identity] Verify -> DEBU 591d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:27:01.780 UTC [msp.identity] Verify -> DEBU 591e Verify: sig = 00000000 30 44 02 20 06 1a 8e bf b0 9d c5 16 e9 dd 8f 69 |0D. ...........i| +peer0.org1.example.com | 00000010 92 48 c3 a2 18 dc 9e 82 a5 84 ef 8f 91 b7 3a e9 |.H............:.| +peer0.org1.example.com | 00000020 fd 31 6e 49 02 20 04 af 74 5a 06 d2 92 ef f6 b3 |.1nI. ..tZ......| +peer0.org1.example.com | 00000030 dc 31 33 e3 bf 48 b7 32 6c 2e 4f 7c d1 1d 59 d9 |.13..H.2l.O|..Y.| +peer0.org1.example.com | 00000040 d9 2e 14 de 4a e5 |....J.|" +peer0.org1.example.com | "2019-09-24 00:27:01.781 UTC [gossip.discovery] handleAliveMessage -> DEBU 591f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5920 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:01.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5921 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:01.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5922 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:01.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5923 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:01.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5924 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:01.781 UTC [gossip.discovery] handleAliveMessage -> DEBU 5925 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:01.781 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5926 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:01.781 UTC [gossip.discovery] sendMemResponse -> DEBU 5927 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:27:01.781 UTC [msp] DeserializeIdentity -> DEBU 5928 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.782 UTC [msp] DeserializeIdentity -> DEBU 5929 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.782 UTC [gossip.comm] Send -> DEBU 592a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:01.782 UTC [gossip.discovery] sendMemResponse -> DEBU 592b Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020M" signature:"0E\002!\000\333\314\310\027Aj\272\317\372\254\234\026\354UY\246\232\315/\224\004\354J\002Ov\264\340Ex\213$\002 jq44\236\217}\"\337\204?\026\356\3523rd\234\223,\377\300p\n)\255\227\373\204\246 ?" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:27:01.782 UTC [gossip.comm] sendToEndpoint -> DEBU 592c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.782 UTC [gossip.comm] sendToEndpoint -> DEBU 592d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 592e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 592f Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 5930 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 5931 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 5932 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [cauthdsl] func1 -> DEBU 5933 0xc003ffb280 gate 1569284821969444700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [cauthdsl] func2 -> DEBU 5934 0xc003ffb280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [cauthdsl] func2 -> DEBU 5935 0xc003ffb280 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [cauthdsl] func2 -> DEBU 5936 0xc003ffb280 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [msp.identity] Verify -> DEBU 5937 Verify: digest = 00000000 78 f1 d4 d1 6c 57 c7 cc fa 1a 26 a0 7e 6a 0d 78 |x...lW....&.~j.x| +peer0.org1.example.com | 00000010 a6 61 4a 6c ab d5 46 7c 82 11 65 0f 5f 6c 29 f4 |.aJl..F|..e._l).|" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [msp.identity] Verify -> DEBU 5938 Verify: sig = 00000000 30 45 02 21 00 e8 ab a5 25 ce 41 b2 3a 59 69 db |0E.!....%.A.:Yi.| +peer0.org1.example.com | 00000010 aa 88 ff 07 29 d5 72 8a b7 2a 3f b6 5c 53 71 78 |....).r..*?.\Sqx| +peer0.org1.example.com | 00000020 8a db ec 5b ed 02 20 3a 27 cc 87 f6 f4 51 d2 9f |...[.. :'....Q..| +peer0.org1.example.com | 00000030 00 fa 8a 4d 74 86 73 78 16 cc 93 e0 57 ed 07 fa |...Mt.sx....W...| +peer0.org1.example.com | 00000040 d3 94 5e 90 41 ac 19 |..^.A..|" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [cauthdsl] func2 -> DEBU 5939 0xc003ffb280 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [cauthdsl] func1 -> DEBU 593a 0xc003ffb280 gate 1569284821969444700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 593b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 593c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 593d Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 593e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [blocksProvider] DeliverBlocks -> DEBU 593f [businesschannel] Adding payload to local buffer, blockNum = [4]" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [gossip.state] addPayload -> DEBU 5940 [businesschannel] Adding payload to local buffer, blockNum = [4]" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [gossip.state] addPayload -> DEBU 5941 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [blocksProvider] DeliverBlocks -> DEBU 5942 [businesschannel] Gossiping block [4], peers number [3]" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [gossip.channel] AddToMsgStore -> DEBU 5943 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [gossip.pull] Add -> DEBU 5944 Added 4, total items: 4" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [gossip.state] deliverPayloads -> DEBU 5945 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [gossip.state] deliverPayloads -> DEBU 5946 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [gossip.privdata] StoreBlock -> INFO 5947 [businesschannel] Received block [4] from buffer" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [gossip.privdata] StoreBlock -> DEBU 5948 [businesschannel] Validating block [4]" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [committer.txvalidator] Validate -> DEBU 5949 [businesschannel] START Block Validation for block [4]" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [committer.txvalidator] Validate -> DEBU 594a expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [committer.txvalidator] validateTx -> DEBU 594b [businesschannel] validateTx starts for block 0xc0035267c0 env 0xc0032bfcc0 txn 0" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [protoutils] ValidateTransaction -> DEBU 594c ValidateTransactionEnvelope starts for envelope 0xc0032bfcc0" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [protoutils] ValidateTransaction -> DEBU 594d Header is channel_header:"\010\003\032\014\010\323\305\245\354\005\020\340\261\206\267\003\"\017businesschannel*@b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030_[\036)h\276\317\357\023\246\301\021r\331\327\234\203V\020-\3440\300\324" " +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [protoutils] validateChannelHeader -> DEBU 594e validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [protoutils] checkSignatureFromCreator -> DEBU 594f begin" +peer0.org1.example.com | "2019-09-24 00:27:01.970 UTC [msp] GetManagerForChain -> DEBU 5950 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [protoutils] checkSignatureFromCreator -> DEBU 5951 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [protoutils] checkSignatureFromCreator -> DEBU 5952 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [msp.identity] Verify -> DEBU 5953 Verify: digest = 00000000 e0 75 77 75 d9 9f 3d 58 7f 7b 89 c8 6c 7c 3d 87 |.uwu..=X.{..l|=.| +peer0.org1.example.com | 00000010 ee 69 47 6d 9c a9 fa 5f bc e7 15 da c1 e9 1a c6 |.iGm..._........|" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [msp.identity] Verify -> DEBU 5954 Verify: sig = 00000000 30 45 02 21 00 98 10 68 fe 99 12 3f 4d 85 bc f1 |0E.!...h...?M...| +peer0.org1.example.com | 00000010 1b 9f e9 28 a4 4f 34 bb 37 96 5f d9 5a 8f 4e 20 |...(.O4.7._.Z.N | +peer0.org1.example.com | 00000020 22 14 25 a1 e5 02 20 74 c4 77 b3 85 f3 88 2a 22 |".%... t.w....*"| +peer0.org1.example.com | 00000030 5a ce 19 dd a5 f9 ac a0 25 e5 a3 14 ab 4c 22 45 |Z.......%....L"E| +peer0.org1.example.com | 00000040 49 0f e8 05 47 5a 62 |I...GZb|" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [protoutils] checkSignatureFromCreator -> DEBU 5955 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [protoutils] validateEndorserTransaction -> DEBU 5956 validateEndorserTransaction starts for data 0xc00395b800, header channel_header:"\010\003\032\014\010\323\305\245\354\005\020\340\261\206\267\003\"\017businesschannel*@b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030_[\036)h\276\317\357\023\246\301\021r\331\327\234\203V\020-\3440\300\324" " +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [protoutils] validateEndorserTransaction -> DEBU 5957 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [protoutils] validateEndorserTransaction -> DEBU 5958 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [protoutils] ValidateTransaction -> DEBU 5959 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [committer.txvalidator] validateTx -> DEBU 595a Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 595b retrieveTransactionByID() - txId = [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38]" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [committer.txvalidator] validateTx -> DEBU 595c Validating transaction vscc tx validate" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 595d [businesschannel] VSCCValidateTx starts for bytes 0xc0001f8800" +peer0.org1.example.com | "2019-09-24 00:27:01.971 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 595e constructing new query executor txid = [040cd155-c264-497a-881b-7d4d5cc32402]" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [stateleveldb] GetState -> DEBU 595f GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [lockbasedtxmgr] Done -> DEBU 5960 Done with transaction simulation / query execution [040cd155-c264-497a-881b-7d4d5cc32402]" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 5961 Validating Tx b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5962 constructing new query executor txid = [6d7bdd87-9432-47cd-8e77-92973ea35111]" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [lockbasedtxmgr] Done -> DEBU 5963 Done with transaction simulation / query execution [6d7bdd87-9432-47cd-8e77-92973ea35111]" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [cauthdsl] func1 -> DEBU 5964 0xc0040e4390 gate 1569284821972339200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 5965 0xc0040e4390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 5966 0xc0040e4390 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 5967 0xc0040e4390 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [msp.identity] Verify -> DEBU 5968 Verify: digest = 00000000 af 26 f2 e7 2d 96 e2 79 1d d1 1a ad f4 4d 95 52 |.&..-..y.....M.R| +peer0.org1.example.com | 00000010 fb dd 8a f4 46 fa 43 8e 23 78 8e a3 3a 7e 97 7d |....F.C.#x..:~.}|" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [msp.identity] Verify -> DEBU 5969 Verify: sig = 00000000 30 44 02 20 6d f1 0a c0 f0 c7 82 7a 3e 77 a8 b5 |0D. m......z>w..| +peer0.org1.example.com | 00000010 41 37 10 63 eb 4f 01 d6 52 4c 68 34 3e 50 12 fa |A7.c.O..RLh4>P..| +peer0.org1.example.com | 00000020 86 61 75 51 02 20 53 04 98 cc 6d 30 ac c0 89 bc |.auQ. S...m0....| +peer0.org1.example.com | 00000030 77 62 9e d5 af 55 a9 0b 03 09 b4 db 1b dd 48 f6 |wb...U........H.| +peer0.org1.example.com | 00000040 7f 27 6b 7a c6 2e |.'kz..|" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 596a 0xc0040e4390 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 596b 0xc0040e4390 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 596c 0xc0040e4390 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 596d 0xc0040e4390 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [cauthdsl] func1 -> DEBU 596e 0xc0040e4390 gate 1569284821972339200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 596f constructing new query executor txid = [a7d33318-3cbd-4be8-ab26-c19c40b3707e]" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [lockbasedtxmgr] Done -> DEBU 5970 Done with transaction simulation / query execution [a7d33318-3cbd-4be8-ab26-c19c40b3707e]" +peer0.org1.example.com | "2019-09-24 00:27:01.972 UTC [vscc] Validate -> DEBU 5971 block 4, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 5972 Transaction b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38 appears to be valid" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 5973 [businesschannel] VSCCValidateTx completes env bytes 0xc0001f8800" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [committer.txvalidator] validateTx -> DEBU 5974 [businesschannel] validateTx completes for block 0xc0035267c0 env 0xc0032bfcc0 txn 0" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [committer.txvalidator] Validate -> DEBU 5975 got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [committer.txvalidator] Validate -> INFO 5976 [businesschannel] Validated block [4] in 2ms" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [gossip.privdata] listMissingPrivateData -> DEBU 5977 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [gossip.privdata] StoreBlock -> DEBU 5978 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [kvledger] CommitWithPvtData -> DEBU 5979 [businesschannel] Validating state for block [4]" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 597a Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 597b lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 597c Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 597d ValidateAndPrepareBatch() for block number = [4]" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 597e preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [valimpl] preprocessProtoBlock -> DEBU 597f txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [stateleveldb] GetState -> DEBU 5980 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [statebasedval] validateKVRead -> DEBU 5981 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [stateleveldb] GetState -> DEBU 5982 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [statebasedval] validateKVRead -> DEBU 5983 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 00:27:01.973 UTC [stateleveldb] GetState -> DEBU 5984 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:01.974 UTC [statebasedval] validateKVRead -> DEBU 5985 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 00:27:01.974 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 5986 Block [4] Transaction index [0] TxId [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 00:27:01.974 UTC [valinternal] ApplyWriteSet -> DEBU 5987 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0035278c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003527900)}" +peer0.org1.example.com | "2019-09-24 00:27:01.974 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5988 validating rwset..." +peer0.org1.example.com | "2019-09-24 00:27:01.974 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5989 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:27:01.974 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 598a ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 00:27:01.974 UTC [kvledger] CommitWithPvtData -> DEBU 598b [businesschannel] Adding CommitHash to the block [4]" +peer0.org1.example.com | "2019-09-24 00:27:01.974 UTC [kvledger] CommitWithPvtData -> DEBU 598c [businesschannel] Committing block [4] to storage" +peer0.org1.example.com | "2019-09-24 00:27:01.974 UTC [ledgerstorage] CommitWithPvtData -> DEBU 598d Writing block [4] to pvt block store" +peer0.org1.example.com | "2019-09-24 00:27:01.980 UTC [msp] DeserializeIdentity -> DEBU 598e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.980 UTC [msp] DeserializeIdentity -> DEBU 598f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.980 UTC [msp] DeserializeIdentity -> DEBU 5990 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.980 UTC [msp] DeserializeIdentity -> DEBU 5991 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.981 UTC [gossip.comm] Send -> DEBU 5992 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:01.981 UTC [msp] DeserializeIdentity -> DEBU 5993 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.982 UTC [msp] DeserializeIdentity -> DEBU 5994 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:01.987 UTC [gossip.comm] sendToEndpoint -> DEBU 5995 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:01.987 UTC [gossip.comm] sendToEndpoint -> DEBU 5996 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:01.998 UTC [pvtdatastorage] Prepare -> DEBU 5997 Saved 0 private data write sets for block [4]" +peer0.org1.example.com | "2019-09-24 00:27:02.003 UTC [fsblkstorage] indexBlock -> DEBU 5998 Indexing block [blockNum=4, blockHash=[]byte{0x30, 0xba, 0xc, 0xce, 0x16, 0x44, 0x9b, 0xd3, 0x8e, 0x60, 0x58, 0x49, 0x7d, 0x70, 0x47, 0x86, 0x3f, 0xe5, 0x5c, 0x6c, 0xee, 0xce, 0x96, 0x74, 0xe4, 0x15, 0x6b, 0xdc, 0x92, 0x57, 0x14, 0x77} txOffsets= +peer0.org1.example.com | txId=b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38 locPointer=offset=70, bytesLength=2985 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 00:27:02.003 UTC [fsblkstorage] indexBlock -> DEBU 5999 Adding txLoc [fileSuffixNum=0, offset=76099, bytesLength=2985] for tx ID: [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38] to txid-index" +peer0.org1.example.com | "2019-09-24 00:27:02.003 UTC [fsblkstorage] indexBlock -> DEBU 599a Adding txLoc [fileSuffixNum=0, offset=76099, bytesLength=2985] for tx number:[0] ID: [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 00:27:02.005 UTC [fsblkstorage] updateCheckpoint -> DEBU 599b Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80057], isChainEmpty=[false], lastBlockNumber=[4]" +peer0.org1.example.com | "2019-09-24 00:27:02.005 UTC [pvtdatastorage] Commit -> DEBU 599c Committing private data for block [4]" +peer0.org1.example.com | "2019-09-24 00:27:02.010 UTC [gossip.comm] func1 -> DEBU 599d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.010 UTC [gossip.gossip] handleMessage -> DEBU 599e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.010 UTC [msp] DeserializeIdentity -> DEBU 599f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.014 UTC [msp] DeserializeIdentity -> DEBU 59a0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.014 UTC [msp] DeserializeIdentity -> DEBU 59a1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.014 UTC [gossip.gossip] handleMessage -> DEBU 59a2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.015 UTC [gossip.comm] func1 -> DEBU 59a3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.015 UTC [gossip.gossip] handleMessage -> DEBU 59a4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.016 UTC [msp] DeserializeIdentity -> DEBU 59a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.016 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 59a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:02.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 59a7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:02.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 59a8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:02.016 UTC [policies] Evaluate -> DEBU 59a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:02.016 UTC [policies] Evaluate -> DEBU 59aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:02.016 UTC [policies] Evaluate -> DEBU 59ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:02.017 UTC [cauthdsl] func1 -> DEBU 59ac 0xc0047623c0 gate 1569284822017006200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:02.017 UTC [cauthdsl] func2 -> DEBU 59ad 0xc0047623c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:02.017 UTC [cauthdsl] func2 -> DEBU 59ae 0xc0047623c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:02.017 UTC [cauthdsl] func2 -> DEBU 59af 0xc0047623c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:02.017 UTC [cauthdsl] func2 -> DEBU 59b0 0xc0047623c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:02.017 UTC [cauthdsl] func1 -> DEBU 59b1 0xc0047623c0 gate 1569284822017006200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:02.017 UTC [policies] Evaluate -> DEBU 59b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:02.018 UTC [policies] Evaluate -> DEBU 59b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:02.018 UTC [policies] Evaluate -> DEBU 59b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:02.018 UTC [cauthdsl] func1 -> DEBU 59b5 0xc004762c10 gate 1569284822018315900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:02.018 UTC [cauthdsl] func2 -> DEBU 59b6 0xc004762c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:02.018 UTC [cauthdsl] func2 -> DEBU 59b7 0xc004762c10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:02.018 UTC [cauthdsl] func2 -> DEBU 59b8 0xc004762c10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:02.019 UTC [msp.identity] Verify -> DEBU 59b9 Verify: digest = 00000000 98 18 01 21 90 b9 27 a0 6e 99 35 bf 62 79 02 ff |...!..'.n.5.by..| +peer0.org1.example.com | 00000010 10 6e c8 51 84 1c ad 30 db 0f ba 96 ce de c4 39 |.n.Q...0.......9|" +peer0.org1.example.com | "2019-09-24 00:27:02.019 UTC [msp.identity] Verify -> DEBU 59ba Verify: sig = 00000000 30 44 02 20 60 16 7e 53 50 33 ef 00 be 62 71 de |0D. `.~SP3...bq.| +peer0.org1.example.com | 00000010 d8 8d 4b b6 fe 20 fc 62 69 8f b9 25 e5 1a 95 27 |..K.. .bi..%...'| +peer0.org1.example.com | 00000020 b8 88 a5 e2 02 20 30 ab 51 ca 0d 92 81 93 8f 0b |..... 0.Q.......| +peer0.org1.example.com | 00000030 3b 56 ae 2a d8 56 2c 43 44 ed 48 a1 55 81 f9 a2 |;V.*.V,CD.H.U...| +peer0.org1.example.com | 00000040 df 6a 98 44 02 fb |.j.D..|" +peer0.org1.example.com | "2019-09-24 00:27:02.019 UTC [cauthdsl] func2 -> DEBU 59bb 0xc004762c10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:02.019 UTC [cauthdsl] func1 -> DEBU 59bc 0xc004762c10 gate 1569284822018315900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:02.019 UTC [policies] Evaluate -> DEBU 59bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:02.019 UTC [policies] Evaluate -> DEBU 59be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:02.019 UTC [policies] Evaluate -> DEBU 59bf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:02.020 UTC [policies] Evaluate -> DEBU 59c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:02.020 UTC [msp] DeserializeIdentity -> DEBU 59c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.020 UTC [gossip.gossip] handleMessage -> DEBU 59c2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.020 UTC [pvtdatastorage] Commit -> DEBU 59c3 Committed private data for block [4]" +peer0.org1.example.com | "2019-09-24 00:27:02.021 UTC [kvledger] CommitWithPvtData -> DEBU 59c4 [businesschannel] Committing block [4] transactions to state database" +peer0.org1.example.com | "2019-09-24 00:27:02.021 UTC [lockbasedtxmgr] Commit -> DEBU 59c5 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 00:27:02.021 UTC [lockbasedtxmgr] Commit -> DEBU 59c6 Committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:27:02.022 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 59c7 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 00:27:02.022 UTC [lockbasedtxmgr] Commit -> DEBU 59c8 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:27:02.022 UTC [stateleveldb] ApplyUpdates -> DEBU 59c9 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-09-24 00:27:02.022 UTC [stateleveldb] ApplyUpdates -> DEBU 59ca Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-09-24 00:27:02.024 UTC [lockbasedtxmgr] Commit -> DEBU 59cb Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 00:27:02.024 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 59cc Preparing potential purge list working-set for expiringAtBlk [5]" +peer0.org1.example.com | "2019-09-24 00:27:02.025 UTC [lockbasedtxmgr] func1 -> DEBU 59cd launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 00:27:02.025 UTC [kvledger] CommitWithPvtData -> DEBU 59ce [businesschannel] Committing block [4] transactions to history database" +peer0.org1.example.com | "2019-09-24 00:27:02.025 UTC [historyleveldb] Commit -> DEBU 59cf Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" +peer0.org1.example.com | "2019-09-24 00:27:02.024 UTC [leveldbhelper] GetIterator -> DEBU 59d0 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" +peer0.org1.example.com | "2019-09-24 00:27:02.026 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 59d1 No expiry entry found for expiringAtBlk [5]" +peer0.org1.example.com | "2019-09-24 00:27:02.027 UTC [historyleveldb] Commit -> DEBU 59d2 Channel [businesschannel]: Updates committed to history database for blockNo [4]" +peer0.org1.example.com | "2019-09-24 00:27:02.027 UTC [kvledger] CommitWithPvtData -> INFO 59d3 [businesschannel] Committed block [4] with 1 transaction(s) in 53ms (state_validation=0ms block_and_pvtdata_commit=46ms state_commit=4ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer0.org1.example.com | "2019-09-24 00:27:02.027 UTC [msp] GetDefaultSigningIdentity -> DEBU 59d4 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:02.027 UTC [msp.identity] Sign -> DEBU 59d5 Sign: plaintext: 18057A6C1214089096D4ACDE83CEE315...08051A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-09-24 00:27:02.027 UTC [msp.identity] Sign -> DEBU 59d6 Sign: digest: 5A486AEAE16973FD556EC74B6B7EF27846448DA7DA23ABC56AE4B2770C18F5CD " +peer0.org1.example.com | "2019-09-24 00:27:02.028 UTC [gossip.state] commitBlock -> DEBU 59d7 [businesschannel] Committed block [4] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 00:27:02.318 UTC [gossip.election] waitForInterrupt -> DEBU 59d8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.318 UTC [gossip.election] IsLeader -> DEBU 59d9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:27:02.318 UTC [msp] GetDefaultSigningIdentity -> DEBU 59da Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:02.318 UTC [msp.identity] Sign -> DEBU 59db Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101A1801 " +peer0.org1.example.com | "2019-09-24 00:27:02.318 UTC [msp.identity] Sign -> DEBU 59dc Sign: digest: 08B0FE26CBD258C6A6DC0E46B7D663E7D463CC6052EFB2B6C68679AB0DFFA2BF " +peer0.org1.example.com | "2019-09-24 00:27:02.319 UTC [gossip.election] waitForInterrupt -> DEBU 59dd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:27:02.326 UTC [msp] DeserializeIdentity -> DEBU 59de Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.326 UTC [msp] DeserializeIdentity -> DEBU 59df Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.326 UTC [msp] DeserializeIdentity -> DEBU 59e0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.327 UTC [msp] DeserializeIdentity -> DEBU 59e1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.327 UTC [gossip.comm] Send -> DEBU 59e2 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:02.327 UTC [msp] DeserializeIdentity -> DEBU 59e3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.327 UTC [msp] DeserializeIdentity -> DEBU 59e4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.328 UTC [gossip.comm] sendToEndpoint -> DEBU 59e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.328 UTC [gossip.comm] sendToEndpoint -> DEBU 59e6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.331 UTC [endorser] ProcessProposal -> DEBU 59e7 Entering: request from 172.18.0.9:50992" +peer0.org1.example.com | "2019-09-24 00:27:02.331 UTC [protoutils] ValidateProposalMessage -> DEBU 59e8 ValidateProposalMessage starts for signed proposal 0xc003442190" +peer0.org1.example.com | "2019-09-24 00:27:02.331 UTC [protoutils] validateChannelHeader -> DEBU 59e9 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:02.331 UTC [protoutils] checkSignatureFromCreator -> DEBU 59ea begin" +peer0.org1.example.com | "2019-09-24 00:27:02.332 UTC [msp] GetManagerForChain -> DEBU 59eb Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:02.332 UTC [protoutils] checkSignatureFromCreator -> DEBU 59ec creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-09-24 00:27:02.332 UTC [protoutils] checkSignatureFromCreator -> DEBU 59ed creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:02.332 UTC [msp.identity] Verify -> DEBU 59ee Verify: digest = 00000000 80 27 06 dd 6c 4c 5f 9f 30 ae 10 90 75 ee 3c 14 |.'..lL_.0...u.<.| +peer0.org1.example.com | 00000010 47 1a 3b d5 39 e0 cb cd 7a bd 0f 21 9a 2f a2 2b |G.;.9...z..!./.+|" +peer0.org1.example.com | "2019-09-24 00:27:02.332 UTC [msp.identity] Verify -> DEBU 59ef Verify: sig = 00000000 30 44 02 20 24 bc 62 63 89 6a f2 25 7d 5b 58 05 |0D. $.bc.j.%}[X.| +peer0.org1.example.com | 00000010 0e ba 2d 84 39 91 e3 33 99 e8 00 2e 7b ba 32 5e |..-.9..3....{.2^| +peer0.org1.example.com | 00000020 14 58 56 e4 02 20 37 29 c9 1b 87 17 02 6e ad 8e |.XV.. 7).....n..| +peer0.org1.example.com | 00000030 99 12 03 d2 39 c2 5e 01 5f ef 14 eb 99 65 88 99 |....9.^._....e..| +peer0.org1.example.com | 00000040 d7 3a 8b 5e 2c a6 |.:.^,.|" +peer0.org1.example.com | "2019-09-24 00:27:02.333 UTC [protoutils] checkSignatureFromCreator -> DEBU 59f0 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:02.333 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 59f1 validateChaincodeProposalMessage starts for proposal 0xc002ad73b0, header 0xc0034425a0" +peer0.org1.example.com | "2019-09-24 00:27:02.333 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 59f2 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.333 UTC [endorser] preProcess -> DEBU 59f3 [businesschannel][ce74632e] processing txid: ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898" +peer0.org1.example.com | "2019-09-24 00:27:02.333 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 59f4 retrieveTransactionByID() - txId = [ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898]" +peer0.org1.example.com | "2019-09-24 00:27:02.333 UTC [aclmgmt] CheckACL -> DEBU 59f5 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 00:27:02.333 UTC [aclmgmt] CheckACL -> DEBU 59f6 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 00:27:02.334 UTC [policies] Evaluate -> DEBU 59f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:02.334 UTC [policies] Evaluate -> DEBU 59f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:02.334 UTC [policies] Evaluate -> DEBU 59f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:02.334 UTC [cauthdsl] func1 -> DEBU 59fa 0xc0047b58f0 gate 1569284822334334500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:02.334 UTC [cauthdsl] func2 -> DEBU 59fb 0xc0047b58f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:02.334 UTC [cauthdsl] func2 -> DEBU 59fc 0xc0047b58f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:02.334 UTC [cauthdsl] func2 -> DEBU 59fd 0xc0047b58f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:02.334 UTC [cauthdsl] func2 -> DEBU 59fe 0xc0047b58f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:02.334 UTC [cauthdsl] func1 -> DEBU 59ff 0xc0047b58f0 gate 1569284822334334500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:02.334 UTC [policies] Evaluate -> DEBU 5a00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.335 UTC [policies] Evaluate -> DEBU 5a01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.335 UTC [policies] Evaluate -> DEBU 5a02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:02.335 UTC [cauthdsl] func1 -> DEBU 5a03 0xc004776130 gate 1569284822335797300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:02.335 UTC [cauthdsl] func2 -> DEBU 5a04 0xc004776130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:02.335 UTC [cauthdsl] func2 -> DEBU 5a05 0xc004776130 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:02.335 UTC [cauthdsl] func2 -> DEBU 5a06 0xc004776130 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:02.336 UTC [msp.identity] Verify -> DEBU 5a07 Verify: digest = 00000000 80 27 06 dd 6c 4c 5f 9f 30 ae 10 90 75 ee 3c 14 |.'..lL_.0...u.<.| +peer0.org1.example.com | 00000010 47 1a 3b d5 39 e0 cb cd 7a bd 0f 21 9a 2f a2 2b |G.;.9...z..!./.+|" +peer0.org1.example.com | "2019-09-24 00:27:02.336 UTC [msp.identity] Verify -> DEBU 5a08 Verify: sig = 00000000 30 44 02 20 24 bc 62 63 89 6a f2 25 7d 5b 58 05 |0D. $.bc.j.%}[X.| +peer0.org1.example.com | 00000010 0e ba 2d 84 39 91 e3 33 99 e8 00 2e 7b ba 32 5e |..-.9..3....{.2^| +peer0.org1.example.com | 00000020 14 58 56 e4 02 20 37 29 c9 1b 87 17 02 6e ad 8e |.XV.. 7).....n..| +peer0.org1.example.com | 00000030 99 12 03 d2 39 c2 5e 01 5f ef 14 eb 99 65 88 99 |....9.^._....e..| +peer0.org1.example.com | 00000040 d7 3a 8b 5e 2c a6 |.:.^,.|" +peer0.org1.example.com | "2019-09-24 00:27:02.336 UTC [cauthdsl] func2 -> DEBU 5a09 0xc004776130 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:02.336 UTC [cauthdsl] func1 -> DEBU 5a0a 0xc004776130 gate 1569284822335797300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:02.336 UTC [policies] Evaluate -> DEBU 5a0b Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.336 UTC [policies] Evaluate -> DEBU 5a0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.336 UTC [policies] Evaluate -> DEBU 5a0d Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.336 UTC [policies] Evaluate -> DEBU 5a0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.336 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5a0f constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:27:02.337 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5a10 constructing new tx simulator txid = [ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898]" +peer0.org1.example.com | "2019-09-24 00:27:02.337 UTC [endorser] SimulateProposal -> DEBU 5a11 [businesschannel][ce74632e] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.337 UTC [stateleveldb] GetState -> DEBU 5a12 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:02.337 UTC [ccprovider] GetChaincodeData -> DEBU 5a13 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 00:27:02.337 UTC [endorser] callChaincode -> INFO 5a14 [businesschannel][ce74632e] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.338 UTC [chaincode] Execute -> DEBU 5a15 Entry" +peer0.org1.example.com | "2019-09-24 00:27:02.339 UTC [chaincode] handleMessage -> DEBU 5a16 [ce74632e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:02.339 UTC [chaincode] HandleTransaction -> DEBU 5a17 [ce74632e] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:02.339 UTC [chaincode] HandleGetState -> DEBU 5a18 [ce74632e] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:02.339 UTC [stateleveldb] GetState -> DEBU 5a19 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 00:27:02.340 UTC [chaincode] HandleTransaction -> DEBU 5a1a [ce74632e] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:02.340 UTC [chaincode] handleMessage -> DEBU 5a1b [ce74632e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:02.340 UTC [chaincode] Notify -> DEBU 5a1c [ce74632e] notifying Txid:ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:02.340 UTC [chaincode] Execute -> DEBU 5a1d Exit" +peer0.org1.example.com | "2019-09-24 00:27:02.341 UTC [endorser] callChaincode -> INFO 5a1e [businesschannel][ce74632e] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-09-24 00:27:02.341 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5a1f Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:27:02.341 UTC [lockbasedtxmgr] Done -> DEBU 5a20 Done with transaction simulation / query execution [ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898]" +peer0.org1.example.com | "2019-09-24 00:27:02.341 UTC [endorser] SimulateProposal -> DEBU 5a21 [businesschannel][ce74632e] Exit" +peer0.org1.example.com | "2019-09-24 00:27:02.341 UTC [endorser] endorseProposal -> DEBU 5a22 [businesschannel][ce74632e] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.341 UTC [endorser] endorseProposal -> DEBU 5a23 [businesschannel][ce74632e] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 00:27:02.342 UTC [endorser] EndorseWithPlugin -> DEBU 5a24 Entering endorsement for {plugin: escc, channel: businesschannel, tx: ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:27:02.342 UTC [msp.identity] Sign -> DEBU 5a25 Sign: plaintext: 0A20175B4258AE4F4B1C20FFA9CCDA5A...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:02.342 UTC [msp.identity] Sign -> DEBU 5a26 Sign: digest: E93FC150D0B986399A4DBD1B1E5F4A5861FF33D31270A6BA961973224B60282C " +peer0.org1.example.com | "2019-09-24 00:27:02.342 UTC [endorser] EndorseWithPlugin -> DEBU 5a27 Exiting {plugin: escc, channel: businesschannel, tx: ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:27:02.342 UTC [endorser] endorseProposal -> DEBU 5a28 [businesschannel][ce74632e] Exit" +peer0.org1.example.com | "2019-09-24 00:27:02.342 UTC [lockbasedtxmgr] Done -> DEBU 5a29 Done with transaction simulation / query execution [ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898]" +peer0.org1.example.com | "2019-09-24 00:27:02.343 UTC [endorser] func1 -> DEBU 5a2a Exit: request from 172.18.0.9:50992" +peer0.org1.example.com | "2019-09-24 00:27:02.343 UTC [comm.grpc.server] 1 -> INFO 5a2b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50992 grpc.code=OK grpc.call_duration=11.6953ms +peer0.org1.example.com | "2019-09-24 00:27:02.346 UTC [grpc] infof -> DEBU 5a2c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:02.346 UTC [grpc] infof -> DEBU 5a2d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:02.492 UTC [endorser] ProcessProposal -> DEBU 5a2e Entering: request from 172.18.0.9:50996" +peer0.org1.example.com | "2019-09-24 00:27:02.492 UTC [protoutils] ValidateProposalMessage -> DEBU 5a2f ValidateProposalMessage starts for signed proposal 0xc003373310" +peer0.org1.example.com | "2019-09-24 00:27:02.492 UTC [protoutils] validateChannelHeader -> DEBU 5a30 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:02.492 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a31 begin" +peer0.org1.example.com | "2019-09-24 00:27:02.492 UTC [msp] GetManagerForChain -> DEBU 5a32 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:02.492 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a33 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-09-24 00:27:02.492 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a34 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:02.492 UTC [msp.identity] Verify -> DEBU 5a35 Verify: digest = 00000000 0e 44 be b9 be 21 1c 19 e8 51 40 ec 00 0f 8c 5d |.D...!...Q@....]| +peer0.org1.example.com | 00000010 48 15 d0 99 dd 04 15 26 51 5c ba 05 69 09 d9 de |H......&Q\..i...|" +peer0.org1.example.com | "2019-09-24 00:27:02.493 UTC [msp.identity] Verify -> DEBU 5a36 Verify: sig = 00000000 30 44 02 20 5b 0f 66 e8 2e e8 41 17 69 bc 19 f6 |0D. [.f...A.i...| +peer0.org1.example.com | 00000010 14 43 a5 18 9c 20 4f a2 70 1e f2 25 24 71 4b ac |.C... O.p..%$qK.| +peer0.org1.example.com | 00000020 92 de 40 3f 02 20 4a fa 5c 36 ad df 7f 99 5e c1 |..@?. J.\6....^.| +peer0.org1.example.com | 00000030 9a 7d a4 8d e2 09 29 ec 4a bd 55 8f 7a 1b 2b e8 |.}....).J.U.z.+.| +peer0.org1.example.com | 00000040 7a 57 19 b1 0f eb |zW....|" +peer0.org1.example.com | "2019-09-24 00:27:02.493 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a37 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:02.493 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5a38 validateChaincodeProposalMessage starts for proposal 0xc002a61500, header 0xc003373720" +peer0.org1.example.com | "2019-09-24 00:27:02.493 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5a39 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.494 UTC [endorser] preProcess -> DEBU 5a3a [businesschannel][315f3dfc] processing txid: 315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0" +peer0.org1.example.com | "2019-09-24 00:27:02.494 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5a3b retrieveTransactionByID() - txId = [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0]" +peer0.org1.example.com | "2019-09-24 00:27:02.494 UTC [aclmgmt] CheckACL -> DEBU 5a3c acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 00:27:02.494 UTC [aclmgmt] CheckACL -> DEBU 5a3d acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 00:27:02.494 UTC [policies] Evaluate -> DEBU 5a3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:02.494 UTC [policies] Evaluate -> DEBU 5a3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:02.494 UTC [policies] Evaluate -> DEBU 5a40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:02.494 UTC [cauthdsl] func1 -> DEBU 5a41 0xc0047c9f10 gate 1569284822494655000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:02.494 UTC [cauthdsl] func2 -> DEBU 5a42 0xc0047c9f10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:02.494 UTC [cauthdsl] func2 -> DEBU 5a43 0xc0047c9f10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:02.495 UTC [cauthdsl] func2 -> DEBU 5a44 0xc0047c9f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:02.495 UTC [cauthdsl] func2 -> DEBU 5a45 0xc0047c9f10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:02.495 UTC [cauthdsl] func1 -> DEBU 5a46 0xc0047c9f10 gate 1569284822494655000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:02.495 UTC [policies] Evaluate -> DEBU 5a47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.495 UTC [policies] Evaluate -> DEBU 5a48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.495 UTC [policies] Evaluate -> DEBU 5a49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:02.496 UTC [cauthdsl] func1 -> DEBU 5a4a 0xc0046f6750 gate 1569284822496012400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:02.496 UTC [cauthdsl] func2 -> DEBU 5a4b 0xc0046f6750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:02.496 UTC [cauthdsl] func2 -> DEBU 5a4c 0xc0046f6750 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:02.496 UTC [cauthdsl] func2 -> DEBU 5a4d 0xc0046f6750 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:02.496 UTC [msp.identity] Verify -> DEBU 5a4e Verify: digest = 00000000 0e 44 be b9 be 21 1c 19 e8 51 40 ec 00 0f 8c 5d |.D...!...Q@....]| +peer0.org1.example.com | 00000010 48 15 d0 99 dd 04 15 26 51 5c ba 05 69 09 d9 de |H......&Q\..i...|" +peer0.org1.example.com | "2019-09-24 00:27:02.496 UTC [msp.identity] Verify -> DEBU 5a4f Verify: sig = 00000000 30 44 02 20 5b 0f 66 e8 2e e8 41 17 69 bc 19 f6 |0D. [.f...A.i...| +peer0.org1.example.com | 00000010 14 43 a5 18 9c 20 4f a2 70 1e f2 25 24 71 4b ac |.C... O.p..%$qK.| +peer0.org1.example.com | 00000020 92 de 40 3f 02 20 4a fa 5c 36 ad df 7f 99 5e c1 |..@?. J.\6....^.| +peer0.org1.example.com | 00000030 9a 7d a4 8d e2 09 29 ec 4a bd 55 8f 7a 1b 2b e8 |.}....).J.U.z.+.| +peer0.org1.example.com | 00000040 7a 57 19 b1 0f eb |zW....|" +peer0.org1.example.com | "2019-09-24 00:27:02.497 UTC [cauthdsl] func2 -> DEBU 5a50 0xc0046f6750 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:02.497 UTC [cauthdsl] func1 -> DEBU 5a51 0xc0046f6750 gate 1569284822496012400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:02.497 UTC [policies] Evaluate -> DEBU 5a52 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.497 UTC [policies] Evaluate -> DEBU 5a53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.497 UTC [policies] Evaluate -> DEBU 5a54 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.497 UTC [policies] Evaluate -> DEBU 5a55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.498 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5a56 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:27:02.498 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5a57 constructing new tx simulator txid = [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0]" +peer0.org1.example.com | "2019-09-24 00:27:02.498 UTC [endorser] SimulateProposal -> DEBU 5a58 [businesschannel][315f3dfc] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.498 UTC [stateleveldb] GetState -> DEBU 5a59 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:02.499 UTC [ccprovider] GetChaincodeData -> DEBU 5a5a Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 00:27:02.499 UTC [endorser] callChaincode -> INFO 5a5b [businesschannel][315f3dfc] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.499 UTC [chaincode] Execute -> DEBU 5a5c Entry" +peer0.org1.example.com | "2019-09-24 00:27:02.501 UTC [chaincode] handleMessage -> DEBU 5a5d [315f3dfc] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:02.501 UTC [chaincode] HandleTransaction -> DEBU 5a5e [315f3dfc] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:02.501 UTC [chaincode] HandleGetState -> DEBU 5a5f [315f3dfc] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:02.501 UTC [stateleveldb] GetState -> DEBU 5a60 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 00:27:02.502 UTC [chaincode] HandleTransaction -> DEBU 5a61 [315f3dfc] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:02.502 UTC [chaincode] handleMessage -> DEBU 5a62 [315f3dfc] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:02.502 UTC [chaincode] HandleTransaction -> DEBU 5a63 [315f3dfc] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:02.502 UTC [chaincode] HandleGetState -> DEBU 5a64 [315f3dfc] getting state for chaincode exp02, key b, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:02.502 UTC [stateleveldb] GetState -> DEBU 5a65 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-09-24 00:27:02.503 UTC [chaincode] HandleTransaction -> DEBU 5a66 [315f3dfc] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:02.504 UTC [chaincode] handleMessage -> DEBU 5a67 [315f3dfc] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:02.504 UTC [chaincode] HandleTransaction -> DEBU 5a68 [315f3dfc] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:02.504 UTC [chaincode] HandleTransaction -> DEBU 5a69 [315f3dfc] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:02.505 UTC [chaincode] handleMessage -> DEBU 5a6a [315f3dfc] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:02.506 UTC [chaincode] HandleTransaction -> DEBU 5a6b [315f3dfc] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:02.506 UTC [chaincode] HandleTransaction -> DEBU 5a6c [315f3dfc] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:02.506 UTC [chaincode] handleMessage -> DEBU 5a6d [315f3dfc] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:02.507 UTC [chaincode] Notify -> DEBU 5a6e [315f3dfc] notifying Txid:315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:02.507 UTC [chaincode] Execute -> DEBU 5a6f Exit" +peer0.org1.example.com | "2019-09-24 00:27:02.507 UTC [endorser] callChaincode -> INFO 5a70 [businesschannel][315f3dfc] Exit chaincode: name:"exp02" (8ms)" +peer0.org1.example.com | "2019-09-24 00:27:02.507 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5a71 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:27:02.507 UTC [lockbasedtxmgr] Done -> DEBU 5a72 Done with transaction simulation / query execution [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0]" +peer0.org1.example.com | "2019-09-24 00:27:02.507 UTC [endorser] SimulateProposal -> DEBU 5a73 [businesschannel][315f3dfc] Exit" +peer0.org1.example.com | "2019-09-24 00:27:02.507 UTC [endorser] endorseProposal -> DEBU 5a74 [businesschannel][315f3dfc] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.508 UTC [endorser] endorseProposal -> DEBU 5a75 [businesschannel][315f3dfc] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 00:27:02.508 UTC [endorser] EndorseWithPlugin -> DEBU 5a76 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:27:02.508 UTC [msp.identity] Sign -> DEBU 5a77 Sign: plaintext: 0A203EDB6AA316A1F56D10A12B8A8439...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:02.508 UTC [msp.identity] Sign -> DEBU 5a78 Sign: digest: EDCE66C59D539583155CF8D944F25BCE04B7C3DB70A9B18A713FD37B845E7981 " +peer0.org1.example.com | "2019-09-24 00:27:02.508 UTC [endorser] EndorseWithPlugin -> DEBU 5a79 Exiting {plugin: escc, channel: businesschannel, tx: 315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:27:02.508 UTC [endorser] endorseProposal -> DEBU 5a7a [businesschannel][315f3dfc] Exit" +peer0.org1.example.com | "2019-09-24 00:27:02.509 UTC [lockbasedtxmgr] Done -> DEBU 5a7b Done with transaction simulation / query execution [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0]" +peer0.org1.example.com | "2019-09-24 00:27:02.509 UTC [endorser] func1 -> DEBU 5a7c Exit: request from 172.18.0.9:50996" +peer0.org1.example.com | "2019-09-24 00:27:02.509 UTC [comm.grpc.server] 1 -> INFO 5a7d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50996 grpc.code=OK grpc.call_duration=17.9591ms +peer0.org1.example.com | "2019-09-24 00:27:02.529 UTC [grpc] warningf -> DEBU 5a7e transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:50996: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 00:27:02.531 UTC [grpc] infof -> DEBU 5a7f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:02.533 UTC [grpc] infof -> DEBU 5a80 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:02.687 UTC [endorser] ProcessProposal -> DEBU 5a81 Entering: request from 172.18.0.9:51002" +peer0.org1.example.com | "2019-09-24 00:27:02.687 UTC [protoutils] ValidateProposalMessage -> DEBU 5a82 ValidateProposalMessage starts for signed proposal 0xc0034e0be0" +peer0.org1.example.com | "2019-09-24 00:27:02.687 UTC [protoutils] validateChannelHeader -> DEBU 5a83 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:02.687 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a84 begin" +peer0.org1.example.com | "2019-09-24 00:27:02.687 UTC [msp] GetManagerForChain -> DEBU 5a85 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:02.687 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a86 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:02.687 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a87 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:02.688 UTC [msp.identity] Verify -> DEBU 5a88 Verify: digest = 00000000 2b 07 54 4f e3 a9 ec 1b ee 63 4a 65 87 17 81 86 |+.TO.....cJe....| +peer0.org1.example.com | 00000010 dd 5e 16 6e da ba 46 3a f2 79 09 7f e8 e6 3f 88 |.^.n..F:.y....?.|" +peer0.org1.example.com | "2019-09-24 00:27:02.688 UTC [msp.identity] Verify -> DEBU 5a89 Verify: sig = 00000000 30 45 02 21 00 a2 57 d9 3c a8 66 b1 2b fa 0a 4d |0E.!..W.<.f.+..M| +peer0.org1.example.com | 00000010 46 c3 6f c9 5d 01 6d 4f e8 90 52 6f 25 1a f1 ef |F.o.].mO..Ro%...| +peer0.org1.example.com | 00000020 ab 47 0f 64 cc 02 20 36 98 78 81 da 03 9b 95 c0 |.G.d.. 6.x......| +peer0.org1.example.com | 00000030 5d 78 c5 e3 2a f0 6e f3 6a d7 ae 5f f1 fd 7f a3 |]x..*.n.j.._....| +peer0.org1.example.com | 00000040 e4 b3 83 c6 79 11 41 |....y.A|" +peer0.org1.example.com | "2019-09-24 00:27:02.688 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a8a exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:02.688 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5a8b validateChaincodeProposalMessage starts for proposal 0xc002a61960, header 0xc0034e1040" +peer0.org1.example.com | "2019-09-24 00:27:02.688 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5a8c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.688 UTC [endorser] preProcess -> DEBU 5a8d [businesschannel][86d08c77] processing txid: 86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d" +peer0.org1.example.com | "2019-09-24 00:27:02.688 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5a8e retrieveTransactionByID() - txId = [86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d]" +peer0.org1.example.com | "2019-09-24 00:27:02.688 UTC [aclmgmt] CheckACL -> DEBU 5a8f acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 00:27:02.688 UTC [aclmgmt] CheckACL -> DEBU 5a90 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 00:27:02.689 UTC [policies] Evaluate -> DEBU 5a91 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:02.689 UTC [policies] Evaluate -> DEBU 5a92 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:02.689 UTC [policies] Evaluate -> DEBU 5a93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:02.689 UTC [cauthdsl] func1 -> DEBU 5a94 0xc004bc3160 gate 1569284822689505900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:02.689 UTC [cauthdsl] func2 -> DEBU 5a95 0xc004bc3160 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:02.689 UTC [cauthdsl] func2 -> DEBU 5a96 0xc004bc3160 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:02.690 UTC [cauthdsl] func2 -> DEBU 5a97 0xc004bc3160 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:02.690 UTC [msp.identity] Verify -> DEBU 5a98 Verify: digest = 00000000 2b 07 54 4f e3 a9 ec 1b ee 63 4a 65 87 17 81 86 |+.TO.....cJe....| +peer0.org1.example.com | 00000010 dd 5e 16 6e da ba 46 3a f2 79 09 7f e8 e6 3f 88 |.^.n..F:.y....?.|" +peer0.org1.example.com | "2019-09-24 00:27:02.690 UTC [msp.identity] Verify -> DEBU 5a99 Verify: sig = 00000000 30 45 02 21 00 a2 57 d9 3c a8 66 b1 2b fa 0a 4d |0E.!..W.<.f.+..M| +peer0.org1.example.com | 00000010 46 c3 6f c9 5d 01 6d 4f e8 90 52 6f 25 1a f1 ef |F.o.].mO..Ro%...| +peer0.org1.example.com | 00000020 ab 47 0f 64 cc 02 20 36 98 78 81 da 03 9b 95 c0 |.G.d.. 6.x......| +peer0.org1.example.com | 00000030 5d 78 c5 e3 2a f0 6e f3 6a d7 ae 5f f1 fd 7f a3 |]x..*.n.j.._....| +peer0.org1.example.com | 00000040 e4 b3 83 c6 79 11 41 |....y.A|" +peer0.org1.example.com | "2019-09-24 00:27:02.692 UTC [cauthdsl] func2 -> DEBU 5a9a 0xc004bc3160 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:02.692 UTC [cauthdsl] func1 -> DEBU 5a9b 0xc004bc3160 gate 1569284822689505900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:02.692 UTC [policies] Evaluate -> DEBU 5a9c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.692 UTC [policies] Evaluate -> DEBU 5a9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.692 UTC [policies] Evaluate -> DEBU 5a9e Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.692 UTC [policies] Evaluate -> DEBU 5a9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:02.693 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5aa0 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:27:02.693 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5aa1 constructing new tx simulator txid = [86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d]" +peer0.org1.example.com | "2019-09-24 00:27:02.693 UTC [endorser] SimulateProposal -> DEBU 5aa2 [businesschannel][86d08c77] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.693 UTC [stateleveldb] GetState -> DEBU 5aa3 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:02.693 UTC [ccprovider] GetChaincodeData -> DEBU 5aa4 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 00:27:02.693 UTC [endorser] callChaincode -> INFO 5aa5 [businesschannel][86d08c77] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.693 UTC [chaincode] Execute -> DEBU 5aa6 Entry" +peer0.org1.example.com | "2019-09-24 00:27:02.697 UTC [chaincode] handleMessage -> DEBU 5aa7 [86d08c77] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:02.697 UTC [gossip.comm] func1 -> DEBU 5aa8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.698 UTC [gossip.gossip] handleMessage -> DEBU 5aa9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.698 UTC [gossip.gossip] handleMessage -> DEBU 5aaa Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5aab Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.699 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5aac Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:02.699 UTC [msp.identity] Verify -> DEBU 5aad Verify: digest = 00000000 f6 74 bd 69 dc 62 2a 2e 2a 52 bc de e8 50 41 ca |.t.i.b*.*R...PA.| +peer0.org1.example.com | 00000010 bf 7e 06 cc 7a 56 af 4a fb 57 5f 25 c4 16 0a b9 |.~..zV.J.W_%....|" +peer0.org1.example.com | "2019-09-24 00:27:02.699 UTC [msp.identity] Verify -> DEBU 5aae Verify: sig = 00000000 30 44 02 20 78 d8 01 84 1d 1f 06 6a 15 97 b4 96 |0D. x......j....| +peer0.org1.example.com | 00000010 54 49 90 1a 3d c7 67 3e 8c 35 07 97 f5 e0 6a 2f |TI..=.g>.5....j/| +peer0.org1.example.com | 00000020 ca 41 c7 b4 02 20 6d cb 39 55 6f 9b a6 5a 76 be |.A... m.9Uo..Zv.| +peer0.org1.example.com | 00000030 dc a2 5a 1b d0 55 a9 63 5a 96 4b 4b b4 8c 85 37 |..Z..U.cZ.KK...7| +peer0.org1.example.com | 00000040 7a 7d f3 89 80 33 |z}...3|" +peer0.org1.example.com | "2019-09-24 00:27:02.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 5aaf Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ab0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:02.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ab1 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:02.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ab2 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:02.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ab3 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:02.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ab4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.701 UTC [gossip.discovery] handleAliveMessage -> DEBU 5ab5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5ab6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.702 UTC [chaincode] HandleTransaction -> DEBU 5ab7 [86d08c77] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:02.703 UTC [gossip.gossip] handleMessage -> DEBU 5ab8 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.703 UTC [gossip.gossip] handleMessage -> DEBU 5aba Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5abb Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5abc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.703 UTC [chaincode] HandleGetState -> DEBU 5ab9 [86d08c77] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:02.703 UTC [stateleveldb] GetState -> DEBU 5abd GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 00:27:02.703 UTC [chaincode] HandleTransaction -> DEBU 5abe [86d08c77] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:02.704 UTC [msp] DeserializeIdentity -> DEBU 5abf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.704 UTC [msp] DeserializeIdentity -> DEBU 5ac0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.704 UTC [msp] DeserializeIdentity -> DEBU 5ac1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.705 UTC [gossip.comm] Send -> DEBU 5ac2 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:02.705 UTC [msp] DeserializeIdentity -> DEBU 5ac3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:02.705 UTC [gossip.comm] Send -> DEBU 5ac4 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:02.706 UTC [chaincode] handleMessage -> DEBU 5ac5 [86d08c77] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:02.706 UTC [chaincode] Notify -> DEBU 5ac6 [86d08c77] notifying Txid:86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:02.706 UTC [chaincode] Execute -> DEBU 5ac7 Exit" +peer0.org1.example.com | "2019-09-24 00:27:02.706 UTC [endorser] callChaincode -> INFO 5ac8 [businesschannel][86d08c77] Exit chaincode: name:"exp02" (13ms)" +peer0.org1.example.com | "2019-09-24 00:27:02.707 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5ac9 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:27:02.707 UTC [lockbasedtxmgr] Done -> DEBU 5aca Done with transaction simulation / query execution [86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d]" +peer0.org1.example.com | "2019-09-24 00:27:02.707 UTC [endorser] SimulateProposal -> DEBU 5acb [businesschannel][86d08c77] Exit" +peer0.org1.example.com | "2019-09-24 00:27:02.708 UTC [endorser] endorseProposal -> DEBU 5acc [businesschannel][86d08c77] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:02.708 UTC [endorser] endorseProposal -> DEBU 5acd [businesschannel][86d08c77] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 00:27:02.708 UTC [endorser] EndorseWithPlugin -> DEBU 5acf Entering endorsement for {plugin: escc, channel: businesschannel, tx: 86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:27:02.708 UTC [gossip.comm] sendToEndpoint -> DEBU 5ad0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.709 UTC [gossip.comm] sendToEndpoint -> DEBU 5ad1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.708 UTC [msp.identity] Sign -> DEBU 5ad2 Sign: plaintext: 0A20A9AB3C0B5F4D70DC7F511B39B76A...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:02.709 UTC [msp.identity] Sign -> DEBU 5ad3 Sign: digest: EF27CDA1E108F10C17E4E0399F54D90936678447F330EE3D4EC9D4F23B416FBF " +peer0.org1.example.com | "2019-09-24 00:27:02.709 UTC [endorser] EndorseWithPlugin -> DEBU 5ad4 Exiting {plugin: escc, channel: businesschannel, tx: 86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:27:02.710 UTC [endorser] endorseProposal -> DEBU 5ad5 [businesschannel][86d08c77] Exit" +peer0.org1.example.com | "2019-09-24 00:27:02.710 UTC [lockbasedtxmgr] Done -> DEBU 5ad6 Done with transaction simulation / query execution [86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d]" +peer0.org1.example.com | "2019-09-24 00:27:02.710 UTC [endorser] func1 -> DEBU 5ad8 Exit: request from 172.18.0.9:51002" +peer0.org1.example.com | "2019-09-24 00:27:02.710 UTC [gossip.comm] func1 -> DEBU 5ad7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.710 UTC [gossip.gossip] handleMessage -> DEBU 5ada Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.711 UTC [gossip.gossip] handleMessage -> DEBU 5adb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.706 UTC [gossip.comm] sendToEndpoint -> DEBU 5ace Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5adc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.710 UTC [comm.grpc.server] 1 -> INFO 5ad9 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51002 grpc.code=OK grpc.call_duration=23.7212ms +peer0.org1.example.com | "2019-09-24 00:27:02.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5add Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:02.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5ade Exiting" +peer0.org1.example.com | "2019-09-24 00:27:02.715 UTC [grpc] infof -> DEBU 5ae0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:02.715 UTC [grpc] infof -> DEBU 5adf transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:03.710 UTC [gossip.pull] Hello -> DEBU 5ae1 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:03.710 UTC [gossip.comm] Send -> DEBU 5ae2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:03.710 UTC [gossip.pull] Hello -> DEBU 5ae3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:03.711 UTC [gossip.comm] Send -> DEBU 5ae4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:03.711 UTC [gossip.pull] Hello -> DEBU 5ae5 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:03.711 UTC [gossip.comm] Send -> DEBU 5ae6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5ae7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5ae8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5ae9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5aea Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5aeb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5aec Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.713 UTC [gossip.comm] func1 -> DEBU 5aed Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.713 UTC [gossip.gossip] handleMessage -> DEBU 5aee Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.714 UTC [gossip.pull] HandleMessage -> DEBU 5aef GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.714 UTC [gossip.gossip] handleMessage -> DEBU 5af0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.714 UTC [gossip.comm] func1 -> DEBU 5af1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.714 UTC [gossip.gossip] handleMessage -> DEBU 5af2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.714 UTC [gossip.pull] HandleMessage -> DEBU 5af3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.714 UTC [gossip.gossip] handleMessage -> DEBU 5af4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.714 UTC [gossip.gossip] handleMessage -> DEBU 5af5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.714 UTC [gossip.pull] HandleMessage -> DEBU 5af6 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.714 UTC [gossip.gossip] handleMessage -> DEBU 5af7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.849 UTC [msp] GetDefaultSigningIdentity -> DEBU 5af8 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:03.850 UTC [msp.identity] Sign -> DEBU 5af9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104A " +peer0.org1.example.com | "2019-09-24 00:27:03.850 UTC [msp.identity] Sign -> DEBU 5afa Sign: digest: 414DC89A2CEF25A4CA4B27D68FB13397CBBC979020616A10AAB80990C04B7A15 " +peer0.org1.example.com | "2019-09-24 00:27:03.851 UTC [msp] GetDefaultSigningIdentity -> DEBU 5afb Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:03.851 UTC [msp.identity] Sign -> DEBU 5afc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:03.852 UTC [msp.identity] Sign -> DEBU 5afd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:03.852 UTC [msp] DeserializeIdentity -> DEBU 5afe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:03.853 UTC [gossip.comm] Send -> DEBU 5aff Entering, sending GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:03.853 UTC [msp] DeserializeIdentity -> DEBU 5b00 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:03.854 UTC [gossip.comm] Send -> DEBU 5b01 Entering, sending GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:03.854 UTC [gossip.comm] sendToEndpoint -> DEBU 5b02 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.855 UTC [gossip.comm] sendToEndpoint -> DEBU 5b04 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.855 UTC [gossip.comm] sendToEndpoint -> DEBU 5b05 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.855 UTC [gossip.comm] sendToEndpoint -> DEBU 5b06 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.854 UTC [gossip.comm] Send -> DEBU 5b03 Entering, sending GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:03.857 UTC [gossip.gossip] handleMessage -> DEBU 5b07 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.858 UTC [gossip.gossip] handleMessage -> DEBU 5b08 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b09 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.858 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b0a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:03.859 UTC [msp] DeserializeIdentity -> DEBU 5b0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:03.859 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5b0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:03.860 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b0d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:03.860 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b0e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:03.860 UTC [policies] Evaluate -> DEBU 5b0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:03.861 UTC [policies] Evaluate -> DEBU 5b10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:03.861 UTC [policies] Evaluate -> DEBU 5b11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:03.861 UTC [cauthdsl] func1 -> DEBU 5b12 0xc003dc5fe0 gate 1569284823861967500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:03.862 UTC [cauthdsl] func2 -> DEBU 5b13 0xc003dc5fe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:03.862 UTC [cauthdsl] func2 -> DEBU 5b14 0xc003dc5fe0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:03.862 UTC [cauthdsl] func2 -> DEBU 5b15 0xc003dc5fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:03.863 UTC [cauthdsl] func2 -> DEBU 5b16 0xc003dc5fe0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:03.863 UTC [cauthdsl] func1 -> DEBU 5b17 0xc003dc5fe0 gate 1569284823861967500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:03.863 UTC [policies] Evaluate -> DEBU 5b18 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.863 UTC [policies] Evaluate -> DEBU 5b19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.864 UTC [policies] Evaluate -> DEBU 5b1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:03.863 UTC [gossip.comm] sendToEndpoint -> DEBU 5b1b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.864 UTC [gossip.comm] sendToEndpoint -> DEBU 5b1e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.864 UTC [cauthdsl] func1 -> DEBU 5b1c 0xc003fdc820 gate 1569284823864176800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:03.864 UTC [gossip.comm] func1 -> DEBU 5b1d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.866 UTC [gossip.gossip] handleMessage -> DEBU 5b1f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.867 UTC [gossip.comm] func1 -> DEBU 5b20 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.866 UTC [cauthdsl] func2 -> DEBU 5b21 0xc003fdc820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:03.868 UTC [cauthdsl] func2 -> DEBU 5b22 0xc003fdc820 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:03.868 UTC [cauthdsl] func2 -> DEBU 5b23 0xc003fdc820 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:03.868 UTC [msp.identity] Verify -> DEBU 5b24 Verify: digest = 00000000 60 85 20 4c ad 4c d5 cc c4 1d b2 1a aa 3b 37 90 |`. L.L.......;7.| +peer0.org1.example.com | 00000010 56 9c 46 fd e3 99 f3 9c d4 a2 02 8e 1b ef 41 c3 |V.F...........A.|" +peer0.org1.example.com | "2019-09-24 00:27:03.868 UTC [msp.identity] Verify -> DEBU 5b25 Verify: sig = 00000000 30 45 02 21 00 df e6 30 ae e4 87 a0 60 98 b5 0c |0E.!...0....`...| +peer0.org1.example.com | 00000010 dc e3 89 bc 6b b5 1e 0c b6 e2 3b 33 c2 5a 80 ce |....k.....;3.Z..| +peer0.org1.example.com | 00000020 ce 26 66 75 39 02 20 4f e6 c9 16 d5 d4 e4 ba 1a |.&fu9. O........| +peer0.org1.example.com | 00000030 f5 5c cc 91 74 90 5e 46 6b 3c e5 60 09 0e 53 51 |.\..t.^Fk<.`..SQ| +peer0.org1.example.com | 00000040 95 aa ea 16 61 99 b4 |....a..|" +peer0.org1.example.com | "2019-09-24 00:27:03.869 UTC [cauthdsl] func2 -> DEBU 5b26 0xc003fdc820 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:03.869 UTC [cauthdsl] func1 -> DEBU 5b27 0xc003fdc820 gate 1569284823864176800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:03.869 UTC [policies] Evaluate -> DEBU 5b28 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.869 UTC [policies] Evaluate -> DEBU 5b29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.869 UTC [policies] Evaluate -> DEBU 5b2a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.869 UTC [policies] Evaluate -> DEBU 5b2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b2c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b2d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.870 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b2e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:03.870 UTC [msp.identity] Verify -> DEBU 5b2f Verify: digest = 00000000 41 4d c8 9a 2c ef 25 a4 ca 4b 27 d6 8f b1 33 97 |AM..,.%..K'...3.| +peer0.org1.example.com | 00000010 cb bc 97 90 20 61 6a 10 aa b8 09 90 c0 4b 7a 15 |.... aj......Kz.|" +peer0.org1.example.com | "2019-09-24 00:27:03.870 UTC [msp.identity] Verify -> DEBU 5b30 Verify: sig = 00000000 30 45 02 21 00 81 42 6e 98 b1 59 27 cf 36 f1 f4 |0E.!..Bn..Y'.6..| +peer0.org1.example.com | 00000010 3e d6 eb a0 b3 9c 5b 0c 6a f9 a4 5b b0 68 58 04 |>.....[.j..[.hX.| +peer0.org1.example.com | 00000020 a7 62 e0 63 4c 02 20 6d 16 cd 69 08 ca 3d d6 56 |.b.cL. m..i..=.V| +peer0.org1.example.com | 00000030 30 5b ec da 2b c2 b1 b1 da d5 04 bf 82 fd 3f 27 |0[..+.........?'| +peer0.org1.example.com | 00000040 47 5c 1b 95 0b f4 1d |G\.....|" +peer0.org1.example.com | "2019-09-24 00:27:03.871 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b31 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.871 UTC [gossip.discovery] isSentByMe -> DEBU 5b32 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.871 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b33 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.872 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b34 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.872 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b35 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.872 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b36 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:03.872 UTC [gossip.gossip] handleMessage -> DEBU 5b37 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.872 UTC [gossip.gossip] handleMessage -> DEBU 5b38 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.872 UTC [msp.identity] Verify -> DEBU 5b39 Verify: digest = 00000000 41 4d c8 9a 2c ef 25 a4 ca 4b 27 d6 8f b1 33 97 |AM..,.%..K'...3.| +peer0.org1.example.com | 00000010 cb bc 97 90 20 61 6a 10 aa b8 09 90 c0 4b 7a 15 |.... aj......Kz.|" +peer0.org1.example.com | "2019-09-24 00:27:03.873 UTC [msp.identity] Verify -> DEBU 5b3a Verify: sig = 00000000 30 45 02 21 00 81 42 6e 98 b1 59 27 cf 36 f1 f4 |0E.!..Bn..Y'.6..| +peer0.org1.example.com | 00000010 3e d6 eb a0 b3 9c 5b 0c 6a f9 a4 5b b0 68 58 04 |>.....[.j..[.hX.| +peer0.org1.example.com | 00000020 a7 62 e0 63 4c 02 20 6d 16 cd 69 08 ca 3d d6 56 |.b.cL. m..i..=.V| +peer0.org1.example.com | 00000030 30 5b ec da 2b c2 b1 b1 da d5 04 bf 82 fd 3f 27 |0[..+.........?'| +peer0.org1.example.com | 00000040 47 5c 1b 95 0b f4 1d |G\.....|" +peer0.org1.example.com | "2019-09-24 00:27:03.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b3b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.873 UTC [gossip.discovery] isSentByMe -> DEBU 5b3c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b3d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b3e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:03.874 UTC [msp] DeserializeIdentity -> DEBU 5b3f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:03.874 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5b40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:03.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b41 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:03.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b42 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:03.875 UTC [policies] Evaluate -> DEBU 5b43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:03.875 UTC [policies] Evaluate -> DEBU 5b44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:03.875 UTC [policies] Evaluate -> DEBU 5b45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:03.875 UTC [cauthdsl] func1 -> DEBU 5b46 0xc0027f9410 gate 1569284823875643200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:03.875 UTC [cauthdsl] func2 -> DEBU 5b47 0xc0027f9410 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:03.875 UTC [cauthdsl] func2 -> DEBU 5b48 0xc0027f9410 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:03.876 UTC [cauthdsl] func2 -> DEBU 5b49 0xc0027f9410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:03.876 UTC [cauthdsl] func2 -> DEBU 5b4a 0xc0027f9410 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:03.876 UTC [cauthdsl] func1 -> DEBU 5b4b 0xc0027f9410 gate 1569284823875643200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:03.876 UTC [policies] Evaluate -> DEBU 5b4c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.876 UTC [policies] Evaluate -> DEBU 5b4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.876 UTC [policies] Evaluate -> DEBU 5b4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:03.877 UTC [cauthdsl] func1 -> DEBU 5b4f 0xc0027f9c50 gate 1569284823877133400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:03.877 UTC [cauthdsl] func2 -> DEBU 5b50 0xc0027f9c50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:03.877 UTC [cauthdsl] func2 -> DEBU 5b51 0xc0027f9c50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:03.877 UTC [cauthdsl] func2 -> DEBU 5b52 0xc0027f9c50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:03.878 UTC [msp.identity] Verify -> DEBU 5b53 Verify: digest = 00000000 4b ac 2c fe c6 af c3 f1 2c 25 65 11 6a cb 80 34 |K.,.....,%e.j..4| +peer0.org1.example.com | 00000010 d0 17 b0 49 0a 9d 01 58 c3 eb fd 45 c3 f3 66 f0 |...I...X...E..f.|" +peer0.org1.example.com | "2019-09-24 00:27:03.878 UTC [msp.identity] Verify -> DEBU 5b54 Verify: sig = 00000000 30 44 02 20 7d 21 7c e8 e8 7f 5e 2f db c9 7a 04 |0D. }!|...^/..z.| +peer0.org1.example.com | 00000010 b1 01 6e 4d 17 af cb fe d0 a0 fb 02 4e a2 03 f6 |..nM........N...| +peer0.org1.example.com | 00000020 29 a1 12 ea 02 20 3c 8b 0e f6 4e e9 03 b0 8a e7 |).... <...N.....| +peer0.org1.example.com | 00000030 84 a9 87 f8 59 79 17 b0 63 23 3a 30 5d 66 e3 47 |....Yy..c#:0]f.G| +peer0.org1.example.com | 00000040 1e 2b 6f 20 d5 a9 |.+o ..|" +peer0.org1.example.com | "2019-09-24 00:27:03.878 UTC [cauthdsl] func2 -> DEBU 5b55 0xc0027f9c50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:03.878 UTC [cauthdsl] func1 -> DEBU 5b56 0xc0027f9c50 gate 1569284823877133400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:03.879 UTC [policies] Evaluate -> DEBU 5b57 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.879 UTC [policies] Evaluate -> DEBU 5b58 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.879 UTC [policies] Evaluate -> DEBU 5b59 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.879 UTC [policies] Evaluate -> DEBU 5b5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:03.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b5b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b5c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b5d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b5e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.880 UTC [gossip.gossip] handleMessage -> DEBU 5b5f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.880 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b60 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:03.881 UTC [msp.identity] Verify -> DEBU 5b61 Verify: digest = 00000000 41 4d c8 9a 2c ef 25 a4 ca 4b 27 d6 8f b1 33 97 |AM..,.%..K'...3.| +peer0.org1.example.com | 00000010 cb bc 97 90 20 61 6a 10 aa b8 09 90 c0 4b 7a 15 |.... aj......Kz.|" +peer0.org1.example.com | "2019-09-24 00:27:03.881 UTC [msp.identity] Verify -> DEBU 5b62 Verify: sig = 00000000 30 45 02 21 00 81 42 6e 98 b1 59 27 cf 36 f1 f4 |0E.!..Bn..Y'.6..| +peer0.org1.example.com | 00000010 3e d6 eb a0 b3 9c 5b 0c 6a f9 a4 5b b0 68 58 04 |>.....[.j..[.hX.| +peer0.org1.example.com | 00000020 a7 62 e0 63 4c 02 20 6d 16 cd 69 08 ca 3d d6 56 |.b.cL. m..i..=.V| +peer0.org1.example.com | 00000030 30 5b ec da 2b c2 b1 b1 da d5 04 bf 82 fd 3f 27 |0[..+.........?'| +peer0.org1.example.com | 00000040 47 5c 1b 95 0b f4 1d |G\.....|" +peer0.org1.example.com | "2019-09-24 00:27:03.881 UTC [msp.identity] Verify -> DEBU 5b63 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:27:03.881 UTC [msp.identity] Verify -> DEBU 5b64 Verify: sig = 00000000 30 44 02 20 4d 33 f1 58 fe 10 2f ef a7 b4 70 d6 |0D. M3.X../...p.| +peer0.org1.example.com | 00000010 9f 1f 82 8e 6f 6b 08 a1 7e 74 c5 c4 69 b6 83 87 |....ok..~t..i...| +peer0.org1.example.com | 00000020 a2 4b 94 e6 02 20 42 b4 28 11 82 17 e3 81 1d 6b |.K... B.(......k| +peer0.org1.example.com | 00000030 25 da fe 18 75 09 6b bb fd 9b 66 fe 11 f1 9a b4 |%...u.k...f.....| +peer0.org1.example.com | 00000040 b9 c0 8a d5 a7 64 |.....d|" +peer0.org1.example.com | "2019-09-24 00:27:03.882 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b65 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.882 UTC [gossip.discovery] isSentByMe -> DEBU 5b66 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.883 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b67 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.883 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b68 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:03.912 UTC [gossip.gossip] handleMessage -> DEBU 5b69 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.912 UTC [gossip.pull] HandleMessage -> DEBU 5b6a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:03.912 UTC [msp] DeserializeIdentity -> DEBU 5b6b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:03.912 UTC [msp] DeserializeIdentity -> DEBU 5b6c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:03.913 UTC [msp] DeserializeIdentity -> DEBU 5b6d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:03.914 UTC [msp] DeserializeIdentity -> DEBU 5b6e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:03.914 UTC [msp] DeserializeIdentity -> DEBU 5b6f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:03.915 UTC [msp] DeserializeIdentity -> DEBU 5b70 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:03.915 UTC [gossip.pull] SendDigest -> DEBU 5b71 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:27:03.915 UTC [gossip.gossip] handleMessage -> DEBU 5b72 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.020 UTC [gossip.gossip] handleMessage -> DEBU 5b73 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.021 UTC [gossip.gossip] handleMessage -> DEBU 5b74 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.021 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b75 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.021 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b76 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:04.022 UTC [msp] DeserializeIdentity -> DEBU 5b77 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.022 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5b78 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:04.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b79 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b7a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.023 UTC [policies] Evaluate -> DEBU 5b7b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.023 UTC [policies] Evaluate -> DEBU 5b7c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.024 UTC [policies] Evaluate -> DEBU 5b7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.024 UTC [cauthdsl] func1 -> DEBU 5b7e 0xc003357850 gate 1569284824024691700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.025 UTC [cauthdsl] func2 -> DEBU 5b7f 0xc003357850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.025 UTC [cauthdsl] func2 -> DEBU 5b80 0xc003357850 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.025 UTC [cauthdsl] func2 -> DEBU 5b81 0xc003357850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:04.025 UTC [cauthdsl] func2 -> DEBU 5b82 0xc003357850 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.026 UTC [cauthdsl] func1 -> DEBU 5b83 0xc003357850 gate 1569284824024691700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.028 UTC [policies] Evaluate -> DEBU 5b84 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.028 UTC [policies] Evaluate -> DEBU 5b85 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.028 UTC [policies] Evaluate -> DEBU 5b86 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.029 UTC [cauthdsl] func1 -> DEBU 5b87 0xc00337a090 gate 1569284824029092700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.029 UTC [cauthdsl] func2 -> DEBU 5b88 0xc00337a090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.029 UTC [cauthdsl] func2 -> DEBU 5b89 0xc00337a090 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.029 UTC [cauthdsl] func2 -> DEBU 5b8a 0xc00337a090 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.030 UTC [msp.identity] Verify -> DEBU 5b8b Verify: digest = 00000000 8f 9a ec a2 f4 2f 49 57 4c 28 4a 94 b1 08 f0 0f |...../IWL(J.....| +peer0.org1.example.com | 00000010 93 45 61 e4 56 17 ad a8 e0 3f 20 7d 8a 15 f1 53 |.Ea.V....? }...S|" +peer0.org1.example.com | "2019-09-24 00:27:04.030 UTC [msp.identity] Verify -> DEBU 5b8c Verify: sig = 00000000 30 44 02 20 72 db 57 3d 3a 26 10 9c 72 43 10 97 |0D. r.W=:&..rC..| +peer0.org1.example.com | 00000010 04 6f 96 26 9b de b7 26 03 64 0f 51 97 e3 38 ff |.o.&...&.d.Q..8.| +peer0.org1.example.com | 00000020 21 a4 2d 9d 02 20 6b 16 bc bc 7e fd ef 6e e8 4f |!.-.. k...~..n.O| +peer0.org1.example.com | 00000030 70 9d 94 9a 90 e7 cb 9c 35 d2 f9 9d ba 13 39 af |p.......5.....9.| +peer0.org1.example.com | 00000040 6f 69 71 f2 19 8f |oiq...|" +peer0.org1.example.com | "2019-09-24 00:27:04.030 UTC [cauthdsl] func2 -> DEBU 5b8d 0xc00337a090 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.031 UTC [cauthdsl] func1 -> DEBU 5b8e 0xc00337a090 gate 1569284824029092700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.031 UTC [policies] Evaluate -> DEBU 5b8f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.031 UTC [policies] Evaluate -> DEBU 5b90 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.031 UTC [policies] Evaluate -> DEBU 5b91 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.032 UTC [policies] Evaluate -> DEBU 5b92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.032 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b93 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 5b94 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:04.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 5b95 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:04.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 5b96 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:04.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 5b97 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:04.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 5b98 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b99 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.036 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b9a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.037 UTC [gossip.discovery] sendMemResponse -> DEBU 5b9b Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:27:04.037 UTC [msp] DeserializeIdentity -> DEBU 5b9c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.037 UTC [msp] DeserializeIdentity -> DEBU 5b9d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.037 UTC [msp] DeserializeIdentity -> DEBU 5b9e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.037 UTC [gossip.comm] Send -> DEBU 5b9f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:04.037 UTC [gossip.discovery] sendMemResponse -> DEBU 5ba0 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020N" signature:"0D\002 x\330\001\204\035\037\006j\025\227\264\226TI\220\032=\307g>\2145\007\227\365\340j/\312A\307\264\002 m\3139Uo\233\246Zv\276\334\242Z\033\320U\251cZ\226KK\264\214\2057z}\363\211\2003" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:04.038 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.038 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.082 UTC [msp] DeserializeIdentity -> DEBU 5ba3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.083 UTC [msp] DeserializeIdentity -> DEBU 5ba4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.083 UTC [gossip.comm] Send -> DEBU 5ba5 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:04.084 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.084 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.086 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.086 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.087 UTC [gossip.comm] sendToEndpoint -> DEBU 5baa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.087 UTC [gossip.comm] sendToEndpoint -> DEBU 5bac Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.087 UTC [gossip.gossip] handleMessage -> DEBU 5bab Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.089 UTC [msp] DeserializeIdentity -> DEBU 5bb0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.088 UTC [gossip.comm] func1 -> DEBU 5bad Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.089 UTC [gossip.comm] func1 -> DEBU 5bae Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.089 UTC [msp] DeserializeIdentity -> DEBU 5baf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.090 UTC [msp] DeserializeIdentity -> DEBU 5bb1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.090 UTC [gossip.comm] Send -> DEBU 5bb2 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:04.090 UTC [msp] DeserializeIdentity -> DEBU 5bb3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.090 UTC [msp] DeserializeIdentity -> DEBU 5bb4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.090 UTC [gossip.comm] sendToEndpoint -> DEBU 5bb5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.090 UTC [gossip.comm] sendToEndpoint -> DEBU 5bb6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.091 UTC [gossip.comm] sendToEndpoint -> DEBU 5bb7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.091 UTC [gossip.comm] sendToEndpoint -> DEBU 5bb8 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.091 UTC [gossip.comm] sendToEndpoint -> DEBU 5bb9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.091 UTC [gossip.comm] sendToEndpoint -> DEBU 5bba Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.091 UTC [msp.identity] Verify -> DEBU 5bbb Verify: digest = 00000000 f2 c6 d9 c5 a2 53 7e 43 60 84 4b cd 73 db dd bc |.....S~C`.K.s...| +peer0.org1.example.com | 00000010 b5 fd b0 85 49 3d 4e 00 5a ed fc c6 dc 58 c2 d1 |....I=N.Z....X..|" +peer0.org1.example.com | "2019-09-24 00:27:04.092 UTC [msp.identity] Verify -> DEBU 5bbc Verify: sig = 00000000 30 45 02 21 00 92 04 7e be d9 04 92 ea e3 c3 83 |0E.!...~........| +peer0.org1.example.com | 00000010 9c a2 31 99 77 85 d5 10 bf 2b db 57 3d 5f 14 6c |..1.w....+.W=_.l| +peer0.org1.example.com | 00000020 ed 19 f6 70 94 02 20 36 a4 48 62 4a 86 71 d5 2e |...p.. 6.HbJ.q..| +peer0.org1.example.com | 00000030 d4 7f bb be 8c c1 bf fd 4c 2b 42 95 f6 51 83 17 |........L+B..Q..| +peer0.org1.example.com | 00000040 54 92 ca e1 7b 70 35 |T...{p5|" +peer0.org1.example.com | "2019-09-24 00:27:04.093 UTC [msp.identity] Verify -> DEBU 5bbd Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +peer0.org1.example.com | 00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +peer0.org1.example.com | "2019-09-24 00:27:04.093 UTC [msp.identity] Verify -> DEBU 5bbe Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +peer0.org1.example.com | 00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +peer0.org1.example.com | 00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +peer0.org1.example.com | 00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +peer0.org1.example.com | 00000040 48 4c 21 8e e5 c8 |HL!...|" +peer0.org1.example.com | "2019-09-24 00:27:04.094 UTC [msp] DeserializeIdentity -> DEBU 5bbf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.094 UTC [msp] DeserializeIdentity -> DEBU 5bc0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.095 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5bc1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:04.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5bc2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.096 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5bc3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.096 UTC [policies] Evaluate -> DEBU 5bc4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.096 UTC [policies] Evaluate -> DEBU 5bc5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.097 UTC [policies] Evaluate -> DEBU 5bc6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.097 UTC [cauthdsl] func1 -> DEBU 5bc7 0xc003c4e2b0 gate 1569284824097934100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.098 UTC [cauthdsl] func2 -> DEBU 5bc8 0xc003c4e2b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.099 UTC [cauthdsl] func2 -> DEBU 5bc9 0xc003c4e2b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.099 UTC [cauthdsl] func2 -> DEBU 5bca 0xc003c4e2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:04.099 UTC [cauthdsl] func2 -> DEBU 5bcb 0xc003c4e2b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.100 UTC [cauthdsl] func1 -> DEBU 5bcc 0xc003c4e2b0 gate 1569284824097934100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.100 UTC [policies] Evaluate -> DEBU 5bcd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.100 UTC [policies] Evaluate -> DEBU 5bce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.100 UTC [policies] Evaluate -> DEBU 5bcf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.101 UTC [cauthdsl] func1 -> DEBU 5bd0 0xc003c4eaf0 gate 1569284824101135500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.101 UTC [cauthdsl] func2 -> DEBU 5bd1 0xc003c4eaf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.101 UTC [cauthdsl] func2 -> DEBU 5bd2 0xc003c4eaf0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.102 UTC [cauthdsl] func2 -> DEBU 5bd3 0xc003c4eaf0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.102 UTC [msp.identity] Verify -> DEBU 5bd4 Verify: digest = 00000000 98 18 01 21 90 b9 27 a0 6e 99 35 bf 62 79 02 ff |...!..'.n.5.by..| +peer0.org1.example.com | 00000010 10 6e c8 51 84 1c ad 30 db 0f ba 96 ce de c4 39 |.n.Q...0.......9|" +peer0.org1.example.com | "2019-09-24 00:27:04.102 UTC [msp.identity] Verify -> DEBU 5bd5 Verify: sig = 00000000 30 44 02 20 60 16 7e 53 50 33 ef 00 be 62 71 de |0D. `.~SP3...bq.| +peer0.org1.example.com | 00000010 d8 8d 4b b6 fe 20 fc 62 69 8f b9 25 e5 1a 95 27 |..K.. .bi..%...'| +peer0.org1.example.com | 00000020 b8 88 a5 e2 02 20 30 ab 51 ca 0d 92 81 93 8f 0b |..... 0.Q.......| +peer0.org1.example.com | 00000030 3b 56 ae 2a d8 56 2c 43 44 ed 48 a1 55 81 f9 a2 |;V.*.V,CD.H.U...| +peer0.org1.example.com | 00000040 df 6a 98 44 02 fb |.j.D..|" +peer0.org1.example.com | "2019-09-24 00:27:04.102 UTC [cauthdsl] func2 -> DEBU 5bd6 0xc003c4eaf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.103 UTC [cauthdsl] func1 -> DEBU 5bd7 0xc003c4eaf0 gate 1569284824101135500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.103 UTC [policies] Evaluate -> DEBU 5bd8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.103 UTC [policies] Evaluate -> DEBU 5bd9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.104 UTC [policies] Evaluate -> DEBU 5bda Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.104 UTC [policies] Evaluate -> DEBU 5bdb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.105 UTC [msp] DeserializeIdentity -> DEBU 5bdc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.105 UTC [msp] DeserializeIdentity -> DEBU 5bdd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.106 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5bde Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:04.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5bdf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5be0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.106 UTC [policies] Evaluate -> DEBU 5be1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.107 UTC [policies] Evaluate -> DEBU 5be2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.107 UTC [policies] Evaluate -> DEBU 5be3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.107 UTC [cauthdsl] func1 -> DEBU 5be4 0xc003dea2c0 gate 1569284824107585800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.107 UTC [cauthdsl] func2 -> DEBU 5be5 0xc003dea2c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.108 UTC [cauthdsl] func2 -> DEBU 5be6 0xc003dea2c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.108 UTC [cauthdsl] func2 -> DEBU 5be7 0xc003dea2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:04.108 UTC [cauthdsl] func2 -> DEBU 5be8 0xc003dea2c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.108 UTC [cauthdsl] func1 -> DEBU 5be9 0xc003dea2c0 gate 1569284824107585800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.108 UTC [policies] Evaluate -> DEBU 5bea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.109 UTC [policies] Evaluate -> DEBU 5beb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.109 UTC [policies] Evaluate -> DEBU 5bec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.109 UTC [cauthdsl] func1 -> DEBU 5bed 0xc003deab00 gate 1569284824109566500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.109 UTC [cauthdsl] func2 -> DEBU 5bee 0xc003deab00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.109 UTC [cauthdsl] func2 -> DEBU 5bef 0xc003deab00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.110 UTC [cauthdsl] func2 -> DEBU 5bf0 0xc003deab00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.110 UTC [msp.identity] Verify -> DEBU 5bf1 Verify: digest = 00000000 b7 0d 4a 43 01 b1 24 4e 5f f6 31 6c 75 2e 04 da |..JC..$N_.1lu...| +peer0.org1.example.com | 00000010 be 2f 20 25 e3 19 5f 7c c0 92 13 ea 49 b5 b0 ec |./ %.._|....I...|" +peer0.org1.example.com | "2019-09-24 00:27:04.110 UTC [msp.identity] Verify -> DEBU 5bf2 Verify: sig = 00000000 30 44 02 20 1d 6d 60 4c 50 0d 21 47 e4 37 6e 23 |0D. .m`LP.!G.7n#| +peer0.org1.example.com | 00000010 f5 01 7c 06 de 61 d2 f9 8d eb 76 a1 56 86 05 18 |..|..a....v.V...| +peer0.org1.example.com | 00000020 5b da 55 47 02 20 10 a8 07 81 b6 df a4 7a 5f ba |[.UG. .......z_.| +peer0.org1.example.com | 00000030 7d a8 33 01 a7 71 1a 8d 4a ac 7b 70 73 ba 8c aa |}.3..q..J.{ps...| +peer0.org1.example.com | 00000040 a6 22 89 49 78 19 |.".Ix.|" +peer0.org1.example.com | "2019-09-24 00:27:04.111 UTC [cauthdsl] func2 -> DEBU 5bf3 0xc003deab00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.111 UTC [cauthdsl] func1 -> DEBU 5bf4 0xc003deab00 gate 1569284824109566500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.111 UTC [policies] Evaluate -> DEBU 5bf5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.111 UTC [policies] Evaluate -> DEBU 5bf6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.111 UTC [policies] Evaluate -> DEBU 5bf7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.112 UTC [policies] Evaluate -> DEBU 5bf8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.112 UTC [msp] DeserializeIdentity -> DEBU 5bf9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.112 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5bfa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.112 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5bfb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.113 UTC [policies] Evaluate -> DEBU 5bfc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.113 UTC [policies] Evaluate -> DEBU 5bfd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.113 UTC [policies] Evaluate -> DEBU 5bfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.113 UTC [cauthdsl] func1 -> DEBU 5bff 0xc003debbe0 gate 1569284824113605800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.113 UTC [cauthdsl] func2 -> DEBU 5c00 0xc003debbe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.113 UTC [cauthdsl] func2 -> DEBU 5c01 0xc003debbe0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.114 UTC [cauthdsl] func2 -> DEBU 5c02 0xc003debbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:04.114 UTC [cauthdsl] func2 -> DEBU 5c03 0xc003debbe0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.115 UTC [cauthdsl] func1 -> DEBU 5c04 0xc003debbe0 gate 1569284824113605800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.115 UTC [policies] Evaluate -> DEBU 5c05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.115 UTC [policies] Evaluate -> DEBU 5c06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.116 UTC [policies] Evaluate -> DEBU 5c07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.116 UTC [cauthdsl] func1 -> DEBU 5c08 0xc003fae420 gate 1569284824116296200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.116 UTC [cauthdsl] func2 -> DEBU 5c09 0xc003fae420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.116 UTC [cauthdsl] func2 -> DEBU 5c0a 0xc003fae420 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.117 UTC [cauthdsl] func2 -> DEBU 5c0b 0xc003fae420 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.117 UTC [msp.identity] Verify -> DEBU 5c0c Verify: digest = 00000000 b7 0d 4a 43 01 b1 24 4e 5f f6 31 6c 75 2e 04 da |..JC..$N_.1lu...| +peer0.org1.example.com | 00000010 be 2f 20 25 e3 19 5f 7c c0 92 13 ea 49 b5 b0 ec |./ %.._|....I...|" +peer0.org1.example.com | "2019-09-24 00:27:04.117 UTC [msp.identity] Verify -> DEBU 5c0d Verify: sig = 00000000 30 44 02 20 1d 6d 60 4c 50 0d 21 47 e4 37 6e 23 |0D. .m`LP.!G.7n#| +peer0.org1.example.com | 00000010 f5 01 7c 06 de 61 d2 f9 8d eb 76 a1 56 86 05 18 |..|..a....v.V...| +peer0.org1.example.com | 00000020 5b da 55 47 02 20 10 a8 07 81 b6 df a4 7a 5f ba |[.UG. .......z_.| +peer0.org1.example.com | 00000030 7d a8 33 01 a7 71 1a 8d 4a ac 7b 70 73 ba 8c aa |}.3..q..J.{ps...| +peer0.org1.example.com | 00000040 a6 22 89 49 78 19 |.".Ix.|" +peer0.org1.example.com | "2019-09-24 00:27:04.118 UTC [cauthdsl] func2 -> DEBU 5c0e 0xc003fae420 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.118 UTC [cauthdsl] func1 -> DEBU 5c0f 0xc003fae420 gate 1569284824116296200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.118 UTC [policies] Evaluate -> DEBU 5c10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.118 UTC [policies] Evaluate -> DEBU 5c11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.119 UTC [policies] Evaluate -> DEBU 5c12 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.119 UTC [policies] Evaluate -> DEBU 5c13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.119 UTC [gossip.gossip] handleMessage -> DEBU 5c14 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.120 UTC [gossip.gossip] handleMessage -> DEBU 5c15 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.120 UTC [msp.identity] Verify -> DEBU 5c16 Verify: digest = 00000000 f2 c6 d9 c5 a2 53 7e 43 60 84 4b cd 73 db dd bc |.....S~C`.K.s...| +peer0.org1.example.com | 00000010 b5 fd b0 85 49 3d 4e 00 5a ed fc c6 dc 58 c2 d1 |....I=N.Z....X..|" +peer0.org1.example.com | "2019-09-24 00:27:04.120 UTC [msp.identity] Verify -> DEBU 5c17 Verify: sig = 00000000 30 45 02 21 00 92 04 7e be d9 04 92 ea e3 c3 83 |0E.!...~........| +peer0.org1.example.com | 00000010 9c a2 31 99 77 85 d5 10 bf 2b db 57 3d 5f 14 6c |..1.w....+.W=_.l| +peer0.org1.example.com | 00000020 ed 19 f6 70 94 02 20 36 a4 48 62 4a 86 71 d5 2e |...p.. 6.HbJ.q..| +peer0.org1.example.com | 00000030 d4 7f bb be 8c c1 bf fd 4c 2b 42 95 f6 51 83 17 |........L+B..Q..| +peer0.org1.example.com | 00000040 54 92 ca e1 7b 70 35 |T...{p5|" +peer0.org1.example.com | "2019-09-24 00:27:04.121 UTC [msp] DeserializeIdentity -> DEBU 5c18 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.121 UTC [msp] DeserializeIdentity -> DEBU 5c19 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.121 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5c1a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:04.121 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c1b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.121 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c1c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.122 UTC [policies] Evaluate -> DEBU 5c1d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.122 UTC [policies] Evaluate -> DEBU 5c1e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.122 UTC [policies] Evaluate -> DEBU 5c1f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.122 UTC [cauthdsl] func1 -> DEBU 5c20 0xc003fc4550 gate 1569284824122720500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.122 UTC [cauthdsl] func2 -> DEBU 5c21 0xc003fc4550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.123 UTC [cauthdsl] func2 -> DEBU 5c22 0xc003fc4550 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.123 UTC [cauthdsl] func2 -> DEBU 5c23 0xc003fc4550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:04.123 UTC [cauthdsl] func2 -> DEBU 5c24 0xc003fc4550 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.123 UTC [cauthdsl] func1 -> DEBU 5c25 0xc003fc4550 gate 1569284824122720500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.124 UTC [policies] Evaluate -> DEBU 5c26 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.124 UTC [policies] Evaluate -> DEBU 5c27 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.124 UTC [policies] Evaluate -> DEBU 5c28 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.125 UTC [cauthdsl] func1 -> DEBU 5c29 0xc003fc4d90 gate 1569284824125355500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.125 UTC [cauthdsl] func2 -> DEBU 5c2a 0xc003fc4d90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.125 UTC [cauthdsl] func2 -> DEBU 5c2b 0xc003fc4d90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.125 UTC [cauthdsl] func2 -> DEBU 5c2c 0xc003fc4d90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.126 UTC [msp.identity] Verify -> DEBU 5c2d Verify: digest = 00000000 98 18 01 21 90 b9 27 a0 6e 99 35 bf 62 79 02 ff |...!..'.n.5.by..| +peer0.org1.example.com | 00000010 10 6e c8 51 84 1c ad 30 db 0f ba 96 ce de c4 39 |.n.Q...0.......9|" +peer0.org1.example.com | "2019-09-24 00:27:04.126 UTC [msp.identity] Verify -> DEBU 5c2e Verify: sig = 00000000 30 44 02 20 60 16 7e 53 50 33 ef 00 be 62 71 de |0D. `.~SP3...bq.| +peer0.org1.example.com | 00000010 d8 8d 4b b6 fe 20 fc 62 69 8f b9 25 e5 1a 95 27 |..K.. .bi..%...'| +peer0.org1.example.com | 00000020 b8 88 a5 e2 02 20 30 ab 51 ca 0d 92 81 93 8f 0b |..... 0.Q.......| +peer0.org1.example.com | 00000030 3b 56 ae 2a d8 56 2c 43 44 ed 48 a1 55 81 f9 a2 |;V.*.V,CD.H.U...| +peer0.org1.example.com | 00000040 df 6a 98 44 02 fb |.j.D..|" +peer0.org1.example.com | "2019-09-24 00:27:04.127 UTC [cauthdsl] func2 -> DEBU 5c2f 0xc003fc4d90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.127 UTC [cauthdsl] func1 -> DEBU 5c30 0xc003fc4d90 gate 1569284824125355500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.127 UTC [policies] Evaluate -> DEBU 5c31 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.127 UTC [policies] Evaluate -> DEBU 5c32 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.127 UTC [policies] Evaluate -> DEBU 5c33 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.128 UTC [policies] Evaluate -> DEBU 5c34 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.128 UTC [msp] DeserializeIdentity -> DEBU 5c35 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.128 UTC [msp] DeserializeIdentity -> DEBU 5c36 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.129 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5c37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:04.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c38 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c39 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.129 UTC [policies] Evaluate -> DEBU 5c3a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.130 UTC [policies] Evaluate -> DEBU 5c3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.130 UTC [policies] Evaluate -> DEBU 5c3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.130 UTC [cauthdsl] func1 -> DEBU 5c3d 0xc0047a8560 gate 1569284824130562000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.130 UTC [cauthdsl] func2 -> DEBU 5c3e 0xc0047a8560 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.130 UTC [cauthdsl] func2 -> DEBU 5c3f 0xc0047a8560 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.131 UTC [cauthdsl] func2 -> DEBU 5c40 0xc0047a8560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:04.131 UTC [cauthdsl] func2 -> DEBU 5c41 0xc0047a8560 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.131 UTC [cauthdsl] func1 -> DEBU 5c42 0xc0047a8560 gate 1569284824130562000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.131 UTC [policies] Evaluate -> DEBU 5c43 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.131 UTC [policies] Evaluate -> DEBU 5c44 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.132 UTC [policies] Evaluate -> DEBU 5c45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.132 UTC [cauthdsl] func1 -> DEBU 5c46 0xc0047a8da0 gate 1569284824132323300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.132 UTC [cauthdsl] func2 -> DEBU 5c47 0xc0047a8da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.132 UTC [cauthdsl] func2 -> DEBU 5c48 0xc0047a8da0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.132 UTC [cauthdsl] func2 -> DEBU 5c49 0xc0047a8da0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.133 UTC [msp.identity] Verify -> DEBU 5c4a Verify: digest = 00000000 ae 5f 75 8f b8 79 6b 9c 07 89 8e 59 2a 45 63 02 |._u..yk....Y*Ec.| +peer0.org1.example.com | 00000010 9e fc 44 09 6f e3 0b 6b b2 c4 8a 32 fa ae 08 15 |..D.o..k...2....|" +peer0.org1.example.com | "2019-09-24 00:27:04.133 UTC [msp.identity] Verify -> DEBU 5c4b Verify: sig = 00000000 30 45 02 21 00 ac 0a c9 b4 53 a1 27 c0 f2 00 68 |0E.!.....S.'...h| +peer0.org1.example.com | 00000010 68 7e a0 00 2f 93 e7 0a a6 e3 81 a9 d3 f9 eb dd |h~../...........| +peer0.org1.example.com | 00000020 97 89 ec 5c e7 02 20 31 be f8 03 6d 39 fd 83 02 |...\.. 1...m9...| +peer0.org1.example.com | 00000030 cb d4 46 a1 d2 8c a1 1c c9 91 16 4b 12 36 36 c1 |..F........K.66.| +peer0.org1.example.com | 00000040 62 ad 3f 03 5c 91 fb |b.?.\..|" +peer0.org1.example.com | "2019-09-24 00:27:04.133 UTC [cauthdsl] func2 -> DEBU 5c4c 0xc0047a8da0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.133 UTC [cauthdsl] func1 -> DEBU 5c4d 0xc0047a8da0 gate 1569284824132323300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.134 UTC [policies] Evaluate -> DEBU 5c4e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.134 UTC [policies] Evaluate -> DEBU 5c4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.134 UTC [policies] Evaluate -> DEBU 5c50 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.134 UTC [policies] Evaluate -> DEBU 5c51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.135 UTC [msp.identity] Verify -> DEBU 5c52 Verify: digest = 00000000 85 34 d6 40 67 ea 72 1d 10 3b be 6d 04 cc ae c8 |.4.@g.r..;.m....| +peer0.org1.example.com | 00000010 6e 72 58 38 b2 f1 d0 a0 ec 17 3e f5 83 c1 ca 51 |nrX8......>....Q|" +peer0.org1.example.com | "2019-09-24 00:27:04.135 UTC [msp.identity] Verify -> DEBU 5c53 Verify: sig = 00000000 30 44 02 20 42 a3 bf 0d bd ec 74 58 00 bc 0d 89 |0D. B.....tX....| +peer0.org1.example.com | 00000010 88 2d df ff 19 ea bf ce b1 fa 08 47 fe 1b 59 37 |.-.........G..Y7| +peer0.org1.example.com | 00000020 d8 7b e3 db 02 20 2f 8c 5d 78 d1 dd 89 53 e2 5a |.{... /.]x...S.Z| +peer0.org1.example.com | 00000030 5f bb 7a c8 db fd 11 56 a7 ee 13 44 33 8b 02 27 |_.z....V...D3..'| +peer0.org1.example.com | 00000040 81 c2 11 ba 3d e1 |....=.|" +peer0.org1.example.com | "2019-09-24 00:27:04.135 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c54 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c55 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.136 UTC [policies] Evaluate -> DEBU 5c56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.136 UTC [policies] Evaluate -> DEBU 5c57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.136 UTC [policies] Evaluate -> DEBU 5c58 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.136 UTC [cauthdsl] func1 -> DEBU 5c59 0xc004c0c4a0 gate 1569284824136843200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.137 UTC [cauthdsl] func2 -> DEBU 5c5a 0xc004c0c4a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.137 UTC [cauthdsl] func2 -> DEBU 5c5b 0xc004c0c4a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.137 UTC [cauthdsl] func2 -> DEBU 5c5c 0xc004c0c4a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.137 UTC [msp.identity] Verify -> DEBU 5c5d Verify: digest = 00000000 85 34 d6 40 67 ea 72 1d 10 3b be 6d 04 cc ae c8 |.4.@g.r..;.m....| +peer0.org1.example.com | 00000010 6e 72 58 38 b2 f1 d0 a0 ec 17 3e f5 83 c1 ca 51 |nrX8......>....Q|" +peer0.org1.example.com | "2019-09-24 00:27:04.137 UTC [msp.identity] Verify -> DEBU 5c5e Verify: sig = 00000000 30 44 02 20 42 a3 bf 0d bd ec 74 58 00 bc 0d 89 |0D. B.....tX....| +peer0.org1.example.com | 00000010 88 2d df ff 19 ea bf ce b1 fa 08 47 fe 1b 59 37 |.-.........G..Y7| +peer0.org1.example.com | 00000020 d8 7b e3 db 02 20 2f 8c 5d 78 d1 dd 89 53 e2 5a |.{... /.]x...S.Z| +peer0.org1.example.com | 00000030 5f bb 7a c8 db fd 11 56 a7 ee 13 44 33 8b 02 27 |_.z....V...D3..'| +peer0.org1.example.com | 00000040 81 c2 11 ba 3d e1 |....=.|" +peer0.org1.example.com | "2019-09-24 00:27:04.138 UTC [cauthdsl] func2 -> DEBU 5c5f 0xc004c0c4a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.138 UTC [cauthdsl] func1 -> DEBU 5c60 0xc004c0c4a0 gate 1569284824136843200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.138 UTC [policies] Evaluate -> DEBU 5c61 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.138 UTC [policies] Evaluate -> DEBU 5c62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.139 UTC [policies] Evaluate -> DEBU 5c63 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.139 UTC [policies] Evaluate -> DEBU 5c64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.139 UTC [gossip.gossip] handleMessage -> DEBU 5c65 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.139 UTC [gossip.gossip] handleMessage -> DEBU 5c66 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.139 UTC [msp] DeserializeIdentity -> DEBU 5c67 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [msp.identity] Verify -> DEBU 5c68 Verify: digest = 00000000 f2 c6 d9 c5 a2 53 7e 43 60 84 4b cd 73 db dd bc |.....S~C`.K.s...| +peer0.org1.example.com | 00000010 b5 fd b0 85 49 3d 4e 00 5a ed fc c6 dc 58 c2 d1 |....I=N.Z....X..|" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [msp.identity] Verify -> DEBU 5c69 Verify: sig = 00000000 30 45 02 21 00 92 04 7e be d9 04 92 ea e3 c3 83 |0E.!...~........| +peer0.org1.example.com | 00000010 9c a2 31 99 77 85 d5 10 bf 2b db 57 3d 5f 14 6c |..1.w....+.W=_.l| +peer0.org1.example.com | 00000020 ed 19 f6 70 94 02 20 36 a4 48 62 4a 86 71 d5 2e |...p.. 6.HbJ.q..| +peer0.org1.example.com | 00000030 d4 7f bb be 8c c1 bf fd 4c 2b 42 95 f6 51 83 17 |........L+B..Q..| +peer0.org1.example.com | 00000040 54 92 ca e1 7b 70 35 |T...{p5|" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [msp.identity] Verify -> DEBU 5c6a Verify: digest = 00000000 85 34 d6 40 67 ea 72 1d 10 3b be 6d 04 cc ae c8 |.4.@g.r..;.m....| +peer0.org1.example.com | 00000010 6e 72 58 38 b2 f1 d0 a0 ec 17 3e f5 83 c1 ca 51 |nrX8......>....Q|" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [msp.identity] Verify -> DEBU 5c6b Verify: sig = 00000000 30 44 02 20 42 a3 bf 0d bd ec 74 58 00 bc 0d 89 |0D. B.....tX....| +peer0.org1.example.com | 00000010 88 2d df ff 19 ea bf ce b1 fa 08 47 fe 1b 59 37 |.-.........G..Y7| +peer0.org1.example.com | 00000020 d8 7b e3 db 02 20 2f 8c 5d 78 d1 dd 89 53 e2 5a |.{... /.]x...S.Z| +peer0.org1.example.com | 00000030 5f bb 7a c8 db fd 11 56 a7 ee 13 44 33 8b 02 27 |_.z....V...D3..'| +peer0.org1.example.com | 00000040 81 c2 11 ba 3d e1 |....=.|" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [msp] DeserializeIdentity -> DEBU 5c6c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [msp] DeserializeIdentity -> DEBU 5c6d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5c6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c6f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c70 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [policies] Evaluate -> DEBU 5c71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [policies] Evaluate -> DEBU 5c72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [policies] Evaluate -> DEBU 5c73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [cauthdsl] func1 -> DEBU 5c74 0xc000398df0 gate 1569284824140803200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [cauthdsl] func2 -> DEBU 5c75 0xc000398df0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [cauthdsl] func2 -> DEBU 5c76 0xc000398df0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [cauthdsl] func2 -> DEBU 5c77 0xc000398df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [cauthdsl] func2 -> DEBU 5c78 0xc000398df0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [cauthdsl] func1 -> DEBU 5c79 0xc000398df0 gate 1569284824140803200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.140 UTC [policies] Evaluate -> DEBU 5c7a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func1 -> DEBU 5c7d 0xc000399630 gate 1569284824141053000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c7e 0xc000399630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c7f 0xc000399630 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c80 0xc000399630 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [msp.identity] Verify -> DEBU 5c81 Verify: digest = 00000000 67 2d ba 2b 43 54 21 87 64 25 50 48 06 88 a5 ba |g-.+CT!.d%PH....| +peer0.org1.example.com | 00000010 28 54 ab 2c b9 73 fc 17 0a 6e ca 81 a2 66 d5 f0 |(T.,.s...n...f..|" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [msp.identity] Verify -> DEBU 5c82 Verify: sig = 00000000 30 44 02 20 61 33 2a eb ac 0c ab c8 3d 66 b0 25 |0D. a3*.....=f.%| +peer0.org1.example.com | 00000010 b4 4b c1 a0 a2 48 06 30 13 0e b9 c9 fd 99 65 b8 |.K...H.0......e.| +peer0.org1.example.com | 00000020 68 17 f2 ab 02 20 1b be 5b 6d 48 e8 d0 78 98 98 |h.... ..[mH..x..| +peer0.org1.example.com | 00000030 31 2d 53 8f 2d 36 22 36 2e 9e ae 27 31 ca 30 e9 |1-S.-6"6...'1.0.| +peer0.org1.example.com | 00000040 7a f1 de b8 0f 0b |z.....|" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c83 0xc000399630 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func1 -> DEBU 5c84 0xc000399630 gate 1569284824141053000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c85 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c87 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [msp] DeserializeIdentity -> DEBU 5c89 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c8a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c8b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c8c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c8d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func1 -> DEBU 5c8f 0xc00259c710 gate 1569284824141651100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c90 0xc00259c710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c91 0xc00259c710 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c92 0xc00259c710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c93 0xc00259c710 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func1 -> DEBU 5c94 0xc00259c710 gate 1569284824141651100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c95 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func1 -> DEBU 5c98 0xc00259cf50 gate 1569284824141901700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c99 0xc00259cf50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c9a 0xc00259cf50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c9b 0xc00259cf50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [msp.identity] Verify -> DEBU 5c9c Verify: digest = 00000000 67 2d ba 2b 43 54 21 87 64 25 50 48 06 88 a5 ba |g-.+CT!.d%PH....| +peer0.org1.example.com | 00000010 28 54 ab 2c b9 73 fc 17 0a 6e ca 81 a2 66 d5 f0 |(T.,.s...n...f..|" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [msp.identity] Verify -> DEBU 5c9d Verify: sig = 00000000 30 44 02 20 61 33 2a eb ac 0c ab c8 3d 66 b0 25 |0D. a3*.....=f.%| +peer0.org1.example.com | 00000010 b4 4b c1 a0 a2 48 06 30 13 0e b9 c9 fd 99 65 b8 |.K...H.0......e.| +peer0.org1.example.com | 00000020 68 17 f2 ab 02 20 1b be 5b 6d 48 e8 d0 78 98 98 |h.... ..[mH..x..| +peer0.org1.example.com | 00000030 31 2d 53 8f 2d 36 22 36 2e 9e ae 27 31 ca 30 e9 |1-S.-6"6...'1.0.| +peer0.org1.example.com | 00000040 7a f1 de b8 0f 0b |z.....|" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5c9e 0xc00259cf50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func1 -> DEBU 5c9f 0xc00259cf50 gate 1569284824141901700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5ca0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5ca1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5ca2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5ca3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [msp] DeserializeIdentity -> DEBU 5ca4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [msp] DeserializeIdentity -> DEBU 5ca5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5ca6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5ca7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5ca8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5ca9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5caa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5cab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func1 -> DEBU 5cac 0xc0027e6720 gate 1569284824142644100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cad 0xc0027e6720 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cae 0xc0027e6720 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5caf 0xc0027e6720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cb0 0xc0027e6720 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func1 -> DEBU 5cb1 0xc0027e6720 gate 1569284824142644100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5cb2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5cb3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5cb4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func1 -> DEBU 5cb5 0xc0027e6f60 gate 1569284824142889300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cb6 0xc0027e6f60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cb7 0xc0027e6f60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cb8 0xc0027e6f60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.143 UTC [msp.identity] Verify -> DEBU 5cb9 Verify: digest = 00000000 b7 0d 4a 43 01 b1 24 4e 5f f6 31 6c 75 2e 04 da |..JC..$N_.1lu...| +peer0.org1.example.com | 00000010 be 2f 20 25 e3 19 5f 7c c0 92 13 ea 49 b5 b0 ec |./ %.._|....I...|" +peer0.org1.example.com | "2019-09-24 00:27:04.143 UTC [msp.identity] Verify -> DEBU 5cba Verify: sig = 00000000 30 44 02 20 1d 6d 60 4c 50 0d 21 47 e4 37 6e 23 |0D. .m`LP.!G.7n#| +peer0.org1.example.com | 00000010 f5 01 7c 06 de 61 d2 f9 8d eb 76 a1 56 86 05 18 |..|..a....v.V...| +peer0.org1.example.com | 00000020 5b da 55 47 02 20 10 a8 07 81 b6 df a4 7a 5f ba |[.UG. .......z_.| +peer0.org1.example.com | 00000030 7d a8 33 01 a7 71 1a 8d 4a ac 7b 70 73 ba 8c aa |}.3..q..J.{ps...| +peer0.org1.example.com | 00000040 a6 22 89 49 78 19 |.".Ix.|" +peer0.org1.example.com | "2019-09-24 00:27:04.143 UTC [cauthdsl] func2 -> DEBU 5cbb 0xc0027e6f60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.143 UTC [cauthdsl] func1 -> DEBU 5cbc 0xc0027e6f60 gate 1569284824142889300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.143 UTC [policies] Evaluate -> DEBU 5cbd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.143 UTC [policies] Evaluate -> DEBU 5cbe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.143 UTC [policies] Evaluate -> DEBU 5cbf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.143 UTC [policies] Evaluate -> DEBU 5cc0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.143 UTC [gossip.gossip] handleMessage -> DEBU 5cc1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.290 UTC [msp] DeserializeIdentity -> DEBU 5cc2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.290 UTC [msp] DeserializeIdentity -> DEBU 5cc3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.291 UTC [gossip.pull] Hello -> DEBU 5cc4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:04.291 UTC [msp] DeserializeIdentity -> DEBU 5cc5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.292 UTC [msp] DeserializeIdentity -> DEBU 5cc6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.292 UTC [gossip.comm] Send -> DEBU 5cc7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:04.292 UTC [gossip.comm] sendToEndpoint -> DEBU 5cc8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.293 UTC [gossip.comm] sendToEndpoint -> DEBU 5cc9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.294 UTC [gossip.comm] func1 -> DEBU 5cca Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.294 UTC [gossip.gossip] handleMessage -> DEBU 5ccb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.295 UTC [gossip.pull] HandleMessage -> DEBU 5ccc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.295 UTC [gossip.gossip] handleMessage -> DEBU 5ccd Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.544 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5cce Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.544 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5ccf Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.544 UTC [policies] Evaluate -> DEBU 5cd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 00:27:04.544 UTC [policies] Evaluate -> DEBU 5cd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.544 UTC [policies] Evaluate -> DEBU 5cd2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.544 UTC [cauthdsl] func1 -> DEBU 5cd3 0xc002b6ee10 gate 1569284824544593900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.544 UTC [cauthdsl] func2 -> DEBU 5cd4 0xc002b6ee10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.544 UTC [cauthdsl] func2 -> DEBU 5cd5 0xc002b6ee10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.544 UTC [cauthdsl] func2 -> DEBU 5cd6 0xc002b6ee10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.545 UTC [msp.identity] Verify -> DEBU 5cd7 Verify: digest = 00000000 d4 73 3d fc 79 2a 2b 5e e8 ca 95 26 14 67 a3 b6 |.s=.y*+^...&.g..| +peer0.org1.example.com | 00000010 eb b8 d3 b5 41 5d 12 f3 9d b8 79 a4 78 57 84 b4 |....A]....y.xW..|" +peer0.org1.example.com | "2019-09-24 00:27:04.545 UTC [msp.identity] Verify -> DEBU 5cd8 Verify: sig = 00000000 30 45 02 21 00 b2 aa e6 75 3f 34 ce b6 6b 43 2e |0E.!....u?4..kC.| +peer0.org1.example.com | 00000010 94 47 b3 9f 04 6d f8 28 2f 85 76 ba ae c0 22 2c |.G...m.(/.v...",| +peer0.org1.example.com | 00000020 c0 8e 56 2a a6 02 20 6c 37 ef 4f 42 4f 56 f9 24 |..V*.. l7.OBOV.$| +peer0.org1.example.com | 00000030 e6 1e 21 f8 32 65 16 46 3f 6e 9c 9a db d0 a0 b1 |..!.2e.F?n......| +peer0.org1.example.com | 00000040 47 ab d7 59 a0 28 21 |G..Y.(!|" +peer0.org1.example.com | "2019-09-24 00:27:04.545 UTC [cauthdsl] func2 -> DEBU 5cd9 0xc002b6ee10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.545 UTC [cauthdsl] func1 -> DEBU 5cda 0xc002b6ee10 gate 1569284824544593900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.545 UTC [policies] Evaluate -> DEBU 5cdb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:27:04.545 UTC [policies] Evaluate -> DEBU 5cdc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:27:04.545 UTC [policies] Evaluate -> DEBU 5cdd Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:27:04.545 UTC [policies] Evaluate -> DEBU 5cde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:27:04.545 UTC [blocksProvider] DeliverBlocks -> DEBU 5cdf [businesschannel] Adding payload to local buffer, blockNum = [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.546 UTC [gossip.state] addPayload -> DEBU 5ce0 [businesschannel] Adding payload to local buffer, blockNum = [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.546 UTC [gossip.state] addPayload -> DEBU 5ce1 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-09-24 00:27:04.546 UTC [blocksProvider] DeliverBlocks -> DEBU 5ce2 [businesschannel] Gossiping block [5], peers number [3]" +peer0.org1.example.com | "2019-09-24 00:27:04.546 UTC [gossip.channel] AddToMsgStore -> DEBU 5ce3 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 5}, Envelope: 4036 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 00:27:04.546 UTC [gossip.pull] Add -> DEBU 5ce4 Added 5, total items: 5" +peer0.org1.example.com | "2019-09-24 00:27:04.546 UTC [gossip.state] deliverPayloads -> DEBU 5ce5 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.546 UTC [gossip.state] deliverPayloads -> DEBU 5ce6 [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 00:27:04.546 UTC [gossip.privdata] StoreBlock -> INFO 5ce7 [businesschannel] Received block [5] from buffer" +peer0.org1.example.com | "2019-09-24 00:27:04.547 UTC [gossip.privdata] StoreBlock -> DEBU 5ce8 [businesschannel] Validating block [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.547 UTC [committer.txvalidator] Validate -> DEBU 5ce9 [businesschannel] START Block Validation for block [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.547 UTC [committer.txvalidator] Validate -> DEBU 5cea expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 00:27:04.547 UTC [committer.txvalidator] validateTx -> DEBU 5ceb [businesschannel] validateTx starts for block 0xc003559a40 env 0xc0037e1720 txn 0" +peer0.org1.example.com | "2019-09-24 00:27:04.548 UTC [protoutils] ValidateTransaction -> DEBU 5cec ValidateTransactionEnvelope starts for envelope 0xc0037e1720" +peer0.org1.example.com | "2019-09-24 00:27:04.548 UTC [protoutils] ValidateTransaction -> DEBU 5ced Header is channel_header:"\010\003\032\014\010\326\305\245\354\005\020\374\361\251\352\001\"\017businesschannel*@315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\361L\027|\265\266fls\342\256\205\260\360\006I]\312\365A\236\367\325\214" " +peer0.org1.example.com | "2019-09-24 00:27:04.548 UTC [protoutils] validateChannelHeader -> DEBU 5cee validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:04.548 UTC [protoutils] checkSignatureFromCreator -> DEBU 5cef begin" +peer0.org1.example.com | "2019-09-24 00:27:04.548 UTC [msp] GetManagerForChain -> DEBU 5cf0 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:04.548 UTC [protoutils] checkSignatureFromCreator -> DEBU 5cf1 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-09-24 00:27:04.549 UTC [protoutils] checkSignatureFromCreator -> DEBU 5cf2 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:04.549 UTC [msp.identity] Verify -> DEBU 5cf3 Verify: digest = 00000000 fc be 8d 27 f2 77 89 7c 99 cc 04 4a 85 f8 8d 65 |...'.w.|...J...e| +peer0.org1.example.com | 00000010 2a 53 4d f7 97 3d b1 11 dc 3d 62 61 a9 f1 4e 09 |*SM..=...=ba..N.|" +peer0.org1.example.com | "2019-09-24 00:27:04.549 UTC [msp.identity] Verify -> DEBU 5cf4 Verify: sig = 00000000 30 45 02 21 00 f7 0b fd 05 a4 5e 7c 76 e3 68 36 |0E.!......^|v.h6| +peer0.org1.example.com | 00000010 9b e8 3b 60 20 a4 c6 aa c5 1c 7f 38 32 4c a8 0e |..;` ......82L..| +peer0.org1.example.com | 00000020 0a c1 65 d7 de 02 20 33 73 0f 80 ff 95 92 a0 ee |..e... 3s.......| +peer0.org1.example.com | 00000030 0a 53 bc 4b 12 a0 42 40 b9 b9 b3 1d ba ea 5c 46 |.S.K..B@......\F| +peer0.org1.example.com | 00000040 0f 1e 77 3f ef 13 c6 |..w?...|" +peer0.org1.example.com | "2019-09-24 00:27:04.550 UTC [protoutils] checkSignatureFromCreator -> DEBU 5cf5 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:04.550 UTC [protoutils] validateEndorserTransaction -> DEBU 5cf6 validateEndorserTransaction starts for data 0xc003c0d000, header channel_header:"\010\003\032\014\010\326\305\245\354\005\020\374\361\251\352\001\"\017businesschannel*@315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\361L\027|\265\266fls\342\256\205\260\360\006I]\312\365A\236\367\325\214" " +peer0.org1.example.com | "2019-09-24 00:27:04.550 UTC [protoutils] validateEndorserTransaction -> DEBU 5cf7 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-09-24 00:27:04.550 UTC [protoutils] validateEndorserTransaction -> DEBU 5cf8 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-09-24 00:27:04.550 UTC [protoutils] ValidateTransaction -> DEBU 5cf9 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-09-24 00:27:04.552 UTC [committer.txvalidator] validateTx -> DEBU 5cfb Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:04.552 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5cfc retrieveTransactionByID() - txId = [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0]" +peer0.org1.example.com | "2019-09-24 00:27:04.552 UTC [committer.txvalidator] validateTx -> DEBU 5cfd Validating transaction vscc tx validate" +peer0.org1.example.com | "2019-09-24 00:27:04.552 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 5cfe [businesschannel] VSCCValidateTx starts for bytes 0xc004113400" +peer0.org1.example.com | "2019-09-24 00:27:04.552 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5cff constructing new query executor txid = [2ff84693-5f50-42bf-9b6e-dee29c390ae1]" +peer0.org1.example.com | "2019-09-24 00:27:04.554 UTC [stateleveldb] GetState -> DEBU 5d00 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:04.554 UTC [lockbasedtxmgr] Done -> DEBU 5d01 Done with transaction simulation / query execution [2ff84693-5f50-42bf-9b6e-dee29c390ae1]" +peer0.org1.example.com | "2019-09-24 00:27:04.554 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 5d02 Validating Tx 315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-09-24 00:27:04.555 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5d03 constructing new query executor txid = [f4b3903f-ed02-4585-a8b2-3a119af01b62]" +peer0.org1.example.com | "2019-09-24 00:27:04.555 UTC [lockbasedtxmgr] Done -> DEBU 5d04 Done with transaction simulation / query execution [f4b3903f-ed02-4585-a8b2-3a119af01b62]" +peer0.org1.example.com | "2019-09-24 00:27:04.555 UTC [cauthdsl] func1 -> DEBU 5d05 0xc0030cfef0 gate 1569284824555355100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.555 UTC [cauthdsl] func2 -> DEBU 5d06 0xc0030cfef0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.555 UTC [cauthdsl] func2 -> DEBU 5d07 0xc0030cfef0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.555 UTC [cauthdsl] func2 -> DEBU 5d08 0xc0030cfef0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.555 UTC [msp.identity] Verify -> DEBU 5d09 Verify: digest = 00000000 ed ce 66 c5 9d 53 95 83 15 5c f8 d9 44 f2 5b ce |..f..S...\..D.[.| +peer0.org1.example.com | 00000010 04 b7 c3 db 70 a9 b1 8a 71 3f d3 7b 84 5e 79 81 |....p...q?.{.^y.|" +peer0.org1.example.com | "2019-09-24 00:27:04.555 UTC [msp.identity] Verify -> DEBU 5d0a Verify: sig = 00000000 30 44 02 20 33 74 98 58 ba c1 23 d2 62 d9 b8 95 |0D. 3t.X..#.b...| +peer0.org1.example.com | 00000010 ad ae 59 cb 7e 3c 9b c8 36 9a ad 0d 3c b0 84 91 |..Y.~<..6...<...| +peer0.org1.example.com | 00000020 f5 6b 0a a9 02 20 05 8f 71 3d df 46 9b fd 7c 01 |.k... ..q=.F..|.| +peer0.org1.example.com | 00000030 48 73 88 23 9c f3 12 9d 5d 9f ff d4 cf c0 eb b6 |Hs.#....].......| +peer0.org1.example.com | 00000040 43 19 3a 30 6c cb |C.:0l.|" +peer0.org1.example.com | "2019-09-24 00:27:04.556 UTC [cauthdsl] func2 -> DEBU 5d0b 0xc0030cfef0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.556 UTC [cauthdsl] func2 -> DEBU 5d0c 0xc0030cfef0 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-09-24 00:27:04.556 UTC [cauthdsl] func2 -> DEBU 5d0d 0xc0030cfef0 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-09-24 00:27:04.556 UTC [cauthdsl] func2 -> DEBU 5d0e 0xc0030cfef0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.556 UTC [cauthdsl] func1 -> DEBU 5d0f 0xc0030cfef0 gate 1569284824555355100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.556 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5d10 constructing new query executor txid = [a2104488-70d6-4986-87fa-9709b1cac1d3]" +peer0.org1.example.com | "2019-09-24 00:27:04.556 UTC [lockbasedtxmgr] Done -> DEBU 5d11 Done with transaction simulation / query execution [a2104488-70d6-4986-87fa-9709b1cac1d3]" +peer0.org1.example.com | "2019-09-24 00:27:04.552 UTC [msp] DeserializeIdentity -> DEBU 5cfa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.556 UTC [msp] DeserializeIdentity -> DEBU 5d13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.557 UTC [msp] DeserializeIdentity -> DEBU 5d14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.557 UTC [msp] DeserializeIdentity -> DEBU 5d15 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.556 UTC [vscc] Validate -> DEBU 5d12 block 5, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-09-24 00:27:04.558 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 5d16 Transaction 315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0 appears to be valid" +peer0.org1.example.com | "2019-09-24 00:27:04.558 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 5d17 [businesschannel] VSCCValidateTx completes env bytes 0xc004113400" +peer0.org1.example.com | "2019-09-24 00:27:04.558 UTC [committer.txvalidator] validateTx -> DEBU 5d18 [businesschannel] validateTx completes for block 0xc003559a40 env 0xc0037e1720 txn 0" +peer0.org1.example.com | "2019-09-24 00:27:04.558 UTC [committer.txvalidator] Validate -> DEBU 5d19 got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 00:27:04.558 UTC [committer.txvalidator] Validate -> INFO 5d1a [businesschannel] Validated block [5] in 11ms" +peer0.org1.example.com | "2019-09-24 00:27:04.559 UTC [gossip.privdata] listMissingPrivateData -> DEBU 5d1b Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 00:27:04.559 UTC [gossip.privdata] StoreBlock -> DEBU 5d1c [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 00:27:04.559 UTC [kvledger] CommitWithPvtData -> DEBU 5d1d [businesschannel] Validating state for block [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5d1e Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5d1f lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5d20 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5d21 ValidateAndPrepareBatch() for block number = [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5d22 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [valimpl] preprocessProtoBlock -> DEBU 5d23 txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [stateleveldb] GetState -> DEBU 5d24 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [statebasedval] validateKVRead -> DEBU 5d25 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [stateleveldb] GetState -> DEBU 5d26 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [statebasedval] validateKVRead -> DEBU 5d27 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [stateleveldb] GetState -> DEBU 5d28 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [statebasedval] validateKVRead -> DEBU 5d29 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 5d2a Block [5] Transaction index [0] TxId [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [valinternal] ApplyWriteSet -> DEBU 5d2b txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0038f0a00), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0038f0a40)}" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5d2c validating rwset..." +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5d2d postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5d2e ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [kvledger] CommitWithPvtData -> DEBU 5d2f [businesschannel] Adding CommitHash to the block [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [kvledger] CommitWithPvtData -> DEBU 5d30 [businesschannel] Committing block [5] to storage" +peer0.org1.example.com | "2019-09-24 00:27:04.560 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5d31 Writing block [5] to pvt block store" +peer0.org1.example.com | "2019-09-24 00:27:04.561 UTC [gossip.comm] Send -> DEBU 5d32 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 5}, Envelope: 4036 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:04.561 UTC [msp] DeserializeIdentity -> DEBU 5d33 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.561 UTC [msp] DeserializeIdentity -> DEBU 5d34 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.561 UTC [gossip.comm] sendToEndpoint -> DEBU 5d35 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 5}, Envelope: 4036 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.561 UTC [gossip.comm] sendToEndpoint -> DEBU 5d36 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.568 UTC [pvtdatastorage] Prepare -> DEBU 5d37 Saved 0 private data write sets for block [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.578 UTC [fsblkstorage] indexBlock -> DEBU 5d38 Indexing block [blockNum=5, blockHash=[]byte{0x7d, 0x35, 0x9, 0x46, 0xf2, 0x7d, 0x8b, 0xf0, 0x5f, 0x8e, 0xd9, 0xe3, 0x87, 0xa0, 0x69, 0x5, 0xf1, 0x81, 0xfa, 0x34, 0xce, 0x83, 0x96, 0x8, 0x2e, 0xb2, 0x87, 0x9e, 0x15, 0xec, 0x79, 0xc3} txOffsets= +peer0.org1.example.com | txId=315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0 locPointer=offset=70, bytesLength=2985 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 00:27:04.581 UTC [fsblkstorage] indexBlock -> DEBU 5d39 Adding txLoc [fileSuffixNum=0, offset=80127, bytesLength=2985] for tx ID: [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0] to txid-index" +peer0.org1.example.com | "2019-09-24 00:27:04.581 UTC [fsblkstorage] indexBlock -> DEBU 5d3a Adding txLoc [fileSuffixNum=0, offset=80127, bytesLength=2985] for tx number:[0] ID: [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 00:27:04.583 UTC [gossip.comm] func1 -> DEBU 5d3b Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.585 UTC [gossip.gossip] handleMessage -> DEBU 5d3c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.585 UTC [msp] DeserializeIdentity -> DEBU 5d3d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.586 UTC [msp] DeserializeIdentity -> DEBU 5d3f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.586 UTC [gossip.gossip] handleMessage -> DEBU 5d40 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.585 UTC [fsblkstorage] updateCheckpoint -> DEBU 5d3e Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84085], isChainEmpty=[false], lastBlockNumber=[5]" +peer0.org1.example.com | "2019-09-24 00:27:04.587 UTC [pvtdatastorage] Commit -> DEBU 5d41 Committing private data for block [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.588 UTC [gossip.comm] func1 -> DEBU 5d42 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.588 UTC [gossip.gossip] handleMessage -> DEBU 5d43 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.588 UTC [msp.identity] Verify -> DEBU 5d44 Verify: digest = 00000000 85 34 d6 40 67 ea 72 1d 10 3b be 6d 04 cc ae c8 |.4.@g.r..;.m....| +peer0.org1.example.com | 00000010 6e 72 58 38 b2 f1 d0 a0 ec 17 3e f5 83 c1 ca 51 |nrX8......>....Q|" +peer0.org1.example.com | "2019-09-24 00:27:04.589 UTC [msp.identity] Verify -> DEBU 5d45 Verify: sig = 00000000 30 44 02 20 42 a3 bf 0d bd ec 74 58 00 bc 0d 89 |0D. B.....tX....| +peer0.org1.example.com | 00000010 88 2d df ff 19 ea bf ce b1 fa 08 47 fe 1b 59 37 |.-.........G..Y7| +peer0.org1.example.com | 00000020 d8 7b e3 db 02 20 2f 8c 5d 78 d1 dd 89 53 e2 5a |.{... /.]x...S.Z| +peer0.org1.example.com | 00000030 5f bb 7a c8 db fd 11 56 a7 ee 13 44 33 8b 02 27 |_.z....V...D3..'| +peer0.org1.example.com | 00000040 81 c2 11 ba 3d e1 |....=.|" +peer0.org1.example.com | "2019-09-24 00:27:04.590 UTC [gossip.gossip] handleMessage -> DEBU 5d46 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.590 UTC [pvtdatastorage] Commit -> DEBU 5d47 Committed private data for block [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.590 UTC [kvledger] CommitWithPvtData -> DEBU 5d48 [businesschannel] Committing block [5] transactions to state database" +peer0.org1.example.com | "2019-09-24 00:27:04.591 UTC [lockbasedtxmgr] Commit -> DEBU 5d49 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 00:27:04.592 UTC [lockbasedtxmgr] Commit -> DEBU 5d4a Committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:27:04.592 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5d4b Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 00:27:04.592 UTC [lockbasedtxmgr] Commit -> DEBU 5d4c Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:27:04.592 UTC [gossip.gossip] handleMessage -> DEBU 5d4e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.593 UTC [msp.identity] Verify -> DEBU 5d50 Verify: digest = 00000000 85 34 d6 40 67 ea 72 1d 10 3b be 6d 04 cc ae c8 |.4.@g.r..;.m....| +peer0.org1.example.com | 00000010 6e 72 58 38 b2 f1 d0 a0 ec 17 3e f5 83 c1 ca 51 |nrX8......>....Q|" +peer0.org1.example.com | "2019-09-24 00:27:04.593 UTC [msp.identity] Verify -> DEBU 5d51 Verify: sig = 00000000 30 44 02 20 42 a3 bf 0d bd ec 74 58 00 bc 0d 89 |0D. B.....tX....| +peer0.org1.example.com | 00000010 88 2d df ff 19 ea bf ce b1 fa 08 47 fe 1b 59 37 |.-.........G..Y7| +peer0.org1.example.com | 00000020 d8 7b e3 db 02 20 2f 8c 5d 78 d1 dd 89 53 e2 5a |.{... /.]x...S.Z| +peer0.org1.example.com | 00000030 5f bb 7a c8 db fd 11 56 a7 ee 13 44 33 8b 02 27 |_.z....V...D3..'| +peer0.org1.example.com | 00000040 81 c2 11 ba 3d e1 |....=.|" +peer0.org1.example.com | "2019-09-24 00:27:04.592 UTC [stateleveldb] ApplyUpdates -> DEBU 5d4f Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-09-24 00:27:04.595 UTC [stateleveldb] ApplyUpdates -> DEBU 5d53 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-09-24 00:27:04.592 UTC [msp] GetDefaultSigningIdentity -> DEBU 5d4d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:04.596 UTC [msp.identity] Sign -> DEBU 5d54 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104B " +peer0.org1.example.com | "2019-09-24 00:27:04.596 UTC [msp.identity] Sign -> DEBU 5d55 Sign: digest: EC3B23D7E20E4325E42CA960FE0CE5C8C8EA96254480A358B03F9F43C710DAF6 " +peer0.org1.example.com | "2019-09-24 00:27:04.596 UTC [msp] GetDefaultSigningIdentity -> DEBU 5d56 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:04.597 UTC [msp.identity] Sign -> DEBU 5d57 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:04.597 UTC [msp.identity] Sign -> DEBU 5d58 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:04.598 UTC [gossip.discovery] periodicalSendAlive -> DEBU 5d59 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:27:04.598 UTC [lockbasedtxmgr] Commit -> DEBU 5d5a Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 00:27:04.598 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5d5b Preparing potential purge list working-set for expiringAtBlk [6]" +peer0.org1.example.com | "2019-09-24 00:27:04.598 UTC [msp] DeserializeIdentity -> DEBU 5d5c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.598 UTC [leveldbhelper] GetIterator -> DEBU 5d5d Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" +peer0.org1.example.com | "2019-09-24 00:27:04.599 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5d5e No expiry entry found for expiringAtBlk [6]" +peer0.org1.example.com | "2019-09-24 00:27:04.599 UTC [msp] DeserializeIdentity -> DEBU 5d5f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.599 UTC [lockbasedtxmgr] func1 -> DEBU 5d60 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 00:27:04.599 UTC [kvledger] CommitWithPvtData -> DEBU 5d61 [businesschannel] Committing block [5] transactions to history database" +peer0.org1.example.com | "2019-09-24 00:27:04.600 UTC [historyleveldb] Commit -> DEBU 5d63 Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" +peer0.org1.example.com | "2019-09-24 00:27:04.599 UTC [gossip.comm] Send -> DEBU 5d62 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:04.600 UTC [msp] DeserializeIdentity -> DEBU 5d64 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.600 UTC [gossip.comm] Send -> DEBU 5d65 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:04.601 UTC [msp] DeserializeIdentity -> DEBU 5d66 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.601 UTC [gossip.comm] Send -> DEBU 5d67 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:04.602 UTC [gossip.comm] sendToEndpoint -> DEBU 5d68 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.602 UTC [gossip.comm] sendToEndpoint -> DEBU 5d6a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.602 UTC [gossip.comm] sendToEndpoint -> DEBU 5d6b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.602 UTC [gossip.comm] sendToEndpoint -> DEBU 5d6c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.595 UTC [msp] DeserializeIdentity -> DEBU 5d52 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.602 UTC [gossip.gossip] handleMessage -> DEBU 5d6d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.602 UTC [historyleveldb] Commit -> DEBU 5d69 Channel [businesschannel]: Updates committed to history database for blockNo [5]" +peer0.org1.example.com | "2019-09-24 00:27:04.602 UTC [kvledger] CommitWithPvtData -> INFO 5d6f [businesschannel] Committed block [5] with 1 transaction(s) in 43ms (state_validation=0ms block_and_pvtdata_commit=29ms state_commit=8ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer0.org1.example.com | "2019-09-24 00:27:04.603 UTC [msp] GetDefaultSigningIdentity -> DEBU 5d70 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:04.603 UTC [msp.identity] Sign -> DEBU 5d71 Sign: plaintext: 18057A6C1214089096D4ACDE83CEE315...08061A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-09-24 00:27:04.604 UTC [msp.identity] Sign -> DEBU 5d72 Sign: digest: D7769BF2CD78E41422E1483EE1C3F075AEABE38984003CA20CB8827213EDDFB2 " +peer0.org1.example.com | "2019-09-24 00:27:04.604 UTC [gossip.state] commitBlock -> DEBU 5d73 [businesschannel] Committed block [5] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 00:27:04.602 UTC [gossip.comm] sendToEndpoint -> DEBU 5d6e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.604 UTC [gossip.comm] sendToEndpoint -> DEBU 5d74 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.768 UTC [gossip.comm] func1 -> DEBU 5d75 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.768 UTC [gossip.gossip] handleMessage -> DEBU 5d76 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.768 UTC [gossip.gossip] handleMessage -> DEBU 5d77 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.768 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5d78 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.769 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5d79 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:04.769 UTC [msp] DeserializeIdentity -> DEBU 5d7a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5d7b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:04.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5d7c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5d7d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.769 UTC [policies] Evaluate -> DEBU 5d7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.769 UTC [policies] Evaluate -> DEBU 5d7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.769 UTC [policies] Evaluate -> DEBU 5d80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.770 UTC [cauthdsl] func1 -> DEBU 5d81 0xc0041002b0 gate 1569284824770088600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.770 UTC [cauthdsl] func2 -> DEBU 5d82 0xc0041002b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.770 UTC [cauthdsl] func2 -> DEBU 5d83 0xc0041002b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.770 UTC [cauthdsl] func2 -> DEBU 5d84 0xc0041002b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:04.771 UTC [cauthdsl] func2 -> DEBU 5d85 0xc0041002b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.771 UTC [cauthdsl] func1 -> DEBU 5d86 0xc0041002b0 gate 1569284824770088600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.771 UTC [policies] Evaluate -> DEBU 5d87 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.771 UTC [policies] Evaluate -> DEBU 5d88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.771 UTC [policies] Evaluate -> DEBU 5d89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.771 UTC [cauthdsl] func1 -> DEBU 5d8a 0xc004100af0 gate 1569284824771587400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.771 UTC [cauthdsl] func2 -> DEBU 5d8b 0xc004100af0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.772 UTC [cauthdsl] func2 -> DEBU 5d8c 0xc004100af0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.772 UTC [cauthdsl] func2 -> DEBU 5d8d 0xc004100af0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.772 UTC [msp.identity] Verify -> DEBU 5d8e Verify: digest = 00000000 a9 25 c4 e0 3b 99 2c 11 f0 33 72 f3 49 a6 0c ee |.%..;.,..3r.I...| +peer0.org1.example.com | 00000010 3c 6f 30 32 48 c3 a4 dc c5 63 30 bf 0c bb 09 9a | DEBU 5d8f Verify: sig = 00000000 30 44 02 20 37 f6 71 11 70 ac 50 7b 4c 64 f9 15 |0D. 7.q.p.P{Ld..| +peer0.org1.example.com | 00000010 6e 2a 4b 40 f4 ce fc d7 2d 30 5f c2 b9 92 22 bc |n*K@....-0_...".| +peer0.org1.example.com | 00000020 c1 2f 02 94 02 20 62 17 6a d3 12 7a 20 69 e3 75 |./... b.j..z i.u| +peer0.org1.example.com | 00000030 74 f7 48 b1 09 31 af d3 c3 7f 86 00 19 37 a8 14 |t.H..1.......7..| +peer0.org1.example.com | 00000040 b3 a0 35 47 5e 7e |..5G^~|" +peer0.org1.example.com | "2019-09-24 00:27:04.773 UTC [cauthdsl] func2 -> DEBU 5d90 0xc004100af0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.773 UTC [cauthdsl] func1 -> DEBU 5d91 0xc004100af0 gate 1569284824771587400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.773 UTC [policies] Evaluate -> DEBU 5d92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.773 UTC [policies] Evaluate -> DEBU 5d93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.773 UTC [policies] Evaluate -> DEBU 5d94 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.773 UTC [policies] Evaluate -> DEBU 5d95 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 5d96 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5d97 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:04.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5d98 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:04.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5d99 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:04.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5d9a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:04.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5d9b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.774 UTC [gossip.discovery] handleAliveMessage -> DEBU 5d9c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.774 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5d9d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.775 UTC [gossip.discovery] sendMemResponse -> DEBU 5d9e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:27:04.775 UTC [msp] DeserializeIdentity -> DEBU 5d9f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.776 UTC [msp] DeserializeIdentity -> DEBU 5da0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.776 UTC [msp] DeserializeIdentity -> DEBU 5da1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.776 UTC [gossip.comm] Send -> DEBU 5da2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:04.778 UTC [gossip.discovery] sendMemResponse -> DEBU 5da3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020N" signature:"0D\002 x\330\001\204\035\037\006j\025\227\264\226TI\220\032=\307g>\2145\007\227\365\340j/\312A\307\264\002 m\3139Uo\233\246Zv\276\334\242Z\033\320U\251cZ\226KK\264\214\2057z}\363\211\2003" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:04.778 UTC [gossip.comm] sendToEndpoint -> DEBU 5da4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.778 UTC [gossip.comm] sendToEndpoint -> DEBU 5da5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.817 UTC [gossip.comm] func1 -> DEBU 5da6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.819 UTC [gossip.gossip] handleMessage -> DEBU 5da7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.819 UTC [gossip.pull] HandleMessage -> DEBU 5da8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.820 UTC [msp] DeserializeIdentity -> DEBU 5da9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.820 UTC [msp] DeserializeIdentity -> DEBU 5daa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.820 UTC [msp] DeserializeIdentity -> DEBU 5dab Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.821 UTC [msp] DeserializeIdentity -> DEBU 5dac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.821 UTC [msp] DeserializeIdentity -> DEBU 5dad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.821 UTC [msp] DeserializeIdentity -> DEBU 5dae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.822 UTC [gossip.pull] SendDigest -> DEBU 5daf Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:27:04.822 UTC [gossip.gossip] handleMessage -> DEBU 5db0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.838 UTC [gossip.comm] func1 -> DEBU 5db1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.838 UTC [gossip.gossip] handleMessage -> DEBU 5db2 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.838 UTC [gossip.pull] HandleMessage -> DEBU 5db3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.839 UTC [gossip.pull] SendDigest -> DEBU 5db4 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:04.839 UTC [gossip.gossip] handleMessage -> DEBU 5db5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.898 UTC [endorser] ProcessProposal -> DEBU 5db6 Entering: request from 172.18.0.9:51006" +peer0.org1.example.com | "2019-09-24 00:27:04.898 UTC [protoutils] ValidateProposalMessage -> DEBU 5db7 ValidateProposalMessage starts for signed proposal 0xc0038a2730" +peer0.org1.example.com | "2019-09-24 00:27:04.898 UTC [protoutils] validateChannelHeader -> DEBU 5db8 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:04.899 UTC [protoutils] checkSignatureFromCreator -> DEBU 5db9 begin" +peer0.org1.example.com | "2019-09-24 00:27:04.899 UTC [msp] GetManagerForChain -> DEBU 5dba Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:04.899 UTC [protoutils] checkSignatureFromCreator -> DEBU 5dbb creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:04.899 UTC [protoutils] checkSignatureFromCreator -> DEBU 5dbc creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:04.900 UTC [msp.identity] Verify -> DEBU 5dbd Verify: digest = 00000000 25 23 13 4c 9f f3 dc 59 34 a3 4f 64 8e 43 e6 59 |%#.L...Y4.Od.C.Y| +peer0.org1.example.com | 00000010 45 a1 7b 15 2d c6 44 af 16 4b e2 98 f3 3f ec ed |E.{.-.D..K...?..|" +peer0.org1.example.com | "2019-09-24 00:27:04.900 UTC [msp.identity] Verify -> DEBU 5dbe Verify: sig = 00000000 30 45 02 21 00 d8 99 38 ea 22 5d 19 23 f5 88 58 |0E.!...8."].#..X| +peer0.org1.example.com | 00000010 46 2d 92 8b 9e f6 55 48 cf 98 23 55 08 c6 68 14 |F-....UH..#U..h.| +peer0.org1.example.com | 00000020 37 f6 f5 8e 4f 02 20 25 e3 56 0a 93 1b 03 03 5d |7...O. %.V.....]| +peer0.org1.example.com | 00000030 61 ed 8e 84 b2 2b 79 a8 cc 16 35 de 0e 95 c0 36 |a....+y...5....6| +peer0.org1.example.com | 00000040 a6 3c 0d 8b b9 86 9a |.<.....|" +peer0.org1.example.com | "2019-09-24 00:27:04.900 UTC [protoutils] checkSignatureFromCreator -> DEBU 5dbf exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:04.901 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5dc0 validateChaincodeProposalMessage starts for proposal 0xc002b3d570, header 0xc0038a2b90" +peer0.org1.example.com | "2019-09-24 00:27:04.901 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5dc1 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:04.901 UTC [endorser] preProcess -> DEBU 5dc2 [businesschannel][0c3f7bfd] processing txid: 0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60" +peer0.org1.example.com | "2019-09-24 00:27:04.901 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5dc3 retrieveTransactionByID() - txId = [0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60]" +peer0.org1.example.com | "2019-09-24 00:27:04.901 UTC [aclmgmt] CheckACL -> DEBU 5dc4 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 00:27:04.902 UTC [aclmgmt] CheckACL -> DEBU 5dc5 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 00:27:04.902 UTC [policies] Evaluate -> DEBU 5dc6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.902 UTC [policies] Evaluate -> DEBU 5dc7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.902 UTC [policies] Evaluate -> DEBU 5dc8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.903 UTC [cauthdsl] func1 -> DEBU 5dc9 0xc002982e10 gate 1569284824903270500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.903 UTC [cauthdsl] func2 -> DEBU 5dca 0xc002982e10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.904 UTC [cauthdsl] func2 -> DEBU 5dcb 0xc002982e10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.904 UTC [cauthdsl] func2 -> DEBU 5dcc 0xc002982e10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.904 UTC [msp.identity] Verify -> DEBU 5dcd Verify: digest = 00000000 25 23 13 4c 9f f3 dc 59 34 a3 4f 64 8e 43 e6 59 |%#.L...Y4.Od.C.Y| +peer0.org1.example.com | 00000010 45 a1 7b 15 2d c6 44 af 16 4b e2 98 f3 3f ec ed |E.{.-.D..K...?..|" +peer0.org1.example.com | "2019-09-24 00:27:04.904 UTC [msp.identity] Verify -> DEBU 5dce Verify: sig = 00000000 30 45 02 21 00 d8 99 38 ea 22 5d 19 23 f5 88 58 |0E.!...8."].#..X| +peer0.org1.example.com | 00000010 46 2d 92 8b 9e f6 55 48 cf 98 23 55 08 c6 68 14 |F-....UH..#U..h.| +peer0.org1.example.com | 00000020 37 f6 f5 8e 4f 02 20 25 e3 56 0a 93 1b 03 03 5d |7...O. %.V.....]| +peer0.org1.example.com | 00000030 61 ed 8e 84 b2 2b 79 a8 cc 16 35 de 0e 95 c0 36 |a....+y...5....6| +peer0.org1.example.com | 00000040 a6 3c 0d 8b b9 86 9a |.<.....|" +peer0.org1.example.com | "2019-09-24 00:27:04.905 UTC [cauthdsl] func2 -> DEBU 5dcf 0xc002982e10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.905 UTC [cauthdsl] func1 -> DEBU 5dd0 0xc002982e10 gate 1569284824903270500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.905 UTC [policies] Evaluate -> DEBU 5dd1 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:04.905 UTC [policies] Evaluate -> DEBU 5dd2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:04.906 UTC [policies] Evaluate -> DEBU 5dd3 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:04.906 UTC [policies] Evaluate -> DEBU 5dd4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:04.906 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5dd5 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:27:04.906 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5dd6 constructing new tx simulator txid = [0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60]" +peer0.org1.example.com | "2019-09-24 00:27:04.907 UTC [endorser] SimulateProposal -> DEBU 5dd7 [businesschannel][0c3f7bfd] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:04.907 UTC [stateleveldb] GetState -> DEBU 5dd8 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:04.907 UTC [ccprovider] GetChaincodeData -> DEBU 5dd9 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 00:27:04.907 UTC [endorser] callChaincode -> INFO 5dda [businesschannel][0c3f7bfd] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:04.907 UTC [chaincode] Execute -> DEBU 5ddb Entry" +peer0.org1.example.com | "2019-09-24 00:27:04.908 UTC [chaincode] handleMessage -> DEBU 5ddc [0c3f7bfd] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:04.908 UTC [chaincode] HandleTransaction -> DEBU 5ddd [0c3f7bfd] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:04.909 UTC [chaincode] HandleGetState -> DEBU 5dde [0c3f7bfd] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:04.909 UTC [stateleveldb] GetState -> DEBU 5ddf GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 00:27:04.909 UTC [chaincode] HandleTransaction -> DEBU 5de0 [0c3f7bfd] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [chaincode] handleMessage -> DEBU 5de1 [0c3f7bfd] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [chaincode] Notify -> DEBU 5de2 [0c3f7bfd] notifying Txid:0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [chaincode] Execute -> DEBU 5de3 Exit" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [endorser] callChaincode -> INFO 5de4 [businesschannel][0c3f7bfd] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5de5 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [lockbasedtxmgr] Done -> DEBU 5de6 Done with transaction simulation / query execution [0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60]" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [endorser] SimulateProposal -> DEBU 5de7 [businesschannel][0c3f7bfd] Exit" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [endorser] endorseProposal -> DEBU 5de8 [businesschannel][0c3f7bfd] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [endorser] endorseProposal -> DEBU 5de9 [businesschannel][0c3f7bfd] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [endorser] EndorseWithPlugin -> DEBU 5dea Entering endorsement for {plugin: escc, channel: businesschannel, tx: 0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [msp.identity] Sign -> DEBU 5deb Sign: plaintext: 0A20356A3CDA5ACE4CE4C843D25A9A61...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [msp.identity] Sign -> DEBU 5dec Sign: digest: 542DD5B78BBEF575D8A8C25452FB346EA8CF7B5B5FA8265B7A185B955AF95B5C " +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [endorser] EndorseWithPlugin -> DEBU 5ded Exiting {plugin: escc, channel: businesschannel, tx: 0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [endorser] endorseProposal -> DEBU 5dee [businesschannel][0c3f7bfd] Exit" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [lockbasedtxmgr] Done -> DEBU 5def Done with transaction simulation / query execution [0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60]" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [endorser] func1 -> DEBU 5df0 Exit: request from 172.18.0.9:51006" +peer0.org1.example.com | "2019-09-24 00:27:04.910 UTC [comm.grpc.server] 1 -> INFO 5df1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51006 grpc.code=OK grpc.call_duration=12.7369ms +peer0.org1.example.com | "2019-09-24 00:27:04.913 UTC [grpc] infof -> DEBU 5df2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:04.914 UTC [grpc] infof -> DEBU 5df3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [gossip.gossip] handleMessage -> DEBU 5df4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [gossip.gossip] handleMessage -> DEBU 5df5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5df6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5df7 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [msp] DeserializeIdentity -> DEBU 5df8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5df9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5dfa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5dfb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [policies] Evaluate -> DEBU 5dfc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [policies] Evaluate -> DEBU 5dfd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [policies] Evaluate -> DEBU 5dfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.947 UTC [cauthdsl] func1 -> DEBU 5dff 0xc002acb640 gate 1569284824947969500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e00 0xc002acb640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e01 0xc002acb640 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e02 0xc002acb640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e03 0xc002acb640 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [cauthdsl] func1 -> DEBU 5e04 0xc002acb640 gate 1569284824947969500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [cauthdsl] func1 -> DEBU 5e08 0xc002acbe80 gate 1569284824948356600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e09 0xc002acbe80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e0a 0xc002acbe80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e0b 0xc002acbe80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [msp.identity] Verify -> DEBU 5e0c Verify: digest = 00000000 ea bd e0 80 51 e5 e0 b6 b1 7b 05 73 b7 09 90 73 |....Q....{.s...s| +peer0.org1.example.com | 00000010 f6 b0 b0 92 5f 1b 11 e9 52 d9 5a 74 29 3c f8 fe |...._...R.Zt)<..|" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [msp.identity] Verify -> DEBU 5e0d Verify: sig = 00000000 30 45 02 21 00 ff 6c fe 98 22 8e 96 e0 a8 91 93 |0E.!..l.."......| +peer0.org1.example.com | 00000010 2f 4a 7b 57 49 a0 ae 6b 6a 27 6e 67 f4 aa b9 44 |/J{WI..kj'ng...D| +peer0.org1.example.com | 00000020 13 72 8e 95 90 02 20 19 62 6c c5 54 03 02 eb 3a |.r.... .bl.T...:| +peer0.org1.example.com | 00000030 46 72 f6 fc 4a 9a e2 8c d3 5a 2b 52 8d 2e 6b cf |Fr..J....Z+R..k.| +peer0.org1.example.com | 00000040 74 f2 5b c1 b4 90 96 |t.[....|" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e0e 0xc002acbe80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [cauthdsl] func1 -> DEBU 5e0f 0xc002acbe80 gate 1569284824948356600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e12 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:04.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 5e14 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 5e15 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:04.951 UTC [gossip.discovery] learnExistingMembers -> DEBU 5e16 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:04.951 UTC [gossip.discovery] learnExistingMembers -> DEBU 5e17 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:04.952 UTC [gossip.discovery] learnExistingMembers -> DEBU 5e18 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:04.952 UTC [gossip.discovery] learnExistingMembers -> DEBU 5e19 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 5e1a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e1b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.954 UTC [gossip.comm] func1 -> DEBU 5e1c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.954 UTC [gossip.gossip] handleMessage -> DEBU 5e1d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.954 UTC [gossip.gossip] handleMessage -> DEBU 5e1e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e1f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e20 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.957 UTC [gossip.comm] func1 -> DEBU 5e21 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.957 UTC [gossip.gossip] handleMessage -> DEBU 5e22 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.957 UTC [gossip.gossip] handleMessage -> DEBU 5e23 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e24 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e25 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e26 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e27 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e28 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e2a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e2b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e2c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.960 UTC [gossip.comm] Send -> DEBU 5e2d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:04.960 UTC [gossip.comm] Send -> DEBU 5e2f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:04.961 UTC [gossip.comm] sendToEndpoint -> DEBU 5e30 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.961 UTC [gossip.comm] sendToEndpoint -> DEBU 5e31 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:04.961 UTC [gossip.comm] sendToEndpoint -> DEBU 5e32 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:04.961 UTC [gossip.comm] sendToEndpoint -> DEBU 5e33 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.080 UTC [gossip.gossip] handleMessage -> DEBU 5e34 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.080 UTC [msp] DeserializeIdentity -> DEBU 5e35 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.080 UTC [msp] DeserializeIdentity -> DEBU 5e36 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.080 UTC [msp] DeserializeIdentity -> DEBU 5e37 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [gossip.gossip] handleMessage -> DEBU 5e38 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [gossip.gossip] handleMessage -> DEBU 5e39 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [msp] DeserializeIdentity -> DEBU 5e3a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5e3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e3c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e3d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [cauthdsl] func1 -> DEBU 5e41 0xc003738710 gate 1569284825081538200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e42 0xc003738710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e43 0xc003738710 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e44 0xc003738710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e45 0xc003738710 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [cauthdsl] func1 -> DEBU 5e46 0xc003738710 gate 1569284825081538200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [cauthdsl] func1 -> DEBU 5e4a 0xc003738f50 gate 1569284825081864200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e4b 0xc003738f50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e4c 0xc003738f50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e4d 0xc003738f50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [msp.identity] Verify -> DEBU 5e4e Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [msp.identity] Verify -> DEBU 5e4f Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e50 0xc003738f50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [cauthdsl] func1 -> DEBU 5e51 0xc003738f50 gate 1569284825081864200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e52 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e55 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [gossip.comm] func1 -> DEBU 5e54 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e56 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [msp] DeserializeIdentity -> DEBU 5e57 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [msp] DeserializeIdentity -> DEBU 5e58 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e59 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e5a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e5c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [cauthdsl] func1 -> DEBU 5e5e 0xc003bda130 gate 1569284825082786800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e5f 0xc003bda130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e60 0xc003bda130 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e61 0xc003bda130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e62 0xc003bda130 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [cauthdsl] func1 -> DEBU 5e63 0xc003bda130 gate 1569284825082786800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e64 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [cauthdsl] func1 -> DEBU 5e67 0xc003bda970 gate 1569284825083028600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [cauthdsl] func2 -> DEBU 5e68 0xc003bda970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [cauthdsl] func2 -> DEBU 5e69 0xc003bda970 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [cauthdsl] func2 -> DEBU 5e6a 0xc003bda970 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [msp.identity] Verify -> DEBU 5e6b Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [msp.identity] Verify -> DEBU 5e6c Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [cauthdsl] func2 -> DEBU 5e6d 0xc003bda970 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [cauthdsl] func1 -> DEBU 5e6e 0xc003bda970 gate 1569284825083028600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e6f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e71 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e72 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [gossip.gossip] handleMessage -> DEBU 5e73 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [gossip.gossip] handleMessage -> DEBU 5e74 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [msp] DeserializeIdentity -> DEBU 5e75 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5e76 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e77 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e78 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e79 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e7a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e7b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.083 UTC [cauthdsl] func1 -> DEBU 5e7c 0xc003e9c240 gate 1569284825083865900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.084 UTC [cauthdsl] func2 -> DEBU 5e7d 0xc003e9c240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.084 UTC [cauthdsl] func2 -> DEBU 5e7e 0xc003e9c240 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.084 UTC [cauthdsl] func2 -> DEBU 5e7f 0xc003e9c240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:05.084 UTC [cauthdsl] func2 -> DEBU 5e80 0xc003e9c240 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:05.084 UTC [cauthdsl] func1 -> DEBU 5e81 0xc003e9c240 gate 1569284825083865900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:05.084 UTC [policies] Evaluate -> DEBU 5e82 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.084 UTC [policies] Evaluate -> DEBU 5e83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.085 UTC [policies] Evaluate -> DEBU 5e84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.085 UTC [cauthdsl] func1 -> DEBU 5e85 0xc003e9ca80 gate 1569284825085256700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.085 UTC [cauthdsl] func2 -> DEBU 5e86 0xc003e9ca80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.085 UTC [cauthdsl] func2 -> DEBU 5e87 0xc003e9ca80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.085 UTC [cauthdsl] func2 -> DEBU 5e88 0xc003e9ca80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.085 UTC [msp.identity] Verify -> DEBU 5e89 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:05.085 UTC [msp.identity] Verify -> DEBU 5e8a Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:05.086 UTC [cauthdsl] func2 -> DEBU 5e8b 0xc003e9ca80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.088 UTC [cauthdsl] func1 -> DEBU 5e8c 0xc003e9ca80 gate 1569284825085256700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:05.089 UTC [policies] Evaluate -> DEBU 5e8d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.089 UTC [policies] Evaluate -> DEBU 5e8e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.089 UTC [policies] Evaluate -> DEBU 5e8f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.090 UTC [policies] Evaluate -> DEBU 5e90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.090 UTC [gossip.gossip] handleMessage -> DEBU 5e91 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.093 UTC [msp] DeserializeIdentity -> DEBU 5e92 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.094 UTC [msp] DeserializeIdentity -> DEBU 5e93 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.096 UTC [gossip.comm] func1 -> DEBU 5e94 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.097 UTC [gossip.gossip] handleMessage -> DEBU 5e95 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.097 UTC [msp] DeserializeIdentity -> DEBU 5e96 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.095 UTC [gossip.comm] Send -> DEBU 5e97 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers" +peer0.org1.example.com | "2019-09-24 00:27:05.097 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5e98 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:05.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e99 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:05.097 UTC [msp] DeserializeIdentity -> DEBU 5e9a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e9b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:05.097 UTC [policies] Evaluate -> DEBU 5e9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.097 UTC [msp] DeserializeIdentity -> DEBU 5e9d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5e9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func1 -> DEBU 5ea0 0xc00473a300 gate 1569284825098063900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [gossip.comm] sendToEndpoint -> DEBU 5ea1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5ea2 0xc00473a300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [gossip.comm] sendToEndpoint -> DEBU 5ea3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5ea4 0xc00473a300 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5ea5 0xc00473a300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5ea6 0xc00473a300 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [gossip.comm] sendToEndpoint -> DEBU 5ea7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func1 -> DEBU 5ea8 0xc00473a300 gate 1569284825098063900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5ea9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [gossip.comm] sendToEndpoint -> DEBU 5eaa Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func1 -> DEBU 5ead 0xc00473ab40 gate 1569284825098308400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5eae 0xc00473ab40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5eaf 0xc00473ab40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5eb0 0xc00473ab40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [msp.identity] Verify -> DEBU 5eb1 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [msp.identity] Verify -> DEBU 5eb2 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5eb3 0xc00473ab40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [cauthdsl] func1 -> DEBU 5eb4 0xc00473ab40 gate 1569284825098308400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eb5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eb7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [msp] DeserializeIdentity -> DEBU 5eb9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.098 UTC [gossip.gossip] handleMessage -> DEBU 5eba Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.347 UTC [endorser] ProcessProposal -> DEBU 5ebb Entering: request from 172.18.0.9:51010" +peer0.org1.example.com | "2019-09-24 00:27:05.347 UTC [protoutils] ValidateProposalMessage -> DEBU 5ebc ValidateProposalMessage starts for signed proposal 0xc003a2c0f0" +peer0.org1.example.com | "2019-09-24 00:27:05.348 UTC [protoutils] validateChannelHeader -> DEBU 5ebd validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:05.352 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ebe begin" +peer0.org1.example.com | "2019-09-24 00:27:05.352 UTC [msp] GetManagerForChain -> DEBU 5ebf Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:05.352 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ec0 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:05.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ec1 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:05.353 UTC [msp.identity] Verify -> DEBU 5ec2 Verify: digest = 00000000 12 ef 31 0a bd f0 df 09 a3 ed 3d 0c 86 00 74 8b |..1.......=...t.| +peer0.org1.example.com | 00000010 f8 cb 44 27 54 4e 7a 24 80 d1 1e 23 78 e9 4d 7e |..D'TNz$...#x.M~|" +peer0.org1.example.com | "2019-09-24 00:27:05.353 UTC [msp.identity] Verify -> DEBU 5ec3 Verify: sig = 00000000 30 44 02 20 70 71 0c a6 fe a3 78 83 02 8f 6e aa |0D. pq....x...n.| +peer0.org1.example.com | 00000010 bd fb ed de e8 ff c4 f1 4b 2b cd 9c 1f 55 a8 c4 |........K+...U..| +peer0.org1.example.com | 00000020 eb 50 3c b6 02 20 19 c2 f0 57 83 b6 58 cb 2d 5b |.P<.. ...W..X.-[| +peer0.org1.example.com | 00000030 ec b1 75 71 4b 9f 55 30 e3 b3 d5 5f 11 78 29 f3 |..uqK.U0..._.x).| +peer0.org1.example.com | 00000040 2f c8 ec a0 77 f9 |/...w.|" +peer0.org1.example.com | "2019-09-24 00:27:05.354 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ec4 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:05.354 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5ec5 validateChaincodeProposalMessage starts for proposal 0xc002c1dea0, header 0xc003a2c500" +peer0.org1.example.com | "2019-09-24 00:27:05.354 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5ec6 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.355 UTC [endorser] preProcess -> DEBU 5ec7 [businesschannel][8a1d5010] processing txid: 8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08" +peer0.org1.example.com | "2019-09-24 00:27:05.355 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5ec8 retrieveTransactionByID() - txId = [8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08]" +peer0.org1.example.com | "2019-09-24 00:27:05.356 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5ec9 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:27:05.356 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5eca constructing new tx simulator txid = [8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08]" +peer0.org1.example.com | "2019-09-24 00:27:05.357 UTC [endorser] SimulateProposal -> DEBU 5ecb [businesschannel][8a1d5010] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.357 UTC [endorser] callChaincode -> INFO 5ecc [businesschannel][8a1d5010] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.357 UTC [chaincode] Execute -> DEBU 5ecd Entry" +peer0.org1.example.com | "2019-09-24 00:27:05.358 UTC [aclmgmt] CheckACL -> DEBU 5ece acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists" +peer0.org1.example.com | "2019-09-24 00:27:05.358 UTC [aclmgmt] CheckACL -> DEBU 5ecf acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 00:27:05.358 UTC [policies] Evaluate -> DEBU 5ed0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.359 UTC [policies] Evaluate -> DEBU 5ed1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:05.359 UTC [policies] Evaluate -> DEBU 5ed2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.359 UTC [cauthdsl] func1 -> DEBU 5ed3 0xc003977730 gate 1569284825359567300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.359 UTC [cauthdsl] func2 -> DEBU 5ed4 0xc003977730 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.360 UTC [cauthdsl] func2 -> DEBU 5ed5 0xc003977730 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.360 UTC [cauthdsl] func2 -> DEBU 5ed6 0xc003977730 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.360 UTC [msp.identity] Verify -> DEBU 5ed7 Verify: digest = 00000000 12 ef 31 0a bd f0 df 09 a3 ed 3d 0c 86 00 74 8b |..1.......=...t.| +peer0.org1.example.com | 00000010 f8 cb 44 27 54 4e 7a 24 80 d1 1e 23 78 e9 4d 7e |..D'TNz$...#x.M~|" +peer0.org1.example.com | "2019-09-24 00:27:05.360 UTC [msp.identity] Verify -> DEBU 5ed8 Verify: sig = 00000000 30 44 02 20 70 71 0c a6 fe a3 78 83 02 8f 6e aa |0D. pq....x...n.| +peer0.org1.example.com | 00000010 bd fb ed de e8 ff c4 f1 4b 2b cd 9c 1f 55 a8 c4 |........K+...U..| +peer0.org1.example.com | 00000020 eb 50 3c b6 02 20 19 c2 f0 57 83 b6 58 cb 2d 5b |.P<.. ...W..X.-[| +peer0.org1.example.com | 00000030 ec b1 75 71 4b 9f 55 30 e3 b3 d5 5f 11 78 29 f3 |..uqK.U0..._.x).| +peer0.org1.example.com | 00000040 2f c8 ec a0 77 f9 |/...w.|" +peer0.org1.example.com | "2019-09-24 00:27:05.361 UTC [cauthdsl] func2 -> DEBU 5ed9 0xc003977730 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.361 UTC [cauthdsl] func1 -> DEBU 5eda 0xc003977730 gate 1569284825359567300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:05.361 UTC [policies] Evaluate -> DEBU 5edb Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.361 UTC [policies] Evaluate -> DEBU 5edc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.362 UTC [policies] Evaluate -> DEBU 5edd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.362 UTC [policies] Evaluate -> DEBU 5ede == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.362 UTC [chaincode] handleMessage -> DEBU 5edf [8a1d5010] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:05.362 UTC [chaincode] HandleTransaction -> DEBU 5ee0 [8a1d5010] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:05.363 UTC [chaincode] HandleGetState -> DEBU 5ee1 [8a1d5010] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:05.363 UTC [stateleveldb] GetState -> DEBU 5ee2 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:05.363 UTC [chaincode] HandleTransaction -> DEBU 5ee3 [8a1d5010] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:05.363 UTC [chaincode] handleMessage -> DEBU 5ee4 [8a1d5010] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:05.363 UTC [chaincode] Notify -> DEBU 5ee5 [8a1d5010] notifying Txid:8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [chaincode] Execute -> DEBU 5ee6 Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [endorser] callChaincode -> INFO 5ee7 [businesschannel][8a1d5010] Exit chaincode: name:"lscc" (7ms)" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5ee8 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [lockbasedtxmgr] Done -> DEBU 5ee9 Done with transaction simulation / query execution [8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08]" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [endorser] SimulateProposal -> DEBU 5eea [businesschannel][8a1d5010] Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [endorser] endorseProposal -> DEBU 5eeb [businesschannel][8a1d5010] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [endorser] endorseProposal -> DEBU 5eec [businesschannel][8a1d5010] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [endorser] EndorseWithPlugin -> DEBU 5eed Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [msp.identity] Sign -> DEBU 5eee Sign: plaintext: 0A20E0C4A307CDF51704E9535E1EA0CF...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [msp.identity] Sign -> DEBU 5eef Sign: digest: 6BF0A2DE278161577A358F7C2155D228EEAEEB436520123D1B9D8FB0F9297045 " +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [endorser] EndorseWithPlugin -> DEBU 5ef0 Exiting {plugin: escc, channel: businesschannel, tx: 8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [endorser] endorseProposal -> DEBU 5ef1 [businesschannel][8a1d5010] Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [lockbasedtxmgr] Done -> DEBU 5ef2 Done with transaction simulation / query execution [8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08]" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [endorser] func1 -> DEBU 5ef3 Exit: request from 172.18.0.9:51010" +peer0.org1.example.com | "2019-09-24 00:27:05.364 UTC [comm.grpc.server] 1 -> INFO 5ef4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51010 grpc.code=OK grpc.call_duration=17.7159ms +peer0.org1.example.com | "2019-09-24 00:27:05.368 UTC [grpc] infof -> DEBU 5ef5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:05.369 UTC [grpc] infof -> DEBU 5ef6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:05.497 UTC [endorser] ProcessProposal -> DEBU 5ef7 Entering: request from 172.18.0.9:51014" +peer0.org1.example.com | "2019-09-24 00:27:05.497 UTC [protoutils] ValidateProposalMessage -> DEBU 5ef8 ValidateProposalMessage starts for signed proposal 0xc003a2cff0" +peer0.org1.example.com | "2019-09-24 00:27:05.497 UTC [protoutils] validateChannelHeader -> DEBU 5ef9 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:05.498 UTC [protoutils] checkSignatureFromCreator -> DEBU 5efa begin" +peer0.org1.example.com | "2019-09-24 00:27:05.498 UTC [msp] GetManagerForChain -> DEBU 5efb Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:05.498 UTC [protoutils] checkSignatureFromCreator -> DEBU 5efc creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:05.499 UTC [protoutils] checkSignatureFromCreator -> DEBU 5efd creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:05.499 UTC [msp.identity] Verify -> DEBU 5efe Verify: digest = 00000000 c5 52 14 68 37 fa 9c bb a2 ac 7e d4 aa 85 3a f3 |.R.h7.....~...:.| +peer0.org1.example.com | 00000010 7c 65 8c 87 50 db 08 45 96 df f7 05 1e 85 c1 c8 ||e..P..E........|" +peer0.org1.example.com | "2019-09-24 00:27:05.499 UTC [msp.identity] Verify -> DEBU 5eff Verify: sig = 00000000 30 44 02 20 61 24 d2 8e 83 fd 2a de e2 1b 13 38 |0D. a$....*....8| +peer0.org1.example.com | 00000010 4a 4e 34 89 d5 06 91 78 ad 52 a1 dc 0a 9b a0 d1 |JN4....x.R......| +peer0.org1.example.com | 00000020 18 55 7c d0 02 20 1c 92 4c b0 60 6f f3 37 b2 4c |.U|.. ..L.`o.7.L| +peer0.org1.example.com | 00000030 5e 09 25 b0 26 ab 6b 5c 80 b4 54 5b cc 47 a6 68 |^.%.&.k\..T[.G.h| +peer0.org1.example.com | 00000040 50 10 62 f6 2d 97 |P.b.-.|" +peer0.org1.example.com | "2019-09-24 00:27:05.500 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f00 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:05.500 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5f01 validateChaincodeProposalMessage starts for proposal 0xc003142310, header 0xc003a2d400" +peer0.org1.example.com | "2019-09-24 00:27:05.500 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5f02 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.501 UTC [endorser] preProcess -> DEBU 5f03 [businesschannel][77581583] processing txid: 77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f" +peer0.org1.example.com | "2019-09-24 00:27:05.501 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5f04 retrieveTransactionByID() - txId = [77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f]" +peer0.org1.example.com | "2019-09-24 00:27:05.501 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5f05 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:27:05.502 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5f06 constructing new tx simulator txid = [77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f]" +peer0.org1.example.com | "2019-09-24 00:27:05.502 UTC [endorser] SimulateProposal -> DEBU 5f07 [businesschannel][77581583] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.502 UTC [endorser] callChaincode -> INFO 5f08 [businesschannel][77581583] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.502 UTC [chaincode] Execute -> DEBU 5f09 Entry" +peer0.org1.example.com | "2019-09-24 00:27:05.503 UTC [aclmgmt] CheckACL -> DEBU 5f0a acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec" +peer0.org1.example.com | "2019-09-24 00:27:05.503 UTC [aclmgmt] CheckACL -> DEBU 5f0b acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 00:27:05.503 UTC [policies] Evaluate -> DEBU 5f0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.503 UTC [policies] Evaluate -> DEBU 5f0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:05.504 UTC [policies] Evaluate -> DEBU 5f0e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.504 UTC [cauthdsl] func1 -> DEBU 5f0f 0xc00354a830 gate 1569284825504320400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.504 UTC [cauthdsl] func2 -> DEBU 5f10 0xc00354a830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.504 UTC [cauthdsl] func2 -> DEBU 5f11 0xc00354a830 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.504 UTC [cauthdsl] func2 -> DEBU 5f12 0xc00354a830 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.505 UTC [msp.identity] Verify -> DEBU 5f13 Verify: digest = 00000000 c5 52 14 68 37 fa 9c bb a2 ac 7e d4 aa 85 3a f3 |.R.h7.....~...:.| +peer0.org1.example.com | 00000010 7c 65 8c 87 50 db 08 45 96 df f7 05 1e 85 c1 c8 ||e..P..E........|" +peer0.org1.example.com | "2019-09-24 00:27:05.505 UTC [msp.identity] Verify -> DEBU 5f14 Verify: sig = 00000000 30 44 02 20 61 24 d2 8e 83 fd 2a de e2 1b 13 38 |0D. a$....*....8| +peer0.org1.example.com | 00000010 4a 4e 34 89 d5 06 91 78 ad 52 a1 dc 0a 9b a0 d1 |JN4....x.R......| +peer0.org1.example.com | 00000020 18 55 7c d0 02 20 1c 92 4c b0 60 6f f3 37 b2 4c |.U|.. ..L.`o.7.L| +peer0.org1.example.com | 00000030 5e 09 25 b0 26 ab 6b 5c 80 b4 54 5b cc 47 a6 68 |^.%.&.k\..T[.G.h| +peer0.org1.example.com | 00000040 50 10 62 f6 2d 97 |P.b.-.|" +peer0.org1.example.com | "2019-09-24 00:27:05.506 UTC [cauthdsl] func2 -> DEBU 5f15 0xc00354a830 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.506 UTC [cauthdsl] func1 -> DEBU 5f16 0xc00354a830 gate 1569284825504320400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:05.506 UTC [policies] Evaluate -> DEBU 5f17 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.506 UTC [policies] Evaluate -> DEBU 5f18 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.507 UTC [policies] Evaluate -> DEBU 5f19 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.507 UTC [policies] Evaluate -> DEBU 5f1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.507 UTC [chaincode] handleMessage -> DEBU 5f1b [77581583] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:05.508 UTC [chaincode] HandleTransaction -> DEBU 5f1c [77581583] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:05.508 UTC [chaincode] HandleGetState -> DEBU 5f1d [77581583] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:05.508 UTC [stateleveldb] GetState -> DEBU 5f1e GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:05.509 UTC [chaincode] HandleTransaction -> DEBU 5f1f [77581583] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:05.509 UTC [chaincode] handleMessage -> DEBU 5f20 [77581583] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:05.510 UTC [chaincode] Notify -> DEBU 5f21 [77581583] notifying Txid:77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:05.510 UTC [chaincode] Execute -> DEBU 5f22 Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.510 UTC [endorser] callChaincode -> INFO 5f23 [businesschannel][77581583] Exit chaincode: name:"lscc" (8ms)" +peer0.org1.example.com | "2019-09-24 00:27:05.510 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5f24 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:27:05.511 UTC [lockbasedtxmgr] Done -> DEBU 5f25 Done with transaction simulation / query execution [77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f]" +peer0.org1.example.com | "2019-09-24 00:27:05.511 UTC [endorser] SimulateProposal -> DEBU 5f26 [businesschannel][77581583] Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.511 UTC [endorser] endorseProposal -> DEBU 5f27 [businesschannel][77581583] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.511 UTC [endorser] endorseProposal -> DEBU 5f28 [businesschannel][77581583] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 00:27:05.512 UTC [endorser] EndorseWithPlugin -> DEBU 5f29 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:27:05.512 UTC [msp.identity] Sign -> DEBU 5f2a Sign: plaintext: 0A20D6CA34E6BA89360DBD902C042961...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:05.512 UTC [msp.identity] Sign -> DEBU 5f2b Sign: digest: 32504F3A4148B4B687821DF604E0FAA33D45EDF3140570CD406C39FC86D17A53 " +peer0.org1.example.com | "2019-09-24 00:27:05.512 UTC [endorser] EndorseWithPlugin -> DEBU 5f2c Exiting {plugin: escc, channel: businesschannel, tx: 77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:27:05.512 UTC [endorser] endorseProposal -> DEBU 5f2d [businesschannel][77581583] Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.512 UTC [lockbasedtxmgr] Done -> DEBU 5f2e Done with transaction simulation / query execution [77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f]" +peer0.org1.example.com | "2019-09-24 00:27:05.512 UTC [endorser] func1 -> DEBU 5f2f Exit: request from 172.18.0.9:51014" +peer0.org1.example.com | "2019-09-24 00:27:05.512 UTC [comm.grpc.server] 1 -> INFO 5f30 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51014 grpc.code=OK grpc.call_duration=15.8111ms +peer0.org1.example.com | "2019-09-24 00:27:05.515 UTC [grpc] infof -> DEBU 5f31 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:05.516 UTC [grpc] infof -> DEBU 5f32 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:05.648 UTC [gossip.comm] func1 -> DEBU 5f33 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.649 UTC [gossip.gossip] handleMessage -> DEBU 5f34 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.649 UTC [gossip.pull] HandleMessage -> DEBU 5f35 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.650 UTC [gossip.pull] SendDigest -> DEBU 5f36 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:05.650 UTC [gossip.gossip] handleMessage -> DEBU 5f37 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.670 UTC [gossip.comm] func1 -> DEBU 5f38 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.671 UTC [gossip.gossip] handleMessage -> DEBU 5f39 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.671 UTC [gossip.gossip] handleMessage -> DEBU 5f3a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f3b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.672 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5f3c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:05.672 UTC [msp] DeserializeIdentity -> DEBU 5f3d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.676 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5f3e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:05.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5f3f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:05.677 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5f40 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:05.680 UTC [policies] Evaluate -> DEBU 5f41 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.680 UTC [policies] Evaluate -> DEBU 5f42 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:05.680 UTC [policies] Evaluate -> DEBU 5f43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.681 UTC [cauthdsl] func1 -> DEBU 5f44 0xc0036bae20 gate 1569284825681329500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.681 UTC [cauthdsl] func2 -> DEBU 5f45 0xc0036bae20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.682 UTC [cauthdsl] func2 -> DEBU 5f46 0xc0036bae20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.682 UTC [cauthdsl] func2 -> DEBU 5f47 0xc0036bae20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:05.683 UTC [cauthdsl] func2 -> DEBU 5f48 0xc0036bae20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:05.683 UTC [cauthdsl] func1 -> DEBU 5f49 0xc0036bae20 gate 1569284825681329500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:05.683 UTC [policies] Evaluate -> DEBU 5f4a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.686 UTC [gossip.gossip] handleMessage -> DEBU 5f4b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.686 UTC [gossip.comm] func1 -> DEBU 5f4c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.689 UTC [policies] Evaluate -> DEBU 5f4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.690 UTC [policies] Evaluate -> DEBU 5f4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.690 UTC [cauthdsl] func1 -> DEBU 5f4f 0xc0036bb660 gate 1569284825690398900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.690 UTC [cauthdsl] func2 -> DEBU 5f50 0xc0036bb660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.691 UTC [cauthdsl] func2 -> DEBU 5f51 0xc0036bb660 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.691 UTC [cauthdsl] func2 -> DEBU 5f52 0xc0036bb660 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.692 UTC [msp.identity] Verify -> DEBU 5f53 Verify: digest = 00000000 9d 15 d9 e1 46 7b dd 77 ea 8a 53 da e5 72 a7 78 |....F{.w..S..r.x| +peer0.org1.example.com | 00000010 d9 8c b6 69 df 1e d5 dc 63 c0 b9 72 25 f1 cb 0d |...i....c..r%...|" +peer0.org1.example.com | "2019-09-24 00:27:05.692 UTC [msp.identity] Verify -> DEBU 5f54 Verify: sig = 00000000 30 44 02 20 6c 31 cd 83 95 5e f1 e8 14 3c 5a be |0D. l1...^... DEBU 5f55 0xc0036bb660 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.693 UTC [cauthdsl] func1 -> DEBU 5f56 0xc0036bb660 gate 1569284825690398900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:05.694 UTC [policies] Evaluate -> DEBU 5f57 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.694 UTC [policies] Evaluate -> DEBU 5f58 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.695 UTC [policies] Evaluate -> DEBU 5f59 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.696 UTC [policies] Evaluate -> DEBU 5f5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.696 UTC [gossip.discovery] handleAliveMessage -> DEBU 5f5b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 5f5c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:05.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 5f5d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:05.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 5f5e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:05.699 UTC [gossip.discovery] learnExistingMembers -> DEBU 5f5f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:05.699 UTC [gossip.discovery] learnExistingMembers -> DEBU 5f60 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 5f61 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f62 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.700 UTC [gossip.gossip] handleMessage -> DEBU 5f63 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.701 UTC [gossip.gossip] handleMessage -> DEBU 5f64 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f65 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f66 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.704 UTC [gossip.gossip] handleMessage -> DEBU 5f67 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f68 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f69 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.706 UTC [msp] DeserializeIdentity -> DEBU 5f6a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.707 UTC [msp] DeserializeIdentity -> DEBU 5f6b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.709 UTC [msp] DeserializeIdentity -> DEBU 5f6c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.710 UTC [msp] DeserializeIdentity -> DEBU 5f6d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.710 UTC [msp] DeserializeIdentity -> DEBU 5f6e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.711 UTC [msp] DeserializeIdentity -> DEBU 5f6f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.712 UTC [gossip.comm] Send -> DEBU 5f70 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:05.712 UTC [msp] DeserializeIdentity -> DEBU 5f71 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.713 UTC [msp] DeserializeIdentity -> DEBU 5f72 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.713 UTC [gossip.comm] Send -> DEBU 5f73 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:05.714 UTC [gossip.comm] sendToEndpoint -> DEBU 5f74 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.714 UTC [gossip.comm] sendToEndpoint -> DEBU 5f75 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.715 UTC [gossip.comm] sendToEndpoint -> DEBU 5f76 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.715 UTC [gossip.comm] sendToEndpoint -> DEBU 5f77 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.724 UTC [endorser] ProcessProposal -> DEBU 5f78 Entering: request from 172.18.0.9:51018" +peer0.org1.example.com | "2019-09-24 00:27:05.724 UTC [protoutils] ValidateProposalMessage -> DEBU 5f79 ValidateProposalMessage starts for signed proposal 0xc003af2550" +peer0.org1.example.com | "2019-09-24 00:27:05.724 UTC [protoutils] validateChannelHeader -> DEBU 5f7a validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:05.724 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f7b begin" +peer0.org1.example.com | "2019-09-24 00:27:05.724 UTC [msp] GetManagerForChain -> DEBU 5f7c Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:05.725 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f7d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:05.725 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f7e creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:05.725 UTC [msp.identity] Verify -> DEBU 5f7f Verify: digest = 00000000 b5 6c 7a 4c 8c f4 42 9a 03 f4 d0 e4 cc 0b d2 92 |.lzL..B.........| +peer0.org1.example.com | 00000010 a2 ee 9b 0b b1 e7 3f f7 8d ba cc 85 65 95 5e 00 |......?.....e.^.|" +peer0.org1.example.com | "2019-09-24 00:27:05.725 UTC [msp.identity] Verify -> DEBU 5f80 Verify: sig = 00000000 30 45 02 21 00 97 15 e8 44 f3 ce 71 33 49 d2 82 |0E.!....D..q3I..| +peer0.org1.example.com | 00000010 51 ef bb a4 53 c3 01 3a 44 d6 20 a9 5f f1 75 00 |Q...S..:D. ._.u.| +peer0.org1.example.com | 00000020 f1 99 54 5b 2c 02 20 32 54 c5 d0 d3 93 a9 d5 b4 |..T[,. 2T.......| +peer0.org1.example.com | 00000030 5c 36 57 8a f0 82 61 b2 34 10 c9 f9 ef 46 5f 5f |\6W...a.4....F__| +peer0.org1.example.com | 00000040 59 ea 66 c2 7b 32 55 |Y.f.{2U|" +peer0.org1.example.com | "2019-09-24 00:27:05.725 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f81 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:05.725 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5f82 validateChaincodeProposalMessage starts for proposal 0xc0031429a0, header 0xc003af2960" +peer0.org1.example.com | "2019-09-24 00:27:05.725 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5f83 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.725 UTC [endorser] preProcess -> DEBU 5f84 [businesschannel][1bc9b8d3] processing txid: 1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40" +peer0.org1.example.com | "2019-09-24 00:27:05.726 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5f85 retrieveTransactionByID() - txId = [1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40]" +peer0.org1.example.com | "2019-09-24 00:27:05.726 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5f86 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:27:05.726 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5f87 constructing new tx simulator txid = [1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40]" +peer0.org1.example.com | "2019-09-24 00:27:05.726 UTC [endorser] SimulateProposal -> DEBU 5f88 [businesschannel][1bc9b8d3] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.726 UTC [endorser] callChaincode -> INFO 5f89 [businesschannel][1bc9b8d3] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.726 UTC [chaincode] Execute -> DEBU 5f8a Entry" +peer0.org1.example.com | "2019-09-24 00:27:05.726 UTC [aclmgmt] CheckACL -> DEBU 5f8b acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData" +peer0.org1.example.com | "2019-09-24 00:27:05.727 UTC [aclmgmt] CheckACL -> DEBU 5f8c acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 00:27:05.727 UTC [policies] Evaluate -> DEBU 5f8d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.727 UTC [policies] Evaluate -> DEBU 5f8e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:05.727 UTC [policies] Evaluate -> DEBU 5f8f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:05.727 UTC [cauthdsl] func1 -> DEBU 5f90 0xc004130ff0 gate 1569284825727518600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:05.727 UTC [cauthdsl] func2 -> DEBU 5f91 0xc004130ff0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:05.727 UTC [cauthdsl] func2 -> DEBU 5f92 0xc004130ff0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:05.727 UTC [cauthdsl] func2 -> DEBU 5f93 0xc004130ff0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.728 UTC [msp.identity] Verify -> DEBU 5f94 Verify: digest = 00000000 b5 6c 7a 4c 8c f4 42 9a 03 f4 d0 e4 cc 0b d2 92 |.lzL..B.........| +peer0.org1.example.com | 00000010 a2 ee 9b 0b b1 e7 3f f7 8d ba cc 85 65 95 5e 00 |......?.....e.^.|" +peer0.org1.example.com | "2019-09-24 00:27:05.728 UTC [msp.identity] Verify -> DEBU 5f95 Verify: sig = 00000000 30 45 02 21 00 97 15 e8 44 f3 ce 71 33 49 d2 82 |0E.!....D..q3I..| +peer0.org1.example.com | 00000010 51 ef bb a4 53 c3 01 3a 44 d6 20 a9 5f f1 75 00 |Q...S..:D. ._.u.| +peer0.org1.example.com | 00000020 f1 99 54 5b 2c 02 20 32 54 c5 d0 d3 93 a9 d5 b4 |..T[,. 2T.......| +peer0.org1.example.com | 00000030 5c 36 57 8a f0 82 61 b2 34 10 c9 f9 ef 46 5f 5f |\6W...a.4....F__| +peer0.org1.example.com | 00000040 59 ea 66 c2 7b 32 55 |Y.f.{2U|" +peer0.org1.example.com | "2019-09-24 00:27:05.728 UTC [cauthdsl] func2 -> DEBU 5f96 0xc004130ff0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:05.728 UTC [cauthdsl] func1 -> DEBU 5f97 0xc004130ff0 gate 1569284825727518600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:05.728 UTC [policies] Evaluate -> DEBU 5f98 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.728 UTC [policies] Evaluate -> DEBU 5f99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.728 UTC [policies] Evaluate -> DEBU 5f9a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.729 UTC [policies] Evaluate -> DEBU 5f9b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:05.729 UTC [chaincode] handleMessage -> DEBU 5f9c [1bc9b8d3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:05.729 UTC [chaincode] HandleTransaction -> DEBU 5f9d [1bc9b8d3] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:05.729 UTC [chaincode] HandleGetState -> DEBU 5f9e [1bc9b8d3] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:05.729 UTC [stateleveldb] GetState -> DEBU 5f9f GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 00:27:05.730 UTC [chaincode] HandleTransaction -> DEBU 5fa0 [1bc9b8d3] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:05.730 UTC [chaincode] handleMessage -> DEBU 5fa1 [1bc9b8d3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:05.730 UTC [chaincode] Notify -> DEBU 5fa2 [1bc9b8d3] notifying Txid:1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:05.730 UTC [chaincode] Execute -> DEBU 5fa3 Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.730 UTC [endorser] callChaincode -> INFO 5fa4 [businesschannel][1bc9b8d3] Exit chaincode: name:"lscc" (4ms)" +peer0.org1.example.com | "2019-09-24 00:27:05.731 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5fa5 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:27:05.731 UTC [lockbasedtxmgr] Done -> DEBU 5fa6 Done with transaction simulation / query execution [1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40]" +peer0.org1.example.com | "2019-09-24 00:27:05.731 UTC [endorser] SimulateProposal -> DEBU 5fa7 [businesschannel][1bc9b8d3] Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.731 UTC [endorser] endorseProposal -> DEBU 5fa8 [businesschannel][1bc9b8d3] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.731 UTC [endorser] endorseProposal -> DEBU 5fa9 [businesschannel][1bc9b8d3] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 00:27:05.732 UTC [endorser] EndorseWithPlugin -> DEBU 5faa Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:27:05.732 UTC [msp.identity] Sign -> DEBU 5fab Sign: plaintext: 0A202EB4FEE0237A6A63E2C6C4ACBA25...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:05.732 UTC [msp.identity] Sign -> DEBU 5fac Sign: digest: 67889439FC8495BFE8370A5F802BD6559B61E2CD2C768706BAC8CAD7E6BB7EE7 " +peer0.org1.example.com | "2019-09-24 00:27:05.733 UTC [endorser] EndorseWithPlugin -> DEBU 5fad Exiting {plugin: escc, channel: businesschannel, tx: 1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:27:05.733 UTC [endorser] endorseProposal -> DEBU 5fae [businesschannel][1bc9b8d3] Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.733 UTC [lockbasedtxmgr] Done -> DEBU 5faf Done with transaction simulation / query execution [1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40]" +peer0.org1.example.com | "2019-09-24 00:27:05.733 UTC [endorser] func1 -> DEBU 5fb0 Exit: request from 172.18.0.9:51018" +peer0.org1.example.com | "2019-09-24 00:27:05.733 UTC [comm.grpc.server] 1 -> INFO 5fb1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51018 grpc.code=OK grpc.call_duration=8.8885ms +peer0.org1.example.com | "2019-09-24 00:27:05.736 UTC [grpc] infof -> DEBU 5fb2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:05.736 UTC [grpc] infof -> DEBU 5fb3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:05.783 UTC [gossip.comm] func1 -> DEBU 5fb4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020O" signature:"0E\002!\000\345\263\277\327\276\237e\310k\002\3237#\243\270i2!\374\320\030G\354\261\362\344\246\367k\356\300\260\002 R\372:\332\207\002 f\263i-\277\222k\207\303\005\311,\351\337\3460\315OXI\214\277c\214;^\007\2035\244\2322" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.783 UTC [gossip.gossip] handleMessage -> DEBU 5fb5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020O" signature:"0E\002!\000\345\263\277\327\276\237e\310k\002\3237#\243\270i2!\374\320\030G\354\261\362\344\246\367k\356\300\260\002 R\372:\332\207\002 f\263i-\277\222k\207\303\005\311,\351\337\3460\315OXI\214\277c\214;^\007\2035\244\2322" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.783 UTC [gossip.gossip] handleMessage -> DEBU 5fb6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.783 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5fb7 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020O" signature:"0E\002!\000\345\263\277\327\276\237e\310k\002\3237#\243\270i2!\374\320\030G\354\261\362\344\246\367k\356\300\260\002 R\372:\332\207\002 f\263i-\277\222k\207\303\005\311,\351\337\3460\315OXI\214\277c\214;^\007\2035\244\2322" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.783 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5fb8 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:05.784 UTC [msp.identity] Verify -> DEBU 5fb9 Verify: digest = 00000000 1e 68 67 d7 40 22 c1 50 39 7c 9f 1a 6b e4 37 f6 |.hg.@".P9|..k.7.| +peer0.org1.example.com | 00000010 6c 3b db 59 b7 e6 9c fd d2 27 ea 61 c6 92 23 a7 |l;.Y.....'.a..#.|" +peer0.org1.example.com | "2019-09-24 00:27:05.784 UTC [msp.identity] Verify -> DEBU 5fba Verify: sig = 00000000 30 45 02 21 00 e5 b3 bf d7 be 9f 65 c8 6b 02 d3 |0E.!.......e.k..| +peer0.org1.example.com | 00000010 37 23 a3 b8 69 32 21 fc d0 18 47 ec b1 f2 e4 a6 |7#..i2!...G.....| +peer0.org1.example.com | 00000020 f7 6b ee c0 b0 02 20 52 3c 41 6d 58 e3 79 9f 49 |.k.... R DEBU 5fbb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:27:05.784 UTC [msp.identity] Verify -> DEBU 5fbc Verify: sig = 00000000 30 44 02 20 0d 5c af b8 50 94 cb e9 02 29 80 b9 |0D. .\..P....)..| +peer0.org1.example.com | 00000010 e5 00 da 4e 70 cd 93 05 1c 70 3b 65 91 aa d4 3e |...Np....p;e...>| +peer0.org1.example.com | 00000020 fa 3a da 87 02 20 66 b3 69 2d bf 92 6b 87 c3 05 |.:... f.i-..k...| +peer0.org1.example.com | 00000030 c9 2c e9 df e6 30 cd 4f 58 49 8c bf 63 8c 3b 5e |.,...0.OXI..c.;^| +peer0.org1.example.com | 00000040 07 83 35 a4 9a 32 |..5..2|" +peer0.org1.example.com | "2019-09-24 00:27:05.785 UTC [gossip.discovery] handleAliveMessage -> DEBU 5fbd Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 5fbe Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:05.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 5fbf updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:05.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 5fc0 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:05.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 5fc1 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:05.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 5fc2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.786 UTC [gossip.discovery] handleAliveMessage -> DEBU 5fc3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.786 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5fc4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.786 UTC [gossip.discovery] sendMemResponse -> DEBU 5fc5 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:27:05.786 UTC [msp] DeserializeIdentity -> DEBU 5fc6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.786 UTC [msp] DeserializeIdentity -> DEBU 5fc7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:05.786 UTC [gossip.comm] Send -> DEBU 5fc8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:05.786 UTC [gossip.discovery] sendMemResponse -> DEBU 5fc9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020O" signature:"0E\002!\000\345\263\277\327\276\237e\310k\002\3237#\243\270i2!\374\320\030G\354\261\362\344\246\367k\356\300\260\002 R\372:\332\207\002 f\263i-\277\222k\207\303\005\311,\351\337\3460\315OXI\214\277c\214;^\007\2035\244\2322" > > alive: " +peer0.org1.example.com | "2019-09-24 00:27:05.786 UTC [gossip.comm] sendToEndpoint -> DEBU 5fca Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:05.786 UTC [gossip.comm] sendToEndpoint -> DEBU 5fcb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:05.888 UTC [endorser] ProcessProposal -> DEBU 5fcc Entering: request from 172.18.0.9:51022" +peer0.org1.example.com | "2019-09-24 00:27:05.888 UTC [protoutils] ValidateProposalMessage -> DEBU 5fcd ValidateProposalMessage starts for signed proposal 0xc003af39f0" +peer0.org1.example.com | "2019-09-24 00:27:05.888 UTC [protoutils] validateChannelHeader -> DEBU 5fce validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:05.888 UTC [protoutils] checkSignatureFromCreator -> DEBU 5fcf begin" +peer0.org1.example.com | "2019-09-24 00:27:05.888 UTC [msp] GetManagerForChain -> DEBU 5fd0 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:05.888 UTC [protoutils] checkSignatureFromCreator -> DEBU 5fd1 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:05.888 UTC [protoutils] checkSignatureFromCreator -> DEBU 5fd2 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:05.888 UTC [msp.identity] Verify -> DEBU 5fd3 Verify: digest = 00000000 12 d9 52 d7 e9 d4 06 8e 8d c1 aa 20 73 d1 48 b0 |..R........ s.H.| +peer0.org1.example.com | 00000010 87 9b 80 f9 09 4e bc 5e d0 98 82 2b 17 b3 59 7c |.....N.^...+..Y||" +peer0.org1.example.com | "2019-09-24 00:27:05.888 UTC [msp.identity] Verify -> DEBU 5fd4 Verify: sig = 00000000 30 45 02 21 00 e9 2e 61 5b 6c ca 28 92 ca 96 1d |0E.!...a[l.(....| +peer0.org1.example.com | 00000010 41 23 22 87 5f 95 26 97 41 9c 10 31 e9 22 58 f4 |A#"._.&.A..1."X.| +peer0.org1.example.com | 00000020 a9 56 bf 4c 0d 02 20 04 b0 e9 5b dd ab 3a 1d f5 |.V.L.. ...[..:..| +peer0.org1.example.com | 00000030 d9 30 32 52 3c 64 3c d4 ae 11 4e 35 43 5f bd 65 |.02R DEBU 5fd5 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:05.889 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5fd6 validateChaincodeProposalMessage starts for proposal 0xc003142e70, header 0xc003af3e00" +peer0.org1.example.com | "2019-09-24 00:27:05.889 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5fd7 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.889 UTC [endorser] preProcess -> DEBU 5fd8 [businesschannel][7279768c] processing txid: 7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b" +peer0.org1.example.com | "2019-09-24 00:27:05.889 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5fd9 retrieveTransactionByID() - txId = [7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b]" +peer0.org1.example.com | "2019-09-24 00:27:05.889 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5fda constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:27:05.889 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5fdb constructing new tx simulator txid = [7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b]" +peer0.org1.example.com | "2019-09-24 00:27:05.889 UTC [endorser] SimulateProposal -> DEBU 5fdc [businesschannel][7279768c] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.889 UTC [endorser] callChaincode -> INFO 5fdd [businesschannel][7279768c] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.889 UTC [chaincode] Execute -> DEBU 5fde Entry" +peer0.org1.example.com | "2019-09-24 00:27:05.890 UTC [msp.identity] Verify -> DEBU 5fdf Verify: digest = 00000000 12 d9 52 d7 e9 d4 06 8e 8d c1 aa 20 73 d1 48 b0 |..R........ s.H.| +peer0.org1.example.com | 00000010 87 9b 80 f9 09 4e bc 5e d0 98 82 2b 17 b3 59 7c |.....N.^...+..Y||" +peer0.org1.example.com | "2019-09-24 00:27:05.890 UTC [msp.identity] Verify -> DEBU 5fe0 Verify: sig = 00000000 30 45 02 21 00 e9 2e 61 5b 6c ca 28 92 ca 96 1d |0E.!...a[l.(....| +peer0.org1.example.com | 00000010 41 23 22 87 5f 95 26 97 41 9c 10 31 e9 22 58 f4 |A#"._.&.A..1."X.| +peer0.org1.example.com | 00000020 a9 56 bf 4c 0d 02 20 04 b0 e9 5b dd ab 3a 1d f5 |.V.L.. ...[..:..| +peer0.org1.example.com | 00000030 d9 30 32 52 3c 64 3c d4 ae 11 4e 35 43 5f bd 65 |.02R DEBU 5fe1 [7279768c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:05.891 UTC [chaincode] Notify -> DEBU 5fe2 [7279768c] notifying Txid:7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:05.891 UTC [chaincode] Execute -> DEBU 5fe3 Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.891 UTC [endorser] callChaincode -> INFO 5fe4 [businesschannel][7279768c] Exit chaincode: name:"lscc" (2ms)" +peer0.org1.example.com | "2019-09-24 00:27:05.891 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5fe5 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:27:05.891 UTC [lockbasedtxmgr] Done -> DEBU 5fe6 Done with transaction simulation / query execution [7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b]" +peer0.org1.example.com | "2019-09-24 00:27:05.891 UTC [endorser] SimulateProposal -> DEBU 5fe7 [businesschannel][7279768c] Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.891 UTC [endorser] endorseProposal -> DEBU 5fe8 [businesschannel][7279768c] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:05.892 UTC [endorser] endorseProposal -> DEBU 5fe9 [businesschannel][7279768c] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 00:27:05.892 UTC [endorser] EndorseWithPlugin -> DEBU 5fea Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:27:05.892 UTC [msp.identity] Sign -> DEBU 5feb Sign: plaintext: 0A2075BE2E4A1181DFA20984E7BB841B...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:05.892 UTC [msp.identity] Sign -> DEBU 5fec Sign: digest: 723BE81DCCB4D44C037093B047A56ECDE3F61E69B563F6BA8F483F6F0E0CE0BC " +peer0.org1.example.com | "2019-09-24 00:27:05.892 UTC [endorser] EndorseWithPlugin -> DEBU 5fed Exiting {plugin: escc, channel: businesschannel, tx: 7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:27:05.893 UTC [endorser] endorseProposal -> DEBU 5fee [businesschannel][7279768c] Exit" +peer0.org1.example.com | "2019-09-24 00:27:05.893 UTC [lockbasedtxmgr] Done -> DEBU 5fef Done with transaction simulation / query execution [7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b]" +peer0.org1.example.com | "2019-09-24 00:27:05.893 UTC [endorser] func1 -> DEBU 5ff0 Exit: request from 172.18.0.9:51022" +peer0.org1.example.com | "2019-09-24 00:27:05.893 UTC [comm.grpc.server] 1 -> INFO 5ff1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51022 grpc.code=OK grpc.call_duration=5.7508ms +peer0.org1.example.com | "2019-09-24 00:27:05.900 UTC [grpc] infof -> DEBU 5ff2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:05.901 UTC [grpc] infof -> DEBU 5ff3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:06.008 UTC [gossip.comm] func1 -> DEBU 5ff4 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:06.008 UTC [gossip.gossip] handleMessage -> DEBU 5ff5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:06.008 UTC [msp] DeserializeIdentity -> DEBU 5ff6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:06.008 UTC [msp] DeserializeIdentity -> DEBU 5ff7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:06.008 UTC [msp] DeserializeIdentity -> DEBU 5ff8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:06.008 UTC [gossip.gossip] handleMessage -> DEBU 5ff9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:06.017 UTC [gossip.comm] func1 -> DEBU 5ffa Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:06.018 UTC [gossip.gossip] handleMessage -> DEBU 5ffb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:06.018 UTC [msp] DeserializeIdentity -> DEBU 5ffc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:06.018 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5ffd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:06.018 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5ffe Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:06.018 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5fff Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:06.018 UTC [policies] Evaluate -> DEBU 6000 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [policies] Evaluate -> DEBU 6001 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [policies] Evaluate -> DEBU 6002 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [cauthdsl] func1 -> DEBU 6003 0xc0040182f0 gate 1569284826019307900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 6004 0xc0040182f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 6005 0xc0040182f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 6006 0xc0040182f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 6007 0xc0040182f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [cauthdsl] func1 -> DEBU 6008 0xc0040182f0 gate 1569284826019307900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [policies] Evaluate -> DEBU 6009 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [policies] Evaluate -> DEBU 600a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [policies] Evaluate -> DEBU 600b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [cauthdsl] func1 -> DEBU 600c 0xc004018b30 gate 1569284826019805300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 600d 0xc004018b30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 600e 0xc004018b30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 600f 0xc004018b30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [msp.identity] Verify -> DEBU 6010 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:06.019 UTC [msp.identity] Verify -> DEBU 6011 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6012 0xc004018b30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func1 -> DEBU 6013 0xc004018b30 gate 1569284826019805300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6014 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6015 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6016 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6017 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [msp] DeserializeIdentity -> DEBU 6018 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [msp] DeserializeIdentity -> DEBU 6019 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 601a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 601b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 601c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 601d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 601e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func1 -> DEBU 601f 0xc004019d10 gate 1569284826020516800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6020 0xc004019d10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6021 0xc004019d10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6022 0xc004019d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6023 0xc004019d10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func1 -> DEBU 6024 0xc004019d10 gate 1569284826020516800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6025 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6026 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6027 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func1 -> DEBU 6028 0xc00425e550 gate 1569284826020796500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6029 0xc00425e550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 602a 0xc00425e550 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 602b 0xc00425e550 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [msp.identity] Verify -> DEBU 602c Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:06.020 UTC [msp.identity] Verify -> DEBU 602d Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:06.021 UTC [cauthdsl] func2 -> DEBU 602e 0xc00425e550 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:06.021 UTC [cauthdsl] func1 -> DEBU 602f 0xc00425e550 gate 1569284826020796500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:06.021 UTC [policies] Evaluate -> DEBU 6030 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.021 UTC [policies] Evaluate -> DEBU 6031 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.021 UTC [policies] Evaluate -> DEBU 6032 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.021 UTC [policies] Evaluate -> DEBU 6033 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.021 UTC [gossip.gossip] handleMessage -> DEBU 6034 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:06.027 UTC [msp] DeserializeIdentity -> DEBU 6035 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:06.027 UTC [msp] DeserializeIdentity -> DEBU 6036 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:06.028 UTC [gossip.comm] Send -> DEBU 6037 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers" +peer0.org1.example.com | "2019-09-24 00:27:06.028 UTC [msp] DeserializeIdentity -> DEBU 6038 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:06.028 UTC [msp] DeserializeIdentity -> DEBU 6039 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:06.028 UTC [gossip.comm] sendToEndpoint -> DEBU 603a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:06.028 UTC [gossip.comm] sendToEndpoint -> DEBU 603b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:06.029 UTC [gossip.comm] sendToEndpoint -> DEBU 603c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:06.029 UTC [gossip.comm] sendToEndpoint -> DEBU 603d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:06.060 UTC [endorser] ProcessProposal -> DEBU 603e Entering: request from 172.18.0.9:51026" +peer0.org1.example.com | "2019-09-24 00:27:06.060 UTC [protoutils] ValidateProposalMessage -> DEBU 603f ValidateProposalMessage starts for signed proposal 0xc003c3e550" +peer0.org1.example.com | "2019-09-24 00:27:06.060 UTC [protoutils] validateChannelHeader -> DEBU 6040 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:06.060 UTC [protoutils] checkSignatureFromCreator -> DEBU 6041 begin" +peer0.org1.example.com | "2019-09-24 00:27:06.060 UTC [msp] GetManagerForChain -> DEBU 6042 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:06.060 UTC [protoutils] checkSignatureFromCreator -> DEBU 6043 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:06.060 UTC [protoutils] checkSignatureFromCreator -> DEBU 6044 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:06.061 UTC [msp.identity] Verify -> DEBU 6045 Verify: digest = 00000000 e6 da f8 74 b3 07 fd 97 30 f0 21 04 c8 21 d7 2d |...t....0.!..!.-| +peer0.org1.example.com | 00000010 cd b2 73 50 de a1 86 aa d1 09 1c 8b 68 ca 18 95 |..sP........h...|" +peer0.org1.example.com | "2019-09-24 00:27:06.061 UTC [msp.identity] Verify -> DEBU 6046 Verify: sig = 00000000 30 45 02 21 00 fa 01 41 73 3d 4f 18 43 5c a8 4d |0E.!...As=O.C\.M| +peer0.org1.example.com | 00000010 26 15 6a 03 d2 22 7f 63 b4 52 f4 d7 21 be 63 26 |&.j..".c.R..!.c&| +peer0.org1.example.com | 00000020 ac 89 2e 67 33 02 20 37 ab e2 c6 ad 9d ae 15 7d |...g3. 7.......}| +peer0.org1.example.com | 00000030 30 d3 29 39 53 12 cb 5e d2 49 92 8d a8 db 2c 18 |0.)9S..^.I....,.| +peer0.org1.example.com | 00000040 8a 90 c8 22 b7 d7 ba |..."...|" +peer0.org1.example.com | "2019-09-24 00:27:06.061 UTC [protoutils] checkSignatureFromCreator -> DEBU 6047 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:06.061 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6048 validateChaincodeProposalMessage starts for proposal 0xc0031432d0, header 0xc003c3ea00" +peer0.org1.example.com | "2019-09-24 00:27:06.061 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6049 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.061 UTC [endorser] preProcess -> DEBU 604a [businesschannel][5d80e13a] processing txid: 5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3" +peer0.org1.example.com | "2019-09-24 00:27:06.061 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 604b retrieveTransactionByID() - txId = [5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3]" +peer0.org1.example.com | "2019-09-24 00:27:06.061 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 604c constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:27:06.061 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 604d constructing new tx simulator txid = [5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3]" +peer0.org1.example.com | "2019-09-24 00:27:06.061 UTC [endorser] SimulateProposal -> DEBU 604e [businesschannel][5d80e13a] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.062 UTC [endorser] callChaincode -> INFO 604f [businesschannel][5d80e13a] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.062 UTC [chaincode] Execute -> DEBU 6050 Entry" +peer0.org1.example.com | "2019-09-24 00:27:06.062 UTC [aclmgmt] CheckACL -> DEBU 6051 acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes" +peer0.org1.example.com | "2019-09-24 00:27:06.062 UTC [aclmgmt] CheckACL -> DEBU 6052 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 00:27:06.062 UTC [policies] Evaluate -> DEBU 6053 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.062 UTC [policies] Evaluate -> DEBU 6054 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:06.062 UTC [policies] Evaluate -> DEBU 6055 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.062 UTC [cauthdsl] func1 -> DEBU 6056 0xc0027df380 gate 1569284826062922800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:06.063 UTC [cauthdsl] func2 -> DEBU 6057 0xc0027df380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:06.063 UTC [cauthdsl] func2 -> DEBU 6058 0xc0027df380 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:06.063 UTC [cauthdsl] func2 -> DEBU 6059 0xc0027df380 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:06.063 UTC [msp.identity] Verify -> DEBU 605a Verify: digest = 00000000 e6 da f8 74 b3 07 fd 97 30 f0 21 04 c8 21 d7 2d |...t....0.!..!.-| +peer0.org1.example.com | 00000010 cd b2 73 50 de a1 86 aa d1 09 1c 8b 68 ca 18 95 |..sP........h...|" +peer0.org1.example.com | "2019-09-24 00:27:06.063 UTC [msp.identity] Verify -> DEBU 605b Verify: sig = 00000000 30 45 02 21 00 fa 01 41 73 3d 4f 18 43 5c a8 4d |0E.!...As=O.C\.M| +peer0.org1.example.com | 00000010 26 15 6a 03 d2 22 7f 63 b4 52 f4 d7 21 be 63 26 |&.j..".c.R..!.c&| +peer0.org1.example.com | 00000020 ac 89 2e 67 33 02 20 37 ab e2 c6 ad 9d ae 15 7d |...g3. 7.......}| +peer0.org1.example.com | 00000030 30 d3 29 39 53 12 cb 5e d2 49 92 8d a8 db 2c 18 |0.)9S..^.I....,.| +peer0.org1.example.com | 00000040 8a 90 c8 22 b7 d7 ba |..."...|" +peer0.org1.example.com | "2019-09-24 00:27:06.063 UTC [cauthdsl] func2 -> DEBU 605c 0xc0027df380 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:06.063 UTC [cauthdsl] func1 -> DEBU 605d 0xc0027df380 gate 1569284826062922800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:06.063 UTC [policies] Evaluate -> DEBU 605e Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.064 UTC [policies] Evaluate -> DEBU 605f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.064 UTC [policies] Evaluate -> DEBU 6060 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.064 UTC [policies] Evaluate -> DEBU 6061 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.064 UTC [chaincode] handleMessage -> DEBU 6062 [5d80e13a] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:06.064 UTC [chaincode] HandleTransaction -> DEBU 6063 [5d80e13a] handling GET_STATE_BY_RANGE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:06.065 UTC [leveldbhelper] GetIterator -> DEBU 6064 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}]" +peer0.org1.example.com | "2019-09-24 00:27:06.065 UTC [rwsetutil] AddResult -> DEBU 6065 Adding a result" +peer0.org1.example.com | "2019-09-24 00:27:06.065 UTC [chaincode] HandleGetStateByRange -> DEBU 6066 Got keys and values. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:06.065 UTC [chaincode] HandleTransaction -> DEBU 6067 [5d80e13a] Completed GET_STATE_BY_RANGE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:06.066 UTC [chaincode] handleMessage -> DEBU 6068 [5d80e13a] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready" +peer0.org1.example.com | "2019-09-24 00:27:06.066 UTC [chaincode] HandleTransaction -> DEBU 6069 [5d80e13a] handling QUERY_STATE_CLOSE from chaincode" +peer0.org1.example.com | "2019-09-24 00:27:06.066 UTC [chaincode] HandleTransaction -> DEBU 606a [5d80e13a] Completed QUERY_STATE_CLOSE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 00:27:06.066 UTC [chaincode] handleMessage -> DEBU 606b [5d80e13a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:06.066 UTC [chaincode] Notify -> DEBU 606c [5d80e13a] notifying Txid:5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:06.066 UTC [chaincode] Execute -> DEBU 606d Exit" +peer0.org1.example.com | "2019-09-24 00:27:06.066 UTC [endorser] callChaincode -> INFO 606e [businesschannel][5d80e13a] Exit chaincode: name:"lscc" (4ms)" +peer0.org1.example.com | "2019-09-24 00:27:06.066 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 606f Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:27:06.066 UTC [lockbasedtxmgr] Done -> DEBU 6070 Done with transaction simulation / query execution [5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3]" +peer0.org1.example.com | "2019-09-24 00:27:06.066 UTC [endorser] SimulateProposal -> DEBU 6071 [businesschannel][5d80e13a] Exit" +peer0.org1.example.com | "2019-09-24 00:27:06.066 UTC [endorser] endorseProposal -> DEBU 6072 [businesschannel][5d80e13a] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.067 UTC [endorser] endorseProposal -> DEBU 6073 [businesschannel][5d80e13a] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 00:27:06.067 UTC [endorser] EndorseWithPlugin -> DEBU 6074 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:27:06.067 UTC [msp.identity] Sign -> DEBU 6075 Sign: plaintext: 0A20829349F171313F5A2865B452A536...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:06.067 UTC [msp.identity] Sign -> DEBU 6076 Sign: digest: BBBCF440C1C00FA3DDD231A6DC9F065C4327A8700613BB2E6BFB198470BCF9AF " +peer0.org1.example.com | "2019-09-24 00:27:06.067 UTC [endorser] EndorseWithPlugin -> DEBU 6077 Exiting {plugin: escc, channel: businesschannel, tx: 5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 00:27:06.067 UTC [endorser] endorseProposal -> DEBU 6078 [businesschannel][5d80e13a] Exit" +peer0.org1.example.com | "2019-09-24 00:27:06.067 UTC [lockbasedtxmgr] Done -> DEBU 6079 Done with transaction simulation / query execution [5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3]" +peer0.org1.example.com | "2019-09-24 00:27:06.067 UTC [endorser] func1 -> DEBU 607a Exit: request from 172.18.0.9:51026" +peer0.org1.example.com | "2019-09-24 00:27:06.068 UTC [comm.grpc.server] 1 -> INFO 607b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51026 grpc.code=OK grpc.call_duration=7.9885ms +peer0.org1.example.com | "2019-09-24 00:27:06.071 UTC [grpc] infof -> DEBU 607c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:06.071 UTC [grpc] infof -> DEBU 607d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:06.433 UTC [endorser] ProcessProposal -> DEBU 607e Entering: request from 172.18.0.9:51030" +peer0.org1.example.com | "2019-09-24 00:27:06.434 UTC [protoutils] ValidateProposalMessage -> DEBU 607f ValidateProposalMessage starts for signed proposal 0xc003d6cbe0" +peer0.org1.example.com | "2019-09-24 00:27:06.434 UTC [protoutils] validateChannelHeader -> DEBU 6080 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:06.434 UTC [protoutils] checkSignatureFromCreator -> DEBU 6081 begin" +peer0.org1.example.com | "2019-09-24 00:27:06.435 UTC [msp] GetManagerForChain -> DEBU 6082 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:06.435 UTC [protoutils] checkSignatureFromCreator -> DEBU 6083 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:06.435 UTC [protoutils] checkSignatureFromCreator -> DEBU 6084 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:06.436 UTC [msp.identity] Verify -> DEBU 6085 Verify: digest = 00000000 0c 96 31 0c d6 3b 15 61 d7 75 94 a5 36 ab bb a5 |..1..;.a.u..6...| +peer0.org1.example.com | 00000010 af 7b ae 39 f8 fa 09 29 cf 89 68 64 00 86 e0 3f |.{.9...)..hd...?|" +peer0.org1.example.com | "2019-09-24 00:27:06.436 UTC [msp.identity] Verify -> DEBU 6086 Verify: sig = 00000000 30 45 02 21 00 f7 22 56 34 46 26 2c 59 9f 27 24 |0E.!.."V4F&,Y.'$| +peer0.org1.example.com | 00000010 b0 64 c1 59 9c c1 d0 d7 13 21 3a 23 fb 2b 48 1d |.d.Y.....!:#.+H.| +peer0.org1.example.com | 00000020 1a 4f 1b a0 8b 02 20 5f 3c a5 8e 08 5c 17 9b 74 |.O.... _<...\..t| +peer0.org1.example.com | 00000030 8e 96 74 fe fa 10 6c 0b 20 d0 82 23 aa a3 3c 4f |..t...l. ..#.. DEBU 6087 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:06.437 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6088 validateChaincodeProposalMessage starts for proposal 0xc00338c380, header 0xc003d6d090" +peer0.org1.example.com | "2019-09-24 00:27:06.437 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6089 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.437 UTC [endorser] preProcess -> DEBU 608a [businesschannel][39d3b48b] processing txid: 39d3b48b777b98f85a10a18bf26ddf6d1b2ed8539854875ba6a579cd45cfa205" +peer0.org1.example.com | "2019-09-24 00:27:06.438 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 608b retrieveTransactionByID() - txId = [39d3b48b777b98f85a10a18bf26ddf6d1b2ed8539854875ba6a579cd45cfa205]" +peer0.org1.example.com | "2019-09-24 00:27:06.438 UTC [endorser] SimulateProposal -> DEBU 608c [businesschannel][39d3b48b] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.438 UTC [endorser] callChaincode -> INFO 608d [businesschannel][39d3b48b] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [chaincode] Execute -> DEBU 608e Entry" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [qscc] Invoke -> DEBU 608f Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [aclmgmt] CheckACL -> DEBU 6090 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [aclmgmt] CheckACL -> DEBU 6091 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [policies] Evaluate -> DEBU 6092 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [policies] Evaluate -> DEBU 6093 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [policies] Evaluate -> DEBU 6094 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [cauthdsl] func1 -> DEBU 6095 0xc003ba4640 gate 1569284826439783100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [cauthdsl] func2 -> DEBU 6096 0xc003ba4640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [cauthdsl] func2 -> DEBU 6097 0xc003ba4640 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [cauthdsl] func2 -> DEBU 6098 0xc003ba4640 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [msp.identity] Verify -> DEBU 6099 Verify: digest = 00000000 0c 96 31 0c d6 3b 15 61 d7 75 94 a5 36 ab bb a5 |..1..;.a.u..6...| +peer0.org1.example.com | 00000010 af 7b ae 39 f8 fa 09 29 cf 89 68 64 00 86 e0 3f |.{.9...)..hd...?|" +peer0.org1.example.com | "2019-09-24 00:27:06.439 UTC [msp.identity] Verify -> DEBU 609a Verify: sig = 00000000 30 45 02 21 00 f7 22 56 34 46 26 2c 59 9f 27 24 |0E.!.."V4F&,Y.'$| +peer0.org1.example.com | 00000010 b0 64 c1 59 9c c1 d0 d7 13 21 3a 23 fb 2b 48 1d |.d.Y.....!:#.+H.| +peer0.org1.example.com | 00000020 1a 4f 1b a0 8b 02 20 5f 3c a5 8e 08 5c 17 9b 74 |.O.... _<...\..t| +peer0.org1.example.com | 00000030 8e 96 74 fe fa 10 6c 0b 20 d0 82 23 aa a3 3c 4f |..t...l. ..#.. DEBU 609b 0xc003ba4640 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [cauthdsl] func1 -> DEBU 609c 0xc003ba4640 gate 1569284826439783100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [policies] Evaluate -> DEBU 609d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [policies] Evaluate -> DEBU 609e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [policies] Evaluate -> DEBU 609f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [policies] Evaluate -> DEBU 60a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [chaincode] handleMessage -> DEBU 60a1 [39d3b48b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [chaincode] Notify -> DEBU 60a2 [39d3b48b] notifying Txid:39d3b48b777b98f85a10a18bf26ddf6d1b2ed8539854875ba6a579cd45cfa205, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [chaincode] Execute -> DEBU 60a3 Exit" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [endorser] callChaincode -> INFO 60a4 [businesschannel][39d3b48b] Exit chaincode: name:"qscc" (1ms)" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [endorser] SimulateProposal -> DEBU 60a5 [businesschannel][39d3b48b] Exit" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [endorser] endorseProposal -> DEBU 60a6 [businesschannel][39d3b48b] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [endorser] endorseProposal -> DEBU 60a7 [businesschannel][39d3b48b] escc for chaincode name:"qscc" is escc" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [endorser] EndorseWithPlugin -> DEBU 60a8 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 39d3b48b777b98f85a10a18bf26ddf6d1b2ed8539854875ba6a579cd45cfa205, chaincode: qscc}" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [msp.identity] Sign -> DEBU 60a9 Sign: plaintext: 0A201416272DA959D41C2720528DCBC8...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [msp.identity] Sign -> DEBU 60aa Sign: digest: 6E85B9F04AA0F9A5677AE03555332F12BDA879A7F662730688679A1BA5BCBB0E " +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [endorser] EndorseWithPlugin -> DEBU 60ab Exiting {plugin: escc, channel: businesschannel, tx: 39d3b48b777b98f85a10a18bf26ddf6d1b2ed8539854875ba6a579cd45cfa205, chaincode: qscc}" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [endorser] endorseProposal -> DEBU 60ac [businesschannel][39d3b48b] Exit" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [endorser] func1 -> DEBU 60ad Exit: request from 172.18.0.9:51030" +peer0.org1.example.com | "2019-09-24 00:27:06.440 UTC [comm.grpc.server] 1 -> INFO 60ae unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51030 grpc.code=OK grpc.call_duration=7.2429ms +peer0.org1.example.com | "2019-09-24 00:27:06.444 UTC [grpc] infof -> DEBU 60af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:06.444 UTC [grpc] warningf -> DEBU 60b0 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:51030: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 00:27:06.445 UTC [grpc] infof -> DEBU 60b1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [endorser] ProcessProposal -> DEBU 60b2 Entering: request from 172.18.0.9:51034" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [protoutils] ValidateProposalMessage -> DEBU 60b3 ValidateProposalMessage starts for signed proposal 0xc003d6d7c0" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [protoutils] validateChannelHeader -> DEBU 60b4 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [protoutils] checkSignatureFromCreator -> DEBU 60b5 begin" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [msp] GetManagerForChain -> DEBU 60b6 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [protoutils] checkSignatureFromCreator -> DEBU 60b7 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [protoutils] checkSignatureFromCreator -> DEBU 60b8 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [msp.identity] Verify -> DEBU 60b9 Verify: digest = 00000000 ac a7 2a eb d0 af 89 a3 c6 23 98 d0 de f0 39 22 |..*......#....9"| +peer0.org1.example.com | 00000010 a3 19 27 89 fb a7 70 37 e4 aa 7b 01 67 bc f4 89 |..'...p7..{.g...|" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [msp.identity] Verify -> DEBU 60ba Verify: sig = 00000000 30 44 02 20 19 09 50 49 64 b9 11 80 a5 7f 56 d7 |0D. ..PId.....V.| +peer0.org1.example.com | 00000010 f0 6b 57 d1 00 37 e6 2f 3e 58 bd 70 92 d0 69 56 |.kW..7./>X.p..iV| +peer0.org1.example.com | 00000020 26 86 c6 06 02 20 2e 07 63 ba 2b 78 00 25 42 aa |&.... ..c.+x.%B.| +peer0.org1.example.com | 00000030 3c 83 68 1f e3 4e 79 d5 86 99 8a 4b d5 f3 72 ad |<.h..Ny....K..r.| +peer0.org1.example.com | 00000040 7b e1 a9 33 4d 51 |{..3MQ|" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [protoutils] checkSignatureFromCreator -> DEBU 60bb exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 60bc validateChaincodeProposalMessage starts for proposal 0xc00338c690, header 0xc003d6dbd0" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 60bd validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [endorser] preProcess -> DEBU 60be [businesschannel][7bbb2e7f] processing txid: 7bbb2e7fbc2cd6dfaf46a60fc72b422798afe54cef7fa652b1f7e8cbd92f40ba" +peer0.org1.example.com | "2019-09-24 00:27:06.595 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 60bf retrieveTransactionByID() - txId = [7bbb2e7fbc2cd6dfaf46a60fc72b422798afe54cef7fa652b1f7e8cbd92f40ba]" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [endorser] SimulateProposal -> DEBU 60c0 [businesschannel][7bbb2e7f] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [endorser] callChaincode -> INFO 60c1 [businesschannel][7bbb2e7f] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [chaincode] Execute -> DEBU 60c2 Entry" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [qscc] Invoke -> DEBU 60c3 Invoke function: GetBlockByNumber on chain: businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [aclmgmt] CheckACL -> DEBU 60c4 acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [aclmgmt] CheckACL -> DEBU 60c5 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [cauthdsl] func1 -> DEBU 60c9 0xc003f73a90 gate 1569284826596436400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [cauthdsl] func2 -> DEBU 60ca 0xc003f73a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [cauthdsl] func2 -> DEBU 60cb 0xc003f73a90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [cauthdsl] func2 -> DEBU 60cc 0xc003f73a90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [msp.identity] Verify -> DEBU 60cd Verify: digest = 00000000 ac a7 2a eb d0 af 89 a3 c6 23 98 d0 de f0 39 22 |..*......#....9"| +peer0.org1.example.com | 00000010 a3 19 27 89 fb a7 70 37 e4 aa 7b 01 67 bc f4 89 |..'...p7..{.g...|" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [msp.identity] Verify -> DEBU 60ce Verify: sig = 00000000 30 44 02 20 19 09 50 49 64 b9 11 80 a5 7f 56 d7 |0D. ..PId.....V.| +peer0.org1.example.com | 00000010 f0 6b 57 d1 00 37 e6 2f 3e 58 bd 70 92 d0 69 56 |.kW..7./>X.p..iV| +peer0.org1.example.com | 00000020 26 86 c6 06 02 20 2e 07 63 ba 2b 78 00 25 42 aa |&.... ..c.+x.%B.| +peer0.org1.example.com | 00000030 3c 83 68 1f e3 4e 79 d5 86 99 8a 4b d5 f3 72 ad |<.h..Ny....K..r.| +peer0.org1.example.com | 00000040 7b e1 a9 33 4d 51 |{..3MQ|" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [cauthdsl] func2 -> DEBU 60cf 0xc003f73a90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [cauthdsl] func1 -> DEBU 60d0 0xc003f73a90 gate 1569284826596436400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60d1 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60d3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 60d5 retrieveBlockByNumber() - blockNum = [2]" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [fsblkstorage] newBlockfileStream -> DEBU 60d6 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47677]" +peer0.org1.example.com | "2019-09-24 00:27:06.596 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 60d7 Remaining bytes=[36408], Going to peek [8] bytes" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 60d8 Returning blockbytes - length=[23782], placementInfo={fileNum=[0], startOffset=[47677], bytesOffset=[47680]}" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [chaincode] handleMessage -> DEBU 60d9 [7bbb2e7f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [chaincode] Notify -> DEBU 60da [7bbb2e7f] notifying Txid:7bbb2e7fbc2cd6dfaf46a60fc72b422798afe54cef7fa652b1f7e8cbd92f40ba, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [chaincode] Execute -> DEBU 60db Exit" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [endorser] callChaincode -> INFO 60dc [businesschannel][7bbb2e7f] Exit chaincode: name:"qscc" (1ms)" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [endorser] SimulateProposal -> DEBU 60dd [businesschannel][7bbb2e7f] Exit" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [endorser] endorseProposal -> DEBU 60de [businesschannel][7bbb2e7f] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [endorser] endorseProposal -> DEBU 60df [businesschannel][7bbb2e7f] escc for chaincode name:"qscc" is escc" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [endorser] EndorseWithPlugin -> DEBU 60e0 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7bbb2e7fbc2cd6dfaf46a60fc72b422798afe54cef7fa652b1f7e8cbd92f40ba, chaincode: qscc}" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [msp.identity] Sign -> DEBU 60e1 Sign: plaintext: 0A20E975A26AF2DBD2588FEE9BB826F4...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [msp.identity] Sign -> DEBU 60e2 Sign: digest: 036F1A0C7F140E137DB0FE8402C258203181C4340B85D79C2E2948C36DF8FDDD " +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [endorser] EndorseWithPlugin -> DEBU 60e3 Exiting {plugin: escc, channel: businesschannel, tx: 7bbb2e7fbc2cd6dfaf46a60fc72b422798afe54cef7fa652b1f7e8cbd92f40ba, chaincode: qscc}" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [endorser] endorseProposal -> DEBU 60e4 [businesschannel][7bbb2e7f] Exit" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [endorser] func1 -> DEBU 60e5 Exit: request from 172.18.0.9:51034" +peer0.org1.example.com | "2019-09-24 00:27:06.597 UTC [comm.grpc.server] 1 -> INFO 60e6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51034 grpc.code=OK grpc.call_duration=2.81ms +peer0.org1.example.com | "2019-09-24 00:27:06.601 UTC [grpc] infof -> DEBU 60e7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:06.601 UTC [grpc] infof -> DEBU 60e8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:07.022 UTC [endorser] ProcessProposal -> DEBU 60e9 Entering: request from 172.18.0.9:51038" +peer0.org1.example.com | "2019-09-24 00:27:07.022 UTC [protoutils] ValidateProposalMessage -> DEBU 60ea ValidateProposalMessage starts for signed proposal 0xc003e4e280" +peer0.org1.example.com | "2019-09-24 00:27:07.023 UTC [protoutils] validateChannelHeader -> DEBU 60eb validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:07.023 UTC [protoutils] checkSignatureFromCreator -> DEBU 60ec begin" +peer0.org1.example.com | "2019-09-24 00:27:07.024 UTC [msp] GetManagerForChain -> DEBU 60ed Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:07.024 UTC [protoutils] checkSignatureFromCreator -> DEBU 60ee creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:07.024 UTC [protoutils] checkSignatureFromCreator -> DEBU 60ef creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:07.024 UTC [msp.identity] Verify -> DEBU 60f0 Verify: digest = 00000000 70 e4 68 5a 6c 25 31 0d 35 d5 4f 8c 14 1a ae 5f |p.hZl%1.5.O...._| +peer0.org1.example.com | 00000010 38 35 c4 92 f3 94 7c b9 5e 69 1f ae 38 59 cb 8f |85....|.^i..8Y..|" +peer0.org1.example.com | "2019-09-24 00:27:07.024 UTC [msp.identity] Verify -> DEBU 60f1 Verify: sig = 00000000 30 44 02 20 75 71 13 1c 22 65 ef a5 6a 5e c6 0b |0D. uq.."e..j^..| +peer0.org1.example.com | 00000010 74 80 f6 8e 19 33 39 70 1c fd 17 ce 9f 0a a2 53 |t....39p.......S| +peer0.org1.example.com | 00000020 a7 db a1 ef 02 20 42 02 6a 05 96 40 fe a3 ac 44 |..... B.j..@...D| +peer0.org1.example.com | 00000030 dd 2b 17 3d d0 fd ee 43 7e 8c 9b 25 d8 92 c8 7d |.+.=...C~..%...}| +peer0.org1.example.com | 00000040 96 c6 0b 19 fb 49 |.....I|" +peer0.org1.example.com | "2019-09-24 00:27:07.025 UTC [protoutils] checkSignatureFromCreator -> DEBU 60f2 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:07.025 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 60f3 validateChaincodeProposalMessage starts for proposal 0xc0031f7c70, header 0xc003e4e6e0" +peer0.org1.example.com | "2019-09-24 00:27:07.025 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 60f4 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:27:07.026 UTC [endorser] preProcess -> DEBU 60f5 [businesschannel][c51abd18] processing txid: c51abd1857c515c8620b861a38768ba2a0355d91bfcba5f3ce1302af7b95e936" +peer0.org1.example.com | "2019-09-24 00:27:07.026 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 60f6 retrieveTransactionByID() - txId = [c51abd1857c515c8620b861a38768ba2a0355d91bfcba5f3ce1302af7b95e936]" +peer0.org1.example.com | "2019-09-24 00:27:07.026 UTC [endorser] SimulateProposal -> DEBU 60f7 [businesschannel][c51abd18] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:27:07.026 UTC [endorser] callChaincode -> INFO 60f8 [businesschannel][c51abd18] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:27:07.027 UTC [chaincode] Execute -> DEBU 60f9 Entry" +peer0.org1.example.com | "2019-09-24 00:27:07.027 UTC [cscc] Invoke -> DEBU 60fa Invoke function: GetConfigBlock" +peer0.org1.example.com | "2019-09-24 00:27:07.027 UTC [aclmgmt] CheckACL -> DEBU 60fb acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +peer0.org1.example.com | "2019-09-24 00:27:07.028 UTC [aclmgmt] CheckACL -> DEBU 60fc acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 00:27:07.028 UTC [policies] Evaluate -> DEBU 60fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:07.028 UTC [policies] Evaluate -> DEBU 60fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:07.028 UTC [policies] Evaluate -> DEBU 60ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:07.028 UTC [cauthdsl] func1 -> DEBU 6100 0xc0041cc190 gate 1569284827028854100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:07.029 UTC [cauthdsl] func2 -> DEBU 6101 0xc0041cc190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:07.029 UTC [cauthdsl] func2 -> DEBU 6102 0xc0041cc190 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:07.029 UTC [cauthdsl] func2 -> DEBU 6103 0xc0041cc190 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:07.029 UTC [msp.identity] Verify -> DEBU 6104 Verify: digest = 00000000 70 e4 68 5a 6c 25 31 0d 35 d5 4f 8c 14 1a ae 5f |p.hZl%1.5.O...._| +peer0.org1.example.com | 00000010 38 35 c4 92 f3 94 7c b9 5e 69 1f ae 38 59 cb 8f |85....|.^i..8Y..|" +peer0.org1.example.com | "2019-09-24 00:27:07.030 UTC [msp.identity] Verify -> DEBU 6105 Verify: sig = 00000000 30 44 02 20 75 71 13 1c 22 65 ef a5 6a 5e c6 0b |0D. uq.."e..j^..| +peer0.org1.example.com | 00000010 74 80 f6 8e 19 33 39 70 1c fd 17 ce 9f 0a a2 53 |t....39p.......S| +peer0.org1.example.com | 00000020 a7 db a1 ef 02 20 42 02 6a 05 96 40 fe a3 ac 44 |..... B.j..@...D| +peer0.org1.example.com | 00000030 dd 2b 17 3d d0 fd ee 43 7e 8c 9b 25 d8 92 c8 7d |.+.=...C~..%...}| +peer0.org1.example.com | 00000040 96 c6 0b 19 fb 49 |.....I|" +peer0.org1.example.com | "2019-09-24 00:27:07.030 UTC [cauthdsl] func2 -> DEBU 6106 0xc0041cc190 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:07.030 UTC [cauthdsl] func1 -> DEBU 6107 0xc0041cc190 gate 1569284827028854100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:07.030 UTC [policies] Evaluate -> DEBU 6108 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:07.031 UTC [policies] Evaluate -> DEBU 6109 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:07.031 UTC [policies] Evaluate -> DEBU 610a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:07.032 UTC [policies] Evaluate -> DEBU 610b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:07.032 UTC [chaincode] handleMessage -> DEBU 610c [c51abd18] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:07.032 UTC [chaincode] Notify -> DEBU 610d [c51abd18] notifying Txid:c51abd1857c515c8620b861a38768ba2a0355d91bfcba5f3ce1302af7b95e936, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:07.033 UTC [chaincode] Execute -> DEBU 610e Exit" +peer0.org1.example.com | "2019-09-24 00:27:07.033 UTC [endorser] callChaincode -> INFO 610f [businesschannel][c51abd18] Exit chaincode: name:"cscc" (6ms)" +peer0.org1.example.com | "2019-09-24 00:27:07.036 UTC [endorser] SimulateProposal -> DEBU 6110 [businesschannel][c51abd18] Exit" +peer0.org1.example.com | "2019-09-24 00:27:07.037 UTC [endorser] endorseProposal -> DEBU 6111 [businesschannel][c51abd18] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:27:07.037 UTC [endorser] endorseProposal -> DEBU 6112 [businesschannel][c51abd18] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-09-24 00:27:07.038 UTC [endorser] EndorseWithPlugin -> DEBU 6113 Entering endorsement for {plugin: escc, channel: businesschannel, tx: c51abd1857c515c8620b861a38768ba2a0355d91bfcba5f3ce1302af7b95e936, chaincode: cscc}" +peer0.org1.example.com | "2019-09-24 00:27:07.038 UTC [msp.identity] Sign -> DEBU 6114 Sign: plaintext: 0A20C85A4F9366C60AA414EBEED8F2EA...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:07.039 UTC [msp.identity] Sign -> DEBU 6115 Sign: digest: 0B3E7AD993E2ACCC6AFFADD248BF84853FD69640F87AC03F0F056D610DAA3478 " +peer0.org1.example.com | "2019-09-24 00:27:07.039 UTC [endorser] EndorseWithPlugin -> DEBU 6116 Exiting {plugin: escc, channel: businesschannel, tx: c51abd1857c515c8620b861a38768ba2a0355d91bfcba5f3ce1302af7b95e936, chaincode: cscc}" +peer0.org1.example.com | "2019-09-24 00:27:07.039 UTC [endorser] endorseProposal -> DEBU 6117 [businesschannel][c51abd18] Exit" +peer0.org1.example.com | "2019-09-24 00:27:07.039 UTC [endorser] func1 -> DEBU 6118 Exit: request from 172.18.0.9:51038" +peer0.org1.example.com | "2019-09-24 00:27:07.040 UTC [comm.grpc.server] 1 -> INFO 6119 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51038 grpc.code=OK grpc.call_duration=17.9787ms +peer0.org1.example.com | "2019-09-24 00:27:07.044 UTC [grpc] infof -> DEBU 611a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:07.044 UTC [grpc] infof -> DEBU 611b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [endorser] ProcessProposal -> DEBU 611c Entering: request from 172.18.0.9:51042" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [protoutils] ValidateProposalMessage -> DEBU 611d ValidateProposalMessage starts for signed proposal 0xc003e4f720" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [protoutils] validateChannelHeader -> DEBU 611e validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 611f begin" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [msp] GetManagerForChain -> DEBU 6120 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 6121 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 6122 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [msp.identity] Verify -> DEBU 6123 Verify: digest = 00000000 8d c9 3f 87 d1 c4 af f4 3a 99 0b a6 11 9d dd b9 |..?.....:.......| +peer0.org1.example.com | 00000010 59 df a5 7a 25 fc 1b f1 ff 9c ad b6 cc 45 22 9f |Y..z%........E".|" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [msp.identity] Verify -> DEBU 6124 Verify: sig = 00000000 30 44 02 20 4f a1 34 4c 38 06 7c ab 51 60 57 d7 |0D. O.4L8.|.Q`W.| +peer0.org1.example.com | 00000010 2a 2a fd 7f 6f 14 15 da 01 cd d4 79 a8 74 84 28 |**..o......y.t.(| +peer0.org1.example.com | 00000020 80 33 bb b5 02 20 0d 20 06 46 a0 c6 04 a6 ae 87 |.3... . .F......| +peer0.org1.example.com | 00000030 3d c2 53 00 5e a4 af d6 2f 7c 34 92 50 e6 7b 2a |=.S.^.../|4.P.{*| +peer0.org1.example.com | 00000040 ea b9 8f 17 85 28 |.....(|" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 6125 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6126 validateChaincodeProposalMessage starts for proposal 0xc0034520e0, header 0xc003e4fb30" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6127 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [endorser] preProcess -> DEBU 6128 [businesschannel][28dcc04d] processing txid: 28dcc04db088ac939061358ea690098cb0788900b042503acc1e8d8ecbf884a8" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 6129 retrieveTransactionByID() - txId = [28dcc04db088ac939061358ea690098cb0788900b042503acc1e8d8ecbf884a8]" +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [endorser] SimulateProposal -> DEBU 612a [businesschannel][28dcc04d] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:27:07.189 UTC [endorser] callChaincode -> INFO 612b [businesschannel][28dcc04d] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [chaincode] Execute -> DEBU 612c Entry" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [cscc] Invoke -> DEBU 612d Invoke function: GetChannels" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [msp.identity] Verify -> DEBU 612e Verify: digest = 00000000 8d c9 3f 87 d1 c4 af f4 3a 99 0b a6 11 9d dd b9 |..?.....:.......| +peer0.org1.example.com | 00000010 59 df a5 7a 25 fc 1b f1 ff 9c ad b6 cc 45 22 9f |Y..z%........E".|" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [msp.identity] Verify -> DEBU 612f Verify: sig = 00000000 30 44 02 20 4f a1 34 4c 38 06 7c ab 51 60 57 d7 |0D. O.4L8.|.Q`W.| +peer0.org1.example.com | 00000010 2a 2a fd 7f 6f 14 15 da 01 cd d4 79 a8 74 84 28 |**..o......y.t.(| +peer0.org1.example.com | 00000020 80 33 bb b5 02 20 0d 20 06 46 a0 c6 04 a6 ae 87 |.3... . .F......| +peer0.org1.example.com | 00000030 3d c2 53 00 5e a4 af d6 2f 7c 34 92 50 e6 7b 2a |=.S.^.../|4.P.{*| +peer0.org1.example.com | 00000040 ea b9 8f 17 85 28 |.....(|" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [chaincode] handleMessage -> DEBU 6130 [28dcc04d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [chaincode] Notify -> DEBU 6131 [28dcc04d] notifying Txid:28dcc04db088ac939061358ea690098cb0788900b042503acc1e8d8ecbf884a8, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [chaincode] Execute -> DEBU 6132 Exit" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [endorser] callChaincode -> INFO 6133 [businesschannel][28dcc04d] Exit chaincode: name:"cscc" (0ms)" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [endorser] SimulateProposal -> DEBU 6134 [businesschannel][28dcc04d] Exit" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [endorser] endorseProposal -> DEBU 6135 [businesschannel][28dcc04d] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [endorser] endorseProposal -> DEBU 6136 [businesschannel][28dcc04d] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [endorser] EndorseWithPlugin -> DEBU 6137 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 28dcc04db088ac939061358ea690098cb0788900b042503acc1e8d8ecbf884a8, chaincode: cscc}" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [msp.identity] Sign -> DEBU 6138 Sign: plaintext: 0A20A5C0E5E90AD6B350C843E57A4FF7...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [msp.identity] Sign -> DEBU 6139 Sign: digest: A695DD73E199F816C78ABAFC4F65A8D53B334878ECBF28A490B935696B786C8F " +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [endorser] EndorseWithPlugin -> DEBU 613a Exiting {plugin: escc, channel: businesschannel, tx: 28dcc04db088ac939061358ea690098cb0788900b042503acc1e8d8ecbf884a8, chaincode: cscc}" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [endorser] endorseProposal -> DEBU 613b [businesschannel][28dcc04d] Exit" +peer0.org1.example.com | "2019-09-24 00:27:07.190 UTC [endorser] func1 -> DEBU 613c Exit: request from 172.18.0.9:51042" +peer0.org1.example.com | "2019-09-24 00:27:07.191 UTC [comm.grpc.server] 1 -> INFO 613d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51042 grpc.code=OK grpc.call_duration=2.0036ms +peer0.org1.example.com | "2019-09-24 00:27:07.194 UTC [grpc] infof -> DEBU 613e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:07.194 UTC [grpc] infof -> DEBU 613f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:07.319 UTC [gossip.election] waitForInterrupt -> DEBU 6140 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.319 UTC [gossip.election] IsLeader -> DEBU 6141 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:27:07.319 UTC [msp] GetDefaultSigningIdentity -> DEBU 6142 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:07.319 UTC [msp.identity] Sign -> DEBU 6143 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101B1801 " +peer0.org1.example.com | "2019-09-24 00:27:07.319 UTC [msp.identity] Sign -> DEBU 6144 Sign: digest: 1B57FFDE8A0149E1BA263E678640685A2D514FF1532A65404676BD64FFA482E9 " +peer0.org1.example.com | "2019-09-24 00:27:07.319 UTC [gossip.election] waitForInterrupt -> DEBU 6145 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:27:07.327 UTC [msp] DeserializeIdentity -> DEBU 6146 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.327 UTC [msp] DeserializeIdentity -> DEBU 6147 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.327 UTC [msp] DeserializeIdentity -> DEBU 6148 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.327 UTC [msp] DeserializeIdentity -> DEBU 6149 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.327 UTC [gossip.comm] Send -> DEBU 614a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 69 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:07.328 UTC [msp] DeserializeIdentity -> DEBU 614b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.328 UTC [msp] DeserializeIdentity -> DEBU 614c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.328 UTC [gossip.comm] sendToEndpoint -> DEBU 614d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.328 UTC [gossip.comm] sendToEndpoint -> DEBU 614e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.704 UTC [gossip.comm] func1 -> DEBU 614f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.704 UTC [gossip.gossip] handleMessage -> DEBU 6150 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.704 UTC [gossip.gossip] handleMessage -> DEBU 6151 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6152 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.705 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6153 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:07.705 UTC [msp.identity] Verify -> DEBU 6154 Verify: digest = 00000000 a1 bd 1d 40 93 47 08 1d 41 a7 e5 fe e9 d9 d6 dd |...@.G..A.......| +peer0.org1.example.com | 00000010 da ee a2 ce b8 08 6f e5 40 84 ac df 17 09 7a c6 |......o.@.....z.|" +peer0.org1.example.com | "2019-09-24 00:27:07.705 UTC [msp.identity] Verify -> DEBU 6155 Verify: sig = 00000000 30 45 02 21 00 8d e6 23 36 f9 63 19 9e a5 33 02 |0E.!...#6.c...3.| +peer0.org1.example.com | 00000010 1e 0e 95 bf 87 97 28 1a f3 7b 36 9c 05 64 8c c1 |......(..{6..d..| +peer0.org1.example.com | 00000020 ef 76 df 57 e9 02 20 18 f4 62 f4 2a c5 61 f7 cf |.v.W.. ..b.*.a..| +peer0.org1.example.com | 00000030 c1 95 43 6f d0 26 10 5a 15 7c e5 79 f7 3a c6 04 |..Co.&.Z.|.y.:..| +peer0.org1.example.com | 00000040 3b 2b 5b 46 23 e2 70 |;+[F#.p|" +peer0.org1.example.com | "2019-09-24 00:27:07.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 6156 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 6157 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:07.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 6158 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:07.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 6159 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:07.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 615a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:07.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 615b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 615c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 615d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.712 UTC [gossip.pull] Hello -> DEBU 615e Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:07.712 UTC [gossip.comm] Send -> DEBU 615f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:07.712 UTC [gossip.pull] Hello -> DEBU 6160 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:07.712 UTC [gossip.comm] Send -> DEBU 6161 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:07.712 UTC [gossip.pull] Hello -> DEBU 6162 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:07.712 UTC [gossip.comm] Send -> DEBU 6163 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:07.712 UTC [gossip.comm] sendToEndpoint -> DEBU 6164 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.712 UTC [gossip.comm] sendToEndpoint -> DEBU 6165 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.713 UTC [gossip.comm] sendToEndpoint -> DEBU 6166 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.713 UTC [gossip.comm] sendToEndpoint -> DEBU 6167 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.713 UTC [gossip.comm] sendToEndpoint -> DEBU 6168 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.713 UTC [gossip.comm] sendToEndpoint -> DEBU 6169 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.713 UTC [msp] DeserializeIdentity -> DEBU 616a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.713 UTC [msp] DeserializeIdentity -> DEBU 616b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.713 UTC [msp] DeserializeIdentity -> DEBU 616c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.714 UTC [gossip.comm] Send -> DEBU 616d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:07.714 UTC [msp] DeserializeIdentity -> DEBU 616e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.714 UTC [gossip.comm] Send -> DEBU 616f Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:07.714 UTC [gossip.comm] sendToEndpoint -> DEBU 6170 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.714 UTC [gossip.comm] sendToEndpoint -> DEBU 6171 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.714 UTC [gossip.comm] sendToEndpoint -> DEBU 6172 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.714 UTC [gossip.comm] sendToEndpoint -> DEBU 6173 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.716 UTC [gossip.comm] func1 -> DEBU 6174 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.716 UTC [gossip.comm] func1 -> DEBU 6175 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.716 UTC [gossip.gossip] handleMessage -> DEBU 6176 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.717 UTC [gossip.gossip] handleMessage -> DEBU 6177 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6178 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6179 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.718 UTC [gossip.gossip] handleMessage -> DEBU 617a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.718 UTC [gossip.pull] HandleMessage -> DEBU 617b GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.718 UTC [gossip.gossip] handleMessage -> DEBU 617c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.722 UTC [gossip.gossip] handleMessage -> DEBU 617d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.722 UTC [gossip.pull] HandleMessage -> DEBU 617e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.722 UTC [gossip.gossip] handleMessage -> DEBU 617f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.724 UTC [gossip.gossip] handleMessage -> DEBU 6180 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.724 UTC [gossip.gossip] handleMessage -> DEBU 6181 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.724 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6182 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.724 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6183 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.724 UTC [gossip.comm] func1 -> DEBU 6184 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.724 UTC [gossip.gossip] handleMessage -> DEBU 6185 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.724 UTC [gossip.pull] HandleMessage -> DEBU 6186 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.724 UTC [gossip.gossip] handleMessage -> DEBU 6187 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.858 UTC [msp] GetDefaultSigningIdentity -> DEBU 6188 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:07.858 UTC [msp.identity] Sign -> DEBU 6189 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104C " +peer0.org1.example.com | "2019-09-24 00:27:07.858 UTC [msp.identity] Sign -> DEBU 618a Sign: digest: 9FE2FBFD5BB764F11A3F0EA7D18C404E73BC83FDB1466A6B5284F6D90234028D " +peer0.org1.example.com | "2019-09-24 00:27:07.858 UTC [msp] GetDefaultSigningIdentity -> DEBU 618b Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:07.858 UTC [msp.identity] Sign -> DEBU 618c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:07.858 UTC [msp.identity] Sign -> DEBU 618d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:07.858 UTC [gossip.comm] Send -> DEBU 618e Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:07.859 UTC [msp] DeserializeIdentity -> DEBU 618f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.859 UTC [gossip.comm] Send -> DEBU 6190 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:07.859 UTC [msp] DeserializeIdentity -> DEBU 6191 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.859 UTC [gossip.comm] Send -> DEBU 6192 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6193 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6194 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6195 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6196 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6197 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6198 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.861 UTC [gossip.comm] func1 -> DEBU 6199 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.861 UTC [gossip.gossip] handleMessage -> DEBU 619a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.861 UTC [gossip.gossip] handleMessage -> DEBU 619b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.861 UTC [gossip.discovery] handleMsgFromComm -> DEBU 619c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.861 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 619d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:07.861 UTC [msp.identity] Verify -> DEBU 619e Verify: digest = 00000000 9f e2 fb fd 5b b7 64 f1 1a 3f 0e a7 d1 8c 40 4e |....[.d..?....@N| +peer0.org1.example.com | 00000010 73 bc 83 fd b1 46 6a 6b 52 84 f6 d9 02 34 02 8d |s....FjkR....4..|" +peer0.org1.example.com | "2019-09-24 00:27:07.861 UTC [msp.identity] Verify -> DEBU 619f Verify: sig = 00000000 30 45 02 21 00 d7 ef 68 c8 5c cc b3 19 02 1e dc |0E.!...h.\......| +peer0.org1.example.com | 00000010 5e 62 7c 73 4b be ad 24 e9 9d a4 46 39 70 e9 fe |^b|sK..$...F9p..| +peer0.org1.example.com | 00000020 7a df 08 b4 e3 02 20 12 8e 39 67 70 13 38 2b 4b |z..... ..9gp.8+K| +peer0.org1.example.com | 00000030 6f 71 7c f6 ee d1 b7 5c b7 d8 0b a6 1c 05 77 ff |oq|....\......w.| +peer0.org1.example.com | 00000040 ce f8 57 cc df e3 bd |..W....|" +peer0.org1.example.com | "2019-09-24 00:27:07.862 UTC [msp.identity] Verify -> DEBU 61a0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:27:07.862 UTC [msp.identity] Verify -> DEBU 61a1 Verify: sig = 00000000 30 45 02 21 00 d2 e1 e9 48 a9 91 be 7c 8c 49 1f |0E.!....H...|.I.| +peer0.org1.example.com | 00000010 77 39 1e b8 57 69 fa c9 80 7d b0 72 94 f8 fc 2c |w9..Wi...}.r...,| +peer0.org1.example.com | 00000020 53 73 66 90 6d 02 20 67 64 5d 65 09 d2 81 86 44 |Ssf.m. gd]e....D| +peer0.org1.example.com | 00000030 2c 7e e4 06 00 38 4c d8 c0 c5 33 6f d1 30 fb f9 |,~...8L...3o.0..| +peer0.org1.example.com | 00000040 64 78 16 e9 e8 ba 23 |dx....#|" +peer0.org1.example.com | "2019-09-24 00:27:07.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 61a2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.862 UTC [gossip.discovery] isSentByMe -> DEBU 61a3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 61a4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61a5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.863 UTC [gossip.gossip] handleMessage -> DEBU 61a6 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.864 UTC [gossip.gossip] handleMessage -> DEBU 61a7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61a8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.864 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 61a9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:07.864 UTC [msp.identity] Verify -> DEBU 61aa Verify: digest = 00000000 9f e2 fb fd 5b b7 64 f1 1a 3f 0e a7 d1 8c 40 4e |....[.d..?....@N| +peer0.org1.example.com | 00000010 73 bc 83 fd b1 46 6a 6b 52 84 f6 d9 02 34 02 8d |s....FjkR....4..|" +peer0.org1.example.com | "2019-09-24 00:27:07.864 UTC [msp.identity] Verify -> DEBU 61ab Verify: sig = 00000000 30 45 02 21 00 d7 ef 68 c8 5c cc b3 19 02 1e dc |0E.!...h.\......| +peer0.org1.example.com | 00000010 5e 62 7c 73 4b be ad 24 e9 9d a4 46 39 70 e9 fe |^b|sK..$...F9p..| +peer0.org1.example.com | 00000020 7a df 08 b4 e3 02 20 12 8e 39 67 70 13 38 2b 4b |z..... ..9gp.8+K| +peer0.org1.example.com | 00000030 6f 71 7c f6 ee d1 b7 5c b7 d8 0b a6 1c 05 77 ff |oq|....\......w.| +peer0.org1.example.com | 00000040 ce f8 57 cc df e3 bd |..W....|" +peer0.org1.example.com | "2019-09-24 00:27:07.864 UTC [gossip.discovery] handleAliveMessage -> DEBU 61ac Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.864 UTC [gossip.discovery] isSentByMe -> DEBU 61ad Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.864 UTC [gossip.discovery] handleAliveMessage -> DEBU 61ae Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61af Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.865 UTC [gossip.comm] func1 -> DEBU 61b0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.865 UTC [gossip.gossip] handleMessage -> DEBU 61b1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.865 UTC [gossip.gossip] handleMessage -> DEBU 61b2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.866 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 61b4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:07.866 UTC [msp.identity] Verify -> DEBU 61b5 Verify: digest = 00000000 9f e2 fb fd 5b b7 64 f1 1a 3f 0e a7 d1 8c 40 4e |....[.d..?....@N| +peer0.org1.example.com | 00000010 73 bc 83 fd b1 46 6a 6b 52 84 f6 d9 02 34 02 8d |s....FjkR....4..|" +peer0.org1.example.com | "2019-09-24 00:27:07.866 UTC [msp.identity] Verify -> DEBU 61b6 Verify: sig = 00000000 30 45 02 21 00 d7 ef 68 c8 5c cc b3 19 02 1e dc |0E.!...h.\......| +peer0.org1.example.com | 00000010 5e 62 7c 73 4b be ad 24 e9 9d a4 46 39 70 e9 fe |^b|sK..$...F9p..| +peer0.org1.example.com | 00000020 7a df 08 b4 e3 02 20 12 8e 39 67 70 13 38 2b 4b |z..... ..9gp.8+K| +peer0.org1.example.com | 00000030 6f 71 7c f6 ee d1 b7 5c b7 d8 0b a6 1c 05 77 ff |oq|....\......w.| +peer0.org1.example.com | 00000040 ce f8 57 cc df e3 bd |..W....|" +peer0.org1.example.com | "2019-09-24 00:27:07.866 UTC [gossip.discovery] handleAliveMessage -> DEBU 61b7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.866 UTC [gossip.discovery] isSentByMe -> DEBU 61b8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.866 UTC [gossip.discovery] handleAliveMessage -> DEBU 61b9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61ba Exiting" +peer0.org1.example.com | "2019-09-24 00:27:07.912 UTC [gossip.gossip] handleMessage -> DEBU 61bb Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.912 UTC [gossip.pull] HandleMessage -> DEBU 61bc GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61bd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61be Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61c2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:07.913 UTC [gossip.pull] SendDigest -> DEBU 61c3 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:27:07.913 UTC [gossip.gossip] handleMessage -> DEBU 61c4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.021 UTC [gossip.gossip] handleMessage -> DEBU 61c5 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.021 UTC [gossip.gossip] handleMessage -> DEBU 61c6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.021 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61c7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.021 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 61c8 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:08.021 UTC [msp] DeserializeIdentity -> DEBU 61c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 61ca Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 61cb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 61cc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [cauthdsl] func1 -> DEBU 61d0 0xc002909a40 gate 1569284828022435200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [cauthdsl] func2 -> DEBU 61d1 0xc002909a40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [cauthdsl] func2 -> DEBU 61d2 0xc002909a40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [cauthdsl] func2 -> DEBU 61d3 0xc002909a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [cauthdsl] func2 -> DEBU 61d4 0xc002909a40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [cauthdsl] func1 -> DEBU 61d5 0xc002909a40 gate 1569284828022435200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61d6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.022 UTC [cauthdsl] func1 -> DEBU 61d9 0xc003096280 gate 1569284828022939500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [cauthdsl] func2 -> DEBU 61da 0xc003096280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [cauthdsl] func2 -> DEBU 61db 0xc003096280 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [cauthdsl] func2 -> DEBU 61dc 0xc003096280 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [msp.identity] Verify -> DEBU 61dd Verify: digest = 00000000 e3 9b df 83 d5 dd 80 a4 24 2a 92 e6 90 05 40 35 |........$*....@5| +peer0.org1.example.com | 00000010 56 c6 fd b8 1e e4 93 ce b9 79 7d 7b 04 64 82 dc |V........y}{.d..|" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [msp.identity] Verify -> DEBU 61de Verify: sig = 00000000 30 44 02 20 2b b3 d2 5b d4 35 8e 00 e1 3f 9c b6 |0D. +..[.5...?..| +peer0.org1.example.com | 00000010 bb 1e f8 01 e6 61 b8 4d fb 4b cf f0 72 b2 27 58 |.....a.M.K..r.'X| +peer0.org1.example.com | 00000020 5c 59 86 7e 02 20 12 08 a3 61 41 63 6b c2 b4 75 |\Y.~. ...aAck..u| +peer0.org1.example.com | 00000030 d9 8e 36 67 a9 17 5c 7c f7 a4 f7 7b bb 04 67 19 |..6g..\|...{..g.| +peer0.org1.example.com | 00000040 38 0e f2 58 30 ff |8..X0.|" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [cauthdsl] func2 -> DEBU 61df 0xc003096280 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [cauthdsl] func1 -> DEBU 61e0 0xc003096280 gate 1569284828022939500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [policies] Evaluate -> DEBU 61e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [policies] Evaluate -> DEBU 61e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [policies] Evaluate -> DEBU 61e3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [policies] Evaluate -> DEBU 61e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [gossip.discovery] handleAliveMessage -> DEBU 61e5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 61e6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 61e7 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 61e8 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 61e9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 61ea Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [gossip.discovery] handleAliveMessage -> DEBU 61eb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61ec Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.023 UTC [gossip.discovery] sendMemResponse -> DEBU 61ed Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:27:08.024 UTC [msp] DeserializeIdentity -> DEBU 61ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.024 UTC [msp] DeserializeIdentity -> DEBU 61ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.024 UTC [msp] DeserializeIdentity -> DEBU 61f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.024 UTC [gossip.comm] Send -> DEBU 61f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:08.024 UTC [gossip.discovery] sendMemResponse -> DEBU 61f2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020P" signature:"0E\002!\000\215\346#6\371c\031\236\2453\002\036\016\225\277\207\227(\032\363{6\234\005d\214\301\357v\337W\351\002 \030\364b\364*\305a\367\317\301\225Co\320&\020Z\025|\345y\367:\306\004;+[F#\342p" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:08.024 UTC [gossip.comm] sendToEndpoint -> DEBU 61f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.024 UTC [gossip.comm] sendToEndpoint -> DEBU 61f4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.080 UTC [msp] DeserializeIdentity -> DEBU 61f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.080 UTC [msp] DeserializeIdentity -> DEBU 61f6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.081 UTC [gossip.comm] Send -> DEBU 61f7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61f8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61f9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61fb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61fc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61fd Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.082 UTC [gossip.comm] func1 -> DEBU 61fe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.082 UTC [gossip.gossip] handleMessage -> DEBU 61ff Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.082 UTC [msp] DeserializeIdentity -> DEBU 6200 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.082 UTC [msp] DeserializeIdentity -> DEBU 6201 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [msp] DeserializeIdentity -> DEBU 6202 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6203 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6204 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6205 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 6206 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 6207 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 6208 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [cauthdsl] func1 -> DEBU 6209 0xc0030b2e10 gate 1569284828083489500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 620a 0xc0030b2e10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 620b 0xc0030b2e10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 620c 0xc0030b2e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 620d 0xc0030b2e10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [cauthdsl] func1 -> DEBU 620e 0xc0030b2e10 gate 1569284828083489500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 620f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 6210 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 6211 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [cauthdsl] func1 -> DEBU 6212 0xc0030b3650 gate 1569284828083798400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 6213 0xc0030b3650 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 6214 0xc0030b3650 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 6215 0xc0030b3650 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [msp.identity] Verify -> DEBU 6216 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:08.083 UTC [msp.identity] Verify -> DEBU 6217 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [cauthdsl] func2 -> DEBU 6218 0xc0030b3650 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [cauthdsl] func1 -> DEBU 6219 0xc0030b3650 gate 1569284828083798400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 621a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 621b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 621c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 621d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [msp] DeserializeIdentity -> DEBU 621e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [msp] DeserializeIdentity -> DEBU 621f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6220 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6221 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6222 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 6223 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 6224 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 6225 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [cauthdsl] func1 -> DEBU 6226 0xc002846e20 gate 1569284828084777000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [cauthdsl] func2 -> DEBU 6227 0xc002846e20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [cauthdsl] func2 -> DEBU 6228 0xc002846e20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.084 UTC [cauthdsl] func2 -> DEBU 6229 0xc002846e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:08.085 UTC [cauthdsl] func2 -> DEBU 622a 0xc002846e20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.085 UTC [cauthdsl] func1 -> DEBU 622b 0xc002846e20 gate 1569284828084777000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.085 UTC [policies] Evaluate -> DEBU 622c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.085 UTC [policies] Evaluate -> DEBU 622d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.085 UTC [policies] Evaluate -> DEBU 622e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.086 UTC [cauthdsl] func1 -> DEBU 622f 0xc002847660 gate 1569284828086093500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.086 UTC [cauthdsl] func2 -> DEBU 6230 0xc002847660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.086 UTC [cauthdsl] func2 -> DEBU 6231 0xc002847660 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.088 UTC [cauthdsl] func2 -> DEBU 6232 0xc002847660 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.088 UTC [msp.identity] Verify -> DEBU 6233 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:08.088 UTC [msp.identity] Verify -> DEBU 6234 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:08.089 UTC [cauthdsl] func2 -> DEBU 6235 0xc002847660 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.090 UTC [cauthdsl] func1 -> DEBU 6236 0xc002847660 gate 1569284828086093500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:08.090 UTC [policies] Evaluate -> DEBU 6237 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.090 UTC [policies] Evaluate -> DEBU 6238 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.090 UTC [policies] Evaluate -> DEBU 6239 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.091 UTC [policies] Evaluate -> DEBU 623a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.091 UTC [msp.identity] Verify -> DEBU 623b Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +peer0.org1.example.com | 00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +peer0.org1.example.com | "2019-09-24 00:27:08.091 UTC [msp.identity] Verify -> DEBU 623c Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +peer0.org1.example.com | 00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +peer0.org1.example.com | 00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +peer0.org1.example.com | 00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +peer0.org1.example.com | 00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +peer0.org1.example.com | "2019-09-24 00:27:08.087 UTC [msp] DeserializeIdentity -> DEBU 623d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.092 UTC [msp.identity] Verify -> DEBU 623e Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:08.092 UTC [msp.identity] Verify -> DEBU 623f Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:08.093 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6240 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.093 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6241 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.093 UTC [policies] Evaluate -> DEBU 6243 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.092 UTC [msp] DeserializeIdentity -> DEBU 6242 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.094 UTC [gossip.comm] Send -> DEBU 6244 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:08.094 UTC [msp] DeserializeIdentity -> DEBU 6245 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.095 UTC [msp] DeserializeIdentity -> DEBU 6246 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.095 UTC [gossip.comm] sendToEndpoint -> DEBU 6247 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.095 UTC [gossip.comm] sendToEndpoint -> DEBU 6248 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.095 UTC [gossip.comm] sendToEndpoint -> DEBU 6249 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.095 UTC [gossip.comm] sendToEndpoint -> DEBU 624a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.096 UTC [gossip.comm] sendToEndpoint -> DEBU 624b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.096 UTC [gossip.comm] sendToEndpoint -> DEBU 624c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.097 UTC [gossip.comm] func1 -> DEBU 624d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.098 UTC [policies] Evaluate -> DEBU 624e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:08.098 UTC [policies] Evaluate -> DEBU 624f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.098 UTC [cauthdsl] func1 -> DEBU 6250 0xc0030aead0 gate 1569284828098893100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.099 UTC [cauthdsl] func2 -> DEBU 6251 0xc0030aead0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.099 UTC [cauthdsl] func2 -> DEBU 6252 0xc0030aead0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.099 UTC [cauthdsl] func2 -> DEBU 6253 0xc0030aead0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.099 UTC [msp.identity] Verify -> DEBU 6254 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:08.099 UTC [msp.identity] Verify -> DEBU 6255 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:08.100 UTC [cauthdsl] func2 -> DEBU 6256 0xc0030aead0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.100 UTC [cauthdsl] func1 -> DEBU 6257 0xc0030aead0 gate 1569284828098893100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:08.100 UTC [policies] Evaluate -> DEBU 6258 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.101 UTC [policies] Evaluate -> DEBU 6259 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.101 UTC [policies] Evaluate -> DEBU 625a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.101 UTC [policies] Evaluate -> DEBU 625b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.101 UTC [gossip.gossip] handleMessage -> DEBU 625c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.101 UTC [gossip.gossip] handleMessage -> DEBU 625d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.101 UTC [msp] DeserializeIdentity -> DEBU 625e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.102 UTC [msp] DeserializeIdentity -> DEBU 625f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.102 UTC [msp] DeserializeIdentity -> DEBU 6260 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.103 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6261 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:08.103 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6262 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.103 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6263 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.103 UTC [policies] Evaluate -> DEBU 6264 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.104 UTC [policies] Evaluate -> DEBU 6265 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:08.104 UTC [policies] Evaluate -> DEBU 6266 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.104 UTC [cauthdsl] func1 -> DEBU 6267 0xc0034705e0 gate 1569284828104307600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.104 UTC [cauthdsl] func2 -> DEBU 6268 0xc0034705e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.104 UTC [cauthdsl] func2 -> DEBU 6269 0xc0034705e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.104 UTC [cauthdsl] func2 -> DEBU 626a 0xc0034705e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:08.104 UTC [cauthdsl] func2 -> DEBU 626b 0xc0034705e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.104 UTC [cauthdsl] func1 -> DEBU 626c 0xc0034705e0 gate 1569284828104307600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.105 UTC [policies] Evaluate -> DEBU 626d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.105 UTC [policies] Evaluate -> DEBU 626e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.105 UTC [policies] Evaluate -> DEBU 626f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.105 UTC [cauthdsl] func1 -> DEBU 6270 0xc003470e20 gate 1569284828105472500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.105 UTC [cauthdsl] func2 -> DEBU 6271 0xc003470e20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.105 UTC [cauthdsl] func2 -> DEBU 6272 0xc003470e20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.106 UTC [cauthdsl] func2 -> DEBU 6273 0xc003470e20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.106 UTC [msp.identity] Verify -> DEBU 6274 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:08.106 UTC [msp.identity] Verify -> DEBU 6275 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:08.106 UTC [cauthdsl] func2 -> DEBU 6276 0xc003470e20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.107 UTC [cauthdsl] func1 -> DEBU 6277 0xc003470e20 gate 1569284828105472500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:08.107 UTC [policies] Evaluate -> DEBU 6278 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.107 UTC [policies] Evaluate -> DEBU 6279 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.107 UTC [policies] Evaluate -> DEBU 627a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.107 UTC [policies] Evaluate -> DEBU 627b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.108 UTC [msp] DeserializeIdentity -> DEBU 627c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.108 UTC [msp] DeserializeIdentity -> DEBU 627d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.108 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 627e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:08.108 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 627f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.108 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6280 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.108 UTC [policies] Evaluate -> DEBU 6281 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.108 UTC [policies] Evaluate -> DEBU 6282 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:08.108 UTC [policies] Evaluate -> DEBU 6283 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.109 UTC [cauthdsl] func1 -> DEBU 6284 0xc0041465f0 gate 1569284828109004000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.109 UTC [cauthdsl] func2 -> DEBU 6285 0xc0041465f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.109 UTC [cauthdsl] func2 -> DEBU 6286 0xc0041465f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.109 UTC [cauthdsl] func2 -> DEBU 6287 0xc0041465f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:08.109 UTC [cauthdsl] func2 -> DEBU 6288 0xc0041465f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.109 UTC [cauthdsl] func1 -> DEBU 6289 0xc0041465f0 gate 1569284828109004000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.109 UTC [policies] Evaluate -> DEBU 628a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.109 UTC [policies] Evaluate -> DEBU 628b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.110 UTC [policies] Evaluate -> DEBU 628c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.110 UTC [cauthdsl] func1 -> DEBU 628d 0xc004146e30 gate 1569284828110074800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.110 UTC [cauthdsl] func2 -> DEBU 628e 0xc004146e30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.110 UTC [cauthdsl] func2 -> DEBU 628f 0xc004146e30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.110 UTC [cauthdsl] func2 -> DEBU 6290 0xc004146e30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.110 UTC [msp.identity] Verify -> DEBU 6291 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:08.110 UTC [msp.identity] Verify -> DEBU 6292 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:08.110 UTC [cauthdsl] func2 -> DEBU 6293 0xc004146e30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.110 UTC [cauthdsl] func1 -> DEBU 6294 0xc004146e30 gate 1569284828110074800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:08.111 UTC [policies] Evaluate -> DEBU 6295 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.111 UTC [policies] Evaluate -> DEBU 6296 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.111 UTC [policies] Evaluate -> DEBU 6297 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.111 UTC [policies] Evaluate -> DEBU 6298 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.111 UTC [msp.identity] Verify -> DEBU 6299 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:08.111 UTC [msp.identity] Verify -> DEBU 629a Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:08.111 UTC [msp.identity] Verify -> DEBU 629b Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +peer0.org1.example.com | 00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +peer0.org1.example.com | "2019-09-24 00:27:08.111 UTC [msp.identity] Verify -> DEBU 629c Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +peer0.org1.example.com | 00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +peer0.org1.example.com | 00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +peer0.org1.example.com | 00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +peer0.org1.example.com | 00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +peer0.org1.example.com | "2019-09-24 00:27:08.112 UTC [gossip.gossip] handleMessage -> DEBU 629d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.112 UTC [gossip.gossip] handleMessage -> DEBU 629e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.112 UTC [msp.identity] Verify -> DEBU 629f Verify: digest = 00000000 5a 48 6a ea e1 69 73 fd 55 6e c7 4b 6b 7e f2 78 |ZHj..is.Un.Kk~.x| +peer0.org1.example.com | 00000010 46 44 8d a7 da 23 ab c5 6a e4 b2 77 0c 18 f5 cd |FD...#..j..w....|" +peer0.org1.example.com | "2019-09-24 00:27:08.112 UTC [msp.identity] Verify -> DEBU 62a0 Verify: sig = 00000000 30 45 02 21 00 80 34 3b 63 c1 3d 6f fc 09 a0 38 |0E.!..4;c.=o...8| +peer0.org1.example.com | 00000010 56 54 ac 0e 32 98 54 60 41 30 82 f8 63 69 ff b2 |VT..2.T`A0..ci..| +peer0.org1.example.com | 00000020 3d 2a fe 96 5a 02 20 3f 1b 99 08 4b 70 87 5d 39 |=*..Z. ?...Kp.]9| +peer0.org1.example.com | 00000030 26 d1 f9 ee a1 38 66 3c ab b6 c5 19 cf 40 3b 7d |&....8f<.....@;}| +peer0.org1.example.com | 00000040 b1 3d c2 0c 5d 12 fe |.=..]..|" +peer0.org1.example.com | "2019-09-24 00:27:08.113 UTC [msp.identity] Verify -> DEBU 62a1 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:08.113 UTC [msp.identity] Verify -> DEBU 62a2 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:08.113 UTC [msp] DeserializeIdentity -> DEBU 62a3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.113 UTC [msp] DeserializeIdentity -> DEBU 62a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.113 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62a5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:08.113 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62a6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62a7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [cauthdsl] func1 -> DEBU 62ab 0xc0003464c0 gate 1569284828114153000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62ac 0xc0003464c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62ad 0xc0003464c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62ae 0xc0003464c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62af 0xc0003464c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [cauthdsl] func1 -> DEBU 62b0 0xc0003464c0 gate 1569284828114153000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [cauthdsl] func1 -> DEBU 62b4 0xc000346d00 gate 1569284828114771000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62b5 0xc000346d00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62b6 0xc000346d00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62b7 0xc000346d00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.114 UTC [msp.identity] Verify -> DEBU 62b8 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:08.115 UTC [msp.identity] Verify -> DEBU 62b9 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:08.115 UTC [cauthdsl] func2 -> DEBU 62ba 0xc000346d00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.115 UTC [cauthdsl] func1 -> DEBU 62bb 0xc000346d00 gate 1569284828114771000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:08.115 UTC [policies] Evaluate -> DEBU 62bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.115 UTC [policies] Evaluate -> DEBU 62bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.115 UTC [policies] Evaluate -> DEBU 62be Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.115 UTC [policies] Evaluate -> DEBU 62bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.115 UTC [msp] DeserializeIdentity -> DEBU 62c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.115 UTC [msp] DeserializeIdentity -> DEBU 62c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.116 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:08.116 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62c3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.116 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62c4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.116 UTC [policies] Evaluate -> DEBU 62c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.117 UTC [policies] Evaluate -> DEBU 62c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:08.117 UTC [policies] Evaluate -> DEBU 62c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.117 UTC [cauthdsl] func1 -> DEBU 62c8 0xc0003564d0 gate 1569284828117528900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.117 UTC [cauthdsl] func2 -> DEBU 62c9 0xc0003564d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.118 UTC [cauthdsl] func2 -> DEBU 62ca 0xc0003564d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.118 UTC [cauthdsl] func2 -> DEBU 62cb 0xc0003564d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:08.118 UTC [cauthdsl] func2 -> DEBU 62cc 0xc0003564d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.118 UTC [cauthdsl] func1 -> DEBU 62cd 0xc0003564d0 gate 1569284828117528900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.118 UTC [policies] Evaluate -> DEBU 62ce Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.118 UTC [policies] Evaluate -> DEBU 62cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.118 UTC [policies] Evaluate -> DEBU 62d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.118 UTC [cauthdsl] func1 -> DEBU 62d1 0xc000356d10 gate 1569284828118874800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.119 UTC [cauthdsl] func2 -> DEBU 62d2 0xc000356d10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.119 UTC [cauthdsl] func2 -> DEBU 62d3 0xc000356d10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.119 UTC [cauthdsl] func2 -> DEBU 62d4 0xc000356d10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.119 UTC [msp.identity] Verify -> DEBU 62d5 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:08.120 UTC [msp.identity] Verify -> DEBU 62d6 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:08.120 UTC [cauthdsl] func2 -> DEBU 62d7 0xc000356d10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.120 UTC [cauthdsl] func1 -> DEBU 62d8 0xc000356d10 gate 1569284828118874800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:08.120 UTC [policies] Evaluate -> DEBU 62d9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.120 UTC [policies] Evaluate -> DEBU 62da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.120 UTC [policies] Evaluate -> DEBU 62db Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.120 UTC [policies] Evaluate -> DEBU 62dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.120 UTC [gossip.gossip] handleMessage -> DEBU 62dd Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.293 UTC [msp] DeserializeIdentity -> DEBU 62de Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.293 UTC [msp] DeserializeIdentity -> DEBU 62df Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.293 UTC [gossip.pull] Hello -> DEBU 62e0 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:08.294 UTC [msp] DeserializeIdentity -> DEBU 62e1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.294 UTC [msp] DeserializeIdentity -> DEBU 62e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.295 UTC [gossip.comm] Send -> DEBU 62e3 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:08.295 UTC [gossip.comm] sendToEndpoint -> DEBU 62e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.295 UTC [gossip.comm] sendToEndpoint -> DEBU 62e5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.296 UTC [gossip.comm] func1 -> DEBU 62e6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.296 UTC [gossip.gossip] handleMessage -> DEBU 62e7 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.297 UTC [gossip.pull] HandleMessage -> DEBU 62e8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.297 UTC [gossip.gossip] handleMessage -> DEBU 62e9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.582 UTC [gossip.comm] func1 -> DEBU 62ea Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.583 UTC [gossip.gossip] handleMessage -> DEBU 62eb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.583 UTC [msp] DeserializeIdentity -> DEBU 62ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.583 UTC [msp] DeserializeIdentity -> DEBU 62ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.584 UTC [gossip.gossip] handleMessage -> DEBU 62ee Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.598 UTC [gossip.comm] func1 -> DEBU 62ef Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.598 UTC [gossip.gossip] handleMessage -> DEBU 62f0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.598 UTC [msp.identity] Verify -> DEBU 62f1 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:08.599 UTC [msp.identity] Verify -> DEBU 62f2 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:08.599 UTC [gossip.gossip] handleMessage -> DEBU 62f3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.771 UTC [gossip.comm] func1 -> DEBU 62f4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.771 UTC [gossip.gossip] handleMessage -> DEBU 62f5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.772 UTC [gossip.gossip] handleMessage -> DEBU 62f6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU 62f7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.773 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 62f8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:08.774 UTC [msp] DeserializeIdentity -> DEBU 62f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:08.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62fb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62fc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:08.779 UTC [policies] Evaluate -> DEBU 62fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.779 UTC [policies] Evaluate -> DEBU 62fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:08.779 UTC [policies] Evaluate -> DEBU 62ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.780 UTC [cauthdsl] func1 -> DEBU 6300 0xc0029ec600 gate 1569284828780313800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.780 UTC [cauthdsl] func2 -> DEBU 6301 0xc0029ec600 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.782 UTC [cauthdsl] func2 -> DEBU 6302 0xc0029ec600 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.782 UTC [cauthdsl] func2 -> DEBU 6303 0xc0029ec600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:08.783 UTC [cauthdsl] func2 -> DEBU 6304 0xc0029ec600 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.784 UTC [cauthdsl] func1 -> DEBU 6305 0xc0029ec600 gate 1569284828780313800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:08.785 UTC [policies] Evaluate -> DEBU 6306 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.786 UTC [policies] Evaluate -> DEBU 6307 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.786 UTC [policies] Evaluate -> DEBU 6308 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:08.787 UTC [cauthdsl] func1 -> DEBU 6309 0xc0029ece40 gate 1569284828787049800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:08.787 UTC [cauthdsl] func2 -> DEBU 630a 0xc0029ece40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:08.787 UTC [cauthdsl] func2 -> DEBU 630b 0xc0029ece40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:08.788 UTC [cauthdsl] func2 -> DEBU 630c 0xc0029ece40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.788 UTC [msp.identity] Verify -> DEBU 630d Verify: digest = 00000000 48 f9 4b 02 cc bd b2 90 26 79 12 03 cf a7 13 99 |H.K.....&y......| +peer0.org1.example.com | 00000010 e2 b5 c3 2b d2 89 74 4d 7f a5 6d c6 b5 5a 3b 1e |...+..tM..m..Z;.|" +peer0.org1.example.com | "2019-09-24 00:27:08.789 UTC [msp.identity] Verify -> DEBU 630e Verify: sig = 00000000 30 44 02 20 54 37 66 29 1a 30 58 9d 01 d2 77 a4 |0D. T7f).0X...w.| +peer0.org1.example.com | 00000010 5c fe 1f ef 96 45 f3 14 f7 65 3d 57 87 26 00 b1 |\....E...e=W.&..| +peer0.org1.example.com | 00000020 c7 f2 4b 35 02 20 5a 8f 70 72 67 24 69 fe b8 77 |..K5. Z.prg$i..w| +peer0.org1.example.com | 00000030 e6 c5 d7 3c c1 75 8e 4d 63 d2 6c 7b c2 fd 0b 7f |...<.u.Mc.l{....| +peer0.org1.example.com | 00000040 9e f6 c0 9d d9 83 |......|" +peer0.org1.example.com | "2019-09-24 00:27:08.789 UTC [cauthdsl] func2 -> DEBU 630f 0xc0029ece40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:08.789 UTC [cauthdsl] func1 -> DEBU 6310 0xc0029ece40 gate 1569284828787049800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:08.790 UTC [policies] Evaluate -> DEBU 6311 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.791 UTC [policies] Evaluate -> DEBU 6312 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.792 UTC [policies] Evaluate -> DEBU 6313 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.793 UTC [policies] Evaluate -> DEBU 6314 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:08.793 UTC [gossip.discovery] handleAliveMessage -> DEBU 6315 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.794 UTC [gossip.discovery] learnExistingMembers -> DEBU 6316 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:08.794 UTC [gossip.discovery] learnExistingMembers -> DEBU 6317 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:08.794 UTC [gossip.discovery] learnExistingMembers -> DEBU 6318 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:08.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 6319 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:08.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 631a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.795 UTC [gossip.discovery] handleAliveMessage -> DEBU 631b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.795 UTC [gossip.discovery] handleMsgFromComm -> DEBU 631c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.795 UTC [gossip.discovery] sendMemResponse -> DEBU 631d Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:27:08.796 UTC [msp] DeserializeIdentity -> DEBU 631e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.796 UTC [msp] DeserializeIdentity -> DEBU 631f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.796 UTC [msp] DeserializeIdentity -> DEBU 6320 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.796 UTC [gossip.comm] Send -> DEBU 6321 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:08.796 UTC [gossip.discovery] sendMemResponse -> DEBU 6322 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020P" signature:"0E\002!\000\215\346#6\371c\031\236\2453\002\036\016\225\277\207\227(\032\363{6\234\005d\214\301\357v\337W\351\002 \030\364b\364*\305a\367\317\301\225Co\320&\020Z\025|\345y\367:\306\004;+[F#\342p" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:08.796 UTC [gossip.comm] sendToEndpoint -> DEBU 6323 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.796 UTC [gossip.comm] sendToEndpoint -> DEBU 6324 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.817 UTC [gossip.comm] func1 -> DEBU 6325 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.817 UTC [gossip.gossip] handleMessage -> DEBU 6326 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.818 UTC [gossip.pull] HandleMessage -> DEBU 6327 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.818 UTC [msp] DeserializeIdentity -> DEBU 6328 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.818 UTC [msp] DeserializeIdentity -> DEBU 6329 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.818 UTC [msp] DeserializeIdentity -> DEBU 632a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.819 UTC [msp] DeserializeIdentity -> DEBU 632b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.819 UTC [msp] DeserializeIdentity -> DEBU 632c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.819 UTC [msp] DeserializeIdentity -> DEBU 632d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:08.819 UTC [gossip.pull] SendDigest -> DEBU 632e Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:27:08.819 UTC [gossip.gossip] handleMessage -> DEBU 632f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:08.839 UTC [gossip.comm] func1 -> DEBU 6330 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.839 UTC [gossip.gossip] handleMessage -> DEBU 6331 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.839 UTC [gossip.pull] HandleMessage -> DEBU 6332 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:08.839 UTC [gossip.pull] SendDigest -> DEBU 6333 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:08.839 UTC [gossip.gossip] handleMessage -> DEBU 6334 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.073 UTC [gossip.gossip] handleMessage -> DEBU 6335 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.073 UTC [msp] DeserializeIdentity -> DEBU 6336 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.073 UTC [msp] DeserializeIdentity -> DEBU 6337 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.073 UTC [msp] DeserializeIdentity -> DEBU 6338 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.073 UTC [gossip.gossip] handleMessage -> DEBU 6339 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.514 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 633a Sleeping 25s" +peer0.org1.example.com | "2019-09-24 00:27:09.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 633b Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:09.599 UTC [msp.identity] Sign -> DEBU 633c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104D " +peer0.org1.example.com | "2019-09-24 00:27:09.599 UTC [msp.identity] Sign -> DEBU 633d Sign: digest: 34B6EC2CED652B88A625950B20E893A2D1D75D60CA8A08CBF8B90B812230F40E " +peer0.org1.example.com | "2019-09-24 00:27:09.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 633e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:09.599 UTC [msp.identity] Sign -> DEBU 633f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:09.599 UTC [msp.identity] Sign -> DEBU 6340 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:09.599 UTC [gossip.discovery] periodicalSendAlive -> DEBU 6341 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:27:09.600 UTC [msp] DeserializeIdentity -> DEBU 6342 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.601 UTC [msp] DeserializeIdentity -> DEBU 6343 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.601 UTC [msp] DeserializeIdentity -> DEBU 6344 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.601 UTC [gossip.comm] Send -> DEBU 6345 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:09.602 UTC [gossip.comm] Send -> DEBU 6346 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:09.602 UTC [gossip.comm] sendToEndpoint -> DEBU 6347 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.603 UTC [gossip.comm] sendToEndpoint -> DEBU 6349 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.603 UTC [msp] DeserializeIdentity -> DEBU 6348 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.603 UTC [gossip.comm] Send -> DEBU 634a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:09.603 UTC [gossip.comm] sendToEndpoint -> DEBU 634b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.603 UTC [gossip.comm] sendToEndpoint -> DEBU 634c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.604 UTC [gossip.comm] sendToEndpoint -> DEBU 634d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.604 UTC [gossip.comm] sendToEndpoint -> DEBU 634e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.648 UTC [gossip.comm] func1 -> DEBU 634f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.648 UTC [gossip.gossip] handleMessage -> DEBU 6350 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.649 UTC [gossip.pull] HandleMessage -> DEBU 6351 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.649 UTC [gossip.pull] SendDigest -> DEBU 6352 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:09.649 UTC [gossip.gossip] handleMessage -> DEBU 6353 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.783 UTC [gossip.comm] func1 -> DEBU 6354 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020Q" signature:"0D\002 Q\221^\301\352O\272\230\216h)\367,\200\333\305VK\233\300\265\225\355@I\337H\320U\203XS\002 )\253:Z\2541\"m\326=\360\020S\261\355l#+l\361\330{A2\251\244/\305\323\214\022>" secret_envelope:\2351(#" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.783 UTC [gossip.gossip] handleMessage -> DEBU 6355 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020Q" signature:"0D\002 Q\221^\301\352O\272\230\216h)\367,\200\333\305VK\233\300\265\225\355@I\337H\320U\203XS\002 )\253:Z\2541\"m\326=\360\020S\261\355l#+l\361\330{A2\251\244/\305\323\214\022>" secret_envelope:\2351(#" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.783 UTC [gossip.gossip] handleMessage -> DEBU 6356 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.783 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6357 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020Q" signature:"0D\002 Q\221^\301\352O\272\230\216h)\367,\200\333\305VK\233\300\265\225\355@I\337H\320U\203XS\002 )\253:Z\2541\"m\326=\360\020S\261\355l#+l\361\330{A2\251\244/\305\323\214\022>" secret_envelope:\2351(#" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.783 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6358 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:09.783 UTC [msp.identity] Verify -> DEBU 6359 Verify: digest = 00000000 8a 64 36 3c e8 c1 47 41 0c 0c 34 14 1e 9a d2 b5 |.d6<..GA..4.....| +peer0.org1.example.com | 00000010 34 07 a9 c0 03 d2 58 1c e8 9d 35 8a 7c ca d5 18 |4.....X...5.|...|" +peer0.org1.example.com | "2019-09-24 00:27:09.783 UTC [msp.identity] Verify -> DEBU 635a Verify: sig = 00000000 30 44 02 20 51 91 5e c1 ea 4f ba 98 8e 68 29 f7 |0D. Q.^..O...h).| +peer0.org1.example.com | 00000010 2c 80 db c5 56 4b 9b c0 b5 95 ed 40 49 df 48 d0 |,...VK.....@I.H.| +peer0.org1.example.com | 00000020 55 83 58 53 02 20 29 ab 3a 5a ac 31 22 6d d6 3d |U.XS. ).:Z.1"m.=| +peer0.org1.example.com | 00000030 f0 10 53 b1 ed 6c 23 2b 6c f1 d8 7b 41 32 a9 a4 |..S..l#+l..{A2..| +peer0.org1.example.com | 00000040 2f c5 d3 8c 12 3e |/....>|" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [msp.identity] Verify -> DEBU 635b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [msp.identity] Verify -> DEBU 635c Verify: sig = 00000000 30 45 02 21 00 b0 df 5f 42 ff 23 e7 17 06 6e 4f |0E.!..._B.#...nO| +peer0.org1.example.com | 00000010 cc 71 fc 0a de 9a 6f 5c 43 03 43 d1 82 e5 4d 5d |.q....o\C.C...M]| +peer0.org1.example.com | 00000020 e1 f8 da 0d fc 02 20 13 20 c9 4c 98 1b a5 55 7a |...... . .L...Uz| +peer0.org1.example.com | 00000030 27 43 7a 29 f0 57 e2 0d 30 23 40 ea 1e 88 80 46 |'Cz).W..0#@....F| +peer0.org1.example.com | 00000040 d7 26 3e 9d 31 28 23 |.&>.1(#|" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.discovery] handleAliveMessage -> DEBU 635d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 635e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 635f updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 6360 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 6361 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 6362 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.discovery] handleAliveMessage -> DEBU 6363 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6364 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.discovery] sendMemResponse -> DEBU 6365 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [msp] DeserializeIdentity -> DEBU 6366 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [msp] DeserializeIdentity -> DEBU 6367 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.comm] Send -> DEBU 6368 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.discovery] sendMemResponse -> DEBU 6369 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020Q" signature:"0D\002 Q\221^\301\352O\272\230\216h)\367,\200\333\305VK\233\300\265\225\355@I\337H\320U\203XS\002 )\253:Z\2541\"m\326=\360\020S\261\355l#+l\361\330{A2\251\244/\305\323\214\022>" secret_envelope:\2351(#" > > alive: " +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.comm] sendToEndpoint -> DEBU 636a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.784 UTC [gossip.comm] sendToEndpoint -> DEBU 636b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.942 UTC [gossip.gossip] handleMessage -> DEBU 636c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.942 UTC [gossip.gossip] handleMessage -> DEBU 636d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 636e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.942 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 636f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:09.942 UTC [msp] DeserializeIdentity -> DEBU 6370 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.942 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6371 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6372 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6373 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [policies] Evaluate -> DEBU 6374 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [policies] Evaluate -> DEBU 6375 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [policies] Evaluate -> DEBU 6376 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [cauthdsl] func1 -> DEBU 6377 0xc002813bc0 gate 1569284829943524600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [cauthdsl] func2 -> DEBU 6378 0xc002813bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [cauthdsl] func2 -> DEBU 6379 0xc002813bc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [cauthdsl] func2 -> DEBU 637a 0xc002813bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [cauthdsl] func2 -> DEBU 637b 0xc002813bc0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [cauthdsl] func1 -> DEBU 637c 0xc002813bc0 gate 1569284829943524600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:09.943 UTC [policies] Evaluate -> DEBU 637d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 637e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 637f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [cauthdsl] func1 -> DEBU 6380 0xc00282a400 gate 1569284829944121400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [cauthdsl] func2 -> DEBU 6381 0xc00282a400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [cauthdsl] func2 -> DEBU 6382 0xc00282a400 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [cauthdsl] func2 -> DEBU 6383 0xc00282a400 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [msp.identity] Verify -> DEBU 6384 Verify: digest = 00000000 f1 d4 c1 ef fa 66 49 6a 44 69 7d 7b e1 83 1a bd |.....fIjDi}{....| +peer0.org1.example.com | 00000010 2b 18 06 90 8c 69 aa 9c e9 54 3b 70 fc e6 74 10 |+....i...T;p..t.|" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [msp.identity] Verify -> DEBU 6385 Verify: sig = 00000000 30 44 02 20 23 27 c0 0d 95 79 56 c6 a2 c6 46 18 |0D. #'...yV...F.| +peer0.org1.example.com | 00000010 4d 97 66 fd 89 fa 4b 1d ac 19 d3 9e ec 7e 55 93 |M.f...K......~U.| +peer0.org1.example.com | 00000020 eb bd 09 88 02 20 76 00 58 1d 8a 68 e1 80 6d c2 |..... v.X..h..m.| +peer0.org1.example.com | 00000030 65 54 a0 33 81 e9 46 96 7e be f5 15 47 85 3e a8 |eT.3..F.~...G.>.| +peer0.org1.example.com | 00000040 84 2d 46 04 b4 9f |.-F...|" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [cauthdsl] func2 -> DEBU 6386 0xc00282a400 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [cauthdsl] func1 -> DEBU 6387 0xc00282a400 gate 1569284829944121400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 6388 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 6389 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 638a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 638b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 638c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 638d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 638e updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:09.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 638f Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:09.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 6390 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:09.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 6391 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 6392 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6393 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.946 UTC [msp] DeserializeIdentity -> DEBU 6394 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 6395 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 6396 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 6397 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 6398 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 6399 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.948 UTC [gossip.comm] Send -> DEBU 639a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 639b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 639c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:09.948 UTC [gossip.comm] Send -> DEBU 639d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:09.948 UTC [gossip.comm] sendToEndpoint -> DEBU 639e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.949 UTC [gossip.comm] sendToEndpoint -> DEBU 639f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.949 UTC [gossip.comm] sendToEndpoint -> DEBU 63a0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.949 UTC [gossip.comm] sendToEndpoint -> DEBU 63a1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.949 UTC [gossip.comm] func1 -> DEBU 63a2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.949 UTC [gossip.gossip] handleMessage -> DEBU 63a3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.949 UTC [gossip.gossip] handleMessage -> DEBU 63a4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63a5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63a6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.952 UTC [gossip.comm] func1 -> DEBU 63a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.953 UTC [gossip.gossip] handleMessage -> DEBU 63a8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.953 UTC [gossip.gossip] handleMessage -> DEBU 63a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:09.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63aa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:09.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63ab Exiting" +peer0.org1.example.com | "2019-09-24 00:27:10.008 UTC [gossip.comm] func1 -> DEBU 63ac Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.008 UTC [gossip.gossip] handleMessage -> DEBU 63ad Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.008 UTC [msp] DeserializeIdentity -> DEBU 63ae Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.008 UTC [msp] DeserializeIdentity -> DEBU 63af Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.008 UTC [msp] DeserializeIdentity -> DEBU 63b0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.008 UTC [gossip.gossip] handleMessage -> DEBU 63b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:10.644 UTC [gossip.comm] func1 -> DEBU 63b2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.644 UTC [gossip.gossip] handleMessage -> DEBU 63b3 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.644 UTC [gossip.gossip] handleMessage -> DEBU 63b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:10.642 UTC [gossip.comm] func1 -> DEBU 63b5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.644 UTC [gossip.gossip] handleMessage -> DEBU 63b6 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.644 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.645 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 63b8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:10.645 UTC [msp] DeserializeIdentity -> DEBU 63b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.645 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 63ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:10.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 63bb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:10.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 63bc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:10.646 UTC [policies] Evaluate -> DEBU 63bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:10.646 UTC [policies] Evaluate -> DEBU 63be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:10.646 UTC [policies] Evaluate -> DEBU 63bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:10.646 UTC [cauthdsl] func1 -> DEBU 63c0 0xc00351c640 gate 1569284830646407800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:10.646 UTC [cauthdsl] func2 -> DEBU 63c1 0xc00351c640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:10.646 UTC [cauthdsl] func2 -> DEBU 63c2 0xc00351c640 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:10.646 UTC [cauthdsl] func2 -> DEBU 63c3 0xc00351c640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:10.646 UTC [cauthdsl] func2 -> DEBU 63c4 0xc00351c640 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:10.646 UTC [cauthdsl] func1 -> DEBU 63c5 0xc00351c640 gate 1569284830646407800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:10.647 UTC [policies] Evaluate -> DEBU 63c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:10.647 UTC [policies] Evaluate -> DEBU 63c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:10.647 UTC [policies] Evaluate -> DEBU 63c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:10.647 UTC [cauthdsl] func1 -> DEBU 63c9 0xc00351ce80 gate 1569284830647381700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:10.647 UTC [cauthdsl] func2 -> DEBU 63ca 0xc00351ce80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:10.647 UTC [cauthdsl] func2 -> DEBU 63cb 0xc00351ce80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:10.647 UTC [cauthdsl] func2 -> DEBU 63cc 0xc00351ce80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:10.647 UTC [msp.identity] Verify -> DEBU 63cd Verify: digest = 00000000 47 68 29 65 b0 89 1e 78 af 6a 76 ac 7b f3 6e 9e |Gh)e...x.jv.{.n.| +peer0.org1.example.com | 00000010 28 09 72 59 d7 83 1c 6e 6c bb e6 7d d7 a6 93 7d |(.rY...nl..}...}|" +peer0.org1.example.com | "2019-09-24 00:27:10.647 UTC [msp.identity] Verify -> DEBU 63ce Verify: sig = 00000000 30 45 02 21 00 ee a5 19 17 59 87 a3 ec 42 58 5f |0E.!.....Y...BX_| +peer0.org1.example.com | 00000010 8d 74 db 89 1f cc 91 79 94 da 0d a1 75 83 e9 94 |.t.....y....u...| +peer0.org1.example.com | 00000020 17 0a 00 ec ea 02 20 03 fa b7 f0 1f cb c8 e9 34 |...... ........4| +peer0.org1.example.com | 00000030 62 6c a7 db 50 38 e3 9a 42 a6 26 43 3f d7 6c a7 |bl..P8..B.&C?.l.| +peer0.org1.example.com | 00000040 4b 3c 8f 1b 96 f8 0a |K<.....|" +peer0.org1.example.com | "2019-09-24 00:27:10.648 UTC [cauthdsl] func2 -> DEBU 63cf 0xc00351ce80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:10.648 UTC [cauthdsl] func1 -> DEBU 63d0 0xc00351ce80 gate 1569284830647381700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:10.648 UTC [policies] Evaluate -> DEBU 63d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:10.648 UTC [policies] Evaluate -> DEBU 63d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:10.648 UTC [policies] Evaluate -> DEBU 63d3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:10.649 UTC [policies] Evaluate -> DEBU 63d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:10.649 UTC [gossip.discovery] handleAliveMessage -> DEBU 63d5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 63d6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:10.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 63d7 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:10.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 63d8 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:10.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 63d9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:10.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 63da Exiting" +peer0.org1.example.com | "2019-09-24 00:27:10.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 63db Exiting" +peer0.org1.example.com | "2019-09-24 00:27:10.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63dc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:10.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63dd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63de Exiting" +peer0.org1.example.com | "2019-09-24 00:27:10.650 UTC [gossip.gossip] handleMessage -> DEBU 63df Exiting" +peer0.org1.example.com | "2019-09-24 00:27:10.650 UTC [gossip.gossip] handleMessage -> DEBU 63e0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.650 UTC [gossip.gossip] handleMessage -> DEBU 63e1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:10.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63e2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:10.659 UTC [msp] DeserializeIdentity -> DEBU 63e4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.660 UTC [msp] DeserializeIdentity -> DEBU 63e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.660 UTC [msp] DeserializeIdentity -> DEBU 63e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.660 UTC [msp] DeserializeIdentity -> DEBU 63e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.660 UTC [msp] DeserializeIdentity -> DEBU 63e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.660 UTC [msp] DeserializeIdentity -> DEBU 63e9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.661 UTC [msp] DeserializeIdentity -> DEBU 63ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.661 UTC [gossip.comm] Send -> DEBU 63eb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:10.662 UTC [msp] DeserializeIdentity -> DEBU 63ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.662 UTC [msp] DeserializeIdentity -> DEBU 63ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:10.662 UTC [gossip.comm] Send -> DEBU 63ee Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:10.663 UTC [gossip.comm] sendToEndpoint -> DEBU 63ef Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.663 UTC [gossip.comm] sendToEndpoint -> DEBU 63f0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:10.664 UTC [gossip.comm] sendToEndpoint -> DEBU 63f1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:10.664 UTC [gossip.comm] sendToEndpoint -> DEBU 63f2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.679 UTC [gossip.pull] Hello -> DEBU 63f3 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:11.680 UTC [gossip.comm] Send -> DEBU 63f4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:11.680 UTC [gossip.pull] Hello -> DEBU 63f5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:11.681 UTC [gossip.comm] Send -> DEBU 63f7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:11.680 UTC [gossip.comm] sendToEndpoint -> DEBU 63f6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.681 UTC [gossip.comm] sendToEndpoint -> DEBU 63f8 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.682 UTC [gossip.pull] Hello -> DEBU 63f9 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:11.683 UTC [gossip.comm] Send -> DEBU 63fb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:11.683 UTC [gossip.gossip] handleMessage -> DEBU 63fc Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.683 UTC [gossip.pull] HandleMessage -> DEBU 63fd GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.683 UTC [gossip.gossip] handleMessage -> DEBU 63fe Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.682 UTC [gossip.comm] sendToEndpoint -> DEBU 63fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.684 UTC [gossip.comm] sendToEndpoint -> DEBU 63ff Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.683 UTC [gossip.comm] sendToEndpoint -> DEBU 6400 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.684 UTC [gossip.comm] sendToEndpoint -> DEBU 6401 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.685 UTC [gossip.comm] func1 -> DEBU 6402 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.685 UTC [gossip.gossip] handleMessage -> DEBU 6403 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.686 UTC [gossip.pull] HandleMessage -> DEBU 6404 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.686 UTC [gossip.gossip] handleMessage -> DEBU 6405 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.687 UTC [gossip.comm] func1 -> DEBU 6406 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.687 UTC [gossip.gossip] handleMessage -> DEBU 6407 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.687 UTC [gossip.pull] HandleMessage -> DEBU 6408 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.688 UTC [gossip.gossip] handleMessage -> DEBU 6409 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.825 UTC [msp] GetDefaultSigningIdentity -> DEBU 640a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:11.825 UTC [msp.identity] Sign -> DEBU 640b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104E " +peer0.org1.example.com | "2019-09-24 00:27:11.825 UTC [msp.identity] Sign -> DEBU 640c Sign: digest: B75630994BA4ACE8E431309043D963F0ED8D8E9498B8586DEBDEF3D230275EF0 " +peer0.org1.example.com | "2019-09-24 00:27:11.826 UTC [msp] GetDefaultSigningIdentity -> DEBU 640d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:11.826 UTC [msp.identity] Sign -> DEBU 640e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:11.826 UTC [msp.identity] Sign -> DEBU 640f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:11.827 UTC [msp] DeserializeIdentity -> DEBU 6410 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.827 UTC [gossip.comm] Send -> DEBU 6411 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:11.828 UTC [gossip.comm] Send -> DEBU 6412 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:11.828 UTC [msp] DeserializeIdentity -> DEBU 6414 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.828 UTC [gossip.comm] sendToEndpoint -> DEBU 6415 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.828 UTC [gossip.comm] sendToEndpoint -> DEBU 6416 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.828 UTC [gossip.comm] Send -> DEBU 6417 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:11.830 UTC [gossip.comm] sendToEndpoint -> DEBU 6418 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.828 UTC [gossip.comm] sendToEndpoint -> DEBU 6413 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.831 UTC [gossip.comm] func1 -> DEBU 6419 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.832 UTC [gossip.gossip] handleMessage -> DEBU 641c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.832 UTC [gossip.gossip] handleMessage -> DEBU 641d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.832 UTC [gossip.discovery] handleMsgFromComm -> DEBU 641e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.832 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 641f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:11.832 UTC [msp.identity] Verify -> DEBU 6420 Verify: digest = 00000000 b7 56 30 99 4b a4 ac e8 e4 31 30 90 43 d9 63 f0 |.V0.K....10.C.c.| +peer0.org1.example.com | 00000010 ed 8d 8e 94 98 b8 58 6d eb de f3 d2 30 27 5e f0 |......Xm....0'^.|" +peer0.org1.example.com | "2019-09-24 00:27:11.832 UTC [msp.identity] Verify -> DEBU 6421 Verify: sig = 00000000 30 44 02 20 10 3a c2 73 c2 5c f4 ea fe 49 d8 ed |0D. .:.s.\...I..| +peer0.org1.example.com | 00000010 a6 6c 95 dc 9f 4a 7d b6 7a 2e bf 8e 47 21 1b bd |.l...J}.z...G!..| +peer0.org1.example.com | 00000020 e8 60 f9 e9 02 20 46 bf 9b 08 42 db 29 f6 39 3a |.`... F...B.).9:| +peer0.org1.example.com | 00000030 b6 43 1e b4 82 74 65 64 db 3a da d2 47 47 f8 02 |.C...ted.:..GG..| +peer0.org1.example.com | 00000040 5b 65 88 4a 4c 98 |[e.JL.|" +peer0.org1.example.com | "2019-09-24 00:27:11.832 UTC [msp.identity] Verify -> DEBU 6422 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:27:11.832 UTC [msp.identity] Verify -> DEBU 6423 Verify: sig = 00000000 30 44 02 20 40 28 89 fe 28 a0 2f f6 d1 7b 93 6d |0D. @(..(./..{.m| +peer0.org1.example.com | 00000010 57 05 e6 98 18 c6 01 70 fe da 0b db ae f5 b8 5d |W......p.......]| +peer0.org1.example.com | 00000020 0d 21 f8 c9 02 20 29 43 4b ec e3 67 5a e2 df 28 |.!... )CK..gZ..(| +peer0.org1.example.com | 00000030 df 8a 0e fe 58 8a 35 7e 1f 69 39 7f c9 c3 66 d6 |....X.5~.i9...f.| +peer0.org1.example.com | 00000040 fe 4f 45 fc 2e bb |.OE...|" +peer0.org1.example.com | "2019-09-24 00:27:11.833 UTC [gossip.discovery] handleAliveMessage -> DEBU 6424 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.833 UTC [gossip.discovery] isSentByMe -> DEBU 6425 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.833 UTC [gossip.discovery] handleAliveMessage -> DEBU 6426 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.833 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6427 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.831 UTC [gossip.comm] sendToEndpoint -> DEBU 641a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.831 UTC [gossip.comm] sendToEndpoint -> DEBU 641b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.834 UTC [gossip.gossip] handleMessage -> DEBU 6428 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.834 UTC [gossip.gossip] handleMessage -> DEBU 6429 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.834 UTC [gossip.discovery] handleMsgFromComm -> DEBU 642a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.834 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 642b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:11.835 UTC [msp.identity] Verify -> DEBU 642c Verify: digest = 00000000 b7 56 30 99 4b a4 ac e8 e4 31 30 90 43 d9 63 f0 |.V0.K....10.C.c.| +peer0.org1.example.com | 00000010 ed 8d 8e 94 98 b8 58 6d eb de f3 d2 30 27 5e f0 |......Xm....0'^.|" +peer0.org1.example.com | "2019-09-24 00:27:11.835 UTC [msp.identity] Verify -> DEBU 642d Verify: sig = 00000000 30 44 02 20 10 3a c2 73 c2 5c f4 ea fe 49 d8 ed |0D. .:.s.\...I..| +peer0.org1.example.com | 00000010 a6 6c 95 dc 9f 4a 7d b6 7a 2e bf 8e 47 21 1b bd |.l...J}.z...G!..| +peer0.org1.example.com | 00000020 e8 60 f9 e9 02 20 46 bf 9b 08 42 db 29 f6 39 3a |.`... F...B.).9:| +peer0.org1.example.com | 00000030 b6 43 1e b4 82 74 65 64 db 3a da d2 47 47 f8 02 |.C...ted.:..GG..| +peer0.org1.example.com | 00000040 5b 65 88 4a 4c 98 |[e.JL.|" +peer0.org1.example.com | "2019-09-24 00:27:11.835 UTC [gossip.discovery] handleAliveMessage -> DEBU 642e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.835 UTC [gossip.discovery] isSentByMe -> DEBU 642f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.835 UTC [gossip.discovery] handleAliveMessage -> DEBU 6430 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.836 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6431 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:11.836 UTC [msp.identity] Verify -> DEBU 6432 Verify: digest = 00000000 8a 64 36 3c e8 c1 47 41 0c 0c 34 14 1e 9a d2 b5 |.d6<..GA..4.....| +peer0.org1.example.com | 00000010 34 07 a9 c0 03 d2 58 1c e8 9d 35 8a 7c ca d5 18 |4.....X...5.|...|" +peer0.org1.example.com | "2019-09-24 00:27:11.836 UTC [msp.identity] Verify -> DEBU 6433 Verify: sig = 00000000 30 44 02 20 51 91 5e c1 ea 4f ba 98 8e 68 29 f7 |0D. Q.^..O...h).| +peer0.org1.example.com | 00000010 2c 80 db c5 56 4b 9b c0 b5 95 ed 40 49 df 48 d0 |,...VK.....@I.H.| +peer0.org1.example.com | 00000020 55 83 58 53 02 20 29 ab 3a 5a ac 31 22 6d d6 3d |U.XS. ).:Z.1"m.=| +peer0.org1.example.com | 00000030 f0 10 53 b1 ed 6c 23 2b 6c f1 d8 7b 41 32 a9 a4 |..S..l#+l..{A2..| +peer0.org1.example.com | 00000040 2f c5 d3 8c 12 3e |/....>|" +peer0.org1.example.com | "2019-09-24 00:27:11.836 UTC [gossip.discovery] handleAliveMessage -> DEBU 6434 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.836 UTC [gossip.discovery] handleAliveMessage -> DEBU 6435 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.836 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6436 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.837 UTC [gossip.comm] func1 -> DEBU 6437 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.837 UTC [gossip.gossip] handleMessage -> DEBU 6438 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.837 UTC [gossip.gossip] handleMessage -> DEBU 6439 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.837 UTC [gossip.discovery] handleMsgFromComm -> DEBU 643a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.837 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 643b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:11.837 UTC [msp.identity] Verify -> DEBU 643c Verify: digest = 00000000 b7 56 30 99 4b a4 ac e8 e4 31 30 90 43 d9 63 f0 |.V0.K....10.C.c.| +peer0.org1.example.com | 00000010 ed 8d 8e 94 98 b8 58 6d eb de f3 d2 30 27 5e f0 |......Xm....0'^.|" +peer0.org1.example.com | "2019-09-24 00:27:11.838 UTC [msp.identity] Verify -> DEBU 643d Verify: sig = 00000000 30 44 02 20 10 3a c2 73 c2 5c f4 ea fe 49 d8 ed |0D. .:.s.\...I..| +peer0.org1.example.com | 00000010 a6 6c 95 dc 9f 4a 7d b6 7a 2e bf 8e 47 21 1b bd |.l...J}.z...G!..| +peer0.org1.example.com | 00000020 e8 60 f9 e9 02 20 46 bf 9b 08 42 db 29 f6 39 3a |.`... F...B.).9:| +peer0.org1.example.com | 00000030 b6 43 1e b4 82 74 65 64 db 3a da d2 47 47 f8 02 |.C...ted.:..GG..| +peer0.org1.example.com | 00000040 5b 65 88 4a 4c 98 |[e.JL.|" +peer0.org1.example.com | "2019-09-24 00:27:11.838 UTC [gossip.discovery] handleAliveMessage -> DEBU 643e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.838 UTC [gossip.discovery] isSentByMe -> DEBU 643f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.838 UTC [gossip.discovery] handleAliveMessage -> DEBU 6440 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.839 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6441 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:11.839 UTC [msp.identity] Verify -> DEBU 6442 Verify: digest = 00000000 8a 64 36 3c e8 c1 47 41 0c 0c 34 14 1e 9a d2 b5 |.d6<..GA..4.....| +peer0.org1.example.com | 00000010 34 07 a9 c0 03 d2 58 1c e8 9d 35 8a 7c ca d5 18 |4.....X...5.|...|" +peer0.org1.example.com | "2019-09-24 00:27:11.839 UTC [msp.identity] Verify -> DEBU 6443 Verify: sig = 00000000 30 44 02 20 51 91 5e c1 ea 4f ba 98 8e 68 29 f7 |0D. Q.^..O...h).| +peer0.org1.example.com | 00000010 2c 80 db c5 56 4b 9b c0 b5 95 ed 40 49 df 48 d0 |,...VK.....@I.H.| +peer0.org1.example.com | 00000020 55 83 58 53 02 20 29 ab 3a 5a ac 31 22 6d d6 3d |U.XS. ).:Z.1"m.=| +peer0.org1.example.com | 00000030 f0 10 53 b1 ed 6c 23 2b 6c f1 d8 7b 41 32 a9 a4 |..S..l#+l..{A2..| +peer0.org1.example.com | 00000040 2f c5 d3 8c 12 3e |/....>|" +peer0.org1.example.com | "2019-09-24 00:27:11.840 UTC [gossip.discovery] handleAliveMessage -> DEBU 6444 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.840 UTC [gossip.discovery] handleAliveMessage -> DEBU 6445 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.840 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6446 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.882 UTC [gossip.gossip] handleMessage -> DEBU 6447 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.883 UTC [gossip.pull] HandleMessage -> DEBU 6448 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.883 UTC [msp] DeserializeIdentity -> DEBU 6449 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.884 UTC [msp] DeserializeIdentity -> DEBU 644a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.884 UTC [msp] DeserializeIdentity -> DEBU 644b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.884 UTC [msp] DeserializeIdentity -> DEBU 644c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.885 UTC [msp] DeserializeIdentity -> DEBU 644d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.885 UTC [msp] DeserializeIdentity -> DEBU 644e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.886 UTC [gossip.pull] SendDigest -> DEBU 644f Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:27:11.886 UTC [gossip.gossip] handleMessage -> DEBU 6450 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.988 UTC [gossip.gossip] handleMessage -> DEBU 6451 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.988 UTC [gossip.gossip] handleMessage -> DEBU 6452 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6453 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6454 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [msp] DeserializeIdentity -> DEBU 6455 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6456 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6457 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6458 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [policies] Evaluate -> DEBU 6459 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [policies] Evaluate -> DEBU 645a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [policies] Evaluate -> DEBU 645b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [cauthdsl] func1 -> DEBU 645c 0xc004243e90 gate 1569284831989770200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [cauthdsl] func2 -> DEBU 645d 0xc004243e90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [cauthdsl] func2 -> DEBU 645e 0xc004243e90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:11.989 UTC [cauthdsl] func2 -> DEBU 645f 0xc004243e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [cauthdsl] func2 -> DEBU 6460 0xc004243e90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [cauthdsl] func1 -> DEBU 6461 0xc004243e90 gate 1569284831989770200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [policies] Evaluate -> DEBU 6462 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [policies] Evaluate -> DEBU 6463 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [policies] Evaluate -> DEBU 6464 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [cauthdsl] func1 -> DEBU 6465 0xc002a766d0 gate 1569284831990341000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [cauthdsl] func2 -> DEBU 6466 0xc002a766d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [cauthdsl] func2 -> DEBU 6467 0xc002a766d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [cauthdsl] func2 -> DEBU 6468 0xc002a766d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [msp.identity] Verify -> DEBU 6469 Verify: digest = 00000000 61 1d 9f 1c 65 fc a7 43 a0 50 89 a9 6c 72 3c d0 |a...e..C.P..lr<.| +peer0.org1.example.com | 00000010 5a a9 5a ec c9 49 29 35 b5 2e ae 69 aa fd f7 db |Z.Z..I)5...i....|" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [msp.identity] Verify -> DEBU 646a Verify: sig = 00000000 30 44 02 20 71 44 12 8a 2e 8e 44 bf 4b d1 70 7e |0D. qD....D.K.p~| +peer0.org1.example.com | 00000010 d6 7d 1e 40 98 c9 97 76 0c 22 a8 a4 1a 02 e6 4f |.}.@...v.".....O| +peer0.org1.example.com | 00000020 bf 9e 1d 28 02 20 11 44 ae 72 32 60 a7 37 10 92 |...(. .D.r2`.7..| +peer0.org1.example.com | 00000030 c4 53 2f d6 af 2a fc 45 15 24 52 21 6f 93 2a 41 |.S/..*.E.$R!o.*A| +peer0.org1.example.com | 00000040 87 07 27 96 28 09 |..'.(.|" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [cauthdsl] func2 -> DEBU 646b 0xc002a766d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:11.990 UTC [cauthdsl] func1 -> DEBU 646c 0xc002a766d0 gate 1569284831990341000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [policies] Evaluate -> DEBU 646d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [policies] Evaluate -> DEBU 646e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [policies] Evaluate -> DEBU 646f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [policies] Evaluate -> DEBU 6470 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 6471 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 6472 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 6473 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 6474 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 6475 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 6476 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 6477 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6478 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:11.992 UTC [gossip.discovery] sendMemResponse -> DEBU 6479 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:27:11.992 UTC [msp] DeserializeIdentity -> DEBU 647a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.992 UTC [msp] DeserializeIdentity -> DEBU 647b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.992 UTC [msp] DeserializeIdentity -> DEBU 647c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:11.992 UTC [gossip.comm] Send -> DEBU 647d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:11.992 UTC [gossip.discovery] sendMemResponse -> DEBU 647e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020Q" signature:"0D\002 Q\221^\301\352O\272\230\216h)\367,\200\333\305VK\233\300\265\225\355@I\337H\320U\203XS\002 )\253:Z\2541\"m\326=\360\020S\261\355l#+l\361\330{A2\251\244/\305\323\214\022>" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:11.993 UTC [gossip.comm] sendToEndpoint -> DEBU 647f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:11.993 UTC [gossip.comm] sendToEndpoint -> DEBU 6480 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.046 UTC [msp] DeserializeIdentity -> DEBU 6481 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.046 UTC [msp] DeserializeIdentity -> DEBU 6482 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.047 UTC [gossip.comm] Send -> DEBU 6483 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:12.047 UTC [gossip.comm] sendToEndpoint -> DEBU 6484 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.047 UTC [gossip.comm] sendToEndpoint -> DEBU 6485 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.047 UTC [gossip.comm] sendToEndpoint -> DEBU 6486 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.047 UTC [gossip.comm] sendToEndpoint -> DEBU 6487 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.048 UTC [gossip.comm] sendToEndpoint -> DEBU 6488 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.048 UTC [gossip.comm] sendToEndpoint -> DEBU 6489 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.049 UTC [gossip.comm] func1 -> DEBU 648a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.050 UTC [gossip.gossip] handleMessage -> DEBU 648b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.051 UTC [msp] DeserializeIdentity -> DEBU 648c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.051 UTC [msp] DeserializeIdentity -> DEBU 648d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.051 UTC [msp] DeserializeIdentity -> DEBU 648e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.052 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 648f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:12.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6490 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6491 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.052 UTC [policies] Evaluate -> DEBU 6492 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.052 UTC [policies] Evaluate -> DEBU 6493 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:12.052 UTC [policies] Evaluate -> DEBU 6494 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.052 UTC [cauthdsl] func1 -> DEBU 6495 0xc002a93520 gate 1569284832052924100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.053 UTC [cauthdsl] func2 -> DEBU 6496 0xc002a93520 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.053 UTC [cauthdsl] func2 -> DEBU 6497 0xc002a93520 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.053 UTC [cauthdsl] func2 -> DEBU 6498 0xc002a93520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:12.053 UTC [cauthdsl] func2 -> DEBU 6499 0xc002a93520 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.053 UTC [cauthdsl] func1 -> DEBU 649a 0xc002a93520 gate 1569284832052924100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.053 UTC [policies] Evaluate -> DEBU 649b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.054 UTC [policies] Evaluate -> DEBU 649c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.054 UTC [policies] Evaluate -> DEBU 649e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.055 UTC [cauthdsl] func1 -> DEBU 649f 0xc002a93d60 gate 1569284832055167300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.055 UTC [cauthdsl] func2 -> DEBU 64a0 0xc002a93d60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.055 UTC [cauthdsl] func2 -> DEBU 64a1 0xc002a93d60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.055 UTC [cauthdsl] func2 -> DEBU 64a2 0xc002a93d60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.055 UTC [msp.identity] Verify -> DEBU 64a3 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:12.055 UTC [msp.identity] Verify -> DEBU 64a4 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:12.054 UTC [gossip.comm] func1 -> DEBU 649d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.057 UTC [cauthdsl] func2 -> DEBU 64a5 0xc002a93d60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.057 UTC [cauthdsl] func1 -> DEBU 64a6 0xc002a93d60 gate 1569284832055167300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:12.057 UTC [policies] Evaluate -> DEBU 64a7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.057 UTC [policies] Evaluate -> DEBU 64a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.057 UTC [policies] Evaluate -> DEBU 64a9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.057 UTC [policies] Evaluate -> DEBU 64aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.057 UTC [msp] DeserializeIdentity -> DEBU 64ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.058 UTC [msp] DeserializeIdentity -> DEBU 64ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 64ad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:12.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64ae Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64af Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.059 UTC [policies] Evaluate -> DEBU 64b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.059 UTC [policies] Evaluate -> DEBU 64b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:12.059 UTC [policies] Evaluate -> DEBU 64b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.059 UTC [cauthdsl] func1 -> DEBU 64b3 0xc004181530 gate 1569284832059850700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.060 UTC [cauthdsl] func2 -> DEBU 64b4 0xc004181530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.060 UTC [cauthdsl] func2 -> DEBU 64b5 0xc004181530 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.060 UTC [cauthdsl] func2 -> DEBU 64b6 0xc004181530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:12.060 UTC [cauthdsl] func2 -> DEBU 64b7 0xc004181530 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.060 UTC [cauthdsl] func1 -> DEBU 64b8 0xc004181530 gate 1569284832059850700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.060 UTC [policies] Evaluate -> DEBU 64b9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.061 UTC [policies] Evaluate -> DEBU 64ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.061 UTC [policies] Evaluate -> DEBU 64bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.061 UTC [cauthdsl] func1 -> DEBU 64bc 0xc004181d70 gate 1569284832061374300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.061 UTC [cauthdsl] func2 -> DEBU 64bd 0xc004181d70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.061 UTC [cauthdsl] func2 -> DEBU 64be 0xc004181d70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.061 UTC [cauthdsl] func2 -> DEBU 64bf 0xc004181d70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.062 UTC [msp.identity] Verify -> DEBU 64c0 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:12.062 UTC [msp.identity] Verify -> DEBU 64c1 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:12.062 UTC [cauthdsl] func2 -> DEBU 64c2 0xc004181d70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.062 UTC [cauthdsl] func1 -> DEBU 64c3 0xc004181d70 gate 1569284832061374300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:12.062 UTC [policies] Evaluate -> DEBU 64c4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.062 UTC [policies] Evaluate -> DEBU 64c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.063 UTC [policies] Evaluate -> DEBU 64c6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.063 UTC [policies] Evaluate -> DEBU 64c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.063 UTC [msp.identity] Verify -> DEBU 64c8 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +peer0.org1.example.com | 00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +peer0.org1.example.com | "2019-09-24 00:27:12.063 UTC [msp.identity] Verify -> DEBU 64c9 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +peer0.org1.example.com | 00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +peer0.org1.example.com | 00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +peer0.org1.example.com | 00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +peer0.org1.example.com | 00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +peer0.org1.example.com | "2019-09-24 00:27:12.064 UTC [msp.identity] Verify -> DEBU 64ca Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:12.064 UTC [msp.identity] Verify -> DEBU 64cb Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:12.065 UTC [gossip.gossip] handleMessage -> DEBU 64cc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.065 UTC [gossip.gossip] handleMessage -> DEBU 64cd Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.065 UTC [msp] DeserializeIdentity -> DEBU 64ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.066 UTC [msp] DeserializeIdentity -> DEBU 64cf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.066 UTC [msp] DeserializeIdentity -> DEBU 64d0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.066 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 64d1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:12.067 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64d2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.067 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64d3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.067 UTC [policies] Evaluate -> DEBU 64d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.067 UTC [policies] Evaluate -> DEBU 64d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:12.067 UTC [policies] Evaluate -> DEBU 64d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.068 UTC [cauthdsl] func1 -> DEBU 64d7 0xc0041b26c0 gate 1569284832068098600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.068 UTC [cauthdsl] func2 -> DEBU 64d8 0xc0041b26c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.068 UTC [cauthdsl] func2 -> DEBU 64d9 0xc0041b26c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.069 UTC [cauthdsl] func2 -> DEBU 64da 0xc0041b26c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:12.069 UTC [cauthdsl] func2 -> DEBU 64db 0xc0041b26c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.069 UTC [cauthdsl] func1 -> DEBU 64dc 0xc0041b26c0 gate 1569284832068098600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.069 UTC [policies] Evaluate -> DEBU 64dd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.070 UTC [policies] Evaluate -> DEBU 64de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.070 UTC [policies] Evaluate -> DEBU 64df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.070 UTC [cauthdsl] func1 -> DEBU 64e0 0xc0041b2f00 gate 1569284832070499300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.070 UTC [cauthdsl] func2 -> DEBU 64e1 0xc0041b2f00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.071 UTC [cauthdsl] func2 -> DEBU 64e2 0xc0041b2f00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.071 UTC [cauthdsl] func2 -> DEBU 64e3 0xc0041b2f00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.071 UTC [msp.identity] Verify -> DEBU 64e4 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:12.071 UTC [msp.identity] Verify -> DEBU 64e5 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:12.072 UTC [cauthdsl] func2 -> DEBU 64e6 0xc0041b2f00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.072 UTC [cauthdsl] func1 -> DEBU 64e7 0xc0041b2f00 gate 1569284832070499300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:12.073 UTC [policies] Evaluate -> DEBU 64e8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.073 UTC [policies] Evaluate -> DEBU 64e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.073 UTC [policies] Evaluate -> DEBU 64ea Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.073 UTC [policies] Evaluate -> DEBU 64eb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.073 UTC [msp] DeserializeIdentity -> DEBU 64ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.074 UTC [msp] DeserializeIdentity -> DEBU 64ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.074 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 64ee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:12.075 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64ef Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.075 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64f0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.075 UTC [policies] Evaluate -> DEBU 64f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.075 UTC [policies] Evaluate -> DEBU 64f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:12.075 UTC [policies] Evaluate -> DEBU 64f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.076 UTC [cauthdsl] func1 -> DEBU 64f4 0xc0047d66d0 gate 1569284832076027500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.076 UTC [cauthdsl] func2 -> DEBU 64f5 0xc0047d66d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.076 UTC [cauthdsl] func2 -> DEBU 64f6 0xc0047d66d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.076 UTC [cauthdsl] func2 -> DEBU 64f7 0xc0047d66d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:12.076 UTC [cauthdsl] func2 -> DEBU 64f8 0xc0047d66d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.076 UTC [cauthdsl] func1 -> DEBU 64f9 0xc0047d66d0 gate 1569284832076027500 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.077 UTC [policies] Evaluate -> DEBU 64fa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.077 UTC [policies] Evaluate -> DEBU 64fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.077 UTC [policies] Evaluate -> DEBU 64fc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.077 UTC [cauthdsl] func1 -> DEBU 64fd 0xc0047d6f10 gate 1569284832077464300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.077 UTC [cauthdsl] func2 -> DEBU 64fe 0xc0047d6f10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.077 UTC [cauthdsl] func2 -> DEBU 64ff 0xc0047d6f10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.077 UTC [cauthdsl] func2 -> DEBU 6500 0xc0047d6f10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.078 UTC [msp.identity] Verify -> DEBU 6501 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:12.078 UTC [msp.identity] Verify -> DEBU 6502 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:12.078 UTC [cauthdsl] func2 -> DEBU 6503 0xc0047d6f10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.078 UTC [cauthdsl] func1 -> DEBU 6504 0xc0047d6f10 gate 1569284832077464300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:12.079 UTC [policies] Evaluate -> DEBU 6505 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.079 UTC [policies] Evaluate -> DEBU 6506 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.079 UTC [policies] Evaluate -> DEBU 6507 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.080 UTC [policies] Evaluate -> DEBU 6508 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.080 UTC [msp.identity] Verify -> DEBU 6509 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:12.080 UTC [msp.identity] Verify -> DEBU 650a Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:12.080 UTC [msp.identity] Verify -> DEBU 650b Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +peer0.org1.example.com | 00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +peer0.org1.example.com | "2019-09-24 00:27:12.081 UTC [msp.identity] Verify -> DEBU 650c Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +peer0.org1.example.com | 00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +peer0.org1.example.com | 00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +peer0.org1.example.com | 00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +peer0.org1.example.com | 00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +peer0.org1.example.com | "2019-09-24 00:27:12.081 UTC [gossip.gossip] handleMessage -> DEBU 650d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.081 UTC [gossip.gossip] handleMessage -> DEBU 650e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.082 UTC [msp.identity] Verify -> DEBU 650f Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:12.082 UTC [msp.identity] Verify -> DEBU 6510 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:12.082 UTC [msp] DeserializeIdentity -> DEBU 6511 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.082 UTC [msp] DeserializeIdentity -> DEBU 6512 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6513 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:12.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6514 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6515 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.083 UTC [policies] Evaluate -> DEBU 6516 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.083 UTC [policies] Evaluate -> DEBU 6517 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:12.083 UTC [policies] Evaluate -> DEBU 6518 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.084 UTC [cauthdsl] func1 -> DEBU 6519 0xc0047e9e80 gate 1569284832084024100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.084 UTC [cauthdsl] func2 -> DEBU 651a 0xc0047e9e80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.084 UTC [cauthdsl] func2 -> DEBU 651b 0xc0047e9e80 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.084 UTC [cauthdsl] func2 -> DEBU 651c 0xc0047e9e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:12.084 UTC [cauthdsl] func2 -> DEBU 651d 0xc0047e9e80 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.084 UTC [cauthdsl] func1 -> DEBU 651e 0xc0047e9e80 gate 1569284832084024100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.084 UTC [policies] Evaluate -> DEBU 651f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.084 UTC [policies] Evaluate -> DEBU 6520 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.084 UTC [policies] Evaluate -> DEBU 6521 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.084 UTC [cauthdsl] func1 -> DEBU 6522 0xc0048026c0 gate 1569284832084869100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.085 UTC [cauthdsl] func2 -> DEBU 6523 0xc0048026c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.085 UTC [cauthdsl] func2 -> DEBU 6524 0xc0048026c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.085 UTC [cauthdsl] func2 -> DEBU 6525 0xc0048026c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.085 UTC [msp.identity] Verify -> DEBU 6526 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:12.085 UTC [msp.identity] Verify -> DEBU 6527 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [cauthdsl] func2 -> DEBU 6528 0xc0048026c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [cauthdsl] func1 -> DEBU 6529 0xc0048026c0 gate 1569284832084869100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 652a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 652b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 652c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 652d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [msp] DeserializeIdentity -> DEBU 652e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [msp] DeserializeIdentity -> DEBU 652f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6530 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6531 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6532 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 6533 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 6534 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 6535 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.086 UTC [cauthdsl] func1 -> DEBU 6536 0xc004803e90 gate 1569284832086978900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6537 0xc004803e90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6538 0xc004803e90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6539 0xc004803e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 653a 0xc004803e90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [cauthdsl] func1 -> DEBU 653b 0xc004803e90 gate 1569284832086978900 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [policies] Evaluate -> DEBU 653c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [policies] Evaluate -> DEBU 653d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [policies] Evaluate -> DEBU 653e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [cauthdsl] func1 -> DEBU 653f 0xc0048146d0 gate 1569284832087450400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6540 0xc0048146d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6541 0xc0048146d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6542 0xc0048146d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [msp.identity] Verify -> DEBU 6543 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:12.087 UTC [msp.identity] Verify -> DEBU 6544 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:12.089 UTC [cauthdsl] func2 -> DEBU 6545 0xc0048146d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.089 UTC [cauthdsl] func1 -> DEBU 6546 0xc0048146d0 gate 1569284832087450400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:12.089 UTC [policies] Evaluate -> DEBU 6547 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.089 UTC [policies] Evaluate -> DEBU 6548 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.089 UTC [policies] Evaluate -> DEBU 6549 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.089 UTC [policies] Evaluate -> DEBU 654a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.089 UTC [msp.identity] Verify -> DEBU 654b Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +peer0.org1.example.com | 00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +peer0.org1.example.com | "2019-09-24 00:27:12.090 UTC [msp.identity] Verify -> DEBU 654c Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +peer0.org1.example.com | 00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +peer0.org1.example.com | 00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +peer0.org1.example.com | 00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +peer0.org1.example.com | 00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +peer0.org1.example.com | "2019-09-24 00:27:12.090 UTC [gossip.gossip] handleMessage -> DEBU 654d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.261 UTC [msp] DeserializeIdentity -> DEBU 654e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.261 UTC [msp] DeserializeIdentity -> DEBU 654f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.261 UTC [gossip.pull] Hello -> DEBU 6550 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:12.261 UTC [msp] DeserializeIdentity -> DEBU 6551 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.261 UTC [msp] DeserializeIdentity -> DEBU 6552 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.261 UTC [gossip.comm] Send -> DEBU 6553 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:12.261 UTC [gossip.comm] sendToEndpoint -> DEBU 6554 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.261 UTC [gossip.comm] sendToEndpoint -> DEBU 6555 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.262 UTC [gossip.comm] func1 -> DEBU 6556 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.262 UTC [gossip.gossip] handleMessage -> DEBU 6557 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.263 UTC [gossip.pull] HandleMessage -> DEBU 6558 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.263 UTC [gossip.gossip] handleMessage -> DEBU 6559 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.285 UTC [gossip.election] waitForInterrupt -> DEBU 655a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.286 UTC [gossip.election] IsLeader -> DEBU 655b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:27:12.286 UTC [msp] GetDefaultSigningIdentity -> DEBU 655c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:12.286 UTC [msp.identity] Sign -> DEBU 655d Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101C1801 " +peer0.org1.example.com | "2019-09-24 00:27:12.286 UTC [msp.identity] Sign -> DEBU 655e Sign: digest: 9868611D40303B67649F761B80823A3B7301606E604C93A87C1CCFA048A9C2DB " +peer0.org1.example.com | "2019-09-24 00:27:12.287 UTC [gossip.election] waitForInterrupt -> DEBU 655f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:27:12.287 UTC [msp] DeserializeIdentity -> DEBU 6560 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.288 UTC [msp] DeserializeIdentity -> DEBU 6561 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.288 UTC [msp] DeserializeIdentity -> DEBU 6562 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.288 UTC [msp] DeserializeIdentity -> DEBU 6563 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.289 UTC [gossip.comm] Send -> DEBU 6564 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:12.289 UTC [msp] DeserializeIdentity -> DEBU 6565 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.289 UTC [msp] DeserializeIdentity -> DEBU 6566 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.290 UTC [gossip.comm] sendToEndpoint -> DEBU 6567 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.290 UTC [gossip.comm] sendToEndpoint -> DEBU 6568 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.548 UTC [gossip.comm] func1 -> DEBU 6569 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.548 UTC [gossip.gossip] handleMessage -> DEBU 656a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.548 UTC [msp] DeserializeIdentity -> DEBU 656b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.549 UTC [msp] DeserializeIdentity -> DEBU 656c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.549 UTC [gossip.gossip] handleMessage -> DEBU 656d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.672 UTC [gossip.comm] func1 -> DEBU 656e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.672 UTC [gossip.gossip] handleMessage -> DEBU 656f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.672 UTC [gossip.gossip] handleMessage -> DEBU 6570 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.672 UTC [gossip.gossip] handleMessage -> DEBU 6571 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6572 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.672 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6573 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:12.672 UTC [gossip.comm] func1 -> DEBU 6574 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.672 UTC [msp.identity] Verify -> DEBU 6575 Verify: digest = 00000000 67 53 7e 18 b6 18 83 89 ac d4 ab 4a 20 71 2f 36 |gS~........J q/6| +peer0.org1.example.com | 00000010 2b db 4e a9 34 cd 08 48 9c dc 03 97 16 3f 53 d9 |+.N.4..H.....?S.|" +peer0.org1.example.com | "2019-09-24 00:27:12.672 UTC [msp.identity] Verify -> DEBU 6576 Verify: sig = 00000000 30 44 02 20 1e 78 4f 71 07 4e 84 30 76 44 7d 6d |0D. .xOq.N.0vD}m| +peer0.org1.example.com | 00000010 e9 51 03 e5 36 e5 f9 c6 ac ad 8d 32 cf d8 b8 ec |.Q..6......2....| +peer0.org1.example.com | 00000020 c1 62 47 ad 02 20 20 6f 07 0b 1f 17 3d 11 0d 8f |.bG.. o....=...| +peer0.org1.example.com | 00000030 69 ba f9 6b 8c e3 d1 88 d9 64 0c d9 4c 8f cc e6 |i..k.....d..L...| +peer0.org1.example.com | 00000040 80 63 d1 e3 77 36 |.c..w6|" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] handleAliveMessage -> DEBU 6577 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] learnExistingMembers -> DEBU 6578 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] learnExistingMembers -> DEBU 6579 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] learnExistingMembers -> DEBU 657a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] learnExistingMembers -> DEBU 657b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] learnExistingMembers -> DEBU 657c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] handleAliveMessage -> DEBU 657d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 657e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 657f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6580 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.gossip] handleMessage -> DEBU 6581 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.gossip] handleMessage -> DEBU 6582 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.gossip] handleMessage -> DEBU 6583 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6584 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6585 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.683 UTC [msp] DeserializeIdentity -> DEBU 6586 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.683 UTC [msp] DeserializeIdentity -> DEBU 6587 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.684 UTC [gossip.comm] Send -> DEBU 6588 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:12.684 UTC [msp] DeserializeIdentity -> DEBU 6589 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.684 UTC [gossip.comm] Send -> DEBU 658a Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:12.684 UTC [gossip.comm] sendToEndpoint -> DEBU 658b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.684 UTC [gossip.comm] sendToEndpoint -> DEBU 658c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.684 UTC [gossip.comm] sendToEndpoint -> DEBU 658d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.684 UTC [gossip.comm] sendToEndpoint -> DEBU 658e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.738 UTC [gossip.comm] func1 -> DEBU 658f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.738 UTC [gossip.gossip] handleMessage -> DEBU 6590 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.738 UTC [gossip.gossip] handleMessage -> DEBU 6591 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6592 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6593 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [msp] DeserializeIdentity -> DEBU 6594 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6595 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6596 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6597 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 6598 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 6599 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 659a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [cauthdsl] func1 -> DEBU 659b 0xc004e7cde0 gate 1569284832739518800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 659c 0xc004e7cde0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 659d 0xc004e7cde0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 659e 0xc004e7cde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 659f 0xc004e7cde0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [cauthdsl] func1 -> DEBU 65a0 0xc004e7cde0 gate 1569284832739518800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 65a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 65a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 65a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [cauthdsl] func1 -> DEBU 65a4 0xc004e7d620 gate 1569284832739889600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 65a5 0xc004e7d620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 65a6 0xc004e7d620 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [cauthdsl] func2 -> DEBU 65a7 0xc004e7d620 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [msp.identity] Verify -> DEBU 65a8 Verify: digest = 00000000 d7 c6 9a d1 a8 ab c0 7e e3 d6 e2 4e 6b 98 e0 f3 |.......~...Nk...| +peer0.org1.example.com | 00000010 2a 88 d6 1c 78 0b 2c f6 f5 17 08 7a 38 21 3d d4 |*...x.,....z8!=.|" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [msp.identity] Verify -> DEBU 65a9 Verify: sig = 00000000 30 45 02 21 00 c6 4a 7c 88 04 a0 85 5b 1e 7c 7e |0E.!..J|....[.|~| +peer0.org1.example.com | 00000010 5d e3 60 fa 6a b1 e5 14 c5 34 8c 78 9d 76 08 2f |].`.j....4.x.v./| +peer0.org1.example.com | 00000020 c1 f1 41 ec 71 02 20 10 ed 3a eb b1 fb 6b a6 37 |..A.q. ..:...k.7| +peer0.org1.example.com | 00000030 48 b7 9b e3 d0 30 2e 60 d4 48 e8 fe 83 4c 1b 7c |H....0.`.H...L.|| +peer0.org1.example.com | 00000040 75 3f bf 0f 0c 71 0f |u?...q.|" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [cauthdsl] func2 -> DEBU 65aa 0xc004e7d620 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [cauthdsl] func1 -> DEBU 65ab 0xc004e7d620 gate 1569284832739889600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [policies] Evaluate -> DEBU 65ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [policies] Evaluate -> DEBU 65ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [policies] Evaluate -> DEBU 65ae Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [policies] Evaluate -> DEBU 65af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [gossip.discovery] handleAliveMessage -> DEBU 65b0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 65b1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 65b2 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 65b3 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 65b4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 65b5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [gossip.discovery] handleAliveMessage -> DEBU 65b6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [gossip.discovery] handleMsgFromComm -> DEBU 65b7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [gossip.discovery] sendMemResponse -> DEBU 65b8 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:27:12.740 UTC [msp] DeserializeIdentity -> DEBU 65b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.741 UTC [msp] DeserializeIdentity -> DEBU 65ba Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.741 UTC [msp] DeserializeIdentity -> DEBU 65bb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.741 UTC [gossip.comm] Send -> DEBU 65bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:12.741 UTC [gossip.discovery] sendMemResponse -> DEBU 65bd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020R" signature:"0D\002 \036xOq\007N\2040vD}m\351Q\003\3456\345\371\306\254\255\2152\317\330\270\354\301bG\255\002 o\007\013\037\027=\021\r\217i\272\371k\214\343\321\210\331d\014\331L\217\314\346\200c\321\343w6" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 65be Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 65bf Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.784 UTC [gossip.comm] func1 -> DEBU 65c0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.784 UTC [gossip.gossip] handleMessage -> DEBU 65c1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.784 UTC [gossip.pull] HandleMessage -> DEBU 65c2 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.784 UTC [msp] DeserializeIdentity -> DEBU 65c3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.784 UTC [msp] DeserializeIdentity -> DEBU 65c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.785 UTC [msp] DeserializeIdentity -> DEBU 65c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.785 UTC [msp] DeserializeIdentity -> DEBU 65c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.785 UTC [msp] DeserializeIdentity -> DEBU 65c7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.785 UTC [msp] DeserializeIdentity -> DEBU 65c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:12.785 UTC [gossip.pull] SendDigest -> DEBU 65c9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:27:12.785 UTC [gossip.gossip] handleMessage -> DEBU 65ca Exiting" +peer0.org1.example.com | "2019-09-24 00:27:12.805 UTC [gossip.comm] func1 -> DEBU 65cb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.805 UTC [gossip.gossip] handleMessage -> DEBU 65cc Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.805 UTC [gossip.pull] HandleMessage -> DEBU 65cd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:12.805 UTC [gossip.pull] SendDigest -> DEBU 65ce Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:12.805 UTC [gossip.gossip] handleMessage -> DEBU 65cf Exiting" +peer0.org1.example.com | "2019-09-24 00:27:13.038 UTC [gossip.gossip] handleMessage -> DEBU 65d0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:13.039 UTC [msp] DeserializeIdentity -> DEBU 65d1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:13.040 UTC [msp] DeserializeIdentity -> DEBU 65d2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:13.040 UTC [msp] DeserializeIdentity -> DEBU 65d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:13.040 UTC [gossip.gossip] handleMessage -> DEBU 65d4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:13.614 UTC [gossip.comm] func1 -> DEBU 65d5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:13.615 UTC [gossip.gossip] handleMessage -> DEBU 65d6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:13.615 UTC [gossip.pull] HandleMessage -> DEBU 65d7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:13.617 UTC [gossip.pull] SendDigest -> DEBU 65d8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:13.617 UTC [gossip.gossip] handleMessage -> DEBU 65d9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:13.754 UTC [gossip.comm] func1 -> DEBU 65da Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:13.755 UTC [gossip.gossip] handleMessage -> DEBU 65db Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:13.755 UTC [gossip.gossip] handleMessage -> DEBU 65dc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:13.755 UTC [gossip.discovery] handleMsgFromComm -> DEBU 65dd Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:13.756 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 65de Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:13.756 UTC [msp.identity] Verify -> DEBU 65df Verify: digest = 00000000 4a 30 e0 bb a7 a4 b9 08 d7 60 b0 1c b1 15 57 78 |J0.......`....Wx| +peer0.org1.example.com | 00000010 aa b3 08 84 e6 68 10 8e cf 49 b5 7b 44 b8 ee 5d |.....h...I.{D..]|" +peer0.org1.example.com | "2019-09-24 00:27:13.757 UTC [msp.identity] Verify -> DEBU 65e0 Verify: sig = 00000000 30 44 02 20 3b 5b 6d 73 0c c3 63 f5 4b 71 e0 31 |0D. ;[ms..c.Kq.1| +peer0.org1.example.com | 00000010 67 ce 08 68 39 f3 20 70 cb 5e de 40 08 4f 28 5b |g..h9. p.^.@.O([| +peer0.org1.example.com | 00000020 19 18 13 97 02 20 7b 34 a8 30 5d 62 ae a9 18 35 |..... {4.0]b...5| +peer0.org1.example.com | 00000030 f7 82 05 01 79 8c 0e 74 67 61 e4 48 a1 51 91 06 |....y..tga.H.Q..| +peer0.org1.example.com | 00000040 b4 c8 93 33 31 c4 |...31.|" +peer0.org1.example.com | "2019-09-24 00:27:13.758 UTC [msp.identity] Verify -> DEBU 65e1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:27:13.758 UTC [msp.identity] Verify -> DEBU 65e2 Verify: sig = 00000000 30 45 02 21 00 ac 4e 5f e1 dd 6c bf 62 b5 d5 c5 |0E.!..N_..l.b...| +peer0.org1.example.com | 00000010 cf 29 4b fc 93 e0 c8 f5 a5 84 87 77 a9 5f 1c e0 |.)K........w._..| +peer0.org1.example.com | 00000020 35 71 c8 52 6b 02 20 54 f6 08 fb 25 2d fb 25 35 |5q.Rk. T...%-.%5| +peer0.org1.example.com | 00000030 31 b6 d6 65 b4 56 98 b2 20 78 e5 e7 4e 06 a3 41 |1..e.V.. x..N..A| +peer0.org1.example.com | 00000040 1d 00 f1 46 38 db fa |...F8..|" +peer0.org1.example.com | "2019-09-24 00:27:13.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 65e3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:13.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 65e4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:13.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 65e5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:13.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 65e6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:13.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 65e7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:13.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 65e8 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:13.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 65e9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:13.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU 65ea Exiting" +peer0.org1.example.com | "2019-09-24 00:27:13.760 UTC [gossip.discovery] sendMemResponse -> DEBU 65eb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:27:13.760 UTC [msp] DeserializeIdentity -> DEBU 65ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:13.760 UTC [msp] DeserializeIdentity -> DEBU 65ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:13.761 UTC [gossip.comm] Send -> DEBU 65ee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:13.761 UTC [gossip.discovery] sendMemResponse -> DEBU 65ef Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:27:13.761 UTC [gossip.comm] sendToEndpoint -> DEBU 65f0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:13.761 UTC [gossip.comm] sendToEndpoint -> DEBU 65f1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:13.976 UTC [gossip.comm] func1 -> DEBU 65f2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:13.976 UTC [gossip.gossip] handleMessage -> DEBU 65f3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:13.976 UTC [msp] DeserializeIdentity -> DEBU 65f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:13.976 UTC [msp] DeserializeIdentity -> DEBU 65f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:13.976 UTC [msp] DeserializeIdentity -> DEBU 65f6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:13.976 UTC [gossip.gossip] handleMessage -> DEBU 65f7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.566 UTC [msp] GetDefaultSigningIdentity -> DEBU 65f8 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:14.566 UTC [msp.identity] Sign -> DEBU 65f9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104F " +peer0.org1.example.com | "2019-09-24 00:27:14.566 UTC [msp.identity] Sign -> DEBU 65fa Sign: digest: DC5B9B185289E524521D816FFE2E7413F367DF8B09833899163A9AF122482F20 " +peer0.org1.example.com | "2019-09-24 00:27:14.566 UTC [msp] GetDefaultSigningIdentity -> DEBU 65fb Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:14.566 UTC [msp.identity] Sign -> DEBU 65fc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:14.566 UTC [msp.identity] Sign -> DEBU 65fd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:14.566 UTC [gossip.discovery] periodicalSendAlive -> DEBU 65fe Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:27:14.571 UTC [msp] DeserializeIdentity -> DEBU 65ff Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.571 UTC [msp] DeserializeIdentity -> DEBU 6600 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.571 UTC [gossip.comm] Send -> DEBU 6601 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:14.571 UTC [msp] DeserializeIdentity -> DEBU 6602 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.571 UTC [gossip.comm] Send -> DEBU 6603 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:14.571 UTC [msp] DeserializeIdentity -> DEBU 6604 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.571 UTC [gossip.comm] Send -> DEBU 6605 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 6606 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 6607 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 6608 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 6609 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 660a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 660b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.907 UTC [gossip.gossip] handleMessage -> DEBU 660c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.907 UTC [gossip.gossip] handleMessage -> DEBU 660d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.907 UTC [gossip.discovery] handleMsgFromComm -> DEBU 660e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 660f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:14.907 UTC [msp] DeserializeIdentity -> DEBU 6610 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6611 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6612 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6613 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 6614 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 6615 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 6616 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [cauthdsl] func1 -> DEBU 6617 0xc00361e4d0 gate 1569284834908459300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 6618 0xc00361e4d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 6619 0xc00361e4d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 661a 0xc00361e4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 661b 0xc00361e4d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [cauthdsl] func1 -> DEBU 661c 0xc00361e4d0 gate 1569284834908459300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 661d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 661e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 661f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [cauthdsl] func1 -> DEBU 6620 0xc00361ed10 gate 1569284834908842800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 6621 0xc00361ed10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 6622 0xc00361ed10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 6623 0xc00361ed10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [msp.identity] Verify -> DEBU 6624 Verify: digest = 00000000 72 45 61 db 38 91 dd 6a 19 b8 3a bf 18 86 79 37 |rEa.8..j..:...y7| +peer0.org1.example.com | 00000010 dd 1f 26 44 65 1c 01 1a f7 7e 95 98 da 78 d4 0f |..&De....~...x..|" +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [msp.identity] Verify -> DEBU 6625 Verify: sig = 00000000 30 44 02 20 02 25 8b 4c 0d d8 fb 9d 81 3d 7c 4a |0D. .%.L.....=|J| +peer0.org1.example.com | 00000010 e6 ed 7f 5e b4 2b fd 8b 67 2b ee ea f4 63 68 b6 |...^.+..g+...ch.| +peer0.org1.example.com | 00000020 6d 86 88 54 02 20 06 d0 83 73 90 06 2c de 95 98 |m..T. ...s..,...| +peer0.org1.example.com | 00000030 23 b9 a6 2f b0 9e ab c2 5b 14 81 c3 d0 ff a4 6f |#../....[......o| +peer0.org1.example.com | 00000040 ff fe 15 82 8b 37 |.....7|" +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [cauthdsl] func2 -> DEBU 6626 0xc00361ed10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [cauthdsl] func1 -> DEBU 6627 0xc00361ed10 gate 1569284834908842800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [policies] Evaluate -> DEBU 6628 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [policies] Evaluate -> DEBU 6629 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [policies] Evaluate -> DEBU 662a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [policies] Evaluate -> DEBU 662b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 662c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 662d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 662e updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:14.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 662f Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:14.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 6630 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:14.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 6631 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 6632 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.910 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6633 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.911 UTC [msp] DeserializeIdentity -> DEBU 6634 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.912 UTC [msp] DeserializeIdentity -> DEBU 6635 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.912 UTC [msp] DeserializeIdentity -> DEBU 6636 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.912 UTC [msp] DeserializeIdentity -> DEBU 6637 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.912 UTC [msp] DeserializeIdentity -> DEBU 6638 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.912 UTC [msp] DeserializeIdentity -> DEBU 6639 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.913 UTC [gossip.comm] Send -> DEBU 663a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:14.913 UTC [msp] DeserializeIdentity -> DEBU 663b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.913 UTC [msp] DeserializeIdentity -> DEBU 663c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:14.913 UTC [gossip.comm] Send -> DEBU 663d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:14.913 UTC [gossip.comm] sendToEndpoint -> DEBU 663e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.913 UTC [gossip.comm] sendToEndpoint -> DEBU 663f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.913 UTC [gossip.comm] sendToEndpoint -> DEBU 6640 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.913 UTC [gossip.comm] sendToEndpoint -> DEBU 6641 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.917 UTC [gossip.comm] func1 -> DEBU 6642 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.917 UTC [gossip.gossip] handleMessage -> DEBU 6643 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.917 UTC [gossip.gossip] handleMessage -> DEBU 6644 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6645 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6646 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.918 UTC [gossip.comm] func1 -> DEBU 6647 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.918 UTC [gossip.gossip] handleMessage -> DEBU 6648 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.919 UTC [gossip.gossip] handleMessage -> DEBU 6649 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:14.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 664a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:14.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 664b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.636 UTC [gossip.comm] func1 -> DEBU 664c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.636 UTC [gossip.gossip] handleMessage -> DEBU 664d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.636 UTC [gossip.gossip] handleMessage -> DEBU 664e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.636 UTC [gossip.discovery] handleMsgFromComm -> DEBU 664f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.636 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6650 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:15.636 UTC [msp] DeserializeIdentity -> DEBU 6651 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6652 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6653 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6654 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 6655 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 6656 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 6657 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [cauthdsl] func1 -> DEBU 6658 0xc0036545f0 gate 1569284835637436400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 6659 0xc0036545f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 665a 0xc0036545f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 665b 0xc0036545f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 665c 0xc0036545f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [cauthdsl] func1 -> DEBU 665d 0xc0036545f0 gate 1569284835637436400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 665e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 665f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 6660 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [cauthdsl] func1 -> DEBU 6661 0xc003654e30 gate 1569284835637866600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 6662 0xc003654e30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 6663 0xc003654e30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [cauthdsl] func2 -> DEBU 6664 0xc003654e30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [msp.identity] Verify -> DEBU 6665 Verify: digest = 00000000 88 39 86 c6 a6 1b 4c d3 1f 3d de 6e 96 ed d9 fc |.9....L..=.n....| +peer0.org1.example.com | 00000010 25 19 86 71 38 e7 09 1d 16 9e 95 7e 4b c2 26 44 |%..q8......~K.&D|" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [msp.identity] Verify -> DEBU 6666 Verify: sig = 00000000 30 45 02 21 00 e5 11 97 3a 20 e7 fd 52 08 13 ba |0E.!....: ..R...| +peer0.org1.example.com | 00000010 dd 0a 45 77 5b 2d 97 ee 6f 27 3c c4 49 71 53 dc |..Ew[-..o'<.IqS.| +peer0.org1.example.com | 00000020 51 80 aa e5 c0 02 20 56 10 be c7 2a 2b 6f a9 bc |Q..... V...*+o..| +peer0.org1.example.com | 00000030 c2 f7 8a 51 13 a2 ab 91 eb f4 95 1b 5c e4 73 93 |...Q........\.s.| +peer0.org1.example.com | 00000040 a7 93 da 5a 27 5f b6 |...Z'_.|" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [cauthdsl] func2 -> DEBU 6667 0xc003654e30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [cauthdsl] func1 -> DEBU 6668 0xc003654e30 gate 1569284835637866600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [policies] Evaluate -> DEBU 6669 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [policies] Evaluate -> DEBU 666a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [policies] Evaluate -> DEBU 666b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [policies] Evaluate -> DEBU 666c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [gossip.discovery] handleAliveMessage -> DEBU 666d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 666e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 666f updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 6670 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 6671 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 6672 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [gossip.discovery] handleAliveMessage -> DEBU 6673 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.638 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6674 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.643 UTC [msp] DeserializeIdentity -> DEBU 6675 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.645 UTC [msp] DeserializeIdentity -> DEBU 6678 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.644 UTC [gossip.gossip] handleMessage -> DEBU 6676 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.646 UTC [gossip.gossip] handleMessage -> DEBU 6679 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 667a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 667b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.644 UTC [gossip.comm] func1 -> DEBU 6677 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.647 UTC [gossip.gossip] handleMessage -> DEBU 667c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.648 UTC [gossip.gossip] handleMessage -> DEBU 667d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 667e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 667f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.645 UTC [msp] DeserializeIdentity -> DEBU 6680 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.649 UTC [msp] DeserializeIdentity -> DEBU 6681 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.650 UTC [msp] DeserializeIdentity -> DEBU 6682 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.650 UTC [msp] DeserializeIdentity -> DEBU 6683 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.651 UTC [msp] DeserializeIdentity -> DEBU 6684 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.651 UTC [gossip.comm] Send -> DEBU 6685 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:15.651 UTC [msp] DeserializeIdentity -> DEBU 6686 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.652 UTC [gossip.comm] sendToEndpoint -> DEBU 6687 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.653 UTC [gossip.comm] sendToEndpoint -> DEBU 6688 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.654 UTC [gossip.comm] Send -> DEBU 6689 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:15.654 UTC [gossip.comm] sendToEndpoint -> DEBU 668a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.655 UTC [gossip.comm] sendToEndpoint -> DEBU 668b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.684 UTC [gossip.pull] Hello -> DEBU 668c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:15.684 UTC [gossip.comm] Send -> DEBU 668d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:15.686 UTC [gossip.pull] Hello -> DEBU 668e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:15.686 UTC [gossip.comm] Send -> DEBU 668f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:15.686 UTC [gossip.pull] Hello -> DEBU 6690 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:15.688 UTC [gossip.comm] Send -> DEBU 6691 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:15.688 UTC [gossip.comm] sendToEndpoint -> DEBU 6692 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.689 UTC [gossip.comm] sendToEndpoint -> DEBU 6695 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.688 UTC [gossip.comm] sendToEndpoint -> DEBU 6693 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.690 UTC [gossip.comm] sendToEndpoint -> DEBU 6696 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.688 UTC [gossip.comm] sendToEndpoint -> DEBU 6694 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.691 UTC [gossip.comm] sendToEndpoint -> DEBU 6697 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.693 UTC [gossip.comm] func1 -> DEBU 6698 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.693 UTC [gossip.gossip] handleMessage -> DEBU 6699 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.694 UTC [gossip.pull] HandleMessage -> DEBU 669a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.694 UTC [gossip.gossip] handleMessage -> DEBU 669b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.694 UTC [gossip.gossip] handleMessage -> DEBU 669c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.694 UTC [gossip.pull] HandleMessage -> DEBU 669d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.694 UTC [gossip.gossip] handleMessage -> DEBU 669e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.695 UTC [gossip.comm] func1 -> DEBU 669f Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.695 UTC [gossip.gossip] handleMessage -> DEBU 66a0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.696 UTC [gossip.pull] HandleMessage -> DEBU 66a1 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.696 UTC [gossip.gossip] handleMessage -> DEBU 66a2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.831 UTC [msp] GetDefaultSigningIdentity -> DEBU 66a3 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:15.831 UTC [msp.identity] Sign -> DEBU 66a4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151050 " +peer0.org1.example.com | "2019-09-24 00:27:15.831 UTC [msp.identity] Sign -> DEBU 66a5 Sign: digest: 063171702962DACAED290160D77D50336BE45BCDB8951B5318B04AC8148F05D7 " +peer0.org1.example.com | "2019-09-24 00:27:15.831 UTC [msp] GetDefaultSigningIdentity -> DEBU 66a6 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:15.831 UTC [msp.identity] Sign -> DEBU 66a7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:15.831 UTC [msp.identity] Sign -> DEBU 66a8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:15.832 UTC [gossip.comm] Send -> DEBU 66a9 Entering, sending GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:15.832 UTC [msp] DeserializeIdentity -> DEBU 66aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.833 UTC [gossip.comm] Send -> DEBU 66ab Entering, sending GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:15.833 UTC [msp] DeserializeIdentity -> DEBU 66ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.833 UTC [gossip.comm] Send -> DEBU 66ad Entering, sending GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:15.833 UTC [gossip.comm] sendToEndpoint -> DEBU 66ae Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.834 UTC [gossip.comm] sendToEndpoint -> DEBU 66af Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.834 UTC [gossip.comm] sendToEndpoint -> DEBU 66b0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.834 UTC [gossip.comm] sendToEndpoint -> DEBU 66b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.834 UTC [gossip.comm] sendToEndpoint -> DEBU 66b2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.834 UTC [gossip.comm] sendToEndpoint -> DEBU 66b3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.848 UTC [gossip.comm] func1 -> DEBU 66b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.848 UTC [gossip.gossip] handleMessage -> DEBU 66b5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.849 UTC [gossip.gossip] handleMessage -> DEBU 66b6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.850 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66b8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:15.851 UTC [msp.identity] Verify -> DEBU 66b9 Verify: digest = 00000000 06 31 71 70 29 62 da ca ed 29 01 60 d7 7d 50 33 |.1qp)b...).`.}P3| +peer0.org1.example.com | 00000010 6b e4 5b cd b8 95 1b 53 18 b0 4a c8 14 8f 05 d7 |k.[....S..J.....|" +peer0.org1.example.com | "2019-09-24 00:27:15.851 UTC [msp.identity] Verify -> DEBU 66ba Verify: sig = 00000000 30 45 02 21 00 e6 bb e2 3e bf b3 6e e8 0c f9 cc |0E.!....>..n....| +peer0.org1.example.com | 00000010 db 41 1f 53 df df 9b 29 a8 b3 54 9f 5a 5e cc 3a |.A.S...)..T.Z^.:| +peer0.org1.example.com | 00000020 69 a0 5a b8 13 02 20 60 a3 da e0 7d d0 28 ec 56 |i.Z... `...}.(.V| +peer0.org1.example.com | 00000030 dc 38 79 c8 4f 85 84 97 4d c4 ac 50 74 8c e8 63 |.8y.O...M..Pt..c| +peer0.org1.example.com | 00000040 90 f6 2e cc 7a 9c 84 |....z..|" +peer0.org1.example.com | "2019-09-24 00:27:15.853 UTC [msp.identity] Verify -> DEBU 66bb Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:27:15.854 UTC [gossip.comm] func1 -> DEBU 66bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.854 UTC [gossip.gossip] handleMessage -> DEBU 66bd Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.853 UTC [msp.identity] Verify -> DEBU 66be Verify: sig = 00000000 30 45 02 21 00 cd 73 83 0c e0 0d 7e 01 2c 07 5f |0E.!..s....~.,._| +peer0.org1.example.com | 00000010 f4 ee c3 59 74 8f f4 5b 44 cd 89 e8 86 87 cf bf |...Yt..[D.......| +peer0.org1.example.com | 00000020 d3 a8 8a 37 ef 02 20 12 42 aa b7 0d d2 2d 0b c8 |...7.. .B....-..| +peer0.org1.example.com | 00000030 5b 05 3c aa 18 cf 74 d3 49 33 1b bb e4 44 51 09 |[.<...t.I3...DQ.| +peer0.org1.example.com | 00000040 d6 2b c0 c5 d4 47 b7 |.+...G.|" +peer0.org1.example.com | "2019-09-24 00:27:15.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 66bf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.856 UTC [gossip.discovery] isSentByMe -> DEBU 66c0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 66c1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66c2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.856 UTC [gossip.gossip] handleMessage -> DEBU 66c3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.857 UTC [gossip.gossip] handleMessage -> DEBU 66c4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66c5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.857 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66c6 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:15.858 UTC [msp.identity] Verify -> DEBU 66c7 Verify: digest = 00000000 4a 30 e0 bb a7 a4 b9 08 d7 60 b0 1c b1 15 57 78 |J0.......`....Wx| +peer0.org1.example.com | 00000010 aa b3 08 84 e6 68 10 8e cf 49 b5 7b 44 b8 ee 5d |.....h...I.{D..]|" +peer0.org1.example.com | "2019-09-24 00:27:15.858 UTC [msp.identity] Verify -> DEBU 66c8 Verify: sig = 00000000 30 44 02 20 3b 5b 6d 73 0c c3 63 f5 4b 71 e0 31 |0D. ;[ms..c.Kq.1| +peer0.org1.example.com | 00000010 67 ce 08 68 39 f3 20 70 cb 5e de 40 08 4f 28 5b |g..h9. p.^.@.O([| +peer0.org1.example.com | 00000020 19 18 13 97 02 20 7b 34 a8 30 5d 62 ae a9 18 35 |..... {4.0]b...5| +peer0.org1.example.com | 00000030 f7 82 05 01 79 8c 0e 74 67 61 e4 48 a1 51 91 06 |....y..tga.H.Q..| +peer0.org1.example.com | 00000040 b4 c8 93 33 31 c4 |...31.|" +peer0.org1.example.com | "2019-09-24 00:27:15.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 66c9 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 66ca Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.860 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66cb Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:15.861 UTC [msp.identity] Verify -> DEBU 66cc Verify: digest = 00000000 06 31 71 70 29 62 da ca ed 29 01 60 d7 7d 50 33 |.1qp)b...).`.}P3| +peer0.org1.example.com | 00000010 6b e4 5b cd b8 95 1b 53 18 b0 4a c8 14 8f 05 d7 |k.[....S..J.....|" +peer0.org1.example.com | "2019-09-24 00:27:15.861 UTC [msp.identity] Verify -> DEBU 66cd Verify: sig = 00000000 30 45 02 21 00 e6 bb e2 3e bf b3 6e e8 0c f9 cc |0E.!....>..n....| +peer0.org1.example.com | 00000010 db 41 1f 53 df df 9b 29 a8 b3 54 9f 5a 5e cc 3a |.A.S...)..T.Z^.:| +peer0.org1.example.com | 00000020 69 a0 5a b8 13 02 20 60 a3 da e0 7d d0 28 ec 56 |i.Z... `...}.(.V| +peer0.org1.example.com | 00000030 dc 38 79 c8 4f 85 84 97 4d c4 ac 50 74 8c e8 63 |.8y.O...M..Pt..c| +peer0.org1.example.com | 00000040 90 f6 2e cc 7a 9c 84 |....z..|" +peer0.org1.example.com | "2019-09-24 00:27:15.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 66ce Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.862 UTC [gossip.discovery] isSentByMe -> DEBU 66cf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.863 UTC [gossip.discovery] handleAliveMessage -> DEBU 66d0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66d1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.864 UTC [gossip.gossip] handleMessage -> DEBU 66d3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.865 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66d4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:15.866 UTC [msp.identity] Verify -> DEBU 66d5 Verify: digest = 00000000 06 31 71 70 29 62 da ca ed 29 01 60 d7 7d 50 33 |.1qp)b...).`.}P3| +peer0.org1.example.com | 00000010 6b e4 5b cd b8 95 1b 53 18 b0 4a c8 14 8f 05 d7 |k.[....S..J.....|" +peer0.org1.example.com | "2019-09-24 00:27:15.866 UTC [msp.identity] Verify -> DEBU 66d6 Verify: sig = 00000000 30 45 02 21 00 e6 bb e2 3e bf b3 6e e8 0c f9 cc |0E.!....>..n....| +peer0.org1.example.com | 00000010 db 41 1f 53 df df 9b 29 a8 b3 54 9f 5a 5e cc 3a |.A.S...)..T.Z^.:| +peer0.org1.example.com | 00000020 69 a0 5a b8 13 02 20 60 a3 da e0 7d d0 28 ec 56 |i.Z... `...}.(.V| +peer0.org1.example.com | 00000030 dc 38 79 c8 4f 85 84 97 4d c4 ac 50 74 8c e8 63 |.8y.O...M..Pt..c| +peer0.org1.example.com | 00000040 90 f6 2e cc 7a 9c 84 |....z..|" +peer0.org1.example.com | "2019-09-24 00:27:15.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 66d7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.867 UTC [gossip.discovery] isSentByMe -> DEBU 66d8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 66d9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.868 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66da Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:15.869 UTC [msp.identity] Verify -> DEBU 66db Verify: digest = 00000000 4a 30 e0 bb a7 a4 b9 08 d7 60 b0 1c b1 15 57 78 |J0.......`....Wx| +peer0.org1.example.com | 00000010 aa b3 08 84 e6 68 10 8e cf 49 b5 7b 44 b8 ee 5d |.....h...I.{D..]|" +peer0.org1.example.com | "2019-09-24 00:27:15.870 UTC [msp.identity] Verify -> DEBU 66dc Verify: sig = 00000000 30 44 02 20 3b 5b 6d 73 0c c3 63 f5 4b 71 e0 31 |0D. ;[ms..c.Kq.1| +peer0.org1.example.com | 00000010 67 ce 08 68 39 f3 20 70 cb 5e de 40 08 4f 28 5b |g..h9. p.^.@.O([| +peer0.org1.example.com | 00000020 19 18 13 97 02 20 7b 34 a8 30 5d 62 ae a9 18 35 |..... {4.0]b...5| +peer0.org1.example.com | 00000030 f7 82 05 01 79 8c 0e 74 67 61 e4 48 a1 51 91 06 |....y..tga.H.Q..| +peer0.org1.example.com | 00000040 b4 c8 93 33 31 c4 |...31.|" +peer0.org1.example.com | "2019-09-24 00:27:15.871 UTC [gossip.discovery] handleAliveMessage -> DEBU 66dd Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.871 UTC [gossip.discovery] handleAliveMessage -> DEBU 66de Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.872 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66df Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.881 UTC [gossip.gossip] handleMessage -> DEBU 66e0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.881 UTC [gossip.pull] HandleMessage -> DEBU 66e1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.882 UTC [msp] DeserializeIdentity -> DEBU 66e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.882 UTC [msp] DeserializeIdentity -> DEBU 66e3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.883 UTC [msp] DeserializeIdentity -> DEBU 66e4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.883 UTC [msp] DeserializeIdentity -> DEBU 66e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.883 UTC [msp] DeserializeIdentity -> DEBU 66e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.884 UTC [msp] DeserializeIdentity -> DEBU 66e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.884 UTC [gossip.pull] SendDigest -> DEBU 66e8 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:27:15.885 UTC [gossip.gossip] handleMessage -> DEBU 66e9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.989 UTC [gossip.gossip] handleMessage -> DEBU 66ea Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.989 UTC [gossip.gossip] handleMessage -> DEBU 66eb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:15.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66ec Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:15.990 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66ed Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:15.992 UTC [msp] DeserializeIdentity -> DEBU 66ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:15.995 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 66ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:15.995 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 66f0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:15.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 66f1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:15.998 UTC [policies] Evaluate -> DEBU 66f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:15.998 UTC [policies] Evaluate -> DEBU 66f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:15.998 UTC [policies] Evaluate -> DEBU 66f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.004 UTC [cauthdsl] func1 -> DEBU 66f5 0xc004acf380 gate 1569284836004494700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.004 UTC [cauthdsl] func2 -> DEBU 66f6 0xc004acf380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.004 UTC [cauthdsl] func2 -> DEBU 66f7 0xc004acf380 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.005 UTC [cauthdsl] func2 -> DEBU 66f8 0xc004acf380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:16.005 UTC [cauthdsl] func2 -> DEBU 66f9 0xc004acf380 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.005 UTC [cauthdsl] func1 -> DEBU 66fa 0xc004acf380 gate 1569284836004494700 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.006 UTC [policies] Evaluate -> DEBU 66fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.006 UTC [policies] Evaluate -> DEBU 66fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.008 UTC [policies] Evaluate -> DEBU 66fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.008 UTC [cauthdsl] func1 -> DEBU 66fe 0xc004acfbc0 gate 1569284836008380800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.008 UTC [cauthdsl] func2 -> DEBU 66ff 0xc004acfbc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.008 UTC [cauthdsl] func2 -> DEBU 6700 0xc004acfbc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.008 UTC [cauthdsl] func2 -> DEBU 6701 0xc004acfbc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.008 UTC [msp.identity] Verify -> DEBU 6702 Verify: digest = 00000000 66 ce 27 f9 48 4d ad eb 61 54 a3 e4 99 22 be c2 |f.'.HM..aT..."..| +peer0.org1.example.com | 00000010 2c f4 1a b0 14 57 34 a6 9b 1f 2f 29 dc 39 a6 28 |,....W4.../).9.(|" +peer0.org1.example.com | "2019-09-24 00:27:16.008 UTC [msp.identity] Verify -> DEBU 6703 Verify: sig = 00000000 30 44 02 20 4e d6 f6 48 83 5b 09 83 e5 6b bb ed |0D. N..H.[...k..| +peer0.org1.example.com | 00000010 cf 30 72 43 c0 4a 49 1a 0d 65 b3 4b 29 80 1f 00 |.0rC.JI..e.K)...| +peer0.org1.example.com | 00000020 23 af 10 32 02 20 6c fe ac 4c 50 4f a3 31 0f 6f |#..2. l..LPO.1.o| +peer0.org1.example.com | 00000030 b0 17 47 1a b1 10 ce 7f 61 d6 eb fd 9f 27 37 6f |..G.....a....'7o| +peer0.org1.example.com | 00000040 2b 86 38 50 bf d1 |+.8P..|" +peer0.org1.example.com | "2019-09-24 00:27:16.008 UTC [cauthdsl] func2 -> DEBU 6704 0xc004acfbc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.009 UTC [cauthdsl] func1 -> DEBU 6705 0xc004acfbc0 gate 1569284836008380800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:16.009 UTC [policies] Evaluate -> DEBU 6706 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.009 UTC [policies] Evaluate -> DEBU 6707 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.009 UTC [policies] Evaluate -> DEBU 6708 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.009 UTC [policies] Evaluate -> DEBU 6709 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.009 UTC [gossip.discovery] handleAliveMessage -> DEBU 670a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 670b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:16.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 670c updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:16.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 670d Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:16.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 670e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:16.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 670f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.010 UTC [gossip.discovery] handleAliveMessage -> DEBU 6710 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6711 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.010 UTC [gossip.discovery] sendMemResponse -> DEBU 6712 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:27:16.010 UTC [msp] DeserializeIdentity -> DEBU 6713 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.010 UTC [msp] DeserializeIdentity -> DEBU 6714 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.010 UTC [msp] DeserializeIdentity -> DEBU 6715 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.010 UTC [gossip.comm] Send -> DEBU 6716 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:16.010 UTC [gossip.discovery] sendMemResponse -> DEBU 6717 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:16.010 UTC [gossip.comm] sendToEndpoint -> DEBU 6718 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.011 UTC [gossip.comm] sendToEndpoint -> DEBU 6719 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.047 UTC [msp] DeserializeIdentity -> DEBU 671a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.047 UTC [msp] DeserializeIdentity -> DEBU 671b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.048 UTC [gossip.comm] Send -> DEBU 671c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:16.048 UTC [gossip.comm] sendToEndpoint -> DEBU 671d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.048 UTC [gossip.comm] sendToEndpoint -> DEBU 671e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.050 UTC [gossip.comm] sendToEndpoint -> DEBU 671f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.050 UTC [gossip.comm] sendToEndpoint -> DEBU 6720 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.050 UTC [gossip.comm] sendToEndpoint -> DEBU 6721 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.051 UTC [gossip.comm] sendToEndpoint -> DEBU 6722 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.053 UTC [gossip.comm] func1 -> DEBU 6723 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.053 UTC [gossip.gossip] handleMessage -> DEBU 6724 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.054 UTC [msp.identity] Verify -> DEBU 6725 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:16.055 UTC [msp.identity] Verify -> DEBU 6726 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:16.055 UTC [msp] DeserializeIdentity -> DEBU 6727 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.056 UTC [msp] DeserializeIdentity -> DEBU 6728 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.056 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6729 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:16.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 672a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 672b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.057 UTC [policies] Evaluate -> DEBU 672c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.057 UTC [policies] Evaluate -> DEBU 672d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:16.057 UTC [policies] Evaluate -> DEBU 672e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.058 UTC [cauthdsl] func1 -> DEBU 672f 0xc004b09750 gate 1569284836058288300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.059 UTC [cauthdsl] func2 -> DEBU 6730 0xc004b09750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.059 UTC [cauthdsl] func2 -> DEBU 6731 0xc004b09750 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.060 UTC [cauthdsl] func2 -> DEBU 6732 0xc004b09750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:16.060 UTC [cauthdsl] func2 -> DEBU 6733 0xc004b09750 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.060 UTC [gossip.comm] func1 -> DEBU 6734 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.060 UTC [cauthdsl] func1 -> DEBU 6735 0xc004b09750 gate 1569284836058288300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.062 UTC [policies] Evaluate -> DEBU 6736 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.062 UTC [policies] Evaluate -> DEBU 6737 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.063 UTC [policies] Evaluate -> DEBU 6738 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.063 UTC [cauthdsl] func1 -> DEBU 6739 0xc004b09f90 gate 1569284836063755200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.063 UTC [cauthdsl] func2 -> DEBU 673a 0xc004b09f90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.063 UTC [cauthdsl] func2 -> DEBU 673b 0xc004b09f90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.064 UTC [cauthdsl] func2 -> DEBU 673c 0xc004b09f90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.064 UTC [msp.identity] Verify -> DEBU 673d Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:16.065 UTC [msp.identity] Verify -> DEBU 673e Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:16.065 UTC [cauthdsl] func2 -> DEBU 673f 0xc004b09f90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.065 UTC [cauthdsl] func1 -> DEBU 6740 0xc004b09f90 gate 1569284836063755200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:16.066 UTC [policies] Evaluate -> DEBU 6741 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.066 UTC [policies] Evaluate -> DEBU 6742 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.066 UTC [policies] Evaluate -> DEBU 6743 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.066 UTC [policies] Evaluate -> DEBU 6744 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.067 UTC [msp] DeserializeIdentity -> DEBU 6745 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.067 UTC [msp] DeserializeIdentity -> DEBU 6746 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.068 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6747 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:16.068 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6748 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.068 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6749 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.068 UTC [policies] Evaluate -> DEBU 674a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.068 UTC [policies] Evaluate -> DEBU 674b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:16.069 UTC [policies] Evaluate -> DEBU 674c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.069 UTC [cauthdsl] func1 -> DEBU 674d 0xc004b25760 gate 1569284836069620100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.069 UTC [cauthdsl] func2 -> DEBU 674e 0xc004b25760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.069 UTC [cauthdsl] func2 -> DEBU 674f 0xc004b25760 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.070 UTC [cauthdsl] func2 -> DEBU 6750 0xc004b25760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:16.070 UTC [cauthdsl] func2 -> DEBU 6751 0xc004b25760 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.071 UTC [cauthdsl] func1 -> DEBU 6752 0xc004b25760 gate 1569284836069620100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.071 UTC [policies] Evaluate -> DEBU 6753 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.071 UTC [policies] Evaluate -> DEBU 6754 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.071 UTC [policies] Evaluate -> DEBU 6755 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.072 UTC [cauthdsl] func1 -> DEBU 6756 0xc004b25fa0 gate 1569284836072281100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.072 UTC [cauthdsl] func2 -> DEBU 6757 0xc004b25fa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.073 UTC [cauthdsl] func2 -> DEBU 6758 0xc004b25fa0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.073 UTC [cauthdsl] func2 -> DEBU 6759 0xc004b25fa0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.073 UTC [msp.identity] Verify -> DEBU 675a Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:16.074 UTC [msp.identity] Verify -> DEBU 675b Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:16.074 UTC [cauthdsl] func2 -> DEBU 675c 0xc004b25fa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.074 UTC [cauthdsl] func1 -> DEBU 675d 0xc004b25fa0 gate 1569284836072281100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:16.074 UTC [policies] Evaluate -> DEBU 675e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.074 UTC [policies] Evaluate -> DEBU 675f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.075 UTC [policies] Evaluate -> DEBU 6760 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.075 UTC [policies] Evaluate -> DEBU 6761 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.075 UTC [msp.identity] Verify -> DEBU 6762 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +peer0.org1.example.com | 00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +peer0.org1.example.com | "2019-09-24 00:27:16.075 UTC [msp.identity] Verify -> DEBU 6763 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +peer0.org1.example.com | 00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +peer0.org1.example.com | 00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +peer0.org1.example.com | 00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +peer0.org1.example.com | 00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +peer0.org1.example.com | "2019-09-24 00:27:16.075 UTC [gossip.gossip] handleMessage -> DEBU 6764 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.076 UTC [gossip.gossip] handleMessage -> DEBU 6765 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.076 UTC [msp] DeserializeIdentity -> DEBU 6766 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.076 UTC [msp] DeserializeIdentity -> DEBU 6767 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.076 UTC [msp] DeserializeIdentity -> DEBU 6768 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.077 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6769 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:16.077 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 676a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.077 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 676b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.077 UTC [policies] Evaluate -> DEBU 676c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.077 UTC [policies] Evaluate -> DEBU 676d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:16.077 UTC [policies] Evaluate -> DEBU 676e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.077 UTC [cauthdsl] func1 -> DEBU 676f 0xc004b501d0 gate 1569284836077760400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.078 UTC [cauthdsl] func2 -> DEBU 6770 0xc004b501d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.078 UTC [cauthdsl] func2 -> DEBU 6771 0xc004b501d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.078 UTC [cauthdsl] func2 -> DEBU 6772 0xc004b501d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:16.078 UTC [cauthdsl] func2 -> DEBU 6773 0xc004b501d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.078 UTC [cauthdsl] func1 -> DEBU 6774 0xc004b501d0 gate 1569284836077760400 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.078 UTC [policies] Evaluate -> DEBU 6775 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.078 UTC [policies] Evaluate -> DEBU 6776 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.078 UTC [policies] Evaluate -> DEBU 6777 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.079 UTC [cauthdsl] func1 -> DEBU 6778 0xc004b50a10 gate 1569284836079054200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.079 UTC [cauthdsl] func2 -> DEBU 6779 0xc004b50a10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.079 UTC [cauthdsl] func2 -> DEBU 677a 0xc004b50a10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.079 UTC [cauthdsl] func2 -> DEBU 677b 0xc004b50a10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.079 UTC [msp.identity] Verify -> DEBU 677c Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:16.079 UTC [msp.identity] Verify -> DEBU 677d Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:16.079 UTC [cauthdsl] func2 -> DEBU 677e 0xc004b50a10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.080 UTC [cauthdsl] func1 -> DEBU 677f 0xc004b50a10 gate 1569284836079054200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:16.080 UTC [policies] Evaluate -> DEBU 6780 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.080 UTC [policies] Evaluate -> DEBU 6781 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.080 UTC [policies] Evaluate -> DEBU 6782 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.080 UTC [policies] Evaluate -> DEBU 6783 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.081 UTC [msp] DeserializeIdentity -> DEBU 6784 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.081 UTC [msp] DeserializeIdentity -> DEBU 6785 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.082 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6786 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:16.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6787 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6788 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.082 UTC [policies] Evaluate -> DEBU 6789 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.082 UTC [policies] Evaluate -> DEBU 678a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:16.082 UTC [policies] Evaluate -> DEBU 678b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.083 UTC [cauthdsl] func1 -> DEBU 678c 0xc004b661e0 gate 1569284836083406200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.083 UTC [cauthdsl] func2 -> DEBU 678d 0xc004b661e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.083 UTC [cauthdsl] func2 -> DEBU 678e 0xc004b661e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.084 UTC [cauthdsl] func2 -> DEBU 678f 0xc004b661e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:16.084 UTC [cauthdsl] func2 -> DEBU 6790 0xc004b661e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.084 UTC [cauthdsl] func1 -> DEBU 6791 0xc004b661e0 gate 1569284836083406200 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.084 UTC [policies] Evaluate -> DEBU 6792 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.084 UTC [policies] Evaluate -> DEBU 6793 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.084 UTC [policies] Evaluate -> DEBU 6794 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.084 UTC [cauthdsl] func1 -> DEBU 6795 0xc004b66a20 gate 1569284836084901100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.085 UTC [cauthdsl] func2 -> DEBU 6796 0xc004b66a20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.085 UTC [cauthdsl] func2 -> DEBU 6797 0xc004b66a20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.085 UTC [cauthdsl] func2 -> DEBU 6798 0xc004b66a20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.085 UTC [msp.identity] Verify -> DEBU 6799 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:16.086 UTC [msp.identity] Verify -> DEBU 679a Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:16.086 UTC [cauthdsl] func2 -> DEBU 679b 0xc004b66a20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.086 UTC [cauthdsl] func1 -> DEBU 679c 0xc004b66a20 gate 1569284836084901100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:16.086 UTC [policies] Evaluate -> DEBU 679d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.086 UTC [policies] Evaluate -> DEBU 679e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.087 UTC [policies] Evaluate -> DEBU 679f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.087 UTC [policies] Evaluate -> DEBU 67a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.088 UTC [msp.identity] Verify -> DEBU 67a1 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +peer0.org1.example.com | 00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +peer0.org1.example.com | "2019-09-24 00:27:16.088 UTC [msp.identity] Verify -> DEBU 67a2 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +peer0.org1.example.com | 00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +peer0.org1.example.com | 00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +peer0.org1.example.com | 00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +peer0.org1.example.com | 00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +peer0.org1.example.com | "2019-09-24 00:27:16.088 UTC [msp.identity] Verify -> DEBU 67a3 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:16.088 UTC [msp.identity] Verify -> DEBU 67a4 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:16.089 UTC [gossip.gossip] handleMessage -> DEBU 67a5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.089 UTC [gossip.gossip] handleMessage -> DEBU 67a6 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.089 UTC [msp] DeserializeIdentity -> DEBU 67a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.089 UTC [msp] DeserializeIdentity -> DEBU 67a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.090 UTC [msp] DeserializeIdentity -> DEBU 67a9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.090 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 67aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:16.090 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 67ab Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.090 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 67ac Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.090 UTC [policies] Evaluate -> DEBU 67ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.090 UTC [policies] Evaluate -> DEBU 67ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:16.091 UTC [policies] Evaluate -> DEBU 67af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.091 UTC [cauthdsl] func1 -> DEBU 67b0 0xc004b77370 gate 1569284836091383000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.091 UTC [cauthdsl] func2 -> DEBU 67b1 0xc004b77370 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.091 UTC [cauthdsl] func2 -> DEBU 67b2 0xc004b77370 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.091 UTC [cauthdsl] func2 -> DEBU 67b3 0xc004b77370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:16.091 UTC [cauthdsl] func2 -> DEBU 67b4 0xc004b77370 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.091 UTC [cauthdsl] func1 -> DEBU 67b5 0xc004b77370 gate 1569284836091383000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.092 UTC [policies] Evaluate -> DEBU 67b6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.092 UTC [policies] Evaluate -> DEBU 67b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.092 UTC [policies] Evaluate -> DEBU 67b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.092 UTC [cauthdsl] func1 -> DEBU 67b9 0xc004b77bb0 gate 1569284836092629100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.092 UTC [cauthdsl] func2 -> DEBU 67ba 0xc004b77bb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.093 UTC [cauthdsl] func2 -> DEBU 67bb 0xc004b77bb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.093 UTC [cauthdsl] func2 -> DEBU 67bc 0xc004b77bb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.093 UTC [msp.identity] Verify -> DEBU 67bd Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:16.093 UTC [msp.identity] Verify -> DEBU 67be Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:16.094 UTC [cauthdsl] func2 -> DEBU 67bf 0xc004b77bb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.094 UTC [cauthdsl] func1 -> DEBU 67c0 0xc004b77bb0 gate 1569284836092629100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:16.095 UTC [policies] Evaluate -> DEBU 67c1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.095 UTC [policies] Evaluate -> DEBU 67c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.096 UTC [policies] Evaluate -> DEBU 67c3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.096 UTC [policies] Evaluate -> DEBU 67c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.096 UTC [msp] DeserializeIdentity -> DEBU 67c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.096 UTC [msp] DeserializeIdentity -> DEBU 67c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 67c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 67c8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 67c9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [cauthdsl] func1 -> DEBU 67cd 0xc004b93380 gate 1569284836097261300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67ce 0xc004b93380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67cf 0xc004b93380 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67d0 0xc004b93380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67d1 0xc004b93380 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [cauthdsl] func1 -> DEBU 67d2 0xc004b93380 gate 1569284836097261300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67d3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [cauthdsl] func1 -> DEBU 67d6 0xc004b93bc0 gate 1569284836097794000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67d7 0xc004b93bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67d8 0xc004b93bc0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.098 UTC [cauthdsl] func2 -> DEBU 67d9 0xc004b93bc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.098 UTC [msp.identity] Verify -> DEBU 67da Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:16.098 UTC [msp.identity] Verify -> DEBU 67db Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:16.099 UTC [cauthdsl] func2 -> DEBU 67dc 0xc004b93bc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.099 UTC [cauthdsl] func1 -> DEBU 67dd 0xc004b93bc0 gate 1569284836097794000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:16.099 UTC [policies] Evaluate -> DEBU 67de Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.099 UTC [policies] Evaluate -> DEBU 67df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.099 UTC [policies] Evaluate -> DEBU 67e0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.100 UTC [policies] Evaluate -> DEBU 67e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.100 UTC [msp.identity] Verify -> DEBU 67e2 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:16.100 UTC [msp.identity] Verify -> DEBU 67e3 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:16.101 UTC [msp.identity] Verify -> DEBU 67e4 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +peer0.org1.example.com | 00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +peer0.org1.example.com | "2019-09-24 00:27:16.101 UTC [msp.identity] Verify -> DEBU 67e5 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +peer0.org1.example.com | 00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +peer0.org1.example.com | 00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +peer0.org1.example.com | 00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +peer0.org1.example.com | 00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +peer0.org1.example.com | "2019-09-24 00:27:16.101 UTC [gossip.gossip] handleMessage -> DEBU 67e6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.294 UTC [msp] DeserializeIdentity -> DEBU 67e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.295 UTC [msp] DeserializeIdentity -> DEBU 67e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.295 UTC [gossip.pull] Hello -> DEBU 67e9 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:16.296 UTC [msp] DeserializeIdentity -> DEBU 67ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.296 UTC [msp] DeserializeIdentity -> DEBU 67eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.296 UTC [gossip.comm] Send -> DEBU 67ec Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:16.297 UTC [gossip.comm] sendToEndpoint -> DEBU 67ed Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.297 UTC [gossip.comm] sendToEndpoint -> DEBU 67ee Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.299 UTC [gossip.comm] func1 -> DEBU 67ef Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.299 UTC [gossip.gossip] handleMessage -> DEBU 67f0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.299 UTC [gossip.pull] HandleMessage -> DEBU 67f1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.300 UTC [gossip.gossip] handleMessage -> DEBU 67f2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.548 UTC [gossip.comm] func1 -> DEBU 67f3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.548 UTC [gossip.gossip] handleMessage -> DEBU 67f4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.548 UTC [msp] DeserializeIdentity -> DEBU 67f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.548 UTC [msp] DeserializeIdentity -> DEBU 67f6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.549 UTC [gossip.gossip] handleMessage -> DEBU 67f7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.740 UTC [gossip.comm] func1 -> DEBU 67f8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.741 UTC [gossip.gossip] handleMessage -> DEBU 67f9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.741 UTC [gossip.gossip] handleMessage -> DEBU 67fa Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.741 UTC [gossip.discovery] handleMsgFromComm -> DEBU 67fb Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.741 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 67fc Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:16.741 UTC [msp] DeserializeIdentity -> DEBU 67fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.742 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 67fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:16.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 67ff Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6800 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:16.743 UTC [policies] Evaluate -> DEBU 6801 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.743 UTC [policies] Evaluate -> DEBU 6802 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:16.743 UTC [policies] Evaluate -> DEBU 6803 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.743 UTC [cauthdsl] func1 -> DEBU 6804 0xc004c486c0 gate 1569284836743836000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.743 UTC [cauthdsl] func2 -> DEBU 6805 0xc004c486c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.743 UTC [cauthdsl] func2 -> DEBU 6806 0xc004c486c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.744 UTC [cauthdsl] func2 -> DEBU 6807 0xc004c486c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:16.744 UTC [cauthdsl] func2 -> DEBU 6808 0xc004c486c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.744 UTC [cauthdsl] func1 -> DEBU 6809 0xc004c486c0 gate 1569284836743836000 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:16.744 UTC [policies] Evaluate -> DEBU 680a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.744 UTC [policies] Evaluate -> DEBU 680b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.744 UTC [policies] Evaluate -> DEBU 680c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:16.744 UTC [cauthdsl] func1 -> DEBU 680d 0xc004c48f00 gate 1569284836744235900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:16.744 UTC [cauthdsl] func2 -> DEBU 680e 0xc004c48f00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:16.744 UTC [cauthdsl] func2 -> DEBU 680f 0xc004c48f00 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:16.745 UTC [cauthdsl] func2 -> DEBU 6810 0xc004c48f00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.745 UTC [msp.identity] Verify -> DEBU 6811 Verify: digest = 00000000 50 21 22 66 79 10 db 29 f6 d2 57 80 95 58 6e 4b |P!"fy..)..W..XnK| +peer0.org1.example.com | 00000010 10 65 59 0b 43 58 50 da 05 11 30 16 2a e0 26 e8 |.eY.CXP...0.*.&.|" +peer0.org1.example.com | "2019-09-24 00:27:16.745 UTC [msp.identity] Verify -> DEBU 6812 Verify: sig = 00000000 30 44 02 20 70 ef ba 11 04 19 51 9d 44 91 bc e1 |0D. p.....Q.D...| +peer0.org1.example.com | 00000010 8e 9b 38 9f 86 7e bf 28 3b 1f 61 28 1c 47 ac e1 |..8..~.(;.a(.G..| +peer0.org1.example.com | 00000020 2f 09 e5 6f 02 20 58 cf 24 30 4b 6e b0 8b 66 f6 |/..o. X.$0Kn..f.| +peer0.org1.example.com | 00000030 fc 62 cc 0c 38 f5 01 91 e9 f4 a4 59 c2 5a 43 fe |.b..8......Y.ZC.| +peer0.org1.example.com | 00000040 31 4d ac d7 25 2e |1M..%.|" +peer0.org1.example.com | "2019-09-24 00:27:16.745 UTC [cauthdsl] func2 -> DEBU 6813 0xc004c48f00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:16.745 UTC [cauthdsl] func1 -> DEBU 6814 0xc004c48f00 gate 1569284836744235900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:16.746 UTC [policies] Evaluate -> DEBU 6815 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.746 UTC [policies] Evaluate -> DEBU 6816 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.746 UTC [policies] Evaluate -> DEBU 6817 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.746 UTC [policies] Evaluate -> DEBU 6818 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:16.746 UTC [gossip.discovery] handleAliveMessage -> DEBU 6819 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 681a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:16.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 681b updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:16.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 681c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:16.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 681d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:16.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 681e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.747 UTC [gossip.discovery] handleAliveMessage -> DEBU 681f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.747 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6820 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.748 UTC [gossip.discovery] sendMemResponse -> DEBU 6821 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:27:16.748 UTC [msp] DeserializeIdentity -> DEBU 6822 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.748 UTC [msp] DeserializeIdentity -> DEBU 6823 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.748 UTC [msp] DeserializeIdentity -> DEBU 6824 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.748 UTC [gossip.comm] Send -> DEBU 6825 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:16.748 UTC [gossip.comm] sendToEndpoint -> DEBU 6826 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.748 UTC [gossip.comm] sendToEndpoint -> DEBU 6827 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.748 UTC [gossip.discovery] sendMemResponse -> DEBU 6828 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:16.785 UTC [gossip.comm] func1 -> DEBU 6829 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.785 UTC [gossip.gossip] handleMessage -> DEBU 682a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.785 UTC [gossip.pull] HandleMessage -> DEBU 682b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.785 UTC [msp] DeserializeIdentity -> DEBU 682c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.786 UTC [msp] DeserializeIdentity -> DEBU 682d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.786 UTC [msp] DeserializeIdentity -> DEBU 682e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.786 UTC [msp] DeserializeIdentity -> DEBU 682f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.786 UTC [msp] DeserializeIdentity -> DEBU 6830 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.787 UTC [msp] DeserializeIdentity -> DEBU 6831 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:16.787 UTC [gossip.pull] SendDigest -> DEBU 6832 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:27:16.787 UTC [gossip.gossip] handleMessage -> DEBU 6833 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:16.806 UTC [gossip.comm] func1 -> DEBU 6834 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.806 UTC [gossip.gossip] handleMessage -> DEBU 6835 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.806 UTC [gossip.pull] HandleMessage -> DEBU 6836 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:16.807 UTC [gossip.pull] SendDigest -> DEBU 6837 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:16.807 UTC [gossip.gossip] handleMessage -> DEBU 6838 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.043 UTC [gossip.gossip] handleMessage -> DEBU 6839 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.044 UTC [msp] DeserializeIdentity -> DEBU 683a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.044 UTC [msp] DeserializeIdentity -> DEBU 683b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.044 UTC [msp] DeserializeIdentity -> DEBU 683c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.045 UTC [gossip.gossip] handleMessage -> DEBU 683d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.290 UTC [gossip.election] waitForInterrupt -> DEBU 683e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.290 UTC [gossip.election] IsLeader -> DEBU 683f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [msp] GetDefaultSigningIdentity -> DEBU 6840 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [msp.identity] Sign -> DEBU 6841 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101D1801 " +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [msp.identity] Sign -> DEBU 6842 Sign: digest: F629988202B88AC569C6B096F653527E80B378B6992A2A29B849880621E4478B " +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [gossip.election] waitForInterrupt -> DEBU 6843 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 6844 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 6845 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 6846 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 6847 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [gossip.comm] Send -> DEBU 6848 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 6849 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 684a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [gossip.comm] sendToEndpoint -> DEBU 684b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.291 UTC [gossip.comm] sendToEndpoint -> DEBU 684c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.615 UTC [gossip.comm] func1 -> DEBU 684d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.615 UTC [gossip.gossip] handleMessage -> DEBU 684e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.615 UTC [gossip.pull] HandleMessage -> DEBU 684f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.616 UTC [gossip.pull] SendDigest -> DEBU 6850 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:17.617 UTC [gossip.gossip] handleMessage -> DEBU 6851 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.665 UTC [gossip.comm] func1 -> DEBU 6852 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.665 UTC [gossip.gossip] handleMessage -> DEBU 6853 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.665 UTC [gossip.gossip] handleMessage -> DEBU 6854 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.665 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6855 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.665 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6856 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:17.666 UTC [msp.identity] Verify -> DEBU 6857 Verify: digest = 00000000 49 cc ab 3c e5 30 96 18 5d 54 5a 9d 0a e9 43 22 |I..<.0..]TZ...C"| +peer0.org1.example.com | 00000010 1e 41 8e ed 95 6b 81 3c 93 75 17 7b 31 af 9f 0d |.A...k.<.u.{1...|" +peer0.org1.example.com | "2019-09-24 00:27:17.666 UTC [msp.identity] Verify -> DEBU 6858 Verify: sig = 00000000 30 45 02 21 00 dd 6d 49 c5 ea 7a 05 5f f8 fc c7 |0E.!..mI..z._...| +peer0.org1.example.com | 00000010 c8 ea cd ef ad ad e7 e7 b6 ca e2 e9 40 57 24 e4 |............@W$.| +peer0.org1.example.com | 00000020 7b a4 de 48 ba 02 20 31 53 94 c8 c9 68 4e d0 85 |{..H.. 1S...hN..| +peer0.org1.example.com | 00000030 70 d7 8e 37 83 d0 5f a2 4e 8c 09 e9 8d a0 f2 09 |p..7.._.N.......| +peer0.org1.example.com | 00000040 b8 b9 ea 6c 88 1f 4d |...l..M|" +peer0.org1.example.com | "2019-09-24 00:27:17.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 6859 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 685a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:17.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 685b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:17.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 685c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:17.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 685d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:17.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 685e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 685f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6860 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.667 UTC [gossip.gossip] handleMessage -> DEBU 6861 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.667 UTC [gossip.gossip] handleMessage -> DEBU 6862 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6863 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6864 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.675 UTC [msp] DeserializeIdentity -> DEBU 6865 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.675 UTC [msp] DeserializeIdentity -> DEBU 6866 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.675 UTC [msp] DeserializeIdentity -> DEBU 6867 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.675 UTC [gossip.comm] Send -> DEBU 6868 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:17.676 UTC [msp] DeserializeIdentity -> DEBU 6869 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.676 UTC [gossip.comm] Send -> DEBU 686a Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:17.676 UTC [gossip.comm] sendToEndpoint -> DEBU 686b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.676 UTC [gossip.comm] sendToEndpoint -> DEBU 686c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.676 UTC [gossip.comm] sendToEndpoint -> DEBU 686d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.676 UTC [gossip.comm] sendToEndpoint -> DEBU 686e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.678 UTC [gossip.comm] func1 -> DEBU 686f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.678 UTC [gossip.gossip] handleMessage -> DEBU 6870 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.678 UTC [gossip.gossip] handleMessage -> DEBU 6871 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6872 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6873 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.749 UTC [gossip.comm] func1 -> DEBU 6874 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.749 UTC [gossip.gossip] handleMessage -> DEBU 6875 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.749 UTC [gossip.gossip] handleMessage -> DEBU 6876 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.749 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6877 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.749 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6878 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:17.749 UTC [msp.identity] Verify -> DEBU 6879 Verify: digest = 00000000 3b 6e 18 85 73 f9 5b 5f 95 c3 13 13 b7 8e 6d c6 |;n..s.[_......m.| +peer0.org1.example.com | 00000010 26 f4 2f a0 e8 8b af 5a c8 0b 66 dc 97 6e 10 a1 |&./....Z..f..n..|" +peer0.org1.example.com | "2019-09-24 00:27:17.749 UTC [msp.identity] Verify -> DEBU 687a Verify: sig = 00000000 30 44 02 20 5e 1e e9 f7 1b ce f4 b4 50 95 66 cf |0D. ^.......P.f.| +peer0.org1.example.com | 00000010 7f f5 20 84 98 a4 83 43 a3 6f 91 13 a8 08 88 a9 |.. ....C.o......| +peer0.org1.example.com | 00000020 18 c6 ea f7 02 20 71 8c 55 9c 49 a4 cb 96 1a 36 |..... q.U.I....6| +peer0.org1.example.com | 00000030 12 6f 38 2f 1d 42 79 59 03 fd 4f f7 f7 35 74 0a |.o8/.ByY..O..5t.| +peer0.org1.example.com | 00000040 9d 7c 02 39 29 03 |.|.9).|" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [msp.identity] Verify -> DEBU 687b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [msp.identity] Verify -> DEBU 687c Verify: sig = 00000000 30 45 02 21 00 d4 03 c9 17 86 a5 31 14 0b 40 41 |0E.!.......1..@A| +peer0.org1.example.com | 00000010 9b e2 7c bd 69 27 01 c2 5e b2 5d 73 ee 70 b5 81 |..|.i'..^.]s.p..| +peer0.org1.example.com | 00000020 83 f8 c9 af 2b 02 20 01 da 1d f8 10 1c db c0 5c |....+. ........\| +peer0.org1.example.com | 00000030 76 a0 49 de e7 50 89 ca 0b 2f cb 8f bc eb 18 d2 |v.I..P.../......| +peer0.org1.example.com | 00000040 00 8e fa 44 73 c7 21 |...Ds.!|" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 687d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 687e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 687f updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 6880 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 6881 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 6882 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 6883 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6884 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.discovery] sendMemResponse -> DEBU 6885 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [msp] DeserializeIdentity -> DEBU 6886 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [msp] DeserializeIdentity -> DEBU 6887 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.comm] Send -> DEBU 6888 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.discovery] sendMemResponse -> DEBU 6889 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.comm] sendToEndpoint -> DEBU 688a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.750 UTC [gossip.comm] sendToEndpoint -> DEBU 688b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:17.974 UTC [gossip.comm] func1 -> DEBU 688c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.975 UTC [gossip.gossip] handleMessage -> DEBU 688d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:17.975 UTC [msp] DeserializeIdentity -> DEBU 688e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.975 UTC [msp] DeserializeIdentity -> DEBU 688f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.975 UTC [msp] DeserializeIdentity -> DEBU 6890 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:17.975 UTC [gossip.gossip] handleMessage -> DEBU 6891 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.463 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 6892 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.463 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 6893 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.463 UTC [policies] Evaluate -> DEBU 6894 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 00:27:19.464 UTC [policies] Evaluate -> DEBU 6895 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.464 UTC [policies] Evaluate -> DEBU 6896 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.464 UTC [cauthdsl] func1 -> DEBU 6897 0xc004d36450 gate 1569284839464661300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.464 UTC [cauthdsl] func2 -> DEBU 6898 0xc004d36450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.465 UTC [cauthdsl] func2 -> DEBU 6899 0xc004d36450 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.465 UTC [cauthdsl] func2 -> DEBU 689a 0xc004d36450 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.465 UTC [msp.identity] Verify -> DEBU 689b Verify: digest = 00000000 c2 67 ad 69 30 97 e6 51 22 6b 4b c4 b0 08 22 c9 |.g.i0..Q"kK...".| +peer0.org1.example.com | 00000010 9e ee 8d 45 cd c3 0f d4 ec 3f bb b6 1f 2d 59 a6 |...E.....?...-Y.|" +peer0.org1.example.com | "2019-09-24 00:27:19.465 UTC [msp.identity] Verify -> DEBU 689c Verify: sig = 00000000 30 44 02 20 6c 3a 2e 94 a1 ff be 68 3a 24 ea e2 |0D. l:.....h:$..| +peer0.org1.example.com | 00000010 9c 98 64 bb 2e f9 7e 1a 75 97 b4 3e d6 87 b3 fb |..d...~.u..>....| +peer0.org1.example.com | 00000020 e7 3d ad 09 02 20 6f 8d ec d6 4e 32 62 cd 64 f1 |.=... o...N2b.d.| +peer0.org1.example.com | 00000030 b3 4f 10 13 dd 32 9d fa a8 dd ec aa 8b 37 58 8c |.O...2.......7X.| +peer0.org1.example.com | 00000040 65 5d 45 88 07 5a |e]E..Z|" +peer0.org1.example.com | "2019-09-24 00:27:19.465 UTC [cauthdsl] func2 -> DEBU 689d 0xc004d36450 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.465 UTC [cauthdsl] func1 -> DEBU 689e 0xc004d36450 gate 1569284839464661300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.465 UTC [policies] Evaluate -> DEBU 689f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.465 UTC [policies] Evaluate -> DEBU 68a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.465 UTC [policies] Evaluate -> DEBU 68a1 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:27:19.466 UTC [policies] Evaluate -> DEBU 68a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:27:19.466 UTC [blocksProvider] DeliverBlocks -> DEBU 68a3 [businesschannel] Adding payload to local buffer, blockNum = [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.466 UTC [gossip.state] addPayload -> DEBU 68a4 [businesschannel] Adding payload to local buffer, blockNum = [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.466 UTC [gossip.state] addPayload -> DEBU 68a5 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-09-24 00:27:19.466 UTC [blocksProvider] DeliverBlocks -> DEBU 68a6 [businesschannel] Gossiping block [6], peers number [3]" +peer0.org1.example.com | "2019-09-24 00:27:19.467 UTC [gossip.channel] AddToMsgStore -> DEBU 68a7 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34898 bytes, seq: 6}, Envelope: 34931 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 00:27:19.467 UTC [gossip.pull] Add -> DEBU 68a9 Added 6, total items: 6" +peer0.org1.example.com | "2019-09-24 00:27:19.466 UTC [gossip.state] deliverPayloads -> DEBU 68a8 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.467 UTC [gossip.state] deliverPayloads -> DEBU 68aa [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 00:27:19.467 UTC [gossip.privdata] StoreBlock -> INFO 68ab [businesschannel] Received block [6] from buffer" +peer0.org1.example.com | "2019-09-24 00:27:19.467 UTC [gossip.privdata] StoreBlock -> DEBU 68ac [businesschannel] Validating block [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.468 UTC [committer.txvalidator] Validate -> DEBU 68ad [businesschannel] START Block Validation for block [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.468 UTC [committer.txvalidator] Validate -> DEBU 68ae expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 00:27:19.468 UTC [committer.txvalidator] validateTx -> DEBU 68af [businesschannel] validateTx starts for block 0xc0025fdac0 env 0xc004c89680 txn 0" +peer0.org1.example.com | "2019-09-24 00:27:19.468 UTC [protoutils] ValidateTransaction -> DEBU 68b0 ValidateTransactionEnvelope starts for envelope 0xc004c89680" +peer0.org1.example.com | "2019-09-24 00:27:19.468 UTC [protoutils] ValidateTransaction -> DEBU 68b1 Header is channel_header:"\010\001\032\006\010\347\305\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\300\316\334\361G_L\000<\211\036?B\332\225\341\273\255X\347\031\237fk" " +peer0.org1.example.com | "2019-09-24 00:27:19.468 UTC [protoutils] validateChannelHeader -> DEBU 68b2 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-09-24 00:27:19.468 UTC [protoutils] checkSignatureFromCreator -> DEBU 68b3 begin" +peer0.org1.example.com | "2019-09-24 00:27:19.469 UTC [msp] GetManagerForChain -> DEBU 68b4 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 00:27:19.469 UTC [msp] DeserializeIdentity -> DEBU 68b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.469 UTC [msp.identity] newIdentity -> DEBU 68b6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [protoutils] checkSignatureFromCreator -> DEBU 68b7 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [msp] Validate -> DEBU 68b8 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68ba Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [protoutils] checkSignatureFromCreator -> DEBU 68bb creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68bc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68bd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [msp.identity] Verify -> DEBU 68be Verify: digest = 00000000 a1 4f 26 24 5c 60 61 cd 27 a8 84 08 72 6e 75 9a |.O&$\`a.'...rnu.| +peer0.org1.example.com | 00000010 cd f4 0a 72 bb a2 45 42 72 8c 08 7e 71 e7 c7 3d |...r..EBr..~q..=|" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [msp.identity] Verify -> DEBU 68bf Verify: sig = 00000000 30 45 02 21 00 be 77 61 11 1c 31 7b 61 9b bf e1 |0E.!..wa..1{a...| +peer0.org1.example.com | 00000010 aa 50 c3 32 1f a8 e6 f4 32 fd a2 0e 40 09 a2 92 |.P.2....2...@...| +peer0.org1.example.com | 00000020 69 66 73 16 58 02 20 69 a4 df 24 de 15 ff 27 59 |ifs.X. i..$...'Y| +peer0.org1.example.com | 00000030 84 0c ff 42 07 92 94 a9 95 18 98 aa 50 21 03 cb |...B........P!..| +peer0.org1.example.com | 00000040 d1 d1 df 9a 80 67 53 |.....gS|" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [gossip.comm] Send -> DEBU 68c0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34898 bytes, seq: 6}, Envelope: 34931 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [protoutils] checkSignatureFromCreator -> DEBU 68c2 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68c3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [protoutils] validateConfigTransaction -> DEBU 68c4 validateConfigTransaction starts for data 0xc004d60000, header channel_header:"\010\001\032\006\010\347\305\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\300\316\334\361G_L\000<\211\036?B\332\225\341\273\255X\347\031\237fk" " +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [committer.txvalidator] validateTx -> DEBU 68c5 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [gossip.comm] sendToEndpoint -> DEBU 68c6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34898 bytes, seq: 6}, Envelope: 34931 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.470 UTC [gossip.comm] sendToEndpoint -> DEBU 68c7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.471 UTC [common.configtx] addToMap -> DEBU 68c8 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 00:27:19.471 UTC [common.configtx] addToMap -> DEBU 68c9 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 00:27:19.479 UTC [common.configtx] addToMap -> DEBU 68ca Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.479 UTC [common.configtx] addToMap -> DEBU 68cb Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68cc Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68cd Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68ce Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68cf Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d0 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d1 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d2 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d3 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d4 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d5 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d6 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d7 Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d8 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68da Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.481 UTC [common.configtx] addToMap -> DEBU 68db Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.481 UTC [common.configtx] addToMap -> DEBU 68dc Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.481 UTC [common.configtx] addToMap -> DEBU 68dd Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-09-24 00:27:19.481 UTC [common.configtx] addToMap -> DEBU 68de Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 00:27:19.482 UTC [common.configtx] addToMap -> DEBU 68df Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.482 UTC [common.configtx] addToMap -> DEBU 68e0 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 00:27:19.483 UTC [common.configtx] addToMap -> DEBU 68e1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 00:27:19.483 UTC [common.configtx] addToMap -> DEBU 68e2 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.484 UTC [common.configtx] addToMap -> DEBU 68e3 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.484 UTC [common.configtx] verifyDeltaSet -> DEBU 68e4 Processing change to key: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.484 UTC [common.configtx] verifyDeltaSet -> DEBU 68e5 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.484 UTC [common.configtx] verifyDeltaSet -> DEBU 68e6 Processing change to key: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 00:27:19.485 UTC [common.configtx] policyForItem -> DEBU 68e7 Getting policy for item Application with mod_policy Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.485 UTC [policies] Manager -> DEBU 68e8 Manager Channel looking up path []" +peer0.org1.example.com | "2019-09-24 00:27:19.485 UTC [policies] Manager -> DEBU 68e9 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:27:19.485 UTC [policies] Manager -> DEBU 68ea Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:27:19.486 UTC [policies] Manager -> DEBU 68eb Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 00:27:19.487 UTC [policies] Manager -> DEBU 68ec Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:27:19.487 UTC [policies] Manager -> DEBU 68ed Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:27:19.487 UTC [policies] Manager -> DEBU 68ee Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 00:27:19.487 UTC [policies] Manager -> DEBU 68ef Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.487 UTC [policies] Manager -> DEBU 68f0 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.488 UTC [policies] Evaluate -> DEBU 68f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +peer0.org1.example.com | "2019-09-24 00:27:19.488 UTC [policies] Evaluate -> DEBU 68f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.488 UTC [policies] Evaluate -> DEBU 68f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | "2019-09-24 00:27:19.488 UTC [cauthdsl] deduplicate -> WARN 68f4 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-09-24 00:27:19.489 UTC [cauthdsl] func1 -> DEBU 68f5 0xc004338240 gate 1569284839488988500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.489 UTC [cauthdsl] func2 -> DEBU 68f6 0xc004338240 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-09-24 00:27:19.489 UTC [cauthdsl] func2 -> DEBU 68f7 0xc004338240 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.490 UTC [cauthdsl] func2 -> DEBU 68f8 0xc004338240 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.490 UTC [msp.identity] Verify -> DEBU 68f9 Verify: digest = 00000000 48 77 a9 76 ae c6 d0 00 08 e1 87 61 5a 35 3b 84 |Hw.v.......aZ5;.| +peer0.org1.example.com | 00000010 16 95 5c 0b c0 a8 fc c1 cf 92 2d eb 73 05 3b 4a |..\.......-.s.;J|" +peer0.org1.example.com | "2019-09-24 00:27:19.490 UTC [msp.identity] Verify -> DEBU 68fa Verify: sig = 00000000 30 44 02 20 4c 82 9e d8 a1 76 a3 a3 75 1d 20 c9 |0D. L....v..u. .| +peer0.org1.example.com | 00000010 3e 86 10 3b d1 1d 25 b5 e5 d4 bc e4 42 6b 38 bd |>..;..%.....Bk8.| +peer0.org1.example.com | 00000020 f6 ad d6 81 02 20 68 bc f4 5b 2d ee d1 96 32 c3 |..... h..[-...2.| +peer0.org1.example.com | 00000030 97 14 67 8c 23 1e 47 0f c7 05 3b 29 c9 13 7b 07 |..g.#.G...;)..{.| +peer0.org1.example.com | 00000040 8f a7 92 fd d1 08 |......|" +peer0.org1.example.com | "2019-09-24 00:27:19.491 UTC [cauthdsl] func2 -> DEBU 68fb 0xc004338240 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.491 UTC [cauthdsl] func1 -> DEBU 68fc 0xc004338240 gate 1569284839488988500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 68fd Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 68fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 68ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | "2019-09-24 00:27:19.491 UTC [cauthdsl] deduplicate -> WARN 6900 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-09-24 00:27:19.492 UTC [cauthdsl] func1 -> DEBU 6901 0xc004338870 gate 1569284839492186500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.492 UTC [cauthdsl] func2 -> DEBU 6902 0xc004338870 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-09-24 00:27:19.492 UTC [cauthdsl] func2 -> DEBU 6903 0xc004338870 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.492 UTC [cauthdsl] func2 -> DEBU 6904 0xc004338870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-09-24 00:27:19.495 UTC [cauthdsl] func2 -> DEBU 6905 0xc004338870 processing identity 1 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.496 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6906 Checking if identity satisfies ADMIN role for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.498 UTC [cauthdsl] func2 -> DEBU 6907 0xc004338870 principal matched by identity 1" +peer0.org1.example.com | "2019-09-24 00:27:19.498 UTC [msp.identity] Verify -> DEBU 6908 Verify: digest = 00000000 b9 ca 25 b9 18 4b 4c cb f9 ed 69 2e e4 b0 01 32 |..%..KL...i....2| +peer0.org1.example.com | 00000010 7e d5 0e 8f db 9c d1 12 47 66 47 e2 f9 42 f2 92 |~.......GfG..B..|" +peer0.org1.example.com | "2019-09-24 00:27:19.499 UTC [msp.identity] Verify -> DEBU 6909 Verify: sig = 00000000 30 44 02 20 6f 93 cb 0e 30 b4 01 2a 3e 5c 70 08 |0D. o...0..*>\p.| +peer0.org1.example.com | 00000010 f4 b3 a7 c6 8d d3 d2 16 33 9b 93 be 91 8a 0e 0a |........3.......| +peer0.org1.example.com | 00000020 14 03 96 82 02 20 25 f6 18 45 c0 ea 93 0a be f5 |..... %..E......| +peer0.org1.example.com | 00000030 1d 09 80 60 65 19 94 68 46 86 00 e0 07 4b 6c 2e |...`e..hF....Kl.| +peer0.org1.example.com | 00000040 99 b4 f8 c0 85 d3 |......|" +peer0.org1.example.com | "2019-09-24 00:27:19.503 UTC [cauthdsl] func2 -> DEBU 690a 0xc004338870 principal evaluation succeeds for identity 1" +peer0.org1.example.com | "2019-09-24 00:27:19.506 UTC [cauthdsl] func1 -> DEBU 690b 0xc004338870 gate 1569284839492186500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.509 UTC [policies] Evaluate -> DEBU 690c Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.509 UTC [policies] Evaluate -> DEBU 690d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.513 UTC [policies] Evaluate -> DEBU 690e Signature set satisfies policy /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.513 UTC [policies] Evaluate -> DEBU 690f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.513 UTC [common.configtx] verifyDeltaSet -> DEBU 6910 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.514 UTC [common.configtx] verifyDeltaSet -> DEBU 6911 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:27:19.514 UTC [common.configtx] verifyDeltaSet -> DEBU 6912 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.514 UTC [common.configtx] verifyDeltaSet -> DEBU 6913 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.520 UTC [common.configtx] recurseConfigMap -> DEBU 6914 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.520 UTC [common.configtx] recurseConfigMap -> DEBU 6915 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.523 UTC [common.configtx] recurseConfigMap -> DEBU 6916 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 6917 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 6918 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.529 UTC [common.configtx] recurseConfigMap -> DEBU 6919 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.529 UTC [common.configtx] recurseConfigMap -> DEBU 691a Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.529 UTC [common.configtx] recurseConfigMap -> DEBU 691b Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.530 UTC [comm.grpc.server] 1 -> INFO 691c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.53Z grpc.peer_address=172.18.0.5:49542 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=206.4µs +peer0.org1.example.com | "2019-09-24 00:27:19.534 UTC [msp] GetDefaultSigningIdentity -> DEBU 691d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.535 UTC [msp.identity] Sign -> DEBU 691e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:27:19.535 UTC [msp.identity] Sign -> DEBU 6920 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:27:19.535 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6921 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:49542" +peer0.org1.example.com | "2019-09-24 00:27:19.535 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6922 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49542" +peer0.org1.example.com | "2019-09-24 00:27:19.536 UTC [msp.identity] Verify -> DEBU 6923 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-09-24 00:27:19.534 UTC [common.configtx] recurseConfigMap -> DEBU 691f Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.536 UTC [msp.identity] Verify -> DEBU 6924 Verify: sig = 00000000 30 44 02 20 0d 3a a3 aa 84 53 7f bb a5 f5 77 23 |0D. .:...S....w#| +peer0.org1.example.com | 00000010 a7 cb 7d 21 48 c4 aa 68 2c fc 70 98 9c 49 01 54 |..}!H..h,.p..I.T| +peer0.org1.example.com | 00000020 43 97 57 49 02 20 50 7d 30 1e fb d1 10 5d 88 f6 |C.WI. P}0....]..| +peer0.org1.example.com | 00000030 34 3f 02 4c a1 fc bd 48 c5 48 e8 52 03 d6 e7 90 |4?.L...H.H.R....| +peer0.org1.example.com | 00000040 0e ca f9 33 01 2c |...3.,|" +peer0.org1.example.com | "2019-09-24 00:27:19.537 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6926 Authenticated 172.18.0.5:49542" +peer0.org1.example.com | "2019-09-24 00:27:19.537 UTC [gossip.comm] GossipStream -> DEBU 6927 Servicing 172.18.0.5:49542" +peer0.org1.example.com | "2019-09-24 00:27:19.536 UTC [common.configtx] recurseConfigMap -> DEBU 6925 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.537 UTC [common.configtx] recurseConfigMap -> DEBU 6928 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.537 UTC [common.configtx] recurseConfigMap -> DEBU 6929 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.538 UTC [common.configtx] recurseConfigMap -> DEBU 692a Setting policy for key LifecycleEndorsement to " +peer0.org1.example.com | "2019-09-24 00:27:19.538 UTC [common.configtx] recurseConfigMap -> DEBU 692b Setting policy for key Readers to " +peer0.org1.example.com | "2019-09-24 00:27:19.538 UTC [common.configtx] recurseConfigMap -> DEBU 692c Setting policy for key Writers to " +peer0.org1.example.com | "2019-09-24 00:27:19.538 UTC [common.configtx] recurseConfigMap -> DEBU 692d Setting policy for key Admins to " +peer0.org1.example.com | "2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 692e Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 692f Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 6930 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 6931 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 6932 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 6933 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.540 UTC [common.configtx] recurseConfigMap -> DEBU 6934 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.540 UTC [common.configtx] recurseConfigMap -> DEBU 6935 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.540 UTC [common.configtx] recurseConfigMap -> DEBU 6936 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.540 UTC [common.configtx] recurseConfigMap -> DEBU 6937 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.540 UTC [common.configtx] recurseConfigMap -> DEBU 6938 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 00:27:19.540 UTC [common.channelconfig] NewStandardValues -> DEBU 6939 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-09-24 00:27:19.541 UTC [common.channelconfig] initializeProtosStruct -> DEBU 693a Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 00:27:19.541 UTC [common.channelconfig] initializeProtosStruct -> DEBU 693b Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 00:27:19.541 UTC [common.channelconfig] initializeProtosStruct -> DEBU 693c Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-09-24 00:27:19.541 UTC [common.channelconfig] initializeProtosStruct -> DEBU 693d Processing field: Consortium" +peer0.org1.example.com | "2019-09-24 00:27:19.541 UTC [common.channelconfig] initializeProtosStruct -> DEBU 693e Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:27:19.541 UTC [gossip.comm] serviceConnection -> DEBU 693f Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:27:19.542 UTC [gossip.comm] writeToStream -> DEBU 6942 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:27:19.541 UTC [grpc] infof -> DEBU 6940 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:19.542 UTC [gossip.comm] readFromStream -> DEBU 6941 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +peer0.org1.example.com | "2019-09-24 00:27:19.543 UTC [common.channelconfig] NewStandardValues -> DEBU 6943 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-09-24 00:27:19.543 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6944 Processing field: ConsensusType" +peer0.org1.example.com | "2019-09-24 00:27:19.543 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6945 Processing field: BatchSize" +peer0.org1.example.com | "2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6946 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6947 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6948 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6949 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:27:19.544 UTC [common.channelconfig] NewStandardValues -> DEBU 694a Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 694b Processing field: Endpoints" +peer0.org1.example.com | "2019-09-24 00:27:19.544 UTC [common.channelconfig] NewStandardValues -> DEBU 694c Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 694d Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.544 UTC [common.channelconfig] validateMSP -> DEBU 694e Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:27:19.545 UTC [msp] newBccspMsp -> DEBU 694f Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:27:19.545 UTC [msp] New -> DEBU 6950 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:27:19.545 UTC [msp] Setup -> DEBU 6951 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-09-24 00:27:19.545 UTC [msp.identity] newIdentity -> DEBU 6952 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:19.546 UTC [msp.identity] newIdentity -> DEBU 6953 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:19.546 UTC [msp] Validate -> DEBU 6954 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:19.548 UTC [common.channelconfig] NewStandardValues -> DEBU 6955 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-09-24 00:27:19.548 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6956 Processing field: ACLs" +peer0.org1.example.com | "2019-09-24 00:27:19.548 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6957 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 00:27:19.548 UTC [common.channelconfig] NewStandardValues -> DEBU 6958 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 00:27:19.548 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6959 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:27:19.548 UTC [common.channelconfig] NewStandardValues -> DEBU 695a Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:27:19.548 UTC [common.channelconfig] initializeProtosStruct -> DEBU 695b Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.549 UTC [gossip.comm] readFromStream -> DEBU 695c Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 00:27:19.549 UTC [gossip.comm] func2 -> DEBU 695d Client 172.18.0.5:49542 disconnected" +peer0.org1.example.com | "2019-09-24 00:27:19.549 UTC [comm.grpc.server] 1 -> INFO 695e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:27:29.534Z grpc.peer_address=172.18.0.5:49542 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.6181ms +peer0.org1.example.com | "2019-09-24 00:27:19.549 UTC [common.channelconfig] Validate -> DEBU 695f Anchor peers for org Org3MSP are " +peer0.org1.example.com | "2019-09-24 00:27:19.549 UTC [gossip.comm] writeToStream -> DEBU 6961 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:27:19.549 UTC [common.channelconfig] validateMSP -> DEBU 6962 Setting up MSP for org Org3MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.549 UTC [msp] newBccspMsp -> DEBU 6963 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:27:19.549 UTC [grpc] infof -> DEBU 6960 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:19.549 UTC [msp] New -> DEBU 6964 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:27:19.550 UTC [msp] Setup -> DEBU 6965 Setting up MSP instance Org3MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.550 UTC [msp.identity] newIdentity -> DEBU 6966 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +peer0.org1.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +peer0.org1.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:19.553 UTC [msp.identity] newIdentity -> DEBU 6967 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +peer0.org1.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +peer0.org1.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +peer0.org1.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +peer0.org1.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:19.554 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6968 Checking if identity satisfies role [CLIENT] for Org3MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.555 UTC [msp] Validate -> DEBU 6969 MSP Org3MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:19.556 UTC [msp] getCertificationChain -> DEBU 696a MSP Org3MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:19.562 UTC [msp] hasOURole -> DEBU 696b MSP Org3MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 00:27:19.562 UTC [msp] getCertificationChain -> DEBU 696c MSP Org3MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:19.562 UTC [common.channelconfig] NewStandardValues -> DEBU 696d Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 00:27:19.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 696e Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:27:19.563 UTC [common.channelconfig] NewStandardValues -> DEBU 696f Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:27:19.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6970 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.563 UTC [common.channelconfig] Validate -> DEBU 6971 Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-09-24 00:27:19.564 UTC [common.channelconfig] validateMSP -> DEBU 6972 Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.564 UTC [msp] newBccspMsp -> DEBU 6973 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:27:19.565 UTC [msp] New -> DEBU 6974 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:27:19.565 UTC [msp] Setup -> DEBU 6975 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.565 UTC [msp.identity] newIdentity -> DEBU 6976 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:19.566 UTC [msp.identity] newIdentity -> DEBU 6977 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:19.566 UTC [msp] GetDefaultSigningIdentity -> DEBU 6978 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.566 UTC [msp.identity] Sign -> DEBU 6979 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151051 " +peer0.org1.example.com | "2019-09-24 00:27:19.566 UTC [msp.identity] Sign -> DEBU 697a Sign: digest: E55189DBF6E36C206CDDA03E8A16C65F9BA2B1BE5AFC4DF7931EF55022282744 " +peer0.org1.example.com | "2019-09-24 00:27:19.567 UTC [msp] GetDefaultSigningIdentity -> DEBU 697b Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.567 UTC [msp.identity] Sign -> DEBU 697c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:19.567 UTC [msp.identity] Sign -> DEBU 697d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:19.567 UTC [gossip.discovery] periodicalSendAlive -> DEBU 697e Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:27:19.568 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 697f Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.568 UTC [msp] Validate -> DEBU 6980 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:19.568 UTC [msp] getCertificationChain -> DEBU 6981 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:19.568 UTC [msp] hasOURole -> DEBU 6982 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 00:27:19.569 UTC [msp] getCertificationChain -> DEBU 6983 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:19.569 UTC [common.channelconfig] NewStandardValues -> DEBU 6984 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 00:27:19.569 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6985 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:27:19.569 UTC [common.channelconfig] NewStandardValues -> DEBU 6986 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 00:27:19.569 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6987 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.570 UTC [common.channelconfig] Validate -> DEBU 6988 Anchor peers for org Org2MSP are anchor_peers: " +peer0.org1.example.com | "2019-09-24 00:27:19.572 UTC [common.channelconfig] validateMSP -> DEBU 698a Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.573 UTC [msp] newBccspMsp -> DEBU 698b Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 00:27:19.572 UTC [msp] DeserializeIdentity -> DEBU 6989 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.573 UTC [msp] DeserializeIdentity -> DEBU 698c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.573 UTC [msp] DeserializeIdentity -> DEBU 698d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.574 UTC [gossip.comm] Send -> DEBU 698e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.574 UTC [msp] DeserializeIdentity -> DEBU 698f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.574 UTC [gossip.comm] Send -> DEBU 6990 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.575 UTC [gossip.comm] Send -> DEBU 6991 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.575 UTC [gossip.comm] sendToEndpoint -> DEBU 6992 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.575 UTC [gossip.comm] createConnection -> DEBU 6993 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:19.581 UTC [grpc] DialContext -> DEBU 6994 parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:27:19.581 UTC [grpc] DialContext -> DEBU 6995 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:27:19.582 UTC [grpc] watcher -> DEBU 6996 ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 00:27:19.582 UTC [grpc] switchBalancer -> DEBU 6997 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:27:19.582 UTC [grpc] HandleSubConnStateChange -> DEBU 6998 pickfirstBalancer: HandleSubConnStateChange: 0xc00445dc30, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:27:19.583 UTC [gossip.comm] sendToEndpoint -> DEBU 6999 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.583 UTC [gossip.comm] sendToEndpoint -> DEBU 699a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.583 UTC [gossip.comm] sendToEndpoint -> DEBU 699b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.583 UTC [gossip.comm] sendToEndpoint -> DEBU 699c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.573 UTC [msp] New -> DEBU 699d Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 00:27:19.585 UTC [msp] Setup -> DEBU 699e Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.585 UTC [msp.identity] newIdentity -> DEBU 699f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:19.586 UTC [msp.identity] newIdentity -> DEBU 69a0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:19.586 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 69a1 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.586 UTC [msp] Validate -> DEBU 69a2 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:19.586 UTC [msp] getCertificationChain -> DEBU 69a3 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:19.587 UTC [msp] hasOURole -> DEBU 69a4 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 00:27:19.587 UTC [msp] getCertificationChain -> DEBU 69a5 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:19.587 UTC [msp] Setup -> DEBU 69a6 Setting up the MSP manager (4 msps)" +peer0.org1.example.com | "2019-09-24 00:27:19.587 UTC [msp] Setup -> DEBU 69a7 MSP manager setup complete, setup 4 msps" +peer0.org1.example.com | "2019-09-24 00:27:19.587 UTC [policies] NewManagerImpl -> DEBU 69a8 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:27:19.587 UTC [policies] NewManagerImpl -> DEBU 69a9 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:27:19.587 UTC [policies] NewManagerImpl -> DEBU 69aa Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69ab Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69ac Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69ad Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69ae Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69af Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69b0 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69b1 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b2 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b3 Proposed new policy Admins for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b4 Proposed new policy Endorsement for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b5 Proposed new policy Readers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b6 Proposed new policy Writers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b7 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.590 UTC [policies] NewManagerImpl -> DEBU 69b8 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.590 UTC [policies] NewManagerImpl -> DEBU 69b9 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.590 UTC [policies] NewManagerImpl -> DEBU 69ba Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69bb Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69bc Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69bd Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69be Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69bf Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69c0 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-09-24 00:27:19.594 UTC [policies] NewManagerImpl -> DEBU 69c1 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-09-24 00:27:19.594 UTC [policies] NewManagerImpl -> DEBU 69c2 Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-09-24 00:27:19.594 UTC [common.configtx] addToMap -> DEBU 69c3 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 00:27:19.594 UTC [common.configtx] addToMap -> DEBU 69c4 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-09-24 00:27:19.595 UTC [common.configtx] addToMap -> DEBU 69c5 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:27:19.595 UTC [common.configtx] addToMap -> DEBU 69c6 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.595 UTC [common.configtx] addToMap -> DEBU 69c7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.595 UTC [common.configtx] addToMap -> DEBU 69c8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.596 UTC [common.configtx] addToMap -> DEBU 69c9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.596 UTC [common.configtx] addToMap -> DEBU 69ca Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-09-24 00:27:19.597 UTC [common.configtx] addToMap -> DEBU 69cb Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-09-24 00:27:19.598 UTC [common.configtx] addToMap -> DEBU 69cc Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 00:27:19.598 UTC [common.configtx] addToMap -> DEBU 69cd Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-09-24 00:27:19.598 UTC [common.configtx] addToMap -> DEBU 69ce Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-09-24 00:27:19.598 UTC [common.configtx] addToMap -> DEBU 69cf Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 00:27:19.599 UTC [common.configtx] addToMap -> DEBU 69d0 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.599 UTC [common.configtx] addToMap -> DEBU 69d1 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.599 UTC [common.configtx] addToMap -> DEBU 69d2 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.600 UTC [common.configtx] addToMap -> DEBU 69d3 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 00:27:19.600 UTC [common.configtx] addToMap -> DEBU 69d4 Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.601 UTC [common.configtx] addToMap -> DEBU 69d5 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.601 UTC [common.configtx] addToMap -> DEBU 69d6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.601 UTC [common.configtx] addToMap -> DEBU 69d7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:27:19.601 UTC [common.configtx] addToMap -> DEBU 69d8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.601 UTC [gossip.comm] func1 -> DEBU 69d9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.615 UTC [gossip.gossip] handleMessage -> DEBU 69db Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.615 UTC [gossip.gossip] handleMessage -> DEBU 69dc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.615 UTC [common.configtx] addToMap -> DEBU 69dd Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.616 UTC [gossip.discovery] handleMsgFromComm -> DEBU 69de Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.616 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 69df Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:19.616 UTC [common.configtx] addToMap -> DEBU 69e0 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.617 UTC [msp.identity] Verify -> DEBU 69e1 Verify: digest = 00000000 e5 51 89 db f6 e3 6c 20 6c dd a0 3e 8a 16 c6 5f |.Q....l l..>..._| +peer0.org1.example.com | 00000010 9b a2 b1 be 5a fc 4d f7 93 1e f5 50 22 28 27 44 |....Z.M....P"('D|" +peer0.org1.example.com | "2019-09-24 00:27:19.617 UTC [msp.identity] Verify -> DEBU 69e2 Verify: sig = 00000000 30 45 02 21 00 9f cd 26 45 12 4f e0 0a 80 c2 c2 |0E.!...&E.O.....| +peer0.org1.example.com | 00000010 2f e2 0a c3 fc 37 47 49 51 bf 9c b6 52 10 86 e1 |/....7GIQ...R...| +peer0.org1.example.com | 00000020 7a 59 09 0d 3c 02 20 5a a6 5d a0 67 8f af 96 b4 |zY..<. Z.].g....| +peer0.org1.example.com | 00000030 24 f5 c0 15 c9 00 80 2a 29 be 45 b0 22 ac 33 2c |$......*).E.".3,| +peer0.org1.example.com | 00000040 b7 ac 38 24 09 0b 5f |..8$.._|" +peer0.org1.example.com | "2019-09-24 00:27:19.617 UTC [gossip.discovery] isSentByMe -> DEBU 69e3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.617 UTC [common.configtx] addToMap -> DEBU 69e4 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:27:19.618 UTC [common.configtx] addToMap -> DEBU 69e6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.618 UTC [common.configtx] addToMap -> DEBU 69e7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.617 UTC [gossip.discovery] handleMsgFromComm -> DEBU 69e5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.614 UTC [grpc] HandleSubConnStateChange -> DEBU 69da pickfirstBalancer: HandleSubConnStateChange: 0xc00445dc30, READY" +peer0.org1.example.com | "2019-09-24 00:27:19.619 UTC [common.configtx] addToMap -> DEBU 69e8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.619 UTC [common.configtx] addToMap -> DEBU 69e9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:27:19.619 UTC [common.configtx] addToMap -> DEBU 69ea Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.619 UTC [common.configtx] addToMap -> DEBU 69eb Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.619 UTC [common.configtx] addToMap -> DEBU 69ec Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 00:27:19.620 UTC [common.configtx] addToMap -> DEBU 69ed Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.621 UTC [common.configtx] addToMap -> DEBU 69ee Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 00:27:19.621 UTC [common.configtx] addToMap -> DEBU 69ef Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.621 UTC [common.configtx] addToMap -> DEBU 69f0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.622 UTC [common.configtx] addToMap -> DEBU 69f1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.623 UTC [common.configtx] addToMap -> DEBU 69f2 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 00:27:19.623 UTC [common.configtx] addToMap -> DEBU 69f3 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-09-24 00:27:19.623 UTC [common.configtx] addToMap -> DEBU 69f4 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 00:27:19.624 UTC [common.configtx] addToMap -> DEBU 69f5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 00:27:19.624 UTC [common.configtx] addToMap -> DEBU 69f6 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.625 UTC [common.configtx] addToMap -> DEBU 69f7 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.625 UTC [common.configtx] addToMap -> DEBU 69f8 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.626 UTC [common.configtx] addToMap -> DEBU 69f9 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 00:27:19.626 UTC [common.configtx] addToMap -> DEBU 69fa Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 00:27:19.626 UTC [common.configtx] addToMap -> DEBU 69fb Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-09-24 00:27:19.626 UTC [common.configtx] addToMap -> DEBU 69fc Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-09-24 00:27:19.627 UTC [common.configtx] addToMap -> DEBU 69fd Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-09-24 00:27:19.627 UTC [common.configtx] addToMap -> DEBU 69fe Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-09-24 00:27:19.627 UTC [common.configtx] addToMap -> DEBU 69ff Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.628 UTC [common.configtx] addToMap -> DEBU 6a00 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-09-24 00:27:19.628 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a01 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-09-24 00:27:19.628 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a02 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-09-24 00:27:19.628 UTC [policies] Manager -> DEBU 6a03 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 00:27:19.628 UTC [policies] Manager -> DEBU 6a04 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:27:19.629 UTC [policies] Manager -> DEBU 6a05 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:27:19.629 UTC [policies] Manager -> DEBU 6a06 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 00:27:19.629 UTC [policies] Manager -> DEBU 6a07 Manager Channel/Application has managers Org3MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.629 UTC [policies] Manager -> DEBU 6a08 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.629 UTC [policies] Manager -> DEBU 6a09 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.630 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a0a As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-09-24 00:27:19.630 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a0b As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-09-24 00:27:19.630 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a0c As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-09-24 00:27:19.631 UTC [policies] Manager -> DEBU 6a0d Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-09-24 00:27:19.631 UTC [policies] Manager -> DEBU 6a0e Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 00:27:19.632 UTC [policies] Manager -> DEBU 6a0f Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 00:27:19.632 UTC [policies] Manager -> DEBU 6a10 Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-09-24 00:27:19.632 UTC [policies] Manager -> DEBU 6a11 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-09-24 00:27:19.633 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a12 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-09-24 00:27:19.633 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a13 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | "2019-09-24 00:27:19.634 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a14 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | "2019-09-24 00:27:19.634 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a15 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-09-24 00:27:19.634 UTC [common.capabilities] Supported -> DEBU 6a16 Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 00:27:19.635 UTC [common.capabilities] Supported -> DEBU 6a17 Channel capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 00:27:19.636 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6a18 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:19.636 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6a19 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:19.637 UTC [gossip.service] updateAnchors -> DEBU 6a1a Org3MSP anchor peers: []" +peer0.org1.example.com | "2019-09-24 00:27:19.637 UTC [gossip.service] updateAnchors -> DEBU 6a1b Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-09-24 00:27:19.637 UTC [gossip.service] updateAnchors -> DEBU 6a1c Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +peer0.org1.example.com | "2019-09-24 00:27:19.637 UTC [gossip.service] updateAnchors -> DEBU 6a1d Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:19.638 UTC [msp] DeserializeIdentity -> DEBU 6a1e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.638 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a1f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.639 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a20 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.639 UTC [policies] Evaluate -> DEBU 6a21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.639 UTC [policies] Evaluate -> DEBU 6a22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.640 UTC [policies] Evaluate -> DEBU 6a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.640 UTC [cauthdsl] func1 -> DEBU 6a24 0xc004531f90 gate 1569284839640982100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.641 UTC [cauthdsl] func2 -> DEBU 6a25 0xc004531f90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.642 UTC [cauthdsl] func2 -> DEBU 6a27 0xc004531f90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.642 UTC [cauthdsl] func2 -> DEBU 6a28 0xc004531f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:19.642 UTC [cauthdsl] func2 -> DEBU 6a29 0xc004531f90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:19.643 UTC [cauthdsl] func1 -> DEBU 6a2a 0xc004531f90 gate 1569284839640982100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:19.643 UTC [policies] Evaluate -> DEBU 6a2b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.643 UTC [policies] Evaluate -> DEBU 6a2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.643 UTC [policies] Evaluate -> DEBU 6a2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.643 UTC [cauthdsl] func1 -> DEBU 6a2e 0xc0045407d0 gate 1569284839643822600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.642 UTC [msp] GetDefaultSigningIdentity -> DEBU 6a26 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.644 UTC [cauthdsl] func2 -> DEBU 6a2f 0xc0045407d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.644 UTC [cauthdsl] func2 -> DEBU 6a31 0xc0045407d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.644 UTC [cauthdsl] func2 -> DEBU 6a32 0xc0045407d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.644 UTC [msp.identity] Verify -> DEBU 6a33 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:19.644 UTC [msp.identity] Sign -> DEBU 6a30 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:27:19.644 UTC [msp.identity] Sign -> DEBU 6a34 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:27:19.645 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a35 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.645 UTC [msp.identity] Verify -> DEBU 6a36 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:19.646 UTC [cauthdsl] func2 -> DEBU 6a37 0xc0045407d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.646 UTC [cauthdsl] func1 -> DEBU 6a38 0xc0045407d0 gate 1569284839643822600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.646 UTC [policies] Evaluate -> DEBU 6a39 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.646 UTC [policies] Evaluate -> DEBU 6a3a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.646 UTC [policies] Evaluate -> DEBU 6a3b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.646 UTC [policies] Evaluate -> DEBU 6a3c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.646 UTC [msp] DeserializeIdentity -> DEBU 6a3d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.646 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a3e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.647 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a3f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.647 UTC [policies] Evaluate -> DEBU 6a40 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.647 UTC [policies] Evaluate -> DEBU 6a41 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.647 UTC [policies] Evaluate -> DEBU 6a42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.647 UTC [cauthdsl] func1 -> DEBU 6a43 0xc004550bb0 gate 1569284839647767600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.648 UTC [cauthdsl] func2 -> DEBU 6a44 0xc004550bb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.648 UTC [cauthdsl] func2 -> DEBU 6a45 0xc004550bb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.648 UTC [cauthdsl] func2 -> DEBU 6a46 0xc004550bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:19.648 UTC [cauthdsl] func2 -> DEBU 6a47 0xc004550bb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:19.648 UTC [cauthdsl] func1 -> DEBU 6a48 0xc004550bb0 gate 1569284839647767600 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:19.649 UTC [policies] Evaluate -> DEBU 6a49 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.649 UTC [policies] Evaluate -> DEBU 6a4a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.649 UTC [policies] Evaluate -> DEBU 6a4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.650 UTC [cauthdsl] func1 -> DEBU 6a4c 0xc0045513f0 gate 1569284839649246300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.650 UTC [cauthdsl] func2 -> DEBU 6a4d 0xc0045513f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.650 UTC [cauthdsl] func2 -> DEBU 6a4e 0xc0045513f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.650 UTC [cauthdsl] func2 -> DEBU 6a4f 0xc0045513f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.650 UTC [msp.identity] Verify -> DEBU 6a50 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:19.651 UTC [msp.identity] Verify -> DEBU 6a51 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:19.652 UTC [cauthdsl] func2 -> DEBU 6a52 0xc0045513f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.656 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a53 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.657 UTC [msp.identity] Verify -> DEBU 6a54 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-09-24 00:27:19.658 UTC [msp.identity] Verify -> DEBU 6a55 Verify: sig = 00000000 30 45 02 21 00 95 eb ae e0 bf 29 40 8b 9d e3 db |0E.!......)@....| +peer0.org1.example.com | 00000010 f9 a3 54 95 6a cc 11 d7 aa 3f f7 cc c0 ae 9e 03 |..T.j....?......| +peer0.org1.example.com | 00000020 6b fe 75 e5 22 02 20 0e bd 8d 31 9c ef 23 8b 5c |k.u.". ...1..#.\| +peer0.org1.example.com | 00000030 b0 51 99 bd eb 2e 79 f5 bb e7 d2 d5 e4 af 00 13 |.Q....y.........| +peer0.org1.example.com | 00000040 4f 30 97 b3 b3 9c 9d |O0.....|" +peer0.org1.example.com | "2019-09-24 00:27:19.658 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a56 Authenticated 172.18.0.5:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.659 UTC [gossip.comm] createConnection -> DEBU 6a57 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.659 UTC [gossip.comm] sendToEndpoint -> DEBU 6a58 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.652 UTC [cauthdsl] func1 -> DEBU 6a59 0xc0045513f0 gate 1569284839649246300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.671 UTC [policies] Evaluate -> DEBU 6a5a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.671 UTC [policies] Evaluate -> DEBU 6a5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.671 UTC [policies] Evaluate -> DEBU 6a5c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.672 UTC [policies] Evaluate -> DEBU 6a5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.673 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a5e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.674 UTC [comm.grpc.server] 1 -> INFO 6a5f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.674Z grpc.peer_address=172.18.0.6:43708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=101.8µs +peer0.org1.example.com | "2019-09-24 00:27:19.675 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a60 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.676 UTC [policies] Evaluate -> DEBU 6a61 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.677 UTC [policies] Evaluate -> DEBU 6a62 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.678 UTC [msp] GetDefaultSigningIdentity -> DEBU 6a63 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.678 UTC [msp.identity] Sign -> DEBU 6a64 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:27:19.679 UTC [msp.identity] Sign -> DEBU 6a65 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:27:19.679 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a66 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43708" +peer0.org1.example.com | "2019-09-24 00:27:19.679 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a67 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:43708" +peer0.org1.example.com | "2019-09-24 00:27:19.680 UTC [msp] DeserializeIdentity -> DEBU 6a68 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.680 UTC [policies] Evaluate -> DEBU 6a69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.680 UTC [cauthdsl] func1 -> DEBU 6a6b 0xc0045a43d0 gate 1569284839680950000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.681 UTC [cauthdsl] func2 -> DEBU 6a6c 0xc0045a43d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.682 UTC [cauthdsl] func2 -> DEBU 6a6d 0xc0045a43d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.682 UTC [cauthdsl] func2 -> DEBU 6a6e 0xc0045a43d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.680 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6a6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.682 UTC [msp] DeserializeIdentity -> DEBU 6a6f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.683 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6a70 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.683 UTC [msp] DeserializeIdentity -> DEBU 6a71 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.683 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6a72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.683 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a73 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a74 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.684 UTC [policies] Evaluate -> DEBU 6a75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.684 UTC [policies] Evaluate -> DEBU 6a76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.684 UTC [policies] Evaluate -> DEBU 6a77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.684 UTC [cauthdsl] func1 -> DEBU 6a78 0xc0045c4cd0 gate 1569284839684584800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.684 UTC [cauthdsl] func2 -> DEBU 6a79 0xc0045c4cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.684 UTC [cauthdsl] func2 -> DEBU 6a7a 0xc0045c4cd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.685 UTC [cauthdsl] func2 -> DEBU 6a7b 0xc0045c4cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 00:27:19.685 UTC [cauthdsl] func2 -> DEBU 6a7c 0xc0045c4cd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:19.685 UTC [cauthdsl] func1 -> DEBU 6a7d 0xc0045c4cd0 gate 1569284839684584800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:19.685 UTC [policies] Evaluate -> DEBU 6a7e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.685 UTC [policies] Evaluate -> DEBU 6a7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.685 UTC [policies] Evaluate -> DEBU 6a80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.686 UTC [cauthdsl] func1 -> DEBU 6a81 0xc0045c5510 gate 1569284839686067600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.686 UTC [cauthdsl] func2 -> DEBU 6a82 0xc0045c5510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.686 UTC [cauthdsl] func2 -> DEBU 6a83 0xc0045c5510 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.686 UTC [cauthdsl] func2 -> DEBU 6a84 0xc0045c5510 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.686 UTC [msp.identity] Verify -> DEBU 6a85 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-09-24 00:27:19.686 UTC [msp.identity] Verify -> DEBU 6a86 Verify: sig = 00000000 30 45 02 21 00 da 15 ea d7 7a ff 72 02 b2 d6 13 |0E.!.....z.r....| +peer0.org1.example.com | 00000010 de 7c 82 18 27 04 de 68 17 c1 45 1a 7c da 3e 5c |.|..'..h..E.|.>\| +peer0.org1.example.com | 00000020 ec b7 84 e4 06 02 20 46 6a 4b c9 51 a3 c4 37 fe |...... FjK.Q..7.| +peer0.org1.example.com | 00000030 2b 46 6c 7d b1 64 e5 9c 4e 17 53 b8 85 a7 56 79 |+Fl}.d..N.S...Vy| +peer0.org1.example.com | 00000040 0e 8b ad 3a 13 b7 78 |...:..x|" +peer0.org1.example.com | "2019-09-24 00:27:19.687 UTC [cauthdsl] func2 -> DEBU 6a87 0xc0045c5510 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.687 UTC [cauthdsl] func1 -> DEBU 6a88 0xc0045c5510 gate 1569284839686067600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.687 UTC [policies] Evaluate -> DEBU 6a89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.687 UTC [policies] Evaluate -> DEBU 6a8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.687 UTC [policies] Evaluate -> DEBU 6a8b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.688 UTC [policies] Evaluate -> DEBU 6a8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.688 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a8e Authenticated 172.18.0.6:43708" +peer0.org1.example.com | "2019-09-24 00:27:19.689 UTC [gossip.comm] GossipStream -> DEBU 6a8f Servicing 172.18.0.6:43708" +peer0.org1.example.com | "2019-09-24 00:27:19.689 UTC [gossip.comm] serviceConnection -> DEBU 6a90 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:27:19.682 UTC [msp.identity] Verify -> DEBU 6a8c Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:19.689 UTC [gossip.comm] func2 -> DEBU 6a91 Client 172.18.0.6:43284 disconnected" +peer0.org1.example.com | "2019-09-24 00:27:19.690 UTC [comm.grpc.server] 1 -> INFO 6a94 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:43284 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2m12.0474976s +peer0.org1.example.com | "2019-09-24 00:27:19.689 UTC [gossip.comm] writeToStream -> DEBU 6a93 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:27:19.689 UTC [msp.identity] Verify -> DEBU 6a92 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:19.691 UTC [cauthdsl] func2 -> DEBU 6a95 0xc0045a43d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.692 UTC [cauthdsl] func1 -> DEBU 6a98 0xc0045a43d0 gate 1569284839680950000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.692 UTC [policies] Evaluate -> DEBU 6a99 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.692 UTC [policies] Evaluate -> DEBU 6a9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.692 UTC [policies] Evaluate -> DEBU 6a9b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.693 UTC [policies] Evaluate -> DEBU 6a9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.693 UTC [gossip.gossip] JoinChan -> INFO 6a9d Joining gossip network of channel businesschannel with 3 organizations" +peer0.org1.example.com | "2019-09-24 00:27:19.693 UTC [gossip.gossip] learnAnchorPeers -> INFO 6a9e No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-09-24 00:27:19.693 UTC [gossip.gossip] learnAnchorPeers -> INFO 6a9f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 00:27:19.694 UTC [gossip.gossip] learnAnchorPeers -> INFO 6aa0 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-09-24 00:27:19.694 UTC [gossip.gossip] learnAnchorPeers -> INFO 6aa1 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 00:27:19.694 UTC [gossip.discovery] Connect -> DEBU 6aa2 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +peer0.org1.example.com | "2019-09-24 00:27:19.694 UTC [gossip.discovery] Connect -> DEBU 6aa3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.695 UTC [gossip.service] updateEndpoints -> DEBU 6aa4 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-09-24 00:27:19.695 UTC [msp] DeserializeIdentity -> DEBU 6aa5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6aa6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.696 UTC [msp] DeserializeIdentity -> DEBU 6aa7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6aa8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.697 UTC [peer] updateTrustedRoots -> DEBU 6aa9 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:19.697 UTC [gossip.pull] Hello -> DEBU 6aaa Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.698 UTC [gossip.comm] Send -> DEBU 6aab Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.698 UTC [gossip.pull] Hello -> DEBU 6aac Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.698 UTC [gossip.comm] Send -> DEBU 6aad Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.699 UTC [gossip.pull] Hello -> DEBU 6aae Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.699 UTC [gossip.comm] Send -> DEBU 6aaf Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.699 UTC [gossip.comm] sendToEndpoint -> DEBU 6ab0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.700 UTC [gossip.comm] createConnection -> DEBU 6ab1 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:27:19.712 UTC [grpc] DialContext -> DEBU 6ab2 parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:27:19.715 UTC [grpc] DialContext -> DEBU 6ab3 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:27:19.716 UTC [grpc] watcher -> DEBU 6ab4 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 00:27:19.718 UTC [grpc] switchBalancer -> DEBU 6ab5 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:27:19.718 UTC [grpc] HandleSubConnStateChange -> DEBU 6ab6 pickfirstBalancer: HandleSubConnStateChange: 0xc004614a80, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:27:19.722 UTC [peer] buildTrustedRootsForChain -> DEBU 6ab7 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.722 UTC [peer] buildTrustedRootsForChain -> DEBU 6ab8 adding app root CAs for MSP [Org3MSP]" +peer0.org1.example.com | "2019-09-24 00:27:19.723 UTC [peer] buildTrustedRootsForChain -> DEBU 6ab9 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-09-24 00:27:19.723 UTC [peer] buildTrustedRootsForChain -> DEBU 6aba adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-09-24 00:27:19.724 UTC [peer] buildTrustedRootsForChain -> DEBU 6abb adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-09-24 00:27:19.726 UTC [committer.txvalidator] validateTx -> DEBU 6abc config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:19.726 UTC [committer.txvalidator] validateTx -> DEBU 6abd [businesschannel] validateTx completes for block 0xc0025fdac0 env 0xc004c89680 txn 0" +peer0.org1.example.com | "2019-09-24 00:27:19.727 UTC [committer.txvalidator] Validate -> DEBU 6abe got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 00:27:19.727 UTC [committer.txvalidator] Validate -> INFO 6abf [businesschannel] Validated block [6] in 259ms" +peer0.org1.example.com | "2019-09-24 00:27:19.727 UTC [gossip.privdata] listMissingPrivateData -> DEBU 6ac0 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 00:27:19.731 UTC [gossip.privdata] StoreBlock -> DEBU 6ac1 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 00:27:19.731 UTC [committer] preCommit -> DEBU 6ac2 Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-09-24 00:27:19.732 UTC [kvledger] CommitWithPvtData -> DEBU 6ac3 [businesschannel] Validating state for block [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.737 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 6ac7 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 00:27:19.737 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 6ac8 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 00:27:19.737 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 6ac9 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 00:27:19.737 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 6aca ValidateAndPrepareBatch() for block number = [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.737 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 6acb preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:27:19.738 UTC [valimpl] preprocessProtoBlock -> DEBU 6acc txType=CONFIG" +peer0.org1.example.com | "2019-09-24 00:27:19.738 UTC [valimpl] processNonEndorserTx -> DEBU 6acd Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-09-24 00:27:19.738 UTC [valimpl] processNonEndorserTx -> DEBU 6ace Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-09-24 00:27:19.738 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 6acf constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 00:27:19.738 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 6ad0 constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-09-24 00:27:19.738 UTC [peer] GenerateSimulationResults -> DEBU 6ad1 Processing CONFIG" +peer0.org1.example.com | "2019-09-24 00:27:19.739 UTC [grpc] infof -> DEBU 6ad2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:19.740 UTC [peer] processChannelConfigTx -> DEBU 6ad3 channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-09-24 00:27:19.740 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 6ad4 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 00:27:19.736 UTC [gossip.comm] sendToEndpoint -> DEBU 6ac4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.741 UTC [gossip.comm] sendToEndpoint -> DEBU 6ad5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.691 UTC [gossip.comm] serviceConnection -> DEBU 6a96 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:27:19.741 UTC [gossip.comm] func2 -> DEBU 6ad6 Client 172.18.0.6:43708 disconnected" +peer0.org1.example.com | "2019-09-24 00:27:19.741 UTC [comm.grpc.server] 1 -> INFO 6ad7 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:27:29.676Z grpc.peer_address=172.18.0.6:43708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=63.2377ms +peer0.org1.example.com | "2019-09-24 00:27:19.743 UTC [grpc] DialContext -> DEBU 6ad8 parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:27:19.743 UTC [grpc] DialContext -> DEBU 6adb scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:27:19.743 UTC [lockbasedtxmgr] Done -> DEBU 6ad9 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-09-24 00:27:19.744 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 6adc Block [6] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 00:27:19.744 UTC [valinternal] ApplyWriteSet -> DEBU 6add txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0043cdd00)}" +peer0.org1.example.com | "2019-09-24 00:27:19.744 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 6ade validating rwset..." +peer0.org1.example.com | "2019-09-24 00:27:19.744 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 6adf postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 00:27:19.745 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 6ae0 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 00:27:19.745 UTC [kvledger] CommitWithPvtData -> DEBU 6ae1 [businesschannel] Adding CommitHash to the block [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.745 UTC [kvledger] CommitWithPvtData -> DEBU 6ae2 [businesschannel] Committing block [6] to storage" +peer0.org1.example.com | "2019-09-24 00:27:19.745 UTC [ledgerstorage] CommitWithPvtData -> DEBU 6ae3 Writing block [6] to pvt block store" +peer0.org1.example.com | "2019-09-24 00:27:19.745 UTC [grpc] watcher -> DEBU 6ae4 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 00:27:19.746 UTC [grpc] switchBalancer -> DEBU 6ae5 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:27:19.746 UTC [grpc] HandleSubConnStateChange -> DEBU 6ae6 pickfirstBalancer: HandleSubConnStateChange: 0xc004f9f340, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:27:19.747 UTC [pvtdatastorage] Prepare -> DEBU 6ae7 Saved 0 private data write sets for block [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.755 UTC [fsblkstorage] indexBlock -> DEBU 6ae8 Indexing block [blockNum=6, blockHash=[]byte{0xdc, 0x84, 0x65, 0x18, 0xe3, 0xc4, 0x6b, 0x5f, 0x9e, 0xf2, 0x8f, 0xdd, 0x75, 0x8a, 0x58, 0xc2, 0xd7, 0x72, 0xdd, 0x0, 0xe9, 0x74, 0x6e, 0x75, 0x79, 0xca, 0xe6, 0xc4, 0x97, 0x98, 0x63, 0x3e} txOffsets= +peer0.org1.example.com | txId=82a4197750a6c2e6027683be3495c6368937bcbe60f9626d8b78cceca622c16c locPointer=offset=71, bytesLength=33877 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 00:27:19.755 UTC [fsblkstorage] indexBlock -> DEBU 6ae9 Adding txLoc [fileSuffixNum=0, offset=84156, bytesLength=33877] for tx ID: [82a4197750a6c2e6027683be3495c6368937bcbe60f9626d8b78cceca622c16c] to txid-index" +peer0.org1.example.com | "2019-09-24 00:27:19.756 UTC [fsblkstorage] indexBlock -> DEBU 6aea Adding txLoc [fileSuffixNum=0, offset=84156, bytesLength=33877] for tx number:[0] ID: [82a4197750a6c2e6027683be3495c6368937bcbe60f9626d8b78cceca622c16c] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 00:27:19.756 UTC [comm.grpc.server] 1 -> INFO 6aeb unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.747Z grpc.peer_address=172.18.0.5:49550 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=273.4µs +peer0.org1.example.com | "2019-09-24 00:27:19.758 UTC [fsblkstorage] updateCheckpoint -> DEBU 6aec Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[119005], isChainEmpty=[false], lastBlockNumber=[6]" +peer0.org1.example.com | "2019-09-24 00:27:19.758 UTC [pvtdatastorage] Commit -> DEBU 6aed Committing private data for block [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.765 UTC [pvtdatastorage] Commit -> DEBU 6aee Committed private data for block [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.766 UTC [kvledger] CommitWithPvtData -> DEBU 6aef [businesschannel] Committing block [6] transactions to state database" +peer0.org1.example.com | "2019-09-24 00:27:19.766 UTC [lockbasedtxmgr] Commit -> DEBU 6af0 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 00:27:19.766 UTC [lockbasedtxmgr] Commit -> DEBU 6af1 Committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:27:19.766 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 6af2 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 00:27:19.766 UTC [lockbasedtxmgr] Commit -> DEBU 6af3 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 00:27:19.766 UTC [stateleveldb] ApplyUpdates -> DEBU 6af4 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-09-24 00:27:19.768 UTC [lockbasedtxmgr] Commit -> DEBU 6af5 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 00:27:19.768 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 6af6 Preparing potential purge list working-set for expiringAtBlk [7]" +peer0.org1.example.com | "2019-09-24 00:27:19.768 UTC [leveldbhelper] GetIterator -> DEBU 6af7 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" +peer0.org1.example.com | "2019-09-24 00:27:19.768 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 6af8 No expiry entry found for expiringAtBlk [7]" +peer0.org1.example.com | "2019-09-24 00:27:19.769 UTC [lockbasedtxmgr] func1 -> DEBU 6af9 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 00:27:19.769 UTC [kvledger] CommitWithPvtData -> DEBU 6afa [businesschannel] Committing block [6] transactions to history database" +peer0.org1.example.com | "2019-09-24 00:27:19.769 UTC [historyleveldb] Commit -> DEBU 6afb Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" +peer0.org1.example.com | "2019-09-24 00:27:19.769 UTC [historyleveldb] Commit -> DEBU 6afc Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-09-24 00:27:19.771 UTC [historyleveldb] Commit -> DEBU 6afd Channel [businesschannel]: Updates committed to history database for blockNo [6]" +peer0.org1.example.com | "2019-09-24 00:27:19.771 UTC [kvledger] CommitWithPvtData -> INFO 6afe [businesschannel] Committed block [6] with 1 transaction(s) in 38ms (state_validation=12ms block_and_pvtdata_commit=20ms state_commit=3ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer0.org1.example.com | "2019-09-24 00:27:19.771 UTC [msp] GetDefaultSigningIdentity -> DEBU 6aff Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.771 UTC [msp.identity] Sign -> DEBU 6b00 Sign: plaintext: 18057A6C1214089096D4ACDE83CEE315...08071A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-09-24 00:27:19.771 UTC [msp.identity] Sign -> DEBU 6b01 Sign: digest: ACEDEC46F0B6097A2D753575B56EC934A56BAC979FDF348A84C98BAF1BE5CD8E " +peer0.org1.example.com | "2019-09-24 00:27:19.771 UTC [gossip.state] commitBlock -> DEBU 6b02 [businesschannel] Committed block [6] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 00:27:19.737 UTC [gossip.comm] readFromStream -> DEBU 6ac6 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-09-24 00:27:19.736 UTC [gossip.comm] sendToEndpoint -> DEBU 6ac5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.772 UTC [gossip.comm] sendToEndpoint -> DEBU 6b03 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.691 UTC [gossip.comm] readFromStream -> DEBU 6a97 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-09-24 00:27:19.743 UTC [gossip.comm] writeToStream -> DEBU 6ada Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:27:19.775 UTC [grpc] HandleSubConnStateChange -> DEBU 6b04 pickfirstBalancer: HandleSubConnStateChange: 0xc004f9f340, READY" +peer0.org1.example.com | "2019-09-24 00:27:19.776 UTC [grpc] HandleSubConnStateChange -> DEBU 6b05 pickfirstBalancer: HandleSubConnStateChange: 0xc004614a80, READY" +peer0.org1.example.com | "2019-09-24 00:27:19.778 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b06 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.778 UTC [msp.identity] Sign -> DEBU 6b07 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:27:19.778 UTC [msp.identity] Sign -> DEBU 6b08 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:27:19.779 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b09 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:49550" +peer0.org1.example.com | "2019-09-24 00:27:19.779 UTC [gossip.comm] func1 -> DEBU 6b0a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.779 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b0b Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49550" +peer0.org1.example.com | "2019-09-24 00:27:19.779 UTC [gossip.gossip] handleMessage -> DEBU 6b0c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.780 UTC [gossip.pull] HandleMessage -> DEBU 6b0d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.780 UTC [gossip.gossip] handleMessage -> DEBU 6b0e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.780 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b0f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.781 UTC [msp.identity] Sign -> DEBU 6b10 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:27:19.781 UTC [msp.identity] Sign -> DEBU 6b11 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:27:19.781 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b12 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.781 UTC [gossip.comm] func1 -> DEBU 6b13 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.782 UTC [gossip.gossip] handleMessage -> DEBU 6b14 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.782 UTC [gossip.pull] HandleMessage -> DEBU 6b15 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.783 UTC [msp.identity] Verify -> DEBU 6b16 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-09-24 00:27:19.783 UTC [msp.identity] Verify -> DEBU 6b17 Verify: sig = 00000000 30 44 02 20 1f c7 03 6b 7c 3b 71 fa ca bf 22 39 |0D. ...k|;q..."9| +peer0.org1.example.com | 00000010 a6 c4 37 9f a7 bc 48 bb 63 a2 5c d0 19 25 f0 2e |..7...H.c.\..%..| +peer0.org1.example.com | 00000020 ed 36 d3 f6 02 20 12 91 43 02 8f 5a 2f ac 1f 7e |.6... ..C..Z/..~| +peer0.org1.example.com | 00000030 ae 02 6d f9 c8 a1 63 e2 64 b9 dd 34 21 d2 f1 ce |..m...c.d..4!...| +peer0.org1.example.com | 00000040 c6 90 9a 6f dd ab |...o..|" +peer0.org1.example.com | "2019-09-24 00:27:19.784 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b18 Authenticated 172.18.0.5:49550" +peer0.org1.example.com | "2019-09-24 00:27:19.784 UTC [gossip.comm] GossipStream -> DEBU 6b19 Servicing 172.18.0.5:49550" +peer0.org1.example.com | "2019-09-24 00:27:19.785 UTC [gossip.comm] writeToStream -> DEBU 6b1a Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:27:19.785 UTC [gossip.comm] serviceConnection -> DEBU 6b1b Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:27:19.787 UTC [gossip.comm] readFromStream -> DEBU 6b1c a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +peer0.org1.example.com | "2019-09-24 00:27:19.787 UTC [grpc] infof -> DEBU 6b1d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:19.787 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b1e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.788 UTC [msp.identity] Sign -> DEBU 6b1f Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:27:19.788 UTC [msp.identity] Sign -> DEBU 6b20 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:27:19.788 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b21 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.788 UTC [grpc] infof -> DEBU 6b22 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:19.788 UTC [gossip.gossip] handleMessage -> DEBU 6b23 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.788 UTC [gossip.comm] readFromStream -> DEBU 6b24 Got error, aborting: EOF" +peer0.org1.example.com | "2019-09-24 00:27:19.789 UTC [comm.grpc.server] 1 -> INFO 6b25 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.789Z grpc.peer_address=172.18.0.8:35024 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=86.2µs +peer0.org1.example.com | "2019-09-24 00:27:19.789 UTC [gossip.comm] func2 -> DEBU 6b26 Client 172.18.0.5:49550 disconnected" +peer0.org1.example.com | "2019-09-24 00:27:19.790 UTC [comm.grpc.server] 1 -> INFO 6b27 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:49550 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=11.9635ms +peer0.org1.example.com | "2019-09-24 00:27:19.790 UTC [gossip.comm] writeToStream -> DEBU 6b28 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:27:19.792 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b29 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.792 UTC [msp.identity] Sign -> DEBU 6b2a Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:27:19.792 UTC [msp.identity] Sign -> DEBU 6b2b Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:27:19.793 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b2c Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:35024" +peer0.org1.example.com | "2019-09-24 00:27:19.793 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b2d Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:35024" +peer0.org1.example.com | "2019-09-24 00:27:19.793 UTC [msp] DeserializeIdentity -> DEBU 6b2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.793 UTC [msp] DeserializeIdentity -> DEBU 6b2f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.794 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b30 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.794 UTC [msp] DeserializeIdentity -> DEBU 6b31 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.795 UTC [msp.identity] newIdentity -> DEBU 6b32 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:19.794 UTC [msp] DeserializeIdentity -> DEBU 6b33 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.796 UTC [msp] Validate -> DEBU 6b34 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:19.796 UTC [msp.identity] newIdentity -> DEBU 6b35 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:19.797 UTC [msp] Validate -> DEBU 6b36 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:19.797 UTC [msp] getCertificationChain -> DEBU 6b37 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:19.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b38 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.798 UTC [msp] DeserializeIdentity -> DEBU 6b39 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.798 UTC [msp] getCertificationChain -> DEBU 6b3a MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:19.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.799 UTC [msp] DeserializeIdentity -> DEBU 6b3c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b3d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.799 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b3e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.799 UTC [msp] DeserializeIdentity -> DEBU 6b3f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.799 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b41 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.799 UTC [msp] DeserializeIdentity -> DEBU 6b42 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b43 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.800 UTC [policies] Evaluate -> DEBU 6b44 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.800 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b45 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b47 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b48 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.803 UTC [gossip.comm] func1 -> DEBU 6b49 Got message: GossipMessage: nonce:3586135780412397846 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.803 UTC [gossip.gossip] handleMessage -> DEBU 6b4a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:3586135780412397846 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.803 UTC [policies] Evaluate -> DEBU 6b4b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.803 UTC [policies] Evaluate -> DEBU 6b4c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.803 UTC [policies] Evaluate -> DEBU 6b4d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.803 UTC [cauthdsl] func1 -> DEBU 6b4e 0xc0048c3cd0 gate 1569284839803761200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.803 UTC [gossip.gossip] handleMessage -> DEBU 6b4f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.803 UTC [cauthdsl] func2 -> DEBU 6b50 0xc0048c3cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.804 UTC [cauthdsl] func2 -> DEBU 6b51 0xc0048c3cd0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.804 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6b52 Got message: GossipMessage: nonce:3586135780412397846 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.804 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6b53 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:19.804 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6b54 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.804 UTC [msp] Validate -> DEBU 6b55 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:19.804 UTC [msp] DeserializeIdentity -> DEBU 6b56 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.805 UTC [msp] getCertificationChain -> DEBU 6b57 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:19.805 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b58 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.805 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b59 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.805 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b5a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.805 UTC [policies] Evaluate -> DEBU 6b5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.806 UTC [policies] Evaluate -> DEBU 6b5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.806 UTC [policies] Evaluate -> DEBU 6b5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.806 UTC [cauthdsl] func1 -> DEBU 6b5f 0xc0048e5350 gate 1569284839806179900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.806 UTC [grpc] infof -> DEBU 6b60 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:19.806 UTC [cauthdsl] func2 -> DEBU 6b61 0xc0048e5350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.806 UTC [cauthdsl] func2 -> DEBU 6b62 0xc0048e5350 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.807 UTC [grpc] infof -> DEBU 6b63 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:19.807 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b64 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.807 UTC [msp] DeserializeIdentity -> DEBU 6b65 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.808 UTC [msp] DeserializeIdentity -> DEBU 6b67 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.808 UTC [msp] DeserializeIdentity -> DEBU 6b69 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.809 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b6b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.809 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b6c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.809 UTC [policies] Evaluate -> DEBU 6b6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.809 UTC [policies] Evaluate -> DEBU 6b6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.809 UTC [policies] Evaluate -> DEBU 6b6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.809 UTC [cauthdsl] func1 -> DEBU 6b70 0xc00490e050 gate 1569284839809531500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.809 UTC [cauthdsl] func2 -> DEBU 6b71 0xc00490e050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.809 UTC [cauthdsl] func2 -> DEBU 6b72 0xc00490e050 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.809 UTC [cauthdsl] func2 -> DEBU 6b73 0xc00490e050 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.809 UTC [msp.identity] Verify -> DEBU 6b74 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-09-24 00:27:19.809 UTC [msp.identity] Verify -> DEBU 6b75 Verify: sig = 00000000 30 45 02 21 00 b1 90 58 f7 87 f1 97 08 2a 66 66 |0E.!...X.....*ff| +peer0.org1.example.com | 00000010 54 d2 83 c0 03 5f a9 4a 09 93 ee 6c 45 e5 d6 b3 |T...._.J...lE...| +peer0.org1.example.com | 00000020 75 5f 7a 3a 3d 02 20 05 ac 2a 73 50 ab b6 17 55 |u_z:=. ..*sP...U| +peer0.org1.example.com | 00000030 30 bb 25 46 06 f1 78 b1 6f 2f a6 98 c3 e5 a4 75 |0.%F..x.o/.....u| +peer0.org1.example.com | 00000040 f7 f8 81 36 8c 0a c8 |...6...|" +peer0.org1.example.com | "2019-09-24 00:27:19.810 UTC [cauthdsl] func2 -> DEBU 6b76 0xc00490e050 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.810 UTC [cauthdsl] func1 -> DEBU 6b77 0xc00490e050 gate 1569284839809531500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.810 UTC [policies] Evaluate -> DEBU 6b78 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.810 UTC [policies] Evaluate -> DEBU 6b79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.810 UTC [policies] Evaluate -> DEBU 6b7a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.810 UTC [policies] Evaluate -> DEBU 6b7b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.811 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b7c Authenticated 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.811 UTC [gossip.comm] createConnection -> DEBU 6b7d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.811 UTC [gossip.comm] sendToEndpoint -> DEBU 6b7e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.811 UTC [gossip.comm] func1 -> WARN 6b7f peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer0.org1.example.com | "2019-09-24 00:27:19.811 UTC [grpc] infof -> DEBU 6b80 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:19.812 UTC [gossip.discovery] expireDeadMembers -> WARN 6b81 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer0.org1.example.com | "2019-09-24 00:27:19.812 UTC [gossip.discovery] expireDeadMembers -> WARN 6b82 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer0.org1.example.com | "2019-09-24 00:27:19.812 UTC [gossip.comm] CloseConn -> DEBU 6b83 Closing connection for , PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:27:19.812 UTC [gossip.discovery] expireDeadMembers -> WARN 6b84 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.812 UTC [gossip.comm] serviceConnection -> DEBU 6b85 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:27:19.812 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6b86 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 00:27:19.805 UTC [cauthdsl] func2 -> DEBU 6b5c 0xc0048c3cd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.800 UTC [policies] Evaluate -> DEBU 6b46 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.813 UTC [msp] Validate -> DEBU 6b87 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:19.815 UTC [policies] Evaluate -> DEBU 6b88 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.816 UTC [msp] getCertificationChain -> DEBU 6b89 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:19.817 UTC [cauthdsl] func2 -> DEBU 6b8b 0xc0048e5350 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.817 UTC [msp.identity] Verify -> DEBU 6b8c Verify: digest = 00000000 9b 33 ed 8a 9c 60 3f 6f 7a 2d 10 a7 93 c4 9d b0 |.3...`?oz-......| +peer0.org1.example.com | 00000010 61 42 af e8 01 5c 4a b1 aa c0 ae d6 1d ec 00 62 |aB...\J........b|" +peer0.org1.example.com | "2019-09-24 00:27:19.817 UTC [msp.identity] Verify -> DEBU 6b8d Verify: sig = 00000000 30 45 02 21 00 ff 40 e4 be e8 90 e4 c0 99 24 21 |0E.!..@.......$!| +peer0.org1.example.com | 00000010 d9 cf 8f 0e ca e7 7c 8a d2 02 0f 97 cb 04 db fb |......|.........| +peer0.org1.example.com | 00000020 ac 5d 20 a9 60 02 20 64 2f cf a3 27 3d 8a a1 88 |.] .`. d/..'=...| +peer0.org1.example.com | 00000030 17 6d 15 ec ad 16 6b 5d 77 19 4c 04 99 26 d0 cc |.m....k]w.L..&..| +peer0.org1.example.com | 00000040 6d 4c d5 38 b7 e6 b5 |mL.8...|" +peer0.org1.example.com | "2019-09-24 00:27:19.817 UTC [cauthdsl] func2 -> DEBU 6b8e 0xc0048e5350 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.818 UTC [cauthdsl] func1 -> DEBU 6b8f 0xc0048e5350 gate 1569284839806179900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.818 UTC [policies] Evaluate -> DEBU 6b90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.818 UTC [policies] Evaluate -> DEBU 6b91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.818 UTC [policies] Evaluate -> DEBU 6b92 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.818 UTC [policies] Evaluate -> DEBU 6b93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.819 UTC [gossip.discovery] handleAliveMessage -> DEBU 6b94 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.819 UTC [gossip.discovery] learnExistingMembers -> DEBU 6b95 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:19.819 UTC [gossip.discovery] learnExistingMembers -> DEBU 6b96 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:19.819 UTC [gossip.discovery] learnExistingMembers -> DEBU 6b97 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:19.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 6b98 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:19.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 6b99 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.820 UTC [gossip.discovery] handleAliveMessage -> DEBU 6b9a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.820 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6b9b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.820 UTC [gossip.discovery] sendMemResponse -> DEBU 6b9c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:27:19.820 UTC [msp] DeserializeIdentity -> DEBU 6b9d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.821 UTC [msp] DeserializeIdentity -> DEBU 6b9e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.821 UTC [msp] DeserializeIdentity -> DEBU 6b9f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.821 UTC [gossip.comm] Send -> DEBU 6ba0 Entering, sending GossipMessage: Channel: , nonce: 3586135780412397846, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.821 UTC [gossip.discovery] sendMemResponse -> DEBU 6ba1 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" > alive: alive: dead: " +peer0.org1.example.com | "2019-09-24 00:27:19.821 UTC [gossip.comm] sendToEndpoint -> DEBU 6ba2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3586135780412397846, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 657 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.822 UTC [gossip.comm] sendToEndpoint -> DEBU 6ba3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.816 UTC [cauthdsl] func1 -> DEBU 6b8a 0xc00490f740 gate 1569284839816708300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.822 UTC [cauthdsl] func2 -> DEBU 6ba4 0xc00490f740 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.822 UTC [cauthdsl] func2 -> DEBU 6ba5 0xc00490f740 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.822 UTC [cauthdsl] func2 -> DEBU 6ba6 0xc00490f740 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.823 UTC [msp.identity] Verify -> DEBU 6ba7 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-09-24 00:27:19.823 UTC [msp.identity] Verify -> DEBU 6ba8 Verify: sig = 00000000 30 45 02 21 00 8b c0 5f 66 35 30 e0 00 6e 05 19 |0E.!..._f50..n..| +peer0.org1.example.com | 00000010 cb bb 7b cc 7c 13 4c 91 af df b4 99 c1 5b 9a 09 |..{.|.L......[..| +peer0.org1.example.com | 00000020 5a 2f 35 9d 91 02 20 52 55 e9 e6 2f 0e e3 d6 0c |Z/5... RU../....| +peer0.org1.example.com | 00000030 80 b4 65 30 5d b0 40 23 7f 5c 44 3c cd 52 27 be |..e0].@#.\D<.R'.| +peer0.org1.example.com | 00000040 e4 9a b0 16 2d bb b8 |....-..|" +peer0.org1.example.com | "2019-09-24 00:27:19.823 UTC [cauthdsl] func2 -> DEBU 6ba9 0xc00490f740 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.823 UTC [cauthdsl] func1 -> DEBU 6baa 0xc00490f740 gate 1569284839816708300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.823 UTC [policies] Evaluate -> DEBU 6bab Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.823 UTC [policies] Evaluate -> DEBU 6bac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.823 UTC [policies] Evaluate -> DEBU 6bad Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.824 UTC [policies] Evaluate -> DEBU 6bae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.824 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6baf Authenticated 172.18.0.8:35024" +peer0.org1.example.com | "2019-09-24 00:27:19.824 UTC [gossip.comm] GossipStream -> DEBU 6bb0 Servicing 172.18.0.8:35024" +peer0.org1.example.com | "2019-09-24 00:27:19.824 UTC [gossip.comm] serviceConnection -> DEBU 6bb1 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 00:27:19.824 UTC [gossip.comm] writeToStream -> DEBU 6bb2 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:27:19.825 UTC [gossip.comm] readFromStream -> DEBU 6bb3 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +peer0.org1.example.com | "2019-09-24 00:27:19.825 UTC [gossip.comm] readFromStream -> DEBU 6bb4 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 00:27:19.825 UTC [gossip.comm] func2 -> DEBU 6bb5 Client 172.18.0.8:35024 disconnected" +peer0.org1.example.com | "2019-09-24 00:27:19.825 UTC [comm.grpc.server] 1 -> INFO 6bb6 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:27:29.791Z grpc.peer_address=172.18.0.8:35024 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.2236ms +peer0.org1.example.com | "2019-09-24 00:27:19.825 UTC [gossip.comm] writeToStream -> DEBU 6bb7 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 00:27:19.814 UTC [msp.identity] Verify -> DEBU 6bb8 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-09-24 00:27:19.826 UTC [msp.identity] Verify -> DEBU 6bba Verify: sig = 00000000 30 45 02 21 00 b3 ac 54 d4 e8 2d 92 15 43 6f af |0E.!...T..-..Co.| +peer0.org1.example.com | 00000010 bb eb c5 99 3e ec 69 f5 f8 a0 1a a2 9b f5 cf c5 |....>.i.........| +peer0.org1.example.com | 00000020 6c 26 b5 80 88 02 20 25 e8 85 e0 d2 8d bc 1d f8 |l&.... %........| +peer0.org1.example.com | 00000030 e1 31 ce 6c 67 ca 53 5d 40 dc ca ec 08 fc df c0 |.1.lg.S]@.......| +peer0.org1.example.com | 00000040 93 89 e4 51 6a 64 2d |...Qjd-|" +peer0.org1.example.com | "2019-09-24 00:27:19.826 UTC [cauthdsl] func2 -> DEBU 6bbb 0xc0048c3cd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.826 UTC [cauthdsl] func1 -> DEBU 6bbc 0xc0048c3cd0 gate 1569284839803761200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.826 UTC [policies] Evaluate -> DEBU 6bbd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.826 UTC [grpc] infof -> DEBU 6bb9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:19.827 UTC [policies] Evaluate -> DEBU 6bbe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.827 UTC [policies] Evaluate -> DEBU 6bbf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.827 UTC [policies] Evaluate -> DEBU 6bc0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.827 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bc1 Authenticated 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.827 UTC [msp] DeserializeIdentity -> DEBU 6bc2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.828 UTC [grpc] infof -> DEBU 6bc3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:19.828 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bc4 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.828 UTC [msp.identity] Sign -> DEBU 6bc5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151056 " +peer0.org1.example.com | "2019-09-24 00:27:19.828 UTC [msp.identity] Sign -> DEBU 6bc6 Sign: digest: 6C171F712E785F8BD7FD7879D3F6A94980502578649531D7863CC4025538F795 " +peer0.org1.example.com | "2019-09-24 00:27:19.828 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bc7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.829 UTC [msp.identity] Sign -> DEBU 6bc8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:19.829 UTC [msp.identity] Sign -> DEBU 6bc9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:19.829 UTC [msp] DeserializeIdentity -> DEBU 6bca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.829 UTC [gossip.comm] Send -> DEBU 6bcb Entering, sending GossipMessage: nonce:2811498400957997343 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.830 UTC [gossip.comm] sendToEndpoint -> DEBU 6bcc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:2811498400957997343 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.830 UTC [gossip.comm] createConnection -> DEBU 6bcd Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:27:19.831 UTC [grpc] DialContext -> DEBU 6bce parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:27:19.831 UTC [grpc] DialContext -> DEBU 6bcf scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:27:19.831 UTC [grpc] watcher -> DEBU 6bd0 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 00:27:19.831 UTC [grpc] switchBalancer -> DEBU 6bd1 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:27:19.831 UTC [grpc] HandleSubConnStateChange -> DEBU 6bd2 pickfirstBalancer: HandleSubConnStateChange: 0xc00495e730, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:27:19.833 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bd3 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.834 UTC [msp.identity] Sign -> DEBU 6bd4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151057 " +peer0.org1.example.com | "2019-09-24 00:27:19.834 UTC [msp.identity] Sign -> DEBU 6bd5 Sign: digest: C82D35B52336760D6B6BC6F992AF1DFF1FACA433E359FB2D619CA704FE628EBF " +peer0.org1.example.com | "2019-09-24 00:27:19.834 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bd6 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.834 UTC [msp.identity] Sign -> DEBU 6bd7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:19.834 UTC [msp.identity] Sign -> DEBU 6bd8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:19.834 UTC [gossip.comm] Send -> DEBU 6bd9 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.835 UTC [msp] DeserializeIdentity -> DEBU 6bda Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.835 UTC [gossip.comm] Send -> DEBU 6bdb Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.835 UTC [gossip.comm] sendToEndpoint -> DEBU 6bdc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.835 UTC [gossip.comm] createConnection -> DEBU 6bdd Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:27:19.837 UTC [grpc] DialContext -> DEBU 6bde parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:27:19.837 UTC [grpc] DialContext -> DEBU 6bdf scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:27:19.838 UTC [grpc] watcher -> DEBU 6be0 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 00:27:19.838 UTC [grpc] switchBalancer -> DEBU 6be1 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:27:19.838 UTC [grpc] HandleSubConnStateChange -> DEBU 6be2 pickfirstBalancer: HandleSubConnStateChange: 0xc004992f50, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:27:19.838 UTC [gossip.comm] sendToEndpoint -> DEBU 6be3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.839 UTC [gossip.comm] createConnection -> DEBU 6be4 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:19.840 UTC [grpc] DialContext -> DEBU 6be5 parsed scheme: """ +peer0.org1.example.com | "2019-09-24 00:27:19.840 UTC [grpc] DialContext -> DEBU 6be6 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 00:27:19.840 UTC [grpc] watcher -> DEBU 6be7 ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 00:27:19.840 UTC [grpc] switchBalancer -> DEBU 6be8 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 00:27:19.841 UTC [grpc] HandleSubConnStateChange -> DEBU 6be9 pickfirstBalancer: HandleSubConnStateChange: 0xc0049bcdd0, CONNECTING" +peer0.org1.example.com | "2019-09-24 00:27:19.844 UTC [grpc] HandleSubConnStateChange -> DEBU 6bea pickfirstBalancer: HandleSubConnStateChange: 0xc00495e730, READY" +peer0.org1.example.com | "2019-09-24 00:27:19.846 UTC [grpc] HandleSubConnStateChange -> DEBU 6beb pickfirstBalancer: HandleSubConnStateChange: 0xc0049bcdd0, READY" +peer0.org1.example.com | "2019-09-24 00:27:19.846 UTC [grpc] HandleSubConnStateChange -> DEBU 6bec pickfirstBalancer: HandleSubConnStateChange: 0xc004992f50, READY" +peer0.org1.example.com | "2019-09-24 00:27:19.848 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bed Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.848 UTC [msp.identity] Sign -> DEBU 6bee Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:27:19.848 UTC [msp.identity] Sign -> DEBU 6bef Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:27:19.849 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bf0 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.850 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bf1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.850 UTC [msp.identity] Sign -> DEBU 6bf2 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:27:19.850 UTC [msp.identity] Sign -> DEBU 6bf3 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:27:19.851 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bf4 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:19.851 UTC [msp.identity] Sign -> DEBU 6bf5 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-09-24 00:27:19.851 UTC [msp.identity] Sign -> DEBU 6bf6 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-09-24 00:27:19.851 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bf7 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.851 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bf8 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.852 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bf9 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.853 UTC [msp.identity] Verify -> DEBU 6bfa Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-09-24 00:27:19.853 UTC [msp.identity] Verify -> DEBU 6bfb Verify: sig = 00000000 30 44 02 20 43 e9 96 e6 0e e9 59 1c 75 10 40 c7 |0D. C.....Y.u.@.| +peer0.org1.example.com | 00000010 4d 9d 9f 41 84 e3 81 49 1d b7 1a 47 c7 0d f5 53 |M..A...I...G...S| +peer0.org1.example.com | 00000020 0f 47 bd a3 02 20 13 6d 5c 3d d3 d9 7e 57 fb 20 |.G... .m\=..~W. | +peer0.org1.example.com | 00000030 58 0a 9f e3 36 ec e3 ef 54 28 2c c8 59 84 ad 71 |X...6...T(,.Y..q| +peer0.org1.example.com | 00000040 6b 0a 4f 21 80 45 |k.O!.E|" +peer0.org1.example.com | "2019-09-24 00:27:19.853 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bfc Authenticated 172.18.0.5:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.853 UTC [gossip.comm] createConnection -> DEBU 6bfd Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.854 UTC [gossip.comm] sendToEndpoint -> DEBU 6bfe Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.855 UTC [gossip.comm] func1 -> DEBU 6bff Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.855 UTC [gossip.gossip] handleMessage -> DEBU 6c00 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.855 UTC [gossip.gossip] handleMessage -> DEBU 6c02 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.855 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6c01 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.856 UTC [msp] DeserializeIdentity -> DEBU 6c03 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.856 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c05 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:19.856 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.856 UTC [msp] DeserializeIdentity -> DEBU 6c07 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.856 UTC [msp.identity] Verify -> DEBU 6c08 Verify: digest = 00000000 c8 2d 35 b5 23 36 76 0d 6b 6b c6 f9 92 af 1d ff |.-5.#6v.kk......| +peer0.org1.example.com | 00000010 1f ac a4 33 e3 59 fb 2d 61 9c a7 04 fe 62 8e bf |...3.Y.-a....b..|" +peer0.org1.example.com | "2019-09-24 00:27:19.856 UTC [msp.identity] Verify -> DEBU 6c09 Verify: sig = 00000000 30 45 02 21 00 e2 96 fa d2 de fb 21 81 06 a0 03 |0E.!.......!....| +peer0.org1.example.com | 00000010 fe a8 9a 24 52 39 3d f3 f9 d4 9d 6f 73 33 e8 86 |...$R9=....os3..| +peer0.org1.example.com | 00000020 d0 84 c8 66 8a 02 20 12 4d 21 3a 39 71 7a 05 4d |...f.. .M!:9qz.M| +peer0.org1.example.com | 00000030 43 a3 90 de fd 1b cd 3b 4a 13 23 8d 34 da 8b 46 |C......;J.#.4..F| +peer0.org1.example.com | 00000040 a2 1d bd a1 38 60 5e |....8`^|" +peer0.org1.example.com | "2019-09-24 00:27:19.857 UTC [msp.identity] Verify -> DEBU 6c0b Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:27:19.857 UTC [msp.identity] Verify -> DEBU 6c0c Verify: sig = 00000000 30 44 02 20 16 6c 15 d6 70 75 70 67 f0 1f 64 0a |0D. .l..pupg..d.| +peer0.org1.example.com | 00000010 d6 5c a8 e1 44 dc b3 92 c1 7e 5a 60 97 4e ec 33 |.\..D....~Z`.N.3| +peer0.org1.example.com | 00000020 cb 6e f3 65 02 20 71 cb 12 8c 78 c6 77 6e e3 c5 |.n.e. q...x.wn..| +peer0.org1.example.com | 00000030 9c 71 8b b7 18 10 cf 61 59 62 b7 7d ef b8 0b 46 |.q.....aYb.}...F| +peer0.org1.example.com | 00000040 c2 94 ce 79 f8 05 |...y..|" +peer0.org1.example.com | "2019-09-24 00:27:19.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c0d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.857 UTC [gossip.discovery] isSentByMe -> DEBU 6c0e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c0f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c10 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.857 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.858 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6c11 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.858 UTC [msp] DeserializeIdentity -> DEBU 6c12 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.858 UTC [msp] DeserializeIdentity -> DEBU 6c13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.858 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.858 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c15 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.858 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c16 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.859 UTC [policies] Evaluate -> DEBU 6c17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.859 UTC [policies] Evaluate -> DEBU 6c18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.859 UTC [policies] Evaluate -> DEBU 6c1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.859 UTC [cauthdsl] func1 -> DEBU 6c1b 0xc0050b6ae0 gate 1569284839859439500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.859 UTC [cauthdsl] func2 -> DEBU 6c1c 0xc0050b6ae0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.859 UTC [cauthdsl] func2 -> DEBU 6c1d 0xc0050b6ae0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.860 UTC [cauthdsl] func2 -> DEBU 6c1e 0xc0050b6ae0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.860 UTC [msp.identity] Verify -> DEBU 6c1f Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-09-24 00:27:19.860 UTC [msp.identity] Verify -> DEBU 6c20 Verify: sig = 00000000 30 44 02 20 6b 42 17 e0 43 32 d0 51 5c 50 1a 2f |0D. kB..C2.Q\P./| +peer0.org1.example.com | 00000010 b1 a2 c1 aa cc 24 48 1a 08 44 97 64 c9 fe b1 72 |.....$H..D.d...r| +peer0.org1.example.com | 00000020 96 db 58 f5 02 20 2e 32 e7 7a 62 7c 80 4d c3 3a |..X.. .2.zb|.M.:| +peer0.org1.example.com | 00000030 c9 e2 53 09 90 80 ce d1 ce 5d 78 22 db bb 59 ca |..S......]x"..Y.| +peer0.org1.example.com | 00000040 d4 66 db 61 bd 20 |.f.a. |" +peer0.org1.example.com | "2019-09-24 00:27:19.861 UTC [cauthdsl] func2 -> DEBU 6c21 0xc0050b6ae0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.861 UTC [cauthdsl] func1 -> DEBU 6c22 0xc0050b6ae0 gate 1569284839859439500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.861 UTC [policies] Evaluate -> DEBU 6c23 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.861 UTC [policies] Evaluate -> DEBU 6c24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.861 UTC [policies] Evaluate -> DEBU 6c25 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.861 UTC [policies] Evaluate -> DEBU 6c26 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.861 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6c27 Authenticated 172.18.0.8:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.862 UTC [gossip.comm] createConnection -> DEBU 6c28 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.862 UTC [gossip.comm] sendToEndpoint -> DEBU 6c29 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.858 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c19 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.862 UTC [msp] DeserializeIdentity -> DEBU 6c2a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.863 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c2b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.863 UTC [msp] DeserializeIdentity -> DEBU 6c2c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.863 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c2d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.863 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c2e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.864 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c2f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.864 UTC [policies] Evaluate -> DEBU 6c30 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.864 UTC [policies] Evaluate -> DEBU 6c31 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.864 UTC [policies] Evaluate -> DEBU 6c32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.864 UTC [cauthdsl] func1 -> DEBU 6c33 0xc0050d2b60 gate 1569284839864716900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.864 UTC [cauthdsl] func2 -> DEBU 6c34 0xc0050d2b60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.865 UTC [cauthdsl] func2 -> DEBU 6c35 0xc0050d2b60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.865 UTC [cauthdsl] func2 -> DEBU 6c36 0xc0050d2b60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.865 UTC [msp.identity] Verify -> DEBU 6c37 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-09-24 00:27:19.865 UTC [msp.identity] Verify -> DEBU 6c38 Verify: sig = 00000000 30 44 02 20 5a 07 89 7f 52 9c ec 38 2b 71 60 26 |0D. Z...R..8+q`&| +peer0.org1.example.com | 00000010 b6 e1 a6 21 a8 02 78 44 fc 3a 6c 5f 61 cc 72 ea |...!..xD.:l_a.r.| +peer0.org1.example.com | 00000020 a7 ad e6 8f 02 20 61 50 ea 63 79 76 18 38 7f 5f |..... aP.cyv.8._| +peer0.org1.example.com | 00000030 98 b0 ac 91 16 06 30 99 16 a2 51 3d b0 a6 35 69 |......0...Q=..5i| +peer0.org1.example.com | 00000040 fc af ae 69 54 04 |...iT.|" +peer0.org1.example.com | "2019-09-24 00:27:19.865 UTC [cauthdsl] func2 -> DEBU 6c39 0xc0050d2b60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.866 UTC [cauthdsl] func1 -> DEBU 6c3a 0xc0050d2b60 gate 1569284839864716900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.866 UTC [policies] Evaluate -> DEBU 6c3b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.866 UTC [policies] Evaluate -> DEBU 6c3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.866 UTC [policies] Evaluate -> DEBU 6c3d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.866 UTC [policies] Evaluate -> DEBU 6c3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.866 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6c3f Authenticated 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 00:27:19.867 UTC [gossip.comm] createConnection -> DEBU 6c40 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.867 UTC [gossip.comm] sendToEndpoint -> DEBU 6c41 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.867 UTC [gossip.comm] func1 -> DEBU 6c42 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.868 UTC [gossip.gossip] handleMessage -> DEBU 6c43 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.868 UTC [gossip.comm] func1 -> DEBU 6c44 Got message: GossipMessage: Channel: , nonce: 2811498400957997343, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.868 UTC [gossip.gossip] handleMessage -> DEBU 6c45 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.869 UTC [gossip.gossip] handleMessage -> DEBU 6c47 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 2811498400957997343, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.869 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c48 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:19.870 UTC [msp] DeserializeIdentity -> DEBU 6c49 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.870 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c4a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.870 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c4b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.870 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c4c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.871 UTC [policies] Evaluate -> DEBU 6c4d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.871 UTC [policies] Evaluate -> DEBU 6c4e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.871 UTC [policies] Evaluate -> DEBU 6c4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.871 UTC [cauthdsl] func1 -> DEBU 6c50 0xc0050e61a0 gate 1569284839871432700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.871 UTC [cauthdsl] func2 -> DEBU 6c51 0xc0050e61a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.871 UTC [cauthdsl] func2 -> DEBU 6c52 0xc0050e61a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.871 UTC [cauthdsl] func2 -> DEBU 6c53 0xc0050e61a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.872 UTC [msp.identity] Verify -> DEBU 6c54 Verify: digest = 00000000 66 ce 27 f9 48 4d ad eb 61 54 a3 e4 99 22 be c2 |f.'.HM..aT..."..| +peer0.org1.example.com | 00000010 2c f4 1a b0 14 57 34 a6 9b 1f 2f 29 dc 39 a6 28 |,....W4.../).9.(|" +peer0.org1.example.com | "2019-09-24 00:27:19.872 UTC [msp.identity] Verify -> DEBU 6c55 Verify: sig = 00000000 30 44 02 20 4e d6 f6 48 83 5b 09 83 e5 6b bb ed |0D. N..H.[...k..| +peer0.org1.example.com | 00000010 cf 30 72 43 c0 4a 49 1a 0d 65 b3 4b 29 80 1f 00 |.0rC.JI..e.K)...| +peer0.org1.example.com | 00000020 23 af 10 32 02 20 6c fe ac 4c 50 4f a3 31 0f 6f |#..2. l..LPO.1.o| +peer0.org1.example.com | 00000030 b0 17 47 1a b1 10 ce 7f 61 d6 eb fd 9f 27 37 6f |..G.....a....'7o| +peer0.org1.example.com | 00000040 2b 86 38 50 bf d1 |+.8P..|" +peer0.org1.example.com | "2019-09-24 00:27:19.872 UTC [cauthdsl] func2 -> DEBU 6c56 0xc0050e61a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.873 UTC [cauthdsl] func1 -> DEBU 6c57 0xc0050e61a0 gate 1569284839871432700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.873 UTC [policies] Evaluate -> DEBU 6c58 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.873 UTC [policies] Evaluate -> DEBU 6c59 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.873 UTC [policies] Evaluate -> DEBU 6c5a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.873 UTC [policies] Evaluate -> DEBU 6c5b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c5c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c5d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c5e Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:19.874 UTC [msp.identity] Verify -> DEBU 6c5f Verify: digest = 00000000 3b 6e 18 85 73 f9 5b 5f 95 c3 13 13 b7 8e 6d c6 |;n..s.[_......m.| +peer0.org1.example.com | 00000010 26 f4 2f a0 e8 8b af 5a c8 0b 66 dc 97 6e 10 a1 |&./....Z..f..n..|" +peer0.org1.example.com | "2019-09-24 00:27:19.874 UTC [msp.identity] Verify -> DEBU 6c60 Verify: sig = 00000000 30 44 02 20 5e 1e e9 f7 1b ce f4 b4 50 95 66 cf |0D. ^.......P.f.| +peer0.org1.example.com | 00000010 7f f5 20 84 98 a4 83 43 a3 6f 91 13 a8 08 88 a9 |.. ....C.o......| +peer0.org1.example.com | 00000020 18 c6 ea f7 02 20 71 8c 55 9c 49 a4 cb 96 1a 36 |..... q.U.I....6| +peer0.org1.example.com | 00000030 12 6f 38 2f 1d 42 79 59 03 fd 4f f7 f7 35 74 0a |.o8/.ByY..O..5t.| +peer0.org1.example.com | 00000040 9d 7c 02 39 29 03 |.|.9).|" +peer0.org1.example.com | "2019-09-24 00:27:19.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c61 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c62 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c63 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:19.875 UTC [msp.identity] Verify -> DEBU 6c64 Verify: digest = 00000000 c8 2d 35 b5 23 36 76 0d 6b 6b c6 f9 92 af 1d ff |.-5.#6v.kk......| +peer0.org1.example.com | 00000010 1f ac a4 33 e3 59 fb 2d 61 9c a7 04 fe 62 8e bf |...3.Y.-a....b..|" +peer0.org1.example.com | "2019-09-24 00:27:19.875 UTC [msp.identity] Verify -> DEBU 6c65 Verify: sig = 00000000 30 45 02 21 00 e2 96 fa d2 de fb 21 81 06 a0 03 |0E.!.......!....| +peer0.org1.example.com | 00000010 fe a8 9a 24 52 39 3d f3 f9 d4 9d 6f 73 33 e8 86 |...$R9=....os3..| +peer0.org1.example.com | 00000020 d0 84 c8 66 8a 02 20 12 4d 21 3a 39 71 7a 05 4d |...f.. .M!:9qz.M| +peer0.org1.example.com | 00000030 43 a3 90 de fd 1b cd 3b 4a 13 23 8d 34 da 8b 46 |C......;J.#.4..F| +peer0.org1.example.com | 00000040 a2 1d bd a1 38 60 5e |....8`^|" +peer0.org1.example.com | "2019-09-24 00:27:19.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c66 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.876 UTC [gossip.discovery] isSentByMe -> DEBU 6c67 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c68 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c69 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c6a Got message: GossipMessage: Channel: , nonce: 2811498400957997343, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.876 UTC [gossip.gossip] handleMessage -> DEBU 6c6b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.876 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c6c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:19.876 UTC [msp.identity] Verify -> DEBU 6c6d Verify: digest = 00000000 3b 6e 18 85 73 f9 5b 5f 95 c3 13 13 b7 8e 6d c6 |;n..s.[_......m.| +peer0.org1.example.com | 00000010 26 f4 2f a0 e8 8b af 5a c8 0b 66 dc 97 6e 10 a1 |&./....Z..f..n..|" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [msp.identity] Verify -> DEBU 6c6e Verify: sig = 00000000 30 44 02 20 5e 1e e9 f7 1b ce f4 b4 50 95 66 cf |0D. ^.......P.f.| +peer0.org1.example.com | 00000010 7f f5 20 84 98 a4 83 43 a3 6f 91 13 a8 08 88 a9 |.. ....C.o......| +peer0.org1.example.com | 00000020 18 c6 ea f7 02 20 71 8c 55 9c 49 a4 cb 96 1a 36 |..... q.U.I....6| +peer0.org1.example.com | 00000030 12 6f 38 2f 1d 42 79 59 03 fd 4f f7 f7 35 74 0a |.o8/.ByY..O..5t.| +peer0.org1.example.com | 00000040 9d 7c 02 39 29 03 |.|.9).|" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c6f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c70 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c71 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [msp.identity] Verify -> DEBU 6c72 Verify: digest = 00000000 6c 17 1f 71 2e 78 5f 8b d7 fd 78 79 d3 f6 a9 49 |l..q.x_...xy...I| +peer0.org1.example.com | 00000010 80 50 25 78 64 95 31 d7 86 3c c4 02 55 38 f7 95 |.P%xd.1..<..U8..|" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [msp.identity] Verify -> DEBU 6c73 Verify: sig = 00000000 30 44 02 20 60 73 a7 d3 7a a1 59 99 98 f5 18 58 |0D. `s..z.Y....X| +peer0.org1.example.com | 00000010 75 e7 b3 d0 6d 61 2e da f0 cc 76 52 b0 56 be 08 |u...ma....vR.V..| +peer0.org1.example.com | 00000020 0b cc 77 6a 02 20 48 85 ac 4d a9 64 c2 2e e4 c4 |..wj. H..M.d....| +peer0.org1.example.com | 00000030 d0 80 35 78 51 62 c2 f5 90 ce b9 38 30 25 fe 6e |..5xQb.....80%.n| +peer0.org1.example.com | 00000040 08 3b 1f c7 84 57 |.;...W|" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c74 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [gossip.discovery] isSentByMe -> DEBU 6c75 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c76 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c77 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [msp] DeserializeIdentity -> DEBU 6c78 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c79 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c7a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c7b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [policies] Evaluate -> DEBU 6c7c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [policies] Evaluate -> DEBU 6c7d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.877 UTC [policies] Evaluate -> DEBU 6c7e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [cauthdsl] func1 -> DEBU 6c7f 0xc00511a740 gate 1569284839877992200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [cauthdsl] func2 -> DEBU 6c80 0xc00511a740 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [cauthdsl] func2 -> DEBU 6c81 0xc00511a740 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [cauthdsl] func2 -> DEBU 6c82 0xc00511a740 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [msp.identity] Verify -> DEBU 6c83 Verify: digest = 00000000 4b 03 6b 9a 50 b5 a8 00 f1 a2 80 7a 36 cb e7 ce |K.k.P......z6...| +peer0.org1.example.com | 00000010 f5 90 cd 58 c9 e9 6b 0d 41 a3 e0 47 53 72 71 fa |...X..k.A..GSrq.|" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [msp.identity] Verify -> DEBU 6c84 Verify: sig = 00000000 30 45 02 21 00 8c d4 5b 9f 5a e8 b6 6e ab 54 86 |0E.!...[.Z..n.T.| +peer0.org1.example.com | 00000010 45 84 92 b1 a5 40 d5 40 02 8d b9 2e 2d 25 6f 82 |E....@.@....-%o.| +peer0.org1.example.com | 00000020 7a fa 77 af c7 02 20 4b 32 66 85 a0 d4 2f 47 d0 |z.w... K2f.../G.| +peer0.org1.example.com | 00000030 54 de 6c 1d 94 5e 13 67 65 6f 42 55 c8 18 32 c2 |T.l..^.geoBU..2.| +peer0.org1.example.com | 00000040 15 50 50 07 82 09 3e |.PP...>|" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [cauthdsl] func2 -> DEBU 6c85 0xc00511a740 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [cauthdsl] func1 -> DEBU 6c86 0xc00511a740 gate 1569284839877992200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [policies] Evaluate -> DEBU 6c87 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [policies] Evaluate -> DEBU 6c88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [policies] Evaluate -> DEBU 6c89 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [policies] Evaluate -> DEBU 6c8a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c8b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c8c endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" lastAliveTS: 1569284680646799100, 90 but got ts: inc_num:1569284680646799100 seq_num:89 " +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c8d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.878 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c8e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.881 UTC [gossip.comm] func1 -> DEBU 6c8f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.882 UTC [gossip.gossip] handleMessage -> DEBU 6c90 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.883 UTC [gossip.pull] HandleMessage -> DEBU 6c91 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.883 UTC [msp] DeserializeIdentity -> DEBU 6c92 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.883 UTC [msp] DeserializeIdentity -> DEBU 6c93 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.884 UTC [msp] DeserializeIdentity -> DEBU 6c94 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.885 UTC [msp] DeserializeIdentity -> DEBU 6c95 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.885 UTC [msp] DeserializeIdentity -> DEBU 6c96 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.886 UTC [msp] DeserializeIdentity -> DEBU 6c97 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.886 UTC [gossip.pull] SendDigest -> DEBU 6c98 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:27:19.886 UTC [gossip.gossip] handleMessage -> DEBU 6c99 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.912 UTC [gossip.comm] func1 -> DEBU 6c9a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.913 UTC [gossip.gossip] handleMessage -> DEBU 6c9b Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.914 UTC [gossip.gossip] handleMessage -> DEBU 6c9c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.916 UTC [gossip.comm] func1 -> DEBU 6c9d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.917 UTC [gossip.gossip] handleMessage -> DEBU 6c9f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c9e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6ca0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:19.919 UTC [msp] DeserializeIdentity -> DEBU 6ca1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.919 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6ca2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ca3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ca4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.920 UTC [policies] Evaluate -> DEBU 6ca5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.921 UTC [policies] Evaluate -> DEBU 6ca6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.921 UTC [policies] Evaluate -> DEBU 6ca7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.921 UTC [cauthdsl] func1 -> DEBU 6ca8 0xc00512f250 gate 1569284839921670100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.922 UTC [cauthdsl] func2 -> DEBU 6ca9 0xc00512f250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.922 UTC [cauthdsl] func2 -> DEBU 6caa 0xc00512f250 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.922 UTC [cauthdsl] func2 -> DEBU 6cab 0xc00512f250 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.923 UTC [msp.identity] Verify -> DEBU 6cac Verify: digest = 00000000 98 8f 25 8b e3 5a 85 d0 a7 ef 5c bd c9 31 d5 ee |..%..Z....\..1..| +peer0.org1.example.com | 00000010 e2 36 a1 db 87 1f 45 9f 66 b0 46 f0 84 9a 3f 68 |.6....E.f.F...?h|" +peer0.org1.example.com | "2019-09-24 00:27:19.923 UTC [msp.identity] Verify -> DEBU 6cad Verify: sig = 00000000 30 45 02 21 00 d8 72 0f 07 bb d9 69 93 4e 3e a9 |0E.!..r....i.N>.| +peer0.org1.example.com | 00000010 8d a1 7a 4b 1d ac 82 51 6c fc fc 0c f7 3f ac 4b |..zK...Ql....?.K| +peer0.org1.example.com | 00000020 3a 2c 36 11 98 02 20 0f 50 59 12 d6 e3 5e 9e 39 |:,6... .PY...^.9| +peer0.org1.example.com | 00000030 e8 a6 37 08 9f 2a 64 29 b5 84 dd 19 90 c0 67 08 |..7..*d)......g.| +peer0.org1.example.com | 00000040 08 1d 60 aa 0e f1 92 |..`....|" +peer0.org1.example.com | "2019-09-24 00:27:19.924 UTC [cauthdsl] func2 -> DEBU 6cae 0xc00512f250 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.924 UTC [cauthdsl] func1 -> DEBU 6caf 0xc00512f250 gate 1569284839921670100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.924 UTC [policies] Evaluate -> DEBU 6cb0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.925 UTC [policies] Evaluate -> DEBU 6cb1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.926 UTC [policies] Evaluate -> DEBU 6cb2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.926 UTC [policies] Evaluate -> DEBU 6cb3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.926 UTC [gossip.discovery] handleAliveMessage -> DEBU 6cb4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.926 UTC [gossip.discovery] resurrectMember -> DEBU 6cb5 Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes t: {1569284680017232100 87 {} [] 0}" +peer0.org1.example.com | "2019-09-24 00:27:19.927 UTC [gossip.discovery] resurrectMember -> DEBU 6cb6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 6cb7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cb8 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cb9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cba Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.930 UTC [gossip.gossip] handleMessage -> DEBU 6cbb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.933 UTC [msp] DeserializeIdentity -> DEBU 6cbc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.934 UTC [msp] DeserializeIdentity -> DEBU 6cbd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.934 UTC [gossip.comm] func1 -> DEBU 6cbe Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.934 UTC [msp] DeserializeIdentity -> DEBU 6cbf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.934 UTC [gossip.gossip] handleMessage -> DEBU 6cc0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.934 UTC [gossip.gossip] handleMessage -> DEBU 6cc1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.934 UTC [msp] DeserializeIdentity -> DEBU 6cc2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.935 UTC [msp] DeserializeIdentity -> DEBU 6cc3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.935 UTC [msp] DeserializeIdentity -> DEBU 6cc4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.935 UTC [gossip.comm] Send -> DEBU 6cc6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.935 UTC [msp] DeserializeIdentity -> DEBU 6cc7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.936 UTC [msp] DeserializeIdentity -> DEBU 6cc8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cc5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.936 UTC [gossip.comm] Send -> DEBU 6cca Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:19.936 UTC [gossip.comm] sendToEndpoint -> DEBU 6ccb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.936 UTC [gossip.comm] sendToEndpoint -> DEBU 6ccc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.936 UTC [gossip.comm] sendToEndpoint -> DEBU 6ccd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cc9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.937 UTC [gossip.comm] sendToEndpoint -> DEBU 6cce Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.992 UTC [gossip.comm] func1 -> DEBU 6ccf Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.993 UTC [gossip.gossip] handleMessage -> DEBU 6cd0 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cd1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.993 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6cd2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:19.994 UTC [msp] DeserializeIdentity -> DEBU 6cd3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:19.994 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6cd4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:19.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6cd5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6cd6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:19.995 UTC [policies] Evaluate -> DEBU 6cd7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.995 UTC [policies] Evaluate -> DEBU 6cd8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:19.995 UTC [policies] Evaluate -> DEBU 6cd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:19.996 UTC [cauthdsl] func1 -> DEBU 6cda 0xc00514d7c0 gate 1569284839996087400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:19.996 UTC [cauthdsl] func2 -> DEBU 6cdb 0xc00514d7c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:19.996 UTC [cauthdsl] func2 -> DEBU 6cdc 0xc00514d7c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:19.996 UTC [cauthdsl] func2 -> DEBU 6cdd 0xc00514d7c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.997 UTC [msp.identity] Verify -> DEBU 6cde Verify: digest = 00000000 30 9d 24 5a 67 49 98 bd 15 e2 81 43 15 40 6e 56 |0.$ZgI.....C.@nV| +peer0.org1.example.com | 00000010 3a 47 00 65 f9 aa ed a3 a0 96 84 ad 03 5c 64 8c |:G.e.........\d.|" +peer0.org1.example.com | "2019-09-24 00:27:19.997 UTC [msp.identity] Verify -> DEBU 6cdf Verify: sig = 00000000 30 45 02 21 00 b6 c2 ed 69 38 4a 2b d6 78 bb b3 |0E.!....i8J+.x..| +peer0.org1.example.com | 00000010 81 3f 1d 7e db 6d 02 c3 be c3 30 c8 f2 2e b7 d4 |.?.~.m....0.....| +peer0.org1.example.com | 00000020 1a bd 0d c2 75 02 20 6b ea 07 39 ca 87 e3 7e 10 |....u. k..9...~.| +peer0.org1.example.com | 00000030 9a 23 a1 3d ff d1 ea f5 5a 6d a9 6e 79 37 39 4f |.#.=....Zm.ny79O| +peer0.org1.example.com | 00000040 6e d0 43 77 cc ef 94 |n.Cw...|" +peer0.org1.example.com | "2019-09-24 00:27:19.998 UTC [cauthdsl] func2 -> DEBU 6ce0 0xc00514d7c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:19.998 UTC [cauthdsl] func1 -> DEBU 6ce1 0xc00514d7c0 gate 1569284839996087400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:19.998 UTC [policies] Evaluate -> DEBU 6ce2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.998 UTC [policies] Evaluate -> DEBU 6ce3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.999 UTC [policies] Evaluate -> DEBU 6ce4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.999 UTC [policies] Evaluate -> DEBU 6ce5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:19.999 UTC [gossip.discovery] handleAliveMessage -> DEBU 6ce6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ce7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:20.000 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ce8 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:20.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ce9 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:20.002 UTC [gossip.discovery] learnExistingMembers -> DEBU 6cea Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:20.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ceb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:19.993 UTC [gossip.gossip] handleMessage -> DEBU 6cec Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.003 UTC [gossip.discovery] handleAliveMessage -> DEBU 6ced Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cee Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.004 UTC [gossip.discovery] sendMemResponse -> DEBU 6cef Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:27:20.004 UTC [msp] DeserializeIdentity -> DEBU 6cf0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.005 UTC [msp] DeserializeIdentity -> DEBU 6cf1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.005 UTC [msp] DeserializeIdentity -> DEBU 6cf2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.005 UTC [gossip.comm] Send -> DEBU 6cf3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:20.006 UTC [gossip.discovery] sendMemResponse -> DEBU 6cf4 Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" > alive: " +peer0.org1.example.com | "2019-09-24 00:27:20.006 UTC [gossip.comm] sendToEndpoint -> DEBU 6cf5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.006 UTC [gossip.comm] sendToEndpoint -> DEBU 6cf6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.051 UTC [msp] DeserializeIdentity -> DEBU 6cf7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.051 UTC [msp] DeserializeIdentity -> DEBU 6cf8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.053 UTC [gossip.comm] Send -> DEBU 6cf9 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:20.053 UTC [gossip.comm] sendToEndpoint -> DEBU 6cfa Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.053 UTC [gossip.comm] sendToEndpoint -> DEBU 6cfb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.053 UTC [gossip.comm] sendToEndpoint -> DEBU 6cfc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.054 UTC [gossip.comm] sendToEndpoint -> DEBU 6cfd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.054 UTC [gossip.comm] sendToEndpoint -> DEBU 6cff Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.054 UTC [gossip.comm] sendToEndpoint -> DEBU 6cfe Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.056 UTC [gossip.comm] func1 -> DEBU 6d00 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.056 UTC [gossip.gossip] handleMessage -> DEBU 6d01 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.056 UTC [msp] DeserializeIdentity -> DEBU 6d02 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.057 UTC [msp] DeserializeIdentity -> DEBU 6d03 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.057 UTC [gossip.comm] func1 -> DEBU 6d04 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.058 UTC [gossip.comm] func1 -> DEBU 6d05 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.058 UTC [msp] DeserializeIdentity -> DEBU 6d06 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6d07 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:20.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d08 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d09 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.060 UTC [policies] Evaluate -> DEBU 6d0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.060 UTC [policies] Evaluate -> DEBU 6d0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:20.061 UTC [policies] Evaluate -> DEBU 6d0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.061 UTC [cauthdsl] func1 -> DEBU 6d0d 0xc005193080 gate 1569284840061306000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.062 UTC [cauthdsl] func2 -> DEBU 6d0e 0xc005193080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.062 UTC [cauthdsl] func2 -> DEBU 6d0f 0xc005193080 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.062 UTC [cauthdsl] func2 -> DEBU 6d10 0xc005193080 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.063 UTC [msp.identity] Verify -> DEBU 6d12 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:20.063 UTC [msp.identity] Verify -> DEBU 6d13 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:20.062 UTC [msp] DeserializeIdentity -> DEBU 6d11 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.063 UTC [msp] DeserializeIdentity -> DEBU 6d14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.064 UTC [cauthdsl] func2 -> DEBU 6d15 0xc005193080 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.064 UTC [cauthdsl] func1 -> DEBU 6d17 0xc005193080 gate 1569284840061306000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:20.064 UTC [policies] Evaluate -> DEBU 6d18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.064 UTC [policies] Evaluate -> DEBU 6d19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.064 UTC [policies] Evaluate -> DEBU 6d1a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.065 UTC [policies] Evaluate -> DEBU 6d1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.064 UTC [gossip.comm] Send -> DEBU 6d16 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:20.065 UTC [msp.identity] Verify -> DEBU 6d1c Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:20.065 UTC [msp] DeserializeIdentity -> DEBU 6d1d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.066 UTC [msp] DeserializeIdentity -> DEBU 6d1e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.066 UTC [gossip.comm] sendToEndpoint -> DEBU 6d1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.066 UTC [gossip.comm] sendToEndpoint -> DEBU 6d21 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.066 UTC [msp.identity] Verify -> DEBU 6d20 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:20.067 UTC [msp.identity] Verify -> DEBU 6d23 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +peer0.org1.example.com | 00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +peer0.org1.example.com | "2019-09-24 00:27:20.067 UTC [msp.identity] Verify -> DEBU 6d24 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +peer0.org1.example.com | 00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +peer0.org1.example.com | 00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +peer0.org1.example.com | 00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +peer0.org1.example.com | 00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +peer0.org1.example.com | "2019-09-24 00:27:20.068 UTC [msp] DeserializeIdentity -> DEBU 6d25 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.068 UTC [msp] DeserializeIdentity -> DEBU 6d26 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.069 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6d27 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:20.069 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d28 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.069 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d29 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.069 UTC [policies] Evaluate -> DEBU 6d2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.069 UTC [policies] Evaluate -> DEBU 6d2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:20.069 UTC [policies] Evaluate -> DEBU 6d2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.069 UTC [cauthdsl] func1 -> DEBU 6d2d 0xc0051bec20 gate 1569284840069800000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.069 UTC [cauthdsl] func2 -> DEBU 6d2e 0xc0051bec20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.070 UTC [cauthdsl] func2 -> DEBU 6d30 0xc0051bec20 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.070 UTC [gossip.comm] sendToEndpoint -> DEBU 6d2f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.070 UTC [gossip.comm] sendToEndpoint -> DEBU 6d31 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.070 UTC [cauthdsl] func2 -> DEBU 6d32 0xc0051bec20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.070 UTC [msp.identity] Verify -> DEBU 6d33 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:20.071 UTC [msp.identity] Verify -> DEBU 6d34 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:20.067 UTC [gossip.comm] sendToEndpoint -> DEBU 6d22 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.071 UTC [cauthdsl] func2 -> DEBU 6d35 0xc0051bec20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.072 UTC [cauthdsl] func1 -> DEBU 6d37 0xc0051bec20 gate 1569284840069800000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:20.073 UTC [policies] Evaluate -> DEBU 6d38 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.073 UTC [policies] Evaluate -> DEBU 6d39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.073 UTC [policies] Evaluate -> DEBU 6d3a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.073 UTC [policies] Evaluate -> DEBU 6d3b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.072 UTC [gossip.comm] sendToEndpoint -> DEBU 6d36 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.074 UTC [msp] DeserializeIdentity -> DEBU 6d3c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.075 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d3d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.075 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d3e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.075 UTC [policies] Evaluate -> DEBU 6d3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.076 UTC [policies] Evaluate -> DEBU 6d40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:20.076 UTC [policies] Evaluate -> DEBU 6d41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.076 UTC [cauthdsl] func1 -> DEBU 6d42 0xc0051b13f0 gate 1569284840076524800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.076 UTC [cauthdsl] func2 -> DEBU 6d43 0xc0051b13f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.077 UTC [cauthdsl] func2 -> DEBU 6d44 0xc0051b13f0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.077 UTC [cauthdsl] func2 -> DEBU 6d45 0xc0051b13f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.077 UTC [msp.identity] Verify -> DEBU 6d46 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:20.078 UTC [msp.identity] Verify -> DEBU 6d47 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:20.079 UTC [cauthdsl] func2 -> DEBU 6d48 0xc0051b13f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.079 UTC [cauthdsl] func1 -> DEBU 6d49 0xc0051b13f0 gate 1569284840076524800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:20.079 UTC [policies] Evaluate -> DEBU 6d4a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.079 UTC [policies] Evaluate -> DEBU 6d4b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.080 UTC [policies] Evaluate -> DEBU 6d4c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.080 UTC [policies] Evaluate -> DEBU 6d4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.080 UTC [gossip.gossip] handleMessage -> DEBU 6d4e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.080 UTC [gossip.gossip] handleMessage -> DEBU 6d4f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.080 UTC [msp] DeserializeIdentity -> DEBU 6d50 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.081 UTC [msp] DeserializeIdentity -> DEBU 6d51 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.081 UTC [msp] DeserializeIdentity -> DEBU 6d52 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.083 UTC [gossip.comm] func1 -> DEBU 6d53 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6d54 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:20.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d55 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d56 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.084 UTC [policies] Evaluate -> DEBU 6d57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.084 UTC [policies] Evaluate -> DEBU 6d58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:20.084 UTC [policies] Evaluate -> DEBU 6d59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.085 UTC [cauthdsl] func1 -> DEBU 6d5a 0xc0051bf5a0 gate 1569284840085066300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.085 UTC [cauthdsl] func2 -> DEBU 6d5b 0xc0051bf5a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.085 UTC [cauthdsl] func2 -> DEBU 6d5c 0xc0051bf5a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.085 UTC [cauthdsl] func2 -> DEBU 6d5d 0xc0051bf5a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.085 UTC [msp.identity] Verify -> DEBU 6d5e Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:20.086 UTC [msp.identity] Verify -> DEBU 6d5f Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:20.086 UTC [cauthdsl] func2 -> DEBU 6d60 0xc0051bf5a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.086 UTC [cauthdsl] func1 -> DEBU 6d61 0xc0051bf5a0 gate 1569284840085066300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:20.086 UTC [policies] Evaluate -> DEBU 6d62 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.086 UTC [policies] Evaluate -> DEBU 6d63 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.086 UTC [policies] Evaluate -> DEBU 6d64 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.087 UTC [policies] Evaluate -> DEBU 6d65 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.087 UTC [msp.identity] Verify -> DEBU 6d66 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +peer0.org1.example.com | 00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +peer0.org1.example.com | "2019-09-24 00:27:20.087 UTC [msp.identity] Verify -> DEBU 6d67 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +peer0.org1.example.com | 00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +peer0.org1.example.com | 00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +peer0.org1.example.com | 00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +peer0.org1.example.com | 00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +peer0.org1.example.com | "2019-09-24 00:27:20.087 UTC [msp.identity] Verify -> DEBU 6d68 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +peer0.org1.example.com | 00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +peer0.org1.example.com | "2019-09-24 00:27:20.088 UTC [msp.identity] Verify -> DEBU 6d69 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +peer0.org1.example.com | 00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +peer0.org1.example.com | 00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +peer0.org1.example.com | 00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +peer0.org1.example.com | 00000040 c0 b7 9a 5a 79 46 |...ZyF|" +peer0.org1.example.com | "2019-09-24 00:27:20.088 UTC [msp] DeserializeIdentity -> DEBU 6d6a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.088 UTC [msp] DeserializeIdentity -> DEBU 6d6b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.088 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6d6c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:20.089 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d6d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.089 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d6e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.089 UTC [policies] Evaluate -> DEBU 6d6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.089 UTC [policies] Evaluate -> DEBU 6d70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:20.090 UTC [policies] Evaluate -> DEBU 6d71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.090 UTC [cauthdsl] func1 -> DEBU 6d72 0xc0051ebbb0 gate 1569284840090367100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.090 UTC [cauthdsl] func2 -> DEBU 6d73 0xc0051ebbb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.090 UTC [cauthdsl] func2 -> DEBU 6d74 0xc0051ebbb0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.091 UTC [cauthdsl] func2 -> DEBU 6d75 0xc0051ebbb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.091 UTC [msp.identity] Verify -> DEBU 6d76 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:20.091 UTC [msp.identity] Verify -> DEBU 6d77 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:20.092 UTC [cauthdsl] func2 -> DEBU 6d78 0xc0051ebbb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.092 UTC [cauthdsl] func1 -> DEBU 6d79 0xc0051ebbb0 gate 1569284840090367100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:20.092 UTC [policies] Evaluate -> DEBU 6d7a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.092 UTC [policies] Evaluate -> DEBU 6d7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.093 UTC [policies] Evaluate -> DEBU 6d7c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.093 UTC [policies] Evaluate -> DEBU 6d7d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.093 UTC [msp] DeserializeIdentity -> DEBU 6d7e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.093 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d7f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d80 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.094 UTC [policies] Evaluate -> DEBU 6d81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.094 UTC [policies] Evaluate -> DEBU 6d82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:20.094 UTC [policies] Evaluate -> DEBU 6d83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.095 UTC [cauthdsl] func1 -> DEBU 6d84 0xc005204c90 gate 1569284840095037100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.095 UTC [cauthdsl] func2 -> DEBU 6d85 0xc005204c90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.095 UTC [cauthdsl] func2 -> DEBU 6d86 0xc005204c90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.095 UTC [cauthdsl] func2 -> DEBU 6d87 0xc005204c90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.095 UTC [msp.identity] Verify -> DEBU 6d88 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:20.096 UTC [msp.identity] Verify -> DEBU 6d89 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:20.096 UTC [cauthdsl] func2 -> DEBU 6d8a 0xc005204c90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.096 UTC [cauthdsl] func1 -> DEBU 6d8b 0xc005204c90 gate 1569284840095037100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:20.096 UTC [policies] Evaluate -> DEBU 6d8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.096 UTC [policies] Evaluate -> DEBU 6d8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.097 UTC [policies] Evaluate -> DEBU 6d8e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.097 UTC [policies] Evaluate -> DEBU 6d8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.097 UTC [gossip.gossip] handleMessage -> DEBU 6d90 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.097 UTC [gossip.gossip] handleMessage -> DEBU 6d91 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.097 UTC [msp] DeserializeIdentity -> DEBU 6d92 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.098 UTC [msp] DeserializeIdentity -> DEBU 6d93 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.098 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6d94 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:20.098 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d95 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.098 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d96 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.098 UTC [policies] Evaluate -> DEBU 6d97 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.098 UTC [policies] Evaluate -> DEBU 6d98 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:20.099 UTC [policies] Evaluate -> DEBU 6d99 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.099 UTC [cauthdsl] func1 -> DEBU 6d9a 0xc0052186a0 gate 1569284840099080200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.099 UTC [cauthdsl] func2 -> DEBU 6d9b 0xc0052186a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.099 UTC [cauthdsl] func2 -> DEBU 6d9c 0xc0052186a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.099 UTC [cauthdsl] func2 -> DEBU 6d9d 0xc0052186a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.099 UTC [msp.identity] Verify -> DEBU 6d9e Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +peer0.org1.example.com | 00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +peer0.org1.example.com | "2019-09-24 00:27:20.099 UTC [msp.identity] Verify -> DEBU 6d9f Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +peer0.org1.example.com | 00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +peer0.org1.example.com | 00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +peer0.org1.example.com | 00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +peer0.org1.example.com | 00000040 13 39 e6 a7 a2 13 |.9....|" +peer0.org1.example.com | "2019-09-24 00:27:20.100 UTC [cauthdsl] func2 -> DEBU 6da0 0xc0052186a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.100 UTC [cauthdsl] func1 -> DEBU 6da1 0xc0052186a0 gate 1569284840099080200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:20.100 UTC [policies] Evaluate -> DEBU 6da2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.100 UTC [policies] Evaluate -> DEBU 6da3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.100 UTC [policies] Evaluate -> DEBU 6da4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.100 UTC [policies] Evaluate -> DEBU 6da5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.100 UTC [msp] DeserializeIdentity -> DEBU 6da6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.101 UTC [msp] DeserializeIdentity -> DEBU 6da7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6da8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:20.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6da9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6daa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.101 UTC [policies] Evaluate -> DEBU 6dab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.101 UTC [policies] Evaluate -> DEBU 6dac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:20.101 UTC [policies] Evaluate -> DEBU 6dad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.102 UTC [cauthdsl] func1 -> DEBU 6dae 0xc005219e70 gate 1569284840101942700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.102 UTC [cauthdsl] func2 -> DEBU 6daf 0xc005219e70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.102 UTC [cauthdsl] func2 -> DEBU 6db0 0xc005219e70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.102 UTC [cauthdsl] func2 -> DEBU 6db1 0xc005219e70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.102 UTC [msp.identity] Verify -> DEBU 6db2 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +peer0.org1.example.com | 00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +peer0.org1.example.com | "2019-09-24 00:27:20.102 UTC [msp.identity] Verify -> DEBU 6db3 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +peer0.org1.example.com | 00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +peer0.org1.example.com | 00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +peer0.org1.example.com | 00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +peer0.org1.example.com | 00000040 64 b0 a4 4b e9 a8 |d..K..|" +peer0.org1.example.com | "2019-09-24 00:27:20.102 UTC [cauthdsl] func2 -> DEBU 6db4 0xc005219e70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.102 UTC [cauthdsl] func1 -> DEBU 6db5 0xc005219e70 gate 1569284840101942700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:20.103 UTC [policies] Evaluate -> DEBU 6db6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.103 UTC [policies] Evaluate -> DEBU 6db7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.103 UTC [policies] Evaluate -> DEBU 6db8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.103 UTC [policies] Evaluate -> DEBU 6db9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.104 UTC [msp.identity] Verify -> DEBU 6dba Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +peer0.org1.example.com | 00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +peer0.org1.example.com | "2019-09-24 00:27:20.104 UTC [msp.identity] Verify -> DEBU 6dbb Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +peer0.org1.example.com | 00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +peer0.org1.example.com | 00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +peer0.org1.example.com | 00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +peer0.org1.example.com | 00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +peer0.org1.example.com | "2019-09-24 00:27:20.104 UTC [msp.identity] Verify -> DEBU 6dbc Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:20.105 UTC [msp.identity] Verify -> DEBU 6dbd Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:20.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6dbe Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6dbf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.106 UTC [policies] Evaluate -> DEBU 6dc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.106 UTC [policies] Evaluate -> DEBU 6dc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:20.106 UTC [policies] Evaluate -> DEBU 6dc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.106 UTC [msp] DeserializeIdentity -> DEBU 6dc3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.107 UTC [msp.identity] newIdentity -> DEBU 6dc4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:20.107 UTC [cauthdsl] func1 -> DEBU 6dc5 0xc005233c90 gate 1569284840107329800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.107 UTC [cauthdsl] func2 -> DEBU 6dc6 0xc005233c90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.107 UTC [cauthdsl] func2 -> DEBU 6dc7 0xc005233c90 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.107 UTC [cauthdsl] func2 -> DEBU 6dc8 0xc005233c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-09-24 00:27:20.107 UTC [cauthdsl] func2 -> DEBU 6dc9 0xc005233c90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:20.107 UTC [cauthdsl] func1 -> DEBU 6dca 0xc005233c90 gate 1569284840107329800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:20.108 UTC [policies] Evaluate -> DEBU 6dcb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.108 UTC [policies] Evaluate -> DEBU 6dcc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.108 UTC [policies] Evaluate -> DEBU 6dcd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.108 UTC [cauthdsl] func1 -> DEBU 6dce 0xc005246e10 gate 1569284840108687800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.108 UTC [cauthdsl] func2 -> DEBU 6dcf 0xc005246e10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.108 UTC [cauthdsl] func2 -> DEBU 6dd0 0xc005246e10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.109 UTC [cauthdsl] func2 -> DEBU 6dd1 0xc005246e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +peer0.org1.example.com | "2019-09-24 00:27:20.109 UTC [cauthdsl] func2 -> DEBU 6dd2 0xc005246e10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:20.109 UTC [cauthdsl] func1 -> DEBU 6dd3 0xc005246e10 gate 1569284840108687800 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:20.109 UTC [policies] Evaluate -> DEBU 6dd4 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.109 UTC [policies] Evaluate -> DEBU 6dd5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.109 UTC [policies] Evaluate -> DEBU 6dd6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.109 UTC [cauthdsl] func1 -> DEBU 6dd7 0xc005247670 gate 1569284840109831200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.109 UTC [cauthdsl] func2 -> DEBU 6dd8 0xc005247670 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.110 UTC [cauthdsl] func2 -> DEBU 6dd9 0xc005247670 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.110 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6dda Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:20.110 UTC [msp] Validate -> DEBU 6ddb MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:20.110 UTC [msp] getCertificationChain -> DEBU 6ddc MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:20.110 UTC [cauthdsl] func2 -> DEBU 6ddd 0xc005247670 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.111 UTC [msp.identity] Verify -> DEBU 6dde Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:20.111 UTC [msp.identity] Verify -> DEBU 6ddf Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:20.111 UTC [cauthdsl] func2 -> DEBU 6de0 0xc005247670 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.112 UTC [cauthdsl] func1 -> DEBU 6de1 0xc005247670 gate 1569284840109831200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:20.112 UTC [policies] Evaluate -> DEBU 6de2 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.112 UTC [policies] Evaluate -> DEBU 6de3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.112 UTC [policies] Evaluate -> DEBU 6de4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.112 UTC [policies] Evaluate -> DEBU 6de5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.113 UTC [gossip.gossip] handleMessage -> DEBU 6de6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.113 UTC [gossip.gossip] handleMessage -> DEBU 6de7 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.113 UTC [msp.identity] Verify -> DEBU 6de8 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +peer0.org1.example.com | 00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +peer0.org1.example.com | "2019-09-24 00:27:20.113 UTC [msp.identity] Verify -> DEBU 6de9 Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +peer0.org1.example.com | 00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +peer0.org1.example.com | 00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +peer0.org1.example.com | 00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +peer0.org1.example.com | 00000040 54 87 75 e6 8e 00 |T.u...|" +peer0.org1.example.com | "2019-09-24 00:27:20.114 UTC [msp] DeserializeIdentity -> DEBU 6dea Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.114 UTC [gossip.gossip] handleMessage -> DEBU 6deb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.297 UTC [msp] DeserializeIdentity -> DEBU 6dec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.297 UTC [msp] DeserializeIdentity -> DEBU 6ded Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.298 UTC [gossip.pull] Hello -> DEBU 6dee Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:20.298 UTC [msp] DeserializeIdentity -> DEBU 6def Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.299 UTC [msp] DeserializeIdentity -> DEBU 6df0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.299 UTC [gossip.comm] Send -> DEBU 6df1 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:20.299 UTC [gossip.comm] sendToEndpoint -> DEBU 6df2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.299 UTC [gossip.comm] sendToEndpoint -> DEBU 6df3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.301 UTC [gossip.comm] func1 -> DEBU 6df4 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.301 UTC [gossip.gossip] handleMessage -> DEBU 6df5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.302 UTC [gossip.pull] HandleMessage -> DEBU 6df6 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.302 UTC [gossip.gossip] handleMessage -> DEBU 6df7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.545 UTC [gossip.comm] func1 -> DEBU 6df8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.546 UTC [gossip.gossip] handleMessage -> DEBU 6df9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.546 UTC [msp] DeserializeIdentity -> DEBU 6dfa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.547 UTC [msp] DeserializeIdentity -> DEBU 6dfb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.547 UTC [gossip.gossip] handleMessage -> DEBU 6dfc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.557 UTC [gossip.comm] func1 -> DEBU 6dfd Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.557 UTC [gossip.gossip] handleMessage -> DEBU 6dfe Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.557 UTC [msp.identity] Verify -> DEBU 6dff Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:20.557 UTC [msp.identity] Verify -> DEBU 6e00 Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:20.558 UTC [gossip.gossip] handleMessage -> DEBU 6e01 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.560 UTC [gossip.comm] func1 -> DEBU 6e02 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.560 UTC [gossip.gossip] handleMessage -> DEBU 6e03 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.561 UTC [msp.identity] Verify -> DEBU 6e04 Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:20.561 UTC [msp.identity] Verify -> DEBU 6e05 Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:20.561 UTC [msp] DeserializeIdentity -> DEBU 6e06 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.562 UTC [gossip.gossip] handleMessage -> DEBU 6e07 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.567 UTC [gossip.comm] func1 -> DEBU 6e08 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.567 UTC [gossip.gossip] handleMessage -> DEBU 6e09 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.568 UTC [msp.identity] Verify -> DEBU 6e0a Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:20.568 UTC [msp.identity] Verify -> DEBU 6e0b Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:20.569 UTC [msp] DeserializeIdentity -> DEBU 6e0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.569 UTC [gossip.gossip] handleMessage -> DEBU 6e0d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.644 UTC [gossip.comm] func1 -> DEBU 6e0e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.644 UTC [gossip.gossip] handleMessage -> DEBU 6e0f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.644 UTC [gossip.gossip] handleMessage -> DEBU 6e10 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.645 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e11 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.645 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6e12 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:20.645 UTC [msp] DeserializeIdentity -> DEBU 6e13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.645 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6e14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:20.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e15 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e16 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.646 UTC [policies] Evaluate -> DEBU 6e17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.646 UTC [policies] Evaluate -> DEBU 6e18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:20.646 UTC [policies] Evaluate -> DEBU 6e19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.646 UTC [cauthdsl] func1 -> DEBU 6e1a 0xc0052a44a0 gate 1569284840646876100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.648 UTC [cauthdsl] func2 -> DEBU 6e1b 0xc0052a44a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.648 UTC [cauthdsl] func2 -> DEBU 6e1c 0xc0052a44a0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.648 UTC [cauthdsl] func2 -> DEBU 6e1d 0xc0052a44a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.648 UTC [msp.identity] Verify -> DEBU 6e1e Verify: digest = 00000000 9d a8 2f ec 3b e2 03 e8 c7 51 1e ae 0d 40 82 d7 |../.;....Q...@..| +peer0.org1.example.com | 00000010 5d d7 39 3c 30 14 47 9e 66 84 f8 b5 46 3d dc 09 |].9<0.G.f...F=..|" +peer0.org1.example.com | "2019-09-24 00:27:20.648 UTC [msp.identity] Verify -> DEBU 6e1f Verify: sig = 00000000 30 45 02 21 00 f7 20 17 ed aa 59 3e 61 89 54 27 |0E.!.. ...Y>a.T'| +peer0.org1.example.com | 00000010 18 f6 d1 21 78 a0 1d 1a 23 df 54 f9 1f a1 d1 32 |...!x...#.T....2| +peer0.org1.example.com | 00000020 5b 0f ad cb 31 02 20 27 41 05 17 94 89 de cf 00 |[...1. 'A.......| +peer0.org1.example.com | 00000030 c3 78 cb 2c 58 f4 33 d0 b9 d9 04 e0 5e 5f e8 d0 |.x.,X.3.....^_..| +peer0.org1.example.com | 00000040 9b 9d ae 2e 3d ec 4c |....=.L|" +peer0.org1.example.com | "2019-09-24 00:27:20.649 UTC [cauthdsl] func2 -> DEBU 6e20 0xc0052a44a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.649 UTC [cauthdsl] func1 -> DEBU 6e21 0xc0052a44a0 gate 1569284840646876100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:20.649 UTC [policies] Evaluate -> DEBU 6e22 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.649 UTC [policies] Evaluate -> DEBU 6e23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.649 UTC [policies] Evaluate -> DEBU 6e24 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.649 UTC [policies] Evaluate -> DEBU 6e25 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 6e26 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e27 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:20.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e28 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:20.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e2a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:20.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e2b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:20.651 UTC [gossip.comm] func1 -> DEBU 6e29 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e2d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.652 UTC [gossip.gossip] handleMessage -> DEBU 6e2c Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.652 UTC [gossip.discovery] handleAliveMessage -> DEBU 6e2e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e2f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.653 UTC [gossip.gossip] handleMessage -> DEBU 6e30 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e31 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e32 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e33 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e34 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e35 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e36 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e37 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.655 UTC [gossip.comm] Send -> DEBU 6e38 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:20.655 UTC [msp] DeserializeIdentity -> DEBU 6e39 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.656 UTC [msp] DeserializeIdentity -> DEBU 6e3a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.656 UTC [gossip.comm] Send -> DEBU 6e3b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:20.656 UTC [gossip.comm] sendToEndpoint -> DEBU 6e3c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.657 UTC [gossip.comm] sendToEndpoint -> DEBU 6e3d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.657 UTC [gossip.comm] sendToEndpoint -> DEBU 6e3e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.657 UTC [gossip.comm] sendToEndpoint -> DEBU 6e3f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.654 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e40 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.660 UTC [gossip.comm] func1 -> DEBU 6e41 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.660 UTC [gossip.gossip] handleMessage -> DEBU 6e42 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.660 UTC [gossip.gossip] handleMessage -> DEBU 6e43 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.660 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e44 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.660 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e45 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.741 UTC [gossip.comm] func1 -> DEBU 6e46 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.742 UTC [gossip.gossip] handleMessage -> DEBU 6e47 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.742 UTC [gossip.gossip] handleMessage -> DEBU 6e48 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.743 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e49 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.743 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6e4a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:20.744 UTC [msp] DeserializeIdentity -> DEBU 6e4b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.744 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6e4c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:20.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e4d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e4e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:20.746 UTC [policies] Evaluate -> DEBU 6e4f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.746 UTC [policies] Evaluate -> DEBU 6e50 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:20.746 UTC [policies] Evaluate -> DEBU 6e51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:20.747 UTC [cauthdsl] func1 -> DEBU 6e52 0xc0052c5920 gate 1569284840747494300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:20.747 UTC [cauthdsl] func2 -> DEBU 6e53 0xc0052c5920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:20.748 UTC [cauthdsl] func2 -> DEBU 6e54 0xc0052c5920 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:20.748 UTC [cauthdsl] func2 -> DEBU 6e55 0xc0052c5920 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.748 UTC [msp.identity] Verify -> DEBU 6e56 Verify: digest = 00000000 25 da 91 3c 0a df 00 04 fd bf 16 3d 22 5a 52 b8 |%..<.......="ZR.| +peer0.org1.example.com | 00000010 3a 79 59 6a 5d 5e 30 37 7d ee b5 d3 0c 88 17 1e |:yYj]^07}.......|" +peer0.org1.example.com | "2019-09-24 00:27:20.749 UTC [msp.identity] Verify -> DEBU 6e57 Verify: sig = 00000000 30 44 02 20 45 38 d3 83 00 69 cc d0 e4 f0 b9 7a |0D. E8...i.....z| +peer0.org1.example.com | 00000010 6f aa c3 5a 42 e5 08 22 4b 34 17 f1 cd 3d 7d be |o..ZB.."K4...=}.| +peer0.org1.example.com | 00000020 2c c5 a2 f3 02 20 08 4e 28 dd 82 b6 4c 3a 71 e4 |,.... .N(...L:q.| +peer0.org1.example.com | 00000030 11 a9 61 34 29 c7 e0 45 de 27 a8 17 8d ff 1b 95 |..a4)..E.'......| +peer0.org1.example.com | 00000040 f3 35 0a 05 4f cf |.5..O.|" +peer0.org1.example.com | "2019-09-24 00:27:20.749 UTC [cauthdsl] func2 -> DEBU 6e58 0xc0052c5920 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:20.749 UTC [cauthdsl] func1 -> DEBU 6e59 0xc0052c5920 gate 1569284840747494300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:20.749 UTC [policies] Evaluate -> DEBU 6e5a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.750 UTC [policies] Evaluate -> DEBU 6e5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.750 UTC [policies] Evaluate -> DEBU 6e5c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.750 UTC [policies] Evaluate -> DEBU 6e5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:20.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 6e5e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e5f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:20.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e60 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:20.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e61 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:20.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e62 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:20.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e63 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.752 UTC [gossip.discovery] handleAliveMessage -> DEBU 6e64 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e65 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.752 UTC [gossip.discovery] sendMemResponse -> DEBU 6e66 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:27:20.753 UTC [msp] DeserializeIdentity -> DEBU 6e67 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.754 UTC [msp] DeserializeIdentity -> DEBU 6e68 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.754 UTC [msp] DeserializeIdentity -> DEBU 6e69 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.754 UTC [gossip.comm] Send -> DEBU 6e6a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:20.755 UTC [gossip.comm] sendToEndpoint -> DEBU 6e6b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.755 UTC [gossip.comm] sendToEndpoint -> DEBU 6e6d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.755 UTC [gossip.discovery] sendMemResponse -> DEBU 6e6c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:20.786 UTC [gossip.comm] func1 -> DEBU 6e6e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.787 UTC [gossip.gossip] handleMessage -> DEBU 6e6f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.788 UTC [gossip.pull] HandleMessage -> DEBU 6e70 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.789 UTC [msp] DeserializeIdentity -> DEBU 6e71 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.789 UTC [msp] DeserializeIdentity -> DEBU 6e72 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.789 UTC [msp] DeserializeIdentity -> DEBU 6e73 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.790 UTC [msp] DeserializeIdentity -> DEBU 6e74 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.790 UTC [msp] DeserializeIdentity -> DEBU 6e75 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.791 UTC [msp] DeserializeIdentity -> DEBU 6e76 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:20.791 UTC [gossip.pull] SendDigest -> DEBU 6e77 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:27:20.792 UTC [gossip.gossip] handleMessage -> DEBU 6e78 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:20.807 UTC [gossip.comm] func1 -> DEBU 6e79 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.808 UTC [gossip.gossip] handleMessage -> DEBU 6e7a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.809 UTC [gossip.pull] HandleMessage -> DEBU 6e7b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:20.809 UTC [gossip.pull] SendDigest -> DEBU 6e7c Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:20.809 UTC [gossip.gossip] handleMessage -> DEBU 6e7d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:21.040 UTC [gossip.comm] func1 -> DEBU 6e7e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.040 UTC [gossip.gossip] handleMessage -> DEBU 6e7f Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.040 UTC [msp] DeserializeIdentity -> DEBU 6e80 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.041 UTC [msp] DeserializeIdentity -> DEBU 6e81 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.041 UTC [msp] DeserializeIdentity -> DEBU 6e82 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.042 UTC [gossip.gossip] handleMessage -> DEBU 6e83 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:21.049 UTC [gossip.comm] func1 -> DEBU 6e84 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.049 UTC [gossip.gossip] handleMessage -> DEBU 6e85 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.050 UTC [msp] DeserializeIdentity -> DEBU 6e86 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.050 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6e87 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:21.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e88 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:21.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e89 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:21.051 UTC [policies] Evaluate -> DEBU 6e8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:21.051 UTC [policies] Evaluate -> DEBU 6e8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:21.051 UTC [policies] Evaluate -> DEBU 6e8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:21.051 UTC [cauthdsl] func1 -> DEBU 6e8d 0xc0052b3260 gate 1569284841051431400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:21.051 UTC [cauthdsl] func2 -> DEBU 6e8e 0xc0052b3260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:21.051 UTC [cauthdsl] func2 -> DEBU 6e8f 0xc0052b3260 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:21.051 UTC [cauthdsl] func2 -> DEBU 6e90 0xc0052b3260 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:21.052 UTC [msp.identity] Verify -> DEBU 6e91 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:21.052 UTC [msp.identity] Verify -> DEBU 6e92 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:21.052 UTC [cauthdsl] func2 -> DEBU 6e93 0xc0052b3260 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:21.052 UTC [cauthdsl] func1 -> DEBU 6e94 0xc0052b3260 gate 1569284841051431400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:21.052 UTC [policies] Evaluate -> DEBU 6e95 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.052 UTC [policies] Evaluate -> DEBU 6e96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.053 UTC [policies] Evaluate -> DEBU 6e97 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.053 UTC [policies] Evaluate -> DEBU 6e98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.053 UTC [msp] DeserializeIdentity -> DEBU 6e99 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.053 UTC [gossip.gossip] handleMessage -> DEBU 6e9a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:21.056 UTC [gossip.comm] func1 -> DEBU 6e9b Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.056 UTC [gossip.gossip] handleMessage -> DEBU 6e9c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.056 UTC [msp] DeserializeIdentity -> DEBU 6e9d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.056 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6e9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:21.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e9f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:21.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ea0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:21.057 UTC [policies] Evaluate -> DEBU 6ea1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:21.057 UTC [policies] Evaluate -> DEBU 6ea2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:21.057 UTC [policies] Evaluate -> DEBU 6ea3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:21.057 UTC [cauthdsl] func1 -> DEBU 6ea4 0xc0052ef690 gate 1569284841057890900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:21.057 UTC [cauthdsl] func2 -> DEBU 6ea5 0xc0052ef690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:21.058 UTC [cauthdsl] func2 -> DEBU 6ea6 0xc0052ef690 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:21.058 UTC [cauthdsl] func2 -> DEBU 6ea7 0xc0052ef690 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:21.058 UTC [msp.identity] Verify -> DEBU 6ea8 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:21.058 UTC [msp.identity] Verify -> DEBU 6ea9 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:21.058 UTC [cauthdsl] func2 -> DEBU 6eaa 0xc0052ef690 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:21.059 UTC [cauthdsl] func1 -> DEBU 6eab 0xc0052ef690 gate 1569284841057890900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:21.059 UTC [policies] Evaluate -> DEBU 6eac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.059 UTC [policies] Evaluate -> DEBU 6ead == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.059 UTC [policies] Evaluate -> DEBU 6eae Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.059 UTC [policies] Evaluate -> DEBU 6eaf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.059 UTC [msp] DeserializeIdentity -> DEBU 6eb0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.059 UTC [gossip.gossip] handleMessage -> DEBU 6eb1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:21.617 UTC [gossip.comm] func1 -> DEBU 6eb2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.617 UTC [gossip.gossip] handleMessage -> DEBU 6eb3 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.617 UTC [gossip.pull] HandleMessage -> DEBU 6eb4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.617 UTC [gossip.pull] SendDigest -> DEBU 6eb5 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:21.618 UTC [gossip.gossip] handleMessage -> DEBU 6eb6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:21.752 UTC [gossip.comm] func1 -> DEBU 6eb7 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020]" signature:"0E\002!\000\361\271L+\277\324\000^z\203\216\263\325\265\223D\256\377-\232\364\302\3740\211ED\203l\220\204\356`\346\r\350\002 U\n\355At\366h\252\277\005\322\3031?\202\305r.\376\356\017\032@\357o\270\265)\027\370\332\305" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.753 UTC [gossip.gossip] handleMessage -> DEBU 6eb8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020]" signature:"0E\002!\000\361\271L+\277\324\000^z\203\216\263\325\265\223D\256\377-\232\364\302\3740\211ED\203l\220\204\356`\346\r\350\002 U\n\355At\366h\252\277\005\322\3031?\202\305r.\376\356\017\032@\357o\270\265)\027\370\332\305" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.755 UTC [gossip.gossip] handleMessage -> DEBU 6eb9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:21.755 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6eba Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020]" signature:"0E\002!\000\361\271L+\277\324\000^z\203\216\263\325\265\223D\256\377-\232\364\302\3740\211ED\203l\220\204\356`\346\r\350\002 U\n\355At\366h\252\277\005\322\3031?\202\305r.\376\356\017\032@\357o\270\265)\027\370\332\305" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.756 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6ebb Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:21.757 UTC [msp.identity] Verify -> DEBU 6ebc Verify: digest = 00000000 05 75 d0 5e bf e6 37 85 00 58 92 da 25 2d a2 3b |.u.^..7..X..%-.;| +peer0.org1.example.com | 00000010 ba ae 49 ae da 15 dd 2a aa 98 8b 0b 3f 86 de 4f |..I....*....?..O|" +peer0.org1.example.com | "2019-09-24 00:27:21.757 UTC [msp.identity] Verify -> DEBU 6ebd Verify: sig = 00000000 30 45 02 21 00 f1 b9 4c 2b bf d4 00 5e 7a 83 8e |0E.!...L+...^z..| +peer0.org1.example.com | 00000010 b3 d5 b5 93 44 ae ff 2d 9a f4 c2 fc 30 89 45 44 |....D..-....0.ED| +peer0.org1.example.com | 00000020 83 6c 90 3c 72 02 20 12 57 25 95 c2 24 c8 af 55 |.l. DEBU 6ebe Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:27:21.759 UTC [msp.identity] Verify -> DEBU 6ebf Verify: sig = 00000000 30 44 02 20 0c 72 6e 8a b9 66 85 45 65 e5 6d 8a |0D. .rn..f.Ee.m.| +peer0.org1.example.com | 00000010 9c 9f 5d e2 10 a1 b4 93 1f 51 42 4c a8 3e 84 ee |..]......QBL.>..| +peer0.org1.example.com | 00000020 60 e6 0d e8 02 20 55 0a ed 41 74 f6 68 aa bf 05 |`.... U..At.h...| +peer0.org1.example.com | 00000030 d2 c3 31 3f 82 c5 72 2e fe ee 0f 1a 40 ef 6f b8 |..1?..r.....@.o.| +peer0.org1.example.com | 00000040 b5 29 17 f8 da c5 |.)....|" +peer0.org1.example.com | "2019-09-24 00:27:21.759 UTC [gossip.discovery] handleAliveMessage -> DEBU 6ec0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ec1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ec2 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ec3 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:21.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ec4 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:21.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ec5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:21.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 6ec6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:21.761 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6ec7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:21.761 UTC [gossip.discovery] sendMemResponse -> DEBU 6ec8 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:27:21.761 UTC [msp] DeserializeIdentity -> DEBU 6ec9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.761 UTC [msp] DeserializeIdentity -> DEBU 6eca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.761 UTC [gossip.comm] Send -> DEBU 6ecb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:21.762 UTC [gossip.discovery] sendMemResponse -> DEBU 6ecc Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020]" signature:"0E\002!\000\361\271L+\277\324\000^z\203\216\263\325\265\223D\256\377-\232\364\302\3740\211ED\203l\220\204\356`\346\r\350\002 U\n\355At\366h\252\277\005\322\3031?\202\305r.\376\356\017\032@\357o\270\265)\027\370\332\305" > > alive: " +peer0.org1.example.com | "2019-09-24 00:27:21.762 UTC [gossip.comm] sendToEndpoint -> DEBU 6ecd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.762 UTC [gossip.comm] sendToEndpoint -> DEBU 6ece Exiting" +peer0.org1.example.com | "2019-09-24 00:27:21.976 UTC [gossip.comm] func1 -> DEBU 6ecf Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.976 UTC [gossip.gossip] handleMessage -> DEBU 6ed0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.978 UTC [msp] DeserializeIdentity -> DEBU 6ed1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.978 UTC [msp] DeserializeIdentity -> DEBU 6ed2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.978 UTC [msp] DeserializeIdentity -> DEBU 6ed3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.978 UTC [gossip.gossip] handleMessage -> DEBU 6ed4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:21.986 UTC [gossip.comm] func1 -> DEBU 6ed5 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.987 UTC [gossip.gossip] handleMessage -> DEBU 6ed6 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:21.987 UTC [msp] DeserializeIdentity -> DEBU 6ed7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.987 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6ed8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:21.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ed9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:21.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6eda Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:21.987 UTC [policies] Evaluate -> DEBU 6edb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:21.987 UTC [policies] Evaluate -> DEBU 6edc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:21.988 UTC [policies] Evaluate -> DEBU 6edd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:21.988 UTC [cauthdsl] func1 -> DEBU 6ede 0xc005352070 gate 1569284841988132300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:21.988 UTC [cauthdsl] func2 -> DEBU 6edf 0xc005352070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:21.988 UTC [cauthdsl] func2 -> DEBU 6ee0 0xc005352070 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:21.988 UTC [cauthdsl] func2 -> DEBU 6ee1 0xc005352070 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:21.988 UTC [msp.identity] Verify -> DEBU 6ee2 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:21.988 UTC [msp.identity] Verify -> DEBU 6ee3 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:21.989 UTC [cauthdsl] func2 -> DEBU 6ee4 0xc005352070 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:21.989 UTC [cauthdsl] func1 -> DEBU 6ee5 0xc005352070 gate 1569284841988132300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:21.989 UTC [policies] Evaluate -> DEBU 6ee6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.989 UTC [policies] Evaluate -> DEBU 6ee7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.989 UTC [policies] Evaluate -> DEBU 6ee8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.989 UTC [policies] Evaluate -> DEBU 6ee9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:21.989 UTC [msp] DeserializeIdentity -> DEBU 6eea Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:21.989 UTC [gossip.gossip] handleMessage -> DEBU 6eeb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.291 UTC [gossip.election] waitForInterrupt -> DEBU 6eec c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.292 UTC [gossip.election] IsLeader -> DEBU 6eed c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:27:22.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 6eee Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:22.293 UTC [msp.identity] Sign -> DEBU 6eef Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101E1801 " +peer0.org1.example.com | "2019-09-24 00:27:22.294 UTC [msp.identity] Sign -> DEBU 6ef0 Sign: digest: 2B28382C4F64C5E00443530CAEA01CE53D96983ABEC0A0E31439F8218DA906F1 " +peer0.org1.example.com | "2019-09-24 00:27:22.294 UTC [gossip.election] waitForInterrupt -> DEBU 6ef1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:27:22.295 UTC [msp] DeserializeIdentity -> DEBU 6ef2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:22.295 UTC [msp] DeserializeIdentity -> DEBU 6ef3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:22.295 UTC [msp] DeserializeIdentity -> DEBU 6ef4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:22.296 UTC [msp] DeserializeIdentity -> DEBU 6ef5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:22.296 UTC [gossip.comm] Send -> DEBU 6ef6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:22.296 UTC [msp] DeserializeIdentity -> DEBU 6ef7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:22.297 UTC [msp] DeserializeIdentity -> DEBU 6ef8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:22.297 UTC [gossip.comm] sendToEndpoint -> DEBU 6ef9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.297 UTC [gossip.comm] sendToEndpoint -> DEBU 6efa Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.671 UTC [gossip.comm] func1 -> DEBU 6efb Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.671 UTC [gossip.gossip] handleMessage -> DEBU 6efc Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.672 UTC [gossip.gossip] handleMessage -> DEBU 6efd Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6efe Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.672 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6eff Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:22.673 UTC [msp.identity] Verify -> DEBU 6f00 Verify: digest = 00000000 19 fb 40 d7 de 6c 44 81 9a 5f e1 55 30 2f 94 14 |..@..lD.._.U0/..| +peer0.org1.example.com | 00000010 5b 8d 95 59 6f 02 5f 52 b7 98 da 05 69 4c d7 ce |[..Yo._R....iL..|" +peer0.org1.example.com | "2019-09-24 00:27:22.674 UTC [msp.identity] Verify -> DEBU 6f01 Verify: sig = 00000000 30 44 02 20 27 ca b6 52 a2 d5 f5 e4 b0 88 44 bd |0D. '..R......D.| +peer0.org1.example.com | 00000010 e7 10 ae 22 58 9f 81 5d c4 76 ec e8 41 1e 9f d4 |..."X..].v..A...| +peer0.org1.example.com | 00000020 52 38 10 e1 02 20 6d 2a 24 11 13 53 c0 bd c2 b0 |R8... m*$..S....| +peer0.org1.example.com | 00000030 f2 57 8e 39 04 72 19 92 cc 00 e6 c6 20 c4 f5 54 |.W.9.r...... ..T| +peer0.org1.example.com | 00000040 f0 06 00 31 ad 2b |...1.+|" +peer0.org1.example.com | "2019-09-24 00:27:22.675 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f02 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 6f03 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:22.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 6f04 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:22.676 UTC [gossip.discovery] learnExistingMembers -> DEBU 6f05 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:22.676 UTC [gossip.discovery] learnExistingMembers -> DEBU 6f06 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:22.677 UTC [gossip.discovery] learnExistingMembers -> DEBU 6f07 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.677 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f08 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f09 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.680 UTC [msp] DeserializeIdentity -> DEBU 6f0a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:22.680 UTC [msp] DeserializeIdentity -> DEBU 6f0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:22.681 UTC [msp] DeserializeIdentity -> DEBU 6f0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:22.682 UTC [gossip.comm] Send -> DEBU 6f0d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:22.682 UTC [msp] DeserializeIdentity -> DEBU 6f0e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:22.682 UTC [gossip.comm] Send -> DEBU 6f0f Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:22.683 UTC [gossip.comm] sendToEndpoint -> DEBU 6f10 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.683 UTC [gossip.comm] sendToEndpoint -> DEBU 6f11 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.684 UTC [gossip.comm] sendToEndpoint -> DEBU 6f12 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.684 UTC [gossip.comm] sendToEndpoint -> DEBU 6f13 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.685 UTC [gossip.comm] func1 -> DEBU 6f14 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.685 UTC [gossip.gossip] handleMessage -> DEBU 6f16 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.685 UTC [gossip.gossip] handleMessage -> DEBU 6f17 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.685 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f18 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f19 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.685 UTC [gossip.comm] func1 -> DEBU 6f15 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.686 UTC [gossip.gossip] handleMessage -> DEBU 6f1a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.686 UTC [gossip.gossip] handleMessage -> DEBU 6f1b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f1c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f1d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.700 UTC [gossip.pull] Hello -> DEBU 6f1e Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:23.700 UTC [gossip.comm] Send -> DEBU 6f1f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:23.700 UTC [gossip.pull] Hello -> DEBU 6f20 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:23.701 UTC [gossip.comm] Send -> DEBU 6f21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:23.701 UTC [gossip.pull] Hello -> DEBU 6f22 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:23.701 UTC [gossip.comm] Send -> DEBU 6f23 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:23.701 UTC [gossip.comm] sendToEndpoint -> DEBU 6f24 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.701 UTC [gossip.comm] sendToEndpoint -> DEBU 6f25 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.702 UTC [gossip.comm] sendToEndpoint -> DEBU 6f26 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.702 UTC [gossip.comm] sendToEndpoint -> DEBU 6f27 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.702 UTC [gossip.comm] sendToEndpoint -> DEBU 6f28 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.702 UTC [gossip.comm] sendToEndpoint -> DEBU 6f29 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.704 UTC [gossip.comm] func1 -> DEBU 6f2a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.704 UTC [gossip.comm] func1 -> DEBU 6f2c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.704 UTC [gossip.gossip] handleMessage -> DEBU 6f2d Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.705 UTC [gossip.pull] HandleMessage -> DEBU 6f2e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.704 UTC [gossip.comm] func1 -> DEBU 6f2b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.706 UTC [gossip.gossip] handleMessage -> DEBU 6f2f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.707 UTC [gossip.gossip] handleMessage -> DEBU 6f30 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.707 UTC [gossip.pull] HandleMessage -> DEBU 6f31 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.708 UTC [gossip.gossip] handleMessage -> DEBU 6f32 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.709 UTC [gossip.gossip] handleMessage -> DEBU 6f33 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.709 UTC [gossip.pull] HandleMessage -> DEBU 6f34 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.709 UTC [gossip.gossip] handleMessage -> DEBU 6f35 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.836 UTC [msp] GetDefaultSigningIdentity -> DEBU 6f36 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:23.836 UTC [msp.identity] Sign -> DEBU 6f37 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151058 " +peer0.org1.example.com | "2019-09-24 00:27:23.836 UTC [msp.identity] Sign -> DEBU 6f38 Sign: digest: F9A7A0E08E4A7694D9A40D4CB45631827FB63CF57D2C2D9DB559AD129454772A " +peer0.org1.example.com | "2019-09-24 00:27:23.836 UTC [msp] GetDefaultSigningIdentity -> DEBU 6f39 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:23.836 UTC [msp.identity] Sign -> DEBU 6f3a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:23.837 UTC [msp.identity] Sign -> DEBU 6f3b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:23.837 UTC [msp] DeserializeIdentity -> DEBU 6f3c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:23.837 UTC [gossip.comm] Send -> DEBU 6f3d Entering, sending GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:23.837 UTC [gossip.comm] Send -> DEBU 6f3e Entering, sending GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:23.837 UTC [msp] DeserializeIdentity -> DEBU 6f3f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:23.837 UTC [gossip.comm] Send -> DEBU 6f40 Entering, sending GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:23.837 UTC [gossip.comm] sendToEndpoint -> DEBU 6f41 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.837 UTC [gossip.comm] sendToEndpoint -> DEBU 6f42 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.837 UTC [gossip.comm] sendToEndpoint -> DEBU 6f43 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.838 UTC [gossip.comm] sendToEndpoint -> DEBU 6f44 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.837 UTC [gossip.comm] sendToEndpoint -> DEBU 6f45 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.838 UTC [gossip.comm] sendToEndpoint -> DEBU 6f46 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.840 UTC [gossip.comm] func1 -> DEBU 6f47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.840 UTC [gossip.gossip] handleMessage -> DEBU 6f48 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.840 UTC [gossip.gossip] handleMessage -> DEBU 6f49 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.840 UTC [gossip.comm] func1 -> DEBU 6f4a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.841 UTC [gossip.gossip] handleMessage -> DEBU 6f4d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.840 UTC [gossip.comm] func1 -> DEBU 6f4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.841 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.842 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6f4e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:23.842 UTC [msp.identity] Verify -> DEBU 6f4f Verify: digest = 00000000 f9 a7 a0 e0 8e 4a 76 94 d9 a4 0d 4c b4 56 31 82 |.....Jv....L.V1.| +peer0.org1.example.com | 00000010 7f b6 3c f5 7d 2c 2d 9d b5 59 ad 12 94 54 77 2a |..<.},-..Y...Tw*|" +peer0.org1.example.com | "2019-09-24 00:27:23.843 UTC [msp.identity] Verify -> DEBU 6f50 Verify: sig = 00000000 30 45 02 21 00 89 20 34 a2 4f 07 e2 37 15 4f 0e |0E.!.. 4.O..7.O.| +peer0.org1.example.com | 00000010 6f 76 b1 f2 1e 8c 28 0f 13 e5 a1 d1 7f a4 c1 a0 |ov....(.........| +peer0.org1.example.com | 00000020 57 dc 6d d7 0e 02 20 30 40 e3 7c 35 c7 ce d1 09 |W.m... 0@.|5....| +peer0.org1.example.com | 00000030 53 76 69 32 4b 12 f5 52 7d ea 87 b1 c5 34 4f 33 |Svi2K..R}....4O3| +peer0.org1.example.com | 00000040 a5 c4 15 0b 2d c6 3e |....-.>|" +peer0.org1.example.com | "2019-09-24 00:27:23.843 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f51 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.843 UTC [gossip.discovery] isSentByMe -> DEBU 6f52 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.844 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f53 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6f54 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:23.844 UTC [msp] DeserializeIdentity -> DEBU 6f55 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:23.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6f56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:23.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6f57 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:23.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6f58 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:23.845 UTC [policies] Evaluate -> DEBU 6f59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:23.846 UTC [policies] Evaluate -> DEBU 6f5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:23.846 UTC [policies] Evaluate -> DEBU 6f5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:23.846 UTC [cauthdsl] func1 -> DEBU 6f5c 0xc0053d98b0 gate 1569284843846588500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:23.846 UTC [cauthdsl] func2 -> DEBU 6f5d 0xc0053d98b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:23.847 UTC [cauthdsl] func2 -> DEBU 6f5e 0xc0053d98b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:23.847 UTC [cauthdsl] func2 -> DEBU 6f5f 0xc0053d98b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:23.847 UTC [msp.identity] Verify -> DEBU 6f60 Verify: digest = 00000000 25 da 91 3c 0a df 00 04 fd bf 16 3d 22 5a 52 b8 |%..<.......="ZR.| +peer0.org1.example.com | 00000010 3a 79 59 6a 5d 5e 30 37 7d ee b5 d3 0c 88 17 1e |:yYj]^07}.......|" +peer0.org1.example.com | "2019-09-24 00:27:23.847 UTC [msp.identity] Verify -> DEBU 6f61 Verify: sig = 00000000 30 44 02 20 45 38 d3 83 00 69 cc d0 e4 f0 b9 7a |0D. E8...i.....z| +peer0.org1.example.com | 00000010 6f aa c3 5a 42 e5 08 22 4b 34 17 f1 cd 3d 7d be |o..ZB.."K4...=}.| +peer0.org1.example.com | 00000020 2c c5 a2 f3 02 20 08 4e 28 dd 82 b6 4c 3a 71 e4 |,.... .N(...L:q.| +peer0.org1.example.com | 00000030 11 a9 61 34 29 c7 e0 45 de 27 a8 17 8d ff 1b 95 |..a4)..E.'......| +peer0.org1.example.com | 00000040 f3 35 0a 05 4f cf |.5..O.|" +peer0.org1.example.com | "2019-09-24 00:27:23.848 UTC [cauthdsl] func2 -> DEBU 6f62 0xc0053d98b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:23.848 UTC [cauthdsl] func1 -> DEBU 6f63 0xc0053d98b0 gate 1569284843846588500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:23.848 UTC [policies] Evaluate -> DEBU 6f64 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:23.849 UTC [policies] Evaluate -> DEBU 6f65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:23.849 UTC [policies] Evaluate -> DEBU 6f66 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:23.849 UTC [policies] Evaluate -> DEBU 6f67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:23.849 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f68 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.850 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f69 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f6a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.850 UTC [gossip.gossip] handleMessage -> DEBU 6f6b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.850 UTC [gossip.gossip] handleMessage -> DEBU 6f6c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f6d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6f6e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:23.851 UTC [msp.identity] Verify -> DEBU 6f6f Verify: digest = 00000000 f9 a7 a0 e0 8e 4a 76 94 d9 a4 0d 4c b4 56 31 82 |.....Jv....L.V1.| +peer0.org1.example.com | 00000010 7f b6 3c f5 7d 2c 2d 9d b5 59 ad 12 94 54 77 2a |..<.},-..Y...Tw*|" +peer0.org1.example.com | "2019-09-24 00:27:23.851 UTC [msp.identity] Verify -> DEBU 6f70 Verify: sig = 00000000 30 45 02 21 00 89 20 34 a2 4f 07 e2 37 15 4f 0e |0E.!.. 4.O..7.O.| +peer0.org1.example.com | 00000010 6f 76 b1 f2 1e 8c 28 0f 13 e5 a1 d1 7f a4 c1 a0 |ov....(.........| +peer0.org1.example.com | 00000020 57 dc 6d d7 0e 02 20 30 40 e3 7c 35 c7 ce d1 09 |W.m... 0@.|5....| +peer0.org1.example.com | 00000030 53 76 69 32 4b 12 f5 52 7d ea 87 b1 c5 34 4f 33 |Svi2K..R}....4O3| +peer0.org1.example.com | 00000040 a5 c4 15 0b 2d c6 3e |....-.>|" +peer0.org1.example.com | "2019-09-24 00:27:23.851 UTC [msp.identity] Verify -> DEBU 6f71 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:27:23.851 UTC [msp.identity] Verify -> DEBU 6f72 Verify: sig = 00000000 30 43 02 1f 66 9a 84 23 dd c8 96 e6 07 3f bc 0e |0C..f..#.....?..| +peer0.org1.example.com | 00000010 ac 26 e5 ca 93 52 9f 38 2f b6 9b 2d 50 52 97 c9 |.&...R.8/..-PR..| +peer0.org1.example.com | 00000020 fe e6 50 02 20 3d 05 b9 86 74 8e d1 c9 b7 db 7e |..P. =...t.....~| +peer0.org1.example.com | 00000030 38 14 26 cf be f0 5c ee 62 12 4c b4 17 51 32 dd |8.&...\.b.L..Q2.| +peer0.org1.example.com | 00000040 33 39 4b 95 f1 |39K..|" +peer0.org1.example.com | "2019-09-24 00:27:23.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f73 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.851 UTC [gossip.discovery] isSentByMe -> DEBU 6f74 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f75 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f76 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f77 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.852 UTC [gossip.gossip] handleMessage -> DEBU 6f78 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.852 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6f79 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:23.853 UTC [msp.identity] Verify -> DEBU 6f7a Verify: digest = 00000000 f9 a7 a0 e0 8e 4a 76 94 d9 a4 0d 4c b4 56 31 82 |.....Jv....L.V1.| +peer0.org1.example.com | 00000010 7f b6 3c f5 7d 2c 2d 9d b5 59 ad 12 94 54 77 2a |..<.},-..Y...Tw*|" +peer0.org1.example.com | "2019-09-24 00:27:23.853 UTC [msp.identity] Verify -> DEBU 6f7b Verify: sig = 00000000 30 45 02 21 00 89 20 34 a2 4f 07 e2 37 15 4f 0e |0E.!.. 4.O..7.O.| +peer0.org1.example.com | 00000010 6f 76 b1 f2 1e 8c 28 0f 13 e5 a1 d1 7f a4 c1 a0 |ov....(.........| +peer0.org1.example.com | 00000020 57 dc 6d d7 0e 02 20 30 40 e3 7c 35 c7 ce d1 09 |W.m... 0@.|5....| +peer0.org1.example.com | 00000030 53 76 69 32 4b 12 f5 52 7d ea 87 b1 c5 34 4f 33 |Svi2K..R}....4O3| +peer0.org1.example.com | 00000040 a5 c4 15 0b 2d c6 3e |....-.>|" +peer0.org1.example.com | "2019-09-24 00:27:23.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f7c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.854 UTC [gossip.discovery] isSentByMe -> DEBU 6f7d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f7e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6f7f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [msp] DeserializeIdentity -> DEBU 6f80 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6f81 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6f82 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6f83 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f84 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f85 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f86 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [cauthdsl] func1 -> DEBU 6f87 0xc0054053e0 gate 1569284843855517800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [cauthdsl] func2 -> DEBU 6f88 0xc0054053e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [cauthdsl] func2 -> DEBU 6f89 0xc0054053e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [cauthdsl] func2 -> DEBU 6f8a 0xc0054053e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [msp.identity] Verify -> DEBU 6f8b Verify: digest = 00000000 30 9d 24 5a 67 49 98 bd 15 e2 81 43 15 40 6e 56 |0.$ZgI.....C.@nV| +peer0.org1.example.com | 00000010 3a 47 00 65 f9 aa ed a3 a0 96 84 ad 03 5c 64 8c |:G.e.........\d.|" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [msp.identity] Verify -> DEBU 6f8c Verify: sig = 00000000 30 45 02 21 00 b6 c2 ed 69 38 4a 2b d6 78 bb b3 |0E.!....i8J+.x..| +peer0.org1.example.com | 00000010 81 3f 1d 7e db 6d 02 c3 be c3 30 c8 f2 2e b7 d4 |.?.~.m....0.....| +peer0.org1.example.com | 00000020 1a bd 0d c2 75 02 20 6b ea 07 39 ca 87 e3 7e 10 |....u. k..9...~.| +peer0.org1.example.com | 00000030 9a 23 a1 3d ff d1 ea f5 5a 6d a9 6e 79 37 39 4f |.#.=....Zm.ny79O| +peer0.org1.example.com | 00000040 6e d0 43 77 cc ef 94 |n.Cw...|" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [cauthdsl] func2 -> DEBU 6f8d 0xc0054053e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [cauthdsl] func1 -> DEBU 6f8e 0xc0054053e0 gate 1569284843855517800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f8f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f90 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f91 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:23.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f93 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f94 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f95 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.882 UTC [gossip.comm] func1 -> DEBU 6f96 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.884 UTC [gossip.gossip] handleMessage -> DEBU 6f97 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.886 UTC [gossip.pull] HandleMessage -> DEBU 6f98 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.887 UTC [msp] DeserializeIdentity -> DEBU 6f99 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:23.888 UTC [msp] DeserializeIdentity -> DEBU 6f9a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:23.888 UTC [msp] DeserializeIdentity -> DEBU 6f9b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:23.888 UTC [msp] DeserializeIdentity -> DEBU 6f9c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:23.889 UTC [msp] DeserializeIdentity -> DEBU 6f9d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:23.889 UTC [msp] DeserializeIdentity -> DEBU 6f9e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:23.889 UTC [gossip.pull] SendDigest -> DEBU 6f9f Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:27:23.889 UTC [gossip.gossip] handleMessage -> DEBU 6fa0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.992 UTC [gossip.comm] func1 -> DEBU 6fa1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.992 UTC [gossip.gossip] handleMessage -> DEBU 6fa2 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.994 UTC [gossip.gossip] handleMessage -> DEBU 6fa3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:23.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6fa4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:23.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6fa5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:23.997 UTC [msp] DeserializeIdentity -> DEBU 6fa6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:23.997 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fa7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:23.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6fa8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:23.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6fa9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:23.997 UTC [policies] Evaluate -> DEBU 6faa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:23.997 UTC [policies] Evaluate -> DEBU 6fab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:23.997 UTC [policies] Evaluate -> DEBU 6fac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:23.997 UTC [cauthdsl] func1 -> DEBU 6fad 0xc005419d30 gate 1569284843997926100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:23.997 UTC [cauthdsl] func2 -> DEBU 6fae 0xc005419d30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:23.998 UTC [cauthdsl] func2 -> DEBU 6faf 0xc005419d30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:23.998 UTC [cauthdsl] func2 -> DEBU 6fb0 0xc005419d30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:23.998 UTC [msp.identity] Verify -> DEBU 6fb1 Verify: digest = 00000000 2b 9f 63 53 9d 2a cc 2a ae 19 73 6c e1 d6 69 1c |+.cS.*.*..sl..i.| +peer0.org1.example.com | 00000010 3c 08 3d db 6d 35 b8 89 31 6b bd 6d f7 ac d1 7e |<.=.m5..1k.m...~|" +peer0.org1.example.com | "2019-09-24 00:27:23.998 UTC [msp.identity] Verify -> DEBU 6fb2 Verify: sig = 00000000 30 44 02 20 26 cc 72 29 80 04 98 24 ef eb 12 a9 |0D. &.r)...$....| +peer0.org1.example.com | 00000010 ee c2 0f 05 fa d5 d2 30 dc 7e 11 69 7f f1 8c 8b |.......0.~.i....| +peer0.org1.example.com | 00000020 8a 29 8b 3a 02 20 12 c8 e5 27 0b 49 d9 47 0c 3a |.).:. ...'.I.G.:| +peer0.org1.example.com | 00000030 82 17 2a 5a 86 de 9e fc 7f e1 23 10 d8 3d ee e7 |..*Z......#..=..| +peer0.org1.example.com | 00000040 84 5e ea 54 7c c6 |.^.T|.|" +peer0.org1.example.com | "2019-09-24 00:27:23.998 UTC [cauthdsl] func2 -> DEBU 6fb3 0xc005419d30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:23.998 UTC [cauthdsl] func1 -> DEBU 6fb4 0xc005419d30 gate 1569284843997926100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:23.998 UTC [policies] Evaluate -> DEBU 6fb5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:23.998 UTC [policies] Evaluate -> DEBU 6fb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:23.998 UTC [policies] Evaluate -> DEBU 6fb7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:23.998 UTC [policies] Evaluate -> DEBU 6fb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.000 UTC [gossip.discovery] handleAliveMessage -> DEBU 6fb9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6fba Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:24.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6fbb updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:24.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6fbc Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:24.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6fbd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:24.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6fbe Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.001 UTC [gossip.discovery] handleAliveMessage -> DEBU 6fbf Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6fc0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.001 UTC [gossip.discovery] sendMemResponse -> DEBU 6fc1 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:27:24.001 UTC [msp] DeserializeIdentity -> DEBU 6fc2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.002 UTC [msp] DeserializeIdentity -> DEBU 6fc3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.002 UTC [msp] DeserializeIdentity -> DEBU 6fc4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.002 UTC [gossip.comm] Send -> DEBU 6fc5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:24.002 UTC [gossip.discovery] sendMemResponse -> DEBU 6fc6 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020^" signature:"0D\002 '\312\266R\242\325\365\344\260\210D\275\347\020\256\"X\237\201]\304v\354\350A\036\237\324R8\020\341\002 m*$\021\023S\300\275\302\260\362W\2169\004r\031\222\314\000\346\306 \304\365T\360\006\0001\255+" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:24.002 UTC [gossip.comm] sendToEndpoint -> DEBU 6fc7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.003 UTC [gossip.comm] sendToEndpoint -> DEBU 6fc8 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.045 UTC [msp] DeserializeIdentity -> DEBU 6fc9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.046 UTC [msp] DeserializeIdentity -> DEBU 6fca Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.046 UTC [gossip.comm] Send -> DEBU 6fcb Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fcc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fcd Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fcf Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fd0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fd1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.047 UTC [gossip.comm] func1 -> DEBU 6fd2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.047 UTC [gossip.gossip] handleMessage -> DEBU 6fd3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.047 UTC [msp] DeserializeIdentity -> DEBU 6fd4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.048 UTC [msp] DeserializeIdentity -> DEBU 6fd5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.048 UTC [msp] DeserializeIdentity -> DEBU 6fd6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.049 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fd7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:24.049 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6fd8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.049 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6fd9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.049 UTC [policies] Evaluate -> DEBU 6fda == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.049 UTC [policies] Evaluate -> DEBU 6fdb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:24.049 UTC [policies] Evaluate -> DEBU 6fdc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.049 UTC [cauthdsl] func1 -> DEBU 6fdd 0xc0054535d0 gate 1569284844049940500 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:24.050 UTC [cauthdsl] func2 -> DEBU 6fde 0xc0054535d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:24.050 UTC [cauthdsl] func2 -> DEBU 6fdf 0xc0054535d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:24.050 UTC [cauthdsl] func2 -> DEBU 6fe0 0xc0054535d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.050 UTC [msp.identity] Verify -> DEBU 6fe1 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:24.050 UTC [msp.identity] Verify -> DEBU 6fe2 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:24.050 UTC [cauthdsl] func2 -> DEBU 6fe3 0xc0054535d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.050 UTC [cauthdsl] func1 -> DEBU 6fe4 0xc0054535d0 gate 1569284844049940500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:24.050 UTC [policies] Evaluate -> DEBU 6fe5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.051 UTC [policies] Evaluate -> DEBU 6fe6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.051 UTC [policies] Evaluate -> DEBU 6fe7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.051 UTC [policies] Evaluate -> DEBU 6fe8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.051 UTC [msp.identity] Verify -> DEBU 6fe9 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +peer0.org1.example.com | 00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +peer0.org1.example.com | "2019-09-24 00:27:24.051 UTC [msp.identity] Verify -> DEBU 6fea Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +peer0.org1.example.com | 00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +peer0.org1.example.com | 00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +peer0.org1.example.com | 00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +peer0.org1.example.com | 00000040 54 87 75 e6 8e 00 |T.u...|" +peer0.org1.example.com | "2019-09-24 00:27:24.051 UTC [gossip.comm] func1 -> DEBU 6feb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.052 UTC [gossip.comm] func1 -> DEBU 6fed Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.051 UTC [msp.identity] Verify -> DEBU 6fec Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:24.052 UTC [msp.identity] Verify -> DEBU 6fee Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:24.053 UTC [msp] DeserializeIdentity -> DEBU 6fef Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.053 UTC [msp] DeserializeIdentity -> DEBU 6ff0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.053 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6ff1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:24.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ff2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ff3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.054 UTC [policies] Evaluate -> DEBU 6ff4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.055 UTC [policies] Evaluate -> DEBU 6ff5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:24.055 UTC [policies] Evaluate -> DEBU 6ff6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.055 UTC [cauthdsl] func1 -> DEBU 6ff7 0xc00548a550 gate 1569284844055610300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:24.055 UTC [cauthdsl] func2 -> DEBU 6ff8 0xc00548a550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:24.056 UTC [cauthdsl] func2 -> DEBU 6ff9 0xc00548a550 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:24.056 UTC [cauthdsl] func2 -> DEBU 6ffa 0xc00548a550 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.056 UTC [msp.identity] Verify -> DEBU 6ffb Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:24.056 UTC [msp.identity] Verify -> DEBU 6ffc Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:24.057 UTC [cauthdsl] func2 -> DEBU 6ffd 0xc00548a550 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.057 UTC [cauthdsl] func1 -> DEBU 6ffe 0xc00548a550 gate 1569284844055610300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:24.057 UTC [policies] Evaluate -> DEBU 6fff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.057 UTC [policies] Evaluate -> DEBU 7000 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.058 UTC [policies] Evaluate -> DEBU 7001 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.058 UTC [policies] Evaluate -> DEBU 7002 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.058 UTC [gossip.gossip] handleMessage -> DEBU 7003 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.058 UTC [gossip.gossip] handleMessage -> DEBU 7004 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.059 UTC [msp] DeserializeIdentity -> DEBU 7005 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.059 UTC [msp] DeserializeIdentity -> DEBU 7006 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.059 UTC [msp] DeserializeIdentity -> DEBU 7007 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.060 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7008 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:24.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7009 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 700a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.060 UTC [policies] Evaluate -> DEBU 700b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.061 UTC [policies] Evaluate -> DEBU 700c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:24.061 UTC [policies] Evaluate -> DEBU 700d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.061 UTC [cauthdsl] func1 -> DEBU 700e 0xc00549a060 gate 1569284844061852100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:24.062 UTC [cauthdsl] func2 -> DEBU 700f 0xc00549a060 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:24.062 UTC [cauthdsl] func2 -> DEBU 7010 0xc00549a060 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:24.062 UTC [cauthdsl] func2 -> DEBU 7011 0xc00549a060 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.062 UTC [msp.identity] Verify -> DEBU 7012 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:24.062 UTC [msp.identity] Verify -> DEBU 7013 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:24.062 UTC [cauthdsl] func2 -> DEBU 7014 0xc00549a060 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.062 UTC [cauthdsl] func1 -> DEBU 7015 0xc00549a060 gate 1569284844061852100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:24.062 UTC [policies] Evaluate -> DEBU 7016 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.062 UTC [policies] Evaluate -> DEBU 7017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.062 UTC [policies] Evaluate -> DEBU 7018 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.062 UTC [policies] Evaluate -> DEBU 7019 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 701a Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +peer0.org1.example.com | 00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 701b Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +peer0.org1.example.com | 00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +peer0.org1.example.com | 00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +peer0.org1.example.com | 00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +peer0.org1.example.com | 00000040 54 87 75 e6 8e 00 |T.u...|" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 701c Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 701d Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [msp] DeserializeIdentity -> DEBU 701e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [msp] DeserializeIdentity -> DEBU 701f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7020 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7021 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7022 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [policies] Evaluate -> DEBU 7023 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [policies] Evaluate -> DEBU 7024 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [policies] Evaluate -> DEBU 7025 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [cauthdsl] func1 -> DEBU 7026 0xc0054b4670 gate 1569284844063838800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [cauthdsl] func2 -> DEBU 7027 0xc0054b4670 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [cauthdsl] func2 -> DEBU 7028 0xc0054b4670 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [cauthdsl] func2 -> DEBU 7029 0xc0054b4670 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 702a Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 702b Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [cauthdsl] func2 -> DEBU 702c 0xc0054b4670 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [cauthdsl] func1 -> DEBU 702d 0xc0054b4670 gate 1569284844063838800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [policies] Evaluate -> DEBU 702e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [policies] Evaluate -> DEBU 702f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [policies] Evaluate -> DEBU 7030 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [policies] Evaluate -> DEBU 7031 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [gossip.gossip] handleMessage -> DEBU 7032 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [gossip.gossip] handleMessage -> DEBU 7033 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [msp.identity] Verify -> DEBU 7034 Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [msp.identity] Verify -> DEBU 7035 Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [msp.identity] Verify -> DEBU 7036 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +peer0.org1.example.com | 00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [msp.identity] Verify -> DEBU 7037 Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +peer0.org1.example.com | 00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +peer0.org1.example.com | 00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +peer0.org1.example.com | 00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +peer0.org1.example.com | 00000040 54 87 75 e6 8e 00 |T.u...|" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [msp] DeserializeIdentity -> DEBU 7038 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.064 UTC [msp] DeserializeIdentity -> DEBU 7039 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 703a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 703b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 703c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 703d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 703e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 703f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [cauthdsl] func1 -> DEBU 7040 0xc0054c6ec0 gate 1569284844065207700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [cauthdsl] func2 -> DEBU 7041 0xc0054c6ec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [cauthdsl] func2 -> DEBU 7042 0xc0054c6ec0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [cauthdsl] func2 -> DEBU 7043 0xc0054c6ec0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [msp.identity] Verify -> DEBU 7044 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [msp.identity] Verify -> DEBU 7045 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [cauthdsl] func2 -> DEBU 7046 0xc0054c6ec0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [cauthdsl] func1 -> DEBU 7047 0xc0054c6ec0 gate 1569284844065207700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 7048 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 7049 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 704a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 704b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [msp] DeserializeIdentity -> DEBU 704c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [msp] DeserializeIdentity -> DEBU 704d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 704e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 704f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7050 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 7051 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 7052 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 7053 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [cauthdsl] func1 -> DEBU 7054 0xc0054e0690 gate 1569284844066064600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [cauthdsl] func2 -> DEBU 7055 0xc0054e0690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [cauthdsl] func2 -> DEBU 7056 0xc0054e0690 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [cauthdsl] func2 -> DEBU 7057 0xc0054e0690 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [msp.identity] Verify -> DEBU 7058 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [msp.identity] Verify -> DEBU 7059 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [cauthdsl] func2 -> DEBU 705a 0xc0054e0690 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [cauthdsl] func1 -> DEBU 705b 0xc0054e0690 gate 1569284844066064600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 705c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 705d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 705e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 705f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.066 UTC [gossip.gossip] handleMessage -> DEBU 7060 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.300 UTC [msp] DeserializeIdentity -> DEBU 7061 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.300 UTC [msp] DeserializeIdentity -> DEBU 7062 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.301 UTC [gossip.pull] Hello -> DEBU 7063 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:24.301 UTC [msp] DeserializeIdentity -> DEBU 7064 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.301 UTC [msp] DeserializeIdentity -> DEBU 7065 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.302 UTC [gossip.comm] Send -> DEBU 7066 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:24.302 UTC [gossip.comm] sendToEndpoint -> DEBU 7067 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.302 UTC [gossip.comm] sendToEndpoint -> DEBU 7068 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.303 UTC [gossip.comm] func1 -> DEBU 7069 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.303 UTC [gossip.gossip] handleMessage -> DEBU 706a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.303 UTC [gossip.pull] HandleMessage -> DEBU 706b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.303 UTC [gossip.gossip] handleMessage -> DEBU 706c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.544 UTC [gossip.comm] func1 -> DEBU 706d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.545 UTC [gossip.gossip] handleMessage -> DEBU 706e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.545 UTC [msp] DeserializeIdentity -> DEBU 706f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.545 UTC [msp] DeserializeIdentity -> DEBU 7070 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.545 UTC [gossip.gossip] handleMessage -> DEBU 7071 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.568 UTC [msp] GetDefaultSigningIdentity -> DEBU 7072 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:24.568 UTC [msp.identity] Sign -> DEBU 7073 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151059 " +peer0.org1.example.com | "2019-09-24 00:27:24.568 UTC [msp.identity] Sign -> DEBU 7074 Sign: digest: 675049EC181F889800B1B6FA32004FBC371BD799D695FA7F47EF4A509EE51C61 " +peer0.org1.example.com | "2019-09-24 00:27:24.568 UTC [msp] GetDefaultSigningIdentity -> DEBU 7075 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:24.568 UTC [msp.identity] Sign -> DEBU 7076 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:24.568 UTC [msp.identity] Sign -> DEBU 7077 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:24.568 UTC [gossip.discovery] periodicalSendAlive -> DEBU 7078 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:27:24.574 UTC [msp] DeserializeIdentity -> DEBU 7079 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.575 UTC [msp] DeserializeIdentity -> DEBU 707a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.575 UTC [gossip.comm] Send -> DEBU 707b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:24.576 UTC [msp] DeserializeIdentity -> DEBU 707c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.576 UTC [gossip.comm] sendToEndpoint -> DEBU 707d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.576 UTC [gossip.comm] sendToEndpoint -> DEBU 707e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.577 UTC [gossip.comm] Send -> DEBU 707f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:24.577 UTC [msp] DeserializeIdentity -> DEBU 7080 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.577 UTC [gossip.comm] sendToEndpoint -> DEBU 7081 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.578 UTC [gossip.comm] sendToEndpoint -> DEBU 7082 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.578 UTC [gossip.comm] Send -> DEBU 7083 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:24.580 UTC [gossip.comm] sendToEndpoint -> DEBU 7084 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.580 UTC [gossip.comm] sendToEndpoint -> DEBU 7085 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.741 UTC [gossip.comm] func1 -> DEBU 7086 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.741 UTC [gossip.gossip] handleMessage -> DEBU 7087 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.741 UTC [gossip.gossip] handleMessage -> DEBU 7088 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.742 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7089 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.742 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 708a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:24.743 UTC [msp] DeserializeIdentity -> DEBU 708b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.743 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 708c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:24.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 708d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 708e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.744 UTC [policies] Evaluate -> DEBU 708f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.747 UTC [policies] Evaluate -> DEBU 7090 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:24.747 UTC [policies] Evaluate -> DEBU 7091 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.747 UTC [cauthdsl] func1 -> DEBU 7092 0xc0054f5c50 gate 1569284844747692100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:24.747 UTC [cauthdsl] func2 -> DEBU 7093 0xc0054f5c50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:24.748 UTC [cauthdsl] func2 -> DEBU 7094 0xc0054f5c50 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:24.748 UTC [cauthdsl] func2 -> DEBU 7095 0xc0054f5c50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.748 UTC [msp.identity] Verify -> DEBU 7096 Verify: digest = 00000000 05 23 93 96 33 fc b2 48 b3 d2 39 9b 5f 2c 66 24 |.#..3..H..9._,f$| +peer0.org1.example.com | 00000010 c1 e7 3a 15 11 53 53 a4 fe 16 72 66 bd 7a 0c 94 |..:..SS...rf.z..|" +peer0.org1.example.com | "2019-09-24 00:27:24.749 UTC [msp.identity] Verify -> DEBU 7097 Verify: sig = 00000000 30 45 02 21 00 be 89 67 35 d2 fa 72 30 24 cf 69 |0E.!...g5..r0$.i| +peer0.org1.example.com | 00000010 d3 85 5b ca cf 13 b4 ed c1 23 fe 8c a2 9c 1b 6b |..[......#.....k| +peer0.org1.example.com | 00000020 ca 6f 68 dc 41 02 20 47 13 09 cb d5 96 84 8b 07 |.oh.A. G........| +peer0.org1.example.com | 00000030 a3 78 ad 98 bd 98 d4 99 31 9a 26 a3 3f 6f 6a 75 |.x......1.&.?oju| +peer0.org1.example.com | 00000040 ab ab bc 5f 4c 68 f7 |..._Lh.|" +peer0.org1.example.com | "2019-09-24 00:27:24.749 UTC [cauthdsl] func2 -> DEBU 7098 0xc0054f5c50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.750 UTC [cauthdsl] func1 -> DEBU 7099 0xc0054f5c50 gate 1569284844747692100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:24.750 UTC [policies] Evaluate -> DEBU 709a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.750 UTC [policies] Evaluate -> DEBU 709b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.750 UTC [policies] Evaluate -> DEBU 709c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.750 UTC [policies] Evaluate -> DEBU 709d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.751 UTC [gossip.discovery] handleAliveMessage -> DEBU 709e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 709f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:24.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 70a0 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:24.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 70a1 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:24.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 70a2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:24.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 70a3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.753 UTC [gossip.discovery] handleAliveMessage -> DEBU 70a4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.753 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70a5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.754 UTC [gossip.discovery] sendMemResponse -> DEBU 70a6 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:27:24.754 UTC [msp] DeserializeIdentity -> DEBU 70a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.754 UTC [msp] DeserializeIdentity -> DEBU 70a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.754 UTC [msp] DeserializeIdentity -> DEBU 70a9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.754 UTC [gossip.comm] Send -> DEBU 70aa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:24.755 UTC [gossip.discovery] sendMemResponse -> DEBU 70ab Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020^" signature:"0D\002 '\312\266R\242\325\365\344\260\210D\275\347\020\256\"X\237\201]\304v\354\350A\036\237\324R8\020\341\002 m*$\021\023S\300\275\302\260\362W\2169\004r\031\222\314\000\346\306 \304\365T\360\006\0001\255+" > alive: alive: alive:\257\"\3775I\247UX\263=\220\317-\252\356\276\362" > " +peer0.org1.example.com | "2019-09-24 00:27:24.755 UTC [gossip.comm] sendToEndpoint -> DEBU 70ac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.755 UTC [gossip.comm] sendToEndpoint -> DEBU 70ad Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.788 UTC [gossip.comm] func1 -> DEBU 70ae Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.789 UTC [gossip.gossip] handleMessage -> DEBU 70af Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.789 UTC [gossip.pull] HandleMessage -> DEBU 70b0 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.789 UTC [msp] DeserializeIdentity -> DEBU 70b1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.789 UTC [msp] DeserializeIdentity -> DEBU 70b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.790 UTC [msp] DeserializeIdentity -> DEBU 70b3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.790 UTC [msp] DeserializeIdentity -> DEBU 70b4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.790 UTC [msp] DeserializeIdentity -> DEBU 70b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.790 UTC [msp] DeserializeIdentity -> DEBU 70b6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.790 UTC [gossip.pull] SendDigest -> DEBU 70b7 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:27:24.790 UTC [gossip.gossip] handleMessage -> DEBU 70b8 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.809 UTC [gossip.comm] func1 -> DEBU 70b9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.809 UTC [gossip.gossip] handleMessage -> DEBU 70ba Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.810 UTC [gossip.pull] HandleMessage -> DEBU 70bb GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.810 UTC [gossip.pull] SendDigest -> DEBU 70bc Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:24.810 UTC [gossip.gossip] handleMessage -> DEBU 70bd Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.912 UTC [gossip.comm] func1 -> DEBU 70be Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.912 UTC [gossip.gossip] handleMessage -> DEBU 70bf Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.913 UTC [gossip.gossip] handleMessage -> DEBU 70c0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.913 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70c1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.914 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 70c2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:24.914 UTC [msp] DeserializeIdentity -> DEBU 70c3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.914 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:24.914 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70c5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.914 UTC [gossip.comm] func1 -> DEBU 70c6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.914 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70c7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:24.914 UTC [policies] Evaluate -> DEBU 70c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.914 UTC [policies] Evaluate -> DEBU 70c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:24.914 UTC [gossip.gossip] handleMessage -> DEBU 70ca Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.914 UTC [policies] Evaluate -> DEBU 70cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:24.915 UTC [cauthdsl] func1 -> DEBU 70cc 0xc005548870 gate 1569284844915077600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:24.915 UTC [cauthdsl] func2 -> DEBU 70cd 0xc005548870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:24.915 UTC [cauthdsl] func2 -> DEBU 70ce 0xc005548870 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:24.915 UTC [cauthdsl] func2 -> DEBU 70cf 0xc005548870 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.915 UTC [msp.identity] Verify -> DEBU 70d0 Verify: digest = 00000000 fc 89 84 ab 89 04 58 c5 e2 e0 89 0b 20 b4 4c 86 |......X..... .L.| +peer0.org1.example.com | 00000010 de 86 75 9c 37 64 35 59 99 37 60 18 a2 91 5f b3 |..u.7d5Y.7`..._.|" +peer0.org1.example.com | "2019-09-24 00:27:24.915 UTC [msp.identity] Verify -> DEBU 70d1 Verify: sig = 00000000 30 44 02 20 62 72 2d 46 b6 4c a1 5f 44 73 da 0d |0D. br-F.L._Ds..| +peer0.org1.example.com | 00000010 89 2b 81 b4 71 06 00 ce 07 56 5b 40 4f 88 ca 28 |.+..q....V[@O..(| +peer0.org1.example.com | 00000020 32 e7 ce ca 02 20 66 e2 d2 7b ad 65 f6 97 c8 20 |2.... f..{.e... | +peer0.org1.example.com | 00000030 a7 2c cd 89 97 40 62 3f 2c 58 86 c3 a5 36 da 76 |.,...@b?,X...6.v| +peer0.org1.example.com | 00000040 90 bf 6f 56 55 39 |..oVU9|" +peer0.org1.example.com | "2019-09-24 00:27:24.916 UTC [cauthdsl] func2 -> DEBU 70d2 0xc005548870 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:24.916 UTC [cauthdsl] func1 -> DEBU 70d3 0xc005548870 gate 1569284844915077600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:24.916 UTC [policies] Evaluate -> DEBU 70d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.916 UTC [policies] Evaluate -> DEBU 70d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.916 UTC [policies] Evaluate -> DEBU 70d6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.916 UTC [policies] Evaluate -> DEBU 70d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:24.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 70d8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.916 UTC [gossip.discovery] learnExistingMembers -> DEBU 70d9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:24.916 UTC [gossip.discovery] learnExistingMembers -> DEBU 70da updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:24.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 70dc Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:24.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 70dd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:24.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 70de Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.918 UTC [gossip.comm] func1 -> DEBU 70db Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 70df Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70e0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.919 UTC [gossip.gossip] handleMessage -> DEBU 70e1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70e2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70e4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.920 UTC [gossip.gossip] handleMessage -> DEBU 70e3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.921 UTC [gossip.gossip] handleMessage -> DEBU 70e5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70e6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70e7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.922 UTC [msp] DeserializeIdentity -> DEBU 70e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70e9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.924 UTC [gossip.comm] Send -> DEBU 70ef Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:24.924 UTC [msp] DeserializeIdentity -> DEBU 70f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.924 UTC [msp] DeserializeIdentity -> DEBU 70f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:24.924 UTC [gossip.comm] Send -> DEBU 70f2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:24.924 UTC [gossip.comm] sendToEndpoint -> DEBU 70f3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.924 UTC [gossip.comm] sendToEndpoint -> DEBU 70f4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:24.925 UTC [gossip.comm] sendToEndpoint -> DEBU 70f5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:24.925 UTC [gossip.comm] sendToEndpoint -> DEBU 70f6 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.038 UTC [gossip.comm] func1 -> DEBU 70f7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.038 UTC [gossip.gossip] handleMessage -> DEBU 70f8 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.038 UTC [msp] DeserializeIdentity -> DEBU 70f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.039 UTC [msp] DeserializeIdentity -> DEBU 70fa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.039 UTC [msp] DeserializeIdentity -> DEBU 70fb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.039 UTC [gossip.gossip] handleMessage -> DEBU 70fc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.620 UTC [gossip.comm] func1 -> DEBU 70fd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.620 UTC [gossip.gossip] handleMessage -> DEBU 70fe Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.620 UTC [gossip.pull] HandleMessage -> DEBU 70ff GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.621 UTC [gossip.pull] SendDigest -> DEBU 7100 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:25.621 UTC [gossip.gossip] handleMessage -> DEBU 7101 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [gossip.comm] func1 -> DEBU 7102 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [gossip.gossip] handleMessage -> DEBU 7103 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [gossip.gossip] handleMessage -> DEBU 7104 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7105 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7106 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [msp] DeserializeIdentity -> DEBU 7107 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7108 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7109 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 710a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [policies] Evaluate -> DEBU 710b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [policies] Evaluate -> DEBU 710c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [policies] Evaluate -> DEBU 710d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [cauthdsl] func1 -> DEBU 710e 0xc005580140 gate 1569284845635652200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [cauthdsl] func2 -> DEBU 710f 0xc005580140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [cauthdsl] func2 -> DEBU 7110 0xc005580140 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [cauthdsl] func2 -> DEBU 7111 0xc005580140 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [msp.identity] Verify -> DEBU 7112 Verify: digest = 00000000 bd a4 25 81 86 0e fd 3f d0 b6 65 a1 34 c5 39 81 |..%....?..e.4.9.| +peer0.org1.example.com | 00000010 06 ec 81 25 33 2f ff 39 8a d6 93 ad b0 53 f8 55 |...%3/.9.....S.U|" +peer0.org1.example.com | "2019-09-24 00:27:25.635 UTC [msp.identity] Verify -> DEBU 7113 Verify: sig = 00000000 30 44 02 20 29 76 09 93 dd 06 e5 59 84 6c b8 74 |0D. )v.....Y.l.t| +peer0.org1.example.com | 00000010 e4 f6 4a bd 44 20 b1 8c 14 6a 8b e2 7b 86 7a 3a |..J.D ...j..{.z:| +peer0.org1.example.com | 00000020 c7 28 73 95 02 20 20 b4 c3 90 7a 64 26 c8 78 7f |.(s.. ...zd&.x.| +peer0.org1.example.com | 00000030 6b 14 2e df 49 13 84 c4 f7 ea 72 80 31 c0 6b 9c |k...I.....r.1.k.| +peer0.org1.example.com | 00000040 73 87 0d 42 81 c5 |s..B..|" +peer0.org1.example.com | "2019-09-24 00:27:25.636 UTC [cauthdsl] func2 -> DEBU 7114 0xc005580140 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:25.636 UTC [cauthdsl] func1 -> DEBU 7115 0xc005580140 gate 1569284845635652200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:25.636 UTC [policies] Evaluate -> DEBU 7116 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:25.636 UTC [policies] Evaluate -> DEBU 7117 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:25.636 UTC [policies] Evaluate -> DEBU 7118 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:25.636 UTC [policies] Evaluate -> DEBU 7119 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:25.636 UTC [gossip.discovery] handleAliveMessage -> DEBU 711a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 711b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:25.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 711c updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:25.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 711d Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:25.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 711e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:25.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 711f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 7120 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7121 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.640 UTC [gossip.comm] func1 -> DEBU 7122 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.640 UTC [gossip.gossip] handleMessage -> DEBU 7123 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.640 UTC [gossip.gossip] handleMessage -> DEBU 7124 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.640 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7125 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.640 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7126 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.642 UTC [gossip.comm] func1 -> DEBU 7127 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.643 UTC [gossip.gossip] handleMessage -> DEBU 7128 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.643 UTC [gossip.gossip] handleMessage -> DEBU 7129 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.643 UTC [gossip.discovery] handleMsgFromComm -> DEBU 712a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.643 UTC [gossip.discovery] handleMsgFromComm -> DEBU 712b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 712c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 712d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 712e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 712f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 7130 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 7131 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 7132 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.645 UTC [gossip.comm] Send -> DEBU 7133 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:25.645 UTC [msp] DeserializeIdentity -> DEBU 7134 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.646 UTC [gossip.comm] Send -> DEBU 7136 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:25.646 UTC [gossip.comm] sendToEndpoint -> DEBU 7135 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.646 UTC [gossip.comm] sendToEndpoint -> DEBU 7137 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.646 UTC [gossip.comm] sendToEndpoint -> DEBU 7138 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.646 UTC [gossip.comm] sendToEndpoint -> DEBU 7139 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.752 UTC [gossip.comm] func1 -> DEBU 713a Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020_" signature:"0D\002 _\205)P\310e\327\262\235\240S\253p\232U4=\243\352\302pH\341\017\223\335H\367g,T3\002 o\313C\347\031P;t-'z\216\321\255\033![.\3219\000\276\001\256\022\327A\354\221\316\347y" secret_envelope:K\214K\303\311O\232\016\325\316\023\365ALCJ*" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.752 UTC [gossip.gossip] handleMessage -> DEBU 713b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020_" signature:"0D\002 _\205)P\310e\327\262\235\240S\253p\232U4=\243\352\302pH\341\017\223\335H\367g,T3\002 o\313C\347\031P;t-'z\216\321\255\033![.\3219\000\276\001\256\022\327A\354\221\316\347y" secret_envelope:K\214K\303\311O\232\016\325\316\023\365ALCJ*" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.752 UTC [gossip.gossip] handleMessage -> DEBU 713c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 713d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020_" signature:"0D\002 _\205)P\310e\327\262\235\240S\253p\232U4=\243\352\302pH\341\017\223\335H\367g,T3\002 o\313C\347\031P;t-'z\216\321\255\033![.\3219\000\276\001\256\022\327A\354\221\316\347y" secret_envelope:K\214K\303\311O\232\016\325\316\023\365ALCJ*" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.752 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 713e Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:25.752 UTC [msp.identity] Verify -> DEBU 713f Verify: digest = 00000000 40 64 e4 0c bd 01 ba f8 b3 bc a1 bc 7f 6a 19 46 |@d...........j.F| +peer0.org1.example.com | 00000010 ca 70 d0 5e 0c 52 a3 0e 44 67 9e 07 09 54 99 bd |.p.^.R..Dg...T..|" +peer0.org1.example.com | "2019-09-24 00:27:25.752 UTC [msp.identity] Verify -> DEBU 7140 Verify: sig = 00000000 30 44 02 20 5f 85 29 50 c8 65 d7 b2 9d a0 53 ab |0D. _.)P.e....S.| +peer0.org1.example.com | 00000010 70 9a 55 34 3d a3 ea c2 70 48 e1 0f 93 dd 48 f7 |p.U4=...pH....H.| +peer0.org1.example.com | 00000020 67 2c 54 33 02 20 6f cb 43 e7 19 50 3b 74 2d 27 |g,T3. o.C..P;t-'| +peer0.org1.example.com | 00000030 7a 8e d1 ad 1b 21 5b 2e d1 39 00 be 01 ae 12 d7 |z....![..9......| +peer0.org1.example.com | 00000040 41 ec 91 ce e7 79 |A....y|" +peer0.org1.example.com | "2019-09-24 00:27:25.753 UTC [msp.identity] Verify -> DEBU 7141 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:27:25.753 UTC [msp.identity] Verify -> DEBU 7142 Verify: sig = 00000000 30 44 02 20 69 5f 4d 68 08 95 d6 81 69 ea b6 38 |0D. i_Mh....i..8| +peer0.org1.example.com | 00000010 9e 09 c2 73 5d 64 74 c4 78 04 9c 9e 87 b8 bb 4b |...s]dt.x......K| +peer0.org1.example.com | 00000020 b2 e2 80 2a 02 20 15 cc 68 2d 90 14 73 a2 a9 f0 |...*. ..h-..s...| +peer0.org1.example.com | 00000030 b9 01 99 0f 3e 4b 8c 4b c3 c9 4f 9a 0e d5 ce 13 |....>K.K..O.....| +peer0.org1.example.com | 00000040 f5 41 4c 43 4a 2a |.ALCJ*|" +peer0.org1.example.com | "2019-09-24 00:27:25.753 UTC [gossip.discovery] handleAliveMessage -> DEBU 7143 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 7144 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:25.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 7145 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:25.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 7146 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:25.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 7147 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:25.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 7148 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.753 UTC [gossip.discovery] handleAliveMessage -> DEBU 7149 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.753 UTC [gossip.discovery] handleMsgFromComm -> DEBU 714a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.753 UTC [gossip.discovery] sendMemResponse -> DEBU 714b Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:27:25.754 UTC [msp] DeserializeIdentity -> DEBU 714c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.754 UTC [msp] DeserializeIdentity -> DEBU 714d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.754 UTC [gossip.comm] Send -> DEBU 714e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:25.754 UTC [gossip.discovery] sendMemResponse -> DEBU 714f Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020_" signature:"0D\002 _\205)P\310e\327\262\235\240S\253p\232U4=\243\352\302pH\341\017\223\335H\367g,T3\002 o\313C\347\031P;t-'z\216\321\255\033![.\3219\000\276\001\256\022\327A\354\221\316\347y" secret_envelope:K\214K\303\311O\232\016\325\316\023\365ALCJ*" > > alive:\257\"\3775I\247UX\263=\220\317-\252\356\276\362" > " +peer0.org1.example.com | "2019-09-24 00:27:25.754 UTC [gossip.comm] sendToEndpoint -> DEBU 7150 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.754 UTC [gossip.comm] sendToEndpoint -> DEBU 7151 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:25.974 UTC [gossip.comm] func1 -> DEBU 7152 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.974 UTC [gossip.gossip] handleMessage -> DEBU 7153 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:25.974 UTC [msp] DeserializeIdentity -> DEBU 7154 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.975 UTC [msp] DeserializeIdentity -> DEBU 7155 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.975 UTC [msp] DeserializeIdentity -> DEBU 7156 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:25.975 UTC [gossip.gossip] handleMessage -> DEBU 7157 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.296 UTC [gossip.election] waitForInterrupt -> DEBU 7158 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.297 UTC [gossip.election] IsLeader -> DEBU 7159 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:27:27.297 UTC [msp] GetDefaultSigningIdentity -> DEBU 715a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:27.298 UTC [msp.identity] Sign -> DEBU 715b Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101F1801 " +peer0.org1.example.com | "2019-09-24 00:27:27.298 UTC [msp.identity] Sign -> DEBU 715c Sign: digest: 952945BEBD99AA0CCEC8CDDC4F1DDF495BAEEAC9A44A7363937D85659B86BC43 " +peer0.org1.example.com | "2019-09-24 00:27:27.299 UTC [gossip.election] waitForInterrupt -> DEBU 715d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:27:27.310 UTC [msp] DeserializeIdentity -> DEBU 715e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.311 UTC [msp] DeserializeIdentity -> DEBU 715f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.311 UTC [msp] DeserializeIdentity -> DEBU 7160 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.312 UTC [msp] DeserializeIdentity -> DEBU 7161 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.312 UTC [gossip.comm] Send -> DEBU 7162 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:27.313 UTC [msp] DeserializeIdentity -> DEBU 7163 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.313 UTC [msp] DeserializeIdentity -> DEBU 7164 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.314 UTC [gossip.comm] sendToEndpoint -> DEBU 7165 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.316 UTC [gossip.comm] sendToEndpoint -> DEBU 7166 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.667 UTC [gossip.comm] func1 -> DEBU 7167 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.668 UTC [gossip.gossip] handleMessage -> DEBU 7168 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.668 UTC [gossip.gossip] handleMessage -> DEBU 7169 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.669 UTC [gossip.discovery] handleMsgFromComm -> DEBU 716a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.669 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 716b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:27.670 UTC [msp.identity] Verify -> DEBU 716c Verify: digest = 00000000 bd c5 4a 88 93 a1 8c 55 58 4d 38 70 ff e5 23 0d |..J....UXM8p..#.| +peer0.org1.example.com | 00000010 0e d3 a4 8f e4 24 3f 22 ed d8 1f 71 09 86 eb 10 |.....$?"...q....|" +peer0.org1.example.com | "2019-09-24 00:27:27.671 UTC [msp.identity] Verify -> DEBU 716d Verify: sig = 00000000 30 45 02 21 00 c2 a2 90 de bf df de b6 15 37 4b |0E.!..........7K| +peer0.org1.example.com | 00000010 42 0f 02 59 14 ae 14 01 53 74 a1 39 dd 6d 3b 1e |B..Y....St.9.m;.| +peer0.org1.example.com | 00000020 54 6e 7e 24 76 02 20 0b b6 32 6e b1 26 c2 f3 88 |Tn~$v. ..2n.&...| +peer0.org1.example.com | 00000030 53 de 55 3d 07 b2 ae 8e ef 36 c9 22 31 65 b6 80 |S.U=.....6."1e..| +peer0.org1.example.com | 00000040 c6 14 0c 15 7c 5a 4c |....|ZL|" +peer0.org1.example.com | "2019-09-24 00:27:27.671 UTC [gossip.discovery] handleAliveMessage -> DEBU 716e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 716f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:27.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 7170 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:27.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 7171 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:27.672 UTC [gossip.discovery] learnExistingMembers -> DEBU 7172 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:27.672 UTC [gossip.discovery] learnExistingMembers -> DEBU 7173 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.672 UTC [gossip.discovery] handleAliveMessage -> DEBU 7174 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7175 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.677 UTC [msp] DeserializeIdentity -> DEBU 7176 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.678 UTC [msp] DeserializeIdentity -> DEBU 7177 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.680 UTC [gossip.comm] func1 -> DEBU 7178 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.680 UTC [gossip.gossip] handleMessage -> DEBU 7179 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.680 UTC [gossip.gossip] handleMessage -> DEBU 717a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.680 UTC [msp] DeserializeIdentity -> DEBU 717b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.681 UTC [gossip.comm] Send -> DEBU 717d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:27.681 UTC [gossip.discovery] handleMsgFromComm -> DEBU 717c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.681 UTC [gossip.discovery] handleMsgFromComm -> DEBU 717f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.681 UTC [msp] DeserializeIdentity -> DEBU 717e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.681 UTC [gossip.comm] sendToEndpoint -> DEBU 7180 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.682 UTC [gossip.comm] sendToEndpoint -> DEBU 7181 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.681 UTC [gossip.comm] Send -> DEBU 7182 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:27.682 UTC [gossip.comm] sendToEndpoint -> DEBU 7183 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.682 UTC [gossip.comm] sendToEndpoint -> DEBU 7184 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.684 UTC [gossip.comm] func1 -> DEBU 7185 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.684 UTC [gossip.gossip] handleMessage -> DEBU 7186 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.684 UTC [gossip.gossip] handleMessage -> DEBU 7187 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.684 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7188 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.684 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7189 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.702 UTC [gossip.pull] Hello -> DEBU 718a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:27.702 UTC [gossip.comm] Send -> DEBU 718b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:27.702 UTC [gossip.pull] Hello -> DEBU 718c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:27.703 UTC [gossip.comm] sendToEndpoint -> DEBU 718d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.703 UTC [gossip.comm] sendToEndpoint -> DEBU 718e Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.703 UTC [gossip.comm] Send -> DEBU 718f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:27.704 UTC [gossip.pull] Hello -> DEBU 7190 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:27.704 UTC [gossip.comm] Send -> DEBU 7191 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:27.705 UTC [gossip.comm] sendToEndpoint -> DEBU 7192 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.705 UTC [gossip.comm] sendToEndpoint -> DEBU 7193 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.705 UTC [gossip.comm] func1 -> DEBU 7194 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.705 UTC [gossip.gossip] handleMessage -> DEBU 7195 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.706 UTC [gossip.comm] sendToEndpoint -> DEBU 7196 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.706 UTC [gossip.pull] HandleMessage -> DEBU 7197 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.706 UTC [gossip.comm] sendToEndpoint -> DEBU 7198 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.706 UTC [gossip.gossip] handleMessage -> DEBU 7199 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.708 UTC [gossip.comm] func1 -> DEBU 719a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.708 UTC [gossip.gossip] handleMessage -> DEBU 719b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.709 UTC [gossip.pull] HandleMessage -> DEBU 719c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.709 UTC [gossip.gossip] handleMessage -> DEBU 719d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.711 UTC [gossip.comm] func1 -> DEBU 719e Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.711 UTC [gossip.gossip] handleMessage -> DEBU 719f Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.711 UTC [gossip.pull] HandleMessage -> DEBU 71a0 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.711 UTC [gossip.gossip] handleMessage -> DEBU 71a1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.838 UTC [msp] GetDefaultSigningIdentity -> DEBU 71a2 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:27.838 UTC [msp.identity] Sign -> DEBU 71a3 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315105A " +peer0.org1.example.com | "2019-09-24 00:27:27.838 UTC [msp.identity] Sign -> DEBU 71a4 Sign: digest: A93BF3CD187AEB6BD9FB5F8F68F7AB43734889217639056FFEF54A4F952097B7 " +peer0.org1.example.com | "2019-09-24 00:27:27.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 71a5 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:27.839 UTC [msp.identity] Sign -> DEBU 71a6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:27.839 UTC [msp.identity] Sign -> DEBU 71a7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:27.840 UTC [gossip.comm] Send -> DEBU 71a8 Entering, sending GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:27.841 UTC [gossip.comm] sendToEndpoint -> DEBU 71a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.841 UTC [msp] DeserializeIdentity -> DEBU 71aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.841 UTC [gossip.comm] sendToEndpoint -> DEBU 71ab Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.841 UTC [gossip.comm] Send -> DEBU 71ac Entering, sending GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:27.841 UTC [msp] DeserializeIdentity -> DEBU 71ad Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.841 UTC [gossip.comm] Send -> DEBU 71ae Entering, sending GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:27.842 UTC [gossip.comm] sendToEndpoint -> DEBU 71af Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.842 UTC [gossip.comm] sendToEndpoint -> DEBU 71b0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.842 UTC [gossip.comm] sendToEndpoint -> DEBU 71b1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.842 UTC [gossip.comm] sendToEndpoint -> DEBU 71b2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [gossip.comm] func1 -> DEBU 71b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [gossip.gossip] handleMessage -> DEBU 71b4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [gossip.gossip] handleMessage -> DEBU 71b5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71b6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 71b7 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [msp.identity] Verify -> DEBU 71b8 Verify: digest = 00000000 a9 3b f3 cd 18 7a eb 6b d9 fb 5f 8f 68 f7 ab 43 |.;...z.k.._.h..C| +peer0.org1.example.com | 00000010 73 48 89 21 76 39 05 6f fe f5 4a 4f 95 20 97 b7 |sH.!v9.o..JO. ..|" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [msp.identity] Verify -> DEBU 71b9 Verify: sig = 00000000 30 44 02 20 3e 8f 2a 53 80 d2 ad e6 a8 ac c6 fd |0D. >.*S........| +peer0.org1.example.com | 00000010 6d 4a d1 ca 85 81 10 73 db af 3f b9 ef 58 9b fe |mJ.....s..?..X..| +peer0.org1.example.com | 00000020 19 c8 dd 5b 02 20 46 b3 e4 2b aa 01 d5 df 29 c7 |...[. F..+....).| +peer0.org1.example.com | 00000030 4d ef a3 44 0d f9 e7 a9 3f 99 01 88 6f 5c 56 e2 |M..D....?...o\V.| +peer0.org1.example.com | 00000040 0a 6a f9 80 72 5f |.j..r_|" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [msp.identity] Verify -> DEBU 71ba Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [msp.identity] Verify -> DEBU 71bb Verify: sig = 00000000 30 45 02 21 00 a1 71 7d d4 b2 0d 07 ce d0 90 e0 |0E.!..q}........| +peer0.org1.example.com | 00000010 a7 1b 91 f3 5a 4c b9 ef 60 8d 3c 5a d1 bc 51 09 |....ZL..`. DEBU 71bc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [gossip.discovery] isSentByMe -> DEBU 71bd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [gossip.discovery] handleAliveMessage -> DEBU 71be Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.843 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71bf Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.845 UTC [gossip.comm] func1 -> DEBU 71c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.845 UTC [gossip.gossip] handleMessage -> DEBU 71c1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.845 UTC [gossip.gossip] handleMessage -> DEBU 71c2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.845 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71c3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.845 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 71c4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:27.845 UTC [msp.identity] Verify -> DEBU 71c5 Verify: digest = 00000000 a9 3b f3 cd 18 7a eb 6b d9 fb 5f 8f 68 f7 ab 43 |.;...z.k.._.h..C| +peer0.org1.example.com | 00000010 73 48 89 21 76 39 05 6f fe f5 4a 4f 95 20 97 b7 |sH.!v9.o..JO. ..|" +peer0.org1.example.com | "2019-09-24 00:27:27.845 UTC [msp.identity] Verify -> DEBU 71c6 Verify: sig = 00000000 30 44 02 20 3e 8f 2a 53 80 d2 ad e6 a8 ac c6 fd |0D. >.*S........| +peer0.org1.example.com | 00000010 6d 4a d1 ca 85 81 10 73 db af 3f b9 ef 58 9b fe |mJ.....s..?..X..| +peer0.org1.example.com | 00000020 19 c8 dd 5b 02 20 46 b3 e4 2b aa 01 d5 df 29 c7 |...[. F..+....).| +peer0.org1.example.com | 00000030 4d ef a3 44 0d f9 e7 a9 3f 99 01 88 6f 5c 56 e2 |M..D....?...o\V.| +peer0.org1.example.com | 00000040 0a 6a f9 80 72 5f |.j..r_|" +peer0.org1.example.com | "2019-09-24 00:27:27.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 71c7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.845 UTC [gossip.discovery] isSentByMe -> DEBU 71c8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 71c9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71ca Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.846 UTC [gossip.comm] func1 -> DEBU 71cb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.846 UTC [gossip.gossip] handleMessage -> DEBU 71cc Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.847 UTC [gossip.gossip] handleMessage -> DEBU 71cd Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71ce Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 71cf Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:27.847 UTC [msp.identity] Verify -> DEBU 71d0 Verify: digest = 00000000 a9 3b f3 cd 18 7a eb 6b d9 fb 5f 8f 68 f7 ab 43 |.;...z.k.._.h..C| +peer0.org1.example.com | 00000010 73 48 89 21 76 39 05 6f fe f5 4a 4f 95 20 97 b7 |sH.!v9.o..JO. ..|" +peer0.org1.example.com | "2019-09-24 00:27:27.847 UTC [msp.identity] Verify -> DEBU 71d1 Verify: sig = 00000000 30 44 02 20 3e 8f 2a 53 80 d2 ad e6 a8 ac c6 fd |0D. >.*S........| +peer0.org1.example.com | 00000010 6d 4a d1 ca 85 81 10 73 db af 3f b9 ef 58 9b fe |mJ.....s..?..X..| +peer0.org1.example.com | 00000020 19 c8 dd 5b 02 20 46 b3 e4 2b aa 01 d5 df 29 c7 |...[. F..+....).| +peer0.org1.example.com | 00000030 4d ef a3 44 0d f9 e7 a9 3f 99 01 88 6f 5c 56 e2 |M..D....?...o\V.| +peer0.org1.example.com | 00000040 0a 6a f9 80 72 5f |.j..r_|" +peer0.org1.example.com | "2019-09-24 00:27:27.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 71d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.848 UTC [gossip.discovery] isSentByMe -> DEBU 71d3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 71d4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71d5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.884 UTC [gossip.comm] func1 -> DEBU 71d6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.884 UTC [gossip.gossip] handleMessage -> DEBU 71d7 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.884 UTC [gossip.pull] HandleMessage -> DEBU 71d8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.886 UTC [msp] DeserializeIdentity -> DEBU 71d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.886 UTC [msp] DeserializeIdentity -> DEBU 71da Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.887 UTC [msp] DeserializeIdentity -> DEBU 71db Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.887 UTC [msp] DeserializeIdentity -> DEBU 71dc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.888 UTC [msp] DeserializeIdentity -> DEBU 71dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.888 UTC [msp] DeserializeIdentity -> DEBU 71de Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.888 UTC [gossip.pull] SendDigest -> DEBU 71df Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:27:27.889 UTC [gossip.gossip] handleMessage -> DEBU 71e0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.996 UTC [gossip.comm] func1 -> DEBU 71e1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.996 UTC [gossip.gossip] handleMessage -> DEBU 71e2 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.997 UTC [gossip.gossip] handleMessage -> DEBU 71e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:27.997 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71e4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:27.997 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 71e5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:27.997 UTC [msp] DeserializeIdentity -> DEBU 71e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:27.998 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 71e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:27.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 71e8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:27.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 71e9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:27.998 UTC [policies] Evaluate -> DEBU 71ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:27.999 UTC [policies] Evaluate -> DEBU 71eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:27.999 UTC [policies] Evaluate -> DEBU 71ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.000 UTC [cauthdsl] func1 -> DEBU 71ed 0xc0056515d0 gate 1569284848000560100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:28.001 UTC [cauthdsl] func2 -> DEBU 71ee 0xc0056515d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:28.003 UTC [cauthdsl] func2 -> DEBU 71ef 0xc0056515d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:28.004 UTC [cauthdsl] func2 -> DEBU 71f0 0xc0056515d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.004 UTC [msp.identity] Verify -> DEBU 71f1 Verify: digest = 00000000 a8 72 35 a8 ca 5a 52 f0 ea 12 3b 17 3f 70 6e cb |.r5..ZR...;.?pn.| +peer0.org1.example.com | 00000010 6f 80 26 75 b3 85 cd 83 88 1b fe 87 3e 7b b9 ac |o.&u........>{..|" +peer0.org1.example.com | "2019-09-24 00:27:28.005 UTC [msp.identity] Verify -> DEBU 71f2 Verify: sig = 00000000 30 45 02 21 00 a2 9a 44 77 8b 69 f6 34 b3 24 23 |0E.!...Dw.i.4.$#| +peer0.org1.example.com | 00000010 d7 4c ce 13 a8 31 30 1d 6c 49 db 37 76 4a 6b d3 |.L...10.lI.7vJk.| +peer0.org1.example.com | 00000020 05 67 1b 43 64 02 20 2c 5f c7 fa 67 2b 8f c3 31 |.g.Cd. ,_..g+..1| +peer0.org1.example.com | 00000030 82 61 fc 89 3d b5 63 f6 77 a6 d5 84 93 4b 59 74 |.a..=.c.w....KYt| +peer0.org1.example.com | 00000040 30 cb 9a 1a 39 10 3d |0...9.=|" +peer0.org1.example.com | "2019-09-24 00:27:28.006 UTC [cauthdsl] func2 -> DEBU 71f3 0xc0056515d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.006 UTC [cauthdsl] func1 -> DEBU 71f4 0xc0056515d0 gate 1569284848000560100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:28.006 UTC [policies] Evaluate -> DEBU 71f5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.007 UTC [policies] Evaluate -> DEBU 71f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.007 UTC [policies] Evaluate -> DEBU 71f7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.007 UTC [policies] Evaluate -> DEBU 71f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.008 UTC [gossip.discovery] handleAliveMessage -> DEBU 71f9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.008 UTC [gossip.discovery] learnExistingMembers -> DEBU 71fa Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:28.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 71fb updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:28.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 71fc Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:28.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 71fd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:28.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 71fe Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.009 UTC [gossip.discovery] handleAliveMessage -> DEBU 71ff Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7200 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.009 UTC [gossip.discovery] sendMemResponse -> DEBU 7201 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:27:28.010 UTC [msp] DeserializeIdentity -> DEBU 7202 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.011 UTC [msp] DeserializeIdentity -> DEBU 7203 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.011 UTC [msp] DeserializeIdentity -> DEBU 7204 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.011 UTC [gossip.comm] Send -> DEBU 7205 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:28.012 UTC [gossip.comm] sendToEndpoint -> DEBU 7206 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.012 UTC [gossip.comm] sendToEndpoint -> DEBU 7207 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.012 UTC [gossip.discovery] sendMemResponse -> DEBU 7208 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020`" signature:"0E\002!\000\302\242\220\336\277\337\336\266\0257KB\017\002Y\024\256\024\001St\2419\335m;\036Tn~$v\002 \013\2662n\261&\302\363\210S\336U=\007\262\256\216\3576\311\"1e\266\200\306\024\014\025|ZL" > alive: alive: alive:\257\"\3775I\247UX\263=\220\317-\252\356\276\362" > " +peer0.org1.example.com | "2019-09-24 00:27:28.045 UTC [msp] DeserializeIdentity -> DEBU 7209 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.046 UTC [msp] DeserializeIdentity -> DEBU 720a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.046 UTC [gossip.comm] Send -> DEBU 720b Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 720c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 720d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 720e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 720f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 7210 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 7211 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [gossip.comm] func1 -> DEBU 7212 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [gossip.gossip] handleMessage -> DEBU 7213 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [msp] DeserializeIdentity -> DEBU 7214 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [msp] DeserializeIdentity -> DEBU 7215 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [msp] DeserializeIdentity -> DEBU 7216 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7217 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7218 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7219 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [policies] Evaluate -> DEBU 721a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [policies] Evaluate -> DEBU 721b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [policies] Evaluate -> DEBU 721c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [cauthdsl] func1 -> DEBU 721d 0xc005696120 gate 1569284848047852100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [cauthdsl] func2 -> DEBU 721e 0xc005696120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [cauthdsl] func2 -> DEBU 721f 0xc005696120 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [cauthdsl] func2 -> DEBU 7220 0xc005696120 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.047 UTC [msp.identity] Verify -> DEBU 7221 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [msp.identity] Verify -> DEBU 7222 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [cauthdsl] func2 -> DEBU 7223 0xc005696120 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [cauthdsl] func1 -> DEBU 7224 0xc005696120 gate 1569284848047852100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [policies] Evaluate -> DEBU 7225 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [policies] Evaluate -> DEBU 7226 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [policies] Evaluate -> DEBU 7227 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [policies] Evaluate -> DEBU 7228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [msp.identity] Verify -> DEBU 7229 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +peer0.org1.example.com | 00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [msp.identity] Verify -> DEBU 722a Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +peer0.org1.example.com | 00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +peer0.org1.example.com | 00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +peer0.org1.example.com | 00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +peer0.org1.example.com | 00000040 54 87 75 e6 8e 00 |T.u...|" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [msp.identity] Verify -> DEBU 722b Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [msp.identity] Verify -> DEBU 722c Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:28.048 UTC [msp] DeserializeIdentity -> DEBU 722d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [msp] DeserializeIdentity -> DEBU 722e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 722f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7230 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7231 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 7232 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 7233 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 7234 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [cauthdsl] func1 -> DEBU 7235 0xc0056b0730 gate 1569284848049377700 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [cauthdsl] func2 -> DEBU 7236 0xc0056b0730 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [cauthdsl] func2 -> DEBU 7237 0xc0056b0730 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [cauthdsl] func2 -> DEBU 7238 0xc0056b0730 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [msp.identity] Verify -> DEBU 7239 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [msp.identity] Verify -> DEBU 723a Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [cauthdsl] func2 -> DEBU 723b 0xc0056b0730 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [cauthdsl] func1 -> DEBU 723c 0xc0056b0730 gate 1569284848049377700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 723d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 723e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 723f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 7240 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.049 UTC [gossip.gossip] handleMessage -> DEBU 7241 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.050 UTC [gossip.comm] func1 -> DEBU 7242 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.050 UTC [gossip.gossip] handleMessage -> DEBU 7243 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.050 UTC [gossip.comm] func1 -> DEBU 7244 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.050 UTC [msp.identity] Verify -> DEBU 7245 Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:28.050 UTC [msp.identity] Verify -> DEBU 7246 Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:28.051 UTC [msp.identity] Verify -> DEBU 7247 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +peer0.org1.example.com | 00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +peer0.org1.example.com | "2019-09-24 00:27:28.051 UTC [msp.identity] Verify -> DEBU 7248 Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +peer0.org1.example.com | 00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +peer0.org1.example.com | 00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +peer0.org1.example.com | 00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +peer0.org1.example.com | 00000040 54 87 75 e6 8e 00 |T.u...|" +peer0.org1.example.com | "2019-09-24 00:27:28.051 UTC [msp] DeserializeIdentity -> DEBU 7249 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.051 UTC [msp] DeserializeIdentity -> DEBU 724a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.051 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 724b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:28.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 724c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 724d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.051 UTC [policies] Evaluate -> DEBU 724e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.051 UTC [policies] Evaluate -> DEBU 724f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:28.051 UTC [policies] Evaluate -> DEBU 7250 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.051 UTC [cauthdsl] func1 -> DEBU 7251 0xc0056c10e0 gate 1569284848051969200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [cauthdsl] func2 -> DEBU 7252 0xc0056c10e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [cauthdsl] func2 -> DEBU 7253 0xc0056c10e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [cauthdsl] func2 -> DEBU 7254 0xc0056c10e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [msp.identity] Verify -> DEBU 7255 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [msp.identity] Verify -> DEBU 7256 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [cauthdsl] func2 -> DEBU 7257 0xc0056c10e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [cauthdsl] func1 -> DEBU 7258 0xc0056c10e0 gate 1569284848051969200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [policies] Evaluate -> DEBU 7259 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [policies] Evaluate -> DEBU 725a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [policies] Evaluate -> DEBU 725b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [policies] Evaluate -> DEBU 725c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [msp] DeserializeIdentity -> DEBU 725d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.052 UTC [msp] DeserializeIdentity -> DEBU 725e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.054 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 725f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7260 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7261 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 7262 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 7263 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 7264 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [cauthdsl] func1 -> DEBU 7265 0xc0056de8b0 gate 1569284848055224000 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [cauthdsl] func2 -> DEBU 7266 0xc0056de8b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [cauthdsl] func2 -> DEBU 7267 0xc0056de8b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [cauthdsl] func2 -> DEBU 7268 0xc0056de8b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [msp.identity] Verify -> DEBU 7269 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [msp.identity] Verify -> DEBU 726a Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [cauthdsl] func2 -> DEBU 726b 0xc0056de8b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [cauthdsl] func1 -> DEBU 726c 0xc0056de8b0 gate 1569284848055224000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 726d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 726e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 726f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [policies] Evaluate -> DEBU 7270 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [gossip.gossip] handleMessage -> DEBU 7271 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [gossip.gossip] handleMessage -> DEBU 7272 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [msp] DeserializeIdentity -> DEBU 7273 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [msp] DeserializeIdentity -> DEBU 7274 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [msp] DeserializeIdentity -> DEBU 7275 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7276 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7277 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7278 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [policies] Evaluate -> DEBU 7279 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [policies] Evaluate -> DEBU 727a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [policies] Evaluate -> DEBU 727b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [cauthdsl] func1 -> DEBU 727c 0xc0056f43c0 gate 1569284848056605300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [cauthdsl] func2 -> DEBU 727d 0xc0056f43c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [cauthdsl] func2 -> DEBU 727e 0xc0056f43c0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [cauthdsl] func2 -> DEBU 727f 0xc0056f43c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [msp.identity] Verify -> DEBU 7280 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [msp.identity] Verify -> DEBU 7281 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [cauthdsl] func2 -> DEBU 7282 0xc0056f43c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [cauthdsl] func1 -> DEBU 7283 0xc0056f43c0 gate 1569284848056605300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:28.056 UTC [policies] Evaluate -> DEBU 7284 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.057 UTC [policies] Evaluate -> DEBU 7285 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.057 UTC [policies] Evaluate -> DEBU 7286 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.057 UTC [policies] Evaluate -> DEBU 7287 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.057 UTC [msp.identity] Verify -> DEBU 7288 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +peer0.org1.example.com | 00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +peer0.org1.example.com | "2019-09-24 00:27:28.057 UTC [msp.identity] Verify -> DEBU 7289 Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +peer0.org1.example.com | 00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +peer0.org1.example.com | 00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +peer0.org1.example.com | 00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +peer0.org1.example.com | 00000040 54 87 75 e6 8e 00 |T.u...|" +peer0.org1.example.com | "2019-09-24 00:27:28.057 UTC [msp.identity] Verify -> DEBU 728a Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:28.057 UTC [msp.identity] Verify -> DEBU 728b Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:28.057 UTC [msp] DeserializeIdentity -> DEBU 728c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.057 UTC [msp] DeserializeIdentity -> DEBU 728d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.057 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 728e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 728f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7290 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 7291 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 7292 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 7293 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [cauthdsl] func1 -> DEBU 7294 0xc0057109d0 gate 1569284848058307400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [cauthdsl] func2 -> DEBU 7295 0xc0057109d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [cauthdsl] func2 -> DEBU 7296 0xc0057109d0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [cauthdsl] func2 -> DEBU 7297 0xc0057109d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [msp.identity] Verify -> DEBU 7298 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [msp.identity] Verify -> DEBU 7299 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [cauthdsl] func2 -> DEBU 729a 0xc0057109d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [cauthdsl] func1 -> DEBU 729b 0xc0057109d0 gate 1569284848058307400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 729c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 729d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 729e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.059 UTC [policies] Evaluate -> DEBU 729f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.059 UTC [gossip.gossip] handleMessage -> DEBU 72a0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.303 UTC [msp] DeserializeIdentity -> DEBU 72a1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.303 UTC [msp] DeserializeIdentity -> DEBU 72a2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.303 UTC [gossip.pull] Hello -> DEBU 72a3 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:28.303 UTC [msp] DeserializeIdentity -> DEBU 72a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.303 UTC [msp] DeserializeIdentity -> DEBU 72a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.303 UTC [gossip.comm] Send -> DEBU 72a6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 72a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 72a8 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.304 UTC [gossip.comm] func1 -> DEBU 72a9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.305 UTC [gossip.gossip] handleMessage -> DEBU 72aa Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.305 UTC [gossip.pull] HandleMessage -> DEBU 72ab GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.305 UTC [gossip.gossip] handleMessage -> DEBU 72ac Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.547 UTC [gossip.comm] func1 -> DEBU 72ad Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.547 UTC [gossip.gossip] handleMessage -> DEBU 72ae Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.547 UTC [msp] DeserializeIdentity -> DEBU 72af Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.547 UTC [msp] DeserializeIdentity -> DEBU 72b0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.547 UTC [gossip.gossip] handleMessage -> DEBU 72b1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.745 UTC [gossip.comm] func1 -> DEBU 72b2 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.745 UTC [gossip.gossip] handleMessage -> DEBU 72b3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.745 UTC [gossip.gossip] handleMessage -> DEBU 72b4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 72b5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.745 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 72b6 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:28.745 UTC [msp] DeserializeIdentity -> DEBU 72b7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.745 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 72b8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:28.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 72b9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 72ba Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [cauthdsl] func1 -> DEBU 72be 0xc005729040 gate 1569284848746085400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [cauthdsl] func2 -> DEBU 72bf 0xc005729040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [cauthdsl] func2 -> DEBU 72c0 0xc005729040 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [cauthdsl] func2 -> DEBU 72c1 0xc005729040 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [msp.identity] Verify -> DEBU 72c2 Verify: digest = 00000000 ca 3b 45 67 f0 52 b9 11 f0 02 b2 77 0b 01 4b aa |.;Eg.R.....w..K.| +peer0.org1.example.com | 00000010 cc 54 bd 27 09 c9 a7 48 e0 2c da 26 b6 05 d0 92 |.T.'...H.,.&....|" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [msp.identity] Verify -> DEBU 72c3 Verify: sig = 00000000 30 44 02 20 53 c0 c8 24 ea 6f a8 19 7e b1 04 36 |0D. S..$.o..~..6| +peer0.org1.example.com | 00000010 26 ae c0 96 2a 83 45 30 7a ec 3f 5e 93 96 28 32 |&...*.E0z.?^..(2| +peer0.org1.example.com | 00000020 ae 3f 42 bd 02 20 58 f0 9e 2a 63 5b e0 cd d0 09 |.?B.. X..*c[....| +peer0.org1.example.com | 00000030 ab 97 5b da c3 8e fa f2 b4 af 6e 47 82 0b b7 9e |..[.......nG....| +peer0.org1.example.com | 00000040 f9 4c fc 33 5e 86 |.L.3^.|" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [cauthdsl] func2 -> DEBU 72c4 0xc005729040 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [cauthdsl] func1 -> DEBU 72c5 0xc005729040 gate 1569284848746085400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72c8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [gossip.discovery] handleAliveMessage -> DEBU 72ca Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 72cb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 72cc updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 72cd Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 72ce Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:28.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 72cf Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.747 UTC [gossip.discovery] handleAliveMessage -> DEBU 72d0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.747 UTC [gossip.discovery] handleMsgFromComm -> DEBU 72d1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.747 UTC [gossip.discovery] sendMemResponse -> DEBU 72d2 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:27:28.747 UTC [msp] DeserializeIdentity -> DEBU 72d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.747 UTC [msp] DeserializeIdentity -> DEBU 72d4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.747 UTC [msp] DeserializeIdentity -> DEBU 72d5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.747 UTC [gossip.comm] Send -> DEBU 72d6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:28.747 UTC [gossip.discovery] sendMemResponse -> DEBU 72d7 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020`" signature:"0E\002!\000\302\242\220\336\277\337\336\266\0257KB\017\002Y\024\256\024\001St\2419\335m;\036Tn~$v\002 \013\2662n\261&\302\363\210S\336U=\007\262\256\216\3576\311\"1e\266\200\306\024\014\025|ZL" > alive: alive: alive:\257\"\3775I\247UX\263=\220\317-\252\356\276\362" > " +peer0.org1.example.com | "2019-09-24 00:27:28.747 UTC [gossip.comm] sendToEndpoint -> DEBU 72d8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.747 UTC [gossip.comm] sendToEndpoint -> DEBU 72d9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.789 UTC [gossip.comm] func1 -> DEBU 72da Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.789 UTC [gossip.gossip] handleMessage -> DEBU 72db Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.789 UTC [gossip.pull] HandleMessage -> DEBU 72dc GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.789 UTC [msp] DeserializeIdentity -> DEBU 72dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.790 UTC [msp] DeserializeIdentity -> DEBU 72de Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.790 UTC [msp] DeserializeIdentity -> DEBU 72df Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.790 UTC [msp] DeserializeIdentity -> DEBU 72e0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.790 UTC [msp] DeserializeIdentity -> DEBU 72e1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.790 UTC [msp] DeserializeIdentity -> DEBU 72e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:28.790 UTC [gossip.pull] SendDigest -> DEBU 72e3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:27:28.790 UTC [gossip.gossip] handleMessage -> DEBU 72e4 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:28.809 UTC [gossip.comm] func1 -> DEBU 72e5 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.809 UTC [gossip.gossip] handleMessage -> DEBU 72e6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.809 UTC [gossip.pull] HandleMessage -> DEBU 72e7 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:28.809 UTC [gossip.pull] SendDigest -> DEBU 72e8 Sending BLOCK_MSG digest: [2 3 4 5 6 1] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:28.809 UTC [gossip.gossip] handleMessage -> DEBU 72e9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.040 UTC [gossip.comm] func1 -> DEBU 72ea Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.040 UTC [gossip.gossip] handleMessage -> DEBU 72eb Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.041 UTC [msp] DeserializeIdentity -> DEBU 72ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.041 UTC [msp] DeserializeIdentity -> DEBU 72ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.041 UTC [msp] DeserializeIdentity -> DEBU 72ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.042 UTC [gossip.gossip] handleMessage -> DEBU 72ef Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.569 UTC [msp] GetDefaultSigningIdentity -> DEBU 72f0 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:29.569 UTC [msp.identity] Sign -> DEBU 72f1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315105B " +peer0.org1.example.com | "2019-09-24 00:27:29.569 UTC [msp.identity] Sign -> DEBU 72f2 Sign: digest: 246CBF0204752DB8B61C1674206C6806AA66B12E156BF10B03B0FC29FD259986 " +peer0.org1.example.com | "2019-09-24 00:27:29.569 UTC [msp] GetDefaultSigningIdentity -> DEBU 72f3 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:29.569 UTC [msp.identity] Sign -> DEBU 72f4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:29.569 UTC [msp.identity] Sign -> DEBU 72f5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:29.569 UTC [gossip.discovery] periodicalSendAlive -> DEBU 72f6 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [msp] DeserializeIdentity -> DEBU 72f7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [msp] DeserializeIdentity -> DEBU 72f8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [msp] DeserializeIdentity -> DEBU 72f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [gossip.comm] Send -> DEBU 72fa Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [msp] DeserializeIdentity -> DEBU 72fb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [gossip.comm] Send -> DEBU 72fc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 72fd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [gossip.comm] Send -> DEBU 72fe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 72ff Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 7300 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 7301 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 7302 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 7303 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.622 UTC [gossip.comm] func1 -> DEBU 7304 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.622 UTC [gossip.gossip] handleMessage -> DEBU 7305 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.622 UTC [gossip.pull] HandleMessage -> DEBU 7306 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.622 UTC [gossip.pull] SendDigest -> DEBU 7307 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:29.622 UTC [gossip.gossip] handleMessage -> DEBU 7308 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.754 UTC [gossip.comm] func1 -> DEBU 7309 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020a" signature:"0E\002!\000\237\253\013\0055\211\276\350c|\n4\331b\231\t\363\255\325Q\t\355\377\0230h3}\374\203\227x\002 Gi!\367\033d\035K'\242\006\225y\341\271\261G\235\331{\254\234\217\034\343y\343 \341\204\301\332" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.756 UTC [gossip.gossip] handleMessage -> DEBU 730a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020a" signature:"0E\002!\000\237\253\013\0055\211\276\350c|\n4\331b\231\t\363\255\325Q\t\355\377\0230h3}\374\203\227x\002 Gi!\367\033d\035K'\242\006\225y\341\271\261G\235\331{\254\234\217\034\343y\343 \341\204\301\332" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.756 UTC [gossip.gossip] handleMessage -> DEBU 730b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.757 UTC [gossip.discovery] handleMsgFromComm -> DEBU 730c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020a" signature:"0E\002!\000\237\253\013\0055\211\276\350c|\n4\331b\231\t\363\255\325Q\t\355\377\0230h3}\374\203\227x\002 Gi!\367\033d\035K'\242\006\225y\341\271\261G\235\331{\254\234\217\034\343y\343 \341\204\301\332" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.757 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 730d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:29.757 UTC [msp.identity] Verify -> DEBU 730e Verify: digest = 00000000 64 f9 5c 29 ef f3 91 dd 90 0c be 43 70 6b a2 41 |d.\).......Cpk.A| +peer0.org1.example.com | 00000010 98 d4 12 12 16 fa 7b 6a 24 df 68 ab d7 8f 06 f7 |......{j$.h.....|" +peer0.org1.example.com | "2019-09-24 00:27:29.757 UTC [msp.identity] Verify -> DEBU 730f Verify: sig = 00000000 30 45 02 21 00 9f ab 0b 05 35 89 be e8 63 7c 0a |0E.!.....5...c|.| +peer0.org1.example.com | 00000010 34 d9 62 99 09 f3 ad d5 51 09 ed ff 13 30 68 33 |4.b.....Q....0h3| +peer0.org1.example.com | 00000020 7d fc 83 97 78 02 20 47 69 21 f7 1b 64 1d 4b 27 |}...x. Gi!..d.K'| +peer0.org1.example.com | 00000030 a2 06 95 79 e1 b9 b1 47 9d d9 7b ac 9c 8f 1c e3 |...y...G..{.....| +peer0.org1.example.com | 00000040 79 e3 20 e1 84 c1 da |y. ....|" +peer0.org1.example.com | "2019-09-24 00:27:29.758 UTC [msp.identity] Verify -> DEBU 7310 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:27:29.758 UTC [msp.identity] Verify -> DEBU 7311 Verify: sig = 00000000 30 44 02 20 05 ac 53 33 c0 a6 b0 77 e8 e7 83 cd |0D. ..S3...w....| +peer0.org1.example.com | 00000010 92 b4 3b 6a 49 5c b6 48 91 8a c8 bc 85 5a 07 da |..;jI\.H.....Z..| +peer0.org1.example.com | 00000020 41 6b b4 e7 02 20 44 88 f9 d5 57 7d f1 a2 7c 56 |Ak... D...W}..|V| +peer0.org1.example.com | 00000030 aa 08 b1 67 d0 b1 09 7f 73 fc c2 cb da 1f 8f 1e |...g....s.......| +peer0.org1.example.com | 00000040 6f 7b 31 14 6a 78 |o{1.jx|" +peer0.org1.example.com | "2019-09-24 00:27:29.759 UTC [gossip.discovery] handleAliveMessage -> DEBU 7312 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.759 UTC [gossip.discovery] learnExistingMembers -> DEBU 7313 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:29.759 UTC [gossip.discovery] learnExistingMembers -> DEBU 7314 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:29.759 UTC [gossip.discovery] learnExistingMembers -> DEBU 7315 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:29.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 7316 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:29.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 7317 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 7318 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7319 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.761 UTC [gossip.discovery] sendMemResponse -> DEBU 731a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:27:29.761 UTC [msp] DeserializeIdentity -> DEBU 731b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.761 UTC [msp] DeserializeIdentity -> DEBU 731c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.762 UTC [gossip.comm] Send -> DEBU 731d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:29.762 UTC [gossip.discovery] sendMemResponse -> DEBU 731e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020a" signature:"0E\002!\000\237\253\013\0055\211\276\350c|\n4\331b\231\t\363\255\325Q\t\355\377\0230h3}\374\203\227x\002 Gi!\367\033d\035K'\242\006\225y\341\271\261G\235\331{\254\234\217\034\343y\343 \341\204\301\332" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 00:27:29.762 UTC [gossip.comm] sendToEndpoint -> DEBU 731f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.763 UTC [gossip.comm] sendToEndpoint -> DEBU 7320 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.781 UTC [endorser] ProcessProposal -> DEBU 7321 Entering: request from 172.18.0.9:51132" +peer0.org1.example.com | "2019-09-24 00:27:29.781 UTC [protoutils] ValidateProposalMessage -> DEBU 7322 ValidateProposalMessage starts for signed proposal 0xc00567b5e0" +peer0.org1.example.com | "2019-09-24 00:27:29.781 UTC [protoutils] validateChannelHeader -> DEBU 7323 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:29.782 UTC [protoutils] checkSignatureFromCreator -> DEBU 7324 begin" +peer0.org1.example.com | "2019-09-24 00:27:29.782 UTC [protoutils] checkSignatureFromCreator -> DEBU 7325 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:29.782 UTC [protoutils] checkSignatureFromCreator -> DEBU 7326 creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:29.782 UTC [msp.identity] Verify -> DEBU 7327 Verify: digest = 00000000 5e 36 9a c9 17 49 04 74 47 08 8a 16 58 ee 27 40 |^6...I.tG...X.'@| +peer0.org1.example.com | 00000010 bd c2 86 17 e7 ed dc d3 56 81 59 c2 55 0a cf 38 |........V.Y.U..8|" +peer0.org1.example.com | "2019-09-24 00:27:29.783 UTC [msp.identity] Verify -> DEBU 7328 Verify: sig = 00000000 30 45 02 21 00 a8 8d 4b 63 9d 5f 95 d0 2b 0c 0a |0E.!...Kc._..+..| +peer0.org1.example.com | 00000010 a1 b8 4d 1a a5 a6 1d 49 bd 2f c3 47 1b 9a bd 06 |..M....I./.G....| +peer0.org1.example.com | 00000020 66 87 6a fc 78 02 20 21 03 37 a3 04 f9 ce 4a d4 |f.j.x. !.7....J.| +peer0.org1.example.com | 00000030 77 da 8f d0 bd 94 e8 f7 6f c1 3a d5 a6 01 c2 13 |w.......o.:.....| +peer0.org1.example.com | 00000040 69 f9 17 b7 2a 99 3f |i...*.?|" +peer0.org1.example.com | "2019-09-24 00:27:29.783 UTC [protoutils] checkSignatureFromCreator -> DEBU 7329 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:29.783 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 732a validateChaincodeProposalMessage starts for proposal 0xc00567c690, header 0xc00567b9f0" +peer0.org1.example.com | "2019-09-24 00:27:29.784 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 732b validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:27:29.784 UTC [endorser] preProcess -> DEBU 732c [][a745125c] processing txid: a745125c0c61d19c7b88be7588ace89ac7666966956f3b51976cf7672914e13e" +peer0.org1.example.com | "2019-09-24 00:27:29.784 UTC [endorser] SimulateProposal -> DEBU 732d [][a745125c] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:27:29.784 UTC [endorser] callChaincode -> INFO 732e [][a745125c] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 00:27:29.784 UTC [chaincode] Execute -> DEBU 732f Entry" +peer0.org1.example.com | "2019-09-24 00:27:29.785 UTC [cscc] Invoke -> DEBU 7330 Invoke function: GetChannels" +peer0.org1.example.com | "2019-09-24 00:27:29.785 UTC [msp.identity] Verify -> DEBU 7331 Verify: digest = 00000000 5e 36 9a c9 17 49 04 74 47 08 8a 16 58 ee 27 40 |^6...I.tG...X.'@| +peer0.org1.example.com | 00000010 bd c2 86 17 e7 ed dc d3 56 81 59 c2 55 0a cf 38 |........V.Y.U..8|" +peer0.org1.example.com | "2019-09-24 00:27:29.785 UTC [msp.identity] Verify -> DEBU 7332 Verify: sig = 00000000 30 45 02 21 00 a8 8d 4b 63 9d 5f 95 d0 2b 0c 0a |0E.!...Kc._..+..| +peer0.org1.example.com | 00000010 a1 b8 4d 1a a5 a6 1d 49 bd 2f c3 47 1b 9a bd 06 |..M....I./.G....| +peer0.org1.example.com | 00000020 66 87 6a fc 78 02 20 21 03 37 a3 04 f9 ce 4a d4 |f.j.x. !.7....J.| +peer0.org1.example.com | 00000030 77 da 8f d0 bd 94 e8 f7 6f c1 3a d5 a6 01 c2 13 |w.......o.:.....| +peer0.org1.example.com | 00000040 69 f9 17 b7 2a 99 3f |i...*.?|" +peer0.org1.example.com | "2019-09-24 00:27:29.786 UTC [chaincode] handleMessage -> DEBU 7333 [a745125c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:29.786 UTC [chaincode] Notify -> DEBU 7334 [a745125c] notifying Txid:a745125c0c61d19c7b88be7588ace89ac7666966956f3b51976cf7672914e13e, channelID:" +peer0.org1.example.com | "2019-09-24 00:27:29.786 UTC [chaincode] Execute -> DEBU 7335 Exit" +peer0.org1.example.com | "2019-09-24 00:27:29.786 UTC [endorser] callChaincode -> INFO 7336 [][a745125c] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-09-24 00:27:29.786 UTC [endorser] SimulateProposal -> DEBU 7337 [][a745125c] Exit" +peer0.org1.example.com | "2019-09-24 00:27:29.787 UTC [endorser] func1 -> DEBU 7338 Exit: request from 172.18.0.9:51132" +peer0.org1.example.com | "2019-09-24 00:27:29.787 UTC [comm.grpc.server] 1 -> INFO 7339 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51132 grpc.code=OK grpc.call_duration=6.2531ms +peer0.org1.example.com | "2019-09-24 00:27:29.790 UTC [grpc] infof -> DEBU 733a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:29.917 UTC [gossip.comm] func1 -> DEBU 733b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.918 UTC [gossip.gossip] handleMessage -> DEBU 733c Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.918 UTC [gossip.gossip] handleMessage -> DEBU 733d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 733e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.920 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 733f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:29.920 UTC [msp] DeserializeIdentity -> DEBU 7340 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.921 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7341 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:29.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7342 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:29.922 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7343 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:29.922 UTC [policies] Evaluate -> DEBU 7344 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:29.922 UTC [policies] Evaluate -> DEBU 7345 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:29.922 UTC [policies] Evaluate -> DEBU 7346 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:29.923 UTC [gossip.comm] func1 -> DEBU 7347 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.923 UTC [gossip.gossip] handleMessage -> DEBU 7348 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.924 UTC [cauthdsl] func1 -> DEBU 7349 0xc0057d8550 gate 1569284849924416200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:29.924 UTC [cauthdsl] func2 -> DEBU 734a 0xc0057d8550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:29.925 UTC [cauthdsl] func2 -> DEBU 734b 0xc0057d8550 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:29.925 UTC [cauthdsl] func2 -> DEBU 734c 0xc0057d8550 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:29.926 UTC [msp.identity] Verify -> DEBU 734d Verify: digest = 00000000 6e e4 6e 3e 07 68 46 7a 0a ad 12 32 a1 99 8e b8 |n.n>.hFz...2....| +peer0.org1.example.com | 00000010 d7 9b c4 ae f9 68 dd d0 76 69 41 d0 b8 d1 94 2d |.....h..viA....-|" +peer0.org1.example.com | "2019-09-24 00:27:29.926 UTC [msp.identity] Verify -> DEBU 734e Verify: sig = 00000000 30 45 02 21 00 80 da 9e ac 23 12 bf 8f 17 4b d0 |0E.!.....#....K.| +peer0.org1.example.com | 00000010 96 41 fc 3b 20 0d c7 8a 8b ab 1e 3c d8 da 80 53 |.A.; ......<...S| +peer0.org1.example.com | 00000020 ac 64 25 a7 b1 02 20 0c 99 62 aa 5a f6 35 2d 96 |.d%... ..b.Z.5-.| +peer0.org1.example.com | 00000030 02 20 39 f7 95 e2 ad 8b 6e a3 ef cc ae 9b 4c 44 |. 9.....n.....LD| +peer0.org1.example.com | 00000040 47 3a 07 02 c7 0f d3 |G:.....|" +peer0.org1.example.com | "2019-09-24 00:27:29.927 UTC [cauthdsl] func2 -> DEBU 734f 0xc0057d8550 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:29.927 UTC [cauthdsl] func1 -> DEBU 7350 0xc0057d8550 gate 1569284849924416200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:29.927 UTC [policies] Evaluate -> DEBU 7351 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:29.927 UTC [policies] Evaluate -> DEBU 7352 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:29.927 UTC [policies] Evaluate -> DEBU 7353 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:29.928 UTC [policies] Evaluate -> DEBU 7354 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:29.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 7355 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 7356 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:29.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 7357 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:29.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 7358 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:29.930 UTC [gossip.comm] func1 -> DEBU 7359 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 735a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:29.930 UTC [gossip.discovery] learnExistingMembers -> DEBU 735b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.930 UTC [gossip.discovery] handleAliveMessage -> DEBU 735c Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 735d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 735e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 735f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.931 UTC [gossip.gossip] handleMessage -> DEBU 7360 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.931 UTC [gossip.gossip] handleMessage -> DEBU 7361 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.931 UTC [gossip.gossip] handleMessage -> DEBU 7362 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7363 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7364 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.933 UTC [msp] DeserializeIdentity -> DEBU 7365 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.933 UTC [msp] DeserializeIdentity -> DEBU 7366 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.933 UTC [msp] DeserializeIdentity -> DEBU 7367 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.933 UTC [msp] DeserializeIdentity -> DEBU 7368 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.933 UTC [msp] DeserializeIdentity -> DEBU 7369 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.934 UTC [msp] DeserializeIdentity -> DEBU 736a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.934 UTC [msp] DeserializeIdentity -> DEBU 736b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.934 UTC [gossip.comm] Send -> DEBU 736c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:29.934 UTC [msp] DeserializeIdentity -> DEBU 736d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.934 UTC [gossip.comm] Send -> DEBU 736e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:29.935 UTC [gossip.comm] sendToEndpoint -> DEBU 736f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.935 UTC [gossip.comm] sendToEndpoint -> DEBU 7370 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.935 UTC [gossip.comm] sendToEndpoint -> DEBU 7371 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.937 UTC [gossip.comm] sendToEndpoint -> DEBU 7372 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:29.974 UTC [gossip.comm] func1 -> DEBU 7373 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.974 UTC [gossip.gossip] handleMessage -> DEBU 7374 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:29.974 UTC [msp] DeserializeIdentity -> DEBU 7375 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.975 UTC [msp] DeserializeIdentity -> DEBU 7376 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.975 UTC [msp] DeserializeIdentity -> DEBU 7377 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:29.975 UTC [gossip.gossip] handleMessage -> DEBU 7378 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:30.559 UTC [endorser] ProcessProposal -> DEBU 7379 Entering: request from 172.18.0.9:51140" +peer0.org1.example.com | "2019-09-24 00:27:30.559 UTC [protoutils] ValidateProposalMessage -> DEBU 737a ValidateProposalMessage starts for signed proposal 0xc0057d0c30" +peer0.org1.example.com | "2019-09-24 00:27:30.560 UTC [protoutils] validateChannelHeader -> DEBU 737b validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 00:27:30.560 UTC [protoutils] checkSignatureFromCreator -> DEBU 737c begin" +peer0.org1.example.com | "2019-09-24 00:27:30.560 UTC [protoutils] checkSignatureFromCreator -> DEBU 737d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-09-24 00:27:30.560 UTC [protoutils] checkSignatureFromCreator -> DEBU 737e creator is valid" +peer0.org1.example.com | "2019-09-24 00:27:30.560 UTC [msp.identity] Verify -> DEBU 737f Verify: digest = 00000000 4d dd ea c6 54 8d b9 1a 3c 52 21 dd ca 7e 55 29 |M...T... DEBU 7380 Verify: sig = 00000000 30 45 02 21 00 cd 7a 60 dd 34 18 1a fc ec 25 28 |0E.!..z`.4....%(| +peer0.org1.example.com | 00000010 63 45 c3 c5 e6 db fd b5 d5 f8 a9 b7 88 d0 75 c7 |cE............u.| +peer0.org1.example.com | 00000020 96 56 50 3a 75 02 20 7c 59 d0 9c f7 a8 cc 6c 2c |.VP:u. |Y.....l,| +peer0.org1.example.com | 00000030 c3 27 40 ee ef a6 3b c6 36 1c 5f ee da fb 40 36 |.'@...;.6._...@6| +peer0.org1.example.com | 00000040 0e 78 6b ad d3 65 f2 |.xk..e.|" +peer0.org1.example.com | "2019-09-24 00:27:30.560 UTC [protoutils] checkSignatureFromCreator -> DEBU 7381 exits successfully" +peer0.org1.example.com | "2019-09-24 00:27:30.560 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 7382 validateChaincodeProposalMessage starts for proposal 0xc00567ccb0, header 0xc0057d1040" +peer0.org1.example.com | "2019-09-24 00:27:30.561 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 7383 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:27:30.561 UTC [endorser] preProcess -> DEBU 7384 [][cb32f5b6] processing txid: cb32f5b671558f944ff7e6d05111908a27f6db687869e59f5b7d22afa5f9b9f0" +peer0.org1.example.com | "2019-09-24 00:27:30.561 UTC [endorser] SimulateProposal -> DEBU 7385 [][cb32f5b6] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:27:30.561 UTC [endorser] callChaincode -> INFO 7386 [][cb32f5b6] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 00:27:30.561 UTC [chaincode] Execute -> DEBU 7387 Entry" +peer0.org1.example.com | "2019-09-24 00:27:30.561 UTC [qscc] Invoke -> DEBU 7388 Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-09-24 00:27:30.561 UTC [aclmgmt] CheckACL -> DEBU 7389 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-09-24 00:27:30.562 UTC [aclmgmt] CheckACL -> DEBU 738a acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 00:27:30.562 UTC [policies] Evaluate -> DEBU 738b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:30.562 UTC [policies] Evaluate -> DEBU 738c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:30.562 UTC [policies] Evaluate -> DEBU 738d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:30.562 UTC [msp] DeserializeIdentity -> DEBU 738e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:30.563 UTC [msp.identity] newIdentity -> DEBU 738f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 00:27:30.563 UTC [cauthdsl] func1 -> DEBU 7390 0xc005846130 gate 1569284850563914100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:30.563 UTC [cauthdsl] func2 -> DEBU 7391 0xc005846130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:30.564 UTC [cauthdsl] func2 -> DEBU 7392 0xc005846130 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:30.564 UTC [cauthdsl] func2 -> DEBU 7393 0xc005846130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-09-24 00:27:30.564 UTC [cauthdsl] func2 -> DEBU 7394 0xc005846130 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:30.564 UTC [cauthdsl] func1 -> DEBU 7395 0xc005846130 gate 1569284850563914100 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:30.564 UTC [policies] Evaluate -> DEBU 7396 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.564 UTC [policies] Evaluate -> DEBU 7397 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.564 UTC [policies] Evaluate -> DEBU 7398 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:30.564 UTC [cauthdsl] func1 -> DEBU 7399 0xc0058472b0 gate 1569284850564939300 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:30.565 UTC [cauthdsl] func2 -> DEBU 739a 0xc0058472b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:30.565 UTC [cauthdsl] func2 -> DEBU 739b 0xc0058472b0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:30.565 UTC [cauthdsl] func2 -> DEBU 739c 0xc0058472b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +peer0.org1.example.com | "2019-09-24 00:27:30.565 UTC [cauthdsl] func2 -> DEBU 739d 0xc0058472b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:30.565 UTC [cauthdsl] func1 -> DEBU 739e 0xc0058472b0 gate 1569284850564939300 evaluation fails" +peer0.org1.example.com | "2019-09-24 00:27:30.565 UTC [policies] Evaluate -> DEBU 739f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.566 UTC [policies] Evaluate -> DEBU 73a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.566 UTC [policies] Evaluate -> DEBU 73a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:30.566 UTC [cauthdsl] func1 -> DEBU 73a2 0xc005847b10 gate 1569284850566103100 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:30.566 UTC [cauthdsl] func2 -> DEBU 73a3 0xc005847b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:30.566 UTC [cauthdsl] func2 -> DEBU 73a4 0xc005847b10 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:30.566 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 73a5 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 00:27:30.566 UTC [msp] Validate -> DEBU 73a6 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 00:27:30.566 UTC [msp] getCertificationChain -> DEBU 73a7 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 00:27:30.566 UTC [cauthdsl] func2 -> DEBU 73a8 0xc005847b10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:30.567 UTC [msp.identity] Verify -> DEBU 73a9 Verify: digest = 00000000 4d dd ea c6 54 8d b9 1a 3c 52 21 dd ca 7e 55 29 |M...T... DEBU 73aa Verify: sig = 00000000 30 45 02 21 00 cd 7a 60 dd 34 18 1a fc ec 25 28 |0E.!..z`.4....%(| +peer0.org1.example.com | 00000010 63 45 c3 c5 e6 db fd b5 d5 f8 a9 b7 88 d0 75 c7 |cE............u.| +peer0.org1.example.com | 00000020 96 56 50 3a 75 02 20 7c 59 d0 9c f7 a8 cc 6c 2c |.VP:u. |Y.....l,| +peer0.org1.example.com | 00000030 c3 27 40 ee ef a6 3b c6 36 1c 5f ee da fb 40 36 |.'@...;.6._...@6| +peer0.org1.example.com | 00000040 0e 78 6b ad d3 65 f2 |.xk..e.|" +peer0.org1.example.com | "2019-09-24 00:27:30.567 UTC [cauthdsl] func2 -> DEBU 73ab 0xc005847b10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:30.567 UTC [cauthdsl] func1 -> DEBU 73ac 0xc005847b10 gate 1569284850566103100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:30.567 UTC [policies] Evaluate -> DEBU 73ad Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.567 UTC [policies] Evaluate -> DEBU 73ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.567 UTC [policies] Evaluate -> DEBU 73af Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.567 UTC [policies] Evaluate -> DEBU 73b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.568 UTC [chaincode] handleMessage -> DEBU 73b1 [cb32f5b6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 00:27:30.568 UTC [chaincode] Notify -> DEBU 73b2 [cb32f5b6] notifying Txid:cb32f5b671558f944ff7e6d05111908a27f6db687869e59f5b7d22afa5f9b9f0, channelID:" +peer0.org1.example.com | "2019-09-24 00:27:30.568 UTC [chaincode] Execute -> DEBU 73b3 Exit" +peer0.org1.example.com | "2019-09-24 00:27:30.568 UTC [endorser] callChaincode -> INFO 73b4 [][cb32f5b6] Exit chaincode: name:"qscc" (7ms)" +peer0.org1.example.com | "2019-09-24 00:27:30.568 UTC [endorser] SimulateProposal -> DEBU 73b5 [][cb32f5b6] Exit" +peer0.org1.example.com | "2019-09-24 00:27:30.568 UTC [endorser] func1 -> DEBU 73b6 Exit: request from 172.18.0.9:51140" +peer0.org1.example.com | "2019-09-24 00:27:30.568 UTC [comm.grpc.server] 1 -> INFO 73b7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51140 grpc.code=OK grpc.call_duration=9.6435ms +peer0.org1.example.com | "2019-09-24 00:27:30.573 UTC [grpc] warningf -> DEBU 73b8 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:51140: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 00:27:30.573 UTC [grpc] infof -> DEBU 73b9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 00:27:30.641 UTC [gossip.comm] func1 -> DEBU 73ba Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.641 UTC [gossip.gossip] handleMessage -> DEBU 73bb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.641 UTC [gossip.gossip] handleMessage -> DEBU 73bc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:30.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73bd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.642 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 73be Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:30.642 UTC [msp] DeserializeIdentity -> DEBU 73bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:30.643 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 73c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:30.643 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 73c1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:30.643 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 73c2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:30.643 UTC [policies] Evaluate -> DEBU 73c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:30.644 UTC [policies] Evaluate -> DEBU 73c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:30.644 UTC [policies] Evaluate -> DEBU 73c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:30.644 UTC [cauthdsl] func1 -> DEBU 73c6 0xc005809a30 gate 1569284850644568800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:30.645 UTC [cauthdsl] func2 -> DEBU 73c7 0xc005809a30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:30.645 UTC [cauthdsl] func2 -> DEBU 73c8 0xc005809a30 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:30.645 UTC [cauthdsl] func2 -> DEBU 73c9 0xc005809a30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:30.645 UTC [msp.identity] Verify -> DEBU 73ca Verify: digest = 00000000 d9 79 08 0d 9e 48 2f d9 39 c2 44 08 10 bc 06 1f |.y...H/.9.D.....| +peer0.org1.example.com | 00000010 56 0d 01 42 57 1a 70 88 18 df 77 48 fc 28 70 60 |V..BW.p...wH.(p`|" +peer0.org1.example.com | "2019-09-24 00:27:30.646 UTC [msp.identity] Verify -> DEBU 73cb Verify: sig = 00000000 30 45 02 21 00 a0 cf c2 06 cf 8f b6 69 05 68 71 |0E.!........i.hq| +peer0.org1.example.com | 00000010 b1 fe 86 e2 40 ca 0f cc 2f d5 0d 11 11 a2 98 e4 |....@.../.......| +peer0.org1.example.com | 00000020 64 5c 06 ba d0 02 20 4c 5d 91 6f 98 7c 3e 9a af |d\.... L].o.|>..| +peer0.org1.example.com | 00000030 a9 a2 38 4c df 3a 73 82 72 78 94 25 a6 58 e9 a3 |..8L.:s.rx.%.X..| +peer0.org1.example.com | 00000040 c2 ca 23 4a b2 5e 64 |..#J.^d|" +peer0.org1.example.com | "2019-09-24 00:27:30.646 UTC [cauthdsl] func2 -> DEBU 73cc 0xc005809a30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:30.646 UTC [cauthdsl] func1 -> DEBU 73cd 0xc005809a30 gate 1569284850644568800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:30.646 UTC [policies] Evaluate -> DEBU 73ce Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.647 UTC [policies] Evaluate -> DEBU 73cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.647 UTC [policies] Evaluate -> DEBU 73d0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.647 UTC [policies] Evaluate -> DEBU 73d1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:30.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 73d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 73d3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:30.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 73d4 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:30.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 73d6 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:30.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 73d7 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:30.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 73d8 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:30.649 UTC [gossip.discovery] handleAliveMessage -> DEBU 73d9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:30.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73da Exiting" +peer0.org1.example.com | "2019-09-24 00:27:30.648 UTC [gossip.comm] func1 -> DEBU 73d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.649 UTC [gossip.gossip] handleMessage -> DEBU 73db Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.649 UTC [gossip.gossip] handleMessage -> DEBU 73dc Exiting" +peer0.org1.example.com | "2019-09-24 00:27:30.651 UTC [gossip.comm] func1 -> DEBU 73dd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.651 UTC [gossip.gossip] handleMessage -> DEBU 73de Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73df Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73e0 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:30.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73e1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73e2 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:30.652 UTC [gossip.gossip] handleMessage -> DEBU 73e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:30.656 UTC [msp] DeserializeIdentity -> DEBU 73e4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:30.656 UTC [msp] DeserializeIdentity -> DEBU 73e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:30.656 UTC [msp] DeserializeIdentity -> DEBU 73e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:30.657 UTC [msp] DeserializeIdentity -> DEBU 73e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:30.657 UTC [msp] DeserializeIdentity -> DEBU 73e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:30.657 UTC [msp] DeserializeIdentity -> DEBU 73e9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:30.658 UTC [msp] DeserializeIdentity -> DEBU 73ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:30.658 UTC [gossip.comm] Send -> DEBU 73eb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:30.658 UTC [msp] DeserializeIdentity -> DEBU 73ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:30.659 UTC [gossip.comm] sendToEndpoint -> DEBU 73ed Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.659 UTC [gossip.comm] sendToEndpoint -> DEBU 73ee Exiting" +peer0.org1.example.com | "2019-09-24 00:27:30.659 UTC [gossip.comm] Send -> DEBU 73ef Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:30.659 UTC [gossip.comm] sendToEndpoint -> DEBU 73f0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:30.659 UTC [gossip.comm] sendToEndpoint -> DEBU 73f1 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.706 UTC [gossip.pull] Hello -> DEBU 73f2 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:31.707 UTC [gossip.comm] Send -> DEBU 73f3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:31.707 UTC [gossip.pull] Hello -> DEBU 73f4 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:31.707 UTC [gossip.comm] Send -> DEBU 73f5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:31.707 UTC [gossip.pull] Hello -> DEBU 73f6 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:31.707 UTC [gossip.comm] Send -> DEBU 73f7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:31.707 UTC [gossip.comm] sendToEndpoint -> DEBU 73f8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.707 UTC [gossip.comm] sendToEndpoint -> DEBU 73f9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.707 UTC [gossip.comm] sendToEndpoint -> DEBU 73fa Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.707 UTC [gossip.comm] sendToEndpoint -> DEBU 73fb Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.707 UTC [gossip.comm] sendToEndpoint -> DEBU 73fc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.707 UTC [gossip.comm] sendToEndpoint -> DEBU 73fd Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.708 UTC [gossip.comm] func1 -> DEBU 73fe Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.708 UTC [gossip.gossip] handleMessage -> DEBU 73ff Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.709 UTC [gossip.pull] HandleMessage -> DEBU 7400 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.709 UTC [gossip.gossip] handleMessage -> DEBU 7401 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.709 UTC [gossip.comm] func1 -> DEBU 7402 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.709 UTC [gossip.gossip] handleMessage -> DEBU 7403 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.709 UTC [gossip.pull] HandleMessage -> DEBU 7404 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.709 UTC [gossip.gossip] handleMessage -> DEBU 7405 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.709 UTC [gossip.comm] func1 -> DEBU 7406 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 152 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.709 UTC [gossip.gossip] handleMessage -> DEBU 7407 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 152 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.709 UTC [gossip.pull] HandleMessage -> DEBU 7408 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 152 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.709 UTC [gossip.gossip] handleMessage -> DEBU 7409 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.842 UTC [msp] GetDefaultSigningIdentity -> DEBU 740a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:31.842 UTC [msp.identity] Sign -> DEBU 740b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315105C " +peer0.org1.example.com | "2019-09-24 00:27:31.842 UTC [msp.identity] Sign -> DEBU 740c Sign: digest: 441F25AB62C0CCD76A6E1B3BDCAE798BF090E0CDDA34DB8420CBC162B3824149 " +peer0.org1.example.com | "2019-09-24 00:27:31.843 UTC [msp] GetDefaultSigningIdentity -> DEBU 740d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:31.843 UTC [msp.identity] Sign -> DEBU 740e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 00:27:31.843 UTC [msp.identity] Sign -> DEBU 740f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 00:27:31.843 UTC [gossip.comm] Send -> DEBU 7410 Entering, sending GossipMessage: tag:EMPTY mem_req:\002 ?\313B\266\347\340K\027w\262\327.\263\207\216i)\030\314\346\273\335\212o\256,\3042\244\342}\005" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:31.844 UTC [msp] DeserializeIdentity -> DEBU 7411 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:31.844 UTC [gossip.comm] Send -> DEBU 7412 Entering, sending GossipMessage: tag:EMPTY mem_req:\002 ?\313B\266\347\340K\027w\262\327.\263\207\216i)\030\314\346\273\335\212o\256,\3042\244\342}\005" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:31.844 UTC [msp] DeserializeIdentity -> DEBU 7413 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:31.844 UTC [gossip.comm] sendToEndpoint -> DEBU 7414 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 ?\313B\266\347\340K\027w\262\327.\263\207\216i)\030\314\346\273\335\212o\256,\3042\244\342}\005" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.844 UTC [gossip.comm] sendToEndpoint -> DEBU 7415 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.844 UTC [gossip.comm] Send -> DEBU 7416 Entering, sending GossipMessage: tag:EMPTY mem_req:\002 ?\313B\266\347\340K\027w\262\327.\263\207\216i)\030\314\346\273\335\212o\256,\3042\244\342}\005" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:31.844 UTC [gossip.comm] sendToEndpoint -> DEBU 7417 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 ?\313B\266\347\340K\027w\262\327.\263\207\216i)\030\314\346\273\335\212o\256,\3042\244\342}\005" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.844 UTC [gossip.comm] sendToEndpoint -> DEBU 7418 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.845 UTC [gossip.comm] sendToEndpoint -> DEBU 7419 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 ?\313B\266\347\340K\027w\262\327.\263\207\216i)\030\314\346\273\335\212o\256,\3042\244\342}\005" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.845 UTC [gossip.comm] sendToEndpoint -> DEBU 741a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [gossip.comm] func1 -> DEBU 741b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [gossip.gossip] handleMessage -> DEBU 741c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [gossip.gossip] handleMessage -> DEBU 741d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 741e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 741f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [msp.identity] Verify -> DEBU 7420 Verify: digest = 00000000 44 1f 25 ab 62 c0 cc d7 6a 6e 1b 3b dc ae 79 8b |D.%.b...jn.;..y.| +peer0.org1.example.com | 00000010 f0 90 e0 cd da 34 db 84 20 cb c1 62 b3 82 41 49 |.....4.. ..b..AI|" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [msp.identity] Verify -> DEBU 7421 Verify: sig = 00000000 30 44 02 20 1d e8 d4 72 51 b3 74 ae 3f 24 2e 69 |0D. ...rQ.t.?$.i| +peer0.org1.example.com | 00000010 e6 71 75 ba 40 ba b8 11 c8 9d ae 9d 2e 76 9b 04 |.qu.@........v..| +peer0.org1.example.com | 00000020 37 56 54 3e 02 20 3f cb 42 b6 e7 e0 4b 17 77 b2 |7VT>. ?.B...K.w.| +peer0.org1.example.com | 00000030 d7 2e b3 87 8e 69 29 18 cc e6 bb dd 8a 6f ae 2c |.....i)......o.,| +peer0.org1.example.com | 00000040 c4 32 a4 e2 7d 05 |.2..}.|" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 7422 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [gossip.discovery] isSentByMe -> DEBU 7423 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 7424 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7425 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [msp.identity] Verify -> DEBU 7426 Verify: digest = 00000000 64 f9 5c 29 ef f3 91 dd 90 0c be 43 70 6b a2 41 |d.\).......Cpk.A| +peer0.org1.example.com | 00000010 98 d4 12 12 16 fa 7b 6a 24 df 68 ab d7 8f 06 f7 |......{j$.h.....|" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [msp.identity] Verify -> DEBU 7427 Verify: sig = 00000000 30 45 02 21 00 9f ab 0b 05 35 89 be e8 63 7c 0a |0E.!.....5...c|.| +peer0.org1.example.com | 00000010 34 d9 62 99 09 f3 ad d5 51 09 ed ff 13 30 68 33 |4.b.....Q....0h3| +peer0.org1.example.com | 00000020 7d fc 83 97 78 02 20 47 69 21 f7 1b 64 1d 4b 27 |}...x. Gi!..d.K'| +peer0.org1.example.com | 00000030 a2 06 95 79 e1 b9 b1 47 9d d9 7b ac 9c 8f 1c e3 |...y...G..{.....| +peer0.org1.example.com | 00000040 79 e3 20 e1 84 c1 da |y. ....|" +peer0.org1.example.com | "2019-09-24 00:27:31.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 7428 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 7429 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 742a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.847 UTC [gossip.comm] func1 -> DEBU 742b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.847 UTC [gossip.gossip] handleMessage -> DEBU 742c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.847 UTC [gossip.gossip] handleMessage -> DEBU 742d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 742e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 742f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:31.848 UTC [msp.identity] Verify -> DEBU 7430 Verify: digest = 00000000 44 1f 25 ab 62 c0 cc d7 6a 6e 1b 3b dc ae 79 8b |D.%.b...jn.;..y.| +peer0.org1.example.com | 00000010 f0 90 e0 cd da 34 db 84 20 cb c1 62 b3 82 41 49 |.....4.. ..b..AI|" +peer0.org1.example.com | "2019-09-24 00:27:31.848 UTC [msp.identity] Verify -> DEBU 7431 Verify: sig = 00000000 30 44 02 20 1d e8 d4 72 51 b3 74 ae 3f 24 2e 69 |0D. ...rQ.t.?$.i| +peer0.org1.example.com | 00000010 e6 71 75 ba 40 ba b8 11 c8 9d ae 9d 2e 76 9b 04 |.qu.@........v..| +peer0.org1.example.com | 00000020 37 56 54 3e 02 20 3f cb 42 b6 e7 e0 4b 17 77 b2 |7VT>. ?.B...K.w.| +peer0.org1.example.com | 00000030 d7 2e b3 87 8e 69 29 18 cc e6 bb dd 8a 6f ae 2c |.....i)......o.,| +peer0.org1.example.com | 00000040 c4 32 a4 e2 7d 05 |.2..}.|" +peer0.org1.example.com | "2019-09-24 00:27:31.848 UTC [msp.identity] Verify -> DEBU 7432 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 00:27:31.848 UTC [msp.identity] Verify -> DEBU 7433 Verify: sig = 00000000 30 45 02 21 00 dc 53 04 11 02 d2 2a 38 0d e9 c7 |0E.!..S....*8...| +peer0.org1.example.com | 00000010 ad 0e cf df 05 19 7d 2c 23 96 02 0c a5 bd 12 66 |......},#......f| +peer0.org1.example.com | 00000020 8c 57 9d b4 e8 02 20 23 e0 13 b0 21 d0 61 c6 ba |.W.... #...!.a..| +peer0.org1.example.com | 00000030 b4 7d 8a 69 96 90 3b 4b 52 17 bb 71 45 19 1b 0b |.}.i..;KR..qE...| +peer0.org1.example.com | 00000040 6c ea e0 54 57 b7 f2 |l..TW..|" +peer0.org1.example.com | "2019-09-24 00:27:31.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 7434 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.848 UTC [gossip.discovery] isSentByMe -> DEBU 7435 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 7436 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7437 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.849 UTC [gossip.comm] func1 -> DEBU 7438 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.849 UTC [gossip.gossip] handleMessage -> DEBU 7439 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.849 UTC [gossip.gossip] handleMessage -> DEBU 743a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.849 UTC [gossip.discovery] handleMsgFromComm -> DEBU 743b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.849 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 743c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:31.849 UTC [msp.identity] Verify -> DEBU 743d Verify: digest = 00000000 64 f9 5c 29 ef f3 91 dd 90 0c be 43 70 6b a2 41 |d.\).......Cpk.A| +peer0.org1.example.com | 00000010 98 d4 12 12 16 fa 7b 6a 24 df 68 ab d7 8f 06 f7 |......{j$.h.....|" +peer0.org1.example.com | "2019-09-24 00:27:31.849 UTC [msp.identity] Verify -> DEBU 743e Verify: sig = 00000000 30 45 02 21 00 9f ab 0b 05 35 89 be e8 63 7c 0a |0E.!.....5...c|.| +peer0.org1.example.com | 00000010 34 d9 62 99 09 f3 ad d5 51 09 ed ff 13 30 68 33 |4.b.....Q....0h3| +peer0.org1.example.com | 00000020 7d fc 83 97 78 02 20 47 69 21 f7 1b 64 1d 4b 27 |}...x. Gi!..d.K'| +peer0.org1.example.com | 00000030 a2 06 95 79 e1 b9 b1 47 9d d9 7b ac 9c 8f 1c e3 |...y...G..{.....| +peer0.org1.example.com | 00000040 79 e3 20 e1 84 c1 da |y. ....|" +peer0.org1.example.com | "2019-09-24 00:27:31.850 UTC [gossip.discovery] handleAliveMessage -> DEBU 743f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.850 UTC [gossip.discovery] handleAliveMessage -> DEBU 7440 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.850 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7441 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:31.850 UTC [msp.identity] Verify -> DEBU 7442 Verify: digest = 00000000 44 1f 25 ab 62 c0 cc d7 6a 6e 1b 3b dc ae 79 8b |D.%.b...jn.;..y.| +peer0.org1.example.com | 00000010 f0 90 e0 cd da 34 db 84 20 cb c1 62 b3 82 41 49 |.....4.. ..b..AI|" +peer0.org1.example.com | "2019-09-24 00:27:31.850 UTC [msp.identity] Verify -> DEBU 7443 Verify: sig = 00000000 30 44 02 20 1d e8 d4 72 51 b3 74 ae 3f 24 2e 69 |0D. ...rQ.t.?$.i| +peer0.org1.example.com | 00000010 e6 71 75 ba 40 ba b8 11 c8 9d ae 9d 2e 76 9b 04 |.qu.@........v..| +peer0.org1.example.com | 00000020 37 56 54 3e 02 20 3f cb 42 b6 e7 e0 4b 17 77 b2 |7VT>. ?.B...K.w.| +peer0.org1.example.com | 00000030 d7 2e b3 87 8e 69 29 18 cc e6 bb dd 8a 6f ae 2c |.....i)......o.,| +peer0.org1.example.com | 00000040 c4 32 a4 e2 7d 05 |.2..}.|" +peer0.org1.example.com | "2019-09-24 00:27:31.850 UTC [gossip.discovery] handleAliveMessage -> DEBU 7444 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.850 UTC [gossip.discovery] isSentByMe -> DEBU 7445 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.850 UTC [gossip.discovery] handleAliveMessage -> DEBU 7446 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7447 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.884 UTC [gossip.comm] func1 -> DEBU 7448 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.884 UTC [gossip.gossip] handleMessage -> DEBU 7449 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.885 UTC [gossip.pull] HandleMessage -> DEBU 744a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.885 UTC [msp] DeserializeIdentity -> DEBU 744b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:31.885 UTC [msp] DeserializeIdentity -> DEBU 744c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:31.885 UTC [msp] DeserializeIdentity -> DEBU 744d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:31.885 UTC [msp] DeserializeIdentity -> DEBU 744e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:31.885 UTC [msp] DeserializeIdentity -> DEBU 744f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:31.885 UTC [msp] DeserializeIdentity -> DEBU 7450 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:31.885 UTC [gossip.pull] SendDigest -> DEBU 7451 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-09-24 00:27:31.886 UTC [gossip.gossip] handleMessage -> DEBU 7452 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:31.996 UTC [gossip.comm] func1 -> DEBU 7453 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.996 UTC [gossip.gossip] handleMessage -> DEBU 7454 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:31.997 UTC [gossip.gossip] handleMessage -> DEBU 7455 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.002 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7456 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.003 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7457 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:32.003 UTC [msp] DeserializeIdentity -> DEBU 7458 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7459 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 745a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 745b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [policies] Evaluate -> DEBU 745c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [policies] Evaluate -> DEBU 745d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [policies] Evaluate -> DEBU 745e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [cauthdsl] func1 -> DEBU 745f 0xc0058f91e0 gate 1569284852013665600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [cauthdsl] func2 -> DEBU 7460 0xc0058f91e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [cauthdsl] func2 -> DEBU 7461 0xc0058f91e0 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [cauthdsl] func2 -> DEBU 7462 0xc0058f91e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [msp.identity] Verify -> DEBU 7463 Verify: digest = 00000000 45 39 54 f8 e7 9f 99 43 a4 39 bf 57 f2 d9 2b 62 |E9T....C.9.W..+b| +peer0.org1.example.com | 00000010 9d 4e 5f 08 d3 0e 04 c4 33 47 d6 49 4e 55 40 4b |.N_.....3G.INU@K|" +peer0.org1.example.com | "2019-09-24 00:27:32.013 UTC [msp.identity] Verify -> DEBU 7464 Verify: sig = 00000000 30 45 02 21 00 d3 92 38 d3 b4 0a 87 e2 18 1f 6d |0E.!...8.......m| +peer0.org1.example.com | 00000010 f8 bb b6 9b 48 01 e9 7d 81 fd e2 bb ac 55 17 39 |....H..}.....U.9| +peer0.org1.example.com | 00000020 0d e3 1e c0 97 02 20 66 f1 04 b0 32 5d 4f 99 ef |...... f...2]O..| +peer0.org1.example.com | 00000030 89 43 88 7e 7d b9 99 c3 07 7d 02 f4 14 c5 e2 a5 |.C.~}....}......| +peer0.org1.example.com | 00000040 37 e4 13 f1 6a 9c cf |7...j..|" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [cauthdsl] func2 -> DEBU 7465 0xc0058f91e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [cauthdsl] func1 -> DEBU 7466 0xc0058f91e0 gate 1569284852013665600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [policies] Evaluate -> DEBU 7467 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [policies] Evaluate -> DEBU 7468 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [policies] Evaluate -> DEBU 7469 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [policies] Evaluate -> DEBU 746a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [gossip.discovery] handleAliveMessage -> DEBU 746b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [gossip.discovery] learnExistingMembers -> DEBU 746c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [gossip.discovery] learnExistingMembers -> DEBU 746d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [gossip.discovery] learnExistingMembers -> DEBU 746e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [gossip.discovery] learnExistingMembers -> DEBU 746f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [gossip.discovery] learnExistingMembers -> DEBU 7470 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [gossip.discovery] handleAliveMessage -> DEBU 7471 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7472 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [gossip.discovery] sendMemResponse -> DEBU 7473 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [msp] DeserializeIdentity -> DEBU 7474 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [msp] DeserializeIdentity -> DEBU 7475 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.014 UTC [msp] DeserializeIdentity -> DEBU 7476 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.015 UTC [gossip.comm] Send -> DEBU 7477 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:32.015 UTC [gossip.discovery] sendMemResponse -> DEBU 7478 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020a" signature:"0E\002!\000\237\253\013\0055\211\276\350c|\n4\331b\231\t\363\255\325Q\t\355\377\0230h3}\374\203\227x\002 Gi!\367\033d\035K'\242\006\225y\341\271\261G\235\331{\254\234\217\034\343y\343 \341\204\301\332" > alive:\232\257\251\2428L\337:s\202rx\224%\246X\351\243\302\312#J\262^d" > alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:32.015 UTC [gossip.comm] sendToEndpoint -> DEBU 7479 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.015 UTC [gossip.comm] sendToEndpoint -> DEBU 747a Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.052 UTC [msp] DeserializeIdentity -> DEBU 747b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.052 UTC [msp] DeserializeIdentity -> DEBU 747c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.052 UTC [gossip.comm] Send -> DEBU 747d Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 00:27:32.053 UTC [gossip.comm] sendToEndpoint -> DEBU 747e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.053 UTC [gossip.comm] sendToEndpoint -> DEBU 747f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.053 UTC [gossip.comm] sendToEndpoint -> DEBU 7480 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.053 UTC [gossip.comm] sendToEndpoint -> DEBU 7481 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.053 UTC [gossip.comm] sendToEndpoint -> DEBU 7482 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.053 UTC [gossip.comm] sendToEndpoint -> DEBU 7483 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.056 UTC [gossip.comm] func1 -> DEBU 7484 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.056 UTC [gossip.gossip] handleMessage -> DEBU 7485 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.056 UTC [msp] DeserializeIdentity -> DEBU 7486 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.056 UTC [msp] DeserializeIdentity -> DEBU 7487 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.056 UTC [msp] DeserializeIdentity -> DEBU 7488 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.056 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7489 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:32.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 748a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 748b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.056 UTC [policies] Evaluate -> DEBU 748c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.056 UTC [policies] Evaluate -> DEBU 748d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:32.056 UTC [policies] Evaluate -> DEBU 748e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.057 UTC [cauthdsl] func1 -> DEBU 748f 0xc00592e930 gate 1569284852057007400 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:32.057 UTC [cauthdsl] func2 -> DEBU 7490 0xc00592e930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:32.057 UTC [cauthdsl] func2 -> DEBU 7491 0xc00592e930 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:32.057 UTC [cauthdsl] func2 -> DEBU 7492 0xc00592e930 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.057 UTC [msp.identity] Verify -> DEBU 7493 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:32.057 UTC [msp.identity] Verify -> DEBU 7494 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:32.057 UTC [cauthdsl] func2 -> DEBU 7495 0xc00592e930 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.057 UTC [cauthdsl] func1 -> DEBU 7496 0xc00592e930 gate 1569284852057007400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:32.057 UTC [policies] Evaluate -> DEBU 7497 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.057 UTC [policies] Evaluate -> DEBU 7498 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.058 UTC [gossip.comm] func1 -> DEBU 7499 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.057 UTC [policies] Evaluate -> DEBU 749a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.059 UTC [policies] Evaluate -> DEBU 749b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.059 UTC [msp.identity] Verify -> DEBU 749c Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +peer0.org1.example.com | 00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +peer0.org1.example.com | "2019-09-24 00:27:32.059 UTC [msp.identity] Verify -> DEBU 749d Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +peer0.org1.example.com | 00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +peer0.org1.example.com | 00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +peer0.org1.example.com | 00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +peer0.org1.example.com | 00000040 54 87 75 e6 8e 00 |T.u...|" +peer0.org1.example.com | "2019-09-24 00:27:32.061 UTC [msp.identity] Verify -> DEBU 749e Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:32.061 UTC [msp.identity] Verify -> DEBU 749f Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:32.061 UTC [msp] DeserializeIdentity -> DEBU 74a0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.061 UTC [msp] DeserializeIdentity -> DEBU 74a1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.061 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 74a2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:32.061 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 74a3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.061 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 74a4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.061 UTC [policies] Evaluate -> DEBU 74a5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.061 UTC [policies] Evaluate -> DEBU 74a6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:32.061 UTC [policies] Evaluate -> DEBU 74a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.061 UTC [cauthdsl] func1 -> DEBU 74a8 0xc005946f40 gate 1569284852061966600 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:32.062 UTC [cauthdsl] func2 -> DEBU 74a9 0xc005946f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:32.062 UTC [cauthdsl] func2 -> DEBU 74aa 0xc005946f40 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:32.062 UTC [cauthdsl] func2 -> DEBU 74ab 0xc005946f40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.062 UTC [msp.identity] Verify -> DEBU 74ac Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:32.062 UTC [msp.identity] Verify -> DEBU 74ad Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:32.062 UTC [cauthdsl] func2 -> DEBU 74ae 0xc005946f40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.062 UTC [cauthdsl] func1 -> DEBU 74af 0xc005946f40 gate 1569284852061966600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:32.062 UTC [policies] Evaluate -> DEBU 74b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.062 UTC [policies] Evaluate -> DEBU 74b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.062 UTC [policies] Evaluate -> DEBU 74b2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.085 UTC [gossip.comm] func1 -> DEBU 74b3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.086 UTC [policies] Evaluate -> DEBU 74b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.086 UTC [gossip.gossip] handleMessage -> DEBU 74b5 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.086 UTC [gossip.gossip] handleMessage -> DEBU 74b6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.087 UTC [msp.identity] Verify -> DEBU 74b7 Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:32.087 UTC [msp.identity] Verify -> DEBU 74b8 Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:32.088 UTC [msp.identity] Verify -> DEBU 74b9 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +peer0.org1.example.com | 00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +peer0.org1.example.com | "2019-09-24 00:27:32.088 UTC [msp.identity] Verify -> DEBU 74ba Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +peer0.org1.example.com | 00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +peer0.org1.example.com | 00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +peer0.org1.example.com | 00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +peer0.org1.example.com | 00000040 54 87 75 e6 8e 00 |T.u...|" +peer0.org1.example.com | "2019-09-24 00:27:32.104 UTC [msp] DeserializeIdentity -> DEBU 74bb Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.104 UTC [msp] DeserializeIdentity -> DEBU 74bc Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.104 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 74bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:32.104 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 74be Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.104 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 74bf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.104 UTC [policies] Evaluate -> DEBU 74c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.104 UTC [policies] Evaluate -> DEBU 74c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:32.104 UTC [policies] Evaluate -> DEBU 74c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.105 UTC [cauthdsl] func1 -> DEBU 74c3 0xc005961790 gate 1569284852105250800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:32.105 UTC [cauthdsl] func2 -> DEBU 74c4 0xc005961790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:32.105 UTC [cauthdsl] func2 -> DEBU 74c5 0xc005961790 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:32.105 UTC [cauthdsl] func2 -> DEBU 74c6 0xc005961790 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.105 UTC [msp.identity] Verify -> DEBU 74c7 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:32.105 UTC [msp.identity] Verify -> DEBU 74c8 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:32.106 UTC [cauthdsl] func2 -> DEBU 74c9 0xc005961790 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.106 UTC [cauthdsl] func1 -> DEBU 74ca 0xc005961790 gate 1569284852105250800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:32.106 UTC [policies] Evaluate -> DEBU 74cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.106 UTC [policies] Evaluate -> DEBU 74cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.106 UTC [policies] Evaluate -> DEBU 74cd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.106 UTC [policies] Evaluate -> DEBU 74ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.106 UTC [msp] DeserializeIdentity -> DEBU 74cf Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.106 UTC [msp] DeserializeIdentity -> DEBU 74d0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.107 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 74d1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:32.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 74d2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 74d3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.107 UTC [policies] Evaluate -> DEBU 74d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.107 UTC [policies] Evaluate -> DEBU 74d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:32.107 UTC [policies] Evaluate -> DEBU 74d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.107 UTC [cauthdsl] func1 -> DEBU 74d7 0xc00597ef60 gate 1569284852107930900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:32.107 UTC [cauthdsl] func2 -> DEBU 74d8 0xc00597ef60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [cauthdsl] func2 -> DEBU 74d9 0xc00597ef60 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [cauthdsl] func2 -> DEBU 74da 0xc00597ef60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [msp.identity] Verify -> DEBU 74db Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [msp.identity] Verify -> DEBU 74dc Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [cauthdsl] func2 -> DEBU 74dd 0xc00597ef60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [cauthdsl] func1 -> DEBU 74de 0xc00597ef60 gate 1569284852107930900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [policies] Evaluate -> DEBU 74df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [policies] Evaluate -> DEBU 74e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [policies] Evaluate -> DEBU 74e1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [policies] Evaluate -> DEBU 74e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [gossip.gossip] handleMessage -> DEBU 74e3 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [gossip.gossip] handleMessage -> DEBU 74e4 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [msp] DeserializeIdentity -> DEBU 74e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.108 UTC [msp] DeserializeIdentity -> DEBU 74e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.109 UTC [msp] DeserializeIdentity -> DEBU 74e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.109 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 74e8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:32.109 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 74e9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.109 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 74ea Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.109 UTC [policies] Evaluate -> DEBU 74eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.110 UTC [policies] Evaluate -> DEBU 74ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:32.110 UTC [policies] Evaluate -> DEBU 74ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.110 UTC [cauthdsl] func1 -> DEBU 74ee 0xc005996a70 gate 1569284852110406900 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:32.110 UTC [cauthdsl] func2 -> DEBU 74ef 0xc005996a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:32.110 UTC [cauthdsl] func2 -> DEBU 74f0 0xc005996a70 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:32.110 UTC [cauthdsl] func2 -> DEBU 74f1 0xc005996a70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.110 UTC [msp.identity] Verify -> DEBU 74f2 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +peer0.org1.example.com | 00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +peer0.org1.example.com | "2019-09-24 00:27:32.111 UTC [msp.identity] Verify -> DEBU 74f3 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +peer0.org1.example.com | 00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +peer0.org1.example.com | 00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +peer0.org1.example.com | 00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +peer0.org1.example.com | 00000040 01 32 48 48 f4 8a |.2HH..|" +peer0.org1.example.com | "2019-09-24 00:27:32.111 UTC [cauthdsl] func2 -> DEBU 74f4 0xc005996a70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.111 UTC [cauthdsl] func1 -> DEBU 74f5 0xc005996a70 gate 1569284852110406900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:32.111 UTC [policies] Evaluate -> DEBU 74f6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.111 UTC [policies] Evaluate -> DEBU 74f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.111 UTC [policies] Evaluate -> DEBU 74f8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.111 UTC [policies] Evaluate -> DEBU 74f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.112 UTC [msp.identity] Verify -> DEBU 74fa Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +peer0.org1.example.com | 00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +peer0.org1.example.com | "2019-09-24 00:27:32.112 UTC [msp.identity] Verify -> DEBU 74fb Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +peer0.org1.example.com | 00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +peer0.org1.example.com | 00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +peer0.org1.example.com | 00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +peer0.org1.example.com | 00000040 54 87 75 e6 8e 00 |T.u...|" +peer0.org1.example.com | "2019-09-24 00:27:32.113 UTC [msp.identity] Verify -> DEBU 74fc Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +peer0.org1.example.com | 00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +peer0.org1.example.com | "2019-09-24 00:27:32.113 UTC [msp.identity] Verify -> DEBU 74fd Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +peer0.org1.example.com | 00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +peer0.org1.example.com | 00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +peer0.org1.example.com | 00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +peer0.org1.example.com | 00000040 f9 8f 71 f2 6e 18 |..q.n.|" +peer0.org1.example.com | "2019-09-24 00:27:32.113 UTC [msp] DeserializeIdentity -> DEBU 74fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.113 UTC [msp] DeserializeIdentity -> DEBU 74ff Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.113 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7500 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:32.113 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7501 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.113 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7502 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.113 UTC [policies] Evaluate -> DEBU 7503 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.114 UTC [policies] Evaluate -> DEBU 7504 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:32.114 UTC [policies] Evaluate -> DEBU 7505 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.114 UTC [cauthdsl] func1 -> DEBU 7506 0xc0059af080 gate 1569284852114505200 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:32.114 UTC [cauthdsl] func2 -> DEBU 7507 0xc0059af080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:32.114 UTC [cauthdsl] func2 -> DEBU 7508 0xc0059af080 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:32.114 UTC [cauthdsl] func2 -> DEBU 7509 0xc0059af080 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.114 UTC [msp.identity] Verify -> DEBU 750a Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +peer0.org1.example.com | 00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +peer0.org1.example.com | "2019-09-24 00:27:32.114 UTC [msp.identity] Verify -> DEBU 750b Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +peer0.org1.example.com | 00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +peer0.org1.example.com | 00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +peer0.org1.example.com | 00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +peer0.org1.example.com | 00000040 15 da b4 89 d2 86 |......|" +peer0.org1.example.com | "2019-09-24 00:27:32.114 UTC [cauthdsl] func2 -> DEBU 750c 0xc0059af080 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.114 UTC [cauthdsl] func1 -> DEBU 750d 0xc0059af080 gate 1569284852114505200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:32.115 UTC [policies] Evaluate -> DEBU 750e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.115 UTC [policies] Evaluate -> DEBU 750f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.115 UTC [policies] Evaluate -> DEBU 7510 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.115 UTC [policies] Evaluate -> DEBU 7511 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.115 UTC [gossip.gossip] handleMessage -> DEBU 7512 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.300 UTC [gossip.election] waitForInterrupt -> DEBU 7513 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.300 UTC [gossip.election] IsLeader -> DEBU 7514 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-09-24 00:27:32.300 UTC [msp] GetDefaultSigningIdentity -> DEBU 7515 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 00:27:32.300 UTC [msp.identity] Sign -> DEBU 7516 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510201801 " +peer0.org1.example.com | "2019-09-24 00:27:32.300 UTC [msp.identity] Sign -> DEBU 7517 Sign: digest: AD1905E02ACEEBED2D8BCE2BC34C8F7464532819C30A1C46FCCF2B17AE125260 " +peer0.org1.example.com | "2019-09-24 00:27:32.300 UTC [gossip.election] waitForInterrupt -> DEBU 7518 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-09-24 00:27:32.300 UTC [msp] DeserializeIdentity -> DEBU 7519 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.301 UTC [msp] DeserializeIdentity -> DEBU 751a Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.301 UTC [msp] DeserializeIdentity -> DEBU 751b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.301 UTC [msp] DeserializeIdentity -> DEBU 751c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.301 UTC [gossip.comm] Send -> DEBU 751d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:32.301 UTC [msp] DeserializeIdentity -> DEBU 751e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.301 UTC [msp] DeserializeIdentity -> DEBU 751f Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.301 UTC [gossip.comm] sendToEndpoint -> DEBU 7520 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.302 UTC [gossip.comm] sendToEndpoint -> DEBU 7521 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.304 UTC [msp] DeserializeIdentity -> DEBU 7522 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.304 UTC [msp] DeserializeIdentity -> DEBU 7523 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.304 UTC [gossip.pull] Hello -> DEBU 7524 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 00:27:32.304 UTC [msp] DeserializeIdentity -> DEBU 7525 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.304 UTC [msp] DeserializeIdentity -> DEBU 7526 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.304 UTC [gossip.comm] Send -> DEBU 7527 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:32.304 UTC [gossip.comm] sendToEndpoint -> DEBU 7528 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.304 UTC [gossip.comm] sendToEndpoint -> DEBU 7529 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.306 UTC [gossip.comm] func1 -> DEBU 752a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.306 UTC [gossip.gossip] handleMessage -> DEBU 752b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.306 UTC [gossip.pull] HandleMessage -> DEBU 752c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.306 UTC [gossip.gossip] handleMessage -> DEBU 752d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.546 UTC [gossip.comm] func1 -> DEBU 752e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.546 UTC [gossip.gossip] handleMessage -> DEBU 752f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.546 UTC [msp] DeserializeIdentity -> DEBU 7530 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.546 UTC [msp] DeserializeIdentity -> DEBU 7531 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.546 UTC [gossip.gossip] handleMessage -> DEBU 7532 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.668 UTC [gossip.comm] func1 -> DEBU 7533 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.668 UTC [gossip.gossip] handleMessage -> DEBU 7534 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.668 UTC [gossip.gossip] handleMessage -> DEBU 7535 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.668 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7536 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.668 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7537 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:32.670 UTC [msp.identity] Verify -> DEBU 7538 Verify: digest = 00000000 2c 85 c1 08 48 8e d4 7a bb 1d f3 52 40 8c 9b c9 |,...H..z...R@...| +peer0.org1.example.com | 00000010 f7 e8 70 3f a7 2b f4 61 f9 32 18 12 82 60 ff 31 |..p?.+.a.2...`.1|" +peer0.org1.example.com | "2019-09-24 00:27:32.670 UTC [msp.identity] Verify -> DEBU 7539 Verify: sig = 00000000 30 45 02 21 00 ce a4 9d 80 79 fd 0a b0 9e 88 e6 |0E.!.....y......| +peer0.org1.example.com | 00000010 84 45 20 d4 af 3a d8 f0 e2 ec c6 85 da b0 55 99 |.E ..:........U.| +peer0.org1.example.com | 00000020 e4 04 92 1a e4 02 20 5d 2d a3 80 56 42 8c c8 92 |...... ]-..VB...| +peer0.org1.example.com | 00000030 7a 5c 22 fd f3 47 fa 11 c3 26 f5 be eb 79 c0 1c |z\"..G...&...y..| +peer0.org1.example.com | 00000040 40 66 08 30 e2 8c ba |@f.0...|" +peer0.org1.example.com | "2019-09-24 00:27:32.671 UTC [gossip.discovery] handleAliveMessage -> DEBU 753a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 753b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:32.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 753c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:32.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 753d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:32.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 753e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:32.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 753f Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.671 UTC [gossip.discovery] handleAliveMessage -> DEBU 7540 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7541 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.672 UTC [gossip.comm] func1 -> DEBU 7542 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.672 UTC [gossip.gossip] handleMessage -> DEBU 7543 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.672 UTC [gossip.gossip] handleMessage -> DEBU 7544 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7545 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7546 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.674 UTC [gossip.comm] func1 -> DEBU 7547 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.674 UTC [gossip.gossip] handleMessage -> DEBU 7548 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.674 UTC [gossip.gossip] handleMessage -> DEBU 7549 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 754a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 754b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.678 UTC [msp] DeserializeIdentity -> DEBU 754c Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.679 UTC [msp] DeserializeIdentity -> DEBU 754d Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.679 UTC [msp] DeserializeIdentity -> DEBU 754e Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.679 UTC [gossip.comm] Send -> DEBU 754f Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:32.679 UTC [msp] DeserializeIdentity -> DEBU 7550 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.679 UTC [gossip.comm] Send -> DEBU 7551 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:32.679 UTC [gossip.comm] sendToEndpoint -> DEBU 7552 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.679 UTC [gossip.comm] sendToEndpoint -> DEBU 7553 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.679 UTC [gossip.comm] sendToEndpoint -> DEBU 7554 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.679 UTC [gossip.comm] sendToEndpoint -> DEBU 7555 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [gossip.comm] func1 -> DEBU 7556 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [gossip.gossip] handleMessage -> DEBU 7557 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [gossip.gossip] handleMessage -> DEBU 7558 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7559 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 755a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [msp] DeserializeIdentity -> DEBU 755b Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 755c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 755d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 755e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [policies] Evaluate -> DEBU 755f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [policies] Evaluate -> DEBU 7560 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [policies] Evaluate -> DEBU 7561 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [cauthdsl] func1 -> DEBU 7562 0xc0059fe310 gate 1569284852746833800 evaluation starts" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [cauthdsl] func2 -> DEBU 7563 0xc0059fe310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [cauthdsl] func2 -> DEBU 7564 0xc0059fe310 processing identity 0 with bytes of 114c6c0" +peer0.org1.example.com | "2019-09-24 00:27:32.746 UTC [cauthdsl] func2 -> DEBU 7565 0xc0059fe310 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [msp.identity] Verify -> DEBU 7566 Verify: digest = 00000000 63 96 73 7c 0f 21 04 84 66 38 28 1f c2 98 93 db |c.s|.!..f8(.....| +peer0.org1.example.com | 00000010 c8 b7 d3 15 c4 d2 78 00 0e 7d 17 8f 87 96 5b f3 |......x..}....[.|" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [msp.identity] Verify -> DEBU 7567 Verify: sig = 00000000 30 45 02 21 00 ca f7 35 53 39 02 9a 66 94 5b ae |0E.!...5S9..f.[.| +peer0.org1.example.com | 00000010 37 3d d4 89 8b 1c a2 e9 a9 99 80 9c 03 4b b0 ba |7=...........K..| +peer0.org1.example.com | 00000020 1c b3 a3 2b 09 02 20 58 94 ff 06 c6 8a a7 56 da |...+.. X......V.| +peer0.org1.example.com | 00000030 43 06 2b 8e 1a d6 b7 45 df 0d fa 80 9b dd 19 c6 |C.+....E........| +peer0.org1.example.com | 00000040 ef 99 f8 ed a1 fd cc |.......|" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [cauthdsl] func2 -> DEBU 7568 0xc0059fe310 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [cauthdsl] func1 -> DEBU 7569 0xc0059fe310 gate 1569284852746833800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [policies] Evaluate -> DEBU 756a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [policies] Evaluate -> DEBU 756b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [policies] Evaluate -> DEBU 756c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [policies] Evaluate -> DEBU 756d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [gossip.discovery] handleAliveMessage -> DEBU 756e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 756f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 7570 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 7571 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 7572 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 7573 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [gossip.discovery] handleAliveMessage -> DEBU 7574 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.747 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7575 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.748 UTC [gossip.discovery] sendMemResponse -> DEBU 7576 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-09-24 00:27:32.748 UTC [msp] DeserializeIdentity -> DEBU 7577 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.748 UTC [msp] DeserializeIdentity -> DEBU 7578 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.748 UTC [msp] DeserializeIdentity -> DEBU 7579 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.748 UTC [gossip.comm] Send -> DEBU 757a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:32.748 UTC [gossip.discovery] sendMemResponse -> DEBU 757b Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020b" signature:"0E\002!\000\316\244\235\200y\375\n\260\236\210\346\204E \324\257:\330\360\342\354\306\205\332\260U\231\344\004\222\032\344\002 ]-\243\200VB\214\310\222z\\\"\375\363G\372\021\303&\365\276\353y\300\034@f\0100\342\214\272" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 00:27:32.748 UTC [gossip.comm] sendToEndpoint -> DEBU 757c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.748 UTC [gossip.comm] sendToEndpoint -> DEBU 757d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.789 UTC [gossip.comm] func1 -> DEBU 757e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.789 UTC [gossip.gossip] handleMessage -> DEBU 757f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.789 UTC [gossip.pull] HandleMessage -> DEBU 7580 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.789 UTC [msp] DeserializeIdentity -> DEBU 7581 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.789 UTC [msp] DeserializeIdentity -> DEBU 7582 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.789 UTC [msp] DeserializeIdentity -> DEBU 7583 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.789 UTC [msp] DeserializeIdentity -> DEBU 7584 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.790 UTC [msp] DeserializeIdentity -> DEBU 7585 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.790 UTC [msp] DeserializeIdentity -> DEBU 7586 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:32.790 UTC [gossip.pull] SendDigest -> DEBU 7587 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-09-24 00:27:32.790 UTC [gossip.gossip] handleMessage -> DEBU 7588 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:32.810 UTC [gossip.comm] func1 -> DEBU 7589 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.810 UTC [gossip.gossip] handleMessage -> DEBU 758a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.810 UTC [gossip.pull] HandleMessage -> DEBU 758b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:32.810 UTC [gossip.pull] SendDigest -> DEBU 758c Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:32.810 UTC [gossip.gossip] handleMessage -> DEBU 758d Exiting" +peer0.org1.example.com | "2019-09-24 00:27:33.041 UTC [gossip.comm] func1 -> DEBU 758e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.041 UTC [gossip.gossip] handleMessage -> DEBU 758f Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.041 UTC [msp] DeserializeIdentity -> DEBU 7590 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:33.041 UTC [msp] DeserializeIdentity -> DEBU 7591 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:33.042 UTC [msp] DeserializeIdentity -> DEBU 7592 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:33.042 UTC [gossip.gossip] handleMessage -> DEBU 7593 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:33.626 UTC [gossip.comm] func1 -> DEBU 7594 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.626 UTC [gossip.gossip] handleMessage -> DEBU 7595 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.626 UTC [gossip.pull] HandleMessage -> DEBU 7596 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.626 UTC [gossip.pull] SendDigest -> DEBU 7597 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-09-24 00:27:33.626 UTC [gossip.gossip] handleMessage -> DEBU 7598 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:33.755 UTC [gossip.comm] func1 -> DEBU 7599 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020c" signature:"0E\002!\000\232q\243\211\251\360b\004\271cn\nd\247\373\374\315\000\3768\020\232" secret_envelope:\372\245M5mp\274\272\346\364\356/\314E\023A\022\0212(\017\352\320\314K" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.755 UTC [gossip.gossip] handleMessage -> DEBU 759a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020c" signature:"0E\002!\000\232q\243\211\251\360b\004\271cn\nd\247\373\374\315\000\3768\020\232" secret_envelope:\372\245M5mp\274\272\346\364\356/\314E\023A\022\0212(\017\352\320\314K" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.755 UTC [gossip.gossip] handleMessage -> DEBU 759b Exiting" +peer0.org1.example.com | "2019-09-24 00:27:33.755 UTC [gossip.discovery] handleMsgFromComm -> DEBU 759c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020c" signature:"0E\002!\000\232q\243\211\251\360b\004\271cn\nd\247\373\374\315\000\3768\020\232" secret_envelope:\372\245M5mp\274\272\346\364\356/\314E\023A\022\0212(\017\352\320\314K" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.756 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 759d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-09-24 00:27:33.758 UTC [msp.identity] Verify -> DEBU 759e Verify: digest = 00000000 53 b2 29 4a b6 10 ca 63 9a c9 b8 2a 64 4d f5 da |S.)J...c...*dM..| +peer0.org1.example.com | 00000010 ff f2 1e a2 42 a6 9c 1c f8 d1 37 93 19 f9 3f 18 |....B.....7...?.|" +peer0.org1.example.com | "2019-09-24 00:27:33.758 UTC [msp.identity] Verify -> DEBU 759f Verify: sig = 00000000 30 45 02 21 00 9a 71 a3 89 a9 f0 62 04 b9 63 3c |0E.!..q....b..c<| +peer0.org1.example.com | 00000010 4b 55 80 54 69 96 93 cb 1b 98 12 76 65 e2 da 10 |KU.Ti......ve...| +peer0.org1.example.com | 00000020 45 cb f7 c4 1c 02 20 6a 29 b6 97 3c f8 d9 8f f9 |E..... j)..<....| +peer0.org1.example.com | 00000030 70 c4 09 61 f2 43 0e d1 20 a9 3e 6e 0a 64 a7 fb |p..a.C.. .>n.d..| +peer0.org1.example.com | 00000040 fc cd 00 fe 38 10 9a |....8..|" +peer0.org1.example.com | "2019-09-24 00:27:33.759 UTC [msp.identity] Verify -> DEBU 75a0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 00:27:33.759 UTC [msp.identity] Verify -> DEBU 75a1 Verify: sig = 00000000 30 44 02 20 73 17 7e f0 72 2d 27 d2 8b c2 7b 46 |0D. s.~.r-'...{F| +peer0.org1.example.com | 00000010 49 45 65 e5 73 06 38 42 8f 4d cf 43 53 e0 86 9a |IEe.s.8B.M.CS...| +peer0.org1.example.com | 00000020 91 74 d3 90 02 20 0f a2 31 70 e2 07 3e fa a5 4d |.t... ..1p..>..M| +peer0.org1.example.com | 00000030 35 6d 70 bc ba e6 f4 ee 2f cc 45 13 41 12 11 32 |5mp...../.E.A..2| +peer0.org1.example.com | 00000040 28 0f ea d0 cc 4b |(....K|" +peer0.org1.example.com | "2019-09-24 00:27:33.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 75a2 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 75a3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 00:27:33.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 75a4 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:33.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 75a5 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-09-24 00:27:33.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 75a6 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 00:27:33.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 75a7 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:33.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 75a8 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:33.761 UTC [gossip.discovery] handleMsgFromComm -> DEBU 75a9 Exiting" +peer0.org1.example.com | "2019-09-24 00:27:33.761 UTC [gossip.discovery] sendMemResponse -> DEBU 75aa Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-09-24 00:27:33.762 UTC [msp] DeserializeIdentity -> DEBU 75ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:33.762 UTC [msp] DeserializeIdentity -> DEBU 75ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:33.762 UTC [gossip.comm] Send -> DEBU 75ad Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 00:27:33.763 UTC [gossip.comm] sendToEndpoint -> DEBU 75ae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.763 UTC [gossip.comm] sendToEndpoint -> DEBU 75af Exiting" +peer0.org1.example.com | "2019-09-24 00:27:33.764 UTC [gossip.discovery] sendMemResponse -> DEBU 75b0 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020c" signature:"0E\002!\000\232q\243\211\251\360b\004\271cn\nd\247\373\374\315\000\3768\020\232" secret_envelope:\372\245M5mp\274\272\346\364\356/\314E\023A\022\0212(\017\352\320\314K" > > alive: " +peer0.org1.example.com | "2019-09-24 00:27:33.974 UTC [gossip.comm] func1 -> DEBU 75b1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.975 UTC [gossip.gossip] handleMessage -> DEBU 75b2 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 00:27:33.975 UTC [msp] DeserializeIdentity -> DEBU 75b3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:33.975 UTC [msp] DeserializeIdentity -> DEBU 75b4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:33.976 UTC [msp] DeserializeIdentity -> DEBU 75b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 00:27:33.978 UTC [gossip.gossip] handleMessage -> DEBU 75b6 Exiting" diff --git a/hyperledger_fabric/v1.4.2/raft/logs/dev_orderer.log b/hyperledger_fabric/v1.4.2/raft/logs/dev_orderer.log index e8599350..0e09d85c 100644 --- a/hyperledger_fabric/v1.4.2/raft/logs/dev_orderer.log +++ b/hyperledger_fabric/v1.4.2/raft/logs/dev_orderer.log @@ -1,223 +1,223 @@ -2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for fileledger -2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value -2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger -2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer -2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 006 Found map[interface{}]interface{} value for ramledger -2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: 1000 -2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for ramledger.HistorySize setting to int 1000 -2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[interface{}]interface{} value for kafka -2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for kafka.Topic -2019-07-20 02:39:29.378 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: 3 -2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for kafka.Topic.ReplicationFactor setting to int 3 -2019-07-20 02:39:29.378 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: false -2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for kafka.Verbose setting to bool false -2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00f Found map[string]interface{} value for kafka.TLS -2019-07-20 02:39:29.379 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.398 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for kafka.TLS.Certificate setting to -2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 012 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 013 Found real value for kafka.TLS.RootCAs setting to -2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for kafka.TLS.ClientAuthRequired setting to -2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for kafka.TLS.ClientRootCAs setting to -2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: false -2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for kafka.TLS.Enabled setting to bool false -2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for kafka.TLS.PrivateKey setting to -2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01c Found map[string]interface{} value for kafka.SASLPlain -2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 01d Unmarshal JSON: value is not a string: false -2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01e Found real value for kafka.SASLPlain.Enabled setting to bool false -2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 01f Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 020 Found real value for kafka.SASLPlain.User setting to -2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for kafka.SASLPlain.Password setting to -2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for kafka.Version setting to -2019-07-20 02:39:29.401 UTC [viperutil] getKeysRecursively -> DEBU 025 Found map[string]interface{} value for kafka.Retry -2019-07-20 02:39:29.401 UTC [viperutil] unmarshalJSON -> DEBU 026 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -2019-07-20 02:39:29.401 UTC [viperutil] getKeysRecursively -> DEBU 027 Found real value for kafka.Retry.ShortTotal setting to string 10m -2019-07-20 02:39:29.404 UTC [viperutil] unmarshalJSON -> DEBU 028 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 029 Found real value for kafka.Retry.LongInterval setting to string 5m -2019-07-20 02:39:29.405 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value -2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for kafka.Retry.LongTotal setting to string 12h -2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 02c Found map[string]interface{} value for kafka.Retry.NetworkTimeouts -2019-07-20 02:39:29.406 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-07-20 02:39:29.406 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s -2019-07-20 02:39:29.406 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-07-20 02:39:29.406 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s -2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s -2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 033 Found map[string]interface{} value for kafka.Retry.Metadata -2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms -2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value is not a string: 3 -2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 -2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 038 Found map[string]interface{} value for kafka.Retry.Producer -2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 039 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03a Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms -2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 03b Unmarshal JSON: value is not a string: 3 -2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03c Found real value for kafka.Retry.Producer.RetryMax setting to int 3 -2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03d Found map[string]interface{} value for kafka.Retry.Consumer -2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s -2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for kafka.Retry.ShortInterval setting to string 5s -2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 042 Found map[interface{}]interface{} value for debug -2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 043 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 044 Found real value for debug.BroadcastTraceDir setting to -2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 045 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 046 Found real value for debug.DeliverTraceDir setting to -2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 047 Found map[interface{}]interface{} value for operations -2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 -2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 04a Found map[string]interface{} value for operations.TLS -2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 04b Unmarshal JSON: value is not a string: false -2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 04c Found real value for operations.TLS.ClientAuthRequired setting to bool false -2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 04d Unmarshal JSON: value is not a string: [] -2019-07-20 02:39:29.409 UTC [viperutil] getKeysRecursively -> DEBU 04e Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] -2019-07-20 02:39:29.409 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value is not a string: false -2019-07-20 02:39:29.409 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for operations.TLS.Enabled setting to bool false -2019-07-20 02:39:29.412 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for operations.TLS.Certificate setting to -2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for operations.TLS.PrivateKey setting to -2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for operations.TLS.RootCAs setting to -2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 057 Found map[interface{}]interface{} value for metrics -2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 058 Found map[string]interface{} value for metrics.Statsd -2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 -2019-07-20 02:39:29.415 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-07-20 02:39:29.416 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for metrics.Statsd.WriteInterval setting to string 30s -2019-07-20 02:39:29.416 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.416 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for metrics.Statsd.Prefix setting to -2019-07-20 02:39:29.417 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value -2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for metrics.Statsd.Network setting to string udp -2019-07-20 02:39:29.417 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value -2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for metrics.Provider setting to string prometheus -2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 063 Found map[interface{}]interface{} value for consensus -2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 064 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 065 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal -2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot -2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 068 Found map[interface{}]interface{} value for general -2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 069 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 06a Found real value for general.ConnectionTimeout setting to -2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 06b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 06c Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block -2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value -2019-07-20 02:39:29.419 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for general.LocalMSPID setting to string OrdererMSP -2019-07-20 02:39:29.419 UTC [viperutil] getKeysRecursively -> DEBU 06f Found map[string]interface{} value for general.Authentication -2019-07-20 02:39:29.419 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value -2019-07-20 02:39:29.420 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for general.Authentication.TimeWindow setting to string 15m -2019-07-20 02:39:29.420 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') -2019-07-20 02:39:29.433 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for general.LedgerType setting to string file -2019-07-20 02:39:29.434 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp -2019-07-20 02:39:29.435 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string -2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for general.ListenPort setting to string 7050 -2019-07-20 02:39:29.435 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') -2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for general.GenesisMethod setting to string file -2019-07-20 02:39:29.436 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.444 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for general.SystemChannel setting to -2019-07-20 02:39:29.447 UTC [viperutil] getKeysRecursively -> DEBU 07c Found map[string]interface{} value for general.Keepalive -2019-07-20 02:39:29.448 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-07-20 02:39:29.448 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for general.Keepalive.ServerMinInterval setting to string 60s -2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 07f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-07-20 02:39:29.449 UTC [viperutil] getKeysRecursively -> DEBU 080 Found real value for general.Keepalive.ServerInterval setting to string 7200s -2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value -2019-07-20 02:39:29.449 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for general.Keepalive.ServerTimeout setting to string 20s -2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -2019-07-20 02:39:29.450 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for general.GenesisProfile setting to string SampleInsecureSolo -2019-07-20 02:39:29.457 UTC [viperutil] getKeysRecursively -> DEBU 085 Found map[string]interface{} value for general.TLS -2019-07-20 02:39:29.458 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-07-20 02:39:29.459 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] -2019-07-20 02:39:29.460 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value is not a string: false -2019-07-20 02:39:29.461 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for general.TLS.ClientAuthRequired setting to bool false -2019-07-20 02:39:29.461 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.462 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for general.TLS.ClientRootCAs setting to -2019-07-20 02:39:29.463 UTC [viperutil] unmarshalJSON -> DEBU 08c Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string -2019-07-20 02:39:29.463 UTC [viperutil] getKeysRecursively -> DEBU 08d Found real value for general.TLS.Enabled setting to string true -2019-07-20 02:39:29.463 UTC [viperutil] unmarshalJSON -> DEBU 08e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-07-20 02:39:29.464 UTC [viperutil] getKeysRecursively -> DEBU 08f Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key -2019-07-20 02:39:29.464 UTC [viperutil] unmarshalJSON -> DEBU 090 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-07-20 02:39:29.464 UTC [viperutil] getKeysRecursively -> DEBU 091 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt -2019-07-20 02:39:29.465 UTC [viperutil] getKeysRecursively -> DEBU 092 Found map[string]interface{} value for general.BCCSP -2019-07-20 02:39:29.465 UTC [viperutil] getKeysRecursively -> DEBU 093 Found map[string]interface{} value for general.BCCSP.SW -2019-07-20 02:39:29.466 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -2019-07-20 02:39:29.466 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for general.BCCSP.SW.Hash setting to string SHA2 -2019-07-20 02:39:29.466 UTC [viperutil] unmarshalJSON -> DEBU 096 Unmarshal JSON: value is not a string: 256 -2019-07-20 02:39:29.466 UTC [viperutil] getKeysRecursively -> DEBU 097 Found real value for general.BCCSP.SW.Security setting to int 256 -2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 098 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore -2019-07-20 02:39:29.467 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to -2019-07-20 02:39:29.467 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value -2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for general.BCCSP.Default setting to string SW -2019-07-20 02:39:29.468 UTC [viperutil] getKeysRecursively -> DEBU 09d Found map[string]interface{} value for general.Cluster -2019-07-20 02:39:29.470 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.471 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for general.Cluster.ListenPort setting to -2019-07-20 02:39:29.472 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-07-20 02:39:29.472 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key -2019-07-20 02:39:29.473 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.474 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for general.Cluster.DialTimeout setting to -2019-07-20 02:39:29.474 UTC [viperutil] unmarshalJSON -> DEBU 0a4 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.475 UTC [viperutil] getKeysRecursively -> DEBU 0a5 Found real value for general.Cluster.ReplicationRetryTimeout setting to -2019-07-20 02:39:29.476 UTC [viperutil] unmarshalJSON -> DEBU 0a6 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.476 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found real value for general.Cluster.ListenAddress setting to -2019-07-20 02:39:29.477 UTC [viperutil] unmarshalJSON -> DEBU 0a8 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-07-20 02:39:29.477 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] -2019-07-20 02:39:29.477 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.478 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for general.Cluster.ReplicationBufferSize setting to -2019-07-20 02:39:29.479 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.480 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for general.Cluster.ReplicationPullTimeout setting to -2019-07-20 02:39:29.480 UTC [viperutil] unmarshalJSON -> DEBU 0ae Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.482 UTC [viperutil] getKeysRecursively -> DEBU 0af Found real value for general.Cluster.ServerPrivateKey setting to -2019-07-20 02:39:29.482 UTC [viperutil] unmarshalJSON -> DEBU 0b0 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.483 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found real value for general.Cluster.ReplicationMaxRetries setting to -2019-07-20 02:39:29.483 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.485 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to -2019-07-20 02:39:29.485 UTC [viperutil] unmarshalJSON -> DEBU 0b4 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.486 UTC [viperutil] getKeysRecursively -> DEBU 0b5 Found real value for general.Cluster.CertExpirationWarningThreshold setting to -2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0b6 Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found real value for general.Cluster.ServerCertificate setting to -2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0b8 Unmarshal JSON: value is not a string: 10 -2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found real value for general.Cluster.SendBufferSize setting to int 10 -2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0ba Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value -2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0bb Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt -2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0bc Unmarshal JSON: value is not a string: -2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0bd Found real value for general.Cluster.RPCTimeout setting to -2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0be Found map[string]interface{} value for general.Profile -2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0bf Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c0 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 -2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0c1 Unmarshal JSON: value is not a string: false -2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c2 Found real value for general.Profile.Enabled setting to bool false -2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0c3 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value -2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found real value for general.ListenAddress setting to string 0.0.0.0 -2019-07-20 02:39:29.489 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0c5 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress: ListenPort: RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate: ServerPrivateKey:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] -2019-07-20 02:39:29.489 UTC [localconfig] completeInitialization -> INFO 0c6 Kafka.Version unset, setting to 0.10.2.0 -"2019-07-20 02:39:29.495 UTC [bccsp_sw] openKeyStore -> DEBU 0c7 KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" -"2019-07-20 02:39:29.496 UTC [bccsp] initBCCSP -> DEBU 0c8 Initialize BCCSP [SW]" -"2019-07-20 02:39:29.496 UTC [msp] getPemMaterialFromDir -> DEBU 0c9 Reading directory /var/hyperledger/orderer/msp/signcerts" -"2019-07-20 02:39:29.504 UTC [msp] getPemMaterialFromDir -> DEBU 0ca Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" -"2019-07-20 02:39:29.508 UTC [msp] getPemMaterialFromDir -> DEBU 0cb Reading directory /var/hyperledger/orderer/msp/cacerts" -"2019-07-20 02:39:29.514 UTC [msp] getPemMaterialFromDir -> DEBU 0cc Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" -"2019-07-20 02:39:29.519 UTC [msp] getPemMaterialFromDir -> DEBU 0cd Reading directory /var/hyperledger/orderer/msp/admincerts" -"2019-07-20 02:39:29.544 UTC [msp] getPemMaterialFromDir -> DEBU 0ce Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" -"2019-07-20 02:39:29.565 UTC [msp] getPemMaterialFromDir -> DEBU 0cf Reading directory /var/hyperledger/orderer/msp/intermediatecerts" -"2019-07-20 02:39:29.567 UTC [msp] getMspConfig -> DEBU 0d0 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" -"2019-07-20 02:39:29.567 UTC [msp] getPemMaterialFromDir -> DEBU 0d1 Reading directory /var/hyperledger/orderer/msp/tlscacerts" -"2019-07-20 02:39:29.578 UTC [msp] getPemMaterialFromDir -> DEBU 0d2 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" -"2019-07-20 02:39:29.587 UTC [msp] getPemMaterialFromDir -> DEBU 0d3 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" -"2019-07-20 02:39:29.589 UTC [msp] getMspConfig -> DEBU 0d4 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" -"2019-07-20 02:39:29.589 UTC [msp] getPemMaterialFromDir -> DEBU 0d5 Reading directory /var/hyperledger/orderer/msp/crls" -"2019-07-20 02:39:29.590 UTC [msp] getMspConfig -> DEBU 0d6 crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" -"2019-07-20 02:39:29.592 UTC [msp] getMspConfig -> DEBU 0d7 MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" -"2019-07-20 02:39:29.592 UTC [msp] newBccspMsp -> DEBU 0d8 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.592 UTC [msp] New -> DEBU 0d9 Creating Cache-MSP instance" -"2019-07-20 02:39:29.592 UTC [msp] loadLocaMSP -> DEBU 0da Created new local MSP" -"2019-07-20 02:39:29.592 UTC [msp] Setup -> DEBU 0db Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:29.592 UTC [msp.identity] newIdentity -> DEBU 0dc Creating identity instance for cert -----BEGIN CERTIFICATE----- +2019-09-24 00:24:33.841 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for general +2019-09-24 00:24:33.857 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-09-24 00:24:33.857 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for general.ListenAddress setting to string 0.0.0.0 +2019-09-24 00:24:33.857 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 006 Found map[string]interface{} value for general.Profile +2019-09-24 00:24:33.858 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: false +2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for general.Profile.Enabled setting to bool false +2019-09-24 00:24:33.858 UTC [viperutil] unmarshalJSON -> DEBU 009 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 00a Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +2019-09-24 00:24:33.858 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for general.ListenPort setting to string 7050 +2019-09-24 00:24:33.858 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-09-24 00:24:33.858 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for general.GenesisProfile setting to string SampleInsecureSolo +2019-09-24 00:24:33.859 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.859 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for general.SystemChannel setting to +2019-09-24 00:24:33.859 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 00:24:33.859 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +2019-09-24 00:24:33.859 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for general.Authentication +2019-09-24 00:24:33.859 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-09-24 00:24:33.859 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for general.Authentication.TimeWindow setting to string 15m +2019-09-24 00:24:33.859 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-09-24 00:24:33.859 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for general.LedgerType setting to string file +2019-09-24 00:24:33.860 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +2019-09-24 00:24:33.860 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for general.LocalMSPID setting to string OrdererMSP +2019-09-24 00:24:33.860 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.860 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for general.ConnectionTimeout setting to +2019-09-24 00:24:33.860 UTC [viperutil] unmarshalJSON -> DEBU 01c Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-09-24 00:24:33.860 UTC [viperutil] getKeysRecursively -> DEBU 01d Found real value for general.GenesisMethod setting to string file +2019-09-24 00:24:33.860 UTC [viperutil] getKeysRecursively -> DEBU 01e Found map[string]interface{} value for general.TLS +2019-09-24 00:24:33.862 UTC [viperutil] unmarshalJSON -> DEBU 01f Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.864 UTC [viperutil] getKeysRecursively -> DEBU 020 Found real value for general.TLS.ClientRootCAs setting to +2019-09-24 00:24:33.864 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +2019-09-24 00:24:33.864 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for general.TLS.Enabled setting to string true +2019-09-24 00:24:33.865 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 00:24:33.865 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-09-24 00:24:33.865 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 00:24:33.865 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-09-24 00:24:33.865 UTC [viperutil] unmarshalJSON -> DEBU 027 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 00:24:33.865 UTC [viperutil] getKeysRecursively -> DEBU 028 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2019-09-24 00:24:33.869 UTC [viperutil] unmarshalJSON -> DEBU 029 Unmarshal JSON: value is not a string: false +2019-09-24 00:24:33.869 UTC [viperutil] getKeysRecursively -> DEBU 02a Found real value for general.TLS.ClientAuthRequired setting to bool false +2019-09-24 00:24:33.870 UTC [viperutil] getKeysRecursively -> DEBU 02b Found map[string]interface{} value for general.BCCSP +2019-09-24 00:24:33.870 UTC [viperutil] unmarshalJSON -> DEBU 02c Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-09-24 00:24:33.870 UTC [viperutil] getKeysRecursively -> DEBU 02d Found real value for general.BCCSP.Default setting to string SW +2019-09-24 00:24:33.870 UTC [viperutil] getKeysRecursively -> DEBU 02e Found map[string]interface{} value for general.BCCSP.SW +2019-09-24 00:24:33.871 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value is not a string: 256 +2019-09-24 00:24:33.871 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for general.BCCSP.SW.Security setting to int 256 +2019-09-24 00:24:33.872 UTC [viperutil] getKeysRecursively -> DEBU 031 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +2019-09-24 00:24:33.873 UTC [viperutil] unmarshalJSON -> DEBU 032 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.873 UTC [viperutil] getKeysRecursively -> DEBU 033 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +2019-09-24 00:24:33.873 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-09-24 00:24:33.873 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 036 Found map[string]interface{} value for general.Keepalive +2019-09-24 00:24:33.874 UTC [viperutil] unmarshalJSON -> DEBU 037 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 038 Found real value for general.Keepalive.ServerTimeout setting to string 20s +2019-09-24 00:24:33.874 UTC [viperutil] unmarshalJSON -> DEBU 039 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 03a Found real value for general.Keepalive.ServerMinInterval setting to string 60s +2019-09-24 00:24:33.874 UTC [viperutil] unmarshalJSON -> DEBU 03b Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 03c Found real value for general.Keepalive.ServerInterval setting to string 7200s +2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 03d Found map[string]interface{} value for general.Cluster +2019-09-24 00:24:33.874 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.874 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for general.Cluster.ServerPrivateKey setting to +2019-09-24 00:24:33.874 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-09-24 00:24:33.875 UTC [viperutil] unmarshalJSON -> DEBU 042 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 043 Found real value for general.Cluster.RPCTimeout setting to +2019-09-24 00:24:33.875 UTC [viperutil] unmarshalJSON -> DEBU 044 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 045 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +2019-09-24 00:24:33.875 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value is not a string: 10 +2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for general.Cluster.SendBufferSize setting to int 10 +2019-09-24 00:24:33.875 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-09-24 00:24:33.875 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.875 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for general.Cluster.ListenAddress setting to +2019-09-24 00:24:33.876 UTC [viperutil] unmarshalJSON -> DEBU 04c Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.876 UTC [viperutil] getKeysRecursively -> DEBU 04d Found real value for general.Cluster.DialTimeout setting to +2019-09-24 00:24:33.876 UTC [viperutil] unmarshalJSON -> DEBU 04e Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.876 UTC [viperutil] getKeysRecursively -> DEBU 04f Found real value for general.Cluster.ReplicationBufferSize setting to +2019-09-24 00:24:33.876 UTC [viperutil] unmarshalJSON -> DEBU 050 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.876 UTC [viperutil] getKeysRecursively -> DEBU 051 Found real value for general.Cluster.ReplicationPullTimeout setting to +2019-09-24 00:24:33.877 UTC [viperutil] unmarshalJSON -> DEBU 052 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.877 UTC [viperutil] getKeysRecursively -> DEBU 053 Found real value for general.Cluster.ListenPort setting to +2019-09-24 00:24:33.877 UTC [viperutil] unmarshalJSON -> DEBU 054 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.877 UTC [viperutil] getKeysRecursively -> DEBU 055 Found real value for general.Cluster.ReplicationRetryTimeout setting to +2019-09-24 00:24:33.877 UTC [viperutil] unmarshalJSON -> DEBU 056 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.877 UTC [viperutil] getKeysRecursively -> DEBU 057 Found real value for general.Cluster.ReplicationMaxRetries setting to +2019-09-24 00:24:33.877 UTC [viperutil] unmarshalJSON -> DEBU 058 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 059 Found real value for general.Cluster.ServerCertificate setting to +2019-09-24 00:24:33.878 UTC [viperutil] unmarshalJSON -> DEBU 05a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 05b Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2019-09-24 00:24:33.878 UTC [viperutil] unmarshalJSON -> DEBU 05c Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 05d Found real value for general.Cluster.CertExpirationWarningThreshold setting to +2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 05e Found map[interface{}]interface{} value for fileledger +2019-09-24 00:24:33.878 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +2019-09-24 00:24:33.878 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 063 Found map[interface{}]interface{} value for ramledger +2019-09-24 00:24:33.878 UTC [viperutil] unmarshalJSON -> DEBU 064 Unmarshal JSON: value is not a string: 1000 +2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 065 Found real value for ramledger.HistorySize setting to int 1000 +2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 066 Found map[interface{}]interface{} value for kafka +2019-09-24 00:24:33.878 UTC [viperutil] getKeysRecursively -> DEBU 067 Found map[string]interface{} value for kafka.Topic +2019-09-24 00:24:33.889 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value is not a string: 3 +2019-09-24 00:24:33.889 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +2019-09-24 00:24:33.889 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value is not a string: false +2019-09-24 00:24:33.889 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for kafka.Verbose setting to bool false +2019-09-24 00:24:33.890 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[string]interface{} value for kafka.TLS +2019-09-24 00:24:33.890 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value is not a string: false +2019-09-24 00:24:33.890 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for kafka.TLS.Enabled setting to bool false +2019-09-24 00:24:33.890 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.892 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for kafka.TLS.PrivateKey setting to +2019-09-24 00:24:33.892 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.892 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for kafka.TLS.Certificate setting to +2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for kafka.TLS.RootCAs setting to +2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for kafka.TLS.ClientAuthRequired setting to +2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 077 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 078 Found real value for kafka.TLS.ClientRootCAs setting to +2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 079 Found map[string]interface{} value for kafka.SASLPlain +2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for kafka.SASLPlain.Password setting to +2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 07c Unmarshal JSON: value is not a string: false +2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 07d Found real value for kafka.SASLPlain.Enabled setting to bool false +2019-09-24 00:24:33.893 UTC [viperutil] unmarshalJSON -> DEBU 07e Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.893 UTC [viperutil] getKeysRecursively -> DEBU 07f Found real value for kafka.SASLPlain.User setting to +2019-09-24 00:24:33.894 UTC [viperutil] unmarshalJSON -> DEBU 080 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.894 UTC [viperutil] getKeysRecursively -> DEBU 081 Found real value for kafka.Version setting to +2019-09-24 00:24:33.894 UTC [viperutil] getKeysRecursively -> DEBU 082 Found map[string]interface{} value for kafka.Retry +2019-09-24 00:24:33.894 UTC [viperutil] getKeysRecursively -> DEBU 083 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +2019-09-24 00:24:33.899 UTC [viperutil] unmarshalJSON -> DEBU 084 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 00:24:33.899 UTC [viperutil] getKeysRecursively -> DEBU 085 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 08a Found map[string]interface{} value for kafka.Retry.Metadata +2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 08b Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 08c Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 08d Unmarshal JSON: value is not a string: 3 +2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 08e Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 08f Found map[string]interface{} value for kafka.Retry.Producer +2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 090 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 091 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +2019-09-24 00:24:33.900 UTC [viperutil] unmarshalJSON -> DEBU 092 Unmarshal JSON: value is not a string: 3 +2019-09-24 00:24:33.900 UTC [viperutil] getKeysRecursively -> DEBU 093 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +2019-09-24 00:24:33.901 UTC [viperutil] getKeysRecursively -> DEBU 094 Found map[string]interface{} value for kafka.Retry.Consumer +2019-09-24 00:24:33.902 UTC [viperutil] unmarshalJSON -> DEBU 095 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 00:24:33.902 UTC [viperutil] getKeysRecursively -> DEBU 096 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +2019-09-24 00:24:33.902 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 00:24:33.902 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for kafka.Retry.ShortInterval setting to string 5s +2019-09-24 00:24:33.902 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-09-24 00:24:33.902 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for kafka.Retry.ShortTotal setting to string 10m +2019-09-24 00:24:33.902 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-09-24 00:24:33.902 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for kafka.Retry.LongInterval setting to string 5m +2019-09-24 00:24:33.902 UTC [viperutil] unmarshalJSON -> DEBU 09d Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +2019-09-24 00:24:33.902 UTC [viperutil] getKeysRecursively -> DEBU 09e Found real value for kafka.Retry.LongTotal setting to string 12h +2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 09f Found map[interface{}]interface{} value for debug +2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for debug.BroadcastTraceDir setting to +2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for debug.DeliverTraceDir setting to +2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found map[interface{}]interface{} value for operations +2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found map[string]interface{} value for operations.TLS +2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0a8 Unmarshal JSON: value is not a string: false +2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found real value for operations.TLS.Enabled setting to bool false +2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for operations.TLS.Certificate setting to +2019-09-24 00:24:33.903 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.903 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for operations.TLS.PrivateKey setting to +2019-09-24 00:24:33.904 UTC [viperutil] unmarshalJSON -> DEBU 0ae Unmarshal JSON: value is not a string: false +2019-09-24 00:24:33.904 UTC [viperutil] getKeysRecursively -> DEBU 0af Found real value for operations.TLS.ClientAuthRequired setting to bool false +2019-09-24 00:24:33.904 UTC [viperutil] unmarshalJSON -> DEBU 0b0 Unmarshal JSON: value is not a string: [] +2019-09-24 00:24:33.904 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +2019-09-24 00:24:33.905 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for operations.TLS.RootCAs setting to +2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0b4 Found map[interface{}]interface{} value for metrics +2019-09-24 00:24:33.905 UTC [viperutil] unmarshalJSON -> DEBU 0b5 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0b6 Found real value for metrics.Provider setting to string prometheus +2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found map[string]interface{} value for metrics.Statsd +2019-09-24 00:24:33.905 UTC [viperutil] unmarshalJSON -> DEBU 0b8 Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found real value for metrics.Statsd.Network setting to string udp +2019-09-24 00:24:33.905 UTC [viperutil] unmarshalJSON -> DEBU 0ba Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-09-24 00:24:33.905 UTC [viperutil] getKeysRecursively -> DEBU 0bb Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +2019-09-24 00:24:33.910 UTC [viperutil] unmarshalJSON -> DEBU 0bc Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 00:24:33.910 UTC [viperutil] getKeysRecursively -> DEBU 0bd Found real value for metrics.Statsd.WriteInterval setting to string 30s +2019-09-24 00:24:33.910 UTC [viperutil] unmarshalJSON -> DEBU 0be Unmarshal JSON: value is not a string: +2019-09-24 00:24:33.910 UTC [viperutil] getKeysRecursively -> DEBU 0bf Found real value for metrics.Statsd.Prefix setting to +2019-09-24 00:24:33.910 UTC [viperutil] getKeysRecursively -> DEBU 0c0 Found map[interface{}]interface{} value for consensus +2019-09-24 00:24:33.910 UTC [viperutil] unmarshalJSON -> DEBU 0c1 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 00:24:33.910 UTC [viperutil] getKeysRecursively -> DEBU 0c2 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +2019-09-24 00:24:33.910 UTC [viperutil] unmarshalJSON -> DEBU 0c3 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 00:24:33.910 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +2019-09-24 00:24:33.910 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0c5 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress: ListenPort: RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate: ServerPrivateKey:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +2019-09-24 00:24:33.911 UTC [localconfig] completeInitialization -> INFO 0c6 Kafka.Version unset, setting to 0.10.2.0 +"2019-09-24 00:24:33.932 UTC [bccsp_sw] openKeyStore -> DEBU 0c7 KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +"2019-09-24 00:24:33.935 UTC [bccsp] initBCCSP -> DEBU 0c8 Initialize BCCSP [SW]" +"2019-09-24 00:24:33.935 UTC [msp] getPemMaterialFromDir -> DEBU 0c9 Reading directory /var/hyperledger/orderer/msp/signcerts" +"2019-09-24 00:24:33.945 UTC [msp] getPemMaterialFromDir -> DEBU 0ca Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +"2019-09-24 00:24:33.961 UTC [msp] getPemMaterialFromDir -> DEBU 0cb Reading directory /var/hyperledger/orderer/msp/cacerts" +"2019-09-24 00:24:33.973 UTC [msp] getPemMaterialFromDir -> DEBU 0cc Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +"2019-09-24 00:24:34.055 UTC [msp] getPemMaterialFromDir -> DEBU 0cd Reading directory /var/hyperledger/orderer/msp/admincerts" +"2019-09-24 00:24:34.069 UTC [msp] getPemMaterialFromDir -> DEBU 0ce Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +"2019-09-24 00:24:34.079 UTC [msp] getPemMaterialFromDir -> DEBU 0cf Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +"2019-09-24 00:24:34.092 UTC [msp] getMspConfig -> DEBU 0d0 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +"2019-09-24 00:24:34.093 UTC [msp] getPemMaterialFromDir -> DEBU 0d1 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +"2019-09-24 00:24:34.130 UTC [msp] getPemMaterialFromDir -> DEBU 0d2 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +"2019-09-24 00:24:34.182 UTC [msp] getPemMaterialFromDir -> DEBU 0d3 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +"2019-09-24 00:24:34.184 UTC [msp] getMspConfig -> DEBU 0d4 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +"2019-09-24 00:24:34.184 UTC [msp] getPemMaterialFromDir -> DEBU 0d5 Reading directory /var/hyperledger/orderer/msp/crls" +"2019-09-24 00:24:34.185 UTC [msp] getMspConfig -> DEBU 0d6 crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +"2019-09-24 00:24:34.186 UTC [msp] getMspConfig -> DEBU 0d7 MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +"2019-09-24 00:24:34.186 UTC [msp] newBccspMsp -> DEBU 0d8 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.187 UTC [msp] New -> DEBU 0d9 Creating Cache-MSP instance" +"2019-09-24 00:24:34.187 UTC [msp] loadLocaMSP -> DEBU 0da Created new local MSP" +"2019-09-24 00:24:34.187 UTC [msp] Setup -> DEBU 0db Setting up MSP instance OrdererMSP" +"2019-09-24 00:24:34.190 UTC [msp.identity] newIdentity -> DEBU 0dc Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -231,7 +231,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-07-20 02:39:29.592 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.193 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -244,7 +244,7 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.611 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.230 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -258,8 +258,8 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.624 UTC [bccsp_sw] loadPrivateKey -> DEBU 0df Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." -"2019-07-20 02:39:29.630 UTC [msp.identity] newIdentity -> DEBU 0e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.236 UTC [bccsp_sw] loadPrivateKey -> DEBU 0df Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." +"2019-09-24 00:24:34.254 UTC [msp.identity] newIdentity -> DEBU 0e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -273,9 +273,9 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.631 UTC [msp] setupSigningIdentity -> DEBU 0e1 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" -"2019-07-20 02:39:29.632 UTC [msp] Validate -> DEBU 0e2 MSP OrdererMSP validating identity" -"2019-07-20 02:39:29.633 UTC [orderer.common.server] prettyPrintStruct -> INFO 0e3 Orderer config values: +"2019-09-24 00:24:34.255 UTC [msp] setupSigningIdentity -> DEBU 0e1 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +"2019-09-24 00:24:34.255 UTC [msp] Validate -> DEBU 0e2 MSP OrdererMSP validating identity" +"2019-09-24 00:24:34.256 UTC [orderer.common.server] prettyPrintStruct -> INFO 0e3 Orderer config values: General.LedgerType = "file" General.ListenAddress = "0.0.0.0" General.ListenPort = 7050 @@ -364,28 +364,28 @@ QQ== Metrics.Statsd.Address = "127.0.0.1:8125" Metrics.Statsd.WriteInterval = 30s Metrics.Statsd.Prefix = """ -"2019-07-20 02:39:29.645 UTC [common.channelconfig] NewStandardValues -> DEBU 0e4 Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:29.645 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e5 Processing field: HashingAlgorithm" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e6 Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e7 Processing field: OrdererAddresses" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e8 Processing field: Consortium" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e9 Processing field: Capabilities" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0ea Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0eb Processing field: ConsensusType" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ec Processing field: BatchSize" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ed Processing field: BatchTimeout" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ee Processing field: KafkaBrokers" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ef Processing field: ChannelRestrictions" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: Capabilities" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0f1 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f2 Processing field: Endpoints" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0f3 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: MSP" -"2019-07-20 02:39:29.646 UTC [common.channelconfig] validateMSP -> DEBU 0f5 Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:29.647 UTC [msp] newBccspMsp -> DEBU 0f6 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.647 UTC [msp] New -> DEBU 0f7 Creating Cache-MSP instance" -"2019-07-20 02:39:29.647 UTC [msp] Setup -> DEBU 0f8 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:29.647 UTC [msp.identity] newIdentity -> DEBU 0f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.292 UTC [common.channelconfig] NewStandardValues -> DEBU 0e4 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:24:34.292 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e5 Processing field: HashingAlgorithm" +"2019-09-24 00:24:34.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e6 Processing field: BlockDataHashingStructure" +"2019-09-24 00:24:34.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e7 Processing field: OrdererAddresses" +"2019-09-24 00:24:34.293 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e8 Processing field: Consortium" +"2019-09-24 00:24:34.294 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e9 Processing field: Capabilities" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] NewStandardValues -> DEBU 0ea Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0eb Processing field: ConsensusType" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ec Processing field: BatchSize" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ed Processing field: BatchTimeout" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ee Processing field: KafkaBrokers" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ef Processing field: ChannelRestrictions" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: Capabilities" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] NewStandardValues -> DEBU 0f1 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f2 Processing field: Endpoints" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] NewStandardValues -> DEBU 0f3 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: MSP" +"2019-09-24 00:24:34.297 UTC [common.channelconfig] validateMSP -> DEBU 0f5 Setting up MSP for org OrdererOrg" +"2019-09-24 00:24:34.298 UTC [msp] newBccspMsp -> DEBU 0f6 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.302 UTC [msp] New -> DEBU 0f7 Creating Cache-MSP instance" +"2019-09-24 00:24:34.314 UTC [msp] Setup -> DEBU 0f8 Setting up MSP instance OrdererMSP" +"2019-09-24 00:24:34.314 UTC [msp.identity] newIdentity -> DEBU 0f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -399,7 +399,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-07-20 02:39:29.647 UTC [msp.identity] newIdentity -> DEBU 0fa Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.315 UTC [msp.identity] newIdentity -> DEBU 0fa Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -412,16 +412,16 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.647 UTC [msp] Validate -> DEBU 0fb MSP OrdererMSP validating identity" -"2019-07-20 02:39:29.647 UTC [common.channelconfig] NewStandardValues -> DEBU 0fc Initializing protos for *channelconfig.ConsortiumProtos" -"2019-07-20 02:39:29.647 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fd Processing field: ChannelCreationPolicy" -"2019-07-20 02:39:29.648 UTC [common.channelconfig] NewStandardValues -> DEBU 0fe Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.648 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ff Processing field: MSP" -"2019-07-20 02:39:29.648 UTC [common.channelconfig] validateMSP -> DEBU 100 Setting up MSP for org Org1MSP" -"2019-07-20 02:39:29.648 UTC [msp] newBccspMsp -> DEBU 101 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.648 UTC [msp] New -> DEBU 102 Creating Cache-MSP instance" -"2019-07-20 02:39:29.648 UTC [msp] Setup -> DEBU 103 Setting up MSP instance Org1MSP" -"2019-07-20 02:39:29.648 UTC [msp.identity] newIdentity -> DEBU 104 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.315 UTC [msp] Validate -> DEBU 0fb MSP OrdererMSP validating identity" +"2019-09-24 00:24:34.315 UTC [common.channelconfig] NewStandardValues -> DEBU 0fc Initializing protos for *channelconfig.ConsortiumProtos" +"2019-09-24 00:24:34.315 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fd Processing field: ChannelCreationPolicy" +"2019-09-24 00:24:34.315 UTC [common.channelconfig] NewStandardValues -> DEBU 0fe Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.315 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ff Processing field: MSP" +"2019-09-24 00:24:34.315 UTC [common.channelconfig] validateMSP -> DEBU 100 Setting up MSP for org Org1MSP" +"2019-09-24 00:24:34.315 UTC [msp] newBccspMsp -> DEBU 101 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.315 UTC [msp] New -> DEBU 102 Creating Cache-MSP instance" +"2019-09-24 00:24:34.315 UTC [msp] Setup -> DEBU 103 Setting up MSP instance Org1MSP" +"2019-09-24 00:24:34.315 UTC [msp.identity] newIdentity -> DEBU 104 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -436,7 +436,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:39:29.648 UTC [msp.identity] newIdentity -> DEBU 105 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.316 UTC [msp.identity] newIdentity -> DEBU 105 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -450,18 +450,18 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.649 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 106 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:29.649 UTC [msp] Validate -> DEBU 107 MSP Org1MSP validating identity" -"2019-07-20 02:39:29.649 UTC [msp] getCertificationChain -> DEBU 108 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:29.655 UTC [msp] hasOURole -> DEBU 109 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:29.655 UTC [msp] getCertificationChain -> DEBU 10a MSP Org1MSP getting certification chain" -"2019-07-20 02:39:29.655 UTC [common.channelconfig] NewStandardValues -> DEBU 10b Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.655 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10c Processing field: MSP" -"2019-07-20 02:39:29.655 UTC [common.channelconfig] validateMSP -> DEBU 10d Setting up MSP for org Org2MSP" -"2019-07-20 02:39:29.655 UTC [msp] newBccspMsp -> DEBU 10e Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.655 UTC [msp] New -> DEBU 10f Creating Cache-MSP instance" -"2019-07-20 02:39:29.655 UTC [msp] Setup -> DEBU 110 Setting up MSP instance Org2MSP" -"2019-07-20 02:39:29.655 UTC [msp.identity] newIdentity -> DEBU 111 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.316 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 106 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:24:34.316 UTC [msp] Validate -> DEBU 107 MSP Org1MSP validating identity" +"2019-09-24 00:24:34.316 UTC [msp] getCertificationChain -> DEBU 108 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:34.316 UTC [msp] hasOURole -> DEBU 109 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:24:34.316 UTC [msp] getCertificationChain -> DEBU 10a MSP Org1MSP getting certification chain" +"2019-09-24 00:24:34.316 UTC [common.channelconfig] NewStandardValues -> DEBU 10b Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.316 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10c Processing field: MSP" +"2019-09-24 00:24:34.316 UTC [common.channelconfig] validateMSP -> DEBU 10d Setting up MSP for org Org2MSP" +"2019-09-24 00:24:34.317 UTC [msp] newBccspMsp -> DEBU 10e Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.317 UTC [msp] New -> DEBU 10f Creating Cache-MSP instance" +"2019-09-24 00:24:34.317 UTC [msp] Setup -> DEBU 110 Setting up MSP instance Org2MSP" +"2019-09-24 00:24:34.317 UTC [msp.identity] newIdentity -> DEBU 111 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -476,7 +476,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.656 UTC [msp.identity] newIdentity -> DEBU 112 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.328 UTC [msp.identity] newIdentity -> DEBU 112 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -490,177 +490,94 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.656 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 113 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:29.656 UTC [msp] Validate -> DEBU 114 MSP Org2MSP validating identity" -"2019-07-20 02:39:29.656 UTC [msp] getCertificationChain -> DEBU 115 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:29.656 UTC [msp] hasOURole -> DEBU 116 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:29.656 UTC [msp] getCertificationChain -> DEBU 117 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:29.656 UTC [msp] Setup -> DEBU 118 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:29.656 UTC [msp] Setup -> DEBU 119 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11a Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Admins for Channel/Consortiums" -"2019-07-20 02:39:29.657 UTC [policies] GetPolicy -> DEBU 12a Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12b Proposed new policy Readers for Channel" -"2019-07-20 02:39:29.657 UTC [policies] GetPolicy -> DEBU 12c Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12d Proposed new policy Writers for Channel" -"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12e Proposed new policy Admins for Channel" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Group] /Channel" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Group] /Channel/Consortiums" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Policy] /Channel/Consortiums/Admins" -"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:29.658 UTC [orderer.common.server] createLedgerFactory -> DEBU 156 Ledger dir: /var/hyperledger/production/orderer" -"2019-07-20 02:39:29.658 UTC [kvledger.util] CreateDirIfMissing -> DEBU 157 CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" -"2019-07-20 02:39:29.658 UTC [kvledger.util] logDirStatus -> DEBU 158 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" -"2019-07-20 02:39:29.658 UTC [kvledger.util] logDirStatus -> DEBU 159 After creating dir - [/var/hyperledger/production/orderer/index/] exists" -"2019-07-20 02:39:29.705 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 15a Bootstrapping because no existing channels" -"2019-07-20 02:39:29.705 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 15b Selected bootstrap block, because system channel last config block is nil" -"2019-07-20 02:39:29.706 UTC [common.channelconfig] NewStandardValues -> DEBU 15c Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:29.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d Processing field: HashingAlgorithm" -"2019-07-20 02:39:29.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: OrdererAddresses" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: Consortium" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 161 Processing field: Capabilities" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 162 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 163 Processing field: ConsensusType" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164 Processing field: BatchSize" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: BatchTimeout" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 166 Processing field: KafkaBrokers" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167 Processing field: ChannelRestrictions" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168 Processing field: Capabilities" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 169 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a Processing field: Endpoints" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 16b Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c Processing field: MSP" -"2019-07-20 02:39:29.707 UTC [common.channelconfig] validateMSP -> DEBU 16d Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:29.707 UTC [msp] newBccspMsp -> DEBU 16e Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.707 UTC [msp] New -> DEBU 16f Creating Cache-MSP instance" -"2019-07-20 02:39:29.707 UTC [msp] Setup -> DEBU 170 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:29.707 UTC [msp.identity] newIdentity -> DEBU 171 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:39:29.708 UTC [msp.identity] newIdentity -> DEBU 172 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:39:29.708 UTC [msp] Validate -> DEBU 173 MSP OrdererMSP validating identity" -"2019-07-20 02:39:29.711 UTC [common.channelconfig] NewStandardValues -> DEBU 174 Initializing protos for *channelconfig.ConsortiumProtos" -"2019-07-20 02:39:29.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175 Processing field: ChannelCreationPolicy" -"2019-07-20 02:39:29.711 UTC [common.channelconfig] NewStandardValues -> DEBU 176 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177 Processing field: MSP" -"2019-07-20 02:39:29.711 UTC [common.channelconfig] validateMSP -> DEBU 178 Setting up MSP for org Org2MSP" -"2019-07-20 02:39:29.712 UTC [msp] newBccspMsp -> DEBU 179 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.712 UTC [msp] New -> DEBU 17a Creating Cache-MSP instance" -"2019-07-20 02:39:29.712 UTC [msp] Setup -> DEBU 17b Setting up MSP instance Org2MSP" -"2019-07-20 02:39:29.714 UTC [msp.identity] newIdentity -> DEBU 17c Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-07-20 02:39:29.714 UTC [msp.identity] newIdentity -> DEBU 17d Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-07-20 02:39:29.715 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17e Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:29.715 UTC [msp] Validate -> DEBU 17f MSP Org2MSP validating identity" -"2019-07-20 02:39:29.715 UTC [msp] getCertificationChain -> DEBU 180 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:29.715 UTC [msp] hasOURole -> DEBU 181 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:29.715 UTC [msp] getCertificationChain -> DEBU 182 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:29.716 UTC [common.channelconfig] NewStandardValues -> DEBU 183 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.716 UTC [common.channelconfig] initializeProtosStruct -> DEBU 184 Processing field: MSP" -"2019-07-20 02:39:29.716 UTC [common.channelconfig] validateMSP -> DEBU 185 Setting up MSP for org Org1MSP" -"2019-07-20 02:39:29.718 UTC [msp] newBccspMsp -> DEBU 186 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.718 UTC [msp] New -> DEBU 187 Creating Cache-MSP instance" -"2019-07-20 02:39:29.718 UTC [msp] Setup -> DEBU 188 Setting up MSP instance Org1MSP" -"2019-07-20 02:39:29.718 UTC [msp.identity] newIdentity -> DEBU 189 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.329 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 113 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:24:34.329 UTC [msp] Validate -> DEBU 114 MSP Org2MSP validating identity" +"2019-09-24 00:24:34.339 UTC [msp] getCertificationChain -> DEBU 115 MSP Org2MSP getting certification chain" +"2019-09-24 00:24:34.339 UTC [msp] hasOURole -> DEBU 116 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:24:34.339 UTC [msp] getCertificationChain -> DEBU 117 MSP Org2MSP getting certification chain" +"2019-09-24 00:24:34.339 UTC [msp] Setup -> DEBU 118 Setting up the MSP manager (3 msps)" +"2019-09-24 00:24:34.339 UTC [msp] Setup -> DEBU 119 MSP manager setup complete, setup 3 msps" +"2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:24:34.339 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Admins for Channel/Consortiums" +"2019-09-24 00:24:34.340 UTC [policies] GetPolicy -> DEBU 12a Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 12b Proposed new policy Writers for Channel" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 12c Proposed new policy Admins for Channel" +"2019-09-24 00:24:34.340 UTC [policies] GetPolicy -> DEBU 12d Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-09-24 00:24:34.340 UTC [policies] NewManagerImpl -> DEBU 12e Proposed new policy Readers for Channel" +"2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Group] /Channel" +"2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:24:34.340 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:24:34.341 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:24:34.354 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:24:34.354 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:24:34.354 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Group] /Channel/Consortiums" +"2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-09-24 00:24:34.355 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:24:34.356 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:24:34.357 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:24:34.357 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:24:34.357 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:24:34.357 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:24:34.357 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:24:34.358 UTC [orderer.common.server] createLedgerFactory -> DEBU 156 Ledger dir: /var/hyperledger/production/orderer" +"2019-09-24 00:24:34.358 UTC [kvledger.util] CreateDirIfMissing -> DEBU 157 CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +"2019-09-24 00:24:34.358 UTC [kvledger.util] logDirStatus -> DEBU 158 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +"2019-09-24 00:24:34.358 UTC [kvledger.util] logDirStatus -> DEBU 159 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +"2019-09-24 00:24:34.500 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 15a Bootstrapping because no existing channels" +"2019-09-24 00:24:34.504 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 15b Selected bootstrap block, because system channel last config block is nil" +"2019-09-24 00:24:34.505 UTC [common.channelconfig] NewStandardValues -> DEBU 15c Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:24:34.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d Processing field: HashingAlgorithm" +"2019-09-24 00:24:34.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e Processing field: BlockDataHashingStructure" +"2019-09-24 00:24:34.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: OrdererAddresses" +"2019-09-24 00:24:34.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: Consortium" +"2019-09-24 00:24:34.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 161 Processing field: Capabilities" +"2019-09-24 00:24:34.512 UTC [common.channelconfig] NewStandardValues -> DEBU 162 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-09-24 00:24:34.512 UTC [common.channelconfig] initializeProtosStruct -> DEBU 163 Processing field: ChannelCreationPolicy" +"2019-09-24 00:24:34.512 UTC [common.channelconfig] NewStandardValues -> DEBU 164 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.512 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: MSP" +"2019-09-24 00:24:34.512 UTC [common.channelconfig] validateMSP -> DEBU 166 Setting up MSP for org Org1MSP" +"2019-09-24 00:24:34.512 UTC [msp] newBccspMsp -> DEBU 167 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.512 UTC [msp] New -> DEBU 168 Creating Cache-MSP instance" +"2019-09-24 00:24:34.512 UTC [msp] Setup -> DEBU 169 Setting up MSP instance Org1MSP" +"2019-09-24 00:24:34.523 UTC [msp.identity] newIdentity -> DEBU 16a Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -675,7 +592,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:39:29.722 UTC [msp.identity] newIdentity -> DEBU 18a Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.524 UTC [msp.identity] newIdentity -> DEBU 16b Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -689,150 +606,190 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.740 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 18b Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:29.740 UTC [msp] Validate -> DEBU 18c MSP Org1MSP validating identity" -"2019-07-20 02:39:29.740 UTC [msp] getCertificationChain -> DEBU 18d MSP Org1MSP getting certification chain" -"2019-07-20 02:39:29.743 UTC [msp] hasOURole -> DEBU 18e MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:29.744 UTC [msp] getCertificationChain -> DEBU 18f MSP Org1MSP getting certification chain" -"2019-07-20 02:39:29.744 UTC [msp] Setup -> DEBU 190 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:29.744 UTC [msp] Setup -> DEBU 191 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 196 Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 199 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19b Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19c Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19d Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19e Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19f Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a0 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a1 Proposed new policy Admins for Channel/Consortiums" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a2 Proposed new policy Admins for Channel" -"2019-07-20 02:39:29.745 UTC [policies] GetPolicy -> DEBU 1a3 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a4 Proposed new policy Readers for Channel" -"2019-07-20 02:39:29.745 UTC [policies] GetPolicy -> DEBU 1a5 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a6 Proposed new policy Writers for Channel" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Group] /Channel/Consortiums" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c4 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c6 Adding to config map: [Policy] /Channel/Consortiums/Admins" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c7 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c9 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1ca Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cb Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cc Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cd Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:29.813 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1ce Booted with a genesis block, replication isn't an option" -"2019-07-20 02:39:29.841 UTC [orderer.common.server] initializeServerConfig -> INFO 1cf Starting orderer with TLS enabled" -"2019-07-20 02:39:29.844 UTC [orderer.common.server] configureClusterListener -> INFO 1d0 Cluster listener is not configured, defaulting to use the general listener on port 7050" -"2019-07-20 02:39:29.858 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1d1 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " -"2019-07-20 02:39:29.858 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1d2 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" -"2019-07-20 02:39:29.858 UTC [kvledger.util] logDirStatus -> DEBU 1d3 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" -"2019-07-20 02:39:29.859 UTC [kvledger.util] logDirStatus -> DEBU 1d4 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" -"2019-07-20 02:39:29.859 UTC [fsblkstorage] newBlockfileMgr -> INFO 1d5 Getting block information from block storage" -"2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d6 Retrieving checkpoint info from block files" -"2019-07-20 02:39:29.859 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d7 retrieveLastFileSuffix()" -"2019-07-20 02:39:29.859 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d8 retrieveLastFileSuffix() - biggestFileNum = -1" -"2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d9 Last file number found = -1" -"2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1da No block file found" -"2019-07-20 02:39:29.860 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1db Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0000cd5a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -"2019-07-20 02:39:29.862 UTC [fsblkstorage] newBlockIndex -> DEBU 1dc newBlockIndex() - indexItems:[[BlockNum]]" -"2019-07-20 02:39:29.865 UTC [fsblkstorage] indexBlock -> DEBU 1dd Indexing block [blockNum=0, blockHash=[]byte{0x83, 0x7c, 0xec, 0x8, 0xfb, 0x64, 0x69, 0x1e, 0xeb, 0x40, 0x71, 0x16, 0x20, 0xff, 0x7, 0xb7, 0x21, 0x5a, 0x7c, 0x93, 0xa4, 0x25, 0x8e, 0x29, 0x3a, 0x1a, 0x0, 0x5e, 0x0, 0xd6, 0xad, 0x25} txOffsets= +"2019-09-24 00:24:34.527 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16c Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:24:34.527 UTC [msp] Validate -> DEBU 16d MSP Org1MSP validating identity" +"2019-09-24 00:24:34.528 UTC [msp] getCertificationChain -> DEBU 16e MSP Org1MSP getting certification chain" +"2019-09-24 00:24:34.528 UTC [msp] hasOURole -> DEBU 16f MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:24:34.528 UTC [msp] getCertificationChain -> DEBU 170 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:34.528 UTC [common.channelconfig] NewStandardValues -> DEBU 171 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.528 UTC [common.channelconfig] initializeProtosStruct -> DEBU 172 Processing field: MSP" +"2019-09-24 00:24:34.529 UTC [common.channelconfig] validateMSP -> DEBU 173 Setting up MSP for org Org2MSP" +"2019-09-24 00:24:34.529 UTC [msp] newBccspMsp -> DEBU 174 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.529 UTC [msp] New -> DEBU 175 Creating Cache-MSP instance" +"2019-09-24 00:24:34.529 UTC [msp] Setup -> DEBU 176 Setting up MSP instance Org2MSP" +"2019-09-24 00:24:34.529 UTC [msp.identity] newIdentity -> DEBU 177 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-09-24 00:24:34.529 UTC [msp.identity] newIdentity -> DEBU 178 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:24:34.530 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 179 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:24:34.530 UTC [msp] Validate -> DEBU 17a MSP Org2MSP validating identity" +"2019-09-24 00:24:34.530 UTC [msp] getCertificationChain -> DEBU 17b MSP Org2MSP getting certification chain" +"2019-09-24 00:24:34.530 UTC [msp] hasOURole -> DEBU 17c MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:24:34.530 UTC [msp] getCertificationChain -> DEBU 17d MSP Org2MSP getting certification chain" +"2019-09-24 00:24:34.537 UTC [common.channelconfig] NewStandardValues -> DEBU 17e Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:24:34.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f Processing field: ConsensusType" +"2019-09-24 00:24:34.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 180 Processing field: BatchSize" +"2019-09-24 00:24:34.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181 Processing field: BatchTimeout" +"2019-09-24 00:24:34.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 182 Processing field: KafkaBrokers" +"2019-09-24 00:24:34.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 183 Processing field: ChannelRestrictions" +"2019-09-24 00:24:34.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 184 Processing field: Capabilities" +"2019-09-24 00:24:34.539 UTC [common.channelconfig] NewStandardValues -> DEBU 185 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:24:34.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 186 Processing field: Endpoints" +"2019-09-24 00:24:34.540 UTC [common.channelconfig] NewStandardValues -> DEBU 187 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.540 UTC [common.channelconfig] initializeProtosStruct -> DEBU 188 Processing field: MSP" +"2019-09-24 00:24:34.540 UTC [common.channelconfig] validateMSP -> DEBU 189 Setting up MSP for org OrdererOrg" +"2019-09-24 00:24:34.540 UTC [msp] newBccspMsp -> DEBU 18a Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.540 UTC [msp] New -> DEBU 18b Creating Cache-MSP instance" +"2019-09-24 00:24:34.540 UTC [msp] Setup -> DEBU 18c Setting up MSP instance OrdererMSP" +"2019-09-24 00:24:34.540 UTC [msp.identity] newIdentity -> DEBU 18d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-09-24 00:24:34.541 UTC [msp.identity] newIdentity -> DEBU 18e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:24:34.541 UTC [msp] Validate -> DEBU 18f MSP OrdererMSP validating identity" +"2019-09-24 00:24:34.542 UTC [msp] Setup -> DEBU 190 Setting up the MSP manager (3 msps)" +"2019-09-24 00:24:34.542 UTC [msp] Setup -> DEBU 191 MSP manager setup complete, setup 3 msps" +"2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 196 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 199 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 19b Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.542 UTC [policies] NewManagerImpl -> DEBU 19c Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.543 UTC [policies] NewManagerImpl -> DEBU 19d Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.543 UTC [policies] NewManagerImpl -> DEBU 19e Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.543 UTC [policies] NewManagerImpl -> DEBU 19f Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.548 UTC [policies] NewManagerImpl -> DEBU 1a0 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.548 UTC [policies] NewManagerImpl -> DEBU 1a1 Proposed new policy Admins for Channel/Consortiums" +"2019-09-24 00:24:34.548 UTC [policies] NewManagerImpl -> DEBU 1a2 Proposed new policy Admins for Channel" +"2019-09-24 00:24:34.548 UTC [policies] GetPolicy -> DEBU 1a3 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-09-24 00:24:34.548 UTC [policies] NewManagerImpl -> DEBU 1a4 Proposed new policy Readers for Channel" +"2019-09-24 00:24:34.548 UTC [policies] GetPolicy -> DEBU 1a5 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-09-24 00:24:34.548 UTC [policies] NewManagerImpl -> DEBU 1a6 Proposed new policy Writers for Channel" +"2019-09-24 00:24:34.549 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Group] /Channel" +"2019-09-24 00:24:34.549 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:24:34.551 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.552 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:24:34.552 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:24:34.553 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:24:34.553 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:24:34.555 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:24:34.558 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:24:34.560 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:24:34.562 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:24:34.562 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:24:34.562 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Group] /Channel/Consortiums" +"2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-09-24 00:24:34.563 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-09-24 00:24:34.564 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-09-24 00:24:34.564 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-09-24 00:24:34.564 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-09-24 00:24:34.564 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c4 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c6 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c7 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1c9 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1ca Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:24:34.570 UTC [common.configtx] addToMap -> DEBU 1cb Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:24:34.571 UTC [common.configtx] addToMap -> DEBU 1cc Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:24:34.571 UTC [common.configtx] addToMap -> DEBU 1cd Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:24:34.624 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1ce Booted with a genesis block, replication isn't an option" +"2019-09-24 00:24:34.713 UTC [orderer.common.server] initializeServerConfig -> INFO 1cf Starting orderer with TLS enabled" +"2019-09-24 00:24:34.716 UTC [orderer.common.server] configureClusterListener -> INFO 1d0 Cluster listener is not configured, defaulting to use the general listener on port 7050" +"2019-09-24 00:24:34.726 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1d1 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +"2019-09-24 00:24:34.726 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1d2 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +"2019-09-24 00:24:34.726 UTC [kvledger.util] logDirStatus -> DEBU 1d3 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +"2019-09-24 00:24:34.726 UTC [kvledger.util] logDirStatus -> DEBU 1d4 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +"2019-09-24 00:24:34.726 UTC [fsblkstorage] newBlockfileMgr -> INFO 1d5 Getting block information from block storage" +"2019-09-24 00:24:34.726 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d6 Retrieving checkpoint info from block files" +"2019-09-24 00:24:34.726 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d7 retrieveLastFileSuffix()" +"2019-09-24 00:24:34.726 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d8 retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-09-24 00:24:34.726 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d9 Last file number found = -1" +"2019-09-24 00:24:34.726 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1da No block file found" +"2019-09-24 00:24:34.726 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1db Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000041a40)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-09-24 00:24:34.728 UTC [fsblkstorage] newBlockIndex -> DEBU 1dc newBlockIndex() - indexItems:[[BlockNum]]" +"2019-09-24 00:24:34.731 UTC [fsblkstorage] indexBlock -> DEBU 1dd Indexing block [blockNum=0, blockHash=[]byte{0x83, 0x7c, 0xec, 0x8, 0xfb, 0x64, 0x69, 0x1e, 0xeb, 0x40, 0x71, 0x16, 0x20, 0xff, 0x7, 0xb7, 0x21, 0x5a, 0x7c, 0x93, 0xa4, 0x25, 0x8e, 0x29, 0x3a, 0x1a, 0x0, 0x5e, 0x0, 0xd6, 0xad, 0x25} txOffsets= txId=a6faba22e613adaa8102d6c27d264383fd6380b45cd1860c8c876737af1bf39c locPointer=offset=39, bytesLength=18375 ]" -"2019-07-20 02:39:29.867 UTC [fsblkstorage] updateCheckpoint -> DEBU 1de Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18419], isChainEmpty=[false], lastBlockNumber=[0]" -"2019-07-20 02:39:29.870 UTC [common.channelconfig] NewStandardValues -> DEBU 1df Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:29.873 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: HashingAlgorithm" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e1 Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: OrdererAddresses" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e3 Processing field: Consortium" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: Capabilities" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: ConsensusType" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e7 Processing field: BatchSize" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e8 Processing field: BatchTimeout" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e9 Processing field: KafkaBrokers" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ea Processing field: ChannelRestrictions" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1eb Processing field: Capabilities" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1ec Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ed Processing field: Endpoints" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1ee Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ef Processing field: MSP" -"2019-07-20 02:39:29.874 UTC [common.channelconfig] validateMSP -> DEBU 1f0 Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:29.874 UTC [msp] newBccspMsp -> DEBU 1f1 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.874 UTC [msp] New -> DEBU 1f2 Creating Cache-MSP instance" -"2019-07-20 02:39:29.874 UTC [msp] Setup -> DEBU 1f3 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:29.875 UTC [msp.identity] newIdentity -> DEBU 1f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:39:29.875 UTC [msp.identity] newIdentity -> DEBU 1f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:39:29.875 UTC [msp] Validate -> DEBU 1f6 MSP OrdererMSP validating identity" -"2019-07-20 02:39:29.875 UTC [common.channelconfig] NewStandardValues -> DEBU 1f7 Initializing protos for *channelconfig.ConsortiumProtos" -"2019-07-20 02:39:29.875 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f8 Processing field: ChannelCreationPolicy" -"2019-07-20 02:39:29.875 UTC [common.channelconfig] NewStandardValues -> DEBU 1f9 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.875 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1fa Processing field: MSP" -"2019-07-20 02:39:29.875 UTC [common.channelconfig] validateMSP -> DEBU 1fb Setting up MSP for org Org1MSP" -"2019-07-20 02:39:29.875 UTC [msp] newBccspMsp -> DEBU 1fc Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.875 UTC [msp] New -> DEBU 1fd Creating Cache-MSP instance" -"2019-07-20 02:39:29.875 UTC [msp] Setup -> DEBU 1fe Setting up MSP instance Org1MSP" -"2019-07-20 02:39:29.877 UTC [msp.identity] newIdentity -> DEBU 1ff Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.734 UTC [fsblkstorage] updateCheckpoint -> DEBU 1de Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18419], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-09-24 00:24:34.734 UTC [common.channelconfig] NewStandardValues -> DEBU 1df Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:24:34.734 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: HashingAlgorithm" +"2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e1 Processing field: BlockDataHashingStructure" +"2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: OrdererAddresses" +"2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e3 Processing field: Consortium" +"2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: Capabilities" +"2019-09-24 00:24:34.735 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: ChannelCreationPolicy" +"2019-09-24 00:24:34.735 UTC [common.channelconfig] NewStandardValues -> DEBU 1e7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.735 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e8 Processing field: MSP" +"2019-09-24 00:24:34.735 UTC [common.channelconfig] validateMSP -> DEBU 1e9 Setting up MSP for org Org1MSP" +"2019-09-24 00:24:34.735 UTC [msp] newBccspMsp -> DEBU 1ea Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.735 UTC [msp] New -> DEBU 1eb Creating Cache-MSP instance" +"2019-09-24 00:24:34.735 UTC [msp] Setup -> DEBU 1ec Setting up MSP instance Org1MSP" +"2019-09-24 00:24:34.735 UTC [msp.identity] newIdentity -> DEBU 1ed Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -847,7 +804,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:39:29.881 UTC [msp.identity] newIdentity -> DEBU 200 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.736 UTC [msp.identity] newIdentity -> DEBU 1ee Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -861,18 +818,18 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.882 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 201 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:29.882 UTC [msp] Validate -> DEBU 202 MSP Org1MSP validating identity" -"2019-07-20 02:39:29.883 UTC [msp] getCertificationChain -> DEBU 203 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:29.883 UTC [msp] hasOURole -> DEBU 204 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:29.883 UTC [msp] getCertificationChain -> DEBU 205 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:29.885 UTC [common.channelconfig] NewStandardValues -> DEBU 206 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.885 UTC [common.channelconfig] initializeProtosStruct -> DEBU 207 Processing field: MSP" -"2019-07-20 02:39:29.885 UTC [common.channelconfig] validateMSP -> DEBU 208 Setting up MSP for org Org2MSP" -"2019-07-20 02:39:29.885 UTC [msp] newBccspMsp -> DEBU 209 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.885 UTC [msp] New -> DEBU 20a Creating Cache-MSP instance" -"2019-07-20 02:39:29.885 UTC [msp] Setup -> DEBU 20b Setting up MSP instance Org2MSP" -"2019-07-20 02:39:29.885 UTC [msp.identity] newIdentity -> DEBU 20c Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.736 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1ef Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:24:34.736 UTC [msp] Validate -> DEBU 1f0 MSP Org1MSP validating identity" +"2019-09-24 00:24:34.737 UTC [msp] getCertificationChain -> DEBU 1f1 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:34.737 UTC [msp] hasOURole -> DEBU 1f2 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:24:34.737 UTC [msp] getCertificationChain -> DEBU 1f3 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:34.737 UTC [common.channelconfig] NewStandardValues -> DEBU 1f4 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.737 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f5 Processing field: MSP" +"2019-09-24 00:24:34.737 UTC [common.channelconfig] validateMSP -> DEBU 1f6 Setting up MSP for org Org2MSP" +"2019-09-24 00:24:34.737 UTC [msp] newBccspMsp -> DEBU 1f7 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.737 UTC [msp] New -> DEBU 1f8 Creating Cache-MSP instance" +"2019-09-24 00:24:34.737 UTC [msp] Setup -> DEBU 1f9 Setting up MSP instance Org2MSP" +"2019-09-24 00:24:34.738 UTC [msp.identity] newIdentity -> DEBU 1fa Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -887,7 +844,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.886 UTC [msp.identity] newIdentity -> DEBU 20d Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.738 UTC [msp.identity] newIdentity -> DEBU 1fb Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -901,105 +858,27 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.886 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 20e Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:29.886 UTC [msp] Validate -> DEBU 20f MSP Org2MSP validating identity" -"2019-07-20 02:39:29.887 UTC [msp] getCertificationChain -> DEBU 210 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:29.887 UTC [msp] hasOURole -> DEBU 211 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:29.887 UTC [msp] getCertificationChain -> DEBU 212 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:29.888 UTC [msp] Setup -> DEBU 213 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:29.888 UTC [msp] Setup -> DEBU 214 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 215 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 216 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 217 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 218 Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 219 Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21a Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21b Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 220 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 221 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 222 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 223 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 224 Proposed new policy Admins for Channel/Consortiums" -"2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 225 Proposed new policy Admins for Channel" -"2019-07-20 02:39:29.889 UTC [policies] GetPolicy -> DEBU 226 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -"2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 227 Proposed new policy Readers for Channel" -"2019-07-20 02:39:29.889 UTC [policies] GetPolicy -> DEBU 228 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -"2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 229 Proposed new policy Writers for Channel" -"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Group] /Channel" -"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 234 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 235 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 236 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 237 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 238 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 239 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23a Adding to config map: [Group] /Channel/Consortiums" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 240 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 241 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 242 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 243 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 244 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 245 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 246 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 247 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 248 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 249 Adding to config map: [Policy] /Channel/Consortiums/Admins" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24a Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24b Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24c Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24d Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24e Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24f Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 250 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:29.899 UTC [fsblkstorage] Next -> DEBU 251 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-07-20 02:39:29.899 UTC [fsblkstorage] newBlockfileStream -> DEBU 252 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 253 Remaining bytes=[18419], Going to peek [8] bytes" -"2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 254 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 255 blockbytes [18416] read from file [0]" -"2019-07-20 02:39:29.899 UTC [fsblkstorage] Next -> DEBU 256 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-07-20 02:39:29.899 UTC [fsblkstorage] newBlockfileStream -> DEBU 257 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 258 Remaining bytes=[18419], Going to peek [8] bytes" -"2019-07-20 02:39:29.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 259 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:39:29.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 25a blockbytes [18416] read from file [0]" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 25b Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25c Processing field: HashingAlgorithm" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25d Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25e Processing field: OrdererAddresses" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25f Processing field: Consortium" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 260 Processing field: Capabilities" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 261 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 262 Processing field: ConsensusType" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 263 Processing field: BatchSize" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 264 Processing field: BatchTimeout" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 265 Processing field: KafkaBrokers" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: ChannelRestrictions" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 267 Processing field: Capabilities" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 268 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 269 Processing field: Endpoints" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 26a Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 26b Processing field: MSP" -"2019-07-20 02:39:29.900 UTC [common.channelconfig] validateMSP -> DEBU 26c Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:29.900 UTC [msp] newBccspMsp -> DEBU 26d Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.901 UTC [msp] New -> DEBU 26e Creating Cache-MSP instance" -"2019-07-20 02:39:29.901 UTC [msp] Setup -> DEBU 26f Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:29.913 UTC [msp.identity] newIdentity -> DEBU 270 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.739 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1fc Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:24:34.739 UTC [msp] Validate -> DEBU 1fd MSP Org2MSP validating identity" +"2019-09-24 00:24:34.739 UTC [msp] getCertificationChain -> DEBU 1fe MSP Org2MSP getting certification chain" +"2019-09-24 00:24:34.740 UTC [msp] hasOURole -> DEBU 1ff MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:24:34.740 UTC [msp] getCertificationChain -> DEBU 200 MSP Org2MSP getting certification chain" +"2019-09-24 00:24:34.740 UTC [common.channelconfig] NewStandardValues -> DEBU 201 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:24:34.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 202 Processing field: ConsensusType" +"2019-09-24 00:24:34.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 203 Processing field: BatchSize" +"2019-09-24 00:24:34.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 204 Processing field: BatchTimeout" +"2019-09-24 00:24:34.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 205 Processing field: KafkaBrokers" +"2019-09-24 00:24:34.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 206 Processing field: ChannelRestrictions" +"2019-09-24 00:24:34.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 207 Processing field: Capabilities" +"2019-09-24 00:24:34.753 UTC [common.channelconfig] NewStandardValues -> DEBU 208 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:24:34.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 209 Processing field: Endpoints" +"2019-09-24 00:24:34.753 UTC [common.channelconfig] NewStandardValues -> DEBU 20a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 20b Processing field: MSP" +"2019-09-24 00:24:34.753 UTC [common.channelconfig] validateMSP -> DEBU 20c Setting up MSP for org OrdererOrg" +"2019-09-24 00:24:34.753 UTC [msp] newBccspMsp -> DEBU 20d Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.753 UTC [msp] New -> DEBU 20e Creating Cache-MSP instance" +"2019-09-24 00:24:34.753 UTC [msp] Setup -> DEBU 20f Setting up MSP instance OrdererMSP" +"2019-09-24 00:24:34.761 UTC [msp.identity] newIdentity -> DEBU 210 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1013,7 +892,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-07-20 02:39:29.913 UTC [msp.identity] newIdentity -> DEBU 271 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.761 UTC [msp.identity] newIdentity -> DEBU 211 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1026,16 +905,137 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.914 UTC [msp] Validate -> DEBU 272 MSP OrdererMSP validating identity" -"2019-07-20 02:39:29.914 UTC [common.channelconfig] NewStandardValues -> DEBU 273 Initializing protos for *channelconfig.ConsortiumProtos" -"2019-07-20 02:39:29.914 UTC [common.channelconfig] initializeProtosStruct -> DEBU 274 Processing field: ChannelCreationPolicy" -"2019-07-20 02:39:29.914 UTC [common.channelconfig] NewStandardValues -> DEBU 275 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.914 UTC [common.channelconfig] initializeProtosStruct -> DEBU 276 Processing field: MSP" -"2019-07-20 02:39:29.914 UTC [common.channelconfig] validateMSP -> DEBU 277 Setting up MSP for org Org1MSP" -"2019-07-20 02:39:29.914 UTC [msp] newBccspMsp -> DEBU 278 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.914 UTC [msp] New -> DEBU 279 Creating Cache-MSP instance" -"2019-07-20 02:39:29.914 UTC [msp] Setup -> DEBU 27a Setting up MSP instance Org1MSP" -"2019-07-20 02:39:29.915 UTC [msp.identity] newIdentity -> DEBU 27b Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.762 UTC [msp] Validate -> DEBU 212 MSP OrdererMSP validating identity" +"2019-09-24 00:24:34.762 UTC [msp] Setup -> DEBU 213 Setting up the MSP manager (3 msps)" +"2019-09-24 00:24:34.762 UTC [msp] Setup -> DEBU 214 MSP manager setup complete, setup 3 msps" +"2019-09-24 00:24:34.762 UTC [policies] NewManagerImpl -> DEBU 215 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.762 UTC [policies] NewManagerImpl -> DEBU 216 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.762 UTC [policies] NewManagerImpl -> DEBU 217 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 218 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 219 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21a Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21b Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 21f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 220 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 221 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 222 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 223 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 224 Proposed new policy Admins for Channel/Consortiums" +"2019-09-24 00:24:34.763 UTC [policies] GetPolicy -> DEBU 225 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 226 Proposed new policy Readers for Channel" +"2019-09-24 00:24:34.763 UTC [policies] GetPolicy -> DEBU 227 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-09-24 00:24:34.763 UTC [policies] NewManagerImpl -> DEBU 228 Proposed new policy Writers for Channel" +"2019-09-24 00:24:34.764 UTC [policies] NewManagerImpl -> DEBU 229 Proposed new policy Admins for Channel" +"2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Group] /Channel" +"2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:24:34.764 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 234 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 235 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 236 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:24:34.770 UTC [common.configtx] addToMap -> DEBU 237 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:24:34.771 UTC [common.configtx] addToMap -> DEBU 238 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:24:34.771 UTC [common.configtx] addToMap -> DEBU 239 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:24:34.771 UTC [common.configtx] addToMap -> DEBU 23a Adding to config map: [Group] /Channel/Consortiums" +"2019-09-24 00:24:34.771 UTC [common.configtx] addToMap -> DEBU 23b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-09-24 00:24:34.771 UTC [common.configtx] addToMap -> DEBU 23c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 23d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 23e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 23f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 240 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 241 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 242 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 243 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 244 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 245 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-09-24 00:24:34.772 UTC [common.configtx] addToMap -> DEBU 246 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 247 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 248 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 249 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24a Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24c Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24d Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24e Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 24f Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:24:34.773 UTC [common.configtx] addToMap -> DEBU 250 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:24:34.774 UTC [fsblkstorage] Next -> DEBU 251 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 00:24:34.774 UTC [fsblkstorage] newBlockfileStream -> DEBU 252 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 253 Remaining bytes=[18419], Going to peek [8] bytes" +"2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 254 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 255 blockbytes [18416] read from file [0]" +"2019-09-24 00:24:34.774 UTC [fsblkstorage] Next -> DEBU 256 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 00:24:34.774 UTC [fsblkstorage] newBlockfileStream -> DEBU 257 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 258 Remaining bytes=[18419], Going to peek [8] bytes" +"2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 259 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:24:34.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 25a blockbytes [18416] read from file [0]" +"2019-09-24 00:24:34.774 UTC [common.channelconfig] NewStandardValues -> DEBU 25b Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25c Processing field: HashingAlgorithm" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25d Processing field: BlockDataHashingStructure" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25e Processing field: OrdererAddresses" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25f Processing field: Consortium" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 260 Processing field: Capabilities" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] NewStandardValues -> DEBU 261 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 262 Processing field: ConsensusType" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 263 Processing field: BatchSize" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 264 Processing field: BatchTimeout" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 265 Processing field: KafkaBrokers" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: ChannelRestrictions" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 267 Processing field: Capabilities" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] NewStandardValues -> DEBU 268 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 269 Processing field: Endpoints" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] NewStandardValues -> DEBU 26a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] initializeProtosStruct -> DEBU 26b Processing field: MSP" +"2019-09-24 00:24:34.775 UTC [common.channelconfig] validateMSP -> DEBU 26c Setting up MSP for org OrdererOrg" +"2019-09-24 00:24:34.775 UTC [msp] newBccspMsp -> DEBU 26d Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.775 UTC [msp] New -> DEBU 26e Creating Cache-MSP instance" +"2019-09-24 00:24:34.776 UTC [msp] Setup -> DEBU 26f Setting up MSP instance OrdererMSP" +"2019-09-24 00:24:34.787 UTC [msp.identity] newIdentity -> DEBU 270 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-09-24 00:24:34.788 UTC [msp.identity] newIdentity -> DEBU 271 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:24:34.788 UTC [msp] Validate -> DEBU 272 MSP OrdererMSP validating identity" +"2019-09-24 00:24:34.788 UTC [common.channelconfig] NewStandardValues -> DEBU 273 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-09-24 00:24:34.788 UTC [common.channelconfig] initializeProtosStruct -> DEBU 274 Processing field: ChannelCreationPolicy" +"2019-09-24 00:24:34.790 UTC [common.channelconfig] NewStandardValues -> DEBU 275 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 276 Processing field: MSP" +"2019-09-24 00:24:34.792 UTC [common.channelconfig] validateMSP -> DEBU 277 Setting up MSP for org Org1MSP" +"2019-09-24 00:24:34.792 UTC [msp] newBccspMsp -> DEBU 278 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.801 UTC [msp] New -> DEBU 279 Creating Cache-MSP instance" +"2019-09-24 00:24:34.801 UTC [msp] Setup -> DEBU 27a Setting up MSP instance Org1MSP" +"2019-09-24 00:24:34.801 UTC [msp.identity] newIdentity -> DEBU 27b Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1050,7 +1050,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:39:29.915 UTC [msp.identity] newIdentity -> DEBU 27c Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.802 UTC [msp.identity] newIdentity -> DEBU 27c Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1064,18 +1064,18 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.915 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 27d Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:29.915 UTC [msp] Validate -> DEBU 27e MSP Org1MSP validating identity" -"2019-07-20 02:39:29.916 UTC [msp] getCertificationChain -> DEBU 27f MSP Org1MSP getting certification chain" -"2019-07-20 02:39:29.916 UTC [msp] hasOURole -> DEBU 280 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:29.916 UTC [msp] getCertificationChain -> DEBU 281 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:29.916 UTC [common.channelconfig] NewStandardValues -> DEBU 282 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:29.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 283 Processing field: MSP" -"2019-07-20 02:39:29.916 UTC [common.channelconfig] validateMSP -> DEBU 284 Setting up MSP for org Org2MSP" -"2019-07-20 02:39:29.916 UTC [msp] newBccspMsp -> DEBU 285 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:29.916 UTC [msp] New -> DEBU 286 Creating Cache-MSP instance" -"2019-07-20 02:39:29.916 UTC [msp] Setup -> DEBU 287 Setting up MSP instance Org2MSP" -"2019-07-20 02:39:29.916 UTC [msp.identity] newIdentity -> DEBU 288 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.803 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 27d Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:24:34.803 UTC [msp] Validate -> DEBU 27e MSP Org1MSP validating identity" +"2019-09-24 00:24:34.803 UTC [msp] getCertificationChain -> DEBU 27f MSP Org1MSP getting certification chain" +"2019-09-24 00:24:34.803 UTC [msp] hasOURole -> DEBU 280 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:24:34.803 UTC [msp] getCertificationChain -> DEBU 281 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:34.804 UTC [common.channelconfig] NewStandardValues -> DEBU 282 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:34.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU 283 Processing field: MSP" +"2019-09-24 00:24:34.804 UTC [common.channelconfig] validateMSP -> DEBU 284 Setting up MSP for org Org2MSP" +"2019-09-24 00:24:34.804 UTC [msp] newBccspMsp -> DEBU 285 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:34.804 UTC [msp] New -> DEBU 286 Creating Cache-MSP instance" +"2019-09-24 00:24:34.804 UTC [msp] Setup -> DEBU 287 Setting up MSP instance Org2MSP" +"2019-09-24 00:24:34.804 UTC [msp.identity] newIdentity -> DEBU 288 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1090,7 +1090,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.916 UTC [msp.identity] newIdentity -> DEBU 289 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.804 UTC [msp.identity] newIdentity -> DEBU 289 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1104,121 +1104,121 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-07-20 02:39:29.920 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 28a Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:29.920 UTC [msp] Validate -> DEBU 28b MSP Org2MSP validating identity" -"2019-07-20 02:39:29.920 UTC [msp] getCertificationChain -> DEBU 28c MSP Org2MSP getting certification chain" -"2019-07-20 02:39:29.920 UTC [msp] hasOURole -> DEBU 28d MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:29.920 UTC [msp] getCertificationChain -> DEBU 28e MSP Org2MSP getting certification chain" -"2019-07-20 02:39:29.920 UTC [msp] Setup -> DEBU 28f Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:29.921 UTC [msp] Setup -> DEBU 290 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 291 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 292 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 293 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 294 Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 295 Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 296 Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 297 Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 298 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 299 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29a Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29b Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29e Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 29f Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a0 Proposed new policy Admins for Channel/Consortiums" -"2019-07-20 02:39:29.922 UTC [policies] GetPolicy -> DEBU 2a1 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" -"2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a2 Proposed new policy Writers for Channel" -"2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a3 Proposed new policy Admins for Channel" -"2019-07-20 02:39:29.922 UTC [policies] GetPolicy -> DEBU 2a4 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" -"2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a5 Proposed new policy Readers for Channel" -"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b2 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b4 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b5 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b6 Adding to config map: [Group] /Channel/Consortiums" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b7 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ba Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" -"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2be Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2bf Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c5 Adding to config map: [Policy] /Channel/Consortiums/Admins" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c6 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c8 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c9 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2ca Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2cb Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2cc Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:29.924 UTC [common.channelconfig] LogSanityChecks -> DEBU 2cd As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:39:29.924 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ce As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:39:29.924 UTC [policies] Manager -> DEBU 2cf Manager Channel looking up path [Application]" -"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d0 Manager Channel has managers Orderer" -"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d1 Manager Channel has managers Consortiums" -"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d2 Manager Channel looking up path [Orderer]" -"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d3 Manager Channel has managers Orderer" -"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d4 Manager Channel has managers Consortiums" -"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d5 Manager Channel/Orderer looking up path []" -"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d6 Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d7 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d8 As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d9 As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2da As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:39:29.925 UTC [common.capabilities] Supported -> DEBU 2db Orderer capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:29.925 UTC [common.capabilities] Supported -> DEBU 2dc Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:29.925 UTC [orderer.common.server] func1 -> DEBU 2dd Executing callback to update root CAs" -"2019-07-20 02:39:29.926 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2de updating root CAs for channel [testchainid]" -"2019-07-20 02:39:29.926 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2df adding app root CAs for MSP [Org2MSP]" -"2019-07-20 02:39:29.927 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e0 adding orderer root CAs for MSP [OrdererMSP]" -"2019-07-20 02:39:29.927 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e1 adding app root CAs for MSP [Org1MSP]" -"2019-07-20 02:39:29.928 UTC [fsblkstorage] Next -> DEBU 2e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-07-20 02:39:29.930 UTC [fsblkstorage] newBlockfileStream -> DEBU 2e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e4 Remaining bytes=[18419], Going to peek [8] bytes" -"2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e5 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e6 blockbytes [18416] read from file [0]" -"2019-07-20 02:39:29.930 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2e7 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" -"2019-07-20 02:39:29.930 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2e8 EvictionSuspicion not set, defaulting to 10m0s" -"2019-07-20 02:39:29.931 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2e9 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 -"2019-07-20 02:39:29.931 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2ea No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 -"2019-07-20 02:39:29.939 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2eb Loading WAL at Term 0 and Index 0" channel=testchainid node=1 -"2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ec Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 -"2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ed Appending 0 entries to memory storage" channel=testchainid node=1 -"2019-07-20 02:39:29.940 UTC [fsblkstorage] Next -> DEBU 2ee Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-07-20 02:39:29.940 UTC [fsblkstorage] newBlockfileStream -> DEBU 2ef newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f0 Remaining bytes=[18419], Going to peek [8] bytes" -"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f1 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f2 blockbytes [18416] read from file [0]" -"2019-07-20 02:39:29.940 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2f3 [channel: testchainid] Done creating channel support resources" -"2019-07-20 02:39:29.940 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2f4 Creating system channel msg processor for channel testchainid" -"2019-07-20 02:39:29.940 UTC [fsblkstorage] Next -> DEBU 2f5 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-07-20 02:39:29.940 UTC [fsblkstorage] newBlockfileStream -> DEBU 2f6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f7 Remaining bytes=[18419], Going to peek [8] bytes" -"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f8 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f9 blockbytes [18416] read from file [0]" -"2019-07-20 02:39:29.940 UTC [orderer.commmon.multichannel] Initialize -> INFO 2fa Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" -"2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] Start -> INFO 2fb Starting Raft node" channel=testchainid node=1 -"2019-07-20 02:39:29.940 UTC [orderer.common.cluster] Configure -> INFO 2fc Entering, channel: testchainid, nodes: [ID: 2, +"2019-09-24 00:24:34.805 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 28a Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:24:34.805 UTC [msp] Validate -> DEBU 28b MSP Org2MSP validating identity" +"2019-09-24 00:24:34.805 UTC [msp] getCertificationChain -> DEBU 28c MSP Org2MSP getting certification chain" +"2019-09-24 00:24:34.805 UTC [msp] hasOURole -> DEBU 28d MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:24:34.805 UTC [msp] getCertificationChain -> DEBU 28e MSP Org2MSP getting certification chain" +"2019-09-24 00:24:34.806 UTC [msp] Setup -> DEBU 28f Setting up the MSP manager (3 msps)" +"2019-09-24 00:24:34.807 UTC [msp] Setup -> DEBU 290 MSP manager setup complete, setup 3 msps" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 291 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 292 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 293 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 294 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 295 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 296 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 297 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 298 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 299 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29a Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29b Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29e Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 29f Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.807 UTC [policies] NewManagerImpl -> DEBU 2a0 Proposed new policy Admins for Channel/Consortiums" +"2019-09-24 00:24:34.808 UTC [policies] GetPolicy -> DEBU 2a1 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-09-24 00:24:34.808 UTC [policies] NewManagerImpl -> DEBU 2a2 Proposed new policy Readers for Channel" +"2019-09-24 00:24:34.808 UTC [policies] GetPolicy -> DEBU 2a3 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-09-24 00:24:34.808 UTC [policies] NewManagerImpl -> DEBU 2a4 Proposed new policy Writers for Channel" +"2019-09-24 00:24:34.808 UTC [policies] NewManagerImpl -> DEBU 2a5 Proposed new policy Admins for Channel" +"2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Group] /Channel" +"2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:24:34.808 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b2 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b3 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b4 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b6 Adding to config map: [Group] /Channel/Consortiums" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b7 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2b9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2ba Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2be Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2bf Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2c0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-09-24 00:24:34.809 UTC [common.configtx] addToMap -> DEBU 2c4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-09-24 00:24:34.810 UTC [common.configtx] addToMap -> DEBU 2c5 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-09-24 00:24:34.810 UTC [common.configtx] addToMap -> DEBU 2c6 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:24:34.810 UTC [common.configtx] addToMap -> DEBU 2c7 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:24:34.810 UTC [common.configtx] addToMap -> DEBU 2c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:24:34.810 UTC [common.configtx] addToMap -> DEBU 2c9 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:24:34.812 UTC [common.configtx] addToMap -> DEBU 2ca Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:24:34.812 UTC [common.configtx] addToMap -> DEBU 2cb Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:24:34.812 UTC [common.configtx] addToMap -> DEBU 2cc Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:24:34.812 UTC [common.channelconfig] LogSanityChecks -> DEBU 2cd As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:24:34.812 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ce As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2cf Manager Channel looking up path [Application]" +"2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2d0 Manager Channel has managers Orderer" +"2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2d1 Manager Channel has managers Consortiums" +"2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2d2 Manager Channel looking up path [Orderer]" +"2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2d3 Manager Channel has managers Orderer" +"2019-09-24 00:24:34.812 UTC [policies] Manager -> DEBU 2d4 Manager Channel has managers Consortiums" +"2019-09-24 00:24:34.813 UTC [policies] Manager -> DEBU 2d5 Manager Channel/Orderer looking up path []" +"2019-09-24 00:24:34.813 UTC [policies] Manager -> DEBU 2d6 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:24:34.813 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d7 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:24:34.813 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d8 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:24:34.813 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d9 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:24:34.813 UTC [common.channelconfig] LogSanityChecks -> DEBU 2da As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:24:34.813 UTC [common.capabilities] Supported -> DEBU 2db Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 00:24:34.815 UTC [common.capabilities] Supported -> DEBU 2dc Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:24:34.815 UTC [orderer.common.server] func1 -> DEBU 2dd Executing callback to update root CAs" +"2019-09-24 00:24:34.815 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2de updating root CAs for channel [testchainid]" +"2019-09-24 00:24:34.815 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2df adding app root CAs for MSP [Org1MSP]" +"2019-09-24 00:24:34.815 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e0 adding app root CAs for MSP [Org2MSP]" +"2019-09-24 00:24:34.815 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e1 adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 00:24:34.816 UTC [fsblkstorage] Next -> DEBU 2e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 00:24:34.816 UTC [fsblkstorage] newBlockfileStream -> DEBU 2e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 00:24:34.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e4 Remaining bytes=[18419], Going to peek [8] bytes" +"2019-09-24 00:24:34.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e5 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:24:34.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e6 blockbytes [18416] read from file [0]" +"2019-09-24 00:24:34.816 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2e7 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +"2019-09-24 00:24:34.816 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2e8 EvictionSuspicion not set, defaulting to 10m0s" +"2019-09-24 00:24:34.817 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2e9 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +"2019-09-24 00:24:34.817 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2ea No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +"2019-09-24 00:24:34.835 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2eb Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +"2019-09-24 00:24:34.836 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ec Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +"2019-09-24 00:24:34.836 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ed Appending 0 entries to memory storage" channel=testchainid node=1 +"2019-09-24 00:24:34.836 UTC [fsblkstorage] Next -> DEBU 2ee Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 00:24:34.836 UTC [fsblkstorage] newBlockfileStream -> DEBU 2ef newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 00:24:34.836 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f0 Remaining bytes=[18419], Going to peek [8] bytes" +"2019-09-24 00:24:34.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f1 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:24:34.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f2 blockbytes [18416] read from file [0]" +"2019-09-24 00:24:34.837 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2f3 [channel: testchainid] Done creating channel support resources" +"2019-09-24 00:24:34.837 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2f4 Creating system channel msg processor for channel testchainid" +"2019-09-24 00:24:34.837 UTC [fsblkstorage] Next -> DEBU 2f5 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 00:24:34.837 UTC [fsblkstorage] newBlockfileStream -> DEBU 2f6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 00:24:34.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f7 Remaining bytes=[18419], Going to peek [8] bytes" +"2019-09-24 00:24:34.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f8 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:24:34.837 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f9 blockbytes [18416] read from file [0]" +"2019-09-24 00:24:34.837 UTC [orderer.commmon.multichannel] Initialize -> INFO 2fa Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" +"2019-09-24 00:24:34.837 UTC [orderer.consensus.etcdraft] Start -> INFO 2fb Starting Raft node" channel=testchainid node=1 +"2019-09-24 00:24:34.837 UTC [orderer.common.cluster] Configure -> INFO 2fc Entering, channel: testchainid, nodes: [ID: 2, Endpoint: orderer1.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL @@ -1283,9 +1283,9 @@ hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -----END CERTIFICATE----- ]" -"2019-07-20 02:39:29.941 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fd Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" -"2019-07-20 02:39:29.943 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fe Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" -"2019-07-20 02:39:29.944 UTC [orderer.common.cluster] func1 -> DEBU 2ff Connecting to ID: 2, +"2019-09-24 00:24:34.837 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fd Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +"2019-09-24 00:24:34.837 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fe Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-09-24 00:24:34.837 UTC [orderer.common.cluster] func1 -> DEBU 2ff Connecting to ID: 2, Endpoint: orderer1.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL @@ -1318,14 +1318,11 @@ hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -----END CERTIFICATE----- for channel testchainid" -"2019-07-20 02:39:29.944 UTC [grpc] DialContext -> DEBU 300 parsed scheme: """ -"2019-07-20 02:39:29.944 UTC [grpc] DialContext -> DEBU 301 scheme "" not registered, fallback to default scheme" -"2019-07-20 02:39:29.945 UTC [grpc] watcher -> DEBU 302 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" -"2019-07-20 02:39:29.945 UTC [grpc] switchBalancer -> DEBU 303 ClientConn switching balancer to "pick_first"" -"2019-07-20 02:39:29.945 UTC [grpc] HandleSubConnStateChange -> DEBU 304 pickfirstBalancer: HandleSubConnStateChange: 0xc00029c220, CONNECTING" -"2019-07-20 02:39:29.945 UTC [orderer.common.cluster] updateStubInMapping -> INFO 305 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" -"2019-07-20 02:39:29.952 UTC [orderer.common.cluster] updateStubInMapping -> INFO 306 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" -"2019-07-20 02:39:29.952 UTC [orderer.common.cluster] func1 -> DEBU 307 Connecting to ID: 3, +"2019-09-24 00:24:34.838 UTC [grpc] DialContext -> DEBU 300 parsed scheme: """ +"2019-09-24 00:24:34.838 UTC [grpc] DialContext -> DEBU 301 scheme "" not registered, fallback to default scheme" +"2019-09-24 00:24:34.839 UTC [orderer.common.cluster] updateStubInMapping -> INFO 302 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +"2019-09-24 00:24:34.839 UTC [orderer.common.cluster] updateStubInMapping -> INFO 303 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-09-24 00:24:34.839 UTC [orderer.common.cluster] func1 -> DEBU 304 Connecting to ID: 3, Endpoint: orderer2.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL @@ -1358,128 +1355,186 @@ hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -----END CERTIFICATE----- for channel testchainid" -"2019-07-20 02:39:29.955 UTC [grpc] DialContext -> DEBU 308 parsed scheme: """ -"2019-07-20 02:39:29.955 UTC [grpc] DialContext -> DEBU 309 scheme "" not registered, fallback to default scheme" -"2019-07-20 02:39:29.955 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 30a 2 exists in both old and new membership for channel testchainid , skipping its deactivation" -"2019-07-20 02:39:29.955 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 30b 3 exists in both old and new membership for channel testchainid , skipping its deactivation" -"2019-07-20 02:39:29.955 UTC [orderer.common.cluster] Configure -> INFO 30c Exiting" -"2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] start -> DEBU 30d Starting raft node: #peers: 3" channel=testchainid node=1 -"2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] start -> INFO 30e Starting raft node as part of a new channel" channel=testchainid node=1 -"2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 30f 1 became follower at term 0" channel=testchainid node=1 -"2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] newRaft -> INFO 310 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 -"2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 311 1 became follower at term 1" channel=testchainid node=1 -"2019-07-20 02:39:29.962 UTC [orderer.common.server] Start -> INFO 312 Starting orderer: +"2019-09-24 00:24:34.840 UTC [grpc] DialContext -> DEBU 305 parsed scheme: """ +"2019-09-24 00:24:34.840 UTC [grpc] DialContext -> DEBU 306 scheme "" not registered, fallback to default scheme" +"2019-09-24 00:24:34.840 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 307 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-09-24 00:24:34.841 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 308 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-09-24 00:24:34.841 UTC [orderer.common.cluster] Configure -> INFO 309 Exiting" +"2019-09-24 00:24:34.841 UTC [orderer.consensus.etcdraft] start -> DEBU 30a Starting raft node: #peers: 3" channel=testchainid node=1 +"2019-09-24 00:24:34.841 UTC [orderer.consensus.etcdraft] start -> INFO 30b Starting raft node as part of a new channel" channel=testchainid node=1 +"2019-09-24 00:24:34.841 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 30c 1 became follower at term 0" channel=testchainid node=1 +"2019-09-24 00:24:34.841 UTC [orderer.consensus.etcdraft] newRaft -> INFO 30d newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +"2019-09-24 00:24:34.841 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 30e 1 became follower at term 1" channel=testchainid node=1 +"2019-09-24 00:24:34.841 UTC [grpc] watcher -> DEBU 30f ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +"2019-09-24 00:24:34.841 UTC [grpc] switchBalancer -> DEBU 310 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:24:34.841 UTC [orderer.common.server] Start -> INFO 311 Starting orderer: Version: 1.4.2 Commit SHA: development build - Go version: go1.12.7 + Go version: go1.12.9 OS/Arch: linux/amd64" -"2019-07-20 02:39:29.962 UTC [orderer.common.server] Start -> INFO 313 Beginning to serve requests" -"2019-07-20 02:39:29.970 UTC [grpc] watcher -> DEBU 314 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" -"2019-07-20 02:39:29.971 UTC [grpc] switchBalancer -> DEBU 315 ClientConn switching balancer to "pick_first"" -"2019-07-20 02:39:29.971 UTC [grpc] HandleSubConnStateChange -> DEBU 316 pickfirstBalancer: HandleSubConnStateChange: 0xc00029c240, CONNECTING" -"2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 317 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 -"2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 318 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 -"2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 319 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 -"2019-07-20 02:39:30.015 UTC [grpc] HandleSubConnStateChange -> DEBU 31a pickfirstBalancer: HandleSubConnStateChange: 0xc00029c220, READY" -"2019-07-20 02:39:30.040 UTC [grpc] HandleSubConnStateChange -> DEBU 31b pickfirstBalancer: HandleSubConnStateChange: 0xc00029c240, READY" -"2019-07-20 02:39:31.007 UTC [orderer.common.cluster] Step -> DEBU 31c Connection from orderer2.example.com(172.18.0.4:54782)" -"2019-07-20 02:39:31.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:31.008 UTC [orderer.consensus.etcdraft] Step -> INFO 31e 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 -"2019-07-20 02:39:31.008 UTC [orderer.common.cluster] NewStream -> DEBU 31f Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" -"2019-07-20 02:39:31.008 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 320 Sending msg of 28 bytes to 3 on channel testchainid took 89µs" -"2019-07-20 02:39:31.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " -"2019-07-20 02:39:31.010 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] Step -> INFO 323 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 -"2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 324 1 became follower at term 2" channel=testchainid node=1 -"2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] Step -> INFO 325 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 -"2019-07-20 02:39:31.011 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 326 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" -"2019-07-20 02:39:31.012 UTC [orderer.common.cluster.step] sendMessage -> DEBU 327 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.8µs " -"2019-07-20 02:39:31.014 UTC [orderer.common.cluster.step] handleMessage -> DEBU 328 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 36" -"2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] run -> INFO 329 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 -"2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32a Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" -"2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " -"2019-07-20 02:39:31.015 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 32c Raft leader changed: 0 -> 3" channel=testchainid node=1 -"2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:31.015 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32e Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" -"2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.1µs " -"2019-07-20 02:39:31.510 UTC [orderer.common.cluster.step] handleMessage -> DEBU 330 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:31.510 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 331 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" -"2019-07-20 02:39:31.510 UTC [orderer.common.cluster.step] sendMessage -> DEBU 332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.1µs " -"2019-07-20 02:39:32.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 333 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:32.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 334 Sending msg of 28 bytes to 3 on channel testchainid took 27.5µs" -"2019-07-20 02:39:32.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 335 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.4µs " -"2019-07-20 02:39:32.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 336 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:32.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 337 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" -"2019-07-20 02:39:32.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU 338 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.8µs " -"2019-07-20 02:39:33.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 339 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:33.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33a Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" -"2019-07-20 02:39:33.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.6µs " -"2019-07-20 02:39:33.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:33.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33d Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" -"2019-07-20 02:39:33.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.9µs " -"2019-07-20 02:39:34.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:34.010 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 340 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" -"2019-07-20 02:39:34.011 UTC [orderer.common.cluster.step] sendMessage -> DEBU 341 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.8µs " -"2019-07-20 02:39:34.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 342 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:34.508 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 343 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" -"2019-07-20 02:39:34.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU 344 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 298.7µs " -"2019-07-20 02:39:35.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 345 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:35.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 346 Sending msg of 28 bytes to 3 on channel testchainid took 80.2µs" -"2019-07-20 02:39:35.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 347 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.9µs " -"2019-07-20 02:39:35.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 348 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:35.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 349 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" -"2019-07-20 02:39:35.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.1µs " -"2019-07-20 02:39:36.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:36.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34c Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" -"2019-07-20 02:39:36.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " -"2019-07-20 02:39:36.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:36.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34f Sending msg of 28 bytes to 3 on channel testchainid took 14µs" -"2019-07-20 02:39:36.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 350 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.1µs " -"2019-07-20 02:39:37.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 351 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:37.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 352 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" -"2019-07-20 02:39:37.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU 353 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.5µs " -"2019-07-20 02:39:37.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 354 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:37.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 355 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" -"2019-07-20 02:39:37.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 356 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 362.8µs " -"2019-07-20 02:39:38.007 UTC [orderer.common.cluster.step] handleMessage -> DEBU 357 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:38.008 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 358 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" -"2019-07-20 02:39:38.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 359 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.1µs " -"2019-07-20 02:39:38.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:38.509 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35b Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" -"2019-07-20 02:39:38.509 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.3µs " -"2019-07-20 02:39:39.009 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:39.009 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35e Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" -"2019-07-20 02:39:39.009 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " -"2019-07-20 02:39:39.044 UTC [orderer.common.server] Deliver -> DEBU 360 Starting new Deliver handler" -"2019-07-20 02:39:39.044 UTC [common.deliver] Handle -> DEBU 361 Starting new deliver loop for 172.18.0.9:39028" -"2019-07-20 02:39:39.045 UTC [common.deliver] Handle -> DEBU 362 Attempting to read seek info message from 172.18.0.9:39028" -"2019-07-20 02:39:39.074 UTC [orderer.common.server] Broadcast -> DEBU 363 Starting new Broadcast handler" -"2019-07-20 02:39:39.074 UTC [orderer.common.broadcast] Handle -> DEBU 364 Starting new broadcast loop for 172.18.0.9:39030" -"2019-07-20 02:39:39.076 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 365 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39030" -"2019-07-20 02:39:39.077 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 366 Processing config update tx with system channel message processor for channel ID businesschannel" -"2019-07-20 02:39:39.077 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 367 Processing channel create tx for channel businesschannel on system channel testchainid" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] NewStandardValues -> DEBU 368 Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 369 Processing field: HashingAlgorithm" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36a Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36b Processing field: OrdererAddresses" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36c Processing field: Consortium" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36d Processing field: Capabilities" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] NewStandardValues -> DEBU 36e Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36f Processing field: ConsensusType" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 370 Processing field: BatchSize" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 371 Processing field: BatchTimeout" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 372 Processing field: KafkaBrokers" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 373 Processing field: ChannelRestrictions" -"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 374 Processing field: Capabilities" -"2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 375 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 376 Processing field: Endpoints" -"2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 377 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 378 Processing field: MSP" -"2019-07-20 02:39:39.078 UTC [common.channelconfig] validateMSP -> DEBU 379 Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:39.078 UTC [msp] newBccspMsp -> DEBU 37a Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.078 UTC [msp] New -> DEBU 37b Creating Cache-MSP instance" -"2019-07-20 02:39:39.078 UTC [msp] Setup -> DEBU 37c Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:39.078 UTC [msp.identity] newIdentity -> DEBU 37d Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:34.841 UTC [orderer.common.server] Start -> INFO 312 Beginning to serve requests" +"2019-09-24 00:24:34.841 UTC [grpc] HandleSubConnStateChange -> DEBU 313 pickfirstBalancer: HandleSubConnStateChange: 0xc000399530, CONNECTING" +"2019-09-24 00:24:34.843 UTC [grpc] watcher -> DEBU 314 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +"2019-09-24 00:24:34.843 UTC [grpc] switchBalancer -> DEBU 315 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:24:34.843 UTC [grpc] HandleSubConnStateChange -> DEBU 316 pickfirstBalancer: HandleSubConnStateChange: 0xc000399a40, CONNECTING" +"2019-09-24 00:24:34.868 UTC [grpc] HandleSubConnStateChange -> DEBU 317 pickfirstBalancer: HandleSubConnStateChange: 0xc000399530, READY" +"2019-09-24 00:24:34.872 UTC [grpc] HandleSubConnStateChange -> DEBU 318 pickfirstBalancer: HandleSubConnStateChange: 0xc000399a40, READY" +"2019-09-24 00:24:34.874 UTC [orderer.consensus.etcdraft] apply -> INFO 319 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-09-24 00:24:34.874 UTC [orderer.consensus.etcdraft] apply -> INFO 31a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-09-24 00:24:34.874 UTC [orderer.consensus.etcdraft] apply -> INFO 31b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-09-24 00:24:35.714 UTC [orderer.common.cluster] Step -> DEBU 31c Connection from orderer2.example.com(172.18.0.2:49900)" +"2019-09-24 00:24:35.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:35.715 UTC [orderer.consensus.etcdraft] Step -> INFO 31e 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +"2019-09-24 00:24:35.715 UTC [orderer.common.cluster] NewStream -> DEBU 31f Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-09-24 00:24:35.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 320 Sending msg of 28 bytes to 3 on channel testchainid took 132µs" +"2019-09-24 00:24:35.716 UTC [orderer.common.cluster.step] sendMessage -> DEBU 321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 774.6µs " +"2019-09-24 00:24:35.721 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:35.721 UTC [orderer.consensus.etcdraft] Step -> INFO 323 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +"2019-09-24 00:24:35.721 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 324 1 became follower at term 2" channel=testchainid node=1 +"2019-09-24 00:24:35.721 UTC [orderer.common.cluster.step] handleMessage -> DEBU 325 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 36" +"2019-09-24 00:24:35.721 UTC [orderer.consensus.etcdraft] Step -> INFO 326 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +"2019-09-24 00:24:35.721 UTC [orderer.consensus.etcdraft] run -> INFO 327 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +"2019-09-24 00:24:35.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 328 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +"2019-09-24 00:24:35.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 329 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +"2019-09-24 00:24:35.725 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 32a Raft leader changed: 0 -> 3" channel=testchainid node=1 +"2019-09-24 00:24:35.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.6µs " +"2019-09-24 00:24:35.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 39.8µs " +"2019-09-24 00:24:35.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:35.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32e Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +"2019-09-24 00:24:35.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.3µs " +"2019-09-24 00:24:36.208 UTC [orderer.common.cluster.step] handleMessage -> DEBU 330 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:36.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 331 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +"2019-09-24 00:24:36.208 UTC [orderer.common.cluster.step] sendMessage -> DEBU 332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +"2019-09-24 00:24:36.707 UTC [orderer.common.cluster.step] handleMessage -> DEBU 333 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:36.708 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 334 Sending msg of 28 bytes to 3 on channel testchainid took 36.6µs" +"2019-09-24 00:24:36.708 UTC [orderer.common.cluster.step] sendMessage -> DEBU 335 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.4µs " +"2019-09-24 00:24:37.208 UTC [orderer.common.cluster.step] handleMessage -> DEBU 336 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:37.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 337 Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +"2019-09-24 00:24:37.208 UTC [orderer.common.cluster.step] sendMessage -> DEBU 338 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +"2019-09-24 00:24:37.708 UTC [orderer.common.cluster.step] handleMessage -> DEBU 339 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:37.709 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33a Sending msg of 28 bytes to 3 on channel testchainid took 153.9µs" +"2019-09-24 00:24:37.709 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 463.8µs " +"2019-09-24 00:24:38.207 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:38.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33d Sending msg of 28 bytes to 3 on channel testchainid took 53µs" +"2019-09-24 00:24:38.208 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " +"2019-09-24 00:24:38.708 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:38.708 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 340 Sending msg of 28 bytes to 3 on channel testchainid took 22.7µs" +"2019-09-24 00:24:38.708 UTC [orderer.common.cluster.step] sendMessage -> DEBU 341 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.9µs " +"2019-09-24 00:24:39.232 UTC [orderer.common.cluster.step] handleMessage -> DEBU 342 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:39.233 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 343 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-09-24 00:24:39.233 UTC [orderer.common.cluster.step] sendMessage -> DEBU 344 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127µs " +"2019-09-24 00:24:39.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 345 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:39.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 346 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-09-24 00:24:39.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 347 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.9µs " +"2019-09-24 00:24:40.210 UTC [orderer.common.cluster.step] handleMessage -> DEBU 348 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:40.210 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 349 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2019-09-24 00:24:40.210 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +"2019-09-24 00:24:40.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:40.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34c Sending msg of 28 bytes to 3 on channel testchainid took 8.7µs" +"2019-09-24 00:24:40.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.1µs " +"2019-09-24 00:24:41.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:41.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34f Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2019-09-24 00:24:41.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 350 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.5µs " +"2019-09-24 00:24:41.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 351 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:41.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 352 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2019-09-24 00:24:41.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 353 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.5µs " +"2019-09-24 00:24:42.174 UTC [orderer.common.cluster.step] handleMessage -> DEBU 354 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:42.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 355 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2019-09-24 00:24:42.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 356 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.7µs " +"2019-09-24 00:24:42.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU 357 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:42.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 358 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2019-09-24 00:24:42.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 359 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.4µs " +"2019-09-24 00:24:43.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:43.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35b Sending msg of 28 bytes to 3 on channel testchainid took 36.6µs" +"2019-09-24 00:24:43.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.1µs " +"2019-09-24 00:24:43.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:43.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35e Sending msg of 28 bytes to 3 on channel testchainid took 61.6µs" +"2019-09-24 00:24:43.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.9µs " +"2019-09-24 00:24:44.176 UTC [orderer.common.cluster.step] handleMessage -> DEBU 360 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:44.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 361 Sending msg of 28 bytes to 3 on channel testchainid took 46.7µs" +"2019-09-24 00:24:44.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 362 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.8µs " +"2019-09-24 00:24:44.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU 363 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:44.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 364 Sending msg of 28 bytes to 3 on channel testchainid took 36.2µs" +"2019-09-24 00:24:44.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 365 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.9µs " +"2019-09-24 00:24:44.739 UTC [orderer.common.server] replicateDisabledChains -> DEBU 366 No inactive chains to try to replicate" +"2019-09-24 00:24:45.174 UTC [orderer.common.cluster.step] handleMessage -> DEBU 367 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:45.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 368 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +"2019-09-24 00:24:45.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 369 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 542.5µs " +"2019-09-24 00:24:45.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:45.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147µs " +"2019-09-24 00:24:45.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36c Sending msg of 28 bytes to 3 on channel testchainid took 563.2µs" +"2019-09-24 00:24:46.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:46.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36e Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +"2019-09-24 00:24:46.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.8µs " +"2019-09-24 00:24:46.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 370 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:46.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 371 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2019-09-24 00:24:46.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 372 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.7µs " +"2019-09-24 00:24:47.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 373 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:47.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 374 Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +"2019-09-24 00:24:47.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 375 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +"2019-09-24 00:24:47.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU 376 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:47.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 377 Sending msg of 28 bytes to 3 on channel testchainid took 41.4µs" +"2019-09-24 00:24:47.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 378 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.1µs " +"2019-09-24 00:24:48.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 379 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:48.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37a Sending msg of 28 bytes to 3 on channel testchainid took 22.7µs" +"2019-09-24 00:24:48.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80µs " +"2019-09-24 00:24:48.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:48.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37d Sending msg of 28 bytes to 3 on channel testchainid took 29.6µs" +"2019-09-24 00:24:48.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " +"2019-09-24 00:24:49.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:49.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 380 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2019-09-24 00:24:49.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 381 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.7µs " +"2019-09-24 00:24:49.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 382 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:49.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 383 Sending msg of 28 bytes to 3 on channel testchainid took 26.4µs" +"2019-09-24 00:24:49.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 384 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +"2019-09-24 00:24:50.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 385 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:50.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 386 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +"2019-09-24 00:24:50.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 387 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.2µs " +"2019-09-24 00:24:50.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 388 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:50.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 389 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +"2019-09-24 00:24:50.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.3µs " +"2019-09-24 00:24:51.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:51.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144µs " +"2019-09-24 00:24:51.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38d Sending msg of 28 bytes to 3 on channel testchainid took 414.9µs" +"2019-09-24 00:24:51.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:51.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38f Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" +"2019-09-24 00:24:51.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 390 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.5µs " +"2019-09-24 00:24:52.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 391 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:52.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 392 Sending msg of 28 bytes to 3 on channel testchainid took 19µs" +"2019-09-24 00:24:52.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 393 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.6µs " +"2019-09-24 00:24:52.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 394 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:52.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 395 Sending msg of 28 bytes to 3 on channel testchainid took 47.6µs" +"2019-09-24 00:24:52.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 396 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " +"2019-09-24 00:24:52.839 UTC [orderer.common.server] Deliver -> DEBU 397 Starting new Deliver handler" +"2019-09-24 00:24:52.839 UTC [common.deliver] Handle -> DEBU 398 Starting new deliver loop for 172.18.0.9:60628" +"2019-09-24 00:24:52.839 UTC [common.deliver] Handle -> DEBU 399 Attempting to read seek info message from 172.18.0.9:60628" +"2019-09-24 00:24:52.959 UTC [orderer.common.server] Broadcast -> DEBU 39a Starting new Broadcast handler" +"2019-09-24 00:24:52.974 UTC [orderer.common.broadcast] Handle -> DEBU 39b Starting new broadcast loop for 172.18.0.9:60630" +"2019-09-24 00:24:52.991 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 39c [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:60630" +"2019-09-24 00:24:52.991 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 39d Processing config update tx with system channel message processor for channel ID businesschannel" +"2019-09-24 00:24:52.991 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 39e Processing channel create tx for channel businesschannel on system channel testchainid" +"2019-09-24 00:24:52.992 UTC [common.channelconfig] NewStandardValues -> DEBU 39f Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a0 Processing field: HashingAlgorithm" +"2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a1 Processing field: BlockDataHashingStructure" +"2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a2 Processing field: OrdererAddresses" +"2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a3 Processing field: Consortium" +"2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a4 Processing field: Capabilities" +"2019-09-24 00:24:52.992 UTC [common.channelconfig] NewStandardValues -> DEBU 3a5 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:24:52.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a6 Processing field: ConsensusType" +"2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a7 Processing field: BatchSize" +"2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a8 Processing field: BatchTimeout" +"2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3a9 Processing field: KafkaBrokers" +"2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3aa Processing field: ChannelRestrictions" +"2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ab Processing field: Capabilities" +"2019-09-24 00:24:52.993 UTC [common.channelconfig] NewStandardValues -> DEBU 3ac Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ad Processing field: Endpoints" +"2019-09-24 00:24:52.993 UTC [common.channelconfig] NewStandardValues -> DEBU 3ae Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:52.993 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af Processing field: MSP" +"2019-09-24 00:24:52.993 UTC [common.channelconfig] validateMSP -> DEBU 3b0 Setting up MSP for org OrdererOrg" +"2019-09-24 00:24:52.993 UTC [msp] newBccspMsp -> DEBU 3b1 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:52.993 UTC [msp] New -> DEBU 3b2 Creating Cache-MSP instance" +"2019-09-24 00:24:52.993 UTC [msp] Setup -> DEBU 3b3 Setting up MSP instance OrdererMSP" +"2019-09-24 00:24:52.993 UTC [msp.identity] newIdentity -> DEBU 3b4 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1493,7 +1548,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-07-20 02:39:39.078 UTC [msp.identity] newIdentity -> DEBU 37e Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:52.994 UTC [msp.identity] newIdentity -> DEBU 3b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -1506,20 +1561,20 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.078 UTC [msp] Validate -> DEBU 37f MSP OrdererMSP validating identity" -"2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 380 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 381 Processing field: ACLs" -"2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 382 Processing field: Capabilities" -"2019-07-20 02:39:39.079 UTC [common.channelconfig] NewStandardValues -> DEBU 383 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 384 Processing field: AnchorPeers" -"2019-07-20 02:39:39.079 UTC [common.channelconfig] NewStandardValues -> DEBU 385 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 386 Processing field: MSP" -"2019-07-20 02:39:39.079 UTC [common.channelconfig] Validate -> DEBU 387 Anchor peers for org Org1MSP are " -"2019-07-20 02:39:39.079 UTC [common.channelconfig] validateMSP -> DEBU 388 Setting up MSP for org Org1MSP" -"2019-07-20 02:39:39.079 UTC [msp] newBccspMsp -> DEBU 389 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.079 UTC [msp] New -> DEBU 38a Creating Cache-MSP instance" -"2019-07-20 02:39:39.079 UTC [msp] Setup -> DEBU 38b Setting up MSP instance Org1MSP" -"2019-07-20 02:39:39.080 UTC [msp.identity] newIdentity -> DEBU 38c Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:52.994 UTC [msp] Validate -> DEBU 3b6 MSP OrdererMSP validating identity" +"2019-09-24 00:24:52.994 UTC [common.channelconfig] NewStandardValues -> DEBU 3b7 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:24:52.994 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b8 Processing field: ACLs" +"2019-09-24 00:24:52.994 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b9 Processing field: Capabilities" +"2019-09-24 00:24:52.994 UTC [common.channelconfig] NewStandardValues -> DEBU 3ba Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:24:52.994 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bb Processing field: AnchorPeers" +"2019-09-24 00:24:52.994 UTC [common.channelconfig] NewStandardValues -> DEBU 3bc Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:52.994 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bd Processing field: MSP" +"2019-09-24 00:24:52.996 UTC [common.channelconfig] Validate -> DEBU 3be Anchor peers for org Org1MSP are " +"2019-09-24 00:24:52.996 UTC [common.channelconfig] validateMSP -> DEBU 3bf Setting up MSP for org Org1MSP" +"2019-09-24 00:24:52.996 UTC [msp] newBccspMsp -> DEBU 3c0 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:52.996 UTC [msp] New -> DEBU 3c1 Creating Cache-MSP instance" +"2019-09-24 00:24:52.997 UTC [msp] Setup -> DEBU 3c2 Setting up MSP instance Org1MSP" +"2019-09-24 00:24:52.998 UTC [msp.identity] newIdentity -> DEBU 3c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1534,7 +1589,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:39:39.080 UTC [msp.identity] newIdentity -> DEBU 38d Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:52.999 UTC [msp.identity] newIdentity -> DEBU 3c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1548,21 +1603,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.080 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 38e Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:39.081 UTC [msp] Validate -> DEBU 38f MSP Org1MSP validating identity" -"2019-07-20 02:39:39.081 UTC [msp] getCertificationChain -> DEBU 390 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:39.081 UTC [msp] hasOURole -> DEBU 391 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:39.081 UTC [msp] getCertificationChain -> DEBU 392 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:39.081 UTC [common.channelconfig] NewStandardValues -> DEBU 393 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:39.081 UTC [common.channelconfig] initializeProtosStruct -> DEBU 394 Processing field: AnchorPeers" -"2019-07-20 02:39:39.081 UTC [common.channelconfig] NewStandardValues -> DEBU 395 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.081 UTC [common.channelconfig] initializeProtosStruct -> DEBU 396 Processing field: MSP" -"2019-07-20 02:39:39.081 UTC [common.channelconfig] Validate -> DEBU 397 Anchor peers for org Org2MSP are " -"2019-07-20 02:39:39.081 UTC [common.channelconfig] validateMSP -> DEBU 398 Setting up MSP for org Org2MSP" -"2019-07-20 02:39:39.081 UTC [msp] newBccspMsp -> DEBU 399 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.081 UTC [msp] New -> DEBU 39a Creating Cache-MSP instance" -"2019-07-20 02:39:39.081 UTC [msp] Setup -> DEBU 39b Setting up MSP instance Org2MSP" -"2019-07-20 02:39:39.081 UTC [msp.identity] newIdentity -> DEBU 39c Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.005 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3c5 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:24:53.006 UTC [msp] Validate -> DEBU 3c6 MSP Org1MSP validating identity" +"2019-09-24 00:24:53.013 UTC [msp] getCertificationChain -> DEBU 3c7 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:53.014 UTC [msp] hasOURole -> DEBU 3c8 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:24:53.014 UTC [msp] getCertificationChain -> DEBU 3c9 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:53.014 UTC [common.channelconfig] NewStandardValues -> DEBU 3ca Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:24:53.014 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cb Processing field: AnchorPeers" +"2019-09-24 00:24:53.014 UTC [common.channelconfig] NewStandardValues -> DEBU 3cc Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:53.014 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cd Processing field: MSP" +"2019-09-24 00:24:53.014 UTC [common.channelconfig] Validate -> DEBU 3ce Anchor peers for org Org2MSP are " +"2019-09-24 00:24:53.014 UTC [common.channelconfig] validateMSP -> DEBU 3cf Setting up MSP for org Org2MSP" +"2019-09-24 00:24:53.015 UTC [msp] newBccspMsp -> DEBU 3d0 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:53.015 UTC [msp] New -> DEBU 3d1 Creating Cache-MSP instance" +"2019-09-24 00:24:53.015 UTC [msp] Setup -> DEBU 3d2 Setting up MSP instance Org2MSP" +"2019-09-24 00:24:53.015 UTC [msp.identity] newIdentity -> DEBU 3d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1577,7 +1632,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.082 UTC [msp.identity] newIdentity -> DEBU 39d Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.019 UTC [msp.identity] newIdentity -> DEBU 3d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1591,110 +1646,110 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.082 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 39e Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:39.082 UTC [msp] Validate -> DEBU 39f MSP Org2MSP validating identity" -"2019-07-20 02:39:39.082 UTC [msp] getCertificationChain -> DEBU 3a0 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:39.082 UTC [msp] hasOURole -> DEBU 3a1 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:39.082 UTC [msp] getCertificationChain -> DEBU 3a2 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:39.082 UTC [msp] Setup -> DEBU 3a3 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:39.082 UTC [msp] Setup -> DEBU 3a4 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:39.082 UTC [policies] NewManagerImpl -> DEBU 3a5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a8 Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a9 Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3aa Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ab Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ac Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ad Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ae Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3af Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b0 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b1 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b2 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b3 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b4 Proposed new policy ChannelCreationPolicy for Channel/Application" -"2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b5 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" -"2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b6 Proposed new policy Admins for Channel" -"2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b7 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" -"2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b8 Proposed new policy Readers for Channel" -"2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b9 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" -"2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3ba Proposed new policy Writers for Channel" -"2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bb Adding to config map: [Group] /Channel" -"2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bc Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bd Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3be Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3bf Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c3 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c5 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c6 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c7 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c8 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c9 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3ca Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cb Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cc Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d2 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d3 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d8 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d9 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3da Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3db Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3dc Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3dd Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3de Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3df Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e0 Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e1 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e2 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e3 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e4 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e5 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e6 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e7 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e8 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e9 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ea Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3eb Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ec Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ed Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ee Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ef Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:39.089 UTC [common.configtx] addToMap -> DEBU 3f0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:39.089 UTC [common.configtx] addToMap -> DEBU 3f1 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f2 Processing change to key: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f3 Processing change to key: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f4 Processing change to key: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f5 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f6 Processing change to key: [Group] /Channel/Application" -"2019-07-20 02:39:39.089 UTC [common.configtx] policyForItem -> DEBU 3f7 Getting policy for item Application with mod_policy ChannelCreationPolicy" -"2019-07-20 02:39:39.089 UTC [policies] Manager -> DEBU 3f8 Manager Channel looking up path []" -"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3f9 Manager Channel has managers Orderer" -"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fa Manager Channel has managers Application" -"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fb Manager Channel looking up path [Application]" -"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fc Manager Channel has managers Orderer" -"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fd Manager Channel has managers Application" -"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fe Manager Channel/Application looking up path []" -"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3ff Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 400 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 401 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" -"2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 402 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 403 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-07-20 02:39:39.090 UTC [msp] DeserializeIdentity -> DEBU 404 Obtaining identity" -"2019-07-20 02:39:39.091 UTC [msp.identity] newIdentity -> DEBU 405 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.021 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d5 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:24:53.021 UTC [msp] Validate -> DEBU 3d6 MSP Org2MSP validating identity" +"2019-09-24 00:24:53.021 UTC [msp] getCertificationChain -> DEBU 3d7 MSP Org2MSP getting certification chain" +"2019-09-24 00:24:53.021 UTC [msp] hasOURole -> DEBU 3d8 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:24:53.021 UTC [msp] getCertificationChain -> DEBU 3d9 MSP Org2MSP getting certification chain" +"2019-09-24 00:24:53.022 UTC [msp] Setup -> DEBU 3da Setting up the MSP manager (3 msps)" +"2019-09-24 00:24:53.022 UTC [msp] Setup -> DEBU 3db MSP manager setup complete, setup 3 msps" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3dc Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3dd Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3de Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3df Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e0 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e1 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e2 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e3 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e4 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e5 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e6 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e7 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e8 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3e9 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3ea Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3eb Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-09-24 00:24:53.022 UTC [policies] GetPolicy -> DEBU 3ec Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-09-24 00:24:53.022 UTC [policies] NewManagerImpl -> DEBU 3ed Proposed new policy Admins for Channel" +"2019-09-24 00:24:53.023 UTC [policies] GetPolicy -> DEBU 3ee Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-09-24 00:24:53.023 UTC [policies] NewManagerImpl -> DEBU 3ef Proposed new policy Readers for Channel" +"2019-09-24 00:24:53.023 UTC [policies] GetPolicy -> DEBU 3f0 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-09-24 00:24:53.023 UTC [policies] NewManagerImpl -> DEBU 3f1 Proposed new policy Writers for Channel" +"2019-09-24 00:24:53.023 UTC [common.configtx] addToMap -> DEBU 3f2 Adding to config map: [Group] /Channel" +"2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f3 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f4 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:24:53.030 UTC [common.configtx] addToMap -> DEBU 3f8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3f9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3fa Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3fb Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 3ff Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 400 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 401 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 402 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 403 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 404 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 405 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 406 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 407 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 408 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 409 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:24:53.031 UTC [common.configtx] addToMap -> DEBU 40a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 40b Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 40c Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 40d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 40e Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 40f Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 410 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 411 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 412 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 413 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 414 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 415 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 416 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 417 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 418 Adding to config map: [Group] /Channel" +"2019-09-24 00:24:53.032 UTC [common.configtx] addToMap -> DEBU 419 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41a Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41b Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41c Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41d Adding to config map: [Group] /Channel" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41e Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 41f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 420 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 421 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 422 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 423 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 424 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:24:53.033 UTC [common.configtx] addToMap -> DEBU 425 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:24:53.041 UTC [common.configtx] addToMap -> DEBU 426 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:24:53.041 UTC [common.configtx] addToMap -> DEBU 427 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:24:53.041 UTC [common.configtx] addToMap -> DEBU 428 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:24:53.042 UTC [common.configtx] verifyDeltaSet -> DEBU 429 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:24:53.042 UTC [common.configtx] verifyDeltaSet -> DEBU 42a Processing change to key: [Policy] /Channel/Application/Readers" +"2019-09-24 00:24:53.042 UTC [common.configtx] verifyDeltaSet -> DEBU 42b Processing change to key: [Policy] /Channel/Application/Writers" +"2019-09-24 00:24:53.042 UTC [common.configtx] verifyDeltaSet -> DEBU 42c Processing change to key: [Policy] /Channel/Application/Admins" +"2019-09-24 00:24:53.042 UTC [common.configtx] verifyDeltaSet -> DEBU 42d Processing change to key: [Group] /Channel/Application" +"2019-09-24 00:24:53.042 UTC [common.configtx] policyForItem -> DEBU 42e Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 42f Manager Channel looking up path []" +"2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 430 Manager Channel has managers Application" +"2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 431 Manager Channel has managers Orderer" +"2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 432 Manager Channel looking up path [Application]" +"2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 433 Manager Channel has managers Orderer" +"2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 434 Manager Channel has managers Application" +"2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 435 Manager Channel/Application looking up path []" +"2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 436 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:24:53.042 UTC [policies] Manager -> DEBU 437 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:24:53.042 UTC [policies] Evaluate -> DEBU 438 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-09-24 00:24:53.043 UTC [policies] Evaluate -> DEBU 439 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:24:53.043 UTC [policies] Evaluate -> DEBU 43a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 00:24:53.043 UTC [msp] DeserializeIdentity -> DEBU 43b Obtaining identity" +"2019-09-24 00:24:53.043 UTC [msp.identity] newIdentity -> DEBU 43c Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1708,65 +1763,65 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.091 UTC [cauthdsl] func1 -> DEBU 406 0xc000951ac0 gate 1563590379091253900 evaluation starts" -"2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 407 0xc000951ac0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 408 0xc000951ac0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:39.091 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 409 Checking if identity satisfies ADMIN role for Org1MSP" -"2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 40a 0xc000951ac0 principal matched by identity 0" -"2019-07-20 02:39:39.091 UTC [msp.identity] Verify -> DEBU 40b Verify: digest = 00000000 6f 70 eb 41 19 f6 82 19 30 b7 c5 f4 f6 5f 2f 51 |op.A....0...._/Q| -00000010 73 b7 46 41 df 6f 6f 5e eb 3f dd 53 b6 12 6b b8 |s.FA.oo^.?.S..k.|" -"2019-07-20 02:39:39.091 UTC [msp.identity] Verify -> DEBU 40c Verify: sig = 00000000 30 44 02 20 2f cc 30 9a 07 4c 89 25 66 17 0c a1 |0D. /.0..L.%f...| -00000010 54 af b6 5e 0d 5b d1 81 28 f0 94 1f f3 89 5e 20 |T..^.[..(.....^ | -00000020 03 a3 9f 04 02 20 41 e1 b4 72 42 f3 b8 46 df 81 |..... A..rB..F..| -00000030 1b ef 12 2c f8 be 1f 8b b6 a7 18 1d 99 92 da d2 |...,............| -00000040 b6 52 e0 6c 82 94 |.R.l..|" -"2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 40d 0xc000951ac0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:39.091 UTC [cauthdsl] func1 -> DEBU 40e 0xc000951ac0 gate 1563590379091253900 evaluation succeeds" -"2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 40f Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 410 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 411 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" -"2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 412 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" -"2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 413 Processing change to key: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 414 Processing change to key: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 415 Processing change to key: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 416 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 417 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 418 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 419 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41a Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41b Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41c Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41d Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41e Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41f Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 420 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 421 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 422 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 423 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 424 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 425 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 426 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 427 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 428 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 429 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42a Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42b Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42c Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.093 UTC [msp] GetDefaultSigningIdentity -> DEBU 42d Obtaining default signing identity" -"2019-07-20 02:39:39.093 UTC [msp] GetDefaultSigningIdentity -> DEBU 42e Obtaining default signing identity" -"2019-07-20 02:39:39.093 UTC [msp.identity] Sign -> DEBU 42f Sign: plaintext: 0AD2060A1B08011A0608EBFDC9E90522...4B363125DCAEEC32A278E2CF9DDD8C54 " -"2019-07-20 02:39:39.094 UTC [msp.identity] Sign -> DEBU 430 Sign: digest: 45DB8F0181D8A44B3CF876A75B80ACD077EDCCFB3B1C9D17C0902192520E8F2D " -"2019-07-20 02:39:39.094 UTC [msp] GetDefaultSigningIdentity -> DEBU 431 Obtaining default signing identity" -"2019-07-20 02:39:39.095 UTC [msp] GetDefaultSigningIdentity -> DEBU 432 Obtaining default signing identity" -"2019-07-20 02:39:39.095 UTC [msp.identity] Sign -> DEBU 433 Sign: plaintext: 0ACE060A1708041A0608EBFDC9E90522...2E42A0C1B566423262986FCA1D7C7999 " -"2019-07-20 02:39:39.095 UTC [msp.identity] Sign -> DEBU 434 Sign: digest: 78B703761D325EE5D5CB13182625C158F15FA370E1078A12E65F558F0ACFA74A " -"2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 435 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 436 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 437 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 438 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 439 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:39:39.096 UTC [msp] DeserializeIdentity -> DEBU 43a Obtaining identity" -"2019-07-20 02:39:39.096 UTC [msp.identity] newIdentity -> DEBU 43b Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.043 UTC [cauthdsl] func1 -> DEBU 43d 0xc000a9d060 gate 1569284693043613700 evaluation starts" +"2019-09-24 00:24:53.043 UTC [cauthdsl] func2 -> DEBU 43e 0xc000a9d060 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:24:53.043 UTC [cauthdsl] func2 -> DEBU 43f 0xc000a9d060 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:24:53.051 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 440 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-09-24 00:24:53.051 UTC [cauthdsl] func2 -> DEBU 441 0xc000a9d060 principal matched by identity 0" +"2019-09-24 00:24:53.051 UTC [msp.identity] Verify -> DEBU 442 Verify: digest = 00000000 97 cb e5 e9 ab 5a d5 ab 02 02 b9 b4 2a 82 02 10 |.....Z......*...| +00000010 39 16 9d 54 d3 f4 e9 fa 77 92 06 8f 66 d8 fb 6b |9..T....w...f..k|" +"2019-09-24 00:24:53.051 UTC [msp.identity] Verify -> DEBU 443 Verify: sig = 00000000 30 45 02 21 00 a7 92 8a ab 0b 51 a6 e0 a6 03 70 |0E.!......Q....p| +00000010 b8 37 e8 0c 5b cb b3 f9 e8 ce 98 1a 2f 1e de f0 |.7..[......./...| +00000020 11 73 a7 3d 58 02 20 29 31 6f df d8 62 8a d4 98 |.s.=X. )1o..b...| +00000030 2e c9 7a 7e ae aa 24 e3 16 a6 37 84 d5 65 19 5d |..z~..$...7..e.]| +00000040 78 c9 0d 5d 55 94 c5 |x..]U..|" +"2019-09-24 00:24:53.052 UTC [cauthdsl] func2 -> DEBU 444 0xc000a9d060 principal evaluation succeeds for identity 0" +"2019-09-24 00:24:53.052 UTC [cauthdsl] func1 -> DEBU 445 0xc000a9d060 gate 1569284693043613700 evaluation succeeds" +"2019-09-24 00:24:53.052 UTC [policies] Evaluate -> DEBU 446 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:24:53.052 UTC [policies] Evaluate -> DEBU 447 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:24:53.052 UTC [policies] Evaluate -> DEBU 448 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-09-24 00:24:53.052 UTC [policies] Evaluate -> DEBU 449 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-09-24 00:24:53.052 UTC [common.configtx] verifyDeltaSet -> DEBU 44a Processing change to key: [Value] /Channel/Application/ACLs" +"2019-09-24 00:24:53.052 UTC [common.configtx] verifyDeltaSet -> DEBU 44b Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:24:53.052 UTC [common.configtx] verifyDeltaSet -> DEBU 44c Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 44d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 44e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 44f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 450 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 451 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 452 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 453 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 454 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 455 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 456 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 457 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.053 UTC [common.configtx] recurseConfigMap -> DEBU 458 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 459 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45c Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 45f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 460 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.054 UTC [common.configtx] recurseConfigMap -> DEBU 462 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.055 UTC [common.configtx] recurseConfigMap -> DEBU 463 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.055 UTC [msp] GetDefaultSigningIdentity -> DEBU 464 Obtaining default signing identity" +"2019-09-24 00:24:53.055 UTC [msp] GetDefaultSigningIdentity -> DEBU 465 Obtaining default signing identity" +"2019-09-24 00:24:53.065 UTC [msp.identity] Sign -> DEBU 466 Sign: plaintext: 0AD2060A1B08011A0608D5C4A5EC0522...6A4F9FAD02C1E067FBD1249A945DE0C7 " +"2019-09-24 00:24:53.065 UTC [msp.identity] Sign -> DEBU 467 Sign: digest: 09EB7DC8C9B00BF609E3AF6BCD1D7330DA10151D990739A769F469FFDF4CC6C8 " +"2019-09-24 00:24:53.065 UTC [msp] GetDefaultSigningIdentity -> DEBU 468 Obtaining default signing identity" +"2019-09-24 00:24:53.065 UTC [msp] GetDefaultSigningIdentity -> DEBU 469 Obtaining default signing identity" +"2019-09-24 00:24:53.065 UTC [msp.identity] Sign -> DEBU 46a Sign: plaintext: 0ACE060A1708041A0608D5C4A5EC0522...593899E457549282F1269E1AE60707D7 " +"2019-09-24 00:24:53.065 UTC [msp.identity] Sign -> DEBU 46b Sign: digest: 1CC98E8A5C9C4A407A5C9CFF834B8F994EB8F99D90D58AE7B8C56079F910960C " +"2019-09-24 00:24:53.069 UTC [policies] Evaluate -> DEBU 46c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 00:24:53.069 UTC [policies] Evaluate -> DEBU 46d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:24:53.069 UTC [policies] Evaluate -> DEBU 46e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 00:24:53.069 UTC [policies] Evaluate -> DEBU 46f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:24:53.069 UTC [policies] Evaluate -> DEBU 470 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:24:53.069 UTC [msp] DeserializeIdentity -> DEBU 471 Obtaining identity" +"2019-09-24 00:24:53.069 UTC [msp.identity] newIdentity -> DEBU 472 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -1780,89 +1835,46 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.097 UTC [cauthdsl] func1 -> DEBU 43c 0xc000a9b050 gate 1563590379097124100 evaluation starts" -"2019-07-20 02:39:39.097 UTC [cauthdsl] func2 -> DEBU 43d 0xc000a9b050 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:39.097 UTC [cauthdsl] func2 -> DEBU 43e 0xc000a9b050 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:39.097 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 43f Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-07-20 02:39:39.097 UTC [msp] Validate -> DEBU 440 MSP OrdererMSP validating identity" -"2019-07-20 02:39:39.098 UTC [cauthdsl] func2 -> DEBU 441 0xc000a9b050 principal matched by identity 0" -"2019-07-20 02:39:39.098 UTC [msp.identity] Verify -> DEBU 442 Verify: digest = 00000000 78 b7 03 76 1d 32 5e e5 d5 cb 13 18 26 25 c1 58 |x..v.2^.....&%.X| -00000010 f1 5f a3 70 e1 07 8a 12 e6 5f 55 8f 0a cf a7 4a |._.p....._U....J|" -"2019-07-20 02:39:39.098 UTC [msp.identity] Verify -> DEBU 443 Verify: sig = 00000000 30 45 02 21 00 a0 d9 0a de d9 d8 ac 1e 74 55 78 |0E.!.........tUx| -00000010 57 2d 4b 72 58 67 8a 2b 9a ba 7a 41 10 2d 03 61 |W-KrXg.+..zA.-.a| -00000020 bd 19 e8 88 13 02 20 16 bc 09 48 78 d8 29 d9 f6 |...... ...Hx.)..| -00000030 3a 13 e0 de 8d ca b4 f5 88 1e c0 1b cc 4e 2d 95 |:............N-.| -00000040 c1 de 25 91 b2 1f b3 |..%....|" -"2019-07-20 02:39:39.098 UTC [cauthdsl] func2 -> DEBU 444 0xc000a9b050 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:39.098 UTC [cauthdsl] func1 -> DEBU 445 0xc000a9b050 gate 1563590379097124100 evaluation succeeds" -"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 446 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 447 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 448 Signature set satisfies policy /Channel/Orderer/Writers" -"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 449 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 44a Signature set satisfies policy /Channel/Writers" -"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 44b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] NewStandardValues -> DEBU 44c Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44d Processing field: HashingAlgorithm" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44e Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44f Processing field: OrdererAddresses" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 450 Processing field: Consortium" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 451 Processing field: Capabilities" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] NewStandardValues -> DEBU 452 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 453 Processing field: ConsensusType" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 454 Processing field: BatchSize" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 455 Processing field: BatchTimeout" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 456 Processing field: KafkaBrokers" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 457 Processing field: ChannelRestrictions" -"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 458 Processing field: Capabilities" -"2019-07-20 02:39:39.100 UTC [common.channelconfig] NewStandardValues -> DEBU 459 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:39.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 45a Processing field: Endpoints" -"2019-07-20 02:39:39.100 UTC [common.channelconfig] NewStandardValues -> DEBU 45b Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 45c Processing field: MSP" -"2019-07-20 02:39:39.100 UTC [common.channelconfig] validateMSP -> DEBU 45d Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:39.100 UTC [msp] newBccspMsp -> DEBU 45e Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.100 UTC [msp] New -> DEBU 45f Creating Cache-MSP instance" -"2019-07-20 02:39:39.100 UTC [msp] Setup -> DEBU 460 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:39.101 UTC [msp.identity] newIdentity -> DEBU 461 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:39:39.102 UTC [msp.identity] newIdentity -> DEBU 462 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:39:39.103 UTC [msp] Validate -> DEBU 463 MSP OrdererMSP validating identity" -"2019-07-20 02:39:39.106 UTC [common.channelconfig] NewStandardValues -> DEBU 464 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 465 Processing field: ACLs" -"2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 466 Processing field: Capabilities" -"2019-07-20 02:39:39.107 UTC [common.channelconfig] NewStandardValues -> DEBU 467 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 468 Processing field: AnchorPeers" -"2019-07-20 02:39:39.107 UTC [common.channelconfig] NewStandardValues -> DEBU 469 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 46a Processing field: MSP" -"2019-07-20 02:39:39.107 UTC [common.channelconfig] Validate -> DEBU 46b Anchor peers for org Org1MSP are " -"2019-07-20 02:39:39.107 UTC [common.channelconfig] validateMSP -> DEBU 46c Setting up MSP for org Org1MSP" -"2019-07-20 02:39:39.107 UTC [msp] newBccspMsp -> DEBU 46d Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.107 UTC [msp] New -> DEBU 46e Creating Cache-MSP instance" -"2019-07-20 02:39:39.107 UTC [msp] Setup -> DEBU 46f Setting up MSP instance Org1MSP" -"2019-07-20 02:39:39.107 UTC [msp.identity] newIdentity -> DEBU 470 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.070 UTC [cauthdsl] func1 -> DEBU 473 0xc000b085f0 gate 1569284693070047800 evaluation starts" +"2019-09-24 00:24:53.070 UTC [cauthdsl] func2 -> DEBU 474 0xc000b085f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:24:53.070 UTC [cauthdsl] func2 -> DEBU 475 0xc000b085f0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:24:53.070 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 476 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 00:24:53.070 UTC [msp] Validate -> DEBU 477 MSP OrdererMSP validating identity" +"2019-09-24 00:24:53.070 UTC [cauthdsl] func2 -> DEBU 478 0xc000b085f0 principal matched by identity 0" +"2019-09-24 00:24:53.070 UTC [msp.identity] Verify -> DEBU 479 Verify: digest = 00000000 1c c9 8e 8a 5c 9c 4a 40 7a 5c 9c ff 83 4b 8f 99 |....\.J@z\...K..| +00000010 4e b8 f9 9d 90 d5 8a e7 b8 c5 60 79 f9 10 96 0c |N.........`y....|" +"2019-09-24 00:24:53.070 UTC [msp.identity] Verify -> DEBU 47a Verify: sig = 00000000 30 45 02 21 00 8a 8f 08 54 ae fa 21 bb 0e 3a ab |0E.!....T..!..:.| +00000010 2d c0 92 75 92 e8 b4 10 14 da 39 f5 0c 8f 82 93 |-..u......9.....| +00000020 2d b3 07 52 80 02 20 6d 92 b2 ec f2 26 c2 d5 92 |-..R.. m....&...| +00000030 b6 81 16 3c 50 0e 17 79 28 08 fe fb 31 93 ac cc |... DEBU 47b 0xc000b085f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:24:53.070 UTC [cauthdsl] func1 -> DEBU 47c 0xc000b085f0 gate 1569284693070047800 evaluation succeeds" +"2019-09-24 00:24:53.070 UTC [policies] Evaluate -> DEBU 47d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:24:53.071 UTC [policies] Evaluate -> DEBU 47e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:24:53.071 UTC [policies] Evaluate -> DEBU 47f Signature set satisfies policy /Channel/Orderer/Writers" +"2019-09-24 00:24:53.071 UTC [policies] Evaluate -> DEBU 480 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 00:24:53.071 UTC [policies] Evaluate -> DEBU 481 Signature set satisfies policy /Channel/Writers" +"2019-09-24 00:24:53.071 UTC [policies] Evaluate -> DEBU 482 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] NewStandardValues -> DEBU 483 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 484 Processing field: HashingAlgorithm" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 485 Processing field: BlockDataHashingStructure" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 486 Processing field: OrdererAddresses" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 487 Processing field: Consortium" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 488 Processing field: Capabilities" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] NewStandardValues -> DEBU 489 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48a Processing field: ACLs" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48b Processing field: Capabilities" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] NewStandardValues -> DEBU 48c Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48d Processing field: AnchorPeers" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] NewStandardValues -> DEBU 48e Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:53.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48f Processing field: MSP" +"2019-09-24 00:24:53.072 UTC [common.channelconfig] Validate -> DEBU 490 Anchor peers for org Org1MSP are " +"2019-09-24 00:24:53.072 UTC [common.channelconfig] validateMSP -> DEBU 491 Setting up MSP for org Org1MSP" +"2019-09-24 00:24:53.072 UTC [msp] newBccspMsp -> DEBU 492 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:53.072 UTC [msp] New -> DEBU 493 Creating Cache-MSP instance" +"2019-09-24 00:24:53.072 UTC [msp] Setup -> DEBU 494 Setting up MSP instance Org1MSP" +"2019-09-24 00:24:53.072 UTC [msp.identity] newIdentity -> DEBU 495 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1877,7 +1889,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:39:39.108 UTC [msp.identity] newIdentity -> DEBU 471 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.072 UTC [msp.identity] newIdentity -> DEBU 496 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1891,21 +1903,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.108 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 472 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:39.108 UTC [msp] Validate -> DEBU 473 MSP Org1MSP validating identity" -"2019-07-20 02:39:39.108 UTC [msp] getCertificationChain -> DEBU 474 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:39.108 UTC [msp] hasOURole -> DEBU 475 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:39.109 UTC [msp] getCertificationChain -> DEBU 476 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:39.109 UTC [common.channelconfig] NewStandardValues -> DEBU 477 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:39.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 478 Processing field: AnchorPeers" -"2019-07-20 02:39:39.109 UTC [common.channelconfig] NewStandardValues -> DEBU 479 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 47a Processing field: MSP" -"2019-07-20 02:39:39.109 UTC [common.channelconfig] Validate -> DEBU 47b Anchor peers for org Org2MSP are " -"2019-07-20 02:39:39.109 UTC [common.channelconfig] validateMSP -> DEBU 47c Setting up MSP for org Org2MSP" -"2019-07-20 02:39:39.109 UTC [msp] newBccspMsp -> DEBU 47d Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.109 UTC [msp] New -> DEBU 47e Creating Cache-MSP instance" -"2019-07-20 02:39:39.109 UTC [msp] Setup -> DEBU 47f Setting up MSP instance Org2MSP" -"2019-07-20 02:39:39.109 UTC [msp.identity] newIdentity -> DEBU 480 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.073 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 497 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:24:53.073 UTC [msp] Validate -> DEBU 498 MSP Org1MSP validating identity" +"2019-09-24 00:24:53.073 UTC [msp] getCertificationChain -> DEBU 499 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:53.073 UTC [msp] hasOURole -> DEBU 49a MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:24:53.073 UTC [msp] getCertificationChain -> DEBU 49b MSP Org1MSP getting certification chain" +"2019-09-24 00:24:53.073 UTC [common.channelconfig] NewStandardValues -> DEBU 49c Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:24:53.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49d Processing field: AnchorPeers" +"2019-09-24 00:24:53.073 UTC [common.channelconfig] NewStandardValues -> DEBU 49e Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:53.074 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49f Processing field: MSP" +"2019-09-24 00:24:53.074 UTC [common.channelconfig] Validate -> DEBU 4a0 Anchor peers for org Org2MSP are " +"2019-09-24 00:24:53.074 UTC [common.channelconfig] validateMSP -> DEBU 4a1 Setting up MSP for org Org2MSP" +"2019-09-24 00:24:53.074 UTC [msp] newBccspMsp -> DEBU 4a2 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:53.074 UTC [msp] New -> DEBU 4a3 Creating Cache-MSP instance" +"2019-09-24 00:24:53.074 UTC [msp] Setup -> DEBU 4a4 Setting up MSP instance Org2MSP" +"2019-09-24 00:24:53.078 UTC [msp.identity] newIdentity -> DEBU 4a5 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1920,7 +1932,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.109 UTC [msp.identity] newIdentity -> DEBU 481 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.078 UTC [msp.identity] newIdentity -> DEBU 4a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1934,198 +1946,27 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.110 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 482 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:39.110 UTC [msp] Validate -> DEBU 483 MSP Org2MSP validating identity" -"2019-07-20 02:39:39.110 UTC [msp] getCertificationChain -> DEBU 484 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:39.110 UTC [msp] hasOURole -> DEBU 485 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:39.110 UTC [msp] getCertificationChain -> DEBU 486 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:39.110 UTC [msp] Setup -> DEBU 487 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:39.110 UTC [msp] Setup -> DEBU 488 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 489 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48a Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48b Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48c Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48d Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48e Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48f Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 490 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 491 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 492 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 493 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 494 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 495 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 496 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 497 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 498 Proposed new policy ChannelCreationPolicy for Channel/Application" -"2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 499 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49a Proposed new policy Readers for Channel" -"2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 49b Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49c Proposed new policy Writers for Channel" -"2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 49d Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" -"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49e Proposed new policy Admins for Channel" -"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 49f Adding to config map: [Group] /Channel" -"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a0 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a1 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a2 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a7 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4a8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4a9 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4aa Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ab Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ac Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ad Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b6 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4ba Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bc Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bd Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4be Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bf Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c0 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c1 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c2 Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c3 Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c4 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c5 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c6 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c7 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c8 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c9 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4ca Adding to config map: [Group] /Channel" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4cb Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4cc Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4cd Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4ce Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4cf Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d0 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d2 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d3 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d4 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d5 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d6 Processing change to key: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d7 Processing change to key: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d8 Processing change to key: [Group] /Channel/Application" -"2019-07-20 02:39:39.114 UTC [common.configtx] policyForItem -> DEBU 4d9 Getting policy for item Application with mod_policy ChannelCreationPolicy" -"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4da Manager Channel looking up path []" -"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4db Manager Channel has managers Orderer" -"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4dc Manager Channel has managers Application" -"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4dd Manager Channel looking up path [Application]" -"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4de Manager Channel has managers Orderer" -"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4df Manager Channel has managers Application" -"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e0 Manager Channel/Application looking up path []" -"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e1 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e2 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" -"2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-07-20 02:39:39.114 UTC [msp] DeserializeIdentity -> DEBU 4e6 Obtaining identity" -"2019-07-20 02:39:39.114 UTC [msp.identity] newIdentity -> DEBU 4e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:39:39.114 UTC [cauthdsl] func1 -> DEBU 4e8 0xc000bb8980 gate 1563590379114969000 evaluation starts" -"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4e9 0xc000bb8980 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4ea 0xc000bb8980 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4eb 0xc000bb8980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4ec 0xc000bb8980 principal evaluation fails" -"2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4ed 0xc000bb8980 gate 1563590379114969000 evaluation fails" -"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4ee Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4f1 0xc000bb9b00 gate 1563590379115234200 evaluation starts" -"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f2 0xc000bb9b00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f3 0xc000bb9b00 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:39.115 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f4 Checking if identity satisfies ADMIN role for Org1MSP" -"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f5 0xc000bb9b00 principal matched by identity 0" -"2019-07-20 02:39:39.115 UTC [msp.identity] Verify -> DEBU 4f6 Verify: digest = 00000000 6f 70 eb 41 19 f6 82 19 30 b7 c5 f4 f6 5f 2f 51 |op.A....0...._/Q| -00000010 73 b7 46 41 df 6f 6f 5e eb 3f dd 53 b6 12 6b b8 |s.FA.oo^.?.S..k.|" -"2019-07-20 02:39:39.115 UTC [msp.identity] Verify -> DEBU 4f7 Verify: sig = 00000000 30 44 02 20 2f cc 30 9a 07 4c 89 25 66 17 0c a1 |0D. /.0..L.%f...| -00000010 54 af b6 5e 0d 5b d1 81 28 f0 94 1f f3 89 5e 20 |T..^.[..(.....^ | -00000020 03 a3 9f 04 02 20 41 e1 b4 72 42 f3 b8 46 df 81 |..... A..rB..F..| -00000030 1b ef 12 2c f8 be 1f 8b b6 a7 18 1d 99 92 da d2 |...,............| -00000040 b6 52 e0 6c 82 94 |.R.l..|" -"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f8 0xc000bb9b00 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4f9 0xc000bb9b00 gate 1563590379115234200 evaluation succeeds" -"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fa Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fc Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" -"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" -"2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 4fe Processing change to key: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 4ff Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 500 Processing change to key: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 501 Processing change to key: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 502 Processing change to key: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:39.115 UTC [common.configtx] recurseConfigMap -> DEBU 503 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 504 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 505 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 506 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 507 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 508 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 509 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50a Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50c Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50d Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 50e Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 50f Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 510 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 511 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 512 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 513 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 514 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 515 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 516 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 517 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 518 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 519 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:39.117 UTC [common.channelconfig] NewStandardValues -> DEBU 51a Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51b Processing field: HashingAlgorithm" -"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51c Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51d Processing field: OrdererAddresses" -"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51e Processing field: Consortium" -"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51f Processing field: Capabilities" -"2019-07-20 02:39:39.117 UTC [common.channelconfig] NewStandardValues -> DEBU 520 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 521 Processing field: ConsensusType" -"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 522 Processing field: BatchSize" -"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 523 Processing field: BatchTimeout" -"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 524 Processing field: KafkaBrokers" -"2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 525 Processing field: ChannelRestrictions" -"2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 526 Processing field: Capabilities" -"2019-07-20 02:39:39.118 UTC [common.channelconfig] NewStandardValues -> DEBU 527 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 528 Processing field: Endpoints" -"2019-07-20 02:39:39.118 UTC [common.channelconfig] NewStandardValues -> DEBU 529 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 52a Processing field: MSP" -"2019-07-20 02:39:39.118 UTC [common.channelconfig] validateMSP -> DEBU 52b Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:39.118 UTC [msp] newBccspMsp -> DEBU 52c Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.118 UTC [msp] New -> DEBU 52d Creating Cache-MSP instance" -"2019-07-20 02:39:39.118 UTC [msp] Setup -> DEBU 52e Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:39.118 UTC [msp.identity] newIdentity -> DEBU 52f Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.078 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4a7 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:24:53.078 UTC [msp] Validate -> DEBU 4a8 MSP Org2MSP validating identity" +"2019-09-24 00:24:53.079 UTC [msp] getCertificationChain -> DEBU 4a9 MSP Org2MSP getting certification chain" +"2019-09-24 00:24:53.079 UTC [msp] hasOURole -> DEBU 4aa MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:24:53.079 UTC [msp] getCertificationChain -> DEBU 4ab MSP Org2MSP getting certification chain" +"2019-09-24 00:24:53.079 UTC [common.channelconfig] NewStandardValues -> DEBU 4ac Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ad Processing field: ConsensusType" +"2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ae Processing field: BatchSize" +"2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4af Processing field: BatchTimeout" +"2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b0 Processing field: KafkaBrokers" +"2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b1 Processing field: ChannelRestrictions" +"2019-09-24 00:24:53.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b2 Processing field: Capabilities" +"2019-09-24 00:24:53.079 UTC [common.channelconfig] NewStandardValues -> DEBU 4b3 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:24:53.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b4 Processing field: Endpoints" +"2019-09-24 00:24:53.080 UTC [common.channelconfig] NewStandardValues -> DEBU 4b5 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:53.080 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b6 Processing field: MSP" +"2019-09-24 00:24:53.080 UTC [common.channelconfig] validateMSP -> DEBU 4b7 Setting up MSP for org OrdererOrg" +"2019-09-24 00:24:53.080 UTC [msp] newBccspMsp -> DEBU 4b8 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:53.080 UTC [msp] New -> DEBU 4b9 Creating Cache-MSP instance" +"2019-09-24 00:24:53.080 UTC [msp] Setup -> DEBU 4ba Setting up MSP instance OrdererMSP" +"2019-09-24 00:24:53.081 UTC [msp.identity] newIdentity -> DEBU 4bb Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -2139,7 +1980,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-07-20 02:39:39.118 UTC [msp.identity] newIdentity -> DEBU 530 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.081 UTC [msp.identity] newIdentity -> DEBU 4bc Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -2152,63 +1993,225 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.119 UTC [msp] Validate -> DEBU 531 MSP OrdererMSP validating identity" -"2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 532 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 533 Processing field: ACLs" -"2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 534 Processing field: Capabilities" -"2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 535 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 536 Processing field: AnchorPeers" -"2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 537 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 538 Processing field: MSP" -"2019-07-20 02:39:39.119 UTC [common.channelconfig] Validate -> DEBU 539 Anchor peers for org Org2MSP are " -"2019-07-20 02:39:39.119 UTC [common.channelconfig] validateMSP -> DEBU 53a Setting up MSP for org Org2MSP" -"2019-07-20 02:39:39.119 UTC [msp] newBccspMsp -> DEBU 53b Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.119 UTC [msp] New -> DEBU 53c Creating Cache-MSP instance" -"2019-07-20 02:39:39.119 UTC [msp] Setup -> DEBU 53d Setting up MSP instance Org2MSP" -"2019-07-20 02:39:39.120 UTC [msp.identity] newIdentity -> DEBU 53e Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +"2019-09-24 00:24:53.081 UTC [msp] Validate -> DEBU 4bd MSP OrdererMSP validating identity" +"2019-09-24 00:24:53.082 UTC [msp] Setup -> DEBU 4be Setting up the MSP manager (3 msps)" +"2019-09-24 00:24:53.082 UTC [msp] Setup -> DEBU 4bf MSP manager setup complete, setup 3 msps" +"2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c0 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c1 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c3 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c4 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c5 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c6 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:24:53.082 UTC [policies] NewManagerImpl -> DEBU 4c7 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4c8 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4c9 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4ca Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4cb Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4cc Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4cd Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4ce Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4cf Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-09-24 00:24:53.083 UTC [policies] GetPolicy -> DEBU 4d0 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4d1 Proposed new policy Admins for Channel" +"2019-09-24 00:24:53.083 UTC [policies] GetPolicy -> DEBU 4d2 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4d3 Proposed new policy Readers for Channel" +"2019-09-24 00:24:53.083 UTC [policies] GetPolicy -> DEBU 4d4 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-09-24 00:24:53.083 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy Writers for Channel" +"2019-09-24 00:24:53.083 UTC [common.configtx] addToMap -> DEBU 4d6 Adding to config map: [Group] /Channel" +"2019-09-24 00:24:53.083 UTC [common.configtx] addToMap -> DEBU 4d7 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4d8 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4d9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4da Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4db Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4dc Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4dd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4de Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4df Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4e0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:24:53.084 UTC [common.configtx] addToMap -> DEBU 4e1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e4 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e5 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e6 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e7 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4e9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4ea Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:24:53.085 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:24:53.086 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:24:53.086 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:24:53.086 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:24:53.087 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:24:53.088 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Group] /Channel" +"2019-09-24 00:24:53.089 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:24:53.089 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:24:53.089 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:24:53.089 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Group] /Channel" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 50b Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:24:53.090 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:24:53.090 UTC [common.configtx] verifyDeltaSet -> DEBU 50d Processing change to key: [Group] /Channel/Application" +"2019-09-24 00:24:53.090 UTC [common.configtx] policyForItem -> DEBU 50e Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-09-24 00:24:53.090 UTC [policies] Manager -> DEBU 50f Manager Channel looking up path []" +"2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 510 Manager Channel has managers Application" +"2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 511 Manager Channel has managers Orderer" +"2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 512 Manager Channel looking up path [Application]" +"2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 513 Manager Channel has managers Orderer" +"2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 514 Manager Channel has managers Application" +"2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 515 Manager Channel/Application looking up path []" +"2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 516 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:24:53.091 UTC [policies] Manager -> DEBU 517 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:24:53.091 UTC [policies] Evaluate -> DEBU 518 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-09-24 00:24:53.091 UTC [policies] Evaluate -> DEBU 519 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:24:53.091 UTC [policies] Evaluate -> DEBU 51a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 00:24:53.091 UTC [msp] DeserializeIdentity -> DEBU 51b Obtaining identity" +"2019-09-24 00:24:53.092 UTC [msp.identity] newIdentity -> DEBU 51c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-07-20 02:39:39.120 UTC [msp.identity] newIdentity -> DEBU 53f Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.120 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 540 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:39.120 UTC [msp] Validate -> DEBU 541 MSP Org2MSP validating identity" -"2019-07-20 02:39:39.120 UTC [msp] getCertificationChain -> DEBU 542 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:39.120 UTC [msp] hasOURole -> DEBU 543 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:39.120 UTC [msp] getCertificationChain -> DEBU 544 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:39.121 UTC [common.channelconfig] NewStandardValues -> DEBU 545 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:39.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 546 Processing field: AnchorPeers" -"2019-07-20 02:39:39.121 UTC [common.channelconfig] NewStandardValues -> DEBU 547 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 548 Processing field: MSP" -"2019-07-20 02:39:39.121 UTC [common.channelconfig] Validate -> DEBU 549 Anchor peers for org Org1MSP are " -"2019-07-20 02:39:39.121 UTC [common.channelconfig] validateMSP -> DEBU 54a Setting up MSP for org Org1MSP" -"2019-07-20 02:39:39.121 UTC [msp] newBccspMsp -> DEBU 54b Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.121 UTC [msp] New -> DEBU 54c Creating Cache-MSP instance" -"2019-07-20 02:39:39.121 UTC [msp] Setup -> DEBU 54d Setting up MSP instance Org1MSP" -"2019-07-20 02:39:39.121 UTC [msp.identity] newIdentity -> DEBU 54e Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.092 UTC [cauthdsl] func1 -> DEBU 51d 0xc000befd00 gate 1569284693092963200 evaluation starts" +"2019-09-24 00:24:53.093 UTC [cauthdsl] func2 -> DEBU 51e 0xc000befd00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:24:53.093 UTC [cauthdsl] func2 -> DEBU 51f 0xc000befd00 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:24:53.093 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 520 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-09-24 00:24:53.093 UTC [cauthdsl] func2 -> DEBU 521 0xc000befd00 principal matched by identity 0" +"2019-09-24 00:24:53.093 UTC [msp.identity] Verify -> DEBU 522 Verify: digest = 00000000 97 cb e5 e9 ab 5a d5 ab 02 02 b9 b4 2a 82 02 10 |.....Z......*...| +00000010 39 16 9d 54 d3 f4 e9 fa 77 92 06 8f 66 d8 fb 6b |9..T....w...f..k|" +"2019-09-24 00:24:53.093 UTC [msp.identity] Verify -> DEBU 523 Verify: sig = 00000000 30 45 02 21 00 a7 92 8a ab 0b 51 a6 e0 a6 03 70 |0E.!......Q....p| +00000010 b8 37 e8 0c 5b cb b3 f9 e8 ce 98 1a 2f 1e de f0 |.7..[......./...| +00000020 11 73 a7 3d 58 02 20 29 31 6f df d8 62 8a d4 98 |.s.=X. )1o..b...| +00000030 2e c9 7a 7e ae aa 24 e3 16 a6 37 84 d5 65 19 5d |..z~..$...7..e.]| +00000040 78 c9 0d 5d 55 94 c5 |x..]U..|" +"2019-09-24 00:24:53.093 UTC [cauthdsl] func2 -> DEBU 524 0xc000befd00 principal evaluation succeeds for identity 0" +"2019-09-24 00:24:53.093 UTC [cauthdsl] func1 -> DEBU 525 0xc000befd00 gate 1569284693092963200 evaluation succeeds" +"2019-09-24 00:24:53.093 UTC [policies] Evaluate -> DEBU 526 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:24:53.093 UTC [policies] Evaluate -> DEBU 527 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:24:53.093 UTC [policies] Evaluate -> DEBU 528 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-09-24 00:24:53.093 UTC [policies] Evaluate -> DEBU 529 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-09-24 00:24:53.093 UTC [common.configtx] verifyDeltaSet -> DEBU 52a Processing change to key: [Value] /Channel/Application/ACLs" +"2019-09-24 00:24:53.093 UTC [common.configtx] verifyDeltaSet -> DEBU 52b Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:24:53.094 UTC [common.configtx] verifyDeltaSet -> DEBU 52c Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:24:53.094 UTC [common.configtx] verifyDeltaSet -> DEBU 52d Processing change to key: [Policy] /Channel/Application/Readers" +"2019-09-24 00:24:53.094 UTC [common.configtx] verifyDeltaSet -> DEBU 52e Processing change to key: [Policy] /Channel/Application/Writers" +"2019-09-24 00:24:53.094 UTC [common.configtx] verifyDeltaSet -> DEBU 52f Processing change to key: [Policy] /Channel/Application/Admins" +"2019-09-24 00:24:53.094 UTC [common.configtx] verifyDeltaSet -> DEBU 530 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:24:53.094 UTC [common.configtx] recurseConfigMap -> DEBU 531 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.094 UTC [common.configtx] recurseConfigMap -> DEBU 532 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 533 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 534 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 535 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 536 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 537 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 538 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 539 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.095 UTC [common.configtx] recurseConfigMap -> DEBU 53a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.105 UTC [common.configtx] recurseConfigMap -> DEBU 53b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.106 UTC [common.configtx] recurseConfigMap -> DEBU 53c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.106 UTC [common.configtx] recurseConfigMap -> DEBU 53d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.106 UTC [common.configtx] recurseConfigMap -> DEBU 53e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 53f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 540 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 541 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 542 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 543 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 544 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.107 UTC [common.configtx] recurseConfigMap -> DEBU 545 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.108 UTC [common.configtx] recurseConfigMap -> DEBU 546 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.108 UTC [common.configtx] recurseConfigMap -> DEBU 547 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:24:53.112 UTC [common.channelconfig] NewStandardValues -> DEBU 548 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:24:53.112 UTC [common.channelconfig] initializeProtosStruct -> DEBU 549 Processing field: HashingAlgorithm" +"2019-09-24 00:24:53.112 UTC [common.channelconfig] initializeProtosStruct -> DEBU 54a Processing field: BlockDataHashingStructure" +"2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 54b Processing field: OrdererAddresses" +"2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 54c Processing field: Consortium" +"2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 54d Processing field: Capabilities" +"2019-09-24 00:24:53.113 UTC [common.channelconfig] NewStandardValues -> DEBU 54e Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 54f Processing field: ConsensusType" +"2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 550 Processing field: BatchSize" +"2019-09-24 00:24:53.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 551 Processing field: BatchTimeout" +"2019-09-24 00:24:53.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 552 Processing field: KafkaBrokers" +"2019-09-24 00:24:53.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 553 Processing field: ChannelRestrictions" +"2019-09-24 00:24:53.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 554 Processing field: Capabilities" +"2019-09-24 00:24:53.114 UTC [common.channelconfig] NewStandardValues -> DEBU 555 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:24:53.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 556 Processing field: Endpoints" +"2019-09-24 00:24:53.114 UTC [common.channelconfig] NewStandardValues -> DEBU 557 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:53.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 558 Processing field: MSP" +"2019-09-24 00:24:53.115 UTC [common.channelconfig] validateMSP -> DEBU 559 Setting up MSP for org OrdererOrg" +"2019-09-24 00:24:53.115 UTC [msp] newBccspMsp -> DEBU 55a Creating BCCSP-based MSP instance" +"2019-09-24 00:24:53.115 UTC [msp] New -> DEBU 55b Creating Cache-MSP instance" +"2019-09-24 00:24:53.115 UTC [msp] Setup -> DEBU 55c Setting up MSP instance OrdererMSP" +"2019-09-24 00:24:53.121 UTC [msp.identity] newIdentity -> DEBU 55d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-09-24 00:24:53.122 UTC [msp.identity] newIdentity -> DEBU 55e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:24:53.122 UTC [msp] Validate -> DEBU 55f MSP OrdererMSP validating identity" +"2019-09-24 00:24:53.123 UTC [common.channelconfig] NewStandardValues -> DEBU 560 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:24:53.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 561 Processing field: ACLs" +"2019-09-24 00:24:53.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 562 Processing field: Capabilities" +"2019-09-24 00:24:53.123 UTC [common.channelconfig] NewStandardValues -> DEBU 563 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:24:53.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 564 Processing field: AnchorPeers" +"2019-09-24 00:24:53.123 UTC [common.channelconfig] NewStandardValues -> DEBU 565 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:53.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 566 Processing field: MSP" +"2019-09-24 00:24:53.123 UTC [common.channelconfig] Validate -> DEBU 567 Anchor peers for org Org1MSP are " +"2019-09-24 00:24:53.123 UTC [common.channelconfig] validateMSP -> DEBU 568 Setting up MSP for org Org1MSP" +"2019-09-24 00:24:53.123 UTC [msp] newBccspMsp -> DEBU 569 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:53.123 UTC [msp] New -> DEBU 56a Creating Cache-MSP instance" +"2019-09-24 00:24:53.124 UTC [msp] Setup -> DEBU 56b Setting up MSP instance Org1MSP" +"2019-09-24 00:24:53.124 UTC [msp.identity] newIdentity -> DEBU 56c Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2223,7 +2226,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:39:39.121 UTC [msp.identity] newIdentity -> DEBU 54f Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.124 UTC [msp.identity] newIdentity -> DEBU 56d Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2237,161 +2240,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.122 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 550 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:39.122 UTC [msp] Validate -> DEBU 551 MSP Org1MSP validating identity" -"2019-07-20 02:39:39.122 UTC [msp] getCertificationChain -> DEBU 552 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:39.122 UTC [msp] hasOURole -> DEBU 553 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:39.122 UTC [msp] getCertificationChain -> DEBU 554 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:39.122 UTC [msp] Setup -> DEBU 555 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:39.122 UTC [msp] Setup -> DEBU 556 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 557 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 558 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 559 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55a Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55b Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55c Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55d Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55e Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55f Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 560 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 561 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 562 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 563 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 564 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 565 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 566 Proposed new policy Readers for Channel/Application" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 567 Proposed new policy Writers for Channel/Application" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 568 Proposed new policy Admins for Channel/Application" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 569 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56a Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56b Proposed new policy Admins for Channel" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56c Proposed new policy Readers for Channel" -"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56d Proposed new policy Writers for Channel" -"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 56e Adding to config map: [Group] /Channel" -"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 56f Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 570 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 571 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 572 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 573 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 574 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 575 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 576 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 577 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 578 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 579 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57a Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57b Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57c Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57d Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57e Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57f Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 580 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 581 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 582 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 583 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 584 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 585 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 586 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 587 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 588 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 589 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58a Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58b Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58c Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58e Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58f Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 590 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 591 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 592 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 593 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 594 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 595 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 596 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 597 Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 598 Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 599 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:39.125 UTC [common.capabilities] Supported -> DEBU 59a Orderer capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:39.125 UTC [common.capabilities] Supported -> DEBU 59b Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:39.126 UTC [orderer.common.cluster] NewStream -> DEBU 59c Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" -"2019-07-20 02:39:39.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 59d Send of SubmitRequest for channel testchainid with payload of size 24752 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " -"2019-07-20 02:39:39.128 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 59e Sending msg of 24752 bytes to 3 on channel testchainid took 439.3µs" -"2019-07-20 02:39:39.128 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 59f [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39030" -"2019-07-20 02:39:39.132 UTC [common.deliver] deliverBlocks -> DEBU 5a0 Rejecting deliver for 172.18.0.9:39028 because channel businesschannel not found" -"2019-07-20 02:39:39.132 UTC [orderer.common.broadcast] Handle -> DEBU 5a1 Received EOF from 172.18.0.9:39030, hangup" -"2019-07-20 02:39:39.132 UTC [orderer.common.server] func1 -> DEBU 5a2 Closing Deliver stream" -"2019-07-20 02:39:39.132 UTC [comm.grpc.server] 1 -> INFO 5a3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39028 grpc.code=OK grpc.call_duration=87.743ms -"2019-07-20 02:39:39.132 UTC [orderer.common.server] func1 -> DEBU 5a4 Closing Broadcast stream" -"2019-07-20 02:39:39.132 UTC [comm.grpc.server] 1 -> INFO 5a5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39030 grpc.code=OK grpc.call_duration=58.5325ms -"2019-07-20 02:39:39.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5a6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 24963" -"2019-07-20 02:39:39.136 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5a7 Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" -"2019-07-20 02:39:39.136 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5a8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.7µs " -"2019-07-20 02:39:39.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5a9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:39.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5aa Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" -"2019-07-20 02:39:39.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5ab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.9µs " -"2019-07-20 02:39:39.142 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5ac Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 -"2019-07-20 02:39:39.142 UTC [common.channelconfig] NewStandardValues -> DEBU 5ad Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ae Processing field: HashingAlgorithm" -"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5af Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b0 Processing field: OrdererAddresses" -"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b1 Processing field: Consortium" -"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b2 Processing field: Capabilities" -"2019-07-20 02:39:39.142 UTC [common.channelconfig] NewStandardValues -> DEBU 5b3 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b4 Processing field: ACLs" -"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b5 Processing field: Capabilities" -"2019-07-20 02:39:39.143 UTC [common.channelconfig] NewStandardValues -> DEBU 5b6 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:39.143 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b7 Processing field: AnchorPeers" -"2019-07-20 02:39:39.143 UTC [common.channelconfig] NewStandardValues -> DEBU 5b8 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.143 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b9 Processing field: MSP" -"2019-07-20 02:39:39.143 UTC [common.channelconfig] Validate -> DEBU 5ba Anchor peers for org Org1MSP are " -"2019-07-20 02:39:39.143 UTC [common.channelconfig] validateMSP -> DEBU 5bb Setting up MSP for org Org1MSP" -"2019-07-20 02:39:39.143 UTC [msp] newBccspMsp -> DEBU 5bc Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.143 UTC [msp] New -> DEBU 5bd Creating Cache-MSP instance" -"2019-07-20 02:39:39.143 UTC [msp] Setup -> DEBU 5be Setting up MSP instance Org1MSP" -"2019-07-20 02:39:39.143 UTC [msp.identity] newIdentity -> DEBU 5bf Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-07-20 02:39:39.143 UTC [msp.identity] newIdentity -> DEBU 5c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:39:39.143 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5c1 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:39.143 UTC [msp] Validate -> DEBU 5c2 MSP Org1MSP validating identity" -"2019-07-20 02:39:39.144 UTC [msp] getCertificationChain -> DEBU 5c3 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:39.144 UTC [msp] hasOURole -> DEBU 5c4 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:39.144 UTC [msp] getCertificationChain -> DEBU 5c5 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:39.144 UTC [common.channelconfig] NewStandardValues -> DEBU 5c6 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:39.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c7 Processing field: AnchorPeers" -"2019-07-20 02:39:39.144 UTC [common.channelconfig] NewStandardValues -> DEBU 5c8 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c9 Processing field: MSP" -"2019-07-20 02:39:39.144 UTC [common.channelconfig] Validate -> DEBU 5ca Anchor peers for org Org2MSP are " -"2019-07-20 02:39:39.144 UTC [common.channelconfig] validateMSP -> DEBU 5cb Setting up MSP for org Org2MSP" -"2019-07-20 02:39:39.144 UTC [msp] newBccspMsp -> DEBU 5cc Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.144 UTC [msp] New -> DEBU 5cd Creating Cache-MSP instance" -"2019-07-20 02:39:39.144 UTC [msp] Setup -> DEBU 5ce Setting up MSP instance Org2MSP" -"2019-07-20 02:39:39.144 UTC [msp.identity] newIdentity -> DEBU 5cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.125 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 56e Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:24:53.125 UTC [msp] Validate -> DEBU 56f MSP Org1MSP validating identity" +"2019-09-24 00:24:53.125 UTC [msp] getCertificationChain -> DEBU 570 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:53.125 UTC [msp] hasOURole -> DEBU 571 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:24:53.125 UTC [msp] getCertificationChain -> DEBU 572 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:53.126 UTC [common.channelconfig] NewStandardValues -> DEBU 573 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:24:53.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU 574 Processing field: AnchorPeers" +"2019-09-24 00:24:53.132 UTC [common.channelconfig] NewStandardValues -> DEBU 575 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:53.133 UTC [common.channelconfig] initializeProtosStruct -> DEBU 576 Processing field: MSP" +"2019-09-24 00:24:53.133 UTC [common.channelconfig] Validate -> DEBU 577 Anchor peers for org Org2MSP are " +"2019-09-24 00:24:53.133 UTC [common.channelconfig] validateMSP -> DEBU 578 Setting up MSP for org Org2MSP" +"2019-09-24 00:24:53.133 UTC [msp] newBccspMsp -> DEBU 579 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:53.133 UTC [msp] New -> DEBU 57a Creating Cache-MSP instance" +"2019-09-24 00:24:53.133 UTC [msp] Setup -> DEBU 57b Setting up MSP instance Org2MSP" +"2019-09-24 00:24:53.134 UTC [msp.identity] newIdentity -> DEBU 57c Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2406,7 +2269,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.144 UTC [msp.identity] newIdentity -> DEBU 5d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.134 UTC [msp.identity] newIdentity -> DEBU 57d Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2420,27 +2283,127 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.145 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5d1 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:39.145 UTC [msp] Validate -> DEBU 5d2 MSP Org2MSP validating identity" -"2019-07-20 02:39:39.145 UTC [msp] getCertificationChain -> DEBU 5d3 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:39.145 UTC [msp] hasOURole -> DEBU 5d4 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:39.146 UTC [msp] getCertificationChain -> DEBU 5d5 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:39.146 UTC [common.channelconfig] NewStandardValues -> DEBU 5d6 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d7 Processing field: ConsensusType" -"2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d8 Processing field: BatchSize" -"2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d9 Processing field: BatchTimeout" -"2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5da Processing field: KafkaBrokers" -"2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5db Processing field: ChannelRestrictions" -"2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5dc Processing field: Capabilities" -"2019-07-20 02:39:39.151 UTC [common.channelconfig] NewStandardValues -> DEBU 5dd Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5de Processing field: Endpoints" -"2019-07-20 02:39:39.151 UTC [common.channelconfig] NewStandardValues -> DEBU 5df Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e0 Processing field: MSP" -"2019-07-20 02:39:39.151 UTC [common.channelconfig] validateMSP -> DEBU 5e1 Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:39.151 UTC [msp] newBccspMsp -> DEBU 5e2 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:39.151 UTC [msp] New -> DEBU 5e3 Creating Cache-MSP instance" -"2019-07-20 02:39:39.151 UTC [msp] Setup -> DEBU 5e4 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:39.151 UTC [msp.identity] newIdentity -> DEBU 5e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.135 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 57e Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:24:53.135 UTC [msp] Validate -> DEBU 57f MSP Org2MSP validating identity" +"2019-09-24 00:24:53.135 UTC [msp] getCertificationChain -> DEBU 580 MSP Org2MSP getting certification chain" +"2019-09-24 00:24:53.135 UTC [msp] hasOURole -> DEBU 581 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:24:53.135 UTC [msp] getCertificationChain -> DEBU 582 MSP Org2MSP getting certification chain" +"2019-09-24 00:24:53.135 UTC [msp] Setup -> DEBU 583 Setting up the MSP manager (3 msps)" +"2019-09-24 00:24:53.135 UTC [msp] Setup -> DEBU 584 MSP manager setup complete, setup 3 msps" +"2019-09-24 00:24:53.135 UTC [policies] NewManagerImpl -> DEBU 585 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 586 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 587 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 588 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 589 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 58a Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 58b Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.140 UTC [policies] NewManagerImpl -> DEBU 58c Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 58d Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 58e Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 58f Proposed new policy Readers for Channel/Application" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 590 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 591 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 592 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 593 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 594 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 595 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 596 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy Writers for Channel" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 59a Proposed new policy Admins for Channel" +"2019-09-24 00:24:53.141 UTC [policies] NewManagerImpl -> DEBU 59b Proposed new policy Readers for Channel" +"2019-09-24 00:24:53.141 UTC [common.configtx] addToMap -> DEBU 59c Adding to config map: [Group] /Channel" +"2019-09-24 00:24:53.141 UTC [common.configtx] addToMap -> DEBU 59d Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:24:53.141 UTC [common.configtx] addToMap -> DEBU 59e Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.142 UTC [common.configtx] addToMap -> DEBU 59f Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:24:53.142 UTC [common.configtx] addToMap -> DEBU 5a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:24:53.142 UTC [common.configtx] addToMap -> DEBU 5a1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:24:53.143 UTC [common.configtx] addToMap -> DEBU 5a2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:24:53.143 UTC [common.configtx] addToMap -> DEBU 5a3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:24:53.143 UTC [common.configtx] addToMap -> DEBU 5a4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5a5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5a6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5a7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5a8 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5a9 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5aa Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5ab Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5ac Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5ad Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:24:53.144 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:24:53.145 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:24:53.150 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:24:53.151 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:24:53.151 UTC [common.capabilities] Supported -> DEBU 5c8 Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 00:24:53.151 UTC [common.capabilities] Supported -> DEBU 5c9 Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:24:53.154 UTC [orderer.common.cluster] NewStream -> DEBU 5ca Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +"2019-09-24 00:24:53.154 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 5cb Sending msg of 24753 bytes to 3 on channel testchainid took 673.8µs" +"2019-09-24 00:24:53.154 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 5cc [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:60630" +"2019-09-24 00:24:53.159 UTC [orderer.common.broadcast] Handle -> DEBU 5cd Received EOF from 172.18.0.9:60630, hangup" +"2019-09-24 00:24:53.159 UTC [orderer.common.server] func1 -> DEBU 5ce Closing Broadcast stream" +"2019-09-24 00:24:53.159 UTC [comm.grpc.server] 1 -> INFO 5cf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:60630 grpc.code=OK grpc.call_duration=199.744ms +"2019-09-24 00:24:53.161 UTC [common.deliver] deliverBlocks -> DEBU 5d0 Rejecting deliver for 172.18.0.9:60628 because channel businesschannel not found" +"2019-09-24 00:24:53.161 UTC [orderer.common.server] func1 -> DEBU 5d1 Closing Deliver stream" +"2019-09-24 00:24:53.161 UTC [comm.grpc.server] 1 -> INFO 5d2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60628 grpc.code=OK grpc.call_duration=322.0027ms +"2019-09-24 00:24:53.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5d3 Send of SubmitRequest for channel testchainid with payload of size 24753 to orderer2.example.com(orderer2.example.com:7050) took 157.9µs " +"2019-09-24 00:24:53.296 UTC [orderer.common.server] Deliver -> DEBU 5d4 Starting new Deliver handler" +"2019-09-24 00:24:53.297 UTC [common.deliver] Handle -> DEBU 5d5 Starting new deliver loop for 172.18.0.9:60632" +"2019-09-24 00:24:53.297 UTC [common.deliver] Handle -> DEBU 5d6 Attempting to read seek info message from 172.18.0.9:60632" +"2019-09-24 00:24:53.334 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 24964" +"2019-09-24 00:24:53.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:53.344 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5d9 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +"2019-09-24 00:24:53.344 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5da Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.9µs " +"2019-09-24 00:24:53.344 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5db Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +"2019-09-24 00:24:53.344 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5dc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67µs " +"2019-09-24 00:24:53.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5dd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:53.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5de Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +"2019-09-24 00:24:53.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5df Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 229.6µs " +"2019-09-24 00:24:53.358 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5e0 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +"2019-09-24 00:24:53.358 UTC [common.channelconfig] NewStandardValues -> DEBU 5e1 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:24:53.358 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e2 Processing field: HashingAlgorithm" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e3 Processing field: BlockDataHashingStructure" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e4 Processing field: OrdererAddresses" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e5 Processing field: Consortium" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e6 Processing field: Capabilities" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] NewStandardValues -> DEBU 5e7 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e8 Processing field: ConsensusType" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e9 Processing field: BatchSize" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ea Processing field: BatchTimeout" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5eb Processing field: KafkaBrokers" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ec Processing field: ChannelRestrictions" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ed Processing field: Capabilities" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] NewStandardValues -> DEBU 5ee Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ef Processing field: Endpoints" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] NewStandardValues -> DEBU 5f0 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f1 Processing field: MSP" +"2019-09-24 00:24:53.359 UTC [common.channelconfig] validateMSP -> DEBU 5f2 Setting up MSP for org OrdererOrg" +"2019-09-24 00:24:53.360 UTC [msp] newBccspMsp -> DEBU 5f3 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:53.360 UTC [msp] New -> DEBU 5f4 Creating Cache-MSP instance" +"2019-09-24 00:24:53.360 UTC [msp] Setup -> DEBU 5f5 Setting up MSP instance OrdererMSP" +"2019-09-24 00:24:53.361 UTC [msp.identity] newIdentity -> DEBU 5f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -2454,7 +2417,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-07-20 02:39:39.151 UTC [msp.identity] newIdentity -> DEBU 5e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.361 UTC [msp.identity] newIdentity -> DEBU 5f7 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -2467,143 +2430,229 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-07-20 02:39:39.152 UTC [msp] Validate -> DEBU 5e7 MSP OrdererMSP validating identity" -"2019-07-20 02:39:39.152 UTC [msp] Setup -> DEBU 5e8 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:39.152 UTC [msp] Setup -> DEBU 5e9 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ea Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5eb Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ec Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ed Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ee Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ef Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f0 Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f1 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f2 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f3 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f4 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f5 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f6 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f7 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f8 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f9 Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fa Proposed new policy Readers for Channel/Application" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fb Proposed new policy Writers for Channel/Application" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fc Proposed new policy Admins for Channel/Application" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fd Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fe Proposed new policy Readers for Channel" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5ff Proposed new policy Writers for Channel" -"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 600 Proposed new policy Admins for Channel" -"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 606 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 607 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 608 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 609 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60d Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60e Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 610 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 611 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 612 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 613 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 614 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 615 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 616 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 617 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 618 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 619 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61e Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61f Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 620 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 621 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 622 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 623 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 624 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 625 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 626 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 627 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 628 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 629 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62a Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62b Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62c Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 62d As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 62e As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 62f Manager Channel looking up path [Application]" -"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 630 Manager Channel has managers Orderer" -"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 631 Manager Channel has managers Application" -"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 632 Manager Channel/Application looking up path []" -"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 633 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 634 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 635 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 636 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 637 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 638 Manager Channel looking up path [Orderer]" -"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 639 Manager Channel has managers Orderer" -"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63a Manager Channel has managers Application" -"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63b Manager Channel/Orderer looking up path []" -"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63c Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 63d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 63e As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 63f As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 640 As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:39:39.165 UTC [common.capabilities] Supported -> DEBU 641 Orderer capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:39.174 UTC [common.capabilities] Supported -> DEBU 642 Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:39.174 UTC [fsblkstorage] newBlockfileMgr -> DEBU 643 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " -"2019-07-20 02:39:39.174 UTC [kvledger.util] CreateDirIfMissing -> DEBU 644 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" -"2019-07-20 02:39:39.174 UTC [kvledger.util] logDirStatus -> DEBU 645 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" -"2019-07-20 02:39:39.175 UTC [kvledger.util] logDirStatus -> DEBU 646 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" -"2019-07-20 02:39:39.175 UTC [fsblkstorage] newBlockfileMgr -> INFO 647 Getting block information from block storage" -"2019-07-20 02:39:39.175 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 648 Retrieving checkpoint info from block files" -"2019-07-20 02:39:39.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 649 retrieveLastFileSuffix()" -"2019-07-20 02:39:39.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 64a retrieveLastFileSuffix() - biggestFileNum = -1" -"2019-07-20 02:39:39.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 64b Last file number found = -1" -"2019-07-20 02:39:39.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 64c No block file found" -"2019-07-20 02:39:39.176 UTC [fsblkstorage] newBlockfileMgr -> DEBU 64d Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0002be900)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -"2019-07-20 02:39:39.180 UTC [fsblkstorage] newBlockIndex -> DEBU 64e newBlockIndex() - indexItems:[[BlockNum]]" -"2019-07-20 02:39:39.180 UTC [orderer.common.server] func1 -> DEBU 64f Executing callback to update root CAs" -"2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 650 updating root CAs for channel [businesschannel]" -"2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 651 adding app root CAs for MSP [Org1MSP]" -"2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 652 adding app root CAs for MSP [Org2MSP]" -"2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 653 adding orderer root CAs for MSP [OrdererMSP]" -"2019-07-20 02:39:39.211 UTC [fsblkstorage] indexBlock -> DEBU 654 Indexing block [blockNum=0, blockHash=[]byte{0xde, 0xde, 0xd4, 0x2c, 0x3f, 0xc9, 0xd0, 0x46, 0x4d, 0x6c, 0x3a, 0xf6, 0x16, 0x22, 0x29, 0x32, 0x3, 0x44, 0xef, 0x64, 0x10, 0x5f, 0x7f, 0xf6, 0x26, 0x25, 0xe8, 0x71, 0x7d, 0x72, 0x1c, 0xd4} txOffsets= -txId=12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898 locPointer=offset=39, bytesLength=23902 +"2019-09-24 00:24:53.361 UTC [msp] Validate -> DEBU 5f8 MSP OrdererMSP validating identity" +"2019-09-24 00:24:53.362 UTC [common.channelconfig] NewStandardValues -> DEBU 5f9 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:24:53.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fa Processing field: ACLs" +"2019-09-24 00:24:53.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fb Processing field: Capabilities" +"2019-09-24 00:24:53.362 UTC [common.channelconfig] NewStandardValues -> DEBU 5fc Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:24:53.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fd Processing field: AnchorPeers" +"2019-09-24 00:24:53.362 UTC [common.channelconfig] NewStandardValues -> DEBU 5fe Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:53.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ff Processing field: MSP" +"2019-09-24 00:24:53.362 UTC [common.channelconfig] Validate -> DEBU 600 Anchor peers for org Org1MSP are " +"2019-09-24 00:24:53.362 UTC [common.channelconfig] validateMSP -> DEBU 601 Setting up MSP for org Org1MSP" +"2019-09-24 00:24:53.362 UTC [msp] newBccspMsp -> DEBU 602 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:53.362 UTC [msp] New -> DEBU 603 Creating Cache-MSP instance" +"2019-09-24 00:24:53.362 UTC [msp] Setup -> DEBU 604 Setting up MSP instance Org1MSP" +"2019-09-24 00:24:53.363 UTC [msp.identity] newIdentity -> DEBU 605 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-09-24 00:24:53.363 UTC [msp.identity] newIdentity -> DEBU 606 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:24:53.364 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 607 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:24:53.364 UTC [msp] Validate -> DEBU 608 MSP Org1MSP validating identity" +"2019-09-24 00:24:53.365 UTC [msp] getCertificationChain -> DEBU 609 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:53.365 UTC [msp] hasOURole -> DEBU 60a MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:24:53.365 UTC [msp] getCertificationChain -> DEBU 60b MSP Org1MSP getting certification chain" +"2019-09-24 00:24:53.365 UTC [common.channelconfig] NewStandardValues -> DEBU 60c Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:24:53.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU 60d Processing field: AnchorPeers" +"2019-09-24 00:24:53.365 UTC [common.channelconfig] NewStandardValues -> DEBU 60e Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:53.365 UTC [common.channelconfig] initializeProtosStruct -> DEBU 60f Processing field: MSP" +"2019-09-24 00:24:53.365 UTC [common.channelconfig] Validate -> DEBU 610 Anchor peers for org Org2MSP are " +"2019-09-24 00:24:53.365 UTC [common.channelconfig] validateMSP -> DEBU 611 Setting up MSP for org Org2MSP" +"2019-09-24 00:24:53.365 UTC [msp] newBccspMsp -> DEBU 612 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:53.365 UTC [msp] New -> DEBU 613 Creating Cache-MSP instance" +"2019-09-24 00:24:53.365 UTC [msp] Setup -> DEBU 614 Setting up MSP instance Org2MSP" +"2019-09-24 00:24:53.398 UTC [msp.identity] newIdentity -> DEBU 615 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-09-24 00:24:53.400 UTC [msp.identity] newIdentity -> DEBU 616 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:24:53.401 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 617 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:24:53.401 UTC [msp] Validate -> DEBU 618 MSP Org2MSP validating identity" +"2019-09-24 00:24:53.402 UTC [msp] getCertificationChain -> DEBU 619 MSP Org2MSP getting certification chain" +"2019-09-24 00:24:53.402 UTC [msp] hasOURole -> DEBU 61a MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:24:53.402 UTC [msp] getCertificationChain -> DEBU 61b MSP Org2MSP getting certification chain" +"2019-09-24 00:24:53.403 UTC [msp] Setup -> DEBU 61c Setting up the MSP manager (3 msps)" +"2019-09-24 00:24:53.403 UTC [msp] Setup -> DEBU 61d MSP manager setup complete, setup 3 msps" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 61e Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 61f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 620 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 621 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 622 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 623 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 624 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 625 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 626 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 627 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 628 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:24:53.403 UTC [policies] NewManagerImpl -> DEBU 629 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62a Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62b Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62c Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62d Proposed new policy Admins for Channel/Application" +"2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62e Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 62f Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 630 Proposed new policy Readers for Channel/Application" +"2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 631 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 632 Proposed new policy Writers for Channel" +"2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 633 Proposed new policy Admins for Channel" +"2019-09-24 00:24:53.404 UTC [policies] NewManagerImpl -> DEBU 634 Proposed new policy Readers for Channel" +"2019-09-24 00:24:53.404 UTC [common.configtx] addToMap -> DEBU 635 Adding to config map: [Group] /Channel" +"2019-09-24 00:24:53.404 UTC [common.configtx] addToMap -> DEBU 636 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:24:53.404 UTC [common.configtx] addToMap -> DEBU 637 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:53.404 UTC [common.configtx] addToMap -> DEBU 638 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:24:53.404 UTC [common.configtx] addToMap -> DEBU 639 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63d Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 63f Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 640 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 641 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 642 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 643 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 644 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 645 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 646 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 647 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 648 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 649 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 64a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:24:53.405 UTC [common.configtx] addToMap -> DEBU 64b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:24:53.406 UTC [common.configtx] addToMap -> DEBU 64c Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 64d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 64e Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 64f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 650 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 651 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 652 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:24:53.433 UTC [common.configtx] addToMap -> DEBU 653 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:24:53.434 UTC [common.configtx] addToMap -> DEBU 654 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:24:53.434 UTC [common.configtx] addToMap -> DEBU 655 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:24:53.434 UTC [common.configtx] addToMap -> DEBU 656 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:24:53.439 UTC [common.configtx] addToMap -> DEBU 657 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 658 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 659 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65a Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65b Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65c Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65e Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 65f Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:24:53.440 UTC [common.configtx] addToMap -> DEBU 660 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:24:53.440 UTC [common.channelconfig] LogSanityChecks -> DEBU 661 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:24:53.440 UTC [common.channelconfig] LogSanityChecks -> DEBU 662 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 663 Manager Channel looking up path [Application]" +"2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 664 Manager Channel has managers Orderer" +"2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 665 Manager Channel has managers Application" +"2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 666 Manager Channel/Application looking up path []" +"2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 667 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:24:53.447 UTC [policies] Manager -> DEBU 668 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 669 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 66a As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 66b As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 00:24:53.448 UTC [policies] Manager -> DEBU 66c Manager Channel looking up path [Orderer]" +"2019-09-24 00:24:53.448 UTC [policies] Manager -> DEBU 66d Manager Channel has managers Orderer" +"2019-09-24 00:24:53.448 UTC [policies] Manager -> DEBU 66e Manager Channel has managers Application" +"2019-09-24 00:24:53.448 UTC [policies] Manager -> DEBU 66f Manager Channel/Orderer looking up path []" +"2019-09-24 00:24:53.448 UTC [policies] Manager -> DEBU 670 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 671 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 672 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 673 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:24:53.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 674 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:24:53.448 UTC [common.capabilities] Supported -> DEBU 675 Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 00:24:53.448 UTC [common.capabilities] Supported -> DEBU 676 Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:24:53.448 UTC [fsblkstorage] newBlockfileMgr -> DEBU 677 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2019-09-24 00:24:53.448 UTC [kvledger.util] CreateDirIfMissing -> DEBU 678 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +"2019-09-24 00:24:53.448 UTC [kvledger.util] logDirStatus -> DEBU 679 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +"2019-09-24 00:24:53.452 UTC [kvledger.util] logDirStatus -> DEBU 67a After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +"2019-09-24 00:24:53.452 UTC [fsblkstorage] newBlockfileMgr -> INFO 67b Getting block information from block storage" +"2019-09-24 00:24:53.452 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 67c Retrieving checkpoint info from block files" +"2019-09-24 00:24:53.453 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 67d retrieveLastFileSuffix()" +"2019-09-24 00:24:53.453 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 67e retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-09-24 00:24:53.453 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 67f Last file number found = -1" +"2019-09-24 00:24:53.453 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 680 No block file found" +"2019-09-24 00:24:53.453 UTC [fsblkstorage] newBlockfileMgr -> DEBU 681 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0003bf480)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-09-24 00:24:53.465 UTC [fsblkstorage] newBlockIndex -> DEBU 682 newBlockIndex() - indexItems:[[BlockNum]]" +"2019-09-24 00:24:53.465 UTC [orderer.common.server] func1 -> DEBU 683 Executing callback to update root CAs" +"2019-09-24 00:24:53.465 UTC [orderer.common.server] updateTrustedRoots -> DEBU 684 updating root CAs for channel [businesschannel]" +"2019-09-24 00:24:53.465 UTC [orderer.common.server] updateTrustedRoots -> DEBU 685 adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 00:24:53.465 UTC [orderer.common.server] updateTrustedRoots -> DEBU 686 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 00:24:53.465 UTC [orderer.common.server] updateTrustedRoots -> DEBU 687 adding app root CAs for MSP [Org2MSP]" +"2019-09-24 00:24:53.472 UTC [fsblkstorage] indexBlock -> DEBU 688 Indexing block [blockNum=0, blockHash=[]byte{0xdc, 0x37, 0x3e, 0x7d, 0xd9, 0x80, 0x34, 0xd8, 0x87, 0x20, 0x13, 0x50, 0x22, 0xb4, 0x68, 0xd5, 0xb6, 0x58, 0x78, 0xbf, 0x32, 0x9f, 0xc8, 0x89, 0x42, 0x2a, 0x5, 0x7a, 0xab, 0xc6, 0x38, 0x47} txOffsets= +txId=39c9b622afe3457926bd2f6a5ade166a0d139905e01268fb7cba4a9273bf6dc3 locPointer=offset=39, bytesLength=23903 ]" -"2019-07-20 02:39:39.228 UTC [fsblkstorage] updateCheckpoint -> DEBU 655 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23947], isChainEmpty=[false], lastBlockNumber=[0]" -"2019-07-20 02:39:39.229 UTC [fsblkstorage] Next -> DEBU 656 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-07-20 02:39:39.230 UTC [fsblkstorage] newBlockfileStream -> DEBU 657 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -"2019-07-20 02:39:39.231 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 658 Remaining bytes=[23947], Going to peek [8] bytes" -"2019-07-20 02:39:39.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 659 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:39:39.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 65a blockbytes [23944] read from file [0]" -"2019-07-20 02:39:39.233 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 65b [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" -"2019-07-20 02:39:39.233 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 65c EvictionSuspicion not set, defaulting to 10m0s" -"2019-07-20 02:39:39.234 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 65d No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 -"2019-07-20 02:39:39.234 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 65e No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 -"2019-07-20 02:39:39.247 UTC [orderer.common.server] Deliver -> DEBU 65f Starting new Deliver handler" -"2019-07-20 02:39:39.247 UTC [common.deliver] Handle -> DEBU 660 Starting new deliver loop for 172.18.0.9:39032" -"2019-07-20 02:39:39.247 UTC [common.deliver] Handle -> DEBU 661 Attempting to read seek info message from 172.18.0.9:39032" -"2019-07-20 02:39:39.248 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 662 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 -"2019-07-20 02:39:39.253 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 663 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 -"2019-07-20 02:39:39.253 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 664 Appending 0 entries to memory storage" channel=businesschannel node=1 -"2019-07-20 02:39:39.253 UTC [fsblkstorage] Next -> DEBU 665 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-07-20 02:39:39.253 UTC [fsblkstorage] newBlockfileStream -> DEBU 666 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -"2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 667 Remaining bytes=[23947], Going to peek [8] bytes" -"2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 668 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 669 blockbytes [23944] read from file [0]" -"2019-07-20 02:39:39.253 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 66a [channel: businesschannel] Done creating channel support resources" -"2019-07-20 02:39:39.254 UTC [orderer.commmon.multichannel] newChain -> INFO 66b Created and starting new chain businesschannel" -"2019-07-20 02:39:39.254 UTC [orderer.consensus.etcdraft] Start -> INFO 66c Starting Raft node" channel=businesschannel node=1 -"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] Configure -> INFO 66d Entering, channel: businesschannel, nodes: [ID: 2, +"2019-09-24 00:24:53.475 UTC [fsblkstorage] updateCheckpoint -> DEBU 689 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23948], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-09-24 00:24:53.475 UTC [fsblkstorage] Next -> DEBU 68a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 00:24:53.475 UTC [fsblkstorage] newBlockfileStream -> DEBU 68b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-09-24 00:24:53.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68c Remaining bytes=[23948], Going to peek [8] bytes" +"2019-09-24 00:24:53.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68d Returning blockbytes - length=[23945], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:24:53.475 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68e blockbytes [23945] read from file [0]" +"2019-09-24 00:24:53.475 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 68f [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +"2019-09-24 00:24:53.475 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 690 EvictionSuspicion not set, defaulting to 10m0s" +"2019-09-24 00:24:53.476 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 691 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +"2019-09-24 00:24:53.476 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 692 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +"2019-09-24 00:24:53.482 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 693 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +"2019-09-24 00:24:53.482 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 694 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +"2019-09-24 00:24:53.482 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 695 Appending 0 entries to memory storage" channel=businesschannel node=1 +"2019-09-24 00:24:53.482 UTC [fsblkstorage] Next -> DEBU 696 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 00:24:53.483 UTC [fsblkstorage] newBlockfileStream -> DEBU 697 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-09-24 00:24:53.483 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 698 Remaining bytes=[23948], Going to peek [8] bytes" +"2019-09-24 00:24:53.483 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 699 Returning blockbytes - length=[23945], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:24:53.483 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69a blockbytes [23945] read from file [0]" +"2019-09-24 00:24:53.483 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 69b [channel: businesschannel] Done creating channel support resources" +"2019-09-24 00:24:53.483 UTC [orderer.commmon.multichannel] newChain -> INFO 69c Created and starting new chain businesschannel" +"2019-09-24 00:24:53.483 UTC [orderer.consensus.etcdraft] Start -> INFO 69d Starting Raft node" channel=businesschannel node=1 +"2019-09-24 00:24:53.483 UTC [orderer.common.cluster] Configure -> INFO 69e Entering, channel: businesschannel, nodes: [ID: 2, Endpoint: orderer1.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL @@ -2668,9 +2717,9 @@ hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -----END CERTIFICATE----- ]" -"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 66e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" -"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 66f Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" -"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] func1 -> DEBU 670 Connecting to ID: 2, +"2019-09-24 00:24:53.484 UTC [orderer.common.cluster] updateStubInMapping -> INFO 69f Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +"2019-09-24 00:24:53.484 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a0 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-09-24 00:24:53.484 UTC [orderer.common.cluster] func1 -> DEBU 6a1 Connecting to ID: 2, Endpoint: orderer1.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL @@ -2703,9 +2752,9 @@ hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= -----END CERTIFICATE----- for channel businesschannel" -"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 671 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" -"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 672 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" -"2019-07-20 02:39:39.256 UTC [orderer.common.cluster] func1 -> DEBU 673 Connecting to ID: 3, +"2019-09-24 00:24:53.484 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a2 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +"2019-09-24 00:24:53.484 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a3 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-09-24 00:24:53.485 UTC [orderer.common.cluster] func1 -> DEBU 6a4 Connecting to ID: 3, Endpoint: orderer2.example.com:7050, ServerTLSCert:-----BEGIN CERTIFICATE----- MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL @@ -2738,113 +2787,112 @@ hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= -----END CERTIFICATE----- for channel businesschannel" -"2019-07-20 02:39:39.256 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 674 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" -"2019-07-20 02:39:39.256 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 675 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" -"2019-07-20 02:39:39.256 UTC [orderer.common.cluster] Configure -> INFO 676 Exiting" -"2019-07-20 02:39:39.256 UTC [orderer.consensus.etcdraft] start -> DEBU 677 Starting raft node: #peers: 3" channel=businesschannel node=1 -"2019-07-20 02:39:39.256 UTC [orderer.consensus.etcdraft] start -> INFO 678 Starting raft node as part of a new channel" channel=businesschannel node=1 -"2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 679 1 became follower at term 0" channel=businesschannel node=1 -"2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] newRaft -> INFO 67a newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 -"2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 67b 1 became follower at term 1" channel=businesschannel node=1 -"2019-07-20 02:39:39.258 UTC [orderer.consensus.etcdraft] run -> INFO 67c This node is picked to start campaign" channel=businesschannel node=1 -"2019-07-20 02:39:39.259 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 67d [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" -"2019-07-20 02:39:39.259 UTC [msp] GetDefaultSigningIdentity -> DEBU 67e Obtaining default signing identity" -"2019-07-20 02:39:39.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 67f Obtaining default signing identity" -"2019-07-20 02:39:39.261 UTC [msp.identity] Sign -> DEBU 680 Sign: plaintext: 0A00120B0A090A03010203100418050A...077E55C999B3556466F594DE3B047CB5 " -"2019-07-20 02:39:39.261 UTC [msp.identity] Sign -> DEBU 681 Sign: digest: AEA4BEA9C2F4D3EC03C57972E641FFA37F4FFC7DA1BDC0A89540566538A541D6 " -"2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 682 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -"2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 683 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -"2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 684 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 -"2019-07-20 02:39:39.265 UTC [fsblkstorage] indexBlock -> DEBU 685 Indexing block [blockNum=1, blockHash=[]byte{0xf, 0x5c, 0xba, 0x1d, 0x96, 0x7b, 0x97, 0x7d, 0x56, 0xde, 0x67, 0xed, 0x27, 0xfc, 0x3b, 0x1d, 0xb7, 0xa5, 0x53, 0x81, 0xfd, 0xea, 0xcb, 0x6e, 0x75, 0x92, 0x64, 0x72, 0x6a, 0xb2, 0x7b, 0xc6} txOffsets= -txId=2f78a887aca86ed201b3eecf6235b46f50837a1005a59ced8b90e723e89181de locPointer=offset=71, bytesLength=24832 +"2019-09-24 00:24:53.485 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 6a5 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-09-24 00:24:53.485 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 6a6 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-09-24 00:24:53.485 UTC [orderer.common.cluster] Configure -> INFO 6a7 Exiting" +"2019-09-24 00:24:53.485 UTC [orderer.consensus.etcdraft] start -> DEBU 6a8 Starting raft node: #peers: 3" channel=businesschannel node=1 +"2019-09-24 00:24:53.485 UTC [orderer.consensus.etcdraft] start -> INFO 6a9 Starting raft node as part of a new channel" channel=businesschannel node=1 +"2019-09-24 00:24:53.485 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 6aa 1 became follower at term 0" channel=businesschannel node=1 +"2019-09-24 00:24:53.485 UTC [orderer.consensus.etcdraft] newRaft -> INFO 6ab newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +"2019-09-24 00:24:53.485 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 6ac 1 became follower at term 1" channel=businesschannel node=1 +"2019-09-24 00:24:53.486 UTC [orderer.consensus.etcdraft] run -> INFO 6ad This node is picked to start campaign" channel=businesschannel node=1 +"2019-09-24 00:24:53.489 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 6ae [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +"2019-09-24 00:24:53.489 UTC [msp] GetDefaultSigningIdentity -> DEBU 6af Obtaining default signing identity" +"2019-09-24 00:24:53.489 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b0 Obtaining default signing identity" +"2019-09-24 00:24:53.489 UTC [msp.identity] Sign -> DEBU 6b1 Sign: plaintext: 0A00120B0A090A03010203100418050A...68CAAB07ABC0FB0A23180D0ADAB7BFF9 " +"2019-09-24 00:24:53.489 UTC [msp.identity] Sign -> DEBU 6b2 Sign: digest: 06AF196F46B0F85108E214AA01379D2761E3BF88F96E9F76B1FF31AA3A9F5C7B " +"2019-09-24 00:24:53.489 UTC [orderer.consensus.etcdraft] apply -> INFO 6b3 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-09-24 00:24:53.490 UTC [orderer.consensus.etcdraft] apply -> INFO 6b4 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-09-24 00:24:53.490 UTC [orderer.consensus.etcdraft] apply -> INFO 6b5 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-09-24 00:24:53.494 UTC [fsblkstorage] indexBlock -> DEBU 6b6 Indexing block [blockNum=1, blockHash=[]byte{0xad, 0xd5, 0xde, 0x39, 0xb6, 0x44, 0xca, 0x2, 0x60, 0x46, 0x0, 0x4f, 0x69, 0xc8, 0xc7, 0x7c, 0x10, 0xfc, 0xef, 0xad, 0x84, 0x40, 0xba, 0x3c, 0xf5, 0x9a, 0x3c, 0xbb, 0x3d, 0xad, 0x41, 0x97} txOffsets= +txId=1c39ff43d54bd1834121dc43dee8b26d313aaeef27bf14648c636484497a42a1 locPointer=offset=71, bytesLength=24833 ]" -"2019-07-20 02:39:39.267 UTC [fsblkstorage] updateCheckpoint -> DEBU 686 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44254], isChainEmpty=[false], lastBlockNumber=[1]" -"2019-07-20 02:39:39.267 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 687 [channel: testchainid] Wrote block [1]" -"2019-07-20 02:39:39.454 UTC [common.deliver] deliverBlocks -> WARN 688 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39032 because of consenter error" -"2019-07-20 02:39:39.455 UTC [orderer.common.server] func1 -> DEBU 689 Closing Deliver stream" -"2019-07-20 02:39:39.455 UTC [comm.grpc.server] 1 -> INFO 68a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39032 grpc.code=OK grpc.call_duration=208.0585ms -"2019-07-20 02:39:39.470 UTC [orderer.common.server] Deliver -> DEBU 68b Starting new Deliver handler" -"2019-07-20 02:39:39.471 UTC [common.deliver] Handle -> DEBU 68c Starting new deliver loop for 172.18.0.9:39034" -"2019-07-20 02:39:39.471 UTC [common.deliver] Handle -> DEBU 68d Attempting to read seek info message from 172.18.0.9:39034" -"2019-07-20 02:39:39.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 68e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:39.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68f Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" -"2019-07-20 02:39:39.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 690 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.6µs " -"2019-07-20 02:39:39.673 UTC [common.deliver] deliverBlocks -> WARN 691 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39034 because of consenter error" -"2019-07-20 02:39:39.673 UTC [orderer.common.server] func1 -> DEBU 692 Closing Deliver stream" -"2019-07-20 02:39:39.673 UTC [comm.grpc.server] 1 -> INFO 693 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39034 grpc.code=OK grpc.call_duration=203.0503ms -"2019-07-20 02:39:39.698 UTC [orderer.common.server] Deliver -> DEBU 694 Starting new Deliver handler" -"2019-07-20 02:39:39.699 UTC [common.deliver] Handle -> DEBU 695 Starting new deliver loop for 172.18.0.9:39036" -"2019-07-20 02:39:39.699 UTC [common.deliver] Handle -> DEBU 696 Attempting to read seek info message from 172.18.0.9:39036" -"2019-07-20 02:39:39.866 UTC [orderer.common.server] replicateDisabledChains -> DEBU 697 No inactive chains to try to replicate" -"2019-07-20 02:39:39.903 UTC [common.deliver] deliverBlocks -> WARN 698 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39036 because of consenter error" -"2019-07-20 02:39:39.904 UTC [orderer.common.server] func1 -> DEBU 699 Closing Deliver stream" -"2019-07-20 02:39:39.904 UTC [comm.grpc.server] 1 -> INFO 69a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39036 grpc.code=OK grpc.call_duration=206.494ms -"2019-07-20 02:39:39.921 UTC [orderer.common.server] Deliver -> DEBU 69b Starting new Deliver handler" -"2019-07-20 02:39:39.922 UTC [common.deliver] Handle -> DEBU 69c Starting new deliver loop for 172.18.0.9:39038" -"2019-07-20 02:39:39.922 UTC [common.deliver] Handle -> DEBU 69d Attempting to read seek info message from 172.18.0.9:39038" -"2019-07-20 02:39:40.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 69e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:40.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69f Sending msg of 28 bytes to 3 on channel testchainid took 24.9µs" -"2019-07-20 02:39:40.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90µs " -"2019-07-20 02:39:40.123 UTC [common.deliver] deliverBlocks -> WARN 6a1 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39038 because of consenter error" -"2019-07-20 02:39:40.124 UTC [orderer.common.server] func1 -> DEBU 6a2 Closing Deliver stream" -"2019-07-20 02:39:40.124 UTC [comm.grpc.server] 1 -> INFO 6a3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39038 grpc.code=OK grpc.call_duration=202.4616ms -"2019-07-20 02:39:40.149 UTC [orderer.common.server] Deliver -> DEBU 6a4 Starting new Deliver handler" -"2019-07-20 02:39:40.149 UTC [common.deliver] Handle -> DEBU 6a5 Starting new deliver loop for 172.18.0.9:39040" -"2019-07-20 02:39:40.149 UTC [common.deliver] Handle -> DEBU 6a6 Attempting to read seek info message from 172.18.0.9:39040" -"2019-07-20 02:39:40.259 UTC [orderer.consensus.etcdraft] Step -> INFO 6a7 1 is starting a new election at term 1" channel=businesschannel node=1 -"2019-07-20 02:39:40.260 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6a8 1 became pre-candidate at term 1" channel=businesschannel node=1 -"2019-07-20 02:39:40.260 UTC [orderer.consensus.etcdraft] poll -> INFO 6a9 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 -"2019-07-20 02:39:40.261 UTC [orderer.consensus.etcdraft] campaign -> INFO 6aa 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 -"2019-07-20 02:39:40.261 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ab 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 -"2019-07-20 02:39:40.262 UTC [orderer.common.cluster] NewStream -> DEBU 6ac Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" -"2019-07-20 02:39:40.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ad Sending msg of 28 bytes to 2 on channel businesschannel took 798.9µs" -"2019-07-20 02:39:40.263 UTC [orderer.common.cluster] NewStream -> DEBU 6ae Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" -"2019-07-20 02:39:40.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6af Sending msg of 28 bytes to 3 on channel businesschannel took 422.9µs" -"2019-07-20 02:39:40.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 253.5µs " -"2019-07-20 02:39:40.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 348.8µs " -"2019-07-20 02:39:40.269 UTC [orderer.common.cluster] Step -> DEBU 6b2 Connection from orderer1.example.com(172.18.0.3:47792)" -"2019-07-20 02:39:40.270 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:40.269 UTC [orderer.common.cluster] Step -> DEBU 6b3 Connection from orderer2.example.com(172.18.0.4:54782)" -"2019-07-20 02:39:40.271 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:40.270 UTC [orderer.consensus.etcdraft] poll -> INFO 6b6 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 -"2019-07-20 02:39:40.271 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6b7 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 -"2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6b8 1 became candidate at term 2" channel=businesschannel node=1 -"2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] poll -> INFO 6b9 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 -"2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ba 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 -"2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] campaign -> INFO 6bb 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 -"2019-07-20 02:39:40.275 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bc Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" -"2019-07-20 02:39:40.276 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6be Sending msg of 28 bytes to 2 on channel businesschannel took 13.6µs" -"2019-07-20 02:39:40.276 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.5µs " -"2019-07-20 02:39:40.278 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.8µs " -"2019-07-20 02:39:40.281 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] poll -> INFO 6c1 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 -"2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6c2 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 -"2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6c3 1 became leader at term 2" channel=businesschannel node=1 -"2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] run -> INFO 6c4 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 -"2019-07-20 02:39:40.284 UTC [orderer.consensus.etcdraft] run -> INFO 6c5 Leader 1 is present, quit campaign" channel=businesschannel node=1 -"2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c6 Sending msg of 36 bytes to 2 on channel businesschannel took 18.1µs" -"2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ca Sending msg of 36 bytes to 3 on channel businesschannel took 9.6µs" -"2019-07-20 02:39:40.287 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cb Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 129.7µs " -"2019-07-20 02:39:40.288 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6cc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:40.285 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c8 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 77.1µs " -"2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6c9 Raft leader changed: 0 -> 1" channel=businesschannel node=1 -"2019-07-20 02:39:40.291 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6cd There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 -"2019-07-20 02:39:40.284 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:40.291 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ce Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:40.291 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" -"2019-07-20 02:39:40.291 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 47.8µs " -"2019-07-20 02:39:40.292 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6d1 Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 -"2019-07-20 02:39:40.295 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:40.303 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d3 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" -"2019-07-20 02:39:40.303 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.3µs " -"2019-07-20 02:39:40.304 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:40.352 UTC [policies] Evaluate -> DEBU 6d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:39:40.352 UTC [policies] Evaluate -> DEBU 6d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6da == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:39:40.354 UTC [msp] DeserializeIdentity -> DEBU 6db Obtaining identity" -"2019-07-20 02:39:40.354 UTC [msp.identity] newIdentity -> DEBU 6dc Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:53.497 UTC [fsblkstorage] updateCheckpoint -> DEBU 6b7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44254], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-09-24 00:24:53.497 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 6b8 [channel: testchainid] Wrote block [1]" +"2019-09-24 00:24:53.499 UTC [common.deliver] deliverBlocks -> WARN 6b9 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:60632 because of consenter error" +"2019-09-24 00:24:53.499 UTC [orderer.common.server] func1 -> DEBU 6ba Closing Deliver stream" +"2019-09-24 00:24:53.499 UTC [comm.grpc.server] 1 -> INFO 6bb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60632 grpc.code=OK grpc.call_duration=203.8855ms +"2019-09-24 00:24:53.567 UTC [orderer.common.server] Deliver -> DEBU 6bc Starting new Deliver handler" +"2019-09-24 00:24:53.567 UTC [common.deliver] Handle -> DEBU 6bd Starting new deliver loop for 172.18.0.9:60636" +"2019-09-24 00:24:53.567 UTC [common.deliver] Handle -> DEBU 6be Attempting to read seek info message from 172.18.0.9:60636" +"2019-09-24 00:24:53.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6bf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:53.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.5µs " +"2019-09-24 00:24:53.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c1 Sending msg of 28 bytes to 3 on channel testchainid took 32.9µs" +"2019-09-24 00:24:53.769 UTC [common.deliver] deliverBlocks -> WARN 6c2 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:60636 because of consenter error" +"2019-09-24 00:24:53.769 UTC [orderer.common.server] func1 -> DEBU 6c3 Closing Deliver stream" +"2019-09-24 00:24:53.769 UTC [comm.grpc.server] 1 -> INFO 6c4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60636 grpc.code=OK grpc.call_duration=203.678ms +"2019-09-24 00:24:53.812 UTC [orderer.common.server] Deliver -> DEBU 6c5 Starting new Deliver handler" +"2019-09-24 00:24:53.812 UTC [common.deliver] Handle -> DEBU 6c6 Starting new deliver loop for 172.18.0.9:60638" +"2019-09-24 00:24:53.812 UTC [common.deliver] Handle -> DEBU 6c7 Attempting to read seek info message from 172.18.0.9:60638" +"2019-09-24 00:24:54.014 UTC [common.deliver] deliverBlocks -> WARN 6c8 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:60638 because of consenter error" +"2019-09-24 00:24:54.014 UTC [orderer.common.server] func1 -> DEBU 6c9 Closing Deliver stream" +"2019-09-24 00:24:54.014 UTC [comm.grpc.server] 1 -> INFO 6ca streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60638 grpc.code=OK grpc.call_duration=202.2582ms +"2019-09-24 00:24:54.063 UTC [orderer.common.server] Deliver -> DEBU 6cb Starting new Deliver handler" +"2019-09-24 00:24:54.066 UTC [common.deliver] Handle -> DEBU 6cc Starting new deliver loop for 172.18.0.9:60642" +"2019-09-24 00:24:54.066 UTC [common.deliver] Handle -> DEBU 6cd Attempting to read seek info message from 172.18.0.9:60642" +"2019-09-24 00:24:54.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ce Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:54.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 3 on channel testchainid took 203.6µs" +"2019-09-24 00:24:54.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181µs " +"2019-09-24 00:24:54.264 UTC [common.deliver] deliverBlocks -> WARN 6d1 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:60642 because of consenter error" +"2019-09-24 00:24:54.264 UTC [orderer.common.server] func1 -> DEBU 6d2 Closing Deliver stream" +"2019-09-24 00:24:54.264 UTC [comm.grpc.server] 1 -> INFO 6d3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60642 grpc.code=OK grpc.call_duration=200.761ms +"2019-09-24 00:24:54.310 UTC [orderer.common.server] Deliver -> DEBU 6d4 Starting new Deliver handler" +"2019-09-24 00:24:54.310 UTC [common.deliver] Handle -> DEBU 6d5 Starting new deliver loop for 172.18.0.9:60646" +"2019-09-24 00:24:54.310 UTC [common.deliver] Handle -> DEBU 6d6 Attempting to read seek info message from 172.18.0.9:60646" +"2019-09-24 00:24:54.486 UTC [orderer.consensus.etcdraft] Step -> INFO 6d7 1 is starting a new election at term 1" channel=businesschannel node=1 +"2019-09-24 00:24:54.486 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6d8 1 became pre-candidate at term 1" channel=businesschannel node=1 +"2019-09-24 00:24:54.486 UTC [orderer.consensus.etcdraft] poll -> INFO 6d9 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +"2019-09-24 00:24:54.486 UTC [orderer.consensus.etcdraft] campaign -> INFO 6da 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +"2019-09-24 00:24:54.486 UTC [orderer.consensus.etcdraft] campaign -> INFO 6db 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +"2019-09-24 00:24:54.487 UTC [orderer.common.cluster] NewStream -> DEBU 6dc Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +"2019-09-24 00:24:54.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6dd Sending msg of 28 bytes to 2 on channel businesschannel took 167.6µs" +"2019-09-24 00:24:54.487 UTC [orderer.common.cluster] NewStream -> DEBU 6de Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-09-24 00:24:54.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6df Sending msg of 28 bytes to 3 on channel businesschannel took 69.2µs" +"2019-09-24 00:24:54.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +"2019-09-24 00:24:54.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.8µs " +"2019-09-24 00:24:54.489 UTC [orderer.common.cluster] Step -> DEBU 6e2 Connection from orderer1.example.com(172.18.0.4:58624)" +"2019-09-24 00:24:54.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] poll -> INFO 6e4 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 +"2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6e5 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6e6 1 became candidate at term 2" channel=businesschannel node=1 +"2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] poll -> INFO 6e7 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +"2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] campaign -> INFO 6e8 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +"2019-09-24 00:24:54.489 UTC [orderer.consensus.etcdraft] campaign -> INFO 6e9 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +"2019-09-24 00:24:54.490 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ea Sending msg of 28 bytes to 2 on channel businesschannel took 113.6µs" +"2019-09-24 00:24:54.491 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6eb Sending msg of 28 bytes to 3 on channel businesschannel took 82.2µs" +"2019-09-24 00:24:54.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +"2019-09-24 00:24:54.491 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53µs " +"2019-09-24 00:24:54.491 UTC [orderer.common.cluster] Step -> DEBU 6ee Connection from orderer2.example.com(172.18.0.2:49900)" +"2019-09-24 00:24:54.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ef Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:54.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:54.493 UTC [orderer.consensus.etcdraft] poll -> INFO 6f1 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +"2019-09-24 00:24:54.493 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6f2 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-09-24 00:24:54.493 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6f3 1 became leader at term 2" channel=businesschannel node=1 +"2019-09-24 00:24:54.493 UTC [orderer.consensus.etcdraft] run -> INFO 6f4 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +"2019-09-24 00:24:54.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:54.499 UTC [orderer.consensus.etcdraft] run -> INFO 6f6 Leader 1 is present, quit campaign" channel=businesschannel node=1 +"2019-09-24 00:24:54.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f7 Sending msg of 36 bytes to 2 on channel businesschannel took 12.4µs" +"2019-09-24 00:24:54.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f8 Sending msg of 36 bytes to 3 on channel businesschannel took 14.4µs" +"2019-09-24 00:24:54.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f9 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 91.9µs " +"2019-09-24 00:24:54.500 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6fa Raft leader changed: 0 -> 1" channel=businesschannel node=1 +"2019-09-24 00:24:54.500 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6fb There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +"2019-09-24 00:24:54.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fc Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 71.7µs " +"2019-09-24 00:24:54.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6fd Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:54.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fe Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +"2019-09-24 00:24:54.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.7µs " +"2019-09-24 00:24:54.504 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 700 Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +"2019-09-24 00:24:54.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 701 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:54.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 702 Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" +"2019-09-24 00:24:54.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 703 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:54.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 704 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2994ms " +"2019-09-24 00:24:54.507 UTC [orderer.common.cluster.step] handleMessage -> DEBU 705 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:54.522 UTC [policies] Evaluate -> DEBU 706 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:24:54.522 UTC [policies] Evaluate -> DEBU 707 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:24:54.522 UTC [policies] Evaluate -> DEBU 708 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:24:54.522 UTC [policies] Evaluate -> DEBU 709 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:24:54.522 UTC [policies] Evaluate -> DEBU 70a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:24:54.522 UTC [msp] DeserializeIdentity -> DEBU 70b Obtaining identity" +"2019-09-24 00:24:54.523 UTC [msp.identity] newIdentity -> DEBU 70c Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2858,2128 +2906,229 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:40.354 UTC [cauthdsl] func1 -> DEBU 6dd 0xc000b19be0 gate 1563590380354833100 evaluation starts" -"2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6de 0xc000b19be0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6df 0xc000b19be0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6e0 0xc000b19be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" -"2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6e1 0xc000b19be0 principal evaluation fails" -"2019-07-20 02:39:40.355 UTC [cauthdsl] func1 -> DEBU 6e2 0xc000b19be0 gate 1563590380354833100 evaluation fails" -"2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e3 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:40.356 UTC [policies] func1 -> DEBU 6e5 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -"2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e6 Signature set did not satisfy policy /Channel/Orderer/Readers" -"2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:40.357 UTC [policies] Evaluate -> DEBU 6e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:40.357 UTC [policies] Evaluate -> DEBU 6ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:40.357 UTC [cauthdsl] func1 -> DEBU 6eb 0xc000b3d210 gate 1563590380357524400 evaluation starts" -"2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ec 0xc000b3d210 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ed 0xc000b3d210 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ee 0xc000b3d210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-07-20 02:39:40.358 UTC [cauthdsl] func2 -> DEBU 6ef 0xc000b3d210 principal evaluation fails" -"2019-07-20 02:39:40.358 UTC [cauthdsl] func1 -> DEBU 6f0 0xc000b3d210 gate 1563590380357524400 evaluation fails" -"2019-07-20 02:39:40.358 UTC [policies] Evaluate -> DEBU 6f1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:40.358 UTC [policies] Evaluate -> DEBU 6f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:40.359 UTC [policies] Evaluate -> DEBU 6f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:40.359 UTC [cauthdsl] func1 -> DEBU 6f4 0xc000b3da70 gate 1563590380359582400 evaluation starts" -"2019-07-20 02:39:40.359 UTC [cauthdsl] func2 -> DEBU 6f5 0xc000b3da70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:40.359 UTC [cauthdsl] func2 -> DEBU 6f6 0xc000b3da70 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:40.359 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6f7 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-07-20 02:39:40.360 UTC [msp] Validate -> DEBU 6f8 MSP Org1MSP validating identity" -"2019-07-20 02:39:40.360 UTC [msp] getCertificationChain -> DEBU 6f9 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:40.360 UTC [cauthdsl] func2 -> DEBU 6fa 0xc000b3da70 principal matched by identity 0" -"2019-07-20 02:39:40.360 UTC [msp.identity] Verify -> DEBU 6fb Verify: digest = 00000000 09 2c 72 fc ea 8e d5 fa 55 c5 cb c8 76 a3 20 ed |.,r.....U...v. .| -00000010 d8 f5 8f 8b c9 a0 b2 66 d3 5a d0 00 9a 3b 5b c3 |.......f.Z...;[.|" -"2019-07-20 02:39:40.360 UTC [msp.identity] Verify -> DEBU 6fc Verify: sig = 00000000 30 44 02 21 00 fe 75 e0 47 08 50 1a 90 6c 0e 42 |0D.!..u.G.P..l.B| -00000010 dd d4 06 4f f2 2b 0c 8f 75 9f d2 8b 5d 3d 20 f2 |...O.+..u...]= .| -00000020 66 7b 07 72 98 02 1f 75 ed 66 f7 b4 5b 99 b6 17 |f{.r...u.f..[...| -00000030 5e fb 78 3d 43 aa 35 b8 31 c3 0c e8 17 00 2f f2 |^.x=C.5.1...../.| -00000040 eb fe 9f bc 6b fc |....k.|" -"2019-07-20 02:39:40.361 UTC [cauthdsl] func2 -> DEBU 6fd 0xc000b3da70 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:40.361 UTC [cauthdsl] func1 -> DEBU 6fe 0xc000b3da70 gate 1563590380359582400 evaluation succeeds" -"2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 6ff Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 700 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 701 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 702 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 703 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 704 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:39:40.362 UTC [common.deliver] deliverBlocks -> DEBU 705 [channel: businesschannel] Received seekInfo (0xc0008d08c0) start: > stop: > from 172.18.0.9:39040" -"2019-07-20 02:39:40.362 UTC [fsblkstorage] Next -> DEBU 706 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" -"2019-07-20 02:39:40.362 UTC [fsblkstorage] newBlockfileStream -> DEBU 707 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -"2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 708 Remaining bytes=[23947], Going to peek [8] bytes" -"2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 709 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 70a blockbytes [23944] read from file [0]" -"2019-07-20 02:39:40.363 UTC [common.deliver] deliverBlocks -> DEBU 70b [channel: businesschannel] Delivering block for (0xc0008d08c0) for 172.18.0.9:39040" -"2019-07-20 02:39:40.364 UTC [common.deliver] deliverBlocks -> DEBU 70c [channel: businesschannel] Done delivering to 172.18.0.9:39040 for (0xc0008d08c0)" -"2019-07-20 02:39:40.364 UTC [common.deliver] Handle -> DEBU 70d Waiting for new SeekInfo from 172.18.0.9:39040" -"2019-07-20 02:39:40.364 UTC [common.deliver] Handle -> DEBU 70e Attempting to read seek info message from 172.18.0.9:39040" -"2019-07-20 02:39:40.368 UTC [grpc] infof -> DEBU 70f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:40.368 UTC [grpc] warningf -> DEBU 710 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39040: read: connection reset by peer" -"2019-07-20 02:39:40.369 UTC [common.deliver] Handle -> WARN 711 Error reading from 172.18.0.9:39040: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:40.369 UTC [orderer.common.server] func1 -> DEBU 712 Closing Deliver stream" -"2019-07-20 02:39:40.370 UTC [comm.grpc.server] 1 -> INFO 713 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39040 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=221.1565ms -"2019-07-20 02:39:40.371 UTC [grpc] infof -> DEBU 714 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 715 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 716 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 717 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:40.373 UTC [grpc] infof -> DEBU 718 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:40.373 UTC [grpc] infof -> DEBU 719 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:40.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:40.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71b Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" -"2019-07-20 02:39:40.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52µs " -"2019-07-20 02:39:40.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71d Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" -"2019-07-20 02:39:40.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71e Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" -"2019-07-20 02:39:40.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.2µs " -"2019-07-20 02:39:40.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 720 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62µs " -"2019-07-20 02:39:40.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 721 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:40.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 722 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:41.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 723 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:41.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 724 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" -"2019-07-20 02:39:41.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 725 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " -"2019-07-20 02:39:41.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 726 Sending msg of 28 bytes to 2 on channel businesschannel took 54.9µs" -"2019-07-20 02:39:41.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 727 Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" -"2019-07-20 02:39:41.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 728 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 278µs " -"2019-07-20 02:39:41.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU 729 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.3µs " -"2019-07-20 02:39:41.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:41.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:41.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:41.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72d Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" -"2019-07-20 02:39:41.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 72e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.3µs " -"2019-07-20 02:39:41.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72f Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" -"2019-07-20 02:39:41.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 730 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" -"2019-07-20 02:39:41.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 731 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.7µs " -"2019-07-20 02:39:41.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU 732 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 728µs " -"2019-07-20 02:39:41.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 733 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:41.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 734 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:42.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 735 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:42.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 736 Sending msg of 28 bytes to 3 on channel testchainid took 39.2µs" -"2019-07-20 02:39:42.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 737 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.6µs " -"2019-07-20 02:39:42.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 738 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" -"2019-07-20 02:39:42.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 739 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" -"2019-07-20 02:39:42.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 588.6µs " -"2019-07-20 02:39:42.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 267.5µs " -"2019-07-20 02:39:42.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:42.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:42.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:42.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73f Sending msg of 28 bytes to 3 on channel testchainid took 471.2µs" -"2019-07-20 02:39:42.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 740 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 409.9µs " -"2019-07-20 02:39:42.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 741 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" -"2019-07-20 02:39:42.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 742 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" -"2019-07-20 02:39:42.758 UTC [orderer.common.cluster.step] sendMessage -> DEBU 743 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.6µs " -"2019-07-20 02:39:42.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 744 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.8µs " -"2019-07-20 02:39:42.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 745 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:42.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 746 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:43.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 747 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:43.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 748 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" -"2019-07-20 02:39:43.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 749 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " -"2019-07-20 02:39:43.134 UTC [orderer.common.server] Deliver -> DEBU 74a Starting new Deliver handler" -"2019-07-20 02:39:43.134 UTC [common.deliver] Handle -> DEBU 74b Starting new deliver loop for 172.18.0.9:39066" -"2019-07-20 02:39:43.135 UTC [common.deliver] Handle -> DEBU 74c Attempting to read seek info message from 172.18.0.9:39066" -"2019-07-20 02:39:43.157 UTC [orderer.common.server] Broadcast -> DEBU 74d Starting new Broadcast handler" -"2019-07-20 02:39:43.157 UTC [orderer.common.broadcast] Handle -> DEBU 74e Starting new broadcast loop for 172.18.0.9:39068" -"2019-07-20 02:39:43.158 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 74f [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39068" -"2019-07-20 02:39:43.158 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 750 Processing config update message for channel businesschannel" -"2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 751 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 752 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 753 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-07-20 02:39:43.159 UTC [policies] Evaluate -> DEBU 754 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:43.159 UTC [policies] Evaluate -> DEBU 755 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:39:43.159 UTC [cauthdsl] func1 -> DEBU 756 0xc0001a8150 gate 1563590383159486800 evaluation starts" -"2019-07-20 02:39:43.159 UTC [cauthdsl] func2 -> DEBU 757 0xc0001a8150 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 758 0xc0001a8150 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 759 0xc0001a8150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" -"2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 75a 0xc0001a8150 principal evaluation fails" -"2019-07-20 02:39:43.161 UTC [cauthdsl] func1 -> DEBU 75b 0xc0001a8150 gate 1563590383159486800 evaluation fails" -"2019-07-20 02:39:43.162 UTC [policies] Evaluate -> DEBU 75c Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:43.162 UTC [policies] Evaluate -> DEBU 75d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:43.162 UTC [policies] func1 -> DEBU 75e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -"2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 75f Signature set did not satisfy policy /Channel/Orderer/Writers" -"2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 760 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 761 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:39:43.164 UTC [policies] Evaluate -> DEBU 762 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:43.164 UTC [policies] Evaluate -> DEBU 763 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-07-20 02:39:43.164 UTC [cauthdsl] func1 -> DEBU 764 0xc0001a8f50 gate 1563590383164442500 evaluation starts" -"2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 765 0xc0001a8f50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 766 0xc0001a8f50 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 767 0xc0001a8f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 768 0xc0001a8f50 principal evaluation fails" -"2019-07-20 02:39:43.165 UTC [cauthdsl] func1 -> DEBU 769 0xc0001a8f50 gate 1563590383164442500 evaluation fails" -"2019-07-20 02:39:43.165 UTC [policies] Evaluate -> DEBU 76a Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:43.166 UTC [policies] Evaluate -> DEBU 76b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:43.166 UTC [policies] Evaluate -> DEBU 76c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:39:43.166 UTC [cauthdsl] func1 -> DEBU 76d 0xc0001a9b50 gate 1563590383166471700 evaluation starts" -"2019-07-20 02:39:43.166 UTC [cauthdsl] func2 -> DEBU 76e 0xc0001a9b50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:43.166 UTC [cauthdsl] func2 -> DEBU 76f 0xc0001a9b50 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:43.167 UTC [cauthdsl] func2 -> DEBU 770 0xc0001a9b50 principal matched by identity 0" -"2019-07-20 02:39:43.167 UTC [msp.identity] Verify -> DEBU 771 Verify: digest = 00000000 f1 1b b5 a4 11 0d ee 67 25 3d 7c 6e 69 a9 1b 10 |.......g%=|ni...| -00000010 c8 ab 62 3e 3c 3f 38 1c 1b 90 39 69 1e 40 58 73 |..b> DEBU 772 Verify: sig = 00000000 30 45 02 21 00 a5 b2 eb 66 85 66 e3 74 0f c5 bc |0E.!....f.f.t...| -00000010 6e 5d 06 96 f7 40 aa 52 1f 88 be 6b 38 37 91 26 |n]...@.R...k87.&| -00000020 b1 4e 79 81 c1 02 20 21 ce 28 3d c0 b1 e8 7b 02 |.Ny... !.(=...{.| -00000030 3e 75 4f 40 57 45 97 3a f8 7f b4 17 5c 22 85 f4 |>uO@WE.:....\"..| -00000040 ea d1 33 a7 e2 d5 e5 |..3....|" -"2019-07-20 02:39:43.168 UTC [cauthdsl] func2 -> DEBU 773 0xc0001a9b50 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:43.168 UTC [cauthdsl] func1 -> DEBU 774 0xc0001a9b50 gate 1563590383166471700 evaluation succeeds" -"2019-07-20 02:39:43.168 UTC [policies] Evaluate -> DEBU 775 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:43.168 UTC [policies] Evaluate -> DEBU 776 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 777 Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 778 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 779 Signature set satisfies policy /Channel/Writers" -"2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 77a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-07-20 02:39:43.169 UTC [common.configtx] addToMap -> DEBU 77b Adding to config map: [Group] /Channel" -"2019-07-20 02:39:43.170 UTC [common.configtx] addToMap -> DEBU 77c Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77d Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77e Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 780 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 781 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 782 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 783 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 784 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 785 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 786 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 787 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 788 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 789 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 78a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 78b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:43.173 UTC [common.configtx] verifyDeltaSet -> DEBU 78c Processing change to key: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:43.173 UTC [common.configtx] policyForItem -> DEBU 78d Getting policy for item Org1MSP with mod_policy Admins" -"2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 78e Manager Channel looking up path [Application]" -"2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 78f Manager Channel has managers Orderer" -"2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 790 Manager Channel has managers Application" -"2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 791 Manager Channel/Application looking up path []" -"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 792 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 793 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 794 Manager Channel/Application looking up path [Org1MSP]" -"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 795 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 796 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 797 Manager Channel/Application/Org1MSP looking up path []" -"2019-07-20 02:39:43.174 UTC [policies] Evaluate -> DEBU 798 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-07-20 02:39:43.174 UTC [cauthdsl] func1 -> DEBU 799 0xc000321400 gate 1563590383174605800 evaluation starts" -"2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79a 0xc000321400 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79b 0xc000321400 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:43.174 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 79c Checking if identity satisfies ADMIN role for Org1MSP" -"2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79d 0xc000321400 principal matched by identity 0" -"2019-07-20 02:39:43.175 UTC [msp.identity] Verify -> DEBU 79e Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| -00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" -"2019-07-20 02:39:43.175 UTC [msp.identity] Verify -> DEBU 79f Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| -00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| -00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| -00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| -00000040 b4 14 85 f1 cd 6f 15 |.....o.|" -"2019-07-20 02:39:43.175 UTC [cauthdsl] func2 -> DEBU 7a0 0xc000321400 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:43.175 UTC [cauthdsl] func1 -> DEBU 7a1 0xc000321400 gate 1563590383174605800 evaluation succeeds" -"2019-07-20 02:39:43.175 UTC [policies] Evaluate -> DEBU 7a2 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:43.176 UTC [policies] Evaluate -> DEBU 7a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:43.176 UTC [common.configtx] verifyDeltaSet -> DEBU 7a4 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:43.176 UTC [common.configtx] recurseConfigMap -> DEBU 7a5 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.176 UTC [common.configtx] recurseConfigMap -> DEBU 7a6 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a7 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a8 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7aa Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ab Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ac Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ad Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ae Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7af Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7b0 Setting policy for key Readers to " -"2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7b1 Setting policy for key Writers to " -"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b2 Setting policy for key Admins to " -"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b3 Setting policy for key Endorsement to " -"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b4 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b6 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b7 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b8 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b9 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.181 UTC [common.configtx] recurseConfigMap -> DEBU 7ba Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.181 UTC [common.configtx] recurseConfigMap -> DEBU 7bb Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7bc Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7bd Processing field: HashingAlgorithm" -"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7be Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7bf Processing field: OrdererAddresses" -"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c0 Processing field: Consortium" -"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c1 Processing field: Capabilities" -"2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7c2 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c3 Processing field: ACLs" -"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c4 Processing field: Capabilities" -"2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7c5 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:43.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c6 Processing field: AnchorPeers" -"2019-07-20 02:39:43.182 UTC [common.channelconfig] NewStandardValues -> DEBU 7c7 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:43.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c8 Processing field: MSP" -"2019-07-20 02:39:43.182 UTC [common.channelconfig] Validate -> DEBU 7c9 Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:39:43.182 UTC [common.channelconfig] validateMSP -> DEBU 7ca Setting up MSP for org Org1MSP" -"2019-07-20 02:39:43.182 UTC [msp] newBccspMsp -> DEBU 7cb Creating BCCSP-based MSP instance" -"2019-07-20 02:39:43.182 UTC [msp] New -> DEBU 7cc Creating Cache-MSP instance" -"2019-07-20 02:39:43.182 UTC [msp] Setup -> DEBU 7cd Setting up MSP instance Org1MSP" -"2019-07-20 02:39:43.183 UTC [msp.identity] newIdentity -> DEBU 7ce Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-07-20 02:39:43.184 UTC [msp.identity] newIdentity -> DEBU 7cf Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.185 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7d0 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:43.185 UTC [msp] Validate -> DEBU 7d1 MSP Org1MSP validating identity" -"2019-07-20 02:39:43.185 UTC [msp] getCertificationChain -> DEBU 7d2 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:43.185 UTC [msp] hasOURole -> DEBU 7d3 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:43.185 UTC [msp] getCertificationChain -> DEBU 7d4 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:43.185 UTC [common.channelconfig] NewStandardValues -> DEBU 7d5 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:43.185 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d6 Processing field: AnchorPeers" -"2019-07-20 02:39:43.185 UTC [common.channelconfig] NewStandardValues -> DEBU 7d7 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:43.185 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d8 Processing field: MSP" -"2019-07-20 02:39:43.186 UTC [common.channelconfig] Validate -> DEBU 7d9 Anchor peers for org Org2MSP are " -"2019-07-20 02:39:43.186 UTC [common.channelconfig] validateMSP -> DEBU 7da Setting up MSP for org Org2MSP" -"2019-07-20 02:39:43.186 UTC [msp] newBccspMsp -> DEBU 7db Creating BCCSP-based MSP instance" -"2019-07-20 02:39:43.186 UTC [msp] New -> DEBU 7dc Creating Cache-MSP instance" -"2019-07-20 02:39:43.186 UTC [msp] Setup -> DEBU 7dd Setting up MSP instance Org2MSP" -"2019-07-20 02:39:43.186 UTC [msp.identity] newIdentity -> DEBU 7de Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.186 UTC [msp.identity] newIdentity -> DEBU 7df Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.187 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7e0 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:43.187 UTC [msp] Validate -> DEBU 7e1 MSP Org2MSP validating identity" -"2019-07-20 02:39:43.187 UTC [msp] getCertificationChain -> DEBU 7e2 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:43.187 UTC [msp] hasOURole -> DEBU 7e3 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:43.187 UTC [msp] getCertificationChain -> DEBU 7e4 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:43.187 UTC [common.channelconfig] NewStandardValues -> DEBU 7e5 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:43.187 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e6 Processing field: ConsensusType" -"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e7 Processing field: BatchSize" -"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e8 Processing field: BatchTimeout" -"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e9 Processing field: KafkaBrokers" -"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ea Processing field: ChannelRestrictions" -"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7eb Processing field: Capabilities" -"2019-07-20 02:39:43.188 UTC [common.channelconfig] NewStandardValues -> DEBU 7ec Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ed Processing field: Endpoints" -"2019-07-20 02:39:43.188 UTC [common.channelconfig] NewStandardValues -> DEBU 7ee Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ef Processing field: MSP" -"2019-07-20 02:39:43.188 UTC [common.channelconfig] validateMSP -> DEBU 7f0 Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:43.188 UTC [msp] newBccspMsp -> DEBU 7f1 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:43.188 UTC [msp] New -> DEBU 7f2 Creating Cache-MSP instance" -"2019-07-20 02:39:43.188 UTC [msp] Setup -> DEBU 7f3 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:43.189 UTC [msp.identity] newIdentity -> DEBU 7f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:39:43.189 UTC [msp.identity] newIdentity -> DEBU 7f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.189 UTC [msp] Validate -> DEBU 7f6 MSP OrdererMSP validating identity" -"2019-07-20 02:39:43.189 UTC [msp] Setup -> DEBU 7f7 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:43.190 UTC [msp] Setup -> DEBU 7f8 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7f9 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fa Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fb Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fc Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fd Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fe Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7ff Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 800 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 801 Proposed new policy Writers for Channel/Application" -"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 802 Proposed new policy Admins for Channel/Application" -"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 803 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 804 Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 805 Proposed new policy Readers for Channel/Application" -"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 806 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 807 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 808 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 809 Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80a Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80b Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80c Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80d Proposed new policy Writers for Channel" -"2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80e Proposed new policy Admins for Channel" -"2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80f Proposed new policy Readers for Channel" -"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 810 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 811 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 812 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 813 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 814 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 815 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 816 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 817 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 818 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 819 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81a Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81d Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81f Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 820 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 821 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 822 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 823 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 824 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 825 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 826 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 827 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 828 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 829 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82d Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 82e Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 82f Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 830 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 831 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 832 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 833 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 834 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 835 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 836 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 837 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 838 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 839 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83a Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83b Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83c Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:43.197 UTC [common.channelconfig] LogSanityChecks -> DEBU 83d As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:39:43.197 UTC [common.channelconfig] LogSanityChecks -> DEBU 83e As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 83f Manager Channel looking up path [Application]" -"2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 840 Manager Channel has managers Application" -"2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 841 Manager Channel has managers Orderer" -"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 842 Manager Channel/Application looking up path []" -"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 843 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 844 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 845 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 846 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 847 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 848 Manager Channel looking up path [Orderer]" -"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 849 Manager Channel has managers Application" -"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84a Manager Channel has managers Orderer" -"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84b Manager Channel/Orderer looking up path []" -"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84c Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 84d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 84e As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 84f As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 850 As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:39:43.199 UTC [common.capabilities] Supported -> DEBU 851 Orderer capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:43.199 UTC [common.capabilities] Supported -> DEBU 852 Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:43.199 UTC [msp] GetDefaultSigningIdentity -> DEBU 853 Obtaining default signing identity" -"2019-07-20 02:39:43.199 UTC [msp] GetDefaultSigningIdentity -> DEBU 854 Obtaining default signing identity" -"2019-07-20 02:39:43.199 UTC [msp.identity] Sign -> DEBU 855 Sign: plaintext: 0AD2060A1B08011A0608EFFDC9E90522...3AF87FB4175C2285F4EAD133A7E2D5E5 " -"2019-07-20 02:39:43.199 UTC [msp.identity] Sign -> DEBU 856 Sign: digest: 2535EC334577C737BEBB3855C9646EDF0B2D1FD1FCFCDD1E862154A654C9A8DA " -"2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 857 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 858 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 859 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 85a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 85b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:39:43.200 UTC [msp] DeserializeIdentity -> DEBU 85c Obtaining identity" -"2019-07-20 02:39:43.201 UTC [msp.identity] newIdentity -> DEBU 85d Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -QQ== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.201 UTC [cauthdsl] func1 -> DEBU 85e 0xc000c5d020 gate 1563590383201372400 evaluation starts" -"2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 85f 0xc000c5d020 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 860 0xc000c5d020 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:43.201 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 861 Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-07-20 02:39:43.201 UTC [msp] Validate -> DEBU 862 MSP OrdererMSP validating identity" -"2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 863 0xc000c5d020 principal matched by identity 0" -"2019-07-20 02:39:43.202 UTC [msp.identity] Verify -> DEBU 864 Verify: digest = 00000000 25 35 ec 33 45 77 c7 37 be bb 38 55 c9 64 6e df |%5.3Ew.7..8U.dn.| -00000010 0b 2d 1f d1 fc fc dd 1e 86 21 54 a6 54 c9 a8 da |.-.......!T.T...|" -"2019-07-20 02:39:43.202 UTC [msp.identity] Verify -> DEBU 865 Verify: sig = 00000000 30 44 02 20 3b b3 0e 3c 0b b2 75 13 96 13 37 4c |0D. ;..<..u...7L| -00000010 0c d1 15 d4 40 ff 19 4a 13 ea 8f bd 76 a7 c0 b5 |....@..J....v...| -00000020 aa c5 7c 6a 02 20 62 6a 7d 0c 2b df ed 05 f1 26 |..|j. bj}.+....&| -00000030 6f af 79 9f 81 51 a7 54 83 81 b0 f1 ee 43 39 b1 |o.y..Q.T.....C9.| -00000040 dd aa 68 72 78 34 |..hrx4|" -"2019-07-20 02:39:43.202 UTC [cauthdsl] func2 -> DEBU 866 0xc000c5d020 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:43.202 UTC [cauthdsl] func1 -> DEBU 867 0xc000c5d020 gate 1563590383201372400 evaluation succeeds" -"2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 868 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 869 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 86a Signature set satisfies policy /Channel/Orderer/Writers" -"2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86c Signature set satisfies policy /Channel/Writers" -"2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-07-20 02:39:43.203 UTC [orderer.common.msgprocessor] Apply -> DEBU 86e Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel -"2019-07-20 02:39:43.203 UTC [common.channelconfig] NewStandardValues -> DEBU 86f Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 870 Processing field: HashingAlgorithm" -"2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 871 Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 872 Processing field: OrdererAddresses" -"2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 873 Processing field: Consortium" -"2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 874 Processing field: Capabilities" -"2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 875 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 876 Processing field: ACLs" -"2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 877 Processing field: Capabilities" -"2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 878 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 879 Processing field: AnchorPeers" -"2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 87a Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 87b Processing field: MSP" -"2019-07-20 02:39:43.204 UTC [common.channelconfig] Validate -> DEBU 87c Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:39:43.204 UTC [common.channelconfig] validateMSP -> DEBU 87d Setting up MSP for org Org1MSP" -"2019-07-20 02:39:43.204 UTC [msp] newBccspMsp -> DEBU 87e Creating BCCSP-based MSP instance" -"2019-07-20 02:39:43.204 UTC [msp] New -> DEBU 87f Creating Cache-MSP instance" -"2019-07-20 02:39:43.205 UTC [msp] Setup -> DEBU 880 Setting up MSP instance Org1MSP" -"2019-07-20 02:39:43.205 UTC [msp.identity] newIdentity -> DEBU 881 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-07-20 02:39:43.205 UTC [msp.identity] newIdentity -> DEBU 882 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.205 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 883 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:43.206 UTC [msp] Validate -> DEBU 884 MSP Org1MSP validating identity" -"2019-07-20 02:39:43.206 UTC [msp] getCertificationChain -> DEBU 885 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:43.206 UTC [msp] hasOURole -> DEBU 886 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:43.206 UTC [msp] getCertificationChain -> DEBU 887 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:43.206 UTC [common.channelconfig] NewStandardValues -> DEBU 888 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:43.206 UTC [common.channelconfig] initializeProtosStruct -> DEBU 889 Processing field: AnchorPeers" -"2019-07-20 02:39:43.206 UTC [common.channelconfig] NewStandardValues -> DEBU 88a Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:43.207 UTC [common.channelconfig] initializeProtosStruct -> DEBU 88b Processing field: MSP" -"2019-07-20 02:39:43.207 UTC [common.channelconfig] Validate -> DEBU 88c Anchor peers for org Org2MSP are " -"2019-07-20 02:39:43.207 UTC [common.channelconfig] validateMSP -> DEBU 88d Setting up MSP for org Org2MSP" -"2019-07-20 02:39:43.207 UTC [msp] newBccspMsp -> DEBU 88e Creating BCCSP-based MSP instance" -"2019-07-20 02:39:43.207 UTC [msp] New -> DEBU 88f Creating Cache-MSP instance" -"2019-07-20 02:39:43.207 UTC [msp] Setup -> DEBU 890 Setting up MSP instance Org2MSP" -"2019-07-20 02:39:43.207 UTC [msp.identity] newIdentity -> DEBU 891 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.207 UTC [msp.identity] newIdentity -> DEBU 892 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.208 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 893 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:43.208 UTC [msp] Validate -> DEBU 894 MSP Org2MSP validating identity" -"2019-07-20 02:39:43.208 UTC [msp] getCertificationChain -> DEBU 895 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:43.208 UTC [msp] hasOURole -> DEBU 896 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:43.208 UTC [msp] getCertificationChain -> DEBU 897 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:43.208 UTC [common.channelconfig] NewStandardValues -> DEBU 898 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 899 Processing field: ConsensusType" -"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89a Processing field: BatchSize" -"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89b Processing field: BatchTimeout" -"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89c Processing field: KafkaBrokers" -"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89d Processing field: ChannelRestrictions" -"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89e Processing field: Capabilities" -"2019-07-20 02:39:43.209 UTC [common.channelconfig] NewStandardValues -> DEBU 89f Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a0 Processing field: Endpoints" -"2019-07-20 02:39:43.209 UTC [common.channelconfig] NewStandardValues -> DEBU 8a1 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:43.210 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a2 Processing field: MSP" -"2019-07-20 02:39:43.210 UTC [common.channelconfig] validateMSP -> DEBU 8a3 Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:43.210 UTC [msp] newBccspMsp -> DEBU 8a4 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:43.210 UTC [msp] New -> DEBU 8a5 Creating Cache-MSP instance" -"2019-07-20 02:39:43.210 UTC [msp] Setup -> DEBU 8a6 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:43.210 UTC [msp.identity] newIdentity -> DEBU 8a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:39:43.211 UTC [msp.identity] newIdentity -> DEBU 8a8 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.211 UTC [msp] Validate -> DEBU 8a9 MSP OrdererMSP validating identity" -"2019-07-20 02:39:43.213 UTC [msp] Setup -> DEBU 8aa Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:43.214 UTC [msp] Setup -> DEBU 8ab MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ac Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ad Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ae Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8af Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b0 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b1 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b2 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b3 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b4 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b5 Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b6 Proposed new policy Readers for Channel/Application" -"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b7 Proposed new policy Writers for Channel/Application" -"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b8 Proposed new policy Admins for Channel/Application" -"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b9 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8ba Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bb Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bc Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bd Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8be Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8bf Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c0 Proposed new policy Writers for Channel" -"2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c1 Proposed new policy Admins for Channel" -"2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c2 Proposed new policy Readers for Channel" -"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c3 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c4 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c5 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c7 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8ca Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cb Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cc Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d2 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d3 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d4 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d5 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d6 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d7 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d9 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8da Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8db Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8dc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8dd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8de Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8df Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e0 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e1 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e2 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e3 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e4 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e6 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e7 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e8 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:43.219 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:43.219 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 8f0 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39068" -"2019-07-20 02:39:43.220 UTC [orderer.consensus.etcdraft] propose -> INFO 8f1 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-07-20 02:39:43.225 UTC [common.deliver] Handle -> WARN 8f2 Error reading from 172.18.0.9:39066: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:43.226 UTC [orderer.common.server] func1 -> DEBU 8f3 Closing Deliver stream" -"2019-07-20 02:39:43.226 UTC [comm.grpc.server] 1 -> INFO 8f4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39066 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=92.6637ms -"2019-07-20 02:39:43.227 UTC [orderer.common.broadcast] Handle -> WARN 8f5 Error reading from 172.18.0.9:39068: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:43.227 UTC [orderer.common.server] func1 -> DEBU 8f6 Closing Broadcast stream" -"2019-07-20 02:39:43.227 UTC [comm.grpc.server] 1 -> INFO 8f7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39068 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=70.1227ms -"2019-07-20 02:39:43.227 UTC [grpc] infof -> DEBU 8f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:43.227 UTC [grpc] infof -> DEBU 8f9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:43.228 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 8fa Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -"2019-07-20 02:39:43.229 UTC [orderer.consensus.etcdraft] 2 -> DEBU 8fb Proposed block [1] to raft consensus" channel=businesschannel node=1 -"2019-07-20 02:39:43.232 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8fc Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer1.example.com(orderer1.example.com:7050) took 95.1µs " -"2019-07-20 02:39:43.232 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fd Sending msg of 22816 bytes to 2 on channel businesschannel took 139.7µs" -"2019-07-20 02:39:43.236 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fe Sending msg of 22816 bytes to 3 on channel businesschannel took 96.2µs" -"2019-07-20 02:39:43.236 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8ff Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer2.example.com(orderer2.example.com:7050) took 91µs " -"2019-07-20 02:39:43.238 UTC [orderer.common.cluster.step] handleMessage -> DEBU 900 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 902 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" -"2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 904 Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" -"2019-07-20 02:39:43.240 UTC [orderer.common.cluster.step] sendMessage -> DEBU 905 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.4µs " -"2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 903 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 -"2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Group] /Channel" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 916 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:43.241 UTC [common.configtx] verifyDeltaSet -> DEBU 917 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:43.241 UTC [common.configtx] verifyDeltaSet -> DEBU 918 Processing change to key: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:43.241 UTC [common.configtx] policyForItem -> DEBU 919 Getting policy for item Org1MSP with mod_policy Admins" -"2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91a Manager Channel looking up path [Application]" -"2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91b Manager Channel has managers Orderer" -"2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91c Manager Channel has managers Application" -"2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91d Manager Channel/Application looking up path []" -"2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91e Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91f Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 920 Manager Channel/Application looking up path [Org1MSP]" -"2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 921 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:43.243 UTC [policies] Manager -> DEBU 922 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:43.243 UTC [policies] Manager -> DEBU 923 Manager Channel/Application/Org1MSP looking up path []" -"2019-07-20 02:39:43.243 UTC [policies] Evaluate -> DEBU 924 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-07-20 02:39:43.243 UTC [cauthdsl] func1 -> DEBU 925 0xc000cda8c0 gate 1563590383243353300 evaluation starts" -"2019-07-20 02:39:43.244 UTC [cauthdsl] func2 -> DEBU 926 0xc000cda8c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:43.245 UTC [cauthdsl] func2 -> DEBU 927 0xc000cda8c0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:43.245 UTC [cauthdsl] func2 -> DEBU 928 0xc000cda8c0 principal matched by identity 0" -"2019-07-20 02:39:43.247 UTC [msp.identity] Verify -> DEBU 929 Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| -00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" -"2019-07-20 02:39:43.247 UTC [msp.identity] Verify -> DEBU 92a Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| -00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| -00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| -00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| -00000040 b4 14 85 f1 cd 6f 15 |.....o.|" -"2019-07-20 02:39:43.248 UTC [cauthdsl] func2 -> DEBU 92b 0xc000cda8c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:43.248 UTC [cauthdsl] func1 -> DEBU 92c 0xc000cda8c0 gate 1563590383243353300 evaluation succeeds" -"2019-07-20 02:39:43.248 UTC [policies] Evaluate -> DEBU 92d Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:43.248 UTC [policies] Evaluate -> DEBU 92e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:43.249 UTC [common.configtx] recurseConfigMap -> DEBU 92f Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.249 UTC [common.configtx] recurseConfigMap -> DEBU 930 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.250 UTC [common.configtx] recurseConfigMap -> DEBU 931 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.250 UTC [orderer.common.cluster.step] sendMessage -> DEBU 932 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 10.4526ms " -"2019-07-20 02:39:43.250 UTC [common.configtx] recurseConfigMap -> DEBU 933 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU 935 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:43.251 UTC [common.configtx] recurseConfigMap -> DEBU 934 Setting policy for key Readers to " -"2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 936 Setting policy for key Writers to " -"2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 937 Setting policy for key Admins to " -"2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 938 Setting policy for key Endorsement to " -"2019-07-20 02:39:43.239 UTC [orderer.common.cluster.step] handleMessage -> DEBU 901 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:43.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 939 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" -"2019-07-20 02:39:43.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU 93a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.7µs " -"2019-07-20 02:39:43.266 UTC [common.configtx] recurseConfigMap -> DEBU 93b Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.268 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 93c Sending msg of 28 bytes to 3 on channel businesschannel took 51.9µs" -"2019-07-20 02:39:43.268 UTC [orderer.common.cluster.step] sendMessage -> DEBU 93d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.3µs " -"2019-07-20 02:39:43.268 UTC [common.configtx] recurseConfigMap -> DEBU 93e Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 93f Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 940 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 941 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 942 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 943 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 944 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 945 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 946 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 947 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 948 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 949 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 94a Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.273 UTC [common.configtx] recurseConfigMap -> DEBU 94b Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:43.273 UTC [common.channelconfig] NewStandardValues -> DEBU 94d Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94e Processing field: HashingAlgorithm" -"2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94f Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:43.273 UTC [orderer.common.cluster.step] handleMessage -> DEBU 94c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 950 Processing field: OrdererAddresses" -"2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 951 Processing field: Consortium" -"2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 952 Processing field: Capabilities" -"2019-07-20 02:39:43.275 UTC [common.channelconfig] NewStandardValues -> DEBU 953 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 954 Processing field: ConsensusType" -"2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 955 Processing field: BatchSize" -"2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 956 Processing field: BatchTimeout" -"2019-07-20 02:39:43.276 UTC [common.channelconfig] initializeProtosStruct -> DEBU 957 Processing field: KafkaBrokers" -"2019-07-20 02:39:43.276 UTC [common.channelconfig] initializeProtosStruct -> DEBU 958 Processing field: ChannelRestrictions" -"2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 959 Processing field: Capabilities" -"2019-07-20 02:39:43.277 UTC [common.channelconfig] NewStandardValues -> DEBU 95a Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 95b Processing field: Endpoints" -"2019-07-20 02:39:43.277 UTC [common.channelconfig] NewStandardValues -> DEBU 95c Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 95d Processing field: MSP" -"2019-07-20 02:39:43.277 UTC [common.channelconfig] validateMSP -> DEBU 95e Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:43.277 UTC [msp] newBccspMsp -> DEBU 95f Creating BCCSP-based MSP instance" -"2019-07-20 02:39:43.278 UTC [msp] New -> DEBU 961 Creating Cache-MSP instance" -"2019-07-20 02:39:43.279 UTC [msp] Setup -> DEBU 962 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:43.280 UTC [msp.identity] newIdentity -> DEBU 963 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:39:43.281 UTC [msp.identity] newIdentity -> DEBU 964 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.281 UTC [orderer.common.cluster.step] handleMessage -> DEBU 965 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:43.281 UTC [msp] Validate -> DEBU 966 MSP OrdererMSP validating identity" -"2019-07-20 02:39:43.282 UTC [common.channelconfig] NewStandardValues -> DEBU 967 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:43.278 UTC [orderer.common.cluster.step] handleMessage -> DEBU 960 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:43.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 968 Processing field: ACLs" -"2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 969 Processing field: Capabilities" -"2019-07-20 02:39:43.283 UTC [common.channelconfig] NewStandardValues -> DEBU 96a Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96b Processing field: AnchorPeers" -"2019-07-20 02:39:43.283 UTC [common.channelconfig] NewStandardValues -> DEBU 96c Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96d Processing field: MSP" -"2019-07-20 02:39:43.284 UTC [common.channelconfig] Validate -> DEBU 96e Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:39:43.284 UTC [common.channelconfig] validateMSP -> DEBU 96f Setting up MSP for org Org1MSP" -"2019-07-20 02:39:43.284 UTC [msp] newBccspMsp -> DEBU 970 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:43.284 UTC [msp] New -> DEBU 971 Creating Cache-MSP instance" -"2019-07-20 02:39:43.285 UTC [msp] Setup -> DEBU 972 Setting up MSP instance Org1MSP" -"2019-07-20 02:39:43.285 UTC [msp.identity] newIdentity -> DEBU 973 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-07-20 02:39:43.286 UTC [msp.identity] newIdentity -> DEBU 974 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.287 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 975 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:43.287 UTC [msp] Validate -> DEBU 976 MSP Org1MSP validating identity" -"2019-07-20 02:39:43.287 UTC [msp] getCertificationChain -> DEBU 977 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:43.288 UTC [msp] hasOURole -> DEBU 978 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:43.288 UTC [msp] getCertificationChain -> DEBU 979 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:43.288 UTC [common.channelconfig] NewStandardValues -> DEBU 97a Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:43.288 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97b Processing field: AnchorPeers" -"2019-07-20 02:39:43.288 UTC [common.channelconfig] NewStandardValues -> DEBU 97c Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:43.288 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97d Processing field: MSP" -"2019-07-20 02:39:43.288 UTC [common.channelconfig] Validate -> DEBU 97e Anchor peers for org Org2MSP are " -"2019-07-20 02:39:43.288 UTC [common.channelconfig] validateMSP -> DEBU 97f Setting up MSP for org Org2MSP" -"2019-07-20 02:39:43.288 UTC [msp] newBccspMsp -> DEBU 980 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:43.289 UTC [msp] New -> DEBU 981 Creating Cache-MSP instance" -"2019-07-20 02:39:43.289 UTC [msp] Setup -> DEBU 982 Setting up MSP instance Org2MSP" -"2019-07-20 02:39:43.289 UTC [msp.identity] newIdentity -> DEBU 983 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.290 UTC [msp.identity] newIdentity -> DEBU 984 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-07-20 02:39:43.290 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 985 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:43.290 UTC [msp] Validate -> DEBU 986 MSP Org2MSP validating identity" -"2019-07-20 02:39:43.291 UTC [msp] getCertificationChain -> DEBU 987 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:43.291 UTC [msp] hasOURole -> DEBU 988 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:43.291 UTC [msp] getCertificationChain -> DEBU 989 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:43.291 UTC [msp] Setup -> DEBU 98a Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:43.291 UTC [msp] Setup -> DEBU 98b MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:43.291 UTC [policies] NewManagerImpl -> DEBU 98c Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98d Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98e Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98f Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 990 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 991 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 992 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 993 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 994 Proposed new policy Writers for Channel/Application" -"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 995 Proposed new policy Admins for Channel/Application" -"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 996 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:39:43.293 UTC [policies] NewManagerImpl -> DEBU 997 Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:39:43.293 UTC [policies] NewManagerImpl -> DEBU 998 Proposed new policy Readers for Channel/Application" -"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 999 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99a Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99b Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99c Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99d Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99e Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99f Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a0 Proposed new policy Writers for Channel" -"2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a1 Proposed new policy Admins for Channel" -"2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a2 Proposed new policy Readers for Channel" -"2019-07-20 02:39:43.295 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bb Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ca Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cb Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cc Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cd Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ce Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cf Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:43.297 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d0 As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:39:43.297 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d1 As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d2 Manager Channel looking up path [Application]" -"2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d3 Manager Channel has managers Application" -"2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d4 Manager Channel has managers Orderer" -"2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d5 Manager Channel/Application looking up path []" -"2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d6 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9d7 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d8 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d9 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9da As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9db Manager Channel looking up path [Orderer]" -"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9dc Manager Channel has managers Application" -"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9dd Manager Channel has managers Orderer" -"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9de Manager Channel/Orderer looking up path []" -"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9df Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e0 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e1 As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e2 As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e3 As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:39:43.298 UTC [common.capabilities] Supported -> DEBU 9e4 Orderer capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:43.298 UTC [common.capabilities] Supported -> DEBU 9e5 Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:43.298 UTC [orderer.common.server] func1 -> DEBU 9e6 Executing callback to update root CAs" -"2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e7 updating root CAs for channel [businesschannel]" -"2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e8 adding orderer root CAs for MSP [OrdererMSP]" -"2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e9 adding app root CAs for MSP [Org1MSP]" -"2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9ea adding app root CAs for MSP [Org2MSP]" -"2019-07-20 02:39:43.300 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9eb [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" -"2019-07-20 02:39:43.301 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9ec [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" -"2019-07-20 02:39:43.301 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ed Obtaining default signing identity" -"2019-07-20 02:39:43.302 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ee Obtaining default signing identity" -"2019-07-20 02:39:43.302 UTC [msp.identity] Sign -> DEBU 9ef Sign: plaintext: 0A020801120B0A090A03010203100418...F2CDD8D5A6282CFC0741B2C754C9EB86 " -"2019-07-20 02:39:43.302 UTC [msp.identity] Sign -> DEBU 9f0 Sign: digest: 83FA658AE2186F1919C8D657A3B6EF232379955B505EBBF4C8203590B5F4A732 " -"2019-07-20 02:39:43.304 UTC [fsblkstorage] indexBlock -> DEBU 9f1 Indexing block [blockNum=1, blockHash=[]byte{0xad, 0x6d, 0x1e, 0xa9, 0x18, 0xba, 0xbc, 0xca, 0xf6, 0xcf, 0x8e, 0xc0, 0x90, 0xeb, 0x4b, 0xfb, 0x6e, 0x2f, 0xc6, 0x7d, 0xf5, 0x4e, 0x4d, 0x7d, 0x6, 0xa6, 0xef, 0x4f, 0x93, 0x80, 0x1f, 0xd9} txOffsets= -txId=4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94 locPointer=offset=71, bytesLength=22685 -]" -"2019-07-20 02:39:43.306 UTC [fsblkstorage] updateCheckpoint -> DEBU 9f2 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47640], isChainEmpty=[false], lastBlockNumber=[1]" -"2019-07-20 02:39:43.306 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 9f3 [channel: businesschannel] Wrote block [1]" -"2019-07-20 02:39:43.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:43.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f5 Sending msg of 28 bytes to 3 on channel testchainid took 212.6µs" -"2019-07-20 02:39:43.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.6µs " -"2019-07-20 02:39:43.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f7 Sending msg of 28 bytes to 2 on channel businesschannel took 49.7µs" -"2019-07-20 02:39:43.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f8 Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" -"2019-07-20 02:39:43.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.9µs " -"2019-07-20 02:39:43.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.5µs " -"2019-07-20 02:39:43.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:43.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:44.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:44.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9fe Sending msg of 28 bytes to 3 on channel testchainid took 32.1µs" -"2019-07-20 02:39:44.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9ff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2788ms " -"2019-07-20 02:39:44.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a00 Sending msg of 28 bytes to 2 on channel businesschannel took 50.3µs" -"2019-07-20 02:39:44.260 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a01 Sending msg of 28 bytes to 3 on channel businesschannel took 112.8µs" -"2019-07-20 02:39:44.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU a02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.4µs " -"2019-07-20 02:39:44.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU a03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 492.5µs " -"2019-07-20 02:39:44.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU a04 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:44.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU a05 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:44.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU a06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:44.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a07 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" -"2019-07-20 02:39:44.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU a08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " -"2019-07-20 02:39:44.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a09 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" -"2019-07-20 02:39:44.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0a Sending msg of 28 bytes to 3 on channel businesschannel took 53.7µs" -"2019-07-20 02:39:44.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 786.9µs " -"2019-07-20 02:39:44.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 185.6µs " -"2019-07-20 02:39:44.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:44.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:45.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:45.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a10 Sending msg of 28 bytes to 3 on channel testchainid took 269.8µs" -"2019-07-20 02:39:45.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU a11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.6µs " -"2019-07-20 02:39:45.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a12 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" -"2019-07-20 02:39:45.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a13 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" -"2019-07-20 02:39:45.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU a14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234µs " -"2019-07-20 02:39:45.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU a15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 237.3µs " -"2019-07-20 02:39:45.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU a16 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:45.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU a17 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:45.364 UTC [orderer.common.server] Deliver -> DEBU a18 Starting new Deliver handler" -"2019-07-20 02:39:45.364 UTC [common.deliver] Handle -> DEBU a19 Starting new deliver loop for 172.18.0.9:39070" -"2019-07-20 02:39:45.364 UTC [common.deliver] Handle -> DEBU a1a Attempting to read seek info message from 172.18.0.9:39070" -"2019-07-20 02:39:45.381 UTC [orderer.common.server] Broadcast -> DEBU a1b Starting new Broadcast handler" -"2019-07-20 02:39:45.381 UTC [orderer.common.broadcast] Handle -> DEBU a1c Starting new broadcast loop for 172.18.0.9:39072" -"2019-07-20 02:39:45.381 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a1d [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39072" -"2019-07-20 02:39:45.381 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a1e Processing config update message for channel businesschannel" -"2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:39:45.383 UTC [policies] Evaluate -> DEBU a22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:45.383 UTC [policies] Evaluate -> DEBU a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:39:45.383 UTC [msp] DeserializeIdentity -> DEBU a24 Obtaining identity" -"2019-07-20 02:39:45.384 UTC [msp.identity] newIdentity -> DEBU a25 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.384 UTC [cauthdsl] func1 -> DEBU a26 0xc000d78fa0 gate 1563590385384567000 evaluation starts" -"2019-07-20 02:39:45.384 UTC [cauthdsl] func2 -> DEBU a27 0xc000d78fa0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:45.384 UTC [cauthdsl] func2 -> DEBU a28 0xc000d78fa0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:45.385 UTC [cauthdsl] func2 -> DEBU a29 0xc000d78fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:45.385 UTC [cauthdsl] func2 -> DEBU a2a 0xc000d78fa0 principal evaluation fails" -"2019-07-20 02:39:45.385 UTC [cauthdsl] func1 -> DEBU a2b 0xc000d78fa0 gate 1563590385384567000 evaluation fails" -"2019-07-20 02:39:45.385 UTC [policies] Evaluate -> DEBU a2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:45.386 UTC [policies] Evaluate -> DEBU a2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:45.386 UTC [policies] Evaluate -> DEBU a2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-07-20 02:39:45.386 UTC [cauthdsl] func1 -> DEBU a2f 0xc000de6120 gate 1563590385386826000 evaluation starts" -"2019-07-20 02:39:45.387 UTC [cauthdsl] func2 -> DEBU a30 0xc000de6120 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:45.387 UTC [cauthdsl] func2 -> DEBU a31 0xc000de6120 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:45.387 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a32 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-07-20 02:39:45.387 UTC [msp] Validate -> DEBU a33 MSP Org2MSP validating identity" -"2019-07-20 02:39:45.388 UTC [msp] getCertificationChain -> DEBU a34 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:45.388 UTC [cauthdsl] func2 -> DEBU a35 0xc000de6120 principal matched by identity 0" -"2019-07-20 02:39:45.388 UTC [msp.identity] Verify -> DEBU a36 Verify: digest = 00000000 c5 5a be 1c 29 23 7f 23 39 cf 17 a5 ec 41 e6 c6 |.Z..)#.#9....A..| -00000010 6f c0 2d c4 a5 ab 38 7c ca 36 84 c1 82 cb 1a ce |o.-...8|.6......|" -"2019-07-20 02:39:45.388 UTC [msp.identity] Verify -> DEBU a37 Verify: sig = 00000000 30 44 02 20 67 a5 33 2b c9 f6 28 3d aa 68 79 ec |0D. g.3+..(=.hy.| -00000010 a7 ff 72 cb 1b 25 d6 49 4b fe 8b 44 16 b2 4e e7 |..r..%.IK..D..N.| -00000020 f3 91 ef 22 02 20 7a c3 5b 30 ad 9e 74 1f be 45 |...". z.[0..t..E| -00000030 40 b9 97 df 12 3f 78 68 99 6b 59 36 ec 06 5c 86 |@....?xh.kY6..\.| -00000040 1f 95 16 08 41 48 |....AH|" -"2019-07-20 02:39:45.389 UTC [cauthdsl] func2 -> DEBU a38 0xc000de6120 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:45.389 UTC [cauthdsl] func1 -> DEBU a39 0xc000de6120 gate 1563590385386826000 evaluation succeeds" -"2019-07-20 02:39:45.389 UTC [policies] Evaluate -> DEBU a3a Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:45.389 UTC [policies] Evaluate -> DEBU a3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3c Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3e Signature set satisfies policy /Channel/Writers" -"2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a48 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:45.393 UTC [common.configtx] verifyDeltaSet -> DEBU a51 Processing change to key: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:45.393 UTC [common.configtx] policyForItem -> DEBU a52 Getting policy for item Org2MSP with mod_policy Admins" -"2019-07-20 02:39:45.393 UTC [policies] Manager -> DEBU a53 Manager Channel looking up path [Application]" -"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a54 Manager Channel has managers Application" -"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a55 Manager Channel has managers Orderer" -"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a56 Manager Channel/Application looking up path []" -"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a57 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a58 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a59 Manager Channel/Application looking up path [Org2MSP]" -"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a5a Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:45.395 UTC [policies] Manager -> DEBU a5b Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:45.395 UTC [policies] Manager -> DEBU a5c Manager Channel/Application/Org2MSP looking up path []" -"2019-07-20 02:39:45.395 UTC [policies] Evaluate -> DEBU a5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-07-20 02:39:45.396 UTC [cauthdsl] func1 -> DEBU a5e 0xc000f4d0a0 gate 1563590385396347200 evaluation starts" -"2019-07-20 02:39:45.396 UTC [cauthdsl] func2 -> DEBU a5f 0xc000f4d0a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:45.396 UTC [cauthdsl] func2 -> DEBU a60 0xc000f4d0a0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:45.397 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a61 Checking if identity satisfies ADMIN role for Org2MSP" -"2019-07-20 02:39:45.397 UTC [cauthdsl] func2 -> DEBU a62 0xc000f4d0a0 principal matched by identity 0" -"2019-07-20 02:39:45.397 UTC [msp.identity] Verify -> DEBU a63 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| -00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" -"2019-07-20 02:39:45.398 UTC [msp.identity] Verify -> DEBU a64 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| -00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| -00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| -00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| -00000040 e9 49 62 bf 87 8d |.Ib...|" -"2019-07-20 02:39:45.398 UTC [cauthdsl] func2 -> DEBU a65 0xc000f4d0a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:45.398 UTC [cauthdsl] func1 -> DEBU a66 0xc000f4d0a0 gate 1563590385396347200 evaluation succeeds" -"2019-07-20 02:39:45.398 UTC [policies] Evaluate -> DEBU a67 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:45.398 UTC [policies] Evaluate -> DEBU a68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:45.398 UTC [common.configtx] verifyDeltaSet -> DEBU a69 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6a Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6c Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6d Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6e Setting policy for key Readers to " -"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6f Setting policy for key Writers to " -"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a70 Setting policy for key Admins to " -"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a71 Setting policy for key Endorsement to " -"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a72 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a73 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a74 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a75 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a76 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a77 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a78 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a79 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7a Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7b Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7c Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7d Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.402 UTC [common.configtx] recurseConfigMap -> DEBU a7e Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.403 UTC [common.configtx] recurseConfigMap -> DEBU a7f Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.403 UTC [common.configtx] recurseConfigMap -> DEBU a80 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a81 Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a82 Processing field: HashingAlgorithm" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a83 Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a84 Processing field: OrdererAddresses" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a85 Processing field: Consortium" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a86 Processing field: Capabilities" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a87 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a88 Processing field: ACLs" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a89 Processing field: Capabilities" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a8a Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8b Processing field: AnchorPeers" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a8c Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8d Processing field: MSP" -"2019-07-20 02:39:45.403 UTC [common.channelconfig] Validate -> DEBU a8e Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:39:45.404 UTC [common.channelconfig] validateMSP -> DEBU a8f Setting up MSP for org Org1MSP" -"2019-07-20 02:39:45.404 UTC [msp] newBccspMsp -> DEBU a90 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:45.404 UTC [msp] New -> DEBU a91 Creating Cache-MSP instance" -"2019-07-20 02:39:45.404 UTC [msp] Setup -> DEBU a92 Setting up MSP instance Org1MSP" -"2019-07-20 02:39:45.404 UTC [msp.identity] newIdentity -> DEBU a93 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-07-20 02:39:45.405 UTC [msp.identity] newIdentity -> DEBU a94 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.405 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a95 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:45.405 UTC [msp] Validate -> DEBU a96 MSP Org1MSP validating identity" -"2019-07-20 02:39:45.405 UTC [msp] getCertificationChain -> DEBU a97 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:45.405 UTC [msp] hasOURole -> DEBU a98 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:45.405 UTC [msp] getCertificationChain -> DEBU a99 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:45.406 UTC [common.channelconfig] NewStandardValues -> DEBU a9a Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:45.406 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9b Processing field: AnchorPeers" -"2019-07-20 02:39:45.406 UTC [common.channelconfig] NewStandardValues -> DEBU a9c Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:45.406 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9d Processing field: MSP" -"2019-07-20 02:39:45.406 UTC [common.channelconfig] Validate -> DEBU a9e Anchor peers for org Org2MSP are anchor_peers: " -"2019-07-20 02:39:45.406 UTC [common.channelconfig] validateMSP -> DEBU a9f Setting up MSP for org Org2MSP" -"2019-07-20 02:39:45.406 UTC [msp] newBccspMsp -> DEBU aa0 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:45.406 UTC [msp] New -> DEBU aa1 Creating Cache-MSP instance" -"2019-07-20 02:39:45.407 UTC [msp] Setup -> DEBU aa2 Setting up MSP instance Org2MSP" -"2019-07-20 02:39:45.407 UTC [msp.identity] newIdentity -> DEBU aa3 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.408 UTC [msp.identity] newIdentity -> DEBU aa4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.409 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU aa5 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:45.409 UTC [msp] Validate -> DEBU aa6 MSP Org2MSP validating identity" -"2019-07-20 02:39:45.410 UTC [msp] getCertificationChain -> DEBU aa7 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:45.410 UTC [msp] hasOURole -> DEBU aa8 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:45.410 UTC [msp] getCertificationChain -> DEBU aa9 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:45.411 UTC [common.channelconfig] NewStandardValues -> DEBU aaa Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:45.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU aab Processing field: ConsensusType" -"2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aac Processing field: BatchSize" -"2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aad Processing field: BatchTimeout" -"2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aae Processing field: KafkaBrokers" -"2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aaf Processing field: ChannelRestrictions" -"2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab0 Processing field: Capabilities" -"2019-07-20 02:39:45.413 UTC [common.channelconfig] NewStandardValues -> DEBU ab1 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab2 Processing field: Endpoints" -"2019-07-20 02:39:45.413 UTC [common.channelconfig] NewStandardValues -> DEBU ab3 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab4 Processing field: MSP" -"2019-07-20 02:39:45.413 UTC [common.channelconfig] validateMSP -> DEBU ab5 Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:45.413 UTC [msp] newBccspMsp -> DEBU ab6 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:45.414 UTC [msp] New -> DEBU ab7 Creating Cache-MSP instance" -"2019-07-20 02:39:45.414 UTC [msp] Setup -> DEBU ab8 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:45.415 UTC [msp.identity] newIdentity -> DEBU ab9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:39:45.415 UTC [msp.identity] newIdentity -> DEBU aba Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.416 UTC [msp] Validate -> DEBU abb MSP OrdererMSP validating identity" -"2019-07-20 02:39:45.416 UTC [msp] Setup -> DEBU abc Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:45.416 UTC [msp] Setup -> DEBU abd MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:45.416 UTC [policies] NewManagerImpl -> DEBU abe Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU abf Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac0 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac1 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac2 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac3 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac4 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac5 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac6 Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac7 Proposed new policy Readers for Channel/Application" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac8 Proposed new policy Writers for Channel/Application" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac9 Proposed new policy Admins for Channel/Application" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU aca Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acb Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acc Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acd Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ace Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acf Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ad0 Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ad1 Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad2 Proposed new policy Writers for Channel" -"2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad3 Proposed new policy Admins for Channel" -"2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad4 Proposed new policy Readers for Channel" -"2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad5 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad6 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad7 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ad9 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ada Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU adb Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU adc Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU add Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ade Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU adf Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae0 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae9 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aea Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aeb Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aec Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aed Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aee Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU af0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU af1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af3 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af5 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af7 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af9 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afa Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afb Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afc Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afd Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU afe Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU aff Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b00 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b01 Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b02 Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:45.427 UTC [common.channelconfig] LogSanityChecks -> DEBU b03 As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:39:45.428 UTC [common.channelconfig] LogSanityChecks -> DEBU b04 As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b05 Manager Channel looking up path [Application]" -"2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b06 Manager Channel has managers Orderer" -"2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b07 Manager Channel has managers Application" -"2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b08 Manager Channel/Application looking up path []" -"2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b09 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:45.429 UTC [policies] Manager -> DEBU b0a Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0b As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0c As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0d As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-07-20 02:39:45.429 UTC [policies] Manager -> DEBU b0e Manager Channel looking up path [Orderer]" -"2019-07-20 02:39:45.430 UTC [policies] Manager -> DEBU b0f Manager Channel has managers Application" -"2019-07-20 02:39:45.430 UTC [policies] Manager -> DEBU b10 Manager Channel has managers Orderer" -"2019-07-20 02:39:45.431 UTC [policies] Manager -> DEBU b11 Manager Channel/Orderer looking up path []" -"2019-07-20 02:39:45.431 UTC [policies] Manager -> DEBU b12 Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b13 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b14 As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b15 As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b16 As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:39:45.432 UTC [common.capabilities] Supported -> DEBU b17 Orderer capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:45.432 UTC [common.capabilities] Supported -> DEBU b18 Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:45.432 UTC [msp] GetDefaultSigningIdentity -> DEBU b19 Obtaining default signing identity" -"2019-07-20 02:39:45.432 UTC [msp] GetDefaultSigningIdentity -> DEBU b1a Obtaining default signing identity" -"2019-07-20 02:39:45.433 UTC [msp.identity] Sign -> DEBU b1b Sign: plaintext: 0AD2060A1B08011A0608F1FDC9E90522...7868996B5936EC065C861F9516084148 " -"2019-07-20 02:39:45.433 UTC [msp.identity] Sign -> DEBU b1c Sign: digest: 9F6D0925EE9C0929724A0054A3E76FD29F7437D20D76847EDFA00754ACB3E3A9 " -"2019-07-20 02:39:45.433 UTC [policies] Evaluate -> DEBU b1d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-07-20 02:39:45.433 UTC [policies] Evaluate -> DEBU b1e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:39:45.434 UTC [msp] DeserializeIdentity -> DEBU b22 Obtaining identity" -"2019-07-20 02:39:45.434 UTC [msp.identity] newIdentity -> DEBU b23 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -QQ== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.435 UTC [cauthdsl] func1 -> DEBU b24 0xc001032ed0 gate 1563590385435836700 evaluation starts" -"2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b25 0xc001032ed0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b26 0xc001032ed0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b27 0xc001032ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b28 0xc001032ed0 principal evaluation fails" -"2019-07-20 02:39:45.436 UTC [cauthdsl] func1 -> DEBU b29 0xc001032ed0 gate 1563590385435836700 evaluation fails" -"2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-07-20 02:39:45.437 UTC [cauthdsl] func1 -> DEBU b2d 0xc00105c010 gate 1563590385437043000 evaluation starts" -"2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b2e 0xc00105c010 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b2f 0xc00105c010 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b30 0xc00105c010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b31 0xc00105c010 principal evaluation fails" -"2019-07-20 02:39:45.437 UTC [cauthdsl] func1 -> DEBU b32 0xc00105c010 gate 1563590385437043000 evaluation fails" -"2019-07-20 02:39:45.437 UTC [policies] Evaluate -> DEBU b33 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:45.437 UTC [policies] Evaluate -> DEBU b34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:45.437 UTC [policies] func1 -> DEBU b35 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" -"2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b36 Signature set did not satisfy policy /Channel/Application/Writers" -"2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b3a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:39:45.438 UTC [cauthdsl] func1 -> DEBU b3b 0xc00105cd20 gate 1563590385438562200 evaluation starts" -"2019-07-20 02:39:45.438 UTC [cauthdsl] func2 -> DEBU b3c 0xc00105cd20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:45.439 UTC [cauthdsl] func2 -> DEBU b3d 0xc00105cd20 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:45.439 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b3e Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-07-20 02:39:45.439 UTC [msp] Validate -> DEBU b3f MSP OrdererMSP validating identity" -"2019-07-20 02:39:45.439 UTC [cauthdsl] func2 -> DEBU b40 0xc00105cd20 principal matched by identity 0" -"2019-07-20 02:39:45.439 UTC [msp.identity] Verify -> DEBU b41 Verify: digest = 00000000 9f 6d 09 25 ee 9c 09 29 72 4a 00 54 a3 e7 6f d2 |.m.%...)rJ.T..o.| -00000010 9f 74 37 d2 0d 76 84 7e df a0 07 54 ac b3 e3 a9 |.t7..v.~...T....|" -"2019-07-20 02:39:45.439 UTC [msp.identity] Verify -> DEBU b42 Verify: sig = 00000000 30 44 02 20 43 91 94 43 2a 23 d1 f0 c2 88 cb 7d |0D. C..C*#.....}| -00000010 79 5b 76 27 65 24 8c 15 89 2e 1f 51 c1 4e e9 6a |y[v'e$.....Q.N.j| -00000020 ba 07 4f ab 02 20 44 33 10 d9 f7 5c e3 28 87 66 |..O.. D3...\.(.f| -00000030 42 a7 ee f2 26 00 13 eb e7 18 7d a2 30 c1 25 a0 |B...&.....}.0.%.| -00000040 cb 1b 9e a8 cb 43 |.....C|" -"2019-07-20 02:39:45.440 UTC [cauthdsl] func2 -> DEBU b43 0xc00105cd20 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:45.440 UTC [cauthdsl] func1 -> DEBU b44 0xc00105cd20 gate 1563590385438562200 evaluation succeeds" -"2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b45 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b46 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b47 Signature set satisfies policy /Channel/Orderer/Writers" -"2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b49 Signature set satisfies policy /Channel/Writers" -"2019-07-20 02:39:45.441 UTC [policies] Evaluate -> DEBU b4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-07-20 02:39:45.441 UTC [orderer.common.msgprocessor] Apply -> DEBU b4b Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel -"2019-07-20 02:39:45.441 UTC [common.channelconfig] NewStandardValues -> DEBU b4c Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:45.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4d Processing field: HashingAlgorithm" -"2019-07-20 02:39:45.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4e Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4f Processing field: OrdererAddresses" -"2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b50 Processing field: Consortium" -"2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b51 Processing field: Capabilities" -"2019-07-20 02:39:45.442 UTC [common.channelconfig] NewStandardValues -> DEBU b52 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b53 Processing field: ACLs" -"2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b54 Processing field: Capabilities" -"2019-07-20 02:39:45.443 UTC [common.channelconfig] NewStandardValues -> DEBU b55 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:45.443 UTC [common.channelconfig] initializeProtosStruct -> DEBU b56 Processing field: AnchorPeers" -"2019-07-20 02:39:45.443 UTC [common.channelconfig] NewStandardValues -> DEBU b57 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:45.443 UTC [common.channelconfig] initializeProtosStruct -> DEBU b58 Processing field: MSP" -"2019-07-20 02:39:45.443 UTC [common.channelconfig] Validate -> DEBU b59 Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:39:45.443 UTC [common.channelconfig] validateMSP -> DEBU b5a Setting up MSP for org Org1MSP" -"2019-07-20 02:39:45.443 UTC [msp] newBccspMsp -> DEBU b5b Creating BCCSP-based MSP instance" -"2019-07-20 02:39:45.443 UTC [msp] New -> DEBU b5c Creating Cache-MSP instance" -"2019-07-20 02:39:45.443 UTC [msp] Setup -> DEBU b5d Setting up MSP instance Org1MSP" -"2019-07-20 02:39:45.443 UTC [msp.identity] newIdentity -> DEBU b5e Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-07-20 02:39:45.444 UTC [msp.identity] newIdentity -> DEBU b5f Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.444 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b60 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:45.445 UTC [msp] Validate -> DEBU b61 MSP Org1MSP validating identity" -"2019-07-20 02:39:45.445 UTC [msp] getCertificationChain -> DEBU b62 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:45.446 UTC [msp] hasOURole -> DEBU b63 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:45.446 UTC [msp] getCertificationChain -> DEBU b64 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:45.446 UTC [common.channelconfig] NewStandardValues -> DEBU b65 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:45.446 UTC [common.channelconfig] initializeProtosStruct -> DEBU b66 Processing field: AnchorPeers" -"2019-07-20 02:39:45.446 UTC [common.channelconfig] NewStandardValues -> DEBU b67 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:45.446 UTC [common.channelconfig] initializeProtosStruct -> DEBU b68 Processing field: MSP" -"2019-07-20 02:39:45.447 UTC [common.channelconfig] Validate -> DEBU b69 Anchor peers for org Org2MSP are anchor_peers: " -"2019-07-20 02:39:45.447 UTC [common.channelconfig] validateMSP -> DEBU b6a Setting up MSP for org Org2MSP" -"2019-07-20 02:39:45.447 UTC [msp] newBccspMsp -> DEBU b6b Creating BCCSP-based MSP instance" -"2019-07-20 02:39:45.447 UTC [msp] New -> DEBU b6c Creating Cache-MSP instance" -"2019-07-20 02:39:45.447 UTC [msp] Setup -> DEBU b6d Setting up MSP instance Org2MSP" -"2019-07-20 02:39:45.447 UTC [msp.identity] newIdentity -> DEBU b6e Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.448 UTC [msp.identity] newIdentity -> DEBU b6f Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.448 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b70 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:45.448 UTC [msp] Validate -> DEBU b71 MSP Org2MSP validating identity" -"2019-07-20 02:39:45.448 UTC [msp] getCertificationChain -> DEBU b72 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:45.449 UTC [msp] hasOURole -> DEBU b73 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:45.449 UTC [msp] getCertificationChain -> DEBU b74 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b75 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b76 Processing field: ConsensusType" -"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b77 Processing field: BatchSize" -"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b78 Processing field: BatchTimeout" -"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b79 Processing field: KafkaBrokers" -"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7a Processing field: ChannelRestrictions" -"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7b Processing field: Capabilities" -"2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b7c Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7d Processing field: Endpoints" -"2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b7e Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7f Processing field: MSP" -"2019-07-20 02:39:45.450 UTC [common.channelconfig] validateMSP -> DEBU b80 Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:45.450 UTC [msp] newBccspMsp -> DEBU b81 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:45.450 UTC [msp] New -> DEBU b82 Creating Cache-MSP instance" -"2019-07-20 02:39:45.450 UTC [msp] Setup -> DEBU b83 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:45.450 UTC [msp.identity] newIdentity -> DEBU b84 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:39:45.450 UTC [msp.identity] newIdentity -> DEBU b85 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.451 UTC [msp] Validate -> DEBU b86 MSP OrdererMSP validating identity" -"2019-07-20 02:39:45.451 UTC [msp] Setup -> DEBU b87 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:45.451 UTC [msp] Setup -> DEBU b88 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:45.451 UTC [policies] NewManagerImpl -> DEBU b89 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.451 UTC [policies] NewManagerImpl -> DEBU b8a Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8b Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8c Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8d Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8e Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8f Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b90 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b91 Proposed new policy Admins for Channel/Application" -"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b92 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b93 Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b94 Proposed new policy Readers for Channel/Application" -"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b95 Proposed new policy Writers for Channel/Application" -"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b96 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b97 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b98 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b99 Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9a Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9b Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9c Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9d Proposed new policy Writers for Channel" -"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9e Proposed new policy Admins for Channel" -"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9f Proposed new policy Readers for Channel" -"2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba0 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba1 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba2 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba3 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba4 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU baa Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bad Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bae Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU baf Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb0 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb1 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb2 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb3 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb4 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb5 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb6 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb7 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bba Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbd Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbe Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbf Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc0 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc1 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc2 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc4 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc5 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc6 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc7 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc8 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bca Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcb Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcc Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcd Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] propose -> INFO bce Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-07-20 02:39:45.456 UTC [orderer.common.broadcast] ProcessMessage -> DEBU bcf [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39072" -"2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] serveRequest -> INFO bd0 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -"2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] 2 -> DEBU bd1 Proposed block [2] to raft consensus" channel=businesschannel node=1 -"2019-07-20 02:39:45.463 UTC [common.deliver] Handle -> WARN bd2 Error reading from 172.18.0.9:39070: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:45.463 UTC [orderer.common.server] func1 -> DEBU bd3 Closing Deliver stream" -"2019-07-20 02:39:45.463 UTC [comm.grpc.server] 1 -> INFO bd4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39070 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=99.9045ms -"2019-07-20 02:39:45.464 UTC [grpc] infof -> DEBU bd5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:45.464 UTC [orderer.common.broadcast] Handle -> WARN bd6 Error reading from 172.18.0.9:39072: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:45.464 UTC [orderer.common.server] func1 -> DEBU bd7 Closing Broadcast stream" -"2019-07-20 02:39:45.464 UTC [comm.grpc.server] 1 -> INFO bd8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39072 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=83.1023ms -"2019-07-20 02:39:45.464 UTC [grpc] infof -> DEBU bd9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:45.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bda Sending msg of 22872 bytes to 2 on channel businesschannel took 19.8µs" -"2019-07-20 02:39:45.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bdb Sending msg of 22872 bytes to 3 on channel businesschannel took 14µs" -"2019-07-20 02:39:45.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU bdc Send of ConsensusRequest for channel businesschannel with payload of size 22872 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " -"2019-07-20 02:39:45.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU bdd Send of ConsensusRequest for channel businesschannel with payload of size 22872 to orderer1.example.com(orderer1.example.com:7050) took 94.8µs " -"2019-07-20 02:39:45.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU bde Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bdf Sending msg of 28 bytes to 2 on channel businesschannel took 9.1µs" -"2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be0 Sending msg of 28 bytes to 3 on channel businesschannel took 48.5µs" -"2019-07-20 02:39:45.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU be1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " -"2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] writeBlock -> INFO be2 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 -"2019-07-20 02:39:45.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU be3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be4 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be5 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be6 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bea Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU beb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bec Adding to config map: [Group] /Channel" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bed Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bee Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bef Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:45.473 UTC [common.configtx] verifyDeltaSet -> DEBU bf5 Processing change to key: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:45.473 UTC [common.configtx] policyForItem -> DEBU bf6 Getting policy for item Org2MSP with mod_policy Admins" -"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf7 Manager Channel looking up path [Application]" -"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf8 Manager Channel has managers Orderer" -"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf9 Manager Channel has managers Application" -"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfa Manager Channel/Application looking up path []" -"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfb Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfc Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfd Manager Channel/Application looking up path [Org2MSP]" -"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfe Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bff Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU c00 Manager Channel/Application/Org2MSP looking up path []" -"2019-07-20 02:39:45.473 UTC [policies] Evaluate -> DEBU c01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-07-20 02:39:45.474 UTC [cauthdsl] func1 -> DEBU c02 0xc0011fb840 gate 1563590385474029500 evaluation starts" -"2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c03 0xc0011fb840 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c04 0xc0011fb840 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c05 0xc0011fb840 principal matched by identity 0" -"2019-07-20 02:39:45.474 UTC [msp.identity] Verify -> DEBU c06 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| -00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" -"2019-07-20 02:39:45.474 UTC [msp.identity] Verify -> DEBU c07 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| -00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| -00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| -00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| -00000040 e9 49 62 bf 87 8d |.Ib...|" -"2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c08 0xc0011fb840 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:45.474 UTC [cauthdsl] func1 -> DEBU c09 0xc0011fb840 gate 1563590385474029500 evaluation succeeds" -"2019-07-20 02:39:45.474 UTC [policies] Evaluate -> DEBU c0a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:45.474 UTC [policies] Evaluate -> DEBU c0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:45.474 UTC [common.configtx] verifyDeltaSet -> DEBU c0c Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0d Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0e Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0f Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c10 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c11 Setting policy for key Readers to " -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c12 Setting policy for key Writers to " -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c13 Setting policy for key Admins to " -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c14 Setting policy for key Endorsement to " -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c15 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c16 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c17 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c18 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.476 UTC [orderer.common.cluster.step] sendMessage -> DEBU c19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.3075ms " -"2019-07-20 02:39:45.476 UTC [common.configtx] recurseConfigMap -> DEBU c1a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.489 UTC [common.configtx] recurseConfigMap -> DEBU c1b Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.489 UTC [common.configtx] recurseConfigMap -> DEBU c1c Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.490 UTC [common.configtx] recurseConfigMap -> DEBU c1d Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.490 UTC [common.configtx] recurseConfigMap -> DEBU c1e Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.491 UTC [common.configtx] recurseConfigMap -> DEBU c1f Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.491 UTC [common.configtx] recurseConfigMap -> DEBU c20 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.492 UTC [common.configtx] recurseConfigMap -> DEBU c21 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c22 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c23 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c24 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:45.494 UTC [common.channelconfig] NewStandardValues -> DEBU c25 Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:45.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU c26 Processing field: HashingAlgorithm" -"2019-07-20 02:39:45.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU c27 Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c28 Processing field: OrdererAddresses" -"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c29 Processing field: Consortium" -"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2a Processing field: Capabilities" -"2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c2b Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2c Processing field: ACLs" -"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2d Processing field: Capabilities" -"2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c2e Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2f Processing field: AnchorPeers" -"2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c30 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c31 Processing field: MSP" -"2019-07-20 02:39:45.495 UTC [common.channelconfig] Validate -> DEBU c32 Anchor peers for org Org2MSP are anchor_peers: " -"2019-07-20 02:39:45.495 UTC [common.channelconfig] validateMSP -> DEBU c33 Setting up MSP for org Org2MSP" -"2019-07-20 02:39:45.495 UTC [msp] newBccspMsp -> DEBU c34 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:45.495 UTC [msp] New -> DEBU c35 Creating Cache-MSP instance" -"2019-07-20 02:39:45.495 UTC [msp] Setup -> DEBU c36 Setting up MSP instance Org2MSP" -"2019-07-20 02:39:45.496 UTC [msp.identity] newIdentity -> DEBU c37 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.496 UTC [msp.identity] newIdentity -> DEBU c38 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.500 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c39 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:45.500 UTC [msp] Validate -> DEBU c3a MSP Org2MSP validating identity" -"2019-07-20 02:39:45.500 UTC [msp] getCertificationChain -> DEBU c3b MSP Org2MSP getting certification chain" -"2019-07-20 02:39:45.501 UTC [msp] hasOURole -> DEBU c3c MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:45.501 UTC [msp] getCertificationChain -> DEBU c3d MSP Org2MSP getting certification chain" -"2019-07-20 02:39:45.501 UTC [common.channelconfig] NewStandardValues -> DEBU c3e Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:45.501 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3f Processing field: AnchorPeers" -"2019-07-20 02:39:45.501 UTC [common.channelconfig] NewStandardValues -> DEBU c40 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:45.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU c41 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:45.501 UTC [common.channelconfig] initializeProtosStruct -> DEBU c42 Processing field: MSP" -"2019-07-20 02:39:45.505 UTC [common.channelconfig] Validate -> DEBU c43 Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:39:45.505 UTC [common.channelconfig] validateMSP -> DEBU c44 Setting up MSP for org Org1MSP" -"2019-07-20 02:39:45.505 UTC [msp] newBccspMsp -> DEBU c45 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:45.505 UTC [msp] New -> DEBU c46 Creating Cache-MSP instance" -"2019-07-20 02:39:45.505 UTC [msp] Setup -> DEBU c47 Setting up MSP instance Org1MSP" -"2019-07-20 02:39:45.505 UTC [msp.identity] newIdentity -> DEBU c48 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-07-20 02:39:45.506 UTC [msp.identity] newIdentity -> DEBU c49 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.506 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c4a Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:45.506 UTC [msp] Validate -> DEBU c4b MSP Org1MSP validating identity" -"2019-07-20 02:39:45.514 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:45.516 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:45.516 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4e Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" -"2019-07-20 02:39:45.515 UTC [msp] getCertificationChain -> DEBU c4f MSP Org1MSP getting certification chain" -"2019-07-20 02:39:45.521 UTC [msp] hasOURole -> DEBU c50 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:45.521 UTC [msp] getCertificationChain -> DEBU c51 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:45.522 UTC [common.channelconfig] NewStandardValues -> DEBU c52 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c53 Processing field: ConsensusType" -"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c54 Processing field: BatchSize" -"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c55 Processing field: BatchTimeout" -"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c56 Processing field: KafkaBrokers" -"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c57 Processing field: ChannelRestrictions" -"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c58 Processing field: Capabilities" -"2019-07-20 02:39:45.523 UTC [common.channelconfig] NewStandardValues -> DEBU c59 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:45.523 UTC [common.channelconfig] initializeProtosStruct -> DEBU c5a Processing field: Endpoints" -"2019-07-20 02:39:45.523 UTC [common.channelconfig] NewStandardValues -> DEBU c5b Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:45.523 UTC [common.channelconfig] initializeProtosStruct -> DEBU c5c Processing field: MSP" -"2019-07-20 02:39:45.523 UTC [common.channelconfig] validateMSP -> DEBU c5d Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:45.524 UTC [msp] newBccspMsp -> DEBU c5e Creating BCCSP-based MSP instance" -"2019-07-20 02:39:45.524 UTC [msp] New -> DEBU c5f Creating Cache-MSP instance" -"2019-07-20 02:39:45.524 UTC [orderer.common.cluster.step] sendMessage -> DEBU c60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " -"2019-07-20 02:39:45.525 UTC [msp] Setup -> DEBU c61 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:45.525 UTC [msp.identity] newIdentity -> DEBU c62 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:39:45.526 UTC [msp.identity] newIdentity -> DEBU c63 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:39:45.526 UTC [msp] Validate -> DEBU c64 MSP OrdererMSP validating identity" -"2019-07-20 02:39:45.527 UTC [msp] Setup -> DEBU c65 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:45.527 UTC [msp] Setup -> DEBU c66 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c67 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c68 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c69 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6a Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6b Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6c Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6d Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6e Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6f Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c70 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c71 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c72 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c73 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c74 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c75 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c76 Proposed new policy Admins for Channel/Application" -"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c77 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c78 Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c79 Proposed new policy Readers for Channel/Application" -"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7a Proposed new policy Writers for Channel/Application" -"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7b Proposed new policy Writers for Channel" -"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7c Proposed new policy Admins for Channel" -"2019-07-20 02:39:45.530 UTC [policies] NewManagerImpl -> DEBU c7d Proposed new policy Readers for Channel" -"2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c7e Adding to config map: [Group] /Channel" -"2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c7f Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c80 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c81 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c82 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c83 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c84 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c85 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c86 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c87 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c88 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c89 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8c Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8e Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c8f Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c90 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c91 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c92 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c93 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c94 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c95 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c96 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c97 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c98 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c99 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9b Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9c Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9f Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca0 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca1 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca2 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca4 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca5 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca7 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca8 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca9 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU caa Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU cab Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:45.534 UTC [common.channelconfig] LogSanityChecks -> DEBU cac As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:39:45.534 UTC [common.channelconfig] LogSanityChecks -> DEBU cad As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cae Manager Channel looking up path [Application]" -"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU caf Manager Channel has managers Orderer" -"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb0 Manager Channel has managers Application" -"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb1 Manager Channel/Application looking up path []" -"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb2 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb3 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb4 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb5 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb6 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb7 Manager Channel looking up path [Orderer]" -"2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb8 Manager Channel has managers Orderer" -"2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb9 Manager Channel has managers Application" -"2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cba Manager Channel/Orderer looking up path []" -"2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cbb Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbd As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbe As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:39:45.537 UTC [common.channelconfig] LogSanityChecks -> DEBU cbf As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:39:45.537 UTC [common.capabilities] Supported -> DEBU cc0 Orderer capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:45.537 UTC [common.capabilities] Supported -> DEBU cc1 Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:45.537 UTC [orderer.common.server] func1 -> DEBU cc2 Executing callback to update root CAs" -"2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc3 updating root CAs for channel [businesschannel]" -"2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc4 adding orderer root CAs for MSP [OrdererMSP]" -"2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc5 adding app root CAs for MSP [Org2MSP]" -"2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc6 adding app root CAs for MSP [Org1MSP]" -"2019-07-20 02:39:45.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cc7 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" -"2019-07-20 02:39:45.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cc8 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -"2019-07-20 02:39:45.538 UTC [msp] GetDefaultSigningIdentity -> DEBU cc9 Obtaining default signing identity" -"2019-07-20 02:39:45.538 UTC [msp] GetDefaultSigningIdentity -> DEBU cca Obtaining default signing identity" -"2019-07-20 02:39:45.538 UTC [msp.identity] Sign -> DEBU ccb Sign: plaintext: 0A020802120B0A090A03010203100418...D73374974139F129A9820B7A112A17B7 " -"2019-07-20 02:39:45.538 UTC [msp.identity] Sign -> DEBU ccc Sign: digest: EC2AF97FF1FA7BB4F053EAEFF9365BF57FB7A816189F3740CC5BC0EDB381C885 " -"2019-07-20 02:39:45.541 UTC [fsblkstorage] indexBlock -> DEBU ccd Indexing block [blockNum=2, blockHash=[]byte{0xb0, 0xfa, 0x63, 0xe5, 0xe8, 0x64, 0xcd, 0x16, 0x11, 0x80, 0x50, 0x35, 0x2d, 0xad, 0x86, 0x3a, 0xc1, 0x73, 0xcd, 0x98, 0x4c, 0x4b, 0x68, 0x4e, 0x68, 0x76, 0xba, 0xe2, 0x63, 0x2f, 0x8b, 0x3} txOffsets= -txId=43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f locPointer=offset=71, bytesLength=22741 -]" -"2019-07-20 02:39:45.542 UTC [fsblkstorage] updateCheckpoint -> DEBU cce Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71390], isChainEmpty=[false], lastBlockNumber=[2]" -"2019-07-20 02:39:45.542 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ccf [channel: businesschannel] Wrote block [2]" -"2019-07-20 02:39:45.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd0 Sending msg of 28 bytes to 2 on channel businesschannel took 29.4µs" -"2019-07-20 02:39:45.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd1 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" -"2019-07-20 02:39:45.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.3µs " -"2019-07-20 02:39:45.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.7µs " -"2019-07-20 02:39:45.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:45.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:46.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:46.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd7 Sending msg of 28 bytes to 3 on channel testchainid took 152.2µs" -"2019-07-20 02:39:46.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.1µs " -"2019-07-20 02:39:46.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd9 Sending msg of 28 bytes to 2 on channel businesschannel took 36.3µs" -"2019-07-20 02:39:46.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cda Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" -"2019-07-20 02:39:46.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 433.1µs " -"2019-07-20 02:39:46.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 661.6µs " -"2019-07-20 02:39:46.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:46.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU cde Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:46.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:46.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce0 Sending msg of 28 bytes to 3 on channel testchainid took 441.5µs" -"2019-07-20 02:39:46.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 263.8µs " -"2019-07-20 02:39:46.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce2 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" -"2019-07-20 02:39:46.760 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" -"2019-07-20 02:39:46.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.2µs " -"2019-07-20 02:39:46.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.2µs " -"2019-07-20 02:39:46.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:46.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:47.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:47.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce9 Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" -"2019-07-20 02:39:47.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU cea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.7µs " -"2019-07-20 02:39:47.109 UTC [orderer.common.server] Deliver -> DEBU ceb Starting new Deliver handler" -"2019-07-20 02:39:47.109 UTC [common.deliver] Handle -> DEBU cec Starting new deliver loop for 172.18.0.8:50246" -"2019-07-20 02:39:47.109 UTC [common.deliver] Handle -> DEBU ced Attempting to read seek info message from 172.18.0.8:50246" -"2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cf0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU cf1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU cf2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:39:47.112 UTC [msp] DeserializeIdentity -> DEBU cf3 Obtaining identity" -"2019-07-20 02:39:47.113 UTC [msp.identity] newIdentity -> DEBU cf4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:54.523 UTC [cauthdsl] func1 -> DEBU 70d 0xc000c4d810 gate 1569284694523490100 evaluation starts" +"2019-09-24 00:24:54.523 UTC [cauthdsl] func2 -> DEBU 70e 0xc000c4d810 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:24:54.523 UTC [cauthdsl] func2 -> DEBU 70f 0xc000c4d810 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:24:54.523 UTC [cauthdsl] func2 -> DEBU 710 0xc000c4d810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-09-24 00:24:54.523 UTC [cauthdsl] func2 -> DEBU 711 0xc000c4d810 principal evaluation fails" +"2019-09-24 00:24:54.524 UTC [cauthdsl] func1 -> DEBU 712 0xc000c4d810 gate 1569284694523490100 evaluation fails" +"2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 713 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 714 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:24:54.524 UTC [policies] func1 -> DEBU 715 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 716 Signature set did not satisfy policy /Channel/Orderer/Readers" +"2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 717 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 718 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 719 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:24:54.524 UTC [policies] Evaluate -> DEBU 71a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:24:54.525 UTC [cauthdsl] func1 -> DEBU 71b 0xc000c6f0a0 gate 1569284694525076900 evaluation starts" +"2019-09-24 00:24:54.525 UTC [cauthdsl] func2 -> DEBU 71c 0xc000c6f0a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:24:54.525 UTC [cauthdsl] func2 -> DEBU 71d 0xc000c6f0a0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:24:54.525 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 71e Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 00:24:54.525 UTC [msp] Validate -> DEBU 71f MSP Org1MSP validating identity" +"2019-09-24 00:24:54.525 UTC [msp] getCertificationChain -> DEBU 720 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:54.525 UTC [cauthdsl] func2 -> DEBU 721 0xc000c6f0a0 principal matched by identity 0" +"2019-09-24 00:24:54.525 UTC [msp.identity] Verify -> DEBU 722 Verify: digest = 00000000 8a d6 1d a6 47 89 ab 4c 40 e7 77 66 36 fe 44 6b |....G..L@.wf6.Dk| +00000010 fa c1 36 4d 03 1f 6d 5b 28 03 1a 25 6e b6 72 19 |..6M..m[(..%n.r.|" +"2019-09-24 00:24:54.534 UTC [msp.identity] Verify -> DEBU 723 Verify: sig = 00000000 30 45 02 21 00 e0 db 9d 45 32 5d b0 a0 de 22 f7 |0E.!....E2]...".| +00000010 b5 d5 c0 28 e2 a4 83 92 b9 92 85 21 54 d7 49 a5 |...(.......!T.I.| +00000020 29 bb ee 7b b4 02 20 13 46 2a 79 d3 b7 36 4c eb |)..{.. .F*y..6L.| +00000030 b1 80 eb 63 20 ea 64 3e e4 90 a2 cb 07 7f 2a 94 |...c .d>......*.| +00000040 01 e7 47 0f fe 51 42 |..G..QB|" +"2019-09-24 00:24:54.535 UTC [cauthdsl] func2 -> DEBU 724 0xc000c6f0a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:24:54.537 UTC [cauthdsl] func1 -> DEBU 725 0xc000c6f0a0 gate 1569284694525076900 evaluation succeeds" +"2019-09-24 00:24:54.537 UTC [policies] Evaluate -> DEBU 726 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:24:54.537 UTC [policies] Evaluate -> DEBU 727 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:24:54.537 UTC [policies] Evaluate -> DEBU 728 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:24:54.537 UTC [policies] Evaluate -> DEBU 729 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:24:54.547 UTC [policies] Evaluate -> DEBU 72a Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:24:54.550 UTC [policies] Evaluate -> DEBU 72b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:24:54.563 UTC [common.deliver] deliverBlocks -> DEBU 72c [channel: businesschannel] Received seekInfo (0xc000c23000) start: > stop: > from 172.18.0.9:60646" +"2019-09-24 00:24:54.563 UTC [fsblkstorage] Next -> DEBU 72d Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 00:24:54.563 UTC [fsblkstorage] newBlockfileStream -> DEBU 72e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-09-24 00:24:54.563 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 72f Remaining bytes=[23948], Going to peek [8] bytes" +"2019-09-24 00:24:54.563 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 730 Returning blockbytes - length=[23945], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:24:54.564 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 731 blockbytes [23945] read from file [0]" +"2019-09-24 00:24:54.564 UTC [common.deliver] deliverBlocks -> DEBU 732 [channel: businesschannel] Delivering block for (0xc000c23000) for 172.18.0.9:60646" +"2019-09-24 00:24:54.571 UTC [common.deliver] deliverBlocks -> DEBU 733 [channel: businesschannel] Done delivering to 172.18.0.9:60646 for (0xc000c23000)" +"2019-09-24 00:24:54.574 UTC [common.deliver] Handle -> DEBU 734 Waiting for new SeekInfo from 172.18.0.9:60646" +"2019-09-24 00:24:54.574 UTC [common.deliver] Handle -> DEBU 735 Attempting to read seek info message from 172.18.0.9:60646" +"2019-09-24 00:24:54.580 UTC [grpc] warningf -> DEBU 736 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:60646: read: connection reset by peer" +"2019-09-24 00:24:54.580 UTC [grpc] infof -> DEBU 737 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:24:54.586 UTC [grpc] infof -> DEBU 738 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:24:54.586 UTC [grpc] infof -> DEBU 739 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:24:54.587 UTC [grpc] infof -> DEBU 73a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:24:54.587 UTC [grpc] infof -> DEBU 73b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:24:54.592 UTC [grpc] infof -> DEBU 73c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:24:54.593 UTC [grpc] infof -> DEBU 73d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:24:54.592 UTC [common.deliver] Handle -> DEBU 73e Received EOF from 172.18.0.9:60646, hangup" +"2019-09-24 00:24:54.593 UTC [orderer.common.server] func1 -> DEBU 73f Closing Deliver stream" +"2019-09-24 00:24:54.593 UTC [comm.grpc.server] 1 -> INFO 740 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60646 grpc.code=OK grpc.call_duration=283.1948ms +"2019-09-24 00:24:54.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU 741 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:54.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 742 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +"2019-09-24 00:24:54.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 743 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 215.8µs " +"2019-09-24 00:24:54.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 744 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +"2019-09-24 00:24:54.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 745 Sending msg of 28 bytes to 3 on channel businesschannel took 70.8µs" +"2019-09-24 00:24:54.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 746 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.8µs " +"2019-09-24 00:24:54.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 747 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.3µs " +"2019-09-24 00:24:54.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 748 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:54.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 749 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:55.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:55.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74b Sending msg of 28 bytes to 3 on channel testchainid took 26.7µs" +"2019-09-24 00:24:55.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140µs " +"2019-09-24 00:24:55.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74d Sending msg of 28 bytes to 2 on channel businesschannel took 172.7µs" +"2019-09-24 00:24:55.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74e Sending msg of 28 bytes to 3 on channel businesschannel took 19.4µs" +"2019-09-24 00:24:55.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.4µs " +"2019-09-24 00:24:55.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 750 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 683.5µs " +"2019-09-24 00:24:55.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 751 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:55.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 752 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:55.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 753 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:55.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 754 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2019-09-24 00:24:55.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 755 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.1µs " +"2019-09-24 00:24:55.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 756 Sending msg of 28 bytes to 3 on channel businesschannel took 87µs" +"2019-09-24 00:24:55.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 757 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 771.3µs " +"2019-09-24 00:24:55.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 758 Sending msg of 28 bytes to 2 on channel businesschannel took 1.2075ms" +"2019-09-24 00:24:55.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU 759 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.8796ms " +"2019-09-24 00:24:55.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:56.016 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:56.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:56.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75d Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +"2019-09-24 00:24:56.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 373.8µs " +"2019-09-24 00:24:56.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75f Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-09-24 00:24:56.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 760 Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" +"2019-09-24 00:24:56.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 761 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.4µs " +"2019-09-24 00:24:56.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 762 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.9µs " +"2019-09-24 00:24:56.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 763 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:56.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 764 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:56.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU 765 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:56.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 766 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2019-09-24 00:24:56.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 767 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 216.9µs " +"2019-09-24 00:24:56.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 768 Sending msg of 28 bytes to 2 on channel businesschannel took 44µs" +"2019-09-24 00:24:56.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 769 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2019-09-24 00:24:56.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.5µs " +"2019-09-24 00:24:56.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.6µs " +"2019-09-24 00:24:56.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU 76c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:56.991 UTC [orderer.common.cluster.step] handleMessage -> DEBU 76d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:57.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 76e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:57.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76f Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +"2019-09-24 00:24:57.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 770 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.1µs " +"2019-09-24 00:24:57.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 771 Sending msg of 28 bytes to 3 on channel businesschannel took 126µs" +"2019-09-24 00:24:57.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 772 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.8µs " +"2019-09-24 00:24:57.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 773 Sending msg of 28 bytes to 2 on channel businesschannel took 129.1µs" +"2019-09-24 00:24:57.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 774 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90µs " +"2019-09-24 00:24:57.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU 775 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:57.490 UTC [orderer.common.cluster.step] handleMessage -> DEBU 776 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:57.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU 777 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:57.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 778 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-09-24 00:24:57.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 779 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.4µs " +"2019-09-24 00:24:57.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 77a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.5µs " +"2019-09-24 00:24:57.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 77b Sending msg of 28 bytes to 2 on channel businesschannel took 123.9µs" +"2019-09-24 00:24:57.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 77c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.4µs " +"2019-09-24 00:24:57.988 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 77d Sending msg of 28 bytes to 3 on channel businesschannel took 291.8µs" +"2019-09-24 00:24:57.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 77e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:57.995 UTC [orderer.common.cluster.step] handleMessage -> DEBU 77f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:58.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 780 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:58.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 781 Sending msg of 28 bytes to 3 on channel testchainid took 26.2µs" +"2019-09-24 00:24:58.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 782 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.3µs " +"2019-09-24 00:24:58.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 783 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +"2019-09-24 00:24:58.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 784 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 294.2µs " +"2019-09-24 00:24:58.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 785 Sending msg of 28 bytes to 3 on channel businesschannel took 794.2µs" +"2019-09-24 00:24:58.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU 786 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1264ms " +"2019-09-24 00:24:58.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU 787 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:58.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU 788 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:58.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 789 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:58.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 78a Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +"2019-09-24 00:24:58.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 78b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.1µs " +"2019-09-24 00:24:58.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 78c Sending msg of 28 bytes to 2 on channel businesschannel took 43.9µs" +"2019-09-24 00:24:58.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 78d Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2019-09-24 00:24:58.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 78e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.1µs " +"2019-09-24 00:24:58.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 78f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.2µs " +"2019-09-24 00:24:58.987 UTC [orderer.common.cluster.step] handleMessage -> DEBU 790 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:58.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 791 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:59.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 792 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:59.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 793 Sending msg of 28 bytes to 3 on channel testchainid took 20.3µs" +"2019-09-24 00:24:59.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 794 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93µs " +"2019-09-24 00:24:59.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 795 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +"2019-09-24 00:24:59.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 796 Sending msg of 28 bytes to 3 on channel businesschannel took 28.3µs" +"2019-09-24 00:24:59.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 797 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.7µs " +"2019-09-24 00:24:59.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 798 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.8µs " +"2019-09-24 00:24:59.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 799 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:59.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU 79a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:59.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 79b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:24:59.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 79c Sending msg of 28 bytes to 3 on channel testchainid took 103.1µs" +"2019-09-24 00:24:59.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 79d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.5µs " +"2019-09-24 00:24:59.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 79e Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +"2019-09-24 00:24:59.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 79f Sending msg of 28 bytes to 2 on channel businesschannel took 12.9µs" +"2019-09-24 00:24:59.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.3µs " +"2019-09-24 00:24:59.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.6µs " +"2019-09-24 00:24:59.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7a2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:24:59.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7a3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:00.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7a4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:00.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7a5 Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +"2019-09-24 00:25:00.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7a6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 350.1µs " +"2019-09-24 00:25:00.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7a7 Sending msg of 28 bytes to 3 on channel businesschannel took 23.9µs" +"2019-09-24 00:25:00.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7a8 Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +"2019-09-24 00:25:00.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7a9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.3µs " +"2019-09-24 00:25:00.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 148.8µs " +"2019-09-24 00:25:00.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7ab Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:00.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7ac Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:00.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7ad Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:00.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7ae Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +"2019-09-24 00:25:00.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7af Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " +"2019-09-24 00:25:00.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7b0 Sending msg of 28 bytes to 2 on channel businesschannel took 84µs" +"2019-09-24 00:25:00.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7b1 Sending msg of 28 bytes to 3 on channel businesschannel took 81.6µs" +"2019-09-24 00:25:00.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7b2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81µs " +"2019-09-24 00:25:00.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.3µs " +"2019-09-24 00:25:00.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7b4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:00.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7b5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:01.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7b6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:01.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7b7 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2019-09-24 00:25:01.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7b8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.9µs " +"2019-09-24 00:25:01.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7b9 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2019-09-24 00:25:01.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7ba Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2019-09-24 00:25:01.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7bb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.9µs " +"2019-09-24 00:25:01.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.3µs " +"2019-09-24 00:25:01.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7bd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:01.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7be Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:01.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7bf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:01.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7c0 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-09-24 00:25:01.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7c1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 46.8µs " +"2019-09-24 00:25:01.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7c2 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +"2019-09-24 00:25:01.994 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7c3 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +"2019-09-24 00:25:01.998 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7c4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 376.2µs " +"2019-09-24 00:25:01.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7c5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.9µs " +"2019-09-24 00:25:02.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7c6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:02.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7c7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:02.174 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7c8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:02.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7c9 Sending msg of 28 bytes to 3 on channel testchainid took 49.5µs" +"2019-09-24 00:25:02.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7ca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.6µs " +"2019-09-24 00:25:02.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7cb Sending msg of 28 bytes to 2 on channel businesschannel took 37µs" +"2019-09-24 00:25:02.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7cc Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2019-09-24 00:25:02.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.5µs " +"2019-09-24 00:25:02.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.5µs " +"2019-09-24 00:25:02.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7cf Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:02.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7d0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:02.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7d1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:02.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7d2 Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +"2019-09-24 00:25:02.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7d3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.9µs " +"2019-09-24 00:25:02.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7d4 Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +"2019-09-24 00:25:02.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7d5 Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +"2019-09-24 00:25:02.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7d6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.6µs " +"2019-09-24 00:25:02.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.2µs " +"2019-09-24 00:25:02.987 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7d8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:02.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7d9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:03.176 UTC [orderer.common.cluster.step] handleMessage -> DEBU 7da Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:03.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 7db Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +"2019-09-24 00:25:03.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 7dc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.5µs " +"2019-09-24 00:25:03.294 UTC [orderer.common.server] Deliver -> DEBU 7dd Starting new Deliver handler" +"2019-09-24 00:25:03.294 UTC [common.deliver] Handle -> DEBU 7de Starting new deliver loop for 172.18.0.6:42154" +"2019-09-24 00:25:03.294 UTC [common.deliver] Handle -> DEBU 7df Attempting to read seek info message from 172.18.0.6:42154" +"2019-09-24 00:25:03.296 UTC [policies] Evaluate -> DEBU 7e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:25:03.296 UTC [policies] Evaluate -> DEBU 7e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:03.296 UTC [policies] Evaluate -> DEBU 7e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:25:03.296 UTC [policies] Evaluate -> DEBU 7e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:03.296 UTC [policies] Evaluate -> DEBU 7e4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:25:03.296 UTC [msp] DeserializeIdentity -> DEBU 7e5 Obtaining identity" +"2019-09-24 00:25:03.297 UTC [msp.identity] newIdentity -> DEBU 7e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -4993,1275 +3142,231 @@ BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -----END CERTIFICATE-----" -"2019-07-20 02:39:47.114 UTC [cauthdsl] func1 -> DEBU cf5 0xc00098cf70 gate 1563590387113997400 evaluation starts" -"2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf6 0xc00098cf70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf7 0xc00098cf70 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf8 0xc00098cf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -"2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf9 0xc00098cf70 principal evaluation fails" -"2019-07-20 02:39:47.115 UTC [cauthdsl] func1 -> DEBU cfa 0xc00098cf70 gate 1563590387113997400 evaluation fails" -"2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfb Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:47.115 UTC [policies] func1 -> DEBU cfd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -"2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfe Signature set did not satisfy policy /Channel/Orderer/Readers" -"2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU cff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d00 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d01 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.117 UTC [cauthdsl] func1 -> DEBU d03 0xc000a9a660 gate 1563590387117229100 evaluation starts" -"2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d04 0xc000a9a660 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d05 0xc000a9a660 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d06 0xc000a9a660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.118 UTC [cauthdsl] func2 -> DEBU d07 0xc000a9a660 principal evaluation fails" -"2019-07-20 02:39:47.118 UTC [cauthdsl] func1 -> DEBU d08 0xc000a9a660 gate 1563590387117229100 evaluation fails" -"2019-07-20 02:39:47.118 UTC [policies] Evaluate -> DEBU d09 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.118 UTC [policies] Evaluate -> DEBU d0a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.119 UTC [policies] Evaluate -> DEBU d0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.119 UTC [cauthdsl] func1 -> DEBU d0c 0xc000a9aec0 gate 1563590387119254800 evaluation starts" -"2019-07-20 02:39:47.119 UTC [cauthdsl] func2 -> DEBU d0d 0xc000a9aec0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.119 UTC [cauthdsl] func2 -> DEBU d0e 0xc000a9aec0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:47.119 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d0f Checking if identity satisfies MEMBER role for Org2MSP" -"2019-07-20 02:39:47.119 UTC [msp] Validate -> DEBU d10 MSP Org2MSP validating identity" -"2019-07-20 02:39:47.120 UTC [msp] getCertificationChain -> DEBU d11 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:47.120 UTC [cauthdsl] func2 -> DEBU d12 0xc000a9aec0 principal matched by identity 0" -"2019-07-20 02:39:47.121 UTC [msp.identity] Verify -> DEBU d13 Verify: digest = 00000000 3d ed 09 6a 90 8b ae 36 c4 46 b1 80 9b 79 50 eb |=..j...6.F...yP.| -00000010 e1 9a a4 fa c9 37 7f 0d 0d 0b 13 11 fd b6 13 06 |.....7..........|" -"2019-07-20 02:39:47.121 UTC [msp.identity] Verify -> DEBU d14 Verify: sig = 00000000 30 45 02 21 00 e9 9b b3 fc 5d ce e7 4b 96 63 aa |0E.!.....]..K.c.| -00000010 14 41 1c 1f 69 50 d4 3a 17 7d 9d 0b cf 58 3f 47 |.A..iP.:.}...X?G| -00000020 26 70 94 2d 91 02 20 5d 41 9d 07 80 46 e0 d0 bc |&p.-.. ]A...F...| -00000030 ca 9d b6 fb 58 27 c3 34 1e dc 66 dd 7a ce 6c 67 |....X'.4..f.z.lg| -00000040 f0 df 1f af fc f3 dc |.......|" -"2019-07-20 02:39:47.121 UTC [cauthdsl] func2 -> DEBU d15 0xc000a9aec0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.121 UTC [cauthdsl] func1 -> DEBU d16 0xc000a9aec0 gate 1563590387119254800 evaluation succeeds" -"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d17 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d18 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d19 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1b Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:39:47.122 UTC [common.deliver] deliverBlocks -> DEBU d1d [channel: businesschannel] Received seekInfo (0xc000d15040) start: > stop: > from 172.18.0.8:50246" -"2019-07-20 02:39:47.122 UTC [fsblkstorage] Next -> DEBU d1e Initializing block stream for iterator. itr.maxBlockNumAvailable=2" -"2019-07-20 02:39:47.122 UTC [fsblkstorage] newBlockfileStream -> DEBU d1f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" -"2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d20 Remaining bytes=[47443], Going to peek [8] bytes" -"2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d21 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" -"2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d22 blockbytes [23690] read from file [0]" -"2019-07-20 02:39:47.123 UTC [common.deliver] deliverBlocks -> DEBU d23 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -"2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d24 Remaining bytes=[23750], Going to peek [8] bytes" -"2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d25 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" -"2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d26 blockbytes [23747] read from file [0]" -"2019-07-20 02:39:47.123 UTC [common.deliver] deliverBlocks -> DEBU d27 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -"2019-07-20 02:39:47.124 UTC [fsblkstorage] waitForBlock -> DEBU d28 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -"2019-07-20 02:39:47.246 UTC [orderer.common.server] Deliver -> DEBU d29 Starting new Deliver handler" -"2019-07-20 02:39:47.246 UTC [common.deliver] Handle -> DEBU d2a Starting new deliver loop for 172.18.0.7:44748" -"2019-07-20 02:39:47.247 UTC [common.deliver] Handle -> DEBU d2b Attempting to read seek info message from 172.18.0.7:44748" -"2019-07-20 02:39:47.247 UTC [policies] Evaluate -> DEBU d2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d30 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:39:47.249 UTC [msp] DeserializeIdentity -> DEBU d31 Obtaining identity" -"2019-07-20 02:39:47.249 UTC [msp.identity] newIdentity -> DEBU d32 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +"2019-09-24 00:25:03.297 UTC [cauthdsl] func1 -> DEBU 7e7 0xc000b75f60 gate 1569284703297512100 evaluation starts" +"2019-09-24 00:25:03.297 UTC [cauthdsl] func2 -> DEBU 7e8 0xc000b75f60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:03.297 UTC [cauthdsl] func2 -> DEBU 7e9 0xc000b75f60 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:03.297 UTC [cauthdsl] func2 -> DEBU 7ea 0xc000b75f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2019-09-24 00:25:03.297 UTC [cauthdsl] func2 -> DEBU 7eb 0xc000b75f60 principal evaluation fails" +"2019-09-24 00:25:03.297 UTC [cauthdsl] func1 -> DEBU 7ec 0xc000b75f60 gate 1569284703297512100 evaluation fails" +"2019-09-24 00:25:03.297 UTC [policies] Evaluate -> DEBU 7ed Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:25:03.297 UTC [policies] Evaluate -> DEBU 7ee == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:25:03.298 UTC [policies] func1 -> DEBU 7ef Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2019-09-24 00:25:03.298 UTC [policies] Evaluate -> DEBU 7f0 Signature set did not satisfy policy /Channel/Orderer/Readers" +"2019-09-24 00:25:03.298 UTC [policies] Evaluate -> DEBU 7f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:25:03.298 UTC [policies] Evaluate -> DEBU 7f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:03.298 UTC [policies] Evaluate -> DEBU 7f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:03.299 UTC [policies] Evaluate -> DEBU 7f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:03.299 UTC [cauthdsl] func1 -> DEBU 7f5 0xc000b555d0 gate 1569284703299540600 evaluation starts" +"2019-09-24 00:25:03.299 UTC [cauthdsl] func2 -> DEBU 7f6 0xc000b555d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:03.299 UTC [cauthdsl] func2 -> DEBU 7f7 0xc000b555d0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:03.299 UTC [cauthdsl] func2 -> DEBU 7f8 0xc000b555d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:03.299 UTC [cauthdsl] func2 -> DEBU 7f9 0xc000b555d0 principal evaluation fails" +"2019-09-24 00:25:03.299 UTC [cauthdsl] func1 -> DEBU 7fa 0xc000b555d0 gate 1569284703299540600 evaluation fails" +"2019-09-24 00:25:03.299 UTC [policies] Evaluate -> DEBU 7fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:03.299 UTC [policies] Evaluate -> DEBU 7fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:03.300 UTC [policies] Evaluate -> DEBU 7fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:03.300 UTC [cauthdsl] func1 -> DEBU 7fe 0xc000b55e30 gate 1569284703300119700 evaluation starts" +"2019-09-24 00:25:03.300 UTC [cauthdsl] func2 -> DEBU 7ff 0xc000b55e30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:03.300 UTC [cauthdsl] func2 -> DEBU 800 0xc000b55e30 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:03.300 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 801 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:25:03.300 UTC [msp] Validate -> DEBU 802 MSP Org2MSP validating identity" +"2019-09-24 00:25:03.300 UTC [msp] getCertificationChain -> DEBU 803 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:03.301 UTC [cauthdsl] func2 -> DEBU 804 0xc000b55e30 principal matched by identity 0" +"2019-09-24 00:25:03.301 UTC [msp.identity] Verify -> DEBU 805 Verify: digest = 00000000 8b 03 97 43 70 c0 92 23 17 5e 03 ee 64 e6 97 15 |...Cp..#.^..d...| +00000010 02 e5 c8 62 47 03 7b 9c 1d 32 87 82 fc 68 3e 5b |...bG.{..2...h>[|" +"2019-09-24 00:25:03.301 UTC [msp.identity] Verify -> DEBU 806 Verify: sig = 00000000 30 44 02 20 31 f5 c5 93 d4 1d 90 90 18 dd 80 56 |0D. 1..........V| +00000010 9f 8f ca 24 d5 66 6c 6b 5f a8 6a fb ad 51 78 84 |...$.flk_.j..Qx.| +00000020 24 d7 ee fc 02 20 1a fe 63 11 78 f6 09 75 ed 1e |$.... ..c.x..u..| +00000030 ed 55 24 d6 52 91 c4 44 8c 94 19 3e f1 e1 0e 9c |.U$.R..D...>....| +00000040 9f c8 76 db 78 22 |..v.x"|" +"2019-09-24 00:25:03.301 UTC [cauthdsl] func2 -> DEBU 807 0xc000b55e30 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:03.301 UTC [cauthdsl] func1 -> DEBU 808 0xc000b55e30 gate 1569284703300119700 evaluation succeeds" +"2019-09-24 00:25:03.301 UTC [policies] Evaluate -> DEBU 809 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:03.301 UTC [policies] Evaluate -> DEBU 80a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:03.301 UTC [policies] Evaluate -> DEBU 80b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:03.301 UTC [policies] Evaluate -> DEBU 80c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:03.301 UTC [policies] Evaluate -> DEBU 80d Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:25:03.302 UTC [policies] Evaluate -> DEBU 80e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:25:03.302 UTC [common.deliver] deliverBlocks -> DEBU 80f [channel: businesschannel] Received seekInfo (0xc000ac5680) start: > stop: > from 172.18.0.6:42154" +"2019-09-24 00:25:03.305 UTC [fsblkstorage] waitForBlock -> DEBU 810 Going to wait for newer blocks. maxAvailaBlockNumber=[0], waitForBlockNum=[1]" +"2019-09-24 00:25:03.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 811 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +"2019-09-24 00:25:03.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 812 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +"2019-09-24 00:25:03.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 813 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.6µs " +"2019-09-24 00:25:03.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 814 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.7µs " +"2019-09-24 00:25:03.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU 815 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:03.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU 816 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:03.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU 817 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:03.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 818 Sending msg of 28 bytes to 3 on channel testchainid took 39.8µs" +"2019-09-24 00:25:03.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 819 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.6µs " +"2019-09-24 00:25:03.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 81a Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2019-09-24 00:25:03.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 81b Sending msg of 28 bytes to 3 on channel businesschannel took 52.9µs" +"2019-09-24 00:25:03.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 81c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296µs " +"2019-09-24 00:25:03.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 81d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.9µs " +"2019-09-24 00:25:03.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 81e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:03.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU 81f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:04.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU 820 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:04.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 821 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +"2019-09-24 00:25:04.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 822 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.7µs " +"2019-09-24 00:25:04.303 UTC [orderer.common.server] Deliver -> DEBU 823 Starting new Deliver handler" +"2019-09-24 00:25:04.303 UTC [common.deliver] Handle -> DEBU 824 Starting new deliver loop for 172.18.0.9:60684" +"2019-09-24 00:25:04.303 UTC [common.deliver] Handle -> DEBU 825 Attempting to read seek info message from 172.18.0.9:60684" +"2019-09-24 00:25:04.360 UTC [orderer.common.server] Broadcast -> DEBU 826 Starting new Broadcast handler" +"2019-09-24 00:25:04.360 UTC [orderer.common.broadcast] Handle -> DEBU 827 Starting new broadcast loop for 172.18.0.9:60686" +"2019-09-24 00:25:04.360 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 828 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:60686" +"2019-09-24 00:25:04.360 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 829 Processing config update message for channel businesschannel" +"2019-09-24 00:25:04.360 UTC [policies] Evaluate -> DEBU 82a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 00:25:04.360 UTC [policies] Evaluate -> DEBU 82b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.360 UTC [policies] Evaluate -> DEBU 82c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 00:25:04.360 UTC [policies] Evaluate -> DEBU 82d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.360 UTC [policies] Evaluate -> DEBU 82e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:25:04.361 UTC [cauthdsl] func1 -> DEBU 82f 0xc000acda10 gate 1569284704361031900 evaluation starts" +"2019-09-24 00:25:04.361 UTC [cauthdsl] func2 -> DEBU 830 0xc000acda10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.361 UTC [cauthdsl] func2 -> DEBU 831 0xc000acda10 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:04.361 UTC [cauthdsl] func2 -> DEBU 832 0xc000acda10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-09-24 00:25:04.361 UTC [cauthdsl] func2 -> DEBU 833 0xc000acda10 principal evaluation fails" +"2019-09-24 00:25:04.361 UTC [cauthdsl] func1 -> DEBU 834 0xc000acda10 gate 1569284704361031900 evaluation fails" +"2019-09-24 00:25:04.361 UTC [policies] Evaluate -> DEBU 835 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:04.361 UTC [policies] Evaluate -> DEBU 836 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:04.361 UTC [policies] func1 -> DEBU 837 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2019-09-24 00:25:04.361 UTC [policies] Evaluate -> DEBU 838 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2019-09-24 00:25:04.361 UTC [policies] Evaluate -> DEBU 839 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 00:25:04.362 UTC [policies] Evaluate -> DEBU 83a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:25:04.362 UTC [policies] Evaluate -> DEBU 83b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.362 UTC [policies] Evaluate -> DEBU 83c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 00:25:04.362 UTC [cauthdsl] func1 -> DEBU 83d 0xc000870960 gate 1569284704362789800 evaluation starts" +"2019-09-24 00:25:04.362 UTC [cauthdsl] func2 -> DEBU 83e 0xc000870960 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.362 UTC [cauthdsl] func2 -> DEBU 83f 0xc000870960 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:04.363 UTC [cauthdsl] func2 -> DEBU 840 0xc000870960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 00:25:04.363 UTC [cauthdsl] func2 -> DEBU 841 0xc000870960 principal evaluation fails" +"2019-09-24 00:25:04.363 UTC [cauthdsl] func1 -> DEBU 842 0xc000870960 gate 1569284704362789800 evaluation fails" +"2019-09-24 00:25:04.363 UTC [policies] Evaluate -> DEBU 843 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:04.363 UTC [policies] Evaluate -> DEBU 844 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:04.363 UTC [policies] Evaluate -> DEBU 845 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:25:04.363 UTC [cauthdsl] func1 -> DEBU 846 0xc0008711c0 gate 1569284704363949800 evaluation starts" +"2019-09-24 00:25:04.364 UTC [cauthdsl] func2 -> DEBU 847 0xc0008711c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.364 UTC [cauthdsl] func2 -> DEBU 848 0xc0008711c0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:04.364 UTC [cauthdsl] func2 -> DEBU 849 0xc0008711c0 principal matched by identity 0" +"2019-09-24 00:25:04.364 UTC [msp.identity] Verify -> DEBU 84a Verify: digest = 00000000 ee e8 47 d9 8e cd f1 fe 87 84 16 ed 8e 09 c8 eb |..G.............| +00000010 d5 74 18 3a 30 31 77 8f 57 bb 02 5d 68 35 e5 d0 |.t.:01w.W..]h5..|" +"2019-09-24 00:25:04.364 UTC [msp.identity] Verify -> DEBU 84b Verify: sig = 00000000 30 45 02 21 00 c6 05 54 c1 7e 3b ae ca f5 83 da |0E.!...T.~;.....| +00000010 db 0e 02 ea f9 97 37 82 e3 4a 60 3b ad f4 9e 81 |......7..J`;....| +00000020 9d fa 54 5c 8e 02 20 59 4a 9b 69 80 20 af 2d b3 |..T\.. YJ.i. .-.| +00000030 4f 96 d9 63 d5 09 34 6a f6 1c b2 b2 b7 78 83 e9 |O..c..4j.....x..| +00000040 99 77 ef 1f 7a df 99 |.w..z..|" +"2019-09-24 00:25:04.364 UTC [cauthdsl] func2 -> DEBU 84c 0xc0008711c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.364 UTC [cauthdsl] func1 -> DEBU 84d 0xc0008711c0 gate 1569284704363949800 evaluation succeeds" +"2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 84e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 84f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 850 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 851 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 852 Signature set satisfies policy /Channel/Writers" +"2019-09-24 00:25:04.364 UTC [policies] Evaluate -> DEBU 853 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 854 Adding to config map: [Group] /Channel" +"2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 855 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 856 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 857 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 858 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 859 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 85a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.365 UTC [common.configtx] addToMap -> DEBU 85b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.366 UTC [common.configtx] addToMap -> DEBU 85c Adding to config map: [Group] /Channel" +"2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 85d Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 85e Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 85f Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 860 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 861 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 862 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.368 UTC [common.configtx] addToMap -> DEBU 863 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.369 UTC [common.configtx] addToMap -> DEBU 864 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:04.369 UTC [common.configtx] verifyDeltaSet -> DEBU 865 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.369 UTC [common.configtx] policyForItem -> DEBU 866 Getting policy for item Org1MSP with mod_policy Admins" +"2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 867 Manager Channel looking up path [Application]" +"2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 868 Manager Channel has managers Orderer" +"2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 869 Manager Channel has managers Application" +"2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86a Manager Channel/Application looking up path []" +"2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86b Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86c Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86d Manager Channel/Application looking up path [Org1MSP]" +"2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86e Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 86f Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:04.369 UTC [policies] Manager -> DEBU 870 Manager Channel/Application/Org1MSP looking up path []" +"2019-09-24 00:25:04.369 UTC [policies] Evaluate -> DEBU 871 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 00:25:04.369 UTC [cauthdsl] func1 -> DEBU 872 0xc000343e50 gate 1569284704369749200 evaluation starts" +"2019-09-24 00:25:04.369 UTC [cauthdsl] func2 -> DEBU 873 0xc000343e50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.369 UTC [cauthdsl] func2 -> DEBU 874 0xc000343e50 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:04.369 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 875 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-09-24 00:25:04.369 UTC [cauthdsl] func2 -> DEBU 876 0xc000343e50 principal matched by identity 0" +"2019-09-24 00:25:04.369 UTC [msp.identity] Verify -> DEBU 877 Verify: digest = 00000000 1c cd 68 b8 33 39 c3 f7 d8 bf 6f 21 20 3c 57 2b |..h.39....o! DEBU 878 Verify: sig = 00000000 30 44 02 20 3f 2d 41 bf df 48 de ab 3b 9f f2 6a |0D. ?-A..H..;..j| +00000010 1c b4 f9 16 f1 15 f3 9b 4e 9f 15 e8 29 65 8f 9b |........N...)e..| +00000020 87 2f 31 cd 02 20 40 64 26 9c 61 b6 4b 3f 60 9d |./1.. @d&.a.K?`.| +00000030 b0 4f 81 19 be bf 2f 49 3d 39 ca e7 6a cb ce 8c |.O..../I=9..j...| +00000040 db 89 e6 d0 87 84 |......|" +"2019-09-24 00:25:04.370 UTC [cauthdsl] func2 -> DEBU 879 0xc000343e50 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.370 UTC [cauthdsl] func1 -> DEBU 87a 0xc000343e50 gate 1569284704369749200 evaluation succeeds" +"2019-09-24 00:25:04.370 UTC [policies] Evaluate -> DEBU 87b Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.370 UTC [policies] Evaluate -> DEBU 87c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.370 UTC [common.configtx] verifyDeltaSet -> DEBU 87d Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 87e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 87f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 880 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 881 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 882 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 883 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 884 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.370 UTC [common.configtx] recurseConfigMap -> DEBU 885 Setting policy for key Writers to " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 886 Setting policy for key Admins to " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 887 Setting policy for key Endorsement to " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 888 Setting policy for key Readers to " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 889 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 88f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 890 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 891 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 892 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 893 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.configtx] recurseConfigMap -> DEBU 894 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.371 UTC [common.channelconfig] NewStandardValues -> DEBU 895 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 896 Processing field: HashingAlgorithm" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 897 Processing field: BlockDataHashingStructure" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 898 Processing field: OrdererAddresses" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 899 Processing field: Consortium" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89a Processing field: Capabilities" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] NewStandardValues -> DEBU 89b Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89c Processing field: ConsensusType" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89d Processing field: BatchSize" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89e Processing field: BatchTimeout" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89f Processing field: KafkaBrokers" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a0 Processing field: ChannelRestrictions" +"2019-09-24 00:25:04.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a1 Processing field: Capabilities" +"2019-09-24 00:25:04.372 UTC [common.channelconfig] NewStandardValues -> DEBU 8a2 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:25:04.372 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a3 Processing field: Endpoints" +"2019-09-24 00:25:04.372 UTC [common.channelconfig] NewStandardValues -> DEBU 8a4 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.372 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a5 Processing field: MSP" +"2019-09-24 00:25:04.372 UTC [common.channelconfig] validateMSP -> DEBU 8a6 Setting up MSP for org OrdererOrg" +"2019-09-24 00:25:04.372 UTC [msp] newBccspMsp -> DEBU 8a7 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.372 UTC [msp] New -> DEBU 8a8 Creating Cache-MSP instance" +"2019-09-24 00:25:04.372 UTC [msp] Setup -> DEBU 8a9 Setting up MSP instance OrdererMSP" +"2019-09-24 00:25:04.372 UTC [msp.identity] newIdentity -> DEBU 8aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c -pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv -WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr -KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-07-20 02:39:47.250 UTC [cauthdsl] func1 -> DEBU d33 0xc000372b00 gate 1563590387250332700 evaluation starts" -"2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d34 0xc000372b00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d35 0xc000372b00 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d36 0xc000372b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -"2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d37 0xc000372b00 principal evaluation fails" -"2019-07-20 02:39:47.250 UTC [cauthdsl] func1 -> DEBU d38 0xc000372b00 gate 1563590387250332700 evaluation fails" -"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d39 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:47.251 UTC [policies] func1 -> DEBU d3b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" -"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3c Signature set did not satisfy policy /Channel/Orderer/Readers" -"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.252 UTC [cauthdsl] func1 -> DEBU d41 0xc0001c8490 gate 1563590387252058500 evaluation starts" -"2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d42 0xc0001c8490 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d43 0xc0001c8490 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d44 0xc0001c8490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d45 0xc0001c8490 principal evaluation fails" -"2019-07-20 02:39:47.252 UTC [cauthdsl] func1 -> DEBU d46 0xc0001c8490 gate 1563590387252058500 evaluation fails" -"2019-07-20 02:39:47.252 UTC [policies] Evaluate -> DEBU d47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.253 UTC [policies] Evaluate -> DEBU d48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.253 UTC [policies] Evaluate -> DEBU d49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.253 UTC [cauthdsl] func1 -> DEBU d4a 0xc0001c8d20 gate 1563590387253349900 evaluation starts" -"2019-07-20 02:39:47.253 UTC [cauthdsl] func2 -> DEBU d4b 0xc0001c8d20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.253 UTC [cauthdsl] func2 -> DEBU d4c 0xc0001c8d20 processing identity 0 with bytes of fd0280" -"2019-07-20 02:39:47.253 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d4d Checking if identity satisfies MEMBER role for Org2MSP" -"2019-07-20 02:39:47.253 UTC [msp] Validate -> DEBU d4e MSP Org2MSP validating identity" -"2019-07-20 02:39:47.254 UTC [msp] getCertificationChain -> DEBU d4f MSP Org2MSP getting certification chain" -"2019-07-20 02:39:47.254 UTC [cauthdsl] func2 -> DEBU d50 0xc0001c8d20 principal matched by identity 0" -"2019-07-20 02:39:47.254 UTC [msp.identity] Verify -> DEBU d51 Verify: digest = 00000000 a3 6c 91 0d 93 c2 2b b7 84 4f c8 13 c2 e8 ec ac |.l....+..O......| -00000010 69 f1 88 f4 ef 83 1f d4 73 fe 27 7c 4d 2c 47 4d |i.......s.'|M,GM|" -"2019-07-20 02:39:47.254 UTC [msp.identity] Verify -> DEBU d52 Verify: sig = 00000000 30 45 02 21 00 8c 87 61 6a 22 10 2f 66 11 6e 4d |0E.!...aj"./f.nM| -00000010 a3 04 ef 75 b5 e3 22 96 86 ad f2 79 9f ed 05 b1 |...u.."....y....| -00000020 8d e3 ec 68 9d 02 20 14 82 79 23 28 47 2f f6 12 |...h.. ..y#(G/..| -00000030 4b 4c 70 b7 45 df ab f5 65 80 5a df 45 e2 e3 8a |KLp.E...e.Z.E...| -00000040 db 2a f3 7a cd d7 10 |.*.z...|" -"2019-07-20 02:39:47.255 UTC [cauthdsl] func2 -> DEBU d53 0xc0001c8d20 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.255 UTC [cauthdsl] func1 -> DEBU d54 0xc0001c8d20 gate 1563590387253349900 evaluation succeeds" -"2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d55 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d57 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d58 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d59 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:39:47.257 UTC [policies] Evaluate -> DEBU d5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:39:47.257 UTC [common.deliver] deliverBlocks -> DEBU d5b [channel: businesschannel] Received seekInfo (0xc0008d0100) start: > stop: > from 172.18.0.7:44748" -"2019-07-20 02:39:47.257 UTC [fsblkstorage] Next -> DEBU d5c Initializing block stream for iterator. itr.maxBlockNumAvailable=2" -"2019-07-20 02:39:47.257 UTC [fsblkstorage] newBlockfileStream -> DEBU d5d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" -"2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d5e Remaining bytes=[47443], Going to peek [8] bytes" -"2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d5f Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" -"2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d60 blockbytes [23690] read from file [0]" -"2019-07-20 02:39:47.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d61 Sending msg of 28 bytes to 2 on channel businesschannel took 17µs" -"2019-07-20 02:39:47.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d62 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" -"2019-07-20 02:39:47.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.3µs " -"2019-07-20 02:39:47.259 UTC [common.deliver] deliverBlocks -> DEBU d64 [channel: businesschannel] Delivering block for (0xc0008d0100) for 172.18.0.7:44748" -"2019-07-20 02:39:47.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.9µs " -"2019-07-20 02:39:47.259 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d66 Remaining bytes=[23750], Going to peek [8] bytes" -"2019-07-20 02:39:47.259 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d67 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" -"2019-07-20 02:39:47.260 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d68 blockbytes [23747] read from file [0]" -"2019-07-20 02:39:47.260 UTC [common.deliver] deliverBlocks -> DEBU d69 [channel: businesschannel] Delivering block for (0xc0008d0100) for 172.18.0.7:44748" -"2019-07-20 02:39:47.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:47.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:47.274 UTC [fsblkstorage] waitForBlock -> DEBU d6c Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -"2019-07-20 02:39:47.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:47.507 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6e Sending msg of 28 bytes to 3 on channel testchainid took 16µs" -"2019-07-20 02:39:47.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.6µs " -"2019-07-20 02:39:47.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d70 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" -"2019-07-20 02:39:47.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d71 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" -"2019-07-20 02:39:47.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " -"2019-07-20 02:39:47.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.5µs " -"2019-07-20 02:39:47.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU d74 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:47.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU d75 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:48.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU d76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:48.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d77 Sending msg of 28 bytes to 3 on channel testchainid took 549.1µs" -"2019-07-20 02:39:48.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU d78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 435.7µs " -"2019-07-20 02:39:48.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d79 Sending msg of 28 bytes to 2 on channel businesschannel took 110.7µs" -"2019-07-20 02:39:48.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7a Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" -"2019-07-20 02:39:48.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 134.4µs " -"2019-07-20 02:39:48.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.6µs " -"2019-07-20 02:39:48.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:48.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:48.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:48.510 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d80 Sending msg of 28 bytes to 3 on channel testchainid took 1.0259ms" -"2019-07-20 02:39:48.511 UTC [orderer.common.cluster.step] sendMessage -> DEBU d81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192.5µs " -"2019-07-20 02:39:48.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d82 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" -"2019-07-20 02:39:48.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d83 Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" -"2019-07-20 02:39:48.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.2µs " -"2019-07-20 02:39:48.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU d85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.3µs " -"2019-07-20 02:39:48.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU d86 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:48.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU d87 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:49.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU d88 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:49.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d89 Sending msg of 28 bytes to 3 on channel testchainid took 74.6µs" -"2019-07-20 02:39:49.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " -"2019-07-20 02:39:49.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8b Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" -"2019-07-20 02:39:49.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8c Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" -"2019-07-20 02:39:49.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.1µs " -"2019-07-20 02:39:49.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " -"2019-07-20 02:39:49.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:49.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU d90 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:49.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU d91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:49.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d92 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" -"2019-07-20 02:39:49.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU d93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.3µs " -"2019-07-20 02:39:49.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d94 Sending msg of 28 bytes to 2 on channel businesschannel took 92µs" -"2019-07-20 02:39:49.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d95 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" -"2019-07-20 02:39:49.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.8µs " -"2019-07-20 02:39:49.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60µs " -"2019-07-20 02:39:49.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU d98 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:49.766 UTC [orderer.common.cluster.step] handleMessage -> DEBU d99 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:50.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:50.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9b Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" -"2019-07-20 02:39:50.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 623.2µs " -"2019-07-20 02:39:50.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9d Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" -"2019-07-20 02:39:50.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9e Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" -"2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " -"2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] handleMessage -> DEBU da1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:50.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU da2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU da0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 733.7µs " -"2019-07-20 02:39:50.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU da3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:50.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da4 Sending msg of 28 bytes to 3 on channel testchainid took 46µs" -"2019-07-20 02:39:50.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU da5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " -"2019-07-20 02:39:50.744 UTC [orderer.common.server] Broadcast -> DEBU da6 Starting new Broadcast handler" -"2019-07-20 02:39:50.745 UTC [orderer.common.broadcast] Handle -> DEBU da7 Starting new broadcast loop for 172.18.0.9:39140" -"2019-07-20 02:39:50.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da8 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" -"2019-07-20 02:39:50.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da9 Sending msg of 28 bytes to 3 on channel businesschannel took 382.5µs" -"2019-07-20 02:39:50.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU daa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " -"2019-07-20 02:39:50.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU dab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.8µs " -"2019-07-20 02:39:50.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU dac Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:50.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dad Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:51.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU dae Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:51.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daf Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" -"2019-07-20 02:39:51.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU db0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242.2µs " -"2019-07-20 02:39:51.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db1 Sending msg of 28 bytes to 2 on channel businesschannel took 43.3µs" -"2019-07-20 02:39:51.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db2 Sending msg of 28 bytes to 3 on channel businesschannel took 44.3µs" -"2019-07-20 02:39:51.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU db3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " -"2019-07-20 02:39:51.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU db4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.7µs " -"2019-07-20 02:39:51.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU db5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:51.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU db6 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:51.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU db7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:51.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db8 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" -"2019-07-20 02:39:51.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU db9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.9µs " -"2019-07-20 02:39:51.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dba Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" -"2019-07-20 02:39:51.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbb Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" -"2019-07-20 02:39:51.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.6µs " -"2019-07-20 02:39:51.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.345ms " -"2019-07-20 02:39:51.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:51.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:52.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:52.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc1 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" -"2019-07-20 02:39:52.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 546.9µs " -"2019-07-20 02:39:52.108 UTC [common.deliver] deliverBlocks -> DEBU dc3 Context canceled, aborting wait for next block" -"2019-07-20 02:39:52.108 UTC [orderer.common.server] func1 -> DEBU dc4 Closing Deliver stream" -"2019-07-20 02:39:52.108 UTC [grpc] infof -> DEBU dc5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc6 Came out of wait. maxAvailaBlockNumber=[2]" -"2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc8 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" -"2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc9 Came out of wait. maxAvailaBlockNumber=[2]" -"2019-07-20 02:39:52.109 UTC [comm.grpc.server] 1 -> INFO dc7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.7:44748 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.8632684s -"2019-07-20 02:39:52.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dca Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" -"2019-07-20 02:39:52.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcb Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" -"2019-07-20 02:39:52.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.4µs " -"2019-07-20 02:39:52.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 407µs " -"2019-07-20 02:39:52.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:52.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:52.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:52.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd1 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" -"2019-07-20 02:39:52.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " -"2019-07-20 02:39:52.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd3 Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" -"2019-07-20 02:39:52.760 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd4 Sending msg of 28 bytes to 2 on channel businesschannel took 11.6µs" -"2019-07-20 02:39:52.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 524.6µs " -"2019-07-20 02:39:52.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.7µs " -"2019-07-20 02:39:52.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:52.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:53.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:53.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dda Sending msg of 28 bytes to 3 on channel testchainid took 16µs" -"2019-07-20 02:39:53.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146µs " -"2019-07-20 02:39:53.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddc Sending msg of 28 bytes to 2 on channel businesschannel took 53.2µs" -"2019-07-20 02:39:53.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddd Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" -"2019-07-20 02:39:53.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.3µs " -"2019-07-20 02:39:53.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:53.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU de0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6647ms " -"2019-07-20 02:39:53.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU de1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:53.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU de2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:53.507 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de3 Sending msg of 28 bytes to 3 on channel testchainid took 40.9µs" -"2019-07-20 02:39:53.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU de4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 579.9µs " -"2019-07-20 02:39:53.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de5 Sending msg of 28 bytes to 3 on channel businesschannel took 27.3µs" -"2019-07-20 02:39:53.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.4µs " -"2019-07-20 02:39:53.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de7 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" -"2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] sendMessage -> DEBU de8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4015ms " -"2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dea Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:54.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU deb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:54.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dec Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" -"2019-07-20 02:39:54.009 UTC [orderer.common.cluster.step] sendMessage -> DEBU ded Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 257.9µs " -"2019-07-20 02:39:54.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dee Sending msg of 28 bytes to 2 on channel businesschannel took 52.6µs" -"2019-07-20 02:39:54.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU def Sending msg of 28 bytes to 3 on channel businesschannel took 9.3µs" -"2019-07-20 02:39:54.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 473.2µs " -"2019-07-20 02:39:54.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU df1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127µs " -"2019-07-20 02:39:54.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:54.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU df3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:54.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU df4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:54.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" -"2019-07-20 02:39:54.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU df6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.3µs " -"2019-07-20 02:39:54.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df7 Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" -"2019-07-20 02:39:54.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df8 Sending msg of 28 bytes to 3 on channel businesschannel took 8.4µs" -"2019-07-20 02:39:54.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU df9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.9µs " -"2019-07-20 02:39:54.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.2µs " -"2019-07-20 02:39:54.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:54.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:55.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:55.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfe Sending msg of 28 bytes to 3 on channel testchainid took 15µs" -"2019-07-20 02:39:55.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU dff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.6µs " -"2019-07-20 02:39:55.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e00 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" -"2019-07-20 02:39:55.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e01 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" -"2019-07-20 02:39:55.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 202µs " -"2019-07-20 02:39:55.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1379ms " -"2019-07-20 02:39:55.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:55.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:55.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:55.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" -"2019-07-20 02:39:55.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 469.8µs " -"2019-07-20 02:39:55.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" -"2019-07-20 02:39:55.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0a Sending msg of 28 bytes to 3 on channel businesschannel took 10.5µs" -"2019-07-20 02:39:55.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481µs " -"2019-07-20 02:39:55.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 765.8µs " -"2019-07-20 02:39:55.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:55.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:56.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:56.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" -"2019-07-20 02:39:56.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU e11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.1µs " -"2019-07-20 02:39:56.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" -"2019-07-20 02:39:56.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e13 Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" -"2019-07-20 02:39:56.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " -"2019-07-20 02:39:56.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 405.8µs " -"2019-07-20 02:39:56.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:56.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e17 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:56.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e18 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:56.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 3 on channel testchainid took 161µs" -"2019-07-20 02:39:56.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.4µs " -"2019-07-20 02:39:56.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" -"2019-07-20 02:39:56.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.6µs " -"2019-07-20 02:39:56.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1d Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" -"2019-07-20 02:39:56.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:56.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 605.8µs " -"2019-07-20 02:39:56.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU e20 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:57.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e21 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:57.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" -"2019-07-20 02:39:57.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU e23 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.9µs " -"2019-07-20 02:39:57.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" -"2019-07-20 02:39:57.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e25 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" -"2019-07-20 02:39:57.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " -"2019-07-20 02:39:57.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e27 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.6µs " -"2019-07-20 02:39:57.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:57.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e29 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:57.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:57.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" -"2019-07-20 02:39:57.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 380.4µs " -"2019-07-20 02:39:57.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2d Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" -"2019-07-20 02:39:57.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2e Sending msg of 28 bytes to 3 on channel businesschannel took 29.9µs" -"2019-07-20 02:39:57.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.8µs " -"2019-07-20 02:39:57.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e30 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.1µs " -"2019-07-20 02:39:57.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:57.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e32 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:58.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e33 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:58.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" -"2019-07-20 02:39:58.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU e35 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 454.3µs " -"2019-07-20 02:39:58.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e36 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" -"2019-07-20 02:39:58.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" -"2019-07-20 02:39:58.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 558.2µs " -"2019-07-20 02:39:58.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1584ms " -"2019-07-20 02:39:58.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:58.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:58.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:58.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" -"2019-07-20 02:39:58.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 347.4µs " -"2019-07-20 02:39:58.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" -"2019-07-20 02:39:58.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e40 Sending msg of 28 bytes to 3 on channel businesschannel took 362.7µs" -"2019-07-20 02:39:58.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260.6µs " -"2019-07-20 02:39:58.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 295.2µs " -"2019-07-20 02:39:58.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:58.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:59.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU e45 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:59.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" -"2019-07-20 02:39:59.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.4µs " -"2019-07-20 02:39:59.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 2 on channel businesschannel took 48.1µs" -"2019-07-20 02:39:59.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.8µs " -"2019-07-20 02:39:59.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4a Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" -"2019-07-20 02:39:59.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 43.7µs " -"2019-07-20 02:39:59.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:59.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:59.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:39:59.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4f Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" -"2019-07-20 02:39:59.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e50 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.2µs " -"2019-07-20 02:39:59.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" -"2019-07-20 02:39:59.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.2µs " -"2019-07-20 02:39:59.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.7µs " -"2019-07-20 02:39:59.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e54 Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" -"2019-07-20 02:39:59.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:59.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:39:59.866 UTC [orderer.common.server] replicateDisabledChains -> DEBU e57 No inactive chains to try to replicate" -"2019-07-20 02:40:00.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e58 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:00.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" -"2019-07-20 02:40:00.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 344.1µs " -"2019-07-20 02:40:00.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5b Sending msg of 28 bytes to 2 on channel businesschannel took 49.9µs" -"2019-07-20 02:40:00.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.9µs " -"2019-07-20 02:40:00.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5d Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" -"2019-07-20 02:40:00.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:00.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " -"2019-07-20 02:40:00.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e60 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:00.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e61 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:00.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e62 Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" -"2019-07-20 02:40:00.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 322.8µs " -"2019-07-20 02:40:00.733 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 2 on channel businesschannel took 41.5µs" -"2019-07-20 02:40:00.733 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e66 Sending msg of 28 bytes to 3 on channel businesschannel took 10.3µs" -"2019-07-20 02:40:00.739 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 408.3µs " -"2019-07-20 02:40:00.741 UTC [orderer.common.cluster.step] sendMessage -> DEBU e67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 859.4µs " -"2019-07-20 02:40:00.742 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:00.743 UTC [orderer.common.cluster.step] handleMessage -> DEBU e69 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:00.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:00.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 3 on channel testchainid took 15µs" -"2019-07-20 02:40:00.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305.1µs " -"2019-07-20 02:40:01.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6d Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" -"2019-07-20 02:40:01.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6e Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" -"2019-07-20 02:40:01.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.9µs " -"2019-07-20 02:40:01.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 777µs " -"2019-07-20 02:40:01.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:01.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU e72 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:01.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU e73 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:01.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" -"2019-07-20 02:40:01.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 397.5µs " -"2019-07-20 02:40:01.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e76 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" -"2019-07-20 02:40:01.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e77 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" -"2019-07-20 02:40:01.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU e78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 633.1µs " -"2019-07-20 02:40:01.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU e79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.6767ms " -"2019-07-20 02:40:01.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:01.732 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:01.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:01.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7d Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" -"2019-07-20 02:40:01.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 383.6µs " -"2019-07-20 02:40:02.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7f Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" -"2019-07-20 02:40:02.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e80 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" -"2019-07-20 02:40:02.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU e81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.3µs " -"2019-07-20 02:40:02.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0933ms " -"2019-07-20 02:40:02.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e83 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:02.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e84 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:02.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU e85 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:02.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" -"2019-07-20 02:40:02.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU e87 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 555.4µs " -"2019-07-20 02:40:02.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e88 Sending msg of 28 bytes to 2 on channel businesschannel took 49.6µs" -"2019-07-20 02:40:02.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.2µs " -"2019-07-20 02:40:02.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8a Sending msg of 28 bytes to 3 on channel businesschannel took 6.3µs" -"2019-07-20 02:40:02.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 992.9µs " -"2019-07-20 02:40:02.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:02.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:02.969 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:02.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 3 on channel testchainid took 46.8µs" -"2019-07-20 02:40:02.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e90 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 450.8µs " -"2019-07-20 02:40:03.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e91 Sending msg of 28 bytes to 2 on channel businesschannel took 38.6µs" -"2019-07-20 02:40:03.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e92 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" -"2019-07-20 02:40:03.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.7µs " -"2019-07-20 02:40:03.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e94 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 745.3µs " -"2019-07-20 02:40:03.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU e95 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:03.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e96 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:03.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU e97 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:03.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e98 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" -"2019-07-20 02:40:03.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU e99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 666.2µs " -"2019-07-20 02:40:03.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9a Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" -"2019-07-20 02:40:03.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9b Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" -"2019-07-20 02:40:03.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.8µs " -"2019-07-20 02:40:03.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 610.9µs " -"2019-07-20 02:40:03.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:03.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:03.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:03.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" -"2019-07-20 02:40:03.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 492.6µs " -"2019-07-20 02:40:04.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 2 on channel businesschannel took 28.1µs" -"2019-07-20 02:40:04.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea4 Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" -"2019-07-20 02:40:04.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.1µs " -"2019-07-20 02:40:04.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1502ms " -"2019-07-20 02:40:04.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:04.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea8 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:04.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:04.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" -"2019-07-20 02:40:04.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.8µs " -"2019-07-20 02:40:04.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" -"2019-07-20 02:40:04.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ead Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" -"2019-07-20 02:40:04.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU eae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.2µs " -"2019-07-20 02:40:04.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU eaf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 736µs " -"2019-07-20 02:40:04.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:04.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:04.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:04.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" -"2019-07-20 02:40:04.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 566.6µs " -"2019-07-20 02:40:05.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" -"2019-07-20 02:40:05.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156µs " -"2019-07-20 02:40:05.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb7 Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" -"2019-07-20 02:40:05.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:05.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1143ms " -"2019-07-20 02:40:05.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU eba Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:05.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:05.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " -"2019-07-20 02:40:05.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebd Sending msg of 28 bytes to 3 on channel testchainid took 124.3µs" -"2019-07-20 02:40:05.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebe Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" -"2019-07-20 02:40:05.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebf Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" -"2019-07-20 02:40:05.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 317.6µs " -"2019-07-20 02:40:05.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 317.4µs " -"2019-07-20 02:40:05.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:05.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:05.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:05.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec5 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" -"2019-07-20 02:40:05.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.4µs " -"2019-07-20 02:40:06.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec7 Sending msg of 28 bytes to 3 on channel businesschannel took 54.1µs" -"2019-07-20 02:40:06.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.3µs " -"2019-07-20 02:40:06.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec9 Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" -"2019-07-20 02:40:06.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU eca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 574.8µs " -"2019-07-20 02:40:06.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:06.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:06.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:06.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ece Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" -"2019-07-20 02:40:06.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.8µs " -"2019-07-20 02:40:06.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 2 on channel businesschannel took 55µs" -"2019-07-20 02:40:06.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed1 Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" -"2019-07-20 02:40:06.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.5µs " -"2019-07-20 02:40:06.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.4µs " -"2019-07-20 02:40:06.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:06.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:06.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:06.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed7 Sending msg of 28 bytes to 3 on channel testchainid took 29µs" -"2019-07-20 02:40:06.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " -"2019-07-20 02:40:07.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed9 Sending msg of 28 bytes to 2 on channel businesschannel took 43.4µs" -"2019-07-20 02:40:07.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eda Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" -"2019-07-20 02:40:07.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU edb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.5µs " -"2019-07-20 02:40:07.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:07.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU edd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.2615ms " -"2019-07-20 02:40:07.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU ede Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:07.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU edf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:07.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee0 Sending msg of 28 bytes to 3 on channel testchainid took 11.2µs" -"2019-07-20 02:40:07.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.8µs " -"2019-07-20 02:40:07.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" -"2019-07-20 02:40:07.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee3 Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" -"2019-07-20 02:40:07.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.9µs " -"2019-07-20 02:40:07.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 507.7µs " -"2019-07-20 02:40:07.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:07.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:07.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:07.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 3 on channel testchainid took 202.8µs" -"2019-07-20 02:40:07.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU eea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.1µs " -"2019-07-20 02:40:08.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eeb Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" -"2019-07-20 02:40:08.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.6µs " -"2019-07-20 02:40:08.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eed Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" -"2019-07-20 02:40:08.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:08.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU eef Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:08.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163µs " -"2019-07-20 02:40:08.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:08.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" -"2019-07-20 02:40:08.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305µs " -"2019-07-20 02:40:08.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef4 Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" -"2019-07-20 02:40:08.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef5 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" -"2019-07-20 02:40:08.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.8µs " -"2019-07-20 02:40:08.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.7µs " -"2019-07-20 02:40:08.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:08.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef9 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:08.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU efa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:08.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 28 bytes to 3 on channel testchainid took 29.6µs" -"2019-07-20 02:40:08.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.6µs " -"2019-07-20 02:40:09.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efd Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" -"2019-07-20 02:40:09.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efe Sending msg of 28 bytes to 2 on channel businesschannel took 9.2µs" -"2019-07-20 02:40:09.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84.4µs " -"2019-07-20 02:40:09.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116µs " -"2019-07-20 02:40:09.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f01 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:09.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f02 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:09.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f03 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:09.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f04 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" -"2019-07-20 02:40:09.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.8µs " -"2019-07-20 02:40:09.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f06 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" -"2019-07-20 02:40:09.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f07 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" -"2019-07-20 02:40:09.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.6µs " -"2019-07-20 02:40:09.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 441.2µs " -"2019-07-20 02:40:09.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:09.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:09.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:09.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 3 on channel testchainid took 13µs" -"2019-07-20 02:40:09.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.6µs " -"2019-07-20 02:40:10.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0f Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" -"2019-07-20 02:40:10.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f10 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" -"2019-07-20 02:40:10.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f11 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.2µs " -"2019-07-20 02:40:10.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:10.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 635.4µs " -"2019-07-20 02:40:10.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f14 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:10.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f15 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:10.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" -"2019-07-20 02:40:10.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231µs " -"2019-07-20 02:40:10.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f18 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" -"2019-07-20 02:40:10.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f19 Sending msg of 28 bytes to 3 on channel businesschannel took 9.2µs" -"2019-07-20 02:40:10.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.6µs " -"2019-07-20 02:40:10.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 182.1µs " -"2019-07-20 02:40:10.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:10.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:10.978 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:10.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1f Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" -"2019-07-20 02:40:10.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU f20 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.2µs " -"2019-07-20 02:40:11.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f21 Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" -"2019-07-20 02:40:11.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f22 Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" -"2019-07-20 02:40:11.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203.9µs " -"2019-07-20 02:40:11.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2578ms " -"2019-07-20 02:40:11.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f25 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:11.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f26 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:11.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f27 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:11.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" -"2019-07-20 02:40:11.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f29 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.6µs " -"2019-07-20 02:40:11.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2a Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" -"2019-07-20 02:40:11.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2b Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" -"2019-07-20 02:40:11.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 443.1µs " -"2019-07-20 02:40:11.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.5µs " -"2019-07-20 02:40:11.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:11.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:11.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f30 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:11.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" -"2019-07-20 02:40:11.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.5µs " -"2019-07-20 02:40:12.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f33 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" -"2019-07-20 02:40:12.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f35 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" -"2019-07-20 02:40:12.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.8µs " -"2019-07-20 02:40:12.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.5µs " -"2019-07-20 02:40:12.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f37 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:12.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU f38 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:12.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f39 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:12.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" -"2019-07-20 02:40:12.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " -"2019-07-20 02:40:12.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3c Sending msg of 28 bytes to 2 on channel businesschannel took 192.3µs" -"2019-07-20 02:40:12.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3d Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" -"2019-07-20 02:40:12.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.9µs " -"2019-07-20 02:40:12.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 467.8µs " -"2019-07-20 02:40:12.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f40 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:12.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU f41 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:12.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:12.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" -"2019-07-20 02:40:12.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.3µs " -"2019-07-20 02:40:13.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f45 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" -"2019-07-20 02:40:13.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f46 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" -"2019-07-20 02:40:13.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98µs " -"2019-07-20 02:40:13.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f48 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:13.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f49 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:13.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.8µs " -"2019-07-20 02:40:13.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:13.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" -"2019-07-20 02:40:13.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " -"2019-07-20 02:40:13.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4e Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" -"2019-07-20 02:40:13.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.8µs " -"2019-07-20 02:40:13.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " -"2019-07-20 02:40:13.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:13.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f52 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" -"2019-07-20 02:40:13.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f53 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:13.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f54 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:13.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" -"2019-07-20 02:40:13.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " -"2019-07-20 02:40:14.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f57 Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" -"2019-07-20 02:40:14.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f59 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" -"2019-07-20 02:40:14.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.7µs " -"2019-07-20 02:40:14.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 232.8µs " -"2019-07-20 02:40:14.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:14.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:14.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:14.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" -"2019-07-20 02:40:14.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.5µs " -"2019-07-20 02:40:14.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f60 Sending msg of 28 bytes to 2 on channel businesschannel took 49.7µs" -"2019-07-20 02:40:14.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f61 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" -"2019-07-20 02:40:14.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.2µs " -"2019-07-20 02:40:14.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.5µs " -"2019-07-20 02:40:14.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f64 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:14.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f65 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:14.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f66 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:14.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" -"2019-07-20 02:40:14.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127µs " -"2019-07-20 02:40:15.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f69 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" -"2019-07-20 02:40:15.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6a Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" -"2019-07-20 02:40:15.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.2µs " -"2019-07-20 02:40:15.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 287.9µs " -"2019-07-20 02:40:15.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:15.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:15.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:15.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f70 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" -"2019-07-20 02:40:15.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f71 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " -"2019-07-20 02:40:15.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f72 Sending msg of 28 bytes to 2 on channel businesschannel took 43.8µs" -"2019-07-20 02:40:15.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f74 Sending msg of 28 bytes to 3 on channel businesschannel took 144.4µs" -"2019-07-20 02:40:15.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 311.7µs " -"2019-07-20 02:40:15.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137µs " -"2019-07-20 02:40:15.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f77 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:15.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:15.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f78 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:15.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f79 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" -"2019-07-20 02:40:15.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.8µs " -"2019-07-20 02:40:16.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7b Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" -"2019-07-20 02:40:16.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7c Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" -"2019-07-20 02:40:16.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109µs " -"2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0763ms " -"2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f80 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:16.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f81 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:16.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 3 on channel testchainid took 11.8µs" -"2019-07-20 02:40:16.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f83 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.4µs " -"2019-07-20 02:40:16.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f84 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" -"2019-07-20 02:40:16.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f85 Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" -"2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.6µs " -"2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.5µs " -"2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU f88 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:16.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f89 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:16.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:16.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" -"2019-07-20 02:40:16.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " -"2019-07-20 02:40:17.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8d Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" -"2019-07-20 02:40:17.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8e Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" -"2019-07-20 02:40:17.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.3µs " -"2019-07-20 02:40:17.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.8µs " -"2019-07-20 02:40:17.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:17.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f92 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:17.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f93 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:17.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 3 on channel testchainid took 8.7µs" -"2019-07-20 02:40:17.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f95 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.1µs " -"2019-07-20 02:40:17.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f96 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" -"2019-07-20 02:40:17.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f97 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" -"2019-07-20 02:40:17.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " -"2019-07-20 02:40:17.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.1µs " -"2019-07-20 02:40:17.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:17.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:17.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:17.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 3 on channel testchainid took 8.8µs" -"2019-07-20 02:40:17.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " -"2019-07-20 02:40:18.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9f Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" -"2019-07-20 02:40:18.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" -"2019-07-20 02:40:18.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " -"2019-07-20 02:40:18.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.8µs " -"2019-07-20 02:40:18.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:18.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:18.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:18.473 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa6 Sending msg of 28 bytes to 3 on channel testchainid took 28.6µs" -"2019-07-20 02:40:18.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.3µs " -"2019-07-20 02:40:18.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa8 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" -"2019-07-20 02:40:18.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa9 Sending msg of 28 bytes to 3 on channel businesschannel took 37.3µs" -"2019-07-20 02:40:18.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU faa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.8µs " -"2019-07-20 02:40:18.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU fab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.9µs " -"2019-07-20 02:40:18.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:18.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:18.972 UTC [orderer.common.cluster.step] handleMessage -> DEBU fae Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:18.972 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 3 on channel testchainid took 16µs" -"2019-07-20 02:40:18.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.6µs " -"2019-07-20 02:40:19.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb1 Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" -"2019-07-20 02:40:19.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" -"2019-07-20 02:40:19.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.4µs " -"2019-07-20 02:40:19.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.7µs " -"2019-07-20 02:40:19.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:19.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:19.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:19.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 3 on channel testchainid took 11.6µs" -"2019-07-20 02:40:19.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.7µs " -"2019-07-20 02:40:19.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fba Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" -"2019-07-20 02:40:19.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbb Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" -"2019-07-20 02:40:19.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " -"2019-07-20 02:40:19.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 36.7µs " -"2019-07-20 02:40:19.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:19.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:19.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:19.972 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" -"2019-07-20 02:40:19.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " -"2019-07-20 02:40:20.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" -"2019-07-20 02:40:20.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc4 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" -"2019-07-20 02:40:20.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87µs " -"2019-07-20 02:40:20.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.6µs " -"2019-07-20 02:40:20.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:20.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:20.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:20.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fca Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" -"2019-07-20 02:40:20.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.7µs " -"2019-07-20 02:40:20.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcc Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" -"2019-07-20 02:40:20.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcd Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" -"2019-07-20 02:40:20.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.5µs " -"2019-07-20 02:40:20.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1387ms " -"2019-07-20 02:40:20.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:20.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:20.814 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fd2 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39140 with txid '79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f' of type ENDORSER_TRANSACTION" -"2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:20.816 UTC [policies] Evaluate -> DEBU fd7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:40:20.816 UTC [msp] DeserializeIdentity -> DEBU fd8 Obtaining identity" -"2019-07-20 02:40:20.816 UTC [msp.identity] newIdentity -> DEBU fd9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:40:20.817 UTC [cauthdsl] func1 -> DEBU fda 0xc000bfa3b0 gate 1563590420817456800 evaluation starts" -"2019-07-20 02:40:20.817 UTC [cauthdsl] func2 -> DEBU fdb 0xc000bfa3b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.819 UTC [cauthdsl] func2 -> DEBU fdc 0xc000bfa3b0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:20.820 UTC [cauthdsl] func2 -> DEBU fdd 0xc000bfa3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" -"2019-07-20 02:40:20.821 UTC [cauthdsl] func2 -> DEBU fde 0xc000bfa3b0 principal evaluation fails" -"2019-07-20 02:40:20.821 UTC [cauthdsl] func1 -> DEBU fdf 0xc000bfa3b0 gate 1563590420817456800 evaluation fails" -"2019-07-20 02:40:20.821 UTC [policies] Evaluate -> DEBU fe0 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:20.822 UTC [policies] Evaluate -> DEBU fe1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:20.822 UTC [policies] func1 -> DEBU fe2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -"2019-07-20 02:40:20.823 UTC [policies] Evaluate -> DEBU fe3 Signature set did not satisfy policy /Channel/Orderer/Writers" -"2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:20.824 UTC [cauthdsl] func1 -> DEBU fe8 0xc000bfb9e0 gate 1563590420824690400 evaluation starts" -"2019-07-20 02:40:20.824 UTC [cauthdsl] func2 -> DEBU fe9 0xc000bfb9e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.825 UTC [cauthdsl] func2 -> DEBU fea 0xc000bfb9e0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:20.825 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU feb Checking if identity satisfies MEMBER role for Org1MSP" -"2019-07-20 02:40:20.825 UTC [msp] Validate -> DEBU fec MSP Org1MSP validating identity" -"2019-07-20 02:40:20.826 UTC [msp] getCertificationChain -> DEBU fed MSP Org1MSP getting certification chain" -"2019-07-20 02:40:20.826 UTC [cauthdsl] func2 -> DEBU fee 0xc000bfb9e0 principal matched by identity 0" -"2019-07-20 02:40:20.826 UTC [msp.identity] Verify -> DEBU fef Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| -00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" -"2019-07-20 02:40:20.826 UTC [msp.identity] Verify -> DEBU ff0 Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| -00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| -00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| -00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| -00000040 d7 3e d5 8f e5 b0 |.>....|" -"2019-07-20 02:40:20.827 UTC [cauthdsl] func2 -> DEBU ff1 0xc000bfb9e0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:20.827 UTC [cauthdsl] func1 -> DEBU ff2 0xc000bfb9e0 gate 1563590420824690400 evaluation succeeds" -"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff3 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff5 Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff7 Signature set satisfies policy /Channel/Writers" -"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-07-20 02:40:20.830 UTC [orderer.common.blockcutter] Ordered -> DEBU ff9 Enqueuing message into batch" -"2019-07-20 02:40:20.830 UTC [orderer.common.broadcast] ProcessMessage -> DEBU ffa [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39140" -"2019-07-20 02:40:20.833 UTC [orderer.common.broadcast] Handle -> WARN ffb Error reading from 172.18.0.9:39140: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:20.834 UTC [orderer.common.server] func1 -> DEBU ffc Closing Broadcast stream" -"2019-07-20 02:40:20.834 UTC [comm.grpc.server] 1 -> INFO ffd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39140 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.1246301s -"2019-07-20 02:40:20.837 UTC [grpc] infof -> DEBU ffe transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:20.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU fff Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:20.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1000 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" -"2019-07-20 02:40:20.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1001 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68µs " -"2019-07-20 02:40:22.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1002 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" -"2019-07-20 02:40:22.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1004 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" -"2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1005 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " -"2019-07-20 02:40:22.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1003 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1006 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.3µs " -"2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1007 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:22.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1008 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" -"2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1009 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52µs " -"2019-07-20 02:40:22.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 3 on channel testchainid took 12µs" -"2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.6µs " -"2019-07-20 02:40:22.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:22.009 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:22.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100e Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" -"2019-07-20 02:40:22.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100f Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" -"2019-07-20 02:40:22.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1010 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 451.9µs " -"2019-07-20 02:40:22.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1011 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.6µs " -"2019-07-20 02:40:22.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1012 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:22.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1013 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:22.473 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1014 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:22.474 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1015 Sending msg of 28 bytes to 3 on channel testchainid took 22µs" -"2019-07-20 02:40:22.475 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1016 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.9µs " -"2019-07-20 02:40:22.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1017 Sending msg of 28 bytes to 2 on channel businesschannel took 33.7µs" -"2019-07-20 02:40:22.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1018 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 727µs " -"2019-07-20 02:40:22.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1019 Sending msg of 28 bytes to 3 on channel businesschannel took 282.7µs" -"2019-07-20 02:40:22.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.5µs " -"2019-07-20 02:40:22.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:22.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:22.831 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 101d Batch timer expired, creating block" channel=businesschannel node=1 -"2019-07-20 02:40:22.831 UTC [orderer.consensus.etcdraft] propose -> INFO 101e Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-07-20 02:40:22.833 UTC [orderer.consensus.etcdraft] 2 -> DEBU 101f Proposed block [3] to raft consensus" channel=businesschannel node=1 -"2019-07-20 02:40:22.835 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1020 Sending msg of 3650 bytes to 2 on channel businesschannel took 16.8µs" -"2019-07-20 02:40:22.835 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1021 Sending msg of 3650 bytes to 3 on channel businesschannel took 21.2µs" -"2019-07-20 02:40:22.835 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1022 Send of ConsensusRequest for channel businesschannel with payload of size 3650 to orderer1.example.com(orderer1.example.com:7050) took 121µs " -"2019-07-20 02:40:22.835 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1023 Send of ConsensusRequest for channel businesschannel with payload of size 3650 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " -"2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1024 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 2 on channel businesschannel took 10.3µs" -"2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1026 Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" -"2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1027 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.8µs " -"2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1028 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 -"2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1029 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:22.839 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 102a [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -"2019-07-20 02:40:22.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 102b Obtaining default signing identity" -"2019-07-20 02:40:22.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 102c Obtaining default signing identity" -"2019-07-20 02:40:22.839 UTC [msp.identity] Sign -> DEBU 102d Sign: plaintext: 0A020802120B0A090A03010203100418...CB2402E5A0B3BA87B6BF21DA5A95E292 " -"2019-07-20 02:40:22.839 UTC [msp.identity] Sign -> DEBU 102e Sign: digest: 6AFBD00D77A5732785EA5D33CF685F7A83868270E23725D9865CFE05D8FF32A5 " -"2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.5µs " -"2019-07-20 02:40:22.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1030 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:22.842 UTC [fsblkstorage] indexBlock -> DEBU 1031 Indexing block [blockNum=3, blockHash=[]byte{0x18, 0x70, 0x86, 0xed, 0x63, 0x58, 0x1a, 0xe8, 0x75, 0x8c, 0x4e, 0x43, 0x60, 0x90, 0xd4, 0xe2, 0xe5, 0xb8, 0x6b, 0x53, 0x15, 0x11, 0x95, 0xd4, 0xe0, 0xf8, 0xb9, 0xcf, 0x43, 0x25, 0x9d, 0x7f} txOffsets= -txId=79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f locPointer=offset=70, bytesLength=3522 -]" -"2019-07-20 02:40:22.843 UTC [fsblkstorage] updateCheckpoint -> DEBU 1032 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[75919], isChainEmpty=[false], lastBlockNumber=[3]" -"2019-07-20 02:40:22.843 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1033 [channel: businesschannel] Wrote block [3]" -"2019-07-20 02:40:22.843 UTC [fsblkstorage] waitForBlock -> DEBU 1034 Came out of wait. maxAvailaBlockNumber=[3]" -"2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1035 Remaining bytes=[4529], Going to peek [8] bytes" -"2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1036 Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" -"2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1037 blockbytes [4527] read from file [0]" -"2019-07-20 02:40:22.843 UTC [common.deliver] deliverBlocks -> DEBU 1038 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -"2019-07-20 02:40:22.843 UTC [fsblkstorage] waitForBlock -> DEBU 1039 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" -"2019-07-20 02:40:22.848 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:22.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:22.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103c Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" -"2019-07-20 02:40:22.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.1µs " -"2019-07-20 02:40:23.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103e Sending msg of 28 bytes to 2 on channel businesschannel took 29.8µs" -"2019-07-20 02:40:23.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103f Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" -"2019-07-20 02:40:23.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1040 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.5µs " -"2019-07-20 02:40:23.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1041 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 795.8µs " -"2019-07-20 02:40:23.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1042 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:23.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1043 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:23.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1044 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:23.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1045 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" -"2019-07-20 02:40:23.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1046 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 529.5µs " -"2019-07-20 02:40:23.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" -"2019-07-20 02:40:23.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1048 Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" -"2019-07-20 02:40:23.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1049 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 442.9µs " -"2019-07-20 02:40:23.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 718.6µs " -"2019-07-20 02:40:23.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:23.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:23.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:23.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104e Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" -"2019-07-20 02:40:23.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " -"2019-07-20 02:40:24.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1050 Sending msg of 28 bytes to 2 on channel businesschannel took 44.9µs" -"2019-07-20 02:40:24.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1051 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" -"2019-07-20 02:40:24.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1052 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " -"2019-07-20 02:40:24.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1053 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 682.6µs " -"2019-07-20 02:40:24.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1054 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:24.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1055 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:24.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1056 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:24.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1057 Sending msg of 28 bytes to 3 on channel testchainid took 36.9µs" -"2019-07-20 02:40:24.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1058 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " -"2019-07-20 02:40:24.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1059 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" -"2019-07-20 02:40:24.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105a Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" -"2019-07-20 02:40:24.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.9µs " -"2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.8µs " -"2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:24.772 UTC [orderer.common.server] Broadcast -> DEBU 105f Starting new Broadcast handler" -"2019-07-20 02:40:24.772 UTC [orderer.common.broadcast] Handle -> DEBU 1060 Starting new broadcast loop for 172.18.0.9:39158" -"2019-07-20 02:40:24.808 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1061 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39158 with txid '3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732' of type ENDORSER_TRANSACTION" -"2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1062 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1063 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1064 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-07-20 02:40:24.810 UTC [policies] Evaluate -> DEBU 1065 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.810 UTC [policies] Evaluate -> DEBU 1066 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:40:24.810 UTC [cauthdsl] func1 -> DEBU 1067 0xc000fa8c70 gate 1563590424810651600 evaluation starts" -"2019-07-20 02:40:24.810 UTC [cauthdsl] func2 -> DEBU 1068 0xc000fa8c70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.811 UTC [cauthdsl] func2 -> DEBU 1069 0xc000fa8c70 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:24.811 UTC [cauthdsl] func2 -> DEBU 106a 0xc000fa8c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" -"2019-07-20 02:40:24.812 UTC [cauthdsl] func2 -> DEBU 106b 0xc000fa8c70 principal evaluation fails" -"2019-07-20 02:40:24.812 UTC [cauthdsl] func1 -> DEBU 106c 0xc000fa8c70 gate 1563590424810651600 evaluation fails" -"2019-07-20 02:40:24.812 UTC [policies] Evaluate -> DEBU 106d Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:24.812 UTC [policies] Evaluate -> DEBU 106e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:24.813 UTC [policies] func1 -> DEBU 106f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -"2019-07-20 02:40:24.813 UTC [policies] Evaluate -> DEBU 1070 Signature set did not satisfy policy /Channel/Orderer/Writers" -"2019-07-20 02:40:24.813 UTC [policies] Evaluate -> DEBU 1071 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1072 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1073 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1074 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:24.815 UTC [cauthdsl] func1 -> DEBU 1075 0xc000fa9960 gate 1563590424814985400 evaluation starts" -"2019-07-20 02:40:24.815 UTC [cauthdsl] func2 -> DEBU 1076 0xc000fa9960 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.815 UTC [cauthdsl] func2 -> DEBU 1077 0xc000fa9960 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:24.816 UTC [cauthdsl] func2 -> DEBU 1078 0xc000fa9960 principal matched by identity 0" -"2019-07-20 02:40:24.816 UTC [msp.identity] Verify -> DEBU 1079 Verify: digest = 00000000 97 03 8b 29 3b d7 61 87 c0 b1 9e e0 d5 e5 59 bf |...);.a.......Y.| -00000010 90 93 46 3e 70 6d ee 67 fe cd 38 32 fe 22 66 b0 |..F>pm.g..82."f.|" -"2019-07-20 02:40:24.816 UTC [msp.identity] Verify -> DEBU 107a Verify: sig = 00000000 30 45 02 21 00 a8 a2 93 b5 4c 8c 0c 6b 3e 06 99 |0E.!.....L..k>..| -00000010 37 7b a3 55 44 c0 5e fc a4 0d f6 f7 d1 98 27 42 |7{.UD.^.......'B| -00000020 53 8c 9b 56 17 02 20 42 ff 25 02 18 bc cb 75 a0 |S..V.. B.%....u.| -00000030 32 02 be 09 df a4 6d ad 1b 05 12 07 ec 58 2d e3 |2.....m......X-.| -00000040 95 b0 80 c3 bc 80 99 |.......|" -"2019-07-20 02:40:24.817 UTC [cauthdsl] func2 -> DEBU 107b 0xc000fa9960 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.817 UTC [cauthdsl] func1 -> DEBU 107c 0xc000fa9960 gate 1563590424814985400 evaluation succeeds" -"2019-07-20 02:40:24.817 UTC [policies] Evaluate -> DEBU 107d Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 107e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 107f Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 1080 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 1081 Signature set satisfies policy /Channel/Writers" -"2019-07-20 02:40:24.819 UTC [policies] Evaluate -> DEBU 1082 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-07-20 02:40:24.819 UTC [orderer.common.blockcutter] Ordered -> DEBU 1083 Enqueuing message into batch" -"2019-07-20 02:40:24.820 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1084 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39158" -"2019-07-20 02:40:24.825 UTC [orderer.common.broadcast] Handle -> WARN 1085 Error reading from 172.18.0.9:39158: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:24.825 UTC [orderer.common.server] func1 -> DEBU 1086 Closing Broadcast stream" -"2019-07-20 02:40:24.825 UTC [comm.grpc.server] 1 -> INFO 1087 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39158 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=52.883ms -"2019-07-20 02:40:24.825 UTC [grpc] infof -> DEBU 1088 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:24.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1089 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:24.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108a Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" -"2019-07-20 02:40:24.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 299.6µs " -"2019-07-20 02:40:25.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108c Sending msg of 28 bytes to 2 on channel businesschannel took 47.9µs" -"2019-07-20 02:40:25.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108d Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" -"2019-07-20 02:40:25.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 599µs " -"2019-07-20 02:40:25.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 223.8µs " -"2019-07-20 02:40:25.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1090 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:25.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1091 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:25.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1092 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:25.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1093 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.5µs " -"2019-07-20 02:40:25.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 28 bytes to 3 on channel testchainid took 368.4µs" -"2019-07-20 02:40:25.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1095 Sending msg of 28 bytes to 2 on channel businesschannel took 44.7µs" -"2019-07-20 02:40:25.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1096 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" -"2019-07-20 02:40:25.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1097 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " -"2019-07-20 02:40:25.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1098 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 670.1µs " -"2019-07-20 02:40:25.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1099 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:25.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:25.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:25.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.6µs " -"2019-07-20 02:40:25.973 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109d Sending msg of 28 bytes to 3 on channel testchainid took 1.8469ms" -"2019-07-20 02:40:26.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109e Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" -"2019-07-20 02:40:26.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109f Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" -"2019-07-20 02:40:26.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 356.5µs " -"2019-07-20 02:40:26.226 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.2µs " -"2019-07-20 02:40:26.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:26.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:26.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:26.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a5 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" -"2019-07-20 02:40:26.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.5µs " -"2019-07-20 02:40:26.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a7 Sending msg of 28 bytes to 2 on channel businesschannel took 124.7µs" -"2019-07-20 02:40:26.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a8 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" -"2019-07-20 02:40:26.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 298.8µs " -"2019-07-20 02:40:26.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 276.4µs " -"2019-07-20 02:40:26.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ab Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:26.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:26.820 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 10ad Batch timer expired, creating block" channel=businesschannel node=1 -"2019-07-20 02:40:26.820 UTC [orderer.consensus.etcdraft] propose -> INFO 10ae Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-07-20 02:40:26.822 UTC [orderer.consensus.etcdraft] 2 -> DEBU 10af Proposed block [4] to raft consensus" channel=businesschannel node=1 -"2019-07-20 02:40:26.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b0 Sending msg of 3114 bytes to 2 on channel businesschannel took 92.7µs" -"2019-07-20 02:40:26.824 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b1 Sending msg of 3114 bytes to 3 on channel businesschannel took 18µs" -"2019-07-20 02:40:26.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b2 Send of ConsensusRequest for channel businesschannel with payload of size 3114 to orderer1.example.com(orderer1.example.com:7050) took 980.1µs " -"2019-07-20 02:40:26.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b3 Send of ConsensusRequest for channel businesschannel with payload of size 3114 to orderer2.example.com(orderer2.example.com:7050) took 136.3µs " -"2019-07-20 02:40:26.827 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:26.827 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b6 Sending msg of 28 bytes to 2 on channel businesschannel took 15.4µs" -"2019-07-20 02:40:26.828 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b7 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" -"2019-07-20 02:40:26.828 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 10b8 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 -"2019-07-20 02:40:26.828 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.5µs " -"2019-07-20 02:40:26.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.2µs " -"2019-07-20 02:40:26.827 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:26.831 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 10bb [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -"2019-07-20 02:40:26.832 UTC [msp] GetDefaultSigningIdentity -> DEBU 10bc Obtaining default signing identity" -"2019-07-20 02:40:26.834 UTC [msp] GetDefaultSigningIdentity -> DEBU 10bd Obtaining default signing identity" -"2019-07-20 02:40:26.841 UTC [msp.identity] Sign -> DEBU 10be Sign: plaintext: 0A020802120B0A090A03010203100418...52D1A12ABC704D520BFCB3D4E358B2F9 " -"2019-07-20 02:40:26.846 UTC [msp.identity] Sign -> DEBU 10bf Sign: digest: 9216BD0E940C4DE1C355275BEC0E1803FC1B74F267389F1872A2CEC9948411DC " -"2019-07-20 02:40:26.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:26.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:26.859 UTC [fsblkstorage] indexBlock -> DEBU 10c2 Indexing block [blockNum=4, blockHash=[]byte{0xb7, 0x10, 0x53, 0xe8, 0x49, 0x19, 0xe7, 0xf, 0x6f, 0x37, 0xc7, 0x9c, 0x27, 0xaf, 0x1c, 0x10, 0x15, 0x6c, 0xa3, 0xe5, 0x32, 0x4c, 0x6a, 0x2a, 0x4d, 0xc, 0x12, 0xea, 0x60, 0x40, 0x84, 0xb2} txOffsets= -txId=3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 locPointer=offset=70, bytesLength=2986 -]" -"2019-07-20 02:40:26.871 UTC [fsblkstorage] updateCheckpoint -> DEBU 10c3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[79913], isChainEmpty=[false], lastBlockNumber=[4]" -"2019-07-20 02:40:26.872 UTC [fsblkstorage] waitForBlock -> DEBU 10c4 Came out of wait. maxAvailaBlockNumber=[4]" -"2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c5 Remaining bytes=[3994], Going to peek [8] bytes" -"2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c6 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" -"2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c7 blockbytes [3992] read from file [0]" -"2019-07-20 02:40:26.872 UTC [common.deliver] deliverBlocks -> DEBU 10c8 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -"2019-07-20 02:40:26.873 UTC [fsblkstorage] waitForBlock -> DEBU 10c9 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" -"2019-07-20 02:40:26.873 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10ca [channel: businesschannel] Wrote block [4]" -"2019-07-20 02:40:26.974 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:26.975 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cc Sending msg of 28 bytes to 3 on channel testchainid took 35.3µs" -"2019-07-20 02:40:26.977 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " -"2019-07-20 02:40:27.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ce Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" -"2019-07-20 02:40:27.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cf Sending msg of 28 bytes to 3 on channel businesschannel took 23µs" -"2019-07-20 02:40:27.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.4µs " -"2019-07-20 02:40:27.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.5µs " -"2019-07-20 02:40:27.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:27.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:27.478 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:27.481 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d5 Sending msg of 28 bytes to 3 on channel testchainid took 861.8µs" -"2019-07-20 02:40:27.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.2µs " -"2019-07-20 02:40:27.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d7 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" -"2019-07-20 02:40:27.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d8 Sending msg of 28 bytes to 3 on channel businesschannel took 58µs" -"2019-07-20 02:40:27.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320µs " -"2019-07-20 02:40:27.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 191µs " -"2019-07-20 02:40:27.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10db Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:27.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10dc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:27.849 UTC [orderer.common.server] Broadcast -> DEBU 10dd Starting new Broadcast handler" -"2019-07-20 02:40:27.849 UTC [orderer.common.broadcast] Handle -> DEBU 10de Starting new broadcast loop for 172.18.0.9:39172" -"2019-07-20 02:40:27.866 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10df [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39172 with txid 'cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919' of type ENDORSER_TRANSACTION" -"2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-07-20 02:40:27.868 UTC [policies] Evaluate -> DEBU 10e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:27.869 UTC [policies] Evaluate -> DEBU 10e4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:40:27.869 UTC [msp] DeserializeIdentity -> DEBU 10e5 Obtaining identity" -"2019-07-20 02:40:27.870 UTC [msp.identity] newIdentity -> DEBU 10e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-07-20 02:40:27.870 UTC [cauthdsl] func1 -> DEBU 10e7 0xc0011a80e0 gate 1563590427870766300 evaluation starts" -"2019-07-20 02:40:27.870 UTC [cauthdsl] func2 -> DEBU 10e8 0xc0011a80e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.871 UTC [cauthdsl] func2 -> DEBU 10e9 0xc0011a80e0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:27.871 UTC [cauthdsl] func2 -> DEBU 10ea 0xc0011a80e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" -"2019-07-20 02:40:27.872 UTC [cauthdsl] func2 -> DEBU 10eb 0xc0011a80e0 principal evaluation fails" -"2019-07-20 02:40:27.872 UTC [cauthdsl] func1 -> DEBU 10ec 0xc0011a80e0 gate 1563590427870766300 evaluation fails" -"2019-07-20 02:40:27.872 UTC [policies] Evaluate -> DEBU 10ed Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:27.873 UTC [policies] Evaluate -> DEBU 10ee == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:27.873 UTC [policies] func1 -> DEBU 10ef Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -"2019-07-20 02:40:27.877 UTC [policies] Evaluate -> DEBU 10f0 Signature set did not satisfy policy /Channel/Orderer/Writers" -"2019-07-20 02:40:27.878 UTC [policies] Evaluate -> DEBU 10f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-07-20 02:40:27.878 UTC [policies] Evaluate -> DEBU 10f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:27.879 UTC [policies] Evaluate -> DEBU 10f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:27.880 UTC [policies] Evaluate -> DEBU 10f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:27.880 UTC [cauthdsl] func1 -> DEBU 10f5 0xc0011a9710 gate 1563590427880758700 evaluation starts" -"2019-07-20 02:40:27.880 UTC [cauthdsl] func2 -> DEBU 10f6 0xc0011a9710 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.881 UTC [cauthdsl] func2 -> DEBU 10f7 0xc0011a9710 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:27.881 UTC [cauthdsl] func2 -> DEBU 10f8 0xc0011a9710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:27.882 UTC [cauthdsl] func2 -> DEBU 10f9 0xc0011a9710 principal evaluation fails" -"2019-07-20 02:40:27.882 UTC [cauthdsl] func1 -> DEBU 10fa 0xc0011a9710 gate 1563590427880758700 evaluation fails" -"2019-07-20 02:40:27.882 UTC [policies] Evaluate -> DEBU 10fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:27.883 UTC [policies] Evaluate -> DEBU 10fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:27.883 UTC [policies] Evaluate -> DEBU 10fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-07-20 02:40:27.883 UTC [cauthdsl] func1 -> DEBU 10fe 0xc0011a9f70 gate 1563590427883598700 evaluation starts" -"2019-07-20 02:40:27.883 UTC [cauthdsl] func2 -> DEBU 10ff 0xc0011a9f70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.883 UTC [cauthdsl] func2 -> DEBU 1100 0xc0011a9f70 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:27.884 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1101 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-07-20 02:40:27.884 UTC [msp] Validate -> DEBU 1102 MSP Org2MSP validating identity" -"2019-07-20 02:40:27.884 UTC [msp] getCertificationChain -> DEBU 1103 MSP Org2MSP getting certification chain" -"2019-07-20 02:40:27.885 UTC [cauthdsl] func2 -> DEBU 1104 0xc0011a9f70 principal matched by identity 0" -"2019-07-20 02:40:27.885 UTC [msp.identity] Verify -> DEBU 1105 Verify: digest = 00000000 fd 67 c4 b0 85 cb 38 56 50 7e bc 5b 91 c9 58 f5 |.g....8VP~.[..X.| -00000010 d8 6f d5 69 72 ea 09 87 2f 36 f6 5d 04 12 22 2b |.o.ir.../6.].."+|" -"2019-07-20 02:40:27.885 UTC [msp.identity] Verify -> DEBU 1106 Verify: sig = 00000000 30 44 02 20 6c 40 9e 5f c4 72 dd 46 9b 91 56 5c |0D. l@._.r.F..V\| -00000010 4c 18 86 1b c3 d0 4f 1a 42 2d 3b 24 98 d0 7e 33 |L.....O.B-;$..~3| -00000020 8b c1 0d 20 02 20 05 cc d8 dd a6 4e e6 f7 e2 5e |... . .....N...^| -00000030 96 b7 47 f1 4b d9 8a f6 0a 37 5b 58 02 60 01 93 |..G.K....7[X.`..| -00000040 f3 e2 8c ca 4c 85 |....L.|" -"2019-07-20 02:40:27.886 UTC [cauthdsl] func2 -> DEBU 1107 0xc0011a9f70 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:27.886 UTC [cauthdsl] func1 -> DEBU 1108 0xc0011a9f70 gate 1563590427883598700 evaluation succeeds" -"2019-07-20 02:40:27.886 UTC [policies] Evaluate -> DEBU 1109 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:27.887 UTC [policies] Evaluate -> DEBU 110a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:27.887 UTC [policies] Evaluate -> DEBU 110b Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110d Signature set satisfies policy /Channel/Writers" -"2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-07-20 02:40:27.888 UTC [orderer.common.blockcutter] Ordered -> DEBU 110f Enqueuing message into batch" -"2019-07-20 02:40:27.889 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1110 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39172" -"2019-07-20 02:40:27.897 UTC [grpc] warningf -> DEBU 1111 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39172: read: connection reset by peer" -"2019-07-20 02:40:27.901 UTC [grpc] infof -> DEBU 1112 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:27.902 UTC [orderer.common.broadcast] Handle -> WARN 1113 Error reading from 172.18.0.9:39172: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:27.902 UTC [orderer.common.server] func1 -> DEBU 1114 Closing Broadcast stream" -"2019-07-20 02:40:27.903 UTC [comm.grpc.server] 1 -> INFO 1115 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39172 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.0506ms -"2019-07-20 02:40:27.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1116 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:27.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1117 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" -"2019-07-20 02:40:27.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1118 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.4µs " -"2019-07-20 02:40:28.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" -"2019-07-20 02:40:28.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111b Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" -"2019-07-20 02:40:28.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 405µs " -"2019-07-20 02:40:28.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.9µs " -"2019-07-20 02:40:28.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:28.232 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:28.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:28.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1120 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" -"2019-07-20 02:40:28.474 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1121 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 450.9µs " -"2019-07-20 02:40:28.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 2 on channel businesschannel took 39.2µs" -"2019-07-20 02:40:28.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1123 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" -"2019-07-20 02:40:28.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1124 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.4µs " -"2019-07-20 02:40:28.730 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1125 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0312ms " -"2019-07-20 02:40:28.731 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1126 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:28.732 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1127 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:28.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1128 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:28.974 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1129 Sending msg of 28 bytes to 3 on channel testchainid took 50.1µs" -"2019-07-20 02:40:28.975 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.4µs " -"2019-07-20 02:40:29.226 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112b Sending msg of 28 bytes to 2 on channel businesschannel took 40.1µs" -"2019-07-20 02:40:29.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.2µs " -"2019-07-20 02:40:29.226 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112d Sending msg of 28 bytes to 3 on channel businesschannel took 28.4µs" -"2019-07-20 02:40:29.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 247.4µs " -"2019-07-20 02:40:29.232 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:29.233 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1130 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:29.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1131 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:29.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1132 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" -"2019-07-20 02:40:29.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1133 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " -"2019-07-20 02:40:29.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 28 bytes to 3 on channel businesschannel took 32.1µs" -"2019-07-20 02:40:29.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1135 Sending msg of 28 bytes to 2 on channel businesschannel took 258.8µs" -"2019-07-20 02:40:29.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.3µs " -"2019-07-20 02:40:29.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1137 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 584.7µs " -"2019-07-20 02:40:29.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1138 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:29.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:29.890 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 113a Batch timer expired, creating block" channel=businesschannel node=1 -"2019-07-20 02:40:29.890 UTC [orderer.consensus.etcdraft] propose -> INFO 113b Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-07-20 02:40:29.891 UTC [orderer.consensus.etcdraft] 2 -> DEBU 113c Proposed block [5] to raft consensus" channel=businesschannel node=1 -"2019-07-20 02:40:29.894 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 3112 bytes to 3 on channel businesschannel took 17µs" -"2019-07-20 02:40:29.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113f Sending msg of 3112 bytes to 2 on channel businesschannel took 17.3µs" -"2019-07-20 02:40:29.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel businesschannel with payload of size 3112 to orderer2.example.com(orderer2.example.com:7050) took 140.5µs " -"2019-07-20 02:40:29.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1140 Send of ConsensusRequest for channel businesschannel with payload of size 3112 to orderer1.example.com(orderer1.example.com:7050) took 79.2µs " -"2019-07-20 02:40:29.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1141 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:29.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1142 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:29.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1143 Sending msg of 28 bytes to 2 on channel businesschannel took 13.7µs" -"2019-07-20 02:40:29.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1145 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.2µs " -"2019-07-20 02:40:29.899 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1144 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 -"2019-07-20 02:40:29.900 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1146 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" -"2019-07-20 02:40:29.900 UTC [msp] GetDefaultSigningIdentity -> DEBU 1147 Obtaining default signing identity" -"2019-07-20 02:40:29.900 UTC [msp] GetDefaultSigningIdentity -> DEBU 1148 Obtaining default signing identity" -"2019-07-20 02:40:29.900 UTC [msp.identity] Sign -> DEBU 1149 Sign: plaintext: 0A020802120B0A090A03010203100418...03E90289BE6FEC11C4DE24D2242E81F9 " -"2019-07-20 02:40:29.900 UTC [msp.identity] Sign -> DEBU 114a Sign: digest: 0CA473387D6CDB7D787CDA3D7B85AE1D177FA930A3C5FDFB7F504D999C61315F " -"2019-07-20 02:40:29.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114b Sending msg of 28 bytes to 3 on channel businesschannel took 893.6µs" -"2019-07-20 02:40:29.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.5µs " -"2019-07-20 02:40:29.902 UTC [fsblkstorage] indexBlock -> DEBU 114d Indexing block [blockNum=5, blockHash=[]byte{0x91, 0x57, 0x90, 0x2d, 0xf6, 0xfd, 0xb5, 0x4d, 0x5e, 0x9f, 0x17, 0xe5, 0xf6, 0x19, 0x33, 0xf, 0xd2, 0x27, 0x45, 0x3, 0x6c, 0x2, 0x3e, 0x8d, 0x6d, 0x3b, 0xa6, 0x3e, 0x8b, 0x83, 0x1b, 0x53} txOffsets= -txId=cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 locPointer=offset=70, bytesLength=2984 -]" -"2019-07-20 02:40:29.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:29.905 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:29.906 UTC [fsblkstorage] updateCheckpoint -> DEBU 1150 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[83904], isChainEmpty=[false], lastBlockNumber=[5]" -"2019-07-20 02:40:29.907 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1151 [channel: businesschannel] Wrote block [5]" -"2019-07-20 02:40:29.909 UTC [fsblkstorage] waitForBlock -> DEBU 1152 Came out of wait. maxAvailaBlockNumber=[5]" -"2019-07-20 02:40:29.913 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1153 Remaining bytes=[3991], Going to peek [8] bytes" -"2019-07-20 02:40:29.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1154 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" -"2019-07-20 02:40:29.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1155 blockbytes [3989] read from file [0]" -"2019-07-20 02:40:29.914 UTC [common.deliver] deliverBlocks -> DEBU 1156 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -"2019-07-20 02:40:29.914 UTC [fsblkstorage] waitForBlock -> DEBU 1157 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-07-20 02:40:29.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1158 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:29.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1159 Sending msg of 28 bytes to 3 on channel testchainid took 134.1µs" -"2019-07-20 02:40:29.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.4µs " -"2019-07-20 02:40:30.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115b Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" -"2019-07-20 02:40:30.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115c Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" -"2019-07-20 02:40:30.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 408.2µs " -"2019-07-20 02:40:30.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 201.3µs " -"2019-07-20 02:40:30.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:30.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1160 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:30.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1161 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:30.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1162 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" -"2019-07-20 02:40:30.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1163 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " -"2019-07-20 02:40:30.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1164 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" -"2019-07-20 02:40:30.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1165 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" -"2019-07-20 02:40:30.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1166 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 327.6µs " -"2019-07-20 02:40:30.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1167 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 471.7µs " -"2019-07-20 02:40:30.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1168 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:30.698 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1169 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:30.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:30.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116b Sending msg of 28 bytes to 3 on channel testchainid took 316.3µs" -"2019-07-20 02:40:30.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " -"2019-07-20 02:40:31.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116d Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" -"2019-07-20 02:40:31.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116e Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" -"2019-07-20 02:40:31.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 455.2µs " -"2019-07-20 02:40:31.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1170 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 184.6µs " -"2019-07-20 02:40:31.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1171 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:31.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1172 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:31.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1173 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:31.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1174 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" -"2019-07-20 02:40:31.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1175 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " -"2019-07-20 02:40:31.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1176 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" -"2019-07-20 02:40:31.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1177 Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" -"2019-07-20 02:40:31.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1178 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2436ms " -"2019-07-20 02:40:31.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1179 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.9µs " -"2019-07-20 02:40:31.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:31.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:31.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:31.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117d Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" -"2019-07-20 02:40:31.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.6882ms " -"2019-07-20 02:40:32.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117f Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" -"2019-07-20 02:40:32.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1180 Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" -"2019-07-20 02:40:32.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1181 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.9µs " -"2019-07-20 02:40:32.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1182 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.9µs " -"2019-07-20 02:40:32.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1183 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:32.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1184 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:32.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1185 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:32.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1186 Sending msg of 28 bytes to 3 on channel testchainid took 21.4µs" -"2019-07-20 02:40:32.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1187 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " -"2019-07-20 02:40:32.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1188 Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" -"2019-07-20 02:40:32.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118b Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" -"2019-07-20 02:40:32.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:32.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1189 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 158.9µs " -"2019-07-20 02:40:32.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " -"2019-07-20 02:40:32.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:32.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:32.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118f Sending msg of 28 bytes to 3 on channel testchainid took 51.8µs" -"2019-07-20 02:40:32.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1190 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " -"2019-07-20 02:40:33.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1191 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" -"2019-07-20 02:40:33.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1192 Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" -"2019-07-20 02:40:33.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1193 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.6µs " -"2019-07-20 02:40:33.204 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1194 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:33.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1195 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 392.4µs " -"2019-07-20 02:40:33.235 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1196 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:33.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1197 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:33.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1198 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " -"2019-07-20 02:40:33.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1199 Sending msg of 28 bytes to 3 on channel testchainid took 111.4µs" -"2019-07-20 02:40:33.617 UTC [orderer.common.server] Deliver -> DEBU 119a Starting new Deliver handler" -"2019-07-20 02:40:33.618 UTC [common.deliver] Handle -> DEBU 119b Starting new deliver loop for 172.18.0.9:39218" -"2019-07-20 02:40:33.618 UTC [common.deliver] Handle -> DEBU 119c Attempting to read seek info message from 172.18.0.9:39218" -"2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 11a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 11a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:33.618 UTC [msp] DeserializeIdentity -> DEBU 11a2 Obtaining identity" -"2019-07-20 02:40:33.619 UTC [msp.identity] newIdentity -> DEBU 11a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.372 UTC [msp.identity] newIdentity -> DEBU 8ab Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -6274,1024 +3379,20 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-07-20 02:40:33.619 UTC [cauthdsl] func1 -> DEBU 11a4 0xc000f79400 gate 1563590433619571000 evaluation starts" -"2019-07-20 02:40:33.619 UTC [cauthdsl] func2 -> DEBU 11a5 0xc000f79400 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:33.624 UTC [cauthdsl] func2 -> DEBU 11a6 0xc000f79400 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:33.624 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 11a7 Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-07-20 02:40:33.624 UTC [msp] Validate -> DEBU 11a8 MSP OrdererMSP validating identity" -"2019-07-20 02:40:33.625 UTC [cauthdsl] func2 -> DEBU 11a9 0xc000f79400 principal matched by identity 0" -"2019-07-20 02:40:33.626 UTC [msp.identity] Verify -> DEBU 11aa Verify: digest = 00000000 55 c9 26 71 a9 da 8f 39 4f 12 4f 6c f0 e9 45 30 |U.&q...9O.Ol..E0| -00000010 9c 1f 65 0e 71 cd 0b fc 87 3b 26 9b bf af 0f b7 |..e.q....;&.....|" -"2019-07-20 02:40:33.626 UTC [msp.identity] Verify -> DEBU 11ab Verify: sig = 00000000 30 44 02 20 13 d1 7a 88 5c 59 6e d7 83 10 61 2a |0D. ..z.\Yn...a*| -00000010 cc d9 b5 7b 34 21 e2 06 ae 3f 74 89 f3 c8 b9 56 |...{4!...?t....V| -00000020 94 88 ac 9d 02 20 4b 56 d3 98 42 a4 81 45 8c 3b |..... KV..B..E.;| -00000030 e3 70 af d5 0b bb 8f 15 46 0e 6e 35 cc 57 76 3a |.p......F.n5.Wv:| -00000040 fe b2 06 79 24 ab |...y$.|" -"2019-07-20 02:40:33.627 UTC [cauthdsl] func2 -> DEBU 11ac 0xc000f79400 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:33.627 UTC [cauthdsl] func1 -> DEBU 11ad 0xc000f79400 gate 1563590433619571000 evaluation succeeds" -"2019-07-20 02:40:33.628 UTC [policies] Evaluate -> DEBU 11ae Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:33.629 UTC [policies] Evaluate -> DEBU 11af == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:33.631 UTC [policies] Evaluate -> DEBU 11b0 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:33.631 UTC [policies] Evaluate -> DEBU 11b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:33.633 UTC [policies] Evaluate -> DEBU 11b2 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:33.633 UTC [policies] Evaluate -> DEBU 11b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:33.634 UTC [common.deliver] deliverBlocks -> DEBU 11b4 [channel: businesschannel] Received seekInfo (0xc00118d8c0) start: > stop: > from 172.18.0.9:39218" -"2019-07-20 02:40:33.634 UTC [fsblkstorage] Next -> DEBU 11b5 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -"2019-07-20 02:40:33.634 UTC [fsblkstorage] newBlockfileStream -> DEBU 11b6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" -"2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b7 Remaining bytes=[3991], Going to peek [8] bytes" -"2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b8 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" -"2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b9 blockbytes [3989] read from file [0]" -"2019-07-20 02:40:33.635 UTC [common.deliver] deliverBlocks -> DEBU 11ba [channel: businesschannel] Delivering block for (0xc00118d8c0) for 172.18.0.9:39218" -"2019-07-20 02:40:33.636 UTC [common.deliver] deliverBlocks -> DEBU 11bb [channel: businesschannel] Done delivering to 172.18.0.9:39218 for (0xc00118d8c0)" -"2019-07-20 02:40:33.636 UTC [common.deliver] Handle -> DEBU 11bc Waiting for new SeekInfo from 172.18.0.9:39218" -"2019-07-20 02:40:33.636 UTC [common.deliver] Handle -> DEBU 11bd Attempting to read seek info message from 172.18.0.9:39218" -"2019-07-20 02:40:33.636 UTC [fsblkstorage] waitForBlock -> DEBU 11be Came out of wait. maxAvailaBlockNumber=[5]" -"2019-07-20 02:40:33.637 UTC [fsblkstorage] waitForBlock -> DEBU 11bf Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-07-20 02:40:33.644 UTC [grpc] warningf -> DEBU 11c0 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39218: read: connection reset by peer" -"2019-07-20 02:40:33.646 UTC [common.deliver] Handle -> WARN 11c1 Error reading from 172.18.0.9:39218: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:33.646 UTC [orderer.common.server] func1 -> DEBU 11c2 Closing Deliver stream" -"2019-07-20 02:40:33.646 UTC [comm.grpc.server] 1 -> INFO 11c3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39218 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.802ms -"2019-07-20 02:40:33.649 UTC [grpc] infof -> DEBU 11c4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:33.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c5 Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" -"2019-07-20 02:40:33.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c6 Sending msg of 28 bytes to 3 on channel businesschannel took 138.9µs" -"2019-07-20 02:40:33.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.8µs " -"2019-07-20 02:40:33.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.1µs " -"2019-07-20 02:40:33.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:33.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ca Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:33.889 UTC [orderer.common.server] Deliver -> DEBU 11cb Starting new Deliver handler" -"2019-07-20 02:40:33.889 UTC [common.deliver] Handle -> DEBU 11cc Starting new deliver loop for 172.18.0.9:39220" -"2019-07-20 02:40:33.889 UTC [common.deliver] Handle -> DEBU 11cd Attempting to read seek info message from 172.18.0.9:39220" -"2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11ce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11cf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:33.891 UTC [policies] Evaluate -> DEBU 11d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:33.891 UTC [policies] Evaluate -> DEBU 11d2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:33.892 UTC [cauthdsl] func1 -> DEBU 11d3 0xc00126b620 gate 1563590433891872700 evaluation starts" -"2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d4 0xc00126b620 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d5 0xc00126b620 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d6 0xc00126b620 principal matched by identity 0" -"2019-07-20 02:40:33.892 UTC [msp.identity] Verify -> DEBU 11d7 Verify: digest = 00000000 13 d8 2c 3b 19 3b 56 2b de 29 07 d5 a7 58 51 51 |..,;.;V+.)...XQQ| -00000010 2c a5 24 fa 2d be 90 7a 13 07 ec bb 28 fa a0 75 |,.$.-..z....(..u|" -"2019-07-20 02:40:33.893 UTC [msp.identity] Verify -> DEBU 11d8 Verify: sig = 00000000 30 44 02 20 38 3b 2b 4e 6c e1 52 68 ba be 33 3f |0D. 8;+Nl.Rh..3?| -00000010 d6 8c 76 d3 a8 19 dd 8f 42 b8 e8 ab 0b 36 a8 fd |..v.....B....6..| -00000020 f5 52 77 a7 02 20 62 ec 99 2a c5 17 af 85 b8 4d |.Rw.. b..*.....M| -00000030 bd c2 ff 9b 55 67 36 1a 52 7f 7c 0a 3e fe 7d 10 |....Ug6.R.|.>.}.| -00000040 59 05 00 c8 fa 88 |Y.....|" -"2019-07-20 02:40:33.894 UTC [cauthdsl] func2 -> DEBU 11d9 0xc00126b620 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:33.894 UTC [cauthdsl] func1 -> DEBU 11da 0xc00126b620 gate 1563590433891872700 evaluation succeeds" -"2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11db Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11dc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11dd Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11df Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:33.896 UTC [common.deliver] deliverBlocks -> DEBU 11e1 [channel: businesschannel] Received seekInfo (0xc000fe9640) start: > stop: > from 172.18.0.9:39220" -"2019-07-20 02:40:33.896 UTC [fsblkstorage] Next -> DEBU 11e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -"2019-07-20 02:40:33.896 UTC [fsblkstorage] newBlockfileStream -> DEBU 11e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" -"2019-07-20 02:40:33.897 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e4 Remaining bytes=[3991], Going to peek [8] bytes" -"2019-07-20 02:40:33.897 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e5 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" -"2019-07-20 02:40:33.898 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e6 blockbytes [3989] read from file [0]" -"2019-07-20 02:40:33.899 UTC [common.deliver] deliverBlocks -> DEBU 11e7 [channel: businesschannel] Delivering block for (0xc000fe9640) for 172.18.0.9:39220" -"2019-07-20 02:40:33.900 UTC [common.deliver] deliverBlocks -> DEBU 11e8 [channel: businesschannel] Done delivering to 172.18.0.9:39220 for (0xc000fe9640)" -"2019-07-20 02:40:33.901 UTC [fsblkstorage] waitForBlock -> DEBU 11e9 Came out of wait. maxAvailaBlockNumber=[5]" -"2019-07-20 02:40:33.901 UTC [fsblkstorage] waitForBlock -> DEBU 11ea Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-07-20 02:40:33.901 UTC [common.deliver] Handle -> DEBU 11eb Waiting for new SeekInfo from 172.18.0.9:39220" -"2019-07-20 02:40:33.902 UTC [common.deliver] Handle -> DEBU 11ec Attempting to read seek info message from 172.18.0.9:39220" -"2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:33.906 UTC [policies] Evaluate -> DEBU 11f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:33.907 UTC [cauthdsl] func1 -> DEBU 11f2 0xc001299650 gate 1563590433907098600 evaluation starts" -"2019-07-20 02:40:33.907 UTC [cauthdsl] func2 -> DEBU 11f3 0xc001299650 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:33.909 UTC [cauthdsl] func2 -> DEBU 11f4 0xc001299650 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:33.909 UTC [cauthdsl] func2 -> DEBU 11f5 0xc001299650 principal matched by identity 0" -"2019-07-20 02:40:33.909 UTC [msp.identity] Verify -> DEBU 11f6 Verify: digest = 00000000 4e 8f 7f 37 eb 86 61 f8 3b a4 3a d5 32 0f a5 e1 |N..7..a.;.:.2...| -00000010 e7 ad 54 65 39 59 bf 01 7d e9 93 a0 4c e6 69 9c |..Te9Y..}...L.i.|" -"2019-07-20 02:40:33.909 UTC [msp.identity] Verify -> DEBU 11f7 Verify: sig = 00000000 30 44 02 20 2a a1 af a0 ea d8 96 d9 ab 68 52 17 |0D. *........hR.| -00000010 22 12 bf fa 81 9a 3f 11 f8 78 dc 65 73 ca 36 94 |".....?..x.es.6.| -00000020 45 c4 79 3f 02 20 14 61 ea 34 83 b9 4c 1e 47 5e |E.y?. .a.4..L.G^| -00000030 4b a4 44 12 58 29 e9 7c f0 7a ad 65 ab 63 db ad |K.D.X).|.z.e.c..| -00000040 7f 37 d8 86 95 a8 |.7....|" -"2019-07-20 02:40:33.910 UTC [cauthdsl] func2 -> DEBU 11f8 0xc001299650 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:33.910 UTC [cauthdsl] func1 -> DEBU 11f9 0xc001299650 gate 1563590433907098600 evaluation succeeds" -"2019-07-20 02:40:33.910 UTC [policies] Evaluate -> DEBU 11fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:33.910 UTC [policies] Evaluate -> DEBU 11fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fc Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fe Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:33.912 UTC [policies] Evaluate -> DEBU 11ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:33.912 UTC [common.deliver] deliverBlocks -> DEBU 1200 [channel: businesschannel] Received seekInfo (0xc000fe9a00) start: > stop: > from 172.18.0.9:39220" -"2019-07-20 02:40:33.912 UTC [fsblkstorage] Next -> DEBU 1201 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -"2019-07-20 02:40:33.912 UTC [fsblkstorage] newBlockfileStream -> DEBU 1202 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" -"2019-07-20 02:40:33.913 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1203 Remaining bytes=[36264], Going to peek [8] bytes" -"2019-07-20 02:40:33.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1204 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" -"2019-07-20 02:40:33.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1205 blockbytes [23747] read from file [0]" -"2019-07-20 02:40:33.914 UTC [common.deliver] deliverBlocks -> DEBU 1206 [channel: businesschannel] Delivering block for (0xc000fe9a00) for 172.18.0.9:39220" -"2019-07-20 02:40:33.916 UTC [common.deliver] deliverBlocks -> DEBU 1207 [channel: businesschannel] Done delivering to 172.18.0.9:39220 for (0xc000fe9a00)" -"2019-07-20 02:40:33.916 UTC [fsblkstorage] waitForBlock -> DEBU 1208 Came out of wait. maxAvailaBlockNumber=[5]" -"2019-07-20 02:40:33.916 UTC [fsblkstorage] waitForBlock -> DEBU 1209 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-07-20 02:40:33.917 UTC [common.deliver] Handle -> DEBU 120a Waiting for new SeekInfo from 172.18.0.9:39220" -"2019-07-20 02:40:33.921 UTC [common.deliver] Handle -> DEBU 120b Attempting to read seek info message from 172.18.0.9:39220" -"2019-07-20 02:40:33.927 UTC [common.deliver] Handle -> WARN 120c Error reading from 172.18.0.9:39220: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:33.927 UTC [orderer.common.server] func1 -> DEBU 120d Closing Deliver stream" -"2019-07-20 02:40:33.927 UTC [comm.grpc.server] 1 -> INFO 120e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39220 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.5069ms -"2019-07-20 02:40:33.927 UTC [grpc] infof -> DEBU 120f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:33.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1210 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:33.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1211 Sending msg of 28 bytes to 3 on channel testchainid took 144.5µs" -"2019-07-20 02:40:33.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1212 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 641.5µs " -"2019-07-20 02:40:34.084 UTC [orderer.common.server] Deliver -> DEBU 1213 Starting new Deliver handler" -"2019-07-20 02:40:34.084 UTC [common.deliver] Handle -> DEBU 1214 Starting new deliver loop for 172.18.0.9:39222" -"2019-07-20 02:40:34.084 UTC [common.deliver] Handle -> DEBU 1215 Attempting to read seek info message from 172.18.0.9:39222" -"2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1216 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1217 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1218 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:34.094 UTC [policies] Evaluate -> DEBU 1219 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:34.094 UTC [policies] Evaluate -> DEBU 121a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:34.094 UTC [cauthdsl] func1 -> DEBU 121b 0xc0012b7f40 gate 1563590434094666400 evaluation starts" -"2019-07-20 02:40:34.094 UTC [cauthdsl] func2 -> DEBU 121c 0xc0012b7f40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:34.095 UTC [cauthdsl] func2 -> DEBU 121d 0xc0012b7f40 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:34.095 UTC [cauthdsl] func2 -> DEBU 121e 0xc0012b7f40 principal matched by identity 0" -"2019-07-20 02:40:34.095 UTC [msp.identity] Verify -> DEBU 121f Verify: digest = 00000000 7e 43 fb 52 94 7b bc 04 7f d2 6c 9f 95 25 f7 37 |~C.R.{....l..%.7| -00000010 cb dd 56 7a 09 c9 84 75 79 b9 ce fe e3 94 b6 a8 |..Vz...uy.......|" -"2019-07-20 02:40:34.096 UTC [msp.identity] Verify -> DEBU 1220 Verify: sig = 00000000 30 44 02 20 30 ff 5b 04 1f bb 8e 30 0c 4b 0d df |0D. 0.[....0.K..| -00000010 da 16 e8 1e 80 32 90 2a e0 3b c0 b3 17 30 c1 de |.....2.*.;...0..| -00000020 40 a9 a7 be 02 20 3f 66 5d 22 21 3c bd 50 53 04 |@.... ?f]"!<.PS.| -00000030 15 d4 8e 53 77 2c e1 82 f2 2a f8 dc f8 92 2c ea |...Sw,...*....,.| -00000040 bd 03 a8 60 34 1b |...`4.|" -"2019-07-20 02:40:34.103 UTC [cauthdsl] func2 -> DEBU 1221 0xc0012b7f40 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:34.104 UTC [cauthdsl] func1 -> DEBU 1222 0xc0012b7f40 gate 1563590434094666400 evaluation succeeds" -"2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1223 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1224 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1225 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1226 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1227 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:34.105 UTC [common.deliver] deliverBlocks -> DEBU 1229 [channel: businesschannel] Received seekInfo (0xc0013160c0) start: > stop: > from 172.18.0.9:39222" -"2019-07-20 02:40:34.106 UTC [fsblkstorage] Next -> DEBU 122a Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -"2019-07-20 02:40:34.106 UTC [fsblkstorage] newBlockfileStream -> DEBU 122b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -"2019-07-20 02:40:34.106 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122c Remaining bytes=[83904], Going to peek [8] bytes" -"2019-07-20 02:40:34.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122d Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:40:34.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122e blockbytes [23944] read from file [0]" -"2019-07-20 02:40:34.107 UTC [common.deliver] deliverBlocks -> DEBU 122f [channel: businesschannel] Delivering block for (0xc0013160c0) for 172.18.0.9:39222" -"2019-07-20 02:40:34.107 UTC [common.deliver] deliverBlocks -> DEBU 1230 [channel: businesschannel] Done delivering to 172.18.0.9:39222 for (0xc0013160c0)" -"2019-07-20 02:40:34.108 UTC [fsblkstorage] waitForBlock -> DEBU 1231 Came out of wait. maxAvailaBlockNumber=[5]" -"2019-07-20 02:40:34.108 UTC [fsblkstorage] waitForBlock -> DEBU 1232 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-07-20 02:40:34.109 UTC [common.deliver] Handle -> DEBU 1233 Waiting for new SeekInfo from 172.18.0.9:39222" -"2019-07-20 02:40:34.114 UTC [grpc] infof -> DEBU 1234 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:34.111 UTC [common.deliver] Handle -> DEBU 1235 Attempting to read seek info message from 172.18.0.9:39222" -"2019-07-20 02:40:34.114 UTC [common.deliver] Handle -> WARN 1236 Error reading from 172.18.0.9:39222: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:34.114 UTC [orderer.common.server] func1 -> DEBU 1237 Closing Deliver stream" -"2019-07-20 02:40:34.114 UTC [comm.grpc.server] 1 -> INFO 1238 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39222 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.6095ms -"2019-07-20 02:40:34.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1239 Sending msg of 28 bytes to 2 on channel businesschannel took 73.5µs" -"2019-07-20 02:40:34.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 123a Sending msg of 28 bytes to 3 on channel businesschannel took 32.6µs" -"2019-07-20 02:40:34.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 819.6µs " -"2019-07-20 02:40:34.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.5µs " -"2019-07-20 02:40:34.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:34.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:34.288 UTC [orderer.common.server] Deliver -> DEBU 123f Starting new Deliver handler" -"2019-07-20 02:40:34.288 UTC [common.deliver] Handle -> DEBU 1240 Starting new deliver loop for 172.18.0.9:39224" -"2019-07-20 02:40:34.289 UTC [common.deliver] Handle -> DEBU 1241 Attempting to read seek info message from 172.18.0.9:39224" -"2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1242 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1243 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1244 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1245 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1246 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:34.290 UTC [cauthdsl] func1 -> DEBU 1247 0xc000266930 gate 1563590434290750100 evaluation starts" -"2019-07-20 02:40:34.290 UTC [cauthdsl] func2 -> DEBU 1248 0xc000266930 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 1249 0xc000266930 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 124a 0xc000266930 principal matched by identity 0" -"2019-07-20 02:40:34.291 UTC [msp.identity] Verify -> DEBU 124b Verify: digest = 00000000 b6 ff ca 28 9e 7c 64 7c 18 2f fe 11 67 9f 5c e6 |...(.|d|./..g.\.| -00000010 98 c3 94 a2 a5 7c b7 2f 11 b6 5d 99 65 38 31 a1 |.....|./..].e81.|" -"2019-07-20 02:40:34.291 UTC [msp.identity] Verify -> DEBU 124c Verify: sig = 00000000 30 44 02 20 25 76 f6 0c 6b 08 93 d0 c9 c9 8b 6e |0D. %v..k......n| -00000010 39 ab 6d 08 97 a9 96 eb 84 0f d7 99 67 27 4c c8 |9.m.........g'L.| -00000020 eb 35 ec 00 02 20 64 0d 0d d0 2b 97 19 7f 7c 97 |.5... d...+...|.| -00000030 ff 71 2f 38 d7 cb 37 14 b3 79 d5 4d de 0a ef b3 |.q/8..7..y.M....| -00000040 dd a6 af 00 3d ed |....=.|" -"2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 124d 0xc000266930 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:34.291 UTC [cauthdsl] func1 -> DEBU 124e 0xc000266930 gate 1563590434290750100 evaluation succeeds" -"2019-07-20 02:40:34.291 UTC [policies] Evaluate -> DEBU 124f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1250 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1251 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1252 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1253 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1254 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:34.293 UTC [common.deliver] deliverBlocks -> DEBU 1255 [channel: businesschannel] Received seekInfo (0xc000d14600) start: > stop: > from 172.18.0.9:39224" -"2019-07-20 02:40:34.293 UTC [fsblkstorage] Next -> DEBU 1256 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -"2019-07-20 02:40:34.293 UTC [fsblkstorage] newBlockfileStream -> DEBU 1257 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" -"2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1258 Remaining bytes=[59957], Going to peek [8] bytes" -"2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1259 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" -"2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 125a blockbytes [23690] read from file [0]" -"2019-07-20 02:40:34.294 UTC [common.deliver] deliverBlocks -> DEBU 125b [channel: businesschannel] Delivering block for (0xc000d14600) for 172.18.0.9:39224" -"2019-07-20 02:40:34.295 UTC [common.deliver] deliverBlocks -> DEBU 125c [channel: businesschannel] Done delivering to 172.18.0.9:39224 for (0xc000d14600)" -"2019-07-20 02:40:34.295 UTC [fsblkstorage] waitForBlock -> DEBU 125d Came out of wait. maxAvailaBlockNumber=[5]" -"2019-07-20 02:40:34.296 UTC [fsblkstorage] waitForBlock -> DEBU 125e Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-07-20 02:40:34.295 UTC [common.deliver] Handle -> DEBU 125f Waiting for new SeekInfo from 172.18.0.9:39224" -"2019-07-20 02:40:34.296 UTC [common.deliver] Handle -> DEBU 1260 Attempting to read seek info message from 172.18.0.9:39224" -"2019-07-20 02:40:34.304 UTC [common.deliver] Handle -> WARN 1261 Error reading from 172.18.0.9:39224: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:34.304 UTC [orderer.common.server] func1 -> DEBU 1262 Closing Deliver stream" -"2019-07-20 02:40:34.304 UTC [comm.grpc.server] 1 -> INFO 1263 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39224 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.6359ms -"2019-07-20 02:40:34.304 UTC [grpc] infof -> DEBU 1264 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:34.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1265 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:34.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1266 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" -"2019-07-20 02:40:34.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1267 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " -"2019-07-20 02:40:34.458 UTC [orderer.common.server] Deliver -> DEBU 1268 Starting new Deliver handler" -"2019-07-20 02:40:34.458 UTC [common.deliver] Handle -> DEBU 1269 Starting new deliver loop for 172.18.0.9:39226" -"2019-07-20 02:40:34.458 UTC [common.deliver] Handle -> DEBU 126a Attempting to read seek info message from 172.18.0.9:39226" -"2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:34.460 UTC [cauthdsl] func1 -> DEBU 1270 0xc00029c200 gate 1563590434460744000 evaluation starts" -"2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1271 0xc00029c200 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1272 0xc00029c200 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1273 0xc00029c200 principal matched by identity 0" -"2019-07-20 02:40:34.461 UTC [msp.identity] Verify -> DEBU 1274 Verify: digest = 00000000 e1 5a 7b 9e 59 a0 ff dd e8 71 0e d6 50 2b b3 6b |.Z{.Y....q..P+.k| -00000010 eb 35 f7 c1 54 12 29 76 94 77 c8 7a 86 11 61 e3 |.5..T.)v.w.z..a.|" -"2019-07-20 02:40:34.461 UTC [msp.identity] Verify -> DEBU 1275 Verify: sig = 00000000 30 44 02 20 33 2e 3f 3e e0 52 ff 41 fe b5 d3 a0 |0D. 3.?>.R.A....| -00000010 2d 27 e8 cf 58 7c ed 69 8b d4 f6 3d ab d4 9f a2 |-'..X|.i...=....| -00000020 c9 0d 27 04 02 20 39 44 87 05 83 70 f7 bd bd be |..'.. 9D...p....| -00000030 8c db 61 83 e9 1b 08 b9 80 be 5e ca 20 db a9 77 |..a.......^. ..w| -00000040 e6 dd 8c e8 6f 62 |....ob|" -"2019-07-20 02:40:34.462 UTC [cauthdsl] func2 -> DEBU 1276 0xc00029c200 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:34.462 UTC [cauthdsl] func1 -> DEBU 1277 0xc00029c200 gate 1563590434460744000 evaluation succeeds" -"2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 1278 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 1279 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 127a Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127c Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:34.463 UTC [common.deliver] deliverBlocks -> DEBU 127e [channel: businesschannel] Received seekInfo (0xc00121e580) start: > stop: > from 172.18.0.9:39226" -"2019-07-20 02:40:34.463 UTC [fsblkstorage] Next -> DEBU 127f Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -"2019-07-20 02:40:34.463 UTC [fsblkstorage] newBlockfileStream -> DEBU 1280 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" -"2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1281 Remaining bytes=[36264], Going to peek [8] bytes" -"2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1282 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" -"2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1283 blockbytes [23747] read from file [0]" -"2019-07-20 02:40:34.465 UTC [common.deliver] deliverBlocks -> DEBU 1284 [channel: businesschannel] Delivering block for (0xc00121e580) for 172.18.0.9:39226" -"2019-07-20 02:40:34.466 UTC [common.deliver] deliverBlocks -> DEBU 1285 [channel: businesschannel] Done delivering to 172.18.0.9:39226 for (0xc00121e580)" -"2019-07-20 02:40:34.467 UTC [common.deliver] Handle -> DEBU 1286 Waiting for new SeekInfo from 172.18.0.9:39226" -"2019-07-20 02:40:34.467 UTC [common.deliver] Handle -> DEBU 1287 Attempting to read seek info message from 172.18.0.9:39226" -"2019-07-20 02:40:34.467 UTC [fsblkstorage] waitForBlock -> DEBU 1288 Came out of wait. maxAvailaBlockNumber=[5]" -"2019-07-20 02:40:34.469 UTC [fsblkstorage] waitForBlock -> DEBU 1289 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-07-20 02:40:34.479 UTC [common.deliver] Handle -> WARN 128a Error reading from 172.18.0.9:39226: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:34.479 UTC [orderer.common.server] func1 -> DEBU 128b Closing Deliver stream" -"2019-07-20 02:40:34.479 UTC [comm.grpc.server] 1 -> INFO 128c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39226 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.8288ms -"2019-07-20 02:40:34.480 UTC [grpc] infof -> DEBU 128d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:34.685 UTC [orderer.common.server] Deliver -> DEBU 128e Starting new Deliver handler" -"2019-07-20 02:40:34.685 UTC [common.deliver] Handle -> DEBU 128f Starting new deliver loop for 172.18.0.9:39228" -"2019-07-20 02:40:34.685 UTC [common.deliver] Handle -> DEBU 1290 Attempting to read seek info message from 172.18.0.9:39228" -"2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1291 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1292 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1294 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1295 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:34.687 UTC [cauthdsl] func1 -> DEBU 1296 0xc000bac420 gate 1563590434687004600 evaluation starts" -"2019-07-20 02:40:34.687 UTC [cauthdsl] func2 -> DEBU 1297 0xc000bac420 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:34.687 UTC [cauthdsl] func2 -> DEBU 1298 0xc000bac420 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:34.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.4µs " -"2019-07-20 02:40:34.691 UTC [cauthdsl] func2 -> DEBU 129b 0xc000bac420 principal matched by identity 0" -"2019-07-20 02:40:34.691 UTC [msp.identity] Verify -> DEBU 129c Verify: digest = 00000000 02 a4 1e 39 0d 23 70 6d 9f f9 40 d6 b3 e5 e0 92 |...9.#pm..@.....| -00000010 ca 59 28 b5 b1 75 d7 fa 41 f1 a7 d7 fb 4d b6 5b |.Y(..u..A....M.[|" -"2019-07-20 02:40:34.692 UTC [msp.identity] Verify -> DEBU 129d Verify: sig = 00000000 30 45 02 21 00 b3 bb c4 d7 0e 11 6a 64 b5 70 f2 |0E.!.......jd.p.| -00000010 a4 2f 1f 35 ef 03 2f 5c e0 ad e3 d3 2e d4 e2 dc |./.5../\........| -00000020 77 ce 7d 5c 03 02 20 59 2f 4b 35 61 19 df f7 e0 |w.}\.. Y/K5a....| -00000030 cb 0d 19 13 68 c4 9a 6f 5d 78 fa 5c f8 68 55 59 |....h..o]x.\.hUY| -00000040 10 07 f3 98 52 ba fc |....R..|" -"2019-07-20 02:40:34.692 UTC [cauthdsl] func2 -> DEBU 129e 0xc000bac420 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:34.692 UTC [cauthdsl] func1 -> DEBU 129f 0xc000bac420 gate 1563590434687004600 evaluation succeeds" -"2019-07-20 02:40:34.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a3 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:34.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1299 Sending msg of 28 bytes to 3 on channel businesschannel took 48.8µs" -"2019-07-20 02:40:34.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a5 Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" -"2019-07-20 02:40:34.695 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.3µs " -"2019-07-20 02:40:34.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:34.694 UTC [policies] Evaluate -> DEBU 12a8 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:34.697 UTC [policies] Evaluate -> DEBU 12a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:34.698 UTC [common.deliver] deliverBlocks -> DEBU 12aa [channel: businesschannel] Received seekInfo (0xc00121eb80) start: > stop: > from 172.18.0.9:39228" -"2019-07-20 02:40:34.698 UTC [fsblkstorage] Next -> DEBU 12ab Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -"2019-07-20 02:40:34.699 UTC [fsblkstorage] newBlockfileStream -> DEBU 12ac newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71390]" -"2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ad Remaining bytes=[12514], Going to peek [8] bytes" -"2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ae Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" -"2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12af blockbytes [4527] read from file [0]" -"2019-07-20 02:40:34.701 UTC [common.deliver] deliverBlocks -> DEBU 12b0 [channel: businesschannel] Delivering block for (0xc00121eb80) for 172.18.0.9:39228" -"2019-07-20 02:40:34.701 UTC [common.deliver] deliverBlocks -> DEBU 12b1 [channel: businesschannel] Done delivering to 172.18.0.9:39228 for (0xc00121eb80)" -"2019-07-20 02:40:34.702 UTC [common.deliver] Handle -> DEBU 12b2 Waiting for new SeekInfo from 172.18.0.9:39228" -"2019-07-20 02:40:34.702 UTC [common.deliver] Handle -> DEBU 12b3 Attempting to read seek info message from 172.18.0.9:39228" -"2019-07-20 02:40:34.702 UTC [fsblkstorage] waitForBlock -> DEBU 12b4 Came out of wait. maxAvailaBlockNumber=[5]" -"2019-07-20 02:40:34.702 UTC [fsblkstorage] waitForBlock -> DEBU 12b5 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-07-20 02:40:34.710 UTC [common.deliver] Handle -> WARN 12b6 Error reading from 172.18.0.9:39228: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:34.711 UTC [orderer.common.server] func1 -> DEBU 12b8 Closing Deliver stream" -"2019-07-20 02:40:34.710 UTC [grpc] infof -> DEBU 12b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:34.712 UTC [comm.grpc.server] 1 -> INFO 12b9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39228 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.4236ms -"2019-07-20 02:40:34.873 UTC [orderer.common.server] Deliver -> DEBU 12ba Starting new Deliver handler" -"2019-07-20 02:40:34.873 UTC [common.deliver] Handle -> DEBU 12bb Starting new deliver loop for 172.18.0.9:39230" -"2019-07-20 02:40:34.873 UTC [common.deliver] Handle -> DEBU 12bc Attempting to read seek info message from 172.18.0.9:39230" -"2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12c1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:34.875 UTC [cauthdsl] func1 -> DEBU 12c2 0xc0003215b0 gate 1563590434875079900 evaluation starts" -"2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c3 0xc0003215b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c4 0xc0003215b0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c5 0xc0003215b0 principal matched by identity 0" -"2019-07-20 02:40:34.875 UTC [msp.identity] Verify -> DEBU 12c6 Verify: digest = 00000000 0d 6a 08 6e fa 8f 49 c2 62 af 5e b4 fa b8 cf 31 |.j.n..I.b.^....1| -00000010 9b d4 09 ce 65 9c 3a fe 53 fc 4f f8 fa 94 c5 2e |....e.:.S.O.....|" -"2019-07-20 02:40:34.876 UTC [msp.identity] Verify -> DEBU 12c7 Verify: sig = 00000000 30 45 02 21 00 b3 a8 89 f8 62 5b 5e e1 09 f0 07 |0E.!.....b[^....| -00000010 73 8d a2 99 7b 67 53 94 f8 56 14 78 9c 08 9f 2a |s...{gS..V.x...*| -00000020 47 10 0c 83 e2 02 20 57 a8 87 84 de 18 db 18 fd |G..... W........| -00000030 03 e7 40 b9 1a 50 6e cd 00 44 a2 2e 76 44 95 fb |..@..Pn..D..vD..| -00000040 94 0c 2a 5b 54 de da |..*[T..|" -"2019-07-20 02:40:34.876 UTC [cauthdsl] func2 -> DEBU 12c8 0xc0003215b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:34.877 UTC [cauthdsl] func1 -> DEBU 12c9 0xc0003215b0 gate 1563590434875079900 evaluation succeeds" -"2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12ca Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cc Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:34.878 UTC [policies] Evaluate -> DEBU 12ce Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:34.878 UTC [policies] Evaluate -> DEBU 12cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:34.878 UTC [common.deliver] deliverBlocks -> DEBU 12d0 [channel: businesschannel] Received seekInfo (0xc00121f300) start: > stop: > from 172.18.0.9:39230" -"2019-07-20 02:40:34.879 UTC [fsblkstorage] Next -> DEBU 12d1 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -"2019-07-20 02:40:34.879 UTC [fsblkstorage] newBlockfileStream -> DEBU 12d2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75919]" -"2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d3 Remaining bytes=[7985], Going to peek [8] bytes" -"2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d4 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" -"2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d5 blockbytes [3992] read from file [0]" -"2019-07-20 02:40:34.880 UTC [common.deliver] deliverBlocks -> DEBU 12d6 [channel: businesschannel] Delivering block for (0xc00121f300) for 172.18.0.9:39230" -"2019-07-20 02:40:34.881 UTC [common.deliver] deliverBlocks -> DEBU 12d7 [channel: businesschannel] Done delivering to 172.18.0.9:39230 for (0xc00121f300)" -"2019-07-20 02:40:34.881 UTC [common.deliver] Handle -> DEBU 12d8 Waiting for new SeekInfo from 172.18.0.9:39230" -"2019-07-20 02:40:34.881 UTC [common.deliver] Handle -> DEBU 12d9 Attempting to read seek info message from 172.18.0.9:39230" -"2019-07-20 02:40:34.881 UTC [fsblkstorage] waitForBlock -> DEBU 12da Came out of wait. maxAvailaBlockNumber=[5]" -"2019-07-20 02:40:34.881 UTC [fsblkstorage] waitForBlock -> DEBU 12db Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-07-20 02:40:34.889 UTC [grpc] infof -> DEBU 12dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:34.889 UTC [common.deliver] Handle -> WARN 12dd Error reading from 172.18.0.9:39230: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:34.889 UTC [orderer.common.server] func1 -> DEBU 12de Closing Deliver stream" -"2019-07-20 02:40:34.890 UTC [comm.grpc.server] 1 -> INFO 12df streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39230 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.2245ms -"2019-07-20 02:40:34.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:34.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e1 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" -"2019-07-20 02:40:34.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.6µs " -"2019-07-20 02:40:35.053 UTC [orderer.common.server] Deliver -> DEBU 12e3 Starting new Deliver handler" -"2019-07-20 02:40:35.054 UTC [common.deliver] Handle -> DEBU 12e4 Starting new deliver loop for 172.18.0.9:39232" -"2019-07-20 02:40:35.054 UTC [common.deliver] Handle -> DEBU 12e5 Attempting to read seek info message from 172.18.0.9:39232" -"2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12ea == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:35.055 UTC [cauthdsl] func1 -> DEBU 12eb 0xc000c73a60 gate 1563590435055006700 evaluation starts" -"2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ec 0xc000c73a60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ed 0xc000c73a60 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ee 0xc000c73a60 principal matched by identity 0" -"2019-07-20 02:40:35.056 UTC [msp.identity] Verify -> DEBU 12ef Verify: digest = 00000000 ac a4 e2 6b 85 76 c4 74 3c f2 ed 90 1d 38 82 3b |...k.v.t<....8.;| -00000010 a0 c5 2e 02 1b bc a5 1e 72 ed 54 a8 a8 51 12 40 |........r.T..Q.@|" -"2019-07-20 02:40:35.056 UTC [msp.identity] Verify -> DEBU 12f0 Verify: sig = 00000000 30 44 02 20 62 a1 1a 7d 4f 7a a7 76 ae 13 c5 ee |0D. b..}Oz.v....| -00000010 c1 18 b3 61 8e 0b 41 10 63 85 b2 a0 9b d8 0b f0 |...a..A.c.......| -00000020 e6 4e 6b 9b 02 20 79 f5 a2 9c 06 11 e5 d3 58 50 |.Nk.. y.......XP| -00000030 19 34 3b 23 73 79 56 ce 3a 78 61 8c 6a 2b 2a b2 |.4;#syV.:xa.j+*.| -00000040 a8 90 b3 51 05 21 |...Q.!|" -"2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12f1 0xc000c73a60 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:35.057 UTC [cauthdsl] func1 -> DEBU 12f2 0xc000c73a60 gate 1563590435055006700 evaluation succeeds" -"2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f3 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f5 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f7 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:35.058 UTC [policies] Evaluate -> DEBU 12f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:35.058 UTC [common.deliver] deliverBlocks -> DEBU 12f9 [channel: businesschannel] Received seekInfo (0xc000d154c0) start: > stop: > from 172.18.0.9:39232" -"2019-07-20 02:40:35.059 UTC [fsblkstorage] Next -> DEBU 12fa Initializing block stream for iterator. itr.maxBlockNumAvailable=5" -"2019-07-20 02:40:35.059 UTC [fsblkstorage] newBlockfileStream -> DEBU 12fb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" -"2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fc Remaining bytes=[3991], Going to peek [8] bytes" -"2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fd Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" -"2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fe blockbytes [3989] read from file [0]" -"2019-07-20 02:40:35.060 UTC [common.deliver] deliverBlocks -> DEBU 12ff [channel: businesschannel] Delivering block for (0xc000d154c0) for 172.18.0.9:39232" -"2019-07-20 02:40:35.060 UTC [common.deliver] deliverBlocks -> DEBU 1300 [channel: businesschannel] Done delivering to 172.18.0.9:39232 for (0xc000d154c0)" -"2019-07-20 02:40:35.061 UTC [common.deliver] Handle -> DEBU 1301 Waiting for new SeekInfo from 172.18.0.9:39232" -"2019-07-20 02:40:35.061 UTC [common.deliver] Handle -> DEBU 1302 Attempting to read seek info message from 172.18.0.9:39232" -"2019-07-20 02:40:35.061 UTC [fsblkstorage] waitForBlock -> DEBU 1303 Came out of wait. maxAvailaBlockNumber=[5]" -"2019-07-20 02:40:35.061 UTC [fsblkstorage] waitForBlock -> DEBU 1304 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" -"2019-07-20 02:40:35.067 UTC [common.deliver] Handle -> WARN 1305 Error reading from 172.18.0.9:39232: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:35.067 UTC [orderer.common.server] func1 -> DEBU 1306 Closing Deliver stream" -"2019-07-20 02:40:35.067 UTC [comm.grpc.server] 1 -> INFO 1307 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39232 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8221ms -"2019-07-20 02:40:35.067 UTC [grpc] infof -> DEBU 1308 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:35.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1309 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" -"2019-07-20 02:40:35.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130a Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" -"2019-07-20 02:40:35.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.3µs " -"2019-07-20 02:40:35.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 303.2µs " -"2019-07-20 02:40:35.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:35.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:35.229 UTC [orderer.common.server] Deliver -> DEBU 130f Starting new Deliver handler" -"2019-07-20 02:40:35.229 UTC [common.deliver] Handle -> DEBU 1310 Starting new deliver loop for 172.18.0.9:39234" -"2019-07-20 02:40:35.229 UTC [common.deliver] Handle -> DEBU 1311 Attempting to read seek info message from 172.18.0.9:39234" -"2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1312 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1313 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1314 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1315 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1316 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:35.230 UTC [msp] DeserializeIdentity -> DEBU 1317 Obtaining identity" -"2019-07-20 02:40:35.230 UTC [msp.identity] newIdentity -> DEBU 1318 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:40:35.231 UTC [cauthdsl] func1 -> DEBU 1319 0xc0003727b0 gate 1563590435231243700 evaluation starts" -"2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131a 0xc0003727b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131b 0xc0003727b0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:35.231 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 131c Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-07-20 02:40:35.231 UTC [msp] Validate -> DEBU 131d MSP OrdererMSP validating identity" -"2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131e 0xc0003727b0 principal matched by identity 0" -"2019-07-20 02:40:35.231 UTC [msp.identity] Verify -> DEBU 131f Verify: digest = 00000000 21 3d 69 43 6a 6e 6b f0 67 21 36 03 79 43 b0 c4 |!=iCjnk.g!6.yC..| -00000010 00 5a b3 48 51 44 03 c7 11 f8 7a a3 64 02 ec d7 |.Z.HQD....z.d...|" -"2019-07-20 02:40:35.231 UTC [msp.identity] Verify -> DEBU 1320 Verify: sig = 00000000 30 45 02 21 00 cb 67 74 a4 b1 dc 3a 46 5a ed d1 |0E.!..gt...:FZ..| -00000010 c0 11 27 6e d2 fc 73 57 a5 16 e7 57 77 2f 31 ad |..'n..sW...Ww/1.| -00000020 7d 3e fe bb cc 02 20 16 e8 63 82 c0 a8 3b 0f bd |}>.... ..c...;..| -00000030 25 b8 3b a6 96 d6 8d 4b b7 2b b4 14 7b 36 4b f0 |%.;....K.+..{6K.| -00000040 93 6a 99 32 d9 6a d9 |.j.2.j.|" -"2019-07-20 02:40:35.232 UTC [cauthdsl] func2 -> DEBU 1321 0xc0003727b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:35.232 UTC [cauthdsl] func1 -> DEBU 1322 0xc0003727b0 gate 1563590435231243700 evaluation succeeds" -"2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1323 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1324 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1325 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1326 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1327 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:35.233 UTC [policies] Evaluate -> DEBU 1328 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:35.233 UTC [common.deliver] deliverBlocks -> DEBU 1329 [channel: testchainid] Received seekInfo (0xc00121fd40) start: > stop: > from 172.18.0.9:39234" -"2019-07-20 02:40:35.233 UTC [fsblkstorage] Next -> DEBU 132a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-07-20 02:40:35.233 UTC [fsblkstorage] newBlockfileStream -> DEBU 132b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -"2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132c Remaining bytes=[25835], Going to peek [8] bytes" -"2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132d Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -"2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132e blockbytes [25832] read from file [0]" -"2019-07-20 02:40:35.235 UTC [common.deliver] deliverBlocks -> DEBU 132f [channel: testchainid] Delivering block for (0xc00121fd40) for 172.18.0.9:39234" -"2019-07-20 02:40:35.235 UTC [common.deliver] deliverBlocks -> DEBU 1330 [channel: testchainid] Done delivering to 172.18.0.9:39234 for (0xc00121fd40)" -"2019-07-20 02:40:35.235 UTC [common.deliver] Handle -> DEBU 1331 Waiting for new SeekInfo from 172.18.0.9:39234" -"2019-07-20 02:40:35.235 UTC [common.deliver] Handle -> DEBU 1332 Attempting to read seek info message from 172.18.0.9:39234" -"2019-07-20 02:40:35.240 UTC [common.deliver] Handle -> WARN 1333 Error reading from 172.18.0.9:39234: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:35.240 UTC [orderer.common.server] func1 -> DEBU 1334 Closing Deliver stream" -"2019-07-20 02:40:35.241 UTC [grpc] infof -> DEBU 1336 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:35.240 UTC [comm.grpc.server] 1 -> INFO 1335 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39234 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.5766ms -"2019-07-20 02:40:35.387 UTC [orderer.common.server] Deliver -> DEBU 1337 Starting new Deliver handler" -"2019-07-20 02:40:35.387 UTC [common.deliver] Handle -> DEBU 1338 Starting new deliver loop for 172.18.0.9:39236" -"2019-07-20 02:40:35.387 UTC [common.deliver] Handle -> DEBU 1339 Attempting to read seek info message from 172.18.0.9:39236" -"2019-07-20 02:40:35.388 UTC [policies] Evaluate -> DEBU 133a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:35.388 UTC [policies] Evaluate -> DEBU 133b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:35.389 UTC [cauthdsl] func1 -> DEBU 133f 0xc000a9aba0 gate 1563590435389465100 evaluation starts" -"2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1340 0xc000a9aba0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1341 0xc000a9aba0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1342 0xc000a9aba0 principal matched by identity 0" -"2019-07-20 02:40:35.389 UTC [msp.identity] Verify -> DEBU 1343 Verify: digest = 00000000 a3 e8 db 37 f6 15 94 6d cc 5b a8 1f fa 58 84 32 |...7...m.[...X.2| -00000010 9e b6 7b c3 61 44 5b 13 f9 b5 26 72 c7 d1 3e f6 |..{.aD[...&r..>.|" -"2019-07-20 02:40:35.390 UTC [msp.identity] Verify -> DEBU 1344 Verify: sig = 00000000 30 44 02 20 6c 05 0c e0 64 52 d7 27 1e d3 5b 00 |0D. l...dR.'..[.| -00000010 0e 37 3e 87 0d 56 dd cd bc 6a f9 6a c6 9a 7f e3 |.7>..V...j.j....| -00000020 8d 52 4d e4 02 20 46 45 1f 56 83 eb ea 3a 47 23 |.RM.. FE.V...:G#| -00000030 80 46 c6 40 d8 6c 3d dc ae dc 82 53 d2 b2 6f c7 |.F.@.l=....S..o.| -00000040 d4 73 3a 68 8c eb |.s:h..|" -"2019-07-20 02:40:35.390 UTC [cauthdsl] func2 -> DEBU 1345 0xc000a9aba0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:35.390 UTC [cauthdsl] func1 -> DEBU 1346 0xc000a9aba0 gate 1563590435389465100 evaluation succeeds" -"2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1347 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1348 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1349 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134b Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:35.391 UTC [common.deliver] deliverBlocks -> DEBU 134d [channel: testchainid] Received seekInfo (0xc000d15f40) start: > stop: > from 172.18.0.9:39236" -"2019-07-20 02:40:35.391 UTC [fsblkstorage] Next -> DEBU 134e Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-07-20 02:40:35.392 UTC [fsblkstorage] newBlockfileStream -> DEBU 134f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -"2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1350 Remaining bytes=[25835], Going to peek [8] bytes" -"2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1351 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -"2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1352 blockbytes [25832] read from file [0]" -"2019-07-20 02:40:35.392 UTC [common.deliver] deliverBlocks -> DEBU 1353 [channel: testchainid] Delivering block for (0xc000d15f40) for 172.18.0.9:39236" -"2019-07-20 02:40:35.393 UTC [common.deliver] deliverBlocks -> DEBU 1354 [channel: testchainid] Done delivering to 172.18.0.9:39236 for (0xc000d15f40)" -"2019-07-20 02:40:35.393 UTC [common.deliver] Handle -> DEBU 1355 Waiting for new SeekInfo from 172.18.0.9:39236" -"2019-07-20 02:40:35.393 UTC [common.deliver] Handle -> DEBU 1356 Attempting to read seek info message from 172.18.0.9:39236" -"2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1357 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1358 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1359 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 135a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 135b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:35.397 UTC [cauthdsl] func1 -> DEBU 135c 0xc00098ce00 gate 1563590435397329000 evaluation starts" -"2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135d 0xc00098ce00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135e 0xc00098ce00 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135f 0xc00098ce00 principal matched by identity 0" -"2019-07-20 02:40:35.397 UTC [msp.identity] Verify -> DEBU 1360 Verify: digest = 00000000 68 c4 79 92 c2 31 53 58 65 63 fa cc e1 56 f0 c4 |h.y..1SXec...V..| -00000010 9d d8 6e 00 df a3 a9 99 e4 54 6f 66 dc 98 8b bb |..n......Tof....|" -"2019-07-20 02:40:35.398 UTC [msp.identity] Verify -> DEBU 1361 Verify: sig = 00000000 30 44 02 20 0a 30 2c b9 8b 65 2d bb 3b a0 a8 4f |0D. .0,..e-.;..O| -00000010 59 46 86 89 be b5 60 b6 1b 99 70 e7 57 b2 9e 05 |YF....`...p.W...| -00000020 fa 1a af 13 02 20 37 b6 be 8d 11 b7 5f 8c bd ff |..... 7....._...| -00000030 1c e6 68 15 f4 0b 4b 6e 39 d1 83 1f df 9b 61 57 |..h...Kn9.....aW| -00000040 1a b3 b6 b9 26 d7 |....&.|" -"2019-07-20 02:40:35.398 UTC [cauthdsl] func2 -> DEBU 1362 0xc00098ce00 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:35.398 UTC [cauthdsl] func1 -> DEBU 1363 0xc00098ce00 gate 1563590435397329000 evaluation succeeds" -"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1364 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1365 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1366 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1367 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1368 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1369 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:35.398 UTC [common.deliver] deliverBlocks -> DEBU 136a [channel: testchainid] Received seekInfo (0xc000ba6380) start: > stop: > from 172.18.0.9:39236" -"2019-07-20 02:40:35.398 UTC [fsblkstorage] Next -> DEBU 136b Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-07-20 02:40:35.398 UTC [fsblkstorage] newBlockfileStream -> DEBU 136c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-07-20 02:40:35.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136d Remaining bytes=[44254], Going to peek [8] bytes" -"2019-07-20 02:40:35.399 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136e Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:40:35.399 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136f blockbytes [18416] read from file [0]" -"2019-07-20 02:40:35.399 UTC [common.deliver] deliverBlocks -> DEBU 1370 [channel: testchainid] Delivering block for (0xc000ba6380) for 172.18.0.9:39236" -"2019-07-20 02:40:35.399 UTC [common.deliver] deliverBlocks -> DEBU 1371 [channel: testchainid] Done delivering to 172.18.0.9:39236 for (0xc000ba6380)" -"2019-07-20 02:40:35.399 UTC [common.deliver] Handle -> DEBU 1372 Waiting for new SeekInfo from 172.18.0.9:39236" -"2019-07-20 02:40:35.399 UTC [common.deliver] Handle -> DEBU 1373 Attempting to read seek info message from 172.18.0.9:39236" -"2019-07-20 02:40:35.407 UTC [common.deliver] Handle -> WARN 1374 Error reading from 172.18.0.9:39236: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:35.407 UTC [orderer.common.server] func1 -> DEBU 1375 Closing Deliver stream" -"2019-07-20 02:40:35.407 UTC [comm.grpc.server] 1 -> INFO 1376 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39236 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.797ms -"2019-07-20 02:40:35.407 UTC [grpc] infof -> DEBU 1377 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:35.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1378 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:35.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1379 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" -"2019-07-20 02:40:35.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 137a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.1µs " -"2019-07-20 02:40:35.532 UTC [orderer.common.server] Deliver -> DEBU 137b Starting new Deliver handler" -"2019-07-20 02:40:35.532 UTC [common.deliver] Handle -> DEBU 137c Starting new deliver loop for 172.18.0.9:39238" -"2019-07-20 02:40:35.532 UTC [common.deliver] Handle -> DEBU 137d Attempting to read seek info message from 172.18.0.9:39238" -"2019-07-20 02:40:35.532 UTC [policies] Evaluate -> DEBU 137e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 137f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1380 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1381 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1382 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:35.533 UTC [cauthdsl] func1 -> DEBU 1383 0xc0003d82d0 gate 1563590435533775300 evaluation starts" -"2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1384 0xc0003d82d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1385 0xc0003d82d0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1386 0xc0003d82d0 principal matched by identity 0" -"2019-07-20 02:40:35.534 UTC [msp.identity] Verify -> DEBU 1387 Verify: digest = 00000000 5f 0f 4a 9d 65 bf b8 72 3a 23 8b 74 bb 3c eb 0a |_.J.e..r:#.t.<..| -00000010 5c 83 45 be 21 cb b8 82 64 47 77 dc c3 82 94 b1 |\.E.!...dGw.....|" -"2019-07-20 02:40:35.534 UTC [msp.identity] Verify -> DEBU 1388 Verify: sig = 00000000 30 44 02 20 55 dd fb 5f 82 29 2f 02 b4 96 12 2e |0D. U.._.)/.....| -00000010 cf 06 87 34 fb 14 87 9e f2 d3 4d e1 9a 41 da 1b |...4......M..A..| -00000020 e9 6c 31 74 02 20 0e c3 35 48 74 a6 7a ba bc c4 |.l1t. ..5Ht.z...| -00000030 9d ca 57 36 61 08 e0 86 35 25 85 e0 6a 97 1a f0 |..W6a...5%..j...| -00000040 5f ca 0b ee ae 2b |_....+|" -"2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1389 0xc0003d82d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:35.535 UTC [cauthdsl] func1 -> DEBU 138a 0xc0003d82d0 gate 1563590435533775300 evaluation succeeds" -"2019-07-20 02:40:35.535 UTC [policies] Evaluate -> DEBU 138b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.535 UTC [policies] Evaluate -> DEBU 138c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138d Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138f Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 1390 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:35.536 UTC [common.deliver] deliverBlocks -> DEBU 1391 [channel: testchainid] Received seekInfo (0xc0011d5300) start: > stop: > from 172.18.0.9:39238" -"2019-07-20 02:40:35.537 UTC [fsblkstorage] Next -> DEBU 1392 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-07-20 02:40:35.537 UTC [fsblkstorage] newBlockfileStream -> DEBU 1393 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-07-20 02:40:35.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1394 Remaining bytes=[44254], Going to peek [8] bytes" -"2019-07-20 02:40:35.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1395 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:40:35.538 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1396 blockbytes [18416] read from file [0]" -"2019-07-20 02:40:35.538 UTC [common.deliver] deliverBlocks -> DEBU 1397 [channel: testchainid] Delivering block for (0xc0011d5300) for 172.18.0.9:39238" -"2019-07-20 02:40:35.538 UTC [common.deliver] deliverBlocks -> DEBU 1398 [channel: testchainid] Done delivering to 172.18.0.9:39238 for (0xc0011d5300)" -"2019-07-20 02:40:35.539 UTC [common.deliver] Handle -> DEBU 1399 Waiting for new SeekInfo from 172.18.0.9:39238" -"2019-07-20 02:40:35.539 UTC [common.deliver] Handle -> DEBU 139a Attempting to read seek info message from 172.18.0.9:39238" -"2019-07-20 02:40:35.548 UTC [common.deliver] Handle -> WARN 139b Error reading from 172.18.0.9:39238: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:35.548 UTC [orderer.common.server] func1 -> DEBU 139c Closing Deliver stream" -"2019-07-20 02:40:35.548 UTC [comm.grpc.server] 1 -> INFO 139d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39238 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.69ms -"2019-07-20 02:40:35.549 UTC [grpc] infof -> DEBU 139e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:35.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 139f Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" -"2019-07-20 02:40:35.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" -"2019-07-20 02:40:35.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " -"2019-07-20 02:40:35.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 336.3µs " -"2019-07-20 02:40:35.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:35.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:35.702 UTC [orderer.common.server] Deliver -> DEBU 13a5 Starting new Deliver handler" -"2019-07-20 02:40:35.702 UTC [common.deliver] Handle -> DEBU 13a6 Starting new deliver loop for 172.18.0.9:39240" -"2019-07-20 02:40:35.702 UTC [common.deliver] Handle -> DEBU 13a7 Attempting to read seek info message from 172.18.0.9:39240" -"2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13ac == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:35.703 UTC [cauthdsl] func1 -> DEBU 13ad 0xc00096f690 gate 1563590435702988800 evaluation starts" -"2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13ae 0xc00096f690 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13af 0xc00096f690 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13b0 0xc00096f690 principal matched by identity 0" -"2019-07-20 02:40:35.703 UTC [msp.identity] Verify -> DEBU 13b1 Verify: digest = 00000000 19 14 01 e4 ac 98 0d 33 b0 e7 e6 d9 29 ad da 78 |.......3....)..x| -00000010 5f 7f d8 63 22 18 6f c2 02 98 d1 16 ec c2 3a 40 |_..c".o.......:@|" -"2019-07-20 02:40:35.703 UTC [msp.identity] Verify -> DEBU 13b2 Verify: sig = 00000000 30 45 02 21 00 9a 96 af 90 93 69 2a e6 7c 2d e0 |0E.!......i*.|-.| -00000010 82 36 7d 5e 62 6a 40 ee 39 d4 0a 45 3d 05 fc a7 |.6}^bj@.9..E=...| -00000020 55 06 db 29 a9 02 20 24 38 5d 25 1f af c8 7e 67 |U..).. $8]%...~g| -00000030 be 9e 81 7e 9a c9 39 f9 28 bb 1e 72 6c 02 55 cf |...~..9.(..rl.U.| -00000040 3a 80 84 4b b9 48 5e |:..K.H^|" -"2019-07-20 02:40:35.704 UTC [cauthdsl] func2 -> DEBU 13b3 0xc00096f690 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:35.704 UTC [cauthdsl] func1 -> DEBU 13b4 0xc00096f690 gate 1563590435702988800 evaluation succeeds" -"2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b7 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b9 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:35.705 UTC [policies] Evaluate -> DEBU 13ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:35.705 UTC [common.deliver] deliverBlocks -> DEBU 13bb [channel: testchainid] Received seekInfo (0xc0011d5a80) start: > stop: > from 172.18.0.9:39240" -"2019-07-20 02:40:35.705 UTC [fsblkstorage] Next -> DEBU 13bc Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-07-20 02:40:35.705 UTC [fsblkstorage] newBlockfileStream -> DEBU 13bd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -"2019-07-20 02:40:35.705 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13be Remaining bytes=[25835], Going to peek [8] bytes" -"2019-07-20 02:40:35.705 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13bf Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -"2019-07-20 02:40:35.706 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13c0 blockbytes [25832] read from file [0]" -"2019-07-20 02:40:35.706 UTC [common.deliver] deliverBlocks -> DEBU 13c1 [channel: testchainid] Delivering block for (0xc0011d5a80) for 172.18.0.9:39240" -"2019-07-20 02:40:35.706 UTC [common.deliver] deliverBlocks -> DEBU 13c2 [channel: testchainid] Done delivering to 172.18.0.9:39240 for (0xc0011d5a80)" -"2019-07-20 02:40:35.706 UTC [common.deliver] Handle -> DEBU 13c3 Waiting for new SeekInfo from 172.18.0.9:39240" -"2019-07-20 02:40:35.706 UTC [common.deliver] Handle -> DEBU 13c4 Attempting to read seek info message from 172.18.0.9:39240" -"2019-07-20 02:40:35.713 UTC [grpc] infof -> DEBU 13c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:35.714 UTC [common.deliver] Handle -> WARN 13c6 Error reading from 172.18.0.9:39240: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:35.714 UTC [orderer.common.server] func1 -> DEBU 13c7 Closing Deliver stream" -"2019-07-20 02:40:35.714 UTC [comm.grpc.server] 1 -> INFO 13c8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39240 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.8108ms -"2019-07-20 02:40:35.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:35.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ca Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" -"2019-07-20 02:40:35.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.7µs " -"2019-07-20 02:40:36.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cc Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" -"2019-07-20 02:40:36.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cd Sending msg of 28 bytes to 3 on channel businesschannel took 31.5µs" -"2019-07-20 02:40:36.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.8µs " -"2019-07-20 02:40:36.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 619µs " -"2019-07-20 02:40:36.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:36.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:36.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:36.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d3 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" -"2019-07-20 02:40:36.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " -"2019-07-20 02:40:36.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d5 Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs" -"2019-07-20 02:40:36.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d6 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" -"2019-07-20 02:40:36.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68µs " -"2019-07-20 02:40:36.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.2µs " -"2019-07-20 02:40:36.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:36.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13da Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:36.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13db Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:36.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13dc Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" -"2019-07-20 02:40:36.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13dd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.6µs " -"2019-07-20 02:40:37.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13de Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" -"2019-07-20 02:40:37.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13df Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" -"2019-07-20 02:40:37.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97µs " -"2019-07-20 02:40:37.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61µs " -"2019-07-20 02:40:37.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:37.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:37.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:37.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e5 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" -"2019-07-20 02:40:37.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.5µs " -"2019-07-20 02:40:37.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e7 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" -"2019-07-20 02:40:37.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e8 Sending msg of 28 bytes to 3 on channel businesschannel took 86.8µs" -"2019-07-20 02:40:37.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.9µs " -"2019-07-20 02:40:37.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " -"2019-07-20 02:40:37.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13eb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:37.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ec Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:37.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ed Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:37.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ee Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" -"2019-07-20 02:40:37.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.9µs " -"2019-07-20 02:40:38.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f0 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" -"2019-07-20 02:40:38.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f1 Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" -"2019-07-20 02:40:38.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.5µs " -"2019-07-20 02:40:38.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.8µs " -"2019-07-20 02:40:38.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:38.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:38.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:38.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f7 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" -"2019-07-20 02:40:38.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.1µs " -"2019-07-20 02:40:38.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f9 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" -"2019-07-20 02:40:38.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fa Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" -"2019-07-20 02:40:38.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.2µs " -"2019-07-20 02:40:38.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.2µs " -"2019-07-20 02:40:38.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fd Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:38.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:38.944 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ff Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:38.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1400 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" -"2019-07-20 02:40:38.944 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1401 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " -"2019-07-20 02:40:39.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1402 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" -"2019-07-20 02:40:39.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1403 Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" -"2019-07-20 02:40:39.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1404 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92µs " -"2019-07-20 02:40:39.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1405 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " -"2019-07-20 02:40:39.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1406 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:39.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1407 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:39.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1408 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:39.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1409 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" -"2019-07-20 02:40:39.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.6µs " -"2019-07-20 02:40:39.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140b Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" -"2019-07-20 02:40:39.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140c Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" -"2019-07-20 02:40:39.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 513.5µs " -"2019-07-20 02:40:39.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.5µs " -"2019-07-20 02:40:39.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:39.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1410 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:39.797 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1411 No inactive chains to try to replicate" -"2019-07-20 02:40:39.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1412 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:39.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1413 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" -"2019-07-20 02:40:39.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1414 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.7µs " -"2019-07-20 02:40:40.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1415 Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" -"2019-07-20 02:40:40.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1416 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" -"2019-07-20 02:40:40.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1417 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.4µs " -"2019-07-20 02:40:40.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1418 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 701.6µs " -"2019-07-20 02:40:40.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1419 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:40.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:40.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:40.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141c Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" -"2019-07-20 02:40:40.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 141d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.6µs " -"2019-07-20 02:40:40.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141e Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" -"2019-07-20 02:40:40.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141f Sending msg of 28 bytes to 3 on channel businesschannel took 6.6µs" -"2019-07-20 02:40:40.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1420 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " -"2019-07-20 02:40:40.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1421 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " -"2019-07-20 02:40:40.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1422 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:40.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1423 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:40.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1424 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:40.939 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1425 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" -"2019-07-20 02:40:40.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1426 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.9µs " -"2019-07-20 02:40:41.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1427 Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" -"2019-07-20 02:40:41.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1428 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120µs " -"2019-07-20 02:40:41.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1429 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" -"2019-07-20 02:40:41.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.4µs " -"2019-07-20 02:40:41.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:41.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:41.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:41.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142e Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" -"2019-07-20 02:40:41.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.1µs " -"2019-07-20 02:40:41.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1430 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" -"2019-07-20 02:40:41.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1431 Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" -"2019-07-20 02:40:41.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1432 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " -"2019-07-20 02:40:41.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1433 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " -"2019-07-20 02:40:41.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1434 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:41.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1435 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:41.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1436 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:41.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1437 Sending msg of 28 bytes to 3 on channel testchainid took 19µs" -"2019-07-20 02:40:41.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1438 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.7µs " -"2019-07-20 02:40:42.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1439 Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" -"2019-07-20 02:40:42.206 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143c Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" -"2019-07-20 02:40:42.206 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.2µs " -"2019-07-20 02:40:42.201 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.7µs " -"2019-07-20 02:40:42.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:42.207 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:42.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:42.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1440 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" -"2019-07-20 02:40:42.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1441 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 380.7µs " -"2019-07-20 02:40:42.755 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1442 Sending msg of 28 bytes to 3 on channel businesschannel took 128.5µs" -"2019-07-20 02:40:42.755 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1443 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" -"2019-07-20 02:40:42.756 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1444 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 324.3µs " -"2019-07-20 02:40:42.757 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1445 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 492.8µs " -"2019-07-20 02:40:42.769 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1446 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:42.769 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1447 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:42.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1448 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:42.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1449 Sending msg of 28 bytes to 3 on channel testchainid took 107.8µs" -"2019-07-20 02:40:42.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.1µs " -"2019-07-20 02:40:43.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144b Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" -"2019-07-20 02:40:43.209 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144c Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" -"2019-07-20 02:40:43.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.2µs " -"2019-07-20 02:40:43.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.5µs " -"2019-07-20 02:40:43.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:43.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1450 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:43.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1451 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:43.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1452 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" -"2019-07-20 02:40:43.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1453 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175µs " -"2019-07-20 02:40:43.708 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1454 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" -"2019-07-20 02:40:43.709 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1455 Sending msg of 28 bytes to 3 on channel businesschannel took 96.5µs" -"2019-07-20 02:40:43.709 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1456 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.6µs " -"2019-07-20 02:40:43.709 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1457 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.5µs " -"2019-07-20 02:40:43.712 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1458 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:43.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1459 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:43.939 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:43.939 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145b Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" -"2019-07-20 02:40:43.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " -"2019-07-20 02:40:44.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145d Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" -"2019-07-20 02:40:44.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145e Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" -"2019-07-20 02:40:44.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " -"2019-07-20 02:40:44.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1460 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " -"2019-07-20 02:40:44.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1461 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:44.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1462 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:44.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1463 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:44.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1464 Sending msg of 28 bytes to 3 on channel testchainid took 47.5µs" -"2019-07-20 02:40:44.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1465 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " -"2019-07-20 02:40:44.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1466 Sending msg of 28 bytes to 2 on channel businesschannel took 39µs" -"2019-07-20 02:40:44.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1467 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" -"2019-07-20 02:40:44.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1468 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.1µs " -"2019-07-20 02:40:44.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1469 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.252ms " -"2019-07-20 02:40:44.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:44.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:44.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:44.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " -"2019-07-20 02:40:44.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 146e Sending msg of 28 bytes to 3 on channel testchainid took 142.3µs" -"2019-07-20 02:40:45.006 UTC [orderer.common.server] Deliver -> DEBU 146f Starting new Deliver handler" -"2019-07-20 02:40:45.006 UTC [common.deliver] Handle -> DEBU 1470 Starting new deliver loop for 172.18.0.9:39242" -"2019-07-20 02:40:45.006 UTC [common.deliver] Handle -> DEBU 1471 Attempting to read seek info message from 172.18.0.9:39242" -"2019-07-20 02:40:45.027 UTC [orderer.common.server] Broadcast -> DEBU 1472 Starting new Broadcast handler" -"2019-07-20 02:40:45.027 UTC [orderer.common.broadcast] Handle -> DEBU 1473 Starting new broadcast loop for 172.18.0.9:39244" -"2019-07-20 02:40:45.028 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1474 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39244" -"2019-07-20 02:40:45.028 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1475 Processing config update message for channel businesschannel" -"2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1476 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1477 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1478 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1479 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 147a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:40:45.030 UTC [cauthdsl] func1 -> DEBU 147b 0xc0008d5e60 gate 1563590445030059300 evaluation starts" -"2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147c 0xc0008d5e60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147d 0xc0008d5e60 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147e 0xc0008d5e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" -"2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147f 0xc0008d5e60 principal evaluation fails" -"2019-07-20 02:40:45.031 UTC [cauthdsl] func1 -> DEBU 1480 0xc0008d5e60 gate 1563590445030059300 evaluation fails" -"2019-07-20 02:40:45.031 UTC [policies] Evaluate -> DEBU 1481 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:45.031 UTC [policies] Evaluate -> DEBU 1482 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:45.031 UTC [policies] func1 -> DEBU 1483 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" -"2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1484 Signature set did not satisfy policy /Channel/Orderer/Writers" -"2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1485 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1486 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1487 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.033 UTC [policies] Evaluate -> DEBU 1488 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:45.034 UTC [cauthdsl] func1 -> DEBU 1489 0xc000ff8b60 gate 1563590445034097500 evaluation starts" -"2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148a 0xc000ff8b60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148b 0xc000ff8b60 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148c 0xc000ff8b60 principal matched by identity 0" -"2019-07-20 02:40:45.035 UTC [msp.identity] Verify -> DEBU 148d Verify: digest = 00000000 d7 e2 4c 93 ff 7a b3 77 17 51 c6 90 73 4c d0 56 |..L..z.w.Q..sL.V| -00000010 38 2e 22 82 94 37 ee e8 42 7e db 1a 70 1b 33 b9 |8."..7..B~..p.3.|" -"2019-07-20 02:40:45.035 UTC [msp.identity] Verify -> DEBU 148e Verify: sig = 00000000 30 45 02 21 00 83 bb 89 24 35 e9 6f 9d ce 34 d2 |0E.!....$5.o..4.| -00000010 b8 0c 69 a7 39 e5 ba 1c 81 f9 c4 7b 9d a8 bd 53 |..i.9......{...S| -00000020 ee 9e dd 57 63 02 20 0c e4 bd e5 9c 35 78 1a 06 |...Wc. .....5x..| -00000030 6c da db e8 5a 85 7e 27 0c 66 30 bb 89 9e b1 8e |l...Z.~'.f0.....| -00000040 81 d5 3e f4 76 50 e1 |..>.vP.|" -"2019-07-20 02:40:45.036 UTC [cauthdsl] func2 -> DEBU 148f 0xc000ff8b60 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.036 UTC [cauthdsl] func1 -> DEBU 1490 0xc000ff8b60 gate 1563590445034097500 evaluation succeeds" -"2019-07-20 02:40:45.036 UTC [policies] Evaluate -> DEBU 1491 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:45.036 UTC [policies] Evaluate -> DEBU 1492 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1493 Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1494 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1495 Signature set satisfies policy /Channel/Writers" -"2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-07-20 02:40:45.038 UTC [common.configtx] addToMap -> DEBU 1497 Adding to config map: [Group] /Channel" -"2019-07-20 02:40:45.038 UTC [common.configtx] addToMap -> DEBU 1498 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 1499 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 149a Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 149b Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149c Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149d Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149e Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 149f Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 14a0 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 14a1 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a2 Adding to config map: [Group] /Channel" -"2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a3 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a4 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a5 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a6 Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a7 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14a8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14a9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14aa Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14ab Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14ac Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14ad Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14ae Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14af Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b1 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b2 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:40:45.046 UTC [common.configtx] verifyDeltaSet -> DEBU 14b3 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -"2019-07-20 02:40:45.046 UTC [common.configtx] verifyDeltaSet -> DEBU 14b4 Processing change to key: [Group] /Channel/Application" -"2019-07-20 02:40:45.046 UTC [common.configtx] policyForItem -> DEBU 14b5 Getting policy for item Application with mod_policy Admins" -"2019-07-20 02:40:45.046 UTC [policies] Manager -> DEBU 14b6 Manager Channel looking up path []" -"2019-07-20 02:40:45.046 UTC [policies] Manager -> DEBU 14b7 Manager Channel has managers Orderer" -"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14b8 Manager Channel has managers Application" -"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14b9 Manager Channel looking up path [Application]" -"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14ba Manager Channel has managers Orderer" -"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bb Manager Channel has managers Application" -"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bc Manager Channel/Application looking up path []" -"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bd Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14be Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -"2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-07-20 02:40:45.048 UTC [cauthdsl] deduplicate -> WARN 14c2 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-07-20 02:40:45.048 UTC [cauthdsl] func1 -> DEBU 14c3 0xc0008d80c0 gate 1563590445048642600 evaluation starts" -"2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c4 0xc0008d80c0 signed by 0 principal evaluation starts (used [false false false])" -"2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c5 0xc0008d80c0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c6 0xc0008d80c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-07-20 02:40:45.049 UTC [cauthdsl] func2 -> DEBU 14c7 0xc0008d80c0 processing identity 1 with bytes of fd0280" -"2019-07-20 02:40:45.049 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14c8 Checking if identity satisfies ADMIN role for Org2MSP" -"2019-07-20 02:40:45.049 UTC [cauthdsl] func2 -> DEBU 14c9 0xc0008d80c0 principal matched by identity 1" -"2019-07-20 02:40:45.049 UTC [msp.identity] Verify -> DEBU 14ca Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| -00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" -"2019-07-20 02:40:45.049 UTC [msp.identity] Verify -> DEBU 14cb Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| -00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| -00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| -00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| -00000040 6a a2 e2 e3 7c fb |j...|.|" -"2019-07-20 02:40:45.050 UTC [cauthdsl] func2 -> DEBU 14cc 0xc0008d80c0 principal evaluation succeeds for identity 1" -"2019-07-20 02:40:45.050 UTC [cauthdsl] func1 -> DEBU 14cd 0xc0008d80c0 gate 1563590445048642600 evaluation succeeds" -"2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14ce Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-07-20 02:40:45.050 UTC [cauthdsl] deduplicate -> WARN 14d1 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-07-20 02:40:45.050 UTC [cauthdsl] func1 -> DEBU 14d2 0xc0008d8ba0 gate 1563590445050800500 evaluation starts" -"2019-07-20 02:40:45.050 UTC [cauthdsl] func2 -> DEBU 14d3 0xc0008d8ba0 signed by 0 principal evaluation starts (used [false false false])" -"2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d4 0xc0008d8ba0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:45.051 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14d5 Checking if identity satisfies ADMIN role for Org1MSP" -"2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d6 0xc0008d8ba0 principal matched by identity 0" -"2019-07-20 02:40:45.051 UTC [msp.identity] Verify -> DEBU 14d7 Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| -00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" -"2019-07-20 02:40:45.051 UTC [msp.identity] Verify -> DEBU 14d8 Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| -00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| -00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| -00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| -00000040 ed 0f 29 74 0b 84 |..)t..|" -"2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d9 0xc0008d8ba0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.052 UTC [cauthdsl] func1 -> DEBU 14da 0xc0008d8ba0 gate 1563590445050800500 evaluation succeeds" -"2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14db Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14dd Signature set satisfies policy /Channel/Application/Admins" -"2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -"2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14df Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e0 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e1 Processing change to key: [Group] /Channel/Application/Org3MSP" -"2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e2 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-07-20 02:40:45.053 UTC [common.configtx] verifyDeltaSet -> DEBU 14e3 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e4 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e6 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e7 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e8 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14e9 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14ea Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14eb Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ec Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ee Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ef Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14f0 Setting policy for key Admins to " -"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f1 Setting policy for key Endorsement to " -"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f2 Setting policy for key LifecycleEndorsement to " -"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f3 Setting policy for key Readers to " -"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f4 Setting policy for key Writers to " -"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f5 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f6 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f7 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f8 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fa Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fb Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fc Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fd Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fe Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.057 UTC [common.channelconfig] NewStandardValues -> DEBU 14ff Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1500 Processing field: HashingAlgorithm" -"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1501 Processing field: BlockDataHashingStructure" -"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1502 Processing field: OrdererAddresses" -"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1503 Processing field: Consortium" -"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1504 Processing field: Capabilities" -"2019-07-20 02:40:45.058 UTC [common.channelconfig] NewStandardValues -> DEBU 1505 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1506 Processing field: ACLs" -"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1507 Processing field: Capabilities" -"2019-07-20 02:40:45.059 UTC [common.channelconfig] NewStandardValues -> DEBU 1508 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1509 Processing field: AnchorPeers" -"2019-07-20 02:40:45.059 UTC [common.channelconfig] NewStandardValues -> DEBU 150a Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 150b Processing field: MSP" -"2019-07-20 02:40:45.060 UTC [common.channelconfig] Validate -> DEBU 150c Anchor peers for org Org3MSP are " -"2019-07-20 02:40:45.060 UTC [common.channelconfig] validateMSP -> DEBU 150d Setting up MSP for org Org3MSP" -"2019-07-20 02:40:45.060 UTC [msp] newBccspMsp -> DEBU 150e Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.060 UTC [msp] New -> DEBU 150f Creating Cache-MSP instance" -"2019-07-20 02:40:45.060 UTC [msp] Setup -> DEBU 1510 Setting up MSP instance Org3MSP" -"2019-07-20 02:40:45.060 UTC [msp.identity] newIdentity -> DEBU 1511 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB -6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw -RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc -CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== ------END CERTIFICATE-----" -"2019-07-20 02:40:45.061 UTC [msp.identity] newIdentity -> DEBU 1512 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y -ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr -zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky -u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV -HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO -PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ -R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= ------END CERTIFICATE-----" -"2019-07-20 02:40:45.061 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1513 Checking if identity satisfies role [CLIENT] for Org3MSP" -"2019-07-20 02:40:45.061 UTC [msp] Validate -> DEBU 1514 MSP Org3MSP validating identity" -"2019-07-20 02:40:45.062 UTC [msp] getCertificationChain -> DEBU 1515 MSP Org3MSP getting certification chain" -"2019-07-20 02:40:45.062 UTC [msp] hasOURole -> DEBU 1516 MSP Org3MSP checking if the identity is a client" -"2019-07-20 02:40:45.062 UTC [msp] getCertificationChain -> DEBU 1517 MSP Org3MSP getting certification chain" -"2019-07-20 02:40:45.062 UTC [common.channelconfig] NewStandardValues -> DEBU 1518 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1519 Processing field: AnchorPeers" -"2019-07-20 02:40:45.062 UTC [common.channelconfig] NewStandardValues -> DEBU 151a Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU 151b Processing field: MSP" -"2019-07-20 02:40:45.063 UTC [common.channelconfig] Validate -> DEBU 151c Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:40:45.063 UTC [common.channelconfig] validateMSP -> DEBU 151d Setting up MSP for org Org1MSP" -"2019-07-20 02:40:45.063 UTC [msp] newBccspMsp -> DEBU 151e Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.063 UTC [msp] New -> DEBU 151f Creating Cache-MSP instance" -"2019-07-20 02:40:45.063 UTC [msp] Setup -> DEBU 1520 Setting up MSP instance Org1MSP" -"2019-07-20 02:40:45.064 UTC [msp.identity] newIdentity -> DEBU 1521 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.373 UTC [msp] Validate -> DEBU 8ac MSP OrdererMSP validating identity" +"2019-09-24 00:25:04.373 UTC [common.channelconfig] NewStandardValues -> DEBU 8ad Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:25:04.373 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ae Processing field: ACLs" +"2019-09-24 00:25:04.373 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8af Processing field: Capabilities" +"2019-09-24 00:25:04.373 UTC [common.channelconfig] NewStandardValues -> DEBU 8b0 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:04.373 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b1 Processing field: AnchorPeers" +"2019-09-24 00:25:04.373 UTC [common.channelconfig] NewStandardValues -> DEBU 8b2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.373 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b3 Processing field: MSP" +"2019-09-24 00:25:04.373 UTC [common.channelconfig] Validate -> DEBU 8b4 Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:25:04.373 UTC [common.channelconfig] validateMSP -> DEBU 8b5 Setting up MSP for org Org1MSP" +"2019-09-24 00:25:04.373 UTC [msp] newBccspMsp -> DEBU 8b6 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.373 UTC [msp] New -> DEBU 8b7 Creating Cache-MSP instance" +"2019-09-24 00:25:04.373 UTC [msp] Setup -> DEBU 8b8 Setting up MSP instance Org1MSP" +"2019-09-24 00:25:04.373 UTC [msp.identity] newIdentity -> DEBU 8b9 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7306,7 +3407,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:40:45.064 UTC [msp.identity] newIdentity -> DEBU 1522 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.374 UTC [msp.identity] newIdentity -> DEBU 8ba Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7320,21 +3421,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.065 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1523 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:40:45.066 UTC [msp] Validate -> DEBU 1524 MSP Org1MSP validating identity" -"2019-07-20 02:40:45.066 UTC [msp] getCertificationChain -> DEBU 1525 MSP Org1MSP getting certification chain" -"2019-07-20 02:40:45.066 UTC [msp] hasOURole -> DEBU 1526 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:40:45.066 UTC [msp] getCertificationChain -> DEBU 1527 MSP Org1MSP getting certification chain" -"2019-07-20 02:40:45.067 UTC [common.channelconfig] NewStandardValues -> DEBU 1528 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1529 Processing field: AnchorPeers" -"2019-07-20 02:40:45.067 UTC [common.channelconfig] NewStandardValues -> DEBU 152a Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 152b Processing field: MSP" -"2019-07-20 02:40:45.067 UTC [common.channelconfig] Validate -> DEBU 152c Anchor peers for org Org2MSP are anchor_peers: " -"2019-07-20 02:40:45.068 UTC [common.channelconfig] validateMSP -> DEBU 152d Setting up MSP for org Org2MSP" -"2019-07-20 02:40:45.068 UTC [msp] newBccspMsp -> DEBU 152e Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.068 UTC [msp] New -> DEBU 152f Creating Cache-MSP instance" -"2019-07-20 02:40:45.068 UTC [msp] Setup -> DEBU 1530 Setting up MSP instance Org2MSP" -"2019-07-20 02:40:45.069 UTC [msp.identity] newIdentity -> DEBU 1531 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.374 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8bb Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:25:04.374 UTC [msp] Validate -> DEBU 8bc MSP Org1MSP validating identity" +"2019-09-24 00:25:04.374 UTC [msp] getCertificationChain -> DEBU 8bd MSP Org1MSP getting certification chain" +"2019-09-24 00:25:04.374 UTC [msp] hasOURole -> DEBU 8be MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:25:04.374 UTC [msp] getCertificationChain -> DEBU 8bf MSP Org1MSP getting certification chain" +"2019-09-24 00:25:04.374 UTC [common.channelconfig] NewStandardValues -> DEBU 8c0 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:04.374 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c1 Processing field: AnchorPeers" +"2019-09-24 00:25:04.374 UTC [common.channelconfig] NewStandardValues -> DEBU 8c2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.374 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c3 Processing field: MSP" +"2019-09-24 00:25:04.374 UTC [common.channelconfig] Validate -> DEBU 8c4 Anchor peers for org Org2MSP are " +"2019-09-24 00:25:04.374 UTC [common.channelconfig] validateMSP -> DEBU 8c5 Setting up MSP for org Org2MSP" +"2019-09-24 00:25:04.375 UTC [msp] newBccspMsp -> DEBU 8c6 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.375 UTC [msp] New -> DEBU 8c7 Creating Cache-MSP instance" +"2019-09-24 00:25:04.375 UTC [msp] Setup -> DEBU 8c8 Setting up MSP instance Org2MSP" +"2019-09-24 00:25:04.375 UTC [msp.identity] newIdentity -> DEBU 8c9 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7349,7 +3450,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.070 UTC [msp.identity] newIdentity -> DEBU 1532 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.375 UTC [msp.identity] newIdentity -> DEBU 8ca Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7363,169 +3464,114 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.070 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1533 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:40:45.070 UTC [msp] Validate -> DEBU 1534 MSP Org2MSP validating identity" -"2019-07-20 02:40:45.071 UTC [msp] getCertificationChain -> DEBU 1535 MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.071 UTC [msp] hasOURole -> DEBU 1536 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:40:45.071 UTC [msp] getCertificationChain -> DEBU 1537 MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.072 UTC [common.channelconfig] NewStandardValues -> DEBU 1538 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1539 Processing field: ConsensusType" -"2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153a Processing field: BatchSize" -"2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153b Processing field: BatchTimeout" -"2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153c Processing field: KafkaBrokers" -"2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153d Processing field: ChannelRestrictions" -"2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153e Processing field: Capabilities" -"2019-07-20 02:40:45.073 UTC [common.channelconfig] NewStandardValues -> DEBU 153f Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1540 Processing field: Endpoints" -"2019-07-20 02:40:45.073 UTC [common.channelconfig] NewStandardValues -> DEBU 1541 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1542 Processing field: MSP" -"2019-07-20 02:40:45.073 UTC [common.channelconfig] validateMSP -> DEBU 1543 Setting up MSP for org OrdererOrg" -"2019-07-20 02:40:45.074 UTC [msp] newBccspMsp -> DEBU 1544 Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.074 UTC [msp] New -> DEBU 1545 Creating Cache-MSP instance" -"2019-07-20 02:40:45.074 UTC [msp] Setup -> DEBU 1546 Setting up MSP instance OrdererMSP" -"2019-07-20 02:40:45.075 UTC [msp.identity] newIdentity -> DEBU 1547 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:40:45.075 UTC [msp.identity] newIdentity -> DEBU 1548 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:40:45.076 UTC [msp] Validate -> DEBU 1549 MSP OrdererMSP validating identity" -"2019-07-20 02:40:45.077 UTC [msp] Setup -> DEBU 154a Setting up the MSP manager (4 msps)" -"2019-07-20 02:40:45.077 UTC [msp] Setup -> DEBU 154b MSP manager setup complete, setup 4 msps" -"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154c Proposed new policy Admins for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154d Proposed new policy Endorsement for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154e Proposed new policy Readers for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154f Proposed new policy Writers for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 1550 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 1551 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1552 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1553 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1554 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1555 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1556 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1557 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1558 Proposed new policy Readers for Channel/Application" -"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1559 Proposed new policy Writers for Channel/Application" -"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155a Proposed new policy Admins for Channel/Application" -"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155b Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155c Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155d Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155e Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155f Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1560 Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1561 Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1562 Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1563 Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1564 Proposed new policy Writers for Channel" -"2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1565 Proposed new policy Admins for Channel" -"2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1566 Proposed new policy Readers for Channel" -"2019-07-20 02:40:45.080 UTC [common.configtx] addToMap -> DEBU 1567 Adding to config map: [Group] /Channel" -"2019-07-20 02:40:45.080 UTC [common.configtx] addToMap -> DEBU 1568 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1569 Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156b Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156c Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156d Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156e Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156f Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1570 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1571 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1572 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1573 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1574 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1575 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1576 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1577 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1578 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1579 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157c Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157d Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 157e Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 157f Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1580 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1581 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1582 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1583 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1584 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1585 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1586 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1587 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1588 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1589 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158b Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158e Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 158f Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1590 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1591 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1592 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1593 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1594 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1595 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1596 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1597 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1598 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1599 Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 159a Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:40:45.088 UTC [common.channelconfig] LogSanityChecks -> DEBU 159b As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:40:45.088 UTC [common.channelconfig] LogSanityChecks -> DEBU 159c As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:40:45.088 UTC [policies] Manager -> DEBU 159d Manager Channel looking up path [Application]" -"2019-07-20 02:40:45.088 UTC [policies] Manager -> DEBU 159e Manager Channel has managers Application" -"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 159f Manager Channel has managers Orderer" -"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a0 Manager Channel/Application looking up path []" -"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a1 Manager Channel/Application has managers Org3MSP" -"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a2 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a3 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a4 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a5 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a6 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a7 Manager Channel looking up path [Orderer]" -"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a8 Manager Channel has managers Application" -"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a9 Manager Channel has managers Orderer" -"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15aa Manager Channel/Orderer looking up path []" -"2019-07-20 02:40:45.090 UTC [policies] Manager -> DEBU 15ab Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ac As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ad As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ae As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15af As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:40:45.090 UTC [common.capabilities] Supported -> DEBU 15b0 Orderer capability V1_4_2 is supported and is enabled" -"2019-07-20 02:40:45.090 UTC [common.capabilities] Supported -> DEBU 15b1 Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:40:45.090 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b2 Obtaining default signing identity" -"2019-07-20 02:40:45.090 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b3 Obtaining default signing identity" -"2019-07-20 02:40:45.091 UTC [msp.identity] Sign -> DEBU 15b4 Sign: plaintext: 0AD2060A1B08011A0608ADFEC9E90522...270C6630BB899EB18E81D53EF47650E1 " -"2019-07-20 02:40:45.091 UTC [msp.identity] Sign -> DEBU 15b5 Sign: digest: E65706ACD2876BC2B6927B61ADD89D93F75A2ABE3D407C2904A013785C74D7B8 " -"2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" -"2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" -"2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15ba == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:40:45.091 UTC [msp] DeserializeIdentity -> DEBU 15bb Obtaining identity" -"2019-07-20 02:40:45.092 UTC [msp.identity] newIdentity -> DEBU 15bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.375 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8cb Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:25:04.375 UTC [msp] Validate -> DEBU 8cc MSP Org2MSP validating identity" +"2019-09-24 00:25:04.375 UTC [msp] getCertificationChain -> DEBU 8cd MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.382 UTC [msp] hasOURole -> DEBU 8ce MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:25:04.382 UTC [msp] getCertificationChain -> DEBU 8cf MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.382 UTC [msp] Setup -> DEBU 8d0 Setting up the MSP manager (3 msps)" +"2019-09-24 00:25:04.382 UTC [msp] Setup -> DEBU 8d1 MSP manager setup complete, setup 3 msps" +"2019-09-24 00:25:04.382 UTC [policies] NewManagerImpl -> DEBU 8d2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.382 UTC [policies] NewManagerImpl -> DEBU 8d3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.382 UTC [policies] NewManagerImpl -> DEBU 8d4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.382 UTC [policies] NewManagerImpl -> DEBU 8d5 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:25:04.382 UTC [policies] NewManagerImpl -> DEBU 8d6 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8d7 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8d8 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8d9 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8da Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8db Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8dc Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8dd Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8de Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8df Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e0 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e1 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e2 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e3 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e4 Proposed new policy Readers for Channel/Application" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e5 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e6 Proposed new policy Admins for Channel" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e7 Proposed new policy Readers for Channel" +"2019-09-24 00:25:04.383 UTC [policies] NewManagerImpl -> DEBU 8e8 Proposed new policy Writers for Channel" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Group] /Channel" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f5 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f6 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f7 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f8 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8f9 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8fa Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8fb Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8fc Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:04.384 UTC [common.configtx] addToMap -> DEBU 8fd Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 8fe Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 8ff Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 900 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 901 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 902 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 903 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 904 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:25:04.385 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:25:04.386 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:25:04.386 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:25:04.386 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 916 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 917 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 918 Manager Channel looking up path [Application]" +"2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 919 Manager Channel has managers Orderer" +"2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 91a Manager Channel has managers Application" +"2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 91b Manager Channel/Application looking up path []" +"2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 91c Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 91d Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 91e As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 91f As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 920 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 921 Manager Channel looking up path [Orderer]" +"2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 922 Manager Channel has managers Orderer" +"2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 923 Manager Channel has managers Application" +"2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 924 Manager Channel/Orderer looking up path []" +"2019-09-24 00:25:04.386 UTC [policies] Manager -> DEBU 925 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 926 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 927 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:25:04.386 UTC [common.channelconfig] LogSanityChecks -> DEBU 928 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:25:04.387 UTC [common.channelconfig] LogSanityChecks -> DEBU 929 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:25:04.387 UTC [common.capabilities] Supported -> DEBU 92a Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:04.387 UTC [common.capabilities] Supported -> DEBU 92b Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:04.387 UTC [msp] GetDefaultSigningIdentity -> DEBU 92c Obtaining default signing identity" +"2019-09-24 00:25:04.387 UTC [msp] GetDefaultSigningIdentity -> DEBU 92d Obtaining default signing identity" +"2019-09-24 00:25:04.387 UTC [msp.identity] Sign -> DEBU 92e Sign: plaintext: 0AD2060A1B08011A0608E0C4A5EC0522...6AF61CB2B2B77883E99977EF1F7ADF99 " +"2019-09-24 00:25:04.387 UTC [msp.identity] Sign -> DEBU 92f Sign: digest: D714E82B948519A5C4C6050CCC2A0990B0CCFB3E0B34FCBA210E7039E6706555 " +"2019-09-24 00:25:04.387 UTC [policies] Evaluate -> DEBU 930 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 00:25:04.387 UTC [policies] Evaluate -> DEBU 931 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.387 UTC [policies] Evaluate -> DEBU 932 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 00:25:04.387 UTC [policies] Evaluate -> DEBU 933 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.387 UTC [policies] Evaluate -> DEBU 934 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:25:04.387 UTC [msp] DeserializeIdentity -> DEBU 935 Obtaining identity" +"2019-09-24 00:25:04.388 UTC [msp.identity] newIdentity -> DEBU 936 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -7539,133 +3585,90 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.092 UTC [cauthdsl] func1 -> DEBU 15bd 0xc001062e00 gate 1563590445092476300 evaluation starts" -"2019-07-20 02:40:45.092 UTC [cauthdsl] func2 -> DEBU 15be 0xc001062e00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.092 UTC [cauthdsl] func2 -> DEBU 15bf 0xc001062e00 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:45.092 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15c0 Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-07-20 02:40:45.092 UTC [msp] Validate -> DEBU 15c1 MSP OrdererMSP validating identity" -"2019-07-20 02:40:45.093 UTC [cauthdsl] func2 -> DEBU 15c2 0xc001062e00 principal matched by identity 0" -"2019-07-20 02:40:45.093 UTC [msp.identity] Verify -> DEBU 15c3 Verify: digest = 00000000 e6 57 06 ac d2 87 6b c2 b6 92 7b 61 ad d8 9d 93 |.W....k...{a....| -00000010 f7 5a 2a be 3d 40 7c 29 04 a0 13 78 5c 74 d7 b8 |.Z*.=@|)...x\t..|" -"2019-07-20 02:40:45.093 UTC [msp.identity] Verify -> DEBU 15c4 Verify: sig = 00000000 30 43 02 1f 74 f5 ee 6a 28 f5 da 8c 41 f5 e2 69 |0C..t..j(...A..i| -00000010 e8 f9 d2 93 4f c7 61 e5 e2 e1 7b 30 6e bf 8b cc |....O.a...{0n...| -00000020 f7 f1 cf 02 20 12 d4 eb ba 3b 2f 97 3c df 61 c2 |.... ....;/.<.a.| -00000030 2d b9 86 81 75 ee 2e b8 a3 6e cb 9c ae 7b 09 34 |-...u....n...{.4| -00000040 63 b0 56 6b 0a |c.Vk.|" -"2019-07-20 02:40:45.093 UTC [cauthdsl] func2 -> DEBU 15c5 0xc001062e00 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.093 UTC [cauthdsl] func1 -> DEBU 15c6 0xc001062e00 gate 1563590445092476300 evaluation succeeds" -"2019-07-20 02:40:45.093 UTC [policies] Evaluate -> DEBU 15c7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15c9 Signature set satisfies policy /Channel/Orderer/Writers" -"2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" -"2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15cb Signature set satisfies policy /Channel/Writers" -"2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" -"2019-07-20 02:40:45.094 UTC [orderer.common.msgprocessor] Apply -> DEBU 15cd Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel -"2019-07-20 02:40:45.094 UTC [common.channelconfig] NewStandardValues -> DEBU 15ce Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15cf Processing field: HashingAlgorithm" -"2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d0 Processing field: BlockDataHashingStructure" -"2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d1 Processing field: OrdererAddresses" -"2019-07-20 02:40:45.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d2 Processing field: Consortium" -"2019-07-20 02:40:45.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d3 Processing field: Capabilities" -"2019-07-20 02:40:45.096 UTC [common.channelconfig] NewStandardValues -> DEBU 15d4 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:40:45.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d5 Processing field: ACLs" -"2019-07-20 02:40:45.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d6 Processing field: Capabilities" -"2019-07-20 02:40:45.097 UTC [common.channelconfig] NewStandardValues -> DEBU 15d7 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.097 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d8 Processing field: AnchorPeers" -"2019-07-20 02:40:45.097 UTC [common.channelconfig] NewStandardValues -> DEBU 15d9 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.097 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15da Processing field: MSP" -"2019-07-20 02:40:45.097 UTC [common.channelconfig] Validate -> DEBU 15db Anchor peers for org Org2MSP are anchor_peers: " -"2019-07-20 02:40:45.097 UTC [common.channelconfig] validateMSP -> DEBU 15dc Setting up MSP for org Org2MSP" -"2019-07-20 02:40:45.097 UTC [msp] newBccspMsp -> DEBU 15dd Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.097 UTC [msp] New -> DEBU 15de Creating Cache-MSP instance" -"2019-07-20 02:40:45.097 UTC [msp] Setup -> DEBU 15df Setting up MSP instance Org2MSP" -"2019-07-20 02:40:45.097 UTC [msp.identity] newIdentity -> DEBU 15e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-07-20 02:40:45.098 UTC [msp.identity] newIdentity -> DEBU 15e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-07-20 02:40:45.098 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15e2 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:40:45.098 UTC [msp] Validate -> DEBU 15e3 MSP Org2MSP validating identity" -"2019-07-20 02:40:45.098 UTC [msp] getCertificationChain -> DEBU 15e4 MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.099 UTC [msp] hasOURole -> DEBU 15e5 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:40:45.099 UTC [msp] getCertificationChain -> DEBU 15e6 MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.099 UTC [common.channelconfig] NewStandardValues -> DEBU 15e7 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e8 Processing field: AnchorPeers" -"2019-07-20 02:40:45.099 UTC [common.channelconfig] NewStandardValues -> DEBU 15e9 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ea Processing field: MSP" -"2019-07-20 02:40:45.099 UTC [common.channelconfig] Validate -> DEBU 15eb Anchor peers for org Org3MSP are " -"2019-07-20 02:40:45.100 UTC [common.channelconfig] validateMSP -> DEBU 15ec Setting up MSP for org Org3MSP" -"2019-07-20 02:40:45.100 UTC [msp] newBccspMsp -> DEBU 15ed Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.100 UTC [msp] New -> DEBU 15ee Creating Cache-MSP instance" -"2019-07-20 02:40:45.100 UTC [msp] Setup -> DEBU 15ef Setting up MSP instance Org3MSP" -"2019-07-20 02:40:45.100 UTC [msp.identity] newIdentity -> DEBU 15f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB -6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw -RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc -CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== ------END CERTIFICATE-----" -"2019-07-20 02:40:45.100 UTC [msp.identity] newIdentity -> DEBU 15f1 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +"2019-09-24 00:25:04.388 UTC [cauthdsl] func1 -> DEBU 937 0xc0008ec490 gate 1569284704388870000 evaluation starts" +"2019-09-24 00:25:04.388 UTC [cauthdsl] func2 -> DEBU 938 0xc0008ec490 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.389 UTC [cauthdsl] func2 -> DEBU 939 0xc0008ec490 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:04.389 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 93a Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 00:25:04.389 UTC [msp] Validate -> DEBU 93b MSP OrdererMSP validating identity" +"2019-09-24 00:25:04.389 UTC [cauthdsl] func2 -> DEBU 93c 0xc0008ec490 principal matched by identity 0" +"2019-09-24 00:25:04.389 UTC [msp.identity] Verify -> DEBU 93d Verify: digest = 00000000 d7 14 e8 2b 94 85 19 a5 c4 c6 05 0c cc 2a 09 90 |...+.........*..| +00000010 b0 cc fb 3e 0b 34 fc ba 21 0e 70 39 e6 70 65 55 |...>.4..!.p9.peU|" +"2019-09-24 00:25:04.389 UTC [msp.identity] Verify -> DEBU 93e Verify: sig = 00000000 30 45 02 21 00 9c 2f 49 ca 50 e2 c2 b9 1d bd c4 |0E.!../I.P......| +00000010 29 2b b2 d5 77 08 fe 65 ea 7b b4 a7 88 f3 a9 06 |)+..w..e.{......| +00000020 08 02 e9 88 38 02 20 0e 04 dc 5a a0 be d2 83 e1 |....8. ...Z.....| +00000030 a4 51 e3 80 d1 f7 48 32 17 b4 51 91 23 6c 92 d2 |.Q....H2..Q.#l..| +00000040 f9 3e 14 b4 e1 e7 68 |.>....h|" +"2019-09-24 00:25:04.389 UTC [cauthdsl] func2 -> DEBU 93f 0xc0008ec490 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.389 UTC [cauthdsl] func1 -> DEBU 940 0xc0008ec490 gate 1569284704388870000 evaluation succeeds" +"2019-09-24 00:25:04.389 UTC [policies] Evaluate -> DEBU 941 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:04.389 UTC [policies] Evaluate -> DEBU 942 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:04.390 UTC [policies] Evaluate -> DEBU 943 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-09-24 00:25:04.390 UTC [policies] Evaluate -> DEBU 944 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 00:25:04.390 UTC [policies] Evaluate -> DEBU 945 Signature set satisfies policy /Channel/Writers" +"2019-09-24 00:25:04.390 UTC [policies] Evaluate -> DEBU 946 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 00:25:04.390 UTC [orderer.common.msgprocessor] Apply -> DEBU 947 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-09-24 00:25:04.390 UTC [common.channelconfig] NewStandardValues -> DEBU 948 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 949 Processing field: HashingAlgorithm" +"2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94a Processing field: BlockDataHashingStructure" +"2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94b Processing field: OrdererAddresses" +"2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94c Processing field: Consortium" +"2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94d Processing field: Capabilities" +"2019-09-24 00:25:04.390 UTC [common.channelconfig] NewStandardValues -> DEBU 94e Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94f Processing field: ConsensusType" +"2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 950 Processing field: BatchSize" +"2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 951 Processing field: BatchTimeout" +"2019-09-24 00:25:04.390 UTC [common.channelconfig] initializeProtosStruct -> DEBU 952 Processing field: KafkaBrokers" +"2019-09-24 00:25:04.391 UTC [common.channelconfig] initializeProtosStruct -> DEBU 953 Processing field: ChannelRestrictions" +"2019-09-24 00:25:04.391 UTC [common.channelconfig] initializeProtosStruct -> DEBU 954 Processing field: Capabilities" +"2019-09-24 00:25:04.391 UTC [common.channelconfig] NewStandardValues -> DEBU 955 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:25:04.391 UTC [common.channelconfig] initializeProtosStruct -> DEBU 956 Processing field: Endpoints" +"2019-09-24 00:25:04.391 UTC [common.channelconfig] NewStandardValues -> DEBU 957 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.391 UTC [common.channelconfig] initializeProtosStruct -> DEBU 958 Processing field: MSP" +"2019-09-24 00:25:04.391 UTC [common.channelconfig] validateMSP -> DEBU 959 Setting up MSP for org OrdererOrg" +"2019-09-24 00:25:04.391 UTC [msp] newBccspMsp -> DEBU 95a Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.391 UTC [msp] New -> DEBU 95b Creating Cache-MSP instance" +"2019-09-24 00:25:04.392 UTC [msp] Setup -> DEBU 95c Setting up MSP instance OrdererMSP" +"2019-09-24 00:25:04.393 UTC [msp.identity] newIdentity -> DEBU 95d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y -ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr -zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky -u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV -HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO -PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ -R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-07-20 02:40:45.101 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15f2 Checking if identity satisfies role [CLIENT] for Org3MSP" -"2019-07-20 02:40:45.101 UTC [msp] Validate -> DEBU 15f3 MSP Org3MSP validating identity" -"2019-07-20 02:40:45.101 UTC [msp] getCertificationChain -> DEBU 15f4 MSP Org3MSP getting certification chain" -"2019-07-20 02:40:45.101 UTC [msp] hasOURole -> DEBU 15f5 MSP Org3MSP checking if the identity is a client" -"2019-07-20 02:40:45.101 UTC [msp] getCertificationChain -> DEBU 15f6 MSP Org3MSP getting certification chain" -"2019-07-20 02:40:45.102 UTC [common.channelconfig] NewStandardValues -> DEBU 15f7 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.102 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f8 Processing field: AnchorPeers" -"2019-07-20 02:40:45.102 UTC [common.channelconfig] NewStandardValues -> DEBU 15f9 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.102 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15fa Processing field: MSP" -"2019-07-20 02:40:45.102 UTC [common.channelconfig] Validate -> DEBU 15fb Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:40:45.102 UTC [common.channelconfig] validateMSP -> DEBU 15fc Setting up MSP for org Org1MSP" -"2019-07-20 02:40:45.102 UTC [msp] newBccspMsp -> DEBU 15fd Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.102 UTC [msp] New -> DEBU 15fe Creating Cache-MSP instance" -"2019-07-20 02:40:45.102 UTC [msp] Setup -> DEBU 15ff Setting up MSP instance Org1MSP" -"2019-07-20 02:40:45.103 UTC [msp.identity] newIdentity -> DEBU 1600 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.394 UTC [msp.identity] newIdentity -> DEBU 95e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:04.395 UTC [msp] Validate -> DEBU 95f MSP OrdererMSP validating identity" +"2019-09-24 00:25:04.395 UTC [common.channelconfig] NewStandardValues -> DEBU 960 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:25:04.395 UTC [common.channelconfig] initializeProtosStruct -> DEBU 961 Processing field: ACLs" +"2019-09-24 00:25:04.395 UTC [common.channelconfig] initializeProtosStruct -> DEBU 962 Processing field: Capabilities" +"2019-09-24 00:25:04.395 UTC [common.channelconfig] NewStandardValues -> DEBU 963 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:04.395 UTC [common.channelconfig] initializeProtosStruct -> DEBU 964 Processing field: AnchorPeers" +"2019-09-24 00:25:04.395 UTC [common.channelconfig] NewStandardValues -> DEBU 965 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.395 UTC [common.channelconfig] initializeProtosStruct -> DEBU 966 Processing field: MSP" +"2019-09-24 00:25:04.395 UTC [common.channelconfig] Validate -> DEBU 967 Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:25:04.395 UTC [common.channelconfig] validateMSP -> DEBU 968 Setting up MSP for org Org1MSP" +"2019-09-24 00:25:04.395 UTC [msp] newBccspMsp -> DEBU 969 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.396 UTC [msp] New -> DEBU 96a Creating Cache-MSP instance" +"2019-09-24 00:25:04.396 UTC [msp] Setup -> DEBU 96b Setting up MSP instance Org1MSP" +"2019-09-24 00:25:04.396 UTC [msp.identity] newIdentity -> DEBU 96c Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7680,7 +3683,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:40:45.103 UTC [msp.identity] newIdentity -> DEBU 1601 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.397 UTC [msp.identity] newIdentity -> DEBU 96d Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -7694,375 +3697,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.104 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1602 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:40:45.104 UTC [msp] Validate -> DEBU 1603 MSP Org1MSP validating identity" -"2019-07-20 02:40:45.104 UTC [msp] getCertificationChain -> DEBU 1604 MSP Org1MSP getting certification chain" -"2019-07-20 02:40:45.104 UTC [msp] hasOURole -> DEBU 1605 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:40:45.104 UTC [msp] getCertificationChain -> DEBU 1606 MSP Org1MSP getting certification chain" -"2019-07-20 02:40:45.104 UTC [common.channelconfig] NewStandardValues -> DEBU 1607 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1608 Processing field: ConsensusType" -"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1609 Processing field: BatchSize" -"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160a Processing field: BatchTimeout" -"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160b Processing field: KafkaBrokers" -"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160c Processing field: ChannelRestrictions" -"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160d Processing field: Capabilities" -"2019-07-20 02:40:45.105 UTC [common.channelconfig] NewStandardValues -> DEBU 160e Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:40:45.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160f Processing field: Endpoints" -"2019-07-20 02:40:45.105 UTC [common.channelconfig] NewStandardValues -> DEBU 1610 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1611 Processing field: MSP" -"2019-07-20 02:40:45.105 UTC [common.channelconfig] validateMSP -> DEBU 1612 Setting up MSP for org OrdererOrg" -"2019-07-20 02:40:45.105 UTC [msp] newBccspMsp -> DEBU 1613 Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.105 UTC [msp] New -> DEBU 1614 Creating Cache-MSP instance" -"2019-07-20 02:40:45.106 UTC [msp] Setup -> DEBU 1615 Setting up MSP instance OrdererMSP" -"2019-07-20 02:40:45.108 UTC [msp.identity] newIdentity -> DEBU 1616 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:40:45.108 UTC [msp.identity] newIdentity -> DEBU 1617 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:40:45.109 UTC [msp] Validate -> DEBU 1618 MSP OrdererMSP validating identity" -"2019-07-20 02:40:45.109 UTC [msp] Setup -> DEBU 1619 Setting up the MSP manager (4 msps)" -"2019-07-20 02:40:45.109 UTC [msp] Setup -> DEBU 161a MSP manager setup complete, setup 4 msps" -"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161b Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161c Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161d Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161e Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161f Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1620 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1621 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1622 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1623 Proposed new policy Writers for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1624 Proposed new policy Admins for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1625 Proposed new policy Endorsement for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1626 Proposed new policy Readers for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1627 Proposed new policy Readers for Channel/Application" -"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1628 Proposed new policy Writers for Channel/Application" -"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1629 Proposed new policy Admins for Channel/Application" -"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162a Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162b Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162c Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162d Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162e Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162f Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1630 Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1631 Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1632 Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1633 Proposed new policy Writers for Channel" -"2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1634 Proposed new policy Admins for Channel" -"2019-07-20 02:40:45.113 UTC [policies] NewManagerImpl -> DEBU 1635 Proposed new policy Readers for Channel" -"2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1636 Adding to config map: [Group] /Channel" -"2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1637 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1638 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1639 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163a Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163f Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 1640 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1641 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1642 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1643 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1644 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1645 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1646 Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1647 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 1648 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 1649 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164a Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164c Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164d Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164e Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164f Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1650 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1651 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1652 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1653 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1654 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1655 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1656 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1657 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 1658 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 1659 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 165a Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 165b Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165d Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165f Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1660 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1661 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1662 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1663 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1664 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1665 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1666 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1667 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1668 Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1669 Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:40:45.121 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 166a [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39244" -"2019-07-20 02:40:45.122 UTC [orderer.consensus.etcdraft] propose -> INFO 166b Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 -"2019-07-20 02:40:45.122 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 166c Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 -"2019-07-20 02:40:45.123 UTC [orderer.consensus.etcdraft] 2 -> DEBU 166d Proposed block [6] to raft consensus" channel=businesschannel node=1 -"2019-07-20 02:40:45.124 UTC [common.deliver] Handle -> WARN 166e Error reading from 172.18.0.9:39242: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:45.124 UTC [orderer.common.server] func1 -> DEBU 166f Closing Deliver stream" -"2019-07-20 02:40:45.125 UTC [comm.grpc.server] 1 -> INFO 1670 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39242 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=118.9084ms -"2019-07-20 02:40:45.125 UTC [grpc] infof -> DEBU 1671 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:45.125 UTC [orderer.common.broadcast] Handle -> WARN 1672 Error reading from 172.18.0.9:39244: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:45.125 UTC [orderer.common.server] func1 -> DEBU 1673 Closing Broadcast stream" -"2019-07-20 02:40:45.125 UTC [comm.grpc.server] 1 -> INFO 1674 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39244 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=98.4809ms -"2019-07-20 02:40:45.128 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1675 Sending msg of 34005 bytes to 3 on channel businesschannel took 19µs" -"2019-07-20 02:40:45.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1678 Sending msg of 34005 bytes to 2 on channel businesschannel took 13.7µs" -"2019-07-20 02:40:45.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1679 Send of ConsensusRequest for channel businesschannel with payload of size 34005 to orderer1.example.com(orderer1.example.com:7050) took 276.9µs " -"2019-07-20 02:40:45.129 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1676 Send of ConsensusRequest for channel businesschannel with payload of size 34005 to orderer2.example.com(orderer2.example.com:7050) took 644.3µs " -"2019-07-20 02:40:45.131 UTC [grpc] infof -> DEBU 1677 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:45.135 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:45.135 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167b Sending msg of 28 bytes to 2 on channel businesschannel took 12.4µs" -"2019-07-20 02:40:45.135 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167c Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" -"2019-07-20 02:40:45.137 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7105ms " -"2019-07-20 02:40:45.137 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 167e Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 -"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 167f Adding to config map: [Group] /Channel" -"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1680 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1681 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1682 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1683 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1684 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1685 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1686 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1687 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1688 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1689 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168a Adding to config map: [Group] /Channel" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168b Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168c Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168d Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168e Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168f Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1690 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1691 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1692 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1693 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1694 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1695 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1696 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1697 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1698 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1699 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 169a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:40:45.138 UTC [common.configtx] verifyDeltaSet -> DEBU 169b Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-07-20 02:40:45.138 UTC [common.configtx] verifyDeltaSet -> DEBU 169c Processing change to key: [Group] /Channel/Application" -"2019-07-20 02:40:45.138 UTC [common.configtx] policyForItem -> DEBU 169d Getting policy for item Application with mod_policy Admins" -"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 169e Manager Channel looking up path []" -"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 169f Manager Channel has managers Orderer" -"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a0 Manager Channel has managers Application" -"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a1 Manager Channel looking up path [Application]" -"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a2 Manager Channel has managers Orderer" -"2019-07-20 02:40:45.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16a3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66µs " -"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a4 Manager Channel has managers Application" -"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a5 Manager Channel/Application looking up path []" -"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a6 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a7 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -"2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-07-20 02:40:45.138 UTC [cauthdsl] deduplicate -> WARN 16ab De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-07-20 02:40:45.139 UTC [cauthdsl] func1 -> DEBU 16ac 0xc000fa71d0 gate 1563590445139011500 evaluation starts" -"2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16ad 0xc000fa71d0 signed by 0 principal evaluation starts (used [false false false])" -"2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16ae 0xc000fa71d0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16af 0xc000fa71d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16b0 0xc000fa71d0 processing identity 1 with bytes of fd0280" -"2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16b1 0xc000fa71d0 principal matched by identity 1" -"2019-07-20 02:40:45.139 UTC [msp.identity] Verify -> DEBU 16b2 Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| -00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" -"2019-07-20 02:40:45.141 UTC [msp.identity] Verify -> DEBU 16b3 Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| -00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| -00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| -00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| -00000040 6a a2 e2 e3 7c fb |j...|.|" -"2019-07-20 02:40:45.141 UTC [cauthdsl] func2 -> DEBU 16b4 0xc000fa71d0 principal evaluation succeeds for identity 1" -"2019-07-20 02:40:45.141 UTC [cauthdsl] func1 -> DEBU 16b5 0xc000fa71d0 gate 1563590445139011500 evaluation succeeds" -"2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b6 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-07-20 02:40:45.143 UTC [cauthdsl] deduplicate -> WARN 16b9 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-07-20 02:40:45.144 UTC [cauthdsl] func1 -> DEBU 16bb 0xc000fa7890 gate 1563590445144040900 evaluation starts" -"2019-07-20 02:40:45.144 UTC [cauthdsl] func2 -> DEBU 16bc 0xc000fa7890 signed by 0 principal evaluation starts (used [false false false])" -"2019-07-20 02:40:45.145 UTC [cauthdsl] func2 -> DEBU 16bd 0xc000fa7890 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:45.146 UTC [cauthdsl] func2 -> DEBU 16be 0xc000fa7890 principal matched by identity 0" -"2019-07-20 02:40:45.146 UTC [msp.identity] Verify -> DEBU 16bf Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| -00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" -"2019-07-20 02:40:45.147 UTC [msp.identity] Verify -> DEBU 16c0 Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| -00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| -00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| -00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| -00000040 ed 0f 29 74 0b 84 |..)t..|" -"2019-07-20 02:40:45.152 UTC [cauthdsl] func2 -> DEBU 16c1 0xc000fa7890 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.153 UTC [cauthdsl] func1 -> DEBU 16c2 0xc000fa7890 gate 1563590445144040900 evaluation succeeds" -"2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c3 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c5 Signature set satisfies policy /Channel/Application/Admins" -"2019-07-20 02:40:45.155 UTC [policies] Evaluate -> DEBU 16c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -"2019-07-20 02:40:45.155 UTC [common.configtx] verifyDeltaSet -> DEBU 16c7 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -"2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16c8 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16c9 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16ca Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16cb Processing change to key: [Group] /Channel/Application/Org3MSP" -"2019-07-20 02:40:45.157 UTC [common.configtx] recurseConfigMap -> DEBU 16cc Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.157 UTC [common.configtx] recurseConfigMap -> DEBU 16cd Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16ce Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16cf Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d1 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d2 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d3 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d4 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d5 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d6 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d8 Setting policy for key Admins to " -"2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16d9 Setting policy for key Endorsement to " -"2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16da Setting policy for key LifecycleEndorsement to " -"2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16db Setting policy for key Readers to " -"2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16dc Setting policy for key Writers to " -"2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16dd Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16de Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16df Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16e0 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16e1 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.162 UTC [common.configtx] recurseConfigMap -> DEBU 16e2 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.162 UTC [common.configtx] recurseConfigMap -> DEBU 16e3 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e4 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e5 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e6 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.164 UTC [common.channelconfig] NewStandardValues -> DEBU 16e7 Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:40:45.164 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e8 Processing field: HashingAlgorithm" -"2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e9 Processing field: BlockDataHashingStructure" -"2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ea Processing field: OrdererAddresses" -"2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16eb Processing field: Consortium" -"2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ec Processing field: Capabilities" -"2019-07-20 02:40:45.166 UTC [common.channelconfig] NewStandardValues -> DEBU 16ed Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:40:45.166 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ee Processing field: ACLs" -"2019-07-20 02:40:45.166 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ef Processing field: Capabilities" -"2019-07-20 02:40:45.166 UTC [common.channelconfig] NewStandardValues -> DEBU 16f0 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f1 Processing field: AnchorPeers" -"2019-07-20 02:40:45.167 UTC [common.channelconfig] NewStandardValues -> DEBU 16f2 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f3 Processing field: MSP" -"2019-07-20 02:40:45.167 UTC [common.channelconfig] Validate -> DEBU 16f4 Anchor peers for org Org3MSP are " -"2019-07-20 02:40:45.167 UTC [common.channelconfig] validateMSP -> DEBU 16f5 Setting up MSP for org Org3MSP" -"2019-07-20 02:40:45.167 UTC [msp] newBccspMsp -> DEBU 16f6 Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.168 UTC [msp] New -> DEBU 16f7 Creating Cache-MSP instance" -"2019-07-20 02:40:45.168 UTC [msp] Setup -> DEBU 16f8 Setting up MSP instance Org3MSP" -"2019-07-20 02:40:45.168 UTC [msp.identity] newIdentity -> DEBU 16f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB -6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw -RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc -CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== ------END CERTIFICATE-----" -"2019-07-20 02:40:45.169 UTC [msp.identity] newIdentity -> DEBU 16fa Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y -ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr -zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky -u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV -HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO -PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ -R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= ------END CERTIFICATE-----" -"2019-07-20 02:40:45.169 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16fb Checking if identity satisfies role [CLIENT] for Org3MSP" -"2019-07-20 02:40:45.170 UTC [msp] Validate -> DEBU 16fc MSP Org3MSP validating identity" -"2019-07-20 02:40:45.170 UTC [msp] getCertificationChain -> DEBU 16fd MSP Org3MSP getting certification chain" -"2019-07-20 02:40:45.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16ba Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:45.171 UTC [msp] hasOURole -> DEBU 16fe MSP Org3MSP checking if the identity is a client" -"2019-07-20 02:40:45.171 UTC [msp] getCertificationChain -> DEBU 16ff MSP Org3MSP getting certification chain" -"2019-07-20 02:40:45.171 UTC [common.channelconfig] NewStandardValues -> DEBU 1700 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.171 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1701 Processing field: AnchorPeers" -"2019-07-20 02:40:45.172 UTC [common.channelconfig] NewStandardValues -> DEBU 1702 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.172 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1703 Processing field: MSP" -"2019-07-20 02:40:45.172 UTC [common.channelconfig] Validate -> DEBU 1704 Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:40:45.172 UTC [common.channelconfig] validateMSP -> DEBU 1705 Setting up MSP for org Org1MSP" -"2019-07-20 02:40:45.172 UTC [msp] newBccspMsp -> DEBU 1706 Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.173 UTC [msp] New -> DEBU 1707 Creating Cache-MSP instance" -"2019-07-20 02:40:45.173 UTC [msp] Setup -> DEBU 1708 Setting up MSP instance Org1MSP" -"2019-07-20 02:40:45.173 UTC [msp.identity] newIdentity -> DEBU 1709 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-07-20 02:40:45.174 UTC [msp.identity] newIdentity -> DEBU 170a Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:40:45.174 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 170b Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:40:45.175 UTC [msp] Validate -> DEBU 170c MSP Org1MSP validating identity" -"2019-07-20 02:40:45.175 UTC [msp] getCertificationChain -> DEBU 170d MSP Org1MSP getting certification chain" -"2019-07-20 02:40:45.175 UTC [msp] hasOURole -> DEBU 170e MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:40:45.175 UTC [msp] getCertificationChain -> DEBU 170f MSP Org1MSP getting certification chain" -"2019-07-20 02:40:45.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1710 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.176 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1711 Processing field: AnchorPeers" -"2019-07-20 02:40:45.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1712 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.176 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1713 Processing field: MSP" -"2019-07-20 02:40:45.176 UTC [common.channelconfig] Validate -> DEBU 1714 Anchor peers for org Org2MSP are anchor_peers: " -"2019-07-20 02:40:45.177 UTC [common.channelconfig] validateMSP -> DEBU 1715 Setting up MSP for org Org2MSP" -"2019-07-20 02:40:45.177 UTC [msp] newBccspMsp -> DEBU 1716 Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.177 UTC [msp] New -> DEBU 1717 Creating Cache-MSP instance" -"2019-07-20 02:40:45.177 UTC [msp] Setup -> DEBU 1718 Setting up MSP instance Org2MSP" -"2019-07-20 02:40:45.177 UTC [msp.identity] newIdentity -> DEBU 1719 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.398 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 96e Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:25:04.398 UTC [msp] Validate -> DEBU 96f MSP Org1MSP validating identity" +"2019-09-24 00:25:04.398 UTC [msp] getCertificationChain -> DEBU 970 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:04.398 UTC [msp] hasOURole -> DEBU 971 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:25:04.398 UTC [msp] getCertificationChain -> DEBU 972 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:04.400 UTC [common.channelconfig] NewStandardValues -> DEBU 973 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:04.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 974 Processing field: AnchorPeers" +"2019-09-24 00:25:04.400 UTC [common.channelconfig] NewStandardValues -> DEBU 975 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 976 Processing field: MSP" +"2019-09-24 00:25:04.401 UTC [common.channelconfig] Validate -> DEBU 977 Anchor peers for org Org2MSP are " +"2019-09-24 00:25:04.401 UTC [common.channelconfig] validateMSP -> DEBU 978 Setting up MSP for org Org2MSP" +"2019-09-24 00:25:04.401 UTC [msp] newBccspMsp -> DEBU 979 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.401 UTC [msp] New -> DEBU 97a Creating Cache-MSP instance" +"2019-09-24 00:25:04.401 UTC [msp] Setup -> DEBU 97b Setting up MSP instance Org2MSP" +"2019-09-24 00:25:04.403 UTC [msp.identity] newIdentity -> DEBU 97c Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -8077,7 +3726,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.178 UTC [msp.identity] newIdentity -> DEBU 171a Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.405 UTC [msp.identity] newIdentity -> DEBU 97d Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -8091,27 +3740,198 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.178 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 171b Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:40:45.179 UTC [msp] Validate -> DEBU 171c MSP Org2MSP validating identity" -"2019-07-20 02:40:45.179 UTC [msp] getCertificationChain -> DEBU 171d MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.179 UTC [msp] hasOURole -> DEBU 171e MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:40:45.179 UTC [msp] getCertificationChain -> DEBU 171f MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.180 UTC [common.channelconfig] NewStandardValues -> DEBU 1720 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1721 Processing field: ConsensusType" -"2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1722 Processing field: BatchSize" -"2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1723 Processing field: BatchTimeout" -"2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1724 Processing field: KafkaBrokers" -"2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1725 Processing field: ChannelRestrictions" -"2019-07-20 02:40:45.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1726 Processing field: Capabilities" -"2019-07-20 02:40:45.181 UTC [common.channelconfig] NewStandardValues -> DEBU 1727 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:40:45.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1728 Processing field: Endpoints" -"2019-07-20 02:40:45.181 UTC [common.channelconfig] NewStandardValues -> DEBU 1729 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 172a Processing field: MSP" -"2019-07-20 02:40:45.182 UTC [common.channelconfig] validateMSP -> DEBU 172b Setting up MSP for org OrdererOrg" -"2019-07-20 02:40:45.182 UTC [msp] newBccspMsp -> DEBU 172c Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.183 UTC [msp] New -> DEBU 172d Creating Cache-MSP instance" -"2019-07-20 02:40:45.183 UTC [msp] Setup -> DEBU 172e Setting up MSP instance OrdererMSP" -"2019-07-20 02:40:45.184 UTC [msp.identity] newIdentity -> DEBU 172f Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.408 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 97e Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:25:04.408 UTC [msp] Validate -> DEBU 97f MSP Org2MSP validating identity" +"2019-09-24 00:25:04.408 UTC [msp] getCertificationChain -> DEBU 980 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.409 UTC [msp] hasOURole -> DEBU 981 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:25:04.409 UTC [msp] getCertificationChain -> DEBU 982 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.409 UTC [msp] Setup -> DEBU 983 Setting up the MSP manager (3 msps)" +"2019-09-24 00:25:04.409 UTC [msp] Setup -> DEBU 984 MSP manager setup complete, setup 3 msps" +"2019-09-24 00:25:04.409 UTC [policies] NewManagerImpl -> DEBU 985 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.409 UTC [policies] NewManagerImpl -> DEBU 986 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.409 UTC [policies] NewManagerImpl -> DEBU 987 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 988 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 989 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98a Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98b Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98c Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98d Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98e Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 98f Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 990 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 991 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 992 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 993 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 994 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 995 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 996 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 997 Proposed new policy Readers for Channel/Application" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 998 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:25:04.410 UTC [policies] NewManagerImpl -> DEBU 999 Proposed new policy Admins for Channel" +"2019-09-24 00:25:04.411 UTC [policies] NewManagerImpl -> DEBU 99a Proposed new policy Readers for Channel" +"2019-09-24 00:25:04.411 UTC [policies] NewManagerImpl -> DEBU 99b Proposed new policy Writers for Channel" +"2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 99c Adding to config map: [Group] /Channel" +"2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 99d Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 99e Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 99f Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 9a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 9a1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 9a2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:25:04.411 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:25:04.412 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:04.413 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.413 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:04.413 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:04.413 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.414 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9bb Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9bc Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:25:04.415 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:25:04.417 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:25:04.418 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:25:04.418 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:25:04.418 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:25:04.418 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:25:04.418 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:25:04.418 UTC [orderer.consensus.etcdraft] propose -> INFO 9c9 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 00:25:04.418 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 9ca Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-09-24 00:25:04.418 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 9cb [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:60686" +"2019-09-24 00:25:04.419 UTC [orderer.consensus.etcdraft] 2 -> DEBU 9cc Proposed block [1] to raft consensus" channel=businesschannel node=1 +"2019-09-24 00:25:04.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9cd Sending msg of 22816 bytes to 3 on channel businesschannel took 23.4µs" +"2019-09-24 00:25:04.430 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9ce Sending msg of 22816 bytes to 2 on channel businesschannel took 22.5µs" +"2019-09-24 00:25:04.430 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9cf Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer1.example.com(orderer1.example.com:7050) took 109µs " +"2019-09-24 00:25:04.430 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9d0 Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer2.example.com(orderer2.example.com:7050) took 87µs " +"2019-09-24 00:25:04.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9d1 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:04.440 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9d2 Sending msg of 28 bytes to 2 on channel businesschannel took 41.8µs" +"2019-09-24 00:25:04.440 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9d3 Sending msg of 28 bytes to 3 on channel businesschannel took 44.5µs" +"2019-09-24 00:25:04.440 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.8µs " +"2019-09-24 00:25:04.440 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 9d5 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9d6 Adding to config map: [Group] /Channel" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9d7 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9d8 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9d9 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9da Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9db Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9dc Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9dd Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9de Adding to config map: [Group] /Channel" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9df Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e0 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e1 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:04.441 UTC [common.configtx] addToMap -> DEBU 9e6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.441 UTC [common.configtx] verifyDeltaSet -> DEBU 9e7 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:04.441 UTC [common.configtx] verifyDeltaSet -> DEBU 9e8 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.441 UTC [common.configtx] policyForItem -> DEBU 9e9 Getting policy for item Org1MSP with mod_policy Admins" +"2019-09-24 00:25:04.441 UTC [policies] Manager -> DEBU 9ea Manager Channel looking up path [Application]" +"2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9eb Manager Channel has managers Orderer" +"2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9ec Manager Channel has managers Application" +"2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9ed Manager Channel/Application looking up path []" +"2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9ee Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9ef Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9f0 Manager Channel/Application looking up path [Org1MSP]" +"2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9f1 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9f2 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:04.442 UTC [policies] Manager -> DEBU 9f3 Manager Channel/Application/Org1MSP looking up path []" +"2019-09-24 00:25:04.442 UTC [policies] Evaluate -> DEBU 9f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 00:25:04.442 UTC [cauthdsl] func1 -> DEBU 9f5 0xc000f35a00 gate 1569284704442547200 evaluation starts" +"2019-09-24 00:25:04.442 UTC [cauthdsl] func2 -> DEBU 9f6 0xc000f35a00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.442 UTC [cauthdsl] func2 -> DEBU 9f7 0xc000f35a00 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:04.442 UTC [cauthdsl] func2 -> DEBU 9f8 0xc000f35a00 principal matched by identity 0" +"2019-09-24 00:25:04.442 UTC [msp.identity] Verify -> DEBU 9f9 Verify: digest = 00000000 1c cd 68 b8 33 39 c3 f7 d8 bf 6f 21 20 3c 57 2b |..h.39....o! DEBU 9fa Verify: sig = 00000000 30 44 02 20 3f 2d 41 bf df 48 de ab 3b 9f f2 6a |0D. ?-A..H..;..j| +00000010 1c b4 f9 16 f1 15 f3 9b 4e 9f 15 e8 29 65 8f 9b |........N...)e..| +00000020 87 2f 31 cd 02 20 40 64 26 9c 61 b6 4b 3f 60 9d |./1.. @d&.a.K?`.| +00000030 b0 4f 81 19 be bf 2f 49 3d 39 ca e7 6a cb ce 8c |.O..../I=9..j...| +00000040 db 89 e6 d0 87 84 |......|" +"2019-09-24 00:25:04.443 UTC [cauthdsl] func2 -> DEBU 9fb 0xc000f35a00 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.443 UTC [cauthdsl] func1 -> DEBU 9fc 0xc000f35a00 gate 1569284704442547200 evaluation succeeds" +"2019-09-24 00:25:04.443 UTC [policies] Evaluate -> DEBU 9fd Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.443 UTC [policies] Evaluate -> DEBU 9fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.460 UTC [common.deliver] Handle -> WARN 9ff Error reading from 172.18.0.9:60684: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:25:04.460 UTC [orderer.common.server] func1 -> DEBU a00 Closing Deliver stream" +"2019-09-24 00:25:04.460 UTC [comm.grpc.server] 1 -> INFO a01 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60684 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=156.728ms +"2019-09-24 00:25:04.460 UTC [orderer.common.broadcast] Handle -> WARN a02 Error reading from 172.18.0.9:60686: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:25:04.460 UTC [orderer.common.server] func1 -> DEBU a03 Closing Broadcast stream" +"2019-09-24 00:25:04.460 UTC [comm.grpc.server] 1 -> INFO a04 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:60686 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=100.5856ms +"2019-09-24 00:25:04.467 UTC [grpc] infof -> DEBU a05 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:04.467 UTC [grpc] infof -> DEBU a06 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:04.467 UTC [orderer.common.cluster.step] handleMessage -> DEBU a07 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:04.467 UTC [orderer.common.cluster.step] handleMessage -> DEBU a08 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:04.468 UTC [orderer.common.cluster.step] sendMessage -> DEBU a09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.7µs " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a0f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a10 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a11 Setting policy for key Readers to " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a12 Setting policy for key Writers to " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a13 Setting policy for key Admins to " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a14 Setting policy for key Endorsement to " +"2019-09-24 00:25:04.468 UTC [common.configtx] recurseConfigMap -> DEBU a15 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a16 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a17 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a18 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a19 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a1f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.469 UTC [common.configtx] recurseConfigMap -> DEBU a20 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.470 UTC [common.channelconfig] NewStandardValues -> DEBU a21 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a22 Processing field: HashingAlgorithm" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a23 Processing field: BlockDataHashingStructure" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a24 Processing field: OrdererAddresses" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a25 Processing field: Consortium" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a26 Processing field: Capabilities" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] NewStandardValues -> DEBU a27 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a28 Processing field: ConsensusType" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a29 Processing field: BatchSize" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a2a Processing field: BatchTimeout" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a2b Processing field: KafkaBrokers" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a2c Processing field: ChannelRestrictions" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a2d Processing field: Capabilities" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] NewStandardValues -> DEBU a2e Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a2f Processing field: Endpoints" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] NewStandardValues -> DEBU a30 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU a31 Processing field: MSP" +"2019-09-24 00:25:04.470 UTC [common.channelconfig] validateMSP -> DEBU a32 Setting up MSP for org OrdererOrg" +"2019-09-24 00:25:04.489 UTC [msp] newBccspMsp -> DEBU a35 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.489 UTC [msp] New -> DEBU a36 Creating Cache-MSP instance" +"2019-09-24 00:25:04.489 UTC [msp] Setup -> DEBU a37 Setting up MSP instance OrdererMSP" +"2019-09-24 00:25:04.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a33 Sending msg of 28 bytes to 2 on channel businesschannel took 34.8µs" +"2019-09-24 00:25:04.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a38 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2019-09-24 00:25:04.490 UTC [msp.identity] newIdentity -> DEBU a39 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -8125,7 +3945,9 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-07-20 02:40:45.184 UTC [msp.identity] newIdentity -> DEBU 1730 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU a3a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 500.5µs " +"2019-09-24 00:25:04.488 UTC [orderer.common.cluster.step] sendMessage -> DEBU a34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 349.9µs " +"2019-09-24 00:25:04.490 UTC [msp.identity] newIdentity -> DEBU a3b Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -8138,146 +3960,220 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.185 UTC [msp] Validate -> DEBU 1731 MSP OrdererMSP validating identity" -"2019-07-20 02:40:45.185 UTC [msp] Setup -> DEBU 1732 Setting up the MSP manager (4 msps)" -"2019-07-20 02:40:45.185 UTC [msp] Setup -> DEBU 1733 MSP manager setup complete, setup 4 msps" -"2019-07-20 02:40:45.185 UTC [policies] NewManagerImpl -> DEBU 1734 Proposed new policy Admins for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1735 Proposed new policy Endorsement for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1736 Proposed new policy Readers for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1737 Proposed new policy Writers for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1738 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1739 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173a Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173b Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173c Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173d Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173e Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173f Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.188 UTC [policies] NewManagerImpl -> DEBU 1740 Proposed new policy Readers for Channel/Application" -"2019-07-20 02:40:45.188 UTC [policies] NewManagerImpl -> DEBU 1741 Proposed new policy Writers for Channel/Application" -"2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1744 Proposed new policy Admins for Channel/Application" -"2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1745 Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:40:45.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1746 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 259.4µs " -"2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1747 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1748 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.203 UTC [policies] NewManagerImpl -> DEBU 1749 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.204 UTC [policies] NewManagerImpl -> DEBU 174a Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.200 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1742 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:45.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1743 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" -"2019-07-20 02:40:45.206 UTC [policies] NewManagerImpl -> DEBU 174b Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:40:45.207 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 174c Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" -"2019-07-20 02:40:45.207 UTC [orderer.common.cluster.step] sendMessage -> DEBU 174d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.5µs " -"2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 174e Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 174f Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 1750 Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1751 Proposed new policy Writers for Channel" -"2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1752 Proposed new policy Admins for Channel" -"2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1753 Proposed new policy Readers for Channel" -"2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1754 Adding to config map: [Group] /Channel" -"2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1755 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1756 Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-07-20 02:40:45.211 UTC [common.configtx] addToMap -> DEBU 1757 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-07-20 02:40:45.211 UTC [common.configtx] addToMap -> DEBU 1758 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-07-20 02:40:45.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1759 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:45.213 UTC [common.configtx] addToMap -> DEBU 175a Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.215 UTC [common.configtx] addToMap -> DEBU 175b Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-07-20 02:40:45.215 UTC [common.configtx] addToMap -> DEBU 175c Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-07-20 02:40:45.217 UTC [orderer.common.cluster.step] handleMessage -> DEBU 175d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:45.216 UTC [common.configtx] addToMap -> DEBU 175e Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 175f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1760 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1761 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1762 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 1763 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 1764 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 1765 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:40:45.223 UTC [common.configtx] addToMap -> DEBU 1766 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:40:45.224 UTC [common.configtx] addToMap -> DEBU 1767 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 1768 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 1769 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 176a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 176b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 176c Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176d Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176e Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176f Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:40:45.229 UTC [common.configtx] addToMap -> DEBU 1770 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:40:45.229 UTC [common.configtx] addToMap -> DEBU 1771 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:40:45.230 UTC [common.configtx] addToMap -> DEBU 1772 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1773 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1774 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1775 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1776 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1777 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1778 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:45.233 UTC [common.configtx] addToMap -> DEBU 1779 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:40:45.234 UTC [common.configtx] addToMap -> DEBU 177a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:40:45.234 UTC [common.configtx] addToMap -> DEBU 177b Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177f Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1780 Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1781 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1782 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1783 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:40:45.238 UTC [common.configtx] addToMap -> DEBU 1784 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:40:45.238 UTC [common.configtx] addToMap -> DEBU 1785 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:40:45.239 UTC [common.configtx] addToMap -> DEBU 1786 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:40:45.239 UTC [common.configtx] addToMap -> DEBU 1787 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:40:45.240 UTC [common.configtx] addToMap -> DEBU 1788 Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:40:45.240 UTC [common.configtx] addToMap -> DEBU 1789 Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:40:45.241 UTC [common.channelconfig] LogSanityChecks -> DEBU 178a As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:40:45.242 UTC [common.channelconfig] LogSanityChecks -> DEBU 178b As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:40:45.242 UTC [policies] Manager -> DEBU 178c Manager Channel looking up path [Application]" -"2019-07-20 02:40:45.242 UTC [policies] Manager -> DEBU 178d Manager Channel has managers Application" -"2019-07-20 02:40:45.243 UTC [policies] Manager -> DEBU 178e Manager Channel has managers Orderer" -"2019-07-20 02:40:45.243 UTC [policies] Manager -> DEBU 178f Manager Channel/Application looking up path []" -"2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1790 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1791 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1792 Manager Channel/Application has managers Org3MSP" -"2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1793 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1794 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1795 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-07-20 02:40:45.246 UTC [policies] Manager -> DEBU 1796 Manager Channel looking up path [Orderer]" -"2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1797 Manager Channel has managers Application" -"2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1798 Manager Channel has managers Orderer" -"2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1799 Manager Channel/Orderer looking up path []" -"2019-07-20 02:40:45.248 UTC [policies] Manager -> DEBU 179a Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179c As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179d As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:40:45.249 UTC [common.channelconfig] LogSanityChecks -> DEBU 179e As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:40:45.250 UTC [common.capabilities] Supported -> DEBU 179f Orderer capability V1_4_2 is supported and is enabled" -"2019-07-20 02:40:45.250 UTC [common.capabilities] Supported -> DEBU 17a0 Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:40:45.250 UTC [orderer.common.server] func1 -> DEBU 17a1 Executing callback to update root CAs" -"2019-07-20 02:40:45.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17a2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:45.250 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a3 updating root CAs for channel [businesschannel]" -"2019-07-20 02:40:45.251 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a4 adding app root CAs for MSP [Org3MSP]" -"2019-07-20 02:40:45.252 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a5 adding app root CAs for MSP [Org1MSP]" -"2019-07-20 02:40:45.253 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a6 adding app root CAs for MSP [Org2MSP]" -"2019-07-20 02:40:45.253 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a7 adding orderer root CAs for MSP [OrdererMSP]" -"2019-07-20 02:40:45.268 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17a8 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" -"2019-07-20 02:40:45.270 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17a9 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" -"2019-07-20 02:40:45.270 UTC [msp] GetDefaultSigningIdentity -> DEBU 17aa Obtaining default signing identity" -"2019-07-20 02:40:45.271 UTC [msp] GetDefaultSigningIdentity -> DEBU 17ab Obtaining default signing identity" -"2019-07-20 02:40:45.274 UTC [msp.identity] Sign -> DEBU 17ac Sign: plaintext: 0A020806120B0A090A03010203100418...CAE88F56D183B4805A1EC235F949D7F9 " -"2019-07-20 02:40:45.275 UTC [msp.identity] Sign -> DEBU 17ad Sign: digest: CC6AD12B7A215B899C1845FD388D2A71DF2059FE693C450EC89BAE5083B4D965 " -"2019-07-20 02:40:45.278 UTC [fsblkstorage] indexBlock -> DEBU 17ae Indexing block [blockNum=6, blockHash=[]byte{0xf5, 0xb0, 0x11, 0x46, 0x4, 0x5a, 0x37, 0x6e, 0xe5, 0x9b, 0x7a, 0xb0, 0xf2, 0xf9, 0xaf, 0x42, 0x15, 0x9e, 0x7f, 0x29, 0x6f, 0xe6, 0x3, 0xf4, 0x56, 0x9b, 0xb6, 0x31, 0xa7, 0x9, 0xf1, 0x78} txOffsets= -txId=e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38 locPointer=offset=71, bytesLength=33874 +"2019-09-24 00:25:04.491 UTC [orderer.common.cluster.step] handleMessage -> DEBU a3c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:04.491 UTC [msp] Validate -> DEBU a3d MSP OrdererMSP validating identity" +"2019-09-24 00:25:04.492 UTC [common.channelconfig] NewStandardValues -> DEBU a3e Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:25:04.492 UTC [common.channelconfig] initializeProtosStruct -> DEBU a3f Processing field: ACLs" +"2019-09-24 00:25:04.492 UTC [common.channelconfig] initializeProtosStruct -> DEBU a40 Processing field: Capabilities" +"2019-09-24 00:25:04.492 UTC [common.channelconfig] NewStandardValues -> DEBU a41 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:04.493 UTC [common.channelconfig] initializeProtosStruct -> DEBU a42 Processing field: AnchorPeers" +"2019-09-24 00:25:04.493 UTC [common.channelconfig] NewStandardValues -> DEBU a44 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.493 UTC [common.channelconfig] initializeProtosStruct -> DEBU a45 Processing field: MSP" +"2019-09-24 00:25:04.493 UTC [common.channelconfig] Validate -> DEBU a46 Anchor peers for org Org2MSP are " +"2019-09-24 00:25:04.493 UTC [common.channelconfig] validateMSP -> DEBU a47 Setting up MSP for org Org2MSP" +"2019-09-24 00:25:04.493 UTC [msp] newBccspMsp -> DEBU a48 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.493 UTC [msp] New -> DEBU a49 Creating Cache-MSP instance" +"2019-09-24 00:25:04.493 UTC [msp] Setup -> DEBU a4a Setting up MSP instance Org2MSP" +"2019-09-24 00:25:04.494 UTC [msp.identity] newIdentity -> DEBU a4b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-09-24 00:25:04.495 UTC [msp.identity] newIdentity -> DEBU a4c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:04.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU a43 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:04.496 UTC [orderer.common.cluster.step] handleMessage -> DEBU a4d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:04.506 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a4e Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:25:04.506 UTC [msp] Validate -> DEBU a4f MSP Org2MSP validating identity" +"2019-09-24 00:25:04.507 UTC [msp] getCertificationChain -> DEBU a50 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.515 UTC [msp] hasOURole -> DEBU a51 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:25:04.515 UTC [msp] getCertificationChain -> DEBU a52 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.516 UTC [common.channelconfig] NewStandardValues -> DEBU a53 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:04.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU a54 Processing field: AnchorPeers" +"2019-09-24 00:25:04.516 UTC [common.channelconfig] NewStandardValues -> DEBU a55 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU a56 Processing field: MSP" +"2019-09-24 00:25:04.543 UTC [common.channelconfig] Validate -> DEBU a57 Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:25:04.545 UTC [common.channelconfig] validateMSP -> DEBU a58 Setting up MSP for org Org1MSP" +"2019-09-24 00:25:04.546 UTC [msp] newBccspMsp -> DEBU a59 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.554 UTC [msp] New -> DEBU a5a Creating Cache-MSP instance" +"2019-09-24 00:25:04.554 UTC [msp] Setup -> DEBU a5b Setting up MSP instance Org1MSP" +"2019-09-24 00:25:04.555 UTC [msp.identity] newIdentity -> DEBU a5c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-09-24 00:25:04.564 UTC [msp.identity] newIdentity -> DEBU a5d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:04.565 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a5e Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:25:04.565 UTC [msp] Validate -> DEBU a5f MSP Org1MSP validating identity" +"2019-09-24 00:25:04.565 UTC [msp] getCertificationChain -> DEBU a60 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:04.565 UTC [msp] hasOURole -> DEBU a61 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:25:04.565 UTC [msp] getCertificationChain -> DEBU a62 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:04.569 UTC [msp] Setup -> DEBU a63 Setting up the MSP manager (3 msps)" +"2019-09-24 00:25:04.570 UTC [msp] Setup -> DEBU a64 MSP manager setup complete, setup 3 msps" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a65 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a66 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a67 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a68 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a69 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6a Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6b Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6c Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6d Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6e Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a6f Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.570 UTC [policies] NewManagerImpl -> DEBU a70 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a71 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a72 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a73 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a74 Proposed new policy Readers for Channel/Application" +"2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a75 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a76 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a77 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a78 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a79 Proposed new policy Readers for Channel" +"2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a7a Proposed new policy Writers for Channel" +"2019-09-24 00:25:04.571 UTC [policies] NewManagerImpl -> DEBU a7b Proposed new policy Admins for Channel" +"2019-09-24 00:25:04.571 UTC [common.configtx] addToMap -> DEBU a7c Adding to config map: [Group] /Channel" +"2019-09-24 00:25:04.571 UTC [common.configtx] addToMap -> DEBU a7d Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a7e Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a7f Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a80 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a81 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a82 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a83 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a84 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a85 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a86 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a87 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a88 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a89 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8a Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8b Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8c Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8d Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:04.572 UTC [common.configtx] addToMap -> DEBU a8f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a90 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a91 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a92 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a93 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a94 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a95 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a96 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:04.573 UTC [common.configtx] addToMap -> DEBU a97 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a98 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a99 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a9a Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a9b Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a9c Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a9d Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:25:04.574 UTC [common.configtx] addToMap -> DEBU a9e Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:25:04.582 UTC [common.configtx] addToMap -> DEBU a9f Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:25:04.582 UTC [common.configtx] addToMap -> DEBU aa0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:25:04.582 UTC [common.configtx] addToMap -> DEBU aa1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:25:04.582 UTC [common.configtx] addToMap -> DEBU aa2 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:25:04.582 UTC [common.configtx] addToMap -> DEBU aa3 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:25:04.583 UTC [common.configtx] addToMap -> DEBU aa4 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:25:04.583 UTC [common.configtx] addToMap -> DEBU aa5 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:25:04.583 UTC [common.configtx] addToMap -> DEBU aa6 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:25:04.583 UTC [common.configtx] addToMap -> DEBU aa7 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:25:04.583 UTC [common.configtx] addToMap -> DEBU aa8 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:25:04.583 UTC [common.channelconfig] LogSanityChecks -> DEBU aa9 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:25:04.583 UTC [common.channelconfig] LogSanityChecks -> DEBU aaa As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:25:04.583 UTC [policies] Manager -> DEBU aab Manager Channel looking up path [Application]" +"2019-09-24 00:25:04.583 UTC [policies] Manager -> DEBU aac Manager Channel has managers Orderer" +"2019-09-24 00:25:04.583 UTC [policies] Manager -> DEBU aad Manager Channel has managers Application" +"2019-09-24 00:25:04.583 UTC [policies] Manager -> DEBU aae Manager Channel/Application looking up path []" +"2019-09-24 00:25:04.583 UTC [policies] Manager -> DEBU aaf Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab0 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:04.585 UTC [common.channelconfig] LogSanityChecks -> DEBU ab1 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 00:25:04.585 UTC [common.channelconfig] LogSanityChecks -> DEBU ab2 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 00:25:04.585 UTC [common.channelconfig] LogSanityChecks -> DEBU ab3 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab4 Manager Channel looking up path [Orderer]" +"2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab5 Manager Channel has managers Orderer" +"2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab6 Manager Channel has managers Application" +"2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab7 Manager Channel/Orderer looking up path []" +"2019-09-24 00:25:04.585 UTC [policies] Manager -> DEBU ab8 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:25:04.586 UTC [common.channelconfig] LogSanityChecks -> DEBU ab9 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:25:04.595 UTC [common.channelconfig] LogSanityChecks -> DEBU aba As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:25:04.595 UTC [common.channelconfig] LogSanityChecks -> DEBU abb As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:25:04.595 UTC [common.channelconfig] LogSanityChecks -> DEBU abc As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:25:04.595 UTC [common.capabilities] Supported -> DEBU abd Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:04.595 UTC [common.capabilities] Supported -> DEBU abe Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:04.596 UTC [orderer.common.server] func1 -> DEBU abf Executing callback to update root CAs" +"2019-09-24 00:25:04.596 UTC [orderer.common.server] updateTrustedRoots -> DEBU ac0 updating root CAs for channel [businesschannel]" +"2019-09-24 00:25:04.596 UTC [orderer.common.server] updateTrustedRoots -> DEBU ac1 adding app root CAs for MSP [Org2MSP]" +"2019-09-24 00:25:04.596 UTC [orderer.common.server] updateTrustedRoots -> DEBU ac2 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 00:25:04.596 UTC [orderer.common.server] updateTrustedRoots -> DEBU ac3 adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 00:25:04.597 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU ac4 [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +"2019-09-24 00:25:04.597 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU ac5 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +"2019-09-24 00:25:04.597 UTC [msp] GetDefaultSigningIdentity -> DEBU ac6 Obtaining default signing identity" +"2019-09-24 00:25:04.597 UTC [msp] GetDefaultSigningIdentity -> DEBU ac7 Obtaining default signing identity" +"2019-09-24 00:25:04.597 UTC [msp.identity] Sign -> DEBU ac8 Sign: plaintext: 0A020801120B0A090A03010203100418...8321A8CF55AF7F206518C8BBAB146604 " +"2019-09-24 00:25:04.597 UTC [msp.identity] Sign -> DEBU ac9 Sign: digest: 3518D65C54AF7DD4E9CFFCF9D10B5D12D2458CDDEB0BE0BE3CCEE25FAFED86C6 " +"2019-09-24 00:25:04.616 UTC [fsblkstorage] indexBlock -> DEBU aca Indexing block [blockNum=1, blockHash=[]byte{0x81, 0xd3, 0xeb, 0x83, 0x70, 0x19, 0x81, 0xbf, 0xc0, 0xb4, 0xb0, 0x9b, 0xd3, 0x64, 0x4d, 0xef, 0x6d, 0x21, 0x73, 0x6d, 0x1, 0x28, 0x4d, 0xdc, 0x73, 0xd7, 0xb4, 0x87, 0x96, 0xcf, 0x2e, 0xd6} txOffsets= +txId=91696339b033049ed8d7697c23abc85593d36f57812608fa7cde041ba7fdc82b locPointer=offset=71, bytesLength=22685 ]" -"2019-07-20 02:40:45.280 UTC [fsblkstorage] updateCheckpoint -> DEBU 17af Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[118787], isChainEmpty=[false], lastBlockNumber=[6]" -"2019-07-20 02:40:45.280 UTC [fsblkstorage] waitForBlock -> DEBU 17b0 Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:45.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b1 Remaining bytes=[34883], Going to peek [8] bytes" -"2019-07-20 02:40:45.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b2 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -"2019-07-20 02:40:45.282 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b3 blockbytes [34880] read from file [0]" -"2019-07-20 02:40:45.284 UTC [policies] Evaluate -> DEBU 17b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:45.285 UTC [policies] Evaluate -> DEBU 17b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:45.287 UTC [msp] DeserializeIdentity -> DEBU 17b9 Obtaining identity" -"2019-07-20 02:40:45.288 UTC [msp.identity] newIdentity -> DEBU 17ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.622 UTC [fsblkstorage] updateCheckpoint -> DEBU acb Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47641], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-09-24 00:25:04.632 UTC [orderer.commmon.multichannel] commitBlock -> DEBU acc [channel: businesschannel] Wrote block [1]" +"2019-09-24 00:25:04.633 UTC [fsblkstorage] waitForBlock -> DEBU acd Came out of wait. maxAvailaBlockNumber=[1]" +"2019-09-24 00:25:04.633 UTC [fsblkstorage] Next -> DEBU ace Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 00:25:04.633 UTC [fsblkstorage] newBlockfileStream -> DEBU acf newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23948]" +"2019-09-24 00:25:04.633 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ad0 Remaining bytes=[23693], Going to peek [8] bytes" +"2019-09-24 00:25:04.633 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ad1 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23948], bytesOffset=[23951]}" +"2019-09-24 00:25:04.640 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ad2 blockbytes [23690] read from file [0]" +"2019-09-24 00:25:04.646 UTC [policies] Evaluate -> DEBU ad3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:25:04.646 UTC [policies] Evaluate -> DEBU ad4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.653 UTC [policies] Evaluate -> DEBU ad5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:04.653 UTC [policies] Evaluate -> DEBU ad6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.653 UTC [policies] Evaluate -> DEBU ad7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:04.653 UTC [msp] DeserializeIdentity -> DEBU ad8 Obtaining identity" +"2019-09-24 00:25:04.653 UTC [msp.identity] newIdentity -> DEBU ad9 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -8291,113 +4187,257 @@ BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -----END CERTIFICATE-----" -"2019-07-20 02:40:45.290 UTC [cauthdsl] func1 -> DEBU 17bb 0xc000a9b000 gate 1563590445290446800 evaluation starts" -"2019-07-20 02:40:45.291 UTC [cauthdsl] func2 -> DEBU 17bc 0xc000a9b000 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.292 UTC [cauthdsl] func2 -> DEBU 17bd 0xc000a9b000 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:45.292 UTC [cauthdsl] func2 -> DEBU 17be 0xc000a9b000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:45.293 UTC [cauthdsl] func2 -> DEBU 17bf 0xc000a9b000 principal evaluation fails" -"2019-07-20 02:40:45.293 UTC [cauthdsl] func1 -> DEBU 17c0 0xc000a9b000 gate 1563590445290446800 evaluation fails" -"2019-07-20 02:40:45.293 UTC [policies] Evaluate -> DEBU 17c1 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.294 UTC [policies] Evaluate -> DEBU 17c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.295 UTC [policies] Evaluate -> DEBU 17c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.295 UTC [cauthdsl] func1 -> DEBU 17c4 0xc00004e4e0 gate 1563590445295605800 evaluation starts" -"2019-07-20 02:40:45.295 UTC [cauthdsl] func2 -> DEBU 17c5 0xc00004e4e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.297 UTC [cauthdsl] func2 -> DEBU 17c6 0xc00004e4e0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:45.298 UTC [cauthdsl] func2 -> DEBU 17c7 0xc00004e4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.298 UTC [cauthdsl] func2 -> DEBU 17c8 0xc00004e4e0 principal evaluation fails" -"2019-07-20 02:40:45.302 UTC [cauthdsl] func1 -> DEBU 17c9 0xc00004e4e0 gate 1563590445295605800 evaluation fails" -"2019-07-20 02:40:45.302 UTC [policies] Evaluate -> DEBU 17ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.302 UTC [policies] Evaluate -> DEBU 17cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.303 UTC [policies] Evaluate -> DEBU 17cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.303 UTC [cauthdsl] func1 -> DEBU 17cd 0xc00004f270 gate 1563590445303305800 evaluation starts" -"2019-07-20 02:40:45.303 UTC [cauthdsl] func2 -> DEBU 17ce 0xc00004f270 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.304 UTC [cauthdsl] func2 -> DEBU 17cf 0xc00004f270 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:45.304 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17d0 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-07-20 02:40:45.304 UTC [msp] Validate -> DEBU 17d1 MSP Org2MSP validating identity" -"2019-07-20 02:40:45.307 UTC [msp] getCertificationChain -> DEBU 17d2 MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.309 UTC [cauthdsl] func2 -> DEBU 17d3 0xc00004f270 principal matched by identity 0" -"2019-07-20 02:40:45.309 UTC [msp.identity] Verify -> DEBU 17d4 Verify: digest = 00000000 3d ed 09 6a 90 8b ae 36 c4 46 b1 80 9b 79 50 eb |=..j...6.F...yP.| -00000010 e1 9a a4 fa c9 37 7f 0d 0d 0b 13 11 fd b6 13 06 |.....7..........|" -"2019-07-20 02:40:45.310 UTC [msp.identity] Verify -> DEBU 17d5 Verify: sig = 00000000 30 45 02 21 00 e9 9b b3 fc 5d ce e7 4b 96 63 aa |0E.!.....]..K.c.| -00000010 14 41 1c 1f 69 50 d4 3a 17 7d 9d 0b cf 58 3f 47 |.A..iP.:.}...X?G| -00000020 26 70 94 2d 91 02 20 5d 41 9d 07 80 46 e0 d0 bc |&p.-.. ]A...F...| -00000030 ca 9d b6 fb 58 27 c3 34 1e dc 66 dd 7a ce 6c 67 |....X'.4..f.z.lg| -00000040 f0 df 1f af fc f3 dc |.......|" -"2019-07-20 02:40:45.310 UTC [cauthdsl] func2 -> DEBU 17d6 0xc00004f270 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.311 UTC [cauthdsl] func1 -> DEBU 17d7 0xc00004f270 gate 1563590445303305800 evaluation succeeds" -"2019-07-20 02:40:45.311 UTC [policies] Evaluate -> DEBU 17d8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.311 UTC [policies] Evaluate -> DEBU 17d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17da Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17dc Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:45.313 UTC [policies] Evaluate -> DEBU 17dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:45.313 UTC [common.deliver] deliverBlocks -> DEBU 17de [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" -"2019-07-20 02:40:45.314 UTC [fsblkstorage] waitForBlock -> DEBU 17df Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:45.280 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 17e0 [channel: businesschannel] Wrote block [6]" -"2019-07-20 02:40:45.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:45.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e2 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" -"2019-07-20 02:40:45.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.8µs " -"2019-07-20 02:40:45.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e4 Sending msg of 28 bytes to 2 on channel businesschannel took 35.9µs" -"2019-07-20 02:40:45.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e5 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" -"2019-07-20 02:40:45.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.2µs " -"2019-07-20 02:40:45.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 553.7µs " -"2019-07-20 02:40:45.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:45.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e9 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:45.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17ea Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:45.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17eb Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" -"2019-07-20 02:40:45.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.2µs " -"2019-07-20 02:40:46.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ed Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" -"2019-07-20 02:40:46.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ee Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" -"2019-07-20 02:40:46.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139µs " -"2019-07-20 02:40:46.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.6µs " -"2019-07-20 02:40:46.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:46.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:46.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:46.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f4 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" -"2019-07-20 02:40:46.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.4µs " -"2019-07-20 02:40:46.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" -"2019-07-20 02:40:46.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" -"2019-07-20 02:40:46.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.6µs " -"2019-07-20 02:40:46.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 467µs " -"2019-07-20 02:40:46.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:46.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:46.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:46.940 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17fd Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" -"2019-07-20 02:40:46.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17fe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 545µs " -"2019-07-20 02:40:47.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ff Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" -"2019-07-20 02:40:47.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1800 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" -"2019-07-20 02:40:47.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1801 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.4µs " -"2019-07-20 02:40:47.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1802 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 858.2µs " -"2019-07-20 02:40:47.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1803 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:47.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1804 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:47.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1805 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:47.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1806 Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" -"2019-07-20 02:40:47.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1807 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169µs " -"2019-07-20 02:40:47.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1808 Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" -"2019-07-20 02:40:47.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180a Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" -"2019-07-20 02:40:47.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 180b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.8µs " -"2019-07-20 02:40:47.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1809 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 175.4µs " -"2019-07-20 02:40:47.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:47.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:47.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:47.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180f Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" -"2019-07-20 02:40:47.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1810 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 856.1µs " -"2019-07-20 02:40:48.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1811 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" -"2019-07-20 02:40:48.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1813 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" -"2019-07-20 02:40:48.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1814 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.3µs " -"2019-07-20 02:40:48.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1812 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.1µs " -"2019-07-20 02:40:48.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1815 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:48.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1816 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:48.248 UTC [orderer.common.server] Deliver -> DEBU 1817 Starting new Deliver handler" -"2019-07-20 02:40:48.248 UTC [common.deliver] Handle -> DEBU 1818 Starting new deliver loop for 172.18.0.9:39274" -"2019-07-20 02:40:48.248 UTC [common.deliver] Handle -> DEBU 1819 Attempting to read seek info message from 172.18.0.9:39274" -"2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.250 UTC [policies] Evaluate -> DEBU 181d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.250 UTC [policies] Evaluate -> DEBU 181e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.250 UTC [msp] DeserializeIdentity -> DEBU 181f Obtaining identity" -"2019-07-20 02:40:48.251 UTC [msp.identity] newIdentity -> DEBU 1820 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.654 UTC [cauthdsl] func1 -> DEBU ada 0xc000d86dd0 gate 1569284704654083200 evaluation starts" +"2019-09-24 00:25:04.654 UTC [cauthdsl] func2 -> DEBU adb 0xc000d86dd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.654 UTC [cauthdsl] func2 -> DEBU adc 0xc000d86dd0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:04.654 UTC [cauthdsl] func2 -> DEBU add 0xc000d86dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:04.654 UTC [cauthdsl] func2 -> DEBU ade 0xc000d86dd0 principal evaluation fails" +"2019-09-24 00:25:04.665 UTC [cauthdsl] func1 -> DEBU adf 0xc000d86dd0 gate 1569284704654083200 evaluation fails" +"2019-09-24 00:25:04.666 UTC [policies] Evaluate -> DEBU ae0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.666 UTC [policies] Evaluate -> DEBU ae1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.666 UTC [policies] Evaluate -> DEBU ae2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:04.666 UTC [cauthdsl] func1 -> DEBU ae3 0xc000d87f50 gate 1569284704666886400 evaluation starts" +"2019-09-24 00:25:04.666 UTC [cauthdsl] func2 -> DEBU ae4 0xc000d87f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.667 UTC [cauthdsl] func2 -> DEBU ae5 0xc000d87f50 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:04.672 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ae6 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:25:04.678 UTC [msp] Validate -> DEBU ae7 MSP Org2MSP validating identity" +"2019-09-24 00:25:04.678 UTC [msp] getCertificationChain -> DEBU ae8 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.679 UTC [cauthdsl] func2 -> DEBU ae9 0xc000d87f50 principal matched by identity 0" +"2019-09-24 00:25:04.679 UTC [msp.identity] Verify -> DEBU aea Verify: digest = 00000000 8b 03 97 43 70 c0 92 23 17 5e 03 ee 64 e6 97 15 |...Cp..#.^..d...| +00000010 02 e5 c8 62 47 03 7b 9c 1d 32 87 82 fc 68 3e 5b |...bG.{..2...h>[|" +"2019-09-24 00:25:04.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU aeb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:04.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aec Sending msg of 28 bytes to 3 on channel testchainid took 29.6µs" +"2019-09-24 00:25:04.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU aed Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.6µs " +"2019-09-24 00:25:04.679 UTC [msp.identity] Verify -> DEBU aee Verify: sig = 00000000 30 44 02 20 31 f5 c5 93 d4 1d 90 90 18 dd 80 56 |0D. 1..........V| +00000010 9f 8f ca 24 d5 66 6c 6b 5f a8 6a fb ad 51 78 84 |...$.flk_.j..Qx.| +00000020 24 d7 ee fc 02 20 1a fe 63 11 78 f6 09 75 ed 1e |$.... ..c.x..u..| +00000030 ed 55 24 d6 52 91 c4 44 8c 94 19 3e f1 e1 0e 9c |.U$.R..D...>....| +00000040 9f c8 76 db 78 22 |..v.x"|" +"2019-09-24 00:25:04.690 UTC [cauthdsl] func2 -> DEBU aef 0xc000d87f50 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.690 UTC [cauthdsl] func1 -> DEBU af0 0xc000d87f50 gate 1569284704666886400 evaluation succeeds" +"2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af5 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:25:04.690 UTC [policies] Evaluate -> DEBU af6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:25:04.690 UTC [common.deliver] deliverBlocks -> DEBU af7 [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +"2019-09-24 00:25:04.693 UTC [fsblkstorage] waitForBlock -> DEBU af8 Going to wait for newer blocks. maxAvailaBlockNumber=[1], waitForBlockNum=[2]" +"2019-09-24 00:25:04.756 UTC [orderer.common.server] replicateDisabledChains -> DEBU af9 No inactive chains to try to replicate" +"2019-09-24 00:25:04.991 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU afa Sending msg of 28 bytes to 2 on channel businesschannel took 117.5µs" +"2019-09-24 00:25:04.991 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU afb Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2019-09-24 00:25:04.991 UTC [orderer.common.cluster.step] sendMessage -> DEBU afc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 229.7µs " +"2019-09-24 00:25:04.992 UTC [orderer.common.cluster.step] sendMessage -> DEBU afd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 190.1µs " +"2019-09-24 00:25:05.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU afe Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:05.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU aff Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:05.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU b00 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:05.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b01 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2019-09-24 00:25:05.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU b02 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134µs " +"2019-09-24 00:25:05.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b03 Sending msg of 28 bytes to 2 on channel businesschannel took 80.4µs" +"2019-09-24 00:25:05.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b04 Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +"2019-09-24 00:25:05.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU b05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.5µs " +"2019-09-24 00:25:05.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU b06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 176.8µs " +"2019-09-24 00:25:05.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU b07 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:05.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU b08 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:05.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU b09 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:05.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b0a Sending msg of 28 bytes to 3 on channel testchainid took 41.6µs" +"2019-09-24 00:25:05.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU b0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.8µs " +"2019-09-24 00:25:05.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b0c Sending msg of 28 bytes to 2 on channel businesschannel took 128.5µs" +"2019-09-24 00:25:05.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b0d Sending msg of 28 bytes to 3 on channel businesschannel took 52.6µs" +"2019-09-24 00:25:05.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU b0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.8µs " +"2019-09-24 00:25:05.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU b0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 625.6µs " +"2019-09-24 00:25:05.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU b10 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:05.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU b11 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:06.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU b12 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:06.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b13 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +"2019-09-24 00:25:06.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU b14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.9µs " +"2019-09-24 00:25:06.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b15 Sending msg of 28 bytes to 2 on channel businesschannel took 67.5µs" +"2019-09-24 00:25:06.489 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b16 Sending msg of 28 bytes to 3 on channel businesschannel took 35.4µs" +"2019-09-24 00:25:06.490 UTC [orderer.common.cluster.step] sendMessage -> DEBU b17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 286.9µs " +"2019-09-24 00:25:06.494 UTC [orderer.common.cluster.step] sendMessage -> DEBU b18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 317.8µs " +"2019-09-24 00:25:06.496 UTC [orderer.common.cluster.step] handleMessage -> DEBU b19 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:06.496 UTC [orderer.common.cluster.step] handleMessage -> DEBU b1a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:06.673 UTC [orderer.common.cluster.step] handleMessage -> DEBU b1b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:06.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b1c Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +"2019-09-24 00:25:06.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU b1d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.1µs " +"2019-09-24 00:25:06.827 UTC [orderer.common.server] Deliver -> DEBU b1e Starting new Deliver handler" +"2019-09-24 00:25:06.827 UTC [common.deliver] Handle -> DEBU b1f Starting new deliver loop for 172.18.0.9:60704" +"2019-09-24 00:25:06.827 UTC [common.deliver] Handle -> DEBU b20 Attempting to read seek info message from 172.18.0.9:60704" +"2019-09-24 00:25:06.865 UTC [orderer.common.server] Broadcast -> DEBU b21 Starting new Broadcast handler" +"2019-09-24 00:25:06.865 UTC [orderer.common.broadcast] Handle -> DEBU b22 Starting new broadcast loop for 172.18.0.9:60706" +"2019-09-24 00:25:06.865 UTC [orderer.common.broadcast] ProcessMessage -> DEBU b23 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:60706" +"2019-09-24 00:25:06.865 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU b24 Processing config update message for channel businesschannel" +"2019-09-24 00:25:06.868 UTC [policies] Evaluate -> DEBU b25 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 00:25:06.868 UTC [policies] Evaluate -> DEBU b26 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:06.868 UTC [policies] Evaluate -> DEBU b27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 00:25:06.868 UTC [policies] Evaluate -> DEBU b28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:06.868 UTC [policies] Evaluate -> DEBU b29 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:25:06.868 UTC [msp] DeserializeIdentity -> DEBU b2a Obtaining identity" +"2019-09-24 00:25:06.869 UTC [msp.identity] newIdentity -> DEBU b2b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.871 UTC [cauthdsl] func1 -> DEBU b2c 0xc000feb3e0 gate 1569284706871312500 evaluation starts" +"2019-09-24 00:25:06.871 UTC [cauthdsl] func2 -> DEBU b2d 0xc000feb3e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:06.872 UTC [cauthdsl] func2 -> DEBU b2e 0xc000feb3e0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:06.872 UTC [cauthdsl] func2 -> DEBU b2f 0xc000feb3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2019-09-24 00:25:06.873 UTC [cauthdsl] func2 -> DEBU b30 0xc000feb3e0 principal evaluation fails" +"2019-09-24 00:25:06.875 UTC [cauthdsl] func1 -> DEBU b31 0xc000feb3e0 gate 1569284706871312500 evaluation fails" +"2019-09-24 00:25:06.875 UTC [policies] Evaluate -> DEBU b32 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b33 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:06.876 UTC [policies] func1 -> DEBU b34 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b35 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b36 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b37 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b38 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:06.876 UTC [policies] Evaluate -> DEBU b39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:25:06.876 UTC [cauthdsl] func1 -> DEBU b3a 0xc00104aa10 gate 1569284706876823700 evaluation starts" +"2019-09-24 00:25:06.877 UTC [cauthdsl] func2 -> DEBU b3b 0xc00104aa10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:06.877 UTC [cauthdsl] func2 -> DEBU b3c 0xc00104aa10 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:06.877 UTC [cauthdsl] func2 -> DEBU b3d 0xc00104aa10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:06.877 UTC [cauthdsl] func2 -> DEBU b3e 0xc00104aa10 principal evaluation fails" +"2019-09-24 00:25:06.878 UTC [cauthdsl] func1 -> DEBU b3f 0xc00104aa10 gate 1569284706876823700 evaluation fails" +"2019-09-24 00:25:06.878 UTC [policies] Evaluate -> DEBU b40 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:06.878 UTC [policies] Evaluate -> DEBU b41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:06.878 UTC [policies] Evaluate -> DEBU b42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 00:25:06.878 UTC [cauthdsl] func1 -> DEBU b43 0xc00104b270 gate 1569284706878378700 evaluation starts" +"2019-09-24 00:25:06.878 UTC [cauthdsl] func2 -> DEBU b44 0xc00104b270 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:06.878 UTC [cauthdsl] func2 -> DEBU b45 0xc00104b270 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:06.878 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b46 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:25:06.878 UTC [msp] Validate -> DEBU b47 MSP Org2MSP validating identity" +"2019-09-24 00:25:06.879 UTC [msp] getCertificationChain -> DEBU b48 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:06.879 UTC [cauthdsl] func2 -> DEBU b49 0xc00104b270 principal matched by identity 0" +"2019-09-24 00:25:06.879 UTC [msp.identity] Verify -> DEBU b4a Verify: digest = 00000000 ff 3d 48 06 64 1c e0 65 07 17 d4 9c 02 d0 26 f4 |.=H.d..e......&.| +00000010 fc 66 b7 df 4f e9 4b 22 5d a3 79 a0 9d 27 da 67 |.f..O.K"].y..'.g|" +"2019-09-24 00:25:06.879 UTC [msp.identity] Verify -> DEBU b4b Verify: sig = 00000000 30 44 02 20 7b 9c 6a bf 78 f7 8f 95 4d 01 cf b2 |0D. {.j.x...M...| +00000010 dc 81 30 2a 1b 7c 3b 8d b2 c0 fe d1 13 f5 15 48 |..0*.|;........H| +00000020 9a cb 44 11 02 20 18 91 ea 25 90 f8 b0 0c d0 8f |..D.. ...%......| +00000030 31 7f a7 91 1f b7 6f 5d c6 2e 28 10 04 ef f9 3e |1.....o]..(....>| +00000040 07 b7 29 97 a7 10 |..)...|" +"2019-09-24 00:25:06.879 UTC [cauthdsl] func2 -> DEBU b4c 0xc00104b270 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:06.879 UTC [cauthdsl] func1 -> DEBU b4d 0xc00104b270 gate 1569284706878378700 evaluation succeeds" +"2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b4e Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b50 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b52 Signature set satisfies policy /Channel/Writers" +"2019-09-24 00:25:06.880 UTC [policies] Evaluate -> DEBU b53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 00:25:06.880 UTC [common.configtx] addToMap -> DEBU b54 Adding to config map: [Group] /Channel" +"2019-09-24 00:25:06.880 UTC [common.configtx] addToMap -> DEBU b55 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b56 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b57 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b58 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b59 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5c Adding to config map: [Group] /Channel" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5d Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5e Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b5f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b60 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b61 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:06.881 UTC [common.configtx] addToMap -> DEBU b62 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:06.882 UTC [common.configtx] addToMap -> DEBU b63 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:06.882 UTC [common.configtx] addToMap -> DEBU b64 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:06.882 UTC [common.configtx] verifyDeltaSet -> DEBU b65 Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:06.882 UTC [common.configtx] policyForItem -> DEBU b66 Getting policy for item Org2MSP with mod_policy Admins" +"2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b67 Manager Channel looking up path [Application]" +"2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b68 Manager Channel has managers Orderer" +"2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b69 Manager Channel has managers Application" +"2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6a Manager Channel/Application looking up path []" +"2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6b Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6c Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6d Manager Channel/Application looking up path [Org2MSP]" +"2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6e Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b6f Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:06.882 UTC [policies] Manager -> DEBU b70 Manager Channel/Application/Org2MSP looking up path []" +"2019-09-24 00:25:06.882 UTC [policies] Evaluate -> DEBU b71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 00:25:06.883 UTC [cauthdsl] func1 -> DEBU b72 0xc00106c1f0 gate 1569284706883031100 evaluation starts" +"2019-09-24 00:25:06.883 UTC [cauthdsl] func2 -> DEBU b73 0xc00106c1f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:06.883 UTC [cauthdsl] func2 -> DEBU b74 0xc00106c1f0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:06.883 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b75 Checking if identity satisfies ADMIN role for Org2MSP" +"2019-09-24 00:25:06.883 UTC [cauthdsl] func2 -> DEBU b76 0xc00106c1f0 principal matched by identity 0" +"2019-09-24 00:25:06.883 UTC [msp.identity] Verify -> DEBU b77 Verify: digest = 00000000 c7 15 61 1b b2 95 fa 58 ba 85 fe c1 31 30 21 87 |..a....X....10!.| +00000010 ff ba 08 45 5d c6 ac f3 4c 25 22 ca 2f 17 ea 97 |...E]...L%"./...|" +"2019-09-24 00:25:06.883 UTC [msp.identity] Verify -> DEBU b78 Verify: sig = 00000000 30 45 02 21 00 98 5f 39 f5 66 76 09 9e c8 cd e3 |0E.!.._9.fv.....| +00000010 70 ff 4b d1 18 cd cd f5 28 b0 92 91 ed c0 20 3f |p.K.....(..... ?| +00000020 ec 6a 58 2b 2f 02 20 59 44 df b5 8f e0 ce 61 c8 |.jX+/. YD.....a.| +00000030 7c 9e c4 4d c5 31 fd 54 af 57 c3 f6 39 01 9a 59 ||..M.1.T.W..9..Y| +00000040 99 0e a7 45 58 9e 56 |...EX.V|" +"2019-09-24 00:25:06.883 UTC [cauthdsl] func2 -> DEBU b79 0xc00106c1f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:06.883 UTC [cauthdsl] func1 -> DEBU b7a 0xc00106c1f0 gate 1569284706883031100 evaluation succeeds" +"2019-09-24 00:25:06.883 UTC [policies] Evaluate -> DEBU b7b Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:06.883 UTC [policies] Evaluate -> DEBU b7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:06.883 UTC [common.configtx] verifyDeltaSet -> DEBU b7d Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b7e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b7f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b80 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b81 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b82 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.884 UTC [common.configtx] recurseConfigMap -> DEBU b83 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b84 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b85 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b86 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b87 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b88 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.885 UTC [common.configtx] recurseConfigMap -> DEBU b89 Setting policy for key Readers to " +"2019-09-24 00:25:06.886 UTC [common.configtx] recurseConfigMap -> DEBU b8a Setting policy for key Writers to " +"2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b8b Setting policy for key Admins to " +"2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b8c Setting policy for key Endorsement to " +"2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b8d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b8e Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b8f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b90 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b91 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b92 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b93 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.887 UTC [common.configtx] recurseConfigMap -> DEBU b94 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:06.887 UTC [common.channelconfig] NewStandardValues -> DEBU b95 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:25:06.887 UTC [common.channelconfig] initializeProtosStruct -> DEBU b96 Processing field: HashingAlgorithm" +"2019-09-24 00:25:06.887 UTC [common.channelconfig] initializeProtosStruct -> DEBU b97 Processing field: BlockDataHashingStructure" +"2019-09-24 00:25:06.887 UTC [common.channelconfig] initializeProtosStruct -> DEBU b98 Processing field: OrdererAddresses" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b99 Processing field: Consortium" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b9a Processing field: Capabilities" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] NewStandardValues -> DEBU b9b Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b9c Processing field: ConsensusType" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b9d Processing field: BatchSize" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b9e Processing field: BatchTimeout" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU b9f Processing field: KafkaBrokers" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba0 Processing field: ChannelRestrictions" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba1 Processing field: Capabilities" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] NewStandardValues -> DEBU ba2 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba3 Processing field: Endpoints" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] NewStandardValues -> DEBU ba4 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] initializeProtosStruct -> DEBU ba5 Processing field: MSP" +"2019-09-24 00:25:06.888 UTC [common.channelconfig] validateMSP -> DEBU ba6 Setting up MSP for org OrdererOrg" +"2019-09-24 00:25:06.888 UTC [msp] newBccspMsp -> DEBU ba7 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:06.888 UTC [msp] New -> DEBU ba8 Creating Cache-MSP instance" +"2019-09-24 00:25:06.888 UTC [msp] Setup -> DEBU ba9 Setting up MSP instance OrdererMSP" +"2019-09-24 00:25:06.893 UTC [msp.identity] newIdentity -> DEBU baa Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.893 UTC [msp.identity] newIdentity -> DEBU bab Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -8410,1344 +4450,6896 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-07-20 02:40:48.251 UTC [cauthdsl] func1 -> DEBU 1821 0xc000416840 gate 1563590448251684300 evaluation starts" -"2019-07-20 02:40:48.251 UTC [cauthdsl] func2 -> DEBU 1822 0xc000416840 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.251 UTC [cauthdsl] func2 -> DEBU 1823 0xc000416840 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.252 UTC [cauthdsl] func2 -> DEBU 1824 0xc000416840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:48.252 UTC [cauthdsl] func2 -> DEBU 1825 0xc000416840 principal evaluation fails" -"2019-07-20 02:40:48.252 UTC [cauthdsl] func1 -> DEBU 1826 0xc000416840 gate 1563590448251684300 evaluation fails" -"2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1827 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1828 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1829 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.253 UTC [cauthdsl] func1 -> DEBU 182a 0xc000417b20 gate 1563590448253612300 evaluation starts" -"2019-07-20 02:40:48.253 UTC [cauthdsl] func2 -> DEBU 182b 0xc000417b20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182c 0xc000417b20 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182d 0xc000417b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182e 0xc000417b20 principal evaluation fails" -"2019-07-20 02:40:48.254 UTC [cauthdsl] func1 -> DEBU 182f 0xc000417b20 gate 1563590448253612300 evaluation fails" -"2019-07-20 02:40:48.254 UTC [policies] Evaluate -> DEBU 1830 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.254 UTC [policies] Evaluate -> DEBU 1831 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.255 UTC [policies] Evaluate -> DEBU 1832 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.255 UTC [cauthdsl] func1 -> DEBU 1833 0xc00029c6f0 gate 1563590448255311400 evaluation starts" -"2019-07-20 02:40:48.255 UTC [cauthdsl] func2 -> DEBU 1834 0xc00029c6f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.255 UTC [cauthdsl] func2 -> DEBU 1835 0xc00029c6f0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.256 UTC [cauthdsl] func2 -> DEBU 1836 0xc00029c6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:48.256 UTC [cauthdsl] func2 -> DEBU 1837 0xc00029c6f0 principal evaluation fails" -"2019-07-20 02:40:48.256 UTC [cauthdsl] func1 -> DEBU 1838 0xc00029c6f0 gate 1563590448255311400 evaluation fails" -"2019-07-20 02:40:48.256 UTC [policies] Evaluate -> DEBU 1839 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.256 UTC [policies] Evaluate -> DEBU 183a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.257 UTC [policies] func1 -> DEBU 183b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" -"2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183c Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.258 UTC [policies] Evaluate -> DEBU 1840 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:48.258 UTC [cauthdsl] func1 -> DEBU 1841 0xc0001a9070 gate 1563590448258389800 evaluation starts" -"2019-07-20 02:40:48.258 UTC [cauthdsl] func2 -> DEBU 1842 0xc0001a9070 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.258 UTC [cauthdsl] func2 -> DEBU 1843 0xc0001a9070 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.259 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1844 Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-07-20 02:40:48.259 UTC [msp] Validate -> DEBU 1845 MSP OrdererMSP validating identity" -"2019-07-20 02:40:48.261 UTC [cauthdsl] func2 -> DEBU 1846 0xc0001a9070 principal matched by identity 0" -"2019-07-20 02:40:48.261 UTC [msp.identity] Verify -> DEBU 1847 Verify: digest = 00000000 43 79 dd b3 45 49 f9 30 dc 8b 58 86 ec 01 dc 4f |Cy..EI.0..X....O| -00000010 44 eb a3 5f 9c b0 b3 42 ed f8 1f f5 39 9f b5 1f |D.._...B....9...|" -"2019-07-20 02:40:48.261 UTC [msp.identity] Verify -> DEBU 1848 Verify: sig = 00000000 30 44 02 20 21 f8 78 31 b1 e9 b0 b5 ac 3c 4d e0 |0D. !.x1.......av.W({*| -00000030 38 15 f3 3d 0f 71 29 b6 3f 37 8e b2 6c 2f 14 5e |8..=.q).?7..l/.^| -00000040 13 a1 5c a3 0c cb |..\...|" -"2019-07-20 02:40:48.261 UTC [cauthdsl] func2 -> DEBU 1849 0xc0001a9070 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.261 UTC [cauthdsl] func1 -> DEBU 184a 0xc0001a9070 gate 1563590448258389800 evaluation succeeds" -"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184d Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184f Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 1850 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:48.263 UTC [common.deliver] deliverBlocks -> DEBU 1851 [channel: businesschannel] Received seekInfo (0xc000c51b00) start: > stop: > from 172.18.0.9:39274" -"2019-07-20 02:40:48.263 UTC [fsblkstorage] Next -> DEBU 1852 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:48.263 UTC [fsblkstorage] newBlockfileStream -> DEBU 1853 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -"2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1854 Remaining bytes=[34883], Going to peek [8] bytes" -"2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1855 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -"2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1856 blockbytes [34880] read from file [0]" -"2019-07-20 02:40:48.264 UTC [common.deliver] deliverBlocks -> DEBU 1857 [channel: businesschannel] Delivering block for (0xc000c51b00) for 172.18.0.9:39274" -"2019-07-20 02:40:48.264 UTC [common.deliver] deliverBlocks -> DEBU 1858 [channel: businesschannel] Done delivering to 172.18.0.9:39274 for (0xc000c51b00)" -"2019-07-20 02:40:48.265 UTC [fsblkstorage] waitForBlock -> DEBU 1859 Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:48.265 UTC [fsblkstorage] waitForBlock -> DEBU 185a Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:48.265 UTC [common.deliver] Handle -> DEBU 185b Waiting for new SeekInfo from 172.18.0.9:39274" -"2019-07-20 02:40:48.265 UTC [common.deliver] Handle -> DEBU 185c Attempting to read seek info message from 172.18.0.9:39274" -"2019-07-20 02:40:48.268 UTC [common.deliver] Handle -> WARN 185d Error reading from 172.18.0.9:39274: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:48.268 UTC [orderer.common.server] func1 -> DEBU 185e Closing Deliver stream" -"2019-07-20 02:40:48.270 UTC [comm.grpc.server] 1 -> INFO 185f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39274 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.1953ms -"2019-07-20 02:40:48.271 UTC [grpc] infof -> DEBU 1860 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:48.393 UTC [orderer.common.server] Deliver -> DEBU 1861 Starting new Deliver handler" -"2019-07-20 02:40:48.394 UTC [common.deliver] Handle -> DEBU 1862 Starting new deliver loop for 172.18.0.9:39276" -"2019-07-20 02:40:48.394 UTC [common.deliver] Handle -> DEBU 1863 Attempting to read seek info message from 172.18.0.9:39276" -"2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1864 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1865 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1866 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.395 UTC [policies] Evaluate -> DEBU 1867 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.395 UTC [policies] Evaluate -> DEBU 1868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.395 UTC [cauthdsl] func1 -> DEBU 1869 0xc000c8c590 gate 1563590448395449600 evaluation starts" -"2019-07-20 02:40:48.395 UTC [cauthdsl] func2 -> DEBU 186a 0xc000c8c590 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186b 0xc000c8c590 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186c 0xc000c8c590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186d 0xc000c8c590 principal evaluation fails" -"2019-07-20 02:40:48.396 UTC [cauthdsl] func1 -> DEBU 186e 0xc000c8c590 gate 1563590448395449600 evaluation fails" -"2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 186f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 1870 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 1871 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.397 UTC [cauthdsl] func1 -> DEBU 1872 0xc000c8d110 gate 1563590448397574000 evaluation starts" -"2019-07-20 02:40:48.397 UTC [cauthdsl] func2 -> DEBU 1873 0xc000c8d110 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.397 UTC [cauthdsl] func2 -> DEBU 1874 0xc000c8d110 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.398 UTC [cauthdsl] func2 -> DEBU 1875 0xc000c8d110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:48.398 UTC [cauthdsl] func2 -> DEBU 1876 0xc000c8d110 principal evaluation fails" -"2019-07-20 02:40:48.398 UTC [cauthdsl] func1 -> DEBU 1877 0xc000c8d110 gate 1563590448397574000 evaluation fails" -"2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 1878 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 1879 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 187a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.399 UTC [cauthdsl] func1 -> DEBU 187b 0xc000c8dac0 gate 1563590448399099800 evaluation starts" -"2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187c 0xc000c8dac0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187d 0xc000c8dac0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187e 0xc000c8dac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:48.400 UTC [cauthdsl] func2 -> DEBU 187f 0xc000c8dac0 principal evaluation fails" -"2019-07-20 02:40:48.400 UTC [cauthdsl] func1 -> DEBU 1880 0xc000c8dac0 gate 1563590448399099800 evaluation fails" -"2019-07-20 02:40:48.400 UTC [policies] Evaluate -> DEBU 1881 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.400 UTC [policies] Evaluate -> DEBU 1882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.401 UTC [policies] func1 -> DEBU 1883 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" -"2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1884 Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1885 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1886 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1887 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.402 UTC [policies] Evaluate -> DEBU 1888 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:48.402 UTC [cauthdsl] func1 -> DEBU 1889 0xc000d6c930 gate 1563590448402309200 evaluation starts" -"2019-07-20 02:40:48.402 UTC [cauthdsl] func2 -> DEBU 188a 0xc000d6c930 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.402 UTC [cauthdsl] func2 -> DEBU 188b 0xc000d6c930 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.403 UTC [cauthdsl] func2 -> DEBU 188c 0xc000d6c930 principal matched by identity 0" -"2019-07-20 02:40:48.403 UTC [msp.identity] Verify -> DEBU 188d Verify: digest = 00000000 76 00 11 52 56 a5 63 2f 81 dc 4f 56 12 a4 66 47 |v..RV.c/..OV..fG| -00000010 ea 7d 1c 1e 7e 14 7d bb 26 da f2 a4 0f d2 72 3a |.}..~.}.&.....r:|" -"2019-07-20 02:40:48.403 UTC [msp.identity] Verify -> DEBU 188e Verify: sig = 00000000 30 45 02 21 00 a6 94 90 ea 98 b6 48 bf f6 1b fb |0E.!.......H....| -00000010 62 f8 a3 5a ab 34 49 e6 89 d9 46 71 aa 9f f6 65 |b..Z.4I...Fq...e| -00000020 0e d1 22 4f 6c 02 20 70 f3 4b df 89 d1 e9 f1 da |.."Ol. p.K......| -00000030 14 5e ee 89 f9 0b ec 0e 8b 97 d6 ff 34 f2 20 a1 |.^..........4. .| -00000040 af 1d 9c 89 33 ec 95 |....3..|" -"2019-07-20 02:40:48.403 UTC [cauthdsl] func2 -> DEBU 188f 0xc000d6c930 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.404 UTC [cauthdsl] func1 -> DEBU 1890 0xc000d6c930 gate 1563590448402309200 evaluation succeeds" -"2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1891 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1892 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1893 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1894 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1895 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:48.405 UTC [policies] Evaluate -> DEBU 1896 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:48.405 UTC [common.deliver] deliverBlocks -> DEBU 1897 [channel: businesschannel] Received seekInfo (0xc000088d40) start: > stop: > from 172.18.0.9:39276" -"2019-07-20 02:40:48.405 UTC [fsblkstorage] Next -> DEBU 1898 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:48.406 UTC [fsblkstorage] newBlockfileStream -> DEBU 1899 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -"2019-07-20 02:40:48.406 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189a Remaining bytes=[34883], Going to peek [8] bytes" -"2019-07-20 02:40:48.406 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189b Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -"2019-07-20 02:40:48.407 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189c blockbytes [34880] read from file [0]" -"2019-07-20 02:40:48.407 UTC [common.deliver] deliverBlocks -> DEBU 189d [channel: businesschannel] Delivering block for (0xc000088d40) for 172.18.0.9:39276" -"2019-07-20 02:40:48.408 UTC [common.deliver] deliverBlocks -> DEBU 189e [channel: businesschannel] Done delivering to 172.18.0.9:39276 for (0xc000088d40)" -"2019-07-20 02:40:48.409 UTC [common.deliver] Handle -> DEBU 189f Waiting for new SeekInfo from 172.18.0.9:39276" -"2019-07-20 02:40:48.409 UTC [common.deliver] Handle -> DEBU 18a1 Attempting to read seek info message from 172.18.0.9:39276" -"2019-07-20 02:40:48.409 UTC [fsblkstorage] waitForBlock -> DEBU 18a0 Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:48.409 UTC [fsblkstorage] waitForBlock -> DEBU 18a2 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:48.412 UTC [common.deliver] Handle -> WARN 18a3 Error reading from 172.18.0.9:39276: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:48.412 UTC [orderer.common.server] func1 -> DEBU 18a4 Closing Deliver stream" -"2019-07-20 02:40:48.412 UTC [comm.grpc.server] 1 -> INFO 18a5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39276 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.1313ms -"2019-07-20 02:40:48.413 UTC [grpc] infof -> DEBU 18a6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:48.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18a7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:48.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18a8 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" -"2019-07-20 02:40:48.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs " -"2019-07-20 02:40:48.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18aa Sending msg of 28 bytes to 2 on channel businesschannel took 49.1µs" -"2019-07-20 02:40:48.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18ab Sending msg of 28 bytes to 3 on channel businesschannel took 120.6µs" -"2019-07-20 02:40:48.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.8µs " -"2019-07-20 02:40:48.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18ad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:48.696 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.9238ms " -"2019-07-20 02:40:48.697 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18af Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:48.849 UTC [orderer.common.server] Deliver -> DEBU 18b0 Starting new Deliver handler" -"2019-07-20 02:40:48.850 UTC [common.deliver] Handle -> DEBU 18b1 Starting new deliver loop for 172.18.0.9:39278" -"2019-07-20 02:40:48.850 UTC [common.deliver] Handle -> DEBU 18b2 Attempting to read seek info message from 172.18.0.9:39278" -"2019-07-20 02:40:48.851 UTC [policies] Evaluate -> DEBU 18b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:48.853 UTC [policies] Evaluate -> DEBU 18b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.854 UTC [cauthdsl] func1 -> DEBU 18b8 0xc000ff7c50 gate 1563590448854776700 evaluation starts" -"2019-07-20 02:40:48.855 UTC [cauthdsl] func2 -> DEBU 18b9 0xc000ff7c50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18ba 0xc000ff7c50 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18bb 0xc000ff7c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18bc 0xc000ff7c50 principal evaluation fails" -"2019-07-20 02:40:48.857 UTC [cauthdsl] func1 -> DEBU 18bd 0xc000ff7c50 gate 1563590448854776700 evaluation fails" -"2019-07-20 02:40:48.857 UTC [policies] Evaluate -> DEBU 18be Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.857 UTC [policies] Evaluate -> DEBU 18bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.858 UTC [policies] Evaluate -> DEBU 18c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.859 UTC [cauthdsl] func1 -> DEBU 18c1 0xc000bade70 gate 1563590448859499700 evaluation starts" -"2019-07-20 02:40:48.860 UTC [cauthdsl] func2 -> DEBU 18c2 0xc000bade70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.860 UTC [cauthdsl] func2 -> DEBU 18c3 0xc000bade70 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.861 UTC [cauthdsl] func2 -> DEBU 18c4 0xc000bade70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:48.861 UTC [cauthdsl] func2 -> DEBU 18c5 0xc000bade70 principal evaluation fails" -"2019-07-20 02:40:48.862 UTC [cauthdsl] func1 -> DEBU 18c6 0xc000bade70 gate 1563590448859499700 evaluation fails" -"2019-07-20 02:40:48.862 UTC [policies] Evaluate -> DEBU 18c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.863 UTC [policies] Evaluate -> DEBU 18c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.863 UTC [policies] Evaluate -> DEBU 18c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.865 UTC [cauthdsl] func1 -> DEBU 18ca 0xc000d5a6b0 gate 1563590448865720200 evaluation starts" -"2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cb 0xc000d5a6b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cc 0xc000d5a6b0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cd 0xc000d5a6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18ce 0xc000d5a6b0 principal evaluation fails" -"2019-07-20 02:40:48.866 UTC [cauthdsl] func1 -> DEBU 18cf 0xc000d5a6b0 gate 1563590448865720200 evaluation fails" -"2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.867 UTC [policies] func1 -> DEBU 18d2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -"2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d3 Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:48.868 UTC [policies] Evaluate -> DEBU 18d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.868 UTC [policies] Evaluate -> DEBU 18d7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:48.868 UTC [cauthdsl] func1 -> DEBU 18d8 0xc000d5b3a0 gate 1563590448868389000 evaluation starts" -"2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18d9 0xc000d5b3a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18da 0xc000d5b3a0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18db 0xc000d5b3a0 principal matched by identity 0" -"2019-07-20 02:40:48.869 UTC [msp.identity] Verify -> DEBU 18dc Verify: digest = 00000000 31 82 70 e0 18 f6 42 43 a0 36 d9 5f 32 fe a1 e1 |1.p...BC.6._2...| -00000010 8f 05 2b 76 1f 99 e9 8d bb 4f 82 89 3c 22 84 38 |..+v.....O..<".8|" -"2019-07-20 02:40:48.869 UTC [msp.identity] Verify -> DEBU 18dd Verify: sig = 00000000 30 44 02 20 5a de 23 c3 fd 33 e3 f3 88 a6 22 89 |0D. Z.#..3....".| -00000010 4c 2d 66 90 83 7c 65 39 6e 2f 1c 5c 2d 7e 10 33 |L-f..|e9n/.\-~.3| -00000020 03 44 ec 08 02 20 4b 25 df 2d 2f e6 ab 69 fa 40 |.D... K%.-/..i.@| -00000030 39 3a 24 68 c5 fc a1 c3 de e8 96 24 ae 93 5d 1b |9:$h.......$..].| -00000040 17 ba b3 71 53 8a |...qS.|" -"2019-07-20 02:40:48.870 UTC [cauthdsl] func2 -> DEBU 18de 0xc000d5b3a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.870 UTC [cauthdsl] func1 -> DEBU 18df 0xc000d5b3a0 gate 1563590448868389000 evaluation succeeds" -"2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e2 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e4 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:48.871 UTC [common.deliver] deliverBlocks -> DEBU 18e6 [channel: businesschannel] Received seekInfo (0xc000089740) start: > stop: > from 172.18.0.9:39278" -"2019-07-20 02:40:48.871 UTC [fsblkstorage] Next -> DEBU 18e7 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:48.871 UTC [fsblkstorage] newBlockfileStream -> DEBU 18e8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -"2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18e9 Remaining bytes=[34883], Going to peek [8] bytes" -"2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ea Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -"2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18eb blockbytes [34880] read from file [0]" -"2019-07-20 02:40:48.873 UTC [common.deliver] deliverBlocks -> DEBU 18ec [channel: businesschannel] Delivering block for (0xc000089740) for 172.18.0.9:39278" -"2019-07-20 02:40:48.873 UTC [common.deliver] deliverBlocks -> DEBU 18ed [channel: businesschannel] Done delivering to 172.18.0.9:39278 for (0xc000089740)" -"2019-07-20 02:40:48.874 UTC [fsblkstorage] waitForBlock -> DEBU 18ee Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:48.874 UTC [fsblkstorage] waitForBlock -> DEBU 18ef Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:48.874 UTC [common.deliver] Handle -> DEBU 18f0 Waiting for new SeekInfo from 172.18.0.9:39278" -"2019-07-20 02:40:48.875 UTC [common.deliver] Handle -> DEBU 18f1 Attempting to read seek info message from 172.18.0.9:39278" -"2019-07-20 02:40:48.880 UTC [grpc] infof -> DEBU 18f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:48.880 UTC [common.deliver] Handle -> WARN 18f2 Error reading from 172.18.0.9:39278: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:48.880 UTC [orderer.common.server] func1 -> DEBU 18f4 Closing Deliver stream" -"2019-07-20 02:40:48.881 UTC [comm.grpc.server] 1 -> INFO 18f5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39278 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.5449ms -"2019-07-20 02:40:48.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18f6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:48.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18f7 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" -"2019-07-20 02:40:48.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 247.6µs " -"2019-07-20 02:40:49.046 UTC [orderer.common.server] Deliver -> DEBU 18f9 Starting new Deliver handler" -"2019-07-20 02:40:49.046 UTC [common.deliver] Handle -> DEBU 18fa Starting new deliver loop for 172.18.0.9:39280" -"2019-07-20 02:40:49.046 UTC [common.deliver] Handle -> DEBU 18fb Attempting to read seek info message from 172.18.0.9:39280" -"2019-07-20 02:40:49.047 UTC [policies] Evaluate -> DEBU 18fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:49.047 UTC [policies] Evaluate -> DEBU 18fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 18ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 1900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:49.049 UTC [cauthdsl] func1 -> DEBU 1901 0xc001099070 gate 1563590449049272500 evaluation starts" -"2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1902 0xc001099070 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1903 0xc001099070 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1904 0xc001099070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:49.050 UTC [cauthdsl] func2 -> DEBU 1905 0xc001099070 principal evaluation fails" -"2019-07-20 02:40:49.050 UTC [cauthdsl] func1 -> DEBU 1906 0xc001099070 gate 1563590449049272500 evaluation fails" -"2019-07-20 02:40:49.050 UTC [policies] Evaluate -> DEBU 1907 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.050 UTC [policies] Evaluate -> DEBU 1908 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.051 UTC [policies] Evaluate -> DEBU 1909 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:49.051 UTC [cauthdsl] func1 -> DEBU 190a 0xc0010998b0 gate 1563590449051280300 evaluation starts" -"2019-07-20 02:40:49.051 UTC [cauthdsl] func2 -> DEBU 190b 0xc0010998b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.051 UTC [cauthdsl] func2 -> DEBU 190c 0xc0010998b0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.052 UTC [cauthdsl] func2 -> DEBU 190d 0xc0010998b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:49.052 UTC [cauthdsl] func2 -> DEBU 190e 0xc0010998b0 principal evaluation fails" -"2019-07-20 02:40:49.052 UTC [cauthdsl] func1 -> DEBU 190f 0xc0010998b0 gate 1563590449051280300 evaluation fails" -"2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1910 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1911 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1912 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:49.053 UTC [cauthdsl] func1 -> DEBU 1913 0xc0011aa0f0 gate 1563590449053843400 evaluation starts" -"2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1914 0xc0011aa0f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1915 0xc0011aa0f0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1916 0xc0011aa0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1917 0xc0011aa0f0 principal evaluation fails" -"2019-07-20 02:40:49.054 UTC [cauthdsl] func1 -> DEBU 1918 0xc0011aa0f0 gate 1563590449053843400 evaluation fails" -"2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 1919 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 191a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.055 UTC [policies] func1 -> DEBU 191b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" -"2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 191c Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 1920 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:49.056 UTC [cauthdsl] func1 -> DEBU 1921 0xc0011aade0 gate 1563590449056710900 evaluation starts" -"2019-07-20 02:40:49.056 UTC [cauthdsl] func2 -> DEBU 1922 0xc0011aade0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.057 UTC [cauthdsl] func2 -> DEBU 1923 0xc0011aade0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.057 UTC [cauthdsl] func2 -> DEBU 1924 0xc0011aade0 principal matched by identity 0" -"2019-07-20 02:40:49.057 UTC [msp.identity] Verify -> DEBU 1925 Verify: digest = 00000000 34 6b 9e 1b 7c a1 91 de 2d 1d 2e 67 e6 3a 92 40 |4k..|...-..g.:.@| -00000010 1e 77 64 63 ea 52 9c 49 ca b2 0f 72 3d dd 69 26 |.wdc.R.I...r=.i&|" -"2019-07-20 02:40:49.057 UTC [msp.identity] Verify -> DEBU 1926 Verify: sig = 00000000 30 44 02 20 71 79 30 fe a8 5b c8 de 4f 05 26 ea |0D. qy0..[..O.&.| -00000010 d9 78 59 85 f4 7f 27 73 97 ce 18 75 52 a0 36 4e |.xY...'s...uR.6N| -00000020 2b 4b e7 d7 02 20 09 24 f6 8c 1c 63 9e b4 d3 58 |+K... .$...c...X| -00000030 f2 f5 92 09 91 ac 7b 02 5e c8 6c 0b 8b 26 bf e0 |......{.^.l..&..| -00000040 6b 1f 55 fd 57 95 |k.U.W.|" -"2019-07-20 02:40:49.058 UTC [cauthdsl] func2 -> DEBU 1927 0xc0011aade0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:49.059 UTC [cauthdsl] func1 -> DEBU 1928 0xc0011aade0 gate 1563590449056710900 evaluation succeeds" -"2019-07-20 02:40:49.059 UTC [policies] Evaluate -> DEBU 1929 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192b Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.061 UTC [policies] Evaluate -> DEBU 192d Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:49.061 UTC [policies] Evaluate -> DEBU 192e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:49.062 UTC [common.deliver] deliverBlocks -> DEBU 192f [channel: businesschannel] Received seekInfo (0xc000089d40) start: > stop: > from 172.18.0.9:39280" -"2019-07-20 02:40:49.062 UTC [fsblkstorage] Next -> DEBU 1930 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:49.062 UTC [fsblkstorage] newBlockfileStream -> DEBU 1931 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -"2019-07-20 02:40:49.063 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1932 Remaining bytes=[34883], Going to peek [8] bytes" -"2019-07-20 02:40:49.063 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1933 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -"2019-07-20 02:40:49.064 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1934 blockbytes [34880] read from file [0]" -"2019-07-20 02:40:49.064 UTC [common.deliver] deliverBlocks -> DEBU 1935 [channel: businesschannel] Delivering block for (0xc000089d40) for 172.18.0.9:39280" -"2019-07-20 02:40:49.064 UTC [common.deliver] deliverBlocks -> DEBU 1936 [channel: businesschannel] Done delivering to 172.18.0.9:39280 for (0xc000089d40)" -"2019-07-20 02:40:49.065 UTC [fsblkstorage] waitForBlock -> DEBU 1937 Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:49.066 UTC [fsblkstorage] waitForBlock -> DEBU 1938 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:49.066 UTC [common.deliver] Handle -> DEBU 1939 Waiting for new SeekInfo from 172.18.0.9:39280" -"2019-07-20 02:40:49.066 UTC [common.deliver] Handle -> DEBU 193a Attempting to read seek info message from 172.18.0.9:39280" -"2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:49.068 UTC [cauthdsl] func1 -> DEBU 1940 0xc0008bc0a0 gate 1563590449068929800 evaluation starts" -"2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1941 0xc0008bc0a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1942 0xc0008bc0a0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1943 0xc0008bc0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1944 0xc0008bc0a0 principal evaluation fails" -"2019-07-20 02:40:49.069 UTC [cauthdsl] func1 -> DEBU 1945 0xc0008bc0a0 gate 1563590449068929800 evaluation fails" -"2019-07-20 02:40:49.069 UTC [policies] Evaluate -> DEBU 1946 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.069 UTC [policies] Evaluate -> DEBU 1947 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.070 UTC [policies] Evaluate -> DEBU 1948 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:49.070 UTC [cauthdsl] func1 -> DEBU 1949 0xc0008bc8e0 gate 1563590449070160000 evaluation starts" -"2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194a 0xc0008bc8e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194b 0xc0008bc8e0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194c 0xc0008bc8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194d 0xc0008bc8e0 principal evaluation fails" -"2019-07-20 02:40:49.070 UTC [cauthdsl] func1 -> DEBU 194e 0xc0008bc8e0 gate 1563590449070160000 evaluation fails" -"2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 194f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 1950 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 1951 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:49.071 UTC [cauthdsl] func1 -> DEBU 1952 0xc0008bd120 gate 1563590449071603400 evaluation starts" -"2019-07-20 02:40:49.071 UTC [cauthdsl] func2 -> DEBU 1953 0xc0008bd120 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.071 UTC [cauthdsl] func2 -> DEBU 1954 0xc0008bd120 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.072 UTC [cauthdsl] func2 -> DEBU 1955 0xc0008bd120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:49.072 UTC [cauthdsl] func2 -> DEBU 1956 0xc0008bd120 principal evaluation fails" -"2019-07-20 02:40:49.072 UTC [cauthdsl] func1 -> DEBU 1957 0xc0008bd120 gate 1563590449071603400 evaluation fails" -"2019-07-20 02:40:49.072 UTC [policies] Evaluate -> DEBU 1958 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.072 UTC [policies] Evaluate -> DEBU 1959 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.072 UTC [policies] func1 -> DEBU 195a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -"2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195b Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:49.073 UTC [cauthdsl] func1 -> DEBU 1960 0xc0008bde10 gate 1563590449073713400 evaluation starts" -"2019-07-20 02:40:49.073 UTC [cauthdsl] func2 -> DEBU 1961 0xc0008bde10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.073 UTC [cauthdsl] func2 -> DEBU 1962 0xc0008bde10 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.074 UTC [cauthdsl] func2 -> DEBU 1963 0xc0008bde10 principal matched by identity 0" -"2019-07-20 02:40:49.074 UTC [msp.identity] Verify -> DEBU 1964 Verify: digest = 00000000 69 c2 20 14 9e bd df 67 ef c6 0e ec 06 ff 4a ea |i. ....g......J.| -00000010 99 ae 80 c3 73 cd c6 11 95 7f 41 4e 44 c3 49 db |....s.....AND.I.|" -"2019-07-20 02:40:49.074 UTC [msp.identity] Verify -> DEBU 1965 Verify: sig = 00000000 30 44 02 20 70 28 b0 88 ca 7f d9 92 c5 ee 60 3c |0D. p(........`<| -00000010 7c 7d 73 65 fb ef 23 75 b2 51 72 d0 e3 1e 88 ea ||}se..#u.Qr.....| -00000020 34 b3 d2 4d 02 20 4c 7f ca d9 a7 9d 44 62 e4 50 |4..M. L.....Db.P| -00000030 3a 91 d3 6a d7 a1 e4 30 f5 8e 62 b4 ec e2 dc 85 |:..j...0..b.....| -00000040 e9 56 04 a2 52 d7 |.V..R.|" -"2019-07-20 02:40:49.075 UTC [cauthdsl] func2 -> DEBU 1966 0xc0008bde10 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:49.075 UTC [cauthdsl] func1 -> DEBU 1967 0xc0008bde10 gate 1563590449073713400 evaluation succeeds" -"2019-07-20 02:40:49.075 UTC [policies] Evaluate -> DEBU 1968 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 1969 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196a Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196c Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:49.076 UTC [common.deliver] deliverBlocks -> DEBU 196e [channel: businesschannel] Received seekInfo (0xc000089f80) start: > stop: > from 172.18.0.9:39280" -"2019-07-20 02:40:49.076 UTC [fsblkstorage] Next -> DEBU 196f Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:49.076 UTC [fsblkstorage] newBlockfileStream -> DEBU 1970 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -"2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1971 Remaining bytes=[34883], Going to peek [8] bytes" -"2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1972 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -"2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1973 blockbytes [34880] read from file [0]" -"2019-07-20 02:40:49.077 UTC [common.deliver] deliverBlocks -> DEBU 1974 [channel: businesschannel] Delivering block for (0xc000089f80) for 172.18.0.9:39280" -"2019-07-20 02:40:49.078 UTC [common.deliver] deliverBlocks -> DEBU 1975 [channel: businesschannel] Done delivering to 172.18.0.9:39280 for (0xc000089f80)" -"2019-07-20 02:40:49.078 UTC [fsblkstorage] waitForBlock -> DEBU 1976 Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:49.078 UTC [common.deliver] Handle -> DEBU 1977 Waiting for new SeekInfo from 172.18.0.9:39280" -"2019-07-20 02:40:49.079 UTC [common.deliver] Handle -> DEBU 1979 Attempting to read seek info message from 172.18.0.9:39280" -"2019-07-20 02:40:49.078 UTC [fsblkstorage] waitForBlock -> DEBU 1978 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:49.085 UTC [common.deliver] Handle -> WARN 197a Error reading from 172.18.0.9:39280: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:49.086 UTC [orderer.common.server] func1 -> DEBU 197b Closing Deliver stream" -"2019-07-20 02:40:49.086 UTC [comm.grpc.server] 1 -> INFO 197c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39280 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.909ms -"2019-07-20 02:40:49.086 UTC [grpc] infof -> DEBU 197d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:49.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 197e Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" -"2019-07-20 02:40:49.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 197f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116µs " -"2019-07-20 02:40:49.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1980 Sending msg of 28 bytes to 3 on channel businesschannel took 9.2µs" -"2019-07-20 02:40:49.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1981 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.6µs " -"2019-07-20 02:40:49.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1982 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:49.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1983 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:49.227 UTC [orderer.common.server] Deliver -> DEBU 1984 Starting new Deliver handler" -"2019-07-20 02:40:49.227 UTC [common.deliver] Handle -> DEBU 1985 Starting new deliver loop for 172.18.0.9:39282" -"2019-07-20 02:40:49.227 UTC [common.deliver] Handle -> DEBU 1986 Attempting to read seek info message from 172.18.0.9:39282" -"2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1987 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1988 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1989 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 198a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.229 UTC [policies] Evaluate -> DEBU 198b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:49.229 UTC [cauthdsl] func1 -> DEBU 198c 0xc000b1a660 gate 1563590449229303900 evaluation starts" -"2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198d 0xc000b1a660 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198e 0xc000b1a660 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198f 0xc000b1a660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:49.230 UTC [cauthdsl] func2 -> DEBU 1990 0xc000b1a660 principal evaluation fails" -"2019-07-20 02:40:49.230 UTC [cauthdsl] func1 -> DEBU 1991 0xc000b1a660 gate 1563590449229303900 evaluation fails" -"2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1992 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1993 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1994 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:49.231 UTC [cauthdsl] func1 -> DEBU 1995 0xc000b1aea0 gate 1563590449231168100 evaluation starts" -"2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1996 0xc000b1aea0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1997 0xc000b1aea0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1998 0xc000b1aea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1999 0xc000b1aea0 principal evaluation fails" -"2019-07-20 02:40:49.232 UTC [cauthdsl] func1 -> DEBU 199a 0xc000b1aea0 gate 1563590449231168100 evaluation fails" -"2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:49.232 UTC [cauthdsl] func1 -> DEBU 199e 0xc000b1b6e0 gate 1563590449232824500 evaluation starts" -"2019-07-20 02:40:49.232 UTC [cauthdsl] func2 -> DEBU 199f 0xc000b1b6e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a0 0xc000b1b6e0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a1 0xc000b1b6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a2 0xc000b1b6e0 principal evaluation fails" -"2019-07-20 02:40:49.233 UTC [cauthdsl] func1 -> DEBU 19a3 0xc000b1b6e0 gate 1563590449232824500 evaluation fails" -"2019-07-20 02:40:49.233 UTC [policies] Evaluate -> DEBU 19a4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.234 UTC [policies] func1 -> DEBU 19a6 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -"2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a7 Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:49.235 UTC [policies] Evaluate -> DEBU 19aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.235 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:49.235 UTC [cauthdsl] func1 -> DEBU 19ac 0xc000bf03d0 gate 1563590449235502300 evaluation starts" -"2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000bf03d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19ae 0xc000bf03d0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19af 0xc000bf03d0 principal matched by identity 0" -"2019-07-20 02:40:49.236 UTC [msp.identity] Verify -> DEBU 19b0 Verify: digest = 00000000 82 c0 89 76 a5 fb 20 65 67 01 37 2f b9 6b 34 26 |...v.. eg.7/.k4&| -00000010 cf 0d 30 1c ea 6c d5 67 19 7b 6e b3 f4 a3 a6 fd |..0..l.g.{n.....|" -"2019-07-20 02:40:49.236 UTC [msp.identity] Verify -> DEBU 19b1 Verify: sig = 00000000 30 45 02 21 00 87 0b bd 80 5a 66 e5 87 b0 b5 de |0E.!.....Zf.....| -00000010 95 3a 3c c0 19 6e f9 1e d9 00 9c df ca ab 34 75 |.:<..n........4u| -00000020 95 51 8d 93 6a 02 20 44 80 f3 85 2b ba 00 e1 8a |.Q..j. D...+....| -00000030 59 83 1d 31 c4 76 e2 8a 78 f7 32 2e b5 91 83 5e |Y..1.v..x.2....^| -00000040 1a 63 0b 11 6b ca 49 |.c..k.I|" -"2019-07-20 02:40:49.237 UTC [cauthdsl] func2 -> DEBU 19b2 0xc000bf03d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:49.237 UTC [cauthdsl] func1 -> DEBU 19b3 0xc000bf03d0 gate 1563590449235502300 evaluation succeeds" -"2019-07-20 02:40:49.237 UTC [policies] Evaluate -> DEBU 19b4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.237 UTC [policies] Evaluate -> DEBU 19b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b6 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b8 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:49.238 UTC [common.deliver] deliverBlocks -> DEBU 19ba [channel: businesschannel] Received seekInfo (0xc000ce2840) start: > stop: > from 172.18.0.9:39282" -"2019-07-20 02:40:49.238 UTC [fsblkstorage] Next -> DEBU 19bb Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:49.239 UTC [fsblkstorage] newBlockfileStream -> DEBU 19bc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" -"2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bd Remaining bytes=[118787], Going to peek [8] bytes" -"2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19be Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bf blockbytes [23944] read from file [0]" -"2019-07-20 02:40:49.239 UTC [common.deliver] deliverBlocks -> DEBU 19c0 [channel: businesschannel] Delivering block for (0xc000ce2840) for 172.18.0.9:39282" -"2019-07-20 02:40:49.240 UTC [common.deliver] deliverBlocks -> DEBU 19c1 [channel: businesschannel] Done delivering to 172.18.0.9:39282 for (0xc000ce2840)" -"2019-07-20 02:40:49.240 UTC [fsblkstorage] waitForBlock -> DEBU 19c2 Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:49.240 UTC [fsblkstorage] waitForBlock -> DEBU 19c3 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:49.241 UTC [common.deliver] Handle -> DEBU 19c4 Waiting for new SeekInfo from 172.18.0.9:39282" -"2019-07-20 02:40:49.241 UTC [common.deliver] Handle -> DEBU 19c5 Attempting to read seek info message from 172.18.0.9:39282" -"2019-07-20 02:40:49.247 UTC [common.deliver] Handle -> WARN 19c6 Error reading from 172.18.0.9:39282: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:49.247 UTC [orderer.common.server] func1 -> DEBU 19c7 Closing Deliver stream" -"2019-07-20 02:40:49.247 UTC [comm.grpc.server] 1 -> INFO 19c8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39282 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.3933ms -"2019-07-20 02:40:49.247 UTC [grpc] infof -> DEBU 19c9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:49.395 UTC [orderer.common.server] Deliver -> DEBU 19ca Starting new Deliver handler" -"2019-07-20 02:40:49.396 UTC [common.deliver] Handle -> DEBU 19cb Starting new deliver loop for 172.18.0.9:39284" -"2019-07-20 02:40:49.396 UTC [common.deliver] Handle -> DEBU 19cc Attempting to read seek info message from 172.18.0.9:39284" -"2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:49.398 UTC [cauthdsl] func1 -> DEBU 19d2 0xc001108980 gate 1563590449398077800 evaluation starts" -"2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d3 0xc001108980 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d4 0xc001108980 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d5 0xc001108980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:49.399 UTC [cauthdsl] func2 -> DEBU 19d6 0xc001108980 principal evaluation fails" -"2019-07-20 02:40:49.399 UTC [cauthdsl] func1 -> DEBU 19d7 0xc001108980 gate 1563590449398077800 evaluation fails" -"2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19d8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:49.399 UTC [cauthdsl] func1 -> DEBU 19db 0xc0011091c0 gate 1563590449399961700 evaluation starts" -"2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19dc 0xc0011091c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19dd 0xc0011091c0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19de 0xc0011091c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19df 0xc0011091c0 principal evaluation fails" -"2019-07-20 02:40:49.401 UTC [cauthdsl] func1 -> DEBU 19e0 0xc0011091c0 gate 1563590449399961700 evaluation fails" -"2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:49.402 UTC [cauthdsl] func1 -> DEBU 19e4 0xc001109a00 gate 1563590449401966900 evaluation starts" -"2019-07-20 02:40:49.402 UTC [cauthdsl] func2 -> DEBU 19e5 0xc001109a00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.402 UTC [cauthdsl] func2 -> DEBU 19e6 0xc001109a00 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.403 UTC [cauthdsl] func2 -> DEBU 19e7 0xc001109a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:49.403 UTC [cauthdsl] func2 -> DEBU 19e8 0xc001109a00 principal evaluation fails" -"2019-07-20 02:40:49.403 UTC [cauthdsl] func1 -> DEBU 19e9 0xc001109a00 gate 1563590449401966900 evaluation fails" -"2019-07-20 02:40:49.403 UTC [policies] Evaluate -> DEBU 19ea Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.404 UTC [policies] func1 -> DEBU 19ec Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -"2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ed Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:49.405 UTC [policies] Evaluate -> DEBU 19f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.405 UTC [policies] Evaluate -> DEBU 19f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:49.405 UTC [cauthdsl] func1 -> DEBU 19f2 0xc000de86f0 gate 1563590449405439300 evaluation starts" -"2019-07-20 02:40:49.405 UTC [cauthdsl] func2 -> DEBU 19f3 0xc000de86f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.405 UTC [cauthdsl] func2 -> DEBU 19f4 0xc000de86f0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.406 UTC [cauthdsl] func2 -> DEBU 19f5 0xc000de86f0 principal matched by identity 0" -"2019-07-20 02:40:49.406 UTC [msp.identity] Verify -> DEBU 19f6 Verify: digest = 00000000 8d ef c8 38 dd 25 ee e3 8f e1 10 8f 37 05 1b 07 |...8.%......7...| -00000010 3a 8c f0 8f a3 05 c2 78 05 48 e8 c1 65 36 9c 6a |:......x.H..e6.j|" -"2019-07-20 02:40:49.406 UTC [msp.identity] Verify -> DEBU 19f7 Verify: sig = 00000000 30 45 02 21 00 e1 d5 0c 44 50 2f 63 e1 b1 b8 2c |0E.!....DP/c...,| -00000010 03 a3 c2 a9 8f 29 b6 9d 8c 70 5f 06 42 0c ce 40 |.....)...p_.B..@| -00000020 66 94 91 e5 43 02 20 20 7f d5 e0 d1 c9 db f2 ef |f...C. ........| -00000030 28 3e ef a7 08 4a 58 9d cb 54 da bc 4f a7 5e bd |(>...JX..T..O.^.| -00000040 02 79 a1 1c e7 ca 73 |.y....s|" -"2019-07-20 02:40:49.407 UTC [cauthdsl] func2 -> DEBU 19f8 0xc000de86f0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:49.407 UTC [cauthdsl] func1 -> DEBU 19f9 0xc000de86f0 gate 1563590449405439300 evaluation succeeds" -"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fc Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fe Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:49.407 UTC [common.deliver] deliverBlocks -> DEBU 1a00 [channel: businesschannel] Received seekInfo (0xc000ce2f80) start: > stop: > from 172.18.0.9:39284" -"2019-07-20 02:40:49.408 UTC [fsblkstorage] Next -> DEBU 1a01 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:49.408 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a02 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" -"2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a03 Remaining bytes=[94840], Going to peek [8] bytes" -"2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a04 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" -"2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a05 blockbytes [23690] read from file [0]" -"2019-07-20 02:40:49.409 UTC [common.deliver] deliverBlocks -> DEBU 1a06 [channel: businesschannel] Delivering block for (0xc000ce2f80) for 172.18.0.9:39284" -"2019-07-20 02:40:49.409 UTC [common.deliver] deliverBlocks -> DEBU 1a07 [channel: businesschannel] Done delivering to 172.18.0.9:39284 for (0xc000ce2f80)" -"2019-07-20 02:40:49.409 UTC [fsblkstorage] waitForBlock -> DEBU 1a08 Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:49.409 UTC [fsblkstorage] waitForBlock -> DEBU 1a09 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:49.409 UTC [common.deliver] Handle -> DEBU 1a0a Waiting for new SeekInfo from 172.18.0.9:39284" -"2019-07-20 02:40:49.410 UTC [common.deliver] Handle -> DEBU 1a0b Attempting to read seek info message from 172.18.0.9:39284" -"2019-07-20 02:40:49.419 UTC [common.deliver] Handle -> WARN 1a0c Error reading from 172.18.0.9:39284: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:49.419 UTC [orderer.common.server] func1 -> DEBU 1a0e Closing Deliver stream" -"2019-07-20 02:40:49.419 UTC [grpc] infof -> DEBU 1a0d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:49.419 UTC [comm.grpc.server] 1 -> INFO 1a0f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39284 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.9813ms -"2019-07-20 02:40:49.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a10 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:49.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a11 Sending msg of 28 bytes to 3 on channel testchainid took 82.9µs" -"2019-07-20 02:40:49.440 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a12 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 406.5µs " -"2019-07-20 02:40:49.651 UTC [orderer.common.server] Deliver -> DEBU 1a13 Starting new Deliver handler" -"2019-07-20 02:40:49.651 UTC [common.deliver] Handle -> DEBU 1a14 Starting new deliver loop for 172.18.0.9:39286" -"2019-07-20 02:40:49.651 UTC [common.deliver] Handle -> DEBU 1a15 Attempting to read seek info message from 172.18.0.9:39286" -"2019-07-20 02:40:49.652 UTC [policies] Evaluate -> DEBU 1a16 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:49.655 UTC [policies] Evaluate -> DEBU 1a17 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.655 UTC [policies] Evaluate -> DEBU 1a18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:49.656 UTC [policies] Evaluate -> DEBU 1a19 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.656 UTC [policies] Evaluate -> DEBU 1a1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:49.656 UTC [cauthdsl] func1 -> DEBU 1a1b 0xc001146f40 gate 1563590449656634100 evaluation starts" -"2019-07-20 02:40:49.656 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc001146f40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1d 0xc001146f40 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1e 0xc001146f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1f 0xc001146f40 principal evaluation fails" -"2019-07-20 02:40:49.658 UTC [cauthdsl] func1 -> DEBU 1a20 0xc001146f40 gate 1563590449656634100 evaluation fails" -"2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a21 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:49.660 UTC [cauthdsl] func1 -> DEBU 1a24 0xc001147780 gate 1563590449660258300 evaluation starts" -"2019-07-20 02:40:49.660 UTC [cauthdsl] func2 -> DEBU 1a25 0xc001147780 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.661 UTC [cauthdsl] func2 -> DEBU 1a26 0xc001147780 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.662 UTC [cauthdsl] func2 -> DEBU 1a27 0xc001147780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:49.662 UTC [cauthdsl] func2 -> DEBU 1a28 0xc001147780 principal evaluation fails" -"2019-07-20 02:40:49.663 UTC [cauthdsl] func1 -> DEBU 1a29 0xc001147780 gate 1563590449660258300 evaluation fails" -"2019-07-20 02:40:49.664 UTC [policies] Evaluate -> DEBU 1a2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.664 UTC [policies] Evaluate -> DEBU 1a2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.665 UTC [policies] Evaluate -> DEBU 1a2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:49.665 UTC [cauthdsl] func1 -> DEBU 1a2d 0xc001147fd0 gate 1563590449665747900 evaluation starts" -"2019-07-20 02:40:49.665 UTC [cauthdsl] func2 -> DEBU 1a2e 0xc001147fd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a2f 0xc001147fd0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a30 0xc001147fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a31 0xc001147fd0 principal evaluation fails" -"2019-07-20 02:40:49.667 UTC [cauthdsl] func1 -> DEBU 1a32 0xc001147fd0 gate 1563590449665747900 evaluation fails" -"2019-07-20 02:40:49.667 UTC [policies] Evaluate -> DEBU 1a33 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.668 UTC [policies] Evaluate -> DEBU 1a34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.668 UTC [policies] func1 -> DEBU 1a35 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -"2019-07-20 02:40:49.669 UTC [policies] Evaluate -> DEBU 1a36 Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:49.670 UTC [policies] Evaluate -> DEBU 1a37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:49.670 UTC [policies] Evaluate -> DEBU 1a38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:49.671 UTC [policies] Evaluate -> DEBU 1a39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.672 UTC [policies] Evaluate -> DEBU 1a3a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:49.673 UTC [cauthdsl] func1 -> DEBU 1a3b 0xc000ad15d0 gate 1563590449673204500 evaluation starts" -"2019-07-20 02:40:49.673 UTC [cauthdsl] func2 -> DEBU 1a3c 0xc000ad15d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.674 UTC [cauthdsl] func2 -> DEBU 1a3d 0xc000ad15d0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.675 UTC [cauthdsl] func2 -> DEBU 1a3e 0xc000ad15d0 principal matched by identity 0" -"2019-07-20 02:40:49.676 UTC [msp.identity] Verify -> DEBU 1a3f Verify: digest = 00000000 6d fd 64 01 29 73 26 c6 8d 78 12 e5 8a 88 92 c4 |m.d.)s&..x......| -00000010 38 2f 37 72 0e ec 09 0e 08 8a e7 4f be e3 3c e5 |8/7r.......O..<.|" -"2019-07-20 02:40:49.676 UTC [msp.identity] Verify -> DEBU 1a40 Verify: sig = 00000000 30 45 02 21 00 c4 23 85 66 3b 16 a3 d1 d7 66 d9 |0E.!..#.f;....f.| -00000010 55 74 3a 88 0a bc 26 58 b2 c5 82 ae 0e 1a 37 90 |Ut:...&X......7.| -00000020 4d f1 5f 36 66 02 20 2f 8d 67 0b 81 bf a2 1f 9d |M._6f. /.g......| -00000030 4c f3 4a 40 63 da db 0e 77 9e f5 c1 94 40 e6 f3 |L.J@c...w....@..| -00000040 64 14 8a e7 6f 9b 49 |d...o.I|" -"2019-07-20 02:40:49.676 UTC [cauthdsl] func2 -> DEBU 1a41 0xc000ad15d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:49.677 UTC [cauthdsl] func1 -> DEBU 1a42 0xc000ad15d0 gate 1563590449673204500 evaluation succeeds" -"2019-07-20 02:40:49.678 UTC [policies] Evaluate -> DEBU 1a43 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.678 UTC [policies] Evaluate -> DEBU 1a44 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.679 UTC [policies] Evaluate -> DEBU 1a45 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.680 UTC [policies] Evaluate -> DEBU 1a46 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.681 UTC [policies] Evaluate -> DEBU 1a47 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:49.681 UTC [policies] Evaluate -> DEBU 1a48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:49.682 UTC [common.deliver] deliverBlocks -> DEBU 1a49 [channel: businesschannel] Received seekInfo (0xc000ce3680) start: > stop: > from 172.18.0.9:39286" -"2019-07-20 02:40:49.682 UTC [fsblkstorage] Next -> DEBU 1a4a Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:49.682 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a4b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" -"2019-07-20 02:40:49.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4c Remaining bytes=[71147], Going to peek [8] bytes" -"2019-07-20 02:40:49.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4d Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" -"2019-07-20 02:40:49.684 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4e blockbytes [23747] read from file [0]" -"2019-07-20 02:40:49.684 UTC [common.deliver] deliverBlocks -> DEBU 1a4f [channel: businesschannel] Delivering block for (0xc000ce3680) for 172.18.0.9:39286" -"2019-07-20 02:40:49.690 UTC [common.deliver] deliverBlocks -> DEBU 1a50 [channel: businesschannel] Done delivering to 172.18.0.9:39286 for (0xc000ce3680)" -"2019-07-20 02:40:49.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a51 Sending msg of 28 bytes to 2 on channel businesschannel took 73.4µs" -"2019-07-20 02:40:49.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a54 Sending msg of 28 bytes to 3 on channel businesschannel took 84.1µs" -"2019-07-20 02:40:49.694 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " -"2019-07-20 02:40:49.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.8µs " -"2019-07-20 02:40:49.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a53 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:49.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a56 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:49.699 UTC [fsblkstorage] waitForBlock -> DEBU 1a57 Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:49.699 UTC [fsblkstorage] waitForBlock -> DEBU 1a58 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:49.700 UTC [common.deliver] Handle -> DEBU 1a59 Waiting for new SeekInfo from 172.18.0.9:39286" -"2019-07-20 02:40:49.700 UTC [common.deliver] Handle -> DEBU 1a5a Attempting to read seek info message from 172.18.0.9:39286" -"2019-07-20 02:40:49.709 UTC [common.deliver] Handle -> WARN 1a5b Error reading from 172.18.0.9:39286: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:49.710 UTC [orderer.common.server] func1 -> DEBU 1a5c Closing Deliver stream" -"2019-07-20 02:40:49.710 UTC [comm.grpc.server] 1 -> INFO 1a5d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39286 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=59.4656ms -"2019-07-20 02:40:49.712 UTC [grpc] infof -> DEBU 1a5e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:49.887 UTC [orderer.common.server] Deliver -> DEBU 1a5f Starting new Deliver handler" -"2019-07-20 02:40:49.888 UTC [common.deliver] Handle -> DEBU 1a60 Starting new deliver loop for 172.18.0.9:39288" -"2019-07-20 02:40:49.888 UTC [common.deliver] Handle -> DEBU 1a61 Attempting to read seek info message from 172.18.0.9:39288" -"2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.890 UTC [policies] Evaluate -> DEBU 1a66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:49.890 UTC [cauthdsl] func1 -> DEBU 1a67 0xc001089ef0 gate 1563590449890604200 evaluation starts" -"2019-07-20 02:40:49.890 UTC [cauthdsl] func2 -> DEBU 1a68 0xc001089ef0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a69 0xc001089ef0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a6a 0xc001089ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a6b 0xc001089ef0 principal evaluation fails" -"2019-07-20 02:40:49.891 UTC [cauthdsl] func1 -> DEBU 1a6c 0xc001089ef0 gate 1563590449890604200 evaluation fails" -"2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:49.892 UTC [cauthdsl] func1 -> DEBU 1a70 0xc000cd2730 gate 1563590449892826700 evaluation starts" -"2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a71 0xc000cd2730 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a72 0xc000cd2730 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a73 0xc000cd2730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a74 0xc000cd2730 principal evaluation fails" -"2019-07-20 02:40:49.893 UTC [cauthdsl] func1 -> DEBU 1a75 0xc000cd2730 gate 1563590449892826700 evaluation fails" -"2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a76 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:49.894 UTC [cauthdsl] func1 -> DEBU 1a79 0xc000cd2f70 gate 1563590449894533500 evaluation starts" -"2019-07-20 02:40:49.894 UTC [cauthdsl] func2 -> DEBU 1a7a 0xc000cd2f70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.895 UTC [cauthdsl] func2 -> DEBU 1a7b 0xc000cd2f70 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.895 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc000cd2f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:49.896 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc000cd2f70 principal evaluation fails" -"2019-07-20 02:40:49.896 UTC [cauthdsl] func1 -> DEBU 1a7e 0xc000cd2f70 gate 1563590449894533500 evaluation fails" -"2019-07-20 02:40:49.896 UTC [policies] Evaluate -> DEBU 1a7f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.896 UTC [policies] Evaluate -> DEBU 1a80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.897 UTC [policies] func1 -> DEBU 1a81 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -"2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a82 Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a84 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a85 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.898 UTC [policies] Evaluate -> DEBU 1a86 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:49.898 UTC [cauthdsl] func1 -> DEBU 1a87 0xc000cd3c60 gate 1563590449898398500 evaluation starts" -"2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a88 0xc000cd3c60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a89 0xc000cd3c60 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a8a 0xc000cd3c60 principal matched by identity 0" -"2019-07-20 02:40:49.899 UTC [msp.identity] Verify -> DEBU 1a8b Verify: digest = 00000000 cc 24 52 2f d6 08 62 09 9d 80 87 87 59 45 d1 ee |.$R/..b.....YE..| -00000010 c3 65 25 c7 5d 0d 9d e3 54 97 82 53 a7 80 1c b7 |.e%.]...T..S....|" -"2019-07-20 02:40:49.899 UTC [msp.identity] Verify -> DEBU 1a8c Verify: sig = 00000000 30 44 02 20 2d 84 b8 36 d3 99 0b c7 07 a0 82 e8 |0D. -..6........| -00000010 0f ba f1 08 99 d4 29 b7 60 14 25 e1 d7 4e 44 fc |......).`.%..ND.| -00000020 df ca 36 b9 02 20 2b 9b 61 70 ea 2c 52 08 65 03 |..6.. +.ap.,R.e.| -00000030 03 5f 46 e8 ed 09 37 dd 46 cb 66 0d 43 62 9f 72 |._F...7.F.f.Cb.r| -00000040 cf dc 1d d9 9c 61 |.....a|" -"2019-07-20 02:40:49.900 UTC [cauthdsl] func2 -> DEBU 1a8d 0xc000cd3c60 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:49.900 UTC [cauthdsl] func1 -> DEBU 1a8e 0xc000cd3c60 gate 1563590449898398500 evaluation succeeds" -"2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a8f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a90 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a91 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a93 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a94 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:49.901 UTC [common.deliver] deliverBlocks -> DEBU 1a95 [channel: businesschannel] Received seekInfo (0xc0011d4100) start: > stop: > from 172.18.0.9:39288" -"2019-07-20 02:40:49.901 UTC [fsblkstorage] Next -> DEBU 1a96 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:49.901 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a97 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71390]" -"2019-07-20 02:40:49.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a98 Remaining bytes=[47397], Going to peek [8] bytes" -"2019-07-20 02:40:49.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a99 Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" -"2019-07-20 02:40:49.902 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a9a blockbytes [4527] read from file [0]" -"2019-07-20 02:40:49.902 UTC [common.deliver] deliverBlocks -> DEBU 1a9b [channel: businesschannel] Delivering block for (0xc0011d4100) for 172.18.0.9:39288" -"2019-07-20 02:40:49.902 UTC [common.deliver] deliverBlocks -> DEBU 1a9c [channel: businesschannel] Done delivering to 172.18.0.9:39288 for (0xc0011d4100)" -"2019-07-20 02:40:49.902 UTC [common.deliver] Handle -> DEBU 1a9d Waiting for new SeekInfo from 172.18.0.9:39288" -"2019-07-20 02:40:49.902 UTC [common.deliver] Handle -> DEBU 1a9e Attempting to read seek info message from 172.18.0.9:39288" -"2019-07-20 02:40:49.903 UTC [fsblkstorage] waitForBlock -> DEBU 1a9f Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:49.903 UTC [fsblkstorage] waitForBlock -> DEBU 1aa0 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:49.911 UTC [common.deliver] Handle -> WARN 1aa1 Error reading from 172.18.0.9:39288: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:49.911 UTC [orderer.common.server] func1 -> DEBU 1aa2 Closing Deliver stream" -"2019-07-20 02:40:49.912 UTC [comm.grpc.server] 1 -> INFO 1aa3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39288 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.309ms -"2019-07-20 02:40:49.912 UTC [grpc] infof -> DEBU 1aa4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:49.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:49.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa6 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" -"2019-07-20 02:40:49.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " -"2019-07-20 02:40:50.087 UTC [orderer.common.server] Deliver -> DEBU 1aa8 Starting new Deliver handler" -"2019-07-20 02:40:50.088 UTC [common.deliver] Handle -> DEBU 1aa9 Starting new deliver loop for 172.18.0.9:39290" -"2019-07-20 02:40:50.088 UTC [common.deliver] Handle -> DEBU 1aaa Attempting to read seek info message from 172.18.0.9:39290" -"2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:50.090 UTC [policies] Evaluate -> DEBU 1aae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.090 UTC [policies] Evaluate -> DEBU 1aaf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:50.090 UTC [cauthdsl] func1 -> DEBU 1ab0 0xc0012c81e0 gate 1563590450090542200 evaluation starts" -"2019-07-20 02:40:50.090 UTC [cauthdsl] func2 -> DEBU 1ab1 0xc0012c81e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.091 UTC [cauthdsl] func2 -> DEBU 1ab2 0xc0012c81e0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.091 UTC [cauthdsl] func2 -> DEBU 1ab3 0xc0012c81e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:50.092 UTC [cauthdsl] func2 -> DEBU 1ab4 0xc0012c81e0 principal evaluation fails" -"2019-07-20 02:40:50.092 UTC [cauthdsl] func1 -> DEBU 1ab5 0xc0012c81e0 gate 1563590450090542200 evaluation fails" -"2019-07-20 02:40:50.092 UTC [policies] Evaluate -> DEBU 1ab6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:50.093 UTC [policies] Evaluate -> DEBU 1ab7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:50.093 UTC [policies] Evaluate -> DEBU 1ab8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:50.093 UTC [cauthdsl] func1 -> DEBU 1ab9 0xc0012c8a20 gate 1563590450093382300 evaluation starts" -"2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1aba 0xc0012c8a20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1abb 0xc0012c8a20 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1abc 0xc0012c8a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:50.094 UTC [cauthdsl] func2 -> DEBU 1abd 0xc0012c8a20 principal evaluation fails" -"2019-07-20 02:40:50.094 UTC [cauthdsl] func1 -> DEBU 1abe 0xc0012c8a20 gate 1563590450093382300 evaluation fails" -"2019-07-20 02:40:50.094 UTC [policies] Evaluate -> DEBU 1abf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:50.095 UTC [policies] Evaluate -> DEBU 1ac0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:50.095 UTC [policies] Evaluate -> DEBU 1ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:50.095 UTC [cauthdsl] func1 -> DEBU 1ac2 0xc0012c9260 gate 1563590450095879300 evaluation starts" -"2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac3 0xc0012c9260 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac4 0xc0012c9260 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac5 0xc0012c9260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:50.097 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc0012c9260 principal evaluation fails" -"2019-07-20 02:40:50.097 UTC [cauthdsl] func1 -> DEBU 1ac7 0xc0012c9260 gate 1563590450095879300 evaluation fails" -"2019-07-20 02:40:50.097 UTC [policies] Evaluate -> DEBU 1ac8 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:50.097 UTC [policies] Evaluate -> DEBU 1ac9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:50.098 UTC [policies] func1 -> DEBU 1aca Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -"2019-07-20 02:40:50.098 UTC [policies] Evaluate -> DEBU 1acb Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:50.098 UTC [policies] Evaluate -> DEBU 1acc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1acd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1ace This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1acf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:50.099 UTC [cauthdsl] func1 -> DEBU 1ad0 0xc0012c9f50 gate 1563590450099718300 evaluation starts" -"2019-07-20 02:40:50.099 UTC [cauthdsl] func2 -> DEBU 1ad1 0xc0012c9f50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.100 UTC [cauthdsl] func2 -> DEBU 1ad2 0xc0012c9f50 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.100 UTC [cauthdsl] func2 -> DEBU 1ad3 0xc0012c9f50 principal matched by identity 0" -"2019-07-20 02:40:50.100 UTC [msp.identity] Verify -> DEBU 1ad4 Verify: digest = 00000000 32 b0 1f 4e 4f 77 71 8c 45 cf a1 1a db 81 73 9b |2..NOwq.E.....s.| -00000010 14 26 fa 8f a0 33 a0 d5 a4 aa 21 20 77 f3 cb fb |.&...3....! w...|" -"2019-07-20 02:40:50.101 UTC [msp.identity] Verify -> DEBU 1ad5 Verify: sig = 00000000 30 45 02 21 00 fe 90 97 76 f4 f4 19 51 c7 be 69 |0E.!....v...Q..i| -00000010 b1 0e ae c8 cc ba 84 29 c4 52 79 92 6c ff 4d d1 |.......).Ry.l.M.| -00000020 7c 21 72 25 8c 02 20 7f 29 7a 69 a3 f6 3e 0b ae ||!r%.. .)zi..>..| -00000030 8a 5d 38 a7 5b b5 46 02 ea ac 96 62 97 00 96 82 |.]8.[.F....b....| -00000040 4c 11 ff 0c 60 0d d4 |L...`..|" -"2019-07-20 02:40:50.102 UTC [cauthdsl] func2 -> DEBU 1ad6 0xc0012c9f50 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:50.102 UTC [cauthdsl] func1 -> DEBU 1ad7 0xc0012c9f50 gate 1563590450099718300 evaluation succeeds" -"2019-07-20 02:40:50.102 UTC [policies] Evaluate -> DEBU 1ad8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.102 UTC [policies] Evaluate -> DEBU 1ad9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1ada Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1adb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1adc Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1add == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:50.103 UTC [common.deliver] deliverBlocks -> DEBU 1ade [channel: businesschannel] Received seekInfo (0xc0011d52c0) start: > stop: > from 172.18.0.9:39290" -"2019-07-20 02:40:50.104 UTC [fsblkstorage] Next -> DEBU 1adf Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:50.104 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ae0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75919]" -"2019-07-20 02:40:50.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae1 Remaining bytes=[42868], Going to peek [8] bytes" -"2019-07-20 02:40:50.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae2 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" -"2019-07-20 02:40:50.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae3 blockbytes [3992] read from file [0]" -"2019-07-20 02:40:50.105 UTC [common.deliver] deliverBlocks -> DEBU 1ae4 [channel: businesschannel] Delivering block for (0xc0011d52c0) for 172.18.0.9:39290" -"2019-07-20 02:40:50.105 UTC [common.deliver] deliverBlocks -> DEBU 1ae5 [channel: businesschannel] Done delivering to 172.18.0.9:39290 for (0xc0011d52c0)" -"2019-07-20 02:40:50.106 UTC [fsblkstorage] waitForBlock -> DEBU 1ae6 Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:50.106 UTC [fsblkstorage] waitForBlock -> DEBU 1ae7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:50.106 UTC [common.deliver] Handle -> DEBU 1ae8 Waiting for new SeekInfo from 172.18.0.9:39290" -"2019-07-20 02:40:50.106 UTC [common.deliver] Handle -> DEBU 1ae9 Attempting to read seek info message from 172.18.0.9:39290" -"2019-07-20 02:40:50.114 UTC [common.deliver] Handle -> WARN 1aea Error reading from 172.18.0.9:39290: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:50.114 UTC [orderer.common.server] func1 -> DEBU 1aeb Closing Deliver stream" -"2019-07-20 02:40:50.114 UTC [comm.grpc.server] 1 -> INFO 1aec streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39290 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1555ms -"2019-07-20 02:40:50.115 UTC [grpc] infof -> DEBU 1aed transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:50.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aee Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" -"2019-07-20 02:40:50.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aef Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" -"2019-07-20 02:40:50.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1af0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.2µs " -"2019-07-20 02:40:50.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1af1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.8µs " -"2019-07-20 02:40:50.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1af2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:50.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1af3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:50.242 UTC [orderer.common.server] Deliver -> DEBU 1af4 Starting new Deliver handler" -"2019-07-20 02:40:50.242 UTC [common.deliver] Handle -> DEBU 1af5 Starting new deliver loop for 172.18.0.9:39292" -"2019-07-20 02:40:50.242 UTC [common.deliver] Handle -> DEBU 1af6 Attempting to read seek info message from 172.18.0.9:39292" -"2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1afa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.245 UTC [policies] Evaluate -> DEBU 1afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:50.245 UTC [cauthdsl] func1 -> DEBU 1afc 0xc00116c710 gate 1563590450245746300 evaluation starts" -"2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1afd 0xc00116c710 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1afe 0xc00116c710 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1aff 0xc00116c710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:50.247 UTC [cauthdsl] func2 -> DEBU 1b00 0xc00116c710 principal evaluation fails" -"2019-07-20 02:40:50.247 UTC [cauthdsl] func1 -> DEBU 1b01 0xc00116c710 gate 1563590450245746300 evaluation fails" -"2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b02 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:50.249 UTC [cauthdsl] func1 -> DEBU 1b05 0xc00116cf50 gate 1563590450249209100 evaluation starts" -"2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b06 0xc00116cf50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b07 0xc00116cf50 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b08 0xc00116cf50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:50.250 UTC [cauthdsl] func2 -> DEBU 1b09 0xc00116cf50 principal evaluation fails" -"2019-07-20 02:40:50.251 UTC [cauthdsl] func1 -> DEBU 1b0a 0xc00116cf50 gate 1563590450249209100 evaluation fails" -"2019-07-20 02:40:50.251 UTC [policies] Evaluate -> DEBU 1b0b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:50.252 UTC [policies] Evaluate -> DEBU 1b0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:50.252 UTC [policies] Evaluate -> DEBU 1b0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:50.252 UTC [cauthdsl] func1 -> DEBU 1b0e 0xc00116d790 gate 1563590450252617400 evaluation starts" -"2019-07-20 02:40:50.252 UTC [cauthdsl] func2 -> DEBU 1b0f 0xc00116d790 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b10 0xc00116d790 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b11 0xc00116d790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b12 0xc00116d790 principal evaluation fails" -"2019-07-20 02:40:50.253 UTC [cauthdsl] func1 -> DEBU 1b13 0xc00116d790 gate 1563590450252617400 evaluation fails" -"2019-07-20 02:40:50.254 UTC [policies] Evaluate -> DEBU 1b14 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:50.254 UTC [policies] Evaluate -> DEBU 1b15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:50.254 UTC [policies] func1 -> DEBU 1b16 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -"2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b17 Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.256 UTC [policies] Evaluate -> DEBU 1b1b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:50.256 UTC [cauthdsl] func1 -> DEBU 1b1c 0xc00117c480 gate 1563590450256362000 evaluation starts" -"2019-07-20 02:40:50.256 UTC [cauthdsl] func2 -> DEBU 1b1d 0xc00117c480 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.256 UTC [cauthdsl] func2 -> DEBU 1b1e 0xc00117c480 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.257 UTC [cauthdsl] func2 -> DEBU 1b1f 0xc00117c480 principal matched by identity 0" -"2019-07-20 02:40:50.257 UTC [msp.identity] Verify -> DEBU 1b20 Verify: digest = 00000000 ad 6d 6e 6f fb 90 19 a4 92 1d 11 87 3f 22 bc a5 |.mno........?"..| -00000010 da cd cf 6c e4 3c 34 dc fa 7b 28 ce 6c 77 a0 49 |...l.<4..{(.lw.I|" -"2019-07-20 02:40:50.258 UTC [msp.identity] Verify -> DEBU 1b21 Verify: sig = 00000000 30 45 02 21 00 b1 59 d2 0e 97 76 c6 47 00 47 38 |0E.!..Y...v.G.G8| -00000010 0a d5 e3 9e 61 ef 45 09 c4 7a fb 0d 57 1e 04 84 |....a.E..z..W...| -00000020 32 7a 3f 5d 34 02 20 0f d3 a3 bd 1e a2 e6 0b 9b |2z?]4. .........| -00000030 65 ea 40 ae 08 d8 7c d5 0e b7 6c 7e 92 7b cb 08 |e.@...|...l~.{..| -00000040 fc 9e 2e 0b d2 ff fe |.......|" -"2019-07-20 02:40:50.258 UTC [cauthdsl] func2 -> DEBU 1b22 0xc00117c480 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:50.259 UTC [cauthdsl] func1 -> DEBU 1b23 0xc00117c480 gate 1563590450256362000 evaluation succeeds" -"2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b24 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b25 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b26 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b27 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b28 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:50.261 UTC [common.deliver] deliverBlocks -> DEBU 1b2a [channel: businesschannel] Received seekInfo (0xc0011d57c0) start: > stop: > from 172.18.0.9:39292" -"2019-07-20 02:40:50.261 UTC [fsblkstorage] Next -> DEBU 1b2b Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:50.261 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b2c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" -"2019-07-20 02:40:50.261 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2d Remaining bytes=[38874], Going to peek [8] bytes" -"2019-07-20 02:40:50.261 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2e Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" -"2019-07-20 02:40:50.262 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2f blockbytes [3989] read from file [0]" -"2019-07-20 02:40:50.262 UTC [common.deliver] deliverBlocks -> DEBU 1b30 [channel: businesschannel] Delivering block for (0xc0011d57c0) for 172.18.0.9:39292" -"2019-07-20 02:40:50.262 UTC [common.deliver] deliverBlocks -> DEBU 1b31 [channel: businesschannel] Done delivering to 172.18.0.9:39292 for (0xc0011d57c0)" -"2019-07-20 02:40:50.263 UTC [fsblkstorage] waitForBlock -> DEBU 1b32 Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:50.263 UTC [fsblkstorage] waitForBlock -> DEBU 1b33 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:50.263 UTC [common.deliver] Handle -> DEBU 1b34 Waiting for new SeekInfo from 172.18.0.9:39292" -"2019-07-20 02:40:50.264 UTC [common.deliver] Handle -> DEBU 1b35 Attempting to read seek info message from 172.18.0.9:39292" -"2019-07-20 02:40:50.268 UTC [common.deliver] Handle -> WARN 1b36 Error reading from 172.18.0.9:39292: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:50.269 UTC [orderer.common.server] func1 -> DEBU 1b37 Closing Deliver stream" -"2019-07-20 02:40:50.269 UTC [comm.grpc.server] 1 -> INFO 1b38 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39292 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.0425ms -"2019-07-20 02:40:50.270 UTC [grpc] infof -> DEBU 1b39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:50.424 UTC [orderer.common.server] Deliver -> DEBU 1b3a Starting new Deliver handler" -"2019-07-20 02:40:50.424 UTC [common.deliver] Handle -> DEBU 1b3b Starting new deliver loop for 172.18.0.9:39294" -"2019-07-20 02:40:50.424 UTC [common.deliver] Handle -> DEBU 1b3c Attempting to read seek info message from 172.18.0.9:39294" -"2019-07-20 02:40:50.424 UTC [policies] Evaluate -> DEBU 1b3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:50.425 UTC [cauthdsl] func1 -> DEBU 1b42 0xc000c8cf80 gate 1563590450425970900 evaluation starts" -"2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b43 0xc000c8cf80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b44 0xc000c8cf80 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b45 0xc000c8cf80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" -"2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b46 0xc000c8cf80 principal evaluation fails" -"2019-07-20 02:40:50.427 UTC [cauthdsl] func1 -> DEBU 1b47 0xc000c8cf80 gate 1563590450425970900 evaluation fails" -"2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b48 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:50.427 UTC [cauthdsl] func1 -> DEBU 1b4b 0xc000c8d870 gate 1563590450427863700 evaluation starts" -"2019-07-20 02:40:50.428 UTC [cauthdsl] func2 -> DEBU 1b4c 0xc000c8d870 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.429 UTC [cauthdsl] func2 -> DEBU 1b4d 0xc000c8d870 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.429 UTC [cauthdsl] func2 -> DEBU 1b4e 0xc000c8d870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" -"2019-07-20 02:40:50.430 UTC [cauthdsl] func2 -> DEBU 1b4f 0xc000c8d870 principal evaluation fails" -"2019-07-20 02:40:50.430 UTC [cauthdsl] func1 -> DEBU 1b50 0xc000c8d870 gate 1563590450427863700 evaluation fails" -"2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b51 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:50.431 UTC [cauthdsl] func1 -> DEBU 1b54 0xc0002664e0 gate 1563590450431281500 evaluation starts" -"2019-07-20 02:40:50.431 UTC [cauthdsl] func2 -> DEBU 1b55 0xc0002664e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.431 UTC [cauthdsl] func2 -> DEBU 1b56 0xc0002664e0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.432 UTC [cauthdsl] func2 -> DEBU 1b57 0xc0002664e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" -"2019-07-20 02:40:50.432 UTC [cauthdsl] func2 -> DEBU 1b58 0xc0002664e0 principal evaluation fails" -"2019-07-20 02:40:50.432 UTC [cauthdsl] func1 -> DEBU 1b59 0xc0002664e0 gate 1563590450431281500 evaluation fails" -"2019-07-20 02:40:50.432 UTC [policies] Evaluate -> DEBU 1b5a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:50.433 UTC [policies] func1 -> DEBU 1b5c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" -"2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5d Signature set did not satisfy policy /Channel/Application/Readers" -"2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:50.434 UTC [policies] Evaluate -> DEBU 1b60 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.434 UTC [policies] Evaluate -> DEBU 1b61 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:50.436 UTC [cauthdsl] func1 -> DEBU 1b62 0xc000267480 gate 1563590450436160900 evaluation starts" -"2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b63 0xc000267480 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b64 0xc000267480 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b65 0xc000267480 principal matched by identity 0" -"2019-07-20 02:40:50.437 UTC [msp.identity] Verify -> DEBU 1b66 Verify: digest = 00000000 ba d9 a9 0b b2 e1 ef 9e e4 d8 a4 81 20 d2 5f 9a |............ ._.| -00000010 7a ec 35 c6 f3 41 58 f0 8f 89 6e c2 da 51 22 17 |z.5..AX...n..Q".|" -"2019-07-20 02:40:50.437 UTC [msp.identity] Verify -> DEBU 1b67 Verify: sig = 00000000 30 45 02 21 00 bd 6d c8 49 f3 f8 36 2d cd 65 b6 |0E.!..m.I..6-.e.| -00000010 f3 cf 80 28 9d a4 fb 93 4a d0 da 3c c8 18 c9 33 |...(....J..<...3| -00000020 7e c4 1c 3c 28 02 20 29 7b cc f8 2f f9 c8 e4 0d |~..<(. ){../....| -00000030 13 bd de 1c 1c c1 4d ea ad 83 a6 aa 2e 29 7d 6b |......M......)}k| -00000040 25 11 ec 4a 56 ff 9e |%..JV..|" -"2019-07-20 02:40:50.437 UTC [cauthdsl] func2 -> DEBU 1b68 0xc000267480 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:50.437 UTC [cauthdsl] func1 -> DEBU 1b69 0xc000267480 gate 1563590450436160900 evaluation succeeds" -"2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6c Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6e Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:50.440 UTC [common.deliver] deliverBlocks -> DEBU 1b70 [channel: businesschannel] Received seekInfo (0xc000b09180) start: > stop: > from 172.18.0.9:39294" -"2019-07-20 02:40:50.440 UTC [fsblkstorage] Next -> DEBU 1b71 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" -"2019-07-20 02:40:50.440 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b72 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" -"2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b73 Remaining bytes=[34883], Going to peek [8] bytes" -"2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b74 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" -"2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b75 blockbytes [34880] read from file [0]" -"2019-07-20 02:40:50.441 UTC [common.deliver] deliverBlocks -> DEBU 1b76 [channel: businesschannel] Delivering block for (0xc000b09180) for 172.18.0.9:39294" -"2019-07-20 02:40:50.441 UTC [common.deliver] deliverBlocks -> DEBU 1b77 [channel: businesschannel] Done delivering to 172.18.0.9:39294 for (0xc000b09180)" -"2019-07-20 02:40:50.442 UTC [common.deliver] Handle -> DEBU 1b78 Waiting for new SeekInfo from 172.18.0.9:39294" -"2019-07-20 02:40:50.442 UTC [common.deliver] Handle -> DEBU 1b79 Attempting to read seek info message from 172.18.0.9:39294" -"2019-07-20 02:40:50.442 UTC [fsblkstorage] waitForBlock -> DEBU 1b7a Came out of wait. maxAvailaBlockNumber=[6]" -"2019-07-20 02:40:50.442 UTC [fsblkstorage] waitForBlock -> DEBU 1b7b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" -"2019-07-20 02:40:50.443 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b7c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:50.443 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7d Sending msg of 28 bytes to 3 on channel testchainid took 21µs" -"2019-07-20 02:40:50.444 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " -"2019-07-20 02:40:50.450 UTC [grpc] infof -> DEBU 1b7f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:50.452 UTC [common.deliver] Handle -> WARN 1b80 Error reading from 172.18.0.9:39294: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:50.453 UTC [orderer.common.server] func1 -> DEBU 1b81 Closing Deliver stream" -"2019-07-20 02:40:50.454 UTC [comm.grpc.server] 1 -> INFO 1b82 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39294 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.2687ms -"2019-07-20 02:40:50.598 UTC [orderer.common.server] Deliver -> DEBU 1b83 Starting new Deliver handler" -"2019-07-20 02:40:50.599 UTC [common.deliver] Handle -> DEBU 1b84 Starting new deliver loop for 172.18.0.9:39296" -"2019-07-20 02:40:50.599 UTC [common.deliver] Handle -> DEBU 1b85 Attempting to read seek info message from 172.18.0.9:39296" -"2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:50.601 UTC [policies] Evaluate -> DEBU 1b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.601 UTC [policies] Evaluate -> DEBU 1b8a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:50.601 UTC [cauthdsl] func1 -> DEBU 1b8b 0xc000416ad0 gate 1563590450601392800 evaluation starts" -"2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8c 0xc000416ad0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8d 0xc000416ad0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8e 0xc000416ad0 principal matched by identity 0" -"2019-07-20 02:40:50.602 UTC [msp.identity] Verify -> DEBU 1b8f Verify: digest = 00000000 18 75 b6 fe 13 b8 0d a3 28 ca 3a 8e 58 a0 8f 5d |.u......(.:.X..]| -00000010 cf 0a a1 93 8d 44 2a 8d 85 57 7d c7 0b 3f 79 70 |.....D*..W}..?yp|" -"2019-07-20 02:40:50.602 UTC [msp.identity] Verify -> DEBU 1b90 Verify: sig = 00000000 30 44 02 20 5b 5f 71 aa fc cf 80 3b db ae e2 b2 |0D. [_q....;....| -00000010 68 8b a1 8c 4a 99 0a f9 48 80 d5 15 3e 2e 4f 84 |h...J...H...>.O.| -00000020 86 aa d1 a0 02 20 34 b6 2b ff 5f 55 74 08 13 e6 |..... 4.+._Ut...| -00000030 8d f1 eb a0 e8 83 e1 fe 7c 3f 35 02 ab 30 ef 55 |........|?5..0.U| -00000040 66 88 19 a7 b8 d9 |f.....|" -"2019-07-20 02:40:50.602 UTC [cauthdsl] func2 -> DEBU 1b91 0xc000416ad0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:50.603 UTC [cauthdsl] func1 -> DEBU 1b92 0xc000416ad0 gate 1563590450601392800 evaluation succeeds" -"2019-07-20 02:40:50.603 UTC [policies] Evaluate -> DEBU 1b93 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.603 UTC [policies] Evaluate -> DEBU 1b94 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b95 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b97 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:50.604 UTC [common.deliver] deliverBlocks -> DEBU 1b99 [channel: testchainid] Received seekInfo (0xc000986440) start: > stop: > from 172.18.0.9:39296" -"2019-07-20 02:40:50.605 UTC [fsblkstorage] Next -> DEBU 1b9a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-07-20 02:40:50.605 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b9b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -"2019-07-20 02:40:50.605 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9c Remaining bytes=[25835], Going to peek [8] bytes" -"2019-07-20 02:40:50.606 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9d Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -"2019-07-20 02:40:50.606 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9e blockbytes [25832] read from file [0]" -"2019-07-20 02:40:50.606 UTC [common.deliver] deliverBlocks -> DEBU 1b9f [channel: testchainid] Delivering block for (0xc000986440) for 172.18.0.9:39296" -"2019-07-20 02:40:50.607 UTC [common.deliver] deliverBlocks -> DEBU 1ba0 [channel: testchainid] Done delivering to 172.18.0.9:39296 for (0xc000986440)" -"2019-07-20 02:40:50.608 UTC [common.deliver] Handle -> DEBU 1ba1 Waiting for new SeekInfo from 172.18.0.9:39296" -"2019-07-20 02:40:50.608 UTC [common.deliver] Handle -> DEBU 1ba2 Attempting to read seek info message from 172.18.0.9:39296" -"2019-07-20 02:40:50.612 UTC [grpc] warningf -> DEBU 1ba3 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39296: read: connection reset by peer" -"2019-07-20 02:40:50.613 UTC [common.deliver] Handle -> WARN 1ba4 Error reading from 172.18.0.9:39296: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:50.613 UTC [orderer.common.server] func1 -> DEBU 1ba5 Closing Deliver stream" -"2019-07-20 02:40:50.613 UTC [comm.grpc.server] 1 -> INFO 1ba6 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39296 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.0914ms -"2019-07-20 02:40:50.614 UTC [grpc] infof -> DEBU 1ba7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:50.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba8 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" -"2019-07-20 02:40:50.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba9 Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" -"2019-07-20 02:40:50.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1baa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.1µs " -"2019-07-20 02:40:50.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.5µs " -"2019-07-20 02:40:50.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:50.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:50.737 UTC [orderer.common.server] Deliver -> DEBU 1bae Starting new Deliver handler" -"2019-07-20 02:40:50.737 UTC [common.deliver] Handle -> DEBU 1baf Starting new deliver loop for 172.18.0.9:39298" -"2019-07-20 02:40:50.737 UTC [common.deliver] Handle -> DEBU 1bb0 Attempting to read seek info message from 172.18.0.9:39298" -"2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:50.739 UTC [cauthdsl] func1 -> DEBU 1bb6 0xc000c72da0 gate 1563590450739121400 evaluation starts" -"2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb7 0xc000c72da0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb8 0xc000c72da0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb9 0xc000c72da0 principal matched by identity 0" -"2019-07-20 02:40:50.739 UTC [msp.identity] Verify -> DEBU 1bba Verify: digest = 00000000 0a 85 05 b7 b3 00 17 04 99 c7 db af d2 c3 fa 54 |...............T| -00000010 fb e6 80 c8 ad 25 fd 29 1b 75 cd 1f 1a 28 6b 5c |.....%.).u...(k\|" -"2019-07-20 02:40:50.740 UTC [msp.identity] Verify -> DEBU 1bbb Verify: sig = 00000000 30 44 02 20 76 30 8c 8a 34 aa cc 19 da a5 39 84 |0D. v0..4.....9.| -00000010 6f b6 91 5d 30 19 1c e3 79 62 1d b3 c8 4f 17 fe |o..]0...yb...O..| -00000020 bd 35 7f a0 02 20 3e 11 e1 63 74 50 df e6 34 0a |.5... >..ctP..4.| -00000030 28 7f 32 7f ee 06 3b 84 5e 93 73 d7 11 bd da 30 |(.2...;.^.s....0| -00000040 2c 92 62 a0 ec bc |,.b...|" -"2019-07-20 02:40:50.740 UTC [cauthdsl] func2 -> DEBU 1bbc 0xc000c72da0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:50.740 UTC [cauthdsl] func1 -> DEBU 1bbd 0xc000c72da0 gate 1563590450739121400 evaluation succeeds" -"2019-07-20 02:40:50.740 UTC [policies] Evaluate -> DEBU 1bbe Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.740 UTC [policies] Evaluate -> DEBU 1bbf == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc0 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc2 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:50.742 UTC [policies] Evaluate -> DEBU 1bc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:50.742 UTC [common.deliver] deliverBlocks -> DEBU 1bc4 [channel: testchainid] Received seekInfo (0xc000b09b40) start: > stop: > from 172.18.0.9:39298" -"2019-07-20 02:40:50.742 UTC [fsblkstorage] Next -> DEBU 1bc5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-07-20 02:40:50.742 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bc6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -"2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc7 Remaining bytes=[25835], Going to peek [8] bytes" -"2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc8 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -"2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc9 blockbytes [25832] read from file [0]" -"2019-07-20 02:40:50.743 UTC [common.deliver] deliverBlocks -> DEBU 1bca [channel: testchainid] Delivering block for (0xc000b09b40) for 172.18.0.9:39298" -"2019-07-20 02:40:50.744 UTC [common.deliver] deliverBlocks -> DEBU 1bcb [channel: testchainid] Done delivering to 172.18.0.9:39298 for (0xc000b09b40)" -"2019-07-20 02:40:50.744 UTC [common.deliver] Handle -> DEBU 1bcc Waiting for new SeekInfo from 172.18.0.9:39298" -"2019-07-20 02:40:50.745 UTC [common.deliver] Handle -> DEBU 1bcd Attempting to read seek info message from 172.18.0.9:39298" -"2019-07-20 02:40:50.747 UTC [policies] Evaluate -> DEBU 1bce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:50.749 UTC [cauthdsl] func1 -> DEBU 1bd3 0xc000bad5a0 gate 1563590450749082200 evaluation starts" -"2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd4 0xc000bad5a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd5 0xc000bad5a0 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd6 0xc000bad5a0 principal matched by identity 0" -"2019-07-20 02:40:50.749 UTC [msp.identity] Verify -> DEBU 1bd7 Verify: digest = 00000000 24 51 1f a6 fb 56 50 01 c8 df 3b 5d b8 cd bc 4a |$Q...VP...;]...J| -00000010 39 ed 4d b5 2d ef 5f 2f 5c 7f 3e 53 e0 d5 57 40 |9.M.-._/\.>S..W@|" -"2019-07-20 02:40:50.750 UTC [msp.identity] Verify -> DEBU 1bd8 Verify: sig = 00000000 30 45 02 21 00 f6 d1 cd 4c cc bc 03 bc 7d 3b 55 |0E.!....L....};U| -00000010 04 a9 aa 70 45 43 74 f5 8a 5e af 01 fa 0e 60 4e |...pECt..^....`N| -00000020 d3 bc c0 90 c7 02 20 2d d3 23 31 73 65 16 d9 6d |...... -.#1se..m| -00000030 f6 da 22 90 64 ee d6 00 b2 bf 3b 9f 6b 12 59 73 |..".d.....;.k.Ys| -00000040 97 36 5e 6c 8e fb 12 |.6^l...|" -"2019-07-20 02:40:50.750 UTC [cauthdsl] func2 -> DEBU 1bd9 0xc000bad5a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:50.750 UTC [cauthdsl] func1 -> DEBU 1bda 0xc000bad5a0 gate 1563590450749082200 evaluation succeeds" -"2019-07-20 02:40:50.750 UTC [policies] Evaluate -> DEBU 1bdb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdd Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdf Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1be0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:50.752 UTC [common.deliver] deliverBlocks -> DEBU 1be1 [channel: testchainid] Received seekInfo (0xc000986b00) start: > stop: > from 172.18.0.9:39298" -"2019-07-20 02:40:50.752 UTC [fsblkstorage] Next -> DEBU 1be2 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-07-20 02:40:50.752 UTC [fsblkstorage] newBlockfileStream -> DEBU 1be3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-07-20 02:40:50.752 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be4 Remaining bytes=[44254], Going to peek [8] bytes" -"2019-07-20 02:40:50.752 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be5 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:40:50.753 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be6 blockbytes [18416] read from file [0]" -"2019-07-20 02:40:50.754 UTC [common.deliver] deliverBlocks -> DEBU 1be7 [channel: testchainid] Delivering block for (0xc000986b00) for 172.18.0.9:39298" -"2019-07-20 02:40:50.754 UTC [common.deliver] deliverBlocks -> DEBU 1be8 [channel: testchainid] Done delivering to 172.18.0.9:39298 for (0xc000986b00)" -"2019-07-20 02:40:50.754 UTC [common.deliver] Handle -> DEBU 1be9 Waiting for new SeekInfo from 172.18.0.9:39298" -"2019-07-20 02:40:50.754 UTC [common.deliver] Handle -> DEBU 1bea Attempting to read seek info message from 172.18.0.9:39298" -"2019-07-20 02:40:50.761 UTC [common.deliver] Handle -> WARN 1beb Error reading from 172.18.0.9:39298: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:50.761 UTC [orderer.common.server] func1 -> DEBU 1bec Closing Deliver stream" -"2019-07-20 02:40:50.761 UTC [comm.grpc.server] 1 -> INFO 1bed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39298 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.7807ms -"2019-07-20 02:40:50.762 UTC [grpc] infof -> DEBU 1bee transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:50.852 UTC [orderer.common.server] Deliver -> DEBU 1bef Starting new Deliver handler" -"2019-07-20 02:40:50.853 UTC [common.deliver] Handle -> DEBU 1bf0 Starting new deliver loop for 172.18.0.9:39300" -"2019-07-20 02:40:50.853 UTC [common.deliver] Handle -> DEBU 1bf1 Attempting to read seek info message from 172.18.0.9:39300" -"2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:50.854 UTC [policies] Evaluate -> DEBU 1bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:50.854 UTC [policies] Evaluate -> DEBU 1bf6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:50.854 UTC [cauthdsl] func1 -> DEBU 1bf7 0xc0001c8150 gate 1563590450854258500 evaluation starts" -"2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc0001c8150 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bf9 0xc0001c8150 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bfa 0xc0001c8150 principal matched by identity 0" -"2019-07-20 02:40:50.854 UTC [msp.identity] Verify -> DEBU 1bfb Verify: digest = 00000000 5f 0c 1b 58 f8 c4 de 8f 3c ff 81 9e cb f7 02 e0 |_..X....<.......| -00000010 72 2e bd 2a 6e 32 fe 5a 5a 13 92 3c 69 3f 43 26 |r..*n2.ZZ.. DEBU 1bfc Verify: sig = 00000000 30 45 02 21 00 a4 ea 63 e2 8a c8 03 41 c9 75 59 |0E.!...c....A.uY| -00000010 dc 1c df 93 8b 21 60 2c f7 37 e1 df ae b8 e4 52 |.....!`,.7.....R| -00000020 8a f4 c7 ba 44 02 20 7a 7c 9d 5b 85 fa d6 86 57 |....D. z|.[....W| -00000030 0f 89 8e c0 86 35 4d 32 04 29 5d 28 3b 7c f4 06 |.....5M2.)](;|..| -00000040 71 52 90 03 1d 86 9b |qR.....|" -"2019-07-20 02:40:50.855 UTC [cauthdsl] func2 -> DEBU 1bfd 0xc0001c8150 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:50.855 UTC [cauthdsl] func1 -> DEBU 1bfe 0xc0001c8150 gate 1563590450854258500 evaluation succeeds" -"2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1bff Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c00 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c01 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c03 Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:50.856 UTC [policies] Evaluate -> DEBU 1c04 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:50.856 UTC [common.deliver] deliverBlocks -> DEBU 1c05 [channel: testchainid] Received seekInfo (0xc000ce2280) start: > stop: > from 172.18.0.9:39300" -"2019-07-20 02:40:50.856 UTC [fsblkstorage] Next -> DEBU 1c06 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-07-20 02:40:50.856 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c07 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" -"2019-07-20 02:40:50.856 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c08 Remaining bytes=[44254], Going to peek [8] bytes" -"2019-07-20 02:40:50.856 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c09 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" -"2019-07-20 02:40:50.857 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c0a blockbytes [18416] read from file [0]" -"2019-07-20 02:40:50.857 UTC [common.deliver] deliverBlocks -> DEBU 1c0b [channel: testchainid] Delivering block for (0xc000ce2280) for 172.18.0.9:39300" -"2019-07-20 02:40:50.858 UTC [common.deliver] deliverBlocks -> DEBU 1c0c [channel: testchainid] Done delivering to 172.18.0.9:39300 for (0xc000ce2280)" -"2019-07-20 02:40:50.858 UTC [common.deliver] Handle -> DEBU 1c0d Waiting for new SeekInfo from 172.18.0.9:39300" -"2019-07-20 02:40:50.858 UTC [common.deliver] Handle -> DEBU 1c0e Attempting to read seek info message from 172.18.0.9:39300" -"2019-07-20 02:40:50.866 UTC [common.deliver] Handle -> WARN 1c0f Error reading from 172.18.0.9:39300: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:50.866 UTC [orderer.common.server] func1 -> DEBU 1c10 Closing Deliver stream" -"2019-07-20 02:40:50.866 UTC [comm.grpc.server] 1 -> INFO 1c11 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39300 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8498ms -"2019-07-20 02:40:50.867 UTC [grpc] infof -> DEBU 1c12 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:50.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c13 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:50.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c14 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" -"2019-07-20 02:40:50.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " -"2019-07-20 02:40:51.035 UTC [orderer.common.server] Deliver -> DEBU 1c16 Starting new Deliver handler" -"2019-07-20 02:40:51.035 UTC [common.deliver] Handle -> DEBU 1c17 Starting new deliver loop for 172.18.0.9:39302" -"2019-07-20 02:40:51.035 UTC [common.deliver] Handle -> DEBU 1c18 Attempting to read seek info message from 172.18.0.9:39302" -"2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" -"2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" -"2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:51.037 UTC [policies] Evaluate -> DEBU 1c1d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" -"2019-07-20 02:40:51.037 UTC [cauthdsl] func1 -> DEBU 1c1e 0xc000373230 gate 1563590451037212400 evaluation starts" -"2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c1f 0xc000373230 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c20 0xc000373230 processing identity 0 with bytes of fd0280" -"2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c21 0xc000373230 principal matched by identity 0" -"2019-07-20 02:40:51.037 UTC [msp.identity] Verify -> DEBU 1c22 Verify: digest = 00000000 ec 0b 12 ab db e7 5a c0 3b 3a 4e 1d 14 80 ee 96 |......Z.;:N.....| -00000010 ec c8 cd 83 92 dd 48 1f a3 8f f4 e2 62 c9 83 30 |......H.....b..0|" -"2019-07-20 02:40:51.038 UTC [msp.identity] Verify -> DEBU 1c23 Verify: sig = 00000000 30 45 02 21 00 cf ad e9 8e 60 13 07 9a cb 59 40 |0E.!.....`....Y@| -00000010 ce 5a 42 f8 df 96 f6 5f b3 a6 76 32 77 dd 56 db |.ZB...._..v2w.V.| -00000020 ac 94 17 4c 1b 02 20 1e 45 13 53 e0 a6 7e 1d 55 |...L.. .E.S..~.U| -00000030 65 3d 08 38 dd 63 ff b1 e8 a3 1a 7c 58 52 1a 25 |e=.8.c.....|XR.%| -00000040 14 16 ee 56 dc fd 44 |...V..D|" -"2019-07-20 02:40:51.038 UTC [cauthdsl] func2 -> DEBU 1c24 0xc000373230 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:51.038 UTC [cauthdsl] func1 -> DEBU 1c25 0xc000373230 gate 1563590451037212400 evaluation succeeds" -"2019-07-20 02:40:51.038 UTC [policies] Evaluate -> DEBU 1c26 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c27 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c28 Signature set satisfies policy /Channel/Orderer/Readers" -"2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" -"2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c2a Signature set satisfies policy /Channel/Readers" -"2019-07-20 02:40:51.040 UTC [policies] Evaluate -> DEBU 1c2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" -"2019-07-20 02:40:51.040 UTC [common.deliver] deliverBlocks -> DEBU 1c2c [channel: testchainid] Received seekInfo (0xc000ce2c40) start: > stop: > from 172.18.0.9:39302" -"2019-07-20 02:40:51.041 UTC [fsblkstorage] Next -> DEBU 1c2d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" -"2019-07-20 02:40:51.041 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c2e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" -"2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c2f Remaining bytes=[25835], Going to peek [8] bytes" -"2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c30 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" -"2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c31 blockbytes [25832] read from file [0]" -"2019-07-20 02:40:51.043 UTC [common.deliver] deliverBlocks -> DEBU 1c32 [channel: testchainid] Delivering block for (0xc000ce2c40) for 172.18.0.9:39302" -"2019-07-20 02:40:51.043 UTC [common.deliver] deliverBlocks -> DEBU 1c33 [channel: testchainid] Done delivering to 172.18.0.9:39302 for (0xc000ce2c40)" -"2019-07-20 02:40:51.044 UTC [common.deliver] Handle -> DEBU 1c34 Waiting for new SeekInfo from 172.18.0.9:39302" -"2019-07-20 02:40:51.044 UTC [common.deliver] Handle -> DEBU 1c35 Attempting to read seek info message from 172.18.0.9:39302" -"2019-07-20 02:40:51.050 UTC [common.deliver] Handle -> WARN 1c36 Error reading from 172.18.0.9:39302: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:51.050 UTC [orderer.common.server] func1 -> DEBU 1c37 Closing Deliver stream" -"2019-07-20 02:40:51.051 UTC [comm.grpc.server] 1 -> INFO 1c38 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39302 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.9191ms -"2019-07-20 02:40:51.052 UTC [grpc] infof -> DEBU 1c39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:51.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3a Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" -"2019-07-20 02:40:51.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3b Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" -"2019-07-20 02:40:51.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.9µs " -"2019-07-20 02:40:51.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.3µs " -"2019-07-20 02:40:51.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:51.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:51.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c40 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:51.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c41 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" -"2019-07-20 02:40:51.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c42 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.1µs " -"2019-07-20 02:40:51.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c43 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" -"2019-07-20 02:40:51.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c44 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" -"2019-07-20 02:40:51.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " -"2019-07-20 02:40:51.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.4µs " -"2019-07-20 02:40:51.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c47 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:51.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c48 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:51.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c49 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:51.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4a Sending msg of 28 bytes to 3 on channel testchainid took 10.6µs" -"2019-07-20 02:40:51.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.1µs " -"2019-07-20 02:40:52.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4c Sending msg of 28 bytes to 2 on channel businesschannel took 36.4µs" -"2019-07-20 02:40:52.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4d Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" -"2019-07-20 02:40:52.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 395.2µs " -"2019-07-20 02:40:52.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3487ms " -"2019-07-20 02:40:52.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c50 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:52.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c51 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:52.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c52 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:52.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c53 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" -"2019-07-20 02:40:52.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.5µs " -"2019-07-20 02:40:52.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c55 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" -"2019-07-20 02:40:52.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c56 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" -"2019-07-20 02:40:52.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.8µs " -"2019-07-20 02:40:52.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.8µs " -"2019-07-20 02:40:52.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c59 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:52.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:52.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:52.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5c Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" -"2019-07-20 02:40:52.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.8µs " -"2019-07-20 02:40:53.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5e Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" -"2019-07-20 02:40:53.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5f Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" -"2019-07-20 02:40:53.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.4µs " -"2019-07-20 02:40:53.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c61 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:53.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.5291ms " -"2019-07-20 02:40:53.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c63 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:53.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c64 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:53.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c65 Sending msg of 28 bytes to 3 on channel testchainid took 740µs" -"2019-07-20 02:40:53.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " -"2019-07-20 02:40:53.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c67 Sending msg of 28 bytes to 2 on channel businesschannel took 37.2µs" -"2019-07-20 02:40:53.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c68 Sending msg of 28 bytes to 3 on channel businesschannel took 26.4µs" -"2019-07-20 02:40:53.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 225µs " -"2019-07-20 02:40:53.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.8µs " -"2019-07-20 02:40:53.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:53.697 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:53.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:53.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c6e Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" -"2019-07-20 02:40:53.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.1µs " -"2019-07-20 02:40:54.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c70 Sending msg of 28 bytes to 2 on channel businesschannel took 30.1µs" -"2019-07-20 02:40:54.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c71 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" -"2019-07-20 02:40:54.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.2µs " -"2019-07-20 02:40:54.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.3µs " -"2019-07-20 02:40:54.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c74 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:54.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c75 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:54.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:54.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c77 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" -"2019-07-20 02:40:54.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60µs " -"2019-07-20 02:40:54.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c79 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" -"2019-07-20 02:40:54.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c7a Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" -"2019-07-20 02:40:54.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " -"2019-07-20 02:40:54.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 36.8µs " -"2019-07-20 02:40:54.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:54.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:54.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:54.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c80 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" -"2019-07-20 02:40:54.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.5µs " -"2019-07-20 02:40:55.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c82 Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" -"2019-07-20 02:40:55.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c83 Sending msg of 28 bytes to 2 on channel businesschannel took 10.9µs" -"2019-07-20 02:40:55.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.8µs " -"2019-07-20 02:40:55.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.2µs " -"2019-07-20 02:40:55.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c86 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:55.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c87 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:55.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c88 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:55.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c89 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" -"2019-07-20 02:40:55.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.6µs " -"2019-07-20 02:40:55.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c8b Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" -"2019-07-20 02:40:55.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c8c Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" -"2019-07-20 02:40:55.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.5µs " -"2019-07-20 02:40:55.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.1µs " -"2019-07-20 02:40:55.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c8f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:55.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c90 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:55.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:55.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c92 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" -"2019-07-20 02:40:55.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59µs " -"2019-07-20 02:40:56.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c94 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" -"2019-07-20 02:40:56.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c95 Sending msg of 28 bytes to 3 on channel businesschannel took 10.1µs" -"2019-07-20 02:40:56.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " -"2019-07-20 02:40:56.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.7µs " -"2019-07-20 02:40:56.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c98 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:56.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c99 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:56.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:56.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 288.1µs " -"2019-07-20 02:40:56.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9c Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" -"2019-07-20 02:40:56.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9d Sending msg of 28 bytes to 2 on channel businesschannel took 50µs" -"2019-07-20 02:40:56.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9e Sending msg of 28 bytes to 3 on channel businesschannel took 47.3µs" -"2019-07-20 02:40:56.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481.9µs " -"2019-07-20 02:40:56.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.7µs " -"2019-07-20 02:40:56.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca1 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:56.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:56.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:56.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca4 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" -"2019-07-20 02:40:56.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.9µs " -"2019-07-20 02:40:57.197 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" -"2019-07-20 02:40:57.198 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca7 Sending msg of 28 bytes to 3 on channel businesschannel took 28.6µs" -"2019-07-20 02:40:57.199 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 398.3µs " -"2019-07-20 02:40:57.199 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 258.4µs " -"2019-07-20 02:40:57.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1caa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:57.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cab Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:57.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cac Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:57.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cad Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" -"2019-07-20 02:40:57.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " -"2019-07-20 02:40:57.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1caf Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" -"2019-07-20 02:40:57.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb0 Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" -"2019-07-20 02:40:57.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.1µs " -"2019-07-20 02:40:57.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.3µs " -"2019-07-20 02:40:57.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:57.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:57.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:57.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb6 Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" -"2019-07-20 02:40:57.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.5µs " -"2019-07-20 02:40:58.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb8 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" -"2019-07-20 02:40:58.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb9 Sending msg of 28 bytes to 3 on channel businesschannel took 61.8µs" -"2019-07-20 02:40:58.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.5µs " -"2019-07-20 02:40:58.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192µs " -"2019-07-20 02:40:58.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:58.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:58.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:58.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cbf Sending msg of 28 bytes to 3 on channel testchainid took 39.8µs" -"2019-07-20 02:40:58.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 347.1µs " -"2019-07-20 02:40:58.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc1 Sending msg of 28 bytes to 2 on channel businesschannel took 29µs" -"2019-07-20 02:40:58.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc2 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" -"2019-07-20 02:40:58.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.6µs " -"2019-07-20 02:40:58.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 535.4µs " -"2019-07-20 02:40:58.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:58.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:58.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:58.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc8 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" -"2019-07-20 02:40:58.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3711ms " -"2019-07-20 02:40:59.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cca Sending msg of 28 bytes to 2 on channel businesschannel took 52.2µs" -"2019-07-20 02:40:59.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ccb Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" -"2019-07-20 02:40:59.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.2µs " -"2019-07-20 02:40:59.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.8µs " -"2019-07-20 02:40:59.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cce Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:59.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ccf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:59.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:59.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd1 Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" -"2019-07-20 02:40:59.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " -"2019-07-20 02:40:59.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd3 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" -"2019-07-20 02:40:59.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd4 Sending msg of 28 bytes to 3 on channel businesschannel took 10.8µs" -"2019-07-20 02:40:59.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.5µs " -"2019-07-20 02:40:59.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3069ms " -"2019-07-20 02:40:59.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:59.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:40:59.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:40:59.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cda Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" -"2019-07-20 02:40:59.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0973ms " -"2019-07-20 02:41:00.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdc Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" -"2019-07-20 02:41:00.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdd Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" -"2019-07-20 02:41:00.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " -"2019-07-20 02:41:00.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 43.5µs " -"2019-07-20 02:41:00.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:41:00.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce1 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:41:00.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:41:00.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce3 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" -"2019-07-20 02:41:00.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " -"2019-07-20 02:41:00.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce5 Sending msg of 28 bytes to 2 on channel businesschannel took 156.7µs" -"2019-07-20 02:41:00.660 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 279.6µs " -"2019-07-20 02:41:00.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:41:00.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 438.8µs " -"2019-07-20 02:41:00.662 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce8 Sending msg of 28 bytes to 3 on channel businesschannel took 769.5µs" -"2019-07-20 02:41:00.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cea Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:41:00.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ceb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:41:00.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cec Sending msg of 28 bytes to 3 on channel testchainid took 15µs" -"2019-07-20 02:41:00.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ced Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.032ms " -"2019-07-20 02:41:01.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cee Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" -"2019-07-20 02:41:01.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cef Sending msg of 28 bytes to 3 on channel businesschannel took 93.3µs" -"2019-07-20 02:41:01.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.2µs " -"2019-07-20 02:41:01.156 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.7µs " -"2019-07-20 02:41:01.157 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:41:01.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:41:01.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:41:01.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf5 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" -"2019-07-20 02:41:01.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.1µs " -"2019-07-20 02:41:01.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf7 Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" -"2019-07-20 02:41:01.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf8 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" -"2019-07-20 02:41:01.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.2µs " -"2019-07-20 02:41:01.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " -"2019-07-20 02:41:01.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:41:01.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:41:01.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:41:01.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfe Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" -"2019-07-20 02:41:01.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.1µs " -"2019-07-20 02:41:02.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d00 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" -"2019-07-20 02:41:02.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d01 Sending msg of 28 bytes to 3 on channel businesschannel took 7µs" -"2019-07-20 02:41:02.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66µs " -"2019-07-20 02:41:02.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.9µs " -"2019-07-20 02:41:02.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d04 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:41:02.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d05 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" -"2019-07-20 02:41:02.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" -"2019-07-20 02:41:02.404 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d07 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" -"2019-07-20 02:41:02.404 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320.7µs " +"2019-09-24 00:25:06.894 UTC [msp] Validate -> DEBU bac MSP OrdererMSP validating identity" +"2019-09-24 00:25:06.894 UTC [common.channelconfig] NewStandardValues -> DEBU bad Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:25:06.894 UTC [common.channelconfig] initializeProtosStruct -> DEBU bae Processing field: ACLs" +"2019-09-24 00:25:06.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU baf Processing field: Capabilities" +"2019-09-24 00:25:06.895 UTC [common.channelconfig] NewStandardValues -> DEBU bb0 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:06.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU bb1 Processing field: AnchorPeers" +"2019-09-24 00:25:06.895 UTC [common.channelconfig] NewStandardValues -> DEBU bb2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:06.895 UTC [common.channelconfig] initializeProtosStruct -> DEBU bb3 Processing field: MSP" +"2019-09-24 00:25:06.896 UTC [common.channelconfig] Validate -> DEBU bb4 Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:25:06.896 UTC [common.channelconfig] validateMSP -> DEBU bb5 Setting up MSP for org Org1MSP" +"2019-09-24 00:25:06.896 UTC [msp] newBccspMsp -> DEBU bb6 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:06.896 UTC [msp] New -> DEBU bb7 Creating Cache-MSP instance" +"2019-09-24 00:25:06.896 UTC [msp] Setup -> DEBU bb8 Setting up MSP instance Org1MSP" +"2019-09-24 00:25:06.897 UTC [msp.identity] newIdentity -> DEBU bb9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.897 UTC [msp.identity] newIdentity -> DEBU bba Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.907 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU bbb Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:25:06.908 UTC [msp] Validate -> DEBU bbc MSP Org1MSP validating identity" +"2019-09-24 00:25:06.908 UTC [msp] getCertificationChain -> DEBU bbd MSP Org1MSP getting certification chain" +"2019-09-24 00:25:06.908 UTC [msp] hasOURole -> DEBU bbe MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:25:06.908 UTC [msp] getCertificationChain -> DEBU bbf MSP Org1MSP getting certification chain" +"2019-09-24 00:25:06.908 UTC [common.channelconfig] NewStandardValues -> DEBU bc0 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:06.908 UTC [common.channelconfig] initializeProtosStruct -> DEBU bc1 Processing field: AnchorPeers" +"2019-09-24 00:25:06.908 UTC [common.channelconfig] NewStandardValues -> DEBU bc2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:06.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU bc3 Processing field: MSP" +"2019-09-24 00:25:06.909 UTC [common.channelconfig] Validate -> DEBU bc4 Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 00:25:06.909 UTC [common.channelconfig] validateMSP -> DEBU bc5 Setting up MSP for org Org2MSP" +"2019-09-24 00:25:06.909 UTC [msp] newBccspMsp -> DEBU bc6 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:06.909 UTC [msp] New -> DEBU bc7 Creating Cache-MSP instance" +"2019-09-24 00:25:06.909 UTC [msp] Setup -> DEBU bc8 Setting up MSP instance Org2MSP" +"2019-09-24 00:25:06.909 UTC [msp.identity] newIdentity -> DEBU bc9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.910 UTC [msp.identity] newIdentity -> DEBU bca Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.911 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU bcb Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:25:06.911 UTC [msp] Validate -> DEBU bcc MSP Org2MSP validating identity" +"2019-09-24 00:25:06.911 UTC [msp] getCertificationChain -> DEBU bcd MSP Org2MSP getting certification chain" +"2019-09-24 00:25:06.912 UTC [msp] hasOURole -> DEBU bce MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:25:06.912 UTC [msp] getCertificationChain -> DEBU bcf MSP Org2MSP getting certification chain" +"2019-09-24 00:25:06.912 UTC [msp] Setup -> DEBU bd0 Setting up the MSP manager (3 msps)" +"2019-09-24 00:25:06.912 UTC [msp] Setup -> DEBU bd1 MSP manager setup complete, setup 3 msps" +"2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd5 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd6 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd7 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd8 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bd9 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:25:06.912 UTC [policies] NewManagerImpl -> DEBU bda Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU bdb Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU bdc Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU bdd Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU bde Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU bdf Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be0 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be1 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be2 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be3 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be4 Proposed new policy Readers for Channel/Application" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be5 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be6 Proposed new policy Readers for Channel" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be7 Proposed new policy Writers for Channel" +"2019-09-24 00:25:06.913 UTC [policies] NewManagerImpl -> DEBU be8 Proposed new policy Admins for Channel" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU be9 Adding to config map: [Group] /Channel" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bea Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU beb Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bec Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bed Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf2 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:25:06.914 UTC [common.configtx] addToMap -> DEBU bf5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bf6 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bf7 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bf8 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bf9 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bfa Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bfb Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bfc Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bfd Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bfe Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU bff Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c00 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c01 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c02 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c03 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c04 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c05 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c06 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:06.915 UTC [common.configtx] addToMap -> DEBU c07 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c08 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c09 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c0a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c0b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c0c Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c0d Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:25:06.916 UTC [common.configtx] addToMap -> DEBU c0e Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:25:06.917 UTC [common.configtx] addToMap -> DEBU c0f Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:25:06.917 UTC [common.configtx] addToMap -> DEBU c10 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:25:06.917 UTC [common.configtx] addToMap -> DEBU c11 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:25:06.918 UTC [common.configtx] addToMap -> DEBU c12 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:25:06.918 UTC [common.configtx] addToMap -> DEBU c13 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:25:06.918 UTC [common.configtx] addToMap -> DEBU c14 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:25:06.918 UTC [common.configtx] addToMap -> DEBU c15 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:25:06.918 UTC [common.configtx] addToMap -> DEBU c16 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:25:06.918 UTC [common.channelconfig] LogSanityChecks -> DEBU c17 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:25:06.918 UTC [common.channelconfig] LogSanityChecks -> DEBU c18 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c19 Manager Channel looking up path [Application]" +"2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c1a Manager Channel has managers Orderer" +"2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c1b Manager Channel has managers Application" +"2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c1c Manager Channel/Application looking up path []" +"2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c1d Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:06.918 UTC [policies] Manager -> DEBU c1e Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:06.919 UTC [common.channelconfig] LogSanityChecks -> DEBU c1f As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 00:25:06.919 UTC [common.channelconfig] LogSanityChecks -> DEBU c20 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 00:25:06.919 UTC [common.channelconfig] LogSanityChecks -> DEBU c21 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 00:25:06.919 UTC [policies] Manager -> DEBU c22 Manager Channel looking up path [Orderer]" +"2019-09-24 00:25:06.919 UTC [policies] Manager -> DEBU c23 Manager Channel has managers Orderer" +"2019-09-24 00:25:06.919 UTC [policies] Manager -> DEBU c24 Manager Channel has managers Application" +"2019-09-24 00:25:06.919 UTC [policies] Manager -> DEBU c25 Manager Channel/Orderer looking up path []" +"2019-09-24 00:25:06.919 UTC [policies] Manager -> DEBU c26 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:25:06.919 UTC [common.channelconfig] LogSanityChecks -> DEBU c27 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:25:06.920 UTC [common.channelconfig] LogSanityChecks -> DEBU c28 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:25:06.920 UTC [common.channelconfig] LogSanityChecks -> DEBU c29 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:25:06.920 UTC [common.channelconfig] LogSanityChecks -> DEBU c2a As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:25:06.920 UTC [common.capabilities] Supported -> DEBU c2b Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:06.920 UTC [common.capabilities] Supported -> DEBU c2c Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:06.920 UTC [msp] GetDefaultSigningIdentity -> DEBU c2d Obtaining default signing identity" +"2019-09-24 00:25:06.920 UTC [msp] GetDefaultSigningIdentity -> DEBU c2e Obtaining default signing identity" +"2019-09-24 00:25:06.920 UTC [msp.identity] Sign -> DEBU c2f Sign: plaintext: 0AD2060A1B08011A0608E2C4A5EC0522...6F5DC62E281004EFF93E07B72997A710 " +"2019-09-24 00:25:06.921 UTC [msp.identity] Sign -> DEBU c30 Sign: digest: 1969A979A8645A0C78D06011EA0C33C3D217D73C65FEC1EA3C0F0FFA411ED65F " +"2019-09-24 00:25:06.921 UTC [policies] Evaluate -> DEBU c31 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 00:25:06.921 UTC [policies] Evaluate -> DEBU c32 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:06.921 UTC [policies] Evaluate -> DEBU c33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 00:25:06.921 UTC [policies] Evaluate -> DEBU c34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:06.921 UTC [policies] Evaluate -> DEBU c35 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:25:06.921 UTC [msp] DeserializeIdentity -> DEBU c36 Obtaining identity" +"2019-09-24 00:25:06.921 UTC [msp.identity] newIdentity -> DEBU c37 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.922 UTC [cauthdsl] func1 -> DEBU c38 0xc001164020 gate 1569284706922227300 evaluation starts" +"2019-09-24 00:25:06.922 UTC [cauthdsl] func2 -> DEBU c39 0xc001164020 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:06.922 UTC [cauthdsl] func2 -> DEBU c3a 0xc001164020 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:06.922 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c3b Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 00:25:06.922 UTC [msp] Validate -> DEBU c3c MSP OrdererMSP validating identity" +"2019-09-24 00:25:06.922 UTC [cauthdsl] func2 -> DEBU c3d 0xc001164020 principal matched by identity 0" +"2019-09-24 00:25:06.922 UTC [msp.identity] Verify -> DEBU c3e Verify: digest = 00000000 19 69 a9 79 a8 64 5a 0c 78 d0 60 11 ea 0c 33 c3 |.i.y.dZ.x.`...3.| +00000010 d2 17 d7 3c 65 fe c1 ea 3c 0f 0f fa 41 1e d6 5f |... DEBU c3f Verify: sig = 00000000 30 44 02 20 57 8a a0 c1 82 87 03 f9 fb 2b 7f ba |0D. W........+..| +00000010 1a 89 9a c2 48 7a 25 b3 79 92 cd 9d 9b 5f d1 3b |....Hz%.y...._.;| +00000020 fb f7 76 34 02 20 17 6f c5 03 55 a0 55 88 4c e9 |..v4. .o..U.U.L.| +00000030 eb df 54 19 21 e2 6c 02 7d cf 7b 6f d2 a7 2e e6 |..T.!.l.}.{o....| +00000040 b5 35 1b 9c 5d 9a |.5..].|" +"2019-09-24 00:25:06.923 UTC [cauthdsl] func2 -> DEBU c40 0xc001164020 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:06.923 UTC [cauthdsl] func1 -> DEBU c41 0xc001164020 gate 1569284706922227300 evaluation succeeds" +"2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c42 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c43 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c44 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c45 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c46 Signature set satisfies policy /Channel/Writers" +"2019-09-24 00:25:06.923 UTC [policies] Evaluate -> DEBU c47 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 00:25:06.924 UTC [orderer.common.msgprocessor] Apply -> DEBU c48 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-09-24 00:25:06.924 UTC [common.channelconfig] NewStandardValues -> DEBU c49 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c4a Processing field: HashingAlgorithm" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c4b Processing field: BlockDataHashingStructure" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c4c Processing field: OrdererAddresses" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c4d Processing field: Consortium" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c4e Processing field: Capabilities" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] NewStandardValues -> DEBU c4f Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c50 Processing field: ConsensusType" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c51 Processing field: BatchSize" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c52 Processing field: BatchTimeout" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c53 Processing field: KafkaBrokers" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c54 Processing field: ChannelRestrictions" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c55 Processing field: Capabilities" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] NewStandardValues -> DEBU c56 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:25:06.924 UTC [common.channelconfig] initializeProtosStruct -> DEBU c57 Processing field: Endpoints" +"2019-09-24 00:25:06.925 UTC [common.channelconfig] NewStandardValues -> DEBU c58 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:06.925 UTC [common.channelconfig] initializeProtosStruct -> DEBU c59 Processing field: MSP" +"2019-09-24 00:25:06.925 UTC [common.channelconfig] validateMSP -> DEBU c5a Setting up MSP for org OrdererOrg" +"2019-09-24 00:25:06.925 UTC [msp] newBccspMsp -> DEBU c5b Creating BCCSP-based MSP instance" +"2019-09-24 00:25:06.925 UTC [msp] New -> DEBU c5c Creating Cache-MSP instance" +"2019-09-24 00:25:06.925 UTC [msp] Setup -> DEBU c5d Setting up MSP instance OrdererMSP" +"2019-09-24 00:25:06.932 UTC [msp.identity] newIdentity -> DEBU c5e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.932 UTC [msp.identity] newIdentity -> DEBU c5f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.933 UTC [msp] Validate -> DEBU c60 MSP OrdererMSP validating identity" +"2019-09-24 00:25:06.933 UTC [common.channelconfig] NewStandardValues -> DEBU c61 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:25:06.933 UTC [common.channelconfig] initializeProtosStruct -> DEBU c62 Processing field: ACLs" +"2019-09-24 00:25:06.933 UTC [common.channelconfig] initializeProtosStruct -> DEBU c63 Processing field: Capabilities" +"2019-09-24 00:25:06.933 UTC [common.channelconfig] NewStandardValues -> DEBU c64 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:06.933 UTC [common.channelconfig] initializeProtosStruct -> DEBU c65 Processing field: AnchorPeers" +"2019-09-24 00:25:06.933 UTC [common.channelconfig] NewStandardValues -> DEBU c66 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:06.933 UTC [common.channelconfig] initializeProtosStruct -> DEBU c67 Processing field: MSP" +"2019-09-24 00:25:06.934 UTC [common.channelconfig] Validate -> DEBU c68 Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:25:06.934 UTC [common.channelconfig] validateMSP -> DEBU c69 Setting up MSP for org Org1MSP" +"2019-09-24 00:25:06.934 UTC [msp] newBccspMsp -> DEBU c6a Creating BCCSP-based MSP instance" +"2019-09-24 00:25:06.934 UTC [msp] New -> DEBU c6b Creating Cache-MSP instance" +"2019-09-24 00:25:06.934 UTC [msp] Setup -> DEBU c6c Setting up MSP instance Org1MSP" +"2019-09-24 00:25:06.934 UTC [msp.identity] newIdentity -> DEBU c6d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.934 UTC [msp.identity] newIdentity -> DEBU c6e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.935 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c6f Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:25:06.935 UTC [msp] Validate -> DEBU c70 MSP Org1MSP validating identity" +"2019-09-24 00:25:06.935 UTC [msp] getCertificationChain -> DEBU c71 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:06.937 UTC [msp] hasOURole -> DEBU c72 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:25:06.937 UTC [msp] getCertificationChain -> DEBU c73 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:06.937 UTC [common.channelconfig] NewStandardValues -> DEBU c74 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:06.938 UTC [common.channelconfig] initializeProtosStruct -> DEBU c75 Processing field: AnchorPeers" +"2019-09-24 00:25:06.938 UTC [common.channelconfig] NewStandardValues -> DEBU c76 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:06.938 UTC [common.channelconfig] initializeProtosStruct -> DEBU c77 Processing field: MSP" +"2019-09-24 00:25:06.938 UTC [common.channelconfig] Validate -> DEBU c78 Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 00:25:06.938 UTC [common.channelconfig] validateMSP -> DEBU c79 Setting up MSP for org Org2MSP" +"2019-09-24 00:25:06.938 UTC [msp] newBccspMsp -> DEBU c7a Creating BCCSP-based MSP instance" +"2019-09-24 00:25:06.938 UTC [msp] New -> DEBU c7b Creating Cache-MSP instance" +"2019-09-24 00:25:06.938 UTC [msp] Setup -> DEBU c7c Setting up MSP instance Org2MSP" +"2019-09-24 00:25:06.947 UTC [msp.identity] newIdentity -> DEBU c7d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.948 UTC [msp.identity] newIdentity -> DEBU c7e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:06.958 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c7f Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:25:06.958 UTC [msp] Validate -> DEBU c80 MSP Org2MSP validating identity" +"2019-09-24 00:25:06.958 UTC [msp] getCertificationChain -> DEBU c81 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:06.959 UTC [msp] hasOURole -> DEBU c82 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:25:06.959 UTC [msp] getCertificationChain -> DEBU c83 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:06.959 UTC [msp] Setup -> DEBU c84 Setting up the MSP manager (3 msps)" +"2019-09-24 00:25:06.959 UTC [msp] Setup -> DEBU c85 MSP manager setup complete, setup 3 msps" +"2019-09-24 00:25:06.959 UTC [policies] NewManagerImpl -> DEBU c86 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:06.959 UTC [policies] NewManagerImpl -> DEBU c87 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:06.959 UTC [policies] NewManagerImpl -> DEBU c88 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c89 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8a Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8b Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8c Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8d Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8e Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:25:06.960 UTC [policies] NewManagerImpl -> DEBU c8f Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c90 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c91 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c92 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c93 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c94 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c95 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c96 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c97 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c98 Proposed new policy Readers for Channel/Application" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c99 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c9a Proposed new policy Readers for Channel" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c9b Proposed new policy Writers for Channel" +"2019-09-24 00:25:06.961 UTC [policies] NewManagerImpl -> DEBU c9c Proposed new policy Admins for Channel" +"2019-09-24 00:25:06.961 UTC [common.configtx] addToMap -> DEBU c9d Adding to config map: [Group] /Channel" +"2019-09-24 00:25:06.961 UTC [common.configtx] addToMap -> DEBU c9e Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU c9f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca0 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca7 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca8 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU ca9 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:25:06.962 UTC [common.configtx] addToMap -> DEBU caa Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:25:06.963 UTC [common.configtx] addToMap -> DEBU cab Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cac Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cad Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cae Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU caf Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb0 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:06.984 UTC [common.configtx] addToMap -> DEBU cb5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cb6 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cb7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cb8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cb9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cba Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cbb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:06.985 UTC [common.configtx] addToMap -> DEBU cbc Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:25:06.986 UTC [common.configtx] addToMap -> DEBU cbd Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:25:06.986 UTC [common.configtx] addToMap -> DEBU cbe Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cbf Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc0 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc1 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc2 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc3 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc4 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc5 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc6 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc7 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc8 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cc9 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:25:06.987 UTC [common.configtx] addToMap -> DEBU cca Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:25:06.996 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccb Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" +"2019-09-24 00:25:06.996 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccc Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +"2019-09-24 00:25:06.996 UTC [orderer.consensus.etcdraft] propose -> INFO ccd Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 00:25:06.996 UTC [orderer.consensus.etcdraft] serveRequest -> INFO cce Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-09-24 00:25:06.996 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.3µs " +"2019-09-24 00:25:06.996 UTC [orderer.common.broadcast] ProcessMessage -> DEBU cd0 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:60706" +"2019-09-24 00:25:07.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.9µs " +"2019-09-24 00:25:07.003 UTC [orderer.common.broadcast] Handle -> WARN cd2 Error reading from 172.18.0.9:60706: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:25:07.003 UTC [orderer.common.server] func1 -> DEBU cd3 Closing Broadcast stream" +"2019-09-24 00:25:07.003 UTC [comm.grpc.server] 1 -> INFO cd4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:60706 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=138.1309ms +"2019-09-24 00:25:07.003 UTC [grpc] infof -> DEBU cd5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:07.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:07.003 UTC [orderer.consensus.etcdraft] 2 -> DEBU cd7 Proposed block [2] to raft consensus" channel=businesschannel node=1 +"2019-09-24 00:25:07.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd8 Sending msg of 22873 bytes to 2 on channel businesschannel took 111.4µs" +"2019-09-24 00:25:07.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd9 Sending msg of 22873 bytes to 3 on channel businesschannel took 12.7µs" +"2019-09-24 00:25:07.004 UTC [orderer.common.cluster.step] sendMessage -> DEBU cda Send of ConsensusRequest for channel businesschannel with payload of size 22873 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +"2019-09-24 00:25:07.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdb Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +"2019-09-24 00:25:07.014 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdc Send of ConsensusRequest for channel businesschannel with payload of size 22873 to orderer1.example.com(orderer1.example.com:7050) took 9.1532ms " +"2019-09-24 00:25:07.014 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.3µs " +"2019-09-24 00:25:07.015 UTC [orderer.common.cluster.step] handleMessage -> DEBU cde Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:07.016 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdf Sending msg of 28 bytes to 3 on channel businesschannel took 1.2893ms" +"2019-09-24 00:25:07.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.5µs " +"2019-09-24 00:25:07.017 UTC [common.deliver] Handle -> WARN ce1 Error reading from 172.18.0.9:60704: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:25:07.017 UTC [orderer.common.server] func1 -> DEBU ce2 Closing Deliver stream" +"2019-09-24 00:25:07.018 UTC [comm.grpc.server] 1 -> INFO ce3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:60704 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=191.0169ms +"2019-09-24 00:25:07.018 UTC [grpc] infof -> DEBU ce4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:07.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:07.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:07.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce7 Sending msg of 28 bytes to 2 on channel businesschannel took 11.9µs" +"2019-09-24 00:25:07.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce8 Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +"2019-09-24 00:25:07.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.3µs " +"2019-09-24 00:25:07.019 UTC [orderer.consensus.etcdraft] writeBlock -> INFO cea Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +"2019-09-24 00:25:07.019 UTC [common.configtx] addToMap -> DEBU ceb Adding to config map: [Group] /Channel" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cec Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU ced Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cee Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cef Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf3 Adding to config map: [Group] /Channel" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf4 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf7 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cf9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cfa Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:07.020 UTC [common.configtx] addToMap -> DEBU cfb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:07.020 UTC [common.configtx] verifyDeltaSet -> DEBU cfc Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:07.021 UTC [common.configtx] policyForItem -> DEBU cfd Getting policy for item Org2MSP with mod_policy Admins" +"2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU cfe Manager Channel looking up path [Application]" +"2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU cff Manager Channel has managers Orderer" +"2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU d00 Manager Channel has managers Application" +"2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU d01 Manager Channel/Application looking up path []" +"2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU d02 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU d03 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:07.023 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:07.021 UTC [policies] Manager -> DEBU d05 Manager Channel/Application looking up path [Org2MSP]" +"2019-09-24 00:25:07.028 UTC [policies] Manager -> DEBU d06 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:07.028 UTC [policies] Manager -> DEBU d07 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:07.028 UTC [policies] Manager -> DEBU d08 Manager Channel/Application/Org2MSP looking up path []" +"2019-09-24 00:25:07.028 UTC [policies] Evaluate -> DEBU d09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 00:25:07.029 UTC [cauthdsl] func1 -> DEBU d0a 0xc000398740 gate 1569284707029305000 evaluation starts" +"2019-09-24 00:25:07.029 UTC [cauthdsl] func2 -> DEBU d0b 0xc000398740 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.029 UTC [cauthdsl] func2 -> DEBU d0c 0xc000398740 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:07.029 UTC [cauthdsl] func2 -> DEBU d0d 0xc000398740 principal matched by identity 0" +"2019-09-24 00:25:07.029 UTC [msp.identity] Verify -> DEBU d0e Verify: digest = 00000000 c7 15 61 1b b2 95 fa 58 ba 85 fe c1 31 30 21 87 |..a....X....10!.| +00000010 ff ba 08 45 5d c6 ac f3 4c 25 22 ca 2f 17 ea 97 |...E]...L%"./...|" +"2019-09-24 00:25:07.029 UTC [msp.identity] Verify -> DEBU d0f Verify: sig = 00000000 30 45 02 21 00 98 5f 39 f5 66 76 09 9e c8 cd e3 |0E.!.._9.fv.....| +00000010 70 ff 4b d1 18 cd cd f5 28 b0 92 91 ed c0 20 3f |p.K.....(..... ?| +00000020 ec 6a 58 2b 2f 02 20 59 44 df b5 8f e0 ce 61 c8 |.jX+/. YD.....a.| +00000030 7c 9e c4 4d c5 31 fd 54 af 57 c3 f6 39 01 9a 59 ||..M.1.T.W..9..Y| +00000040 99 0e a7 45 58 9e 56 |...EX.V|" +"2019-09-24 00:25:07.029 UTC [cauthdsl] func2 -> DEBU d10 0xc000398740 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.029 UTC [cauthdsl] func1 -> DEBU d11 0xc000398740 gate 1569284707029305000 evaluation succeeds" +"2019-09-24 00:25:07.029 UTC [policies] Evaluate -> DEBU d12 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:07.029 UTC [policies] Evaluate -> DEBU d13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:07.029 UTC [common.configtx] verifyDeltaSet -> DEBU d14 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d15 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d16 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d17 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d18 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d19 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d1a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.030 UTC [common.configtx] recurseConfigMap -> DEBU d1b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d1c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d1d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d1e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d1f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d20 Setting policy for key Readers to " +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d21 Setting policy for key Writers to " +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d22 Setting policy for key Admins to " +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d23 Setting policy for key Endorsement to " +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d24 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d25 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d26 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU d27 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.7µs " +"2019-09-24 00:25:07.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU d28 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:07.061 UTC [orderer.common.cluster.step] handleMessage -> DEBU d29 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:07.031 UTC [common.configtx] recurseConfigMap -> DEBU d2a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.072 UTC [common.configtx] recurseConfigMap -> DEBU d2b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.072 UTC [common.configtx] recurseConfigMap -> DEBU d2c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.072 UTC [common.configtx] recurseConfigMap -> DEBU d2d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.072 UTC [common.configtx] recurseConfigMap -> DEBU d2e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.072 UTC [common.channelconfig] NewStandardValues -> DEBU d2f Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:25:07.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU d30 Processing field: HashingAlgorithm" +"2019-09-24 00:25:07.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU d31 Processing field: BlockDataHashingStructure" +"2019-09-24 00:25:07.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU d32 Processing field: OrdererAddresses" +"2019-09-24 00:25:07.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU d33 Processing field: Consortium" +"2019-09-24 00:25:07.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU d34 Processing field: Capabilities" +"2019-09-24 00:25:07.073 UTC [common.channelconfig] NewStandardValues -> DEBU d35 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:25:07.074 UTC [common.channelconfig] initializeProtosStruct -> DEBU d36 Processing field: ConsensusType" +"2019-09-24 00:25:07.074 UTC [common.channelconfig] initializeProtosStruct -> DEBU d37 Processing field: BatchSize" +"2019-09-24 00:25:07.074 UTC [common.channelconfig] initializeProtosStruct -> DEBU d38 Processing field: BatchTimeout" +"2019-09-24 00:25:07.074 UTC [common.channelconfig] initializeProtosStruct -> DEBU d39 Processing field: KafkaBrokers" +"2019-09-24 00:25:07.075 UTC [common.channelconfig] initializeProtosStruct -> DEBU d3a Processing field: ChannelRestrictions" +"2019-09-24 00:25:07.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:07.075 UTC [common.channelconfig] initializeProtosStruct -> DEBU d3c Processing field: Capabilities" +"2019-09-24 00:25:07.094 UTC [common.channelconfig] NewStandardValues -> DEBU d3d Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:25:07.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU d3e Processing field: Endpoints" +"2019-09-24 00:25:07.094 UTC [common.channelconfig] NewStandardValues -> DEBU d3f Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:07.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU d40 Processing field: MSP" +"2019-09-24 00:25:07.095 UTC [common.channelconfig] validateMSP -> DEBU d41 Setting up MSP for org OrdererOrg" +"2019-09-24 00:25:07.095 UTC [msp] newBccspMsp -> DEBU d42 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:07.095 UTC [msp] New -> DEBU d43 Creating Cache-MSP instance" +"2019-09-24 00:25:07.095 UTC [msp] Setup -> DEBU d44 Setting up MSP instance OrdererMSP" +"2019-09-24 00:25:07.097 UTC [msp.identity] newIdentity -> DEBU d45 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.098 UTC [msp.identity] newIdentity -> DEBU d46 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.100 UTC [msp] Validate -> DEBU d47 MSP OrdererMSP validating identity" +"2019-09-24 00:25:07.117 UTC [common.channelconfig] NewStandardValues -> DEBU d48 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:25:07.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU d49 Processing field: ACLs" +"2019-09-24 00:25:07.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU d4a Processing field: Capabilities" +"2019-09-24 00:25:07.118 UTC [common.channelconfig] NewStandardValues -> DEBU d4b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:07.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU d4c Processing field: AnchorPeers" +"2019-09-24 00:25:07.118 UTC [common.channelconfig] NewStandardValues -> DEBU d4d Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:07.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU d4e Processing field: MSP" +"2019-09-24 00:25:07.118 UTC [common.channelconfig] Validate -> DEBU d4f Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:25:07.118 UTC [common.channelconfig] validateMSP -> DEBU d50 Setting up MSP for org Org1MSP" +"2019-09-24 00:25:07.118 UTC [msp] newBccspMsp -> DEBU d51 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:07.118 UTC [msp] New -> DEBU d52 Creating Cache-MSP instance" +"2019-09-24 00:25:07.118 UTC [msp] Setup -> DEBU d53 Setting up MSP instance Org1MSP" +"2019-09-24 00:25:07.119 UTC [msp.identity] newIdentity -> DEBU d54 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.119 UTC [msp.identity] newIdentity -> DEBU d55 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.120 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d56 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:25:07.120 UTC [msp] Validate -> DEBU d57 MSP Org1MSP validating identity" +"2019-09-24 00:25:07.120 UTC [msp] getCertificationChain -> DEBU d58 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:07.120 UTC [msp] hasOURole -> DEBU d59 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:25:07.121 UTC [msp] getCertificationChain -> DEBU d5a MSP Org1MSP getting certification chain" +"2019-09-24 00:25:07.121 UTC [common.channelconfig] NewStandardValues -> DEBU d5b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:07.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU d5c Processing field: AnchorPeers" +"2019-09-24 00:25:07.121 UTC [common.channelconfig] NewStandardValues -> DEBU d5d Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:07.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU d5e Processing field: MSP" +"2019-09-24 00:25:07.121 UTC [common.channelconfig] Validate -> DEBU d5f Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 00:25:07.121 UTC [common.channelconfig] validateMSP -> DEBU d60 Setting up MSP for org Org2MSP" +"2019-09-24 00:25:07.121 UTC [msp] newBccspMsp -> DEBU d61 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:07.121 UTC [msp] New -> DEBU d62 Creating Cache-MSP instance" +"2019-09-24 00:25:07.121 UTC [msp] Setup -> DEBU d63 Setting up MSP instance Org2MSP" +"2019-09-24 00:25:07.121 UTC [msp.identity] newIdentity -> DEBU d64 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.121 UTC [msp.identity] newIdentity -> DEBU d65 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.139 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d66 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:25:07.139 UTC [msp] Validate -> DEBU d67 MSP Org2MSP validating identity" +"2019-09-24 00:25:07.140 UTC [msp] getCertificationChain -> DEBU d68 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:07.140 UTC [msp] hasOURole -> DEBU d69 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:25:07.140 UTC [msp] getCertificationChain -> DEBU d6a MSP Org2MSP getting certification chain" +"2019-09-24 00:25:07.140 UTC [msp] Setup -> DEBU d6b Setting up the MSP manager (3 msps)" +"2019-09-24 00:25:07.140 UTC [msp] Setup -> DEBU d6c MSP manager setup complete, setup 3 msps" +"2019-09-24 00:25:07.140 UTC [policies] NewManagerImpl -> DEBU d6d Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:25:07.140 UTC [policies] NewManagerImpl -> DEBU d6e Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d6f Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d70 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d71 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d72 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d73 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d74 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d75 Proposed new policy Readers for Channel/Application" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d76 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d77 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d78 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d79 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d7a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d7b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:07.141 UTC [policies] NewManagerImpl -> DEBU d7c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d7d Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d7e Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d7f Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d80 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d81 Proposed new policy Readers for Channel" +"2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d82 Proposed new policy Writers for Channel" +"2019-09-24 00:25:07.142 UTC [policies] NewManagerImpl -> DEBU d83 Proposed new policy Admins for Channel" +"2019-09-24 00:25:07.142 UTC [common.configtx] addToMap -> DEBU d84 Adding to config map: [Group] /Channel" +"2019-09-24 00:25:07.142 UTC [common.configtx] addToMap -> DEBU d85 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:07.142 UTC [common.configtx] addToMap -> DEBU d86 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d87 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d88 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d89 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8d Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8e Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d8f Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d90 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d91 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d92 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d93 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:07.143 UTC [common.configtx] addToMap -> DEBU d94 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d95 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d96 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d97 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d98 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d99 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9a Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9b Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU d9f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU da0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU da1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:25:07.144 UTC [common.configtx] addToMap -> DEBU da2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da5 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da6 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da7 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU da9 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU daa Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU dab Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU dac Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU dad Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU dae Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU daf Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU db0 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:25:07.145 UTC [common.configtx] addToMap -> DEBU db1 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:25:07.145 UTC [common.channelconfig] LogSanityChecks -> DEBU db2 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:25:07.146 UTC [common.channelconfig] LogSanityChecks -> DEBU db3 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:25:07.157 UTC [policies] Manager -> DEBU db4 Manager Channel looking up path [Application]" +"2019-09-24 00:25:07.157 UTC [policies] Manager -> DEBU db5 Manager Channel has managers Application" +"2019-09-24 00:25:07.162 UTC [policies] Manager -> DEBU db6 Manager Channel has managers Orderer" +"2019-09-24 00:25:07.162 UTC [policies] Manager -> DEBU db7 Manager Channel/Application looking up path []" +"2019-09-24 00:25:07.162 UTC [policies] Manager -> DEBU db8 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:07.162 UTC [policies] Manager -> DEBU db9 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:07.162 UTC [common.channelconfig] LogSanityChecks -> DEBU dba As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 00:25:07.162 UTC [common.channelconfig] LogSanityChecks -> DEBU dbb As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 00:25:07.163 UTC [common.channelconfig] LogSanityChecks -> DEBU dbc As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 00:25:07.163 UTC [policies] Manager -> DEBU dbd Manager Channel looking up path [Orderer]" +"2019-09-24 00:25:07.163 UTC [policies] Manager -> DEBU dbe Manager Channel has managers Application" +"2019-09-24 00:25:07.163 UTC [policies] Manager -> DEBU dbf Manager Channel has managers Orderer" +"2019-09-24 00:25:07.163 UTC [policies] Manager -> DEBU dc0 Manager Channel/Orderer looking up path []" +"2019-09-24 00:25:07.163 UTC [policies] Manager -> DEBU dc1 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:25:07.163 UTC [common.channelconfig] LogSanityChecks -> DEBU dc2 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:25:07.163 UTC [common.channelconfig] LogSanityChecks -> DEBU dc3 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:25:07.163 UTC [common.channelconfig] LogSanityChecks -> DEBU dc4 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:25:07.163 UTC [common.channelconfig] LogSanityChecks -> DEBU dc5 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:25:07.163 UTC [common.capabilities] Supported -> DEBU dc6 Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:07.163 UTC [common.capabilities] Supported -> DEBU dc7 Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:07.163 UTC [orderer.common.server] func1 -> DEBU dc8 Executing callback to update root CAs" +"2019-09-24 00:25:07.163 UTC [orderer.common.server] updateTrustedRoots -> DEBU dc9 updating root CAs for channel [businesschannel]" +"2019-09-24 00:25:07.181 UTC [orderer.common.server] updateTrustedRoots -> DEBU dca adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 00:25:07.181 UTC [orderer.common.server] updateTrustedRoots -> DEBU dcb adding app root CAs for MSP [Org1MSP]" +"2019-09-24 00:25:07.181 UTC [orderer.common.server] updateTrustedRoots -> DEBU dcc adding app root CAs for MSP [Org2MSP]" +"2019-09-24 00:25:07.182 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU dcd [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +"2019-09-24 00:25:07.182 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU dce [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-09-24 00:25:07.182 UTC [msp] GetDefaultSigningIdentity -> DEBU dcf Obtaining default signing identity" +"2019-09-24 00:25:07.186 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:07.186 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd1 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-09-24 00:25:07.187 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.9µs " +"2019-09-24 00:25:07.183 UTC [msp] GetDefaultSigningIdentity -> DEBU dd3 Obtaining default signing identity" +"2019-09-24 00:25:07.187 UTC [msp.identity] Sign -> DEBU dd4 Sign: plaintext: 0A020802120B0A090A03010203100418...C90BC4C292C00497479869D1CCCD9A7A " +"2019-09-24 00:25:07.187 UTC [msp.identity] Sign -> DEBU dd5 Sign: digest: 804EA32B427414F8705766C936C5693443D182604B6219E71F07CCC5AACD76C5 " +"2019-09-24 00:25:07.209 UTC [fsblkstorage] indexBlock -> DEBU dd6 Indexing block [blockNum=2, blockHash=[]byte{0x4e, 0xd0, 0x49, 0x23, 0xb9, 0x3e, 0xc0, 0x5c, 0x31, 0x7d, 0x41, 0xd1, 0x41, 0x9e, 0x85, 0xa3, 0x3a, 0xc, 0xfa, 0x4b, 0xf1, 0xd7, 0x9c, 0x1, 0x39, 0x4c, 0x1f, 0xcb, 0x3c, 0x63, 0xa5, 0x0} txOffsets= +txId=be7e094f4e6114772d86c435c98fa93588deed90dd195d27ecfc6e306eba1cfc locPointer=offset=71, bytesLength=22742 +]" +"2019-09-24 00:25:07.210 UTC [fsblkstorage] updateCheckpoint -> DEBU dd7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71391], isChainEmpty=[false], lastBlockNumber=[2]" +"2019-09-24 00:25:07.210 UTC [fsblkstorage] waitForBlock -> DEBU dd9 Came out of wait. maxAvailaBlockNumber=[2]" +"2019-09-24 00:25:07.211 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dda Remaining bytes=[23750], Going to peek [8] bytes" +"2019-09-24 00:25:07.211 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ddb Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47641], bytesOffset=[47644]}" +"2019-09-24 00:25:07.211 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ddc blockbytes [23747] read from file [0]" +"2019-09-24 00:25:07.211 UTC [policies] Evaluate -> DEBU ddd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:25:07.211 UTC [policies] Evaluate -> DEBU dde This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.211 UTC [policies] Evaluate -> DEBU ddf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.211 UTC [policies] Evaluate -> DEBU de0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.211 UTC [policies] Evaluate -> DEBU de1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.211 UTC [msp] DeserializeIdentity -> DEBU de2 Obtaining identity" +"2019-09-24 00:25:07.211 UTC [msp.identity] newIdentity -> DEBU de3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.212 UTC [cauthdsl] func1 -> DEBU de4 0xc00118bdc0 gate 1569284707212166900 evaluation starts" +"2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU de5 0xc00118bdc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU de6 0xc00118bdc0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU de7 0xc00118bdc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU de8 0xc00118bdc0 principal evaluation fails" +"2019-09-24 00:25:07.212 UTC [cauthdsl] func1 -> DEBU de9 0xc00118bdc0 gate 1569284707212166900 evaluation fails" +"2019-09-24 00:25:07.212 UTC [policies] Evaluate -> DEBU dea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.212 UTC [policies] Evaluate -> DEBU deb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.212 UTC [policies] Evaluate -> DEBU dec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.212 UTC [cauthdsl] func1 -> DEBU ded 0xc000bfb030 gate 1569284707212714200 evaluation starts" +"2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU dee 0xc000bfb030 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.212 UTC [cauthdsl] func2 -> DEBU def 0xc000bfb030 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:25:07.212 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU df0 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:25:07.212 UTC [msp] Validate -> DEBU df1 MSP Org2MSP validating identity" +"2019-09-24 00:25:07.213 UTC [msp] getCertificationChain -> DEBU df2 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:07.216 UTC [cauthdsl] func2 -> DEBU df3 0xc000bfb030 principal matched by identity 0" +"2019-09-24 00:25:07.216 UTC [msp.identity] Verify -> DEBU df4 Verify: digest = 00000000 8b 03 97 43 70 c0 92 23 17 5e 03 ee 64 e6 97 15 |...Cp..#.^..d...| +00000010 02 e5 c8 62 47 03 7b 9c 1d 32 87 82 fc 68 3e 5b |...bG.{..2...h>[|" +"2019-09-24 00:25:07.217 UTC [msp.identity] Verify -> DEBU df5 Verify: sig = 00000000 30 44 02 20 31 f5 c5 93 d4 1d 90 90 18 dd 80 56 |0D. 1..........V| +00000010 9f 8f ca 24 d5 66 6c 6b 5f a8 6a fb ad 51 78 84 |...$.flk_.j..Qx.| +00000020 24 d7 ee fc 02 20 1a fe 63 11 78 f6 09 75 ed 1e |$.... ..c.x..u..| +00000030 ed 55 24 d6 52 91 c4 44 8c 94 19 3e f1 e1 0e 9c |.U$.R..D...>....| +00000040 9f c8 76 db 78 22 |..v.x"|" +"2019-09-24 00:25:07.217 UTC [cauthdsl] func2 -> DEBU df6 0xc000bfb030 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.217 UTC [cauthdsl] func1 -> DEBU df7 0xc000bfb030 gate 1569284707212714200 evaluation succeeds" +"2019-09-24 00:25:07.217 UTC [policies] Evaluate -> DEBU df8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.217 UTC [policies] Evaluate -> DEBU df9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.217 UTC [policies] Evaluate -> DEBU dfa Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.217 UTC [policies] Evaluate -> DEBU dfb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.217 UTC [policies] Evaluate -> DEBU dfc Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:25:07.218 UTC [policies] Evaluate -> DEBU dfd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:25:07.218 UTC [common.deliver] deliverBlocks -> DEBU dfe [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +"2019-09-24 00:25:07.218 UTC [fsblkstorage] waitForBlock -> DEBU dff Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2019-09-24 00:25:07.210 UTC [orderer.commmon.multichannel] commitBlock -> DEBU dd8 [channel: businesschannel] Wrote block [2]" +"2019-09-24 00:25:07.491 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e00 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +"2019-09-24 00:25:07.492 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e01 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" +"2019-09-24 00:25:07.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.6µs " +"2019-09-24 00:25:07.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU e03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.7µs " +"2019-09-24 00:25:07.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:07.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:07.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU e06 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:07.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2019-09-24 00:25:07.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " +"2019-09-24 00:25:07.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 2 on channel businesschannel took 27.4µs" +"2019-09-24 00:25:07.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0a Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2019-09-24 00:25:07.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.8µs " +"2019-09-24 00:25:07.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.3µs " +"2019-09-24 00:25:07.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:07.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:08.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:08.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-09-24 00:25:08.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU e11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +"2019-09-24 00:25:08.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 2 on channel businesschannel took 32.4µs" +"2019-09-24 00:25:08.487 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e13 Sending msg of 28 bytes to 3 on channel businesschannel took 39.4µs" +"2019-09-24 00:25:08.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " +"2019-09-24 00:25:08.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU e15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.1µs " +"2019-09-24 00:25:08.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:08.489 UTC [orderer.common.cluster.step] handleMessage -> DEBU e17 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:08.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU e18 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:08.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +"2019-09-24 00:25:08.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.3µs " +"2019-09-24 00:25:08.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" +"2019-09-24 00:25:08.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1c Sending msg of 28 bytes to 2 on channel businesschannel took 38.7µs" +"2019-09-24 00:25:08.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.5µs " +"2019-09-24 00:25:08.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 847.8µs " +"2019-09-24 00:25:08.990 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:08.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU e20 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:09.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU e21 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:09.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +"2019-09-24 00:25:09.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU e23 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " +"2019-09-24 00:25:09.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +"2019-09-24 00:25:09.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e25 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2019-09-24 00:25:09.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.6µs " +"2019-09-24 00:25:09.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU e27 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.6µs " +"2019-09-24 00:25:09.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:09.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU e29 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:09.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:09.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.4µs " +"2019-09-24 00:25:09.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 3 on channel testchainid took 127.7µs" +"2019-09-24 00:25:09.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2d Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +"2019-09-24 00:25:09.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2e Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +"2019-09-24 00:25:09.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.6µs " +"2019-09-24 00:25:09.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU e30 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.1µs " +"2019-09-24 00:25:09.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:09.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU e32 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:10.173 UTC [orderer.common.cluster.step] handleMessage -> DEBU e33 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:10.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +"2019-09-24 00:25:10.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU e35 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.5µs " +"2019-09-24 00:25:10.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e36 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +"2019-09-24 00:25:10.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +"2019-09-24 00:25:10.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.4µs " +"2019-09-24 00:25:10.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU e39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.6µs " +"2019-09-24 00:25:10.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:10.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:10.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:10.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2019-09-24 00:25:10.638 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " +"2019-09-24 00:25:10.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 2 on channel businesschannel took 45.4µs" +"2019-09-24 00:25:10.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e40 Sending msg of 28 bytes to 3 on channel businesschannel took 17µs" +"2019-09-24 00:25:10.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 327.3µs " +"2019-09-24 00:25:10.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU e42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.9µs " +"2019-09-24 00:25:10.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:10.959 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:11.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU e45 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:11.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2019-09-24 00:25:11.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.3µs " +"2019-09-24 00:25:11.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 2 on channel businesschannel took 46.9µs" +"2019-09-24 00:25:11.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e49 Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" +"2019-09-24 00:25:11.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 846.1µs " +"2019-09-24 00:25:11.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123µs " +"2019-09-24 00:25:11.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:11.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:11.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:11.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4f Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +"2019-09-24 00:25:11.638 UTC [orderer.common.cluster.step] sendMessage -> DEBU e50 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.5µs " +"2019-09-24 00:25:11.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +"2019-09-24 00:25:11.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e52 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2019-09-24 00:25:11.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.8µs " +"2019-09-24 00:25:11.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.2µs " +"2019-09-24 00:25:11.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:11.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:12.139 UTC [orderer.common.cluster.step] handleMessage -> DEBU e57 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:12.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e58 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +"2019-09-24 00:25:12.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU e59 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " +"2019-09-24 00:25:12.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5a Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2019-09-24 00:25:12.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5b Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +"2019-09-24 00:25:12.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +"2019-09-24 00:25:12.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.7µs " +"2019-09-24 00:25:12.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:12.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:12.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU e60 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:12.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e61 Sending msg of 28 bytes to 3 on channel testchainid took 100µs" +"2019-09-24 00:25:12.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU e62 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.7µs " +"2019-09-24 00:25:12.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e63 Sending msg of 28 bytes to 2 on channel businesschannel took 37.4µs" +"2019-09-24 00:25:12.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs" +"2019-09-24 00:25:12.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.3µs " +"2019-09-24 00:25:12.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e66 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.6µs " +"2019-09-24 00:25:12.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e67 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:12.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:13.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU e69 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:13.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6a Sending msg of 28 bytes to 3 on channel testchainid took 18.9µs" +"2019-09-24 00:25:13.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " +"2019-09-24 00:25:13.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6c Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2019-09-24 00:25:13.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6d Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +"2019-09-24 00:25:13.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 873.6µs " +"2019-09-24 00:25:13.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.5µs " +"2019-09-24 00:25:13.457 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:13.465 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:13.642 UTC [orderer.common.cluster.step] handleMessage -> DEBU e72 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:13.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e73 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +"2019-09-24 00:25:13.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e74 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +"2019-09-24 00:25:13.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e75 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +"2019-09-24 00:25:13.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e76 Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +"2019-09-24 00:25:13.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +"2019-09-24 00:25:13.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.3µs " +"2019-09-24 00:25:13.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:13.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:14.152 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:14.152 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7c Sending msg of 28 bytes to 3 on channel testchainid took 45µs" +"2019-09-24 00:25:14.152 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 274µs " +"2019-09-24 00:25:14.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7e Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +"2019-09-24 00:25:14.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7f Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2019-09-24 00:25:14.465 UTC [orderer.common.cluster.step] sendMessage -> DEBU e80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 134.4µs " +"2019-09-24 00:25:14.465 UTC [orderer.common.cluster.step] sendMessage -> DEBU e81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.7µs " +"2019-09-24 00:25:14.466 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:14.467 UTC [orderer.common.cluster.step] handleMessage -> DEBU e83 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:14.641 UTC [orderer.common.cluster.step] handleMessage -> DEBU e84 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:14.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e85 Sending msg of 28 bytes to 3 on channel testchainid took 39.1µs" +"2019-09-24 00:25:14.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e86 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.6µs " +"2019-09-24 00:25:14.956 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e87 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2019-09-24 00:25:14.956 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e88 Sending msg of 28 bytes to 3 on channel businesschannel took 91.9µs" +"2019-09-24 00:25:14.957 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.1µs " +"2019-09-24 00:25:14.957 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.2µs " +"2019-09-24 00:25:14.958 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:14.958 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:15.141 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:15.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8e Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2019-09-24 00:25:15.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.4µs " +"2019-09-24 00:25:15.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e90 Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" +"2019-09-24 00:25:15.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e91 Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" +"2019-09-24 00:25:15.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU e92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 282.4µs " +"2019-09-24 00:25:15.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU e93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185µs " +"2019-09-24 00:25:15.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU e94 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:15.461 UTC [orderer.common.cluster.step] handleMessage -> DEBU e95 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:15.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU e96 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:15.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e97 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" +"2019-09-24 00:25:15.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU e98 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.7µs " +"2019-09-24 00:25:15.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e99 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2019-09-24 00:25:15.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9a Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2019-09-24 00:25:15.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " +"2019-09-24 00:25:15.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.9µs " +"2019-09-24 00:25:15.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:15.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:16.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:16.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea0 Sending msg of 28 bytes to 3 on channel testchainid took 40.3µs" +"2019-09-24 00:25:16.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.3µs " +"2019-09-24 00:25:16.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea2 Sending msg of 28 bytes to 2 on channel businesschannel took 47.3µs" +"2019-09-24 00:25:16.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +"2019-09-24 00:25:16.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.3µs " +"2019-09-24 00:25:16.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.1µs " +"2019-09-24 00:25:16.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:16.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:16.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:16.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea9 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2019-09-24 00:25:16.638 UTC [orderer.common.cluster.step] sendMessage -> DEBU eaa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.8µs " +"2019-09-24 00:25:16.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eab Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-09-24 00:25:16.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +"2019-09-24 00:25:16.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ead Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.8µs " +"2019-09-24 00:25:16.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU eae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48µs " +"2019-09-24 00:25:16.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:16.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:17.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:17.139 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb2 Sending msg of 28 bytes to 3 on channel testchainid took 59.5µs" +"2019-09-24 00:25:17.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.8µs " +"2019-09-24 00:25:17.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb4 Sending msg of 28 bytes to 2 on channel businesschannel took 28.4µs" +"2019-09-24 00:25:17.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +"2019-09-24 00:25:17.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.8µs " +"2019-09-24 00:25:17.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.7µs " +"2019-09-24 00:25:17.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:17.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:17.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU eba Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:17.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebb Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +"2019-09-24 00:25:17.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.8µs " +"2019-09-24 00:25:17.955 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebd Sending msg of 28 bytes to 2 on channel businesschannel took 42µs" +"2019-09-24 00:25:17.955 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebe Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2019-09-24 00:25:17.955 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.4µs " +"2019-09-24 00:25:17.955 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.6µs " +"2019-09-24 00:25:17.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:17.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:18.139 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:18.139 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec4 Sending msg of 28 bytes to 3 on channel testchainid took 40.6µs" +"2019-09-24 00:25:18.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.4µs " +"2019-09-24 00:25:18.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec6 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2019-09-24 00:25:18.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec7 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2019-09-24 00:25:18.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +"2019-09-24 00:25:18.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.2µs " +"2019-09-24 00:25:18.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU eca Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:18.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:18.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:18.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecd Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-09-24 00:25:18.638 UTC [orderer.common.cluster.step] sendMessage -> DEBU ece Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +"2019-09-24 00:25:18.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecf Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-09-24 00:25:18.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +"2019-09-24 00:25:18.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " +"2019-09-24 00:25:18.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.3µs " +"2019-09-24 00:25:18.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:18.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:19.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:19.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed6 Sending msg of 28 bytes to 3 on channel testchainid took 43.5µs" +"2019-09-24 00:25:19.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " +"2019-09-24 00:25:19.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed8 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" +"2019-09-24 00:25:19.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed9 Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +"2019-09-24 00:25:19.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU eda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.6µs " +"2019-09-24 00:25:19.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU edb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.5µs " +"2019-09-24 00:25:19.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:19.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU edd Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:19.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU ede Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:19.645 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edf Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +"2019-09-24 00:25:19.646 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.6µs " +"2019-09-24 00:25:19.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee1 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +"2019-09-24 00:25:19.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +"2019-09-24 00:25:19.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 372.5µs " +"2019-09-24 00:25:19.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.9µs " +"2019-09-24 00:25:19.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:19.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:20.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:20.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee8 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +"2019-09-24 00:25:20.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.4µs " +"2019-09-24 00:25:20.460 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eea Sending msg of 28 bytes to 2 on channel businesschannel took 26.7µs" +"2019-09-24 00:25:20.460 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eeb Sending msg of 28 bytes to 3 on channel businesschannel took 675.8µs" +"2019-09-24 00:25:20.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 472.2µs " +"2019-09-24 00:25:20.465 UTC [orderer.common.cluster.step] sendMessage -> DEBU eed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.7593ms " +"2019-09-24 00:25:20.474 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:20.497 UTC [orderer.common.cluster.step] handleMessage -> DEBU eef Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:20.640 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:20.640 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef1 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2019-09-24 00:25:20.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.3µs " +"2019-09-24 00:25:20.893 UTC [orderer.common.server] Broadcast -> DEBU ef3 Starting new Broadcast handler" +"2019-09-24 00:25:20.894 UTC [orderer.common.broadcast] Handle -> DEBU ef4 Starting new broadcast loop for 172.18.0.9:60788" +"2019-09-24 00:25:20.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef5 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1µs" +"2019-09-24 00:25:20.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef6 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2019-09-24 00:25:20.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +"2019-09-24 00:25:20.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.5µs " +"2019-09-24 00:25:20.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:20.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU efa Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:21.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU efb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:21.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efc Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +"2019-09-24 00:25:21.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.5µs " +"2019-09-24 00:25:21.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efe Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +"2019-09-24 00:25:21.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eff Sending msg of 28 bytes to 3 on channel businesschannel took 265.7µs" +"2019-09-24 00:25:21.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.1µs " +"2019-09-24 00:25:21.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.9µs " +"2019-09-24 00:25:21.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU f02 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:21.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU f03 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:21.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f04 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:21.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f05 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2019-09-24 00:25:21.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU f06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.6µs " +"2019-09-24 00:25:21.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f07 Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +"2019-09-24 00:25:21.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f08 Sending msg of 28 bytes to 3 on channel businesschannel took 52.8µs" +"2019-09-24 00:25:21.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.4µs " +"2019-09-24 00:25:21.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.7µs " +"2019-09-24 00:25:21.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:21.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:22.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:22.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0e Sending msg of 28 bytes to 3 on channel testchainid took 44.2µs" +"2019-09-24 00:25:22.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182µs " +"2019-09-24 00:25:22.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f10 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +"2019-09-24 00:25:22.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f11 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +"2019-09-24 00:25:22.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " +"2019-09-24 00:25:22.455 UTC [orderer.common.cluster.step] sendMessage -> DEBU f13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 751.1µs " +"2019-09-24 00:25:22.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU f14 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:22.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU f15 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:22.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f16 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:22.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f17 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2019-09-24 00:25:22.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " +"2019-09-24 00:25:22.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f19 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +"2019-09-24 00:25:22.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1a Sending msg of 28 bytes to 3 on channel businesschannel took 17µs" +"2019-09-24 00:25:22.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.8µs " +"2019-09-24 00:25:22.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109µs " +"2019-09-24 00:25:22.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:22.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:23.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:23.139 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f20 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2019-09-24 00:25:23.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU f21 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 258.3µs " +"2019-09-24 00:25:23.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f22 Sending msg of 28 bytes to 2 on channel businesschannel took 49.5µs" +"2019-09-24 00:25:23.457 UTC [orderer.common.cluster.step] sendMessage -> DEBU f23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 400.3µs " +"2019-09-24 00:25:23.458 UTC [orderer.common.cluster.step] sendMessage -> DEBU f24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.7µs " +"2019-09-24 00:25:23.458 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f25 Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" +"2019-09-24 00:25:23.460 UTC [orderer.common.cluster.step] handleMessage -> DEBU f26 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:23.460 UTC [orderer.common.cluster.step] handleMessage -> DEBU f27 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:23.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f28 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:23.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f29 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2019-09-24 00:25:23.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71µs " +"2019-09-24 00:25:23.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2b Sending msg of 28 bytes to 2 on channel businesschannel took 37µs" +"2019-09-24 00:25:23.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.3µs " +"2019-09-24 00:25:23.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2d Sending msg of 28 bytes to 3 on channel businesschannel took 50.7µs" +"2019-09-24 00:25:23.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.7µs " +"2019-09-24 00:25:23.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:23.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f30 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:24.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU f31 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:24.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f32 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +"2019-09-24 00:25:24.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.1µs " +"2019-09-24 00:25:24.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f34 Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +"2019-09-24 00:25:24.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f35 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2019-09-24 00:25:24.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.9µs " +"2019-09-24 00:25:24.451 UTC [orderer.common.cluster.step] sendMessage -> DEBU f37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.9µs " +"2019-09-24 00:25:24.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU f38 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:24.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f39 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:24.641 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:24.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3b Sending msg of 28 bytes to 3 on channel testchainid took 28µs" +"2019-09-24 00:25:24.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161µs " +"2019-09-24 00:25:24.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3d Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +"2019-09-24 00:25:24.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3e Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +"2019-09-24 00:25:24.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.9µs " +"2019-09-24 00:25:24.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.5µs " +"2019-09-24 00:25:24.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f41 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:24.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:25.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU f43 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:25.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f44 Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs" +"2019-09-24 00:25:25.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU f45 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.2µs " +"2019-09-24 00:25:25.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f46 Sending msg of 28 bytes to 2 on channel businesschannel took 41.4µs" +"2019-09-24 00:25:25.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f47 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2019-09-24 00:25:25.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 290.2µs " +"2019-09-24 00:25:25.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU f49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96µs " +"2019-09-24 00:25:25.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:25.456 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:25.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:25.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4d Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +"2019-09-24 00:25:25.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.3µs " +"2019-09-24 00:25:25.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4f Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2019-09-24 00:25:25.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f50 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2019-09-24 00:25:25.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.9µs " +"2019-09-24 00:25:25.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.1µs " +"2019-09-24 00:25:25.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU f53 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:25.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU f54 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:26.141 UTC [orderer.common.cluster.step] handleMessage -> DEBU f55 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:26.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f56 Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +"2019-09-24 00:25:26.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.4µs " +"2019-09-24 00:25:26.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f58 Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +"2019-09-24 00:25:26.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f59 Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +"2019-09-24 00:25:26.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 233.6µs " +"2019-09-24 00:25:26.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 510µs " +"2019-09-24 00:25:26.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:26.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:26.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:26.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5f Sending msg of 28 bytes to 3 on channel testchainid took 125.1µs" +"2019-09-24 00:25:26.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.0841ms " +"2019-09-24 00:25:26.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f61 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +"2019-09-24 00:25:26.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f62 Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +"2019-09-24 00:25:26.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108µs " +"2019-09-24 00:25:26.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 190.2µs " +"2019-09-24 00:25:26.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f65 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:26.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f66 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:27.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU f67 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:27.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f68 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2019-09-24 00:25:27.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU f69 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80µs " +"2019-09-24 00:25:27.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6a Sending msg of 28 bytes to 2 on channel businesschannel took 49.3µs" +"2019-09-24 00:25:27.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6b Sending msg of 28 bytes to 3 on channel businesschannel took 9.4µs" +"2019-09-24 00:25:27.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.9µs " +"2019-09-24 00:25:27.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.1µs " +"2019-09-24 00:25:27.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:27.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:27.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU f70 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:27.638 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f71 Sending msg of 28 bytes to 3 on channel testchainid took 23.5µs" +"2019-09-24 00:25:27.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU f72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.5µs " +"2019-09-24 00:25:27.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f73 Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +"2019-09-24 00:25:27.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f74 Sending msg of 28 bytes to 3 on channel businesschannel took 23µs" +"2019-09-24 00:25:27.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " +"2019-09-24 00:25:27.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.6µs " +"2019-09-24 00:25:27.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f77 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:27.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f78 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:28.139 UTC [orderer.common.cluster.step] handleMessage -> DEBU f79 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:28.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7a Sending msg of 28 bytes to 3 on channel testchainid took 92.1µs" +"2019-09-24 00:25:28.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 270.5µs " +"2019-09-24 00:25:28.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7c Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +"2019-09-24 00:25:28.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7d Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +"2019-09-24 00:25:28.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.5µs " +"2019-09-24 00:25:28.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +"2019-09-24 00:25:28.453 UTC [orderer.common.cluster.step] handleMessage -> DEBU f80 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:28.465 UTC [orderer.common.cluster.step] handleMessage -> DEBU f81 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:28.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f82 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:28.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f83 Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +"2019-09-24 00:25:28.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.4µs " +"2019-09-24 00:25:28.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f85 Sending msg of 28 bytes to 2 on channel businesschannel took 37.7µs" +"2019-09-24 00:25:28.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f86 Sending msg of 28 bytes to 3 on channel businesschannel took 25.5µs" +"2019-09-24 00:25:28.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.3µs " +"2019-09-24 00:25:28.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU f88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.4µs " +"2019-09-24 00:25:28.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f89 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:28.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:29.141 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:29.145 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8c Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" +"2019-09-24 00:25:29.145 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 277.2µs " +"2019-09-24 00:25:29.456 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8e Sending msg of 28 bytes to 2 on channel businesschannel took 142µs" +"2019-09-24 00:25:29.457 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.3µs " +"2019-09-24 00:25:29.457 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f90 Sending msg of 28 bytes to 3 on channel businesschannel took 32µs" +"2019-09-24 00:25:29.458 UTC [orderer.common.cluster.step] sendMessage -> DEBU f91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.3µs " +"2019-09-24 00:25:29.458 UTC [orderer.common.cluster.step] handleMessage -> DEBU f92 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:29.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU f93 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:29.657 UTC [orderer.common.cluster.step] handleMessage -> DEBU f94 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:29.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f95 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +"2019-09-24 00:25:29.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU f96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.4µs " +"2019-09-24 00:25:29.957 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f97 Sending msg of 28 bytes to 2 on channel businesschannel took 64.5µs" +"2019-09-24 00:25:29.958 UTC [orderer.common.cluster.step] sendMessage -> DEBU f99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 346.5µs " +"2019-09-24 00:25:29.958 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " +"2019-09-24 00:25:29.959 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:29.960 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:29.958 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f98 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2019-09-24 00:25:30.141 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:30.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9e Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-09-24 00:25:30.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " +"2019-09-24 00:25:30.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa0 Sending msg of 28 bytes to 2 on channel businesschannel took 213µs" +"2019-09-24 00:25:30.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa1 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2019-09-24 00:25:30.457 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.3µs " +"2019-09-24 00:25:30.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:30.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:30.459 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 6.198ms " +"2019-09-24 00:25:30.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:30.670 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa7 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-09-24 00:25:30.670 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.9µs " +"2019-09-24 00:25:30.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa9 Sending msg of 28 bytes to 3 on channel businesschannel took 68.2µs" +"2019-09-24 00:25:30.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faa Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +"2019-09-24 00:25:30.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU fab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 162.1µs " +"2019-09-24 00:25:30.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU fac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.6µs " +"2019-09-24 00:25:30.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU fad Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:30.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU fae Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:31.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU faf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:31.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb0 Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +"2019-09-24 00:25:31.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.8µs " +"2019-09-24 00:25:31.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb2 Sending msg of 28 bytes to 2 on channel businesschannel took 129.5µs" +"2019-09-24 00:25:31.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb3 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +"2019-09-24 00:25:31.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.7µs " +"2019-09-24 00:25:31.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.4µs " +"2019-09-24 00:25:31.465 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:31.465 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:31.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:31.645 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb9 Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +"2019-09-24 00:25:31.645 UTC [orderer.common.cluster.step] sendMessage -> DEBU fba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.8µs " +"2019-09-24 00:25:31.953 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbb Sending msg of 28 bytes to 2 on channel businesschannel took 38.5µs" +"2019-09-24 00:25:31.953 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbc Sending msg of 28 bytes to 3 on channel businesschannel took 25.8µs" +"2019-09-24 00:25:31.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.5µs " +"2019-09-24 00:25:31.955 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 806.3µs " +"2019-09-24 00:25:31.976 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:31.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:32.139 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:32.139 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc2 Sending msg of 28 bytes to 3 on channel testchainid took 32µs" +"2019-09-24 00:25:32.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.5µs " +"2019-09-24 00:25:32.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc4 Sending msg of 28 bytes to 2 on channel businesschannel took 102.3µs" +"2019-09-24 00:25:32.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc5 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +"2019-09-24 00:25:32.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.2µs " +"2019-09-24 00:25:32.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 94.2µs " +"2019-09-24 00:25:32.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc8 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:32.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:32.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU fca Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:32.648 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.8µs " +"2019-09-24 00:25:32.645 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcc Sending msg of 28 bytes to 3 on channel testchainid took 45.3µs" +"2019-09-24 00:25:32.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcd Sending msg of 28 bytes to 2 on channel businesschannel took 144.2µs" +"2019-09-24 00:25:32.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fce Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +"2019-09-24 00:25:32.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.8µs " +"2019-09-24 00:25:32.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 179.3µs " +"2019-09-24 00:25:32.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:32.960 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:33.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:33.139 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd4 Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +"2019-09-24 00:25:33.139 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " +"2019-09-24 00:25:33.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd6 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2019-09-24 00:25:33.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd7 Sending msg of 28 bytes to 3 on channel businesschannel took 192.9µs" +"2019-09-24 00:25:33.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.1µs " +"2019-09-24 00:25:33.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.4µs " +"2019-09-24 00:25:33.473 UTC [orderer.common.cluster.step] handleMessage -> DEBU fda Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:33.474 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:33.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:33.640 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdd Sending msg of 28 bytes to 3 on channel testchainid took 30.6µs" +"2019-09-24 00:25:33.640 UTC [orderer.common.cluster.step] sendMessage -> DEBU fde Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122µs " +"2019-09-24 00:25:33.979 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdf Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +"2019-09-24 00:25:33.979 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe0 Sending msg of 28 bytes to 2 on channel businesschannel took 204.7µs" +"2019-09-24 00:25:33.980 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 303.1µs " +"2019-09-24 00:25:33.996 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:33.996 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:33.997 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 16.3346ms " +"2019-09-24 00:25:34.139 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:34.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe6 Sending msg of 28 bytes to 3 on channel testchainid took 61.3µs" +"2019-09-24 00:25:34.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 354.6µs " +"2019-09-24 00:25:34.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe8 Sending msg of 28 bytes to 2 on channel businesschannel took 30.1µs" +"2019-09-24 00:25:34.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe9 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2019-09-24 00:25:34.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU fea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.3µs " +"2019-09-24 00:25:34.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU feb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.7µs " +"2019-09-24 00:25:34.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU fec Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:34.455 UTC [orderer.common.cluster.step] handleMessage -> DEBU fed Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:34.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU fee Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:34.647 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fef Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +"2019-09-24 00:25:34.647 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.9µs " +"2019-09-24 00:25:34.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff1 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +"2019-09-24 00:25:34.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +"2019-09-24 00:25:34.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +"2019-09-24 00:25:34.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 38.4µs " +"2019-09-24 00:25:34.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:34.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:35.149 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:35.149 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff8 Sending msg of 28 bytes to 3 on channel testchainid took 37.9µs" +"2019-09-24 00:25:35.149 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.5µs " +"2019-09-24 00:25:35.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffa Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +"2019-09-24 00:25:35.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffb Sending msg of 28 bytes to 3 on channel businesschannel took 53.2µs" +"2019-09-24 00:25:35.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.1µs " +"2019-09-24 00:25:35.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.6µs " +"2019-09-24 00:25:35.493 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffe Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:35.494 UTC [orderer.common.cluster.step] handleMessage -> DEBU fff Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:35.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1000 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:35.664 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1001 Sending msg of 28 bytes to 3 on channel testchainid took 46.7µs" +"2019-09-24 00:25:35.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1002 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 820µs " +"2019-09-24 00:25:35.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1003 Sending msg of 28 bytes to 2 on channel businesschannel took 42.3µs" +"2019-09-24 00:25:35.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1004 Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" +"2019-09-24 00:25:35.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1005 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.1µs " +"2019-09-24 00:25:35.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1006 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.3µs " +"2019-09-24 00:25:35.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1007 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:35.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1008 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:36.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1009 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:36.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +"2019-09-24 00:25:36.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 249µs " +"2019-09-24 00:25:36.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100c Sending msg of 28 bytes to 2 on channel businesschannel took 92.4µs" +"2019-09-24 00:25:36.458 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100e Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +"2019-09-24 00:25:36.459 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.4µs " +"2019-09-24 00:25:36.455 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.3µs " +"2019-09-24 00:25:36.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1010 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:36.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1011 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:36.640 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1012 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:36.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1013 Sending msg of 28 bytes to 3 on channel testchainid took 46.1µs" +"2019-09-24 00:25:36.647 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1014 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.7972ms " +"2019-09-24 00:25:36.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1015 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +"2019-09-24 00:25:36.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1016 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +"2019-09-24 00:25:36.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1017 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 840.5µs " +"2019-09-24 00:25:36.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1018 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.9µs " +"2019-09-24 00:25:36.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1019 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:36.963 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:37.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:37.161 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 236.6µs " +"2019-09-24 00:25:37.161 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101d Sending msg of 28 bytes to 3 on channel testchainid took 46.7µs" +"2019-09-24 00:25:37.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101e Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +"2019-09-24 00:25:37.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101f Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2019-09-24 00:25:37.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1020 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.6µs " +"2019-09-24 00:25:37.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1021 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.8µs " +"2019-09-24 00:25:37.464 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1022 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:37.464 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1023 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:37.650 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1024 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:37.650 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +"2019-09-24 00:25:37.650 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1026 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " +"2019-09-24 00:25:37.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1027 Sending msg of 28 bytes to 2 on channel businesschannel took 34.2µs" +"2019-09-24 00:25:37.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1028 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +"2019-09-24 00:25:37.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1029 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.8µs " +"2019-09-24 00:25:37.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104.9µs " +"2019-09-24 00:25:37.955 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:37.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:38.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:38.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102e Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +"2019-09-24 00:25:38.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.2µs " +"2019-09-24 00:25:38.451 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1030 Sending msg of 28 bytes to 2 on channel businesschannel took 31.3µs" +"2019-09-24 00:25:38.452 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1031 Sending msg of 28 bytes to 3 on channel businesschannel took 31µs" +"2019-09-24 00:25:38.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1032 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.1µs " +"2019-09-24 00:25:38.452 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1033 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.3µs " +"2019-09-24 00:25:38.462 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1034 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:38.462 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1035 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:38.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1036 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:38.645 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1037 Sending msg of 28 bytes to 3 on channel testchainid took 115.2µs" +"2019-09-24 00:25:38.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1038 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 582.2µs " +"2019-09-24 00:25:38.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1039 Sending msg of 28 bytes to 2 on channel businesschannel took 28.2µs" +"2019-09-24 00:25:38.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103a Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2019-09-24 00:25:38.959 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.5µs " +"2019-09-24 00:25:38.959 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.8µs " +"2019-09-24 00:25:38.964 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:38.965 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:39.148 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:39.149 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1040 Sending msg of 28 bytes to 3 on channel testchainid took 11.1µs" +"2019-09-24 00:25:39.149 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1041 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " +"2019-09-24 00:25:39.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1042 Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" +"2019-09-24 00:25:39.453 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1043 Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" +"2019-09-24 00:25:39.453 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1044 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 318.9µs " +"2019-09-24 00:25:39.454 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1045 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 132.4µs " +"2019-09-24 00:25:39.457 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1046 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:39.457 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1047 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:39.646 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1048 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:39.647 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1049 Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +"2019-09-24 00:25:39.648 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.1µs " +"2019-09-24 00:25:39.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104b Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +"2019-09-24 00:25:39.952 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104c Sending msg of 28 bytes to 3 on channel businesschannel took 23.9µs" +"2019-09-24 00:25:39.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.8µs " +"2019-09-24 00:25:39.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96µs " +"2019-09-24 00:25:39.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:39.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1050 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:40.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1051 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:40.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1052 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +"2019-09-24 00:25:40.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1053 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.3µs " +"2019-09-24 00:25:40.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1054 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +"2019-09-24 00:25:40.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1055 Sending msg of 28 bytes to 3 on channel businesschannel took 34.8µs" +"2019-09-24 00:25:40.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1056 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.8µs " +"2019-09-24 00:25:40.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1057 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.8µs " +"2019-09-24 00:25:40.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1058 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:40.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1059 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:40.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:40.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105b Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +"2019-09-24 00:25:40.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.9µs " +"2019-09-24 00:25:40.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105d Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" +"2019-09-24 00:25:40.933 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105e Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +"2019-09-24 00:25:40.933 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 326.7µs " +"2019-09-24 00:25:40.934 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1060 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 247.6µs " +"2019-09-24 00:25:40.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1061 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:40.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1062 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:41.123 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1063 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:41.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1064 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +"2019-09-24 00:25:41.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1065 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.6µs " +"2019-09-24 00:25:41.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1066 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +"2019-09-24 00:25:41.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1067 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +"2019-09-24 00:25:41.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1068 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +"2019-09-24 00:25:41.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1069 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.3µs " +"2019-09-24 00:25:41.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:41.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:41.617 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:41.618 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106d Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-09-24 00:25:41.618 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.6µs " +"2019-09-24 00:25:41.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106f Sending msg of 28 bytes to 2 on channel businesschannel took 33.5µs" +"2019-09-24 00:25:41.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1070 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2019-09-24 00:25:41.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1071 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116µs " +"2019-09-24 00:25:41.951 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1072 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.6µs " +"2019-09-24 00:25:41.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1073 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:41.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1074 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:42.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1075 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:42.118 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1076 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2019-09-24 00:25:42.118 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1077 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.5µs " +"2019-09-24 00:25:42.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1078 Sending msg of 28 bytes to 2 on channel businesschannel took 130.2µs" +"2019-09-24 00:25:42.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1079 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.1µs " +"2019-09-24 00:25:42.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107a Sending msg of 28 bytes to 3 on channel businesschannel took 118.4µs" +"2019-09-24 00:25:42.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.8µs " +"2019-09-24 00:25:42.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:42.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:42.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:42.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107f Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2019-09-24 00:25:42.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1080 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.9µs " +"2019-09-24 00:25:42.921 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1081 Sending msg of 28 bytes to 2 on channel businesschannel took 12.9µs" +"2019-09-24 00:25:42.922 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1082 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +"2019-09-24 00:25:42.922 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1083 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " +"2019-09-24 00:25:42.922 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1084 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.7µs " +"2019-09-24 00:25:42.923 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1085 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:42.923 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1086 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:43.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1087 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:43.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1088 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +"2019-09-24 00:25:43.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1089 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +"2019-09-24 00:25:43.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108a Sending msg of 28 bytes to 2 on channel businesschannel took 51.7µs" +"2019-09-24 00:25:43.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108b Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +"2019-09-24 00:25:43.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 212.8µs " +"2019-09-24 00:25:43.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.3µs " +"2019-09-24 00:25:43.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:43.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:43.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1090 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:43.603 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1091 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +"2019-09-24 00:25:43.603 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1092 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.7µs " +"2019-09-24 00:25:43.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1093 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +"2019-09-24 00:25:43.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2019-09-24 00:25:43.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1095 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " +"2019-09-24 00:25:43.924 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1096 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.4µs " +"2019-09-24 00:25:43.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1097 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:43.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1098 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:44.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1099 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:44.103 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109a Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +"2019-09-24 00:25:44.104 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.1µs " +"2019-09-24 00:25:44.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109c Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2019-09-24 00:25:44.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109d Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2019-09-24 00:25:44.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.4µs " +"2019-09-24 00:25:44.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.6µs " +"2019-09-24 00:25:44.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:44.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:44.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:44.603 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a3 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +"2019-09-24 00:25:44.604 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.3µs " +"2019-09-24 00:25:44.685 UTC [orderer.common.server] replicateDisabledChains -> DEBU 10a5 No inactive chains to try to replicate" +"2019-09-24 00:25:44.919 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a6 Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" +"2019-09-24 00:25:44.919 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a7 Sending msg of 28 bytes to 3 on channel businesschannel took 23.5µs" +"2019-09-24 00:25:44.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.7µs " +"2019-09-24 00:25:44.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.6µs " +"2019-09-24 00:25:44.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10aa Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:44.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ab Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:45.105 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ac Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:45.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ad Sending msg of 28 bytes to 3 on channel testchainid took 12.3µs" +"2019-09-24 00:25:45.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.8µs " +"2019-09-24 00:25:45.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10af Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +"2019-09-24 00:25:45.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b0 Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +"2019-09-24 00:25:45.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.1µs " +"2019-09-24 00:25:45.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.5µs " +"2019-09-24 00:25:45.431 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:45.432 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:45.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:45.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b6 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +"2019-09-24 00:25:45.603 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.2µs " +"2019-09-24 00:25:45.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b8 Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +"2019-09-24 00:25:45.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b9 Sending msg of 28 bytes to 3 on channel businesschannel took 33.2µs" +"2019-09-24 00:25:45.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.4µs " +"2019-09-24 00:25:45.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70µs " +"2019-09-24 00:25:45.931 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bc Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:45.931 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:46.107 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10be Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:46.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bf Sending msg of 28 bytes to 3 on channel testchainid took 123.5µs" +"2019-09-24 00:25:46.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.6µs " +"2019-09-24 00:25:46.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c1 Sending msg of 28 bytes to 3 on channel businesschannel took 26µs" +"2019-09-24 00:25:46.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c2 Sending msg of 28 bytes to 2 on channel businesschannel took 14.6µs" +"2019-09-24 00:25:46.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.8µs " +"2019-09-24 00:25:46.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 39.8µs " +"2019-09-24 00:25:46.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:46.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:46.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:46.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c8 Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +"2019-09-24 00:25:46.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.5µs " +"2019-09-24 00:25:46.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ca Sending msg of 28 bytes to 2 on channel businesschannel took 30.1µs" +"2019-09-24 00:25:46.923 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cb Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2019-09-24 00:25:46.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 343.8µs " +"2019-09-24 00:25:46.925 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84.4µs " +"2019-09-24 00:25:46.930 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ce Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:46.930 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:47.102 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:47.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d1 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +"2019-09-24 00:25:47.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.7µs " +"2019-09-24 00:25:47.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d3 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +"2019-09-24 00:25:47.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d4 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +"2019-09-24 00:25:47.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.8µs " +"2019-09-24 00:25:47.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " +"2019-09-24 00:25:47.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:47.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:47.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:47.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10da Sending msg of 28 bytes to 3 on channel testchainid took 6.9µs" +"2019-09-24 00:25:47.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10db Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.6µs " +"2019-09-24 00:25:47.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10dc Sending msg of 28 bytes to 2 on channel businesschannel took 58.9µs" +"2019-09-24 00:25:47.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10dd Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2019-09-24 00:25:47.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10de Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " +"2019-09-24 00:25:47.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.3µs " +"2019-09-24 00:25:47.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:47.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:48.102 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:48.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e3 Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +"2019-09-24 00:25:48.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.1µs " +"2019-09-24 00:25:48.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e5 Sending msg of 28 bytes to 2 on channel businesschannel took 32.4µs" +"2019-09-24 00:25:48.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e6 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2019-09-24 00:25:48.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.8µs " +"2019-09-24 00:25:48.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.6µs " +"2019-09-24 00:25:48.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:48.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ea Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:48.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10eb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:48.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ec Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-09-24 00:25:48.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ed Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.1µs " +"2019-09-24 00:25:48.914 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ee Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +"2019-09-24 00:25:48.914 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ef Sending msg of 28 bytes to 2 on channel businesschannel took 6.1µs" +"2019-09-24 00:25:48.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.5µs " +"2019-09-24 00:25:48.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 45.3µs " +"2019-09-24 00:25:48.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:48.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:49.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:49.103 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f5 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +"2019-09-24 00:25:49.103 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.4µs " +"2019-09-24 00:25:49.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f7 Sending msg of 28 bytes to 2 on channel businesschannel took 47.5µs" +"2019-09-24 00:25:49.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f8 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +"2019-09-24 00:25:49.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.8µs " +"2019-09-24 00:25:49.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 255.1µs " +"2019-09-24 00:25:49.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10fb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:49.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10fc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:49.603 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10fd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:49.603 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fe Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2019-09-24 00:25:49.603 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.7µs " +"2019-09-24 00:25:49.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1100 Sending msg of 28 bytes to 2 on channel businesschannel took 31.8µs" +"2019-09-24 00:25:49.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1101 Sending msg of 28 bytes to 3 on channel businesschannel took 139.8µs" +"2019-09-24 00:25:49.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1102 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.2µs " +"2019-09-24 00:25:49.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1103 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.4µs " +"2019-09-24 00:25:49.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1104 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:49.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1105 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:50.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1106 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:50.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1107 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +"2019-09-24 00:25:50.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1108 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.7µs " +"2019-09-24 00:25:50.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1109 Sending msg of 28 bytes to 3 on channel businesschannel took 32.8µs" +"2019-09-24 00:25:50.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110a Sending msg of 28 bytes to 2 on channel businesschannel took 11.6µs" +"2019-09-24 00:25:50.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.2µs " +"2019-09-24 00:25:50.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 47µs " +"2019-09-24 00:25:50.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:50.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:50.603 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:50.603 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +"2019-09-24 00:25:50.603 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1111 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.7µs " +"2019-09-24 00:25:50.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1112 Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +"2019-09-24 00:25:50.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1113 Sending msg of 28 bytes to 3 on channel businesschannel took 142.4µs" +"2019-09-24 00:25:50.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1114 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.5µs " +"2019-09-24 00:25:50.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1115 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.7µs " +"2019-09-24 00:25:50.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1116 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:50.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1117 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:51.114 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1118 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:51.114 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" +"2019-09-24 00:25:51.115 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0863ms " +"2019-09-24 00:25:51.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111b Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +"2019-09-24 00:25:51.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111c Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +"2019-09-24 00:25:51.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +"2019-09-24 00:25:51.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 257.5µs " +"2019-09-24 00:25:51.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:51.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1120 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:51.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1121 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:51.603 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +"2019-09-24 00:25:51.603 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1123 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.1µs " +"2019-09-24 00:25:51.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1124 Sending msg of 28 bytes to 2 on channel businesschannel took 44.4µs" +"2019-09-24 00:25:51.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1125 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2019-09-24 00:25:51.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1126 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " +"2019-09-24 00:25:51.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1127 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.9µs " +"2019-09-24 00:25:51.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1128 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:51.923 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1129 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:52.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:52.103 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112b Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-09-24 00:25:52.103 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.6µs " +"2019-09-24 00:25:52.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112d Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2019-09-24 00:25:52.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112e Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2019-09-24 00:25:52.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +"2019-09-24 00:25:52.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1130 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53µs " +"2019-09-24 00:25:52.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1131 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:52.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1132 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:52.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1133 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:52.604 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 28 bytes to 3 on channel testchainid took 76.5µs" +"2019-09-24 00:25:52.604 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1135 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.6µs " +"2019-09-24 00:25:52.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1136 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +"2019-09-24 00:25:52.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1137 Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +"2019-09-24 00:25:52.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1138 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.5µs " +"2019-09-24 00:25:52.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1139 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.4µs " +"2019-09-24 00:25:52.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:52.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:53.104 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:53.105 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 28 bytes to 3 on channel testchainid took 68.9µs" +"2019-09-24 00:25:53.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147µs " +"2019-09-24 00:25:53.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113f Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +"2019-09-24 00:25:53.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1140 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.4µs " +"2019-09-24 00:25:53.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1141 Sending msg of 28 bytes to 3 on channel businesschannel took 37.1µs" +"2019-09-24 00:25:53.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1142 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.9µs " +"2019-09-24 00:25:53.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1143 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:53.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1144 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:53.607 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1145 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:53.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1146 Sending msg of 28 bytes to 3 on channel testchainid took 55.8µs" +"2019-09-24 00:25:53.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1147 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +"2019-09-24 00:25:53.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1148 Sending msg of 28 bytes to 2 on channel businesschannel took 52.3µs" +"2019-09-24 00:25:53.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1149 Sending msg of 28 bytes to 3 on channel businesschannel took 77.2µs" +"2019-09-24 00:25:53.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 241.5µs " +"2019-09-24 00:25:53.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 277.5µs " +"2019-09-24 00:25:53.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:53.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:54.105 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:54.105 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114f Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +"2019-09-24 00:25:54.105 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1150 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +"2019-09-24 00:25:54.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1151 Sending msg of 28 bytes to 3 on channel businesschannel took 19.4µs" +"2019-09-24 00:25:54.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1152 Sending msg of 28 bytes to 2 on channel businesschannel took 12.8µs" +"2019-09-24 00:25:54.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1153 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.2µs " +"2019-09-24 00:25:54.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1154 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:54.424 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1155 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:54.422 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1156 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 7.1074ms " +"2019-09-24 00:25:54.605 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1157 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:54.605 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1158 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2019-09-24 00:25:54.605 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1159 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109µs " +"2019-09-24 00:25:54.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115a Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +"2019-09-24 00:25:54.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115b Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" +"2019-09-24 00:25:54.920 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.4µs " +"2019-09-24 00:25:54.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64µs " +"2019-09-24 00:25:54.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:54.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:55.107 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1160 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:55.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1161 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2019-09-24 00:25:55.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1162 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.2µs " +"2019-09-24 00:25:55.425 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1163 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +"2019-09-24 00:25:55.425 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1164 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +"2019-09-24 00:25:55.425 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1165 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.6µs " +"2019-09-24 00:25:55.425 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1166 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.6µs " +"2019-09-24 00:25:55.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1167 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:55.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1168 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:55.606 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1169 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:55.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116a Sending msg of 28 bytes to 3 on channel testchainid took 23.4µs" +"2019-09-24 00:25:55.606 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87µs " +"2019-09-24 00:25:55.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116c Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +"2019-09-24 00:25:55.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116d Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +"2019-09-24 00:25:55.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.3µs " +"2019-09-24 00:25:55.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.3µs " +"2019-09-24 00:25:55.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1170 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:55.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1171 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:56.115 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1172 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:56.115 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1173 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +"2019-09-24 00:25:56.115 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1174 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.7µs " +"2019-09-24 00:25:56.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1175 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2019-09-24 00:25:56.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1176 Sending msg of 28 bytes to 2 on channel businesschannel took 5.9µs" +"2019-09-24 00:25:56.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1177 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.3µs " +"2019-09-24 00:25:56.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1178 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 41.4µs " +"2019-09-24 00:25:56.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1179 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:56.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:56.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:56.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117c Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-09-24 00:25:56.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " +"2019-09-24 00:25:56.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117e Sending msg of 28 bytes to 2 on channel businesschannel took 94.4µs" +"2019-09-24 00:25:56.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117f Sending msg of 28 bytes to 3 on channel businesschannel took 28.8µs" +"2019-09-24 00:25:56.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1180 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 233.4µs " +"2019-09-24 00:25:56.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1181 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.3µs " +"2019-09-24 00:25:56.923 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1182 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:56.924 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1183 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:57.104 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1184 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:57.104 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1185 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2019-09-24 00:25:57.104 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1186 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.2µs " +"2019-09-24 00:25:57.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1187 Sending msg of 28 bytes to 2 on channel businesschannel took 52.2µs" +"2019-09-24 00:25:57.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1188 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" +"2019-09-24 00:25:57.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1189 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 245.6µs " +"2019-09-24 00:25:57.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.1µs " +"2019-09-24 00:25:57.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:57.430 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:57.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:57.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118e Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +"2019-09-24 00:25:57.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " +"2019-09-24 00:25:57.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1190 Sending msg of 28 bytes to 3 on channel businesschannel took 36µs" +"2019-09-24 00:25:57.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1191 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +"2019-09-24 00:25:57.920 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1192 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.1µs " +"2019-09-24 00:25:57.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1193 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +"2019-09-24 00:25:57.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1194 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:57.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1195 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:58.102 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1196 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:58.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1197 Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +"2019-09-24 00:25:58.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1198 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.8µs " +"2019-09-24 00:25:58.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1199 Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +"2019-09-24 00:25:58.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 119a Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" +"2019-09-24 00:25:58.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.7µs " +"2019-09-24 00:25:58.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 205.6µs " +"2019-09-24 00:25:58.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 119d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:58.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 119e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:58.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 119f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:58.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a0 Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +"2019-09-24 00:25:58.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +"2019-09-24 00:25:58.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a2 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +"2019-09-24 00:25:58.919 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a3 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2019-09-24 00:25:58.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " +"2019-09-24 00:25:58.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.3µs " +"2019-09-24 00:25:58.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:58.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:59.105 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:59.105 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a9 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2019-09-24 00:25:59.105 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11aa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.4µs " +"2019-09-24 00:25:59.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ab Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +"2019-09-24 00:25:59.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ac Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" +"2019-09-24 00:25:59.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104µs " +"2019-09-24 00:25:59.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.4µs " +"2019-09-24 00:25:59.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11af Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:59.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:59.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:25:59.604 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b2 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +"2019-09-24 00:25:59.605 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " +"2019-09-24 00:25:59.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b4 Sending msg of 28 bytes to 2 on channel businesschannel took 27.5µs" +"2019-09-24 00:25:59.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b5 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2019-09-24 00:25:59.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " +"2019-09-24 00:25:59.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.4µs " +"2019-09-24 00:25:59.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:25:59.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:00.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ba Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:00.101 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11bb Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +"2019-09-24 00:26:00.101 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11bc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +"2019-09-24 00:26:00.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11bd Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" +"2019-09-24 00:26:00.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11be Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" +"2019-09-24 00:26:00.444 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.9µs " +"2019-09-24 00:26:00.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.9µs " +"2019-09-24 00:26:00.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c1 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:00.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:00.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:00.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c4 Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" +"2019-09-24 00:26:00.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " +"2019-09-24 00:26:00.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c6 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +"2019-09-24 00:26:00.919 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c7 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2019-09-24 00:26:00.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs " +"2019-09-24 00:26:00.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58µs " +"2019-09-24 00:26:00.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ca Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:00.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11cb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:01.105 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11cc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:01.105 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cd Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2019-09-24 00:26:01.105 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ce Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.7µs " +"2019-09-24 00:26:01.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cf Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +"2019-09-24 00:26:01.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d0 Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +"2019-09-24 00:26:01.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +"2019-09-24 00:26:01.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.3µs " +"2019-09-24 00:26:01.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:01.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:01.606 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:01.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d6 Sending msg of 28 bytes to 3 on channel testchainid took 57.8µs" +"2019-09-24 00:26:01.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.4µs " +"2019-09-24 00:26:01.922 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d8 Sending msg of 28 bytes to 2 on channel businesschannel took 49.8µs" +"2019-09-24 00:26:01.922 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d9 Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +"2019-09-24 00:26:01.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.8µs " +"2019-09-24 00:26:01.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11db Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.5µs " +"2019-09-24 00:26:01.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11dc Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:01.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11dd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:02.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11de Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:02.127 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11df Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2019-09-24 00:26:02.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.9µs " +"2019-09-24 00:26:02.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e1 Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +"2019-09-24 00:26:02.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e2 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2019-09-24 00:26:02.422 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.2µs " +"2019-09-24 00:26:02.422 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.8µs " +"2019-09-24 00:26:02.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:02.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:02.607 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:02.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e8 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2019-09-24 00:26:02.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64µs " +"2019-09-24 00:26:02.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ea Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +"2019-09-24 00:26:02.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11eb Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +"2019-09-24 00:26:02.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.4µs " +"2019-09-24 00:26:02.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 37.5µs " +"2019-09-24 00:26:02.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ee Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:02.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ef Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:03.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:03.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f1 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2019-09-24 00:26:03.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82µs " +"2019-09-24 00:26:03.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-09-24 00:26:03.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f4 Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +"2019-09-24 00:26:03.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.3µs " +"2019-09-24 00:26:03.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.9µs " +"2019-09-24 00:26:03.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:03.418 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:03.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:03.601 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fa Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-09-24 00:26:03.601 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.2µs " +"2019-09-24 00:26:03.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fc Sending msg of 28 bytes to 2 on channel businesschannel took 34.1µs" +"2019-09-24 00:26:03.921 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fd Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +"2019-09-24 00:26:03.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " +"2019-09-24 00:26:03.921 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.5µs " +"2019-09-24 00:26:03.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1200 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:03.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1201 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:04.102 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1202 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:04.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1203 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2019-09-24 00:26:04.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1204 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.2µs " +"2019-09-24 00:26:04.415 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1205 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +"2019-09-24 00:26:04.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1206 Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" +"2019-09-24 00:26:04.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1207 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 367µs " +"2019-09-24 00:26:04.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1208 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 388.3µs " +"2019-09-24 00:26:04.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1209 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:04.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:04.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:04.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120c Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2019-09-24 00:26:04.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 120d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.4µs " +"2019-09-24 00:26:04.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120e Sending msg of 28 bytes to 2 on channel businesschannel took 61.3µs" +"2019-09-24 00:26:04.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120f Sending msg of 28 bytes to 3 on channel businesschannel took 7.5µs" +"2019-09-24 00:26:04.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1210 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.6µs " +"2019-09-24 00:26:04.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1211 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.4µs " +"2019-09-24 00:26:04.924 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1212 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:04.924 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1213 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:05.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1214 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:05.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1215 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +"2019-09-24 00:26:05.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1216 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.4µs " +"2019-09-24 00:26:05.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1217 Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs" +"2019-09-24 00:26:05.416 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1218 Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +"2019-09-24 00:26:05.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1219 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124µs " +"2019-09-24 00:26:05.416 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.6µs " +"2019-09-24 00:26:05.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:05.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:05.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:05.604 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 121e Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-09-24 00:26:05.604 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.8µs " +"2019-09-24 00:26:05.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1220 Sending msg of 28 bytes to 2 on channel businesschannel took 82.1µs" +"2019-09-24 00:26:05.916 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1221 Sending msg of 28 bytes to 3 on channel businesschannel took 532.3µs" +"2019-09-24 00:26:05.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1222 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.6µs " +"2019-09-24 00:26:05.917 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1223 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192.9µs " +"2019-09-24 00:26:05.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1224 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:05.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1225 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:06.107 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1226 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:06.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1227 Sending msg of 28 bytes to 3 on channel testchainid took 28.3µs" +"2019-09-24 00:26:06.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1228 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 346µs " +"2019-09-24 00:26:06.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1229 Sending msg of 28 bytes to 3 on channel businesschannel took 29.3µs" +"2019-09-24 00:26:06.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122a Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +"2019-09-24 00:26:06.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 170.3µs " +"2019-09-24 00:26:06.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.6µs " +"2019-09-24 00:26:06.424 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:06.424 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:06.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:06.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1230 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2019-09-24 00:26:06.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1231 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.1µs " +"2019-09-24 00:26:06.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1232 Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" +"2019-09-24 00:26:06.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1233 Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2019-09-24 00:26:06.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1234 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +"2019-09-24 00:26:06.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1235 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.8µs " +"2019-09-24 00:26:06.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1236 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:06.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1237 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:07.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1238 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:07.104 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1239 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-09-24 00:26:07.104 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 703.8µs " +"2019-09-24 00:26:07.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 123b Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2019-09-24 00:26:07.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 123c Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2019-09-24 00:26:07.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.6µs " +"2019-09-24 00:26:07.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.6µs " +"2019-09-24 00:26:07.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:07.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1240 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:07.605 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1241 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:07.605 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1242 Sending msg of 28 bytes to 3 on channel testchainid took 20.3µs" +"2019-09-24 00:26:07.605 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1243 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.9µs " +"2019-09-24 00:26:07.914 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1244 Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +"2019-09-24 00:26:07.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1245 Sending msg of 28 bytes to 3 on channel businesschannel took 24µs" +"2019-09-24 00:26:07.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1246 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186µs " +"2019-09-24 00:26:07.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1247 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.5µs " +"2019-09-24 00:26:07.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1248 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:07.917 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1249 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:08.115 UTC [orderer.common.cluster.step] handleMessage -> DEBU 124a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:08.115 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124b Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-09-24 00:26:08.116 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260.1µs " +"2019-09-24 00:26:08.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124d Sending msg of 28 bytes to 2 on channel businesschannel took 78.4µs" +"2019-09-24 00:26:08.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124e Sending msg of 28 bytes to 3 on channel businesschannel took 33.9µs" +"2019-09-24 00:26:08.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 243.8µs " +"2019-09-24 00:26:08.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1250 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.2µs " +"2019-09-24 00:26:08.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1251 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:08.424 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1252 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:08.615 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1253 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:08.615 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1254 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +"2019-09-24 00:26:08.615 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1255 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.3µs " +"2019-09-24 00:26:08.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1256 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +"2019-09-24 00:26:08.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1257 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.4µs " +"2019-09-24 00:26:08.919 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1258 Sending msg of 28 bytes to 2 on channel businesschannel took 12µs" +"2019-09-24 00:26:08.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1259 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.4µs " +"2019-09-24 00:26:08.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:08.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:09.122 UTC [orderer.common.cluster.step] handleMessage -> DEBU 125c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:09.122 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 125d Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-09-24 00:26:09.122 UTC [orderer.common.cluster.step] sendMessage -> DEBU 125e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.3µs " +"2019-09-24 00:26:09.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 125f Sending msg of 28 bytes to 2 on channel businesschannel took 245.7µs" +"2019-09-24 00:26:09.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1260 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +"2019-09-24 00:26:09.419 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1261 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.4µs " +"2019-09-24 00:26:09.420 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1262 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:09.420 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1263 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.9µs " +"2019-09-24 00:26:09.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1264 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:09.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1265 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:09.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1266 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2019-09-24 00:26:09.627 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1267 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.7µs " +"2019-09-24 00:26:09.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1268 Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +"2019-09-24 00:26:09.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1269 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2019-09-24 00:26:09.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 126a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.2µs " +"2019-09-24 00:26:09.922 UTC [orderer.common.cluster.step] handleMessage -> DEBU 126b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:09.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU 126c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 562.1µs " +"2019-09-24 00:26:09.924 UTC [orderer.common.cluster.step] handleMessage -> DEBU 126d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:10.115 UTC [orderer.common.cluster.step] handleMessage -> DEBU 126e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:10.115 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 126f Sending msg of 28 bytes to 3 on channel testchainid took 61.3µs" +"2019-09-24 00:26:10.115 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1270 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121µs " +"2019-09-24 00:26:10.387 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1271 Sending msg of 28 bytes to 2 on channel businesschannel took 34.1µs" +"2019-09-24 00:26:10.388 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1272 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +"2019-09-24 00:26:10.388 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1273 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.7µs " +"2019-09-24 00:26:10.388 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1274 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.3µs " +"2019-09-24 00:26:10.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1275 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:10.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1276 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:10.572 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1277 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:10.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1278 Sending msg of 28 bytes to 3 on channel testchainid took 282.3µs" +"2019-09-24 00:26:10.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1279 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 241.3µs " +"2019-09-24 00:26:10.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 127a Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +"2019-09-24 00:26:10.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 127b Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +"2019-09-24 00:26:10.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 127c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.5µs " +"2019-09-24 00:26:10.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 127d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.7µs " +"2019-09-24 00:26:10.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 127e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:10.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 127f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:11.119 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1280 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:11.121 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1281 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +"2019-09-24 00:26:11.121 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1282 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.1µs " +"2019-09-24 00:26:11.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1283 Sending msg of 28 bytes to 2 on channel businesschannel took 35.3µs" +"2019-09-24 00:26:11.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1284 Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +"2019-09-24 00:26:11.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1285 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.7µs " +"2019-09-24 00:26:11.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1286 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.6µs " +"2019-09-24 00:26:11.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1287 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:11.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1288 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:11.571 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1289 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:11.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128a Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-09-24 00:26:11.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.6µs " +"2019-09-24 00:26:11.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128c Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +"2019-09-24 00:26:11.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128d Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2019-09-24 00:26:11.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.4µs " +"2019-09-24 00:26:11.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.4µs " +"2019-09-24 00:26:11.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1290 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:11.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1291 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:12.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1292 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:12.085 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1293 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +"2019-09-24 00:26:12.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1294 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.8µs " +"2019-09-24 00:26:12.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1295 Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +"2019-09-24 00:26:12.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1296 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +"2019-09-24 00:26:12.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1297 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.6µs " +"2019-09-24 00:26:12.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1298 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.1µs " +"2019-09-24 00:26:12.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1299 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:12.398 UTC [orderer.common.cluster.step] handleMessage -> DEBU 129a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:12.571 UTC [orderer.common.cluster.step] handleMessage -> DEBU 129b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:12.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129c Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +"2019-09-24 00:26:12.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73µs " +"2019-09-24 00:26:12.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129e Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +"2019-09-24 00:26:12.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129f Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +"2019-09-24 00:26:12.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.7µs " +"2019-09-24 00:26:12.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160.7µs " +"2019-09-24 00:26:12.889 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:12.897 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:13.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:13.083 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a5 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2019-09-24 00:26:13.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.6µs " +"2019-09-24 00:26:13.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a7 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +"2019-09-24 00:26:13.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a8 Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +"2019-09-24 00:26:13.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.5µs " +"2019-09-24 00:26:13.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 246.8µs " +"2019-09-24 00:26:13.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ab Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:13.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ac Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:13.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ad Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:13.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ae Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2019-09-24 00:26:13.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12af Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.2µs " +"2019-09-24 00:26:13.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b0 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2019-09-24 00:26:13.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b1 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +"2019-09-24 00:26:13.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.5µs " +"2019-09-24 00:26:13.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.4µs " +"2019-09-24 00:26:13.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:13.890 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:14.072 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:14.073 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b7 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +"2019-09-24 00:26:14.073 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.8µs " +"2019-09-24 00:26:14.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b9 Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +"2019-09-24 00:26:14.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ba Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +"2019-09-24 00:26:14.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12bb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.8µs " +"2019-09-24 00:26:14.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.3µs " +"2019-09-24 00:26:14.396 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12bd Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:14.396 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12be Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:14.581 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12bf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:14.583 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.6µs " +"2019-09-24 00:26:14.583 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c1 Sending msg of 28 bytes to 3 on channel testchainid took 591.1µs" +"2019-09-24 00:26:14.889 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c2 Sending msg of 28 bytes to 2 on channel businesschannel took 51.1µs" +"2019-09-24 00:26:14.889 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c3 Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +"2019-09-24 00:26:14.889 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.2µs " +"2019-09-24 00:26:14.889 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58µs " +"2019-09-24 00:26:14.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:14.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:15.069 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:15.070 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c9 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +"2019-09-24 00:26:15.070 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +"2019-09-24 00:26:15.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12cb Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +"2019-09-24 00:26:15.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12cc Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" +"2019-09-24 00:26:15.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.3µs " +"2019-09-24 00:26:15.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.5µs " +"2019-09-24 00:26:15.388 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12cf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:15.388 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:15.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:15.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d2 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +"2019-09-24 00:26:15.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106µs " +"2019-09-24 00:26:15.888 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d4 Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +"2019-09-24 00:26:15.888 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d5 Sending msg of 28 bytes to 2 on channel businesschannel took 11.2µs" +"2019-09-24 00:26:15.888 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.6µs " +"2019-09-24 00:26:15.888 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 41.2µs " +"2019-09-24 00:26:15.889 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:15.889 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:16.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12da Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:16.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12db Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +"2019-09-24 00:26:16.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12dc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.3µs " +"2019-09-24 00:26:16.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12dd Sending msg of 28 bytes to 2 on channel businesschannel took 28.8µs" +"2019-09-24 00:26:16.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12de Sending msg of 28 bytes to 3 on channel businesschannel took 6.2µs" +"2019-09-24 00:26:16.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " +"2019-09-24 00:26:16.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.9µs " +"2019-09-24 00:26:16.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e1 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:16.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:16.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:16.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e4 Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +"2019-09-24 00:26:16.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.9µs " +"2019-09-24 00:26:16.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e6 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1µs" +"2019-09-24 00:26:16.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e7 Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +"2019-09-24 00:26:16.882 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.4µs " +"2019-09-24 00:26:16.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.8µs " +"2019-09-24 00:26:16.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ea Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:16.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12eb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:17.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ec Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:17.081 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ed Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2019-09-24 00:26:17.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ee Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62µs " +"2019-09-24 00:26:17.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ef Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +"2019-09-24 00:26:17.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f0 Sending msg of 28 bytes to 3 on channel businesschannel took 21µs" +"2019-09-24 00:26:17.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.1µs " +"2019-09-24 00:26:17.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.9µs " +"2019-09-24 00:26:17.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:17.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:17.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:17.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f6 Sending msg of 28 bytes to 3 on channel testchainid took 38.4µs" +"2019-09-24 00:26:17.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72µs " +"2019-09-24 00:26:17.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f8 Sending msg of 28 bytes to 2 on channel businesschannel took 41.4µs" +"2019-09-24 00:26:17.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f9 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2019-09-24 00:26:17.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +"2019-09-24 00:26:17.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.9µs " +"2019-09-24 00:26:17.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:17.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fd Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:18.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fe Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:18.073 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ff Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2019-09-24 00:26:18.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1300 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " +"2019-09-24 00:26:18.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1301 Sending msg of 28 bytes to 2 on channel businesschannel took 38.1µs" +"2019-09-24 00:26:18.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1302 Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs" +"2019-09-24 00:26:18.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1303 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.3µs " +"2019-09-24 00:26:18.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1304 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.7µs " +"2019-09-24 00:26:18.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1305 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:18.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1306 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:18.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1307 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:18.569 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1308 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-09-24 00:26:18.569 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1309 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.7µs " +"2019-09-24 00:26:18.882 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.9µs " +"2019-09-24 00:26:18.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130b Sending msg of 28 bytes to 2 on channel businesschannel took 13.3µs" +"2019-09-24 00:26:18.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130c Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2019-09-24 00:26:18.882 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 45.1µs " +"2019-09-24 00:26:18.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:18.884 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:19.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1310 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:19.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1311 Sending msg of 28 bytes to 3 on channel testchainid took 36.6µs" +"2019-09-24 00:26:19.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1312 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.7µs " +"2019-09-24 00:26:19.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1313 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2019-09-24 00:26:19.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1314 Sending msg of 28 bytes to 3 on channel businesschannel took 7µs" +"2019-09-24 00:26:19.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1315 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +"2019-09-24 00:26:19.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1316 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 43.7µs " +"2019-09-24 00:26:19.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1317 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:19.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1318 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:19.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1319 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:19.569 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131a Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-09-24 00:26:19.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 277.2µs " +"2019-09-24 00:26:19.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131c Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +"2019-09-24 00:26:19.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131d Sending msg of 28 bytes to 3 on channel businesschannel took 35.4µs" +"2019-09-24 00:26:19.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.1µs " +"2019-09-24 00:26:19.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.1µs " +"2019-09-24 00:26:19.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1320 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:19.884 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1321 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:20.071 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1322 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:20.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1323 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +"2019-09-24 00:26:20.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1324 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " +"2019-09-24 00:26:20.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1325 Sending msg of 28 bytes to 2 on channel businesschannel took 49.9µs" +"2019-09-24 00:26:20.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1326 Sending msg of 28 bytes to 3 on channel businesschannel took 51.4µs" +"2019-09-24 00:26:20.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1327 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 204.6µs " +"2019-09-24 00:26:20.386 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1328 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.2µs " +"2019-09-24 00:26:20.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1329 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:20.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:20.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:20.574 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132c Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +"2019-09-24 00:26:20.574 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.5µs " +"2019-09-24 00:26:20.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132e Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +"2019-09-24 00:26:20.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132f Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +"2019-09-24 00:26:20.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1330 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.8µs " +"2019-09-24 00:26:20.886 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1331 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.6µs " +"2019-09-24 00:26:20.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1332 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:20.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1333 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:21.070 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1334 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:21.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1335 Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +"2019-09-24 00:26:21.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1336 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.3µs " +"2019-09-24 00:26:21.388 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1337 Sending msg of 28 bytes to 2 on channel businesschannel took 13.3µs" +"2019-09-24 00:26:21.388 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1338 Sending msg of 28 bytes to 3 on channel businesschannel took 10.4µs" +"2019-09-24 00:26:21.388 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1339 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.3µs " +"2019-09-24 00:26:21.388 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.5µs " +"2019-09-24 00:26:21.389 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:21.389 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:21.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU 133d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:21.583 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 133e Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2019-09-24 00:26:21.583 UTC [orderer.common.cluster.step] sendMessage -> DEBU 133f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68µs " +"2019-09-24 00:26:21.896 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1340 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +"2019-09-24 00:26:21.896 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1341 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +"2019-09-24 00:26:21.896 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1342 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.6µs " +"2019-09-24 00:26:21.896 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1343 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.4µs " +"2019-09-24 00:26:21.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1344 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:21.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1345 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:22.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1346 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:22.083 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1347 Sending msg of 28 bytes to 3 on channel testchainid took 46.4µs" +"2019-09-24 00:26:22.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1348 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.7µs " +"2019-09-24 00:26:22.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1349 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +"2019-09-24 00:26:22.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 134a Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +"2019-09-24 00:26:22.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90µs " +"2019-09-24 00:26:22.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.8µs " +"2019-09-24 00:26:22.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:22.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:22.597 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:22.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1350 Sending msg of 28 bytes to 3 on channel testchainid took 35.3µs" +"2019-09-24 00:26:22.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1351 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121µs " +"2019-09-24 00:26:22.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1352 Sending msg of 28 bytes to 2 on channel businesschannel took 47.3µs" +"2019-09-24 00:26:22.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1353 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +"2019-09-24 00:26:22.891 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1354 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.5µs " +"2019-09-24 00:26:22.891 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1355 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.6µs " +"2019-09-24 00:26:22.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1356 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:22.918 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1357 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:23.069 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1358 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:23.069 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1359 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2019-09-24 00:26:23.070 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.4µs " +"2019-09-24 00:26:23.396 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 135b Sending msg of 28 bytes to 2 on channel businesschannel took 41.8µs" +"2019-09-24 00:26:23.396 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 135c Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2019-09-24 00:26:23.396 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +"2019-09-24 00:26:23.396 UTC [orderer.common.cluster.step] sendMessage -> DEBU 135e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.1µs " +"2019-09-24 00:26:23.397 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:23.397 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1360 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:23.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1361 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:23.580 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1362 Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +"2019-09-24 00:26:23.580 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1363 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +"2019-09-24 00:26:23.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1364 Sending msg of 28 bytes to 2 on channel businesschannel took 53.2µs" +"2019-09-24 00:26:23.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1365 Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +"2019-09-24 00:26:23.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1366 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.7µs " +"2019-09-24 00:26:23.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1367 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.4µs " +"2019-09-24 00:26:23.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1368 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:23.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1369 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:24.087 UTC [orderer.common.cluster.step] handleMessage -> DEBU 136a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:24.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136b Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2019-09-24 00:26:24.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.2µs " +"2019-09-24 00:26:24.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136d Sending msg of 28 bytes to 2 on channel businesschannel took 59µs" +"2019-09-24 00:26:24.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 136e Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +"2019-09-24 00:26:24.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 136f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " +"2019-09-24 00:26:24.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1370 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.8µs " +"2019-09-24 00:26:24.564 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1371 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:24.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1372 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:24.584 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1373 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:24.584 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1374 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +"2019-09-24 00:26:24.585 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1375 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +"2019-09-24 00:26:24.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1376 Sending msg of 28 bytes to 2 on channel businesschannel took 118.8µs" +"2019-09-24 00:26:24.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1377 Sending msg of 28 bytes to 3 on channel businesschannel took 18.3µs" +"2019-09-24 00:26:24.896 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1378 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.9µs " +"2019-09-24 00:26:24.908 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1379 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 5.3739ms " +"2019-09-24 00:26:24.934 UTC [orderer.common.cluster.step] handleMessage -> DEBU 137a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:24.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 137b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:25.117 UTC [orderer.common.cluster.step] handleMessage -> DEBU 137c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:25.119 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 137d Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +"2019-09-24 00:26:25.119 UTC [orderer.common.cluster.step] sendMessage -> DEBU 137e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.7µs " +"2019-09-24 00:26:25.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 137f Sending msg of 28 bytes to 2 on channel businesschannel took 46.5µs" +"2019-09-24 00:26:25.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1380 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 191.3µs " +"2019-09-24 00:26:25.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1381 Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +"2019-09-24 00:26:25.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1382 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 310.2µs " +"2019-09-24 00:26:25.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1383 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:25.441 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1384 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:25.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1385 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:25.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1386 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2019-09-24 00:26:25.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1387 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.9µs " +"2019-09-24 00:26:25.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1388 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +"2019-09-24 00:26:25.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1389 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +"2019-09-24 00:26:25.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 138a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.8µs " +"2019-09-24 00:26:25.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 138b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.4µs " +"2019-09-24 00:26:25.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU 138c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:25.905 UTC [orderer.common.cluster.step] handleMessage -> DEBU 138d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:26.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 138e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:26.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 138f Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" +"2019-09-24 00:26:26.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1390 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.4µs " +"2019-09-24 00:26:26.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1391 Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" +"2019-09-24 00:26:26.394 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1392 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +"2019-09-24 00:26:26.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1393 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.1µs " +"2019-09-24 00:26:26.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1394 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +"2019-09-24 00:26:26.398 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1395 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:26.399 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1396 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:26.595 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1397 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:26.596 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1398 Sending msg of 28 bytes to 3 on channel testchainid took 27.4µs" +"2019-09-24 00:26:26.596 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1399 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +"2019-09-24 00:26:26.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 139a Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +"2019-09-24 00:26:26.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 139b Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +"2019-09-24 00:26:26.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 139c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.6µs " +"2019-09-24 00:26:26.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 139d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.4µs " +"2019-09-24 00:26:26.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 139e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:26.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 139f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:27.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:27.100 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a1 Sending msg of 28 bytes to 3 on channel testchainid took 33.1µs" +"2019-09-24 00:26:27.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.5µs " +"2019-09-24 00:26:27.565 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a3 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +"2019-09-24 00:26:27.565 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a4 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +"2019-09-24 00:26:27.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.2µs " +"2019-09-24 00:26:27.566 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.4µs " +"2019-09-24 00:26:27.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:27.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:27.612 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a9 Sending msg of 28 bytes to 3 on channel testchainid took 28.3µs" +"2019-09-24 00:26:27.612 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13aa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.4µs " +"2019-09-24 00:26:27.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ab Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:27.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ac Sending msg of 28 bytes to 3 on channel businesschannel took 67.6µs" +"2019-09-24 00:26:27.886 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " +"2019-09-24 00:26:27.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ae Sending msg of 28 bytes to 2 on channel businesschannel took 59µs" +"2019-09-24 00:26:27.887 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13af Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 247.6µs " +"2019-09-24 00:26:27.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:27.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:28.068 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:28.069 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b3 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +"2019-09-24 00:26:28.069 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.3µs " +"2019-09-24 00:26:28.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b5 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2019-09-24 00:26:28.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b6 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +"2019-09-24 00:26:28.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120µs " +"2019-09-24 00:26:28.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.5µs " +"2019-09-24 00:26:28.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:28.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ba Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:28.607 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13bb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:28.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bc Sending msg of 28 bytes to 3 on channel testchainid took 20.1µs" +"2019-09-24 00:26:28.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13bd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.2µs " +"2019-09-24 00:26:28.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13be Sending msg of 28 bytes to 2 on channel businesschannel took 41.7µs" +"2019-09-24 00:26:28.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bf Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2019-09-24 00:26:28.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91µs " +"2019-09-24 00:26:28.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.1µs " +"2019-09-24 00:26:28.897 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:28.897 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:29.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:29.094 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c5 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +"2019-09-24 00:26:29.094 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " +"2019-09-24 00:26:29.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c7 Sending msg of 28 bytes to 2 on channel businesschannel took 28.2µs" +"2019-09-24 00:26:29.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c9 Sending msg of 28 bytes to 3 on channel businesschannel took 33.6µs" +"2019-09-24 00:26:29.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ca Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:29.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 233µs " +"2019-09-24 00:26:29.386 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.4µs " +"2019-09-24 00:26:29.389 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13cc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:29.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13cd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:29.569 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ce Sending msg of 28 bytes to 3 on channel testchainid took 28.8µs" +"2019-09-24 00:26:29.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.2µs " +"2019-09-24 00:26:29.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d0 Sending msg of 28 bytes to 3 on channel businesschannel took 46.8µs" +"2019-09-24 00:26:29.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d1 Sending msg of 28 bytes to 2 on channel businesschannel took 27.6µs" +"2019-09-24 00:26:29.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.2µs " +"2019-09-24 00:26:29.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.6µs " +"2019-09-24 00:26:29.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:29.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:30.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:30.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d7 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +"2019-09-24 00:26:30.075 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.4µs " +"2019-09-24 00:26:30.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d9 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2019-09-24 00:26:30.383 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13da Sending msg of 28 bytes to 3 on channel businesschannel took 18.3µs" +"2019-09-24 00:26:30.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13db Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.6µs " +"2019-09-24 00:26:30.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13dc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 322.9µs " +"2019-09-24 00:26:30.394 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13dd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:30.395 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13de Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:30.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13df Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:30.570 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e0 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2019-09-24 00:26:30.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.6µs " +"2019-09-24 00:26:30.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e2 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +"2019-09-24 00:26:30.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e3 Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" +"2019-09-24 00:26:30.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.9µs " +"2019-09-24 00:26:30.882 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.6µs " +"2019-09-24 00:26:30.884 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:30.884 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:31.069 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:31.069 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e9 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-09-24 00:26:31.069 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.8µs " +"2019-09-24 00:26:31.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13eb Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" +"2019-09-24 00:26:31.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ec Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +"2019-09-24 00:26:31.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.5µs " +"2019-09-24 00:26:31.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.4µs " +"2019-09-24 00:26:31.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ef Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:31.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:31.571 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:31.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f2 Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" +"2019-09-24 00:26:31.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.3µs " +"2019-09-24 00:26:31.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f4 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +"2019-09-24 00:26:31.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f5 Sending msg of 28 bytes to 3 on channel businesschannel took 13.2µs" +"2019-09-24 00:26:31.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.2µs " +"2019-09-24 00:26:31.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 344.2µs " +"2019-09-24 00:26:31.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:31.886 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:32.071 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fa Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:32.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fb Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +"2019-09-24 00:26:32.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.5µs " +"2019-09-24 00:26:32.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fd Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +"2019-09-24 00:26:32.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fe Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2019-09-24 00:26:32.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.6µs " +"2019-09-24 00:26:32.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1400 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.7µs " +"2019-09-24 00:26:32.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1401 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:32.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1402 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:32.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1403 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:32.570 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1404 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2019-09-24 00:26:32.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1405 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 43.1µs " +"2019-09-24 00:26:32.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1406 Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +"2019-09-24 00:26:32.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1407 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2019-09-24 00:26:32.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1408 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.6µs " +"2019-09-24 00:26:32.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1409 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.1µs " +"2019-09-24 00:26:32.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:32.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:33.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:33.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140d Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-09-24 00:26:33.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.8µs " +"2019-09-24 00:26:33.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140f Sending msg of 28 bytes to 2 on channel businesschannel took 73.8µs" +"2019-09-24 00:26:33.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1410 Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +"2019-09-24 00:26:33.386 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1411 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.6µs " +"2019-09-24 00:26:33.386 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1412 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.7µs " +"2019-09-24 00:26:33.395 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1413 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:33.395 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1414 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:33.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1415 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:33.569 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1416 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2019-09-24 00:26:33.569 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1417 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.1µs " +"2019-09-24 00:26:33.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1418 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +"2019-09-24 00:26:33.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1419 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2019-09-24 00:26:33.882 UTC [orderer.common.cluster.step] sendMessage -> DEBU 141a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " +"2019-09-24 00:26:33.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 141b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.3µs " +"2019-09-24 00:26:33.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:33.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:34.069 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:34.069 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141f Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2019-09-24 00:26:34.070 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1420 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 40.6µs " +"2019-09-24 00:26:34.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1421 Sending msg of 28 bytes to 2 on channel businesschannel took 74.8µs" +"2019-09-24 00:26:34.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1422 Sending msg of 28 bytes to 3 on channel businesschannel took 41µs" +"2019-09-24 00:26:34.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1423 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 265.7µs " +"2019-09-24 00:26:34.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1424 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.5µs " +"2019-09-24 00:26:34.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1425 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:34.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1426 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:34.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1427 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:34.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1428 Sending msg of 28 bytes to 3 on channel testchainid took 26.7µs" +"2019-09-24 00:26:34.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1429 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 41.4µs " +"2019-09-24 00:26:34.886 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.6µs " +"2019-09-24 00:26:34.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142b Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +"2019-09-24 00:26:34.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142c Sending msg of 28 bytes to 3 on channel businesschannel took 17.4µs" +"2019-09-24 00:26:34.886 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.4µs " +"2019-09-24 00:26:34.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:34.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:35.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1430 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:35.077 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1431 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-09-24 00:26:35.077 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1432 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +"2019-09-24 00:26:35.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1433 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-09-24 00:26:35.385 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1434 Sending msg of 28 bytes to 3 on channel businesschannel took 56µs" +"2019-09-24 00:26:35.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1435 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97µs " +"2019-09-24 00:26:35.385 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1436 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.4µs " +"2019-09-24 00:26:35.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1437 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:35.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1438 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:35.570 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1439 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:35.570 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143a Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +"2019-09-24 00:26:35.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.1µs " +"2019-09-24 00:26:35.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143c Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +"2019-09-24 00:26:35.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143d Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +"2019-09-24 00:26:35.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.4µs " +"2019-09-24 00:26:35.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 489.4µs " +"2019-09-24 00:26:35.884 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1440 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:35.885 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1441 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:36.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1442 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:36.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1443 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-09-24 00:26:36.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1444 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.8µs " +"2019-09-24 00:26:36.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1445 Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" +"2019-09-24 00:26:36.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1446 Sending msg of 28 bytes to 3 on channel businesschannel took 7.3µs" +"2019-09-24 00:26:36.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1447 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.7µs " +"2019-09-24 00:26:36.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1448 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " +"2019-09-24 00:26:36.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1449 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:36.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:36.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:36.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144c Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2019-09-24 00:26:36.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.8µs " +"2019-09-24 00:26:36.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144e Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2019-09-24 00:26:36.884 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144f Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2019-09-24 00:26:36.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1450 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +"2019-09-24 00:26:36.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1451 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 38µs " +"2019-09-24 00:26:36.886 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1452 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:36.886 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1453 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:37.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1454 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:37.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1455 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +"2019-09-24 00:26:37.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1456 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.8µs " +"2019-09-24 00:26:37.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1457 Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" +"2019-09-24 00:26:37.384 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1458 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2019-09-24 00:26:37.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.9µs " +"2019-09-24 00:26:37.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1459 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.4µs " +"2019-09-24 00:26:37.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:37.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:37.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:37.578 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145e Sending msg of 28 bytes to 3 on channel testchainid took 48.6µs" +"2019-09-24 00:26:37.579 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +"2019-09-24 00:26:37.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1460 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +"2019-09-24 00:26:37.883 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1461 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2019-09-24 00:26:37.883 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1462 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210µs " +"2019-09-24 00:26:37.884 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1463 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 165.6µs " +"2019-09-24 00:26:37.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1464 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:37.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1465 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:38.071 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1466 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:38.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1467 Sending msg of 28 bytes to 3 on channel testchainid took 9µs" +"2019-09-24 00:26:38.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1468 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.7µs " +"2019-09-24 00:26:38.389 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1469 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +"2019-09-24 00:26:38.389 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 146a Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +"2019-09-24 00:26:38.389 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.1µs " +"2019-09-24 00:26:38.390 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 901.3µs " +"2019-09-24 00:26:38.390 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:38.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:38.570 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:38.570 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1470 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2019-09-24 00:26:38.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1471 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.7µs " +"2019-09-24 00:26:38.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1472 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +"2019-09-24 00:26:38.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1473 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.1µs " +"2019-09-24 00:26:38.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1474 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +"2019-09-24 00:26:38.886 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1475 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.6µs " +"2019-09-24 00:26:38.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1476 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:38.887 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1477 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:39.071 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1478 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:39.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1479 Sending msg of 28 bytes to 3 on channel testchainid took 43.4µs" +"2019-09-24 00:26:39.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +"2019-09-24 00:26:39.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147b Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +"2019-09-24 00:26:39.382 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147c Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" +"2019-09-24 00:26:39.382 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.5µs " +"2019-09-24 00:26:39.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.1µs " +"2019-09-24 00:26:39.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:39.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1480 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:39.570 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1481 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:39.570 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1482 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2019-09-24 00:26:39.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1483 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.7µs " +"2019-09-24 00:26:39.882 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1484 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +"2019-09-24 00:26:39.885 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1485 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2019-09-24 00:26:39.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1486 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.5µs " +"2019-09-24 00:26:39.885 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1487 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104.1µs " +"2019-09-24 00:26:39.886 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1488 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:39.888 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1489 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:40.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:40.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148b Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +"2019-09-24 00:26:40.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +"2019-09-24 00:26:40.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148d Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +"2019-09-24 00:26:40.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148e Sending msg of 28 bytes to 2 on channel businesschannel took 12.1µs" +"2019-09-24 00:26:40.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.3µs " +"2019-09-24 00:26:40.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1490 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.9µs " +"2019-09-24 00:26:40.353 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1491 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:40.353 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1492 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:40.555 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1493 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:40.555 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1494 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +"2019-09-24 00:26:40.555 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1495 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.3µs " +"2019-09-24 00:26:40.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1496 Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +"2019-09-24 00:26:40.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1497 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +"2019-09-24 00:26:40.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1498 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " +"2019-09-24 00:26:40.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1499 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6578ms " +"2019-09-24 00:26:40.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:40.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:41.039 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:41.039 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149d Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2019-09-24 00:26:41.039 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.6µs " +"2019-09-24 00:26:41.350 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149f Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +"2019-09-24 00:26:41.350 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2019-09-24 00:26:41.351 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +"2019-09-24 00:26:41.351 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.3µs " +"2019-09-24 00:26:41.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:41.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:41.540 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:41.540 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a6 Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-09-24 00:26:41.541 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 336.3µs " +"2019-09-24 00:26:41.852 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a8 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2019-09-24 00:26:41.852 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a9 Sending msg of 28 bytes to 3 on channel businesschannel took 6.2µs" +"2019-09-24 00:26:41.853 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " +"2019-09-24 00:26:41.853 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.5µs " +"2019-09-24 00:26:41.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ac Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:41.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ad Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:42.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ae Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:42.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14af Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +"2019-09-24 00:26:42.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.9µs " +"2019-09-24 00:26:42.352 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b1 Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +"2019-09-24 00:26:42.352 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b2 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2019-09-24 00:26:42.353 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.9µs " +"2019-09-24 00:26:42.353 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.6µs " +"2019-09-24 00:26:42.355 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:42.355 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:42.545 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:42.545 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b8 Sending msg of 28 bytes to 3 on channel testchainid took 27.3µs" +"2019-09-24 00:26:42.545 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.1µs " +"2019-09-24 00:26:42.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ba Sending msg of 28 bytes to 2 on channel businesschannel took 98.9µs" +"2019-09-24 00:26:42.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bb Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2019-09-24 00:26:42.853 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3669ms " +"2019-09-24 00:26:42.853 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.8µs " +"2019-09-24 00:26:42.854 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14be Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:42.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14bf Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:43.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:43.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c1 Sending msg of 28 bytes to 3 on channel testchainid took 88.7µs" +"2019-09-24 00:26:43.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 220.5µs " +"2019-09-24 00:26:43.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c3 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2019-09-24 00:26:43.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c4 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2019-09-24 00:26:43.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.8µs " +"2019-09-24 00:26:43.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 43.1µs " +"2019-09-24 00:26:43.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:43.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:43.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:43.602 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ca Sending msg of 28 bytes to 3 on channel testchainid took 58µs" +"2019-09-24 00:26:43.602 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 211.4µs " +"2019-09-24 00:26:43.851 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cc Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +"2019-09-24 00:26:43.851 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cd Sending msg of 28 bytes to 2 on channel businesschannel took 11.7µs" +"2019-09-24 00:26:43.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.9µs " +"2019-09-24 00:26:43.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.2µs " +"2019-09-24 00:26:43.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:43.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:44.039 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:44.039 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d3 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-09-24 00:26:44.039 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +"2019-09-24 00:26:44.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d5 Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +"2019-09-24 00:26:44.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d6 Sending msg of 28 bytes to 3 on channel businesschannel took 182.4µs" +"2019-09-24 00:26:44.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.8µs " +"2019-09-24 00:26:44.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 187.9µs " +"2019-09-24 00:26:44.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:44.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14da Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:44.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14db Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:44.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14dc Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +"2019-09-24 00:26:44.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14dd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " +"2019-09-24 00:26:44.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14de Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2019-09-24 00:26:44.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e0 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2019-09-24 00:26:44.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 42µs " +"2019-09-24 00:26:44.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.1µs " +"2019-09-24 00:26:44.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:44.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:45.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:45.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e5 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2019-09-24 00:26:45.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.1µs " +"2019-09-24 00:26:45.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e7 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +"2019-09-24 00:26:45.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e9 Sending msg of 28 bytes to 2 on channel businesschannel took 12.5µs" +"2019-09-24 00:26:45.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.1µs " +"2019-09-24 00:26:45.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ea Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:45.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 265µs " +"2019-09-24 00:26:45.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ec Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:45.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ed Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:45.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ee Sending msg of 28 bytes to 3 on channel testchainid took 9.1µs" +"2019-09-24 00:26:45.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +"2019-09-24 00:26:45.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f0 Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" +"2019-09-24 00:26:45.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f1 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +"2019-09-24 00:26:45.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.7µs " +"2019-09-24 00:26:45.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 41.1µs " +"2019-09-24 00:26:45.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:45.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:46.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:46.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f7 Sending msg of 28 bytes to 3 on channel testchainid took 10.6µs" +"2019-09-24 00:26:46.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.8µs " +"2019-09-24 00:26:46.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f9 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2019-09-24 00:26:46.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160.9µs " +"2019-09-24 00:26:46.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fb Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +"2019-09-24 00:26:46.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.8µs " +"2019-09-24 00:26:46.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14fd Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:46.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14fe Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:46.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ff Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:46.534 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1500 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2019-09-24 00:26:46.534 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1501 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.4µs " +"2019-09-24 00:26:46.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1502 Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +"2019-09-24 00:26:46.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1503 Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" +"2019-09-24 00:26:46.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1504 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.2µs " +"2019-09-24 00:26:46.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1505 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.3µs " +"2019-09-24 00:26:46.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1506 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:46.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1507 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:47.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1508 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:47.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1509 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2019-09-24 00:26:47.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51µs " +"2019-09-24 00:26:47.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150b Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +"2019-09-24 00:26:47.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150c Sending msg of 28 bytes to 3 on channel businesschannel took 6.1µs" +"2019-09-24 00:26:47.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.2µs " +"2019-09-24 00:26:47.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 36.7µs " +"2019-09-24 00:26:47.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 150f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:47.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1510 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:47.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1511 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:47.534 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1512 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +"2019-09-24 00:26:47.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1513 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.4µs " +"2019-09-24 00:26:47.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1514 Sending msg of 28 bytes to 2 on channel businesschannel took 14.6µs" +"2019-09-24 00:26:47.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1515 Sending msg of 28 bytes to 3 on channel businesschannel took 6.8µs" +"2019-09-24 00:26:47.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1516 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.7µs " +"2019-09-24 00:26:47.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1517 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.9µs " +"2019-09-24 00:26:47.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1518 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:47.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1519 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:48.041 UTC [orderer.common.cluster.step] handleMessage -> DEBU 151a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:48.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 151b Sending msg of 28 bytes to 3 on channel testchainid took 106.6µs" +"2019-09-24 00:26:48.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU 151c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +"2019-09-24 00:26:48.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 151d Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +"2019-09-24 00:26:48.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 151e Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2019-09-24 00:26:48.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 151f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +"2019-09-24 00:26:48.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1520 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.7µs " +"2019-09-24 00:26:48.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1521 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:48.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1522 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:48.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1523 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:48.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1524 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +"2019-09-24 00:26:48.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1525 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 699.6µs " +"2019-09-24 00:26:48.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1526 Sending msg of 28 bytes to 3 on channel businesschannel took 76µs" +"2019-09-24 00:26:48.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1527 Sending msg of 28 bytes to 2 on channel businesschannel took 16.8µs" +"2019-09-24 00:26:48.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1528 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.5µs " +"2019-09-24 00:26:48.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1529 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 317.8µs " +"2019-09-24 00:26:48.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 152a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:48.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 152b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:49.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 152c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:49.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 152d Sending msg of 28 bytes to 3 on channel testchainid took 156.3µs" +"2019-09-24 00:26:49.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 152e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +"2019-09-24 00:26:49.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 152f Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +"2019-09-24 00:26:49.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1531 Sending msg of 28 bytes to 3 on channel businesschannel took 152.5µs" +"2019-09-24 00:26:49.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1532 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.3µs " +"2019-09-24 00:26:49.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1530 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 399.4µs " +"2019-09-24 00:26:49.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1534 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:49.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1533 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:49.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1535 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:49.537 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1536 Sending msg of 28 bytes to 3 on channel testchainid took 10.6µs" +"2019-09-24 00:26:49.537 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1537 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.8µs " +"2019-09-24 00:26:49.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1538 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +"2019-09-24 00:26:49.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 153a Sending msg of 28 bytes to 2 on channel businesschannel took 11.9µs" +"2019-09-24 00:26:49.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 153b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.7µs " +"2019-09-24 00:26:49.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1539 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.5µs " +"2019-09-24 00:26:49.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 153c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:49.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 153d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:50.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 153e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:50.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 153f Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2019-09-24 00:26:50.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1540 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.2µs " +"2019-09-24 00:26:50.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1541 Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +"2019-09-24 00:26:50.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1542 Sending msg of 28 bytes to 2 on channel businesschannel took 11.3µs" +"2019-09-24 00:26:50.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1543 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.8µs " +"2019-09-24 00:26:50.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1544 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.1µs " +"2019-09-24 00:26:50.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1545 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:50.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1546 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:50.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1547 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:50.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1548 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +"2019-09-24 00:26:50.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1549 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85µs " +"2019-09-24 00:26:50.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 154a Sending msg of 28 bytes to 2 on channel businesschannel took 49µs" +"2019-09-24 00:26:50.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 154b Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2019-09-24 00:26:50.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 154c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 735.3µs " +"2019-09-24 00:26:50.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 154d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210µs " +"2019-09-24 00:26:50.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 154e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:50.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 154f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:51.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1550 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:51.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1551 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2019-09-24 00:26:51.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1552 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.1µs " +"2019-09-24 00:26:51.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1553 Sending msg of 28 bytes to 2 on channel businesschannel took 29.4µs" +"2019-09-24 00:26:51.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1554 Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +"2019-09-24 00:26:51.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1555 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.2µs " +"2019-09-24 00:26:51.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1556 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84µs " +"2019-09-24 00:26:51.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1557 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:51.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1558 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:51.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1559 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:51.534 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 155a Sending msg of 28 bytes to 3 on channel testchainid took 10.7µs" +"2019-09-24 00:26:51.534 UTC [orderer.common.cluster.step] sendMessage -> DEBU 155b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " +"2019-09-24 00:26:51.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 155c Sending msg of 28 bytes to 2 on channel businesschannel took 17.6µs" +"2019-09-24 00:26:51.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 155d Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2019-09-24 00:26:51.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 155e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.2µs " +"2019-09-24 00:26:51.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 155f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.8µs " +"2019-09-24 00:26:51.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1560 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:51.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1561 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:52.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1562 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:52.034 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1563 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-09-24 00:26:52.034 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1564 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +"2019-09-24 00:26:52.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1565 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +"2019-09-24 00:26:52.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1566 Sending msg of 28 bytes to 3 on channel businesschannel took 8.3µs" +"2019-09-24 00:26:52.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1567 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.8µs " +"2019-09-24 00:26:52.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1568 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.8µs " +"2019-09-24 00:26:52.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1569 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:52.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 156a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:52.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 156b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:52.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 156c Sending msg of 28 bytes to 3 on channel testchainid took 48.7µs" +"2019-09-24 00:26:52.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 156d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49µs " +"2019-09-24 00:26:52.847 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 156e Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-09-24 00:26:52.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 156f Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +"2019-09-24 00:26:52.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1570 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121µs " +"2019-09-24 00:26:52.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1571 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.3µs " +"2019-09-24 00:26:52.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1572 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:52.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1573 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:53.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1574 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:53.034 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1575 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2019-09-24 00:26:53.034 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1576 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.8µs " +"2019-09-24 00:26:53.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1577 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +"2019-09-24 00:26:53.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1578 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +"2019-09-24 00:26:53.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1579 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.2µs " +"2019-09-24 00:26:53.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 157a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140.4µs " +"2019-09-24 00:26:53.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 157b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:53.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 157c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:53.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 157d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:53.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 157e Sending msg of 28 bytes to 3 on channel testchainid took 19.8µs" +"2019-09-24 00:26:53.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 157f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 214.3µs " +"2019-09-24 00:26:53.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1580 Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +"2019-09-24 00:26:53.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1581 Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" +"2019-09-24 00:26:53.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1582 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.4µs " +"2019-09-24 00:26:53.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1583 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:53.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1584 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:53.854 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1585 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 5.3196ms " +"2019-09-24 00:26:54.037 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1586 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:54.039 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1587 Sending msg of 28 bytes to 3 on channel testchainid took 136.5µs" +"2019-09-24 00:26:54.039 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1588 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.7µs " +"2019-09-24 00:26:54.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1589 Sending msg of 28 bytes to 2 on channel businesschannel took 31.6µs" +"2019-09-24 00:26:54.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 158a Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" +"2019-09-24 00:26:54.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 158b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.7µs " +"2019-09-24 00:26:54.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 158c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76µs " +"2019-09-24 00:26:54.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 158d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:54.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 158e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:54.537 UTC [orderer.common.cluster.step] handleMessage -> DEBU 158f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:54.537 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1590 Sending msg of 28 bytes to 3 on channel testchainid took 111.3µs" +"2019-09-24 00:26:54.538 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1591 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 434.2µs " +"2019-09-24 00:26:54.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1592 Sending msg of 28 bytes to 2 on channel businesschannel took 38.7µs" +"2019-09-24 00:26:54.850 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1593 Sending msg of 28 bytes to 3 on channel businesschannel took 120.3µs" +"2019-09-24 00:26:54.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1594 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 182.6µs " +"2019-09-24 00:26:54.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1595 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.1µs " +"2019-09-24 00:26:54.854 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1596 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:54.854 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1597 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:55.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1598 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:55.039 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1599 Sending msg of 28 bytes to 3 on channel testchainid took 1.4098ms" +"2019-09-24 00:26:55.040 UTC [orderer.common.cluster.step] sendMessage -> DEBU 159a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.7µs " +"2019-09-24 00:26:55.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 159b Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +"2019-09-24 00:26:55.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 159c Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2019-09-24 00:26:55.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 159d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.8µs " +"2019-09-24 00:26:55.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 159e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.2µs " +"2019-09-24 00:26:55.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 159f Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:55.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15a0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:55.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15a1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:55.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15a2 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +"2019-09-24 00:26:55.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15a3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.6µs " +"2019-09-24 00:26:55.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15a4 Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +"2019-09-24 00:26:55.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15a5 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +"2019-09-24 00:26:55.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.8µs " +"2019-09-24 00:26:55.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15a7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 43.2µs " +"2019-09-24 00:26:55.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15a8 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:55.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15a9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:56.040 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15aa Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:56.042 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15ab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 301.5µs " +"2019-09-24 00:26:56.042 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ac Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +"2019-09-24 00:26:56.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ad Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +"2019-09-24 00:26:56.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ae Sending msg of 28 bytes to 3 on channel businesschannel took 142.4µs" +"2019-09-24 00:26:56.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15af Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 275µs " +"2019-09-24 00:26:56.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2044ms " +"2019-09-24 00:26:56.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15b1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:56.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15b2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:56.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15b3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:56.537 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15b4 Sending msg of 28 bytes to 3 on channel testchainid took 199µs" +"2019-09-24 00:26:56.538 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 328.8µs " +"2019-09-24 00:26:56.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15b6 Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" +"2019-09-24 00:26:56.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15b7 Sending msg of 28 bytes to 3 on channel businesschannel took 25.3µs" +"2019-09-24 00:26:56.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 480.4µs " +"2019-09-24 00:26:56.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 204.3µs " +"2019-09-24 00:26:56.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ba Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:56.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15bb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:57.037 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15bc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:57.037 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15bd Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2019-09-24 00:26:57.039 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15be Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 999.6µs " +"2019-09-24 00:26:57.065 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 15bf [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:60788 with txid '220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7' of type ENDORSER_TRANSACTION" +"2019-09-24 00:26:57.066 UTC [policies] Evaluate -> DEBU 15c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 00:26:57.066 UTC [policies] Evaluate -> DEBU 15c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:57.067 UTC [policies] Evaluate -> DEBU 15c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:26:57.067 UTC [policies] Evaluate -> DEBU 15c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:57.067 UTC [policies] Evaluate -> DEBU 15c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:26:57.068 UTC [msp] DeserializeIdentity -> DEBU 15c5 Obtaining identity" +"2019-09-24 00:26:57.068 UTC [msp.identity] newIdentity -> DEBU 15c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:26:57.069 UTC [cauthdsl] func1 -> DEBU 15c7 0xc000177050 gate 1569284817069336000 evaluation starts" +"2019-09-24 00:26:57.069 UTC [cauthdsl] func2 -> DEBU 15c8 0xc000177050 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:57.069 UTC [cauthdsl] func2 -> DEBU 15c9 0xc000177050 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:26:57.070 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15ca Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 00:26:57.070 UTC [msp] Validate -> DEBU 15cb MSP Org1MSP validating identity" +"2019-09-24 00:26:57.070 UTC [msp] getCertificationChain -> DEBU 15cc MSP Org1MSP getting certification chain" +"2019-09-24 00:26:57.071 UTC [cauthdsl] func2 -> DEBU 15cd 0xc000177050 principal matched by identity 0" +"2019-09-24 00:26:57.075 UTC [msp.identity] Verify -> DEBU 15ce Verify: digest = 00000000 15 f0 bf 5c dd b9 06 29 48 24 cd a2 db 84 36 74 |...\...)H$....6t| +00000010 4e b5 b9 83 45 11 38 fa 11 fe 61 65 4d e9 c7 c4 |N...E.8...aeM...|" +"2019-09-24 00:26:57.075 UTC [msp.identity] Verify -> DEBU 15cf Verify: sig = 00000000 30 44 02 20 7a d3 96 7d 8e 27 11 63 1c 26 14 b5 |0D. z..}.'.c.&..| +00000010 bf 60 cc 45 a5 c4 dd 1e c0 d1 0a aa ff 65 1f 43 |.`.E.........e.C| +00000020 37 33 9a 86 02 20 4c 92 f4 c4 95 34 9c a1 db 0b |73... L....4....| +00000030 dc d5 2d 9d 34 9d 82 d2 a6 5d c9 ca b1 e9 2d a3 |..-.4....]....-.| +00000040 39 03 67 3b 57 25 |9.g;W%|" +"2019-09-24 00:26:57.076 UTC [cauthdsl] func2 -> DEBU 15d0 0xc000177050 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:57.076 UTC [cauthdsl] func1 -> DEBU 15d1 0xc000177050 gate 1569284817069336000 evaluation succeeds" +"2019-09-24 00:26:57.077 UTC [policies] Evaluate -> DEBU 15d2 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:26:57.077 UTC [policies] Evaluate -> DEBU 15d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:26:57.078 UTC [policies] Evaluate -> DEBU 15d4 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:26:57.078 UTC [policies] Evaluate -> DEBU 15d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:26:57.079 UTC [policies] Evaluate -> DEBU 15d6 Signature set satisfies policy /Channel/Writers" +"2019-09-24 00:26:57.080 UTC [policies] Evaluate -> DEBU 15d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 00:26:57.080 UTC [orderer.common.blockcutter] Ordered -> DEBU 15d8 Enqueuing message into batch" +"2019-09-24 00:26:57.081 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 15d9 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:60788" +"2019-09-24 00:26:57.084 UTC [grpc] warningf -> DEBU 15da transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:60788: read: connection reset by peer" +"2019-09-24 00:26:57.085 UTC [orderer.common.broadcast] Handle -> WARN 15db Error reading from 172.18.0.9:60788: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:26:57.088 UTC [orderer.common.server] func1 -> DEBU 15dc Closing Broadcast stream" +"2019-09-24 00:26:57.088 UTC [comm.grpc.server] 1 -> INFO 15dd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:60788 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1m36.2988564s +"2019-09-24 00:26:57.089 UTC [grpc] infof -> DEBU 15de transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:26:57.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15df Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +"2019-09-24 00:26:57.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15e0 Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +"2019-09-24 00:26:57.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.8µs " +"2019-09-24 00:26:57.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.5µs " +"2019-09-24 00:26:57.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15e3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:57.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15e4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:57.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15e5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:57.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15e6 Sending msg of 28 bytes to 3 on channel testchainid took 44.7µs" +"2019-09-24 00:26:57.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15e7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.5µs " +"2019-09-24 00:26:57.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15e8 Sending msg of 28 bytes to 2 on channel businesschannel took 29.8µs" +"2019-09-24 00:26:57.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15e9 Sending msg of 28 bytes to 3 on channel businesschannel took 302.5µs" +"2019-09-24 00:26:57.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 539.3µs " +"2019-09-24 00:26:57.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 544.9µs " +"2019-09-24 00:26:57.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ec Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:57.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ed Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:58.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ee Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:58.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ef Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +"2019-09-24 00:26:58.037 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.9µs " +"2019-09-24 00:26:58.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f1 Sending msg of 28 bytes to 2 on channel businesschannel took 34.6µs" +"2019-09-24 00:26:58.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f2 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +"2019-09-24 00:26:58.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 913.6µs " +"2019-09-24 00:26:58.351 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.6µs " +"2019-09-24 00:26:58.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:58.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:58.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:58.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f8 Sending msg of 28 bytes to 3 on channel testchainid took 121.9µs" +"2019-09-24 00:26:58.537 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.8µs " +"2019-09-24 00:26:58.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15fa Sending msg of 28 bytes to 2 on channel businesschannel took 31.8µs" +"2019-09-24 00:26:58.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15fb Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +"2019-09-24 00:26:58.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 368.2µs " +"2019-09-24 00:26:58.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6237ms " +"2019-09-24 00:26:58.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15fe Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:58.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ff Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:59.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1600 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:59.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1601 Sending msg of 28 bytes to 3 on channel testchainid took 27.8µs" +"2019-09-24 00:26:59.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1602 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.9µs " +"2019-09-24 00:26:59.082 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1603 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-09-24 00:26:59.083 UTC [orderer.consensus.etcdraft] propose -> INFO 1604 Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 00:26:59.083 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1605 Proposed block [3] to raft consensus" channel=businesschannel node=1 +"2019-09-24 00:26:59.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1606 Sending msg of 3652 bytes to 2 on channel businesschannel took 22µs" +"2019-09-24 00:26:59.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1607 Sending msg of 3652 bytes to 3 on channel businesschannel took 15.6µs" +"2019-09-24 00:26:59.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1608 Send of ConsensusRequest for channel businesschannel with payload of size 3652 to orderer1.example.com(orderer1.example.com:7050) took 96.2µs " +"2019-09-24 00:26:59.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1609 Send of ConsensusRequest for channel businesschannel with payload of size 3652 to orderer2.example.com(orderer2.example.com:7050) took 74.3µs " +"2019-09-24 00:26:59.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:59.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:59.091 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 160c Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +"2019-09-24 00:26:59.091 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 160d Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +"2019-09-24 00:26:59.091 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 160e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-09-24 00:26:59.092 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 160f Sending msg of 28 bytes to 3 on channel businesschannel took 176.5µs" +"2019-09-24 00:26:59.092 UTC [msp] GetDefaultSigningIdentity -> DEBU 1610 Obtaining default signing identity" +"2019-09-24 00:26:59.092 UTC [msp] GetDefaultSigningIdentity -> DEBU 1611 Obtaining default signing identity" +"2019-09-24 00:26:59.092 UTC [msp.identity] Sign -> DEBU 1612 Sign: plaintext: 0A020802120B0A090A03010203100418...5841613C987894DEF56AEEBA1BE6039B " +"2019-09-24 00:26:59.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1613 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.5µs " +"2019-09-24 00:26:59.092 UTC [msp.identity] Sign -> DEBU 1614 Sign: digest: D82FCC8554852885DD300DC82A17DE54AF37AA777975C6973FDDF7C059798ED0 " +"2019-09-24 00:26:59.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1615 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.9µs " +"2019-09-24 00:26:59.094 UTC [fsblkstorage] indexBlock -> DEBU 1616 Indexing block [blockNum=3, blockHash=[]byte{0x4a, 0x1f, 0x9f, 0xdf, 0xb8, 0xd6, 0xb4, 0xc9, 0xe9, 0xdf, 0x1, 0x15, 0xf0, 0x70, 0xf5, 0xce, 0xa4, 0xda, 0xbc, 0x48, 0x8d, 0x5e, 0xb5, 0x2, 0x42, 0x64, 0xc9, 0x8a, 0x87, 0x31, 0x17, 0x5e} txOffsets= +txId=220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7 locPointer=offset=70, bytesLength=3524 +]" +"2019-09-24 00:26:59.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1617 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:59.095 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1618 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:59.097 UTC [fsblkstorage] updateCheckpoint -> DEBU 1619 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[75922], isChainEmpty=[false], lastBlockNumber=[3]" +"2019-09-24 00:26:59.097 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 161a [channel: businesschannel] Wrote block [3]" +"2019-09-24 00:26:59.098 UTC [fsblkstorage] waitForBlock -> DEBU 161b Came out of wait. maxAvailaBlockNumber=[3]" +"2019-09-24 00:26:59.098 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 161c Remaining bytes=[4531], Going to peek [8] bytes" +"2019-09-24 00:26:59.098 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 161d Returning blockbytes - length=[4529], placementInfo={fileNum=[0], startOffset=[71391], bytesOffset=[71393]}" +"2019-09-24 00:26:59.098 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 161e blockbytes [4529] read from file [0]" +"2019-09-24 00:26:59.098 UTC [common.deliver] deliverBlocks -> DEBU 161f [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +"2019-09-24 00:26:59.099 UTC [fsblkstorage] waitForBlock -> DEBU 1620 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +"2019-09-24 00:26:59.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1621 Sending msg of 28 bytes to 2 on channel businesschannel took 66.4µs" +"2019-09-24 00:26:59.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1622 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.9µs " +"2019-09-24 00:26:59.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1623 Sending msg of 28 bytes to 3 on channel businesschannel took 75.9µs" +"2019-09-24 00:26:59.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1624 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 691.4µs " +"2019-09-24 00:26:59.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1625 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:59.353 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1626 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:59.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1627 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:26:59.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1628 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +"2019-09-24 00:26:59.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1629 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.4µs " +"2019-09-24 00:26:59.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162a Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-09-24 00:26:59.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162b Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +"2019-09-24 00:26:59.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.6µs " +"2019-09-24 00:26:59.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 177.2µs " +"2019-09-24 00:26:59.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:59.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:26:59.921 UTC [orderer.common.server] Broadcast -> DEBU 1630 Starting new Broadcast handler" +"2019-09-24 00:26:59.921 UTC [orderer.common.broadcast] Handle -> DEBU 1631 Starting new broadcast loop for 172.18.0.9:32830" +"2019-09-24 00:26:59.949 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1632 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:32830 with txid 'b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38' of type ENDORSER_TRANSACTION" +"2019-09-24 00:26:59.949 UTC [policies] Evaluate -> DEBU 1633 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 00:26:59.949 UTC [policies] Evaluate -> DEBU 1634 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:59.949 UTC [policies] Evaluate -> DEBU 1635 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:26:59.949 UTC [policies] Evaluate -> DEBU 1636 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:59.950 UTC [policies] Evaluate -> DEBU 1637 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:26:59.950 UTC [cauthdsl] func1 -> DEBU 1638 0xc001360a70 gate 1569284819950477800 evaluation starts" +"2019-09-24 00:26:59.950 UTC [cauthdsl] func2 -> DEBU 1639 0xc001360a70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.950 UTC [cauthdsl] func2 -> DEBU 163a 0xc001360a70 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:26:59.951 UTC [cauthdsl] func2 -> DEBU 163b 0xc001360a70 principal matched by identity 0" +"2019-09-24 00:26:59.951 UTC [msp.identity] Verify -> DEBU 163c Verify: digest = 00000000 e0 75 77 75 d9 9f 3d 58 7f 7b 89 c8 6c 7c 3d 87 |.uwu..=X.{..l|=.| +00000010 ee 69 47 6d 9c a9 fa 5f bc e7 15 da c1 e9 1a c6 |.iGm..._........|" +"2019-09-24 00:26:59.952 UTC [msp.identity] Verify -> DEBU 163d Verify: sig = 00000000 30 45 02 21 00 98 10 68 fe 99 12 3f 4d 85 bc f1 |0E.!...h...?M...| +00000010 1b 9f e9 28 a4 4f 34 bb 37 96 5f d9 5a 8f 4e 20 |...(.O4.7._.Z.N | +00000020 22 14 25 a1 e5 02 20 74 c4 77 b3 85 f3 88 2a 22 |".%... t.w....*"| +00000030 5a ce 19 dd a5 f9 ac a0 25 e5 a3 14 ab 4c 22 45 |Z.......%....L"E| +00000040 49 0f e8 05 47 5a 62 |I...GZb|" +"2019-09-24 00:26:59.953 UTC [cauthdsl] func2 -> DEBU 163e 0xc001360a70 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:59.953 UTC [cauthdsl] func1 -> DEBU 163f 0xc001360a70 gate 1569284819950477800 evaluation succeeds" +"2019-09-24 00:26:59.953 UTC [policies] Evaluate -> DEBU 1640 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:26:59.953 UTC [policies] Evaluate -> DEBU 1641 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 1642 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 1643 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 1644 Signature set satisfies policy /Channel/Writers" +"2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 1645 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 00:26:59.954 UTC [orderer.common.blockcutter] Ordered -> DEBU 1646 Enqueuing message into batch" +"2019-09-24 00:26:59.955 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1647 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:32830" +"2019-09-24 00:26:59.959 UTC [orderer.common.broadcast] Handle -> WARN 1648 Error reading from 172.18.0.9:32830: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:26:59.959 UTC [orderer.common.server] func1 -> DEBU 1649 Closing Broadcast stream" +"2019-09-24 00:26:59.959 UTC [comm.grpc.server] 1 -> INFO 164a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:32830 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.2477ms +"2019-09-24 00:26:59.959 UTC [grpc] infof -> DEBU 164b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:00.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:00.037 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 164d Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2019-09-24 00:27:00.037 UTC [orderer.common.cluster.step] sendMessage -> DEBU 164e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.6µs " +"2019-09-24 00:27:00.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 164f Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +"2019-09-24 00:27:00.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1650 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +"2019-09-24 00:27:00.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1651 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.5µs " +"2019-09-24 00:27:00.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1652 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 528.6µs " +"2019-09-24 00:27:00.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1653 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:00.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1654 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:00.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1655 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:00.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1656 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2019-09-24 00:27:00.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1657 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.8µs " +"2019-09-24 00:27:00.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1658 Sending msg of 28 bytes to 2 on channel businesschannel took 28.7µs" +"2019-09-24 00:27:00.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1659 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2019-09-24 00:27:00.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.6µs " +"2019-09-24 00:27:00.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.9µs " +"2019-09-24 00:27:00.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 165c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:00.851 UTC [orderer.common.cluster.step] handleMessage -> DEBU 165d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:01.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU 165e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:01.037 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165f Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +"2019-09-24 00:27:01.037 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1660 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.3µs " +"2019-09-24 00:27:01.350 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1661 Sending msg of 28 bytes to 2 on channel businesschannel took 38.3µs" +"2019-09-24 00:27:01.352 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1664 Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +"2019-09-24 00:27:01.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1662 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 175.1µs " +"2019-09-24 00:27:01.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1663 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:01.354 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1665 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " +"2019-09-24 00:27:01.355 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1666 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:01.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1667 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:01.537 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1668 Sending msg of 28 bytes to 3 on channel testchainid took 190.4µs" +"2019-09-24 00:27:01.537 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1669 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162µs " +"2019-09-24 00:27:01.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166a Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +"2019-09-24 00:27:01.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166b Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +"2019-09-24 00:27:01.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.7µs " +"2019-09-24 00:27:01.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.9µs " +"2019-09-24 00:27:01.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 166e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:01.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 166f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:01.956 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1670 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-09-24 00:27:01.957 UTC [orderer.consensus.etcdraft] propose -> INFO 1671 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 00:27:01.958 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1672 Proposed block [4] to raft consensus" channel=businesschannel node=1 +"2019-09-24 00:27:01.960 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1673 Sending msg of 3113 bytes to 3 on channel businesschannel took 20.9µs" +"2019-09-24 00:27:01.960 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1674 Sending msg of 3113 bytes to 2 on channel businesschannel took 17.2µs" +"2019-09-24 00:27:01.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1675 Send of ConsensusRequest for channel businesschannel with payload of size 3113 to orderer1.example.com(orderer1.example.com:7050) took 94µs " +"2019-09-24 00:27:01.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1676 Send of ConsensusRequest for channel businesschannel with payload of size 3113 to orderer2.example.com(orderer2.example.com:7050) took 136.9µs " +"2019-09-24 00:27:01.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1677 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:01.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1678 Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +"2019-09-24 00:27:01.963 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1679 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:01.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167a Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2019-09-24 00:27:01.963 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 167b Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +"2019-09-24 00:27:01.963 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.1µs " +"2019-09-24 00:27:01.963 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 167e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-09-24 00:27:01.963 UTC [msp] GetDefaultSigningIdentity -> DEBU 167f Obtaining default signing identity" +"2019-09-24 00:27:01.963 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.1µs " +"2019-09-24 00:27:01.964 UTC [msp] GetDefaultSigningIdentity -> DEBU 1680 Obtaining default signing identity" +"2019-09-24 00:27:01.966 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1681 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:01.967 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1682 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:01.978 UTC [msp.identity] Sign -> DEBU 1683 Sign: plaintext: 0A020802120B0A090A03010203100418...5C44D0FD5767F4FFF385AFF9BBD8DE9E " +"2019-09-24 00:27:01.978 UTC [msp.identity] Sign -> DEBU 1684 Sign: digest: EEA8361ECB3AAAA5836CCA87A104F1248FEE38DDDFEDDCD0A91D0797C12B12C2 " +"2019-09-24 00:27:01.980 UTC [fsblkstorage] indexBlock -> DEBU 1685 Indexing block [blockNum=4, blockHash=[]byte{0x30, 0xba, 0xc, 0xce, 0x16, 0x44, 0x9b, 0xd3, 0x8e, 0x60, 0x58, 0x49, 0x7d, 0x70, 0x47, 0x86, 0x3f, 0xe5, 0x5c, 0x6c, 0xee, 0xce, 0x96, 0x74, 0xe4, 0x15, 0x6b, 0xdc, 0x92, 0x57, 0x14, 0x77} txOffsets= +txId=b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38 locPointer=offset=70, bytesLength=2985 +]" +"2019-09-24 00:27:01.982 UTC [fsblkstorage] updateCheckpoint -> DEBU 1686 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[79914], isChainEmpty=[false], lastBlockNumber=[4]" +"2019-09-24 00:27:01.983 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1687 [channel: businesschannel] Wrote block [4]" +"2019-09-24 00:27:01.983 UTC [fsblkstorage] waitForBlock -> DEBU 1688 Came out of wait. maxAvailaBlockNumber=[4]" +"2019-09-24 00:27:01.983 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1689 Remaining bytes=[3992], Going to peek [8] bytes" +"2019-09-24 00:27:01.984 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 168a Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[75922], bytesOffset=[75924]}" +"2019-09-24 00:27:01.984 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 168b blockbytes [3990] read from file [0]" +"2019-09-24 00:27:01.984 UTC [common.deliver] deliverBlocks -> DEBU 168c [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +"2019-09-24 00:27:01.985 UTC [fsblkstorage] waitForBlock -> DEBU 168d Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +"2019-09-24 00:27:02.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 168e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:02.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 168f Sending msg of 28 bytes to 3 on channel testchainid took 94.9µs" +"2019-09-24 00:27:02.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1690 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.3µs " +"2019-09-24 00:27:02.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1691 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +"2019-09-24 00:27:02.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1692 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2019-09-24 00:27:02.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1693 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.4µs " +"2019-09-24 00:27:02.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1694 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.6µs " +"2019-09-24 00:27:02.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1695 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:02.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1696 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:02.500 UTC [orderer.common.server] Broadcast -> DEBU 1697 Starting new Broadcast handler" +"2019-09-24 00:27:02.500 UTC [orderer.common.broadcast] Handle -> DEBU 1698 Starting new broadcast loop for 172.18.0.9:32844" +"2019-09-24 00:27:02.511 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1699 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:32844 with txid '315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0' of type ENDORSER_TRANSACTION" +"2019-09-24 00:27:02.511 UTC [policies] Evaluate -> DEBU 169a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 00:27:02.511 UTC [policies] Evaluate -> DEBU 169b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:02.512 UTC [policies] Evaluate -> DEBU 169c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:27:02.512 UTC [policies] Evaluate -> DEBU 169d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:02.512 UTC [policies] Evaluate -> DEBU 169e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:27:02.512 UTC [msp] DeserializeIdentity -> DEBU 169f Obtaining identity" +"2019-09-24 00:27:02.513 UTC [msp.identity] newIdentity -> DEBU 16a0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:02.514 UTC [cauthdsl] func1 -> DEBU 16a1 0xc000d16960 gate 1569284822514031700 evaluation starts" +"2019-09-24 00:27:02.514 UTC [cauthdsl] func2 -> DEBU 16a2 0xc000d16960 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:02.514 UTC [cauthdsl] func2 -> DEBU 16a3 0xc000d16960 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:02.514 UTC [cauthdsl] func2 -> DEBU 16a4 0xc000d16960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:02.514 UTC [cauthdsl] func2 -> DEBU 16a5 0xc000d16960 principal evaluation fails" +"2019-09-24 00:27:02.515 UTC [cauthdsl] func1 -> DEBU 16a6 0xc000d16960 gate 1569284822514031700 evaluation fails" +"2019-09-24 00:27:02.515 UTC [policies] Evaluate -> DEBU 16a7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:02.515 UTC [policies] Evaluate -> DEBU 16a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:02.515 UTC [policies] Evaluate -> DEBU 16a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 00:27:02.515 UTC [cauthdsl] func1 -> DEBU 16aa 0xc000d17ae0 gate 1569284822515883500 evaluation starts" +"2019-09-24 00:27:02.516 UTC [cauthdsl] func2 -> DEBU 16ab 0xc000d17ae0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:02.516 UTC [cauthdsl] func2 -> DEBU 16ac 0xc000d17ae0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:02.516 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16ad Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:27:02.516 UTC [msp] Validate -> DEBU 16ae MSP Org2MSP validating identity" +"2019-09-24 00:27:02.517 UTC [msp] getCertificationChain -> DEBU 16af MSP Org2MSP getting certification chain" +"2019-09-24 00:27:02.517 UTC [cauthdsl] func2 -> DEBU 16b0 0xc000d17ae0 principal matched by identity 0" +"2019-09-24 00:27:02.517 UTC [msp.identity] Verify -> DEBU 16b1 Verify: digest = 00000000 fc be 8d 27 f2 77 89 7c 99 cc 04 4a 85 f8 8d 65 |...'.w.|...J...e| +00000010 2a 53 4d f7 97 3d b1 11 dc 3d 62 61 a9 f1 4e 09 |*SM..=...=ba..N.|" +"2019-09-24 00:27:02.518 UTC [msp.identity] Verify -> DEBU 16b2 Verify: sig = 00000000 30 45 02 21 00 f7 0b fd 05 a4 5e 7c 76 e3 68 36 |0E.!......^|v.h6| +00000010 9b e8 3b 60 20 a4 c6 aa c5 1c 7f 38 32 4c a8 0e |..;` ......82L..| +00000020 0a c1 65 d7 de 02 20 33 73 0f 80 ff 95 92 a0 ee |..e... 3s.......| +00000030 0a 53 bc 4b 12 a0 42 40 b9 b9 b3 1d ba ea 5c 46 |.S.K..B@......\F| +00000040 0f 1e 77 3f ef 13 c6 |..w?...|" +"2019-09-24 00:27:02.518 UTC [cauthdsl] func2 -> DEBU 16b3 0xc000d17ae0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:02.519 UTC [cauthdsl] func1 -> DEBU 16b4 0xc000d17ae0 gate 1569284822515883500 evaluation succeeds" +"2019-09-24 00:27:02.519 UTC [policies] Evaluate -> DEBU 16b5 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:02.519 UTC [policies] Evaluate -> DEBU 16b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:02.520 UTC [policies] Evaluate -> DEBU 16b7 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:27:02.520 UTC [policies] Evaluate -> DEBU 16b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:27:02.520 UTC [policies] Evaluate -> DEBU 16b9 Signature set satisfies policy /Channel/Writers" +"2019-09-24 00:27:02.521 UTC [policies] Evaluate -> DEBU 16ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 00:27:02.521 UTC [orderer.common.blockcutter] Ordered -> DEBU 16bb Enqueuing message into batch" +"2019-09-24 00:27:02.522 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 16bc [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:32844" +"2019-09-24 00:27:02.525 UTC [orderer.common.broadcast] Handle -> WARN 16bd Error reading from 172.18.0.9:32844: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:02.526 UTC [orderer.common.server] func1 -> DEBU 16be Closing Broadcast stream" +"2019-09-24 00:27:02.526 UTC [comm.grpc.server] 1 -> INFO 16bf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:32844 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.5209ms +"2019-09-24 00:27:02.527 UTC [grpc] infof -> DEBU 16c0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:02.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16c1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:02.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16c2 Sending msg of 28 bytes to 3 on channel testchainid took 102.4µs" +"2019-09-24 00:27:02.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167µs " +"2019-09-24 00:27:02.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16c4 Sending msg of 28 bytes to 2 on channel businesschannel took 45.3µs" +"2019-09-24 00:27:02.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16c5 Sending msg of 28 bytes to 3 on channel businesschannel took 59.4µs" +"2019-09-24 00:27:02.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 661.9µs " +"2019-09-24 00:27:02.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.5µs " +"2019-09-24 00:27:02.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16c8 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:02.853 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16c9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:03.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16ca Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:03.037 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16cb Sending msg of 28 bytes to 3 on channel testchainid took 37.6µs" +"2019-09-24 00:27:03.037 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16cc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.3µs " +"2019-09-24 00:27:03.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16cd Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +"2019-09-24 00:27:03.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16ce Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +"2019-09-24 00:27:03.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 587.7µs " +"2019-09-24 00:27:03.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.4µs " +"2019-09-24 00:27:03.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16d1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:03.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16d2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:03.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16d3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:03.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16d4 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +"2019-09-24 00:27:03.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " +"2019-09-24 00:27:03.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16d6 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" +"2019-09-24 00:27:03.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16d7 Sending msg of 28 bytes to 3 on channel businesschannel took 26.8µs" +"2019-09-24 00:27:03.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108µs " +"2019-09-24 00:27:03.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.2µs " +"2019-09-24 00:27:03.859 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16da Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:03.860 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16db Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:04.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16dc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:04.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16dd Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-09-24 00:27:04.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.4µs " +"2019-09-24 00:27:04.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16df Sending msg of 28 bytes to 2 on channel businesschannel took 53.8µs" +"2019-09-24 00:27:04.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e0 Sending msg of 28 bytes to 3 on channel businesschannel took 49.8µs" +"2019-09-24 00:27:04.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.5µs " +"2019-09-24 00:27:04.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.8µs " +"2019-09-24 00:27:04.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:04.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:04.522 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 16e5 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-09-24 00:27:04.522 UTC [orderer.consensus.etcdraft] propose -> INFO 16e6 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 00:27:04.523 UTC [orderer.consensus.etcdraft] 2 -> DEBU 16e7 Proposed block [5] to raft consensus" channel=businesschannel node=1 +"2019-09-24 00:27:04.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e8 Sending msg of 3113 bytes to 2 on channel businesschannel took 13.5µs" +"2019-09-24 00:27:04.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e9 Sending msg of 3113 bytes to 3 on channel businesschannel took 21.6µs" +"2019-09-24 00:27:04.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16ea Send of ConsensusRequest for channel businesschannel with payload of size 3113 to orderer2.example.com(orderer2.example.com:7050) took 360.4µs " +"2019-09-24 00:27:04.531 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16eb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:04.532 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16ec Sending msg of 28 bytes to 2 on channel businesschannel took 14.6µs" +"2019-09-24 00:27:04.532 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16ed Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +"2019-09-24 00:27:04.533 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.3µs " +"2019-09-24 00:27:04.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16ef Send of ConsensusRequest for channel businesschannel with payload of size 3113 to orderer1.example.com(orderer1.example.com:7050) took 86.7µs " +"2019-09-24 00:27:04.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.3µs " +"2019-09-24 00:27:04.533 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16f0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:04.533 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 16f1 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +"2019-09-24 00:27:04.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 16f3 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-09-24 00:27:04.543 UTC [msp] GetDefaultSigningIdentity -> DEBU 16f4 Obtaining default signing identity" +"2019-09-24 00:27:04.547 UTC [msp] GetDefaultSigningIdentity -> DEBU 16f5 Obtaining default signing identity" +"2019-09-24 00:27:04.550 UTC [msp.identity] Sign -> DEBU 16f6 Sign: plaintext: 0A020802120B0A090A03010203100418...B207A3D722643B81F38BF79026444373 " +"2019-09-24 00:27:04.551 UTC [msp.identity] Sign -> DEBU 16f9 Sign: digest: F17C4D3D8891EBF2499324AEECF75136EB7F64306A3FD5064038D01E1C152D09 " +"2019-09-24 00:27:04.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16f7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:04.553 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16fb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:04.553 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16fc Sending msg of 28 bytes to 3 on channel testchainid took 119.8µs" +"2019-09-24 00:27:04.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16f8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:04.553 UTC [fsblkstorage] indexBlock -> DEBU 16fa Indexing block [blockNum=5, blockHash=[]byte{0x7d, 0x35, 0x9, 0x46, 0xf2, 0x7d, 0x8b, 0xf0, 0x5f, 0x8e, 0xd9, 0xe3, 0x87, 0xa0, 0x69, 0x5, 0xf1, 0x81, 0xfa, 0x34, 0xce, 0x83, 0x96, 0x8, 0x2e, 0xb2, 0x87, 0x9e, 0x15, 0xec, 0x79, 0xc3} txOffsets= +txId=315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0 locPointer=offset=70, bytesLength=2985 +]" +"2019-09-24 00:27:04.554 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16fd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 280µs " +"2019-09-24 00:27:04.560 UTC [fsblkstorage] updateCheckpoint -> DEBU 16fe Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[83906], isChainEmpty=[false], lastBlockNumber=[5]" +"2019-09-24 00:27:04.560 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 16ff [channel: businesschannel] Wrote block [5]" +"2019-09-24 00:27:04.560 UTC [fsblkstorage] waitForBlock -> DEBU 1700 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 00:27:04.560 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1701 Remaining bytes=[3992], Going to peek [8] bytes" +"2019-09-24 00:27:04.560 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1702 Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[79914], bytesOffset=[79916]}" +"2019-09-24 00:27:04.560 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1703 blockbytes [3990] read from file [0]" +"2019-09-24 00:27:04.561 UTC [common.deliver] deliverBlocks -> DEBU 1704 [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +"2019-09-24 00:27:04.562 UTC [fsblkstorage] waitForBlock -> DEBU 1705 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 00:27:04.618 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1706 No inactive chains to try to replicate" +"2019-09-24 00:27:04.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1707 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +"2019-09-24 00:27:04.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1708 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.4µs " +"2019-09-24 00:27:04.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1709 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.6µs " +"2019-09-24 00:27:04.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 170a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:04.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 170b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:04.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 170c Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2019-09-24 00:27:05.036 UTC [orderer.common.cluster.step] handleMessage -> DEBU 170d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:05.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 170e Sending msg of 28 bytes to 3 on channel testchainid took 37.2µs" +"2019-09-24 00:27:05.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 170f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.6µs " +"2019-09-24 00:27:05.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1710 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-09-24 00:27:05.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1711 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2019-09-24 00:27:05.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1712 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 239.6µs " +"2019-09-24 00:27:05.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1713 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.7µs " +"2019-09-24 00:27:05.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1714 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:05.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1715 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:05.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1716 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:05.537 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1717 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-09-24 00:27:05.538 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1718 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.5µs " +"2019-09-24 00:27:05.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1719 Sending msg of 28 bytes to 2 on channel businesschannel took 15.9µs" +"2019-09-24 00:27:05.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 171a Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +"2019-09-24 00:27:05.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 171b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109µs " +"2019-09-24 00:27:05.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 171c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 575.9µs " +"2019-09-24 00:27:05.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:05.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:06.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 171f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:06.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1720 Sending msg of 28 bytes to 3 on channel testchainid took 289.7µs" +"2019-09-24 00:27:06.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1721 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 265.3µs " +"2019-09-24 00:27:06.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1722 Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +"2019-09-24 00:27:06.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1723 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2019-09-24 00:27:06.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1724 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.8µs " +"2019-09-24 00:27:06.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1725 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.9µs " +"2019-09-24 00:27:06.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1726 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:06.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1727 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:06.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1728 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:06.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1729 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-09-24 00:27:06.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 172a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66µs " +"2019-09-24 00:27:06.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 172b Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +"2019-09-24 00:27:06.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 172c Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +"2019-09-24 00:27:06.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 172d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.7µs " +"2019-09-24 00:27:06.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 172e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 37.1µs " +"2019-09-24 00:27:06.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 172f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:06.851 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1730 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:07.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1731 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:07.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1732 Sending msg of 28 bytes to 3 on channel testchainid took 97µs" +"2019-09-24 00:27:07.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1733 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 214µs " +"2019-09-24 00:27:07.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1734 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +"2019-09-24 00:27:07.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1735 Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs" +"2019-09-24 00:27:07.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1736 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.9µs " +"2019-09-24 00:27:07.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1737 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67µs " +"2019-09-24 00:27:07.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1738 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:07.348 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1739 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:07.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 173a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:07.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 173b Sending msg of 28 bytes to 3 on channel testchainid took 18µs" +"2019-09-24 00:27:07.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 173c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.6µs " +"2019-09-24 00:27:07.560 UTC [orderer.common.server] Deliver -> DEBU 173d Starting new Deliver handler" +"2019-09-24 00:27:07.560 UTC [common.deliver] Handle -> DEBU 173e Starting new deliver loop for 172.18.0.9:32890" +"2019-09-24 00:27:07.560 UTC [common.deliver] Handle -> DEBU 173f Attempting to read seek info message from 172.18.0.9:32890" +"2019-09-24 00:27:07.562 UTC [policies] Evaluate -> DEBU 1740 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:07.562 UTC [policies] Evaluate -> DEBU 1741 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:07.562 UTC [policies] Evaluate -> DEBU 1742 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:07.562 UTC [policies] Evaluate -> DEBU 1743 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:07.563 UTC [policies] Evaluate -> DEBU 1744 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:07.563 UTC [msp] DeserializeIdentity -> DEBU 1745 Obtaining identity" +"2019-09-24 00:27:07.563 UTC [msp.identity] newIdentity -> DEBU 1746 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:07.564 UTC [cauthdsl] func1 -> DEBU 1747 0xc000b96720 gate 1569284827564668000 evaluation starts" +"2019-09-24 00:27:07.564 UTC [cauthdsl] func2 -> DEBU 1748 0xc000b96720 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:07.565 UTC [cauthdsl] func2 -> DEBU 1749 0xc000b96720 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:07.565 UTC [cauthdsl] func2 -> DEBU 174a 0xc000b96720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:07.565 UTC [cauthdsl] func2 -> DEBU 174b 0xc000b96720 principal evaluation fails" +"2019-09-24 00:27:07.565 UTC [cauthdsl] func1 -> DEBU 174c 0xc000b96720 gate 1569284827564668000 evaluation fails" +"2019-09-24 00:27:07.566 UTC [policies] Evaluate -> DEBU 174d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:07.566 UTC [policies] Evaluate -> DEBU 174e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:07.566 UTC [policies] Evaluate -> DEBU 174f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:07.566 UTC [cauthdsl] func1 -> DEBU 1750 0xc000b97860 gate 1569284827566920100 evaluation starts" +"2019-09-24 00:27:07.567 UTC [cauthdsl] func2 -> DEBU 1751 0xc000b97860 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:07.567 UTC [cauthdsl] func2 -> DEBU 1752 0xc000b97860 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:07.567 UTC [cauthdsl] func2 -> DEBU 1753 0xc000b97860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:07.568 UTC [cauthdsl] func2 -> DEBU 1754 0xc000b97860 principal evaluation fails" +"2019-09-24 00:27:07.568 UTC [cauthdsl] func1 -> DEBU 1755 0xc000b97860 gate 1569284827566920100 evaluation fails" +"2019-09-24 00:27:07.568 UTC [policies] Evaluate -> DEBU 1756 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:07.568 UTC [policies] Evaluate -> DEBU 1757 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:07.569 UTC [policies] func1 -> DEBU 1758 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 00:27:07.569 UTC [policies] Evaluate -> DEBU 1759 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:07.569 UTC [policies] Evaluate -> DEBU 175a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:07.569 UTC [policies] Evaluate -> DEBU 175b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:07.569 UTC [policies] Evaluate -> DEBU 175c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:07.569 UTC [policies] Evaluate -> DEBU 175d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:07.570 UTC [cauthdsl] func1 -> DEBU 175e 0xc000c8a570 gate 1569284827570226000 evaluation starts" +"2019-09-24 00:27:07.570 UTC [cauthdsl] func2 -> DEBU 175f 0xc000c8a570 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:07.570 UTC [cauthdsl] func2 -> DEBU 1760 0xc000c8a570 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:07.571 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1761 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 00:27:07.571 UTC [msp] Validate -> DEBU 1762 MSP OrdererMSP validating identity" +"2019-09-24 00:27:07.572 UTC [cauthdsl] func2 -> DEBU 1763 0xc000c8a570 principal matched by identity 0" +"2019-09-24 00:27:07.572 UTC [msp.identity] Verify -> DEBU 1764 Verify: digest = 00000000 c3 a7 c9 3c ae 8d 41 53 b7 0a d2 94 6c a2 e7 e7 |...<..AS....l...| +00000010 1a 3d 11 73 1f af 77 08 f0 78 f6 90 c7 3f 07 67 |.=.s..w..x...?.g|" +"2019-09-24 00:27:07.572 UTC [msp.identity] Verify -> DEBU 1765 Verify: sig = 00000000 30 45 02 21 00 9c 00 ac 6a 7d 48 5d 07 ed 6d ff |0E.!....j}H]..m.| +00000010 c2 9c da 57 c3 08 fd 4c 01 86 17 ba ce 83 e1 e0 |...W...L........| +00000020 3b c0 0c 62 f2 02 20 7f c7 86 ad 07 9a 70 87 10 |;..b.. ......p..| +00000030 ac 22 82 13 0b 3f b2 b0 dd 86 27 45 9b eb fc ec |."...?....'E....| +00000040 15 ef 73 a6 2a de ed |..s.*..|" +"2019-09-24 00:27:07.573 UTC [cauthdsl] func2 -> DEBU 1766 0xc000c8a570 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:07.573 UTC [cauthdsl] func1 -> DEBU 1767 0xc000c8a570 gate 1569284827570226000 evaluation succeeds" +"2019-09-24 00:27:07.573 UTC [policies] Evaluate -> DEBU 1768 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:07.574 UTC [policies] Evaluate -> DEBU 1769 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:07.574 UTC [policies] Evaluate -> DEBU 176a Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:07.574 UTC [policies] Evaluate -> DEBU 176b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:07.575 UTC [policies] Evaluate -> DEBU 176c Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:07.575 UTC [policies] Evaluate -> DEBU 176d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:07.575 UTC [common.deliver] deliverBlocks -> DEBU 176e [channel: businesschannel] Received seekInfo (0xc000cbb180) start: > stop: > from 172.18.0.9:32890" +"2019-09-24 00:27:07.575 UTC [fsblkstorage] Next -> DEBU 176f Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 00:27:07.575 UTC [fsblkstorage] newBlockfileStream -> DEBU 1770 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79914]" +"2019-09-24 00:27:07.576 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1771 Remaining bytes=[3992], Going to peek [8] bytes" +"2019-09-24 00:27:07.576 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1772 Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[79914], bytesOffset=[79916]}" +"2019-09-24 00:27:07.576 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1773 blockbytes [3990] read from file [0]" +"2019-09-24 00:27:07.576 UTC [common.deliver] deliverBlocks -> DEBU 1774 [channel: businesschannel] Delivering block for (0xc000cbb180) for 172.18.0.9:32890" +"2019-09-24 00:27:07.577 UTC [common.deliver] deliverBlocks -> DEBU 1775 [channel: businesschannel] Done delivering to 172.18.0.9:32890 for (0xc000cbb180)" +"2019-09-24 00:27:07.578 UTC [fsblkstorage] waitForBlock -> DEBU 1776 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 00:27:07.578 UTC [fsblkstorage] waitForBlock -> DEBU 1777 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 00:27:07.578 UTC [common.deliver] Handle -> DEBU 1778 Waiting for new SeekInfo from 172.18.0.9:32890" +"2019-09-24 00:27:07.578 UTC [common.deliver] Handle -> DEBU 1779 Attempting to read seek info message from 172.18.0.9:32890" +"2019-09-24 00:27:07.582 UTC [common.deliver] Handle -> WARN 177a Error reading from 172.18.0.9:32890: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:07.582 UTC [orderer.common.server] func1 -> DEBU 177b Closing Deliver stream" +"2019-09-24 00:27:07.582 UTC [comm.grpc.server] 1 -> INFO 177c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32890 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.9597ms +"2019-09-24 00:27:07.583 UTC [grpc] infof -> DEBU 177d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:07.824 UTC [orderer.common.server] Deliver -> DEBU 177e Starting new Deliver handler" +"2019-09-24 00:27:07.825 UTC [common.deliver] Handle -> DEBU 177f Starting new deliver loop for 172.18.0.9:32892" +"2019-09-24 00:27:07.825 UTC [common.deliver] Handle -> DEBU 1780 Attempting to read seek info message from 172.18.0.9:32892" +"2019-09-24 00:27:07.826 UTC [policies] Evaluate -> DEBU 1781 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:07.827 UTC [policies] Evaluate -> DEBU 1782 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:07.827 UTC [policies] Evaluate -> DEBU 1783 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:07.828 UTC [policies] Evaluate -> DEBU 1784 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:07.829 UTC [policies] Evaluate -> DEBU 1785 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:07.829 UTC [cauthdsl] func1 -> DEBU 1786 0xc00134a020 gate 1569284827829391300 evaluation starts" +"2019-09-24 00:27:07.829 UTC [cauthdsl] func2 -> DEBU 1787 0xc00134a020 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:07.830 UTC [cauthdsl] func2 -> DEBU 1788 0xc00134a020 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:07.830 UTC [cauthdsl] func2 -> DEBU 1789 0xc00134a020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:07.830 UTC [cauthdsl] func2 -> DEBU 178a 0xc00134a020 principal evaluation fails" +"2019-09-24 00:27:07.830 UTC [cauthdsl] func1 -> DEBU 178b 0xc00134a020 gate 1569284827829391300 evaluation fails" +"2019-09-24 00:27:07.830 UTC [policies] Evaluate -> DEBU 178c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:07.831 UTC [policies] Evaluate -> DEBU 178d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:07.831 UTC [policies] Evaluate -> DEBU 178e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:07.831 UTC [cauthdsl] func1 -> DEBU 178f 0xc00134a860 gate 1569284827831608100 evaluation starts" +"2019-09-24 00:27:07.831 UTC [cauthdsl] func2 -> DEBU 1790 0xc00134a860 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:07.831 UTC [cauthdsl] func2 -> DEBU 1791 0xc00134a860 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:07.832 UTC [cauthdsl] func2 -> DEBU 1792 0xc00134a860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:07.832 UTC [cauthdsl] func2 -> DEBU 1793 0xc00134a860 principal evaluation fails" +"2019-09-24 00:27:07.832 UTC [cauthdsl] func1 -> DEBU 1794 0xc00134a860 gate 1569284827831608100 evaluation fails" +"2019-09-24 00:27:07.832 UTC [policies] Evaluate -> DEBU 1795 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:07.833 UTC [policies] Evaluate -> DEBU 1796 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:07.833 UTC [policies] func1 -> DEBU 1797 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 00:27:07.833 UTC [policies] Evaluate -> DEBU 1798 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:07.833 UTC [policies] Evaluate -> DEBU 1799 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:07.833 UTC [policies] Evaluate -> DEBU 179a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:07.834 UTC [policies] Evaluate -> DEBU 179b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:07.834 UTC [policies] Evaluate -> DEBU 179c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:07.834 UTC [cauthdsl] func1 -> DEBU 179d 0xc00134b550 gate 1569284827834421300 evaluation starts" +"2019-09-24 00:27:07.834 UTC [cauthdsl] func2 -> DEBU 179e 0xc00134b550 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:07.834 UTC [cauthdsl] func2 -> DEBU 179f 0xc00134b550 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:07.835 UTC [cauthdsl] func2 -> DEBU 17a0 0xc00134b550 principal matched by identity 0" +"2019-09-24 00:27:07.835 UTC [msp.identity] Verify -> DEBU 17a1 Verify: digest = 00000000 dd 73 b6 52 c7 f6 63 97 df 12 80 3c 6e 6b 32 d2 |.s.R..c.... DEBU 17a2 Verify: sig = 00000000 30 45 02 21 00 c5 82 c2 57 23 37 3c e1 2d aa 21 |0E.!....W#7<.-.!| +00000010 92 17 67 87 f0 16 08 38 19 19 92 c1 78 a7 96 8f |..g....8....x...| +00000020 83 04 f7 24 fe 02 20 4b f2 35 eb cc 1b 90 7f e3 |...$.. K.5......| +00000030 ab 94 a7 f2 95 52 b9 79 8b 06 fb 40 0c 20 56 ef |.....R.y...@. V.| +00000040 bb 3d 9d 03 d6 bf e3 |.=.....|" +"2019-09-24 00:27:07.836 UTC [cauthdsl] func2 -> DEBU 17a3 0xc00134b550 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:07.836 UTC [cauthdsl] func1 -> DEBU 17a4 0xc00134b550 gate 1569284827834421300 evaluation succeeds" +"2019-09-24 00:27:07.836 UTC [policies] Evaluate -> DEBU 17a5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:07.836 UTC [policies] Evaluate -> DEBU 17a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:07.836 UTC [policies] Evaluate -> DEBU 17a7 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:07.837 UTC [policies] Evaluate -> DEBU 17a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:07.837 UTC [policies] Evaluate -> DEBU 17a9 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:07.837 UTC [policies] Evaluate -> DEBU 17aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:07.838 UTC [common.deliver] deliverBlocks -> DEBU 17ab [channel: businesschannel] Received seekInfo (0xc00088d5c0) start: > stop: > from 172.18.0.9:32892" +"2019-09-24 00:27:07.839 UTC [fsblkstorage] Next -> DEBU 17ac Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 00:27:07.839 UTC [fsblkstorage] newBlockfileStream -> DEBU 17ad newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79914]" +"2019-09-24 00:27:07.839 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17ae Remaining bytes=[3992], Going to peek [8] bytes" +"2019-09-24 00:27:07.839 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17af Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[79914], bytesOffset=[79916]}" +"2019-09-24 00:27:07.839 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b0 blockbytes [3990] read from file [0]" +"2019-09-24 00:27:07.840 UTC [common.deliver] deliverBlocks -> DEBU 17b1 [channel: businesschannel] Delivering block for (0xc00088d5c0) for 172.18.0.9:32892" +"2019-09-24 00:27:07.840 UTC [common.deliver] deliverBlocks -> DEBU 17b2 [channel: businesschannel] Done delivering to 172.18.0.9:32892 for (0xc00088d5c0)" +"2019-09-24 00:27:07.840 UTC [common.deliver] Handle -> DEBU 17b3 Waiting for new SeekInfo from 172.18.0.9:32892" +"2019-09-24 00:27:07.840 UTC [common.deliver] Handle -> DEBU 17b4 Attempting to read seek info message from 172.18.0.9:32892" +"2019-09-24 00:27:07.840 UTC [fsblkstorage] waitForBlock -> DEBU 17b5 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 00:27:07.840 UTC [fsblkstorage] waitForBlock -> DEBU 17b6 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 00:27:07.841 UTC [policies] Evaluate -> DEBU 17b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:07.842 UTC [policies] Evaluate -> DEBU 17b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:07.842 UTC [policies] Evaluate -> DEBU 17b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:07.842 UTC [policies] Evaluate -> DEBU 17ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:07.842 UTC [policies] Evaluate -> DEBU 17bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:07.842 UTC [cauthdsl] func1 -> DEBU 17bc 0xc00136cd50 gate 1569284827842975100 evaluation starts" +"2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17bd 0xc00136cd50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17be 0xc00136cd50 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17bf 0xc00136cd50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17c0 0xc00136cd50 principal evaluation fails" +"2019-09-24 00:27:07.843 UTC [cauthdsl] func1 -> DEBU 17c1 0xc00136cd50 gate 1569284827842975100 evaluation fails" +"2019-09-24 00:27:07.843 UTC [policies] Evaluate -> DEBU 17c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:07.843 UTC [policies] Evaluate -> DEBU 17c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:07.843 UTC [policies] Evaluate -> DEBU 17c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:07.843 UTC [cauthdsl] func1 -> DEBU 17c5 0xc00136d590 gate 1569284827843575500 evaluation starts" +"2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17c6 0xc00136d590 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17c7 0xc00136d590 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17c8 0xc00136d590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:07.843 UTC [cauthdsl] func2 -> DEBU 17c9 0xc00136d590 principal evaluation fails" +"2019-09-24 00:27:07.843 UTC [cauthdsl] func1 -> DEBU 17ca 0xc00136d590 gate 1569284827843575500 evaluation fails" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17cb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:07.844 UTC [policies] func1 -> DEBU 17cd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17ce Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17d2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:07.844 UTC [cauthdsl] func1 -> DEBU 17d3 0xc000ab4280 gate 1569284827844382300 evaluation starts" +"2019-09-24 00:27:07.844 UTC [cauthdsl] func2 -> DEBU 17d4 0xc000ab4280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:07.844 UTC [cauthdsl] func2 -> DEBU 17d5 0xc000ab4280 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:07.844 UTC [cauthdsl] func2 -> DEBU 17d6 0xc000ab4280 principal matched by identity 0" +"2019-09-24 00:27:07.844 UTC [msp.identity] Verify -> DEBU 17d7 Verify: digest = 00000000 9e e2 b8 02 e5 6a d4 18 a1 d8 cb 96 22 52 d8 27 |.....j......"R.'| +00000010 21 fb 30 7c 65 4b 76 0f ac d8 ff 18 fa 7e 08 60 |!.0|eKv......~.`|" +"2019-09-24 00:27:07.844 UTC [msp.identity] Verify -> DEBU 17d8 Verify: sig = 00000000 30 45 02 21 00 83 7b 1f dc eb fd 30 e6 1e c2 f9 |0E.!..{....0....| +00000010 a5 a5 c9 e9 16 56 da e6 bd 4c c5 34 a3 6e 60 8b |.....V...L.4.n`.| +00000020 2b 7b f9 f5 4f 02 20 34 9d 43 19 84 75 06 13 4f |+{..O. 4.C..u..O| +00000030 14 b7 f0 15 3f 86 8e 63 b1 81 a5 06 3a fb 04 e4 |....?..c....:...| +00000040 f6 91 65 59 23 d4 8d |..eY#..|" +"2019-09-24 00:27:07.844 UTC [cauthdsl] func2 -> DEBU 17d9 0xc000ab4280 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:07.844 UTC [cauthdsl] func1 -> DEBU 17da 0xc000ab4280 gate 1569284827844382300 evaluation succeeds" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17db Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17dc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17dd Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17df Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:07.844 UTC [policies] Evaluate -> DEBU 17e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:07.844 UTC [common.deliver] deliverBlocks -> DEBU 17e1 [channel: businesschannel] Received seekInfo (0xc000cbb940) start: > stop: > from 172.18.0.9:32892" +"2019-09-24 00:27:07.845 UTC [fsblkstorage] Next -> DEBU 17e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 00:27:07.845 UTC [fsblkstorage] newBlockfileStream -> DEBU 17e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47641]" +"2019-09-24 00:27:07.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17e4 Remaining bytes=[36265], Going to peek [8] bytes" +"2019-09-24 00:27:07.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17e5 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47641], bytesOffset=[47644]}" +"2019-09-24 00:27:07.845 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17e6 blockbytes [23747] read from file [0]" +"2019-09-24 00:27:07.845 UTC [common.deliver] deliverBlocks -> DEBU 17e7 [channel: businesschannel] Delivering block for (0xc000cbb940) for 172.18.0.9:32892" +"2019-09-24 00:27:07.845 UTC [common.deliver] deliverBlocks -> DEBU 17e8 [channel: businesschannel] Done delivering to 172.18.0.9:32892 for (0xc000cbb940)" +"2019-09-24 00:27:07.845 UTC [common.deliver] Handle -> DEBU 17e9 Waiting for new SeekInfo from 172.18.0.9:32892" +"2019-09-24 00:27:07.845 UTC [common.deliver] Handle -> DEBU 17ea Attempting to read seek info message from 172.18.0.9:32892" +"2019-09-24 00:27:07.845 UTC [fsblkstorage] waitForBlock -> DEBU 17eb Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 00:27:07.845 UTC [fsblkstorage] waitForBlock -> DEBU 17ec Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 00:27:07.849 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ed Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +"2019-09-24 00:27:07.850 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ee Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2019-09-24 00:27:07.850 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 269.7µs " +"2019-09-24 00:27:07.851 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 188.8µs " +"2019-09-24 00:27:07.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:07.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:07.871 UTC [common.deliver] Handle -> WARN 17f3 Error reading from 172.18.0.9:32892: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:07.871 UTC [grpc] infof -> DEBU 17f4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:07.872 UTC [orderer.common.server] func1 -> DEBU 17f5 Closing Deliver stream" +"2019-09-24 00:27:07.873 UTC [comm.grpc.server] 1 -> INFO 17f6 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32892 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=48.141ms +"2019-09-24 00:27:08.001 UTC [orderer.common.server] Deliver -> DEBU 17f7 Starting new Deliver handler" +"2019-09-24 00:27:08.001 UTC [common.deliver] Handle -> DEBU 17f8 Starting new deliver loop for 172.18.0.9:32894" +"2019-09-24 00:27:08.002 UTC [common.deliver] Handle -> DEBU 17f9 Attempting to read seek info message from 172.18.0.9:32894" +"2019-09-24 00:27:08.003 UTC [policies] Evaluate -> DEBU 17fa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:08.003 UTC [policies] Evaluate -> DEBU 17fb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.004 UTC [policies] Evaluate -> DEBU 17fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.004 UTC [policies] Evaluate -> DEBU 17fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.004 UTC [policies] Evaluate -> DEBU 17fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.004 UTC [cauthdsl] func1 -> DEBU 17ff 0xc00135f600 gate 1569284828004688800 evaluation starts" +"2019-09-24 00:27:08.004 UTC [cauthdsl] func2 -> DEBU 1800 0xc00135f600 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.005 UTC [cauthdsl] func2 -> DEBU 1801 0xc00135f600 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.005 UTC [cauthdsl] func2 -> DEBU 1802 0xc00135f600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:08.005 UTC [cauthdsl] func2 -> DEBU 1803 0xc00135f600 principal evaluation fails" +"2019-09-24 00:27:08.006 UTC [cauthdsl] func1 -> DEBU 1804 0xc00135f600 gate 1569284828004688800 evaluation fails" +"2019-09-24 00:27:08.006 UTC [policies] Evaluate -> DEBU 1805 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.006 UTC [policies] Evaluate -> DEBU 1806 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.006 UTC [policies] Evaluate -> DEBU 1807 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.007 UTC [cauthdsl] func1 -> DEBU 1808 0xc00135fe40 gate 1569284828007137800 evaluation starts" +"2019-09-24 00:27:08.007 UTC [cauthdsl] func2 -> DEBU 1809 0xc00135fe40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.007 UTC [cauthdsl] func2 -> DEBU 180a 0xc00135fe40 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.007 UTC [cauthdsl] func2 -> DEBU 180b 0xc00135fe40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:08.008 UTC [cauthdsl] func2 -> DEBU 180c 0xc00135fe40 principal evaluation fails" +"2019-09-24 00:27:08.008 UTC [cauthdsl] func1 -> DEBU 180d 0xc00135fe40 gate 1569284828007137800 evaluation fails" +"2019-09-24 00:27:08.009 UTC [policies] Evaluate -> DEBU 180e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.009 UTC [policies] Evaluate -> DEBU 180f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.009 UTC [policies] func1 -> DEBU 1810 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 00:27:08.010 UTC [policies] Evaluate -> DEBU 1811 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:08.010 UTC [policies] Evaluate -> DEBU 1812 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.011 UTC [policies] Evaluate -> DEBU 1813 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:08.011 UTC [policies] Evaluate -> DEBU 1814 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.011 UTC [policies] Evaluate -> DEBU 1815 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:08.011 UTC [cauthdsl] func1 -> DEBU 1816 0xc001044b30 gate 1569284828011757800 evaluation starts" +"2019-09-24 00:27:08.012 UTC [cauthdsl] func2 -> DEBU 1817 0xc001044b30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.012 UTC [cauthdsl] func2 -> DEBU 1818 0xc001044b30 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.012 UTC [cauthdsl] func2 -> DEBU 1819 0xc001044b30 principal matched by identity 0" +"2019-09-24 00:27:08.012 UTC [msp.identity] Verify -> DEBU 181a Verify: digest = 00000000 7e dc bb a5 c0 07 2d 8f 98 82 64 db 47 a2 be b1 |~.....-...d.G...| +00000010 cd b2 3e b8 ac 93 df 65 a6 10 74 bd 93 fc 78 81 |..>....e..t...x.|" +"2019-09-24 00:27:08.013 UTC [msp.identity] Verify -> DEBU 181b Verify: sig = 00000000 30 45 02 21 00 c7 f1 6c 5a b6 af f6 29 ad ef 65 |0E.!...lZ...)..e| +00000010 dc 84 e4 0e 54 5a b8 6f d8 d0 ed ea a8 d9 e3 81 |....TZ.o........| +00000020 f6 19 ee 6d 3d 02 20 27 52 12 d2 e7 18 df af cd |...m=. 'R.......| +00000030 fc 77 8a 51 48 97 8a 76 a0 f5 94 2e 47 33 28 6b |.w.QH..v....G3(k| +00000040 ae cf 98 e1 61 37 d1 |....a7.|" +"2019-09-24 00:27:08.013 UTC [cauthdsl] func2 -> DEBU 181c 0xc001044b30 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.014 UTC [cauthdsl] func1 -> DEBU 181d 0xc001044b30 gate 1569284828011757800 evaluation succeeds" +"2019-09-24 00:27:08.014 UTC [policies] Evaluate -> DEBU 181e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.014 UTC [policies] Evaluate -> DEBU 181f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.014 UTC [policies] Evaluate -> DEBU 1820 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.014 UTC [policies] Evaluate -> DEBU 1821 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.015 UTC [policies] Evaluate -> DEBU 1822 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:08.015 UTC [policies] Evaluate -> DEBU 1823 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:08.015 UTC [common.deliver] deliverBlocks -> DEBU 1824 [channel: businesschannel] Received seekInfo (0xc00088d880) start: > stop: > from 172.18.0.9:32894" +"2019-09-24 00:27:08.016 UTC [fsblkstorage] Next -> DEBU 1825 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 00:27:08.016 UTC [fsblkstorage] newBlockfileStream -> DEBU 1826 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-09-24 00:27:08.016 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1827 Remaining bytes=[83906], Going to peek [8] bytes" +"2019-09-24 00:27:08.016 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1828 Returning blockbytes - length=[23945], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:27:08.017 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1829 blockbytes [23945] read from file [0]" +"2019-09-24 00:27:08.017 UTC [common.deliver] deliverBlocks -> DEBU 182a [channel: businesschannel] Delivering block for (0xc00088d880) for 172.18.0.9:32894" +"2019-09-24 00:27:08.017 UTC [common.deliver] deliverBlocks -> DEBU 182b [channel: businesschannel] Done delivering to 172.18.0.9:32894 for (0xc00088d880)" +"2019-09-24 00:27:08.018 UTC [common.deliver] Handle -> DEBU 182c Waiting for new SeekInfo from 172.18.0.9:32894" +"2019-09-24 00:27:08.018 UTC [fsblkstorage] waitForBlock -> DEBU 182d Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 00:27:08.018 UTC [fsblkstorage] waitForBlock -> DEBU 182e Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 00:27:08.018 UTC [common.deliver] Handle -> DEBU 182f Attempting to read seek info message from 172.18.0.9:32894" +"2019-09-24 00:27:08.032 UTC [grpc] warningf -> DEBU 1830 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:32894: read: connection reset by peer" +"2019-09-24 00:27:08.033 UTC [common.deliver] Handle -> WARN 1831 Error reading from 172.18.0.9:32894: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:08.033 UTC [orderer.common.server] func1 -> DEBU 1832 Closing Deliver stream" +"2019-09-24 00:27:08.033 UTC [comm.grpc.server] 1 -> INFO 1833 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32894 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.7096ms +"2019-09-24 00:27:08.035 UTC [grpc] infof -> DEBU 1834 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:08.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1835 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:08.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1836 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.9µs " +"2019-09-24 00:27:08.036 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1837 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2019-09-24 00:27:08.213 UTC [orderer.common.server] Deliver -> DEBU 1838 Starting new Deliver handler" +"2019-09-24 00:27:08.214 UTC [common.deliver] Handle -> DEBU 1839 Starting new deliver loop for 172.18.0.9:32896" +"2019-09-24 00:27:08.215 UTC [common.deliver] Handle -> DEBU 183a Attempting to read seek info message from 172.18.0.9:32896" +"2019-09-24 00:27:08.215 UTC [policies] Evaluate -> DEBU 183b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:08.215 UTC [policies] Evaluate -> DEBU 183c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.215 UTC [policies] Evaluate -> DEBU 183d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.216 UTC [policies] Evaluate -> DEBU 183e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.216 UTC [policies] Evaluate -> DEBU 183f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.216 UTC [cauthdsl] func1 -> DEBU 1840 0xc000bbf110 gate 1569284828216245900 evaluation starts" +"2019-09-24 00:27:08.216 UTC [cauthdsl] func2 -> DEBU 1841 0xc000bbf110 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.216 UTC [cauthdsl] func2 -> DEBU 1842 0xc000bbf110 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.216 UTC [cauthdsl] func2 -> DEBU 1843 0xc000bbf110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:08.216 UTC [cauthdsl] func2 -> DEBU 1844 0xc000bbf110 principal evaluation fails" +"2019-09-24 00:27:08.216 UTC [cauthdsl] func1 -> DEBU 1845 0xc000bbf110 gate 1569284828216245900 evaluation fails" +"2019-09-24 00:27:08.216 UTC [policies] Evaluate -> DEBU 1846 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.216 UTC [policies] Evaluate -> DEBU 1847 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.217 UTC [policies] Evaluate -> DEBU 1848 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.217 UTC [cauthdsl] func1 -> DEBU 1849 0xc000bbf950 gate 1569284828217116900 evaluation starts" +"2019-09-24 00:27:08.217 UTC [cauthdsl] func2 -> DEBU 184a 0xc000bbf950 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.217 UTC [cauthdsl] func2 -> DEBU 184b 0xc000bbf950 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.217 UTC [cauthdsl] func2 -> DEBU 184c 0xc000bbf950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:08.217 UTC [cauthdsl] func2 -> DEBU 184d 0xc000bbf950 principal evaluation fails" +"2019-09-24 00:27:08.217 UTC [cauthdsl] func1 -> DEBU 184e 0xc000bbf950 gate 1569284828217116900 evaluation fails" +"2019-09-24 00:27:08.217 UTC [policies] Evaluate -> DEBU 184f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.217 UTC [policies] Evaluate -> DEBU 1850 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.217 UTC [policies] func1 -> DEBU 1851 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:08.217 UTC [policies] Evaluate -> DEBU 1852 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:08.218 UTC [policies] Evaluate -> DEBU 1853 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.218 UTC [policies] Evaluate -> DEBU 1854 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:08.218 UTC [policies] Evaluate -> DEBU 1855 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.218 UTC [policies] Evaluate -> DEBU 1856 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:08.218 UTC [cauthdsl] func1 -> DEBU 1857 0xc000f30640 gate 1569284828218471900 evaluation starts" +"2019-09-24 00:27:08.218 UTC [cauthdsl] func2 -> DEBU 1858 0xc000f30640 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.218 UTC [cauthdsl] func2 -> DEBU 1859 0xc000f30640 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.219 UTC [cauthdsl] func2 -> DEBU 185a 0xc000f30640 principal matched by identity 0" +"2019-09-24 00:27:08.219 UTC [msp.identity] Verify -> DEBU 185b Verify: digest = 00000000 5c 47 11 77 5e 52 88 77 a4 b5 4f 69 d8 eb 40 33 |\G.w^R.w..Oi..@3| +00000010 85 ca 10 1a 8c 0c 4c b4 6d 14 39 67 6e 20 d1 3a |......L.m.9gn .:|" +"2019-09-24 00:27:08.219 UTC [msp.identity] Verify -> DEBU 185c Verify: sig = 00000000 30 45 02 21 00 c4 0d 78 99 71 95 77 a3 a6 b1 75 |0E.!...x.q.w...u| +00000010 8b 35 ff bc 53 e4 72 6e 36 92 93 22 9e da 32 5b |.5..S.rn6.."..2[| +00000020 59 8c e0 9e c0 02 20 4f 27 6b b6 90 8c 0e 6e e4 |Y..... O'k....n.| +00000030 87 44 57 bc 85 f6 90 4a 81 55 d8 18 f7 7a a6 b5 |.DW....J.U...z..| +00000040 7a 08 41 87 90 27 e6 |z.A..'.|" +"2019-09-24 00:27:08.219 UTC [cauthdsl] func2 -> DEBU 185d 0xc000f30640 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.219 UTC [cauthdsl] func1 -> DEBU 185e 0xc000f30640 gate 1569284828218471900 evaluation succeeds" +"2019-09-24 00:27:08.219 UTC [policies] Evaluate -> DEBU 185f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.219 UTC [policies] Evaluate -> DEBU 1860 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.220 UTC [policies] Evaluate -> DEBU 1861 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.220 UTC [policies] Evaluate -> DEBU 1862 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.220 UTC [policies] Evaluate -> DEBU 1863 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:08.220 UTC [policies] Evaluate -> DEBU 1864 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:08.220 UTC [common.deliver] deliverBlocks -> DEBU 1865 [channel: businesschannel] Received seekInfo (0xc00088dfc0) start: > stop: > from 172.18.0.9:32896" +"2019-09-24 00:27:08.220 UTC [fsblkstorage] Next -> DEBU 1866 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 00:27:08.220 UTC [fsblkstorage] newBlockfileStream -> DEBU 1867 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23948]" +"2019-09-24 00:27:08.220 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1868 Remaining bytes=[59958], Going to peek [8] bytes" +"2019-09-24 00:27:08.220 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1869 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23948], bytesOffset=[23951]}" +"2019-09-24 00:27:08.221 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 186a blockbytes [23690] read from file [0]" +"2019-09-24 00:27:08.221 UTC [common.deliver] deliverBlocks -> DEBU 186b [channel: businesschannel] Delivering block for (0xc00088dfc0) for 172.18.0.9:32896" +"2019-09-24 00:27:08.221 UTC [common.deliver] deliverBlocks -> DEBU 186c [channel: businesschannel] Done delivering to 172.18.0.9:32896 for (0xc00088dfc0)" +"2019-09-24 00:27:08.221 UTC [fsblkstorage] waitForBlock -> DEBU 186d Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 00:27:08.222 UTC [fsblkstorage] waitForBlock -> DEBU 186e Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 00:27:08.222 UTC [common.deliver] Handle -> DEBU 186f Waiting for new SeekInfo from 172.18.0.9:32896" +"2019-09-24 00:27:08.222 UTC [common.deliver] Handle -> DEBU 1870 Attempting to read seek info message from 172.18.0.9:32896" +"2019-09-24 00:27:08.230 UTC [grpc] infof -> DEBU 1871 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:08.230 UTC [common.deliver] Handle -> WARN 1872 Error reading from 172.18.0.9:32896: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:08.230 UTC [orderer.common.server] func1 -> DEBU 1873 Closing Deliver stream" +"2019-09-24 00:27:08.230 UTC [comm.grpc.server] 1 -> INFO 1874 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32896 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.0237ms +"2019-09-24 00:27:08.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1875 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +"2019-09-24 00:27:08.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1876 Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +"2019-09-24 00:27:08.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1877 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.2µs " +"2019-09-24 00:27:08.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1878 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 170.8µs " +"2019-09-24 00:27:08.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1879 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:08.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 187a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:08.387 UTC [orderer.common.server] Deliver -> DEBU 187b Starting new Deliver handler" +"2019-09-24 00:27:08.387 UTC [common.deliver] Handle -> DEBU 187c Starting new deliver loop for 172.18.0.9:32898" +"2019-09-24 00:27:08.388 UTC [common.deliver] Handle -> DEBU 187d Attempting to read seek info message from 172.18.0.9:32898" +"2019-09-24 00:27:08.389 UTC [policies] Evaluate -> DEBU 187e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:08.389 UTC [policies] Evaluate -> DEBU 187f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.389 UTC [policies] Evaluate -> DEBU 1880 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.390 UTC [policies] Evaluate -> DEBU 1881 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.390 UTC [policies] Evaluate -> DEBU 1882 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.390 UTC [cauthdsl] func1 -> DEBU 1883 0xc000dce340 gate 1569284828390676500 evaluation starts" +"2019-09-24 00:27:08.390 UTC [cauthdsl] func2 -> DEBU 1884 0xc000dce340 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.391 UTC [cauthdsl] func2 -> DEBU 1885 0xc000dce340 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.391 UTC [cauthdsl] func2 -> DEBU 1886 0xc000dce340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:08.391 UTC [cauthdsl] func2 -> DEBU 1887 0xc000dce340 principal evaluation fails" +"2019-09-24 00:27:08.391 UTC [cauthdsl] func1 -> DEBU 1888 0xc000dce340 gate 1569284828390676500 evaluation fails" +"2019-09-24 00:27:08.392 UTC [policies] Evaluate -> DEBU 1889 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.392 UTC [policies] Evaluate -> DEBU 188a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.392 UTC [policies] Evaluate -> DEBU 188b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.392 UTC [cauthdsl] func1 -> DEBU 188c 0xc000dceb80 gate 1569284828392583200 evaluation starts" +"2019-09-24 00:27:08.392 UTC [cauthdsl] func2 -> DEBU 188d 0xc000dceb80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.393 UTC [cauthdsl] func2 -> DEBU 188e 0xc000dceb80 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.393 UTC [cauthdsl] func2 -> DEBU 188f 0xc000dceb80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:08.393 UTC [cauthdsl] func2 -> DEBU 1890 0xc000dceb80 principal evaluation fails" +"2019-09-24 00:27:08.394 UTC [cauthdsl] func1 -> DEBU 1891 0xc000dceb80 gate 1569284828392583200 evaluation fails" +"2019-09-24 00:27:08.394 UTC [policies] Evaluate -> DEBU 1892 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.394 UTC [policies] Evaluate -> DEBU 1893 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.394 UTC [policies] func1 -> DEBU 1894 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 00:27:08.395 UTC [policies] Evaluate -> DEBU 1895 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:08.395 UTC [policies] Evaluate -> DEBU 1896 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.395 UTC [policies] Evaluate -> DEBU 1897 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:08.396 UTC [policies] Evaluate -> DEBU 1898 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.396 UTC [policies] Evaluate -> DEBU 1899 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:08.396 UTC [cauthdsl] func1 -> DEBU 189a 0xc000dcf870 gate 1569284828396485400 evaluation starts" +"2019-09-24 00:27:08.396 UTC [cauthdsl] func2 -> DEBU 189b 0xc000dcf870 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.397 UTC [cauthdsl] func2 -> DEBU 189c 0xc000dcf870 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.397 UTC [cauthdsl] func2 -> DEBU 189d 0xc000dcf870 principal matched by identity 0" +"2019-09-24 00:27:08.398 UTC [msp.identity] Verify -> DEBU 189e Verify: digest = 00000000 d6 b5 2f 0a cd c1 e8 a2 51 54 86 56 16 75 25 47 |../.....QT.V.u%G| +00000010 da 7d 1c 83 4f a3 ae 49 81 0d 02 20 a8 4b d0 4d |.}..O..I... .K.M|" +"2019-09-24 00:27:08.398 UTC [msp.identity] Verify -> DEBU 189f Verify: sig = 00000000 30 44 02 20 2c 98 4a c5 49 fa de 48 58 49 a1 03 |0D. ,.J.I..HXI..| +00000010 7f b8 59 53 29 f6 24 1e 05 9c 67 c5 1d d8 08 91 |..YS).$...g.....| +00000020 9e fc 7d 0e 02 20 41 64 c2 5f b1 50 d5 f3 41 43 |..}.. Ad._.P..AC| +00000030 be 96 8f ba aa a0 81 ae f7 c2 fe a3 b0 aa d1 e0 |................| +00000040 2a 2d 7e b3 56 d6 |*-~.V.|" +"2019-09-24 00:27:08.398 UTC [cauthdsl] func2 -> DEBU 18a0 0xc000dcf870 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.399 UTC [cauthdsl] func1 -> DEBU 18a1 0xc000dcf870 gate 1569284828396485400 evaluation succeeds" +"2019-09-24 00:27:08.399 UTC [policies] Evaluate -> DEBU 18a2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.399 UTC [policies] Evaluate -> DEBU 18a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.399 UTC [policies] Evaluate -> DEBU 18a4 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.400 UTC [policies] Evaluate -> DEBU 18a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.400 UTC [policies] Evaluate -> DEBU 18a6 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:08.400 UTC [policies] Evaluate -> DEBU 18a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:08.400 UTC [common.deliver] deliverBlocks -> DEBU 18a8 [channel: businesschannel] Received seekInfo (0xc000b3e780) start: > stop: > from 172.18.0.9:32898" +"2019-09-24 00:27:08.401 UTC [fsblkstorage] Next -> DEBU 18a9 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 00:27:08.401 UTC [fsblkstorage] newBlockfileStream -> DEBU 18aa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47641]" +"2019-09-24 00:27:08.401 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ab Remaining bytes=[36265], Going to peek [8] bytes" +"2019-09-24 00:27:08.402 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ac Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47641], bytesOffset=[47644]}" +"2019-09-24 00:27:08.402 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ad blockbytes [23747] read from file [0]" +"2019-09-24 00:27:08.403 UTC [common.deliver] deliverBlocks -> DEBU 18ae [channel: businesschannel] Delivering block for (0xc000b3e780) for 172.18.0.9:32898" +"2019-09-24 00:27:08.403 UTC [common.deliver] deliverBlocks -> DEBU 18af [channel: businesschannel] Done delivering to 172.18.0.9:32898 for (0xc000b3e780)" +"2019-09-24 00:27:08.404 UTC [fsblkstorage] waitForBlock -> DEBU 18b0 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 00:27:08.404 UTC [fsblkstorage] waitForBlock -> DEBU 18b1 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 00:27:08.404 UTC [common.deliver] Handle -> DEBU 18b2 Waiting for new SeekInfo from 172.18.0.9:32898" +"2019-09-24 00:27:08.404 UTC [common.deliver] Handle -> DEBU 18b3 Attempting to read seek info message from 172.18.0.9:32898" +"2019-09-24 00:27:08.410 UTC [grpc] infof -> DEBU 18b4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:08.411 UTC [common.deliver] Handle -> WARN 18b5 Error reading from 172.18.0.9:32898: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:08.411 UTC [orderer.common.server] func1 -> DEBU 18b6 Closing Deliver stream" +"2019-09-24 00:27:08.412 UTC [comm.grpc.server] 1 -> INFO 18b7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32898 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.6194ms +"2019-09-24 00:27:08.534 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18b8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:08.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18b9 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +"2019-09-24 00:27:08.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 313.5µs " +"2019-09-24 00:27:08.547 UTC [orderer.common.server] Deliver -> DEBU 18bb Starting new Deliver handler" +"2019-09-24 00:27:08.547 UTC [common.deliver] Handle -> DEBU 18bc Starting new deliver loop for 172.18.0.9:32900" +"2019-09-24 00:27:08.547 UTC [common.deliver] Handle -> DEBU 18bd Attempting to read seek info message from 172.18.0.9:32900" +"2019-09-24 00:27:08.549 UTC [policies] Evaluate -> DEBU 18be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:08.549 UTC [policies] Evaluate -> DEBU 18bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.550 UTC [policies] Evaluate -> DEBU 18c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.551 UTC [policies] Evaluate -> DEBU 18c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.552 UTC [policies] Evaluate -> DEBU 18c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.552 UTC [cauthdsl] func1 -> DEBU 18c3 0xc00118df80 gate 1569284828552316200 evaluation starts" +"2019-09-24 00:27:08.552 UTC [cauthdsl] func2 -> DEBU 18c4 0xc00118df80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.552 UTC [cauthdsl] func2 -> DEBU 18c5 0xc00118df80 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.553 UTC [cauthdsl] func2 -> DEBU 18c6 0xc00118df80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:08.553 UTC [cauthdsl] func2 -> DEBU 18c7 0xc00118df80 principal evaluation fails" +"2019-09-24 00:27:08.553 UTC [cauthdsl] func1 -> DEBU 18c8 0xc00118df80 gate 1569284828552316200 evaluation fails" +"2019-09-24 00:27:08.553 UTC [policies] Evaluate -> DEBU 18c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.553 UTC [policies] Evaluate -> DEBU 18ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.554 UTC [policies] Evaluate -> DEBU 18cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.554 UTC [cauthdsl] func1 -> DEBU 18cc 0xc00089e7c0 gate 1569284828554367200 evaluation starts" +"2019-09-24 00:27:08.554 UTC [cauthdsl] func2 -> DEBU 18cd 0xc00089e7c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.554 UTC [cauthdsl] func2 -> DEBU 18ce 0xc00089e7c0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.555 UTC [cauthdsl] func2 -> DEBU 18cf 0xc00089e7c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:08.555 UTC [cauthdsl] func2 -> DEBU 18d0 0xc00089e7c0 principal evaluation fails" +"2019-09-24 00:27:08.555 UTC [cauthdsl] func1 -> DEBU 18d1 0xc00089e7c0 gate 1569284828554367200 evaluation fails" +"2019-09-24 00:27:08.555 UTC [policies] Evaluate -> DEBU 18d2 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.556 UTC [policies] Evaluate -> DEBU 18d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.556 UTC [policies] func1 -> DEBU 18d4 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 00:27:08.556 UTC [policies] Evaluate -> DEBU 18d5 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:08.557 UTC [policies] Evaluate -> DEBU 18d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.557 UTC [policies] Evaluate -> DEBU 18d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:08.557 UTC [policies] Evaluate -> DEBU 18d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.558 UTC [policies] Evaluate -> DEBU 18d9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:08.558 UTC [cauthdsl] func1 -> DEBU 18da 0xc00089f4b0 gate 1569284828558208600 evaluation starts" +"2019-09-24 00:27:08.558 UTC [cauthdsl] func2 -> DEBU 18db 0xc00089f4b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.558 UTC [cauthdsl] func2 -> DEBU 18dc 0xc00089f4b0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.558 UTC [cauthdsl] func2 -> DEBU 18dd 0xc00089f4b0 principal matched by identity 0" +"2019-09-24 00:27:08.559 UTC [msp.identity] Verify -> DEBU 18de Verify: digest = 00000000 c2 54 0f 70 e2 99 58 5a e2 4f 6e a4 43 89 3f 2c |.T.p..XZ.On.C.?,| +00000010 4b d0 6e 68 fc 50 30 85 4e 23 1f 75 23 e6 9e 92 |K.nh.P0.N#.u#...|" +"2019-09-24 00:27:08.559 UTC [msp.identity] Verify -> DEBU 18df Verify: sig = 00000000 30 45 02 21 00 c1 60 8d 37 54 75 83 ae 67 df 4f |0E.!..`.7Tu..g.O| +00000010 f2 21 18 56 d7 48 52 0d e7 1a a8 61 18 72 1e 27 |.!.V.HR....a.r.'| +00000020 bc 67 79 1c 03 02 20 68 55 97 9b 22 7d 97 f2 fa |.gy... hU.."}...| +00000030 b6 cf 8e 6f 39 25 a8 04 97 84 dc ae 06 e5 29 71 |...o9%........)q| +00000040 3f 35 ad 78 cc fc 89 |?5.x...|" +"2019-09-24 00:27:08.559 UTC [cauthdsl] func2 -> DEBU 18e0 0xc00089f4b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.559 UTC [cauthdsl] func1 -> DEBU 18e1 0xc00089f4b0 gate 1569284828558208600 evaluation succeeds" +"2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e4 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e6 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:08.560 UTC [policies] Evaluate -> DEBU 18e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:08.561 UTC [common.deliver] deliverBlocks -> DEBU 18e8 [channel: businesschannel] Received seekInfo (0xc000b3ee40) start: > stop: > from 172.18.0.9:32900" +"2019-09-24 00:27:08.561 UTC [fsblkstorage] Next -> DEBU 18e9 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 00:27:08.561 UTC [fsblkstorage] newBlockfileStream -> DEBU 18ea newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71391]" +"2019-09-24 00:27:08.561 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18eb Remaining bytes=[12515], Going to peek [8] bytes" +"2019-09-24 00:27:08.561 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ec Returning blockbytes - length=[4529], placementInfo={fileNum=[0], startOffset=[71391], bytesOffset=[71393]}" +"2019-09-24 00:27:08.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ed blockbytes [4529] read from file [0]" +"2019-09-24 00:27:08.562 UTC [common.deliver] deliverBlocks -> DEBU 18ee [channel: businesschannel] Delivering block for (0xc000b3ee40) for 172.18.0.9:32900" +"2019-09-24 00:27:08.562 UTC [common.deliver] deliverBlocks -> DEBU 18ef [channel: businesschannel] Done delivering to 172.18.0.9:32900 for (0xc000b3ee40)" +"2019-09-24 00:27:08.562 UTC [fsblkstorage] waitForBlock -> DEBU 18f0 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 00:27:08.563 UTC [fsblkstorage] waitForBlock -> DEBU 18f1 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 00:27:08.563 UTC [common.deliver] Handle -> DEBU 18f2 Waiting for new SeekInfo from 172.18.0.9:32900" +"2019-09-24 00:27:08.563 UTC [common.deliver] Handle -> DEBU 18f3 Attempting to read seek info message from 172.18.0.9:32900" +"2019-09-24 00:27:08.569 UTC [grpc] infof -> DEBU 18f4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:08.569 UTC [common.deliver] Handle -> WARN 18f5 Error reading from 172.18.0.9:32900: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:08.569 UTC [orderer.common.server] func1 -> DEBU 18f6 Closing Deliver stream" +"2019-09-24 00:27:08.569 UTC [comm.grpc.server] 1 -> INFO 18f7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32900 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.3493ms +"2019-09-24 00:27:08.722 UTC [orderer.common.server] Deliver -> DEBU 18f8 Starting new Deliver handler" +"2019-09-24 00:27:08.722 UTC [common.deliver] Handle -> DEBU 18f9 Starting new deliver loop for 172.18.0.9:32902" +"2019-09-24 00:27:08.722 UTC [common.deliver] Handle -> DEBU 18fa Attempting to read seek info message from 172.18.0.9:32902" +"2019-09-24 00:27:08.722 UTC [policies] Evaluate -> DEBU 18fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 18fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 18fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 18fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 18ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.723 UTC [cauthdsl] func1 -> DEBU 1900 0xc000aea170 gate 1569284828723116800 evaluation starts" +"2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 1901 0xc000aea170 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 1902 0xc000aea170 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 1903 0xc000aea170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 1904 0xc000aea170 principal evaluation fails" +"2019-09-24 00:27:08.723 UTC [cauthdsl] func1 -> DEBU 1905 0xc000aea170 gate 1569284828723116800 evaluation fails" +"2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 1906 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 1907 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.723 UTC [policies] Evaluate -> DEBU 1908 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.723 UTC [cauthdsl] func1 -> DEBU 1909 0xc000aea9b0 gate 1569284828723812900 evaluation starts" +"2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 190a 0xc000aea9b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 190b 0xc000aea9b0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.723 UTC [cauthdsl] func2 -> DEBU 190c 0xc000aea9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:08.724 UTC [cauthdsl] func2 -> DEBU 190d 0xc000aea9b0 principal evaluation fails" +"2019-09-24 00:27:08.724 UTC [cauthdsl] func1 -> DEBU 190e 0xc000aea9b0 gate 1569284828723812900 evaluation fails" +"2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 190f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1910 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.724 UTC [policies] func1 -> DEBU 1911 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1912 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1913 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1914 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1915 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.724 UTC [policies] Evaluate -> DEBU 1916 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:08.724 UTC [cauthdsl] func1 -> DEBU 1917 0xc000aeb6a0 gate 1569284828724706400 evaluation starts" +"2019-09-24 00:27:08.724 UTC [cauthdsl] func2 -> DEBU 1918 0xc000aeb6a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.724 UTC [cauthdsl] func2 -> DEBU 1919 0xc000aeb6a0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.724 UTC [cauthdsl] func2 -> DEBU 191a 0xc000aeb6a0 principal matched by identity 0" +"2019-09-24 00:27:08.724 UTC [msp.identity] Verify -> DEBU 191b Verify: digest = 00000000 92 92 66 2f a3 de b5 9b c4 a1 c2 f3 4d e2 5e 07 |..f/........M.^.| +00000010 02 15 b8 5a 03 96 cf 46 48 5f 68 de 67 37 c5 40 |...Z...FH_h.g7.@|" +"2019-09-24 00:27:08.725 UTC [msp.identity] Verify -> DEBU 191c Verify: sig = 00000000 30 44 02 20 7c 7c 68 90 c8 83 2e ab 29 e8 a3 8f |0D. ||h.....)...| +00000010 d7 29 56 da b3 bf be 28 91 a5 b7 ce 9a 7a f8 46 |.)V....(.....z.F| +00000020 2a 63 f1 04 02 20 47 e5 3f a4 b0 ab 20 9f 79 e4 |*c... G.?... .y.| +00000030 36 2b 0c ec dd f0 f8 7f 48 1a 9b e2 65 4f 6f a3 |6+......H...eOo.| +00000040 53 57 15 06 84 49 |SW...I|" +"2019-09-24 00:27:08.725 UTC [cauthdsl] func2 -> DEBU 191d 0xc000aeb6a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.725 UTC [cauthdsl] func1 -> DEBU 191e 0xc000aeb6a0 gate 1569284828724706400 evaluation succeeds" +"2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 191f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 1920 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 1921 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 1922 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 1923 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:08.725 UTC [policies] Evaluate -> DEBU 1924 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:08.725 UTC [common.deliver] deliverBlocks -> DEBU 1925 [channel: businesschannel] Received seekInfo (0xc000ac4a40) start: > stop: > from 172.18.0.9:32902" +"2019-09-24 00:27:08.725 UTC [fsblkstorage] Next -> DEBU 1926 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 00:27:08.725 UTC [fsblkstorage] newBlockfileStream -> DEBU 1927 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75922]" +"2019-09-24 00:27:08.726 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1928 Remaining bytes=[7984], Going to peek [8] bytes" +"2019-09-24 00:27:08.726 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1929 Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[75922], bytesOffset=[75924]}" +"2019-09-24 00:27:08.726 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 192a blockbytes [3990] read from file [0]" +"2019-09-24 00:27:08.726 UTC [common.deliver] deliverBlocks -> DEBU 192b [channel: businesschannel] Delivering block for (0xc000ac4a40) for 172.18.0.9:32902" +"2019-09-24 00:27:08.726 UTC [common.deliver] deliverBlocks -> DEBU 192c [channel: businesschannel] Done delivering to 172.18.0.9:32902 for (0xc000ac4a40)" +"2019-09-24 00:27:08.726 UTC [common.deliver] Handle -> DEBU 192d Waiting for new SeekInfo from 172.18.0.9:32902" +"2019-09-24 00:27:08.726 UTC [common.deliver] Handle -> DEBU 192e Attempting to read seek info message from 172.18.0.9:32902" +"2019-09-24 00:27:08.726 UTC [fsblkstorage] waitForBlock -> DEBU 192f Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 00:27:08.726 UTC [fsblkstorage] waitForBlock -> DEBU 1930 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 00:27:08.735 UTC [common.deliver] Handle -> WARN 1931 Error reading from 172.18.0.9:32902: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:08.735 UTC [orderer.common.server] func1 -> DEBU 1932 Closing Deliver stream" +"2019-09-24 00:27:08.736 UTC [comm.grpc.server] 1 -> INFO 1933 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32902 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.7635ms +"2019-09-24 00:27:08.737 UTC [grpc] infof -> DEBU 1934 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:08.847 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1935 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2019-09-24 00:27:08.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1936 Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" +"2019-09-24 00:27:08.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1937 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 313.9µs " +"2019-09-24 00:27:08.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1938 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:08.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1939 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3132ms " +"2019-09-24 00:27:08.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 193a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:08.915 UTC [orderer.common.server] Deliver -> DEBU 193b Starting new Deliver handler" +"2019-09-24 00:27:08.915 UTC [common.deliver] Handle -> DEBU 193c Starting new deliver loop for 172.18.0.9:32904" +"2019-09-24 00:27:08.915 UTC [common.deliver] Handle -> DEBU 193d Attempting to read seek info message from 172.18.0.9:32904" +"2019-09-24 00:27:08.916 UTC [policies] Evaluate -> DEBU 193e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:08.916 UTC [policies] Evaluate -> DEBU 193f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.916 UTC [policies] Evaluate -> DEBU 1940 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.916 UTC [policies] Evaluate -> DEBU 1941 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.916 UTC [policies] Evaluate -> DEBU 1942 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.916 UTC [cauthdsl] func1 -> DEBU 1943 0xc0008addc0 gate 1569284828916592800 evaluation starts" +"2019-09-24 00:27:08.916 UTC [cauthdsl] func2 -> DEBU 1944 0xc0008addc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.916 UTC [cauthdsl] func2 -> DEBU 1945 0xc0008addc0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.916 UTC [cauthdsl] func2 -> DEBU 1946 0xc0008addc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:08.917 UTC [cauthdsl] func2 -> DEBU 1947 0xc0008addc0 principal evaluation fails" +"2019-09-24 00:27:08.917 UTC [cauthdsl] func1 -> DEBU 1948 0xc0008addc0 gate 1569284828916592800 evaluation fails" +"2019-09-24 00:27:08.917 UTC [policies] Evaluate -> DEBU 1949 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.917 UTC [policies] Evaluate -> DEBU 194a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.917 UTC [policies] Evaluate -> DEBU 194b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.917 UTC [cauthdsl] func1 -> DEBU 194c 0xc001338600 gate 1569284828917855000 evaluation starts" +"2019-09-24 00:27:08.917 UTC [cauthdsl] func2 -> DEBU 194d 0xc001338600 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.917 UTC [cauthdsl] func2 -> DEBU 194e 0xc001338600 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.918 UTC [cauthdsl] func2 -> DEBU 194f 0xc001338600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:08.918 UTC [cauthdsl] func2 -> DEBU 1950 0xc001338600 principal evaluation fails" +"2019-09-24 00:27:08.918 UTC [cauthdsl] func1 -> DEBU 1951 0xc001338600 gate 1569284828917855000 evaluation fails" +"2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1952 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1953 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.918 UTC [policies] func1 -> DEBU 1954 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1955 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1956 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1957 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:08.918 UTC [policies] Evaluate -> DEBU 1958 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.919 UTC [policies] Evaluate -> DEBU 1959 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:08.919 UTC [cauthdsl] func1 -> DEBU 195a 0xc0013392f0 gate 1569284828919133900 evaluation starts" +"2019-09-24 00:27:08.919 UTC [cauthdsl] func2 -> DEBU 195b 0xc0013392f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.919 UTC [cauthdsl] func2 -> DEBU 195c 0xc0013392f0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:08.919 UTC [cauthdsl] func2 -> DEBU 195d 0xc0013392f0 principal matched by identity 0" +"2019-09-24 00:27:08.920 UTC [msp.identity] Verify -> DEBU 195e Verify: digest = 00000000 32 cf 48 3c 69 3c 02 f4 38 b0 9c 84 2d 58 d7 5f |2.H DEBU 195f Verify: sig = 00000000 30 44 02 20 54 55 4d fc 1a 8f 37 fe fa 65 52 74 |0D. TUM...7..eRt| +00000010 15 3d 57 90 84 22 af e0 da fb 86 9f 99 0c 99 d2 |.=W.."..........| +00000020 f2 d8 b1 9f 02 20 16 5f cf 75 19 62 85 1f e0 63 |..... ._.u.b...c| +00000030 29 42 de 7a 8f 6b 2c 11 eb 88 01 61 26 3d 1e 90 |)B.z.k,....a&=..| +00000040 c4 88 61 87 cf 3b |..a..;|" +"2019-09-24 00:27:08.920 UTC [cauthdsl] func2 -> DEBU 1960 0xc0013392f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.920 UTC [cauthdsl] func1 -> DEBU 1961 0xc0013392f0 gate 1569284828919133900 evaluation succeeds" +"2019-09-24 00:27:08.920 UTC [policies] Evaluate -> DEBU 1962 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.920 UTC [policies] Evaluate -> DEBU 1963 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:08.921 UTC [policies] Evaluate -> DEBU 1964 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.921 UTC [policies] Evaluate -> DEBU 1965 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:08.921 UTC [policies] Evaluate -> DEBU 1966 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:08.921 UTC [policies] Evaluate -> DEBU 1967 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:08.921 UTC [common.deliver] deliverBlocks -> DEBU 1968 [channel: businesschannel] Received seekInfo (0xc000b3fe40) start: > stop: > from 172.18.0.9:32904" +"2019-09-24 00:27:08.921 UTC [fsblkstorage] Next -> DEBU 1969 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 00:27:08.921 UTC [fsblkstorage] newBlockfileStream -> DEBU 196a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79914]" +"2019-09-24 00:27:08.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196b Remaining bytes=[3992], Going to peek [8] bytes" +"2019-09-24 00:27:08.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196c Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[79914], bytesOffset=[79916]}" +"2019-09-24 00:27:08.922 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196d blockbytes [3990] read from file [0]" +"2019-09-24 00:27:08.922 UTC [common.deliver] deliverBlocks -> DEBU 196e [channel: businesschannel] Delivering block for (0xc000b3fe40) for 172.18.0.9:32904" +"2019-09-24 00:27:08.923 UTC [common.deliver] deliverBlocks -> DEBU 196f [channel: businesschannel] Done delivering to 172.18.0.9:32904 for (0xc000b3fe40)" +"2019-09-24 00:27:08.923 UTC [common.deliver] Handle -> DEBU 1970 Waiting for new SeekInfo from 172.18.0.9:32904" +"2019-09-24 00:27:08.923 UTC [common.deliver] Handle -> DEBU 1971 Attempting to read seek info message from 172.18.0.9:32904" +"2019-09-24 00:27:08.923 UTC [fsblkstorage] waitForBlock -> DEBU 1972 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 00:27:08.923 UTC [fsblkstorage] waitForBlock -> DEBU 1973 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 00:27:08.931 UTC [common.deliver] Handle -> WARN 1974 Error reading from 172.18.0.9:32904: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:08.932 UTC [grpc] infof -> DEBU 1975 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:08.931 UTC [orderer.common.server] func1 -> DEBU 1976 Closing Deliver stream" +"2019-09-24 00:27:08.932 UTC [comm.grpc.server] 1 -> INFO 1977 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32904 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.2677ms +"2019-09-24 00:27:09.034 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1978 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:09.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1979 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2019-09-24 00:27:09.036 UTC [orderer.common.cluster.step] sendMessage -> DEBU 197a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " +"2019-09-24 00:27:09.087 UTC [orderer.common.server] Deliver -> DEBU 197b Starting new Deliver handler" +"2019-09-24 00:27:09.088 UTC [common.deliver] Handle -> DEBU 197c Starting new deliver loop for 172.18.0.9:32906" +"2019-09-24 00:27:09.089 UTC [common.deliver] Handle -> DEBU 197d Attempting to read seek info message from 172.18.0.9:32906" +"2019-09-24 00:27:09.090 UTC [policies] Evaluate -> DEBU 197e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:09.091 UTC [policies] Evaluate -> DEBU 197f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:09.091 UTC [policies] Evaluate -> DEBU 1980 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:09.092 UTC [policies] Evaluate -> DEBU 1981 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:09.092 UTC [policies] Evaluate -> DEBU 1982 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:09.092 UTC [msp] DeserializeIdentity -> DEBU 1983 Obtaining identity" +"2019-09-24 00:27:09.093 UTC [msp.identity] newIdentity -> DEBU 1984 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:09.093 UTC [cauthdsl] func1 -> DEBU 1985 0xc00131b540 gate 1569284829093883000 evaluation starts" +"2019-09-24 00:27:09.094 UTC [cauthdsl] func2 -> DEBU 1986 0xc00131b540 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:09.094 UTC [cauthdsl] func2 -> DEBU 1987 0xc00131b540 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:09.094 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1988 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 00:27:09.094 UTC [msp] Validate -> DEBU 1989 MSP OrdererMSP validating identity" +"2019-09-24 00:27:09.095 UTC [cauthdsl] func2 -> DEBU 198a 0xc00131b540 principal matched by identity 0" +"2019-09-24 00:27:09.095 UTC [msp.identity] Verify -> DEBU 198b Verify: digest = 00000000 83 a9 6d 54 00 e0 7d d4 58 07 7d de ad 4b 10 ad |..mT..}.X.}..K..| +00000010 fa 69 94 0f 75 9c 8e e6 9d ea 84 9a 18 30 73 a7 |.i..u........0s.|" +"2019-09-24 00:27:09.096 UTC [msp.identity] Verify -> DEBU 198c Verify: sig = 00000000 30 44 02 20 48 50 05 06 6f c1 d5 4c 5c af 62 ec |0D. HP..o..L\.b.| +00000010 bc b7 1e 82 a8 0a 8b 43 77 f4 c6 2d f3 48 1a ed |.......Cw..-.H..| +00000020 c3 b7 d3 96 02 20 2a e9 b8 5b 18 94 9b 28 d8 8b |..... *..[...(..| +00000030 f1 29 dc c0 9b a7 7e 72 10 9a 77 e0 f9 78 d2 0e |.)....~r..w..x..| +00000040 74 d2 90 2b 66 d2 |t..+f.|" +"2019-09-24 00:27:09.096 UTC [cauthdsl] func2 -> DEBU 198d 0xc00131b540 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:09.097 UTC [cauthdsl] func1 -> DEBU 198e 0xc00131b540 gate 1569284829093883000 evaluation succeeds" +"2019-09-24 00:27:09.097 UTC [policies] Evaluate -> DEBU 198f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:09.097 UTC [policies] Evaluate -> DEBU 1990 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:09.098 UTC [policies] Evaluate -> DEBU 1991 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:09.098 UTC [policies] Evaluate -> DEBU 1992 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:09.098 UTC [policies] Evaluate -> DEBU 1993 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:09.098 UTC [policies] Evaluate -> DEBU 1994 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:09.099 UTC [common.deliver] deliverBlocks -> DEBU 1995 [channel: testchainid] Received seekInfo (0xc000ac5940) start: > stop: > from 172.18.0.9:32906" +"2019-09-24 00:27:09.099 UTC [fsblkstorage] Next -> DEBU 1996 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 00:27:09.099 UTC [fsblkstorage] newBlockfileStream -> DEBU 1997 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-09-24 00:27:09.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1998 Remaining bytes=[25835], Going to peek [8] bytes" +"2019-09-24 00:27:09.100 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1999 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-09-24 00:27:09.101 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 199a blockbytes [25832] read from file [0]" +"2019-09-24 00:27:09.101 UTC [common.deliver] deliverBlocks -> DEBU 199b [channel: testchainid] Delivering block for (0xc000ac5940) for 172.18.0.9:32906" +"2019-09-24 00:27:09.101 UTC [common.deliver] deliverBlocks -> DEBU 199c [channel: testchainid] Done delivering to 172.18.0.9:32906 for (0xc000ac5940)" +"2019-09-24 00:27:09.102 UTC [common.deliver] Handle -> DEBU 199d Waiting for new SeekInfo from 172.18.0.9:32906" +"2019-09-24 00:27:09.103 UTC [common.deliver] Handle -> DEBU 199e Attempting to read seek info message from 172.18.0.9:32906" +"2019-09-24 00:27:09.105 UTC [grpc] infof -> DEBU 199f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:09.105 UTC [common.deliver] Handle -> WARN 19a0 Error reading from 172.18.0.9:32906: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:09.106 UTC [orderer.common.server] func1 -> DEBU 19a1 Closing Deliver stream" +"2019-09-24 00:27:09.106 UTC [comm.grpc.server] 1 -> INFO 19a2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32906 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.9542ms +"2019-09-24 00:27:09.266 UTC [orderer.common.server] Deliver -> DEBU 19a3 Starting new Deliver handler" +"2019-09-24 00:27:09.266 UTC [common.deliver] Handle -> DEBU 19a4 Starting new deliver loop for 172.18.0.9:32908" +"2019-09-24 00:27:09.266 UTC [common.deliver] Handle -> DEBU 19a5 Attempting to read seek info message from 172.18.0.9:32908" +"2019-09-24 00:27:09.268 UTC [policies] Evaluate -> DEBU 19a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:09.268 UTC [policies] Evaluate -> DEBU 19a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:09.268 UTC [policies] Evaluate -> DEBU 19a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:09.269 UTC [policies] Evaluate -> DEBU 19a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:09.269 UTC [policies] Evaluate -> DEBU 19aa == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:09.269 UTC [cauthdsl] func1 -> DEBU 19ab 0xc000ffe6c0 gate 1569284829269642900 evaluation starts" +"2019-09-24 00:27:09.269 UTC [cauthdsl] func2 -> DEBU 19ac 0xc000ffe6c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:09.270 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000ffe6c0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:09.270 UTC [cauthdsl] func2 -> DEBU 19ae 0xc000ffe6c0 principal matched by identity 0" +"2019-09-24 00:27:09.271 UTC [msp.identity] Verify -> DEBU 19af Verify: digest = 00000000 29 35 d3 b4 58 fc 62 b4 27 76 65 d4 47 c7 89 e9 |)5..X.b.'ve.G...| +00000010 54 3d 50 c5 5d 3b 74 ea 3e 81 bd 7e b8 bc f5 36 |T=P.];t.>..~...6|" +"2019-09-24 00:27:09.271 UTC [msp.identity] Verify -> DEBU 19b0 Verify: sig = 00000000 30 45 02 21 00 e7 65 a6 99 ea 94 da 88 34 ac da |0E.!..e......4..| +00000010 29 c2 a0 d0 61 5d 97 9a e9 5d 60 bb c6 43 53 a5 |)...a]...]`..CS.| +00000020 cd f9 c2 d1 1f 02 20 06 7e 5a 1f 6b 78 4a 6d 72 |...... .~Z.kxJmr| +00000030 72 11 0b fd 4b 1f 57 61 7e 65 c1 20 e3 b0 ec 4d |r...K.Wa~e. ...M| +00000040 6d c7 2a af 8b c3 1a |m.*....|" +"2019-09-24 00:27:09.272 UTC [cauthdsl] func2 -> DEBU 19b1 0xc000ffe6c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:09.272 UTC [cauthdsl] func1 -> DEBU 19b2 0xc000ffe6c0 gate 1569284829269642900 evaluation succeeds" +"2019-09-24 00:27:09.272 UTC [policies] Evaluate -> DEBU 19b3 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:09.273 UTC [policies] Evaluate -> DEBU 19b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:09.273 UTC [policies] Evaluate -> DEBU 19b5 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:09.273 UTC [policies] Evaluate -> DEBU 19b6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:09.274 UTC [policies] Evaluate -> DEBU 19b7 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:09.274 UTC [policies] Evaluate -> DEBU 19b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:09.274 UTC [common.deliver] deliverBlocks -> DEBU 19b9 [channel: testchainid] Received seekInfo (0xc000231d80) start: > stop: > from 172.18.0.9:32908" +"2019-09-24 00:27:09.275 UTC [fsblkstorage] Next -> DEBU 19ba Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 00:27:09.275 UTC [fsblkstorage] newBlockfileStream -> DEBU 19bb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-09-24 00:27:09.276 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bc Remaining bytes=[25835], Going to peek [8] bytes" +"2019-09-24 00:27:09.276 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bd Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-09-24 00:27:09.277 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19be blockbytes [25832] read from file [0]" +"2019-09-24 00:27:09.277 UTC [common.deliver] deliverBlocks -> DEBU 19bf [channel: testchainid] Delivering block for (0xc000231d80) for 172.18.0.9:32908" +"2019-09-24 00:27:09.277 UTC [common.deliver] deliverBlocks -> DEBU 19c0 [channel: testchainid] Done delivering to 172.18.0.9:32908 for (0xc000231d80)" +"2019-09-24 00:27:09.278 UTC [common.deliver] Handle -> DEBU 19c1 Waiting for new SeekInfo from 172.18.0.9:32908" +"2019-09-24 00:27:09.278 UTC [common.deliver] Handle -> DEBU 19c2 Attempting to read seek info message from 172.18.0.9:32908" +"2019-09-24 00:27:09.280 UTC [policies] Evaluate -> DEBU 19c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:09.280 UTC [policies] Evaluate -> DEBU 19c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:09.280 UTC [policies] Evaluate -> DEBU 19c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:09.281 UTC [policies] Evaluate -> DEBU 19c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:09.281 UTC [policies] Evaluate -> DEBU 19c7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:09.281 UTC [cauthdsl] func1 -> DEBU 19c8 0xc000da4f10 gate 1569284829281383000 evaluation starts" +"2019-09-24 00:27:09.281 UTC [cauthdsl] func2 -> DEBU 19c9 0xc000da4f10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:09.281 UTC [cauthdsl] func2 -> DEBU 19ca 0xc000da4f10 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:09.281 UTC [cauthdsl] func2 -> DEBU 19cb 0xc000da4f10 principal matched by identity 0" +"2019-09-24 00:27:09.281 UTC [msp.identity] Verify -> DEBU 19cc Verify: digest = 00000000 40 77 60 2c 68 89 b8 3f 14 c8 4b 29 35 54 10 ca |@w`,h..?..K)5T..| +00000010 20 ed 45 e0 97 d0 df a9 d4 d1 99 5c 86 0a 62 a6 | .E........\..b.|" +"2019-09-24 00:27:09.281 UTC [msp.identity] Verify -> DEBU 19cd Verify: sig = 00000000 30 45 02 21 00 91 1e 4f e7 83 f6 ba f8 ca 9b 38 |0E.!...O.......8| +00000010 e5 05 dc be 4e ac 5d 69 2c 01 60 68 0b e2 36 4d |....N.]i,.`h..6M| +00000020 25 13 c2 86 a5 02 20 17 86 76 1e 99 07 70 1d f5 |%..... ..v...p..| +00000030 d7 f7 12 d7 6a 64 52 60 5f bb d7 55 ba 79 ba 0f |....jdR`_..U.y..| +00000040 82 fe 56 43 64 cf 79 |..VCd.y|" +"2019-09-24 00:27:09.282 UTC [cauthdsl] func2 -> DEBU 19ce 0xc000da4f10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:09.282 UTC [cauthdsl] func1 -> DEBU 19cf 0xc000da4f10 gate 1569284829281383000 evaluation succeeds" +"2019-09-24 00:27:09.282 UTC [policies] Evaluate -> DEBU 19d0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:09.282 UTC [policies] Evaluate -> DEBU 19d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:09.282 UTC [policies] Evaluate -> DEBU 19d2 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:09.282 UTC [policies] Evaluate -> DEBU 19d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:09.283 UTC [policies] Evaluate -> DEBU 19d4 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:09.283 UTC [policies] Evaluate -> DEBU 19d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:09.283 UTC [common.deliver] deliverBlocks -> DEBU 19d6 [channel: testchainid] Received seekInfo (0xc000ac5c00) start: > stop: > from 172.18.0.9:32908" +"2019-09-24 00:27:09.283 UTC [fsblkstorage] Next -> DEBU 19d7 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 00:27:09.283 UTC [fsblkstorage] newBlockfileStream -> DEBU 19d8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 00:27:09.283 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d9 Remaining bytes=[44254], Going to peek [8] bytes" +"2019-09-24 00:27:09.283 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19da Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:27:09.283 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19db blockbytes [18416] read from file [0]" +"2019-09-24 00:27:09.284 UTC [common.deliver] deliverBlocks -> DEBU 19dc [channel: testchainid] Delivering block for (0xc000ac5c00) for 172.18.0.9:32908" +"2019-09-24 00:27:09.284 UTC [common.deliver] deliverBlocks -> DEBU 19dd [channel: testchainid] Done delivering to 172.18.0.9:32908 for (0xc000ac5c00)" +"2019-09-24 00:27:09.284 UTC [common.deliver] Handle -> DEBU 19de Waiting for new SeekInfo from 172.18.0.9:32908" +"2019-09-24 00:27:09.284 UTC [common.deliver] Handle -> DEBU 19df Attempting to read seek info message from 172.18.0.9:32908" +"2019-09-24 00:27:09.292 UTC [grpc] infof -> DEBU 19e0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:09.292 UTC [common.deliver] Handle -> WARN 19e1 Error reading from 172.18.0.9:32908: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:09.294 UTC [orderer.common.server] func1 -> DEBU 19e2 Closing Deliver stream" +"2019-09-24 00:27:09.294 UTC [comm.grpc.server] 1 -> INFO 19e3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32908 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.0157ms +"2019-09-24 00:27:09.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e4 Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +"2019-09-24 00:27:09.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e5 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +"2019-09-24 00:27:09.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.4µs " +"2019-09-24 00:27:09.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.9µs " +"2019-09-24 00:27:09.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:09.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:09.414 UTC [orderer.common.server] Deliver -> DEBU 19ea Starting new Deliver handler" +"2019-09-24 00:27:09.414 UTC [common.deliver] Handle -> DEBU 19eb Starting new deliver loop for 172.18.0.9:32910" +"2019-09-24 00:27:09.414 UTC [common.deliver] Handle -> DEBU 19ec Attempting to read seek info message from 172.18.0.9:32910" +"2019-09-24 00:27:09.415 UTC [policies] Evaluate -> DEBU 19ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:09.415 UTC [policies] Evaluate -> DEBU 19ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:09.415 UTC [policies] Evaluate -> DEBU 19ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:09.415 UTC [policies] Evaluate -> DEBU 19f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:09.415 UTC [policies] Evaluate -> DEBU 19f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:09.415 UTC [cauthdsl] func1 -> DEBU 19f2 0xc0011c3030 gate 1569284829415340000 evaluation starts" +"2019-09-24 00:27:09.415 UTC [cauthdsl] func2 -> DEBU 19f3 0xc0011c3030 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:09.415 UTC [cauthdsl] func2 -> DEBU 19f4 0xc0011c3030 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:09.415 UTC [cauthdsl] func2 -> DEBU 19f5 0xc0011c3030 principal matched by identity 0" +"2019-09-24 00:27:09.415 UTC [msp.identity] Verify -> DEBU 19f6 Verify: digest = 00000000 5a 25 5f 07 c7 7c 04 8f 47 9c 07 06 3a ad 7b 81 |Z%_..|..G...:.{.| +00000010 ba bd 5f a3 30 26 0a 86 fe 90 60 3e 67 b9 fb a3 |.._.0&....`>g...|" +"2019-09-24 00:27:09.415 UTC [msp.identity] Verify -> DEBU 19f7 Verify: sig = 00000000 30 44 02 20 2d 5d 81 55 ae 80 8d 3a 18 50 0b e5 |0D. -].U...:.P..| +00000010 14 b6 b6 78 30 7c 3a 9b a2 83 d0 ea 14 dc 59 c1 |...x0|:.......Y.| +00000020 29 c0 1f ee 02 20 26 4f f0 d0 24 19 a6 aa 5e a4 |).... &O..$...^.| +00000030 96 43 00 c3 ab 4e 9c ac f1 ac d7 24 a1 39 83 a2 |.C...N.....$.9..| +00000040 17 b2 31 af 45 1d |..1.E.|" +"2019-09-24 00:27:09.416 UTC [cauthdsl] func2 -> DEBU 19f8 0xc0011c3030 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:09.416 UTC [cauthdsl] func1 -> DEBU 19f9 0xc0011c3030 gate 1569284829415340000 evaluation succeeds" +"2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19fc Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19fe Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:09.416 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:09.416 UTC [common.deliver] deliverBlocks -> DEBU 1a00 [channel: testchainid] Received seekInfo (0xc0001d2fc0) start: > stop: > from 172.18.0.9:32910" +"2019-09-24 00:27:09.416 UTC [fsblkstorage] Next -> DEBU 1a01 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 00:27:09.416 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a02 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 00:27:09.417 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a03 Remaining bytes=[44254], Going to peek [8] bytes" +"2019-09-24 00:27:09.418 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a04 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:27:09.418 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a05 blockbytes [18416] read from file [0]" +"2019-09-24 00:27:09.420 UTC [common.deliver] deliverBlocks -> DEBU 1a06 [channel: testchainid] Delivering block for (0xc0001d2fc0) for 172.18.0.9:32910" +"2019-09-24 00:27:09.420 UTC [common.deliver] deliverBlocks -> DEBU 1a07 [channel: testchainid] Done delivering to 172.18.0.9:32910 for (0xc0001d2fc0)" +"2019-09-24 00:27:09.420 UTC [common.deliver] Handle -> DEBU 1a08 Waiting for new SeekInfo from 172.18.0.9:32910" +"2019-09-24 00:27:09.420 UTC [common.deliver] Handle -> DEBU 1a09 Attempting to read seek info message from 172.18.0.9:32910" +"2019-09-24 00:27:09.435 UTC [grpc] infof -> DEBU 1a0a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:09.436 UTC [common.deliver] Handle -> WARN 1a0b Error reading from 172.18.0.9:32910: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:09.436 UTC [orderer.common.server] func1 -> DEBU 1a0c Closing Deliver stream" +"2019-09-24 00:27:09.436 UTC [comm.grpc.server] 1 -> INFO 1a0d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32910 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.4979ms +"2019-09-24 00:27:09.535 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a0e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:09.535 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a0f Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2019-09-24 00:27:09.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.4µs " +"2019-09-24 00:27:09.584 UTC [orderer.common.server] Deliver -> DEBU 1a11 Starting new Deliver handler" +"2019-09-24 00:27:09.584 UTC [common.deliver] Handle -> DEBU 1a12 Starting new deliver loop for 172.18.0.9:32912" +"2019-09-24 00:27:09.584 UTC [common.deliver] Handle -> DEBU 1a13 Attempting to read seek info message from 172.18.0.9:32912" +"2019-09-24 00:27:09.584 UTC [policies] Evaluate -> DEBU 1a14 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:09.584 UTC [policies] Evaluate -> DEBU 1a15 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:09.584 UTC [policies] Evaluate -> DEBU 1a16 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:09.584 UTC [policies] Evaluate -> DEBU 1a17 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:09.584 UTC [policies] Evaluate -> DEBU 1a18 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:09.585 UTC [cauthdsl] func1 -> DEBU 1a19 0xc000c7d280 gate 1569284829585040100 evaluation starts" +"2019-09-24 00:27:09.585 UTC [cauthdsl] func2 -> DEBU 1a1a 0xc000c7d280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:09.585 UTC [cauthdsl] func2 -> DEBU 1a1b 0xc000c7d280 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:09.585 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc000c7d280 principal matched by identity 0" +"2019-09-24 00:27:09.585 UTC [msp.identity] Verify -> DEBU 1a1d Verify: digest = 00000000 f4 b4 a7 fd 53 4e 52 4a 24 c0 fb 7f f9 f5 93 43 |....SNRJ$......C| +00000010 f0 04 a9 89 8a ff 2f 2e 63 a7 33 ea f2 ac 73 d3 |....../.c.3...s.|" +"2019-09-24 00:27:09.585 UTC [msp.identity] Verify -> DEBU 1a1e Verify: sig = 00000000 30 45 02 21 00 fa 17 de 6e 79 62 00 90 be 2c f9 |0E.!....nyb...,.| +00000010 10 54 6b 59 15 05 89 0c 6e 4b 5a 0e db 1f 0c d9 |.TkY....nKZ.....| +00000020 1f 3a ea 57 26 02 20 59 50 99 4b 65 7a 60 ec a8 |.:.W&. YP.Kez`..| +00000030 f1 6e 6b 47 27 f2 cc 00 04 d4 7e fd 0a b1 78 76 |.nkG'.....~...xv| +00000040 c2 da 6e 62 c7 7d 8e |..nb.}.|" +"2019-09-24 00:27:09.585 UTC [cauthdsl] func2 -> DEBU 1a1f 0xc000c7d280 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:09.585 UTC [cauthdsl] func1 -> DEBU 1a20 0xc000c7d280 gate 1569284829585040100 evaluation succeeds" +"2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a21 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a22 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a23 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a24 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a25 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:09.585 UTC [policies] Evaluate -> DEBU 1a26 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:09.585 UTC [common.deliver] deliverBlocks -> DEBU 1a27 [channel: testchainid] Received seekInfo (0xc000ac4340) start: > stop: > from 172.18.0.9:32912" +"2019-09-24 00:27:09.586 UTC [fsblkstorage] Next -> DEBU 1a28 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 00:27:09.586 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a29 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-09-24 00:27:09.586 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a2a Remaining bytes=[25835], Going to peek [8] bytes" +"2019-09-24 00:27:09.586 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a2b Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-09-24 00:27:09.586 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a2c blockbytes [25832] read from file [0]" +"2019-09-24 00:27:09.586 UTC [common.deliver] deliverBlocks -> DEBU 1a2d [channel: testchainid] Delivering block for (0xc000ac4340) for 172.18.0.9:32912" +"2019-09-24 00:27:09.586 UTC [common.deliver] deliverBlocks -> DEBU 1a2e [channel: testchainid] Done delivering to 172.18.0.9:32912 for (0xc000ac4340)" +"2019-09-24 00:27:09.586 UTC [common.deliver] Handle -> DEBU 1a2f Waiting for new SeekInfo from 172.18.0.9:32912" +"2019-09-24 00:27:09.586 UTC [common.deliver] Handle -> DEBU 1a30 Attempting to read seek info message from 172.18.0.9:32912" +"2019-09-24 00:27:09.597 UTC [common.deliver] Handle -> WARN 1a31 Error reading from 172.18.0.9:32912: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:09.597 UTC [orderer.common.server] func1 -> DEBU 1a32 Closing Deliver stream" +"2019-09-24 00:27:09.598 UTC [comm.grpc.server] 1 -> INFO 1a33 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32912 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8207ms +"2019-09-24 00:27:09.602 UTC [grpc] infof -> DEBU 1a34 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:09.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a35 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2019-09-24 00:27:09.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a36 Sending msg of 28 bytes to 3 on channel businesschannel took 38.2µs" +"2019-09-24 00:27:09.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234.9µs " +"2019-09-24 00:27:09.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 499.7µs " +"2019-09-24 00:27:09.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a39 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:09.850 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:10.035 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:10.035 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3c Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2019-09-24 00:27:10.035 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.2µs " +"2019-09-24 00:27:10.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3e Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2019-09-24 00:27:10.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3f Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2019-09-24 00:27:10.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.1µs " +"2019-09-24 00:27:10.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.4µs " +"2019-09-24 00:27:10.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a42 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:10.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a43 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:10.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a44 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:10.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a45 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-09-24 00:27:10.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54µs " +"2019-09-24 00:27:10.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a47 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2019-09-24 00:27:10.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a48 Sending msg of 28 bytes to 3 on channel businesschannel took 66.4µs" +"2019-09-24 00:27:10.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.9µs " +"2019-09-24 00:27:10.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.9µs " +"2019-09-24 00:27:10.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a4b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:10.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a4c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:11.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a4d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:11.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a4e Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +"2019-09-24 00:27:11.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.8µs " +"2019-09-24 00:27:11.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a50 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +"2019-09-24 00:27:11.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a51 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +"2019-09-24 00:27:11.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.6µs " +"2019-09-24 00:27:11.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.5µs " +"2019-09-24 00:27:11.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a54 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:11.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a55 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:11.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a56 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:11.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a57 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +"2019-09-24 00:27:11.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165µs " +"2019-09-24 00:27:11.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a59 Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +"2019-09-24 00:27:11.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a5a Sending msg of 28 bytes to 3 on channel businesschannel took 8.2µs" +"2019-09-24 00:27:11.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " +"2019-09-24 00:27:11.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 343µs " +"2019-09-24 00:27:11.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a5d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:11.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a5e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:12.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a5f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:12.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a60 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2019-09-24 00:27:12.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.9µs " +"2019-09-24 00:27:12.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a62 Sending msg of 28 bytes to 2 on channel businesschannel took 142.3µs" +"2019-09-24 00:27:12.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a63 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2019-09-24 00:27:12.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.5µs " +"2019-09-24 00:27:12.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 305.2µs " +"2019-09-24 00:27:12.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a66 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:12.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a67 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:12.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a68 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:12.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a69 Sending msg of 28 bytes to 3 on channel testchainid took 77.6µs" +"2019-09-24 00:27:12.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.2µs " +"2019-09-24 00:27:12.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6b Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +"2019-09-24 00:27:12.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a6c Sending msg of 28 bytes to 3 on channel businesschannel took 9.1µs" +"2019-09-24 00:27:12.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.6µs " +"2019-09-24 00:27:12.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.5µs " +"2019-09-24 00:27:12.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a6f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:12.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a70 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:13.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a71 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:13.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a72 Sending msg of 28 bytes to 3 on channel testchainid took 130.5µs" +"2019-09-24 00:27:13.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.9µs " +"2019-09-24 00:27:13.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a74 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +"2019-09-24 00:27:13.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a75 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +"2019-09-24 00:27:13.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.3µs " +"2019-09-24 00:27:13.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.5µs " +"2019-09-24 00:27:13.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a78 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:13.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a79 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:13.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a7a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:13.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a7b Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +"2019-09-24 00:27:13.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.1µs " +"2019-09-24 00:27:13.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a7d Sending msg of 28 bytes to 3 on channel businesschannel took 42.3µs" +"2019-09-24 00:27:13.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a7e Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +"2019-09-24 00:27:13.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102µs " +"2019-09-24 00:27:13.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.1µs " +"2019-09-24 00:27:13.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a81 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:13.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a82 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:13.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a83 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:13.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a84 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2019-09-24 00:27:14.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.6µs " +"2019-09-24 00:27:14.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a86 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2019-09-24 00:27:14.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a87 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2019-09-24 00:27:14.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.1µs " +"2019-09-24 00:27:14.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.3µs " +"2019-09-24 00:27:14.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a8a Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:14.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a8b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:14.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a8c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:14.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8d Sending msg of 28 bytes to 3 on channel testchainid took 51.1µs" +"2019-09-24 00:27:14.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a8e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs " +"2019-09-24 00:27:14.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8f Sending msg of 28 bytes to 2 on channel businesschannel took 52.6µs" +"2019-09-24 00:27:14.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a90 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +"2019-09-24 00:27:14.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.6µs " +"2019-09-24 00:27:14.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.9µs " +"2019-09-24 00:27:14.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a93 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:14.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a94 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:15.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a95 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:15.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a96 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +"2019-09-24 00:27:15.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.7µs " +"2019-09-24 00:27:15.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a99 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +"2019-09-24 00:27:15.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a9a Sending msg of 28 bytes to 2 on channel businesschannel took 9.4µs" +"2019-09-24 00:27:15.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.7µs " +"2019-09-24 00:27:15.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +"2019-09-24 00:27:15.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:15.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:15.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:15.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a9f Sending msg of 28 bytes to 3 on channel testchainid took 86.2µs" +"2019-09-24 00:27:15.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58µs " +"2019-09-24 00:27:15.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa1 Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +"2019-09-24 00:27:15.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa2 Sending msg of 28 bytes to 2 on channel businesschannel took 11.8µs" +"2019-09-24 00:27:15.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.2µs " +"2019-09-24 00:27:15.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.4µs " +"2019-09-24 00:27:15.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:15.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa6 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:16.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:16.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa8 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +"2019-09-24 00:27:16.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.7µs " +"2019-09-24 00:27:16.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aaa Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +"2019-09-24 00:27:16.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aab Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +"2019-09-24 00:27:16.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 547.5µs " +"2019-09-24 00:27:16.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aad Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:16.316 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 513.4µs " +"2019-09-24 00:27:16.318 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aaf Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:16.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:16.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ab1 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +"2019-09-24 00:27:16.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 725.6µs " +"2019-09-24 00:27:16.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ab3 Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +"2019-09-24 00:27:16.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.9µs " +"2019-09-24 00:27:16.815 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.9µs " +"2019-09-24 00:27:16.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:16.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ab7 Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +"2019-09-24 00:27:16.817 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:17.013 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:17.013 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aba Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +"2019-09-24 00:27:17.013 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1abb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.3µs " +"2019-09-24 00:27:17.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1abc Sending msg of 28 bytes to 2 on channel businesschannel took 27.2µs" +"2019-09-24 00:27:17.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1abd Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2019-09-24 00:27:17.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1abe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.8µs " +"2019-09-24 00:27:17.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1abf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.1µs " +"2019-09-24 00:27:17.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ac0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:17.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ac1 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:17.499 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ac2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:17.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ac3 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-09-24 00:27:17.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ac4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " +"2019-09-24 00:27:17.816 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ac5 Sending msg of 28 bytes to 2 on channel businesschannel took 1.6301ms" +"2019-09-24 00:27:17.816 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ac6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +"2019-09-24 00:27:17.817 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ac7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 302.1µs " +"2019-09-24 00:27:17.817 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ac8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.5µs " +"2019-09-24 00:27:17.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ac9 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:17.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aca Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:17.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1acb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:18.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1acc Sending msg of 28 bytes to 3 on channel testchainid took 40.7µs" +"2019-09-24 00:27:18.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1acd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.3µs " +"2019-09-24 00:27:18.317 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ace Sending msg of 28 bytes to 3 on channel businesschannel took 29.5µs" +"2019-09-24 00:27:18.317 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1acf Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +"2019-09-24 00:27:18.318 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ad0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98µs " +"2019-09-24 00:27:18.318 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ad1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.6µs " +"2019-09-24 00:27:18.319 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ad2 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:18.319 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ad3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:18.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ad4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:18.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ad5 Sending msg of 28 bytes to 3 on channel testchainid took 18µs" +"2019-09-24 00:27:18.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ad6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.6µs " +"2019-09-24 00:27:18.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ad7 Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" +"2019-09-24 00:27:18.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ad8 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2019-09-24 00:27:18.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ad9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.6µs " +"2019-09-24 00:27:18.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ada Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.4µs " +"2019-09-24 00:27:18.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1adb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:18.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1adc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:19.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1add Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:19.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ade Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2019-09-24 00:27:19.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1adf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.8µs " +"2019-09-24 00:27:19.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ae0 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2019-09-24 00:27:19.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ae1 Sending msg of 28 bytes to 2 on channel businesschannel took 13.1µs" +"2019-09-24 00:27:19.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ae2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 347.9µs " +"2019-09-24 00:27:19.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ae3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.6µs " +"2019-09-24 00:27:19.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae4 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:19.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:19.354 UTC [orderer.common.server] Deliver -> DEBU 1ae6 Starting new Deliver handler" +"2019-09-24 00:27:19.354 UTC [common.deliver] Handle -> DEBU 1ae7 Starting new deliver loop for 172.18.0.9:32914" +"2019-09-24 00:27:19.354 UTC [common.deliver] Handle -> DEBU 1ae8 Attempting to read seek info message from 172.18.0.9:32914" +"2019-09-24 00:27:19.364 UTC [orderer.common.server] Broadcast -> DEBU 1ae9 Starting new Broadcast handler" +"2019-09-24 00:27:19.364 UTC [orderer.common.broadcast] Handle -> DEBU 1aea Starting new broadcast loop for 172.18.0.9:32916" +"2019-09-24 00:27:19.365 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1aeb [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:32916" +"2019-09-24 00:27:19.365 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1aec Processing config update message for channel businesschannel" +"2019-09-24 00:27:19.365 UTC [policies] Evaluate -> DEBU 1aed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 00:27:19.365 UTC [policies] Evaluate -> DEBU 1aee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.365 UTC [policies] Evaluate -> DEBU 1aef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:27:19.365 UTC [policies] Evaluate -> DEBU 1af0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.365 UTC [policies] Evaluate -> DEBU 1af1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:27:19.365 UTC [cauthdsl] func1 -> DEBU 1af2 0xc000b55210 gate 1569284839365789800 evaluation starts" +"2019-09-24 00:27:19.365 UTC [cauthdsl] func2 -> DEBU 1af3 0xc000b55210 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.365 UTC [cauthdsl] func2 -> DEBU 1af4 0xc000b55210 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:19.365 UTC [cauthdsl] func2 -> DEBU 1af5 0xc000b55210 principal matched by identity 0" +"2019-09-24 00:27:19.366 UTC [msp.identity] Verify -> DEBU 1af6 Verify: digest = 00000000 32 dc 61 be 75 20 6f 4b 63 be 3f 2e b3 9a a0 e1 |2.a.u oKc.?.....| +00000010 43 c9 04 95 04 db 65 4f 3a 11 aa ca d9 c3 ed e7 |C.....eO:.......|" +"2019-09-24 00:27:19.366 UTC [msp.identity] Verify -> DEBU 1af7 Verify: sig = 00000000 30 45 02 21 00 aa 47 b6 5e db fe b3 b3 5a b7 50 |0E.!..G.^....Z.P| +00000010 31 e9 ff c6 7c 57 e2 06 5c b9 e5 c9 d9 55 dc 16 |1...|W..\....U..| +00000020 66 14 a4 36 d0 02 20 4b 8e f4 46 3c 3e d2 50 67 |f..6.. K..F<>.Pg| +00000030 c4 0b b9 d1 f9 2e b2 3b 51 0d 95 37 f5 86 63 a9 |.......;Q..7..c.| +00000040 b5 ff 8f a9 ea 68 ae |.....h.|" +"2019-09-24 00:27:19.366 UTC [cauthdsl] func2 -> DEBU 1af8 0xc000b55210 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.366 UTC [cauthdsl] func1 -> DEBU 1af9 0xc000b55210 gate 1569284839365789800 evaluation succeeds" +"2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1afa Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1afb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1afc Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1afd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1afe Signature set satisfies policy /Channel/Writers" +"2019-09-24 00:27:19.366 UTC [policies] Evaluate -> DEBU 1aff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 00:27:19.366 UTC [common.configtx] addToMap -> DEBU 1b00 Adding to config map: [Group] /Channel" +"2019-09-24 00:27:19.366 UTC [common.configtx] addToMap -> DEBU 1b01 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:27:19.366 UTC [common.configtx] addToMap -> DEBU 1b02 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:27:19.366 UTC [common.configtx] addToMap -> DEBU 1b03 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b04 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b05 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b06 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b07 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b08 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b09 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b0a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b0b Adding to config map: [Group] /Channel" +"2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b0c Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:27:19.367 UTC [common.configtx] addToMap -> DEBU 1b0d Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b0e Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b0f Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b10 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b11 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b12 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b13 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b14 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b15 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b16 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b17 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b18 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b19 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b1a Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:27:19.368 UTC [common.configtx] addToMap -> DEBU 1b1b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:27:19.368 UTC [common.configtx] verifyDeltaSet -> DEBU 1b1c Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 00:27:19.368 UTC [common.configtx] verifyDeltaSet -> DEBU 1b1d Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 00:27:19.369 UTC [common.configtx] verifyDeltaSet -> DEBU 1b1e Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:19.369 UTC [common.configtx] verifyDeltaSet -> DEBU 1b1f Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 00:27:19.369 UTC [common.configtx] verifyDeltaSet -> DEBU 1b20 Processing change to key: [Group] /Channel/Application" +"2019-09-24 00:27:19.369 UTC [common.configtx] policyForItem -> DEBU 1b21 Getting policy for item Application with mod_policy Admins" +"2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b22 Manager Channel looking up path []" +"2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b23 Manager Channel has managers Application" +"2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b24 Manager Channel has managers Orderer" +"2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b25 Manager Channel looking up path [Application]" +"2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b26 Manager Channel has managers Application" +"2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b27 Manager Channel has managers Orderer" +"2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b28 Manager Channel/Application looking up path []" +"2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b29 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:27:19.369 UTC [policies] Manager -> DEBU 1b2a Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:27:19.369 UTC [policies] Evaluate -> DEBU 1b2b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-09-24 00:27:19.369 UTC [policies] Evaluate -> DEBU 1b2c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.369 UTC [policies] Evaluate -> DEBU 1b2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 00:27:19.369 UTC [cauthdsl] deduplicate -> WARN 1b2e De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-09-24 00:27:19.369 UTC [cauthdsl] func1 -> DEBU 1b2f 0xc000b1cde0 gate 1569284839369899400 evaluation starts" +"2019-09-24 00:27:19.370 UTC [cauthdsl] func2 -> DEBU 1b30 0xc000b1cde0 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 00:27:19.370 UTC [cauthdsl] func2 -> DEBU 1b31 0xc000b1cde0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:19.370 UTC [cauthdsl] func2 -> DEBU 1b32 0xc000b1cde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 00:27:19.371 UTC [cauthdsl] func2 -> DEBU 1b33 0xc000b1cde0 processing identity 1 with bytes of fd0d80" +"2019-09-24 00:27:19.371 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1b34 Checking if identity satisfies ADMIN role for Org2MSP" +"2019-09-24 00:27:19.371 UTC [cauthdsl] func2 -> DEBU 1b35 0xc000b1cde0 principal matched by identity 1" +"2019-09-24 00:27:19.371 UTC [msp.identity] Verify -> DEBU 1b36 Verify: digest = 00000000 b9 ca 25 b9 18 4b 4c cb f9 ed 69 2e e4 b0 01 32 |..%..KL...i....2| +00000010 7e d5 0e 8f db 9c d1 12 47 66 47 e2 f9 42 f2 92 |~.......GfG..B..|" +"2019-09-24 00:27:19.371 UTC [msp.identity] Verify -> DEBU 1b37 Verify: sig = 00000000 30 44 02 20 6f 93 cb 0e 30 b4 01 2a 3e 5c 70 08 |0D. o...0..*>\p.| +00000010 f4 b3 a7 c6 8d d3 d2 16 33 9b 93 be 91 8a 0e 0a |........3.......| +00000020 14 03 96 82 02 20 25 f6 18 45 c0 ea 93 0a be f5 |..... %..E......| +00000030 1d 09 80 60 65 19 94 68 46 86 00 e0 07 4b 6c 2e |...`e..hF....Kl.| +00000040 99 b4 f8 c0 85 d3 |......|" +"2019-09-24 00:27:19.371 UTC [cauthdsl] func2 -> DEBU 1b38 0xc000b1cde0 principal evaluation succeeds for identity 1" +"2019-09-24 00:27:19.371 UTC [cauthdsl] func1 -> DEBU 1b39 0xc000b1cde0 gate 1569284839369899400 evaluation succeeds" +"2019-09-24 00:27:19.371 UTC [policies] Evaluate -> DEBU 1b3a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:27:19.371 UTC [policies] Evaluate -> DEBU 1b3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:27:19.371 UTC [policies] Evaluate -> DEBU 1b3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 00:27:19.371 UTC [cauthdsl] deduplicate -> WARN 1b3d De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-09-24 00:27:19.371 UTC [cauthdsl] func1 -> DEBU 1b3e 0xc000b1d740 gate 1569284839371938900 evaluation starts" +"2019-09-24 00:27:19.372 UTC [cauthdsl] func2 -> DEBU 1b3f 0xc000b1d740 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 00:27:19.372 UTC [cauthdsl] func2 -> DEBU 1b40 0xc000b1d740 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:19.372 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1b41 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-09-24 00:27:19.372 UTC [cauthdsl] func2 -> DEBU 1b42 0xc000b1d740 principal matched by identity 0" +"2019-09-24 00:27:19.372 UTC [msp.identity] Verify -> DEBU 1b43 Verify: digest = 00000000 48 77 a9 76 ae c6 d0 00 08 e1 87 61 5a 35 3b 84 |Hw.v.......aZ5;.| +00000010 16 95 5c 0b c0 a8 fc c1 cf 92 2d eb 73 05 3b 4a |..\.......-.s.;J|" +"2019-09-24 00:27:19.372 UTC [msp.identity] Verify -> DEBU 1b44 Verify: sig = 00000000 30 44 02 20 4c 82 9e d8 a1 76 a3 a3 75 1d 20 c9 |0D. L....v..u. .| +00000010 3e 86 10 3b d1 1d 25 b5 e5 d4 bc e4 42 6b 38 bd |>..;..%.....Bk8.| +00000020 f6 ad d6 81 02 20 68 bc f4 5b 2d ee d1 96 32 c3 |..... h..[-...2.| +00000030 97 14 67 8c 23 1e 47 0f c7 05 3b 29 c9 13 7b 07 |..g.#.G...;)..{.| +00000040 8f a7 92 fd d1 08 |......|" +"2019-09-24 00:27:19.372 UTC [cauthdsl] func2 -> DEBU 1b45 0xc000b1d740 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.372 UTC [cauthdsl] func1 -> DEBU 1b46 0xc000b1d740 gate 1569284839371938900 evaluation succeeds" +"2019-09-24 00:27:19.372 UTC [policies] Evaluate -> DEBU 1b47 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:27:19.372 UTC [policies] Evaluate -> DEBU 1b48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:27:19.372 UTC [policies] Evaluate -> DEBU 1b49 Signature set satisfies policy /Channel/Application/Admins" +"2019-09-24 00:27:19.372 UTC [policies] Evaluate -> DEBU 1b4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-09-24 00:27:19.372 UTC [common.configtx] verifyDeltaSet -> DEBU 1b4b Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-09-24 00:27:19.373 UTC [common.configtx] verifyDeltaSet -> DEBU 1b4c Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b4d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b4e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b4f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b50 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b51 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b52 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b53 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.373 UTC [common.configtx] recurseConfigMap -> DEBU 1b54 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b55 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b56 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b57 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b58 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b59 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5a Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b5f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b60 Setting policy for key Admins to " +"2019-09-24 00:27:19.374 UTC [common.configtx] recurseConfigMap -> DEBU 1b61 Setting policy for key Endorsement to " +"2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b62 Setting policy for key LifecycleEndorsement to " +"2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b63 Setting policy for key Readers to " +"2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b64 Setting policy for key Writers to " +"2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b65 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b66 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.375 UTC [common.configtx] recurseConfigMap -> DEBU 1b67 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.375 UTC [common.channelconfig] NewStandardValues -> DEBU 1b68 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b69 Processing field: HashingAlgorithm" +"2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b6a Processing field: BlockDataHashingStructure" +"2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b6b Processing field: OrdererAddresses" +"2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b6c Processing field: Consortium" +"2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b6d Processing field: Capabilities" +"2019-09-24 00:27:19.375 UTC [common.channelconfig] NewStandardValues -> DEBU 1b6e Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b6f Processing field: ConsensusType" +"2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b70 Processing field: BatchSize" +"2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b71 Processing field: BatchTimeout" +"2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b72 Processing field: KafkaBrokers" +"2019-09-24 00:27:19.375 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b73 Processing field: ChannelRestrictions" +"2019-09-24 00:27:19.376 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b74 Processing field: Capabilities" +"2019-09-24 00:27:19.376 UTC [common.channelconfig] NewStandardValues -> DEBU 1b75 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:27:19.376 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b76 Processing field: Endpoints" +"2019-09-24 00:27:19.376 UTC [common.channelconfig] NewStandardValues -> DEBU 1b77 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.376 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b78 Processing field: MSP" +"2019-09-24 00:27:19.376 UTC [common.channelconfig] validateMSP -> DEBU 1b79 Setting up MSP for org OrdererOrg" +"2019-09-24 00:27:19.376 UTC [msp] newBccspMsp -> DEBU 1b7a Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.376 UTC [msp] New -> DEBU 1b7b Creating Cache-MSP instance" +"2019-09-24 00:27:19.376 UTC [msp] Setup -> DEBU 1b7c Setting up MSP instance OrdererMSP" +"2019-09-24 00:27:19.376 UTC [msp.identity] newIdentity -> DEBU 1b7d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.377 UTC [msp.identity] newIdentity -> DEBU 1b7e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.377 UTC [msp] Validate -> DEBU 1b7f MSP OrdererMSP validating identity" +"2019-09-24 00:27:19.377 UTC [common.channelconfig] NewStandardValues -> DEBU 1b80 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:27:19.377 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b81 Processing field: ACLs" +"2019-09-24 00:27:19.377 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b82 Processing field: Capabilities" +"2019-09-24 00:27:19.377 UTC [common.channelconfig] NewStandardValues -> DEBU 1b83 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.377 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b84 Processing field: AnchorPeers" +"2019-09-24 00:27:19.377 UTC [common.channelconfig] NewStandardValues -> DEBU 1b85 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.377 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b86 Processing field: MSP" +"2019-09-24 00:27:19.378 UTC [common.channelconfig] Validate -> DEBU 1b87 Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:27:19.378 UTC [common.channelconfig] validateMSP -> DEBU 1b88 Setting up MSP for org Org1MSP" +"2019-09-24 00:27:19.378 UTC [msp] newBccspMsp -> DEBU 1b89 Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.378 UTC [msp] New -> DEBU 1b8a Creating Cache-MSP instance" +"2019-09-24 00:27:19.378 UTC [msp] Setup -> DEBU 1b8b Setting up MSP instance Org1MSP" +"2019-09-24 00:27:19.378 UTC [msp.identity] newIdentity -> DEBU 1b8c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.378 UTC [msp.identity] newIdentity -> DEBU 1b8d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.379 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1b8e Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:27:19.379 UTC [msp] Validate -> DEBU 1b8f MSP Org1MSP validating identity" +"2019-09-24 00:27:19.379 UTC [msp] getCertificationChain -> DEBU 1b90 MSP Org1MSP getting certification chain" +"2019-09-24 00:27:19.379 UTC [msp] hasOURole -> DEBU 1b91 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:27:19.379 UTC [msp] getCertificationChain -> DEBU 1b92 MSP Org1MSP getting certification chain" +"2019-09-24 00:27:19.379 UTC [common.channelconfig] NewStandardValues -> DEBU 1b93 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.380 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b94 Processing field: AnchorPeers" +"2019-09-24 00:27:19.380 UTC [common.channelconfig] NewStandardValues -> DEBU 1b95 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.380 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1b96 Processing field: MSP" +"2019-09-24 00:27:19.380 UTC [common.channelconfig] Validate -> DEBU 1b97 Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 00:27:19.380 UTC [common.channelconfig] validateMSP -> DEBU 1b98 Setting up MSP for org Org2MSP" +"2019-09-24 00:27:19.380 UTC [msp] newBccspMsp -> DEBU 1b99 Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.380 UTC [msp] New -> DEBU 1b9a Creating Cache-MSP instance" +"2019-09-24 00:27:19.380 UTC [msp] Setup -> DEBU 1b9b Setting up MSP instance Org2MSP" +"2019-09-24 00:27:19.380 UTC [msp.identity] newIdentity -> DEBU 1b9c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.381 UTC [msp.identity] newIdentity -> DEBU 1b9d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.381 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1b9e Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:27:19.381 UTC [msp] Validate -> DEBU 1b9f MSP Org2MSP validating identity" +"2019-09-24 00:27:19.382 UTC [msp] getCertificationChain -> DEBU 1ba0 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.382 UTC [msp] hasOURole -> DEBU 1ba1 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:27:19.382 UTC [msp] getCertificationChain -> DEBU 1ba2 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.382 UTC [common.channelconfig] NewStandardValues -> DEBU 1ba3 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.382 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ba4 Processing field: AnchorPeers" +"2019-09-24 00:27:19.382 UTC [common.channelconfig] NewStandardValues -> DEBU 1ba5 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.382 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ba6 Processing field: MSP" +"2019-09-24 00:27:19.382 UTC [common.channelconfig] Validate -> DEBU 1ba7 Anchor peers for org Org3MSP are " +"2019-09-24 00:27:19.383 UTC [common.channelconfig] validateMSP -> DEBU 1ba8 Setting up MSP for org Org3MSP" +"2019-09-24 00:27:19.383 UTC [msp] newBccspMsp -> DEBU 1ba9 Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.383 UTC [msp] New -> DEBU 1baa Creating Cache-MSP instance" +"2019-09-24 00:27:19.383 UTC [msp] Setup -> DEBU 1bab Setting up MSP instance Org3MSP" +"2019-09-24 00:27:19.383 UTC [msp.identity] newIdentity -> DEBU 1bac Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.383 UTC [msp.identity] newIdentity -> DEBU 1bad Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.384 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1bae Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-09-24 00:27:19.384 UTC [msp] Validate -> DEBU 1baf MSP Org3MSP validating identity" +"2019-09-24 00:27:19.384 UTC [msp] getCertificationChain -> DEBU 1bb0 MSP Org3MSP getting certification chain" +"2019-09-24 00:27:19.384 UTC [msp] hasOURole -> DEBU 1bb1 MSP Org3MSP checking if the identity is a client" +"2019-09-24 00:27:19.385 UTC [msp] getCertificationChain -> DEBU 1bb2 MSP Org3MSP getting certification chain" +"2019-09-24 00:27:19.385 UTC [msp] Setup -> DEBU 1bb3 Setting up the MSP manager (4 msps)" +"2019-09-24 00:27:19.385 UTC [msp] Setup -> DEBU 1bb4 MSP manager setup complete, setup 4 msps" +"2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bb5 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bb6 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bb7 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bb8 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bb9 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bba Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bbb Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bbc Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.385 UTC [policies] NewManagerImpl -> DEBU 1bbd Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bbe Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bbf Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc0 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc1 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc2 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc3 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc4 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc5 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc6 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc7 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc8 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bc9 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bca Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:27:19.386 UTC [policies] NewManagerImpl -> DEBU 1bcb Proposed new policy Readers for Channel/Application" +"2019-09-24 00:27:19.387 UTC [policies] NewManagerImpl -> DEBU 1bcc Proposed new policy Writers for Channel/Application" +"2019-09-24 00:27:19.387 UTC [policies] NewManagerImpl -> DEBU 1bcd Proposed new policy Writers for Channel" +"2019-09-24 00:27:19.387 UTC [policies] NewManagerImpl -> DEBU 1bce Proposed new policy Admins for Channel" +"2019-09-24 00:27:19.387 UTC [policies] NewManagerImpl -> DEBU 1bcf Proposed new policy Readers for Channel" +"2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd0 Adding to config map: [Group] /Channel" +"2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd1 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd3 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:19.387 UTC [common.configtx] addToMap -> DEBU 1bd7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bd8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bd9 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bda Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bdb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bdc Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bdd Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bde Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1bdf Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1be0 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1be1 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:27:19.388 UTC [common.configtx] addToMap -> DEBU 1be2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be3 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be8 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1be9 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1bea Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1beb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1bec Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:19.389 UTC [common.configtx] addToMap -> DEBU 1bed Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bee Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bef Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf0 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf4 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf5 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf6 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf7 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf8 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bf9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bfa Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bfb Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bfc Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bfd Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:27:19.390 UTC [common.configtx] addToMap -> DEBU 1bfe Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:27:19.391 UTC [common.configtx] addToMap -> DEBU 1bff Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:27:19.391 UTC [common.configtx] addToMap -> DEBU 1c00 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:27:19.391 UTC [common.configtx] addToMap -> DEBU 1c01 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:27:19.391 UTC [common.configtx] addToMap -> DEBU 1c02 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:27:19.391 UTC [common.configtx] addToMap -> DEBU 1c03 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c04 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c05 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c06 Manager Channel looking up path [Application]" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c07 Manager Channel has managers Orderer" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c08 Manager Channel has managers Application" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c09 Manager Channel/Application looking up path []" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c0a Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c0b Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c0c Manager Channel/Application has managers Org3MSP" +"2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c0d As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c0e As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c0f As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c10 Manager Channel looking up path [Orderer]" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c11 Manager Channel has managers Orderer" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c12 Manager Channel has managers Application" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c13 Manager Channel/Orderer looking up path []" +"2019-09-24 00:27:19.391 UTC [policies] Manager -> DEBU 1c14 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c15 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c16 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c17 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:27:19.391 UTC [common.channelconfig] LogSanityChecks -> DEBU 1c18 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:27:19.391 UTC [common.capabilities] Supported -> DEBU 1c19 Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 00:27:19.391 UTC [common.capabilities] Supported -> DEBU 1c1a Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:27:19.392 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c1b Obtaining default signing identity" +"2019-09-24 00:27:19.392 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c1c Obtaining default signing identity" +"2019-09-24 00:27:19.392 UTC [msp.identity] Sign -> DEBU 1c1d Sign: plaintext: 0AD2060A1B08011A0608E7C5A5EC0522...3B510D9537F58663A9B5FF8FA9EA68AE " +"2019-09-24 00:27:19.392 UTC [msp.identity] Sign -> DEBU 1c1e Sign: digest: A14F26245C6061CD27A88408726E759ACDF40A72BBA24542728C087E71E7C73D " +"2019-09-24 00:27:19.392 UTC [policies] Evaluate -> DEBU 1c1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 00:27:19.392 UTC [policies] Evaluate -> DEBU 1c20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.392 UTC [policies] Evaluate -> DEBU 1c21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:27:19.392 UTC [policies] Evaluate -> DEBU 1c22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.392 UTC [policies] Evaluate -> DEBU 1c23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:27:19.392 UTC [msp] DeserializeIdentity -> DEBU 1c24 Obtaining identity" +"2019-09-24 00:27:19.392 UTC [msp.identity] newIdentity -> DEBU 1c25 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.392 UTC [cauthdsl] func1 -> DEBU 1c26 0xc0011c3980 gate 1569284839392958500 evaluation starts" +"2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c27 0xc0011c3980 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c28 0xc0011c3980 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c29 0xc0011c3980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c2a 0xc0011c3980 principal evaluation fails" +"2019-09-24 00:27:19.393 UTC [cauthdsl] func1 -> DEBU 1c2b 0xc0011c3980 gate 1569284839392958500 evaluation fails" +"2019-09-24 00:27:19.393 UTC [policies] Evaluate -> DEBU 1c2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:19.393 UTC [policies] Evaluate -> DEBU 1c2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:19.393 UTC [policies] Evaluate -> DEBU 1c2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 00:27:19.393 UTC [cauthdsl] func1 -> DEBU 1c2f 0xc0012eaac0 gate 1569284839393342200 evaluation starts" +"2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c30 0xc0012eaac0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.393 UTC [cauthdsl] func2 -> DEBU 1c31 0xc0012eaac0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:19.394 UTC [cauthdsl] func2 -> DEBU 1c32 0xc0012eaac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:19.394 UTC [cauthdsl] func2 -> DEBU 1c33 0xc0012eaac0 principal evaluation fails" +"2019-09-24 00:27:19.394 UTC [cauthdsl] func1 -> DEBU 1c34 0xc0012eaac0 gate 1569284839393342200 evaluation fails" +"2019-09-24 00:27:19.394 UTC [policies] Evaluate -> DEBU 1c35 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:19.394 UTC [policies] Evaluate -> DEBU 1c36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:19.394 UTC [policies] func1 -> DEBU 1c37 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +"2019-09-24 00:27:19.394 UTC [policies] Evaluate -> DEBU 1c38 Signature set did not satisfy policy /Channel/Application/Writers" +"2019-09-24 00:27:19.394 UTC [policies] Evaluate -> DEBU 1c39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:27:19.394 UTC [policies] Evaluate -> DEBU 1c3a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 00:27:19.395 UTC [policies] Evaluate -> DEBU 1c3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.395 UTC [policies] Evaluate -> DEBU 1c3c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:27:19.395 UTC [cauthdsl] func1 -> DEBU 1c3d 0xc0012eb850 gate 1569284839395154600 evaluation starts" +"2019-09-24 00:27:19.395 UTC [cauthdsl] func2 -> DEBU 1c3e 0xc0012eb850 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.395 UTC [cauthdsl] func2 -> DEBU 1c3f 0xc0012eb850 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:19.395 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c40 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 00:27:19.395 UTC [msp] Validate -> DEBU 1c41 MSP OrdererMSP validating identity" +"2019-09-24 00:27:19.395 UTC [cauthdsl] func2 -> DEBU 1c42 0xc0012eb850 principal matched by identity 0" +"2019-09-24 00:27:19.396 UTC [msp.identity] Verify -> DEBU 1c43 Verify: digest = 00000000 a1 4f 26 24 5c 60 61 cd 27 a8 84 08 72 6e 75 9a |.O&$\`a.'...rnu.| +00000010 cd f4 0a 72 bb a2 45 42 72 8c 08 7e 71 e7 c7 3d |...r..EBr..~q..=|" +"2019-09-24 00:27:19.396 UTC [msp.identity] Verify -> DEBU 1c44 Verify: sig = 00000000 30 45 02 21 00 be 77 61 11 1c 31 7b 61 9b bf e1 |0E.!..wa..1{a...| +00000010 aa 50 c3 32 1f a8 e6 f4 32 fd a2 0e 40 09 a2 92 |.P.2....2...@...| +00000020 69 66 73 16 58 02 20 69 a4 df 24 de 15 ff 27 59 |ifs.X. i..$...'Y| +00000030 84 0c ff 42 07 92 94 a9 95 18 98 aa 50 21 03 cb |...B........P!..| +00000040 d1 d1 df 9a 80 67 53 |.....gS|" +"2019-09-24 00:27:19.396 UTC [cauthdsl] func2 -> DEBU 1c45 0xc0012eb850 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.396 UTC [cauthdsl] func1 -> DEBU 1c46 0xc0012eb850 gate 1569284839395154600 evaluation succeeds" +"2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c47 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c48 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c49 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c4b Signature set satisfies policy /Channel/Writers" +"2019-09-24 00:27:19.396 UTC [policies] Evaluate -> DEBU 1c4c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 00:27:19.397 UTC [orderer.common.msgprocessor] Apply -> DEBU 1c4d Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-09-24 00:27:19.397 UTC [common.channelconfig] NewStandardValues -> DEBU 1c4e Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c4f Processing field: HashingAlgorithm" +"2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c50 Processing field: BlockDataHashingStructure" +"2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c51 Processing field: OrdererAddresses" +"2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c52 Processing field: Consortium" +"2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c53 Processing field: Capabilities" +"2019-09-24 00:27:19.397 UTC [common.channelconfig] NewStandardValues -> DEBU 1c54 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c55 Processing field: ConsensusType" +"2019-09-24 00:27:19.397 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c56 Processing field: BatchSize" +"2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c57 Processing field: BatchTimeout" +"2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c58 Processing field: KafkaBrokers" +"2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c59 Processing field: ChannelRestrictions" +"2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5a Processing field: Capabilities" +"2019-09-24 00:27:19.398 UTC [common.channelconfig] NewStandardValues -> DEBU 1c5b Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5c Processing field: Endpoints" +"2019-09-24 00:27:19.398 UTC [common.channelconfig] NewStandardValues -> DEBU 1c5d Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.398 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5e Processing field: MSP" +"2019-09-24 00:27:19.398 UTC [common.channelconfig] validateMSP -> DEBU 1c5f Setting up MSP for org OrdererOrg" +"2019-09-24 00:27:19.398 UTC [msp] newBccspMsp -> DEBU 1c60 Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.398 UTC [msp] New -> DEBU 1c61 Creating Cache-MSP instance" +"2019-09-24 00:27:19.398 UTC [msp] Setup -> DEBU 1c62 Setting up MSP instance OrdererMSP" +"2019-09-24 00:27:19.399 UTC [msp.identity] newIdentity -> DEBU 1c63 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.399 UTC [msp.identity] newIdentity -> DEBU 1c64 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.399 UTC [msp] Validate -> DEBU 1c65 MSP OrdererMSP validating identity" +"2019-09-24 00:27:19.399 UTC [common.channelconfig] NewStandardValues -> DEBU 1c66 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:27:19.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c67 Processing field: ACLs" +"2019-09-24 00:27:19.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c68 Processing field: Capabilities" +"2019-09-24 00:27:19.400 UTC [common.channelconfig] NewStandardValues -> DEBU 1c69 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6a Processing field: AnchorPeers" +"2019-09-24 00:27:19.400 UTC [common.channelconfig] NewStandardValues -> DEBU 1c6b Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6c Processing field: MSP" +"2019-09-24 00:27:19.400 UTC [common.channelconfig] Validate -> DEBU 1c6d Anchor peers for org Org3MSP are " +"2019-09-24 00:27:19.400 UTC [common.channelconfig] validateMSP -> DEBU 1c6e Setting up MSP for org Org3MSP" +"2019-09-24 00:27:19.400 UTC [msp] newBccspMsp -> DEBU 1c6f Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.400 UTC [msp] New -> DEBU 1c70 Creating Cache-MSP instance" +"2019-09-24 00:27:19.401 UTC [msp] Setup -> DEBU 1c71 Setting up MSP instance Org3MSP" +"2019-09-24 00:27:19.401 UTC [msp.identity] newIdentity -> DEBU 1c72 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.401 UTC [msp.identity] newIdentity -> DEBU 1c73 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.402 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c74 Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-09-24 00:27:19.402 UTC [msp] Validate -> DEBU 1c75 MSP Org3MSP validating identity" +"2019-09-24 00:27:19.402 UTC [msp] getCertificationChain -> DEBU 1c76 MSP Org3MSP getting certification chain" +"2019-09-24 00:27:19.402 UTC [msp] hasOURole -> DEBU 1c77 MSP Org3MSP checking if the identity is a client" +"2019-09-24 00:27:19.402 UTC [msp] getCertificationChain -> DEBU 1c78 MSP Org3MSP getting certification chain" +"2019-09-24 00:27:19.402 UTC [common.channelconfig] NewStandardValues -> DEBU 1c79 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7a Processing field: AnchorPeers" +"2019-09-24 00:27:19.403 UTC [common.channelconfig] NewStandardValues -> DEBU 1c7b Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7c Processing field: MSP" +"2019-09-24 00:27:19.403 UTC [common.channelconfig] Validate -> DEBU 1c7d Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:27:19.403 UTC [common.channelconfig] validateMSP -> DEBU 1c7e Setting up MSP for org Org1MSP" +"2019-09-24 00:27:19.403 UTC [msp] newBccspMsp -> DEBU 1c7f Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.403 UTC [msp] New -> DEBU 1c80 Creating Cache-MSP instance" +"2019-09-24 00:27:19.403 UTC [msp] Setup -> DEBU 1c81 Setting up MSP instance Org1MSP" +"2019-09-24 00:27:19.403 UTC [msp.identity] newIdentity -> DEBU 1c82 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.404 UTC [msp.identity] newIdentity -> DEBU 1c83 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.404 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c84 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:27:19.404 UTC [msp] Validate -> DEBU 1c85 MSP Org1MSP validating identity" +"2019-09-24 00:27:19.405 UTC [msp] getCertificationChain -> DEBU 1c86 MSP Org1MSP getting certification chain" +"2019-09-24 00:27:19.405 UTC [msp] hasOURole -> DEBU 1c87 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:27:19.405 UTC [msp] getCertificationChain -> DEBU 1c88 MSP Org1MSP getting certification chain" +"2019-09-24 00:27:19.405 UTC [common.channelconfig] NewStandardValues -> DEBU 1c89 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.405 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c8a Processing field: AnchorPeers" +"2019-09-24 00:27:19.405 UTC [common.channelconfig] NewStandardValues -> DEBU 1c8b Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.405 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c8c Processing field: MSP" +"2019-09-24 00:27:19.405 UTC [common.channelconfig] Validate -> DEBU 1c8d Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 00:27:19.405 UTC [common.channelconfig] validateMSP -> DEBU 1c8e Setting up MSP for org Org2MSP" +"2019-09-24 00:27:19.405 UTC [msp] newBccspMsp -> DEBU 1c8f Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.405 UTC [msp] New -> DEBU 1c90 Creating Cache-MSP instance" +"2019-09-24 00:27:19.405 UTC [msp] Setup -> DEBU 1c91 Setting up MSP instance Org2MSP" +"2019-09-24 00:27:19.406 UTC [msp.identity] newIdentity -> DEBU 1c92 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.406 UTC [msp.identity] newIdentity -> DEBU 1c93 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.406 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1c94 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:27:19.406 UTC [msp] Validate -> DEBU 1c95 MSP Org2MSP validating identity" +"2019-09-24 00:27:19.406 UTC [msp] getCertificationChain -> DEBU 1c96 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.407 UTC [msp] hasOURole -> DEBU 1c97 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:27:19.407 UTC [msp] getCertificationChain -> DEBU 1c98 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.407 UTC [msp] Setup -> DEBU 1c99 Setting up the MSP manager (4 msps)" +"2019-09-24 00:27:19.407 UTC [msp] Setup -> DEBU 1c9a MSP manager setup complete, setup 4 msps" +"2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1c9b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1c9c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1c9d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1c9e Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1c9f Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1ca0 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1ca1 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1ca2 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.407 UTC [policies] NewManagerImpl -> DEBU 1ca3 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca4 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca5 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca6 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca7 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca8 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1ca9 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1caa Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cab Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cac Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cad Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cae Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1caf Proposed new policy Readers for Channel/Application" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb0 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb1 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb2 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb3 Proposed new policy Writers for Channel" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb4 Proposed new policy Admins for Channel" +"2019-09-24 00:27:19.408 UTC [policies] NewManagerImpl -> DEBU 1cb5 Proposed new policy Readers for Channel" +"2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cb6 Adding to config map: [Group] /Channel" +"2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cb7 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cb8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cb9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cba Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cbb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cbc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cbd Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cbe Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:27:19.409 UTC [common.configtx] addToMap -> DEBU 1cbf Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc0 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc3 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc4 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc5 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc6 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc7 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc8 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cc9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1cca Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1ccb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.410 UTC [common.configtx] addToMap -> DEBU 1ccc Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1ccd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cce Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1ccf Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd4 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.411 UTC [common.configtx] addToMap -> DEBU 1cd9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cda Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cdb Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cdc Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cdd Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cde Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1cdf Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1ce0 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1ce1 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1ce2 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1ce3 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:27:19.412 UTC [common.configtx] addToMap -> DEBU 1ce4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:27:19.413 UTC [common.configtx] addToMap -> DEBU 1ce5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:27:19.413 UTC [common.configtx] addToMap -> DEBU 1ce6 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:27:19.413 UTC [common.configtx] addToMap -> DEBU 1ce7 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:27:19.413 UTC [common.configtx] addToMap -> DEBU 1ce8 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:27:19.413 UTC [common.configtx] addToMap -> DEBU 1ce9 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:27:19.413 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1cea [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:32916" +"2019-09-24 00:27:19.413 UTC [orderer.consensus.etcdraft] propose -> INFO 1ceb Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 00:27:19.413 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 1cec Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-09-24 00:27:19.413 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1ced Proposed block [6] to raft consensus" channel=businesschannel node=1 +"2019-09-24 00:27:19.418 UTC [orderer.common.broadcast] Handle -> WARN 1cee Error reading from 172.18.0.9:32916: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:19.418 UTC [orderer.common.server] func1 -> DEBU 1cef Closing Broadcast stream" +"2019-09-24 00:27:19.418 UTC [comm.grpc.server] 1 -> INFO 1cf0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:32916 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.1667ms +"2019-09-24 00:27:19.418 UTC [grpc] infof -> DEBU 1cf1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.418 UTC [common.deliver] Handle -> WARN 1cf2 Error reading from 172.18.0.9:32914: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:19.418 UTC [orderer.common.server] func1 -> DEBU 1cf3 Closing Deliver stream" +"2019-09-24 00:27:19.418 UTC [comm.grpc.server] 1 -> INFO 1cf4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32914 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=64.1171ms +"2019-09-24 00:27:19.418 UTC [grpc] infof -> DEBU 1cf5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf6 Sending msg of 34008 bytes to 3 on channel businesschannel took 68.5µs" +"2019-09-24 00:27:19.422 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf7 Send of ConsensusRequest for channel businesschannel with payload of size 34008 to orderer2.example.com(orderer2.example.com:7050) took 150.9µs " +"2019-09-24 00:27:19.421 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf8 Sending msg of 34008 bytes to 2 on channel businesschannel took 50.3µs" +"2019-09-24 00:27:19.423 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf9 Send of ConsensusRequest for channel businesschannel with payload of size 34008 to orderer1.example.com(orderer1.example.com:7050) took 99.8µs " +"2019-09-24 00:27:19.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfa Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:19.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfb Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +"2019-09-24 00:27:19.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfc Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2019-09-24 00:27:19.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.4µs " +"2019-09-24 00:27:19.430 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1cfe Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +"2019-09-24 00:27:19.431 UTC [common.configtx] addToMap -> DEBU 1cff Adding to config map: [Group] /Channel" +"2019-09-24 00:27:19.431 UTC [common.configtx] addToMap -> DEBU 1d00 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:27:19.431 UTC [common.configtx] addToMap -> DEBU 1d01 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:27:19.431 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d02 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:19.431 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.6µs " +"2019-09-24 00:27:19.431 UTC [common.configtx] addToMap -> DEBU 1d03 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:27:19.438 UTC [common.configtx] addToMap -> DEBU 1d05 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:27:19.440 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d06 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:19.440 UTC [common.configtx] addToMap -> DEBU 1d07 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:27:19.441 UTC [common.configtx] addToMap -> DEBU 1d08 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:27:19.442 UTC [common.configtx] addToMap -> DEBU 1d09 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:27:19.442 UTC [common.configtx] addToMap -> DEBU 1d0a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:27:19.443 UTC [common.configtx] addToMap -> DEBU 1d0b Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:27:19.444 UTC [common.configtx] addToMap -> DEBU 1d0c Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:27:19.445 UTC [common.configtx] addToMap -> DEBU 1d0e Adding to config map: [Group] /Channel" +"2019-09-24 00:27:19.443 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:19.450 UTC [common.configtx] addToMap -> DEBU 1d0f Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:27:19.451 UTC [common.configtx] addToMap -> DEBU 1d10 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:27:19.451 UTC [common.configtx] addToMap -> DEBU 1d11 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:27:19.452 UTC [common.configtx] addToMap -> DEBU 1d12 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 00:27:19.452 UTC [common.configtx] addToMap -> DEBU 1d13 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 00:27:19.452 UTC [common.configtx] addToMap -> DEBU 1d14 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 00:27:19.453 UTC [common.configtx] addToMap -> DEBU 1d15 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 00:27:19.453 UTC [common.configtx] addToMap -> DEBU 1d16 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:19.453 UTC [common.configtx] addToMap -> DEBU 1d17 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 00:27:19.453 UTC [common.configtx] addToMap -> DEBU 1d18 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:27:19.454 UTC [common.configtx] addToMap -> DEBU 1d19 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:27:19.454 UTC [common.configtx] addToMap -> DEBU 1d1a Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:27:19.454 UTC [common.configtx] addToMap -> DEBU 1d1b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:27:19.455 UTC [common.configtx] addToMap -> DEBU 1d1c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:27:19.456 UTC [common.configtx] addToMap -> DEBU 1d1d Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:27:19.456 UTC [common.configtx] addToMap -> DEBU 1d1e Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:27:19.456 UTC [common.configtx] verifyDeltaSet -> DEBU 1d1f Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 00:27:19.457 UTC [common.configtx] verifyDeltaSet -> DEBU 1d20 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:19.457 UTC [common.configtx] verifyDeltaSet -> DEBU 1d21 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 00:27:19.458 UTC [common.configtx] verifyDeltaSet -> DEBU 1d22 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 00:27:19.458 UTC [common.configtx] verifyDeltaSet -> DEBU 1d23 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-09-24 00:27:19.458 UTC [common.configtx] verifyDeltaSet -> DEBU 1d24 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 00:27:19.459 UTC [common.configtx] verifyDeltaSet -> DEBU 1d25 Processing change to key: [Group] /Channel/Application" +"2019-09-24 00:27:19.459 UTC [common.configtx] policyForItem -> DEBU 1d26 Getting policy for item Application with mod_policy Admins" +"2019-09-24 00:27:19.460 UTC [policies] Manager -> DEBU 1d27 Manager Channel looking up path []" +"2019-09-24 00:27:19.460 UTC [policies] Manager -> DEBU 1d28 Manager Channel has managers Application" +"2019-09-24 00:27:19.460 UTC [policies] Manager -> DEBU 1d29 Manager Channel has managers Orderer" +"2019-09-24 00:27:19.460 UTC [policies] Manager -> DEBU 1d2a Manager Channel looking up path [Application]" +"2019-09-24 00:27:19.460 UTC [policies] Manager -> DEBU 1d2b Manager Channel has managers Application" +"2019-09-24 00:27:19.461 UTC [policies] Manager -> DEBU 1d2c Manager Channel has managers Orderer" +"2019-09-24 00:27:19.461 UTC [policies] Manager -> DEBU 1d2d Manager Channel/Application looking up path []" +"2019-09-24 00:27:19.461 UTC [policies] Manager -> DEBU 1d2e Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:27:19.461 UTC [policies] Manager -> DEBU 1d2f Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:27:19.461 UTC [policies] Evaluate -> DEBU 1d30 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-09-24 00:27:19.462 UTC [policies] Evaluate -> DEBU 1d31 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.462 UTC [policies] Evaluate -> DEBU 1d32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 00:27:19.462 UTC [cauthdsl] deduplicate -> WARN 1d33 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-09-24 00:27:19.462 UTC [cauthdsl] func1 -> DEBU 1d34 0xc000d92870 gate 1569284839462649600 evaluation starts" +"2019-09-24 00:27:19.462 UTC [cauthdsl] func2 -> DEBU 1d35 0xc000d92870 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 00:27:19.467 UTC [cauthdsl] func2 -> DEBU 1d36 0xc000d92870 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:19.481 UTC [cauthdsl] func2 -> DEBU 1d37 0xc000d92870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 00:27:19.482 UTC [cauthdsl] func2 -> DEBU 1d38 0xc000d92870 processing identity 1 with bytes of fd0d80" +"2019-09-24 00:27:19.482 UTC [cauthdsl] func2 -> DEBU 1d39 0xc000d92870 principal matched by identity 1" +"2019-09-24 00:27:19.482 UTC [msp.identity] Verify -> DEBU 1d3a Verify: digest = 00000000 b9 ca 25 b9 18 4b 4c cb f9 ed 69 2e e4 b0 01 32 |..%..KL...i....2| +00000010 7e d5 0e 8f db 9c d1 12 47 66 47 e2 f9 42 f2 92 |~.......GfG..B..|" +"2019-09-24 00:27:19.483 UTC [msp.identity] Verify -> DEBU 1d3b Verify: sig = 00000000 30 44 02 20 6f 93 cb 0e 30 b4 01 2a 3e 5c 70 08 |0D. o...0..*>\p.| +00000010 f4 b3 a7 c6 8d d3 d2 16 33 9b 93 be 91 8a 0e 0a |........3.......| +00000020 14 03 96 82 02 20 25 f6 18 45 c0 ea 93 0a be f5 |..... %..E......| +00000030 1d 09 80 60 65 19 94 68 46 86 00 e0 07 4b 6c 2e |...`e..hF....Kl.| +00000040 99 b4 f8 c0 85 d3 |......|" +"2019-09-24 00:27:19.484 UTC [cauthdsl] func2 -> DEBU 1d3c 0xc000d92870 principal evaluation succeeds for identity 1" +"2019-09-24 00:27:19.485 UTC [cauthdsl] func1 -> DEBU 1d3d 0xc000d92870 gate 1569284839462649600 evaluation succeeds" +"2019-09-24 00:27:19.486 UTC [policies] Evaluate -> DEBU 1d3e Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:27:19.486 UTC [policies] Evaluate -> DEBU 1d3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:27:19.486 UTC [policies] Evaluate -> DEBU 1d40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 00:27:19.487 UTC [cauthdsl] deduplicate -> WARN 1d41 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-09-24 00:27:19.487 UTC [cauthdsl] func1 -> DEBU 1d42 0xc000d92ea0 gate 1569284839487852200 evaluation starts" +"2019-09-24 00:27:19.488 UTC [cauthdsl] func2 -> DEBU 1d43 0xc000d92ea0 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 00:27:19.488 UTC [cauthdsl] func2 -> DEBU 1d44 0xc000d92ea0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:19.489 UTC [cauthdsl] func2 -> DEBU 1d45 0xc000d92ea0 principal matched by identity 0" +"2019-09-24 00:27:19.489 UTC [msp.identity] Verify -> DEBU 1d46 Verify: digest = 00000000 48 77 a9 76 ae c6 d0 00 08 e1 87 61 5a 35 3b 84 |Hw.v.......aZ5;.| +00000010 16 95 5c 0b c0 a8 fc c1 cf 92 2d eb 73 05 3b 4a |..\.......-.s.;J|" +"2019-09-24 00:27:19.490 UTC [msp.identity] Verify -> DEBU 1d47 Verify: sig = 00000000 30 44 02 20 4c 82 9e d8 a1 76 a3 a3 75 1d 20 c9 |0D. L....v..u. .| +00000010 3e 86 10 3b d1 1d 25 b5 e5 d4 bc e4 42 6b 38 bd |>..;..%.....Bk8.| +00000020 f6 ad d6 81 02 20 68 bc f4 5b 2d ee d1 96 32 c3 |..... h..[-...2.| +00000030 97 14 67 8c 23 1e 47 0f c7 05 3b 29 c9 13 7b 07 |..g.#.G...;)..{.| +00000040 8f a7 92 fd d1 08 |......|" +"2019-09-24 00:27:19.490 UTC [cauthdsl] func2 -> DEBU 1d48 0xc000d92ea0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.490 UTC [cauthdsl] func1 -> DEBU 1d49 0xc000d92ea0 gate 1569284839487852200 evaluation succeeds" +"2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 1d4a Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 1d4b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 1d4c Signature set satisfies policy /Channel/Application/Admins" +"2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 1d4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-09-24 00:27:19.492 UTC [common.configtx] recurseConfigMap -> DEBU 1d4e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.494 UTC [common.configtx] recurseConfigMap -> DEBU 1d4f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.495 UTC [common.configtx] recurseConfigMap -> DEBU 1d50 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.496 UTC [common.configtx] recurseConfigMap -> DEBU 1d51 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.496 UTC [common.configtx] recurseConfigMap -> DEBU 1d52 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.497 UTC [common.configtx] recurseConfigMap -> DEBU 1d53 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.497 UTC [common.configtx] recurseConfigMap -> DEBU 1d54 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.498 UTC [common.configtx] recurseConfigMap -> DEBU 1d55 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.498 UTC [common.configtx] recurseConfigMap -> DEBU 1d56 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.499 UTC [common.configtx] recurseConfigMap -> DEBU 1d57 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.501 UTC [common.configtx] recurseConfigMap -> DEBU 1d59 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d58 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:19.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d5a Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +"2019-09-24 00:27:19.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.3µs " +"2019-09-24 00:27:19.506 UTC [common.configtx] recurseConfigMap -> DEBU 1d5c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.508 UTC [common.configtx] recurseConfigMap -> DEBU 1d5d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.509 UTC [common.configtx] recurseConfigMap -> DEBU 1d5e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.512 UTC [common.configtx] recurseConfigMap -> DEBU 1d5f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.513 UTC [common.configtx] recurseConfigMap -> DEBU 1d60 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.514 UTC [common.configtx] recurseConfigMap -> DEBU 1d61 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.514 UTC [common.configtx] recurseConfigMap -> DEBU 1d62 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.514 UTC [common.configtx] recurseConfigMap -> DEBU 1d63 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.515 UTC [common.configtx] recurseConfigMap -> DEBU 1d64 Setting policy for key Admins to " +"2019-09-24 00:27:19.515 UTC [common.configtx] recurseConfigMap -> DEBU 1d65 Setting policy for key Endorsement to " +"2019-09-24 00:27:19.515 UTC [common.configtx] recurseConfigMap -> DEBU 1d66 Setting policy for key LifecycleEndorsement to " +"2019-09-24 00:27:19.516 UTC [common.configtx] recurseConfigMap -> DEBU 1d67 Setting policy for key Readers to " +"2019-09-24 00:27:19.516 UTC [common.configtx] recurseConfigMap -> DEBU 1d68 Setting policy for key Writers to " +"2019-09-24 00:27:19.516 UTC [common.configtx] recurseConfigMap -> DEBU 1d69 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.517 UTC [common.configtx] recurseConfigMap -> DEBU 1d6a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.517 UTC [common.configtx] recurseConfigMap -> DEBU 1d6b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.518 UTC [common.channelconfig] NewStandardValues -> DEBU 1d6c Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:27:19.519 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6d Processing field: HashingAlgorithm" +"2019-09-24 00:27:19.519 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6e Processing field: BlockDataHashingStructure" +"2019-09-24 00:27:19.520 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6f Processing field: OrdererAddresses" +"2019-09-24 00:27:19.520 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d70 Processing field: Consortium" +"2019-09-24 00:27:19.520 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d71 Processing field: Capabilities" +"2019-09-24 00:27:19.521 UTC [common.channelconfig] NewStandardValues -> DEBU 1d72 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:27:19.521 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d73 Processing field: ConsensusType" +"2019-09-24 00:27:19.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d74 Processing field: BatchSize" +"2019-09-24 00:27:19.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d75 Processing field: BatchTimeout" +"2019-09-24 00:27:19.523 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d76 Processing field: KafkaBrokers" +"2019-09-24 00:27:19.524 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d77 Processing field: ChannelRestrictions" +"2019-09-24 00:27:19.524 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d78 Processing field: Capabilities" +"2019-09-24 00:27:19.524 UTC [common.channelconfig] NewStandardValues -> DEBU 1d79 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:27:19.525 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d7a Processing field: Endpoints" +"2019-09-24 00:27:19.525 UTC [common.channelconfig] NewStandardValues -> DEBU 1d7b Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.526 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d7c Processing field: MSP" +"2019-09-24 00:27:19.526 UTC [common.channelconfig] validateMSP -> DEBU 1d7d Setting up MSP for org OrdererOrg" +"2019-09-24 00:27:19.527 UTC [msp] newBccspMsp -> DEBU 1d7e Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.527 UTC [msp] New -> DEBU 1d7f Creating Cache-MSP instance" +"2019-09-24 00:27:19.528 UTC [msp] Setup -> DEBU 1d80 Setting up MSP instance OrdererMSP" +"2019-09-24 00:27:19.528 UTC [msp.identity] newIdentity -> DEBU 1d81 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.532 UTC [msp.identity] newIdentity -> DEBU 1d82 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.535 UTC [msp] Validate -> DEBU 1d83 MSP OrdererMSP validating identity" +"2019-09-24 00:27:19.541 UTC [common.channelconfig] NewStandardValues -> DEBU 1d84 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:27:19.542 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d85 Processing field: ACLs" +"2019-09-24 00:27:19.542 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d86 Processing field: Capabilities" +"2019-09-24 00:27:19.542 UTC [common.channelconfig] NewStandardValues -> DEBU 1d87 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.545 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d88 Processing field: AnchorPeers" +"2019-09-24 00:27:19.546 UTC [common.channelconfig] NewStandardValues -> DEBU 1d89 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.547 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d8a Processing field: MSP" +"2019-09-24 00:27:19.547 UTC [common.channelconfig] Validate -> DEBU 1d8b Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:27:19.547 UTC [common.channelconfig] validateMSP -> DEBU 1d8c Setting up MSP for org Org1MSP" +"2019-09-24 00:27:19.547 UTC [msp] newBccspMsp -> DEBU 1d8d Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.547 UTC [msp] New -> DEBU 1d8e Creating Cache-MSP instance" +"2019-09-24 00:27:19.547 UTC [msp] Setup -> DEBU 1d8f Setting up MSP instance Org1MSP" +"2019-09-24 00:27:19.547 UTC [msp.identity] newIdentity -> DEBU 1d90 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.547 UTC [msp.identity] newIdentity -> DEBU 1d91 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.551 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1d92 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:27:19.552 UTC [msp] Validate -> DEBU 1d93 MSP Org1MSP validating identity" +"2019-09-24 00:27:19.552 UTC [msp] getCertificationChain -> DEBU 1d94 MSP Org1MSP getting certification chain" +"2019-09-24 00:27:19.553 UTC [msp] hasOURole -> DEBU 1d95 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:27:19.553 UTC [msp] getCertificationChain -> DEBU 1d96 MSP Org1MSP getting certification chain" +"2019-09-24 00:27:19.555 UTC [common.channelconfig] NewStandardValues -> DEBU 1d97 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.555 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d98 Processing field: AnchorPeers" +"2019-09-24 00:27:19.555 UTC [common.channelconfig] NewStandardValues -> DEBU 1d99 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.555 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d9a Processing field: MSP" +"2019-09-24 00:27:19.555 UTC [common.channelconfig] Validate -> DEBU 1d9b Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 00:27:19.556 UTC [common.channelconfig] validateMSP -> DEBU 1d9c Setting up MSP for org Org2MSP" +"2019-09-24 00:27:19.556 UTC [msp] newBccspMsp -> DEBU 1d9d Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.556 UTC [msp] New -> DEBU 1d9e Creating Cache-MSP instance" +"2019-09-24 00:27:19.556 UTC [msp] Setup -> DEBU 1d9f Setting up MSP instance Org2MSP" +"2019-09-24 00:27:19.557 UTC [msp.identity] newIdentity -> DEBU 1da0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.557 UTC [msp.identity] newIdentity -> DEBU 1da1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.558 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1da2 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:27:19.558 UTC [msp] Validate -> DEBU 1da3 MSP Org2MSP validating identity" +"2019-09-24 00:27:19.559 UTC [msp] getCertificationChain -> DEBU 1da4 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.559 UTC [msp] hasOURole -> DEBU 1da5 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:27:19.559 UTC [msp] getCertificationChain -> DEBU 1da6 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.560 UTC [common.channelconfig] NewStandardValues -> DEBU 1da7 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1da8 Processing field: AnchorPeers" +"2019-09-24 00:27:19.561 UTC [common.channelconfig] NewStandardValues -> DEBU 1da9 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.561 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1daa Processing field: MSP" +"2019-09-24 00:27:19.561 UTC [common.channelconfig] Validate -> DEBU 1dab Anchor peers for org Org3MSP are " +"2019-09-24 00:27:19.561 UTC [common.channelconfig] validateMSP -> DEBU 1dac Setting up MSP for org Org3MSP" +"2019-09-24 00:27:19.561 UTC [msp] newBccspMsp -> DEBU 1dad Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.562 UTC [msp] New -> DEBU 1dae Creating Cache-MSP instance" +"2019-09-24 00:27:19.562 UTC [msp] Setup -> DEBU 1daf Setting up MSP instance Org3MSP" +"2019-09-24 00:27:19.562 UTC [msp.identity] newIdentity -> DEBU 1db0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.563 UTC [msp.identity] newIdentity -> DEBU 1db1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.564 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1db2 Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-09-24 00:27:19.565 UTC [msp] Validate -> DEBU 1db3 MSP Org3MSP validating identity" +"2019-09-24 00:27:19.569 UTC [msp] getCertificationChain -> DEBU 1db4 MSP Org3MSP getting certification chain" +"2019-09-24 00:27:19.570 UTC [msp] hasOURole -> DEBU 1db5 MSP Org3MSP checking if the identity is a client" +"2019-09-24 00:27:19.570 UTC [msp] getCertificationChain -> DEBU 1db6 MSP Org3MSP getting certification chain" +"2019-09-24 00:27:19.570 UTC [msp] Setup -> DEBU 1db7 Setting up the MSP manager (4 msps)" +"2019-09-24 00:27:19.571 UTC [msp] Setup -> DEBU 1db8 MSP manager setup complete, setup 4 msps" +"2019-09-24 00:27:19.571 UTC [policies] NewManagerImpl -> DEBU 1db9 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.571 UTC [policies] NewManagerImpl -> DEBU 1dba Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.571 UTC [policies] NewManagerImpl -> DEBU 1dbb Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.571 UTC [policies] NewManagerImpl -> DEBU 1dbc Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.572 UTC [policies] NewManagerImpl -> DEBU 1dbd Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.572 UTC [policies] NewManagerImpl -> DEBU 1dbe Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.572 UTC [policies] NewManagerImpl -> DEBU 1dbf Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.572 UTC [policies] NewManagerImpl -> DEBU 1dc0 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.573 UTC [policies] NewManagerImpl -> DEBU 1dc1 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.573 UTC [policies] NewManagerImpl -> DEBU 1dc2 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.573 UTC [policies] NewManagerImpl -> DEBU 1dc3 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.573 UTC [policies] NewManagerImpl -> DEBU 1dc4 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.574 UTC [policies] NewManagerImpl -> DEBU 1dc5 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:27:19.574 UTC [policies] NewManagerImpl -> DEBU 1dc6 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dc7 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dc8 Proposed new policy Readers for Channel/Application" +"2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dc9 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dca Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dcb Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.575 UTC [policies] NewManagerImpl -> DEBU 1dcc Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.576 UTC [policies] NewManagerImpl -> DEBU 1dcd Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:27:19.576 UTC [policies] NewManagerImpl -> DEBU 1dce Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:27:19.576 UTC [policies] NewManagerImpl -> DEBU 1dcf Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:27:19.577 UTC [policies] NewManagerImpl -> DEBU 1dd0 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:27:19.577 UTC [policies] NewManagerImpl -> DEBU 1dd1 Proposed new policy Readers for Channel" +"2019-09-24 00:27:19.577 UTC [policies] NewManagerImpl -> DEBU 1dd2 Proposed new policy Writers for Channel" +"2019-09-24 00:27:19.577 UTC [policies] NewManagerImpl -> DEBU 1dd3 Proposed new policy Admins for Channel" +"2019-09-24 00:27:19.577 UTC [common.configtx] addToMap -> DEBU 1dd4 Adding to config map: [Group] /Channel" +"2019-09-24 00:27:19.577 UTC [common.configtx] addToMap -> DEBU 1dd5 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:27:19.577 UTC [common.configtx] addToMap -> DEBU 1dd6 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.578 UTC [common.configtx] addToMap -> DEBU 1dd7 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:27:19.579 UTC [common.configtx] addToMap -> DEBU 1dd8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:19.579 UTC [common.configtx] addToMap -> DEBU 1dd9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:19.580 UTC [common.configtx] addToMap -> DEBU 1dda Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:27:19.580 UTC [common.configtx] addToMap -> DEBU 1ddb Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:27:19.580 UTC [common.configtx] addToMap -> DEBU 1ddc Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:27:19.580 UTC [common.configtx] addToMap -> DEBU 1ddd Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:27:19.580 UTC [common.configtx] addToMap -> DEBU 1dde Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1ddf Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1de0 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1de1 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1de2 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1de3 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:27:19.581 UTC [common.configtx] addToMap -> DEBU 1de4 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:27:19.582 UTC [common.configtx] addToMap -> DEBU 1de5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:27:19.582 UTC [common.configtx] addToMap -> DEBU 1de6 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:27:19.582 UTC [common.configtx] addToMap -> DEBU 1de7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:27:19.582 UTC [common.configtx] addToMap -> DEBU 1de8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:27:19.583 UTC [common.configtx] addToMap -> DEBU 1de9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:27:19.583 UTC [common.configtx] addToMap -> DEBU 1dea Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.583 UTC [common.configtx] addToMap -> DEBU 1deb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:19.583 UTC [common.configtx] addToMap -> DEBU 1dec Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 00:27:19.583 UTC [common.configtx] addToMap -> DEBU 1ded Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 00:27:19.602 UTC [common.configtx] addToMap -> DEBU 1dee Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 00:27:19.602 UTC [common.configtx] addToMap -> DEBU 1def Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 00:27:19.602 UTC [common.configtx] addToMap -> DEBU 1df0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:19.603 UTC [common.configtx] addToMap -> DEBU 1df1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 00:27:19.603 UTC [common.configtx] addToMap -> DEBU 1df2 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:27:19.603 UTC [common.configtx] addToMap -> DEBU 1df3 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:27:19.604 UTC [common.configtx] addToMap -> DEBU 1df4 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:27:19.604 UTC [common.configtx] addToMap -> DEBU 1df5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1df6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1df7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1df8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1df9 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1dfa Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:27:19.605 UTC [common.configtx] addToMap -> DEBU 1dfb Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1dfc Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1dfd Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1dfe Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1dff Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1e00 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:27:19.606 UTC [common.configtx] addToMap -> DEBU 1e01 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:27:19.607 UTC [common.configtx] addToMap -> DEBU 1e02 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:27:19.607 UTC [common.configtx] addToMap -> DEBU 1e03 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:27:19.607 UTC [common.configtx] addToMap -> DEBU 1e04 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:27:19.607 UTC [common.configtx] addToMap -> DEBU 1e05 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:27:19.607 UTC [common.configtx] addToMap -> DEBU 1e06 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:27:19.608 UTC [common.configtx] addToMap -> DEBU 1e07 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:27:19.608 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e08 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:27:19.609 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e09 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0a Manager Channel looking up path [Application]" +"2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0b Manager Channel has managers Application" +"2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0c Manager Channel has managers Orderer" +"2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0d Manager Channel/Application looking up path []" +"2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0e Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:27:19.609 UTC [policies] Manager -> DEBU 1e0f Manager Channel/Application has managers Org3MSP" +"2019-09-24 00:27:19.610 UTC [policies] Manager -> DEBU 1e10 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:27:19.610 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e11 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 00:27:19.610 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e12 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 00:27:19.610 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e13 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 00:27:19.611 UTC [policies] Manager -> DEBU 1e14 Manager Channel looking up path [Orderer]" +"2019-09-24 00:27:19.611 UTC [policies] Manager -> DEBU 1e15 Manager Channel has managers Application" +"2019-09-24 00:27:19.611 UTC [policies] Manager -> DEBU 1e16 Manager Channel has managers Orderer" +"2019-09-24 00:27:19.611 UTC [policies] Manager -> DEBU 1e17 Manager Channel/Orderer looking up path []" +"2019-09-24 00:27:19.611 UTC [policies] Manager -> DEBU 1e18 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:27:19.611 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e19 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:27:19.612 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e1a As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:27:19.612 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e1b As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:27:19.612 UTC [common.channelconfig] LogSanityChecks -> DEBU 1e1c As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:27:19.612 UTC [common.capabilities] Supported -> DEBU 1e1d Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 00:27:19.612 UTC [common.capabilities] Supported -> DEBU 1e1e Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:27:19.612 UTC [orderer.common.server] func1 -> DEBU 1e1f Executing callback to update root CAs" +"2019-09-24 00:27:19.613 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1e20 updating root CAs for channel [businesschannel]" +"2019-09-24 00:27:19.613 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1e21 adding app root CAs for MSP [Org3MSP]" +"2019-09-24 00:27:19.613 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1e22 adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 00:27:19.613 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1e23 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 00:27:19.613 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1e24 adding app root CAs for MSP [Org2MSP]" +"2019-09-24 00:27:19.614 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1e25 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +"2019-09-24 00:27:19.614 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1e26 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +"2019-09-24 00:27:19.615 UTC [msp] GetDefaultSigningIdentity -> DEBU 1e27 Obtaining default signing identity" +"2019-09-24 00:27:19.615 UTC [msp] GetDefaultSigningIdentity -> DEBU 1e28 Obtaining default signing identity" +"2019-09-24 00:27:19.615 UTC [msp.identity] Sign -> DEBU 1e29 Sign: plaintext: 0A020806120B0A090A03010203100418...19B9FED862AEBF9684AA9597BD65355D " +"2019-09-24 00:27:19.616 UTC [msp.identity] Sign -> DEBU 1e2a Sign: digest: 0DB504992BB2BC4B279886F9D8E65AB64F3AF2822E7651CF5308221B0B32C990 " +"2019-09-24 00:27:19.621 UTC [fsblkstorage] indexBlock -> DEBU 1e2b Indexing block [blockNum=6, blockHash=[]byte{0xdc, 0x84, 0x65, 0x18, 0xe3, 0xc4, 0x6b, 0x5f, 0x9e, 0xf2, 0x8f, 0xdd, 0x75, 0x8a, 0x58, 0xc2, 0xd7, 0x72, 0xdd, 0x0, 0xe9, 0x74, 0x6e, 0x75, 0x79, 0xca, 0xe6, 0xc4, 0x97, 0x98, 0x63, 0x3e} txOffsets= +txId=82a4197750a6c2e6027683be3495c6368937bcbe60f9626d8b78cceca622c16c locPointer=offset=71, bytesLength=33877 +]" +"2019-09-24 00:27:19.623 UTC [fsblkstorage] updateCheckpoint -> DEBU 1e2c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[118791], isChainEmpty=[false], lastBlockNumber=[6]" +"2019-09-24 00:27:19.623 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1e2d [channel: businesschannel] Wrote block [6]" +"2019-09-24 00:27:19.623 UTC [fsblkstorage] waitForBlock -> DEBU 1e2e Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:19.624 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e2f Remaining bytes=[34885], Going to peek [8] bytes" +"2019-09-24 00:27:19.624 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e30 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +"2019-09-24 00:27:19.624 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e31 blockbytes [34882] read from file [0]" +"2019-09-24 00:27:19.625 UTC [policies] Evaluate -> DEBU 1e32 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:19.625 UTC [policies] Evaluate -> DEBU 1e33 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.625 UTC [policies] Evaluate -> DEBU 1e34 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.625 UTC [policies] Evaluate -> DEBU 1e35 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.625 UTC [policies] Evaluate -> DEBU 1e36 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.626 UTC [msp] DeserializeIdentity -> DEBU 1e37 Obtaining identity" +"2019-09-24 00:27:19.626 UTC [msp.identity] newIdentity -> DEBU 1e38 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.627 UTC [cauthdsl] func1 -> DEBU 1e39 0xc000d0de80 gate 1569284839627699800 evaluation starts" +"2019-09-24 00:27:19.628 UTC [cauthdsl] func2 -> DEBU 1e3a 0xc000d0de80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.628 UTC [cauthdsl] func2 -> DEBU 1e3b 0xc000d0de80 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:19.628 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e3c Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:27:19.628 UTC [msp] Validate -> DEBU 1e3d MSP Org2MSP validating identity" +"2019-09-24 00:27:19.629 UTC [msp] getCertificationChain -> DEBU 1e3e MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.629 UTC [cauthdsl] func2 -> DEBU 1e3f 0xc000d0de80 principal matched by identity 0" +"2019-09-24 00:27:19.630 UTC [msp.identity] Verify -> DEBU 1e40 Verify: digest = 00000000 8b 03 97 43 70 c0 92 23 17 5e 03 ee 64 e6 97 15 |...Cp..#.^..d...| +00000010 02 e5 c8 62 47 03 7b 9c 1d 32 87 82 fc 68 3e 5b |...bG.{..2...h>[|" +"2019-09-24 00:27:19.630 UTC [msp.identity] Verify -> DEBU 1e41 Verify: sig = 00000000 30 44 02 20 31 f5 c5 93 d4 1d 90 90 18 dd 80 56 |0D. 1..........V| +00000010 9f 8f ca 24 d5 66 6c 6b 5f a8 6a fb ad 51 78 84 |...$.flk_.j..Qx.| +00000020 24 d7 ee fc 02 20 1a fe 63 11 78 f6 09 75 ed 1e |$.... ..c.x..u..| +00000030 ed 55 24 d6 52 91 c4 44 8c 94 19 3e f1 e1 0e 9c |.U$.R..D...>....| +00000040 9f c8 76 db 78 22 |..v.x"|" +"2019-09-24 00:27:19.630 UTC [cauthdsl] func2 -> DEBU 1e42 0xc000d0de80 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.631 UTC [cauthdsl] func1 -> DEBU 1e43 0xc000d0de80 gate 1569284839627699800 evaluation succeeds" +"2019-09-24 00:27:19.631 UTC [policies] Evaluate -> DEBU 1e44 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.631 UTC [policies] Evaluate -> DEBU 1e45 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.631 UTC [policies] Evaluate -> DEBU 1e46 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.632 UTC [policies] Evaluate -> DEBU 1e47 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.632 UTC [policies] Evaluate -> DEBU 1e48 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:19.632 UTC [policies] Evaluate -> DEBU 1e49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:19.632 UTC [common.deliver] deliverBlocks -> DEBU 1e4a [channel: businesschannel] Delivering block for (0xc000ac5680) for 172.18.0.6:42154" +"2019-09-24 00:27:19.632 UTC [fsblkstorage] waitForBlock -> DEBU 1e4b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:19.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e4c Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +"2019-09-24 00:27:19.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e4d Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +"2019-09-24 00:27:19.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 200.9µs " +"2019-09-24 00:27:19.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.4µs " +"2019-09-24 00:27:19.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e50 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:19.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e51 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:20.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e52 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:20.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e53 Sending msg of 28 bytes to 3 on channel testchainid took 10.4µs" +"2019-09-24 00:27:20.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 802µs " +"2019-09-24 00:27:20.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e55 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +"2019-09-24 00:27:20.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e56 Sending msg of 28 bytes to 3 on channel businesschannel took 77.6µs" +"2019-09-24 00:27:20.316 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.5µs " +"2019-09-24 00:27:20.316 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.3µs " +"2019-09-24 00:27:20.319 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e59 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:20.320 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e5a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:20.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e5b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:20.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5c Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +"2019-09-24 00:27:20.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 491.6µs " +"2019-09-24 00:27:20.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5e Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" +"2019-09-24 00:27:20.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5f Sending msg of 28 bytes to 3 on channel businesschannel took 183µs" +"2019-09-24 00:27:20.815 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 869.1µs " +"2019-09-24 00:27:20.815 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e61 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.6µs " +"2019-09-24 00:27:20.817 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e62 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:20.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e63 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:21.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e64 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:21.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e65 Sending msg of 28 bytes to 3 on channel testchainid took 11.6µs" +"2019-09-24 00:27:21.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.4µs " +"2019-09-24 00:27:21.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e67 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +"2019-09-24 00:27:21.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e68 Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +"2019-09-24 00:27:21.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 361.7µs " +"2019-09-24 00:27:21.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:21.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6b Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:21.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 768.5µs " +"2019-09-24 00:27:21.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:21.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e6e Sending msg of 28 bytes to 3 on channel testchainid took 23.8µs" +"2019-09-24 00:27:21.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.2µs " +"2019-09-24 00:27:21.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e70 Sending msg of 28 bytes to 2 on channel businesschannel took 174.2µs" +"2019-09-24 00:27:21.815 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e71 Sending msg of 28 bytes to 3 on channel businesschannel took 219.8µs" +"2019-09-24 00:27:21.816 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 232µs " +"2019-09-24 00:27:21.816 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 516.6µs " +"2019-09-24 00:27:21.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e74 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:21.818 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e75 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:22.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e76 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:22.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e77 Sending msg of 28 bytes to 3 on channel testchainid took 19.8µs" +"2019-09-24 00:27:22.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.9µs " +"2019-09-24 00:27:22.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e79 Sending msg of 28 bytes to 3 on channel businesschannel took 34.9µs" +"2019-09-24 00:27:22.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e7a Sending msg of 28 bytes to 2 on channel businesschannel took 26.7µs" +"2019-09-24 00:27:22.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.4µs " +"2019-09-24 00:27:22.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " +"2019-09-24 00:27:22.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7d Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:22.318 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7e Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:22.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7f Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:22.501 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e80 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2019-09-24 00:27:22.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.3µs " +"2019-09-24 00:27:22.554 UTC [orderer.common.server] Deliver -> DEBU 1e82 Starting new Deliver handler" +"2019-09-24 00:27:22.554 UTC [common.deliver] Handle -> DEBU 1e83 Starting new deliver loop for 172.18.0.9:32946" +"2019-09-24 00:27:22.554 UTC [common.deliver] Handle -> DEBU 1e84 Attempting to read seek info message from 172.18.0.9:32946" +"2019-09-24 00:27:22.554 UTC [policies] Evaluate -> DEBU 1e85 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:22.554 UTC [policies] Evaluate -> DEBU 1e86 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:22.555 UTC [policies] Evaluate -> DEBU 1e87 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:22.555 UTC [policies] Evaluate -> DEBU 1e88 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:22.556 UTC [policies] Evaluate -> DEBU 1e89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:22.556 UTC [msp] DeserializeIdentity -> DEBU 1e8a Obtaining identity" +"2019-09-24 00:27:22.556 UTC [msp.identity] newIdentity -> DEBU 1e8b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:22.558 UTC [cauthdsl] func1 -> DEBU 1e8c 0xc000d3cbd0 gate 1569284842558268100 evaluation starts" +"2019-09-24 00:27:22.558 UTC [cauthdsl] func2 -> DEBU 1e8d 0xc000d3cbd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:22.558 UTC [cauthdsl] func2 -> DEBU 1e8e 0xc000d3cbd0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:22.558 UTC [cauthdsl] func2 -> DEBU 1e8f 0xc000d3cbd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:22.559 UTC [cauthdsl] func2 -> DEBU 1e90 0xc000d3cbd0 principal evaluation fails" +"2019-09-24 00:27:22.559 UTC [cauthdsl] func1 -> DEBU 1e91 0xc000d3cbd0 gate 1569284842558268100 evaluation fails" +"2019-09-24 00:27:22.559 UTC [policies] Evaluate -> DEBU 1e92 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:22.559 UTC [policies] Evaluate -> DEBU 1e93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:22.559 UTC [policies] Evaluate -> DEBU 1e94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:22.559 UTC [cauthdsl] func1 -> DEBU 1e95 0xc000d3dd10 gate 1569284842559917800 evaluation starts" +"2019-09-24 00:27:22.560 UTC [cauthdsl] func2 -> DEBU 1e96 0xc000d3dd10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:22.560 UTC [cauthdsl] func2 -> DEBU 1e97 0xc000d3dd10 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:22.560 UTC [cauthdsl] func2 -> DEBU 1e98 0xc000d3dd10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:22.560 UTC [cauthdsl] func2 -> DEBU 1e99 0xc000d3dd10 principal evaluation fails" +"2019-09-24 00:27:22.561 UTC [cauthdsl] func1 -> DEBU 1e9a 0xc000d3dd10 gate 1569284842559917800 evaluation fails" +"2019-09-24 00:27:22.561 UTC [policies] Evaluate -> DEBU 1e9b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:22.561 UTC [policies] Evaluate -> DEBU 1e9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:22.561 UTC [policies] Evaluate -> DEBU 1e9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:22.562 UTC [cauthdsl] func1 -> DEBU 1e9e 0xc001022570 gate 1569284842562017800 evaluation starts" +"2019-09-24 00:27:22.562 UTC [cauthdsl] func2 -> DEBU 1e9f 0xc001022570 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:22.562 UTC [cauthdsl] func2 -> DEBU 1ea0 0xc001022570 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:22.562 UTC [cauthdsl] func2 -> DEBU 1ea1 0xc001022570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:22.562 UTC [cauthdsl] func2 -> DEBU 1ea2 0xc001022570 principal evaluation fails" +"2019-09-24 00:27:22.562 UTC [cauthdsl] func1 -> DEBU 1ea3 0xc001022570 gate 1569284842562017800 evaluation fails" +"2019-09-24 00:27:22.563 UTC [policies] Evaluate -> DEBU 1ea4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:22.563 UTC [policies] Evaluate -> DEBU 1ea5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:22.563 UTC [policies] func1 -> DEBU 1ea6 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:22.563 UTC [policies] Evaluate -> DEBU 1ea7 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:22.563 UTC [policies] Evaluate -> DEBU 1ea8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:22.564 UTC [policies] Evaluate -> DEBU 1ea9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:22.564 UTC [policies] Evaluate -> DEBU 1eaa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:22.564 UTC [policies] Evaluate -> DEBU 1eab == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:22.564 UTC [cauthdsl] func1 -> DEBU 1eac 0xc001023280 gate 1569284842564648800 evaluation starts" +"2019-09-24 00:27:22.564 UTC [cauthdsl] func2 -> DEBU 1ead 0xc001023280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:22.564 UTC [cauthdsl] func2 -> DEBU 1eae 0xc001023280 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:22.565 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1eaf Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 00:27:22.565 UTC [msp] Validate -> DEBU 1eb0 MSP OrdererMSP validating identity" +"2019-09-24 00:27:22.565 UTC [cauthdsl] func2 -> DEBU 1eb1 0xc001023280 principal matched by identity 0" +"2019-09-24 00:27:22.566 UTC [msp.identity] Verify -> DEBU 1eb2 Verify: digest = 00000000 96 18 25 28 7a 2c 7a b8 69 b7 25 db c3 a4 a3 b0 |..%(z,z.i.%.....| +00000010 1a 88 29 69 f7 fe 90 2b 2b dd c4 03 80 dc f1 c4 |..)i...++.......|" +"2019-09-24 00:27:22.566 UTC [msp.identity] Verify -> DEBU 1eb3 Verify: sig = 00000000 30 45 02 21 00 9a 62 1b 40 86 7c 75 0a 74 da a7 |0E.!..b.@.|u.t..| +00000010 90 de 13 51 84 e6 42 6c 09 7b 8c bd c8 e5 aa f4 |...Q..Bl.{......| +00000020 c6 0d b7 4d 80 02 20 63 7d bc 1a f6 74 45 32 92 |...M.. c}...tE2.| +00000030 60 6d d4 b9 51 25 6e 21 1d 51 14 25 c3 cf 29 62 |`m..Q%n!.Q.%..)b| +00000040 75 0f 17 64 f4 88 bf |u..d...|" +"2019-09-24 00:27:22.566 UTC [cauthdsl] func2 -> DEBU 1eb4 0xc001023280 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:22.566 UTC [cauthdsl] func1 -> DEBU 1eb5 0xc001023280 gate 1569284842564648800 evaluation succeeds" +"2019-09-24 00:27:22.566 UTC [policies] Evaluate -> DEBU 1eb6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:22.567 UTC [policies] Evaluate -> DEBU 1eb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:22.567 UTC [policies] Evaluate -> DEBU 1eb8 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:22.567 UTC [policies] Evaluate -> DEBU 1eb9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:22.567 UTC [policies] Evaluate -> DEBU 1eba Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:22.567 UTC [policies] Evaluate -> DEBU 1ebb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:22.567 UTC [common.deliver] deliverBlocks -> DEBU 1ebc [channel: businesschannel] Received seekInfo (0xc00130e480) start: > stop: > from 172.18.0.9:32946" +"2019-09-24 00:27:22.567 UTC [fsblkstorage] Next -> DEBU 1ebd Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:22.567 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ebe newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +"2019-09-24 00:27:22.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ebf Remaining bytes=[34885], Going to peek [8] bytes" +"2019-09-24 00:27:22.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ec0 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +"2019-09-24 00:27:22.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ec1 blockbytes [34882] read from file [0]" +"2019-09-24 00:27:22.568 UTC [common.deliver] deliverBlocks -> DEBU 1ec2 [channel: businesschannel] Delivering block for (0xc00130e480) for 172.18.0.9:32946" +"2019-09-24 00:27:22.569 UTC [common.deliver] deliverBlocks -> DEBU 1ec3 [channel: businesschannel] Done delivering to 172.18.0.9:32946 for (0xc00130e480)" +"2019-09-24 00:27:22.569 UTC [common.deliver] Handle -> DEBU 1ec4 Waiting for new SeekInfo from 172.18.0.9:32946" +"2019-09-24 00:27:22.569 UTC [common.deliver] Handle -> DEBU 1ec5 Attempting to read seek info message from 172.18.0.9:32946" +"2019-09-24 00:27:22.570 UTC [fsblkstorage] waitForBlock -> DEBU 1ec6 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:22.570 UTC [fsblkstorage] waitForBlock -> DEBU 1ec7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:22.577 UTC [common.deliver] Handle -> WARN 1ec8 Error reading from 172.18.0.9:32946: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:22.577 UTC [orderer.common.server] func1 -> DEBU 1ec9 Closing Deliver stream" +"2019-09-24 00:27:22.577 UTC [comm.grpc.server] 1 -> INFO 1eca streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32946 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.7396ms +"2019-09-24 00:27:22.577 UTC [grpc] infof -> DEBU 1ecb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:22.699 UTC [orderer.common.server] Deliver -> DEBU 1ecc Starting new Deliver handler" +"2019-09-24 00:27:22.699 UTC [common.deliver] Handle -> DEBU 1ecd Starting new deliver loop for 172.18.0.9:32948" +"2019-09-24 00:27:22.700 UTC [common.deliver] Handle -> DEBU 1ece Attempting to read seek info message from 172.18.0.9:32948" +"2019-09-24 00:27:22.702 UTC [policies] Evaluate -> DEBU 1ecf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:22.702 UTC [policies] Evaluate -> DEBU 1ed0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:22.703 UTC [policies] Evaluate -> DEBU 1ed1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:22.703 UTC [policies] Evaluate -> DEBU 1ed2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:22.703 UTC [policies] Evaluate -> DEBU 1ed3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:22.703 UTC [cauthdsl] func1 -> DEBU 1ed4 0xc001003260 gate 1569284842703787100 evaluation starts" +"2019-09-24 00:27:22.703 UTC [cauthdsl] func2 -> DEBU 1ed5 0xc001003260 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:22.704 UTC [cauthdsl] func2 -> DEBU 1ed6 0xc001003260 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:22.704 UTC [cauthdsl] func2 -> DEBU 1ed7 0xc001003260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:22.704 UTC [cauthdsl] func2 -> DEBU 1ed8 0xc001003260 principal evaluation fails" +"2019-09-24 00:27:22.704 UTC [cauthdsl] func1 -> DEBU 1ed9 0xc001003260 gate 1569284842703787100 evaluation fails" +"2019-09-24 00:27:22.704 UTC [policies] Evaluate -> DEBU 1eda Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:22.705 UTC [policies] Evaluate -> DEBU 1edb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:22.705 UTC [policies] Evaluate -> DEBU 1edc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:22.705 UTC [cauthdsl] func1 -> DEBU 1edd 0xc001003b50 gate 1569284842705317400 evaluation starts" +"2019-09-24 00:27:22.705 UTC [cauthdsl] func2 -> DEBU 1ede 0xc001003b50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:22.705 UTC [cauthdsl] func2 -> DEBU 1edf 0xc001003b50 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:22.705 UTC [cauthdsl] func2 -> DEBU 1ee0 0xc001003b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:22.706 UTC [cauthdsl] func2 -> DEBU 1ee1 0xc001003b50 principal evaluation fails" +"2019-09-24 00:27:22.706 UTC [cauthdsl] func1 -> DEBU 1ee2 0xc001003b50 gate 1569284842705317400 evaluation fails" +"2019-09-24 00:27:22.706 UTC [policies] Evaluate -> DEBU 1ee3 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:22.706 UTC [policies] Evaluate -> DEBU 1ee4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:22.706 UTC [policies] Evaluate -> DEBU 1ee5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:22.706 UTC [cauthdsl] func1 -> DEBU 1ee6 0xc000af8390 gate 1569284842706628000 evaluation starts" +"2019-09-24 00:27:22.706 UTC [cauthdsl] func2 -> DEBU 1ee7 0xc000af8390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:22.706 UTC [cauthdsl] func2 -> DEBU 1ee8 0xc000af8390 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:22.706 UTC [cauthdsl] func2 -> DEBU 1ee9 0xc000af8390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:22.707 UTC [cauthdsl] func2 -> DEBU 1eea 0xc000af8390 principal evaluation fails" +"2019-09-24 00:27:22.707 UTC [cauthdsl] func1 -> DEBU 1eeb 0xc000af8390 gate 1569284842706628000 evaluation fails" +"2019-09-24 00:27:22.707 UTC [policies] Evaluate -> DEBU 1eec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:22.707 UTC [policies] Evaluate -> DEBU 1eed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:22.707 UTC [policies] func1 -> DEBU 1eee Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-09-24 00:27:22.707 UTC [policies] Evaluate -> DEBU 1eef Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:22.707 UTC [policies] Evaluate -> DEBU 1ef0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:22.707 UTC [policies] Evaluate -> DEBU 1ef1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:22.708 UTC [policies] Evaluate -> DEBU 1ef2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:22.708 UTC [policies] Evaluate -> DEBU 1ef3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:22.708 UTC [cauthdsl] func1 -> DEBU 1ef4 0xc000af9080 gate 1569284842708383800 evaluation starts" +"2019-09-24 00:27:22.708 UTC [cauthdsl] func2 -> DEBU 1ef5 0xc000af9080 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:22.708 UTC [cauthdsl] func2 -> DEBU 1ef6 0xc000af9080 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:22.708 UTC [cauthdsl] func2 -> DEBU 1ef7 0xc000af9080 principal matched by identity 0" +"2019-09-24 00:27:22.708 UTC [msp.identity] Verify -> DEBU 1ef8 Verify: digest = 00000000 f2 d4 d5 23 9b 9d 15 9c 23 1b 6f 0c fe 54 e5 de |...#....#.o..T..| +00000010 9b 66 6f 3a 7c 7e 07 44 db f2 eb 00 a1 a2 34 86 |.fo:|~.D......4.|" +"2019-09-24 00:27:22.709 UTC [msp.identity] Verify -> DEBU 1ef9 Verify: sig = 00000000 30 44 02 20 61 50 6b 1c 43 37 92 9f 13 fc 4a 14 |0D. aPk.C7....J.| +00000010 da f2 f0 07 13 36 c4 29 4e de c2 92 04 dc 66 03 |.....6.)N.....f.| +00000020 c5 66 95 aa 02 20 3d 53 53 be 29 2c 85 61 6e 27 |.f... =SS.),.an'| +00000030 3e e0 c1 38 9e b0 41 30 3e a3 29 95 df b7 82 3c |>..8..A0>.)....<| +00000040 4d 09 10 52 2d c1 |M..R-.|" +"2019-09-24 00:27:22.709 UTC [cauthdsl] func2 -> DEBU 1efa 0xc000af9080 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:22.709 UTC [cauthdsl] func1 -> DEBU 1efb 0xc000af9080 gate 1569284842708383800 evaluation succeeds" +"2019-09-24 00:27:22.709 UTC [policies] Evaluate -> DEBU 1efc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:22.709 UTC [policies] Evaluate -> DEBU 1efd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:22.709 UTC [policies] Evaluate -> DEBU 1efe Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:22.710 UTC [policies] Evaluate -> DEBU 1eff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:22.710 UTC [policies] Evaluate -> DEBU 1f00 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:22.710 UTC [policies] Evaluate -> DEBU 1f01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:22.710 UTC [common.deliver] deliverBlocks -> DEBU 1f02 [channel: businesschannel] Received seekInfo (0xc0001d2a00) start: > stop: > from 172.18.0.9:32948" +"2019-09-24 00:27:22.711 UTC [fsblkstorage] Next -> DEBU 1f03 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:22.711 UTC [fsblkstorage] newBlockfileStream -> DEBU 1f04 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +"2019-09-24 00:27:22.711 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f05 Remaining bytes=[34885], Going to peek [8] bytes" +"2019-09-24 00:27:22.711 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f06 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +"2019-09-24 00:27:22.711 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f07 blockbytes [34882] read from file [0]" +"2019-09-24 00:27:22.712 UTC [common.deliver] deliverBlocks -> DEBU 1f08 [channel: businesschannel] Delivering block for (0xc0001d2a00) for 172.18.0.9:32948" +"2019-09-24 00:27:22.712 UTC [common.deliver] deliverBlocks -> DEBU 1f09 [channel: businesschannel] Done delivering to 172.18.0.9:32948 for (0xc0001d2a00)" +"2019-09-24 00:27:22.712 UTC [fsblkstorage] waitForBlock -> DEBU 1f0a Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:22.713 UTC [fsblkstorage] waitForBlock -> DEBU 1f0b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:22.712 UTC [common.deliver] Handle -> DEBU 1f0c Waiting for new SeekInfo from 172.18.0.9:32948" +"2019-09-24 00:27:22.713 UTC [common.deliver] Handle -> DEBU 1f0d Attempting to read seek info message from 172.18.0.9:32948" +"2019-09-24 00:27:22.717 UTC [grpc] infof -> DEBU 1f0e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:22.717 UTC [common.deliver] Handle -> WARN 1f0f Error reading from 172.18.0.9:32948: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:22.717 UTC [orderer.common.server] func1 -> DEBU 1f10 Closing Deliver stream" +"2019-09-24 00:27:22.717 UTC [comm.grpc.server] 1 -> INFO 1f11 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32948 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.1965ms +"2019-09-24 00:27:22.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f12 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +"2019-09-24 00:27:22.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f13 Sending msg of 28 bytes to 3 on channel businesschannel took 24µs" +"2019-09-24 00:27:22.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.8µs " +"2019-09-24 00:27:22.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.5µs " +"2019-09-24 00:27:22.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f16 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:22.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f17 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:22.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f18 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:22.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f19 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-09-24 00:27:22.999 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.1µs " +"2019-09-24 00:27:23.135 UTC [orderer.common.server] Deliver -> DEBU 1f1b Starting new Deliver handler" +"2019-09-24 00:27:23.136 UTC [common.deliver] Handle -> DEBU 1f1c Starting new deliver loop for 172.18.0.9:32950" +"2019-09-24 00:27:23.136 UTC [common.deliver] Handle -> DEBU 1f1d Attempting to read seek info message from 172.18.0.9:32950" +"2019-09-24 00:27:23.137 UTC [policies] Evaluate -> DEBU 1f1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:23.137 UTC [policies] Evaluate -> DEBU 1f1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.138 UTC [policies] Evaluate -> DEBU 1f20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:23.138 UTC [policies] Evaluate -> DEBU 1f21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.138 UTC [policies] Evaluate -> DEBU 1f22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:23.138 UTC [cauthdsl] func1 -> DEBU 1f23 0xc00131b9a0 gate 1569284843138765900 evaluation starts" +"2019-09-24 00:27:23.139 UTC [cauthdsl] func2 -> DEBU 1f24 0xc00131b9a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.139 UTC [cauthdsl] func2 -> DEBU 1f25 0xc00131b9a0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.139 UTC [cauthdsl] func2 -> DEBU 1f26 0xc00131b9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:23.140 UTC [cauthdsl] func2 -> DEBU 1f27 0xc00131b9a0 principal evaluation fails" +"2019-09-24 00:27:23.140 UTC [cauthdsl] func1 -> DEBU 1f28 0xc00131b9a0 gate 1569284843138765900 evaluation fails" +"2019-09-24 00:27:23.140 UTC [policies] Evaluate -> DEBU 1f29 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.140 UTC [policies] Evaluate -> DEBU 1f2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.140 UTC [policies] Evaluate -> DEBU 1f2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:23.141 UTC [cauthdsl] func1 -> DEBU 1f2c 0xc000cc8280 gate 1569284843140962100 evaluation starts" +"2019-09-24 00:27:23.141 UTC [cauthdsl] func2 -> DEBU 1f2d 0xc000cc8280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.141 UTC [cauthdsl] func2 -> DEBU 1f2e 0xc000cc8280 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.141 UTC [cauthdsl] func2 -> DEBU 1f2f 0xc000cc8280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:23.142 UTC [cauthdsl] func2 -> DEBU 1f30 0xc000cc8280 principal evaluation fails" +"2019-09-24 00:27:23.142 UTC [cauthdsl] func1 -> DEBU 1f31 0xc000cc8280 gate 1569284843140962100 evaluation fails" +"2019-09-24 00:27:23.142 UTC [policies] Evaluate -> DEBU 1f32 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.142 UTC [policies] Evaluate -> DEBU 1f33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.142 UTC [policies] Evaluate -> DEBU 1f34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:23.143 UTC [cauthdsl] func1 -> DEBU 1f35 0xc000cc8b20 gate 1569284843143194700 evaluation starts" +"2019-09-24 00:27:23.143 UTC [cauthdsl] func2 -> DEBU 1f36 0xc000cc8b20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.143 UTC [cauthdsl] func2 -> DEBU 1f37 0xc000cc8b20 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.144 UTC [cauthdsl] func2 -> DEBU 1f38 0xc000cc8b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:23.144 UTC [cauthdsl] func2 -> DEBU 1f39 0xc000cc8b20 principal evaluation fails" +"2019-09-24 00:27:23.144 UTC [cauthdsl] func1 -> DEBU 1f3a 0xc000cc8b20 gate 1569284843143194700 evaluation fails" +"2019-09-24 00:27:23.145 UTC [policies] Evaluate -> DEBU 1f3b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.145 UTC [policies] Evaluate -> DEBU 1f3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.146 UTC [policies] func1 -> DEBU 1f3d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:23.146 UTC [policies] Evaluate -> DEBU 1f3e Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:23.146 UTC [policies] Evaluate -> DEBU 1f3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:23.146 UTC [policies] Evaluate -> DEBU 1f40 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:23.146 UTC [policies] Evaluate -> DEBU 1f41 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.147 UTC [policies] Evaluate -> DEBU 1f42 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:23.148 UTC [cauthdsl] func1 -> DEBU 1f43 0xc000cc9810 gate 1569284843147978400 evaluation starts" +"2019-09-24 00:27:23.148 UTC [cauthdsl] func2 -> DEBU 1f44 0xc000cc9810 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.148 UTC [cauthdsl] func2 -> DEBU 1f45 0xc000cc9810 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.148 UTC [cauthdsl] func2 -> DEBU 1f46 0xc000cc9810 principal matched by identity 0" +"2019-09-24 00:27:23.148 UTC [msp.identity] Verify -> DEBU 1f47 Verify: digest = 00000000 bd ae 27 d2 10 d8 ed fb 3e c0 26 3e 9a 4f 73 27 |..'.....>.&>.Os'| +00000010 47 0b dd a0 77 e7 b8 da 25 29 c4 84 88 37 0f c0 |G...w...%)...7..|" +"2019-09-24 00:27:23.149 UTC [msp.identity] Verify -> DEBU 1f48 Verify: sig = 00000000 30 45 02 21 00 9b d0 af 27 a3 7e 89 57 83 38 cb |0E.!....'.~.W.8.| +00000010 ac 19 7a fa cd 82 32 c8 96 8a 7e b0 1f fa fb bd |..z...2...~.....| +00000020 7d 36 72 ec 33 02 20 16 07 ea 9a 9e 0e 9f ab 87 |}6r.3. .........| +00000030 d5 9e ac 31 1e 3a 00 7f 72 99 ee 6f ef 80 a9 a9 |...1.:..r..o....| +00000040 33 64 36 87 5d 13 e4 |3d6.]..|" +"2019-09-24 00:27:23.149 UTC [cauthdsl] func2 -> DEBU 1f49 0xc000cc9810 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:23.149 UTC [cauthdsl] func1 -> DEBU 1f4a 0xc000cc9810 gate 1569284843147978400 evaluation succeeds" +"2019-09-24 00:27:23.149 UTC [policies] Evaluate -> DEBU 1f4b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.149 UTC [policies] Evaluate -> DEBU 1f4c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.150 UTC [policies] Evaluate -> DEBU 1f4d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.150 UTC [policies] Evaluate -> DEBU 1f4e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.150 UTC [policies] Evaluate -> DEBU 1f4f Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:23.150 UTC [policies] Evaluate -> DEBU 1f50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:23.150 UTC [common.deliver] deliverBlocks -> DEBU 1f51 [channel: businesschannel] Received seekInfo (0xc0002c4e80) start: > stop: > from 172.18.0.9:32950" +"2019-09-24 00:27:23.150 UTC [fsblkstorage] Next -> DEBU 1f52 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:23.151 UTC [fsblkstorage] newBlockfileStream -> DEBU 1f53 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +"2019-09-24 00:27:23.151 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f54 Remaining bytes=[34885], Going to peek [8] bytes" +"2019-09-24 00:27:23.151 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f55 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +"2019-09-24 00:27:23.151 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f56 blockbytes [34882] read from file [0]" +"2019-09-24 00:27:23.152 UTC [common.deliver] deliverBlocks -> DEBU 1f57 [channel: businesschannel] Delivering block for (0xc0002c4e80) for 172.18.0.9:32950" +"2019-09-24 00:27:23.152 UTC [common.deliver] deliverBlocks -> DEBU 1f58 [channel: businesschannel] Done delivering to 172.18.0.9:32950 for (0xc0002c4e80)" +"2019-09-24 00:27:23.152 UTC [common.deliver] Handle -> DEBU 1f59 Waiting for new SeekInfo from 172.18.0.9:32950" +"2019-09-24 00:27:23.152 UTC [common.deliver] Handle -> DEBU 1f5a Attempting to read seek info message from 172.18.0.9:32950" +"2019-09-24 00:27:23.152 UTC [fsblkstorage] waitForBlock -> DEBU 1f5b Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:23.152 UTC [fsblkstorage] waitForBlock -> DEBU 1f5c Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:23.155 UTC [grpc] infof -> DEBU 1f5d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:23.155 UTC [common.deliver] Handle -> WARN 1f5e Error reading from 172.18.0.9:32950: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:23.155 UTC [orderer.common.server] func1 -> DEBU 1f5f Closing Deliver stream" +"2019-09-24 00:27:23.155 UTC [comm.grpc.server] 1 -> INFO 1f60 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32950 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.0944ms +"2019-09-24 00:27:23.297 UTC [orderer.common.server] Deliver -> DEBU 1f61 Starting new Deliver handler" +"2019-09-24 00:27:23.297 UTC [common.deliver] Handle -> DEBU 1f62 Starting new deliver loop for 172.18.0.9:32952" +"2019-09-24 00:27:23.297 UTC [common.deliver] Handle -> DEBU 1f63 Attempting to read seek info message from 172.18.0.9:32952" +"2019-09-24 00:27:23.299 UTC [policies] Evaluate -> DEBU 1f64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:23.299 UTC [policies] Evaluate -> DEBU 1f65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.299 UTC [policies] Evaluate -> DEBU 1f66 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:23.299 UTC [policies] Evaluate -> DEBU 1f67 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.300 UTC [policies] Evaluate -> DEBU 1f68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:23.300 UTC [cauthdsl] func1 -> DEBU 1f69 0xc000bfa320 gate 1569284843300228500 evaluation starts" +"2019-09-24 00:27:23.300 UTC [cauthdsl] func2 -> DEBU 1f6a 0xc000bfa320 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.300 UTC [cauthdsl] func2 -> DEBU 1f6b 0xc000bfa320 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.301 UTC [cauthdsl] func2 -> DEBU 1f6c 0xc000bfa320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:23.301 UTC [cauthdsl] func2 -> DEBU 1f6d 0xc000bfa320 principal evaluation fails" +"2019-09-24 00:27:23.301 UTC [cauthdsl] func1 -> DEBU 1f6e 0xc000bfa320 gate 1569284843300228500 evaluation fails" +"2019-09-24 00:27:23.301 UTC [policies] Evaluate -> DEBU 1f6f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.301 UTC [policies] Evaluate -> DEBU 1f70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.301 UTC [policies] Evaluate -> DEBU 1f71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:23.301 UTC [cauthdsl] func1 -> DEBU 1f72 0xc000bfab60 gate 1569284843301580900 evaluation starts" +"2019-09-24 00:27:23.301 UTC [cauthdsl] func2 -> DEBU 1f73 0xc000bfab60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.302 UTC [cauthdsl] func2 -> DEBU 1f74 0xc000bfab60 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.302 UTC [cauthdsl] func2 -> DEBU 1f75 0xc000bfab60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:23.302 UTC [cauthdsl] func2 -> DEBU 1f76 0xc000bfab60 principal evaluation fails" +"2019-09-24 00:27:23.302 UTC [cauthdsl] func1 -> DEBU 1f77 0xc000bfab60 gate 1569284843301580900 evaluation fails" +"2019-09-24 00:27:23.302 UTC [policies] Evaluate -> DEBU 1f78 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.302 UTC [policies] Evaluate -> DEBU 1f79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.302 UTC [policies] Evaluate -> DEBU 1f7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:23.303 UTC [cauthdsl] func1 -> DEBU 1f7b 0xc000bfb470 gate 1569284843303063300 evaluation starts" +"2019-09-24 00:27:23.303 UTC [cauthdsl] func2 -> DEBU 1f7c 0xc000bfb470 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.303 UTC [cauthdsl] func2 -> DEBU 1f7d 0xc000bfb470 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.303 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc000bfb470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:23.303 UTC [cauthdsl] func2 -> DEBU 1f7f 0xc000bfb470 principal evaluation fails" +"2019-09-24 00:27:23.303 UTC [cauthdsl] func1 -> DEBU 1f80 0xc000bfb470 gate 1569284843303063300 evaluation fails" +"2019-09-24 00:27:23.304 UTC [policies] Evaluate -> DEBU 1f81 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.304 UTC [policies] Evaluate -> DEBU 1f82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.304 UTC [policies] func1 -> DEBU 1f83 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:23.304 UTC [policies] Evaluate -> DEBU 1f84 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:23.304 UTC [policies] Evaluate -> DEBU 1f85 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:23.304 UTC [policies] Evaluate -> DEBU 1f86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:23.305 UTC [policies] Evaluate -> DEBU 1f87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.305 UTC [policies] Evaluate -> DEBU 1f88 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:23.305 UTC [cauthdsl] func1 -> DEBU 1f89 0xc000bc2180 gate 1569284843305515600 evaluation starts" +"2019-09-24 00:27:23.305 UTC [cauthdsl] func2 -> DEBU 1f8a 0xc000bc2180 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.305 UTC [cauthdsl] func2 -> DEBU 1f8b 0xc000bc2180 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.305 UTC [cauthdsl] func2 -> DEBU 1f8c 0xc000bc2180 principal matched by identity 0" +"2019-09-24 00:27:23.305 UTC [msp.identity] Verify -> DEBU 1f8d Verify: digest = 00000000 3b d8 d2 6f 97 f7 ca 69 bd c3 06 57 70 02 e9 6b |;..o...i...Wp..k| +00000010 7e 77 f5 e2 cb b4 82 7b aa 10 39 f3 8c 44 38 c3 |~w.....{..9..D8.|" +"2019-09-24 00:27:23.306 UTC [msp.identity] Verify -> DEBU 1f8e Verify: sig = 00000000 30 45 02 21 00 8a 84 ac 54 3b cd cf c5 2f 8f cf |0E.!....T;.../..| +00000010 95 11 a8 61 0c 5c 14 24 6b ae 7b f9 12 b0 59 8e |...a.\.$k.{...Y.| +00000020 59 dc c0 8c 82 02 20 58 b0 6e 5d b4 4f 4b 53 ec |Y..... X.n].OKS.| +00000030 87 07 1a 49 ff d8 ae f0 f2 3f d3 2f 51 76 b8 9b |...I.....?./Qv..| +00000040 4d f2 7e 8e e2 f6 cc |M.~....|" +"2019-09-24 00:27:23.306 UTC [cauthdsl] func2 -> DEBU 1f8f 0xc000bc2180 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:23.306 UTC [cauthdsl] func1 -> DEBU 1f90 0xc000bc2180 gate 1569284843305515600 evaluation succeeds" +"2019-09-24 00:27:23.306 UTC [policies] Evaluate -> DEBU 1f91 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.306 UTC [policies] Evaluate -> DEBU 1f92 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.306 UTC [policies] Evaluate -> DEBU 1f93 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.307 UTC [policies] Evaluate -> DEBU 1f94 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.307 UTC [policies] Evaluate -> DEBU 1f95 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:23.307 UTC [policies] Evaluate -> DEBU 1f96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:23.307 UTC [common.deliver] deliverBlocks -> DEBU 1f97 [channel: businesschannel] Received seekInfo (0xc0002c5380) start: > stop: > from 172.18.0.9:32952" +"2019-09-24 00:27:23.307 UTC [fsblkstorage] Next -> DEBU 1f98 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:23.307 UTC [fsblkstorage] newBlockfileStream -> DEBU 1f99 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +"2019-09-24 00:27:23.307 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f9a Remaining bytes=[34885], Going to peek [8] bytes" +"2019-09-24 00:27:23.308 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f9b Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +"2019-09-24 00:27:23.308 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f9c blockbytes [34882] read from file [0]" +"2019-09-24 00:27:23.308 UTC [common.deliver] deliverBlocks -> DEBU 1f9d [channel: businesschannel] Delivering block for (0xc0002c5380) for 172.18.0.9:32952" +"2019-09-24 00:27:23.308 UTC [common.deliver] deliverBlocks -> DEBU 1f9e [channel: businesschannel] Done delivering to 172.18.0.9:32952 for (0xc0002c5380)" +"2019-09-24 00:27:23.308 UTC [common.deliver] Handle -> DEBU 1f9f Waiting for new SeekInfo from 172.18.0.9:32952" +"2019-09-24 00:27:23.308 UTC [common.deliver] Handle -> DEBU 1fa0 Attempting to read seek info message from 172.18.0.9:32952" +"2019-09-24 00:27:23.309 UTC [fsblkstorage] waitForBlock -> DEBU 1fa1 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:23.309 UTC [fsblkstorage] waitForBlock -> DEBU 1fa2 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:23.311 UTC [policies] Evaluate -> DEBU 1fa3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:23.311 UTC [policies] Evaluate -> DEBU 1fa4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.311 UTC [policies] Evaluate -> DEBU 1fa5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:23.311 UTC [policies] Evaluate -> DEBU 1fa6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.311 UTC [policies] Evaluate -> DEBU 1fa7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:23.312 UTC [cauthdsl] func1 -> DEBU 1fa8 0xc000c4db50 gate 1569284843312108000 evaluation starts" +"2019-09-24 00:27:23.312 UTC [cauthdsl] func2 -> DEBU 1fa9 0xc000c4db50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.312 UTC [cauthdsl] func2 -> DEBU 1faa 0xc000c4db50 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.313 UTC [cauthdsl] func2 -> DEBU 1fab 0xc000c4db50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:23.313 UTC [cauthdsl] func2 -> DEBU 1fac 0xc000c4db50 principal evaluation fails" +"2019-09-24 00:27:23.313 UTC [cauthdsl] func1 -> DEBU 1fad 0xc000c4db50 gate 1569284843312108000 evaluation fails" +"2019-09-24 00:27:23.313 UTC [policies] Evaluate -> DEBU 1faf Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.313 UTC [policies] Evaluate -> DEBU 1fb0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.314 UTC [policies] Evaluate -> DEBU 1fb2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:23.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 304.3µs " +"2019-09-24 00:27:23.314 UTC [cauthdsl] func1 -> DEBU 1fb3 0xc000ba43b0 gate 1569284843314099200 evaluation starts" +"2019-09-24 00:27:23.314 UTC [cauthdsl] func2 -> DEBU 1fb4 0xc000ba43b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.314 UTC [cauthdsl] func2 -> DEBU 1fb5 0xc000ba43b0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.315 UTC [cauthdsl] func2 -> DEBU 1fb6 0xc000ba43b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:23.315 UTC [cauthdsl] func2 -> DEBU 1fb7 0xc000ba43b0 principal evaluation fails" +"2019-09-24 00:27:23.315 UTC [cauthdsl] func1 -> DEBU 1fb8 0xc000ba43b0 gate 1569284843314099200 evaluation fails" +"2019-09-24 00:27:23.315 UTC [policies] Evaluate -> DEBU 1fb9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.315 UTC [policies] Evaluate -> DEBU 1fba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.315 UTC [policies] Evaluate -> DEBU 1fbb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:23.315 UTC [cauthdsl] func1 -> DEBU 1fbc 0xc000b745c0 gate 1569284843315859600 evaluation starts" +"2019-09-24 00:27:23.316 UTC [cauthdsl] func2 -> DEBU 1fbd 0xc000b745c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.316 UTC [cauthdsl] func2 -> DEBU 1fbe 0xc000b745c0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.316 UTC [cauthdsl] func2 -> DEBU 1fbf 0xc000b745c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:23.316 UTC [cauthdsl] func2 -> DEBU 1fc0 0xc000b745c0 principal evaluation fails" +"2019-09-24 00:27:23.316 UTC [cauthdsl] func1 -> DEBU 1fc1 0xc000b745c0 gate 1569284843315859600 evaluation fails" +"2019-09-24 00:27:23.316 UTC [policies] Evaluate -> DEBU 1fc2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.316 UTC [policies] Evaluate -> DEBU 1fc3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.316 UTC [policies] func1 -> DEBU 1fc4 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:23.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fc5 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:23.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fae Sending msg of 28 bytes to 2 on channel businesschannel took 44.9µs" +"2019-09-24 00:27:23.317 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fc6 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2019-09-24 00:27:23.318 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.8µs " +"2019-09-24 00:27:23.317 UTC [policies] Evaluate -> DEBU 1fc8 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:23.318 UTC [policies] Evaluate -> DEBU 1fc9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:23.318 UTC [policies] Evaluate -> DEBU 1fca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:23.319 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fcb Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:23.319 UTC [policies] Evaluate -> DEBU 1fcc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.319 UTC [policies] Evaluate -> DEBU 1fcd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:23.320 UTC [cauthdsl] func1 -> DEBU 1fce 0xc000b75350 gate 1569284843320010700 evaluation starts" +"2019-09-24 00:27:23.320 UTC [cauthdsl] func2 -> DEBU 1fcf 0xc000b75350 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.320 UTC [cauthdsl] func2 -> DEBU 1fd0 0xc000b75350 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.320 UTC [cauthdsl] func2 -> DEBU 1fd1 0xc000b75350 principal matched by identity 0" +"2019-09-24 00:27:23.320 UTC [msp.identity] Verify -> DEBU 1fd2 Verify: digest = 00000000 77 78 d2 bc 1a 44 01 ae f2 89 02 df a6 b7 50 3a |wx...D........P:| +00000010 35 29 71 11 9e 67 ed 14 1d db ac f1 c4 d1 57 cd |5)q..g........W.|" +"2019-09-24 00:27:23.320 UTC [msp.identity] Verify -> DEBU 1fd3 Verify: sig = 00000000 30 45 02 21 00 aa 35 74 d7 8a 96 ae 70 39 f5 77 |0E.!..5t....p9.w| +00000010 14 32 30 4a 46 4b e5 ef 36 8b c8 62 fd 6c 04 31 |.20JFK..6..b.l.1| +00000020 7b e5 92 0f 38 02 20 2d c4 58 24 bd 47 d6 99 99 |{...8. -.X$.G...| +00000030 a6 ed 0c 27 75 f5 8b 09 94 16 4a 47 0b e7 3c 4e |...'u.....JG.. DEBU 1fd4 0xc000b75350 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:23.320 UTC [cauthdsl] func1 -> DEBU 1fd5 0xc000b75350 gate 1569284843320010700 evaluation succeeds" +"2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fd6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fd7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fd8 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fd9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fda Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:23.321 UTC [policies] Evaluate -> DEBU 1fdb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:23.321 UTC [common.deliver] deliverBlocks -> DEBU 1fdc [channel: businesschannel] Received seekInfo (0xc0001d3dc0) start: > stop: > from 172.18.0.9:32952" +"2019-09-24 00:27:23.321 UTC [fsblkstorage] Next -> DEBU 1fdd Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:23.322 UTC [fsblkstorage] newBlockfileStream -> DEBU 1fde newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +"2019-09-24 00:27:23.322 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1fdf Remaining bytes=[34885], Going to peek [8] bytes" +"2019-09-24 00:27:23.322 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1fe0 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +"2019-09-24 00:27:23.322 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1fe1 blockbytes [34882] read from file [0]" +"2019-09-24 00:27:23.322 UTC [common.deliver] deliverBlocks -> DEBU 1fe2 [channel: businesschannel] Delivering block for (0xc0001d3dc0) for 172.18.0.9:32952" +"2019-09-24 00:27:23.322 UTC [common.deliver] deliverBlocks -> DEBU 1fe3 [channel: businesschannel] Done delivering to 172.18.0.9:32952 for (0xc0001d3dc0)" +"2019-09-24 00:27:23.323 UTC [fsblkstorage] waitForBlock -> DEBU 1fe5 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:23.323 UTC [fsblkstorage] waitForBlock -> DEBU 1fe6 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:23.323 UTC [common.deliver] Handle -> DEBU 1fe4 Waiting for new SeekInfo from 172.18.0.9:32952" +"2019-09-24 00:27:23.323 UTC [common.deliver] Handle -> DEBU 1fe7 Attempting to read seek info message from 172.18.0.9:32952" +"2019-09-24 00:27:23.331 UTC [grpc] warningf -> DEBU 1fe8 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:32952: read: connection reset by peer" +"2019-09-24 00:27:23.331 UTC [grpc] infof -> DEBU 1fe9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:23.332 UTC [common.deliver] Handle -> WARN 1fea Error reading from 172.18.0.9:32952: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:23.332 UTC [orderer.common.server] func1 -> DEBU 1feb Closing Deliver stream" +"2019-09-24 00:27:23.332 UTC [comm.grpc.server] 1 -> INFO 1fec streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32952 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.2301ms +"2019-09-24 00:27:23.458 UTC [orderer.common.server] Deliver -> DEBU 1fed Starting new Deliver handler" +"2019-09-24 00:27:23.458 UTC [common.deliver] Handle -> DEBU 1fee Starting new deliver loop for 172.18.0.9:32954" +"2019-09-24 00:27:23.458 UTC [common.deliver] Handle -> DEBU 1fef Attempting to read seek info message from 172.18.0.9:32954" +"2019-09-24 00:27:23.460 UTC [policies] Evaluate -> DEBU 1ff0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:23.460 UTC [policies] Evaluate -> DEBU 1ff1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.460 UTC [policies] Evaluate -> DEBU 1ff2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:23.461 UTC [policies] Evaluate -> DEBU 1ff3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.461 UTC [policies] Evaluate -> DEBU 1ff4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:23.461 UTC [cauthdsl] func1 -> DEBU 1ff5 0xc000ba5da0 gate 1569284843461561100 evaluation starts" +"2019-09-24 00:27:23.461 UTC [cauthdsl] func2 -> DEBU 1ff6 0xc000ba5da0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.462 UTC [cauthdsl] func2 -> DEBU 1ff7 0xc000ba5da0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.462 UTC [cauthdsl] func2 -> DEBU 1ff8 0xc000ba5da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:23.462 UTC [cauthdsl] func2 -> DEBU 1ff9 0xc000ba5da0 principal evaluation fails" +"2019-09-24 00:27:23.462 UTC [cauthdsl] func1 -> DEBU 1ffa 0xc000ba5da0 gate 1569284843461561100 evaluation fails" +"2019-09-24 00:27:23.462 UTC [policies] Evaluate -> DEBU 1ffb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.463 UTC [policies] Evaluate -> DEBU 1ffc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.463 UTC [policies] Evaluate -> DEBU 1ffd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:23.463 UTC [cauthdsl] func1 -> DEBU 1ffe 0xc000b085e0 gate 1569284843463503500 evaluation starts" +"2019-09-24 00:27:23.463 UTC [cauthdsl] func2 -> DEBU 1fff 0xc000b085e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.463 UTC [cauthdsl] func2 -> DEBU 2000 0xc000b085e0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.464 UTC [cauthdsl] func2 -> DEBU 2001 0xc000b085e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:23.464 UTC [cauthdsl] func2 -> DEBU 2002 0xc000b085e0 principal evaluation fails" +"2019-09-24 00:27:23.464 UTC [cauthdsl] func1 -> DEBU 2003 0xc000b085e0 gate 1569284843463503500 evaluation fails" +"2019-09-24 00:27:23.465 UTC [policies] Evaluate -> DEBU 2004 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.466 UTC [policies] Evaluate -> DEBU 2005 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.466 UTC [policies] Evaluate -> DEBU 2006 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:23.466 UTC [cauthdsl] func1 -> DEBU 2007 0xc000b08f20 gate 1569284843466502800 evaluation starts" +"2019-09-24 00:27:23.466 UTC [cauthdsl] func2 -> DEBU 2008 0xc000b08f20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.467 UTC [cauthdsl] func2 -> DEBU 2009 0xc000b08f20 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.467 UTC [cauthdsl] func2 -> DEBU 200a 0xc000b08f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:23.467 UTC [cauthdsl] func2 -> DEBU 200b 0xc000b08f20 principal evaluation fails" +"2019-09-24 00:27:23.467 UTC [cauthdsl] func1 -> DEBU 200c 0xc000b08f20 gate 1569284843466502800 evaluation fails" +"2019-09-24 00:27:23.467 UTC [policies] Evaluate -> DEBU 200d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.468 UTC [policies] Evaluate -> DEBU 200e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.468 UTC [policies] func1 -> DEBU 200f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 00:27:23.469 UTC [policies] Evaluate -> DEBU 2010 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:23.469 UTC [policies] Evaluate -> DEBU 2011 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:23.469 UTC [policies] Evaluate -> DEBU 2012 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:23.469 UTC [policies] Evaluate -> DEBU 2013 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.469 UTC [policies] Evaluate -> DEBU 2014 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:23.469 UTC [cauthdsl] func1 -> DEBU 2015 0xc000b09c10 gate 1569284843469936800 evaluation starts" +"2019-09-24 00:27:23.470 UTC [cauthdsl] func2 -> DEBU 2016 0xc000b09c10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.470 UTC [cauthdsl] func2 -> DEBU 2017 0xc000b09c10 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.470 UTC [cauthdsl] func2 -> DEBU 2018 0xc000b09c10 principal matched by identity 0" +"2019-09-24 00:27:23.470 UTC [msp.identity] Verify -> DEBU 2019 Verify: digest = 00000000 d3 f9 d5 71 08 d2 37 02 66 3c 83 20 fd 1c 52 e2 |...q..7.f<. ..R.| +00000010 5a 0a c2 da dd 29 5d 6b 1a 77 18 d2 e9 bd 10 a7 |Z....)]k.w......|" +"2019-09-24 00:27:23.471 UTC [msp.identity] Verify -> DEBU 201a Verify: sig = 00000000 30 44 02 20 2f a7 05 4f cb 87 81 51 5a 55 13 1b |0D. /..O...QZU..| +00000010 7d 49 af db 1f bb 2a f0 94 f3 b8 57 a4 24 30 ac |}I....*....W.$0.| +00000020 82 2d 4d 33 02 20 3f cb ae d2 8b 49 ec e0 b5 9c |.-M3. ?....I....| +00000030 39 d9 4e ce 17 11 d4 c6 33 e3 b2 05 45 40 44 b6 |9.N.....3...E@D.| +00000040 21 a7 e5 b2 d1 db |!.....|" +"2019-09-24 00:27:23.471 UTC [cauthdsl] func2 -> DEBU 201b 0xc000b09c10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:23.471 UTC [cauthdsl] func1 -> DEBU 201c 0xc000b09c10 gate 1569284843469936800 evaluation succeeds" +"2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 201d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 201e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 201f Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 2020 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 2021 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:23.471 UTC [policies] Evaluate -> DEBU 2022 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:23.472 UTC [common.deliver] deliverBlocks -> DEBU 2023 [channel: businesschannel] Received seekInfo (0xc001186400) start: > stop: > from 172.18.0.9:32954" +"2019-09-24 00:27:23.472 UTC [fsblkstorage] Next -> DEBU 2024 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:23.472 UTC [fsblkstorage] newBlockfileStream -> DEBU 2025 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-09-24 00:27:23.472 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2026 Remaining bytes=[118791], Going to peek [8] bytes" +"2019-09-24 00:27:23.473 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2027 Returning blockbytes - length=[23945], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:27:23.473 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2028 blockbytes [23945] read from file [0]" +"2019-09-24 00:27:23.473 UTC [common.deliver] deliverBlocks -> DEBU 2029 [channel: businesschannel] Delivering block for (0xc001186400) for 172.18.0.9:32954" +"2019-09-24 00:27:23.474 UTC [common.deliver] deliverBlocks -> DEBU 202a [channel: businesschannel] Done delivering to 172.18.0.9:32954 for (0xc001186400)" +"2019-09-24 00:27:23.474 UTC [common.deliver] Handle -> DEBU 202b Waiting for new SeekInfo from 172.18.0.9:32954" +"2019-09-24 00:27:23.474 UTC [common.deliver] Handle -> DEBU 202c Attempting to read seek info message from 172.18.0.9:32954" +"2019-09-24 00:27:23.474 UTC [fsblkstorage] waitForBlock -> DEBU 202d Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:23.474 UTC [fsblkstorage] waitForBlock -> DEBU 202e Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:23.490 UTC [grpc] infof -> DEBU 202f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:23.490 UTC [common.deliver] Handle -> WARN 2030 Error reading from 172.18.0.9:32954: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:23.490 UTC [orderer.common.server] func1 -> DEBU 2031 Closing Deliver stream" +"2019-09-24 00:27:23.491 UTC [comm.grpc.server] 1 -> INFO 2032 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32954 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.5315ms +"2019-09-24 00:27:23.502 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2033 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:23.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2034 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2019-09-24 00:27:23.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2035 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.8µs " +"2019-09-24 00:27:23.653 UTC [orderer.common.server] Deliver -> DEBU 2036 Starting new Deliver handler" +"2019-09-24 00:27:23.653 UTC [common.deliver] Handle -> DEBU 2037 Starting new deliver loop for 172.18.0.9:32956" +"2019-09-24 00:27:23.653 UTC [common.deliver] Handle -> DEBU 2038 Attempting to read seek info message from 172.18.0.9:32956" +"2019-09-24 00:27:23.654 UTC [policies] Evaluate -> DEBU 2039 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:23.654 UTC [policies] Evaluate -> DEBU 203a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.654 UTC [policies] Evaluate -> DEBU 203b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:23.654 UTC [policies] Evaluate -> DEBU 203c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.655 UTC [policies] Evaluate -> DEBU 203d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:23.655 UTC [cauthdsl] func1 -> DEBU 203e 0xc00088e010 gate 1569284843655273500 evaluation starts" +"2019-09-24 00:27:23.655 UTC [cauthdsl] func2 -> DEBU 203f 0xc00088e010 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.656 UTC [cauthdsl] func2 -> DEBU 2040 0xc00088e010 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.657 UTC [cauthdsl] func2 -> DEBU 2041 0xc00088e010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:23.657 UTC [cauthdsl] func2 -> DEBU 2042 0xc00088e010 principal evaluation fails" +"2019-09-24 00:27:23.657 UTC [cauthdsl] func1 -> DEBU 2043 0xc00088e010 gate 1569284843655273500 evaluation fails" +"2019-09-24 00:27:23.657 UTC [policies] Evaluate -> DEBU 2044 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.657 UTC [policies] Evaluate -> DEBU 2045 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.657 UTC [policies] Evaluate -> DEBU 2046 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:23.658 UTC [cauthdsl] func1 -> DEBU 2047 0xc00088e960 gate 1569284843658033900 evaluation starts" +"2019-09-24 00:27:23.658 UTC [cauthdsl] func2 -> DEBU 2048 0xc00088e960 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.658 UTC [cauthdsl] func2 -> DEBU 2049 0xc00088e960 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.658 UTC [cauthdsl] func2 -> DEBU 204a 0xc00088e960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:23.658 UTC [cauthdsl] func2 -> DEBU 204b 0xc00088e960 principal evaluation fails" +"2019-09-24 00:27:23.658 UTC [cauthdsl] func1 -> DEBU 204c 0xc00088e960 gate 1569284843658033900 evaluation fails" +"2019-09-24 00:27:23.658 UTC [policies] Evaluate -> DEBU 204d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.658 UTC [policies] Evaluate -> DEBU 204e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.658 UTC [policies] Evaluate -> DEBU 204f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:23.659 UTC [cauthdsl] func1 -> DEBU 2050 0xc00088f300 gate 1569284843659029100 evaluation starts" +"2019-09-24 00:27:23.659 UTC [cauthdsl] func2 -> DEBU 2051 0xc00088f300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.659 UTC [cauthdsl] func2 -> DEBU 2052 0xc00088f300 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.659 UTC [cauthdsl] func2 -> DEBU 2053 0xc00088f300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:23.659 UTC [cauthdsl] func2 -> DEBU 2054 0xc00088f300 principal evaluation fails" +"2019-09-24 00:27:23.659 UTC [cauthdsl] func1 -> DEBU 2055 0xc00088f300 gate 1569284843659029100 evaluation fails" +"2019-09-24 00:27:23.659 UTC [policies] Evaluate -> DEBU 2056 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.659 UTC [policies] Evaluate -> DEBU 2057 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.659 UTC [policies] func1 -> DEBU 2058 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:23.660 UTC [policies] Evaluate -> DEBU 2059 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:23.660 UTC [policies] Evaluate -> DEBU 205a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:23.660 UTC [policies] Evaluate -> DEBU 205b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:23.660 UTC [policies] Evaluate -> DEBU 205c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.660 UTC [policies] Evaluate -> DEBU 205d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:23.660 UTC [cauthdsl] func1 -> DEBU 205e 0xc00088fff0 gate 1569284843660665100 evaluation starts" +"2019-09-24 00:27:23.660 UTC [cauthdsl] func2 -> DEBU 205f 0xc00088fff0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.660 UTC [cauthdsl] func2 -> DEBU 2060 0xc00088fff0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.660 UTC [cauthdsl] func2 -> DEBU 2061 0xc00088fff0 principal matched by identity 0" +"2019-09-24 00:27:23.661 UTC [msp.identity] Verify -> DEBU 2062 Verify: digest = 00000000 77 cf d1 ff d0 ef 21 dc cc 6e 33 38 23 b3 7a c0 |w.....!..n38#.z.| +00000010 6a 58 92 c3 95 34 cc 72 e0 b0 8f 6d d1 77 21 76 |jX...4.r...m.w!v|" +"2019-09-24 00:27:23.661 UTC [msp.identity] Verify -> DEBU 2063 Verify: sig = 00000000 30 44 02 20 04 69 84 d2 8a f7 01 11 3d cc 9e f4 |0D. .i......=...| +00000010 41 53 e6 3c 68 6d 20 3f 77 5e ff 1a fa 95 bd a9 |AS. DEBU 2064 0xc00088fff0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:23.661 UTC [cauthdsl] func1 -> DEBU 2065 0xc00088fff0 gate 1569284843660665100 evaluation succeeds" +"2019-09-24 00:27:23.661 UTC [policies] Evaluate -> DEBU 2066 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.661 UTC [policies] Evaluate -> DEBU 2067 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.661 UTC [policies] Evaluate -> DEBU 2068 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.662 UTC [policies] Evaluate -> DEBU 2069 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.662 UTC [policies] Evaluate -> DEBU 206a Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:23.662 UTC [policies] Evaluate -> DEBU 206b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:23.662 UTC [common.deliver] deliverBlocks -> DEBU 206c [channel: businesschannel] Received seekInfo (0xc0008f2340) start: > stop: > from 172.18.0.9:32956" +"2019-09-24 00:27:23.662 UTC [fsblkstorage] Next -> DEBU 206d Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:23.662 UTC [fsblkstorage] newBlockfileStream -> DEBU 206e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23948]" +"2019-09-24 00:27:23.662 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 206f Remaining bytes=[94843], Going to peek [8] bytes" +"2019-09-24 00:27:23.663 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2070 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23948], bytesOffset=[23951]}" +"2019-09-24 00:27:23.663 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2071 blockbytes [23690] read from file [0]" +"2019-09-24 00:27:23.663 UTC [common.deliver] deliverBlocks -> DEBU 2072 [channel: businesschannel] Delivering block for (0xc0008f2340) for 172.18.0.9:32956" +"2019-09-24 00:27:23.663 UTC [common.deliver] deliverBlocks -> DEBU 2073 [channel: businesschannel] Done delivering to 172.18.0.9:32956 for (0xc0008f2340)" +"2019-09-24 00:27:23.664 UTC [common.deliver] Handle -> DEBU 2074 Waiting for new SeekInfo from 172.18.0.9:32956" +"2019-09-24 00:27:23.664 UTC [common.deliver] Handle -> DEBU 2076 Attempting to read seek info message from 172.18.0.9:32956" +"2019-09-24 00:27:23.664 UTC [fsblkstorage] waitForBlock -> DEBU 2075 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:23.664 UTC [fsblkstorage] waitForBlock -> DEBU 2077 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:23.671 UTC [common.deliver] Handle -> WARN 2078 Error reading from 172.18.0.9:32956: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:23.672 UTC [orderer.common.server] func1 -> DEBU 207a Closing Deliver stream" +"2019-09-24 00:27:23.672 UTC [comm.grpc.server] 1 -> INFO 207b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32956 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.9623ms +"2019-09-24 00:27:23.671 UTC [grpc] infof -> DEBU 2079 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:23.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 207c Sending msg of 28 bytes to 2 on channel businesschannel took 15.3µs" +"2019-09-24 00:27:23.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 207d Sending msg of 28 bytes to 3 on channel businesschannel took 7.3µs" +"2019-09-24 00:27:23.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 207e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.2µs " +"2019-09-24 00:27:23.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 207f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.1µs " +"2019-09-24 00:27:23.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2080 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:23.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2081 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:23.824 UTC [orderer.common.server] Deliver -> DEBU 2082 Starting new Deliver handler" +"2019-09-24 00:27:23.824 UTC [common.deliver] Handle -> DEBU 2083 Starting new deliver loop for 172.18.0.9:32958" +"2019-09-24 00:27:23.824 UTC [common.deliver] Handle -> DEBU 2084 Attempting to read seek info message from 172.18.0.9:32958" +"2019-09-24 00:27:23.825 UTC [policies] Evaluate -> DEBU 2085 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:23.825 UTC [policies] Evaluate -> DEBU 2086 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.826 UTC [policies] Evaluate -> DEBU 2087 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:23.826 UTC [policies] Evaluate -> DEBU 2088 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.826 UTC [policies] Evaluate -> DEBU 2089 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:23.826 UTC [cauthdsl] func1 -> DEBU 208a 0xc000176f30 gate 1569284843826939100 evaluation starts" +"2019-09-24 00:27:23.827 UTC [cauthdsl] func2 -> DEBU 208b 0xc000176f30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.827 UTC [cauthdsl] func2 -> DEBU 208c 0xc000176f30 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.828 UTC [cauthdsl] func2 -> DEBU 208d 0xc000176f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:23.828 UTC [cauthdsl] func2 -> DEBU 208e 0xc000176f30 principal evaluation fails" +"2019-09-24 00:27:23.828 UTC [cauthdsl] func1 -> DEBU 208f 0xc000176f30 gate 1569284843826939100 evaluation fails" +"2019-09-24 00:27:23.828 UTC [policies] Evaluate -> DEBU 2090 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.828 UTC [policies] Evaluate -> DEBU 2091 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.828 UTC [policies] Evaluate -> DEBU 2092 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:23.829 UTC [cauthdsl] func1 -> DEBU 2093 0xc0001778c0 gate 1569284843829172800 evaluation starts" +"2019-09-24 00:27:23.829 UTC [cauthdsl] func2 -> DEBU 2094 0xc0001778c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.829 UTC [cauthdsl] func2 -> DEBU 2095 0xc0001778c0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.830 UTC [cauthdsl] func2 -> DEBU 2096 0xc0001778c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:23.830 UTC [cauthdsl] func2 -> DEBU 2097 0xc0001778c0 principal evaluation fails" +"2019-09-24 00:27:23.830 UTC [cauthdsl] func1 -> DEBU 2098 0xc0001778c0 gate 1569284843829172800 evaluation fails" +"2019-09-24 00:27:23.830 UTC [policies] Evaluate -> DEBU 2099 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.831 UTC [policies] Evaluate -> DEBU 209a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:23.831 UTC [policies] Evaluate -> DEBU 209b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:23.831 UTC [cauthdsl] func1 -> DEBU 209c 0xc000283e20 gate 1569284843831678500 evaluation starts" +"2019-09-24 00:27:23.832 UTC [cauthdsl] func2 -> DEBU 209d 0xc000283e20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.832 UTC [cauthdsl] func2 -> DEBU 209e 0xc000283e20 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.832 UTC [cauthdsl] func2 -> DEBU 209f 0xc000283e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:23.833 UTC [cauthdsl] func2 -> DEBU 20a0 0xc000283e20 principal evaluation fails" +"2019-09-24 00:27:23.833 UTC [cauthdsl] func1 -> DEBU 20a1 0xc000283e20 gate 1569284843831678500 evaluation fails" +"2019-09-24 00:27:23.833 UTC [policies] Evaluate -> DEBU 20a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.833 UTC [policies] Evaluate -> DEBU 20a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:23.834 UTC [policies] func1 -> DEBU 20a4 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:23.834 UTC [policies] Evaluate -> DEBU 20a5 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:23.834 UTC [policies] Evaluate -> DEBU 20a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:23.834 UTC [policies] Evaluate -> DEBU 20a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:23.834 UTC [policies] Evaluate -> DEBU 20a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.834 UTC [policies] Evaluate -> DEBU 20a9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:23.835 UTC [cauthdsl] func1 -> DEBU 20aa 0xc0003c4b40 gate 1569284843834993900 evaluation starts" +"2019-09-24 00:27:23.835 UTC [cauthdsl] func2 -> DEBU 20ab 0xc0003c4b40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.835 UTC [cauthdsl] func2 -> DEBU 20ac 0xc0003c4b40 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:23.835 UTC [cauthdsl] func2 -> DEBU 20ad 0xc0003c4b40 principal matched by identity 0" +"2019-09-24 00:27:23.835 UTC [msp.identity] Verify -> DEBU 20ae Verify: digest = 00000000 79 fe 64 fb 75 72 bb b3 a6 aa 91 f8 49 34 e7 36 |y.d.ur......I4.6| +00000010 b9 16 0f 05 be a0 51 bb 7b 8d a4 20 8f 72 72 ec |......Q.{.. .rr.|" +"2019-09-24 00:27:23.835 UTC [msp.identity] Verify -> DEBU 20af Verify: sig = 00000000 30 44 02 20 46 c7 4f d3 f6 2b 6a b9 9b c7 41 d0 |0D. F.O..+j...A.| +00000010 90 e3 45 c6 f2 45 04 8f 43 17 f2 17 1b b3 37 10 |..E..E..C.....7.| +00000020 9a be c7 f0 02 20 0e ab ba 3d 99 7c 56 0b 72 1d |..... ...=.|V.r.| +00000030 ea 18 71 1f 16 99 07 8d 2b 2b 23 71 24 1c 24 6c |..q.....++#q$.$l| +00000040 12 45 fb 23 b5 8b |.E.#..|" +"2019-09-24 00:27:23.836 UTC [cauthdsl] func2 -> DEBU 20b0 0xc0003c4b40 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:23.854 UTC [cauthdsl] func1 -> DEBU 20b1 0xc0003c4b40 gate 1569284843834993900 evaluation succeeds" +"2019-09-24 00:27:23.854 UTC [policies] Evaluate -> DEBU 20b2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.854 UTC [policies] Evaluate -> DEBU 20b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:23.856 UTC [policies] Evaluate -> DEBU 20b4 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.856 UTC [policies] Evaluate -> DEBU 20b5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:23.857 UTC [policies] Evaluate -> DEBU 20b6 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:23.857 UTC [policies] Evaluate -> DEBU 20b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:23.857 UTC [common.deliver] deliverBlocks -> DEBU 20b8 [channel: businesschannel] Received seekInfo (0xc0008f2c80) start: > stop: > from 172.18.0.9:32958" +"2019-09-24 00:27:23.857 UTC [fsblkstorage] Next -> DEBU 20b9 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:23.857 UTC [fsblkstorage] newBlockfileStream -> DEBU 20ba newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47641]" +"2019-09-24 00:27:23.858 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 20bb Remaining bytes=[71150], Going to peek [8] bytes" +"2019-09-24 00:27:23.858 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 20bc Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47641], bytesOffset=[47644]}" +"2019-09-24 00:27:23.858 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 20bd blockbytes [23747] read from file [0]" +"2019-09-24 00:27:23.859 UTC [common.deliver] deliverBlocks -> DEBU 20be [channel: businesschannel] Delivering block for (0xc0008f2c80) for 172.18.0.9:32958" +"2019-09-24 00:27:23.859 UTC [common.deliver] deliverBlocks -> DEBU 20bf [channel: businesschannel] Done delivering to 172.18.0.9:32958 for (0xc0008f2c80)" +"2019-09-24 00:27:23.860 UTC [fsblkstorage] waitForBlock -> DEBU 20c0 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:23.860 UTC [fsblkstorage] waitForBlock -> DEBU 20c1 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:23.859 UTC [common.deliver] Handle -> DEBU 20c2 Waiting for new SeekInfo from 172.18.0.9:32958" +"2019-09-24 00:27:23.861 UTC [common.deliver] Handle -> DEBU 20c3 Attempting to read seek info message from 172.18.0.9:32958" +"2019-09-24 00:27:23.867 UTC [grpc] infof -> DEBU 20c4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:23.868 UTC [common.deliver] Handle -> WARN 20c5 Error reading from 172.18.0.9:32958: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:23.868 UTC [orderer.common.server] func1 -> DEBU 20c6 Closing Deliver stream" +"2019-09-24 00:27:23.868 UTC [comm.grpc.server] 1 -> INFO 20c7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32958 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.8304ms +"2019-09-24 00:27:23.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 20c8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:24.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 20c9 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-09-24 00:27:24.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 20ca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +"2019-09-24 00:27:24.033 UTC [orderer.common.server] Deliver -> DEBU 20cb Starting new Deliver handler" +"2019-09-24 00:27:24.033 UTC [common.deliver] Handle -> DEBU 20cc Starting new deliver loop for 172.18.0.9:32960" +"2019-09-24 00:27:24.033 UTC [common.deliver] Handle -> DEBU 20cd Attempting to read seek info message from 172.18.0.9:32960" +"2019-09-24 00:27:24.034 UTC [policies] Evaluate -> DEBU 20ce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:24.034 UTC [policies] Evaluate -> DEBU 20cf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.035 UTC [policies] Evaluate -> DEBU 20d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.035 UTC [policies] Evaluate -> DEBU 20d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.035 UTC [policies] Evaluate -> DEBU 20d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.035 UTC [cauthdsl] func1 -> DEBU 20d3 0xc000398f50 gate 1569284844035585700 evaluation starts" +"2019-09-24 00:27:24.035 UTC [cauthdsl] func2 -> DEBU 20d4 0xc000398f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.036 UTC [cauthdsl] func2 -> DEBU 20d5 0xc000398f50 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.036 UTC [cauthdsl] func2 -> DEBU 20d6 0xc000398f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:24.036 UTC [cauthdsl] func2 -> DEBU 20d7 0xc000398f50 principal evaluation fails" +"2019-09-24 00:27:24.036 UTC [cauthdsl] func1 -> DEBU 20d8 0xc000398f50 gate 1569284844035585700 evaluation fails" +"2019-09-24 00:27:24.037 UTC [policies] Evaluate -> DEBU 20d9 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.037 UTC [policies] Evaluate -> DEBU 20da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.037 UTC [policies] Evaluate -> DEBU 20db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:24.037 UTC [cauthdsl] func1 -> DEBU 20dc 0xc0003998e0 gate 1569284844037539500 evaluation starts" +"2019-09-24 00:27:24.037 UTC [cauthdsl] func2 -> DEBU 20dd 0xc0003998e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.037 UTC [cauthdsl] func2 -> DEBU 20de 0xc0003998e0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.037 UTC [cauthdsl] func2 -> DEBU 20df 0xc0003998e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:24.038 UTC [cauthdsl] func2 -> DEBU 20e0 0xc0003998e0 principal evaluation fails" +"2019-09-24 00:27:24.038 UTC [cauthdsl] func1 -> DEBU 20e1 0xc0003998e0 gate 1569284844037539500 evaluation fails" +"2019-09-24 00:27:24.038 UTC [policies] Evaluate -> DEBU 20e2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:24.038 UTC [policies] Evaluate -> DEBU 20e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:24.038 UTC [policies] Evaluate -> DEBU 20e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:24.038 UTC [cauthdsl] func1 -> DEBU 20e5 0xc000c7c1c0 gate 1569284844038857600 evaluation starts" +"2019-09-24 00:27:24.039 UTC [cauthdsl] func2 -> DEBU 20e6 0xc000c7c1c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.039 UTC [cauthdsl] func2 -> DEBU 20e7 0xc000c7c1c0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.039 UTC [cauthdsl] func2 -> DEBU 20e8 0xc000c7c1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:24.040 UTC [cauthdsl] func2 -> DEBU 20e9 0xc000c7c1c0 principal evaluation fails" +"2019-09-24 00:27:24.040 UTC [cauthdsl] func1 -> DEBU 20ea 0xc000c7c1c0 gate 1569284844038857600 evaluation fails" +"2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20eb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:24.040 UTC [policies] func1 -> DEBU 20ed Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20ee Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:24.040 UTC [policies] Evaluate -> DEBU 20f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.041 UTC [policies] Evaluate -> DEBU 20f2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:24.041 UTC [cauthdsl] func1 -> DEBU 20f3 0xc000c7cfc0 gate 1569284844041108200 evaluation starts" +"2019-09-24 00:27:24.041 UTC [cauthdsl] func2 -> DEBU 20f4 0xc000c7cfc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.041 UTC [cauthdsl] func2 -> DEBU 20f5 0xc000c7cfc0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.041 UTC [cauthdsl] func2 -> DEBU 20f6 0xc000c7cfc0 principal matched by identity 0" +"2019-09-24 00:27:24.041 UTC [msp.identity] Verify -> DEBU 20f7 Verify: digest = 00000000 18 dd 95 1d 5a 27 57 43 d9 ff f8 0e 8f 65 f3 c1 |....Z'WC.....e..| +00000010 34 02 8b 18 60 e1 60 89 27 d2 9b 0a 2a 34 9b df |4...`.`.'...*4..|" +"2019-09-24 00:27:24.041 UTC [msp.identity] Verify -> DEBU 20f8 Verify: sig = 00000000 30 44 02 20 53 39 03 58 83 60 f3 4d c6 e0 fe ff |0D. S9.X.`.M....| +00000010 ca be 92 0e 7e 80 92 dc 5e c6 f6 b2 1c 85 66 c3 |....~...^.....f.| +00000020 80 2f 74 fe 02 20 62 3f 13 dd 01 ac 80 78 b5 4f |./t.. b?.....x.O| +00000030 e5 75 18 6d 97 d2 3e db 62 36 26 5b 1f 3a 70 ec |.u.m..>.b6&[.:p.| +00000040 c4 df ba 0d e3 e6 |......|" +"2019-09-24 00:27:24.041 UTC [cauthdsl] func2 -> DEBU 20f9 0xc000c7cfc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.042 UTC [cauthdsl] func1 -> DEBU 20fa 0xc000c7cfc0 gate 1569284844041108200 evaluation succeeds" +"2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 20fb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 20fc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 20fd Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 20fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 20ff Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:24.042 UTC [policies] Evaluate -> DEBU 2100 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:24.042 UTC [common.deliver] deliverBlocks -> DEBU 2101 [channel: businesschannel] Received seekInfo (0xc001186dc0) start: > stop: > from 172.18.0.9:32960" +"2019-09-24 00:27:24.042 UTC [fsblkstorage] Next -> DEBU 2102 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:24.043 UTC [fsblkstorage] newBlockfileStream -> DEBU 2103 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71391]" +"2019-09-24 00:27:24.043 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2104 Remaining bytes=[47400], Going to peek [8] bytes" +"2019-09-24 00:27:24.043 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2105 Returning blockbytes - length=[4529], placementInfo={fileNum=[0], startOffset=[71391], bytesOffset=[71393]}" +"2019-09-24 00:27:24.043 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2106 blockbytes [4529] read from file [0]" +"2019-09-24 00:27:24.043 UTC [common.deliver] deliverBlocks -> DEBU 2107 [channel: businesschannel] Delivering block for (0xc001186dc0) for 172.18.0.9:32960" +"2019-09-24 00:27:24.043 UTC [common.deliver] deliverBlocks -> DEBU 2108 [channel: businesschannel] Done delivering to 172.18.0.9:32960 for (0xc001186dc0)" +"2019-09-24 00:27:24.043 UTC [fsblkstorage] waitForBlock -> DEBU 2109 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:24.044 UTC [fsblkstorage] waitForBlock -> DEBU 210a Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:24.043 UTC [common.deliver] Handle -> DEBU 210b Waiting for new SeekInfo from 172.18.0.9:32960" +"2019-09-24 00:27:24.044 UTC [common.deliver] Handle -> DEBU 210c Attempting to read seek info message from 172.18.0.9:32960" +"2019-09-24 00:27:24.073 UTC [common.deliver] Handle -> WARN 210d Error reading from 172.18.0.9:32960: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:24.073 UTC [orderer.common.server] func1 -> DEBU 210f Closing Deliver stream" +"2019-09-24 00:27:24.073 UTC [comm.grpc.server] 1 -> INFO 2110 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32960 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.5142ms +"2019-09-24 00:27:24.073 UTC [grpc] infof -> DEBU 210e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:24.221 UTC [orderer.common.server] Deliver -> DEBU 2111 Starting new Deliver handler" +"2019-09-24 00:27:24.221 UTC [common.deliver] Handle -> DEBU 2112 Starting new deliver loop for 172.18.0.9:32962" +"2019-09-24 00:27:24.221 UTC [common.deliver] Handle -> DEBU 2113 Attempting to read seek info message from 172.18.0.9:32962" +"2019-09-24 00:27:24.222 UTC [policies] Evaluate -> DEBU 2114 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:24.222 UTC [policies] Evaluate -> DEBU 2115 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.222 UTC [policies] Evaluate -> DEBU 2116 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.222 UTC [policies] Evaluate -> DEBU 2117 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.222 UTC [policies] Evaluate -> DEBU 2118 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.222 UTC [cauthdsl] func1 -> DEBU 2119 0xc0010f15b0 gate 1569284844222979200 evaluation starts" +"2019-09-24 00:27:24.223 UTC [cauthdsl] func2 -> DEBU 211a 0xc0010f15b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.223 UTC [cauthdsl] func2 -> DEBU 211b 0xc0010f15b0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.223 UTC [cauthdsl] func2 -> DEBU 211c 0xc0010f15b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:24.223 UTC [cauthdsl] func2 -> DEBU 211d 0xc0010f15b0 principal evaluation fails" +"2019-09-24 00:27:24.223 UTC [cauthdsl] func1 -> DEBU 211e 0xc0010f15b0 gate 1569284844222979200 evaluation fails" +"2019-09-24 00:27:24.223 UTC [policies] Evaluate -> DEBU 211f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.223 UTC [policies] Evaluate -> DEBU 2120 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.223 UTC [policies] Evaluate -> DEBU 2121 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:24.224 UTC [cauthdsl] func1 -> DEBU 2122 0xc0010f1e20 gate 1569284844224076200 evaluation starts" +"2019-09-24 00:27:24.224 UTC [cauthdsl] func2 -> DEBU 2123 0xc0010f1e20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.224 UTC [cauthdsl] func2 -> DEBU 2124 0xc0010f1e20 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.224 UTC [cauthdsl] func2 -> DEBU 2125 0xc0010f1e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:24.224 UTC [cauthdsl] func2 -> DEBU 2126 0xc0010f1e20 principal evaluation fails" +"2019-09-24 00:27:24.224 UTC [cauthdsl] func1 -> DEBU 2127 0xc0010f1e20 gate 1569284844224076200 evaluation fails" +"2019-09-24 00:27:24.224 UTC [policies] Evaluate -> DEBU 2128 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:24.224 UTC [policies] Evaluate -> DEBU 2129 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:24.224 UTC [policies] Evaluate -> DEBU 212a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:24.224 UTC [cauthdsl] func1 -> DEBU 212b 0xc000dca670 gate 1569284844224884700 evaluation starts" +"2019-09-24 00:27:24.224 UTC [cauthdsl] func2 -> DEBU 212c 0xc000dca670 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.225 UTC [cauthdsl] func2 -> DEBU 212d 0xc000dca670 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.225 UTC [cauthdsl] func2 -> DEBU 212e 0xc000dca670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:24.225 UTC [cauthdsl] func2 -> DEBU 212f 0xc000dca670 principal evaluation fails" +"2019-09-24 00:27:24.225 UTC [cauthdsl] func1 -> DEBU 2130 0xc000dca670 gate 1569284844224884700 evaluation fails" +"2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2131 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2132 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:24.225 UTC [policies] func1 -> DEBU 2133 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2134 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2135 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2136 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:24.225 UTC [policies] Evaluate -> DEBU 2137 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.226 UTC [policies] Evaluate -> DEBU 2138 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:24.226 UTC [cauthdsl] func1 -> DEBU 2139 0xc000dcb590 gate 1569284844226113800 evaluation starts" +"2019-09-24 00:27:24.226 UTC [cauthdsl] func2 -> DEBU 213a 0xc000dcb590 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.226 UTC [cauthdsl] func2 -> DEBU 213b 0xc000dcb590 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.226 UTC [cauthdsl] func2 -> DEBU 213c 0xc000dcb590 principal matched by identity 0" +"2019-09-24 00:27:24.227 UTC [msp.identity] Verify -> DEBU 213d Verify: digest = 00000000 62 b4 95 63 b4 ad 97 59 56 44 7b d5 23 d3 56 93 |b..c...YVD{.#.V.| +00000010 f8 11 ca 89 85 10 dd 24 5c 41 ce ff f9 bd 07 1e |.......$\A......|" +"2019-09-24 00:27:24.227 UTC [msp.identity] Verify -> DEBU 213e Verify: sig = 00000000 30 44 02 20 3f b1 22 e8 f7 7c a6 76 d1 34 a6 09 |0D. ?."..|.v.4..| +00000010 5c 65 34 33 25 00 40 90 e1 17 90 21 37 6f 28 91 |\e43%.@....!7o(.| +00000020 20 82 a4 dc 02 20 2b 9d f8 9a 9e 1c aa 3a f2 28 | .... +......:.(| +00000030 24 59 ef 45 e9 f4 1d a1 7d f1 5c 3e 9f 3a f8 b4 |$Y.E....}.\>.:..| +00000040 15 47 b3 6e e8 fc |.G.n..|" +"2019-09-24 00:27:24.227 UTC [cauthdsl] func2 -> DEBU 213f 0xc000dcb590 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.227 UTC [cauthdsl] func1 -> DEBU 2140 0xc000dcb590 gate 1569284844226113800 evaluation succeeds" +"2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2141 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2142 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2143 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2144 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2145 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:24.227 UTC [policies] Evaluate -> DEBU 2146 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:24.228 UTC [common.deliver] deliverBlocks -> DEBU 2147 [channel: businesschannel] Received seekInfo (0xc0010e2140) start: > stop: > from 172.18.0.9:32962" +"2019-09-24 00:27:24.228 UTC [fsblkstorage] Next -> DEBU 2148 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:24.228 UTC [fsblkstorage] newBlockfileStream -> DEBU 2149 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75922]" +"2019-09-24 00:27:24.228 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 214a Remaining bytes=[42869], Going to peek [8] bytes" +"2019-09-24 00:27:24.228 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 214b Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[75922], bytesOffset=[75924]}" +"2019-09-24 00:27:24.228 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 214c blockbytes [3990] read from file [0]" +"2019-09-24 00:27:24.228 UTC [common.deliver] deliverBlocks -> DEBU 214d [channel: businesschannel] Delivering block for (0xc0010e2140) for 172.18.0.9:32962" +"2019-09-24 00:27:24.229 UTC [common.deliver] deliverBlocks -> DEBU 214e [channel: businesschannel] Done delivering to 172.18.0.9:32962 for (0xc0010e2140)" +"2019-09-24 00:27:24.229 UTC [fsblkstorage] waitForBlock -> DEBU 214f Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:24.229 UTC [fsblkstorage] waitForBlock -> DEBU 2150 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:24.229 UTC [common.deliver] Handle -> DEBU 2151 Waiting for new SeekInfo from 172.18.0.9:32962" +"2019-09-24 00:27:24.229 UTC [common.deliver] Handle -> DEBU 2152 Attempting to read seek info message from 172.18.0.9:32962" +"2019-09-24 00:27:24.235 UTC [grpc] infof -> DEBU 2153 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:24.235 UTC [common.deliver] Handle -> WARN 2154 Error reading from 172.18.0.9:32962: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:24.235 UTC [orderer.common.server] func1 -> DEBU 2155 Closing Deliver stream" +"2019-09-24 00:27:24.236 UTC [comm.grpc.server] 1 -> INFO 2156 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32962 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.1591ms +"2019-09-24 00:27:24.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2157 Sending msg of 28 bytes to 2 on channel businesschannel took 85.3µs" +"2019-09-24 00:27:24.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2158 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106µs " +"2019-09-24 00:27:24.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2159 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:24.315 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 215a Sending msg of 28 bytes to 3 on channel businesschannel took 1.5181ms" +"2019-09-24 00:27:24.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 215b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +"2019-09-24 00:27:24.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 215c Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:24.385 UTC [orderer.common.server] Deliver -> DEBU 215d Starting new Deliver handler" +"2019-09-24 00:27:24.385 UTC [common.deliver] Handle -> DEBU 215e Starting new deliver loop for 172.18.0.9:32964" +"2019-09-24 00:27:24.385 UTC [common.deliver] Handle -> DEBU 215f Attempting to read seek info message from 172.18.0.9:32964" +"2019-09-24 00:27:24.386 UTC [policies] Evaluate -> DEBU 2160 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:24.386 UTC [policies] Evaluate -> DEBU 2161 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.387 UTC [policies] Evaluate -> DEBU 2162 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.387 UTC [policies] Evaluate -> DEBU 2163 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.387 UTC [policies] Evaluate -> DEBU 2164 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.387 UTC [cauthdsl] func1 -> DEBU 2165 0xc0010d4770 gate 1569284844387981900 evaluation starts" +"2019-09-24 00:27:24.388 UTC [cauthdsl] func2 -> DEBU 2166 0xc0010d4770 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.388 UTC [cauthdsl] func2 -> DEBU 2167 0xc0010d4770 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.389 UTC [cauthdsl] func2 -> DEBU 2168 0xc0010d4770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:24.389 UTC [cauthdsl] func2 -> DEBU 2169 0xc0010d4770 principal evaluation fails" +"2019-09-24 00:27:24.389 UTC [cauthdsl] func1 -> DEBU 216a 0xc0010d4770 gate 1569284844387981900 evaluation fails" +"2019-09-24 00:27:24.389 UTC [policies] Evaluate -> DEBU 216b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.389 UTC [policies] Evaluate -> DEBU 216c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.389 UTC [policies] Evaluate -> DEBU 216d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:24.390 UTC [cauthdsl] func1 -> DEBU 216e 0xc0010d4fb0 gate 1569284844390113100 evaluation starts" +"2019-09-24 00:27:24.390 UTC [cauthdsl] func2 -> DEBU 216f 0xc0010d4fb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.390 UTC [cauthdsl] func2 -> DEBU 2170 0xc0010d4fb0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.390 UTC [cauthdsl] func2 -> DEBU 2171 0xc0010d4fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:24.391 UTC [cauthdsl] func2 -> DEBU 2172 0xc0010d4fb0 principal evaluation fails" +"2019-09-24 00:27:24.391 UTC [cauthdsl] func1 -> DEBU 2173 0xc0010d4fb0 gate 1569284844390113100 evaluation fails" +"2019-09-24 00:27:24.391 UTC [policies] Evaluate -> DEBU 2174 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:24.391 UTC [policies] Evaluate -> DEBU 2175 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:24.392 UTC [policies] Evaluate -> DEBU 2176 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:24.392 UTC [cauthdsl] func1 -> DEBU 2177 0xc0010d57f0 gate 1569284844392636200 evaluation starts" +"2019-09-24 00:27:24.393 UTC [cauthdsl] func2 -> DEBU 2178 0xc0010d57f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.393 UTC [cauthdsl] func2 -> DEBU 2179 0xc0010d57f0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.393 UTC [cauthdsl] func2 -> DEBU 217a 0xc0010d57f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:24.393 UTC [cauthdsl] func2 -> DEBU 217b 0xc0010d57f0 principal evaluation fails" +"2019-09-24 00:27:24.393 UTC [cauthdsl] func1 -> DEBU 217c 0xc0010d57f0 gate 1569284844392636200 evaluation fails" +"2019-09-24 00:27:24.394 UTC [policies] Evaluate -> DEBU 217d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:24.394 UTC [policies] Evaluate -> DEBU 217e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:24.394 UTC [policies] func1 -> DEBU 217f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:24.394 UTC [policies] Evaluate -> DEBU 2180 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:24.395 UTC [policies] Evaluate -> DEBU 2181 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.395 UTC [policies] Evaluate -> DEBU 2182 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:24.395 UTC [policies] Evaluate -> DEBU 2183 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.395 UTC [policies] Evaluate -> DEBU 2184 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:24.396 UTC [cauthdsl] func1 -> DEBU 2185 0xc001158640 gate 1569284844395905400 evaluation starts" +"2019-09-24 00:27:24.396 UTC [cauthdsl] func2 -> DEBU 2186 0xc001158640 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.396 UTC [cauthdsl] func2 -> DEBU 2187 0xc001158640 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.397 UTC [cauthdsl] func2 -> DEBU 2188 0xc001158640 principal matched by identity 0" +"2019-09-24 00:27:24.397 UTC [msp.identity] Verify -> DEBU 2189 Verify: digest = 00000000 34 5f 37 74 b7 9a 3e 86 d7 2d a0 bd 5c be 48 92 |4_7t..>..-..\.H.| +00000010 80 37 a7 d8 48 6e 71 9f 2b 58 41 e0 cc ce 0e 90 |.7..Hnq.+XA.....|" +"2019-09-24 00:27:24.397 UTC [msp.identity] Verify -> DEBU 218a Verify: sig = 00000000 30 44 02 20 73 e0 4a cd dd aa 66 8e 67 58 97 b2 |0D. s.J...f.gX..| +00000010 52 df dd a0 d3 0b 22 a7 71 fb e8 0a 27 8b 2f de |R.....".q...'./.| +00000020 3e 69 b0 7b 02 20 67 5a eb 89 7c 47 20 8e da 5b |>i.{. gZ..|G ..[| +00000030 66 52 c2 e3 93 ba d6 aa df b0 66 84 af 90 53 ba |fR........f...S.| +00000040 ec 8d c2 b6 af 99 |......|" +"2019-09-24 00:27:24.398 UTC [cauthdsl] func2 -> DEBU 218b 0xc001158640 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.398 UTC [cauthdsl] func1 -> DEBU 218c 0xc001158640 gate 1569284844395905400 evaluation succeeds" +"2019-09-24 00:27:24.398 UTC [policies] Evaluate -> DEBU 218d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.398 UTC [policies] Evaluate -> DEBU 218e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.398 UTC [policies] Evaluate -> DEBU 218f Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.398 UTC [policies] Evaluate -> DEBU 2190 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.399 UTC [policies] Evaluate -> DEBU 2191 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:24.399 UTC [policies] Evaluate -> DEBU 2192 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:24.399 UTC [common.deliver] deliverBlocks -> DEBU 2193 [channel: businesschannel] Received seekInfo (0xc0008f3a00) start: > stop: > from 172.18.0.9:32964" +"2019-09-24 00:27:24.399 UTC [fsblkstorage] Next -> DEBU 2194 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:24.399 UTC [fsblkstorage] newBlockfileStream -> DEBU 2195 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79914]" +"2019-09-24 00:27:24.400 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2196 Remaining bytes=[38877], Going to peek [8] bytes" +"2019-09-24 00:27:24.400 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2197 Returning blockbytes - length=[3990], placementInfo={fileNum=[0], startOffset=[79914], bytesOffset=[79916]}" +"2019-09-24 00:27:24.400 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2198 blockbytes [3990] read from file [0]" +"2019-09-24 00:27:24.400 UTC [common.deliver] deliverBlocks -> DEBU 2199 [channel: businesschannel] Delivering block for (0xc0008f3a00) for 172.18.0.9:32964" +"2019-09-24 00:27:24.401 UTC [common.deliver] deliverBlocks -> DEBU 219a [channel: businesschannel] Done delivering to 172.18.0.9:32964 for (0xc0008f3a00)" +"2019-09-24 00:27:24.401 UTC [fsblkstorage] waitForBlock -> DEBU 219b Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:24.401 UTC [fsblkstorage] waitForBlock -> DEBU 219d Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:24.401 UTC [common.deliver] Handle -> DEBU 219c Waiting for new SeekInfo from 172.18.0.9:32964" +"2019-09-24 00:27:24.401 UTC [common.deliver] Handle -> DEBU 219e Attempting to read seek info message from 172.18.0.9:32964" +"2019-09-24 00:27:24.408 UTC [grpc] infof -> DEBU 21a0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:24.408 UTC [common.deliver] Handle -> WARN 219f Error reading from 172.18.0.9:32964: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:24.409 UTC [orderer.common.server] func1 -> DEBU 21a1 Closing Deliver stream" +"2019-09-24 00:27:24.409 UTC [comm.grpc.server] 1 -> INFO 21a2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32964 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.3985ms +"2019-09-24 00:27:24.499 UTC [orderer.common.cluster.step] handleMessage -> DEBU 21a3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:24.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 21a4 Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +"2019-09-24 00:27:24.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 21a5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +"2019-09-24 00:27:24.557 UTC [orderer.common.server] Deliver -> DEBU 21a6 Starting new Deliver handler" +"2019-09-24 00:27:24.557 UTC [common.deliver] Handle -> DEBU 21a7 Starting new deliver loop for 172.18.0.9:32966" +"2019-09-24 00:27:24.557 UTC [common.deliver] Handle -> DEBU 21a8 Attempting to read seek info message from 172.18.0.9:32966" +"2019-09-24 00:27:24.558 UTC [policies] Evaluate -> DEBU 21a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:24.558 UTC [policies] Evaluate -> DEBU 21aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.558 UTC [policies] Evaluate -> DEBU 21ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.558 UTC [policies] Evaluate -> DEBU 21ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.559 UTC [policies] Evaluate -> DEBU 21ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.559 UTC [cauthdsl] func1 -> DEBU 21ae 0xc000f98440 gate 1569284844559122400 evaluation starts" +"2019-09-24 00:27:24.559 UTC [cauthdsl] func2 -> DEBU 21af 0xc000f98440 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.560 UTC [cauthdsl] func2 -> DEBU 21b0 0xc000f98440 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.560 UTC [cauthdsl] func2 -> DEBU 21b1 0xc000f98440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 00:27:24.560 UTC [cauthdsl] func2 -> DEBU 21b2 0xc000f98440 principal evaluation fails" +"2019-09-24 00:27:24.560 UTC [cauthdsl] func1 -> DEBU 21b3 0xc000f98440 gate 1569284844559122400 evaluation fails" +"2019-09-24 00:27:24.560 UTC [policies] Evaluate -> DEBU 21b4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.561 UTC [policies] Evaluate -> DEBU 21b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.561 UTC [policies] Evaluate -> DEBU 21b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:24.561 UTC [cauthdsl] func1 -> DEBU 21b7 0xc000f98c80 gate 1569284844561885000 evaluation starts" +"2019-09-24 00:27:24.562 UTC [cauthdsl] func2 -> DEBU 21b8 0xc000f98c80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.562 UTC [cauthdsl] func2 -> DEBU 21b9 0xc000f98c80 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.562 UTC [cauthdsl] func2 -> DEBU 21ba 0xc000f98c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 00:27:24.562 UTC [cauthdsl] func2 -> DEBU 21bb 0xc000f98c80 principal evaluation fails" +"2019-09-24 00:27:24.563 UTC [cauthdsl] func1 -> DEBU 21bc 0xc000f98c80 gate 1569284844561885000 evaluation fails" +"2019-09-24 00:27:24.563 UTC [policies] Evaluate -> DEBU 21bd Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:24.563 UTC [policies] Evaluate -> DEBU 21be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:24.563 UTC [policies] Evaluate -> DEBU 21bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:24.564 UTC [cauthdsl] func1 -> DEBU 21c0 0xc000f994c0 gate 1569284844564080400 evaluation starts" +"2019-09-24 00:27:24.564 UTC [cauthdsl] func2 -> DEBU 21c1 0xc000f994c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.564 UTC [cauthdsl] func2 -> DEBU 21c2 0xc000f994c0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.564 UTC [cauthdsl] func2 -> DEBU 21c3 0xc000f994c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 00:27:24.565 UTC [cauthdsl] func2 -> DEBU 21c4 0xc000f994c0 principal evaluation fails" +"2019-09-24 00:27:24.565 UTC [cauthdsl] func1 -> DEBU 21c5 0xc000f994c0 gate 1569284844564080400 evaluation fails" +"2019-09-24 00:27:24.565 UTC [policies] Evaluate -> DEBU 21c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:24.565 UTC [policies] Evaluate -> DEBU 21c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:24.565 UTC [policies] func1 -> DEBU 21c8 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 00:27:24.566 UTC [policies] Evaluate -> DEBU 21c9 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 00:27:24.566 UTC [policies] Evaluate -> DEBU 21ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.566 UTC [policies] Evaluate -> DEBU 21cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:24.566 UTC [policies] Evaluate -> DEBU 21cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.566 UTC [policies] Evaluate -> DEBU 21cd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:24.567 UTC [cauthdsl] func1 -> DEBU 21ce 0xc00119c1b0 gate 1569284844567441400 evaluation starts" +"2019-09-24 00:27:24.567 UTC [cauthdsl] func2 -> DEBU 21cf 0xc00119c1b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.567 UTC [cauthdsl] func2 -> DEBU 21d0 0xc00119c1b0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.569 UTC [cauthdsl] func2 -> DEBU 21d1 0xc00119c1b0 principal matched by identity 0" +"2019-09-24 00:27:24.569 UTC [msp.identity] Verify -> DEBU 21d2 Verify: digest = 00000000 56 de 98 b4 6e e0 6d 42 70 52 29 70 27 09 c9 13 |V...n.mBpR)p'...| +00000010 57 cb 96 67 76 8f 36 3c 94 16 dc 10 fc 4f 32 d4 |W..gv.6<.....O2.|" +"2019-09-24 00:27:24.569 UTC [msp.identity] Verify -> DEBU 21d3 Verify: sig = 00000000 30 45 02 21 00 f9 f1 08 ee 7c 3e 83 32 63 dc 1b |0E.!.....|>.2c..| +00000010 3d 13 18 7b fc bf c5 5d e6 46 31 22 83 c7 f6 57 |=..{...].F1"...W| +00000020 ac b3 f6 65 2c 02 20 5d 4f 2a 12 dc a0 2b 92 24 |...e,. ]O*...+.$| +00000030 20 69 bb 90 b3 5a ba 69 7a 04 7c 23 4a 08 67 92 | i...Z.iz.|#J.g.| +00000040 d6 7d bb 37 6c 0d 0d |.}.7l..|" +"2019-09-24 00:27:24.570 UTC [cauthdsl] func2 -> DEBU 21d4 0xc00119c1b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.570 UTC [cauthdsl] func1 -> DEBU 21d5 0xc00119c1b0 gate 1569284844567441400 evaluation succeeds" +"2019-09-24 00:27:24.570 UTC [policies] Evaluate -> DEBU 21d6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.570 UTC [policies] Evaluate -> DEBU 21d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.570 UTC [policies] Evaluate -> DEBU 21d8 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.570 UTC [policies] Evaluate -> DEBU 21d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.571 UTC [policies] Evaluate -> DEBU 21da Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:24.571 UTC [policies] Evaluate -> DEBU 21db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:24.571 UTC [common.deliver] deliverBlocks -> DEBU 21dc [channel: businesschannel] Received seekInfo (0xc0010e28c0) start: > stop: > from 172.18.0.9:32966" +"2019-09-24 00:27:24.571 UTC [fsblkstorage] Next -> DEBU 21dd Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 00:27:24.571 UTC [fsblkstorage] newBlockfileStream -> DEBU 21de newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83906]" +"2019-09-24 00:27:24.572 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 21df Remaining bytes=[34885], Going to peek [8] bytes" +"2019-09-24 00:27:24.572 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 21e0 Returning blockbytes - length=[34882], placementInfo={fileNum=[0], startOffset=[83906], bytesOffset=[83909]}" +"2019-09-24 00:27:24.572 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 21e1 blockbytes [34882] read from file [0]" +"2019-09-24 00:27:24.573 UTC [common.deliver] deliverBlocks -> DEBU 21e2 [channel: businesschannel] Delivering block for (0xc0010e28c0) for 172.18.0.9:32966" +"2019-09-24 00:27:24.573 UTC [common.deliver] deliverBlocks -> DEBU 21e3 [channel: businesschannel] Done delivering to 172.18.0.9:32966 for (0xc0010e28c0)" +"2019-09-24 00:27:24.573 UTC [common.deliver] Handle -> DEBU 21e4 Waiting for new SeekInfo from 172.18.0.9:32966" +"2019-09-24 00:27:24.573 UTC [common.deliver] Handle -> DEBU 21e5 Attempting to read seek info message from 172.18.0.9:32966" +"2019-09-24 00:27:24.573 UTC [fsblkstorage] waitForBlock -> DEBU 21e6 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 00:27:24.573 UTC [fsblkstorage] waitForBlock -> DEBU 21e7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 00:27:24.588 UTC [grpc] infof -> DEBU 21e8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:24.588 UTC [common.deliver] Handle -> WARN 21e9 Error reading from 172.18.0.9:32966: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:24.588 UTC [orderer.common.server] func1 -> DEBU 21ea Closing Deliver stream" +"2019-09-24 00:27:24.588 UTC [comm.grpc.server] 1 -> INFO 21eb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32966 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.7122ms +"2019-09-24 00:27:24.766 UTC [orderer.common.server] Deliver -> DEBU 21ec Starting new Deliver handler" +"2019-09-24 00:27:24.766 UTC [common.deliver] Handle -> DEBU 21ed Starting new deliver loop for 172.18.0.9:32968" +"2019-09-24 00:27:24.766 UTC [common.deliver] Handle -> DEBU 21ee Attempting to read seek info message from 172.18.0.9:32968" +"2019-09-24 00:27:24.766 UTC [policies] Evaluate -> DEBU 21ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:24.766 UTC [policies] Evaluate -> DEBU 21f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.766 UTC [policies] Evaluate -> DEBU 21f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:24.766 UTC [policies] Evaluate -> DEBU 21f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.766 UTC [policies] Evaluate -> DEBU 21f3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:24.766 UTC [cauthdsl] func1 -> DEBU 21f4 0xc000db7d80 gate 1569284844766572800 evaluation starts" +"2019-09-24 00:27:24.767 UTC [cauthdsl] func2 -> DEBU 21f5 0xc000db7d80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.767 UTC [cauthdsl] func2 -> DEBU 21f6 0xc000db7d80 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.767 UTC [cauthdsl] func2 -> DEBU 21f7 0xc000db7d80 principal matched by identity 0" +"2019-09-24 00:27:24.767 UTC [msp.identity] Verify -> DEBU 21f8 Verify: digest = 00000000 e6 45 eb c0 aa 8e 2c 99 7d 0d 11 cd 68 d4 37 39 |.E....,.}...h.79| +00000010 9b 5f 05 e2 1a e3 4a 15 6a d1 40 8d 4d 53 50 fc |._....J.j.@.MSP.|" +"2019-09-24 00:27:24.768 UTC [msp.identity] Verify -> DEBU 21f9 Verify: sig = 00000000 30 44 02 20 36 50 75 14 ca 5a 43 6f d6 64 59 c7 |0D. 6Pu..ZCo.dY.| +00000010 05 49 e3 b3 a1 66 ff 8d cc 2e d7 20 61 9d 72 57 |.I...f..... a.rW| +00000020 a1 be a0 76 02 20 53 d0 c2 e3 50 5a 80 b7 8b b1 |...v. S...PZ....| +00000030 80 d0 5f 51 d2 97 90 a6 b6 ee 3b 8f 8c 9b 93 dc |.._Q......;.....| +00000040 9a 20 17 de d0 d5 |. ....|" +"2019-09-24 00:27:24.768 UTC [cauthdsl] func2 -> DEBU 21fa 0xc000db7d80 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.768 UTC [cauthdsl] func1 -> DEBU 21fb 0xc000db7d80 gate 1569284844766572800 evaluation succeeds" +"2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 21fc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 21fd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 21fe Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 21ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 2200 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:24.768 UTC [policies] Evaluate -> DEBU 2201 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:24.768 UTC [common.deliver] deliverBlocks -> DEBU 2202 [channel: testchainid] Received seekInfo (0xc001004740) start: > stop: > from 172.18.0.9:32968" +"2019-09-24 00:27:24.769 UTC [fsblkstorage] Next -> DEBU 2203 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 00:27:24.769 UTC [fsblkstorage] newBlockfileStream -> DEBU 2204 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-09-24 00:27:24.769 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2205 Remaining bytes=[25835], Going to peek [8] bytes" +"2019-09-24 00:27:24.769 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2206 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-09-24 00:27:24.769 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2207 blockbytes [25832] read from file [0]" +"2019-09-24 00:27:24.769 UTC [common.deliver] deliverBlocks -> DEBU 2208 [channel: testchainid] Delivering block for (0xc001004740) for 172.18.0.9:32968" +"2019-09-24 00:27:24.769 UTC [common.deliver] deliverBlocks -> DEBU 2209 [channel: testchainid] Done delivering to 172.18.0.9:32968 for (0xc001004740)" +"2019-09-24 00:27:24.769 UTC [common.deliver] Handle -> DEBU 220a Waiting for new SeekInfo from 172.18.0.9:32968" +"2019-09-24 00:27:24.769 UTC [common.deliver] Handle -> DEBU 220b Attempting to read seek info message from 172.18.0.9:32968" +"2019-09-24 00:27:24.776 UTC [grpc] infof -> DEBU 220c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:24.776 UTC [common.deliver] Handle -> WARN 220d Error reading from 172.18.0.9:32968: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:24.777 UTC [orderer.common.server] func1 -> DEBU 220e Closing Deliver stream" +"2019-09-24 00:27:24.777 UTC [comm.grpc.server] 1 -> INFO 220f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32968 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.5257ms +"2019-09-24 00:27:24.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2210 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +"2019-09-24 00:27:24.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2211 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +"2019-09-24 00:27:24.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2212 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.2µs " +"2019-09-24 00:27:24.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2213 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.3µs " +"2019-09-24 00:27:24.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2214 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:24.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2215 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:24.962 UTC [orderer.common.server] Deliver -> DEBU 2216 Starting new Deliver handler" +"2019-09-24 00:27:24.962 UTC [common.deliver] Handle -> DEBU 2217 Starting new deliver loop for 172.18.0.9:32970" +"2019-09-24 00:27:24.963 UTC [common.deliver] Handle -> DEBU 2218 Attempting to read seek info message from 172.18.0.9:32970" +"2019-09-24 00:27:24.965 UTC [policies] Evaluate -> DEBU 2219 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:24.965 UTC [policies] Evaluate -> DEBU 221a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.965 UTC [policies] Evaluate -> DEBU 221b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:24.965 UTC [policies] Evaluate -> DEBU 221c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.965 UTC [policies] Evaluate -> DEBU 221d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:24.965 UTC [cauthdsl] func1 -> DEBU 221e 0xc000d0cdd0 gate 1569284844965868500 evaluation starts" +"2019-09-24 00:27:24.966 UTC [cauthdsl] func2 -> DEBU 221f 0xc000d0cdd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.966 UTC [cauthdsl] func2 -> DEBU 2220 0xc000d0cdd0 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.966 UTC [cauthdsl] func2 -> DEBU 2221 0xc000d0cdd0 principal matched by identity 0" +"2019-09-24 00:27:24.966 UTC [msp.identity] Verify -> DEBU 2222 Verify: digest = 00000000 e3 8b 4e 0d a1 cc 2c ff 39 15 b6 fa a4 69 e4 26 |..N...,.9....i.&| +00000010 bc 52 20 e6 97 5e 0d 9c 0a d3 cd 23 86 2e a4 d2 |.R ..^.....#....|" +"2019-09-24 00:27:24.966 UTC [msp.identity] Verify -> DEBU 2223 Verify: sig = 00000000 30 44 02 20 1c 70 65 bc ad c3 07 e3 2c 49 2c 9a |0D. .pe.....,I,.| +00000010 42 38 b1 93 1a d3 5d bb 2c ac d8 73 21 37 8a d6 |B8....].,..s!7..| +00000020 4c 17 55 88 02 20 1f 18 cd 80 70 39 14 bc c6 5e |L.U.. ....p9...^| +00000030 59 fc d4 47 f2 05 cc 6c 09 07 37 47 fe 51 4a 64 |Y..G...l..7G.QJd| +00000040 ba 6c 59 ed a0 ab |.lY...|" +"2019-09-24 00:27:24.966 UTC [cauthdsl] func2 -> DEBU 2224 0xc000d0cdd0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.966 UTC [cauthdsl] func1 -> DEBU 2225 0xc000d0cdd0 gate 1569284844965868500 evaluation succeeds" +"2019-09-24 00:27:24.966 UTC [policies] Evaluate -> DEBU 2226 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.966 UTC [policies] Evaluate -> DEBU 2227 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.966 UTC [policies] Evaluate -> DEBU 2228 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.967 UTC [policies] Evaluate -> DEBU 2229 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.967 UTC [policies] Evaluate -> DEBU 222a Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:24.967 UTC [policies] Evaluate -> DEBU 222b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:24.967 UTC [common.deliver] deliverBlocks -> DEBU 222c [channel: testchainid] Received seekInfo (0xc001004e80) start: > stop: > from 172.18.0.9:32970" +"2019-09-24 00:27:24.967 UTC [fsblkstorage] Next -> DEBU 222d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 00:27:24.967 UTC [fsblkstorage] newBlockfileStream -> DEBU 222e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-09-24 00:27:24.967 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 222f Remaining bytes=[25835], Going to peek [8] bytes" +"2019-09-24 00:27:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2230 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-09-24 00:27:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2231 blockbytes [25832] read from file [0]" +"2019-09-24 00:27:24.968 UTC [common.deliver] deliverBlocks -> DEBU 2232 [channel: testchainid] Delivering block for (0xc001004e80) for 172.18.0.9:32970" +"2019-09-24 00:27:24.968 UTC [common.deliver] deliverBlocks -> DEBU 2233 [channel: testchainid] Done delivering to 172.18.0.9:32970 for (0xc001004e80)" +"2019-09-24 00:27:24.968 UTC [common.deliver] Handle -> DEBU 2234 Waiting for new SeekInfo from 172.18.0.9:32970" +"2019-09-24 00:27:24.969 UTC [common.deliver] Handle -> DEBU 2235 Attempting to read seek info message from 172.18.0.9:32970" +"2019-09-24 00:27:24.970 UTC [policies] Evaluate -> DEBU 2236 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:24.970 UTC [policies] Evaluate -> DEBU 2237 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.970 UTC [policies] Evaluate -> DEBU 2238 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:24.970 UTC [policies] Evaluate -> DEBU 2239 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.970 UTC [policies] Evaluate -> DEBU 223a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:24.970 UTC [cauthdsl] func1 -> DEBU 223b 0xc0012ec450 gate 1569284844970592700 evaluation starts" +"2019-09-24 00:27:24.970 UTC [cauthdsl] func2 -> DEBU 223c 0xc0012ec450 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.970 UTC [cauthdsl] func2 -> DEBU 223d 0xc0012ec450 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:24.970 UTC [cauthdsl] func2 -> DEBU 223e 0xc0012ec450 principal matched by identity 0" +"2019-09-24 00:27:24.970 UTC [msp.identity] Verify -> DEBU 223f Verify: digest = 00000000 80 ab 40 8e 89 29 3e e4 18 ab 4c 54 04 43 a9 4c |..@..)>...LT.C.L| +00000010 b6 26 b4 38 e7 76 83 a6 db 7e 45 60 1e 93 88 ce |.&.8.v...~E`....|" +"2019-09-24 00:27:24.971 UTC [msp.identity] Verify -> DEBU 2240 Verify: sig = 00000000 30 44 02 20 35 b2 e3 78 44 00 0a db e9 c9 dc 50 |0D. 5..xD......P| +00000010 89 a7 a0 5a 5c 15 a8 6b 0c 97 68 0f 7b 00 5f d8 |...Z\..k..h.{._.| +00000020 bc 20 b0 15 02 20 23 78 87 3d 9d 12 ff fb 13 48 |. ... #x.=.....H| +00000030 dd d3 c9 ea 01 03 00 29 a0 52 3a 24 66 87 90 b2 |.......).R:$f...| +00000040 c6 79 d2 df f7 47 |.y...G|" +"2019-09-24 00:27:24.971 UTC [cauthdsl] func2 -> DEBU 2241 0xc0012ec450 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.971 UTC [cauthdsl] func1 -> DEBU 2242 0xc0012ec450 gate 1569284844970592700 evaluation succeeds" +"2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2243 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2244 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2245 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2246 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2247 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:24.971 UTC [policies] Evaluate -> DEBU 2248 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:24.972 UTC [common.deliver] deliverBlocks -> DEBU 2249 [channel: testchainid] Received seekInfo (0xc0010e2f80) start: > stop: > from 172.18.0.9:32970" +"2019-09-24 00:27:24.972 UTC [fsblkstorage] Next -> DEBU 224a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 00:27:24.972 UTC [fsblkstorage] newBlockfileStream -> DEBU 224b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 00:27:24.972 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 224c Remaining bytes=[44254], Going to peek [8] bytes" +"2019-09-24 00:27:24.972 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 224d Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:27:24.972 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 224e blockbytes [18416] read from file [0]" +"2019-09-24 00:27:24.972 UTC [common.deliver] deliverBlocks -> DEBU 224f [channel: testchainid] Delivering block for (0xc0010e2f80) for 172.18.0.9:32970" +"2019-09-24 00:27:24.973 UTC [common.deliver] deliverBlocks -> DEBU 2250 [channel: testchainid] Done delivering to 172.18.0.9:32970 for (0xc0010e2f80)" +"2019-09-24 00:27:24.973 UTC [common.deliver] Handle -> DEBU 2251 Waiting for new SeekInfo from 172.18.0.9:32970" +"2019-09-24 00:27:24.973 UTC [common.deliver] Handle -> DEBU 2252 Attempting to read seek info message from 172.18.0.9:32970" +"2019-09-24 00:27:24.981 UTC [common.deliver] Handle -> WARN 2253 Error reading from 172.18.0.9:32970: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:24.981 UTC [orderer.common.server] func1 -> DEBU 2254 Closing Deliver stream" +"2019-09-24 00:27:24.982 UTC [comm.grpc.server] 1 -> INFO 2255 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32970 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.7482ms +"2019-09-24 00:27:24.982 UTC [grpc] infof -> DEBU 2256 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:24.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2257 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:24.999 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2258 Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2019-09-24 00:27:25.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2259 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 407µs " +"2019-09-24 00:27:25.118 UTC [orderer.common.server] Deliver -> DEBU 225a Starting new Deliver handler" +"2019-09-24 00:27:25.119 UTC [common.deliver] Handle -> DEBU 225b Starting new deliver loop for 172.18.0.9:32972" +"2019-09-24 00:27:25.119 UTC [common.deliver] Handle -> DEBU 225c Attempting to read seek info message from 172.18.0.9:32972" +"2019-09-24 00:27:25.121 UTC [policies] Evaluate -> DEBU 225d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:25.121 UTC [policies] Evaluate -> DEBU 225e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:25.121 UTC [policies] Evaluate -> DEBU 225f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:25.122 UTC [policies] Evaluate -> DEBU 2260 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:25.122 UTC [policies] Evaluate -> DEBU 2261 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:25.122 UTC [cauthdsl] func1 -> DEBU 2262 0xc000d3c950 gate 1569284845122619700 evaluation starts" +"2019-09-24 00:27:25.122 UTC [cauthdsl] func2 -> DEBU 2263 0xc000d3c950 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:25.122 UTC [cauthdsl] func2 -> DEBU 2264 0xc000d3c950 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:25.122 UTC [cauthdsl] func2 -> DEBU 2265 0xc000d3c950 principal matched by identity 0" +"2019-09-24 00:27:25.123 UTC [msp.identity] Verify -> DEBU 2266 Verify: digest = 00000000 c5 f6 4d 14 f1 03 bd e6 4d 85 15 49 45 c6 25 ca |..M.....M..IE.%.| +00000010 0d ae 6a 59 e4 60 26 7b 88 78 8d e3 0a 9e 01 6b |..jY.`&{.x.....k|" +"2019-09-24 00:27:25.123 UTC [msp.identity] Verify -> DEBU 2267 Verify: sig = 00000000 30 45 02 21 00 f9 35 b8 3e 95 c1 4f 86 19 de 90 |0E.!..5.>..O....| +00000010 ac 44 0c fb b6 f3 60 b0 3d 35 18 33 06 22 56 eb |.D....`.=5.3."V.| +00000020 8f a0 dd bd c0 02 20 30 ff 59 25 83 7e ec ac e5 |...... 0.Y%.~...| +00000030 4c 92 7e ee da 19 55 30 2e 5b 1c 52 46 7f 02 cf |L.~...U0.[.RF...| +00000040 5e 6e 38 e3 0a 2b 73 |^n8..+s|" +"2019-09-24 00:27:25.124 UTC [cauthdsl] func2 -> DEBU 2268 0xc000d3c950 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:25.124 UTC [cauthdsl] func1 -> DEBU 2269 0xc000d3c950 gate 1569284845122619700 evaluation succeeds" +"2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226c Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226e Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:25.124 UTC [policies] Evaluate -> DEBU 226f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:25.124 UTC [common.deliver] deliverBlocks -> DEBU 2270 [channel: testchainid] Received seekInfo (0xc0010e3340) start: > stop: > from 172.18.0.9:32972" +"2019-09-24 00:27:25.124 UTC [fsblkstorage] Next -> DEBU 2271 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 00:27:25.124 UTC [fsblkstorage] newBlockfileStream -> DEBU 2272 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 00:27:25.125 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2273 Remaining bytes=[44254], Going to peek [8] bytes" +"2019-09-24 00:27:25.125 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2274 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 00:27:25.125 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2275 blockbytes [18416] read from file [0]" +"2019-09-24 00:27:25.125 UTC [common.deliver] deliverBlocks -> DEBU 2276 [channel: testchainid] Delivering block for (0xc0010e3340) for 172.18.0.9:32972" +"2019-09-24 00:27:25.126 UTC [common.deliver] deliverBlocks -> DEBU 2277 [channel: testchainid] Done delivering to 172.18.0.9:32972 for (0xc0010e3340)" +"2019-09-24 00:27:25.126 UTC [common.deliver] Handle -> DEBU 2278 Waiting for new SeekInfo from 172.18.0.9:32972" +"2019-09-24 00:27:25.127 UTC [common.deliver] Handle -> DEBU 2279 Attempting to read seek info message from 172.18.0.9:32972" +"2019-09-24 00:27:25.134 UTC [common.deliver] Handle -> WARN 227a Error reading from 172.18.0.9:32972: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:25.134 UTC [orderer.common.server] func1 -> DEBU 227b Closing Deliver stream" +"2019-09-24 00:27:25.134 UTC [comm.grpc.server] 1 -> INFO 227c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32972 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.4666ms +"2019-09-24 00:27:25.134 UTC [grpc] infof -> DEBU 227d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:25.281 UTC [orderer.common.server] Deliver -> DEBU 227e Starting new Deliver handler" +"2019-09-24 00:27:25.281 UTC [common.deliver] Handle -> DEBU 227f Starting new deliver loop for 172.18.0.9:32974" +"2019-09-24 00:27:25.281 UTC [common.deliver] Handle -> DEBU 2280 Attempting to read seek info message from 172.18.0.9:32974" +"2019-09-24 00:27:25.283 UTC [policies] Evaluate -> DEBU 2281 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 00:27:25.283 UTC [policies] Evaluate -> DEBU 2282 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:25.284 UTC [policies] Evaluate -> DEBU 2283 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 00:27:25.284 UTC [policies] Evaluate -> DEBU 2284 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:25.284 UTC [policies] Evaluate -> DEBU 2285 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 00:27:25.284 UTC [cauthdsl] func1 -> DEBU 2286 0xc001365830 gate 1569284845284340000 evaluation starts" +"2019-09-24 00:27:25.284 UTC [cauthdsl] func2 -> DEBU 2287 0xc001365830 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:25.284 UTC [cauthdsl] func2 -> DEBU 2288 0xc001365830 processing identity 0 with bytes of fd0d80" +"2019-09-24 00:27:25.284 UTC [cauthdsl] func2 -> DEBU 2289 0xc001365830 principal matched by identity 0" +"2019-09-24 00:27:25.284 UTC [msp.identity] Verify -> DEBU 228a Verify: digest = 00000000 60 a3 72 d9 1f 69 f0 fd 5a e1 56 af 62 06 05 d8 |`.r..i..Z.V.b...| +00000010 12 b4 c7 95 6a 7a 37 3a 59 c6 7b d1 9c ce 0f e4 |....jz7:Y.{.....|" +"2019-09-24 00:27:25.284 UTC [msp.identity] Verify -> DEBU 228b Verify: sig = 00000000 30 45 02 21 00 fa 0a a0 98 2e 06 f4 37 f2 69 4d |0E.!........7.iM| +00000010 7e 55 99 76 27 d0 cb 6d c4 1b 0b 1b 32 5b f8 24 |~U.v'..m....2[.$| +00000020 94 2a e0 90 b7 02 20 77 64 90 bb 87 ee 12 97 e3 |.*.... wd.......| +00000030 7b 70 3f 78 f5 18 48 cd 7c 31 fa d2 ef b8 ba e5 |{p?x..H.|1......| +00000040 f6 6e 6f 49 28 58 f7 |.noI(X.|" +"2019-09-24 00:27:25.285 UTC [cauthdsl] func2 -> DEBU 228c 0xc001365830 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:25.285 UTC [cauthdsl] func1 -> DEBU 228d 0xc001365830 gate 1569284845284340000 evaluation succeeds" +"2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 228e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 228f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 2290 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 2291 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 2292 Signature set satisfies policy /Channel/Readers" +"2019-09-24 00:27:25.285 UTC [policies] Evaluate -> DEBU 2293 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 00:27:25.286 UTC [common.deliver] deliverBlocks -> DEBU 2294 [channel: testchainid] Received seekInfo (0xc001005800) start: > stop: > from 172.18.0.9:32974" +"2019-09-24 00:27:25.286 UTC [fsblkstorage] Next -> DEBU 2295 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 00:27:25.286 UTC [fsblkstorage] newBlockfileStream -> DEBU 2296 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-09-24 00:27:25.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2297 Remaining bytes=[25835], Going to peek [8] bytes" +"2019-09-24 00:27:25.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2298 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-09-24 00:27:25.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2299 blockbytes [25832] read from file [0]" +"2019-09-24 00:27:25.286 UTC [common.deliver] deliverBlocks -> DEBU 229a [channel: testchainid] Delivering block for (0xc001005800) for 172.18.0.9:32974" +"2019-09-24 00:27:25.287 UTC [common.deliver] deliverBlocks -> DEBU 229b [channel: testchainid] Done delivering to 172.18.0.9:32974 for (0xc001005800)" +"2019-09-24 00:27:25.287 UTC [common.deliver] Handle -> DEBU 229c Waiting for new SeekInfo from 172.18.0.9:32974" +"2019-09-24 00:27:25.287 UTC [common.deliver] Handle -> DEBU 229d Attempting to read seek info message from 172.18.0.9:32974" +"2019-09-24 00:27:25.295 UTC [common.deliver] Handle -> WARN 229e Error reading from 172.18.0.9:32974: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:25.295 UTC [orderer.common.server] func1 -> DEBU 229f Closing Deliver stream" +"2019-09-24 00:27:25.296 UTC [comm.grpc.server] 1 -> INFO 22a0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:32974 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.2148ms +"2019-09-24 00:27:25.296 UTC [grpc] infof -> DEBU 22a1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:25.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22a2 Sending msg of 28 bytes to 3 on channel businesschannel took 42.9µs" +"2019-09-24 00:27:25.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22a3 Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +"2019-09-24 00:27:25.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " +"2019-09-24 00:27:25.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22a5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 40.8µs " +"2019-09-24 00:27:25.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22a6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:25.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22a7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:25.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22a8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:25.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22a9 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +"2019-09-24 00:27:25.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22aa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.1µs " +"2019-09-24 00:27:25.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22ab Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +"2019-09-24 00:27:25.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22ac Sending msg of 28 bytes to 3 on channel businesschannel took 30µs" +"2019-09-24 00:27:25.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.2µs " +"2019-09-24 00:27:25.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.5µs " +"2019-09-24 00:27:25.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22af Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:25.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22b0 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:26.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22b1 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:26.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22b2 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2019-09-24 00:27:26.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22b3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " +"2019-09-24 00:27:26.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22b4 Sending msg of 28 bytes to 2 on channel businesschannel took 35.4µs" +"2019-09-24 00:27:26.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22b6 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +"2019-09-24 00:27:26.315 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22b7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69µs " +"2019-09-24 00:27:26.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 716.5µs " +"2019-09-24 00:27:26.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22b8 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:26.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22b9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:26.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22ba Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:26.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22bb Sending msg of 28 bytes to 3 on channel testchainid took 8.1µs" +"2019-09-24 00:27:26.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22bc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.8µs " +"2019-09-24 00:27:26.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22bd Sending msg of 28 bytes to 2 on channel businesschannel took 37.1µs" +"2019-09-24 00:27:26.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22be Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +"2019-09-24 00:27:26.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.2µs " +"2019-09-24 00:27:26.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 375.2µs " +"2019-09-24 00:27:26.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22c1 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:26.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22c2 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:27.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22c3 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:27.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22c4 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2019-09-24 00:27:27.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22c5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.9µs " +"2019-09-24 00:27:27.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22c6 Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +"2019-09-24 00:27:27.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22c7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2019-09-24 00:27:27.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.6µs " +"2019-09-24 00:27:27.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22c9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.2µs " +"2019-09-24 00:27:27.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22ca Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:27.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22cb Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:27.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22cc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:27.503 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.1µs " +"2019-09-24 00:27:27.503 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22ce Sending msg of 28 bytes to 3 on channel testchainid took 127.1µs" +"2019-09-24 00:27:27.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22cf Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +"2019-09-24 00:27:27.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22d0 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2019-09-24 00:27:27.815 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 696.6µs " +"2019-09-24 00:27:27.815 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2172ms " +"2019-09-24 00:27:27.817 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22d3 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:27.817 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22d4 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:28.001 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22d5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:28.001 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22d6 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2019-09-24 00:27:28.002 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22d7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.7µs " +"2019-09-24 00:27:28.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22d8 Sending msg of 28 bytes to 2 on channel businesschannel took 34.1µs" +"2019-09-24 00:27:28.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22d9 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +"2019-09-24 00:27:28.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.3µs " +"2019-09-24 00:27:28.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22db Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.2µs " +"2019-09-24 00:27:28.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22dc Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:28.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22dd Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:28.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22de Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:28.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22df Sending msg of 28 bytes to 3 on channel testchainid took 37.9µs" +"2019-09-24 00:27:28.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22e0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.5µs " +"2019-09-24 00:27:28.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22e1 Sending msg of 28 bytes to 2 on channel businesschannel took 39.1µs" +"2019-09-24 00:27:28.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22e2 Sending msg of 28 bytes to 3 on channel businesschannel took 30.6µs" +"2019-09-24 00:27:28.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.9µs " +"2019-09-24 00:27:28.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.5µs " +"2019-09-24 00:27:28.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22e5 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:28.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22e6 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:29.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22e7 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:29.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22e8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 340.4µs " +"2019-09-24 00:27:29.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22e9 Sending msg of 28 bytes to 3 on channel testchainid took 158.5µs" +"2019-09-24 00:27:29.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22ea Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2019-09-24 00:27:29.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22eb Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +"2019-09-24 00:27:29.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 458.4µs " +"2019-09-24 00:27:29.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 223.2µs " +"2019-09-24 00:27:29.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22ee Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:29.316 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22ef Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:29.501 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22f0 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:29.502 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22f1 Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-09-24 00:27:29.502 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22f2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 362.3µs " +"2019-09-24 00:27:29.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22f3 Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +"2019-09-24 00:27:29.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22f4 Sending msg of 28 bytes to 2 on channel businesschannel took 7.9µs" +"2019-09-24 00:27:29.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22f5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.5µs " +"2019-09-24 00:27:29.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 252.1µs " +"2019-09-24 00:27:29.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22f7 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:29.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22f8 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:30.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 22f9 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:30.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22fa Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +"2019-09-24 00:27:30.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22fb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471.7µs " +"2019-09-24 00:27:30.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22fc Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2019-09-24 00:27:30.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 22fd Sending msg of 28 bytes to 3 on channel businesschannel took 165.8µs" +"2019-09-24 00:27:30.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 46.9µs " +"2019-09-24 00:27:30.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 22ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.6µs " +"2019-09-24 00:27:30.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2300 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:30.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2301 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:30.499 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2302 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:30.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2303 Sending msg of 28 bytes to 3 on channel testchainid took 1.1952ms" +"2019-09-24 00:27:30.501 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2304 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.3µs " +"2019-09-24 00:27:30.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2305 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +"2019-09-24 00:27:30.814 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2306 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2019-09-24 00:27:30.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2307 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.1µs " +"2019-09-24 00:27:30.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2308 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:30.816 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2309 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6457ms " +"2019-09-24 00:27:30.817 UTC [orderer.common.cluster.step] handleMessage -> DEBU 230a Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:31.000 UTC [orderer.common.cluster.step] handleMessage -> DEBU 230b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:31.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 230c Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2019-09-24 00:27:31.001 UTC [orderer.common.cluster.step] sendMessage -> DEBU 230d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.6µs " +"2019-09-24 00:27:31.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 230e Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +"2019-09-24 00:27:31.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 230f Sending msg of 28 bytes to 3 on channel businesschannel took 7.2µs" +"2019-09-24 00:27:31.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2310 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " +"2019-09-24 00:27:31.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2311 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 38.7µs " +"2019-09-24 00:27:31.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2312 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:31.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2313 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:31.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2314 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:31.500 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2315 Sending msg of 28 bytes to 3 on channel testchainid took 26.7µs" +"2019-09-24 00:27:31.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2316 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54µs " +"2019-09-24 00:27:31.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2317 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +"2019-09-24 00:27:31.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2318 Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2019-09-24 00:27:31.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2319 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.8µs " +"2019-09-24 00:27:31.814 UTC [orderer.common.cluster.step] sendMessage -> DEBU 231a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.2µs " +"2019-09-24 00:27:31.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 231b Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:31.815 UTC [orderer.common.cluster.step] handleMessage -> DEBU 231c Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:31.999 UTC [orderer.common.cluster.step] handleMessage -> DEBU 231d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:32.000 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 231e Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +"2019-09-24 00:27:32.000 UTC [orderer.common.cluster.step] sendMessage -> DEBU 231f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.1µs " +"2019-09-24 00:27:32.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2320 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.3µs " +"2019-09-24 00:27:32.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2321 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +"2019-09-24 00:27:32.313 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2322 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +"2019-09-24 00:27:32.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2323 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.1µs " +"2019-09-24 00:27:32.314 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2324 Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:32.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2325 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:32.499 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2326 Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 00:27:32.499 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2327 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-09-24 00:27:32.499 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2328 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.3µs " +"2019-09-24 00:27:32.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2329 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +"2019-09-24 00:27:32.813 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 232a Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" +"2019-09-24 00:27:32.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 232b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +"2019-09-24 00:27:32.813 UTC [orderer.common.cluster.step] sendMessage -> DEBU 232c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 38.9µs " +"2019-09-24 00:27:32.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 232d Received message from orderer2.example.com(172.18.0.2:49900): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 00:27:32.814 UTC [orderer.common.cluster.step] handleMessage -> DEBU 232e Received message from orderer1.example.com(172.18.0.4:58624): ConsensusRequest for channel businesschannel with payload of size 28" diff --git a/hyperledger_fabric/v1.4.2/raft/logs/dev_peer0.log b/hyperledger_fabric/v1.4.2/raft/logs/dev_peer0.log index f56f9d99..5ae1f2db 100644 --- a/hyperledger_fabric/v1.4.2/raft/logs/dev_peer0.log +++ b/hyperledger_fabric/v1.4.2/raft/logs/dev_peer0.log @@ -1,51 +1,51 @@ -"2019-07-20 02:39:31.745 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" -"2019-07-20 02:39:31.745 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for peer.BCCSP.SW" -"2019-07-20 02:39:31.746 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" -"2019-07-20 02:39:31.746 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" -"2019-07-20 02:39:31.747 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value is not a string: 256" -"2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Security setting to int 256" -"2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 007 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" -"2019-07-20 02:39:31.747 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" -"2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " -"2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for peer.BCCSP.PKCS11" -"2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: " -"2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for peer.BCCSP.PKCS11.Library setting to " -"2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " -"2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Label setting to " -"2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " -"2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Pin setting to " -"2019-07-20 02:39:31.749 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value is not a string: " -"2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for peer.BCCSP.PKCS11.Hash setting to " -"2019-07-20 02:39:31.749 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: " -"2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for peer.BCCSP.PKCS11.Security setting to " -"2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 015 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" -"2019-07-20 02:39:31.750 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: " -"2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " -"2019-07-20 02:39:31.750 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" -"2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.Default setting to string SW" -"2019-07-20 02:39:31.750 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" -"2019-07-20 02:39:31.770 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" -"2019-07-20 02:39:31.770 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" -"2019-07-20 02:39:31.770 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" -"2019-07-20 02:39:31.784 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" -"2019-07-20 02:39:31.791 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" -"2019-07-20 02:39:31.807 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" -"2019-07-20 02:39:31.811 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" -"2019-07-20 02:39:31.815 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" -"2019-07-20 02:39:31.819 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" -"2019-07-20 02:39:31.819 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" -"2019-07-20 02:39:31.819 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" -"2019-07-20 02:39:31.823 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" -"2019-07-20 02:39:31.826 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" -"2019-07-20 02:39:31.828 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" -"2019-07-20 02:39:31.828 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" -"2019-07-20 02:39:31.830 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" -"2019-07-20 02:39:31.834 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" -"2019-07-20 02:39:31.840 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" -"2019-07-20 02:39:31.841 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" -"2019-07-20 02:39:31.841 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" -"2019-07-20 02:39:31.841 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" -"2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:38.678 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" +"2019-09-24 00:24:38.679 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for peer.BCCSP.PKCS11" +"2019-09-24 00:24:38.679 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value is not a string: " +"2019-09-24 00:24:38.680 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for peer.BCCSP.PKCS11.Pin setting to " +"2019-09-24 00:24:38.680 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value is not a string: " +"2019-09-24 00:24:38.680 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.PKCS11.Hash setting to " +"2019-09-24 00:24:38.680 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: " +"2019-09-24 00:24:38.681 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for peer.BCCSP.PKCS11.Security setting to " +"2019-09-24 00:24:38.681 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" +"2019-09-24 00:24:38.682 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value is not a string: " +"2019-09-24 00:24:38.682 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " +"2019-09-24 00:24:38.682 UTC [viperutil] unmarshalJSON -> DEBU 00c Unmarshal JSON: value is not a string: " +"2019-09-24 00:24:38.682 UTC [viperutil] getKeysRecursively -> DEBU 00d Found real value for peer.BCCSP.PKCS11.Library setting to " +"2019-09-24 00:24:38.683 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value is not a string: " +"2019-09-24 00:24:38.683 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for peer.BCCSP.PKCS11.Label setting to " +"2019-09-24 00:24:38.683 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +"2019-09-24 00:24:38.683 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for peer.BCCSP.Default setting to string SW" +"2019-09-24 00:24:38.683 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[string]interface{} value for peer.BCCSP.SW" +"2019-09-24 00:24:38.684 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: 256" +"2019-09-24 00:24:38.684 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for peer.BCCSP.SW.Security setting to int 256" +"2019-09-24 00:24:38.684 UTC [viperutil] getKeysRecursively -> DEBU 015 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" +"2019-09-24 00:24:38.684 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" +"2019-09-24 00:24:38.684 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " +"2019-09-24 00:24:38.684 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +"2019-09-24 00:24:38.684 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" +"2019-09-24 00:24:38.684 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" +"2019-09-24 00:24:38.689 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" +"2019-09-24 00:24:38.689 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" +"2019-09-24 00:24:38.689 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" +"2019-09-24 00:24:38.694 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" +"2019-09-24 00:24:38.697 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" +"2019-09-24 00:24:38.712 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" +"2019-09-24 00:24:38.716 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" +"2019-09-24 00:24:38.722 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" +"2019-09-24 00:24:38.725 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" +"2019-09-24 00:24:38.727 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" +"2019-09-24 00:24:38.727 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" +"2019-09-24 00:24:38.731 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" +"2019-09-24 00:24:38.736 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" +"2019-09-24 00:24:38.737 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" +"2019-09-24 00:24:38.737 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" +"2019-09-24 00:24:38.738 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" +"2019-09-24 00:24:38.743 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" +"2019-09-24 00:24:38.756 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" +"2019-09-24 00:24:38.756 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" +"2019-09-24 00:24:38.758 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" +"2019-09-24 00:24:38.759 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" +"2019-09-24 00:24:38.759 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -60,7 +60,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:38.759 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -74,7 +74,7 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:38.759 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -88,8 +88,8 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE-----" -"2019-07-20 02:39:31.845 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." -"2019-07-20 02:39:31.850 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:38.764 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." +"2019-09-24 00:24:38.771 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -103,91 +103,91 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE-----" -"2019-07-20 02:39:31.850 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" -"2019-07-20 02:39:31.850 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" -"2019-07-20 02:39:31.850 UTC [nodeCmd] serve -> INFO 037 Starting peer: +"2019-09-24 00:24:38.772 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +"2019-09-24 00:24:38.772 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" +"2019-09-24 00:24:38.773 UTC [nodeCmd] serve -> INFO 037 Starting peer: Version: 1.4.2 Commit SHA: development build - Go version: go1.12.7 + Go version: go1.12.9 OS/Arch: linux/amd64 Chaincode: Base Image Version: 0.4.15 Base Docker Namespace: hyperledger Base Docker Label: org.hyperledger.fabric Docker Namespace: hyperledger" -"2019-07-20 02:39:31.851 UTC [msp] GetDefaultSigningIdentity -> DEBU 038 Obtaining default signing identity" -"2019-07-20 02:39:31.851 UTC [msp.identity] Sign -> DEBU 039 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " -"2019-07-20 02:39:31.851 UTC [msp.identity] Sign -> DEBU 03a Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " -"2019-07-20 02:39:31.852 UTC [ledgermgmt] initialize -> INFO 03b Initializing ledger mgmt" -"2019-07-20 02:39:31.852 UTC [kvledger] NewProvider -> INFO 03c Initializing ledger provider" -"2019-07-20 02:39:31.852 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03d CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" -"2019-07-20 02:39:31.852 UTC [kvledger.util] logDirStatus -> DEBU 03e Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" -"2019-07-20 02:39:31.852 UTC [kvledger.util] logDirStatus -> DEBU 03f After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" -"2019-07-20 02:39:31.889 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 040 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" -"2019-07-20 02:39:31.889 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" -"2019-07-20 02:39:31.889 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" -"2019-07-20 02:39:31.889 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" -"2019-07-20 02:39:31.921 UTC [kvledger.util] CreateDirIfMissing -> DEBU 044 CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/]" -"2019-07-20 02:39:31.922 UTC [kvledger.util] logDirStatus -> DEBU 045 Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist" -"2019-07-20 02:39:31.923 UTC [kvledger.util] logDirStatus -> DEBU 046 After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists" -"2019-07-20 02:39:31.983 UTC [kvledger] NewProvider -> INFO 047 ledger provider Initialized" -"2019-07-20 02:39:31.984 UTC [confighistory] newDBProvider -> DEBU 048 Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" -"2019-07-20 02:39:31.984 UTC [kvledger.util] CreateDirIfMissing -> DEBU 049 CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" -"2019-07-20 02:39:31.984 UTC [kvledger.util] logDirStatus -> DEBU 04a Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" -"2019-07-20 02:39:31.985 UTC [kvledger.util] logDirStatus -> DEBU 04b After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" -"2019-07-20 02:39:32.009 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" -"2019-07-20 02:39:32.009 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" -"2019-07-20 02:39:32.010 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" -"2019-07-20 02:39:32.035 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" -"2019-07-20 02:39:32.035 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" -"2019-07-20 02:39:32.035 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" -"2019-07-20 02:39:32.055 UTC [kvledger.util] CreateDirIfMissing -> DEBU 052 CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" -"2019-07-20 02:39:32.055 UTC [kvledger.util] logDirStatus -> DEBU 053 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" -"2019-07-20 02:39:32.057 UTC [kvledger.util] logDirStatus -> DEBU 054 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" -"2019-07-20 02:39:32.080 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 055 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" -"2019-07-20 02:39:32.080 UTC [kvledger.util] CreateDirIfMissing -> DEBU 056 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" -"2019-07-20 02:39:32.080 UTC [kvledger.util] logDirStatus -> DEBU 057 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" -"2019-07-20 02:39:32.081 UTC [kvledger.util] logDirStatus -> DEBU 058 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" -"2019-07-20 02:39:32.093 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 059 Recovering under construction ledger" -"2019-07-20 02:39:32.093 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 05a No under construction ledger found. Quitting recovery" -"2019-07-20 02:39:32.093 UTC [ledgermgmt] initialize -> INFO 05b ledger mgmt initialized" -"2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05c Auto-detected peer address: 172.18.0.5:7051" -"2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05d Returning peer0.org1.example.com:7051" -"2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05e Auto-detected peer address: 172.18.0.5:7051" -"2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05f Returning peer0.org1.example.com:7051" -"2019-07-20 02:39:32.117 UTC [nodeCmd] serve -> INFO 060 Starting peer with TLS enabled" -"2019-07-20 02:39:32.175 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 061 Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" -"2019-07-20 02:39:32.175 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 062 Exit with ccEndpoint: peer0.org1.example.com:7052" -"2019-07-20 02:39:32.200 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: lscc-1.4.2" -"2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 064 system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" -"2019-07-20 02:39:32.201 UTC [inproccontroller] Register -> DEBU 065 Registering chaincode instance: cscc-1.4.2" -"2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 066 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" -"2019-07-20 02:39:32.201 UTC [inproccontroller] Register -> DEBU 067 Registering chaincode instance: qscc-1.4.2" -"2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 068 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" -"2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 069 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" -"2019-07-20 02:39:32.201 UTC [nodeCmd] serve -> DEBU 06a Running peer" -"2019-07-20 02:39:32.202 UTC [msp] GetDefaultSigningIdentity -> DEBU 06b Obtaining default signing identity" -"2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[string]interface{} value for peer.handlers" -"2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06d Found map[string]interface{} value for peer.handlers.validators" -"2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06e Found map[string]interface{} value for peer.handlers.validators.vscc" -"2019-07-20 02:39:32.202 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" -"2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" -"2019-07-20 02:39:32.202 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value is not a string: " -"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for peer.handlers.validators.vscc.library setting to " -"2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" -"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" -"2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" -"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" -"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 077 Found map[string]interface{} value for peer.handlers.endorsers" -"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 078 Found map[string]interface{} value for peer.handlers.endorsers.escc" -"2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 079 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" -"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 07a Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" -"2019-07-20 02:39:32.204 UTC [viperutil] unmarshalJSON -> DEBU 07b Unmarshal JSON: value is not a string: " -"2019-07-20 02:39:32.204 UTC [viperutil] getKeysRecursively -> DEBU 07c Found real value for peer.handlers.endorsers.escc.library setting to " -"2019-07-20 02:39:32.204 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 07d map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" -"2019-07-20 02:39:32.218 UTC [gossip.service] func1 -> INFO 07e Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" -"2019-07-20 02:39:32.257 UTC [msp] DeserializeIdentity -> DEBU 07f Obtaining identity" -"2019-07-20 02:39:32.258 UTC [msp.identity] newIdentity -> DEBU 080 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:38.774 UTC [msp] GetDefaultSigningIdentity -> DEBU 038 Obtaining default signing identity" +"2019-09-24 00:24:38.774 UTC [msp.identity] Sign -> DEBU 039 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +"2019-09-24 00:24:38.774 UTC [msp.identity] Sign -> DEBU 03a Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +"2019-09-24 00:24:38.774 UTC [ledgermgmt] initialize -> INFO 03b Initializing ledger mgmt" +"2019-09-24 00:24:38.774 UTC [kvledger] NewProvider -> INFO 03c Initializing ledger provider" +"2019-09-24 00:24:38.775 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03d CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" +"2019-09-24 00:24:38.775 UTC [kvledger.util] logDirStatus -> DEBU 03e Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" +"2019-09-24 00:24:38.776 UTC [kvledger.util] logDirStatus -> DEBU 03f After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" +"2019-09-24 00:24:38.806 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 040 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" +"2019-09-24 00:24:38.806 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" +"2019-09-24 00:24:38.806 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" +"2019-09-24 00:24:38.807 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" +"2019-09-24 00:24:38.824 UTC [kvledger.util] CreateDirIfMissing -> DEBU 044 CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/]" +"2019-09-24 00:24:38.825 UTC [kvledger.util] logDirStatus -> DEBU 045 Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist" +"2019-09-24 00:24:38.825 UTC [kvledger.util] logDirStatus -> DEBU 046 After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists" +"2019-09-24 00:24:38.844 UTC [kvledger] NewProvider -> INFO 047 ledger provider Initialized" +"2019-09-24 00:24:38.845 UTC [confighistory] newDBProvider -> DEBU 048 Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" +"2019-09-24 00:24:38.845 UTC [kvledger.util] CreateDirIfMissing -> DEBU 049 CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" +"2019-09-24 00:24:38.845 UTC [kvledger.util] logDirStatus -> DEBU 04a Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" +"2019-09-24 00:24:38.846 UTC [kvledger.util] logDirStatus -> DEBU 04b After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" +"2019-09-24 00:24:38.871 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" +"2019-09-24 00:24:38.871 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" +"2019-09-24 00:24:38.872 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" +"2019-09-24 00:24:39.267 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" +"2019-09-24 00:24:39.267 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" +"2019-09-24 00:24:39.267 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" +"2019-09-24 00:24:39.300 UTC [kvledger.util] CreateDirIfMissing -> DEBU 052 CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" +"2019-09-24 00:24:39.300 UTC [kvledger.util] logDirStatus -> DEBU 053 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" +"2019-09-24 00:24:39.300 UTC [kvledger.util] logDirStatus -> DEBU 054 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" +"2019-09-24 00:24:39.314 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 055 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" +"2019-09-24 00:24:39.314 UTC [kvledger.util] CreateDirIfMissing -> DEBU 056 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" +"2019-09-24 00:24:39.314 UTC [kvledger.util] logDirStatus -> DEBU 057 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" +"2019-09-24 00:24:39.314 UTC [kvledger.util] logDirStatus -> DEBU 058 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" +"2019-09-24 00:24:39.363 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 059 Recovering under construction ledger" +"2019-09-24 00:24:39.363 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 05a No under construction ledger found. Quitting recovery" +"2019-09-24 00:24:39.363 UTC [ledgermgmt] initialize -> INFO 05b ledger mgmt initialized" +"2019-09-24 00:24:39.364 UTC [peer] func1 -> INFO 05c Auto-detected peer address: 172.18.0.7:7051" +"2019-09-24 00:24:39.364 UTC [peer] func1 -> INFO 05d Returning peer0.org1.example.com:7051" +"2019-09-24 00:24:39.364 UTC [peer] func1 -> INFO 05e Auto-detected peer address: 172.18.0.7:7051" +"2019-09-24 00:24:39.364 UTC [peer] func1 -> INFO 05f Returning peer0.org1.example.com:7051" +"2019-09-24 00:24:39.514 UTC [nodeCmd] serve -> INFO 060 Starting peer with TLS enabled" +"2019-09-24 00:24:39.536 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 061 Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +"2019-09-24 00:24:39.537 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 062 Exit with ccEndpoint: peer0.org1.example.com:7052" +"2019-09-24 00:24:39.566 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: lscc-1.4.2" +"2019-09-24 00:24:39.566 UTC [sccapi] registerSysCC -> INFO 064 system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +"2019-09-24 00:24:39.566 UTC [inproccontroller] Register -> DEBU 065 Registering chaincode instance: cscc-1.4.2" +"2019-09-24 00:24:39.566 UTC [sccapi] registerSysCC -> INFO 066 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +"2019-09-24 00:24:39.570 UTC [inproccontroller] Register -> DEBU 067 Registering chaincode instance: qscc-1.4.2" +"2019-09-24 00:24:39.570 UTC [sccapi] registerSysCC -> INFO 068 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +"2019-09-24 00:24:39.572 UTC [sccapi] registerSysCC -> INFO 069 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +"2019-09-24 00:24:39.573 UTC [nodeCmd] serve -> DEBU 06a Running peer" +"2019-09-24 00:24:39.577 UTC [msp] GetDefaultSigningIdentity -> DEBU 06b Obtaining default signing identity" +"2019-09-24 00:24:39.578 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[string]interface{} value for peer.handlers" +"2019-09-24 00:24:39.578 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" +"2019-09-24 00:24:39.578 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" +"2019-09-24 00:24:39.578 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" +"2019-09-24 00:24:39.578 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" +"2019-09-24 00:24:39.578 UTC [viperutil] getKeysRecursively -> DEBU 071 Found map[string]interface{} value for peer.handlers.endorsers" +"2019-09-24 00:24:39.579 UTC [viperutil] getKeysRecursively -> DEBU 072 Found map[string]interface{} value for peer.handlers.endorsers.escc" +"2019-09-24 00:24:39.579 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +"2019-09-24 00:24:39.580 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" +"2019-09-24 00:24:39.584 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value is not a string: " +"2019-09-24 00:24:39.585 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for peer.handlers.endorsers.escc.library setting to " +"2019-09-24 00:24:39.586 UTC [viperutil] getKeysRecursively -> DEBU 077 Found map[string]interface{} value for peer.handlers.validators" +"2019-09-24 00:24:39.588 UTC [viperutil] getKeysRecursively -> DEBU 078 Found map[string]interface{} value for peer.handlers.validators.vscc" +"2019-09-24 00:24:39.601 UTC [viperutil] unmarshalJSON -> DEBU 079 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +"2019-09-24 00:24:39.602 UTC [viperutil] getKeysRecursively -> DEBU 07a Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" +"2019-09-24 00:24:39.608 UTC [viperutil] unmarshalJSON -> DEBU 07b Unmarshal JSON: value is not a string: " +"2019-09-24 00:24:39.610 UTC [viperutil] getKeysRecursively -> DEBU 07c Found real value for peer.handlers.validators.vscc.library setting to " +"2019-09-24 00:24:39.610 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 07d map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" +"2019-09-24 00:24:39.628 UTC [gossip.service] func1 -> INFO 07e Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +"2019-09-24 00:24:39.631 UTC [msp] DeserializeIdentity -> DEBU 07f Obtaining identity" +"2019-09-24 00:24:39.631 UTC [msp.identity] newIdentity -> DEBU 080 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -201,16 +201,26 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig -----END CERTIFICATE-----" -"2019-07-20 02:39:32.258 UTC [msp] Validate -> DEBU 081 MSP Org1MSP validating identity" -"2019-07-20 02:39:32.259 UTC [gossip.gossip] NewGossipService -> INFO 082 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " -"2019-07-20 02:39:32.259 UTC [msp] GetDefaultSigningIdentity -> DEBU 083 Obtaining default signing identity" -"2019-07-20 02:39:32.259 UTC [msp.identity] Sign -> DEBU 084 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:39:32.259 UTC [msp.identity] Sign -> DEBU 085 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " -"2019-07-20 02:39:32.259 UTC [gossip.pull] Add -> DEBU 086 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" -"2019-07-20 02:39:32.259 UTC [chaincode] LaunchConfig -> DEBU 087 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -"2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 088 start container: lscc:1.4.2" -"2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 089 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -"2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 08a start container with env: +"2019-09-24 00:24:39.632 UTC [msp] Validate -> DEBU 081 MSP Org1MSP validating identity" +"2019-09-24 00:24:39.632 UTC [gossip.gossip] NewGossipService -> INFO 082 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +"2019-09-24 00:24:39.632 UTC [gossip.discovery] periodicalSendAlive -> DEBU 083 Sleeping 5s" +"2019-09-24 00:24:39.632 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 084 Sleeping 25s" +"2019-09-24 00:24:39.632 UTC [msp] GetDefaultSigningIdentity -> DEBU 085 Obtaining default signing identity" +"2019-09-24 00:24:39.632 UTC [msp.identity] Sign -> DEBU 086 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:24:39.632 UTC [msp.identity] Sign -> DEBU 087 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " +"2019-09-24 00:24:39.633 UTC [gossip.pull] Add -> DEBU 088 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" +"2019-09-24 00:24:39.633 UTC [gossip.gossip] start -> INFO 089 Gossip instance peer0.org1.example.com:7051 started" +"2019-09-24 00:24:39.633 UTC [gossip.gossip] syncDiscovery -> DEBU 08a Entering discovery sync with interval 4s" +"2019-09-24 00:24:39.633 UTC [msp] GetDefaultSigningIdentity -> DEBU 08b Obtaining default signing identity" +"2019-09-24 00:24:39.633 UTC [msp.identity] Sign -> DEBU 08c Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:24:39.633 UTC [msp.identity] Sign -> DEBU 08d Sign: digest: 87CD5FE9BE73F84DEECF12B810FB422CC95B75EDE44440822206D00025EEE7C1 " +"2019-09-24 00:24:39.633 UTC [msp] GetDefaultSigningIdentity -> DEBU 08e Obtaining default signing identity" +"2019-09-24 00:24:39.633 UTC [chaincode] LaunchConfig -> DEBU 08f launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-09-24 00:24:39.633 UTC [msp.identity] Sign -> DEBU 090 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:39.633 UTC [chaincode] Start -> DEBU 091 start container: lscc:1.4.2" +"2019-09-24 00:24:39.633 UTC [msp.identity] Sign -> DEBU 092 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:39.633 UTC [chaincode] Start -> DEBU 093 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-09-24 00:24:39.633 UTC [chaincode] Start -> DEBU 094 start container with env: CORE_CHAINCODE_LOGGING_LEVEL=info CORE_CHAINCODE_LOGGING_SHIM=warning CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} @@ -219,43 +229,33 @@ whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -"2019-07-20 02:39:32.259 UTC [container] lockContainer -> DEBU 08b waiting for container(lscc-1.4.2) lock" -"2019-07-20 02:39:32.259 UTC [container] lockContainer -> DEBU 08c got container (lscc-1.4.2) lock" -"2019-07-20 02:39:32.259 UTC [inproccontroller] getInstance -> DEBU 08d chaincode instance created for lscc-1.4.2" -"2019-07-20 02:39:32.260 UTC [container] unlockContainer -> DEBU 08e container lock deleted(lscc-1.4.2)" -"2019-07-20 02:39:32.260 UTC [container] lockContainer -> DEBU 08f waiting for container(lscc-1.4.2) lock" -"2019-07-20 02:39:32.260 UTC [container] lockContainer -> DEBU 090 got container (lscc-1.4.2) lock" -"2019-07-20 02:39:32.260 UTC [container] unlockContainer -> DEBU 091 container lock deleted(lscc-1.4.2)" -"2019-07-20 02:39:32.260 UTC [gossip.discovery] periodicalSendAlive -> DEBU 092 Sleeping 5s" -"2019-07-20 02:39:32.260 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 093 Sleeping 25s" -"2019-07-20 02:39:32.260 UTC [gossip.gossip] start -> INFO 094 Gossip instance peer0.org1.example.com:7051 started" -"2019-07-20 02:39:32.260 UTC [gossip.discovery] Connect -> DEBU 095 Skipping connecting to myself" -"2019-07-20 02:39:32.260 UTC [inproccontroller] func2 -> DEBU 096 chaincode-support started for lscc-1.4.2" -"2019-07-20 02:39:32.260 UTC [gossip.gossip] syncDiscovery -> DEBU 097 Entering discovery sync with interval 4s" -"2019-07-20 02:39:32.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 098 Obtaining default signing identity" -"2019-07-20 02:39:32.260 UTC [msp.identity] Sign -> DEBU 099 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:39:32.260 UTC [msp.identity] Sign -> DEBU 09a Sign: digest: 7E3C77047CA93B8C7F731924D75623F5C661C7730339FC5CC4407511CEC80F44 " -"2019-07-20 02:39:32.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 09b Obtaining default signing identity" -"2019-07-20 02:39:32.261 UTC [msp.identity] Sign -> DEBU 09c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:32.261 UTC [msp.identity] Sign -> DEBU 09d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:32.261 UTC [inproccontroller] func1 -> DEBU 09e chaincode started for lscc-1.4.2" -"2019-07-20 02:39:32.261 UTC [chaincode] handleMessage -> DEBU 09f [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -"2019-07-20 02:39:32.264 UTC [chaincode] HandleRegister -> DEBU 0a0 Received REGISTER in state created" -"2019-07-20 02:39:32.264 UTC [chaincode] Register -> DEBU 0a1 registered handler complete for chaincode lscc:1.4.2" -"2019-07-20 02:39:32.264 UTC [chaincode] HandleRegister -> DEBU 0a2 Got REGISTER for chaincodeID = name:"lscc:1.4.2" , sending back REGISTERED" -"2019-07-20 02:39:32.265 UTC [chaincode] HandleRegister -> DEBU 0a3 Changed state to established for name:"lscc:1.4.2" " -"2019-07-20 02:39:32.265 UTC [chaincode] sendReady -> DEBU 0a4 sending READY for chaincode name:"lscc:1.4.2" " -"2019-07-20 02:39:32.265 UTC [chaincode] sendReady -> DEBU 0a5 Changed to state ready for chaincode name:"lscc:1.4.2" " -"2019-07-20 02:39:32.266 UTC [chaincode] Launch -> DEBU 0a6 launch complete" -"2019-07-20 02:39:32.266 UTC [chaincode] Execute -> DEBU 0a7 Entry" -"2019-07-20 02:39:32.266 UTC [chaincode] handleMessage -> DEBU 0a8 [dbe52f5c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:39:32.266 UTC [chaincode] Notify -> DEBU 0a9 [dbe52f5c] notifying Txid:dbe52f5c-537d-44e1-816c-4dfa64df5df7, channelID:" -"2019-07-20 02:39:32.266 UTC [chaincode] Execute -> DEBU 0aa Exit" -"2019-07-20 02:39:32.267 UTC [sccapi] deploySysCC -> INFO 0ab system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" -"2019-07-20 02:39:32.268 UTC [chaincode] LaunchConfig -> DEBU 0ac launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -"2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0ad start container: cscc:1.4.2" -"2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0ae start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -"2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0af start container with env: +"2019-09-24 00:24:39.633 UTC [container] lockContainer -> DEBU 095 waiting for container(lscc-1.4.2) lock" +"2019-09-24 00:24:39.633 UTC [container] lockContainer -> DEBU 096 got container (lscc-1.4.2) lock" +"2019-09-24 00:24:39.633 UTC [gossip.discovery] Connect -> DEBU 097 Skipping connecting to myself" +"2019-09-24 00:24:39.633 UTC [inproccontroller] getInstance -> DEBU 098 chaincode instance created for lscc-1.4.2" +"2019-09-24 00:24:39.633 UTC [container] unlockContainer -> DEBU 099 container lock deleted(lscc-1.4.2)" +"2019-09-24 00:24:39.633 UTC [container] lockContainer -> DEBU 09a waiting for container(lscc-1.4.2) lock" +"2019-09-24 00:24:39.633 UTC [container] lockContainer -> DEBU 09b got container (lscc-1.4.2) lock" +"2019-09-24 00:24:39.633 UTC [container] unlockContainer -> DEBU 09c container lock deleted(lscc-1.4.2)" +"2019-09-24 00:24:39.633 UTC [inproccontroller] func2 -> DEBU 09d chaincode-support started for lscc-1.4.2" +"2019-09-24 00:24:39.633 UTC [inproccontroller] func1 -> DEBU 09e chaincode started for lscc-1.4.2" +"2019-09-24 00:24:39.633 UTC [chaincode] handleMessage -> DEBU 09f [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-09-24 00:24:39.634 UTC [chaincode] HandleRegister -> DEBU 0a0 Received REGISTER in state created" +"2019-09-24 00:24:39.634 UTC [chaincode] Register -> DEBU 0a1 registered handler complete for chaincode lscc:1.4.2" +"2019-09-24 00:24:39.634 UTC [chaincode] HandleRegister -> DEBU 0a2 Got REGISTER for chaincodeID = name:"lscc:1.4.2" , sending back REGISTERED" +"2019-09-24 00:24:39.634 UTC [chaincode] HandleRegister -> DEBU 0a3 Changed state to established for name:"lscc:1.4.2" " +"2019-09-24 00:24:39.634 UTC [chaincode] sendReady -> DEBU 0a4 sending READY for chaincode name:"lscc:1.4.2" " +"2019-09-24 00:24:39.634 UTC [chaincode] sendReady -> DEBU 0a5 Changed to state ready for chaincode name:"lscc:1.4.2" " +"2019-09-24 00:24:39.634 UTC [chaincode] Launch -> DEBU 0a6 launch complete" +"2019-09-24 00:24:39.634 UTC [chaincode] Execute -> DEBU 0a7 Entry" +"2019-09-24 00:24:39.634 UTC [chaincode] handleMessage -> DEBU 0a8 [4c9ee884] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:24:39.634 UTC [chaincode] Notify -> DEBU 0a9 [4c9ee884] notifying Txid:4c9ee884-13fa-4d78-a3d9-e2599a1fb5c0, channelID:" +"2019-09-24 00:24:39.634 UTC [chaincode] Execute -> DEBU 0aa Exit" +"2019-09-24 00:24:39.635 UTC [sccapi] deploySysCC -> INFO 0ab system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-09-24 00:24:39.635 UTC [chaincode] LaunchConfig -> DEBU 0ac launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-09-24 00:24:39.635 UTC [chaincode] Start -> DEBU 0ad start container: cscc:1.4.2" +"2019-09-24 00:24:39.635 UTC [chaincode] Start -> DEBU 0ae start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-09-24 00:24:39.635 UTC [chaincode] Start -> DEBU 0af start container with env: CORE_CHAINCODE_LOGGING_LEVEL=info CORE_CHAINCODE_LOGGING_SHIM=warning CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} @@ -264,33 +264,33 @@ whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -"2019-07-20 02:39:32.268 UTC [container] lockContainer -> DEBU 0b0 waiting for container(cscc-1.4.2) lock" -"2019-07-20 02:39:32.268 UTC [container] lockContainer -> DEBU 0b1 got container (cscc-1.4.2) lock" -"2019-07-20 02:39:32.269 UTC [inproccontroller] getInstance -> DEBU 0b2 chaincode instance created for cscc-1.4.2" -"2019-07-20 02:39:32.269 UTC [container] unlockContainer -> DEBU 0b3 container lock deleted(cscc-1.4.2)" -"2019-07-20 02:39:32.269 UTC [container] lockContainer -> DEBU 0b4 waiting for container(cscc-1.4.2) lock" -"2019-07-20 02:39:32.270 UTC [container] lockContainer -> DEBU 0b5 got container (cscc-1.4.2) lock" -"2019-07-20 02:39:32.270 UTC [container] unlockContainer -> DEBU 0b6 container lock deleted(cscc-1.4.2)" -"2019-07-20 02:39:32.270 UTC [inproccontroller] func2 -> DEBU 0b7 chaincode-support started for cscc-1.4.2" -"2019-07-20 02:39:32.270 UTC [inproccontroller] func1 -> DEBU 0b8 chaincode started for cscc-1.4.2" -"2019-07-20 02:39:32.270 UTC [chaincode] handleMessage -> DEBU 0b9 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -"2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0ba Received REGISTER in state created" -"2019-07-20 02:39:32.270 UTC [chaincode] Register -> DEBU 0bb registered handler complete for chaincode cscc:1.4.2" -"2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0bc Got REGISTER for chaincodeID = name:"cscc:1.4.2" , sending back REGISTERED" -"2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0bd Changed state to established for name:"cscc:1.4.2" " -"2019-07-20 02:39:32.270 UTC [chaincode] sendReady -> DEBU 0be sending READY for chaincode name:"cscc:1.4.2" " -"2019-07-20 02:39:32.270 UTC [chaincode] sendReady -> DEBU 0bf Changed to state ready for chaincode name:"cscc:1.4.2" " -"2019-07-20 02:39:32.270 UTC [chaincode] Launch -> DEBU 0c0 launch complete" -"2019-07-20 02:39:32.270 UTC [chaincode] Execute -> DEBU 0c1 Entry" -"2019-07-20 02:39:32.270 UTC [cscc] Init -> INFO 0c2 Init CSCC" -"2019-07-20 02:39:32.270 UTC [chaincode] handleMessage -> DEBU 0c3 [dd4774bb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:39:32.270 UTC [chaincode] Notify -> DEBU 0c4 [dd4774bb] notifying Txid:dd4774bb-4464-4743-9294-61e3823b8baa, channelID:" -"2019-07-20 02:39:32.270 UTC [chaincode] Execute -> DEBU 0c5 Exit" -"2019-07-20 02:39:32.271 UTC [sccapi] deploySysCC -> INFO 0c6 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" -"2019-07-20 02:39:32.271 UTC [chaincode] LaunchConfig -> DEBU 0c7 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -"2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0c8 start container: qscc:1.4.2" -"2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0c9 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -"2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0ca start container with env: +"2019-09-24 00:24:39.635 UTC [container] lockContainer -> DEBU 0b0 waiting for container(cscc-1.4.2) lock" +"2019-09-24 00:24:39.635 UTC [container] lockContainer -> DEBU 0b1 got container (cscc-1.4.2) lock" +"2019-09-24 00:24:39.635 UTC [inproccontroller] getInstance -> DEBU 0b2 chaincode instance created for cscc-1.4.2" +"2019-09-24 00:24:39.636 UTC [container] unlockContainer -> DEBU 0b3 container lock deleted(cscc-1.4.2)" +"2019-09-24 00:24:39.636 UTC [container] lockContainer -> DEBU 0b4 waiting for container(cscc-1.4.2) lock" +"2019-09-24 00:24:39.636 UTC [container] lockContainer -> DEBU 0b5 got container (cscc-1.4.2) lock" +"2019-09-24 00:24:39.636 UTC [container] unlockContainer -> DEBU 0b6 container lock deleted(cscc-1.4.2)" +"2019-09-24 00:24:39.636 UTC [inproccontroller] func2 -> DEBU 0b7 chaincode-support started for cscc-1.4.2" +"2019-09-24 00:24:39.636 UTC [inproccontroller] func1 -> DEBU 0b8 chaincode started for cscc-1.4.2" +"2019-09-24 00:24:39.636 UTC [chaincode] handleMessage -> DEBU 0b9 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-09-24 00:24:39.636 UTC [chaincode] HandleRegister -> DEBU 0ba Received REGISTER in state created" +"2019-09-24 00:24:39.636 UTC [chaincode] Register -> DEBU 0bb registered handler complete for chaincode cscc:1.4.2" +"2019-09-24 00:24:39.636 UTC [chaincode] HandleRegister -> DEBU 0bc Got REGISTER for chaincodeID = name:"cscc:1.4.2" , sending back REGISTERED" +"2019-09-24 00:24:39.636 UTC [chaincode] HandleRegister -> DEBU 0bd Changed state to established for name:"cscc:1.4.2" " +"2019-09-24 00:24:39.636 UTC [chaincode] sendReady -> DEBU 0be sending READY for chaincode name:"cscc:1.4.2" " +"2019-09-24 00:24:39.636 UTC [chaincode] sendReady -> DEBU 0bf Changed to state ready for chaincode name:"cscc:1.4.2" " +"2019-09-24 00:24:39.636 UTC [chaincode] Launch -> DEBU 0c0 launch complete" +"2019-09-24 00:24:39.636 UTC [chaincode] Execute -> DEBU 0c1 Entry" +"2019-09-24 00:24:39.636 UTC [cscc] Init -> INFO 0c2 Init CSCC" +"2019-09-24 00:24:39.636 UTC [chaincode] handleMessage -> DEBU 0c3 [c4e7c39e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:24:39.636 UTC [chaincode] Notify -> DEBU 0c4 [c4e7c39e] notifying Txid:c4e7c39e-a583-43b1-954d-8a9ae27eb47d, channelID:" +"2019-09-24 00:24:39.636 UTC [chaincode] Execute -> DEBU 0c5 Exit" +"2019-09-24 00:24:39.636 UTC [sccapi] deploySysCC -> INFO 0c6 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-09-24 00:24:39.637 UTC [chaincode] LaunchConfig -> DEBU 0c7 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-09-24 00:24:39.637 UTC [chaincode] Start -> DEBU 0c8 start container: qscc:1.4.2" +"2019-09-24 00:24:39.637 UTC [chaincode] Start -> DEBU 0c9 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-09-24 00:24:39.637 UTC [chaincode] Start -> DEBU 0ca start container with env: CORE_CHAINCODE_LOGGING_LEVEL=info CORE_CHAINCODE_LOGGING_SHIM=warning CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} @@ -299,48 +299,48 @@ whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -"2019-07-20 02:39:32.271 UTC [container] lockContainer -> DEBU 0cb waiting for container(qscc-1.4.2) lock" -"2019-07-20 02:39:32.272 UTC [container] lockContainer -> DEBU 0cc got container (qscc-1.4.2) lock" -"2019-07-20 02:39:32.274 UTC [inproccontroller] getInstance -> DEBU 0cd chaincode instance created for qscc-1.4.2" -"2019-07-20 02:39:32.274 UTC [container] unlockContainer -> DEBU 0ce container lock deleted(qscc-1.4.2)" -"2019-07-20 02:39:32.274 UTC [container] lockContainer -> DEBU 0cf waiting for container(qscc-1.4.2) lock" -"2019-07-20 02:39:32.274 UTC [container] lockContainer -> DEBU 0d0 got container (qscc-1.4.2) lock" -"2019-07-20 02:39:32.274 UTC [container] unlockContainer -> DEBU 0d1 container lock deleted(qscc-1.4.2)" -"2019-07-20 02:39:32.274 UTC [inproccontroller] func2 -> DEBU 0d2 chaincode-support started for qscc-1.4.2" -"2019-07-20 02:39:32.274 UTC [inproccontroller] func1 -> DEBU 0d3 chaincode started for qscc-1.4.2" -"2019-07-20 02:39:32.274 UTC [chaincode] handleMessage -> DEBU 0d4 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -"2019-07-20 02:39:32.274 UTC [chaincode] HandleRegister -> DEBU 0d5 Received REGISTER in state created" -"2019-07-20 02:39:32.274 UTC [chaincode] Register -> DEBU 0d6 registered handler complete for chaincode qscc:1.4.2" -"2019-07-20 02:39:32.275 UTC [chaincode] HandleRegister -> DEBU 0d7 Got REGISTER for chaincodeID = name:"qscc:1.4.2" , sending back REGISTERED" -"2019-07-20 02:39:32.275 UTC [chaincode] HandleRegister -> DEBU 0d8 Changed state to established for name:"qscc:1.4.2" " -"2019-07-20 02:39:32.275 UTC [chaincode] sendReady -> DEBU 0d9 sending READY for chaincode name:"qscc:1.4.2" " -"2019-07-20 02:39:32.275 UTC [chaincode] sendReady -> DEBU 0da Changed to state ready for chaincode name:"qscc:1.4.2" " -"2019-07-20 02:39:32.276 UTC [chaincode] Launch -> DEBU 0db launch complete" -"2019-07-20 02:39:32.276 UTC [chaincode] Execute -> DEBU 0dc Entry" -"2019-07-20 02:39:32.278 UTC [qscc] Init -> INFO 0dd Init QSCC" -"2019-07-20 02:39:32.280 UTC [chaincode] handleMessage -> DEBU 0de [e80edd21] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:39:32.282 UTC [chaincode] Notify -> DEBU 0df [e80edd21] notifying Txid:e80edd21-ca6d-4ff6-8876-1ec3a73be04a, channelID:" -"2019-07-20 02:39:32.282 UTC [chaincode] Execute -> DEBU 0e0 Exit" -"2019-07-20 02:39:32.282 UTC [sccapi] deploySysCC -> INFO 0e1 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" -"2019-07-20 02:39:32.285 UTC [sccapi] deploySysCC -> INFO 0e2 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" -"2019-07-20 02:39:32.285 UTC [nodeCmd] serve -> INFO 0e3 Deployed system chaincodes" -"2019-07-20 02:39:32.285 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0e4 Returning []" -"2019-07-20 02:39:32.287 UTC [discovery] NewService -> INFO 0e5 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" -"2019-07-20 02:39:32.288 UTC [nodeCmd] registerDiscoveryService -> INFO 0e6 Discovery service activated" -"2019-07-20 02:39:32.289 UTC [nodeCmd] serve -> INFO 0e7 Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" -"2019-07-20 02:39:32.289 UTC [nodeCmd] serve -> INFO 0e8 Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" -"2019-07-20 02:39:32.297 UTC [kvledger] LoadPreResetHeight -> INFO 0e9 Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" -"2019-07-20 02:39:32.298 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ea Loading Pre-reset heights" -"2019-07-20 02:39:32.299 UTC [fsblkstorage] preRestHtFiles -> INFO 0eb Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" -"2019-07-20 02:39:32.299 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ec Pre-reset heights loaded" -"2019-07-20 02:39:32.402 UTC [comm.grpc.server] 1 -> INFO 0ed unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:34.398Z grpc.peer_address=172.18.0.6:33926 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.5235ms -"2019-07-20 02:39:32.408 UTC [msp] GetDefaultSigningIdentity -> DEBU 0ee Obtaining default signing identity" -"2019-07-20 02:39:32.409 UTC [msp.identity] Sign -> DEBU 0ef Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:32.409 UTC [msp.identity] Sign -> DEBU 0f0 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:32.411 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f1 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33926" -"2019-07-20 02:39:32.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f2 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33926" -"2019-07-20 02:39:32.413 UTC [msp] DeserializeIdentity -> DEBU 0f3 Obtaining identity" -"2019-07-20 02:39:32.414 UTC [msp.identity] newIdentity -> DEBU 0f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:39.637 UTC [container] lockContainer -> DEBU 0cb waiting for container(qscc-1.4.2) lock" +"2019-09-24 00:24:39.637 UTC [container] lockContainer -> DEBU 0cc got container (qscc-1.4.2) lock" +"2019-09-24 00:24:39.637 UTC [inproccontroller] getInstance -> DEBU 0cd chaincode instance created for qscc-1.4.2" +"2019-09-24 00:24:39.637 UTC [container] unlockContainer -> DEBU 0ce container lock deleted(qscc-1.4.2)" +"2019-09-24 00:24:39.637 UTC [container] lockContainer -> DEBU 0cf waiting for container(qscc-1.4.2) lock" +"2019-09-24 00:24:39.637 UTC [container] lockContainer -> DEBU 0d0 got container (qscc-1.4.2) lock" +"2019-09-24 00:24:39.637 UTC [container] unlockContainer -> DEBU 0d1 container lock deleted(qscc-1.4.2)" +"2019-09-24 00:24:39.637 UTC [inproccontroller] func2 -> DEBU 0d2 chaincode-support started for qscc-1.4.2" +"2019-09-24 00:24:39.637 UTC [inproccontroller] func1 -> DEBU 0d3 chaincode started for qscc-1.4.2" +"2019-09-24 00:24:39.637 UTC [chaincode] handleMessage -> DEBU 0d4 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-09-24 00:24:39.637 UTC [chaincode] HandleRegister -> DEBU 0d5 Received REGISTER in state created" +"2019-09-24 00:24:39.637 UTC [chaincode] Register -> DEBU 0d6 registered handler complete for chaincode qscc:1.4.2" +"2019-09-24 00:24:39.638 UTC [chaincode] HandleRegister -> DEBU 0d7 Got REGISTER for chaincodeID = name:"qscc:1.4.2" , sending back REGISTERED" +"2019-09-24 00:24:39.638 UTC [chaincode] HandleRegister -> DEBU 0d8 Changed state to established for name:"qscc:1.4.2" " +"2019-09-24 00:24:39.638 UTC [chaincode] sendReady -> DEBU 0d9 sending READY for chaincode name:"qscc:1.4.2" " +"2019-09-24 00:24:39.638 UTC [chaincode] sendReady -> DEBU 0da Changed to state ready for chaincode name:"qscc:1.4.2" " +"2019-09-24 00:24:39.638 UTC [chaincode] Launch -> DEBU 0db launch complete" +"2019-09-24 00:24:39.638 UTC [chaincode] Execute -> DEBU 0dc Entry" +"2019-09-24 00:24:39.638 UTC [qscc] Init -> INFO 0dd Init QSCC" +"2019-09-24 00:24:39.638 UTC [chaincode] handleMessage -> DEBU 0de [9b393cce] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:24:39.638 UTC [chaincode] Notify -> DEBU 0df [9b393cce] notifying Txid:9b393cce-961e-4b01-9bc3-09f7e37e8a58, channelID:" +"2019-09-24 00:24:39.638 UTC [chaincode] Execute -> DEBU 0e0 Exit" +"2019-09-24 00:24:39.638 UTC [sccapi] deploySysCC -> INFO 0e1 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-09-24 00:24:39.638 UTC [sccapi] deploySysCC -> INFO 0e2 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +"2019-09-24 00:24:39.638 UTC [nodeCmd] serve -> INFO 0e3 Deployed system chaincodes" +"2019-09-24 00:24:39.638 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0e4 Returning []" +"2019-09-24 00:24:39.640 UTC [discovery] NewService -> INFO 0e5 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +"2019-09-24 00:24:39.640 UTC [nodeCmd] registerDiscoveryService -> INFO 0e6 Discovery service activated" +"2019-09-24 00:24:39.640 UTC [nodeCmd] serve -> INFO 0e7 Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-09-24 00:24:39.640 UTC [nodeCmd] serve -> INFO 0e8 Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-09-24 00:24:39.641 UTC [kvledger] LoadPreResetHeight -> INFO 0e9 Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +"2019-09-24 00:24:39.641 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ea Loading Pre-reset heights" +"2019-09-24 00:24:39.641 UTC [fsblkstorage] preRestHtFiles -> INFO 0eb Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +"2019-09-24 00:24:39.641 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ec Pre-reset heights loaded" +"2019-09-24 00:24:40.294 UTC [comm.grpc.server] 1 -> INFO 0ed unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:24:42.292Z grpc.peer_address=172.18.0.5:48998 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=219µs +"2019-09-24 00:24:40.297 UTC [msp] GetDefaultSigningIdentity -> DEBU 0ee Obtaining default signing identity" +"2019-09-24 00:24:40.297 UTC [msp.identity] Sign -> DEBU 0ef Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:24:40.297 UTC [msp.identity] Sign -> DEBU 0f0 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:24:40.297 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f1 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:48998" +"2019-09-24 00:24:40.298 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f2 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:48998" +"2019-09-24 00:24:40.298 UTC [msp] DeserializeIdentity -> DEBU 0f3 Obtaining identity" +"2019-09-24 00:24:40.298 UTC [msp.identity] newIdentity -> DEBU 0f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -354,300 +354,497 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE-----" -"2019-07-20 02:39:32.416 UTC [msp] Validate -> DEBU 0f5 MSP Org1MSP validating identity" -"2019-07-20 02:39:32.419 UTC [msp.identity] Verify -> DEBU 0f6 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +"2019-09-24 00:24:40.299 UTC [msp] Validate -> DEBU 0f5 MSP Org1MSP validating identity" +"2019-09-24 00:24:40.299 UTC [msp.identity] Verify -> DEBU 0f6 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-07-20 02:39:32.420 UTC [msp.identity] Verify -> DEBU 0f7 Verify: sig = 00000000 30 44 02 20 62 50 27 ef fd ff 99 f3 fa 9f fb 25 |0D. bP'........%| -00000010 a5 b6 dd 69 14 43 54 dd 2a 89 a8 f7 84 a5 5b 13 |...i.CT.*.....[.| -00000020 cf 71 2b e4 02 20 4f fc b5 89 f4 24 86 29 6b 28 |.q+.. O....$.)k(| -00000030 3a 35 21 ab 22 9e b5 b1 74 3d 09 a4 e6 f7 fc f5 |:5!."...t=......| -00000040 6f 49 7a 82 89 a8 |oIz...|" -"2019-07-20 02:39:32.421 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f8 Authenticated 172.18.0.6:33926" -"2019-07-20 02:39:32.422 UTC [gossip.comm] GossipStream -> DEBU 0f9 Servicing 172.18.0.6:33926" -"2019-07-20 02:39:32.430 UTC [grpc] infof -> DEBU 0fa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:32.430 UTC [gossip.comm] readFromStream -> DEBU 0fb Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:32.431 UTC [gossip.comm] func2 -> DEBU 0fc Client 172.18.0.6:33926 disconnected" -"2019-07-20 02:39:32.431 UTC [comm.grpc.server] 1 -> INFO 0fd streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:42.407Z grpc.peer_address=172.18.0.6:33926 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.192ms -"2019-07-20 02:39:32.431 UTC [gossip.comm] writeToStream -> DEBU 0fe Closing writing to stream" -"2019-07-20 02:39:32.454 UTC [comm.grpc.server] 1 -> INFO 0ff unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:34.454Z grpc.peer_address=172.18.0.6:33928 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=197.1µs -"2019-07-20 02:39:32.459 UTC [msp] GetDefaultSigningIdentity -> DEBU 100 Obtaining default signing identity" -"2019-07-20 02:39:32.459 UTC [msp.identity] Sign -> DEBU 101 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:32.460 UTC [msp.identity] Sign -> DEBU 102 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:32.460 UTC [gossip.comm] authenticateRemotePeer -> DEBU 103 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:33928" -"2019-07-20 02:39:32.461 UTC [gossip.comm] authenticateRemotePeer -> DEBU 104 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33928" -"2019-07-20 02:39:32.462 UTC [msp.identity] Verify -> DEBU 105 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +"2019-09-24 00:24:40.299 UTC [msp.identity] Verify -> DEBU 0f7 Verify: sig = 00000000 30 45 02 21 00 83 f9 01 d7 95 8f 67 8c b5 7b 58 |0E.!.......g..{X| +00000010 ec 82 ec ad ef fe b4 7d 87 90 ab 88 4f b5 99 1d |.......}....O...| +00000020 3d ea 14 6b 4f 02 20 04 23 5b 33 4d de 27 58 10 |=..kO. .#[3M.'X.| +00000030 4e ef 2f 52 64 34 96 5e e5 ad ed d1 b6 3c c2 60 |N./Rd4.^.....<.`| +00000040 07 8a 4a 9d 57 7c fd |..J.W|.|" +"2019-09-24 00:24:40.300 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f8 Authenticated 172.18.0.5:48998" +"2019-09-24 00:24:40.300 UTC [gossip.comm] GossipStream -> DEBU 0f9 Servicing 172.18.0.5:48998" +"2019-09-24 00:24:40.308 UTC [gossip.comm] readFromStream -> DEBU 0fa Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:24:40.308 UTC [gossip.comm] func2 -> DEBU 0fb Client 172.18.0.5:48998 disconnected" +"2019-09-24 00:24:40.308 UTC [comm.grpc.server] 1 -> INFO 0fc streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:24:50.296Z grpc.peer_address=172.18.0.5:48998 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.5451ms +"2019-09-24 00:24:40.308 UTC [grpc] infof -> DEBU 0fd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:24:40.308 UTC [gossip.comm] writeToStream -> DEBU 0fe Closing writing to stream" +"2019-09-24 00:24:40.331 UTC [comm.grpc.server] 1 -> INFO 0ff unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:24:42.331Z grpc.peer_address=172.18.0.5:49000 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=178.1µs +"2019-09-24 00:24:40.332 UTC [msp] GetDefaultSigningIdentity -> DEBU 100 Obtaining default signing identity" +"2019-09-24 00:24:40.332 UTC [msp.identity] Sign -> DEBU 101 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:24:40.332 UTC [msp.identity] Sign -> DEBU 102 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:24:40.333 UTC [gossip.comm] authenticateRemotePeer -> DEBU 103 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:49000" +"2019-09-24 00:24:40.333 UTC [gossip.comm] authenticateRemotePeer -> DEBU 104 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49000" +"2019-09-24 00:24:40.333 UTC [msp.identity] Verify -> DEBU 105 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-07-20 02:39:32.462 UTC [msp.identity] Verify -> DEBU 106 Verify: sig = 00000000 30 45 02 21 00 85 eb 32 2b fe ea 70 97 13 df 66 |0E.!...2+..p...f| -00000010 e9 5c c6 70 13 8f 58 3f 4f 20 49 5a e1 e0 e1 ee |.\.p..X?O IZ....| -00000020 a7 8f cf 97 9f 02 20 4f ba b9 6e f9 d5 5f 68 74 |...... O..n.._ht| -00000030 7e cb 7c 45 6e 42 34 68 ad c6 02 40 62 d9 26 fc |~.|EnB4h...@b.&.| -00000040 b6 09 5f 11 9d 76 7b |.._..v{|" -"2019-07-20 02:39:32.462 UTC [gossip.comm] authenticateRemotePeer -> DEBU 107 Authenticated 172.18.0.6:33928" -"2019-07-20 02:39:32.462 UTC [gossip.comm] GossipStream -> DEBU 108 Servicing 172.18.0.6:33928" -"2019-07-20 02:39:32.472 UTC [gossip.gossip] handleMessage -> DEBU 109 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:3143746311377972350 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > > , Envelope: 1107 bytes, Signature: 0 bytes" -"2019-07-20 02:39:32.472 UTC [gossip.gossip] handleMessage -> DEBU 10a Exiting" -"2019-07-20 02:39:32.473 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10b Got message: GossipMessage: nonce:3143746311377972350 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > > , Envelope: 1107 bytes, Signature: 0 bytes" -"2019-07-20 02:39:32.477 UTC [msp.identity] Verify -> DEBU 10c Verify: digest = 00000000 36 0d 2b a0 4d e4 ea 95 4f ef f9 af c3 09 b0 27 |6.+.M...O......'| -00000010 b8 80 33 7f 2b 77 a6 c9 a2 75 9a f0 4e fc 58 d7 |..3.+w...u..N.X.|" -"2019-07-20 02:39:32.477 UTC [msp.identity] Verify -> DEBU 10d Verify: sig = 00000000 30 44 02 20 25 dd d1 a7 26 c2 43 34 f9 e9 31 43 |0D. %...&.C4..1C| -00000010 4f 3b eb 07 56 1b 0a 3f 54 e2 5c 23 68 4d 40 9c |O;..V..?T.\#hM@.| -00000020 41 1a 2d 55 02 20 37 4c b4 f5 a0 c2 d7 29 1f 75 |A.-U. 7L.....).u| -00000030 0c 56 24 ca a0 d1 b4 fe 97 3e 81 41 d5 c0 75 e5 |.V$......>.A..u.| -00000040 f7 38 75 74 19 67 |.8ut.g|" -"2019-07-20 02:39:32.482 UTC [msp.identity] Verify -> DEBU 10e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-09-24 00:24:40.333 UTC [msp.identity] Verify -> DEBU 106 Verify: sig = 00000000 30 45 02 21 00 8e 3b 1d 78 a3 2a 0d f2 16 f5 56 |0E.!..;.x.*....V| +00000010 35 3e 32 2e 85 33 6d 02 98 bc 5a 0a 53 d1 3b 80 |5>2..3m...Z.S.;.| +00000020 98 1b 8b 7a 79 02 20 23 c5 1e cf 64 03 d2 6b 0e |...zy. #...d..k.| +00000030 49 8d 5b f2 65 9e e2 e8 28 88 34 fd 03 0d 9c 6c |I.[.e...(.4....l| +00000040 37 7a fa 7f 5a 5f ee |7z..Z_.|" +"2019-09-24 00:24:40.333 UTC [gossip.comm] authenticateRemotePeer -> DEBU 107 Authenticated 172.18.0.5:49000" +"2019-09-24 00:24:40.333 UTC [gossip.comm] GossipStream -> DEBU 108 Servicing 172.18.0.5:49000" +"2019-09-24 00:24:40.335 UTC [gossip.gossip] handleMessage -> DEBU 109 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:8112369475667193039 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \013 > > , Envelope: 1108 bytes, Signature: 0 bytes" +"2019-09-24 00:24:40.335 UTC [gossip.gossip] handleMessage -> DEBU 10a Exiting" +"2019-09-24 00:24:40.336 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10b Got message: GossipMessage: nonce:8112369475667193039 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \013 > > , Envelope: 1108 bytes, Signature: 0 bytes" +"2019-09-24 00:24:40.336 UTC [msp.identity] Verify -> DEBU 10c Verify: digest = 00000000 0b da ec 46 04 af bd 3b e7 b1 54 46 46 b8 95 dc |...F...;..TFF...| +00000010 b0 f0 e0 df bb f0 09 d2 5c 18 af 9e 03 69 f6 f4 |........\....i..|" +"2019-09-24 00:24:40.336 UTC [msp.identity] Verify -> DEBU 10d Verify: sig = 00000000 30 44 02 20 0b 3c 51 59 ff 7b 27 47 42 f1 4e 5e |0D. . DEBU 10e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:39:32.482 UTC [msp.identity] Verify -> DEBU 10f Verify: sig = 00000000 30 44 02 20 34 36 e8 01 7a 14 85 df a0 47 d9 b9 |0D. 46..z....G..| -00000010 2e 59 03 c5 a1 0a 2c 4c b5 0f f1 1b ca 87 d9 8e |.Y....,L........| -00000020 79 0b c5 47 02 20 3c 8e 2d e4 2f 26 7c 34 f6 8a |y..G. <.-./&|4..| -00000030 0d f0 9e ca d7 64 cd cb f6 6e c3 e5 da df b4 6b |.....d...n.....k| -00000040 e2 10 6f b9 5e 1c |..o.^.|" -"2019-07-20 02:39:32.488 UTC [gossip.discovery] handleAliveMessage -> DEBU 110 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:32.489 UTC [gossip.discovery] learnNewMembers -> DEBU 111 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]}" -"2019-07-20 02:39:32.489 UTC [gossip.discovery] learnNewMembers -> DEBU 112 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:32.491 UTC [gossip.discovery] learnNewMembers -> DEBU 113 Exiting" -"2019-07-20 02:39:32.491 UTC [gossip.discovery] handleAliveMessage -> DEBU 114 Exiting" -"2019-07-20 02:39:32.491 UTC [gossip.discovery] sendMemResponse -> DEBU 115 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:39:32.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU 116 Exiting" -"2019-07-20 02:39:32.491 UTC [msp] GetDefaultSigningIdentity -> DEBU 117 Obtaining default signing identity" -"2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 118 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 119 Sign: digest: EEDAC9CD7ACBCFE46971DB564C2E5AA365F0897976382B04176023690F93A5FB " -"2019-07-20 02:39:32.491 UTC [msp] GetDefaultSigningIdentity -> DEBU 11a Obtaining default signing identity" -"2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 11b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:32.492 UTC [msp.identity] Sign -> DEBU 11c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:32.492 UTC [gossip.comm] Send -> DEBU 11d Entering, sending GossipMessage: Channel: , nonce: 3143746311377972350, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:32.492 UTC [gossip.discovery] sendMemResponse -> DEBU 11e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > alive:>R\277\2201\255\033\r\002 \005D\200h\362\266?i\207\217q\025\313\330ZC\267\352kq\311\211\343\2617\235\025\000\344\226\210\\" > > " -"2019-07-20 02:39:32.492 UTC [gossip.comm] sendToEndpoint -> DEBU 11f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3143746311377972350, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes" -"2019-07-20 02:39:32.493 UTC [gossip.comm] sendToEndpoint -> DEBU 120 Exiting" -"2019-07-20 02:39:36.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 121 Obtaining default signing identity" -"2019-07-20 02:39:36.263 UTC [msp.identity] Sign -> DEBU 123 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:39:36.263 UTC [msp.identity] Sign -> DEBU 124 Sign: digest: 211019455ECE33402BE8AD1B57D6700DECF3ACD4ED804612AC12B9E9313E91EB " -"2019-07-20 02:39:36.263 UTC [gossip.pull] Hello -> DEBU 122 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:39:36.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 125 Obtaining default signing identity" -"2019-07-20 02:39:36.266 UTC [gossip.comm] Send -> DEBU 126 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:36.266 UTC [gossip.comm] sendToEndpoint -> DEBU 127 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:36.266 UTC [gossip.comm] sendToEndpoint -> DEBU 128 Exiting" -"2019-07-20 02:39:36.267 UTC [msp.identity] Sign -> DEBU 129 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:36.268 UTC [msp.identity] Sign -> DEBU 12b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:36.268 UTC [gossip.gossip] handleMessage -> DEBU 12a Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -"2019-07-20 02:39:36.269 UTC [gossip.pull] HandleMessage -> DEBU 12c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -"2019-07-20 02:39:36.269 UTC [gossip.gossip] handleMessage -> DEBU 12d Exiting" -"2019-07-20 02:39:36.269 UTC [gossip.comm] Send -> DEBU 12e Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1093 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:36.270 UTC [gossip.comm] sendToEndpoint -> DEBU 12f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1093 bytes, Signature: 0 bytes" -"2019-07-20 02:39:36.270 UTC [gossip.comm] sendToEndpoint -> DEBU 130 Exiting" -"2019-07-20 02:39:36.273 UTC [gossip.gossip] handleMessage -> DEBU 131 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" -"2019-07-20 02:39:36.273 UTC [gossip.gossip] handleMessage -> DEBU 132 Exiting" -"2019-07-20 02:39:36.274 UTC [gossip.discovery] handleMsgFromComm -> DEBU 133 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" -"2019-07-20 02:39:36.274 UTC [msp.identity] Verify -> DEBU 134 Verify: digest = 00000000 21 10 19 45 5e ce 33 40 2b e8 ad 1b 57 d6 70 0d |!..E^.3@+...W.p.| -00000010 ec f3 ac d4 ed 80 46 12 ac 12 b9 e9 31 3e 91 eb |......F.....1>..|" -"2019-07-20 02:39:36.275 UTC [msp.identity] Verify -> DEBU 135 Verify: sig = 00000000 30 44 02 20 75 92 f8 13 f9 05 80 6b a6 5a dd 11 |0D. u......k.Z..| -00000010 04 4a 13 44 8c 31 b6 27 0b 7e 7e 52 24 27 16 30 |.J.D.1.'.~~R$'.0| -00000020 78 8c e4 f8 02 20 41 3a 4e a0 89 47 69 8e eb 59 |x.... A:N..Gi..Y| -00000030 02 fd 65 7e bd 0c bb f6 cc 94 6b cb 62 34 e3 66 |..e~......k.b4.f| -00000040 c5 49 92 a5 1b 52 |.I...R|" -"2019-07-20 02:39:36.275 UTC [msp.identity] Verify -> DEBU 136 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-09-24 00:24:40.336 UTC [msp.identity] Verify -> DEBU 10f Verify: sig = 00000000 30 45 02 21 00 8c d5 ca 27 16 91 f6 9e 87 b3 fe |0E.!....'.......| +00000010 26 3d 45 cd de 19 85 39 63 f8 30 51 14 3f 5e b8 |&=E....9c.0Q.?^.| +00000020 7a a6 43 f0 3f 02 20 60 10 bf 88 96 eb c6 6f 2c |z.C.?. `......o,| +00000030 84 6d 98 b2 58 b1 dc bf d9 39 5f 92 69 76 5e ae |.m..X....9_.iv^.| +00000040 17 95 54 49 b5 3c f5 |..TI.<.|" +"2019-09-24 00:24:40.336 UTC [gossip.discovery] handleAliveMessage -> DEBU 110 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:40.336 UTC [gossip.discovery] learnNewMembers -> DEBU 111 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]}" +"2019-09-24 00:24:40.337 UTC [gossip.discovery] learnNewMembers -> DEBU 112 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:40.337 UTC [gossip.discovery] learnNewMembers -> DEBU 113 Exiting" +"2019-09-24 00:24:40.337 UTC [gossip.discovery] handleAliveMessage -> DEBU 114 Exiting" +"2019-09-24 00:24:40.337 UTC [gossip.discovery] handleMsgFromComm -> DEBU 115 Exiting" +"2019-09-24 00:24:40.337 UTC [gossip.discovery] sendMemResponse -> DEBU 116 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:24:40.337 UTC [msp] GetDefaultSigningIdentity -> DEBU 117 Obtaining default signing identity" +"2019-09-24 00:24:40.337 UTC [msp.identity] Sign -> DEBU 118 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:24:40.337 UTC [msp.identity] Sign -> DEBU 119 Sign: digest: BC574E71230FE6EA8CA6DEF7304159CA9CDF9B957FA29795A7988BD25F872911 " +"2019-09-24 00:24:40.337 UTC [msp] GetDefaultSigningIdentity -> DEBU 11a Obtaining default signing identity" +"2019-09-24 00:24:40.337 UTC [msp.identity] Sign -> DEBU 11b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:40.337 UTC [msp.identity] Sign -> DEBU 11c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:40.337 UTC [gossip.comm] Send -> DEBU 11d Entering, sending GossipMessage: Channel: , nonce: 8112369475667193039, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2197 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:40.338 UTC [gossip.discovery] sendMemResponse -> DEBU 11e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \013 > alive:&\003\237\332\322\021125\026\004@%\366\313(:fUe\301\013\315v\027\320\372,\204q\374" > > " +"2019-09-24 00:24:40.338 UTC [gossip.comm] sendToEndpoint -> DEBU 11f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8112369475667193039, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2197 bytes, Signature: 0 bytes" +"2019-09-24 00:24:40.338 UTC [gossip.comm] sendToEndpoint -> DEBU 120 Exiting" +"2019-09-24 00:24:41.700 UTC [gossip.gossip] handleMessage -> DEBU 121 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:41.700 UTC [gossip.pull] HandleMessage -> DEBU 122 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:41.700 UTC [gossip.pull] SendDigest -> DEBU 123 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:24:41.700 UTC [gossip.gossip] handleMessage -> DEBU 124 Exiting" +"2019-09-24 00:24:41.705 UTC [gossip.gossip] handleMessage -> DEBU 125 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\004\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\271A\"\354\257\331\335V\217K\363\242\214v\242\376\230\342Q\325\031\005\276\2364K\216\026^eR\231\002 \000\340\260x\273\306\005\367%?J\236\207\034 Y\020\3153!\363\201\204\266\372\253#\2236\213\312\312" secret_envelope: > > , Envelope: 1098 bytes, Signature: 0 bytes" +"2019-09-24 00:24:41.705 UTC [gossip.gossip] handleMessage -> DEBU 126 Exiting" +"2019-09-24 00:24:41.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 127 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\004\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\271A\"\354\257\331\335V\217K\363\242\214v\242\376\230\342Q\325\031\005\276\2364K\216\026^eR\231\002 \000\340\260x\273\306\005\367%?J\236\207\034 Y\020\3153!\363\201\204\266\372\253#\2236\213\312\312" secret_envelope: > > , Envelope: 1098 bytes, Signature: 0 bytes" +"2019-09-24 00:24:41.705 UTC [msp.identity] Verify -> DEBU 128 Verify: digest = 00000000 fb 9c 76 8f 29 e1 37 bb b6 44 76 e4 cf 7e dd d5 |..v.).7..Dv..~..| +00000010 8c 22 83 3f d5 ee f1 11 88 50 74 e8 6a 88 1f 71 |.".?.....Pt.j..q|" +"2019-09-24 00:24:41.705 UTC [msp.identity] Verify -> DEBU 129 Verify: sig = 00000000 30 45 02 21 00 b9 41 22 ec af d9 dd 56 8f 4b f3 |0E.!..A"....V.K.| +00000010 a2 8c 76 a2 fe 98 e2 51 d5 19 05 be 9e 34 4b 8e |..v....Q.....4K.| +00000020 16 5e 65 52 99 02 20 00 e0 b0 78 bb c6 05 f7 25 |.^eR.. ...x....%| +00000030 3f 4a 9e 87 1c 20 59 10 cd 33 21 f3 81 84 b6 fa |?J... Y..3!.....| +00000040 ab 23 93 36 8b ca ca |.#.6...|" +"2019-09-24 00:24:41.706 UTC [msp.identity] Verify -> DEBU 12a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:24:41.706 UTC [msp.identity] Verify -> DEBU 12b Verify: sig = 00000000 30 44 02 20 6f e8 43 7a 2d 76 3d 47 ce d0 1a f9 |0D. o.Cz-v=G....| +00000010 5e 8a cf 44 6b 5b 4b df 82 88 cc ae 75 6a ae c4 |^..Dk[K.....uj..| +00000020 cb ab 34 af 02 20 47 cf 5d 55 64 5e fb 71 3c 28 |..4.. G.]Ud^.q<(| +00000030 01 fa 11 f8 6a 4a ff e8 89 1c 79 16 0d 7f 4e 0d |....jJ....y...N.| +00000040 89 f1 ba ca c3 0f |......|" +"2019-09-24 00:24:41.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 12c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:41.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 12d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:24:41.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-09-24 00:24:41.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 12f Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-09-24 00:24:41.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 130 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:24:41.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 131 Exiting" +"2019-09-24 00:24:41.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 132 Exiting" +"2019-09-24 00:24:41.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 133 Exiting" +"2019-09-24 00:24:41.707 UTC [gossip.discovery] sendMemResponse -> DEBU 134 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:24:41.707 UTC [msp] GetDefaultSigningIdentity -> DEBU 135 Obtaining default signing identity" +"2019-09-24 00:24:41.707 UTC [msp.identity] Sign -> DEBU 136 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:24:41.707 UTC [msp.identity] Sign -> DEBU 137 Sign: digest: FA103506EC912B2378AB8920DD1CE3957EDFC5073A756E0A0E446C53A9C7E3C8 " +"2019-09-24 00:24:41.707 UTC [msp] GetDefaultSigningIdentity -> DEBU 138 Obtaining default signing identity" +"2019-09-24 00:24:41.707 UTC [msp.identity] Sign -> DEBU 139 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:41.707 UTC [msp.identity] Sign -> DEBU 13a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:41.708 UTC [gossip.comm] Send -> DEBU 13b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:41.708 UTC [gossip.discovery] sendMemResponse -> DEBU 13c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\004\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\271A\"\354\257\331\335V\217K\363\242\214v\242\376\230\342Q\325\031\005\276\2364K\216\026^eR\231\002 \000\340\260x\273\306\005\367%?J\236\207\034 Y\020\3153!\363\201\204\266\372\253#\2236\213\312\312" secret_envelope: > alive: > " +"2019-09-24 00:24:41.708 UTC [gossip.comm] sendToEndpoint -> DEBU 13d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" +"2019-09-24 00:24:41.708 UTC [gossip.comm] sendToEndpoint -> DEBU 13e Exiting" +"2019-09-24 00:24:42.700 UTC [gossip.gossip] handleMessage -> DEBU 13f Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 00:24:42.701 UTC [gossip.pull] HandleMessage -> DEBU 140 GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 00:24:42.701 UTC [gossip.gossip] handleMessage -> DEBU 141 Exiting" +"2019-09-24 00:24:42.701 UTC [gossip.pull] SendRes -> DEBU 142 Sending 1 IDENTITY_MSG items to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:24:42.703 UTC [gossip.gossip] handleMessage -> DEBU 143 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:42.704 UTC [gossip.gossip] handleMessage -> DEBU 144 Exiting" +"2019-09-24 00:24:42.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 145 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:42.704 UTC [msp.identity] Verify -> DEBU 146 Verify: digest = 00000000 8a bc 91 fb 80 b7 a8 8b 45 14 29 7b df 10 c7 b2 |........E.){....| +00000010 53 19 b2 96 14 9f 7e 00 4a 3d e9 2b 32 2e 27 17 |S.....~.J=.+2.'.|" +"2019-09-24 00:24:42.704 UTC [msp.identity] Verify -> DEBU 147 Verify: sig = 00000000 30 44 02 20 6b d3 4b e5 a6 be c1 b3 6c 39 d0 aa |0D. k.K.....l9..| +00000010 95 dd c8 e3 ce bd d1 29 95 dc 9f 9f 8c c2 1e b4 |.......)........| +00000020 d0 22 ea 6f 02 20 49 f4 69 cf 0c ab bd 51 23 3c |.".o. I.i....Q#<| +00000030 cd 39 0a d8 46 09 00 3f 49 2e a5 e7 82 32 47 25 |.9..F..?I....2G%| +00000040 d3 b2 8e 25 0b 1b |...%..|" +"2019-09-24 00:24:42.705 UTC [msp.identity] Verify -> DEBU 148 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:24:42.705 UTC [msp.identity] Verify -> DEBU 149 Verify: sig = 00000000 30 45 02 21 00 ad bc 44 5a fe 0f 4c 75 6e 85 4a |0E.!...DZ..Lun.J| +00000010 9b 29 4c 07 6c 73 0f b7 6d e6 c1 25 3b 17 15 87 |.)L.ls..m..%;...| +00000020 6c 31 a6 c6 44 02 20 1f 42 f9 09 8f 6d 32 43 60 |l1..D. .B...m2C`| +00000030 47 2b 43 04 9e fd 9a 6d da 36 66 e2 ab 30 5e d0 |G+C....m.6f..0^.| +00000040 3d d9 9e bd e4 c3 a8 |=......|" +"2019-09-24 00:24:42.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 14a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:42.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 14b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:24:42.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 14c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-09-24 00:24:42.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-09-24 00:24:42.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 14e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:24:42.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f Exiting" +"2019-09-24 00:24:42.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 150 Exiting" +"2019-09-24 00:24:42.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 151 Exiting" +"2019-09-24 00:24:43.598 UTC [gossip.pull] Hello -> DEBU 152 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:24:43.598 UTC [gossip.comm] Send -> DEBU 153 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:43.598 UTC [gossip.comm] sendToEndpoint -> DEBU 154 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:43.598 UTC [gossip.comm] sendToEndpoint -> DEBU 155 Exiting" +"2019-09-24 00:24:43.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 156 Obtaining default signing identity" +"2019-09-24 00:24:43.599 UTC [msp.identity] Sign -> DEBU 157 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:24:43.599 UTC [msp.identity] Sign -> DEBU 158 Sign: digest: 7B7C785FAADF6A45ACC9DA97B03BC0A324BF5ED38B07FE967D54963B3F953DC4 " +"2019-09-24 00:24:43.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 159 Obtaining default signing identity" +"2019-09-24 00:24:43.599 UTC [msp.identity] Sign -> DEBU 15a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:43.599 UTC [msp.identity] Sign -> DEBU 15b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:43.599 UTC [gossip.comm] Send -> DEBU 15c Entering, sending GossipMessage: tag:EMPTY mem_req:\\F\365_\356T\312{\262Q\220\222\311\253\200r\031\373\356\317\r\214@||" secret_envelope: > > , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:43.599 UTC [gossip.comm] sendToEndpoint -> DEBU 15d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\\F\365_\356T\312{\262Q\220\222\311\253\200r\031\373\356\317\r\214@||" secret_envelope: > > , Envelope: 1095 bytes, Signature: 0 bytes" +"2019-09-24 00:24:43.599 UTC [gossip.comm] sendToEndpoint -> DEBU 15e Exiting" +"2019-09-24 00:24:43.600 UTC [gossip.gossip] handleMessage -> DEBU 15f Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 00:24:43.600 UTC [gossip.pull] HandleMessage -> DEBU 160 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 00:24:43.600 UTC [gossip.gossip] handleMessage -> DEBU 161 Exiting" +"2019-09-24 00:24:43.601 UTC [gossip.gossip] handleMessage -> DEBU 162 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +"2019-09-24 00:24:43.601 UTC [gossip.gossip] handleMessage -> DEBU 163 Exiting" +"2019-09-24 00:24:43.601 UTC [gossip.discovery] handleMsgFromComm -> DEBU 164 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +"2019-09-24 00:24:43.601 UTC [msp.identity] Verify -> DEBU 165 Verify: digest = 00000000 7b 7c 78 5f aa df 6a 45 ac c9 da 97 b0 3b c0 a3 |{|x_..jE.....;..| +00000010 24 bf 5e d3 8b 07 fe 96 7d 54 96 3b 3f 95 3d c4 |$.^.....}T.;?.=.|" +"2019-09-24 00:24:43.601 UTC [msp.identity] Verify -> DEBU 166 Verify: sig = 00000000 30 45 02 21 00 fa ba d4 fe 2d eb 28 82 5e 11 a9 |0E.!.....-.(.^..| +00000010 12 ea ce 91 b0 43 58 e5 37 6c 3a 3f 66 58 83 4e |.....CX.7l:?fX.N| +00000020 bd 45 a3 b9 4a 02 20 7e 69 5a 61 08 0e 3e 5c 46 |.E..J. ~iZa..>\F| +00000030 f5 5f ee 54 ca 7b b2 51 90 92 c9 ab 80 72 19 fb |._.T.{.Q.....r..| +00000040 ee cf 0d 8c 40 7c 7c |....@|||" +"2019-09-24 00:24:43.602 UTC [msp.identity] Verify -> DEBU 167 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:39:36.276 UTC [msp.identity] Verify -> DEBU 137 Verify: sig = 00000000 30 44 02 20 6b bc 72 89 6c 1d 1d 1b 36 c1 15 b6 |0D. k.r.l...6...| -00000010 39 dd 83 03 86 77 d8 5a 85 54 25 1b ec c7 43 5d |9....w.Z.T%...C]| -00000020 4a 43 70 ae 02 20 68 98 18 0a 06 aa 57 4c 06 4e |JCp.. h.....WL.N| -00000030 f3 68 07 f4 17 45 97 ba 0b 05 b1 8e 1e 90 1b 32 |.h...E.........2| -00000040 d8 78 a6 6c 8a a2 |.x.l..|" -"2019-07-20 02:39:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 138 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:36.276 UTC [gossip.discovery] isSentByMe -> DEBU 139 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a Exiting" -"2019-07-20 02:39:36.277 UTC [msp.identity] Verify -> DEBU 13b Verify: digest = 00000000 4f 90 a0 9f b8 cf 4a 75 20 35 a7 40 01 2b f7 da |O.....Ju 5.@.+..| -00000010 51 a2 5b cf 01 b4 45 67 d4 ec 36 3b 03 e3 bd 45 |Q.[...Eg..6;...E|" -"2019-07-20 02:39:36.278 UTC [msp.identity] Verify -> DEBU 13c Verify: sig = 00000000 30 44 02 20 1d 01 0c 87 a1 38 7c 87 13 7f fd 4b |0D. .....8|....K| -00000010 8c 72 9b 09 e7 23 ad b2 88 dc 88 6c fc 18 64 06 |.r...#.....l..d.| -00000020 af 43 39 ff 02 20 43 8a c1 20 ed 57 fc 47 32 d8 |.C9.. C.. .W.G2.| -00000030 a8 40 a5 66 3d 51 73 45 c6 08 be 29 fe 34 9b f6 |.@.f=QsE...).4..| -00000040 79 bb 9c 1a e1 1e |y.....|" -"2019-07-20 02:39:36.278 UTC [msp.identity] Verify -> DEBU 13d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:39:36.279 UTC [msp.identity] Verify -> DEBU 13e Verify: sig = 00000000 30 44 02 20 16 3c 72 12 9c 25 47 ad 46 87 84 11 |0D. . DEBU 13f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 140 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 141 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -"2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 142 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -"2019-07-20 02:39:36.281 UTC [gossip.discovery] learnExistingMembers -> DEBU 143 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:36.281 UTC [gossip.discovery] learnExistingMembers -> DEBU 144 Exiting" -"2019-07-20 02:39:36.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 145 Exiting" -"2019-07-20 02:39:36.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 146 Exiting" -"2019-07-20 02:39:36.389 UTC [gossip.gossip] handleMessage -> DEBU 147 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:36.390 UTC [gossip.pull] HandleMessage -> DEBU 148 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:36.390 UTC [gossip.pull] SendDigest -> DEBU 149 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:39:36.390 UTC [gossip.gossip] handleMessage -> DEBU 14a Exiting" -"2019-07-20 02:39:36.391 UTC [gossip.gossip] handleMessage -> DEBU 14b Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes" -"2019-07-20 02:39:36.391 UTC [gossip.gossip] handleMessage -> DEBU 14c Exiting" -"2019-07-20 02:39:36.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes" -"2019-07-20 02:39:36.392 UTC [msp.identity] Verify -> DEBU 14e Verify: digest = 00000000 d7 41 d0 00 0d a5 df 97 b5 63 d9 35 cc b1 55 f4 |.A.......c.5..U.| -00000010 50 2f ac 24 ca 99 16 8a 79 65 7c 17 76 7e 64 f6 |P/.$....ye|.v~d.|" -"2019-07-20 02:39:36.393 UTC [msp.identity] Verify -> DEBU 14f Verify: sig = 00000000 30 45 02 21 00 f7 66 84 2f 80 96 e4 11 e9 98 77 |0E.!..f./......w| -00000010 8e dc 64 69 e2 4b be 65 e2 0d 24 39 a7 5b 1d ec |..di.K.e..$9.[..| -00000020 04 5f aa df a0 02 20 6e 2d f4 71 eb e3 2a 02 f4 |._.... n-.q..*..| -00000030 7a 4f b8 24 68 12 75 49 20 31 26 67 e2 28 a8 d3 |zO.$h.uI 1&g.(..| -00000040 b8 d2 40 56 20 e4 8c |..@V ..|" -"2019-07-20 02:39:36.394 UTC [msp.identity] Verify -> DEBU 150 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:39:36.394 UTC [msp.identity] Verify -> DEBU 151 Verify: sig = 00000000 30 45 02 21 00 ff ee 1f 07 ad 2c d2 29 08 25 84 |0E.!......,.).%.| -00000010 6b f2 d5 03 e7 45 a6 c6 5a cb e9 ce c2 9d 9b ac |k....E..Z.......| -00000020 7d ef b8 ab 56 02 20 38 dc 65 7f 35 54 a9 03 6f |}...V. 8.e.5T..o| -00000030 e4 7c 93 22 6f a6 0d 11 70 db 3c f4 86 5a f0 18 |.|."o...p.<..Z..| -00000040 bd d4 8f 94 b4 c0 2e |.......|" -"2019-07-20 02:39:36.395 UTC [gossip.discovery] handleAliveMessage -> DEBU 152 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:39:36.395 UTC [gossip.discovery] learnExistingMembers -> DEBU 153 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:39:36.395 UTC [gossip.discovery] learnExistingMembers -> DEBU 154 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -"2019-07-20 02:39:36.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 155 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -"2019-07-20 02:39:36.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 156 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:36.397 UTC [gossip.discovery] learnExistingMembers -> DEBU 157 Exiting" -"2019-07-20 02:39:36.397 UTC [gossip.discovery] handleAliveMessage -> DEBU 158 Exiting" -"2019-07-20 02:39:36.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 159 Exiting" -"2019-07-20 02:39:36.397 UTC [gossip.discovery] sendMemResponse -> DEBU 15a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:39:36.398 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b Obtaining default signing identity" -"2019-07-20 02:39:36.398 UTC [msp.identity] Sign -> DEBU 15c Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:39:36.398 UTC [msp.identity] Sign -> DEBU 15d Sign: digest: 9E663365013BAC851079C3A861364AACC5702496BD7AFEF63FF43118C2632810 " -"2019-07-20 02:39:36.399 UTC [msp] GetDefaultSigningIdentity -> DEBU 15e Obtaining default signing identity" -"2019-07-20 02:39:36.399 UTC [msp.identity] Sign -> DEBU 15f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:36.400 UTC [msp.identity] Sign -> DEBU 160 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:36.400 UTC [gossip.comm] Send -> DEBU 161 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:36.400 UTC [gossip.comm] sendToEndpoint -> DEBU 162 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" -"2019-07-20 02:39:36.400 UTC [gossip.comm] sendToEndpoint -> DEBU 163 Exiting" -"2019-07-20 02:39:36.400 UTC [gossip.discovery] sendMemResponse -> DEBU 164 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > alive: > " -"2019-07-20 02:39:37.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 165 Obtaining default signing identity" -"2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 166 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 167 Sign: digest: 6D019AA9062B5A0ABE1771EDAEB34763445AAA0B5583E7B6A2EE3FD1C6026BF9 " -"2019-07-20 02:39:37.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 168 Obtaining default signing identity" -"2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 169 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 16a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:37.262 UTC [gossip.discovery] periodicalSendAlive -> DEBU 16b Sleeping 5s" -"2019-07-20 02:39:37.268 UTC [gossip.pull] SendReq -> DEBU 16c Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" -"2019-07-20 02:39:37.268 UTC [gossip.comm] Send -> DEBU 16d Entering, sending GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:37.269 UTC [gossip.comm] sendToEndpoint -> DEBU 16e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -"2019-07-20 02:39:37.269 UTC [gossip.comm] sendToEndpoint -> DEBU 16f Exiting" -"2019-07-20 02:39:37.270 UTC [gossip.comm] Send -> DEBU 170 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:37.271 UTC [gossip.comm] sendToEndpoint -> DEBU 171 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:39:37.272 UTC [gossip.comm] sendToEndpoint -> DEBU 172 Exiting" -"2019-07-20 02:39:37.273 UTC [gossip.gossip] handleMessage -> DEBU 173 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10686706552849004474, Envelope: 962 bytes, Signature: 0 bytes" -"2019-07-20 02:39:37.274 UTC [msp.identity] Verify -> DEBU 174 Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| +"2019-09-24 00:24:43.602 UTC [msp.identity] Verify -> DEBU 168 Verify: sig = 00000000 30 45 02 21 00 f2 b0 a3 15 9a 7c 43 3a 9a 9f 0e |0E.!......|C:...| +00000010 43 8d 11 0c 65 c7 56 fd bb dd e6 8f a2 d3 bd 10 |C...e.V.........| +00000020 f8 de c7 48 1d 02 20 67 4f 1c e5 db 6d a3 41 fb |...H.. gO...m.A.| +00000030 8c d7 8c cd ab b7 15 ae 70 68 29 db 7d 31 a9 2f |........ph).}1./| +00000040 0a fd 5e 64 7f 1d 0f |..^d...|" +"2019-09-24 00:24:43.602 UTC [gossip.discovery] handleAliveMessage -> DEBU 169 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:43.602 UTC [gossip.discovery] isSentByMe -> DEBU 16a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:43.602 UTC [gossip.discovery] handleAliveMessage -> DEBU 16b Exiting" +"2019-09-24 00:24:43.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16c Exiting" +"2019-09-24 00:24:44.598 UTC [msp] GetDefaultSigningIdentity -> DEBU 16d Obtaining default signing identity" +"2019-09-24 00:24:44.598 UTC [msp.identity] Sign -> DEBU 16e Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:24:44.598 UTC [msp.identity] Sign -> DEBU 16f Sign: digest: 7D5B7401329F61D2E4F43593210381F89685B51397F195808F28F990545B7BDD " +"2019-09-24 00:24:44.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 170 Obtaining default signing identity" +"2019-09-24 00:24:44.599 UTC [msp.identity] Sign -> DEBU 171 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:44.599 UTC [msp.identity] Sign -> DEBU 172 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:44.599 UTC [gossip.discovery] periodicalSendAlive -> DEBU 173 Sleeping 5s" +"2019-09-24 00:24:44.599 UTC [gossip.pull] SendReq -> DEBU 174 Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" +"2019-09-24 00:24:44.599 UTC [gossip.comm] Send -> DEBU 175 Entering, sending GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:44.600 UTC [gossip.comm] sendToEndpoint -> DEBU 176 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 00:24:44.600 UTC [gossip.comm] sendToEndpoint -> DEBU 177 Exiting" +"2019-09-24 00:24:44.601 UTC [gossip.gossip] handleMessage -> DEBU 178 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 5609837395853407952, Envelope: 961 bytes, Signature: 0 bytes" +"2019-09-24 00:24:44.601 UTC [msp.identity] Verify -> DEBU 179 Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| 00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|" -"2019-07-20 02:39:37.274 UTC [msp.identity] Verify -> DEBU 175 Verify: sig = 00000000 30 45 02 21 00 88 ae 14 68 e2 c9 46 e7 0e 04 37 |0E.!....h..F...7| -00000010 7a cf 20 f4 48 de 51 c5 26 81 c9 7d bf d2 e1 22 |z. .H.Q.&..}..."| -00000020 92 5c db 53 bb 02 20 64 3b 35 98 f1 7a 45 c6 c3 |.\.S.. d;5..zE..| -00000030 6a 90 0c 7a 65 13 3a f8 b1 79 89 ea 5d 3f 80 01 |j..ze.:..y..]?..| -00000040 0f 10 7f 24 b3 f0 1a |...$...|" -"2019-07-20 02:39:37.275 UTC [gossip.pull] HandleMessage -> DEBU 176 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10686706552849004474, Envelope: 962 bytes, Signature: 0 bytes" -"2019-07-20 02:39:37.275 UTC [gossip.gossip] func2 -> DEBU 177 Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -"2019-07-20 02:39:37.275 UTC [gossip.pull] HandleMessage -> DEBU 178 Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" -"2019-07-20 02:39:37.275 UTC [gossip.gossip] handleMessage -> DEBU 179 Exiting" -"2019-07-20 02:39:37.390 UTC [gossip.gossip] handleMessage -> DEBU 17a Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:37.390 UTC [gossip.pull] HandleMessage -> DEBU 17b GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:37.390 UTC [gossip.gossip] handleMessage -> DEBU 17c Exiting" -"2019-07-20 02:39:37.391 UTC [gossip.pull] SendRes -> DEBU 17d Sending 1 IDENTITY_MSG items to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:39:37.397 UTC [gossip.gossip] handleMessage -> DEBU 17e Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:37.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:37.397 UTC [gossip.gossip] handleMessage -> DEBU 180 Exiting" -"2019-07-20 02:39:37.399 UTC [msp.identity] Verify -> DEBU 181 Verify: digest = 00000000 53 76 f4 8a 78 bb 68 76 6e e7 aa 10 ec 24 f1 3c |Sv..x.hvn....$.<| -00000010 9a dc fc 94 b2 ae 95 73 f5 89 48 e3 4f 0b 30 d5 |.......s..H.O.0.|" -"2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 182 Verify: sig = 00000000 30 44 02 20 02 38 29 0a 50 83 ea 0f e0 ac 37 54 |0D. .8).P.....7T| -00000010 fd 34 dd e6 05 20 ca 03 23 b9 06 37 c1 3f 25 88 |.4... ..#..7.?%.| -00000020 f9 5b b2 99 02 20 70 f1 47 d7 b2 fa f0 27 e6 b9 |.[... p.G....'..| -00000030 81 12 b5 bf 5a 74 bd fa dc 25 d5 10 30 76 cd cc |....Zt...%..0v..| -00000040 3f 22 7e 41 c5 f8 |?"~A..|" -"2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 183 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-09-24 00:24:44.602 UTC [msp.identity] Verify -> DEBU 17a Verify: sig = 00000000 30 45 02 21 00 eb 75 b3 6c c4 79 0a be 94 04 1e |0E.!..u.l.y.....| +00000010 48 d7 af ac f1 8e ff c1 b2 48 39 c2 a5 ef ff 3d |H........H9....=| +00000020 55 59 de 67 22 02 20 3b 87 96 44 c6 4e c9 0e 8d |UY.g". ;..D.N...| +00000030 4b 43 a4 38 23 41 34 68 7d e5 ed 4a 28 36 2d 0b |KC.8#A4h}..J(6-.| +00000040 3d 59 04 f6 15 00 eb |=Y.....|" +"2019-09-24 00:24:44.602 UTC [gossip.pull] HandleMessage -> DEBU 17b GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 5609837395853407952, Envelope: 961 bytes, Signature: 0 bytes" +"2019-09-24 00:24:44.602 UTC [gossip.gossip] func2 -> DEBU 17c Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-09-24 00:24:44.602 UTC [gossip.pull] HandleMessage -> DEBU 17d Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" +"2019-09-24 00:24:44.602 UTC [gossip.gossip] handleMessage -> DEBU 17e Exiting" +"2019-09-24 00:24:44.602 UTC [gossip.comm] Send -> DEBU 17f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 00:24:44.603 UTC [gossip.comm] sendToEndpoint -> DEBU 180 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:44.603 UTC [gossip.comm] sendToEndpoint -> DEBU 181 Exiting" +"2019-09-24 00:24:45.701 UTC [gossip.gossip] handleMessage -> DEBU 182 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:45.701 UTC [gossip.pull] HandleMessage -> DEBU 183 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:45.701 UTC [gossip.pull] SendDigest -> DEBU 184 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:24:45.701 UTC [gossip.gossip] handleMessage -> DEBU 185 Exiting" +"2019-09-24 00:24:45.705 UTC [gossip.gossip] handleMessage -> DEBU 186 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\006\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\355\332\375\302\254\354\207:!\352\352{PLG \n\036\205\357Zj\022\257%]! > > , Envelope: 1098 bytes, Signature: 0 bytes" +"2019-09-24 00:24:45.705 UTC [gossip.gossip] handleMessage -> DEBU 187 Exiting" +"2019-09-24 00:24:45.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\006\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\355\332\375\302\254\354\207:!\352\352{PLG \n\036\205\357Zj\022\257%]! > > , Envelope: 1098 bytes, Signature: 0 bytes" +"2019-09-24 00:24:45.706 UTC [msp.identity] Verify -> DEBU 189 Verify: digest = 00000000 68 ef ea b7 1f e6 e2 7f b0 91 71 fc 22 7a 1b f0 |h.........q."z..| +00000010 a1 3c 65 68 54 a0 4b f5 1f 6e f2 d0 59 94 92 25 |. DEBU 18a Verify: sig = 00000000 30 45 02 21 00 ed da fd c2 ac ec 87 3a 21 ea ea |0E.!........:!..| +00000010 7b 50 4c 47 20 0a 1e 85 ef 5a 6a 12 af 25 5d 21 |{PLG ....Zj..%]!| +00000020 3c 2f f3 24 45 02 20 51 05 5d 85 6a bc d7 3d 2a | DEBU 18b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 184 Verify: sig = 00000000 30 44 02 20 6a f1 88 46 44 1b 12 fc ee 2d 8c d8 |0D. j..FD....-..| -00000010 a3 00 77 67 93 6e 30 31 a1 89 f5 af e4 d6 0e e5 |..wg.n01........| -00000020 45 95 d3 52 02 20 57 6b a7 19 b6 18 a7 0b 40 0a |E..R. Wk......@.| -00000030 b0 03 22 5f f8 a4 c1 06 1f 8b 7f 6b a9 2f 41 07 |.."_.......k./A.| -00000040 29 0d 5c c2 6c a9 |).\.l.|" -"2019-07-20 02:39:37.401 UTC [gossip.discovery] handleAliveMessage -> DEBU 185 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:37.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 186 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 187 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -"2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 188 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -"2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 189 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 18a Exiting" -"2019-07-20 02:39:37.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 18b Exiting" -"2019-07-20 02:39:37.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18c Exiting" -"2019-07-20 02:39:40.267 UTC [gossip.pull] Hello -> DEBU 18d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:39:40.267 UTC [gossip.comm] Send -> DEBU 18e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:40.268 UTC [gossip.comm] sendToEndpoint -> DEBU 18f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:40.268 UTC [gossip.comm] sendToEndpoint -> DEBU 190 Exiting" -"2019-07-20 02:39:40.274 UTC [gossip.gossip] handleMessage -> DEBU 191 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" -"2019-07-20 02:39:40.274 UTC [gossip.pull] HandleMessage -> DEBU 192 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" -"2019-07-20 02:39:40.274 UTC [gossip.gossip] handleMessage -> DEBU 193 Exiting" -"2019-07-20 02:39:40.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 194 Obtaining default signing identity" -"2019-07-20 02:39:40.293 UTC [msp.identity] Sign -> DEBU 195 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:39:40.293 UTC [msp.identity] Sign -> DEBU 196 Sign: digest: 52A61F90DF58B1B9C98008BF88E86A627536A127FBD4B46A3D7CECBA9D5FD2B8 " -"2019-07-20 02:39:40.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 197 Obtaining default signing identity" -"2019-07-20 02:39:40.294 UTC [msp.identity] Sign -> DEBU 198 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:40.294 UTC [msp.identity] Sign -> DEBU 199 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:40.294 UTC [gossip.comm] Send -> DEBU 19a Entering, sending GossipMessage: tag:EMPTY mem_req:\320j\220\032/\305\210\373\010\232\242\215\002 \026\307\303|\245\267\352\360\034\034\025\273\323\307\363\241\204\314\231\3143\230J2}[\001\341g\324GQ" secret_envelope: > > , Envelope: 1093 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:40.294 UTC [gossip.comm] sendToEndpoint -> DEBU 19b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\320j\220\032/\305\210\373\010\232\242\215\002 \026\307\303|\245\267\352\360\034\034\025\273\323\307\363\241\204\314\231\3143\230J2}[\001\341g\324GQ" secret_envelope: > > , Envelope: 1093 bytes, Signature: 0 bytes" -"2019-07-20 02:39:40.294 UTC [gossip.comm] sendToEndpoint -> DEBU 19c Exiting" -"2019-07-20 02:39:40.297 UTC [gossip.gossip] handleMessage -> DEBU 19d Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" -"2019-07-20 02:39:40.297 UTC [gossip.gossip] handleMessage -> DEBU 19e Exiting" -"2019-07-20 02:39:40.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" -"2019-07-20 02:39:40.299 UTC [msp.identity] Verify -> DEBU 1a0 Verify: digest = 00000000 52 a6 1f 90 df 58 b1 b9 c9 80 08 bf 88 e8 6a 62 |R....X........jb| -00000010 75 36 a1 27 fb d4 b4 6a 3d 7c ec ba 9d 5f d2 b8 |u6.'...j=|..._..|" -"2019-07-20 02:39:40.299 UTC [msp.identity] Verify -> DEBU 1a1 Verify: sig = 00000000 30 44 02 20 30 c0 15 87 82 16 43 c9 b5 fa 81 b1 |0D. 0.....C.....| -00000010 19 3f 83 60 62 19 16 3e d0 6a 90 1a 2f c5 88 fb |.?.`b..>.j../...| -00000020 08 9a a2 8d 02 20 16 c7 c3 7c a5 b7 ea f0 1c 1c |..... ...|......| -00000030 15 bb d3 c7 f3 a1 84 cc 99 cc 33 98 4a 32 7d 5b |..........3.J2}[| -00000040 01 e1 67 d4 47 51 |..g.GQ|" -"2019-07-20 02:39:40.300 UTC [msp.identity] Verify -> DEBU 1a2 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-09-24 00:24:45.707 UTC [msp.identity] Verify -> DEBU 18c Verify: sig = 00000000 30 44 02 20 39 1a aa 79 28 07 58 43 8a b1 32 d9 |0D. 9..y(.XC..2.| +00000010 71 94 67 f3 8c d7 19 b7 76 b8 40 b0 87 e9 b9 57 |q.g.....v.@....W| +00000020 6a d8 e5 43 02 20 7d b0 95 a4 45 52 06 52 23 80 |j..C. }...ER.R#.| +00000030 68 78 b3 52 8b c2 27 a6 86 3d 0c 8f 51 00 83 01 |hx.R..'..=..Q...| +00000040 00 08 6f db bc a4 |..o...|" +"2019-09-24 00:24:45.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 18d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:45.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:24:45.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 18f updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-09-24 00:24:45.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 190 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-09-24 00:24:45.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 191 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:24:45.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 192 Exiting" +"2019-09-24 00:24:45.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 193 Exiting" +"2019-09-24 00:24:45.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 194 Exiting" +"2019-09-24 00:24:45.707 UTC [gossip.discovery] sendMemResponse -> DEBU 195 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:24:45.708 UTC [gossip.comm] Send -> DEBU 196 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:45.708 UTC [gossip.discovery] sendMemResponse -> DEBU 197 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\006\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\355\332\375\302\254\354\207:!\352\352{PLG \n\036\205\357Zj\022\257%]! > alive:\317\261\243\302OK\234N\254\263\243$\260\235\205\221A\272u\300\254\3145x\321\006F\263" secret_envelope: > " +"2019-09-24 00:24:45.708 UTC [gossip.comm] sendToEndpoint -> DEBU 198 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" +"2019-09-24 00:24:45.708 UTC [gossip.comm] sendToEndpoint -> DEBU 199 Exiting" +"2019-09-24 00:24:47.599 UTC [gossip.pull] Hello -> DEBU 19a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:24:47.599 UTC [gossip.comm] Send -> DEBU 19b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU 19c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU 19d Exiting" +"2019-09-24 00:24:47.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 19e Obtaining default signing identity" +"2019-09-24 00:24:47.599 UTC [msp.identity] Sign -> DEBU 19f Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:24:47.599 UTC [msp.identity] Sign -> DEBU 1a0 Sign: digest: F5B095B8495D3518ABCE97992B52C7D701210C1EF44B81CB0E3D48C86D5020C4 " +"2019-09-24 00:24:47.600 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a1 Obtaining default signing identity" +"2019-09-24 00:24:47.600 UTC [msp.identity] Sign -> DEBU 1a2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:47.600 UTC [msp.identity] Sign -> DEBU 1a3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:47.600 UTC [gossip.gossip] handleMessage -> DEBU 1a4 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 00:24:47.600 UTC [gossip.pull] HandleMessage -> DEBU 1a5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 00:24:47.600 UTC [gossip.gossip] handleMessage -> DEBU 1a6 Exiting" +"2019-09-24 00:24:47.600 UTC [gossip.comm] Send -> DEBU 1a7 Entering, sending GossipMessage: tag:EMPTY mem_req:^\236\314\220\n\010\370\304\274\002 \002\366\225Y\231/g/e\306\2343\025~%\204\311\1773\272m\027f<7\030\260\275\032\316\035y" secret_envelope: > > , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:47.600 UTC [gossip.comm] sendToEndpoint -> DEBU 1a8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:^\236\314\220\n\010\370\304\274\002 \002\366\225Y\231/g/e\306\2343\025~%\204\311\1773\272m\027f<7\030\260\275\032\316\035y" secret_envelope: > > , Envelope: 1094 bytes, Signature: 0 bytes" +"2019-09-24 00:24:47.600 UTC [gossip.comm] sendToEndpoint -> DEBU 1a9 Exiting" +"2019-09-24 00:24:47.604 UTC [gossip.gossip] handleMessage -> DEBU 1aa Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +"2019-09-24 00:24:47.604 UTC [gossip.gossip] handleMessage -> DEBU 1ab Exiting" +"2019-09-24 00:24:47.604 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +"2019-09-24 00:24:47.604 UTC [msp.identity] Verify -> DEBU 1ad Verify: digest = 00000000 f5 b0 95 b8 49 5d 35 18 ab ce 97 99 2b 52 c7 d7 |....I]5.....+R..| +00000010 01 21 0c 1e f4 4b 81 cb 0e 3d 48 c8 6d 50 20 c4 |.!...K...=H.mP .|" +"2019-09-24 00:24:47.604 UTC [msp.identity] Verify -> DEBU 1ae Verify: sig = 00000000 30 45 02 21 00 e1 7b 44 9b 03 f3 fa b4 d6 84 29 |0E.!..{D.......)| +00000010 2c bb d4 96 01 09 02 b1 36 10 03 3e 5e 9e cc 90 |,.......6..>^...| +00000020 0a 08 f8 c4 bc 02 20 02 f6 95 59 99 2f 67 2f 65 |...... ...Y./g/e| +00000030 c6 9c 33 15 7e 25 84 c9 7f 33 ba 6d 17 66 3c 37 |..3.~%...3.m.f<7| +00000040 18 b0 bd 1a ce 1d 79 |......y|" +"2019-09-24 00:24:47.604 UTC [msp.identity] Verify -> DEBU 1af Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:39:40.300 UTC [msp.identity] Verify -> DEBU 1a3 Verify: sig = 00000000 30 44 02 20 37 37 ec 58 8e 0c a5 9c 84 6d 5c c4 |0D. 77.X.....m\.| -00000010 7b b6 6a 3b 20 7e b9 9d 6f 73 ec 59 d8 36 24 35 |{.j; ~..os.Y.6$5| -00000020 51 91 0a ec 02 20 33 e2 52 de 65 b2 82 95 4a f2 |Q.... 3.R.e...J.| -00000030 da 7d 1d 4d a4 17 07 53 17 83 06 a2 9e 0b 9c 46 |.}.M...S.......F| -00000040 3a 17 38 8b ae 47 |:.8..G|" -"2019-07-20 02:39:40.300 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:40.301 UTC [gossip.discovery] isSentByMe -> DEBU 1a5 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:40.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a6 Exiting" -"2019-07-20 02:39:40.301 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a7 Exiting" -"2019-07-20 02:39:40.390 UTC [gossip.gossip] handleMessage -> DEBU 1a8 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:40.390 UTC [gossip.pull] HandleMessage -> DEBU 1a9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:40.391 UTC [gossip.pull] SendDigest -> DEBU 1aa Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ab Exiting" -"2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ac Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > > , Envelope: 1097 bytes, Signature: 0 bytes" -"2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ad Exiting" -"2019-07-20 02:39:40.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > > , Envelope: 1097 bytes, Signature: 0 bytes" -"2019-07-20 02:39:40.392 UTC [msp.identity] Verify -> DEBU 1af Verify: digest = 00000000 fd 61 48 d7 45 b9 37 7f 14 de 1f 2a a3 e8 c0 99 |.aH.E.7....*....| -00000010 e1 3a 5f de 9a 96 10 77 5a af bf 56 25 69 d3 5b |.:_....wZ..V%i.[|" -"2019-07-20 02:39:40.392 UTC [msp.identity] Verify -> DEBU 1b0 Verify: sig = 00000000 30 44 02 20 0f af e6 c7 e6 cd 9b 2b 4c 67 0c 40 |0D. .......+Lg.@| -00000010 4b aa 62 2d 17 f9 28 58 19 d2 67 be 8d 86 76 36 |K.b-..(X..g...v6| -00000020 7d 97 ea 33 02 20 12 49 b2 6b 4e 2d a1 03 0b 37 |}..3. .I.kN-...7| -00000030 c7 79 b4 74 7a 52 ef 57 d3 73 de 34 9a d8 6d 1f |.y.tzR.W.s.4..m.| -00000040 df c9 93 62 15 d9 |...b..|" -"2019-07-20 02:39:40.393 UTC [msp.identity] Verify -> DEBU 1b1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-09-24 00:24:47.604 UTC [msp.identity] Verify -> DEBU 1b0 Verify: sig = 00000000 30 44 02 20 78 84 76 97 09 d9 5c be d4 02 2f 1a |0D. x.v...\.../.| +00000010 10 de b2 a1 d2 d3 4c dc 9b c7 08 c5 da 31 9e 77 |......L......1.w| +00000020 fe 13 02 66 02 20 75 97 53 fd 33 44 44 d4 10 df |...f. u.S.3DD...| +00000030 df 19 22 c9 86 dd 0e 80 be c6 7e 26 b3 49 7a dc |..".......~&.Iz.| +00000040 50 42 19 4f 2d f5 |PB.O-.|" +"2019-09-24 00:24:47.604 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:47.605 UTC [gossip.discovery] isSentByMe -> DEBU 1b2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:47.605 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b3 Exiting" +"2019-09-24 00:24:47.605 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b4 Exiting" +"2019-09-24 00:24:47.704 UTC [gossip.gossip] handleMessage -> DEBU 1b5 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:47.704 UTC [gossip.gossip] handleMessage -> DEBU 1b6 Exiting" +"2019-09-24 00:24:47.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:47.704 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b8 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:24:47.704 UTC [msp.identity] Verify -> DEBU 1b9 Verify: digest = 00000000 08 b5 d1 fd 5b da ca e2 6e 9a 58 68 5c 36 ba a2 |....[...n.Xh\6..| +00000010 d2 44 fd 4b 87 23 aa b4 3e cd 10 6c b0 af 5a 32 |.D.K.#..>..l..Z2|" +"2019-09-24 00:24:47.704 UTC [msp.identity] Verify -> DEBU 1ba Verify: sig = 00000000 30 44 02 20 19 5a af ea 56 5f 6f 07 99 95 11 cd |0D. .Z..V_o.....| +00000010 f5 8f 01 63 cd 67 83 67 55 62 cd 5b 38 48 f3 c7 |...c.g.gUb.[8H..| +00000020 6c 12 38 4a 02 20 50 14 98 d3 20 4f 6f 6d 16 cc |l.8J. P... Oom..| +00000030 19 a8 fe 56 15 2e 9b 6a 8b f2 e3 cc 23 89 49 61 |...V...j....#.Ia| +00000040 f5 a7 70 27 f5 fb |..p'..|" +"2019-09-24 00:24:47.704 UTC [msp.identity] Verify -> DEBU 1bb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:39:40.393 UTC [msp.identity] Verify -> DEBU 1b2 Verify: sig = 00000000 30 44 02 20 09 83 c1 ba c8 24 75 c5 4e aa a0 a1 |0D. .....$u.N...| -00000010 7c ba 37 37 fe d4 ba a0 d9 3d 03 59 9e 65 a9 42 ||.77.....=.Y.e.B| -00000020 e0 13 d7 25 02 20 2a d8 d1 41 dc cc a7 61 ad 91 |...%. *..A...a..| -00000030 86 72 03 bf a1 5d 43 ef 2c 8e be 3c 6f d4 3d 08 |.r...]C.,.. DEBU 1b3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -"2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " -"2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b8 Exiting" -"2019-07-20 02:39:40.393 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b9 Exiting" -"2019-07-20 02:39:40.393 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba Exiting" -"2019-07-20 02:39:40.393 UTC [gossip.discovery] sendMemResponse -> DEBU 1bb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:39:40.394 UTC [gossip.comm] Send -> DEBU 1bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:40.394 UTC [gossip.discovery] sendMemResponse -> DEBU 1bd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > alive: > " -"2019-07-20 02:39:40.394 UTC [gossip.comm] sendToEndpoint -> DEBU 1be Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" -"2019-07-20 02:39:40.394 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf Exiting" -"2019-07-20 02:39:40.708 UTC [endorser] ProcessProposal -> DEBU 1c0 Entering: request from 172.18.0.9:58248" -"2019-07-20 02:39:40.709 UTC [protoutils] ValidateProposalMessage -> DEBU 1c1 ValidateProposalMessage starts for signed proposal 0xc000597b30" -"2019-07-20 02:39:40.709 UTC [protoutils] validateChannelHeader -> DEBU 1c2 validateChannelHeader info: header type 1" -"2019-07-20 02:39:40.710 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c3 begin" -"2019-07-20 02:39:40.710 UTC [msp] DeserializeIdentity -> DEBU 1c4 Obtaining identity" -"2019-07-20 02:39:40.711 UTC [msp.identity] newIdentity -> DEBU 1c5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:47.704 UTC [msp.identity] Verify -> DEBU 1bc Verify: sig = 00000000 30 44 02 20 30 27 67 23 4f aa a4 57 dc d9 95 7d |0D. 0'g#O..W...}| +00000010 d8 12 32 85 2b 19 19 d3 9b 8a 78 83 33 1c 0a a2 |..2.+.....x.3...| +00000020 30 c6 58 db 02 20 40 7f ba 10 84 0f c8 05 99 a1 |0.X.. @.........| +00000030 04 69 30 fd 5e 9a c1 0b 85 6c 1d 10 39 af c4 e9 |.i0.^....l..9...| +00000040 fa 97 56 2f 32 ce |..V/2.|" +"2019-09-24 00:24:47.705 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bd Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:47.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 1be Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:24:47.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bf updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:24:47.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c0 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:24:47.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c1 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:24:47.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c2 Exiting" +"2019-09-24 00:24:47.705 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c3 Exiting" +"2019-09-24 00:24:47.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c4 Exiting" +"2019-09-24 00:24:49.600 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c5 Obtaining default signing identity" +"2019-09-24 00:24:49.600 UTC [msp.identity] Sign -> DEBU 1c6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151008 " +"2019-09-24 00:24:49.600 UTC [msp.identity] Sign -> DEBU 1c7 Sign: digest: 659B7A303EE8FDBCB606023CE839770270D894D321B0A68DF0265B8C89B68FEB " +"2019-09-24 00:24:49.600 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c8 Obtaining default signing identity" +"2019-09-24 00:24:49.600 UTC [msp.identity] Sign -> DEBU 1c9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:49.600 UTC [msp.identity] Sign -> DEBU 1ca Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:49.600 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1cb Sleeping 5s" +"2019-09-24 00:24:49.601 UTC [gossip.comm] Send -> DEBU 1cc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 00:24:49.601 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:49.602 UTC [gossip.comm] sendToEndpoint -> DEBU 1ce Exiting" +"2019-09-24 00:24:49.701 UTC [gossip.gossip] handleMessage -> DEBU 1cf Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:49.702 UTC [gossip.pull] HandleMessage -> DEBU 1d0 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:49.703 UTC [gossip.pull] SendDigest -> DEBU 1d1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:24:49.703 UTC [gossip.gossip] handleMessage -> DEBU 1d2 Exiting" +"2019-09-24 00:24:49.713 UTC [gossip.gossip] handleMessage -> DEBU 1d3 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\010" signature:"0D\002 ~,Q\254\370\225\036_]\205K\023\014]\004\201E\214\253:\217[\205\305D\321\272GA\206\005\267\002 E\355\324\330\276\246 /;\215g\016'\313c\"\321\224\321\016\232\337\245\274\0027\352\307b\247\322N" secret_envelope:W\033\002 ,|\003{u#\026\251\021\013\235\351\233\304\221I\026Q{\0149\257\363\370\213h\332e`,m\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:24:49.713 UTC [gossip.gossip] handleMessage -> DEBU 1d4 Exiting" +"2019-09-24 00:24:49.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\010" signature:"0D\002 ~,Q\254\370\225\036_]\205K\023\014]\004\201E\214\253:\217[\205\305D\321\272GA\206\005\267\002 E\355\324\330\276\246 /;\215g\016'\313c\"\321\224\321\016\232\337\245\274\0027\352\307b\247\322N" secret_envelope:W\033\002 ,|\003{u#\026\251\021\013\235\351\233\304\221I\026Q{\0149\257\363\370\213h\332e`,m\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:24:49.713 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d6 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:24:49.713 UTC [msp.identity] Verify -> DEBU 1d7 Verify: digest = 00000000 2f 76 08 22 a8 81 1c b6 51 33 0c 2b c1 4f d3 0c |/v."....Q3.+.O..| +00000010 b4 57 ec cc c2 76 60 85 84 e8 14 9c c4 7e 6e 3c |.W...v`......~n<|" +"2019-09-24 00:24:49.714 UTC [msp.identity] Verify -> DEBU 1d8 Verify: sig = 00000000 30 44 02 20 7e 2c 51 ac f8 95 1e 5f 5d 85 4b 13 |0D. ~,Q...._].K.| +00000010 0c 5d 04 81 45 8c ab 3a 8f 5b 85 c5 44 d1 ba 47 |.]..E..:.[..D..G| +00000020 41 86 05 b7 02 20 45 ed d4 d8 be a6 20 2f 3b 8d |A.... E..... /;.| +00000030 67 0e 27 cb 63 22 d1 94 d1 0e 9a df a5 bc 02 37 |g.'.c".........7| +00000040 ea c7 62 a7 d2 4e |..b..N|" +"2019-09-24 00:24:49.714 UTC [msp.identity] Verify -> DEBU 1d9 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:24:49.714 UTC [msp.identity] Verify -> DEBU 1da Verify: sig = 00000000 30 45 02 21 00 f5 cc 65 1b 67 d7 03 c6 53 66 7a |0E.!...e.g...Sfz| +00000010 96 e7 17 27 93 1c fd c2 28 af 19 67 db 53 27 fc |...'....(..g.S'.| +00000020 ea 9c 3e 57 1b 02 20 2c 7c 03 7b 75 23 16 a9 11 |..>W.. ,|.{u#...| +00000030 0b 9d e9 9b c4 91 49 16 51 7b 0c 39 af f3 f8 8b |......I.Q{.9....| +00000040 68 da 65 60 2c 6d cb |h.e`,m.|" +"2019-09-24 00:24:49.714 UTC [gossip.discovery] handleAliveMessage -> DEBU 1db Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:49.715 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:24:49.715 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dd updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:24:49.715 UTC [gossip.discovery] learnExistingMembers -> DEBU 1de Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:24:49.715 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:24:49.715 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e0 Exiting" +"2019-09-24 00:24:49.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e1 Exiting" +"2019-09-24 00:24:49.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e2 Exiting" +"2019-09-24 00:24:49.715 UTC [gossip.discovery] sendMemResponse -> DEBU 1e3 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:24:49.715 UTC [gossip.comm] Send -> DEBU 1e4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:49.715 UTC [gossip.discovery] sendMemResponse -> DEBU 1e5 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\010" signature:"0D\002 ~,Q\254\370\225\036_]\205K\023\014]\004\201E\214\253:\217[\205\305D\321\272GA\206\005\267\002 E\355\324\330\276\246 /;\215g\016'\313c\"\321\224\321\016\232\337\245\274\0027\352\307b\247\322N" secret_envelope:W\033\002 ,|\003{u#\026\251\021\013\235\351\233\304\221I\026Q{\0149\257\363\370\213h\332e`,m\313" > > alive: > " +"2019-09-24 00:24:49.715 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-09-24 00:24:49.716 UTC [gossip.comm] sendToEndpoint -> DEBU 1e7 Exiting" +"2019-09-24 00:24:51.600 UTC [gossip.pull] Hello -> DEBU 1e8 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:24:51.601 UTC [gossip.comm] Send -> DEBU 1e9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:51.602 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:51.602 UTC [gossip.comm] sendToEndpoint -> DEBU 1eb Exiting" +"2019-09-24 00:24:51.605 UTC [gossip.gossip] handleMessage -> DEBU 1ec Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 00:24:51.605 UTC [gossip.pull] HandleMessage -> DEBU 1ed GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 00:24:51.605 UTC [gossip.gossip] handleMessage -> DEBU 1ee Exiting" +"2019-09-24 00:24:51.606 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ef Obtaining default signing identity" +"2019-09-24 00:24:51.606 UTC [msp.identity] Sign -> DEBU 1f0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151009 " +"2019-09-24 00:24:51.606 UTC [msp.identity] Sign -> DEBU 1f1 Sign: digest: E9F990DADA4590A7580EC84CEC2264D253DC4BBCEB39ECD573C30D9270EAD568 " +"2019-09-24 00:24:51.606 UTC [msp] GetDefaultSigningIdentity -> DEBU 1f2 Obtaining default signing identity" +"2019-09-24 00:24:51.606 UTC [msp.identity] Sign -> DEBU 1f3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:51.606 UTC [msp.identity] Sign -> DEBU 1f4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:51.606 UTC [gossip.comm] Send -> DEBU 1f5 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:51.607 UTC [gossip.comm] sendToEndpoint -> DEBU 1f6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:24:51.607 UTC [gossip.comm] sendToEndpoint -> DEBU 1f7 Exiting" +"2019-09-24 00:24:51.628 UTC [gossip.gossip] handleMessage -> DEBU 1f8 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-09-24 00:24:51.628 UTC [gossip.gossip] handleMessage -> DEBU 1f9 Exiting" +"2019-09-24 00:24:51.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-09-24 00:24:51.629 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fb Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:24:51.629 UTC [msp.identity] Verify -> DEBU 1fc Verify: digest = 00000000 e9 f9 90 da da 45 90 a7 58 0e c8 4c ec 22 64 d2 |.....E..X..L."d.| +00000010 53 dc 4b bc eb 39 ec d5 73 c3 0d 92 70 ea d5 68 |S.K..9..s...p..h|" +"2019-09-24 00:24:51.629 UTC [msp.identity] Verify -> DEBU 1fd Verify: sig = 00000000 30 44 02 20 1e 12 f3 75 5b a7 56 8e a3 05 01 81 |0D. ...u[.V.....| +00000010 fd 95 65 4c 8b a1 5d 2f a1 cc ad 9a 82 f4 9a e7 |..eL..]/........| +00000020 8c 85 77 7d 02 20 77 e8 b8 5d d9 62 2b c0 ec 1a |..w}. w..].b+...| +00000030 45 dd bd 02 27 00 c0 d5 a0 68 d0 0e 47 e5 df 6b |E...'....h..G..k| +00000040 d5 c7 97 33 45 82 |...3E.|" +"2019-09-24 00:24:51.630 UTC [msp.identity] Verify -> DEBU 1fe Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:24:51.630 UTC [msp.identity] Verify -> DEBU 1ff Verify: sig = 00000000 30 45 02 21 00 f3 cd 8f 14 77 37 27 d7 ca ac e1 |0E.!.....w7'....| +00000010 b8 e6 bb 1d 55 8f 24 ed 12 a0 c3 53 60 47 e5 de |....U.$....S`G..| +00000020 7e 96 a5 2b 81 02 20 22 7e 23 7d f3 68 fa 85 f9 |~..+.. "~#}.h...| +00000030 29 82 a5 e8 8f e7 33 3d 24 82 b5 97 46 46 11 65 |).....3=$...FF.e| +00000040 23 f8 91 c0 f2 aa 90 |#......|" +"2019-09-24 00:24:51.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 200 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:51.631 UTC [gossip.discovery] isSentByMe -> DEBU 201 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:51.631 UTC [gossip.discovery] handleAliveMessage -> DEBU 202 Exiting" +"2019-09-24 00:24:51.631 UTC [gossip.discovery] handleMsgFromComm -> DEBU 203 Exiting" +"2019-09-24 00:24:52.709 UTC [gossip.gossip] handleMessage -> DEBU 204 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:52.709 UTC [gossip.gossip] handleMessage -> DEBU 205 Exiting" +"2019-09-24 00:24:52.709 UTC [gossip.discovery] handleMsgFromComm -> DEBU 206 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:52.709 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 207 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:24:52.709 UTC [msp.identity] Verify -> DEBU 208 Verify: digest = 00000000 dc a1 de d5 fb 1b 7a 13 37 cb 10 d6 ef ff eb 9e |......z.7.......| +00000010 f4 26 17 4b d1 cf 6f a7 df 18 3c 9d 44 dd 45 7b |.&.K..o...<.D.E{|" +"2019-09-24 00:24:52.709 UTC [msp.identity] Verify -> DEBU 209 Verify: sig = 00000000 30 45 02 21 00 cc 33 30 40 ef 14 da 2d c1 5e ea |0E.!..30@...-.^.| +00000010 42 ff 2e 8e da 0a 8d c4 13 87 5e 25 9a 81 d4 ef |B.........^%....| +00000020 0e 16 2b 3c ed 02 20 0a 59 67 c1 9e d8 ee 2b 9a |..+<.. .Yg....+.| +00000030 1c 7f 01 27 0c 63 95 75 3b 85 be a3 83 aa 62 6b |...'.c.u;.....bk| +00000040 fd ed e1 85 62 b5 fc |....b..|" +"2019-09-24 00:24:52.710 UTC [msp.identity] Verify -> DEBU 20a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:24:52.710 UTC [msp.identity] Verify -> DEBU 20b Verify: sig = 00000000 30 44 02 20 0f ed c3 0a 5f 87 c1 72 89 d7 1b 57 |0D. ...._..r...W| +00000010 a1 7d b4 9b c3 05 52 60 54 78 35 1b cc 69 79 ae |.}....R`Tx5..iy.| +00000020 df de 21 71 02 20 55 d9 e9 d5 da 51 bf c0 45 76 |..!q. U....Q..Ev| +00000030 c4 a4 00 23 e2 de b9 98 d4 6c d0 f5 4b 90 d6 8a |...#.....l..K...| +00000040 02 5e b9 aa bb b2 |.^....|" +"2019-09-24 00:24:52.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 20c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:52.711 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:24:52.711 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:24:52.711 UTC [gossip.discovery] learnExistingMembers -> DEBU 20f Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:24:52.711 UTC [gossip.discovery] learnExistingMembers -> DEBU 210 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:24:52.711 UTC [gossip.discovery] learnExistingMembers -> DEBU 211 Exiting" +"2019-09-24 00:24:52.711 UTC [gossip.discovery] handleAliveMessage -> DEBU 212 Exiting" +"2019-09-24 00:24:52.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 213 Exiting" +"2019-09-24 00:24:53.701 UTC [gossip.gossip] handleMessage -> DEBU 214 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:53.701 UTC [gossip.pull] HandleMessage -> DEBU 215 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:53.701 UTC [gossip.pull] SendDigest -> DEBU 216 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:24:53.702 UTC [gossip.gossip] handleMessage -> DEBU 217 Exiting" +"2019-09-24 00:24:53.714 UTC [gossip.gossip] handleMessage -> DEBU 218 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\n" signature:"0E\002!\000\335\3070L\025\323\034\016\275\271U\027\324,\302\263\217`\361\255\334\241\317\276n\377\267i\224\266\202L\002 \026\031!Q\033\232~\025x\265\351\001\252\2271\266!\213E\360\2160m\037\252K\205\245\277\276=L" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:24:53.715 UTC [gossip.gossip] handleMessage -> DEBU 219 Exiting" +"2019-09-24 00:24:53.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21a Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\n" signature:"0E\002!\000\335\3070L\025\323\034\016\275\271U\027\324,\302\263\217`\361\255\334\241\317\276n\377\267i\224\266\202L\002 \026\031!Q\033\232~\025x\265\351\001\252\2271\266!\213E\360\2160m\037\252K\205\245\277\276=L" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:24:53.715 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:24:53.715 UTC [msp.identity] Verify -> DEBU 21c Verify: digest = 00000000 a1 da 56 c6 71 a2 94 fb 17 46 4b 86 d8 06 f2 55 |..V.q....FK....U| +00000010 11 a3 9b c8 d5 d0 fd 0b 8e 3e 3e a9 da 03 8a 07 |.........>>.....|" +"2019-09-24 00:24:53.715 UTC [msp.identity] Verify -> DEBU 21d Verify: sig = 00000000 30 45 02 21 00 dd c7 30 4c 15 d3 1c 0e bd b9 55 |0E.!...0L......U| +00000010 17 d4 2c c2 b3 8f 60 f1 ad dc a1 cf be 6e ff b7 |..,...`......n..| +00000020 69 94 b6 82 4c 02 20 16 19 21 51 1b 9a 7e 15 78 |i...L. ..!Q..~.x| +00000030 b5 e9 01 aa 97 31 b6 21 8b 45 f0 8e 30 6d 1f aa |.....1.!.E..0m..| +00000040 4b 85 a5 bf be 3d 4c |K....=L|" +"2019-09-24 00:24:53.716 UTC [msp.identity] Verify -> DEBU 21e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:24:53.717 UTC [msp.identity] Verify -> DEBU 21f Verify: sig = 00000000 30 44 02 20 6b c8 82 75 33 e3 fc ea 12 01 26 01 |0D. k..u3.....&.| +00000010 ae b2 5d 98 ef 14 76 5f cf 6c 1b a3 2f b0 28 7b |..]...v_.l../.({| +00000020 17 6a 4f 52 02 20 34 61 67 76 90 35 5c a1 84 91 |.jOR. 4agv.5\...| +00000030 dc ff 1e 4a 77 73 a3 72 ba f0 11 fc db e8 9c 01 |...Jws.r........| +00000040 a7 66 8f 4c c4 08 |.f.L..|" +"2019-09-24 00:24:53.717 UTC [gossip.discovery] handleAliveMessage -> DEBU 220 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:53.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 221 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:24:53.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 222 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:24:53.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 223 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:24:53.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 224 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:24:53.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 225 Exiting" +"2019-09-24 00:24:53.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 226 Exiting" +"2019-09-24 00:24:53.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227 Exiting" +"2019-09-24 00:24:53.718 UTC [gossip.discovery] sendMemResponse -> DEBU 228 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:24:53.718 UTC [gossip.comm] Send -> DEBU 229 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:53.718 UTC [gossip.discovery] sendMemResponse -> DEBU 22a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\n" signature:"0E\002!\000\335\3070L\025\323\034\016\275\271U\027\324,\302\263\217`\361\255\334\241\317\276n\377\267i\224\266\202L\002 \026\031!Q\033\232~\025x\265\351\001\252\2271\266!\213E\360\2160m\037\252K\205\245\277\276=L" secret_envelope: > alive: > " +"2019-09-24 00:24:53.718 UTC [gossip.comm] sendToEndpoint -> DEBU 22b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-09-24 00:24:53.718 UTC [gossip.comm] sendToEndpoint -> DEBU 22c Exiting" +"2019-09-24 00:24:54.601 UTC [msp] GetDefaultSigningIdentity -> DEBU 22d Obtaining default signing identity" +"2019-09-24 00:24:54.601 UTC [msp.identity] Sign -> DEBU 22e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100A " +"2019-09-24 00:24:54.602 UTC [msp.identity] Sign -> DEBU 22f Sign: digest: D680FB7776390040C6727C6659081B2D67D9B7AF7A301102E4D5B44085EE2DE9 " +"2019-09-24 00:24:54.602 UTC [msp] GetDefaultSigningIdentity -> DEBU 230 Obtaining default signing identity" +"2019-09-24 00:24:54.602 UTC [msp.identity] Sign -> DEBU 231 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:54.602 UTC [msp.identity] Sign -> DEBU 232 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:54.602 UTC [gossip.discovery] periodicalSendAlive -> DEBU 233 Sleeping 5s" +"2019-09-24 00:24:54.606 UTC [gossip.comm] Send -> DEBU 234 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 00:24:54.607 UTC [gossip.comm] sendToEndpoint -> DEBU 235 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:54.607 UTC [gossip.comm] sendToEndpoint -> DEBU 236 Exiting" +"2019-09-24 00:24:55.602 UTC [gossip.pull] Hello -> DEBU 237 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:24:55.602 UTC [gossip.comm] Send -> DEBU 238 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:55.602 UTC [gossip.comm] sendToEndpoint -> DEBU 239 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:24:55.602 UTC [gossip.comm] sendToEndpoint -> DEBU 23a Exiting" +"2019-09-24 00:24:55.603 UTC [gossip.gossip] handleMessage -> DEBU 23b Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 00:24:55.603 UTC [gossip.pull] HandleMessage -> DEBU 23c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 00:24:55.604 UTC [gossip.gossip] handleMessage -> DEBU 23d Exiting" +"2019-09-24 00:24:55.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 23e Obtaining default signing identity" +"2019-09-24 00:24:55.608 UTC [msp.identity] Sign -> DEBU 23f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100B " +"2019-09-24 00:24:55.608 UTC [msp.identity] Sign -> DEBU 240 Sign: digest: DBA9DE676A5B47320152C50EE17B49DD2DD84F7FDE16237B35323A8867A9CB30 " +"2019-09-24 00:24:55.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 241 Obtaining default signing identity" +"2019-09-24 00:24:55.608 UTC [msp.identity] Sign -> DEBU 242 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:55.608 UTC [msp.identity] Sign -> DEBU 243 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:55.609 UTC [gossip.comm] Send -> DEBU 244 Entering, sending GossipMessage: tag:EMPTY mem_req:L\327\252g\007lx\304\"\007\023\346\003\313\313c" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:55.609 UTC [gossip.comm] sendToEndpoint -> DEBU 245 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:L\327\252g\007lx\304\"\007\023\346\003\313\313c" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:24:55.609 UTC [gossip.comm] sendToEndpoint -> DEBU 246 Exiting" +"2019-09-24 00:24:55.619 UTC [gossip.gossip] handleMessage -> DEBU 247 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-09-24 00:24:55.619 UTC [gossip.gossip] handleMessage -> DEBU 248 Exiting" +"2019-09-24 00:24:55.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 249 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-09-24 00:24:55.620 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:24:55.627 UTC [msp.identity] Verify -> DEBU 24b Verify: digest = 00000000 db a9 de 67 6a 5b 47 32 01 52 c5 0e e1 7b 49 dd |...gj[G2.R...{I.| +00000010 2d d8 4f 7f de 16 23 7b 35 32 3a 88 67 a9 cb 30 |-.O...#{52:.g..0|" +"2019-09-24 00:24:55.647 UTC [msp.identity] Verify -> DEBU 24c Verify: sig = 00000000 30 44 02 20 72 4d 15 2b 66 9f 75 21 45 5d 87 52 |0D. rM.+f.u!E].R| +00000010 4e 3a 8d f6 eb 2e 4f 90 25 50 38 11 f4 52 8f fd |N:....O.%P8..R..| +00000020 a0 b7 0c 21 02 20 21 bb 0c 68 3c 25 99 c2 19 07 |...!. !..h<%....| +00000030 c0 79 81 e8 90 3e 4c d7 aa 67 07 6c 78 c4 22 07 |.y...>L..g.lx.".| +00000040 13 e6 03 cb cb 63 |.....c|" +"2019-09-24 00:24:55.647 UTC [msp.identity] Verify -> DEBU 24d Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:24:55.648 UTC [msp.identity] Verify -> DEBU 24e Verify: sig = 00000000 30 45 02 21 00 87 7b f1 2e 7e 5d a1 91 b4 56 e6 |0E.!..{..~]...V.| +00000010 09 83 6b 53 c2 e1 ed 18 bc 16 13 b5 ee ed 2d 10 |..kS..........-.| +00000020 3d a0 8e a0 e6 02 20 2e fb e4 03 4a 7e de f0 7f |=..... ....J~...| +00000030 c4 e6 e7 75 0d da 67 b5 06 b6 7f 68 5c c9 96 a6 |...u..g....h\...| +00000040 8e 4a b9 cb ad e5 70 |.J....p|" +"2019-09-24 00:24:55.654 UTC [gossip.discovery] handleAliveMessage -> DEBU 24f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:55.655 UTC [gossip.discovery] isSentByMe -> DEBU 250 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:55.655 UTC [gossip.discovery] handleAliveMessage -> DEBU 251 Exiting" +"2019-09-24 00:24:55.655 UTC [gossip.discovery] handleMsgFromComm -> DEBU 252 Exiting" +"2019-09-24 00:24:56.080 UTC [endorser] ProcessProposal -> DEBU 253 Entering: request from 172.18.0.9:50574" +"2019-09-24 00:24:56.080 UTC [protoutils] ValidateProposalMessage -> DEBU 254 ValidateProposalMessage starts for signed proposal 0xc002876be0" +"2019-09-24 00:24:56.081 UTC [protoutils] validateChannelHeader -> DEBU 255 validateChannelHeader info: header type 1" +"2019-09-24 00:24:56.081 UTC [protoutils] checkSignatureFromCreator -> DEBU 256 begin" +"2019-09-24 00:24:56.081 UTC [msp] DeserializeIdentity -> DEBU 257 Obtaining identity" +"2019-09-24 00:24:56.082 UTC [msp.identity] newIdentity -> DEBU 258 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -661,143 +858,143 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:40.711 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:39:40.712 UTC [msp] Validate -> DEBU 1c7 MSP Org1MSP validating identity" -"2019-07-20 02:39:40.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c8 creator is valid" -"2019-07-20 02:39:40.713 UTC [msp.identity] Verify -> DEBU 1c9 Verify: digest = 00000000 86 39 0c 46 13 37 25 e5 80 45 6e 19 f6 61 a8 16 |.9.F.7%..En..a..| -00000010 49 32 fe 1e 99 80 e4 99 d3 b9 aa 2c f1 bb 78 8d |I2.........,..x.|" -"2019-07-20 02:39:40.713 UTC [msp.identity] Verify -> DEBU 1ca Verify: sig = 00000000 30 44 02 20 5e 97 26 dc 2d a9 1b 1a fa 68 0d 81 |0D. ^.&.-....h..| -00000010 c4 6b ac d4 11 d8 84 58 c9 63 0c 35 e8 01 6d 0f |.k.....X.c.5..m.| -00000020 a8 83 f9 89 02 20 15 d6 c1 91 3c 1f 7f 98 f9 66 |..... ....<....f| -00000030 e0 db 43 d7 0b f4 e4 49 f1 34 75 7f b6 56 28 ec |..C....I.4u..V(.| -00000040 5c a5 59 88 ad 64 |\.Y..d|" -"2019-07-20 02:39:40.714 UTC [protoutils] checkSignatureFromCreator -> DEBU 1cb exits successfully" -"2019-07-20 02:39:40.714 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1cc validateChaincodeProposalMessage starts for proposal 0xc0007a8380, header 0xc0007aa460" -"2019-07-20 02:39:40.714 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1cd validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-07-20 02:39:40.715 UTC [endorser] preProcess -> DEBU 1ce [][67d06ae1] processing txid: 67d06ae1fc1d7db4d5e0259c1748ab22cb470271d429d94645d1ca2a81fe1bb7" -"2019-07-20 02:39:40.715 UTC [endorser] SimulateProposal -> DEBU 1cf [][67d06ae1] Entry chaincode: name:"cscc" " -"2019-07-20 02:39:40.715 UTC [endorser] callChaincode -> INFO 1d0 [][67d06ae1] Entry chaincode: name:"cscc" " -"2019-07-20 02:39:40.715 UTC [chaincode] Execute -> DEBU 1d1 Entry" -"2019-07-20 02:39:40.716 UTC [cscc] Invoke -> DEBU 1d2 Invoke function: JoinChain" -"2019-07-20 02:39:40.716 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1d3 Checking if identity satisfies ADMIN role for Org1MSP" -"2019-07-20 02:39:40.717 UTC [msp.identity] Verify -> DEBU 1d4 Verify: digest = 00000000 86 39 0c 46 13 37 25 e5 80 45 6e 19 f6 61 a8 16 |.9.F.7%..En..a..| -00000010 49 32 fe 1e 99 80 e4 99 d3 b9 aa 2c f1 bb 78 8d |I2.........,..x.|" -"2019-07-20 02:39:40.717 UTC [msp.identity] Verify -> DEBU 1d5 Verify: sig = 00000000 30 44 02 20 5e 97 26 dc 2d a9 1b 1a fa 68 0d 81 |0D. ^.&.-....h..| -00000010 c4 6b ac d4 11 d8 84 58 c9 63 0c 35 e8 01 6d 0f |.k.....X.c.5..m.| -00000020 a8 83 f9 89 02 20 15 d6 c1 91 3c 1f 7f 98 f9 66 |..... ....<....f| -00000030 e0 db 43 d7 0b f4 e4 49 f1 34 75 7f b6 56 28 ec |..C....I.4u..V(.| -00000040 5c a5 59 88 ad 64 |\.Y..d|" -"2019-07-20 02:39:40.718 UTC [ledgermgmt] CreateLedger -> INFO 1d6 Creating ledger [businesschannel] with genesis block" -"2019-07-20 02:39:40.719 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1d7 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " -"2019-07-20 02:39:40.720 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1d8 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" -"2019-07-20 02:39:40.720 UTC [kvledger.util] logDirStatus -> DEBU 1d9 Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" -"2019-07-20 02:39:40.721 UTC [kvledger.util] logDirStatus -> DEBU 1da After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" -"2019-07-20 02:39:40.721 UTC [fsblkstorage] newBlockfileMgr -> INFO 1db Getting block information from block storage" -"2019-07-20 02:39:40.722 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1dc Retrieving checkpoint info from block files" -"2019-07-20 02:39:40.722 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1dd retrieveLastFileSuffix()" -"2019-07-20 02:39:40.723 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1de retrieveLastFileSuffix() - biggestFileNum = -1" -"2019-07-20 02:39:40.723 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1df Last file number found = -1" -"2019-07-20 02:39:40.723 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1e0 No block file found" -"2019-07-20 02:39:40.723 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1e1 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0005efc40)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" -"2019-07-20 02:39:40.725 UTC [fsblkstorage] newBlockIndex -> DEBU 1e2 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" -"2019-07-20 02:39:40.725 UTC [pvtdatastorage] OpenStore -> DEBU 1e3 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" -"2019-07-20 02:39:40.725 UTC [leveldbhelper] GetIterator -> DEBU 1e4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" -"2019-07-20 02:39:40.725 UTC [kvledger] newKVLedger -> DEBU 1e5 Creating KVLedger ledgerID=businesschannel: " -"2019-07-20 02:39:40.725 UTC [kvledger] lastPersistedCommitHash -> DEBU 1e6 Chain is empty" -"2019-07-20 02:39:40.725 UTC [kvledger] newKVLedger -> DEBU 1e7 Register state db for chaincode lifecycle events: false" -"2019-07-20 02:39:40.725 UTC [kvledger] recoverDBs -> DEBU 1e8 Entering recoverDB()" -"2019-07-20 02:39:40.725 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 1e9 Block storage is empty." -"2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1ea [businesschannel:] Filtering pvtData of invalidation transactions" -"2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1eb [businesschannel:] Committing pvtData of [0] old blocks to the stateDB" -"2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ec Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ed lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" -"2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ee Constructing unique pvtData by removing duplicate entries" -"2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1ef [businesschannel:] Clearing the bookkeeping information from pvtdatastore" -"2019-07-20 02:39:40.726 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f0 Starting to process collection eligibility events" -"2019-07-20 02:39:40.726 UTC [leveldbhelper] GetIterator -> DEBU 1f1 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" -"2019-07-20 02:39:40.726 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f2 Converted [0] inelligible mising data entries to elligible" -"2019-07-20 02:39:40.726 UTC [pvtdatastorage] func1 -> DEBU 1f3 Waiting for collection eligibility event" -"2019-07-20 02:39:40.726 UTC [kvledger] CommitWithPvtData -> DEBU 1f4 [businesschannel] Validating state for block [0]" -"2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f6 lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f7 Validating new block with num trans = [1]" -"2019-07-20 02:39:40.727 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1f8 ValidateAndPrepareBatch() for block number = [0]" -"2019-07-20 02:39:40.727 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1f9 preprocessing ProtoBlock..." -"2019-07-20 02:39:40.727 UTC [valimpl] preprocessProtoBlock -> DEBU 1fa txType=CONFIG" -"2019-07-20 02:39:40.727 UTC [valimpl] processNonEndorserTx -> DEBU 1fb Performing custom processing for transaction [txid=], [txType=CONFIG]" -"2019-07-20 02:39:40.727 UTC [valimpl] processNonEndorserTx -> DEBU 1fc Processor for custom tx processing:&peer.configtxProcessor{}" -"2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1fd constructing new tx simulator" -"2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1fe constructing new tx simulator txid = []" -"2019-07-20 02:39:40.727 UTC [peer] GenerateSimulationResults -> DEBU 1ff Processing CONFIG" -"2019-07-20 02:39:40.728 UTC [peer] processChannelConfigTx -> DEBU 200 channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -"2019-07-20 02:39:40.728 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 201 Simulation completed, getting simulation results" -"2019-07-20 02:39:40.728 UTC [lockbasedtxmgr] Done -> DEBU 202 Done with transaction simulation / query execution []" -"2019-07-20 02:39:40.728 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 203 Block [0] Transaction index [0] TxId [] marked as valid by state validator" -"2019-07-20 02:39:40.728 UTC [valinternal] ApplyWriteSet -> DEBU 204 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc000695b00)}" -"2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 205 validating rwset..." -"2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 206 postprocessing ProtoBlock..." -"2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 207 ValidateAndPrepareBatch() complete" -"2019-07-20 02:39:40.728 UTC [kvledger] CommitWithPvtData -> DEBU 208 [businesschannel] Adding CommitHash to the block [0]" -"2019-07-20 02:39:40.728 UTC [kvledger] CommitWithPvtData -> DEBU 209 [businesschannel] Committing block [0] to storage" -"2019-07-20 02:39:40.728 UTC [ledgerstorage] CommitWithPvtData -> DEBU 20a Writing block [0] to pvt block store" -"2019-07-20 02:39:40.729 UTC [pvtdatastorage] Prepare -> DEBU 20b Saved 0 private data write sets for block [0]" -"2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20c Indexing block [blockNum=0, blockHash=[]byte{0xde, 0xde, 0xd4, 0x2c, 0x3f, 0xc9, 0xd0, 0x46, 0x4d, 0x6c, 0x3a, 0xf6, 0x16, 0x22, 0x29, 0x32, 0x3, 0x44, 0xef, 0x64, 0x10, 0x5f, 0x7f, 0xf6, 0x26, 0x25, 0xe8, 0x71, 0x7d, 0x72, 0x1c, 0xd4} txOffsets= -txId=12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898 locPointer=offset=39, bytesLength=23902 +"2019-09-24 00:24:56.083 UTC [protoutils] checkSignatureFromCreator -> DEBU 259 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:24:56.083 UTC [msp] Validate -> DEBU 25a MSP Org1MSP validating identity" +"2019-09-24 00:24:56.083 UTC [protoutils] checkSignatureFromCreator -> DEBU 25b creator is valid" +"2019-09-24 00:24:56.084 UTC [msp.identity] Verify -> DEBU 25c Verify: digest = 00000000 d9 6d 64 89 c9 2f ac 8f df fa 33 db 86 49 7c 1c |.md../....3..I|.| +00000010 6a 14 97 98 f8 f4 08 c7 c3 79 8f 6e db 63 43 dc |j........y.n.cC.|" +"2019-09-24 00:24:56.084 UTC [msp.identity] Verify -> DEBU 25d Verify: sig = 00000000 30 44 02 20 29 7d 54 06 d0 20 b4 7f 11 e4 85 fc |0D. )}T.. ......| +00000010 3d 97 ef 53 fd f3 3d 1f 6e 76 d2 c5 c5 4a 2e 15 |=..S..=.nv...J..| +00000020 8d 82 63 3e 02 20 5d 10 ba c4 b0 04 9a 0f 52 e4 |..c>. ].......R.| +00000030 ca bf ba 84 45 f3 8c c3 74 11 42 6c d8 f7 46 c7 |....E...t.Bl..F.| +00000040 57 69 65 59 28 a7 |WieY(.|" +"2019-09-24 00:24:56.084 UTC [protoutils] checkSignatureFromCreator -> DEBU 25e exits successfully" +"2019-09-24 00:24:56.084 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 25f validateChaincodeProposalMessage starts for proposal 0xc002755dc0, header 0xc0028774f0" +"2019-09-24 00:24:56.084 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 260 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-09-24 00:24:56.084 UTC [endorser] preProcess -> DEBU 261 [][a328fb8f] processing txid: a328fb8fd28c939df2f0a906857e3549742ae0eb97293f619422ff975e8aa170" +"2019-09-24 00:24:56.084 UTC [endorser] SimulateProposal -> DEBU 262 [][a328fb8f] Entry chaincode: name:"cscc" " +"2019-09-24 00:24:56.085 UTC [endorser] callChaincode -> INFO 263 [][a328fb8f] Entry chaincode: name:"cscc" " +"2019-09-24 00:24:56.085 UTC [chaincode] Execute -> DEBU 264 Entry" +"2019-09-24 00:24:56.085 UTC [cscc] Invoke -> DEBU 265 Invoke function: JoinChain" +"2019-09-24 00:24:56.086 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 266 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-09-24 00:24:56.086 UTC [msp.identity] Verify -> DEBU 267 Verify: digest = 00000000 d9 6d 64 89 c9 2f ac 8f df fa 33 db 86 49 7c 1c |.md../....3..I|.| +00000010 6a 14 97 98 f8 f4 08 c7 c3 79 8f 6e db 63 43 dc |j........y.n.cC.|" +"2019-09-24 00:24:56.086 UTC [msp.identity] Verify -> DEBU 268 Verify: sig = 00000000 30 44 02 20 29 7d 54 06 d0 20 b4 7f 11 e4 85 fc |0D. )}T.. ......| +00000010 3d 97 ef 53 fd f3 3d 1f 6e 76 d2 c5 c5 4a 2e 15 |=..S..=.nv...J..| +00000020 8d 82 63 3e 02 20 5d 10 ba c4 b0 04 9a 0f 52 e4 |..c>. ].......R.| +00000030 ca bf ba 84 45 f3 8c c3 74 11 42 6c d8 f7 46 c7 |....E...t.Bl..F.| +00000040 57 69 65 59 28 a7 |WieY(.|" +"2019-09-24 00:24:56.086 UTC [ledgermgmt] CreateLedger -> INFO 269 Creating ledger [businesschannel] with genesis block" +"2019-09-24 00:24:56.164 UTC [fsblkstorage] newBlockfileMgr -> DEBU 26a newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2019-09-24 00:24:56.164 UTC [kvledger.util] CreateDirIfMissing -> DEBU 26b CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" +"2019-09-24 00:24:56.164 UTC [kvledger.util] logDirStatus -> DEBU 26c Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" +"2019-09-24 00:24:56.164 UTC [kvledger.util] logDirStatus -> DEBU 26d After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" +"2019-09-24 00:24:56.164 UTC [fsblkstorage] newBlockfileMgr -> INFO 26e Getting block information from block storage" +"2019-09-24 00:24:56.164 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 26f Retrieving checkpoint info from block files" +"2019-09-24 00:24:56.164 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 270 retrieveLastFileSuffix()" +"2019-09-24 00:24:56.165 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 271 retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-09-24 00:24:56.165 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 272 Last file number found = -1" +"2019-09-24 00:24:56.165 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 273 No block file found" +"2019-09-24 00:24:56.165 UTC [fsblkstorage] newBlockfileMgr -> DEBU 274 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0028e18a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-09-24 00:24:56.168 UTC [fsblkstorage] newBlockIndex -> DEBU 275 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" +"2019-09-24 00:24:56.169 UTC [pvtdatastorage] processCollElgEvents -> DEBU 276 Starting to process collection eligibility events" +"2019-09-24 00:24:56.169 UTC [leveldbhelper] GetIterator -> DEBU 277 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" +"2019-09-24 00:24:56.169 UTC [pvtdatastorage] processCollElgEvents -> DEBU 278 Converted [0] inelligible mising data entries to elligible" +"2019-09-24 00:24:56.169 UTC [pvtdatastorage] func1 -> DEBU 279 Waiting for collection eligibility event" +"2019-09-24 00:24:56.169 UTC [pvtdatastorage] OpenStore -> DEBU 27a Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" +"2019-09-24 00:24:56.169 UTC [leveldbhelper] GetIterator -> DEBU 27b Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" +"2019-09-24 00:24:56.170 UTC [kvledger] newKVLedger -> DEBU 27c Creating KVLedger ledgerID=businesschannel: " +"2019-09-24 00:24:56.170 UTC [kvledger] lastPersistedCommitHash -> DEBU 27d Chain is empty" +"2019-09-24 00:24:56.170 UTC [kvledger] newKVLedger -> DEBU 27e Register state db for chaincode lifecycle events: false" +"2019-09-24 00:24:56.170 UTC [kvledger] recoverDBs -> DEBU 27f Entering recoverDB()" +"2019-09-24 00:24:56.170 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 280 Block storage is empty." +"2019-09-24 00:24:56.170 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 281 [businesschannel:] Filtering pvtData of invalidation transactions" +"2019-09-24 00:24:56.170 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 282 [businesschannel:] Committing pvtData of [0] old blocks to the stateDB" +"2019-09-24 00:24:56.170 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 283 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 00:24:56.170 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 284 lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" +"2019-09-24 00:24:56.170 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 285 Constructing unique pvtData by removing duplicate entries" +"2019-09-24 00:24:56.170 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 286 [businesschannel:] Clearing the bookkeeping information from pvtdatastore" +"2019-09-24 00:24:56.177 UTC [kvledger] CommitWithPvtData -> DEBU 287 [businesschannel] Validating state for block [0]" +"2019-09-24 00:24:56.177 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 288 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 00:24:56.177 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 289 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 00:24:56.177 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 28a Validating new block with num trans = [1]" +"2019-09-24 00:24:56.177 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 28b ValidateAndPrepareBatch() for block number = [0]" +"2019-09-24 00:24:56.178 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 28c preprocessing ProtoBlock..." +"2019-09-24 00:24:56.178 UTC [valimpl] preprocessProtoBlock -> DEBU 28d txType=CONFIG" +"2019-09-24 00:24:56.178 UTC [valimpl] processNonEndorserTx -> DEBU 28e Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-09-24 00:24:56.178 UTC [valimpl] processNonEndorserTx -> DEBU 28f Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-09-24 00:24:56.178 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 290 constructing new tx simulator" +"2019-09-24 00:24:56.178 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 291 constructing new tx simulator txid = []" +"2019-09-24 00:24:56.178 UTC [peer] GenerateSimulationResults -> DEBU 292 Processing CONFIG" +"2019-09-24 00:24:56.183 UTC [peer] processChannelConfigTx -> DEBU 293 channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-09-24 00:24:56.183 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 294 Simulation completed, getting simulation results" +"2019-09-24 00:24:56.184 UTC [lockbasedtxmgr] Done -> DEBU 295 Done with transaction simulation / query execution []" +"2019-09-24 00:24:56.184 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 296 Block [0] Transaction index [0] TxId [] marked as valid by state validator" +"2019-09-24 00:24:56.184 UTC [valinternal] ApplyWriteSet -> DEBU 297 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0029cfb00)}" +"2019-09-24 00:24:56.184 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 298 validating rwset..." +"2019-09-24 00:24:56.184 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 299 postprocessing ProtoBlock..." +"2019-09-24 00:24:56.184 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 29a ValidateAndPrepareBatch() complete" +"2019-09-24 00:24:56.184 UTC [kvledger] CommitWithPvtData -> DEBU 29b [businesschannel] Adding CommitHash to the block [0]" +"2019-09-24 00:24:56.184 UTC [kvledger] CommitWithPvtData -> DEBU 29c [businesschannel] Committing block [0] to storage" +"2019-09-24 00:24:56.184 UTC [ledgerstorage] CommitWithPvtData -> DEBU 29d Writing block [0] to pvt block store" +"2019-09-24 00:24:56.188 UTC [pvtdatastorage] Prepare -> DEBU 29e Saved 0 private data write sets for block [0]" +"2019-09-24 00:24:56.190 UTC [fsblkstorage] indexBlock -> DEBU 29f Indexing block [blockNum=0, blockHash=[]byte{0xdc, 0x37, 0x3e, 0x7d, 0xd9, 0x80, 0x34, 0xd8, 0x87, 0x20, 0x13, 0x50, 0x22, 0xb4, 0x68, 0xd5, 0xb6, 0x58, 0x78, 0xbf, 0x32, 0x9f, 0xc8, 0x89, 0x42, 0x2a, 0x5, 0x7a, 0xab, 0xc6, 0x38, 0x47} txOffsets= +txId=39c9b622afe3457926bd2f6a5ade166a0d139905e01268fb7cba4a9273bf6dc3 locPointer=offset=39, bytesLength=23903 ]" -"2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20d Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23902] for tx ID: [12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898] to txid-index" -"2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20e Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23902] for tx number:[0] ID: [12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898] to blockNumTranNum index" -"2019-07-20 02:39:40.733 UTC [fsblkstorage] updateCheckpoint -> DEBU 20f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23948], isChainEmpty=[false], lastBlockNumber=[0]" -"2019-07-20 02:39:40.733 UTC [pvtdatastorage] Commit -> DEBU 210 Committing private data for block [0]" -"2019-07-20 02:39:40.734 UTC [pvtdatastorage] Commit -> DEBU 211 Committed private data for block [0]" -"2019-07-20 02:39:40.734 UTC [kvledger] CommitWithPvtData -> DEBU 212 [businesschannel] Committing block [0] transactions to state database" -"2019-07-20 02:39:40.734 UTC [lockbasedtxmgr] Commit -> DEBU 213 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-07-20 02:39:40.734 UTC [pvtdatastorage] func1 -> DEBU 214 Purger started: Purging expired private data till block number [0]" -"2019-07-20 02:39:40.734 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 215 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" -"2019-07-20 02:39:40.734 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 216 Preparing potential purge list working-set for expiringAtBlk [0]" -"2019-07-20 02:39:40.734 UTC [leveldbhelper] GetIterator -> DEBU 217 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" -"2019-07-20 02:39:40.734 UTC [pvtdatastorage] func1 -> DEBU 218 Purger finished" -"2019-07-20 02:39:40.734 UTC [leveldbhelper] GetIterator -> DEBU 219 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" -"2019-07-20 02:39:40.734 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 21a No expiry entry found for expiringAtBlk [0]" -"2019-07-20 02:39:40.735 UTC [lockbasedtxmgr] Commit -> DEBU 21b Committing updates to state database" -"2019-07-20 02:39:40.735 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 21c Building the expiry schedules based on the update batch" -"2019-07-20 02:39:40.735 UTC [lockbasedtxmgr] Commit -> DEBU 21d Write lock acquired for committing updates to state database" -"2019-07-20 02:39:40.735 UTC [stateleveldb] ApplyUpdates -> DEBU 21e Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -"2019-07-20 02:39:40.736 UTC [lockbasedtxmgr] Commit -> DEBU 21f Updates committed to state database and the write lock is released" -"2019-07-20 02:39:40.736 UTC [lockbasedtxmgr] func1 -> DEBU 220 launched the background routine for preparing keys to purge with the next block" -"2019-07-20 02:39:40.736 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 221 Preparing potential purge list working-set for expiringAtBlk [1]" -"2019-07-20 02:39:40.736 UTC [leveldbhelper] GetIterator -> DEBU 222 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" -"2019-07-20 02:39:40.737 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 223 No expiry entry found for expiringAtBlk [1]" -"2019-07-20 02:39:40.737 UTC [kvledger] CommitWithPvtData -> DEBU 224 [businesschannel] Committing block [0] transactions to history database" -"2019-07-20 02:39:40.737 UTC [historyleveldb] Commit -> DEBU 225 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" -"2019-07-20 02:39:40.737 UTC [historyleveldb] Commit -> DEBU 226 Skipping transaction [0] since it is not an endorsement transaction" -"2019-07-20 02:39:40.738 UTC [historyleveldb] Commit -> DEBU 227 Channel [businesschannel]: Updates committed to history database for blockNo [0]" -"2019-07-20 02:39:40.738 UTC [kvledger] CommitWithPvtData -> INFO 228 [businesschannel] Committed block [0] with 1 transaction(s) in 11ms (state_validation=1ms block_and_pvtdata_commit=5ms state_commit=2ms) commitHash=[]" -"2019-07-20 02:39:40.740 UTC [ledgermgmt] CreateLedger -> INFO 229 Created ledger [businesschannel] with genesis block" -"2019-07-20 02:39:40.740 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22a constructing new query executor txid = [0bf7b741-2304-4dbf-9a53-198b20e85df5]" -"2019-07-20 02:39:40.740 UTC [stateleveldb] GetState -> DEBU 22b GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" -"2019-07-20 02:39:40.740 UTC [lockbasedtxmgr] Done -> DEBU 22c Done with transaction simulation / query execution [0bf7b741-2304-4dbf-9a53-198b20e85df5]" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 22d Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 22e Processing field: HashingAlgorithm" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 22f Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 230 Processing field: OrdererAddresses" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 231 Processing field: Consortium" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 232 Processing field: Capabilities" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 233 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 234 Processing field: ConsensusType" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 235 Processing field: BatchSize" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 236 Processing field: BatchTimeout" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 237 Processing field: KafkaBrokers" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 238 Processing field: ChannelRestrictions" -"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 239 Processing field: Capabilities" -"2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 23a Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: Endpoints" -"2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 23c Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: MSP" -"2019-07-20 02:39:40.741 UTC [common.channelconfig] validateMSP -> DEBU 23e Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:40.741 UTC [msp] newBccspMsp -> DEBU 23f Creating BCCSP-based MSP instance" -"2019-07-20 02:39:40.741 UTC [msp] New -> DEBU 240 Creating Cache-MSP instance" -"2019-07-20 02:39:40.741 UTC [msp] Setup -> DEBU 241 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:40.741 UTC [msp.identity] newIdentity -> DEBU 242 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:56.190 UTC [fsblkstorage] indexBlock -> DEBU 2a0 Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23903] for tx ID: [39c9b622afe3457926bd2f6a5ade166a0d139905e01268fb7cba4a9273bf6dc3] to txid-index" +"2019-09-24 00:24:56.190 UTC [fsblkstorage] indexBlock -> DEBU 2a1 Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23903] for tx number:[0] ID: [39c9b622afe3457926bd2f6a5ade166a0d139905e01268fb7cba4a9273bf6dc3] to blockNumTranNum index" +"2019-09-24 00:24:56.191 UTC [fsblkstorage] updateCheckpoint -> DEBU 2a2 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23949], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-09-24 00:24:56.192 UTC [pvtdatastorage] Commit -> DEBU 2a3 Committing private data for block [0]" +"2019-09-24 00:24:56.193 UTC [pvtdatastorage] Commit -> DEBU 2a4 Committed private data for block [0]" +"2019-09-24 00:24:56.193 UTC [pvtdatastorage] func1 -> DEBU 2a5 Purger started: Purging expired private data till block number [0]" +"2019-09-24 00:24:56.193 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 2a6 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" +"2019-09-24 00:24:56.193 UTC [leveldbhelper] GetIterator -> DEBU 2a7 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" +"2019-09-24 00:24:56.193 UTC [pvtdatastorage] func1 -> DEBU 2a8 Purger finished" +"2019-09-24 00:24:56.193 UTC [kvledger] CommitWithPvtData -> DEBU 2a9 [businesschannel] Committing block [0] transactions to state database" +"2019-09-24 00:24:56.193 UTC [lockbasedtxmgr] Commit -> DEBU 2aa lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 00:24:56.194 UTC [lockbasedtxmgr] Commit -> DEBU 2ab Committing updates to state database" +"2019-09-24 00:24:56.194 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2ac Preparing potential purge list working-set for expiringAtBlk [0]" +"2019-09-24 00:24:56.194 UTC [leveldbhelper] GetIterator -> DEBU 2ad Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" +"2019-09-24 00:24:56.194 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2ae No expiry entry found for expiringAtBlk [0]" +"2019-09-24 00:24:56.194 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2af Building the expiry schedules based on the update batch" +"2019-09-24 00:24:56.194 UTC [lockbasedtxmgr] Commit -> DEBU 2b0 Write lock acquired for committing updates to state database" +"2019-09-24 00:24:56.194 UTC [stateleveldb] ApplyUpdates -> DEBU 2b1 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-09-24 00:24:56.196 UTC [lockbasedtxmgr] Commit -> DEBU 2b2 Updates committed to state database and the write lock is released" +"2019-09-24 00:24:56.196 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2b3 Preparing potential purge list working-set for expiringAtBlk [1]" +"2019-09-24 00:24:56.196 UTC [leveldbhelper] GetIterator -> DEBU 2b4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" +"2019-09-24 00:24:56.196 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2b5 No expiry entry found for expiringAtBlk [1]" +"2019-09-24 00:24:56.196 UTC [lockbasedtxmgr] func1 -> DEBU 2b6 launched the background routine for preparing keys to purge with the next block" +"2019-09-24 00:24:56.196 UTC [kvledger] CommitWithPvtData -> DEBU 2b7 [businesschannel] Committing block [0] transactions to history database" +"2019-09-24 00:24:56.197 UTC [historyleveldb] Commit -> DEBU 2b8 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" +"2019-09-24 00:24:56.197 UTC [historyleveldb] Commit -> DEBU 2b9 Skipping transaction [0] since it is not an endorsement transaction" +"2019-09-24 00:24:56.198 UTC [historyleveldb] Commit -> DEBU 2ba Channel [businesschannel]: Updates committed to history database for blockNo [0]" +"2019-09-24 00:24:56.198 UTC [kvledger] CommitWithPvtData -> INFO 2bb [businesschannel] Committed block [0] with 1 transaction(s) in 21ms (state_validation=7ms block_and_pvtdata_commit=8ms state_commit=3ms) commitHash=[]" +"2019-09-24 00:24:56.200 UTC [ledgermgmt] CreateLedger -> INFO 2bc Created ledger [businesschannel] with genesis block" +"2019-09-24 00:24:56.200 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2bd constructing new query executor txid = [48f0ac2f-1880-4d1c-88cd-f90f833f4849]" +"2019-09-24 00:24:56.200 UTC [stateleveldb] GetState -> DEBU 2be GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" +"2019-09-24 00:24:56.200 UTC [lockbasedtxmgr] Done -> DEBU 2bf Done with transaction simulation / query execution [48f0ac2f-1880-4d1c-88cd-f90f833f4849]" +"2019-09-24 00:24:56.200 UTC [common.channelconfig] NewStandardValues -> DEBU 2c0 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:24:56.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c1 Processing field: HashingAlgorithm" +"2019-09-24 00:24:56.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c2 Processing field: BlockDataHashingStructure" +"2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c3 Processing field: OrdererAddresses" +"2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c4 Processing field: Consortium" +"2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c5 Processing field: Capabilities" +"2019-09-24 00:24:56.201 UTC [common.channelconfig] NewStandardValues -> DEBU 2c6 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c7 Processing field: ConsensusType" +"2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c8 Processing field: BatchSize" +"2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c9 Processing field: BatchTimeout" +"2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ca Processing field: KafkaBrokers" +"2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2cb Processing field: ChannelRestrictions" +"2019-09-24 00:24:56.201 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2cc Processing field: Capabilities" +"2019-09-24 00:24:56.202 UTC [common.channelconfig] NewStandardValues -> DEBU 2cd Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:24:56.202 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ce Processing field: Endpoints" +"2019-09-24 00:24:56.202 UTC [common.channelconfig] NewStandardValues -> DEBU 2cf Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:56.202 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2d0 Processing field: MSP" +"2019-09-24 00:24:56.202 UTC [common.channelconfig] validateMSP -> DEBU 2d1 Setting up MSP for org OrdererOrg" +"2019-09-24 00:24:56.202 UTC [msp] newBccspMsp -> DEBU 2d2 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:56.202 UTC [msp] New -> DEBU 2d3 Creating Cache-MSP instance" +"2019-09-24 00:24:56.202 UTC [msp] Setup -> DEBU 2d4 Setting up MSP instance OrdererMSP" +"2019-09-24 00:24:56.202 UTC [msp.identity] newIdentity -> DEBU 2d5 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -811,7 +1008,7 @@ DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-07-20 02:39:40.741 UTC [msp.identity] newIdentity -> DEBU 243 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:56.202 UTC [msp.identity] newIdentity -> DEBU 2d6 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w @@ -824,63 +1021,20 @@ A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== -----END CERTIFICATE-----" -"2019-07-20 02:39:40.741 UTC [msp] Validate -> DEBU 244 MSP OrdererMSP validating identity" -"2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 245 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: ACLs" -"2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: Capabilities" -"2019-07-20 02:39:40.742 UTC [common.channelconfig] NewStandardValues -> DEBU 248 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: AnchorPeers" -"2019-07-20 02:39:40.742 UTC [common.channelconfig] NewStandardValues -> DEBU 24a Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24b Processing field: MSP" -"2019-07-20 02:39:40.742 UTC [common.channelconfig] Validate -> DEBU 24c Anchor peers for org Org1MSP are " -"2019-07-20 02:39:40.742 UTC [common.channelconfig] validateMSP -> DEBU 24d Setting up MSP for org Org1MSP" -"2019-07-20 02:39:40.742 UTC [msp] newBccspMsp -> DEBU 24e Creating BCCSP-based MSP instance" -"2019-07-20 02:39:40.742 UTC [msp] New -> DEBU 24f Creating Cache-MSP instance" -"2019-07-20 02:39:40.742 UTC [msp] Setup -> DEBU 250 Setting up MSP instance Org1MSP" -"2019-07-20 02:39:40.742 UTC [msp.identity] newIdentity -> DEBU 251 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-07-20 02:39:40.742 UTC [msp.identity] newIdentity -> DEBU 252 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:39:40.743 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 253 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:40.743 UTC [msp] Validate -> DEBU 254 MSP Org1MSP validating identity" -"2019-07-20 02:39:40.743 UTC [msp] getCertificationChain -> DEBU 255 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:40.744 UTC [msp] hasOURole -> DEBU 256 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:40.744 UTC [msp] getCertificationChain -> DEBU 257 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:40.744 UTC [common.channelconfig] NewStandardValues -> DEBU 258 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:40.744 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: AnchorPeers" -"2019-07-20 02:39:40.744 UTC [common.channelconfig] NewStandardValues -> DEBU 25a Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:40.744 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25b Processing field: MSP" -"2019-07-20 02:39:40.744 UTC [common.channelconfig] Validate -> DEBU 25c Anchor peers for org Org2MSP are " -"2019-07-20 02:39:40.744 UTC [common.channelconfig] validateMSP -> DEBU 25d Setting up MSP for org Org2MSP" -"2019-07-20 02:39:40.744 UTC [msp] newBccspMsp -> DEBU 25e Creating BCCSP-based MSP instance" -"2019-07-20 02:39:40.744 UTC [msp] New -> DEBU 25f Creating Cache-MSP instance" -"2019-07-20 02:39:40.744 UTC [msp] Setup -> DEBU 260 Setting up MSP instance Org2MSP" -"2019-07-20 02:39:40.745 UTC [msp.identity] newIdentity -> DEBU 261 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:56.203 UTC [msp] Validate -> DEBU 2d7 MSP OrdererMSP validating identity" +"2019-09-24 00:24:56.203 UTC [common.channelconfig] NewStandardValues -> DEBU 2d8 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:24:56.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2d9 Processing field: ACLs" +"2019-09-24 00:24:56.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2da Processing field: Capabilities" +"2019-09-24 00:24:56.203 UTC [common.channelconfig] NewStandardValues -> DEBU 2db Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:24:56.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2dc Processing field: AnchorPeers" +"2019-09-24 00:24:56.203 UTC [common.channelconfig] NewStandardValues -> DEBU 2dd Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:56.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2de Processing field: MSP" +"2019-09-24 00:24:56.203 UTC [common.channelconfig] Validate -> DEBU 2df Anchor peers for org Org2MSP are " +"2019-09-24 00:24:56.203 UTC [common.channelconfig] validateMSP -> DEBU 2e0 Setting up MSP for org Org2MSP" +"2019-09-24 00:24:56.203 UTC [msp] newBccspMsp -> DEBU 2e1 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:56.203 UTC [msp] New -> DEBU 2e2 Creating Cache-MSP instance" +"2019-09-24 00:24:56.203 UTC [msp] Setup -> DEBU 2e3 Setting up MSP instance Org2MSP" +"2019-09-24 00:24:56.204 UTC [msp.identity] newIdentity -> DEBU 2e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -895,7 +1049,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-07-20 02:39:40.745 UTC [msp.identity] newIdentity -> DEBU 262 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:56.204 UTC [msp.identity] newIdentity -> DEBU 2e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -909,257 +1063,36 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-07-20 02:39:40.746 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 263 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:40.746 UTC [msp] Validate -> DEBU 264 MSP Org2MSP validating identity" -"2019-07-20 02:39:40.746 UTC [msp] getCertificationChain -> DEBU 265 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:40.746 UTC [msp] hasOURole -> DEBU 266 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:40.746 UTC [msp] getCertificationChain -> DEBU 267 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:40.746 UTC [msp] Setup -> DEBU 268 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:40.747 UTC [msp] Setup -> DEBU 269 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 275 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Readers for Channel/Application" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Writers for Channel/Application" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Admins for Channel/Application" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Admins for Channel" -"2019-07-20 02:39:40.748 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Readers for Channel" -"2019-07-20 02:39:40.748 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Writers for Channel" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:40.750 UTC [common.capabilities] Supported -> DEBU 2ad Application capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:40.750 UTC [common.capabilities] Supported -> DEBU 2ae Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:40.750 UTC [common.channelconfig] LogSanityChecks -> DEBU 2af As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:39:40.750 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b0 As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:39:40.750 UTC [policies] Manager -> DEBU 2b1 Manager Channel looking up path [Application]" -"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b2 Manager Channel has managers Orderer" -"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b3 Manager Channel has managers Application" -"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b4 Manager Channel/Application looking up path []" -"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b5 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b6 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b7 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b8 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b9 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2ba Manager Channel looking up path [Orderer]" -"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bb Manager Channel has managers Orderer" -"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bc Manager Channel has managers Application" -"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bd Manager Channel/Orderer looking up path []" -"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2be Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bf As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c0 As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c1 As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c2 As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:39:40.751 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2c3 Processing new config for channel businesschannel" -"2019-07-20 02:39:40.751 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2c4 Calling out because config was updated for channel businesschannel" -"2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c5 Org1MSP anchor peers: []" -"2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c6 Org2MSP anchor peers: []" -"2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c7 Creating state provider for chainID businesschannel" -"2019-07-20 02:39:40.751 UTC [gossip.gossip] JoinChan -> INFO 2c8 Joining gossip network of channel businesschannel with 2 organizations" -"2019-07-20 02:39:40.751 UTC [gossip.gossip] learnAnchorPeers -> INFO 2c9 No configured anchor peers of Org1MSP for channel businesschannel to learn about" -"2019-07-20 02:39:40.752 UTC [gossip.gossip] learnAnchorPeers -> INFO 2ca No configured anchor peers of Org2MSP for channel businesschannel to learn about" -"2019-07-20 02:39:40.752 UTC [peer] updateTrustedRoots -> DEBU 2cb Updating trusted root authorities for channel businesschannel" -"2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2cc updating root CAs for channel [businesschannel]" -"2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2cd adding app root CAs for MSP [Org2MSP]" -"2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2ce adding orderer root CAs for MSP [OrdererMSP]" -"2019-07-20 02:39:40.761 UTC [peer] buildTrustedRootsForChain -> DEBU 2cf adding app root CAs for MSP [Org1MSP]" -"2019-07-20 02:39:40.761 UTC [kvledger.util] CreateDirIfMissing -> DEBU 2d0 CreateDirIfMissing [/var/hyperledger/production/transientStore/]" -"2019-07-20 02:39:40.761 UTC [kvledger.util] logDirStatus -> DEBU 2d1 Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" -"2019-07-20 02:39:40.761 UTC [kvledger.util] logDirStatus -> DEBU 2d2 After creating dir - [/var/hyperledger/production/transientStore/] exists" -"2019-07-20 02:39:40.768 UTC [gossip.service] InitializeChannel -> DEBU 2d3 Creating state provider for chainID businesschannel" -"2019-07-20 02:39:40.769 UTC [msp] GetDefaultSigningIdentity -> DEBU 2d4 Obtaining default signing identity" -"2019-07-20 02:39:40.769 UTC [msp.identity] Sign -> DEBU 2d5 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " -"2019-07-20 02:39:40.769 UTC [msp.identity] Sign -> DEBU 2d6 Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " -"2019-07-20 02:39:40.770 UTC [gossip.privdata] NewReconciler -> DEBU 2d7 Private data reconciliation is enabled" -"2019-07-20 02:39:40.773 UTC [gossip.state] NewGossipStateProvider -> INFO 2d8 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" -"2019-07-20 02:39:40.773 UTC [gossip.state] NewGossipStateProvider -> DEBU 2d9 Updating gossip ledger height to 1" -"2019-07-20 02:39:40.774 UTC [msp] GetDefaultSigningIdentity -> DEBU 2da Obtaining default signing identity" -"2019-07-20 02:39:40.774 UTC [msp.identity] Sign -> DEBU 2db Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020801 " -"2019-07-20 02:39:40.774 UTC [msp.identity] Sign -> DEBU 2dc Sign: digest: F551A65D8BC362FE114BAD8311222B06D4E2289434A7C37C986E7EEDF1FC6EE9 " -"2019-07-20 02:39:40.774 UTC [gossip.service] InitializeChannel -> DEBU 2dd Delivery uses dynamic leader election mechanism, channel businesschannel" -"2019-07-20 02:39:40.775 UTC [peer] InitChain -> DEBU 2de Initializing channel businesschannel" -"2019-07-20 02:39:40.775 UTC [gossip.election] waitForMembershipStabilization -> DEBU 2df c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:39:40.775 UTC [gossip.election] handleMessages -> DEBU 2e0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:39:40.775 UTC [nodeCmd] func6 -> DEBU 2e1 Deploying system CC, for channel " -"2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e2 constructing new tx simulator" -"2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e3 constructing new tx simulator txid = [abaa1667-e7a4-43d3-835d-7b3659d3b26c]" -"2019-07-20 02:39:40.775 UTC [chaincode] Execute -> DEBU 2e4 Entry" -"2019-07-20 02:39:40.775 UTC [chaincode] handleMessage -> DEBU 2e5 [abaa1667] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:39:40.775 UTC [chaincode] Notify -> DEBU 2e6 [abaa1667] notifying Txid:abaa1667-e7a4-43d3-835d-7b3659d3b26c, channelID:businesschannel" -"2019-07-20 02:39:40.775 UTC [chaincode] Execute -> DEBU 2e7 Exit" -"2019-07-20 02:39:40.775 UTC [sccapi] deploySysCC -> INFO 2e8 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" -"2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] Done -> DEBU 2e9 Done with transaction simulation / query execution [abaa1667-e7a4-43d3-835d-7b3659d3b26c]" -"2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2ea constructing new tx simulator" -"2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2eb constructing new tx simulator txid = [d8dbf289-e043-4466-a93a-ddccfd1cdab0]" -"2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2ec Entry" -"2019-07-20 02:39:40.776 UTC [cscc] Init -> INFO 2ed Init CSCC" -"2019-07-20 02:39:40.776 UTC [chaincode] handleMessage -> DEBU 2ee [d8dbf289] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:39:40.776 UTC [chaincode] Notify -> DEBU 2ef [d8dbf289] notifying Txid:d8dbf289-e043-4466-a93a-ddccfd1cdab0, channelID:businesschannel" -"2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f0 Exit" -"2019-07-20 02:39:40.776 UTC [sccapi] deploySysCC -> INFO 2f1 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" -"2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] Done -> DEBU 2f2 Done with transaction simulation / query execution [d8dbf289-e043-4466-a93a-ddccfd1cdab0]" -"2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2f3 constructing new tx simulator" -"2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2f4 constructing new tx simulator txid = [84e60c06-9d91-4b37-949a-5b212baac3e1]" -"2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f5 Entry" -"2019-07-20 02:39:40.776 UTC [qscc] Init -> INFO 2f6 Init QSCC" -"2019-07-20 02:39:40.776 UTC [chaincode] handleMessage -> DEBU 2f7 [84e60c06] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:39:40.776 UTC [chaincode] Notify -> DEBU 2f8 [84e60c06] notifying Txid:84e60c06-9d91-4b37-949a-5b212baac3e1, channelID:businesschannel" -"2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f9 Exit" -"2019-07-20 02:39:40.776 UTC [sccapi] deploySysCC -> INFO 2fa system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" -"2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] Done -> DEBU 2fb Done with transaction simulation / query execution [84e60c06-9d91-4b37-949a-5b212baac3e1]" -"2019-07-20 02:39:40.777 UTC [sccapi] deploySysCC -> INFO 2fc system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" -"2019-07-20 02:39:40.777 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2fd constructing new query executor txid = [af545680-5b62-498c-8287-f67efc9651a5]" -"2019-07-20 02:39:40.777 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 2fe Returning []" -"2019-07-20 02:39:40.777 UTC [lockbasedtxmgr] Done -> DEBU 2ff Done with transaction simulation / query execution [af545680-5b62-498c-8287-f67efc9651a5]" -"2019-07-20 02:39:40.777 UTC [msp] GetDefaultSigningIdentity -> DEBU 300 Obtaining default signing identity" -"2019-07-20 02:39:40.777 UTC [msp.identity] Sign -> DEBU 301 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020801 " -"2019-07-20 02:39:40.777 UTC [msp.identity] Sign -> DEBU 302 Sign: digest: 3233FCE6D3C338F4FFECD94AEA4E2C6BC849ED2FC8E7A44AD209E1AC5F954AEE " -"2019-07-20 02:39:40.777 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 303 Listeners for channel businesschannel invoked" -"2019-07-20 02:39:40.777 UTC [chaincode] handleMessage -> DEBU 304 [67d06ae1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:39:40.777 UTC [chaincode] Notify -> DEBU 305 [67d06ae1] notifying Txid:67d06ae1fc1d7db4d5e0259c1748ab22cb470271d429d94645d1ca2a81fe1bb7, channelID:" -"2019-07-20 02:39:40.777 UTC [chaincode] Execute -> DEBU 306 Exit" -"2019-07-20 02:39:40.777 UTC [endorser] callChaincode -> INFO 307 [][67d06ae1] Exit chaincode: name:"cscc" (62ms)" -"2019-07-20 02:39:40.777 UTC [endorser] SimulateProposal -> DEBU 308 [][67d06ae1] Exit" -"2019-07-20 02:39:40.777 UTC [endorser] func1 -> DEBU 309 Exit: request from 172.18.0.9:58248" -"2019-07-20 02:39:40.777 UTC [comm.grpc.server] 1 -> INFO 30a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58248 grpc.code=OK grpc.call_duration=69.3708ms -"2019-07-20 02:39:40.783 UTC [grpc] infof -> DEBU 30b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:41.563 UTC [endorser] ProcessProposal -> DEBU 30c Entering: request from 172.18.0.9:58256" -"2019-07-20 02:39:41.563 UTC [protoutils] ValidateProposalMessage -> DEBU 30d ValidateProposalMessage starts for signed proposal 0xc00080fea0" -"2019-07-20 02:39:41.563 UTC [protoutils] validateChannelHeader -> DEBU 30e validateChannelHeader info: header type 3" -"2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 30f begin" -"2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 310 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 311 creator is valid" -"2019-07-20 02:39:41.565 UTC [msp.identity] Verify -> DEBU 312 Verify: digest = 00000000 5a 8e 92 6a 06 30 e7 d7 67 57 c7 c2 b4 f7 5e 8d |Z..j.0..gW....^.| -00000010 56 2c a1 d1 a0 82 bd 6d e4 ad fe 47 74 a3 d6 f8 |V,.....m...Gt...|" -"2019-07-20 02:39:41.565 UTC [msp.identity] Verify -> DEBU 313 Verify: sig = 00000000 30 45 02 21 00 ef f9 f7 e0 6f 5b 7d 18 20 1b 65 |0E.!.....o[}. .e| -00000010 07 1c 95 8e 49 c0 84 12 e2 34 b1 e4 a0 a0 1a b2 |....I....4......| -00000020 4e 6f a3 d2 4c 02 20 40 73 ea cd 61 16 06 b5 66 |No..L. @s..a...f| -00000030 7b 7c 72 a3 7b de 72 ec 4a 2f 66 51 59 2e 2a 27 |{|r.{.r.J/fQY.*'| -00000040 24 e3 64 2a 1b 25 7a |$.d*.%z|" -"2019-07-20 02:39:41.565 UTC [protoutils] checkSignatureFromCreator -> DEBU 314 exits successfully" -"2019-07-20 02:39:41.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 315 validateChaincodeProposalMessage starts for proposal 0xc0007f5730, header 0xc002fdc2d0" -"2019-07-20 02:39:41.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 316 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-07-20 02:39:41.566 UTC [endorser] preProcess -> DEBU 317 [][9eb44deb] processing txid: 9eb44debf4dbdeef1f516cd95779b3765395e4af9bee8f05601a789bd6c76e93" -"2019-07-20 02:39:41.566 UTC [endorser] SimulateProposal -> DEBU 318 [][9eb44deb] Entry chaincode: name:"cscc" " -"2019-07-20 02:39:41.567 UTC [endorser] callChaincode -> INFO 319 [][9eb44deb] Entry chaincode: name:"cscc" " -"2019-07-20 02:39:41.567 UTC [chaincode] Execute -> DEBU 31a Entry" -"2019-07-20 02:39:41.567 UTC [cscc] Invoke -> DEBU 31b Invoke function: GetChannels" -"2019-07-20 02:39:41.568 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 31c Checking if identity satisfies MEMBER role for Org1MSP" -"2019-07-20 02:39:41.568 UTC [msp] Validate -> DEBU 31d MSP Org1MSP validating identity" -"2019-07-20 02:39:41.569 UTC [msp.identity] Verify -> DEBU 31e Verify: digest = 00000000 5a 8e 92 6a 06 30 e7 d7 67 57 c7 c2 b4 f7 5e 8d |Z..j.0..gW....^.| -00000010 56 2c a1 d1 a0 82 bd 6d e4 ad fe 47 74 a3 d6 f8 |V,.....m...Gt...|" -"2019-07-20 02:39:41.569 UTC [msp.identity] Verify -> DEBU 31f Verify: sig = 00000000 30 45 02 21 00 ef f9 f7 e0 6f 5b 7d 18 20 1b 65 |0E.!.....o[}. .e| -00000010 07 1c 95 8e 49 c0 84 12 e2 34 b1 e4 a0 a0 1a b2 |....I....4......| -00000020 4e 6f a3 d2 4c 02 20 40 73 ea cd 61 16 06 b5 66 |No..L. @s..a...f| -00000030 7b 7c 72 a3 7b de 72 ec 4a 2f 66 51 59 2e 2a 27 |{|r.{.r.J/fQY.*'| -00000040 24 e3 64 2a 1b 25 7a |$.d*.%z|" -"2019-07-20 02:39:41.569 UTC [chaincode] handleMessage -> DEBU 320 [9eb44deb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:39:41.570 UTC [chaincode] Notify -> DEBU 321 [9eb44deb] notifying Txid:9eb44debf4dbdeef1f516cd95779b3765395e4af9bee8f05601a789bd6c76e93, channelID:" -"2019-07-20 02:39:41.570 UTC [chaincode] Execute -> DEBU 322 Exit" -"2019-07-20 02:39:41.570 UTC [endorser] callChaincode -> INFO 323 [][9eb44deb] Exit chaincode: name:"cscc" (3ms)" -"2019-07-20 02:39:41.570 UTC [endorser] SimulateProposal -> DEBU 324 [][9eb44deb] Exit" -"2019-07-20 02:39:41.571 UTC [endorser] func1 -> DEBU 325 Exit: request from 172.18.0.9:58256" -"2019-07-20 02:39:41.571 UTC [comm.grpc.server] 1 -> INFO 326 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58256 grpc.code=OK grpc.call_duration=8.7801ms -"2019-07-20 02:39:41.574 UTC [grpc] warningf -> DEBU 327 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58256: read: connection reset by peer" -"2019-07-20 02:39:41.574 UTC [grpc] infof -> DEBU 328 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:41.775 UTC [gossip.election] waitForMembershipStabilization -> DEBU 329 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" -"2019-07-20 02:39:41.775 UTC [gossip.election] leaderElection -> DEBU 32a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:39:41.776 UTC [gossip.election] propose -> DEBU 32b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:39:41.777 UTC [gossip.election] propose -> DEBU 32c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:39:41.777 UTC [msp] GetDefaultSigningIdentity -> DEBU 32d Obtaining default signing identity" -"2019-07-20 02:39:41.777 UTC [msp.identity] Sign -> DEBU 32e Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08ECCFA2A2ACA5BFD9151001 " -"2019-07-20 02:39:41.778 UTC [msp.identity] Sign -> DEBU 32f Sign: digest: FFE9E552AE6C7A4F25D53AB3CEFBB19AA21287B4B9B72999460F48E10242ADC6 " -"2019-07-20 02:39:41.778 UTC [gossip.election] waitForInterrupt -> DEBU 330 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:39:42.252 UTC [endorser] ProcessProposal -> DEBU 331 Entering: request from 172.18.0.9:58264" -"2019-07-20 02:39:42.252 UTC [protoutils] ValidateProposalMessage -> DEBU 332 ValidateProposalMessage starts for signed proposal 0xc002fb4870" -"2019-07-20 02:39:42.252 UTC [protoutils] validateChannelHeader -> DEBU 333 validateChannelHeader info: header type 3" -"2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 334 begin" -"2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 335 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 336 creator is valid" -"2019-07-20 02:39:42.253 UTC [msp.identity] Verify -> DEBU 337 Verify: digest = 00000000 9a 3d ec 0b 3e c4 0b 06 5e fa 35 50 17 74 3e 82 |.=..>...^.5P.t>.| -00000010 d3 c3 be d7 3e da 25 f6 3b 02 9b e8 84 33 7f 7b |....>.%.;....3.{|" -"2019-07-20 02:39:42.254 UTC [msp.identity] Verify -> DEBU 338 Verify: sig = 00000000 30 45 02 21 00 a9 61 f0 99 8a ce 43 14 e1 1c 16 |0E.!..a....C....| -00000010 26 07 5d cd 53 82 97 2d c1 68 cf 33 c8 5e cb 0e |&.].S..-.h.3.^..| -00000020 45 88 65 20 01 02 20 16 7f 13 06 df 6f 73 35 c7 |E.e .. .....os5.| -00000030 38 a8 a6 8b 1d bc 7f d7 6e 67 e6 a1 53 79 91 79 |8.......ng..Sy.y| -00000040 d2 8d 67 ea 7e f1 66 |..g.~.f|" -"2019-07-20 02:39:42.254 UTC [protoutils] checkSignatureFromCreator -> DEBU 339 exits successfully" -"2019-07-20 02:39:42.254 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33a validateChaincodeProposalMessage starts for proposal 0xc002a5b9d0, header 0xc002fb4c80" -"2019-07-20 02:39:42.254 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33b validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -"2019-07-20 02:39:42.255 UTC [endorser] preProcess -> DEBU 33c [][56ee910c] processing txid: 56ee910cdf0a549f26997065466a013cf178582da294f11ebf068c1c75a1c885" -"2019-07-20 02:39:42.255 UTC [endorser] SimulateProposal -> DEBU 33d [][56ee910c] Entry chaincode: name:"qscc" " -"2019-07-20 02:39:42.255 UTC [endorser] callChaincode -> INFO 33e [][56ee910c] Entry chaincode: name:"qscc" " -"2019-07-20 02:39:42.256 UTC [chaincode] Execute -> DEBU 33f Entry" -"2019-07-20 02:39:42.256 UTC [qscc] Invoke -> DEBU 340 Invoke function: GetChainInfo on chain: businesschannel" -"2019-07-20 02:39:42.256 UTC [aclmgmt] CheckACL -> DEBU 341 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -"2019-07-20 02:39:42.257 UTC [aclmgmt] CheckACL -> DEBU 342 acl check(/Channel/Application/Readers)" -"2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 343 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 344 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 345 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:42.258 UTC [msp] DeserializeIdentity -> DEBU 346 Obtaining identity" -"2019-07-20 02:39:42.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 347 Obtaining default signing identity" -"2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 348 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151008 " -"2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 349 Sign: digest: B47A6DBF8403EA2183512FE112A860C1DDCAD57DAF43878D704F7766BFEE800D " -"2019-07-20 02:39:42.263 UTC [msp] GetDefaultSigningIdentity -> DEBU 34a Obtaining default signing identity" -"2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 34b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:42.264 UTC [msp.identity] Sign -> DEBU 34c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:42.264 UTC [gossip.discovery] periodicalSendAlive -> DEBU 34d Sleeping 5s" -"2019-07-20 02:39:42.264 UTC [msp.identity] newIdentity -> DEBU 34e Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:56.204 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2e6 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:24:56.204 UTC [msp] Validate -> DEBU 2e7 MSP Org2MSP validating identity" +"2019-09-24 00:24:56.204 UTC [msp] getCertificationChain -> DEBU 2e8 MSP Org2MSP getting certification chain" +"2019-09-24 00:24:56.205 UTC [msp] hasOURole -> DEBU 2e9 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:24:56.205 UTC [msp] getCertificationChain -> DEBU 2ea MSP Org2MSP getting certification chain" +"2019-09-24 00:24:56.205 UTC [common.channelconfig] NewStandardValues -> DEBU 2eb Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:24:56.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ec Processing field: AnchorPeers" +"2019-09-24 00:24:56.205 UTC [common.channelconfig] NewStandardValues -> DEBU 2ed Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:24:56.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ee Processing field: MSP" +"2019-09-24 00:24:56.205 UTC [common.channelconfig] Validate -> DEBU 2ef Anchor peers for org Org1MSP are " +"2019-09-24 00:24:56.205 UTC [common.channelconfig] validateMSP -> DEBU 2f0 Setting up MSP for org Org1MSP" +"2019-09-24 00:24:56.205 UTC [msp] newBccspMsp -> DEBU 2f1 Creating BCCSP-based MSP instance" +"2019-09-24 00:24:56.205 UTC [msp] New -> DEBU 2f2 Creating Cache-MSP instance" +"2019-09-24 00:24:56.205 UTC [msp] Setup -> DEBU 2f3 Setting up MSP instance Org1MSP" +"2019-09-24 00:24:56.205 UTC [msp.identity] newIdentity -> DEBU 2f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-09-24 00:24:56.205 UTC [msp.identity] newIdentity -> DEBU 2f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -1173,166 +1106,345 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:42.265 UTC [cauthdsl] func1 -> DEBU 34f 0xc003023250 gate 1563590382265478300 evaluation starts" -"2019-07-20 02:39:42.265 UTC [cauthdsl] func2 -> DEBU 350 0xc003023250 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:42.265 UTC [cauthdsl] func2 -> DEBU 351 0xc003023250 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:42.266 UTC [cauthdsl] func2 -> DEBU 352 0xc003023250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-07-20 02:39:42.266 UTC [cauthdsl] func2 -> DEBU 353 0xc003023250 principal evaluation fails" -"2019-07-20 02:39:42.266 UTC [cauthdsl] func1 -> DEBU 355 0xc003023250 gate 1563590382265478300 evaluation fails" -"2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 356 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 357 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 358 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:42.266 UTC [gossip.comm] Send -> DEBU 354 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:42.268 UTC [cauthdsl] func1 -> DEBU 359 0xc00303e3d0 gate 1563590382267987800 evaluation starts" -"2019-07-20 02:39:42.268 UTC [cauthdsl] func2 -> DEBU 35a 0xc00303e3d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:42.268 UTC [cauthdsl] func2 -> DEBU 35b 0xc00303e3d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:42.268 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 35c Checking if identity satisfies MEMBER role for Org1MSP" -"2019-07-20 02:39:42.269 UTC [msp] Validate -> DEBU 35d MSP Org1MSP validating identity" -"2019-07-20 02:39:42.269 UTC [msp] getCertificationChain -> DEBU 35e MSP Org1MSP getting certification chain" -"2019-07-20 02:39:42.269 UTC [cauthdsl] func2 -> DEBU 35f 0xc00303e3d0 principal matched by identity 0" -"2019-07-20 02:39:42.270 UTC [msp.identity] Verify -> DEBU 360 Verify: digest = 00000000 9a 3d ec 0b 3e c4 0b 06 5e fa 35 50 17 74 3e 82 |.=..>...^.5P.t>.| -00000010 d3 c3 be d7 3e da 25 f6 3b 02 9b e8 84 33 7f 7b |....>.%.;....3.{|" -"2019-07-20 02:39:42.270 UTC [msp.identity] Verify -> DEBU 361 Verify: sig = 00000000 30 45 02 21 00 a9 61 f0 99 8a ce 43 14 e1 1c 16 |0E.!..a....C....| -00000010 26 07 5d cd 53 82 97 2d c1 68 cf 33 c8 5e cb 0e |&.].S..-.h.3.^..| -00000020 45 88 65 20 01 02 20 16 7f 13 06 df 6f 73 35 c7 |E.e .. .....os5.| -00000030 38 a8 a6 8b 1d bc 7f d7 6e 67 e6 a1 53 79 91 79 |8.......ng..Sy.y| -00000040 d2 8d 67 ea 7e f1 66 |..g.~.f|" -"2019-07-20 02:39:42.270 UTC [cauthdsl] func2 -> DEBU 362 0xc00303e3d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:42.270 UTC [cauthdsl] func1 -> DEBU 363 0xc00303e3d0 gate 1563590382267987800 evaluation succeeds" -"2019-07-20 02:39:42.270 UTC [policies] Evaluate -> DEBU 364 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 366 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 367 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:42.272 UTC [chaincode] handleMessage -> DEBU 368 [56ee910c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:39:42.272 UTC [chaincode] Notify -> DEBU 369 [56ee910c] notifying Txid:56ee910cdf0a549f26997065466a013cf178582da294f11ebf068c1c75a1c885, channelID:" -"2019-07-20 02:39:42.272 UTC [chaincode] Execute -> DEBU 36a Exit" -"2019-07-20 02:39:42.272 UTC [endorser] callChaincode -> INFO 36b [][56ee910c] Exit chaincode: name:"qscc" (17ms)" -"2019-07-20 02:39:42.273 UTC [endorser] SimulateProposal -> DEBU 36c [][56ee910c] Exit" -"2019-07-20 02:39:42.273 UTC [endorser] func1 -> DEBU 36d Exit: request from 172.18.0.9:58264" -"2019-07-20 02:39:42.273 UTC [comm.grpc.server] 1 -> INFO 36e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58264 grpc.code=OK grpc.call_duration=21.8975ms -"2019-07-20 02:39:42.268 UTC [gossip.comm] sendToEndpoint -> DEBU 36f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:39:42.274 UTC [gossip.comm] sendToEndpoint -> DEBU 370 Exiting" -"2019-07-20 02:39:42.277 UTC [grpc] infof -> DEBU 371 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:42.394 UTC [gossip.gossip] handleMessage -> DEBU 372 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:39:42.395 UTC [gossip.gossip] handleMessage -> DEBU 373 Exiting" -"2019-07-20 02:39:42.395 UTC [gossip.discovery] handleMsgFromComm -> DEBU 374 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:39:42.396 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 375 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:42.397 UTC [msp.identity] Verify -> DEBU 376 Verify: digest = 00000000 a5 1b 09 b7 08 b7 9c 03 2f a6 f0 6b 53 c6 c5 9c |......../..kS...| -00000010 41 51 dd 5c e7 c0 ad 26 1c 06 3b 81 de 3d 0e a0 |AQ.\...&..;..=..|" -"2019-07-20 02:39:42.398 UTC [msp.identity] Verify -> DEBU 377 Verify: sig = 00000000 30 44 02 20 5d 74 cf 2c 50 bf 53 12 05 9d ee c8 |0D. ]t.,P.S.....| -00000010 ef 87 fd 42 b6 dc 2b 60 e1 5f 7e 88 57 7f c5 11 |...B..+`._~.W...| -00000020 9a b1 05 dd 02 20 23 59 85 7e e0 d1 cd 6a e1 0f |..... #Y.~...j..| -00000030 be 9a 3b 26 28 cc 60 b1 ec 74 3e ef ae 9b 1f 8e |..;&(.`..t>.....| -00000040 5b ba d6 c3 03 a6 |[.....|" -"2019-07-20 02:39:42.400 UTC [msp.identity] Verify -> DEBU 378 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-09-24 00:24:56.206 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2f6 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:24:56.206 UTC [msp] Validate -> DEBU 2f7 MSP Org1MSP validating identity" +"2019-09-24 00:24:56.206 UTC [msp] getCertificationChain -> DEBU 2f8 MSP Org1MSP getting certification chain" +"2019-09-24 00:24:56.206 UTC [msp] hasOURole -> DEBU 2f9 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:24:56.206 UTC [msp] getCertificationChain -> DEBU 2fa MSP Org1MSP getting certification chain" +"2019-09-24 00:24:56.207 UTC [msp] Setup -> DEBU 2fb Setting up the MSP manager (3 msps)" +"2019-09-24 00:24:56.207 UTC [msp] Setup -> DEBU 2fc MSP manager setup complete, setup 3 msps" +"2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 2fd Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 2fe Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 2ff Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 300 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 301 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 302 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 303 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 304 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 305 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:24:56.207 UTC [policies] NewManagerImpl -> DEBU 306 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 307 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 308 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 309 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 30a Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 30b Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:24:56.208 UTC [policies] NewManagerImpl -> DEBU 30c Proposed new policy Admins for Channel/Application" +"2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 30d Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 30e Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 30f Proposed new policy Readers for Channel/Application" +"2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 310 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 311 Proposed new policy Writers for Channel" +"2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 312 Proposed new policy Admins for Channel" +"2019-09-24 00:24:56.209 UTC [policies] NewManagerImpl -> DEBU 313 Proposed new policy Readers for Channel" +"2019-09-24 00:24:56.209 UTC [common.configtx] addToMap -> DEBU 314 Adding to config map: [Group] /Channel" +"2019-09-24 00:24:56.209 UTC [common.configtx] addToMap -> DEBU 315 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 316 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 317 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 318 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 319 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31b Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31c Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31d Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 31f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 320 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 321 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:24:56.210 UTC [common.configtx] addToMap -> DEBU 322 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 323 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 324 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 325 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 326 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 327 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:24:56.211 UTC [common.configtx] addToMap -> DEBU 328 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 329 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32b Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32e Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 32f Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 330 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 331 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 332 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 333 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 334 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:24:56.216 UTC [common.configtx] addToMap -> DEBU 335 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 336 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 337 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 338 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 339 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33a Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33b Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33d Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33e Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:24:56.217 UTC [common.configtx] addToMap -> DEBU 33f Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:24:56.217 UTC [common.capabilities] Supported -> DEBU 340 Application capability V1_4_2 is supported and is enabled" +"2019-09-24 00:24:56.217 UTC [common.capabilities] Supported -> DEBU 341 Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:24:56.217 UTC [common.channelconfig] LogSanityChecks -> DEBU 342 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:24:56.217 UTC [common.channelconfig] LogSanityChecks -> DEBU 343 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:24:56.217 UTC [policies] Manager -> DEBU 344 Manager Channel looking up path [Application]" +"2019-09-24 00:24:56.217 UTC [policies] Manager -> DEBU 345 Manager Channel has managers Orderer" +"2019-09-24 00:24:56.217 UTC [policies] Manager -> DEBU 346 Manager Channel has managers Application" +"2019-09-24 00:24:56.217 UTC [policies] Manager -> DEBU 347 Manager Channel/Application looking up path []" +"2019-09-24 00:24:56.217 UTC [policies] Manager -> DEBU 348 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 349 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 34a As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 34b As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 34c As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 34d Manager Channel looking up path [Orderer]" +"2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 34e Manager Channel has managers Orderer" +"2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 34f Manager Channel has managers Application" +"2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 350 Manager Channel/Orderer looking up path []" +"2019-09-24 00:24:56.218 UTC [policies] Manager -> DEBU 351 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 352 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 353 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 354 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:24:56.218 UTC [common.channelconfig] LogSanityChecks -> DEBU 355 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:24:56.218 UTC [gossip.service] ProcessConfigUpdate -> DEBU 356 Processing new config for channel businesschannel" +"2019-09-24 00:24:56.218 UTC [gossip.service] ProcessConfigUpdate -> DEBU 357 Calling out because config was updated for channel businesschannel" +"2019-09-24 00:24:56.218 UTC [gossip.service] updateAnchors -> DEBU 358 Org2MSP anchor peers: []" +"2019-09-24 00:24:56.218 UTC [gossip.service] updateAnchors -> DEBU 359 Org1MSP anchor peers: []" +"2019-09-24 00:24:56.218 UTC [gossip.service] updateAnchors -> DEBU 35a Creating state provider for chainID businesschannel" +"2019-09-24 00:24:56.218 UTC [gossip.gossip] JoinChan -> INFO 35b Joining gossip network of channel businesschannel with 2 organizations" +"2019-09-24 00:24:56.219 UTC [gossip.gossip] learnAnchorPeers -> INFO 35c No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-09-24 00:24:56.219 UTC [gossip.gossip] learnAnchorPeers -> INFO 35d No configured anchor peers of Org1MSP for channel businesschannel to learn about" +"2019-09-24 00:24:56.219 UTC [peer] updateTrustedRoots -> DEBU 35e Updating trusted root authorities for channel businesschannel" +"2019-09-24 00:24:56.259 UTC [peer] buildTrustedRootsForChain -> DEBU 35f updating root CAs for channel [businesschannel]" +"2019-09-24 00:24:56.259 UTC [peer] buildTrustedRootsForChain -> DEBU 360 adding app root CAs for MSP [Org2MSP]" +"2019-09-24 00:24:56.259 UTC [peer] buildTrustedRootsForChain -> DEBU 361 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 00:24:56.259 UTC [peer] buildTrustedRootsForChain -> DEBU 362 adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 00:24:56.260 UTC [kvledger.util] CreateDirIfMissing -> DEBU 363 CreateDirIfMissing [/var/hyperledger/production/transientStore/]" +"2019-09-24 00:24:56.260 UTC [kvledger.util] logDirStatus -> DEBU 364 Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" +"2019-09-24 00:24:56.260 UTC [kvledger.util] logDirStatus -> DEBU 365 After creating dir - [/var/hyperledger/production/transientStore/] exists" +"2019-09-24 00:24:56.279 UTC [gossip.service] InitializeChannel -> DEBU 366 Creating state provider for chainID businesschannel" +"2019-09-24 00:24:56.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 367 Obtaining default signing identity" +"2019-09-24 00:24:56.282 UTC [msp.identity] Sign -> DEBU 368 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +"2019-09-24 00:24:56.282 UTC [msp.identity] Sign -> DEBU 369 Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +"2019-09-24 00:24:56.283 UTC [gossip.privdata] NewReconciler -> DEBU 36a Private data reconciliation is enabled" +"2019-09-24 00:24:56.293 UTC [gossip.state] NewGossipStateProvider -> INFO 36b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +"2019-09-24 00:24:56.293 UTC [gossip.state] NewGossipStateProvider -> DEBU 36c Updating gossip ledger height to 1" +"2019-09-24 00:24:56.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 36d Obtaining default signing identity" +"2019-09-24 00:24:56.293 UTC [msp.identity] Sign -> DEBU 36e Sign: plaintext: 18057A5E1214089096D4ACDE83CEE315...624D0F542C442AB5FE8C65C22A020801 " +"2019-09-24 00:24:56.294 UTC [msp.identity] Sign -> DEBU 36f Sign: digest: CDBF0E4D892BE4EA1D91E89CAF7539ECBBE09068EF43A7AF159D2E81B8E765A3 " +"2019-09-24 00:24:56.294 UTC [gossip.service] InitializeChannel -> DEBU 370 Delivery uses dynamic leader election mechanism, channel businesschannel" +"2019-09-24 00:24:56.300 UTC [peer] InitChain -> DEBU 371 Initializing channel businesschannel" +"2019-09-24 00:24:56.300 UTC [nodeCmd] func6 -> DEBU 372 Deploying system CC, for channel " +"2019-09-24 00:24:56.301 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 373 constructing new tx simulator" +"2019-09-24 00:24:56.301 UTC [gossip.election] waitForMembershipStabilization -> DEBU 374 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:24:56.301 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 375 constructing new tx simulator txid = [c7763c86-8c8c-4363-8b44-c38cd2a22eae]" +"2019-09-24 00:24:56.301 UTC [chaincode] Execute -> DEBU 376 Entry" +"2019-09-24 00:24:56.301 UTC [gossip.election] handleMessages -> DEBU 377 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:24:56.301 UTC [chaincode] handleMessage -> DEBU 378 [c7763c86] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:24:56.301 UTC [chaincode] Notify -> DEBU 379 [c7763c86] notifying Txid:c7763c86-8c8c-4363-8b44-c38cd2a22eae, channelID:businesschannel" +"2019-09-24 00:24:56.301 UTC [chaincode] Execute -> DEBU 37a Exit" +"2019-09-24 00:24:56.301 UTC [sccapi] deploySysCC -> INFO 37b system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-09-24 00:24:56.301 UTC [lockbasedtxmgr] Done -> DEBU 37c Done with transaction simulation / query execution [c7763c86-8c8c-4363-8b44-c38cd2a22eae]" +"2019-09-24 00:24:56.301 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 37d constructing new tx simulator" +"2019-09-24 00:24:56.301 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 37e constructing new tx simulator txid = [e34b8cf0-f66b-4a31-91fc-89eb05bafd3a]" +"2019-09-24 00:24:56.301 UTC [chaincode] Execute -> DEBU 37f Entry" +"2019-09-24 00:24:56.301 UTC [cscc] Init -> INFO 380 Init CSCC" +"2019-09-24 00:24:56.301 UTC [chaincode] handleMessage -> DEBU 381 [e34b8cf0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:24:56.301 UTC [chaincode] Notify -> DEBU 382 [e34b8cf0] notifying Txid:e34b8cf0-f66b-4a31-91fc-89eb05bafd3a, channelID:businesschannel" +"2019-09-24 00:24:56.301 UTC [chaincode] Execute -> DEBU 383 Exit" +"2019-09-24 00:24:56.301 UTC [sccapi] deploySysCC -> INFO 384 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-09-24 00:24:56.302 UTC [lockbasedtxmgr] Done -> DEBU 385 Done with transaction simulation / query execution [e34b8cf0-f66b-4a31-91fc-89eb05bafd3a]" +"2019-09-24 00:24:56.302 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 386 constructing new tx simulator" +"2019-09-24 00:24:56.302 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 387 constructing new tx simulator txid = [b16845d8-0a86-43cf-841d-c93aea063518]" +"2019-09-24 00:24:56.302 UTC [chaincode] Execute -> DEBU 388 Entry" +"2019-09-24 00:24:56.302 UTC [qscc] Init -> INFO 389 Init QSCC" +"2019-09-24 00:24:56.302 UTC [chaincode] handleMessage -> DEBU 38a [b16845d8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:24:56.302 UTC [chaincode] Notify -> DEBU 38b [b16845d8] notifying Txid:b16845d8-0a86-43cf-841d-c93aea063518, channelID:businesschannel" +"2019-09-24 00:24:56.302 UTC [chaincode] Execute -> DEBU 38c Exit" +"2019-09-24 00:24:56.302 UTC [sccapi] deploySysCC -> INFO 38d system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-09-24 00:24:56.303 UTC [lockbasedtxmgr] Done -> DEBU 38e Done with transaction simulation / query execution [b16845d8-0a86-43cf-841d-c93aea063518]" +"2019-09-24 00:24:56.303 UTC [sccapi] deploySysCC -> INFO 38f system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +"2019-09-24 00:24:56.303 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 390 constructing new query executor txid = [1d660307-ec2b-42bc-81aa-c872e85d55c1]" +"2019-09-24 00:24:56.303 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 391 Returning []" +"2019-09-24 00:24:56.303 UTC [lockbasedtxmgr] Done -> DEBU 392 Done with transaction simulation / query execution [1d660307-ec2b-42bc-81aa-c872e85d55c1]" +"2019-09-24 00:24:56.304 UTC [msp] GetDefaultSigningIdentity -> DEBU 393 Obtaining default signing identity" +"2019-09-24 00:24:56.304 UTC [msp.identity] Sign -> DEBU 394 Sign: plaintext: 18057A5E1214089096D4ACDE83CEE315...624D0F542C442AB5FE8C65C22A020801 " +"2019-09-24 00:24:56.304 UTC [msp.identity] Sign -> DEBU 395 Sign: digest: 01C383F115D3F7901055D717429985B97166F1685AE0216205125737DD26B1AB " +"2019-09-24 00:24:56.304 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 396 Listeners for channel businesschannel invoked" +"2019-09-24 00:24:56.304 UTC [chaincode] handleMessage -> DEBU 397 [a328fb8f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:24:56.305 UTC [chaincode] Notify -> DEBU 398 [a328fb8f] notifying Txid:a328fb8fd28c939df2f0a906857e3549742ae0eb97293f619422ff975e8aa170, channelID:" +"2019-09-24 00:24:56.305 UTC [chaincode] Execute -> DEBU 399 Exit" +"2019-09-24 00:24:56.305 UTC [endorser] callChaincode -> INFO 39a [][a328fb8f] Exit chaincode: name:"cscc" (220ms)" +"2019-09-24 00:24:56.305 UTC [endorser] SimulateProposal -> DEBU 39b [][a328fb8f] Exit" +"2019-09-24 00:24:56.305 UTC [endorser] func1 -> DEBU 39c Exit: request from 172.18.0.9:50574" +"2019-09-24 00:24:56.305 UTC [comm.grpc.server] 1 -> INFO 39d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50574 grpc.code=OK grpc.call_duration=226.4556ms +"2019-09-24 00:24:56.318 UTC [grpc] infof -> DEBU 39e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:24:57.301 UTC [gossip.election] waitForMembershipStabilization -> DEBU 39f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" +"2019-09-24 00:24:57.301 UTC [gossip.election] leaderElection -> DEBU 3a0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:24:57.301 UTC [gossip.election] propose -> DEBU 3a1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:24:57.301 UTC [gossip.election] propose -> DEBU 3a2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:24:57.301 UTC [msp] GetDefaultSigningIdentity -> DEBU 3a3 Obtaining default signing identity" +"2019-09-24 00:24:57.301 UTC [msp.identity] Sign -> DEBU 3a4 Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08F4A5F9D0DE83CEE3151001 " +"2019-09-24 00:24:57.302 UTC [msp.identity] Sign -> DEBU 3a5 Sign: digest: 6BE18C4F20FF32A305E27B45001C3F2AFE73594D2FD7CF7E43E3C1A357D97099 " +"2019-09-24 00:24:57.302 UTC [gossip.election] waitForInterrupt -> DEBU 3a6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:24:57.707 UTC [gossip.gossip] handleMessage -> DEBU 3a7 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:57.707 UTC [gossip.pull] HandleMessage -> DEBU 3a8 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:57.707 UTC [gossip.pull] SendDigest -> DEBU 3a9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:24:57.707 UTC [gossip.gossip] handleMessage -> DEBU 3aa Exiting" +"2019-09-24 00:24:57.749 UTC [gossip.gossip] handleMessage -> DEBU 3ab Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\014" signature:"0E\002!\000\332\3470\350o\310\256U\256p\202\022\343\235\327\314\305a\230\332\037h\317\307Xi\367[\316\313\236^\002 \005\017\340\274\214Q\\\001\313\247\256\364\2363F\032h\202s\211\322\036\225&o>3\267\372\003\234\244" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:24:57.751 UTC [gossip.gossip] handleMessage -> DEBU 3ac Exiting" +"2019-09-24 00:24:57.751 UTC [gossip.gossip] handleMessage -> DEBU 3ad Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:57.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ae Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\014" signature:"0E\002!\000\332\3470\350o\310\256U\256p\202\022\343\235\327\314\305a\230\332\037h\317\307Xi\367[\316\313\236^\002 \005\017\340\274\214Q\\\001\313\247\256\364\2363F\032h\202s\211\322\036\225&o>3\267\372\003\234\244" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:24:57.754 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3af Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:24:57.756 UTC [msp.identity] Verify -> DEBU 3b0 Verify: digest = 00000000 e1 d8 17 cb 59 51 9c ca f6 7e 3f a2 f7 c6 27 3a |....YQ...~?...':| +00000010 55 e0 e6 07 e6 d3 79 67 0f f9 93 a1 24 ed 81 5a |U.....yg....$..Z|" +"2019-09-24 00:24:57.756 UTC [msp.identity] Verify -> DEBU 3b1 Verify: sig = 00000000 30 45 02 21 00 da e7 30 e8 6f c8 ae 55 ae 70 82 |0E.!...0.o..U.p.| +00000010 12 e3 9d d7 cc c5 61 98 da 1f 68 cf c7 58 69 f7 |......a...h..Xi.| +00000020 5b ce cb 9e 5e 02 20 05 0f e0 bc 8c 51 5c 01 cb |[...^. .....Q\..| +00000030 a7 ae f4 9e 33 46 1a 68 82 73 89 d2 1e 95 26 6f |....3F.h.s....&o| +00000040 3e 33 b7 fa 03 9c a4 |>3.....|" +"2019-09-24 00:24:57.761 UTC [msp.identity] Verify -> DEBU 3b2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:39:42.401 UTC [msp.identity] Verify -> DEBU 379 Verify: sig = 00000000 30 45 02 21 00 9e d3 4f 5e 97 be b4 1c 21 7f bc |0E.!...O^....!..| -00000010 f1 e3 02 81 c6 d8 12 53 79 d2 6f ae e8 19 b5 8b |.......Sy.o.....| -00000020 2c ce e9 54 0e 02 20 2e ff 04 83 19 c1 c8 2e c8 |,..T.. .........| -00000030 fd ea e6 14 09 64 bc 58 44 e4 e4 b1 28 69 a9 80 |.....d.XD...(i..| -00000040 83 24 e6 0b b6 c8 ce |.$.....|" -"2019-07-20 02:39:42.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 37a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:39:42.403 UTC [gossip.discovery] learnExistingMembers -> DEBU 37b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:39:42.403 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:42.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:42.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 37e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:42.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 37f Exiting" -"2019-07-20 02:39:42.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 380 Exiting" -"2019-07-20 02:39:42.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381 Exiting" -"2019-07-20 02:39:44.269 UTC [gossip.pull] Hello -> DEBU 382 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:39:44.269 UTC [gossip.comm] Send -> DEBU 383 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:44.269 UTC [gossip.comm] sendToEndpoint -> DEBU 384 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.270 UTC [gossip.comm] sendToEndpoint -> DEBU 385 Exiting" -"2019-07-20 02:39:44.271 UTC [gossip.gossip] handleMessage -> DEBU 386 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.272 UTC [gossip.pull] HandleMessage -> DEBU 387 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.272 UTC [gossip.gossip] handleMessage -> DEBU 388 Exiting" -"2019-07-20 02:39:44.296 UTC [msp] GetDefaultSigningIdentity -> DEBU 389 Obtaining default signing identity" -"2019-07-20 02:39:44.297 UTC [msp.identity] Sign -> DEBU 38a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151009 " -"2019-07-20 02:39:44.298 UTC [msp.identity] Sign -> DEBU 38b Sign: digest: 038845EEB47CE4E506D2E41DBA8A6D4A6F17B929678EF07AE731EBED65C98BB5 " -"2019-07-20 02:39:44.299 UTC [msp] GetDefaultSigningIdentity -> DEBU 38c Obtaining default signing identity" -"2019-07-20 02:39:44.299 UTC [msp.identity] Sign -> DEBU 38d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:44.299 UTC [msp.identity] Sign -> DEBU 38e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:44.300 UTC [gossip.comm] Send -> DEBU 38f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:44.301 UTC [gossip.comm] sendToEndpoint -> DEBU 390 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.301 UTC [gossip.comm] sendToEndpoint -> DEBU 391 Exiting" -"2019-07-20 02:39:44.304 UTC [gossip.gossip] handleMessage -> DEBU 392 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.304 UTC [gossip.gossip] handleMessage -> DEBU 393 Exiting" -"2019-07-20 02:39:44.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 394 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.304 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 395 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:44.304 UTC [msp.identity] Verify -> DEBU 396 Verify: digest = 00000000 03 88 45 ee b4 7c e4 e5 06 d2 e4 1d ba 8a 6d 4a |..E..|........mJ| -00000010 6f 17 b9 29 67 8e f0 7a e7 31 eb ed 65 c9 8b b5 |o..)g..z.1..e...|" -"2019-07-20 02:39:44.304 UTC [msp.identity] Verify -> DEBU 397 Verify: sig = 00000000 30 44 02 20 2c 5e 12 39 e4 8a 65 db db 52 be 9a |0D. ,^.9..e..R..| -00000010 85 a7 f2 10 0c 0b 84 81 f7 70 a1 5a 46 1d 97 f5 |.........p.ZF...| -00000020 ba c0 06 eb 02 20 4b 56 d0 df 22 55 7b 8e ba ce |..... KV.."U{...| -00000030 05 41 7d 81 85 ac bf 95 33 a8 cd f7 1c 59 64 bc |.A}.....3....Yd.| -00000040 75 1b 07 a1 6b 5b |u...k[|" -"2019-07-20 02:39:44.305 UTC [msp.identity] Verify -> DEBU 398 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-09-24 00:24:57.761 UTC [msp.identity] Verify -> DEBU 3b3 Verify: sig = 00000000 30 44 02 20 76 78 78 ba 38 24 c4 dc bd 40 c5 2f |0D. vxx.8$...@./| +00000010 af 40 a1 28 2f d4 82 ca 6a 6d dd 5e c4 99 93 49 |.@.(/...jm.^...I| +00000020 54 f0 cd 53 02 20 3f 1c ec e4 9c 28 84 4a ed 9a |T..S. ?....(.J..| +00000030 82 18 c5 8f a6 22 20 0d d1 9d f0 8b 03 7c b9 33 |....." ......|.3| +00000040 4e 16 6c e6 f8 c5 |N.l...|" +"2019-09-24 00:24:57.762 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b4 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:57.762 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:24:57.762 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b6 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:24:57.762 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b7 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:24:57.765 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b8 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:24:57.765 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b9 Exiting" +"2019-09-24 00:24:57.765 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ba Exiting" +"2019-09-24 00:24:57.765 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bb Exiting" +"2019-09-24 00:24:57.766 UTC [gossip.discovery] sendMemResponse -> DEBU 3bc Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:24:57.766 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bd Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:57.766 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3be Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:24:57.766 UTC [gossip.comm] Send -> DEBU 3bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:57.766 UTC [gossip.discovery] sendMemResponse -> DEBU 3c0 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\014" signature:"0E\002!\000\332\3470\350o\310\256U\256p\202\022\343\235\327\314\305a\230\332\037h\317\307Xi\367[\316\313\236^\002 \005\017\340\274\214Q\\\001\313\247\256\364\2363F\032h\202s\211\322\036\225&o>3\267\372\003\234\244" secret_envelope: > alive: > " +"2019-09-24 00:24:57.766 UTC [gossip.comm] sendToEndpoint -> DEBU 3c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-09-24 00:24:57.766 UTC [msp.identity] Verify -> DEBU 3c2 Verify: digest = 00000000 c0 f3 40 c1 e3 eb 4c 5c b7 7d ba 58 3d 1a 95 f7 |..@...L\.}.X=...| +00000010 76 aa e7 08 15 c6 d7 14 ad 78 21 f4 ab 2e 0a 05 |v........x!.....|" +"2019-09-24 00:24:57.766 UTC [gossip.comm] sendToEndpoint -> DEBU 3c3 Exiting" +"2019-09-24 00:24:57.766 UTC [msp.identity] Verify -> DEBU 3c4 Verify: sig = 00000000 30 44 02 20 11 ed ae c3 93 39 79 2a 29 15 7f 94 |0D. .....9y*)...| +00000010 2b ec 9a b8 e8 fb e8 8c 23 26 3b 23 88 2c d2 17 |+.......#&;#.,..| +00000020 66 f8 4e 4a 02 20 32 98 6d d6 e9 63 67 ee df 2c |f.NJ. 2.m..cg..,| +00000030 a5 ec c3 fe 9a 97 8a da 73 68 1e 8a 08 4c fe a7 |........sh...L..| +00000040 eb 7a 53 01 b5 4a |.zS..J|" +"2019-09-24 00:24:57.767 UTC [msp.identity] Verify -> DEBU 3c5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:24:57.767 UTC [msp.identity] Verify -> DEBU 3c6 Verify: sig = 00000000 30 45 02 21 00 b3 a5 86 b9 2d 6a 62 71 e7 12 fe |0E.!.....-jbq...| +00000010 97 01 d6 5a 4a 5c 28 f4 fc 6f dd ff 21 59 d8 47 |...ZJ\(..o..!Y.G| +00000020 df d8 b3 e5 8c 02 20 27 3c 9e 7b e6 f7 c7 2b c6 |...... '<.{...+.| +00000030 64 a7 75 53 52 b0 d3 d1 4e fa fa c1 47 3d a4 25 |d.uSR...N...G=.%| +00000040 1d 2d 4c ec 60 03 67 |.-L.`.g|" +"2019-09-24 00:24:57.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:57.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c8 endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" lastAliveTS: 1569284677733382900, 12 but got ts: inc_num:1569284677733382900 seq_num:11 " +"2019-09-24 00:24:57.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c9 Exiting" +"2019-09-24 00:24:57.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca Exiting" +"2019-09-24 00:24:57.767 UTC [gossip.gossip] handleMessage -> DEBU 3cb Exiting" +"2019-09-24 00:24:59.523 UTC [endorser] ProcessProposal -> DEBU 3cc Entering: request from 172.18.0.9:50582" +"2019-09-24 00:24:59.523 UTC [protoutils] ValidateProposalMessage -> DEBU 3cd ValidateProposalMessage starts for signed proposal 0xc0031921e0" +"2019-09-24 00:24:59.523 UTC [protoutils] validateChannelHeader -> DEBU 3ce validateChannelHeader info: header type 3" +"2019-09-24 00:24:59.523 UTC [protoutils] checkSignatureFromCreator -> DEBU 3cf begin" +"2019-09-24 00:24:59.523 UTC [protoutils] checkSignatureFromCreator -> DEBU 3d0 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:24:59.523 UTC [protoutils] checkSignatureFromCreator -> DEBU 3d1 creator is valid" +"2019-09-24 00:24:59.523 UTC [msp.identity] Verify -> DEBU 3d2 Verify: digest = 00000000 7a 9f b6 b5 1a 10 48 80 73 a5 65 2b ae 64 c7 17 |z.....H.s.e+.d..| +00000010 f9 cc 49 c8 9a 03 18 8f 84 64 eb 3b 55 9a 9a 59 |..I......d.;U..Y|" +"2019-09-24 00:24:59.524 UTC [msp.identity] Verify -> DEBU 3d3 Verify: sig = 00000000 30 45 02 21 00 98 df f2 26 9d b0 93 58 3e af 01 |0E.!....&...X>..| +00000010 b4 12 07 1c e1 fc 8e 7c c2 ab 52 9f 6f 03 d0 7f |.......|..R.o...| +00000020 3d 60 7f 33 6a 02 20 4d bb 96 84 45 76 c1 e9 97 |=`.3j. M...Ev...| +00000030 ba ec 4f 6f 45 13 38 04 a6 b5 ef 9d 2e 40 0b 6d |..OoE.8......@.m| +00000040 f8 d0 ae 74 62 6b 18 |...tbk.|" +"2019-09-24 00:24:59.524 UTC [protoutils] checkSignatureFromCreator -> DEBU 3d4 exits successfully" +"2019-09-24 00:24:59.524 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3d5 validateChaincodeProposalMessage starts for proposal 0xc003142690, header 0xc0031925f0" +"2019-09-24 00:24:59.524 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3d6 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-09-24 00:24:59.524 UTC [endorser] preProcess -> DEBU 3d7 [][167ca488] processing txid: 167ca488f5f451a717cad4a997a95de59cf3ada9d977d902e54e3ced783802ff" +"2019-09-24 00:24:59.524 UTC [endorser] SimulateProposal -> DEBU 3d8 [][167ca488] Entry chaincode: name:"cscc" " +"2019-09-24 00:24:59.524 UTC [endorser] callChaincode -> INFO 3d9 [][167ca488] Entry chaincode: name:"cscc" " +"2019-09-24 00:24:59.524 UTC [chaincode] Execute -> DEBU 3da Entry" +"2019-09-24 00:24:59.524 UTC [cscc] Invoke -> DEBU 3db Invoke function: GetChannels" +"2019-09-24 00:24:59.525 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3dc Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 00:24:59.525 UTC [msp] Validate -> DEBU 3dd MSP Org1MSP validating identity" +"2019-09-24 00:24:59.525 UTC [msp.identity] Verify -> DEBU 3de Verify: digest = 00000000 7a 9f b6 b5 1a 10 48 80 73 a5 65 2b ae 64 c7 17 |z.....H.s.e+.d..| +00000010 f9 cc 49 c8 9a 03 18 8f 84 64 eb 3b 55 9a 9a 59 |..I......d.;U..Y|" +"2019-09-24 00:24:59.525 UTC [msp.identity] Verify -> DEBU 3df Verify: sig = 00000000 30 45 02 21 00 98 df f2 26 9d b0 93 58 3e af 01 |0E.!....&...X>..| +00000010 b4 12 07 1c e1 fc 8e 7c c2 ab 52 9f 6f 03 d0 7f |.......|..R.o...| +00000020 3d 60 7f 33 6a 02 20 4d bb 96 84 45 76 c1 e9 97 |=`.3j. M...Ev...| +00000030 ba ec 4f 6f 45 13 38 04 a6 b5 ef 9d 2e 40 0b 6d |..OoE.8......@.m| +00000040 f8 d0 ae 74 62 6b 18 |...tbk.|" +"2019-09-24 00:24:59.528 UTC [chaincode] handleMessage -> DEBU 3e0 [167ca488] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:24:59.528 UTC [chaincode] Notify -> DEBU 3e1 [167ca488] notifying Txid:167ca488f5f451a717cad4a997a95de59cf3ada9d977d902e54e3ced783802ff, channelID:" +"2019-09-24 00:24:59.529 UTC [chaincode] Execute -> DEBU 3e2 Exit" +"2019-09-24 00:24:59.529 UTC [endorser] callChaincode -> INFO 3e3 [][167ca488] Exit chaincode: name:"cscc" (5ms)" +"2019-09-24 00:24:59.529 UTC [endorser] SimulateProposal -> DEBU 3e4 [][167ca488] Exit" +"2019-09-24 00:24:59.529 UTC [endorser] func1 -> DEBU 3e5 Exit: request from 172.18.0.9:50582" +"2019-09-24 00:24:59.529 UTC [comm.grpc.server] 1 -> INFO 3e6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50582 grpc.code=OK grpc.call_duration=7.0019ms +"2019-09-24 00:24:59.534 UTC [grpc] warningf -> DEBU 3e7 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:50582: read: connection reset by peer" +"2019-09-24 00:24:59.534 UTC [grpc] infof -> DEBU 3e8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:24:59.605 UTC [msp] GetDefaultSigningIdentity -> DEBU 3e9 Obtaining default signing identity" +"2019-09-24 00:24:59.605 UTC [msp.identity] Sign -> DEBU 3ea Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100C " +"2019-09-24 00:24:59.605 UTC [msp.identity] Sign -> DEBU 3eb Sign: digest: ABFA635EDAF504F199FA8A814DE93601296E4929127A603AADC655B6752263E1 " +"2019-09-24 00:24:59.605 UTC [gossip.pull] Hello -> DEBU 3ed Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:24:59.605 UTC [gossip.comm] Send -> DEBU 3ee Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:59.606 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:24:59.607 UTC [gossip.comm] sendToEndpoint -> DEBU 3f0 Exiting" +"2019-09-24 00:24:59.605 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ec Obtaining default signing identity" +"2019-09-24 00:24:59.607 UTC [msp.identity] Sign -> DEBU 3f1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:59.607 UTC [msp.identity] Sign -> DEBU 3f2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:59.608 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3f3 Sleeping 5s" +"2019-09-24 00:24:59.608 UTC [gossip.comm] Send -> DEBU 3f4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 00:24:59.608 UTC [gossip.comm] sendToEndpoint -> DEBU 3f5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:24:59.608 UTC [gossip.comm] sendToEndpoint -> DEBU 3f6 Exiting" +"2019-09-24 00:24:59.610 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f7 Obtaining default signing identity" +"2019-09-24 00:24:59.610 UTC [msp.identity] Sign -> DEBU 3f8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100D " +"2019-09-24 00:24:59.610 UTC [msp.identity] Sign -> DEBU 3f9 Sign: digest: BAFCFBACBACC2B7EB6D74262730B18D5771080AD1C7CC0BDE8DC40F55A4FADDF " +"2019-09-24 00:24:59.610 UTC [msp] GetDefaultSigningIdentity -> DEBU 3fa Obtaining default signing identity" +"2019-09-24 00:24:59.610 UTC [msp.identity] Sign -> DEBU 3fb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:24:59.610 UTC [msp.identity] Sign -> DEBU 3fc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:24:59.610 UTC [gossip.gossip] handleMessage -> DEBU 3fd Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 00:24:59.610 UTC [gossip.pull] HandleMessage -> DEBU 3fe GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 00:24:59.610 UTC [gossip.gossip] handleMessage -> DEBU 3ff Exiting" +"2019-09-24 00:24:59.611 UTC [gossip.comm] Send -> DEBU 400 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:24:59.611 UTC [gossip.comm] sendToEndpoint -> DEBU 401 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:24:59.611 UTC [gossip.comm] sendToEndpoint -> DEBU 402 Exiting" +"2019-09-24 00:24:59.619 UTC [gossip.gossip] handleMessage -> DEBU 403 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-09-24 00:24:59.619 UTC [gossip.gossip] handleMessage -> DEBU 404 Exiting" +"2019-09-24 00:24:59.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 405 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-09-24 00:24:59.619 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 406 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:24:59.619 UTC [msp.identity] Verify -> DEBU 407 Verify: digest = 00000000 ba fc fb ac ba cc 2b 7e b6 d7 42 62 73 0b 18 d5 |......+~..Bbs...| +00000010 77 10 80 ad 1c 7c c0 bd e8 dc 40 f5 5a 4f ad df |w....|....@.ZO..|" +"2019-09-24 00:24:59.619 UTC [msp.identity] Verify -> DEBU 408 Verify: sig = 00000000 30 44 02 20 70 75 e5 76 33 60 eb 89 09 22 0d 39 |0D. pu.v3`...".9| +00000010 ab ee 6a 50 cf dc 90 62 be ee 11 c9 cc ee 78 d9 |..jP...b......x.| +00000020 b3 75 be db 02 20 37 ab 76 f8 db d3 ec 09 d9 86 |.u... 7.v.......| +00000030 0a 7c c6 82 29 bd dc 54 2d fa 07 84 3b 09 b9 08 |.|..)..T-...;...| +00000040 95 7d 0e 55 e1 6d |.}.U.m|" +"2019-09-24 00:24:59.620 UTC [msp.identity] Verify -> DEBU 409 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:39:44.305 UTC [msp.identity] Verify -> DEBU 399 Verify: sig = 00000000 30 45 02 21 00 a9 d3 a4 08 85 bc cb 81 46 84 81 |0E.!.........F..| -00000010 f2 19 50 05 7a 32 f2 b5 b1 e1 82 b4 73 ed b9 43 |..P.z2......s..C| -00000020 6f d3 06 17 d3 02 20 6f 74 bc e8 59 b2 6b f6 f5 |o..... ot..Y.k..| -00000030 ec a8 c5 7c 79 43 bc 3a 19 8a cf 87 77 ac 54 5d |...|yC.:....w.T]| -00000040 48 83 4d 89 38 91 45 |H.M.8.E|" -"2019-07-20 02:39:44.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 39a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:39:44.305 UTC [gossip.discovery] isSentByMe -> DEBU 39b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:39:44.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 39c Exiting" -"2019-07-20 02:39:44.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39d Exiting" -"2019-07-20 02:39:44.391 UTC [gossip.gossip] handleMessage -> DEBU 39e Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.392 UTC [gossip.pull] HandleMessage -> DEBU 39f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.392 UTC [gossip.pull] SendDigest -> DEBU 3a0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:39:44.393 UTC [gossip.gossip] handleMessage -> DEBU 3a1 Exiting" -"2019-07-20 02:39:44.394 UTC [gossip.gossip] handleMessage -> DEBU 3a2 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.395 UTC [gossip.gossip] handleMessage -> DEBU 3a3 Exiting" -"2019-07-20 02:39:44.395 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.396 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:44.397 UTC [msp.identity] Verify -> DEBU 3a6 Verify: digest = 00000000 29 00 b3 ff 3d 83 b9 68 9c 7f 8a 4f 6b 81 ac ef |)...=..h...Ok...| -00000010 0b cf 38 fc 45 3f 6a e7 04 f6 75 cb 3a 55 56 ad |..8.E?j...u.:UV.|" -"2019-07-20 02:39:44.398 UTC [msp.identity] Verify -> DEBU 3a7 Verify: sig = 00000000 30 44 02 20 4d 2a 70 d2 c2 ad 05 12 2e 74 b9 a0 |0D. M*p......t..| -00000010 3c 86 a2 b5 e1 fa c9 69 23 de 37 cb 7e 2d ee 54 |<......i#.7.~-.T| -00000020 00 9b bd 8d 02 20 7f ae cb 63 88 97 ae 11 9d 19 |..... ...c......| -00000030 d6 9b cc 28 8c e5 35 00 e8 1b b1 81 4b 9e 22 e8 |...(..5.....K.".| -00000040 96 17 a6 dd bb e4 |......|" -"2019-07-20 02:39:44.399 UTC [msp.identity] Verify -> DEBU 3a8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:39:44.399 UTC [msp.identity] Verify -> DEBU 3a9 Verify: sig = 00000000 30 45 02 21 00 bb 9f 6b 01 a7 03 0f 80 54 b5 50 |0E.!...k.....T.P| -00000010 b8 b3 2e 2b 38 36 7a 6b fa 0c b9 64 5c b6 47 78 |...+86zk...d\.Gx| -00000020 1a 84 a1 ce a3 02 20 36 e1 01 70 16 0f e5 3d 60 |...... 6..p...=`| -00000030 81 a2 55 df 4e 77 4c b1 a8 cc 73 72 b6 d1 22 6d |..U.NwL...sr.."m| -00000040 e6 25 93 37 29 c5 3d |.%.7).=|" -"2019-07-20 02:39:44.400 UTC [gossip.discovery] handleAliveMessage -> DEBU 3aa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:39:44.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ac updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ae Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3af Exiting" -"2019-07-20 02:39:44.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b0 Exiting" -"2019-07-20 02:39:44.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b1 Exiting" -"2019-07-20 02:39:44.402 UTC [gossip.discovery] sendMemResponse -> DEBU 3b2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:39:44.402 UTC [gossip.comm] Send -> DEBU 3b3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:44.402 UTC [gossip.discovery] sendMemResponse -> DEBU 3b4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > alive:\316\367\016A]\027\374i\355.\302v\372\204\340\306D\320\211Z\305\223\232\002 rH]\370\312\310\322\022\010\323\244<\000;\003\362\030\302O\017g\030\252.WV\320pr0\343\203" > > " -"2019-07-20 02:39:44.402 UTC [gossip.comm] sendToEndpoint -> DEBU 3b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.402 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6 Exiting" -"2019-07-20 02:39:44.753 UTC [gossip.comm] Send -> DEBU 3b7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:44.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9 Exiting" -"2019-07-20 02:39:44.755 UTC [gossip.comm] Send -> DEBU 3ba Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:44.755 UTC [gossip.comm] sendToEndpoint -> DEBU 3bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -"2019-07-20 02:39:44.755 UTC [gossip.comm] sendToEndpoint -> DEBU 3bc Exiting" -"2019-07-20 02:39:44.756 UTC [gossip.gossip] handleMessage -> DEBU 3bd Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.757 UTC [msp.identity] Verify -> DEBU 3be Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| -00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" -"2019-07-20 02:39:44.757 UTC [msp.identity] Verify -> DEBU 3bf Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| -00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| -00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| -00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| -00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" -"2019-07-20 02:39:44.760 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:44.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:44.763 UTC [policies] Evaluate -> DEBU 3c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:44.763 UTC [policies] Evaluate -> DEBU 3c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:44.764 UTC [policies] Evaluate -> DEBU 3c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:44.764 UTC [msp] DeserializeIdentity -> DEBU 3c5 Obtaining identity" -"2019-07-20 02:39:44.765 UTC [msp.identity] newIdentity -> DEBU 3c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:24:59.620 UTC [msp.identity] Verify -> DEBU 40a Verify: sig = 00000000 30 45 02 21 00 f8 cf 77 24 69 b9 5c 3d 44 e8 05 |0E.!...w$i.\=D..| +00000010 61 d0 90 40 15 23 b0 37 c6 ff 00 02 22 db bd b6 |a..@.#.7...."...| +00000020 a2 79 4c 87 6d 02 20 34 60 45 31 25 b1 f3 42 df |.yL.m. 4`E1%..B.| +00000030 24 1e a0 e0 1d ad 9b 2f c5 f3 b8 66 e1 6c b1 f6 |$....../...f.l..| +00000040 ee 57 cc da 97 b2 45 |.W....E|" +"2019-09-24 00:24:59.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 40b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:59.620 UTC [gossip.discovery] isSentByMe -> DEBU 40c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:24:59.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 40d Exiting" +"2019-09-24 00:24:59.620 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40e Exiting" +"2019-09-24 00:25:00.219 UTC [gossip.comm] Send -> DEBU 40f Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:00.220 UTC [gossip.comm] sendToEndpoint -> DEBU 410 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:00.220 UTC [gossip.comm] sendToEndpoint -> DEBU 411 Exiting" +"2019-09-24 00:25:00.223 UTC [gossip.gossip] handleMessage -> DEBU 412 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +"2019-09-24 00:25:00.224 UTC [msp.identity] Verify -> DEBU 413 Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +"2019-09-24 00:25:00.224 UTC [msp.identity] Verify -> DEBU 414 Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +00000040 a8 ad f9 eb 4c ce |....L.|" +"2019-09-24 00:25:00.224 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 415 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:00.225 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 416 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:00.225 UTC [policies] Evaluate -> DEBU 417 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:00.225 UTC [policies] Evaluate -> DEBU 418 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:00.225 UTC [policies] Evaluate -> DEBU 419 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:00.225 UTC [msp] DeserializeIdentity -> DEBU 41a Obtaining identity" +"2019-09-24 00:25:00.225 UTC [msp.identity] newIdentity -> DEBU 41b Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -1346,716 +1458,343 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE-----" -"2019-07-20 02:39:44.766 UTC [cauthdsl] func1 -> DEBU 3c7 0xc003081da0 gate 1563590384766279600 evaluation starts" -"2019-07-20 02:39:44.766 UTC [cauthdsl] func2 -> DEBU 3c8 0xc003081da0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3c9 0xc003081da0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3ca 0xc003081da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3cb 0xc003081da0 principal evaluation fails" -"2019-07-20 02:39:44.768 UTC [cauthdsl] func1 -> DEBU 3cc 0xc003081da0 gate 1563590384766279600 evaluation fails" -"2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3cd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:44.770 UTC [cauthdsl] func1 -> DEBU 3d0 0xc0030c2f20 gate 1563590384770142000 evaluation starts" -"2019-07-20 02:39:44.770 UTC [cauthdsl] func2 -> DEBU 3d1 0xc0030c2f20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:44.770 UTC [cauthdsl] func2 -> DEBU 3d2 0xc0030c2f20 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:44.771 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d3 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-07-20 02:39:44.771 UTC [msp] Validate -> DEBU 3d4 MSP Org1MSP validating identity" -"2019-07-20 02:39:44.771 UTC [msp] getCertificationChain -> DEBU 3d5 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:44.772 UTC [cauthdsl] func2 -> DEBU 3d6 0xc0030c2f20 principal matched by identity 0" -"2019-07-20 02:39:44.772 UTC [msp.identity] Verify -> DEBU 3d7 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| -00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" -"2019-07-20 02:39:44.773 UTC [msp.identity] Verify -> DEBU 3d8 Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| -00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| -00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| -00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| -00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" -"2019-07-20 02:39:44.773 UTC [cauthdsl] func2 -> DEBU 3d9 0xc0030c2f20 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:44.773 UTC [cauthdsl] func1 -> DEBU 3da 0xc0030c2f20 gate 1563590384770142000 evaluation succeeds" -"2019-07-20 02:39:44.773 UTC [policies] Evaluate -> DEBU 3db Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3dd Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:44.775 UTC [gossip.gossip] handleMessage -> DEBU 3df Exiting" -"2019-07-20 02:39:44.913 UTC [gossip.gossip] handleMessage -> DEBU 3e0 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.913 UTC [gossip.gossip] handleMessage -> DEBU 3e1 Exiting" -"2019-07-20 02:39:44.914 UTC [gossip.gossip] handleMessage -> DEBU 3e2 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.914 UTC [gossip.pull] HandleMessage -> DEBU 3e3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:39:44.915 UTC [gossip.gossip] handleMessage -> DEBU 3e4 Exiting" -"2019-07-20 02:39:44.916 UTC [gossip.gossip] handleMessage -> DEBU 3e5 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -"2019-07-20 02:39:44.916 UTC [msp.identity] Verify -> DEBU 3e6 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| -00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" -"2019-07-20 02:39:44.916 UTC [msp.identity] Verify -> DEBU 3e7 Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| -00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| -00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| -00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| -00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" -"2019-07-20 02:39:44.917 UTC [gossip.gossip] handleMessage -> DEBU 3e8 Exiting" -"2019-07-20 02:39:45.756 UTC [gossip.channel] reportMembershipChanges -> INFO 3e9 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" -"2019-07-20 02:39:46.780 UTC [gossip.election] waitForInterrupt -> DEBU 3ea c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:39:46.781 UTC [gossip.election] beLeader -> INFO 3eb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" -"2019-07-20 02:39:46.781 UTC [gossip.service] func1 -> INFO 3ec Elected as a leader, starting delivery service for channel businesschannel" -"2019-07-20 02:39:46.782 UTC [deliveryClient] StartDeliverForChannel -> DEBU 3ed This peer will pass blocks from orderer service to other peers for channel businesschannel" -"2019-07-20 02:39:46.782 UTC [gossip.election] leaderElection -> DEBU 3ee c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:39:46.782 UTC [gossip.election] IsLeader -> DEBU 3ef c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:39:46.782 UTC [ConnProducer] NewConnection -> DEBU 3f0 Creating a new connection" -"2019-07-20 02:39:46.782 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f1 Obtaining default signing identity" -"2019-07-20 02:39:46.783 UTC [msp.identity] Sign -> DEBU 3f2 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510021801 " -"2019-07-20 02:39:46.783 UTC [msp.identity] Sign -> DEBU 3f3 Sign: digest: 1432909845E8D004A1C68176560DDCFBA5B49F384912BA88B279E39B18E3C1AA " -"2019-07-20 02:39:46.783 UTC [gossip.election] waitForInterrupt -> DEBU 3f4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:39:46.784 UTC [grpc] DialContext -> DEBU 3f5 parsed scheme: """ -"2019-07-20 02:39:46.784 UTC [grpc] DialContext -> DEBU 3f6 scheme "" not registered, fallback to default scheme" -"2019-07-20 02:39:46.785 UTC [grpc] watcher -> DEBU 3f7 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" -"2019-07-20 02:39:46.785 UTC [grpc] switchBalancer -> DEBU 3f8 ClientConn switching balancer to "pick_first"" -"2019-07-20 02:39:46.785 UTC [grpc] HandleSubConnStateChange -> DEBU 3f9 pickfirstBalancer: HandleSubConnStateChange: 0xc003124010, CONNECTING" -"2019-07-20 02:39:46.786 UTC [gossip.comm] Send -> DEBU 3fa Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:46.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -"2019-07-20 02:39:46.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fc Exiting" -"2019-07-20 02:39:46.793 UTC [grpc] HandleSubConnStateChange -> DEBU 3fd pickfirstBalancer: HandleSubConnStateChange: 0xc003124010, READY" -"2019-07-20 02:39:46.793 UTC [ConnProducer] NewConnection -> DEBU 3fe Connected to {orderer2.example.com:7050 [OrdererMSP]}" -"2019-07-20 02:39:46.794 UTC [deliveryClient] connect -> DEBU 3ff Connected to orderer2.example.com:7050" -"2019-07-20 02:39:46.794 UTC [deliveryClient] connect -> DEBU 400 Establishing gRPC stream with orderer2.example.com:7050 ..." -"2019-07-20 02:39:46.795 UTC [deliveryClient] afterConnect -> DEBU 401 Entering" -"2019-07-20 02:39:46.795 UTC [deliveryClient] RequestBlocks -> DEBU 402 Starting deliver with block [1] for channel businesschannel" -"2019-07-20 02:39:46.795 UTC [msp] GetDefaultSigningIdentity -> DEBU 403 Obtaining default signing identity" -"2019-07-20 02:39:46.796 UTC [msp] GetDefaultSigningIdentity -> DEBU 404 Obtaining default signing identity" -"2019-07-20 02:39:46.796 UTC [msp.identity] Sign -> DEBU 405 Sign: plaintext: 0A91070A3D08051A0608F2FDC9E90522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " -"2019-07-20 02:39:46.796 UTC [msp.identity] Sign -> DEBU 406 Sign: digest: 953E55B39D6C84B1B8FAB1F76B5216C49716B7C4798A7B67FEFC0A262BE8C43D " -"2019-07-20 02:39:46.797 UTC [deliveryClient] afterConnect -> DEBU 407 Exiting" -"2019-07-20 02:39:46.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 408 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:46.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 409 Got block validation policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:39:46.799 UTC [msp] DeserializeIdentity -> DEBU 40d Obtaining identity" -"2019-07-20 02:39:46.800 UTC [msp.identity] newIdentity -> DEBU 40e Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICDTCCAbSgAwIBAgIRAJ9PiwMc+yJquw7iESWUUdgwCgYIKoZIzj0EAwIwaTEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -CCqGSM49AwEHA0IABJFXeJu8Bn4343K9C/p5zMXGWMf7TRDkm1QTRArOtt2UcwjS -hELr0NUrXJ9/itxePp5kcNe1A/SPXSlVbZJb7zyjTTBLMA4GA1UdDwEB/wQEAwIH -gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIBQFxbpf0MCh/Pc/loudY4Bg -rIfa+QF858Ffm7hagVV9AiB7x5vl9mUFXWvFJffvBYw0mnUxe0HmAS0C7cpoHJbC -dg== ------END CERTIFICATE-----" -"2019-07-20 02:39:46.801 UTC [cauthdsl] func1 -> DEBU 40f 0xc0031ba1c0 gate 1563590386800569000 evaluation starts" -"2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 410 0xc0031ba1c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 411 0xc0031ba1c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:46.801 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 412 Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-07-20 02:39:46.801 UTC [msp] Validate -> DEBU 413 MSP OrdererMSP validating identity" -"2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 414 0xc0031ba1c0 principal matched by identity 0" -"2019-07-20 02:39:46.802 UTC [msp.identity] Verify -> DEBU 415 Verify: digest = 00000000 2a 51 2b 81 9b 58 5f 83 5d 96 56 e0 0c 32 21 62 |*Q+..X_.].V..2!b| -00000010 51 5a 0e 98 23 59 6f 1b 20 3f 1e 94 dd bf e4 00 |QZ..#Yo. ?......|" -"2019-07-20 02:39:46.802 UTC [msp.identity] Verify -> DEBU 416 Verify: sig = 00000000 30 45 02 21 00 d6 1f 11 02 a7 d0 fb c5 bd 4f 88 |0E.!..........O.| -00000010 bd ba 48 48 a1 d7 47 1e c2 f0 aa b8 2b b7 60 6b |..HH..G.....+.`k| -00000020 4f 91 ce 17 f8 02 20 03 5d 63 03 23 45 9d dd f2 |O..... .]c.#E...| -00000030 bc 8e ca bd 37 2f 00 73 99 d4 41 bd f1 dd ac 4d |....7/.s..A....M| -00000040 73 6a 36 c3 77 b4 7e |sj6.w.~|" -"2019-07-20 02:39:46.802 UTC [cauthdsl] func2 -> DEBU 417 0xc0031ba1c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:46.802 UTC [cauthdsl] func1 -> DEBU 418 0xc0031ba1c0 gate 1563590386800569000 evaluation succeeds" -"2019-07-20 02:39:46.802 UTC [policies] Evaluate -> DEBU 419 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41b Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:46.804 UTC [blocksProvider] DeliverBlocks -> DEBU 41d [businesschannel] Adding payload to local buffer, blockNum = [1]" -"2019-07-20 02:39:46.804 UTC [gossip.state] addPayload -> DEBU 41e [businesschannel] Adding payload to local buffer, blockNum = [1]" -"2019-07-20 02:39:46.804 UTC [gossip.state] deliverPayloads -> DEBU 41f [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" -"2019-07-20 02:39:46.804 UTC [gossip.state] deliverPayloads -> DEBU 420 [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" -"2019-07-20 02:39:46.804 UTC [gossip.privdata] StoreBlock -> INFO 421 [businesschannel] Received block [1] from buffer" -"2019-07-20 02:39:46.804 UTC [gossip.privdata] StoreBlock -> DEBU 422 [businesschannel] Validating block [1]" -"2019-07-20 02:39:46.804 UTC [committer.txvalidator] Validate -> DEBU 423 [businesschannel] START Block Validation for block [1]" -"2019-07-20 02:39:46.805 UTC [committer.txvalidator] Validate -> DEBU 424 expecting 1 block validation responses" -"2019-07-20 02:39:46.805 UTC [committer.txvalidator] validateTx -> DEBU 425 [businesschannel] validateTx starts for block 0xc0030867c0 env 0xc0030ee6e0 txn 0" -"2019-07-20 02:39:46.805 UTC [protoutils] ValidateTransaction -> DEBU 426 ValidateTransactionEnvelope starts for envelope 0xc0030ee6e0" -"2019-07-20 02:39:46.805 UTC [protoutils] ValidateTransaction -> DEBU 427 Header is channel_header:"\010\001\032\006\010\357\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030\260\250\350f)\323l\022\2223\341\343\230\3354p\225\t9t\013\330h\271" " -"2019-07-20 02:39:46.806 UTC [protoutils] validateChannelHeader -> DEBU 428 validateChannelHeader info: header type 1" -"2019-07-20 02:39:46.806 UTC [protoutils] checkSignatureFromCreator -> DEBU 429 begin" -"2019-07-20 02:39:46.806 UTC [msp] GetManagerForChain -> DEBU 42a Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:39:46.806 UTC [msp] DeserializeIdentity -> DEBU 42b Obtaining identity" -"2019-07-20 02:39:46.806 UTC [msp.identity] newIdentity -> DEBU 42c Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN -4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH -gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 -N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh -QQ== ------END CERTIFICATE-----" -"2019-07-20 02:39:46.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 42d creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -"2019-07-20 02:39:46.807 UTC [msp] Validate -> DEBU 42e MSP OrdererMSP validating identity" -"2019-07-20 02:39:46.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 42f creator is valid" -"2019-07-20 02:39:46.807 UTC [msp.identity] Verify -> DEBU 430 Verify: digest = 00000000 25 35 ec 33 45 77 c7 37 be bb 38 55 c9 64 6e df |%5.3Ew.7..8U.dn.| -00000010 0b 2d 1f d1 fc fc dd 1e 86 21 54 a6 54 c9 a8 da |.-.......!T.T...|" -"2019-07-20 02:39:46.807 UTC [msp.identity] Verify -> DEBU 431 Verify: sig = 00000000 30 44 02 20 3b b3 0e 3c 0b b2 75 13 96 13 37 4c |0D. ;..<..u...7L| -00000010 0c d1 15 d4 40 ff 19 4a 13 ea 8f bd 76 a7 c0 b5 |....@..J....v...| -00000020 aa c5 7c 6a 02 20 62 6a 7d 0c 2b df ed 05 f1 26 |..|j. bj}.+....&| -00000030 6f af 79 9f 81 51 a7 54 83 81 b0 f1 ee 43 39 b1 |o.y..Q.T.....C9.| -00000040 dd aa 68 72 78 34 |..hrx4|" -"2019-07-20 02:39:46.808 UTC [protoutils] checkSignatureFromCreator -> DEBU 432 exits successfully" -"2019-07-20 02:39:46.808 UTC [protoutils] validateConfigTransaction -> DEBU 433 validateConfigTransaction starts for data 0xc0031de000, header channel_header:"\010\001\032\006\010\357\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\260\250\350f)\323l\022\2223\341\343\230\3354p\225\t9t\013\330h\271" " -"2019-07-20 02:39:46.808 UTC [committer.txvalidator] validateTx -> DEBU 434 Transaction is for channel businesschannel" -"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 435 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 436 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 437 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 438 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 439 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43d Adding to config map: [Group] /Channel" -"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 43e Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 43f Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 440 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 441 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 442 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 443 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 444 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 445 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:46.811 UTC [common.configtx] verifyDeltaSet -> DEBU 446 Processing change to key: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:46.811 UTC [common.configtx] policyForItem -> DEBU 447 Getting policy for item Org1MSP with mod_policy Admins" -"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 448 Manager Channel looking up path [Application]" -"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 449 Manager Channel has managers Orderer" -"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44a Manager Channel has managers Application" -"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44b Manager Channel/Application looking up path []" -"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44c Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44d Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44e Manager Channel/Application looking up path [Org1MSP]" -"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44f Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:46.812 UTC [policies] Manager -> DEBU 450 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:46.812 UTC [policies] Manager -> DEBU 451 Manager Channel/Application/Org1MSP looking up path []" -"2019-07-20 02:39:46.812 UTC [policies] Evaluate -> DEBU 452 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-07-20 02:39:46.812 UTC [cauthdsl] func1 -> DEBU 453 0xc00320f870 gate 1563590386812191300 evaluation starts" -"2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 454 0xc00320f870 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 455 0xc00320f870 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:46.812 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 456 Checking if identity satisfies ADMIN role for Org1MSP" -"2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 457 0xc00320f870 principal matched by identity 0" -"2019-07-20 02:39:46.812 UTC [msp.identity] Verify -> DEBU 458 Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| -00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" -"2019-07-20 02:39:46.813 UTC [msp.identity] Verify -> DEBU 459 Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| -00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| -00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| -00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| -00000040 b4 14 85 f1 cd 6f 15 |.....o.|" -"2019-07-20 02:39:46.813 UTC [cauthdsl] func2 -> DEBU 45a 0xc00320f870 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:46.813 UTC [cauthdsl] func1 -> DEBU 45b 0xc00320f870 gate 1563590386812191300 evaluation succeeds" -"2019-07-20 02:39:46.813 UTC [policies] Evaluate -> DEBU 45c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:46.813 UTC [policies] Evaluate -> DEBU 45d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:46.813 UTC [common.configtx] verifyDeltaSet -> DEBU 45e Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 45f Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 460 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 462 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 463 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.804 UTC [gossip.state] addPayload -> DEBU 465 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-07-20 02:39:46.814 UTC [blocksProvider] DeliverBlocks -> DEBU 466 [businesschannel] Gossiping block [1], peers number [1]" -"2019-07-20 02:39:46.815 UTC [gossip.channel] AddToMsgStore -> DEBU 467 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes to the block puller" -"2019-07-20 02:39:46.815 UTC [gossip.pull] Add -> DEBU 468 Added 1, total items: 1" -"2019-07-20 02:39:46.816 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 469 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:46.816 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 46a Got block validation policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:46.816 UTC [policies] Evaluate -> DEBU 46b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-07-20 02:39:46.817 UTC [policies] Evaluate -> DEBU 46c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:46.817 UTC [policies] Evaluate -> DEBU 46d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:39:46.817 UTC [cauthdsl] func1 -> DEBU 46e 0xc003223060 gate 1563590386817258300 evaluation starts" -"2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 46f 0xc003223060 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 470 0xc003223060 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 471 0xc003223060 principal matched by identity 0" -"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 464 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.817 UTC [common.configtx] recurseConfigMap -> DEBU 472 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.817 UTC [common.configtx] recurseConfigMap -> DEBU 473 Setting policy for key Readers to " -"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 474 Setting policy for key Writers to " -"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 475 Setting policy for key Admins to " -"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 476 Setting policy for key Endorsement to " -"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 477 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 478 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 479 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47a Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47c Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47d Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47e Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47f Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 480 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 481 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 482 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.819 UTC [common.channelconfig] NewStandardValues -> DEBU 483 Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:46.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 484 Processing field: HashingAlgorithm" -"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 485 Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 486 Processing field: OrdererAddresses" -"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 487 Processing field: Consortium" -"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 488 Processing field: Capabilities" -"2019-07-20 02:39:46.820 UTC [common.channelconfig] NewStandardValues -> DEBU 489 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48a Processing field: ACLs" -"2019-07-20 02:39:46.817 UTC [msp.identity] Verify -> DEBU 48b Verify: digest = 00000000 ec 21 1e f7 b6 5d f6 9d 41 b5 b2 a5 30 d2 80 0c |.!...]..A...0...| -00000010 19 82 c6 dc a3 34 8b 5b ca 65 18 81 5a 92 65 b6 |.....4.[.e..Z.e.|" -"2019-07-20 02:39:46.820 UTC [msp.identity] Verify -> DEBU 48c Verify: sig = 00000000 30 44 02 20 68 ec 42 5d 5b 55 ae b4 32 48 79 cd |0D. h.B][U..2Hy.| -00000010 90 85 a8 26 03 4b d1 24 88 ba a3 5a 56 1c bb d5 |...&.K.$...ZV...| -00000020 bc ec 81 46 02 20 35 65 1b 5e 90 17 74 6e 3d 5e |...F. 5e.^..tn=^| -00000030 14 9b c7 91 dd b6 7f 47 59 b9 98 de 50 3a 29 32 |.......GY...P:)2| -00000040 1d bc 73 d9 73 c0 |..s.s.|" -"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48d Processing field: Capabilities" -"2019-07-20 02:39:46.821 UTC [common.channelconfig] NewStandardValues -> DEBU 48e Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:46.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 490 Processing field: AnchorPeers" -"2019-07-20 02:39:46.821 UTC [cauthdsl] func2 -> DEBU 48f 0xc003223060 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:46.821 UTC [cauthdsl] func1 -> DEBU 491 0xc003223060 gate 1563590386817258300 evaluation succeeds" -"2019-07-20 02:39:46.821 UTC [common.channelconfig] NewStandardValues -> DEBU 492 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:46.821 UTC [policies] Evaluate -> DEBU 494 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 495 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:46.822 UTC [common.channelconfig] initializeProtosStruct -> DEBU 493 Processing field: MSP" -"2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 496 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 497 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:46.822 UTC [blocksProvider] DeliverBlocks -> DEBU 498 [businesschannel] Adding payload to local buffer, blockNum = [2]" -"2019-07-20 02:39:46.823 UTC [gossip.state] addPayload -> DEBU 49a [businesschannel] Adding payload to local buffer, blockNum = [2]" -"2019-07-20 02:39:46.822 UTC [common.channelconfig] Validate -> DEBU 499 Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:39:46.823 UTC [common.channelconfig] validateMSP -> DEBU 49b Setting up MSP for org Org1MSP" -"2019-07-20 02:39:46.823 UTC [gossip.state] addPayload -> DEBU 49c Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-07-20 02:39:46.823 UTC [msp] newBccspMsp -> DEBU 49d Creating BCCSP-based MSP instance" -"2019-07-20 02:39:46.824 UTC [msp] New -> DEBU 49e Creating Cache-MSP instance" -"2019-07-20 02:39:46.823 UTC [blocksProvider] DeliverBlocks -> DEBU 49f [businesschannel] Gossiping block [2], peers number [1]" -"2019-07-20 02:39:46.824 UTC [gossip.channel] AddToMsgStore -> DEBU 4a0 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes to the block puller" -"2019-07-20 02:39:46.824 UTC [gossip.pull] Add -> DEBU 4a1 Added 2, total items: 2" -"2019-07-20 02:39:46.824 UTC [msp] Setup -> DEBU 4a2 Setting up MSP instance Org1MSP" -"2019-07-20 02:39:46.825 UTC [msp.identity] newIdentity -> DEBU 4a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y -aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw -RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 -N0qzbu085qQXfAXf7yy4VoSHr1A6 ------END CERTIFICATE-----" -"2019-07-20 02:39:46.825 UTC [msp.identity] newIdentity -> DEBU 4a4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:39:46.826 UTC [gossip.comm] Send -> DEBU 4a5 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:46.826 UTC [gossip.comm] Send -> DEBU 4a6 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:46.826 UTC [gossip.comm] sendToEndpoint -> DEBU 4a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes" -"2019-07-20 02:39:46.826 UTC [gossip.comm] sendToEndpoint -> DEBU 4a8 Exiting" -"2019-07-20 02:39:46.827 UTC [gossip.comm] sendToEndpoint -> DEBU 4a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes" -"2019-07-20 02:39:46.827 UTC [gossip.comm] sendToEndpoint -> DEBU 4aa Exiting" -"2019-07-20 02:39:46.828 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4ab Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:46.828 UTC [msp] Validate -> DEBU 4ac MSP Org1MSP validating identity" -"2019-07-20 02:39:46.828 UTC [msp] getCertificationChain -> DEBU 4ad MSP Org1MSP getting certification chain" -"2019-07-20 02:39:46.830 UTC [msp] hasOURole -> DEBU 4ae MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:46.830 UTC [msp] getCertificationChain -> DEBU 4af MSP Org1MSP getting certification chain" -"2019-07-20 02:39:46.830 UTC [common.channelconfig] NewStandardValues -> DEBU 4b0 Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:46.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b1 Processing field: AnchorPeers" -"2019-07-20 02:39:46.830 UTC [common.channelconfig] NewStandardValues -> DEBU 4b2 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:46.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b3 Processing field: MSP" -"2019-07-20 02:39:46.830 UTC [common.channelconfig] Validate -> DEBU 4b4 Anchor peers for org Org2MSP are " -"2019-07-20 02:39:46.830 UTC [common.channelconfig] validateMSP -> DEBU 4b5 Setting up MSP for org Org2MSP" -"2019-07-20 02:39:46.830 UTC [msp] newBccspMsp -> DEBU 4b6 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:46.830 UTC [msp] New -> DEBU 4b7 Creating Cache-MSP instance" -"2019-07-20 02:39:46.830 UTC [msp] Setup -> DEBU 4b8 Setting up MSP instance Org2MSP" -"2019-07-20 02:39:46.831 UTC [msp.identity] newIdentity -> DEBU 4b9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE -AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA -BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O -A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU -BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg -fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw -RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv -JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== ------END CERTIFICATE-----" -"2019-07-20 02:39:46.831 UTC [msp.identity] newIdentity -> DEBU 4ba Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== ------END CERTIFICATE-----" -"2019-07-20 02:39:46.831 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4bb Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:46.831 UTC [msp] Validate -> DEBU 4bc MSP Org2MSP validating identity" -"2019-07-20 02:39:46.831 UTC [msp] getCertificationChain -> DEBU 4bd MSP Org2MSP getting certification chain" -"2019-07-20 02:39:46.831 UTC [msp] hasOURole -> DEBU 4be MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:46.831 UTC [msp] getCertificationChain -> DEBU 4bf MSP Org2MSP getting certification chain" -"2019-07-20 02:39:46.831 UTC [common.channelconfig] NewStandardValues -> DEBU 4c0 Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:46.831 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c1 Processing field: ConsensusType" -"2019-07-20 02:39:46.831 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c2 Processing field: BatchSize" -"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c3 Processing field: BatchTimeout" -"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c4 Processing field: KafkaBrokers" -"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c5 Processing field: ChannelRestrictions" -"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c6 Processing field: Capabilities" -"2019-07-20 02:39:46.832 UTC [common.channelconfig] NewStandardValues -> DEBU 4c7 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c8 Processing field: Endpoints" -"2019-07-20 02:39:46.832 UTC [common.channelconfig] NewStandardValues -> DEBU 4c9 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ca Processing field: MSP" -"2019-07-20 02:39:46.832 UTC [common.channelconfig] validateMSP -> DEBU 4cb Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:46.832 UTC [msp] newBccspMsp -> DEBU 4cc Creating BCCSP-based MSP instance" -"2019-07-20 02:39:46.832 UTC [msp] New -> DEBU 4cd Creating Cache-MSP instance" -"2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4ce Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:46.832 UTC [msp.identity] newIdentity -> DEBU 4cf Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:39:46.832 UTC [msp.identity] newIdentity -> DEBU 4d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:39:46.832 UTC [msp] Validate -> DEBU 4d1 MSP OrdererMSP validating identity" -"2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4d2 Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4d3 MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:46.832 UTC [policies] NewManagerImpl -> DEBU 4d4 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:46.832 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d6 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d7 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d8 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d9 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4da Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4db Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4dc Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4dd Proposed new policy Readers for Channel/Application" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4de Proposed new policy Writers for Channel/Application" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4df Proposed new policy Admins for Channel/Application" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e0 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e1 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e3 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e4 Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e5 Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e6 Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e7 Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e8 Proposed new policy Admins for Channel" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e9 Proposed new policy Readers for Channel" -"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4ea Proposed new policy Writers for Channel" -"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Group] /Channel" -"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:46.844 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:46.846 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:46.846 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:46.847 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:46.848 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:46.853 UTC [comm.grpc.server] 1 -> INFO 50b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.848Z grpc.peer_address=172.18.0.6:33978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=186.8µs -"2019-07-20 02:39:46.853 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:46.854 UTC [common.configtx] addToMap -> DEBU 50d Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:46.854 UTC [common.configtx] addToMap -> DEBU 50e Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:46.856 UTC [common.configtx] addToMap -> DEBU 50f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:46.856 UTC [common.configtx] addToMap -> DEBU 510 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:46.857 UTC [common.configtx] addToMap -> DEBU 511 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:46.858 UTC [common.configtx] addToMap -> DEBU 513 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:46.857 UTC [msp] GetDefaultSigningIdentity -> DEBU 512 Obtaining default signing identity" -"2019-07-20 02:39:46.858 UTC [common.configtx] addToMap -> DEBU 514 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:46.859 UTC [common.configtx] addToMap -> DEBU 516 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:46.859 UTC [common.configtx] addToMap -> DEBU 517 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:46.860 UTC [common.configtx] addToMap -> DEBU 518 Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:46.859 UTC [msp.identity] Sign -> DEBU 515 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:46.860 UTC [common.configtx] addToMap -> DEBU 519 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:46.861 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:46.861 UTC [common.channelconfig] LogSanityChecks -> DEBU 51c As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:39:46.861 UTC [msp.identity] Sign -> DEBU 51a Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:46.861 UTC [common.channelconfig] LogSanityChecks -> DEBU 51d As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:39:46.862 UTC [policies] Manager -> DEBU 51f Manager Channel looking up path [Application]" -"2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 520 Manager Channel has managers Orderer" -"2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 521 Manager Channel has managers Application" -"2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 522 Manager Channel/Application looking up path []" -"2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 523 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 524 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 525 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 526 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 527 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 528 Manager Channel looking up path [Orderer]" -"2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 529 Manager Channel has managers Application" -"2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 52a Manager Channel has managers Orderer" -"2019-07-20 02:39:46.865 UTC [policies] Manager -> DEBU 52b Manager Channel/Orderer looking up path []" -"2019-07-20 02:39:46.865 UTC [policies] Manager -> DEBU 52c Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52e As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52f As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:39:46.866 UTC [common.channelconfig] LogSanityChecks -> DEBU 530 As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:39:46.866 UTC [common.capabilities] Supported -> DEBU 531 Application capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:46.866 UTC [common.capabilities] Supported -> DEBU 532 Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:46.866 UTC [gossip.service] ProcessConfigUpdate -> DEBU 533 Processing new config for channel businesschannel" -"2019-07-20 02:39:46.866 UTC [gossip.service] ProcessConfigUpdate -> DEBU 534 Calling out because config was updated for channel businesschannel" -"2019-07-20 02:39:46.866 UTC [gossip.service] updateAnchors -> DEBU 535 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -"2019-07-20 02:39:46.862 UTC [gossip.comm] authenticateRemotePeer -> DEBU 51e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33978" -"2019-07-20 02:39:46.867 UTC [gossip.service] updateAnchors -> DEBU 536 Org2MSP anchor peers: []" -"2019-07-20 02:39:46.867 UTC [gossip.service] updateAnchors -> DEBU 537 Creating state provider for chainID businesschannel" -"2019-07-20 02:39:46.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 538 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:46.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 539 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:46.867 UTC [policies] Evaluate -> DEBU 53a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:46.867 UTC [gossip.comm] authenticateRemotePeer -> DEBU 53b Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33978" -"2019-07-20 02:39:46.869 UTC [msp.identity] Verify -> DEBU 53d Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-07-20 02:39:46.869 UTC [msp.identity] Verify -> DEBU 53e Verify: sig = 00000000 30 45 02 21 00 e6 68 9d c5 63 b9 1c b9 e7 c5 c3 |0E.!..h..c......| -00000010 94 54 c8 7b 93 fd a5 57 66 d8 c1 b1 b3 4b 3a 64 |.T.{...Wf....K:d| -00000020 f8 81 bf 34 ff 02 20 0d 6a 26 1f c2 fd 8e 9d 27 |...4.. .j&.....'| -00000030 40 36 ac 2e f4 f5 49 b5 cd 2d 36 14 10 59 89 2a |@6....I..-6..Y.*| -00000040 a4 d4 d7 37 c6 5a 5b |...7.Z[|" -"2019-07-20 02:39:46.867 UTC [policies] Evaluate -> DEBU 53c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:46.870 UTC [gossip.comm] authenticateRemotePeer -> DEBU 53f Authenticated 172.18.0.6:33978" -"2019-07-20 02:39:46.870 UTC [gossip.comm] GossipStream -> DEBU 542 Servicing 172.18.0.6:33978" -"2019-07-20 02:39:46.870 UTC [grpc] infof -> DEBU 543 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:46.870 UTC [policies] Evaluate -> DEBU 540 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:46.870 UTC [cauthdsl] func1 -> DEBU 544 0xc00333efd0 gate 1563590386870913500 evaluation starts" -"2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 545 0xc00333efd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 547 0xc00333efd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 548 0xc00333efd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 549 0xc00333efd0 principal evaluation fails" -"2019-07-20 02:39:46.871 UTC [cauthdsl] func1 -> DEBU 54a 0xc00333efd0 gate 1563590386870913500 evaluation fails" -"2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:46.871 UTC [gossip.comm] func2 -> DEBU 54f Client 172.18.0.6:33978 disconnected" -"2019-07-20 02:39:46.870 UTC [gossip.comm] writeToStream -> DEBU 546 Closing writing to stream" -"2019-07-20 02:39:46.872 UTC [gossip.comm] serviceConnection -> DEBU 552 Closing reading from stream" -"2019-07-20 02:39:46.872 UTC [gossip.comm] writeToStream -> DEBU 553 Closing writing to stream" -"2019-07-20 02:39:46.871 UTC [gossip.comm] readFromStream -> DEBU 54e Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:46.872 UTC [gossip.comm] func2 -> DEBU 554 Client 172.18.0.6:33928 disconnected" -"2019-07-20 02:39:46.872 UTC [comm.grpc.server] 1 -> INFO 555 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:33928 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=14.4132261s -"2019-07-20 02:39:46.871 UTC [cauthdsl] func1 -> DEBU 550 0xc00333f810 gate 1563590386871972100 evaluation starts" -"2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 556 0xc00333f810 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 557 0xc00333f810 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 558 0xc00333f810 principal matched by identity 0" -"2019-07-20 02:39:46.873 UTC [msp.identity] Verify -> DEBU 559 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| -00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" -"2019-07-20 02:39:46.873 UTC [msp.identity] Verify -> DEBU 55a Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| -00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| -00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| -00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| -00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" -"2019-07-20 02:39:46.873 UTC [gossip.comm] readFromStream -> DEBU 55b a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -"2019-07-20 02:39:46.874 UTC [cauthdsl] func2 -> DEBU 55c 0xc00333f810 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:46.870 UTC [gossip.gossip] handleMessage -> DEBU 541 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:580165058965807529 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" -"2019-07-20 02:39:46.872 UTC [comm.grpc.server] 1 -> INFO 551 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:56.856Z grpc.peer_address=172.18.0.6:33978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.9128ms -"2019-07-20 02:39:46.874 UTC [cauthdsl] func1 -> DEBU 55d 0xc00333f810 gate 1563590386871972100 evaluation succeeds" -"2019-07-20 02:39:46.876 UTC [gossip.gossip] handleMessage -> DEBU 55e Exiting" -"2019-07-20 02:39:46.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55f Got message: GossipMessage: nonce:580165058965807529 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" -"2019-07-20 02:39:46.877 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 561 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 562 Verify: digest = 00000000 cd 84 f2 4d a0 ca 90 19 dc e8 13 7f f3 2a 14 d1 |...M.........*..| -00000010 fa d8 d3 a2 37 42 49 99 12 d5 bb 16 8a ad 9a f7 |....7BI.........|" -"2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 563 Verify: sig = 00000000 30 45 02 21 00 d0 bf f2 10 6b bf 25 cb 17 78 34 |0E.!.....k.%..x4| -00000010 82 53 3b 90 a3 64 b3 cb be e8 25 7e 7d c5 f6 3e |.S;..d....%~}..>| -00000020 75 1d 94 93 59 02 20 7a 61 9e af a7 1d 69 e2 9d |u...Y. za....i..| -00000030 00 8b ae 7b 47 4b 06 83 4b a4 d4 f5 6d be f6 75 |...{GK..K...m..u| -00000040 fd b2 62 23 5d 5b 7f |..b#][.|" -"2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 564 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-09-24 00:25:00.230 UTC [gossip.comm] Send -> DEBU 41c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:00.231 UTC [gossip.comm] sendToEndpoint -> DEBU 41d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 00:25:00.231 UTC [gossip.comm] sendToEndpoint -> DEBU 41e Exiting" +"2019-09-24 00:25:00.231 UTC [cauthdsl] func1 -> DEBU 41f 0xc0031cb200 gate 1569284700231881400 evaluation starts" +"2019-09-24 00:25:00.231 UTC [cauthdsl] func2 -> DEBU 420 0xc0031cb200 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:00.231 UTC [cauthdsl] func2 -> DEBU 421 0xc0031cb200 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 422 0xc0031cb200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 423 0xc0031cb200 principal evaluation fails" +"2019-09-24 00:25:00.232 UTC [cauthdsl] func1 -> DEBU 424 0xc0031cb200 gate 1569284700231881400 evaluation fails" +"2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 425 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 426 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 427 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:00.232 UTC [cauthdsl] func1 -> DEBU 428 0xc0031fc380 gate 1569284700232226400 evaluation starts" +"2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 429 0xc0031fc380 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 42a 0xc0031fc380 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:00.232 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 42b Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 00:25:00.232 UTC [msp] Validate -> DEBU 42c MSP Org1MSP validating identity" +"2019-09-24 00:25:00.232 UTC [msp] getCertificationChain -> DEBU 42d MSP Org1MSP getting certification chain" +"2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 42e 0xc0031fc380 principal matched by identity 0" +"2019-09-24 00:25:00.232 UTC [msp.identity] Verify -> DEBU 42f Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +"2019-09-24 00:25:00.232 UTC [msp.identity] Verify -> DEBU 430 Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +00000040 a8 ad f9 eb 4c ce |....L.|" +"2019-09-24 00:25:00.232 UTC [cauthdsl] func2 -> DEBU 431 0xc0031fc380 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:00.232 UTC [cauthdsl] func1 -> DEBU 432 0xc0031fc380 gate 1569284700232226400 evaluation succeeds" +"2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 433 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 434 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 435 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:00.232 UTC [policies] Evaluate -> DEBU 436 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:00.233 UTC [gossip.gossip] handleMessage -> DEBU 437 Exiting" +"2019-09-24 00:25:00.718 UTC [gossip.gossip] handleMessage -> DEBU 438 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:00.718 UTC [gossip.gossip] handleMessage -> DEBU 439 Exiting" +"2019-09-24 00:25:00.725 UTC [gossip.gossip] handleMessage -> DEBU 43a Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:00.725 UTC [gossip.pull] HandleMessage -> DEBU 43b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:00.725 UTC [gossip.gossip] handleMessage -> DEBU 43c Exiting" +"2019-09-24 00:25:00.727 UTC [gossip.gossip] handleMessage -> DEBU 43d Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 00:25:00.727 UTC [msp.identity] Verify -> DEBU 43e Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +"2019-09-24 00:25:00.727 UTC [msp.identity] Verify -> DEBU 43f Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +00000040 a8 ad f9 eb 4c ce |....L.|" +"2019-09-24 00:25:00.728 UTC [gossip.gossip] handleMessage -> DEBU 440 Exiting" +"2019-09-24 00:25:01.220 UTC [gossip.channel] reportMembershipChanges -> INFO 441 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +"2019-09-24 00:25:01.702 UTC [gossip.gossip] handleMessage -> DEBU 442 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:01.702 UTC [gossip.pull] HandleMessage -> DEBU 443 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:01.702 UTC [gossip.pull] SendDigest -> DEBU 444 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:01.702 UTC [gossip.gossip] handleMessage -> DEBU 445 Exiting" +"2019-09-24 00:25:01.717 UTC [gossip.gossip] handleMessage -> DEBU 446 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\r" signature:"0D\002 X\242\344\343\\\307\207T&n\373(\032\273`&{\026EM\317\252\262C\220l\226\354\013\250\223a\002 n\025\267\014\325Z\033y3X[\354\313\245L\010\324!\363@\336p\344\207\025\210\253\317\364\364u\250" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:01.717 UTC [gossip.gossip] handleMessage -> DEBU 447 Exiting" +"2019-09-24 00:25:01.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 448 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\r" signature:"0D\002 X\242\344\343\\\307\207T&n\373(\032\273`&{\026EM\317\252\262C\220l\226\354\013\250\223a\002 n\025\267\014\325Z\033y3X[\354\313\245L\010\324!\363@\336p\344\207\025\210\253\317\364\364u\250" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:01.718 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 449 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:01.718 UTC [msp.identity] Verify -> DEBU 44a Verify: digest = 00000000 34 3f 0e b4 38 ca 1a 65 e6 37 9d a0 dd 73 e5 e8 |4?..8..e.7...s..| +00000010 29 0d 86 27 34 15 00 ff 6e 58 d1 79 05 9a f3 e6 |)..'4...nX.y....|" +"2019-09-24 00:25:01.718 UTC [msp.identity] Verify -> DEBU 44b Verify: sig = 00000000 30 44 02 20 58 a2 e4 e3 5c c7 87 54 26 6e fb 28 |0D. X...\..T&n.(| +00000010 1a bb 60 26 7b 16 45 4d cf aa b2 43 90 6c 96 ec |..`&{.EM...C.l..| +00000020 0b a8 93 61 02 20 6e 15 b7 0c d5 5a 1b 79 33 58 |...a. n....Z.y3X| +00000030 5b ec cb a5 4c 08 d4 21 f3 40 de 70 e4 87 15 88 |[...L..!.@.p....| +00000040 ab cf f4 f4 75 a8 |....u.|" +"2019-09-24 00:25:01.718 UTC [msp.identity] Verify -> DEBU 44c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:39:46.878 UTC [msp.identity] Verify -> DEBU 565 Verify: sig = 00000000 30 44 02 20 04 d5 f4 aa 80 23 d0 2f e4 aa 11 08 |0D. .....#./....| -00000010 50 26 5d 31 5d c6 30 c8 f6 db 9a 50 4e ea a0 10 |P&]1].0....PN...| -00000020 b3 7d d2 0d 02 20 37 3c 15 1c fd 43 09 0d d5 b3 |.}... 7<...C....| -00000030 a7 17 a0 16 69 42 38 04 8c 72 96 9a f8 68 34 89 |....iB8..r...h4.| -00000040 19 01 83 a1 fa 15 |......|" -"2019-07-20 02:39:46.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 566 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:46.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 567 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:39:46.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 568 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 569 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 56a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b Exiting" -"2019-07-20 02:39:46.876 UTC [policies] Evaluate -> DEBU 560 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:46.881 UTC [policies] Evaluate -> DEBU 56c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:46.882 UTC [policies] Evaluate -> DEBU 56d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:46.882 UTC [policies] Evaluate -> DEBU 56e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:46.885 UTC [gossip.gossip] JoinChan -> INFO 56f Joining gossip network of channel businesschannel with 2 organizations" -"2019-07-20 02:39:46.885 UTC [gossip.gossip] learnAnchorPeers -> INFO 570 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -"2019-07-20 02:39:46.885 UTC [gossip.gossip] learnAnchorPeers -> INFO 571 Anchor peer with same endpoint, skipping connecting to myself" -"2019-07-20 02:39:46.887 UTC [gossip.gossip] learnAnchorPeers -> INFO 572 No configured anchor peers of Org2MSP for channel businesschannel to learn about" -"2019-07-20 02:39:46.887 UTC [gossip.service] updateEndpoints -> DEBU 573 Updating endpoints for chainID%!(EXTRA string=businesschannel)" -"2019-07-20 02:39:46.891 UTC [peer] updateTrustedRoots -> DEBU 574 Updating trusted root authorities for channel businesschannel" -"2019-07-20 02:39:46.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 575 Exiting" -"2019-07-20 02:39:46.892 UTC [gossip.discovery] handleMsgFromComm -> DEBU 576 Exiting" -"2019-07-20 02:39:46.892 UTC [gossip.discovery] sendMemResponse -> DEBU 577 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:39:46.896 UTC [gossip.comm] Send -> DEBU 578 Entering, sending GossipMessage: Channel: , nonce: 580165058965807529, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:46.898 UTC [gossip.discovery] sendMemResponse -> DEBU 579 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > alive:\316\367\016A]\027\374i\355.\302v\372\204\340\306D\320\211Z\305\223\232\002 rH]\370\312\310\322\022\010\323\244<\000;\003\362\030\302O\017g\030\252.WV\320pr0\343\203" > > " -"2019-07-20 02:39:46.898 UTC [gossip.comm] sendToEndpoint -> DEBU 57a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 580165058965807529, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes" -"2019-07-20 02:39:46.898 UTC [gossip.comm] createConnection -> DEBU 57b Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:39:46.908 UTC [grpc] DialContext -> DEBU 57c parsed scheme: """ -"2019-07-20 02:39:46.908 UTC [grpc] DialContext -> DEBU 57d scheme "" not registered, fallback to default scheme" -"2019-07-20 02:39:46.908 UTC [grpc] watcher -> DEBU 57e ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" -"2019-07-20 02:39:46.908 UTC [grpc] switchBalancer -> DEBU 57f ClientConn switching balancer to "pick_first"" -"2019-07-20 02:39:46.908 UTC [grpc] HandleSubConnStateChange -> DEBU 580 pickfirstBalancer: HandleSubConnStateChange: 0xc0033ff750, CONNECTING" -"2019-07-20 02:39:46.923 UTC [peer] buildTrustedRootsForChain -> DEBU 581 updating root CAs for channel [businesschannel]" -"2019-07-20 02:39:46.923 UTC [peer] buildTrustedRootsForChain -> DEBU 582 adding app root CAs for MSP [Org1MSP]" -"2019-07-20 02:39:46.924 UTC [peer] buildTrustedRootsForChain -> DEBU 583 adding app root CAs for MSP [Org2MSP]" -"2019-07-20 02:39:46.925 UTC [peer] buildTrustedRootsForChain -> DEBU 584 adding orderer root CAs for MSP [OrdererMSP]" -"2019-07-20 02:39:46.927 UTC [committer.txvalidator] validateTx -> DEBU 585 config transaction received for chain businesschannel" -"2019-07-20 02:39:46.928 UTC [committer.txvalidator] validateTx -> DEBU 586 [businesschannel] validateTx completes for block 0xc0030867c0 env 0xc0030ee6e0 txn 0" -"2019-07-20 02:39:46.928 UTC [committer.txvalidator] Validate -> DEBU 587 got result for idx 0, code 0" -"2019-07-20 02:39:46.928 UTC [committer.txvalidator] Validate -> INFO 588 [businesschannel] Validated block [1] in 123ms" -"2019-07-20 02:39:46.929 UTC [gossip.privdata] listMissingPrivateData -> DEBU 589 Retrieving private write sets for 0 transactions from transient store" -"2019-07-20 02:39:46.929 UTC [gossip.privdata] StoreBlock -> DEBU 58a [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-07-20 02:39:46.929 UTC [committer] preCommit -> DEBU 58b Received configuration update, calling CSCC ConfigUpdate" -"2019-07-20 02:39:46.930 UTC [kvledger] CommitWithPvtData -> DEBU 58c [businesschannel] Validating state for block [1]" -"2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58d Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58e lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58f Validating new block with num trans = [1]" -"2019-07-20 02:39:46.930 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 590 ValidateAndPrepareBatch() for block number = [1]" -"2019-07-20 02:39:46.930 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 591 preprocessing ProtoBlock..." -"2019-07-20 02:39:46.930 UTC [valimpl] preprocessProtoBlock -> DEBU 592 txType=CONFIG" -"2019-07-20 02:39:46.935 UTC [valimpl] processNonEndorserTx -> DEBU 593 Performing custom processing for transaction [txid=], [txType=CONFIG]" -"2019-07-20 02:39:46.935 UTC [valimpl] processNonEndorserTx -> DEBU 594 Processor for custom tx processing:&peer.configtxProcessor{}" -"2019-07-20 02:39:46.935 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 595 constructing new tx simulator" -"2019-07-20 02:39:46.935 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 596 constructing new tx simulator txid = []" -"2019-07-20 02:39:46.935 UTC [peer] GenerateSimulationResults -> DEBU 597 Processing CONFIG" -"2019-07-20 02:39:46.936 UTC [peer] processChannelConfigTx -> DEBU 598 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -"2019-07-20 02:39:46.936 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 599 Simulation completed, getting simulation results" -"2019-07-20 02:39:46.937 UTC [lockbasedtxmgr] Done -> DEBU 59a Done with transaction simulation / query execution []" -"2019-07-20 02:39:46.937 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 59b Block [1] Transaction index [0] TxId [] marked as valid by state validator" -"2019-07-20 02:39:46.937 UTC [valinternal] ApplyWriteSet -> DEBU 59c txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0034a4340)}" -"2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59d validating rwset..." -"2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59e postprocessing ProtoBlock..." -"2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59f ValidateAndPrepareBatch() complete" -"2019-07-20 02:39:46.938 UTC [kvledger] CommitWithPvtData -> DEBU 5a0 [businesschannel] Adding CommitHash to the block [1]" -"2019-07-20 02:39:46.938 UTC [kvledger] CommitWithPvtData -> DEBU 5a1 [businesschannel] Committing block [1] to storage" -"2019-07-20 02:39:46.938 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5a2 Writing block [1] to pvt block store" -"2019-07-20 02:39:46.940 UTC [pvtdatastorage] Prepare -> DEBU 5a3 Saved 0 private data write sets for block [1]" -"2019-07-20 02:39:46.941 UTC [fsblkstorage] indexBlock -> DEBU 5a4 Indexing block [blockNum=1, blockHash=[]byte{0xad, 0x6d, 0x1e, 0xa9, 0x18, 0xba, 0xbc, 0xca, 0xf6, 0xcf, 0x8e, 0xc0, 0x90, 0xeb, 0x4b, 0xfb, 0x6e, 0x2f, 0xc6, 0x7d, 0xf5, 0x4e, 0x4d, 0x7d, 0x6, 0xa6, 0xef, 0x4f, 0x93, 0x80, 0x1f, 0xd9} txOffsets= -txId=4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94 locPointer=offset=71, bytesLength=22685 -]" -"2019-07-20 02:39:46.941 UTC [fsblkstorage] indexBlock -> DEBU 5a5 Adding txLoc [fileSuffixNum=0, offset=24019, bytesLength=22685] for tx ID: [4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94] to txid-index" -"2019-07-20 02:39:46.942 UTC [fsblkstorage] indexBlock -> DEBU 5a6 Adding txLoc [fileSuffixNum=0, offset=24019, bytesLength=22685] for tx number:[0] ID: [4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94] to blockNumTranNum index" -"2019-07-20 02:39:46.943 UTC [comm.grpc.server] 1 -> INFO 5a7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.941Z grpc.peer_address=172.18.0.6:33980 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=633.9µs -"2019-07-20 02:39:46.943 UTC [fsblkstorage] updateCheckpoint -> DEBU 5a8 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47677], isChainEmpty=[false], lastBlockNumber=[1]" -"2019-07-20 02:39:46.944 UTC [pvtdatastorage] Commit -> DEBU 5a9 Committing private data for block [1]" -"2019-07-20 02:39:46.945 UTC [msp] GetDefaultSigningIdentity -> DEBU 5aa Obtaining default signing identity" -"2019-07-20 02:39:46.945 UTC [msp.identity] Sign -> DEBU 5ab Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:46.945 UTC [msp.identity] Sign -> DEBU 5ac Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:46.946 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ad Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33980" -"2019-07-20 02:39:46.946 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ae Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33980" -"2019-07-20 02:39:46.947 UTC [pvtdatastorage] Commit -> DEBU 5af Committed private data for block [1]" -"2019-07-20 02:39:46.947 UTC [msp.identity] Verify -> DEBU 5b0 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-07-20 02:39:46.947 UTC [msp.identity] Verify -> DEBU 5b1 Verify: sig = 00000000 30 45 02 21 00 c6 00 24 ca 9b 7c 79 5f aa f1 d8 |0E.!...$..|y_...| -00000010 49 b1 94 84 23 ca b1 74 68 be 9a 8a f2 af 9e 5b |I...#..th......[| -00000020 44 d8 d5 60 94 02 20 56 85 55 3c fc 1d e8 72 06 |D..`.. V.U<...r.| -00000030 3e a0 b9 ee 08 40 46 4e 05 6d 49 59 75 e1 2e 9d |>....@FN.mIYu...| -00000040 b2 2f ad 1b ae af 10 |./.....|" -"2019-07-20 02:39:46.947 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5b2 Authenticated 172.18.0.6:33980" -"2019-07-20 02:39:46.947 UTC [gossip.comm] GossipStream -> DEBU 5b3 Servicing 172.18.0.6:33980" -"2019-07-20 02:39:46.948 UTC [kvledger] CommitWithPvtData -> DEBU 5b4 [businesschannel] Committing block [1] transactions to state database" -"2019-07-20 02:39:46.948 UTC [lockbasedtxmgr] Commit -> DEBU 5b5 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-07-20 02:39:46.950 UTC [lockbasedtxmgr] Commit -> DEBU 5b6 Committing updates to state database" -"2019-07-20 02:39:46.950 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5b7 Building the expiry schedules based on the update batch" -"2019-07-20 02:39:46.950 UTC [lockbasedtxmgr] Commit -> DEBU 5b8 Write lock acquired for committing updates to state database" -"2019-07-20 02:39:46.951 UTC [stateleveldb] ApplyUpdates -> DEBU 5b9 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -"2019-07-20 02:39:46.952 UTC [grpc] HandleSubConnStateChange -> DEBU 5ba pickfirstBalancer: HandleSubConnStateChange: 0xc0033ff750, READY" -"2019-07-20 02:39:46.954 UTC [lockbasedtxmgr] Commit -> DEBU 5bb Updates committed to state database and the write lock is released" -"2019-07-20 02:39:46.954 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5bc Preparing potential purge list working-set for expiringAtBlk [2]" -"2019-07-20 02:39:46.954 UTC [leveldbhelper] GetIterator -> DEBU 5bd Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" -"2019-07-20 02:39:46.954 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5be No expiry entry found for expiringAtBlk [2]" -"2019-07-20 02:39:46.955 UTC [lockbasedtxmgr] func1 -> DEBU 5bf launched the background routine for preparing keys to purge with the next block" -"2019-07-20 02:39:46.955 UTC [grpc] infof -> DEBU 5c0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:46.955 UTC [kvledger] CommitWithPvtData -> DEBU 5c1 [businesschannel] Committing block [1] transactions to history database" -"2019-07-20 02:39:46.955 UTC [historyleveldb] Commit -> DEBU 5c3 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" -"2019-07-20 02:39:46.956 UTC [historyleveldb] Commit -> DEBU 5c6 Skipping transaction [0] since it is not an endorsement transaction" -"2019-07-20 02:39:46.955 UTC [gossip.comm] func2 -> DEBU 5c4 Client 172.18.0.6:33980 disconnected" -"2019-07-20 02:39:46.955 UTC [grpc] infof -> DEBU 5c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:46.955 UTC [gossip.comm] readFromStream -> DEBU 5c2 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:46.957 UTC [msp] GetDefaultSigningIdentity -> DEBU 5c7 Obtaining default signing identity" -"2019-07-20 02:39:46.957 UTC [msp.identity] Sign -> DEBU 5ca Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:46.957 UTC [msp.identity] Sign -> DEBU 5cb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:46.957 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5cc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051" -"2019-07-20 02:39:46.957 UTC [comm.grpc.server] 1 -> INFO 5c8 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:56.945Z grpc.peer_address=172.18.0.6:33980 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6697ms -"2019-07-20 02:39:46.957 UTC [gossip.comm] writeToStream -> DEBU 5c9 Closing writing to stream" -"2019-07-20 02:39:46.958 UTC [historyleveldb] Commit -> DEBU 5cd Channel [businesschannel]: Updates committed to history database for blockNo [1]" -"2019-07-20 02:39:46.958 UTC [kvledger] CommitWithPvtData -> INFO 5ce [businesschannel] Committed block [1] with 1 transaction(s) in 28ms (state_validation=8ms block_and_pvtdata_commit=9ms state_commit=7ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" -"2019-07-20 02:39:46.959 UTC [msp] GetDefaultSigningIdentity -> DEBU 5cf Obtaining default signing identity" -"2019-07-20 02:39:46.960 UTC [msp.identity] Sign -> DEBU 5d0 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020802 " -"2019-07-20 02:39:46.961 UTC [msp.identity] Sign -> DEBU 5d2 Sign: digest: 50DAFA02918444C69E8D5B3E6A35836CE1EA25019336CA398AFA5A43E6AE0493 " -"2019-07-20 02:39:46.961 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5d1 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:7051" -"2019-07-20 02:39:46.962 UTC [gossip.state] commitBlock -> DEBU 5d3 [businesschannel] Committed block [1] with 1 transaction(s)" -"2019-07-20 02:39:46.962 UTC [gossip.state] deliverPayloads -> DEBU 5d4 [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" -"2019-07-20 02:39:46.962 UTC [gossip.privdata] StoreBlock -> INFO 5d5 [businesschannel] Received block [2] from buffer" -"2019-07-20 02:39:46.962 UTC [msp.identity] Verify -> DEBU 5d6 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| -00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-07-20 02:39:46.963 UTC [msp.identity] Verify -> DEBU 5d8 Verify: sig = 00000000 30 44 02 20 0b f1 7c cc 6c b4 48 eb 91 f2 f1 19 |0D. ..|.l.H.....| -00000010 fc 62 08 0d 35 3f 49 b2 86 ae c9 a7 9c 71 8e 4c |.b..5?I......q.L| -00000020 96 eb 7a fc 02 20 55 90 38 56 a4 36 e3 ea 32 53 |..z.. U.8V.6..2S| -00000030 77 ab 19 e2 95 fa 1f b2 c3 d4 90 4d 74 5b 9b b5 |w..........Mt[..| -00000040 65 a8 15 be f4 15 |e.....|" -"2019-07-20 02:39:46.962 UTC [gossip.privdata] StoreBlock -> DEBU 5d7 [businesschannel] Validating block [2]" -"2019-07-20 02:39:46.963 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5d9 Authenticated 172.18.0.6:7051" -"2019-07-20 02:39:46.963 UTC [gossip.comm] createConnection -> DEBU 5da Exiting" -"2019-07-20 02:39:46.963 UTC [gossip.comm] sendToEndpoint -> DEBU 5db Exiting" -"2019-07-20 02:39:46.963 UTC [committer.txvalidator] Validate -> DEBU 5dc [businesschannel] START Block Validation for block [2]" -"2019-07-20 02:39:46.964 UTC [committer.txvalidator] Validate -> DEBU 5dd expecting 1 block validation responses" -"2019-07-20 02:39:46.964 UTC [committer.txvalidator] validateTx -> DEBU 5de [businesschannel] validateTx starts for block 0xc003516200 env 0xc00353d860 txn 0" -"2019-07-20 02:39:46.965 UTC [protoutils] ValidateTransaction -> DEBU 5df ValidateTransactionEnvelope starts for envelope 0xc00353d860" -"2019-07-20 02:39:46.965 UTC [protoutils] ValidateTransaction -> DEBU 5e0 Header is channel_header:"\010\001\032\006\010\361\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\325\335\034\246UK\017C\017\277\223\305\031\025\215\353\232\0222[\305wxl" " -"2019-07-20 02:39:46.965 UTC [protoutils] validateChannelHeader -> DEBU 5e1 validateChannelHeader info: header type 1" -"2019-07-20 02:39:46.965 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e2 begin" -"2019-07-20 02:39:46.966 UTC [msp] GetManagerForChain -> DEBU 5e3 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:39:46.966 UTC [msp] DeserializeIdentity -> DEBU 5e4 Obtaining identity" -"2019-07-20 02:39:46.967 UTC [msp.identity] newIdentity -> DEBU 5e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:01.718 UTC [msp.identity] Verify -> DEBU 44d Verify: sig = 00000000 30 44 02 20 23 f7 a0 a6 90 e1 c8 43 03 8d fe ab |0D. #......C....| +00000010 ec b7 ef ea 23 bc 10 0a 6f 3c 5f d0 47 89 ef a3 |....#...o<_.G...| +00000020 28 d3 9b 9a 02 20 43 fa d6 d8 74 17 9e a6 c1 45 |(.... C...t....E| +00000030 ff 9f 0a 3f 50 c0 87 0b b3 43 f2 97 6d 36 a0 5c |...?P....C..m6.\| +00000040 28 f0 79 6e dd 94 |(.yn..|" +"2019-09-24 00:25:01.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 44e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:01.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 44f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:01.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 450 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:01.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 451 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:01.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 452 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:01.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 453 Exiting" +"2019-09-24 00:25:01.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 454 Exiting" +"2019-09-24 00:25:01.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 455 Exiting" +"2019-09-24 00:25:01.718 UTC [gossip.discovery] sendMemResponse -> DEBU 456 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:01.719 UTC [gossip.comm] Send -> DEBU 457 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:01.719 UTC [gossip.discovery] sendMemResponse -> DEBU 458 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\r" signature:"0D\002 X\242\344\343\\\307\207T&n\373(\032\273`&{\026EM\317\252\262C\220l\226\354\013\250\223a\002 n\025\267\014\325Z\033y3X[\354\313\245L\010\324!\363@\336p\344\207\025\210\253\317\364\364u\250" secret_envelope: > alive:\023Bu\210\022\313\250G\275Y2I\366\340\210\346\341t\303ih\202\026mo\356\353\3046\255\037" secret_envelope:\375\031\354\247J\206\277" > > " +"2019-09-24 00:25:01.719 UTC [gossip.comm] sendToEndpoint -> DEBU 459 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-09-24 00:25:01.719 UTC [gossip.comm] sendToEndpoint -> DEBU 45a Exiting" +"2019-09-24 00:25:02.015 UTC [endorser] ProcessProposal -> DEBU 45b Entering: request from 172.18.0.9:50594" +"2019-09-24 00:25:02.015 UTC [protoutils] ValidateProposalMessage -> DEBU 45c ValidateProposalMessage starts for signed proposal 0xc0031f2460" +"2019-09-24 00:25:02.015 UTC [protoutils] validateChannelHeader -> DEBU 45d validateChannelHeader info: header type 3" +"2019-09-24 00:25:02.015 UTC [protoutils] checkSignatureFromCreator -> DEBU 45e begin" +"2019-09-24 00:25:02.015 UTC [protoutils] checkSignatureFromCreator -> DEBU 45f creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:25:02.016 UTC [protoutils] checkSignatureFromCreator -> DEBU 460 creator is valid" +"2019-09-24 00:25:02.016 UTC [msp.identity] Verify -> DEBU 461 Verify: digest = 00000000 55 53 e4 5b 92 bd 4b 00 a2 d0 e1 e3 cd 49 33 22 |US.[..K......I3"| +00000010 13 c5 52 3d 94 81 d2 a4 74 f5 fe 30 19 60 c5 bd |..R=....t..0.`..|" +"2019-09-24 00:25:02.016 UTC [msp.identity] Verify -> DEBU 462 Verify: sig = 00000000 30 45 02 21 00 c0 b0 01 ae bd 9e a8 94 bb 8b f4 |0E.!............| +00000010 97 e5 9e 00 8d 2e 4f 94 cd 82 11 dd af a8 94 bf |......O.........| +00000020 c6 11 e8 08 db 02 20 07 c1 f6 b9 f3 b6 45 38 1b |...... ......E8.| +00000030 00 a6 16 b8 52 58 74 be 27 60 db 34 9d ee 63 d0 |....RXt.'`.4..c.| +00000040 d2 57 75 a3 12 74 69 |.Wu..ti|" +"2019-09-24 00:25:02.016 UTC [protoutils] checkSignatureFromCreator -> DEBU 463 exits successfully" +"2019-09-24 00:25:02.016 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 464 validateChaincodeProposalMessage starts for proposal 0xc003143880, header 0xc0031f2870" +"2019-09-24 00:25:02.016 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 465 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-09-24 00:25:02.016 UTC [endorser] preProcess -> DEBU 466 [][18bf9b60] processing txid: 18bf9b60fcbc59b65efd5fea3f16ecaf7278cb17f2f6ed685f8894d149290819" +"2019-09-24 00:25:02.016 UTC [endorser] SimulateProposal -> DEBU 467 [][18bf9b60] Entry chaincode: name:"qscc" " +"2019-09-24 00:25:02.016 UTC [endorser] callChaincode -> INFO 468 [][18bf9b60] Entry chaincode: name:"qscc" " +"2019-09-24 00:25:02.016 UTC [chaincode] Execute -> DEBU 469 Entry" +"2019-09-24 00:25:02.017 UTC [qscc] Invoke -> DEBU 46a Invoke function: GetChainInfo on chain: businesschannel" +"2019-09-24 00:25:02.017 UTC [aclmgmt] CheckACL -> DEBU 46b acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-09-24 00:25:02.017 UTC [aclmgmt] CheckACL -> DEBU 46c acl check(/Channel/Application/Readers)" +"2019-09-24 00:25:02.017 UTC [policies] Evaluate -> DEBU 46d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:02.017 UTC [policies] Evaluate -> DEBU 46e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:02.017 UTC [policies] Evaluate -> DEBU 46f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:02.017 UTC [msp] DeserializeIdentity -> DEBU 470 Obtaining identity" +"2019-09-24 00:25:02.018 UTC [msp.identity] newIdentity -> DEBU 471 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:02.018 UTC [cauthdsl] func1 -> DEBU 472 0xc0032690f0 gate 1569284702018489600 evaluation starts" +"2019-09-24 00:25:02.018 UTC [cauthdsl] func2 -> DEBU 473 0xc0032690f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:02.018 UTC [cauthdsl] func2 -> DEBU 474 0xc0032690f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:02.018 UTC [cauthdsl] func2 -> DEBU 475 0xc0032690f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 00:25:02.018 UTC [cauthdsl] func2 -> DEBU 476 0xc0032690f0 principal evaluation fails" +"2019-09-24 00:25:02.018 UTC [cauthdsl] func1 -> DEBU 477 0xc0032690f0 gate 1569284702018489600 evaluation fails" +"2019-09-24 00:25:02.018 UTC [policies] Evaluate -> DEBU 478 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:02.018 UTC [policies] Evaluate -> DEBU 479 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:02.018 UTC [policies] Evaluate -> DEBU 47a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:02.018 UTC [cauthdsl] func1 -> DEBU 47b 0xc00327e270 gate 1569284702018964500 evaluation starts" +"2019-09-24 00:25:02.019 UTC [cauthdsl] func2 -> DEBU 47c 0xc00327e270 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:02.019 UTC [cauthdsl] func2 -> DEBU 47d 0xc00327e270 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:02.019 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 47e Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 00:25:02.019 UTC [msp] Validate -> DEBU 47f MSP Org1MSP validating identity" +"2019-09-24 00:25:02.020 UTC [msp] getCertificationChain -> DEBU 480 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:02.020 UTC [cauthdsl] func2 -> DEBU 481 0xc00327e270 principal matched by identity 0" +"2019-09-24 00:25:02.020 UTC [msp.identity] Verify -> DEBU 482 Verify: digest = 00000000 55 53 e4 5b 92 bd 4b 00 a2 d0 e1 e3 cd 49 33 22 |US.[..K......I3"| +00000010 13 c5 52 3d 94 81 d2 a4 74 f5 fe 30 19 60 c5 bd |..R=....t..0.`..|" +"2019-09-24 00:25:02.020 UTC [msp.identity] Verify -> DEBU 483 Verify: sig = 00000000 30 45 02 21 00 c0 b0 01 ae bd 9e a8 94 bb 8b f4 |0E.!............| +00000010 97 e5 9e 00 8d 2e 4f 94 cd 82 11 dd af a8 94 bf |......O.........| +00000020 c6 11 e8 08 db 02 20 07 c1 f6 b9 f3 b6 45 38 1b |...... ......E8.| +00000030 00 a6 16 b8 52 58 74 be 27 60 db 34 9d ee 63 d0 |....RXt.'`.4..c.| +00000040 d2 57 75 a3 12 74 69 |.Wu..ti|" +"2019-09-24 00:25:02.020 UTC [cauthdsl] func2 -> DEBU 484 0xc00327e270 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:02.020 UTC [cauthdsl] func1 -> DEBU 485 0xc00327e270 gate 1569284702018964500 evaluation succeeds" +"2019-09-24 00:25:02.020 UTC [policies] Evaluate -> DEBU 486 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:02.020 UTC [policies] Evaluate -> DEBU 487 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:02.020 UTC [policies] Evaluate -> DEBU 488 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:02.020 UTC [policies] Evaluate -> DEBU 489 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:02.020 UTC [chaincode] handleMessage -> DEBU 48a [18bf9b60] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:25:02.020 UTC [chaincode] Notify -> DEBU 48b [18bf9b60] notifying Txid:18bf9b60fcbc59b65efd5fea3f16ecaf7278cb17f2f6ed685f8894d149290819, channelID:" +"2019-09-24 00:25:02.020 UTC [chaincode] Execute -> DEBU 48c Exit" +"2019-09-24 00:25:02.021 UTC [endorser] callChaincode -> INFO 48d [][18bf9b60] Exit chaincode: name:"qscc" (4ms)" +"2019-09-24 00:25:02.021 UTC [endorser] SimulateProposal -> DEBU 48e [][18bf9b60] Exit" +"2019-09-24 00:25:02.021 UTC [endorser] func1 -> DEBU 48f Exit: request from 172.18.0.9:50594" +"2019-09-24 00:25:02.021 UTC [comm.grpc.server] 1 -> INFO 490 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50594 grpc.code=OK grpc.call_duration=6.2364ms +"2019-09-24 00:25:02.035 UTC [grpc] infof -> DEBU 491 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:02.302 UTC [gossip.election] waitForInterrupt -> DEBU 492 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:02.303 UTC [gossip.election] beLeader -> INFO 493 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +"2019-09-24 00:25:02.303 UTC [gossip.service] func1 -> INFO 494 Elected as a leader, starting delivery service for channel businesschannel" +"2019-09-24 00:25:02.304 UTC [deliveryClient] StartDeliverForChannel -> DEBU 495 This peer will pass blocks from orderer service to other peers for channel businesschannel" +"2019-09-24 00:25:02.304 UTC [gossip.election] leaderElection -> DEBU 496 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:02.304 UTC [gossip.election] IsLeader -> DEBU 497 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:25:02.304 UTC [ConnProducer] NewConnection -> DEBU 498 Creating a new connection" +"2019-09-24 00:25:02.304 UTC [msp] GetDefaultSigningIdentity -> DEBU 499 Obtaining default signing identity" +"2019-09-24 00:25:02.304 UTC [msp.identity] Sign -> DEBU 49a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510021801 " +"2019-09-24 00:25:02.304 UTC [msp.identity] Sign -> DEBU 49b Sign: digest: 16330C4B0ADC798E403D4DE5CE0380A099BBF9F0A5D6CCBF6E2C63B59C937C49 " +"2019-09-24 00:25:02.304 UTC [gossip.election] waitForInterrupt -> DEBU 49c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:25:02.306 UTC [grpc] DialContext -> DEBU 49d parsed scheme: """ +"2019-09-24 00:25:02.306 UTC [grpc] DialContext -> DEBU 49e scheme "" not registered, fallback to default scheme" +"2019-09-24 00:25:02.306 UTC [grpc] watcher -> DEBU 49f ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +"2019-09-24 00:25:02.306 UTC [grpc] switchBalancer -> DEBU 4a0 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:25:02.307 UTC [grpc] HandleSubConnStateChange -> DEBU 4a1 pickfirstBalancer: HandleSubConnStateChange: 0xc0032b1d20, CONNECTING" +"2019-09-24 00:25:02.309 UTC [gossip.comm] Send -> DEBU 4a2 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:25:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4a4 Exiting" +"2019-09-24 00:25:02.323 UTC [grpc] HandleSubConnStateChange -> DEBU 4a5 pickfirstBalancer: HandleSubConnStateChange: 0xc0032b1d20, READY" +"2019-09-24 00:25:02.324 UTC [ConnProducer] NewConnection -> DEBU 4a6 Connected to {orderer1.example.com:7050 [OrdererMSP]}" +"2019-09-24 00:25:02.324 UTC [deliveryClient] connect -> DEBU 4a7 Connected to orderer1.example.com:7050" +"2019-09-24 00:25:02.324 UTC [deliveryClient] connect -> DEBU 4a8 Establishing gRPC stream with orderer1.example.com:7050 ..." +"2019-09-24 00:25:02.324 UTC [deliveryClient] afterConnect -> DEBU 4a9 Entering" +"2019-09-24 00:25:02.325 UTC [deliveryClient] RequestBlocks -> DEBU 4aa Starting deliver with block [1] for channel businesschannel" +"2019-09-24 00:25:02.325 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ab Obtaining default signing identity" +"2019-09-24 00:25:02.328 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ac Obtaining default signing identity" +"2019-09-24 00:25:02.328 UTC [msp.identity] Sign -> DEBU 4ad Sign: plaintext: 0A91070A3D08051A0608DEC4A5EC0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " +"2019-09-24 00:25:02.328 UTC [msp.identity] Sign -> DEBU 4ae Sign: digest: 101231B2F73DC3D5EB3249BF16DE04C91E162D2C76EBA3809392C4625FC43D17 " +"2019-09-24 00:25:02.328 UTC [deliveryClient] afterConnect -> DEBU 4af Exiting" +"2019-09-24 00:25:02.705 UTC [gossip.gossip] handleMessage -> DEBU 4b0 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:02.705 UTC [gossip.gossip] handleMessage -> DEBU 4b1 Exiting" +"2019-09-24 00:25:02.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:02.705 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:02.705 UTC [msp.identity] Verify -> DEBU 4b4 Verify: digest = 00000000 58 62 7b 62 cd 7f b6 e2 c4 83 ca dd e6 41 da 84 |Xb{b.........A..| +00000010 ab 64 d6 04 73 af 05 5a 24 35 6e 05 7c 10 a5 ff |.d..s..Z$5n.|...|" +"2019-09-24 00:25:02.705 UTC [msp.identity] Verify -> DEBU 4b5 Verify: sig = 00000000 30 45 02 21 00 ed dd 15 67 c4 98 20 ea d3 d8 d7 |0E.!....g.. ....| +00000010 1f e6 b4 e4 59 c2 b8 70 87 eb fd 5d 64 da 9d 39 |....Y..p...]d..9| +00000020 2b 4d 91 62 d8 02 20 23 1e 13 81 d3 36 56 ff e4 |+M.b.. #....6V..| +00000030 26 59 30 bd 1a 43 55 bd 1d 93 27 b6 31 c9 9d 95 |&Y0..CU...'.1...| +00000040 04 ce 16 72 db a2 8a |...r...|" +"2019-09-24 00:25:02.706 UTC [msp.identity] Verify -> DEBU 4b6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:02.706 UTC [msp.identity] Verify -> DEBU 4b7 Verify: sig = 00000000 30 44 02 20 44 0a 53 ca 64 05 7e 26 a7 25 de 89 |0D. D.S.d.~&.%..| +00000010 49 0d a3 ee ed 80 92 66 95 aa 5a 1e d2 e2 4f 53 |I......f..Z...OS| +00000020 06 2c 84 03 02 20 39 fe 1b d2 32 ad 87 87 ce a5 |.,... 9...2.....| +00000030 1f cc 10 68 b8 44 0d a9 85 1e ad f5 f2 75 48 37 |...h.D.......uH7| +00000040 38 44 aa d4 47 1a |8D..G.|" +"2019-09-24 00:25:02.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:02.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:02.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ba updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:02.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:02.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:02.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bd Exiting" +"2019-09-24 00:25:02.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 4be Exiting" +"2019-09-24 00:25:02.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bf Exiting" +"2019-09-24 00:25:03.607 UTC [gossip.pull] Hello -> DEBU 4c0 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:03.607 UTC [gossip.comm] Send -> DEBU 4c1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:03.607 UTC [gossip.comm] sendToEndpoint -> DEBU 4c2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:03.607 UTC [gossip.comm] sendToEndpoint -> DEBU 4c3 Exiting" +"2019-09-24 00:25:03.608 UTC [gossip.gossip] handleMessage -> DEBU 4c4 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 00:25:03.608 UTC [gossip.pull] HandleMessage -> DEBU 4c5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 00:25:03.608 UTC [gossip.gossip] handleMessage -> DEBU 4c6 Exiting" +"2019-09-24 00:25:03.611 UTC [msp] GetDefaultSigningIdentity -> DEBU 4c7 Obtaining default signing identity" +"2019-09-24 00:25:03.611 UTC [msp.identity] Sign -> DEBU 4c8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100E " +"2019-09-24 00:25:03.611 UTC [msp.identity] Sign -> DEBU 4c9 Sign: digest: 147548AFB50BA67FE01DDBC1E73EF842877143C9F8ADE87B8F8E37896B6197C0 " +"2019-09-24 00:25:03.611 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ca Obtaining default signing identity" +"2019-09-24 00:25:03.611 UTC [msp.identity] Sign -> DEBU 4cb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:03.612 UTC [msp.identity] Sign -> DEBU 4cc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:03.612 UTC [gossip.comm] Send -> DEBU 4cd Entering, sending GossipMessage: tag:EMPTY mem_req:\353\247\262" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:03.612 UTC [gossip.comm] sendToEndpoint -> DEBU 4ce Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\353\247\262" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:03.612 UTC [gossip.comm] sendToEndpoint -> DEBU 4cf Exiting" +"2019-09-24 00:25:03.614 UTC [gossip.gossip] handleMessage -> DEBU 4d0 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-09-24 00:25:03.614 UTC [gossip.gossip] handleMessage -> DEBU 4d1 Exiting" +"2019-09-24 00:25:03.614 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-09-24 00:25:03.614 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:03.614 UTC [msp.identity] Verify -> DEBU 4d4 Verify: digest = 00000000 14 75 48 af b5 0b a6 7f e0 1d db c1 e7 3e f8 42 |.uH..........>.B| +00000010 87 71 43 c9 f8 ad e8 7b 8f 8e 37 89 6b 61 97 c0 |.qC....{..7.ka..|" +"2019-09-24 00:25:03.614 UTC [msp.identity] Verify -> DEBU 4d5 Verify: sig = 00000000 30 44 02 20 1c a0 36 1f 33 9a 1f 0b d4 d7 39 86 |0D. ..6.3.....9.| +00000010 83 e2 c0 cc 9f 3f 1e 99 de 30 a8 ca 03 37 9b bc |.....?...0...7..| +00000020 2d f9 d5 d1 02 20 14 17 ac 57 e2 02 10 8f 24 42 |-.... ...W....$B| +00000030 56 d0 37 e9 7d 4e af 5d e7 6b 5e 83 a4 ba f4 18 |V.7.}N.].k^.....| +00000040 05 03 3e eb a7 b2 |..>...|" +"2019-09-24 00:25:03.615 UTC [msp.identity] Verify -> DEBU 4d6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:03.615 UTC [msp.identity] Verify -> DEBU 4d7 Verify: sig = 00000000 30 44 02 20 20 2d dd 55 4e c3 64 2c 85 19 eb 29 |0D. -.UN.d,...)| +00000010 b8 86 11 be 76 20 a2 61 9b b9 2b 6f 89 2f f4 6f |....v .a..+o./.o| +00000020 18 d8 b1 e2 02 20 10 2e 50 d5 ab a4 23 20 18 b4 |..... ..P...# ..| +00000030 a0 1c fd 4e 45 c8 b9 9c ea 1f 83 9c ed 28 e2 bf |...NE........(..| +00000040 a9 f0 6c 38 e0 79 |..l8.y|" +"2019-09-24 00:25:03.616 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:03.616 UTC [gossip.discovery] isSentByMe -> DEBU 4d9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:03.616 UTC [gossip.discovery] handleAliveMessage -> DEBU 4da Exiting" +"2019-09-24 00:25:03.617 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4db Exiting" +"2019-09-24 00:25:04.219 UTC [gossip.comm] Send -> DEBU 4dc Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:04.220 UTC [gossip.pull] Hello -> DEBU 4dd Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:04.220 UTC [gossip.comm] Send -> DEBU 4de Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:04.220 UTC [gossip.comm] sendToEndpoint -> DEBU 4df Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:04.220 UTC [gossip.comm] sendToEndpoint -> DEBU 4e0 Exiting" +"2019-09-24 00:25:04.220 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:04.220 UTC [gossip.comm] sendToEndpoint -> DEBU 4e2 Exiting" +"2019-09-24 00:25:04.222 UTC [gossip.gossip] handleMessage -> DEBU 4e3 Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes" +"2019-09-24 00:25:04.222 UTC [msp.identity] Verify -> DEBU 4e4 Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +"2019-09-24 00:25:04.222 UTC [msp.identity] Verify -> DEBU 4e5 Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +00000040 a8 ad f9 eb 4c ce |....L.|" +"2019-09-24 00:25:04.223 UTC [msp.identity] Verify -> DEBU 4e6 Verify: digest = 00000000 01 c3 83 f1 15 d3 f7 90 10 55 d7 17 42 99 85 b9 |.........U..B...| +00000010 71 66 f1 68 5a e0 21 62 05 12 57 37 dd 26 b1 ab |qf.hZ.!b..W7.&..|" +"2019-09-24 00:25:04.223 UTC [msp.identity] Verify -> DEBU 4e7 Verify: sig = 00000000 30 44 02 20 66 11 5f 81 fb 7e 19 3a 27 09 3f 44 |0D. f._..~.:'.?D| +00000010 c8 f2 51 d0 96 f5 20 e3 a9 1a b8 da 4a 77 ca cb |..Q... .....Jw..| +00000020 f8 90 a1 58 02 20 41 53 30 55 18 a3 7d e6 ac 47 |...X. AS0U..}..G| +00000030 b3 17 48 1d 9d 73 6d 51 e1 46 9e 81 bb dd 43 e3 |..H..smQ.F....C.| +00000040 ca 46 2d 3f 0c cf |.F-?..|" +"2019-09-24 00:25:04.223 UTC [gossip.gossip] handleMessage -> DEBU 4e8 Exiting" +"2019-09-24 00:25:04.515 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 4e9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.515 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 4ea Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.515 UTC [policies] Evaluate -> DEBU 4eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 00:25:04.516 UTC [policies] Evaluate -> DEBU 4ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.516 UTC [policies] Evaluate -> DEBU 4ed == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:25:04.516 UTC [msp] DeserializeIdentity -> DEBU 4ee Obtaining identity" +"2019-09-24 00:25:04.516 UTC [msp.identity] newIdentity -> DEBU 4ef Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO +CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM +SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q +1A== +-----END CERTIFICATE-----" +"2019-09-24 00:25:04.516 UTC [cauthdsl] func1 -> DEBU 4f0 0xc003340a50 gate 1569284704516773600 evaluation starts" +"2019-09-24 00:25:04.516 UTC [cauthdsl] func2 -> DEBU 4f1 0xc003340a50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.517 UTC [cauthdsl] func2 -> DEBU 4f2 0xc003340a50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:04.517 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f3 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 00:25:04.517 UTC [msp] Validate -> DEBU 4f4 MSP OrdererMSP validating identity" +"2019-09-24 00:25:04.518 UTC [cauthdsl] func2 -> DEBU 4f5 0xc003340a50 principal matched by identity 0" +"2019-09-24 00:25:04.518 UTC [msp.identity] Verify -> DEBU 4f6 Verify: digest = 00000000 d2 1e 72 70 67 b2 06 6d 7c de 9c 54 89 82 75 31 |..rpg..m|..T..u1| +00000010 a3 ca d1 43 4b bd 00 28 43 cd b5 03 06 5d c9 ad |...CK..(C....]..|" +"2019-09-24 00:25:04.518 UTC [msp.identity] Verify -> DEBU 4f7 Verify: sig = 00000000 30 44 02 20 11 98 88 db 58 46 3a 75 bf 72 8d 6f |0D. ....XF:u.r.o| +00000010 e9 0b 97 34 f1 60 c2 f7 80 1d b3 e8 52 64 31 ed |...4.`......Rd1.| +00000020 99 a9 c7 02 02 20 61 fd 6b 36 ff 08 bd 18 11 23 |..... a.k6.....#| +00000030 23 46 21 1e a9 64 e5 c9 08 c7 29 50 24 4b 44 ab |#F!..d....)P$KD.| +00000040 f5 3d 76 0b b2 17 |.=v...|" +"2019-09-24 00:25:04.518 UTC [cauthdsl] func2 -> DEBU 4f8 0xc003340a50 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.519 UTC [cauthdsl] func1 -> DEBU 4f9 0xc003340a50 gate 1569284704516773600 evaluation succeeds" +"2019-09-24 00:25:04.519 UTC [policies] Evaluate -> DEBU 4fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:04.519 UTC [policies] Evaluate -> DEBU 4fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:04.519 UTC [policies] Evaluate -> DEBU 4fc Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:04.519 UTC [policies] Evaluate -> DEBU 4fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:04.519 UTC [blocksProvider] DeliverBlocks -> DEBU 4fe [businesschannel] Adding payload to local buffer, blockNum = [1]" +"2019-09-24 00:25:04.519 UTC [gossip.state] addPayload -> DEBU 4ff [businesschannel] Adding payload to local buffer, blockNum = [1]" +"2019-09-24 00:25:04.523 UTC [gossip.state] deliverPayloads -> DEBU 500 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" +"2019-09-24 00:25:04.523 UTC [gossip.state] addPayload -> DEBU 501 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 00:25:04.523 UTC [blocksProvider] DeliverBlocks -> DEBU 502 [businesschannel] Gossiping block [1], peers number [1]" +"2019-09-24 00:25:04.523 UTC [gossip.channel] AddToMsgStore -> DEBU 503 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23706 bytes, seq: 1}, Envelope: 23739 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 00:25:04.523 UTC [gossip.pull] Add -> DEBU 504 Added 1, total items: 1" +"2019-09-24 00:25:04.524 UTC [gossip.state] deliverPayloads -> DEBU 505 [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" +"2019-09-24 00:25:04.524 UTC [gossip.privdata] StoreBlock -> INFO 506 [businesschannel] Received block [1] from buffer" +"2019-09-24 00:25:04.524 UTC [gossip.privdata] StoreBlock -> DEBU 507 [businesschannel] Validating block [1]" +"2019-09-24 00:25:04.524 UTC [committer.txvalidator] Validate -> DEBU 508 [businesschannel] START Block Validation for block [1]" +"2019-09-24 00:25:04.524 UTC [committer.txvalidator] Validate -> DEBU 509 expecting 1 block validation responses" +"2019-09-24 00:25:04.524 UTC [committer.txvalidator] validateTx -> DEBU 50a [businesschannel] validateTx starts for block 0xc003207640 env 0xc003372910 txn 0" +"2019-09-24 00:25:04.524 UTC [protoutils] ValidateTransaction -> DEBU 50b ValidateTransactionEnvelope starts for envelope 0xc003372910" +"2019-09-24 00:25:04.524 UTC [protoutils] ValidateTransaction -> DEBU 50c Header is channel_header:"\010\001\032\006\010\340\304\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030H[[\271^t\272\032j:L\355q\2311W\251d\226\376\275\317*`" " +"2019-09-24 00:25:04.524 UTC [protoutils] validateChannelHeader -> DEBU 50d validateChannelHeader info: header type 1" +"2019-09-24 00:25:04.524 UTC [protoutils] checkSignatureFromCreator -> DEBU 50e begin" +"2019-09-24 00:25:04.525 UTC [msp] GetManagerForChain -> DEBU 50f Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:25:04.525 UTC [msp] DeserializeIdentity -> DEBU 510 Obtaining identity" +"2019-09-24 00:25:04.525 UTC [msp.identity] newIdentity -> DEBU 511 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -2069,123 +1808,154 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-07-20 02:39:46.967 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e6 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -"2019-07-20 02:39:46.967 UTC [msp] Validate -> DEBU 5e7 MSP OrdererMSP validating identity" -"2019-07-20 02:39:46.968 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e8 creator is valid" -"2019-07-20 02:39:46.968 UTC [msp.identity] Verify -> DEBU 5e9 Verify: digest = 00000000 9f 6d 09 25 ee 9c 09 29 72 4a 00 54 a3 e7 6f d2 |.m.%...)rJ.T..o.| -00000010 9f 74 37 d2 0d 76 84 7e df a0 07 54 ac b3 e3 a9 |.t7..v.~...T....|" -"2019-07-20 02:39:46.968 UTC [msp.identity] Verify -> DEBU 5ea Verify: sig = 00000000 30 44 02 20 43 91 94 43 2a 23 d1 f0 c2 88 cb 7d |0D. C..C*#.....}| -00000010 79 5b 76 27 65 24 8c 15 89 2e 1f 51 c1 4e e9 6a |y[v'e$.....Q.N.j| -00000020 ba 07 4f ab 02 20 44 33 10 d9 f7 5c e3 28 87 66 |..O.. D3...\.(.f| -00000030 42 a7 ee f2 26 00 13 eb e7 18 7d a2 30 c1 25 a0 |B...&.....}.0.%.| -00000040 cb 1b 9e a8 cb 43 |.....C|" -"2019-07-20 02:39:46.969 UTC [protoutils] checkSignatureFromCreator -> DEBU 5eb exits successfully" -"2019-07-20 02:39:46.969 UTC [protoutils] validateConfigTransaction -> DEBU 5ec validateConfigTransaction starts for data 0xc0035d2000, header channel_header:"\010\001\032\006\010\361\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\325\335\034\246UK\017C\017\277\223\305\031\025\215\353\232\0222[\305wxl" " -"2019-07-20 02:39:46.969 UTC [committer.txvalidator] validateTx -> DEBU 5ed Transaction is for channel businesschannel" -"2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Group] /Channel" -"2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f0 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f1 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:46.973 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:46.973 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:46.973 UTC [common.configtx] verifyDeltaSet -> DEBU 5ff Processing change to key: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:46.973 UTC [common.configtx] policyForItem -> DEBU 600 Getting policy for item Org2MSP with mod_policy Admins" -"2019-07-20 02:39:46.973 UTC [policies] Manager -> DEBU 601 Manager Channel looking up path [Application]" -"2019-07-20 02:39:46.973 UTC [policies] Manager -> DEBU 602 Manager Channel has managers Application" -"2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 603 Manager Channel has managers Orderer" -"2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 604 Manager Channel/Application looking up path []" -"2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 605 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 606 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 607 Manager Channel/Application looking up path [Org2MSP]" -"2019-07-20 02:39:46.975 UTC [policies] Manager -> DEBU 608 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:46.975 UTC [policies] Manager -> DEBU 609 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:46.976 UTC [policies] Manager -> DEBU 60a Manager Channel/Application/Org2MSP looking up path []" -"2019-07-20 02:39:46.976 UTC [policies] Evaluate -> DEBU 60b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-07-20 02:39:46.976 UTC [msp] DeserializeIdentity -> DEBU 60c Obtaining identity" -"2019-07-20 02:39:46.976 UTC [msp.identity] newIdentity -> DEBU 60d Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +"2019-09-24 00:25:04.525 UTC [protoutils] checkSignatureFromCreator -> DEBU 512 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-09-24 00:25:04.525 UTC [msp] Validate -> DEBU 513 MSP OrdererMSP validating identity" +"2019-09-24 00:25:04.525 UTC [protoutils] checkSignatureFromCreator -> DEBU 514 creator is valid" +"2019-09-24 00:25:04.525 UTC [msp.identity] Verify -> DEBU 515 Verify: digest = 00000000 d7 14 e8 2b 94 85 19 a5 c4 c6 05 0c cc 2a 09 90 |...+.........*..| +00000010 b0 cc fb 3e 0b 34 fc ba 21 0e 70 39 e6 70 65 55 |...>.4..!.p9.peU|" +"2019-09-24 00:25:04.526 UTC [msp.identity] Verify -> DEBU 516 Verify: sig = 00000000 30 45 02 21 00 9c 2f 49 ca 50 e2 c2 b9 1d bd c4 |0E.!../I.P......| +00000010 29 2b b2 d5 77 08 fe 65 ea 7b b4 a7 88 f3 a9 06 |)+..w..e.{......| +00000020 08 02 e9 88 38 02 20 0e 04 dc 5a a0 be d2 83 e1 |....8. ...Z.....| +00000030 a4 51 e3 80 d1 f7 48 32 17 b4 51 91 23 6c 92 d2 |.Q....H2..Q.#l..| +00000040 f9 3e 14 b4 e1 e7 68 |.>....h|" +"2019-09-24 00:25:04.526 UTC [protoutils] checkSignatureFromCreator -> DEBU 517 exits successfully" +"2019-09-24 00:25:04.526 UTC [protoutils] validateConfigTransaction -> DEBU 518 validateConfigTransaction starts for data 0xc0033a4000, header channel_header:"\010\001\032\006\010\340\304\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030H[[\271^t\272\032j:L\355q\2311W\251d\226\376\275\317*`" " +"2019-09-24 00:25:04.526 UTC [committer.txvalidator] validateTx -> DEBU 519 Transaction is for channel businesschannel" +"2019-09-24 00:25:04.530 UTC [common.configtx] addToMap -> DEBU 51a Adding to config map: [Group] /Channel" +"2019-09-24 00:25:04.530 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:04.530 UTC [common.configtx] addToMap -> DEBU 51c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.530 UTC [common.configtx] addToMap -> DEBU 51d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:04.531 UTC [common.configtx] addToMap -> DEBU 51e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.531 UTC [common.configtx] addToMap -> DEBU 51f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.531 UTC [common.configtx] addToMap -> DEBU 520 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.532 UTC [common.configtx] addToMap -> DEBU 521 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:04.532 UTC [common.configtx] addToMap -> DEBU 522 Adding to config map: [Group] /Channel" +"2019-09-24 00:25:04.532 UTC [common.configtx] addToMap -> DEBU 523 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 524 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 525 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 526 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 527 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 528 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.533 UTC [common.configtx] addToMap -> DEBU 529 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.534 UTC [common.configtx] addToMap -> DEBU 52a Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:04.535 UTC [common.configtx] verifyDeltaSet -> DEBU 52b Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.535 UTC [common.configtx] policyForItem -> DEBU 52c Getting policy for item Org1MSP with mod_policy Admins" +"2019-09-24 00:25:04.535 UTC [policies] Manager -> DEBU 52d Manager Channel looking up path [Application]" +"2019-09-24 00:25:04.535 UTC [policies] Manager -> DEBU 52e Manager Channel has managers Orderer" +"2019-09-24 00:25:04.536 UTC [policies] Manager -> DEBU 52f Manager Channel has managers Application" +"2019-09-24 00:25:04.536 UTC [policies] Manager -> DEBU 530 Manager Channel/Application looking up path []" +"2019-09-24 00:25:04.536 UTC [policies] Manager -> DEBU 531 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:04.536 UTC [policies] Manager -> DEBU 532 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:04.537 UTC [policies] Manager -> DEBU 533 Manager Channel/Application looking up path [Org1MSP]" +"2019-09-24 00:25:04.537 UTC [policies] Manager -> DEBU 534 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:04.537 UTC [policies] Manager -> DEBU 535 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:04.537 UTC [policies] Manager -> DEBU 536 Manager Channel/Application/Org1MSP looking up path []" +"2019-09-24 00:25:04.537 UTC [policies] Evaluate -> DEBU 537 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 00:25:04.538 UTC [cauthdsl] func1 -> DEBU 538 0xc0033dc420 gate 1569284704538221800 evaluation starts" +"2019-09-24 00:25:04.538 UTC [cauthdsl] func2 -> DEBU 539 0xc0033dc420 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.538 UTC [cauthdsl] func2 -> DEBU 53a 0xc0033dc420 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:04.538 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 53b Checking if identity satisfies ADMIN role for Org1MSP" +"2019-09-24 00:25:04.539 UTC [cauthdsl] func2 -> DEBU 53c 0xc0033dc420 principal matched by identity 0" +"2019-09-24 00:25:04.540 UTC [msp.identity] Verify -> DEBU 53d Verify: digest = 00000000 1c cd 68 b8 33 39 c3 f7 d8 bf 6f 21 20 3c 57 2b |..h.39....o! DEBU 53e Verify: sig = 00000000 30 44 02 20 3f 2d 41 bf df 48 de ab 3b 9f f2 6a |0D. ?-A..H..;..j| +00000010 1c b4 f9 16 f1 15 f3 9b 4e 9f 15 e8 29 65 8f 9b |........N...)e..| +00000020 87 2f 31 cd 02 20 40 64 26 9c 61 b6 4b 3f 60 9d |./1.. @d&.a.K?`.| +00000030 b0 4f 81 19 be bf 2f 49 3d 39 ca e7 6a cb ce 8c |.O..../I=9..j...| +00000040 db 89 e6 d0 87 84 |......|" +"2019-09-24 00:25:04.540 UTC [cauthdsl] func2 -> DEBU 53f 0xc0033dc420 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.540 UTC [cauthdsl] func1 -> DEBU 540 0xc0033dc420 gate 1569284704538221800 evaluation succeeds" +"2019-09-24 00:25:04.540 UTC [policies] Evaluate -> DEBU 541 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.540 UTC [policies] Evaluate -> DEBU 542 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.540 UTC [common.configtx] verifyDeltaSet -> DEBU 543 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:04.541 UTC [common.configtx] recurseConfigMap -> DEBU 544 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.541 UTC [common.configtx] recurseConfigMap -> DEBU 545 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.541 UTC [common.configtx] recurseConfigMap -> DEBU 546 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 547 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 548 Setting policy for key Readers to " +"2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 549 Setting policy for key Writers to " +"2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 54a Setting policy for key Admins to " +"2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 54b Setting policy for key Endorsement to " +"2019-09-24 00:25:04.542 UTC [gossip.comm] Send -> DEBU 54c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23706 bytes, seq: 1}, Envelope: 23739 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:04.542 UTC [common.configtx] recurseConfigMap -> DEBU 54d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.543 UTC [gossip.comm] sendToEndpoint -> DEBU 54e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23706 bytes, seq: 1}, Envelope: 23739 bytes, Signature: 0 bytes" +"2019-09-24 00:25:04.543 UTC [gossip.comm] sendToEndpoint -> DEBU 54f Exiting" +"2019-09-24 00:25:04.554 UTC [common.configtx] recurseConfigMap -> DEBU 550 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.555 UTC [common.configtx] recurseConfigMap -> DEBU 551 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.555 UTC [common.configtx] recurseConfigMap -> DEBU 552 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.580 UTC [common.configtx] recurseConfigMap -> DEBU 553 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.580 UTC [common.configtx] recurseConfigMap -> DEBU 554 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.580 UTC [common.configtx] recurseConfigMap -> DEBU 555 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.580 UTC [common.configtx] recurseConfigMap -> DEBU 556 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.581 UTC [common.configtx] recurseConfigMap -> DEBU 557 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.581 UTC [common.configtx] recurseConfigMap -> DEBU 558 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.586 UTC [common.configtx] recurseConfigMap -> DEBU 559 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.586 UTC [common.configtx] recurseConfigMap -> DEBU 55a Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.586 UTC [common.configtx] recurseConfigMap -> DEBU 55b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.586 UTC [common.configtx] recurseConfigMap -> DEBU 55c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.586 UTC [common.configtx] recurseConfigMap -> DEBU 55d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:04.586 UTC [common.channelconfig] NewStandardValues -> DEBU 55e Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:25:04.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55f Processing field: HashingAlgorithm" +"2019-09-24 00:25:04.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 560 Processing field: BlockDataHashingStructure" +"2019-09-24 00:25:04.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 561 Processing field: OrdererAddresses" +"2019-09-24 00:25:04.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 562 Processing field: Consortium" +"2019-09-24 00:25:04.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 563 Processing field: Capabilities" +"2019-09-24 00:25:04.586 UTC [common.channelconfig] NewStandardValues -> DEBU 564 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 565 Processing field: ConsensusType" +"2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 566 Processing field: BatchSize" +"2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 567 Processing field: BatchTimeout" +"2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 568 Processing field: KafkaBrokers" +"2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 569 Processing field: ChannelRestrictions" +"2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56a Processing field: Capabilities" +"2019-09-24 00:25:04.587 UTC [common.channelconfig] NewStandardValues -> DEBU 56b Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56c Processing field: Endpoints" +"2019-09-24 00:25:04.587 UTC [common.channelconfig] NewStandardValues -> DEBU 56d Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.587 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56e Processing field: MSP" +"2019-09-24 00:25:04.587 UTC [common.channelconfig] validateMSP -> DEBU 56f Setting up MSP for org OrdererOrg" +"2019-09-24 00:25:04.587 UTC [msp] newBccspMsp -> DEBU 570 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.587 UTC [msp] New -> DEBU 571 Creating Cache-MSP instance" +"2019-09-24 00:25:04.587 UTC [msp] Setup -> DEBU 572 Setting up MSP instance OrdererMSP" +"2019-09-24 00:25:04.588 UTC [msp.identity] newIdentity -> DEBU 573 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U -----END CERTIFICATE-----" -"2019-07-20 02:39:46.977 UTC [cauthdsl] func1 -> DEBU 60e 0xc003603870 gate 1563590386977559500 evaluation starts" -"2019-07-20 02:39:46.977 UTC [cauthdsl] func2 -> DEBU 60f 0xc003603870 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:46.977 UTC [cauthdsl] func2 -> DEBU 610 0xc003603870 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:46.978 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 611 Checking if identity satisfies ADMIN role for Org2MSP" -"2019-07-20 02:39:46.978 UTC [cauthdsl] func2 -> DEBU 612 0xc003603870 principal matched by identity 0" -"2019-07-20 02:39:46.978 UTC [msp.identity] Verify -> DEBU 613 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| -00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" -"2019-07-20 02:39:46.978 UTC [msp.identity] Verify -> DEBU 614 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| -00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| -00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| -00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| -00000040 e9 49 62 bf 87 8d |.Ib...|" -"2019-07-20 02:39:46.979 UTC [cauthdsl] func2 -> DEBU 615 0xc003603870 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:46.979 UTC [cauthdsl] func1 -> DEBU 616 0xc003603870 gate 1563590386977559500 evaluation succeeds" -"2019-07-20 02:39:46.979 UTC [policies] Evaluate -> DEBU 617 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:46.979 UTC [policies] Evaluate -> DEBU 618 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:46.979 UTC [common.configtx] verifyDeltaSet -> DEBU 619 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61a Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61b Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61c Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61d Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61e Setting policy for key Admins to " -"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 61f Setting policy for key Endorsement to " -"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 620 Setting policy for key Readers to " -"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 621 Setting policy for key Writers to " -"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 622 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 623 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 624 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 625 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 626 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 627 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 628 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 629 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62a Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62b Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62d Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 62e Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 62f Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 630 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:39:46.984 UTC [common.channelconfig] NewStandardValues -> DEBU 631 Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:39:46.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 632 Processing field: HashingAlgorithm" -"2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 633 Processing field: BlockDataHashingStructure" -"2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 634 Processing field: OrdererAddresses" -"2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 635 Processing field: Consortium" -"2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 636 Processing field: Capabilities" -"2019-07-20 02:39:46.986 UTC [common.channelconfig] NewStandardValues -> DEBU 637 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 638 Processing field: ACLs" -"2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 639 Processing field: Capabilities" -"2019-07-20 02:39:46.987 UTC [common.channelconfig] NewStandardValues -> DEBU 63a Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:46.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63b Processing field: AnchorPeers" -"2019-07-20 02:39:46.987 UTC [common.channelconfig] NewStandardValues -> DEBU 63c Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:46.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63d Processing field: MSP" -"2019-07-20 02:39:46.987 UTC [common.channelconfig] Validate -> DEBU 63e Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:39:46.988 UTC [common.channelconfig] validateMSP -> DEBU 63f Setting up MSP for org Org1MSP" -"2019-07-20 02:39:46.988 UTC [msp] newBccspMsp -> DEBU 640 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:46.988 UTC [msp] New -> DEBU 641 Creating Cache-MSP instance" -"2019-07-20 02:39:46.988 UTC [msp] Setup -> DEBU 642 Setting up MSP instance Org1MSP" -"2019-07-20 02:39:46.988 UTC [msp.identity] newIdentity -> DEBU 643 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.588 UTC [msp.identity] newIdentity -> DEBU 574 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:04.588 UTC [msp] Validate -> DEBU 575 MSP OrdererMSP validating identity" +"2019-09-24 00:25:04.588 UTC [common.channelconfig] NewStandardValues -> DEBU 576 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:25:04.589 UTC [common.channelconfig] initializeProtosStruct -> DEBU 577 Processing field: ACLs" +"2019-09-24 00:25:04.589 UTC [common.channelconfig] initializeProtosStruct -> DEBU 578 Processing field: Capabilities" +"2019-09-24 00:25:04.589 UTC [common.channelconfig] NewStandardValues -> DEBU 579 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:04.589 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57a Processing field: AnchorPeers" +"2019-09-24 00:25:04.589 UTC [common.channelconfig] NewStandardValues -> DEBU 57b Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.589 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57c Processing field: MSP" +"2019-09-24 00:25:04.589 UTC [common.channelconfig] Validate -> DEBU 57d Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:25:04.589 UTC [common.channelconfig] validateMSP -> DEBU 57e Setting up MSP for org Org1MSP" +"2019-09-24 00:25:04.589 UTC [msp] newBccspMsp -> DEBU 57f Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.589 UTC [msp] New -> DEBU 580 Creating Cache-MSP instance" +"2019-09-24 00:25:04.589 UTC [msp] Setup -> DEBU 581 Setting up MSP instance Org1MSP" +"2019-09-24 00:25:04.589 UTC [msp.identity] newIdentity -> DEBU 582 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2200,7 +1970,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:39:46.989 UTC [msp.identity] newIdentity -> DEBU 644 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.589 UTC [msp.identity] newIdentity -> DEBU 583 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2214,21 +1984,21 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:39:46.990 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 645 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:39:46.990 UTC [msp] Validate -> DEBU 646 MSP Org1MSP validating identity" -"2019-07-20 02:39:46.990 UTC [msp] getCertificationChain -> DEBU 647 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:46.991 UTC [msp] hasOURole -> DEBU 648 MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:39:46.991 UTC [msp] getCertificationChain -> DEBU 649 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:46.991 UTC [common.channelconfig] NewStandardValues -> DEBU 64a Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:39:46.991 UTC [common.channelconfig] initializeProtosStruct -> DEBU 64b Processing field: AnchorPeers" -"2019-07-20 02:39:46.991 UTC [common.channelconfig] NewStandardValues -> DEBU 64c Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:46.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 64d Processing field: MSP" -"2019-07-20 02:39:46.992 UTC [common.channelconfig] Validate -> DEBU 64e Anchor peers for org Org2MSP are anchor_peers: " -"2019-07-20 02:39:46.992 UTC [common.channelconfig] validateMSP -> DEBU 64f Setting up MSP for org Org2MSP" -"2019-07-20 02:39:46.992 UTC [msp] newBccspMsp -> DEBU 650 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:46.993 UTC [msp] New -> DEBU 651 Creating Cache-MSP instance" -"2019-07-20 02:39:46.993 UTC [msp] Setup -> DEBU 652 Setting up MSP instance Org2MSP" -"2019-07-20 02:39:46.994 UTC [msp.identity] newIdentity -> DEBU 653 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.590 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 584 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:25:04.590 UTC [msp] Validate -> DEBU 585 MSP Org1MSP validating identity" +"2019-09-24 00:25:04.590 UTC [msp] getCertificationChain -> DEBU 586 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:04.590 UTC [msp] hasOURole -> DEBU 587 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:25:04.590 UTC [msp] getCertificationChain -> DEBU 588 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:04.591 UTC [common.channelconfig] NewStandardValues -> DEBU 589 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:04.591 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58a Processing field: AnchorPeers" +"2019-09-24 00:25:04.591 UTC [common.channelconfig] NewStandardValues -> DEBU 58b Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:04.591 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58c Processing field: MSP" +"2019-09-24 00:25:04.591 UTC [common.channelconfig] Validate -> DEBU 58d Anchor peers for org Org2MSP are " +"2019-09-24 00:25:04.591 UTC [common.channelconfig] validateMSP -> DEBU 58e Setting up MSP for org Org2MSP" +"2019-09-24 00:25:04.591 UTC [msp] newBccspMsp -> DEBU 58f Creating BCCSP-based MSP instance" +"2019-09-24 00:25:04.591 UTC [msp] New -> DEBU 590 Creating Cache-MSP instance" +"2019-09-24 00:25:04.591 UTC [msp] Setup -> DEBU 591 Setting up MSP instance Org2MSP" +"2019-09-24 00:25:04.591 UTC [msp.identity] newIdentity -> DEBU 592 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2243,7 +2013,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-07-20 02:39:46.994 UTC [msp.identity] newIdentity -> DEBU 654 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.591 UTC [msp.identity] newIdentity -> DEBU 593 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -2257,773 +2027,134 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-07-20 02:39:46.995 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 655 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:39:46.995 UTC [msp] Validate -> DEBU 656 MSP Org2MSP validating identity" -"2019-07-20 02:39:46.996 UTC [msp] getCertificationChain -> DEBU 657 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:46.996 UTC [msp] hasOURole -> DEBU 658 MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:39:46.997 UTC [msp] getCertificationChain -> DEBU 659 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:46.997 UTC [common.channelconfig] NewStandardValues -> DEBU 65a Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65b Processing field: ConsensusType" -"2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65c Processing field: BatchSize" -"2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65d Processing field: BatchTimeout" -"2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65e Processing field: KafkaBrokers" -"2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65f Processing field: ChannelRestrictions" -"2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 660 Processing field: Capabilities" -"2019-07-20 02:39:46.998 UTC [common.channelconfig] NewStandardValues -> DEBU 661 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 662 Processing field: Endpoints" -"2019-07-20 02:39:46.998 UTC [common.channelconfig] NewStandardValues -> DEBU 663 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 664 Processing field: MSP" -"2019-07-20 02:39:46.999 UTC [common.channelconfig] validateMSP -> DEBU 665 Setting up MSP for org OrdererOrg" -"2019-07-20 02:39:46.999 UTC [msp] newBccspMsp -> DEBU 666 Creating BCCSP-based MSP instance" -"2019-07-20 02:39:46.999 UTC [msp] New -> DEBU 667 Creating Cache-MSP instance" -"2019-07-20 02:39:46.999 UTC [msp] Setup -> DEBU 668 Setting up MSP instance OrdererMSP" -"2019-07-20 02:39:47.000 UTC [msp.identity] newIdentity -> DEBU 669 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:39:47.000 UTC [msp.identity] newIdentity -> DEBU 66a Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:39:47.001 UTC [msp] Validate -> DEBU 66b MSP OrdererMSP validating identity" -"2019-07-20 02:39:47.002 UTC [msp] Setup -> DEBU 66c Setting up the MSP manager (3 msps)" -"2019-07-20 02:39:47.002 UTC [msp] Setup -> DEBU 66d MSP manager setup complete, setup 3 msps" -"2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 66e Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 66f Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 670 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 671 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 672 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 673 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 674 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:39:47.004 UTC [policies] NewManagerImpl -> DEBU 675 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:39:47.006 UTC [policies] NewManagerImpl -> DEBU 676 Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:39:47.006 UTC [policies] NewManagerImpl -> DEBU 677 Proposed new policy Readers for Channel/Application" -"2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 678 Proposed new policy Writers for Channel/Application" -"2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 679 Proposed new policy Admins for Channel/Application" -"2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 67a Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 67b Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67c Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67d Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67e Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67f Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:39:47.009 UTC [policies] NewManagerImpl -> DEBU 680 Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:39:47.009 UTC [policies] NewManagerImpl -> DEBU 681 Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 682 Proposed new policy Admins for Channel" -"2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 683 Proposed new policy Readers for Channel" -"2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 684 Proposed new policy Writers for Channel" -"2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 685 Adding to config map: [Group] /Channel" -"2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 686 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 687 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 688 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 689 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68e Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 690 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 691 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 692 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 693 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 694 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 695 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 696 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 697 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 698 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 699 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69a Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69b Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69c Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a3 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a5 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a7 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a9 Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6aa Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6ab Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ac Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ad Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ae Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6af Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b0 Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b1 Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b2 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6b3 As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6b4 As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b5 Manager Channel looking up path [Application]" -"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b6 Manager Channel has managers Application" -"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b7 Manager Channel has managers Orderer" -"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b8 Manager Channel/Application looking up path []" -"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b9 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6ba Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bb As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bc As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bd As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6be Manager Channel looking up path [Orderer]" -"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6bf Manager Channel has managers Application" -"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c0 Manager Channel has managers Orderer" -"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c1 Manager Channel/Orderer looking up path []" -"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c2 Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c3 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c4 As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c5 As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c6 As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:39:47.022 UTC [common.capabilities] Supported -> DEBU 6c7 Application capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:47.022 UTC [common.capabilities] Supported -> DEBU 6c8 Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:39:47.023 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6c9 Processing new config for channel businesschannel" -"2019-07-20 02:39:47.023 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6ca Calling out because config was updated for channel businesschannel" -"2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cb Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -"2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cc Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" -"2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cd Creating state provider for chainID businesschannel" -"2019-07-20 02:39:47.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ce Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6cf Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.024 UTC [msp] DeserializeIdentity -> DEBU 6d3 Obtaining identity" -"2019-07-20 02:39:47.024 UTC [msp.identity] newIdentity -> DEBU 6d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== ------END CERTIFICATE-----" -"2019-07-20 02:39:47.025 UTC [cauthdsl] func1 -> DEBU 6d5 0xc0036eb490 gate 1563590387025007200 evaluation starts" -"2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6d6 0xc0036eb490 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6d7 0xc0036eb490 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.025 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6d8 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-07-20 02:39:47.025 UTC [msp] Validate -> DEBU 6d9 MSP Org1MSP validating identity" -"2019-07-20 02:39:47.025 UTC [msp] getCertificationChain -> DEBU 6da MSP Org1MSP getting certification chain" -"2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6db 0xc0036eb490 principal matched by identity 0" -"2019-07-20 02:39:47.025 UTC [msp.identity] Verify -> DEBU 6dc Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| -00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" -"2019-07-20 02:39:47.025 UTC [msp.identity] Verify -> DEBU 6dd Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| -00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| -00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| -00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| -00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" -"2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6de 0xc0036eb490 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.025 UTC [cauthdsl] func1 -> DEBU 6df 0xc0036eb490 gate 1563590387025007200 evaluation succeeds" -"2019-07-20 02:39:47.025 UTC [policies] Evaluate -> DEBU 6e0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e2 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.026 UTC [gossip.gossip] JoinChan -> INFO 6e4 Joining gossip network of channel businesschannel with 2 organizations" -"2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e5 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -"2019-07-20 02:39:47.026 UTC [gossip.discovery] Connect -> DEBU 6e6 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " -"2019-07-20 02:39:47.026 UTC [gossip.discovery] Connect -> DEBU 6e7 Exiting" -"2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e8 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -"2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e9 Anchor peer with same endpoint, skipping connecting to myself" -"2019-07-20 02:39:47.026 UTC [gossip.service] updateEndpoints -> DEBU 6ea Updating endpoints for chainID%!(EXTRA string=businesschannel)" -"2019-07-20 02:39:47.026 UTC [peer] updateTrustedRoots -> DEBU 6eb Updating trusted root authorities for channel businesschannel" -"2019-07-20 02:39:47.027 UTC [grpc] DialContext -> DEBU 6ec parsed scheme: """ -"2019-07-20 02:39:47.027 UTC [grpc] DialContext -> DEBU 6ed scheme "" not registered, fallback to default scheme" -"2019-07-20 02:39:47.027 UTC [grpc] watcher -> DEBU 6ee ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -"2019-07-20 02:39:47.027 UTC [grpc] switchBalancer -> DEBU 6ef ClientConn switching balancer to "pick_first"" -"2019-07-20 02:39:47.027 UTC [grpc] HandleSubConnStateChange -> DEBU 6f0 pickfirstBalancer: HandleSubConnStateChange: 0xc0037381a0, CONNECTING" -"2019-07-20 02:39:47.039 UTC [grpc] HandleSubConnStateChange -> DEBU 6f1 pickfirstBalancer: HandleSubConnStateChange: 0xc0037381a0, READY" -"2019-07-20 02:39:47.041 UTC [msp] GetDefaultSigningIdentity -> DEBU 6f2 Obtaining default signing identity" -"2019-07-20 02:39:47.041 UTC [msp.identity] Sign -> DEBU 6f3 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.041 UTC [msp.identity] Sign -> DEBU 6f4 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.041 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6f5 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" -"2019-07-20 02:39:47.043 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6f6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -"2019-07-20 02:39:47.043 UTC [msp] DeserializeIdentity -> DEBU 6f7 Obtaining identity" -"2019-07-20 02:39:47.043 UTC [msp] DeserializeIdentity -> DEBU 6f8 Obtaining identity" -"2019-07-20 02:39:47.043 UTC [msp.identity] newIdentity -> DEBU 6f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL ------END CERTIFICATE-----" -"2019-07-20 02:39:47.044 UTC [msp] Validate -> DEBU 6fa MSP Org2MSP validating identity" -"2019-07-20 02:39:47.044 UTC [msp] getCertificationChain -> DEBU 6fb MSP Org2MSP getting certification chain" -"2019-07-20 02:39:47.044 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 6fd Obtaining identity" -"2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 6ff Obtaining identity" -"2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 700 Obtaining identity" -"2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 701 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 702 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 703 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 704 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 705 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 706 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.046 UTC [cauthdsl] func1 -> DEBU 707 0xc00377bc70 gate 1563590387046596900 evaluation starts" -"2019-07-20 02:39:47.046 UTC [cauthdsl] func2 -> DEBU 708 0xc00377bc70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.046 UTC [cauthdsl] func2 -> DEBU 709 0xc00377bc70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 70a 0xc00377bc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 70b 0xc00377bc70 principal evaluation fails" -"2019-07-20 02:39:47.047 UTC [cauthdsl] func1 -> DEBU 70c 0xc00377bc70 gate 1563590387046596900 evaluation fails" -"2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.047 UTC [cauthdsl] func1 -> DEBU 710 0xc0037984d0 gate 1563590387047829100 evaluation starts" -"2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 711 0xc0037984d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 712 0xc0037984d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.047 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 713 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-07-20 02:39:47.048 UTC [msp] Validate -> DEBU 714 MSP Org2MSP validating identity" -"2019-07-20 02:39:47.048 UTC [msp] getCertificationChain -> DEBU 715 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:47.048 UTC [cauthdsl] func2 -> DEBU 716 0xc0037984d0 principal matched by identity 0" -"2019-07-20 02:39:47.048 UTC [msp.identity] Verify -> DEBU 717 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:39:47.048 UTC [msp.identity] Verify -> DEBU 718 Verify: sig = 00000000 30 45 02 21 00 c5 42 26 31 9b 5f 88 e8 ff 3c af |0E.!..B&1._...<.| -00000010 89 aa 06 67 e2 b6 11 2d 5c 3c 46 9f e7 66 a8 fd |...g...-\..| -00000030 a7 5f c2 d5 fb df 79 1f 8d 4b 32 8f b7 a0 3b de |._....y..K2...;.| -00000040 6d eb ba 3e c2 98 e3 |m..>...|" -"2019-07-20 02:39:47.048 UTC [cauthdsl] func2 -> DEBU 719 0xc0037984d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.048 UTC [cauthdsl] func1 -> DEBU 71a 0xc0037984d0 gate 1563590387047829100 evaluation succeeds" -"2019-07-20 02:39:47.048 UTC [policies] Evaluate -> DEBU 71b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.048 UTC [policies] Evaluate -> DEBU 71c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.049 UTC [policies] Evaluate -> DEBU 71d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.049 UTC [policies] Evaluate -> DEBU 71e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.049 UTC [gossip.comm] authenticateRemotePeer -> DEBU 71f Authenticated 172.18.0.8:7051" -"2019-07-20 02:39:47.049 UTC [msp] DeserializeIdentity -> DEBU 720 Obtaining identity" -"2019-07-20 02:39:47.049 UTC [msp] GetDefaultSigningIdentity -> DEBU 721 Obtaining default signing identity" -"2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 722 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915100F " -"2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 723 Sign: digest: FD5AEC2A368260611D522F195C3901A89781740BD1E3F90CA9C8FB49E2302DCC " -"2019-07-20 02:39:47.049 UTC [msp] GetDefaultSigningIdentity -> DEBU 724 Obtaining default signing identity" -"2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 725 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:47.050 UTC [msp.identity] Sign -> DEBU 726 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:47.050 UTC [msp] DeserializeIdentity -> DEBU 727 Obtaining identity" -"2019-07-20 02:39:47.050 UTC [gossip.comm] Send -> DEBU 728 Entering, sending GossipMessage: nonce:16868747491599105266 tag:EMPTY mem_req:\335\362\227_4\222\230\364ar\204=\330\272?2G\364\221\002 !\320\326\223\255\030\233\221\006%\336??V\331\020\r\244\273l\226\375i.b\r\210\2039\356\232\001" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:47.050 UTC [gossip.comm] sendToEndpoint -> DEBU 729 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:16868747491599105266 tag:EMPTY mem_req:\335\362\227_4\222\230\364ar\204=\330\272?2G\364\221\002 !\320\326\223\255\030\233\221\006%\336??V\331\020\r\244\273l\226\375i.b\r\210\2039\356\232\001" > > , Envelope: 176 bytes, Signature: 0 bytes" -"2019-07-20 02:39:47.050 UTC [gossip.comm] createConnection -> DEBU 72a Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:39:47.055 UTC [grpc] infof -> DEBU 72b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:47.055 UTC [grpc] DialContext -> DEBU 72c parsed scheme: """ -"2019-07-20 02:39:47.055 UTC [grpc] DialContext -> DEBU 72d scheme "" not registered, fallback to default scheme" -"2019-07-20 02:39:47.055 UTC [grpc] watcher -> DEBU 72e ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -"2019-07-20 02:39:47.055 UTC [grpc] switchBalancer -> DEBU 72f ClientConn switching balancer to "pick_first"" -"2019-07-20 02:39:47.056 UTC [grpc] HandleSubConnStateChange -> DEBU 730 pickfirstBalancer: HandleSubConnStateChange: 0xc0037b9700, CONNECTING" -"2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 731 updating root CAs for channel [businesschannel]" -"2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 732 adding app root CAs for MSP [Org1MSP]" -"2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 733 adding app root CAs for MSP [Org2MSP]" -"2019-07-20 02:39:47.059 UTC [peer] buildTrustedRootsForChain -> DEBU 734 adding orderer root CAs for MSP [OrdererMSP]" -"2019-07-20 02:39:47.059 UTC [committer.txvalidator] validateTx -> DEBU 735 config transaction received for chain businesschannel" -"2019-07-20 02:39:47.059 UTC [committer.txvalidator] validateTx -> DEBU 736 [businesschannel] validateTx completes for block 0xc003516200 env 0xc00353d860 txn 0" -"2019-07-20 02:39:47.060 UTC [committer.txvalidator] Validate -> DEBU 737 got result for idx 0, code 0" -"2019-07-20 02:39:47.060 UTC [committer.txvalidator] Validate -> INFO 738 [businesschannel] Validated block [2] in 97ms" -"2019-07-20 02:39:47.061 UTC [gossip.privdata] listMissingPrivateData -> DEBU 739 Retrieving private write sets for 0 transactions from transient store" -"2019-07-20 02:39:47.061 UTC [gossip.privdata] StoreBlock -> DEBU 73a [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-07-20 02:39:47.061 UTC [committer] preCommit -> DEBU 73b Received configuration update, calling CSCC ConfigUpdate" -"2019-07-20 02:39:47.061 UTC [kvledger] CommitWithPvtData -> DEBU 73c [businesschannel] Validating state for block [2]" -"2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73d Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73e lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73f Validating new block with num trans = [1]" -"2019-07-20 02:39:47.062 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 740 ValidateAndPrepareBatch() for block number = [2]" -"2019-07-20 02:39:47.062 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 741 preprocessing ProtoBlock..." -"2019-07-20 02:39:47.063 UTC [valimpl] preprocessProtoBlock -> DEBU 742 txType=CONFIG" -"2019-07-20 02:39:47.063 UTC [valimpl] processNonEndorserTx -> DEBU 743 Performing custom processing for transaction [txid=], [txType=CONFIG]" -"2019-07-20 02:39:47.063 UTC [valimpl] processNonEndorserTx -> DEBU 744 Processor for custom tx processing:&peer.configtxProcessor{}" -"2019-07-20 02:39:47.063 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 745 constructing new tx simulator" -"2019-07-20 02:39:47.064 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 747 constructing new tx simulator txid = []" -"2019-07-20 02:39:47.064 UTC [peer] GenerateSimulationResults -> DEBU 748 Processing CONFIG" -"2019-07-20 02:39:47.063 UTC [grpc] HandleSubConnStateChange -> DEBU 746 pickfirstBalancer: HandleSubConnStateChange: 0xc0037b9700, READY" -"2019-07-20 02:39:47.065 UTC [peer] processChannelConfigTx -> DEBU 749 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -"2019-07-20 02:39:47.066 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 74a Simulation completed, getting simulation results" -"2019-07-20 02:39:47.066 UTC [lockbasedtxmgr] Done -> DEBU 74b Done with transaction simulation / query execution []" -"2019-07-20 02:39:47.066 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 74c Block [2] Transaction index [0] TxId [] marked as valid by state validator" -"2019-07-20 02:39:47.067 UTC [valinternal] ApplyWriteSet -> DEBU 74d txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003862b80)}" -"2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74e validating rwset..." -"2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74f postprocessing ProtoBlock..." -"2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 750 ValidateAndPrepareBatch() complete" -"2019-07-20 02:39:47.067 UTC [kvledger] CommitWithPvtData -> DEBU 751 [businesschannel] Adding CommitHash to the block [2]" -"2019-07-20 02:39:47.068 UTC [kvledger] CommitWithPvtData -> DEBU 752 [businesschannel] Committing block [2] to storage" -"2019-07-20 02:39:47.068 UTC [ledgerstorage] CommitWithPvtData -> DEBU 753 Writing block [2] to pvt block store" -"2019-07-20 02:39:47.069 UTC [msp] GetDefaultSigningIdentity -> DEBU 754 Obtaining default signing identity" -"2019-07-20 02:39:47.069 UTC [msp.identity] Sign -> DEBU 755 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.069 UTC [msp.identity] Sign -> DEBU 756 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.069 UTC [gossip.comm] authenticateRemotePeer -> DEBU 757 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" -"2019-07-20 02:39:47.070 UTC [gossip.comm] authenticateRemotePeer -> DEBU 758 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -"2019-07-20 02:39:47.071 UTC [msp] DeserializeIdentity -> DEBU 759 Obtaining identity" -"2019-07-20 02:39:47.071 UTC [msp] DeserializeIdentity -> DEBU 75a Obtaining identity" -"2019-07-20 02:39:47.071 UTC [msp.identity] newIdentity -> DEBU 75b Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa -MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe -wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c -UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E -AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI -7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL ------END CERTIFICATE-----" -"2019-07-20 02:39:47.072 UTC [pvtdatastorage] Prepare -> DEBU 75c Saved 0 private data write sets for block [2]" -"2019-07-20 02:39:47.072 UTC [msp] Validate -> DEBU 75d MSP Org2MSP validating identity" -"2019-07-20 02:39:47.073 UTC [msp] getCertificationChain -> DEBU 75e MSP Org2MSP getting certification chain" -"2019-07-20 02:39:47.073 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 75f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.073 UTC [msp] DeserializeIdentity -> DEBU 760 Obtaining identity" -"2019-07-20 02:39:47.073 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 761 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.074 UTC [msp] DeserializeIdentity -> DEBU 762 Obtaining identity" -"2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 763 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 764 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 765 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 766 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 767 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 768 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.074 UTC [cauthdsl] func1 -> DEBU 769 0xc0038cd0c0 gate 1563590387074883400 evaluation starts" -"2019-07-20 02:39:47.074 UTC [cauthdsl] func2 -> DEBU 76a 0xc0038cd0c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.074 UTC [cauthdsl] func2 -> DEBU 76b 0xc0038cd0c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.075 UTC [cauthdsl] func2 -> DEBU 76c 0xc0038cd0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.075 UTC [cauthdsl] func2 -> DEBU 76d 0xc0038cd0c0 principal evaluation fails" -"2019-07-20 02:39:47.075 UTC [cauthdsl] func1 -> DEBU 76e 0xc0038cd0c0 gate 1563590387074883400 evaluation fails" -"2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 76f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 770 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 771 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.076 UTC [cauthdsl] func1 -> DEBU 772 0xc0038cd920 gate 1563590387076484600 evaluation starts" -"2019-07-20 02:39:47.076 UTC [cauthdsl] func2 -> DEBU 773 0xc0038cd920 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.076 UTC [cauthdsl] func2 -> DEBU 774 0xc0038cd920 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.076 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 775 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-07-20 02:39:47.076 UTC [msp] Validate -> DEBU 776 MSP Org2MSP validating identity" -"2019-07-20 02:39:47.077 UTC [msp] getCertificationChain -> DEBU 777 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:47.077 UTC [fsblkstorage] indexBlock -> DEBU 778 Indexing block [blockNum=2, blockHash=[]byte{0xb0, 0xfa, 0x63, 0xe5, 0xe8, 0x64, 0xcd, 0x16, 0x11, 0x80, 0x50, 0x35, 0x2d, 0xad, 0x86, 0x3a, 0xc1, 0x73, 0xcd, 0x98, 0x4c, 0x4b, 0x68, 0x4e, 0x68, 0x76, 0xba, 0xe2, 0x63, 0x2f, 0x8b, 0x3} txOffsets= -txId=43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f locPointer=offset=71, bytesLength=22741 -]" -"2019-07-20 02:39:47.077 UTC [fsblkstorage] indexBlock -> DEBU 77a Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22741] for tx ID: [43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f] to txid-index" -"2019-07-20 02:39:47.078 UTC [fsblkstorage] indexBlock -> DEBU 77b Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22741] for tx number:[0] ID: [43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f] to blockNumTranNum index" -"2019-07-20 02:39:47.077 UTC [cauthdsl] func2 -> DEBU 779 0xc0038cd920 principal matched by identity 0" -"2019-07-20 02:39:47.078 UTC [msp.identity] Verify -> DEBU 77c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:39:47.078 UTC [msp.identity] Verify -> DEBU 77d Verify: sig = 00000000 30 45 02 21 00 b5 08 ec a2 9a f2 02 e8 0d 9f fa |0E.!............| -00000010 be 56 91 95 23 4b 8b fe 8a 0e 32 22 e3 92 90 4c |.V..#K....2"...L| -00000020 9d 28 c3 af c4 02 20 50 74 94 85 0a 43 01 c4 6a |.(.... Pt...C..j| -00000030 16 31 5b dd c4 61 b7 01 a2 1c 97 0c 6f 4b b4 1c |.1[..a......oK..| -00000040 fc 29 ea 1b be 73 4d |.)...sM|" -"2019-07-20 02:39:47.078 UTC [cauthdsl] func2 -> DEBU 77e 0xc0038cd920 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.079 UTC [cauthdsl] func1 -> DEBU 77f 0xc0038cd920 gate 1563590387076484600 evaluation succeeds" -"2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 780 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 781 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 782 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.079 UTC [fsblkstorage] updateCheckpoint -> DEBU 783 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71461], isChainEmpty=[false], lastBlockNumber=[2]" -"2019-07-20 02:39:47.080 UTC [pvtdatastorage] Commit -> DEBU 785 Committing private data for block [2]" -"2019-07-20 02:39:47.080 UTC [policies] Evaluate -> DEBU 784 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.080 UTC [gossip.comm] authenticateRemotePeer -> DEBU 786 Authenticated 172.18.0.8:7051" -"2019-07-20 02:39:47.081 UTC [gossip.comm] createConnection -> DEBU 787 Exiting" -"2019-07-20 02:39:47.081 UTC [gossip.comm] sendToEndpoint -> DEBU 788 Exiting" -"2019-07-20 02:39:47.082 UTC [pvtdatastorage] Commit -> DEBU 789 Committed private data for block [2]" -"2019-07-20 02:39:47.083 UTC [gossip.comm] func1 -> DEBU 78a Got message: GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" -"2019-07-20 02:39:47.083 UTC [gossip.gossip] handleMessage -> DEBU 78b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" -"2019-07-20 02:39:47.084 UTC [gossip.gossip] handleMessage -> DEBU 78c Exiting" -"2019-07-20 02:39:47.085 UTC [gossip.discovery] handleMsgFromComm -> DEBU 78d Got message: GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" -"2019-07-20 02:39:47.085 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 78e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:47.085 UTC [kvledger] CommitWithPvtData -> DEBU 78f [businesschannel] Committing block [2] transactions to state database" -"2019-07-20 02:39:47.085 UTC [lockbasedtxmgr] Commit -> DEBU 790 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-07-20 02:39:47.086 UTC [lockbasedtxmgr] Commit -> DEBU 791 Committing updates to state database" -"2019-07-20 02:39:47.086 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 793 Building the expiry schedules based on the update batch" -"2019-07-20 02:39:47.087 UTC [lockbasedtxmgr] Commit -> DEBU 794 Write lock acquired for committing updates to state database" -"2019-07-20 02:39:47.088 UTC [stateleveldb] ApplyUpdates -> DEBU 795 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -"2019-07-20 02:39:47.086 UTC [msp.identity] Verify -> DEBU 792 Verify: digest = 00000000 fd 5a ec 2a 36 82 60 61 1d 52 2f 19 5c 39 01 a8 |.Z.*6.`a.R/.\9..| -00000010 97 81 74 0b d1 e3 f9 0c a9 c8 fb 49 e2 30 2d cc |..t........I.0-.|" -"2019-07-20 02:39:47.088 UTC [msp.identity] Verify -> DEBU 796 Verify: sig = 00000000 30 44 02 20 67 38 97 b4 58 0a 45 87 30 6f 98 3c |0D. g8..X.E.0o.<| -00000010 3e dd f2 97 5f 34 92 98 f4 61 72 84 3d d8 ba 3f |>..._4...ar.=..?| -00000020 32 47 f4 91 02 20 21 d0 d6 93 ad 18 9b 91 06 25 |2G... !........%| -00000030 de 3f 3f 56 d9 10 0d a4 bb 6c 96 fd 69 2e 62 0d |.??V.....l..i.b.| -00000040 88 83 39 ee 9a 01 |..9...|" -"2019-07-20 02:39:47.089 UTC [gossip.discovery] handleAliveMessage -> DEBU 797 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.089 UTC [gossip.discovery] isSentByMe -> DEBU 798 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.089 UTC [gossip.discovery] handleAliveMessage -> DEBU 799 Exiting" -"2019-07-20 02:39:47.089 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 79a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:47.089 UTC [msp.identity] Verify -> DEBU 79b Verify: digest = 00000000 33 e9 f7 b7 64 80 eb 44 9f b9 1a 0c c0 54 da b1 |3...d..D.....T..| -00000010 12 a2 7b 21 b9 aa 26 4c 17 09 9a 62 90 51 13 03 |..{!..&L...b.Q..|" -"2019-07-20 02:39:47.089 UTC [msp.identity] Verify -> DEBU 79c Verify: sig = 00000000 30 44 02 20 57 e9 01 f9 79 01 99 25 40 d2 89 c4 |0D. W...y..%@...| -00000010 39 8d a1 8c 1a f0 a9 da 2a f9 c6 2d 89 88 05 ce |9.......*..-....| -00000020 c5 a5 65 61 02 20 42 ad ad 4a 55 ae d8 0c 59 25 |..ea. B..JU...Y%| -00000030 b0 4b 69 80 7c 07 75 16 89 34 f8 38 ff 79 2a ed |.Ki.|.u..4.8.y*.| -00000040 27 e8 69 10 53 bf |'.i.S.|" -"2019-07-20 02:39:47.090 UTC [lockbasedtxmgr] Commit -> DEBU 79d Updates committed to state database and the write lock is released" -"2019-07-20 02:39:47.090 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 79e Preparing potential purge list working-set for expiringAtBlk [3]" -"2019-07-20 02:39:47.090 UTC [leveldbhelper] GetIterator -> DEBU 79f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" -"2019-07-20 02:39:47.091 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 7a2 No expiry entry found for expiringAtBlk [3]" -"2019-07-20 02:39:47.090 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a4 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a5 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a6 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a7 Exiting" -"2019-07-20 02:39:47.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a8 Exiting" -"2019-07-20 02:39:47.090 UTC [lockbasedtxmgr] func1 -> DEBU 7a1 launched the background routine for preparing keys to purge with the next block" -"2019-07-20 02:39:47.092 UTC [kvledger] CommitWithPvtData -> DEBU 7aa [businesschannel] Committing block [2] transactions to history database" -"2019-07-20 02:39:47.093 UTC [historyleveldb] Commit -> DEBU 7ab Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" -"2019-07-20 02:39:47.092 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:39:47.093 UTC [msp] DeserializeIdentity -> DEBU 7ac Obtaining identity" -"2019-07-20 02:39:47.093 UTC [historyleveldb] Commit -> DEBU 7ad Skipping transaction [0] since it is not an endorsement transaction" -"2019-07-20 02:39:47.095 UTC [historyleveldb] Commit -> DEBU 7ae Channel [businesschannel]: Updates committed to history database for blockNo [2]" -"2019-07-20 02:39:47.095 UTC [kvledger] CommitWithPvtData -> INFO 7af [businesschannel] Committed block [2] with 1 transaction(s) in 33ms (state_validation=5ms block_and_pvtdata_commit=17ms state_commit=7ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" -"2019-07-20 02:39:47.096 UTC [msp] GetDefaultSigningIdentity -> DEBU 7b0 Obtaining default signing identity" -"2019-07-20 02:39:47.096 UTC [msp.identity] Sign -> DEBU 7b1 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020803 " -"2019-07-20 02:39:47.097 UTC [msp.identity] Sign -> DEBU 7b2 Sign: digest: 6120CB6F8FAA033DDE98258E327315924BF1BBCF6DB355D5B4AE64BDA214C726 " -"2019-07-20 02:39:47.097 UTC [gossip.state] commitBlock -> DEBU 7b3 [businesschannel] Committed block [2] with 1 transaction(s)" -"2019-07-20 02:39:47.094 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.101 UTC [policies] Evaluate -> DEBU 7b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.104 UTC [policies] Evaluate -> DEBU 7b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.104 UTC [policies] Evaluate -> DEBU 7b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.105 UTC [cauthdsl] func1 -> DEBU 7ba 0xc00390d680 gate 1563590387105027200 evaluation starts" -"2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bb 0xc00390d680 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bc 0xc00390d680 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bd 0xc00390d680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7be 0xc00390d680 principal evaluation fails" -"2019-07-20 02:39:47.107 UTC [cauthdsl] func1 -> DEBU 7bf 0xc00390d680 gate 1563590387105027200 evaluation fails" -"2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.110 UTC [cauthdsl] func1 -> DEBU 7c3 0xc00390dec0 gate 1563590387110615100 evaluation starts" -"2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c4 0xc00390dec0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c5 0xc00390dec0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c6 0xc00390dec0 principal matched by identity 0" -"2019-07-20 02:39:47.111 UTC [msp.identity] Verify -> DEBU 7c7 Verify: digest = 00000000 37 29 4f 27 ee 89 d6 8e 32 ef 91 79 4f e2 d1 74 |7)O'....2..yO..t| -00000010 e1 30 0d d1 0e 6b 5d 2b cc 5a 4f 26 a8 22 b3 9a |.0...k]+.ZO&."..|" -"2019-07-20 02:39:47.111 UTC [msp.identity] Verify -> DEBU 7c8 Verify: sig = 00000000 30 44 02 20 5b d2 0a 4b b5 fe f2 39 00 65 ef 04 |0D. [..K...9.e..| -00000010 21 a8 70 d5 76 9b b1 b2 df 47 3a 43 7b bc 9b f4 |!.p.v....G:C{...| -00000020 31 35 67 a6 02 20 26 8b da dd f0 b4 9b b5 3e 5f |15g.. &.......>_| -00000030 3f 9a 30 db b8 50 7f bb 51 e2 59 78 e7 cb 9f 73 |?.0..P..Q.Yx...s| -00000040 3c 08 e5 df 73 bf |<...s.|" -"2019-07-20 02:39:47.112 UTC [cauthdsl] func2 -> DEBU 7c9 0xc00390dec0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.112 UTC [cauthdsl] func1 -> DEBU 7ca 0xc00390dec0 gate 1563590387110615100 evaluation succeeds" -"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cd Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.113 UTC [gossip.discovery] handleAliveMessage -> DEBU 7cf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.113 UTC [gossip.discovery] learnNewMembers -> DEBU 7d0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" -"2019-07-20 02:39:47.114 UTC [gossip.discovery] learnNewMembers -> DEBU 7d1 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.114 UTC [gossip.discovery] learnNewMembers -> DEBU 7d2 Exiting" -"2019-07-20 02:39:47.115 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d3 Exiting" -"2019-07-20 02:39:47.116 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7d4 Exiting" -"2019-07-20 02:39:47.144 UTC [comm.grpc.server] 1 -> INFO 7d5 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.143Z grpc.peer_address=172.18.0.8:60306 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=346.9µs -"2019-07-20 02:39:47.146 UTC [msp] GetDefaultSigningIdentity -> DEBU 7d6 Obtaining default signing identity" -"2019-07-20 02:39:47.146 UTC [msp.identity] Sign -> DEBU 7d7 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.147 UTC [msp.identity] Sign -> DEBU 7d8 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.147 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d9 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60306" -"2019-07-20 02:39:47.148 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7da Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60306" -"2019-07-20 02:39:47.149 UTC [msp] DeserializeIdentity -> DEBU 7db Obtaining identity" -"2019-07-20 02:39:47.149 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.150 UTC [msp] DeserializeIdentity -> DEBU 7dd Obtaining identity" -"2019-07-20 02:39:47.150 UTC [grpc] infof -> DEBU 7de transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:47.151 UTC [gossip.comm] func1 -> DEBU 7df Got message: GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" -"2019-07-20 02:39:47.151 UTC [gossip.gossip] handleMessage -> DEBU 7e0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" -"2019-07-20 02:39:47.152 UTC [gossip.gossip] handleMessage -> DEBU 7e1 Exiting" -"2019-07-20 02:39:47.152 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7e2 Got message: GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" -"2019-07-20 02:39:47.152 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7e3 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:39:47.152 UTC [msp] DeserializeIdentity -> DEBU 7e4 Obtaining identity" -"2019-07-20 02:39:47.153 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7e5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e6 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e7 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.155 UTC [policies] Evaluate -> DEBU 7e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.155 UTC [policies] Evaluate -> DEBU 7e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.156 UTC [policies] Evaluate -> DEBU 7ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.156 UTC [cauthdsl] func1 -> DEBU 7eb 0xc003988d40 gate 1563590387156212600 evaluation starts" -"2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ec 0xc003988d40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ed 0xc003988d40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ee 0xc003988d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ef 0xc003988d40 principal evaluation fails" -"2019-07-20 02:39:47.157 UTC [cauthdsl] func1 -> DEBU 7f0 0xc003988d40 gate 1563590387156212600 evaluation fails" -"2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.157 UTC [cauthdsl] func1 -> DEBU 7f4 0xc003989580 gate 1563590387157637200 evaluation starts" -"2019-07-20 02:39:47.157 UTC [cauthdsl] func2 -> DEBU 7f5 0xc003989580 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.158 UTC [cauthdsl] func2 -> DEBU 7f7 0xc003989580 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.159 UTC [cauthdsl] func2 -> DEBU 7f8 0xc003989580 principal matched by identity 0" -"2019-07-20 02:39:47.159 UTC [msp.identity] Verify -> DEBU 7f9 Verify: digest = 00000000 8d 96 0a e7 f4 d6 9c 6a 41 dd 56 bd 54 37 68 f8 |.......jA.V.T7h.| -00000010 86 5d 33 ca d9 e3 62 54 84 3c 10 d3 48 0d 9f 26 |.]3...bT.<..H..&|" -"2019-07-20 02:39:47.159 UTC [msp.identity] Verify -> DEBU 7fa Verify: sig = 00000000 30 45 02 21 00 ba ca 3b 2a 08 32 48 44 89 bb cd |0E.!...;*.2HD...| -00000010 e8 fe d1 bd 03 49 28 e4 c6 9f 33 a6 2f 6e 6a 7f |.....I(...3./nj.| -00000020 33 26 20 63 9b 02 20 36 43 a1 44 d4 f4 33 ff b3 |3& c.. 6C.D..3..| -00000030 a7 62 eb 2f b3 0e 53 6c f0 8e 83 8c ad 34 32 f1 |.b./..Sl.....42.| -00000040 92 8b 10 c6 aa a3 47 |......G|" -"2019-07-20 02:39:47.157 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.159 UTC [cauthdsl] func2 -> DEBU 7fb 0xc003989580 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.159 UTC [cauthdsl] func1 -> DEBU 7fc 0xc003989580 gate 1563590387157637200 evaluation succeeds" -"2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7ff Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 800 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.160 UTC [msp] DeserializeIdentity -> DEBU 801 Obtaining identity" -"2019-07-20 02:39:47.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 802 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:47.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 803 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:39:47.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 804 updating membership: timestamp: " -"2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 805 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 806 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 807 Exiting" -"2019-07-20 02:39:47.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 808 Exiting" -"2019-07-20 02:39:47.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 809 Exiting" -"2019-07-20 02:39:47.162 UTC [gossip.discovery] sendMemResponse -> DEBU 80a Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:39:47.163 UTC [msp] DeserializeIdentity -> DEBU 80b Obtaining identity" -"2019-07-20 02:39:47.163 UTC [msp] DeserializeIdentity -> DEBU 80c Obtaining identity" -"2019-07-20 02:39:47.163 UTC [gossip.comm] Send -> DEBU 80d Entering, sending GossipMessage: Channel: , nonce: 12908362155311551576, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:47.163 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 80e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 80f Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.164 UTC [gossip.discovery] sendMemResponse -> DEBU 810 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\022" signature:"0D\002 W\351\001\371y\001\231%@\322\211\3049\215\241\214\032\360\251\332*\371\306-\211\210\005\316\305\245ea\002 B\255\255JU\256\330\014Y%\260Ki\200|\007u\026\2114\3708\377y*\355'\350i\020S\277" > alive: alive: " -"2019-07-20 02:39:47.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 811 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.164 UTC [policies] Evaluate -> DEBU 812 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.164 UTC [policies] Evaluate -> DEBU 813 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.165 UTC [policies] Evaluate -> DEBU 814 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.165 UTC [cauthdsl] func1 -> DEBU 815 0xc0039a7050 gate 1563590387165054700 evaluation starts" -"2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 816 0xc0039a7050 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 817 0xc0039a7050 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 818 0xc0039a7050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.166 UTC [cauthdsl] func2 -> DEBU 819 0xc0039a7050 principal evaluation fails" -"2019-07-20 02:39:47.166 UTC [cauthdsl] func1 -> DEBU 81a 0xc0039a7050 gate 1563590387165054700 evaluation fails" -"2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.167 UTC [cauthdsl] func1 -> DEBU 81e 0xc0039a7890 gate 1563590387166750100 evaluation starts" -"2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 81f 0xc0039a7890 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 820 0xc0039a7890 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 821 0xc0039a7890 principal matched by identity 0" -"2019-07-20 02:39:47.168 UTC [msp.identity] Verify -> DEBU 822 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:39:47.168 UTC [msp.identity] Verify -> DEBU 823 Verify: sig = 00000000 30 44 02 20 6d b6 11 5e b2 8d 15 70 cb a8 c8 d8 |0D. m..^...p....| -00000010 34 91 cf f1 80 6a 2f 1f 8e f7 15 2c bf fe d5 fc |4....j/....,....| -00000020 ee 0a 62 60 02 20 13 35 c4 b1 10 1a 41 2f 2a 16 |..b`. .5....A/*.| -00000030 c7 59 4b ca 7c 04 39 0b 04 c6 06 a2 b2 26 9c 1d |.YK.|.9......&..| -00000040 37 39 f1 c3 85 3d |79...=|" -"2019-07-20 02:39:47.169 UTC [cauthdsl] func2 -> DEBU 824 0xc0039a7890 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.169 UTC [cauthdsl] func1 -> DEBU 825 0xc0039a7890 gate 1563590387166750100 evaluation succeeds" -"2019-07-20 02:39:47.169 UTC [policies] Evaluate -> DEBU 826 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.170 UTC [policies] Evaluate -> DEBU 827 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.170 UTC [policies] Evaluate -> DEBU 828 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.171 UTC [policies] Evaluate -> DEBU 829 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.171 UTC [gossip.comm] authenticateRemotePeer -> DEBU 82a Authenticated 172.18.0.8:60306" -"2019-07-20 02:39:47.171 UTC [gossip.comm] GossipStream -> DEBU 82b Servicing 172.18.0.8:60306" -"2019-07-20 02:39:47.171 UTC [gossip.comm] writeToStream -> DEBU 82c Closing writing to stream" -"2019-07-20 02:39:47.172 UTC [gossip.comm] serviceConnection -> DEBU 82d Closing reading from stream" -"2019-07-20 02:39:47.172 UTC [gossip.comm] readFromStream -> DEBU 82e 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -"2019-07-20 02:39:47.172 UTC [gossip.comm] readFromStream -> DEBU 82f Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:47.173 UTC [gossip.comm] func2 -> DEBU 830 Client 172.18.0.8:60306 disconnected" -"2019-07-20 02:39:47.173 UTC [comm.grpc.server] 1 -> INFO 831 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.146Z grpc.peer_address=172.18.0.8:60306 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.0277ms -"2019-07-20 02:39:47.173 UTC [gossip.comm] sendToEndpoint -> DEBU 832 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12908362155311551576, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" -"2019-07-20 02:39:47.175 UTC [gossip.comm] createConnection -> DEBU 835 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:39:47.174 UTC [gossip.comm] writeToStream -> DEBU 833 Closing writing to stream" -"2019-07-20 02:39:47.174 UTC [grpc] infof -> DEBU 834 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:47.178 UTC [grpc] DialContext -> DEBU 836 parsed scheme: """ -"2019-07-20 02:39:47.179 UTC [grpc] DialContext -> DEBU 837 scheme "" not registered, fallback to default scheme" -"2019-07-20 02:39:47.180 UTC [grpc] watcher -> DEBU 838 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -"2019-07-20 02:39:47.180 UTC [grpc] switchBalancer -> DEBU 839 ClientConn switching balancer to "pick_first"" -"2019-07-20 02:39:47.180 UTC [grpc] HandleSubConnStateChange -> DEBU 83a pickfirstBalancer: HandleSubConnStateChange: 0xc0039e83b0, CONNECTING" -"2019-07-20 02:39:47.187 UTC [grpc] HandleSubConnStateChange -> DEBU 83b pickfirstBalancer: HandleSubConnStateChange: 0xc0039e83b0, READY" -"2019-07-20 02:39:47.196 UTC [msp] GetDefaultSigningIdentity -> DEBU 83c Obtaining default signing identity" -"2019-07-20 02:39:47.196 UTC [msp.identity] Sign -> DEBU 83d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.197 UTC [msp.identity] Sign -> DEBU 83e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.197 UTC [gossip.comm] authenticateRemotePeer -> DEBU 83f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" -"2019-07-20 02:39:47.197 UTC [gossip.comm] authenticateRemotePeer -> DEBU 840 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -"2019-07-20 02:39:47.198 UTC [msp] DeserializeIdentity -> DEBU 841 Obtaining identity" -"2019-07-20 02:39:47.198 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 842 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.198 UTC [msp] DeserializeIdentity -> DEBU 843 Obtaining identity" -"2019-07-20 02:39:47.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 844 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.199 UTC [msp] DeserializeIdentity -> DEBU 845 Obtaining identity" -"2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 846 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 847 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 848 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 849 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 84a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 84b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.201 UTC [cauthdsl] func1 -> DEBU 84c 0xc003a290c0 gate 1563590387201199500 evaluation starts" -"2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84d 0xc003a290c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84e 0xc003a290c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84f 0xc003a290c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.202 UTC [cauthdsl] func2 -> DEBU 850 0xc003a290c0 principal evaluation fails" -"2019-07-20 02:39:47.202 UTC [cauthdsl] func1 -> DEBU 851 0xc003a290c0 gate 1563590387201199500 evaluation fails" -"2019-07-20 02:39:47.202 UTC [policies] Evaluate -> DEBU 852 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.202 UTC [policies] Evaluate -> DEBU 853 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.203 UTC [policies] Evaluate -> DEBU 854 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.203 UTC [cauthdsl] func1 -> DEBU 855 0xc003a29900 gate 1563590387203096300 evaluation starts" -"2019-07-20 02:39:47.203 UTC [cauthdsl] func2 -> DEBU 856 0xc003a29900 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.204 UTC [cauthdsl] func2 -> DEBU 857 0xc003a29900 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.205 UTC [cauthdsl] func2 -> DEBU 858 0xc003a29900 principal matched by identity 0" -"2019-07-20 02:39:47.205 UTC [msp.identity] Verify -> DEBU 859 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:39:47.205 UTC [msp.identity] Verify -> DEBU 85a Verify: sig = 00000000 30 45 02 21 00 e9 e4 68 d4 df e3 f8 4d 5a 3a 48 |0E.!...h....MZ:H| -00000010 69 08 ac 7a 81 65 5c ac a8 93 17 b7 50 06 16 b9 |i..z.e\.....P...| -00000020 42 6f 05 0c 4a 02 20 62 cd 76 94 68 20 61 dc f0 |Bo..J. b.v.h a..| -00000030 2e 83 42 5f 09 56 d2 9a df 89 3b 1f f1 67 8c 5e |..B_.V....;..g.^| -00000040 54 84 08 79 53 c7 cb |T..yS..|" -"2019-07-20 02:39:47.206 UTC [cauthdsl] func2 -> DEBU 85b 0xc003a29900 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.206 UTC [cauthdsl] func1 -> DEBU 85c 0xc003a29900 gate 1563590387203096300 evaluation succeeds" -"2019-07-20 02:39:47.206 UTC [policies] Evaluate -> DEBU 85d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.206 UTC [policies] Evaluate -> DEBU 85e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.208 UTC [policies] Evaluate -> DEBU 85f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.209 UTC [policies] Evaluate -> DEBU 860 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.209 UTC [gossip.comm] authenticateRemotePeer -> DEBU 861 Authenticated 172.18.0.8:7051" -"2019-07-20 02:39:47.210 UTC [gossip.comm] createConnection -> DEBU 862 Exiting" -"2019-07-20 02:39:47.210 UTC [gossip.comm] sendToEndpoint -> DEBU 863 Exiting" -"2019-07-20 02:39:47.215 UTC [comm.grpc.server] 1 -> INFO 864 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.214Z grpc.peer_address=172.18.0.8:60310 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=280.1µs -"2019-07-20 02:39:47.220 UTC [msp] GetDefaultSigningIdentity -> DEBU 865 Obtaining default signing identity" -"2019-07-20 02:39:47.220 UTC [msp.identity] Sign -> DEBU 866 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.220 UTC [msp.identity] Sign -> DEBU 867 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.221 UTC [gossip.comm] authenticateRemotePeer -> DEBU 868 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60310" -"2019-07-20 02:39:47.221 UTC [gossip.comm] authenticateRemotePeer -> DEBU 869 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60310" -"2019-07-20 02:39:47.221 UTC [msp] DeserializeIdentity -> DEBU 86a Obtaining identity" -"2019-07-20 02:39:47.222 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.222 UTC [msp] DeserializeIdentity -> DEBU 86c Obtaining identity" -"2019-07-20 02:39:47.222 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.223 UTC [msp] DeserializeIdentity -> DEBU 86e Obtaining identity" -"2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 870 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 871 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.223 UTC [policies] Evaluate -> DEBU 872 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.223 UTC [policies] Evaluate -> DEBU 873 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.224 UTC [policies] Evaluate -> DEBU 874 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.224 UTC [cauthdsl] func1 -> DEBU 875 0xc003a8c6d0 gate 1563590387224316500 evaluation starts" -"2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 876 0xc003a8c6d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 877 0xc003a8c6d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 878 0xc003a8c6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.225 UTC [cauthdsl] func2 -> DEBU 879 0xc003a8c6d0 principal evaluation fails" -"2019-07-20 02:39:47.225 UTC [cauthdsl] func1 -> DEBU 87a 0xc003a8c6d0 gate 1563590387224316500 evaluation fails" -"2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.226 UTC [cauthdsl] func1 -> DEBU 87e 0xc003a8cf10 gate 1563590387226149600 evaluation starts" -"2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 87f 0xc003a8cf10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 880 0xc003a8cf10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 881 0xc003a8cf10 principal matched by identity 0" -"2019-07-20 02:39:47.227 UTC [msp.identity] Verify -> DEBU 882 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:39:47.227 UTC [msp.identity] Verify -> DEBU 883 Verify: sig = 00000000 30 44 02 20 6d d0 06 0a 99 c2 1d 0b e9 3a 86 7e |0D. m........:.~| -00000010 68 d0 40 cb 2f 4e d9 d8 78 cd 47 dd 01 76 b8 9d |h.@./N..x.G..v..| -00000020 f5 70 2e 60 02 20 3d a3 e5 19 8e 4e a7 e1 9f f1 |.p.`. =....N....| -00000030 d8 bc bb ff 20 77 36 db db 14 c8 b4 d4 5d 1a 9a |.... w6......]..| -00000040 ed 38 04 92 47 49 |.8..GI|" -"2019-07-20 02:39:47.227 UTC [cauthdsl] func2 -> DEBU 884 0xc003a8cf10 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.227 UTC [cauthdsl] func1 -> DEBU 885 0xc003a8cf10 gate 1563590387226149600 evaluation succeeds" -"2019-07-20 02:39:47.227 UTC [policies] Evaluate -> DEBU 886 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 887 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 888 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 889 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.228 UTC [gossip.comm] authenticateRemotePeer -> DEBU 88a Authenticated 172.18.0.8:60310" -"2019-07-20 02:39:47.228 UTC [gossip.comm] GossipStream -> DEBU 88b Servicing 172.18.0.8:60310" -"2019-07-20 02:39:47.228 UTC [gossip.comm] serviceConnection -> DEBU 88c Closing reading from stream" -"2019-07-20 02:39:47.229 UTC [gossip.comm] writeToStream -> DEBU 88d Closing writing to stream" -"2019-07-20 02:39:47.229 UTC [gossip.comm] readFromStream -> DEBU 88e 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -"2019-07-20 02:39:47.229 UTC [grpc] infof -> DEBU 88f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:47.231 UTC [grpc] infof -> DEBU 890 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:47.231 UTC [gossip.comm] readFromStream -> DEBU 891 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:47.231 UTC [gossip.comm] func2 -> DEBU 892 Client 172.18.0.8:60310 disconnected" -"2019-07-20 02:39:47.231 UTC [comm.grpc.server] 1 -> INFO 893 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.219Z grpc.peer_address=172.18.0.8:60310 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6668ms -"2019-07-20 02:39:47.231 UTC [gossip.comm] writeToStream -> DEBU 894 Closing writing to stream" -"2019-07-20 02:39:47.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 895 Obtaining default signing identity" -"2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 896 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151010 " -"2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 897 Sign: digest: 9E55EC7FB3BB5A09C8F1096E69D65D68FCCE83FB3E49B5C1994EDFEB97B2439D " -"2019-07-20 02:39:47.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 898 Obtaining default signing identity" -"2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 899 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 89a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:47.265 UTC [gossip.discovery] periodicalSendAlive -> DEBU 89b Sleeping 5s" -"2019-07-20 02:39:47.267 UTC [msp] DeserializeIdentity -> DEBU 89c Obtaining identity" -"2019-07-20 02:39:47.267 UTC [msp] DeserializeIdentity -> DEBU 89d Obtaining identity" -"2019-07-20 02:39:47.267 UTC [gossip.comm] Send -> DEBU 89e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:47.268 UTC [gossip.comm] Send -> DEBU 89f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a2 Exiting" -"2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.269 UTC [gossip.comm] createConnection -> DEBU 8a3 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:39:47.270 UTC [grpc] DialContext -> DEBU 8a4 parsed scheme: """ -"2019-07-20 02:39:47.270 UTC [grpc] DialContext -> DEBU 8a5 scheme "" not registered, fallback to default scheme" -"2019-07-20 02:39:47.270 UTC [grpc] watcher -> DEBU 8a6 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -"2019-07-20 02:39:47.270 UTC [grpc] switchBalancer -> DEBU 8a7 ClientConn switching balancer to "pick_first"" -"2019-07-20 02:39:47.270 UTC [grpc] HandleSubConnStateChange -> DEBU 8a8 pickfirstBalancer: HandleSubConnStateChange: 0xc003ac52b0, CONNECTING" -"2019-07-20 02:39:47.275 UTC [grpc] HandleSubConnStateChange -> DEBU 8a9 pickfirstBalancer: HandleSubConnStateChange: 0xc003ac52b0, READY" -"2019-07-20 02:39:47.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 8aa Obtaining default signing identity" -"2019-07-20 02:39:47.280 UTC [msp.identity] Sign -> DEBU 8ab Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.280 UTC [msp.identity] Sign -> DEBU 8ac Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.280 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ad Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" -"2019-07-20 02:39:47.282 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ae Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -"2019-07-20 02:39:47.283 UTC [msp] DeserializeIdentity -> DEBU 8af Obtaining identity" -"2019-07-20 02:39:47.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.286 UTC [msp] DeserializeIdentity -> DEBU 8b1 Obtaining identity" -"2019-07-20 02:39:47.287 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.287 UTC [msp] DeserializeIdentity -> DEBU 8b3 Obtaining identity" -"2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8b5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8b6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.288 UTC [policies] Evaluate -> DEBU 8b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.289 UTC [policies] Evaluate -> DEBU 8b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.290 UTC [policies] Evaluate -> DEBU 8b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.290 UTC [cauthdsl] func1 -> DEBU 8ba 0xc003b22fc0 gate 1563590387290515900 evaluation starts" -"2019-07-20 02:39:47.290 UTC [cauthdsl] func2 -> DEBU 8bb 0xc003b22fc0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8bc 0xc003b22fc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8bd 0xc003b22fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8be 0xc003b22fc0 principal evaluation fails" -"2019-07-20 02:39:47.291 UTC [cauthdsl] func1 -> DEBU 8bf 0xc003b22fc0 gate 1563590387290515900 evaluation fails" -"2019-07-20 02:39:47.291 UTC [policies] Evaluate -> DEBU 8c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.291 UTC [policies] Evaluate -> DEBU 8c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.292 UTC [policies] Evaluate -> DEBU 8c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.292 UTC [cauthdsl] func1 -> DEBU 8c3 0xc003b23800 gate 1563590387292449700 evaluation starts" -"2019-07-20 02:39:47.292 UTC [cauthdsl] func2 -> DEBU 8c4 0xc003b23800 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.292 UTC [cauthdsl] func2 -> DEBU 8c5 0xc003b23800 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.293 UTC [cauthdsl] func2 -> DEBU 8c6 0xc003b23800 principal matched by identity 0" -"2019-07-20 02:39:47.294 UTC [msp.identity] Verify -> DEBU 8c7 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:39:47.294 UTC [msp.identity] Verify -> DEBU 8c8 Verify: sig = 00000000 30 44 02 20 4b 5d ab 54 15 82 ca 40 c4 e0 84 79 |0D. K].T...@...y| -00000010 5e ca 3d 33 21 b2 3e 8c a7 81 ef 81 3b 80 cd 16 |^.=3!.>.....;...| -00000020 98 81 0e 88 02 20 7d 19 e5 dc 30 31 7d 30 0d 6c |..... }...01}0.l| -00000030 10 f1 6e 61 fc ef 84 93 f5 10 5f 08 5f 1d b7 d6 |..na......_._...| -00000040 f0 0b 6e d9 05 44 |..n..D|" -"2019-07-20 02:39:47.294 UTC [cauthdsl] func2 -> DEBU 8c9 0xc003b23800 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.296 UTC [cauthdsl] func1 -> DEBU 8ca 0xc003b23800 gate 1563590387292449700 evaluation succeeds" -"2019-07-20 02:39:47.296 UTC [policies] Evaluate -> DEBU 8cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8cd Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.297 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8cf Authenticated 172.18.0.8:7051" -"2019-07-20 02:39:47.297 UTC [gossip.comm] createConnection -> DEBU 8d0 Exiting" -"2019-07-20 02:39:47.298 UTC [gossip.comm] sendToEndpoint -> DEBU 8d1 Exiting" -"2019-07-20 02:39:47.302 UTC [comm.grpc.server] 1 -> INFO 8d2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.301Z grpc.peer_address=172.18.0.7:58950 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=480.6µs -"2019-07-20 02:39:47.305 UTC [msp] GetDefaultSigningIdentity -> DEBU 8d3 Obtaining default signing identity" -"2019-07-20 02:39:47.305 UTC [msp.identity] Sign -> DEBU 8d4 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.305 UTC [msp.identity] Sign -> DEBU 8d5 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.306 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d6 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:58950" -"2019-07-20 02:39:47.309 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d7 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58950" -"2019-07-20 02:39:47.309 UTC [msp] DeserializeIdentity -> DEBU 8d8 Obtaining identity" -"2019-07-20 02:39:47.309 UTC [msp] DeserializeIdentity -> DEBU 8d9 Obtaining identity" -"2019-07-20 02:39:47.310 UTC [msp.identity] newIdentity -> DEBU 8da Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:04.591 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 594 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:25:04.591 UTC [msp] Validate -> DEBU 595 MSP Org2MSP validating identity" +"2019-09-24 00:25:04.592 UTC [msp] getCertificationChain -> DEBU 596 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.592 UTC [msp] hasOURole -> DEBU 597 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:25:04.592 UTC [msp] getCertificationChain -> DEBU 598 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 599 Obtaining default signing identity" +"2019-09-24 00:25:04.609 UTC [msp.identity] Sign -> DEBU 59a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315100F " +"2019-09-24 00:25:04.609 UTC [msp.identity] Sign -> DEBU 59b Sign: digest: 073858533E1A3B4D07C8575591739066B064A300CDD4068EB5169E890FF7C592 " +"2019-09-24 00:25:04.609 UTC [msp] GetDefaultSigningIdentity -> DEBU 59c Obtaining default signing identity" +"2019-09-24 00:25:04.609 UTC [msp.identity] Sign -> DEBU 59d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:04.609 UTC [msp.identity] Sign -> DEBU 59e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:04.609 UTC [gossip.discovery] periodicalSendAlive -> DEBU 59f Sleeping 5s" +"2019-09-24 00:25:04.609 UTC [gossip.comm] Send -> DEBU 5a0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:04.609 UTC [gossip.comm] sendToEndpoint -> DEBU 5a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:04.609 UTC [gossip.comm] sendToEndpoint -> DEBU 5a2 Exiting" +"2019-09-24 00:25:04.609 UTC [msp] Setup -> DEBU 5a3 Setting up the MSP manager (3 msps)" +"2019-09-24 00:25:04.609 UTC [msp] Setup -> DEBU 5a4 MSP manager setup complete, setup 3 msps" +"2019-09-24 00:25:04.609 UTC [policies] NewManagerImpl -> DEBU 5a5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5a6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5a7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5a8 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5a9 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5aa Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5ab Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5ac Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5ad Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5ae Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5af Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b0 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b1 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b2 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b3 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b4 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b5 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:25:04.610 UTC [policies] NewManagerImpl -> DEBU 5b6 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:25:04.611 UTC [policies] NewManagerImpl -> DEBU 5b7 Proposed new policy Readers for Channel/Application" +"2019-09-24 00:25:04.611 UTC [policies] NewManagerImpl -> DEBU 5b8 Proposed new policy Writers for Channel/Application" +"2019-09-24 00:25:04.611 UTC [policies] NewManagerImpl -> DEBU 5b9 Proposed new policy Readers for Channel" +"2019-09-24 00:25:04.611 UTC [policies] NewManagerImpl -> DEBU 5ba Proposed new policy Writers for Channel" +"2019-09-24 00:25:04.611 UTC [policies] NewManagerImpl -> DEBU 5bb Proposed new policy Admins for Channel" +"2019-09-24 00:25:04.611 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Group] /Channel" +"2019-09-24 00:25:04.619 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:25:04.620 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:04.620 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:25:04.620 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:25:04.623 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:04.623 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:25:04.623 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:25:04.624 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:25:04.625 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:25:04.625 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:25:04.626 UTC [common.configtx] addToMap -> DEBU 5c8 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:25:04.627 UTC [common.configtx] addToMap -> DEBU 5c9 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:25:04.627 UTC [common.configtx] addToMap -> DEBU 5ca Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:04.635 UTC [common.configtx] addToMap -> DEBU 5cb Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:25:04.637 UTC [common.configtx] addToMap -> DEBU 5cc Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:25:04.612 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 5bd Sleeping 25s" +"2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5cd Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5ce Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5cf Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5d0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5d1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5d2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:04.641 UTC [common.configtx] addToMap -> DEBU 5d3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.646 UTC [common.configtx] addToMap -> DEBU 5d4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:04.652 UTC [common.configtx] addToMap -> DEBU 5d5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:04.655 UTC [common.configtx] addToMap -> DEBU 5d6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:04.655 UTC [common.configtx] addToMap -> DEBU 5d7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:04.667 UTC [common.configtx] addToMap -> DEBU 5d8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:04.672 UTC [common.configtx] addToMap -> DEBU 5d9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:04.685 UTC [common.configtx] addToMap -> DEBU 5da Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.695 UTC [common.configtx] addToMap -> DEBU 5db Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:25:04.696 UTC [common.configtx] addToMap -> DEBU 5dc Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:25:04.727 UTC [gossip.gossip] handleMessage -> DEBU 5dd Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:04.740 UTC [gossip.gossip] handleMessage -> DEBU 5de Exiting" +"2019-09-24 00:25:04.740 UTC [gossip.gossip] handleMessage -> DEBU 5df Entering, 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:04.740 UTC [gossip.pull] HandleMessage -> DEBU 5e0 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:04.740 UTC [gossip.pull] SendDigest -> DEBU 5e1 Sending BLOCK_MSG digest: [1] to 172.18.0.5:49000 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:04.740 UTC [gossip.gossip] handleMessage -> DEBU 5e2 Exiting" +"2019-09-24 00:25:04.742 UTC [common.configtx] addToMap -> DEBU 5e3 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5ea Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5eb Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5ec Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5ed Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:25:04.743 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:25:04.743 UTC [common.channelconfig] LogSanityChecks -> DEBU 5f0 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:25:04.743 UTC [common.channelconfig] LogSanityChecks -> DEBU 5f1 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:25:04.748 UTC [policies] Manager -> DEBU 5f2 Manager Channel looking up path [Application]" +"2019-09-24 00:25:04.748 UTC [policies] Manager -> DEBU 5f3 Manager Channel has managers Orderer" +"2019-09-24 00:25:04.749 UTC [policies] Manager -> DEBU 5f4 Manager Channel has managers Application" +"2019-09-24 00:25:04.749 UTC [policies] Manager -> DEBU 5f5 Manager Channel/Application looking up path []" +"2019-09-24 00:25:04.749 UTC [policies] Manager -> DEBU 5f6 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:04.749 UTC [policies] Manager -> DEBU 5f7 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:04.749 UTC [common.channelconfig] LogSanityChecks -> DEBU 5f8 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 00:25:04.749 UTC [common.channelconfig] LogSanityChecks -> DEBU 5f9 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 00:25:04.749 UTC [common.channelconfig] LogSanityChecks -> DEBU 5fa As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 00:25:04.749 UTC [policies] Manager -> DEBU 5fb Manager Channel looking up path [Orderer]" +"2019-09-24 00:25:04.750 UTC [policies] Manager -> DEBU 5fc Manager Channel has managers Orderer" +"2019-09-24 00:25:04.750 UTC [policies] Manager -> DEBU 5fd Manager Channel has managers Application" +"2019-09-24 00:25:04.750 UTC [policies] Manager -> DEBU 5fe Manager Channel/Orderer looking up path []" +"2019-09-24 00:25:04.753 UTC [policies] Manager -> DEBU 5ff Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:25:04.754 UTC [common.channelconfig] LogSanityChecks -> DEBU 600 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:25:04.754 UTC [common.channelconfig] LogSanityChecks -> DEBU 601 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:25:04.754 UTC [common.channelconfig] LogSanityChecks -> DEBU 602 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:25:04.754 UTC [common.channelconfig] LogSanityChecks -> DEBU 603 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:25:04.754 UTC [common.capabilities] Supported -> DEBU 604 Application capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:04.754 UTC [common.capabilities] Supported -> DEBU 605 Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:04.754 UTC [gossip.service] ProcessConfigUpdate -> DEBU 606 Processing new config for channel businesschannel" +"2019-09-24 00:25:04.754 UTC [gossip.service] ProcessConfigUpdate -> DEBU 607 Calling out because config was updated for channel businesschannel" +"2019-09-24 00:25:04.754 UTC [gossip.service] updateAnchors -> DEBU 608 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-09-24 00:25:04.755 UTC [gossip.service] updateAnchors -> DEBU 609 Org2MSP anchor peers: []" +"2019-09-24 00:25:04.784 UTC [comm.grpc.server] 1 -> INFO 60a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:06.783Z grpc.peer_address=172.18.0.8:34550 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=165.5µs +"2019-09-24 00:25:04.800 UTC [comm.grpc.server] 1 -> INFO 60b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:06.798Z grpc.peer_address=172.18.0.5:49082 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=927.6µs +"2019-09-24 00:25:04.811 UTC [msp] GetDefaultSigningIdentity -> DEBU 60c Obtaining default signing identity" +"2019-09-24 00:25:04.824 UTC [msp.identity] Sign -> DEBU 60d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:04.824 UTC [msp.identity] Sign -> DEBU 60e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:04.824 UTC [gossip.comm] authenticateRemotePeer -> DEBU 60f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:34550" +"2019-09-24 00:25:04.825 UTC [gossip.comm] authenticateRemotePeer -> DEBU 610 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:34550" +"2019-09-24 00:25:04.825 UTC [msp] DeserializeIdentity -> DEBU 611 Obtaining identity" +"2019-09-24 00:25:04.825 UTC [msp] DeserializeIdentity -> DEBU 612 Obtaining identity" +"2019-09-24 00:25:04.825 UTC [msp.identity] newIdentity -> DEBU 613 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -3037,15089 +2168,792 @@ BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -----END CERTIFICATE-----" -"2019-07-20 02:39:47.316 UTC [grpc] infof -> DEBU 8db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:47.318 UTC [msp] Validate -> DEBU 8dc MSP Org2MSP validating identity" -"2019-07-20 02:39:47.319 UTC [msp] getCertificationChain -> DEBU 8dd MSP Org2MSP getting certification chain" -"2019-07-20 02:39:47.320 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.320 UTC [msp] DeserializeIdentity -> DEBU 8df Obtaining identity" -"2019-07-20 02:39:47.321 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.321 UTC [msp] DeserializeIdentity -> DEBU 8e1 Obtaining identity" -"2019-07-20 02:39:47.322 UTC [msp] DeserializeIdentity -> DEBU 8e2 Obtaining identity" -"2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8e4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8e5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.323 UTC [cauthdsl] func1 -> DEBU 8e9 0xc003ba0b30 gate 1563590387323532000 evaluation starts" -"2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8ea 0xc003ba0b30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8eb 0xc003ba0b30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8ec 0xc003ba0b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8ed 0xc003ba0b30 principal evaluation fails" -"2019-07-20 02:39:47.324 UTC [cauthdsl] func1 -> DEBU 8ee 0xc003ba0b30 gate 1563590387323532000 evaluation fails" -"2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8ef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.324 UTC [cauthdsl] func1 -> DEBU 8f2 0xc003ba1390 gate 1563590387324697600 evaluation starts" -"2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8f3 0xc003ba1390 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8f4 0xc003ba1390 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.325 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8f5 Checking if identity satisfies MEMBER role for Org2MSP" -"2019-07-20 02:39:47.325 UTC [msp] Validate -> DEBU 8f6 MSP Org2MSP validating identity" -"2019-07-20 02:39:47.325 UTC [msp] getCertificationChain -> DEBU 8f7 MSP Org2MSP getting certification chain" -"2019-07-20 02:39:47.325 UTC [cauthdsl] func2 -> DEBU 8f8 0xc003ba1390 principal matched by identity 0" -"2019-07-20 02:39:47.325 UTC [msp.identity] Verify -> DEBU 8f9 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +"2019-09-24 00:25:04.826 UTC [msp] Validate -> DEBU 614 MSP Org2MSP validating identity" +"2019-09-24 00:25:04.836 UTC [msp] getCertificationChain -> DEBU 616 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.836 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 617 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:04.836 UTC [msp] DeserializeIdentity -> DEBU 618 Obtaining identity" +"2019-09-24 00:25:04.836 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 619 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:04.837 UTC [msp] DeserializeIdentity -> DEBU 61a Obtaining identity" +"2019-09-24 00:25:04.837 UTC [msp] DeserializeIdentity -> DEBU 61b Obtaining identity" +"2019-09-24 00:25:04.837 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 61c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:04.839 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 61d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.843 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 61e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.843 UTC [policies] Evaluate -> DEBU 61f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:04.843 UTC [policies] Evaluate -> DEBU 620 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.844 UTC [policies] Evaluate -> DEBU 621 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:04.844 UTC [cauthdsl] func1 -> DEBU 622 0xc00357bd80 gate 1569284704844238800 evaluation starts" +"2019-09-24 00:25:04.844 UTC [cauthdsl] func2 -> DEBU 623 0xc00357bd80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.844 UTC [cauthdsl] func2 -> DEBU 624 0xc00357bd80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:04.845 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 625 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:25:04.845 UTC [msp] Validate -> DEBU 626 MSP Org2MSP validating identity" +"2019-09-24 00:25:04.755 UTC [gossip.service] updateAnchors -> DEBU 615 Creating state provider for chainID businesschannel" +"2019-09-24 00:25:04.862 UTC [msp] getCertificationChain -> DEBU 627 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.862 UTC [cauthdsl] func2 -> DEBU 628 0xc00357bd80 principal matched by identity 0" +"2019-09-24 00:25:04.862 UTC [msp.identity] Verify -> DEBU 629 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-07-20 02:39:47.326 UTC [msp.identity] Verify -> DEBU 8fa Verify: sig = 00000000 30 45 02 21 00 ec 4e f4 b9 c2 ae 88 47 27 4e eb |0E.!..N.....G'N.| -00000010 3f 69 a1 76 5c 36 3a d0 5b 98 46 37 df 28 42 89 |?i.v\6:.[.F7.(B.| -00000020 d0 32 07 7e 32 02 20 4e 19 cc b7 55 d9 c8 ae ad |.2.~2. N...U....| -00000030 f3 11 34 7a 2b c7 7e 6a dc 00 11 ca 5d b1 96 29 |..4z+.~j....]..)| -00000040 28 a0 24 5f 3e b6 6b |(.$_>.k|" -"2019-07-20 02:39:47.326 UTC [cauthdsl] func2 -> DEBU 8fb 0xc003ba1390 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.326 UTC [cauthdsl] func1 -> DEBU 8fc 0xc003ba1390 gate 1563590387324697600 evaluation succeeds" -"2019-07-20 02:39:47.326 UTC [policies] Evaluate -> DEBU 8fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.326 UTC [policies] Evaluate -> DEBU 8fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.327 UTC [policies] Evaluate -> DEBU 8ff Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.327 UTC [policies] Evaluate -> DEBU 900 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.327 UTC [gossip.comm] authenticateRemotePeer -> DEBU 901 Authenticated 172.18.0.7:58950" -"2019-07-20 02:39:47.327 UTC [gossip.comm] GossipStream -> DEBU 902 Servicing 172.18.0.7:58950" -"2019-07-20 02:39:47.327 UTC [comm.grpc.server] 1 -> INFO 903 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.322Z grpc.peer_address=172.18.0.8:60318 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=284.7µs -"2019-07-20 02:39:47.328 UTC [gossip.comm] readFromStream -> DEBU 904 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:47.328 UTC [gossip.comm] func2 -> DEBU 905 Client 172.18.0.7:58950 disconnected" -"2019-07-20 02:39:47.328 UTC [comm.grpc.server] 1 -> INFO 906 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.305Z grpc.peer_address=172.18.0.7:58950 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.1435ms -"2019-07-20 02:39:47.328 UTC [gossip.comm] writeToStream -> DEBU 907 Closing writing to stream" -"2019-07-20 02:39:47.331 UTC [msp] GetDefaultSigningIdentity -> DEBU 908 Obtaining default signing identity" -"2019-07-20 02:39:47.332 UTC [msp.identity] Sign -> DEBU 909 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.332 UTC [msp.identity] Sign -> DEBU 90a Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.332 UTC [gossip.comm] authenticateRemotePeer -> DEBU 90b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:60318" -"2019-07-20 02:39:47.334 UTC [comm.grpc.server] 1 -> INFO 90c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.333Z grpc.peer_address=172.18.0.7:58954 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=495.3µs -"2019-07-20 02:39:47.335 UTC [gossip.comm] authenticateRemotePeer -> DEBU 90d Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60318" -"2019-07-20 02:39:47.335 UTC [msp] DeserializeIdentity -> DEBU 90e Obtaining identity" -"2019-07-20 02:39:47.336 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 90f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.336 UTC [msp] DeserializeIdentity -> DEBU 910 Obtaining identity" -"2019-07-20 02:39:47.337 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 911 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.337 UTC [msp] DeserializeIdentity -> DEBU 912 Obtaining identity" -"2019-07-20 02:39:47.337 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 913 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 914 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 915 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.340 UTC [gossip.comm] func1 -> DEBU 916 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.340 UTC [gossip.gossip] handleMessage -> DEBU 917 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.340 UTC [gossip.gossip] handleMessage -> DEBU 918 Exiting" -"2019-07-20 02:39:47.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 919 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 91a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:47.342 UTC [msp.identity] Verify -> DEBU 91b Verify: digest = 00000000 9e 55 ec 7f b3 bb 5a 09 c8 f1 09 6e 69 d6 5d 68 |.U....Z....ni.]h| -00000010 fc ce 83 fb 3e 49 b5 c1 99 4e df eb 97 b2 43 9d |....>I...N....C.|" -"2019-07-20 02:39:47.346 UTC [msp.identity] Verify -> DEBU 91c Verify: sig = 00000000 30 44 02 20 18 f2 c2 95 0f c2 43 dd bb 8d 34 53 |0D. ......C...4S| -00000010 3d 2c a9 9a ac d2 45 f8 70 4e 74 8a ae 3b 19 33 |=,....E.pNt..;.3| -00000020 f8 4d f8 b5 02 20 08 b7 2f 8b 20 08 b9 33 38 92 |.M... ../. ..38.| -00000030 a7 08 9b fc ee dc e1 a7 88 8e 4a a3 e7 09 25 2a |..........J...%*| -00000040 48 79 eb c2 aa f7 |Hy....|" -"2019-07-20 02:39:47.347 UTC [gossip.discovery] isSentByMe -> DEBU 91d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.347 UTC [gossip.discovery] handleMsgFromComm -> DEBU 91e Exiting" -"2019-07-20 02:39:47.347 UTC [msp] GetDefaultSigningIdentity -> DEBU 91f Obtaining default signing identity" -"2019-07-20 02:39:47.347 UTC [msp.identity] Sign -> DEBU 920 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.347 UTC [msp.identity] Sign -> DEBU 921 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.347 UTC [grpc] infof -> DEBU 922 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 923 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.348 UTC [gossip.comm] authenticateRemotePeer -> DEBU 924 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:58954" -"2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 925 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 926 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.349 UTC [gossip.comm] authenticateRemotePeer -> DEBU 927 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58954" -"2019-07-20 02:39:47.349 UTC [cauthdsl] func1 -> DEBU 928 0xc003c1c310 gate 1563590387349063600 evaluation starts" -"2019-07-20 02:39:47.349 UTC [msp] DeserializeIdentity -> DEBU 929 Obtaining identity" -"2019-07-20 02:39:47.349 UTC [cauthdsl] func2 -> DEBU 92a 0xc003c1c310 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.349 UTC [cauthdsl] func2 -> DEBU 92b 0xc003c1c310 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 92c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.350 UTC [msp] DeserializeIdentity -> DEBU 92d Obtaining identity" -"2019-07-20 02:39:47.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 92e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.351 UTC [msp] DeserializeIdentity -> DEBU 92f Obtaining identity" -"2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 930 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 931 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 932 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.351 UTC [policies] Evaluate -> DEBU 933 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.351 UTC [policies] Evaluate -> DEBU 934 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.352 UTC [policies] Evaluate -> DEBU 935 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.352 UTC [cauthdsl] func1 -> DEBU 936 0xc003c32a80 gate 1563590387352234800 evaluation starts" -"2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 937 0xc003c32a80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 938 0xc003c32a80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 939 0xc003c32a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 93a 0xc003c32a80 principal evaluation fails" -"2019-07-20 02:39:47.352 UTC [cauthdsl] func1 -> DEBU 93b 0xc003c32a80 gate 1563590387352234800 evaluation fails" -"2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.353 UTC [cauthdsl] func1 -> DEBU 93f 0xc003c332c0 gate 1563590387353411100 evaluation starts" -"2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 940 0xc003c332c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 941 0xc003c332c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 942 0xc003c332c0 principal matched by identity 0" -"2019-07-20 02:39:47.353 UTC [msp.identity] Verify -> DEBU 943 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-07-20 02:39:47.354 UTC [msp.identity] Verify -> DEBU 944 Verify: sig = 00000000 30 44 02 20 65 d6 03 06 2b 67 cb 70 e0 a4 e2 07 |0D. e...+g.p....| -00000010 64 fb a2 19 b3 6c a6 5b 1e cf a2 43 48 39 b0 72 |d....l.[...CH9.r| -00000020 9f df cf 18 02 20 76 23 2e 73 5c ce 38 87 8d 9e |..... v#.s\.8...| -00000030 fd 44 e1 03 fb 66 1c 69 f4 a1 b1 f5 1e 2e 2b 2b |.D...f.i......++| -00000040 48 78 ed 05 fc 4d |Hx...M|" -"2019-07-20 02:39:47.354 UTC [cauthdsl] func2 -> DEBU 945 0xc003c332c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.354 UTC [cauthdsl] func1 -> DEBU 946 0xc003c332c0 gate 1563590387353411100 evaluation succeeds" -"2019-07-20 02:39:47.356 UTC [policies] Evaluate -> DEBU 947 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.356 UTC [policies] Evaluate -> DEBU 948 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.357 UTC [policies] Evaluate -> DEBU 949 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.357 UTC [policies] Evaluate -> DEBU 94a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.357 UTC [gossip.comm] authenticateRemotePeer -> DEBU 94b Authenticated 172.18.0.7:58954" -"2019-07-20 02:39:47.358 UTC [gossip.comm] GossipStream -> DEBU 94c Servicing 172.18.0.7:58954" -"2019-07-20 02:39:47.359 UTC [gossip.gossip] handleMessage -> DEBU 94d Entering, 172.18.0.7:58954 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:9525972632863951429 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" -"2019-07-20 02:39:47.350 UTC [cauthdsl] func2 -> DEBU 94e 0xc003c1c310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.359 UTC [cauthdsl] func2 -> DEBU 94f 0xc003c1c310 principal evaluation fails" -"2019-07-20 02:39:47.359 UTC [cauthdsl] func1 -> DEBU 950 0xc003c1c310 gate 1563590387349063600 evaluation fails" -"2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 953 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 954 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 955 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.362 UTC [cauthdsl] func1 -> DEBU 956 0xc003c1cb50 gate 1563590387362093400 evaluation starts" -"2019-07-20 02:39:47.359 UTC [gossip.gossip] handleMessage -> DEBU 951 Exiting" -"2019-07-20 02:39:47.360 UTC [gossip.discovery] handleMsgFromComm -> DEBU 952 Got message: GossipMessage: nonce:9525972632863951429 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" -"2019-07-20 02:39:47.364 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 957 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:39:47.364 UTC [msp] DeserializeIdentity -> DEBU 958 Obtaining identity" -"2019-07-20 02:39:47.365 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 959 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 95a Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 95b Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.366 UTC [policies] Evaluate -> DEBU 95c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.366 UTC [policies] Evaluate -> DEBU 95d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.367 UTC [policies] Evaluate -> DEBU 95e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.367 UTC [cauthdsl] func1 -> DEBU 95f 0xc003c42fa0 gate 1563590387367201200 evaluation starts" -"2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 960 0xc003c42fa0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 961 0xc003c42fa0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 962 0xc003c42fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.368 UTC [cauthdsl] func2 -> DEBU 963 0xc003c42fa0 principal evaluation fails" -"2019-07-20 02:39:47.368 UTC [cauthdsl] func1 -> DEBU 964 0xc003c42fa0 gate 1563590387367201200 evaluation fails" -"2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 965 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 966 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 967 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.369 UTC [cauthdsl] func1 -> DEBU 968 0xc003c437e0 gate 1563590387369590100 evaluation starts" -"2019-07-20 02:39:47.369 UTC [cauthdsl] func2 -> DEBU 969 0xc003c437e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.370 UTC [cauthdsl] func2 -> DEBU 96a 0xc003c437e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.370 UTC [cauthdsl] func2 -> DEBU 96b 0xc003c437e0 principal matched by identity 0" -"2019-07-20 02:39:47.371 UTC [msp.identity] Verify -> DEBU 96c Verify: digest = 00000000 46 0e f5 10 76 fd 59 e6 b3 07 a1 3c a9 b9 14 47 |F...v.Y....<...G| -00000010 6e b4 e5 a5 0e 58 e2 3e 59 e7 90 e0 f0 9d 65 e3 |n....X.>Y.....e.|" -"2019-07-20 02:39:47.372 UTC [msp.identity] Verify -> DEBU 96d Verify: sig = 00000000 30 45 02 21 00 b8 8e c9 09 9c 74 bb 27 15 12 64 |0E.!......t.'..d| -00000010 a8 e6 99 91 7a fc 2e 35 65 70 c5 88 dd 13 b9 37 |....z..5ep.....7| -00000020 d6 af fd aa 46 02 20 3d 93 80 67 b2 d9 73 c9 0e |....F. =..g..s..| -00000030 fb ed 14 93 c5 6c 38 74 35 30 1b 71 26 3f 14 68 |.....l8t50.q&?.h| -00000040 47 f0 c3 1c 3c 85 ea |G...<..|" -"2019-07-20 02:39:47.372 UTC [cauthdsl] func2 -> DEBU 96e 0xc003c437e0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.373 UTC [cauthdsl] func1 -> DEBU 96f 0xc003c437e0 gate 1563590387369590100 evaluation succeeds" -"2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 970 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 971 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 972 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.374 UTC [policies] Evaluate -> DEBU 973 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.375 UTC [gossip.discovery] handleAliveMessage -> DEBU 974 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:47.375 UTC [gossip.discovery] learnNewMembers -> DEBU 975 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}" -"2019-07-20 02:39:47.376 UTC [gossip.discovery] learnNewMembers -> DEBU 976 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:47.376 UTC [gossip.discovery] learnNewMembers -> DEBU 977 Exiting" -"2019-07-20 02:39:47.376 UTC [gossip.discovery] handleAliveMessage -> DEBU 978 Exiting" -"2019-07-20 02:39:47.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 979 Exiting" -"2019-07-20 02:39:47.377 UTC [gossip.discovery] sendMemResponse -> DEBU 97a Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:39:47.377 UTC [msp] DeserializeIdentity -> DEBU 97b Obtaining identity" -"2019-07-20 02:39:47.378 UTC [msp] DeserializeIdentity -> DEBU 97c Obtaining identity" -"2019-07-20 02:39:47.378 UTC [msp] DeserializeIdentity -> DEBU 97d Obtaining identity" -"2019-07-20 02:39:47.378 UTC [gossip.comm] Send -> DEBU 97e Entering, sending GossipMessage: Channel: , nonce: 9525972632863951429, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:47.378 UTC [gossip.discovery] sendMemResponse -> DEBU 97f Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\022" signature:"0D\002 W\351\001\371y\001\231%@\322\211\3049\215\241\214\032\360\251\332*\371\306-\211\210\005\316\305\245ea\002 B\255\255JU\256\330\014Y%\260Ki\200|\007u\026\2114\3708\377y*\355'\350i\020S\277" > alive: alive: alive: " -"2019-07-20 02:39:47.379 UTC [gossip.comm] sendToEndpoint -> DEBU 980 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9525972632863951429, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -"2019-07-20 02:39:47.379 UTC [gossip.comm] sendToEndpoint -> DEBU 981 Exiting" -"2019-07-20 02:39:47.379 UTC [cauthdsl] func2 -> DEBU 982 0xc003c1cb50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.380 UTC [cauthdsl] func2 -> DEBU 983 0xc003c1cb50 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.381 UTC [cauthdsl] func2 -> DEBU 984 0xc003c1cb50 principal matched by identity 0" -"2019-07-20 02:39:47.382 UTC [msp.identity] Verify -> DEBU 985 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:39:47.382 UTC [msp.identity] Verify -> DEBU 986 Verify: sig = 00000000 30 44 02 20 07 bf 14 d0 c5 d2 c1 f2 ef 16 88 ec |0D. ............| -00000010 81 9a 71 25 b5 56 e4 e9 cb d7 4c 8f 0c 43 f3 48 |..q%.V....L..C.H| -00000020 78 c8 33 85 02 20 60 09 fd ed 42 92 cb d1 d9 df |x.3.. `...B.....| -00000030 d8 6c c3 bb c4 88 49 a4 53 66 c4 e4 0d 33 9f fe |.l....I.Sf...3..| -00000040 71 c7 d1 67 c3 61 |q..g.a|" -"2019-07-20 02:39:47.383 UTC [cauthdsl] func2 -> DEBU 987 0xc003c1cb50 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.386 UTC [cauthdsl] func1 -> DEBU 988 0xc003c1cb50 gate 1563590387362093400 evaluation succeeds" -"2019-07-20 02:39:47.386 UTC [policies] Evaluate -> DEBU 989 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.387 UTC [policies] Evaluate -> DEBU 98a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.387 UTC [policies] Evaluate -> DEBU 98b Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.388 UTC [policies] Evaluate -> DEBU 98c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.388 UTC [gossip.comm] authenticateRemotePeer -> DEBU 98d Authenticated 172.18.0.8:60318" -"2019-07-20 02:39:47.388 UTC [gossip.comm] GossipStream -> DEBU 98e Servicing 172.18.0.8:60318" -"2019-07-20 02:39:47.389 UTC [gossip.comm] writeToStream -> DEBU 98f Closing writing to stream" -"2019-07-20 02:39:47.389 UTC [gossip.comm] serviceConnection -> DEBU 990 Closing reading from stream" -"2019-07-20 02:39:47.390 UTC [grpc] infof -> DEBU 991 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:47.390 UTC [gossip.comm] readFromStream -> DEBU 992 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -"2019-07-20 02:39:47.390 UTC [gossip.comm] readFromStream -> DEBU 993 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:47.391 UTC [gossip.comm] func2 -> DEBU 994 Client 172.18.0.8:60318 disconnected" -"2019-07-20 02:39:47.391 UTC [comm.grpc.server] 1 -> INFO 995 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60318 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=60.9364ms -"2019-07-20 02:39:47.392 UTC [gossip.comm] writeToStream -> DEBU 996 Closing writing to stream" -"2019-07-20 02:39:47.398 UTC [gossip.comm] func1 -> DEBU 997 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:47.403 UTC [gossip.gossip] handleMessage -> DEBU 998 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:47.403 UTC [gossip.gossip] handleMessage -> DEBU 999 Exiting" -"2019-07-20 02:39:47.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 99a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:47.404 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 99b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:47.404 UTC [msp.identity] Verify -> DEBU 99c Verify: digest = 00000000 9f d0 26 d1 27 53 cc a4 10 e3 12 24 b9 9c af b5 |..&.'S.....$....| -00000010 d8 75 4f 57 66 75 65 1a 86 7e 3d c1 ec 77 c1 12 |.uOWfue..~=..w..|" -"2019-07-20 02:39:47.404 UTC [msp.identity] Verify -> DEBU 99d Verify: sig = 00000000 30 45 02 21 00 82 3a a6 f3 a6 43 fb fa 98 0b 6a |0E.!..:...C....j| -00000010 95 a3 d6 4b 72 16 b6 ec 61 57 e6 00 36 c7 f2 62 |...Kr...aW..6..b| -00000020 05 4f 2e fb 13 02 20 0e 17 15 56 af 2b 49 22 7d |.O.... ...V.+I"}| -00000030 30 66 0f f6 16 cf 2b 65 fb bf 25 25 21 03 0a c8 |0f....+e..%%!...| -00000040 b1 4b 80 07 67 0a ce |.K..g..|" -"2019-07-20 02:39:47.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 99e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 99f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a0 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a1 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:47.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a2 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:47.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a3 Exiting" -"2019-07-20 02:39:47.406 UTC [gossip.discovery] handleAliveMessage -> DEBU 9a4 Exiting" -"2019-07-20 02:39:47.406 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9a5 Exiting" -"2019-07-20 02:39:47.407 UTC [msp] DeserializeIdentity -> DEBU 9a6 Obtaining identity" -"2019-07-20 02:39:47.408 UTC [msp] DeserializeIdentity -> DEBU 9a7 Obtaining identity" -"2019-07-20 02:39:47.409 UTC [msp] DeserializeIdentity -> DEBU 9a8 Obtaining identity" -"2019-07-20 02:39:47.409 UTC [gossip.comm] Send -> DEBU 9a9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:47.409 UTC [msp] DeserializeIdentity -> DEBU 9aa Obtaining identity" -"2019-07-20 02:39:47.410 UTC [gossip.comm] Send -> DEBU 9ab Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:47.411 UTC [gossip.comm] sendToEndpoint -> DEBU 9ac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:47.412 UTC [gossip.comm] createConnection -> DEBU 9ad Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:39:47.413 UTC [comm.grpc.server] 1 -> INFO 9ae unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.411Z grpc.peer_address=172.18.0.7:58958 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.507ms -"2019-07-20 02:39:47.415 UTC [grpc] DialContext -> DEBU 9af parsed scheme: """ -"2019-07-20 02:39:47.417 UTC [grpc] DialContext -> DEBU 9b1 scheme "" not registered, fallback to default scheme" -"2019-07-20 02:39:47.418 UTC [grpc] watcher -> DEBU 9b2 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -"2019-07-20 02:39:47.418 UTC [grpc] switchBalancer -> DEBU 9b3 ClientConn switching balancer to "pick_first"" -"2019-07-20 02:39:47.418 UTC [grpc] HandleSubConnStateChange -> DEBU 9b4 pickfirstBalancer: HandleSubConnStateChange: 0xc003cd43a0, CONNECTING" -"2019-07-20 02:39:47.415 UTC [gossip.comm] sendToEndpoint -> DEBU 9b0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:47.419 UTC [gossip.comm] sendToEndpoint -> DEBU 9b5 Exiting" -"2019-07-20 02:39:47.422 UTC [comm.grpc.server] 1 -> INFO 9b6 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.421Z grpc.peer_address=172.18.0.8:60326 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=140.3µs -"2019-07-20 02:39:47.425 UTC [msp] GetDefaultSigningIdentity -> DEBU 9b7 Obtaining default signing identity" -"2019-07-20 02:39:47.427 UTC [msp.identity] Sign -> DEBU 9ba Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.426 UTC [msp] GetDefaultSigningIdentity -> DEBU 9b8 Obtaining default signing identity" -"2019-07-20 02:39:47.426 UTC [grpc] HandleSubConnStateChange -> DEBU 9b9 pickfirstBalancer: HandleSubConnStateChange: 0xc003cd43a0, READY" -"2019-07-20 02:39:47.427 UTC [msp.identity] Sign -> DEBU 9bb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.428 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9bd Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:58958" -"2019-07-20 02:39:47.429 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9be Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58958" -"2019-07-20 02:39:47.429 UTC [msp] DeserializeIdentity -> DEBU 9bf Obtaining identity" -"2019-07-20 02:39:47.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.429 UTC [msp] DeserializeIdentity -> DEBU 9c1 Obtaining identity" -"2019-07-20 02:39:47.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.430 UTC [msp] DeserializeIdentity -> DEBU 9c3 Obtaining identity" -"2019-07-20 02:39:47.428 UTC [msp.identity] Sign -> DEBU 9bc Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9c5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9c6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.431 UTC [policies] Evaluate -> DEBU 9c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.431 UTC [policies] Evaluate -> DEBU 9c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.431 UTC [msp.identity] Sign -> DEBU 9ca Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.433 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9cc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60326" -"2019-07-20 02:39:47.432 UTC [policies] Evaluate -> DEBU 9c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.435 UTC [cauthdsl] func1 -> DEBU 9cd 0xc003d45cf0 gate 1563590387435038700 evaluation starts" -"2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9ce 0xc003d45cf0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9cf 0xc003d45cf0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9d0 0xc003d45cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9d1 0xc003d45cf0 principal evaluation fails" -"2019-07-20 02:39:47.435 UTC [cauthdsl] func1 -> DEBU 9d2 0xc003d45cf0 gate 1563590387435038700 evaluation fails" -"2019-07-20 02:39:47.436 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9d3 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60326" -"2019-07-20 02:39:47.436 UTC [msp] DeserializeIdentity -> DEBU 9d4 Obtaining identity" -"2019-07-20 02:39:47.436 UTC [policies] Evaluate -> DEBU 9d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.437 UTC [policies] Evaluate -> DEBU 9d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.437 UTC [policies] Evaluate -> DEBU 9d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.437 UTC [cauthdsl] func1 -> DEBU 9d8 0xc003d6e530 gate 1563590387437254300 evaluation starts" -"2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9d9 0xc003d6e530 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9da 0xc003d6e530 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9db 0xc003d6e530 principal matched by identity 0" -"2019-07-20 02:39:47.437 UTC [msp.identity] Verify -> DEBU 9dc Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-07-20 02:39:47.438 UTC [msp.identity] Verify -> DEBU 9dd Verify: sig = 00000000 30 45 02 21 00 a7 34 94 cc b4 6e 33 da 61 32 b7 |0E.!..4...n3.a2.| -00000010 02 32 93 59 79 93 21 66 bc 21 a2 25 1f 29 9e 4d |.2.Yy.!f.!.%.).M| -00000020 2f 7b 19 bf f5 02 20 4b e7 84 35 6f 18 ab 22 08 |/{.... K..5o..".| -00000030 f2 54 e4 20 6c 92 45 59 f2 10 63 8d 47 b2 2b 3c |.T. l.EY..c.G.+<| -00000040 fa db 89 4c 14 94 bf |...L...|" -"2019-07-20 02:39:47.438 UTC [cauthdsl] func2 -> DEBU 9de 0xc003d6e530 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.438 UTC [cauthdsl] func1 -> DEBU 9e0 0xc003d6e530 gate 1563590387437254300 evaluation succeeds" -"2019-07-20 02:39:47.439 UTC [grpc] infof -> DEBU 9e1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:47.438 UTC [policies] Evaluate -> DEBU 9e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e4 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.440 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9e6 Authenticated 172.18.0.7:58958" -"2019-07-20 02:39:47.432 UTC [msp] GetDefaultSigningIdentity -> DEBU 9cb Obtaining default signing identity" -"2019-07-20 02:39:47.440 UTC [msp.identity] Sign -> DEBU 9e8 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.438 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.440 UTC [gossip.comm] GossipStream -> DEBU 9e7 Servicing 172.18.0.7:58958" -"2019-07-20 02:39:47.441 UTC [msp.identity] Sign -> DEBU 9e9 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.441 UTC [msp] DeserializeIdentity -> DEBU 9ea Obtaining identity" -"2019-07-20 02:39:47.442 UTC [gossip.comm] serviceConnection -> DEBU 9ec Closing reading from stream" -"2019-07-20 02:39:47.442 UTC [gossip.comm] func2 -> DEBU 9ed Client 172.18.0.7:58954 disconnected" -"2019-07-20 02:39:47.442 UTC [comm.grpc.server] 1 -> INFO 9ee streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:58954 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=95.2205ms -"2019-07-20 02:39:47.442 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.442 UTC [gossip.comm] serviceConnection -> DEBU 9f1 Closing reading from stream" -"2019-07-20 02:39:47.443 UTC [msp] DeserializeIdentity -> DEBU 9f2 Obtaining identity" -"2019-07-20 02:39:47.443 UTC [gossip.comm] writeToStream -> DEBU 9f4 Closing writing to stream" -"2019-07-20 02:39:47.443 UTC [gossip.comm] readFromStream -> DEBU 9f5 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" -"2019-07-20 02:39:47.442 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9eb Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" -"2019-07-20 02:39:47.444 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9f6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -"2019-07-20 02:39:47.444 UTC [msp] DeserializeIdentity -> DEBU 9f7 Obtaining identity" -"2019-07-20 02:39:47.444 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9f8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.444 UTC [msp] DeserializeIdentity -> DEBU 9f9 Obtaining identity" -"2019-07-20 02:39:47.445 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.445 UTC [msp] DeserializeIdentity -> DEBU 9fc Obtaining identity" -"2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9fe Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9ff Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a00 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a01 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.447 UTC [cauthdsl] func1 -> DEBU a03 0xc003da1580 gate 1563590387446997800 evaluation starts" -"2019-07-20 02:39:47.442 UTC [gossip.comm] writeToStream -> DEBU 9f0 Closing writing to stream" -"2019-07-20 02:39:47.445 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a04 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a05 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.448 UTC [policies] Evaluate -> DEBU a06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.448 UTC [policies] Evaluate -> DEBU a07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.449 UTC [policies] Evaluate -> DEBU a08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.449 UTC [cauthdsl] func1 -> DEBU a09 0xc003d92da0 gate 1563590387449798200 evaluation starts" -"2019-07-20 02:39:47.450 UTC [cauthdsl] func2 -> DEBU a0a 0xc003d92da0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.450 UTC [cauthdsl] func2 -> DEBU a0b 0xc003d92da0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0c 0xc003d92da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0e 0xc003d92da0 principal evaluation fails" -"2019-07-20 02:39:47.451 UTC [cauthdsl] func1 -> DEBU a0f 0xc003d92da0 gate 1563590387449798200 evaluation fails" -"2019-07-20 02:39:47.451 UTC [grpc] infof -> DEBU a10 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:47.443 UTC [gossip.comm] func2 -> DEBU 9f3 Client 172.18.0.7:58958 disconnected" -"2019-07-20 02:39:47.451 UTC [policies] Evaluate -> DEBU a11 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.452 UTC [comm.grpc.server] 1 -> INFO a12 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.425Z grpc.peer_address=172.18.0.7:58958 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=26.4571ms -"2019-07-20 02:39:47.452 UTC [policies] Evaluate -> DEBU a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.452 UTC [policies] Evaluate -> DEBU a14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0d 0xc003da1580 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.453 UTC [cauthdsl] func1 -> DEBU a15 0xc003d935e0 gate 1563590387452999600 evaluation starts" -"2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a17 0xc003d935e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a18 0xc003d935e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a19 0xc003d935e0 principal matched by identity 0" -"2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a16 0xc003da1580 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.454 UTC [cauthdsl] func2 -> DEBU a1b 0xc003da1580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.454 UTC [cauthdsl] func2 -> DEBU a1c 0xc003da1580 principal evaluation fails" -"2019-07-20 02:39:47.455 UTC [cauthdsl] func1 -> DEBU a1d 0xc003da1580 gate 1563590387446997800 evaluation fails" -"2019-07-20 02:39:47.454 UTC [msp.identity] Verify -> DEBU a1a Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:39:47.455 UTC [msp.identity] Verify -> DEBU a1e Verify: sig = 00000000 30 44 02 20 7e ef 42 17 4e 75 f7 b1 84 c6 08 ac |0D. ~.B.Nu......| -00000010 f5 93 48 4f 87 36 01 b1 22 a4 ec 7c d4 b4 d1 4d |..HO.6.."..|...M| -00000020 d0 f2 3c c0 02 20 57 66 4f b8 9d bd db 81 1f 00 |..<.. WfO.......| -00000030 7c a0 23 b4 ec 75 81 de 6e 69 1e 7e 23 92 c7 42 ||.#..u..ni.~#..B| -00000040 e3 cc 03 cb 12 6c |.....l|" -"2019-07-20 02:39:47.455 UTC [policies] Evaluate -> DEBU a1f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.456 UTC [policies] Evaluate -> DEBU a20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.456 UTC [policies] Evaluate -> DEBU a21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.456 UTC [cauthdsl] func1 -> DEBU a22 0xc003d93c60 gate 1563590387456635500 evaluation starts" -"2019-07-20 02:39:47.456 UTC [cauthdsl] func2 -> DEBU a24 0xc003d93c60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.457 UTC [cauthdsl] func2 -> DEBU a25 0xc003d93c60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.457 UTC [cauthdsl] func2 -> DEBU a26 0xc003d93c60 principal matched by identity 0" -"2019-07-20 02:39:47.456 UTC [cauthdsl] func2 -> DEBU a23 0xc003d935e0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.457 UTC [cauthdsl] func1 -> DEBU a27 0xc003d935e0 gate 1563590387452999600 evaluation succeeds" -"2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a28 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a2a Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.458 UTC [gossip.comm] authenticateRemotePeer -> DEBU a2c Authenticated 172.18.0.8:60326" -"2019-07-20 02:39:47.459 UTC [gossip.comm] GossipStream -> DEBU a2d Servicing 172.18.0.8:60326" -"2019-07-20 02:39:47.459 UTC [gossip.comm] readFromStream -> DEBU a2e Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:39:47.459 UTC [gossip.comm] func2 -> DEBU a2f Client 172.18.0.8:60326 disconnected" -"2019-07-20 02:39:47.459 UTC [comm.grpc.server] 1 -> INFO a30 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60326 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.3484ms -"2019-07-20 02:39:47.460 UTC [gossip.comm] writeToStream -> DEBU a31 Closing writing to stream" -"2019-07-20 02:39:47.457 UTC [msp.identity] Verify -> DEBU a32 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:39:47.460 UTC [msp.identity] Verify -> DEBU a33 Verify: sig = 00000000 30 45 02 21 00 ee 4f fa 86 9e 91 8b 41 9c 03 b0 |0E.!..O.....A...| -00000010 f7 d0 7a ea bf 00 52 e8 69 02 8d 71 88 48 d5 52 |..z...R.i..q.H.R| -00000020 01 44 a3 a1 4a 02 20 39 89 1d b4 e2 32 73 e9 39 |.D..J. 9....2s.9| -00000030 ed 9c 15 0b 93 84 3c c6 20 0b 3b 8e 75 b2 56 74 |......<. .;.u.Vt| -00000040 45 4f 0c d5 22 dd 1c |EO.."..|" -"2019-07-20 02:39:47.460 UTC [cauthdsl] func2 -> DEBU a34 0xc003d93c60 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.461 UTC [cauthdsl] func1 -> DEBU a35 0xc003d93c60 gate 1563590387456635500 evaluation succeeds" -"2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a36 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a38 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.462 UTC [gossip.comm] authenticateRemotePeer -> DEBU a3a Authenticated 172.18.0.8:7051" -"2019-07-20 02:39:47.462 UTC [gossip.comm] createConnection -> DEBU a3b Exiting" -"2019-07-20 02:39:47.462 UTC [gossip.comm] sendToEndpoint -> DEBU a3c Exiting" -"2019-07-20 02:39:47.584 UTC [gossip.comm] func1 -> DEBU a3d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.584 UTC [gossip.gossip] handleMessage -> DEBU a3e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.584 UTC [gossip.gossip] handleMessage -> DEBU a3f Exiting" -"2019-07-20 02:39:47.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU a40 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU a41 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:39:47.584 UTC [msp] DeserializeIdentity -> DEBU a42 Obtaining identity" -"2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a43 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a44 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a45 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.585 UTC [policies] Evaluate -> DEBU a46 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.585 UTC [policies] Evaluate -> DEBU a47 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a49 0xc003dc5ba0 gate 1563590387586305400 evaluation starts" -"2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4a 0xc003dc5ba0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4b 0xc003dc5ba0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4c 0xc003dc5ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4d 0xc003dc5ba0 principal evaluation fails" -"2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a4e 0xc003dc5ba0 gate 1563590387586305400 evaluation fails" -"2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a4f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a52 0xc003de63e0 gate 1563590387586913300 evaluation starts" -"2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a53 0xc003de63e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a54 0xc003de63e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a55 0xc003de63e0 principal matched by identity 0" -"2019-07-20 02:39:47.587 UTC [grpc] infof -> DEBU a56 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:47.588 UTC [msp.identity] Verify -> DEBU a57 Verify: digest = 00000000 51 9a 6c 48 b8 eb d6 4b 88 88 ea d0 ec 8e 4b 42 |Q.lH...K......KB| -00000010 57 f4 fc 43 04 d0 64 31 4d 50 e0 af 73 83 b9 17 |W..C..d1MP..s...|" -"2019-07-20 02:39:47.588 UTC [msp.identity] Verify -> DEBU a58 Verify: sig = 00000000 30 44 02 20 65 d8 95 e0 67 01 de a1 7e ed 23 a0 |0D. e...g...~.#.| -00000010 d2 cb 0b 0a dd 64 02 e8 07 3c d2 2b b1 0a 39 d9 |.....d...<.+..9.| -00000020 9d a3 42 2b 02 20 76 d5 68 8a ff 92 e9 b5 62 28 |..B+. v.h.....b(| -00000030 50 49 6e 8b 2b 6e ba c8 6f 8e 45 15 a3 c5 41 80 |PIn.+n..o.E...A.| -00000040 9d 53 ef fe 7e 10 |.S..~.|" -"2019-07-20 02:39:47.588 UTC [cauthdsl] func2 -> DEBU a59 0xc003de63e0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.588 UTC [cauthdsl] func1 -> DEBU a5a 0xc003de63e0 gate 1563590387586913300 evaluation succeeds" -"2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.588 UTC [gossip.discovery] handleAliveMessage -> DEBU a5f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a60 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a61 updating membership: timestamp: " -"2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a62 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a63 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a64 Exiting" -"2019-07-20 02:39:47.588 UTC [gossip.discovery] handleAliveMessage -> DEBU a65 Exiting" -"2019-07-20 02:39:47.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU a66 Exiting" -"2019-07-20 02:39:47.596 UTC [gossip.comm] func1 -> DEBU a67 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.596 UTC [gossip.gossip] handleMessage -> DEBU a68 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.596 UTC [gossip.gossip] handleMessage -> DEBU a69 Exiting" -"2019-07-20 02:39:47.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU a6a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU a6b Exiting" -"2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6c Obtaining identity" -"2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6d Obtaining identity" -"2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6e Obtaining identity" -"2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a6f Obtaining identity" -"2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a70 Obtaining identity" -"2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a71 Obtaining identity" -"2019-07-20 02:39:47.599 UTC [gossip.comm] Send -> DEBU a72 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a73 Obtaining identity" -"2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a74 Obtaining identity" -"2019-07-20 02:39:47.599 UTC [gossip.comm] Send -> DEBU a75 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a76 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.599 UTC [gossip.comm] createConnection -> DEBU a77 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a78 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a79 Exiting" -"2019-07-20 02:39:47.601 UTC [grpc] DialContext -> DEBU a7a parsed scheme: """ -"2019-07-20 02:39:47.601 UTC [grpc] DialContext -> DEBU a7b scheme "" not registered, fallback to default scheme" -"2019-07-20 02:39:47.601 UTC [grpc] watcher -> DEBU a7c ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" -"2019-07-20 02:39:47.601 UTC [grpc] switchBalancer -> DEBU a7d ClientConn switching balancer to "pick_first"" -"2019-07-20 02:39:47.601 UTC [grpc] HandleSubConnStateChange -> DEBU a7e pickfirstBalancer: HandleSubConnStateChange: 0xc003e15e40, CONNECTING" -"2019-07-20 02:39:47.613 UTC [grpc] HandleSubConnStateChange -> DEBU a7f pickfirstBalancer: HandleSubConnStateChange: 0xc003e15e40, READY" -"2019-07-20 02:39:47.616 UTC [msp] GetDefaultSigningIdentity -> DEBU a80 Obtaining default signing identity" -"2019-07-20 02:39:47.616 UTC [msp.identity] Sign -> DEBU a81 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:39:47.616 UTC [msp.identity] Sign -> DEBU a82 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:39:47.616 UTC [gossip.comm] authenticateRemotePeer -> DEBU a83 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051" -"2019-07-20 02:39:47.617 UTC [gossip.comm] authenticateRemotePeer -> DEBU a84 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:7051" -"2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a85 Obtaining identity" -"2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a86 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a87 Obtaining identity" -"2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a88 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a89 Obtaining identity" -"2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a8a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:47.618 UTC [cauthdsl] func1 -> DEBU a90 0xc003e6ed10 gate 1563590387617822800 evaluation starts" -"2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a91 0xc003e6ed10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a92 0xc003e6ed10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a93 0xc003e6ed10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a94 0xc003e6ed10 principal evaluation fails" -"2019-07-20 02:39:47.619 UTC [cauthdsl] func1 -> DEBU a95 0xc003e6ed10 gate 1563590387617822800 evaluation fails" -"2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a96 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:47.619 UTC [cauthdsl] func1 -> DEBU a99 0xc003e6f550 gate 1563590387619373700 evaluation starts" -"2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9a 0xc003e6f550 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9b 0xc003e6f550 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9c 0xc003e6f550 principal matched by identity 0" -"2019-07-20 02:39:47.619 UTC [msp.identity] Verify -> DEBU a9d Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-07-20 02:39:47.619 UTC [msp.identity] Verify -> DEBU a9e Verify: sig = 00000000 30 45 02 21 00 c3 13 c2 66 f7 f6 a6 53 8b 6b 86 |0E.!....f...S.k.| -00000010 c3 c3 e2 78 95 a9 22 3a f0 2e 00 bf 94 b5 74 02 |...x..":......t.| -00000020 20 8f bc 10 e4 02 20 50 2f be 78 fd 1d cd 08 72 | ..... P/.x....r| -00000030 58 e9 b7 ba 25 0d 0f 31 0c 59 72 1c 65 7a 12 dc |X...%..1.Yr.ez..| -00000040 af cb a2 d5 8d 70 b5 |.....p.|" -"2019-07-20 02:39:47.620 UTC [cauthdsl] func2 -> DEBU a9f 0xc003e6f550 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:47.620 UTC [cauthdsl] func1 -> DEBU aa0 0xc003e6f550 gate 1563590387619373700 evaluation succeeds" -"2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa3 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:47.621 UTC [gossip.comm] authenticateRemotePeer -> DEBU aa5 Authenticated 172.18.0.7:7051" -"2019-07-20 02:39:47.621 UTC [gossip.comm] createConnection -> DEBU aa6 Exiting" -"2019-07-20 02:39:47.621 UTC [gossip.comm] sendToEndpoint -> DEBU aa7 Exiting" -"2019-07-20 02:39:48.270 UTC [gossip.pull] Hello -> DEBU aa8 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:39:48.270 UTC [gossip.comm] Send -> DEBU aa9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:48.271 UTC [gossip.pull] Hello -> DEBU aaa Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:39:48.271 UTC [gossip.comm] Send -> DEBU aab Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:48.271 UTC [gossip.pull] Hello -> DEBU aac Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:39:48.271 UTC [gossip.comm] Send -> DEBU aad Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:48.271 UTC [gossip.comm] sendToEndpoint -> DEBU aae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.271 UTC [gossip.comm] sendToEndpoint -> DEBU aaf Exiting" -"2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab1 Exiting" -"2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab3 Exiting" -"2019-07-20 02:39:48.273 UTC [gossip.comm] func1 -> DEBU ab4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.273 UTC [gossip.gossip] handleMessage -> DEBU ab5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.274 UTC [gossip.pull] HandleMessage -> DEBU ab6 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.274 UTC [gossip.gossip] handleMessage -> DEBU ab7 Exiting" -"2019-07-20 02:39:48.275 UTC [gossip.comm] func1 -> DEBU ab8 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.275 UTC [gossip.gossip] handleMessage -> DEBU ab9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.275 UTC [gossip.pull] HandleMessage -> DEBU aba GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.275 UTC [gossip.gossip] handleMessage -> DEBU abb Exiting" -"2019-07-20 02:39:48.281 UTC [gossip.comm] func1 -> DEBU abc Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.281 UTC [gossip.gossip] handleMessage -> DEBU abd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.282 UTC [gossip.pull] HandleMessage -> DEBU abe GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.282 UTC [gossip.gossip] handleMessage -> DEBU abf Exiting" -"2019-07-20 02:39:48.301 UTC [msp] GetDefaultSigningIdentity -> DEBU ac0 Obtaining default signing identity" -"2019-07-20 02:39:48.301 UTC [msp.identity] Sign -> DEBU ac1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151011 " -"2019-07-20 02:39:48.302 UTC [msp.identity] Sign -> DEBU ac2 Sign: digest: FFBB9045B582F1F2F605222245833C1B3A2C2C650EF05DD7A6C39D8270C5E845 " -"2019-07-20 02:39:48.303 UTC [msp] GetDefaultSigningIdentity -> DEBU ac3 Obtaining default signing identity" -"2019-07-20 02:39:48.303 UTC [msp.identity] Sign -> DEBU ac4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:48.304 UTC [msp.identity] Sign -> DEBU ac5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:48.304 UTC [gossip.comm] Send -> DEBU ac6 Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" secret_envelope:\r\256'\274n\363\370\230\035f\330\0038\177{;\256\377\002 8F\034yP\252\315\325\"$0\243b'\371\003\260\0070\327\001\215\007\236\202\357\256=\r\036`\005" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:48.304 UTC [msp] DeserializeIdentity -> DEBU ac7 Obtaining identity" -"2019-07-20 02:39:48.305 UTC [gossip.comm] Send -> DEBU ac8 Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:48.305 UTC [msp] DeserializeIdentity -> DEBU ac9 Obtaining identity" -"2019-07-20 02:39:48.305 UTC [gossip.comm] Send -> DEBU aca Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acc Exiting" -"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" secret_envelope:\r\256'\274n\363\370\230\035f\330\0038\177{;\256\377\002 8F\034yP\252\315\325\"$0\243b'\371\003\260\0070\327\001\215\007\236\202\357\256=\r\036`\005" > > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU ace Exiting" -"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU ad0 Exiting" -"2019-07-20 02:39:48.309 UTC [gossip.comm] func1 -> DEBU ad1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.310 UTC [gossip.gossip] handleMessage -> DEBU ad2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.310 UTC [gossip.gossip] handleMessage -> DEBU ad3 Exiting" -"2019-07-20 02:39:48.310 UTC [gossip.discovery] handleMsgFromComm -> DEBU ad4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ad5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:48.311 UTC [gossip.comm] func1 -> DEBU ad6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.311 UTC [gossip.comm] func1 -> DEBU ad8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.311 UTC [gossip.gossip] handleMessage -> DEBU ad9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.311 UTC [msp.identity] Verify -> DEBU ad7 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| -00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" -"2019-07-20 02:39:48.313 UTC [msp.identity] Verify -> DEBU ada Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| -00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| -00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| -00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| -00000040 2a 14 7e f4 03 95 |*.~...|" -"2019-07-20 02:39:48.314 UTC [gossip.discovery] handleAliveMessage -> DEBU adb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:48.314 UTC [gossip.discovery] isSentByMe -> DEBU adc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:48.314 UTC [gossip.discovery] handleAliveMessage -> DEBU add Exiting" -"2019-07-20 02:39:48.317 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ade Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:39:48.317 UTC [msp] DeserializeIdentity -> DEBU adf Obtaining identity" -"2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ae0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ae1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ae2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:48.319 UTC [cauthdsl] func1 -> DEBU ae6 0xc003e87ff0 gate 1563590388319200400 evaluation starts" -"2019-07-20 02:39:48.319 UTC [cauthdsl] func2 -> DEBU ae7 0xc003e87ff0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.319 UTC [cauthdsl] func2 -> DEBU ae8 0xc003e87ff0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.320 UTC [cauthdsl] func2 -> DEBU ae9 0xc003e87ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:48.320 UTC [cauthdsl] func2 -> DEBU aea 0xc003e87ff0 principal evaluation fails" -"2019-07-20 02:39:48.321 UTC [cauthdsl] func1 -> DEBU aeb 0xc003e87ff0 gate 1563590388319200400 evaluation fails" -"2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:48.321 UTC [cauthdsl] func1 -> DEBU aef 0xc003f10830 gate 1563590388321942500 evaluation starts" -"2019-07-20 02:39:48.322 UTC [cauthdsl] func2 -> DEBU af0 0xc003f10830 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.322 UTC [cauthdsl] func2 -> DEBU af1 0xc003f10830 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.323 UTC [cauthdsl] func2 -> DEBU af2 0xc003f10830 principal matched by identity 0" -"2019-07-20 02:39:48.323 UTC [msp.identity] Verify -> DEBU af3 Verify: digest = 00000000 dd a6 da a6 83 bb 3d 4d 62 9a 5c b6 79 ea 94 3e |......=Mb.\.y..>| -00000010 51 07 45 5e 71 f1 1a 16 0b 38 83 2a 80 ff b5 f1 |Q.E^q....8.*....|" -"2019-07-20 02:39:48.325 UTC [msp.identity] Verify -> DEBU af4 Verify: sig = 00000000 30 44 02 20 50 79 7d 88 3f 03 86 f4 b3 4f 62 86 |0D. Py}.?....Ob.| -00000010 8a 38 18 a2 e6 0f 11 c6 13 fa b4 76 ec 39 45 64 |.8.........v.9Ed| -00000020 ae b3 f0 40 02 20 0f ce 1f 8d d4 23 9c 3e 25 a0 |...@. .....#.>%.| -00000030 01 30 85 29 fd 39 85 ea 54 0e ac 7c bd 5d 42 d7 |.0.).9..T..|.]B.| -00000040 e0 b9 fa 90 d5 f9 |......|" -"2019-07-20 02:39:48.326 UTC [cauthdsl] func2 -> DEBU af5 0xc003f10830 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:48.329 UTC [cauthdsl] func1 -> DEBU af6 0xc003f10830 gate 1563590388321942500 evaluation succeeds" -"2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af9 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:48.331 UTC [policies] Evaluate -> DEBU afa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:48.331 UTC [gossip.discovery] handleAliveMessage -> DEBU afb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afd updating membership: timestamp: " -"2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afe Updating aliveness data: membership: timestamp: " -"2019-07-20 02:39:48.333 UTC [gossip.discovery] learnExistingMembers -> DEBU aff Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:39:48.333 UTC [gossip.discovery] learnExistingMembers -> DEBU b00 Exiting" -"2019-07-20 02:39:48.334 UTC [gossip.discovery] handleAliveMessage -> DEBU b01 Exiting" -"2019-07-20 02:39:48.334 UTC [gossip.discovery] handleMsgFromComm -> DEBU b02 Exiting" -"2019-07-20 02:39:48.334 UTC [gossip.discovery] handleMsgFromComm -> DEBU b03 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.335 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b04 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:48.335 UTC [gossip.gossip] handleMessage -> DEBU b05 Exiting" -"2019-07-20 02:39:48.335 UTC [gossip.gossip] handleMessage -> DEBU b06 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.335 UTC [msp.identity] Verify -> DEBU b07 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| -00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" -"2019-07-20 02:39:48.335 UTC [msp.identity] Verify -> DEBU b08 Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| -00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| -00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| -00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| -00000040 2a 14 7e f4 03 95 |*.~...|" -"2019-07-20 02:39:48.336 UTC [gossip.discovery] handleAliveMessage -> DEBU b09 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:48.337 UTC [gossip.discovery] isSentByMe -> DEBU b0a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:48.337 UTC [gossip.discovery] handleAliveMessage -> DEBU b0b Exiting" -"2019-07-20 02:39:48.337 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b0c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:39:48.337 UTC [msp] DeserializeIdentity -> DEBU b0d Obtaining identity" -"2019-07-20 02:39:48.338 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:48.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b0f Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b10 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b11 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:48.340 UTC [cauthdsl] func1 -> DEBU b14 0xc003f253c0 gate 1563590388340226000 evaluation starts" -"2019-07-20 02:39:48.340 UTC [cauthdsl] func2 -> DEBU b15 0xc003f253c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.340 UTC [cauthdsl] func2 -> DEBU b16 0xc003f253c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.341 UTC [cauthdsl] func2 -> DEBU b17 0xc003f253c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:48.341 UTC [cauthdsl] func2 -> DEBU b18 0xc003f253c0 principal evaluation fails" -"2019-07-20 02:39:48.341 UTC [cauthdsl] func1 -> DEBU b19 0xc003f253c0 gate 1563590388340226000 evaluation fails" -"2019-07-20 02:39:48.341 UTC [policies] Evaluate -> DEBU b1a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.341 UTC [policies] Evaluate -> DEBU b1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.342 UTC [policies] Evaluate -> DEBU b1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:48.342 UTC [cauthdsl] func1 -> DEBU b1d 0xc003f25c00 gate 1563590388342300800 evaluation starts" -"2019-07-20 02:39:48.342 UTC [cauthdsl] func2 -> DEBU b1e 0xc003f25c00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.342 UTC [cauthdsl] func2 -> DEBU b1f 0xc003f25c00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.343 UTC [cauthdsl] func2 -> DEBU b20 0xc003f25c00 principal matched by identity 0" -"2019-07-20 02:39:48.343 UTC [msp.identity] Verify -> DEBU b21 Verify: digest = 00000000 83 07 cd 61 c5 95 48 f2 88 fe e8 ac 2f 59 7a 7b |...a..H...../Yz{| -00000010 5f 4d d3 51 85 71 8c 9e 54 a9 d7 0b 3d 29 32 cb |_M.Q.q..T...=)2.|" -"2019-07-20 02:39:48.344 UTC [msp.identity] Verify -> DEBU b22 Verify: sig = 00000000 30 45 02 21 00 9f d8 8c b9 60 a6 3c 4e 57 db d6 |0E.!.....`. DEBU b23 0xc003f25c00 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:48.344 UTC [cauthdsl] func1 -> DEBU b24 0xc003f25c00 gate 1563590388342300800 evaluation succeeds" -"2019-07-20 02:39:48.344 UTC [policies] Evaluate -> DEBU b25 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b27 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b28 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b29 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b2a endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" lastAliveTS: 1563590371938894800, 20 but got ts: inc_num:1563590371938894800 seq_num:8 " -"2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b2b Exiting" -"2019-07-20 02:39:48.346 UTC [gossip.discovery] handleMsgFromComm -> DEBU b2c Exiting" -"2019-07-20 02:39:48.347 UTC [gossip.discovery] handleMsgFromComm -> DEBU b2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.347 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b2e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:48.347 UTC [endorser] ProcessProposal -> DEBU b2f Entering: request from 172.18.0.9:58326" -"2019-07-20 02:39:48.347 UTC [protoutils] ValidateProposalMessage -> DEBU b30 ValidateProposalMessage starts for signed proposal 0xc003e3f720" -"2019-07-20 02:39:48.347 UTC [protoutils] validateChannelHeader -> DEBU b31 validateChannelHeader info: header type 3" -"2019-07-20 02:39:48.347 UTC [protoutils] checkSignatureFromCreator -> DEBU b32 begin" -"2019-07-20 02:39:48.347 UTC [protoutils] checkSignatureFromCreator -> DEBU b33 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:39:48.348 UTC [protoutils] checkSignatureFromCreator -> DEBU b34 creator is valid" -"2019-07-20 02:39:48.348 UTC [msp.identity] Verify -> DEBU b35 Verify: digest = 00000000 61 4e b1 91 45 01 64 14 f4 f8 1d 3d 60 e8 02 8f |aN..E.d....=`...| -00000010 e2 1a 80 0c b6 ea 07 32 b7 8f 09 44 a1 09 b5 08 |.......2...D....|" -"2019-07-20 02:39:48.348 UTC [msp.identity] Verify -> DEBU b36 Verify: sig = 00000000 30 45 02 21 00 e8 57 06 93 54 ee cd d5 f7 7a 98 |0E.!..W..T....z.| -00000010 e9 0b 87 d6 50 8e c5 d9 c5 44 85 f2 24 76 60 0f |....P....D..$v`.| -00000020 5a e6 e3 ca 4f 02 20 3a 19 54 4b 6d b6 a2 66 6a |Z...O. :.TKm..fj| -00000030 a9 0d 07 cb ca d1 df 11 ec 9d 47 a4 51 75 2c 4c |..........G.Qu,L| -00000040 43 3c 6e 22 ad 26 76 |C DEBU b37 exits successfully" -"2019-07-20 02:39:48.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU b38 validateChaincodeProposalMessage starts for proposal 0xc003e368c0, header 0xc003e3fb30" -"2019-07-20 02:39:48.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU b39 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -"2019-07-20 02:39:48.348 UTC [endorser] preProcess -> DEBU b3a [][0b8a6e52] processing txid: 0b8a6e52ac63c86441c5945c21b8b6c5947ea07bddb6b92e8376ce17066117da" -"2019-07-20 02:39:48.348 UTC [endorser] SimulateProposal -> DEBU b3b [][0b8a6e52] Entry chaincode: name:"lscc" " -"2019-07-20 02:39:48.349 UTC [endorser] callChaincode -> INFO b3c [][0b8a6e52] Entry chaincode: name:"lscc" " -"2019-07-20 02:39:48.349 UTC [chaincode] Execute -> DEBU b3d Entry" -"2019-07-20 02:39:48.349 UTC [msp.identity] Verify -> DEBU b3e Verify: digest = 00000000 61 4e b1 91 45 01 64 14 f4 f8 1d 3d 60 e8 02 8f |aN..E.d....=`...| -00000010 e2 1a 80 0c b6 ea 07 32 b7 8f 09 44 a1 09 b5 08 |.......2...D....|" -"2019-07-20 02:39:48.349 UTC [msp.identity] Verify -> DEBU b3f Verify: sig = 00000000 30 45 02 21 00 e8 57 06 93 54 ee cd d5 f7 7a 98 |0E.!..W..T....z.| -00000010 e9 0b 87 d6 50 8e c5 d9 c5 44 85 f2 24 76 60 0f |....P....D..$v`.| -00000020 5a e6 e3 ca 4f 02 20 3a 19 54 4b 6d b6 a2 66 6a |Z...O. :.TKm..fj| -00000030 a9 0d 07 cb ca d1 df 11 ec 9d 47 a4 51 75 2c 4c |..........G.Qu,L| -00000040 43 3c 6e 22 ad 26 76 |C DEBU b40 Created metadata tar" -"2019-07-20 02:39:48.349 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b41 HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)}" -"2019-07-20 02:39:48.349 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b42 Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]" -"2019-07-20 02:39:48.349 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU b43 constructing new query executor txid = [709da35e-09b3-41d0-8efc-62c5eb9dda45]" -"2019-07-20 02:39:48.349 UTC [stateleveldb] GetState -> DEBU b44 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:39:48.349 UTC [lockbasedtxmgr] Done -> DEBU b45 Done with transaction simulation / query execution [709da35e-09b3-41d0-8efc-62c5eb9dda45]" -"2019-07-20 02:39:48.350 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b46 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts." -"2019-07-20 02:39:48.350 UTC [lscc] executeInstall -> INFO b47 Installed Chaincode [exp02] Version [1.0] to peer" -"2019-07-20 02:39:48.350 UTC [chaincode] handleMessage -> DEBU b48 [0b8a6e52] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:39:48.350 UTC [chaincode] Notify -> DEBU b49 [0b8a6e52] notifying Txid:0b8a6e52ac63c86441c5945c21b8b6c5947ea07bddb6b92e8376ce17066117da, channelID:" -"2019-07-20 02:39:48.350 UTC [chaincode] Execute -> DEBU b4a Exit" -"2019-07-20 02:39:48.350 UTC [endorser] callChaincode -> INFO b4b [][0b8a6e52] Exit chaincode: name:"lscc" (1ms)" -"2019-07-20 02:39:48.350 UTC [endorser] SimulateProposal -> DEBU b4c [][0b8a6e52] Exit" -"2019-07-20 02:39:48.350 UTC [endorser] func1 -> DEBU b4d Exit: request from 172.18.0.9:58326" -"2019-07-20 02:39:48.350 UTC [comm.grpc.server] 1 -> INFO b4e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58326 grpc.code=OK grpc.call_duration=2.9756ms -"2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b50 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| -00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" -"2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b51 Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| -00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| -00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| -00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| -00000040 2a 14 7e f4 03 95 |*.~...|" -"2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b52 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b53 Verify: sig = 00000000 30 44 02 20 4d c5 8f c3 73 8e 7e e4 eb f9 c4 9a |0D. M...s.~.....| -00000010 b2 3e 0d ae 27 bc 6e f3 f8 98 1d 66 d8 03 38 7f |.>..'.n....f..8.| -00000020 7b 3b ae ff 02 20 38 46 1c 79 50 aa cd d5 22 24 |{;... 8F.yP..."$| -00000030 30 a3 62 27 f9 03 b0 07 30 d7 01 8d 07 9e 82 ef |0.b'....0.......| -00000040 ae 3d 0d 1e 60 05 |.=..`.|" -"2019-07-20 02:39:48.351 UTC [gossip.discovery] handleAliveMessage -> DEBU b54 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:48.351 UTC [gossip.discovery] isSentByMe -> DEBU b55 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:48.351 UTC [gossip.discovery] handleAliveMessage -> DEBU b56 Exiting" -"2019-07-20 02:39:48.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU b57 Exiting" -"2019-07-20 02:39:48.351 UTC [gossip.gossip] handleMessage -> DEBU b4f Exiting" -"2019-07-20 02:39:48.355 UTC [grpc] infof -> DEBU b58 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:48.355 UTC [grpc] warningf -> DEBU b59 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58326: read: connection reset by peer" -"2019-07-20 02:39:48.355 UTC [grpc] infof -> DEBU b5a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:39:48.393 UTC [gossip.comm] func1 -> DEBU b5b Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.393 UTC [gossip.comm] func1 -> DEBU b5c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.393 UTC [gossip.gossip] handleMessage -> DEBU b5d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.395 UTC [gossip.gossip] handleMessage -> DEBU b5e Exiting" -"2019-07-20 02:39:48.395 UTC [gossip.gossip] handleMessage -> DEBU b5f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.396 UTC [gossip.pull] HandleMessage -> DEBU b61 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.396 UTC [gossip.pull] SendDigest -> DEBU b62 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:39:48.396 UTC [gossip.gossip] handleMessage -> DEBU b63 Exiting" -"2019-07-20 02:39:48.396 UTC [gossip.discovery] handleMsgFromComm -> DEBU b60 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b64 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:48.397 UTC [msp.identity] Verify -> DEBU b65 Verify: digest = 00000000 c2 f5 97 4c 33 60 7a 9a ba 24 34 c7 47 2b f2 87 |...L3`z..$4.G+..| -00000010 5b eb d2 29 8c 5d a3 17 21 da c7 6e eb 26 41 c2 |[..).]..!..n.&A.|" -"2019-07-20 02:39:48.397 UTC [msp.identity] Verify -> DEBU b66 Verify: sig = 00000000 30 44 02 20 28 3f 67 32 36 59 d6 73 0d 34 83 bb |0D. (?g26Y.s.4..| -00000010 fa c7 21 82 14 81 c9 3b 8e af a9 c0 1f 11 34 43 |..!....;......4C| -00000020 24 1e f6 50 02 20 0e 15 e6 8b 57 da ce 0f e5 19 |$..P. ....W.....| -00000030 6a 7c 6b 21 aa 6b 16 48 e4 ac 51 9b e3 7d 41 4a |j|k!.k.H..Q..}AJ| -00000040 dc a4 f9 81 1a 32 |.....2|" -"2019-07-20 02:39:48.398 UTC [msp.identity] Verify -> DEBU b67 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:39:48.398 UTC [msp.identity] Verify -> DEBU b68 Verify: sig = 00000000 30 45 02 21 00 96 a4 ee c3 c1 8e eb b9 d7 c2 9b |0E.!............| -00000010 6b ab d1 8d 5e 9f 5c 75 38 f5 10 ce 52 9c 78 d2 |k...^.\u8...R.x.| -00000020 93 a8 92 24 d3 02 20 2b e2 d7 d4 f8 0a d5 6c 72 |...$.. +......lr| -00000030 59 f3 a0 6c 99 80 0a 10 25 ff fb 32 18 71 14 78 |Y..l....%..2.q.x| -00000040 35 a9 cf 1f 10 be 91 |5......|" -"2019-07-20 02:39:48.399 UTC [gossip.discovery] handleAliveMessage -> DEBU b69 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:48.400 UTC [gossip.discovery] learnExistingMembers -> DEBU b6d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:39:48.400 UTC [gossip.discovery] learnExistingMembers -> DEBU b6e Exiting" -"2019-07-20 02:39:48.400 UTC [gossip.discovery] handleAliveMessage -> DEBU b6f Exiting" -"2019-07-20 02:39:48.400 UTC [gossip.discovery] handleMsgFromComm -> DEBU b70 Exiting" -"2019-07-20 02:39:48.401 UTC [gossip.discovery] sendMemResponse -> DEBU b71 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:39:48.401 UTC [msp] DeserializeIdentity -> DEBU b72 Obtaining identity" -"2019-07-20 02:39:48.401 UTC [msp] DeserializeIdentity -> DEBU b73 Obtaining identity" -"2019-07-20 02:39:48.402 UTC [gossip.comm] Send -> DEBU b74 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:48.402 UTC [gossip.comm] sendToEndpoint -> DEBU b75 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.402 UTC [gossip.comm] sendToEndpoint -> DEBU b76 Exiting" -"2019-07-20 02:39:48.402 UTC [gossip.discovery] sendMemResponse -> DEBU b77 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > alive: " -"2019-07-20 02:39:48.574 UTC [gossip.comm] func1 -> DEBU b78 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.574 UTC [gossip.gossip] handleMessage -> DEBU b79 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.575 UTC [gossip.pull] HandleMessage -> DEBU b7a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.576 UTC [msp] DeserializeIdentity -> DEBU b7b Obtaining identity" -"2019-07-20 02:39:48.576 UTC [msp] DeserializeIdentity -> DEBU b7c Obtaining identity" -"2019-07-20 02:39:48.576 UTC [gossip.pull] SendDigest -> DEBU b7d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:39:48.576 UTC [gossip.gossip] handleMessage -> DEBU b7e Exiting" -"2019-07-20 02:39:48.577 UTC [gossip.comm] func1 -> DEBU b7f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.577 UTC [gossip.gossip] handleMessage -> DEBU b80 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.578 UTC [gossip.gossip] handleMessage -> DEBU b81 Exiting" -"2019-07-20 02:39:48.579 UTC [gossip.discovery] handleMsgFromComm -> DEBU b82 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.579 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b83 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:39:48.579 UTC [msp] DeserializeIdentity -> DEBU b84 Obtaining identity" -"2019-07-20 02:39:48.580 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:48.581 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b86 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.581 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b87 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:48.581 UTC [cauthdsl] func1 -> DEBU b8b 0xc003f8b790 gate 1563590388581282400 evaluation starts" -"2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8c 0xc003f8b790 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8d 0xc003f8b790 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8e 0xc003f8b790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8f 0xc003f8b790 principal evaluation fails" -"2019-07-20 02:39:48.582 UTC [cauthdsl] func1 -> DEBU b90 0xc003f8b790 gate 1563590388581282400 evaluation fails" -"2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b91 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:48.582 UTC [cauthdsl] func1 -> DEBU b94 0xc003f8bfd0 gate 1563590388582493300 evaluation starts" -"2019-07-20 02:39:48.582 UTC [cauthdsl] func2 -> DEBU b95 0xc003f8bfd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.582 UTC [cauthdsl] func2 -> DEBU b96 0xc003f8bfd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.583 UTC [cauthdsl] func2 -> DEBU b97 0xc003f8bfd0 principal matched by identity 0" -"2019-07-20 02:39:48.583 UTC [msp.identity] Verify -> DEBU b98 Verify: digest = 00000000 d6 2f 09 2d ad 6d 35 46 ef 78 7f 01 4b 0a 64 8f |./.-.m5F.x..K.d.| -00000010 9f f9 82 5c 30 f3 ec 10 d1 1f ff e0 65 33 67 99 |...\0.......e3g.|" -"2019-07-20 02:39:48.583 UTC [msp.identity] Verify -> DEBU b99 Verify: sig = 00000000 30 43 02 20 70 69 80 5a d5 34 0d b5 26 14 03 10 |0C. pi.Z.4..&...| -00000010 fb 41 16 50 4f 1f b4 ef 20 e7 09 ec c4 47 0a d2 |.A.PO... ....G..| -00000020 25 f4 2f b3 02 1f 78 22 08 c9 cf fd 7b 28 d6 20 |%./...x"....{(. | -00000030 c6 5b 85 e1 a8 08 52 47 d6 21 31 13 1e e1 e1 8e |.[....RG.!1.....| -00000040 32 48 30 50 b8 |2H0P.|" -"2019-07-20 02:39:48.584 UTC [cauthdsl] func2 -> DEBU b9a 0xc003f8bfd0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:48.584 UTC [cauthdsl] func1 -> DEBU b9b 0xc003f8bfd0 gate 1563590388582493300 evaluation succeeds" -"2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:48.585 UTC [gossip.discovery] handleAliveMessage -> DEBU ba0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" -"2019-07-20 02:39:48.585 UTC [gossip.discovery] learnExistingMembers -> DEBU ba1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes]}" -"2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba2 updating membership: timestamp: " -"2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba3 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba5 Exiting" -"2019-07-20 02:39:48.587 UTC [gossip.discovery] handleAliveMessage -> DEBU ba6 Exiting" -"2019-07-20 02:39:48.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU ba7 Exiting" -"2019-07-20 02:39:48.587 UTC [gossip.discovery] sendMemResponse -> DEBU ba8 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU ba9 Obtaining identity" -"2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU baa Obtaining identity" -"2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU bab Obtaining identity" -"2019-07-20 02:39:48.588 UTC [gossip.comm] Send -> DEBU bac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:48.589 UTC [gossip.comm] sendToEndpoint -> DEBU bad Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.589 UTC [gossip.comm] sendToEndpoint -> DEBU bae Exiting" -"2019-07-20 02:39:48.589 UTC [gossip.discovery] sendMemResponse -> DEBU baf Exiting, replying with alive: alive:%\240\0010\205)\3759\205\352T\016\254|\275]B\327\340\271\372\220\325\371" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" > alive: " -"2019-07-20 02:39:48.752 UTC [msp] DeserializeIdentity -> DEBU bb0 Obtaining identity" -"2019-07-20 02:39:48.752 UTC [msp] DeserializeIdentity -> DEBU bb1 Obtaining identity" -"2019-07-20 02:39:48.753 UTC [gossip.comm] Send -> DEBU bb2 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:39:48.753 UTC [gossip.comm] sendToEndpoint -> DEBU bb3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.753 UTC [gossip.comm] sendToEndpoint -> DEBU bb4 Exiting" -"2019-07-20 02:39:48.754 UTC [gossip.comm] sendToEndpoint -> DEBU bb5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.754 UTC [gossip.comm] sendToEndpoint -> DEBU bb6 Exiting" -"2019-07-20 02:39:48.755 UTC [gossip.comm] sendToEndpoint -> DEBU bb7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.755 UTC [gossip.comm] sendToEndpoint -> DEBU bb8 Exiting" -"2019-07-20 02:39:48.755 UTC [msp] DeserializeIdentity -> DEBU bb9 Obtaining identity" -"2019-07-20 02:39:48.755 UTC [msp] DeserializeIdentity -> DEBU bba Obtaining identity" -"2019-07-20 02:39:48.756 UTC [gossip.pull] Hello -> DEBU bbb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:39:48.757 UTC [gossip.comm] Send -> DEBU bbc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:48.757 UTC [gossip.comm] Send -> DEBU bbd Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" -"2019-07-20 02:39:48.757 UTC [msp] DeserializeIdentity -> DEBU bbe Obtaining identity" -"2019-07-20 02:39:48.757 UTC [msp] DeserializeIdentity -> DEBU bbf Obtaining identity" -"2019-07-20 02:39:48.758 UTC [gossip.comm] sendToEndpoint -> DEBU bc0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -"2019-07-20 02:39:48.758 UTC [gossip.comm] sendToEndpoint -> DEBU bc2 Exiting" -"2019-07-20 02:39:48.758 UTC [gossip.comm] func1 -> DEBU bc1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.763 UTC [gossip.comm] func1 -> DEBU bc4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.757 UTC [gossip.comm] sendToEndpoint -> DEBU bc5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -"2019-07-20 02:39:48.763 UTC [gossip.comm] sendToEndpoint -> DEBU bc6 Exiting" -"2019-07-20 02:39:48.766 UTC [gossip.gossip] handleMessage -> DEBU bc7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bc8 Obtaining identity" -"2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bc9 Obtaining identity" -"2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bca Obtaining identity" -"2019-07-20 02:39:48.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bcb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:48.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bce Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bcf Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:48.778 UTC [cauthdsl] func1 -> DEBU bd3 0xc003c5c4e0 gate 1563590388778029000 evaluation starts" -"2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd4 0xc003c5c4e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd5 0xc003c5c4e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd6 0xc003c5c4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd7 0xc003c5c4e0 principal evaluation fails" -"2019-07-20 02:39:48.779 UTC [cauthdsl] func1 -> DEBU bd8 0xc003c5c4e0 gate 1563590388778029000 evaluation fails" -"2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bd9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:48.779 UTC [cauthdsl] func1 -> DEBU bdc 0xc003c5cd30 gate 1563590388779866400 evaluation starts" -"2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bdd 0xc003c5cd30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bde 0xc003c5cd30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bdf 0xc003c5cd30 principal matched by identity 0" -"2019-07-20 02:39:48.780 UTC [msp.identity] Verify -> DEBU be0 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:39:48.781 UTC [msp.identity] Verify -> DEBU be1 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:39:48.781 UTC [cauthdsl] func2 -> DEBU be2 0xc003c5cd30 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:48.782 UTC [cauthdsl] func1 -> DEBU be3 0xc003c5cd30 gate 1563590388779866400 evaluation succeeds" -"2019-07-20 02:39:48.782 UTC [policies] Evaluate -> DEBU be4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.782 UTC [policies] Evaluate -> DEBU be5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.783 UTC [policies] Evaluate -> DEBU be6 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:48.783 UTC [policies] Evaluate -> DEBU be7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:48.769 UTC [gossip.comm] sendToEndpoint -> DEBU bcc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.783 UTC [msp] DeserializeIdentity -> DEBU be8 Obtaining identity" -"2019-07-20 02:39:48.783 UTC [gossip.comm] sendToEndpoint -> DEBU be9 Exiting" -"2019-07-20 02:39:48.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bea Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU beb Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:48.784 UTC [cauthdsl] func1 -> DEBU bef 0xc00369e5e0 gate 1563590388784488600 evaluation starts" -"2019-07-20 02:39:48.762 UTC [gossip.comm] sendToEndpoint -> DEBU bc3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -"2019-07-20 02:39:48.784 UTC [gossip.comm] sendToEndpoint -> DEBU bf1 Exiting" -"2019-07-20 02:39:48.769 UTC [gossip.comm] func1 -> DEBU bcd Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.784 UTC [cauthdsl] func2 -> DEBU bf0 0xc00369e5e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.786 UTC [gossip.comm] func1 -> DEBU bf2 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf3 0xc00369e5e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf4 0xc00369e5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf5 0xc00369e5e0 principal evaluation fails" -"2019-07-20 02:39:48.786 UTC [cauthdsl] func1 -> DEBU bf6 0xc00369e5e0 gate 1563590388784488600 evaluation fails" -"2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:48.787 UTC [cauthdsl] func1 -> DEBU bfa 0xc003424290 gate 1563590388787778800 evaluation starts" -"2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfb 0xc003424290 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfc 0xc003424290 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.786 UTC [gossip.comm] func1 -> DEBU bfd Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -"2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfe 0xc003424290 principal matched by identity 0" -"2019-07-20 02:39:48.789 UTC [msp.identity] Verify -> DEBU bff Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:39:48.789 UTC [msp.identity] Verify -> DEBU c00 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:39:48.789 UTC [cauthdsl] func2 -> DEBU c01 0xc003424290 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:48.790 UTC [cauthdsl] func1 -> DEBU c02 0xc003424290 gate 1563590388787778800 evaluation succeeds" -"2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c03 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c05 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c06 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:48.791 UTC [gossip.gossip] handleMessage -> DEBU c07 Exiting" -"2019-07-20 02:39:48.791 UTC [gossip.gossip] handleMessage -> DEBU c08 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.791 UTC [msp] DeserializeIdentity -> DEBU c09 Obtaining identity" -"2019-07-20 02:39:48.791 UTC [msp] DeserializeIdentity -> DEBU c0a Obtaining identity" -"2019-07-20 02:39:48.792 UTC [msp] DeserializeIdentity -> DEBU c0b Obtaining identity" -"2019-07-20 02:39:48.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:48.793 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0d Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.793 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0e Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.793 UTC [policies] Evaluate -> DEBU c0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:48.794 UTC [policies] Evaluate -> DEBU c10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:48.794 UTC [policies] Evaluate -> DEBU c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:48.794 UTC [cauthdsl] func1 -> DEBU c12 0xc002f881c0 gate 1563590388794622500 evaluation starts" -"2019-07-20 02:39:48.794 UTC [cauthdsl] func2 -> DEBU c13 0xc002f881c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.795 UTC [cauthdsl] func2 -> DEBU c14 0xc002f881c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.795 UTC [cauthdsl] func2 -> DEBU c15 0xc002f881c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:48.798 UTC [cauthdsl] func2 -> DEBU c16 0xc002f881c0 principal evaluation fails" -"2019-07-20 02:39:48.798 UTC [cauthdsl] func1 -> DEBU c17 0xc002f881c0 gate 1563590388794622500 evaluation fails" -"2019-07-20 02:39:48.798 UTC [policies] Evaluate -> DEBU c18 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.799 UTC [policies] Evaluate -> DEBU c19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.799 UTC [policies] Evaluate -> DEBU c1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:48.800 UTC [cauthdsl] func1 -> DEBU c1b 0xc002f88a00 gate 1563590388800124500 evaluation starts" -"2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1c 0xc002f88a00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1d 0xc002f88a00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1e 0xc002f88a00 principal matched by identity 0" -"2019-07-20 02:39:48.801 UTC [msp.identity] Verify -> DEBU c1f Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:39:48.801 UTC [msp.identity] Verify -> DEBU c20 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:39:48.801 UTC [cauthdsl] func2 -> DEBU c21 0xc002f88a00 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:48.801 UTC [cauthdsl] func1 -> DEBU c22 0xc002f88a00 gate 1563590388800124500 evaluation succeeds" -"2019-07-20 02:39:48.801 UTC [policies] Evaluate -> DEBU c23 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c25 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c26 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:48.803 UTC [msp] DeserializeIdentity -> DEBU c27 Obtaining identity" -"2019-07-20 02:39:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c28 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c29 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:48.804 UTC [cauthdsl] func1 -> DEBU c2d 0xc002f89af0 gate 1563590388803987600 evaluation starts" -"2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c2e 0xc002f89af0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c2f 0xc002f89af0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c30 0xc002f89af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c31 0xc002f89af0 principal evaluation fails" -"2019-07-20 02:39:48.804 UTC [cauthdsl] func1 -> DEBU c32 0xc002f89af0 gate 1563590388803987600 evaluation fails" -"2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c33 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:48.805 UTC [cauthdsl] func1 -> DEBU c36 0xc0003dc380 gate 1563590388805933700 evaluation starts" -"2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c37 0xc0003dc380 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c38 0xc0003dc380 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c39 0xc0003dc380 principal matched by identity 0" -"2019-07-20 02:39:48.806 UTC [msp.identity] Verify -> DEBU c3a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:39:48.807 UTC [msp.identity] Verify -> DEBU c3b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:39:48.807 UTC [cauthdsl] func2 -> DEBU c3c 0xc0003dc380 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:48.807 UTC [cauthdsl] func1 -> DEBU c3d 0xc0003dc380 gate 1563590388805933700 evaluation succeeds" -"2019-07-20 02:39:48.807 UTC [policies] Evaluate -> DEBU c3e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c40 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c41 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:48.808 UTC [gossip.gossip] handleMessage -> DEBU c42 Exiting" -"2019-07-20 02:39:48.808 UTC [gossip.gossip] handleMessage -> DEBU c43 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c44 Verify: digest = 00000000 32 33 fc e6 d3 c3 38 f4 ff ec d9 4a ea 4e 2c 6b |23....8....J.N,k| -00000010 c8 49 ed 2f c8 e7 a4 4a d2 09 e1 ac 5f 95 4a ee |.I./...J...._.J.|" -"2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c45 Verify: sig = 00000000 30 44 02 20 1b b4 6d f6 ae 3b cb 37 54 49 5d 88 |0D. ..m..;.7TI].| -00000010 af a0 31 de 23 33 f2 1a 6c d6 b6 5e 78 83 08 ab |..1.#3..l..^x...| -00000020 5f e7 5f df 02 20 4a 91 80 93 fc d7 53 30 81 9c |_._.. J.....S0..| -00000030 0d 16 cc 7c ca c1 59 77 c6 ea 43 74 84 8a ad 37 |...|..Yw..Ct...7| -00000040 36 d7 1f 14 5c d8 |6...\.|" -"2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c46 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:39:48.810 UTC [msp.identity] Verify -> DEBU c47 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:39:48.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c48 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c49 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:48.811 UTC [policies] Evaluate -> DEBU c4a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:48.812 UTC [policies] Evaluate -> DEBU c4b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:48.813 UTC [policies] Evaluate -> DEBU c4c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:48.813 UTC [msp] DeserializeIdentity -> DEBU c4d Obtaining identity" -"2019-07-20 02:39:48.814 UTC [msp.identity] newIdentity -> DEBU c4e Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +"2019-09-24 00:25:04.862 UTC [msp.identity] Verify -> DEBU 62a Verify: sig = 00000000 30 45 02 21 00 d5 cd a5 c9 48 14 8d 1e 7e 46 80 |0E.!.....H...~F.| +00000010 8c df 03 4a 04 e8 d3 22 9a 5e 5a 17 72 99 d5 cf |...J...".^Z.r...| +00000020 5d 7a 08 f1 78 02 20 04 1a b9 aa 7b 26 52 00 4c |]z..x. ....{&R.L| +00000030 fc 28 05 6e 2f 21 b4 7b 13 d2 b3 08 e3 6d 32 6c |.(.n/!.{.....m2l| +00000040 dd 07 3e 6e 73 cd 1d |..>ns..|" +"2019-09-24 00:25:04.862 UTC [cauthdsl] func2 -> DEBU 62b 0xc00357bd80 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.862 UTC [cauthdsl] func1 -> DEBU 62c 0xc00357bd80 gate 1569284704844238800 evaluation succeeds" +"2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 62d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 62e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 62f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 630 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:04.862 UTC [gossip.comm] authenticateRemotePeer -> DEBU 631 Authenticated 172.18.0.8:34550" +"2019-09-24 00:25:04.862 UTC [gossip.comm] GossipStream -> DEBU 632 Servicing 172.18.0.8:34550" +"2019-09-24 00:25:04.862 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 633 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.862 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 634 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 635 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 636 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.862 UTC [policies] Evaluate -> DEBU 637 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func1 -> DEBU 638 0xc003592d80 gate 1569284704863004000 evaluation starts" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 639 0xc003592d80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 63a 0xc003592d80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 63b 0xc003592d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 63c 0xc003592d80 principal evaluation fails" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func1 -> DEBU 63d 0xc003592d80 gate 1569284704863004000 evaluation fails" +"2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 63e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 63f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 640 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func1 -> DEBU 641 0xc0035935c0 gate 1569284704863281900 evaluation starts" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 642 0xc0035935c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 643 0xc0035935c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 644 0xc0035935c0 principal matched by identity 0" +"2019-09-24 00:25:04.863 UTC [msp.identity] Verify -> DEBU 645 Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +"2019-09-24 00:25:04.863 UTC [msp.identity] Verify -> DEBU 646 Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +00000040 a8 ad f9 eb 4c ce |....L.|" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func2 -> DEBU 647 0xc0035935c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.863 UTC [cauthdsl] func1 -> DEBU 648 0xc0035935c0 gate 1569284704863281900 evaluation succeeds" +"2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 649 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 64a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 64b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:04.863 UTC [policies] Evaluate -> DEBU 64c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:04.863 UTC [gossip.gossip] JoinChan -> INFO 64d Joining gossip network of channel businesschannel with 2 organizations" +"2019-09-24 00:25:04.863 UTC [gossip.gossip] learnAnchorPeers -> INFO 64e No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-09-24 00:25:04.863 UTC [gossip.gossip] learnAnchorPeers -> INFO 64f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-09-24 00:25:04.863 UTC [gossip.gossip] learnAnchorPeers -> INFO 650 Anchor peer with same endpoint, skipping connecting to myself" +"2019-09-24 00:25:04.864 UTC [gossip.service] updateEndpoints -> DEBU 651 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-09-24 00:25:04.864 UTC [msp] DeserializeIdentity -> DEBU 652 Obtaining identity" +"2019-09-24 00:25:04.865 UTC [msp] GetDefaultSigningIdentity -> DEBU 653 Obtaining default signing identity" +"2019-09-24 00:25:04.865 UTC [msp.identity] Sign -> DEBU 654 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:04.865 UTC [msp.identity] Sign -> DEBU 655 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:04.866 UTC [gossip.comm] authenticateRemotePeer -> DEBU 656 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:49082" +"2019-09-24 00:25:04.867 UTC [gossip.comm] authenticateRemotePeer -> DEBU 657 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49082" +"2019-09-24 00:25:04.867 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 658 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:04.867 UTC [peer] updateTrustedRoots -> DEBU 659 Updating trusted root authorities for channel businesschannel" +"2019-09-24 00:25:04.869 UTC [msp.identity] Verify -> DEBU 65a Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-09-24 00:25:04.869 UTC [msp.identity] Verify -> DEBU 65b Verify: sig = 00000000 30 45 02 21 00 ff 95 5f 02 09 ea a0 bf c0 a6 3e |0E.!..._.......>| +00000010 09 e1 e0 6e 12 24 70 b9 fc 9d 8c 58 e2 40 42 e1 |...n.$p....X.@B.| +00000020 02 ec fc 54 ba 02 20 2c 9a 71 2c 72 53 8f 01 0c |...T.. ,.q,rS...| +00000030 14 27 21 5b e6 30 86 7f e5 04 09 31 a5 a3 b0 ec |.'![.0.....1....| +00000040 75 e7 2a 62 f3 d1 69 |u.*b..i|" +"2019-09-24 00:25:04.869 UTC [gossip.comm] authenticateRemotePeer -> DEBU 65c Authenticated 172.18.0.5:49082" +"2019-09-24 00:25:04.869 UTC [gossip.comm] GossipStream -> DEBU 65d Servicing 172.18.0.5:49082" +"2019-09-24 00:25:04.870 UTC [gossip.comm] serviceConnection -> DEBU 65e Closing reading from stream" +"2019-09-24 00:25:04.870 UTC [gossip.comm] func2 -> DEBU 65f Client 172.18.0.5:49000 disconnected" +"2019-09-24 00:25:04.870 UTC [comm.grpc.server] 1 -> INFO 660 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:49000 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=24.5725286s +"2019-09-24 00:25:04.870 UTC [gossip.comm] writeToStream -> DEBU 661 Closing writing to stream" +"2019-09-24 00:25:04.870 UTC [gossip.comm] serviceConnection -> DEBU 662 Closing reading from stream" +"2019-09-24 00:25:04.870 UTC [gossip.comm] func2 -> DEBU 663 Client 172.18.0.5:49082 disconnected" +"2019-09-24 00:25:04.870 UTC [comm.grpc.server] 1 -> INFO 664 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:14.864Z grpc.peer_address=172.18.0.5:49082 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=5.1841ms +"2019-09-24 00:25:04.871 UTC [gossip.comm] readFromStream -> DEBU 665 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +"2019-09-24 00:25:04.871 UTC [gossip.comm] writeToStream -> DEBU 666 Closing writing to stream" +"2019-09-24 00:25:04.874 UTC [grpc] infof -> DEBU 667 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:04.875 UTC [grpc] infof -> DEBU 668 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:04.875 UTC [gossip.comm] readFromStream -> DEBU 669 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:25:04.875 UTC [gossip.comm] func2 -> DEBU 66a Client 172.18.0.8:34550 disconnected" +"2019-09-24 00:25:04.875 UTC [comm.grpc.server] 1 -> INFO 66b streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:14.81Z grpc.peer_address=172.18.0.8:34550 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=64.3527ms +"2019-09-24 00:25:04.875 UTC [gossip.comm] writeToStream -> DEBU 66c Closing writing to stream" +"2019-09-24 00:25:04.895 UTC [peer] buildTrustedRootsForChain -> DEBU 66d updating root CAs for channel [businesschannel]" +"2019-09-24 00:25:04.895 UTC [peer] buildTrustedRootsForChain -> DEBU 66e adding app root CAs for MSP [Org2MSP]" +"2019-09-24 00:25:04.896 UTC [peer] buildTrustedRootsForChain -> DEBU 66f adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 00:25:04.896 UTC [peer] buildTrustedRootsForChain -> DEBU 670 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 00:25:04.896 UTC [committer.txvalidator] validateTx -> DEBU 671 config transaction received for chain businesschannel" +"2019-09-24 00:25:04.897 UTC [committer.txvalidator] Validate -> DEBU 672 got result for idx 0, code 0" +"2019-09-24 00:25:04.897 UTC [committer.txvalidator] Validate -> INFO 673 [businesschannel] Validated block [1] in 372ms" +"2019-09-24 00:25:04.897 UTC [gossip.privdata] listMissingPrivateData -> DEBU 674 Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 00:25:04.897 UTC [gossip.privdata] StoreBlock -> DEBU 675 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 00:25:04.897 UTC [committer] preCommit -> DEBU 676 Received configuration update, calling CSCC ConfigUpdate" +"2019-09-24 00:25:04.898 UTC [kvledger] CommitWithPvtData -> DEBU 677 [businesschannel] Validating state for block [1]" +"2019-09-24 00:25:04.898 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 678 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 00:25:04.898 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 679 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 00:25:04.898 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 67a Validating new block with num trans = [1]" +"2019-09-24 00:25:04.898 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 67b ValidateAndPrepareBatch() for block number = [1]" +"2019-09-24 00:25:04.898 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 67c preprocessing ProtoBlock..." +"2019-09-24 00:25:04.898 UTC [valimpl] preprocessProtoBlock -> DEBU 67d txType=CONFIG" +"2019-09-24 00:25:04.898 UTC [valimpl] processNonEndorserTx -> DEBU 67e Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-09-24 00:25:04.898 UTC [valimpl] processNonEndorserTx -> DEBU 67f Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-09-24 00:25:04.898 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 680 constructing new tx simulator" +"2019-09-24 00:25:04.898 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 681 constructing new tx simulator txid = []" +"2019-09-24 00:25:04.898 UTC [peer] GenerateSimulationResults -> DEBU 682 Processing CONFIG" +"2019-09-24 00:25:04.899 UTC [peer] processChannelConfigTx -> DEBU 683 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-09-24 00:25:04.900 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 684 Simulation completed, getting simulation results" +"2019-09-24 00:25:04.900 UTC [lockbasedtxmgr] Done -> DEBU 685 Done with transaction simulation / query execution []" +"2019-09-24 00:25:04.900 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 686 Block [1] Transaction index [0] TxId [] marked as valid by state validator" +"2019-09-24 00:25:04.900 UTC [valinternal] ApplyWriteSet -> DEBU 687 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003558140)}" +"2019-09-24 00:25:04.900 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 688 validating rwset..." +"2019-09-24 00:25:04.900 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 689 postprocessing ProtoBlock..." +"2019-09-24 00:25:04.900 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 68a ValidateAndPrepareBatch() complete" +"2019-09-24 00:25:04.900 UTC [kvledger] CommitWithPvtData -> DEBU 68b [businesschannel] Adding CommitHash to the block [1]" +"2019-09-24 00:25:04.900 UTC [kvledger] CommitWithPvtData -> DEBU 68c [businesschannel] Committing block [1] to storage" +"2019-09-24 00:25:04.900 UTC [ledgerstorage] CommitWithPvtData -> DEBU 68d Writing block [1] to pvt block store" +"2019-09-24 00:25:04.897 UTC [committer.txvalidator] validateTx -> DEBU 68e [businesschannel] validateTx completes for block 0xc003207640 env 0xc003372910 txn 0" +"2019-09-24 00:25:04.922 UTC [comm.grpc.server] 1 -> INFO 68f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:06.921Z grpc.peer_address=172.18.0.6:43240 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=155.4µs +"2019-09-24 00:25:04.925 UTC [pvtdatastorage] Prepare -> DEBU 690 Saved 0 private data write sets for block [1]" +"2019-09-24 00:25:04.942 UTC [comm.grpc.server] 1 -> INFO 691 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:06.941Z grpc.peer_address=172.18.0.8:34556 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=155.3µs +"2019-09-24 00:25:04.943 UTC [msp] GetDefaultSigningIdentity -> DEBU 692 Obtaining default signing identity" +"2019-09-24 00:25:04.943 UTC [msp.identity] Sign -> DEBU 693 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:04.943 UTC [msp.identity] Sign -> DEBU 694 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:04.943 UTC [gossip.comm] authenticateRemotePeer -> DEBU 695 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43240" +"2019-09-24 00:25:04.943 UTC [gossip.comm] authenticateRemotePeer -> DEBU 696 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:43240" +"2019-09-24 00:25:04.943 UTC [msp] DeserializeIdentity -> DEBU 697 Obtaining identity" +"2019-09-24 00:25:04.943 UTC [msp] DeserializeIdentity -> DEBU 698 Obtaining identity" +"2019-09-24 00:25:04.944 UTC [msp.identity] newIdentity -> DEBU 699 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI -F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX -LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du -NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -----END CERTIFICATE-----" -"2019-07-20 02:39:48.815 UTC [cauthdsl] func1 -> DEBU c4f 0xc0002ec510 gate 1563590388815103800 evaluation starts" -"2019-07-20 02:39:48.815 UTC [cauthdsl] func2 -> DEBU c50 0xc0002ec510 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:48.816 UTC [cauthdsl] func2 -> DEBU c51 0xc0002ec510 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:48.816 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c52 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-07-20 02:39:48.817 UTC [msp] Validate -> DEBU c53 MSP Org1MSP validating identity" -"2019-07-20 02:39:48.818 UTC [msp] getCertificationChain -> DEBU c54 MSP Org1MSP getting certification chain" -"2019-07-20 02:39:48.819 UTC [cauthdsl] func2 -> DEBU c55 0xc0002ec510 principal matched by identity 0" -"2019-07-20 02:39:48.820 UTC [msp.identity] Verify -> DEBU c56 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:39:48.820 UTC [msp.identity] Verify -> DEBU c57 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:39:48.821 UTC [cauthdsl] func2 -> DEBU c58 0xc0002ec510 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:48.822 UTC [cauthdsl] func1 -> DEBU c59 0xc0002ec510 gate 1563590388815103800 evaluation succeeds" -"2019-07-20 02:39:48.823 UTC [policies] Evaluate -> DEBU c5a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.823 UTC [policies] Evaluate -> DEBU c5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:48.824 UTC [policies] Evaluate -> DEBU c5c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:48.825 UTC [policies] Evaluate -> DEBU c5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:48.825 UTC [gossip.gossip] handleMessage -> DEBU c5e Exiting" -"2019-07-20 02:39:48.826 UTC [gossip.gossip] handleMessage -> DEBU c5f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.826 UTC [gossip.pull] HandleMessage -> DEBU c60 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.826 UTC [gossip.gossip] handleMessage -> DEBU c61 Exiting" -"2019-07-20 02:39:48.827 UTC [gossip.gossip] handleMessage -> DEBU c62 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" -"2019-07-20 02:39:48.827 UTC [msp.identity] Verify -> DEBU c63 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:39:48.827 UTC [msp.identity] Verify -> DEBU c64 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:39:48.828 UTC [msp] DeserializeIdentity -> DEBU c65 Obtaining identity" -"2019-07-20 02:39:48.828 UTC [gossip.gossip] handleMessage -> DEBU c66 Exiting" -"2019-07-20 02:39:48.912 UTC [gossip.comm] func1 -> DEBU c67 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.913 UTC [gossip.gossip] handleMessage -> DEBU c68 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.915 UTC [msp] DeserializeIdentity -> DEBU c69 Obtaining identity" -"2019-07-20 02:39:48.915 UTC [msp] DeserializeIdentity -> DEBU c6a Obtaining identity" -"2019-07-20 02:39:48.916 UTC [gossip.gossip] handleMessage -> DEBU c6b Exiting" -"2019-07-20 02:39:48.927 UTC [gossip.comm] func1 -> DEBU c6c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.928 UTC [gossip.gossip] handleMessage -> DEBU c6d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.928 UTC [gossip.pull] HandleMessage -> DEBU c6e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:39:48.929 UTC [gossip.pull] SendDigest -> DEBU c70 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:39:48.929 UTC [gossip.gossip] handleMessage -> DEBU c71 Exiting" -"2019-07-20 02:39:48.929 UTC [gossip.comm] func1 -> DEBU c6f Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -"2019-07-20 02:39:48.929 UTC [gossip.gossip] handleMessage -> DEBU c72 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -"2019-07-20 02:39:48.930 UTC [msp.identity] Verify -> DEBU c73 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:39:48.930 UTC [msp.identity] Verify -> DEBU c74 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:39:48.930 UTC [gossip.gossip] handleMessage -> DEBU c75 Exiting" -"2019-07-20 02:39:48.937 UTC [gossip.comm] func1 -> DEBU c76 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -"2019-07-20 02:39:48.937 UTC [gossip.gossip] handleMessage -> DEBU c77 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -"2019-07-20 02:39:48.938 UTC [msp.identity] Verify -> DEBU c78 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:39:48.938 UTC [msp.identity] Verify -> DEBU c79 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:39:48.939 UTC [msp] DeserializeIdentity -> DEBU c7a Obtaining identity" -"2019-07-20 02:39:48.939 UTC [gossip.gossip] handleMessage -> DEBU c7b Exiting" -"2019-07-20 02:39:49.077 UTC [gossip.comm] func1 -> DEBU c7c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.077 UTC [gossip.gossip] handleMessage -> DEBU c7d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.077 UTC [msp] DeserializeIdentity -> DEBU c7e Obtaining identity" -"2019-07-20 02:39:49.077 UTC [msp] DeserializeIdentity -> DEBU c7f Obtaining identity" -"2019-07-20 02:39:49.078 UTC [msp] DeserializeIdentity -> DEBU c80 Obtaining identity" -"2019-07-20 02:39:49.078 UTC [gossip.gossip] handleMessage -> DEBU c81 Exiting" -"2019-07-20 02:39:49.082 UTC [gossip.comm] func1 -> DEBU c82 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -"2019-07-20 02:39:49.083 UTC [gossip.gossip] handleMessage -> DEBU c83 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -"2019-07-20 02:39:49.083 UTC [msp] DeserializeIdentity -> DEBU c84 Obtaining identity" -"2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c86 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c87 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:49.085 UTC [cauthdsl] func1 -> DEBU c8b 0xc0002d7a20 gate 1563590389084995900 evaluation starts" -"2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8c 0xc0002d7a20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8d 0xc0002d7a20 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8e 0xc0002d7a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:49.086 UTC [cauthdsl] func2 -> DEBU c8f 0xc0002d7a20 principal evaluation fails" -"2019-07-20 02:39:49.086 UTC [cauthdsl] func1 -> DEBU c90 0xc0002d7a20 gate 1563590389084995900 evaluation fails" -"2019-07-20 02:39:49.086 UTC [policies] Evaluate -> DEBU c91 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:49.087 UTC [policies] Evaluate -> DEBU c92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:49.087 UTC [policies] Evaluate -> DEBU c93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:49.087 UTC [cauthdsl] func1 -> DEBU c94 0xc00027a260 gate 1563590389087922900 evaluation starts" -"2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c95 0xc00027a260 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c96 0xc00027a260 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c97 0xc00027a260 principal matched by identity 0" -"2019-07-20 02:39:49.088 UTC [msp.identity] Verify -> DEBU c98 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:39:49.088 UTC [msp.identity] Verify -> DEBU c99 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:39:49.089 UTC [cauthdsl] func2 -> DEBU c9a 0xc00027a260 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:49.089 UTC [cauthdsl] func1 -> DEBU c9b 0xc00027a260 gate 1563590389087922900 evaluation succeeds" -"2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:49.090 UTC [msp] DeserializeIdentity -> DEBU ca0 Obtaining identity" -"2019-07-20 02:39:49.090 UTC [gossip.gossip] handleMessage -> DEBU ca1 Exiting" -"2019-07-20 02:39:49.093 UTC [gossip.comm] func1 -> DEBU ca2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -"2019-07-20 02:39:49.093 UTC [gossip.gossip] handleMessage -> DEBU ca3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -"2019-07-20 02:39:49.093 UTC [msp] DeserializeIdentity -> DEBU ca4 Obtaining identity" -"2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ca5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ca6 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ca7 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:49.094 UTC [policies] Evaluate -> DEBU ca8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:49.095 UTC [policies] Evaluate -> DEBU ca9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:49.095 UTC [policies] Evaluate -> DEBU caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:49.095 UTC [cauthdsl] func1 -> DEBU cab 0xc00027bda0 gate 1563590389095398000 evaluation starts" -"2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cac 0xc00027bda0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cad 0xc00027bda0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cae 0xc00027bda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:49.096 UTC [cauthdsl] func2 -> DEBU caf 0xc00027bda0 principal evaluation fails" -"2019-07-20 02:39:49.096 UTC [cauthdsl] func1 -> DEBU cb0 0xc00027bda0 gate 1563590389095398000 evaluation fails" -"2019-07-20 02:39:49.096 UTC [policies] Evaluate -> DEBU cb1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:49.096 UTC [policies] Evaluate -> DEBU cb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:49.097 UTC [policies] Evaluate -> DEBU cb3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:49.097 UTC [cauthdsl] func1 -> DEBU cb4 0xc0002665e0 gate 1563590389097311700 evaluation starts" -"2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb5 0xc0002665e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb6 0xc0002665e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb7 0xc0002665e0 principal matched by identity 0" -"2019-07-20 02:39:49.098 UTC [msp.identity] Verify -> DEBU cb8 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:39:49.098 UTC [msp.identity] Verify -> DEBU cb9 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:39:49.098 UTC [cauthdsl] func2 -> DEBU cba 0xc0002665e0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:49.099 UTC [cauthdsl] func1 -> DEBU cbb 0xc0002665e0 gate 1563590389097311700 evaluation succeeds" -"2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbe Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:49.100 UTC [policies] Evaluate -> DEBU cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:49.100 UTC [msp] DeserializeIdentity -> DEBU cc0 Obtaining identity" -"2019-07-20 02:39:49.100 UTC [gossip.gossip] handleMessage -> DEBU cc1 Exiting" -"2019-07-20 02:39:49.225 UTC [gossip.comm] func1 -> DEBU cc2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.225 UTC [gossip.gossip] handleMessage -> DEBU cc3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc4 Obtaining identity" -"2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc5 Obtaining identity" -"2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc6 Obtaining identity" -"2019-07-20 02:39:49.227 UTC [gossip.gossip] handleMessage -> DEBU cc7 Exiting" -"2019-07-20 02:39:49.230 UTC [gossip.comm] func1 -> DEBU cc8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -"2019-07-20 02:39:49.230 UTC [gossip.gossip] handleMessage -> DEBU cc9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 71 bytes" -"2019-07-20 02:39:49.231 UTC [msp] DeserializeIdentity -> DEBU cca Obtaining identity" -"2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ccb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ccc Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ccd Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:49.231 UTC [policies] Evaluate -> DEBU cce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:49.232 UTC [policies] Evaluate -> DEBU ccf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:49.232 UTC [policies] Evaluate -> DEBU cd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:49.232 UTC [cauthdsl] func1 -> DEBU cd1 0xc000262860 gate 1563590389232465300 evaluation starts" -"2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd2 0xc000262860 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd3 0xc000262860 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd4 0xc000262860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:49.233 UTC [cauthdsl] func2 -> DEBU cd5 0xc000262860 principal evaluation fails" -"2019-07-20 02:39:49.233 UTC [cauthdsl] func1 -> DEBU cd6 0xc000262860 gate 1563590389232465300 evaluation fails" -"2019-07-20 02:39:49.233 UTC [policies] Evaluate -> DEBU cd7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:49.233 UTC [policies] Evaluate -> DEBU cd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:49.234 UTC [policies] Evaluate -> DEBU cd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:49.234 UTC [cauthdsl] func1 -> DEBU cda 0xc0002630a0 gate 1563590389234175000 evaluation starts" -"2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdb 0xc0002630a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdc 0xc0002630a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdd 0xc0002630a0 principal matched by identity 0" -"2019-07-20 02:39:49.234 UTC [msp.identity] Verify -> DEBU cde Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:39:49.235 UTC [msp.identity] Verify -> DEBU cdf Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:39:49.235 UTC [cauthdsl] func2 -> DEBU ce0 0xc0002630a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:49.235 UTC [cauthdsl] func1 -> DEBU ce1 0xc0002630a0 gate 1563590389234175000 evaluation succeeds" -"2019-07-20 02:39:49.236 UTC [policies] Evaluate -> DEBU ce2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:49.236 UTC [policies] Evaluate -> DEBU ce3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:49.237 UTC [policies] Evaluate -> DEBU ce4 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:49.238 UTC [policies] Evaluate -> DEBU ce5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:49.239 UTC [msp] DeserializeIdentity -> DEBU ce6 Obtaining identity" -"2019-07-20 02:39:49.239 UTC [gossip.gossip] handleMessage -> DEBU ce7 Exiting" -"2019-07-20 02:39:49.273 UTC [gossip.pull] SendReq -> DEBU ce8 Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" -"2019-07-20 02:39:49.274 UTC [gossip.comm] Send -> DEBU ce9 Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:49.275 UTC [gossip.pull] SendReq -> DEBU cea Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051" -"2019-07-20 02:39:49.275 UTC [gossip.comm] Send -> DEBU cec Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:49.275 UTC [gossip.comm] sendToEndpoint -> DEBU ceb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.276 UTC [gossip.comm] sendToEndpoint -> DEBU ced Exiting" -"2019-07-20 02:39:49.276 UTC [gossip.comm] sendToEndpoint -> DEBU cee Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.278 UTC [gossip.comm] sendToEndpoint -> DEBU cef Exiting" -"2019-07-20 02:39:49.281 UTC [gossip.comm] func1 -> DEBU cf0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.281 UTC [gossip.gossip] handleMessage -> DEBU cf1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.281 UTC [msp] DeserializeIdentity -> DEBU cf2 Obtaining identity" -"2019-07-20 02:39:49.281 UTC [gossip.comm] func1 -> DEBU cf3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.281 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cf4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:49.282 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:49.282 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:49.283 UTC [policies] Evaluate -> DEBU cf7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:49.284 UTC [policies] Evaluate -> DEBU cf8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:49.284 UTC [policies] Evaluate -> DEBU cf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:49.286 UTC [cauthdsl] func1 -> DEBU cfa 0xc000228180 gate 1563590389286449300 evaluation starts" -"2019-07-20 02:39:49.287 UTC [cauthdsl] func2 -> DEBU cfb 0xc000228180 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:49.287 UTC [cauthdsl] func2 -> DEBU cfc 0xc000228180 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:49.288 UTC [cauthdsl] func2 -> DEBU cfd 0xc000228180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:49.288 UTC [cauthdsl] func2 -> DEBU cfe 0xc000228180 principal evaluation fails" -"2019-07-20 02:39:49.288 UTC [cauthdsl] func1 -> DEBU cff 0xc000228180 gate 1563590389286449300 evaluation fails" -"2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:49.290 UTC [cauthdsl] func1 -> DEBU d03 0xc00020cb70 gate 1563590389290395000 evaluation starts" -"2019-07-20 02:39:49.290 UTC [cauthdsl] func2 -> DEBU d04 0xc00020cb70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:49.291 UTC [cauthdsl] func2 -> DEBU d05 0xc00020cb70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:49.292 UTC [cauthdsl] func2 -> DEBU d06 0xc00020cb70 principal matched by identity 0" -"2019-07-20 02:39:49.292 UTC [msp.identity] Verify -> DEBU d07 Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| -00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|" -"2019-07-20 02:39:49.293 UTC [msp.identity] Verify -> DEBU d08 Verify: sig = 00000000 30 44 02 20 16 11 2c 76 34 0b 04 99 7d e7 f0 df |0D. ..,v4...}...| -00000010 43 2d 8c 9d e2 09 62 f0 49 8e 3a a0 26 d1 c8 e6 |C-....b.I.:.&...| -00000020 7d 07 c6 57 02 20 66 02 4d 17 39 5f d4 bd 22 ef |}..W. f.M.9_..".| -00000030 56 e0 3b 54 38 80 01 ed 3f a5 90 22 06 14 80 77 |V.;T8...?.."...w| -00000040 bf ae d3 ef 0c ad |......|" -"2019-07-20 02:39:49.294 UTC [cauthdsl] func2 -> DEBU d09 0xc00020cb70 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:49.295 UTC [cauthdsl] func1 -> DEBU d0a 0xc00020cb70 gate 1563590389290395000 evaluation succeeds" -"2019-07-20 02:39:49.296 UTC [policies] Evaluate -> DEBU d0b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:49.296 UTC [policies] Evaluate -> DEBU d0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:49.297 UTC [policies] Evaluate -> DEBU d0d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:49.297 UTC [policies] Evaluate -> DEBU d0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:49.298 UTC [msp] DeserializeIdentity -> DEBU d0f Obtaining identity" -"2019-07-20 02:39:49.299 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d10 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:49.300 UTC [gossip.pull] HandleMessage -> DEBU d11 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.301 UTC [msp] DeserializeIdentity -> DEBU d12 Obtaining identity" -"2019-07-20 02:39:49.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d13 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:49.305 UTC [msp] DeserializeIdentity -> DEBU d14 Obtaining identity" -"2019-07-20 02:39:49.306 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:49.307 UTC [gossip.gossip] func2 -> DEBU d16 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -"2019-07-20 02:39:49.307 UTC [gossip.pull] HandleMessage -> DEBU d17 Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 3" -"2019-07-20 02:39:49.308 UTC [gossip.gossip] handleMessage -> DEBU d18 Exiting" -"2019-07-20 02:39:49.308 UTC [gossip.gossip] handleMessage -> DEBU d19 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.309 UTC [msp] DeserializeIdentity -> DEBU d1a Obtaining identity" -"2019-07-20 02:39:49.309 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:49.310 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d1c Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:49.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d1d Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:49.311 UTC [policies] Evaluate -> DEBU d1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:49.312 UTC [policies] Evaluate -> DEBU d1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:49.313 UTC [policies] Evaluate -> DEBU d20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:49.313 UTC [cauthdsl] func1 -> DEBU d21 0xc00044e980 gate 1563590389313647700 evaluation starts" -"2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d22 0xc00044e980 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d23 0xc00044e980 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d24 0xc00044e980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d25 0xc00044e980 principal evaluation fails" -"2019-07-20 02:39:49.319 UTC [cauthdsl] func1 -> DEBU d26 0xc00044e980 gate 1563590389313647700 evaluation fails" -"2019-07-20 02:39:49.320 UTC [policies] Evaluate -> DEBU d27 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:49.321 UTC [policies] Evaluate -> DEBU d28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:49.321 UTC [policies] Evaluate -> DEBU d29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:49.322 UTC [cauthdsl] func1 -> DEBU d2a 0xc00044f240 gate 1563590389322117800 evaluation starts" -"2019-07-20 02:39:49.322 UTC [cauthdsl] func2 -> DEBU d2b 0xc00044f240 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:49.323 UTC [cauthdsl] func2 -> DEBU d2c 0xc00044f240 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:49.323 UTC [cauthdsl] func2 -> DEBU d2d 0xc00044f240 principal matched by identity 0" -"2019-07-20 02:39:49.324 UTC [msp.identity] Verify -> DEBU d2e Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| -00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|" -"2019-07-20 02:39:49.324 UTC [msp.identity] Verify -> DEBU d2f Verify: sig = 00000000 30 45 02 21 00 b2 0f 25 2e 73 2c ce ca bb da 79 |0E.!...%.s,....y| -00000010 49 7b f3 40 32 fb 7b 7e 3c f4 d0 a5 9c 36 14 8a |I{.@2.{~<....6..| -00000020 ca b4 aa d9 f3 02 20 30 b1 bf 9c 24 a5 aa 46 47 |...... 0...$..FG| -00000030 51 70 36 5a 52 b5 25 aa bf 66 3b 36 1d 1e c6 3a |Qp6ZR.%..f;6...:| -00000040 fb ef cf 54 18 2b 4d |...T.+M|" -"2019-07-20 02:39:49.326 UTC [cauthdsl] func2 -> DEBU d30 0xc00044f240 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:49.326 UTC [cauthdsl] func1 -> DEBU d31 0xc00044f240 gate 1563590389322117800 evaluation succeeds" -"2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d34 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:49.326 UTC [msp] DeserializeIdentity -> DEBU d36 Obtaining identity" -"2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:49.327 UTC [gossip.pull] HandleMessage -> DEBU d38 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.327 UTC [msp] DeserializeIdentity -> DEBU d39 Obtaining identity" -"2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d3a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:49.327 UTC [msp] DeserializeIdentity -> DEBU d3b Obtaining identity" -"2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d3c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:49.327 UTC [gossip.gossip] func2 -> DEBU d3d Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" -"2019-07-20 02:39:49.327 UTC [gossip.pull] HandleMessage -> DEBU d3e Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 4" -"2019-07-20 02:39:49.327 UTC [gossip.gossip] handleMessage -> DEBU d3f Exiting" -"2019-07-20 02:39:49.574 UTC [gossip.comm] func1 -> DEBU d40 Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.574 UTC [gossip.gossip] handleMessage -> DEBU d41 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.576 UTC [gossip.pull] HandleMessage -> DEBU d42 GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" -"2019-07-20 02:39:49.576 UTC [msp] DeserializeIdentity -> DEBU d43 Obtaining identity" -"2019-07-20 02:39:49.577 UTC [gossip.gossip] handleMessage -> DEBU d44 Exiting" -"2019-07-20 02:39:49.577 UTC [gossip.pull] SendRes -> DEBU d45 Sending 1 IDENTITY_MSG items to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:39:50.748 UTC [endorser] ProcessProposal -> DEBU d46 Entering: request from 172.18.0.9:58342" -"2019-07-20 02:39:50.748 UTC [protoutils] ValidateProposalMessage -> DEBU d47 ValidateProposalMessage starts for signed proposal 0xc0002c0d70" -"2019-07-20 02:39:50.749 UTC [protoutils] validateChannelHeader -> DEBU d48 validateChannelHeader info: header type 3" -"2019-07-20 02:39:50.749 UTC [protoutils] checkSignatureFromCreator -> DEBU d49 begin" -"2019-07-20 02:39:50.749 UTC [msp] GetManagerForChain -> DEBU d4a Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:39:50.749 UTC [msp] DeserializeIdentity -> DEBU d4b Obtaining identity" -"2019-07-20 02:39:50.750 UTC [msp.identity] newIdentity -> DEBU d4c Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e -gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ -l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI -zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF -1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== ------END CERTIFICATE-----" -"2019-07-20 02:39:50.750 UTC [protoutils] checkSignatureFromCreator -> DEBU d4d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:39:50.750 UTC [msp] Validate -> DEBU d4e MSP Org1MSP validating identity" -"2019-07-20 02:39:50.751 UTC [msp] getCertificationChain -> DEBU d4f MSP Org1MSP getting certification chain" -"2019-07-20 02:39:50.751 UTC [protoutils] checkSignatureFromCreator -> DEBU d50 creator is valid" -"2019-07-20 02:39:50.751 UTC [msp.identity] Verify -> DEBU d51 Verify: digest = 00000000 57 7b e2 3e 1d 82 63 42 fa 2c a7 c7 11 dc 39 b2 |W{.>..cB.,....9.| -00000010 dc ed 2f 91 c1 96 75 5b 2c df 5f 10 56 0c e2 b9 |../...u[,._.V...|" -"2019-07-20 02:39:50.751 UTC [msp.identity] Verify -> DEBU d52 Verify: sig = 00000000 30 44 02 20 3d c4 f0 de 31 42 86 8f 63 d6 6b 17 |0D. =...1B..c.k.| -00000010 55 c7 bf 46 b6 de 95 5d 1c 12 50 5b 94 cc 44 30 |U..F...]..P[..D0| -00000020 07 64 ae 11 02 20 6c 41 8e 4d a8 49 18 f7 c3 86 |.d... lA.M.I....| -00000030 70 bd 27 76 81 8b cf e3 64 4b f0 b4 bd e3 fa d6 |p.'v....dK......| -00000040 4d 7b 7e 17 65 84 |M{~.e.|" -"2019-07-20 02:39:50.752 UTC [protoutils] checkSignatureFromCreator -> DEBU d53 exits successfully" -"2019-07-20 02:39:50.752 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d54 validateChaincodeProposalMessage starts for proposal 0xc003982bd0, header 0xc0002c12c0" -"2019-07-20 02:39:50.752 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d55 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -"2019-07-20 02:39:50.752 UTC [endorser] preProcess -> DEBU d56 [businesschannel][79f74fa3] processing txid: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f" -"2019-07-20 02:39:50.752 UTC [fsblkstorage] retrieveTransactionByID -> DEBU d57 retrieveTransactionByID() - txId = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" -"2019-07-20 02:39:50.752 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU d58 constructing new tx simulator" -"2019-07-20 02:39:50.752 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU d59 constructing new tx simulator txid = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" -"2019-07-20 02:39:50.753 UTC [endorser] SimulateProposal -> DEBU d5a [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " -"2019-07-20 02:39:50.753 UTC [endorser] callChaincode -> INFO d5b [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " -"2019-07-20 02:39:50.754 UTC [chaincode] Execute -> DEBU d5c Entry" -"2019-07-20 02:39:50.755 UTC [chaincode] handleMessage -> DEBU d5d [79f74fa3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:39:50.755 UTC [chaincode] HandleTransaction -> DEBU d5e [79f74fa3] handling GET_STATE from chaincode" -"2019-07-20 02:39:50.755 UTC [chaincode] HandleGetState -> DEBU d5f [79f74fa3] getting state for chaincode lscc, key exp02, channel businesschannel" -"2019-07-20 02:39:50.755 UTC [stateleveldb] GetState -> DEBU d60 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:39:50.755 UTC [chaincode] HandleGetState -> DEBU d61 [79f74fa3] No state associated with key: exp02. Sending RESPONSE with an empty payload" -"2019-07-20 02:39:50.755 UTC [chaincode] HandleTransaction -> DEBU d62 [79f74fa3] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:39:50.756 UTC [msp] GetManagerForChain -> DEBU d63 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:39:50.757 UTC [cauthdsl] func1 -> DEBU d64 0xc00042a3a0 gate 1563590390756990200 evaluation starts" -"2019-07-20 02:39:50.757 UTC [cauthdsl] func2 -> DEBU d65 0xc00042a3a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:50.757 UTC [cauthdsl] func2 -> DEBU d66 0xc00042a3a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:50.763 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d67 Checking if identity satisfies ADMIN role for Org1MSP" -"2019-07-20 02:39:50.763 UTC [cauthdsl] func2 -> DEBU d68 0xc00042a3a0 principal matched by identity 0" -"2019-07-20 02:39:50.763 UTC [msp.identity] Verify -> DEBU d69 Verify: digest = 00000000 57 7b e2 3e 1d 82 63 42 fa 2c a7 c7 11 dc 39 b2 |W{.>..cB.,....9.| -00000010 dc ed 2f 91 c1 96 75 5b 2c df 5f 10 56 0c e2 b9 |../...u[,._.V...|" -"2019-07-20 02:39:50.763 UTC [msp.identity] Verify -> DEBU d6a Verify: sig = 00000000 30 44 02 20 3d c4 f0 de 31 42 86 8f 63 d6 6b 17 |0D. =...1B..c.k.| -00000010 55 c7 bf 46 b6 de 95 5d 1c 12 50 5b 94 cc 44 30 |U..F...]..P[..D0| -00000020 07 64 ae 11 02 20 6c 41 8e 4d a8 49 18 f7 c3 86 |.d... lA.M.I....| -00000030 70 bd 27 76 81 8b cf e3 64 4b f0 b4 bd e3 fa d6 |p.'v....dK......| -00000040 4d 7b 7e 17 65 84 |M{~.e.|" -"2019-07-20 02:39:50.763 UTC [cauthdsl] func2 -> DEBU d6b 0xc00042a3a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6c 0xc00042a3a0 signed by 1 principal evaluation starts (used [true])" -"2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6d 0xc00042a3a0 skipping identity 0 because it has already been used" -"2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6e 0xc00042a3a0 principal evaluation fails" -"2019-07-20 02:39:50.764 UTC [cauthdsl] func1 -> DEBU d6f 0xc00042a3a0 gate 1563590390756990200 evaluation succeeds" -"2019-07-20 02:39:50.765 UTC [chaincode] handleMessage -> DEBU d70 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-07-20 02:39:50.765 UTC [chaincode] HandleTransaction -> DEBU d71 [79f74fa3] handling PUT_STATE from chaincode" -"2019-07-20 02:39:50.765 UTC [chaincode] HandleTransaction -> DEBU d72 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" -"2019-07-20 02:39:50.766 UTC [lscc] putChaincodeCollectionData -> DEBU d73 No collection configuration specified" -"2019-07-20 02:39:50.766 UTC [gossip.channel] reportMembershipChanges -> INFO d74 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" -"2019-07-20 02:39:50.766 UTC [chaincode] handleMessage -> DEBU d75 [79f74fa3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:39:50.767 UTC [chaincode] Notify -> DEBU d76 [79f74fa3] notifying Txid:79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, channelID:businesschannel" -"2019-07-20 02:39:50.767 UTC [chaincode] Execute -> DEBU d77 Exit" -"2019-07-20 02:39:50.768 UTC [chaincode] LaunchConfig -> DEBU d78 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" -"2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d79 start container: exp02:1.0" -"2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d7a start container with args: chaincode -peer.address=peer0.org1.example.com:7052" -"2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d7b start container with env: - CORE_CHAINCODE_LOGGING_LEVEL=info - CORE_CHAINCODE_LOGGING_SHIM=warning - CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} - CORE_CHAINCODE_ID_NAME=exp02:1.0 - CORE_PEER_TLS_ENABLED=true - CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key - CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" -"2019-07-20 02:39:50.768 UTC [container] lockContainer -> DEBU d7c waiting for container(exp02-1.0) lock" -"2019-07-20 02:39:50.769 UTC [container] lockContainer -> DEBU d7d got container (exp02-1.0) lock" -"2019-07-20 02:39:50.769 UTC [dockercontroller] stopInternal -> DEBU d7e stopping container" id=dev-peer0.org1.example.com-exp02-1.0 -"2019-07-20 02:39:50.772 UTC [dockercontroller] stopInternal -> DEBU d7f stop container result" error="No such container: dev-peer0.org1.example.com-exp02-1.0" -"2019-07-20 02:39:50.772 UTC [dockercontroller] stopInternal -> DEBU d80 killing container" id=dev-peer0.org1.example.com-exp02-1.0 -"2019-07-20 02:39:50.775 UTC [dockercontroller] stopInternal -> DEBU d81 kill container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" -"2019-07-20 02:39:50.775 UTC [dockercontroller] stopInternal -> DEBU d82 removing container" id=dev-peer0.org1.example.com-exp02-1.0 -"2019-07-20 02:39:50.778 UTC [dockercontroller] stopInternal -> DEBU d83 remove container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" -"2019-07-20 02:39:50.779 UTC [dockercontroller] createContainer -> DEBU d84 create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 -"2019-07-20 02:39:50.779 UTC [dockercontroller] getDockerHostConfig -> DEBU d85 docker container hostconfig NetworkMode: hlf_net" -"2019-07-20 02:39:50.785 UTC [chaincode.platform] GenerateDockerfile -> DEBU d86 -FROM hyperledger/fabric-baseos:amd64-0.4.15 -ADD binpackage.tar /usr/local/bin -LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ - org.hyperledger.fabric.chaincode.id.version="1.0" \ - org.hyperledger.fabric.chaincode.type="GOLANG" \ - org.hyperledger.fabric.version="1.4.2" \ - org.hyperledger.fabric.base.version="0.4.15" -ENV CORE_CHAINCODE_BUILDLEVEL=1.4.2" -"2019-07-20 02:39:50.790 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO d87 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" -"2019-07-20 02:39:50.791 UTC [chaincode.platform.util] DockerBuild -> DEBU d88 Attempting build with image hyperledger/fabric-ccenv:latest" -"2019-07-20 02:39:51.783 UTC [gossip.election] waitForInterrupt -> DEBU d89 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:39:51.784 UTC [gossip.election] IsLeader -> DEBU d8a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:39:51.784 UTC [msp] GetDefaultSigningIdentity -> DEBU d8b Obtaining default signing identity" -"2019-07-20 02:39:51.784 UTC [msp.identity] Sign -> DEBU d8c Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510031801 " -"2019-07-20 02:39:51.784 UTC [msp.identity] Sign -> DEBU d8d Sign: digest: C125DA54F2FD625A6FF1593601FC46CF784E6611475464A50DC95F7779AC6E7F " -"2019-07-20 02:39:51.784 UTC [gossip.election] waitForInterrupt -> DEBU d8e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d8f Obtaining identity" -"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d90 Obtaining identity" -"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d91 Obtaining identity" -"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d92 Obtaining identity" -"2019-07-20 02:39:51.790 UTC [gossip.comm] Send -> DEBU d93 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d94 Obtaining identity" -"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d95 Obtaining identity" -"2019-07-20 02:39:51.790 UTC [gossip.comm] sendToEndpoint -> DEBU d96 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -"2019-07-20 02:39:51.790 UTC [gossip.comm] sendToEndpoint -> DEBU d97 Exiting" -"2019-07-20 02:39:51.954 UTC [gossip.comm] func1 -> DEBU d98 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:51.955 UTC [gossip.comm] func1 -> DEBU d99 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:51.956 UTC [gossip.comm] func1 -> DEBU d9a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:51.960 UTC [gossip.gossip] handleMessage -> DEBU d9b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:51.961 UTC [gossip.gossip] handleMessage -> DEBU d9c Exiting" -"2019-07-20 02:39:51.961 UTC [gossip.gossip] handleMessage -> DEBU d9d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:51.961 UTC [gossip.discovery] handleMsgFromComm -> DEBU d9e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:51.961 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d9f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:39:51.962 UTC [msp] DeserializeIdentity -> DEBU da0 Obtaining identity" -"2019-07-20 02:39:51.962 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU da1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:51.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU da2 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:51.963 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU da3 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:51.963 UTC [cauthdsl] func1 -> DEBU da7 0xc00069b140 gate 1563590391963945100 evaluation starts" -"2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU da8 0xc00069b140 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU da9 0xc00069b140 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU daa 0xc00069b140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:51.965 UTC [cauthdsl] func2 -> DEBU dab 0xc00069b140 principal evaluation fails" -"2019-07-20 02:39:51.965 UTC [cauthdsl] func1 -> DEBU dac 0xc00069b140 gate 1563590391963945100 evaluation fails" -"2019-07-20 02:39:51.965 UTC [policies] Evaluate -> DEBU dad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:51.966 UTC [policies] Evaluate -> DEBU dae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:51.966 UTC [policies] Evaluate -> DEBU daf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:51.966 UTC [cauthdsl] func1 -> DEBU db0 0xc00069b9b0 gate 1563590391966552900 evaluation starts" -"2019-07-20 02:39:51.966 UTC [cauthdsl] func2 -> DEBU db1 0xc00069b9b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:51.967 UTC [cauthdsl] func2 -> DEBU db2 0xc00069b9b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:51.967 UTC [cauthdsl] func2 -> DEBU db3 0xc00069b9b0 principal matched by identity 0" -"2019-07-20 02:39:51.968 UTC [msp.identity] Verify -> DEBU db4 Verify: digest = 00000000 9a 8a 36 66 3a 44 53 60 48 d2 8f ad eb c3 a1 1e |..6f:DS`H.......| -00000010 c7 a1 8f 57 db 61 9d c1 af fd a0 0d 36 8c 83 e9 |...W.a......6...|" -"2019-07-20 02:39:51.968 UTC [msp.identity] Verify -> DEBU db5 Verify: sig = 00000000 30 44 02 20 1a f4 32 3b ae 0e 0d 34 bb 01 06 1d |0D. ..2;...4....| -00000010 b2 bc e1 31 95 d9 71 54 41 b7 28 6e 00 8b 67 f1 |...1..qTA.(n..g.| -00000020 9e bd 75 00 02 20 18 ae a5 a6 57 d9 38 c9 79 91 |..u.. ....W.8.y.| -00000030 32 79 72 74 be a9 8e df ad 40 29 41 e3 cc 4f a5 |2yrt.....@)A..O.| -00000040 bd 87 29 80 ca a0 |..)...|" -"2019-07-20 02:39:51.968 UTC [cauthdsl] func2 -> DEBU db6 0xc00069b9b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:51.969 UTC [cauthdsl] func1 -> DEBU db7 0xc00069b9b0 gate 1563590391966552900 evaluation succeeds" -"2019-07-20 02:39:51.969 UTC [policies] Evaluate -> DEBU db8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:51.969 UTC [policies] Evaluate -> DEBU db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:51.970 UTC [policies] Evaluate -> DEBU dba Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:51.970 UTC [policies] Evaluate -> DEBU dbb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:51.971 UTC [gossip.comm] func1 -> DEBU dbc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:51.972 UTC [gossip.discovery] handleAliveMessage -> DEBU dbd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:51.972 UTC [gossip.discovery] learnExistingMembers -> DEBU dbe Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dbf updating membership: timestamp: " -"2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc0 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc2 Exiting" -"2019-07-20 02:39:51.974 UTC [gossip.discovery] handleAliveMessage -> DEBU dc3 Exiting" -"2019-07-20 02:39:51.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU dc4 Exiting" -"2019-07-20 02:39:51.974 UTC [gossip.discovery] sendMemResponse -> DEBU dc5 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc6 Obtaining identity" -"2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc7 Obtaining identity" -"2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc8 Obtaining identity" -"2019-07-20 02:39:51.974 UTC [gossip.comm] Send -> DEBU dc9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:51.974 UTC [gossip.discovery] sendMemResponse -> DEBU dca Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" > alive: alive: alive: " -"2019-07-20 02:39:51.975 UTC [gossip.comm] sendToEndpoint -> DEBU dcb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes" -"2019-07-20 02:39:51.975 UTC [gossip.comm] sendToEndpoint -> DEBU dcc Exiting" -"2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dcd Exiting" -"2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dce Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:51.975 UTC [gossip.pull] HandleMessage -> DEBU dcf GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd0 Obtaining identity" -"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd1 Obtaining identity" -"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd2 Obtaining identity" -"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd3 Obtaining identity" -"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd4 Obtaining identity" -"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd5 Obtaining identity" -"2019-07-20 02:39:51.975 UTC [gossip.pull] SendDigest -> DEBU dd6 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dd7 Exiting" -"2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dd8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:51.977 UTC [gossip.discovery] handleMsgFromComm -> DEBU dd9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:51.977 UTC [gossip.gossip] ValidateAliveMsg -> DEBU dda Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:39:51.977 UTC [msp] DeserializeIdentity -> DEBU ddb Obtaining identity" -"2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ddc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ddd Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU dde Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU ddf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU de0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU de1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:51.979 UTC [cauthdsl] func1 -> DEBU de2 0xc0006bbb60 gate 1563590391979879400 evaluation starts" -"2019-07-20 02:39:51.979 UTC [cauthdsl] func2 -> DEBU de3 0xc0006bbb60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:51.979 UTC [cauthdsl] func2 -> DEBU de4 0xc0006bbb60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU de5 0xc0006bbb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU de6 0xc0006bbb60 principal evaluation fails" -"2019-07-20 02:39:51.980 UTC [cauthdsl] func1 -> DEBU de7 0xc0006bbb60 gate 1563590391979879400 evaluation fails" -"2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU de8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU de9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU dea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:51.980 UTC [cauthdsl] func1 -> DEBU deb 0xc0007323a0 gate 1563590391980879800 evaluation starts" -"2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU dec 0xc0007323a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU ded 0xc0007323a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU dee 0xc0007323a0 principal matched by identity 0" -"2019-07-20 02:39:51.981 UTC [msp.identity] Verify -> DEBU def Verify: digest = 00000000 46 20 41 cc 8d 58 2c 2b 0f 57 ff f2 22 90 f5 5f |F A..X,+.W..".._| -00000010 bc ce 6d 92 64 45 bd 5a 06 5a 03 b3 ad a9 94 81 |..m.dE.Z.Z......|" -"2019-07-20 02:39:51.981 UTC [msp.identity] Verify -> DEBU df0 Verify: sig = 00000000 30 44 02 20 0e cf c9 77 85 5f 4d 3d 6d 04 af 83 |0D. ...w._M=m...| -00000010 9b 19 c0 51 38 19 6a ee a8 70 f3 6c 64 29 c2 52 |...Q8.j..p.ld).R| -00000020 30 df 6e 4f 02 20 0b 19 89 11 de db 6f 04 b7 5f |0.nO. ......o.._| -00000030 00 ae d2 67 e7 1f 76 d9 e0 ae 82 ab c9 2a 4a 46 |...g..v......*JF| -00000040 7a 3d 72 97 6b c2 |z=r.k.|" -"2019-07-20 02:39:51.982 UTC [cauthdsl] func2 -> DEBU df1 0xc0007323a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:51.982 UTC [cauthdsl] func1 -> DEBU df2 0xc0007323a0 gate 1563590391980879800 evaluation succeeds" -"2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df5 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df8 endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" lastAliveTS: 1563590371938894800, 22 but got ts: inc_num:1563590371938894800 seq_num:21 " -"2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df9 Exiting" -"2019-07-20 02:39:51.982 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfa Exiting" -"2019-07-20 02:39:51.983 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:51.983 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfc Exiting" -"2019-07-20 02:39:51.983 UTC [gossip.gossip] handleMessage -> DEBU dfd Exiting" -"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU dfe Obtaining identity" -"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU dff Obtaining identity" -"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e00 Obtaining identity" -"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e01 Obtaining identity" -"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e02 Obtaining identity" -"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e03 Obtaining identity" -"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e04 Obtaining identity" -"2019-07-20 02:39:51.993 UTC [gossip.comm] Send -> DEBU e05 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e06 Obtaining identity" -"2019-07-20 02:39:51.993 UTC [gossip.comm] Send -> DEBU e07 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e08 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e09 Exiting" -"2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e0a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e0b Exiting" -"2019-07-20 02:39:52.265 UTC [msp] GetDefaultSigningIdentity -> DEBU e0c Obtaining default signing identity" -"2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e0d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151012 " -"2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e0e Sign: digest: 15EC745CBC671F78A19C4207B9A2F43A526D8229FE508D1D60C1F4E245B3FB39 " -"2019-07-20 02:39:52.266 UTC [msp] GetDefaultSigningIdentity -> DEBU e0f Obtaining default signing identity" -"2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e10 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e11 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:52.266 UTC [gossip.discovery] periodicalSendAlive -> DEBU e12 Sleeping 5s" -"2019-07-20 02:39:52.269 UTC [msp] DeserializeIdentity -> DEBU e13 Obtaining identity" -"2019-07-20 02:39:52.269 UTC [msp] DeserializeIdentity -> DEBU e14 Obtaining identity" -"2019-07-20 02:39:52.270 UTC [msp] DeserializeIdentity -> DEBU e15 Obtaining identity" -"2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e16 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e17 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:52.270 UTC [msp] DeserializeIdentity -> DEBU e18 Obtaining identity" -"2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e19 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1b Exiting" -"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1d Exiting" -"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1f Exiting" -"2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e20 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e22 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e23 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e24 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e25 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e26 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e27 Exiting" -"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e28 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e29 Exiting" -"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e2a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e2b Exiting" -"2019-07-20 02:39:52.273 UTC [gossip.comm] func1 -> DEBU e2c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.273 UTC [gossip.gossip] handleMessage -> DEBU e2d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.273 UTC [gossip.pull] HandleMessage -> DEBU e2e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.273 UTC [gossip.gossip] handleMessage -> DEBU e2f Exiting" -"2019-07-20 02:39:52.274 UTC [gossip.comm] func1 -> DEBU e30 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.274 UTC [gossip.gossip] handleMessage -> DEBU e31 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.274 UTC [gossip.pull] HandleMessage -> DEBU e32 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.274 UTC [gossip.gossip] handleMessage -> DEBU e33 Exiting" -"2019-07-20 02:39:52.275 UTC [gossip.comm] func1 -> DEBU e34 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.275 UTC [gossip.gossip] handleMessage -> DEBU e35 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.275 UTC [gossip.pull] HandleMessage -> DEBU e36 GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.275 UTC [gossip.gossip] handleMessage -> DEBU e37 Exiting" -"2019-07-20 02:39:52.306 UTC [msp] GetDefaultSigningIdentity -> DEBU e38 Obtaining default signing identity" -"2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e39 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151013 " -"2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3a Sign: digest: 1BDA5E011B2CAD7F0981A1AD9ABD0D9AB25D2311F64929992AB2ABDE510006A5 " -"2019-07-20 02:39:52.306 UTC [msp] GetDefaultSigningIdentity -> DEBU e3b Obtaining default signing identity" -"2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:52.306 UTC [gossip.comm] Send -> DEBU e3e Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:52.306 UTC [msp] DeserializeIdentity -> DEBU e3f Obtaining identity" -"2019-07-20 02:39:52.306 UTC [gossip.comm] Send -> DEBU e40 Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:52.307 UTC [msp] DeserializeIdentity -> DEBU e41 Obtaining identity" -"2019-07-20 02:39:52.307 UTC [gossip.comm] Send -> DEBU e42 Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e43 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e44 Exiting" -"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e45 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e46 Exiting" -"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e47 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e48 Exiting" -"2019-07-20 02:39:52.308 UTC [gossip.comm] func1 -> DEBU e49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.308 UTC [gossip.gossip] handleMessage -> DEBU e4a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.309 UTC [gossip.gossip] handleMessage -> DEBU e4b Exiting" -"2019-07-20 02:39:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU e4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e4d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e4e Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| -00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" -"2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e4f Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| -00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| -00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| -00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| -00000040 3a 67 bb 3e 5f a1 |:g.>_.|" -"2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e50 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e51 Verify: sig = 00000000 30 44 02 20 03 d0 6b a7 fc 1b d2 38 6b 11 c8 13 |0D. ..k....8k...| -00000010 2c b4 57 a4 10 59 d3 da a5 30 c8 76 05 4a 82 eb |,.W..Y...0.v.J..| -00000020 d8 2b 80 77 02 20 57 45 64 35 11 d8 a8 70 21 96 |.+.w. WEd5...p!.| -00000030 ae 88 80 6c c9 16 bb 3a c7 71 1b c2 07 ce 60 80 |...l...:.q....`.| -00000040 40 d7 8a 33 0f 7f |@..3..|" -"2019-07-20 02:39:52.309 UTC [gossip.discovery] handleAliveMessage -> DEBU e52 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:52.309 UTC [gossip.discovery] isSentByMe -> DEBU e53 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:52.309 UTC [gossip.discovery] handleAliveMessage -> DEBU e54 Exiting" -"2019-07-20 02:39:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU e55 Exiting" -"2019-07-20 02:39:52.310 UTC [gossip.comm] func1 -> DEBU e56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.310 UTC [gossip.gossip] handleMessage -> DEBU e57 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.310 UTC [gossip.gossip] handleMessage -> DEBU e58 Exiting" -"2019-07-20 02:39:52.310 UTC [gossip.discovery] handleMsgFromComm -> DEBU e59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e5a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:52.311 UTC [msp.identity] Verify -> DEBU e5b Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| -00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" -"2019-07-20 02:39:52.311 UTC [msp.identity] Verify -> DEBU e5c Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| -00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| -00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| -00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| -00000040 3a 67 bb 3e 5f a1 |:g.>_.|" -"2019-07-20 02:39:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU e5d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.311 UTC [gossip.discovery] isSentByMe -> DEBU e5e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU e5f Exiting" -"2019-07-20 02:39:52.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e60 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:39:52.311 UTC [msp] DeserializeIdentity -> DEBU e61 Obtaining identity" -"2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e63 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e64 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e65 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e66 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e68 0xc00296ef30 gate 1563590392311707800 evaluation starts" -"2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e69 0xc00296ef30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6a 0xc00296ef30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6b 0xc00296ef30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6c 0xc00296ef30 principal evaluation fails" -"2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e6d 0xc00296ef30 gate 1563590392311707800 evaluation fails" -"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e6e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e71 0xc00296f790 gate 1563590392311977800 evaluation starts" -"2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e72 0xc00296f790 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e73 0xc00296f790 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e74 0xc00296f790 principal matched by identity 0" -"2019-07-20 02:39:52.312 UTC [msp.identity] Verify -> DEBU e75 Verify: digest = 00000000 d6 2f 09 2d ad 6d 35 46 ef 78 7f 01 4b 0a 64 8f |./.-.m5F.x..K.d.| -00000010 9f f9 82 5c 30 f3 ec 10 d1 1f ff e0 65 33 67 99 |...\0.......e3g.|" -"2019-07-20 02:39:52.312 UTC [msp.identity] Verify -> DEBU e76 Verify: sig = 00000000 30 43 02 20 70 69 80 5a d5 34 0d b5 26 14 03 10 |0C. pi.Z.4..&...| -00000010 fb 41 16 50 4f 1f b4 ef 20 e7 09 ec c4 47 0a d2 |.A.PO... ....G..| -00000020 25 f4 2f b3 02 1f 78 22 08 c9 cf fd 7b 28 d6 20 |%./...x"....{(. | -00000030 c6 5b 85 e1 a8 08 52 47 d6 21 31 13 1e e1 e1 8e |.[....RG.!1.....| -00000040 32 48 30 50 b8 |2H0P.|" -"2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e77 0xc00296f790 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:52.312 UTC [cauthdsl] func1 -> DEBU e78 0xc00296f790 gate 1563590392311977800 evaluation succeeds" -"2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e79 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7b Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:52.312 UTC [gossip.discovery] handleAliveMessage -> DEBU e7d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" -"2019-07-20 02:39:52.312 UTC [gossip.discovery] handleAliveMessage -> DEBU e7e Exiting" -"2019-07-20 02:39:52.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU e7f Exiting" -"2019-07-20 02:39:52.313 UTC [gossip.comm] func1 -> DEBU e80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.313 UTC [gossip.gossip] handleMessage -> DEBU e81 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.313 UTC [gossip.gossip] handleMessage -> DEBU e82 Exiting" -"2019-07-20 02:39:52.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU e83 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e84 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e85 Verify: digest = 00000000 c2 f5 97 4c 33 60 7a 9a ba 24 34 c7 47 2b f2 87 |...L3`z..$4.G+..| -00000010 5b eb d2 29 8c 5d a3 17 21 da c7 6e eb 26 41 c2 |[..).]..!..n.&A.|" -"2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e86 Verify: sig = 00000000 30 44 02 20 28 3f 67 32 36 59 d6 73 0d 34 83 bb |0D. (?g26Y.s.4..| -00000010 fa c7 21 82 14 81 c9 3b 8e af a9 c0 1f 11 34 43 |..!....;......4C| -00000020 24 1e f6 50 02 20 0e 15 e6 8b 57 da ce 0f e5 19 |$..P. ....W.....| -00000030 6a 7c 6b 21 aa 6b 16 48 e4 ac 51 9b e3 7d 41 4a |j|k!.k.H..Q..}AJ| -00000040 dc a4 f9 81 1a 32 |.....2|" -"2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e87 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e88 Exiting" -"2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e89 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e8a Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| -00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" -"2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e8b Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| -00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| -00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| -00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| -00000040 3a 67 bb 3e 5f a1 |:g.>_.|" -"2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e8c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.313 UTC [gossip.discovery] isSentByMe -> DEBU e8d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e8e Exiting" -"2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e8f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:39:52.314 UTC [msp] DeserializeIdentity -> DEBU e90 Obtaining identity" -"2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e92 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e93 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU e97 0xc002a63200 gate 1563590392314316100 evaluation starts" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e98 0xc002a63200 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e99 0xc002a63200 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e9a 0xc002a63200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e9b 0xc002a63200 principal evaluation fails" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU e9c 0xc002a63200 gate 1563590392314316100 evaluation fails" -"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU ea0 0xc002a63a40 gate 1563590392314593300 evaluation starts" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea1 0xc002a63a40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea2 0xc002a63a40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea3 0xc002a63a40 principal matched by identity 0" -"2019-07-20 02:39:52.314 UTC [msp.identity] Verify -> DEBU ea4 Verify: digest = 00000000 9a 8a 36 66 3a 44 53 60 48 d2 8f ad eb c3 a1 1e |..6f:DS`H.......| -00000010 c7 a1 8f 57 db 61 9d c1 af fd a0 0d 36 8c 83 e9 |...W.a......6...|" -"2019-07-20 02:39:52.314 UTC [msp.identity] Verify -> DEBU ea5 Verify: sig = 00000000 30 44 02 20 1a f4 32 3b ae 0e 0d 34 bb 01 06 1d |0D. ..2;...4....| -00000010 b2 bc e1 31 95 d9 71 54 41 b7 28 6e 00 8b 67 f1 |...1..qTA.(n..g.| -00000020 9e bd 75 00 02 20 18 ae a5 a6 57 d9 38 c9 79 91 |..u.. ....W.8.y.| -00000030 32 79 72 74 be a9 8e df ad 40 29 41 e3 cc 4f a5 |2yrt.....@)A..O.| -00000040 bd 87 29 80 ca a0 |..)...|" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea6 0xc002a63a40 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU ea7 0xc002a63a40 gate 1563590392314593300 evaluation succeeds" -"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU ea8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU ea9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU eaa Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU eab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU eac Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.315 UTC [gossip.discovery] handleAliveMessage -> DEBU ead Exiting" -"2019-07-20 02:39:52.315 UTC [gossip.discovery] handleMsgFromComm -> DEBU eae Exiting" -"2019-07-20 02:39:52.391 UTC [gossip.comm] func1 -> DEBU eaf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.391 UTC [gossip.gossip] handleMessage -> DEBU eb0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.391 UTC [gossip.gossip] handleMessage -> DEBU eb1 Exiting" -"2019-07-20 02:39:52.391 UTC [gossip.discovery] handleMsgFromComm -> DEBU eb2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.391 UTC [gossip.gossip] ValidateAliveMsg -> DEBU eb3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:52.392 UTC [msp.identity] Verify -> DEBU eb4 Verify: digest = 00000000 0d 0e 79 e2 c7 a0 b2 f4 86 a8 d7 59 c5 dd ce 25 |..y........Y...%| -00000010 73 3c bf d7 a7 af d9 2e 52 5b de cf 43 6a eb 96 |s<......R[..Cj..|" -"2019-07-20 02:39:52.392 UTC [msp.identity] Verify -> DEBU eb5 Verify: sig = 00000000 30 44 02 20 74 3e 42 0d ca 82 d8 7f e9 f7 f7 36 |0D. t>B........6| -00000010 73 e8 71 45 b1 d6 b4 e2 95 f6 7c 70 64 be a3 2b |s.qE......|pd..+| -00000020 b8 64 3d 00 02 20 10 16 37 52 19 4a 6c 6c c5 d5 |.d=.. ..7R.Jll..| -00000030 f3 fc 28 f9 ed 79 8c d1 07 97 71 da 9f 41 e3 d2 |..(..y....q..A..| -00000040 8c 20 f4 cc 9f e5 |. ....|" -"2019-07-20 02:39:52.392 UTC [gossip.discovery] handleAliveMessage -> DEBU eb6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb8 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb9 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eba Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU ebb Exiting" -"2019-07-20 02:39:52.392 UTC [gossip.discovery] handleAliveMessage -> DEBU ebc Exiting" -"2019-07-20 02:39:52.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU ebd Exiting" -"2019-07-20 02:39:52.394 UTC [gossip.comm] func1 -> DEBU ebe Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.394 UTC [gossip.comm] func1 -> DEBU ebf Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.394 UTC [gossip.gossip] handleMessage -> DEBU ec0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.395 UTC [gossip.pull] HandleMessage -> DEBU ec1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.395 UTC [gossip.pull] SendDigest -> DEBU ec2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:39:52.395 UTC [gossip.gossip] handleMessage -> DEBU ec3 Exiting" -"2019-07-20 02:39:52.396 UTC [gossip.gossip] handleMessage -> DEBU ec4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.396 UTC [gossip.gossip] handleMessage -> DEBU ec5 Exiting" -"2019-07-20 02:39:52.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU ec6 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ec7 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU ec8 Obtaining identity" -"2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU ec9 Obtaining identity" -"2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU eca Obtaining identity" -"2019-07-20 02:39:52.398 UTC [gossip.comm] Send -> DEBU ecb Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:52.398 UTC [msp] DeserializeIdentity -> DEBU ecc Obtaining identity" -"2019-07-20 02:39:52.398 UTC [gossip.comm] Send -> DEBU ecd Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ece Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ecf Exiting" -"2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ed0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ed1 Exiting" -"2019-07-20 02:39:52.401 UTC [gossip.comm] func1 -> DEBU ed2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.401 UTC [gossip.gossip] handleMessage -> DEBU ed3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.401 UTC [msp.identity] Verify -> DEBU ed4 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| -00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" -"2019-07-20 02:39:52.401 UTC [msp.identity] Verify -> DEBU ed5 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| -00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| -00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| -00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| -00000040 77 5f b8 b7 06 c1 |w_....|" -"2019-07-20 02:39:52.402 UTC [msp.identity] Verify -> DEBU ed6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:39:52.402 UTC [msp.identity] Verify -> DEBU ed7 Verify: sig = 00000000 30 44 02 20 50 d8 3b 18 9a 9e c0 8a aa f3 df 03 |0D. P.;.........| -00000010 c8 ce 20 d0 e5 43 96 93 79 64 50 6b 2d 04 29 d3 |.. ..C..ydPk-.).| -00000020 79 c1 8f c8 02 20 53 87 e9 bf 2f 79 d1 10 ea c0 |y.... S.../y....| -00000030 19 58 40 c3 d7 61 06 5a f9 77 66 b7 96 3d 57 c8 |.X@..a.Z.wf..=W.| -00000040 dd 94 b9 6b 70 ac |...kp.|" -"2019-07-20 02:39:52.403 UTC [gossip.discovery] handleAliveMessage -> DEBU ed8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:52.403 UTC [gossip.discovery] learnExistingMembers -> DEBU ed9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:39:52.403 UTC [gossip.discovery] learnExistingMembers -> DEBU eda updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edc Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edd Exiting" -"2019-07-20 02:39:52.404 UTC [gossip.discovery] handleAliveMessage -> DEBU ede Exiting" -"2019-07-20 02:39:52.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU edf Exiting" -"2019-07-20 02:39:52.405 UTC [gossip.discovery] sendMemResponse -> DEBU ee0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:39:52.405 UTC [msp] DeserializeIdentity -> DEBU ee1 Obtaining identity" -"2019-07-20 02:39:52.405 UTC [msp] DeserializeIdentity -> DEBU ee2 Obtaining identity" -"2019-07-20 02:39:52.405 UTC [gossip.comm] Send -> DEBU ee3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:52.405 UTC [gossip.discovery] sendMemResponse -> DEBU ee4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " -"2019-07-20 02:39:52.405 UTC [gossip.comm] sendToEndpoint -> DEBU ee5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.405 UTC [gossip.comm] sendToEndpoint -> DEBU ee6 Exiting" -"2019-07-20 02:39:52.406 UTC [gossip.gossip] handleMessage -> DEBU ee7 Exiting" -"2019-07-20 02:39:52.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU ee8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:52.406 UTC [gossip.discovery] handleMsgFromComm -> DEBU ee9 Exiting" -"2019-07-20 02:39:52.575 UTC [gossip.comm] func1 -> DEBU eea Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.575 UTC [gossip.gossip] handleMessage -> DEBU eeb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.575 UTC [gossip.pull] HandleMessage -> DEBU eec GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eed Obtaining identity" -"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eee Obtaining identity" -"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eef Obtaining identity" -"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef0 Obtaining identity" -"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef1 Obtaining identity" -"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef2 Obtaining identity" -"2019-07-20 02:39:52.575 UTC [gossip.pull] SendDigest -> DEBU ef3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:39:52.575 UTC [gossip.gossip] handleMessage -> DEBU ef4 Exiting" -"2019-07-20 02:39:52.578 UTC [gossip.comm] func1 -> DEBU ef5 Got message: GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.580 UTC [gossip.gossip] handleMessage -> DEBU ef6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.580 UTC [gossip.gossip] handleMessage -> DEBU ef7 Exiting" -"2019-07-20 02:39:52.580 UTC [gossip.discovery] handleMsgFromComm -> DEBU ef8 Got message: GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.581 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ef9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:39:52.581 UTC [msp] DeserializeIdentity -> DEBU efa Obtaining identity" -"2019-07-20 02:39:52.581 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU efb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:52.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU efc Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU efd Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.583 UTC [policies] Evaluate -> DEBU efe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:52.583 UTC [policies] Evaluate -> DEBU eff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:52.584 UTC [policies] Evaluate -> DEBU f00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:52.584 UTC [cauthdsl] func1 -> DEBU f01 0xc002f5ce70 gate 1563590392584287700 evaluation starts" -"2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f02 0xc002f5ce70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f03 0xc002f5ce70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f04 0xc002f5ce70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:52.585 UTC [cauthdsl] func2 -> DEBU f05 0xc002f5ce70 principal evaluation fails" -"2019-07-20 02:39:52.585 UTC [cauthdsl] func1 -> DEBU f06 0xc002f5ce70 gate 1563590392584287700 evaluation fails" -"2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f07 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:52.586 UTC [cauthdsl] func1 -> DEBU f0a 0xc002f5d6b0 gate 1563590392586054100 evaluation starts" -"2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0b 0xc002f5d6b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0c 0xc002f5d6b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0d 0xc002f5d6b0 principal matched by identity 0" -"2019-07-20 02:39:52.587 UTC [msp.identity] Verify -> DEBU f0e Verify: digest = 00000000 4a 76 46 0b 4f 2a e4 ff 21 78 d0 85 80 ae eb 74 |JvF.O*..!x.....t| -00000010 5d 30 24 cc c9 9f 4f ca b6 de ec f2 1f a5 ec 97 |]0$...O.........|" -"2019-07-20 02:39:52.587 UTC [msp.identity] Verify -> DEBU f0f Verify: sig = 00000000 30 45 02 21 00 eb 3e 8d 69 89 0c d8 8f f7 5a 50 |0E.!..>.i.....ZP| -00000010 a9 cd 60 cd 06 bb 63 ee f8 40 18 62 d9 6b 8f df |..`...c..@.b.k..| -00000020 a2 0b 90 a6 4b 02 20 79 3e c8 74 e2 42 e5 32 7b |....K. y>.t.B.2{| -00000030 ca 14 da 23 9d 93 28 fe e9 d2 0e f1 be 15 47 61 |...#..(.......Ga| -00000040 6e d8 65 dc d7 b6 e9 |n.e....|" -"2019-07-20 02:39:52.588 UTC [cauthdsl] func2 -> DEBU f10 0xc002f5d6b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:52.588 UTC [cauthdsl] func1 -> DEBU f11 0xc002f5d6b0 gate 1563590392586054100 evaluation succeeds" -"2019-07-20 02:39:52.588 UTC [policies] Evaluate -> DEBU f12 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f14 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:52.591 UTC [gossip.discovery] handleAliveMessage -> DEBU f16 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.591 UTC [gossip.discovery] learnExistingMembers -> DEBU f17 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f18 updating membership: timestamp: " -"2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f19 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f1a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership" -"2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f1b Exiting" -"2019-07-20 02:39:52.593 UTC [gossip.discovery] handleAliveMessage -> DEBU f1c Exiting" -"2019-07-20 02:39:52.593 UTC [gossip.discovery] handleMsgFromComm -> DEBU f1d Exiting" -"2019-07-20 02:39:52.593 UTC [gossip.discovery] sendMemResponse -> DEBU f1e Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:39:52.594 UTC [msp] DeserializeIdentity -> DEBU f20 Obtaining identity" -"2019-07-20 02:39:52.595 UTC [msp] DeserializeIdentity -> DEBU f21 Obtaining identity" -"2019-07-20 02:39:52.594 UTC [gossip.comm] func1 -> DEBU f1f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.595 UTC [msp] DeserializeIdentity -> DEBU f22 Obtaining identity" -"2019-07-20 02:39:52.597 UTC [gossip.comm] Send -> DEBU f24 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:52.596 UTC [gossip.gossip] handleMessage -> DEBU f23 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.597 UTC [gossip.gossip] handleMessage -> DEBU f25 Exiting" -"2019-07-20 02:39:52.597 UTC [gossip.discovery] handleMsgFromComm -> DEBU f26 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.597 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f27 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:39:52.597 UTC [msp] DeserializeIdentity -> DEBU f28 Obtaining identity" -"2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f2a Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f2b Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f2f 0xc002ed18e0 gate 1563590392598463400 evaluation starts" -"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f30 0xc002ed18e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f31 0xc002ed18e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f32 0xc002ed18e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f33 0xc002ed18e0 principal evaluation fails" -"2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f34 0xc002ed18e0 gate 1563590392598463400 evaluation fails" -"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f35 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f38 0xc002fe8120 gate 1563590392598798900 evaluation starts" -"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f39 0xc002fe8120 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f3a 0xc002fe8120 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f3b 0xc002fe8120 principal matched by identity 0" -"2019-07-20 02:39:52.598 UTC [msp.identity] Verify -> DEBU f3c Verify: digest = 00000000 79 30 40 ed d1 f8 6d 03 2e bd d1 77 c6 b7 c6 b2 |y0@...m....w....| -00000010 1b 08 d9 26 3d f2 fb bc 4c 2c 97 63 16 3b 0d 13 |...&=...L,.c.;..|" -"2019-07-20 02:39:52.599 UTC [msp.identity] Verify -> DEBU f3d Verify: sig = 00000000 30 45 02 21 00 a6 80 c1 dd 5d 72 85 0a a3 ec e4 |0E.!.....]r.....| -00000010 cb cb b6 ad 02 4e c7 8d c4 de 48 ee 3c 53 98 f3 |.....N....H. DEBU f3e 0xc002fe8120 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:52.599 UTC [cauthdsl] func1 -> DEBU f3f 0xc002fe8120 gate 1563590392598798900 evaluation succeeds" -"2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f40 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f42 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f44 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f45 endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1563590372570532900, 20 but got ts: inc_num:1563590372570532900 seq_num:19 " -"2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f46 Exiting" -"2019-07-20 02:39:52.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU f47 Exiting" -"2019-07-20 02:39:52.599 UTC [gossip.comm] sendToEndpoint -> DEBU f48 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.599 UTC [gossip.comm] sendToEndpoint -> DEBU f49 Exiting" -"2019-07-20 02:39:52.600 UTC [gossip.comm] func1 -> DEBU f4a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.600 UTC [gossip.gossip] handleMessage -> DEBU f4b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.600 UTC [gossip.gossip] handleMessage -> DEBU f4c Exiting" -"2019-07-20 02:39:52.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU f4d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU f4e Exiting" -"2019-07-20 02:39:52.601 UTC [gossip.discovery] sendMemResponse -> DEBU f4f Exiting, replying with alive:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " -"2019-07-20 02:39:52.601 UTC [gossip.comm] func1 -> DEBU f50 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.603 UTC [gossip.gossip] handleMessage -> DEBU f51 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.603 UTC [gossip.gossip] handleMessage -> DEBU f52 Exiting" -"2019-07-20 02:39:52.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU f53 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU f54 Exiting" -"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f55 Obtaining identity" -"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f56 Obtaining identity" -"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f57 Obtaining identity" -"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f58 Obtaining identity" -"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f59 Obtaining identity" -"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5a Obtaining identity" -"2019-07-20 02:39:52.607 UTC [gossip.comm] Send -> DEBU f5b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5c Obtaining identity" -"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5d Obtaining identity" -"2019-07-20 02:39:52.607 UTC [gossip.comm] Send -> DEBU f5e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f5f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f60 Exiting" -"2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f61 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f62 Exiting" -"2019-07-20 02:39:52.752 UTC [msp] DeserializeIdentity -> DEBU f63 Obtaining identity" -"2019-07-20 02:39:52.752 UTC [msp] DeserializeIdentity -> DEBU f64 Obtaining identity" -"2019-07-20 02:39:52.752 UTC [gossip.comm] Send -> DEBU f65 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:39:52.752 UTC [gossip.comm] sendToEndpoint -> DEBU f66 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.752 UTC [gossip.comm] sendToEndpoint -> DEBU f67 Exiting" -"2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f68 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f69 Exiting" -"2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f6a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f6b Exiting" -"2019-07-20 02:39:52.754 UTC [gossip.comm] func1 -> DEBU f6c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.754 UTC [gossip.gossip] handleMessage -> DEBU f6e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f6f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f70 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f71 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f72 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:39:52.756 UTC [gossip.comm] func1 -> DEBU f73 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.756 UTC [msp] DeserializeIdentity -> DEBU f74 Obtaining identity" -"2019-07-20 02:39:52.754 UTC [gossip.comm] func1 -> DEBU f6d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.756 UTC [msp] DeserializeIdentity -> DEBU f75 Obtaining identity" -"2019-07-20 02:39:52.757 UTC [msp] DeserializeIdentity -> DEBU f76 Obtaining identity" -"2019-07-20 02:39:52.757 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f77 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:52.758 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f79 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.757 UTC [msp] DeserializeIdentity -> DEBU f78 Obtaining identity" -"2019-07-20 02:39:52.758 UTC [gossip.pull] Hello -> DEBU f7a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:39:52.758 UTC [msp] DeserializeIdentity -> DEBU f7b Obtaining identity" -"2019-07-20 02:39:52.759 UTC [msp] DeserializeIdentity -> DEBU f7c Obtaining identity" -"2019-07-20 02:39:52.759 UTC [gossip.comm] Send -> DEBU f7d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU f7e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU f7f Exiting" -"2019-07-20 02:39:52.760 UTC [gossip.comm] func1 -> DEBU f80 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.762 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f81 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.762 UTC [policies] Evaluate -> DEBU f82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:52.763 UTC [policies] Evaluate -> DEBU f83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:52.763 UTC [policies] Evaluate -> DEBU f84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:52.763 UTC [cauthdsl] func1 -> DEBU f85 0xc003081170 gate 1563590392763909000 evaluation starts" -"2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f86 0xc003081170 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f87 0xc003081170 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f88 0xc003081170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f89 0xc003081170 principal evaluation fails" -"2019-07-20 02:39:52.765 UTC [cauthdsl] func1 -> DEBU f8a 0xc003081170 gate 1563590392763909000 evaluation fails" -"2019-07-20 02:39:52.765 UTC [policies] Evaluate -> DEBU f8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.766 UTC [policies] Evaluate -> DEBU f8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.766 UTC [policies] Evaluate -> DEBU f8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:52.767 UTC [cauthdsl] func1 -> DEBU f8e 0xc0030819c0 gate 1563590392767199700 evaluation starts" -"2019-07-20 02:39:52.767 UTC [cauthdsl] func2 -> DEBU f8f 0xc0030819c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.768 UTC [cauthdsl] func2 -> DEBU f90 0xc0030819c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.768 UTC [cauthdsl] func2 -> DEBU f91 0xc0030819c0 principal matched by identity 0" -"2019-07-20 02:39:52.769 UTC [msp.identity] Verify -> DEBU f92 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:39:52.769 UTC [msp.identity] Verify -> DEBU f93 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:39:52.770 UTC [cauthdsl] func2 -> DEBU f94 0xc0030819c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:52.770 UTC [cauthdsl] func1 -> DEBU f95 0xc0030819c0 gate 1563590392767199700 evaluation succeeds" -"2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f98 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:52.771 UTC [policies] Evaluate -> DEBU f99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:52.771 UTC [gossip.gossip] handleMessage -> DEBU f9a Exiting" -"2019-07-20 02:39:52.771 UTC [gossip.gossip] handleMessage -> DEBU f9b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.771 UTC [msp] DeserializeIdentity -> DEBU f9c Obtaining identity" -"2019-07-20 02:39:52.772 UTC [msp] DeserializeIdentity -> DEBU f9d Obtaining identity" -"2019-07-20 02:39:52.772 UTC [msp] DeserializeIdentity -> DEBU f9e Obtaining identity" -"2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f9f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.773 UTC [policies] Evaluate -> DEBU fa2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:52.773 UTC [policies] Evaluate -> DEBU fa3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:52.774 UTC [policies] Evaluate -> DEBU fa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:52.774 UTC [cauthdsl] func1 -> DEBU fa5 0xc0030c34d0 gate 1563590392774506200 evaluation starts" -"2019-07-20 02:39:52.774 UTC [cauthdsl] func2 -> DEBU fa6 0xc0030c34d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa7 0xc0030c34d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa8 0xc0030c34d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa9 0xc0030c34d0 principal evaluation fails" -"2019-07-20 02:39:52.775 UTC [cauthdsl] func1 -> DEBU faa 0xc0030c34d0 gate 1563590392774506200 evaluation fails" -"2019-07-20 02:39:52.775 UTC [policies] Evaluate -> DEBU fab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.776 UTC [policies] Evaluate -> DEBU fac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.776 UTC [policies] Evaluate -> DEBU fad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:52.777 UTC [cauthdsl] func1 -> DEBU fae 0xc0030c3d10 gate 1563590392776932500 evaluation starts" -"2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU faf 0xc0030c3d10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU fb0 0xc0030c3d10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU fb1 0xc0030c3d10 principal matched by identity 0" -"2019-07-20 02:39:52.778 UTC [msp.identity] Verify -> DEBU fb2 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:39:52.778 UTC [msp.identity] Verify -> DEBU fb3 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:39:52.778 UTC [cauthdsl] func2 -> DEBU fb4 0xc0030c3d10 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:52.778 UTC [cauthdsl] func1 -> DEBU fb5 0xc0030c3d10 gate 1563590392776932500 evaluation succeeds" -"2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb8 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fba Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fbb Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fbc Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:39:52.783 UTC [msp.identity] Verify -> DEBU fbd Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:39:52.783 UTC [msp] DeserializeIdentity -> DEBU fbe Obtaining identity" -"2019-07-20 02:39:52.784 UTC [msp] DeserializeIdentity -> DEBU fbf Obtaining identity" -"2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fc0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fc1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fc2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.784 UTC [policies] Evaluate -> DEBU fc3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:52.785 UTC [policies] Evaluate -> DEBU fc4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:52.785 UTC [policies] Evaluate -> DEBU fc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:52.785 UTC [cauthdsl] func1 -> DEBU fc6 0xc0030f2380 gate 1563590392785406500 evaluation starts" -"2019-07-20 02:39:52.785 UTC [cauthdsl] func2 -> DEBU fc7 0xc0030f2380 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.785 UTC [cauthdsl] func2 -> DEBU fc8 0xc0030f2380 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.786 UTC [cauthdsl] func2 -> DEBU fc9 0xc0030f2380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:52.787 UTC [cauthdsl] func2 -> DEBU fca 0xc0030f2380 principal evaluation fails" -"2019-07-20 02:39:52.787 UTC [cauthdsl] func1 -> DEBU fcb 0xc0030f2380 gate 1563590392785406500 evaluation fails" -"2019-07-20 02:39:52.787 UTC [policies] Evaluate -> DEBU fcc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.787 UTC [policies] Evaluate -> DEBU fcd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.788 UTC [policies] Evaluate -> DEBU fce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:52.788 UTC [cauthdsl] func1 -> DEBU fcf 0xc0030f2bc0 gate 1563590392788342800 evaluation starts" -"2019-07-20 02:39:52.788 UTC [cauthdsl] func2 -> DEBU fd0 0xc0030f2bc0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.788 UTC [cauthdsl] func2 -> DEBU fd1 0xc0030f2bc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.789 UTC [cauthdsl] func2 -> DEBU fd2 0xc0030f2bc0 principal matched by identity 0" -"2019-07-20 02:39:52.789 UTC [msp.identity] Verify -> DEBU fd3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:39:52.789 UTC [msp.identity] Verify -> DEBU fd4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:39:52.789 UTC [cauthdsl] func2 -> DEBU fd5 0xc0030f2bc0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:52.790 UTC [cauthdsl] func1 -> DEBU fd6 0xc0030f2bc0 gate 1563590392788342800 evaluation succeeds" -"2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd9 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fda == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:52.791 UTC [gossip.gossip] handleMessage -> DEBU fdb Exiting" -"2019-07-20 02:39:52.791 UTC [gossip.gossip] handleMessage -> DEBU fdc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.791 UTC [msp] DeserializeIdentity -> DEBU fdd Obtaining identity" -"2019-07-20 02:39:52.791 UTC [msp] DeserializeIdentity -> DEBU fde Obtaining identity" -"2019-07-20 02:39:52.792 UTC [msp] DeserializeIdentity -> DEBU fdf Obtaining identity" -"2019-07-20 02:39:52.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fe0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:52.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:52.798 UTC [cauthdsl] func1 -> DEBU fe6 0xc003116730 gate 1563590392797928400 evaluation starts" -"2019-07-20 02:39:52.798 UTC [cauthdsl] func2 -> DEBU fe7 0xc003116730 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.798 UTC [cauthdsl] func2 -> DEBU fe8 0xc003116730 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.799 UTC [cauthdsl] func2 -> DEBU fe9 0xc003116730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:52.799 UTC [cauthdsl] func2 -> DEBU fea 0xc003116730 principal evaluation fails" -"2019-07-20 02:39:52.799 UTC [cauthdsl] func1 -> DEBU feb 0xc003116730 gate 1563590392797928400 evaluation fails" -"2019-07-20 02:39:52.799 UTC [policies] Evaluate -> DEBU fec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.799 UTC [policies] Evaluate -> DEBU fed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.800 UTC [policies] Evaluate -> DEBU fee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:52.800 UTC [cauthdsl] func1 -> DEBU fef 0xc003117090 gate 1563590392800302800 evaluation starts" -"2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff0 0xc003117090 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff1 0xc003117090 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff2 0xc003117090 principal matched by identity 0" -"2019-07-20 02:39:52.801 UTC [msp.identity] Verify -> DEBU ff3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:39:52.801 UTC [msp.identity] Verify -> DEBU ff4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:39:52.801 UTC [cauthdsl] func2 -> DEBU ff5 0xc003117090 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:52.801 UTC [cauthdsl] func1 -> DEBU ff6 0xc003117090 gate 1563590392800302800 evaluation succeeds" -"2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff9 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ffa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:52.803 UTC [msp.identity] Verify -> DEBU ffb Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:39:52.803 UTC [msp.identity] Verify -> DEBU ffc Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:39:52.803 UTC [msp] DeserializeIdentity -> DEBU ffd Obtaining identity" -"2019-07-20 02:39:52.804 UTC [msp] DeserializeIdentity -> DEBU ffe Obtaining identity" -"2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1000 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1001 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1002 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1003 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1004 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:52.805 UTC [cauthdsl] func1 -> DEBU 1005 0xc003125150 gate 1563590392805720700 evaluation starts" -"2019-07-20 02:39:52.805 UTC [cauthdsl] func2 -> DEBU 1006 0xc003125150 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1007 0xc003125150 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1008 0xc003125150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1009 0xc003125150 principal evaluation fails" -"2019-07-20 02:39:52.807 UTC [cauthdsl] func1 -> DEBU 100a 0xc003125150 gate 1563590392805720700 evaluation fails" -"2019-07-20 02:39:52.807 UTC [policies] Evaluate -> DEBU 100b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.807 UTC [policies] Evaluate -> DEBU 100c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:52.808 UTC [policies] Evaluate -> DEBU 100d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:52.808 UTC [cauthdsl] func1 -> DEBU 100e 0xc003125b00 gate 1563590392808304900 evaluation starts" -"2019-07-20 02:39:52.808 UTC [cauthdsl] func2 -> DEBU 100f 0xc003125b00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:52.808 UTC [cauthdsl] func2 -> DEBU 1010 0xc003125b00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:52.809 UTC [cauthdsl] func2 -> DEBU 1011 0xc003125b00 principal matched by identity 0" -"2019-07-20 02:39:52.809 UTC [msp.identity] Verify -> DEBU 1012 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:39:52.809 UTC [msp.identity] Verify -> DEBU 1013 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:39:52.810 UTC [cauthdsl] func2 -> DEBU 1014 0xc003125b00 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:52.810 UTC [cauthdsl] func1 -> DEBU 1015 0xc003125b00 gate 1563590392808304900 evaluation succeeds" -"2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1016 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1018 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1019 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101a Exiting" -"2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.810 UTC [gossip.pull] HandleMessage -> DEBU 101c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101d Exiting" -"2019-07-20 02:39:52.912 UTC [gossip.comm] func1 -> DEBU 101e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.912 UTC [gossip.gossip] handleMessage -> DEBU 101f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.912 UTC [msp] DeserializeIdentity -> DEBU 1020 Obtaining identity" -"2019-07-20 02:39:52.912 UTC [msp] DeserializeIdentity -> DEBU 1021 Obtaining identity" -"2019-07-20 02:39:52.912 UTC [gossip.gossip] handleMessage -> DEBU 1022 Exiting" -"2019-07-20 02:39:52.928 UTC [gossip.comm] func1 -> DEBU 1023 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.928 UTC [gossip.gossip] handleMessage -> DEBU 1024 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.928 UTC [gossip.pull] HandleMessage -> DEBU 1025 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.928 UTC [gossip.pull] SendDigest -> DEBU 1026 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:39:52.928 UTC [gossip.gossip] handleMessage -> DEBU 1027 Exiting" -"2019-07-20 02:39:52.954 UTC [gossip.comm] func1 -> DEBU 1028 Got message: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.954 UTC [gossip.gossip] handleMessage -> DEBU 1029 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.955 UTC [gossip.pull] HandleMessage -> DEBU 102a GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" -"2019-07-20 02:39:52.955 UTC [msp] DeserializeIdentity -> DEBU 102b Obtaining identity" -"2019-07-20 02:39:52.955 UTC [gossip.gossip] handleMessage -> DEBU 102c Exiting" -"2019-07-20 02:39:52.956 UTC [gossip.pull] SendRes -> DEBU 102d Sending 1 IDENTITY_MSG items to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:39:53.077 UTC [gossip.comm] func1 -> DEBU 102e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:53.077 UTC [gossip.gossip] handleMessage -> DEBU 102f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:53.077 UTC [msp] DeserializeIdentity -> DEBU 1030 Obtaining identity" -"2019-07-20 02:39:53.078 UTC [msp] DeserializeIdentity -> DEBU 1031 Obtaining identity" -"2019-07-20 02:39:53.078 UTC [msp] DeserializeIdentity -> DEBU 1032 Obtaining identity" -"2019-07-20 02:39:53.078 UTC [gossip.gossip] handleMessage -> DEBU 1033 Exiting" -"2019-07-20 02:39:53.216 UTC [gossip.comm] func1 -> DEBU 1034 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:53.217 UTC [gossip.gossip] handleMessage -> DEBU 1035 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1036 Obtaining identity" -"2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1037 Obtaining identity" -"2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1038 Obtaining identity" -"2019-07-20 02:39:53.219 UTC [gossip.gossip] handleMessage -> DEBU 1039 Exiting" -"2019-07-20 02:39:55.948 UTC [gossip.comm] func1 -> DEBU 103a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:55.949 UTC [gossip.gossip] handleMessage -> DEBU 103b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:55.949 UTC [gossip.gossip] handleMessage -> DEBU 103c Exiting" -"2019-07-20 02:39:55.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:55.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 103e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:39:55.950 UTC [msp] DeserializeIdentity -> DEBU 103f Obtaining identity" -"2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1040 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1041 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1042 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:55.951 UTC [policies] Evaluate -> DEBU 1043 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:55.952 UTC [policies] Evaluate -> DEBU 1044 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:55.952 UTC [policies] Evaluate -> DEBU 1045 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:55.952 UTC [cauthdsl] func1 -> DEBU 1046 0xc0032a0750 gate 1563590395952479500 evaluation starts" -"2019-07-20 02:39:55.952 UTC [cauthdsl] func2 -> DEBU 1047 0xc0032a0750 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 1048 0xc0032a0750 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 1049 0xc0032a0750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 104a 0xc0032a0750 principal evaluation fails" -"2019-07-20 02:39:55.953 UTC [cauthdsl] func1 -> DEBU 104b 0xc0032a0750 gate 1563590395952479500 evaluation fails" -"2019-07-20 02:39:55.953 UTC [policies] Evaluate -> DEBU 104c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:55.954 UTC [policies] Evaluate -> DEBU 104d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:55.954 UTC [policies] Evaluate -> DEBU 104e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:55.955 UTC [cauthdsl] func1 -> DEBU 1050 0xc0032a0f90 gate 1563590395955130100 evaluation starts" -"2019-07-20 02:39:55.955 UTC [cauthdsl] func2 -> DEBU 1051 0xc0032a0f90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:55.954 UTC [gossip.comm] func1 -> DEBU 104f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:55.955 UTC [gossip.gossip] handleMessage -> DEBU 1052 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:55.956 UTC [gossip.pull] HandleMessage -> DEBU 1053 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1054 Obtaining identity" -"2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1055 Obtaining identity" -"2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1056 Obtaining identity" -"2019-07-20 02:39:55.955 UTC [cauthdsl] func2 -> DEBU 1057 0xc0032a0f90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:55.957 UTC [cauthdsl] func2 -> DEBU 1059 0xc0032a0f90 principal matched by identity 0" -"2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1058 Obtaining identity" -"2019-07-20 02:39:55.957 UTC [msp] DeserializeIdentity -> DEBU 105a Obtaining identity" -"2019-07-20 02:39:55.957 UTC [msp] DeserializeIdentity -> DEBU 105b Obtaining identity" -"2019-07-20 02:39:55.957 UTC [gossip.pull] SendDigest -> DEBU 105c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:39:55.957 UTC [gossip.gossip] handleMessage -> DEBU 105d Exiting" -"2019-07-20 02:39:55.957 UTC [msp.identity] Verify -> DEBU 105e Verify: digest = 00000000 32 cd 79 69 26 bd f0 b6 fa 3d 9b 05 4c 4c 9f 63 |2.yi&....=..LL.c| -00000010 24 41 4d c3 5c 68 56 af ce 9f 1b c2 8a 17 de 69 |$AM.\hV........i|" -"2019-07-20 02:39:55.958 UTC [msp.identity] Verify -> DEBU 105f Verify: sig = 00000000 30 44 02 20 51 04 be fc db d6 de c6 b6 ae 09 47 |0D. Q..........G| -00000010 f4 3c 44 29 af 53 0d 4b 18 41 dd 7f 84 88 de 6d |. DEBU 1060 0xc0032a0f90 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:55.960 UTC [cauthdsl] func1 -> DEBU 1061 0xc0032a0f90 gate 1563590395955130100 evaluation succeeds" -"2019-07-20 02:39:55.960 UTC [policies] Evaluate -> DEBU 1062 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1063 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1064 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1065 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:55.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 1066 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:55.962 UTC [gossip.discovery] learnExistingMembers -> DEBU 1067 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:39:55.963 UTC [gossip.discovery] learnExistingMembers -> DEBU 1068 updating membership: timestamp: " -"2019-07-20 02:39:55.963 UTC [gossip.discovery] learnExistingMembers -> DEBU 1069 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:39:55.964 UTC [gossip.discovery] learnExistingMembers -> DEBU 106a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:55.964 UTC [gossip.discovery] learnExistingMembers -> DEBU 106b Exiting" -"2019-07-20 02:39:55.964 UTC [gossip.discovery] handleAliveMessage -> DEBU 106c Exiting" -"2019-07-20 02:39:55.965 UTC [gossip.discovery] handleMsgFromComm -> DEBU 106d Exiting" -"2019-07-20 02:39:55.965 UTC [gossip.discovery] sendMemResponse -> DEBU 106e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:39:55.966 UTC [msp] DeserializeIdentity -> DEBU 106f Obtaining identity" -"2019-07-20 02:39:55.966 UTC [msp] DeserializeIdentity -> DEBU 1070 Obtaining identity" -"2019-07-20 02:39:55.967 UTC [msp] DeserializeIdentity -> DEBU 1071 Obtaining identity" -"2019-07-20 02:39:55.967 UTC [gossip.comm] Send -> DEBU 1072 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:55.967 UTC [gossip.comm] sendToEndpoint -> DEBU 1073 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:39:55.968 UTC [gossip.comm] sendToEndpoint -> DEBU 1074 Exiting" -"2019-07-20 02:39:55.967 UTC [gossip.discovery] sendMemResponse -> DEBU 1075 Exiting, replying with alive:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " -"2019-07-20 02:39:56.272 UTC [gossip.pull] Hello -> DEBU 1076 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 1077 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:56.273 UTC [gossip.pull] Hello -> DEBU 1078 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 1079 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:56.273 UTC [gossip.pull] Hello -> DEBU 107a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 107b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:56.273 UTC [gossip.comm] sendToEndpoint -> DEBU 107c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.273 UTC [gossip.comm] sendToEndpoint -> DEBU 107d Exiting" -"2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 107e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 107f Exiting" -"2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 1080 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 1081 Exiting" -"2019-07-20 02:39:56.275 UTC [gossip.comm] func1 -> DEBU 1082 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1083 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.275 UTC [gossip.pull] HandleMessage -> DEBU 1084 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1085 Exiting" -"2019-07-20 02:39:56.275 UTC [gossip.comm] func1 -> DEBU 1086 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1087 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.275 UTC [gossip.pull] HandleMessage -> DEBU 1088 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.276 UTC [gossip.gossip] handleMessage -> DEBU 1089 Exiting" -"2019-07-20 02:39:56.277 UTC [gossip.comm] func1 -> DEBU 108a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.277 UTC [gossip.gossip] handleMessage -> DEBU 108b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.277 UTC [gossip.pull] HandleMessage -> DEBU 108c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.277 UTC [gossip.gossip] handleMessage -> DEBU 108d Exiting" -"2019-07-20 02:39:56.307 UTC [msp] GetDefaultSigningIdentity -> DEBU 108e Obtaining default signing identity" -"2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 108f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151014 " -"2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1090 Sign: digest: C7D72175B4EA24BE781C5667FDD4D10C6AE41025931EB8B9790DBC66471A6E16 " -"2019-07-20 02:39:56.307 UTC [msp] GetDefaultSigningIdentity -> DEBU 1091 Obtaining default signing identity" -"2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1092 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1093 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1094 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:56.308 UTC [msp] DeserializeIdentity -> DEBU 1095 Obtaining identity" -"2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1096 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:56.308 UTC [msp] DeserializeIdentity -> DEBU 1097 Obtaining identity" -"2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1098 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:56.308 UTC [gossip.comm] sendToEndpoint -> DEBU 1099 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.308 UTC [gossip.comm] sendToEndpoint -> DEBU 109a Exiting" -"2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109c Exiting" -"2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109e Exiting" -"2019-07-20 02:39:56.311 UTC [gossip.comm] func1 -> DEBU 109f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.311 UTC [gossip.gossip] handleMessage -> DEBU 10a0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.311 UTC [gossip.gossip] handleMessage -> DEBU 10a1 Exiting" -"2019-07-20 02:39:56.311 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10a3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a4 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| -00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" -"2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a5 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| -00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| -00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| -00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| -00000040 f9 ac 47 d7 14 7f 16 |..G....|" -"2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a7 Verify: sig = 00000000 30 44 02 20 54 7a a3 42 c9 28 88 5a 9e dc 61 40 |0D. Tz.B.(.Z..a@| -00000010 15 60 a5 f4 e5 c7 f4 d7 37 be 0d 99 56 96 14 5b |.`......7...V..[| -00000020 cf f2 3f e9 02 20 53 9a 33 29 47 4f cb 41 b1 ea |..?.. S.3)GO.A..| -00000030 6f ea 5e d7 b6 24 9c 62 ac b3 e6 2c ec 98 74 4b |o.^..$.b...,..tK| -00000040 87 ad b6 4e 77 48 |...NwH|" -"2019-07-20 02:39:56.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 10a8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:56.313 UTC [gossip.discovery] isSentByMe -> DEBU 10a9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:56.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 10aa Exiting" -"2019-07-20 02:39:56.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10ab Exiting" -"2019-07-20 02:39:56.314 UTC [gossip.comm] func1 -> DEBU 10ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.314 UTC [gossip.gossip] handleMessage -> DEBU 10ad Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.314 UTC [gossip.gossip] handleMessage -> DEBU 10ae Exiting" -"2019-07-20 02:39:56.314 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10af Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10b0 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:56.315 UTC [msp.identity] Verify -> DEBU 10b1 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| -00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" -"2019-07-20 02:39:56.315 UTC [msp.identity] Verify -> DEBU 10b2 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| -00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| -00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| -00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| -00000040 77 5f b8 b7 06 c1 |w_....|" -"2019-07-20 02:39:56.316 UTC [gossip.comm] func1 -> DEBU 10b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.316 UTC [gossip.gossip] handleMessage -> DEBU 10b4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 10b5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 10b6 Exiting" -"2019-07-20 02:39:56.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10b7 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:56.317 UTC [msp.identity] Verify -> DEBU 10b8 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| -00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" -"2019-07-20 02:39:56.317 UTC [msp.identity] Verify -> DEBU 10b9 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| -00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| -00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| -00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| -00000040 f9 ac 47 d7 14 7f 16 |..G....|" -"2019-07-20 02:39:56.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 10ba Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:56.318 UTC [gossip.discovery] isSentByMe -> DEBU 10bb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:56.318 UTC [gossip.discovery] handleAliveMessage -> DEBU 10bc Exiting" -"2019-07-20 02:39:56.318 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10bd Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:39:56.318 UTC [msp] DeserializeIdentity -> DEBU 10be Obtaining identity" -"2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10bf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10c0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10c1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.318 UTC [policies] Evaluate -> DEBU 10c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:56.319 UTC [cauthdsl] func1 -> DEBU 10c5 0xc0033ffb60 gate 1563590396319207900 evaluation starts" -"2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c6 0xc0033ffb60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c7 0xc0033ffb60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c8 0xc0033ffb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c9 0xc0033ffb60 principal evaluation fails" -"2019-07-20 02:39:56.319 UTC [cauthdsl] func1 -> DEBU 10ca 0xc0033ffb60 gate 1563590396319207900 evaluation fails" -"2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10cb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.320 UTC [policies] Evaluate -> DEBU 10cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:56.320 UTC [cauthdsl] func1 -> DEBU 10ce 0xc0034a23a0 gate 1563590396320080200 evaluation starts" -"2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10cf 0xc0034a23a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10d0 0xc0034a23a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10d1 0xc0034a23a0 principal matched by identity 0" -"2019-07-20 02:39:56.320 UTC [msp.identity] Verify -> DEBU 10d2 Verify: digest = 00000000 32 cd 79 69 26 bd f0 b6 fa 3d 9b 05 4c 4c 9f 63 |2.yi&....=..LL.c| -00000010 24 41 4d c3 5c 68 56 af ce 9f 1b c2 8a 17 de 69 |$AM.\hV........i|" -"2019-07-20 02:39:56.320 UTC [msp.identity] Verify -> DEBU 10d3 Verify: sig = 00000000 30 44 02 20 51 04 be fc db d6 de c6 b6 ae 09 47 |0D. Q..........G| -00000010 f4 3c 44 29 af 53 0d 4b 18 41 dd 7f 84 88 de 6d |. DEBU 10d4 0xc0034a23a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:56.321 UTC [cauthdsl] func1 -> DEBU 10d5 0xc0034a23a0 gate 1563590396320080200 evaluation succeeds" -"2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d8 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:56.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 10da Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 10db Exiting" -"2019-07-20 02:39:56.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10dc Exiting" -"2019-07-20 02:39:56.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.321 UTC [gossip.gossip] handleMessage -> DEBU 10de Exiting" -"2019-07-20 02:39:56.321 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10df Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:39:56.322 UTC [msp.identity] Verify -> DEBU 10e0 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| -00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" -"2019-07-20 02:39:56.322 UTC [msp.identity] Verify -> DEBU 10e1 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| -00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| -00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| -00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| -00000040 f9 ac 47 d7 14 7f 16 |..G....|" -"2019-07-20 02:39:56.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 10e2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:56.322 UTC [gossip.discovery] isSentByMe -> DEBU 10e3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:56.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 10e4 Exiting" -"2019-07-20 02:39:56.323 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10e5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:39:56.323 UTC [msp] DeserializeIdentity -> DEBU 10e6 Obtaining identity" -"2019-07-20 02:39:56.326 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:56.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10e8 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10e9 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:56.327 UTC [cauthdsl] func1 -> DEBU 10ed 0xc003510a90 gate 1563590396327540900 evaluation starts" -"2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10ee 0xc003510a90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10ef 0xc003510a90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10f0 0xc003510a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10f1 0xc003510a90 principal evaluation fails" -"2019-07-20 02:39:56.327 UTC [cauthdsl] func1 -> DEBU 10f2 0xc003510a90 gate 1563590396327540900 evaluation fails" -"2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:56.328 UTC [cauthdsl] func1 -> DEBU 10f6 0xc0035112d0 gate 1563590396328506100 evaluation starts" -"2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f7 0xc0035112d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f8 0xc0035112d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f9 0xc0035112d0 principal matched by identity 0" -"2019-07-20 02:39:56.329 UTC [msp.identity] Verify -> DEBU 10fa Verify: digest = 00000000 4a 76 46 0b 4f 2a e4 ff 21 78 d0 85 80 ae eb 74 |JvF.O*..!x.....t| -00000010 5d 30 24 cc c9 9f 4f ca b6 de ec f2 1f a5 ec 97 |]0$...O.........|" -"2019-07-20 02:39:56.329 UTC [msp.identity] Verify -> DEBU 10fb Verify: sig = 00000000 30 45 02 21 00 eb 3e 8d 69 89 0c d8 8f f7 5a 50 |0E.!..>.i.....ZP| -00000010 a9 cd 60 cd 06 bb 63 ee f8 40 18 62 d9 6b 8f df |..`...c..@.b.k..| -00000020 a2 0b 90 a6 4b 02 20 79 3e c8 74 e2 42 e5 32 7b |....K. y>.t.B.2{| -00000030 ca 14 da 23 9d 93 28 fe e9 d2 0e f1 be 15 47 61 |...#..(.......Ga| -00000040 6e d8 65 dc d7 b6 e9 |n.e....|" -"2019-07-20 02:39:56.329 UTC [cauthdsl] func2 -> DEBU 10fc 0xc0035112d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:56.329 UTC [cauthdsl] func1 -> DEBU 10fd 0xc0035112d0 gate 1563590396328506100 evaluation succeeds" -"2019-07-20 02:39:56.329 UTC [policies] Evaluate -> DEBU 10fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.329 UTC [policies] Evaluate -> DEBU 10ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.330 UTC [policies] Evaluate -> DEBU 1100 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:56.330 UTC [policies] Evaluate -> DEBU 1101 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:56.330 UTC [gossip.discovery] handleAliveMessage -> DEBU 1102 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:56.330 UTC [gossip.discovery] handleAliveMessage -> DEBU 1103 Exiting" -"2019-07-20 02:39:56.330 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1104 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:56.330 UTC [msp.identity] Verify -> DEBU 1105 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| -00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" -"2019-07-20 02:39:56.330 UTC [msp.identity] Verify -> DEBU 1106 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| -00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| -00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| -00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| -00000040 77 5f b8 b7 06 c1 |w_....|" -"2019-07-20 02:39:56.331 UTC [gossip.discovery] handleAliveMessage -> DEBU 1107 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.331 UTC [gossip.discovery] handleAliveMessage -> DEBU 1108 Exiting" -"2019-07-20 02:39:56.331 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1109 Exiting" -"2019-07-20 02:39:56.396 UTC [gossip.comm] func1 -> DEBU 110a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.396 UTC [gossip.comm] func1 -> DEBU 110b Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.396 UTC [gossip.gossip] handleMessage -> DEBU 110c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.396 UTC [gossip.pull] HandleMessage -> DEBU 110d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.397 UTC [gossip.pull] SendDigest -> DEBU 110e Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 110f Exiting" -"2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 1110 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 1111 Exiting" -"2019-07-20 02:39:56.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1112 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.398 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1113 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:56.398 UTC [msp.identity] Verify -> DEBU 1114 Verify: digest = 00000000 30 98 1f 5f 64 29 89 30 5c 59 fd 02 51 76 6f 11 |0.._d).0\Y..Qvo.| -00000010 51 b3 b7 50 f2 ad 2c b0 2d 4c 83 92 45 0e be 49 |Q..P..,.-L..E..I|" -"2019-07-20 02:39:56.398 UTC [msp.identity] Verify -> DEBU 1115 Verify: sig = 00000000 30 44 02 20 56 d8 b5 99 4c 20 22 6a d7 3a 6b 8d |0D. V...L "j.:k.| -00000010 d4 16 cb 44 f1 6f 70 bc 74 2e dc 24 7a ee 73 4c |...D.op.t..$z.sL| -00000020 55 87 2c d9 02 20 0e ca 61 aa 61 22 3a d5 77 02 |U.,.. ..a.a":.w.| -00000030 f3 0d 26 7e 64 dd db 40 e9 ec 5d 04 e7 30 a6 db |..&~d..@..]..0..| -00000040 61 aa b2 d8 91 4a |a....J|" -"2019-07-20 02:39:56.399 UTC [msp.identity] Verify -> DEBU 1116 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:39:56.399 UTC [msp.identity] Verify -> DEBU 1117 Verify: sig = 00000000 30 44 02 20 7d 62 a6 cc d7 5f 52 a4 65 41 48 3f |0D. }b..._R.eAH?| -00000010 57 5d 86 7f aa bb ab cc 62 14 9b 0e ef 34 6a a9 |W]......b....4j.| -00000020 4c f0 a6 84 02 20 75 7e 8e 55 ea d1 2d d2 af a3 |L.... u~.U..-...| -00000030 b1 14 f8 02 d7 b5 06 45 61 92 c4 32 7d dc d3 35 |.......Ea..2}..5| -00000040 f1 e6 79 84 c9 f7 |..y...|" -"2019-07-20 02:39:56.399 UTC [gossip.discovery] handleAliveMessage -> DEBU 1118 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 1119 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:56.400 UTC [gossip.discovery] learnExistingMembers -> DEBU 111d Exiting" -"2019-07-20 02:39:56.400 UTC [gossip.discovery] handleAliveMessage -> DEBU 111e Exiting" -"2019-07-20 02:39:56.400 UTC [gossip.discovery] handleMsgFromComm -> DEBU 111f Exiting" -"2019-07-20 02:39:56.400 UTC [gossip.discovery] sendMemResponse -> DEBU 1120 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:39:56.400 UTC [msp] DeserializeIdentity -> DEBU 1121 Obtaining identity" -"2019-07-20 02:39:56.400 UTC [msp] DeserializeIdentity -> DEBU 1122 Obtaining identity" -"2019-07-20 02:39:56.401 UTC [gossip.comm] Send -> DEBU 1123 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:56.401 UTC [gossip.discovery] sendMemResponse -> DEBU 1124 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " -"2019-07-20 02:39:56.401 UTC [gossip.comm] sendToEndpoint -> DEBU 1125 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.401 UTC [gossip.comm] sendToEndpoint -> DEBU 1126 Exiting" -"2019-07-20 02:39:56.575 UTC [gossip.comm] func1 -> DEBU 1127 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.575 UTC [gossip.gossip] handleMessage -> DEBU 1128 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.577 UTC [gossip.pull] HandleMessage -> DEBU 1129 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112a Obtaining identity" -"2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112b Obtaining identity" -"2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112c Obtaining identity" -"2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112d Obtaining identity" -"2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112e Obtaining identity" -"2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112f Obtaining identity" -"2019-07-20 02:39:56.578 UTC [gossip.pull] SendDigest -> DEBU 1130 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:39:56.579 UTC [gossip.gossip] handleMessage -> DEBU 1131 Exiting" -"2019-07-20 02:39:56.581 UTC [gossip.comm] func1 -> DEBU 1132 Got message: GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.582 UTC [gossip.gossip] handleMessage -> DEBU 1133 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.582 UTC [gossip.gossip] handleMessage -> DEBU 1134 Exiting" -"2019-07-20 02:39:56.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1135 Got message: GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.582 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1136 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:39:56.582 UTC [msp] DeserializeIdentity -> DEBU 1137 Obtaining identity" -"2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1138 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1139 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 113a Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:56.583 UTC [cauthdsl] func1 -> DEBU 113e 0xc003647a40 gate 1563590396583810200 evaluation starts" -"2019-07-20 02:39:56.583 UTC [cauthdsl] func2 -> DEBU 113f 0xc003647a40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.583 UTC [cauthdsl] func2 -> DEBU 1140 0xc003647a40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1141 0xc003647a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1142 0xc003647a40 principal evaluation fails" -"2019-07-20 02:39:56.584 UTC [cauthdsl] func1 -> DEBU 1143 0xc003647a40 gate 1563590396583810200 evaluation fails" -"2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1144 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1145 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1146 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:56.584 UTC [cauthdsl] func1 -> DEBU 1147 0xc0036522b0 gate 1563590396584797100 evaluation starts" -"2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1148 0xc0036522b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 1149 0xc0036522b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 114a 0xc0036522b0 principal matched by identity 0" -"2019-07-20 02:39:56.585 UTC [msp.identity] Verify -> DEBU 114b Verify: digest = 00000000 b2 1f d3 c5 78 4e f0 67 c6 95 96 e8 61 8f 1e 7b |....xN.g....a..{| -00000010 8a b5 ce 53 08 01 b1 41 bd 4c 76 92 c5 c2 96 88 |...S...A.Lv.....|" -"2019-07-20 02:39:56.585 UTC [msp.identity] Verify -> DEBU 114c Verify: sig = 00000000 30 45 02 21 00 d2 17 c8 86 38 cd 80 57 2c 8d 1b |0E.!.....8..W,..| -00000010 b2 32 cc 27 04 ec 32 ce 67 fc b4 e6 fd aa 08 42 |.2.'..2.g......B| -00000020 ce 00 ff ff fe 02 20 35 74 64 e9 dc 2c a7 a5 2e |...... 5td..,...| -00000030 f2 23 3e 5f 6b 39 70 2c 9c 79 bb b7 ee 0a 8a 22 |.#>_k9p,.y....."| -00000040 c2 f7 6b 80 ac 07 af |..k....|" -"2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 114d 0xc0036522b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:56.585 UTC [cauthdsl] func1 -> DEBU 114e 0xc0036522b0 gate 1563590396584797100 evaluation succeeds" -"2019-07-20 02:39:56.585 UTC [policies] Evaluate -> DEBU 114f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.585 UTC [policies] Evaluate -> DEBU 1150 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.586 UTC [policies] Evaluate -> DEBU 1151 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:56.586 UTC [policies] Evaluate -> DEBU 1152 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:56.586 UTC [gossip.discovery] handleAliveMessage -> DEBU 1153 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1154 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1155 updating membership: timestamp: " -"2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1156 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1157 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1158 Exiting" -"2019-07-20 02:39:56.586 UTC [gossip.discovery] handleAliveMessage -> DEBU 1159 Exiting" -"2019-07-20 02:39:56.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU 115a Exiting" -"2019-07-20 02:39:56.587 UTC [gossip.discovery] sendMemResponse -> DEBU 115b Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:39:56.587 UTC [msp] DeserializeIdentity -> DEBU 115c Obtaining identity" -"2019-07-20 02:39:56.588 UTC [msp] DeserializeIdentity -> DEBU 115d Obtaining identity" -"2019-07-20 02:39:56.588 UTC [msp] DeserializeIdentity -> DEBU 115e Obtaining identity" -"2019-07-20 02:39:56.588 UTC [gossip.comm] Send -> DEBU 115f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:56.588 UTC [gossip.discovery] sendMemResponse -> DEBU 1160 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" > alive:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > alive: alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " -"2019-07-20 02:39:56.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1161 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1162 Exiting" -"2019-07-20 02:39:56.752 UTC [msp] DeserializeIdentity -> DEBU 1163 Obtaining identity" -"2019-07-20 02:39:56.752 UTC [msp] DeserializeIdentity -> DEBU 1164 Obtaining identity" -"2019-07-20 02:39:56.752 UTC [gossip.comm] Send -> DEBU 1165 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:39:56.752 UTC [gossip.comm] sendToEndpoint -> DEBU 1166 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.752 UTC [gossip.comm] sendToEndpoint -> DEBU 1167 Exiting" -"2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 1168 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 1169 Exiting" -"2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 116a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 116b Exiting" -"2019-07-20 02:39:56.754 UTC [gossip.comm] func1 -> DEBU 116c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.754 UTC [gossip.gossip] handleMessage -> DEBU 116d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 116e Obtaining identity" -"2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 116f Obtaining identity" -"2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 1170 Obtaining identity" -"2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1171 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1172 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1173 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1174 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1175 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1176 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:56.755 UTC [cauthdsl] func1 -> DEBU 1177 0xc0036866d0 gate 1563590396755881700 evaluation starts" -"2019-07-20 02:39:56.756 UTC [cauthdsl] func2 -> DEBU 1178 0xc0036866d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.756 UTC [cauthdsl] func2 -> DEBU 1179 0xc0036866d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 117a 0xc0036866d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 117b 0xc0036866d0 principal evaluation fails" -"2019-07-20 02:39:56.757 UTC [cauthdsl] func1 -> DEBU 117c 0xc0036866d0 gate 1563590396755881700 evaluation fails" -"2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:56.757 UTC [cauthdsl] func1 -> DEBU 1180 0xc003687030 gate 1563590396757820400 evaluation starts" -"2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 1181 0xc003687030 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.758 UTC [cauthdsl] func2 -> DEBU 1182 0xc003687030 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.758 UTC [cauthdsl] func2 -> DEBU 1183 0xc003687030 principal matched by identity 0" -"2019-07-20 02:39:56.758 UTC [msp.identity] Verify -> DEBU 1184 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:39:56.758 UTC [gossip.comm] func1 -> DEBU 1185 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.759 UTC [gossip.comm] func1 -> DEBU 1186 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.758 UTC [msp.identity] Verify -> DEBU 1187 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:39:56.761 UTC [cauthdsl] func2 -> DEBU 1188 0xc003687030 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 1189 Obtaining identity" -"2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 118a Obtaining identity" -"2019-07-20 02:39:56.761 UTC [gossip.pull] Hello -> DEBU 118b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 118c Obtaining identity" -"2019-07-20 02:39:56.762 UTC [msp] DeserializeIdentity -> DEBU 118d Obtaining identity" -"2019-07-20 02:39:56.762 UTC [gossip.comm] Send -> DEBU 118e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:56.762 UTC [gossip.comm] sendToEndpoint -> DEBU 118f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1190 Exiting" -"2019-07-20 02:39:56.766 UTC [gossip.comm] func1 -> DEBU 1191 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.761 UTC [cauthdsl] func1 -> DEBU 1192 0xc003687030 gate 1563590396757820400 evaluation succeeds" -"2019-07-20 02:39:56.768 UTC [policies] Evaluate -> DEBU 1193 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.768 UTC [policies] Evaluate -> DEBU 1194 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.769 UTC [policies] Evaluate -> DEBU 1195 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:56.769 UTC [policies] Evaluate -> DEBU 1196 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:56.769 UTC [msp.identity] Verify -> DEBU 1197 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:39:56.769 UTC [msp.identity] Verify -> DEBU 1198 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:39:56.770 UTC [msp.identity] Verify -> DEBU 1199 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:39:56.770 UTC [msp.identity] Verify -> DEBU 119a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:39:56.770 UTC [msp] DeserializeIdentity -> DEBU 119b Obtaining identity" -"2019-07-20 02:39:56.770 UTC [msp] DeserializeIdentity -> DEBU 119c Obtaining identity" -"2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 119d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 119e Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 119f Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11a3 0xc0036b3740 gate 1563590396772180600 evaluation starts" -"2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a4 0xc0036b3740 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a5 0xc0036b3740 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a6 0xc0036b3740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a7 0xc0036b3740 principal evaluation fails" -"2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11a8 0xc0036b3740 gate 1563590396772180600 evaluation fails" -"2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11ac 0xc0036b3f90 gate 1563590396772895800 evaluation starts" -"2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11ad 0xc0036b3f90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.773 UTC [cauthdsl] func2 -> DEBU 11ae 0xc0036b3f90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.773 UTC [cauthdsl] func2 -> DEBU 11af 0xc0036b3f90 principal matched by identity 0" -"2019-07-20 02:39:56.773 UTC [msp.identity] Verify -> DEBU 11b0 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:39:56.773 UTC [msp.identity] Verify -> DEBU 11b1 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:39:56.776 UTC [cauthdsl] func2 -> DEBU 11b2 0xc0036b3f90 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:56.776 UTC [cauthdsl] func1 -> DEBU 11b3 0xc0036b3f90 gate 1563590396772895800 evaluation succeeds" -"2019-07-20 02:39:56.776 UTC [policies] Evaluate -> DEBU 11b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b6 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:56.777 UTC [gossip.gossip] handleMessage -> DEBU 11b8 Exiting" -"2019-07-20 02:39:56.777 UTC [gossip.gossip] handleMessage -> DEBU 11b9 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.777 UTC [msp.identity] Verify -> DEBU 11ba Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:39:56.777 UTC [msp.identity] Verify -> DEBU 11bb Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:39:56.778 UTC [msp.identity] Verify -> DEBU 11bc Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:39:56.778 UTC [msp.identity] Verify -> DEBU 11bd Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:39:56.778 UTC [msp] DeserializeIdentity -> DEBU 11be Obtaining identity" -"2019-07-20 02:39:56.778 UTC [msp] DeserializeIdentity -> DEBU 11bf Obtaining identity" -"2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:56.778 UTC [cauthdsl] func1 -> DEBU 11c6 0xc0036ea820 gate 1563590396778956200 evaluation starts" -"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c7 0xc0036ea820 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c8 0xc0036ea820 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c9 0xc0036ea820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11ca 0xc0036ea820 principal evaluation fails" -"2019-07-20 02:39:56.779 UTC [cauthdsl] func1 -> DEBU 11cb 0xc0036ea820 gate 1563590396778956200 evaluation fails" -"2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:56.779 UTC [cauthdsl] func1 -> DEBU 11cf 0xc0036eb080 gate 1563590396779609200 evaluation starts" -"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d0 0xc0036eb080 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d1 0xc0036eb080 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d2 0xc0036eb080 principal matched by identity 0" -"2019-07-20 02:39:56.779 UTC [msp.identity] Verify -> DEBU 11d3 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:39:56.780 UTC [msp.identity] Verify -> DEBU 11d4 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:39:56.780 UTC [cauthdsl] func2 -> DEBU 11d5 0xc0036eb080 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:56.780 UTC [cauthdsl] func1 -> DEBU 11d6 0xc0036eb080 gate 1563590396779609200 evaluation succeeds" -"2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d9 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:56.780 UTC [gossip.gossip] handleMessage -> DEBU 11db Exiting" -"2019-07-20 02:39:56.780 UTC [gossip.gossip] handleMessage -> DEBU 11dc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11dd Obtaining identity" -"2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11de Obtaining identity" -"2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11df Obtaining identity" -"2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11e1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11e2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.781 UTC [policies] Evaluate -> DEBU 11e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:56.781 UTC [policies] Evaluate -> DEBU 11e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:56.782 UTC [policies] Evaluate -> DEBU 11e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:56.782 UTC [cauthdsl] func1 -> DEBU 11e6 0xc003798b90 gate 1563590396782191100 evaluation starts" -"2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e7 0xc003798b90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e8 0xc003798b90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e9 0xc003798b90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11ea 0xc003798b90 principal evaluation fails" -"2019-07-20 02:39:56.782 UTC [cauthdsl] func1 -> DEBU 11eb 0xc003798b90 gate 1563590396782191100 evaluation fails" -"2019-07-20 02:39:56.782 UTC [policies] Evaluate -> DEBU 11ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.783 UTC [policies] Evaluate -> DEBU 11ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.783 UTC [policies] Evaluate -> DEBU 11ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:56.783 UTC [cauthdsl] func1 -> DEBU 11ef 0xc0037993d0 gate 1563590396783331500 evaluation starts" -"2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f0 0xc0037993d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f1 0xc0037993d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f2 0xc0037993d0 principal matched by identity 0" -"2019-07-20 02:39:56.783 UTC [msp.identity] Verify -> DEBU 11f3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:39:56.784 UTC [msp.identity] Verify -> DEBU 11f4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:39:56.784 UTC [cauthdsl] func2 -> DEBU 11f5 0xc0037993d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:56.784 UTC [cauthdsl] func1 -> DEBU 11f6 0xc0037993d0 gate 1563590396783331500 evaluation succeeds" -"2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f9 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:56.785 UTC [gossip.election] waitForInterrupt -> DEBU 11fb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:39:56.785 UTC [gossip.election] IsLeader -> DEBU 11fc c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:39:56.785 UTC [msp] GetDefaultSigningIdentity -> DEBU 11fd Obtaining default signing identity" -"2019-07-20 02:39:56.785 UTC [msp.identity] Sign -> DEBU 11fe Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510041801 " -"2019-07-20 02:39:56.786 UTC [msp.identity] Sign -> DEBU 11ff Sign: digest: 3D17F297AE31AB5120D66524527E2DA3C17A877046C3846100F2EEF767D18437 " -"2019-07-20 02:39:56.786 UTC [gossip.election] waitForInterrupt -> DEBU 1200 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1201 Obtaining identity" -"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1202 Obtaining identity" -"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1203 Obtaining identity" -"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1204 Obtaining identity" -"2019-07-20 02:39:56.787 UTC [gossip.comm] Send -> DEBU 1205 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1206 Obtaining identity" -"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1207 Obtaining identity" -"2019-07-20 02:39:56.787 UTC [gossip.comm] sendToEndpoint -> DEBU 1208 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.787 UTC [gossip.comm] sendToEndpoint -> DEBU 1209 Exiting" -"2019-07-20 02:39:56.791 UTC [msp.identity] Verify -> DEBU 120a Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:39:56.792 UTC [msp.identity] Verify -> DEBU 120b Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:39:56.792 UTC [msp] DeserializeIdentity -> DEBU 120c Obtaining identity" -"2019-07-20 02:39:56.792 UTC [msp] DeserializeIdentity -> DEBU 120d Obtaining identity" -"2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 120e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 120f Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1210 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1211 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1212 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1213 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 1214 0xc0037d9520 gate 1563590396792537900 evaluation starts" -"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1215 0xc0037d9520 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1216 0xc0037d9520 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1217 0xc0037d9520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1218 0xc0037d9520 principal evaluation fails" -"2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 1219 0xc0037d9520 gate 1563590396792537900 evaluation fails" -"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 121d 0xc0037d9d60 gate 1563590396792820100 evaluation starts" -"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 121e 0xc0037d9d60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 121f 0xc0037d9d60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1220 0xc0037d9d60 principal matched by identity 0" -"2019-07-20 02:39:56.792 UTC [msp.identity] Verify -> DEBU 1221 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:39:56.793 UTC [msp.identity] Verify -> DEBU 1222 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:39:56.793 UTC [cauthdsl] func2 -> DEBU 1223 0xc0037d9d60 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:56.793 UTC [cauthdsl] func1 -> DEBU 1224 0xc0037d9d60 gate 1563590396792820100 evaluation succeeds" -"2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1225 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1226 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1227 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 1229 Exiting" -"2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 122a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.793 UTC [gossip.pull] HandleMessage -> DEBU 122b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 122c Exiting" -"2019-07-20 02:39:56.915 UTC [gossip.comm] func1 -> DEBU 122d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.915 UTC [gossip.gossip] handleMessage -> DEBU 122e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.916 UTC [msp] DeserializeIdentity -> DEBU 122f Obtaining identity" -"2019-07-20 02:39:56.917 UTC [msp] DeserializeIdentity -> DEBU 1230 Obtaining identity" -"2019-07-20 02:39:56.918 UTC [gossip.gossip] handleMessage -> DEBU 1231 Exiting" -"2019-07-20 02:39:56.928 UTC [gossip.comm] func1 -> DEBU 1232 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.928 UTC [gossip.gossip] handleMessage -> DEBU 1233 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.929 UTC [gossip.pull] HandleMessage -> DEBU 1234 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:39:56.929 UTC [gossip.pull] SendDigest -> DEBU 1235 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:39:56.929 UTC [gossip.gossip] handleMessage -> DEBU 1236 Exiting" -"2019-07-20 02:39:56.950 UTC [gossip.comm] func1 -> DEBU 1237 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.950 UTC [gossip.gossip] handleMessage -> DEBU 1238 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.950 UTC [gossip.gossip] handleMessage -> DEBU 1239 Exiting" -"2019-07-20 02:39:56.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 123a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 123b Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:39:56.950 UTC [msp] DeserializeIdentity -> DEBU 123c Obtaining identity" -"2019-07-20 02:39:56.950 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 123d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:56.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 123e Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 123f Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:56.951 UTC [policies] Evaluate -> DEBU 1240 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1241 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1242 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:56.952 UTC [cauthdsl] func1 -> DEBU 1243 0xc00392c970 gate 1563590396952123800 evaluation starts" -"2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1244 0xc00392c970 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1245 0xc00392c970 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1246 0xc00392c970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1247 0xc00392c970 principal evaluation fails" -"2019-07-20 02:39:56.952 UTC [cauthdsl] func1 -> DEBU 1248 0xc00392c970 gate 1563590396952123800 evaluation fails" -"2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1249 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 124a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 124b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:56.953 UTC [cauthdsl] func1 -> DEBU 124c 0xc00392d1b0 gate 1563590396952965700 evaluation starts" -"2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124d 0xc00392d1b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124e 0xc00392d1b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124f 0xc00392d1b0 principal matched by identity 0" -"2019-07-20 02:39:56.953 UTC [msp.identity] Verify -> DEBU 1250 Verify: digest = 00000000 95 48 f5 b0 d8 da f5 ff de 4d dd b1 47 60 28 a7 |.H.......M..G`(.| -00000010 22 6b b6 c5 89 4e 23 53 d6 fc c3 30 7b 27 42 eb |"k...N#S...0{'B.|" -"2019-07-20 02:39:56.953 UTC [msp.identity] Verify -> DEBU 1251 Verify: sig = 00000000 30 44 02 20 28 f2 eb 53 10 3b 2f 51 c3 97 33 b5 |0D. (..S.;/Q..3.| -00000010 f4 59 4f c6 e1 f0 9d c2 e9 ad ae 44 79 ce 6f a7 |.YO........Dy.o.| -00000020 61 5b eb 9a 02 20 59 2c e5 f2 d3 23 32 f6 71 6a |a[... Y,...#2.qj| -00000030 e1 26 97 7a 1c f9 09 ab 6f f0 84 e2 07 66 63 17 |.&.z....o....fc.| -00000040 bd e5 5b cf b3 77 |..[..w|" -"2019-07-20 02:39:56.954 UTC [cauthdsl] func2 -> DEBU 1252 0xc00392d1b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:56.954 UTC [cauthdsl] func1 -> DEBU 1253 0xc00392d1b0 gate 1563590396952965700 evaluation succeeds" -"2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1254 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1255 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1256 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1257 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:56.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1258 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1259 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125a updating membership: timestamp: " -"2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125b Updating aliveness data: membership: timestamp: " -"2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125d Exiting" -"2019-07-20 02:39:56.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 125e Exiting" -"2019-07-20 02:39:56.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 125f Exiting" -"2019-07-20 02:39:56.955 UTC [msp] DeserializeIdentity -> DEBU 1260 Obtaining identity" -"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1261 Obtaining identity" -"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1262 Obtaining identity" -"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1263 Obtaining identity" -"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1264 Obtaining identity" -"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1265 Obtaining identity" -"2019-07-20 02:39:56.956 UTC [gossip.comm] Send -> DEBU 1266 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1267 Obtaining identity" -"2019-07-20 02:39:56.957 UTC [msp] DeserializeIdentity -> DEBU 1268 Obtaining identity" -"2019-07-20 02:39:56.957 UTC [gossip.comm] Send -> DEBU 1269 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126b Exiting" -"2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126d Exiting" -"2019-07-20 02:39:56.958 UTC [gossip.comm] func1 -> DEBU 126e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.958 UTC [gossip.gossip] handleMessage -> DEBU 126f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.958 UTC [gossip.gossip] handleMessage -> DEBU 1270 Exiting" -"2019-07-20 02:39:56.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1271 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1272 Exiting" -"2019-07-20 02:39:56.959 UTC [gossip.comm] func1 -> DEBU 1273 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.960 UTC [gossip.gossip] handleMessage -> DEBU 1274 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.960 UTC [gossip.gossip] handleMessage -> DEBU 1275 Exiting" -"2019-07-20 02:39:56.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1276 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:56.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1277 Exiting" -"2019-07-20 02:39:57.077 UTC [gossip.comm] func1 -> DEBU 1278 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:57.077 UTC [gossip.gossip] handleMessage -> DEBU 1279 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:57.077 UTC [msp] DeserializeIdentity -> DEBU 127a Obtaining identity" -"2019-07-20 02:39:57.078 UTC [msp] DeserializeIdentity -> DEBU 127b Obtaining identity" -"2019-07-20 02:39:57.078 UTC [msp] DeserializeIdentity -> DEBU 127c Obtaining identity" -"2019-07-20 02:39:57.080 UTC [gossip.gossip] handleMessage -> DEBU 127d Exiting" -"2019-07-20 02:39:57.215 UTC [gossip.comm] func1 -> DEBU 127e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:57.216 UTC [gossip.gossip] handleMessage -> DEBU 127f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1280 Obtaining identity" -"2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1281 Obtaining identity" -"2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1282 Obtaining identity" -"2019-07-20 02:39:57.219 UTC [gossip.gossip] handleMessage -> DEBU 1283 Exiting" -"2019-07-20 02:39:57.261 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 1284 Sleeping 25s" -"2019-07-20 02:39:57.266 UTC [msp] GetDefaultSigningIdentity -> DEBU 1285 Obtaining default signing identity" -"2019-07-20 02:39:57.266 UTC [msp.identity] Sign -> DEBU 1286 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151015 " -"2019-07-20 02:39:57.266 UTC [msp.identity] Sign -> DEBU 1287 Sign: digest: 0002FCB77BD293C038C9723707CBBAC6C32ED8A408B1F1A6C0E74FA9D271B781 " -"2019-07-20 02:39:57.267 UTC [msp] GetDefaultSigningIdentity -> DEBU 1288 Obtaining default signing identity" -"2019-07-20 02:39:57.267 UTC [msp.identity] Sign -> DEBU 1289 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:39:57.267 UTC [msp.identity] Sign -> DEBU 128a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:39:57.267 UTC [gossip.discovery] periodicalSendAlive -> DEBU 128b Sleeping 5s" -"2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128c Obtaining identity" -"2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128d Obtaining identity" -"2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128e Obtaining identity" -"2019-07-20 02:39:57.276 UTC [gossip.comm] Send -> DEBU 128f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 1290 Obtaining identity" -"2019-07-20 02:39:57.276 UTC [gossip.comm] Send -> DEBU 1291 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:57.277 UTC [gossip.comm] Send -> DEBU 1292 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1293 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1294 Exiting" -"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1295 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1296 Exiting" -"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1297 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1298 Exiting" -"2019-07-20 02:39:57.401 UTC [gossip.comm] func1 -> DEBU 1299 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.402 UTC [gossip.gossip] handleMessage -> DEBU 129a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.403 UTC [gossip.gossip] handleMessage -> DEBU 129b Exiting" -"2019-07-20 02:39:57.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 129c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.403 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 129d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:39:57.404 UTC [msp.identity] Verify -> DEBU 129e Verify: digest = 00000000 b9 dd c8 c7 6d ff 2b 8a 99 ea 11 e3 44 96 78 ff |....m.+.....D.x.| -00000010 d9 76 8b 02 5f 76 6d 63 c6 65 6a 00 4e 95 50 36 |.v.._vmc.ej.N.P6|" -"2019-07-20 02:39:57.404 UTC [msp.identity] Verify -> DEBU 129f Verify: sig = 00000000 30 45 02 21 00 b7 49 ab 36 61 f7 81 6d 69 29 bf |0E.!..I.6a..mi).| -00000010 36 52 9d a6 90 5f 3b a2 30 72 6a d9 de 9c 0a 21 |6R..._;.0rj....!| -00000020 7f ff de 82 c7 02 20 49 95 b5 20 20 97 19 91 63 |...... I.. ...c| -00000030 fa c3 66 a3 99 63 96 08 df 8e 9e c2 7b fb b5 14 |..f..c......{...| -00000040 c3 7d 6d 48 06 16 e2 |.}mH...|" -"2019-07-20 02:39:57.404 UTC [gossip.discovery] handleAliveMessage -> DEBU 12a0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a2 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a3 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:39:57.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a4 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:57.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a5 Exiting" -"2019-07-20 02:39:57.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 12a6 Exiting" -"2019-07-20 02:39:57.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12a7 Exiting" -"2019-07-20 02:39:57.412 UTC [gossip.comm] func1 -> DEBU 12a8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12a9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12aa Exiting" -"2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12ab Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12ac Exiting" -"2019-07-20 02:39:57.413 UTC [gossip.comm] func1 -> DEBU 12ad Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12ae Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12af Exiting" -"2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12b0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12b1 Exiting" -"2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b2 Obtaining identity" -"2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b3 Obtaining identity" -"2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b4 Obtaining identity" -"2019-07-20 02:39:57.413 UTC [gossip.comm] Send -> DEBU 12b5 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:57.414 UTC [msp] DeserializeIdentity -> DEBU 12b6 Obtaining identity" -"2019-07-20 02:39:57.414 UTC [gossip.comm] Send -> DEBU 12b7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12b8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12b9 Exiting" -"2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12ba Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12bb Exiting" -"2019-07-20 02:39:57.586 UTC [gossip.comm] func1 -> DEBU 12bc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.586 UTC [gossip.gossip] handleMessage -> DEBU 12bd Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.587 UTC [gossip.gossip] handleMessage -> DEBU 12be Exiting" -"2019-07-20 02:39:57.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12bf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.587 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 12c0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:39:57.587 UTC [msp] DeserializeIdentity -> DEBU 12c1 Obtaining identity" -"2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12c8 0xc003a8cc90 gate 1563590397587995100 evaluation starts" -"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12c9 0xc003a8cc90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12ca 0xc003a8cc90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12cb 0xc003a8cc90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12cc 0xc003a8cc90 principal evaluation fails" -"2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12cd 0xc003a8cc90 gate 1563590397587995100 evaluation fails" -"2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12ce Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12d1 0xc003a8d4d0 gate 1563590397588716100 evaluation starts" -"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12d2 0xc003a8d4d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12d3 0xc003a8d4d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:57.589 UTC [cauthdsl] func2 -> DEBU 12d4 0xc003a8d4d0 principal matched by identity 0" -"2019-07-20 02:39:57.589 UTC [msp.identity] Verify -> DEBU 12d5 Verify: digest = 00000000 83 1d c3 d2 b4 ac 95 19 17 8d fe a1 81 8d 9a e5 |................| -00000010 78 dc 36 0b 00 8c 9a 0e 72 f4 9c f5 4a 9d 7f 0f |x.6.....r...J...|" -"2019-07-20 02:39:57.589 UTC [msp.identity] Verify -> DEBU 12d6 Verify: sig = 00000000 30 45 02 21 00 9a 40 65 b0 10 da 51 8a f3 ee ac |0E.!..@e...Q....| -00000010 2f 2e 81 a3 c6 f1 57 70 46 e7 e2 5b 12 9d 5a 65 |/.....WpF..[..Ze| -00000020 01 16 95 a8 d3 02 20 37 45 a3 c5 78 bf 84 68 2e |...... 7E..x..h.| -00000030 82 2e 93 c1 30 45 37 59 55 bb b1 42 d7 3d 21 81 |....0E7YU..B.=!.| -00000040 0c 75 ab 99 6c ad bd |.u..l..|" -"2019-07-20 02:39:57.589 UTC [cauthdsl] func2 -> DEBU 12d7 0xc003a8d4d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:57.589 UTC [cauthdsl] func1 -> DEBU 12d8 0xc003a8d4d0 gate 1563590397588716100 evaluation succeeds" -"2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12d9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12db Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:57.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 12dd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12de Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12df updating membership: timestamp: " -"2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e0 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e2 Exiting" -"2019-07-20 02:39:57.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 12e3 Exiting" -"2019-07-20 02:39:57.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12e4 Exiting" -"2019-07-20 02:39:57.595 UTC [msp] DeserializeIdentity -> DEBU 12e5 Obtaining identity" -"2019-07-20 02:39:57.595 UTC [msp] DeserializeIdentity -> DEBU 12e6 Obtaining identity" -"2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e7 Obtaining identity" -"2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e8 Obtaining identity" -"2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e9 Obtaining identity" -"2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12ea Obtaining identity" -"2019-07-20 02:39:57.597 UTC [msp] DeserializeIdentity -> DEBU 12eb Obtaining identity" -"2019-07-20 02:39:57.597 UTC [gossip.comm] Send -> DEBU 12ec Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:57.597 UTC [msp] DeserializeIdentity -> DEBU 12ed Obtaining identity" -"2019-07-20 02:39:57.598 UTC [gossip.comm] Send -> DEBU 12ee Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12ef Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f0 Exiting" -"2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f2 Exiting" -"2019-07-20 02:39:57.598 UTC [gossip.comm] func1 -> DEBU 12f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f5 Exiting" -"2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12f6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12f7 Exiting" -"2019-07-20 02:39:57.599 UTC [gossip.comm] func1 -> DEBU 12f8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f9 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12fa Exiting" -"2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12fb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12fc Exiting" -"2019-07-20 02:39:59.948 UTC [gossip.comm] func1 -> DEBU 12fd Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:59.948 UTC [gossip.gossip] handleMessage -> DEBU 12fe Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:59.948 UTC [gossip.gossip] handleMessage -> DEBU 12ff Exiting" -"2019-07-20 02:39:59.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1300 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:39:59.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1301 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:39:59.948 UTC [msp] DeserializeIdentity -> DEBU 1302 Obtaining identity" -"2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1303 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1304 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1305 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1306 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1307 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1308 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:39:59.949 UTC [cauthdsl] func1 -> DEBU 1309 0xc003bb2320 gate 1563590399949786200 evaluation starts" -"2019-07-20 02:39:59.949 UTC [cauthdsl] func2 -> DEBU 130a 0xc003bb2320 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:59.949 UTC [cauthdsl] func2 -> DEBU 130b 0xc003bb2320 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 130c 0xc003bb2320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 130d 0xc003bb2320 principal evaluation fails" -"2019-07-20 02:39:59.950 UTC [cauthdsl] func1 -> DEBU 130e 0xc003bb2320 gate 1563590399949786200 evaluation fails" -"2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 130f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 1310 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 1311 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:39:59.950 UTC [cauthdsl] func1 -> DEBU 1312 0xc003bb2b90 gate 1563590399950706500 evaluation starts" -"2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1313 0xc003bb2b90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1314 0xc003bb2b90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1315 0xc003bb2b90 principal matched by identity 0" -"2019-07-20 02:39:59.951 UTC [msp.identity] Verify -> DEBU 1316 Verify: digest = 00000000 64 e6 bd 9b c4 af c6 3c 24 e1 0e 9a 0b ec e2 3d |d......<$......=| -00000010 03 6e 6c 5f 0b 5e 39 29 da 7d d8 fb 9f 31 b9 c1 |.nl_.^9).}...1..|" -"2019-07-20 02:39:59.951 UTC [msp.identity] Verify -> DEBU 1317 Verify: sig = 00000000 30 44 02 20 5f e3 aa 3f 94 4e 5f e6 55 aa 4c d3 |0D. _..?.N_.U.L.| -00000010 04 80 9f 88 f2 43 3b b4 d7 56 e6 8d 67 e9 a7 c7 |.....C;..V..g...| -00000020 ca 23 15 f5 02 20 28 9c 73 a9 00 21 bc bc 00 33 |.#... (.s..!...3| -00000030 13 bd fe 64 e7 c6 33 61 5b 99 5b 42 2c 95 3f a1 |...d..3a[.[B,.?.| -00000040 ad ca ca e5 1e 5a |.....Z|" -"2019-07-20 02:39:59.952 UTC [cauthdsl] func2 -> DEBU 1318 0xc003bb2b90 principal evaluation succeeds for identity 0" -"2019-07-20 02:39:59.952 UTC [cauthdsl] func1 -> DEBU 1319 0xc003bb2b90 gate 1563590399950706500 evaluation succeeds" -"2019-07-20 02:39:59.952 UTC [policies] Evaluate -> DEBU 131a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:39:59.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 131e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:39:59.953 UTC [gossip.discovery] learnExistingMembers -> DEBU 131f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:39:59.953 UTC [gossip.discovery] learnExistingMembers -> DEBU 1320 updating membership: timestamp: " -"2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1321 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1322 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1323 Exiting" -"2019-07-20 02:39:59.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1324 Exiting" -"2019-07-20 02:39:59.954 UTC [gossip.discovery] sendMemResponse -> DEBU 1325 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1326 Obtaining identity" -"2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1327 Obtaining identity" -"2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1328 Obtaining identity" -"2019-07-20 02:39:59.955 UTC [gossip.comm] Send -> DEBU 1329 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:39:59.956 UTC [gossip.discovery] sendMemResponse -> DEBU 132a Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\031" signature:"0E\002!\000\267I\2536a\367\201mi)\2776R\235\246\220_;\2420rj\331\336\234\n!\177\377\336\202\307\002 I\225\265 \227\031\221c\372\303f\243\231c\226\010\337\216\236\302{\373\265\024\303}mH\006\026\342" > alive: " -"2019-07-20 02:39:59.957 UTC [gossip.comm] sendToEndpoint -> DEBU 132b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:39:59.957 UTC [gossip.comm] sendToEndpoint -> DEBU 132c Exiting" -"2019-07-20 02:39:59.957 UTC [gossip.comm] func1 -> DEBU 132d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:59.958 UTC [gossip.gossip] handleMessage -> DEBU 132e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:59.958 UTC [gossip.pull] HandleMessage -> DEBU 132f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1330 Obtaining identity" -"2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1331 Obtaining identity" -"2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1332 Obtaining identity" -"2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1333 Obtaining identity" -"2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1334 Obtaining identity" -"2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1335 Obtaining identity" -"2019-07-20 02:39:59.959 UTC [gossip.pull] SendDigest -> DEBU 1336 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:39:59.959 UTC [gossip.gossip] handleMessage -> DEBU 1337 Exiting" -"2019-07-20 02:39:59.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1338 Exiting" -"2019-07-20 02:40:00.274 UTC [gossip.pull] Hello -> DEBU 1339 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:00.274 UTC [gossip.comm] Send -> DEBU 133a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:00.274 UTC [gossip.pull] Hello -> DEBU 133b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:00.275 UTC [gossip.comm] Send -> DEBU 133c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:00.275 UTC [gossip.pull] Hello -> DEBU 133d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:00.275 UTC [gossip.comm] Send -> DEBU 133e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 133f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1340 Exiting" -"2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1341 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1342 Exiting" -"2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1343 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.276 UTC [gossip.comm] sendToEndpoint -> DEBU 1344 Exiting" -"2019-07-20 02:40:00.276 UTC [gossip.comm] func1 -> DEBU 1345 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.277 UTC [gossip.gossip] handleMessage -> DEBU 1346 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.277 UTC [gossip.pull] HandleMessage -> DEBU 1347 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.277 UTC [gossip.gossip] handleMessage -> DEBU 1348 Exiting" -"2019-07-20 02:40:00.278 UTC [gossip.comm] func1 -> DEBU 1349 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.278 UTC [gossip.gossip] handleMessage -> DEBU 134a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.278 UTC [gossip.pull] HandleMessage -> DEBU 134b GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.278 UTC [gossip.gossip] handleMessage -> DEBU 134c Exiting" -"2019-07-20 02:40:00.278 UTC [gossip.comm] func1 -> DEBU 134d Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.279 UTC [gossip.gossip] handleMessage -> DEBU 134e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.279 UTC [gossip.pull] HandleMessage -> DEBU 134f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.279 UTC [gossip.gossip] handleMessage -> DEBU 1350 Exiting" -"2019-07-20 02:40:00.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 1351 Obtaining default signing identity" -"2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1352 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151016 " -"2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1353 Sign: digest: 11CA326B0DACA229CE2CE81B0CFFF6F167054870B698D3BCC60F2CCD5EECB3F3 " -"2019-07-20 02:40:00.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 1354 Obtaining default signing identity" -"2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1355 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1356 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:00.310 UTC [gossip.comm] Send -> DEBU 1357 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:00.310 UTC [msp] DeserializeIdentity -> DEBU 1358 Obtaining identity" -"2019-07-20 02:40:00.310 UTC [gossip.comm] sendToEndpoint -> DEBU 1359 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.310 UTC [gossip.comm] sendToEndpoint -> DEBU 135a Exiting" -"2019-07-20 02:40:00.310 UTC [gossip.comm] Send -> DEBU 135b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:00.310 UTC [msp] DeserializeIdentity -> DEBU 135c Obtaining identity" -"2019-07-20 02:40:00.311 UTC [gossip.comm] sendToEndpoint -> DEBU 135d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.311 UTC [gossip.comm] sendToEndpoint -> DEBU 135e Exiting" -"2019-07-20 02:40:00.311 UTC [gossip.comm] Send -> DEBU 135f Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:00.312 UTC [gossip.comm] sendToEndpoint -> DEBU 1360 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.312 UTC [gossip.comm] sendToEndpoint -> DEBU 1361 Exiting" -"2019-07-20 02:40:00.313 UTC [gossip.comm] func1 -> DEBU 1362 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.313 UTC [gossip.gossip] handleMessage -> DEBU 1363 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.313 UTC [gossip.gossip] handleMessage -> DEBU 1364 Exiting" -"2019-07-20 02:40:00.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1365 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.314 UTC [gossip.comm] func1 -> DEBU 1366 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.314 UTC [gossip.gossip] handleMessage -> DEBU 1367 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1368 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:00.314 UTC [msp.identity] Verify -> DEBU 1369 Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| -00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" -"2019-07-20 02:40:00.315 UTC [msp.identity] Verify -> DEBU 136a Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| -00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| -00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| -00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| -00000040 4e d6 49 e1 dd 1b |N.I...|" -"2019-07-20 02:40:00.315 UTC [gossip.comm] func1 -> DEBU 136b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 136c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:00.315 UTC [gossip.discovery] isSentByMe -> DEBU 136d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:00.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 136e Exiting" -"2019-07-20 02:40:00.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 136f Exiting" -"2019-07-20 02:40:00.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1370 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1371 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:00.316 UTC [gossip.gossip] handleMessage -> DEBU 1372 Exiting" -"2019-07-20 02:40:00.316 UTC [gossip.gossip] handleMessage -> DEBU 1373 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.317 UTC [msp.identity] Verify -> DEBU 1374 Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| -00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" -"2019-07-20 02:40:00.317 UTC [msp.identity] Verify -> DEBU 1375 Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| -00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| -00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| -00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| -00000040 4e d6 49 e1 dd 1b |N.I...|" -"2019-07-20 02:40:00.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 1376 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:00.317 UTC [gossip.discovery] isSentByMe -> DEBU 1377 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:00.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 1378 Exiting" -"2019-07-20 02:40:00.317 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1379 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:00.317 UTC [msp] DeserializeIdentity -> DEBU 137a Obtaining identity" -"2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 137b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137c Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137d Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 137e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 137f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 1380 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:00.318 UTC [cauthdsl] func1 -> DEBU 1381 0xc003cd45b0 gate 1563590400318472100 evaluation starts" -"2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1382 0xc003cd45b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1383 0xc003cd45b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1384 0xc003cd45b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1385 0xc003cd45b0 principal evaluation fails" -"2019-07-20 02:40:00.318 UTC [cauthdsl] func1 -> DEBU 1386 0xc003cd45b0 gate 1563590400318472100 evaluation fails" -"2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 1387 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.319 UTC [policies] Evaluate -> DEBU 1388 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.319 UTC [policies] Evaluate -> DEBU 1389 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:00.319 UTC [cauthdsl] func1 -> DEBU 138a 0xc003cd4e10 gate 1563590400319460300 evaluation starts" -"2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138b 0xc003cd4e10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138c 0xc003cd4e10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138d 0xc003cd4e10 principal matched by identity 0" -"2019-07-20 02:40:00.319 UTC [msp.identity] Verify -> DEBU 138e Verify: digest = 00000000 64 e6 bd 9b c4 af c6 3c 24 e1 0e 9a 0b ec e2 3d |d......<$......=| -00000010 03 6e 6c 5f 0b 5e 39 29 da 7d d8 fb 9f 31 b9 c1 |.nl_.^9).}...1..|" -"2019-07-20 02:40:00.320 UTC [msp.identity] Verify -> DEBU 138f Verify: sig = 00000000 30 44 02 20 5f e3 aa 3f 94 4e 5f e6 55 aa 4c d3 |0D. _..?.N_.U.L.| -00000010 04 80 9f 88 f2 43 3b b4 d7 56 e6 8d 67 e9 a7 c7 |.....C;..V..g...| -00000020 ca 23 15 f5 02 20 28 9c 73 a9 00 21 bc bc 00 33 |.#... (.s..!...3| -00000030 13 bd fe 64 e7 c6 33 61 5b 99 5b 42 2c 95 3f a1 |...d..3a[.[B,.?.| -00000040 ad ca ca e5 1e 5a |.....Z|" -"2019-07-20 02:40:00.320 UTC [cauthdsl] func2 -> DEBU 1390 0xc003cd4e10 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:00.320 UTC [cauthdsl] func1 -> DEBU 1391 0xc003cd4e10 gate 1563590400319460300 evaluation succeeds" -"2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1392 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1393 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1394 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1395 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:00.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 1396 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:00.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 1397 Exiting" -"2019-07-20 02:40:00.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1398 Exiting" -"2019-07-20 02:40:00.321 UTC [gossip.gossip] handleMessage -> DEBU 139a Exiting" -"2019-07-20 02:40:00.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1399 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.322 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 139b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:00.322 UTC [msp.identity] Verify -> DEBU 139c Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| -00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" -"2019-07-20 02:40:00.322 UTC [msp.identity] Verify -> DEBU 139d Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| -00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| -00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| -00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| -00000040 4e d6 49 e1 dd 1b |N.I...|" -"2019-07-20 02:40:00.323 UTC [msp.identity] Verify -> DEBU 139e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:00.323 UTC [msp.identity] Verify -> DEBU 139f Verify: sig = 00000000 30 44 02 20 58 40 7c 49 09 c6 a4 f9 da 59 12 bf |0D. X@|I.....Y..| -00000010 7a 38 1d fb 5d 95 58 26 92 c8 a0 3b 06 3b 03 68 |z8..].X&...;.;.h| -00000020 bd 29 24 99 02 20 33 53 85 b7 ac 4b ef 99 a3 4f |.)$.. 3S...K...O| -00000030 36 7d d1 08 b7 a3 a8 2c 9a 5e 86 92 2f fa 80 c9 |6}.....,.^../...| -00000040 4f 89 be 1b 47 d5 |O...G.|" -"2019-07-20 02:40:00.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:00.323 UTC [gossip.discovery] isSentByMe -> DEBU 13a1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:00.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a2 Exiting" -"2019-07-20 02:40:00.323 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13a3 Exiting" -"2019-07-20 02:40:00.395 UTC [gossip.comm] func1 -> DEBU 13a4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.395 UTC [gossip.gossip] handleMessage -> DEBU 13a5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.397 UTC [gossip.pull] HandleMessage -> DEBU 13a6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.398 UTC [gossip.pull] SendDigest -> DEBU 13a7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13a8 Exiting" -"2019-07-20 02:40:00.398 UTC [gossip.comm] func1 -> DEBU 13a9 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13aa Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13ab Exiting" -"2019-07-20 02:40:00.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13ac Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.398 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13ad Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:00.400 UTC [msp.identity] Verify -> DEBU 13ae Verify: digest = 00000000 b2 df 75 9a c5 cd b4 29 05 05 d3 7e cd ea ba b1 |..u....)...~....| -00000010 29 a8 a9 25 d2 e9 e4 20 b9 cd 4c 96 94 4b 70 bb |)..%... ..L..Kp.|" -"2019-07-20 02:40:00.400 UTC [msp.identity] Verify -> DEBU 13af Verify: sig = 00000000 30 45 02 21 00 ae ba 69 b1 18 cb c3 27 ed 1f 1e |0E.!...i....'...| -00000010 ec 78 6e e7 f4 61 a8 c8 c2 ac ec 49 b9 fa b6 40 |.xn..a.....I...@| -00000020 53 2e 97 6c 1e 02 20 48 5e a8 6c ca f8 d1 22 ac |S..l.. H^.l...".| -00000030 ec 63 b2 b0 1c d9 86 3a 93 25 43 35 79 66 77 5d |.c.....:.%C5yfw]| -00000040 9c 50 f7 27 c9 50 6e |.P.'.Pn|" -"2019-07-20 02:40:00.401 UTC [msp.identity] Verify -> DEBU 13b0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:00.401 UTC [msp.identity] Verify -> DEBU 13b1 Verify: sig = 00000000 30 44 02 20 64 44 b6 aa 9f f9 b9 e1 0f 65 2b 3e |0D. dD.......e+>| -00000010 e8 a7 42 e8 6f c5 84 00 11 a8 16 cb e4 dd a3 a3 |..B.o...........| -00000020 45 89 e3 36 02 20 17 a3 1e d3 94 25 da e8 b9 3c |E..6. .....%...<| -00000030 34 a2 f3 f9 fd ea a2 aa a9 af 6f 13 dc 62 cf 4c |4.........o..b.L| -00000040 b4 8b 61 7d f0 f7 |..a}..|" -"2019-07-20 02:40:00.401 UTC [gossip.discovery] handleAliveMessage -> DEBU 13b2 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:00.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b4 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b5 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b6 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b7 Exiting" -"2019-07-20 02:40:00.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 13b8 Exiting" -"2019-07-20 02:40:00.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13b9 Exiting" -"2019-07-20 02:40:00.402 UTC [gossip.discovery] sendMemResponse -> DEBU 13ba Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:00.402 UTC [msp] DeserializeIdentity -> DEBU 13bb Obtaining identity" -"2019-07-20 02:40:00.402 UTC [msp] DeserializeIdentity -> DEBU 13bc Obtaining identity" -"2019-07-20 02:40:00.403 UTC [gossip.comm] Send -> DEBU 13bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:00.403 UTC [gossip.discovery] sendMemResponse -> DEBU 13be Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > alive: " -"2019-07-20 02:40:00.403 UTC [gossip.comm] sendToEndpoint -> DEBU 13bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.403 UTC [gossip.comm] sendToEndpoint -> DEBU 13c0 Exiting" -"2019-07-20 02:40:00.577 UTC [gossip.comm] func1 -> DEBU 13c1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.577 UTC [gossip.gossip] handleMessage -> DEBU 13c2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.578 UTC [gossip.pull] HandleMessage -> DEBU 13c3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c4 Obtaining identity" -"2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c5 Obtaining identity" -"2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c6 Obtaining identity" -"2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c7 Obtaining identity" -"2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c8 Obtaining identity" -"2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c9 Obtaining identity" -"2019-07-20 02:40:00.583 UTC [gossip.comm] func1 -> DEBU 13ca Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.583 UTC [gossip.pull] SendDigest -> DEBU 13cb Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:00.583 UTC [gossip.gossip] handleMessage -> DEBU 13cc Exiting" -"2019-07-20 02:40:00.584 UTC [gossip.gossip] handleMessage -> DEBU 13cd Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.584 UTC [gossip.gossip] handleMessage -> DEBU 13ce Exiting" -"2019-07-20 02:40:00.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13cf Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13d0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:00.584 UTC [msp] DeserializeIdentity -> DEBU 13d1 Obtaining identity" -"2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:00.585 UTC [cauthdsl] func1 -> DEBU 13d8 0xc003c1dbf0 gate 1563590400585459000 evaluation starts" -"2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13d9 0xc003c1dbf0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13da 0xc003c1dbf0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13db 0xc003c1dbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13dc 0xc003c1dbf0 principal evaluation fails" -"2019-07-20 02:40:00.585 UTC [cauthdsl] func1 -> DEBU 13dd 0xc003c1dbf0 gate 1563590400585459000 evaluation fails" -"2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:00.586 UTC [cauthdsl] func1 -> DEBU 13e1 0xc003de6430 gate 1563590400586238400 evaluation starts" -"2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e2 0xc003de6430 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e3 0xc003de6430 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e4 0xc003de6430 principal matched by identity 0" -"2019-07-20 02:40:00.586 UTC [msp.identity] Verify -> DEBU 13e5 Verify: digest = 00000000 86 b9 c7 5f ed e5 be f6 d8 85 e9 e3 f2 09 bd b0 |..._............| -00000010 2f 34 3b 45 e9 01 f4 b7 52 25 1c f6 92 75 21 7f |/4;E....R%...u!.|" -"2019-07-20 02:40:00.586 UTC [msp.identity] Verify -> DEBU 13e6 Verify: sig = 00000000 30 44 02 20 24 c6 14 9d e8 1d 73 3c 83 1a 5e 08 |0D. $.....s<..^.| -00000010 ac 7d f7 5a 94 1a c0 70 a9 5b 20 06 d9 fd ec 3d |.}.Z...p.[ ....=| -00000020 54 30 68 7e 02 20 08 90 da f4 ba 3c 8f 73 53 fa |T0h~. .....<.sS.| -00000030 0e 5b 5b b7 96 90 74 e0 b4 d4 6c 8c 7c d5 ad 4c |.[[...t...l.|..L| -00000040 4b 91 d8 df 33 f5 |K...3.|" -"2019-07-20 02:40:00.587 UTC [cauthdsl] func2 -> DEBU 13e7 0xc003de6430 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:00.587 UTC [cauthdsl] func1 -> DEBU 13e8 0xc003de6430 gate 1563590400586238400 evaluation succeeds" -"2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13eb Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:00.587 UTC [gossip.discovery] handleAliveMessage -> DEBU 13ed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ee Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ef updating membership: timestamp: " -"2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f0 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:00.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:00.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f2 Exiting" -"2019-07-20 02:40:00.588 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f3 Exiting" -"2019-07-20 02:40:00.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13f4 Exiting" -"2019-07-20 02:40:00.588 UTC [gossip.discovery] sendMemResponse -> DEBU 13f5 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f6 Obtaining identity" -"2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f7 Obtaining identity" -"2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f8 Obtaining identity" -"2019-07-20 02:40:00.588 UTC [gossip.comm] Send -> DEBU 13f9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:00.589 UTC [gossip.discovery] sendMemResponse -> DEBU 13fa Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" > alive: alive: alive: " -"2019-07-20 02:40:00.589 UTC [gossip.comm] sendToEndpoint -> DEBU 13fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.589 UTC [gossip.comm] sendToEndpoint -> DEBU 13fc Exiting" -"2019-07-20 02:40:00.717 UTC [msp] DeserializeIdentity -> DEBU 13fd Obtaining identity" -"2019-07-20 02:40:00.717 UTC [msp] DeserializeIdentity -> DEBU 13fe Obtaining identity" -"2019-07-20 02:40:00.718 UTC [gossip.comm] Send -> DEBU 13ff Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1400 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1401 Exiting" -"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1402 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1403 Exiting" -"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1404 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1405 Exiting" -"2019-07-20 02:40:00.719 UTC [gossip.comm] func1 -> DEBU 1406 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.719 UTC [gossip.gossip] handleMessage -> DEBU 1407 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.719 UTC [msp] DeserializeIdentity -> DEBU 1408 Obtaining identity" -"2019-07-20 02:40:00.721 UTC [msp] DeserializeIdentity -> DEBU 1409 Obtaining identity" -"2019-07-20 02:40:00.721 UTC [msp] DeserializeIdentity -> DEBU 140a Obtaining identity" -"2019-07-20 02:40:00.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 140b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:00.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 140c Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 140d Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 140e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 140f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1410 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 1411 0xc003e15bd0 gate 1563590400722307300 evaluation starts" -"2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1412 0xc003e15bd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1413 0xc003e15bd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1414 0xc003e15bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1415 0xc003e15bd0 principal evaluation fails" -"2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 1416 0xc003e15bd0 gate 1563590400722307300 evaluation fails" -"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1417 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1418 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1419 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 141a 0xc003e32550 gate 1563590400722785400 evaluation starts" -"2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141b 0xc003e32550 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141c 0xc003e32550 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.723 UTC [gossip.comm] func1 -> DEBU 141d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141e 0xc003e32550 principal matched by identity 0" -"2019-07-20 02:40:00.724 UTC [msp.identity] Verify -> DEBU 141f Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:00.724 UTC [msp.identity] Verify -> DEBU 1420 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:00.724 UTC [cauthdsl] func2 -> DEBU 1421 0xc003e32550 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:00.724 UTC [cauthdsl] func1 -> DEBU 1422 0xc003e32550 gate 1563590400722785400 evaluation succeeds" -"2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1423 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1424 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1425 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1426 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1427 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1428 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1429 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:00.727 UTC [msp.identity] Verify -> DEBU 142a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:00.730 UTC [msp] DeserializeIdentity -> DEBU 142b Obtaining identity" -"2019-07-20 02:40:00.730 UTC [msp] DeserializeIdentity -> DEBU 142c Obtaining identity" -"2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 142d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 142e Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 142f Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 1430 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 1431 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:00.731 UTC [msp] DeserializeIdentity -> DEBU 1432 Obtaining identity" -"2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1433 Obtaining identity" -"2019-07-20 02:40:00.732 UTC [gossip.pull] Hello -> DEBU 1434 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1435 Obtaining identity" -"2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1436 Obtaining identity" -"2019-07-20 02:40:00.732 UTC [gossip.comm] Send -> DEBU 1437 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:00.732 UTC [gossip.comm] sendToEndpoint -> DEBU 1438 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.732 UTC [gossip.comm] sendToEndpoint -> DEBU 1439 Exiting" -"2019-07-20 02:40:00.738 UTC [gossip.comm] func1 -> DEBU 143a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 143b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:00.738 UTC [cauthdsl] func1 -> DEBU 143c 0xc003e86d10 gate 1563590400738727800 evaluation starts" -"2019-07-20 02:40:00.739 UTC [gossip.comm] func1 -> DEBU 143d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.739 UTC [cauthdsl] func2 -> DEBU 143e 0xc003e86d10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.739 UTC [cauthdsl] func2 -> DEBU 143f 0xc003e86d10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.740 UTC [cauthdsl] func2 -> DEBU 1440 0xc003e86d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:00.740 UTC [cauthdsl] func2 -> DEBU 1441 0xc003e86d10 principal evaluation fails" -"2019-07-20 02:40:00.740 UTC [cauthdsl] func1 -> DEBU 1442 0xc003e86d10 gate 1563590400738727800 evaluation fails" -"2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1443 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1444 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1445 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:00.742 UTC [cauthdsl] func1 -> DEBU 1446 0xc003e87550 gate 1563590400741095900 evaluation starts" -"2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1447 0xc003e87550 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1448 0xc003e87550 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1449 0xc003e87550 principal matched by identity 0" -"2019-07-20 02:40:00.743 UTC [msp.identity] Verify -> DEBU 144a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:00.743 UTC [msp.identity] Verify -> DEBU 144b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:00.743 UTC [cauthdsl] func2 -> DEBU 144c 0xc003e87550 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:00.744 UTC [cauthdsl] func1 -> DEBU 144d 0xc003e87550 gate 1563590400741095900 evaluation succeeds" -"2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 144e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 144f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 1450 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:00.745 UTC [policies] Evaluate -> DEBU 1451 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:00.747 UTC [gossip.gossip] handleMessage -> DEBU 1452 Exiting" -"2019-07-20 02:40:00.748 UTC [gossip.gossip] handleMessage -> DEBU 1453 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.749 UTC [msp.identity] Verify -> DEBU 1454 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:00.749 UTC [msp.identity] Verify -> DEBU 1455 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:00.750 UTC [msp.identity] Verify -> DEBU 1456 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:00.750 UTC [msp.identity] Verify -> DEBU 1457 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:00.751 UTC [msp] DeserializeIdentity -> DEBU 1458 Obtaining identity" -"2019-07-20 02:40:00.752 UTC [msp] DeserializeIdentity -> DEBU 1459 Obtaining identity" -"2019-07-20 02:40:00.754 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 145a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:00.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 145b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 145c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.756 UTC [policies] Evaluate -> DEBU 145d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:00.756 UTC [policies] Evaluate -> DEBU 145e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:00.757 UTC [policies] Evaluate -> DEBU 145f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:00.757 UTC [cauthdsl] func1 -> DEBU 1460 0xc003f4be10 gate 1563590400757245300 evaluation starts" -"2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1461 0xc003f4be10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1462 0xc003f4be10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1463 0xc003f4be10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:00.758 UTC [cauthdsl] func2 -> DEBU 1464 0xc003f4be10 principal evaluation fails" -"2019-07-20 02:40:00.758 UTC [cauthdsl] func1 -> DEBU 1465 0xc003f4be10 gate 1563590400757245300 evaluation fails" -"2019-07-20 02:40:00.758 UTC [policies] Evaluate -> DEBU 1466 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.758 UTC [policies] Evaluate -> DEBU 1467 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.759 UTC [policies] Evaluate -> DEBU 1468 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:00.759 UTC [cauthdsl] func1 -> DEBU 1469 0xc003f7c6b0 gate 1563590400759673900 evaluation starts" -"2019-07-20 02:40:00.759 UTC [cauthdsl] func2 -> DEBU 146a 0xc003f7c6b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.760 UTC [cauthdsl] func2 -> DEBU 146b 0xc003f7c6b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.760 UTC [cauthdsl] func2 -> DEBU 146c 0xc003f7c6b0 principal matched by identity 0" -"2019-07-20 02:40:00.760 UTC [msp.identity] Verify -> DEBU 146d Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:00.760 UTC [msp.identity] Verify -> DEBU 146e Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:00.761 UTC [cauthdsl] func2 -> DEBU 146f 0xc003f7c6b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:00.761 UTC [cauthdsl] func1 -> DEBU 1470 0xc003f7c6b0 gate 1563590400759673900 evaluation succeeds" -"2019-07-20 02:40:00.761 UTC [policies] Evaluate -> DEBU 1471 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.761 UTC [policies] Evaluate -> DEBU 1472 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.762 UTC [policies] Evaluate -> DEBU 1473 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:00.762 UTC [policies] Evaluate -> DEBU 1474 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:00.762 UTC [msp] DeserializeIdentity -> DEBU 1475 Obtaining identity" -"2019-07-20 02:40:00.762 UTC [msp] DeserializeIdentity -> DEBU 1476 Obtaining identity" -"2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1477 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1478 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1479 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.763 UTC [policies] Evaluate -> DEBU 147a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:00.764 UTC [policies] Evaluate -> DEBU 147b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:00.764 UTC [policies] Evaluate -> DEBU 147c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:00.764 UTC [cauthdsl] func1 -> DEBU 147d 0xc003f7de80 gate 1563590400764851600 evaluation starts" -"2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 147e 0xc003f7de80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 147f 0xc003f7de80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 1480 0xc003f7de80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 1481 0xc003f7de80 principal evaluation fails" -"2019-07-20 02:40:00.765 UTC [cauthdsl] func1 -> DEBU 1482 0xc003f7de80 gate 1563590400764851600 evaluation fails" -"2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1483 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1484 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1485 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:00.766 UTC [cauthdsl] func1 -> DEBU 1486 0xc003fc46c0 gate 1563590400766587500 evaluation starts" -"2019-07-20 02:40:00.766 UTC [cauthdsl] func2 -> DEBU 1487 0xc003fc46c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.767 UTC [cauthdsl] func2 -> DEBU 1488 0xc003fc46c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.767 UTC [cauthdsl] func2 -> DEBU 1489 0xc003fc46c0 principal matched by identity 0" -"2019-07-20 02:40:00.767 UTC [msp.identity] Verify -> DEBU 148a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:00.767 UTC [msp.identity] Verify -> DEBU 148b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:00.768 UTC [cauthdsl] func2 -> DEBU 148c 0xc003fc46c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:00.768 UTC [cauthdsl] func1 -> DEBU 148d 0xc003fc46c0 gate 1563590400766587500 evaluation succeeds" -"2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 148e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 148f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 1490 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:00.769 UTC [policies] Evaluate -> DEBU 1491 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:00.769 UTC [gossip.gossip] handleMessage -> DEBU 1492 Exiting" -"2019-07-20 02:40:00.769 UTC [gossip.gossip] handleMessage -> DEBU 1493 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.770 UTC [gossip.pull] HandleMessage -> DEBU 1494 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.770 UTC [gossip.gossip] handleMessage -> DEBU 1495 Exiting" -"2019-07-20 02:40:00.770 UTC [gossip.gossip] handleMessage -> DEBU 1496 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.770 UTC [msp] DeserializeIdentity -> DEBU 1497 Obtaining identity" -"2019-07-20 02:40:00.771 UTC [msp] DeserializeIdentity -> DEBU 1498 Obtaining identity" -"2019-07-20 02:40:00.771 UTC [msp] DeserializeIdentity -> DEBU 1499 Obtaining identity" -"2019-07-20 02:40:00.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 149a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:00.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 149b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 149c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:00.772 UTC [cauthdsl] func1 -> DEBU 14a0 0xc003fe90c0 gate 1563590400772916400 evaluation starts" -"2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a1 0xc003fe90c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a2 0xc003fe90c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a3 0xc003fe90c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a4 0xc003fe90c0 principal evaluation fails" -"2019-07-20 02:40:00.773 UTC [cauthdsl] func1 -> DEBU 14a5 0xc003fe90c0 gate 1563590400772916400 evaluation fails" -"2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:00.774 UTC [cauthdsl] func1 -> DEBU 14a9 0xc003fe9900 gate 1563590400774755500 evaluation starts" -"2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14aa 0xc003fe9900 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14ab 0xc003fe9900 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14ac 0xc003fe9900 principal matched by identity 0" -"2019-07-20 02:40:00.775 UTC [msp.identity] Verify -> DEBU 14ad Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:00.775 UTC [msp.identity] Verify -> DEBU 14ae Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:00.776 UTC [cauthdsl] func2 -> DEBU 14af 0xc003fe9900 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:00.776 UTC [cauthdsl] func1 -> DEBU 14b0 0xc003fe9900 gate 1563590400774755500 evaluation succeeds" -"2019-07-20 02:40:00.776 UTC [policies] Evaluate -> DEBU 14b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b3 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:00.777 UTC [msp.identity] Verify -> DEBU 14b5 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:00.778 UTC [msp.identity] Verify -> DEBU 14b6 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:00.778 UTC [msp] DeserializeIdentity -> DEBU 14b7 Obtaining identity" -"2019-07-20 02:40:00.778 UTC [msp] DeserializeIdentity -> DEBU 14b8 Obtaining identity" -"2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14b9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14ba Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14bb Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14bd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14be == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:00.780 UTC [cauthdsl] func1 -> DEBU 14bf 0xc003f94080 gate 1563590400780667200 evaluation starts" -"2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c0 0xc003f94080 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c1 0xc003f94080 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c2 0xc003f94080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c3 0xc003f94080 principal evaluation fails" -"2019-07-20 02:40:00.781 UTC [cauthdsl] func1 -> DEBU 14c4 0xc003f94080 gate 1563590400780667200 evaluation fails" -"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:00.782 UTC [cauthdsl] func1 -> DEBU 14c8 0xc003f948c0 gate 1563590400782561100 evaluation starts" -"2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14c9 0xc003f948c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14ca 0xc003f948c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14cb 0xc003f948c0 principal matched by identity 0" -"2019-07-20 02:40:00.782 UTC [msp.identity] Verify -> DEBU 14cc Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:00.782 UTC [msp.identity] Verify -> DEBU 14cd Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14ce 0xc003f948c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:00.782 UTC [cauthdsl] func1 -> DEBU 14cf 0xc003f948c0 gate 1563590400782561100 evaluation succeeds" -"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d2 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:00.783 UTC [msp.identity] Verify -> DEBU 14d4 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:00.783 UTC [msp.identity] Verify -> DEBU 14d5 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:00.783 UTC [gossip.gossip] handleMessage -> DEBU 14d6 Exiting" -"2019-07-20 02:40:00.878 UTC [gossip.comm] func1 -> DEBU 14d7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.878 UTC [gossip.gossip] handleMessage -> DEBU 14d8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.878 UTC [msp] DeserializeIdentity -> DEBU 14d9 Obtaining identity" -"2019-07-20 02:40:00.878 UTC [msp] DeserializeIdentity -> DEBU 14da Obtaining identity" -"2019-07-20 02:40:00.878 UTC [gossip.gossip] handleMessage -> DEBU 14db Exiting" -"2019-07-20 02:40:00.894 UTC [gossip.comm] func1 -> DEBU 14dc Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.894 UTC [gossip.gossip] handleMessage -> DEBU 14dd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.894 UTC [gossip.pull] HandleMessage -> DEBU 14de GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:00.895 UTC [gossip.pull] SendDigest -> DEBU 14df Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:00.895 UTC [gossip.gossip] handleMessage -> DEBU 14e0 Exiting" -"2019-07-20 02:40:01.043 UTC [gossip.comm] func1 -> DEBU 14e1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:01.044 UTC [gossip.gossip] handleMessage -> DEBU 14e2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:01.044 UTC [msp] DeserializeIdentity -> DEBU 14e3 Obtaining identity" -"2019-07-20 02:40:01.045 UTC [msp] DeserializeIdentity -> DEBU 14e4 Obtaining identity" -"2019-07-20 02:40:01.045 UTC [msp] DeserializeIdentity -> DEBU 14e5 Obtaining identity" -"2019-07-20 02:40:01.046 UTC [gossip.gossip] handleMessage -> DEBU 14e6 Exiting" -"2019-07-20 02:40:01.182 UTC [gossip.comm] func1 -> DEBU 14e7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:01.183 UTC [gossip.gossip] handleMessage -> DEBU 14e8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:01.183 UTC [msp] DeserializeIdentity -> DEBU 14e9 Obtaining identity" -"2019-07-20 02:40:01.183 UTC [msp] DeserializeIdentity -> DEBU 14ea Obtaining identity" -"2019-07-20 02:40:01.184 UTC [msp] DeserializeIdentity -> DEBU 14eb Obtaining identity" -"2019-07-20 02:40:01.184 UTC [gossip.gossip] handleMessage -> DEBU 14ec Exiting" -"2019-07-20 02:40:01.752 UTC [gossip.election] waitForInterrupt -> DEBU 14ed c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:01.752 UTC [gossip.election] IsLeader -> DEBU 14ee c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:01.752 UTC [msp] GetDefaultSigningIdentity -> DEBU 14ef Obtaining default signing identity" -"2019-07-20 02:40:01.752 UTC [msp.identity] Sign -> DEBU 14f0 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510051801 " -"2019-07-20 02:40:01.753 UTC [msp.identity] Sign -> DEBU 14f1 Sign: digest: E591A4CF9EA32E358DCA63E1CA940EE9984AD1C9CC3264A0DA2FF9495EA9026B " -"2019-07-20 02:40:01.753 UTC [gossip.election] waitForInterrupt -> DEBU 14f2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:01.759 UTC [msp] DeserializeIdentity -> DEBU 14f3 Obtaining identity" -"2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f4 Obtaining identity" -"2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f5 Obtaining identity" -"2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f6 Obtaining identity" -"2019-07-20 02:40:01.761 UTC [gossip.comm] Send -> DEBU 14f7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:01.762 UTC [msp] DeserializeIdentity -> DEBU 14f8 Obtaining identity" -"2019-07-20 02:40:01.762 UTC [msp] DeserializeIdentity -> DEBU 14f9 Obtaining identity" -"2019-07-20 02:40:01.762 UTC [gossip.comm] sendToEndpoint -> DEBU 14fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -"2019-07-20 02:40:01.762 UTC [gossip.comm] sendToEndpoint -> DEBU 14fb Exiting" -"2019-07-20 02:40:01.918 UTC [gossip.comm] func1 -> DEBU 14fc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.918 UTC [gossip.gossip] handleMessage -> DEBU 14fd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.918 UTC [gossip.gossip] handleMessage -> DEBU 14fe Exiting" -"2019-07-20 02:40:01.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14ff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.918 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1500 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:01.918 UTC [msp] DeserializeIdentity -> DEBU 1501 Obtaining identity" -"2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1502 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1503 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1504 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1505 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1506 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:01.919 UTC [cauthdsl] func1 -> DEBU 1508 0xc0029ef890 gate 1563590401919773100 evaluation starts" -"2019-07-20 02:40:01.919 UTC [cauthdsl] func2 -> DEBU 1509 0xc0029ef890 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:01.919 UTC [cauthdsl] func2 -> DEBU 150a 0xc0029ef890 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 150b 0xc0029ef890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 150c 0xc0029ef890 principal evaluation fails" -"2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 150d 0xc0029ef890 gate 1563590401919773100 evaluation fails" -"2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 150e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 150f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 1510 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 1511 0xc0032980d0 gate 1563590401920244600 evaluation starts" -"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1512 0xc0032980d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1513 0xc0032980d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1514 0xc0032980d0 principal matched by identity 0" -"2019-07-20 02:40:01.920 UTC [msp.identity] Verify -> DEBU 1515 Verify: digest = 00000000 01 6e a2 f4 56 9e 32 2d 9f 4d 9e 02 c5 6d e9 28 |.n..V.2-.M...m.(| -00000010 82 4c 1a 7d a9 37 3b a0 a1 d0 24 8e 58 10 7e 72 |.L.}.7;...$.X.~r|" -"2019-07-20 02:40:01.920 UTC [msp.identity] Verify -> DEBU 1516 Verify: sig = 00000000 30 45 02 21 00 ae 66 68 23 a1 f5 68 b8 52 0a 95 |0E.!..fh#..h.R..| -00000010 38 01 2f 29 74 0a ec cf 66 5c b3 e2 e4 4a 07 b6 |8./)t...f\...J..| -00000020 83 43 09 a6 8b 02 20 24 4b 00 91 b7 55 5a 4f fd |.C.... $K...UZO.| -00000030 b0 04 1f d7 42 9d 48 c6 53 0c 2e 60 c7 b9 42 8d |....B.H.S..`..B.| -00000040 60 b0 80 44 f4 c2 73 |`..D..s|" -"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1517 0xc0032980d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 1518 0xc0032980d0 gate 1563590401920244600 evaluation succeeds" -"2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 1519 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 151a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:01.921 UTC [policies] Evaluate -> DEBU 151b Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:01.921 UTC [policies] Evaluate -> DEBU 151c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:01.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 151d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 151e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 151f updating membership: timestamp: " -"2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1520 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1521 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1522 Exiting" -"2019-07-20 02:40:01.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 1523 Exiting" -"2019-07-20 02:40:01.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1524 Exiting" -"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1525 Obtaining identity" -"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1526 Obtaining identity" -"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1527 Obtaining identity" -"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1528 Obtaining identity" -"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1529 Obtaining identity" -"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 152a Obtaining identity" -"2019-07-20 02:40:01.922 UTC [gossip.comm] Send -> DEBU 152b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:01.923 UTC [msp] DeserializeIdentity -> DEBU 152c Obtaining identity" -"2019-07-20 02:40:01.923 UTC [msp] DeserializeIdentity -> DEBU 152d Obtaining identity" -"2019-07-20 02:40:01.923 UTC [gossip.comm] Send -> DEBU 152e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 152f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 1530 Exiting" -"2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 1531 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.924 UTC [gossip.comm] sendToEndpoint -> DEBU 1532 Exiting" -"2019-07-20 02:40:01.927 UTC [gossip.comm] func1 -> DEBU 1533 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.928 UTC [gossip.gossip] handleMessage -> DEBU 1534 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.928 UTC [gossip.gossip] handleMessage -> DEBU 1535 Exiting" -"2019-07-20 02:40:01.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1536 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1537 Exiting" -"2019-07-20 02:40:01.929 UTC [gossip.comm] func1 -> DEBU 1538 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.929 UTC [gossip.gossip] handleMessage -> DEBU 1539 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.929 UTC [gossip.gossip] handleMessage -> DEBU 153a Exiting" -"2019-07-20 02:40:01.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 153b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:01.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 153c Exiting" -"2019-07-20 02:40:02.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 153d Obtaining default signing identity" -"2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 153e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151017 " -"2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 153f Sign: digest: 52DA398D25C6952AA335AE471E2837386B978F542632A147D2426BCCA07AF961 " -"2019-07-20 02:40:02.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 1540 Obtaining default signing identity" -"2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 1541 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 1542 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:02.233 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1543 Sleeping 5s" -"2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1544 Obtaining identity" -"2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1545 Obtaining identity" -"2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1546 Obtaining identity" -"2019-07-20 02:40:02.243 UTC [gossip.comm] Send -> DEBU 1547 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:02.243 UTC [msp] DeserializeIdentity -> DEBU 1548 Obtaining identity" -"2019-07-20 02:40:02.243 UTC [gossip.comm] Send -> DEBU 154a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:02.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1549 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154c Exiting" -"2019-07-20 02:40:02.244 UTC [gossip.comm] Send -> DEBU 154b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154e Exiting" -"2019-07-20 02:40:02.245 UTC [gossip.comm] sendToEndpoint -> DEBU 154f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1550 Exiting" -"2019-07-20 02:40:02.364 UTC [gossip.comm] func1 -> DEBU 1551 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.364 UTC [gossip.gossip] handleMessage -> DEBU 1552 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.365 UTC [gossip.gossip] handleMessage -> DEBU 1553 Exiting" -"2019-07-20 02:40:02.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1554 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1555 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:02.365 UTC [msp.identity] Verify -> DEBU 1556 Verify: digest = 00000000 12 ed 66 37 d8 7d 6d 4a af f4 3b c5 b5 74 a3 82 |..f7.}mJ..;..t..| -00000010 a4 55 75 f0 db 21 d1 0a 5c ed 2f 80 93 fb 4d 92 |.Uu..!..\./...M.|" -"2019-07-20 02:40:02.365 UTC [msp.identity] Verify -> DEBU 1557 Verify: sig = 00000000 30 44 02 20 55 29 6a d6 d7 c4 9a 7a 22 63 cb 7c |0D. U)j....z"c.|| -00000010 4c 8e 6a 15 40 46 b6 56 87 cb 42 22 ef 19 fa 5d |L.j.@F.V..B"...]| -00000020 ec a2 10 6b 02 20 32 94 4a 8d f1 90 5b e8 6c 72 |...k. 2.J...[.lr| -00000030 18 3b 32 78 3d db e9 e2 44 4c 4c bc 78 f0 f3 4d |.;2x=...DLL.x..M| -00000040 a4 ba 04 56 60 f2 |...V`.|" -"2019-07-20 02:40:02.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 1558 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 1559 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 155a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 155b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:02.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 155c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:02.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 155d Exiting" -"2019-07-20 02:40:02.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 155e Exiting" -"2019-07-20 02:40:02.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 155f Exiting" -"2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1560 Obtaining identity" -"2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1561 Obtaining identity" -"2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1562 Obtaining identity" -"2019-07-20 02:40:02.372 UTC [gossip.comm] Send -> DEBU 1563 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1564 Obtaining identity" -"2019-07-20 02:40:02.372 UTC [gossip.comm] Send -> DEBU 1565 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1566 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1567 Exiting" -"2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1568 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1569 Exiting" -"2019-07-20 02:40:02.375 UTC [gossip.comm] func1 -> DEBU 156a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.375 UTC [gossip.gossip] handleMessage -> DEBU 156b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.375 UTC [gossip.gossip] handleMessage -> DEBU 156c Exiting" -"2019-07-20 02:40:02.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156e Exiting" -"2019-07-20 02:40:02.376 UTC [gossip.comm] func1 -> DEBU 156f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.376 UTC [gossip.gossip] handleMessage -> DEBU 1570 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.376 UTC [gossip.gossip] handleMessage -> DEBU 1571 Exiting" -"2019-07-20 02:40:02.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1572 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:02.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1573 Exiting" -"2019-07-20 02:40:02.547 UTC [gossip.comm] func1 -> DEBU 1574 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.547 UTC [gossip.gossip] handleMessage -> DEBU 1575 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.547 UTC [gossip.gossip] handleMessage -> DEBU 1576 Exiting" -"2019-07-20 02:40:02.547 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1577 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.547 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1578 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:02.547 UTC [msp] DeserializeIdentity -> DEBU 1579 Obtaining identity" -"2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 157a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:02.547 UTC [cauthdsl] func1 -> DEBU 1580 0xc00350b830 gate 1563590402547835300 evaluation starts" -"2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1581 0xc00350b830 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1582 0xc00350b830 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1583 0xc00350b830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1584 0xc00350b830 principal evaluation fails" -"2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1585 0xc00350b830 gate 1563590402547835300 evaluation fails" -"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1586 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1587 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1588 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1589 0xc0036da070 gate 1563590402548125100 evaluation starts" -"2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158a 0xc0036da070 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158b 0xc0036da070 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158c 0xc0036da070 principal matched by identity 0" -"2019-07-20 02:40:02.548 UTC [msp.identity] Verify -> DEBU 158d Verify: digest = 00000000 d6 76 c2 ed a9 5d aa 5d 9f 67 c5 7e 78 4f be 32 |.v...].].g.~xO.2| -00000010 55 06 f7 08 6d fc ce 81 17 8b 24 37 0e 6a 35 2b |U...m.....$7.j5+|" -"2019-07-20 02:40:02.548 UTC [msp.identity] Verify -> DEBU 158e Verify: sig = 00000000 30 45 02 21 00 87 a0 1c 2d c8 14 12 6c 23 2e fb |0E.!....-...l#..| -00000010 88 f7 be 3d b8 e4 ce df 25 55 26 31 97 5b 85 91 |...=....%U&1.[..| -00000020 8d 2c 57 61 ee 02 20 72 cc c4 a2 95 38 a3 ca d1 |.,Wa.. r....8...| -00000030 df c2 50 9d 3b 01 f7 f3 9f 82 90 1a 72 57 89 80 |..P.;.......rW..| -00000040 24 92 e5 d3 b9 72 a6 |$....r.|" -"2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158f 0xc0036da070 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1590 0xc0036da070 gate 1563590402548125100 evaluation succeeds" -"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1591 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1592 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1593 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1594 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:02.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 1595 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1596 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1597 updating membership: timestamp: " -"2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1598 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1599 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 159a Exiting" -"2019-07-20 02:40:02.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 159b Exiting" -"2019-07-20 02:40:02.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 159c Exiting" -"2019-07-20 02:40:02.555 UTC [msp] DeserializeIdentity -> DEBU 159d Obtaining identity" -"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 159e Obtaining identity" -"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 159f Obtaining identity" -"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a0 Obtaining identity" -"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a1 Obtaining identity" -"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a2 Obtaining identity" -"2019-07-20 02:40:02.556 UTC [gossip.comm] Send -> DEBU 15a3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a4 Obtaining identity" -"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a5 Obtaining identity" -"2019-07-20 02:40:02.556 UTC [gossip.comm] Send -> DEBU 15a6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a8 Exiting" -"2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15aa Exiting" -"2019-07-20 02:40:02.558 UTC [gossip.comm] func1 -> DEBU 15ab Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.558 UTC [gossip.gossip] handleMessage -> DEBU 15ac Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.558 UTC [gossip.gossip] handleMessage -> DEBU 15ad Exiting" -"2019-07-20 02:40:02.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15ae Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15af Exiting" -"2019-07-20 02:40:02.559 UTC [gossip.comm] func1 -> DEBU 15b0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.559 UTC [gossip.gossip] handleMessage -> DEBU 15b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.559 UTC [gossip.gossip] handleMessage -> DEBU 15b2 Exiting" -"2019-07-20 02:40:02.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:02.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b4 Exiting" -"2019-07-20 02:40:03.914 UTC [gossip.comm] func1 -> DEBU 15b5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:03.914 UTC [gossip.gossip] handleMessage -> DEBU 15b6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:03.915 UTC [gossip.gossip] handleMessage -> DEBU 15b7 Exiting" -"2019-07-20 02:40:03.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:03.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15b9 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:03.917 UTC [msp] DeserializeIdentity -> DEBU 15ba Obtaining identity" -"2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15bb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bc Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bd Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:03.917 UTC [cauthdsl] func1 -> DEBU 15c1 0xc0037e93a0 gate 1563590403917788500 evaluation starts" -"2019-07-20 02:40:03.917 UTC [cauthdsl] func2 -> DEBU 15c2 0xc0037e93a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c3 0xc0037e93a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c4 0xc0037e93a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c5 0xc0037e93a0 principal evaluation fails" -"2019-07-20 02:40:03.918 UTC [cauthdsl] func1 -> DEBU 15c6 0xc0037e93a0 gate 1563590403917788500 evaluation fails" -"2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:03.918 UTC [cauthdsl] func1 -> DEBU 15ca 0xc0037e9be0 gate 1563590403918507600 evaluation starts" -"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cb 0xc0037e9be0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cc 0xc0037e9be0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cd 0xc0037e9be0 principal matched by identity 0" -"2019-07-20 02:40:03.918 UTC [msp.identity] Verify -> DEBU 15ce Verify: digest = 00000000 ed a0 7b e2 02 8d a0 60 77 b3 ce d9 25 9a 9d d4 |..{....`w...%...| -00000010 32 a9 ef 45 4b 8b 7e 60 4b 2e 88 d0 60 61 03 e7 |2..EK.~`K...`a..|" -"2019-07-20 02:40:03.918 UTC [msp.identity] Verify -> DEBU 15cf Verify: sig = 00000000 30 44 02 20 10 4d 8a 1f 60 6a ea e7 59 27 ed 41 |0D. .M..`j..Y'.A| -00000010 bf f4 aa 38 be 45 c1 ed 3b 4a a8 9f 92 b9 67 be |...8.E..;J....g.| -00000020 61 f6 03 e2 02 20 10 ad 2c 33 b8 fc c5 66 15 11 |a.... ..,3...f..| -00000030 6c 82 24 9d 85 fd 69 01 6d 9c 26 b5 f1 a5 d3 1d |l.$...i.m.&.....| -00000040 c0 28 b6 d6 5d 37 |.(..]7|" -"2019-07-20 02:40:03.919 UTC [cauthdsl] func2 -> DEBU 15d0 0xc0037e9be0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:03.919 UTC [cauthdsl] func1 -> DEBU 15d1 0xc0037e9be0 gate 1563590403918507600 evaluation succeeds" -"2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d4 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:03.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 15d6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d8 updating membership: timestamp: " -"2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d9 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15da Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15db Exiting" -"2019-07-20 02:40:03.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 15dc Exiting" -"2019-07-20 02:40:03.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15dd Exiting" -"2019-07-20 02:40:03.920 UTC [gossip.discovery] sendMemResponse -> DEBU 15de Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15df Obtaining identity" -"2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15e0 Obtaining identity" -"2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15e1 Obtaining identity" -"2019-07-20 02:40:03.920 UTC [gossip.comm] Send -> DEBU 15e2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:03.920 UTC [gossip.discovery] sendMemResponse -> DEBU 15e3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\033" signature:"0D\002 U)j\326\327\304\232z\"c\313|L\216j\025@F\266V\207\313B\"\357\031\372]\354\242\020k\002 2\224J\215\361\220[\350lr\030;2x=\333\351\342DLL\274x\360\363M\244\272\004V`\362" > alive: alive: alive: " -"2019-07-20 02:40:03.920 UTC [gossip.comm] sendToEndpoint -> DEBU 15e4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:03.920 UTC [gossip.comm] sendToEndpoint -> DEBU 15e5 Exiting" -"2019-07-20 02:40:03.923 UTC [gossip.comm] func1 -> DEBU 15e6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:03.923 UTC [gossip.gossip] handleMessage -> DEBU 15e7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:03.923 UTC [gossip.pull] HandleMessage -> DEBU 15e8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15e9 Obtaining identity" -"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ea Obtaining identity" -"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15eb Obtaining identity" -"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ec Obtaining identity" -"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ed Obtaining identity" -"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ee Obtaining identity" -"2019-07-20 02:40:03.924 UTC [gossip.pull] SendDigest -> DEBU 15ef Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:03.924 UTC [gossip.gossip] handleMessage -> DEBU 15f0 Exiting" -"2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f1 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f3 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f5 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:04.241 UTC [gossip.comm] sendToEndpoint -> DEBU 15f7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.241 UTC [gossip.comm] sendToEndpoint -> DEBU 15f8 Exiting" -"2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15f9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fa Exiting" -"2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fc Exiting" -"2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15fd Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.243 UTC [gossip.gossip] handleMessage -> DEBU 1600 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15fe Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15ff Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.244 UTC [gossip.pull] HandleMessage -> DEBU 1601 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.244 UTC [gossip.gossip] handleMessage -> DEBU 1602 Exiting" -"2019-07-20 02:40:04.244 UTC [gossip.gossip] handleMessage -> DEBU 1603 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.245 UTC [gossip.pull] HandleMessage -> DEBU 1604 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.245 UTC [gossip.gossip] handleMessage -> DEBU 1605 Exiting" -"2019-07-20 02:40:04.245 UTC [gossip.gossip] handleMessage -> DEBU 1606 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.246 UTC [gossip.pull] HandleMessage -> DEBU 1607 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.246 UTC [gossip.gossip] handleMessage -> DEBU 1608 Exiting" -"2019-07-20 02:40:04.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 1609 Obtaining default signing identity" -"2019-07-20 02:40:04.277 UTC [msp.identity] Sign -> DEBU 160a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151018 " -"2019-07-20 02:40:04.277 UTC [msp.identity] Sign -> DEBU 160b Sign: digest: 93D1F13605203EFCFEF67678C6420F3747E27FD1936093D97526EA62CD9AE28D " -"2019-07-20 02:40:04.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 160c Obtaining default signing identity" -"2019-07-20 02:40:04.278 UTC [msp.identity] Sign -> DEBU 160d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:04.278 UTC [msp.identity] Sign -> DEBU 160e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 160f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:04.278 UTC [msp] DeserializeIdentity -> DEBU 1610 Obtaining identity" -"2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 1611 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:04.278 UTC [msp] DeserializeIdentity -> DEBU 1612 Obtaining identity" -"2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 1613 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1614 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1615 Exiting" -"2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1616 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.279 UTC [gossip.comm] sendToEndpoint -> DEBU 1617 Exiting" -"2019-07-20 02:40:04.280 UTC [gossip.comm] func1 -> DEBU 1618 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.280 UTC [gossip.gossip] handleMessage -> DEBU 1619 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.280 UTC [gossip.gossip] handleMessage -> DEBU 161a Exiting" -"2019-07-20 02:40:04.280 UTC [gossip.discovery] handleMsgFromComm -> DEBU 161b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 161c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:04.280 UTC [msp.identity] Verify -> DEBU 161d Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| -00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" -"2019-07-20 02:40:04.280 UTC [msp.identity] Verify -> DEBU 161e Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| -00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| -00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| -00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| -00000040 5a b2 a9 7e 27 67 |Z..~'g|" -"2019-07-20 02:40:04.280 UTC [gossip.discovery] handleAliveMessage -> DEBU 161f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:04.280 UTC [gossip.discovery] isSentByMe -> DEBU 1620 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:04.280 UTC [gossip.discovery] handleAliveMessage -> DEBU 1621 Exiting" -"2019-07-20 02:40:04.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1622 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:04.281 UTC [msp] DeserializeIdentity -> DEBU 1623 Obtaining identity" -"2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1624 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1625 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1626 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1627 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1628 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1629 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 162a 0xc003e0ba00 gate 1563590404281511600 evaluation starts" -"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162b 0xc003e0ba00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162c 0xc003e0ba00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162d 0xc003e0ba00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162e 0xc003e0ba00 principal evaluation fails" -"2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 162f 0xc003e0ba00 gate 1563590404281511600 evaluation fails" -"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1630 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1631 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1632 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 1633 0xc003f84240 gate 1563590404281840000 evaluation starts" -"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 1634 0xc003f84240 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 1635 0xc003f84240 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.282 UTC [cauthdsl] func2 -> DEBU 1636 0xc003f84240 principal matched by identity 0" -"2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1637 Verify: digest = 00000000 ed a0 7b e2 02 8d a0 60 77 b3 ce d9 25 9a 9d d4 |..{....`w...%...| -00000010 32 a9 ef 45 4b 8b 7e 60 4b 2e 88 d0 60 61 03 e7 |2..EK.~`K...`a..|" -"2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1638 Verify: sig = 00000000 30 44 02 20 10 4d 8a 1f 60 6a ea e7 59 27 ed 41 |0D. .M..`j..Y'.A| -00000010 bf f4 aa 38 be 45 c1 ed 3b 4a a8 9f 92 b9 67 be |...8.E..;J....g.| -00000020 61 f6 03 e2 02 20 10 ad 2c 33 b8 fc c5 66 15 11 |a.... ..,3...f..| -00000030 6c 82 24 9d 85 fd 69 01 6d 9c 26 b5 f1 a5 d3 1d |l.$...i.m.&.....| -00000040 c0 28 b6 d6 5d 37 |.(..]7|" -"2019-07-20 02:40:04.282 UTC [cauthdsl] func2 -> DEBU 1639 0xc003f84240 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:04.282 UTC [cauthdsl] func1 -> DEBU 163a 0xc003f84240 gate 1563590404281840000 evaluation succeeds" -"2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 163f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 1640 Exiting" -"2019-07-20 02:40:04.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1641 Exiting" -"2019-07-20 02:40:04.282 UTC [gossip.comm] func1 -> DEBU 1642 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.282 UTC [gossip.gossip] handleMessage -> DEBU 1643 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.282 UTC [gossip.gossip] handleMessage -> DEBU 1644 Exiting" -"2019-07-20 02:40:04.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1645 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1646 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1647 Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| -00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" -"2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1648 Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| -00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| -00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| -00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| -00000040 5a b2 a9 7e 27 67 |Z..~'g|" -"2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 1649 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:04.283 UTC [gossip.discovery] isSentByMe -> DEBU 164a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:04.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 164b Exiting" -"2019-07-20 02:40:04.283 UTC [gossip.discovery] handleMsgFromComm -> DEBU 164c Exiting" -"2019-07-20 02:40:04.280 UTC [gossip.comm] sendToEndpoint -> DEBU 164d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.284 UTC [gossip.comm] sendToEndpoint -> DEBU 164e Exiting" -"2019-07-20 02:40:04.286 UTC [gossip.comm] func1 -> DEBU 164f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.286 UTC [gossip.gossip] handleMessage -> DEBU 1650 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.286 UTC [gossip.gossip] handleMessage -> DEBU 1651 Exiting" -"2019-07-20 02:40:04.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1652 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1653 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:04.286 UTC [msp.identity] Verify -> DEBU 1654 Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| -00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" -"2019-07-20 02:40:04.286 UTC [msp.identity] Verify -> DEBU 1655 Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| -00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| -00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| -00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| -00000040 5a b2 a9 7e 27 67 |Z..~'g|" -"2019-07-20 02:40:04.287 UTC [msp.identity] Verify -> DEBU 1656 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:04.287 UTC [msp.identity] Verify -> DEBU 1657 Verify: sig = 00000000 30 45 02 21 00 c1 8e d2 c4 0a a7 e6 72 3d a6 38 |0E.!........r=.8| -00000010 0f ed 4d f7 c8 ec bd 0a 7f 2d 0e 1f 54 d9 70 6e |..M......-..T.pn| -00000020 76 b4 c6 ca 9b 02 20 0d c8 ac 59 5e 61 b8 a8 d2 |v..... ...Y^a...| -00000030 d5 11 5d f8 4a c1 95 66 ba 70 72 58 ce 1d 8c 1e |..].J..f.prX....| -00000040 26 8a bc 78 94 f0 33 |&..x..3|" -"2019-07-20 02:40:04.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 1658 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:04.287 UTC [gossip.discovery] isSentByMe -> DEBU 1659 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:04.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 165a Exiting" -"2019-07-20 02:40:04.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 165b Exiting" -"2019-07-20 02:40:04.362 UTC [gossip.comm] func1 -> DEBU 165c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.362 UTC [gossip.gossip] handleMessage -> DEBU 165d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.362 UTC [gossip.pull] HandleMessage -> DEBU 165e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.362 UTC [gossip.pull] SendDigest -> DEBU 165f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:04.362 UTC [gossip.gossip] handleMessage -> DEBU 1660 Exiting" -"2019-07-20 02:40:04.363 UTC [gossip.comm] func1 -> DEBU 1661 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.364 UTC [gossip.gossip] handleMessage -> DEBU 1662 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.365 UTC [gossip.gossip] handleMessage -> DEBU 1663 Exiting" -"2019-07-20 02:40:04.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1664 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.366 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1665 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:04.366 UTC [msp.identity] Verify -> DEBU 1666 Verify: digest = 00000000 30 9c 61 33 0d 39 d2 88 0b 7d 64 96 99 e0 6f 00 |0.a3.9...}d...o.| -00000010 a6 8d 29 70 ab 8e a8 ef d6 2f d8 b6 8b 78 a4 ac |..)p...../...x..|" -"2019-07-20 02:40:04.367 UTC [msp.identity] Verify -> DEBU 1667 Verify: sig = 00000000 30 44 02 20 66 67 dc 1d 84 59 fd 04 16 c6 d1 2a |0D. fg...Y.....*| -00000010 56 a8 c8 ec f2 6b 9d f0 c1 44 a3 35 1f 7e be 31 |V....k...D.5.~.1| -00000020 87 c0 51 9c 02 20 69 67 b6 4d 54 b7 80 c8 00 48 |..Q.. ig.MT....H| -00000030 87 18 f4 2a 54 93 fb cf a2 9d 1d ee a2 47 cd 75 |...*T........G.u| -00000040 d7 40 36 01 9e 5d |.@6..]|" -"2019-07-20 02:40:04.367 UTC [msp.identity] Verify -> DEBU 1668 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:04.369 UTC [msp.identity] Verify -> DEBU 1669 Verify: sig = 00000000 30 45 02 21 00 d7 a7 57 78 82 88 75 6e 35 1a 0b |0E.!...Wx..un5..| -00000010 ce 35 8a 83 35 96 a8 d0 ca f2 f0 70 9f 21 0b 28 |.5..5......p.!.(| -00000020 03 ca 0b 36 18 02 20 61 8a 8b 77 39 f4 77 9c 86 |...6.. a..w9.w..| -00000030 09 f2 3c a7 e0 5f 73 56 4c 38 99 d1 b7 25 d0 6a |..<.._sVL8...%.j| -00000040 93 11 2e 59 e1 fa e1 |...Y...|" -"2019-07-20 02:40:04.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 166a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:04.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 166b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:40:04.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 166c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166f Exiting" -"2019-07-20 02:40:04.371 UTC [gossip.discovery] handleAliveMessage -> DEBU 1670 Exiting" -"2019-07-20 02:40:04.372 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1671 Exiting" -"2019-07-20 02:40:04.372 UTC [gossip.discovery] sendMemResponse -> DEBU 1672 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:04.372 UTC [msp] DeserializeIdentity -> DEBU 1673 Obtaining identity" -"2019-07-20 02:40:04.372 UTC [msp] DeserializeIdentity -> DEBU 1674 Obtaining identity" -"2019-07-20 02:40:04.373 UTC [gossip.comm] Send -> DEBU 1675 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:04.373 UTC [gossip.discovery] sendMemResponse -> DEBU 1676 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > alive: " -"2019-07-20 02:40:04.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1677 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.374 UTC [gossip.comm] sendToEndpoint -> DEBU 1678 Exiting" -"2019-07-20 02:40:04.542 UTC [gossip.comm] func1 -> DEBU 1679 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.542 UTC [gossip.gossip] handleMessage -> DEBU 167a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.542 UTC [gossip.pull] HandleMessage -> DEBU 167b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167c Obtaining identity" -"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167d Obtaining identity" -"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167e Obtaining identity" -"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167f Obtaining identity" -"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 1680 Obtaining identity" -"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 1681 Obtaining identity" -"2019-07-20 02:40:04.542 UTC [gossip.pull] SendDigest -> DEBU 1682 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:04.542 UTC [gossip.gossip] handleMessage -> DEBU 1683 Exiting" -"2019-07-20 02:40:04.547 UTC [gossip.comm] func1 -> DEBU 1684 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.548 UTC [gossip.gossip] handleMessage -> DEBU 1685 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.548 UTC [gossip.gossip] handleMessage -> DEBU 1686 Exiting" -"2019-07-20 02:40:04.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1687 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.548 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1688 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:04.549 UTC [msp] DeserializeIdentity -> DEBU 1689 Obtaining identity" -"2019-07-20 02:40:04.549 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 168a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:04.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 168b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.550 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 168c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.550 UTC [policies] Evaluate -> DEBU 168d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:04.550 UTC [policies] Evaluate -> DEBU 168e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:04.551 UTC [policies] Evaluate -> DEBU 168f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:04.551 UTC [cauthdsl] func1 -> DEBU 1690 0xc0030b0240 gate 1563590404551482900 evaluation starts" -"2019-07-20 02:40:04.551 UTC [cauthdsl] func2 -> DEBU 1691 0xc0030b0240 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1692 0xc0030b0240 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1693 0xc0030b0240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1694 0xc0030b0240 principal evaluation fails" -"2019-07-20 02:40:04.552 UTC [cauthdsl] func1 -> DEBU 1695 0xc0030b0240 gate 1563590404551482900 evaluation fails" -"2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1696 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1697 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1698 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:04.553 UTC [cauthdsl] func1 -> DEBU 1699 0xc0030b0a80 gate 1563590404553822100 evaluation starts" -"2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169a 0xc0030b0a80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169b 0xc0030b0a80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169c 0xc0030b0a80 principal matched by identity 0" -"2019-07-20 02:40:04.555 UTC [msp.identity] Verify -> DEBU 169d Verify: digest = 00000000 9a 13 10 4b 51 eb b5 b0 d6 3e 7e d2 f8 2c 85 f6 |...KQ....>~..,..| -00000010 c2 e2 82 51 f4 47 c9 85 c8 16 41 f8 c6 cf 4f 52 |...Q.G....A...OR|" -"2019-07-20 02:40:04.555 UTC [msp.identity] Verify -> DEBU 169e Verify: sig = 00000000 30 44 02 20 49 d9 c5 d5 a7 f6 d5 1c ea ec 58 44 |0D. I.........XD| -00000010 d8 21 7c 49 ea cc ab d9 3d 7b 34 06 c3 87 6f e9 |.!|I....={4...o.| -00000020 a7 24 6a 4d 02 20 7e e0 73 cb 60 73 7b 79 03 58 |.$jM. ~.s.`s{y.X| -00000030 b7 8d fd d8 62 61 30 cb 2d d1 76 bb 03 a6 27 77 |....ba0.-.v...'w| -00000040 ea 97 9e 04 9f af |......|" -"2019-07-20 02:40:04.556 UTC [cauthdsl] func2 -> DEBU 169f 0xc0030b0a80 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:04.556 UTC [cauthdsl] func1 -> DEBU 16a0 0xc0030b0a80 gate 1563590404553822100 evaluation succeeds" -"2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a3 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:04.557 UTC [policies] Evaluate -> DEBU 16a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:04.557 UTC [gossip.discovery] handleAliveMessage -> DEBU 16a5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:04.557 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a7 updating membership: timestamp: " -"2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a8 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16aa Exiting" -"2019-07-20 02:40:04.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 16ab Exiting" -"2019-07-20 02:40:04.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16ac Exiting" -"2019-07-20 02:40:04.559 UTC [gossip.discovery] sendMemResponse -> DEBU 16ad Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:04.559 UTC [msp] DeserializeIdentity -> DEBU 16ae Obtaining identity" -"2019-07-20 02:40:04.560 UTC [msp] DeserializeIdentity -> DEBU 16af Obtaining identity" -"2019-07-20 02:40:04.560 UTC [msp] DeserializeIdentity -> DEBU 16b0 Obtaining identity" -"2019-07-20 02:40:04.560 UTC [gossip.comm] Send -> DEBU 16b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:04.560 UTC [gossip.discovery] sendMemResponse -> DEBU 16b2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" > alive: alive: alive: " -"2019-07-20 02:40:04.560 UTC [gossip.comm] sendToEndpoint -> DEBU 16b3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.561 UTC [gossip.comm] sendToEndpoint -> DEBU 16b4 Exiting" -"2019-07-20 02:40:04.718 UTC [msp] DeserializeIdentity -> DEBU 16b5 Obtaining identity" -"2019-07-20 02:40:04.718 UTC [msp] DeserializeIdentity -> DEBU 16b6 Obtaining identity" -"2019-07-20 02:40:04.718 UTC [gossip.comm] Send -> DEBU 16b7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16b9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16ba Exiting" -"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bc Exiting" -"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16b8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bd Exiting" -"2019-07-20 02:40:04.719 UTC [gossip.comm] func1 -> DEBU 16be Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.720 UTC [gossip.gossip] handleMessage -> DEBU 16c0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.720 UTC [msp] DeserializeIdentity -> DEBU 16c2 Obtaining identity" -"2019-07-20 02:40:04.720 UTC [gossip.comm] func1 -> DEBU 16c1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.719 UTC [gossip.comm] func1 -> DEBU 16bf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.721 UTC [msp] DeserializeIdentity -> DEBU 16c3 Obtaining identity" -"2019-07-20 02:40:04.721 UTC [msp] DeserializeIdentity -> DEBU 16c4 Obtaining identity" -"2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16c5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16c6 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16c7 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.722 UTC [policies] Evaluate -> DEBU 16c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:04.723 UTC [policies] Evaluate -> DEBU 16c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:04.723 UTC [policies] Evaluate -> DEBU 16ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:04.723 UTC [cauthdsl] func1 -> DEBU 16cb 0xc00333b930 gate 1563590404723377000 evaluation starts" -"2019-07-20 02:40:04.726 UTC [cauthdsl] func2 -> DEBU 16cc 0xc00333b930 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.726 UTC [cauthdsl] func2 -> DEBU 16cd 0xc00333b930 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.727 UTC [cauthdsl] func2 -> DEBU 16ce 0xc00333b930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:04.727 UTC [cauthdsl] func2 -> DEBU 16cf 0xc00333b930 principal evaluation fails" -"2019-07-20 02:40:04.728 UTC [cauthdsl] func1 -> DEBU 16d0 0xc00333b930 gate 1563590404723377000 evaluation fails" -"2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:04.729 UTC [cauthdsl] func1 -> DEBU 16d4 0xc0033ec170 gate 1563590404729020200 evaluation starts" -"2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d5 0xc0033ec170 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d6 0xc0033ec170 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d7 0xc0033ec170 principal matched by identity 0" -"2019-07-20 02:40:04.729 UTC [msp.identity] Verify -> DEBU 16d8 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:04.730 UTC [msp.identity] Verify -> DEBU 16d9 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:04.730 UTC [cauthdsl] func2 -> DEBU 16da 0xc0033ec170 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:04.730 UTC [cauthdsl] func1 -> DEBU 16db 0xc0033ec170 gate 1563590404729020200 evaluation succeeds" -"2019-07-20 02:40:04.730 UTC [policies] Evaluate -> DEBU 16dc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16de Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:04.732 UTC [msp.identity] Verify -> DEBU 16e0 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:04.732 UTC [msp.identity] Verify -> DEBU 16e1 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:04.733 UTC [msp] DeserializeIdentity -> DEBU 16e2 Obtaining identity" -"2019-07-20 02:40:04.733 UTC [msp] DeserializeIdentity -> DEBU 16e3 Obtaining identity" -"2019-07-20 02:40:04.733 UTC [gossip.pull] Hello -> DEBU 16e4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:04.734 UTC [msp] DeserializeIdentity -> DEBU 16e5 Obtaining identity" -"2019-07-20 02:40:04.734 UTC [msp] DeserializeIdentity -> DEBU 16e6 Obtaining identity" -"2019-07-20 02:40:04.734 UTC [gossip.comm] Send -> DEBU 16e7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:04.734 UTC [gossip.comm] sendToEndpoint -> DEBU 16e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.734 UTC [gossip.comm] sendToEndpoint -> DEBU 16e9 Exiting" -"2019-07-20 02:40:04.735 UTC [gossip.comm] func1 -> DEBU 16ea Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.735 UTC [msp.identity] Verify -> DEBU 16eb Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:04.736 UTC [msp.identity] Verify -> DEBU 16ec Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:04.737 UTC [msp] DeserializeIdentity -> DEBU 16ed Obtaining identity" -"2019-07-20 02:40:04.738 UTC [msp] DeserializeIdentity -> DEBU 16ee Obtaining identity" -"2019-07-20 02:40:04.738 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:04.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16f0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16f1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.739 UTC [policies] Evaluate -> DEBU 16f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:04.740 UTC [policies] Evaluate -> DEBU 16f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:04.740 UTC [policies] Evaluate -> DEBU 16f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:04.741 UTC [cauthdsl] func1 -> DEBU 16f5 0xc003976780 gate 1563590404741004700 evaluation starts" -"2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f6 0xc003976780 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f7 0xc003976780 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f8 0xc003976780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:04.742 UTC [cauthdsl] func2 -> DEBU 16f9 0xc003976780 principal evaluation fails" -"2019-07-20 02:40:04.742 UTC [cauthdsl] func1 -> DEBU 16fa 0xc003976780 gate 1563590404741004700 evaluation fails" -"2019-07-20 02:40:04.742 UTC [policies] Evaluate -> DEBU 16fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.743 UTC [policies] Evaluate -> DEBU 16fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.743 UTC [policies] Evaluate -> DEBU 16fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:04.744 UTC [cauthdsl] func1 -> DEBU 16fe 0xc003976fc0 gate 1563590404743984100 evaluation starts" -"2019-07-20 02:40:04.744 UTC [cauthdsl] func2 -> DEBU 16ff 0xc003976fc0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.744 UTC [cauthdsl] func2 -> DEBU 1700 0xc003976fc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.745 UTC [cauthdsl] func2 -> DEBU 1701 0xc003976fc0 principal matched by identity 0" -"2019-07-20 02:40:04.745 UTC [msp.identity] Verify -> DEBU 1702 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:04.746 UTC [msp.identity] Verify -> DEBU 1703 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:04.747 UTC [cauthdsl] func2 -> DEBU 1704 0xc003976fc0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:04.747 UTC [cauthdsl] func1 -> DEBU 1705 0xc003976fc0 gate 1563590404743984100 evaluation succeeds" -"2019-07-20 02:40:04.747 UTC [policies] Evaluate -> DEBU 1706 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1707 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1708 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1709 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:04.748 UTC [gossip.gossip] handleMessage -> DEBU 170a Exiting" -"2019-07-20 02:40:04.749 UTC [gossip.gossip] handleMessage -> DEBU 170b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.749 UTC [msp] DeserializeIdentity -> DEBU 170c Obtaining identity" -"2019-07-20 02:40:04.749 UTC [msp] DeserializeIdentity -> DEBU 170d Obtaining identity" -"2019-07-20 02:40:04.750 UTC [msp] DeserializeIdentity -> DEBU 170e Obtaining identity" -"2019-07-20 02:40:04.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 170f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:04.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1710 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1711 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.753 UTC [policies] Evaluate -> DEBU 1712 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:04.754 UTC [policies] Evaluate -> DEBU 1713 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:04.754 UTC [policies] Evaluate -> DEBU 1714 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:04.754 UTC [cauthdsl] func1 -> DEBU 1715 0xc003a36ad0 gate 1563590404754449500 evaluation starts" -"2019-07-20 02:40:04.754 UTC [cauthdsl] func2 -> DEBU 1716 0xc003a36ad0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.754 UTC [cauthdsl] func2 -> DEBU 1717 0xc003a36ad0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.755 UTC [cauthdsl] func2 -> DEBU 1718 0xc003a36ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:04.755 UTC [cauthdsl] func2 -> DEBU 1719 0xc003a36ad0 principal evaluation fails" -"2019-07-20 02:40:04.755 UTC [cauthdsl] func1 -> DEBU 171a 0xc003a36ad0 gate 1563590404754449500 evaluation fails" -"2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:04.756 UTC [cauthdsl] func1 -> DEBU 171e 0xc003a37310 gate 1563590404756180200 evaluation starts" -"2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 171f 0xc003a37310 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 1720 0xc003a37310 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 1721 0xc003a37310 principal matched by identity 0" -"2019-07-20 02:40:04.757 UTC [msp.identity] Verify -> DEBU 1722 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:04.758 UTC [msp.identity] Verify -> DEBU 1723 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:04.758 UTC [cauthdsl] func2 -> DEBU 1724 0xc003a37310 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:04.758 UTC [cauthdsl] func1 -> DEBU 1725 0xc003a37310 gate 1563590404756180200 evaluation succeeds" -"2019-07-20 02:40:04.758 UTC [policies] Evaluate -> DEBU 1726 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1727 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1728 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1729 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:04.759 UTC [msp.identity] Verify -> DEBU 172a Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:04.759 UTC [msp.identity] Verify -> DEBU 172b Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:04.760 UTC [msp] DeserializeIdentity -> DEBU 172c Obtaining identity" -"2019-07-20 02:40:04.760 UTC [msp] DeserializeIdentity -> DEBU 172d Obtaining identity" -"2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 172e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 172f Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1730 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.761 UTC [policies] Evaluate -> DEBU 1731 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:04.761 UTC [policies] Evaluate -> DEBU 1732 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:04.762 UTC [policies] Evaluate -> DEBU 1733 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:04.762 UTC [cauthdsl] func1 -> DEBU 1734 0xc003a81200 gate 1563590404762213800 evaluation starts" -"2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1735 0xc003a81200 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1736 0xc003a81200 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1737 0xc003a81200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:04.763 UTC [cauthdsl] func2 -> DEBU 1738 0xc003a81200 principal evaluation fails" -"2019-07-20 02:40:04.763 UTC [cauthdsl] func1 -> DEBU 1739 0xc003a81200 gate 1563590404762213800 evaluation fails" -"2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:04.764 UTC [cauthdsl] func1 -> DEBU 173d 0xc003a81a40 gate 1563590404764229700 evaluation starts" -"2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 173e 0xc003a81a40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 173f 0xc003a81a40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 1740 0xc003a81a40 principal matched by identity 0" -"2019-07-20 02:40:04.766 UTC [msp.identity] Verify -> DEBU 1741 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:04.766 UTC [msp.identity] Verify -> DEBU 1742 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:04.766 UTC [cauthdsl] func2 -> DEBU 1743 0xc003a81a40 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:04.767 UTC [cauthdsl] func1 -> DEBU 1744 0xc003a81a40 gate 1563590404764229700 evaluation succeeds" -"2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1745 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1746 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1747 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1748 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:04.768 UTC [msp.identity] Verify -> DEBU 1749 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:04.769 UTC [msp.identity] Verify -> DEBU 174a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:04.769 UTC [gossip.gossip] handleMessage -> DEBU 174b Exiting" -"2019-07-20 02:40:04.769 UTC [gossip.gossip] handleMessage -> DEBU 174c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174d Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174e Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174f Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:04.771 UTC [msp.identity] Verify -> DEBU 1750 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:04.771 UTC [msp] DeserializeIdentity -> DEBU 1751 Obtaining identity" -"2019-07-20 02:40:04.771 UTC [msp] DeserializeIdentity -> DEBU 1752 Obtaining identity" -"2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1753 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1754 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1755 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.773 UTC [policies] Evaluate -> DEBU 1756 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:04.774 UTC [policies] Evaluate -> DEBU 1757 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:04.775 UTC [policies] Evaluate -> DEBU 1758 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:04.775 UTC [cauthdsl] func1 -> DEBU 1759 0xc003dfe9b0 gate 1563590404775612700 evaluation starts" -"2019-07-20 02:40:04.775 UTC [cauthdsl] func2 -> DEBU 175a 0xc003dfe9b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175b 0xc003dfe9b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175c 0xc003dfe9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175d 0xc003dfe9b0 principal evaluation fails" -"2019-07-20 02:40:04.777 UTC [cauthdsl] func1 -> DEBU 175e 0xc003dfe9b0 gate 1563590404775612700 evaluation fails" -"2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 175f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 1760 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:04.777 UTC [cauthdsl] func1 -> DEBU 1762 0xc003dff1f0 gate 1563590404777929000 evaluation starts" -"2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1763 0xc003dff1f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1764 0xc003dff1f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1765 0xc003dff1f0 principal matched by identity 0" -"2019-07-20 02:40:04.778 UTC [msp.identity] Verify -> DEBU 1766 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:04.779 UTC [msp.identity] Verify -> DEBU 1767 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:04.779 UTC [cauthdsl] func2 -> DEBU 1768 0xc003dff1f0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:04.779 UTC [cauthdsl] func1 -> DEBU 1769 0xc003dff1f0 gate 1563590404777929000 evaluation succeeds" -"2019-07-20 02:40:04.779 UTC [policies] Evaluate -> DEBU 176a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.780 UTC [policies] Evaluate -> DEBU 176b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.780 UTC [policies] Evaluate -> DEBU 176c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:04.781 UTC [policies] Evaluate -> DEBU 176d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:04.781 UTC [msp] DeserializeIdentity -> DEBU 176e Obtaining identity" -"2019-07-20 02:40:04.781 UTC [msp] DeserializeIdentity -> DEBU 176f Obtaining identity" -"2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1770 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1771 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1772 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1773 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1774 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1775 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:04.783 UTC [cauthdsl] func1 -> DEBU 1776 0xc003f6e9c0 gate 1563590404783062200 evaluation starts" -"2019-07-20 02:40:04.783 UTC [cauthdsl] func2 -> DEBU 1777 0xc003f6e9c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 1778 0xc003f6e9c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 1779 0xc003f6e9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 177a 0xc003f6e9c0 principal evaluation fails" -"2019-07-20 02:40:04.787 UTC [cauthdsl] func1 -> DEBU 177b 0xc003f6e9c0 gate 1563590404783062200 evaluation fails" -"2019-07-20 02:40:04.787 UTC [policies] Evaluate -> DEBU 177c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.788 UTC [policies] Evaluate -> DEBU 177d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:04.788 UTC [policies] Evaluate -> DEBU 177e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:04.788 UTC [cauthdsl] func1 -> DEBU 177f 0xc003f6f200 gate 1563590404788468000 evaluation starts" -"2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1780 0xc003f6f200 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1781 0xc003f6f200 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1782 0xc003f6f200 principal matched by identity 0" -"2019-07-20 02:40:04.789 UTC [msp.identity] Verify -> DEBU 1783 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:04.789 UTC [msp.identity] Verify -> DEBU 1784 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:04.789 UTC [cauthdsl] func2 -> DEBU 1785 0xc003f6f200 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:04.789 UTC [cauthdsl] func1 -> DEBU 1786 0xc003f6f200 gate 1563590404788468000 evaluation succeeds" -"2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1787 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1788 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1789 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 178a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:04.790 UTC [gossip.gossip] handleMessage -> DEBU 178b Exiting" -"2019-07-20 02:40:04.790 UTC [gossip.gossip] handleMessage -> DEBU 178c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.791 UTC [gossip.pull] HandleMessage -> DEBU 178d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.791 UTC [gossip.gossip] handleMessage -> DEBU 178e Exiting" -"2019-07-20 02:40:04.877 UTC [gossip.comm] func1 -> DEBU 178f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.877 UTC [gossip.gossip] handleMessage -> DEBU 1790 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.877 UTC [msp] DeserializeIdentity -> DEBU 1791 Obtaining identity" -"2019-07-20 02:40:04.878 UTC [msp] DeserializeIdentity -> DEBU 1792 Obtaining identity" -"2019-07-20 02:40:04.878 UTC [gossip.gossip] handleMessage -> DEBU 1793 Exiting" -"2019-07-20 02:40:04.895 UTC [gossip.comm] func1 -> DEBU 1794 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.895 UTC [gossip.gossip] handleMessage -> DEBU 1795 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.896 UTC [gossip.pull] HandleMessage -> DEBU 1796 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:04.896 UTC [gossip.pull] SendDigest -> DEBU 1797 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:04.896 UTC [gossip.gossip] handleMessage -> DEBU 1798 Exiting" -"2019-07-20 02:40:05.042 UTC [gossip.comm] func1 -> DEBU 1799 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:05.042 UTC [gossip.gossip] handleMessage -> DEBU 179a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179b Obtaining identity" -"2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179c Obtaining identity" -"2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179d Obtaining identity" -"2019-07-20 02:40:05.043 UTC [gossip.gossip] handleMessage -> DEBU 179e Exiting" -"2019-07-20 02:40:05.182 UTC [gossip.comm] func1 -> DEBU 179f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:05.182 UTC [gossip.gossip] handleMessage -> DEBU 17a0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:05.182 UTC [msp] DeserializeIdentity -> DEBU 17a1 Obtaining identity" -"2019-07-20 02:40:05.183 UTC [msp] DeserializeIdentity -> DEBU 17a2 Obtaining identity" -"2019-07-20 02:40:05.183 UTC [msp] DeserializeIdentity -> DEBU 17a3 Obtaining identity" -"2019-07-20 02:40:05.183 UTC [gossip.gossip] handleMessage -> DEBU 17a4 Exiting" -"2019-07-20 02:40:06.753 UTC [gossip.election] waitForInterrupt -> DEBU 17a5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:06.754 UTC [gossip.election] IsLeader -> DEBU 17a6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:06.754 UTC [msp] GetDefaultSigningIdentity -> DEBU 17a7 Obtaining default signing identity" -"2019-07-20 02:40:06.755 UTC [msp.identity] Sign -> DEBU 17a8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510061801 " -"2019-07-20 02:40:06.755 UTC [msp.identity] Sign -> DEBU 17a9 Sign: digest: 0A2417D6F32F0145DB5A6AD97AF07578F0DC3B14FDE2F95001B604A62A4FEC0B " -"2019-07-20 02:40:06.756 UTC [gossip.election] waitForInterrupt -> DEBU 17aa c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:06.765 UTC [msp] DeserializeIdentity -> DEBU 17ab Obtaining identity" -"2019-07-20 02:40:06.765 UTC [msp] DeserializeIdentity -> DEBU 17ac Obtaining identity" -"2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17ad Obtaining identity" -"2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17ae Obtaining identity" -"2019-07-20 02:40:06.766 UTC [gossip.comm] Send -> DEBU 17af Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17b0 Obtaining identity" -"2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17b1 Obtaining identity" -"2019-07-20 02:40:06.766 UTC [gossip.comm] sendToEndpoint -> DEBU 17b2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.766 UTC [gossip.comm] sendToEndpoint -> DEBU 17b3 Exiting" -"2019-07-20 02:40:06.912 UTC [gossip.comm] func1 -> DEBU 17b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.913 UTC [gossip.gossip] handleMessage -> DEBU 17b5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.913 UTC [gossip.gossip] handleMessage -> DEBU 17b6 Exiting" -"2019-07-20 02:40:06.913 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.913 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17b8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:06.913 UTC [msp] DeserializeIdentity -> DEBU 17b9 Obtaining identity" -"2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17bb Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17bc Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:06.916 UTC [cauthdsl] func1 -> DEBU 17c0 0xc00285b7b0 gate 1563590406916398500 evaluation starts" -"2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c1 0xc00285b7b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c2 0xc00285b7b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c3 0xc00285b7b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c4 0xc00285b7b0 principal evaluation fails" -"2019-07-20 02:40:06.916 UTC [cauthdsl] func1 -> DEBU 17c5 0xc00285b7b0 gate 1563590406916398500 evaluation fails" -"2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:06.917 UTC [cauthdsl] func1 -> DEBU 17c9 0xc00285bff0 gate 1563590406917178300 evaluation starts" -"2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17ca 0xc00285bff0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17cb 0xc00285bff0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17cc 0xc00285bff0 principal matched by identity 0" -"2019-07-20 02:40:06.917 UTC [msp.identity] Verify -> DEBU 17cd Verify: digest = 00000000 ab 03 83 d7 43 bb 1b 61 cb e1 88 ca 40 df 51 86 |....C..a....@.Q.| -00000010 59 ab 66 81 d9 42 04 49 40 b1 0d cc a6 19 ef 83 |Y.f..B.I@.......|" -"2019-07-20 02:40:06.917 UTC [msp.identity] Verify -> DEBU 17ce Verify: sig = 00000000 30 44 02 20 47 1b 2a a9 f8 00 a5 85 82 52 d9 32 |0D. G.*......R.2| -00000010 00 d7 35 a3 07 ab 35 92 0a 14 ed 05 56 99 32 2f |..5...5.....V.2/| -00000020 1a 0e 68 72 02 20 44 ca ce 45 de f0 b2 32 75 65 |..hr. D..E...2ue| -00000030 d3 aa 99 f7 5c f2 f4 64 d2 51 4b 03 8c 4d d3 a2 |....\..d.QK..M..| -00000040 e6 f9 a9 92 f0 a0 |......|" -"2019-07-20 02:40:06.918 UTC [cauthdsl] func2 -> DEBU 17cf 0xc00285bff0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:06.918 UTC [cauthdsl] func1 -> DEBU 17d0 0xc00285bff0 gate 1563590406917178300 evaluation succeeds" -"2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d3 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:06.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 17d5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d7 updating membership: timestamp: " -"2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d8 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:06.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:06.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 17da Exiting" -"2019-07-20 02:40:06.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 17db Exiting" -"2019-07-20 02:40:06.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17dc Exiting" -"2019-07-20 02:40:06.923 UTC [gossip.comm] func1 -> DEBU 17dd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.923 UTC [gossip.gossip] handleMessage -> DEBU 17de Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.923 UTC [gossip.gossip] handleMessage -> DEBU 17df Exiting" -"2019-07-20 02:40:06.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e1 Exiting" -"2019-07-20 02:40:06.923 UTC [msp] DeserializeIdentity -> DEBU 17e2 Obtaining identity" -"2019-07-20 02:40:06.923 UTC [msp] DeserializeIdentity -> DEBU 17e3 Obtaining identity" -"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e4 Obtaining identity" -"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e5 Obtaining identity" -"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e6 Obtaining identity" -"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e7 Obtaining identity" -"2019-07-20 02:40:06.924 UTC [gossip.comm] Send -> DEBU 17e8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e9 Obtaining identity" -"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17ea Obtaining identity" -"2019-07-20 02:40:06.924 UTC [gossip.comm] Send -> DEBU 17eb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ed Exiting" -"2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ef Exiting" -"2019-07-20 02:40:06.928 UTC [gossip.comm] func1 -> DEBU 17f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.929 UTC [gossip.gossip] handleMessage -> DEBU 17f1 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.929 UTC [gossip.gossip] handleMessage -> DEBU 17f2 Exiting" -"2019-07-20 02:40:06.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:06.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f4 Exiting" -"2019-07-20 02:40:07.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f5 Obtaining default signing identity" -"2019-07-20 02:40:07.233 UTC [msp.identity] Sign -> DEBU 17f6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151019 " -"2019-07-20 02:40:07.233 UTC [msp.identity] Sign -> DEBU 17f7 Sign: digest: A5E5D6E64F8F6C1FAA2BC3C99B4B9AF3B3BA328A9870DDA72718709F7712B546 " -"2019-07-20 02:40:07.234 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f8 Obtaining default signing identity" -"2019-07-20 02:40:07.234 UTC [msp.identity] Sign -> DEBU 17f9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:07.234 UTC [msp.identity] Sign -> DEBU 17fa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:07.234 UTC [gossip.discovery] periodicalSendAlive -> DEBU 17fb Sleeping 5s" -"2019-07-20 02:40:07.237 UTC [msp] DeserializeIdentity -> DEBU 17fc Obtaining identity" -"2019-07-20 02:40:07.238 UTC [msp] DeserializeIdentity -> DEBU 17fd Obtaining identity" -"2019-07-20 02:40:07.238 UTC [gossip.comm] Send -> DEBU 17fe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:07.239 UTC [msp] DeserializeIdentity -> DEBU 17ff Obtaining identity" -"2019-07-20 02:40:07.239 UTC [gossip.comm] Send -> DEBU 1801 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:07.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1800 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:07.240 UTC [gossip.comm] sendToEndpoint -> DEBU 1802 Exiting" -"2019-07-20 02:40:07.240 UTC [msp] DeserializeIdentity -> DEBU 1803 Obtaining identity" -"2019-07-20 02:40:07.240 UTC [gossip.comm] Send -> DEBU 1804 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1805 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1806 Exiting" -"2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1807 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1808 Exiting" -"2019-07-20 02:40:07.365 UTC [gossip.comm] func1 -> DEBU 1809 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.365 UTC [gossip.gossip] handleMessage -> DEBU 180a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.365 UTC [gossip.gossip] handleMessage -> DEBU 180b Exiting" -"2019-07-20 02:40:07.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 180c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 180d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:07.365 UTC [msp.identity] Verify -> DEBU 180e Verify: digest = 00000000 2b 9e 49 fe 26 11 78 34 3b 01 7f 16 c9 58 7f 1e |+.I.&.x4;....X..| -00000010 3a 8e 0c 07 25 a0 b2 47 0a 25 8f d9 76 80 4b df |:...%..G.%..v.K.|" -"2019-07-20 02:40:07.366 UTC [msp.identity] Verify -> DEBU 180f Verify: sig = 00000000 30 44 02 20 68 82 53 1c d9 3b 2c 2e a0 79 ec 11 |0D. h.S..;,..y..| -00000010 ec 2f d5 58 98 b9 1f de 94 04 05 19 9e 95 f6 94 |./.X............| -00000020 3d b3 48 6e 02 20 19 5a 3d 37 bc 13 93 03 49 4b |=.Hn. .Z=7....IK| -00000030 e8 10 46 6b 7a f1 a2 2b 74 55 96 04 95 17 34 4b |..Fkz..+tU....4K| -00000040 e4 f9 7b ba 1c fa |..{...|" -"2019-07-20 02:40:07.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 1810 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1811 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1812 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1813 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1814 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1815 Exiting" -"2019-07-20 02:40:07.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 1816 Exiting" -"2019-07-20 02:40:07.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1817 Exiting" -"2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 1818 Obtaining identity" -"2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 1819 Obtaining identity" -"2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 181a Obtaining identity" -"2019-07-20 02:40:07.367 UTC [gossip.comm] Send -> DEBU 181b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 181c Obtaining identity" -"2019-07-20 02:40:07.368 UTC [gossip.comm] Send -> DEBU 181d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 181e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 181f Exiting" -"2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 1820 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 1821 Exiting" -"2019-07-20 02:40:07.369 UTC [gossip.comm] func1 -> DEBU 1822 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.369 UTC [gossip.gossip] handleMessage -> DEBU 1823 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.370 UTC [gossip.gossip] handleMessage -> DEBU 1824 Exiting" -"2019-07-20 02:40:07.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1825 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1826 Exiting" -"2019-07-20 02:40:07.375 UTC [gossip.comm] func1 -> DEBU 1827 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.375 UTC [gossip.gossip] handleMessage -> DEBU 1828 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.375 UTC [gossip.gossip] handleMessage -> DEBU 1829 Exiting" -"2019-07-20 02:40:07.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182b Exiting" -"2019-07-20 02:40:07.543 UTC [gossip.comm] func1 -> DEBU 182c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.543 UTC [gossip.gossip] handleMessage -> DEBU 182d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.543 UTC [gossip.gossip] handleMessage -> DEBU 182e Exiting" -"2019-07-20 02:40:07.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.544 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1830 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:07.544 UTC [msp] DeserializeIdentity -> DEBU 1831 Obtaining identity" -"2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1832 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1833 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1834 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1835 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1836 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1837 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:07.544 UTC [cauthdsl] func1 -> DEBU 1838 0xc0037cfbc0 gate 1563590407544965200 evaluation starts" -"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1839 0xc0037cfbc0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183a 0xc0037cfbc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183b 0xc0037cfbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183c 0xc0037cfbc0 principal evaluation fails" -"2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 183d 0xc0037cfbc0 gate 1563590407544965200 evaluation fails" -"2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 183e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 183f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 1840 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 1841 0xc003dda400 gate 1563590407545389000 evaluation starts" -"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1842 0xc003dda400 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1843 0xc003dda400 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1844 0xc003dda400 principal matched by identity 0" -"2019-07-20 02:40:07.545 UTC [msp.identity] Verify -> DEBU 1845 Verify: digest = 00000000 89 ef ec b6 d9 de 0e eb ae 8e 81 ef af 84 9e ee |................| -00000010 36 ac a6 04 33 0e 2b 52 4d b9 2c 34 25 7e 0a 7c |6...3.+RM.,4%~.||" -"2019-07-20 02:40:07.545 UTC [msp.identity] Verify -> DEBU 1846 Verify: sig = 00000000 30 45 02 21 00 ce e7 5e 5d de 20 4b c4 44 7d 85 |0E.!...^]. K.D}.| -00000010 7a a7 49 0c 59 30 fe f8 b8 99 6b 30 a8 dd de 6a |z.I.Y0....k0...j| -00000020 eb 3f 63 a1 7b 02 20 4b 7d d1 a3 68 c7 5b e9 06 |.?c.{. K}..h.[..| -00000030 e1 73 36 2b 25 f4 4e a5 b0 84 a6 e8 65 63 83 b1 |.s6+%.N.....ec..| -00000040 c6 dc 03 7b 71 3b a0 |...{q;.|" -"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1847 0xc003dda400 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 1848 0xc003dda400 gate 1563590407545389000 evaluation succeeds" -"2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 1849 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184b Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:07.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 184d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 184e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:07.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 184f updating membership: timestamp: " -"2019-07-20 02:40:07.548 UTC [gossip.comm] func1 -> DEBU 1850 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.548 UTC [gossip.gossip] handleMessage -> DEBU 1851 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1852 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1853 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1854 Exiting" -"2019-07-20 02:40:07.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 1855 Exiting" -"2019-07-20 02:40:07.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1856 Exiting" -"2019-07-20 02:40:07.549 UTC [gossip.gossip] handleMessage -> DEBU 1857 Exiting" -"2019-07-20 02:40:07.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1858 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1859 Exiting" -"2019-07-20 02:40:07.557 UTC [gossip.comm] func1 -> DEBU 185a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.558 UTC [gossip.gossip] handleMessage -> DEBU 185c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.559 UTC [gossip.gossip] handleMessage -> DEBU 185d Exiting" -"2019-07-20 02:40:07.557 UTC [msp] DeserializeIdentity -> DEBU 185b Obtaining identity" -"2019-07-20 02:40:07.569 UTC [msp] DeserializeIdentity -> DEBU 185e Obtaining identity" -"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 185f Obtaining identity" -"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1860 Obtaining identity" -"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1861 Obtaining identity" -"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1862 Obtaining identity" -"2019-07-20 02:40:07.570 UTC [gossip.comm] Send -> DEBU 1863 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1864 Obtaining identity" -"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1865 Obtaining identity" -"2019-07-20 02:40:07.570 UTC [gossip.comm] Send -> DEBU 1866 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:07.570 UTC [gossip.comm] sendToEndpoint -> DEBU 1867 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.570 UTC [gossip.comm] sendToEndpoint -> DEBU 1868 Exiting" -"2019-07-20 02:40:07.571 UTC [gossip.comm] sendToEndpoint -> DEBU 1869 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.571 UTC [gossip.comm] sendToEndpoint -> DEBU 186a Exiting" -"2019-07-20 02:40:07.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 186b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:07.590 UTC [gossip.discovery] handleMsgFromComm -> DEBU 186c Exiting" -"2019-07-20 02:40:07.915 UTC [gossip.comm] func1 -> DEBU 186d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:07.916 UTC [gossip.gossip] handleMessage -> DEBU 186e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:07.916 UTC [gossip.gossip] handleMessage -> DEBU 186f Exiting" -"2019-07-20 02:40:07.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1870 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:07.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1871 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:07.916 UTC [msp] DeserializeIdentity -> DEBU 1872 Obtaining identity" -"2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1873 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1874 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1875 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:07.916 UTC [policies] Evaluate -> DEBU 1876 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:07.916 UTC [policies] Evaluate -> DEBU 1877 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1878 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1879 0xc0004f5660 gate 1563590407917042800 evaluation starts" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187a 0xc0004f5660 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187b 0xc0004f5660 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187c 0xc0004f5660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187d 0xc0004f5660 principal evaluation fails" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 187e 0xc0004f5660 gate 1563590407917042800 evaluation fails" -"2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 187f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1880 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1881 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1882 0xc0004f5ea0 gate 1563590407917520700 evaluation starts" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1883 0xc0004f5ea0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1884 0xc0004f5ea0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1885 0xc0004f5ea0 principal matched by identity 0" -"2019-07-20 02:40:07.917 UTC [msp.identity] Verify -> DEBU 1886 Verify: digest = 00000000 90 ad 86 40 6a f3 ad 1a e8 ec 59 b7 18 e6 d4 14 |...@j.....Y.....| -00000010 db 33 79 7f 58 75 39 c1 a1 15 89 cb 0f b2 1c 31 |.3y.Xu9........1|" -"2019-07-20 02:40:07.917 UTC [msp.identity] Verify -> DEBU 1887 Verify: sig = 00000000 30 44 02 20 07 ac d3 01 f1 a2 2b 72 7a 68 40 68 |0D. ......+rzh@h| -00000010 76 d0 4d 51 aa 3b de 04 f8 e4 f6 ec 54 82 4f 1b |v.MQ.;......T.O.| -00000020 9f e2 c8 4d 02 20 1d 0e 06 07 f2 ad 93 6b 14 69 |...M. .......k.i| -00000030 bd 8c d8 14 2c fe 35 53 de 54 b8 27 65 b9 78 cf |....,.5S.T.'e.x.| -00000040 bf 3b 9d dd 7b 8e |.;..{.|" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1888 0xc0004f5ea0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1889 0xc0004f5ea0 gate 1563590407917520700 evaluation succeeds" -"2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 188a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:07.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 188e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 188f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1890 updating membership: timestamp: " -"2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1891 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1892 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1893 Exiting" -"2019-07-20 02:40:07.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 1894 Exiting" -"2019-07-20 02:40:07.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1895 Exiting" -"2019-07-20 02:40:07.918 UTC [gossip.discovery] sendMemResponse -> DEBU 1896 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1897 Obtaining identity" -"2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1898 Obtaining identity" -"2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1899 Obtaining identity" -"2019-07-20 02:40:07.918 UTC [gossip.comm] Send -> DEBU 189a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:07.918 UTC [gossip.discovery] sendMemResponse -> DEBU 189b Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\035" signature:"0D\002 h\202S\034\331;,.\240y\354\021\354/\325X\230\271\037\336\224\004\005\031\236\225\366\224=\263Hn\002 \031Z=7\274\023\223\003IK\350\020Fkz\361\242+tU\226\004\225\0274K\344\371{\272\034\372" > alive: " -"2019-07-20 02:40:07.919 UTC [gossip.comm] sendToEndpoint -> DEBU 189c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:07.919 UTC [gossip.comm] sendToEndpoint -> DEBU 189d Exiting" -"2019-07-20 02:40:07.923 UTC [gossip.comm] func1 -> DEBU 189e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:07.923 UTC [gossip.gossip] handleMessage -> DEBU 189f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:07.924 UTC [gossip.pull] HandleMessage -> DEBU 18a0 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a1 Obtaining identity" -"2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a2 Obtaining identity" -"2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a3 Obtaining identity" -"2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a4 Obtaining identity" -"2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a5 Obtaining identity" -"2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a6 Obtaining identity" -"2019-07-20 02:40:07.925 UTC [gossip.pull] SendDigest -> DEBU 18a7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:07.926 UTC [gossip.gossip] handleMessage -> DEBU 18a8 Exiting" -"2019-07-20 02:40:08.242 UTC [gossip.pull] Hello -> DEBU 18a9 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:08.242 UTC [gossip.comm] Send -> DEBU 18aa Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:08.242 UTC [gossip.comm] sendToEndpoint -> DEBU 18ab Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.242 UTC [gossip.comm] sendToEndpoint -> DEBU 18ac Exiting" -"2019-07-20 02:40:08.243 UTC [gossip.pull] Hello -> DEBU 18ad Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:08.243 UTC [gossip.comm] Send -> DEBU 18ae Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:08.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18af Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18b0 Exiting" -"2019-07-20 02:40:08.245 UTC [gossip.comm] func1 -> DEBU 18b1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.246 UTC [gossip.gossip] handleMessage -> DEBU 18b3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.247 UTC [gossip.pull] HandleMessage -> DEBU 18b4 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.246 UTC [gossip.comm] func1 -> DEBU 18b2 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.244 UTC [gossip.pull] Hello -> DEBU 18b5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:08.248 UTC [gossip.comm] Send -> DEBU 18b6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:08.248 UTC [gossip.gossip] handleMessage -> DEBU 18b7 Exiting" -"2019-07-20 02:40:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 18b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.249 UTC [gossip.comm] sendToEndpoint -> DEBU 18b9 Exiting" -"2019-07-20 02:40:08.249 UTC [gossip.gossip] handleMessage -> DEBU 18ba Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.249 UTC [gossip.pull] HandleMessage -> DEBU 18bb GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.250 UTC [gossip.comm] func1 -> DEBU 18bc Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.249 UTC [gossip.gossip] handleMessage -> DEBU 18bd Exiting" -"2019-07-20 02:40:08.251 UTC [gossip.gossip] handleMessage -> DEBU 18be Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.251 UTC [gossip.pull] HandleMessage -> DEBU 18bf GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.251 UTC [gossip.gossip] handleMessage -> DEBU 18c0 Exiting" -"2019-07-20 02:40:08.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 18c1 Obtaining default signing identity" -"2019-07-20 02:40:08.281 UTC [msp.identity] Sign -> DEBU 18c2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101A " -"2019-07-20 02:40:08.281 UTC [msp.identity] Sign -> DEBU 18c3 Sign: digest: 15F5DB7AEF8341246A2BBC7FC964B30DB177647422188189177BD277A67DE900 " -"2019-07-20 02:40:08.281 UTC [msp] GetDefaultSigningIdentity -> DEBU 18c4 Obtaining default signing identity" -"2019-07-20 02:40:08.282 UTC [msp.identity] Sign -> DEBU 18c5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:08.282 UTC [msp.identity] Sign -> DEBU 18c6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:08.283 UTC [gossip.comm] Send -> DEBU 18c7 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:08.284 UTC [gossip.comm] sendToEndpoint -> DEBU 18c8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.284 UTC [gossip.comm] sendToEndpoint -> DEBU 18c9 Exiting" -"2019-07-20 02:40:08.284 UTC [msp] DeserializeIdentity -> DEBU 18ca Obtaining identity" -"2019-07-20 02:40:08.285 UTC [gossip.comm] Send -> DEBU 18cb Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:08.285 UTC [msp] DeserializeIdentity -> DEBU 18cc Obtaining identity" -"2019-07-20 02:40:08.286 UTC [gossip.comm] sendToEndpoint -> DEBU 18cd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.286 UTC [gossip.comm] sendToEndpoint -> DEBU 18ce Exiting" -"2019-07-20 02:40:08.287 UTC [gossip.comm] func1 -> DEBU 18cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.287 UTC [gossip.gossip] handleMessage -> DEBU 18d0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.287 UTC [gossip.gossip] handleMessage -> DEBU 18d1 Exiting" -"2019-07-20 02:40:08.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18d3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:08.289 UTC [msp.identity] Verify -> DEBU 18d4 Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| -00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" -"2019-07-20 02:40:08.289 UTC [msp.identity] Verify -> DEBU 18d5 Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| -00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| -00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| -00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| -00000040 57 8d 5b 84 9d 85 |W.[...|" -"2019-07-20 02:40:08.290 UTC [gossip.comm] Send -> DEBU 18d6 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:08.290 UTC [gossip.comm] sendToEndpoint -> DEBU 18d7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.290 UTC [gossip.comm] sendToEndpoint -> DEBU 18d8 Exiting" -"2019-07-20 02:40:08.291 UTC [msp.identity] Verify -> DEBU 18d9 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:08.291 UTC [msp.identity] Verify -> DEBU 18da Verify: sig = 00000000 30 44 02 20 74 eb 3c 0c 7c c3 90 9e 45 15 01 99 |0D. t.<.|...E...| -00000010 dd 06 cc c3 60 41 fa 97 b9 82 48 9d f4 11 28 00 |....`A....H...(.| -00000020 b5 48 cc 08 02 20 5a 13 df a9 89 2f b2 65 11 ea |.H... Z..../.e..| -00000030 a4 39 33 13 0d 1b ba ac 0e 2a 1d 37 dc e0 c6 4d |.93......*.7...M| -00000040 d5 14 8c 44 a2 85 |...D..|" -"2019-07-20 02:40:08.293 UTC [gossip.discovery] handleAliveMessage -> DEBU 18db Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:08.293 UTC [gossip.discovery] isSentByMe -> DEBU 18dd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:08.293 UTC [gossip.discovery] handleAliveMessage -> DEBU 18de Exiting" -"2019-07-20 02:40:08.293 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18df Exiting" -"2019-07-20 02:40:08.293 UTC [gossip.comm] func1 -> DEBU 18dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.294 UTC [gossip.gossip] handleMessage -> DEBU 18e0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.294 UTC [gossip.gossip] handleMessage -> DEBU 18e1 Exiting" -"2019-07-20 02:40:08.294 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18e2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18e3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:08.294 UTC [gossip.comm] func1 -> DEBU 18e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.294 UTC [msp.identity] Verify -> DEBU 18e5 Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| -00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" -"2019-07-20 02:40:08.295 UTC [msp.identity] Verify -> DEBU 18e6 Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| -00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| -00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| -00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| -00000040 57 8d 5b 84 9d 85 |W.[...|" -"2019-07-20 02:40:08.295 UTC [gossip.gossip] handleMessage -> DEBU 18e7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 18e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:08.295 UTC [gossip.discovery] isSentByMe -> DEBU 18e9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:08.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 18ea Exiting" -"2019-07-20 02:40:08.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18eb Exiting" -"2019-07-20 02:40:08.296 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ec Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.296 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18ed Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:08.296 UTC [msp] DeserializeIdentity -> DEBU 18ee Obtaining identity" -"2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:08.297 UTC [gossip.gossip] handleMessage -> DEBU 18f5 Exiting" -"2019-07-20 02:40:08.297 UTC [cauthdsl] func1 -> DEBU 18f6 0xc0039e1d20 gate 1563590408297550800 evaluation starts" -"2019-07-20 02:40:08.297 UTC [cauthdsl] func2 -> DEBU 18f7 0xc0039e1d20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.297 UTC [cauthdsl] func2 -> DEBU 18f8 0xc0039e1d20 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.298 UTC [cauthdsl] func2 -> DEBU 18f9 0xc0039e1d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:08.298 UTC [cauthdsl] func2 -> DEBU 18fa 0xc0039e1d20 principal evaluation fails" -"2019-07-20 02:40:08.298 UTC [cauthdsl] func1 -> DEBU 18fb 0xc0039e1d20 gate 1563590408297550800 evaluation fails" -"2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:08.299 UTC [cauthdsl] func1 -> DEBU 18ff 0xc003b9a560 gate 1563590408299015200 evaluation starts" -"2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1900 0xc003b9a560 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1901 0xc003b9a560 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1902 0xc003b9a560 principal matched by identity 0" -"2019-07-20 02:40:08.299 UTC [msp.identity] Verify -> DEBU 1903 Verify: digest = 00000000 90 ad 86 40 6a f3 ad 1a e8 ec 59 b7 18 e6 d4 14 |...@j.....Y.....| -00000010 db 33 79 7f 58 75 39 c1 a1 15 89 cb 0f b2 1c 31 |.3y.Xu9........1|" -"2019-07-20 02:40:08.299 UTC [msp.identity] Verify -> DEBU 1904 Verify: sig = 00000000 30 44 02 20 07 ac d3 01 f1 a2 2b 72 7a 68 40 68 |0D. ......+rzh@h| -00000010 76 d0 4d 51 aa 3b de 04 f8 e4 f6 ec 54 82 4f 1b |v.MQ.;......T.O.| -00000020 9f e2 c8 4d 02 20 1d 0e 06 07 f2 ad 93 6b 14 69 |...M. .......k.i| -00000030 bd 8c d8 14 2c fe 35 53 de 54 b8 27 65 b9 78 cf |....,.5S.T.'e.x.| -00000040 bf 3b 9d dd 7b 8e |.;..{.|" -"2019-07-20 02:40:08.300 UTC [cauthdsl] func2 -> DEBU 1905 0xc003b9a560 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:08.300 UTC [cauthdsl] func1 -> DEBU 1906 0xc003b9a560 gate 1563590408299015200 evaluation succeeds" -"2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1907 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1908 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1909 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 190a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:08.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 190b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:08.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 190c Exiting" -"2019-07-20 02:40:08.301 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 190d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:08.304 UTC [msp.identity] Verify -> DEBU 190e Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| -00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" -"2019-07-20 02:40:08.304 UTC [msp.identity] Verify -> DEBU 190f Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| -00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| -00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| -00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| -00000040 57 8d 5b 84 9d 85 |W.[...|" -"2019-07-20 02:40:08.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1910 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:08.304 UTC [gossip.discovery] isSentByMe -> DEBU 1911 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:08.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1912 Exiting" -"2019-07-20 02:40:08.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1913 Exiting" -"2019-07-20 02:40:08.363 UTC [gossip.comm] func1 -> DEBU 1914 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.363 UTC [gossip.gossip] handleMessage -> DEBU 1915 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.364 UTC [gossip.pull] HandleMessage -> DEBU 1916 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.365 UTC [gossip.pull] SendDigest -> DEBU 1917 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:08.365 UTC [gossip.gossip] handleMessage -> DEBU 1918 Exiting" -"2019-07-20 02:40:08.367 UTC [gossip.comm] func1 -> DEBU 1919 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.367 UTC [gossip.gossip] handleMessage -> DEBU 191a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.367 UTC [gossip.gossip] handleMessage -> DEBU 191b Exiting" -"2019-07-20 02:40:08.368 UTC [gossip.discovery] handleMsgFromComm -> DEBU 191c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.368 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 191d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:08.369 UTC [msp.identity] Verify -> DEBU 191e Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| -00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" -"2019-07-20 02:40:08.369 UTC [msp.identity] Verify -> DEBU 191f Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| -00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| -00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| -00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| -00000040 d6 7b d1 42 f8 2d |.{.B.-|" -"2019-07-20 02:40:08.370 UTC [msp.identity] Verify -> DEBU 1920 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:08.370 UTC [msp.identity] Verify -> DEBU 1921 Verify: sig = 00000000 30 45 02 21 00 83 3b 64 33 c2 24 ca 8f 63 e9 05 |0E.!..;d3.$..c..| -00000010 e8 18 37 56 ba a0 c0 14 82 44 d6 2d 8b 04 25 94 |..7V.....D.-..%.| -00000020 71 1d a3 86 33 02 20 51 61 00 a2 7a 14 09 e7 60 |q...3. Qa..z...`| -00000030 3e c7 9d 10 99 cb 0d 88 9d 11 94 58 4e 25 ef e5 |>..........XN%..| -00000040 0b 09 5f c7 9c 27 cb |.._..'.|" -"2019-07-20 02:40:08.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 1922 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:08.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 1923 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:40:08.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 1924 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1925 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1926 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1927 Exiting" -"2019-07-20 02:40:08.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 1928 Exiting" -"2019-07-20 02:40:08.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1929 Exiting" -"2019-07-20 02:40:08.374 UTC [gossip.discovery] sendMemResponse -> DEBU 192a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:08.374 UTC [msp] DeserializeIdentity -> DEBU 192b Obtaining identity" -"2019-07-20 02:40:08.375 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" -"2019-07-20 02:40:08.375 UTC [gossip.comm] Send -> DEBU 192d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:08.375 UTC [gossip.comm] sendToEndpoint -> DEBU 192e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.376 UTC [gossip.comm] sendToEndpoint -> DEBU 192f Exiting" -"2019-07-20 02:40:08.376 UTC [gossip.discovery] sendMemResponse -> DEBU 1930 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > alive: " -"2019-07-20 02:40:08.552 UTC [gossip.comm] func1 -> DEBU 1931 Got message: GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.552 UTC [gossip.comm] func1 -> DEBU 1932 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.552 UTC [gossip.gossip] handleMessage -> DEBU 1933 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.552 UTC [gossip.gossip] handleMessage -> DEBU 1934 Exiting" -"2019-07-20 02:40:08.553 UTC [gossip.gossip] handleMessage -> DEBU 1935 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.553 UTC [gossip.pull] HandleMessage -> DEBU 1937 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.553 UTC [msp] DeserializeIdentity -> DEBU 1938 Obtaining identity" -"2019-07-20 02:40:08.553 UTC [msp] DeserializeIdentity -> DEBU 1939 Obtaining identity" -"2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193a Obtaining identity" -"2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193b Obtaining identity" -"2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193c Obtaining identity" -"2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193d Obtaining identity" -"2019-07-20 02:40:08.553 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1936 Got message: GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.554 UTC [gossip.pull] SendDigest -> DEBU 193e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:08.555 UTC [gossip.gossip] handleMessage -> DEBU 193f Exiting" -"2019-07-20 02:40:08.554 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1940 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:08.555 UTC [msp] DeserializeIdentity -> DEBU 1941 Obtaining identity" -"2019-07-20 02:40:08.555 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1942 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:08.555 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1943 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.556 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1944 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1945 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1946 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1947 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:08.557 UTC [cauthdsl] func1 -> DEBU 1948 0xc00377da70 gate 1563590408557288200 evaluation starts" -"2019-07-20 02:40:08.557 UTC [cauthdsl] func2 -> DEBU 1949 0xc00377da70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.557 UTC [cauthdsl] func2 -> DEBU 194a 0xc00377da70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.558 UTC [cauthdsl] func2 -> DEBU 194b 0xc00377da70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:08.558 UTC [cauthdsl] func2 -> DEBU 194c 0xc00377da70 principal evaluation fails" -"2019-07-20 02:40:08.558 UTC [cauthdsl] func1 -> DEBU 194d 0xc00377da70 gate 1563590408557288200 evaluation fails" -"2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 194e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 194f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 1950 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:08.559 UTC [cauthdsl] func1 -> DEBU 1951 0xc002a002b0 gate 1563590408559753700 evaluation starts" -"2019-07-20 02:40:08.559 UTC [cauthdsl] func2 -> DEBU 1952 0xc002a002b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.560 UTC [cauthdsl] func2 -> DEBU 1953 0xc002a002b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.560 UTC [cauthdsl] func2 -> DEBU 1954 0xc002a002b0 principal matched by identity 0" -"2019-07-20 02:40:08.560 UTC [msp.identity] Verify -> DEBU 1955 Verify: digest = 00000000 9b 11 f7 ad fc d3 ff 01 32 75 4a e1 30 0a b5 4a |........2uJ.0..J| -00000010 7d 75 ac e0 57 ae 2d bc 93 54 5e 39 8a 31 d0 d2 |}u..W.-..T^9.1..|" -"2019-07-20 02:40:08.561 UTC [msp.identity] Verify -> DEBU 1956 Verify: sig = 00000000 30 45 02 21 00 89 70 53 2d 1c 3e cc 34 ee ff 2e |0E.!..pS-.>.4...| -00000010 7c 76 70 0d 8e cf 4b f8 28 93 5b d1 9a e7 9f 43 ||vp...K.(.[....C| -00000020 c8 2d 86 94 a0 02 20 39 0f 8d d0 e2 8f 44 1b ee |.-.... 9.....D..| -00000030 28 84 53 fa 8f 45 81 c7 3e 5f 51 f4 46 ec 79 ce |(.S..E..>_Q.F.y.| -00000040 73 b2 78 be 11 5f 01 |s.x.._.|" -"2019-07-20 02:40:08.561 UTC [cauthdsl] func2 -> DEBU 1957 0xc002a002b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:08.561 UTC [cauthdsl] func1 -> DEBU 1958 0xc002a002b0 gate 1563590408559753700 evaluation succeeds" -"2019-07-20 02:40:08.562 UTC [policies] Evaluate -> DEBU 1959 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.562 UTC [policies] Evaluate -> DEBU 195a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.563 UTC [policies] Evaluate -> DEBU 195b Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:08.563 UTC [policies] Evaluate -> DEBU 195c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:08.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 195d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 195e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 195f updating membership: timestamp: " -"2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 1960 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:08.565 UTC [gossip.discovery] learnExistingMembers -> DEBU 1961 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:08.565 UTC [gossip.discovery] learnExistingMembers -> DEBU 1962 Exiting" -"2019-07-20 02:40:08.565 UTC [gossip.discovery] handleAliveMessage -> DEBU 1963 Exiting" -"2019-07-20 02:40:08.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1964 Exiting" -"2019-07-20 02:40:08.566 UTC [gossip.discovery] sendMemResponse -> DEBU 1965 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1966 Obtaining identity" -"2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1967 Obtaining identity" -"2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1968 Obtaining identity" -"2019-07-20 02:40:08.566 UTC [gossip.comm] Send -> DEBU 1969 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:08.566 UTC [gossip.discovery] sendMemResponse -> DEBU 196a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" > alive:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > alive: alive: " -"2019-07-20 02:40:08.567 UTC [gossip.comm] sendToEndpoint -> DEBU 196b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.567 UTC [gossip.comm] sendToEndpoint -> DEBU 196c Exiting" -"2019-07-20 02:40:08.718 UTC [msp] DeserializeIdentity -> DEBU 196d Obtaining identity" -"2019-07-20 02:40:08.718 UTC [msp] DeserializeIdentity -> DEBU 196e Obtaining identity" -"2019-07-20 02:40:08.719 UTC [gossip.comm] Send -> DEBU 196f Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1970 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1971 Exiting" -"2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1972 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1973 Exiting" -"2019-07-20 02:40:08.720 UTC [gossip.comm] sendToEndpoint -> DEBU 1974 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.720 UTC [gossip.comm] sendToEndpoint -> DEBU 1975 Exiting" -"2019-07-20 02:40:08.722 UTC [gossip.comm] func1 -> DEBU 1976 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.722 UTC [gossip.gossip] handleMessage -> DEBU 1979 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.721 UTC [gossip.comm] func1 -> DEBU 1977 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.722 UTC [gossip.comm] func1 -> DEBU 1978 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.723 UTC [msp.identity] Verify -> DEBU 197a Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:08.724 UTC [msp.identity] Verify -> DEBU 197b Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:08.728 UTC [msp.identity] Verify -> DEBU 197c Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:08.728 UTC [msp.identity] Verify -> DEBU 197d Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:08.729 UTC [msp] DeserializeIdentity -> DEBU 197e Obtaining identity" -"2019-07-20 02:40:08.729 UTC [msp] DeserializeIdentity -> DEBU 197f Obtaining identity" -"2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1980 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1981 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1982 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.730 UTC [policies] Evaluate -> DEBU 1983 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:08.730 UTC [policies] Evaluate -> DEBU 1984 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:08.731 UTC [policies] Evaluate -> DEBU 1985 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:08.731 UTC [cauthdsl] func1 -> DEBU 1986 0xc0034afbb0 gate 1563590408731275000 evaluation starts" -"2019-07-20 02:40:08.731 UTC [cauthdsl] func2 -> DEBU 1987 0xc0034afbb0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.731 UTC [cauthdsl] func2 -> DEBU 1988 0xc0034afbb0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.732 UTC [cauthdsl] func2 -> DEBU 1989 0xc0034afbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:08.732 UTC [cauthdsl] func2 -> DEBU 198a 0xc0034afbb0 principal evaluation fails" -"2019-07-20 02:40:08.732 UTC [cauthdsl] func1 -> DEBU 198b 0xc0034afbb0 gate 1563590408731275000 evaluation fails" -"2019-07-20 02:40:08.733 UTC [policies] Evaluate -> DEBU 198c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.733 UTC [policies] Evaluate -> DEBU 198d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.734 UTC [policies] Evaluate -> DEBU 198e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:08.734 UTC [cauthdsl] func1 -> DEBU 198f 0xc0039d43f0 gate 1563590408734954700 evaluation starts" -"2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1990 0xc0039d43f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1991 0xc0039d43f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.735 UTC [msp] DeserializeIdentity -> DEBU 1992 Obtaining identity" -"2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1993 0xc0039d43f0 principal matched by identity 0" -"2019-07-20 02:40:08.736 UTC [msp] DeserializeIdentity -> DEBU 1994 Obtaining identity" -"2019-07-20 02:40:08.736 UTC [gossip.pull] Hello -> DEBU 1995 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:08.736 UTC [msp.identity] Verify -> DEBU 1996 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:08.736 UTC [msp.identity] Verify -> DEBU 1998 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:08.736 UTC [msp] DeserializeIdentity -> DEBU 1997 Obtaining identity" -"2019-07-20 02:40:08.737 UTC [msp] DeserializeIdentity -> DEBU 1999 Obtaining identity" -"2019-07-20 02:40:08.738 UTC [gossip.comm] Send -> DEBU 199a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:08.738 UTC [gossip.comm] sendToEndpoint -> DEBU 199b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.738 UTC [cauthdsl] func2 -> DEBU 199c 0xc0039d43f0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:08.738 UTC [cauthdsl] func1 -> DEBU 199d 0xc0039d43f0 gate 1563590408734954700 evaluation succeeds" -"2019-07-20 02:40:08.739 UTC [policies] Evaluate -> DEBU 199f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.740 UTC [policies] Evaluate -> DEBU 19a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.738 UTC [gossip.comm] sendToEndpoint -> DEBU 199e Exiting" -"2019-07-20 02:40:08.740 UTC [gossip.comm] func1 -> DEBU 19a1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.740 UTC [policies] Evaluate -> DEBU 19a2 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:08.742 UTC [policies] Evaluate -> DEBU 19a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:08.742 UTC [msp] DeserializeIdentity -> DEBU 19a4 Obtaining identity" -"2019-07-20 02:40:08.743 UTC [msp] DeserializeIdentity -> DEBU 19a5 Obtaining identity" -"2019-07-20 02:40:08.743 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:08.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a7 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a8 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:08.746 UTC [cauthdsl] func1 -> DEBU 19ac 0xc0039d5be0 gate 1563590408746044200 evaluation starts" -"2019-07-20 02:40:08.746 UTC [cauthdsl] func2 -> DEBU 19ad 0xc0039d5be0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.746 UTC [cauthdsl] func2 -> DEBU 19ae 0xc0039d5be0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.749 UTC [cauthdsl] func2 -> DEBU 19af 0xc0039d5be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:08.750 UTC [cauthdsl] func2 -> DEBU 19b0 0xc0039d5be0 principal evaluation fails" -"2019-07-20 02:40:08.750 UTC [cauthdsl] func1 -> DEBU 19b1 0xc0039d5be0 gate 1563590408746044200 evaluation fails" -"2019-07-20 02:40:08.750 UTC [policies] Evaluate -> DEBU 19b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.750 UTC [policies] Evaluate -> DEBU 19b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.751 UTC [policies] Evaluate -> DEBU 19b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:08.751 UTC [cauthdsl] func1 -> DEBU 19b5 0xc002940420 gate 1563590408751898400 evaluation starts" -"2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b6 0xc002940420 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b7 0xc002940420 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b8 0xc002940420 principal matched by identity 0" -"2019-07-20 02:40:08.752 UTC [msp.identity] Verify -> DEBU 19b9 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:08.752 UTC [msp.identity] Verify -> DEBU 19ba Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:08.753 UTC [cauthdsl] func2 -> DEBU 19bb 0xc002940420 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:08.753 UTC [cauthdsl] func1 -> DEBU 19bc 0xc002940420 gate 1563590408751898400 evaluation succeeds" -"2019-07-20 02:40:08.753 UTC [policies] Evaluate -> DEBU 19bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19bf Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:08.754 UTC [gossip.gossip] handleMessage -> DEBU 19c1 Exiting" -"2019-07-20 02:40:08.754 UTC [gossip.gossip] handleMessage -> DEBU 19c2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c3 Obtaining identity" -"2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c4 Obtaining identity" -"2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c5 Obtaining identity" -"2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19c7 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19c8 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:08.757 UTC [cauthdsl] func1 -> DEBU 19cc 0xc002941f30 gate 1563590408757681600 evaluation starts" -"2019-07-20 02:40:08.757 UTC [cauthdsl] func2 -> DEBU 19cd 0xc002941f30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19ce 0xc002941f30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19cf 0xc002941f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19d0 0xc002941f30 principal evaluation fails" -"2019-07-20 02:40:08.758 UTC [cauthdsl] func1 -> DEBU 19d1 0xc002941f30 gate 1563590408757681600 evaluation fails" -"2019-07-20 02:40:08.758 UTC [policies] Evaluate -> DEBU 19d2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.759 UTC [policies] Evaluate -> DEBU 19d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.759 UTC [policies] Evaluate -> DEBU 19d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:08.759 UTC [cauthdsl] func1 -> DEBU 19d5 0xc002a7c770 gate 1563590408759598600 evaluation starts" -"2019-07-20 02:40:08.759 UTC [cauthdsl] func2 -> DEBU 19d6 0xc002a7c770 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.760 UTC [cauthdsl] func2 -> DEBU 19d7 0xc002a7c770 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.760 UTC [cauthdsl] func2 -> DEBU 19d8 0xc002a7c770 principal matched by identity 0" -"2019-07-20 02:40:08.760 UTC [msp.identity] Verify -> DEBU 19d9 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:08.760 UTC [msp.identity] Verify -> DEBU 19da Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:08.762 UTC [cauthdsl] func2 -> DEBU 19db 0xc002a7c770 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:08.762 UTC [cauthdsl] func1 -> DEBU 19dc 0xc002a7c770 gate 1563590408759598600 evaluation succeeds" -"2019-07-20 02:40:08.763 UTC [policies] Evaluate -> DEBU 19dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.763 UTC [policies] Evaluate -> DEBU 19de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.764 UTC [policies] Evaluate -> DEBU 19df Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:08.764 UTC [policies] Evaluate -> DEBU 19e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:08.764 UTC [msp.identity] Verify -> DEBU 19e1 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:08.764 UTC [msp.identity] Verify -> DEBU 19e2 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:08.765 UTC [msp.identity] Verify -> DEBU 19e3 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:08.768 UTC [msp.identity] Verify -> DEBU 19e4 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:08.768 UTC [msp] DeserializeIdentity -> DEBU 19e5 Obtaining identity" -"2019-07-20 02:40:08.769 UTC [msp] DeserializeIdentity -> DEBU 19e6 Obtaining identity" -"2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19e8 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19e9 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:08.771 UTC [cauthdsl] func1 -> DEBU 19ed 0xc002ef4d80 gate 1563590408771180700 evaluation starts" -"2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19ee 0xc002ef4d80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19ef 0xc002ef4d80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19f0 0xc002ef4d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:08.772 UTC [cauthdsl] func2 -> DEBU 19f1 0xc002ef4d80 principal evaluation fails" -"2019-07-20 02:40:08.772 UTC [cauthdsl] func1 -> DEBU 19f2 0xc002ef4d80 gate 1563590408771180700 evaluation fails" -"2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:08.773 UTC [cauthdsl] func1 -> DEBU 19f6 0xc002ef55c0 gate 1563590408773095200 evaluation starts" -"2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f7 0xc002ef55c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f8 0xc002ef55c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f9 0xc002ef55c0 principal matched by identity 0" -"2019-07-20 02:40:08.773 UTC [msp.identity] Verify -> DEBU 19fa Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:08.774 UTC [msp.identity] Verify -> DEBU 19fb Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:08.774 UTC [cauthdsl] func2 -> DEBU 19fc 0xc002ef55c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:08.774 UTC [cauthdsl] func1 -> DEBU 19fd 0xc002ef55c0 gate 1563590408773095200 evaluation succeeds" -"2019-07-20 02:40:08.774 UTC [policies] Evaluate -> DEBU 19fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.774 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.775 UTC [policies] Evaluate -> DEBU 1a00 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:08.775 UTC [policies] Evaluate -> DEBU 1a01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:08.775 UTC [gossip.gossip] handleMessage -> DEBU 1a02 Exiting" -"2019-07-20 02:40:08.775 UTC [gossip.gossip] handleMessage -> DEBU 1a03 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.775 UTC [msp] DeserializeIdentity -> DEBU 1a04 Obtaining identity" -"2019-07-20 02:40:08.776 UTC [msp] DeserializeIdentity -> DEBU 1a05 Obtaining identity" -"2019-07-20 02:40:08.776 UTC [msp] DeserializeIdentity -> DEBU 1a06 Obtaining identity" -"2019-07-20 02:40:08.776 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a07 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:08.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a08 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a09 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.777 UTC [policies] Evaluate -> DEBU 1a0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:08.777 UTC [policies] Evaluate -> DEBU 1a0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:08.779 UTC [cauthdsl] func1 -> DEBU 1a0d 0xc0038b70d0 gate 1563590408779421800 evaluation starts" -"2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a0e 0xc0038b70d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a0f 0xc0038b70d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a10 0xc0038b70d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a11 0xc0038b70d0 principal evaluation fails" -"2019-07-20 02:40:08.779 UTC [cauthdsl] func1 -> DEBU 1a12 0xc0038b70d0 gate 1563590408779421800 evaluation fails" -"2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a13 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:08.780 UTC [cauthdsl] func1 -> DEBU 1a16 0xc0038b7910 gate 1563590408780043400 evaluation starts" -"2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a17 0xc0038b7910 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a18 0xc0038b7910 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a19 0xc0038b7910 principal matched by identity 0" -"2019-07-20 02:40:08.780 UTC [msp.identity] Verify -> DEBU 1a1a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:08.780 UTC [msp.identity] Verify -> DEBU 1a1b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc0038b7910 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:08.780 UTC [cauthdsl] func1 -> DEBU 1a1d 0xc0038b7910 gate 1563590408780043400 evaluation succeeds" -"2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a1e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a20 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:08.784 UTC [msp.identity] Verify -> DEBU 1a22 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:08.784 UTC [msp.identity] Verify -> DEBU 1a23 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:08.784 UTC [msp] DeserializeIdentity -> DEBU 1a24 Obtaining identity" -"2019-07-20 02:40:08.785 UTC [msp] DeserializeIdentity -> DEBU 1a25 Obtaining identity" -"2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a26 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a27 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a28 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a29 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a2a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:08.788 UTC [cauthdsl] func1 -> DEBU 1a2c 0xc003b1b800 gate 1563590408787939000 evaluation starts" -"2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2d 0xc003b1b800 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2e 0xc003b1b800 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2f 0xc003b1b800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:08.789 UTC [cauthdsl] func2 -> DEBU 1a30 0xc003b1b800 principal evaluation fails" -"2019-07-20 02:40:08.789 UTC [cauthdsl] func1 -> DEBU 1a31 0xc003b1b800 gate 1563590408787939000 evaluation fails" -"2019-07-20 02:40:08.789 UTC [policies] Evaluate -> DEBU 1a32 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.790 UTC [policies] Evaluate -> DEBU 1a33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:08.790 UTC [policies] Evaluate -> DEBU 1a34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:08.790 UTC [cauthdsl] func1 -> DEBU 1a35 0xc003c2c040 gate 1563590408790644700 evaluation starts" -"2019-07-20 02:40:08.790 UTC [cauthdsl] func2 -> DEBU 1a36 0xc003c2c040 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:08.791 UTC [cauthdsl] func2 -> DEBU 1a37 0xc003c2c040 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:08.791 UTC [cauthdsl] func2 -> DEBU 1a38 0xc003c2c040 principal matched by identity 0" -"2019-07-20 02:40:08.791 UTC [msp.identity] Verify -> DEBU 1a39 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:08.792 UTC [msp.identity] Verify -> DEBU 1a3a Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:08.792 UTC [cauthdsl] func2 -> DEBU 1a3b 0xc003c2c040 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:08.792 UTC [cauthdsl] func1 -> DEBU 1a3c 0xc003c2c040 gate 1563590408790644700 evaluation succeeds" -"2019-07-20 02:40:08.792 UTC [policies] Evaluate -> DEBU 1a3d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.795 UTC [policies] Evaluate -> DEBU 1a3e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:08.795 UTC [policies] Evaluate -> DEBU 1a3f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:08.796 UTC [policies] Evaluate -> DEBU 1a40 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:08.796 UTC [msp.identity] Verify -> DEBU 1a41 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:08.797 UTC [msp.identity] Verify -> DEBU 1a42 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:08.797 UTC [gossip.gossip] handleMessage -> DEBU 1a43 Exiting" -"2019-07-20 02:40:08.798 UTC [gossip.gossip] handleMessage -> DEBU 1a44 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.798 UTC [gossip.pull] HandleMessage -> DEBU 1a45 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.798 UTC [gossip.gossip] handleMessage -> DEBU 1a46 Exiting" -"2019-07-20 02:40:08.880 UTC [gossip.comm] func1 -> DEBU 1a47 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.880 UTC [gossip.gossip] handleMessage -> DEBU 1a48 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.880 UTC [msp] DeserializeIdentity -> DEBU 1a49 Obtaining identity" -"2019-07-20 02:40:08.880 UTC [msp] DeserializeIdentity -> DEBU 1a4a Obtaining identity" -"2019-07-20 02:40:08.881 UTC [gossip.gossip] handleMessage -> DEBU 1a4b Exiting" -"2019-07-20 02:40:08.898 UTC [gossip.comm] func1 -> DEBU 1a4c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.898 UTC [gossip.gossip] handleMessage -> DEBU 1a4d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.899 UTC [gossip.pull] HandleMessage -> DEBU 1a4e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:08.899 UTC [gossip.pull] SendDigest -> DEBU 1a4f Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:08.899 UTC [gossip.gossip] handleMessage -> DEBU 1a50 Exiting" -"2019-07-20 02:40:09.042 UTC [gossip.comm] func1 -> DEBU 1a51 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:09.042 UTC [gossip.gossip] handleMessage -> DEBU 1a52 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:09.043 UTC [msp] DeserializeIdentity -> DEBU 1a53 Obtaining identity" -"2019-07-20 02:40:09.043 UTC [msp] DeserializeIdentity -> DEBU 1a54 Obtaining identity" -"2019-07-20 02:40:09.044 UTC [msp] DeserializeIdentity -> DEBU 1a55 Obtaining identity" -"2019-07-20 02:40:09.044 UTC [gossip.gossip] handleMessage -> DEBU 1a56 Exiting" -"2019-07-20 02:40:09.181 UTC [gossip.comm] func1 -> DEBU 1a57 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:09.181 UTC [gossip.gossip] handleMessage -> DEBU 1a58 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a59 Obtaining identity" -"2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a5a Obtaining identity" -"2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a5b Obtaining identity" -"2019-07-20 02:40:09.186 UTC [gossip.gossip] handleMessage -> DEBU 1a5c Exiting" -"2019-07-20 02:40:11.757 UTC [gossip.election] waitForInterrupt -> DEBU 1a5d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:11.757 UTC [gossip.election] IsLeader -> DEBU 1a5e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:11.758 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a5f Obtaining default signing identity" -"2019-07-20 02:40:11.758 UTC [msp.identity] Sign -> DEBU 1a60 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510071801 " -"2019-07-20 02:40:11.758 UTC [msp.identity] Sign -> DEBU 1a61 Sign: digest: F32453B093A8FCF0DB1ACDFCB1A2A453D65AA6A20827F5C70258714B6F5C027F " -"2019-07-20 02:40:11.759 UTC [gossip.election] waitForInterrupt -> DEBU 1a62 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:11.760 UTC [msp] DeserializeIdentity -> DEBU 1a63 Obtaining identity" -"2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a64 Obtaining identity" -"2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a65 Obtaining identity" -"2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a66 Obtaining identity" -"2019-07-20 02:40:11.762 UTC [gossip.comm] Send -> DEBU 1a67 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:11.762 UTC [msp] DeserializeIdentity -> DEBU 1a68 Obtaining identity" -"2019-07-20 02:40:11.762 UTC [msp] DeserializeIdentity -> DEBU 1a69 Obtaining identity" -"2019-07-20 02:40:11.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1a6a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1a6b Exiting" -"2019-07-20 02:40:11.918 UTC [gossip.comm] func1 -> DEBU 1a6c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.919 UTC [gossip.comm] func1 -> DEBU 1a6d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:11.919 UTC [gossip.gossip] handleMessage -> DEBU 1a6e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.920 UTC [gossip.gossip] handleMessage -> DEBU 1a6f Exiting" -"2019-07-20 02:40:11.920 UTC [gossip.gossip] handleMessage -> DEBU 1a70 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:11.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a71 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.921 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a72 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:11.921 UTC [msp] DeserializeIdentity -> DEBU 1a73 Obtaining identity" -"2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a74 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a75 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a76 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a77 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a78 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:11.924 UTC [cauthdsl] func1 -> DEBU 1a7a 0xc0007176f0 gate 1563590411924029300 evaluation starts" -"2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7b 0xc0007176f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc0007176f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc0007176f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7e 0xc0007176f0 principal evaluation fails" -"2019-07-20 02:40:11.925 UTC [cauthdsl] func1 -> DEBU 1a7f 0xc0007176f0 gate 1563590411924029300 evaluation fails" -"2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a80 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:11.926 UTC [cauthdsl] func1 -> DEBU 1a83 0xc000717f30 gate 1563590411925987300 evaluation starts" -"2019-07-20 02:40:11.926 UTC [cauthdsl] func2 -> DEBU 1a84 0xc000717f30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:11.926 UTC [cauthdsl] func2 -> DEBU 1a85 0xc000717f30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:11.927 UTC [cauthdsl] func2 -> DEBU 1a86 0xc000717f30 principal matched by identity 0" -"2019-07-20 02:40:11.927 UTC [msp.identity] Verify -> DEBU 1a87 Verify: digest = 00000000 50 6e 7f af 28 57 0b 0c 11 6e 47 2f e1 0f dc 57 |Pn..(W...nG/...W| -00000010 cc 63 30 d8 ae 7d 4d b3 63 dc 69 a5 59 4b 3d 58 |.c0..}M.c.i.YK=X|" -"2019-07-20 02:40:11.928 UTC [msp.identity] Verify -> DEBU 1a88 Verify: sig = 00000000 30 44 02 20 30 3b da be 0a 27 22 9d b7 14 c7 49 |0D. 0;...'"....I| -00000010 2f 7c 84 d0 d8 8b 25 f3 7c 6d 8a 46 4b 3a 47 97 |/|....%.|m.FK:G.| -00000020 f1 91 20 77 02 20 7e 62 fe 43 56 ab 37 87 cd bf |.. w. ~b.CV.7...| -00000030 21 7b d2 24 5e 56 76 9a d9 b2 c7 19 33 8b 6c 46 |!{.$^Vv.....3.lF| -00000040 e2 11 bc 09 bb 1a |......|" -"2019-07-20 02:40:11.931 UTC [cauthdsl] func2 -> DEBU 1a89 0xc000717f30 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:11.931 UTC [cauthdsl] func1 -> DEBU 1a8a 0xc000717f30 gate 1563590411925987300 evaluation succeeds" -"2019-07-20 02:40:11.931 UTC [policies] Evaluate -> DEBU 1a8b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:11.932 UTC [policies] Evaluate -> DEBU 1a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:11.932 UTC [gossip.comm] func1 -> DEBU 1a8d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.933 UTC [gossip.comm] func1 -> DEBU 1a8e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.933 UTC [policies] Evaluate -> DEBU 1a8f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:11.933 UTC [policies] Evaluate -> DEBU 1a90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:11.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a91 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a92 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a93 updating membership: timestamp: " -"2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a94 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:11.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a95 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:11.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a96 Exiting" -"2019-07-20 02:40:11.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a97 Exiting" -"2019-07-20 02:40:11.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a98 Exiting" -"2019-07-20 02:40:11.936 UTC [gossip.gossip] handleMessage -> DEBU 1a99 Exiting" -"2019-07-20 02:40:11.936 UTC [gossip.gossip] handleMessage -> DEBU 1a9a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a9b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:11.937 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a9c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:11.938 UTC [gossip.comm] func1 -> DEBU 1a9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:11.937 UTC [msp] DeserializeIdentity -> DEBU 1a9e Obtaining identity" -"2019-07-20 02:40:11.938 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a9f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:11.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1aa0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:11.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1aa1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:11.940 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:11.941 UTC [policies] Evaluate -> DEBU 1aa3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:11.942 UTC [policies] Evaluate -> DEBU 1aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:11.943 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc000745fe0 gate 1563590411943047600 evaluation starts" -"2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc000745fe0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc000745fe0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa8 0xc000745fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:11.944 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc000745fe0 principal evaluation fails" -"2019-07-20 02:40:11.944 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc000745fe0 gate 1563590411943047600 evaluation fails" -"2019-07-20 02:40:11.945 UTC [policies] Evaluate -> DEBU 1aab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:11.945 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aad Obtaining identity" -"2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aae Obtaining identity" -"2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aaf Obtaining identity" -"2019-07-20 02:40:11.947 UTC [msp] DeserializeIdentity -> DEBU 1ab0 Obtaining identity" -"2019-07-20 02:40:11.947 UTC [msp] DeserializeIdentity -> DEBU 1ab1 Obtaining identity" -"2019-07-20 02:40:11.948 UTC [msp] DeserializeIdentity -> DEBU 1ab2 Obtaining identity" -"2019-07-20 02:40:11.951 UTC [msp] DeserializeIdentity -> DEBU 1ab3 Obtaining identity" -"2019-07-20 02:40:11.951 UTC [gossip.comm] Send -> DEBU 1ab4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:11.951 UTC [policies] Evaluate -> DEBU 1ab5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:11.951 UTC [msp] DeserializeIdentity -> DEBU 1ab6 Obtaining identity" -"2019-07-20 02:40:11.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ab8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ab9 Exiting" -"2019-07-20 02:40:11.952 UTC [gossip.comm] Send -> DEBU 1aba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:11.953 UTC [gossip.comm] sendToEndpoint -> DEBU 1abb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.952 UTC [cauthdsl] func1 -> DEBU 1ab7 0xc0028aa820 gate 1563590411952008400 evaluation starts" -"2019-07-20 02:40:11.954 UTC [gossip.comm] sendToEndpoint -> DEBU 1abc Exiting" -"2019-07-20 02:40:11.954 UTC [cauthdsl] func2 -> DEBU 1abd 0xc0028aa820 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:11.954 UTC [cauthdsl] func2 -> DEBU 1abe 0xc0028aa820 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:11.955 UTC [cauthdsl] func2 -> DEBU 1abf 0xc0028aa820 principal matched by identity 0" -"2019-07-20 02:40:11.955 UTC [msp.identity] Verify -> DEBU 1ac0 Verify: digest = 00000000 96 c8 c6 7e ce 1f c8 b1 ef b8 07 eb 56 d0 d7 aa |...~........V...| -00000010 4a 4a d9 74 ae 8e 75 a4 4b 4b 7d c5 9e dd c7 a7 |JJ.t..u.KK}.....|" -"2019-07-20 02:40:11.955 UTC [msp.identity] Verify -> DEBU 1ac1 Verify: sig = 00000000 30 45 02 21 00 b3 a8 f4 fb e1 17 c4 eb e2 78 0e |0E.!..........x.| -00000010 4c ef 59 f9 64 c5 f6 79 6c 21 7b 4c 36 11 88 72 |L.Y.d..yl!{L6..r| -00000020 0c 88 fd c8 9c 02 20 4c f6 d0 cb 54 00 e3 9e e5 |...... L...T....| -00000030 1d 7e 07 44 9c 16 4b 16 be 15 31 f6 f8 f5 87 58 |.~.D..K...1....X| -00000040 86 a4 e1 59 be af ec |...Y...|" -"2019-07-20 02:40:11.956 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc0028aa820 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:11.956 UTC [cauthdsl] func1 -> DEBU 1ac3 0xc0028aa820 gate 1563590411952008400 evaluation succeeds" -"2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac6 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:11.958 UTC [policies] Evaluate -> DEBU 1ac7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:11.959 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ac8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1aca updating membership: timestamp: " -"2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acb Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acc Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acd Exiting" -"2019-07-20 02:40:11.959 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ace Exiting" -"2019-07-20 02:40:11.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1acf Exiting" -"2019-07-20 02:40:11.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ad0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ad1 Exiting" -"2019-07-20 02:40:11.960 UTC [gossip.gossip] handleMessage -> DEBU 1ad2 Exiting" -"2019-07-20 02:40:11.960 UTC [gossip.discovery] sendMemResponse -> DEBU 1ad3 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:11.961 UTC [msp] DeserializeIdentity -> DEBU 1ad4 Obtaining identity" -"2019-07-20 02:40:11.960 UTC [gossip.gossip] handleMessage -> DEBU 1ad5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.961 UTC [gossip.gossip] handleMessage -> DEBU 1ad6 Exiting" -"2019-07-20 02:40:11.961 UTC [gossip.gossip] handleMessage -> DEBU 1ad7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ad8 Obtaining identity" -"2019-07-20 02:40:11.962 UTC [gossip.pull] HandleMessage -> DEBU 1ad9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ada Obtaining identity" -"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1adb Obtaining identity" -"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1adc Obtaining identity" -"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1add Obtaining identity" -"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ade Obtaining identity" -"2019-07-20 02:40:11.963 UTC [gossip.comm] Send -> DEBU 1adf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:11.963 UTC [msp] DeserializeIdentity -> DEBU 1ae0 Obtaining identity" -"2019-07-20 02:40:11.963 UTC [msp] DeserializeIdentity -> DEBU 1ae1 Obtaining identity" -"2019-07-20 02:40:11.964 UTC [gossip.discovery] sendMemResponse -> DEBU 1ae2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" > alive:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > alive: alive: " -"2019-07-20 02:40:11.964 UTC [gossip.pull] SendDigest -> DEBU 1ae3 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:11.964 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:11.973 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae6 Exiting" -"2019-07-20 02:40:11.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:11.973 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae7 Exiting" -"2019-07-20 02:40:11.969 UTC [gossip.gossip] handleMessage -> DEBU 1ae8 Exiting" -"2019-07-20 02:40:12.234 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ae9 Obtaining default signing identity" -"2019-07-20 02:40:12.234 UTC [msp.identity] Sign -> DEBU 1aea Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101B " -"2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aeb Sign: digest: CE2B4F1AA88EC06B4B4F6D52277AAB84EFF3B9035584D68F654AC7DBFF895133 " -"2019-07-20 02:40:12.235 UTC [msp] GetDefaultSigningIdentity -> DEBU 1aec Obtaining default signing identity" -"2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aed Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aee Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:12.236 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1aef Sleeping 5s" -"2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af0 Obtaining identity" -"2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af1 Obtaining identity" -"2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af2 Obtaining identity" -"2019-07-20 02:40:12.241 UTC [gossip.comm] Send -> DEBU 1af3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:12.242 UTC [msp] DeserializeIdentity -> DEBU 1af4 Obtaining identity" -"2019-07-20 02:40:12.242 UTC [gossip.comm] Send -> DEBU 1af5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:12.242 UTC [gossip.comm] Send -> DEBU 1af6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af8 Exiting" -"2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1afa Exiting" -"2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1afb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1afc Exiting" -"2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1afd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1afe Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1aff Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1b00 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1b01 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1b02 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b03 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b04 Exiting" -"2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b05 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b06 Exiting" -"2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b07 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.251 UTC [gossip.comm] sendToEndpoint -> DEBU 1b08 Exiting" -"2019-07-20 02:40:12.251 UTC [gossip.comm] func1 -> DEBU 1b09 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.252 UTC [gossip.gossip] handleMessage -> DEBU 1b0c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.253 UTC [gossip.pull] HandleMessage -> DEBU 1b0d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.251 UTC [gossip.comm] func1 -> DEBU 1b0a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.252 UTC [gossip.comm] func1 -> DEBU 1b0b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.254 UTC [gossip.gossip] handleMessage -> DEBU 1b0e Exiting" -"2019-07-20 02:40:12.255 UTC [gossip.gossip] handleMessage -> DEBU 1b0f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.255 UTC [gossip.pull] HandleMessage -> DEBU 1b10 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.256 UTC [gossip.gossip] handleMessage -> DEBU 1b11 Exiting" -"2019-07-20 02:40:12.256 UTC [gossip.gossip] handleMessage -> DEBU 1b12 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.257 UTC [gossip.pull] HandleMessage -> DEBU 1b13 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.257 UTC [gossip.gossip] handleMessage -> DEBU 1b14 Exiting" -"2019-07-20 02:40:12.290 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b15 Obtaining default signing identity" -"2019-07-20 02:40:12.290 UTC [msp.identity] Sign -> DEBU 1b16 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101C " -"2019-07-20 02:40:12.290 UTC [msp.identity] Sign -> DEBU 1b17 Sign: digest: C3F5706A375F12EA1C08F465EF91D9C4D06CEAE01B18956347B9FBEA6DE181AD " -"2019-07-20 02:40:12.290 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b18 Obtaining default signing identity" -"2019-07-20 02:40:12.291 UTC [msp.identity] Sign -> DEBU 1b19 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:12.291 UTC [msp.identity] Sign -> DEBU 1b1a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:12.291 UTC [msp] DeserializeIdentity -> DEBU 1b1b Obtaining identity" -"2019-07-20 02:40:12.291 UTC [gossip.comm] Send -> DEBU 1b1c Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:12.291 UTC [msp] DeserializeIdentity -> DEBU 1b1d Obtaining identity" -"2019-07-20 02:40:12.291 UTC [gossip.comm] Send -> DEBU 1b1e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:12.292 UTC [gossip.comm] Send -> DEBU 1b1f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b20 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b21 Exiting" -"2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b23 Exiting" -"2019-07-20 02:40:12.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1b24 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.294 UTC [gossip.comm] func1 -> DEBU 1b26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.294 UTC [gossip.gossip] handleMessage -> DEBU 1b27 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.294 UTC [gossip.gossip] handleMessage -> DEBU 1b28 Exiting" -"2019-07-20 02:40:12.294 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b29 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b2a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:12.295 UTC [msp.identity] Verify -> DEBU 1b2b Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| -00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" -"2019-07-20 02:40:12.295 UTC [msp.identity] Verify -> DEBU 1b2c Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| -00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| -00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| -00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| -00000040 7f 1e c1 c8 ad 63 |.....c|" -"2019-07-20 02:40:12.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b2d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:12.295 UTC [gossip.discovery] isSentByMe -> DEBU 1b2e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:12.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b2f Exiting" -"2019-07-20 02:40:12.295 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b30 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:12.295 UTC [msp] DeserializeIdentity -> DEBU 1b31 Obtaining identity" -"2019-07-20 02:40:12.294 UTC [gossip.comm] sendToEndpoint -> DEBU 1b32 Exiting" -"2019-07-20 02:40:12.295 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:12.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b34 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b35 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.297 UTC [policies] Evaluate -> DEBU 1b36 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:12.297 UTC [gossip.comm] func1 -> DEBU 1b37 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.297 UTC [gossip.gossip] handleMessage -> DEBU 1b38 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.297 UTC [policies] Evaluate -> DEBU 1b39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:12.294 UTC [gossip.comm] func1 -> DEBU 1b25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.298 UTC [policies] Evaluate -> DEBU 1b3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:12.298 UTC [cauthdsl] func1 -> DEBU 1b3b 0xc003719970 gate 1563590412298571800 evaluation starts" -"2019-07-20 02:40:12.298 UTC [cauthdsl] func2 -> DEBU 1b3c 0xc003719970 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3d 0xc003719970 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3e 0xc003719970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3f 0xc003719970 principal evaluation fails" -"2019-07-20 02:40:12.299 UTC [cauthdsl] func1 -> DEBU 1b40 0xc003719970 gate 1563590412298571800 evaluation fails" -"2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b41 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:12.301 UTC [cauthdsl] func1 -> DEBU 1b44 0xc002a0a1b0 gate 1563590412300947700 evaluation starts" -"2019-07-20 02:40:12.301 UTC [cauthdsl] func2 -> DEBU 1b45 0xc002a0a1b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.301 UTC [cauthdsl] func2 -> DEBU 1b46 0xc002a0a1b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.302 UTC [cauthdsl] func2 -> DEBU 1b47 0xc002a0a1b0 principal matched by identity 0" -"2019-07-20 02:40:12.302 UTC [msp.identity] Verify -> DEBU 1b48 Verify: digest = 00000000 9b 11 f7 ad fc d3 ff 01 32 75 4a e1 30 0a b5 4a |........2uJ.0..J| -00000010 7d 75 ac e0 57 ae 2d bc 93 54 5e 39 8a 31 d0 d2 |}u..W.-..T^9.1..|" -"2019-07-20 02:40:12.302 UTC [msp.identity] Verify -> DEBU 1b49 Verify: sig = 00000000 30 45 02 21 00 89 70 53 2d 1c 3e cc 34 ee ff 2e |0E.!..pS-.>.4...| -00000010 7c 76 70 0d 8e cf 4b f8 28 93 5b d1 9a e7 9f 43 ||vp...K.(.[....C| -00000020 c8 2d 86 94 a0 02 20 39 0f 8d d0 e2 8f 44 1b ee |.-.... 9.....D..| -00000030 28 84 53 fa 8f 45 81 c7 3e 5f 51 f4 46 ec 79 ce |(.S..E..>_Q.F.y.| -00000040 73 b2 78 be 11 5f 01 |s.x.._.|" -"2019-07-20 02:40:12.303 UTC [cauthdsl] func2 -> DEBU 1b4a 0xc002a0a1b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:12.303 UTC [cauthdsl] func1 -> DEBU 1b4b 0xc002a0a1b0 gate 1563590412300947700 evaluation succeeds" -"2019-07-20 02:40:12.303 UTC [policies] Evaluate -> DEBU 1b4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.303 UTC [policies] Evaluate -> DEBU 1b4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.304 UTC [policies] Evaluate -> DEBU 1b4e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:12.304 UTC [policies] Evaluate -> DEBU 1b4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:12.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b50 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b51 Exiting" -"2019-07-20 02:40:12.305 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b52 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:12.305 UTC [msp.identity] Verify -> DEBU 1b53 Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| -00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" -"2019-07-20 02:40:12.306 UTC [msp.identity] Verify -> DEBU 1b54 Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| -00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| -00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| -00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| -00000040 d6 7b d1 42 f8 2d |.{.B.-|" -"2019-07-20 02:40:12.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b55 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:12.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b56 Exiting" -"2019-07-20 02:40:12.306 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b57 Exiting" -"2019-07-20 02:40:12.307 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.307 UTC [gossip.gossip] handleMessage -> DEBU 1b59 Exiting" -"2019-07-20 02:40:12.307 UTC [gossip.gossip] handleMessage -> DEBU 1b5b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.307 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b5a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:12.308 UTC [msp.identity] Verify -> DEBU 1b5c Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| -00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" -"2019-07-20 02:40:12.308 UTC [msp.identity] Verify -> DEBU 1b5d Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| -00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| -00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| -00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| -00000040 d6 7b d1 42 f8 2d |.{.B.-|" -"2019-07-20 02:40:12.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:12.309 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5f Exiting" -"2019-07-20 02:40:12.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b60 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:12.309 UTC [msp.identity] Verify -> DEBU 1b61 Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| -00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" -"2019-07-20 02:40:12.310 UTC [msp.identity] Verify -> DEBU 1b62 Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| -00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| -00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| -00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| -00000040 7f 1e c1 c8 ad 63 |.....c|" -"2019-07-20 02:40:12.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b63 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:12.311 UTC [gossip.discovery] isSentByMe -> DEBU 1b64 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:12.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b65 Exiting" -"2019-07-20 02:40:12.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b66 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:12.312 UTC [msp] DeserializeIdentity -> DEBU 1b67 Obtaining identity" -"2019-07-20 02:40:12.312 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:12.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b69 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b6a Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:12.314 UTC [cauthdsl] func1 -> DEBU 1b6e 0xc00354dc50 gate 1563590412314160000 evaluation starts" -"2019-07-20 02:40:12.314 UTC [cauthdsl] func2 -> DEBU 1b6f 0xc00354dc50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b70 0xc00354dc50 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b71 0xc00354dc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b72 0xc00354dc50 principal evaluation fails" -"2019-07-20 02:40:12.316 UTC [cauthdsl] func1 -> DEBU 1b73 0xc00354dc50 gate 1563590412314160000 evaluation fails" -"2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b74 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b75 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:12.317 UTC [cauthdsl] func1 -> DEBU 1b77 0xc00357a490 gate 1563590412317137700 evaluation starts" -"2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b78 0xc00357a490 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b79 0xc00357a490 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b7a 0xc00357a490 principal matched by identity 0" -"2019-07-20 02:40:12.318 UTC [msp.identity] Verify -> DEBU 1b7b Verify: digest = 00000000 96 c8 c6 7e ce 1f c8 b1 ef b8 07 eb 56 d0 d7 aa |...~........V...| -00000010 4a 4a d9 74 ae 8e 75 a4 4b 4b 7d c5 9e dd c7 a7 |JJ.t..u.KK}.....|" -"2019-07-20 02:40:12.318 UTC [msp.identity] Verify -> DEBU 1b7c Verify: sig = 00000000 30 45 02 21 00 b3 a8 f4 fb e1 17 c4 eb e2 78 0e |0E.!..........x.| -00000010 4c ef 59 f9 64 c5 f6 79 6c 21 7b 4c 36 11 88 72 |L.Y.d..yl!{L6..r| -00000020 0c 88 fd c8 9c 02 20 4c f6 d0 cb 54 00 e3 9e e5 |...... L...T....| -00000030 1d 7e 07 44 9c 16 4b 16 be 15 31 f6 f8 f5 87 58 |.~.D..K...1....X| -00000040 86 a4 e1 59 be af ec |...Y...|" -"2019-07-20 02:40:12.318 UTC [cauthdsl] func2 -> DEBU 1b7d 0xc00357a490 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:12.318 UTC [cauthdsl] func1 -> DEBU 1b7e 0xc00357a490 gate 1563590412317137700 evaluation succeeds" -"2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b7f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b81 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b82 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:12.320 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b83 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.320 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b84 Exiting" -"2019-07-20 02:40:12.320 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b85 Exiting" -"2019-07-20 02:40:12.320 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b86 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.321 UTC [gossip.gossip] handleMessage -> DEBU 1b87 Exiting" -"2019-07-20 02:40:12.321 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b88 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:12.321 UTC [msp.identity] Verify -> DEBU 1b89 Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| -00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" -"2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8a Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| -00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| -00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| -00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| -00000040 7f 1e c1 c8 ad 63 |.....c|" -"2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8b Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8c Verify: sig = 00000000 30 44 02 20 54 2e 65 d6 93 d7 c1 d0 66 50 bb 01 |0D. T.e.....fP..| -00000010 53 9c 76 4e 3a a7 3d ea de 4f 2e 55 3f 96 b0 eb |S.vN:.=..O.U?...| -00000020 06 cb 91 62 02 20 16 5c 55 3b 21 dc e0 72 c6 fd |...b. .\U;!..r..| -00000030 b5 c0 af 55 79 1e f7 77 3d e7 90 d7 5a cb 4b 4a |...Uy..w=...Z.KJ| -00000040 1f 38 45 26 f6 1a |.8E&..|" -"2019-07-20 02:40:12.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:12.323 UTC [gossip.discovery] isSentByMe -> DEBU 1b8e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:12.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8f Exiting" -"2019-07-20 02:40:12.324 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b90 Exiting" -"2019-07-20 02:40:12.363 UTC [gossip.comm] func1 -> DEBU 1b91 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.363 UTC [gossip.comm] func1 -> DEBU 1b92 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b93 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.364 UTC [gossip.pull] HandleMessage -> DEBU 1b94 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.364 UTC [gossip.pull] SendDigest -> DEBU 1b95 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b96 Exiting" -"2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b97 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.365 UTC [gossip.gossip] handleMessage -> DEBU 1b98 Exiting" -"2019-07-20 02:40:12.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b99 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.366 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b9a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:12.366 UTC [msp.identity] Verify -> DEBU 1b9b Verify: digest = 00000000 23 57 6d cb 67 c3 2b 1d 54 04 2e 4e ff d1 34 7d |#Wm.g.+.T..N..4}| -00000010 d7 e7 66 fa 16 70 4b fa 68 e1 8c b2 cc 2a 6e fa |..f..pK.h....*n.|" -"2019-07-20 02:40:12.366 UTC [msp.identity] Verify -> DEBU 1b9c Verify: sig = 00000000 30 45 02 21 00 c8 5c 77 c3 da f1 17 ec 7e fc e2 |0E.!..\w.....~..| -00000010 d5 59 46 ce e0 e9 46 ac 65 e4 3b ee 86 b2 1a a9 |.YF...F.e.;.....| -00000020 0f 53 c5 f4 28 02 20 13 84 7b 1c bb 4a 9a ec d8 |.S..(. ..{..J...| -00000030 f6 85 ac 6d 5f 6a 69 59 cc bc b0 a3 b5 56 de 70 |...m_jiY.....V.p| -00000040 99 97 b9 75 f0 27 d7 |...u.'.|" -"2019-07-20 02:40:12.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b9d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b9e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b9f updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba0 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba1 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba2 Exiting" -"2019-07-20 02:40:12.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ba3 Exiting" -"2019-07-20 02:40:12.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba4 Exiting" -"2019-07-20 02:40:12.369 UTC [gossip.comm] func1 -> DEBU 1ba5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.369 UTC [gossip.gossip] handleMessage -> DEBU 1ba6 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.369 UTC [gossip.gossip] handleMessage -> DEBU 1ba7 Exiting" -"2019-07-20 02:40:12.369 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba8 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.369 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ba9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:12.370 UTC [msp.identity] Verify -> DEBU 1baa Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| -00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" -"2019-07-20 02:40:12.370 UTC [msp.identity] Verify -> DEBU 1bab Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| -00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| -00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| -00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| -00000040 29 a8 53 68 a7 11 7c |).Sh..||" -"2019-07-20 02:40:12.371 UTC [msp.identity] Verify -> DEBU 1bac Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:12.373 UTC [msp.identity] Verify -> DEBU 1bb0 Verify: sig = 00000000 30 44 02 20 7a 2f 52 da 3d 89 6f 10 c3 4f de e2 |0D. z/R.=.o..O..| -00000010 0b 43 6f c1 1f 1f ec b9 c8 f5 85 ce c8 0f f8 16 |.Co.............| -00000020 ee 50 27 2b 02 20 06 b4 ca fc 1f a1 09 20 95 71 |.P'+. ....... .q| -00000030 9e 98 3d 8d 6b 01 1b d5 c0 cc 02 26 78 e3 c3 66 |..=.k......&x..f| -00000040 ee 82 e2 40 c7 fe |...@..|" -"2019-07-20 02:40:12.374 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bb1 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:12.373 UTC [gossip.comm] func1 -> DEBU 1bad Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.374 UTC [gossip.gossip] handleMessage -> DEBU 1bb2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.372 UTC [msp] DeserializeIdentity -> DEBU 1bae Obtaining identity" -"2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb3 Obtaining identity" -"2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb4 Obtaining identity" -"2019-07-20 02:40:12.375 UTC [gossip.comm] Send -> DEBU 1bb5 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb6 Obtaining identity" -"2019-07-20 02:40:12.375 UTC [gossip.comm] Send -> DEBU 1bb7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:12.375 UTC [gossip.comm] sendToEndpoint -> DEBU 1bb8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.375 UTC [gossip.comm] sendToEndpoint -> DEBU 1bb9 Exiting" -"2019-07-20 02:40:12.373 UTC [gossip.comm] func1 -> DEBU 1baf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.376 UTC [gossip.comm] sendToEndpoint -> DEBU 1bba Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.376 UTC [gossip.comm] sendToEndpoint -> DEBU 1bbb Exiting" -"2019-07-20 02:40:12.376 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbd updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbe Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbf Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bc0 Exiting" -"2019-07-20 02:40:12.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bc1 Exiting" -"2019-07-20 02:40:12.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc2 Exiting" -"2019-07-20 02:40:12.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc4 Exiting" -"2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc5 Exiting" -"2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc7 Exiting" -"2019-07-20 02:40:12.378 UTC [gossip.discovery] sendMemResponse -> DEBU 1bc8 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:12.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc9 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.379 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bca Exiting" -"2019-07-20 02:40:12.379 UTC [msp] DeserializeIdentity -> DEBU 1bcb Obtaining identity" -"2019-07-20 02:40:12.379 UTC [msp] DeserializeIdentity -> DEBU 1bcc Obtaining identity" -"2019-07-20 02:40:12.380 UTC [gossip.comm] Send -> DEBU 1bcd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:12.385 UTC [gossip.discovery] sendMemResponse -> DEBU 1bce Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > alive: " -"2019-07-20 02:40:12.385 UTC [gossip.comm] sendToEndpoint -> DEBU 1bcf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.386 UTC [gossip.comm] sendToEndpoint -> DEBU 1bd0 Exiting" -"2019-07-20 02:40:12.552 UTC [gossip.comm] func1 -> DEBU 1bd1 Got message: GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.552 UTC [gossip.comm] func1 -> DEBU 1bd2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd4 Exiting" -"2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.552 UTC [gossip.pull] HandleMessage -> DEBU 1bd6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.552 UTC [msp] DeserializeIdentity -> DEBU 1bd7 Obtaining identity" -"2019-07-20 02:40:12.552 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bd8 Got message: GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.553 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bda Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:12.553 UTC [msp] DeserializeIdentity -> DEBU 1bdb Obtaining identity" -"2019-07-20 02:40:12.554 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bdc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:12.553 UTC [msp] DeserializeIdentity -> DEBU 1bd9 Obtaining identity" -"2019-07-20 02:40:12.554 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bdd Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.555 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.556 UTC [policies] Evaluate -> DEBU 1be1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:12.555 UTC [gossip.comm] func1 -> DEBU 1bde Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.555 UTC [msp] DeserializeIdentity -> DEBU 1bdf Obtaining identity" -"2019-07-20 02:40:12.557 UTC [policies] Evaluate -> DEBU 1be2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:12.558 UTC [policies] Evaluate -> DEBU 1be3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:12.558 UTC [cauthdsl] func1 -> DEBU 1be4 0xc00055fac0 gate 1563590412558214000 evaluation starts" -"2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be5 0xc00055fac0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be6 0xc00055fac0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.558 UTC [msp] DeserializeIdentity -> DEBU 1be7 Obtaining identity" -"2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be8 0xc00055fac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1be9 0xc00055fac0 principal evaluation fails" -"2019-07-20 02:40:12.559 UTC [cauthdsl] func1 -> DEBU 1bea 0xc00055fac0 gate 1563590412558214000 evaluation fails" -"2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1beb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1bec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1bed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:12.559 UTC [cauthdsl] func1 -> DEBU 1bee 0xc003730300 gate 1563590412559502000 evaluation starts" -"2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bef 0xc003730300 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bf0 0xc003730300 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bf1 0xc003730300 principal matched by identity 0" -"2019-07-20 02:40:12.559 UTC [msp.identity] Verify -> DEBU 1bf2 Verify: digest = 00000000 93 35 0e c2 25 f8 8a 17 84 64 01 ba d1 61 30 28 |.5..%....d...a0(| -00000010 b5 d2 27 ff 33 d5 f1 4e b1 90 cd a3 fc 9b fc 89 |..'.3..N........|" -"2019-07-20 02:40:12.559 UTC [msp.identity] Verify -> DEBU 1bf3 Verify: sig = 00000000 30 45 02 21 00 97 1c 21 96 43 13 8c 1b a5 a6 8f |0E.!...!.C......| -00000010 b0 3b 1e c0 4c 6f cb e7 5d 45 3c a0 3e 1a bc dc |.;..Lo..]E<.>...| -00000020 ae b8 ac 8b bb 02 20 07 94 11 5c 1b 70 81 82 3d |...... ...\.p..=| -00000030 73 04 51 d7 01 9d 13 a3 91 dc 85 4a 61 1f ee 8e |s.Q........Ja...| -00000040 85 50 2f a9 4f 9d e4 |.P/.O..|" -"2019-07-20 02:40:12.559 UTC [msp] DeserializeIdentity -> DEBU 1bf4 Obtaining identity" -"2019-07-20 02:40:12.560 UTC [cauthdsl] func2 -> DEBU 1bf5 0xc003730300 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:12.560 UTC [cauthdsl] func1 -> DEBU 1bf7 0xc003730300 gate 1563590412559502000 evaluation succeeds" -"2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bf8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bf9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bfa Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:12.561 UTC [policies] Evaluate -> DEBU 1bfb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:12.561 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bfc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bfd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:12.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bfe updating membership: timestamp: " -"2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bff Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c00 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c01 Exiting" -"2019-07-20 02:40:12.560 UTC [msp] DeserializeIdentity -> DEBU 1bf6 Obtaining identity" -"2019-07-20 02:40:12.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c02 Exiting" -"2019-07-20 02:40:12.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c04 Exiting" -"2019-07-20 02:40:12.563 UTC [gossip.discovery] sendMemResponse -> DEBU 1c05 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c06 Obtaining identity" -"2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c07 Obtaining identity" -"2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c08 Obtaining identity" -"2019-07-20 02:40:12.565 UTC [gossip.comm] Send -> DEBU 1c09 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:12.565 UTC [gossip.discovery] sendMemResponse -> DEBU 1c0a Exiting, replying with alive:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" > alive: " -"2019-07-20 02:40:12.563 UTC [gossip.pull] SendDigest -> DEBU 1c03 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:12.566 UTC [gossip.comm] func1 -> DEBU 1c0c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.566 UTC [gossip.comm] sendToEndpoint -> DEBU 1c0b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.567 UTC [gossip.comm] sendToEndpoint -> DEBU 1c0d Exiting" -"2019-07-20 02:40:12.568 UTC [gossip.comm] func1 -> DEBU 1c0e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.567 UTC [gossip.gossip] handleMessage -> DEBU 1c0f Exiting" -"2019-07-20 02:40:12.569 UTC [gossip.gossip] handleMessage -> DEBU 1c10 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.569 UTC [gossip.gossip] handleMessage -> DEBU 1c11 Exiting" -"2019-07-20 02:40:12.570 UTC [gossip.gossip] handleMessage -> DEBU 1c12 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.570 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c13 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.570 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c14 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:12.570 UTC [msp] DeserializeIdentity -> DEBU 1c15 Obtaining identity" -"2019-07-20 02:40:12.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:12.572 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c17 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.573 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c18 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:12.575 UTC [cauthdsl] func1 -> DEBU 1c1c 0xc003353c60 gate 1563590412575447700 evaluation starts" -"2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1d 0xc003353c60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1e 0xc003353c60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1f 0xc003353c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:12.577 UTC [cauthdsl] func2 -> DEBU 1c20 0xc003353c60 principal evaluation fails" -"2019-07-20 02:40:12.578 UTC [cauthdsl] func1 -> DEBU 1c21 0xc003353c60 gate 1563590412575447700 evaluation fails" -"2019-07-20 02:40:12.578 UTC [policies] Evaluate -> DEBU 1c22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.578 UTC [policies] Evaluate -> DEBU 1c23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.579 UTC [policies] Evaluate -> DEBU 1c24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:12.579 UTC [cauthdsl] func1 -> DEBU 1c25 0xc003a0e4a0 gate 1563590412579715600 evaluation starts" -"2019-07-20 02:40:12.579 UTC [cauthdsl] func2 -> DEBU 1c26 0xc003a0e4a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.580 UTC [cauthdsl] func2 -> DEBU 1c27 0xc003a0e4a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.580 UTC [cauthdsl] func2 -> DEBU 1c28 0xc003a0e4a0 principal matched by identity 0" -"2019-07-20 02:40:12.580 UTC [msp.identity] Verify -> DEBU 1c29 Verify: digest = 00000000 66 b2 e9 33 b3 06 f3 39 07 4d 86 da 59 b0 71 77 |f..3...9.M..Y.qw| -00000010 7d 39 cd ea 94 b5 78 5d 7f cf 90 72 ef 81 fd 1b |}9....x]...r....|" -"2019-07-20 02:40:12.580 UTC [msp.identity] Verify -> DEBU 1c2a Verify: sig = 00000000 30 45 02 21 00 f6 4b 80 fe 8f dd 13 d4 75 98 e8 |0E.!..K......u..| -00000010 62 4c 0a 3f a4 40 ce 0e a6 37 f3 07 a8 12 7b 89 |bL.?.@...7....{.| -00000020 71 8e c3 08 97 02 20 68 c8 a5 95 a0 9a ea 4a b9 |q..... h......J.| -00000030 49 c3 90 cb d1 bc ea cc e4 de 8d aa 91 fd a0 ac |I...............| -00000040 4f 98 d6 d9 41 a2 3d |O...A.=|" -"2019-07-20 02:40:12.581 UTC [cauthdsl] func2 -> DEBU 1c2b 0xc003a0e4a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:12.581 UTC [cauthdsl] func1 -> DEBU 1c2c 0xc003a0e4a0 gate 1563590412579715600 evaluation succeeds" -"2019-07-20 02:40:12.581 UTC [policies] Evaluate -> DEBU 1c2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c2f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c31 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c32 endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1563590372570532900, 29 but got ts: inc_num:1563590372570532900 seq_num:28 " -"2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c33 Exiting" -"2019-07-20 02:40:12.583 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c34 Exiting" -"2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c35 Exiting" -"2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c37 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c36 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c38 Exiting" -"2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c39 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c3a Exiting" -"2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c3b Exiting" -"2019-07-20 02:40:12.588 UTC [msp] DeserializeIdentity -> DEBU 1c3c Obtaining identity" -"2019-07-20 02:40:12.588 UTC [msp] DeserializeIdentity -> DEBU 1c3d Obtaining identity" -"2019-07-20 02:40:12.589 UTC [msp] DeserializeIdentity -> DEBU 1c3e Obtaining identity" -"2019-07-20 02:40:12.589 UTC [msp] DeserializeIdentity -> DEBU 1c3f Obtaining identity" -"2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c40 Obtaining identity" -"2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c41 Obtaining identity" -"2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c42 Obtaining identity" -"2019-07-20 02:40:12.591 UTC [gossip.comm] Send -> DEBU 1c43 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:12.591 UTC [msp] DeserializeIdentity -> DEBU 1c44 Obtaining identity" -"2019-07-20 02:40:12.591 UTC [gossip.comm] sendToEndpoint -> DEBU 1c45 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.591 UTC [gossip.comm] sendToEndpoint -> DEBU 1c46 Exiting" -"2019-07-20 02:40:12.592 UTC [gossip.comm] Send -> DEBU 1c47 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:12.592 UTC [gossip.comm] sendToEndpoint -> DEBU 1c48 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:12.592 UTC [gossip.comm] sendToEndpoint -> DEBU 1c49 Exiting" -"2019-07-20 02:40:12.717 UTC [msp] DeserializeIdentity -> DEBU 1c4a Obtaining identity" -"2019-07-20 02:40:12.718 UTC [msp] DeserializeIdentity -> DEBU 1c4b Obtaining identity" -"2019-07-20 02:40:12.718 UTC [gossip.comm] Send -> DEBU 1c4c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4e Exiting" -"2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c51 Exiting" -"2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c50 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.720 UTC [gossip.comm] func1 -> DEBU 1c52 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.722 UTC [gossip.comm] func1 -> DEBU 1c53 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1c54 Exiting" -"2019-07-20 02:40:12.722 UTC [gossip.gossip] handleMessage -> DEBU 1c55 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.722 UTC [msp] DeserializeIdentity -> DEBU 1c56 Obtaining identity" -"2019-07-20 02:40:12.723 UTC [msp] DeserializeIdentity -> DEBU 1c57 Obtaining identity" -"2019-07-20 02:40:12.723 UTC [msp] DeserializeIdentity -> DEBU 1c58 Obtaining identity" -"2019-07-20 02:40:12.723 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c59 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:12.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c5a Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c5b Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:12.724 UTC [cauthdsl] func1 -> DEBU 1c5f 0xc003be0760 gate 1563590412724456500 evaluation starts" -"2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c60 0xc003be0760 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c61 0xc003be0760 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c62 0xc003be0760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c63 0xc003be0760 principal evaluation fails" -"2019-07-20 02:40:12.724 UTC [cauthdsl] func1 -> DEBU 1c64 0xc003be0760 gate 1563590412724456500 evaluation fails" -"2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c65 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:12.725 UTC [cauthdsl] func1 -> DEBU 1c68 0xc003be0fa0 gate 1563590412725972500 evaluation starts" -"2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c69 0xc003be0fa0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c6a 0xc003be0fa0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c6b 0xc003be0fa0 principal matched by identity 0" -"2019-07-20 02:40:12.726 UTC [msp.identity] Verify -> DEBU 1c6c Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:12.726 UTC [msp.identity] Verify -> DEBU 1c6d Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:12.727 UTC [cauthdsl] func2 -> DEBU 1c6e 0xc003be0fa0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:12.727 UTC [cauthdsl] func1 -> DEBU 1c6f 0xc003be0fa0 gate 1563590412725972500 evaluation succeeds" -"2019-07-20 02:40:12.727 UTC [policies] Evaluate -> DEBU 1c70 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.727 UTC [policies] Evaluate -> DEBU 1c71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.729 UTC [policies] Evaluate -> DEBU 1c72 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:12.729 UTC [policies] Evaluate -> DEBU 1c73 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:12.729 UTC [msp.identity] Verify -> DEBU 1c74 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:12.730 UTC [msp.identity] Verify -> DEBU 1c76 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:12.730 UTC [msp] DeserializeIdentity -> DEBU 1c77 Obtaining identity" -"2019-07-20 02:40:12.731 UTC [msp] DeserializeIdentity -> DEBU 1c78 Obtaining identity" -"2019-07-20 02:40:12.729 UTC [gossip.comm] func1 -> DEBU 1c75 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.731 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c79 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7a Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7b Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.732 UTC [policies] Evaluate -> DEBU 1c7c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:12.733 UTC [policies] Evaluate -> DEBU 1c7d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:12.733 UTC [policies] Evaluate -> DEBU 1c7e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:12.733 UTC [cauthdsl] func1 -> DEBU 1c7f 0xc000676470 gate 1563590412733754100 evaluation starts" -"2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c80 0xc000676470 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c81 0xc000676470 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c82 0xc000676470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c83 0xc000676470 principal evaluation fails" -"2019-07-20 02:40:12.734 UTC [cauthdsl] func1 -> DEBU 1c84 0xc000676470 gate 1563590412733754100 evaluation fails" -"2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c85 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c87 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:12.735 UTC [cauthdsl] func1 -> DEBU 1c88 0xc000676cb0 gate 1563590412735845900 evaluation starts" -"2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c89 0xc000676cb0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c8a 0xc000676cb0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c8b 0xc000676cb0 principal matched by identity 0" -"2019-07-20 02:40:12.736 UTC [msp.identity] Verify -> DEBU 1c8c Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:12.737 UTC [msp.identity] Verify -> DEBU 1c8d Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:12.737 UTC [cauthdsl] func2 -> DEBU 1c8e 0xc000676cb0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:12.737 UTC [cauthdsl] func1 -> DEBU 1c8f 0xc000676cb0 gate 1563590412735845900 evaluation succeeds" -"2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c92 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:12.739 UTC [msp] DeserializeIdentity -> DEBU 1c94 Obtaining identity" -"2019-07-20 02:40:12.739 UTC [msp] DeserializeIdentity -> DEBU 1c95 Obtaining identity" -"2019-07-20 02:40:12.739 UTC [gossip.pull] Hello -> DEBU 1c96 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:12.740 UTC [msp] DeserializeIdentity -> DEBU 1c97 Obtaining identity" -"2019-07-20 02:40:12.740 UTC [msp.identity] Verify -> DEBU 1c98 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:12.740 UTC [msp] DeserializeIdentity -> DEBU 1c99 Obtaining identity" -"2019-07-20 02:40:12.740 UTC [gossip.comm] Send -> DEBU 1c9a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9c Exiting" -"2019-07-20 02:40:12.742 UTC [gossip.comm] func1 -> DEBU 1c9d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.740 UTC [msp.identity] Verify -> DEBU 1c9e Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:12.743 UTC [gossip.gossip] handleMessage -> DEBU 1c9f Exiting" -"2019-07-20 02:40:12.744 UTC [gossip.gossip] handleMessage -> DEBU 1ca0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.744 UTC [msp.identity] Verify -> DEBU 1ca1 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:12.744 UTC [msp.identity] Verify -> DEBU 1ca2 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:12.745 UTC [msp.identity] Verify -> DEBU 1ca3 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:12.745 UTC [msp.identity] Verify -> DEBU 1ca4 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:12.746 UTC [msp] DeserializeIdentity -> DEBU 1ca5 Obtaining identity" -"2019-07-20 02:40:12.746 UTC [msp] DeserializeIdentity -> DEBU 1ca6 Obtaining identity" -"2019-07-20 02:40:12.746 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ca7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:12.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca8 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca9 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.747 UTC [policies] Evaluate -> DEBU 1caa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:12.748 UTC [policies] Evaluate -> DEBU 1cab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:12.748 UTC [policies] Evaluate -> DEBU 1cac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:12.748 UTC [cauthdsl] func1 -> DEBU 1cad 0xc002ee5c20 gate 1563590412748635200 evaluation starts" -"2019-07-20 02:40:12.748 UTC [cauthdsl] func2 -> DEBU 1cae 0xc002ee5c20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1caf 0xc002ee5c20 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1cb0 0xc002ee5c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1cb1 0xc002ee5c20 principal evaluation fails" -"2019-07-20 02:40:12.749 UTC [cauthdsl] func1 -> DEBU 1cb2 0xc002ee5c20 gate 1563590412748635200 evaluation fails" -"2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:12.750 UTC [cauthdsl] func1 -> DEBU 1cb6 0xc003106460 gate 1563590412750893400 evaluation starts" -"2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb7 0xc003106460 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb8 0xc003106460 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb9 0xc003106460 principal matched by identity 0" -"2019-07-20 02:40:12.752 UTC [msp.identity] Verify -> DEBU 1cba Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:12.752 UTC [msp.identity] Verify -> DEBU 1cbb Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:12.752 UTC [cauthdsl] func2 -> DEBU 1cbc 0xc003106460 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:12.753 UTC [cauthdsl] func1 -> DEBU 1cbd 0xc003106460 gate 1563590412750893400 evaluation succeeds" -"2019-07-20 02:40:12.753 UTC [policies] Evaluate -> DEBU 1cbe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.753 UTC [policies] Evaluate -> DEBU 1cbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.754 UTC [policies] Evaluate -> DEBU 1cc0 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:12.754 UTC [policies] Evaluate -> DEBU 1cc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:12.755 UTC [msp] DeserializeIdentity -> DEBU 1cc2 Obtaining identity" -"2019-07-20 02:40:12.755 UTC [msp] DeserializeIdentity -> DEBU 1cc3 Obtaining identity" -"2019-07-20 02:40:12.755 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:12.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cc5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cc6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:12.757 UTC [cauthdsl] func1 -> DEBU 1cca 0xc003107c30 gate 1563590412757102400 evaluation starts" -"2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccb 0xc003107c30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccc 0xc003107c30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccd 0xc003107c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:12.758 UTC [cauthdsl] func2 -> DEBU 1cce 0xc003107c30 principal evaluation fails" -"2019-07-20 02:40:12.758 UTC [cauthdsl] func1 -> DEBU 1ccf 0xc003107c30 gate 1563590412757102400 evaluation fails" -"2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:12.759 UTC [cauthdsl] func1 -> DEBU 1cd3 0xc003202470 gate 1563590412759144400 evaluation starts" -"2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd4 0xc003202470 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd5 0xc003202470 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd6 0xc003202470 principal matched by identity 0" -"2019-07-20 02:40:12.760 UTC [msp.identity] Verify -> DEBU 1cd7 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:12.760 UTC [msp.identity] Verify -> DEBU 1cd8 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:12.760 UTC [cauthdsl] func2 -> DEBU 1cd9 0xc003202470 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:12.761 UTC [cauthdsl] func1 -> DEBU 1cda 0xc003202470 gate 1563590412759144400 evaluation succeeds" -"2019-07-20 02:40:12.761 UTC [policies] Evaluate -> DEBU 1cdb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.761 UTC [policies] Evaluate -> DEBU 1cdc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.762 UTC [policies] Evaluate -> DEBU 1cdd Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:12.762 UTC [policies] Evaluate -> DEBU 1cde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:12.762 UTC [gossip.gossip] handleMessage -> DEBU 1cdf Exiting" -"2019-07-20 02:40:12.762 UTC [gossip.gossip] handleMessage -> DEBU 1ce0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.762 UTC [msp] DeserializeIdentity -> DEBU 1ce1 Obtaining identity" -"2019-07-20 02:40:12.763 UTC [msp] DeserializeIdentity -> DEBU 1ce2 Obtaining identity" -"2019-07-20 02:40:12.763 UTC [msp] DeserializeIdentity -> DEBU 1ce3 Obtaining identity" -"2019-07-20 02:40:12.763 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ce4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:12.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ce5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ce6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.764 UTC [policies] Evaluate -> DEBU 1ce7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:12.765 UTC [policies] Evaluate -> DEBU 1ce8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:12.765 UTC [policies] Evaluate -> DEBU 1ce9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:12.766 UTC [cauthdsl] func1 -> DEBU 1cea 0xc003203f80 gate 1563590412766367800 evaluation starts" -"2019-07-20 02:40:12.766 UTC [cauthdsl] func2 -> DEBU 1ceb 0xc003203f80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.766 UTC [cauthdsl] func2 -> DEBU 1cec 0xc003203f80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.767 UTC [cauthdsl] func2 -> DEBU 1ced 0xc003203f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:12.767 UTC [cauthdsl] func2 -> DEBU 1cee 0xc003203f80 principal evaluation fails" -"2019-07-20 02:40:12.767 UTC [cauthdsl] func1 -> DEBU 1cef 0xc003203f80 gate 1563590412766367800 evaluation fails" -"2019-07-20 02:40:12.767 UTC [policies] Evaluate -> DEBU 1cf0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.768 UTC [policies] Evaluate -> DEBU 1cf1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.768 UTC [policies] Evaluate -> DEBU 1cf2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:12.768 UTC [cauthdsl] func1 -> DEBU 1cf3 0xc0032127c0 gate 1563590412768604100 evaluation starts" -"2019-07-20 02:40:12.768 UTC [cauthdsl] func2 -> DEBU 1cf4 0xc0032127c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.769 UTC [cauthdsl] func2 -> DEBU 1cf5 0xc0032127c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.769 UTC [cauthdsl] func2 -> DEBU 1cf6 0xc0032127c0 principal matched by identity 0" -"2019-07-20 02:40:12.769 UTC [msp.identity] Verify -> DEBU 1cf7 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:12.769 UTC [msp.identity] Verify -> DEBU 1cf8 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:12.770 UTC [cauthdsl] func2 -> DEBU 1cf9 0xc0032127c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:12.770 UTC [cauthdsl] func1 -> DEBU 1cfa 0xc0032127c0 gate 1563590412768604100 evaluation succeeds" -"2019-07-20 02:40:12.771 UTC [policies] Evaluate -> DEBU 1cfb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.771 UTC [policies] Evaluate -> DEBU 1cfc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.772 UTC [policies] Evaluate -> DEBU 1cfd Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:12.772 UTC [policies] Evaluate -> DEBU 1cfe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:12.772 UTC [msp.identity] Verify -> DEBU 1cff Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d00 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d01 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d02 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:12.774 UTC [msp] DeserializeIdentity -> DEBU 1d03 Obtaining identity" -"2019-07-20 02:40:12.775 UTC [msp] DeserializeIdentity -> DEBU 1d04 Obtaining identity" -"2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d06 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d07 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:12.775 UTC [policies] Evaluate -> DEBU 1d08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:12.776 UTC [policies] Evaluate -> DEBU 1d09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:12.776 UTC [policies] Evaluate -> DEBU 1d0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:12.777 UTC [cauthdsl] func1 -> DEBU 1d0b 0xc003968dd0 gate 1563590412777229200 evaluation starts" -"2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0c 0xc003968dd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0d 0xc003968dd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0e 0xc003968dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:12.778 UTC [cauthdsl] func2 -> DEBU 1d0f 0xc003968dd0 principal evaluation fails" -"2019-07-20 02:40:12.778 UTC [cauthdsl] func1 -> DEBU 1d10 0xc003968dd0 gate 1563590412777229200 evaluation fails" -"2019-07-20 02:40:12.778 UTC [policies] Evaluate -> DEBU 1d11 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.779 UTC [policies] Evaluate -> DEBU 1d12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:12.779 UTC [policies] Evaluate -> DEBU 1d13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:12.779 UTC [cauthdsl] func1 -> DEBU 1d14 0xc003969610 gate 1563590412779480700 evaluation starts" -"2019-07-20 02:40:12.779 UTC [cauthdsl] func2 -> DEBU 1d15 0xc003969610 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:12.779 UTC [cauthdsl] func2 -> DEBU 1d16 0xc003969610 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:12.780 UTC [cauthdsl] func2 -> DEBU 1d17 0xc003969610 principal matched by identity 0" -"2019-07-20 02:40:12.780 UTC [msp.identity] Verify -> DEBU 1d18 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:12.780 UTC [msp.identity] Verify -> DEBU 1d19 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:12.781 UTC [cauthdsl] func2 -> DEBU 1d1a 0xc003969610 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:12.781 UTC [cauthdsl] func1 -> DEBU 1d1b 0xc003969610 gate 1563590412779480700 evaluation succeeds" -"2019-07-20 02:40:12.781 UTC [policies] Evaluate -> DEBU 1d1c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.781 UTC [policies] Evaluate -> DEBU 1d1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:12.782 UTC [policies] Evaluate -> DEBU 1d1e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:12.782 UTC [policies] Evaluate -> DEBU 1d1f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:12.782 UTC [gossip.gossip] handleMessage -> DEBU 1d20 Exiting" -"2019-07-20 02:40:12.782 UTC [gossip.gossip] handleMessage -> DEBU 1d21 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.783 UTC [gossip.pull] HandleMessage -> DEBU 1d22 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.783 UTC [gossip.gossip] handleMessage -> DEBU 1d23 Exiting" -"2019-07-20 02:40:12.878 UTC [gossip.comm] func1 -> DEBU 1d24 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.879 UTC [gossip.gossip] handleMessage -> DEBU 1d25 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.880 UTC [msp] DeserializeIdentity -> DEBU 1d26 Obtaining identity" -"2019-07-20 02:40:12.880 UTC [msp] DeserializeIdentity -> DEBU 1d27 Obtaining identity" -"2019-07-20 02:40:12.880 UTC [gossip.gossip] handleMessage -> DEBU 1d28 Exiting" -"2019-07-20 02:40:12.899 UTC [gossip.comm] func1 -> DEBU 1d29 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.899 UTC [gossip.gossip] handleMessage -> DEBU 1d2a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.900 UTC [gossip.pull] HandleMessage -> DEBU 1d2b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:12.900 UTC [gossip.pull] SendDigest -> DEBU 1d2c Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:12.900 UTC [gossip.gossip] handleMessage -> DEBU 1d2d Exiting" -"2019-07-20 02:40:13.047 UTC [gossip.comm] func1 -> DEBU 1d2e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:13.047 UTC [gossip.gossip] handleMessage -> DEBU 1d2f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:13.047 UTC [msp] DeserializeIdentity -> DEBU 1d30 Obtaining identity" -"2019-07-20 02:40:13.048 UTC [msp] DeserializeIdentity -> DEBU 1d31 Obtaining identity" -"2019-07-20 02:40:13.048 UTC [msp] DeserializeIdentity -> DEBU 1d32 Obtaining identity" -"2019-07-20 02:40:13.048 UTC [gossip.gossip] handleMessage -> DEBU 1d33 Exiting" -"2019-07-20 02:40:13.181 UTC [gossip.comm] func1 -> DEBU 1d34 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:13.184 UTC [gossip.gossip] handleMessage -> DEBU 1d35 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d36 Obtaining identity" -"2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d37 Obtaining identity" -"2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d38 Obtaining identity" -"2019-07-20 02:40:13.185 UTC [gossip.gossip] handleMessage -> DEBU 1d39 Exiting" -"2019-07-20 02:40:15.752 UTC [chaincode.platform.util] DockerBuild -> DEBU 1d3a Build output is # examples/chaincode/go/chaincode_example02 -/tmp/go-link-111193500/000001.o: In function `pluginOpen': -/workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -/tmp/go-link-111193500/000021.o: In function `mygetgrouplist': -/workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -/tmp/go-link-111193500/000020.o: In function `mygetgrgid_r': -/workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -/tmp/go-link-111193500/000020.o: In function `mygetgrnam_r': -/workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -/tmp/go-link-111193500/000020.o: In function `mygetpwnam_r': -/workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -/tmp/go-link-111193500/000020.o: In function `mygetpwuid_r': -/workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking -/tmp/go-link-111193500/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': -/tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking" -"2019-07-20 02:40:15.921 UTC [gossip.comm] func1 -> DEBU 1d3b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:15.922 UTC [gossip.gossip] handleMessage -> DEBU 1d3c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:15.922 UTC [gossip.gossip] handleMessage -> DEBU 1d3d Exiting" -"2019-07-20 02:40:15.922 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d3e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:15.922 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d3f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:15.922 UTC [msp] DeserializeIdentity -> DEBU 1d40 Obtaining identity" -"2019-07-20 02:40:15.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d41 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:15.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d42 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:15.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d43 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d44 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d45 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d46 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:15.925 UTC [cauthdsl] func1 -> DEBU 1d47 0xc003fc5100 gate 1563590415925224500 evaluation starts" -"2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d48 0xc003fc5100 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d49 0xc003fc5100 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d4a 0xc003fc5100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:15.926 UTC [cauthdsl] func2 -> DEBU 1d4b 0xc003fc5100 principal evaluation fails" -"2019-07-20 02:40:15.926 UTC [cauthdsl] func1 -> DEBU 1d4c 0xc003fc5100 gate 1563590415925224500 evaluation fails" -"2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:15.927 UTC [cauthdsl] func1 -> DEBU 1d50 0xc003fc5940 gate 1563590415927346400 evaluation starts" -"2019-07-20 02:40:15.927 UTC [cauthdsl] func2 -> DEBU 1d51 0xc003fc5940 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:15.929 UTC [cauthdsl] func2 -> DEBU 1d52 0xc003fc5940 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:15.931 UTC [cauthdsl] func2 -> DEBU 1d53 0xc003fc5940 principal matched by identity 0" -"2019-07-20 02:40:15.931 UTC [msp.identity] Verify -> DEBU 1d54 Verify: digest = 00000000 44 70 96 6d 08 eb 0e 01 af ca 46 e3 23 2e 6e 2a |Dp.m......F.#.n*| -00000010 74 22 20 a5 ee 9e 36 37 01 7a 39 01 b2 ef 07 a2 |t" ...67.z9.....|" -"2019-07-20 02:40:15.931 UTC [msp.identity] Verify -> DEBU 1d55 Verify: sig = 00000000 30 45 02 21 00 ae 53 71 0d e6 d6 d7 4e 55 75 7a |0E.!..Sq....NUuz| -00000010 1c 3a 1f f9 ea 9b 65 f2 db 7f 1d 5f d9 92 97 5f |.:....e...._..._| -00000020 ef 05 77 85 8b 02 20 1e 07 05 1f fc b7 b9 b6 e8 |..w... .........| -00000030 87 4f d1 44 d5 d4 00 14 5a 56 49 53 11 44 be 5f |.O.D....ZVIS.D._| -00000040 e1 ea 1b 14 b1 d0 68 |......h|" -"2019-07-20 02:40:15.932 UTC [cauthdsl] func2 -> DEBU 1d56 0xc003fc5940 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:15.932 UTC [cauthdsl] func1 -> DEBU 1d57 0xc003fc5940 gate 1563590415927346400 evaluation succeeds" -"2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d58 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d59 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d5a Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d5b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:15.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d5c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5e updating membership: timestamp: " -"2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5f Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d60 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:15.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d61 Exiting" -"2019-07-20 02:40:15.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d62 Exiting" -"2019-07-20 02:40:15.934 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d63 Exiting" -"2019-07-20 02:40:15.934 UTC [gossip.discovery] sendMemResponse -> DEBU 1d64 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:15.934 UTC [msp] DeserializeIdentity -> DEBU 1d65 Obtaining identity" -"2019-07-20 02:40:15.935 UTC [msp] DeserializeIdentity -> DEBU 1d66 Obtaining identity" -"2019-07-20 02:40:15.935 UTC [msp] DeserializeIdentity -> DEBU 1d67 Obtaining identity" -"2019-07-20 02:40:15.935 UTC [gossip.comm] Send -> DEBU 1d68 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:15.936 UTC [gossip.comm] sendToEndpoint -> DEBU 1d69 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:15.936 UTC [gossip.comm] sendToEndpoint -> DEBU 1d6a Exiting" -"2019-07-20 02:40:15.937 UTC [gossip.discovery] sendMemResponse -> DEBU 1d6b Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" > alive:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > alive: alive: " -"2019-07-20 02:40:15.939 UTC [gossip.comm] func1 -> DEBU 1d6c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:15.939 UTC [gossip.gossip] handleMessage -> DEBU 1d6d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:15.939 UTC [gossip.pull] HandleMessage -> DEBU 1d6e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d6f Obtaining identity" -"2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d70 Obtaining identity" -"2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d71 Obtaining identity" -"2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d72 Obtaining identity" -"2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d73 Obtaining identity" -"2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d74 Obtaining identity" -"2019-07-20 02:40:15.940 UTC [gossip.pull] SendDigest -> DEBU 1d75 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:15.940 UTC [gossip.gossip] handleMessage -> DEBU 1d76 Exiting" -"2019-07-20 02:40:16.250 UTC [gossip.pull] Hello -> DEBU 1d77 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d78 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:16.251 UTC [gossip.pull] Hello -> DEBU 1d79 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d7a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:16.251 UTC [gossip.pull] Hello -> DEBU 1d7b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d7c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7e Exiting" -"2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.253 UTC [gossip.comm] sendToEndpoint -> DEBU 1d80 Exiting" -"2019-07-20 02:40:16.253 UTC [gossip.comm] sendToEndpoint -> DEBU 1d81 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.254 UTC [gossip.comm] sendToEndpoint -> DEBU 1d82 Exiting" -"2019-07-20 02:40:16.255 UTC [gossip.comm] func1 -> DEBU 1d83 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.255 UTC [gossip.gossip] handleMessage -> DEBU 1d84 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.255 UTC [gossip.pull] HandleMessage -> DEBU 1d85 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.255 UTC [gossip.gossip] handleMessage -> DEBU 1d86 Exiting" -"2019-07-20 02:40:16.256 UTC [gossip.comm] func1 -> DEBU 1d87 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.256 UTC [gossip.gossip] handleMessage -> DEBU 1d88 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.256 UTC [gossip.pull] HandleMessage -> DEBU 1d89 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.257 UTC [gossip.gossip] handleMessage -> DEBU 1d8a Exiting" -"2019-07-20 02:40:16.257 UTC [gossip.comm] func1 -> DEBU 1d8b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.257 UTC [gossip.gossip] handleMessage -> DEBU 1d8c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.257 UTC [gossip.pull] HandleMessage -> DEBU 1d8d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.258 UTC [gossip.gossip] handleMessage -> DEBU 1d8e Exiting" -"2019-07-20 02:40:16.292 UTC [msp] GetDefaultSigningIdentity -> DEBU 1d8f Obtaining default signing identity" -"2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d90 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101D " -"2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d91 Sign: digest: EAF7A22AF5CA8E0579A0B66E67EF7FD85BB66BB3C7E606070BF191AB7011B33B " -"2019-07-20 02:40:16.292 UTC [msp] GetDefaultSigningIdentity -> DEBU 1d92 Obtaining default signing identity" -"2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d93 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d94 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:16.292 UTC [gossip.comm] Send -> DEBU 1d95 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:16.292 UTC [msp] DeserializeIdentity -> DEBU 1d96 Obtaining identity" -"2019-07-20 02:40:16.293 UTC [gossip.comm] Send -> DEBU 1d97 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:16.293 UTC [msp] DeserializeIdentity -> DEBU 1d98 Obtaining identity" -"2019-07-20 02:40:16.293 UTC [gossip.comm] Send -> DEBU 1d99 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9b Exiting" -"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9d Exiting" -"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9f Exiting" -"2019-07-20 02:40:16.297 UTC [gossip.comm] func1 -> DEBU 1da0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.297 UTC [gossip.gossip] handleMessage -> DEBU 1da1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.297 UTC [gossip.gossip] handleMessage -> DEBU 1da2 Exiting" -"2019-07-20 02:40:16.298 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.298 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1da4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:16.298 UTC [msp.identity] Verify -> DEBU 1da5 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| -00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" -"2019-07-20 02:40:16.298 UTC [msp.identity] Verify -> DEBU 1da6 Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| -00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| -00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| -00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| -00000040 ef b1 c2 24 bf d1 2d |...$..-|" -"2019-07-20 02:40:16.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:16.299 UTC [gossip.discovery] isSentByMe -> DEBU 1da8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:16.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da9 Exiting" -"2019-07-20 02:40:16.299 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1daa Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:16.299 UTC [msp] DeserializeIdentity -> DEBU 1dab Obtaining identity" -"2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1dac Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dad Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dae Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.300 UTC [policies] Evaluate -> DEBU 1daf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:16.300 UTC [policies] Evaluate -> DEBU 1db0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:16.301 UTC [policies] Evaluate -> DEBU 1db1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1db2 0xc003e15250 gate 1563590416301899900 evaluation starts" -"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db3 0xc003e15250 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db4 0xc003e15250 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db5 0xc003e15250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db6 0xc003e15250 principal evaluation fails" -"2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1db7 0xc003e15250 gate 1563590416301899900 evaluation fails" -"2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1db8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1dba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1dbb 0xc003e15bc0 gate 1563590416302711000 evaluation starts" -"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbc 0xc003e15bc0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbd 0xc003e15bc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbe 0xc003e15bc0 principal matched by identity 0" -"2019-07-20 02:40:16.303 UTC [msp.identity] Verify -> DEBU 1dbf Verify: digest = 00000000 93 35 0e c2 25 f8 8a 17 84 64 01 ba d1 61 30 28 |.5..%....d...a0(| -00000010 b5 d2 27 ff 33 d5 f1 4e b1 90 cd a3 fc 9b fc 89 |..'.3..N........|" -"2019-07-20 02:40:16.303 UTC [msp.identity] Verify -> DEBU 1dc0 Verify: sig = 00000000 30 45 02 21 00 97 1c 21 96 43 13 8c 1b a5 a6 8f |0E.!...!.C......| -00000010 b0 3b 1e c0 4c 6f cb e7 5d 45 3c a0 3e 1a bc dc |.;..Lo..]E<.>...| -00000020 ae b8 ac 8b bb 02 20 07 94 11 5c 1b 70 81 82 3d |...... ...\.p..=| -00000030 73 04 51 d7 01 9d 13 a3 91 dc 85 4a 61 1f ee 8e |s.Q........Ja...| -00000040 85 50 2f a9 4f 9d e4 |.P/.O..|" -"2019-07-20 02:40:16.303 UTC [cauthdsl] func2 -> DEBU 1dc1 0xc003e15bc0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:16.303 UTC [cauthdsl] func1 -> DEBU 1dc2 0xc003e15bc0 gate 1563590416302711000 evaluation succeeds" -"2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc5 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:16.303 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc8 Exiting" -"2019-07-20 02:40:16.304 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dc9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:16.304 UTC [msp.identity] Verify -> DEBU 1dca Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| -00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" -"2019-07-20 02:40:16.304 UTC [msp.identity] Verify -> DEBU 1dcb Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| -00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| -00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| -00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| -00000040 29 a8 53 68 a7 11 7c |).Sh..||" -"2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dcc Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dcd Exiting" -"2019-07-20 02:40:16.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dce Exiting" -"2019-07-20 02:40:16.305 UTC [gossip.comm] func1 -> DEBU 1dcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.305 UTC [gossip.gossip] handleMessage -> DEBU 1dd0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.305 UTC [gossip.gossip] handleMessage -> DEBU 1dd1 Exiting" -"2019-07-20 02:40:16.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dd2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dd3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:16.306 UTC [msp.identity] Verify -> DEBU 1dd4 Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| -00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" -"2019-07-20 02:40:16.306 UTC [msp.identity] Verify -> DEBU 1dd5 Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| -00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| -00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| -00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| -00000040 29 a8 53 68 a7 11 7c |).Sh..||" -"2019-07-20 02:40:16.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dd6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:16.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dd7 Exiting" -"2019-07-20 02:40:16.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dd8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:16.307 UTC [msp.identity] Verify -> DEBU 1dd9 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| -00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" -"2019-07-20 02:40:16.307 UTC [msp.identity] Verify -> DEBU 1dda Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| -00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| -00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| -00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| -00000040 ef b1 c2 24 bf d1 2d |...$..-|" -"2019-07-20 02:40:16.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ddb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:16.307 UTC [gossip.discovery] isSentByMe -> DEBU 1ddc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:16.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ddd Exiting" -"2019-07-20 02:40:16.308 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dde Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:16.308 UTC [msp] DeserializeIdentity -> DEBU 1ddf Obtaining identity" -"2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1de0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:16.308 UTC [cauthdsl] func1 -> DEBU 1de6 0xc003dc1ac0 gate 1563590416308814200 evaluation starts" -"2019-07-20 02:40:16.308 UTC [cauthdsl] func2 -> DEBU 1de7 0xc003dc1ac0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.308 UTC [cauthdsl] func2 -> DEBU 1de8 0xc003dc1ac0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1de9 0xc003dc1ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1dea 0xc003dc1ac0 principal evaluation fails" -"2019-07-20 02:40:16.309 UTC [cauthdsl] func1 -> DEBU 1deb 0xc003dc1ac0 gate 1563590416308814200 evaluation fails" -"2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1dec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1ded == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1dee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:16.309 UTC [cauthdsl] func1 -> DEBU 1def 0xc003d44300 gate 1563590416309552900 evaluation starts" -"2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1df0 0xc003d44300 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df1 0xc003d44300 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df2 0xc003d44300 principal matched by identity 0" -"2019-07-20 02:40:16.310 UTC [msp.identity] Verify -> DEBU 1df3 Verify: digest = 00000000 44 70 96 6d 08 eb 0e 01 af ca 46 e3 23 2e 6e 2a |Dp.m......F.#.n*| -00000010 74 22 20 a5 ee 9e 36 37 01 7a 39 01 b2 ef 07 a2 |t" ...67.z9.....|" -"2019-07-20 02:40:16.310 UTC [msp.identity] Verify -> DEBU 1df4 Verify: sig = 00000000 30 45 02 21 00 ae 53 71 0d e6 d6 d7 4e 55 75 7a |0E.!..Sq....NUuz| -00000010 1c 3a 1f f9 ea 9b 65 f2 db 7f 1d 5f d9 92 97 5f |.:....e...._..._| -00000020 ef 05 77 85 8b 02 20 1e 07 05 1f fc b7 b9 b6 e8 |..w... .........| -00000030 87 4f d1 44 d5 d4 00 14 5a 56 49 53 11 44 be 5f |.O.D....ZVIS.D._| -00000040 e1 ea 1b 14 b1 d0 68 |......h|" -"2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df5 0xc003d44300 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:16.311 UTC [cauthdsl] func1 -> DEBU 1df6 0xc003d44300 gate 1563590416309552900 evaluation succeeds" -"2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df9 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1dfa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:16.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dfb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:16.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dfc Exiting" -"2019-07-20 02:40:16.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dfd Exiting" -"2019-07-20 02:40:16.312 UTC [gossip.comm] func1 -> DEBU 1dfe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.312 UTC [gossip.gossip] handleMessage -> DEBU 1dff Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.312 UTC [gossip.gossip] handleMessage -> DEBU 1e00 Exiting" -"2019-07-20 02:40:16.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e01 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e02 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:16.313 UTC [msp.identity] Verify -> DEBU 1e03 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| -00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" -"2019-07-20 02:40:16.313 UTC [msp.identity] Verify -> DEBU 1e04 Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| -00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| -00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| -00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| -00000040 ef b1 c2 24 bf d1 2d |...$..-|" -"2019-07-20 02:40:16.314 UTC [msp.identity] Verify -> DEBU 1e05 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:16.314 UTC [msp.identity] Verify -> DEBU 1e06 Verify: sig = 00000000 30 44 02 20 7f f1 98 24 6f 3d ca 92 29 ba d5 f2 |0D. ...$o=..)...| -00000010 f7 19 e4 f9 b8 9a 6d 7e 18 4c 64 f1 11 1b be 71 |......m~.Ld....q| -00000020 5f 69 1e ba 02 20 42 95 c2 21 f1 b1 c1 dd b2 5c |_i... B..!.....\| -00000030 5b ba f5 ff 92 bc f2 b8 98 ee 4d b5 db 17 fd 8c |[.........M.....| -00000040 22 a4 3f 78 a3 a7 |".?x..|" -"2019-07-20 02:40:16.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e07 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:16.315 UTC [gossip.discovery] isSentByMe -> DEBU 1e08 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:16.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e09 Exiting" -"2019-07-20 02:40:16.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e0a Exiting" -"2019-07-20 02:40:16.373 UTC [gossip.comm] func1 -> DEBU 1e0b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.373 UTC [gossip.comm] func1 -> DEBU 1e0c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.374 UTC [gossip.gossip] handleMessage -> DEBU 1e0d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.374 UTC [gossip.pull] HandleMessage -> DEBU 1e0e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.375 UTC [gossip.pull] SendDigest -> DEBU 1e0f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e10 Exiting" -"2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e11 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e12 Exiting" -"2019-07-20 02:40:16.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e13 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.375 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e14 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:16.376 UTC [msp.identity] Verify -> DEBU 1e15 Verify: digest = 00000000 d4 88 79 4c ab ef ec 5b 4c fc 3a 9e ed 6b 4d 0b |..yL...[L.:..kM.| -00000010 78 12 ce 61 78 05 ed 1e ea 74 26 40 4f 96 7f 21 |x..ax....t&@O..!|" -"2019-07-20 02:40:16.376 UTC [msp.identity] Verify -> DEBU 1e16 Verify: sig = 00000000 30 45 02 21 00 ff 6b 12 d9 6e bc fe cb 4e a6 87 |0E.!..k..n...N..| -00000010 1a a3 8c 53 e7 1b f2 4e 35 a5 5e fb 70 03 cf cd |...S...N5.^.p...| -00000020 df 98 12 fc 8c 02 20 6f 81 c0 48 ae 61 09 d7 fe |...... o..H.a...| -00000030 d2 5e eb 81 bd 02 12 a4 9e 76 ab d0 1d ed 52 40 |.^.......v....R@| -00000040 be 83 ab ee 51 8a e3 |....Q..|" -"2019-07-20 02:40:16.377 UTC [msp.identity] Verify -> DEBU 1e17 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:16.377 UTC [msp.identity] Verify -> DEBU 1e18 Verify: sig = 00000000 30 45 02 21 00 c5 1a 8f 3f 40 5f c4 67 33 2a eb |0E.!....?@_.g3*.| -00000010 ca 9d 80 53 5b a8 d3 3e 03 44 07 ca 3a 73 4e 75 |...S[..>.D..:sNu| -00000020 d4 02 79 a9 95 02 20 07 d6 08 69 cf f9 09 4e ab |..y... ...i...N.| -00000030 a8 83 77 48 68 7b e5 86 58 5c d3 b8 53 d1 0d 6f |..wHh{..X\..S..o| -00000040 67 44 ae d0 62 a0 d9 |gD..b..|" -"2019-07-20 02:40:16.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e19 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:16.381 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:16.381 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1e Exiting" -"2019-07-20 02:40:16.381 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e1f Exiting" -"2019-07-20 02:40:16.382 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e20 Exiting" -"2019-07-20 02:40:16.382 UTC [gossip.discovery] sendMemResponse -> DEBU 1e21 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:16.389 UTC [msp] DeserializeIdentity -> DEBU 1e22 Obtaining identity" -"2019-07-20 02:40:16.389 UTC [msp] DeserializeIdentity -> DEBU 1e23 Obtaining identity" -"2019-07-20 02:40:16.390 UTC [gossip.comm] Send -> DEBU 1e24 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:16.390 UTC [gossip.discovery] sendMemResponse -> DEBU 1e25 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > alive: " -"2019-07-20 02:40:16.390 UTC [gossip.comm] sendToEndpoint -> DEBU 1e26 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.390 UTC [gossip.comm] sendToEndpoint -> DEBU 1e27 Exiting" -"2019-07-20 02:40:16.551 UTC [gossip.comm] func1 -> DEBU 1e28 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.554 UTC [gossip.gossip] handleMessage -> DEBU 1e29 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.554 UTC [gossip.pull] HandleMessage -> DEBU 1e2a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2b Obtaining identity" -"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2c Obtaining identity" -"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2d Obtaining identity" -"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2e Obtaining identity" -"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2f Obtaining identity" -"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e30 Obtaining identity" -"2019-07-20 02:40:16.555 UTC [gossip.pull] SendDigest -> DEBU 1e31 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:16.555 UTC [gossip.gossip] handleMessage -> DEBU 1e32 Exiting" -"2019-07-20 02:40:16.555 UTC [gossip.comm] func1 -> DEBU 1e33 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.556 UTC [gossip.gossip] handleMessage -> DEBU 1e34 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.556 UTC [gossip.gossip] handleMessage -> DEBU 1e35 Exiting" -"2019-07-20 02:40:16.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e36 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.556 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e37 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:16.556 UTC [msp] DeserializeIdentity -> DEBU 1e38 Obtaining identity" -"2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e3a Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e3b Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:16.557 UTC [cauthdsl] func1 -> DEBU 1e3f 0xc003c5c0b0 gate 1563590416557187600 evaluation starts" -"2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e40 0xc003c5c0b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e41 0xc003c5c0b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e42 0xc003c5c0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:16.558 UTC [cauthdsl] func2 -> DEBU 1e43 0xc003c5c0b0 principal evaluation fails" -"2019-07-20 02:40:16.558 UTC [cauthdsl] func1 -> DEBU 1e44 0xc003c5c0b0 gate 1563590416557187600 evaluation fails" -"2019-07-20 02:40:16.558 UTC [policies] Evaluate -> DEBU 1e45 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:16.559 UTC [cauthdsl] func1 -> DEBU 1e48 0xc003c5c900 gate 1563590416559132400 evaluation starts" -"2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e49 0xc003c5c900 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4a 0xc003c5c900 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4b 0xc003c5c900 principal matched by identity 0" -"2019-07-20 02:40:16.559 UTC [msp.identity] Verify -> DEBU 1e4c Verify: digest = 00000000 61 a3 4c 02 09 c8 78 79 d5 52 cf cd c1 b5 88 0d |a.L...xy.R......| -00000010 9c 8e b8 05 37 19 ef af 13 62 ce ee 3d 5b f8 dd |....7....b..=[..|" -"2019-07-20 02:40:16.559 UTC [msp.identity] Verify -> DEBU 1e4d Verify: sig = 00000000 30 44 02 20 0f cb ae d7 9d 43 db d7 6b 83 72 5b |0D. .....C..k.r[| -00000010 30 9c ae d6 c3 a9 46 c1 82 2c 7e 40 77 7b c0 44 |0.....F..,~@w{.D| -00000020 62 c5 a3 ab 02 20 2b 76 9d f6 21 dd e2 da f0 c7 |b.... +v..!.....| -00000030 ea 69 d3 40 25 84 b9 cb 68 43 69 26 c2 39 b8 2e |.i.@%...hCi&.9..| -00000040 2a bb af f6 89 1e |*.....|" -"2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4e 0xc003c5c900 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:16.559 UTC [cauthdsl] func1 -> DEBU 1e4f 0xc003c5c900 gate 1563590416559132400 evaluation succeeds" -"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e50 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e52 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:16.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e54 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e55 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e56 updating membership: timestamp: " -"2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e57 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e58 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:16.560 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e59 Exiting" -"2019-07-20 02:40:16.560 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e5a Exiting" -"2019-07-20 02:40:16.560 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e5b Exiting" -"2019-07-20 02:40:16.561 UTC [gossip.discovery] sendMemResponse -> DEBU 1e5c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:16.561 UTC [msp] DeserializeIdentity -> DEBU 1e5d Obtaining identity" -"2019-07-20 02:40:16.562 UTC [msp] DeserializeIdentity -> DEBU 1e5e Obtaining identity" -"2019-07-20 02:40:16.562 UTC [msp] DeserializeIdentity -> DEBU 1e5f Obtaining identity" -"2019-07-20 02:40:16.562 UTC [gossip.comm] Send -> DEBU 1e60 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:16.562 UTC [gossip.discovery] sendMemResponse -> DEBU 1e61 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" > alive: alive: alive: " -"2019-07-20 02:40:16.562 UTC [gossip.comm] sendToEndpoint -> DEBU 1e62 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.562 UTC [gossip.comm] sendToEndpoint -> DEBU 1e63 Exiting" -"2019-07-20 02:40:16.721 UTC [msp] DeserializeIdentity -> DEBU 1e64 Obtaining identity" -"2019-07-20 02:40:16.721 UTC [msp] DeserializeIdentity -> DEBU 1e65 Obtaining identity" -"2019-07-20 02:40:16.721 UTC [gossip.comm] Send -> DEBU 1e66 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e67 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e68 Exiting" -"2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e69 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6a Exiting" -"2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6c Exiting" -"2019-07-20 02:40:16.723 UTC [gossip.comm] func1 -> DEBU 1e6d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.723 UTC [gossip.gossip] handleMessage -> DEBU 1e6e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e6f Obtaining identity" -"2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e70 Obtaining identity" -"2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e71 Obtaining identity" -"2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e73 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e74 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:16.726 UTC [cauthdsl] func1 -> DEBU 1e78 0xc003bb2470 gate 1563590416726517700 evaluation starts" -"2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e79 0xc003bb2470 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7a 0xc003bb2470 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7b 0xc003bb2470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7c 0xc003bb2470 principal evaluation fails" -"2019-07-20 02:40:16.726 UTC [cauthdsl] func1 -> DEBU 1e7d 0xc003bb2470 gate 1563590416726517700 evaluation fails" -"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e7e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:16.727 UTC [cauthdsl] func1 -> DEBU 1e81 0xc003bb2cd0 gate 1563590416727128300 evaluation starts" -"2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e82 0xc003bb2cd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e83 0xc003bb2cd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e84 0xc003bb2cd0 principal matched by identity 0" -"2019-07-20 02:40:16.727 UTC [msp.identity] Verify -> DEBU 1e85 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:16.727 UTC [msp.identity] Verify -> DEBU 1e86 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e87 0xc003bb2cd0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:16.727 UTC [cauthdsl] func1 -> DEBU 1e88 0xc003bb2cd0 gate 1563590416727128300 evaluation succeeds" -"2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8b Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8d Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8e Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e90 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:16.729 UTC [msp] DeserializeIdentity -> DEBU 1e91 Obtaining identity" -"2019-07-20 02:40:16.729 UTC [msp] DeserializeIdentity -> DEBU 1e92 Obtaining identity" -"2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e93 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e94 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e95 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.729 UTC [policies] Evaluate -> DEBU 1e96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:16.729 UTC [policies] Evaluate -> DEBU 1e97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1e98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1e99 0xc003b67400 gate 1563590416730027400 evaluation starts" -"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9a 0xc003b67400 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9b 0xc003b67400 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9c 0xc003b67400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9d 0xc003b67400 principal evaluation fails" -"2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1e9e 0xc003b67400 gate 1563590416730027400 evaluation fails" -"2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1e9f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1ea0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1ea1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1ea2 0xc003b67c40 gate 1563590416730842400 evaluation starts" -"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1ea3 0xc003b67c40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1ea4 0xc003b67c40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.731 UTC [cauthdsl] func2 -> DEBU 1ea5 0xc003b67c40 principal matched by identity 0" -"2019-07-20 02:40:16.731 UTC [msp.identity] Verify -> DEBU 1ea6 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:16.731 UTC [msp.identity] Verify -> DEBU 1ea7 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:16.731 UTC [cauthdsl] func2 -> DEBU 1ea8 0xc003b67c40 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:16.731 UTC [cauthdsl] func1 -> DEBU 1ea9 0xc003b67c40 gate 1563590416730842400 evaluation succeeds" -"2019-07-20 02:40:16.731 UTC [policies] Evaluate -> DEBU 1eaa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.731 UTC [policies] Evaluate -> DEBU 1eab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.732 UTC [policies] Evaluate -> DEBU 1eac Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:16.732 UTC [policies] Evaluate -> DEBU 1ead == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:16.732 UTC [gossip.gossip] handleMessage -> DEBU 1eae Exiting" -"2019-07-20 02:40:16.732 UTC [gossip.comm] func1 -> DEBU 1eaf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.732 UTC [gossip.gossip] handleMessage -> DEBU 1eb0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.733 UTC [msp] DeserializeIdentity -> DEBU 1eb1 Obtaining identity" -"2019-07-20 02:40:16.736 UTC [msp] DeserializeIdentity -> DEBU 1eb2 Obtaining identity" -"2019-07-20 02:40:16.737 UTC [msp] DeserializeIdentity -> DEBU 1eb3 Obtaining identity" -"2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1eb4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eb5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eb6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.739 UTC [policies] Evaluate -> DEBU 1eb7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:16.741 UTC [policies] Evaluate -> DEBU 1eb8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:16.741 UTC [policies] Evaluate -> DEBU 1eb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:16.747 UTC [cauthdsl] func1 -> DEBU 1eba 0xc003aa58d0 gate 1563590416742339500 evaluation starts" -"2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebb 0xc003aa58d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebc 0xc003aa58d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebd 0xc003aa58d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebe 0xc003aa58d0 principal evaluation fails" -"2019-07-20 02:40:16.747 UTC [cauthdsl] func1 -> DEBU 1ebf 0xc003aa58d0 gate 1563590416742339500 evaluation fails" -"2019-07-20 02:40:16.747 UTC [policies] Evaluate -> DEBU 1ec0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.748 UTC [policies] Evaluate -> DEBU 1ec1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.748 UTC [policies] Evaluate -> DEBU 1ec2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:16.748 UTC [msp] DeserializeIdentity -> DEBU 1ec3 Obtaining identity" -"2019-07-20 02:40:16.748 UTC [msp] DeserializeIdentity -> DEBU 1ec4 Obtaining identity" -"2019-07-20 02:40:16.749 UTC [gossip.pull] Hello -> DEBU 1ec5 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:16.749 UTC [msp] DeserializeIdentity -> DEBU 1ec6 Obtaining identity" -"2019-07-20 02:40:16.749 UTC [msp] DeserializeIdentity -> DEBU 1ec7 Obtaining identity" -"2019-07-20 02:40:16.749 UTC [gossip.comm] Send -> DEBU 1ec8 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:16.749 UTC [gossip.comm] sendToEndpoint -> DEBU 1ec9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.749 UTC [gossip.comm] sendToEndpoint -> DEBU 1eca Exiting" -"2019-07-20 02:40:16.749 UTC [gossip.comm] func1 -> DEBU 1ecb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.748 UTC [cauthdsl] func1 -> DEBU 1ecc 0xc003a8c110 gate 1563590416748113900 evaluation starts" -"2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ecd 0xc003a8c110 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ece 0xc003a8c110 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ecf 0xc003a8c110 principal matched by identity 0" -"2019-07-20 02:40:16.749 UTC [msp.identity] Verify -> DEBU 1ed0 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:16.749 UTC [msp.identity] Verify -> DEBU 1ed1 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:16.750 UTC [cauthdsl] func2 -> DEBU 1ed2 0xc003a8c110 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:16.750 UTC [cauthdsl] func1 -> DEBU 1ed3 0xc003a8c110 gate 1563590416748113900 evaluation succeeds" -"2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed6 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:16.750 UTC [msp.identity] Verify -> DEBU 1ed8 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:16.750 UTC [msp.identity] Verify -> DEBU 1ed9 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:16.751 UTC [msp] DeserializeIdentity -> DEBU 1eda Obtaining identity" -"2019-07-20 02:40:16.751 UTC [msp] DeserializeIdentity -> DEBU 1edb Obtaining identity" -"2019-07-20 02:40:16.754 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1edc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:16.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1edd Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ede Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.755 UTC [policies] Evaluate -> DEBU 1edf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:16.756 UTC [policies] Evaluate -> DEBU 1ee0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:16.756 UTC [policies] Evaluate -> DEBU 1ee1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:16.756 UTC [cauthdsl] func1 -> DEBU 1ee2 0xc0039c2b00 gate 1563590416756518800 evaluation starts" -"2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee3 0xc0039c2b00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee4 0xc0039c2b00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee5 0xc0039c2b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:16.758 UTC [cauthdsl] func2 -> DEBU 1ee6 0xc0039c2b00 principal evaluation fails" -"2019-07-20 02:40:16.758 UTC [cauthdsl] func1 -> DEBU 1ee7 0xc0039c2b00 gate 1563590416756518800 evaluation fails" -"2019-07-20 02:40:16.758 UTC [policies] Evaluate -> DEBU 1ee8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.758 UTC [policies] Evaluate -> DEBU 1ee9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.759 UTC [policies] Evaluate -> DEBU 1eea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:16.760 UTC [cauthdsl] func1 -> DEBU 1eeb 0xc0039c3340 gate 1563590416760566000 evaluation starts" -"2019-07-20 02:40:16.760 UTC [cauthdsl] func2 -> DEBU 1eec 0xc0039c3340 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.761 UTC [cauthdsl] func2 -> DEBU 1eed 0xc0039c3340 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.761 UTC [cauthdsl] func2 -> DEBU 1eee 0xc0039c3340 principal matched by identity 0" -"2019-07-20 02:40:16.761 UTC [msp.identity] Verify -> DEBU 1eef Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:16.762 UTC [msp.identity] Verify -> DEBU 1ef0 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:16.762 UTC [cauthdsl] func2 -> DEBU 1ef1 0xc0039c3340 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:16.762 UTC [cauthdsl] func1 -> DEBU 1ef2 0xc0039c3340 gate 1563590416760566000 evaluation succeeds" -"2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef5 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:16.763 UTC [msp.identity] Verify -> DEBU 1ef7 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:16.763 UTC [msp.identity] Verify -> DEBU 1ef8 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:16.765 UTC [gossip.gossip] handleMessage -> DEBU 1ef9 Exiting" -"2019-07-20 02:40:16.765 UTC [gossip.gossip] handleMessage -> DEBU 1efa Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.766 UTC [msp.identity] Verify -> DEBU 1efb Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:16.766 UTC [msp.identity] Verify -> DEBU 1efc Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:16.767 UTC [msp.identity] Verify -> DEBU 1efd Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:16.767 UTC [msp.identity] Verify -> DEBU 1efe Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:16.768 UTC [msp] DeserializeIdentity -> DEBU 1eff Obtaining identity" -"2019-07-20 02:40:16.768 UTC [msp] DeserializeIdentity -> DEBU 1f00 Obtaining identity" -"2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f01 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f02 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f03 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.770 UTC [policies] Evaluate -> DEBU 1f04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:16.772 UTC [policies] Evaluate -> DEBU 1f05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:16.773 UTC [policies] Evaluate -> DEBU 1f06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:16.774 UTC [cauthdsl] func1 -> DEBU 1f07 0xc0039382d0 gate 1563590416774009200 evaluation starts" -"2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f08 0xc0039382d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f09 0xc0039382d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f0a 0xc0039382d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:16.775 UTC [cauthdsl] func2 -> DEBU 1f0b 0xc0039382d0 principal evaluation fails" -"2019-07-20 02:40:16.775 UTC [cauthdsl] func1 -> DEBU 1f0c 0xc0039382d0 gate 1563590416774009200 evaluation fails" -"2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:16.775 UTC [cauthdsl] func1 -> DEBU 1f10 0xc003938b10 gate 1563590416775804700 evaluation starts" -"2019-07-20 02:40:16.775 UTC [cauthdsl] func2 -> DEBU 1f11 0xc003938b10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f12 0xc003938b10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f13 0xc003938b10 principal matched by identity 0" -"2019-07-20 02:40:16.776 UTC [msp.identity] Verify -> DEBU 1f14 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:16.776 UTC [msp.identity] Verify -> DEBU 1f15 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f16 0xc003938b10 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:16.776 UTC [cauthdsl] func1 -> DEBU 1f17 0xc003938b10 gate 1563590416775804700 evaluation succeeds" -"2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f1a Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:16.777 UTC [policies] Evaluate -> DEBU 1f1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:16.777 UTC [msp] DeserializeIdentity -> DEBU 1f1c Obtaining identity" -"2019-07-20 02:40:16.777 UTC [msp] DeserializeIdentity -> DEBU 1f1d Obtaining identity" -"2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f1e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f1f Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f20 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.777 UTC [policies] Evaluate -> DEBU 1f21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f24 0xc00392c2f0 gate 1563590416778246900 evaluation starts" -"2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f25 0xc00392c2f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f26 0xc00392c2f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f27 0xc00392c2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f28 0xc00392c2f0 principal evaluation fails" -"2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f29 0xc00392c2f0 gate 1563590416778246900 evaluation fails" -"2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f2d 0xc00392cb40 gate 1563590416778963500 evaluation starts" -"2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f2e 0xc00392cb40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f2f 0xc00392cb40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f30 0xc00392cb40 principal matched by identity 0" -"2019-07-20 02:40:16.779 UTC [msp.identity] Verify -> DEBU 1f31 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:16.779 UTC [msp.identity] Verify -> DEBU 1f32 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f33 0xc00392cb40 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:16.779 UTC [cauthdsl] func1 -> DEBU 1f34 0xc00392cb40 gate 1563590416778963500 evaluation succeeds" -"2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f35 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f37 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:16.780 UTC [gossip.gossip] handleMessage -> DEBU 1f39 Exiting" -"2019-07-20 02:40:16.780 UTC [gossip.election] waitForInterrupt -> DEBU 1f3a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:16.781 UTC [gossip.election] IsLeader -> DEBU 1f3c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:16.781 UTC [msp] GetDefaultSigningIdentity -> DEBU 1f3d Obtaining default signing identity" -"2019-07-20 02:40:16.782 UTC [msp.identity] Sign -> DEBU 1f3e Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510081801 " -"2019-07-20 02:40:16.782 UTC [msp.identity] Sign -> DEBU 1f3f Sign: digest: 72C061B50037B049C617D6280701E32A01DAC65D803A3817D50E2C07CBCF1128 " -"2019-07-20 02:40:16.783 UTC [gossip.election] waitForInterrupt -> DEBU 1f40 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:16.780 UTC [gossip.comm] func1 -> DEBU 1f3b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.783 UTC [gossip.gossip] handleMessage -> DEBU 1f41 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.783 UTC [gossip.pull] HandleMessage -> DEBU 1f42 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.784 UTC [gossip.gossip] handleMessage -> DEBU 1f43 Exiting" -"2019-07-20 02:40:16.791 UTC [msp] DeserializeIdentity -> DEBU 1f44 Obtaining identity" -"2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f45 Obtaining identity" -"2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f46 Obtaining identity" -"2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f47 Obtaining identity" -"2019-07-20 02:40:16.792 UTC [gossip.comm] Send -> DEBU 1f48 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f49 Obtaining identity" -"2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f4a Obtaining identity" -"2019-07-20 02:40:16.793 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.793 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4c Exiting" -"2019-07-20 02:40:16.881 UTC [gossip.comm] func1 -> DEBU 1f4d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.881 UTC [gossip.gossip] handleMessage -> DEBU 1f4e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.881 UTC [msp] DeserializeIdentity -> DEBU 1f4f Obtaining identity" -"2019-07-20 02:40:16.882 UTC [msp] DeserializeIdentity -> DEBU 1f50 Obtaining identity" -"2019-07-20 02:40:16.882 UTC [gossip.gossip] handleMessage -> DEBU 1f51 Exiting" -"2019-07-20 02:40:16.900 UTC [gossip.comm] func1 -> DEBU 1f52 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.900 UTC [gossip.gossip] handleMessage -> DEBU 1f53 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.900 UTC [gossip.pull] HandleMessage -> DEBU 1f54 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.900 UTC [gossip.pull] SendDigest -> DEBU 1f55 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:16.900 UTC [gossip.gossip] handleMessage -> DEBU 1f56 Exiting" -"2019-07-20 02:40:16.916 UTC [gossip.comm] func1 -> DEBU 1f57 Got message: GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.916 UTC [gossip.gossip] handleMessage -> DEBU 1f58 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.916 UTC [gossip.gossip] handleMessage -> DEBU 1f59 Exiting" -"2019-07-20 02:40:16.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f5a Got message: GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f5b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:16.917 UTC [msp.identity] Verify -> DEBU 1f5c Verify: digest = 00000000 cc 35 f5 ac a4 a9 a4 14 67 4a 65 c3 39 7e 1b 4c |.5......gJe.9~.L| -00000010 b4 ca 28 e0 ed 43 61 87 bf c3 02 2b dc 47 31 8b |..(..Ca....+.G1.|" -"2019-07-20 02:40:16.917 UTC [msp.identity] Verify -> DEBU 1f5d Verify: sig = 00000000 30 44 02 20 1b 0b b3 f9 28 4a 21 28 f9 0a f6 a7 |0D. ....(J!(....| -00000010 6b 49 ef 9c dc 3e 3d 78 e7 49 de 89 55 7b cc ac |kI...>=x.I..U{..| -00000020 40 7e b3 42 02 20 03 55 3c 12 32 0a 46 ef c1 3e |@~.B. .U<.2.F..>| -00000030 76 89 d8 1f c4 21 6f 41 32 da 89 db 40 98 0e 19 |v....!oA2...@...| -00000040 83 ac 72 d8 de 1a |..r...|" -"2019-07-20 02:40:16.918 UTC [msp.identity] Verify -> DEBU 1f5e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:16.918 UTC [msp.identity] Verify -> DEBU 1f5f Verify: sig = 00000000 30 44 02 20 59 aa 69 60 a2 b7 28 11 ed 8e c6 e0 |0D. Y.i`..(.....| -00000010 9d 39 d7 71 f5 7a 50 15 2e ff 79 5b 2c 82 76 c3 |.9.q.zP...y[,.v.| -00000020 44 9d 41 10 02 20 08 02 8e a9 c9 63 76 d1 a3 9b |D.A.. .....cv...| -00000030 1d d8 aa ff c3 c1 1d 85 be 4a 0b 7b ad 3d 2b f2 |.........J.{.=+.| -00000040 f0 a1 ae 0e d6 80 |......|" -"2019-07-20 02:40:16.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f60 Exiting" -"2019-07-20 02:40:16.919 UTC [gossip.discovery] sendMemResponse -> DEBU 1f61 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:16.920 UTC [msp] DeserializeIdentity -> DEBU 1f62 Obtaining identity" -"2019-07-20 02:40:16.920 UTC [msp] DeserializeIdentity -> DEBU 1f63 Obtaining identity" -"2019-07-20 02:40:16.921 UTC [gossip.comm] Send -> DEBU 1f64 Entering, sending GossipMessage: Channel: , nonce: 8464964237863176812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:16.921 UTC [gossip.discovery] sendMemResponse -> DEBU 1f65 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > alive: " -"2019-07-20 02:40:16.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1f66 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8464964237863176812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes" -"2019-07-20 02:40:16.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1f67 Exiting" -"2019-07-20 02:40:16.923 UTC [gossip.comm] func1 -> DEBU 1f68 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.923 UTC [gossip.gossip] handleMessage -> DEBU 1f69 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.924 UTC [gossip.gossip] handleMessage -> DEBU 1f6a Exiting" -"2019-07-20 02:40:16.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f6c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:16.924 UTC [msp] DeserializeIdentity -> DEBU 1f6d Obtaining identity" -"2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f6f Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f70 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:16.924 UTC [policies] Evaluate -> DEBU 1f71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:16.925 UTC [cauthdsl] func1 -> DEBU 1f74 0xc0037d9190 gate 1563590416925101500 evaluation starts" -"2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f75 0xc0037d9190 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f76 0xc0037d9190 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f77 0xc0037d9190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f78 0xc0037d9190 principal evaluation fails" -"2019-07-20 02:40:16.925 UTC [cauthdsl] func1 -> DEBU 1f79 0xc0037d9190 gate 1563590416925101500 evaluation fails" -"2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:16.926 UTC [cauthdsl] func1 -> DEBU 1f7d 0xc0037d9b00 gate 1563590416926021500 evaluation starts" -"2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc0037d9b00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f7f 0xc0037d9b00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f80 0xc0037d9b00 principal matched by identity 0" -"2019-07-20 02:40:16.926 UTC [msp.identity] Verify -> DEBU 1f81 Verify: digest = 00000000 6f 20 d1 54 54 e5 8d cd 14 6f 29 8a b0 8d 95 d0 |o .TT....o).....| -00000010 79 06 49 40 e2 b7 79 61 a1 4e e7 45 b0 b6 63 94 |y.I@..ya.N.E..c.|" -"2019-07-20 02:40:16.926 UTC [msp.identity] Verify -> DEBU 1f82 Verify: sig = 00000000 30 44 02 20 0d fd 3d 30 79 8b 3f 71 79 fe 7e c4 |0D. ..=0y.?qy.~.| -00000010 f5 8b 90 0f 6d 3d ba cb dd 7e 38 02 35 f8 00 7c |....m=...~8.5..|| -00000020 44 13 d1 5a 02 20 2d 08 29 5e 88 60 a5 df 74 42 |D..Z. -.)^.`..tB| -00000030 d5 86 92 f6 b4 c1 56 80 49 14 fe 08 f8 5d ac 40 |......V.I....].@| -00000040 58 94 67 ac 1a 38 |X.g..8|" -"2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f83 0xc0037d9b00 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:16.926 UTC [cauthdsl] func1 -> DEBU 1f84 0xc0037d9b00 gate 1563590416926021500 evaluation succeeds" -"2019-07-20 02:40:16.926 UTC [policies] Evaluate -> DEBU 1f85 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.926 UTC [policies] Evaluate -> DEBU 1f86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:16.927 UTC [policies] Evaluate -> DEBU 1f87 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:16.927 UTC [policies] Evaluate -> DEBU 1f88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:16.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f89 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8b updating membership: timestamp: " -"2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8c Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:16.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:16.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8e Exiting" -"2019-07-20 02:40:16.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f8f Exiting" -"2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f90 Exiting" -"2019-07-20 02:40:16.929 UTC [gossip.comm] func1 -> DEBU 1f91 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.929 UTC [gossip.gossip] handleMessage -> DEBU 1f92 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.929 UTC [gossip.gossip] handleMessage -> DEBU 1f93 Exiting" -"2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f94 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f95 Exiting" -"2019-07-20 02:40:16.930 UTC [gossip.comm] func1 -> DEBU 1f96 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.930 UTC [gossip.gossip] handleMessage -> DEBU 1f97 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.930 UTC [gossip.gossip] handleMessage -> DEBU 1f98 Exiting" -"2019-07-20 02:40:16.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f99 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f9a Exiting" -"2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9b Obtaining identity" -"2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9c Obtaining identity" -"2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9d Obtaining identity" -"2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9e Obtaining identity" -"2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1f9f Obtaining identity" -"2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1fa0 Obtaining identity" -"2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1fa1 Obtaining identity" -"2019-07-20 02:40:16.934 UTC [gossip.comm] Send -> DEBU 1fa2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:16.934 UTC [msp] DeserializeIdentity -> DEBU 1fa3 Obtaining identity" -"2019-07-20 02:40:16.934 UTC [gossip.comm] Send -> DEBU 1fa4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa6 Exiting" -"2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa8 Exiting" -"2019-07-20 02:40:17.057 UTC [gossip.comm] func1 -> DEBU 1fa9 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.058 UTC [gossip.gossip] handleMessage -> DEBU 1faa Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.058 UTC [msp] DeserializeIdentity -> DEBU 1fab Obtaining identity" -"2019-07-20 02:40:17.059 UTC [msp] DeserializeIdentity -> DEBU 1fac Obtaining identity" -"2019-07-20 02:40:17.059 UTC [msp] DeserializeIdentity -> DEBU 1fad Obtaining identity" -"2019-07-20 02:40:17.060 UTC [gossip.gossip] handleMessage -> DEBU 1fae Exiting" -"2019-07-20 02:40:17.182 UTC [gossip.comm] func1 -> DEBU 1faf Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.182 UTC [gossip.gossip] handleMessage -> DEBU 1fb0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.182 UTC [msp] DeserializeIdentity -> DEBU 1fb1 Obtaining identity" -"2019-07-20 02:40:17.182 UTC [msp] DeserializeIdentity -> DEBU 1fb2 Obtaining identity" -"2019-07-20 02:40:17.183 UTC [msp] DeserializeIdentity -> DEBU 1fb3 Obtaining identity" -"2019-07-20 02:40:17.183 UTC [gossip.gossip] handleMessage -> DEBU 1fb4 Exiting" -"2019-07-20 02:40:17.198 UTC [gossip.comm] func1 -> DEBU 1fb5 Got message: GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.198 UTC [gossip.gossip] handleMessage -> DEBU 1fb6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.198 UTC [gossip.gossip] handleMessage -> DEBU 1fb7 Exiting" -"2019-07-20 02:40:17.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fb8 Got message: GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fb9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:17.198 UTC [msp] DeserializeIdentity -> DEBU 1fba Obtaining identity" -"2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fbb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fbc Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fbd Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fbe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fbf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:17.199 UTC [cauthdsl] func1 -> DEBU 1fc1 0xc0036c4420 gate 1563590417199586800 evaluation starts" -"2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc2 0xc0036c4420 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc3 0xc0036c4420 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc4 0xc0036c4420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc5 0xc0036c4420 principal evaluation fails" -"2019-07-20 02:40:17.199 UTC [cauthdsl] func1 -> DEBU 1fc6 0xc0036c4420 gate 1563590417199586800 evaluation fails" -"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:17.200 UTC [cauthdsl] func1 -> DEBU 1fca 0xc0036c4c70 gate 1563590417200134700 evaluation starts" -"2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcb 0xc0036c4c70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcc 0xc0036c4c70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcd 0xc0036c4c70 principal matched by identity 0" -"2019-07-20 02:40:17.200 UTC [msp.identity] Verify -> DEBU 1fce Verify: digest = 00000000 ed 7b 4d 70 98 46 1b c4 26 38 67 46 2b e8 f7 ee |.{Mp.F..&8gF+...| -00000010 e9 fe bf f7 97 9c fb 5c 5d 41 75 7d 10 21 3c 16 |.......\]Au}.!<.|" -"2019-07-20 02:40:17.200 UTC [msp.identity] Verify -> DEBU 1fcf Verify: sig = 00000000 30 45 02 21 00 ee 7f 00 3b f4 4c 90 d6 03 4f 4e |0E.!....;.L...ON| -00000010 e3 33 89 44 c6 7d 49 6d 81 e2 5c f4 e6 f4 f6 0d |.3.D.}Im..\.....| -00000020 5f 3e fc e3 a5 02 20 5c c5 05 6f 1b fe e4 b8 57 |_>.... \..o....W| -00000030 68 2b 8b 2a f1 5d 4b ae dc ff 35 81 87 26 21 ff |h+.*.]K...5..&!.| -00000040 d7 1a 0f e0 c2 4e d7 |.....N.|" -"2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fd0 0xc0036c4c70 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:17.200 UTC [cauthdsl] func1 -> DEBU 1fd1 0xc0036c4c70 gate 1563590417200134700 evaluation succeeds" -"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd4 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:17.201 UTC [policies] Evaluate -> DEBU 1fd5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:17.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fd6 Exiting" -"2019-07-20 02:40:17.201 UTC [gossip.discovery] sendMemResponse -> DEBU 1fd7 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fd8 Obtaining identity" -"2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fd9 Obtaining identity" -"2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fda Obtaining identity" -"2019-07-20 02:40:17.201 UTC [gossip.comm] Send -> DEBU 1fdb Entering, sending GossipMessage: Channel: , nonce: 9439307332943569821, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:17.202 UTC [gossip.discovery] sendMemResponse -> DEBU 1fdc Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" > alive: alive: " -"2019-07-20 02:40:17.202 UTC [gossip.comm] sendToEndpoint -> DEBU 1fdd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9439307332943569821, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.202 UTC [gossip.comm] sendToEndpoint -> DEBU 1fde Exiting" -"2019-07-20 02:40:17.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fdf Obtaining default signing identity" -"2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101E " -"2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe1 Sign: digest: AAF36FAB600E8E5D6DFD21332E6C75166CB3FE373AC44A50CD1CD54E3F06C093 " -"2019-07-20 02:40:17.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fe2 Obtaining default signing identity" -"2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:17.237 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1fe5 Sleeping 5s" -"2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe6 Obtaining identity" -"2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe7 Obtaining identity" -"2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe8 Obtaining identity" -"2019-07-20 02:40:17.244 UTC [gossip.comm] Send -> DEBU 1fe9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:17.244 UTC [gossip.comm] Send -> DEBU 1fea Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:17.245 UTC [msp] DeserializeIdentity -> DEBU 1feb Obtaining identity" -"2019-07-20 02:40:17.245 UTC [gossip.comm] Send -> DEBU 1fec Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fed Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fee Exiting" -"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fef Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff0 Exiting" -"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff2 Exiting" -"2019-07-20 02:40:17.361 UTC [gossip.comm] func1 -> DEBU 1ff3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.362 UTC [gossip.gossip] handleMessage -> DEBU 1ff4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.362 UTC [gossip.gossip] handleMessage -> DEBU 1ff5 Exiting" -"2019-07-20 02:40:17.362 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ff6 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.362 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ff7 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:17.362 UTC [msp.identity] Verify -> DEBU 1ff8 Verify: digest = 00000000 0d 6e 69 b8 fb 0f 8c 32 85 95 ab 75 32 b2 e4 bd |.ni....2...u2...| -00000010 a6 9a b4 b6 36 ad d9 a8 a4 ee 55 fe 0a 63 f2 0c |....6.....U..c..|" -"2019-07-20 02:40:17.362 UTC [msp.identity] Verify -> DEBU 1ff9 Verify: sig = 00000000 30 44 02 20 5d 4e 0e 9a cf 91 95 00 ca 60 15 91 |0D. ]N.......`..| -00000010 1d 35 18 08 83 81 13 37 91 87 8b 8a 37 f9 b6 67 |.5.....7....7..g| -00000020 aa 87 e5 47 02 20 07 17 ea 01 93 e6 d3 27 36 b2 |...G. .......'6.| -00000030 b8 ee 42 d4 15 f0 35 a9 88 dc 8f 89 73 5e 14 46 |..B...5.....s^.F| -00000040 a4 f9 c8 ec 3e 2e |....>.|" -"2019-07-20 02:40:17.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ffa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.363 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffc updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffd Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffe Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fff Exiting" -"2019-07-20 02:40:17.364 UTC [gossip.discovery] handleAliveMessage -> DEBU 2000 Exiting" -"2019-07-20 02:40:17.364 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2001 Exiting" -"2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2002 Obtaining identity" -"2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2003 Obtaining identity" -"2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2004 Obtaining identity" -"2019-07-20 02:40:17.369 UTC [gossip.comm] Send -> DEBU 2005 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:17.369 UTC [msp] DeserializeIdentity -> DEBU 2006 Obtaining identity" -"2019-07-20 02:40:17.370 UTC [gossip.comm] Send -> DEBU 2007 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:17.370 UTC [gossip.comm] sendToEndpoint -> DEBU 2008 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.371 UTC [gossip.comm] sendToEndpoint -> DEBU 2009 Exiting" -"2019-07-20 02:40:17.372 UTC [gossip.comm] sendToEndpoint -> DEBU 200a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.372 UTC [gossip.comm] sendToEndpoint -> DEBU 200b Exiting" -"2019-07-20 02:40:17.372 UTC [gossip.comm] func1 -> DEBU 200c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.373 UTC [gossip.gossip] handleMessage -> DEBU 200d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.373 UTC [gossip.gossip] handleMessage -> DEBU 200e Exiting" -"2019-07-20 02:40:17.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 200f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2010 Exiting" -"2019-07-20 02:40:17.374 UTC [gossip.comm] func1 -> DEBU 2011 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.375 UTC [gossip.gossip] handleMessage -> DEBU 2012 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.375 UTC [gossip.gossip] handleMessage -> DEBU 2013 Exiting" -"2019-07-20 02:40:17.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2014 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:17.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2015 Exiting" -"2019-07-20 02:40:17.408 UTC [gossip.comm] func1 -> DEBU 2016 Got message: GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.408 UTC [gossip.gossip] handleMessage -> DEBU 2017 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.408 UTC [gossip.gossip] handleMessage -> DEBU 2018 Exiting" -"2019-07-20 02:40:17.408 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2019 Got message: GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.408 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 201a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:17.408 UTC [msp] DeserializeIdentity -> DEBU 201b Obtaining identity" -"2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 201c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201d Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201e Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 201f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 2020 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 2021 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:17.410 UTC [cauthdsl] func1 -> DEBU 2022 0xc003687320 gate 1563590417410060500 evaluation starts" -"2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2023 0xc003687320 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2024 0xc003687320 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2025 0xc003687320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:17.411 UTC [cauthdsl] func2 -> DEBU 2026 0xc003687320 principal evaluation fails" -"2019-07-20 02:40:17.411 UTC [cauthdsl] func1 -> DEBU 2027 0xc003687320 gate 1563590417410060500 evaluation fails" -"2019-07-20 02:40:17.411 UTC [policies] Evaluate -> DEBU 2028 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:17.412 UTC [policies] Evaluate -> DEBU 2029 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:17.413 UTC [policies] Evaluate -> DEBU 202a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:17.413 UTC [cauthdsl] func1 -> DEBU 202b 0xc003687b60 gate 1563590417413050900 evaluation starts" -"2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202c 0xc003687b60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202d 0xc003687b60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202e 0xc003687b60 principal matched by identity 0" -"2019-07-20 02:40:17.413 UTC [msp.identity] Verify -> DEBU 202f Verify: digest = 00000000 8a 2b f9 43 5b 7a ef 10 f4 24 ff a7 f6 54 4d af |.+.C[z...$...TM.| -00000010 ae 4b 85 11 6d 31 72 f5 50 32 2c 76 c5 a6 bb 21 |.K..m1r.P2,v...!|" -"2019-07-20 02:40:17.414 UTC [msp.identity] Verify -> DEBU 2030 Verify: sig = 00000000 30 45 02 21 00 bf f5 f2 c7 b0 3e 98 23 0c 5d 27 |0E.!......>.#.]'| -00000010 c1 3b 50 34 b7 9a 5c 1a f0 66 33 51 2d f0 a0 a6 |.;P4..\..f3Q-...| -00000020 7d f1 c9 3a 5e 02 20 77 e8 d0 30 d7 86 49 83 8b |}..:^. w..0..I..| -00000030 93 94 16 f9 5d ca b8 ee 42 dc 57 24 b5 99 ff 52 |....]...B.W$...R| -00000040 d9 df 71 f8 c1 ba 89 |..q....|" -"2019-07-20 02:40:17.414 UTC [cauthdsl] func2 -> DEBU 2031 0xc003687b60 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:17.414 UTC [cauthdsl] func1 -> DEBU 2032 0xc003687b60 gate 1563590417413050900 evaluation succeeds" -"2019-07-20 02:40:17.414 UTC [policies] Evaluate -> DEBU 2033 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2034 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2035 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2036 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:17.415 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2037 Exiting" -"2019-07-20 02:40:17.415 UTC [gossip.discovery] sendMemResponse -> DEBU 2038 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:17.415 UTC [msp] DeserializeIdentity -> DEBU 2039 Obtaining identity" -"2019-07-20 02:40:17.416 UTC [msp] DeserializeIdentity -> DEBU 203a Obtaining identity" -"2019-07-20 02:40:17.416 UTC [msp] DeserializeIdentity -> DEBU 203b Obtaining identity" -"2019-07-20 02:40:17.416 UTC [gossip.comm] Send -> DEBU 203c Entering, sending GossipMessage: Channel: , nonce: 15329209394983020561, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:17.416 UTC [gossip.discovery] sendMemResponse -> DEBU 203d Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\"" signature:"0D\002 ]N\016\232\317\221\225\000\312`\025\221\0355\030\010\203\201\0237\221\207\213\2127\371\266g\252\207\345G\002 \007\027\352\001\223\346\323'6\262\270\356B\324\025\3605\251\210\334\217\211s^\024F\244\371\310\354>." > alive: alive: " -"2019-07-20 02:40:17.417 UTC [gossip.comm] sendToEndpoint -> DEBU 203e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15329209394983020561, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" -"2019-07-20 02:40:17.417 UTC [gossip.comm] sendToEndpoint -> DEBU 203f Exiting" -"2019-07-20 02:40:17.571 UTC [gossip.comm] func1 -> DEBU 2040 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.571 UTC [gossip.gossip] handleMessage -> DEBU 2041 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.571 UTC [gossip.gossip] handleMessage -> DEBU 2042 Exiting" -"2019-07-20 02:40:17.571 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2043 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.571 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2044 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:17.571 UTC [msp] DeserializeIdentity -> DEBU 2045 Obtaining identity" -"2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2046 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2047 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2048 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 2049 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 204a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 204b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 204c 0xc003652100 gate 1563590417571983300 evaluation starts" -"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204d 0xc003652100 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204e 0xc003652100 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204f 0xc003652100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2050 0xc003652100 principal evaluation fails" -"2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 2051 0xc003652100 gate 1563590417571983300 evaluation fails" -"2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2052 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2053 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2054 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 2055 0xc003652980 gate 1563590417572451200 evaluation starts" -"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2056 0xc003652980 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2057 0xc003652980 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2058 0xc003652980 principal matched by identity 0" -"2019-07-20 02:40:17.572 UTC [msp.identity] Verify -> DEBU 2059 Verify: digest = 00000000 3c 58 51 70 7b 27 28 b6 1f 1d e5 56 0b 6e 05 a9 | DEBU 205a Verify: sig = 00000000 30 45 02 21 00 e8 5b a8 e3 61 3d 94 a3 0b 9b b7 |0E.!..[..a=.....| -00000010 c4 11 ff a2 e6 01 24 1a 00 42 ff e1 9d 2e 83 b5 |......$..B......| -00000020 94 91 d1 45 fb 02 20 63 c4 6d 0d df 72 21 dc 83 |...E.. c.m..r!..| -00000030 97 7e 46 bc 53 2a 98 fb 9e da 35 8e 5c 85 0d 16 |.~F.S*....5.\...| -00000040 a6 b4 c2 b2 f8 a4 45 |......E|" -"2019-07-20 02:40:17.573 UTC [cauthdsl] func2 -> DEBU 205b 0xc003652980 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:17.573 UTC [cauthdsl] func1 -> DEBU 205c 0xc003652980 gate 1563590417572451200 evaluation succeeds" -"2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 2060 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:17.573 UTC [gossip.discovery] handleAliveMessage -> DEBU 2061 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2062 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2063 updating membership: timestamp: " -"2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2064 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:17.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2065 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:17.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2066 Exiting" -"2019-07-20 02:40:17.574 UTC [gossip.discovery] handleAliveMessage -> DEBU 2067 Exiting" -"2019-07-20 02:40:17.574 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2068 Exiting" -"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 2069 Obtaining identity" -"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206a Obtaining identity" -"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206b Obtaining identity" -"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206c Obtaining identity" -"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206d Obtaining identity" -"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206e Obtaining identity" -"2019-07-20 02:40:17.581 UTC [gossip.comm] Send -> DEBU 206f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:17.581 UTC [msp] DeserializeIdentity -> DEBU 2070 Obtaining identity" -"2019-07-20 02:40:17.581 UTC [msp] DeserializeIdentity -> DEBU 2071 Obtaining identity" -"2019-07-20 02:40:17.581 UTC [gossip.comm] Send -> DEBU 2072 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:17.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2073 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2074 Exiting" -"2019-07-20 02:40:17.582 UTC [gossip.comm] sendToEndpoint -> DEBU 2075 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.582 UTC [gossip.comm] sendToEndpoint -> DEBU 2076 Exiting" -"2019-07-20 02:40:17.582 UTC [gossip.comm] func1 -> DEBU 2077 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.582 UTC [gossip.gossip] handleMessage -> DEBU 2078 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.582 UTC [gossip.gossip] handleMessage -> DEBU 2079 Exiting" -"2019-07-20 02:40:17.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207b Exiting" -"2019-07-20 02:40:17.583 UTC [gossip.comm] func1 -> DEBU 207c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.583 UTC [gossip.gossip] handleMessage -> DEBU 207d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.584 UTC [gossip.gossip] handleMessage -> DEBU 207e Exiting" -"2019-07-20 02:40:17.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:17.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2080 Exiting" -"2019-07-20 02:40:19.640 UTC [dockercontroller] deployImage -> DEBU 2081 Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4" -"2019-07-20 02:40:19.640 UTC [dockercontroller] createContainer -> DEBU 2082 create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 -"2019-07-20 02:40:19.640 UTC [dockercontroller] getDockerHostConfig -> DEBU 2083 docker container hostconfig NetworkMode: hlf_net" -"2019-07-20 02:40:19.758 UTC [dockercontroller] createContainer -> DEBU 2084 created container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 -"2019-07-20 02:40:19.926 UTC [gossip.comm] func1 -> DEBU 2085 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:19.926 UTC [gossip.gossip] handleMessage -> DEBU 2086 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:19.926 UTC [gossip.gossip] handleMessage -> DEBU 2087 Exiting" -"2019-07-20 02:40:19.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2088 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:19.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2089 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:19.928 UTC [msp] DeserializeIdentity -> DEBU 208a Obtaining identity" -"2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 208b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208c Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208d Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 208e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 208f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 2090 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:19.931 UTC [cauthdsl] func1 -> DEBU 2091 0xc003510770 gate 1563590419930912600 evaluation starts" -"2019-07-20 02:40:19.931 UTC [cauthdsl] func2 -> DEBU 2092 0xc003510770 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2093 0xc003510770 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2094 0xc003510770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2095 0xc003510770 principal evaluation fails" -"2019-07-20 02:40:19.933 UTC [cauthdsl] func1 -> DEBU 2096 0xc003510770 gate 1563590419930912600 evaluation fails" -"2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2097 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2098 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2099 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:19.934 UTC [cauthdsl] func1 -> DEBU 209a 0xc003510fb0 gate 1563590419934803200 evaluation starts" -"2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209b 0xc003510fb0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209c 0xc003510fb0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209d 0xc003510fb0 principal matched by identity 0" -"2019-07-20 02:40:19.935 UTC [msp.identity] Verify -> DEBU 209e Verify: digest = 00000000 69 15 c1 32 fe 05 00 01 e0 ca cb 9e 0d 07 0e b4 |i..2............| -00000010 0a d6 75 ad dd b3 2a 43 0b 9e cd a0 66 88 7a a6 |..u...*C....f.z.|" -"2019-07-20 02:40:19.936 UTC [msp.identity] Verify -> DEBU 209f Verify: sig = 00000000 30 44 02 20 7b b0 f7 de 15 b6 9c 02 4e 80 5a ca |0D. {.......N.Z.| -00000010 11 09 d2 35 ab b0 f2 9b 92 67 af 53 8c 13 81 27 |...5.....g.S...'| -00000020 41 03 12 9b 02 20 40 93 4a 0c 63 6f e1 d7 8a 87 |A.... @.J.co....| -00000030 06 22 2d 9f e4 94 d6 cf 63 60 4c db e6 c5 78 f5 |."-.....c`L...x.| -00000040 2b 6e 18 e1 a9 c6 |+n....|" -"2019-07-20 02:40:19.936 UTC [cauthdsl] func2 -> DEBU 20a0 0xc003510fb0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:19.936 UTC [cauthdsl] func1 -> DEBU 20a1 0xc003510fb0 gate 1563590419934803200 evaluation succeeds" -"2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a4 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:19.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 20a6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:19.938 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:19.938 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a8 updating membership: timestamp: " -"2019-07-20 02:40:19.939 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a9 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:19.939 UTC [gossip.discovery] learnExistingMembers -> DEBU 20aa Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:19.944 UTC [gossip.comm] func1 -> DEBU 20ab Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:19.944 UTC [gossip.gossip] handleMessage -> DEBU 20ac Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:19.944 UTC [gossip.pull] HandleMessage -> DEBU 20ad GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:19.945 UTC [msp] DeserializeIdentity -> DEBU 20ae Obtaining identity" -"2019-07-20 02:40:19.946 UTC [msp] DeserializeIdentity -> DEBU 20af Obtaining identity" -"2019-07-20 02:40:19.946 UTC [gossip.discovery] learnExistingMembers -> DEBU 20b0 Exiting" -"2019-07-20 02:40:19.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 20b1 Exiting" -"2019-07-20 02:40:19.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20b2 Exiting" -"2019-07-20 02:40:19.946 UTC [msp] DeserializeIdentity -> DEBU 20b3 Obtaining identity" -"2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b4 Obtaining identity" -"2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b5 Obtaining identity" -"2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b6 Obtaining identity" -"2019-07-20 02:40:19.947 UTC [gossip.pull] SendDigest -> DEBU 20b8 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:19.947 UTC [gossip.gossip] handleMessage -> DEBU 20b9 Exiting" -"2019-07-20 02:40:19.947 UTC [gossip.discovery] sendMemResponse -> DEBU 20b7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20ba Obtaining identity" -"2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20bb Obtaining identity" -"2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20bc Obtaining identity" -"2019-07-20 02:40:19.949 UTC [gossip.comm] Send -> DEBU 20bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:19.949 UTC [gossip.discovery] sendMemResponse -> DEBU 20be Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\"" signature:"0D\002 ]N\016\232\317\221\225\000\312`\025\221\0355\030\010\203\201\0237\221\207\213\2127\371\266g\252\207\345G\002 \007\027\352\001\223\346\323'6\262\270\356B\324\025\3605\251\210\334\217\211s^\024F\244\371\310\354>." > alive: alive: alive: " -"2019-07-20 02:40:19.949 UTC [gossip.comm] sendToEndpoint -> DEBU 20bf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:19.950 UTC [gossip.comm] sendToEndpoint -> DEBU 20c0 Exiting" -"2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:20.252 UTC [gossip.comm] Send -> DEBU 20c2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:20.252 UTC [gossip.comm] Send -> DEBU 20c4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:20.253 UTC [gossip.comm] Send -> DEBU 20c6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c8 Exiting" -"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20ca Exiting" -"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20cb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20cc Exiting" -"2019-07-20 02:40:20.254 UTC [gossip.comm] func1 -> DEBU 20cd Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20ce Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.255 UTC [gossip.pull] HandleMessage -> DEBU 20cf GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20d0 Exiting" -"2019-07-20 02:40:20.255 UTC [gossip.comm] func1 -> DEBU 20d1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20d2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.255 UTC [gossip.pull] HandleMessage -> DEBU 20d3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d4 Exiting" -"2019-07-20 02:40:20.256 UTC [gossip.comm] func1 -> DEBU 20d5 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.256 UTC [gossip.pull] HandleMessage -> DEBU 20d7 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d8 Exiting" -"2019-07-20 02:40:20.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 20d9 Obtaining default signing identity" -"2019-07-20 02:40:20.293 UTC [msp.identity] Sign -> DEBU 20da Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101F " -"2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20db Sign: digest: 504B6EC17B1E1B1D8BBAD474EBAC421C80C37F85D67DE2002BF8519639289328 " -"2019-07-20 02:40:20.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 20dc Obtaining default signing identity" -"2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20dd Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20de Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20df Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:20.294 UTC [msp] DeserializeIdentity -> DEBU 20e0 Obtaining identity" -"2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20e1 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:20.294 UTC [msp] DeserializeIdentity -> DEBU 20e2 Obtaining identity" -"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e4 Exiting" -"2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20e5 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e7 Exiting" -"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e9 Exiting" -"2019-07-20 02:40:20.297 UTC [gossip.comm] func1 -> DEBU 20ea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20eb Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20ec Exiting" -"2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.297 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20ee Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20ef Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| -00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" -"2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20f0 Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| -00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| -00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| -00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| -00000040 12 14 a9 de 14 fb |......|" -"2019-07-20 02:40:20.297 UTC [gossip.discovery] handleAliveMessage -> DEBU 20f1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:20.297 UTC [gossip.discovery] isSentByMe -> DEBU 20f2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:20.297 UTC [gossip.discovery] handleAliveMessage -> DEBU 20f3 Exiting" -"2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20f4 Exiting" -"2019-07-20 02:40:20.297 UTC [gossip.comm] func1 -> DEBU 20f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20f6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20f7 Exiting" -"2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20f8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.297 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20f9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20fa Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| -00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" -"2019-07-20 02:40:20.298 UTC [msp.identity] Verify -> DEBU 20fb Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| -00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| -00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| -00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| -00000040 12 14 a9 de 14 fb |......|" -"2019-07-20 02:40:20.298 UTC [gossip.discovery] handleAliveMessage -> DEBU 20fc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:20.298 UTC [gossip.discovery] isSentByMe -> DEBU 20fd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:20.298 UTC [gossip.discovery] handleAliveMessage -> DEBU 20fe Exiting" -"2019-07-20 02:40:20.298 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20ff Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:20.298 UTC [msp] DeserializeIdentity -> DEBU 2100 Obtaining identity" -"2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2101 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2102 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2103 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2104 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2105 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2106 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:20.298 UTC [cauthdsl] func1 -> DEBU 2107 0xc0033b32f0 gate 1563590420298565800 evaluation starts" -"2019-07-20 02:40:20.298 UTC [cauthdsl] func2 -> DEBU 2108 0xc0033b32f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.298 UTC [cauthdsl] func2 -> DEBU 2109 0xc0033b32f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.300 UTC [gossip.comm] func1 -> DEBU 210a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.300 UTC [gossip.gossip] handleMessage -> DEBU 210b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.300 UTC [cauthdsl] func2 -> DEBU 210c 0xc0033b32f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:20.300 UTC [cauthdsl] func2 -> DEBU 210d 0xc0033b32f0 principal evaluation fails" -"2019-07-20 02:40:20.300 UTC [cauthdsl] func1 -> DEBU 210e 0xc0033b32f0 gate 1563590420298565800 evaluation fails" -"2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 210f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 2110 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 2111 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:20.300 UTC [cauthdsl] func1 -> DEBU 2112 0xc0033b3b30 gate 1563590420300966200 evaluation starts" -"2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2113 0xc0033b3b30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2114 0xc0033b3b30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2115 0xc0033b3b30 principal matched by identity 0" -"2019-07-20 02:40:20.301 UTC [msp.identity] Verify -> DEBU 2116 Verify: digest = 00000000 69 15 c1 32 fe 05 00 01 e0 ca cb 9e 0d 07 0e b4 |i..2............| -00000010 0a d6 75 ad dd b3 2a 43 0b 9e cd a0 66 88 7a a6 |..u...*C....f.z.|" -"2019-07-20 02:40:20.301 UTC [msp.identity] Verify -> DEBU 2117 Verify: sig = 00000000 30 44 02 20 7b b0 f7 de 15 b6 9c 02 4e 80 5a ca |0D. {.......N.Z.| -00000010 11 09 d2 35 ab b0 f2 9b 92 67 af 53 8c 13 81 27 |...5.....g.S...'| -00000020 41 03 12 9b 02 20 40 93 4a 0c 63 6f e1 d7 8a 87 |A.... @.J.co....| -00000030 06 22 2d 9f e4 94 d6 cf 63 60 4c db e6 c5 78 f5 |."-.....c`L...x.| -00000040 2b 6e 18 e1 a9 c6 |+n....|" -"2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2118 0xc0033b3b30 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:20.301 UTC [cauthdsl] func1 -> DEBU 2119 0xc0033b3b30 gate 1563590420300966200 evaluation succeeds" -"2019-07-20 02:40:20.301 UTC [policies] Evaluate -> DEBU 211a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.301 UTC [policies] Evaluate -> DEBU 211b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.302 UTC [policies] Evaluate -> DEBU 211c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:20.302 UTC [policies] Evaluate -> DEBU 211d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:20.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 211e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:20.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 211f Exiting" -"2019-07-20 02:40:20.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2120 Exiting" -"2019-07-20 02:40:20.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2121 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.305 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2122 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2123 Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| -00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" -"2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2124 Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| -00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| -00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| -00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| -00000040 12 14 a9 de 14 fb |......|" -"2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2125 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2126 Verify: sig = 00000000 30 44 02 20 2d ba 51 f4 8a 64 9d 24 9e 51 64 d0 |0D. -.Q..d.$.Qd.| -00000010 43 09 85 6d e2 51 b3 cb 56 0c 62 ba 3c 11 f8 03 |C..m.Q..V.b.<...| -00000020 d6 72 b4 ef 02 20 7f 19 2b ab 8c e3 a1 5a 6b f0 |.r... ..+....Zk.| -00000030 58 b0 bc d6 1a b0 46 0e 6c 40 a3 8e 54 73 5a 63 |X.....F.l@..TsZc| -00000040 e3 11 28 fd 0a 7d |..(..}|" -"2019-07-20 02:40:20.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 2127 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:20.305 UTC [gossip.discovery] isSentByMe -> DEBU 2128 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:20.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 2129 Exiting" -"2019-07-20 02:40:20.305 UTC [gossip.gossip] handleMessage -> DEBU 212a Exiting" -"2019-07-20 02:40:20.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 212b Exiting" -"2019-07-20 02:40:20.367 UTC [gossip.comm] func1 -> DEBU 212c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.368 UTC [gossip.gossip] handleMessage -> DEBU 212d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.368 UTC [gossip.pull] HandleMessage -> DEBU 212e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.369 UTC [gossip.pull] SendDigest -> DEBU 212f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:20.369 UTC [gossip.gossip] handleMessage -> DEBU 2130 Exiting" -"2019-07-20 02:40:20.371 UTC [gossip.comm] func1 -> DEBU 2131 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.371 UTC [gossip.gossip] handleMessage -> DEBU 2132 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.372 UTC [gossip.gossip] handleMessage -> DEBU 2133 Exiting" -"2019-07-20 02:40:20.372 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2134 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.372 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2135 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2136 Verify: digest = 00000000 c7 31 e2 19 58 a3 f6 b8 be 34 34 a8 ec 5c e8 9d |.1..X....44..\..| -00000010 48 9d ae 36 36 cd ca 8e b1 2f 46 d6 54 bc 3f 26 |H..66..../F.T.?&|" -"2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2137 Verify: sig = 00000000 30 44 02 20 06 ca bf c0 84 51 4e 9b 01 3e ed 97 |0D. .....QN..>..| -00000010 a9 b1 1e c9 d4 6d ea ea d7 71 9d 86 c9 c3 31 f7 |.....m...q....1.| -00000020 a5 48 b6 4b 02 20 4c 13 b3 73 b7 34 1f 9c 7d 04 |.H.K. L..s.4..}.| -00000030 96 e1 6a c7 90 c8 3f 1d 94 1a 87 9e 1f 17 ef 0d |..j...?.........| -00000040 30 2a 69 1a 73 9b |0*i.s.|" -"2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2138 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2139 Verify: sig = 00000000 30 44 02 20 29 a2 f3 b7 4d 89 32 2f 55 be 24 6b |0D. )...M.2/U.$k| -00000010 a0 8f 76 7a 42 fe 14 ea 54 38 0c ce ec 7f 15 f8 |..vzB...T8......| -00000020 77 fa a1 66 02 20 2f 1e f8 f2 a5 dd 0e a0 98 bd |w..f. /.........| -00000030 9f 8d 04 a3 0f 45 ec 8f ca ce 47 dd d1 40 75 05 |.....E....G..@u.| -00000040 dc b3 82 63 e5 b7 |...c..|" -"2019-07-20 02:40:20.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 213a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213f Exiting" -"2019-07-20 02:40:20.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 2140 Exiting" -"2019-07-20 02:40:20.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2141 Exiting" -"2019-07-20 02:40:20.373 UTC [gossip.discovery] sendMemResponse -> DEBU 2142 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:20.373 UTC [msp] DeserializeIdentity -> DEBU 2143 Obtaining identity" -"2019-07-20 02:40:20.373 UTC [msp] DeserializeIdentity -> DEBU 2144 Obtaining identity" -"2019-07-20 02:40:20.373 UTC [gossip.comm] Send -> DEBU 2145 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:20.374 UTC [gossip.discovery] sendMemResponse -> DEBU 2146 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > alive: " -"2019-07-20 02:40:20.374 UTC [gossip.comm] sendToEndpoint -> DEBU 2147 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.374 UTC [gossip.comm] sendToEndpoint -> DEBU 2148 Exiting" -"2019-07-20 02:40:20.554 UTC [gossip.comm] func1 -> DEBU 2149 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.554 UTC [gossip.gossip] handleMessage -> DEBU 214a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.554 UTC [gossip.pull] HandleMessage -> DEBU 214b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214c Obtaining identity" -"2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214d Obtaining identity" -"2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214e Obtaining identity" -"2019-07-20 02:40:20.556 UTC [msp] DeserializeIdentity -> DEBU 214f Obtaining identity" -"2019-07-20 02:40:20.557 UTC [msp] DeserializeIdentity -> DEBU 2150 Obtaining identity" -"2019-07-20 02:40:20.557 UTC [msp] DeserializeIdentity -> DEBU 2151 Obtaining identity" -"2019-07-20 02:40:20.557 UTC [gossip.pull] SendDigest -> DEBU 2152 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:20.560 UTC [gossip.gossip] handleMessage -> DEBU 2153 Exiting" -"2019-07-20 02:40:20.561 UTC [gossip.comm] func1 -> DEBU 2154 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.561 UTC [gossip.gossip] handleMessage -> DEBU 2155 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.561 UTC [gossip.gossip] handleMessage -> DEBU 2156 Exiting" -"2019-07-20 02:40:20.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2157 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.562 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2158 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:20.562 UTC [msp] DeserializeIdentity -> DEBU 2159 Obtaining identity" -"2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 215a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 215b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 215c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.563 UTC [policies] Evaluate -> DEBU 215d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:20.564 UTC [policies] Evaluate -> DEBU 215e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:20.564 UTC [policies] Evaluate -> DEBU 215f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:20.564 UTC [cauthdsl] func1 -> DEBU 2160 0xc0033afa80 gate 1563590420564792700 evaluation starts" -"2019-07-20 02:40:20.564 UTC [cauthdsl] func2 -> DEBU 2161 0xc0033afa80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2162 0xc0033afa80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2163 0xc0033afa80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2164 0xc0033afa80 principal evaluation fails" -"2019-07-20 02:40:20.565 UTC [cauthdsl] func1 -> DEBU 2165 0xc0033afa80 gate 1563590420564792700 evaluation fails" -"2019-07-20 02:40:20.565 UTC [policies] Evaluate -> DEBU 2166 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.566 UTC [policies] Evaluate -> DEBU 2167 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.566 UTC [policies] Evaluate -> DEBU 2168 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:20.567 UTC [cauthdsl] func1 -> DEBU 2169 0xc0031ba2c0 gate 1563590420566867700 evaluation starts" -"2019-07-20 02:40:20.568 UTC [cauthdsl] func2 -> DEBU 216a 0xc0031ba2c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.568 UTC [cauthdsl] func2 -> DEBU 216b 0xc0031ba2c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.570 UTC [cauthdsl] func2 -> DEBU 216c 0xc0031ba2c0 principal matched by identity 0" -"2019-07-20 02:40:20.570 UTC [msp.identity] Verify -> DEBU 216d Verify: digest = 00000000 4d fc 0e 77 db 69 88 31 38 93 68 0f 5b 04 f2 09 |M..w.i.18.h.[...| -00000010 32 12 51 3d 70 3f 48 33 49 68 c7 26 13 26 87 d2 |2.Q=p?H3Ih.&.&..|" -"2019-07-20 02:40:20.571 UTC [msp.identity] Verify -> DEBU 216e Verify: sig = 00000000 30 44 02 20 37 87 1a 84 16 b7 93 5f e8 af ad 0a |0D. 7......_....| -00000010 f4 b9 98 82 65 c0 32 e7 28 d3 08 27 11 4b e5 5f |....e.2.(..'.K._| -00000020 3b 36 e7 6d 02 20 4f 3c 7b cf 53 62 27 64 57 33 |;6.m. O<{.Sb'dW3| -00000030 b6 77 3a b7 1e f7 19 4a 9c 09 0b 4d dd c7 f1 f0 |.w:....J...M....| -00000040 0a e3 d1 be 6e f3 |....n.|" -"2019-07-20 02:40:20.571 UTC [cauthdsl] func2 -> DEBU 216f 0xc0031ba2c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:20.572 UTC [cauthdsl] func1 -> DEBU 2170 0xc0031ba2c0 gate 1563590420566867700 evaluation succeeds" -"2019-07-20 02:40:20.572 UTC [policies] Evaluate -> DEBU 2171 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2172 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2173 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2174 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:20.573 UTC [gossip.discovery] handleAliveMessage -> DEBU 2175 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:20.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2176 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:20.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2177 updating membership: timestamp: " -"2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 2178 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 2179 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 217a Exiting" -"2019-07-20 02:40:20.576 UTC [gossip.discovery] handleAliveMessage -> DEBU 217b Exiting" -"2019-07-20 02:40:20.578 UTC [gossip.discovery] sendMemResponse -> DEBU 217c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217d Obtaining identity" -"2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217e Obtaining identity" -"2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217f Obtaining identity" -"2019-07-20 02:40:20.580 UTC [gossip.comm] Send -> DEBU 2180 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:20.580 UTC [gossip.discovery] sendMemResponse -> DEBU 2181 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" > alive: alive: alive: " -"2019-07-20 02:40:20.580 UTC [gossip.comm] sendToEndpoint -> DEBU 2182 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.580 UTC [gossip.comm] sendToEndpoint -> DEBU 2183 Exiting" -"2019-07-20 02:40:20.580 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2184 Exiting" -"2019-07-20 02:40:20.676 UTC [dockercontroller] Start -> DEBU 2185 Started container dev-peer0.org1.example.com-exp02-1.0" -"2019-07-20 02:40:20.676 UTC [container] unlockContainer -> DEBU 2186 container lock deleted(exp02-1.0)" -"2019-07-20 02:40:20.676 UTC [container] lockContainer -> DEBU 2187 waiting for container(exp02-1.0) lock" -"2019-07-20 02:40:20.676 UTC [container] lockContainer -> DEBU 2188 got container (exp02-1.0) lock" -"2019-07-20 02:40:20.676 UTC [container] unlockContainer -> DEBU 2189 container lock deleted(exp02-1.0)" -"2019-07-20 02:40:20.717 UTC [msp] DeserializeIdentity -> DEBU 218a Obtaining identity" -"2019-07-20 02:40:20.719 UTC [msp] DeserializeIdentity -> DEBU 218b Obtaining identity" -"2019-07-20 02:40:20.720 UTC [gossip.comm] Send -> DEBU 218c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:20.720 UTC [gossip.comm] sendToEndpoint -> DEBU 218d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.721 UTC [gossip.comm] sendToEndpoint -> DEBU 218e Exiting" -"2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 218f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 2190 Exiting" -"2019-07-20 02:40:20.728 UTC [gossip.comm] func1 -> DEBU 2191 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.729 UTC [gossip.gossip] handleMessage -> DEBU 2194 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.728 UTC [gossip.comm] func1 -> DEBU 2192 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 2193 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.729 UTC [msp] DeserializeIdentity -> DEBU 2195 Obtaining identity" -"2019-07-20 02:40:20.731 UTC [msp] DeserializeIdentity -> DEBU 2197 Obtaining identity" -"2019-07-20 02:40:20.732 UTC [msp] DeserializeIdentity -> DEBU 2199 Obtaining identity" -"2019-07-20 02:40:20.730 UTC [gossip.comm] sendToEndpoint -> DEBU 2196 Exiting" -"2019-07-20 02:40:20.732 UTC [gossip.comm] func1 -> DEBU 2198 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.735 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 219a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:20.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 219b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 219c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:20.743 UTC [cauthdsl] func1 -> DEBU 21a0 0xc003125d80 gate 1563590420743984900 evaluation starts" -"2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a1 0xc003125d80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a2 0xc003125d80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a3 0xc003125d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a4 0xc003125d80 principal evaluation fails" -"2019-07-20 02:40:20.744 UTC [cauthdsl] func1 -> DEBU 21a5 0xc003125d80 gate 1563590420743984900 evaluation fails" -"2019-07-20 02:40:20.744 UTC [policies] Evaluate -> DEBU 21a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.745 UTC [policies] Evaluate -> DEBU 21a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.745 UTC [policies] Evaluate -> DEBU 21a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:20.745 UTC [cauthdsl] func1 -> DEBU 21a9 0xc0031165c0 gate 1563590420745495300 evaluation starts" -"2019-07-20 02:40:20.745 UTC [cauthdsl] func2 -> DEBU 21aa 0xc0031165c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.746 UTC [cauthdsl] func2 -> DEBU 21ab 0xc0031165c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.746 UTC [cauthdsl] func2 -> DEBU 21ac 0xc0031165c0 principal matched by identity 0" -"2019-07-20 02:40:20.746 UTC [msp.identity] Verify -> DEBU 21ad Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:20.746 UTC [msp.identity] Verify -> DEBU 21ae Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:20.747 UTC [cauthdsl] func2 -> DEBU 21af 0xc0031165c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:20.747 UTC [cauthdsl] func1 -> DEBU 21b0 0xc0031165c0 gate 1563590420745495300 evaluation succeeds" -"2019-07-20 02:40:20.747 UTC [policies] Evaluate -> DEBU 21b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.748 UTC [policies] Evaluate -> DEBU 21b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.748 UTC [policies] Evaluate -> DEBU 21b3 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:20.749 UTC [policies] Evaluate -> DEBU 21b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:20.749 UTC [msp] DeserializeIdentity -> DEBU 21b5 Obtaining identity" -"2019-07-20 02:40:20.750 UTC [msp] DeserializeIdentity -> DEBU 21b6 Obtaining identity" -"2019-07-20 02:40:20.751 UTC [gossip.pull] Hello -> DEBU 21b7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:20.752 UTC [msp] DeserializeIdentity -> DEBU 21b8 Obtaining identity" -"2019-07-20 02:40:20.753 UTC [msp] DeserializeIdentity -> DEBU 21b9 Obtaining identity" -"2019-07-20 02:40:20.754 UTC [gossip.comm] Send -> DEBU 21ba Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:20.756 UTC [msp.identity] Verify -> DEBU 21bb Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:20.756 UTC [msp.identity] Verify -> DEBU 21bc Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:20.756 UTC [gossip.comm] sendToEndpoint -> DEBU 21bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.758 UTC [gossip.comm] sendToEndpoint -> DEBU 21be Exiting" -"2019-07-20 02:40:20.759 UTC [msp.identity] Verify -> DEBU 21bf Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:20.759 UTC [msp.identity] Verify -> DEBU 21c0 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:20.760 UTC [gossip.comm] func1 -> DEBU 21c1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.761 UTC [msp] DeserializeIdentity -> DEBU 21c2 Obtaining identity" -"2019-07-20 02:40:20.761 UTC [msp] DeserializeIdentity -> DEBU 21c3 Obtaining identity" -"2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:20.766 UTC [cauthdsl] func1 -> DEBU 21ca 0xc0030f3a30 gate 1563590420766558700 evaluation starts" -"2019-07-20 02:40:20.766 UTC [cauthdsl] func2 -> DEBU 21cb 0xc0030f3a30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21cc 0xc0030f3a30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21cd 0xc0030f3a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21ce 0xc0030f3a30 principal evaluation fails" -"2019-07-20 02:40:20.767 UTC [cauthdsl] func1 -> DEBU 21cf 0xc0030f3a30 gate 1563590420766558700 evaluation fails" -"2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:20.768 UTC [cauthdsl] func1 -> DEBU 21d3 0xc0030da2c0 gate 1563590420768941600 evaluation starts" -"2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d4 0xc0030da2c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d5 0xc0030da2c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d6 0xc0030da2c0 principal matched by identity 0" -"2019-07-20 02:40:20.769 UTC [msp.identity] Verify -> DEBU 21d7 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:20.769 UTC [msp.identity] Verify -> DEBU 21d8 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:20.770 UTC [cauthdsl] func2 -> DEBU 21d9 0xc0030da2c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:20.770 UTC [cauthdsl] func1 -> DEBU 21da 0xc0030da2c0 gate 1563590420768941600 evaluation succeeds" -"2019-07-20 02:40:20.770 UTC [policies] Evaluate -> DEBU 21db Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21dd Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:20.771 UTC [gossip.gossip] handleMessage -> DEBU 21df Exiting" -"2019-07-20 02:40:20.771 UTC [gossip.gossip] handleMessage -> DEBU 21e0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.772 UTC [msp.identity] Verify -> DEBU 21e1 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:20.772 UTC [msp.identity] Verify -> DEBU 21e2 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:20.776 UTC [chaincode.accesscontrol] authenticate -> DEBU 21e3 Chaincode exp02:1.0 's authentication is authorized" -"2019-07-20 02:40:20.776 UTC [msp.identity] Verify -> DEBU 21e4 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:20.776 UTC [msp.identity] Verify -> DEBU 21e5 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:20.776 UTC [chaincode] handleMessage -> DEBU 21e6 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" -"2019-07-20 02:40:20.777 UTC [msp] DeserializeIdentity -> DEBU 21e7 Obtaining identity" -"2019-07-20 02:40:20.777 UTC [msp] DeserializeIdentity -> DEBU 21e8 Obtaining identity" -"2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21ea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21eb Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.777 UTC [chaincode] HandleRegister -> DEBU 21e9 Received REGISTER in state created" -"2019-07-20 02:40:20.777 UTC [chaincode] Register -> DEBU 21ed registered handler complete for chaincode exp02:1.0" -"2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21ec Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:20.778 UTC [chaincode] HandleRegister -> DEBU 21ef Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED" -"2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21f2 0xc003046bc0 gate 1563590420779005600 evaluation starts" -"2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f3 0xc003046bc0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f4 0xc003046bc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f5 0xc003046bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f6 0xc003046bc0 principal evaluation fails" -"2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21f7 0xc003046bc0 gate 1563590420779005600 evaluation fails" -"2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21f8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.779 UTC [chaincode] HandleRegister -> DEBU 21f9 Changed state to established for name:"exp02:1.0" " -"2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:20.779 UTC [chaincode] sendReady -> DEBU 21fc sending READY for chaincode name:"exp02:1.0" " -"2019-07-20 02:40:20.780 UTC [chaincode] sendReady -> DEBU 21fe Changed to state ready for chaincode name:"exp02:1.0" " -"2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21fd 0xc003047400 gate 1563590420779979600 evaluation starts" -"2019-07-20 02:40:20.780 UTC [cauthdsl] func2 -> DEBU 21ff 0xc003047400 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.781 UTC [cauthdsl] func2 -> DEBU 2200 0xc003047400 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.781 UTC [cauthdsl] func2 -> DEBU 2202 0xc003047400 principal matched by identity 0" -"2019-07-20 02:40:20.781 UTC [chaincode] Launch -> DEBU 2201 launch complete" -"2019-07-20 02:40:20.781 UTC [chaincode] Execute -> DEBU 2203 Entry" -"2019-07-20 02:40:20.781 UTC [msp.identity] Verify -> DEBU 2204 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:20.782 UTC [msp.identity] Verify -> DEBU 2205 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:20.782 UTC [cauthdsl] func2 -> DEBU 2206 0xc003047400 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:20.782 UTC [cauthdsl] func1 -> DEBU 2207 0xc003047400 gate 1563590420779979600 evaluation succeeds" -"2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 2208 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 2209 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 220a Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 220b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:20.784 UTC [msp] DeserializeIdentity -> DEBU 220c Obtaining identity" -"2019-07-20 02:40:20.784 UTC [msp] DeserializeIdentity -> DEBU 220d Obtaining identity" -"2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 220e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 220f Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2210 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2211 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2212 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2213 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:20.784 UTC [cauthdsl] func1 -> DEBU 2214 0xc002fe9900 gate 1563590420784745900 evaluation starts" -"2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2215 0xc002fe9900 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2216 0xc002fe9900 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2217 0xc002fe9900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2218 0xc002fe9900 principal evaluation fails" -"2019-07-20 02:40:20.785 UTC [cauthdsl] func1 -> DEBU 2219 0xc002fe9900 gate 1563590420784745900 evaluation fails" -"2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:20.785 UTC [cauthdsl] func1 -> DEBU 221d 0xc002fae140 gate 1563590420785168500 evaluation starts" -"2019-07-20 02:40:20.785 UTC [cauthdsl] func2 -> DEBU 221e 0xc002fae140 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.786 UTC [cauthdsl] func2 -> DEBU 221f 0xc002fae140 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.786 UTC [cauthdsl] func2 -> DEBU 2220 0xc002fae140 principal matched by identity 0" -"2019-07-20 02:40:20.786 UTC [msp.identity] Verify -> DEBU 2221 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:20.786 UTC [msp.identity] Verify -> DEBU 2222 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:20.787 UTC [chaincode] handleMessage -> DEBU 2223 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-07-20 02:40:20.788 UTC [chaincode] HandleTransaction -> DEBU 2224 [79f74fa3] handling PUT_STATE from chaincode" -"2019-07-20 02:40:20.788 UTC [chaincode] HandleTransaction -> DEBU 2225 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" -"2019-07-20 02:40:20.790 UTC [cauthdsl] func2 -> DEBU 2226 0xc002fae140 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:20.791 UTC [chaincode] handleMessage -> DEBU 2227 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-07-20 02:40:20.791 UTC [cauthdsl] func1 -> DEBU 2228 0xc002fae140 gate 1563590420785168500 evaluation succeeds" -"2019-07-20 02:40:20.792 UTC [policies] Evaluate -> DEBU 2229 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.792 UTC [policies] Evaluate -> DEBU 222a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.793 UTC [policies] Evaluate -> DEBU 222b Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:20.793 UTC [policies] Evaluate -> DEBU 222c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:20.794 UTC [gossip.gossip] handleMessage -> DEBU 222d Exiting" -"2019-07-20 02:40:20.794 UTC [gossip.gossip] handleMessage -> DEBU 222f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.793 UTC [chaincode] HandleTransaction -> DEBU 222e [79f74fa3] handling PUT_STATE from chaincode" -"2019-07-20 02:40:20.794 UTC [chaincode] HandleTransaction -> DEBU 2230 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" -"2019-07-20 02:40:20.794 UTC [msp] DeserializeIdentity -> DEBU 2231 Obtaining identity" -"2019-07-20 02:40:20.795 UTC [msp] DeserializeIdentity -> DEBU 2232 Obtaining identity" -"2019-07-20 02:40:20.795 UTC [msp] DeserializeIdentity -> DEBU 2233 Obtaining identity" -"2019-07-20 02:40:20.796 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2235 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:20.796 UTC [chaincode] handleMessage -> DEBU 2234 [79f74fa3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:20.796 UTC [chaincode] Notify -> DEBU 2236 [79f74fa3] notifying Txid:79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, channelID:businesschannel" -"2019-07-20 02:40:20.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2237 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2239 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.798 UTC [policies] Evaluate -> DEBU 223a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:20.797 UTC [chaincode] Execute -> DEBU 2238 Exit" -"2019-07-20 02:40:20.798 UTC [endorser] callChaincode -> INFO 223b [businesschannel][79f74fa3] Exit chaincode: name:"lscc" (30079ms)" -"2019-07-20 02:40:20.799 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 223c Simulation completed, getting simulation results" -"2019-07-20 02:40:20.799 UTC [lockbasedtxmgr] Done -> DEBU 223d Done with transaction simulation / query execution [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" -"2019-07-20 02:40:20.800 UTC [endorser] SimulateProposal -> DEBU 223e [businesschannel][79f74fa3] Exit" -"2019-07-20 02:40:20.800 UTC [endorser] endorseProposal -> DEBU 223f [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:20.801 UTC [endorser] endorseProposal -> DEBU 2240 [businesschannel][79f74fa3] escc for chaincode name:"lscc" is escc" -"2019-07-20 02:40:20.802 UTC [endorser] EndorseWithPlugin -> DEBU 2241 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, chaincode: lscc}" -"2019-07-20 02:40:20.798 UTC [policies] Evaluate -> DEBU 2242 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:20.802 UTC [policies] Evaluate -> DEBU 2243 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:20.802 UTC [cauthdsl] func1 -> DEBU 2244 0xc002f89090 gate 1563590420802657900 evaluation starts" -"2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2245 0xc002f89090 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2246 0xc002f89090 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.803 UTC [msp.identity] Sign -> DEBU 2247 Sign: plaintext: 0A204790835E071B71CF339AE73C7888...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:20.803 UTC [msp.identity] Sign -> DEBU 2248 Sign: digest: 37DFF638163BF053F0A202081D973D9C0328932F16905D7CA07D4DFD41588ED9 " -"2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2249 0xc002f89090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 224a 0xc002f89090 principal evaluation fails" -"2019-07-20 02:40:20.804 UTC [cauthdsl] func1 -> DEBU 224c 0xc002f89090 gate 1563590420802657900 evaluation fails" -"2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:20.804 UTC [cauthdsl] func1 -> DEBU 2250 0xc002f898d0 gate 1563590420804830700 evaluation starts" -"2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2251 0xc002f898d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2252 0xc002f898d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2253 0xc002f898d0 principal matched by identity 0" -"2019-07-20 02:40:20.805 UTC [msp.identity] Verify -> DEBU 2254 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:20.805 UTC [msp.identity] Verify -> DEBU 2255 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:20.804 UTC [endorser] EndorseWithPlugin -> DEBU 224b Exiting {plugin: escc, channel: businesschannel, tx: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, chaincode: lscc}" -"2019-07-20 02:40:20.805 UTC [endorser] endorseProposal -> DEBU 2256 [businesschannel][79f74fa3] Exit" -"2019-07-20 02:40:20.806 UTC [cauthdsl] func2 -> DEBU 2257 0xc002f898d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:20.806 UTC [cauthdsl] func1 -> DEBU 2258 0xc002f898d0 gate 1563590420804830700 evaluation succeeds" -"2019-07-20 02:40:20.806 UTC [lockbasedtxmgr] Done -> DEBU 2259 Done with transaction simulation / query execution [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" -"2019-07-20 02:40:20.806 UTC [endorser] func1 -> DEBU 225b Exit: request from 172.18.0.9:58342" -"2019-07-20 02:40:20.806 UTC [policies] Evaluate -> DEBU 225a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.808 UTC [comm.grpc.server] 1 -> INFO 225c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58342 grpc.code=OK grpc.call_duration=30.0944849s -"2019-07-20 02:40:20.808 UTC [policies] Evaluate -> DEBU 225d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.809 UTC [policies] Evaluate -> DEBU 225e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:20.809 UTC [policies] Evaluate -> DEBU 225f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:20.809 UTC [msp.identity] Verify -> DEBU 2260 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:20.809 UTC [msp.identity] Verify -> DEBU 2261 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:20.810 UTC [msp] DeserializeIdentity -> DEBU 2262 Obtaining identity" -"2019-07-20 02:40:20.810 UTC [msp] DeserializeIdentity -> DEBU 2263 Obtaining identity" -"2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2264 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2265 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2266 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2267 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2268 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2269 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:20.810 UTC [cauthdsl] func1 -> DEBU 226a 0xc002f5d760 gate 1563590420810881700 evaluation starts" -"2019-07-20 02:40:20.810 UTC [cauthdsl] func2 -> DEBU 226b 0xc002f5d760 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.810 UTC [cauthdsl] func2 -> DEBU 226c 0xc002f5d760 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 226d 0xc002f5d760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 226e 0xc002f5d760 principal evaluation fails" -"2019-07-20 02:40:20.811 UTC [cauthdsl] func1 -> DEBU 226f 0xc002f5d760 gate 1563590420810881700 evaluation fails" -"2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2270 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2271 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2272 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:20.811 UTC [cauthdsl] func1 -> DEBU 2273 0xc002f5dfa0 gate 1563590420811537400 evaluation starts" -"2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 2274 0xc002f5dfa0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:20.812 UTC [cauthdsl] func2 -> DEBU 2275 0xc002f5dfa0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:20.812 UTC [cauthdsl] func2 -> DEBU 2276 0xc002f5dfa0 principal matched by identity 0" -"2019-07-20 02:40:20.812 UTC [msp.identity] Verify -> DEBU 2277 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:20.812 UTC [msp.identity] Verify -> DEBU 2278 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:20.813 UTC [cauthdsl] func2 -> DEBU 2279 0xc002f5dfa0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:20.813 UTC [cauthdsl] func1 -> DEBU 227a 0xc002f5dfa0 gate 1563590420811537400 evaluation succeeds" -"2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:20.814 UTC [policies] Evaluate -> DEBU 227e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:20.814 UTC [msp.identity] Verify -> DEBU 227f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:20.814 UTC [msp.identity] Verify -> DEBU 2280 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:20.820 UTC [gossip.gossip] handleMessage -> DEBU 2281 Exiting" -"2019-07-20 02:40:20.822 UTC [gossip.gossip] handleMessage -> DEBU 2282 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.823 UTC [gossip.pull] HandleMessage -> DEBU 2283 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.823 UTC [gossip.gossip] handleMessage -> DEBU 2284 Exiting" -"2019-07-20 02:40:20.842 UTC [grpc] infof -> DEBU 2286 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:20.834 UTC [grpc] infof -> DEBU 2285 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:20.878 UTC [gossip.comm] func1 -> DEBU 2287 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.878 UTC [gossip.gossip] handleMessage -> DEBU 2288 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.879 UTC [msp] DeserializeIdentity -> DEBU 2289 Obtaining identity" -"2019-07-20 02:40:20.879 UTC [msp] DeserializeIdentity -> DEBU 228a Obtaining identity" -"2019-07-20 02:40:20.879 UTC [gossip.gossip] handleMessage -> DEBU 228b Exiting" -"2019-07-20 02:40:20.908 UTC [gossip.comm] func1 -> DEBU 228c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.908 UTC [gossip.gossip] handleMessage -> DEBU 228d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.908 UTC [gossip.pull] HandleMessage -> DEBU 228e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:20.909 UTC [gossip.pull] SendDigest -> DEBU 228f Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:20.909 UTC [gossip.gossip] handleMessage -> DEBU 2290 Exiting" -"2019-07-20 02:40:21.998 UTC [gossip.election] waitForInterrupt -> DEBU 2291 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:21.999 UTC [gossip.election] IsLeader -> DEBU 2292 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:21.999 UTC [msp] GetDefaultSigningIdentity -> DEBU 2293 Obtaining default signing identity" -"2019-07-20 02:40:21.999 UTC [msp.identity] Sign -> DEBU 2294 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510091801 " -"2019-07-20 02:40:21.999 UTC [msp.identity] Sign -> DEBU 2295 Sign: digest: CE53D14C8BDD185163EA86423928464BF5E2185940EB5A7C1CC04771A58293DC " -"2019-07-20 02:40:21.999 UTC [gossip.election] waitForInterrupt -> DEBU 2296 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2297 Obtaining identity" -"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2298 Obtaining identity" -"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2299 Obtaining identity" -"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229a Obtaining identity" -"2019-07-20 02:40:21.999 UTC [gossip.comm] Send -> DEBU 229b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229c Obtaining identity" -"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229d Obtaining identity" -"2019-07-20 02:40:22.000 UTC [gossip.comm] sendToEndpoint -> DEBU 229e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.000 UTC [gossip.comm] sendToEndpoint -> DEBU 229f Exiting" -"2019-07-20 02:40:22.021 UTC [gossip.comm] func1 -> DEBU 22a0 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:22.021 UTC [gossip.gossip] handleMessage -> DEBU 22a1 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a2 Obtaining identity" -"2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a3 Obtaining identity" -"2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a4 Obtaining identity" -"2019-07-20 02:40:22.021 UTC [gossip.gossip] handleMessage -> DEBU 22a5 Exiting" -"2019-07-20 02:40:22.022 UTC [gossip.comm] func1 -> DEBU 22a6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:22.022 UTC [gossip.comm] func1 -> DEBU 22a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22a8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22a9 Obtaining identity" -"2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22aa Obtaining identity" -"2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22ab Obtaining identity" -"2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ac Exiting" -"2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ae Exiting" -"2019-07-20 02:40:22.022 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22af Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.022 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 22b0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22b1 Obtaining identity" -"2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22b3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22b4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:22.022 UTC [cauthdsl] func1 -> DEBU 22b8 0xc002a63060 gate 1563590422022870600 evaluation starts" -"2019-07-20 02:40:22.022 UTC [cauthdsl] func2 -> DEBU 22b9 0xc002a63060 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22ba 0xc002a63060 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22bb 0xc002a63060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22bc 0xc002a63060 principal evaluation fails" -"2019-07-20 02:40:22.023 UTC [cauthdsl] func1 -> DEBU 22bd 0xc002a63060 gate 1563590422022870600 evaluation fails" -"2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22be Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:22.023 UTC [cauthdsl] func1 -> DEBU 22c1 0xc002a638a0 gate 1563590422023224000 evaluation starts" -"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c2 0xc002a638a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c3 0xc002a638a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c4 0xc002a638a0 principal matched by identity 0" -"2019-07-20 02:40:22.023 UTC [msp.identity] Verify -> DEBU 22c5 Verify: digest = 00000000 f1 6e e7 89 d4 c4 bf 8c dc 6f 4c f9 de 91 05 dc |.n.......oL.....| -00000010 be 94 5d 61 2b 3b 79 e7 74 d5 f4 43 28 c3 69 87 |..]a+;y.t..C(.i.|" -"2019-07-20 02:40:22.023 UTC [msp.identity] Verify -> DEBU 22c6 Verify: sig = 00000000 30 45 02 21 00 db 8d bb 55 89 30 0e f0 d8 88 d0 |0E.!....U.0.....| -00000010 5f 43 0c 7e e3 ea fb 4e 5b 9f 9b 55 57 38 ac 77 |_C.~...N[..UW8.w| -00000020 a3 2c 55 96 b0 02 20 46 95 b9 cd af 51 5b b0 41 |.,U... F....Q[.A| -00000030 07 0c e5 83 af e3 f8 89 b4 12 34 97 80 00 64 f7 |..........4...d.| -00000040 e2 79 b7 7e 3c 11 19 |.y.~<..|" -"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c7 0xc002a638a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:22.024 UTC [cauthdsl] func1 -> DEBU 22c8 0xc002a638a0 gate 1563590422023224000 evaluation succeeds" -"2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22c9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22cb Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:22.024 UTC [gossip.discovery] handleAliveMessage -> DEBU 22cd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22ce Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22cf updating membership: timestamp: " -"2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d0 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d2 Exiting" -"2019-07-20 02:40:22.024 UTC [gossip.discovery] handleAliveMessage -> DEBU 22d3 Exiting" -"2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22d4 Exiting" -"2019-07-20 02:40:22.024 UTC [gossip.comm] func1 -> DEBU 22d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.024 UTC [gossip.gossip] handleMessage -> DEBU 22d6 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22d7 Obtaining identity" -"2019-07-20 02:40:22.024 UTC [gossip.gossip] handleMessage -> DEBU 22d8 Exiting" -"2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22d9 Obtaining identity" -"2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22da Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22db Exiting" -"2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22dc Obtaining identity" -"2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22dd Obtaining identity" -"2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22de Obtaining identity" -"2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22df Obtaining identity" -"2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22e0 Obtaining identity" -"2019-07-20 02:40:22.025 UTC [gossip.comm] Send -> DEBU 22e1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22e2 Obtaining identity" -"2019-07-20 02:40:22.025 UTC [gossip.comm] Send -> DEBU 22e3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e5 Exiting" -"2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e7 Exiting" -"2019-07-20 02:40:22.028 UTC [gossip.comm] func1 -> DEBU 22e8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.029 UTC [gossip.gossip] handleMessage -> DEBU 22e9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.029 UTC [gossip.gossip] handleMessage -> DEBU 22ea Exiting" -"2019-07-20 02:40:22.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22eb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.030 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22ec Exiting" -"2019-07-20 02:40:22.227 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 22ed Sleeping 25s" -"2019-07-20 02:40:22.238 UTC [msp] GetDefaultSigningIdentity -> DEBU 22ee Obtaining default signing identity" -"2019-07-20 02:40:22.238 UTC [msp.identity] Sign -> DEBU 22ef Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151020 " -"2019-07-20 02:40:22.239 UTC [msp.identity] Sign -> DEBU 22f0 Sign: digest: EBDDB8E92477E63EEFA2BA9C61E1DAD7F517C2858787E52C7D65FB4EDC778900 " -"2019-07-20 02:40:22.239 UTC [msp] GetDefaultSigningIdentity -> DEBU 22f1 Obtaining default signing identity" -"2019-07-20 02:40:22.240 UTC [msp.identity] Sign -> DEBU 22f2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:22.240 UTC [msp.identity] Sign -> DEBU 22f3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:22.241 UTC [gossip.discovery] periodicalSendAlive -> DEBU 22f4 Sleeping 5s" -"2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f5 Obtaining identity" -"2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f6 Obtaining identity" -"2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f7 Obtaining identity" -"2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22f8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22f9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:22.244 UTC [msp] DeserializeIdentity -> DEBU 22fa Obtaining identity" -"2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22fb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:22.244 UTC [gossip.comm] sendToEndpoint -> DEBU 22fc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.244 UTC [gossip.comm] sendToEndpoint -> DEBU 22fd Exiting" -"2019-07-20 02:40:22.245 UTC [gossip.comm] sendToEndpoint -> DEBU 22fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.245 UTC [gossip.comm] sendToEndpoint -> DEBU 22ff Exiting" -"2019-07-20 02:40:22.246 UTC [gossip.comm] sendToEndpoint -> DEBU 2300 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.247 UTC [gossip.comm] sendToEndpoint -> DEBU 2301 Exiting" -"2019-07-20 02:40:22.342 UTC [endorser] ProcessProposal -> DEBU 2302 Entering: request from 172.18.0.9:58352" -"2019-07-20 02:40:22.342 UTC [protoutils] ValidateProposalMessage -> DEBU 2303 ValidateProposalMessage starts for signed proposal 0xc003370280" -"2019-07-20 02:40:22.342 UTC [protoutils] validateChannelHeader -> DEBU 2304 validateChannelHeader info: header type 3" -"2019-07-20 02:40:22.342 UTC [protoutils] checkSignatureFromCreator -> DEBU 2305 begin" -"2019-07-20 02:40:22.343 UTC [msp] GetManagerForChain -> DEBU 2306 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:22.343 UTC [protoutils] checkSignatureFromCreator -> DEBU 2307 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:22.343 UTC [protoutils] checkSignatureFromCreator -> DEBU 2308 creator is valid" -"2019-07-20 02:40:22.343 UTC [msp.identity] Verify -> DEBU 2309 Verify: digest = 00000000 e0 8f e0 d0 af 31 29 3b 49 09 2b a8 a7 61 ce e3 |.....1);I.+..a..| -00000010 2f be 78 94 05 52 4b 05 88 55 28 ef 2d 50 f7 08 |/.x..RK..U(.-P..|" -"2019-07-20 02:40:22.344 UTC [msp.identity] Verify -> DEBU 230a Verify: sig = 00000000 30 45 02 21 00 98 65 5c aa e4 35 ba 8a 33 e6 42 |0E.!..e\..5..3.B| -00000010 8b 3d 5b c9 57 39 65 a8 10 b3 7b f6 1f 6d 23 8e |.=[.W9e...{..m#.| -00000020 58 63 d6 da 94 02 20 21 46 82 7a 61 42 18 46 9a |Xc.... !F.zaB.F.| -00000030 0d 90 a8 31 e2 88 25 c1 8f 13 61 1a 13 c5 19 4b |...1..%...a....K| -00000040 b6 15 f0 b9 47 21 01 |....G!.|" -"2019-07-20 02:40:22.344 UTC [protoutils] checkSignatureFromCreator -> DEBU 230b exits successfully" -"2019-07-20 02:40:22.344 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 230c validateChaincodeProposalMessage starts for proposal 0xc0005b4460, header 0xc003370690" -"2019-07-20 02:40:22.344 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 230d validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-07-20 02:40:22.344 UTC [endorser] preProcess -> DEBU 230e [businesschannel][862a1339] processing txid: 862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457" -"2019-07-20 02:40:22.345 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 230f retrieveTransactionByID() - txId = [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" -"2019-07-20 02:40:22.345 UTC [aclmgmt] CheckACL -> DEBU 2310 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-07-20 02:40:22.345 UTC [aclmgmt] CheckACL -> DEBU 2311 acl check(/Channel/Application/Writers)" -"2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2312 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2313 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2314 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:22.345 UTC [cauthdsl] func1 -> DEBU 2315 0xc0029331a0 gate 1563590422345723200 evaluation starts" -"2019-07-20 02:40:22.345 UTC [cauthdsl] func2 -> DEBU 2316 0xc0029331a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:22.345 UTC [cauthdsl] func2 -> DEBU 2317 0xc0029331a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:22.345 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2318 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-07-20 02:40:22.346 UTC [msp] Validate -> DEBU 2319 MSP Org1MSP validating identity" -"2019-07-20 02:40:22.346 UTC [msp] getCertificationChain -> DEBU 231a MSP Org1MSP getting certification chain" -"2019-07-20 02:40:22.346 UTC [cauthdsl] func2 -> DEBU 231b 0xc0029331a0 principal matched by identity 0" -"2019-07-20 02:40:22.346 UTC [msp.identity] Verify -> DEBU 231c Verify: digest = 00000000 e0 8f e0 d0 af 31 29 3b 49 09 2b a8 a7 61 ce e3 |.....1);I.+..a..| -00000010 2f be 78 94 05 52 4b 05 88 55 28 ef 2d 50 f7 08 |/.x..RK..U(.-P..|" -"2019-07-20 02:40:22.346 UTC [msp.identity] Verify -> DEBU 231d Verify: sig = 00000000 30 45 02 21 00 98 65 5c aa e4 35 ba 8a 33 e6 42 |0E.!..e\..5..3.B| -00000010 8b 3d 5b c9 57 39 65 a8 10 b3 7b f6 1f 6d 23 8e |.=[.W9e...{..m#.| -00000020 58 63 d6 da 94 02 20 21 46 82 7a 61 42 18 46 9a |Xc.... !F.zaB.F.| -00000030 0d 90 a8 31 e2 88 25 c1 8f 13 61 1a 13 c5 19 4b |...1..%...a....K| -00000040 b6 15 f0 b9 47 21 01 |....G!.|" -"2019-07-20 02:40:22.346 UTC [cauthdsl] func2 -> DEBU 231e 0xc0029331a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:22.347 UTC [cauthdsl] func1 -> DEBU 231f 0xc0029331a0 gate 1563590422345723200 evaluation succeeds" -"2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2320 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2321 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2322 Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2323 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2324 constructing new tx simulator" -"2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2325 constructing new tx simulator txid = [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" -"2019-07-20 02:40:22.347 UTC [endorser] SimulateProposal -> DEBU 2326 [businesschannel][862a1339] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:22.347 UTC [stateleveldb] GetState -> DEBU 2327 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:22.347 UTC [endorser] SimulateProposal -> DEBU 2328 [businesschannel][862a1339] Exit" -"2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] Done -> DEBU 2329 Done with transaction simulation / query execution [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" -"2019-07-20 02:40:22.348 UTC [endorser] func1 -> DEBU 232a Exit: request from 172.18.0.9:58352" -"2019-07-20 02:40:22.348 UTC [comm.grpc.server] 1 -> INFO 232b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58352 grpc.code=OK grpc.call_duration=6.0452ms -"2019-07-20 02:40:22.351 UTC [grpc] warningf -> DEBU 232c transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58352: read: connection reset by peer" -"2019-07-20 02:40:22.351 UTC [grpc] infof -> DEBU 232d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:22.352 UTC [grpc] infof -> DEBU 232e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:22.367 UTC [gossip.comm] func1 -> DEBU 232f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.367 UTC [gossip.gossip] handleMessage -> DEBU 2330 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.367 UTC [gossip.gossip] handleMessage -> DEBU 2331 Exiting" -"2019-07-20 02:40:22.368 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2332 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.368 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2333 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:22.368 UTC [msp.identity] Verify -> DEBU 2334 Verify: digest = 00000000 68 b2 ce e5 1a bc 7e 9c ac ef cd f9 94 e8 b1 1b |h.....~.........| -00000010 11 db 9d 96 e8 0f b2 db 97 c0 3b 77 50 37 88 64 |..........;wP7.d|" -"2019-07-20 02:40:22.368 UTC [msp.identity] Verify -> DEBU 2335 Verify: sig = 00000000 30 45 02 21 00 af dd 12 0b 63 b8 e1 6e 01 6d 74 |0E.!.....c..n.mt| -00000010 a8 2b 6e bc 79 4b b0 d6 d9 5f 71 27 51 10 ad 99 |.+n.yK..._q'Q...| -00000020 a0 f6 24 e5 cb 02 20 77 89 1b 62 25 94 dc 07 38 |..$... w..b%...8| -00000030 28 6b 54 70 20 5e 3c a5 cd 0a 98 8e fd 9d 53 53 |(kTp ^<.......SS| -00000040 9b 69 e8 69 aa 5c b8 |.i.i.\.|" -"2019-07-20 02:40:22.369 UTC [gossip.discovery] handleAliveMessage -> DEBU 2336 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.369 UTC [gossip.discovery] learnExistingMembers -> DEBU 2337 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 2338 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 2339 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 233a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 233b Exiting" -"2019-07-20 02:40:22.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 233c Exiting" -"2019-07-20 02:40:22.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 233d Exiting" -"2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 233e Obtaining identity" -"2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 233f Obtaining identity" -"2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 2340 Obtaining identity" -"2019-07-20 02:40:22.371 UTC [gossip.comm] Send -> DEBU 2341 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 2342 Obtaining identity" -"2019-07-20 02:40:22.372 UTC [gossip.comm] Send -> DEBU 2343 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2344 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2345 Exiting" -"2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2346 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.373 UTC [gossip.comm] sendToEndpoint -> DEBU 2347 Exiting" -"2019-07-20 02:40:22.377 UTC [gossip.comm] func1 -> DEBU 2348 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.377 UTC [gossip.gossip] handleMessage -> DEBU 2349 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.378 UTC [gossip.gossip] handleMessage -> DEBU 234b Exiting" -"2019-07-20 02:40:22.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 234c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 234d Exiting" -"2019-07-20 02:40:22.378 UTC [gossip.comm] func1 -> DEBU 234a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.379 UTC [gossip.gossip] handleMessage -> DEBU 234e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.380 UTC [gossip.gossip] handleMessage -> DEBU 234f Exiting" -"2019-07-20 02:40:22.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2350 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:22.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2351 Exiting" -"2019-07-20 02:40:22.556 UTC [gossip.comm] func1 -> DEBU 2352 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.556 UTC [gossip.gossip] handleMessage -> DEBU 2353 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.556 UTC [gossip.gossip] handleMessage -> DEBU 2354 Exiting" -"2019-07-20 02:40:22.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2355 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.556 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2356 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:22.557 UTC [msp] DeserializeIdentity -> DEBU 2357 Obtaining identity" -"2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2358 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2359 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 235a Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:22.558 UTC [cauthdsl] func1 -> DEBU 235e 0xc0007d4190 gate 1563590422558401200 evaluation starts" -"2019-07-20 02:40:22.558 UTC [cauthdsl] func2 -> DEBU 235f 0xc0007d4190 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:22.558 UTC [cauthdsl] func2 -> DEBU 2360 0xc0007d4190 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:22.559 UTC [cauthdsl] func2 -> DEBU 2361 0xc0007d4190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:22.559 UTC [cauthdsl] func2 -> DEBU 2362 0xc0007d4190 principal evaluation fails" -"2019-07-20 02:40:22.559 UTC [cauthdsl] func1 -> DEBU 2363 0xc0007d4190 gate 1563590422558401200 evaluation fails" -"2019-07-20 02:40:22.559 UTC [policies] Evaluate -> DEBU 2364 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:22.560 UTC [policies] Evaluate -> DEBU 2365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:22.560 UTC [policies] Evaluate -> DEBU 2366 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:22.560 UTC [cauthdsl] func1 -> DEBU 2367 0xc0007d4a30 gate 1563590422560915000 evaluation starts" -"2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 2368 0xc0007d4a30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 2369 0xc0007d4a30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 236a 0xc0007d4a30 principal matched by identity 0" -"2019-07-20 02:40:22.561 UTC [msp.identity] Verify -> DEBU 236b Verify: digest = 00000000 46 8b 7b d6 90 39 0f 79 17 a9 b3 43 a0 14 fe 74 |F.{..9.y...C...t| -00000010 e4 2c e5 e6 6f 82 c6 fb ed 5b 3f c5 df fd 1b 32 |.,..o....[?....2|" -"2019-07-20 02:40:22.561 UTC [msp.identity] Verify -> DEBU 236c Verify: sig = 00000000 30 44 02 20 16 a5 c2 0e 55 8a f8 e7 7a b4 06 29 |0D. ....U...z..)| -00000010 05 4f 88 83 a2 d5 8f f8 0d 68 ae 6a 17 d7 45 0c |.O.......h.j..E.| -00000020 a2 35 17 2b 02 20 51 ce ab c4 fc 0b d4 69 e8 65 |.5.+. Q......i.e| -00000030 66 09 be 24 f4 e1 8e f1 8f 5f 09 d4 7b d8 c5 ac |f..$....._..{...| -00000040 49 bc 10 5e 80 94 |I..^..|" -"2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 236d 0xc0007d4a30 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:22.561 UTC [cauthdsl] func1 -> DEBU 236e 0xc0007d4a30 gate 1563590422560915000 evaluation succeeds" -"2019-07-20 02:40:22.561 UTC [policies] Evaluate -> DEBU 236f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2370 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2371 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2372 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:22.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 2373 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2374 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2375 updating membership: timestamp: " -"2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2376 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2377 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2378 Exiting" -"2019-07-20 02:40:22.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 2379 Exiting" -"2019-07-20 02:40:22.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237a Exiting" -"2019-07-20 02:40:22.564 UTC [gossip.comm] func1 -> DEBU 237b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.564 UTC [gossip.gossip] handleMessage -> DEBU 237c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.564 UTC [gossip.gossip] handleMessage -> DEBU 237d Exiting" -"2019-07-20 02:40:22.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237f Exiting" -"2019-07-20 02:40:22.564 UTC [gossip.comm] func1 -> DEBU 2380 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.565 UTC [gossip.gossip] handleMessage -> DEBU 2381 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.565 UTC [gossip.gossip] handleMessage -> DEBU 2382 Exiting" -"2019-07-20 02:40:22.565 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2383 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.565 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2384 Exiting" -"2019-07-20 02:40:22.565 UTC [msp] DeserializeIdentity -> DEBU 2385 Obtaining identity" -"2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2386 Obtaining identity" -"2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2387 Obtaining identity" -"2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2388 Obtaining identity" -"2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2389 Obtaining identity" -"2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 238a Obtaining identity" -"2019-07-20 02:40:22.567 UTC [gossip.comm] Send -> DEBU 238b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:22.567 UTC [msp] DeserializeIdentity -> DEBU 238c Obtaining identity" -"2019-07-20 02:40:22.567 UTC [msp] DeserializeIdentity -> DEBU 238d Obtaining identity" -"2019-07-20 02:40:22.567 UTC [gossip.comm] Send -> DEBU 238e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 238f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2390 Exiting" -"2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2391 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2392 Exiting" -"2019-07-20 02:40:22.852 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2393 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:22.852 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2394 Got block validation policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2395 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2396 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2397 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:40:22.852 UTC [msp] DeserializeIdentity -> DEBU 2398 Obtaining identity" -"2019-07-20 02:40:22.852 UTC [msp.identity] newIdentity -> DEBU 2399 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICDTCCAbSgAwIBAgIRAJ9PiwMc+yJquw7iESWUUdgwCgYIKoZIzj0EAwIwaTEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt -cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV -BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp -c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG -CCqGSM49AwEHA0IABJFXeJu8Bn4343K9C/p5zMXGWMf7TRDkm1QTRArOtt2UcwjS -hELr0NUrXJ9/itxePp5kcNe1A/SPXSlVbZJb7zyjTTBLMA4GA1UdDwEB/wQEAwIH -gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U -4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIBQFxbpf0MCh/Pc/loudY4Bg -rIfa+QF858Ffm7hagVV9AiB7x5vl9mUFXWvFJffvBYw0mnUxe0HmAS0C7cpoHJbC -dg== ------END CERTIFICATE-----" -"2019-07-20 02:40:22.852 UTC [cauthdsl] func1 -> DEBU 239a 0xc0007338d0 gate 1563590422852774600 evaluation starts" -"2019-07-20 02:40:22.852 UTC [cauthdsl] func2 -> DEBU 239b 0xc0007338d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:22.852 UTC [cauthdsl] func2 -> DEBU 239c 0xc0007338d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:22.852 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 239d Checking if identity satisfies MEMBER role for OrdererMSP" -"2019-07-20 02:40:22.853 UTC [msp] Validate -> DEBU 239e MSP OrdererMSP validating identity" -"2019-07-20 02:40:22.853 UTC [cauthdsl] func2 -> DEBU 239f 0xc0007338d0 principal matched by identity 0" -"2019-07-20 02:40:22.853 UTC [msp.identity] Verify -> DEBU 23a0 Verify: digest = 00000000 8c b8 01 77 65 0b a3 0a 0a fc 6f 48 84 dd 2f 3f |...we.....oH../?| -00000010 f7 69 6f 14 28 21 3d 73 f7 2d d8 56 d4 4e 22 80 |.io.(!=s.-.V.N".|" -"2019-07-20 02:40:22.853 UTC [msp.identity] Verify -> DEBU 23a1 Verify: sig = 00000000 30 44 02 20 2f ab 29 ad 54 0d 53 67 d2 ab 50 ad |0D. /.).T.Sg..P.| -00000010 c5 98 64 da 4e 92 02 d8 f9 73 20 b4 ff 23 5c a5 |..d.N....s ..#\.| -00000020 ff 27 12 3e 02 20 0f ac fb c2 41 bc 8d bb 20 08 |.'.>. ....A... .| -00000030 16 c9 b0 a9 58 0b fb cb 0e a5 08 54 64 68 40 27 |....X......Tdh@'| -00000040 7f 8c df 1b 24 f0 |....$.|" -"2019-07-20 02:40:22.853 UTC [cauthdsl] func2 -> DEBU 23a2 0xc0007338d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:22.853 UTC [cauthdsl] func1 -> DEBU 23a3 0xc0007338d0 gate 1563590422852774600 evaluation succeeds" -"2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a6 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:22.855 UTC [policies] Evaluate -> DEBU 23a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:22.855 UTC [blocksProvider] DeliverBlocks -> DEBU 23a8 [businesschannel] Adding payload to local buffer, blockNum = [3]" -"2019-07-20 02:40:22.855 UTC [gossip.state] addPayload -> DEBU 23a9 [businesschannel] Adding payload to local buffer, blockNum = [3]" -"2019-07-20 02:40:22.856 UTC [gossip.state] addPayload -> DEBU 23aa Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-07-20 02:40:22.856 UTC [gossip.state] deliverPayloads -> DEBU 23ab [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" -"2019-07-20 02:40:22.856 UTC [gossip.state] deliverPayloads -> DEBU 23ac [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" -"2019-07-20 02:40:22.856 UTC [gossip.privdata] StoreBlock -> INFO 23ad [businesschannel] Received block [3] from buffer" -"2019-07-20 02:40:22.856 UTC [gossip.privdata] StoreBlock -> DEBU 23af [businesschannel] Validating block [3]" -"2019-07-20 02:40:22.857 UTC [committer.txvalidator] Validate -> DEBU 23b0 [businesschannel] START Block Validation for block [3]" -"2019-07-20 02:40:22.857 UTC [committer.txvalidator] Validate -> DEBU 23b1 expecting 1 block validation responses" -"2019-07-20 02:40:22.857 UTC [committer.txvalidator] validateTx -> DEBU 23b2 [businesschannel] validateTx starts for block 0xc0006949c0 env 0xc003371810 txn 0" -"2019-07-20 02:40:22.856 UTC [blocksProvider] DeliverBlocks -> DEBU 23ae [businesschannel] Gossiping block [3], peers number [3]" -"2019-07-20 02:40:22.857 UTC [protoutils] ValidateTransaction -> DEBU 23b3 ValidateTransactionEnvelope starts for envelope 0xc003371810" -"2019-07-20 02:40:22.858 UTC [protoutils] ValidateTransaction -> DEBU 23b4 Header is channel_header:"\010\003\032\014\010\366\375\311\351\005\020\344\375\271\344\002\"\017businesschannel*@79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\036E\311&g*\274\n\233\335{\344\252\031\357M\361y\350\340\236\3666" " -"2019-07-20 02:40:22.858 UTC [protoutils] validateChannelHeader -> DEBU 23b5 validateChannelHeader info: header type 3" -"2019-07-20 02:40:22.858 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b6 begin" -"2019-07-20 02:40:22.859 UTC [msp] GetManagerForChain -> DEBU 23b7 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:22.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b8 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:22.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b9 creator is valid" -"2019-07-20 02:40:22.859 UTC [msp.identity] Verify -> DEBU 23ba Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| -00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" -"2019-07-20 02:40:22.860 UTC [msp.identity] Verify -> DEBU 23bb Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| -00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| -00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| -00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| -00000040 d7 3e d5 8f e5 b0 |.>....|" -"2019-07-20 02:40:22.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 23bc exits successfully" -"2019-07-20 02:40:22.860 UTC [protoutils] validateEndorserTransaction -> DEBU 23bd validateEndorserTransaction starts for data 0xc00323ca80, header channel_header:"\010\003\032\014\010\366\375\311\351\005\020\344\375\271\344\002\"\017businesschannel*@79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\036E\311&g*\274\n\233\335{\344\252\031\357M\361y\350\340\236\3666" " -"2019-07-20 02:40:22.860 UTC [protoutils] validateEndorserTransaction -> DEBU 23be validateEndorserTransaction info: there are 1 actions" -"2019-07-20 02:40:22.861 UTC [protoutils] validateEndorserTransaction -> DEBU 23bf validateEndorserTransaction info: signature header is valid" -"2019-07-20 02:40:22.858 UTC [gossip.channel] AddToMsgStore -> DEBU 23c0 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes to the block puller" -"2019-07-20 02:40:22.861 UTC [protoutils] ValidateTransaction -> DEBU 23c1 ValidateTransactionEnvelope returns err %!s()" -"2019-07-20 02:40:22.861 UTC [committer.txvalidator] validateTx -> DEBU 23c2 Transaction is for channel businesschannel" -"2019-07-20 02:40:22.861 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 23c3 retrieveTransactionByID() - txId = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" -"2019-07-20 02:40:22.862 UTC [committer.txvalidator] validateTx -> DEBU 23c4 Validating transaction vscc tx validate" -"2019-07-20 02:40:22.862 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 23c5 [businesschannel] VSCCValidateTx starts for bytes 0xc003bad000" -"2019-07-20 02:40:22.862 UTC [gossip.pull] Add -> DEBU 23c6 Added 3, total items: 3" -"2019-07-20 02:40:22.862 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 23c7 Validating Tx 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" -"2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23c8 Obtaining identity" -"2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23c9 Obtaining identity" -"2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23ca Obtaining identity" -"2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23cb Obtaining identity" -"2019-07-20 02:40:22.863 UTC [gossip.comm] Send -> DEBU 23cc Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:22.864 UTC [msp] DeserializeIdentity -> DEBU 23cd Obtaining identity" -"2019-07-20 02:40:22.864 UTC [msp] DeserializeIdentity -> DEBU 23ce Obtaining identity" -"2019-07-20 02:40:22.864 UTC [gossip.comm] sendToEndpoint -> DEBU 23cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes" -"2019-07-20 02:40:22.864 UTC [gossip.comm] sendToEndpoint -> DEBU 23d0 Exiting" -"2019-07-20 02:40:22.869 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23d1 constructing new query executor txid = [dd0ee138-c617-46cb-98a9-fae76c835f47]" -"2019-07-20 02:40:22.870 UTC [lockbasedtxmgr] Done -> DEBU 23d2 Done with transaction simulation / query execution [dd0ee138-c617-46cb-98a9-fae76c835f47]" -"2019-07-20 02:40:22.871 UTC [msp] DeserializeIdentity -> DEBU 23d3 Obtaining identity" -"2019-07-20 02:40:22.872 UTC [msp.identity] newIdentity -> DEBU 23d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +"2019-09-24 00:25:04.948 UTC [fsblkstorage] indexBlock -> DEBU 69a Indexing block [blockNum=1, blockHash=[]byte{0x81, 0xd3, 0xeb, 0x83, 0x70, 0x19, 0x81, 0xbf, 0xc0, 0xb4, 0xb0, 0x9b, 0xd3, 0x64, 0x4d, 0xef, 0x6d, 0x21, 0x73, 0x6d, 0x1, 0x28, 0x4d, 0xdc, 0x73, 0xd7, 0xb4, 0x87, 0x96, 0xcf, 0x2e, 0xd6} txOffsets= +txId=91696339b033049ed8d7697c23abc85593d36f57812608fa7cde041ba7fdc82b locPointer=offset=71, bytesLength=22685 +]" +"2019-09-24 00:25:04.948 UTC [fsblkstorage] indexBlock -> DEBU 69b Adding txLoc [fileSuffixNum=0, offset=24020, bytesLength=22685] for tx ID: [91696339b033049ed8d7697c23abc85593d36f57812608fa7cde041ba7fdc82b] to txid-index" +"2019-09-24 00:25:04.948 UTC [fsblkstorage] indexBlock -> DEBU 69c Adding txLoc [fileSuffixNum=0, offset=24020, bytesLength=22685] for tx number:[0] ID: [91696339b033049ed8d7697c23abc85593d36f57812608fa7cde041ba7fdc82b] to blockNumTranNum index" +"2019-09-24 00:25:04.952 UTC [fsblkstorage] updateCheckpoint -> DEBU 69d Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47677], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-09-24 00:25:04.952 UTC [pvtdatastorage] Commit -> DEBU 69e Committing private data for block [1]" +"2019-09-24 00:25:04.954 UTC [msp] GetDefaultSigningIdentity -> DEBU 69f Obtaining default signing identity" +"2019-09-24 00:25:04.954 UTC [msp.identity] Sign -> DEBU 6a0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:04.954 UTC [msp.identity] Sign -> DEBU 6a1 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:04.954 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:34556" +"2019-09-24 00:25:04.955 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a3 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:34556" +"2019-09-24 00:25:04.955 UTC [msp] DeserializeIdentity -> DEBU 6a4 Obtaining identity" +"2019-09-24 00:25:04.955 UTC [msp] DeserializeIdentity -> DEBU 6a5 Obtaining identity" +"2019-09-24 00:25:04.959 UTC [msp.identity] newIdentity -> DEBU 6a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu -b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T -YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx -LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns -FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 -5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j -BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E -AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f -whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -----END CERTIFICATE-----" -"2019-07-20 02:40:22.873 UTC [cauthdsl] func1 -> DEBU 23d5 0xc0006bb9b0 gate 1563590422873396500 evaluation starts" -"2019-07-20 02:40:22.873 UTC [cauthdsl] func2 -> DEBU 23d6 0xc0006bb9b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:22.873 UTC [cauthdsl] func2 -> DEBU 23d7 0xc0006bb9b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:22.873 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 23d8 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-07-20 02:40:22.873 UTC [msp] Validate -> DEBU 23d9 MSP Org1MSP validating identity" -"2019-07-20 02:40:22.876 UTC [msp] getCertificationChain -> DEBU 23da MSP Org1MSP getting certification chain" -"2019-07-20 02:40:22.877 UTC [cauthdsl] func2 -> DEBU 23db 0xc0006bb9b0 principal matched by identity 0" -"2019-07-20 02:40:22.877 UTC [msp.identity] Verify -> DEBU 23dc Verify: digest = 00000000 37 df f6 38 16 3b f0 53 f0 a2 02 08 1d 97 3d 9c |7..8.;.S......=.| -00000010 03 28 93 2f 16 90 5d 7c a0 7d 4d fd 41 58 8e d9 |.(./..]|.}M.AX..|" -"2019-07-20 02:40:22.878 UTC [msp.identity] Verify -> DEBU 23dd Verify: sig = 00000000 30 43 02 20 1b 72 18 31 bd 18 67 a2 cd 03 ca 91 |0C. .r.1..g.....| -00000010 cb 37 6c 80 76 45 b9 6c f3 20 09 f6 4b 83 fd 0d |.7l.vE.l. ..K...| -00000020 34 a4 1b 10 02 1f 2e cb 8a df 0f 19 1b 54 e4 9a |4............T..| -00000030 d8 18 2b f3 83 42 4a 03 5a 19 be 2b 47 b4 bb c4 |..+..BJ.Z..+G...| -00000040 df f8 47 dc 1f |..G..|" -"2019-07-20 02:40:22.880 UTC [cauthdsl] func2 -> DEBU 23de 0xc0006bb9b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:22.880 UTC [cauthdsl] func2 -> DEBU 23df 0xc0006bb9b0 signed by 1 principal evaluation starts (used [true])" -"2019-07-20 02:40:22.881 UTC [cauthdsl] func2 -> DEBU 23e0 0xc0006bb9b0 skipping identity 0 because it has already been used" -"2019-07-20 02:40:22.881 UTC [cauthdsl] func2 -> DEBU 23e1 0xc0006bb9b0 principal evaluation fails" -"2019-07-20 02:40:22.881 UTC [cauthdsl] func1 -> DEBU 23e2 0xc0006bb9b0 gate 1563590422873396500 evaluation succeeds" -"2019-07-20 02:40:22.882 UTC [vscc] Validate -> DEBU 23e3 VSCC info: doing special validation for LSCC" -"2019-07-20 02:40:22.882 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e4 VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" -"2019-07-20 02:40:22.882 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e5 VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" -"2019-07-20 02:40:22.883 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e6 Namespace exp02" -"2019-07-20 02:40:22.883 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e7 Namespace lscc" -"2019-07-20 02:40:22.884 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23e8 constructing new query executor txid = [9c8ac5d0-30f8-430f-a1a6-a6ef74648923]" -"2019-07-20 02:40:22.884 UTC [stateleveldb] GetState -> DEBU 23e9 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:22.884 UTC [lockbasedtxmgr] Done -> DEBU 23ea Done with transaction simulation / query execution [9c8ac5d0-30f8-430f-a1a6-a6ef74648923]" -"2019-07-20 02:40:22.884 UTC [vscc] ValidateLSCCInvocation -> DEBU 23eb Validating deploy for cc exp02 version 1.0" -"2019-07-20 02:40:22.886 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23ec constructing new query executor txid = [82bb1a55-4f36-491e-9f0c-a5955335d197]" -"2019-07-20 02:40:22.886 UTC [stateleveldb] GetState -> DEBU 23ed GetState(). ns=lscc, key=exp02~collection" -"2019-07-20 02:40:22.886 UTC [lockbasedtxmgr] Done -> DEBU 23ee Done with transaction simulation / query execution [82bb1a55-4f36-491e-9f0c-a5955335d197]" -"2019-07-20 02:40:22.887 UTC [cauthdsl] func1 -> DEBU 23ef 0xc000587cd0 gate 1563590422887178600 evaluation starts" -"2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f0 0xc000587cd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f1 0xc000587cd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f2 0xc000587cd0 principal matched by identity 0" -"2019-07-20 02:40:22.889 UTC [msp.identity] Verify -> DEBU 23f3 Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| -00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" -"2019-07-20 02:40:22.889 UTC [msp.identity] Verify -> DEBU 23f4 Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| -00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| -00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| -00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| -00000040 d7 3e d5 8f e5 b0 |.>....|" -"2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f5 0xc000587cd0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f6 0xc000587cd0 signed by 1 principal evaluation starts (used [true])" -"2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f7 0xc000587cd0 skipping identity 0 because it has already been used" -"2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f8 0xc000587cd0 principal evaluation fails" -"2019-07-20 02:40:22.890 UTC [cauthdsl] func1 -> DEBU 23f9 0xc000587cd0 gate 1563590422887178600 evaluation succeeds" -"2019-07-20 02:40:22.890 UTC [vscc] Validate -> DEBU 23fa block 3, namespace: lscc, tx 0 validation results is: " -"2019-07-20 02:40:22.890 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 23fb Transaction 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f appears to be valid" -"2019-07-20 02:40:22.890 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 23fc [businesschannel] VSCCValidateTx completes env bytes 0xc003bad000" -"2019-07-20 02:40:22.890 UTC [committer.txvalidator] validateTx -> DEBU 23fd [businesschannel] validateTx completes for block 0xc0006949c0 env 0xc003371810 txn 0" -"2019-07-20 02:40:22.890 UTC [committer.txvalidator] Validate -> DEBU 23fe got result for idx 0, code 0" -"2019-07-20 02:40:22.891 UTC [committer.txvalidator] Validate -> INFO 23ff [businesschannel] Validated block [3] in 34ms" -"2019-07-20 02:40:22.892 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2400 Retrieving private write sets for 0 transactions from transient store" -"2019-07-20 02:40:22.892 UTC [gossip.privdata] StoreBlock -> DEBU 2401 [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-07-20 02:40:22.892 UTC [kvledger] CommitWithPvtData -> DEBU 2402 [businesschannel] Validating state for block [3]" -"2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2403 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2404 lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2405 Validating new block with num trans = [1]" -"2019-07-20 02:40:22.893 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2406 ValidateAndPrepareBatch() for block number = [3]" -"2019-07-20 02:40:22.893 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2407 preprocessing ProtoBlock..." -"2019-07-20 02:40:22.893 UTC [valimpl] preprocessProtoBlock -> DEBU 2408 txType=ENDORSER_TRANSACTION" -"2019-07-20 02:40:22.894 UTC [stateleveldb] GetState -> DEBU 2409 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:22.894 UTC [statebasedval] validateKVRead -> DEBU 240a Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" -"2019-07-20 02:40:22.894 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 240b Block [3] Transaction index [0] TxId [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] marked as valid by state validator" -"2019-07-20 02:40:22.894 UTC [valinternal] ApplyWriteSet -> DEBU 240c txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc000258880), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0002588c0), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc000258900)}" -"2019-07-20 02:40:22.894 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240d validating rwset..." -"2019-07-20 02:40:22.895 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240e postprocessing ProtoBlock..." -"2019-07-20 02:40:22.895 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240f ValidateAndPrepareBatch() complete" -"2019-07-20 02:40:22.895 UTC [cceventmgmt] HandleStateUpdates -> DEBU 2410 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc00309b4a0)}}" -"2019-07-20 02:40:22.896 UTC [cceventmgmt] HandleStateUpdates -> INFO 2411 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" -"2019-07-20 02:40:22.896 UTC [stateleveldb] GetState -> DEBU 2412 GetState(). ns=lscc, key=exp02~collection" -"2019-07-20 02:40:22.896 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 2413 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" -"2019-07-20 02:40:22.897 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU 2414 Created metadata tar" -"2019-07-20 02:40:22.897 UTC [discovery.lifecycle] HandleChaincodeDeploy -> DEBU 2415 Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}" -"2019-07-20 02:40:22.897 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 2416 Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" -"2019-07-20 02:40:22.897 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2417 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})}" -"2019-07-20 02:40:22.897 UTC [stateleveldb] GetState -> DEBU 2418 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:22.898 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2419 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 201 201 124 213 209 131 170 90 214 236 213 79 201 15 102 244 57 138 217 224 48 255 78 38 213 53 156 203 16 22 213 204 2 32 92 73 198 4 5 111 56 38 126 201 24 110 29 201 66 1 202 46 128 237 231 125 50 102 55 17 170 129 77 248 168 103]} 0x15231a0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0007d3200 0xc0007d0ba0 {{0 0} 0 0 0 0} {false}})]}" -"2019-07-20 02:40:22.898 UTC [stateleveldb] GetState -> DEBU 241a GetState(). ns=lscc, key=exp02~collection" -"2019-07-20 02:40:22.898 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 241b Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00049f160})}" -"2019-07-20 02:40:22.899 UTC [kvledger] CommitWithPvtData -> DEBU 241c [businesschannel] Adding CommitHash to the block [3]" -"2019-07-20 02:40:22.899 UTC [kvledger] CommitWithPvtData -> DEBU 241d [businesschannel] Committing block [3] to storage" -"2019-07-20 02:40:22.899 UTC [ledgerstorage] CommitWithPvtData -> DEBU 241e Writing block [3] to pvt block store" -"2019-07-20 02:40:22.901 UTC [pvtdatastorage] Prepare -> DEBU 241f Saved 0 private data write sets for block [3]" -"2019-07-20 02:40:22.903 UTC [fsblkstorage] indexBlock -> DEBU 2420 Indexing block [blockNum=3, blockHash=[]byte{0x18, 0x70, 0x86, 0xed, 0x63, 0x58, 0x1a, 0xe8, 0x75, 0x8c, 0x4e, 0x43, 0x60, 0x90, 0xd4, 0xe2, 0xe5, 0xb8, 0x6b, 0x53, 0x15, 0x11, 0x95, 0xd4, 0xe0, 0xf8, 0xb9, 0xcf, 0x43, 0x25, 0x9d, 0x7f} txOffsets= -txId=79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f locPointer=offset=70, bytesLength=3522 -]" -"2019-07-20 02:40:22.903 UTC [fsblkstorage] indexBlock -> DEBU 2421 Adding txLoc [fileSuffixNum=0, offset=71531, bytesLength=3522] for tx ID: [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] to txid-index" -"2019-07-20 02:40:22.904 UTC [fsblkstorage] indexBlock -> DEBU 2422 Adding txLoc [fileSuffixNum=0, offset=71531, bytesLength=3522] for tx number:[0] ID: [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] to blockNumTranNum index" -"2019-07-20 02:40:22.907 UTC [fsblkstorage] updateCheckpoint -> DEBU 2423 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76025], isChainEmpty=[false], lastBlockNumber=[3]" -"2019-07-20 02:40:22.908 UTC [pvtdatastorage] Commit -> DEBU 2424 Committing private data for block [3]" -"2019-07-20 02:40:22.910 UTC [pvtdatastorage] Commit -> DEBU 2425 Committed private data for block [3]" -"2019-07-20 02:40:22.911 UTC [kvledger] CommitWithPvtData -> DEBU 2426 [businesschannel] Committing block [3] transactions to state database" -"2019-07-20 02:40:22.911 UTC [lockbasedtxmgr] Commit -> DEBU 2427 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-07-20 02:40:22.912 UTC [lockbasedtxmgr] Commit -> DEBU 2428 Committing updates to state database" -"2019-07-20 02:40:22.912 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2429 Building the expiry schedules based on the update batch" -"2019-07-20 02:40:22.912 UTC [lockbasedtxmgr] Commit -> DEBU 242a Write lock acquired for committing updates to state database" -"2019-07-20 02:40:22.913 UTC [stateleveldb] ApplyUpdates -> DEBU 242b Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -"2019-07-20 02:40:22.914 UTC [stateleveldb] ApplyUpdates -> DEBU 242c Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -"2019-07-20 02:40:22.914 UTC [stateleveldb] ApplyUpdates -> DEBU 242d Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}]" -"2019-07-20 02:40:22.916 UTC [lockbasedtxmgr] Commit -> DEBU 242e Updates committed to state database and the write lock is released" -"2019-07-20 02:40:22.916 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 242f Preparing potential purge list working-set for expiringAtBlk [4]" -"2019-07-20 02:40:22.916 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2430 constructing new query executor txid = [3b620695-cd97-4774-aa6c-670f7a63026d]" -"2019-07-20 02:40:22.917 UTC [discovery.lifecycle] queryChaincodeDefinitions -> DEBU 2431 Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]" -"2019-07-20 02:40:22.917 UTC [stateleveldb] GetState -> DEBU 2432 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:22.917 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 2433 Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}]" -"2019-07-20 02:40:22.917 UTC [lockbasedtxmgr] Done -> DEBU 2434 Done with transaction simulation / query execution [3b620695-cd97-4774-aa6c-670f7a63026d]" -"2019-07-20 02:40:22.918 UTC [discovery.lifecycle] processPendingUpdate -> DEBU 2435 Updating channel businesschannel with [name:"exp02" version:"1.0" ]" -"2019-07-20 02:40:22.918 UTC [msp] GetDefaultSigningIdentity -> DEBU 2436 Obtaining default signing identity" -"2019-07-20 02:40:22.918 UTC [msp.identity] Sign -> DEBU 2437 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08031A0C0A0565787030321203312E30 " -"2019-07-20 02:40:22.919 UTC [msp.identity] Sign -> DEBU 2438 Sign: digest: F57E1C530C7035E35585EC6DB2FD52DEB073123D88DCDEDA3469126395DE6470 " -"2019-07-20 02:40:22.920 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 2439 Listeners for channel businesschannel invoked" -"2019-07-20 02:40:22.916 UTC [leveldbhelper] GetIterator -> DEBU 243a Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" -"2019-07-20 02:40:22.920 UTC [lockbasedtxmgr] func1 -> DEBU 243b launched the background routine for preparing keys to purge with the next block" -"2019-07-20 02:40:22.920 UTC [kvledger] CommitWithPvtData -> DEBU 243c [businesschannel] Committing block [3] transactions to history database" -"2019-07-20 02:40:22.920 UTC [historyleveldb] Commit -> DEBU 243d Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" -"2019-07-20 02:40:22.920 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 243e No expiry entry found for expiringAtBlk [4]" -"2019-07-20 02:40:22.922 UTC [historyleveldb] Commit -> DEBU 243f Channel [businesschannel]: Updates committed to history database for blockNo [3]" -"2019-07-20 02:40:22.922 UTC [kvledger] CommitWithPvtData -> INFO 2440 [businesschannel] Committed block [3] with 1 transaction(s) in 30ms (state_validation=6ms block_and_pvtdata_commit=11ms state_commit=9ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" -"2019-07-20 02:40:22.923 UTC [msp] GetDefaultSigningIdentity -> DEBU 2441 Obtaining default signing identity" -"2019-07-20 02:40:22.923 UTC [msp.identity] Sign -> DEBU 2442 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08041A0C0A0565787030321203312E30 " -"2019-07-20 02:40:22.923 UTC [msp.identity] Sign -> DEBU 2443 Sign: digest: BF89A0C215F21F47A90AE4FECE47C8598012A62D55BBCAD57DA7449BE32BD4F1 " -"2019-07-20 02:40:22.923 UTC [gossip.state] commitBlock -> DEBU 2444 [businesschannel] Committed block [3] with 1 transaction(s)" -"2019-07-20 02:40:23.929 UTC [gossip.comm] func1 -> DEBU 2445 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:23.930 UTC [gossip.gossip] handleMessage -> DEBU 2446 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:23.931 UTC [gossip.gossip] handleMessage -> DEBU 2447 Exiting" -"2019-07-20 02:40:23.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2448 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:23.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2449 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:23.933 UTC [msp] DeserializeIdentity -> DEBU 244a Obtaining identity" -"2019-07-20 02:40:23.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 244b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:23.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 244c Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:23.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 244d Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:23.936 UTC [policies] Evaluate -> DEBU 244e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:23.937 UTC [policies] Evaluate -> DEBU 244f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:23.937 UTC [policies] Evaluate -> DEBU 2450 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:23.938 UTC [cauthdsl] func1 -> DEBU 2451 0xc00049b6c0 gate 1563590423938160300 evaluation starts" -"2019-07-20 02:40:23.938 UTC [cauthdsl] func2 -> DEBU 2452 0xc00049b6c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:23.938 UTC [cauthdsl] func2 -> DEBU 2453 0xc00049b6c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 2454 0xc00049b6c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 2455 0xc00049b6c0 principal evaluation fails" -"2019-07-20 02:40:23.939 UTC [cauthdsl] func1 -> DEBU 2456 0xc00049b6c0 gate 1563590423938160300 evaluation fails" -"2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2457 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2458 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2459 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:23.939 UTC [cauthdsl] func1 -> DEBU 245a 0xc00049bf00 gate 1563590423939786700 evaluation starts" -"2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 245b 0xc00049bf00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 245c 0xc00049bf00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 245d 0xc00049bf00 principal matched by identity 0" -"2019-07-20 02:40:23.940 UTC [msp.identity] Verify -> DEBU 245e Verify: digest = 00000000 31 01 b5 67 4c 33 cb f4 36 80 ff cb e1 f9 1d 73 |1..gL3..6......s| -00000010 f9 9b 49 64 38 02 b9 2e b6 09 35 4b 89 8f 7c 6a |..Id8.....5K..|j|" -"2019-07-20 02:40:23.940 UTC [msp.identity] Verify -> DEBU 245f Verify: sig = 00000000 30 45 02 21 00 cb d8 3b 0a 47 60 c8 63 0b 30 33 |0E.!...;.G`.c.03| -00000010 ef fa 63 02 a9 3c e8 cf 92 f2 91 89 ff 4c 4d fd |..c..<.......LM.| -00000020 fe f9 12 55 7e 02 20 17 e7 93 62 80 25 1f 8c 59 |...U~. ...b.%..Y| -00000030 87 34 55 f3 9d 50 97 0c 4a 64 57 4d 7c c9 fe 03 |.4U..P..JdWM|...| -00000040 16 dd 0a 2d 86 f3 96 |...-...|" -"2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 2460 0xc00049bf00 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:23.941 UTC [cauthdsl] func1 -> DEBU 2461 0xc00049bf00 gate 1563590423939786700 evaluation succeeds" -"2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2462 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2463 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2464 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:23.942 UTC [policies] Evaluate -> DEBU 2465 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:23.942 UTC [gossip.discovery] handleAliveMessage -> DEBU 2466 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:23.942 UTC [gossip.discovery] learnExistingMembers -> DEBU 2467 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 2468 updating membership: timestamp: " -"2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 2469 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 246a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 246b Exiting" -"2019-07-20 02:40:23.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 246c Exiting" -"2019-07-20 02:40:23.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 246d Exiting" -"2019-07-20 02:40:23.944 UTC [gossip.discovery] sendMemResponse -> DEBU 246e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:23.944 UTC [msp] DeserializeIdentity -> DEBU 246f Obtaining identity" -"2019-07-20 02:40:23.945 UTC [gossip.comm] func1 -> DEBU 2470 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:23.945 UTC [gossip.gossip] handleMessage -> DEBU 2471 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:23.945 UTC [gossip.pull] HandleMessage -> DEBU 2473 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2474 Obtaining identity" -"2019-07-20 02:40:23.945 UTC [msp] DeserializeIdentity -> DEBU 2472 Obtaining identity" -"2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2475 Obtaining identity" -"2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2476 Obtaining identity" -"2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2477 Obtaining identity" -"2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2478 Obtaining identity" -"2019-07-20 02:40:23.947 UTC [msp] DeserializeIdentity -> DEBU 2479 Obtaining identity" -"2019-07-20 02:40:23.947 UTC [msp] DeserializeIdentity -> DEBU 247a Obtaining identity" -"2019-07-20 02:40:23.948 UTC [gossip.pull] SendDigest -> DEBU 247b Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:23.948 UTC [gossip.gossip] handleMessage -> DEBU 247c Exiting" -"2019-07-20 02:40:23.948 UTC [gossip.comm] Send -> DEBU 247d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:23.949 UTC [gossip.comm] sendToEndpoint -> DEBU 247e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:23.949 UTC [gossip.comm] sendToEndpoint -> DEBU 247f Exiting" -"2019-07-20 02:40:23.949 UTC [gossip.discovery] sendMemResponse -> DEBU 2480 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020$" signature:"0E\002!\000\257\335\022\013c\270\341n\001mt\250+n\274yK\260\326\331_q'Q\020\255\231\240\366$\345\313\002 w\211\033b%\224\334\0078(kTp ^<\245\315\n\230\216\375\235SS\233i\350i\252\\\270" > alive: alive: alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " -"2019-07-20 02:40:24.254 UTC [gossip.pull] Hello -> DEBU 2481 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:24.254 UTC [gossip.comm] Send -> DEBU 2482 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:24.254 UTC [gossip.pull] Hello -> DEBU 2483 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:24.254 UTC [gossip.comm] Send -> DEBU 2484 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:24.255 UTC [gossip.pull] Hello -> DEBU 2485 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:24.255 UTC [gossip.comm] Send -> DEBU 2486 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:24.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2487 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2488 Exiting" -"2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 2489 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 248a Exiting" -"2019-07-20 02:40:24.257 UTC [gossip.comm] func1 -> DEBU 248b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.258 UTC [gossip.gossip] handleMessage -> DEBU 248c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.258 UTC [gossip.pull] HandleMessage -> DEBU 248d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.258 UTC [gossip.gossip] handleMessage -> DEBU 248e Exiting" -"2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 248f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.259 UTC [gossip.comm] func1 -> DEBU 2490 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.259 UTC [gossip.gossip] handleMessage -> DEBU 2491 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.259 UTC [gossip.pull] HandleMessage -> DEBU 2492 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.260 UTC [gossip.gossip] handleMessage -> DEBU 2493 Exiting" -"2019-07-20 02:40:24.259 UTC [gossip.comm] sendToEndpoint -> DEBU 2494 Exiting" -"2019-07-20 02:40:24.262 UTC [gossip.comm] func1 -> DEBU 2495 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.262 UTC [gossip.gossip] handleMessage -> DEBU 2496 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.262 UTC [gossip.pull] HandleMessage -> DEBU 2497 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.262 UTC [gossip.gossip] handleMessage -> DEBU 2498 Exiting" -"2019-07-20 02:40:24.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 2499 Obtaining default signing identity" -"2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151021 " -"2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249b Sign: digest: 086E8AFDC0D95B46BA6F5676E9FFC6D08AB168E789B5C7D3982A0EFD3FDED97B " -"2019-07-20 02:40:24.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 249c Obtaining default signing identity" -"2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 249f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:24.296 UTC [msp] DeserializeIdentity -> DEBU 24a0 Obtaining identity" -"2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 24a1 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:24.296 UTC [msp] DeserializeIdentity -> DEBU 24a2 Obtaining identity" -"2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 24a3 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU 24a4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU 24a5 Exiting" -"2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a7 Exiting" -"2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a9 Exiting" -"2019-07-20 02:40:24.299 UTC [gossip.comm] func1 -> DEBU 24aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.299 UTC [gossip.gossip] handleMessage -> DEBU 24ab Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.300 UTC [gossip.gossip] handleMessage -> DEBU 24ac Exiting" -"2019-07-20 02:40:24.300 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.300 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24ae Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:24.301 UTC [msp.identity] Verify -> DEBU 24af Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| -00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" -"2019-07-20 02:40:24.301 UTC [msp.identity] Verify -> DEBU 24b0 Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| -00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| -00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| -00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| -00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" -"2019-07-20 02:40:24.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:24.302 UTC [gossip.discovery] isSentByMe -> DEBU 24b2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:24.303 UTC [gossip.comm] func1 -> DEBU 24b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b4 Exiting" -"2019-07-20 02:40:24.304 UTC [gossip.gossip] handleMessage -> DEBU 24b6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b7 Exiting" -"2019-07-20 02:40:24.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.303 UTC [gossip.comm] func1 -> DEBU 24b5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.305 UTC [gossip.gossip] handleMessage -> DEBU 24b9 Exiting" -"2019-07-20 02:40:24.306 UTC [gossip.gossip] handleMessage -> DEBU 24ba Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24bb Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:24.306 UTC [msp.identity] Verify -> DEBU 24bc Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| -00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" -"2019-07-20 02:40:24.307 UTC [msp.identity] Verify -> DEBU 24bd Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| -00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| -00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| -00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| -00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" -"2019-07-20 02:40:24.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 24be Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:24.307 UTC [gossip.discovery] isSentByMe -> DEBU 24bf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:24.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 24c0 Exiting" -"2019-07-20 02:40:24.308 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24c1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:24.308 UTC [msp] DeserializeIdentity -> DEBU 24c2 Obtaining identity" -"2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24c4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24c5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:24.309 UTC [cauthdsl] func1 -> DEBU 24c9 0xc00044ebf0 gate 1563590424309885400 evaluation starts" -"2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24ca 0xc00044ebf0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cb 0xc00044ebf0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cc 0xc00044ebf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cd 0xc00044ebf0 principal evaluation fails" -"2019-07-20 02:40:24.310 UTC [cauthdsl] func1 -> DEBU 24ce 0xc00044ebf0 gate 1563590424309885400 evaluation fails" -"2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24cf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:24.311 UTC [cauthdsl] func1 -> DEBU 24d2 0xc00044f580 gate 1563590424310987600 evaluation starts" -"2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d3 0xc00044f580 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d4 0xc00044f580 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d5 0xc00044f580 principal matched by identity 0" -"2019-07-20 02:40:24.311 UTC [msp.identity] Verify -> DEBU 24d6 Verify: digest = 00000000 31 01 b5 67 4c 33 cb f4 36 80 ff cb e1 f9 1d 73 |1..gL3..6......s| -00000010 f9 9b 49 64 38 02 b9 2e b6 09 35 4b 89 8f 7c 6a |..Id8.....5K..|j|" -"2019-07-20 02:40:24.311 UTC [msp.identity] Verify -> DEBU 24d7 Verify: sig = 00000000 30 45 02 21 00 cb d8 3b 0a 47 60 c8 63 0b 30 33 |0E.!...;.G`.c.03| -00000010 ef fa 63 02 a9 3c e8 cf 92 f2 91 89 ff 4c 4d fd |..c..<.......LM.| -00000020 fe f9 12 55 7e 02 20 17 e7 93 62 80 25 1f 8c 59 |...U~. ...b.%..Y| -00000030 87 34 55 f3 9d 50 97 0c 4a 64 57 4d 7c c9 fe 03 |.4U..P..JdWM|...| -00000040 16 dd 0a 2d 86 f3 96 |...-...|" -"2019-07-20 02:40:24.312 UTC [cauthdsl] func2 -> DEBU 24d8 0xc00044f580 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.312 UTC [cauthdsl] func1 -> DEBU 24d9 0xc00044f580 gate 1563590424310987600 evaluation succeeds" -"2019-07-20 02:40:24.312 UTC [policies] Evaluate -> DEBU 24da Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24dc Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:24.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 24de Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:24.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 24df Exiting" -"2019-07-20 02:40:24.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24e0 Exiting" -"2019-07-20 02:40:24.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24e1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24e2 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:24.314 UTC [gossip.gossip] handleMessage -> DEBU 24e3 Exiting" -"2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e4 Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| -00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" -"2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e5 Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| -00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| -00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| -00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| -00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" -"2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e7 Verify: sig = 00000000 30 44 02 20 0e 9c 8d a2 0e f2 2a e5 9b b6 17 d3 |0D. ......*.....| -00000010 ac 3a c0 37 a4 0a 51 12 b7 f2 a7 78 69 65 16 5d |.:.7..Q....xie.]| -00000020 22 16 c0 19 02 20 74 42 a4 00 5d 04 90 54 fb b3 |".... tB..]..T..| -00000030 18 89 61 bb 4b a0 27 eb c0 7a 18 20 6b a9 6e 5b |..a.K.'..z. k.n[| -00000040 76 47 a5 81 e4 57 |vG...W|" -"2019-07-20 02:40:24.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 24e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:24.316 UTC [gossip.discovery] isSentByMe -> DEBU 24e9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:24.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 24ea Exiting" -"2019-07-20 02:40:24.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24eb Exiting" -"2019-07-20 02:40:24.369 UTC [gossip.comm] func1 -> DEBU 24ec Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.369 UTC [gossip.gossip] handleMessage -> DEBU 24ed Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.369 UTC [gossip.pull] HandleMessage -> DEBU 24ee GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.370 UTC [gossip.pull] SendDigest -> DEBU 24ef Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:24.370 UTC [gossip.gossip] handleMessage -> DEBU 24f0 Exiting" -"2019-07-20 02:40:24.374 UTC [gossip.comm] func1 -> DEBU 24f1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.374 UTC [gossip.gossip] handleMessage -> DEBU 24f2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.374 UTC [gossip.gossip] handleMessage -> DEBU 24f3 Exiting" -"2019-07-20 02:40:24.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24f4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.375 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24f5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:24.375 UTC [msp.identity] Verify -> DEBU 24f6 Verify: digest = 00000000 f7 db 21 ce dd da b6 c7 68 b1 be dc 17 69 4a 9b |..!.....h....iJ.| -00000010 4e 1c 08 d7 64 40 fd 34 71 bb af 05 ca b4 96 37 |N...d@.4q......7|" -"2019-07-20 02:40:24.375 UTC [msp.identity] Verify -> DEBU 24f7 Verify: sig = 00000000 30 45 02 21 00 a9 5d 61 2b f5 ac c6 63 89 4e fb |0E.!..]a+...c.N.| -00000010 6d 08 85 da 52 55 17 cc 93 8d 2f 40 5a 31 27 6f |m...RU..../@Z1'o| -00000020 60 28 81 78 28 02 20 34 05 05 23 bd 08 70 b9 c6 |`(.x(. 4..#..p..| -00000030 14 de 52 b0 16 16 d2 21 c8 66 04 9a 5e 48 b1 6b |..R....!.f..^H.k| -00000040 f9 63 98 57 62 85 db |.c.Wb..|" -"2019-07-20 02:40:24.376 UTC [msp.identity] Verify -> DEBU 24f8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-09-24 00:25:04.960 UTC [msp] Validate -> DEBU 6a7 MSP Org2MSP validating identity" +"2019-09-24 00:25:04.960 UTC [msp] getCertificationChain -> DEBU 6a8 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.960 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:04.960 UTC [msp] DeserializeIdentity -> DEBU 6aa Obtaining identity" +"2019-09-24 00:25:04.960 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6ab Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:04.961 UTC [msp] DeserializeIdentity -> DEBU 6ac Obtaining identity" +"2019-09-24 00:25:04.961 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6ad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:04.961 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ae Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.961 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6af Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.961 UTC [policies] Evaluate -> DEBU 6b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:04.961 UTC [policies] Evaluate -> DEBU 6b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.961 UTC [policies] Evaluate -> DEBU 6b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:04.961 UTC [cauthdsl] func1 -> DEBU 6b3 0xc003750ea0 gate 1569284704961831900 evaluation starts" +"2019-09-24 00:25:04.961 UTC [cauthdsl] func2 -> DEBU 6b4 0xc003750ea0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.961 UTC [cauthdsl] func2 -> DEBU 6b5 0xc003750ea0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:04.962 UTC [cauthdsl] func2 -> DEBU 6b6 0xc003750ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:04.962 UTC [cauthdsl] func2 -> DEBU 6b7 0xc003750ea0 principal evaluation fails" +"2019-09-24 00:25:04.962 UTC [cauthdsl] func1 -> DEBU 6b8 0xc003750ea0 gate 1569284704961831900 evaluation fails" +"2019-09-24 00:25:04.962 UTC [policies] Evaluate -> DEBU 6b9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.962 UTC [policies] Evaluate -> DEBU 6ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.962 UTC [policies] Evaluate -> DEBU 6bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:04.962 UTC [cauthdsl] func1 -> DEBU 6bc 0xc003751700 gate 1569284704962661900 evaluation starts" +"2019-09-24 00:25:04.962 UTC [cauthdsl] func2 -> DEBU 6bd 0xc003751700 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.962 UTC [cauthdsl] func2 -> DEBU 6be 0xc003751700 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:04.962 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6bf Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:25:04.962 UTC [msp] Validate -> DEBU 6c0 MSP Org2MSP validating identity" +"2019-09-24 00:25:04.963 UTC [msp] getCertificationChain -> DEBU 6c1 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.964 UTC [msp] Validate -> DEBU 6c2 MSP Org2MSP validating identity" +"2019-09-24 00:25:04.964 UTC [msp] getCertificationChain -> DEBU 6c3 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.964 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:04.964 UTC [msp] DeserializeIdentity -> DEBU 6c5 Obtaining identity" +"2019-09-24 00:25:04.965 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:04.965 UTC [msp] DeserializeIdentity -> DEBU 6c7 Obtaining identity" +"2019-09-24 00:25:04.965 UTC [msp] DeserializeIdentity -> DEBU 6c8 Obtaining identity" +"2019-09-24 00:25:04.965 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:04.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ca Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6cb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.965 UTC [policies] Evaluate -> DEBU 6cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:04.965 UTC [policies] Evaluate -> DEBU 6cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.965 UTC [policies] Evaluate -> DEBU 6ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:04.965 UTC [cauthdsl] func1 -> DEBU 6cf 0xc00376acc0 gate 1569284704965670900 evaluation starts" +"2019-09-24 00:25:04.965 UTC [cauthdsl] func2 -> DEBU 6d0 0xc00376acc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.965 UTC [cauthdsl] func2 -> DEBU 6d1 0xc00376acc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:04.965 UTC [cauthdsl] func2 -> DEBU 6d2 0xc00376acc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:04.965 UTC [cauthdsl] func2 -> DEBU 6d3 0xc00376acc0 principal evaluation fails" +"2019-09-24 00:25:04.965 UTC [cauthdsl] func1 -> DEBU 6d4 0xc00376acc0 gate 1569284704965670900 evaluation fails" +"2019-09-24 00:25:04.965 UTC [policies] Evaluate -> DEBU 6d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.965 UTC [policies] Evaluate -> DEBU 6d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.966 UTC [policies] Evaluate -> DEBU 6d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:04.966 UTC [cauthdsl] func1 -> DEBU 6d8 0xc00376b520 gate 1569284704966040700 evaluation starts" +"2019-09-24 00:25:04.967 UTC [cauthdsl] func2 -> DEBU 6d9 0xc003751700 principal matched by identity 0" +"2019-09-24 00:25:04.967 UTC [msp.identity] Verify -> DEBU 6da Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-09-24 00:25:04.967 UTC [msp.identity] Verify -> DEBU 6db Verify: sig = 00000000 30 45 02 21 00 ae 94 88 79 8d 53 02 79 7f 9e d0 |0E.!....y.S.y...| +00000010 54 de 49 d0 be a8 eb b0 40 81 a3 32 8b 12 bf 48 |T.I.....@..2...H| +00000020 16 9b ef 84 4d 02 20 43 51 d8 f5 8b be 21 33 05 |....M. CQ....!3.| +00000030 e8 4a 21 04 3e b1 cc 6a bd 8a 94 f9 31 6c 74 b6 |.J!.>..j....1lt.| +00000040 2c 42 94 b6 08 b1 39 |,B....9|" +"2019-09-24 00:25:04.969 UTC [cauthdsl] func2 -> DEBU 6dc 0xc003751700 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.983 UTC [cauthdsl] func1 -> DEBU 6df 0xc003751700 gate 1569284704962661900 evaluation succeeds" +"2019-09-24 00:25:04.983 UTC [policies] Evaluate -> DEBU 6e0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.983 UTC [policies] Evaluate -> DEBU 6e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.983 UTC [policies] Evaluate -> DEBU 6e2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:04.983 UTC [policies] Evaluate -> DEBU 6e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:04.984 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6e4 Authenticated 172.18.0.8:34556" +"2019-09-24 00:25:04.984 UTC [gossip.comm] GossipStream -> DEBU 6e5 Servicing 172.18.0.8:34556" +"2019-09-24 00:25:04.970 UTC [pvtdatastorage] Commit -> DEBU 6dd Committed private data for block [1]" +"2019-09-24 00:25:04.984 UTC [kvledger] CommitWithPvtData -> DEBU 6e6 [businesschannel] Committing block [1] transactions to state database" +"2019-09-24 00:25:04.984 UTC [lockbasedtxmgr] Commit -> DEBU 6e7 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 00:25:04.984 UTC [lockbasedtxmgr] Commit -> DEBU 6e8 Committing updates to state database" +"2019-09-24 00:25:04.984 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 6e9 Building the expiry schedules based on the update batch" +"2019-09-24 00:25:04.984 UTC [lockbasedtxmgr] Commit -> DEBU 6ea Write lock acquired for committing updates to state database" +"2019-09-24 00:25:04.984 UTC [stateleveldb] ApplyUpdates -> DEBU 6eb Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-09-24 00:25:04.966 UTC [cauthdsl] func2 -> DEBU 6ec 0xc00376b520 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.985 UTC [cauthdsl] func2 -> DEBU 6ed 0xc00376b520 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:04.985 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6ee Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:25:04.986 UTC [msp] Validate -> DEBU 6ef MSP Org2MSP validating identity" +"2019-09-24 00:25:04.986 UTC [msp] getCertificationChain -> DEBU 6f0 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:04.986 UTC [cauthdsl] func2 -> DEBU 6f1 0xc00376b520 principal matched by identity 0" +"2019-09-24 00:25:04.986 UTC [msp.identity] Verify -> DEBU 6f2 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-09-24 00:25:04.986 UTC [msp.identity] Verify -> DEBU 6f3 Verify: sig = 00000000 30 44 02 20 47 8c 36 ca 53 83 cf a3 33 d2 4c 83 |0D. G.6.S...3.L.| +00000010 0c fb 79 02 14 21 4e 4b 05 f7 1b c6 e7 96 06 46 |..y..!NK.......F| +00000020 2d 0a 93 a2 02 20 2a 5a 18 c5 50 6d d8 ac 61 ea |-.... *Z..Pm..a.| +00000030 c0 7a b3 43 c6 03 d4 e0 1d 45 a0 5e ef 1d fe 8d |.z.C.....E.^....| +00000040 50 c4 cc cc 07 f7 |P.....|" +"2019-09-24 00:25:04.987 UTC [cauthdsl] func2 -> DEBU 6f4 0xc00376b520 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.987 UTC [cauthdsl] func1 -> DEBU 6f5 0xc00376b520 gate 1569284704966040700 evaluation succeeds" +"2019-09-24 00:25:04.987 UTC [policies] Evaluate -> DEBU 6f6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.987 UTC [policies] Evaluate -> DEBU 6f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.987 UTC [policies] Evaluate -> DEBU 6f8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:04.987 UTC [policies] Evaluate -> DEBU 6f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:04.987 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6fa Authenticated 172.18.0.6:43240" +"2019-09-24 00:25:04.987 UTC [gossip.comm] GossipStream -> DEBU 6fb Servicing 172.18.0.6:43240" +"2019-09-24 00:25:04.971 UTC [grpc] infof -> DEBU 6de transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:04.988 UTC [gossip.gossip] handleMessage -> DEBU 6fc Entering, 172.18.0.8:34556 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:3722998364390887568 tag:EMPTY mem_req: > , Envelope: 174 bytes, Signature: 0 bytes" +"2019-09-24 00:25:04.988 UTC [gossip.gossip] handleMessage -> DEBU 6fd Exiting" +"2019-09-24 00:25:04.990 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6fe Got message: GossipMessage: nonce:3722998364390887568 tag:EMPTY mem_req: > , Envelope: 174 bytes, Signature: 0 bytes" +"2019-09-24 00:25:04.990 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6ff Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:04.990 UTC [msp] DeserializeIdentity -> DEBU 700 Obtaining identity" +"2019-09-24 00:25:04.991 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 701 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:04.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 702 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 703 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:04.991 UTC [policies] Evaluate -> DEBU 704 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:04.991 UTC [policies] Evaluate -> DEBU 705 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:04.991 UTC [policies] Evaluate -> DEBU 706 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:04.991 UTC [cauthdsl] func1 -> DEBU 707 0xc0037a6120 gate 1569284704991676900 evaluation starts" +"2019-09-24 00:25:04.991 UTC [cauthdsl] func2 -> DEBU 708 0xc0037a6120 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.991 UTC [cauthdsl] func2 -> DEBU 709 0xc0037a6120 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:04.991 UTC [cauthdsl] func2 -> DEBU 70a 0xc0037a6120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:04.991 UTC [cauthdsl] func2 -> DEBU 70b 0xc0037a6120 principal evaluation fails" +"2019-09-24 00:25:04.991 UTC [cauthdsl] func1 -> DEBU 70c 0xc0037a6120 gate 1569284704991676900 evaluation fails" +"2019-09-24 00:25:04.992 UTC [policies] Evaluate -> DEBU 70d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.992 UTC [policies] Evaluate -> DEBU 70e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:04.992 UTC [policies] Evaluate -> DEBU 70f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:04.992 UTC [cauthdsl] func1 -> DEBU 710 0xc0037a6960 gate 1569284704992229600 evaluation starts" +"2019-09-24 00:25:04.992 UTC [cauthdsl] func2 -> DEBU 711 0xc0037a6960 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:04.992 UTC [cauthdsl] func2 -> DEBU 712 0xc0037a6960 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:04.992 UTC [cauthdsl] func2 -> DEBU 713 0xc0037a6960 principal matched by identity 0" +"2019-09-24 00:25:04.992 UTC [msp.identity] Verify -> DEBU 714 Verify: digest = 00000000 ad 71 e5 07 a7 d3 54 5c e3 46 88 c6 43 71 8e 8e |.q....T\.F..Cq..| +00000010 48 a5 4c df 49 58 c6 2c 49 ba ed 33 41 27 88 05 |H.L.IX.,I..3A'..|" +"2019-09-24 00:25:04.992 UTC [msp.identity] Verify -> DEBU 715 Verify: sig = 00000000 30 43 02 20 17 e0 35 8d 31 b2 0a 34 30 4d ee 0d |0C. ..5.1..40M..| +00000010 e8 1f 68 ee a4 5a 84 f4 bf 90 65 df a8 3c 7e e3 |..h..Z....e..<~.| +00000020 30 aa 4c 00 02 1f 26 49 f9 2c 6e 70 bd a0 7d 38 |0.L...&I.,np..}8| +00000030 de 0d d1 8d c4 35 1e 6a 41 f3 d9 82 69 99 ed 88 |.....5.jA...i...| +00000040 bc e1 a8 ea 70 |....p|" +"2019-09-24 00:25:04.992 UTC [cauthdsl] func2 -> DEBU 716 0xc0037a6960 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:04.992 UTC [cauthdsl] func1 -> DEBU 717 0xc0037a6960 gate 1569284704992229600 evaluation succeeds" +"2019-09-24 00:25:04.992 UTC [policies] Evaluate -> DEBU 718 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.993 UTC [policies] Evaluate -> DEBU 719 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:04.993 UTC [policies] Evaluate -> DEBU 71a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:04.993 UTC [policies] Evaluate -> DEBU 71b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:04.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 71c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" +"2019-09-24 00:25:04.993 UTC [gossip.discovery] learnNewMembers -> DEBU 71d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes]}, deadMembers={[]}" +"2019-09-24 00:25:04.993 UTC [gossip.discovery] learnNewMembers -> DEBU 71e Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" +"2019-09-24 00:25:04.993 UTC [gossip.discovery] learnNewMembers -> DEBU 71f Exiting" +"2019-09-24 00:25:04.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 720 Exiting" +"2019-09-24 00:25:04.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 721 Exiting" +"2019-09-24 00:25:04.993 UTC [gossip.discovery] sendMemResponse -> DEBU 722 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:04.993 UTC [msp] DeserializeIdentity -> DEBU 723 Obtaining identity" +"2019-09-24 00:25:04.993 UTC [msp] DeserializeIdentity -> DEBU 724 Obtaining identity" +"2019-09-24 00:25:04.994 UTC [gossip.comm] Send -> DEBU 725 Entering, sending GossipMessage: Channel: , nonce: 3722998364390887568, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 495 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:04.994 UTC [gossip.discovery] sendMemResponse -> DEBU 726 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\016" signature:"0E\002!\000\355\335\025g\304\230 \352\323\330\327\037\346\264\344Y\302\270p\207\353\375]d\332\2359+M\221b\330\002 #\036\023\201\3236V\377\344&Y0\275\032CU\275\035\223'\2661\311\235\225\004\316\026r\333\242\212" > alive: alive: " +"2019-09-24 00:25:04.994 UTC [gossip.comm] sendToEndpoint -> DEBU 727 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3722998364390887568, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 495 bytes, Signature: 0 bytes" +"2019-09-24 00:25:04.994 UTC [gossip.comm] sendToEndpoint -> DEBU 728 Exiting" +"2019-09-24 00:25:05.000 UTC [gossip.comm] func2 -> DEBU 729 Client 172.18.0.6:43240 disconnected" +"2019-09-24 00:25:05.000 UTC [comm.grpc.server] 1 -> INFO 72a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:14.943Z grpc.peer_address=172.18.0.6:43240 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=57.461ms +"2019-09-24 00:25:05.001 UTC [gossip.comm] writeToStream -> DEBU 72b Closing writing to stream" +"2019-09-24 00:25:04.994 UTC [gossip.comm] readFromStream -> DEBU 72c Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:25:05.015 UTC [lockbasedtxmgr] Commit -> DEBU 72d Updates committed to state database and the write lock is released" +"2019-09-24 00:25:05.015 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 72e Preparing potential purge list working-set for expiringAtBlk [2]" +"2019-09-24 00:25:05.015 UTC [leveldbhelper] GetIterator -> DEBU 72f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" +"2019-09-24 00:25:05.015 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 730 No expiry entry found for expiringAtBlk [2]" +"2019-09-24 00:25:05.015 UTC [lockbasedtxmgr] func1 -> DEBU 731 launched the background routine for preparing keys to purge with the next block" +"2019-09-24 00:25:05.016 UTC [kvledger] CommitWithPvtData -> DEBU 732 [businesschannel] Committing block [1] transactions to history database" +"2019-09-24 00:25:05.016 UTC [historyleveldb] Commit -> DEBU 733 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" +"2019-09-24 00:25:05.016 UTC [historyleveldb] Commit -> DEBU 734 Skipping transaction [0] since it is not an endorsement transaction" +"2019-09-24 00:25:05.022 UTC [historyleveldb] Commit -> DEBU 735 Channel [businesschannel]: Updates committed to history database for blockNo [1]" +"2019-09-24 00:25:05.022 UTC [kvledger] CommitWithPvtData -> INFO 736 [businesschannel] Committed block [1] with 1 transaction(s) in 124ms (state_validation=2ms block_and_pvtdata_commit=83ms state_commit=31ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +"2019-09-24 00:25:05.022 UTC [msp] GetDefaultSigningIdentity -> DEBU 737 Obtaining default signing identity" +"2019-09-24 00:25:05.022 UTC [msp.identity] Sign -> DEBU 738 Sign: plaintext: 18057A5E1214089096D4ACDE83CEE315...624D0F542C442AB5FE8C65C22A020802 " +"2019-09-24 00:25:05.022 UTC [msp.identity] Sign -> DEBU 739 Sign: digest: 605931849C5B801A041D2CA71F4590E1CBC19ABACD7587840BE76C1F2C4D9524 " +"2019-09-24 00:25:05.022 UTC [gossip.state] commitBlock -> DEBU 73a [businesschannel] Committed block [1] with 1 transaction(s)" +"2019-09-24 00:25:05.043 UTC [comm.grpc.server] 1 -> INFO 73b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:07.043Z grpc.peer_address=172.18.0.6:43244 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=156µs +"2019-09-24 00:25:05.046 UTC [msp] GetDefaultSigningIdentity -> DEBU 73c Obtaining default signing identity" +"2019-09-24 00:25:05.046 UTC [msp.identity] Sign -> DEBU 73d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:05.046 UTC [msp.identity] Sign -> DEBU 73e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:05.046 UTC [gossip.comm] authenticateRemotePeer -> DEBU 73f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:43244" +"2019-09-24 00:25:05.047 UTC [gossip.comm] authenticateRemotePeer -> DEBU 740 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:43244" +"2019-09-24 00:25:05.047 UTC [msp] DeserializeIdentity -> DEBU 741 Obtaining identity" +"2019-09-24 00:25:05.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 742 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:05.047 UTC [msp] DeserializeIdentity -> DEBU 743 Obtaining identity" +"2019-09-24 00:25:05.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 744 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:05.047 UTC [msp] DeserializeIdentity -> DEBU 745 Obtaining identity" +"2019-09-24 00:25:05.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 746 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:05.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 747 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:05.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 748 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:05.047 UTC [policies] Evaluate -> DEBU 749 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:05.048 UTC [policies] Evaluate -> DEBU 74a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:05.048 UTC [policies] Evaluate -> DEBU 74b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:05.048 UTC [cauthdsl] func1 -> DEBU 74c 0xc00381e2c0 gate 1569284705048129800 evaluation starts" +"2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 74d 0xc00381e2c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 74e 0xc00381e2c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 74f 0xc00381e2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 750 0xc00381e2c0 principal evaluation fails" +"2019-09-24 00:25:05.048 UTC [cauthdsl] func1 -> DEBU 751 0xc00381e2c0 gate 1569284705048129800 evaluation fails" +"2019-09-24 00:25:05.048 UTC [policies] Evaluate -> DEBU 752 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:05.048 UTC [policies] Evaluate -> DEBU 753 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:05.048 UTC [policies] Evaluate -> DEBU 754 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:05.048 UTC [cauthdsl] func1 -> DEBU 755 0xc00381eb00 gate 1569284705048532800 evaluation starts" +"2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 756 0xc00381eb00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:05.048 UTC [cauthdsl] func2 -> DEBU 757 0xc00381eb00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:05.049 UTC [cauthdsl] func2 -> DEBU 758 0xc00381eb00 principal matched by identity 0" +"2019-09-24 00:25:05.049 UTC [msp.identity] Verify -> DEBU 759 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-09-24 00:25:05.049 UTC [msp.identity] Verify -> DEBU 75a Verify: sig = 00000000 30 45 02 21 00 9b b1 f8 1f 47 2e 92 0f 69 51 51 |0E.!.....G...iQQ| +00000010 c7 f5 25 e4 a0 74 39 f3 3e a7 72 2e 92 77 1a 53 |..%..t9.>.r..w.S| +00000020 69 d7 33 21 73 02 20 72 46 a1 ae 0a b0 cf 58 e3 |i.3!s. rF.....X.| +00000030 8c 9d 5e c3 99 b9 2c 3c 20 74 5c ba ed e7 c7 16 |..^...,< t\.....| +00000040 60 b3 a2 c6 1c 90 e0 |`......|" +"2019-09-24 00:25:05.049 UTC [cauthdsl] func2 -> DEBU 75b 0xc00381eb00 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:05.049 UTC [cauthdsl] func1 -> DEBU 75c 0xc00381eb00 gate 1569284705048532800 evaluation succeeds" +"2019-09-24 00:25:05.049 UTC [policies] Evaluate -> DEBU 75d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:05.049 UTC [policies] Evaluate -> DEBU 75e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:05.049 UTC [policies] Evaluate -> DEBU 75f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:05.064 UTC [policies] Evaluate -> DEBU 760 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:05.064 UTC [gossip.comm] authenticateRemotePeer -> DEBU 761 Authenticated 172.18.0.6:43244" +"2019-09-24 00:25:05.064 UTC [gossip.comm] GossipStream -> DEBU 762 Servicing 172.18.0.6:43244" +"2019-09-24 00:25:05.065 UTC [gossip.gossip] handleMessage -> DEBU 763 Entering, 172.18.0.6:43244 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:1569254619026009100 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +"2019-09-24 00:25:05.065 UTC [gossip.gossip] handleMessage -> DEBU 764 Exiting" +"2019-09-24 00:25:05.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 765 Got message: GossipMessage: nonce:1569254619026009100 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +"2019-09-24 00:25:05.065 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 766 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:05.065 UTC [msp] DeserializeIdentity -> DEBU 767 Obtaining identity" +"2019-09-24 00:25:05.070 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 768 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:05.070 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 769 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:05.070 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 76a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:05.070 UTC [policies] Evaluate -> DEBU 76b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:05.070 UTC [policies] Evaluate -> DEBU 76c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:05.070 UTC [policies] Evaluate -> DEBU 76d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:05.070 UTC [cauthdsl] func1 -> DEBU 76e 0xc0038347e0 gate 1569284705070842700 evaluation starts" +"2019-09-24 00:25:05.070 UTC [cauthdsl] func2 -> DEBU 76f 0xc0038347e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:05.070 UTC [cauthdsl] func2 -> DEBU 770 0xc0038347e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:05.071 UTC [cauthdsl] func2 -> DEBU 771 0xc0038347e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:05.071 UTC [cauthdsl] func2 -> DEBU 772 0xc0038347e0 principal evaluation fails" +"2019-09-24 00:25:05.071 UTC [cauthdsl] func1 -> DEBU 773 0xc0038347e0 gate 1569284705070842700 evaluation fails" +"2019-09-24 00:25:05.071 UTC [policies] Evaluate -> DEBU 774 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:05.071 UTC [policies] Evaluate -> DEBU 775 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:05.071 UTC [policies] Evaluate -> DEBU 776 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:05.071 UTC [cauthdsl] func1 -> DEBU 777 0xc003835020 gate 1569284705071395100 evaluation starts" +"2019-09-24 00:25:05.071 UTC [cauthdsl] func2 -> DEBU 778 0xc003835020 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:05.071 UTC [cauthdsl] func2 -> DEBU 779 0xc003835020 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:05.071 UTC [cauthdsl] func2 -> DEBU 77a 0xc003835020 principal matched by identity 0" +"2019-09-24 00:25:05.071 UTC [msp.identity] Verify -> DEBU 77b Verify: digest = 00000000 0c 55 88 a7 a2 70 4b 57 b5 be e8 6d d3 36 8d c2 |.U...pKW...m.6..| +00000010 8c cc 57 99 9e 38 5d 46 ee c8 b4 a8 bd 5d 11 e5 |..W..8]F.....]..|" +"2019-09-24 00:25:05.071 UTC [msp.identity] Verify -> DEBU 77c Verify: sig = 00000000 30 44 02 20 16 bb 38 80 e7 44 7a 22 f1 4b 2f ee |0D. ..8..Dz".K/.| +00000010 11 21 28 e2 60 0c 2b 72 7a c6 89 ec de 14 ed ea |.!(.`.+rz.......| +00000020 7f c9 63 fc 02 20 4c c8 cf 93 c1 0d 93 bc 5f a2 |..c.. L......._.| +00000030 9a 20 80 d7 33 33 44 98 23 31 e8 b3 96 0e 7d 5d |. ..33D.#1....}]| +00000040 3f d9 f0 80 bb 01 |?.....|" +"2019-09-24 00:25:05.072 UTC [cauthdsl] func2 -> DEBU 77d 0xc003835020 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:05.072 UTC [cauthdsl] func1 -> DEBU 77e 0xc003835020 gate 1569284705071395100 evaluation succeeds" +"2019-09-24 00:25:05.072 UTC [policies] Evaluate -> DEBU 77f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:05.072 UTC [policies] Evaluate -> DEBU 780 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:05.072 UTC [policies] Evaluate -> DEBU 781 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:05.072 UTC [policies] Evaluate -> DEBU 782 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:05.072 UTC [gossip.discovery] handleAliveMessage -> DEBU 783 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:05.072 UTC [gossip.discovery] learnNewMembers -> DEBU 784 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +"2019-09-24 00:25:05.072 UTC [gossip.discovery] learnNewMembers -> DEBU 785 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:05.072 UTC [gossip.discovery] learnNewMembers -> DEBU 786 Exiting" +"2019-09-24 00:25:05.072 UTC [gossip.discovery] handleAliveMessage -> DEBU 787 Exiting" +"2019-09-24 00:25:05.072 UTC [gossip.discovery] handleMsgFromComm -> DEBU 788 Exiting" +"2019-09-24 00:25:05.072 UTC [gossip.discovery] sendMemResponse -> DEBU 789 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:05.072 UTC [msp] DeserializeIdentity -> DEBU 78a Obtaining identity" +"2019-09-24 00:25:05.073 UTC [msp] DeserializeIdentity -> DEBU 78b Obtaining identity" +"2019-09-24 00:25:05.073 UTC [msp] DeserializeIdentity -> DEBU 78c Obtaining identity" +"2019-09-24 00:25:05.073 UTC [gossip.comm] Send -> DEBU 78d Entering, sending GossipMessage: Channel: , nonce: 1569254619026009100, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:05.073 UTC [gossip.discovery] sendMemResponse -> DEBU 78e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\016" signature:"0E\002!\000\355\335\025g\304\230 \352\323\330\327\037\346\264\344Y\302\270p\207\353\375]d\332\2359+M\221b\330\002 #\036\023\201\3236V\377\344&Y0\275\032CU\275\035\223'\2661\311\235\225\004\316\026r\333\242\212" > alive: alive: alive: " +"2019-09-24 00:25:05.073 UTC [gossip.comm] sendToEndpoint -> DEBU 78f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1569254619026009100, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes" +"2019-09-24 00:25:05.073 UTC [gossip.comm] sendToEndpoint -> DEBU 790 Exiting" +"2019-09-24 00:25:05.211 UTC [gossip.gossip] handleMessage -> DEBU 791 Entering, 172.18.0.6:43244 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:05.211 UTC [msp] DeserializeIdentity -> DEBU 792 Obtaining identity" +"2019-09-24 00:25:05.211 UTC [gossip.gossip] handleMessage -> DEBU 793 Exiting" +"2019-09-24 00:25:05.218 UTC [gossip.gossip] handleMessage -> DEBU 794 Entering, 172.18.0.6:43244 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 00:25:05.218 UTC [msp] DeserializeIdentity -> DEBU 795 Obtaining identity" +"2019-09-24 00:25:05.218 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 796 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:05.218 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 797 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:05.219 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 798 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 799 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 79a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 79b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:05.219 UTC [cauthdsl] func1 -> DEBU 79c 0xc0037fbb10 gate 1569284705219202300 evaluation starts" +"2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 79d 0xc0037fbb10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 79e 0xc0037fbb10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 79f 0xc0037fbb10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 7a0 0xc0037fbb10 principal evaluation fails" +"2019-09-24 00:25:05.219 UTC [cauthdsl] func1 -> DEBU 7a1 0xc0037fbb10 gate 1569284705219202300 evaluation fails" +"2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 7a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 7a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:05.219 UTC [policies] Evaluate -> DEBU 7a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:05.219 UTC [cauthdsl] func1 -> DEBU 7a5 0xc003864350 gate 1569284705219793900 evaluation starts" +"2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 7a6 0xc003864350 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 7a7 0xc003864350 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:05.219 UTC [cauthdsl] func2 -> DEBU 7a8 0xc003864350 principal matched by identity 0" +"2019-09-24 00:25:05.219 UTC [msp.identity] Verify -> DEBU 7a9 Verify: digest = 00000000 8c 64 c2 57 71 bd 4e 49 a7 31 6f ab 28 9e 18 d2 |.d.Wq.NI.1o.(...| +00000010 06 d1 b5 0f ad 29 54 78 1c 78 c0 ee fd c4 2a f0 |.....)Tx.x....*.|" +"2019-09-24 00:25:05.220 UTC [msp.identity] Verify -> DEBU 7aa Verify: sig = 00000000 30 44 02 20 55 e6 9d 11 11 3c 57 86 20 a6 39 ad |0D. U.... DEBU 7ab 0xc003864350 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:05.220 UTC [cauthdsl] func1 -> DEBU 7ac 0xc003864350 gate 1569284705219793900 evaluation succeeds" +"2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7af Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:05.220 UTC [msp] DeserializeIdentity -> DEBU 7b1 Obtaining identity" +"2019-09-24 00:25:05.220 UTC [msp] DeserializeIdentity -> DEBU 7b2 Obtaining identity" +"2019-09-24 00:25:05.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:05.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:05.220 UTC [policies] Evaluate -> DEBU 7b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:05.221 UTC [cauthdsl] func1 -> DEBU 7b8 0xc003865530 gate 1569284705221019900 evaluation starts" +"2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7b9 0xc003865530 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7ba 0xc003865530 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7bb 0xc003865530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7bc 0xc003865530 principal evaluation fails" +"2019-09-24 00:25:05.221 UTC [cauthdsl] func1 -> DEBU 7bd 0xc003865530 gate 1569284705221019900 evaluation fails" +"2019-09-24 00:25:05.221 UTC [policies] Evaluate -> DEBU 7be Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:05.221 UTC [policies] Evaluate -> DEBU 7bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:05.221 UTC [policies] Evaluate -> DEBU 7c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:05.221 UTC [cauthdsl] func1 -> DEBU 7c1 0xc003865d70 gate 1569284705221520000 evaluation starts" +"2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7c2 0xc003865d70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7c3 0xc003865d70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:05.221 UTC [cauthdsl] func2 -> DEBU 7c4 0xc003865d70 principal matched by identity 0" +"2019-09-24 00:25:05.221 UTC [msp.identity] Verify -> DEBU 7c5 Verify: digest = 00000000 8c 64 c2 57 71 bd 4e 49 a7 31 6f ab 28 9e 18 d2 |.d.Wq.NI.1o.(...| +00000010 06 d1 b5 0f ad 29 54 78 1c 78 c0 ee fd c4 2a f0 |.....)Tx.x....*.|" +"2019-09-24 00:25:05.221 UTC [msp.identity] Verify -> DEBU 7c6 Verify: sig = 00000000 30 44 02 20 55 e6 9d 11 11 3c 57 86 20 a6 39 ad |0D. U.... DEBU 7c7 0xc003865d70 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:05.222 UTC [cauthdsl] func1 -> DEBU 7c8 0xc003865d70 gate 1569284705221520000 evaluation succeeds" +"2019-09-24 00:25:05.222 UTC [policies] Evaluate -> DEBU 7c9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:05.222 UTC [policies] Evaluate -> DEBU 7ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:05.222 UTC [policies] Evaluate -> DEBU 7cb Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:05.222 UTC [policies] Evaluate -> DEBU 7cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:05.222 UTC [gossip.gossip] handleMessage -> DEBU 7cd Exiting" +"2019-09-24 00:25:05.227 UTC [msp] DeserializeIdentity -> DEBU 7ce Obtaining identity" +"2019-09-24 00:25:05.227 UTC [msp] DeserializeIdentity -> DEBU 7cf Obtaining identity" +"2019-09-24 00:25:05.227 UTC [gossip.comm] Send -> DEBU 7d0 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" +"2019-09-24 00:25:05.227 UTC [msp] DeserializeIdentity -> DEBU 7d1 Obtaining identity" +"2019-09-24 00:25:05.227 UTC [msp] DeserializeIdentity -> DEBU 7d2 Obtaining identity" +"2019-09-24 00:25:05.227 UTC [gossip.comm] sendToEndpoint -> DEBU 7d3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 00:25:05.227 UTC [gossip.comm] createConnection -> DEBU 7d4 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:05.228 UTC [gossip.comm] sendToEndpoint -> DEBU 7d5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 00:25:05.228 UTC [gossip.comm] sendToEndpoint -> DEBU 7d6 Exiting" +"2019-09-24 00:25:05.230 UTC [grpc] DialContext -> DEBU 7d7 parsed scheme: """ +"2019-09-24 00:25:05.230 UTC [grpc] DialContext -> DEBU 7d8 scheme "" not registered, fallback to default scheme" +"2019-09-24 00:25:05.230 UTC [grpc] watcher -> DEBU 7d9 ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +"2019-09-24 00:25:05.230 UTC [grpc] switchBalancer -> DEBU 7da ClientConn switching balancer to "pick_first"" +"2019-09-24 00:25:05.230 UTC [grpc] HandleSubConnStateChange -> DEBU 7db pickfirstBalancer: HandleSubConnStateChange: 0xc0038aa1d0, CONNECTING" +"2019-09-24 00:25:05.264 UTC [grpc] HandleSubConnStateChange -> DEBU 7dc pickfirstBalancer: HandleSubConnStateChange: 0xc0038aa1d0, READY" +"2019-09-24 00:25:05.266 UTC [msp] GetDefaultSigningIdentity -> DEBU 7dd Obtaining default signing identity" +"2019-09-24 00:25:05.266 UTC [msp.identity] Sign -> DEBU 7de Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:05.266 UTC [msp.identity] Sign -> DEBU 7df Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:05.266 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7e0 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051" +"2019-09-24 00:25:05.269 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7e1 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:7051" +"2019-09-24 00:25:05.270 UTC [msp.identity] Verify -> DEBU 7e2 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-09-24 00:25:05.270 UTC [msp.identity] Verify -> DEBU 7e3 Verify: sig = 00000000 30 44 02 20 2f 0c d1 d3 5e ca 97 8b 9a 5e cb 0f |0D. /...^....^..| +00000010 f5 59 0e 75 03 4a 9a ee c2 13 27 c6 ad 95 66 71 |.Y.u.J....'...fq| +00000020 da 5c d1 75 02 20 5c 4b 42 6b 70 82 6c d8 4c e9 |.\.u. \KBkp.l.L.| +00000030 61 3a 0e 66 47 2a 09 a0 ce 72 cf 6e 27 5e b8 d2 |a:.fG*...r.n'^..| +00000040 d6 1b ad 7b 2a 09 |...{*.|" +"2019-09-24 00:25:05.270 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7e4 Authenticated 172.18.0.5:7051" +"2019-09-24 00:25:05.270 UTC [gossip.comm] createConnection -> DEBU 7e5 Exiting" +"2019-09-24 00:25:05.270 UTC [gossip.comm] sendToEndpoint -> DEBU 7e6 Exiting" +"2019-09-24 00:25:05.270 UTC [grpc] infof -> DEBU 7e7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:05.657 UTC [gossip.gossip] handleMessage -> DEBU 7e8 Entering, 172.18.0.8:34556 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:05.657 UTC [gossip.gossip] handleMessage -> DEBU 7e9 Exiting" +"2019-09-24 00:25:05.657 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7ea Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:05.657 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7eb Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:05.658 UTC [msp] DeserializeIdentity -> DEBU 7ec Obtaining identity" +"2019-09-24 00:25:05.658 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:05.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7ee Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:05.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7ef Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:05.658 UTC [policies] Evaluate -> DEBU 7f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:05.658 UTC [policies] Evaluate -> DEBU 7f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:05.658 UTC [policies] Evaluate -> DEBU 7f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:05.658 UTC [cauthdsl] func1 -> DEBU 7f3 0xc003843b80 gate 1569284705658748200 evaluation starts" +"2019-09-24 00:25:05.658 UTC [cauthdsl] func2 -> DEBU 7f4 0xc003843b80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:05.658 UTC [cauthdsl] func2 -> DEBU 7f5 0xc003843b80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:05.659 UTC [cauthdsl] func2 -> DEBU 7f6 0xc003843b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:05.659 UTC [cauthdsl] func2 -> DEBU 7f7 0xc003843b80 principal evaluation fails" +"2019-09-24 00:25:05.659 UTC [cauthdsl] func1 -> DEBU 7f8 0xc003843b80 gate 1569284705658748200 evaluation fails" +"2019-09-24 00:25:05.659 UTC [policies] Evaluate -> DEBU 7f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:05.659 UTC [policies] Evaluate -> DEBU 7fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:05.659 UTC [policies] Evaluate -> DEBU 7fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:05.659 UTC [cauthdsl] func1 -> DEBU 7fc 0xc0039183c0 gate 1569284705659392600 evaluation starts" +"2019-09-24 00:25:05.659 UTC [cauthdsl] func2 -> DEBU 7fd 0xc0039183c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:05.659 UTC [cauthdsl] func2 -> DEBU 7fe 0xc0039183c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:05.659 UTC [cauthdsl] func2 -> DEBU 7ff 0xc0039183c0 principal matched by identity 0" +"2019-09-24 00:25:05.659 UTC [msp.identity] Verify -> DEBU 800 Verify: digest = 00000000 24 a1 d8 94 01 f0 41 dd e4 3e 0c 5b 3d c8 8e dc |$.....A..>.[=...| +00000010 9c c4 05 6e 6d ba d0 67 9c cc 7e e3 0f 3f 45 93 |...nm..g..~..?E.|" +"2019-09-24 00:25:05.659 UTC [msp.identity] Verify -> DEBU 801 Verify: sig = 00000000 30 44 02 20 12 3b 60 6c c1 2d 39 57 39 1f 03 47 |0D. .;`l.-9W9..G| +00000010 93 88 28 27 b5 ac d6 5a 4b 7f fa 78 87 87 2d 4c |..('...ZK..x..-L| +00000020 cc 98 17 ce 02 20 0c ed 3e 3b c7 07 d5 16 6b a3 |..... ..>;....k.| +00000030 b8 00 e1 32 ba f4 e9 8d 58 8c e0 f1 22 fc d9 b1 |...2....X..."...| +00000040 03 c3 ea 96 dd 27 |.....'|" +"2019-09-24 00:25:05.660 UTC [cauthdsl] func2 -> DEBU 802 0xc0039183c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:05.660 UTC [cauthdsl] func1 -> DEBU 803 0xc0039183c0 gate 1569284705659392600 evaluation succeeds" +"2019-09-24 00:25:05.660 UTC [policies] Evaluate -> DEBU 804 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:05.660 UTC [policies] Evaluate -> DEBU 805 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:05.660 UTC [policies] Evaluate -> DEBU 806 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:05.660 UTC [policies] Evaluate -> DEBU 807 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:05.660 UTC [gossip.discovery] handleAliveMessage -> DEBU 808 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:05.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 809 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:05.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 80a updating membership: timestamp: " +"2019-09-24 00:25:05.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 80b Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:05.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 80c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership" +"2019-09-24 00:25:05.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 80d Exiting" +"2019-09-24 00:25:05.660 UTC [gossip.discovery] handleAliveMessage -> DEBU 80e Exiting" +"2019-09-24 00:25:05.660 UTC [gossip.discovery] handleMsgFromComm -> DEBU 80f Exiting" +"2019-09-24 00:25:05.665 UTC [msp] DeserializeIdentity -> DEBU 810 Obtaining identity" +"2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 811 Obtaining identity" +"2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 812 Obtaining identity" +"2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 813 Obtaining identity" +"2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 814 Obtaining identity" +"2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 815 Obtaining identity" +"2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 816 Obtaining identity" +"2019-09-24 00:25:05.666 UTC [gossip.comm] Send -> DEBU 817 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:05.666 UTC [msp] DeserializeIdentity -> DEBU 818 Obtaining identity" +"2019-09-24 00:25:05.666 UTC [gossip.comm] Send -> DEBU 819 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:05.667 UTC [gossip.comm] sendToEndpoint -> DEBU 81a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:05.667 UTC [gossip.comm] sendToEndpoint -> DEBU 81b Exiting" +"2019-09-24 00:25:05.667 UTC [gossip.comm] sendToEndpoint -> DEBU 81c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:05.667 UTC [gossip.comm] sendToEndpoint -> DEBU 81d Exiting" +"2019-09-24 00:25:05.704 UTC [gossip.comm] func1 -> DEBU 81e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:05.704 UTC [gossip.gossip] handleMessage -> DEBU 81f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:05.704 UTC [gossip.pull] HandleMessage -> DEBU 820 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:05.704 UTC [gossip.pull] SendDigest -> DEBU 821 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:05.704 UTC [gossip.gossip] handleMessage -> DEBU 822 Exiting" +"2019-09-24 00:25:05.721 UTC [gossip.comm] func1 -> DEBU 823 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\022" signature:"0D\002 \032\017-\336\265\302z\337`\362\2674IA#X\226\342\300\301\224TV\353\013\275o\354\354Jx&\002 s\030\363\301\035\2575CH\216\022MW\236/\206\221\272A\2107\342\235\366\202\021\255\206\350P\034s" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:05.721 UTC [gossip.gossip] handleMessage -> DEBU 824 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\022" signature:"0D\002 \032\017-\336\265\302z\337`\362\2674IA#X\226\342\300\301\224TV\353\013\275o\354\354Jx&\002 s\030\363\301\035\2575CH\216\022MW\236/\206\221\272A\2107\342\235\366\202\021\255\206\350P\034s" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:05.721 UTC [gossip.gossip] handleMessage -> DEBU 825 Exiting" +"2019-09-24 00:25:05.721 UTC [gossip.discovery] handleMsgFromComm -> DEBU 826 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\022" signature:"0D\002 \032\017-\336\265\302z\337`\362\2674IA#X\226\342\300\301\224TV\353\013\275o\354\354Jx&\002 s\030\363\301\035\2575CH\216\022MW\236/\206\221\272A\2107\342\235\366\202\021\255\206\350P\034s" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:05.722 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 827 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:05.722 UTC [msp.identity] Verify -> DEBU 828 Verify: digest = 00000000 0b e9 99 e7 7f e9 32 4e 20 11 0d 53 cd 08 f2 d4 |......2N ..S....| +00000010 34 cc 17 b1 52 1b af f9 1b 92 65 9e f9 84 d1 a2 |4...R.....e.....|" +"2019-09-24 00:25:05.722 UTC [msp.identity] Verify -> DEBU 829 Verify: sig = 00000000 30 44 02 20 1a 0f 2d de b5 c2 7a df 60 f2 b7 34 |0D. ..-...z.`..4| +00000010 49 41 23 58 96 e2 c0 c1 94 54 56 eb 0b bd 6f ec |IA#X.....TV...o.| +00000020 ec 4a 78 26 02 20 73 18 f3 c1 1d af 35 43 48 8e |.Jx&. s.....5CH.| +00000030 12 4d 57 9e 2f 86 91 ba 41 88 37 e2 9d f6 82 11 |.MW./...A.7.....| +00000040 ad 86 e8 50 1c 73 |...P.s|" +"2019-09-24 00:25:05.723 UTC [msp.identity] Verify -> DEBU 82a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:24.376 UTC [msp.identity] Verify -> DEBU 24f9 Verify: sig = 00000000 30 44 02 20 6f fe ab d1 9b f0 4b c4 7e fe 0f 5a |0D. o.....K.~..Z| -00000010 68 f2 ab 5a db a3 02 fa 13 ad bd 37 e4 49 a3 01 |h..Z.......7.I..| -00000020 f3 3a bb 13 02 20 65 1d ea 2a 8c 94 ee 54 27 11 |.:... e..*...T'.| -00000030 5b eb 0f c2 00 78 d8 2c 50 e9 96 8d 9c 0d 8c 79 |[....x.,P......y| -00000040 b8 75 1a 8a eb 03 |.u....|" -"2019-07-20 02:40:24.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 24fa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:24.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:40:24.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fc updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:24.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fd Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:24.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fe Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:24.379 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ff Exiting" -"2019-07-20 02:40:24.379 UTC [gossip.discovery] handleAliveMessage -> DEBU 2500 Exiting" -"2019-07-20 02:40:24.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2501 Exiting" -"2019-07-20 02:40:24.380 UTC [gossip.discovery] sendMemResponse -> DEBU 2502 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:24.380 UTC [msp] DeserializeIdentity -> DEBU 2503 Obtaining identity" -"2019-07-20 02:40:24.381 UTC [msp] DeserializeIdentity -> DEBU 2504 Obtaining identity" -"2019-07-20 02:40:24.381 UTC [gossip.comm] Send -> DEBU 2505 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:24.382 UTC [gossip.discovery] sendMemResponse -> DEBU 2506 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " -"2019-07-20 02:40:24.382 UTC [gossip.comm] sendToEndpoint -> DEBU 2507 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.382 UTC [gossip.comm] sendToEndpoint -> DEBU 2508 Exiting" -"2019-07-20 02:40:24.542 UTC [endorser] ProcessProposal -> DEBU 2509 Entering: request from 172.18.0.9:58356" -"2019-07-20 02:40:24.542 UTC [protoutils] ValidateProposalMessage -> DEBU 250a ValidateProposalMessage starts for signed proposal 0xc002fdc370" -"2019-07-20 02:40:24.543 UTC [protoutils] validateChannelHeader -> DEBU 250b validateChannelHeader info: header type 3" -"2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250c begin" -"2019-07-20 02:40:24.543 UTC [msp] GetManagerForChain -> DEBU 250d Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250e creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250f creator is valid" -"2019-07-20 02:40:24.543 UTC [msp.identity] Verify -> DEBU 2510 Verify: digest = 00000000 58 7a 40 a8 1f a6 1a 91 47 ca 3e 0a 16 21 04 d4 |Xz@.....G.>..!..| -00000010 50 81 e6 1a c7 b8 02 31 bd ed ec fb 2e 9b 76 97 |P......1......v.|" -"2019-07-20 02:40:24.543 UTC [msp.identity] Verify -> DEBU 2511 Verify: sig = 00000000 30 44 02 20 23 05 67 c0 e5 2d a1 66 f7 7d 78 1d |0D. #.g..-.f.}x.| -00000010 96 1d 47 4a e1 2d 67 6a 3c 16 a0 24 24 f8 b9 bd |..GJ.-gj<..$$...| -00000020 bf 64 ac 69 02 20 63 23 39 44 87 4f 15 ad 73 6f |.d.i. c#9D.O..so| -00000030 66 d9 e7 87 c4 71 b3 2d d0 53 14 19 5e 75 10 5d |f....q.-.S..^u.]| -00000040 63 c0 3c 1d 9d 1d |c.<...|" -"2019-07-20 02:40:24.544 UTC [protoutils] checkSignatureFromCreator -> DEBU 2512 exits successfully" -"2019-07-20 02:40:24.544 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2513 validateChaincodeProposalMessage starts for proposal 0xc0005e7f80, header 0xc002fdc780" -"2019-07-20 02:40:24.544 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2514 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-07-20 02:40:24.544 UTC [endorser] preProcess -> DEBU 2515 [businesschannel][9ced4390] processing txid: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe" -"2019-07-20 02:40:24.544 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2516 retrieveTransactionByID() - txId = [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" -"2019-07-20 02:40:24.544 UTC [aclmgmt] CheckACL -> DEBU 2517 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-07-20 02:40:24.544 UTC [aclmgmt] CheckACL -> DEBU 2518 acl check(/Channel/Application/Writers)" -"2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 2519 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 251a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 251b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:24.545 UTC [cauthdsl] func1 -> DEBU 251c 0xc000229d40 gate 1563590424545536000 evaluation starts" -"2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251d 0xc000229d40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251e 0xc000229d40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251f 0xc000229d40 principal matched by identity 0" -"2019-07-20 02:40:24.546 UTC [msp.identity] Verify -> DEBU 2520 Verify: digest = 00000000 58 7a 40 a8 1f a6 1a 91 47 ca 3e 0a 16 21 04 d4 |Xz@.....G.>..!..| -00000010 50 81 e6 1a c7 b8 02 31 bd ed ec fb 2e 9b 76 97 |P......1......v.|" -"2019-07-20 02:40:24.546 UTC [msp.identity] Verify -> DEBU 2521 Verify: sig = 00000000 30 44 02 20 23 05 67 c0 e5 2d a1 66 f7 7d 78 1d |0D. #.g..-.f.}x.| -00000010 96 1d 47 4a e1 2d 67 6a 3c 16 a0 24 24 f8 b9 bd |..GJ.-gj<..$$...| -00000020 bf 64 ac 69 02 20 63 23 39 44 87 4f 15 ad 73 6f |.d.i. c#9D.O..so| -00000030 66 d9 e7 87 c4 71 b3 2d d0 53 14 19 5e 75 10 5d |f....q.-.S..^u.]| -00000040 63 c0 3c 1d 9d 1d |c.<...|" -"2019-07-20 02:40:24.546 UTC [cauthdsl] func2 -> DEBU 2522 0xc000229d40 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.546 UTC [cauthdsl] func1 -> DEBU 2523 0xc000229d40 gate 1563590424545536000 evaluation succeeds" -"2019-07-20 02:40:24.546 UTC [policies] Evaluate -> DEBU 2524 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2525 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2526 Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2527 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:24.547 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2528 constructing new tx simulator" -"2019-07-20 02:40:24.548 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2529 constructing new tx simulator txid = [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" -"2019-07-20 02:40:24.548 UTC [endorser] SimulateProposal -> DEBU 252a [businesschannel][9ced4390] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:24.548 UTC [stateleveldb] GetState -> DEBU 252b GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:24.549 UTC [ccprovider] GetChaincodeData -> DEBU 252c Getting chaincode data for from cache" -"2019-07-20 02:40:24.549 UTC [endorser] callChaincode -> INFO 252d [businesschannel][9ced4390] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:24.549 UTC [chaincode] Execute -> DEBU 252e Entry" -"2019-07-20 02:40:24.551 UTC [chaincode] handleMessage -> DEBU 252f [9ced4390] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:24.551 UTC [chaincode] HandleTransaction -> DEBU 2530 [9ced4390] handling GET_STATE from chaincode" -"2019-07-20 02:40:24.552 UTC [chaincode] HandleGetState -> DEBU 2531 [9ced4390] getting state for chaincode exp02, key a, channel businesschannel" -"2019-07-20 02:40:24.552 UTC [stateleveldb] GetState -> DEBU 2532 GetState(). ns=exp02, key=a" -"2019-07-20 02:40:24.552 UTC [chaincode] HandleTransaction -> DEBU 2533 [9ced4390] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:24.554 UTC [gossip.comm] func1 -> DEBU 2534 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.555 UTC [gossip.gossip] handleMessage -> DEBU 2535 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.555 UTC [gossip.pull] HandleMessage -> DEBU 2536 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.555 UTC [msp] DeserializeIdentity -> DEBU 2537 Obtaining identity" -"2019-07-20 02:40:24.555 UTC [msp] DeserializeIdentity -> DEBU 2538 Obtaining identity" -"2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 2539 Obtaining identity" -"2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253a Obtaining identity" -"2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253b Obtaining identity" -"2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253c Obtaining identity" -"2019-07-20 02:40:24.556 UTC [gossip.pull] SendDigest -> DEBU 253d Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:24.556 UTC [gossip.gossip] handleMessage -> DEBU 253e Exiting" -"2019-07-20 02:40:24.557 UTC [chaincode] handleMessage -> DEBU 253f [9ced4390] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:24.557 UTC [chaincode] Notify -> DEBU 2540 [9ced4390] notifying Txid:9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, channelID:businesschannel" -"2019-07-20 02:40:24.558 UTC [chaincode] Execute -> DEBU 2541 Exit" -"2019-07-20 02:40:24.558 UTC [endorser] callChaincode -> INFO 2542 [businesschannel][9ced4390] Exit chaincode: name:"exp02" (8ms)" -"2019-07-20 02:40:24.558 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2543 Simulation completed, getting simulation results" -"2019-07-20 02:40:24.558 UTC [lockbasedtxmgr] Done -> DEBU 2544 Done with transaction simulation / query execution [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" -"2019-07-20 02:40:24.558 UTC [endorser] SimulateProposal -> DEBU 2545 [businesschannel][9ced4390] Exit" -"2019-07-20 02:40:24.559 UTC [endorser] endorseProposal -> DEBU 2546 [businesschannel][9ced4390] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:24.559 UTC [endorser] endorseProposal -> DEBU 2547 [businesschannel][9ced4390] escc for chaincode name:"exp02" is escc" -"2019-07-20 02:40:24.559 UTC [endorser] EndorseWithPlugin -> DEBU 2548 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, chaincode: exp02}" -"2019-07-20 02:40:24.560 UTC [gossip.comm] func1 -> DEBU 2549 Got message: GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.565 UTC [msp.identity] Sign -> DEBU 254a Sign: plaintext: 0A2097CB3F03F46412D05C11B69168FC...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:24.566 UTC [msp.identity] Sign -> DEBU 254c Sign: digest: A2BFD1B59AE6A062AA9F49715A99F6F5A4AC22E447B5BA55A700F061CA54F3E7 " -"2019-07-20 02:40:24.566 UTC [endorser] EndorseWithPlugin -> DEBU 254d Exiting {plugin: escc, channel: businesschannel, tx: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, chaincode: exp02}" -"2019-07-20 02:40:24.566 UTC [endorser] endorseProposal -> DEBU 254e [businesschannel][9ced4390] Exit" -"2019-07-20 02:40:24.566 UTC [lockbasedtxmgr] Done -> DEBU 254f Done with transaction simulation / query execution [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" -"2019-07-20 02:40:24.567 UTC [endorser] func1 -> DEBU 2550 Exit: request from 172.18.0.9:58356" -"2019-07-20 02:40:24.566 UTC [gossip.gossip] handleMessage -> DEBU 254b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.567 UTC [comm.grpc.server] 1 -> INFO 2551 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58356 grpc.code=OK grpc.call_duration=25.1225ms -"2019-07-20 02:40:24.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2553 Got message: GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2554 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:24.568 UTC [msp] DeserializeIdentity -> DEBU 2555 Obtaining identity" -"2019-07-20 02:40:24.567 UTC [gossip.gossip] handleMessage -> DEBU 2552 Exiting" -"2019-07-20 02:40:24.569 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2556 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:24.569 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2557 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.573 UTC [grpc] infof -> DEBU 2558 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:24.573 UTC [grpc] infof -> DEBU 2559 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:24.572 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 255a Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.573 UTC [policies] Evaluate -> DEBU 255b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:24.573 UTC [policies] Evaluate -> DEBU 255c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.574 UTC [policies] Evaluate -> DEBU 255d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:24.574 UTC [cauthdsl] func1 -> DEBU 255e 0xc00027b190 gate 1563590424574399600 evaluation starts" -"2019-07-20 02:40:24.574 UTC [cauthdsl] func2 -> DEBU 255f 0xc00027b190 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.574 UTC [cauthdsl] func2 -> DEBU 2560 0xc00027b190 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.575 UTC [cauthdsl] func2 -> DEBU 2561 0xc00027b190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:24.575 UTC [cauthdsl] func2 -> DEBU 2562 0xc00027b190 principal evaluation fails" -"2019-07-20 02:40:24.575 UTC [cauthdsl] func1 -> DEBU 2563 0xc00027b190 gate 1563590424574399600 evaluation fails" -"2019-07-20 02:40:24.575 UTC [policies] Evaluate -> DEBU 2564 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.576 UTC [policies] Evaluate -> DEBU 2565 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.576 UTC [policies] Evaluate -> DEBU 2566 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:24.576 UTC [cauthdsl] func1 -> DEBU 2567 0xc00027ba40 gate 1563590424576595400 evaluation starts" -"2019-07-20 02:40:24.576 UTC [cauthdsl] func2 -> DEBU 2568 0xc00027ba40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.576 UTC [cauthdsl] func2 -> DEBU 2569 0xc00027ba40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.577 UTC [cauthdsl] func2 -> DEBU 256a 0xc00027ba40 principal matched by identity 0" -"2019-07-20 02:40:24.577 UTC [msp.identity] Verify -> DEBU 256b Verify: digest = 00000000 41 b0 db f9 9c d3 07 22 e0 f1 0f a6 45 df 28 d5 |A......"....E.(.| -00000010 17 04 4e 0f 92 f8 eb 0e 36 59 06 81 4e 27 04 4a |..N.....6Y..N'.J|" -"2019-07-20 02:40:24.577 UTC [msp.identity] Verify -> DEBU 256c Verify: sig = 00000000 30 44 02 20 14 8e 2e 3b 7a 79 e9 a8 e3 4d ad a8 |0D. ...;zy...M..| -00000010 da d9 de 22 30 55 a7 77 4a ac 5e 17 7d d4 33 76 |..."0U.wJ.^.}.3v| -00000020 eb 3e bc 24 02 20 48 de 27 64 5d 20 89 e3 ab c6 |.>.$. H.'d] ....| -00000030 85 6e 79 7e 3e 04 4f 44 a9 94 c8 36 46 63 d3 c4 |.ny~>.OD...6Fc..| -00000040 3e 9f 0e e2 b1 ab |>.....|" -"2019-07-20 02:40:24.577 UTC [cauthdsl] func2 -> DEBU 256d 0xc00027ba40 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.578 UTC [cauthdsl] func1 -> DEBU 256e 0xc00027ba40 gate 1563590424576595400 evaluation succeeds" -"2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 256f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2570 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2571 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2572 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:24.578 UTC [gossip.discovery] handleAliveMessage -> DEBU 2573 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2574 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2575 updating membership: timestamp: " -"2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2576 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2577 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2578 Exiting" -"2019-07-20 02:40:24.579 UTC [gossip.discovery] handleAliveMessage -> DEBU 2579 Exiting" -"2019-07-20 02:40:24.579 UTC [gossip.discovery] handleMsgFromComm -> DEBU 257a Exiting" -"2019-07-20 02:40:24.580 UTC [gossip.discovery] sendMemResponse -> DEBU 257b Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257c Obtaining identity" -"2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257d Obtaining identity" -"2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257e Obtaining identity" -"2019-07-20 02:40:24.581 UTC [gossip.comm] Send -> DEBU 257f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:24.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2580 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2581 Exiting" -"2019-07-20 02:40:24.581 UTC [gossip.discovery] sendMemResponse -> DEBU 2582 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" > alive:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > alive: alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " -"2019-07-20 02:40:24.717 UTC [msp] DeserializeIdentity -> DEBU 2583 Obtaining identity" -"2019-07-20 02:40:24.717 UTC [msp] DeserializeIdentity -> DEBU 2584 Obtaining identity" -"2019-07-20 02:40:24.718 UTC [gossip.comm] Send -> DEBU 2585 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2586 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2587 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2588 Exiting" -"2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2589 Exiting" -"2019-07-20 02:40:24.719 UTC [gossip.comm] sendToEndpoint -> DEBU 258a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.719 UTC [gossip.comm] sendToEndpoint -> DEBU 258b Exiting" -"2019-07-20 02:40:24.720 UTC [gossip.comm] func1 -> DEBU 258c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.720 UTC [gossip.gossip] handleMessage -> DEBU 258d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.720 UTC [msp.identity] Verify -> DEBU 258e Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:24.721 UTC [msp.identity] Verify -> DEBU 258f Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:24.721 UTC [msp] DeserializeIdentity -> DEBU 2590 Obtaining identity" -"2019-07-20 02:40:24.722 UTC [msp] DeserializeIdentity -> DEBU 2591 Obtaining identity" -"2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2592 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2593 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2594 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.722 UTC [policies] Evaluate -> DEBU 2595 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:24.723 UTC [policies] Evaluate -> DEBU 2596 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.723 UTC [policies] Evaluate -> DEBU 2597 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:24.723 UTC [cauthdsl] func1 -> DEBU 2598 0xc0002ecf80 gate 1563590424723322000 evaluation starts" -"2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 2599 0xc0002ecf80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 259b 0xc0002ecf80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.723 UTC [gossip.comm] func1 -> DEBU 259a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 259c 0xc0002ecf80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:24.726 UTC [cauthdsl] func2 -> DEBU 259d 0xc0002ecf80 principal evaluation fails" -"2019-07-20 02:40:24.726 UTC [cauthdsl] func1 -> DEBU 259e 0xc0002ecf80 gate 1563590424723322000 evaluation fails" -"2019-07-20 02:40:24.726 UTC [msp] DeserializeIdentity -> DEBU 259f Obtaining identity" -"2019-07-20 02:40:24.726 UTC [policies] Evaluate -> DEBU 25a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.727 UTC [msp] DeserializeIdentity -> DEBU 25a1 Obtaining identity" -"2019-07-20 02:40:24.727 UTC [gossip.comm] Send -> DEBU 25a3 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" -"2019-07-20 02:40:24.727 UTC [gossip.comm] func1 -> DEBU 25a4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.727 UTC [msp] DeserializeIdentity -> DEBU 25a5 Obtaining identity" -"2019-07-20 02:40:24.727 UTC [policies] Evaluate -> DEBU 25a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.728 UTC [policies] Evaluate -> DEBU 25a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:24.729 UTC [cauthdsl] func1 -> DEBU 25a8 0xc0002eda70 gate 1563590424729010500 evaluation starts" -"2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25a9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25aa 0xc0002eda70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25ac 0xc0002eda70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25ad 0xc0002eda70 principal matched by identity 0" -"2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25ae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:24.729 UTC [msp.identity] Verify -> DEBU 25af Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:24.730 UTC [msp.identity] Verify -> DEBU 25b1 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:24.730 UTC [gossip.comm] sendToEndpoint -> DEBU 25b2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:24.730 UTC [gossip.comm] sendToEndpoint -> DEBU 25b4 Exiting" -"2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25b0 Exiting" -"2019-07-20 02:40:24.730 UTC [cauthdsl] func2 -> DEBU 25b3 0xc0002eda70 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.730 UTC [cauthdsl] func1 -> DEBU 25b5 0xc0002eda70 gate 1563590424729010500 evaluation succeeds" -"2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b8 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:24.728 UTC [msp] DeserializeIdentity -> DEBU 25a6 Obtaining identity" -"2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:24.732 UTC [msp] DeserializeIdentity -> DEBU 25ba Obtaining identity" -"2019-07-20 02:40:24.735 UTC [msp] DeserializeIdentity -> DEBU 25bb Obtaining identity" -"2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25ab Exiting" -"2019-07-20 02:40:24.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25bc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:24.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25bd Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25be Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.737 UTC [policies] Evaluate -> DEBU 25bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:24.738 UTC [policies] Evaluate -> DEBU 25c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.738 UTC [policies] Evaluate -> DEBU 25c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:24.738 UTC [cauthdsl] func1 -> DEBU 25c2 0xc0003dcea0 gate 1563590424738584700 evaluation starts" -"2019-07-20 02:40:24.738 UTC [cauthdsl] func2 -> DEBU 25c3 0xc0003dcea0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c4 0xc0003dcea0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c5 0xc0003dcea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c6 0xc0003dcea0 principal evaluation fails" -"2019-07-20 02:40:24.739 UTC [cauthdsl] func1 -> DEBU 25c7 0xc0003dcea0 gate 1563590424738584700 evaluation fails" -"2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:24.740 UTC [cauthdsl] func1 -> DEBU 25cb 0xc0003dd810 gate 1563590424740711600 evaluation starts" -"2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25cc 0xc0003dd810 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25cd 0xc0003dd810 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25ce 0xc0003dd810 principal matched by identity 0" -"2019-07-20 02:40:24.742 UTC [msp.identity] Verify -> DEBU 25cf Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:24.742 UTC [msp.identity] Verify -> DEBU 25d0 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:24.742 UTC [cauthdsl] func2 -> DEBU 25d1 0xc0003dd810 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.743 UTC [cauthdsl] func1 -> DEBU 25d3 0xc0003dd810 gate 1563590424740711600 evaluation succeeds" -"2019-07-20 02:40:24.743 UTC [policies] Evaluate -> DEBU 25d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.743 UTC [policies] Evaluate -> DEBU 25d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.743 UTC [gossip.comm] func1 -> DEBU 25d2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:24.745 UTC [policies] Evaluate -> DEBU 25d6 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:24.745 UTC [policies] Evaluate -> DEBU 25d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:24.746 UTC [msp.identity] Verify -> DEBU 25d8 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -"2019-07-20 02:40:24.747 UTC [msp.identity] Verify -> DEBU 25d9 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -00000040 93 08 2f 55 cd 66 |../U.f|" -"2019-07-20 02:40:24.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25da Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25db Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:24.750 UTC [cauthdsl] func1 -> DEBU 25df 0xc000716cd0 gate 1563590424750527300 evaluation starts" -"2019-07-20 02:40:24.751 UTC [cauthdsl] func2 -> DEBU 25e0 0xc000716cd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.751 UTC [cauthdsl] func2 -> DEBU 25e1 0xc000716cd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.753 UTC [cauthdsl] func2 -> DEBU 25e2 0xc000716cd0 principal matched by identity 0" -"2019-07-20 02:40:24.754 UTC [msp.identity] Verify -> DEBU 25e3 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -"2019-07-20 02:40:24.755 UTC [msp] DeserializeIdentity -> DEBU 25e4 Obtaining identity" -"2019-07-20 02:40:24.755 UTC [msp] DeserializeIdentity -> DEBU 25e5 Obtaining identity" -"2019-07-20 02:40:24.755 UTC [gossip.pull] Hello -> DEBU 25e7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:24.756 UTC [msp] DeserializeIdentity -> DEBU 25e8 Obtaining identity" -"2019-07-20 02:40:24.755 UTC [msp.identity] Verify -> DEBU 25e6 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -00000040 93 08 2f 55 cd 66 |../U.f|" -"2019-07-20 02:40:24.756 UTC [msp] DeserializeIdentity -> DEBU 25e9 Obtaining identity" -"2019-07-20 02:40:24.760 UTC [gossip.comm] Send -> DEBU 25eb Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:24.761 UTC [gossip.comm] sendToEndpoint -> DEBU 25ec Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.757 UTC [cauthdsl] func2 -> DEBU 25ea 0xc000716cd0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.762 UTC [cauthdsl] func1 -> DEBU 25ed 0xc000716cd0 gate 1563590424750527300 evaluation succeeds" -"2019-07-20 02:40:24.762 UTC [policies] Evaluate -> DEBU 25ef Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.763 UTC [policies] Evaluate -> DEBU 25f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.763 UTC [policies] Evaluate -> DEBU 25f1 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:24.764 UTC [policies] Evaluate -> DEBU 25f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:24.764 UTC [gossip.comm] func1 -> DEBU 25f3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.762 UTC [gossip.comm] sendToEndpoint -> DEBU 25ee Exiting" -"2019-07-20 02:40:24.764 UTC [gossip.gossip] handleMessage -> DEBU 25f4 Exiting" -"2019-07-20 02:40:24.766 UTC [gossip.gossip] handleMessage -> DEBU 25f5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.766 UTC [msp] DeserializeIdentity -> DEBU 25f6 Obtaining identity" -"2019-07-20 02:40:24.767 UTC [msp.identity] Verify -> DEBU 25f7 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25f8 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25f9 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25fa Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:24.769 UTC [msp] DeserializeIdentity -> DEBU 25fb Obtaining identity" -"2019-07-20 02:40:24.769 UTC [msp] DeserializeIdentity -> DEBU 25fc Obtaining identity" -"2019-07-20 02:40:24.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25fd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:24.770 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25fe Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.770 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25ff Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2600 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2601 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2602 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:24.770 UTC [cauthdsl] func1 -> DEBU 2603 0xc002963630 gate 1563590424770746900 evaluation starts" -"2019-07-20 02:40:24.770 UTC [cauthdsl] func2 -> DEBU 2604 0xc002963630 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2605 0xc002963630 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2606 0xc002963630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2607 0xc002963630 principal evaluation fails" -"2019-07-20 02:40:24.771 UTC [cauthdsl] func1 -> DEBU 2608 0xc002963630 gate 1563590424770746900 evaluation fails" -"2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 2609 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 260a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 260b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:24.772 UTC [cauthdsl] func1 -> DEBU 260c 0xc002963e70 gate 1563590424772207200 evaluation starts" -"2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260d 0xc002963e70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260e 0xc002963e70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260f 0xc002963e70 principal matched by identity 0" -"2019-07-20 02:40:24.773 UTC [msp.identity] Verify -> DEBU 2610 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| -00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" -"2019-07-20 02:40:24.774 UTC [msp.identity] Verify -> DEBU 2611 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| -00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| -00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| -00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| -00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" -"2019-07-20 02:40:24.774 UTC [cauthdsl] func2 -> DEBU 2612 0xc002963e70 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.774 UTC [cauthdsl] func1 -> DEBU 2613 0xc002963e70 gate 1563590424772207200 evaluation succeeds" -"2019-07-20 02:40:24.774 UTC [policies] Evaluate -> DEBU 2614 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2615 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2616 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2617 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:24.775 UTC [endorser] ProcessProposal -> DEBU 2618 Entering: request from 172.18.0.9:58360" -"2019-07-20 02:40:24.775 UTC [msp] DeserializeIdentity -> DEBU 2619 Obtaining identity" -"2019-07-20 02:40:24.775 UTC [protoutils] ValidateProposalMessage -> DEBU 261a ValidateProposalMessage starts for signed proposal 0xc002f51540" -"2019-07-20 02:40:24.776 UTC [protoutils] validateChannelHeader -> DEBU 261b validateChannelHeader info: header type 3" -"2019-07-20 02:40:24.776 UTC [protoutils] checkSignatureFromCreator -> DEBU 261d begin" -"2019-07-20 02:40:24.777 UTC [msp] GetManagerForChain -> DEBU 261e Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:24.777 UTC [protoutils] checkSignatureFromCreator -> DEBU 261f creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:24.777 UTC [protoutils] checkSignatureFromCreator -> DEBU 2620 creator is valid" -"2019-07-20 02:40:24.776 UTC [msp] DeserializeIdentity -> DEBU 261c Obtaining identity" -"2019-07-20 02:40:24.778 UTC [msp.identity] Verify -> DEBU 2621 Verify: digest = 00000000 d0 3a 89 45 63 c1 72 e5 82 71 9e 16 5d 2a b0 8d |.:.Ec.r..q..]*..| -00000010 eb c5 71 9d 97 9b 2e 42 4a f7 05 59 cf 16 72 a2 |..q....BJ..Y..r.|" -"2019-07-20 02:40:24.778 UTC [msp.identity] Verify -> DEBU 2623 Verify: sig = 00000000 30 44 02 20 37 55 b9 46 75 03 f1 7b 01 67 84 ea |0D. 7U.Fu..{.g..| -00000010 1d 2b f7 2b 7d d1 d8 66 ec c7 8d 54 a9 d9 9b ba |.+.+}..f...T....| -00000020 8e b9 d5 68 02 20 2f 08 1b 38 43 79 8c 34 46 93 |...h. /..8Cy.4F.| -00000030 e4 36 35 b2 49 53 b2 b1 6f 67 16 75 6e 31 a7 24 |.65.IS..og.un1.$| -00000040 5f 7c d9 ad 57 d3 |_|..W.|" -"2019-07-20 02:40:24.778 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2622 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:24.779 UTC [protoutils] checkSignatureFromCreator -> DEBU 2624 exits successfully" -"2019-07-20 02:40:24.779 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2626 validateChaincodeProposalMessage starts for proposal 0xc0001485b0, header 0xc002f51950" -"2019-07-20 02:40:24.779 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2627 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-07-20 02:40:24.779 UTC [endorser] preProcess -> DEBU 2628 [businesschannel][3cf6d7e2] processing txid: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732" -"2019-07-20 02:40:24.779 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2629 retrieveTransactionByID() - txId = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" -"2019-07-20 02:40:24.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2625 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 262b Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.780 UTC [aclmgmt] CheckACL -> DEBU 262a acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-07-20 02:40:24.781 UTC [aclmgmt] CheckACL -> DEBU 262e acl check(/Channel/Application/Writers)" -"2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2630 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2631 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2632 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:24.781 UTC [cauthdsl] func1 -> DEBU 2633 0xc003a0e750 gate 1563590424781804600 evaluation starts" -"2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2634 0xc003a0e750 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2635 0xc003a0e750 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2636 0xc003a0e750 principal matched by identity 0" -"2019-07-20 02:40:24.782 UTC [msp.identity] Verify -> DEBU 2638 Verify: digest = 00000000 d0 3a 89 45 63 c1 72 e5 82 71 9e 16 5d 2a b0 8d |.:.Ec.r..q..]*..| -00000010 eb c5 71 9d 97 9b 2e 42 4a f7 05 59 cf 16 72 a2 |..q....BJ..Y..r.|" -"2019-07-20 02:40:24.782 UTC [cauthdsl] func1 -> DEBU 2637 0xc003a0eb00 gate 1563590424782522000 evaluation starts" -"2019-07-20 02:40:24.782 UTC [msp.identity] Verify -> DEBU 2639 Verify: sig = 00000000 30 44 02 20 37 55 b9 46 75 03 f1 7b 01 67 84 ea |0D. 7U.Fu..{.g..| -00000010 1d 2b f7 2b 7d d1 d8 66 ec c7 8d 54 a9 d9 9b ba |.+.+}..f...T....| -00000020 8e b9 d5 68 02 20 2f 08 1b 38 43 79 8c 34 46 93 |...h. /..8Cy.4F.| -00000030 e4 36 35 b2 49 53 b2 b1 6f 67 16 75 6e 31 a7 24 |.65.IS..og.un1.$| -00000040 5f 7c d9 ad 57 d3 |_|..W.|" -"2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263a 0xc003a0eb00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263c 0xc003a0eb00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263b 0xc003a0e750 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.783 UTC [cauthdsl] func1 -> DEBU 263d 0xc003a0e750 gate 1563590424781804600 evaluation succeeds" -"2019-07-20 02:40:24.783 UTC [policies] Evaluate -> DEBU 263e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:24.783 UTC [policies] Evaluate -> DEBU 2640 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263f 0xc003a0eb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2641 Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:24.784 UTC [cauthdsl] func2 -> DEBU 2642 0xc003a0eb00 principal evaluation fails" -"2019-07-20 02:40:24.784 UTC [cauthdsl] func1 -> DEBU 2644 0xc003a0eb00 gate 1563590424782522000 evaluation fails" -"2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2645 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2643 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:24.785 UTC [policies] Evaluate -> DEBU 2646 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.785 UTC [policies] Evaluate -> DEBU 2647 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:24.785 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2648 constructing new tx simulator" -"2019-07-20 02:40:24.785 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2649 constructing new tx simulator txid = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" -"2019-07-20 02:40:24.785 UTC [endorser] SimulateProposal -> DEBU 264b [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:24.785 UTC [stateleveldb] GetState -> DEBU 264c GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:24.785 UTC [ccprovider] GetChaincodeData -> DEBU 264d Getting chaincode data for from cache" -"2019-07-20 02:40:24.786 UTC [endorser] callChaincode -> INFO 264e [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:24.786 UTC [chaincode] Execute -> DEBU 264f Entry" -"2019-07-20 02:40:24.785 UTC [cauthdsl] func1 -> DEBU 264a 0xc00055f7a0 gate 1563590424785318600 evaluation starts" -"2019-07-20 02:40:24.787 UTC [chaincode] handleMessage -> DEBU 2651 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2650 0xc00055f7a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2652 0xc00055f7a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2653 0xc00055f7a0 principal matched by identity 0" -"2019-07-20 02:40:24.787 UTC [chaincode] HandleTransaction -> DEBU 2654 [3cf6d7e2] handling GET_STATE from chaincode" -"2019-07-20 02:40:24.788 UTC [chaincode] HandleGetState -> DEBU 2656 [3cf6d7e2] getting state for chaincode exp02, key a, channel businesschannel" -"2019-07-20 02:40:24.788 UTC [stateleveldb] GetState -> DEBU 2657 GetState(). ns=exp02, key=a" -"2019-07-20 02:40:24.788 UTC [chaincode] HandleTransaction -> DEBU 2658 [3cf6d7e2] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:24.788 UTC [msp.identity] Verify -> DEBU 2655 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -"2019-07-20 02:40:24.788 UTC [msp.identity] Verify -> DEBU 2659 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -00000040 a3 bb 17 85 f1 b2 |......|" -"2019-07-20 02:40:24.789 UTC [cauthdsl] func2 -> DEBU 265a 0xc00055f7a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.789 UTC [cauthdsl] func1 -> DEBU 265b 0xc00055f7a0 gate 1563590424785318600 evaluation succeeds" -"2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:24.790 UTC [msp] DeserializeIdentity -> DEBU 2661 Obtaining identity" -"2019-07-20 02:40:24.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2662 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2663 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2664 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2665 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2666 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:24.790 UTC [cauthdsl] func1 -> DEBU 2667 0xc003b4cc60 gate 1563590424790742400 evaluation starts" -"2019-07-20 02:40:24.790 UTC [cauthdsl] func2 -> DEBU 2668 0xc003b4cc60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.790 UTC [cauthdsl] func2 -> DEBU 2669 0xc003b4cc60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.791 UTC [cauthdsl] func2 -> DEBU 266a 0xc003b4cc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:24.791 UTC [cauthdsl] func2 -> DEBU 266b 0xc003b4cc60 principal evaluation fails" -"2019-07-20 02:40:24.791 UTC [cauthdsl] func1 -> DEBU 266c 0xc003b4cc60 gate 1563590424790742400 evaluation fails" -"2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.789 UTC [chaincode] handleMessage -> DEBU 2660 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:24.792 UTC [cauthdsl] func1 -> DEBU 2671 0xc003b4d510 gate 1563590424792004600 evaluation starts" -"2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2672 0xc003b4d510 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2673 0xc003b4d510 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2674 0xc003b4d510 principal matched by identity 0" -"2019-07-20 02:40:24.792 UTC [msp.identity] Verify -> DEBU 2675 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -"2019-07-20 02:40:24.791 UTC [chaincode] HandleTransaction -> DEBU 2670 [3cf6d7e2] handling GET_STATE from chaincode" -"2019-07-20 02:40:24.793 UTC [chaincode] HandleGetState -> DEBU 2676 [3cf6d7e2] getting state for chaincode exp02, key b, channel businesschannel" -"2019-07-20 02:40:24.794 UTC [stateleveldb] GetState -> DEBU 2677 GetState(). ns=exp02, key=b" -"2019-07-20 02:40:24.794 UTC [chaincode] HandleTransaction -> DEBU 2678 [3cf6d7e2] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:24.793 UTC [msp.identity] Verify -> DEBU 2679 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -00000040 a3 bb 17 85 f1 b2 |......|" -"2019-07-20 02:40:24.795 UTC [cauthdsl] func2 -> DEBU 267a 0xc003b4d510 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.795 UTC [cauthdsl] func1 -> DEBU 267b 0xc003b4d510 gate 1563590424792004600 evaluation succeeds" -"2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:24.796 UTC [policies] Evaluate -> DEBU 267f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:24.796 UTC [gossip.gossip] handleMessage -> DEBU 2680 Exiting" -"2019-07-20 02:40:24.796 UTC [gossip.gossip] handleMessage -> DEBU 2681 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.796 UTC [msp] DeserializeIdentity -> DEBU 2682 Obtaining identity" -"2019-07-20 02:40:24.797 UTC [msp.identity] Verify -> DEBU 2683 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| -00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" -"2019-07-20 02:40:24.797 UTC [msp.identity] Verify -> DEBU 2684 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| -00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| -00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| -00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| -00000040 d2 41 7c 47 6f 15 |.A|Go.|" -"2019-07-20 02:40:24.797 UTC [msp] DeserializeIdentity -> DEBU 2685 Obtaining identity" -"2019-07-20 02:40:24.797 UTC [msp] DeserializeIdentity -> DEBU 2686 Obtaining identity" -"2019-07-20 02:40:24.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2687 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:24.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2689 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 268a Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:24.799 UTC [cauthdsl] func1 -> DEBU 268e 0xc0036e5740 gate 1563590424799839700 evaluation starts" -"2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 268f 0xc0036e5740 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2690 0xc0036e5740 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2691 0xc0036e5740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2692 0xc0036e5740 principal evaluation fails" -"2019-07-20 02:40:24.800 UTC [cauthdsl] func1 -> DEBU 2693 0xc0036e5740 gate 1563590424799839700 evaluation fails" -"2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2694 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2695 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2696 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:24.800 UTC [cauthdsl] func1 -> DEBU 2697 0xc0036e5f80 gate 1563590424800963900 evaluation starts" -"2019-07-20 02:40:24.798 UTC [chaincode] handleMessage -> DEBU 2688 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 2698 0xc0036e5f80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.801 UTC [chaincode] HandleTransaction -> DEBU 2699 [3cf6d7e2] handling PUT_STATE from chaincode" -"2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 269a 0xc0036e5f80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.801 UTC [chaincode] HandleTransaction -> DEBU 269b [3cf6d7e2] Completed PUT_STATE. Sending RESPONSE" -"2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 269c 0xc0036e5f80 principal matched by identity 0" -"2019-07-20 02:40:24.802 UTC [msp.identity] Verify -> DEBU 269e Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| -00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" -"2019-07-20 02:40:24.802 UTC [chaincode] handleMessage -> DEBU 269d [3cf6d7e2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-07-20 02:40:24.803 UTC [chaincode] HandleTransaction -> DEBU 269f [3cf6d7e2] handling PUT_STATE from chaincode" -"2019-07-20 02:40:24.802 UTC [msp.identity] Verify -> DEBU 26a0 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| -00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| -00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| -00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| -00000040 ed cc 1b b6 9e 4e 52 |.....NR|" -"2019-07-20 02:40:24.803 UTC [chaincode] HandleTransaction -> DEBU 26a1 [3cf6d7e2] Completed PUT_STATE. Sending RESPONSE" -"2019-07-20 02:40:24.804 UTC [chaincode] handleMessage -> DEBU 26a3 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:24.804 UTC [chaincode] Notify -> DEBU 26a4 [3cf6d7e2] notifying Txid:3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, channelID:businesschannel" -"2019-07-20 02:40:24.804 UTC [chaincode] Execute -> DEBU 26a5 Exit" -"2019-07-20 02:40:24.804 UTC [endorser] callChaincode -> INFO 26a6 [businesschannel][3cf6d7e2] Exit chaincode: name:"exp02" (18ms)" -"2019-07-20 02:40:24.804 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 26a7 Simulation completed, getting simulation results" -"2019-07-20 02:40:24.804 UTC [lockbasedtxmgr] Done -> DEBU 26a8 Done with transaction simulation / query execution [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" -"2019-07-20 02:40:24.804 UTC [endorser] SimulateProposal -> DEBU 26a9 [businesschannel][3cf6d7e2] Exit" -"2019-07-20 02:40:24.804 UTC [endorser] endorseProposal -> DEBU 26aa [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:24.804 UTC [endorser] endorseProposal -> DEBU 26ab [businesschannel][3cf6d7e2] escc for chaincode name:"exp02" is escc" -"2019-07-20 02:40:24.804 UTC [endorser] EndorseWithPlugin -> DEBU 26ac Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, chaincode: exp02}" -"2019-07-20 02:40:24.804 UTC [msp.identity] Sign -> DEBU 26ad Sign: plaintext: 0A20D3E5EF20BE3985D0A70F10BC9838...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:24.804 UTC [msp.identity] Sign -> DEBU 26ae Sign: digest: 4C3F23D107F594129EEAAB4C73111C5D8F880DCB0AF0F51BEE8DA03F26D71281 " -"2019-07-20 02:40:24.805 UTC [endorser] EndorseWithPlugin -> DEBU 26af Exiting {plugin: escc, channel: businesschannel, tx: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, chaincode: exp02}" -"2019-07-20 02:40:24.805 UTC [endorser] endorseProposal -> DEBU 26b0 [businesschannel][3cf6d7e2] Exit" -"2019-07-20 02:40:24.805 UTC [lockbasedtxmgr] Done -> DEBU 26b1 Done with transaction simulation / query execution [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" -"2019-07-20 02:40:24.806 UTC [endorser] func1 -> DEBU 26b2 Exit: request from 172.18.0.9:58360" -"2019-07-20 02:40:24.806 UTC [comm.grpc.server] 1 -> INFO 26b3 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58360 grpc.code=OK grpc.call_duration=30.9885ms -"2019-07-20 02:40:24.803 UTC [cauthdsl] func2 -> DEBU 26a2 0xc0036e5f80 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.807 UTC [cauthdsl] func1 -> DEBU 26b4 0xc0036e5f80 gate 1563590424800963900 evaluation succeeds" -"2019-07-20 02:40:24.807 UTC [policies] Evaluate -> DEBU 26b5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.807 UTC [policies] Evaluate -> DEBU 26b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.808 UTC [policies] Evaluate -> DEBU 26b7 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:24.808 UTC [policies] Evaluate -> DEBU 26b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:24.820 UTC [msp.identity] Verify -> DEBU 26b9 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| -00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" -"2019-07-20 02:40:24.820 UTC [msp.identity] Verify -> DEBU 26ba Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| -00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| -00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| -00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| -00000040 3d a4 49 5d c4 5d bb |=.I].].|" -"2019-07-20 02:40:24.822 UTC [msp] DeserializeIdentity -> DEBU 26bb Obtaining identity" -"2019-07-20 02:40:24.822 UTC [msp] DeserializeIdentity -> DEBU 26bc Obtaining identity" -"2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26be Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26bf Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:24.823 UTC [cauthdsl] func1 -> DEBU 26c3 0xc0036e1f60 gate 1563590424823548200 evaluation starts" -"2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c4 0xc0036e1f60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c5 0xc0036e1f60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c6 0xc0036e1f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c7 0xc0036e1f60 principal evaluation fails" -"2019-07-20 02:40:24.824 UTC [cauthdsl] func1 -> DEBU 26c8 0xc0036e1f60 gate 1563590424823548200 evaluation fails" -"2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:24.824 UTC [cauthdsl] func1 -> DEBU 26cc 0xc0038e07a0 gate 1563590424824490800 evaluation starts" -"2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26cd 0xc0038e07a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26ce 0xc0038e07a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26cf 0xc0038e07a0 principal matched by identity 0" -"2019-07-20 02:40:24.825 UTC [msp.identity] Verify -> DEBU 26d0 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| -00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" -"2019-07-20 02:40:24.825 UTC [msp.identity] Verify -> DEBU 26d1 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| -00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| -00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| -00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| -00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" -"2019-07-20 02:40:24.826 UTC [cauthdsl] func2 -> DEBU 26d2 0xc0038e07a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.826 UTC [cauthdsl] func1 -> DEBU 26d3 0xc0038e07a0 gate 1563590424824490800 evaluation succeeds" -"2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d6 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:24.827 UTC [msp] DeserializeIdentity -> DEBU 26d8 Obtaining identity" -"2019-07-20 02:40:24.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26d9 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26da Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:24.827 UTC [cauthdsl] func1 -> DEBU 26de 0xc0038e1880 gate 1563590424827881200 evaluation starts" -"2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26df 0xc0038e1880 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e0 0xc0038e1880 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e1 0xc0038e1880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e2 0xc0038e1880 principal evaluation fails" -"2019-07-20 02:40:24.828 UTC [cauthdsl] func1 -> DEBU 26e3 0xc0038e1880 gate 1563590424827881200 evaluation fails" -"2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:24.829 UTC [cauthdsl] func1 -> DEBU 26e7 0xc00393e0c0 gate 1563590424828998600 evaluation starts" -"2019-07-20 02:40:24.830 UTC [cauthdsl] func2 -> DEBU 26e8 0xc00393e0c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:24.831 UTC [cauthdsl] func2 -> DEBU 26e9 0xc00393e0c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:24.831 UTC [cauthdsl] func2 -> DEBU 26ea 0xc00393e0c0 principal matched by identity 0" -"2019-07-20 02:40:24.833 UTC [grpc] infof -> DEBU 26eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:24.833 UTC [grpc] infof -> DEBU 26ec transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:24.833 UTC [msp.identity] Verify -> DEBU 26ed Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| -00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" -"2019-07-20 02:40:24.834 UTC [msp.identity] Verify -> DEBU 26ee Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| -00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| -00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| -00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| -00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" -"2019-07-20 02:40:24.835 UTC [cauthdsl] func2 -> DEBU 26ef 0xc00393e0c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:24.835 UTC [cauthdsl] func1 -> DEBU 26f0 0xc00393e0c0 gate 1563590424828998600 evaluation succeeds" -"2019-07-20 02:40:24.835 UTC [policies] Evaluate -> DEBU 26f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f3 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:24.836 UTC [gossip.gossip] handleMessage -> DEBU 26f5 Exiting" -"2019-07-20 02:40:24.837 UTC [gossip.gossip] handleMessage -> DEBU 26f6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:24.838 UTC [msp.identity] Verify -> DEBU 26f7 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| -00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" -"2019-07-20 02:40:24.839 UTC [msp.identity] Verify -> DEBU 26f8 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| -00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| -00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| -00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| -00000040 bb 08 c9 6d 24 57 fb |...m$W.|" -"2019-07-20 02:40:24.839 UTC [msp] DeserializeIdentity -> DEBU 26f9 Obtaining identity" -"2019-07-20 02:40:24.839 UTC [gossip.gossip] handleMessage -> DEBU 26fa Exiting" -"2019-07-20 02:40:24.839 UTC [gossip.gossip] handleMessage -> DEBU 26fb Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.840 UTC [gossip.pull] HandleMessage -> DEBU 26fc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.840 UTC [gossip.gossip] handleMessage -> DEBU 26fd Exiting" -"2019-07-20 02:40:24.878 UTC [gossip.comm] func1 -> DEBU 26fe Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.878 UTC [gossip.gossip] handleMessage -> DEBU 26ff Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.880 UTC [msp] DeserializeIdentity -> DEBU 2700 Obtaining identity" -"2019-07-20 02:40:24.880 UTC [msp] DeserializeIdentity -> DEBU 2701 Obtaining identity" -"2019-07-20 02:40:24.881 UTC [gossip.gossip] handleMessage -> DEBU 2702 Exiting" -"2019-07-20 02:40:24.886 UTC [gossip.comm] func1 -> DEBU 2703 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:24.886 UTC [gossip.gossip] handleMessage -> DEBU 2704 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:24.887 UTC [msp.identity] Verify -> DEBU 2705 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -"2019-07-20 02:40:24.887 UTC [msp.identity] Verify -> DEBU 2706 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -00000040 93 08 2f 55 cd 66 |../U.f|" -"2019-07-20 02:40:24.887 UTC [gossip.gossip] handleMessage -> DEBU 2707 Exiting" -"2019-07-20 02:40:24.893 UTC [gossip.comm] func1 -> DEBU 2708 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:24.893 UTC [gossip.gossip] handleMessage -> DEBU 270a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:24.894 UTC [msp.identity] Verify -> DEBU 270b Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -"2019-07-20 02:40:24.894 UTC [msp.identity] Verify -> DEBU 270c Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -00000040 93 08 2f 55 cd 66 |../U.f|" -"2019-07-20 02:40:24.893 UTC [gossip.comm] func1 -> DEBU 2709 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:24.894 UTC [msp] DeserializeIdentity -> DEBU 270d Obtaining identity" -"2019-07-20 02:40:24.895 UTC [gossip.gossip] handleMessage -> DEBU 270e Exiting" -"2019-07-20 02:40:24.895 UTC [gossip.gossip] handleMessage -> DEBU 270f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:24.895 UTC [msp.identity] Verify -> DEBU 2710 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -"2019-07-20 02:40:24.895 UTC [msp.identity] Verify -> DEBU 2711 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -00000040 93 08 2f 55 cd 66 |../U.f|" -"2019-07-20 02:40:24.896 UTC [msp] DeserializeIdentity -> DEBU 2712 Obtaining identity" -"2019-07-20 02:40:24.896 UTC [gossip.gossip] handleMessage -> DEBU 2713 Exiting" -"2019-07-20 02:40:24.902 UTC [gossip.comm] func1 -> DEBU 2714 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.903 UTC [gossip.gossip] handleMessage -> DEBU 2715 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.903 UTC [gossip.pull] HandleMessage -> DEBU 2716 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:24.903 UTC [gossip.pull] SendDigest -> DEBU 2717 Sending BLOCK_MSG digest: [3 1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:24.904 UTC [gossip.gossip] handleMessage -> DEBU 2718 Exiting" -"2019-07-20 02:40:25.024 UTC [endorser] ProcessProposal -> DEBU 2719 Entering: request from 172.18.0.9:58366" -"2019-07-20 02:40:25.025 UTC [protoutils] ValidateProposalMessage -> DEBU 271a ValidateProposalMessage starts for signed proposal 0xc0029a5d10" -"2019-07-20 02:40:25.025 UTC [protoutils] validateChannelHeader -> DEBU 271b validateChannelHeader info: header type 3" -"2019-07-20 02:40:25.026 UTC [protoutils] checkSignatureFromCreator -> DEBU 271c begin" -"2019-07-20 02:40:25.026 UTC [msp] GetManagerForChain -> DEBU 271d Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:25.026 UTC [msp] DeserializeIdentity -> DEBU 271e Obtaining identity" -"2019-07-20 02:40:25.027 UTC [msp.identity] newIdentity -> DEBU 271f Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL -MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG -cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh -Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw -WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN -U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv -cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb -r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk -RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD -VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI -zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw -TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +"2019-09-24 00:25:05.723 UTC [msp.identity] Verify -> DEBU 82b Verify: sig = 00000000 30 44 02 20 22 92 8f e7 bb b4 26 28 98 10 c6 38 |0D. ".....&(...8| +00000010 05 31 5e c9 88 af 17 86 68 2c 4c 4e d8 b9 01 02 |.1^.....h,LN....| +00000020 60 6e 8b 31 02 20 5b 2d af 75 4e c2 a4 9f 04 76 |`n.1. [-.uN....v| +00000030 9f 94 66 8d 6e 70 9e 37 54 2d ce 74 d1 89 55 ff |..f.np.7T-.t..U.| +00000040 f3 90 79 56 38 35 |..yV85|" +"2019-09-24 00:25:05.723 UTC [gossip.discovery] handleAliveMessage -> DEBU 82c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:05.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 82d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:05.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 82e updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:05.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 82f Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:05.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 830 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:05.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 831 Exiting" +"2019-09-24 00:25:05.723 UTC [gossip.discovery] handleAliveMessage -> DEBU 832 Exiting" +"2019-09-24 00:25:05.724 UTC [gossip.discovery] handleMsgFromComm -> DEBU 833 Exiting" +"2019-09-24 00:25:05.725 UTC [gossip.discovery] sendMemResponse -> DEBU 834 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:05.725 UTC [msp] DeserializeIdentity -> DEBU 835 Obtaining identity" +"2019-09-24 00:25:05.725 UTC [msp] DeserializeIdentity -> DEBU 836 Obtaining identity" +"2019-09-24 00:25:05.725 UTC [gossip.comm] Send -> DEBU 837 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:05.726 UTC [gossip.comm] sendToEndpoint -> DEBU 838 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-09-24 00:25:05.726 UTC [gossip.comm] sendToEndpoint -> DEBU 839 Exiting" +"2019-09-24 00:25:05.726 UTC [gossip.discovery] sendMemResponse -> DEBU 83a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\022" signature:"0D\002 \032\017-\336\265\302z\337`\362\2674IA#X\226\342\300\301\224TV\353\013\275o\354\354Jx&\002 s\030\363\301\035\2575CH\216\022MW\236/\206\221\272A\2107\342\235\366\202\021\255\206\350P\034s" secret_envelope: > alive: > " +"2019-09-24 00:25:06.146 UTC [gossip.gossip] handleMessage -> DEBU 83b Entering, 172.18.0.8:34556 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:06.146 UTC [msp] DeserializeIdentity -> DEBU 83c Obtaining identity" +"2019-09-24 00:25:06.146 UTC [msp] DeserializeIdentity -> DEBU 83d Obtaining identity" +"2019-09-24 00:25:06.146 UTC [gossip.gossip] handleMessage -> DEBU 83e Exiting" +"2019-09-24 00:25:06.150 UTC [gossip.gossip] handleMessage -> DEBU 83f Entering, 172.18.0.8:34556 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 00:25:06.151 UTC [msp] DeserializeIdentity -> DEBU 840 Obtaining identity" +"2019-09-24 00:25:06.151 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 841 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:06.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 842 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:06.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 843 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 844 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 845 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 846 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:06.152 UTC [cauthdsl] func1 -> DEBU 847 0xc00396a380 gate 1569284706152243800 evaluation starts" +"2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 848 0xc00396a380 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 849 0xc00396a380 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 84a 0xc00396a380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 84b 0xc00396a380 principal evaluation fails" +"2019-09-24 00:25:06.152 UTC [cauthdsl] func1 -> DEBU 84c 0xc00396a380 gate 1569284706152243800 evaluation fails" +"2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 84d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 84e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:06.152 UTC [policies] Evaluate -> DEBU 84f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:06.152 UTC [cauthdsl] func1 -> DEBU 850 0xc00396abc0 gate 1569284706152716600 evaluation starts" +"2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 851 0xc00396abc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 852 0xc00396abc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:06.152 UTC [cauthdsl] func2 -> DEBU 853 0xc00396abc0 principal matched by identity 0" +"2019-09-24 00:25:06.152 UTC [msp.identity] Verify -> DEBU 854 Verify: digest = 00000000 24 a6 67 ec 93 80 1b 1a f8 a7 1f 3f 02 93 6b 08 |$.g........?..k.| +00000010 3d 1c 5b eb 65 f9 87 47 b6 92 d6 53 36 d1 44 ec |=.[.e..G...S6.D.|" +"2019-09-24 00:25:06.153 UTC [msp.identity] Verify -> DEBU 855 Verify: sig = 00000000 30 44 02 20 5a 67 eb 00 01 36 77 60 49 3a cf c9 |0D. Zg...6w`I:..| +00000010 01 18 a3 c8 c6 e9 0a 53 c0 8e 4e 1a 49 bc 73 1c |.......S..N.I.s.| +00000020 b1 8d e9 d5 02 20 7a 22 f4 df cc 5a 24 c7 53 22 |..... z"...Z$.S"| +00000030 18 57 47 00 77 c6 6d 00 59 78 66 79 fa cd 47 0d |.WG.w.m.Yxfy..G.| +00000040 b9 e2 9d e3 78 4a |....xJ|" +"2019-09-24 00:25:06.153 UTC [cauthdsl] func2 -> DEBU 856 0xc00396abc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:06.153 UTC [cauthdsl] func1 -> DEBU 857 0xc00396abc0 gate 1569284706152716600 evaluation succeeds" +"2019-09-24 00:25:06.153 UTC [policies] Evaluate -> DEBU 858 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:06.154 UTC [policies] Evaluate -> DEBU 859 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:06.154 UTC [policies] Evaluate -> DEBU 85a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:06.154 UTC [policies] Evaluate -> DEBU 85b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:06.154 UTC [msp] DeserializeIdentity -> DEBU 85c Obtaining identity" +"2019-09-24 00:25:06.154 UTC [msp] DeserializeIdentity -> DEBU 85d Obtaining identity" +"2019-09-24 00:25:06.155 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 85e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:06.155 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 85f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:06.155 UTC [policies] Evaluate -> DEBU 860 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:06.155 UTC [policies] Evaluate -> DEBU 861 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:06.155 UTC [policies] Evaluate -> DEBU 862 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:06.155 UTC [cauthdsl] func1 -> DEBU 863 0xc00396bda0 gate 1569284706155403800 evaluation starts" +"2019-09-24 00:25:06.155 UTC [cauthdsl] func2 -> DEBU 864 0xc00396bda0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:06.155 UTC [cauthdsl] func2 -> DEBU 865 0xc00396bda0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:06.155 UTC [cauthdsl] func2 -> DEBU 866 0xc00396bda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:06.155 UTC [cauthdsl] func2 -> DEBU 867 0xc00396bda0 principal evaluation fails" +"2019-09-24 00:25:06.155 UTC [cauthdsl] func1 -> DEBU 868 0xc00396bda0 gate 1569284706155403800 evaluation fails" +"2019-09-24 00:25:06.155 UTC [policies] Evaluate -> DEBU 869 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:06.155 UTC [policies] Evaluate -> DEBU 86a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:06.156 UTC [policies] Evaluate -> DEBU 86b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:06.156 UTC [cauthdsl] func1 -> DEBU 86c 0xc00397a5e0 gate 1569284706156108400 evaluation starts" +"2019-09-24 00:25:06.156 UTC [cauthdsl] func2 -> DEBU 86d 0xc00397a5e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:06.156 UTC [cauthdsl] func2 -> DEBU 86e 0xc00397a5e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:06.156 UTC [cauthdsl] func2 -> DEBU 86f 0xc00397a5e0 principal matched by identity 0" +"2019-09-24 00:25:06.156 UTC [msp.identity] Verify -> DEBU 870 Verify: digest = 00000000 24 a6 67 ec 93 80 1b 1a f8 a7 1f 3f 02 93 6b 08 |$.g........?..k.| +00000010 3d 1c 5b eb 65 f9 87 47 b6 92 d6 53 36 d1 44 ec |=.[.e..G...S6.D.|" +"2019-09-24 00:25:06.156 UTC [msp.identity] Verify -> DEBU 871 Verify: sig = 00000000 30 44 02 20 5a 67 eb 00 01 36 77 60 49 3a cf c9 |0D. Zg...6w`I:..| +00000010 01 18 a3 c8 c6 e9 0a 53 c0 8e 4e 1a 49 bc 73 1c |.......S..N.I.s.| +00000020 b1 8d e9 d5 02 20 7a 22 f4 df cc 5a 24 c7 53 22 |..... z"...Z$.S"| +00000030 18 57 47 00 77 c6 6d 00 59 78 66 79 fa cd 47 0d |.WG.w.m.Yxfy..G.| +00000040 b9 e2 9d e3 78 4a |....xJ|" +"2019-09-24 00:25:06.158 UTC [cauthdsl] func2 -> DEBU 872 0xc00397a5e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:06.158 UTC [cauthdsl] func1 -> DEBU 873 0xc00397a5e0 gate 1569284706156108400 evaluation succeeds" +"2019-09-24 00:25:06.158 UTC [policies] Evaluate -> DEBU 874 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:06.158 UTC [policies] Evaluate -> DEBU 875 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:06.158 UTC [policies] Evaluate -> DEBU 876 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:06.159 UTC [policies] Evaluate -> DEBU 877 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:06.159 UTC [gossip.gossip] handleMessage -> DEBU 878 Exiting" +"2019-09-24 00:25:06.168 UTC [msp] DeserializeIdentity -> DEBU 879 Obtaining identity" +"2019-09-24 00:25:06.169 UTC [msp] DeserializeIdentity -> DEBU 87a Obtaining identity" +"2019-09-24 00:25:06.169 UTC [gossip.comm] Send -> DEBU 87b Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 2 peers" +"2019-09-24 00:25:06.169 UTC [msp] DeserializeIdentity -> DEBU 87c Obtaining identity" +"2019-09-24 00:25:06.169 UTC [gossip.comm] sendToEndpoint -> DEBU 87d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 00:25:06.169 UTC [msp] DeserializeIdentity -> DEBU 87e Obtaining identity" +"2019-09-24 00:25:06.169 UTC [gossip.comm] sendToEndpoint -> DEBU 87f Exiting" +"2019-09-24 00:25:06.169 UTC [gossip.comm] sendToEndpoint -> DEBU 880 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 00:25:06.170 UTC [gossip.comm] sendToEndpoint -> DEBU 881 Exiting" +"2019-09-24 00:25:06.219 UTC [gossip.channel] reportMembershipChanges -> INFO 882 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ]]" +"2019-09-24 00:25:07.164 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 883 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.164 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 884 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.164 UTC [policies] Evaluate -> DEBU 885 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 00:25:07.164 UTC [policies] Evaluate -> DEBU 886 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.164 UTC [policies] Evaluate -> DEBU 887 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:25:07.164 UTC [msp] DeserializeIdentity -> DEBU 888 Obtaining identity" +"2019-09-24 00:25:07.164 UTC [msp.identity] newIdentity -> DEBU 889 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO +CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM +SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q +1A== -----END CERTIFICATE-----" -"2019-07-20 02:40:25.028 UTC [protoutils] checkSignatureFromCreator -> DEBU 2720 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -"2019-07-20 02:40:25.028 UTC [msp] Validate -> DEBU 2721 MSP Org2MSP validating identity" -"2019-07-20 02:40:25.029 UTC [msp] getCertificationChain -> DEBU 2722 MSP Org2MSP getting certification chain" -"2019-07-20 02:40:25.029 UTC [protoutils] checkSignatureFromCreator -> DEBU 2723 creator is valid" -"2019-07-20 02:40:25.029 UTC [msp.identity] Verify -> DEBU 2724 Verify: digest = 00000000 1a 72 dc bd 22 9d ce 42 23 dc 31 1e cb ab c5 44 |.r.."..B#.1....D| -00000010 32 91 e1 c3 ca 33 1a 63 3d e3 8d 58 28 7d b5 12 |2....3.c=..X(}..|" -"2019-07-20 02:40:25.030 UTC [msp.identity] Verify -> DEBU 2725 Verify: sig = 00000000 30 44 02 20 66 25 b5 25 13 52 60 f0 15 e4 d2 17 |0D. f%.%.R`.....| -00000010 df a6 46 b6 09 c6 0a d5 db c7 c3 3b 8a 81 e0 f4 |..F........;....| -00000020 f4 71 03 49 02 20 5d 06 96 80 7b 06 1c 2e fa 98 |.q.I. ]...{.....| -00000030 9a 11 ca b9 10 35 3b 52 ac 86 12 9a 90 11 fa a7 |.....5;R........| -00000040 62 a9 01 cd 92 74 |b....t|" -"2019-07-20 02:40:25.030 UTC [protoutils] checkSignatureFromCreator -> DEBU 2726 exits successfully" -"2019-07-20 02:40:25.030 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2727 validateChaincodeProposalMessage starts for proposal 0xc000122f50, header 0xc00080e140" -"2019-07-20 02:40:25.030 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2728 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-07-20 02:40:25.031 UTC [endorser] preProcess -> DEBU 2729 [businesschannel][fe4517b7] processing txid: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a" -"2019-07-20 02:40:25.031 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 272a retrieveTransactionByID() - txId = [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" -"2019-07-20 02:40:25.031 UTC [aclmgmt] CheckACL -> DEBU 272b acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-07-20 02:40:25.032 UTC [aclmgmt] CheckACL -> DEBU 272c acl check(/Channel/Application/Writers)" -"2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:25.033 UTC [cauthdsl] func1 -> DEBU 2730 0xc003e0d260 gate 1563590425033105300 evaluation starts" -"2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2731 0xc003e0d260 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2732 0xc003e0d260 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2733 0xc003e0d260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:25.034 UTC [cauthdsl] func2 -> DEBU 2734 0xc003e0d260 principal evaluation fails" -"2019-07-20 02:40:25.034 UTC [cauthdsl] func1 -> DEBU 2735 0xc003e0d260 gate 1563590425033105300 evaluation fails" -"2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2736 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2737 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2738 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-07-20 02:40:25.035 UTC [cauthdsl] func1 -> DEBU 2739 0xc003e0dac0 gate 1563590425034719300 evaluation starts" -"2019-07-20 02:40:25.035 UTC [cauthdsl] func2 -> DEBU 273a 0xc003e0dac0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:25.035 UTC [cauthdsl] func2 -> DEBU 273b 0xc003e0dac0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:25.035 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 273c Checking if identity satisfies MEMBER role for Org2MSP" -"2019-07-20 02:40:25.035 UTC [msp] Validate -> DEBU 273d MSP Org2MSP validating identity" -"2019-07-20 02:40:25.035 UTC [msp] getCertificationChain -> DEBU 273e MSP Org2MSP getting certification chain" -"2019-07-20 02:40:25.036 UTC [cauthdsl] func2 -> DEBU 273f 0xc003e0dac0 principal matched by identity 0" -"2019-07-20 02:40:25.036 UTC [msp.identity] Verify -> DEBU 2740 Verify: digest = 00000000 1a 72 dc bd 22 9d ce 42 23 dc 31 1e cb ab c5 44 |.r.."..B#.1....D| -00000010 32 91 e1 c3 ca 33 1a 63 3d e3 8d 58 28 7d b5 12 |2....3.c=..X(}..|" -"2019-07-20 02:40:25.036 UTC [msp.identity] Verify -> DEBU 2741 Verify: sig = 00000000 30 44 02 20 66 25 b5 25 13 52 60 f0 15 e4 d2 17 |0D. f%.%.R`.....| -00000010 df a6 46 b6 09 c6 0a d5 db c7 c3 3b 8a 81 e0 f4 |..F........;....| -00000020 f4 71 03 49 02 20 5d 06 96 80 7b 06 1c 2e fa 98 |.q.I. ]...{.....| -00000030 9a 11 ca b9 10 35 3b 52 ac 86 12 9a 90 11 fa a7 |.....5;R........| -00000040 62 a9 01 cd 92 74 |b....t|" -"2019-07-20 02:40:25.037 UTC [cauthdsl] func2 -> DEBU 2742 0xc003e0dac0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:25.037 UTC [cauthdsl] func1 -> DEBU 2743 0xc003e0dac0 gate 1563590425034719300 evaluation succeeds" -"2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2744 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2745 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2746 Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2747 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:25.037 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2748 constructing new tx simulator" -"2019-07-20 02:40:25.038 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2749 constructing new tx simulator txid = [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" -"2019-07-20 02:40:25.038 UTC [endorser] SimulateProposal -> DEBU 274a [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:25.038 UTC [stateleveldb] GetState -> DEBU 274b GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:25.038 UTC [ccprovider] GetChaincodeData -> DEBU 274c Getting chaincode data for from cache" -"2019-07-20 02:40:25.038 UTC [endorser] callChaincode -> INFO 274d [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:25.039 UTC [chaincode] Execute -> DEBU 274e Entry" -"2019-07-20 02:40:25.040 UTC [chaincode] handleMessage -> DEBU 274f [fe4517b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:25.040 UTC [chaincode] HandleTransaction -> DEBU 2750 [fe4517b7] handling GET_STATE from chaincode" -"2019-07-20 02:40:25.040 UTC [chaincode] HandleGetState -> DEBU 2751 [fe4517b7] getting state for chaincode exp02, key a, channel businesschannel" -"2019-07-20 02:40:25.040 UTC [stateleveldb] GetState -> DEBU 2752 GetState(). ns=exp02, key=a" -"2019-07-20 02:40:25.040 UTC [chaincode] HandleTransaction -> DEBU 2753 [fe4517b7] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:25.041 UTC [chaincode] handleMessage -> DEBU 2754 [fe4517b7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:25.042 UTC [chaincode] Notify -> DEBU 2755 [fe4517b7] notifying Txid:fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, channelID:businesschannel" -"2019-07-20 02:40:25.045 UTC [gossip.comm] func1 -> DEBU 2756 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:25.046 UTC [gossip.gossip] handleMessage -> DEBU 2757 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 2758 Obtaining identity" -"2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 2759 Obtaining identity" -"2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 275a Obtaining identity" -"2019-07-20 02:40:25.047 UTC [gossip.gossip] handleMessage -> DEBU 275b Exiting" -"2019-07-20 02:40:25.047 UTC [chaincode] Execute -> DEBU 275c Exit" -"2019-07-20 02:40:25.047 UTC [endorser] callChaincode -> INFO 275d [businesschannel][fe4517b7] Exit chaincode: name:"exp02" (9ms)" -"2019-07-20 02:40:25.047 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 275e Simulation completed, getting simulation results" -"2019-07-20 02:40:25.048 UTC [lockbasedtxmgr] Done -> DEBU 275f Done with transaction simulation / query execution [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" -"2019-07-20 02:40:25.048 UTC [endorser] SimulateProposal -> DEBU 2760 [businesschannel][fe4517b7] Exit" -"2019-07-20 02:40:25.048 UTC [endorser] endorseProposal -> DEBU 2761 [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:25.048 UTC [endorser] endorseProposal -> DEBU 2762 [businesschannel][fe4517b7] escc for chaincode name:"exp02" is escc" -"2019-07-20 02:40:25.048 UTC [endorser] EndorseWithPlugin -> DEBU 2763 Entering endorsement for {plugin: escc, channel: businesschannel, tx: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, chaincode: exp02}" -"2019-07-20 02:40:25.048 UTC [msp.identity] Sign -> DEBU 2764 Sign: plaintext: 0A2086BA17C4AAFC9D029031ABC2FFF8...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:25.048 UTC [msp.identity] Sign -> DEBU 2765 Sign: digest: B49E3AD54A8ED894AD092B2726AC8FBC2C4B98C786E0D4605E7E46CC2F7AAA90 " -"2019-07-20 02:40:25.049 UTC [endorser] EndorseWithPlugin -> DEBU 2766 Exiting {plugin: escc, channel: businesschannel, tx: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, chaincode: exp02}" -"2019-07-20 02:40:25.049 UTC [endorser] endorseProposal -> DEBU 2767 [businesschannel][fe4517b7] Exit" -"2019-07-20 02:40:25.050 UTC [lockbasedtxmgr] Done -> DEBU 2768 Done with transaction simulation / query execution [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" -"2019-07-20 02:40:25.050 UTC [endorser] func1 -> DEBU 2769 Exit: request from 172.18.0.9:58366" -"2019-07-20 02:40:25.050 UTC [comm.grpc.server] 1 -> INFO 276a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58366 grpc.code=OK grpc.call_duration=26.8375ms -"2019-07-20 02:40:25.051 UTC [gossip.comm] func1 -> DEBU 276b Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:25.051 UTC [gossip.gossip] handleMessage -> DEBU 276c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:25.052 UTC [msp] DeserializeIdentity -> DEBU 276d Obtaining identity" -"2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 276e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 276f Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2770 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2771 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2772 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2773 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:25.052 UTC [cauthdsl] func1 -> DEBU 2774 0xc003fcb870 gate 1563590425052956900 evaluation starts" -"2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2775 0xc003fcb870 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2776 0xc003fcb870 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2777 0xc003fcb870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2778 0xc003fcb870 principal evaluation fails" -"2019-07-20 02:40:25.053 UTC [cauthdsl] func1 -> DEBU 2779 0xc003fcb870 gate 1563590425052956900 evaluation fails" -"2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:25.053 UTC [cauthdsl] func1 -> DEBU 277d 0xc00400e0b0 gate 1563590425053935600 evaluation starts" -"2019-07-20 02:40:25.054 UTC [cauthdsl] func2 -> DEBU 277e 0xc00400e0b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:25.054 UTC [cauthdsl] func2 -> DEBU 277f 0xc00400e0b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:25.057 UTC [cauthdsl] func2 -> DEBU 2780 0xc00400e0b0 principal matched by identity 0" -"2019-07-20 02:40:25.057 UTC [grpc] infof -> DEBU 2781 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:25.057 UTC [msp.identity] Verify -> DEBU 2782 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -"2019-07-20 02:40:25.058 UTC [msp.identity] Verify -> DEBU 2783 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -00000040 a3 bb 17 85 f1 b2 |......|" -"2019-07-20 02:40:25.059 UTC [cauthdsl] func2 -> DEBU 2784 0xc00400e0b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:25.059 UTC [cauthdsl] func1 -> DEBU 2785 0xc00400e0b0 gate 1563590425053935600 evaluation succeeds" -"2019-07-20 02:40:25.059 UTC [policies] Evaluate -> DEBU 2786 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2787 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2788 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2789 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:25.060 UTC [msp] DeserializeIdentity -> DEBU 278a Obtaining identity" -"2019-07-20 02:40:25.060 UTC [gossip.gossip] handleMessage -> DEBU 278b Exiting" -"2019-07-20 02:40:25.061 UTC [gossip.comm] func1 -> DEBU 278c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:25.061 UTC [gossip.gossip] handleMessage -> DEBU 278d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:25.061 UTC [msp] DeserializeIdentity -> DEBU 278e Obtaining identity" -"2019-07-20 02:40:25.062 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 278f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:25.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2791 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:25.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2792 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2793 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:25.062 UTC [grpc] infof -> DEBU 2790 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2794 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2795 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:25.065 UTC [cauthdsl] func1 -> DEBU 2796 0xc003e81ea0 gate 1563590425064986200 evaluation starts" -"2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2797 0xc003e81ea0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2798 0xc003e81ea0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2799 0xc003e81ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:25.066 UTC [cauthdsl] func2 -> DEBU 279a 0xc003e81ea0 principal evaluation fails" -"2019-07-20 02:40:25.066 UTC [cauthdsl] func1 -> DEBU 279b 0xc003e81ea0 gate 1563590425064986200 evaluation fails" -"2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:25.069 UTC [cauthdsl] func1 -> DEBU 279f 0xc0006386e0 gate 1563590425068282800 evaluation starts" -"2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a0 0xc0006386e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a1 0xc0006386e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a2 0xc0006386e0 principal matched by identity 0" -"2019-07-20 02:40:25.070 UTC [msp.identity] Verify -> DEBU 27a3 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -"2019-07-20 02:40:25.071 UTC [msp.identity] Verify -> DEBU 27a4 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -00000040 a3 bb 17 85 f1 b2 |......|" -"2019-07-20 02:40:25.072 UTC [cauthdsl] func2 -> DEBU 27a5 0xc0006386e0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:25.072 UTC [cauthdsl] func1 -> DEBU 27a6 0xc0006386e0 gate 1563590425068282800 evaluation succeeds" -"2019-07-20 02:40:25.072 UTC [policies] Evaluate -> DEBU 27a7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:25.073 UTC [policies] Evaluate -> DEBU 27a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:25.074 UTC [policies] Evaluate -> DEBU 27a9 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:25.074 UTC [policies] Evaluate -> DEBU 27aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:25.075 UTC [msp] DeserializeIdentity -> DEBU 27ab Obtaining identity" -"2019-07-20 02:40:25.075 UTC [gossip.gossip] handleMessage -> DEBU 27ac Exiting" -"2019-07-20 02:40:25.183 UTC [gossip.comm] func1 -> DEBU 27ad Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:25.183 UTC [gossip.gossip] handleMessage -> DEBU 27ae Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27af Obtaining identity" -"2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27b0 Obtaining identity" -"2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27b1 Obtaining identity" -"2019-07-20 02:40:25.186 UTC [gossip.gossip] handleMessage -> DEBU 27b2 Exiting" -"2019-07-20 02:40:25.192 UTC [gossip.comm] func1 -> DEBU 27b3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:25.193 UTC [gossip.gossip] handleMessage -> DEBU 27b4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:25.193 UTC [msp] DeserializeIdentity -> DEBU 27b5 Obtaining identity" -"2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27b6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b7 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b8 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:25.196 UTC [cauthdsl] func1 -> DEBU 27bc 0xc0007504a0 gate 1563590425196036400 evaluation starts" -"2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27bd 0xc0007504a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27be 0xc0007504a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27bf 0xc0007504a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27c0 0xc0007504a0 principal evaluation fails" -"2019-07-20 02:40:25.196 UTC [cauthdsl] func1 -> DEBU 27c1 0xc0007504a0 gate 1563590425196036400 evaluation fails" -"2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:25.197 UTC [cauthdsl] func1 -> DEBU 27c5 0xc000750ce0 gate 1563590425196986500 evaluation starts" -"2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c6 0xc000750ce0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c7 0xc000750ce0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c8 0xc000750ce0 principal matched by identity 0" -"2019-07-20 02:40:25.197 UTC [msp.identity] Verify -> DEBU 27c9 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| -00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" -"2019-07-20 02:40:25.197 UTC [msp.identity] Verify -> DEBU 27ca Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| -00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| -00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| -00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| -00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" -"2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27cb 0xc000750ce0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:25.197 UTC [cauthdsl] func1 -> DEBU 27cc 0xc000750ce0 gate 1563590425196986500 evaluation succeeds" -"2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27cf Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:25.198 UTC [policies] Evaluate -> DEBU 27d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:25.198 UTC [msp] DeserializeIdentity -> DEBU 27d1 Obtaining identity" -"2019-07-20 02:40:25.198 UTC [gossip.gossip] handleMessage -> DEBU 27d2 Exiting" -"2019-07-20 02:40:26.844 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27d3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:26.845 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27d4 Got block validation policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:26.846 UTC [policies] Evaluate -> DEBU 27d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-07-20 02:40:26.846 UTC [policies] Evaluate -> DEBU 27d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:26.847 UTC [policies] Evaluate -> DEBU 27d7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:40:26.847 UTC [cauthdsl] func1 -> DEBU 27d8 0xc000639f40 gate 1563590426847433500 evaluation starts" -"2019-07-20 02:40:26.847 UTC [cauthdsl] func2 -> DEBU 27d9 0xc000639f40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:26.848 UTC [cauthdsl] func2 -> DEBU 27da 0xc000639f40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:26.848 UTC [cauthdsl] func2 -> DEBU 27db 0xc000639f40 principal matched by identity 0" -"2019-07-20 02:40:26.848 UTC [msp.identity] Verify -> DEBU 27dc Verify: digest = 00000000 a0 cc 22 24 a6 fd 41 ca a8 ab e4 54 29 1b 01 20 |.."$..A....T).. | -00000010 a1 aa a0 ab 2c b6 6c 16 c4 77 ff 3d e4 2f 4b 00 |....,.l..w.=./K.|" -"2019-07-20 02:40:26.849 UTC [msp.identity] Verify -> DEBU 27dd Verify: sig = 00000000 30 44 02 20 49 e5 40 e2 01 5a 4d b2 0b b1 d9 96 |0D. I.@..ZM.....| -00000010 eb ef c0 39 d8 5f 4a bf 19 95 66 d7 1b 7e 23 e4 |...9._J...f..~#.| -00000020 86 75 35 11 02 20 4a bc 32 6c e8 b3 58 8f 09 cd |.u5.. J.2l..X...| -00000030 cb 09 71 17 d5 13 8e 95 96 9a 8c 1d d1 91 07 86 |..q.............| -00000040 93 23 b1 9d cd 6e |.#...n|" -"2019-07-20 02:40:26.849 UTC [cauthdsl] func2 -> DEBU 27de 0xc000639f40 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:26.850 UTC [cauthdsl] func1 -> DEBU 27df 0xc000639f40 gate 1563590426847433500 evaluation succeeds" -"2019-07-20 02:40:26.850 UTC [policies] Evaluate -> DEBU 27e0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:26.850 UTC [policies] Evaluate -> DEBU 27e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:26.851 UTC [policies] Evaluate -> DEBU 27e2 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:26.851 UTC [policies] Evaluate -> DEBU 27e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:26.852 UTC [blocksProvider] DeliverBlocks -> DEBU 27e4 [businesschannel] Adding payload to local buffer, blockNum = [4]" -"2019-07-20 02:40:26.852 UTC [gossip.state] addPayload -> DEBU 27e5 [businesschannel] Adding payload to local buffer, blockNum = [4]" -"2019-07-20 02:40:26.853 UTC [gossip.state] addPayload -> DEBU 27e6 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-07-20 02:40:26.853 UTC [blocksProvider] DeliverBlocks -> DEBU 27e8 [businesschannel] Gossiping block [4], peers number [3]" -"2019-07-20 02:40:26.853 UTC [gossip.state] deliverPayloads -> DEBU 27e7 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" -"2019-07-20 02:40:26.854 UTC [gossip.state] deliverPayloads -> DEBU 27e9 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" -"2019-07-20 02:40:26.854 UTC [gossip.privdata] StoreBlock -> INFO 27ea [businesschannel] Received block [4] from buffer" -"2019-07-20 02:40:26.857 UTC [gossip.privdata] StoreBlock -> DEBU 27eb [businesschannel] Validating block [4]" -"2019-07-20 02:40:26.858 UTC [committer.txvalidator] Validate -> DEBU 27ec [businesschannel] START Block Validation for block [4]" -"2019-07-20 02:40:26.858 UTC [committer.txvalidator] Validate -> DEBU 27ed expecting 1 block validation responses" -"2019-07-20 02:40:26.858 UTC [committer.txvalidator] validateTx -> DEBU 27ee [businesschannel] validateTx starts for block 0xc0004858c0 env 0xc0028bdc20 txn 0" -"2019-07-20 02:40:26.859 UTC [protoutils] ValidateTransaction -> DEBU 27ef ValidateTransactionEnvelope starts for envelope 0xc0028bdc20" -"2019-07-20 02:40:26.859 UTC [protoutils] ValidateTransaction -> DEBU 27f0 Header is channel_header:"\010\003\032\014\010\230\376\311\351\005\020\200\222\363\360\002\"\017businesschannel*@3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030ZM\234\320}XST\361\312\344\252\267\352Gt\026d\332\211=k_\312" " -"2019-07-20 02:40:26.859 UTC [protoutils] validateChannelHeader -> DEBU 27f1 validateChannelHeader info: header type 3" -"2019-07-20 02:40:26.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f2 begin" -"2019-07-20 02:40:26.860 UTC [msp] GetManagerForChain -> DEBU 27f3 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:26.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f4 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:26.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f5 creator is valid" -"2019-07-20 02:40:26.861 UTC [msp.identity] Verify -> DEBU 27f6 Verify: digest = 00000000 97 03 8b 29 3b d7 61 87 c0 b1 9e e0 d5 e5 59 bf |...);.a.......Y.| -00000010 90 93 46 3e 70 6d ee 67 fe cd 38 32 fe 22 66 b0 |..F>pm.g..82."f.|" -"2019-07-20 02:40:26.862 UTC [msp.identity] Verify -> DEBU 27f7 Verify: sig = 00000000 30 45 02 21 00 a8 a2 93 b5 4c 8c 0c 6b 3e 06 99 |0E.!.....L..k>..| -00000010 37 7b a3 55 44 c0 5e fc a4 0d f6 f7 d1 98 27 42 |7{.UD.^.......'B| -00000020 53 8c 9b 56 17 02 20 42 ff 25 02 18 bc cb 75 a0 |S..V.. B.%....u.| -00000030 32 02 be 09 df a4 6d ad 1b 05 12 07 ec 58 2d e3 |2.....m......X-.| -00000040 95 b0 80 c3 bc 80 99 |.......|" -"2019-07-20 02:40:26.862 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f8 exits successfully" -"2019-07-20 02:40:26.862 UTC [protoutils] validateEndorserTransaction -> DEBU 27f9 validateEndorserTransaction starts for data 0xc003bdf000, header channel_header:"\010\003\032\014\010\230\376\311\351\005\020\200\222\363\360\002\"\017businesschannel*@3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030ZM\234\320}XST\361\312\344\252\267\352Gt\026d\332\211=k_\312" " -"2019-07-20 02:40:26.863 UTC [protoutils] validateEndorserTransaction -> DEBU 27fa validateEndorserTransaction info: there are 1 actions" -"2019-07-20 02:40:26.863 UTC [protoutils] validateEndorserTransaction -> DEBU 27fb validateEndorserTransaction info: signature header is valid" -"2019-07-20 02:40:26.863 UTC [protoutils] ValidateTransaction -> DEBU 27fc ValidateTransactionEnvelope returns err %!s()" -"2019-07-20 02:40:26.863 UTC [committer.txvalidator] validateTx -> DEBU 27fd Transaction is for channel businesschannel" -"2019-07-20 02:40:26.863 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 27fe retrieveTransactionByID() - txId = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" -"2019-07-20 02:40:26.864 UTC [committer.txvalidator] validateTx -> DEBU 27ff Validating transaction vscc tx validate" -"2019-07-20 02:40:26.864 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2800 [businesschannel] VSCCValidateTx starts for bytes 0xc0004e2400" -"2019-07-20 02:40:26.864 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2801 constructing new query executor txid = [f398664c-20c2-4d41-9183-fecba403f08a]" -"2019-07-20 02:40:26.864 UTC [stateleveldb] GetState -> DEBU 2802 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:26.865 UTC [lockbasedtxmgr] Done -> DEBU 2803 Done with transaction simulation / query execution [f398664c-20c2-4d41-9183-fecba403f08a]" -"2019-07-20 02:40:26.865 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2804 Validating Tx 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" -"2019-07-20 02:40:26.867 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2805 constructing new query executor txid = [5b17155b-dc37-4fcd-8594-53903d419501]" -"2019-07-20 02:40:26.867 UTC [lockbasedtxmgr] Done -> DEBU 2806 Done with transaction simulation / query execution [5b17155b-dc37-4fcd-8594-53903d419501]" -"2019-07-20 02:40:26.868 UTC [cauthdsl] func1 -> DEBU 2807 0xc002f478a0 gate 1563590426868447500 evaluation starts" -"2019-07-20 02:40:26.869 UTC [cauthdsl] func2 -> DEBU 2808 0xc002f478a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:26.870 UTC [gossip.channel] AddToMsgStore -> DEBU 2809 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to the block puller" -"2019-07-20 02:40:26.870 UTC [gossip.pull] Add -> DEBU 280b Added 4, total items: 4" -"2019-07-20 02:40:26.870 UTC [cauthdsl] func2 -> DEBU 280a 0xc002f478a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:26.872 UTC [cauthdsl] func2 -> DEBU 280c 0xc002f478a0 principal matched by identity 0" -"2019-07-20 02:40:26.872 UTC [msp.identity] Verify -> DEBU 280d Verify: digest = 00000000 4c 3f 23 d1 07 f5 94 12 9e ea ab 4c 73 11 1c 5d |L?#........Ls..]| -00000010 8f 88 0d cb 0a f0 f5 1b ee 8d a0 3f 26 d7 12 81 |...........?&...|" -"2019-07-20 02:40:26.872 UTC [msp.identity] Verify -> DEBU 280e Verify: sig = 00000000 30 45 02 21 00 a3 09 11 68 b6 4a cf cc b2 e0 16 |0E.!....h.J.....| -00000010 4f a8 02 f4 78 43 81 2a f3 c7 ea 8b 34 ed 79 ca |O...xC.*....4.y.| -00000020 71 f2 e0 ca 94 02 20 3c f5 44 47 2d ce fc 85 9c |q..... <.DG-....| -00000030 56 18 25 fa 92 95 2f e5 42 a2 94 96 01 72 d3 5b |V.%.../.B....r.[| -00000040 67 e8 13 66 51 b3 6b |g..fQ.k|" -"2019-07-20 02:40:26.872 UTC [cauthdsl] func2 -> DEBU 280f 0xc002f478a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2810 0xc002f478a0 signed by 1 principal evaluation starts (used [true])" -"2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2811 0xc002f478a0 skipping identity 0 because it has already been used" -"2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2812 0xc002f478a0 principal evaluation fails" -"2019-07-20 02:40:26.873 UTC [cauthdsl] func1 -> DEBU 2813 0xc002f478a0 gate 1563590426868447500 evaluation succeeds" -"2019-07-20 02:40:26.873 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2814 constructing new query executor txid = [b411b15d-1b46-48d3-be14-dbe98f8da76f]" -"2019-07-20 02:40:26.876 UTC [lockbasedtxmgr] Done -> DEBU 2815 Done with transaction simulation / query execution [b411b15d-1b46-48d3-be14-dbe98f8da76f]" -"2019-07-20 02:40:26.876 UTC [vscc] Validate -> DEBU 2816 block 4, namespace: exp02, tx 0 validation results is: " -"2019-07-20 02:40:26.876 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2817 Transaction 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 appears to be valid" -"2019-07-20 02:40:26.876 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2818 [businesschannel] VSCCValidateTx completes env bytes 0xc0004e2400" -"2019-07-20 02:40:26.876 UTC [committer.txvalidator] validateTx -> DEBU 2819 [businesschannel] validateTx completes for block 0xc0004858c0 env 0xc0028bdc20 txn 0" -"2019-07-20 02:40:26.876 UTC [committer.txvalidator] Validate -> DEBU 281a got result for idx 0, code 0" -"2019-07-20 02:40:26.876 UTC [committer.txvalidator] Validate -> INFO 281b [businesschannel] Validated block [4] in 18ms" -"2019-07-20 02:40:26.876 UTC [gossip.privdata] listMissingPrivateData -> DEBU 281c Retrieving private write sets for 0 transactions from transient store" -"2019-07-20 02:40:26.876 UTC [gossip.privdata] StoreBlock -> DEBU 281d [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-07-20 02:40:26.877 UTC [kvledger] CommitWithPvtData -> DEBU 281e [businesschannel] Validating state for block [4]" -"2019-07-20 02:40:26.880 UTC [msp] DeserializeIdentity -> DEBU 281f Obtaining identity" -"2019-07-20 02:40:26.877 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2820 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-07-20 02:40:26.882 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2821 lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-07-20 02:40:26.883 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2822 Validating new block with num trans = [1]" -"2019-07-20 02:40:26.883 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2823 ValidateAndPrepareBatch() for block number = [4]" -"2019-07-20 02:40:26.884 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2824 preprocessing ProtoBlock..." -"2019-07-20 02:40:26.884 UTC [valimpl] preprocessProtoBlock -> DEBU 2825 txType=ENDORSER_TRANSACTION" -"2019-07-20 02:40:26.885 UTC [msp] DeserializeIdentity -> DEBU 2826 Obtaining identity" -"2019-07-20 02:40:26.886 UTC [stateleveldb] GetState -> DEBU 2827 GetState(). ns=exp02, key=a" -"2019-07-20 02:40:26.886 UTC [statebasedval] validateKVRead -> DEBU 2828 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" -"2019-07-20 02:40:26.886 UTC [msp] DeserializeIdentity -> DEBU 2829 Obtaining identity" -"2019-07-20 02:40:26.886 UTC [msp] DeserializeIdentity -> DEBU 282a Obtaining identity" -"2019-07-20 02:40:26.886 UTC [stateleveldb] GetState -> DEBU 282b GetState(). ns=exp02, key=b" -"2019-07-20 02:40:26.887 UTC [gossip.comm] Send -> DEBU 282c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:26.887 UTC [statebasedval] validateKVRead -> DEBU 282d Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" -"2019-07-20 02:40:26.887 UTC [msp] DeserializeIdentity -> DEBU 282e Obtaining identity" -"2019-07-20 02:40:26.887 UTC [stateleveldb] GetState -> DEBU 282f GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:26.890 UTC [statebasedval] validateKVRead -> DEBU 2830 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" -"2019-07-20 02:40:26.890 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2831 Block [4] Transaction index [0] TxId [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] marked as valid by state validator" -"2019-07-20 02:40:26.890 UTC [valinternal] ApplyWriteSet -> DEBU 2832 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003020a40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003020b00)}" -"2019-07-20 02:40:26.890 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2833 validating rwset..." -"2019-07-20 02:40:26.891 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2834 postprocessing ProtoBlock..." -"2019-07-20 02:40:26.887 UTC [msp] DeserializeIdentity -> DEBU 2835 Obtaining identity" -"2019-07-20 02:40:26.893 UTC [gossip.comm] sendToEndpoint -> DEBU 2836 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes" -"2019-07-20 02:40:26.893 UTC [gossip.comm] sendToEndpoint -> DEBU 2837 Exiting" -"2019-07-20 02:40:26.891 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2838 ValidateAndPrepareBatch() complete" -"2019-07-20 02:40:26.895 UTC [kvledger] CommitWithPvtData -> DEBU 2839 [businesschannel] Adding CommitHash to the block [4]" -"2019-07-20 02:40:26.896 UTC [kvledger] CommitWithPvtData -> DEBU 283a [businesschannel] Committing block [4] to storage" -"2019-07-20 02:40:26.896 UTC [ledgerstorage] CommitWithPvtData -> DEBU 283b Writing block [4] to pvt block store" -"2019-07-20 02:40:26.903 UTC [pvtdatastorage] Prepare -> DEBU 283c Saved 0 private data write sets for block [4]" -"2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283d Indexing block [blockNum=4, blockHash=[]byte{0xb7, 0x10, 0x53, 0xe8, 0x49, 0x19, 0xe7, 0xf, 0x6f, 0x37, 0xc7, 0x9c, 0x27, 0xaf, 0x1c, 0x10, 0x15, 0x6c, 0xa3, 0xe5, 0x32, 0x4c, 0x6a, 0x2a, 0x4d, 0xc, 0x12, 0xea, 0x60, 0x40, 0x84, 0xb2} txOffsets= -txId=3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 locPointer=offset=70, bytesLength=2986 -]" -"2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283e Adding txLoc [fileSuffixNum=0, offset=76095, bytesLength=2986] for tx ID: [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] to txid-index" -"2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283f Adding txLoc [fileSuffixNum=0, offset=76095, bytesLength=2986] for tx number:[0] ID: [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] to blockNumTranNum index" -"2019-07-20 02:40:26.918 UTC [fsblkstorage] updateCheckpoint -> DEBU 2840 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80053], isChainEmpty=[false], lastBlockNumber=[4]" -"2019-07-20 02:40:26.918 UTC [pvtdatastorage] Commit -> DEBU 2841 Committing private data for block [4]" -"2019-07-20 02:40:26.924 UTC [pvtdatastorage] Commit -> DEBU 2842 Committed private data for block [4]" -"2019-07-20 02:40:26.924 UTC [kvledger] CommitWithPvtData -> DEBU 2843 [businesschannel] Committing block [4] transactions to state database" -"2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2844 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2845 Committing updates to state database" -"2019-07-20 02:40:26.924 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2846 Building the expiry schedules based on the update batch" -"2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2847 Write lock acquired for committing updates to state database" -"2019-07-20 02:40:26.925 UTC [stateleveldb] ApplyUpdates -> DEBU 2848 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -"2019-07-20 02:40:26.925 UTC [stateleveldb] ApplyUpdates -> DEBU 2849 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -"2019-07-20 02:40:26.928 UTC [lockbasedtxmgr] Commit -> DEBU 284a Updates committed to state database and the write lock is released" -"2019-07-20 02:40:26.928 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 284b Preparing potential purge list working-set for expiringAtBlk [5]" -"2019-07-20 02:40:26.928 UTC [lockbasedtxmgr] func1 -> DEBU 284c launched the background routine for preparing keys to purge with the next block" -"2019-07-20 02:40:26.928 UTC [kvledger] CommitWithPvtData -> DEBU 284d [businesschannel] Committing block [4] transactions to history database" -"2019-07-20 02:40:26.928 UTC [historyleveldb] Commit -> DEBU 284e Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" -"2019-07-20 02:40:26.928 UTC [leveldbhelper] GetIterator -> DEBU 284f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" -"2019-07-20 02:40:26.929 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2850 No expiry entry found for expiringAtBlk [5]" -"2019-07-20 02:40:26.930 UTC [historyleveldb] Commit -> DEBU 2851 Channel [businesschannel]: Updates committed to history database for blockNo [4]" -"2019-07-20 02:40:26.931 UTC [kvledger] CommitWithPvtData -> INFO 2852 [businesschannel] Committed block [4] with 1 transaction(s) in 54ms (state_validation=18ms block_and_pvtdata_commit=28ms state_commit=4ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" -"2019-07-20 02:40:26.931 UTC [msp] GetDefaultSigningIdentity -> DEBU 2853 Obtaining default signing identity" -"2019-07-20 02:40:26.931 UTC [msp.identity] Sign -> DEBU 2854 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08051A0C0A0565787030321203312E30 " -"2019-07-20 02:40:26.931 UTC [msp.identity] Sign -> DEBU 2855 Sign: digest: 9F8F9BA187E3D7AD25ADAB380D04A58C6823AADBBC650640B818D6D17BCA764A " -"2019-07-20 02:40:26.931 UTC [gossip.state] commitBlock -> DEBU 2856 [businesschannel] Committed block [4] with 1 transaction(s)" -"2019-07-20 02:40:26.999 UTC [gossip.election] waitForInterrupt -> DEBU 2857 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:27.000 UTC [gossip.election] IsLeader -> DEBU 2858 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:27.000 UTC [msp] GetDefaultSigningIdentity -> DEBU 2859 Obtaining default signing identity" -"2019-07-20 02:40:27.001 UTC [msp.identity] Sign -> DEBU 285a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100A1801 " -"2019-07-20 02:40:27.002 UTC [msp.identity] Sign -> DEBU 285b Sign: digest: 3C12A3CEC5CB7423F2D05CC1CB64C08F1FCFA25938DE5509242BEFFCB1D03575 " -"2019-07-20 02:40:27.002 UTC [gossip.election] waitForInterrupt -> DEBU 285c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:27.006 UTC [gossip.comm] func1 -> DEBU 285d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.008 UTC [gossip.gossip] handleMessage -> DEBU 285e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.009 UTC [gossip.gossip] handleMessage -> DEBU 285f Exiting" -"2019-07-20 02:40:27.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2860 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.010 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2861 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:27.010 UTC [msp] DeserializeIdentity -> DEBU 2862 Obtaining identity" -"2019-07-20 02:40:27.011 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2863 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:27.012 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2864 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:27.012 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2865 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:27.012 UTC [policies] Evaluate -> DEBU 2866 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:27.013 UTC [policies] Evaluate -> DEBU 2867 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:27.013 UTC [policies] Evaluate -> DEBU 2868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:27.013 UTC [cauthdsl] func1 -> DEBU 2869 0xc0033ef6f0 gate 1563590427013372300 evaluation starts" -"2019-07-20 02:40:27.013 UTC [cauthdsl] func2 -> DEBU 286a 0xc0033ef6f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.013 UTC [cauthdsl] func2 -> DEBU 286b 0xc0033ef6f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:27.015 UTC [cauthdsl] func2 -> DEBU 286c 0xc0033ef6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:27.015 UTC [cauthdsl] func2 -> DEBU 286d 0xc0033ef6f0 principal evaluation fails" -"2019-07-20 02:40:27.016 UTC [cauthdsl] func1 -> DEBU 286f 0xc0033ef6f0 gate 1563590427013372300 evaluation fails" -"2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2870 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:27.015 UTC [gossip.comm] func1 -> DEBU 286e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2871 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2873 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:27.018 UTC [cauthdsl] func1 -> DEBU 2874 0xc00379a040 gate 1563590427018048500 evaluation starts" -"2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2875 0xc00379a040 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2876 0xc00379a040 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2877 0xc00379a040 principal matched by identity 0" -"2019-07-20 02:40:27.018 UTC [msp.identity] Verify -> DEBU 2878 Verify: digest = 00000000 34 5c 18 02 4e f3 bc fb b1 a1 29 a4 92 63 c8 d0 |4\..N.....)..c..| -00000010 e0 62 df a1 90 fd 41 a8 c7 18 5c 3e 5a 8d c5 6e |.b....A...\>Z..n|" -"2019-07-20 02:40:27.018 UTC [msp.identity] Verify -> DEBU 2879 Verify: sig = 00000000 30 44 02 20 23 4e fb c3 d2 e3 f4 cc da f4 e2 3f |0D. #N.........?| -00000010 f6 47 89 14 6b f5 4f 8e cc fb 18 d3 0b 6f c4 c5 |.G..k.O......o..| -00000020 5b e7 ec 8d 02 20 77 89 48 b5 92 de 13 26 6e 5e |[.... w.H....&n^| -00000030 ee ba a7 b1 33 d2 36 d5 4b 6a 61 14 23 18 6e 25 |....3.6.Kja.#.n%| -00000040 99 37 43 15 a0 09 |.7C...|" -"2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 287a 0xc00379a040 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:27.019 UTC [cauthdsl] func1 -> DEBU 287b 0xc00379a040 gate 1563590427018048500 evaluation succeeds" -"2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:27.019 UTC [gossip.discovery] handleAliveMessage -> DEBU 2880 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2881 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2882 updating membership: timestamp: " -"2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2883 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:27.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2884 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:27.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2885 Exiting" -"2019-07-20 02:40:27.020 UTC [gossip.discovery] handleAliveMessage -> DEBU 2886 Exiting" -"2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2887 Exiting" -"2019-07-20 02:40:27.017 UTC [gossip.gossip] handleMessage -> DEBU 2872 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.020 UTC [gossip.gossip] handleMessage -> DEBU 2888 Exiting" -"2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2889 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 288a Exiting" -"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288b Obtaining identity" -"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288c Obtaining identity" -"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288d Obtaining identity" -"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288e Obtaining identity" -"2019-07-20 02:40:27.021 UTC [gossip.comm] Send -> DEBU 288f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2890 Obtaining identity" -"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2891 Obtaining identity" -"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2892 Obtaining identity" -"2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2893 Obtaining identity" -"2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2894 Obtaining identity" -"2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2895 Obtaining identity" -"2019-07-20 02:40:27.024 UTC [gossip.comm] Send -> DEBU 2897 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:27.024 UTC [msp] DeserializeIdentity -> DEBU 2898 Obtaining identity" -"2019-07-20 02:40:27.025 UTC [msp] DeserializeIdentity -> DEBU 2899 Obtaining identity" -"2019-07-20 02:40:27.025 UTC [gossip.comm] Send -> DEBU 289a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 289b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 289c Exiting" -"2019-07-20 02:40:27.024 UTC [gossip.comm] func1 -> DEBU 2896 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.025 UTC [gossip.gossip] handleMessage -> DEBU 289d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.025 UTC [gossip.gossip] handleMessage -> DEBU 289e Exiting" -"2019-07-20 02:40:27.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28a0 Exiting" -"2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 28a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 28a2 Exiting" -"2019-07-20 02:40:27.024 UTC [gossip.comm] sendToEndpoint -> DEBU 28a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.026 UTC [gossip.comm] sendToEndpoint -> DEBU 28a4 Exiting" -"2019-07-20 02:40:27.244 UTC [msp] GetDefaultSigningIdentity -> DEBU 28a5 Obtaining default signing identity" -"2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151022 " -"2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a7 Sign: digest: 819BDFE46E1A1EE055D1141FFDE3D7554AF2B24B2F62ECB0CFC09CC56E885EFA " -"2019-07-20 02:40:27.312 UTC [msp] GetDefaultSigningIdentity -> DEBU 28a8 Obtaining default signing identity" -"2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28aa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:27.312 UTC [gossip.discovery] periodicalSendAlive -> DEBU 28ab Sleeping 5s" -"2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28ac Obtaining identity" -"2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28ad Obtaining identity" -"2019-07-20 02:40:27.324 UTC [gossip.comm] Send -> DEBU 28ae Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28af Obtaining identity" -"2019-07-20 02:40:27.325 UTC [gossip.comm] Send -> DEBU 28b0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:27.325 UTC [msp] DeserializeIdentity -> DEBU 28b1 Obtaining identity" -"2019-07-20 02:40:27.325 UTC [gossip.comm] Send -> DEBU 28b2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b4 Exiting" -"2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b6 Exiting" -"2019-07-20 02:40:27.326 UTC [gossip.comm] sendToEndpoint -> DEBU 28b7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.326 UTC [gossip.comm] sendToEndpoint -> DEBU 28b8 Exiting" -"2019-07-20 02:40:27.401 UTC [gossip.comm] func1 -> DEBU 28b9 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:27.401 UTC [gossip.gossip] handleMessage -> DEBU 28ba Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:27.401 UTC [gossip.gossip] handleMessage -> DEBU 28bb Exiting" -"2019-07-20 02:40:27.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28bc Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:27.402 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28bd Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:27.404 UTC [msp.identity] Verify -> DEBU 28be Verify: digest = 00000000 d5 d4 12 8c 11 af 11 2f f8 85 73 66 a1 82 f1 bf |......./..sf....| -00000010 e7 f9 2c af 71 30 28 38 89 7d ec df 43 e1 3e dc |..,.q0(8.}..C.>.|" -"2019-07-20 02:40:27.404 UTC [msp.identity] Verify -> DEBU 28bf Verify: sig = 00000000 30 45 02 21 00 a9 07 c0 0f 0b 35 ba 37 ea 31 e4 |0E.!......5.7.1.| -00000010 7a db a5 7b 94 0f 9d 2e 5e be 4d a6 e6 b3 fa b5 |z..{....^.M.....| -00000020 ff dc 30 61 b0 02 20 62 ea df c6 5d 10 5a d8 82 |..0a.. b...].Z..| -00000030 38 99 7a 54 45 3a 92 96 e7 41 e9 cd 67 42 f0 dc |8.zTE:...A..gB..| -00000040 e0 8c 56 a8 ed 17 da |..V....|" -"2019-07-20 02:40:27.405 UTC [msp.identity] Verify -> DEBU 28c0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:27.405 UTC [msp.identity] Verify -> DEBU 28c1 Verify: sig = 00000000 30 45 02 21 00 fe b4 65 c5 5b 87 1f 40 11 77 34 |0E.!...e.[..@.w4| -00000010 39 85 1b 3a 7f 13 47 91 b3 31 12 bd 5d 72 cf a7 |9..:..G..1..]r..| -00000020 cf e8 ee 6d b2 02 20 37 91 77 c8 95 05 19 2f 4e |...m.. 7.w..../N| -00000030 68 b2 a6 a1 ea e5 9f f9 d1 e7 7b cd 79 ac 9e 50 |h.........{.y..P| -00000040 c6 0e 51 df e0 84 85 |..Q....|" -"2019-07-20 02:40:27.411 UTC [gossip.comm] func1 -> DEBU 28c2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.412 UTC [gossip.comm] func1 -> DEBU 28c4 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.412 UTC [gossip.gossip] handleMessage -> DEBU 28c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.408 UTC [gossip.discovery] handleAliveMessage -> DEBU 28c3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c7 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c8 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:27.419 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c9 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:27.419 UTC [gossip.discovery] learnExistingMembers -> DEBU 28ca Exiting" -"2019-07-20 02:40:27.419 UTC [gossip.discovery] handleAliveMessage -> DEBU 28cb Exiting" -"2019-07-20 02:40:27.419 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28cc Exiting" -"2019-07-20 02:40:27.419 UTC [gossip.gossip] handleMessage -> DEBU 28cd Exiting" -"2019-07-20 02:40:27.420 UTC [gossip.gossip] handleMessage -> DEBU 28ce Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28cf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d0 Exiting" -"2019-07-20 02:40:27.420 UTC [gossip.gossip] handleMessage -> DEBU 28d1 Exiting" -"2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d3 Exiting" -"2019-07-20 02:40:27.429 UTC [msp] DeserializeIdentity -> DEBU 28d4 Obtaining identity" -"2019-07-20 02:40:27.430 UTC [msp] DeserializeIdentity -> DEBU 28d5 Obtaining identity" -"2019-07-20 02:40:27.431 UTC [msp] DeserializeIdentity -> DEBU 28d6 Obtaining identity" -"2019-07-20 02:40:27.431 UTC [gossip.comm] Send -> DEBU 28d7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:27.431 UTC [msp] DeserializeIdentity -> DEBU 28d8 Obtaining identity" -"2019-07-20 02:40:27.431 UTC [gossip.comm] Send -> DEBU 28d9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:27.431 UTC [gossip.comm] sendToEndpoint -> DEBU 28da Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.431 UTC [gossip.comm] sendToEndpoint -> DEBU 28db Exiting" -"2019-07-20 02:40:27.432 UTC [gossip.comm] sendToEndpoint -> DEBU 28dc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.432 UTC [gossip.comm] sendToEndpoint -> DEBU 28dd Exiting" -"2019-07-20 02:40:27.551 UTC [endorser] ProcessProposal -> DEBU 28de Entering: request from 172.18.0.9:58370" -"2019-07-20 02:40:27.551 UTC [protoutils] ValidateProposalMessage -> DEBU 28df ValidateProposalMessage starts for signed proposal 0xc000596280" -"2019-07-20 02:40:27.552 UTC [protoutils] validateChannelHeader -> DEBU 28e0 validateChannelHeader info: header type 3" -"2019-07-20 02:40:27.552 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e1 begin" -"2019-07-20 02:40:27.552 UTC [msp] GetManagerForChain -> DEBU 28e2 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:27.553 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e3 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -"2019-07-20 02:40:27.554 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e4 creator is valid" -"2019-07-20 02:40:27.554 UTC [msp.identity] Verify -> DEBU 28e5 Verify: digest = 00000000 1b 56 5f d0 6c cc 26 db 51 8e f0 35 dc 66 83 a6 |.V_.l.&.Q..5.f..| -00000010 db 62 2e 19 d8 63 bc aa 22 54 24 95 e8 88 90 cb |.b...c.."T$.....|" -"2019-07-20 02:40:27.555 UTC [msp.identity] Verify -> DEBU 28e6 Verify: sig = 00000000 30 45 02 21 00 b9 f1 57 3a 84 f5 ca 68 f2 de 84 |0E.!...W:...h...| -00000010 73 4f a7 75 11 6b 5f ef 34 d9 86 b8 6e ea 3c 9d |sO.u.k_.4...n.<.| -00000020 2a 38 5f eb 9d 02 20 3e 21 dc c6 3d 5d 5e b6 38 |*8_... >!..=]^.8| -00000030 fa 0a 44 9e 4d 79 0f a2 46 9f 4b 5d 94 4e f3 cd |..D.My..F.K].N..| -00000040 5b 92 39 ce 65 b4 56 |[.9.e.V|" -"2019-07-20 02:40:27.555 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e7 exits successfully" -"2019-07-20 02:40:27.556 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28e8 validateChaincodeProposalMessage starts for proposal 0xc000406700, header 0xc000596690" -"2019-07-20 02:40:27.561 UTC [gossip.comm] func1 -> DEBU 28e9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.565 UTC [gossip.gossip] handleMessage -> DEBU 28ea Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.566 UTC [gossip.gossip] handleMessage -> DEBU 28eb Exiting" -"2019-07-20 02:40:27.567 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28ec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28ed Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:27.568 UTC [msp] DeserializeIdentity -> DEBU 28ee Obtaining identity" -"2019-07-20 02:40:27.570 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:27.576 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f2 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:27.576 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f3 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:27.575 UTC [gossip.comm] func1 -> DEBU 28f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.576 UTC [gossip.comm] func1 -> DEBU 28f1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.578 UTC [policies] Evaluate -> DEBU 28f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:27.579 UTC [gossip.gossip] handleMessage -> DEBU 28f5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.582 UTC [policies] Evaluate -> DEBU 28f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:27.565 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28f7 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-07-20 02:40:27.584 UTC [endorser] preProcess -> DEBU 28f9 [businesschannel][45a41d79] processing txid: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81" -"2019-07-20 02:40:27.584 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28fa retrieveTransactionByID() - txId = [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" -"2019-07-20 02:40:27.585 UTC [aclmgmt] CheckACL -> DEBU 28fb acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-07-20 02:40:27.584 UTC [policies] Evaluate -> DEBU 28f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:27.585 UTC [aclmgmt] CheckACL -> DEBU 28fc acl check(/Channel/Application/Writers)" -"2019-07-20 02:40:27.587 UTC [policies] Evaluate -> DEBU 28fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:27.587 UTC [policies] Evaluate -> DEBU 28ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:27.586 UTC [cauthdsl] func1 -> DEBU 28fd 0xc003ab5ab0 gate 1563590427586480900 evaluation starts" -"2019-07-20 02:40:27.588 UTC [policies] Evaluate -> DEBU 2900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:27.589 UTC [cauthdsl] func1 -> DEBU 2902 0xc002858240 gate 1563590427589122400 evaluation starts" -"2019-07-20 02:40:27.589 UTC [cauthdsl] func2 -> DEBU 2903 0xc002858240 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.588 UTC [cauthdsl] func2 -> DEBU 2901 0xc003ab5ab0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2904 0xc003ab5ab0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2905 0xc003ab5ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2906 0xc003ab5ab0 principal evaluation fails" -"2019-07-20 02:40:27.600 UTC [cauthdsl] func1 -> DEBU 2907 0xc003ab5ab0 gate 1563590427586480900 evaluation fails" -"2019-07-20 02:40:27.600 UTC [policies] Evaluate -> DEBU 2909 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:27.601 UTC [policies] Evaluate -> DEBU 290a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:27.601 UTC [policies] Evaluate -> DEBU 290b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:27.601 UTC [cauthdsl] func1 -> DEBU 290c 0xc002858a80 gate 1563590427601207400 evaluation starts" -"2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290d 0xc002858a80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290e 0xc002858a80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290f 0xc002858a80 principal matched by identity 0" -"2019-07-20 02:40:27.601 UTC [msp.identity] Verify -> DEBU 2910 Verify: digest = 00000000 f9 8d f8 ea 20 e1 4b 0a 33 89 a1 4a e1 65 16 14 |.... .K.3..J.e..| -00000010 88 2f 4e e4 e9 4e 05 f1 4a 0b f0 5e ea 5a cb c5 |./N..N..J..^.Z..|" -"2019-07-20 02:40:27.601 UTC [msp.identity] Verify -> DEBU 2911 Verify: sig = 00000000 30 45 02 21 00 df e9 99 b7 18 e6 f2 5b 89 92 70 |0E.!........[..p| -00000010 3a 70 57 71 5c 8f c3 19 89 a0 3b 81 8b 21 bc 6d |:pWq\.....;..!.m| -00000020 b4 24 3a 2a 10 02 20 53 cb f9 11 e8 15 28 46 8f |.$:*.. S.....(F.| -00000030 e5 66 9f cf 35 99 71 f1 2a 66 f8 0c aa cd c3 35 |.f..5.q.*f.....5| -00000040 cf 6b 12 ea 09 cb eb |.k.....|" -"2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 2912 0xc002858a80 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:27.602 UTC [cauthdsl] func1 -> DEBU 2913 0xc002858a80 gate 1563590427601207400 evaluation succeeds" -"2019-07-20 02:40:27.602 UTC [policies] Evaluate -> DEBU 2914 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:27.602 UTC [policies] Evaluate -> DEBU 2915 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:27.603 UTC [policies] Evaluate -> DEBU 2916 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:27.603 UTC [policies] Evaluate -> DEBU 2917 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:27.603 UTC [gossip.discovery] handleAliveMessage -> DEBU 2918 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.603 UTC [gossip.discovery] learnExistingMembers -> DEBU 2919 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291a updating membership: timestamp: " -"2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291b Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:27.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 291d Exiting" -"2019-07-20 02:40:27.605 UTC [gossip.discovery] handleAliveMessage -> DEBU 291e Exiting" -"2019-07-20 02:40:27.605 UTC [gossip.discovery] handleMsgFromComm -> DEBU 291f Exiting" -"2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2908 0xc002858240 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:27.606 UTC [cauthdsl] func2 -> DEBU 2920 0xc002858240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:27.606 UTC [cauthdsl] func2 -> DEBU 2922 0xc002858240 principal evaluation fails" -"2019-07-20 02:40:27.607 UTC [cauthdsl] func1 -> DEBU 2924 0xc002858240 gate 1563590427589122400 evaluation fails" -"2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2925 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2926 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2927 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-07-20 02:40:27.607 UTC [cauthdsl] func1 -> DEBU 2928 0xc00295c3f0 gate 1563590427607262800 evaluation starts" -"2019-07-20 02:40:27.607 UTC [cauthdsl] func2 -> DEBU 2929 0xc00295c3f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.607 UTC [cauthdsl] func2 -> DEBU 292a 0xc00295c3f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:27.606 UTC [gossip.gossip] handleMessage -> DEBU 2923 Exiting" -"2019-07-20 02:40:27.606 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2921 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.610 UTC [cauthdsl] func2 -> DEBU 292b 0xc00295c3f0 principal matched by identity 0" -"2019-07-20 02:40:27.611 UTC [msp.identity] Verify -> DEBU 292e Verify: digest = 00000000 1b 56 5f d0 6c cc 26 db 51 8e f0 35 dc 66 83 a6 |.V_.l.&.Q..5.f..| -00000010 db 62 2e 19 d8 63 bc aa 22 54 24 95 e8 88 90 cb |.b...c.."T$.....|" -"2019-07-20 02:40:27.611 UTC [msp.identity] Verify -> DEBU 292f Verify: sig = 00000000 30 45 02 21 00 b9 f1 57 3a 84 f5 ca 68 f2 de 84 |0E.!...W:...h...| -00000010 73 4f a7 75 11 6b 5f ef 34 d9 86 b8 6e ea 3c 9d |sO.u.k_.4...n.<.| -00000020 2a 38 5f eb 9d 02 20 3e 21 dc c6 3d 5d 5e b6 38 |*8_... >!..=]^.8| -00000030 fa 0a 44 9e 4d 79 0f a2 46 9f 4b 5d 94 4e f3 cd |..D.My..F.K].N..| -00000040 5b 92 39 ce 65 b4 56 |[.9.e.V|" -"2019-07-20 02:40:27.611 UTC [cauthdsl] func2 -> DEBU 2930 0xc00295c3f0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:27.610 UTC [gossip.gossip] handleMessage -> DEBU 292c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.610 UTC [gossip.discovery] handleMsgFromComm -> DEBU 292d Exiting" -"2019-07-20 02:40:27.612 UTC [cauthdsl] func1 -> DEBU 2931 0xc00295c3f0 gate 1563590427607262800 evaluation succeeds" -"2019-07-20 02:40:27.612 UTC [policies] Evaluate -> DEBU 2934 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2935 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2936 Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2937 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:27.612 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2932 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2939 Exiting" -"2019-07-20 02:40:27.613 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2938 constructing new tx simulator" -"2019-07-20 02:40:27.616 UTC [msp] DeserializeIdentity -> DEBU 293a Obtaining identity" -"2019-07-20 02:40:27.617 UTC [msp] DeserializeIdentity -> DEBU 293b Obtaining identity" -"2019-07-20 02:40:27.617 UTC [msp] DeserializeIdentity -> DEBU 293c Obtaining identity" -"2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293d Obtaining identity" -"2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293e Obtaining identity" -"2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293f Obtaining identity" -"2019-07-20 02:40:27.617 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2940 constructing new tx simulator txid = [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" -"2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 2941 Obtaining identity" -"2019-07-20 02:40:27.619 UTC [gossip.comm] Send -> DEBU 2942 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:27.619 UTC [msp] DeserializeIdentity -> DEBU 2943 Obtaining identity" -"2019-07-20 02:40:27.619 UTC [endorser] SimulateProposal -> DEBU 2944 [businesschannel][45a41d79] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:27.620 UTC [gossip.comm] Send -> DEBU 2945 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:27.620 UTC [stateleveldb] GetState -> DEBU 2946 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:27.620 UTC [gossip.comm] sendToEndpoint -> DEBU 2947 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.621 UTC [gossip.comm] sendToEndpoint -> DEBU 2949 Exiting" -"2019-07-20 02:40:27.620 UTC [gossip.comm] sendToEndpoint -> DEBU 2948 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:27.621 UTC [gossip.comm] sendToEndpoint -> DEBU 294a Exiting" -"2019-07-20 02:40:27.612 UTC [gossip.gossip] handleMessage -> DEBU 2933 Exiting" -"2019-07-20 02:40:27.623 UTC [ccprovider] GetChaincodeData -> DEBU 294b Getting chaincode data for from cache" -"2019-07-20 02:40:27.623 UTC [endorser] callChaincode -> INFO 294c [businesschannel][45a41d79] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:27.626 UTC [chaincode] Execute -> DEBU 294d Entry" -"2019-07-20 02:40:27.630 UTC [chaincode] handleMessage -> DEBU 294e [45a41d79] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:27.631 UTC [chaincode] HandleTransaction -> DEBU 294f [45a41d79] handling GET_STATE from chaincode" -"2019-07-20 02:40:27.631 UTC [chaincode] HandleGetState -> DEBU 2950 [45a41d79] getting state for chaincode exp02, key a, channel businesschannel" -"2019-07-20 02:40:27.632 UTC [stateleveldb] GetState -> DEBU 2951 GetState(). ns=exp02, key=a" -"2019-07-20 02:40:27.632 UTC [chaincode] HandleTransaction -> DEBU 2952 [45a41d79] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:27.634 UTC [chaincode] handleMessage -> DEBU 2953 [45a41d79] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:27.634 UTC [chaincode] Notify -> DEBU 2954 [45a41d79] notifying Txid:45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, channelID:businesschannel" -"2019-07-20 02:40:27.634 UTC [chaincode] Execute -> DEBU 2955 Exit" -"2019-07-20 02:40:27.634 UTC [endorser] callChaincode -> INFO 2956 [businesschannel][45a41d79] Exit chaincode: name:"exp02" (9ms)" -"2019-07-20 02:40:27.634 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2957 Simulation completed, getting simulation results" -"2019-07-20 02:40:27.634 UTC [lockbasedtxmgr] Done -> DEBU 2958 Done with transaction simulation / query execution [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" -"2019-07-20 02:40:27.635 UTC [endorser] SimulateProposal -> DEBU 2959 [businesschannel][45a41d79] Exit" -"2019-07-20 02:40:27.635 UTC [endorser] endorseProposal -> DEBU 295a [businesschannel][45a41d79] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:27.635 UTC [endorser] endorseProposal -> DEBU 295b [businesschannel][45a41d79] escc for chaincode name:"exp02" is escc" -"2019-07-20 02:40:27.635 UTC [endorser] EndorseWithPlugin -> DEBU 295c Entering endorsement for {plugin: escc, channel: businesschannel, tx: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, chaincode: exp02}" -"2019-07-20 02:40:27.635 UTC [msp.identity] Sign -> DEBU 295d Sign: plaintext: 0A206ADFF19A06A8EA4B5E0424063B24...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:27.636 UTC [msp.identity] Sign -> DEBU 295e Sign: digest: 8F0962501C35270F72ECE8639758C3F453AD626CECD34429CC2E661F87E2C9DE " -"2019-07-20 02:40:27.636 UTC [endorser] EndorseWithPlugin -> DEBU 295f Exiting {plugin: escc, channel: businesschannel, tx: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, chaincode: exp02}" -"2019-07-20 02:40:27.636 UTC [endorser] endorseProposal -> DEBU 2960 [businesschannel][45a41d79] Exit" -"2019-07-20 02:40:27.636 UTC [lockbasedtxmgr] Done -> DEBU 2961 Done with transaction simulation / query execution [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" -"2019-07-20 02:40:27.637 UTC [endorser] func1 -> DEBU 2962 Exit: request from 172.18.0.9:58370" -"2019-07-20 02:40:27.637 UTC [comm.grpc.server] 1 -> INFO 2963 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58370 grpc.code=OK grpc.call_duration=86.3296ms -"2019-07-20 02:40:27.644 UTC [grpc] infof -> DEBU 2964 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:27.647 UTC [grpc] infof -> DEBU 2965 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:27.839 UTC [endorser] ProcessProposal -> DEBU 2966 Entering: request from 172.18.0.9:58374" -"2019-07-20 02:40:27.839 UTC [protoutils] ValidateProposalMessage -> DEBU 2967 ValidateProposalMessage starts for signed proposal 0xc0005976d0" -"2019-07-20 02:40:27.839 UTC [protoutils] validateChannelHeader -> DEBU 2968 validateChannelHeader info: header type 3" -"2019-07-20 02:40:27.839 UTC [protoutils] checkSignatureFromCreator -> DEBU 2969 begin" -"2019-07-20 02:40:27.839 UTC [msp] GetManagerForChain -> DEBU 296a Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:27.839 UTC [protoutils] checkSignatureFromCreator -> DEBU 296b creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -"2019-07-20 02:40:27.840 UTC [protoutils] checkSignatureFromCreator -> DEBU 296c creator is valid" -"2019-07-20 02:40:27.840 UTC [msp.identity] Verify -> DEBU 296d Verify: digest = 00000000 c3 11 3a ce 05 0b b6 c2 ee e7 c5 b9 8c 52 af 4f |..:..........R.O| -00000010 01 b8 4d b3 96 45 0d 73 57 33 f8 30 e7 f2 d8 85 |..M..E.sW3.0....|" -"2019-07-20 02:40:27.840 UTC [msp.identity] Verify -> DEBU 296e Verify: sig = 00000000 30 44 02 20 55 6e 07 e3 f7 18 b8 fa 3e f3 8c 86 |0D. Un......>...| -00000010 20 be 8a 77 f9 6e 40 7a eb 3b c0 dc 85 c4 58 e1 | ..w.n@z.;....X.| -00000020 d3 ba f8 0c 02 20 43 86 89 2d 35 a2 bc 95 c0 b8 |..... C..-5.....| -00000030 dc 39 22 70 33 9a 19 9a 51 40 70 61 c8 73 dc 3f |.9"p3...Q@pa.s.?| -00000040 ba 33 01 2b 88 5d |.3.+.]|" -"2019-07-20 02:40:27.840 UTC [protoutils] checkSignatureFromCreator -> DEBU 296f exits successfully" -"2019-07-20 02:40:27.841 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2970 validateChaincodeProposalMessage starts for proposal 0xc000406fc0, header 0xc000597ae0" -"2019-07-20 02:40:27.841 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2971 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-07-20 02:40:27.841 UTC [endorser] preProcess -> DEBU 2972 [businesschannel][cf18601c] processing txid: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919" -"2019-07-20 02:40:27.842 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2973 retrieveTransactionByID() - txId = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" -"2019-07-20 02:40:27.843 UTC [aclmgmt] CheckACL -> DEBU 2974 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-07-20 02:40:27.843 UTC [aclmgmt] CheckACL -> DEBU 2975 acl check(/Channel/Application/Writers)" -"2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2976 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2977 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2978 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:27.843 UTC [cauthdsl] func1 -> DEBU 2979 0xc003493650 gate 1563590427843609300 evaluation starts" -"2019-07-20 02:40:27.843 UTC [cauthdsl] func2 -> DEBU 297a 0xc003493650 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297b 0xc003493650 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297c 0xc003493650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297d 0xc003493650 principal evaluation fails" -"2019-07-20 02:40:27.844 UTC [cauthdsl] func1 -> DEBU 297e 0xc003493650 gate 1563590427843609300 evaluation fails" -"2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 297f Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 2980 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 2981 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" -"2019-07-20 02:40:27.844 UTC [cauthdsl] func1 -> DEBU 2982 0xc003493e90 gate 1563590427844684100 evaluation starts" -"2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2983 0xc003493e90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2984 0xc003493e90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2985 0xc003493e90 principal matched by identity 0" -"2019-07-20 02:40:27.845 UTC [msp.identity] Verify -> DEBU 2986 Verify: digest = 00000000 c3 11 3a ce 05 0b b6 c2 ee e7 c5 b9 8c 52 af 4f |..:..........R.O| -00000010 01 b8 4d b3 96 45 0d 73 57 33 f8 30 e7 f2 d8 85 |..M..E.sW3.0....|" -"2019-07-20 02:40:27.845 UTC [msp.identity] Verify -> DEBU 2987 Verify: sig = 00000000 30 44 02 20 55 6e 07 e3 f7 18 b8 fa 3e f3 8c 86 |0D. Un......>...| -00000010 20 be 8a 77 f9 6e 40 7a eb 3b c0 dc 85 c4 58 e1 | ..w.n@z.;....X.| -00000020 d3 ba f8 0c 02 20 43 86 89 2d 35 a2 bc 95 c0 b8 |..... C..-5.....| -00000030 dc 39 22 70 33 9a 19 9a 51 40 70 61 c8 73 dc 3f |.9"p3...Q@pa.s.?| -00000040 ba 33 01 2b 88 5d |.3.+.]|" -"2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2988 0xc003493e90 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:27.846 UTC [cauthdsl] func1 -> DEBU 2989 0xc003493e90 gate 1563590427844684100 evaluation succeeds" -"2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298a Signature set satisfies policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298c Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:27.847 UTC [policies] Evaluate -> DEBU 298d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:27.847 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 298e constructing new tx simulator" -"2019-07-20 02:40:27.847 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 298f constructing new tx simulator txid = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" -"2019-07-20 02:40:27.847 UTC [endorser] SimulateProposal -> DEBU 2990 [businesschannel][cf18601c] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:27.847 UTC [stateleveldb] GetState -> DEBU 2991 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:27.847 UTC [ccprovider] GetChaincodeData -> DEBU 2992 Getting chaincode data for from cache" -"2019-07-20 02:40:27.848 UTC [endorser] callChaincode -> INFO 2993 [businesschannel][cf18601c] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:27.848 UTC [chaincode] Execute -> DEBU 2994 Entry" -"2019-07-20 02:40:27.850 UTC [chaincode] handleMessage -> DEBU 2995 [cf18601c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:27.850 UTC [chaincode] HandleTransaction -> DEBU 2996 [cf18601c] handling GET_STATE from chaincode" -"2019-07-20 02:40:27.850 UTC [chaincode] HandleGetState -> DEBU 2997 [cf18601c] getting state for chaincode exp02, key a, channel businesschannel" -"2019-07-20 02:40:27.850 UTC [stateleveldb] GetState -> DEBU 2998 GetState(). ns=exp02, key=a" -"2019-07-20 02:40:27.850 UTC [chaincode] HandleTransaction -> DEBU 2999 [cf18601c] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:27.851 UTC [chaincode] handleMessage -> DEBU 299a [cf18601c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:27.851 UTC [chaincode] HandleTransaction -> DEBU 299b [cf18601c] handling GET_STATE from chaincode" -"2019-07-20 02:40:27.852 UTC [chaincode] HandleGetState -> DEBU 299c [cf18601c] getting state for chaincode exp02, key b, channel businesschannel" -"2019-07-20 02:40:27.852 UTC [stateleveldb] GetState -> DEBU 299d GetState(). ns=exp02, key=b" -"2019-07-20 02:40:27.852 UTC [chaincode] HandleTransaction -> DEBU 299e [cf18601c] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:27.853 UTC [chaincode] handleMessage -> DEBU 299f [cf18601c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-07-20 02:40:27.853 UTC [chaincode] HandleTransaction -> DEBU 29a0 [cf18601c] handling PUT_STATE from chaincode" -"2019-07-20 02:40:27.854 UTC [chaincode] HandleTransaction -> DEBU 29a1 [cf18601c] Completed PUT_STATE. Sending RESPONSE" -"2019-07-20 02:40:27.855 UTC [chaincode] handleMessage -> DEBU 29a2 [cf18601c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" -"2019-07-20 02:40:27.855 UTC [chaincode] HandleTransaction -> DEBU 29a3 [cf18601c] handling PUT_STATE from chaincode" -"2019-07-20 02:40:27.856 UTC [chaincode] HandleTransaction -> DEBU 29a4 [cf18601c] Completed PUT_STATE. Sending RESPONSE" -"2019-07-20 02:40:27.858 UTC [chaincode] handleMessage -> DEBU 29a5 [cf18601c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:27.858 UTC [chaincode] Notify -> DEBU 29a6 [cf18601c] notifying Txid:cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, channelID:businesschannel" -"2019-07-20 02:40:27.858 UTC [chaincode] Execute -> DEBU 29a7 Exit" -"2019-07-20 02:40:27.859 UTC [endorser] callChaincode -> INFO 29a8 [businesschannel][cf18601c] Exit chaincode: name:"exp02" (11ms)" -"2019-07-20 02:40:27.859 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 29a9 Simulation completed, getting simulation results" -"2019-07-20 02:40:27.861 UTC [lockbasedtxmgr] Done -> DEBU 29aa Done with transaction simulation / query execution [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" -"2019-07-20 02:40:27.861 UTC [endorser] SimulateProposal -> DEBU 29ab [businesschannel][cf18601c] Exit" -"2019-07-20 02:40:27.861 UTC [endorser] endorseProposal -> DEBU 29ac [businesschannel][cf18601c] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:27.862 UTC [endorser] endorseProposal -> DEBU 29ad [businesschannel][cf18601c] escc for chaincode name:"exp02" is escc" -"2019-07-20 02:40:27.862 UTC [endorser] EndorseWithPlugin -> DEBU 29ae Entering endorsement for {plugin: escc, channel: businesschannel, tx: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, chaincode: exp02}" -"2019-07-20 02:40:27.862 UTC [msp.identity] Sign -> DEBU 29af Sign: plaintext: 0A208F6E376BDBC55C3AA7239AA1D8FF...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:27.862 UTC [msp.identity] Sign -> DEBU 29b0 Sign: digest: C6E111A0177E2C9B0B87802FB0AF0B6B419E7EC6C5CFFDAFEC9A9218AC29ED00 " -"2019-07-20 02:40:27.863 UTC [endorser] EndorseWithPlugin -> DEBU 29b1 Exiting {plugin: escc, channel: businesschannel, tx: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, chaincode: exp02}" -"2019-07-20 02:40:27.863 UTC [endorser] endorseProposal -> DEBU 29b2 [businesschannel][cf18601c] Exit" -"2019-07-20 02:40:27.863 UTC [lockbasedtxmgr] Done -> DEBU 29b3 Done with transaction simulation / query execution [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" -"2019-07-20 02:40:27.863 UTC [endorser] func1 -> DEBU 29b4 Exit: request from 172.18.0.9:58374" -"2019-07-20 02:40:27.863 UTC [comm.grpc.server] 1 -> INFO 29b5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58374 grpc.code=OK grpc.call_duration=24.3051ms -"2019-07-20 02:40:27.897 UTC [grpc] infof -> DEBU 29b6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:27.898 UTC [grpc] infof -> DEBU 29b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:27.932 UTC [gossip.comm] func1 -> DEBU 29b8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:27.933 UTC [gossip.gossip] handleMessage -> DEBU 29b9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:27.933 UTC [gossip.gossip] handleMessage -> DEBU 29ba Exiting" -"2019-07-20 02:40:27.934 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29bb Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:27.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29bc Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:27.935 UTC [msp] DeserializeIdentity -> DEBU 29bd Obtaining identity" -"2019-07-20 02:40:27.936 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:27.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29bf Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:27.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:27.937 UTC [cauthdsl] func1 -> DEBU 29c4 0xc0037d00b0 gate 1563590427937259900 evaluation starts" -"2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c5 0xc0037d00b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c6 0xc0037d00b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c7 0xc0037d00b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c8 0xc0037d00b0 principal evaluation fails" -"2019-07-20 02:40:27.937 UTC [cauthdsl] func1 -> DEBU 29c9 0xc0037d00b0 gate 1563590427937259900 evaluation fails" -"2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:27.939 UTC [cauthdsl] func1 -> DEBU 29cd 0xc0037d08f0 gate 1563590427939010500 evaluation starts" -"2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29ce 0xc0037d08f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29cf 0xc0037d08f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29d0 0xc0037d08f0 principal matched by identity 0" -"2019-07-20 02:40:27.939 UTC [msp.identity] Verify -> DEBU 29d1 Verify: digest = 00000000 44 7e e5 24 1a e0 8b 4c c7 85 ea 43 02 f3 73 0d |D~.$...L...C..s.| -00000010 ee 85 7e 9c cb af b6 05 57 83 87 05 7e 4e 25 d8 |..~.....W...~N%.|" -"2019-07-20 02:40:27.939 UTC [msp.identity] Verify -> DEBU 29d2 Verify: sig = 00000000 30 44 02 20 2b bf 05 66 a2 a0 25 38 81 fc 86 73 |0D. +..f..%8...s| -00000010 dc 3f 28 4b b8 b5 54 d8 cc e7 30 66 79 20 f8 b0 |.?(K..T...0fy ..| -00000020 6e b4 c1 23 02 20 50 86 69 b7 c5 1f 6d 81 53 81 |n..#. P.i...m.S.| -00000030 3c 67 7b 04 48 0a f7 1a 05 79 1c 48 a9 70 09 49 | DEBU 29d3 0xc0037d08f0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:27.949 UTC [cauthdsl] func1 -> DEBU 29d4 0xc0037d08f0 gate 1563590427939010500 evaluation succeeds" -"2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d7 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:27.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 29d9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:27.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 29da Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29db updating membership: timestamp: " -"2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29dc Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29dd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29de Exiting" -"2019-07-20 02:40:27.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 29df Exiting" -"2019-07-20 02:40:27.951 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29e0 Exiting" -"2019-07-20 02:40:27.951 UTC [gossip.discovery] sendMemResponse -> DEBU 29e1 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:27.951 UTC [msp] DeserializeIdentity -> DEBU 29e2 Obtaining identity" -"2019-07-20 02:40:27.952 UTC [msp] DeserializeIdentity -> DEBU 29e3 Obtaining identity" -"2019-07-20 02:40:27.952 UTC [msp] DeserializeIdentity -> DEBU 29e4 Obtaining identity" -"2019-07-20 02:40:27.952 UTC [gossip.comm] Send -> DEBU 29e5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:27.952 UTC [gossip.comm] sendToEndpoint -> DEBU 29e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:27.953 UTC [gossip.comm] sendToEndpoint -> DEBU 29e7 Exiting" -"2019-07-20 02:40:27.953 UTC [gossip.discovery] sendMemResponse -> DEBU 29e8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020&" signature:"0E\002!\000\251\007\300\017\0135\2727\3521\344z\333\245{\224\017\235.^\276M\246\346\263\372\265\377\3340a\260\002 b\352\337\306]\020Z\330\2028\231zTE:\222\226\347A\351\315gB\360\334\340\214V\250\355\027\332" > alive: alive: alive: " -"2019-07-20 02:40:27.964 UTC [gossip.comm] func1 -> DEBU 29e9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:27.964 UTC [gossip.gossip] handleMessage -> DEBU 29ea Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:27.965 UTC [gossip.pull] HandleMessage -> DEBU 29eb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:27.966 UTC [msp] DeserializeIdentity -> DEBU 29ec Obtaining identity" -"2019-07-20 02:40:27.966 UTC [msp] DeserializeIdentity -> DEBU 29ed Obtaining identity" -"2019-07-20 02:40:27.967 UTC [msp] DeserializeIdentity -> DEBU 29ee Obtaining identity" -"2019-07-20 02:40:27.967 UTC [msp] DeserializeIdentity -> DEBU 29ef Obtaining identity" -"2019-07-20 02:40:27.968 UTC [msp] DeserializeIdentity -> DEBU 29f0 Obtaining identity" -"2019-07-20 02:40:27.968 UTC [msp] DeserializeIdentity -> DEBU 29f1 Obtaining identity" -"2019-07-20 02:40:27.973 UTC [gossip.pull] SendDigest -> DEBU 29f2 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:27.973 UTC [gossip.gossip] handleMessage -> DEBU 29f3 Exiting" -"2019-07-20 02:40:28.111 UTC [endorser] ProcessProposal -> DEBU 29f4 Entering: request from 172.18.0.9:58380" -"2019-07-20 02:40:28.111 UTC [protoutils] ValidateProposalMessage -> DEBU 29f5 ValidateProposalMessage starts for signed proposal 0xc00040e8c0" -"2019-07-20 02:40:28.111 UTC [protoutils] validateChannelHeader -> DEBU 29f6 validateChannelHeader info: header type 3" -"2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29f7 begin" -"2019-07-20 02:40:28.111 UTC [msp] GetManagerForChain -> DEBU 29f8 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29f9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29fa creator is valid" -"2019-07-20 02:40:28.111 UTC [msp.identity] Verify -> DEBU 29fb Verify: digest = 00000000 f7 63 6d 9c e3 0f 6f 49 34 31 c5 75 f8 cc 73 59 |.cm...oI41.u..sY| -00000010 3e 44 6c 0a ca 0b fa 16 82 5a 9e 34 f7 de cc 56 |>Dl......Z.4...V|" -"2019-07-20 02:40:28.111 UTC [msp.identity] Verify -> DEBU 29fc Verify: sig = 00000000 30 44 02 20 76 ce ba 3c 46 66 e0 65 1c c7 ae 70 |0D. v.. DEBU 29fd exits successfully" -"2019-07-20 02:40:28.112 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29fe validateChaincodeProposalMessage starts for proposal 0xc00015e460, header 0xc00040ed20" -"2019-07-20 02:40:28.112 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29ff validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-07-20 02:40:28.112 UTC [endorser] preProcess -> DEBU 2a00 [businesschannel][cc800e57] processing txid: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0" -"2019-07-20 02:40:28.112 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2a01 retrieveTransactionByID() - txId = [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" -"2019-07-20 02:40:28.112 UTC [aclmgmt] CheckACL -> DEBU 2a02 acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-07-20 02:40:28.112 UTC [aclmgmt] CheckACL -> DEBU 2a03 acl check(/Channel/Application/Writers)" -"2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:28.112 UTC [cauthdsl] func1 -> DEBU 2a07 0xc003dfe5b0 gate 1563590428112919900 evaluation starts" -"2019-07-20 02:40:28.112 UTC [cauthdsl] func2 -> DEBU 2a08 0xc003dfe5b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.113 UTC [cauthdsl] func2 -> DEBU 2a09 0xc003dfe5b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.113 UTC [cauthdsl] func2 -> DEBU 2a0a 0xc003dfe5b0 principal matched by identity 0" -"2019-07-20 02:40:28.113 UTC [msp.identity] Verify -> DEBU 2a0b Verify: digest = 00000000 f7 63 6d 9c e3 0f 6f 49 34 31 c5 75 f8 cc 73 59 |.cm...oI41.u..sY| -00000010 3e 44 6c 0a ca 0b fa 16 82 5a 9e 34 f7 de cc 56 |>Dl......Z.4...V|" -"2019-07-20 02:40:28.113 UTC [msp.identity] Verify -> DEBU 2a0c Verify: sig = 00000000 30 44 02 20 76 ce ba 3c 46 66 e0 65 1c c7 ae 70 |0D. v.. DEBU 2a0d 0xc003dfe5b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.113 UTC [cauthdsl] func1 -> DEBU 2a0e 0xc003dfe5b0 gate 1563590428112919900 evaluation succeeds" -"2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a0f Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a11 Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a12 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:28.113 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2a13 constructing new tx simulator" -"2019-07-20 02:40:28.114 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2a14 constructing new tx simulator txid = [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" -"2019-07-20 02:40:28.114 UTC [endorser] SimulateProposal -> DEBU 2a15 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:28.114 UTC [stateleveldb] GetState -> DEBU 2a16 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:28.114 UTC [ccprovider] GetChaincodeData -> DEBU 2a17 Getting chaincode data for from cache" -"2019-07-20 02:40:28.114 UTC [endorser] callChaincode -> INFO 2a18 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:28.114 UTC [chaincode] Execute -> DEBU 2a19 Entry" -"2019-07-20 02:40:28.115 UTC [chaincode] handleMessage -> DEBU 2a1a [cc800e57] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:28.115 UTC [chaincode] HandleTransaction -> DEBU 2a1b [cc800e57] handling GET_STATE from chaincode" -"2019-07-20 02:40:28.115 UTC [chaincode] HandleGetState -> DEBU 2a1c [cc800e57] getting state for chaincode exp02, key a, channel businesschannel" -"2019-07-20 02:40:28.116 UTC [stateleveldb] GetState -> DEBU 2a1d GetState(). ns=exp02, key=a" -"2019-07-20 02:40:28.116 UTC [chaincode] HandleTransaction -> DEBU 2a1e [cc800e57] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:28.116 UTC [chaincode] handleMessage -> DEBU 2a1f [cc800e57] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:28.116 UTC [chaincode] Notify -> DEBU 2a20 [cc800e57] notifying Txid:cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, channelID:businesschannel" -"2019-07-20 02:40:28.116 UTC [chaincode] Execute -> DEBU 2a21 Exit" -"2019-07-20 02:40:28.116 UTC [endorser] callChaincode -> INFO 2a22 [businesschannel][cc800e57] Exit chaincode: name:"exp02" (2ms)" -"2019-07-20 02:40:28.117 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2a23 Simulation completed, getting simulation results" -"2019-07-20 02:40:28.117 UTC [lockbasedtxmgr] Done -> DEBU 2a24 Done with transaction simulation / query execution [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" -"2019-07-20 02:40:28.117 UTC [endorser] SimulateProposal -> DEBU 2a25 [businesschannel][cc800e57] Exit" -"2019-07-20 02:40:28.117 UTC [endorser] endorseProposal -> DEBU 2a26 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:28.117 UTC [endorser] endorseProposal -> DEBU 2a27 [businesschannel][cc800e57] escc for chaincode name:"exp02" is escc" -"2019-07-20 02:40:28.117 UTC [endorser] EndorseWithPlugin -> DEBU 2a28 Entering endorsement for {plugin: escc, channel: businesschannel, tx: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, chaincode: exp02}" -"2019-07-20 02:40:28.117 UTC [msp.identity] Sign -> DEBU 2a29 Sign: plaintext: 0A203057560B0313BBF17756CE01CD7D...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:28.117 UTC [msp.identity] Sign -> DEBU 2a2a Sign: digest: 6133F8EA9F116FF8A82DC6B0FBFF17BB6F8709BD253A81A79A71CB31DE79DE43 " -"2019-07-20 02:40:28.118 UTC [endorser] EndorseWithPlugin -> DEBU 2a2b Exiting {plugin: escc, channel: businesschannel, tx: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, chaincode: exp02}" -"2019-07-20 02:40:28.118 UTC [endorser] endorseProposal -> DEBU 2a2c [businesschannel][cc800e57] Exit" -"2019-07-20 02:40:28.118 UTC [lockbasedtxmgr] Done -> DEBU 2a2d Done with transaction simulation / query execution [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" -"2019-07-20 02:40:28.118 UTC [endorser] func1 -> DEBU 2a2e Exit: request from 172.18.0.9:58380" -"2019-07-20 02:40:28.118 UTC [comm.grpc.server] 1 -> INFO 2a2f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58380 grpc.code=OK grpc.call_duration=7.2891ms -"2019-07-20 02:40:28.121 UTC [grpc] infof -> DEBU 2a30 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:28.121 UTC [grpc] infof -> DEBU 2a31 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:28.256 UTC [gossip.pull] Hello -> DEBU 2a32 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:28.257 UTC [gossip.comm] Send -> DEBU 2a33 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:28.259 UTC [gossip.pull] Hello -> DEBU 2a34 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:28.259 UTC [gossip.comm] Send -> DEBU 2a35 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:28.260 UTC [gossip.pull] Hello -> DEBU 2a36 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:28.260 UTC [gossip.comm] Send -> DEBU 2a37 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:28.261 UTC [gossip.comm] sendToEndpoint -> DEBU 2a38 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.261 UTC [gossip.comm] sendToEndpoint -> DEBU 2a39 Exiting" -"2019-07-20 02:40:28.263 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.264 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3d Exiting" -"2019-07-20 02:40:28.264 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.265 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3e Exiting" -"2019-07-20 02:40:28.264 UTC [gossip.comm] func1 -> DEBU 2a3c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.265 UTC [gossip.gossip] handleMessage -> DEBU 2a3f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.266 UTC [gossip.pull] HandleMessage -> DEBU 2a40 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.266 UTC [gossip.gossip] handleMessage -> DEBU 2a41 Exiting" -"2019-07-20 02:40:28.266 UTC [gossip.comm] func1 -> DEBU 2a42 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.267 UTC [gossip.gossip] handleMessage -> DEBU 2a43 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.267 UTC [gossip.pull] HandleMessage -> DEBU 2a44 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.267 UTC [gossip.comm] func1 -> DEBU 2a45 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.267 UTC [gossip.gossip] handleMessage -> DEBU 2a46 Exiting" -"2019-07-20 02:40:28.268 UTC [gossip.gossip] handleMessage -> DEBU 2a47 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.268 UTC [gossip.pull] HandleMessage -> DEBU 2a48 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.268 UTC [gossip.gossip] handleMessage -> DEBU 2a49 Exiting" -"2019-07-20 02:40:28.297 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a4a Obtaining default signing identity" -"2019-07-20 02:40:28.298 UTC [msp.identity] Sign -> DEBU 2a4b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151023 " -"2019-07-20 02:40:28.298 UTC [msp.identity] Sign -> DEBU 2a4c Sign: digest: DD566ACBCC6F0F4BF5C93A6D9969AB3470634D6F878390F8EAAA43682E300636 " -"2019-07-20 02:40:28.299 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a4d Obtaining default signing identity" -"2019-07-20 02:40:28.299 UTC [msp.identity] Sign -> DEBU 2a4e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:28.300 UTC [msp.identity] Sign -> DEBU 2a4f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:28.300 UTC [gossip.comm] Send -> DEBU 2a50 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:28.301 UTC [msp] DeserializeIdentity -> DEBU 2a51 Obtaining identity" -"2019-07-20 02:40:28.301 UTC [gossip.comm] Send -> DEBU 2a52 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:28.302 UTC [gossip.comm] sendToEndpoint -> DEBU 2a53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.302 UTC [gossip.comm] sendToEndpoint -> DEBU 2a54 Exiting" -"2019-07-20 02:40:28.302 UTC [msp] DeserializeIdentity -> DEBU 2a55 Obtaining identity" -"2019-07-20 02:40:28.302 UTC [gossip.comm] Send -> DEBU 2a56 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 2a57 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 2a58 Exiting" -"2019-07-20 02:40:28.305 UTC [gossip.comm] func1 -> DEBU 2a59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.305 UTC [gossip.gossip] handleMessage -> DEBU 2a5a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.305 UTC [gossip.gossip] handleMessage -> DEBU 2a5b Exiting" -"2019-07-20 02:40:28.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.305 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.306 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5f Exiting" -"2019-07-20 02:40:28.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a5e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:28.311 UTC [gossip.comm] func1 -> DEBU 2a60 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.311 UTC [gossip.gossip] handleMessage -> DEBU 2a61 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.311 UTC [gossip.comm] func1 -> DEBU 2a62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.311 UTC [msp.identity] Verify -> DEBU 2a63 Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| -00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" -"2019-07-20 02:40:28.312 UTC [msp.identity] Verify -> DEBU 2a64 Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| -00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| -00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| -00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| -00000040 54 e8 23 31 4c ad 20 |T.#1L. |" -"2019-07-20 02:40:28.312 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a65 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.312 UTC [gossip.discovery] isSentByMe -> DEBU 2a66 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a67 Exiting" -"2019-07-20 02:40:28.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a68 Exiting" -"2019-07-20 02:40:28.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a69 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.314 UTC [gossip.gossip] handleMessage -> DEBU 2a6a Exiting" -"2019-07-20 02:40:28.314 UTC [gossip.gossip] handleMessage -> DEBU 2a6c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a6b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:28.314 UTC [msp.identity] Verify -> DEBU 2a6d Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| -00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" -"2019-07-20 02:40:28.315 UTC [msp.identity] Verify -> DEBU 2a6e Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| -00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| -00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| -00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| -00000040 54 e8 23 31 4c ad 20 |T.#1L. |" -"2019-07-20 02:40:28.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a6f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.316 UTC [gossip.discovery] isSentByMe -> DEBU 2a70 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a71 Exiting" -"2019-07-20 02:40:28.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a72 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:28.316 UTC [msp] DeserializeIdentity -> DEBU 2a73 Obtaining identity" -"2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a74 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a75 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a76 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a77 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a78 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:28.318 UTC [cauthdsl] func1 -> DEBU 2a7a 0xc0004eff30 gate 1563590428318061300 evaluation starts" -"2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7b 0xc0004eff30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7c 0xc0004eff30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7d 0xc0004eff30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7e 0xc0004eff30 principal evaluation fails" -"2019-07-20 02:40:28.318 UTC [cauthdsl] func1 -> DEBU 2a7f 0xc0004eff30 gate 1563590428318061300 evaluation fails" -"2019-07-20 02:40:28.318 UTC [policies] Evaluate -> DEBU 2a80 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.319 UTC [policies] Evaluate -> DEBU 2a81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.319 UTC [policies] Evaluate -> DEBU 2a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:28.319 UTC [cauthdsl] func1 -> DEBU 2a83 0xc000556770 gate 1563590428319543900 evaluation starts" -"2019-07-20 02:40:28.319 UTC [cauthdsl] func2 -> DEBU 2a84 0xc000556770 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.319 UTC [cauthdsl] func2 -> DEBU 2a85 0xc000556770 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.320 UTC [cauthdsl] func2 -> DEBU 2a86 0xc000556770 principal matched by identity 0" -"2019-07-20 02:40:28.320 UTC [msp.identity] Verify -> DEBU 2a87 Verify: digest = 00000000 44 7e e5 24 1a e0 8b 4c c7 85 ea 43 02 f3 73 0d |D~.$...L...C..s.| -00000010 ee 85 7e 9c cb af b6 05 57 83 87 05 7e 4e 25 d8 |..~.....W...~N%.|" -"2019-07-20 02:40:28.320 UTC [msp.identity] Verify -> DEBU 2a88 Verify: sig = 00000000 30 44 02 20 2b bf 05 66 a2 a0 25 38 81 fc 86 73 |0D. +..f..%8...s| -00000010 dc 3f 28 4b b8 b5 54 d8 cc e7 30 66 79 20 f8 b0 |.?(K..T...0fy ..| -00000020 6e b4 c1 23 02 20 50 86 69 b7 c5 1f 6d 81 53 81 |n..#. P.i...m.S.| -00000030 3c 67 7b 04 48 0a f7 1a 05 79 1c 48 a9 70 09 49 | DEBU 2a89 0xc000556770 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.320 UTC [cauthdsl] func1 -> DEBU 2a8a 0xc000556770 gate 1563590428319543900 evaluation succeeds" -"2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:28.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a8f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:28.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a90 Exiting" -"2019-07-20 02:40:28.322 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a91 Exiting" -"2019-07-20 02:40:28.322 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.322 UTC [gossip.gossip] handleMessage -> DEBU 2a93 Exiting" -"2019-07-20 02:40:28.323 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a94 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:28.324 UTC [msp.identity] Verify -> DEBU 2a95 Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| -00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" -"2019-07-20 02:40:28.326 UTC [msp.identity] Verify -> DEBU 2a96 Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| -00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| -00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| -00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| -00000040 54 e8 23 31 4c ad 20 |T.#1L. |" -"2019-07-20 02:40:28.327 UTC [msp.identity] Verify -> DEBU 2a97 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:28.327 UTC [msp.identity] Verify -> DEBU 2a98 Verify: sig = 00000000 30 45 02 21 00 ad 7b 41 8f d5 3d 54 c2 64 5f 84 |0E.!..{A..=T.d_.| -00000010 05 26 86 79 15 e2 67 05 70 51 4e e3 47 b4 f3 8a |.&.y..g.pQN.G...| -00000020 a3 1a 1a a3 7a 02 20 76 54 21 e8 2d e2 d2 d3 47 |....z. vT!.-...G| -00000030 65 80 54 e2 59 47 47 d3 ee 0b c4 f4 bc 92 51 fc |e.T.YGG.......Q.| -00000040 6b 5e 10 f1 dc fd 42 |k^....B|" -"2019-07-20 02:40:28.327 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a99 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:28.327 UTC [gossip.discovery] isSentByMe -> DEBU 2a9a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:28.327 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a9b Exiting" -"2019-07-20 02:40:28.327 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a9c Exiting" -"2019-07-20 02:40:28.367 UTC [gossip.comm] func1 -> DEBU 2a9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.368 UTC [gossip.gossip] handleMessage -> DEBU 2a9e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.368 UTC [gossip.pull] HandleMessage -> DEBU 2a9f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.369 UTC [gossip.pull] SendDigest -> DEBU 2aa0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:28.369 UTC [gossip.gossip] handleMessage -> DEBU 2aa1 Exiting" -"2019-07-20 02:40:28.389 UTC [gossip.comm] func1 -> DEBU 2aa2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.389 UTC [gossip.gossip] handleMessage -> DEBU 2aa3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.390 UTC [gossip.gossip] handleMessage -> DEBU 2aa4 Exiting" -"2019-07-20 02:40:28.390 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aa5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.394 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aa6 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:28.394 UTC [msp.identity] Verify -> DEBU 2aa7 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| -00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" -"2019-07-20 02:40:28.394 UTC [msp.identity] Verify -> DEBU 2aa8 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| -00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| -00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| -00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| -00000040 26 61 82 2d 44 90 |&a.-D.|" -"2019-07-20 02:40:28.395 UTC [msp.identity] Verify -> DEBU 2aa9 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:28.395 UTC [msp.identity] Verify -> DEBU 2aaa Verify: sig = 00000000 30 45 02 21 00 f5 8a 76 70 1b 9e 13 5b bc 43 19 |0E.!...vp...[.C.| -00000010 06 6f c9 d9 d1 12 64 6a 6c 56 fd 82 e1 aa 45 37 |.o....djlV....E7| -00000020 94 52 38 8e 4a 02 20 32 69 7f 61 06 4a 6c 28 0e |.R8.J. 2i.a.Jl(.| -00000030 1a 1c 48 26 9b a1 07 62 f4 21 8b e4 98 7b ff e0 |..H&...b.!...{..| -00000040 d1 fd 28 be 2f 8e af |..(./..|" -"2019-07-20 02:40:28.396 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aab Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aac Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aad updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aae Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aaf Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:28.397 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ab0 Exiting" -"2019-07-20 02:40:28.397 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ab1 Exiting" -"2019-07-20 02:40:28.398 UTC [gossip.discovery] sendMemResponse -> DEBU 2ab2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:28.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ab3 Exiting" -"2019-07-20 02:40:28.398 UTC [msp] DeserializeIdentity -> DEBU 2ab4 Obtaining identity" -"2019-07-20 02:40:28.398 UTC [msp] DeserializeIdentity -> DEBU 2ab5 Obtaining identity" -"2019-07-20 02:40:28.398 UTC [gossip.comm] Send -> DEBU 2ab6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:28.399 UTC [gossip.discovery] sendMemResponse -> DEBU 2ab7 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > alive: " -"2019-07-20 02:40:28.399 UTC [gossip.comm] sendToEndpoint -> DEBU 2ab8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.399 UTC [gossip.comm] sendToEndpoint -> DEBU 2ab9 Exiting" -"2019-07-20 02:40:28.554 UTC [gossip.comm] func1 -> DEBU 2aba Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.555 UTC [gossip.gossip] handleMessage -> DEBU 2abb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.555 UTC [gossip.pull] HandleMessage -> DEBU 2abc GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abd Obtaining identity" -"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abe Obtaining identity" -"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abf Obtaining identity" -"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac0 Obtaining identity" -"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac1 Obtaining identity" -"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac2 Obtaining identity" -"2019-07-20 02:40:28.557 UTC [gossip.pull] SendDigest -> DEBU 2ac3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:28.557 UTC [gossip.gossip] handleMessage -> DEBU 2ac4 Exiting" -"2019-07-20 02:40:28.568 UTC [gossip.comm] func1 -> DEBU 2ac5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.568 UTC [gossip.gossip] handleMessage -> DEBU 2ac6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.568 UTC [gossip.gossip] handleMessage -> DEBU 2ac7 Exiting" -"2019-07-20 02:40:28.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ac8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ac9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:28.568 UTC [msp] DeserializeIdentity -> DEBU 2aca Obtaining identity" -"2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2acb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2acc Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2acd Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2ace == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2acf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:28.568 UTC [cauthdsl] func1 -> DEBU 2ad1 0xc0034f2890 gate 1563590428568875200 evaluation starts" -"2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad2 0xc0034f2890 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad3 0xc0034f2890 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad4 0xc0034f2890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2ad5 0xc0034f2890 principal evaluation fails" -"2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ad6 0xc0034f2890 gate 1563590428568875200 evaluation fails" -"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ada 0xc0034f30d0 gate 1563590428569180700 evaluation starts" -"2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2adb 0xc0034f30d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2adc 0xc0034f30d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2add 0xc0034f30d0 principal matched by identity 0" -"2019-07-20 02:40:28.569 UTC [msp.identity] Verify -> DEBU 2ade Verify: digest = 00000000 40 2b f7 73 71 07 be 3d 8d 3a 01 a9 b4 d9 fe 90 |@+.sq..=.:......| -00000010 6a c1 c7 c4 33 6e df 0b 76 66 29 af 56 ed 7d 4b |j...3n..vf).V.}K|" -"2019-07-20 02:40:28.569 UTC [msp.identity] Verify -> DEBU 2adf Verify: sig = 00000000 30 45 02 21 00 fa 09 c8 75 e9 29 5a 14 9b e7 0e |0E.!....u.)Z....| -00000010 f7 c6 4f 84 1c 13 a9 62 61 1b b7 fb 37 3c d6 d3 |..O....ba...7<..| -00000020 69 a4 91 ec 0e 02 20 37 8d c7 64 07 a9 83 4d de |i..... 7..d...M.| -00000030 20 7b 6c 93 82 bc 01 d2 47 d7 f6 50 ad 2c 70 72 | {l.....G..P.,pr| -00000040 73 f1 a6 87 33 15 00 |s...3..|" -"2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2ae0 0xc0034f30d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ae1 0xc0034f30d0 gate 1563590428569180700 evaluation succeeds" -"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae4 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:28.570 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ae6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae8 updating membership: timestamp: " -"2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae9 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aea Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aeb Exiting" -"2019-07-20 02:40:28.570 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aec Exiting" -"2019-07-20 02:40:28.570 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aed Exiting" -"2019-07-20 02:40:28.570 UTC [gossip.discovery] sendMemResponse -> DEBU 2aee Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2aef Obtaining identity" -"2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2af0 Obtaining identity" -"2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2af1 Obtaining identity" -"2019-07-20 02:40:28.570 UTC [gossip.comm] Send -> DEBU 2af2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:28.570 UTC [gossip.discovery] sendMemResponse -> DEBU 2af3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" > alive: alive: alive: " -"2019-07-20 02:40:28.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2af4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2af5 Exiting" -"2019-07-20 02:40:28.719 UTC [msp] DeserializeIdentity -> DEBU 2af6 Obtaining identity" -"2019-07-20 02:40:28.719 UTC [msp] DeserializeIdentity -> DEBU 2af7 Obtaining identity" -"2019-07-20 02:40:28.720 UTC [gossip.comm] Send -> DEBU 2af8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2af9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afa Exiting" -"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afc Exiting" -"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afe Exiting" -"2019-07-20 02:40:28.723 UTC [gossip.comm] func1 -> DEBU 2aff Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.727 UTC [gossip.gossip] handleMessage -> DEBU 2b00 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.728 UTC [gossip.comm] func1 -> DEBU 2b01 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.731 UTC [gossip.comm] func1 -> DEBU 2b02 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.733 UTC [msp] DeserializeIdentity -> DEBU 2b03 Obtaining identity" -"2019-07-20 02:40:28.733 UTC [msp] DeserializeIdentity -> DEBU 2b05 Obtaining identity" -"2019-07-20 02:40:28.734 UTC [gossip.comm] Send -> DEBU 2b06 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" -"2019-07-20 02:40:28.734 UTC [msp] DeserializeIdentity -> DEBU 2b07 Obtaining identity" -"2019-07-20 02:40:28.734 UTC [msp] DeserializeIdentity -> DEBU 2b08 Obtaining identity" -"2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b09 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0a Exiting" -"2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.735 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0c Exiting" -"2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.733 UTC [msp.identity] Verify -> DEBU 2b04 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| -00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" -"2019-07-20 02:40:28.736 UTC [msp.identity] Verify -> DEBU 2b0f Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| -00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| -00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| -00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| -00000040 bb 08 c9 6d 24 57 fb |...m$W.|" -"2019-07-20 02:40:28.736 UTC [msp] DeserializeIdentity -> DEBU 2b10 Obtaining identity" -"2019-07-20 02:40:28.736 UTC [msp] DeserializeIdentity -> DEBU 2b11 Obtaining identity" -"2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b12 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b13 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b14 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.737 UTC [policies] Evaluate -> DEBU 2b15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:28.737 UTC [policies] Evaluate -> DEBU 2b16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.738 UTC [policies] Evaluate -> DEBU 2b17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:28.738 UTC [cauthdsl] func1 -> DEBU 2b18 0xc0032f5cb0 gate 1563590428738122700 evaluation starts" -"2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b19 0xc0032f5cb0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1a 0xc0032f5cb0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1b 0xc0032f5cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1c 0xc0032f5cb0 principal evaluation fails" -"2019-07-20 02:40:28.738 UTC [cauthdsl] func1 -> DEBU 2b1d 0xc0032f5cb0 gate 1563590428738122700 evaluation fails" -"2019-07-20 02:40:28.738 UTC [policies] Evaluate -> DEBU 2b1e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.739 UTC [policies] Evaluate -> DEBU 2b1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.739 UTC [policies] Evaluate -> DEBU 2b20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:28.739 UTC [cauthdsl] func1 -> DEBU 2b21 0xc003ba24f0 gate 1563590428739538400 evaluation starts" -"2019-07-20 02:40:28.739 UTC [cauthdsl] func2 -> DEBU 2b22 0xc003ba24f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.739 UTC [cauthdsl] func2 -> DEBU 2b23 0xc003ba24f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.741 UTC [cauthdsl] func2 -> DEBU 2b24 0xc003ba24f0 principal matched by identity 0" -"2019-07-20 02:40:28.741 UTC [msp.identity] Verify -> DEBU 2b25 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| -00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" -"2019-07-20 02:40:28.736 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0e Exiting" -"2019-07-20 02:40:28.745 UTC [msp.identity] Verify -> DEBU 2b26 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| -00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| -00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| -00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| -00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" -"2019-07-20 02:40:28.746 UTC [cauthdsl] func2 -> DEBU 2b27 0xc003ba24f0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.746 UTC [cauthdsl] func1 -> DEBU 2b28 0xc003ba24f0 gate 1563590428739538400 evaluation succeeds" -"2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b29 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b2b Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:28.748 UTC [policies] Evaluate -> DEBU 2b2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:28.748 UTC [msp] DeserializeIdentity -> DEBU 2b2d Obtaining identity" -"2019-07-20 02:40:28.749 UTC [msp] DeserializeIdentity -> DEBU 2b2e Obtaining identity" -"2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b2f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b30 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b31 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b32 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b33 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:28.752 UTC [cauthdsl] func1 -> DEBU 2b35 0xc003ba3cc0 gate 1563590428752408800 evaluation starts" -"2019-07-20 02:40:28.752 UTC [cauthdsl] func2 -> DEBU 2b36 0xc003ba3cc0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.752 UTC [cauthdsl] func2 -> DEBU 2b37 0xc003ba3cc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.753 UTC [cauthdsl] func2 -> DEBU 2b38 0xc003ba3cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:28.753 UTC [cauthdsl] func2 -> DEBU 2b39 0xc003ba3cc0 principal evaluation fails" -"2019-07-20 02:40:28.753 UTC [cauthdsl] func1 -> DEBU 2b3a 0xc003ba3cc0 gate 1563590428752408800 evaluation fails" -"2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:28.754 UTC [cauthdsl] func1 -> DEBU 2b3e 0xc003d68500 gate 1563590428754307100 evaluation starts" -"2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b3f 0xc003d68500 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b40 0xc003d68500 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b41 0xc003d68500 principal matched by identity 0" -"2019-07-20 02:40:28.754 UTC [msp.identity] Verify -> DEBU 2b42 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -"2019-07-20 02:40:28.754 UTC [msp.identity] Verify -> DEBU 2b43 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -00000040 a3 bb 17 85 f1 b2 |......|" -"2019-07-20 02:40:28.755 UTC [cauthdsl] func2 -> DEBU 2b44 0xc003d68500 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.755 UTC [cauthdsl] func1 -> DEBU 2b45 0xc003d68500 gate 1563590428754307100 evaluation succeeds" -"2019-07-20 02:40:28.755 UTC [policies] Evaluate -> DEBU 2b46 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.755 UTC [policies] Evaluate -> DEBU 2b47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.756 UTC [policies] Evaluate -> DEBU 2b48 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:28.756 UTC [policies] Evaluate -> DEBU 2b49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:28.757 UTC [msp.identity] Verify -> DEBU 2b4a Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2b4b Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -"2019-07-20 02:40:28.757 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b4c Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.757 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b4d Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.757 UTC [policies] Evaluate -> DEBU 2b4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:28.757 UTC [policies] Evaluate -> DEBU 2b4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.758 UTC [policies] Evaluate -> DEBU 2b50 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:28.758 UTC [cauthdsl] func1 -> DEBU 2b51 0xc003d69c00 gate 1563590428758639500 evaluation starts" -"2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b52 0xc003d69c00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b53 0xc003d69c00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b54 0xc003d69c00 principal matched by identity 0" -"2019-07-20 02:40:28.759 UTC [msp.identity] Verify -> DEBU 2b55 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2b56 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -"2019-07-20 02:40:28.760 UTC [cauthdsl] func2 -> DEBU 2b57 0xc003d69c00 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.760 UTC [cauthdsl] func1 -> DEBU 2b58 0xc003d69c00 gate 1563590428758639500 evaluation succeeds" -"2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b59 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b5b Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:28.761 UTC [policies] Evaluate -> DEBU 2b5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:28.761 UTC [gossip.gossip] handleMessage -> DEBU 2b5d Exiting" -"2019-07-20 02:40:28.762 UTC [gossip.gossip] handleMessage -> DEBU 2b5f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.762 UTC [msp] DeserializeIdentity -> DEBU 2b60 Obtaining identity" -"2019-07-20 02:40:28.761 UTC [msp] DeserializeIdentity -> DEBU 2b5e Obtaining identity" -"2019-07-20 02:40:28.762 UTC [msp] DeserializeIdentity -> DEBU 2b61 Obtaining identity" -"2019-07-20 02:40:28.763 UTC [gossip.pull] Hello -> DEBU 2b62 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:28.763 UTC [msp.identity] Verify -> DEBU 2b63 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| -00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" -"2019-07-20 02:40:28.763 UTC [msp.identity] Verify -> DEBU 2b64 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| -00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| -00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| -00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| -00000040 bb 08 c9 6d 24 57 fb |...m$W.|" -"2019-07-20 02:40:28.763 UTC [msp] DeserializeIdentity -> DEBU 2b65 Obtaining identity" -"2019-07-20 02:40:28.764 UTC [msp] DeserializeIdentity -> DEBU 2b66 Obtaining identity" -"2019-07-20 02:40:28.764 UTC [gossip.comm] Send -> DEBU 2b67 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:28.764 UTC [gossip.comm] sendToEndpoint -> DEBU 2b68 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.764 UTC [gossip.comm] sendToEndpoint -> DEBU 2b69 Exiting" -"2019-07-20 02:40:28.765 UTC [gossip.comm] func1 -> DEBU 2b6a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.765 UTC [msp.identity] Verify -> DEBU 2b6b Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -"2019-07-20 02:40:28.765 UTC [msp.identity] Verify -> DEBU 2b6c Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -00000040 93 08 2f 55 cd 66 |../U.f|" -"2019-07-20 02:40:28.766 UTC [msp] DeserializeIdentity -> DEBU 2b6d Obtaining identity" -"2019-07-20 02:40:28.766 UTC [msp] DeserializeIdentity -> DEBU 2b6e Obtaining identity" -"2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b6f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b70 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b71 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.767 UTC [policies] Evaluate -> DEBU 2b72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:28.768 UTC [policies] Evaluate -> DEBU 2b73 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.768 UTC [policies] Evaluate -> DEBU 2b74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:28.768 UTC [cauthdsl] func1 -> DEBU 2b75 0xc0039e9890 gate 1563590428768410700 evaluation starts" -"2019-07-20 02:40:28.768 UTC [cauthdsl] func2 -> DEBU 2b76 0xc0039e9890 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b77 0xc0039e9890 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b78 0xc0039e9890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b79 0xc0039e9890 principal evaluation fails" -"2019-07-20 02:40:28.769 UTC [cauthdsl] func1 -> DEBU 2b7a 0xc0039e9890 gate 1563590428768410700 evaluation fails" -"2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:28.769 UTC [cauthdsl] func1 -> DEBU 2b7e 0xc003efa0d0 gate 1563590428769550200 evaluation starts" -"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b7f 0xc003efa0d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b80 0xc003efa0d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b81 0xc003efa0d0 principal matched by identity 0" -"2019-07-20 02:40:28.769 UTC [msp.identity] Verify -> DEBU 2b82 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| -00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" -"2019-07-20 02:40:28.770 UTC [msp.identity] Verify -> DEBU 2b83 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| -00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| -00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| -00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| -00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" -"2019-07-20 02:40:28.770 UTC [cauthdsl] func2 -> DEBU 2b84 0xc003efa0d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.770 UTC [cauthdsl] func1 -> DEBU 2b85 0xc003efa0d0 gate 1563590428769550200 evaluation succeeds" -"2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b88 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:28.771 UTC [policies] Evaluate -> DEBU 2b89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:28.771 UTC [msp] DeserializeIdentity -> DEBU 2b8a Obtaining identity" -"2019-07-20 02:40:28.771 UTC [msp] DeserializeIdentity -> DEBU 2b8b Obtaining identity" -"2019-07-20 02:40:28.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b8c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:28.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b8d Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b8e Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:28.772 UTC [cauthdsl] func1 -> DEBU 2b92 0xc003efb8a0 gate 1563590428772520400 evaluation starts" -"2019-07-20 02:40:28.772 UTC [cauthdsl] func2 -> DEBU 2b93 0xc003efb8a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.773 UTC [cauthdsl] func2 -> DEBU 2b94 0xc003efb8a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.773 UTC [cauthdsl] func2 -> DEBU 2b95 0xc003efb8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:28.774 UTC [cauthdsl] func2 -> DEBU 2b96 0xc003efb8a0 principal evaluation fails" -"2019-07-20 02:40:28.774 UTC [cauthdsl] func1 -> DEBU 2b97 0xc003efb8a0 gate 1563590428772520400 evaluation fails" -"2019-07-20 02:40:28.774 UTC [policies] Evaluate -> DEBU 2b98 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.775 UTC [policies] Evaluate -> DEBU 2b99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.775 UTC [policies] Evaluate -> DEBU 2b9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:28.775 UTC [cauthdsl] func1 -> DEBU 2b9b 0xc0006be0e0 gate 1563590428775611400 evaluation starts" -"2019-07-20 02:40:28.775 UTC [cauthdsl] func2 -> DEBU 2b9c 0xc0006be0e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.775 UTC [cauthdsl] func2 -> DEBU 2b9d 0xc0006be0e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.776 UTC [cauthdsl] func2 -> DEBU 2b9e 0xc0006be0e0 principal matched by identity 0" -"2019-07-20 02:40:28.776 UTC [msp.identity] Verify -> DEBU 2b9f Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -"2019-07-20 02:40:28.776 UTC [msp.identity] Verify -> DEBU 2ba0 Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -00000040 86 55 07 8f d3 65 |.U...e|" -"2019-07-20 02:40:28.777 UTC [cauthdsl] func2 -> DEBU 2ba1 0xc0006be0e0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.778 UTC [cauthdsl] func1 -> DEBU 2ba2 0xc0006be0e0 gate 1563590428775611400 evaluation succeeds" -"2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba5 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:28.778 UTC [msp] DeserializeIdentity -> DEBU 2ba7 Obtaining identity" -"2019-07-20 02:40:28.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ba8 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ba9 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2baa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2bab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2bac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:28.779 UTC [cauthdsl] func1 -> DEBU 2bad 0xc0006bf1c0 gate 1563590428779691300 evaluation starts" -"2019-07-20 02:40:28.779 UTC [cauthdsl] func2 -> DEBU 2bae 0xc0006bf1c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2baf 0xc0006bf1c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb0 0xc0006bf1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb1 0xc0006bf1c0 principal evaluation fails" -"2019-07-20 02:40:28.780 UTC [cauthdsl] func1 -> DEBU 2bb2 0xc0006bf1c0 gate 1563590428779691300 evaluation fails" -"2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:28.780 UTC [cauthdsl] func1 -> DEBU 2bb6 0xc0006bfa00 gate 1563590428780810500 evaluation starts" -"2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb7 0xc0006bfa00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bb8 0xc0006bfa00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bb9 0xc0006bfa00 principal matched by identity 0" -"2019-07-20 02:40:28.781 UTC [msp.identity] Verify -> DEBU 2bba Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -"2019-07-20 02:40:28.781 UTC [msp.identity] Verify -> DEBU 2bbb Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -00000040 86 55 07 8f d3 65 |.U...e|" -"2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bbc 0xc0006bfa00 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.781 UTC [cauthdsl] func1 -> DEBU 2bbd 0xc0006bfa00 gate 1563590428780810500 evaluation succeeds" -"2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bbe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bc0 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:28.782 UTC [gossip.gossip] handleMessage -> DEBU 2bc2 Exiting" -"2019-07-20 02:40:28.782 UTC [gossip.gossip] handleMessage -> DEBU 2bc3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.782 UTC [msp] DeserializeIdentity -> DEBU 2bc4 Obtaining identity" -"2019-07-20 02:40:28.783 UTC [msp.identity] Verify -> DEBU 2bc5 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| -00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" -"2019-07-20 02:40:28.783 UTC [msp.identity] Verify -> DEBU 2bc6 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| -00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| -00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| -00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| -00000040 bb 08 c9 6d 24 57 fb |...m$W.|" -"2019-07-20 02:40:28.784 UTC [msp.identity] Verify -> DEBU 2bc7 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| -00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" -"2019-07-20 02:40:28.784 UTC [msp.identity] Verify -> DEBU 2bc8 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| -00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| -00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| -00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| -00000040 93 08 2f 55 cd 66 |../U.f|" -"2019-07-20 02:40:28.784 UTC [msp] DeserializeIdentity -> DEBU 2bc9 Obtaining identity" -"2019-07-20 02:40:28.784 UTC [msp] DeserializeIdentity -> DEBU 2bca Obtaining identity" -"2019-07-20 02:40:28.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bcb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:28.785 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcc Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.785 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcd Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:28.785 UTC [cauthdsl] func1 -> DEBU 2bd1 0xc0007fc350 gate 1563590428785776500 evaluation starts" -"2019-07-20 02:40:28.785 UTC [cauthdsl] func2 -> DEBU 2bd2 0xc0007fc350 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd3 0xc0007fc350 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd4 0xc0007fc350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd5 0xc0007fc350 principal evaluation fails" -"2019-07-20 02:40:28.786 UTC [cauthdsl] func1 -> DEBU 2bd6 0xc0007fc350 gate 1563590428785776500 evaluation fails" -"2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:28.786 UTC [cauthdsl] func1 -> DEBU 2bda 0xc0007fcb90 gate 1563590428786851300 evaluation starts" -"2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdb 0xc0007fcb90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdc 0xc0007fcb90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdd 0xc0007fcb90 principal matched by identity 0" -"2019-07-20 02:40:28.787 UTC [msp.identity] Verify -> DEBU 2bde Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| -00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" -"2019-07-20 02:40:28.787 UTC [msp.identity] Verify -> DEBU 2bdf Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| -00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| -00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| -00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| -00000040 a3 bb 17 85 f1 b2 |......|" -"2019-07-20 02:40:28.788 UTC [cauthdsl] func2 -> DEBU 2be0 0xc0007fcb90 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.788 UTC [cauthdsl] func1 -> DEBU 2be1 0xc0007fcb90 gate 1563590428786851300 evaluation succeeds" -"2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be4 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:28.788 UTC [msp] DeserializeIdentity -> DEBU 2be6 Obtaining identity" -"2019-07-20 02:40:28.789 UTC [msp] DeserializeIdentity -> DEBU 2be7 Obtaining identity" -"2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2be8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be9 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bea Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.789 UTC [policies] Evaluate -> DEBU 2beb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:28.790 UTC [policies] Evaluate -> DEBU 2bec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.790 UTC [policies] Evaluate -> DEBU 2bed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:28.791 UTC [cauthdsl] func1 -> DEBU 2bee 0xc00080a360 gate 1563590428791136600 evaluation starts" -"2019-07-20 02:40:28.791 UTC [cauthdsl] func2 -> DEBU 2bef 0xc00080a360 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.791 UTC [cauthdsl] func2 -> DEBU 2bf0 0xc00080a360 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.793 UTC [cauthdsl] func2 -> DEBU 2bf1 0xc00080a360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:28.793 UTC [cauthdsl] func2 -> DEBU 2bf2 0xc00080a360 principal evaluation fails" -"2019-07-20 02:40:28.793 UTC [cauthdsl] func1 -> DEBU 2bf3 0xc00080a360 gate 1563590428791136600 evaluation fails" -"2019-07-20 02:40:28.793 UTC [policies] Evaluate -> DEBU 2bf4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.794 UTC [policies] Evaluate -> DEBU 2bf5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.794 UTC [policies] Evaluate -> DEBU 2bf6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:28.794 UTC [cauthdsl] func1 -> DEBU 2bf7 0xc00080aba0 gate 1563590428794390900 evaluation starts" -"2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bf8 0xc00080aba0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bf9 0xc00080aba0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bfa 0xc00080aba0 principal matched by identity 0" -"2019-07-20 02:40:28.794 UTC [msp.identity] Verify -> DEBU 2bfb Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| -00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" -"2019-07-20 02:40:28.794 UTC [msp.identity] Verify -> DEBU 2bfc Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| -00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2bfd 0xc00080aba0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.795 UTC [cauthdsl] func1 -> DEBU 2bfe 0xc00080aba0 gate 1563590428794390900 evaluation succeeds" -"2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2bff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c00 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c01 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:28.795 UTC [msp] DeserializeIdentity -> DEBU 2c03 Obtaining identity" -"2019-07-20 02:40:28.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c04 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c05 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:28.796 UTC [cauthdsl] func1 -> DEBU 2c09 0xc00080bc80 gate 1563590428796725600 evaluation starts" -"2019-07-20 02:40:28.796 UTC [cauthdsl] func2 -> DEBU 2c0a 0xc00080bc80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.796 UTC [cauthdsl] func2 -> DEBU 2c0b 0xc00080bc80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.797 UTC [cauthdsl] func2 -> DEBU 2c0c 0xc00080bc80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:28.797 UTC [cauthdsl] func2 -> DEBU 2c0d 0xc00080bc80 principal evaluation fails" -"2019-07-20 02:40:28.797 UTC [cauthdsl] func1 -> DEBU 2c0e 0xc00080bc80 gate 1563590428796725600 evaluation fails" -"2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c0f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:28.797 UTC [cauthdsl] func1 -> DEBU 2c12 0xc0028aa4c0 gate 1563590428797791000 evaluation starts" -"2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c13 0xc0028aa4c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c14 0xc0028aa4c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c15 0xc0028aa4c0 principal matched by identity 0" -"2019-07-20 02:40:28.798 UTC [msp.identity] Verify -> DEBU 2c16 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| -00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" -"2019-07-20 02:40:28.798 UTC [msp.identity] Verify -> DEBU 2c17 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| -00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2c18 0xc0028aa4c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:28.798 UTC [cauthdsl] func1 -> DEBU 2c19 0xc0028aa4c0 gate 1563590428797791000 evaluation succeeds" -"2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:28.799 UTC [gossip.gossip] handleMessage -> DEBU 2c1e Exiting" -"2019-07-20 02:40:28.799 UTC [gossip.gossip] handleMessage -> DEBU 2c1f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.799 UTC [gossip.pull] HandleMessage -> DEBU 2c20 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.800 UTC [gossip.gossip] handleMessage -> DEBU 2c21 Exiting" -"2019-07-20 02:40:28.878 UTC [gossip.comm] func1 -> DEBU 2c22 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.878 UTC [gossip.gossip] handleMessage -> DEBU 2c23 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.879 UTC [msp] DeserializeIdentity -> DEBU 2c24 Obtaining identity" -"2019-07-20 02:40:28.881 UTC [msp] DeserializeIdentity -> DEBU 2c25 Obtaining identity" -"2019-07-20 02:40:28.882 UTC [gossip.gossip] handleMessage -> DEBU 2c26 Exiting" -"2019-07-20 02:40:28.885 UTC [gossip.comm] func1 -> DEBU 2c27 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.885 UTC [gossip.gossip] handleMessage -> DEBU 2c28 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.886 UTC [msp.identity] Verify -> DEBU 2c29 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c2a Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -"2019-07-20 02:40:28.886 UTC [gossip.gossip] handleMessage -> DEBU 2c2b Exiting" -"2019-07-20 02:40:28.889 UTC [gossip.comm] func1 -> DEBU 2c2c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.889 UTC [gossip.gossip] handleMessage -> DEBU 2c2d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.889 UTC [msp.identity] Verify -> DEBU 2c2e Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c2f Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -"2019-07-20 02:40:28.890 UTC [msp] DeserializeIdentity -> DEBU 2c30 Obtaining identity" -"2019-07-20 02:40:28.890 UTC [gossip.gossip] handleMessage -> DEBU 2c31 Exiting" -"2019-07-20 02:40:28.899 UTC [gossip.comm] func1 -> DEBU 2c32 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.900 UTC [gossip.gossip] handleMessage -> DEBU 2c33 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:28.900 UTC [msp.identity] Verify -> DEBU 2c34 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c35 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -"2019-07-20 02:40:28.901 UTC [msp] DeserializeIdentity -> DEBU 2c36 Obtaining identity" -"2019-07-20 02:40:28.901 UTC [gossip.gossip] handleMessage -> DEBU 2c37 Exiting" -"2019-07-20 02:40:28.903 UTC [gossip.comm] func1 -> DEBU 2c38 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.903 UTC [gossip.gossip] handleMessage -> DEBU 2c39 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.904 UTC [gossip.pull] HandleMessage -> DEBU 2c3a GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:28.904 UTC [gossip.pull] SendDigest -> DEBU 2c3b Sending BLOCK_MSG digest: [1 2 3 4] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:28.904 UTC [gossip.gossip] handleMessage -> DEBU 2c3c Exiting" -"2019-07-20 02:40:29.045 UTC [gossip.comm] func1 -> DEBU 2c3d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:29.046 UTC [gossip.gossip] handleMessage -> DEBU 2c3e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:29.046 UTC [msp] DeserializeIdentity -> DEBU 2c3f Obtaining identity" -"2019-07-20 02:40:29.046 UTC [msp] DeserializeIdentity -> DEBU 2c40 Obtaining identity" -"2019-07-20 02:40:29.047 UTC [msp] DeserializeIdentity -> DEBU 2c41 Obtaining identity" -"2019-07-20 02:40:29.047 UTC [gossip.gossip] handleMessage -> DEBU 2c42 Exiting" -"2019-07-20 02:40:29.049 UTC [gossip.comm] func1 -> DEBU 2c43 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:29.049 UTC [gossip.gossip] handleMessage -> DEBU 2c44 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:29.049 UTC [msp] DeserializeIdentity -> DEBU 2c45 Obtaining identity" -"2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c47 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c48 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c49 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c4a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:29.050 UTC [cauthdsl] func1 -> DEBU 2c4c 0xc002a37700 gate 1563590429050765400 evaluation starts" -"2019-07-20 02:40:29.050 UTC [cauthdsl] func2 -> DEBU 2c4d 0xc002a37700 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c4e 0xc002a37700 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c4f 0xc002a37700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c50 0xc002a37700 principal evaluation fails" -"2019-07-20 02:40:29.052 UTC [cauthdsl] func1 -> DEBU 2c51 0xc002a37700 gate 1563590429050765400 evaluation fails" -"2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c52 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:29.052 UTC [cauthdsl] func1 -> DEBU 2c55 0xc002a37f40 gate 1563590429052725600 evaluation starts" -"2019-07-20 02:40:29.052 UTC [cauthdsl] func2 -> DEBU 2c56 0xc002a37f40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c57 0xc002a37f40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c58 0xc002a37f40 principal matched by identity 0" -"2019-07-20 02:40:29.053 UTC [msp.identity] Verify -> DEBU 2c59 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -"2019-07-20 02:40:29.053 UTC [msp.identity] Verify -> DEBU 2c5a Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -00000040 86 55 07 8f d3 65 |.U...e|" -"2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c5b 0xc002a37f40 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:29.053 UTC [cauthdsl] func1 -> DEBU 2c5c 0xc002a37f40 gate 1563590429052725600 evaluation succeeds" -"2019-07-20 02:40:29.053 UTC [policies] Evaluate -> DEBU 2c5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:29.053 UTC [policies] Evaluate -> DEBU 2c5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:29.054 UTC [policies] Evaluate -> DEBU 2c5f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:29.054 UTC [policies] Evaluate -> DEBU 2c60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:29.054 UTC [msp] DeserializeIdentity -> DEBU 2c61 Obtaining identity" -"2019-07-20 02:40:29.054 UTC [gossip.gossip] handleMessage -> DEBU 2c62 Exiting" -"2019-07-20 02:40:29.062 UTC [gossip.comm] func1 -> DEBU 2c63 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:29.063 UTC [gossip.gossip] handleMessage -> DEBU 2c64 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:29.063 UTC [msp] DeserializeIdentity -> DEBU 2c65 Obtaining identity" -"2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c67 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c68 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:29.064 UTC [policies] Evaluate -> DEBU 2c69 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:29.064 UTC [policies] Evaluate -> DEBU 2c6a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:29.065 UTC [policies] Evaluate -> DEBU 2c6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:29.065 UTC [cauthdsl] func1 -> DEBU 2c6c 0xc003c761e0 gate 1563590429065560400 evaluation starts" -"2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6d 0xc003c761e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6e 0xc003c761e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6f 0xc003c761e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c70 0xc003c761e0 principal evaluation fails" -"2019-07-20 02:40:29.066 UTC [cauthdsl] func1 -> DEBU 2c71 0xc003c761e0 gate 1563590429065560400 evaluation fails" -"2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c72 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:29.066 UTC [cauthdsl] func1 -> DEBU 2c75 0xc003c76a20 gate 1563590429066647500 evaluation starts" -"2019-07-20 02:40:29.066 UTC [cauthdsl] func2 -> DEBU 2c76 0xc003c76a20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:29.066 UTC [cauthdsl] func2 -> DEBU 2c77 0xc003c76a20 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:29.067 UTC [cauthdsl] func2 -> DEBU 2c78 0xc003c76a20 principal matched by identity 0" -"2019-07-20 02:40:29.067 UTC [msp.identity] Verify -> DEBU 2c79 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -"2019-07-20 02:40:29.067 UTC [msp.identity] Verify -> DEBU 2c7a Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -00000040 86 55 07 8f d3 65 |.U...e|" -"2019-07-20 02:40:29.067 UTC [cauthdsl] func2 -> DEBU 2c7b 0xc003c76a20 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:29.068 UTC [cauthdsl] func1 -> DEBU 2c7c 0xc003c76a20 gate 1563590429066647500 evaluation succeeds" -"2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c80 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:29.068 UTC [msp] DeserializeIdentity -> DEBU 2c81 Obtaining identity" -"2019-07-20 02:40:29.068 UTC [gossip.gossip] handleMessage -> DEBU 2c82 Exiting" -"2019-07-20 02:40:29.184 UTC [gossip.comm] func1 -> DEBU 2c83 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:29.185 UTC [gossip.gossip] handleMessage -> DEBU 2c84 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:29.185 UTC [msp] DeserializeIdentity -> DEBU 2c85 Obtaining identity" -"2019-07-20 02:40:29.186 UTC [msp] DeserializeIdentity -> DEBU 2c86 Obtaining identity" -"2019-07-20 02:40:29.186 UTC [msp] DeserializeIdentity -> DEBU 2c87 Obtaining identity" -"2019-07-20 02:40:29.187 UTC [gossip.gossip] handleMessage -> DEBU 2c88 Exiting" -"2019-07-20 02:40:29.195 UTC [gossip.comm] func1 -> DEBU 2c89 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:29.195 UTC [gossip.gossip] handleMessage -> DEBU 2c8a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:29.195 UTC [msp] DeserializeIdentity -> DEBU 2c8b Obtaining identity" -"2019-07-20 02:40:29.196 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c8c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:29.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8d Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:29.197 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8e Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:29.197 UTC [policies] Evaluate -> DEBU 2c8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:29.197 UTC [policies] Evaluate -> DEBU 2c90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:29.198 UTC [policies] Evaluate -> DEBU 2c91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:29.198 UTC [cauthdsl] func1 -> DEBU 2c92 0xc003b89a10 gate 1563590429198298900 evaluation starts" -"2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c93 0xc003b89a10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c94 0xc003b89a10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c95 0xc003b89a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c96 0xc003b89a10 principal evaluation fails" -"2019-07-20 02:40:29.199 UTC [cauthdsl] func1 -> DEBU 2c97 0xc003b89a10 gate 1563590429198298900 evaluation fails" -"2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c98 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:29.199 UTC [cauthdsl] func1 -> DEBU 2c9b 0xc003e72250 gate 1563590429199406700 evaluation starts" -"2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9c 0xc003e72250 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9d 0xc003e72250 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9e 0xc003e72250 principal matched by identity 0" -"2019-07-20 02:40:29.199 UTC [msp.identity] Verify -> DEBU 2c9f Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| -00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" -"2019-07-20 02:40:29.200 UTC [msp.identity] Verify -> DEBU 2ca0 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| -00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2ca1 0xc003e72250 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:29.200 UTC [cauthdsl] func1 -> DEBU 2ca2 0xc003e72250 gate 1563590429199406700 evaluation succeeds" -"2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca5 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:29.201 UTC [msp] DeserializeIdentity -> DEBU 2ca7 Obtaining identity" -"2019-07-20 02:40:29.201 UTC [gossip.gossip] handleMessage -> DEBU 2ca8 Exiting" -"2019-07-20 02:40:29.907 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2ca9 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:29.907 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2caa Got block validation policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cad == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:40:29.907 UTC [cauthdsl] func1 -> DEBU 2cae 0xc002a0e280 gate 1563590429907908700 evaluation starts" -"2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2caf 0xc002a0e280 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2cb0 0xc002a0e280 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2cb1 0xc002a0e280 principal matched by identity 0" -"2019-07-20 02:40:29.908 UTC [msp.identity] Verify -> DEBU 2cb2 Verify: digest = 00000000 66 5c 55 fa 92 62 2b cc 22 38 bc 5a ab e1 99 8b |f\U..b+."8.Z....| -00000010 a3 7e ed 8d 7b d3 7a 83 e9 52 e5 4a 62 c6 47 33 |.~..{.z..R.Jb.G3|" -"2019-07-20 02:40:29.908 UTC [msp.identity] Verify -> DEBU 2cb3 Verify: sig = 00000000 30 44 02 20 01 7e e9 fb f8 ac ac 13 48 6c 04 13 |0D. .~......Hl..| -00000010 74 73 0e 9a ff 6d 09 40 fc 70 78 8b 24 00 cf 5b |ts...m.@.px.$..[| -00000020 e4 01 16 96 02 20 12 c1 64 09 0f 0d 76 d3 a3 a3 |..... ..d...v...| -00000030 43 0b 17 03 66 2e f7 a8 fa 41 d8 8d 8d 6f 8a 41 |C...f....A...o.A| -00000040 f7 d3 15 33 5c e9 |...3\.|" -"2019-07-20 02:40:29.909 UTC [cauthdsl] func2 -> DEBU 2cb4 0xc002a0e280 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:29.909 UTC [cauthdsl] func1 -> DEBU 2cb5 0xc002a0e280 gate 1563590429907908700 evaluation succeeds" -"2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb8 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:29.910 UTC [blocksProvider] DeliverBlocks -> DEBU 2cba [businesschannel] Adding payload to local buffer, blockNum = [5]" -"2019-07-20 02:40:29.910 UTC [gossip.state] addPayload -> DEBU 2cbb [businesschannel] Adding payload to local buffer, blockNum = [5]" -"2019-07-20 02:40:29.910 UTC [gossip.state] addPayload -> DEBU 2cbc Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-07-20 02:40:29.911 UTC [blocksProvider] DeliverBlocks -> DEBU 2cbd [businesschannel] Gossiping block [5], peers number [3]" -"2019-07-20 02:40:29.911 UTC [gossip.channel] AddToMsgStore -> DEBU 2cbe Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes to the block puller" -"2019-07-20 02:40:29.911 UTC [gossip.pull] Add -> DEBU 2cbf Added 5, total items: 5" -"2019-07-20 02:40:29.911 UTC [gossip.state] deliverPayloads -> DEBU 2cc0 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" -"2019-07-20 02:40:29.911 UTC [gossip.state] deliverPayloads -> DEBU 2cc1 [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" -"2019-07-20 02:40:29.911 UTC [gossip.privdata] StoreBlock -> INFO 2cc2 [businesschannel] Received block [5] from buffer" -"2019-07-20 02:40:29.911 UTC [gossip.privdata] StoreBlock -> DEBU 2cc3 [businesschannel] Validating block [5]" -"2019-07-20 02:40:29.911 UTC [committer.txvalidator] Validate -> DEBU 2cc4 [businesschannel] START Block Validation for block [5]" -"2019-07-20 02:40:29.911 UTC [committer.txvalidator] Validate -> DEBU 2cc5 expecting 1 block validation responses" -"2019-07-20 02:40:29.911 UTC [committer.txvalidator] validateTx -> DEBU 2cc6 [businesschannel] validateTx starts for block 0xc003329000 env 0xc003de9680 txn 0" -"2019-07-20 02:40:29.912 UTC [protoutils] ValidateTransaction -> DEBU 2cc7 ValidateTransactionEnvelope starts for envelope 0xc003de9680" -"2019-07-20 02:40:29.912 UTC [protoutils] ValidateTransaction -> DEBU 2cc8 Header is channel_header:"\010\003\032\014\010\233\376\311\351\005\020\220\347\200\220\003\"\017businesschannel*@cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030T\242E]U\237\367\261\027o\270\362U\3555\232A\214\205`\377\361\333\315" " -"2019-07-20 02:40:29.912 UTC [protoutils] validateChannelHeader -> DEBU 2cc9 validateChannelHeader info: header type 3" -"2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2cca begin" -"2019-07-20 02:40:29.912 UTC [msp] GetManagerForChain -> DEBU 2ccb Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ccc creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" -"2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ccd creator is valid" -"2019-07-20 02:40:29.912 UTC [msp.identity] Verify -> DEBU 2cce Verify: digest = 00000000 fd 67 c4 b0 85 cb 38 56 50 7e bc 5b 91 c9 58 f5 |.g....8VP~.[..X.| -00000010 d8 6f d5 69 72 ea 09 87 2f 36 f6 5d 04 12 22 2b |.o.ir.../6.].."+|" -"2019-07-20 02:40:29.912 UTC [msp.identity] Verify -> DEBU 2ccf Verify: sig = 00000000 30 44 02 20 6c 40 9e 5f c4 72 dd 46 9b 91 56 5c |0D. l@._.r.F..V\| -00000010 4c 18 86 1b c3 d0 4f 1a 42 2d 3b 24 98 d0 7e 33 |L.....O.B-;$..~3| -00000020 8b c1 0d 20 02 20 05 cc d8 dd a6 4e e6 f7 e2 5e |... . .....N...^| -00000030 96 b7 47 f1 4b d9 8a f6 0a 37 5b 58 02 60 01 93 |..G.K....7[X.`..| -00000040 f3 e2 8c ca 4c 85 |....L.|" -"2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2cd0 exits successfully" -"2019-07-20 02:40:29.912 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd1 validateEndorserTransaction starts for data 0xc003d9d000, header channel_header:"\010\003\032\014\010\233\376\311\351\005\020\220\347\200\220\003\"\017businesschannel*@cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030T\242E]U\237\367\261\027o\270\362U\3555\232A\214\205`\377\361\333\315" " -"2019-07-20 02:40:29.913 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd2 validateEndorserTransaction info: there are 1 actions" -"2019-07-20 02:40:29.913 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd3 validateEndorserTransaction info: signature header is valid" -"2019-07-20 02:40:29.913 UTC [protoutils] ValidateTransaction -> DEBU 2cd4 ValidateTransactionEnvelope returns err %!s()" -"2019-07-20 02:40:29.913 UTC [committer.txvalidator] validateTx -> DEBU 2cd5 Transaction is for channel businesschannel" -"2019-07-20 02:40:29.913 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2cd6 retrieveTransactionByID() - txId = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" -"2019-07-20 02:40:29.913 UTC [committer.txvalidator] validateTx -> DEBU 2cd7 Validating transaction vscc tx validate" -"2019-07-20 02:40:29.913 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2cd8 [businesschannel] VSCCValidateTx starts for bytes 0xc002a09000" -"2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cd9 constructing new query executor txid = [365099c3-1ff9-40c5-8e22-ed3d0d6ee917]" -"2019-07-20 02:40:29.913 UTC [stateleveldb] GetState -> DEBU 2cda GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] Done -> DEBU 2cdb Done with transaction simulation / query execution [365099c3-1ff9-40c5-8e22-ed3d0d6ee917]" -"2019-07-20 02:40:29.913 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2cdc Validating Tx cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" -"2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cdd constructing new query executor txid = [2cf0f7a6-6bdd-4975-9d35-90dac5c02c2d]" -"2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] Done -> DEBU 2cde Done with transaction simulation / query execution [2cf0f7a6-6bdd-4975-9d35-90dac5c02c2d]" -"2019-07-20 02:40:29.914 UTC [cauthdsl] func1 -> DEBU 2cdf 0xc00354b270 gate 1563590429913996900 evaluation starts" -"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce0 0xc00354b270 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce1 0xc00354b270 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce2 0xc00354b270 principal matched by identity 0" -"2019-07-20 02:40:29.914 UTC [msp.identity] Verify -> DEBU 2ce3 Verify: digest = 00000000 c6 e1 11 a0 17 7e 2c 9b 0b 87 80 2f b0 af 0b 6b |.....~,..../...k| -00000010 41 9e 7e c6 c5 cf fd af ec 9a 92 18 ac 29 ed 00 |A.~..........)..|" -"2019-07-20 02:40:29.914 UTC [msp.identity] Verify -> DEBU 2ce4 Verify: sig = 00000000 30 44 02 20 0c fc 56 28 ee eb 1a f1 d8 0f 5b 52 |0D. ..V(......[R| -00000010 91 0d 11 5c ab d0 c8 22 b9 b6 e5 18 a2 a5 e5 03 |...\..."........| -00000020 e3 e5 89 8a 02 20 61 9b 09 2a c0 01 99 74 e1 30 |..... a..*...t.0| -00000030 6e 6a 3e cb e8 8b b1 71 d4 cd 93 8b 96 db ba 79 |nj>....q.......y| -00000040 83 ae 49 e9 5e 8d |..I.^.|" -"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce5 0xc00354b270 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce6 0xc00354b270 signed by 1 principal evaluation starts (used [true])" -"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce7 0xc00354b270 skipping identity 0 because it has already been used" -"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce8 0xc00354b270 principal evaluation fails" -"2019-07-20 02:40:29.914 UTC [cauthdsl] func1 -> DEBU 2ce9 0xc00354b270 gate 1563590429913996900 evaluation succeeds" -"2019-07-20 02:40:29.914 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cea constructing new query executor txid = [03a5760c-b4b0-4828-893f-cb7c8d6c1a4f]" -"2019-07-20 02:40:29.914 UTC [lockbasedtxmgr] Done -> DEBU 2ceb Done with transaction simulation / query execution [03a5760c-b4b0-4828-893f-cb7c8d6c1a4f]" -"2019-07-20 02:40:29.914 UTC [vscc] Validate -> DEBU 2cec block 5, namespace: exp02, tx 0 validation results is: " -"2019-07-20 02:40:29.914 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2ced Transaction cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 appears to be valid" -"2019-07-20 02:40:29.914 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2cee [businesschannel] VSCCValidateTx completes env bytes 0xc002a09000" -"2019-07-20 02:40:29.914 UTC [committer.txvalidator] validateTx -> DEBU 2cef [businesschannel] validateTx completes for block 0xc003329000 env 0xc003de9680 txn 0" -"2019-07-20 02:40:29.914 UTC [committer.txvalidator] Validate -> DEBU 2cf0 got result for idx 0, code 0" -"2019-07-20 02:40:29.914 UTC [committer.txvalidator] Validate -> INFO 2cf1 [businesschannel] Validated block [5] in 2ms" -"2019-07-20 02:40:29.914 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2cf2 Retrieving private write sets for 0 transactions from transient store" -"2019-07-20 02:40:29.914 UTC [gossip.privdata] StoreBlock -> DEBU 2cf3 [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-07-20 02:40:29.916 UTC [kvledger] CommitWithPvtData -> DEBU 2cf4 [businesschannel] Validating state for block [5]" -"2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf6 lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf7 Validating new block with num trans = [1]" -"2019-07-20 02:40:29.916 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2cf8 ValidateAndPrepareBatch() for block number = [5]" -"2019-07-20 02:40:29.916 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2cf9 preprocessing ProtoBlock..." -"2019-07-20 02:40:29.917 UTC [valimpl] preprocessProtoBlock -> DEBU 2cfa txType=ENDORSER_TRANSACTION" -"2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cfb GetState(). ns=exp02, key=a" -"2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2cfc Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" -"2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cfd GetState(). ns=exp02, key=b" -"2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2cfe Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" -"2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cff GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2d00 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" -"2019-07-20 02:40:29.917 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2d01 Block [5] Transaction index [0] TxId [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] marked as valid by state validator" -"2019-07-20 02:40:29.917 UTC [valinternal] ApplyWriteSet -> DEBU 2d02 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0034a4240), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0034a4280)}" -"2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d03 validating rwset..." -"2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d04 postprocessing ProtoBlock..." -"2019-07-20 02:40:29.918 UTC [msp] DeserializeIdentity -> DEBU 2d05 Obtaining identity" -"2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d06 ValidateAndPrepareBatch() complete" -"2019-07-20 02:40:29.918 UTC [msp] DeserializeIdentity -> DEBU 2d07 Obtaining identity" -"2019-07-20 02:40:29.918 UTC [kvledger] CommitWithPvtData -> DEBU 2d08 [businesschannel] Adding CommitHash to the block [5]" -"2019-07-20 02:40:29.919 UTC [kvledger] CommitWithPvtData -> DEBU 2d09 [businesschannel] Committing block [5] to storage" -"2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0a Obtaining identity" -"2019-07-20 02:40:29.919 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2d0b Writing block [5] to pvt block store" -"2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0c Obtaining identity" -"2019-07-20 02:40:29.919 UTC [gossip.comm] Send -> DEBU 2d0d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0e Obtaining identity" -"2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0f Obtaining identity" -"2019-07-20 02:40:29.919 UTC [gossip.comm] sendToEndpoint -> DEBU 2d10 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes" -"2019-07-20 02:40:29.919 UTC [gossip.comm] sendToEndpoint -> DEBU 2d11 Exiting" -"2019-07-20 02:40:29.920 UTC [pvtdatastorage] Prepare -> DEBU 2d12 Saved 0 private data write sets for block [5]" -"2019-07-20 02:40:29.924 UTC [fsblkstorage] indexBlock -> DEBU 2d13 Indexing block [blockNum=5, blockHash=[]byte{0x91, 0x57, 0x90, 0x2d, 0xf6, 0xfd, 0xb5, 0x4d, 0x5e, 0x9f, 0x17, 0xe5, 0xf6, 0x19, 0x33, 0xf, 0xd2, 0x27, 0x45, 0x3, 0x6c, 0x2, 0x3e, 0x8d, 0x6d, 0x3b, 0xa6, 0x3e, 0x8b, 0x83, 0x1b, 0x53} txOffsets= -txId=cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 locPointer=offset=70, bytesLength=2984 -]" -"2019-07-20 02:40:29.924 UTC [fsblkstorage] indexBlock -> DEBU 2d14 Adding txLoc [fileSuffixNum=0, offset=80123, bytesLength=2984] for tx ID: [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] to txid-index" -"2019-07-20 02:40:29.925 UTC [fsblkstorage] indexBlock -> DEBU 2d15 Adding txLoc [fileSuffixNum=0, offset=80123, bytesLength=2984] for tx number:[0] ID: [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] to blockNumTranNum index" -"2019-07-20 02:40:29.935 UTC [fsblkstorage] updateCheckpoint -> DEBU 2d16 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84079], isChainEmpty=[false], lastBlockNumber=[5]" -"2019-07-20 02:40:29.935 UTC [pvtdatastorage] Commit -> DEBU 2d17 Committing private data for block [5]" -"2019-07-20 02:40:29.939 UTC [pvtdatastorage] Commit -> DEBU 2d18 Committed private data for block [5]" -"2019-07-20 02:40:29.940 UTC [kvledger] CommitWithPvtData -> DEBU 2d19 [businesschannel] Committing block [5] transactions to state database" -"2019-07-20 02:40:29.940 UTC [lockbasedtxmgr] Commit -> DEBU 2d1a lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-07-20 02:40:29.940 UTC [lockbasedtxmgr] Commit -> DEBU 2d1b Committing updates to state database" -"2019-07-20 02:40:29.941 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2d1c Building the expiry schedules based on the update batch" -"2019-07-20 02:40:29.941 UTC [lockbasedtxmgr] Commit -> DEBU 2d1d Write lock acquired for committing updates to state database" -"2019-07-20 02:40:29.941 UTC [stateleveldb] ApplyUpdates -> DEBU 2d1e Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" -"2019-07-20 02:40:29.941 UTC [stateleveldb] ApplyUpdates -> DEBU 2d1f Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" -"2019-07-20 02:40:29.943 UTC [lockbasedtxmgr] Commit -> DEBU 2d20 Updates committed to state database and the write lock is released" -"2019-07-20 02:40:29.943 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2d21 Preparing potential purge list working-set for expiringAtBlk [6]" -"2019-07-20 02:40:29.943 UTC [leveldbhelper] GetIterator -> DEBU 2d22 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" -"2019-07-20 02:40:29.943 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2d23 No expiry entry found for expiringAtBlk [6]" -"2019-07-20 02:40:29.943 UTC [lockbasedtxmgr] func1 -> DEBU 2d24 launched the background routine for preparing keys to purge with the next block" -"2019-07-20 02:40:29.943 UTC [kvledger] CommitWithPvtData -> DEBU 2d25 [businesschannel] Committing block [5] transactions to history database" -"2019-07-20 02:40:29.943 UTC [historyleveldb] Commit -> DEBU 2d26 Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" -"2019-07-20 02:40:29.945 UTC [historyleveldb] Commit -> DEBU 2d27 Channel [businesschannel]: Updates committed to history database for blockNo [5]" -"2019-07-20 02:40:29.945 UTC [kvledger] CommitWithPvtData -> INFO 2d28 [businesschannel] Committed block [5] with 1 transaction(s) in 28ms (state_validation=2ms block_and_pvtdata_commit=21ms state_commit=3ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" -"2019-07-20 02:40:29.945 UTC [msp] GetDefaultSigningIdentity -> DEBU 2d29 Obtaining default signing identity" -"2019-07-20 02:40:29.945 UTC [msp.identity] Sign -> DEBU 2d2a Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08061A0C0A0565787030321203312E30 " -"2019-07-20 02:40:29.945 UTC [msp.identity] Sign -> DEBU 2d2b Sign: digest: 16B6E3422440EF1113CC2D5AD11B5698025C5C42F9054C40FB3B8C581A28CBBD " -"2019-07-20 02:40:29.945 UTC [gossip.state] commitBlock -> DEBU 2d2c [businesschannel] Committed block [5] with 1 transaction(s)" -"2019-07-20 02:40:30.280 UTC [endorser] ProcessProposal -> DEBU 2d2d Entering: request from 172.18.0.9:58384" -"2019-07-20 02:40:30.280 UTC [protoutils] ValidateProposalMessage -> DEBU 2d2e ValidateProposalMessage starts for signed proposal 0xc003e3fd10" -"2019-07-20 02:40:30.280 UTC [protoutils] validateChannelHeader -> DEBU 2d2f validateChannelHeader info: header type 3" -"2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d30 begin" -"2019-07-20 02:40:30.280 UTC [msp] GetManagerForChain -> DEBU 2d31 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d32 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d33 creator is valid" -"2019-07-20 02:40:30.281 UTC [msp.identity] Verify -> DEBU 2d34 Verify: digest = 00000000 5e d6 18 3c 0a 79 f0 77 2c 02 9c da da 10 31 d1 |^..<.y.w,.....1.| -00000010 ae fc 2f 5c 1f d7 4a 3c 1f 83 6a e3 49 aa 67 b4 |../\..J<..j.I.g.|" -"2019-07-20 02:40:30.281 UTC [msp.identity] Verify -> DEBU 2d35 Verify: sig = 00000000 30 44 02 20 5e 94 09 02 ac 34 fe f7 23 67 4b 2f |0D. ^....4..#gK/| -00000010 17 03 0d 5b ea 9d 8f 0f 1c 53 eb 47 91 94 72 1c |...[.....S.G..r.| -00000020 72 f4 06 67 02 20 05 74 bf 98 60 85 b6 95 4a 32 |r..g. .t..`...J2| -00000030 41 5a d3 a2 b9 c9 ed 4f 05 56 74 d1 2e fc c6 42 |AZ.....O.Vt....B| -00000040 3d a5 8c db 81 e3 |=.....|" -"2019-07-20 02:40:30.281 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d36 exits successfully" -"2019-07-20 02:40:30.281 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d37 validateChaincodeProposalMessage starts for proposal 0xc0029acd90, header 0xc003fb8190" -"2019-07-20 02:40:30.281 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d38 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " -"2019-07-20 02:40:30.281 UTC [endorser] preProcess -> DEBU 2d39 [businesschannel][2fec28c6] processing txid: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933" -"2019-07-20 02:40:30.282 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2d3a retrieveTransactionByID() - txId = [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" -"2019-07-20 02:40:30.282 UTC [aclmgmt] CheckACL -> DEBU 2d3b acl policy /Channel/Application/Writers found in config for resource peer/Propose" -"2019-07-20 02:40:30.282 UTC [aclmgmt] CheckACL -> DEBU 2d3c acl check(/Channel/Application/Writers)" -"2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" -"2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" -"2019-07-20 02:40:30.283 UTC [cauthdsl] func1 -> DEBU 2d40 0xc00376f160 gate 1563590430283118800 evaluation starts" -"2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d41 0xc00376f160 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d42 0xc00376f160 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d43 0xc00376f160 principal matched by identity 0" -"2019-07-20 02:40:30.283 UTC [msp.identity] Verify -> DEBU 2d44 Verify: digest = 00000000 5e d6 18 3c 0a 79 f0 77 2c 02 9c da da 10 31 d1 |^..<.y.w,.....1.| -00000010 ae fc 2f 5c 1f d7 4a 3c 1f 83 6a e3 49 aa 67 b4 |../\..J<..j.I.g.|" -"2019-07-20 02:40:30.283 UTC [msp.identity] Verify -> DEBU 2d45 Verify: sig = 00000000 30 44 02 20 5e 94 09 02 ac 34 fe f7 23 67 4b 2f |0D. ^....4..#gK/| -00000010 17 03 0d 5b ea 9d 8f 0f 1c 53 eb 47 91 94 72 1c |...[.....S.G..r.| -00000020 72 f4 06 67 02 20 05 74 bf 98 60 85 b6 95 4a 32 |r..g. .t..`...J2| -00000030 41 5a d3 a2 b9 c9 ed 4f 05 56 74 d1 2e fc c6 42 |AZ.....O.Vt....B| -00000040 3d a5 8c db 81 e3 |=.....|" -"2019-07-20 02:40:30.284 UTC [cauthdsl] func2 -> DEBU 2d46 0xc00376f160 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:30.284 UTC [cauthdsl] func1 -> DEBU 2d47 0xc00376f160 gate 1563590430283118800 evaluation succeeds" -"2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d48 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d4a Signature set satisfies policy /Channel/Application/Writers" -"2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" -"2019-07-20 02:40:30.284 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2d4c constructing new tx simulator" -"2019-07-20 02:40:30.284 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2d4d constructing new tx simulator txid = [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" -"2019-07-20 02:40:30.285 UTC [endorser] SimulateProposal -> DEBU 2d4e [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:30.285 UTC [stateleveldb] GetState -> DEBU 2d4f GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:30.285 UTC [ccprovider] GetChaincodeData -> DEBU 2d50 Getting chaincode data for from cache" -"2019-07-20 02:40:30.285 UTC [endorser] callChaincode -> INFO 2d51 [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:30.285 UTC [chaincode] Execute -> DEBU 2d52 Entry" -"2019-07-20 02:40:30.287 UTC [chaincode] handleMessage -> DEBU 2d53 [2fec28c6] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:30.287 UTC [chaincode] HandleTransaction -> DEBU 2d54 [2fec28c6] handling GET_STATE from chaincode" -"2019-07-20 02:40:30.287 UTC [chaincode] HandleGetState -> DEBU 2d55 [2fec28c6] getting state for chaincode exp02, key a, channel businesschannel" -"2019-07-20 02:40:30.287 UTC [stateleveldb] GetState -> DEBU 2d56 GetState(). ns=exp02, key=a" -"2019-07-20 02:40:30.287 UTC [chaincode] HandleTransaction -> DEBU 2d57 [2fec28c6] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:30.288 UTC [chaincode] handleMessage -> DEBU 2d58 [2fec28c6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:30.289 UTC [chaincode] Notify -> DEBU 2d59 [2fec28c6] notifying Txid:2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, channelID:businesschannel" -"2019-07-20 02:40:30.289 UTC [chaincode] Execute -> DEBU 2d5a Exit" -"2019-07-20 02:40:30.289 UTC [endorser] callChaincode -> INFO 2d5b [businesschannel][2fec28c6] Exit chaincode: name:"exp02" (4ms)" -"2019-07-20 02:40:30.289 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2d5c Simulation completed, getting simulation results" -"2019-07-20 02:40:30.289 UTC [lockbasedtxmgr] Done -> DEBU 2d5d Done with transaction simulation / query execution [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" -"2019-07-20 02:40:30.289 UTC [endorser] SimulateProposal -> DEBU 2d5e [businesschannel][2fec28c6] Exit" -"2019-07-20 02:40:30.289 UTC [endorser] endorseProposal -> DEBU 2d5f [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " -"2019-07-20 02:40:30.290 UTC [endorser] endorseProposal -> DEBU 2d60 [businesschannel][2fec28c6] escc for chaincode name:"exp02" is escc" -"2019-07-20 02:40:30.290 UTC [endorser] EndorseWithPlugin -> DEBU 2d61 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, chaincode: exp02}" -"2019-07-20 02:40:30.290 UTC [msp.identity] Sign -> DEBU 2d62 Sign: plaintext: 0A2074EF80C23BC6C4E8567CCE74AA7C...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:30.290 UTC [msp.identity] Sign -> DEBU 2d63 Sign: digest: E1CA0B783FA631FD149AA90726F9DC6674E11EE6CAB366B0DAF3B9701126138F " -"2019-07-20 02:40:30.290 UTC [endorser] EndorseWithPlugin -> DEBU 2d64 Exiting {plugin: escc, channel: businesschannel, tx: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, chaincode: exp02}" -"2019-07-20 02:40:30.290 UTC [endorser] endorseProposal -> DEBU 2d65 [businesschannel][2fec28c6] Exit" -"2019-07-20 02:40:30.290 UTC [lockbasedtxmgr] Done -> DEBU 2d66 Done with transaction simulation / query execution [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" -"2019-07-20 02:40:30.291 UTC [endorser] func1 -> DEBU 2d67 Exit: request from 172.18.0.9:58384" -"2019-07-20 02:40:30.291 UTC [comm.grpc.server] 1 -> INFO 2d68 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58384 grpc.code=OK grpc.call_duration=11.2701ms -"2019-07-20 02:40:30.296 UTC [grpc] infof -> DEBU 2d69 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:30.296 UTC [grpc] infof -> DEBU 2d6a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:30.661 UTC [endorser] ProcessProposal -> DEBU 2d6b Entering: request from 172.18.0.9:58388" -"2019-07-20 02:40:30.661 UTC [protoutils] ValidateProposalMessage -> DEBU 2d6c ValidateProposalMessage starts for signed proposal 0xc003fb92c0" -"2019-07-20 02:40:30.661 UTC [protoutils] validateChannelHeader -> DEBU 2d6d validateChannelHeader info: header type 3" -"2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d6e begin" -"2019-07-20 02:40:30.662 UTC [msp] GetManagerForChain -> DEBU 2d6f Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d70 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d71 creator is valid" -"2019-07-20 02:40:30.662 UTC [msp.identity] Verify -> DEBU 2d72 Verify: digest = 00000000 97 7d 67 d5 9d eb 92 a2 0f 91 da 67 a9 90 f4 5d |.}g........g...]| -00000010 d3 1e 49 9f 76 9b 9f d4 26 a2 00 b8 95 53 56 b0 |..I.v...&....SV.|" -"2019-07-20 02:40:30.662 UTC [msp.identity] Verify -> DEBU 2d73 Verify: sig = 00000000 30 44 02 20 48 1e 42 5b da 30 13 bb e6 06 f3 43 |0D. H.B[.0.....C| -00000010 4e 6f b4 35 bf 1d 2a b7 57 79 12 a5 02 fd 6a 3c |No.5..*.Wy....j<| -00000020 5f 64 00 aa 02 20 57 ce 70 9a 14 76 2a 5f e6 a5 |_d... W.p..v*_..| -00000030 8e 13 a4 7f 93 00 62 dc b4 11 9c 96 d7 3f 00 f7 |......b......?..| -00000040 09 34 4d cd e2 e3 |.4M...|" -"2019-07-20 02:40:30.663 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d74 exits successfully" -"2019-07-20 02:40:30.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d75 validateChaincodeProposalMessage starts for proposal 0xc0029ad2d0, header 0xc003fb96d0" -"2019-07-20 02:40:30.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d76 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -"2019-07-20 02:40:30.663 UTC [endorser] preProcess -> DEBU 2d77 [businesschannel][3bd567df] processing txid: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649" -"2019-07-20 02:40:30.663 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2d78 retrieveTransactionByID() - txId = [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" -"2019-07-20 02:40:30.663 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2d79 constructing new tx simulator" -"2019-07-20 02:40:30.663 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2d7a constructing new tx simulator txid = [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" -"2019-07-20 02:40:30.663 UTC [endorser] SimulateProposal -> DEBU 2d7b [businesschannel][3bd567df] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:30.664 UTC [endorser] callChaincode -> INFO 2d7c [businesschannel][3bd567df] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:30.664 UTC [chaincode] Execute -> DEBU 2d7d Entry" -"2019-07-20 02:40:30.664 UTC [aclmgmt] CheckACL -> DEBU 2d7e acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists" -"2019-07-20 02:40:30.664 UTC [aclmgmt] CheckACL -> DEBU 2d7f acl check(/Channel/Application/Readers)" -"2019-07-20 02:40:30.664 UTC [policies] Evaluate -> DEBU 2d80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:30.664 UTC [policies] Evaluate -> DEBU 2d81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:30.665 UTC [policies] Evaluate -> DEBU 2d82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:30.665 UTC [cauthdsl] func1 -> DEBU 2d83 0xc003209920 gate 1563590430665096900 evaluation starts" -"2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d84 0xc003209920 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d85 0xc003209920 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d86 0xc003209920 principal matched by identity 0" -"2019-07-20 02:40:30.665 UTC [msp.identity] Verify -> DEBU 2d87 Verify: digest = 00000000 97 7d 67 d5 9d eb 92 a2 0f 91 da 67 a9 90 f4 5d |.}g........g...]| -00000010 d3 1e 49 9f 76 9b 9f d4 26 a2 00 b8 95 53 56 b0 |..I.v...&....SV.|" -"2019-07-20 02:40:30.665 UTC [msp.identity] Verify -> DEBU 2d88 Verify: sig = 00000000 30 44 02 20 48 1e 42 5b da 30 13 bb e6 06 f3 43 |0D. H.B[.0.....C| -00000010 4e 6f b4 35 bf 1d 2a b7 57 79 12 a5 02 fd 6a 3c |No.5..*.Wy....j<| -00000020 5f 64 00 aa 02 20 57 ce 70 9a 14 76 2a 5f e6 a5 |_d... W.p..v*_..| -00000030 8e 13 a4 7f 93 00 62 dc b4 11 9c 96 d7 3f 00 f7 |......b......?..| -00000040 09 34 4d cd e2 e3 |.4M...|" -"2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d89 0xc003209920 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:30.665 UTC [cauthdsl] func1 -> DEBU 2d8a 0xc003209920 gate 1563590430665096900 evaluation succeeds" -"2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8b Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:30.666 UTC [chaincode] handleMessage -> DEBU 2d8f [3bd567df] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:30.666 UTC [chaincode] HandleTransaction -> DEBU 2d90 [3bd567df] handling GET_STATE from chaincode" -"2019-07-20 02:40:30.666 UTC [chaincode] HandleGetState -> DEBU 2d91 [3bd567df] getting state for chaincode lscc, key exp02, channel businesschannel" -"2019-07-20 02:40:30.666 UTC [stateleveldb] GetState -> DEBU 2d92 GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:30.667 UTC [chaincode] HandleTransaction -> DEBU 2d93 [3bd567df] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:30.667 UTC [chaincode] handleMessage -> DEBU 2d94 [3bd567df] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:30.667 UTC [chaincode] Notify -> DEBU 2d95 [3bd567df] notifying Txid:3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, channelID:businesschannel" -"2019-07-20 02:40:30.667 UTC [chaincode] Execute -> DEBU 2d96 Exit" -"2019-07-20 02:40:30.667 UTC [endorser] callChaincode -> INFO 2d97 [businesschannel][3bd567df] Exit chaincode: name:"lscc" (3ms)" -"2019-07-20 02:40:30.667 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2d98 Simulation completed, getting simulation results" -"2019-07-20 02:40:30.667 UTC [lockbasedtxmgr] Done -> DEBU 2d99 Done with transaction simulation / query execution [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" -"2019-07-20 02:40:30.667 UTC [endorser] SimulateProposal -> DEBU 2d9a [businesschannel][3bd567df] Exit" -"2019-07-20 02:40:30.667 UTC [endorser] endorseProposal -> DEBU 2d9b [businesschannel][3bd567df] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:30.667 UTC [endorser] endorseProposal -> DEBU 2d9c [businesschannel][3bd567df] escc for chaincode name:"lscc" is escc" -"2019-07-20 02:40:30.667 UTC [endorser] EndorseWithPlugin -> DEBU 2d9d Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, chaincode: lscc}" -"2019-07-20 02:40:30.668 UTC [msp.identity] Sign -> DEBU 2d9e Sign: plaintext: 0A20DC3953394B8B040B6D3F4AA63DE2...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:30.668 UTC [msp.identity] Sign -> DEBU 2d9f Sign: digest: 003A94C9AA19F2A7BD2F4D207C25170F8B0627B182D7989A95B23B911588F6EA " -"2019-07-20 02:40:30.668 UTC [endorser] EndorseWithPlugin -> DEBU 2da0 Exiting {plugin: escc, channel: businesschannel, tx: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, chaincode: lscc}" -"2019-07-20 02:40:30.668 UTC [endorser] endorseProposal -> DEBU 2da1 [businesschannel][3bd567df] Exit" -"2019-07-20 02:40:30.668 UTC [lockbasedtxmgr] Done -> DEBU 2da2 Done with transaction simulation / query execution [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" -"2019-07-20 02:40:30.668 UTC [endorser] func1 -> DEBU 2da3 Exit: request from 172.18.0.9:58388" -"2019-07-20 02:40:30.668 UTC [comm.grpc.server] 1 -> INFO 2da4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58388 grpc.code=OK grpc.call_duration=8.5178ms -"2019-07-20 02:40:30.671 UTC [grpc] infof -> DEBU 2da5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:30.672 UTC [grpc] warningf -> DEBU 2da6 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58388: read: connection reset by peer" -"2019-07-20 02:40:30.672 UTC [grpc] infof -> DEBU 2da7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:30.847 UTC [endorser] ProcessProposal -> DEBU 2da8 Entering: request from 172.18.0.9:58392" -"2019-07-20 02:40:30.848 UTC [protoutils] ValidateProposalMessage -> DEBU 2da9 ValidateProposalMessage starts for signed proposal 0xc003ec28c0" -"2019-07-20 02:40:30.848 UTC [protoutils] validateChannelHeader -> DEBU 2daa validateChannelHeader info: header type 3" -"2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dab begin" -"2019-07-20 02:40:30.848 UTC [msp] GetManagerForChain -> DEBU 2dac Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dad creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dae creator is valid" -"2019-07-20 02:40:30.848 UTC [msp.identity] Verify -> DEBU 2daf Verify: digest = 00000000 c1 2e ff b8 10 8a 13 7a d9 e6 50 70 a7 5b 51 82 |.......z..Pp.[Q.| -00000010 88 35 73 4f 94 cb ce df b8 27 1d 78 b9 ba 5e 3f |.5sO.....'.x..^?|" -"2019-07-20 02:40:30.848 UTC [msp.identity] Verify -> DEBU 2db0 Verify: sig = 00000000 30 44 02 20 3b 72 87 22 7d 62 f5 d7 dc e8 8f 92 |0D. ;r."}b......| -00000010 18 04 94 11 e4 b5 d9 1f 12 d5 d2 b1 96 c6 64 e9 |..............d.| -00000020 b6 ea 84 08 02 20 37 5b 3e b6 14 4f 47 3b 4e 40 |..... 7[>..OG;N@| -00000030 a3 9a ef a3 39 a0 1c 39 9c 9a 62 56 b4 9a 94 03 |....9..9..bV....| -00000040 54 bb 5c 3a bc ba |T.\:..|" -"2019-07-20 02:40:30.849 UTC [protoutils] checkSignatureFromCreator -> DEBU 2db1 exits successfully" -"2019-07-20 02:40:30.849 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2db2 validateChaincodeProposalMessage starts for proposal 0xc0029ad730, header 0xc003ec2cd0" -"2019-07-20 02:40:30.849 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2db3 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -"2019-07-20 02:40:30.849 UTC [endorser] preProcess -> DEBU 2db4 [businesschannel][398ba62b] processing txid: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c" -"2019-07-20 02:40:30.849 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2db5 retrieveTransactionByID() - txId = [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" -"2019-07-20 02:40:30.849 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2db6 constructing new tx simulator" -"2019-07-20 02:40:30.849 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2db7 constructing new tx simulator txid = [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" -"2019-07-20 02:40:30.849 UTC [endorser] SimulateProposal -> DEBU 2db8 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:30.849 UTC [endorser] callChaincode -> INFO 2db9 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:30.850 UTC [chaincode] Execute -> DEBU 2dba Entry" -"2019-07-20 02:40:30.850 UTC [aclmgmt] CheckACL -> DEBU 2dbb acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec" -"2019-07-20 02:40:30.850 UTC [aclmgmt] CheckACL -> DEBU 2dbc acl check(/Channel/Application/Readers)" -"2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:30.850 UTC [cauthdsl] func1 -> DEBU 2dc0 0xc003015bc0 gate 1563590430850677600 evaluation starts" -"2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc1 0xc003015bc0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc2 0xc003015bc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc3 0xc003015bc0 principal matched by identity 0" -"2019-07-20 02:40:30.851 UTC [msp.identity] Verify -> DEBU 2dc4 Verify: digest = 00000000 c1 2e ff b8 10 8a 13 7a d9 e6 50 70 a7 5b 51 82 |.......z..Pp.[Q.| -00000010 88 35 73 4f 94 cb ce df b8 27 1d 78 b9 ba 5e 3f |.5sO.....'.x..^?|" -"2019-07-20 02:40:30.851 UTC [msp.identity] Verify -> DEBU 2dc5 Verify: sig = 00000000 30 44 02 20 3b 72 87 22 7d 62 f5 d7 dc e8 8f 92 |0D. ;r."}b......| -00000010 18 04 94 11 e4 b5 d9 1f 12 d5 d2 b1 96 c6 64 e9 |..............d.| -00000020 b6 ea 84 08 02 20 37 5b 3e b6 14 4f 47 3b 4e 40 |..... 7[>..OG;N@| -00000030 a3 9a ef a3 39 a0 1c 39 9c 9a 62 56 b4 9a 94 03 |....9..9..bV....| -00000040 54 bb 5c 3a bc ba |T.\:..|" -"2019-07-20 02:40:30.851 UTC [cauthdsl] func2 -> DEBU 2dc6 0xc003015bc0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:30.851 UTC [cauthdsl] func1 -> DEBU 2dc7 0xc003015bc0 gate 1563590430850677600 evaluation succeeds" -"2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dc8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dca Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:30.852 UTC [policies] Evaluate -> DEBU 2dcb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:30.852 UTC [chaincode] handleMessage -> DEBU 2dcc [398ba62b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:30.852 UTC [chaincode] HandleTransaction -> DEBU 2dcd [398ba62b] handling GET_STATE from chaincode" -"2019-07-20 02:40:30.852 UTC [chaincode] HandleGetState -> DEBU 2dce [398ba62b] getting state for chaincode lscc, key exp02, channel businesschannel" -"2019-07-20 02:40:30.852 UTC [stateleveldb] GetState -> DEBU 2dcf GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:30.852 UTC [chaincode] HandleTransaction -> DEBU 2dd0 [398ba62b] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:30.853 UTC [chaincode] handleMessage -> DEBU 2dd1 [398ba62b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:30.853 UTC [chaincode] Notify -> DEBU 2dd2 [398ba62b] notifying Txid:398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, channelID:businesschannel" -"2019-07-20 02:40:30.853 UTC [chaincode] Execute -> DEBU 2dd3 Exit" -"2019-07-20 02:40:30.853 UTC [endorser] callChaincode -> INFO 2dd4 [businesschannel][398ba62b] Exit chaincode: name:"lscc" (4ms)" -"2019-07-20 02:40:30.854 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2dd5 Simulation completed, getting simulation results" -"2019-07-20 02:40:30.854 UTC [lockbasedtxmgr] Done -> DEBU 2dd6 Done with transaction simulation / query execution [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" -"2019-07-20 02:40:30.854 UTC [endorser] SimulateProposal -> DEBU 2dd7 [businesschannel][398ba62b] Exit" -"2019-07-20 02:40:30.854 UTC [endorser] endorseProposal -> DEBU 2dd8 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:30.854 UTC [endorser] endorseProposal -> DEBU 2dd9 [businesschannel][398ba62b] escc for chaincode name:"lscc" is escc" -"2019-07-20 02:40:30.854 UTC [endorser] EndorseWithPlugin -> DEBU 2dda Entering endorsement for {plugin: escc, channel: businesschannel, tx: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, chaincode: lscc}" -"2019-07-20 02:40:30.855 UTC [msp.identity] Sign -> DEBU 2ddb Sign: plaintext: 0A20676545DA82FF5CBA43B1C4F1D73C...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:30.855 UTC [msp.identity] Sign -> DEBU 2ddc Sign: digest: 73A9A672040DBAA62B4709F7BB22774A13A4BCAA9164D02857C67C58BBC2A3BB " -"2019-07-20 02:40:30.855 UTC [endorser] EndorseWithPlugin -> DEBU 2ddd Exiting {plugin: escc, channel: businesschannel, tx: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, chaincode: lscc}" -"2019-07-20 02:40:30.855 UTC [endorser] endorseProposal -> DEBU 2dde [businesschannel][398ba62b] Exit" -"2019-07-20 02:40:30.855 UTC [lockbasedtxmgr] Done -> DEBU 2ddf Done with transaction simulation / query execution [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" -"2019-07-20 02:40:30.855 UTC [endorser] func1 -> DEBU 2de0 Exit: request from 172.18.0.9:58392" -"2019-07-20 02:40:30.855 UTC [comm.grpc.server] 1 -> INFO 2de1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58392 grpc.code=OK grpc.call_duration=7.8945ms -"2019-07-20 02:40:30.859 UTC [grpc] infof -> DEBU 2de2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:30.860 UTC [grpc] infof -> DEBU 2de3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:31.049 UTC [endorser] ProcessProposal -> DEBU 2de4 Entering: request from 172.18.0.9:58396" -"2019-07-20 02:40:31.049 UTC [protoutils] ValidateProposalMessage -> DEBU 2de5 ValidateProposalMessage starts for signed proposal 0xc003ec3cc0" -"2019-07-20 02:40:31.049 UTC [protoutils] validateChannelHeader -> DEBU 2de6 validateChannelHeader info: header type 3" -"2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2de7 begin" -"2019-07-20 02:40:31.050 UTC [msp] GetManagerForChain -> DEBU 2de8 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2de9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dea creator is valid" -"2019-07-20 02:40:31.050 UTC [msp.identity] Verify -> DEBU 2deb Verify: digest = 00000000 1a 67 04 70 62 a6 98 97 4a 91 c1 8e dc b6 5a 9b |.g.pb...J.....Z.| -00000010 c8 0c 26 a7 35 b0 9e 74 ff 9f 62 a5 dc d9 47 21 |..&.5..t..b...G!|" -"2019-07-20 02:40:31.050 UTC [msp.identity] Verify -> DEBU 2dec Verify: sig = 00000000 30 45 02 21 00 fe 45 d5 50 3c ae 5f c2 c5 73 b0 |0E.!..E.P<._..s.| -00000010 76 19 31 56 27 69 c0 c3 df 7a ed 95 0e 37 fd 61 |v.1V'i...z...7.a| -00000020 87 3c 13 7e 70 02 20 07 a5 1c 63 f7 a7 2e bf d6 |.<.~p. ...c.....| -00000030 f0 2d d4 65 e8 be 5f 1d 07 95 29 43 9e 25 19 95 |.-.e.._...)C.%..| -00000040 10 aa 91 93 85 f8 de |.......|" -"2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ded exits successfully" -"2019-07-20 02:40:31.050 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2dee validateChaincodeProposalMessage starts for proposal 0xc0029adc00, header 0xc0029960f0" -"2019-07-20 02:40:31.051 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2def validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -"2019-07-20 02:40:31.051 UTC [endorser] preProcess -> DEBU 2df0 [businesschannel][f13255af] processing txid: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac" -"2019-07-20 02:40:31.051 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2df1 retrieveTransactionByID() - txId = [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" -"2019-07-20 02:40:31.051 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2df2 constructing new tx simulator" -"2019-07-20 02:40:31.051 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2df3 constructing new tx simulator txid = [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" -"2019-07-20 02:40:31.052 UTC [endorser] SimulateProposal -> DEBU 2df4 [businesschannel][f13255af] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:31.052 UTC [endorser] callChaincode -> INFO 2df5 [businesschannel][f13255af] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:31.052 UTC [chaincode] Execute -> DEBU 2df6 Entry" -"2019-07-20 02:40:31.052 UTC [aclmgmt] CheckACL -> DEBU 2df7 acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData" -"2019-07-20 02:40:31.052 UTC [aclmgmt] CheckACL -> DEBU 2df8 acl check(/Channel/Application/Readers)" -"2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2df9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2dfa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2dfb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:31.053 UTC [cauthdsl] func1 -> DEBU 2dfc 0xc002883cb0 gate 1563590431053104100 evaluation starts" -"2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dfd 0xc002883cb0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dfe 0xc002883cb0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dff 0xc002883cb0 principal matched by identity 0" -"2019-07-20 02:40:31.053 UTC [msp.identity] Verify -> DEBU 2e00 Verify: digest = 00000000 1a 67 04 70 62 a6 98 97 4a 91 c1 8e dc b6 5a 9b |.g.pb...J.....Z.| -00000010 c8 0c 26 a7 35 b0 9e 74 ff 9f 62 a5 dc d9 47 21 |..&.5..t..b...G!|" -"2019-07-20 02:40:31.053 UTC [msp.identity] Verify -> DEBU 2e01 Verify: sig = 00000000 30 45 02 21 00 fe 45 d5 50 3c ae 5f c2 c5 73 b0 |0E.!..E.P<._..s.| -00000010 76 19 31 56 27 69 c0 c3 df 7a ed 95 0e 37 fd 61 |v.1V'i...z...7.a| -00000020 87 3c 13 7e 70 02 20 07 a5 1c 63 f7 a7 2e bf d6 |.<.~p. ...c.....| -00000030 f0 2d d4 65 e8 be 5f 1d 07 95 29 43 9e 25 19 95 |.-.e.._...)C.%..| -00000040 10 aa 91 93 85 f8 de |.......|" -"2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2e02 0xc002883cb0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:31.053 UTC [cauthdsl] func1 -> DEBU 2e03 0xc002883cb0 gate 1563590431053104100 evaluation succeeds" -"2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e04 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e05 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e06 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e07 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:31.054 UTC [chaincode] handleMessage -> DEBU 2e08 [f13255af] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" -"2019-07-20 02:40:31.055 UTC [chaincode] HandleTransaction -> DEBU 2e09 [f13255af] handling GET_STATE from chaincode" -"2019-07-20 02:40:31.055 UTC [chaincode] HandleGetState -> DEBU 2e0a [f13255af] getting state for chaincode lscc, key exp02, channel businesschannel" -"2019-07-20 02:40:31.055 UTC [stateleveldb] GetState -> DEBU 2e0b GetState(). ns=lscc, key=exp02" -"2019-07-20 02:40:31.055 UTC [chaincode] HandleTransaction -> DEBU 2e0c [f13255af] Completed GET_STATE. Sending RESPONSE" -"2019-07-20 02:40:31.056 UTC [chaincode] handleMessage -> DEBU 2e0d [f13255af] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:31.056 UTC [chaincode] Notify -> DEBU 2e0e [f13255af] notifying Txid:f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, channelID:businesschannel" -"2019-07-20 02:40:31.056 UTC [chaincode] Execute -> DEBU 2e0f Exit" -"2019-07-20 02:40:31.056 UTC [endorser] callChaincode -> INFO 2e10 [businesschannel][f13255af] Exit chaincode: name:"lscc" (4ms)" -"2019-07-20 02:40:31.056 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e11 Simulation completed, getting simulation results" -"2019-07-20 02:40:31.057 UTC [lockbasedtxmgr] Done -> DEBU 2e12 Done with transaction simulation / query execution [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" -"2019-07-20 02:40:31.057 UTC [endorser] SimulateProposal -> DEBU 2e13 [businesschannel][f13255af] Exit" -"2019-07-20 02:40:31.057 UTC [endorser] endorseProposal -> DEBU 2e14 [businesschannel][f13255af] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:31.057 UTC [endorser] endorseProposal -> DEBU 2e15 [businesschannel][f13255af] escc for chaincode name:"lscc" is escc" -"2019-07-20 02:40:31.057 UTC [endorser] EndorseWithPlugin -> DEBU 2e16 Entering endorsement for {plugin: escc, channel: businesschannel, tx: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, chaincode: lscc}" -"2019-07-20 02:40:31.057 UTC [msp.identity] Sign -> DEBU 2e17 Sign: plaintext: 0A20DF588A2AEA060081019D422F1E99...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:31.058 UTC [msp.identity] Sign -> DEBU 2e18 Sign: digest: 5FB5760DFBC5340411F4B7D072CF6CC8CD1031849D3597442E767CC02492CC07 " -"2019-07-20 02:40:31.058 UTC [endorser] EndorseWithPlugin -> DEBU 2e19 Exiting {plugin: escc, channel: businesschannel, tx: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, chaincode: lscc}" -"2019-07-20 02:40:31.058 UTC [endorser] endorseProposal -> DEBU 2e1a [businesschannel][f13255af] Exit" -"2019-07-20 02:40:31.058 UTC [lockbasedtxmgr] Done -> DEBU 2e1b Done with transaction simulation / query execution [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" -"2019-07-20 02:40:31.058 UTC [endorser] func1 -> DEBU 2e1c Exit: request from 172.18.0.9:58396" -"2019-07-20 02:40:31.059 UTC [comm.grpc.server] 1 -> INFO 2e1d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58396 grpc.code=OK grpc.call_duration=9.768ms -"2019-07-20 02:40:31.062 UTC [grpc] infof -> DEBU 2e1e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:31.063 UTC [grpc] infof -> DEBU 2e1f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:31.200 UTC [endorser] ProcessProposal -> DEBU 2e20 Entering: request from 172.18.0.9:58400" -"2019-07-20 02:40:31.200 UTC [protoutils] ValidateProposalMessage -> DEBU 2e21 ValidateProposalMessage starts for signed proposal 0xc002997180" -"2019-07-20 02:40:31.200 UTC [protoutils] validateChannelHeader -> DEBU 2e22 validateChannelHeader info: header type 3" -"2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e23 begin" -"2019-07-20 02:40:31.200 UTC [msp] GetManagerForChain -> DEBU 2e24 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e25 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e26 creator is valid" -"2019-07-20 02:40:31.200 UTC [msp.identity] Verify -> DEBU 2e27 Verify: digest = 00000000 14 99 d2 66 9e c3 35 26 ae d4 50 7d ac 82 40 41 |...f..5&..P}..@A| -00000010 aa 63 90 aa 72 c5 d1 4d 61 45 96 7c 0c 4d e2 6e |.c..r..MaE.|.M.n|" -"2019-07-20 02:40:31.200 UTC [msp.identity] Verify -> DEBU 2e28 Verify: sig = 00000000 30 45 02 21 00 95 4b ba f8 fb 04 c0 e1 f8 cd e1 |0E.!..K.........| -00000010 38 eb 46 ae 85 74 38 33 02 e1 2e d1 ea 50 de d0 |8.F..t83.....P..| -00000020 a6 24 5d b2 48 02 20 31 08 c8 7d 1d e0 28 0a 51 |.$].H. 1..}..(.Q| -00000030 d9 8e cb e6 45 63 87 d4 8b 85 ac a9 44 0a 4a 19 |....Ec......D.J.| -00000040 2f 17 bc cb d3 14 14 |/......|" -"2019-07-20 02:40:31.201 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e29 exits successfully" -"2019-07-20 02:40:31.201 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e2a validateChaincodeProposalMessage starts for proposal 0xc002a5a0e0, header 0xc002997590" -"2019-07-20 02:40:31.201 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e2b validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -"2019-07-20 02:40:31.201 UTC [endorser] preProcess -> DEBU 2e2c [businesschannel][3d993208] processing txid: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5" -"2019-07-20 02:40:31.201 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e2d retrieveTransactionByID() - txId = [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" -"2019-07-20 02:40:31.201 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e2e constructing new tx simulator" -"2019-07-20 02:40:31.201 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e2f constructing new tx simulator txid = [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" -"2019-07-20 02:40:31.201 UTC [endorser] SimulateProposal -> DEBU 2e30 [businesschannel][3d993208] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:31.201 UTC [endorser] callChaincode -> INFO 2e31 [businesschannel][3d993208] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:31.202 UTC [chaincode] Execute -> DEBU 2e32 Entry" -"2019-07-20 02:40:31.202 UTC [msp.identity] Verify -> DEBU 2e33 Verify: digest = 00000000 14 99 d2 66 9e c3 35 26 ae d4 50 7d ac 82 40 41 |...f..5&..P}..@A| -00000010 aa 63 90 aa 72 c5 d1 4d 61 45 96 7c 0c 4d e2 6e |.c..r..MaE.|.M.n|" -"2019-07-20 02:40:31.202 UTC [msp.identity] Verify -> DEBU 2e34 Verify: sig = 00000000 30 45 02 21 00 95 4b ba f8 fb 04 c0 e1 f8 cd e1 |0E.!..K.........| -00000010 38 eb 46 ae 85 74 38 33 02 e1 2e d1 ea 50 de d0 |8.F..t83.....P..| -00000020 a6 24 5d b2 48 02 20 31 08 c8 7d 1d e0 28 0a 51 |.$].H. 1..}..(.Q| -00000030 d9 8e cb e6 45 63 87 d4 8b 85 ac a9 44 0a 4a 19 |....Ec......D.J.| -00000040 2f 17 bc cb d3 14 14 |/......|" -"2019-07-20 02:40:31.202 UTC [chaincode] handleMessage -> DEBU 2e35 [3d993208] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:31.202 UTC [chaincode] Notify -> DEBU 2e36 [3d993208] notifying Txid:3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, channelID:businesschannel" -"2019-07-20 02:40:31.202 UTC [chaincode] Execute -> DEBU 2e37 Exit" -"2019-07-20 02:40:31.203 UTC [endorser] callChaincode -> INFO 2e38 [businesschannel][3d993208] Exit chaincode: name:"lscc" (1ms)" -"2019-07-20 02:40:31.203 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e39 Simulation completed, getting simulation results" -"2019-07-20 02:40:31.203 UTC [lockbasedtxmgr] Done -> DEBU 2e3a Done with transaction simulation / query execution [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" -"2019-07-20 02:40:31.203 UTC [endorser] SimulateProposal -> DEBU 2e3b [businesschannel][3d993208] Exit" -"2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e3c [businesschannel][3d993208] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e3d [businesschannel][3d993208] escc for chaincode name:"lscc" is escc" -"2019-07-20 02:40:31.203 UTC [endorser] EndorseWithPlugin -> DEBU 2e3e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, chaincode: lscc}" -"2019-07-20 02:40:31.203 UTC [msp.identity] Sign -> DEBU 2e3f Sign: plaintext: 0A209E2BEBF5810375D1E37635180076...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:31.203 UTC [msp.identity] Sign -> DEBU 2e40 Sign: digest: 363FCCE3F7DEB930D82E10E0E713734CE9239405AC545754A93FD1B6565EFB75 " -"2019-07-20 02:40:31.203 UTC [endorser] EndorseWithPlugin -> DEBU 2e41 Exiting {plugin: escc, channel: businesschannel, tx: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, chaincode: lscc}" -"2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e42 [businesschannel][3d993208] Exit" -"2019-07-20 02:40:31.204 UTC [lockbasedtxmgr] Done -> DEBU 2e43 Done with transaction simulation / query execution [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" -"2019-07-20 02:40:31.204 UTC [endorser] func1 -> DEBU 2e44 Exit: request from 172.18.0.9:58400" -"2019-07-20 02:40:31.204 UTC [comm.grpc.server] 1 -> INFO 2e45 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58400 grpc.code=OK grpc.call_duration=4.198ms -"2019-07-20 02:40:31.207 UTC [grpc] infof -> DEBU 2e46 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:31.207 UTC [grpc] infof -> DEBU 2e47 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:31.352 UTC [endorser] ProcessProposal -> DEBU 2e48 Entering: request from 172.18.0.9:58404" -"2019-07-20 02:40:31.352 UTC [protoutils] ValidateProposalMessage -> DEBU 2e49 ValidateProposalMessage starts for signed proposal 0xc00399e690" -"2019-07-20 02:40:31.352 UTC [protoutils] validateChannelHeader -> DEBU 2e4a validateChannelHeader info: header type 3" -"2019-07-20 02:40:31.352 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4b begin" -"2019-07-20 02:40:31.352 UTC [msp] GetManagerForChain -> DEBU 2e4c Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4e creator is valid" -"2019-07-20 02:40:31.353 UTC [msp.identity] Verify -> DEBU 2e4f Verify: digest = 00000000 77 41 14 34 63 ad 27 1e e3 ee 18 4f 8a 36 b2 89 |wA.4c.'....O.6..| -00000010 d9 ca 87 b4 ce 08 5f 15 ae 55 bd 64 24 f0 da e8 |......_..U.d$...|" -"2019-07-20 02:40:31.353 UTC [msp.identity] Verify -> DEBU 2e50 Verify: sig = 00000000 30 45 02 21 00 fb d9 85 24 63 ca d1 96 95 5e 9f |0E.!....$c....^.| -00000010 34 88 fd 08 fa 07 ba 25 55 fe 90 5d 47 f8 15 79 |4......%U..]G..y| -00000020 11 db 91 f6 30 02 20 32 23 11 66 11 96 1f ad e1 |....0. 2#.f.....| -00000030 3b 07 49 49 18 f6 f7 79 29 68 ac 7b df de 77 50 |;.II...y)h.{..wP| -00000040 2f d2 8f aa 25 45 75 |/...%Eu|" -"2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e51 exits successfully" -"2019-07-20 02:40:31.353 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e52 validateChaincodeProposalMessage starts for proposal 0xc002a5ad90, header 0xc00399eaa0" -"2019-07-20 02:40:31.353 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e53 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " -"2019-07-20 02:40:31.353 UTC [endorser] preProcess -> DEBU 2e54 [businesschannel][7925c232] processing txid: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3" -"2019-07-20 02:40:31.353 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e55 retrieveTransactionByID() - txId = [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" -"2019-07-20 02:40:31.354 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e56 constructing new tx simulator" -"2019-07-20 02:40:31.354 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e57 constructing new tx simulator txid = [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" -"2019-07-20 02:40:31.354 UTC [endorser] SimulateProposal -> DEBU 2e58 [businesschannel][7925c232] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:31.354 UTC [endorser] callChaincode -> INFO 2e59 [businesschannel][7925c232] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:31.354 UTC [chaincode] Execute -> DEBU 2e5a Entry" -"2019-07-20 02:40:31.354 UTC [aclmgmt] CheckACL -> DEBU 2e5b acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes" -"2019-07-20 02:40:31.354 UTC [aclmgmt] CheckACL -> DEBU 2e5c acl check(/Channel/Application/Readers)" -"2019-07-20 02:40:31.354 UTC [policies] Evaluate -> DEBU 2e5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:31.354 UTC [policies] Evaluate -> DEBU 2e5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:31.355 UTC [cauthdsl] func1 -> DEBU 2e60 0xc003810b80 gate 1563590431355085800 evaluation starts" -"2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e61 0xc003810b80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e62 0xc003810b80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e63 0xc003810b80 principal matched by identity 0" -"2019-07-20 02:40:31.355 UTC [msp.identity] Verify -> DEBU 2e64 Verify: digest = 00000000 77 41 14 34 63 ad 27 1e e3 ee 18 4f 8a 36 b2 89 |wA.4c.'....O.6..| -00000010 d9 ca 87 b4 ce 08 5f 15 ae 55 bd 64 24 f0 da e8 |......_..U.d$...|" -"2019-07-20 02:40:31.355 UTC [msp.identity] Verify -> DEBU 2e65 Verify: sig = 00000000 30 45 02 21 00 fb d9 85 24 63 ca d1 96 95 5e 9f |0E.!....$c....^.| -00000010 34 88 fd 08 fa 07 ba 25 55 fe 90 5d 47 f8 15 79 |4......%U..]G..y| -00000020 11 db 91 f6 30 02 20 32 23 11 66 11 96 1f ad e1 |....0. 2#.f.....| -00000030 3b 07 49 49 18 f6 f7 79 29 68 ac 7b df de 77 50 |;.II...y)h.{..wP| -00000040 2f d2 8f aa 25 45 75 |/...%Eu|" -"2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e66 0xc003810b80 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:31.355 UTC [cauthdsl] func1 -> DEBU 2e67 0xc003810b80 gate 1563590431355085800 evaluation succeeds" -"2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e68 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.356 UTC [policies] Evaluate -> DEBU 2e6a Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:31.356 UTC [policies] Evaluate -> DEBU 2e6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:31.356 UTC [chaincode] handleMessage -> DEBU 2e6c [7925c232] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready" -"2019-07-20 02:40:31.356 UTC [chaincode] HandleTransaction -> DEBU 2e6d [7925c232] handling GET_STATE_BY_RANGE from chaincode" -"2019-07-20 02:40:31.356 UTC [leveldbhelper] GetIterator -> DEBU 2e6e Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}]" -"2019-07-20 02:40:31.356 UTC [rwsetutil] AddResult -> DEBU 2e6f Adding a result" -"2019-07-20 02:40:31.356 UTC [chaincode] HandleGetStateByRange -> DEBU 2e70 Got keys and values. Sending RESPONSE" -"2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e71 [7925c232] Completed GET_STATE_BY_RANGE. Sending RESPONSE" -"2019-07-20 02:40:31.365 UTC [chaincode] handleMessage -> DEBU 2e72 [7925c232] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready" -"2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e73 [7925c232] handling QUERY_STATE_CLOSE from chaincode" -"2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e74 [7925c232] Completed QUERY_STATE_CLOSE. Sending RESPONSE" -"2019-07-20 02:40:31.365 UTC [chaincode] handleMessage -> DEBU 2e75 [7925c232] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:31.366 UTC [chaincode] Notify -> DEBU 2e76 [7925c232] notifying Txid:7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, channelID:businesschannel" -"2019-07-20 02:40:31.366 UTC [chaincode] Execute -> DEBU 2e77 Exit" -"2019-07-20 02:40:31.366 UTC [endorser] callChaincode -> INFO 2e78 [businesschannel][7925c232] Exit chaincode: name:"lscc" (12ms)" -"2019-07-20 02:40:31.366 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e79 Simulation completed, getting simulation results" -"2019-07-20 02:40:31.366 UTC [lockbasedtxmgr] Done -> DEBU 2e7a Done with transaction simulation / query execution [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" -"2019-07-20 02:40:31.366 UTC [endorser] SimulateProposal -> DEBU 2e7b [businesschannel][7925c232] Exit" -"2019-07-20 02:40:31.366 UTC [endorser] endorseProposal -> DEBU 2e7c [businesschannel][7925c232] Entry chaincode: name:"lscc" " -"2019-07-20 02:40:31.367 UTC [endorser] endorseProposal -> DEBU 2e7d [businesschannel][7925c232] escc for chaincode name:"lscc" is escc" -"2019-07-20 02:40:31.367 UTC [endorser] EndorseWithPlugin -> DEBU 2e7e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, chaincode: lscc}" -"2019-07-20 02:40:31.367 UTC [msp.identity] Sign -> DEBU 2e7f Sign: plaintext: 0A209AF619A7859ADC410AEE54B475C5...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:31.367 UTC [msp.identity] Sign -> DEBU 2e80 Sign: digest: 66D9F0AE6A8B6D0BDFA74EC725FED4FAB07281773EC61CB4846DDF0E5D851AEF " -"2019-07-20 02:40:31.367 UTC [endorser] EndorseWithPlugin -> DEBU 2e81 Exiting {plugin: escc, channel: businesschannel, tx: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, chaincode: lscc}" -"2019-07-20 02:40:31.368 UTC [endorser] endorseProposal -> DEBU 2e82 [businesschannel][7925c232] Exit" -"2019-07-20 02:40:31.368 UTC [lockbasedtxmgr] Done -> DEBU 2e83 Done with transaction simulation / query execution [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" -"2019-07-20 02:40:31.368 UTC [endorser] func1 -> DEBU 2e84 Exit: request from 172.18.0.9:58404" -"2019-07-20 02:40:31.368 UTC [comm.grpc.server] 1 -> INFO 2e85 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58404 grpc.code=OK grpc.call_duration=16.3707ms -"2019-07-20 02:40:31.375 UTC [grpc] infof -> DEBU 2e86 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:31.375 UTC [grpc] infof -> DEBU 2e87 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:31.719 UTC [endorser] ProcessProposal -> DEBU 2e88 Entering: request from 172.18.0.9:58408" -"2019-07-20 02:40:31.719 UTC [protoutils] ValidateProposalMessage -> DEBU 2e89 ValidateProposalMessage starts for signed proposal 0xc003d22410" -"2019-07-20 02:40:31.720 UTC [protoutils] validateChannelHeader -> DEBU 2e8a validateChannelHeader info: header type 3" -"2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8b begin" -"2019-07-20 02:40:31.720 UTC [msp] GetManagerForChain -> DEBU 2e8c Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8e creator is valid" -"2019-07-20 02:40:31.720 UTC [msp.identity] Verify -> DEBU 2e8f Verify: digest = 00000000 f3 76 3b 29 1f a0 88 e0 7e 8e a9 4e 87 4a 62 9b |.v;)....~..N.Jb.| -00000010 f0 0f 57 5c 4d e6 bd 4c 15 bd ce f8 e0 77 ab 37 |..W\M..L.....w.7|" -"2019-07-20 02:40:31.720 UTC [msp.identity] Verify -> DEBU 2e90 Verify: sig = 00000000 30 44 02 20 6f c2 7c 09 cc 43 00 70 86 8e b2 4b |0D. o.|..C.p...K| -00000010 fc a6 ce f6 79 d3 bc db 9a cc 2e 00 58 c5 26 eb |....y.......X.&.| -00000020 fb 4f c1 92 02 20 0f c4 96 3d 20 f8 05 23 86 7d |.O... ...= ..#.}| -00000030 66 6e c2 32 12 9c f0 50 22 92 d8 03 f5 bb 76 62 |fn.2...P".....vb| -00000040 d1 d0 19 37 df b2 |...7..|" -"2019-07-20 02:40:31.721 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e91 exits successfully" -"2019-07-20 02:40:31.721 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e92 validateChaincodeProposalMessage starts for proposal 0xc0029ac1c0, header 0xc003d22870" -"2019-07-20 02:40:31.721 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e93 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -"2019-07-20 02:40:31.721 UTC [endorser] preProcess -> DEBU 2e94 [businesschannel][dd8fd934] processing txid: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a" -"2019-07-20 02:40:31.721 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e95 retrieveTransactionByID() - txId = [dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a]" -"2019-07-20 02:40:31.721 UTC [endorser] SimulateProposal -> DEBU 2e96 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " -"2019-07-20 02:40:31.721 UTC [endorser] callChaincode -> INFO 2e97 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " -"2019-07-20 02:40:31.721 UTC [chaincode] Execute -> DEBU 2e98 Entry" -"2019-07-20 02:40:31.722 UTC [qscc] Invoke -> DEBU 2e99 Invoke function: GetChainInfo on chain: businesschannel" -"2019-07-20 02:40:31.722 UTC [aclmgmt] CheckACL -> DEBU 2e9a acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -"2019-07-20 02:40:31.722 UTC [aclmgmt] CheckACL -> DEBU 2e9b acl check(/Channel/Application/Readers)" -"2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:31.722 UTC [cauthdsl] func1 -> DEBU 2e9f 0xc003b4c0c0 gate 1563590431722676400 evaluation starts" -"2019-07-20 02:40:31.722 UTC [cauthdsl] func2 -> DEBU 2ea0 0xc003b4c0c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:31.722 UTC [cauthdsl] func2 -> DEBU 2ea1 0xc003b4c0c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:31.723 UTC [cauthdsl] func2 -> DEBU 2ea2 0xc003b4c0c0 principal matched by identity 0" -"2019-07-20 02:40:31.723 UTC [msp.identity] Verify -> DEBU 2ea3 Verify: digest = 00000000 f3 76 3b 29 1f a0 88 e0 7e 8e a9 4e 87 4a 62 9b |.v;)....~..N.Jb.| -00000010 f0 0f 57 5c 4d e6 bd 4c 15 bd ce f8 e0 77 ab 37 |..W\M..L.....w.7|" -"2019-07-20 02:40:31.723 UTC [msp.identity] Verify -> DEBU 2ea4 Verify: sig = 00000000 30 44 02 20 6f c2 7c 09 cc 43 00 70 86 8e b2 4b |0D. o.|..C.p...K| -00000010 fc a6 ce f6 79 d3 bc db 9a cc 2e 00 58 c5 26 eb |....y.......X.&.| -00000020 fb 4f c1 92 02 20 0f c4 96 3d 20 f8 05 23 86 7d |.O... ...= ..#.}| -00000030 66 6e c2 32 12 9c f0 50 22 92 d8 03 f5 bb 76 62 |fn.2...P".....vb| -00000040 d1 d0 19 37 df b2 |...7..|" -"2019-07-20 02:40:31.723 UTC [cauthdsl] func2 -> DEBU 2ea5 0xc003b4c0c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:31.723 UTC [cauthdsl] func1 -> DEBU 2ea6 0xc003b4c0c0 gate 1563590431722676400 evaluation succeeds" -"2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea7 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea9 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:31.724 UTC [policies] Evaluate -> DEBU 2eaa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:31.724 UTC [chaincode] handleMessage -> DEBU 2eab [dd8fd934] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:31.724 UTC [chaincode] Notify -> DEBU 2eac [dd8fd934] notifying Txid:dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, channelID:businesschannel" -"2019-07-20 02:40:31.724 UTC [chaincode] Execute -> DEBU 2ead Exit" -"2019-07-20 02:40:31.724 UTC [endorser] callChaincode -> INFO 2eae [businesschannel][dd8fd934] Exit chaincode: name:"qscc" (2ms)" -"2019-07-20 02:40:31.724 UTC [endorser] SimulateProposal -> DEBU 2eaf [businesschannel][dd8fd934] Exit" -"2019-07-20 02:40:31.724 UTC [endorser] endorseProposal -> DEBU 2eb0 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " -"2019-07-20 02:40:31.724 UTC [endorser] endorseProposal -> DEBU 2eb1 [businesschannel][dd8fd934] escc for chaincode name:"qscc" is escc" -"2019-07-20 02:40:31.724 UTC [endorser] EndorseWithPlugin -> DEBU 2eb2 Entering endorsement for {plugin: escc, channel: businesschannel, tx: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, chaincode: qscc}" -"2019-07-20 02:40:31.725 UTC [msp.identity] Sign -> DEBU 2eb3 Sign: plaintext: 0A2070FDD43188AE8CAE2BB47E6B654F...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:31.725 UTC [msp.identity] Sign -> DEBU 2eb4 Sign: digest: FDDD85326B9859D771E0B5898B5DF6BDBAF7EE9E62BB1F52B98D226C565011A3 " -"2019-07-20 02:40:31.725 UTC [endorser] EndorseWithPlugin -> DEBU 2eb5 Exiting {plugin: escc, channel: businesschannel, tx: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, chaincode: qscc}" -"2019-07-20 02:40:31.725 UTC [endorser] endorseProposal -> DEBU 2eb6 [businesschannel][dd8fd934] Exit" -"2019-07-20 02:40:31.725 UTC [endorser] func1 -> DEBU 2eb7 Exit: request from 172.18.0.9:58408" -"2019-07-20 02:40:31.725 UTC [comm.grpc.server] 1 -> INFO 2eb8 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58408 grpc.code=OK grpc.call_duration=6.2471ms -"2019-07-20 02:40:31.728 UTC [grpc] infof -> DEBU 2eb9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:31.728 UTC [grpc] infof -> DEBU 2eba transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:31.873 UTC [endorser] ProcessProposal -> DEBU 2ebb Entering: request from 172.18.0.9:58412" -"2019-07-20 02:40:31.873 UTC [protoutils] ValidateProposalMessage -> DEBU 2ebc ValidateProposalMessage starts for signed proposal 0xc003d23950" -"2019-07-20 02:40:31.873 UTC [protoutils] validateChannelHeader -> DEBU 2ebd validateChannelHeader info: header type 3" -"2019-07-20 02:40:31.873 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ebe begin" -"2019-07-20 02:40:31.874 UTC [msp] GetManagerForChain -> DEBU 2ebf Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:31.874 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ec0 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:31.874 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ec1 creator is valid" -"2019-07-20 02:40:31.874 UTC [msp.identity] Verify -> DEBU 2ec2 Verify: digest = 00000000 86 1a 70 e6 b0 17 55 f5 b1 1c fa 99 b5 c1 50 dc |..p...U.......P.| -00000010 ef f1 79 c3 1c fa f0 35 ad 15 f5 3c 97 48 92 00 |..y....5...<.H..|" -"2019-07-20 02:40:31.874 UTC [msp.identity] Verify -> DEBU 2ec3 Verify: sig = 00000000 30 45 02 21 00 cc e3 3a 87 2c 19 de 52 4a 85 64 |0E.!...:.,..RJ.d| -00000010 a7 8d b7 02 1d 56 09 5a 54 e9 b6 9f 8b 1f e9 50 |.....V.ZT......P| -00000020 4f cd 3e 7a db 02 20 01 43 4d 9d bc f9 2f f0 a9 |O.>z.. .CM.../..| -00000030 38 93 42 20 72 e9 78 7f d0 5f 43 47 3c 6a d7 d1 |8.B r.x.._CG DEBU 2ec4 exits successfully" -"2019-07-20 02:40:31.874 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2ec5 validateChaincodeProposalMessage starts for proposal 0xc0029ac620, header 0xc003d23db0" -"2019-07-20 02:40:31.875 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2ec6 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -"2019-07-20 02:40:31.875 UTC [endorser] preProcess -> DEBU 2ec7 [businesschannel][b2c8af94] processing txid: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67" -"2019-07-20 02:40:31.875 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2ec8 retrieveTransactionByID() - txId = [b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67]" -"2019-07-20 02:40:31.875 UTC [endorser] SimulateProposal -> DEBU 2ec9 [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " -"2019-07-20 02:40:31.875 UTC [endorser] callChaincode -> INFO 2eca [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " -"2019-07-20 02:40:31.875 UTC [chaincode] Execute -> DEBU 2ecb Entry" -"2019-07-20 02:40:31.875 UTC [qscc] Invoke -> DEBU 2ecc Invoke function: GetBlockByNumber on chain: businesschannel" -"2019-07-20 02:40:31.875 UTC [aclmgmt] CheckACL -> DEBU 2ecd acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" -"2019-07-20 02:40:31.876 UTC [aclmgmt] CheckACL -> DEBU 2ece acl check(/Channel/Application/Readers)" -"2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ecf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ed0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ed1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:31.876 UTC [cauthdsl] func1 -> DEBU 2ed2 0xc0003ddce0 gate 1563590431876580200 evaluation starts" -"2019-07-20 02:40:31.876 UTC [cauthdsl] func2 -> DEBU 2ed3 0xc0003ddce0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:31.877 UTC [cauthdsl] func2 -> DEBU 2ed4 0xc0003ddce0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:31.877 UTC [cauthdsl] func2 -> DEBU 2ed5 0xc0003ddce0 principal matched by identity 0" -"2019-07-20 02:40:31.877 UTC [msp.identity] Verify -> DEBU 2ed6 Verify: digest = 00000000 86 1a 70 e6 b0 17 55 f5 b1 1c fa 99 b5 c1 50 dc |..p...U.......P.| -00000010 ef f1 79 c3 1c fa f0 35 ad 15 f5 3c 97 48 92 00 |..y....5...<.H..|" -"2019-07-20 02:40:31.877 UTC [msp.identity] Verify -> DEBU 2ed7 Verify: sig = 00000000 30 45 02 21 00 cc e3 3a 87 2c 19 de 52 4a 85 64 |0E.!...:.,..RJ.d| -00000010 a7 8d b7 02 1d 56 09 5a 54 e9 b6 9f 8b 1f e9 50 |.....V.ZT......P| -00000020 4f cd 3e 7a db 02 20 01 43 4d 9d bc f9 2f f0 a9 |O.>z.. .CM.../..| -00000030 38 93 42 20 72 e9 78 7f d0 5f 43 47 3c 6a d7 d1 |8.B r.x.._CG DEBU 2ed8 0xc0003ddce0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:31.877 UTC [cauthdsl] func1 -> DEBU 2ed9 0xc0003ddce0 gate 1563590431876580200 evaluation succeeds" -"2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2eda Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2edb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2edc Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:31.878 UTC [policies] Evaluate -> DEBU 2edd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:31.878 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 2ede retrieveBlockByNumber() - blockNum = [2]" -"2019-07-20 02:40:31.878 UTC [fsblkstorage] newBlockfileStream -> DEBU 2edf newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47677]" -"2019-07-20 02:40:31.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ee0 Remaining bytes=[36402], Going to peek [8] bytes" -"2019-07-20 02:40:31.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ee1 Returning blockbytes - length=[23781], placementInfo={fileNum=[0], startOffset=[47677], bytesOffset=[47680]}" -"2019-07-20 02:40:31.879 UTC [chaincode] handleMessage -> DEBU 2ee2 [b2c8af94] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:31.879 UTC [chaincode] Notify -> DEBU 2ee3 [b2c8af94] notifying Txid:b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, channelID:businesschannel" -"2019-07-20 02:40:31.879 UTC [chaincode] Execute -> DEBU 2ee4 Exit" -"2019-07-20 02:40:31.879 UTC [endorser] callChaincode -> INFO 2ee5 [businesschannel][b2c8af94] Exit chaincode: name:"qscc" (4ms)" -"2019-07-20 02:40:31.879 UTC [endorser] SimulateProposal -> DEBU 2ee6 [businesschannel][b2c8af94] Exit" -"2019-07-20 02:40:31.880 UTC [endorser] endorseProposal -> DEBU 2ee7 [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " -"2019-07-20 02:40:31.880 UTC [endorser] endorseProposal -> DEBU 2ee8 [businesschannel][b2c8af94] escc for chaincode name:"qscc" is escc" -"2019-07-20 02:40:31.880 UTC [endorser] EndorseWithPlugin -> DEBU 2ee9 Entering endorsement for {plugin: escc, channel: businesschannel, tx: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, chaincode: qscc}" -"2019-07-20 02:40:31.880 UTC [msp.identity] Sign -> DEBU 2eea Sign: plaintext: 0A2036A3CDEF14D19587AB9EF2BCE767...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:31.881 UTC [msp.identity] Sign -> DEBU 2eeb Sign: digest: C4F9350E47494E49BCA826CFABD27DC035B15BABCC5B92822587F660B0B5F404 " -"2019-07-20 02:40:31.881 UTC [endorser] EndorseWithPlugin -> DEBU 2eec Exiting {plugin: escc, channel: businesschannel, tx: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, chaincode: qscc}" -"2019-07-20 02:40:31.881 UTC [endorser] endorseProposal -> DEBU 2eed [businesschannel][b2c8af94] Exit" -"2019-07-20 02:40:31.881 UTC [endorser] func1 -> DEBU 2eee Exit: request from 172.18.0.9:58412" -"2019-07-20 02:40:31.882 UTC [comm.grpc.server] 1 -> INFO 2eef unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58412 grpc.code=OK grpc.call_duration=8.8663ms -"2019-07-20 02:40:31.887 UTC [grpc] infof -> DEBU 2ef0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:31.887 UTC [grpc] warningf -> DEBU 2ef1 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58412: read: connection reset by peer" -"2019-07-20 02:40:31.887 UTC [grpc] infof -> DEBU 2ef2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:31.899 UTC [gossip.comm] func1 -> DEBU 2ef3 Got message: GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:31.899 UTC [gossip.gossip] handleMessage -> DEBU 2ef4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:31.900 UTC [gossip.gossip] handleMessage -> DEBU 2ef5 Exiting" -"2019-07-20 02:40:31.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ef6 Got message: GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:31.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ef7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:31.900 UTC [msp] DeserializeIdentity -> DEBU 2ef8 Obtaining identity" -"2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ef9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efa Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efb Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:31.902 UTC [cauthdsl] func1 -> DEBU 2eff 0xc0002defe0 gate 1563590431902859400 evaluation starts" -"2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f00 0xc0002defe0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f01 0xc0002defe0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f02 0xc0002defe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f03 0xc0002defe0 principal evaluation fails" -"2019-07-20 02:40:31.904 UTC [cauthdsl] func1 -> DEBU 2f04 0xc0002defe0 gate 1563590431902859400 evaluation fails" -"2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:31.904 UTC [cauthdsl] func1 -> DEBU 2f08 0xc0002df830 gate 1563590431904830900 evaluation starts" -"2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f09 0xc0002df830 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f0a 0xc0002df830 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f0b 0xc0002df830 principal matched by identity 0" -"2019-07-20 02:40:31.904 UTC [msp.identity] Verify -> DEBU 2f0c Verify: digest = 00000000 4a 3c a8 97 ce 24 57 51 8e 87 51 64 33 0f 25 92 |J<...$WQ..Qd3.%.| -00000010 d8 a5 69 b9 1a 02 bf 17 f5 e4 d6 78 8a 4c 44 3c |..i........x.LD<|" -"2019-07-20 02:40:31.905 UTC [msp.identity] Verify -> DEBU 2f0d Verify: sig = 00000000 30 45 02 21 00 e7 e9 e4 66 f3 56 fa 3e 9d 43 8d |0E.!....f.V.>.C.| -00000010 c9 39 a6 3b ef 67 3f 6f 88 29 cb 62 a9 23 d5 4c |.9.;.g?o.).b.#.L| -00000020 ba 6f a8 e8 aa 02 20 7a 33 30 08 47 98 6c 93 c9 |.o.... z30.G.l..| -00000030 29 e1 b6 ab 0c 04 cf 3b 7b 3a 5a e4 e1 9a 9b 6b |)......;{:Z....k| -00000040 61 ae 3f 2f 04 68 dc |a.?/.h.|" -"2019-07-20 02:40:31.905 UTC [cauthdsl] func2 -> DEBU 2f0e 0xc0002df830 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:31.905 UTC [cauthdsl] func1 -> DEBU 2f0f 0xc0002df830 gate 1563590431904830900 evaluation succeeds" -"2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f12 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:31.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f14 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f15 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f16 updating membership: timestamp: " -"2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f17 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f18 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f19 Exiting" -"2019-07-20 02:40:31.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f1a Exiting" -"2019-07-20 02:40:31.905 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f1b Exiting" -"2019-07-20 02:40:31.905 UTC [gossip.discovery] sendMemResponse -> DEBU 2f1c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:31.905 UTC [msp] DeserializeIdentity -> DEBU 2f1d Obtaining identity" -"2019-07-20 02:40:31.906 UTC [msp] DeserializeIdentity -> DEBU 2f1e Obtaining identity" -"2019-07-20 02:40:31.906 UTC [msp] DeserializeIdentity -> DEBU 2f1f Obtaining identity" -"2019-07-20 02:40:31.906 UTC [gossip.comm] Send -> DEBU 2f20 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:31.906 UTC [gossip.discovery] sendMemResponse -> DEBU 2f21 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" > alive: alive:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > alive: " -"2019-07-20 02:40:31.906 UTC [gossip.comm] sendToEndpoint -> DEBU 2f22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:31.906 UTC [gossip.comm] sendToEndpoint -> DEBU 2f23 Exiting" -"2019-07-20 02:40:31.931 UTC [gossip.comm] func1 -> DEBU 2f24 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:31.931 UTC [gossip.gossip] handleMessage -> DEBU 2f25 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:31.931 UTC [gossip.pull] HandleMessage -> DEBU 2f26 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:31.931 UTC [msp] DeserializeIdentity -> DEBU 2f27 Obtaining identity" -"2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f28 Obtaining identity" -"2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f29 Obtaining identity" -"2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2a Obtaining identity" -"2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2b Obtaining identity" -"2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2c Obtaining identity" -"2019-07-20 02:40:31.933 UTC [gossip.pull] SendDigest -> DEBU 2f2d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:31.933 UTC [gossip.gossip] handleMessage -> DEBU 2f2e Exiting" -"2019-07-20 02:40:31.968 UTC [gossip.election] waitForInterrupt -> DEBU 2f2f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:31.968 UTC [gossip.election] IsLeader -> DEBU 2f30 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:31.968 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f31 Obtaining default signing identity" -"2019-07-20 02:40:31.968 UTC [msp.identity] Sign -> DEBU 2f32 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100B1801 " -"2019-07-20 02:40:31.968 UTC [msp.identity] Sign -> DEBU 2f33 Sign: digest: 2F26E4B97497DB1253FB70B9B9C3E2C6F0505DF73F214674042C23DD57685088 " -"2019-07-20 02:40:31.968 UTC [gossip.election] waitForInterrupt -> DEBU 2f34 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:31.974 UTC [gossip.comm] func1 -> DEBU 2f35 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.974 UTC [gossip.gossip] handleMessage -> DEBU 2f36 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.974 UTC [gossip.gossip] handleMessage -> DEBU 2f37 Exiting" -"2019-07-20 02:40:31.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f38 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.974 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f39 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:31.974 UTC [msp] DeserializeIdentity -> DEBU 2f3a Obtaining identity" -"2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f3c Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f3d Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:31.975 UTC [cauthdsl] func1 -> DEBU 2f41 0xc000267050 gate 1563590431975107500 evaluation starts" -"2019-07-20 02:40:31.975 UTC [cauthdsl] func2 -> DEBU 2f42 0xc000267050 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f43 0xc000267050 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f44 0xc000267050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f45 0xc000267050 principal evaluation fails" -"2019-07-20 02:40:31.976 UTC [cauthdsl] func1 -> DEBU 2f46 0xc000267050 gate 1563590431975107500 evaluation fails" -"2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:31.977 UTC [cauthdsl] func1 -> DEBU 2f4a 0xc0002678d0 gate 1563590431976993400 evaluation starts" -"2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4b 0xc0002678d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4c 0xc0002678d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4d 0xc0002678d0 principal matched by identity 0" -"2019-07-20 02:40:31.977 UTC [msp.identity] Verify -> DEBU 2f4e Verify: digest = 00000000 0b 08 da b1 e5 fb 95 4c 01 d7 21 e0 a3 01 36 58 |.......L..!...6X| -00000010 13 e9 fe e7 af 03 d2 1b 72 3d 58 a9 50 b9 92 9e |........r=X.P...|" -"2019-07-20 02:40:31.977 UTC [msp.identity] Verify -> DEBU 2f4f Verify: sig = 00000000 30 45 02 21 00 80 78 32 b8 90 6b ec fc c7 70 c0 |0E.!..x2..k...p.| -00000010 50 95 d1 12 8f e0 41 8b 80 19 9d bc c7 7d 24 f3 |P.....A......}$.| -00000020 e6 f7 30 50 84 02 20 5d b3 a7 9c e9 7a 6b b0 66 |..0P.. ]....zk.f| -00000030 0b 1c a9 aa 1b 3f 6b 33 fa e0 3e c4 3a 77 06 49 |.....?k3..>.:w.I| -00000040 ad 06 35 1a 4b 87 1e |..5.K..|" -"2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f50 0xc0002678d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:31.977 UTC [cauthdsl] func1 -> DEBU 2f51 0xc0002678d0 gate 1563590431976993400 evaluation succeeds" -"2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f52 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f54 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:31.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f56 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f57 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f58 updating membership: timestamp: " -"2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f59 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f5a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f5b Exiting" -"2019-07-20 02:40:31.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f5c Exiting" -"2019-07-20 02:40:31.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f5d Exiting" -"2019-07-20 02:40:31.980 UTC [gossip.comm] func1 -> DEBU 2f5e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.980 UTC [msp] DeserializeIdentity -> DEBU 2f5f Obtaining identity" -"2019-07-20 02:40:31.980 UTC [gossip.gossip] handleMessage -> DEBU 2f60 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f61 Exiting" -"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f62 Obtaining identity" -"2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f63 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f64 Obtaining identity" -"2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f65 Exiting" -"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f66 Obtaining identity" -"2019-07-20 02:40:31.981 UTC [gossip.comm] Send -> DEBU 2f68 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:31.981 UTC [gossip.comm] func1 -> DEBU 2f67 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f69 Obtaining identity" -"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f6a Obtaining identity" -"2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f6b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f6c Exiting" -"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f6d Obtaining identity" -"2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6f Exiting" -"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f70 Obtaining identity" -"2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f71 Obtaining identity" -"2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f72 Obtaining identity" -"2019-07-20 02:40:31.982 UTC [gossip.comm] Send -> DEBU 2f73 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f74 Obtaining identity" -"2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f75 Obtaining identity" -"2019-07-20 02:40:31.982 UTC [gossip.comm] Send -> DEBU 2f76 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:31.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2f77 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2f78 Exiting" -"2019-07-20 02:40:31.983 UTC [gossip.comm] sendToEndpoint -> DEBU 2f79 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -"2019-07-20 02:40:31.985 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7a Exiting" -"2019-07-20 02:40:31.984 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:31.985 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7c Exiting" -"2019-07-20 02:40:32.226 UTC [gossip.pull] Hello -> DEBU 2f7d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:32.227 UTC [gossip.comm] Send -> DEBU 2f7e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:32.227 UTC [gossip.pull] Hello -> DEBU 2f7f Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:32.227 UTC [gossip.comm] Send -> DEBU 2f80 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:32.227 UTC [gossip.pull] Hello -> DEBU 2f81 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:32.228 UTC [gossip.comm] Send -> DEBU 2f83 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f84 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f85 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f86 Exiting" -"2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f87 Exiting" -"2019-07-20 02:40:32.227 UTC [gossip.comm] sendToEndpoint -> DEBU 2f82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f88 Exiting" -"2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f89 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f8a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f8b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.230 UTC [gossip.gossip] handleMessage -> DEBU 2f8c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.231 UTC [gossip.pull] HandleMessage -> DEBU 2f8d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.231 UTC [gossip.gossip] handleMessage -> DEBU 2f8e Exiting" -"2019-07-20 02:40:32.231 UTC [gossip.gossip] handleMessage -> DEBU 2f8f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.232 UTC [gossip.pull] HandleMessage -> DEBU 2f90 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f91 Exiting" -"2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f92 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.232 UTC [gossip.pull] HandleMessage -> DEBU 2f93 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f94 Exiting" -"2019-07-20 02:40:32.268 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f95 Obtaining default signing identity" -"2019-07-20 02:40:32.268 UTC [msp.identity] Sign -> DEBU 2f96 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151024 " -"2019-07-20 02:40:32.268 UTC [msp.identity] Sign -> DEBU 2f97 Sign: digest: 11880CBF20E9DB2890F54E010AACD2C7F187ED0030E16E6018FEB365E8332922 " -"2019-07-20 02:40:32.269 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f98 Obtaining default signing identity" -"2019-07-20 02:40:32.269 UTC [msp.identity] Sign -> DEBU 2f99 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:32.269 UTC [msp.identity] Sign -> DEBU 2f9a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:32.269 UTC [msp] DeserializeIdentity -> DEBU 2f9b Obtaining identity" -"2019-07-20 02:40:32.269 UTC [gossip.comm] Send -> DEBU 2f9c Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:32.270 UTC [msp] DeserializeIdentity -> DEBU 2f9d Obtaining identity" -"2019-07-20 02:40:32.270 UTC [gossip.comm] Send -> DEBU 2f9e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:32.270 UTC [gossip.comm] Send -> DEBU 2f9f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa1 Exiting" -"2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa3 Exiting" -"2019-07-20 02:40:32.271 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.273 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa6 Exiting" -"2019-07-20 02:40:32.273 UTC [gossip.comm] func1 -> DEBU 2fa7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.272 UTC [gossip.comm] func1 -> DEBU 2fa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2fa8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2fa9 Exiting" -"2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2faa Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.274 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.274 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fac Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fad Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| -00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" -"2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fae Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| -00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| -00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| -00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| -00000040 2f 63 20 e5 1e f8 |/c ...|" -"2019-07-20 02:40:32.275 UTC [gossip.comm] func1 -> DEBU 2faf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fb0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:32.276 UTC [msp.identity] Verify -> DEBU 2fb1 Verify: sig = 00000000 30 44 02 20 02 0e 0b f7 41 03 4f 30 6b c2 7e 44 |0D. ....A.O0k.~D| -00000010 e6 e7 27 82 f5 81 a2 72 0e 8c 08 b3 3b 39 9e 10 |..'....r....;9..| -00000020 37 a2 5f 39 02 20 7b 0d 90 0c 12 0b 34 94 7f 69 |7._9. {.....4..i| -00000030 16 b8 7f 74 d7 c8 92 18 39 d4 02 65 b9 e2 06 33 |...t....9..e...3| -00000040 7d 37 1e 54 64 9f |}7.Td.|" -"2019-07-20 02:40:32.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fb2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:32.277 UTC [gossip.discovery] isSentByMe -> DEBU 2fb3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:32.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fb4 Exiting" -"2019-07-20 02:40:32.278 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb5 Exiting" -"2019-07-20 02:40:32.278 UTC [gossip.gossip] handleMessage -> DEBU 2fb6 Exiting" -"2019-07-20 02:40:32.278 UTC [gossip.gossip] handleMessage -> DEBU 2fb7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 2fb8 Obtaining default signing identity" -"2019-07-20 02:40:32.279 UTC [msp.identity] Sign -> DEBU 2fba Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151025 " -"2019-07-20 02:40:32.279 UTC [msp.identity] Sign -> DEBU 2fbb Sign: digest: 8009FFDB913E4C620E5BA94DB01E28E781CF96B1CDF79A2614F455E82EFAB0DD " -"2019-07-20 02:40:32.279 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 2fbc Obtaining default signing identity" -"2019-07-20 02:40:32.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fbd Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:32.280 UTC [msp.identity] Sign -> DEBU 2fbe Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:32.280 UTC [msp.identity] Sign -> DEBU 2fbf Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:32.280 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2fc0 Sleeping 5s" -"2019-07-20 02:40:32.281 UTC [msp.identity] Verify -> DEBU 2fc1 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| -00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" -"2019-07-20 02:40:32.281 UTC [msp.identity] Verify -> DEBU 2fc2 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| -00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| -00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| -00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| -00000040 26 61 82 2d 44 90 |&a.-D.|" -"2019-07-20 02:40:32.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fc3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fc4 Exiting" -"2019-07-20 02:40:32.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fc5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:32.282 UTC [msp.identity] Verify -> DEBU 2fc6 Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| -00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" -"2019-07-20 02:40:32.283 UTC [msp.identity] Verify -> DEBU 2fc7 Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| -00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| -00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| -00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| -00000040 2f 63 20 e5 1e f8 |/c ...|" -"2019-07-20 02:40:32.283 UTC [msp] DeserializeIdentity -> DEBU 2fc8 Obtaining identity" -"2019-07-20 02:40:32.283 UTC [msp] DeserializeIdentity -> DEBU 2fc9 Obtaining identity" -"2019-07-20 02:40:32.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fca Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.283 UTC [gossip.discovery] isSentByMe -> DEBU 2fcb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fcc Exiting" -"2019-07-20 02:40:32.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fcd Exiting" -"2019-07-20 02:40:32.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fd0 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:32.284 UTC [gossip.comm] Send -> DEBU 2fce Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:32.285 UTC [msp] DeserializeIdentity -> DEBU 2fd1 Obtaining identity" -"2019-07-20 02:40:32.285 UTC [gossip.comm] Send -> DEBU 2fd2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:32.285 UTC [msp] DeserializeIdentity -> DEBU 2fd3 Obtaining identity" -"2019-07-20 02:40:32.285 UTC [msp.identity] Verify -> DEBU 2fd4 Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| -00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" -"2019-07-20 02:40:32.286 UTC [msp.identity] Verify -> DEBU 2fd5 Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| -00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| -00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| -00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| -00000040 2f 63 20 e5 1e f8 |/c ...|" -"2019-07-20 02:40:32.286 UTC [gossip.comm] Send -> DEBU 2fd6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd8 Exiting" -"2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fdb Exiting" -"2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fdc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fde Exiting" -"2019-07-20 02:40:32.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fda Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.287 UTC [gossip.discovery] isSentByMe -> DEBU 2fdf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fe0 Exiting" -"2019-07-20 02:40:32.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fe1 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:32.288 UTC [msp] DeserializeIdentity -> DEBU 2fe2 Obtaining identity" -"2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fe3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe4 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe5 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.289 UTC [policies] Evaluate -> DEBU 2fe6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.289 UTC [policies] Evaluate -> DEBU 2fe7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.290 UTC [policies] Evaluate -> DEBU 2fe8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.290 UTC [cauthdsl] func1 -> DEBU 2fe9 0xc00019d7a0 gate 1563590432290108200 evaluation starts" -"2019-07-20 02:40:32.287 UTC [gossip.gossip] handleMessage -> DEBU 2fdd Exiting" -"2019-07-20 02:40:32.290 UTC [cauthdsl] func2 -> DEBU 2fea 0xc00019d7a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.292 UTC [cauthdsl] func2 -> DEBU 2feb 0xc00019d7a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.293 UTC [cauthdsl] func2 -> DEBU 2fec 0xc00019d7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:32.293 UTC [cauthdsl] func2 -> DEBU 2fed 0xc00019d7a0 principal evaluation fails" -"2019-07-20 02:40:32.293 UTC [cauthdsl] func1 -> DEBU 2fee 0xc00019d7a0 gate 1563590432290108200 evaluation fails" -"2019-07-20 02:40:32.293 UTC [policies] Evaluate -> DEBU 2fef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.294 UTC [policies] Evaluate -> DEBU 2ff0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.294 UTC [policies] Evaluate -> DEBU 2ff1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:32.294 UTC [cauthdsl] func1 -> DEBU 2ff2 0xc00042a050 gate 1563590432294502100 evaluation starts" -"2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff3 0xc00042a050 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff4 0xc00042a050 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff5 0xc00042a050 principal matched by identity 0" -"2019-07-20 02:40:32.295 UTC [msp.identity] Verify -> DEBU 2ff6 Verify: digest = 00000000 40 2b f7 73 71 07 be 3d 8d 3a 01 a9 b4 d9 fe 90 |@+.sq..=.:......| -00000010 6a c1 c7 c4 33 6e df 0b 76 66 29 af 56 ed 7d 4b |j...3n..vf).V.}K|" -"2019-07-20 02:40:32.295 UTC [msp.identity] Verify -> DEBU 2ff7 Verify: sig = 00000000 30 45 02 21 00 fa 09 c8 75 e9 29 5a 14 9b e7 0e |0E.!....u.)Z....| -00000010 f7 c6 4f 84 1c 13 a9 62 61 1b b7 fb 37 3c d6 d3 |..O....ba...7<..| -00000020 69 a4 91 ec 0e 02 20 37 8d c7 64 07 a9 83 4d de |i..... 7..d...M.| -00000030 20 7b 6c 93 82 bc 01 d2 47 d7 f6 50 ad 2c 70 72 | {l.....G..P.,pr| -00000040 73 f1 a6 87 33 15 00 |s...3..|" -"2019-07-20 02:40:32.295 UTC [cauthdsl] func2 -> DEBU 2ff8 0xc00042a050 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.295 UTC [cauthdsl] func1 -> DEBU 2ff9 0xc00042a050 gate 1563590432294502100 evaluation succeeds" -"2019-07-20 02:40:32.296 UTC [policies] Evaluate -> DEBU 2ffa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffc Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ffe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:32.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fff Exiting" -"2019-07-20 02:40:32.299 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3000 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:32.300 UTC [msp.identity] Verify -> DEBU 3001 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| -00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" -"2019-07-20 02:40:32.300 UTC [msp.identity] Verify -> DEBU 3002 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| -00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| -00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| -00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| -00000040 26 61 82 2d 44 90 |&a.-D.|" -"2019-07-20 02:40:32.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 3003 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.303 UTC [gossip.discovery] handleAliveMessage -> DEBU 3004 Exiting" -"2019-07-20 02:40:32.303 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3005 Exiting" -"2019-07-20 02:40:32.333 UTC [gossip.comm] func1 -> DEBU 3006 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.335 UTC [gossip.gossip] handleMessage -> DEBU 3007 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.335 UTC [gossip.pull] HandleMessage -> DEBU 3008 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.335 UTC [gossip.pull] SendDigest -> DEBU 3009 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:32.335 UTC [gossip.gossip] handleMessage -> DEBU 300a Exiting" -"2019-07-20 02:40:32.340 UTC [gossip.comm] func1 -> DEBU 300b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.340 UTC [gossip.gossip] handleMessage -> DEBU 300c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.340 UTC [gossip.gossip] handleMessage -> DEBU 300d Exiting" -"2019-07-20 02:40:32.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 300e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 300f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:32.342 UTC [msp.identity] Verify -> DEBU 3010 Verify: digest = 00000000 3a ad df f3 f8 21 1b 66 29 6b 93 bb b0 c7 a9 21 |:....!.f)k.....!| -00000010 46 2b bb 2d 1d d2 a4 ed fe 33 aa 85 73 15 bf db |F+.-.....3..s...|" -"2019-07-20 02:40:32.342 UTC [msp.identity] Verify -> DEBU 3011 Verify: sig = 00000000 30 44 02 20 2e e6 c6 e9 6a 39 29 84 0d 01 e4 17 |0D. ....j9).....| -00000010 3b cd 3a 85 91 34 dd 08 ce 3a 69 bd 38 8a bc 58 |;.:..4...:i.8..X| -00000020 4c 26 68 2d 02 20 50 b3 06 d9 47 f8 a1 69 f9 fc |L&h-. P...G..i..| -00000030 f0 d3 c4 6f 96 ad 6a 95 06 b1 09 08 7f cb 32 2e |...o..j.......2.| -00000040 03 99 3a 23 cf 54 |..:#.T|" -"2019-07-20 02:40:32.343 UTC [gossip.discovery] handleAliveMessage -> DEBU 3012 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3013 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3014 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3015 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3016 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3017 Exiting" -"2019-07-20 02:40:32.346 UTC [gossip.discovery] handleAliveMessage -> DEBU 3018 Exiting" -"2019-07-20 02:40:32.346 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3019 Exiting" -"2019-07-20 02:40:32.347 UTC [gossip.comm] func1 -> DEBU 301a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.347 UTC [gossip.gossip] handleMessage -> DEBU 301b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.347 UTC [gossip.gossip] handleMessage -> DEBU 301c Exiting" -"2019-07-20 02:40:32.348 UTC [gossip.discovery] handleMsgFromComm -> DEBU 301d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.348 UTC [gossip.discovery] handleMsgFromComm -> DEBU 301e Exiting" -"2019-07-20 02:40:32.348 UTC [msp] DeserializeIdentity -> DEBU 301f Obtaining identity" -"2019-07-20 02:40:32.349 UTC [msp] DeserializeIdentity -> DEBU 3020 Obtaining identity" -"2019-07-20 02:40:32.349 UTC [gossip.comm] Send -> DEBU 3021 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:32.349 UTC [msp] DeserializeIdentity -> DEBU 3022 Obtaining identity" -"2019-07-20 02:40:32.349 UTC [gossip.comm] Send -> DEBU 3023 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3024 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3025 Exiting" -"2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3026 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3027 Exiting" -"2019-07-20 02:40:32.357 UTC [gossip.comm] func1 -> DEBU 3028 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.357 UTC [gossip.gossip] handleMessage -> DEBU 3029 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.358 UTC [gossip.gossip] handleMessage -> DEBU 302a Exiting" -"2019-07-20 02:40:32.358 UTC [gossip.discovery] handleMsgFromComm -> DEBU 302b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.359 UTC [gossip.discovery] handleMsgFromComm -> DEBU 302c Exiting" -"2019-07-20 02:40:32.361 UTC [gossip.comm] func1 -> DEBU 302d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.361 UTC [gossip.gossip] handleMessage -> DEBU 302e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.361 UTC [gossip.gossip] handleMessage -> DEBU 302f Exiting" -"2019-07-20 02:40:32.363 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3030 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.363 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3031 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:32.364 UTC [msp.identity] Verify -> DEBU 3032 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| -00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" -"2019-07-20 02:40:32.364 UTC [msp.identity] Verify -> DEBU 3033 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| -00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| -00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| -00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| -00000040 b4 3a 38 0a 45 dc |.:8.E.|" -"2019-07-20 02:40:32.365 UTC [msp.identity] Verify -> DEBU 3034 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:32.366 UTC [msp.identity] Verify -> DEBU 3035 Verify: sig = 00000000 30 45 02 21 00 d7 b3 77 b9 9c a8 b7 cf 62 94 14 |0E.!...w.....b..| -00000010 1e 48 d0 65 39 ba 66 d5 56 10 15 e8 3a 6c d0 4b |.H.e9.f.V...:l.K| -00000020 5a 40 9d bd 3d 02 20 40 35 bb 23 40 27 a8 c3 2b |Z@..=. @5.#@'..+| -00000030 fa 62 36 d6 d0 83 75 12 06 71 21 86 8a 1b 62 d4 |.b6...u..q!...b.| -00000040 b5 0a 81 7a bb ca 3a |...z..:|" -"2019-07-20 02:40:32.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 3036 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:32.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 3037 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:40:32.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 3038 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303c Exiting" -"2019-07-20 02:40:32.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 303d Exiting" -"2019-07-20 02:40:32.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 303e Exiting" -"2019-07-20 02:40:32.366 UTC [endorser] ProcessProposal -> DEBU 3039 Entering: request from 172.18.0.9:58416" -"2019-07-20 02:40:32.368 UTC [protoutils] ValidateProposalMessage -> DEBU 3040 ValidateProposalMessage starts for signed proposal 0xc000193f40" -"2019-07-20 02:40:32.368 UTC [gossip.discovery] sendMemResponse -> DEBU 303f Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:32.368 UTC [protoutils] validateChannelHeader -> DEBU 3041 validateChannelHeader info: header type 3" -"2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3042 begin" -"2019-07-20 02:40:32.368 UTC [msp] DeserializeIdentity -> DEBU 3043 Obtaining identity" -"2019-07-20 02:40:32.368 UTC [msp] GetManagerForChain -> DEBU 3044 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3045 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3047 creator is valid" -"2019-07-20 02:40:32.369 UTC [msp.identity] Verify -> DEBU 3048 Verify: digest = 00000000 e3 1b 8c 63 39 bc 00 d4 f5 b2 a3 1d 7d d3 0f a3 |...c9.......}...| -00000010 ae 8d fc ba dd af 14 e9 c1 34 c8 93 af 43 1c 75 |.........4...C.u|" -"2019-07-20 02:40:32.369 UTC [msp.identity] Verify -> DEBU 3049 Verify: sig = 00000000 30 45 02 21 00 e7 fa f0 2a cd b9 76 e3 3a bb 6d |0E.!....*..v.:.m| -00000010 c6 32 06 b5 16 3b 03 de 3d aa 28 33 f4 6f 6b da |.2...;..=.(3.ok.| -00000020 b0 76 96 0b f9 02 20 64 6b c9 76 46 8b d4 8e 22 |.v.... dk.vF..."| -00000030 03 f9 c9 24 cc 48 f5 e4 4c 3b 09 09 ad 0b df 46 |...$.H..L;.....F| -00000040 78 fa ad 48 80 25 b3 |x..H.%.|" -"2019-07-20 02:40:32.369 UTC [protoutils] checkSignatureFromCreator -> DEBU 304a exits successfully" -"2019-07-20 02:40:32.369 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304b validateChaincodeProposalMessage starts for proposal 0xc00015fc00, header 0xc0003b4780" -"2019-07-20 02:40:32.369 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304c validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-07-20 02:40:32.368 UTC [msp] DeserializeIdentity -> DEBU 3046 Obtaining identity" -"2019-07-20 02:40:32.370 UTC [endorser] preProcess -> DEBU 304d [businesschannel][334c0366] processing txid: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed" -"2019-07-20 02:40:32.370 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 304f retrieveTransactionByID() - txId = [334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed]" -"2019-07-20 02:40:32.370 UTC [endorser] SimulateProposal -> DEBU 3050 [businesschannel][334c0366] Entry chaincode: name:"cscc" " -"2019-07-20 02:40:32.370 UTC [endorser] callChaincode -> INFO 3051 [businesschannel][334c0366] Entry chaincode: name:"cscc" " -"2019-07-20 02:40:32.370 UTC [chaincode] Execute -> DEBU 3052 Entry" -"2019-07-20 02:40:32.370 UTC [gossip.comm] Send -> DEBU 304e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:32.371 UTC [cscc] Invoke -> DEBU 3053 Invoke function: GetConfigBlock" -"2019-07-20 02:40:32.371 UTC [aclmgmt] CheckACL -> DEBU 3054 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" -"2019-07-20 02:40:32.371 UTC [aclmgmt] CheckACL -> DEBU 3055 acl check(/Channel/Application/Readers)" -"2019-07-20 02:40:32.371 UTC [gossip.discovery] sendMemResponse -> DEBU 3056 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " -"2019-07-20 02:40:32.371 UTC [policies] Evaluate -> DEBU 3057 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.372 UTC [policies] Evaluate -> DEBU 3059 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.372 UTC [policies] Evaluate -> DEBU 305a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.372 UTC [cauthdsl] func1 -> DEBU 305b 0xc00027f080 gate 1563590432372481400 evaluation starts" -"2019-07-20 02:40:32.372 UTC [cauthdsl] func2 -> DEBU 305c 0xc00027f080 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.373 UTC [cauthdsl] func2 -> DEBU 305d 0xc00027f080 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.371 UTC [gossip.comm] sendToEndpoint -> DEBU 3058 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.373 UTC [cauthdsl] func2 -> DEBU 305e 0xc00027f080 principal matched by identity 0" -"2019-07-20 02:40:32.373 UTC [msp.identity] Verify -> DEBU 3060 Verify: digest = 00000000 e3 1b 8c 63 39 bc 00 d4 f5 b2 a3 1d 7d d3 0f a3 |...c9.......}...| -00000010 ae 8d fc ba dd af 14 e9 c1 34 c8 93 af 43 1c 75 |.........4...C.u|" -"2019-07-20 02:40:32.373 UTC [msp.identity] Verify -> DEBU 3061 Verify: sig = 00000000 30 45 02 21 00 e7 fa f0 2a cd b9 76 e3 3a bb 6d |0E.!....*..v.:.m| -00000010 c6 32 06 b5 16 3b 03 de 3d aa 28 33 f4 6f 6b da |.2...;..=.(3.ok.| -00000020 b0 76 96 0b f9 02 20 64 6b c9 76 46 8b d4 8e 22 |.v.... dk.vF..."| -00000030 03 f9 c9 24 cc 48 f5 e4 4c 3b 09 09 ad 0b df 46 |...$.H..L;.....F| -00000040 78 fa ad 48 80 25 b3 |x..H.%.|" -"2019-07-20 02:40:32.374 UTC [cauthdsl] func2 -> DEBU 3062 0xc00027f080 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.374 UTC [cauthdsl] func1 -> DEBU 3063 0xc00027f080 gate 1563590432372481400 evaluation succeeds" -"2019-07-20 02:40:32.373 UTC [gossip.comm] sendToEndpoint -> DEBU 305f Exiting" -"2019-07-20 02:40:32.374 UTC [policies] Evaluate -> DEBU 3064 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3065 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3066 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3067 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.375 UTC [chaincode] handleMessage -> DEBU 3068 [334c0366] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:32.376 UTC [chaincode] Notify -> DEBU 3069 [334c0366] notifying Txid:334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, channelID:businesschannel" -"2019-07-20 02:40:32.376 UTC [chaincode] Execute -> DEBU 306a Exit" -"2019-07-20 02:40:32.376 UTC [endorser] callChaincode -> INFO 306b [businesschannel][334c0366] Exit chaincode: name:"cscc" (6ms)" -"2019-07-20 02:40:32.376 UTC [endorser] SimulateProposal -> DEBU 306c [businesschannel][334c0366] Exit" -"2019-07-20 02:40:32.377 UTC [endorser] endorseProposal -> DEBU 306d [businesschannel][334c0366] Entry chaincode: name:"cscc" " -"2019-07-20 02:40:32.377 UTC [endorser] endorseProposal -> DEBU 306e [businesschannel][334c0366] escc for chaincode name:"cscc" is escc" -"2019-07-20 02:40:32.377 UTC [endorser] EndorseWithPlugin -> DEBU 306f Entering endorsement for {plugin: escc, channel: businesschannel, tx: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, chaincode: cscc}" -"2019-07-20 02:40:32.377 UTC [msp.identity] Sign -> DEBU 3070 Sign: plaintext: 0A20C5D1BC40D3FB83F8358FF9F638BD...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:32.377 UTC [msp.identity] Sign -> DEBU 3071 Sign: digest: 0D1E7E24711E974B88D241D66A8434CBF47F1068E52FEF7D15CD5BA472B2DBFF " -"2019-07-20 02:40:32.378 UTC [endorser] EndorseWithPlugin -> DEBU 3072 Exiting {plugin: escc, channel: businesschannel, tx: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, chaincode: cscc}" -"2019-07-20 02:40:32.378 UTC [endorser] endorseProposal -> DEBU 3073 [businesschannel][334c0366] Exit" -"2019-07-20 02:40:32.378 UTC [endorser] func1 -> DEBU 3074 Exit: request from 172.18.0.9:58416" -"2019-07-20 02:40:32.378 UTC [comm.grpc.server] 1 -> INFO 3075 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58416 grpc.code=OK grpc.call_duration=12.304ms -"2019-07-20 02:40:32.386 UTC [grpc] infof -> DEBU 3076 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:32.387 UTC [grpc] infof -> DEBU 3077 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:32.522 UTC [gossip.comm] func1 -> DEBU 3078 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.523 UTC [gossip.gossip] handleMessage -> DEBU 3079 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.523 UTC [gossip.pull] HandleMessage -> DEBU 307a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307b Obtaining identity" -"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307c Obtaining identity" -"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307d Obtaining identity" -"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307e Obtaining identity" -"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307f Obtaining identity" -"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 3080 Obtaining identity" -"2019-07-20 02:40:32.523 UTC [gossip.pull] SendDigest -> DEBU 3081 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:32.523 UTC [gossip.gossip] handleMessage -> DEBU 3082 Exiting" -"2019-07-20 02:40:32.526 UTC [gossip.comm] func1 -> DEBU 3083 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.527 UTC [gossip.gossip] handleMessage -> DEBU 3084 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.527 UTC [gossip.gossip] handleMessage -> DEBU 3085 Exiting" -"2019-07-20 02:40:32.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3086 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.527 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3087 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:32.527 UTC [msp] DeserializeIdentity -> DEBU 3088 Obtaining identity" -"2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3089 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 308a Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 308b Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 308f 0xc0005866d0 gate 1563590432528178000 evaluation starts" -"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3090 0xc0005866d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3091 0xc0005866d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3092 0xc0005866d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3093 0xc0005866d0 principal evaluation fails" -"2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 3094 0xc0005866d0 gate 1563590432528178000 evaluation fails" -"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3095 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3096 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3097 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 3098 0xc000586f10 gate 1563590432528554400 evaluation starts" -"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3099 0xc000586f10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 309a 0xc000586f10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 309b 0xc000586f10 principal matched by identity 0" -"2019-07-20 02:40:32.528 UTC [msp.identity] Verify -> DEBU 309c Verify: digest = 00000000 75 6b 5a 52 d7 9b 9c d1 44 a1 76 b9 44 34 63 21 |ukZR....D.v.D4c!| -00000010 86 cb 91 26 5b 43 76 58 40 1e 88 3d 21 f8 e0 dd |...&[CvX@..=!...|" -"2019-07-20 02:40:32.528 UTC [msp.identity] Verify -> DEBU 309d Verify: sig = 00000000 30 44 02 20 79 1d 35 71 ba 2e 6f 5e 9c a6 04 a9 |0D. y.5q..o^....| -00000010 22 a8 43 04 e4 cf 7d bd 7a 24 a9 62 17 04 48 f9 |".C...}.z$.b..H.| -00000020 df 3a a5 c2 02 20 4e a2 d3 80 b7 b7 43 df db 5d |.:... N.....C..]| -00000030 7c 93 b9 73 1c e2 93 90 04 1c d9 f3 a7 9c 62 a3 ||..s..........b.| -00000040 ad fe ce c4 0b 32 |.....2|" -"2019-07-20 02:40:32.529 UTC [cauthdsl] func2 -> DEBU 309e 0xc000586f10 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.529 UTC [cauthdsl] func1 -> DEBU 309f 0xc000586f10 gate 1563590432528554400 evaluation succeeds" -"2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a2 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 30a4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a6 updating membership: timestamp: " -"2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a7 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a9 Exiting" -"2019-07-20 02:40:32.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 30aa Exiting" -"2019-07-20 02:40:32.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ab Exiting" -"2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ac Obtaining identity" -"2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ad Obtaining identity" -"2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ae Obtaining identity" -"2019-07-20 02:40:32.538 UTC [gossip.comm] func1 -> DEBU 30af Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b1 Exiting" -"2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b3 Exiting" -"2019-07-20 02:40:32.542 UTC [gossip.comm] func1 -> DEBU 30b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b6 Exiting" -"2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b8 Exiting" -"2019-07-20 02:40:32.543 UTC [gossip.comm] func1 -> DEBU 30b9 Got message: GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.543 UTC [gossip.gossip] handleMessage -> DEBU 30ba Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.543 UTC [gossip.gossip] handleMessage -> DEBU 30bb Exiting" -"2019-07-20 02:40:32.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30bc Got message: GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.543 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30bd Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:32.544 UTC [msp] DeserializeIdentity -> DEBU 30be Obtaining identity" -"2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 30bf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30c0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30c1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.546 UTC [cauthdsl] func1 -> DEBU 30c5 0xc0006bb3e0 gate 1563590432546561200 evaluation starts" -"2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c6 0xc0006bb3e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c7 0xc0006bb3e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c8 0xc0006bb3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30c9 0xc0006bb3e0 principal evaluation fails" -"2019-07-20 02:40:32.547 UTC [cauthdsl] func1 -> DEBU 30ca 0xc0006bb3e0 gate 1563590432546561200 evaluation fails" -"2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:32.547 UTC [cauthdsl] func1 -> DEBU 30ce 0xc0006bbc60 gate 1563590432547577600 evaluation starts" -"2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30cf 0xc0006bbc60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30d0 0xc0006bbc60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.548 UTC [cauthdsl] func2 -> DEBU 30d1 0xc0006bbc60 principal matched by identity 0" -"2019-07-20 02:40:32.548 UTC [msp.identity] Verify -> DEBU 30d2 Verify: digest = 00000000 d2 d4 95 34 c5 7c dd ee c2 94 69 b1 d1 26 4c d7 |...4.|....i..&L.| -00000010 40 ff ea 97 8d 6f 55 a3 e4 ff 62 0d 3e 07 5e ef |@....oU...b.>.^.|" -"2019-07-20 02:40:32.548 UTC [msp.identity] Verify -> DEBU 30d3 Verify: sig = 00000000 30 45 02 21 00 f3 38 c9 26 96 2b 11 5d 0b 81 e2 |0E.!..8.&.+.]...| -00000010 04 af 5e 83 86 28 b7 3e 16 29 cd 2e 39 ff 8a c0 |..^..(.>.)..9...| -00000020 22 4b 64 33 65 02 20 46 9d 23 cf 2f 09 f4 e8 9f |"Kd3e. F.#./....| -00000030 51 37 80 5d 43 19 94 67 36 d7 f3 1a 4d 7d cf a7 |Q7.]C..g6...M}..| -00000040 a7 1d 12 7a d0 f4 9a |...z...|" -"2019-07-20 02:40:32.549 UTC [cauthdsl] func2 -> DEBU 30d4 0xc0006bbc60 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.549 UTC [cauthdsl] func1 -> DEBU 30d5 0xc0006bbc60 gate 1563590432547577600 evaluation succeeds" -"2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.554 UTC [msp] DeserializeIdentity -> DEBU 30d8 Obtaining identity" -"2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d9 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.555 UTC [policies] Evaluate -> DEBU 30db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.555 UTC [gossip.discovery] handleAliveMessage -> DEBU 30dc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:32.555 UTC [msp] DeserializeIdentity -> DEBU 30da Obtaining identity" -"2019-07-20 02:40:32.556 UTC [msp] DeserializeIdentity -> DEBU 30dd Obtaining identity" -"2019-07-20 02:40:32.557 UTC [gossip.comm] Send -> DEBU 30de Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:32.558 UTC [msp] DeserializeIdentity -> DEBU 30df Obtaining identity" -"2019-07-20 02:40:32.558 UTC [msp] DeserializeIdentity -> DEBU 30e0 Obtaining identity" -"2019-07-20 02:40:32.558 UTC [gossip.comm] Send -> DEBU 30e1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:32.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e4 updating membership: timestamp: " -"2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e7 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e5 Exiting" -"2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:32.562 UTC [gossip.comm] sendToEndpoint -> DEBU 30ea Exiting" -"2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e9 Exiting" -"2019-07-20 02:40:32.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 30eb Exiting" -"2019-07-20 02:40:32.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ec Exiting" -"2019-07-20 02:40:32.564 UTC [gossip.discovery] sendMemResponse -> DEBU 30ed Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:32.564 UTC [msp] DeserializeIdentity -> DEBU 30ee Obtaining identity" -"2019-07-20 02:40:32.566 UTC [msp] DeserializeIdentity -> DEBU 30ef Obtaining identity" -"2019-07-20 02:40:32.567 UTC [msp] DeserializeIdentity -> DEBU 30f0 Obtaining identity" -"2019-07-20 02:40:32.567 UTC [gossip.comm] Send -> DEBU 30f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:32.568 UTC [gossip.discovery] sendMemResponse -> DEBU 30f2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" > alive:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > alive:\304:w\006I\255\0065\032K\207\036" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " -"2019-07-20 02:40:32.568 UTC [gossip.comm] sendToEndpoint -> DEBU 30f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.568 UTC [gossip.comm] sendToEndpoint -> DEBU 30f4 Exiting" -"2019-07-20 02:40:32.682 UTC [msp] DeserializeIdentity -> DEBU 30f5 Obtaining identity" -"2019-07-20 02:40:32.682 UTC [msp] DeserializeIdentity -> DEBU 30f6 Obtaining identity" -"2019-07-20 02:40:32.683 UTC [gossip.comm] Send -> DEBU 30f7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30f8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30f9 Exiting" -"2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fc Exiting" -"2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.685 UTC [gossip.comm] sendToEndpoint -> DEBU 30fd Exiting" -"2019-07-20 02:40:32.685 UTC [gossip.comm] func1 -> DEBU 30fe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.685 UTC [gossip.gossip] handleMessage -> DEBU 30ff Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.686 UTC [msp] DeserializeIdentity -> DEBU 3100 Obtaining identity" -"2019-07-20 02:40:32.686 UTC [gossip.comm] func1 -> DEBU 3101 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.688 UTC [gossip.comm] func1 -> DEBU 3102 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.693 UTC [msp] DeserializeIdentity -> DEBU 3103 Obtaining identity" -"2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3104 Obtaining identity" -"2019-07-20 02:40:32.694 UTC [gossip.comm] Send -> DEBU 3105 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" -"2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3106 Obtaining identity" -"2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3107 Obtaining identity" -"2019-07-20 02:40:32.694 UTC [gossip.comm] sendToEndpoint -> DEBU 3108 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:32.694 UTC [gossip.comm] sendToEndpoint -> DEBU 3109 Exiting" -"2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310b Exiting" -"2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310d Exiting" -"2019-07-20 02:40:32.696 UTC [msp.identity] Verify -> DEBU 310e Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| -00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" -"2019-07-20 02:40:32.696 UTC [msp.identity] Verify -> DEBU 310f Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| -00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| -00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| -00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| -00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" -"2019-07-20 02:40:32.697 UTC [msp.identity] Verify -> DEBU 3110 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 3111 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -"2019-07-20 02:40:32.704 UTC [msp] DeserializeIdentity -> DEBU 3112 Obtaining identity" -"2019-07-20 02:40:32.708 UTC [msp] DeserializeIdentity -> DEBU 3113 Obtaining identity" -"2019-07-20 02:40:32.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3114 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:32.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3115 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3116 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.712 UTC [policies] Evaluate -> DEBU 3117 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.712 UTC [policies] Evaluate -> DEBU 3118 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.713 UTC [policies] Evaluate -> DEBU 3119 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.713 UTC [cauthdsl] func1 -> DEBU 311a 0xc0007d57f0 gate 1563590432713529700 evaluation starts" -"2019-07-20 02:40:32.713 UTC [cauthdsl] func2 -> DEBU 311b 0xc0007d57f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311c 0xc0007d57f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311d 0xc0007d57f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311e 0xc0007d57f0 principal evaluation fails" -"2019-07-20 02:40:32.714 UTC [cauthdsl] func1 -> DEBU 311f 0xc0007d57f0 gate 1563590432713529700 evaluation fails" -"2019-07-20 02:40:32.714 UTC [policies] Evaluate -> DEBU 3120 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.715 UTC [policies] Evaluate -> DEBU 3121 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.715 UTC [policies] Evaluate -> DEBU 3122 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:32.715 UTC [cauthdsl] func1 -> DEBU 3123 0xc00289c050 gate 1563590432715391700 evaluation starts" -"2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3124 0xc00289c050 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3125 0xc00289c050 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3126 0xc00289c050 principal matched by identity 0" -"2019-07-20 02:40:32.716 UTC [msp.identity] Verify -> DEBU 3127 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| -00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" -"2019-07-20 02:40:32.716 UTC [msp.identity] Verify -> DEBU 3128 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| -00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 3129 0xc00289c050 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.716 UTC [cauthdsl] func1 -> DEBU 312a 0xc00289c050 gate 1563590432715391700 evaluation succeeds" -"2019-07-20 02:40:32.716 UTC [policies] Evaluate -> DEBU 312b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.717 UTC [msp] DeserializeIdentity -> DEBU 312f Obtaining identity" -"2019-07-20 02:40:32.717 UTC [msp] DeserializeIdentity -> DEBU 3130 Obtaining identity" -"2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3131 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3132 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3133 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.718 UTC [policies] Evaluate -> DEBU 3134 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.718 UTC [policies] Evaluate -> DEBU 3135 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.719 UTC [policies] Evaluate -> DEBU 3136 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.719 UTC [cauthdsl] func1 -> DEBU 3137 0xc00289d970 gate 1563590432719715300 evaluation starts" -"2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 3138 0xc00289d970 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 3139 0xc00289d970 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 313a 0xc00289d970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 313b 0xc00289d970 principal evaluation fails" -"2019-07-20 02:40:32.721 UTC [cauthdsl] func1 -> DEBU 313c 0xc00289d970 gate 1563590432719715300 evaluation fails" -"2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:32.722 UTC [cauthdsl] func1 -> DEBU 3140 0xc002932230 gate 1563590432722409700 evaluation starts" -"2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3141 0xc002932230 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3142 0xc002932230 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3143 0xc002932230 principal matched by identity 0" -"2019-07-20 02:40:32.722 UTC [msp.identity] Verify -> DEBU 3144 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:32.723 UTC [msp.identity] Verify -> DEBU 3145 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:32.723 UTC [cauthdsl] func2 -> DEBU 3146 0xc002932230 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.723 UTC [cauthdsl] func1 -> DEBU 3147 0xc002932230 gate 1563590432722409700 evaluation succeeds" -"2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 3148 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 3149 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 314a Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 314b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.724 UTC [msp] DeserializeIdentity -> DEBU 314c Obtaining identity" -"2019-07-20 02:40:32.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 314d Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 314e Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 314f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 3150 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 3151 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.725 UTC [cauthdsl] func1 -> DEBU 3152 0xc002933360 gate 1563590432725069500 evaluation starts" -"2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3153 0xc002933360 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3154 0xc002933360 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3155 0xc002933360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3156 0xc002933360 principal evaluation fails" -"2019-07-20 02:40:32.725 UTC [cauthdsl] func1 -> DEBU 3157 0xc002933360 gate 1563590432725069500 evaluation fails" -"2019-07-20 02:40:32.725 UTC [policies] Evaluate -> DEBU 3158 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.725 UTC [policies] Evaluate -> DEBU 3159 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.726 UTC [policies] Evaluate -> DEBU 315a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:32.727 UTC [cauthdsl] func1 -> DEBU 315b 0xc002933ba0 gate 1563590432727412100 evaluation starts" -"2019-07-20 02:40:32.728 UTC [cauthdsl] func2 -> DEBU 315c 0xc002933ba0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.728 UTC [cauthdsl] func2 -> DEBU 315d 0xc002933ba0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.729 UTC [cauthdsl] func2 -> DEBU 315e 0xc002933ba0 principal matched by identity 0" -"2019-07-20 02:40:32.729 UTC [msp.identity] Verify -> DEBU 315f Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:32.729 UTC [msp.identity] Verify -> DEBU 3160 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:32.729 UTC [cauthdsl] func2 -> DEBU 3161 0xc002933ba0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.729 UTC [cauthdsl] func1 -> DEBU 3162 0xc002933ba0 gate 1563590432727412100 evaluation succeeds" -"2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3163 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3164 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3165 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3166 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.730 UTC [gossip.gossip] handleMessage -> DEBU 3167 Exiting" -"2019-07-20 02:40:32.730 UTC [gossip.gossip] handleMessage -> DEBU 3168 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.730 UTC [msp] DeserializeIdentity -> DEBU 3169 Obtaining identity" -"2019-07-20 02:40:32.731 UTC [msp.identity] Verify -> DEBU 316a Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| -00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" -"2019-07-20 02:40:32.731 UTC [msp.identity] Verify -> DEBU 316b Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| -00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| -00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| -00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| -00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" -"2019-07-20 02:40:32.732 UTC [msp.identity] Verify -> DEBU 316c Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| -00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 316d Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| -00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| -00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| -00000040 5c da 1b 5d 51 48 4f |\..]QHO|" -"2019-07-20 02:40:32.733 UTC [msp] DeserializeIdentity -> DEBU 316e Obtaining identity" -"2019-07-20 02:40:32.733 UTC [msp] DeserializeIdentity -> DEBU 316f Obtaining identity" -"2019-07-20 02:40:32.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3170 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:32.734 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3171 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.734 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3172 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3173 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3174 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3175 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.734 UTC [cauthdsl] func1 -> DEBU 3176 0xc0029d46a0 gate 1563590432734680100 evaluation starts" -"2019-07-20 02:40:32.734 UTC [cauthdsl] func2 -> DEBU 3177 0xc0029d46a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.734 UTC [cauthdsl] func2 -> DEBU 3178 0xc0029d46a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.737 UTC [msp] DeserializeIdentity -> DEBU 3179 Obtaining identity" -"2019-07-20 02:40:32.741 UTC [msp] DeserializeIdentity -> DEBU 317a Obtaining identity" -"2019-07-20 02:40:32.741 UTC [gossip.pull] Hello -> DEBU 317b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:32.741 UTC [msp] DeserializeIdentity -> DEBU 317c Obtaining identity" -"2019-07-20 02:40:32.742 UTC [msp] DeserializeIdentity -> DEBU 317d Obtaining identity" -"2019-07-20 02:40:32.743 UTC [gossip.comm] Send -> DEBU 317e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:32.744 UTC [gossip.comm] sendToEndpoint -> DEBU 317f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3180 Exiting" -"2019-07-20 02:40:32.740 UTC [cauthdsl] func2 -> DEBU 3181 0xc0029d46a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:32.747 UTC [cauthdsl] func2 -> DEBU 3182 0xc0029d46a0 principal evaluation fails" -"2019-07-20 02:40:32.749 UTC [cauthdsl] func1 -> DEBU 3183 0xc0029d46a0 gate 1563590432734680100 evaluation fails" -"2019-07-20 02:40:32.749 UTC [policies] Evaluate -> DEBU 3185 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.749 UTC [gossip.comm] func1 -> DEBU 3184 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.751 UTC [policies] Evaluate -> DEBU 3186 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.752 UTC [policies] Evaluate -> DEBU 3187 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:32.752 UTC [cauthdsl] func1 -> DEBU 3188 0xc0029d4ee0 gate 1563590432752494900 evaluation starts" -"2019-07-20 02:40:32.752 UTC [cauthdsl] func2 -> DEBU 3189 0xc0029d4ee0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.752 UTC [cauthdsl] func2 -> DEBU 318a 0xc0029d4ee0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.753 UTC [cauthdsl] func2 -> DEBU 318b 0xc0029d4ee0 principal matched by identity 0" -"2019-07-20 02:40:32.753 UTC [msp.identity] Verify -> DEBU 318c Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -"2019-07-20 02:40:32.753 UTC [msp.identity] Verify -> DEBU 318d Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -00000040 86 55 07 8f d3 65 |.U...e|" -"2019-07-20 02:40:32.754 UTC [cauthdsl] func2 -> DEBU 318e 0xc0029d4ee0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.755 UTC [cauthdsl] func1 -> DEBU 318f 0xc0029d4ee0 gate 1563590432752494900 evaluation succeeds" -"2019-07-20 02:40:32.755 UTC [policies] Evaluate -> DEBU 3190 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.756 UTC [policies] Evaluate -> DEBU 3191 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.757 UTC [policies] Evaluate -> DEBU 3192 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.757 UTC [policies] Evaluate -> DEBU 3193 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.757 UTC [msp] DeserializeIdentity -> DEBU 3194 Obtaining identity" -"2019-07-20 02:40:32.757 UTC [msp] DeserializeIdentity -> DEBU 3195 Obtaining identity" -"2019-07-20 02:40:32.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3196 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:32.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3197 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3198 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.766 UTC [policies] Evaluate -> DEBU 3199 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.767 UTC [policies] Evaluate -> DEBU 319a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.768 UTC [policies] Evaluate -> DEBU 319b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.769 UTC [cauthdsl] func1 -> DEBU 319c 0xc002a626c0 gate 1563590432769533600 evaluation starts" -"2019-07-20 02:40:32.769 UTC [cauthdsl] func2 -> DEBU 319d 0xc002a626c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.770 UTC [cauthdsl] func2 -> DEBU 319e 0xc002a626c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.770 UTC [cauthdsl] func2 -> DEBU 319f 0xc002a626c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:32.771 UTC [cauthdsl] func2 -> DEBU 31a0 0xc002a626c0 principal evaluation fails" -"2019-07-20 02:40:32.771 UTC [cauthdsl] func1 -> DEBU 31a1 0xc002a626c0 gate 1563590432769533600 evaluation fails" -"2019-07-20 02:40:32.771 UTC [policies] Evaluate -> DEBU 31a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.772 UTC [policies] Evaluate -> DEBU 31a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.773 UTC [policies] Evaluate -> DEBU 31a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:32.773 UTC [cauthdsl] func1 -> DEBU 31a5 0xc002a63010 gate 1563590432773220600 evaluation starts" -"2019-07-20 02:40:32.773 UTC [cauthdsl] func2 -> DEBU 31a6 0xc002a63010 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.774 UTC [cauthdsl] func2 -> DEBU 31a7 0xc002a63010 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.775 UTC [cauthdsl] func2 -> DEBU 31a8 0xc002a63010 principal matched by identity 0" -"2019-07-20 02:40:32.775 UTC [msp.identity] Verify -> DEBU 31a9 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:32.775 UTC [msp.identity] Verify -> DEBU 31aa Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:32.776 UTC [cauthdsl] func2 -> DEBU 31ab 0xc002a63010 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.776 UTC [cauthdsl] func1 -> DEBU 31ac 0xc002a63010 gate 1563590432773220600 evaluation succeeds" -"2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31af Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.779 UTC [policies] Evaluate -> DEBU 31b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.780 UTC [msp] DeserializeIdentity -> DEBU 31b1 Obtaining identity" -"2019-07-20 02:40:32.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31b2 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31b3 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31b7 0xc002a920f0 gate 1563590432789206000 evaluation starts" -"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31b8 0xc002a920f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31b9 0xc002a920f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31ba 0xc002a920f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31bb 0xc002a920f0 principal evaluation fails" -"2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31bc 0xc002a920f0 gate 1563590432789206000 evaluation fails" -"2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31bd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31c0 0xc002a92930 gate 1563590432789572500 evaluation starts" -"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c1 0xc002a92930 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c2 0xc002a92930 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c3 0xc002a92930 principal matched by identity 0" -"2019-07-20 02:40:32.812 UTC [msp.identity] Verify -> DEBU 31c4 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:32.812 UTC [msp.identity] Verify -> DEBU 31c5 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:32.812 UTC [cauthdsl] func2 -> DEBU 31c6 0xc002a92930 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.812 UTC [cauthdsl] func1 -> DEBU 31c7 0xc002a92930 gate 1563590432789572500 evaluation succeeds" -"2019-07-20 02:40:32.812 UTC [policies] Evaluate -> DEBU 31c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.812 UTC [policies] Evaluate -> DEBU 31c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.815 UTC [policies] Evaluate -> DEBU 31ca Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.815 UTC [policies] Evaluate -> DEBU 31cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.816 UTC [gossip.gossip] handleMessage -> DEBU 31cc Exiting" -"2019-07-20 02:40:32.816 UTC [gossip.gossip] handleMessage -> DEBU 31cd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.818 UTC [msp.identity] Verify -> DEBU 31ce Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| -00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" -"2019-07-20 02:40:32.818 UTC [msp.identity] Verify -> DEBU 31cf Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| -00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| -00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| -00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| -00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" -"2019-07-20 02:40:32.820 UTC [msp] DeserializeIdentity -> DEBU 31d0 Obtaining identity" -"2019-07-20 02:40:32.820 UTC [msp] DeserializeIdentity -> DEBU 31d1 Obtaining identity" -"2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.822 UTC [policies] Evaluate -> DEBU 31d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.822 UTC [policies] Evaluate -> DEBU 31d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.823 UTC [policies] Evaluate -> DEBU 31d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.824 UTC [cauthdsl] func1 -> DEBU 31d8 0xc002aa0b10 gate 1563590432824014900 evaluation starts" -"2019-07-20 02:40:32.826 UTC [cauthdsl] func2 -> DEBU 31d9 0xc002aa0b10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.826 UTC [cauthdsl] func2 -> DEBU 31da 0xc002aa0b10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.827 UTC [cauthdsl] func2 -> DEBU 31db 0xc002aa0b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:32.827 UTC [cauthdsl] func2 -> DEBU 31dc 0xc002aa0b10 principal evaluation fails" -"2019-07-20 02:40:32.827 UTC [cauthdsl] func1 -> DEBU 31dd 0xc002aa0b10 gate 1563590432824014900 evaluation fails" -"2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:32.829 UTC [cauthdsl] func1 -> DEBU 31e1 0xc002aa1350 gate 1563590432829076500 evaluation starts" -"2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e2 0xc002aa1350 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e3 0xc002aa1350 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e4 0xc002aa1350 principal matched by identity 0" -"2019-07-20 02:40:32.830 UTC [msp.identity] Verify -> DEBU 31e5 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| -00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" -"2019-07-20 02:40:32.830 UTC [msp.identity] Verify -> DEBU 31e6 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| -00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 31e7 0xc002aa1350 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.832 UTC [cauthdsl] func1 -> DEBU 31e8 0xc002aa1350 gate 1563590432829076500 evaluation succeeds" -"2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31eb Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.836 UTC [msp] DeserializeIdentity -> DEBU 31ed Obtaining identity" -"2019-07-20 02:40:32.837 UTC [msp] DeserializeIdentity -> DEBU 31ee Obtaining identity" -"2019-07-20 02:40:32.837 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:32.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.838 UTC [cauthdsl] func1 -> DEBU 31f5 0xc002ed0b50 gate 1563590432838821700 evaluation starts" -"2019-07-20 02:40:32.839 UTC [cauthdsl] func2 -> DEBU 31f6 0xc002ed0b50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.839 UTC [cauthdsl] func2 -> DEBU 31f7 0xc002ed0b50 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.840 UTC [cauthdsl] func2 -> DEBU 31f8 0xc002ed0b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:32.840 UTC [cauthdsl] func2 -> DEBU 31f9 0xc002ed0b50 principal evaluation fails" -"2019-07-20 02:40:32.840 UTC [cauthdsl] func1 -> DEBU 31fa 0xc002ed0b50 gate 1563590432838821700 evaluation fails" -"2019-07-20 02:40:32.841 UTC [policies] Evaluate -> DEBU 31fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.841 UTC [policies] Evaluate -> DEBU 31fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.861 UTC [policies] Evaluate -> DEBU 31fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:32.861 UTC [cauthdsl] func1 -> DEBU 31ff 0xc002ed1390 gate 1563590432861553500 evaluation starts" -"2019-07-20 02:40:32.862 UTC [cauthdsl] func2 -> DEBU 3200 0xc002ed1390 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.865 UTC [cauthdsl] func2 -> DEBU 3201 0xc002ed1390 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.850 UTC [gossip.comm] func1 -> DEBU 31fd Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.865 UTC [cauthdsl] func2 -> DEBU 3202 0xc002ed1390 principal matched by identity 0" -"2019-07-20 02:40:32.868 UTC [msp.identity] Verify -> DEBU 3203 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| -00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" -"2019-07-20 02:40:32.868 UTC [msp.identity] Verify -> DEBU 3204 Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| -00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| -00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| -00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| -00000040 86 55 07 8f d3 65 |.U...e|" -"2019-07-20 02:40:32.869 UTC [cauthdsl] func2 -> DEBU 3205 0xc002ed1390 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.869 UTC [cauthdsl] func1 -> DEBU 3206 0xc002ed1390 gate 1563590432861553500 evaluation succeeds" -"2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3207 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3208 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3209 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 320a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.873 UTC [msp.identity] Verify -> DEBU 320b Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:32.879 UTC [msp.identity] Verify -> DEBU 320c Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:32.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320d Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320e Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 320f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 3210 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 3211 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:32.880 UTC [cauthdsl] func1 -> DEBU 3212 0xc002f5cb10 gate 1563590432880334600 evaluation starts" -"2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3213 0xc002f5cb10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3214 0xc002f5cb10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3215 0xc002f5cb10 principal matched by identity 0" -"2019-07-20 02:40:32.880 UTC [msp.identity] Verify -> DEBU 3216 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:32.880 UTC [msp.identity] Verify -> DEBU 3217 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3218 0xc002f5cb10 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:32.880 UTC [cauthdsl] func1 -> DEBU 3219 0xc002f5cb10 gate 1563590432880334600 evaluation succeeds" -"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:32.880 UTC [gossip.gossip] handleMessage -> DEBU 321e Exiting" -"2019-07-20 02:40:32.881 UTC [gossip.gossip] handleMessage -> DEBU 321f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.883 UTC [gossip.comm] func1 -> DEBU 3220 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:32.884 UTC [gossip.comm] func1 -> DEBU 3221 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.886 UTC [gossip.pull] HandleMessage -> DEBU 3222 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.886 UTC [gossip.gossip] handleMessage -> DEBU 3223 Exiting" -"2019-07-20 02:40:32.886 UTC [gossip.gossip] handleMessage -> DEBU 3224 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.886 UTC [msp] DeserializeIdentity -> DEBU 3225 Obtaining identity" -"2019-07-20 02:40:32.891 UTC [gossip.comm] func1 -> DEBU 3226 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:32.891 UTC [msp] DeserializeIdentity -> DEBU 3227 Obtaining identity" -"2019-07-20 02:40:32.891 UTC [gossip.comm] func1 -> DEBU 3228 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:32.892 UTC [gossip.gossip] handleMessage -> DEBU 3229 Exiting" -"2019-07-20 02:40:32.906 UTC [gossip.gossip] handleMessage -> DEBU 322a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:32.906 UTC [msp.identity] Verify -> DEBU 322b Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:32.908 UTC [msp.identity] Verify -> DEBU 322c Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:32.917 UTC [gossip.gossip] handleMessage -> DEBU 322d Exiting" -"2019-07-20 02:40:32.917 UTC [gossip.gossip] handleMessage -> DEBU 322e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.918 UTC [gossip.pull] HandleMessage -> DEBU 322f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:32.918 UTC [gossip.pull] SendDigest -> DEBU 3230 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3231 Exiting" -"2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3232 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:32.930 UTC [msp.identity] Verify -> DEBU 3233 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:32.930 UTC [msp.identity] Verify -> DEBU 3234 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:32.930 UTC [msp] DeserializeIdentity -> DEBU 3235 Obtaining identity" -"2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3236 Exiting" -"2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3237 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:32.931 UTC [msp.identity] Verify -> DEBU 3238 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:32.931 UTC [msp.identity] Verify -> DEBU 3239 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:32.931 UTC [msp] DeserializeIdentity -> DEBU 323a Obtaining identity" -"2019-07-20 02:40:32.931 UTC [gossip.gossip] handleMessage -> DEBU 323b Exiting" -"2019-07-20 02:40:32.997 UTC [endorser] ProcessProposal -> DEBU 323c Entering: request from 172.18.0.9:58420" -"2019-07-20 02:40:32.997 UTC [protoutils] ValidateProposalMessage -> DEBU 323d ValidateProposalMessage starts for signed proposal 0xc00080e5f0" -"2019-07-20 02:40:32.997 UTC [protoutils] validateChannelHeader -> DEBU 323e validateChannelHeader info: header type 3" -"2019-07-20 02:40:32.997 UTC [protoutils] checkSignatureFromCreator -> DEBU 323f begin" -"2019-07-20 02:40:32.998 UTC [msp] GetManagerForChain -> DEBU 3240 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:32.998 UTC [protoutils] checkSignatureFromCreator -> DEBU 3241 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:32.998 UTC [protoutils] checkSignatureFromCreator -> DEBU 3242 creator is valid" -"2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 3243 Verify: digest = 00000000 8c 8e 59 c1 1a 67 22 ba cb 5d 17 7f 38 30 0d ce |..Y..g"..]..80..| -00000010 66 bb fc ee dc a3 5c 3b 14 72 f7 3e 63 86 d8 18 |f.....\;.r.>c...|" -"2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 3244 Verify: sig = 00000000 30 45 02 21 00 a4 17 dc d8 21 6b 0b cc 0a a3 93 |0E.!.....!k.....| -00000010 d8 b0 72 98 36 a2 3c 42 50 65 8c 68 9f 4f 13 4d |..r.6. DEBU 3245 exits successfully" -"2019-07-20 02:40:32.998 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3246 validateChaincodeProposalMessage starts for proposal 0xc000407260, header 0xc00080ea50" -"2019-07-20 02:40:32.998 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3247 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-07-20 02:40:32.998 UTC [endorser] preProcess -> DEBU 3248 [businesschannel][1bc589c4] processing txid: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53" -"2019-07-20 02:40:32.998 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3249 retrieveTransactionByID() - txId = [1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53]" -"2019-07-20 02:40:32.998 UTC [endorser] SimulateProposal -> DEBU 324a [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " -"2019-07-20 02:40:32.998 UTC [endorser] callChaincode -> INFO 324b [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " -"2019-07-20 02:40:32.998 UTC [chaincode] Execute -> DEBU 324c Entry" -"2019-07-20 02:40:32.998 UTC [cscc] Invoke -> DEBU 324d Invoke function: GetChannels" -"2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 324e Verify: digest = 00000000 8c 8e 59 c1 1a 67 22 ba cb 5d 17 7f 38 30 0d ce |..Y..g"..]..80..| -00000010 66 bb fc ee dc a3 5c 3b 14 72 f7 3e 63 86 d8 18 |f.....\;.r.>c...|" -"2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 324f Verify: sig = 00000000 30 45 02 21 00 a4 17 dc d8 21 6b 0b cc 0a a3 93 |0E.!.....!k.....| -00000010 d8 b0 72 98 36 a2 3c 42 50 65 8c 68 9f 4f 13 4d |..r.6. DEBU 3250 [1bc589c4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:32.998 UTC [chaincode] Notify -> DEBU 3251 [1bc589c4] notifying Txid:1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, channelID:businesschannel" -"2019-07-20 02:40:32.998 UTC [chaincode] Execute -> DEBU 3252 Exit" -"2019-07-20 02:40:32.998 UTC [endorser] callChaincode -> INFO 3253 [businesschannel][1bc589c4] Exit chaincode: name:"cscc" (0ms)" -"2019-07-20 02:40:32.998 UTC [endorser] SimulateProposal -> DEBU 3254 [businesschannel][1bc589c4] Exit" -"2019-07-20 02:40:32.998 UTC [endorser] endorseProposal -> DEBU 3255 [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " -"2019-07-20 02:40:32.999 UTC [endorser] endorseProposal -> DEBU 3256 [businesschannel][1bc589c4] escc for chaincode name:"cscc" is escc" -"2019-07-20 02:40:32.999 UTC [endorser] EndorseWithPlugin -> DEBU 3257 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, chaincode: cscc}" -"2019-07-20 02:40:32.999 UTC [msp.identity] Sign -> DEBU 3258 Sign: plaintext: 0A20881317A66318D893408174F0D476...455254494649434154452D2D2D2D2D0A " -"2019-07-20 02:40:32.999 UTC [msp.identity] Sign -> DEBU 3259 Sign: digest: CC8B57189048DE397745C7CBCF9841266EBCAC1099F471FFCA261265DA217119 " -"2019-07-20 02:40:32.999 UTC [endorser] EndorseWithPlugin -> DEBU 325a Exiting {plugin: escc, channel: businesschannel, tx: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, chaincode: cscc}" -"2019-07-20 02:40:32.999 UTC [endorser] endorseProposal -> DEBU 325b [businesschannel][1bc589c4] Exit" -"2019-07-20 02:40:32.999 UTC [endorser] func1 -> DEBU 325c Exit: request from 172.18.0.9:58420" -"2019-07-20 02:40:32.999 UTC [comm.grpc.server] 1 -> INFO 325d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58420 grpc.code=OK grpc.call_duration=1.6457ms -"2019-07-20 02:40:33.005 UTC [grpc] infof -> DEBU 325e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:33.005 UTC [grpc] infof -> DEBU 325f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:33.008 UTC [gossip.comm] func1 -> DEBU 3260 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:33.008 UTC [gossip.gossip] handleMessage -> DEBU 3261 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:33.008 UTC [msp] DeserializeIdentity -> DEBU 3262 Obtaining identity" -"2019-07-20 02:40:33.009 UTC [msp] DeserializeIdentity -> DEBU 3263 Obtaining identity" -"2019-07-20 02:40:33.009 UTC [msp] DeserializeIdentity -> DEBU 3264 Obtaining identity" -"2019-07-20 02:40:33.009 UTC [gossip.gossip] handleMessage -> DEBU 3265 Exiting" -"2019-07-20 02:40:33.019 UTC [gossip.comm] func1 -> DEBU 3266 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:33.020 UTC [gossip.gossip] handleMessage -> DEBU 3267 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:33.021 UTC [msp] DeserializeIdentity -> DEBU 3268 Obtaining identity" -"2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3269 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326a Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326b Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 326f 0xc002fe9bb0 gate 1563590433021464800 evaluation starts" -"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3270 0xc002fe9bb0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3271 0xc002fe9bb0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3272 0xc002fe9bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3273 0xc002fe9bb0 principal evaluation fails" -"2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 3274 0xc002fe9bb0 gate 1563590433021464800 evaluation fails" -"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3275 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3276 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3277 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 3278 0xc0030da410 gate 1563590433021793500 evaluation starts" -"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3279 0xc0030da410 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 327a 0xc0030da410 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 327b 0xc0030da410 principal matched by identity 0" -"2019-07-20 02:40:33.021 UTC [msp.identity] Verify -> DEBU 327c Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:33.021 UTC [msp.identity] Verify -> DEBU 327d Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:33.022 UTC [cauthdsl] func2 -> DEBU 327e 0xc0030da410 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:33.022 UTC [cauthdsl] func1 -> DEBU 327f 0xc0030da410 gate 1563590433021793500 evaluation succeeds" -"2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3280 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3281 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3282 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3283 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:33.022 UTC [msp] DeserializeIdentity -> DEBU 3284 Obtaining identity" -"2019-07-20 02:40:33.022 UTC [gossip.gossip] handleMessage -> DEBU 3285 Exiting" -"2019-07-20 02:40:33.029 UTC [gossip.comm] func1 -> DEBU 3286 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:33.029 UTC [gossip.gossip] handleMessage -> DEBU 3287 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:33.029 UTC [msp] DeserializeIdentity -> DEBU 3288 Obtaining identity" -"2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3289 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 328a Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 328b Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:33.031 UTC [cauthdsl] func1 -> DEBU 328f 0xc0030dbf30 gate 1563590433031507100 evaluation starts" -"2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3290 0xc0030dbf30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3291 0xc0030dbf30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3292 0xc0030dbf30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3293 0xc0030dbf30 principal evaluation fails" -"2019-07-20 02:40:33.031 UTC [cauthdsl] func1 -> DEBU 3294 0xc0030dbf30 gate 1563590433031507100 evaluation fails" -"2019-07-20 02:40:33.031 UTC [policies] Evaluate -> DEBU 3295 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:33.031 UTC [policies] Evaluate -> DEBU 3296 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:33.032 UTC [policies] Evaluate -> DEBU 3297 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:33.032 UTC [cauthdsl] func1 -> DEBU 3298 0xc0030f2770 gate 1563590433032125000 evaluation starts" -"2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 3299 0xc0030f2770 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329a 0xc0030f2770 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329b 0xc0030f2770 principal matched by identity 0" -"2019-07-20 02:40:33.032 UTC [msp.identity] Verify -> DEBU 329c Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:33.032 UTC [msp.identity] Verify -> DEBU 329d Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329e 0xc0030f2770 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:33.033 UTC [cauthdsl] func1 -> DEBU 329f 0xc0030f2770 gate 1563590433032125000 evaluation succeeds" -"2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a2 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:33.033 UTC [msp] DeserializeIdentity -> DEBU 32a4 Obtaining identity" -"2019-07-20 02:40:33.033 UTC [gossip.gossip] handleMessage -> DEBU 32a5 Exiting" -"2019-07-20 02:40:33.151 UTC [gossip.comm] func1 -> DEBU 32a6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:33.152 UTC [gossip.gossip] handleMessage -> DEBU 32a7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32a8 Obtaining identity" -"2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32a9 Obtaining identity" -"2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32aa Obtaining identity" -"2019-07-20 02:40:33.152 UTC [gossip.gossip] handleMessage -> DEBU 32ab Exiting" -"2019-07-20 02:40:33.163 UTC [gossip.comm] func1 -> DEBU 32ac Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:33.165 UTC [gossip.gossip] handleMessage -> DEBU 32ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:33.165 UTC [msp] DeserializeIdentity -> DEBU 32ae Obtaining identity" -"2019-07-20 02:40:33.165 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:33.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b0 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:33.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b1 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:33.166 UTC [policies] Evaluate -> DEBU 32b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32b5 0xc0031162a0 gate 1563590433175568500 evaluation starts" -"2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b6 0xc0031162a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b7 0xc0031162a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b8 0xc0031162a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b9 0xc0031162a0 principal evaluation fails" -"2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32ba 0xc0031162a0 gate 1563590433175568500 evaluation fails" -"2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32be 0xc003116c00 gate 1563590433175929200 evaluation starts" -"2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32bf 0xc003116c00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c0 0xc003116c00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c1 0xc003116c00 principal matched by identity 0" -"2019-07-20 02:40:33.176 UTC [msp.identity] Verify -> DEBU 32c2 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:33.176 UTC [msp.identity] Verify -> DEBU 32c3 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c4 0xc003116c00 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:33.176 UTC [cauthdsl] func1 -> DEBU 32c5 0xc003116c00 gate 1563590433175929200 evaluation succeeds" -"2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c8 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:33.176 UTC [msp] DeserializeIdentity -> DEBU 32ca Obtaining identity" -"2019-07-20 02:40:33.176 UTC [gossip.gossip] handleMessage -> DEBU 32cb Exiting" -"2019-07-20 02:40:35.901 UTC [gossip.comm] func1 -> DEBU 32cc Got message: GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:35.901 UTC [gossip.gossip] handleMessage -> DEBU 32cd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:35.901 UTC [gossip.gossip] handleMessage -> DEBU 32ce Exiting" -"2019-07-20 02:40:35.901 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32cf Got message: GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:35.901 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32d0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:35.901 UTC [msp] DeserializeIdentity -> DEBU 32d1 Obtaining identity" -"2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:35.901 UTC [policies] Evaluate -> DEBU 32d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32d8 0xc003124d50 gate 1563590435902157400 evaluation starts" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32d9 0xc003124d50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32da 0xc003124d50 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32db 0xc003124d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32dc 0xc003124d50 principal evaluation fails" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32dd 0xc003124d50 gate 1563590435902157400 evaluation fails" -"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32e1 0xc003125620 gate 1563590435902535500 evaluation starts" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e2 0xc003125620 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e3 0xc003125620 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e4 0xc003125620 principal matched by identity 0" -"2019-07-20 02:40:35.902 UTC [msp.identity] Verify -> DEBU 32e5 Verify: digest = 00000000 97 29 f6 9f 38 86 61 bb 16 0a 4f 52 c6 72 50 9c |.)..8.a...OR.rP.| -00000010 0e 82 23 bc b2 0c d2 17 f9 8f 15 65 06 cd a4 71 |..#........e...q|" -"2019-07-20 02:40:35.902 UTC [msp.identity] Verify -> DEBU 32e6 Verify: sig = 00000000 30 45 02 21 00 c4 d2 fc 2d b2 50 19 d8 0e b4 3e |0E.!....-.P....>| -00000010 6c 72 21 ca 32 cc d1 27 26 1c 01 ae 22 d2 5d 8e |lr!.2..'&...".].| -00000020 83 44 e7 1a bd 02 20 3d 6e 75 83 04 f8 9c 46 3d |.D.... =nu....F=| -00000030 86 e4 0e 70 a0 54 bf c3 63 c6 94 97 0d 71 3e cb |...p.T..c....q>.| -00000040 27 bf 33 e5 cf 8a 00 |'.3....|" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e7 0xc003125620 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32e8 0xc003125620 gate 1563590435902535500 evaluation succeeds" -"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32eb Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:35.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 32ed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32ee Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32ef updating membership: timestamp: " -"2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f0 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f2 Exiting" -"2019-07-20 02:40:35.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f3 Exiting" -"2019-07-20 02:40:35.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32f4 Exiting" -"2019-07-20 02:40:35.903 UTC [gossip.discovery] sendMemResponse -> DEBU 32f5 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f6 Obtaining identity" -"2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f7 Obtaining identity" -"2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f8 Obtaining identity" -"2019-07-20 02:40:35.903 UTC [gossip.comm] Send -> DEBU 32f9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:35.904 UTC [gossip.discovery] sendMemResponse -> DEBU 32fa Exiting, replying with alive:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > alive:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " -"2019-07-20 02:40:35.904 UTC [gossip.comm] sendToEndpoint -> DEBU 32fb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:35.904 UTC [gossip.comm] sendToEndpoint -> DEBU 32fc Exiting" -"2019-07-20 02:40:35.930 UTC [gossip.comm] func1 -> DEBU 32fd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:35.930 UTC [gossip.gossip] handleMessage -> DEBU 32fe Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:35.930 UTC [gossip.pull] HandleMessage -> DEBU 32ff GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3300 Obtaining identity" -"2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3301 Obtaining identity" -"2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3302 Obtaining identity" -"2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3303 Obtaining identity" -"2019-07-20 02:40:35.931 UTC [msp] DeserializeIdentity -> DEBU 3304 Obtaining identity" -"2019-07-20 02:40:35.931 UTC [msp] DeserializeIdentity -> DEBU 3305 Obtaining identity" -"2019-07-20 02:40:35.931 UTC [gossip.pull] SendDigest -> DEBU 3306 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:35.931 UTC [gossip.gossip] handleMessage -> DEBU 3307 Exiting" -"2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 3308 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 3309 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 330a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 330b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 330c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 330d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:36.228 UTC [gossip.comm] sendToEndpoint -> DEBU 330e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 330f Exiting" -"2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3310 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3312 Exiting" -"2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3311 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3313 Exiting" -"2019-07-20 02:40:36.240 UTC [gossip.comm] func1 -> DEBU 3314 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3315 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.240 UTC [gossip.pull] HandleMessage -> DEBU 3316 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3317 Exiting" -"2019-07-20 02:40:36.240 UTC [gossip.comm] func1 -> DEBU 3318 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3319 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.240 UTC [gossip.pull] HandleMessage -> DEBU 331a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 331b Exiting" -"2019-07-20 02:40:36.242 UTC [gossip.comm] func1 -> DEBU 331c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.242 UTC [gossip.gossip] handleMessage -> DEBU 331d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.242 UTC [gossip.pull] HandleMessage -> DEBU 331e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.242 UTC [gossip.gossip] handleMessage -> DEBU 331f Exiting" -"2019-07-20 02:40:36.270 UTC [msp] GetDefaultSigningIdentity -> DEBU 3320 Obtaining default signing identity" -"2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3321 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151026 " -"2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3322 Sign: digest: BD9726F5555E2FF5198D8FD774556AA7FA82CA21D8859FCBF5A7FCF75D6CA8FE " -"2019-07-20 02:40:36.271 UTC [msp] GetDefaultSigningIdentity -> DEBU 3323 Obtaining default signing identity" -"2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3324 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3325 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:36.271 UTC [gossip.comm] Send -> DEBU 3326 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:36.271 UTC [msp] DeserializeIdentity -> DEBU 3327 Obtaining identity" -"2019-07-20 02:40:36.271 UTC [gossip.comm] Send -> DEBU 3328 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:36.272 UTC [msp] DeserializeIdentity -> DEBU 3329 Obtaining identity" -"2019-07-20 02:40:36.272 UTC [gossip.comm] Send -> DEBU 332a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332c Exiting" -"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332e Exiting" -"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 3330 Exiting" -"2019-07-20 02:40:36.273 UTC [gossip.comm] func1 -> DEBU 3331 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.273 UTC [gossip.gossip] handleMessage -> DEBU 3332 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.273 UTC [gossip.gossip] handleMessage -> DEBU 3333 Exiting" -"2019-07-20 02:40:36.273 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3334 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.273 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3335 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 3336 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| -00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" -"2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 3337 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| -00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| -00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| -00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| -00000040 b4 3a 38 0a 45 dc |.:8.E.|" -"2019-07-20 02:40:36.274 UTC [gossip.discovery] handleAliveMessage -> DEBU 3338 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:36.274 UTC [gossip.discovery] handleAliveMessage -> DEBU 3339 Exiting" -"2019-07-20 02:40:36.274 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 333a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:36.274 UTC [gossip.comm] func1 -> DEBU 333b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.274 UTC [gossip.gossip] handleMessage -> DEBU 333c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 333d Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| -00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" -"2019-07-20 02:40:36.274 UTC [gossip.comm] func1 -> DEBU 333e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 333f Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| -00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| -00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| -00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| -00000040 bb c9 ea 46 07 8a 5e |...F..^|" -"2019-07-20 02:40:36.275 UTC [gossip.discovery] handleAliveMessage -> DEBU 3340 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.275 UTC [gossip.discovery] isSentByMe -> DEBU 3341 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.275 UTC [gossip.discovery] handleAliveMessage -> DEBU 3342 Exiting" -"2019-07-20 02:40:36.275 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3343 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:36.275 UTC [msp] DeserializeIdentity -> DEBU 3344 Obtaining identity" -"2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3345 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3346 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3347 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3348 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3349 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 334a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:36.275 UTC [cauthdsl] func1 -> DEBU 334b 0xc003223710 gate 1563590436275755700 evaluation starts" -"2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334c 0xc003223710 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334d 0xc003223710 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334e 0xc003223710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334f 0xc003223710 principal evaluation fails" -"2019-07-20 02:40:36.275 UTC [cauthdsl] func1 -> DEBU 3350 0xc003223710 gate 1563590436275755700 evaluation fails" -"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3351 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3352 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3353 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:36.276 UTC [cauthdsl] func1 -> DEBU 3354 0xc003223f60 gate 1563590436276119600 evaluation starts" -"2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3355 0xc003223f60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3356 0xc003223f60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3357 0xc003223f60 principal matched by identity 0" -"2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3358 Verify: digest = 00000000 97 29 f6 9f 38 86 61 bb 16 0a 4f 52 c6 72 50 9c |.)..8.a...OR.rP.| -00000010 0e 82 23 bc b2 0c d2 17 f9 8f 15 65 06 cd a4 71 |..#........e...q|" -"2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3359 Verify: sig = 00000000 30 45 02 21 00 c4 d2 fc 2d b2 50 19 d8 0e b4 3e |0E.!....-.P....>| -00000010 6c 72 21 ca 32 cc d1 27 26 1c 01 ae 22 d2 5d 8e |lr!.2..'&...".].| -00000020 83 44 e7 1a bd 02 20 3d 6e 75 83 04 f8 9c 46 3d |.D.... =nu....F=| -00000030 86 e4 0e 70 a0 54 bf c3 63 c6 94 97 0d 71 3e cb |...p.T..c....q>.| -00000040 27 bf 33 e5 cf 8a 00 |'.3....|" -"2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 335a 0xc003223f60 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:36.276 UTC [cauthdsl] func1 -> DEBU 335b 0xc003223f60 gate 1563590436276119600 evaluation succeeds" -"2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 3360 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 3361 Exiting" -"2019-07-20 02:40:36.276 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3362 Exiting" -"2019-07-20 02:40:36.276 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3363 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.276 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3364 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3365 Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| -00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" -"2019-07-20 02:40:36.276 UTC [gossip.gossip] handleMessage -> DEBU 3366 Exiting" -"2019-07-20 02:40:36.276 UTC [gossip.gossip] handleMessage -> DEBU 3367 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3368 Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| -00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| -00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| -00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| -00000040 bb c9 ea 46 07 8a 5e |...F..^|" -"2019-07-20 02:40:36.277 UTC [msp.identity] Verify -> DEBU 3369 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:36.277 UTC [msp.identity] Verify -> DEBU 336a Verify: sig = 00000000 30 45 02 21 00 a5 09 35 d9 10 ed dc 71 72 14 b0 |0E.!...5....qr..| -00000010 82 63 5c ab 58 b6 65 75 18 f5 ea 47 eb ea e0 22 |.c\.X.eu...G..."| -00000020 38 8a 66 cb 74 02 20 51 55 63 f4 c9 d9 6f 05 65 |8.f.t. QUc...o.e| -00000030 90 5e b5 2d fb b2 4a 51 63 f8 5c f3 ef 53 a4 a0 |.^.-..JQc.\..S..| -00000040 d9 93 20 d9 c3 e3 02 |.. ....|" -"2019-07-20 02:40:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 336b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:36.277 UTC [gossip.discovery] isSentByMe -> DEBU 336c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 336d Exiting" -"2019-07-20 02:40:36.277 UTC [gossip.discovery] handleMsgFromComm -> DEBU 336e Exiting" -"2019-07-20 02:40:36.277 UTC [gossip.discovery] handleMsgFromComm -> DEBU 336f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.277 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3370 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:36.278 UTC [gossip.gossip] handleMessage -> DEBU 3371 Exiting" -"2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3372 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| -00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" -"2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3373 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| -00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| -00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| -00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| -00000040 b4 3a 38 0a 45 dc |.:8.E.|" -"2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3374 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3375 Exiting" -"2019-07-20 02:40:36.278 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3376 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3377 Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| -00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" -"2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3378 Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| -00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| -00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| -00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| -00000040 bb c9 ea 46 07 8a 5e |...F..^|" -"2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3379 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.278 UTC [gossip.discovery] isSentByMe -> DEBU 337a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 337b Exiting" -"2019-07-20 02:40:36.278 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 337c Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:36.278 UTC [msp] DeserializeIdentity -> DEBU 337d Obtaining identity" -"2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 337e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 337f Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3380 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3384 0xc0033fe550 gate 1563590436279236500 evaluation starts" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3385 0xc0033fe550 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3386 0xc0033fe550 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3387 0xc0033fe550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3388 0xc0033fe550 principal evaluation fails" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3389 0xc0033fe550 gate 1563590436279236500 evaluation fails" -"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 338d 0xc0033fefe0 gate 1563590436279489000 evaluation starts" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 338e 0xc0033fefe0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 338f 0xc0033fefe0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3390 0xc0033fefe0 principal matched by identity 0" -"2019-07-20 02:40:36.279 UTC [msp.identity] Verify -> DEBU 3391 Verify: digest = 00000000 d2 d4 95 34 c5 7c dd ee c2 94 69 b1 d1 26 4c d7 |...4.|....i..&L.| -00000010 40 ff ea 97 8d 6f 55 a3 e4 ff 62 0d 3e 07 5e ef |@....oU...b.>.^.|" -"2019-07-20 02:40:36.279 UTC [msp.identity] Verify -> DEBU 3392 Verify: sig = 00000000 30 45 02 21 00 f3 38 c9 26 96 2b 11 5d 0b 81 e2 |0E.!..8.&.+.]...| -00000010 04 af 5e 83 86 28 b7 3e 16 29 cd 2e 39 ff 8a c0 |..^..(.>.)..9...| -00000020 22 4b 64 33 65 02 20 46 9d 23 cf 2f 09 f4 e8 9f |"Kd3e. F.#./....| -00000030 51 37 80 5d 43 19 94 67 36 d7 f3 1a 4d 7d cf a7 |Q7.]C..g6...M}..| -00000040 a7 1d 12 7a d0 f4 9a |...z...|" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3393 0xc0033fefe0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3394 0xc0033fefe0 gate 1563590436279489000 evaluation succeeds" -"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3395 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3396 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3397 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3398 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:36.279 UTC [gossip.discovery] handleAliveMessage -> DEBU 3399 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.279 UTC [gossip.discovery] handleAliveMessage -> DEBU 339a Exiting" -"2019-07-20 02:40:36.279 UTC [gossip.discovery] handleMsgFromComm -> DEBU 339b Exiting" -"2019-07-20 02:40:36.334 UTC [gossip.comm] func1 -> DEBU 339c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.334 UTC [gossip.gossip] handleMessage -> DEBU 339d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.334 UTC [gossip.pull] HandleMessage -> DEBU 339e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.334 UTC [gossip.pull] SendDigest -> DEBU 339f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:36.334 UTC [gossip.gossip] handleMessage -> DEBU 33a0 Exiting" -"2019-07-20 02:40:36.356 UTC [gossip.comm] func1 -> DEBU 33a1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.356 UTC [gossip.gossip] handleMessage -> DEBU 33a2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.356 UTC [gossip.gossip] handleMessage -> DEBU 33a3 Exiting" -"2019-07-20 02:40:36.356 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33a4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.356 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33a5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a6 Verify: digest = 00000000 bf e2 70 70 3b c9 af 04 88 68 c0 25 62 b0 c1 87 |..pp;....h.%b...| -00000010 0e 4c 72 03 b6 4d db 15 8a 80 e6 7d b1 e4 f2 77 |.Lr..M.....}...w|" -"2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a7 Verify: sig = 00000000 30 44 02 20 28 df c9 fb 93 61 15 b4 ca d0 2e 53 |0D. (....a.....S| -00000010 1f 6b 28 45 16 9c 6a c0 55 0a 61 c0 74 7d b5 30 |.k(E..j.U.a.t}.0| -00000020 b1 8c a7 d5 02 20 7d 03 4d 41 f9 c9 5b dc 85 f5 |..... }.MA..[...| -00000030 24 1b a5 72 0b a9 d2 65 21 a7 a9 d7 66 be ab ab |$..r...e!...f...| -00000040 d5 6d 82 e1 fd f8 |.m....|" -"2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a9 Verify: sig = 00000000 30 44 02 20 42 62 be ee 71 e2 97 23 1a 72 f7 54 |0D. Bb..q..#.r.T| -00000010 be 0d 92 c7 64 25 98 b6 48 51 40 33 f5 ba 18 4f |....d%..HQ@3...O| -00000020 b8 38 23 a1 02 20 1d 27 ec 74 10 b6 a3 72 4b 14 |.8#.. .'.t...rK.| -00000030 ae 32 b3 d5 fd 80 18 14 95 3c cf b3 4f bb c5 c1 |.2.......<..O...| -00000040 43 db 68 e8 b6 65 |C.h..e|" -"2019-07-20 02:40:36.358 UTC [gossip.discovery] handleAliveMessage -> DEBU 33aa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ac updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ad Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ae Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33af Exiting" -"2019-07-20 02:40:36.358 UTC [gossip.discovery] handleAliveMessage -> DEBU 33b0 Exiting" -"2019-07-20 02:40:36.358 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33b1 Exiting" -"2019-07-20 02:40:36.358 UTC [gossip.discovery] sendMemResponse -> DEBU 33b2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:36.358 UTC [msp] DeserializeIdentity -> DEBU 33b3 Obtaining identity" -"2019-07-20 02:40:36.358 UTC [msp] DeserializeIdentity -> DEBU 33b4 Obtaining identity" -"2019-07-20 02:40:36.358 UTC [gossip.comm] Send -> DEBU 33b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:36.358 UTC [gossip.discovery] sendMemResponse -> DEBU 33b6 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " -"2019-07-20 02:40:36.359 UTC [gossip.comm] sendToEndpoint -> DEBU 33b7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.359 UTC [gossip.comm] sendToEndpoint -> DEBU 33b8 Exiting" -"2019-07-20 02:40:36.524 UTC [gossip.comm] func1 -> DEBU 33b9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.524 UTC [gossip.gossip] handleMessage -> DEBU 33ba Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.524 UTC [gossip.pull] HandleMessage -> DEBU 33bb GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bc Obtaining identity" -"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bd Obtaining identity" -"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33be Obtaining identity" -"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bf Obtaining identity" -"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33c0 Obtaining identity" -"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33c1 Obtaining identity" -"2019-07-20 02:40:36.525 UTC [gossip.pull] SendDigest -> DEBU 33c2 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:36.525 UTC [gossip.gossip] handleMessage -> DEBU 33c3 Exiting" -"2019-07-20 02:40:36.544 UTC [gossip.comm] func1 -> DEBU 33c4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.544 UTC [gossip.gossip] handleMessage -> DEBU 33c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.545 UTC [gossip.gossip] handleMessage -> DEBU 33c6 Exiting" -"2019-07-20 02:40:36.545 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33c7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.545 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33c8 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:36.545 UTC [msp] DeserializeIdentity -> DEBU 33c9 Obtaining identity" -"2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33ca Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33cb Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33cc Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d0 0xc0035100a0 gate 1563590436545487300 evaluation starts" -"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d1 0xc0035100a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d2 0xc0035100a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d3 0xc0035100a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d4 0xc0035100a0 principal evaluation fails" -"2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d5 0xc0035100a0 gate 1563590436545487300 evaluation fails" -"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d9 0xc0035108e0 gate 1563590436545752600 evaluation starts" -"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33da 0xc0035108e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33db 0xc0035108e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33dc 0xc0035108e0 principal matched by identity 0" -"2019-07-20 02:40:36.545 UTC [msp.identity] Verify -> DEBU 33dd Verify: digest = 00000000 7b 8f 87 ef db 70 1f 05 1f dc 0f ad fb ae e8 3a |{....p.........:| -00000010 7d e3 42 b9 c2 d9 da 90 6f 32 4f b1 c0 e2 97 12 |}.B.....o2O.....|" -"2019-07-20 02:40:36.545 UTC [msp.identity] Verify -> DEBU 33de Verify: sig = 00000000 30 45 02 21 00 89 81 30 96 cd db 39 a2 b8 66 ff |0E.!...0...9..f.| -00000010 4c 07 4f 87 55 6d dd bf 0b 25 de 6e 64 4d f0 c5 |L.O.Um...%.ndM..| -00000020 0b 47 1a ac 2f 02 20 35 cc ec 2c ca 41 16 06 0e |.G../. 5..,.A...| -00000030 69 26 87 96 ca b0 04 57 a5 4f 0c ae 65 ab 89 cd |i&.....W.O..e...| -00000040 a3 c2 07 ee 3b da 97 |....;..|" -"2019-07-20 02:40:36.546 UTC [cauthdsl] func2 -> DEBU 33df 0xc0035108e0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:36.546 UTC [cauthdsl] func1 -> DEBU 33e0 0xc0035108e0 gate 1563590436545752600 evaluation succeeds" -"2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e3 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:36.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 33e5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e7 updating membership: timestamp: " -"2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e8 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ea Exiting" -"2019-07-20 02:40:36.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 33eb Exiting" -"2019-07-20 02:40:36.546 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33ec Exiting" -"2019-07-20 02:40:36.546 UTC [gossip.discovery] sendMemResponse -> DEBU 33ed Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33ee Obtaining identity" -"2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33ef Obtaining identity" -"2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33f0 Obtaining identity" -"2019-07-20 02:40:36.546 UTC [gossip.comm] Send -> DEBU 33f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:36.546 UTC [gossip.discovery] sendMemResponse -> DEBU 33f2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" > alive: alive:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " -"2019-07-20 02:40:36.546 UTC [gossip.comm] sendToEndpoint -> DEBU 33f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.546 UTC [gossip.comm] sendToEndpoint -> DEBU 33f4 Exiting" -"2019-07-20 02:40:36.682 UTC [msp] DeserializeIdentity -> DEBU 33f5 Obtaining identity" -"2019-07-20 02:40:36.683 UTC [msp] DeserializeIdentity -> DEBU 33f6 Obtaining identity" -"2019-07-20 02:40:36.683 UTC [gossip.comm] Send -> DEBU 33f7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33f8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33f9 Exiting" -"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fb Exiting" -"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fd Exiting" -"2019-07-20 02:40:36.684 UTC [gossip.comm] func1 -> DEBU 33fe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.684 UTC [gossip.gossip] handleMessage -> DEBU 33ff Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3400 Obtaining identity" -"2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3401 Obtaining identity" -"2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3402 Obtaining identity" -"2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3403 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3404 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3405 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3406 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3407 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3408 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:36.684 UTC [cauthdsl] func1 -> DEBU 3409 0xc0035b47f0 gate 1563590436684969900 evaluation starts" -"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340a 0xc0035b47f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340b 0xc0035b47f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340c 0xc0035b47f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340d 0xc0035b47f0 principal evaluation fails" -"2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 340e 0xc0035b47f0 gate 1563590436684969900 evaluation fails" -"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 340f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 3410 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 3411 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 3412 0xc0035b5040 gate 1563590436685298700 evaluation starts" -"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3413 0xc0035b5040 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3414 0xc0035b5040 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3415 0xc0035b5040 principal matched by identity 0" -"2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 3416 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 3417 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3418 0xc0035b5040 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 3419 0xc0035b5040 gate 1563590436685298700 evaluation succeeds" -"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 341e Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 341f Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:36.686 UTC [msp.identity] Verify -> DEBU 3420 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:36.686 UTC [msp.identity] Verify -> DEBU 3421 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:36.686 UTC [msp] DeserializeIdentity -> DEBU 3422 Obtaining identity" -"2019-07-20 02:40:36.686 UTC [msp] DeserializeIdentity -> DEBU 3423 Obtaining identity" -"2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3424 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3425 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3426 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3427 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3428 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3429 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:36.686 UTC [cauthdsl] func1 -> DEBU 342a 0xc003647650 gate 1563590436686687400 evaluation starts" -"2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342b 0xc003647650 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342c 0xc003647650 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342d 0xc003647650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342e 0xc003647650 principal evaluation fails" -"2019-07-20 02:40:36.687 UTC [cauthdsl] func1 -> DEBU 342f 0xc003647650 gate 1563590436686687400 evaluation fails" -"2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3430 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3431 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3432 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:36.687 UTC [cauthdsl] func1 -> DEBU 3433 0xc003647fb0 gate 1563590436687349300 evaluation starts" -"2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3434 0xc003647fb0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3435 0xc003647fb0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3436 0xc003647fb0 principal matched by identity 0" -"2019-07-20 02:40:36.687 UTC [msp.identity] Verify -> DEBU 3437 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:36.687 UTC [msp.identity] Verify -> DEBU 3438 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:36.688 UTC [cauthdsl] func2 -> DEBU 3439 0xc003647fb0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:36.688 UTC [cauthdsl] func1 -> DEBU 343a 0xc003647fb0 gate 1563590436687349300 evaluation succeeds" -"2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:36.688 UTC [gossip.gossip] handleMessage -> DEBU 343f Exiting" -"2019-07-20 02:40:36.692 UTC [gossip.comm] func1 -> DEBU 3440 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.692 UTC [gossip.gossip] handleMessage -> DEBU 3441 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3442 Obtaining identity" -"2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3443 Obtaining identity" -"2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3444 Obtaining identity" -"2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3445 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3446 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3447 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3448 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3449 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 344a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 344b 0xc003541730 gate 1563590436693379500 evaluation starts" -"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344c 0xc003541730 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344d 0xc003541730 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344e 0xc003541730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344f 0xc003541730 principal evaluation fails" -"2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 3450 0xc003541730 gate 1563590436693379500 evaluation fails" -"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3451 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3452 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3453 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 3454 0xc003541f70 gate 1563590436693729200 evaluation starts" -"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3455 0xc003541f70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3456 0xc003541f70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3457 0xc003541f70 principal matched by identity 0" -"2019-07-20 02:40:36.693 UTC [msp.identity] Verify -> DEBU 3458 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:36.693 UTC [msp.identity] Verify -> DEBU 3459 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:36.694 UTC [cauthdsl] func2 -> DEBU 345a 0xc003541f70 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:36.694 UTC [cauthdsl] func1 -> DEBU 345b 0xc003541f70 gate 1563590436693729200 evaluation succeeds" -"2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3460 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3461 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3462 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3463 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:36.695 UTC [msp] DeserializeIdentity -> DEBU 3464 Obtaining identity" -"2019-07-20 02:40:36.695 UTC [msp] DeserializeIdentity -> DEBU 3465 Obtaining identity" -"2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3466 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3467 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3468 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3469 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 346a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 346b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:36.695 UTC [cauthdsl] func1 -> DEBU 346c 0xc0036866f0 gate 1563590436695671100 evaluation starts" -"2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346d 0xc0036866f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346e 0xc0036866f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346f 0xc0036866f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 3470 0xc0036866f0 principal evaluation fails" -"2019-07-20 02:40:36.695 UTC [cauthdsl] func1 -> DEBU 3471 0xc0036866f0 gate 1563590436695671100 evaluation fails" -"2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3472 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3473 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 3474 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:36.696 UTC [cauthdsl] func1 -> DEBU 3475 0xc003687050 gate 1563590436696063500 evaluation starts" -"2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3476 0xc003687050 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3477 0xc003687050 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3478 0xc003687050 principal matched by identity 0" -"2019-07-20 02:40:36.696 UTC [msp.identity] Verify -> DEBU 3479 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:36.696 UTC [msp.identity] Verify -> DEBU 347a Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 347b 0xc003687050 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:36.696 UTC [cauthdsl] func1 -> DEBU 347c 0xc003687050 gate 1563590436696063500 evaluation succeeds" -"2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 3480 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:36.696 UTC [gossip.gossip] handleMessage -> DEBU 3481 Exiting" -"2019-07-20 02:40:36.697 UTC [gossip.comm] func1 -> DEBU 3482 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.697 UTC [gossip.gossip] handleMessage -> DEBU 3483 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3484 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3485 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3486 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3487 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:36.698 UTC [msp] DeserializeIdentity -> DEBU 3488 Obtaining identity" -"2019-07-20 02:40:36.698 UTC [msp] DeserializeIdentity -> DEBU 3489 Obtaining identity" -"2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 348a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 348b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 348c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3490 0xc00369fb60 gate 1563590436699245600 evaluation starts" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3491 0xc00369fb60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3492 0xc00369fb60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3493 0xc00369fb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3494 0xc00369fb60 principal evaluation fails" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3495 0xc00369fb60 gate 1563590436699245600 evaluation fails" -"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3496 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3497 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3498 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3499 0xc0036b24b0 gate 1563590436699489000 evaluation starts" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349a 0xc0036b24b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349b 0xc0036b24b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349c 0xc0036b24b0 principal matched by identity 0" -"2019-07-20 02:40:36.699 UTC [msp.identity] Verify -> DEBU 349d Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:36.699 UTC [msp.identity] Verify -> DEBU 349e Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349f 0xc0036b24b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 34a0 0xc0036b24b0 gate 1563590436699489000 evaluation succeeds" -"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a3 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:36.699 UTC [msp] DeserializeIdentity -> DEBU 34a5 Obtaining identity" -"2019-07-20 02:40:36.699 UTC [msp] DeserializeIdentity -> DEBU 34a6 Obtaining identity" -"2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a8 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a9 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34ad 0xc0036b3c80 gate 1563590436700195900 evaluation starts" -"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34ae 0xc0036b3c80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34af 0xc0036b3c80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b0 0xc0036b3c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b1 0xc0036b3c80 principal evaluation fails" -"2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34b2 0xc0036b3c80 gate 1563590436700195900 evaluation fails" -"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34b6 0xc0036c4500 gate 1563590436700460800 evaluation starts" -"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b7 0xc0036c4500 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b8 0xc0036c4500 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b9 0xc0036c4500 principal matched by identity 0" -"2019-07-20 02:40:36.700 UTC [msp.identity] Verify -> DEBU 34ba Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:36.704 UTC [msp.identity] Verify -> DEBU 34bb Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:36.704 UTC [cauthdsl] func2 -> DEBU 34bc 0xc0036c4500 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:36.704 UTC [cauthdsl] func1 -> DEBU 34bd 0xc0036c4500 gate 1563590436700460800 evaluation succeeds" -"2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34c0 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:36.704 UTC [gossip.gossip] handleMessage -> DEBU 34c2 Exiting" -"2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c3 Obtaining identity" -"2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c4 Obtaining identity" -"2019-07-20 02:40:36.745 UTC [gossip.pull] Hello -> DEBU 34c5 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c6 Obtaining identity" -"2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c7 Obtaining identity" -"2019-07-20 02:40:36.746 UTC [gossip.comm] Send -> DEBU 34c8 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:36.746 UTC [gossip.comm] sendToEndpoint -> DEBU 34c9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.746 UTC [gossip.comm] sendToEndpoint -> DEBU 34ca Exiting" -"2019-07-20 02:40:36.747 UTC [gossip.comm] func1 -> DEBU 34cb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.748 UTC [gossip.gossip] handleMessage -> DEBU 34cc Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.749 UTC [gossip.pull] HandleMessage -> DEBU 34cd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.750 UTC [gossip.gossip] handleMessage -> DEBU 34ce Exiting" -"2019-07-20 02:40:36.844 UTC [gossip.comm] func1 -> DEBU 34cf Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.844 UTC [gossip.gossip] handleMessage -> DEBU 34d0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.844 UTC [msp] DeserializeIdentity -> DEBU 34d1 Obtaining identity" -"2019-07-20 02:40:36.844 UTC [msp] DeserializeIdentity -> DEBU 34d2 Obtaining identity" -"2019-07-20 02:40:36.845 UTC [gossip.gossip] handleMessage -> DEBU 34d3 Exiting" -"2019-07-20 02:40:36.880 UTC [gossip.comm] func1 -> DEBU 34d4 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.880 UTC [gossip.gossip] handleMessage -> DEBU 34d5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.880 UTC [gossip.pull] HandleMessage -> DEBU 34d6 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:36.880 UTC [gossip.pull] SendDigest -> DEBU 34d7 Sending BLOCK_MSG digest: [4 5 1 2 3] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:36.880 UTC [gossip.gossip] handleMessage -> DEBU 34d8 Exiting" -"2019-07-20 02:40:36.970 UTC [gossip.election] waitForInterrupt -> DEBU 34d9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:36.970 UTC [gossip.election] IsLeader -> DEBU 34da c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:36.970 UTC [msp] GetDefaultSigningIdentity -> DEBU 34db Obtaining default signing identity" -"2019-07-20 02:40:36.970 UTC [msp.identity] Sign -> DEBU 34dc Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100C1801 " -"2019-07-20 02:40:36.970 UTC [msp.identity] Sign -> DEBU 34dd Sign: digest: 1B78485C66C4756B9D42225FAB4CE1C790E01C21A93694B1C2B8F1C403FEBC34 " -"2019-07-20 02:40:36.970 UTC [gossip.election] waitForInterrupt -> DEBU 34de c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:36.971 UTC [gossip.comm] func1 -> DEBU 34df Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.971 UTC [gossip.gossip] handleMessage -> DEBU 34e0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.971 UTC [gossip.gossip] handleMessage -> DEBU 34e1 Exiting" -"2019-07-20 02:40:36.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.971 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34e3 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:36.971 UTC [msp] DeserializeIdentity -> DEBU 34e4 Obtaining identity" -"2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34e5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34e6 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34e7 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34eb 0xc0036eb550 gate 1563590436971658300 evaluation starts" -"2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ec 0xc0036eb550 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ed 0xc0036eb550 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ee 0xc0036eb550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ef 0xc0036eb550 principal evaluation fails" -"2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34f0 0xc0036eb550 gate 1563590436971658300 evaluation fails" -"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34f4 0xc0036ebd90 gate 1563590436971953500 evaluation starts" -"2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f5 0xc0036ebd90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f6 0xc0036ebd90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f7 0xc0036ebd90 principal matched by identity 0" -"2019-07-20 02:40:36.972 UTC [msp.identity] Verify -> DEBU 34f8 Verify: digest = 00000000 26 df 49 f8 3f 7b e1 94 4e 01 29 2d c7 af 47 40 |&.I.?{..N.)-..G@| -00000010 4c 78 11 f1 2b f8 e2 79 69 30 ff 55 94 2d 6e 4a |Lx..+..yi0.U.-nJ|" -"2019-07-20 02:40:36.972 UTC [msp.identity] Verify -> DEBU 34f9 Verify: sig = 00000000 30 45 02 21 00 df 98 33 75 f9 69 d0 40 55 0a 3b |0E.!...3u.i.@U.;| -00000010 da de 7c a1 0c 38 ed 61 63 71 ba ab 2a 7d 6e a6 |..|..8.acq..*}n.| -00000020 7f 2c 2c 42 8c 02 20 66 14 35 b5 9e f3 a6 dc 45 |.,,B.. f.5.....E| -00000030 13 fd 9f 8e 41 72 6e e2 53 88 4e 4b 1d 8b e2 d2 |....Arn.S.NK....| -00000040 b4 07 5f 1d c2 61 08 |.._..a.|" -"2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34fa 0xc0036ebd90 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:36.972 UTC [cauthdsl] func1 -> DEBU 34fb 0xc0036ebd90 gate 1563590436971953500 evaluation succeeds" -"2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fe Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:36.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 3500 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3501 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3502 updating membership: timestamp: " -"2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3503 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3504 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3505 Exiting" -"2019-07-20 02:40:36.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 3506 Exiting" -"2019-07-20 02:40:36.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3507 Exiting" -"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3508 Obtaining identity" -"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3509 Obtaining identity" -"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350a Obtaining identity" -"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350b Obtaining identity" -"2019-07-20 02:40:36.974 UTC [gossip.comm] Send -> DEBU 350c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350d Obtaining identity" -"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350e Obtaining identity" -"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350f Obtaining identity" -"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3510 Obtaining identity" -"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3511 Obtaining identity" -"2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3512 Obtaining identity" -"2019-07-20 02:40:36.975 UTC [gossip.comm] Send -> DEBU 3513 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3514 Obtaining identity" -"2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3515 Obtaining identity" -"2019-07-20 02:40:36.975 UTC [gossip.comm] Send -> DEBU 3516 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3517 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3518 Exiting" -"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3519 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" -"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351a Exiting" -"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351c Exiting" -"2019-07-20 02:40:36.975 UTC [gossip.comm] func1 -> DEBU 351d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.975 UTC [gossip.gossip] handleMessage -> DEBU 351e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.975 UTC [gossip.gossip] handleMessage -> DEBU 351f Exiting" -"2019-07-20 02:40:36.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3520 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3521 Exiting" -"2019-07-20 02:40:36.979 UTC [gossip.comm] func1 -> DEBU 3522 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.979 UTC [gossip.gossip] handleMessage -> DEBU 3523 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.979 UTC [gossip.gossip] handleMessage -> DEBU 3524 Exiting" -"2019-07-20 02:40:36.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3525 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:36.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3526 Exiting" -"2019-07-20 02:40:37.007 UTC [gossip.comm] func1 -> DEBU 3527 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:37.007 UTC [gossip.gossip] handleMessage -> DEBU 3528 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 3529 Obtaining identity" -"2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 352a Obtaining identity" -"2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 352b Obtaining identity" -"2019-07-20 02:40:37.008 UTC [gossip.gossip] handleMessage -> DEBU 352c Exiting" -"2019-07-20 02:40:37.146 UTC [gossip.comm] func1 -> DEBU 352d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:37.146 UTC [gossip.gossip] handleMessage -> DEBU 352e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 352f Obtaining identity" -"2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 3530 Obtaining identity" -"2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 3531 Obtaining identity" -"2019-07-20 02:40:37.147 UTC [gossip.gossip] handleMessage -> DEBU 3532 Exiting" -"2019-07-20 02:40:37.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 3533 Obtaining default signing identity" -"2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3534 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151027 " -"2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3535 Sign: digest: EF598D4BA71D68883581531AA57270E0ABB11DBA25246FB693F61EFAC554FFBB " -"2019-07-20 02:40:37.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 3536 Obtaining default signing identity" -"2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3537 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3538 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:37.282 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3539 Sleeping 5s" -"2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353a Obtaining identity" -"2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353b Obtaining identity" -"2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353c Obtaining identity" -"2019-07-20 02:40:37.287 UTC [gossip.comm] Send -> DEBU 353d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353e Obtaining identity" -"2019-07-20 02:40:37.288 UTC [gossip.comm] Send -> DEBU 353f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:37.288 UTC [gossip.comm] Send -> DEBU 3540 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3541 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3542 Exiting" -"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3543 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3544 Exiting" -"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3545 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3546 Exiting" -"2019-07-20 02:40:37.337 UTC [gossip.comm] func1 -> DEBU 3547 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.337 UTC [gossip.gossip] handleMessage -> DEBU 3548 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.337 UTC [gossip.gossip] handleMessage -> DEBU 3549 Exiting" -"2019-07-20 02:40:37.337 UTC [gossip.discovery] handleMsgFromComm -> DEBU 354a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.337 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 354b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:37.338 UTC [msp.identity] Verify -> DEBU 354c Verify: digest = 00000000 98 8b b6 ea 63 6c 28 c5 81 cc fc 32 bc ba 47 44 |....cl(....2..GD| -00000010 ea 06 ac a5 80 7a 18 18 87 75 03 4d ed 29 ca 31 |.....z...u.M.).1|" -"2019-07-20 02:40:37.338 UTC [msp.identity] Verify -> DEBU 354d Verify: sig = 00000000 30 45 02 21 00 e4 0c 73 62 cd e2 a3 44 56 f0 91 |0E.!...sb...DV..| -00000010 df b4 11 07 ac ff 34 83 0c 60 55 4a a5 7d fe 3d |......4..`UJ.}.=| -00000020 4d 38 05 0f 3a 02 20 78 12 92 81 07 2e 52 0a c9 |M8..:. x.....R..| -00000030 7f 39 b6 dc 66 ea 24 d3 0d 45 66 11 e6 6e 93 4f |.9..f.$..Ef..n.O| -00000040 51 bb f6 02 a4 ee 6d |Q.....m|" -"2019-07-20 02:40:37.338 UTC [gossip.discovery] handleAliveMessage -> DEBU 354e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 354f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3550 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3551 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3552 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3553 Exiting" -"2019-07-20 02:40:37.338 UTC [gossip.discovery] handleAliveMessage -> DEBU 3554 Exiting" -"2019-07-20 02:40:37.338 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3555 Exiting" -"2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3556 Obtaining identity" -"2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3557 Obtaining identity" -"2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3558 Obtaining identity" -"2019-07-20 02:40:37.341 UTC [gossip.comm] Send -> DEBU 3559 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 355a Obtaining identity" -"2019-07-20 02:40:37.341 UTC [gossip.comm] Send -> DEBU 355b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355d Exiting" -"2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.342 UTC [gossip.comm] sendToEndpoint -> DEBU 355f Exiting" -"2019-07-20 02:40:37.342 UTC [gossip.comm] func1 -> DEBU 3560 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.342 UTC [gossip.gossip] handleMessage -> DEBU 3561 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.342 UTC [gossip.gossip] handleMessage -> DEBU 3562 Exiting" -"2019-07-20 02:40:37.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3563 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3564 Exiting" -"2019-07-20 02:40:37.349 UTC [gossip.comm] func1 -> DEBU 3565 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.349 UTC [gossip.gossip] handleMessage -> DEBU 3566 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.349 UTC [gossip.gossip] handleMessage -> DEBU 3567 Exiting" -"2019-07-20 02:40:37.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3568 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:37.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3569 Exiting" -"2019-07-20 02:40:37.521 UTC [gossip.comm] func1 -> DEBU 356a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.521 UTC [gossip.gossip] handleMessage -> DEBU 356b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.521 UTC [gossip.gossip] handleMessage -> DEBU 356c Exiting" -"2019-07-20 02:40:37.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 356d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.522 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 356e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:37.522 UTC [msp] DeserializeIdentity -> DEBU 356f Obtaining identity" -"2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3570 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3571 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3572 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3573 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3574 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3575 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 3576 0xc0039bcdf0 gate 1563590437523295700 evaluation starts" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3577 0xc0039bcdf0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3578 0xc0039bcdf0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3579 0xc0039bcdf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 357a 0xc0039bcdf0 principal evaluation fails" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 357b 0xc0039bcdf0 gate 1563590437523295700 evaluation fails" -"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 357f 0xc0039bd630 gate 1563590437523623400 evaluation starts" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3580 0xc0039bd630 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3581 0xc0039bd630 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3582 0xc0039bd630 principal matched by identity 0" -"2019-07-20 02:40:37.523 UTC [msp.identity] Verify -> DEBU 3583 Verify: digest = 00000000 26 fc 28 ac 88 f9 f3 87 de 93 74 3c 3d 76 8e 42 |&.(.......t<=v.B| -00000010 b5 84 89 8d f7 05 59 de 8b 52 64 19 7f b9 a0 ff |......Y..Rd.....|" -"2019-07-20 02:40:37.523 UTC [msp.identity] Verify -> DEBU 3584 Verify: sig = 00000000 30 44 02 20 65 be 11 a3 8d 9c 28 c9 4d 98 c2 b4 |0D. e.....(.M...| -00000010 0d 34 0c 31 29 b9 f4 36 51 01 aa 83 98 69 9f 86 |.4.1)..6Q....i..| -00000020 4a bc c1 f1 02 20 3f 80 eb de c3 95 42 34 e2 f1 |J.... ?.....B4..| -00000030 7e 58 a1 ce 51 ae 5d d4 34 a1 82 2e ca 2c 53 95 |~X..Q.].4....,S.| -00000040 ee 18 7e 26 ce 0a |..~&..|" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3585 0xc0039bd630 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 3586 0xc0039bd630 gate 1563590437523623400 evaluation succeeds" -"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3587 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 3588 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 3589 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 358a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:37.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 358b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358d updating membership: timestamp: " -"2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358e Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 3590 Exiting" -"2019-07-20 02:40:37.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 3591 Exiting" -"2019-07-20 02:40:37.526 UTC [gossip.comm] func1 -> DEBU 3592 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.526 UTC [gossip.gossip] handleMessage -> DEBU 3593 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.525 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3594 Exiting" -"2019-07-20 02:40:37.526 UTC [gossip.gossip] handleMessage -> DEBU 3595 Exiting" -"2019-07-20 02:40:37.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3596 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3597 Exiting" -"2019-07-20 02:40:37.533 UTC [gossip.comm] func1 -> DEBU 3598 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.533 UTC [gossip.gossip] handleMessage -> DEBU 3599 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.533 UTC [gossip.gossip] handleMessage -> DEBU 359a Exiting" -"2019-07-20 02:40:37.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359c Exiting" -"2019-07-20 02:40:37.535 UTC [msp] DeserializeIdentity -> DEBU 359d Obtaining identity" -"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 359e Obtaining identity" -"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 359f Obtaining identity" -"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a0 Obtaining identity" -"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a1 Obtaining identity" -"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a2 Obtaining identity" -"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a3 Obtaining identity" -"2019-07-20 02:40:37.536 UTC [gossip.comm] Send -> DEBU 35a4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a5 Obtaining identity" -"2019-07-20 02:40:37.536 UTC [gossip.comm] Send -> DEBU 35a6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a8 Exiting" -"2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35aa Exiting" -"2019-07-20 02:40:39.900 UTC [gossip.comm] func1 -> DEBU 35ab Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:39.903 UTC [gossip.gossip] handleMessage -> DEBU 35ac Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:39.903 UTC [gossip.gossip] handleMessage -> DEBU 35ad Exiting" -"2019-07-20 02:40:39.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35ae Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:39.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35af Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:39.905 UTC [msp] DeserializeIdentity -> DEBU 35b0 Obtaining identity" -"2019-07-20 02:40:39.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35b1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:39.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35b2 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:39.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35b3 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:39.907 UTC [cauthdsl] func1 -> DEBU 35b7 0xc003a8ce70 gate 1563590439907231300 evaluation starts" -"2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35b8 0xc003a8ce70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35b9 0xc003a8ce70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35ba 0xc003a8ce70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:39.909 UTC [cauthdsl] func2 -> DEBU 35bb 0xc003a8ce70 principal evaluation fails" -"2019-07-20 02:40:39.909 UTC [cauthdsl] func1 -> DEBU 35bc 0xc003a8ce70 gate 1563590439907231300 evaluation fails" -"2019-07-20 02:40:39.909 UTC [policies] Evaluate -> DEBU 35bd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:39.910 UTC [policies] Evaluate -> DEBU 35be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:39.910 UTC [policies] Evaluate -> DEBU 35bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:39.910 UTC [cauthdsl] func1 -> DEBU 35c0 0xc003a8d6b0 gate 1563590439910435600 evaluation starts" -"2019-07-20 02:40:39.910 UTC [cauthdsl] func2 -> DEBU 35c1 0xc003a8d6b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:39.911 UTC [cauthdsl] func2 -> DEBU 35c2 0xc003a8d6b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:39.911 UTC [cauthdsl] func2 -> DEBU 35c3 0xc003a8d6b0 principal matched by identity 0" -"2019-07-20 02:40:39.911 UTC [msp.identity] Verify -> DEBU 35c4 Verify: digest = 00000000 07 c5 67 64 18 c9 af 45 eb ea b4 3c e4 72 7f f4 |..gd...E...<.r..| -00000010 a8 65 2a 77 67 3f e6 41 18 ac 7f ff a1 21 68 cd |.e*wg?.A.....!h.|" -"2019-07-20 02:40:39.912 UTC [msp.identity] Verify -> DEBU 35c5 Verify: sig = 00000000 30 45 02 21 00 c8 c1 65 36 7e 3f c1 76 7e 65 68 |0E.!...e6~?.v~eh| -00000010 f6 e4 70 a6 3a c2 a8 19 6d 5a 77 2e ef 9e a2 18 |..p.:...mZw.....| -00000020 0e f0 6b 43 e6 02 20 7a 9a 49 ed 81 29 91 fd 63 |..kC.. z.I..)..c| -00000030 ee 2f a2 21 39 66 69 d6 ee cf dd 9c 61 6a de a6 |./.!9fi.....aj..| -00000040 e6 b6 2c 4d af 22 19 |..,M.".|" -"2019-07-20 02:40:39.912 UTC [cauthdsl] func2 -> DEBU 35c6 0xc003a8d6b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:39.912 UTC [cauthdsl] func1 -> DEBU 35c7 0xc003a8d6b0 gate 1563590439910435600 evaluation succeeds" -"2019-07-20 02:40:39.912 UTC [policies] Evaluate -> DEBU 35c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35ca Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:39.913 UTC [gossip.discovery] handleAliveMessage -> DEBU 35cc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35cd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ce updating membership: timestamp: " -"2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35cf Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35d0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:39.915 UTC [gossip.discovery] learnExistingMembers -> DEBU 35d1 Exiting" -"2019-07-20 02:40:39.915 UTC [gossip.discovery] handleAliveMessage -> DEBU 35d2 Exiting" -"2019-07-20 02:40:39.915 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35d3 Exiting" -"2019-07-20 02:40:39.915 UTC [gossip.discovery] sendMemResponse -> DEBU 35d4 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:39.915 UTC [msp] DeserializeIdentity -> DEBU 35d5 Obtaining identity" -"2019-07-20 02:40:39.915 UTC [msp] DeserializeIdentity -> DEBU 35d6 Obtaining identity" -"2019-07-20 02:40:39.916 UTC [msp] DeserializeIdentity -> DEBU 35d7 Obtaining identity" -"2019-07-20 02:40:39.916 UTC [gossip.comm] Send -> DEBU 35d8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:39.916 UTC [gossip.comm] sendToEndpoint -> DEBU 35d9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:39.916 UTC [gossip.comm] sendToEndpoint -> DEBU 35da Exiting" -"2019-07-20 02:40:39.916 UTC [gossip.discovery] sendMemResponse -> DEBU 35db Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020+" signature:"0E\002!\000\344\014sb\315\342\243DV\360\221\337\264\021\007\254\3774\203\014`UJ\245}\376=M8\005\017:\002 x\022\222\201\007.R\n\311\1779\266\334f\352$\323\rEf\021\346n\223OQ\273\366\002\244\356m" > alive: alive: alive: " -"2019-07-20 02:40:39.932 UTC [gossip.comm] func1 -> DEBU 35dc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:39.932 UTC [gossip.gossip] handleMessage -> DEBU 35dd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:39.932 UTC [gossip.pull] HandleMessage -> DEBU 35de GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:39.932 UTC [msp] DeserializeIdentity -> DEBU 35df Obtaining identity" -"2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e0 Obtaining identity" -"2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e1 Obtaining identity" -"2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e2 Obtaining identity" -"2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e3 Obtaining identity" -"2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e4 Obtaining identity" -"2019-07-20 02:40:39.933 UTC [gossip.pull] SendDigest -> DEBU 35e5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:39.934 UTC [gossip.gossip] handleMessage -> DEBU 35e6 Exiting" -"2019-07-20 02:40:40.231 UTC [gossip.pull] Hello -> DEBU 35e7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:40.231 UTC [gossip.comm] Send -> DEBU 35e8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:40.232 UTC [gossip.comm] sendToEndpoint -> DEBU 35e9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.232 UTC [gossip.comm] sendToEndpoint -> DEBU 35ea Exiting" -"2019-07-20 02:40:40.234 UTC [gossip.comm] func1 -> DEBU 35eb Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.232 UTC [gossip.pull] Hello -> DEBU 35ec Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:40.234 UTC [gossip.comm] Send -> DEBU 35ed Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:40.234 UTC [gossip.pull] Hello -> DEBU 35ee Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:40.234 UTC [gossip.comm] Send -> DEBU 35ef Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:40.234 UTC [gossip.comm] sendToEndpoint -> DEBU 35f0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.234 UTC [gossip.comm] sendToEndpoint -> DEBU 35f1 Exiting" -"2019-07-20 02:40:40.235 UTC [gossip.comm] sendToEndpoint -> DEBU 35f2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.235 UTC [gossip.comm] sendToEndpoint -> DEBU 35f3 Exiting" -"2019-07-20 02:40:40.235 UTC [gossip.gossip] handleMessage -> DEBU 35f4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.236 UTC [gossip.pull] HandleMessage -> DEBU 35f5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.237 UTC [gossip.gossip] handleMessage -> DEBU 35f7 Exiting" -"2019-07-20 02:40:40.236 UTC [gossip.comm] func1 -> DEBU 35f6 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.238 UTC [gossip.gossip] handleMessage -> DEBU 35f8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.238 UTC [gossip.pull] HandleMessage -> DEBU 35f9 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.238 UTC [gossip.gossip] handleMessage -> DEBU 35fa Exiting" -"2019-07-20 02:40:40.239 UTC [gossip.comm] func1 -> DEBU 35fb Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.239 UTC [gossip.gossip] handleMessage -> DEBU 35fc Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.239 UTC [gossip.pull] HandleMessage -> DEBU 35fd GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.240 UTC [gossip.gossip] handleMessage -> DEBU 35fe Exiting" -"2019-07-20 02:40:40.273 UTC [msp] GetDefaultSigningIdentity -> DEBU 35ff Obtaining default signing identity" -"2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3600 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151028 " -"2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3601 Sign: digest: 0A3BB45DB1F5C8EAA3328930FC5D9B22EF7414C203CE4D29C9118912D79EAC98 " -"2019-07-20 02:40:40.274 UTC [msp] GetDefaultSigningIdentity -> DEBU 3602 Obtaining default signing identity" -"2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3603 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3604 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:40.274 UTC [gossip.comm] Send -> DEBU 3605 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:40.275 UTC [msp] DeserializeIdentity -> DEBU 3606 Obtaining identity" -"2019-07-20 02:40:40.275 UTC [gossip.comm] Send -> DEBU 3607 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:40.275 UTC [msp] DeserializeIdentity -> DEBU 3608 Obtaining identity" -"2019-07-20 02:40:40.276 UTC [gossip.comm] Send -> DEBU 3609 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360b Exiting" -"2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.277 UTC [gossip.comm] sendToEndpoint -> DEBU 360d Exiting" -"2019-07-20 02:40:40.279 UTC [gossip.comm] sendToEndpoint -> DEBU 360e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.279 UTC [gossip.comm] func1 -> DEBU 3611 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.279 UTC [gossip.gossip] handleMessage -> DEBU 3612 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.279 UTC [gossip.comm] sendToEndpoint -> DEBU 3610 Exiting" -"2019-07-20 02:40:40.280 UTC [gossip.gossip] handleMessage -> DEBU 3613 Exiting" -"2019-07-20 02:40:40.280 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3614 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.281 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3615 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:40.282 UTC [msp.identity] Verify -> DEBU 3616 Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| -00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" -"2019-07-20 02:40:40.279 UTC [gossip.comm] func1 -> DEBU 360f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.282 UTC [gossip.gossip] handleMessage -> DEBU 3618 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.282 UTC [gossip.comm] func1 -> DEBU 3617 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.282 UTC [msp.identity] Verify -> DEBU 3619 Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| -00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| -00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| -00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| -00000040 df fe cf 90 da 0d 55 |......U|" -"2019-07-20 02:40:40.283 UTC [msp.identity] Verify -> DEBU 361a Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:40.283 UTC [msp.identity] Verify -> DEBU 361b Verify: sig = 00000000 30 45 02 21 00 bd 14 2e 87 ca ed f1 6f d1 29 68 |0E.!........o.)h| -00000010 7d 2a 6f e8 b1 f6 83 ed da fb 4f a9 6d ea 92 5b |}*o.......O.m..[| -00000020 db a3 ff 5d 5f 02 20 12 d9 06 3d f1 de 82 e1 d3 |...]_. ...=.....| -00000030 97 44 5a 18 4c f8 48 62 8a 53 0c ad a5 cc 41 b3 |.DZ.L.Hb.S....A.| -00000040 30 53 5a 99 d3 4d 7f |0SZ..M.|" -"2019-07-20 02:40:40.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 361c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:40.283 UTC [gossip.discovery] isSentByMe -> DEBU 361d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:40.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 361e Exiting" -"2019-07-20 02:40:40.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 361f Exiting" -"2019-07-20 02:40:40.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3620 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.284 UTC [gossip.gossip] handleMessage -> DEBU 3621 Exiting" -"2019-07-20 02:40:40.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3622 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:40.284 UTC [gossip.gossip] handleMessage -> DEBU 3623 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.284 UTC [msp.identity] Verify -> DEBU 3624 Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| -00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" -"2019-07-20 02:40:40.284 UTC [msp.identity] Verify -> DEBU 3625 Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| -00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| -00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| -00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| -00000040 df fe cf 90 da 0d 55 |......U|" -"2019-07-20 02:40:40.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 3626 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:40.284 UTC [gossip.discovery] isSentByMe -> DEBU 3627 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:40.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 3628 Exiting" -"2019-07-20 02:40:40.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3629 Exiting" -"2019-07-20 02:40:40.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 362a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 362b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:40.285 UTC [gossip.gossip] handleMessage -> DEBU 362c Exiting" -"2019-07-20 02:40:40.285 UTC [msp.identity] Verify -> DEBU 362d Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| -00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" -"2019-07-20 02:40:40.285 UTC [msp.identity] Verify -> DEBU 362e Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| -00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| -00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| -00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| -00000040 df fe cf 90 da 0d 55 |......U|" -"2019-07-20 02:40:40.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 362f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:40.285 UTC [gossip.discovery] isSentByMe -> DEBU 3630 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:40.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3631 Exiting" -"2019-07-20 02:40:40.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3632 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:40.285 UTC [msp] DeserializeIdentity -> DEBU 3633 Obtaining identity" -"2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3634 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3635 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3636 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3637 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3638 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3639 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:40.286 UTC [cauthdsl] func1 -> DEBU 363a 0xc003c5cbf0 gate 1563590440286448700 evaluation starts" -"2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363b 0xc003c5cbf0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363c 0xc003c5cbf0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363d 0xc003c5cbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363e 0xc003c5cbf0 principal evaluation fails" -"2019-07-20 02:40:40.286 UTC [cauthdsl] func1 -> DEBU 363f 0xc003c5cbf0 gate 1563590440286448700 evaluation fails" -"2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3640 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3641 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3642 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:40.287 UTC [cauthdsl] func1 -> DEBU 3643 0xc003c5d430 gate 1563590440287616200 evaluation starts" -"2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3644 0xc003c5d430 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3645 0xc003c5d430 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3646 0xc003c5d430 principal matched by identity 0" -"2019-07-20 02:40:40.288 UTC [msp.identity] Verify -> DEBU 3647 Verify: digest = 00000000 07 c5 67 64 18 c9 af 45 eb ea b4 3c e4 72 7f f4 |..gd...E...<.r..| -00000010 a8 65 2a 77 67 3f e6 41 18 ac 7f ff a1 21 68 cd |.e*wg?.A.....!h.|" -"2019-07-20 02:40:40.288 UTC [msp.identity] Verify -> DEBU 3648 Verify: sig = 00000000 30 45 02 21 00 c8 c1 65 36 7e 3f c1 76 7e 65 68 |0E.!...e6~?.v~eh| -00000010 f6 e4 70 a6 3a c2 a8 19 6d 5a 77 2e ef 9e a2 18 |..p.:...mZw.....| -00000020 0e f0 6b 43 e6 02 20 7a 9a 49 ed 81 29 91 fd 63 |..kC.. z.I..)..c| -00000030 ee 2f a2 21 39 66 69 d6 ee cf dd 9c 61 6a de a6 |./.!9fi.....aj..| -00000040 e6 b6 2c 4d af 22 19 |..,M.".|" -"2019-07-20 02:40:40.288 UTC [cauthdsl] func2 -> DEBU 3649 0xc003c5d430 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:40.288 UTC [cauthdsl] func1 -> DEBU 364a 0xc003c5d430 gate 1563590440287616200 evaluation succeeds" -"2019-07-20 02:40:40.288 UTC [policies] Evaluate -> DEBU 364b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.289 UTC [policies] Evaluate -> DEBU 364c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.290 UTC [policies] Evaluate -> DEBU 364d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:40.290 UTC [policies] Evaluate -> DEBU 364e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:40.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 364f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:40.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 3650 Exiting" -"2019-07-20 02:40:40.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3651 Exiting" -"2019-07-20 02:40:40.335 UTC [gossip.comm] func1 -> DEBU 3652 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.335 UTC [gossip.gossip] handleMessage -> DEBU 3653 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.336 UTC [gossip.pull] HandleMessage -> DEBU 3654 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.336 UTC [gossip.pull] SendDigest -> DEBU 3655 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:40.337 UTC [gossip.gossip] handleMessage -> DEBU 3656 Exiting" -"2019-07-20 02:40:40.358 UTC [gossip.comm] func1 -> DEBU 3657 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.358 UTC [gossip.gossip] handleMessage -> DEBU 3658 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.359 UTC [gossip.gossip] handleMessage -> DEBU 3659 Exiting" -"2019-07-20 02:40:40.359 UTC [gossip.discovery] handleMsgFromComm -> DEBU 365a Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.360 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 365b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:40.361 UTC [msp.identity] Verify -> DEBU 365c Verify: digest = 00000000 fb dc 02 43 57 88 bb 80 98 63 10 d2 3f 04 93 d2 |...CW....c..?...| -00000010 93 84 7e 83 65 4b 08 94 62 c6 2f 60 b1 ed ae 3b |..~.eK..b./`...;|" -"2019-07-20 02:40:40.361 UTC [msp.identity] Verify -> DEBU 365d Verify: sig = 00000000 30 44 02 20 19 8c a5 29 75 ff 31 ca 2c fd 17 48 |0D. ...)u.1.,..H| -00000010 66 f2 fd fd db 73 53 2f 7f 26 3f ef 96 f5 9a bd |f....sS/.&?.....| -00000020 1c 0c 88 e9 02 20 32 8c 99 1d 21 5a de 73 c3 dd |..... 2...!Z.s..| -00000030 36 93 18 43 30 6b cd 7a 56 eb f7 63 2a f9 3f ef |6..C0k.zV..c*.?.| -00000040 b0 4e 51 c0 54 c3 |.NQ.T.|" -"2019-07-20 02:40:40.362 UTC [msp.identity] Verify -> DEBU 365e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:40.362 UTC [msp.identity] Verify -> DEBU 365f Verify: sig = 00000000 30 44 02 20 64 89 b2 7f d6 93 e1 aa 26 0e 23 01 |0D. d.......&.#.| -00000010 18 0b f4 7e 51 5a d6 7d 7a aa 6f 90 77 af 57 69 |...~QZ.}z.o.w.Wi| -00000020 c5 20 b3 61 02 20 7e 33 7f 90 90 ec 6f 5e bc 9a |. .a. ~3....o^..| -00000030 cc ff 54 37 03 96 f5 87 ed ce ba 6e fe 55 e8 31 |..T7.......n.U.1| -00000040 01 1c 4b f1 54 f4 |..K.T.|" -"2019-07-20 02:40:40.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 3660 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:40.363 UTC [gossip.discovery] learnExistingMembers -> DEBU 3661 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3662 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3663 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3664 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3665 Exiting" -"2019-07-20 02:40:40.364 UTC [gossip.discovery] handleAliveMessage -> DEBU 3666 Exiting" -"2019-07-20 02:40:40.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3667 Exiting" -"2019-07-20 02:40:40.365 UTC [gossip.discovery] sendMemResponse -> DEBU 3668 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:40.365 UTC [msp] DeserializeIdentity -> DEBU 3669 Obtaining identity" -"2019-07-20 02:40:40.365 UTC [msp] DeserializeIdentity -> DEBU 366a Obtaining identity" -"2019-07-20 02:40:40.366 UTC [gossip.comm] Send -> DEBU 366b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:40.366 UTC [gossip.discovery] sendMemResponse -> DEBU 366c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > alive: " -"2019-07-20 02:40:40.366 UTC [gossip.comm] sendToEndpoint -> DEBU 366d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.367 UTC [gossip.comm] sendToEndpoint -> DEBU 366e Exiting" -"2019-07-20 02:40:40.524 UTC [gossip.comm] func1 -> DEBU 366f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.525 UTC [gossip.gossip] handleMessage -> DEBU 3670 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.525 UTC [gossip.pull] HandleMessage -> DEBU 3671 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.525 UTC [msp] DeserializeIdentity -> DEBU 3672 Obtaining identity" -"2019-07-20 02:40:40.526 UTC [msp] DeserializeIdentity -> DEBU 3673 Obtaining identity" -"2019-07-20 02:40:40.527 UTC [msp] DeserializeIdentity -> DEBU 3674 Obtaining identity" -"2019-07-20 02:40:40.528 UTC [msp] DeserializeIdentity -> DEBU 3675 Obtaining identity" -"2019-07-20 02:40:40.529 UTC [msp] DeserializeIdentity -> DEBU 3676 Obtaining identity" -"2019-07-20 02:40:40.529 UTC [msp] DeserializeIdentity -> DEBU 3677 Obtaining identity" -"2019-07-20 02:40:40.529 UTC [gossip.pull] SendDigest -> DEBU 3678 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:40.529 UTC [gossip.gossip] handleMessage -> DEBU 3679 Exiting" -"2019-07-20 02:40:40.546 UTC [gossip.comm] func1 -> DEBU 367a Got message: GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.546 UTC [gossip.gossip] handleMessage -> DEBU 367b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.546 UTC [gossip.gossip] handleMessage -> DEBU 367c Exiting" -"2019-07-20 02:40:40.547 UTC [gossip.discovery] handleMsgFromComm -> DEBU 367d Got message: GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.547 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 367e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:40.548 UTC [msp] DeserializeIdentity -> DEBU 367f Obtaining identity" -"2019-07-20 02:40:40.548 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3680 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:40.548 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3681 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3682 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3683 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3684 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3685 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 3686 0xc003d44800 gate 1563590440550548800 evaluation starts" -"2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3687 0xc003d44800 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3688 0xc003d44800 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3689 0xc003d44800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 368a 0xc003d44800 principal evaluation fails" -"2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 368b 0xc003d44800 gate 1563590440550548800 evaluation fails" -"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 368f 0xc003d45040 gate 1563590440550925000 evaluation starts" -"2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3690 0xc003d45040 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3691 0xc003d45040 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3692 0xc003d45040 principal matched by identity 0" -"2019-07-20 02:40:40.551 UTC [msp.identity] Verify -> DEBU 3693 Verify: digest = 00000000 5f f2 6b 78 bc a6 fb 49 6d f3 62 88 dc 48 6c 55 |_.kx...Im.b..HlU| -00000010 16 57 83 14 e8 fb a8 28 77 08 c6 70 0f 6e 7b dd |.W.....(w..p.n{.|" -"2019-07-20 02:40:40.551 UTC [msp.identity] Verify -> DEBU 3694 Verify: sig = 00000000 30 44 02 20 54 be fe 36 a5 43 b2 55 ab 8e 71 5e |0D. T..6.C.U..q^| -00000010 39 d1 80 9b 97 1e 33 a3 b0 f2 53 e2 1a c2 f7 d1 |9.....3...S.....| -00000020 f0 0f 25 f9 02 20 34 5c b7 f5 2c 4b 34 49 6c f6 |..%.. 4\..,K4Il.| -00000030 59 f6 21 76 6e 3e 7c 6c 1e 76 0a 10 f5 f6 82 54 |Y.!vn>|l.v.....T| -00000040 45 b1 75 e4 0b 44 |E.u..D|" -"2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3695 0xc003d45040 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:40.551 UTC [cauthdsl] func1 -> DEBU 3696 0xc003d45040 gate 1563590440550925000 evaluation succeeds" -"2019-07-20 02:40:40.551 UTC [policies] Evaluate -> DEBU 3697 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.552 UTC [policies] Evaluate -> DEBU 3698 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.553 UTC [policies] Evaluate -> DEBU 3699 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:40.553 UTC [policies] Evaluate -> DEBU 369a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:40.553 UTC [gossip.discovery] handleAliveMessage -> DEBU 369b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:40.553 UTC [gossip.discovery] learnExistingMembers -> DEBU 369c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369d updating membership: timestamp: " -"2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369e Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 36a0 Exiting" -"2019-07-20 02:40:40.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 36a1 Exiting" -"2019-07-20 02:40:40.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36a2 Exiting" -"2019-07-20 02:40:40.555 UTC [gossip.discovery] sendMemResponse -> DEBU 36a3 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:40.555 UTC [msp] DeserializeIdentity -> DEBU 36a4 Obtaining identity" -"2019-07-20 02:40:40.556 UTC [msp] DeserializeIdentity -> DEBU 36a5 Obtaining identity" -"2019-07-20 02:40:40.556 UTC [msp] DeserializeIdentity -> DEBU 36a6 Obtaining identity" -"2019-07-20 02:40:40.556 UTC [gossip.comm] Send -> DEBU 36a7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:40.557 UTC [gossip.discovery] sendMemResponse -> DEBU 36a8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" > alive:|l\036v\n\020\365\366\202TE\261u\344\013D" > alive: alive: " -"2019-07-20 02:40:40.557 UTC [gossip.comm] sendToEndpoint -> DEBU 36a9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.557 UTC [gossip.comm] sendToEndpoint -> DEBU 36aa Exiting" -"2019-07-20 02:40:40.683 UTC [msp] DeserializeIdentity -> DEBU 36ab Obtaining identity" -"2019-07-20 02:40:40.683 UTC [msp] DeserializeIdentity -> DEBU 36ac Obtaining identity" -"2019-07-20 02:40:40.683 UTC [gossip.comm] Send -> DEBU 36ad Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36ae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36af Exiting" -"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b1 Exiting" -"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b3 Exiting" -"2019-07-20 02:40:40.686 UTC [gossip.comm] func1 -> DEBU 36b4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.686 UTC [gossip.gossip] handleMessage -> DEBU 36b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b6 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b7 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b8 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b9 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:40.687 UTC [msp] DeserializeIdentity -> DEBU 36ba Obtaining identity" -"2019-07-20 02:40:40.687 UTC [msp] DeserializeIdentity -> DEBU 36bb Obtaining identity" -"2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36bc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36bd Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36be Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:40.687 UTC [cauthdsl] func1 -> DEBU 36c2 0xc003dc47c0 gate 1563590440687798600 evaluation starts" -"2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c3 0xc003dc47c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c4 0xc003dc47c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c5 0xc003dc47c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c6 0xc003dc47c0 principal evaluation fails" -"2019-07-20 02:40:40.687 UTC [cauthdsl] func1 -> DEBU 36c7 0xc003dc47c0 gate 1563590440687798600 evaluation fails" -"2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:40.688 UTC [cauthdsl] func1 -> DEBU 36cb 0xc003dc5030 gate 1563590440688085400 evaluation starts" -"2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36cc 0xc003dc5030 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36cd 0xc003dc5030 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36ce 0xc003dc5030 principal matched by identity 0" -"2019-07-20 02:40:40.688 UTC [msp.identity] Verify -> DEBU 36cf Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:40.688 UTC [msp.identity] Verify -> DEBU 36d0 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36d1 0xc003dc5030 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:40.688 UTC [cauthdsl] func1 -> DEBU 36d2 0xc003dc5030 gate 1563590440688085400 evaluation succeeds" -"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d5 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:40.688 UTC [msp] DeserializeIdentity -> DEBU 36d7 Obtaining identity" -"2019-07-20 02:40:40.691 UTC [msp] DeserializeIdentity -> DEBU 36d8 Obtaining identity" -"2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36d9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36da Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36db Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:40.693 UTC [cauthdsl] func1 -> DEBU 36df 0xc003e14800 gate 1563590440693923400 evaluation starts" -"2019-07-20 02:40:40.693 UTC [cauthdsl] func2 -> DEBU 36e0 0xc003e14800 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e1 0xc003e14800 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e2 0xc003e14800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e3 0xc003e14800 principal evaluation fails" -"2019-07-20 02:40:40.694 UTC [cauthdsl] func1 -> DEBU 36e4 0xc003e14800 gate 1563590440693923400 evaluation fails" -"2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:40.696 UTC [cauthdsl] func1 -> DEBU 36e8 0xc003e15160 gate 1563590440694341600 evaluation starts" -"2019-07-20 02:40:40.696 UTC [cauthdsl] func2 -> DEBU 36e9 0xc003e15160 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.697 UTC [cauthdsl] func2 -> DEBU 36ea 0xc003e15160 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.697 UTC [cauthdsl] func2 -> DEBU 36eb 0xc003e15160 principal matched by identity 0" -"2019-07-20 02:40:40.697 UTC [msp.identity] Verify -> DEBU 36ec Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:40.697 UTC [msp.identity] Verify -> DEBU 36ed Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:40.699 UTC [cauthdsl] func2 -> DEBU 36ee 0xc003e15160 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:40.699 UTC [cauthdsl] func1 -> DEBU 36ef 0xc003e15160 gate 1563590440694341600 evaluation succeeds" -"2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f2 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:40.700 UTC [gossip.gossip] handleMessage -> DEBU 36f4 Exiting" -"2019-07-20 02:40:40.700 UTC [gossip.comm] func1 -> DEBU 36f5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.700 UTC [gossip.gossip] handleMessage -> DEBU 36f6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f7 Obtaining identity" -"2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f8 Obtaining identity" -"2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f9 Obtaining identity" -"2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36fb Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36fc Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:40.700 UTC [cauthdsl] func1 -> DEBU 3700 0xc003e330d0 gate 1563590440700808900 evaluation starts" -"2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3701 0xc003e330d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3702 0xc003e330d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3703 0xc003e330d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3704 0xc003e330d0 principal evaluation fails" -"2019-07-20 02:40:40.700 UTC [cauthdsl] func1 -> DEBU 3705 0xc003e330d0 gate 1563590440700808900 evaluation fails" -"2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 3706 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3707 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3708 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:40.701 UTC [cauthdsl] func1 -> DEBU 3709 0xc003e33910 gate 1563590440701086700 evaluation starts" -"2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370a 0xc003e33910 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370b 0xc003e33910 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370c 0xc003e33910 principal matched by identity 0" -"2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 370d Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 370e Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370f 0xc003e33910 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:40.701 UTC [cauthdsl] func1 -> DEBU 3710 0xc003e33910 gate 1563590440701086700 evaluation succeeds" -"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3711 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3712 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3713 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3714 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 3715 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 3716 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:40.702 UTC [msp.identity] Verify -> DEBU 3717 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:40.702 UTC [msp.identity] Verify -> DEBU 3718 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:40.702 UTC [msp] DeserializeIdentity -> DEBU 3719 Obtaining identity" -"2019-07-20 02:40:40.702 UTC [msp] DeserializeIdentity -> DEBU 371a Obtaining identity" -"2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 371b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371c Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371d Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 371e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 371f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3720 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 3721 0xc003f4bf90 gate 1563590440702568500 evaluation starts" -"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3722 0xc003f4bf90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3723 0xc003f4bf90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3724 0xc003f4bf90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3725 0xc003f4bf90 principal evaluation fails" -"2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 3726 0xc003f4bf90 gate 1563590440702568500 evaluation fails" -"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3727 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3728 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3729 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 372a 0xc003f7c830 gate 1563590440702846900 evaluation starts" -"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372b 0xc003f7c830 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372c 0xc003f7c830 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372d 0xc003f7c830 principal matched by identity 0" -"2019-07-20 02:40:40.703 UTC [msp.identity] Verify -> DEBU 372e Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:40.703 UTC [msp.identity] Verify -> DEBU 372f Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:40.703 UTC [cauthdsl] func2 -> DEBU 3730 0xc003f7c830 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:40.703 UTC [cauthdsl] func1 -> DEBU 3731 0xc003f7c830 gate 1563590440702846900 evaluation succeeds" -"2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3732 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3733 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3734 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3735 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:40.703 UTC [gossip.gossip] handleMessage -> DEBU 3736 Exiting" -"2019-07-20 02:40:40.703 UTC [gossip.comm] func1 -> DEBU 3737 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.703 UTC [gossip.gossip] handleMessage -> DEBU 3738 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.703 UTC [msp] DeserializeIdentity -> DEBU 3739 Obtaining identity" -"2019-07-20 02:40:40.703 UTC [msp] DeserializeIdentity -> DEBU 373a Obtaining identity" -"2019-07-20 02:40:40.707 UTC [gossip.privdata] run -> DEBU 373b Start reconcile missing private info" -"2019-07-20 02:40:40.707 UTC [leveldbhelper] GetIterator -> DEBU 373c Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" -"2019-07-20 02:40:40.707 UTC [msp] DeserializeIdentity -> DEBU 373d Obtaining identity" -"2019-07-20 02:40:40.707 UTC [gossip.privdata] reconcile -> DEBU 373e Reconciliation cycle finished successfully. no items to reconcile" -"2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 373f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3740 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3741 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3742 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3743 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3744 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:40.708 UTC [cauthdsl] func1 -> DEBU 3745 0xc0029c84a0 gate 1563590440708859500 evaluation starts" -"2019-07-20 02:40:40.708 UTC [cauthdsl] func2 -> DEBU 3746 0xc0029c84a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.712 UTC [cauthdsl] func2 -> DEBU 3747 0xc0029c84a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.713 UTC [cauthdsl] func2 -> DEBU 3748 0xc0029c84a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:40.713 UTC [cauthdsl] func2 -> DEBU 3749 0xc0029c84a0 principal evaluation fails" -"2019-07-20 02:40:40.715 UTC [cauthdsl] func1 -> DEBU 374a 0xc0029c84a0 gate 1563590440708859500 evaluation fails" -"2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:40.715 UTC [cauthdsl] func1 -> DEBU 374e 0xc0029c8ce0 gate 1563590440715840100 evaluation starts" -"2019-07-20 02:40:40.715 UTC [cauthdsl] func2 -> DEBU 374f 0xc0029c8ce0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.715 UTC [cauthdsl] func2 -> DEBU 3750 0xc0029c8ce0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.716 UTC [cauthdsl] func2 -> DEBU 3751 0xc0029c8ce0 principal matched by identity 0" -"2019-07-20 02:40:40.716 UTC [msp.identity] Verify -> DEBU 3752 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:40.716 UTC [msp.identity] Verify -> DEBU 3753 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:40.716 UTC [cauthdsl] func2 -> DEBU 3754 0xc0029c8ce0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:40.716 UTC [cauthdsl] func1 -> DEBU 3755 0xc0029c8ce0 gate 1563590440715840100 evaluation succeeds" -"2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3756 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3757 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3758 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3759 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:40.718 UTC [msp.identity] Verify -> DEBU 375a Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:40.718 UTC [msp.identity] Verify -> DEBU 375b Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:40.719 UTC [msp.identity] Verify -> DEBU 375c Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:40.719 UTC [msp.identity] Verify -> DEBU 375d Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:40.720 UTC [msp] DeserializeIdentity -> DEBU 375e Obtaining identity" -"2019-07-20 02:40:40.720 UTC [msp] DeserializeIdentity -> DEBU 375f Obtaining identity" -"2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3760 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3761 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3762 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3763 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3764 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3765 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:40.720 UTC [cauthdsl] func1 -> DEBU 3766 0xc002f47300 gate 1563590440720911600 evaluation starts" -"2019-07-20 02:40:40.720 UTC [cauthdsl] func2 -> DEBU 3767 0xc002f47300 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 3768 0xc002f47300 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 3769 0xc002f47300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 376a 0xc002f47300 principal evaluation fails" -"2019-07-20 02:40:40.727 UTC [cauthdsl] func1 -> DEBU 376b 0xc002f47300 gate 1563590440720911600 evaluation fails" -"2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:40.727 UTC [cauthdsl] func1 -> DEBU 376f 0xc002f47b50 gate 1563590440727644500 evaluation starts" -"2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3770 0xc002f47b50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3771 0xc002f47b50 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3772 0xc002f47b50 principal matched by identity 0" -"2019-07-20 02:40:40.727 UTC [msp.identity] Verify -> DEBU 3773 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:40.727 UTC [msp.identity] Verify -> DEBU 3774 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:40.728 UTC [cauthdsl] func2 -> DEBU 3775 0xc002f47b50 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:40.728 UTC [cauthdsl] func1 -> DEBU 3776 0xc002f47b50 gate 1563590440727644500 evaluation succeeds" -"2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3777 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3778 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3779 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 377a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:40.728 UTC [gossip.gossip] handleMessage -> DEBU 377b Exiting" -"2019-07-20 02:40:40.746 UTC [msp] DeserializeIdentity -> DEBU 377c Obtaining identity" -"2019-07-20 02:40:40.747 UTC [msp] DeserializeIdentity -> DEBU 377d Obtaining identity" -"2019-07-20 02:40:40.748 UTC [gossip.pull] Hello -> DEBU 377e Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:40.748 UTC [msp] DeserializeIdentity -> DEBU 377f Obtaining identity" -"2019-07-20 02:40:40.749 UTC [msp] DeserializeIdentity -> DEBU 3780 Obtaining identity" -"2019-07-20 02:40:40.749 UTC [gossip.comm] Send -> DEBU 3781 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:40.750 UTC [gossip.comm] sendToEndpoint -> DEBU 3782 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.750 UTC [gossip.comm] sendToEndpoint -> DEBU 3783 Exiting" -"2019-07-20 02:40:40.751 UTC [gossip.comm] func1 -> DEBU 3784 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.751 UTC [gossip.gossip] handleMessage -> DEBU 3785 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.751 UTC [gossip.pull] HandleMessage -> DEBU 3786 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.751 UTC [gossip.gossip] handleMessage -> DEBU 3787 Exiting" -"2019-07-20 02:40:40.842 UTC [gossip.comm] func1 -> DEBU 3788 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.843 UTC [gossip.gossip] handleMessage -> DEBU 3789 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.843 UTC [msp] DeserializeIdentity -> DEBU 378a Obtaining identity" -"2019-07-20 02:40:40.843 UTC [msp] DeserializeIdentity -> DEBU 378b Obtaining identity" -"2019-07-20 02:40:40.843 UTC [gossip.gossip] handleMessage -> DEBU 378c Exiting" -"2019-07-20 02:40:40.881 UTC [gossip.comm] func1 -> DEBU 378d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.882 UTC [gossip.gossip] handleMessage -> DEBU 378e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.882 UTC [gossip.pull] HandleMessage -> DEBU 378f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:40.882 UTC [gossip.pull] SendDigest -> DEBU 3790 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:40.882 UTC [gossip.gossip] handleMessage -> DEBU 3791 Exiting" -"2019-07-20 02:40:41.008 UTC [gossip.comm] func1 -> DEBU 3792 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:41.008 UTC [gossip.gossip] handleMessage -> DEBU 3793 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3794 Obtaining identity" -"2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3795 Obtaining identity" -"2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3796 Obtaining identity" -"2019-07-20 02:40:41.009 UTC [gossip.gossip] handleMessage -> DEBU 3797 Exiting" -"2019-07-20 02:40:41.146 UTC [gossip.comm] func1 -> DEBU 3798 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:41.147 UTC [gossip.gossip] handleMessage -> DEBU 3799 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379a Obtaining identity" -"2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379b Obtaining identity" -"2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379c Obtaining identity" -"2019-07-20 02:40:41.148 UTC [gossip.gossip] handleMessage -> DEBU 379d Exiting" -"2019-07-20 02:40:41.977 UTC [gossip.election] waitForInterrupt -> DEBU 379e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:41.977 UTC [gossip.election] IsLeader -> DEBU 379f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:41.977 UTC [msp] GetDefaultSigningIdentity -> DEBU 37a0 Obtaining default signing identity" -"2019-07-20 02:40:41.977 UTC [msp.identity] Sign -> DEBU 37a1 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100D1801 " -"2019-07-20 02:40:41.978 UTC [msp.identity] Sign -> DEBU 37a2 Sign: digest: 90CF7BA600D99E7061E75602966A7ACEBD4D65E00E52CA59FBA09EBA2578E66C " -"2019-07-20 02:40:41.978 UTC [gossip.election] waitForInterrupt -> DEBU 37a3 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:41.982 UTC [gossip.comm] func1 -> DEBU 37a4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:41.982 UTC [gossip.gossip] handleMessage -> DEBU 37a5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:41.982 UTC [gossip.gossip] handleMessage -> DEBU 37a6 Exiting" -"2019-07-20 02:40:41.982 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:41.983 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37a8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:41.983 UTC [msp] DeserializeIdentity -> DEBU 37a9 Obtaining identity" -"2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ab Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ac Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:41.983 UTC [cauthdsl] func1 -> DEBU 37b0 0xc00379b440 gate 1563590441983735900 evaluation starts" -"2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b1 0xc00379b440 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b2 0xc00379b440 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b3 0xc00379b440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37b4 0xc00379b440 principal evaluation fails" -"2019-07-20 02:40:41.984 UTC [cauthdsl] func1 -> DEBU 37b5 0xc00379b440 gate 1563590441983735900 evaluation fails" -"2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:41.984 UTC [cauthdsl] func1 -> DEBU 37b9 0xc00379bc80 gate 1563590441984447200 evaluation starts" -"2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37ba 0xc00379bc80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37bb 0xc00379bc80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37bc 0xc00379bc80 principal matched by identity 0" -"2019-07-20 02:40:41.984 UTC [msp.identity] Verify -> DEBU 37bd Verify: digest = 00000000 6a d4 8c 78 44 12 7c 84 07 4f 31 f8 71 4b 46 8c |j..xD.|..O1.qKF.| -00000010 59 e9 55 6f cb 0a d5 40 e8 f3 82 ba 01 92 53 d7 |Y.Uo...@......S.|" -"2019-07-20 02:40:41.984 UTC [msp.identity] Verify -> DEBU 37be Verify: sig = 00000000 30 45 02 21 00 d1 61 2a 45 0d fb 73 e0 58 2a 80 |0E.!..a*E..s.X*.| -00000010 a0 53 59 88 00 24 11 25 b3 fa b1 59 ab 5f 88 84 |.SY..$.%...Y._..| -00000020 57 0b f9 a6 c2 02 20 10 64 04 4b 06 fe ec 7b 58 |W..... .d.K...{X| -00000030 2e f0 0a 57 ad fa bd d3 42 6b d8 1b 4f a9 9c 8e |...W....Bk..O...| -00000040 76 03 d0 44 2a 69 f7 |v..D*i.|" -"2019-07-20 02:40:41.985 UTC [cauthdsl] func2 -> DEBU 37bf 0xc00379bc80 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:41.985 UTC [cauthdsl] func1 -> DEBU 37c0 0xc00379bc80 gate 1563590441984447200 evaluation succeeds" -"2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c3 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:41.986 UTC [gossip.discovery] handleAliveMessage -> DEBU 37c5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c7 updating membership: timestamp: " -"2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c8 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:41.987 UTC [gossip.discovery] learnExistingMembers -> DEBU 37ca Exiting" -"2019-07-20 02:40:41.987 UTC [gossip.discovery] handleAliveMessage -> DEBU 37cb Exiting" -"2019-07-20 02:40:41.987 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37cc Exiting" -"2019-07-20 02:40:42.004 UTC [gossip.comm] func1 -> DEBU 37cd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.004 UTC [gossip.gossip] handleMessage -> DEBU 37ce Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.004 UTC [gossip.gossip] handleMessage -> DEBU 37cf Exiting" -"2019-07-20 02:40:42.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d1 Exiting" -"2019-07-20 02:40:42.007 UTC [gossip.comm] func1 -> DEBU 37d2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.007 UTC [gossip.gossip] handleMessage -> DEBU 37d3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.007 UTC [gossip.gossip] handleMessage -> DEBU 37d4 Exiting" -"2019-07-20 02:40:42.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d6 Exiting" -"2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d7 Obtaining identity" -"2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d8 Obtaining identity" -"2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d9 Obtaining identity" -"2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37da Obtaining identity" -"2019-07-20 02:40:42.007 UTC [gossip.comm] Send -> DEBU 37db Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37dc Obtaining identity" -"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37dd Obtaining identity" -"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37de Obtaining identity" -"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37df Obtaining identity" -"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e0 Obtaining identity" -"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e1 Obtaining identity" -"2019-07-20 02:40:42.008 UTC [gossip.comm] Send -> DEBU 37e2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e3 Obtaining identity" -"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e4 Obtaining identity" -"2019-07-20 02:40:42.008 UTC [gossip.comm] Send -> DEBU 37e5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e7 Exiting" -"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e9 Exiting" -"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37eb Exiting" -"2019-07-20 02:40:42.285 UTC [msp] GetDefaultSigningIdentity -> DEBU 37ec Obtaining default signing identity" -"2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37ed Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151029 " -"2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37ee Sign: digest: 94EFC5E19F8DD13AD2602D31D781B764FAB9DD7174490DFBF95DEC6967F5BDC4 " -"2019-07-20 02:40:42.286 UTC [msp] GetDefaultSigningIdentity -> DEBU 37ef Obtaining default signing identity" -"2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37f0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37f1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:42.286 UTC [gossip.discovery] periodicalSendAlive -> DEBU 37f2 Sleeping 5s" -"2019-07-20 02:40:42.297 UTC [msp] DeserializeIdentity -> DEBU 37f3 Obtaining identity" -"2019-07-20 02:40:42.298 UTC [msp] DeserializeIdentity -> DEBU 37f4 Obtaining identity" -"2019-07-20 02:40:42.298 UTC [msp] DeserializeIdentity -> DEBU 37f5 Obtaining identity" -"2019-07-20 02:40:42.298 UTC [gossip.comm] Send -> DEBU 37f6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:42.299 UTC [msp] DeserializeIdentity -> DEBU 37f7 Obtaining identity" -"2019-07-20 02:40:42.299 UTC [gossip.comm] Send -> DEBU 37f8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:42.299 UTC [gossip.comm] Send -> DEBU 37f9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:42.299 UTC [gossip.comm] sendToEndpoint -> DEBU 37fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.299 UTC [gossip.comm] sendToEndpoint -> DEBU 37fb Exiting" -"2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fd Exiting" -"2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37ff Exiting" -"2019-07-20 02:40:42.341 UTC [gossip.comm] func1 -> DEBU 3800 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.342 UTC [gossip.gossip] handleMessage -> DEBU 3801 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.342 UTC [gossip.gossip] handleMessage -> DEBU 3802 Exiting" -"2019-07-20 02:40:42.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3803 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.343 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3804 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:42.344 UTC [msp.identity] Verify -> DEBU 3805 Verify: digest = 00000000 6e 25 38 69 35 0a 9a dc 10 bb 95 88 85 ae 8f 00 |n%8i5...........| -00000010 ac be 7b 41 91 22 32 ef ff ac ef b4 6a 54 27 d7 |..{A."2.....jT'.|" -"2019-07-20 02:40:42.344 UTC [msp.identity] Verify -> DEBU 3806 Verify: sig = 00000000 30 44 02 20 3f 2a 3f 73 a4 52 9b 59 d6 ad d5 53 |0D. ?*?s.R.Y...S| -00000010 e4 6f 34 43 48 06 7a 71 0c 9a c2 bd 2d 7a 1a 29 |.o4CH.zq....-z.)| -00000020 c2 5f 21 fd 02 20 27 4f ba b8 95 b6 ff f8 ec b8 |._!.. 'O........| -00000030 ac 68 dd da f3 b4 bb 76 f4 0e 59 aa 66 14 6f 56 |.h.....v..Y.f.oV| -00000040 4a b8 dd f8 bc 62 |J....b|" -"2019-07-20 02:40:42.344 UTC [gossip.discovery] handleAliveMessage -> DEBU 3807 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3808 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3809 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380c Exiting" -"2019-07-20 02:40:42.344 UTC [gossip.discovery] handleAliveMessage -> DEBU 380d Exiting" -"2019-07-20 02:40:42.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 380e Exiting" -"2019-07-20 02:40:42.357 UTC [gossip.comm] func1 -> DEBU 380f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.357 UTC [gossip.gossip] handleMessage -> DEBU 3810 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.357 UTC [gossip.gossip] handleMessage -> DEBU 3811 Exiting" -"2019-07-20 02:40:42.357 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3812 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.357 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3813 Exiting" -"2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3814 Obtaining identity" -"2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3815 Obtaining identity" -"2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3816 Obtaining identity" -"2019-07-20 02:40:42.358 UTC [gossip.comm] Send -> DEBU 3817 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:42.358 UTC [gossip.comm] sendToEndpoint -> DEBU 3818 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.358 UTC [gossip.comm] sendToEndpoint -> DEBU 3819 Exiting" -"2019-07-20 02:40:42.386 UTC [gossip.comm] func1 -> DEBU 381a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.387 UTC [gossip.gossip] handleMessage -> DEBU 381b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.388 UTC [gossip.gossip] handleMessage -> DEBU 381c Exiting" -"2019-07-20 02:40:42.388 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.388 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381e Exiting" -"2019-07-20 02:40:42.389 UTC [msp] DeserializeIdentity -> DEBU 381f Obtaining identity" -"2019-07-20 02:40:42.390 UTC [gossip.comm] Send -> DEBU 3820 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:42.390 UTC [gossip.comm] sendToEndpoint -> DEBU 3821 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.390 UTC [gossip.comm] sendToEndpoint -> DEBU 3822 Exiting" -"2019-07-20 02:40:42.531 UTC [gossip.comm] func1 -> DEBU 3823 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.532 UTC [gossip.gossip] handleMessage -> DEBU 3824 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.532 UTC [gossip.gossip] handleMessage -> DEBU 3825 Exiting" -"2019-07-20 02:40:42.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3826 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3827 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:42.532 UTC [msp] DeserializeIdentity -> DEBU 3828 Obtaining identity" -"2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3829 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382a Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382b Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:42.532 UTC [cauthdsl] func1 -> DEBU 382f 0xc003efbca0 gate 1563590442532929200 evaluation starts" -"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3830 0xc003efbca0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3831 0xc003efbca0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3832 0xc003efbca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3833 0xc003efbca0 principal evaluation fails" -"2019-07-20 02:40:42.533 UTC [cauthdsl] func1 -> DEBU 3834 0xc003efbca0 gate 1563590442532929200 evaluation fails" -"2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3835 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3836 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3837 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:42.533 UTC [cauthdsl] func1 -> DEBU 3838 0xc003e724e0 gate 1563590442533746600 evaluation starts" -"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3839 0xc003e724e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 383a 0xc003e724e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 383b 0xc003e724e0 principal matched by identity 0" -"2019-07-20 02:40:42.534 UTC [msp.identity] Verify -> DEBU 383c Verify: digest = 00000000 93 21 6e 6e 92 29 b5 ae 81 18 25 f6 6e 7c 1c 5d |.!nn.)....%.n|.]| -00000010 73 1d 71 0b 62 1d c3 f4 41 1e b3 69 99 7e 47 fa |s.q.b...A..i.~G.|" -"2019-07-20 02:40:42.534 UTC [msp.identity] Verify -> DEBU 383d Verify: sig = 00000000 30 44 02 20 6a 4e e2 fb d7 02 f9 ef 09 ec a2 f4 |0D. jN..........| -00000010 54 a3 d2 b1 5f cf b8 f8 c4 07 15 2c 36 b5 a2 f3 |T..._......,6...| -00000020 52 e7 11 24 02 20 6a 73 aa ea 6b 9b c2 56 de 5c |R..$. js..k..V.\| -00000030 64 6b a0 6d 38 4e d9 ea 0c 2c 50 ff a0 eb 3f 7c |dk.m8N...,P...?|| -00000040 0b 96 59 e7 42 30 |..Y.B0|" -"2019-07-20 02:40:42.534 UTC [cauthdsl] func2 -> DEBU 383e 0xc003e724e0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:42.534 UTC [cauthdsl] func1 -> DEBU 383f 0xc003e724e0 gate 1563590442533746600 evaluation succeeds" -"2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3840 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3841 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3842 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3843 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:42.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 3844 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3845 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3846 updating membership: timestamp: " -"2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3847 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:42.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3848 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:42.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3849 Exiting" -"2019-07-20 02:40:42.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 384a Exiting" -"2019-07-20 02:40:42.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384b Exiting" -"2019-07-20 02:40:42.539 UTC [gossip.comm] func1 -> DEBU 384c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.540 UTC [gossip.gossip] handleMessage -> DEBU 384d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.540 UTC [gossip.gossip] handleMessage -> DEBU 384e Exiting" -"2019-07-20 02:40:42.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3850 Exiting" -"2019-07-20 02:40:42.544 UTC [msp] DeserializeIdentity -> DEBU 3851 Obtaining identity" -"2019-07-20 02:40:42.544 UTC [msp] DeserializeIdentity -> DEBU 3852 Obtaining identity" -"2019-07-20 02:40:42.552 UTC [msp] DeserializeIdentity -> DEBU 3853 Obtaining identity" -"2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3854 Obtaining identity" -"2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3855 Obtaining identity" -"2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3856 Obtaining identity" -"2019-07-20 02:40:42.553 UTC [gossip.comm] Send -> DEBU 3857 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:42.554 UTC [msp] DeserializeIdentity -> DEBU 3858 Obtaining identity" -"2019-07-20 02:40:42.554 UTC [msp] DeserializeIdentity -> DEBU 3859 Obtaining identity" -"2019-07-20 02:40:42.561 UTC [gossip.comm] func1 -> DEBU 385a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.561 UTC [gossip.gossip] handleMessage -> DEBU 385b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.566 UTC [gossip.gossip] handleMessage -> DEBU 385c Exiting" -"2019-07-20 02:40:42.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385e Exiting" -"2019-07-20 02:40:42.567 UTC [gossip.comm] Send -> DEBU 385f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3860 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3861 Exiting" -"2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3862 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:42.570 UTC [gossip.comm] sendToEndpoint -> DEBU 3863 Exiting" -"2019-07-20 02:40:43.903 UTC [gossip.comm] func1 -> DEBU 3864 Got message: GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:43.905 UTC [gossip.gossip] handleMessage -> DEBU 3865 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:43.905 UTC [gossip.gossip] handleMessage -> DEBU 3866 Exiting" -"2019-07-20 02:40:43.906 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3867 Got message: GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:43.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3868 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:43.909 UTC [msp] DeserializeIdentity -> DEBU 3869 Obtaining identity" -"2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 386a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 386b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 386c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:43.909 UTC [cauthdsl] func1 -> DEBU 3870 0xc002fc40e0 gate 1563590443909523300 evaluation starts" -"2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3871 0xc002fc40e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3872 0xc002fc40e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3873 0xc002fc40e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3874 0xc002fc40e0 principal evaluation fails" -"2019-07-20 02:40:43.909 UTC [cauthdsl] func1 -> DEBU 3875 0xc002fc40e0 gate 1563590443909523300 evaluation fails" -"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3876 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3877 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3878 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:43.918 UTC [cauthdsl] func1 -> DEBU 3879 0xc002fc4920 gate 1563590443909926800 evaluation starts" -"2019-07-20 02:40:43.918 UTC [cauthdsl] func2 -> DEBU 387a 0xc002fc4920 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:43.918 UTC [cauthdsl] func2 -> DEBU 387b 0xc002fc4920 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:43.919 UTC [cauthdsl] func2 -> DEBU 387c 0xc002fc4920 principal matched by identity 0" -"2019-07-20 02:40:43.919 UTC [msp.identity] Verify -> DEBU 387d Verify: digest = 00000000 db 1e 58 a0 2e 84 8b 40 86 92 99 d2 3c d1 0b 66 |..X....@....<..f| -00000010 47 2a 64 fb fa 81 51 a5 82 be 82 74 ca 2d dd a4 |G*d...Q....t.-..|" -"2019-07-20 02:40:43.919 UTC [msp.identity] Verify -> DEBU 387e Verify: sig = 00000000 30 44 02 20 3f 84 cf d6 31 37 7e 96 5c 08 97 05 |0D. ?...17~.\...| -00000010 d6 9a 91 15 bd a6 85 4d cf 35 4f 48 c4 19 e2 35 |.......M.5OH...5| -00000020 8c 42 2b 54 02 20 69 a7 da bb c9 3e 28 8e ec 79 |.B+T. i....>(..y| -00000030 29 6f ba 9d 15 bc 0f a6 a4 c0 1a 2b 67 77 0e 77 |)o.........+gw.w| -00000040 34 ca 7e d9 29 ed |4.~.).|" -"2019-07-20 02:40:43.923 UTC [cauthdsl] func2 -> DEBU 387f 0xc002fc4920 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:43.925 UTC [cauthdsl] func1 -> DEBU 3880 0xc002fc4920 gate 1563590443909926800 evaluation succeeds" -"2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3881 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3883 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3884 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:43.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 3885 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3886 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3887 updating membership: timestamp: " -"2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3888 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:43.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 3889 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:43.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 388a Exiting" -"2019-07-20 02:40:43.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 388b Exiting" -"2019-07-20 02:40:43.928 UTC [gossip.discovery] sendMemResponse -> DEBU 388c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:43.928 UTC [msp] DeserializeIdentity -> DEBU 388d Obtaining identity" -"2019-07-20 02:40:43.946 UTC [gossip.comm] func1 -> DEBU 388e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:43.946 UTC [gossip.gossip] handleMessage -> DEBU 388f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:43.946 UTC [gossip.pull] HandleMessage -> DEBU 3890 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3891 Obtaining identity" -"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3892 Obtaining identity" -"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3893 Obtaining identity" -"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3894 Obtaining identity" -"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3895 Obtaining identity" -"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3896 Obtaining identity" -"2019-07-20 02:40:43.946 UTC [gossip.pull] SendDigest -> DEBU 3897 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:43.946 UTC [gossip.gossip] handleMessage -> DEBU 3898 Exiting" -"2019-07-20 02:40:43.929 UTC [msp] DeserializeIdentity -> DEBU 3899 Obtaining identity" -"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 389a Obtaining identity" -"2019-07-20 02:40:43.946 UTC [gossip.comm] Send -> DEBU 389b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:43.947 UTC [gossip.discovery] sendMemResponse -> DEBU 389c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020-" signature:"0D\002 ?*?s\244R\233Y\326\255\325S\344o4CH\006zq\014\232\302\275-z\032)\302_!\375\002 'O\272\270\225\266\377\370\354\270\254h\335\332\363\264\273v\364\016Y\252f\024oVJ\270\335\370\274b" > alive: alive:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > alive:9\232\322V\2358\311\017}\365J" > " -"2019-07-20 02:40:43.947 UTC [gossip.comm] sendToEndpoint -> DEBU 389d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:43.947 UTC [gossip.comm] sendToEndpoint -> DEBU 389e Exiting" -"2019-07-20 02:40:43.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 389f Exiting" -"2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a0 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a2 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a4 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a7 Exiting" -"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a9 Exiting" -"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38aa Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38ab Exiting" -"2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38ac Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38ae GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38af Exiting" -"2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38b0 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b1 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38b2 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b3 Exiting" -"2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38b4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38b6 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.238 UTC [gossip.gossip] handleMessage -> DEBU 38b7 Exiting" -"2019-07-20 02:40:44.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 38b8 Obtaining default signing identity" -"2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38b9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915102A " -"2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38ba Sign: digest: 78526B430FABB76C2F0EFFB53CC4A7E03B04B1CF0637703092B63814E852806D " -"2019-07-20 02:40:44.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 38bb Obtaining default signing identity" -"2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38bc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38bd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:44.277 UTC [gossip.comm] Send -> DEBU 38be Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" secret_envelope:\032+\375\200'\340\023\034}\215\312\323\317b\274\332\205\002 L\325HG^l\224\006E'\373\226\210\022WM\243\225\252\332\306\372Qc\010P\307\343\377,a\201" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:44.277 UTC [msp] DeserializeIdentity -> DEBU 38bf Obtaining identity" -"2019-07-20 02:40:44.277 UTC [gossip.comm] Send -> DEBU 38c0 Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:44.278 UTC [msp] DeserializeIdentity -> DEBU 38c1 Obtaining identity" -"2019-07-20 02:40:44.278 UTC [gossip.comm] Send -> DEBU 38c2 Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c4 Exiting" -"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" secret_envelope:\032+\375\200'\340\023\034}\215\312\323\317b\274\332\205\002 L\325HG^l\224\006E'\373\226\210\022WM\243\225\252\332\306\372Qc\010P\307\343\377,a\201" > > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c6 Exiting" -"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c8 Exiting" -"2019-07-20 02:40:44.281 UTC [gossip.comm] func1 -> DEBU 38c9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.282 UTC [gossip.gossip] handleMessage -> DEBU 38ca Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.282 UTC [gossip.gossip] handleMessage -> DEBU 38cb Exiting" -"2019-07-20 02:40:44.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38cc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38cd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38ce Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| -00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" -"2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38cf Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| -00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| -00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| -00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| -00000040 4d 0b be 53 34 dd 71 |M..S4.q|" -"2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38d0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38d1 Verify: sig = 00000000 30 45 02 21 00 e8 97 b9 e2 df a3 5b 1a 44 d3 d2 |0E.!.......[.D..| -00000010 14 6b 2c 3e 1a 2b fd 80 27 e0 13 1c 7d 8d ca d3 |.k,>.+..'...}...| -00000020 cf 62 bc da 85 02 20 4c d5 48 47 5e 6c 94 06 45 |.b.... L.HG^l..E| -00000030 27 fb 96 88 12 57 4d a3 95 aa da c6 fa 51 63 08 |'....WM......Qc.| -00000040 50 c7 e3 ff 2c 61 81 |P...,a.|" -"2019-07-20 02:40:44.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 38d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:44.282 UTC [gossip.discovery] isSentByMe -> DEBU 38d3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:44.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 38d4 Exiting" -"2019-07-20 02:40:44.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d5 Exiting" -"2019-07-20 02:40:44.283 UTC [gossip.comm] func1 -> DEBU 38d6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.283 UTC [gossip.gossip] handleMessage -> DEBU 38d7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.283 UTC [gossip.gossip] handleMessage -> DEBU 38d8 Exiting" -"2019-07-20 02:40:44.283 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.283 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38da Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:44.283 UTC [msp.identity] Verify -> DEBU 38db Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| -00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" -"2019-07-20 02:40:44.283 UTC [msp.identity] Verify -> DEBU 38dc Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| -00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| -00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| -00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| -00000040 4d 0b be 53 34 dd 71 |M..S4.q|" -"2019-07-20 02:40:44.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 38dd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:44.283 UTC [gossip.discovery] isSentByMe -> DEBU 38de Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:44.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 38df Exiting" -"2019-07-20 02:40:44.283 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38e0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:44.283 UTC [msp] DeserializeIdentity -> DEBU 38e1 Obtaining identity" -"2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38e2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38e3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38e4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38e8 0xc0032ae3f0 gate 1563590444284004900 evaluation starts" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38e9 0xc0032ae3f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38ea 0xc0032ae3f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38eb 0xc0032ae3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38ec 0xc0032ae3f0 principal evaluation fails" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38ed 0xc0032ae3f0 gate 1563590444284004900 evaluation fails" -"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38ee Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38f1 0xc0032aec30 gate 1563590444284337300 evaluation starts" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f2 0xc0032aec30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f3 0xc0032aec30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f4 0xc0032aec30 principal matched by identity 0" -"2019-07-20 02:40:44.284 UTC [msp.identity] Verify -> DEBU 38f5 Verify: digest = 00000000 db 1e 58 a0 2e 84 8b 40 86 92 99 d2 3c d1 0b 66 |..X....@....<..f| -00000010 47 2a 64 fb fa 81 51 a5 82 be 82 74 ca 2d dd a4 |G*d...Q....t.-..|" -"2019-07-20 02:40:44.284 UTC [msp.identity] Verify -> DEBU 38f6 Verify: sig = 00000000 30 44 02 20 3f 84 cf d6 31 37 7e 96 5c 08 97 05 |0D. ?...17~.\...| -00000010 d6 9a 91 15 bd a6 85 4d cf 35 4f 48 c4 19 e2 35 |.......M.5OH...5| -00000020 8c 42 2b 54 02 20 69 a7 da bb c9 3e 28 8e ec 79 |.B+T. i....>(..y| -00000030 29 6f ba 9d 15 bc 0f a6 a4 c0 1a 2b 67 77 0e 77 |)o.........+gw.w| -00000040 34 ca 7e d9 29 ed |4.~.).|" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f7 0xc0032aec30 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38f8 0xc0032aec30 gate 1563590444284337300 evaluation succeeds" -"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38f9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fb Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:44.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 38fd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:44.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 38fe Exiting" -"2019-07-20 02:40:44.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ff Exiting" -"2019-07-20 02:40:44.285 UTC [gossip.comm] func1 -> DEBU 3900 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.285 UTC [gossip.gossip] handleMessage -> DEBU 3901 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.285 UTC [gossip.gossip] handleMessage -> DEBU 3902 Exiting" -"2019-07-20 02:40:44.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3903 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3904 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:44.285 UTC [msp.identity] Verify -> DEBU 3905 Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| -00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" -"2019-07-20 02:40:44.285 UTC [msp.identity] Verify -> DEBU 3906 Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| -00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| -00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| -00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| -00000040 4d 0b be 53 34 dd 71 |M..S4.q|" -"2019-07-20 02:40:44.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3907 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:44.285 UTC [gossip.discovery] isSentByMe -> DEBU 3908 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:44.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3909 Exiting" -"2019-07-20 02:40:44.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 390a Exiting" -"2019-07-20 02:40:44.336 UTC [gossip.comm] func1 -> DEBU 390b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.336 UTC [gossip.gossip] handleMessage -> DEBU 390c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.336 UTC [gossip.pull] HandleMessage -> DEBU 390d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.336 UTC [gossip.pull] SendDigest -> DEBU 390e Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:44.336 UTC [gossip.gossip] handleMessage -> DEBU 390f Exiting" -"2019-07-20 02:40:44.360 UTC [gossip.comm] func1 -> DEBU 3910 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.360 UTC [gossip.gossip] handleMessage -> DEBU 3911 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.360 UTC [gossip.gossip] handleMessage -> DEBU 3912 Exiting" -"2019-07-20 02:40:44.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3913 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3914 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:44.361 UTC [msp.identity] Verify -> DEBU 3915 Verify: digest = 00000000 05 fc fa 54 47 c8 42 70 a1 2b 49 aa 1c dd b7 c0 |...TG.Bp.+I.....| -00000010 1a af a2 74 05 76 a0 14 ba 99 56 3a 2a 67 0f 2e |...t.v....V:*g..|" -"2019-07-20 02:40:44.361 UTC [msp.identity] Verify -> DEBU 3916 Verify: sig = 00000000 30 44 02 20 16 00 3f 59 47 5f 23 40 41 9e 56 ac |0D. ..?YG_#@A.V.| -00000010 c9 2c ed db 73 62 b0 08 7b b0 bd 5c cd 34 9f 00 |.,..sb..{..\.4..| -00000020 83 da e2 5c 02 20 7c 3f de 43 69 c1 a9 7b 57 ee |...\. |?.Ci..{W.| -00000030 a9 5f 73 72 2e bf 10 e7 b2 88 d2 09 eb ea 82 04 |._sr............| -00000040 80 3e 04 d5 ec 6b |.>...k|" -"2019-07-20 02:40:44.362 UTC [msp.identity] Verify -> DEBU 3917 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:44.362 UTC [msp.identity] Verify -> DEBU 3918 Verify: sig = 00000000 30 44 02 20 4a 5a 26 af 1f 21 e7 0f c9 b0 4a 42 |0D. JZ&..!....JB| -00000010 7a 0b bd d6 37 7a 7e b6 56 a2 1a 1b 6f 45 e9 c4 |z...7z~.V...oE..| -00000020 25 69 04 88 02 20 5d 50 f8 7b dc fd 7a 5f e6 3e |%i... ]P.{..z_.>| -00000030 ed df de 7e b9 de 0b be 88 fe cc 91 6e 44 c3 4f |...~........nD.O| -00000040 4d 88 17 b9 07 4b |M....K|" -"2019-07-20 02:40:44.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 3919 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:44.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 391a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:40:44.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 391b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391e Exiting" -"2019-07-20 02:40:44.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 391f Exiting" -"2019-07-20 02:40:44.367 UTC [gossip.discovery] sendMemResponse -> DEBU 3920 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:44.367 UTC [msp] DeserializeIdentity -> DEBU 3921 Obtaining identity" -"2019-07-20 02:40:44.368 UTC [msp] DeserializeIdentity -> DEBU 3922 Obtaining identity" -"2019-07-20 02:40:44.368 UTC [gossip.comm] Send -> DEBU 3923 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:44.368 UTC [gossip.discovery] sendMemResponse -> DEBU 3924 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > alive:9\232\322V\2358\311\017}\365J" > " -"2019-07-20 02:40:44.368 UTC [gossip.comm] sendToEndpoint -> DEBU 3925 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.368 UTC [gossip.comm] sendToEndpoint -> DEBU 3926 Exiting" -"2019-07-20 02:40:44.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3927 Exiting" -"2019-07-20 02:40:44.594 UTC [gossip.comm] func1 -> DEBU 3928 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.594 UTC [gossip.gossip] handleMessage -> DEBU 3929 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.595 UTC [gossip.pull] HandleMessage -> DEBU 392a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.595 UTC [msp] DeserializeIdentity -> DEBU 392b Obtaining identity" -"2019-07-20 02:40:44.597 UTC [msp] DeserializeIdentity -> DEBU 392c Obtaining identity" -"2019-07-20 02:40:44.597 UTC [msp] DeserializeIdentity -> DEBU 392d Obtaining identity" -"2019-07-20 02:40:44.600 UTC [msp] DeserializeIdentity -> DEBU 392e Obtaining identity" -"2019-07-20 02:40:44.600 UTC [msp] DeserializeIdentity -> DEBU 392f Obtaining identity" -"2019-07-20 02:40:44.601 UTC [msp] DeserializeIdentity -> DEBU 3930 Obtaining identity" -"2019-07-20 02:40:44.601 UTC [gossip.pull] SendDigest -> DEBU 3931 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:44.601 UTC [gossip.gossip] handleMessage -> DEBU 3932 Exiting" -"2019-07-20 02:40:44.625 UTC [gossip.comm] func1 -> DEBU 3933 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.635 UTC [gossip.gossip] handleMessage -> DEBU 3934 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3935 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3936 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:44.635 UTC [msp] DeserializeIdentity -> DEBU 3937 Obtaining identity" -"2019-07-20 02:40:44.636 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3938 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:44.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3939 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 393a Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:44.638 UTC [cauthdsl] func1 -> DEBU 393e 0xc003c94b80 gate 1563590444637999900 evaluation starts" -"2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 393f 0xc003c94b80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3940 0xc003c94b80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3941 0xc003c94b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3942 0xc003c94b80 principal evaluation fails" -"2019-07-20 02:40:44.639 UTC [cauthdsl] func1 -> DEBU 3943 0xc003c94b80 gate 1563590444637999900 evaluation fails" -"2019-07-20 02:40:44.639 UTC [policies] Evaluate -> DEBU 3944 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.639 UTC [policies] Evaluate -> DEBU 3945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.640 UTC [policies] Evaluate -> DEBU 3946 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:44.640 UTC [cauthdsl] func1 -> DEBU 3947 0xc003c953c0 gate 1563590444640125400 evaluation starts" -"2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 3948 0xc003c953c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 3949 0xc003c953c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 394a 0xc003c953c0 principal matched by identity 0" -"2019-07-20 02:40:44.641 UTC [msp.identity] Verify -> DEBU 394b Verify: digest = 00000000 3b 74 8c 70 3a 0e 1a b2 79 e8 52 db fa 61 da 07 |;t.p:...y.R..a..| -00000010 d8 78 6d 5f 67 5f d6 5e 95 7c 35 77 12 57 28 f2 |.xm_g_.^.|5w.W(.|" -"2019-07-20 02:40:44.641 UTC [msp.identity] Verify -> DEBU 394c Verify: sig = 00000000 30 45 02 21 00 f8 a2 a3 57 f1 f9 29 1d 8b b4 9a |0E.!....W..)....| -00000010 88 f8 52 f4 5f e9 b9 2e f4 00 2f 5a 4d e9 e9 3d |..R._...../ZM..=| -00000020 aa 15 ec f7 9f 02 20 43 22 09 5b 58 7e d9 95 a9 |...... C".[X~...| -00000030 6a 44 46 1c b3 33 57 bf 36 30 1e 29 0a 65 ab f8 |jDF..3W.60.).e..| -00000040 e0 c6 6b fc 4e 97 cc |..k.N..|" -"2019-07-20 02:40:44.642 UTC [cauthdsl] func2 -> DEBU 394e 0xc003c953c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:44.643 UTC [cauthdsl] func1 -> DEBU 394f 0xc003c953c0 gate 1563590444640125400 evaluation succeeds" -"2019-07-20 02:40:44.635 UTC [gossip.gossip] handleMessage -> DEBU 394d Exiting" -"2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3950 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3951 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3952 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3953 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:44.644 UTC [gossip.discovery] handleAliveMessage -> DEBU 3954 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:44.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 3955 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3956 updating membership: timestamp: " -"2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3957 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3958 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3959 Exiting" -"2019-07-20 02:40:44.652 UTC [gossip.discovery] handleAliveMessage -> DEBU 395a Exiting" -"2019-07-20 02:40:44.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 395b Exiting" -"2019-07-20 02:40:44.652 UTC [gossip.discovery] sendMemResponse -> DEBU 395c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:44.653 UTC [msp] DeserializeIdentity -> DEBU 395d Obtaining identity" -"2019-07-20 02:40:44.654 UTC [msp] DeserializeIdentity -> DEBU 395e Obtaining identity" -"2019-07-20 02:40:44.654 UTC [msp] DeserializeIdentity -> DEBU 395f Obtaining identity" -"2019-07-20 02:40:44.654 UTC [gossip.comm] Send -> DEBU 3960 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:44.655 UTC [gossip.discovery] sendMemResponse -> DEBU 3961 Exiting, replying with alive: alive:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" > alive:9\232\322V\2358\311\017}\365J" > " -"2019-07-20 02:40:44.655 UTC [gossip.comm] sendToEndpoint -> DEBU 3962 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.655 UTC [gossip.comm] sendToEndpoint -> DEBU 3963 Exiting" -"2019-07-20 02:40:44.682 UTC [msp] DeserializeIdentity -> DEBU 3964 Obtaining identity" -"2019-07-20 02:40:44.682 UTC [msp] DeserializeIdentity -> DEBU 3965 Obtaining identity" -"2019-07-20 02:40:44.683 UTC [gossip.comm] Send -> DEBU 3966 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3967 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3968 Exiting" -"2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3969 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 396a Exiting" -"2019-07-20 02:40:44.684 UTC [gossip.comm] sendToEndpoint -> DEBU 396b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.684 UTC [gossip.comm] sendToEndpoint -> DEBU 396c Exiting" -"2019-07-20 02:40:44.685 UTC [gossip.comm] func1 -> DEBU 396d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.685 UTC [gossip.gossip] handleMessage -> DEBU 396e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 396f Obtaining identity" -"2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 3970 Obtaining identity" -"2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 3971 Obtaining identity" -"2019-07-20 02:40:44.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3972 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:44.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3973 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3974 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3975 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3976 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3977 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:44.688 UTC [cauthdsl] func1 -> DEBU 3978 0xc0032b4e30 gate 1563590444688095000 evaluation starts" -"2019-07-20 02:40:44.688 UTC [cauthdsl] func2 -> DEBU 3979 0xc0032b4e30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.688 UTC [cauthdsl] func2 -> DEBU 397a 0xc0032b4e30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.693 UTC [cauthdsl] func2 -> DEBU 397d 0xc0032b4e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 397e 0xc0032b4e30 principal evaluation fails" -"2019-07-20 02:40:44.694 UTC [cauthdsl] func1 -> DEBU 397f 0xc0032b4e30 gate 1563590444688095000 evaluation fails" -"2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3980 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3981 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3982 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:44.694 UTC [cauthdsl] func1 -> DEBU 3983 0xc0032b5670 gate 1563590444694800600 evaluation starts" -"2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 3984 0xc0032b5670 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 3985 0xc0032b5670 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.695 UTC [cauthdsl] func2 -> DEBU 3986 0xc0032b5670 principal matched by identity 0" -"2019-07-20 02:40:44.695 UTC [msp.identity] Verify -> DEBU 3987 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:44.695 UTC [msp.identity] Verify -> DEBU 3988 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:44.695 UTC [cauthdsl] func2 -> DEBU 3989 0xc0032b5670 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:44.695 UTC [cauthdsl] func1 -> DEBU 398a 0xc0032b5670 gate 1563590444694800600 evaluation succeeds" -"2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 398f Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3990 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3991 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3992 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:44.696 UTC [msp] DeserializeIdentity -> DEBU 3993 Obtaining identity" -"2019-07-20 02:40:44.697 UTC [msp] DeserializeIdentity -> DEBU 3994 Obtaining identity" -"2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3995 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3996 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3997 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 3998 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 3999 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 399a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:44.697 UTC [cauthdsl] func1 -> DEBU 399b 0xc003331c80 gate 1563590444697832100 evaluation starts" -"2019-07-20 02:40:44.697 UTC [cauthdsl] func2 -> DEBU 399c 0xc003331c80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399d 0xc003331c80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399e 0xc003331c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399f 0xc003331c80 principal evaluation fails" -"2019-07-20 02:40:44.698 UTC [cauthdsl] func1 -> DEBU 39a0 0xc003331c80 gate 1563590444697832100 evaluation fails" -"2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:44.698 UTC [cauthdsl] func1 -> DEBU 39a4 0xc0033ce4c0 gate 1563590444698460000 evaluation starts" -"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a5 0xc0033ce4c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a6 0xc0033ce4c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a7 0xc0033ce4c0 principal matched by identity 0" -"2019-07-20 02:40:44.698 UTC [msp.identity] Verify -> DEBU 39a8 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:44.698 UTC [msp.identity] Verify -> DEBU 39a9 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:44.699 UTC [cauthdsl] func2 -> DEBU 39aa 0xc0033ce4c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:44.699 UTC [cauthdsl] func1 -> DEBU 39ab 0xc0033ce4c0 gate 1563590444698460000 evaluation succeeds" -"2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ae Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:44.699 UTC [gossip.gossip] handleMessage -> DEBU 39b0 Exiting" -"2019-07-20 02:40:44.690 UTC [gossip.comm] func1 -> DEBU 397b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.699 UTC [gossip.gossip] handleMessage -> DEBU 39b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b2 Obtaining identity" -"2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b3 Obtaining identity" -"2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b4 Obtaining identity" -"2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b6 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b7 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.700 UTC [policies] Evaluate -> DEBU 39b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:44.701 UTC [policies] Evaluate -> DEBU 39b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:44.701 UTC [policies] Evaluate -> DEBU 39ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:44.701 UTC [cauthdsl] func1 -> DEBU 39bb 0xc0033cffe0 gate 1563590444701730900 evaluation starts" -"2019-07-20 02:40:44.690 UTC [gossip.comm] func1 -> DEBU 397c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.704 UTC [cauthdsl] func2 -> DEBU 39bc 0xc0033cffe0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39bd 0xc0033cffe0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39be 0xc0033cffe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39bf 0xc0033cffe0 principal evaluation fails" -"2019-07-20 02:40:44.705 UTC [cauthdsl] func1 -> DEBU 39c0 0xc0033cffe0 gate 1563590444701730900 evaluation fails" -"2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:44.705 UTC [cauthdsl] func1 -> DEBU 39c4 0xc003f056c0 gate 1563590444705686500 evaluation starts" -"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c5 0xc003f056c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c6 0xc003f056c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c7 0xc003f056c0 principal matched by identity 0" -"2019-07-20 02:40:44.705 UTC [msp.identity] Verify -> DEBU 39c8 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:44.705 UTC [msp.identity] Verify -> DEBU 39c9 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:44.706 UTC [cauthdsl] func2 -> DEBU 39ca 0xc003f056c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:44.706 UTC [cauthdsl] func1 -> DEBU 39cb 0xc003f056c0 gate 1563590444705686500 evaluation succeeds" -"2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39ce Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d0 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d1 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d2 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d3 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:44.706 UTC [msp] DeserializeIdentity -> DEBU 39d4 Obtaining identity" -"2019-07-20 02:40:44.706 UTC [msp] DeserializeIdentity -> DEBU 39d5 Obtaining identity" -"2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39d6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39d7 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39d8 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:44.707 UTC [cauthdsl] func1 -> DEBU 39dc 0xc003423cd0 gate 1563590444707234900 evaluation starts" -"2019-07-20 02:40:44.708 UTC [cauthdsl] func2 -> DEBU 39dd 0xc003423cd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.708 UTC [cauthdsl] func2 -> DEBU 39de 0xc003423cd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.709 UTC [cauthdsl] func2 -> DEBU 39df 0xc003423cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:44.709 UTC [cauthdsl] func2 -> DEBU 39e0 0xc003423cd0 principal evaluation fails" -"2019-07-20 02:40:44.709 UTC [cauthdsl] func1 -> DEBU 39e1 0xc003423cd0 gate 1563590444707234900 evaluation fails" -"2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:44.710 UTC [cauthdsl] func1 -> DEBU 39e5 0xc003502510 gate 1563590444710199200 evaluation starts" -"2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e6 0xc003502510 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e7 0xc003502510 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e8 0xc003502510 principal matched by identity 0" -"2019-07-20 02:40:44.711 UTC [msp.identity] Verify -> DEBU 39e9 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:44.711 UTC [msp.identity] Verify -> DEBU 39ea Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:44.712 UTC [cauthdsl] func2 -> DEBU 39eb 0xc003502510 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:44.712 UTC [cauthdsl] func1 -> DEBU 39ec 0xc003502510 gate 1563590444710199200 evaluation succeeds" -"2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ef Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:44.712 UTC [gossip.gossip] handleMessage -> DEBU 39f1 Exiting" -"2019-07-20 02:40:44.713 UTC [gossip.gossip] handleMessage -> DEBU 39f2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.713 UTC [msp.identity] Verify -> DEBU 39f3 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f4 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f5 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f6 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:44.715 UTC [msp] DeserializeIdentity -> DEBU 39f7 Obtaining identity" -"2019-07-20 02:40:44.715 UTC [msp] DeserializeIdentity -> DEBU 39f8 Obtaining identity" -"2019-07-20 02:40:44.716 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:44.716 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39fa Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39fb Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.717 UTC [policies] Evaluate -> DEBU 39fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:44.717 UTC [policies] Evaluate -> DEBU 39fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:44.718 UTC [policies] Evaluate -> DEBU 39fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:44.718 UTC [cauthdsl] func1 -> DEBU 39ff 0xc00350ed60 gate 1563590444718592300 evaluation starts" -"2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a00 0xc00350ed60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a01 0xc00350ed60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a02 0xc00350ed60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a03 0xc00350ed60 principal evaluation fails" -"2019-07-20 02:40:44.719 UTC [cauthdsl] func1 -> DEBU 3a04 0xc00350ed60 gate 1563590444718592300 evaluation fails" -"2019-07-20 02:40:44.720 UTC [policies] Evaluate -> DEBU 3a05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.720 UTC [policies] Evaluate -> DEBU 3a06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.721 UTC [policies] Evaluate -> DEBU 3a07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:44.721 UTC [cauthdsl] func1 -> DEBU 3a08 0xc00350f5a0 gate 1563590444721413600 evaluation starts" -"2019-07-20 02:40:44.721 UTC [cauthdsl] func2 -> DEBU 3a09 0xc00350f5a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.722 UTC [cauthdsl] func2 -> DEBU 3a0a 0xc00350f5a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.722 UTC [cauthdsl] func2 -> DEBU 3a0b 0xc00350f5a0 principal matched by identity 0" -"2019-07-20 02:40:44.722 UTC [msp.identity] Verify -> DEBU 3a0c Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:44.722 UTC [msp.identity] Verify -> DEBU 3a0d Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:44.723 UTC [cauthdsl] func2 -> DEBU 3a0e 0xc00350f5a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:44.723 UTC [cauthdsl] func1 -> DEBU 3a0f 0xc00350f5a0 gate 1563590444721413600 evaluation succeeds" -"2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a12 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:44.725 UTC [msp] DeserializeIdentity -> DEBU 3a14 Obtaining identity" -"2019-07-20 02:40:44.725 UTC [msp] DeserializeIdentity -> DEBU 3a15 Obtaining identity" -"2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a17 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a18 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:44.728 UTC [cauthdsl] func1 -> DEBU 3a1c 0xc003606d70 gate 1563590444728548600 evaluation starts" -"2019-07-20 02:40:44.728 UTC [cauthdsl] func2 -> DEBU 3a1d 0xc003606d70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.729 UTC [cauthdsl] func2 -> DEBU 3a1e 0xc003606d70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.729 UTC [cauthdsl] func2 -> DEBU 3a1f 0xc003606d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:44.730 UTC [cauthdsl] func2 -> DEBU 3a20 0xc003606d70 principal evaluation fails" -"2019-07-20 02:40:44.730 UTC [cauthdsl] func1 -> DEBU 3a21 0xc003606d70 gate 1563590444728548600 evaluation fails" -"2019-07-20 02:40:44.731 UTC [policies] Evaluate -> DEBU 3a22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.731 UTC [policies] Evaluate -> DEBU 3a23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:44.732 UTC [policies] Evaluate -> DEBU 3a24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:44.732 UTC [cauthdsl] func1 -> DEBU 3a25 0xc0036075b0 gate 1563590444732725700 evaluation starts" -"2019-07-20 02:40:44.733 UTC [cauthdsl] func2 -> DEBU 3a26 0xc0036075b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:44.733 UTC [cauthdsl] func2 -> DEBU 3a27 0xc0036075b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:44.734 UTC [cauthdsl] func2 -> DEBU 3a28 0xc0036075b0 principal matched by identity 0" -"2019-07-20 02:40:44.734 UTC [msp.identity] Verify -> DEBU 3a29 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:44.734 UTC [msp.identity] Verify -> DEBU 3a2a Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:44.736 UTC [cauthdsl] func2 -> DEBU 3a2b 0xc0036075b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:44.736 UTC [cauthdsl] func1 -> DEBU 3a2c 0xc0036075b0 gate 1563590444732725700 evaluation succeeds" -"2019-07-20 02:40:44.736 UTC [policies] Evaluate -> DEBU 3a2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a2f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:44.738 UTC [gossip.gossip] handleMessage -> DEBU 3a31 Exiting" -"2019-07-20 02:40:44.751 UTC [msp] DeserializeIdentity -> DEBU 3a32 Obtaining identity" -"2019-07-20 02:40:44.751 UTC [msp] DeserializeIdentity -> DEBU 3a33 Obtaining identity" -"2019-07-20 02:40:44.753 UTC [gossip.pull] Hello -> DEBU 3a34 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:44.753 UTC [msp] DeserializeIdentity -> DEBU 3a35 Obtaining identity" -"2019-07-20 02:40:44.753 UTC [msp] DeserializeIdentity -> DEBU 3a36 Obtaining identity" -"2019-07-20 02:40:44.754 UTC [gossip.comm] Send -> DEBU 3a37 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:44.754 UTC [gossip.comm] sendToEndpoint -> DEBU 3a38 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.754 UTC [gossip.comm] sendToEndpoint -> DEBU 3a39 Exiting" -"2019-07-20 02:40:44.755 UTC [gossip.comm] func1 -> DEBU 3a3a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.755 UTC [gossip.gossip] handleMessage -> DEBU 3a3b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.756 UTC [gossip.pull] HandleMessage -> DEBU 3a3c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.756 UTC [gossip.gossip] handleMessage -> DEBU 3a3d Exiting" -"2019-07-20 02:40:44.855 UTC [gossip.comm] func1 -> DEBU 3a3e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.855 UTC [gossip.gossip] handleMessage -> DEBU 3a3f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.856 UTC [msp] DeserializeIdentity -> DEBU 3a40 Obtaining identity" -"2019-07-20 02:40:44.856 UTC [msp] DeserializeIdentity -> DEBU 3a41 Obtaining identity" -"2019-07-20 02:40:44.857 UTC [gossip.gossip] handleMessage -> DEBU 3a42 Exiting" -"2019-07-20 02:40:44.898 UTC [gossip.comm] func1 -> DEBU 3a43 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.899 UTC [gossip.gossip] handleMessage -> DEBU 3a44 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.899 UTC [gossip.pull] HandleMessage -> DEBU 3a45 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:44.899 UTC [gossip.pull] SendDigest -> DEBU 3a46 Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:44.900 UTC [gossip.gossip] handleMessage -> DEBU 3a47 Exiting" -"2019-07-20 02:40:45.008 UTC [gossip.comm] func1 -> DEBU 3a48 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.008 UTC [gossip.gossip] handleMessage -> DEBU 3a49 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.008 UTC [msp] DeserializeIdentity -> DEBU 3a4a Obtaining identity" -"2019-07-20 02:40:45.008 UTC [msp] DeserializeIdentity -> DEBU 3a4b Obtaining identity" -"2019-07-20 02:40:45.009 UTC [msp] DeserializeIdentity -> DEBU 3a4c Obtaining identity" -"2019-07-20 02:40:45.009 UTC [gossip.gossip] handleMessage -> DEBU 3a4d Exiting" -"2019-07-20 02:40:45.147 UTC [gossip.comm] func1 -> DEBU 3a4e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.147 UTC [gossip.gossip] handleMessage -> DEBU 3a4f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a50 Obtaining identity" -"2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a51 Obtaining identity" -"2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a52 Obtaining identity" -"2019-07-20 02:40:45.149 UTC [gossip.gossip] handleMessage -> DEBU 3a53 Exiting" -"2019-07-20 02:40:45.189 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3a54 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.189 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3a55 Got block validation policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.189 UTC [policies] Evaluate -> DEBU 3a56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" -"2019-07-20 02:40:45.190 UTC [policies] Evaluate -> DEBU 3a57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.190 UTC [policies] Evaluate -> DEBU 3a58 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" -"2019-07-20 02:40:45.191 UTC [cauthdsl] func1 -> DEBU 3a59 0xc00377e010 gate 1563590445191649300 evaluation starts" -"2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5a 0xc00377e010 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5b 0xc00377e010 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5c 0xc00377e010 principal matched by identity 0" -"2019-07-20 02:40:45.192 UTC [msp.identity] Verify -> DEBU 3a5d Verify: digest = 00000000 96 9a dc 26 d2 06 fc 8f 84 64 fa 05 e1 8e 6a 27 |...&.....d....j'| -00000010 d1 ff d3 b3 c0 f2 30 ca d0 c0 63 5e df dd 39 d2 |......0...c^..9.|" -"2019-07-20 02:40:45.193 UTC [msp.identity] Verify -> DEBU 3a5e Verify: sig = 00000000 30 45 02 21 00 f1 a2 5b a0 26 b4 0f c5 13 18 a1 |0E.!...[.&......| -00000010 46 65 a7 e0 4a e7 af b6 23 0e a5 b2 a8 2e 3a ae |Fe..J...#.....:.| -00000020 3d c2 90 8d 39 02 20 18 47 1d c1 ff 4a 42 4d d2 |=...9. .G...JBM.| -00000030 60 3e 51 8e 91 f6 0f e4 29 18 5e 13 10 48 63 06 |`>Q.....).^..Hc.| -00000040 b4 dd 5a be 3a a9 aa |..Z.:..|" -"2019-07-20 02:40:45.193 UTC [cauthdsl] func2 -> DEBU 3a5f 0xc00377e010 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.193 UTC [cauthdsl] func1 -> DEBU 3a60 0xc00377e010 gate 1563590445191649300 evaluation succeeds" -"2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a61 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a62 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a63 Signature set satisfies policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:45.195 UTC [blocksProvider] DeliverBlocks -> DEBU 3a65 [businesschannel] Adding payload to local buffer, blockNum = [6]" -"2019-07-20 02:40:45.195 UTC [gossip.state] addPayload -> DEBU 3a66 [businesschannel] Adding payload to local buffer, blockNum = [6]" -"2019-07-20 02:40:45.195 UTC [gossip.state] addPayload -> DEBU 3a67 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" -"2019-07-20 02:40:45.195 UTC [blocksProvider] DeliverBlocks -> DEBU 3a68 [businesschannel] Gossiping block [6], peers number [3]" -"2019-07-20 02:40:45.195 UTC [gossip.state] deliverPayloads -> DEBU 3a69 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" -"2019-07-20 02:40:45.195 UTC [gossip.state] deliverPayloads -> DEBU 3a6a [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" -"2019-07-20 02:40:45.195 UTC [gossip.privdata] StoreBlock -> INFO 3a6b [businesschannel] Received block [6] from buffer" -"2019-07-20 02:40:45.196 UTC [gossip.privdata] StoreBlock -> DEBU 3a6c [businesschannel] Validating block [6]" -"2019-07-20 02:40:45.196 UTC [committer.txvalidator] Validate -> DEBU 3a6d [businesschannel] START Block Validation for block [6]" -"2019-07-20 02:40:45.196 UTC [committer.txvalidator] Validate -> DEBU 3a6e expecting 1 block validation responses" -"2019-07-20 02:40:45.196 UTC [committer.txvalidator] validateTx -> DEBU 3a6f [businesschannel] validateTx starts for block 0xc000695640 env 0xc003781400 txn 0" -"2019-07-20 02:40:45.196 UTC [protoutils] ValidateTransaction -> DEBU 3a70 ValidateTransactionEnvelope starts for envelope 0xc003781400" -"2019-07-20 02:40:45.196 UTC [gossip.channel] AddToMsgStore -> DEBU 3a71 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes to the block puller" -"2019-07-20 02:40:45.197 UTC [gossip.pull] Add -> DEBU 3a73 Added 6, total items: 6" -"2019-07-20 02:40:45.196 UTC [protoutils] ValidateTransaction -> DEBU 3a72 Header is channel_header:"\010\001\032\006\010\255\376\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030K6t\252\2519\357\227\251\316\177e\325\037\216\234\223<\362\336\241\376\376\217" " -"2019-07-20 02:40:45.197 UTC [protoutils] validateChannelHeader -> DEBU 3a74 validateChannelHeader info: header type 1" -"2019-07-20 02:40:45.197 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a75 begin" -"2019-07-20 02:40:45.198 UTC [msp] GetManagerForChain -> DEBU 3a76 Returning existing manager for channel 'businesschannel'" -"2019-07-20 02:40:45.198 UTC [msp] DeserializeIdentity -> DEBU 3a77 Obtaining identity" -"2019-07-20 02:40:45.199 UTC [msp.identity] newIdentity -> DEBU 3a78 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:07.165 UTC [cauthdsl] func1 -> DEBU 88a 0xc00397bac0 gate 1569284707165023400 evaluation starts" +"2019-09-24 00:25:07.165 UTC [cauthdsl] func2 -> DEBU 88b 0xc00397bac0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.165 UTC [cauthdsl] func2 -> DEBU 88c 0xc00397bac0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.165 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 88d Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 00:25:07.165 UTC [msp] Validate -> DEBU 88e MSP OrdererMSP validating identity" +"2019-09-24 00:25:07.165 UTC [cauthdsl] func2 -> DEBU 88f 0xc00397bac0 principal matched by identity 0" +"2019-09-24 00:25:07.165 UTC [msp.identity] Verify -> DEBU 890 Verify: digest = 00000000 e4 08 df 11 1d 7c 9a 21 73 cb 6a 82 06 ff 83 ed |.....|.!s.j.....| +00000010 43 49 92 a8 41 f4 64 74 99 86 66 ce e0 c1 a3 2c |CI..A.dt..f....,|" +"2019-09-24 00:25:07.165 UTC [msp.identity] Verify -> DEBU 891 Verify: sig = 00000000 30 44 02 20 0e 23 80 8c d3 f2 b8 4d 65 dc ec 9e |0D. .#.....Me...| +00000010 ed bf 69 30 aa 9b 31 14 5e 0e 51 21 41 25 cb a8 |..i0..1.^.Q!A%..| +00000020 46 98 e4 66 02 20 69 8e a4 05 6e 12 3a 20 cc 5b |F..f. i...n.: .[| +00000030 5d a4 9d 0f 8e 8c 17 53 d5 e2 de 7e 9c 9b 9a c4 |]......S...~....| +00000040 b3 80 4d 2f b2 69 |..M/.i|" +"2019-09-24 00:25:07.170 UTC [cauthdsl] func2 -> DEBU 892 0xc00397bac0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.170 UTC [cauthdsl] func1 -> DEBU 893 0xc00397bac0 gate 1569284707165023400 evaluation succeeds" +"2019-09-24 00:25:07.170 UTC [policies] Evaluate -> DEBU 894 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:07.170 UTC [policies] Evaluate -> DEBU 895 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:07.171 UTC [policies] Evaluate -> DEBU 896 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:07.171 UTC [policies] Evaluate -> DEBU 897 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:07.171 UTC [blocksProvider] DeliverBlocks -> DEBU 898 [businesschannel] Adding payload to local buffer, blockNum = [2]" +"2019-09-24 00:25:07.171 UTC [gossip.state] addPayload -> DEBU 899 [businesschannel] Adding payload to local buffer, blockNum = [2]" +"2019-09-24 00:25:07.171 UTC [gossip.state] deliverPayloads -> DEBU 89a [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [2]" +"2019-09-24 00:25:07.171 UTC [gossip.state] deliverPayloads -> DEBU 89b [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" +"2019-09-24 00:25:07.171 UTC [gossip.privdata] StoreBlock -> INFO 89c [businesschannel] Received block [2] from buffer" +"2019-09-24 00:25:07.171 UTC [gossip.privdata] StoreBlock -> DEBU 89d [businesschannel] Validating block [2]" +"2019-09-24 00:25:07.171 UTC [committer.txvalidator] Validate -> DEBU 89e [businesschannel] START Block Validation for block [2]" +"2019-09-24 00:25:07.171 UTC [committer.txvalidator] Validate -> DEBU 89f expecting 1 block validation responses" +"2019-09-24 00:25:07.171 UTC [committer.txvalidator] validateTx -> DEBU 8a0 [businesschannel] validateTx starts for block 0xc0038b0a00 env 0xc00392c8c0 txn 0" +"2019-09-24 00:25:07.172 UTC [protoutils] ValidateTransaction -> DEBU 8a1 ValidateTransactionEnvelope starts for envelope 0xc00392c8c0" +"2019-09-24 00:25:07.172 UTC [protoutils] ValidateTransaction -> DEBU 8a2 Header is channel_header:"\010\001\032\006\010\342\304\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\277\253\335 Y\371w3&\t\342q=xq\235\304\204\375|\346\023e{" " +"2019-09-24 00:25:07.172 UTC [protoutils] validateChannelHeader -> DEBU 8a3 validateChannelHeader info: header type 1" +"2019-09-24 00:25:07.172 UTC [protoutils] checkSignatureFromCreator -> DEBU 8a4 begin" +"2019-09-24 00:25:07.172 UTC [msp] GetManagerForChain -> DEBU 8a5 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:25:07.172 UTC [msp] DeserializeIdentity -> DEBU 8a6 Obtaining identity" +"2019-09-24 00:25:07.172 UTC [msp.identity] newIdentity -> DEBU 8a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt @@ -18133,184 +2967,29600 @@ gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh QQ== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a79 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" -"2019-07-20 02:40:45.200 UTC [msp] Validate -> DEBU 3a7a MSP OrdererMSP validating identity" -"2019-07-20 02:40:45.203 UTC [msp] DeserializeIdentity -> DEBU 3a7b Obtaining identity" -"2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7c Obtaining identity" -"2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7d Obtaining identity" -"2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7e Obtaining identity" -"2019-07-20 02:40:45.204 UTC [gossip.comm] Send -> DEBU 3a7f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:45.205 UTC [msp] DeserializeIdentity -> DEBU 3a80 Obtaining identity" -"2019-07-20 02:40:45.205 UTC [msp] DeserializeIdentity -> DEBU 3a81 Obtaining identity" -"2019-07-20 02:40:45.205 UTC [gossip.comm] sendToEndpoint -> DEBU 3a82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.205 UTC [gossip.comm] sendToEndpoint -> DEBU 3a83 Exiting" -"2019-07-20 02:40:45.205 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a84 creator is valid" -"2019-07-20 02:40:45.207 UTC [msp.identity] Verify -> DEBU 3a85 Verify: digest = 00000000 e6 57 06 ac d2 87 6b c2 b6 92 7b 61 ad d8 9d 93 |.W....k...{a....| -00000010 f7 5a 2a be 3d 40 7c 29 04 a0 13 78 5c 74 d7 b8 |.Z*.=@|)...x\t..|" -"2019-07-20 02:40:45.207 UTC [msp.identity] Verify -> DEBU 3a86 Verify: sig = 00000000 30 43 02 1f 74 f5 ee 6a 28 f5 da 8c 41 f5 e2 69 |0C..t..j(...A..i| -00000010 e8 f9 d2 93 4f c7 61 e5 e2 e1 7b 30 6e bf 8b cc |....O.a...{0n...| -00000020 f7 f1 cf 02 20 12 d4 eb ba 3b 2f 97 3c df 61 c2 |.... ....;/.<.a.| -00000030 2d b9 86 81 75 ee 2e b8 a3 6e cb 9c ae 7b 09 34 |-...u....n...{.4| -00000040 63 b0 56 6b 0a |c.Vk.|" -"2019-07-20 02:40:45.208 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a87 exits successfully" -"2019-07-20 02:40:45.209 UTC [protoutils] validateConfigTransaction -> DEBU 3a88 validateConfigTransaction starts for data 0xc00305a000, header channel_header:"\010\001\032\006\010\255\376\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030K6t\252\2519\357\227\251\316\177e\325\037\216\234\223<\362\336\241\376\376\217" " -"2019-07-20 02:40:45.210 UTC [committer.txvalidator] validateTx -> DEBU 3a89 Transaction is for channel businesschannel" -"2019-07-20 02:40:45.214 UTC [common.configtx] addToMap -> DEBU 3a8a Adding to config map: [Group] /Channel" -"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8b Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8c Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8d Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8e Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8f Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a90 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a91 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a92 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a93 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a94 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a95 Adding to config map: [Group] /Channel" -"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a96 Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a97 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a98 Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a99 Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a9a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 3a9b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9c Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9d Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 3a9f Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 3aa0 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:40:45.224 UTC [common.configtx] addToMap -> DEBU 3aa1 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 3aa2 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 3aa3 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 3aa4 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 3aa5 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:40:45.227 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa6 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.228 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa7 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-07-20 02:40:45.228 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa8 Processing change to key: [Group] /Channel/Application" -"2019-07-20 02:40:45.229 UTC [common.configtx] policyForItem -> DEBU 3aa9 Getting policy for item Application with mod_policy Admins" -"2019-07-20 02:40:45.230 UTC [policies] Manager -> DEBU 3aaa Manager Channel looking up path []" -"2019-07-20 02:40:45.230 UTC [policies] Manager -> DEBU 3aab Manager Channel has managers Application" -"2019-07-20 02:40:45.232 UTC [policies] Manager -> DEBU 3aac Manager Channel has managers Orderer" -"2019-07-20 02:40:45.233 UTC [policies] Manager -> DEBU 3aad Manager Channel looking up path [Application]" -"2019-07-20 02:40:45.233 UTC [policies] Manager -> DEBU 3aae Manager Channel has managers Application" -"2019-07-20 02:40:45.237 UTC [policies] Manager -> DEBU 3aaf Manager Channel has managers Orderer" -"2019-07-20 02:40:45.237 UTC [policies] Manager -> DEBU 3ab0 Manager Channel/Application looking up path []" -"2019-07-20 02:40:45.238 UTC [policies] Manager -> DEBU 3ab1 Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:40:45.238 UTC [policies] Manager -> DEBU 3ab2 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:40:45.239 UTC [policies] Evaluate -> DEBU 3ab3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" -"2019-07-20 02:40:45.239 UTC [policies] Evaluate -> DEBU 3ab4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.240 UTC [policies] Evaluate -> DEBU 3ab5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" -"2019-07-20 02:40:45.241 UTC [cauthdsl] deduplicate -> WARN 3ab6 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-07-20 02:40:45.241 UTC [cauthdsl] func1 -> DEBU 3ab7 0xc0039f8cc0 gate 1563590445241470500 evaluation starts" -"2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3ab8 0xc0039f8cc0 signed by 0 principal evaluation starts (used [false false false])" -"2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3ab9 0xc0039f8cc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3aba 0xc0039f8cc0 principal matched by identity 0" -"2019-07-20 02:40:45.243 UTC [msp.identity] Verify -> DEBU 3abb Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| -00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" -"2019-07-20 02:40:45.243 UTC [msp.identity] Verify -> DEBU 3abc Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| -00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| -00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| -00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| -00000040 ed 0f 29 74 0b 84 |..)t..|" -"2019-07-20 02:40:45.244 UTC [cauthdsl] func2 -> DEBU 3abd 0xc0039f8cc0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.244 UTC [cauthdsl] func1 -> DEBU 3abe 0xc0039f8cc0 gate 1563590445241470500 evaluation succeeds" -"2019-07-20 02:40:45.244 UTC [policies] Evaluate -> DEBU 3abf Signature set satisfies policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:40:45.245 UTC [policies] Evaluate -> DEBU 3ac0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:40:45.247 UTC [policies] Evaluate -> DEBU 3ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" -"2019-07-20 02:40:45.248 UTC [cauthdsl] deduplicate -> WARN 3ac2 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" -"2019-07-20 02:40:45.248 UTC [cauthdsl] func1 -> DEBU 3ac3 0xc0039f92f0 gate 1563590445248608200 evaluation starts" -"2019-07-20 02:40:45.248 UTC [cauthdsl] func2 -> DEBU 3ac4 0xc0039f92f0 signed by 0 principal evaluation starts (used [false false false])" -"2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac5 0xc0039f92f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac6 0xc0039f92f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" -"2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac7 0xc0039f92f0 processing identity 1 with bytes of 114b950" -"2019-07-20 02:40:45.250 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3ac8 Checking if identity satisfies ADMIN role for Org2MSP" -"2019-07-20 02:40:45.251 UTC [cauthdsl] func2 -> DEBU 3ac9 0xc0039f92f0 principal matched by identity 1" -"2019-07-20 02:40:45.251 UTC [msp.identity] Verify -> DEBU 3aca Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| -00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" -"2019-07-20 02:40:45.252 UTC [msp.identity] Verify -> DEBU 3acb Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| -00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| -00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| -00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| -00000040 6a a2 e2 e3 7c fb |j...|.|" -"2019-07-20 02:40:45.261 UTC [cauthdsl] func2 -> DEBU 3acc 0xc0039f92f0 principal evaluation succeeds for identity 1" -"2019-07-20 02:40:45.261 UTC [cauthdsl] func1 -> DEBU 3acd 0xc0039f92f0 gate 1563590445248608200 evaluation succeeds" -"2019-07-20 02:40:45.262 UTC [policies] Evaluate -> DEBU 3ace Signature set satisfies policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:40:45.262 UTC [policies] Evaluate -> DEBU 3acf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:40:45.264 UTC [policies] Evaluate -> DEBU 3ad0 Signature set satisfies policy /Channel/Application/Admins" -"2019-07-20 02:40:45.264 UTC [policies] Evaluate -> DEBU 3ad1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" -"2019-07-20 02:40:45.264 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad2 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" -"2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad3 Processing change to key: [Group] /Channel/Application/Org3MSP" -"2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad4 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad5 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad6 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad7 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad8 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3ad9 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3ada Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3adb Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3adc Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.268 UTC [common.configtx] recurseConfigMap -> DEBU 3add Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.268 UTC [common.configtx] recurseConfigMap -> DEBU 3ade Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3adf Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae0 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae2 Setting policy for key Admins to " -"2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae3 Setting policy for key Endorsement to " -"2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae4 Setting policy for key LifecycleEndorsement to " -"2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae5 Setting policy for key Readers to " -"2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae6 Setting policy for key Writers to " -"2019-07-20 02:40:45.274 UTC [common.configtx] recurseConfigMap -> DEBU 3ae7 Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.275 UTC [common.configtx] recurseConfigMap -> DEBU 3ae8 Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3ae9 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3aea Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3aeb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.277 UTC [common.configtx] recurseConfigMap -> DEBU 3aec Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.280 UTC [common.configtx] recurseConfigMap -> DEBU 3aed Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.282 UTC [common.configtx] recurseConfigMap -> DEBU 3aee Setting policy for key Readers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.284 UTC [common.configtx] recurseConfigMap -> DEBU 3aef Setting policy for key Writers to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.285 UTC [common.configtx] recurseConfigMap -> DEBU 3af0 Setting policy for key Admins to policy: mod_policy:"Admins" " -"2019-07-20 02:40:45.287 UTC [common.channelconfig] NewStandardValues -> DEBU 3af1 Initializing protos for *channelconfig.ChannelProtos" -"2019-07-20 02:40:45.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af2 Processing field: HashingAlgorithm" -"2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af3 Processing field: BlockDataHashingStructure" -"2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af4 Processing field: OrdererAddresses" -"2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af5 Processing field: Consortium" -"2019-07-20 02:40:45.290 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af6 Processing field: Capabilities" -"2019-07-20 02:40:45.291 UTC [common.channelconfig] NewStandardValues -> DEBU 3af7 Initializing protos for *channelconfig.ApplicationProtos" -"2019-07-20 02:40:45.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af8 Processing field: ACLs" -"2019-07-20 02:40:45.294 UTC [comm.grpc.server] 1 -> INFO 3af9 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.293Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=166.1µs -"2019-07-20 02:40:45.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afa Processing field: Capabilities" -"2019-07-20 02:40:45.303 UTC [common.channelconfig] NewStandardValues -> DEBU 3afb Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.304 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afc Processing field: AnchorPeers" -"2019-07-20 02:40:45.304 UTC [common.channelconfig] NewStandardValues -> DEBU 3afd Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.304 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afe Processing field: MSP" -"2019-07-20 02:40:45.304 UTC [common.channelconfig] Validate -> DEBU 3aff Anchor peers for org Org3MSP are " -"2019-07-20 02:40:45.305 UTC [common.channelconfig] validateMSP -> DEBU 3b00 Setting up MSP for org Org3MSP" -"2019-07-20 02:40:45.305 UTC [msp] newBccspMsp -> DEBU 3b01 Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.306 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b02 Obtaining default signing identity" -"2019-07-20 02:40:45.306 UTC [msp.identity] Sign -> DEBU 3b03 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:40:45.306 UTC [msp.identity] Sign -> DEBU 3b04 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:40:45.309 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b05 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:34150" -"2019-07-20 02:40:45.310 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b06 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:34150" -"2019-07-20 02:40:45.312 UTC [msp.identity] Verify -> DEBU 3b07 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +"2019-09-24 00:25:07.172 UTC [protoutils] checkSignatureFromCreator -> DEBU 8a8 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-09-24 00:25:07.172 UTC [msp] Validate -> DEBU 8a9 MSP OrdererMSP validating identity" +"2019-09-24 00:25:07.173 UTC [protoutils] checkSignatureFromCreator -> DEBU 8aa creator is valid" +"2019-09-24 00:25:07.173 UTC [msp.identity] Verify -> DEBU 8ab Verify: digest = 00000000 19 69 a9 79 a8 64 5a 0c 78 d0 60 11 ea 0c 33 c3 |.i.y.dZ.x.`...3.| +00000010 d2 17 d7 3c 65 fe c1 ea 3c 0f 0f fa 41 1e d6 5f |... DEBU 8ac Verify: sig = 00000000 30 44 02 20 57 8a a0 c1 82 87 03 f9 fb 2b 7f ba |0D. W........+..| +00000010 1a 89 9a c2 48 7a 25 b3 79 92 cd 9d 9b 5f d1 3b |....Hz%.y...._.;| +00000020 fb f7 76 34 02 20 17 6f c5 03 55 a0 55 88 4c e9 |..v4. .o..U.U.L.| +00000030 eb df 54 19 21 e2 6c 02 7d cf 7b 6f d2 a7 2e e6 |..T.!.l.}.{o....| +00000040 b5 35 1b 9c 5d 9a |.5..].|" +"2019-09-24 00:25:07.173 UTC [protoutils] checkSignatureFromCreator -> DEBU 8ad exits successfully" +"2019-09-24 00:25:07.173 UTC [protoutils] validateConfigTransaction -> DEBU 8ae validateConfigTransaction starts for data 0xc0039e8000, header channel_header:"\010\001\032\006\010\342\304\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\277\253\335 Y\371w3&\t\342q=xq\235\304\204\375|\346\023e{" " +"2019-09-24 00:25:07.174 UTC [committer.txvalidator] validateTx -> DEBU 8af Transaction is for channel businesschannel" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b0 Adding to config map: [Group] /Channel" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b1 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b2 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b3 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b8 Adding to config map: [Group] /Channel" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8b9 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8ba Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8bb Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:25:07.174 UTC [common.configtx] addToMap -> DEBU 8bc Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:07.175 UTC [common.configtx] addToMap -> DEBU 8bd Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.175 UTC [common.configtx] addToMap -> DEBU 8be Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:07.175 UTC [common.configtx] addToMap -> DEBU 8bf Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:07.175 UTC [common.configtx] addToMap -> DEBU 8c0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:07.175 UTC [common.configtx] verifyDeltaSet -> DEBU 8c1 Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:07.175 UTC [common.configtx] policyForItem -> DEBU 8c2 Getting policy for item Org2MSP with mod_policy Admins" +"2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c3 Manager Channel looking up path [Application]" +"2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c4 Manager Channel has managers Orderer" +"2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c5 Manager Channel has managers Application" +"2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c6 Manager Channel/Application looking up path []" +"2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c7 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c8 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8c9 Manager Channel/Application looking up path [Org2MSP]" +"2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8ca Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8cb Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:07.175 UTC [policies] Manager -> DEBU 8cc Manager Channel/Application/Org2MSP looking up path []" +"2019-09-24 00:25:07.176 UTC [policies] Evaluate -> DEBU 8cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 00:25:07.184 UTC [msp] DeserializeIdentity -> DEBU 8cf Obtaining identity" +"2019-09-24 00:25:07.184 UTC [msp.identity] newIdentity -> DEBU 8d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.184 UTC [cauthdsl] func1 -> DEBU 8d1 0xc0039c9400 gate 1569284707184426900 evaluation starts" +"2019-09-24 00:25:07.184 UTC [cauthdsl] func2 -> DEBU 8d2 0xc0039c9400 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.184 UTC [cauthdsl] func2 -> DEBU 8d3 0xc0039c9400 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.184 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8d4 Checking if identity satisfies ADMIN role for Org2MSP" +"2019-09-24 00:25:07.184 UTC [cauthdsl] func2 -> DEBU 8d5 0xc0039c9400 principal matched by identity 0" +"2019-09-24 00:25:07.184 UTC [msp.identity] Verify -> DEBU 8d6 Verify: digest = 00000000 c7 15 61 1b b2 95 fa 58 ba 85 fe c1 31 30 21 87 |..a....X....10!.| +00000010 ff ba 08 45 5d c6 ac f3 4c 25 22 ca 2f 17 ea 97 |...E]...L%"./...|" +"2019-09-24 00:25:07.184 UTC [msp.identity] Verify -> DEBU 8d7 Verify: sig = 00000000 30 45 02 21 00 98 5f 39 f5 66 76 09 9e c8 cd e3 |0E.!.._9.fv.....| +00000010 70 ff 4b d1 18 cd cd f5 28 b0 92 91 ed c0 20 3f |p.K.....(..... ?| +00000020 ec 6a 58 2b 2f 02 20 59 44 df b5 8f e0 ce 61 c8 |.jX+/. YD.....a.| +00000030 7c 9e c4 4d c5 31 fd 54 af 57 c3 f6 39 01 9a 59 ||..M.1.T.W..9..Y| +00000040 99 0e a7 45 58 9e 56 |...EX.V|" +"2019-09-24 00:25:07.184 UTC [cauthdsl] func2 -> DEBU 8d8 0xc0039c9400 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.184 UTC [cauthdsl] func1 -> DEBU 8d9 0xc0039c9400 gate 1569284707184426900 evaluation succeeds" +"2019-09-24 00:25:07.184 UTC [policies] Evaluate -> DEBU 8da Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:07.184 UTC [policies] Evaluate -> DEBU 8db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:07.184 UTC [common.configtx] verifyDeltaSet -> DEBU 8dc Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:25:07.185 UTC [common.configtx] recurseConfigMap -> DEBU 8dd Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.185 UTC [common.configtx] recurseConfigMap -> DEBU 8de Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.185 UTC [common.configtx] recurseConfigMap -> DEBU 8df Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.185 UTC [common.configtx] recurseConfigMap -> DEBU 8e0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.171 UTC [gossip.state] addPayload -> DEBU 8ce Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 00:25:07.188 UTC [blocksProvider] DeliverBlocks -> DEBU 8e1 [businesschannel] Gossiping block [2], peers number [3]" +"2019-09-24 00:25:07.188 UTC [gossip.channel] AddToMsgStore -> DEBU 8e2 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23763 bytes, seq: 2}, Envelope: 23796 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 00:25:07.188 UTC [gossip.pull] Add -> DEBU 8e3 Added 2, total items: 2" +"2019-09-24 00:25:07.188 UTC [common.configtx] recurseConfigMap -> DEBU 8e4 Setting policy for key Writers to " +"2019-09-24 00:25:07.188 UTC [common.configtx] recurseConfigMap -> DEBU 8e5 Setting policy for key Admins to " +"2019-09-24 00:25:07.188 UTC [common.configtx] recurseConfigMap -> DEBU 8e6 Setting policy for key Endorsement to " +"2019-09-24 00:25:07.188 UTC [common.configtx] recurseConfigMap -> DEBU 8e7 Setting policy for key Readers to " +"2019-09-24 00:25:07.193 UTC [common.configtx] recurseConfigMap -> DEBU 8e8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.193 UTC [common.configtx] recurseConfigMap -> DEBU 8e9 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8ea Obtaining identity" +"2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8eb Obtaining identity" +"2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8ec Obtaining identity" +"2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8ed Obtaining identity" +"2019-09-24 00:25:07.194 UTC [gossip.comm] Send -> DEBU 8ee Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23763 bytes, seq: 2}, Envelope: 23796 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8ef Obtaining identity" +"2019-09-24 00:25:07.194 UTC [msp] DeserializeIdentity -> DEBU 8f0 Obtaining identity" +"2019-09-24 00:25:07.194 UTC [gossip.comm] sendToEndpoint -> DEBU 8f1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23763 bytes, seq: 2}, Envelope: 23796 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.194 UTC [gossip.comm] sendToEndpoint -> DEBU 8f2 Exiting" +"2019-09-24 00:25:07.193 UTC [common.configtx] recurseConfigMap -> DEBU 8f3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8f9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.195 UTC [common.configtx] recurseConfigMap -> DEBU 8fa Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.196 UTC [common.configtx] recurseConfigMap -> DEBU 8fb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.196 UTC [common.configtx] recurseConfigMap -> DEBU 8fc Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.196 UTC [common.configtx] recurseConfigMap -> DEBU 8fd Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.196 UTC [common.configtx] recurseConfigMap -> DEBU 8fe Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.196 UTC [common.configtx] recurseConfigMap -> DEBU 8ff Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:25:07.197 UTC [common.channelconfig] NewStandardValues -> DEBU 900 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:25:07.197 UTC [common.channelconfig] initializeProtosStruct -> DEBU 901 Processing field: HashingAlgorithm" +"2019-09-24 00:25:07.197 UTC [common.channelconfig] initializeProtosStruct -> DEBU 902 Processing field: BlockDataHashingStructure" +"2019-09-24 00:25:07.197 UTC [common.channelconfig] initializeProtosStruct -> DEBU 903 Processing field: OrdererAddresses" +"2019-09-24 00:25:07.197 UTC [common.channelconfig] initializeProtosStruct -> DEBU 904 Processing field: Consortium" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 905 Processing field: Capabilities" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] NewStandardValues -> DEBU 906 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 907 Processing field: ConsensusType" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 908 Processing field: BatchSize" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 909 Processing field: BatchTimeout" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90a Processing field: KafkaBrokers" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90b Processing field: ChannelRestrictions" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90c Processing field: Capabilities" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] NewStandardValues -> DEBU 90d Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90e Processing field: Endpoints" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] NewStandardValues -> DEBU 90f Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:07.198 UTC [common.channelconfig] initializeProtosStruct -> DEBU 910 Processing field: MSP" +"2019-09-24 00:25:07.199 UTC [common.channelconfig] validateMSP -> DEBU 911 Setting up MSP for org OrdererOrg" +"2019-09-24 00:25:07.199 UTC [msp] newBccspMsp -> DEBU 912 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:07.199 UTC [msp] New -> DEBU 913 Creating Cache-MSP instance" +"2019-09-24 00:25:07.199 UTC [msp] Setup -> DEBU 914 Setting up MSP instance OrdererMSP" +"2019-09-24 00:25:07.199 UTC [msp.identity] newIdentity -> DEBU 915 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.199 UTC [msp.identity] newIdentity -> DEBU 916 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.199 UTC [msp] Validate -> DEBU 917 MSP OrdererMSP validating identity" +"2019-09-24 00:25:07.199 UTC [common.channelconfig] NewStandardValues -> DEBU 918 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:25:07.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 919 Processing field: ACLs" +"2019-09-24 00:25:07.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 91a Processing field: Capabilities" +"2019-09-24 00:25:07.200 UTC [common.channelconfig] NewStandardValues -> DEBU 91b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:07.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 91c Processing field: AnchorPeers" +"2019-09-24 00:25:07.200 UTC [common.channelconfig] NewStandardValues -> DEBU 91d Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:07.200 UTC [common.channelconfig] initializeProtosStruct -> DEBU 91e Processing field: MSP" +"2019-09-24 00:25:07.201 UTC [common.channelconfig] Validate -> DEBU 91f Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:25:07.201 UTC [common.channelconfig] validateMSP -> DEBU 920 Setting up MSP for org Org1MSP" +"2019-09-24 00:25:07.201 UTC [msp] newBccspMsp -> DEBU 921 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:07.201 UTC [msp] New -> DEBU 922 Creating Cache-MSP instance" +"2019-09-24 00:25:07.201 UTC [msp] Setup -> DEBU 923 Setting up MSP instance Org1MSP" +"2019-09-24 00:25:07.201 UTC [msp.identity] newIdentity -> DEBU 924 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.201 UTC [msp.identity] newIdentity -> DEBU 925 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.202 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 926 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:25:07.202 UTC [msp] Validate -> DEBU 927 MSP Org1MSP validating identity" +"2019-09-24 00:25:07.203 UTC [msp] getCertificationChain -> DEBU 928 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:07.204 UTC [msp] hasOURole -> DEBU 929 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:25:07.204 UTC [msp] getCertificationChain -> DEBU 92a MSP Org1MSP getting certification chain" +"2019-09-24 00:25:07.204 UTC [common.channelconfig] NewStandardValues -> DEBU 92b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:25:07.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 92c Processing field: AnchorPeers" +"2019-09-24 00:25:07.204 UTC [common.channelconfig] NewStandardValues -> DEBU 92d Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:25:07.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 92e Processing field: MSP" +"2019-09-24 00:25:07.204 UTC [common.channelconfig] Validate -> DEBU 92f Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 00:25:07.207 UTC [common.channelconfig] validateMSP -> DEBU 930 Setting up MSP for org Org2MSP" +"2019-09-24 00:25:07.208 UTC [msp] newBccspMsp -> DEBU 931 Creating BCCSP-based MSP instance" +"2019-09-24 00:25:07.208 UTC [msp] New -> DEBU 932 Creating Cache-MSP instance" +"2019-09-24 00:25:07.208 UTC [msp] Setup -> DEBU 933 Setting up MSP instance Org2MSP" +"2019-09-24 00:25:07.225 UTC [msp.identity] newIdentity -> DEBU 934 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.250 UTC [msp.identity] newIdentity -> DEBU 935 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.261 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 936 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:25:07.261 UTC [msp] Validate -> DEBU 937 MSP Org2MSP validating identity" +"2019-09-24 00:25:07.261 UTC [msp] getCertificationChain -> DEBU 938 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:07.261 UTC [msp] hasOURole -> DEBU 939 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:25:07.261 UTC [msp] getCertificationChain -> DEBU 93a MSP Org2MSP getting certification chain" +"2019-09-24 00:25:07.261 UTC [msp] Setup -> DEBU 93b Setting up the MSP manager (3 msps)" +"2019-09-24 00:25:07.261 UTC [msp] Setup -> DEBU 93c MSP manager setup complete, setup 3 msps" +"2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 93d Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 93e Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 93f Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 940 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 941 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 942 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 943 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 944 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 945 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:25:07.261 UTC [policies] NewManagerImpl -> DEBU 946 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 947 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 948 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 949 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94a Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94b Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94c Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94d Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94e Proposed new policy Readers for Channel/Application" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 94f Proposed new policy Writers for Channel/Application" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 950 Proposed new policy Admins for Channel/Application" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 951 Proposed new policy Writers for Channel" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 952 Proposed new policy Admins for Channel" +"2019-09-24 00:25:07.262 UTC [policies] NewManagerImpl -> DEBU 953 Proposed new policy Readers for Channel" +"2019-09-24 00:25:07.262 UTC [common.configtx] addToMap -> DEBU 954 Adding to config map: [Group] /Channel" +"2019-09-24 00:25:07.285 UTC [common.configtx] addToMap -> DEBU 955 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:25:07.285 UTC [common.configtx] addToMap -> DEBU 956 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:25:07.285 UTC [common.configtx] addToMap -> DEBU 957 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:25:07.285 UTC [common.configtx] addToMap -> DEBU 958 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:25:07.288 UTC [common.configtx] addToMap -> DEBU 959 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:25:07.290 UTC [common.configtx] addToMap -> DEBU 95a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:25:07.291 UTC [common.configtx] addToMap -> DEBU 95b Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:25:07.291 UTC [common.configtx] addToMap -> DEBU 95c Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:25:07.292 UTC [common.configtx] addToMap -> DEBU 95d Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:25:07.292 UTC [common.configtx] addToMap -> DEBU 95e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:25:07.292 UTC [common.configtx] addToMap -> DEBU 95f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:25:07.293 UTC [comm.grpc.server] 1 -> INFO 960 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.292Z grpc.peer_address=172.18.0.5:49100 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=190.6µs +"2019-09-24 00:25:07.292 UTC [common.configtx] addToMap -> DEBU 961 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:25:07.295 UTC [common.configtx] addToMap -> DEBU 962 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 963 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 964 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 965 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 966 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 967 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 968 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 969 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 96a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 96b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:25:07.298 UTC [msp] GetDefaultSigningIdentity -> DEBU 96c Obtaining default signing identity" +"2019-09-24 00:25:07.298 UTC [msp.identity] Sign -> DEBU 96d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:07.298 UTC [msp.identity] Sign -> DEBU 96e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:07.298 UTC [gossip.comm] authenticateRemotePeer -> DEBU 96f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:49100" +"2019-09-24 00:25:07.298 UTC [gossip.comm] authenticateRemotePeer -> DEBU 970 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49100" +"2019-09-24 00:25:07.299 UTC [msp.identity] Verify -> DEBU 971 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-07-20 02:40:45.312 UTC [msp.identity] Verify -> DEBU 3b08 Verify: sig = 00000000 30 45 02 21 00 be 5f 24 6f 9b 2e 79 cd 7b 8c b2 |0E.!.._$o..y.{..| -00000010 37 cf 5e 2c 50 16 db ab 74 30 02 39 8d 06 6c 42 |7.^,P...t0.9..lB| -00000020 0d e8 3d 51 de 02 20 12 f9 a6 96 80 2e 96 d1 be |..=Q.. .........| -00000030 fd 33 cf 4a 1a f7 4b 07 01 e8 c6 0d e3 58 b3 0e |.3.J..K......X..| -00000040 4b be 81 51 0f c3 af |K..Q...|" -"2019-07-20 02:40:45.313 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b09 Authenticated 172.18.0.6:34150" -"2019-07-20 02:40:45.313 UTC [gossip.comm] GossipStream -> DEBU 3b0a Servicing 172.18.0.6:34150" -"2019-07-20 02:40:45.314 UTC [gossip.comm] serviceConnection -> DEBU 3b0b Closing reading from stream" -"2019-07-20 02:40:45.314 UTC [gossip.comm] writeToStream -> DEBU 3b0c Closing writing to stream" -"2019-07-20 02:40:45.316 UTC [gossip.comm] readFromStream -> DEBU 3b0d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" -"2019-07-20 02:40:45.305 UTC [msp] New -> DEBU 3b0e Creating Cache-MSP instance" -"2019-07-20 02:40:45.317 UTC [msp] Setup -> DEBU 3b0f Setting up MSP instance Org3MSP" -"2019-07-20 02:40:45.317 UTC [grpc] infof -> DEBU 3b10 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:45.318 UTC [gossip.comm] readFromStream -> DEBU 3b11 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:45.318 UTC [gossip.comm] func2 -> DEBU 3b12 Client 172.18.0.6:34150 disconnected" -"2019-07-20 02:40:45.319 UTC [comm.grpc.server] 1 -> INFO 3b13 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.306Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.9498ms -"2019-07-20 02:40:45.319 UTC [grpc] infof -> DEBU 3b14 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:45.319 UTC [gossip.comm] writeToStream -> DEBU 3b15 Closing writing to stream" -"2019-07-20 02:40:45.322 UTC [msp.identity] newIdentity -> DEBU 3b16 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:25:07.299 UTC [msp.identity] Verify -> DEBU 972 Verify: sig = 00000000 30 45 02 21 00 b7 39 b6 14 d8 22 ef 30 7b 51 ab |0E.!..9...".0{Q.| +00000010 27 eb 54 99 a8 54 07 f1 e5 4d 7c fb 48 44 f2 9a |'.T..T...M|.HD..| +00000020 49 9b 52 54 fd 02 20 56 91 be e3 db 0f 5a 76 8b |I.RT.. V.....Zv.| +00000030 63 fa 4e 2f 6c 8f 54 c4 88 4c cb b7 23 81 c7 34 |c.N/l.T..L..#..4| +00000040 07 93 1a 1e 33 9d ac |....3..|" +"2019-09-24 00:25:07.299 UTC [gossip.comm] authenticateRemotePeer -> DEBU 973 Authenticated 172.18.0.5:49100" +"2019-09-24 00:25:07.296 UTC [common.configtx] addToMap -> DEBU 974 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.299 UTC [gossip.comm] GossipStream -> DEBU 975 Servicing 172.18.0.5:49100" +"2019-09-24 00:25:07.304 UTC [gossip.comm] serviceConnection -> DEBU 976 Closing reading from stream" +"2019-09-24 00:25:07.304 UTC [gossip.comm] writeToStream -> DEBU 977 Closing writing to stream" +"2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 978 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 979 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:25:07.304 UTC [grpc] infof -> DEBU 97a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 97b Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 97c Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:25:07.304 UTC [gossip.comm] readFromStream -> DEBU 97d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +"2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 97e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 97f Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 980 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 981 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 982 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:25:07.304 UTC [common.configtx] addToMap -> DEBU 983 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 984 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 985 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 986 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 987 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 988 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 989 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98a Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98b Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98c Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98d Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98e Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:25:07.305 UTC [common.configtx] addToMap -> DEBU 98f Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:25:07.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 990 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:25:07.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 991 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 992 Manager Channel looking up path [Application]" +"2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 993 Manager Channel has managers Orderer" +"2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 994 Manager Channel has managers Application" +"2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 995 Manager Channel/Application looking up path []" +"2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 996 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 997 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:25:07.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 998 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 00:25:07.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 999 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 00:25:07.305 UTC [common.channelconfig] LogSanityChecks -> DEBU 99a As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 99b Manager Channel looking up path [Orderer]" +"2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 99c Manager Channel has managers Orderer" +"2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 99d Manager Channel has managers Application" +"2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 99e Manager Channel/Orderer looking up path []" +"2019-09-24 00:25:07.305 UTC [policies] Manager -> DEBU 99f Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:25:07.306 UTC [common.channelconfig] LogSanityChecks -> DEBU 9a0 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:25:07.306 UTC [common.channelconfig] LogSanityChecks -> DEBU 9a1 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:25:07.306 UTC [common.channelconfig] LogSanityChecks -> DEBU 9a2 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:25:07.306 UTC [common.channelconfig] LogSanityChecks -> DEBU 9a3 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:25:07.306 UTC [common.capabilities] Supported -> DEBU 9a4 Application capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:07.306 UTC [common.capabilities] Supported -> DEBU 9a5 Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:25:07.306 UTC [gossip.service] ProcessConfigUpdate -> DEBU 9a6 Processing new config for channel businesschannel" +"2019-09-24 00:25:07.307 UTC [gossip.service] ProcessConfigUpdate -> DEBU 9a7 Calling out because config was updated for channel businesschannel" +"2019-09-24 00:25:07.307 UTC [gossip.service] updateAnchors -> DEBU 9a8 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-09-24 00:25:07.307 UTC [gossip.election] waitForInterrupt -> DEBU 9a9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:07.307 UTC [gossip.election] IsLeader -> DEBU 9aa c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:25:07.307 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ab Obtaining default signing identity" +"2019-09-24 00:25:07.307 UTC [msp.identity] Sign -> DEBU 9ac Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510031801 " +"2019-09-24 00:25:07.307 UTC [msp.identity] Sign -> DEBU 9ad Sign: digest: 3454F2E0A59C274436AB7D95996D4DD5FAE89FC84AB984B1676CA37C828C75A6 " +"2019-09-24 00:25:07.308 UTC [gossip.election] waitForInterrupt -> DEBU 9ae c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:25:07.308 UTC [gossip.service] updateAnchors -> DEBU 9af Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +"2019-09-24 00:25:07.308 UTC [gossip.service] updateAnchors -> DEBU 9b0 Creating state provider for chainID businesschannel" +"2019-09-24 00:25:07.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.308 UTC [grpc] infof -> DEBU 9b2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:07.309 UTC [gossip.comm] readFromStream -> DEBU 9b3 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:25:07.309 UTC [gossip.comm] func2 -> DEBU 9b4 Client 172.18.0.5:49100 disconnected" +"2019-09-24 00:25:07.309 UTC [comm.grpc.server] 1 -> INFO 9b5 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:17.298Z grpc.peer_address=172.18.0.5:49100 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.9278ms +"2019-09-24 00:25:07.310 UTC [gossip.comm] writeToStream -> DEBU 9b6 Closing writing to stream" +"2019-09-24 00:25:07.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.310 UTC [policies] Evaluate -> DEBU 9b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.310 UTC [policies] Evaluate -> DEBU 9b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.310 UTC [policies] Evaluate -> DEBU 9ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.311 UTC [msp] DeserializeIdentity -> DEBU 9bb Obtaining identity" +"2019-09-24 00:25:07.311 UTC [msp.identity] newIdentity -> DEBU 9bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.316 UTC [cauthdsl] func1 -> DEBU 9bd 0xc003b6f020 gate 1569284707316785300 evaluation starts" +"2019-09-24 00:25:07.316 UTC [cauthdsl] func2 -> DEBU 9be 0xc003b6f020 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.316 UTC [cauthdsl] func2 -> DEBU 9bf 0xc003b6f020 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.317 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9c0 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 00:25:07.317 UTC [msp] Validate -> DEBU 9c1 MSP Org1MSP validating identity" +"2019-09-24 00:25:07.317 UTC [msp] getCertificationChain -> DEBU 9c2 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:07.317 UTC [cauthdsl] func2 -> DEBU 9c3 0xc003b6f020 principal matched by identity 0" +"2019-09-24 00:25:07.317 UTC [msp.identity] Verify -> DEBU 9c4 Verify: digest = 00000000 fb 6a 15 cf fa 11 9f 85 d1 e2 78 a4 d3 39 9a 78 |.j........x..9.x| +00000010 66 86 b2 1a 5d f6 03 b3 f4 7c e7 2b d1 84 ab b1 |f...]....|.+....|" +"2019-09-24 00:25:07.317 UTC [msp.identity] Verify -> DEBU 9c5 Verify: sig = 00000000 30 44 02 20 6d 9d 48 82 d3 27 14 94 8b 01 72 46 |0D. m.H..'....rF| +00000010 75 0e 8b 39 19 c0 09 b8 31 ae 7b 65 92 c0 d1 36 |u..9....1.{e...6| +00000020 ad dc 2d 32 02 20 70 f5 72 da 1d fa f7 11 84 1e |..-2. p.r.......| +00000030 43 85 91 5d d3 d6 15 d8 93 df c0 7b b8 4c 88 3e |C..].......{.L.>| +00000040 a8 ad f9 eb 4c ce |....L.|" +"2019-09-24 00:25:07.318 UTC [cauthdsl] func2 -> DEBU 9c6 0xc003b6f020 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.318 UTC [cauthdsl] func1 -> DEBU 9c7 0xc003b6f020 gate 1569284707316785300 evaluation succeeds" +"2019-09-24 00:25:07.318 UTC [policies] Evaluate -> DEBU 9c8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.318 UTC [policies] Evaluate -> DEBU 9c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.321 UTC [policies] Evaluate -> DEBU 9ca Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.322 UTC [policies] Evaluate -> DEBU 9cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.322 UTC [msp] DeserializeIdentity -> DEBU 9cc Obtaining identity" +"2019-09-24 00:25:07.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9cd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.323 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9ce Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.323 UTC [policies] Evaluate -> DEBU 9cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.326 UTC [policies] Evaluate -> DEBU 9d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.327 UTC [policies] Evaluate -> DEBU 9d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.327 UTC [cauthdsl] func1 -> DEBU 9d2 0xc003b80da0 gate 1569284707327630100 evaluation starts" +"2019-09-24 00:25:07.327 UTC [cauthdsl] func2 -> DEBU 9d3 0xc003b80da0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.327 UTC [cauthdsl] func2 -> DEBU 9d4 0xc003b80da0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.327 UTC [cauthdsl] func2 -> DEBU 9d5 0xc003b80da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.327 UTC [cauthdsl] func2 -> DEBU 9d6 0xc003b80da0 principal evaluation fails" +"2019-09-24 00:25:07.327 UTC [cauthdsl] func1 -> DEBU 9d7 0xc003b80da0 gate 1569284707327630100 evaluation fails" +"2019-09-24 00:25:07.328 UTC [policies] Evaluate -> DEBU 9d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.328 UTC [policies] Evaluate -> DEBU 9d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.328 UTC [policies] Evaluate -> DEBU 9da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.328 UTC [cauthdsl] func1 -> DEBU 9db 0xc003b815e0 gate 1569284707328154600 evaluation starts" +"2019-09-24 00:25:07.328 UTC [cauthdsl] func2 -> DEBU 9dc 0xc003b815e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.328 UTC [cauthdsl] func2 -> DEBU 9dd 0xc003b815e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.328 UTC [cauthdsl] func2 -> DEBU 9de 0xc003b815e0 principal matched by identity 0" +"2019-09-24 00:25:07.328 UTC [msp.identity] Verify -> DEBU 9df Verify: digest = 00000000 8c 64 c2 57 71 bd 4e 49 a7 31 6f ab 28 9e 18 d2 |.d.Wq.NI.1o.(...| +00000010 06 d1 b5 0f ad 29 54 78 1c 78 c0 ee fd c4 2a f0 |.....)Tx.x....*.|" +"2019-09-24 00:25:07.328 UTC [msp.identity] Verify -> DEBU 9e0 Verify: sig = 00000000 30 44 02 20 55 e6 9d 11 11 3c 57 86 20 a6 39 ad |0D. U.... DEBU 9e1 0xc003b815e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.329 UTC [cauthdsl] func1 -> DEBU 9e2 0xc003b815e0 gate 1569284707328154600 evaluation succeeds" +"2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9e5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.329 UTC [msp] DeserializeIdentity -> DEBU 9e7 Obtaining identity" +"2019-09-24 00:25:07.329 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9e8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.329 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9e9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.329 UTC [policies] Evaluate -> DEBU 9eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.333 UTC [policies] Evaluate -> DEBU 9ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.333 UTC [cauthdsl] func1 -> DEBU 9ed 0xc003bba6c0 gate 1569284707333183300 evaluation starts" +"2019-09-24 00:25:07.333 UTC [cauthdsl] func2 -> DEBU 9ee 0xc003bba6c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.333 UTC [cauthdsl] func2 -> DEBU 9ef 0xc003bba6c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.333 UTC [cauthdsl] func2 -> DEBU 9f0 0xc003bba6c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.333 UTC [cauthdsl] func2 -> DEBU 9f1 0xc003bba6c0 principal evaluation fails" +"2019-09-24 00:25:07.333 UTC [cauthdsl] func1 -> DEBU 9f2 0xc003bba6c0 gate 1569284707333183300 evaluation fails" +"2019-09-24 00:25:07.333 UTC [policies] Evaluate -> DEBU 9f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.333 UTC [policies] Evaluate -> DEBU 9f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.333 UTC [policies] Evaluate -> DEBU 9f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.334 UTC [cauthdsl] func1 -> DEBU 9f6 0xc003bbaf00 gate 1569284707333977200 evaluation starts" +"2019-09-24 00:25:07.334 UTC [cauthdsl] func2 -> DEBU 9f7 0xc003bbaf00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.334 UTC [cauthdsl] func2 -> DEBU 9f8 0xc003bbaf00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.343 UTC [cauthdsl] func2 -> DEBU 9f9 0xc003bbaf00 principal matched by identity 0" +"2019-09-24 00:25:07.343 UTC [msp.identity] Verify -> DEBU 9fa Verify: digest = 00000000 24 a6 67 ec 93 80 1b 1a f8 a7 1f 3f 02 93 6b 08 |$.g........?..k.| +00000010 3d 1c 5b eb 65 f9 87 47 b6 92 d6 53 36 d1 44 ec |=.[.e..G...S6.D.|" +"2019-09-24 00:25:07.344 UTC [msp.identity] Verify -> DEBU 9fb Verify: sig = 00000000 30 44 02 20 5a 67 eb 00 01 36 77 60 49 3a cf c9 |0D. Zg...6w`I:..| +00000010 01 18 a3 c8 c6 e9 0a 53 c0 8e 4e 1a 49 bc 73 1c |.......S..N.I.s.| +00000020 b1 8d e9 d5 02 20 7a 22 f4 df cc 5a 24 c7 53 22 |..... z"...Z$.S"| +00000030 18 57 47 00 77 c6 6d 00 59 78 66 79 fa cd 47 0d |.WG.w.m.Yxfy..G.| +00000040 b9 e2 9d e3 78 4a |....xJ|" +"2019-09-24 00:25:07.347 UTC [cauthdsl] func2 -> DEBU 9fc 0xc003bbaf00 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.347 UTC [cauthdsl] func1 -> DEBU 9fd 0xc003bbaf00 gate 1569284707333977200 evaluation succeeds" +"2019-09-24 00:25:07.347 UTC [policies] Evaluate -> DEBU 9fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.347 UTC [policies] Evaluate -> DEBU 9ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.347 UTC [policies] Evaluate -> DEBU a00 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.347 UTC [policies] Evaluate -> DEBU a01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.347 UTC [gossip.gossip] JoinChan -> INFO a02 Joining gossip network of channel businesschannel with 2 organizations" +"2019-09-24 00:25:07.347 UTC [gossip.gossip] learnAnchorPeers -> INFO a03 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-09-24 00:25:07.347 UTC [gossip.gossip] learnAnchorPeers -> INFO a04 Anchor peer with same endpoint, skipping connecting to myself" +"2019-09-24 00:25:07.347 UTC [gossip.gossip] learnAnchorPeers -> INFO a05 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-09-24 00:25:07.347 UTC [gossip.discovery] Connect -> DEBU a06 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +"2019-09-24 00:25:07.347 UTC [gossip.discovery] Connect -> DEBU a07 Exiting" +"2019-09-24 00:25:07.347 UTC [gossip.service] updateEndpoints -> DEBU a08 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-09-24 00:25:07.348 UTC [msp] DeserializeIdentity -> DEBU a09 Obtaining identity" +"2019-09-24 00:25:07.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.350 UTC [msp] DeserializeIdentity -> DEBU a0b Obtaining identity" +"2019-09-24 00:25:07.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.351 UTC [peer] updateTrustedRoots -> DEBU a0d Updating trusted root authorities for channel businesschannel" +"2019-09-24 00:25:07.353 UTC [comm.grpc.server] 1 -> INFO a0e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.326Z grpc.peer_address=172.18.0.8:34574 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147.5µs +"2019-09-24 00:25:07.354 UTC [msp] DeserializeIdentity -> DEBU a0f Obtaining identity" +"2019-09-24 00:25:07.354 UTC [msp] DeserializeIdentity -> DEBU a10 Obtaining identity" +"2019-09-24 00:25:07.354 UTC [msp] DeserializeIdentity -> DEBU a11 Obtaining identity" +"2019-09-24 00:25:07.354 UTC [msp] DeserializeIdentity -> DEBU a12 Obtaining identity" +"2019-09-24 00:25:07.373 UTC [gossip.comm] Send -> DEBU a13 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:07.373 UTC [msp] DeserializeIdentity -> DEBU a14 Obtaining identity" +"2019-09-24 00:25:07.373 UTC [msp] DeserializeIdentity -> DEBU a15 Obtaining identity" +"2019-09-24 00:25:07.374 UTC [gossip.comm] sendToEndpoint -> DEBU a16 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:25:07.374 UTC [gossip.comm] createConnection -> DEBU a17 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:07.389 UTC [grpc] DialContext -> DEBU a18 parsed scheme: """ +"2019-09-24 00:25:07.389 UTC [grpc] DialContext -> DEBU a19 scheme "" not registered, fallback to default scheme" +"2019-09-24 00:25:07.389 UTC [grpc] watcher -> DEBU a1a ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-09-24 00:25:07.389 UTC [grpc] switchBalancer -> DEBU a1b ClientConn switching balancer to "pick_first"" +"2019-09-24 00:25:07.389 UTC [grpc] HandleSubConnStateChange -> DEBU a1c pickfirstBalancer: HandleSubConnStateChange: 0xc003c22120, CONNECTING" +"2019-09-24 00:25:07.396 UTC [grpc] DialContext -> DEBU a1d parsed scheme: """ +"2019-09-24 00:25:07.396 UTC [grpc] DialContext -> DEBU a1e scheme "" not registered, fallback to default scheme" +"2019-09-24 00:25:07.401 UTC [grpc] watcher -> DEBU a1f ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +"2019-09-24 00:25:07.401 UTC [grpc] switchBalancer -> DEBU a20 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:25:07.401 UTC [grpc] HandleSubConnStateChange -> DEBU a21 pickfirstBalancer: HandleSubConnStateChange: 0xc003c42850, CONNECTING" +"2019-09-24 00:25:07.414 UTC [msp] GetDefaultSigningIdentity -> DEBU a22 Obtaining default signing identity" +"2019-09-24 00:25:07.414 UTC [msp.identity] Sign -> DEBU a24 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:07.414 UTC [msp.identity] Sign -> DEBU a25 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:07.414 UTC [comm.grpc.server] 1 -> INFO a23 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.414Z grpc.peer_address=172.18.0.6:43264 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=127µs +"2019-09-24 00:25:07.416 UTC [gossip.comm] authenticateRemotePeer -> DEBU a26 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:34574" +"2019-09-24 00:25:07.424 UTC [gossip.comm] authenticateRemotePeer -> DEBU a27 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:34574" +"2019-09-24 00:25:07.424 UTC [msp] DeserializeIdentity -> DEBU a28 Obtaining identity" +"2019-09-24 00:25:07.424 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.430 UTC [msp] DeserializeIdentity -> DEBU a2a Obtaining identity" +"2019-09-24 00:25:07.431 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a2b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.431 UTC [msp] DeserializeIdentity -> DEBU a2c Obtaining identity" +"2019-09-24 00:25:07.432 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a2d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a2e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.436 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a2f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.436 UTC [policies] Evaluate -> DEBU a30 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.436 UTC [policies] Evaluate -> DEBU a31 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.436 UTC [policies] Evaluate -> DEBU a32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.449 UTC [msp] GetDefaultSigningIdentity -> DEBU a33 Obtaining default signing identity" +"2019-09-24 00:25:07.449 UTC [msp.identity] Sign -> DEBU a34 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:07.449 UTC [msp.identity] Sign -> DEBU a35 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:07.454 UTC [gossip.comm] authenticateRemotePeer -> DEBU a36 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43264" +"2019-09-24 00:25:07.455 UTC [gossip.comm] authenticateRemotePeer -> DEBU a37 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:43264" +"2019-09-24 00:25:07.455 UTC [msp] DeserializeIdentity -> DEBU a38 Obtaining identity" +"2019-09-24 00:25:07.473 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.474 UTC [msp] DeserializeIdentity -> DEBU a3a Obtaining identity" +"2019-09-24 00:25:07.437 UTC [cauthdsl] func1 -> DEBU a3b 0xc003cb29c0 gate 1569284707437540100 evaluation starts" +"2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a3c 0xc003cb29c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a3d 0xc003cb29c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a3e 0xc003cb29c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a3f 0xc003cb29c0 principal evaluation fails" +"2019-09-24 00:25:07.476 UTC [cauthdsl] func1 -> DEBU a40 0xc003cb29c0 gate 1569284707437540100 evaluation fails" +"2019-09-24 00:25:07.476 UTC [policies] Evaluate -> DEBU a41 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.476 UTC [policies] Evaluate -> DEBU a42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.476 UTC [policies] Evaluate -> DEBU a43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.476 UTC [cauthdsl] func1 -> DEBU a44 0xc003cb3a30 gate 1569284707476705500 evaluation starts" +"2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a45 0xc003cb3a30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a46 0xc003cb3a30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.476 UTC [cauthdsl] func2 -> DEBU a47 0xc003cb3a30 principal matched by identity 0" +"2019-09-24 00:25:07.476 UTC [msp.identity] Verify -> DEBU a48 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-09-24 00:25:07.477 UTC [msp.identity] Verify -> DEBU a49 Verify: sig = 00000000 30 44 02 20 5f 9d be b8 3b ad 70 eb b5 0c cc 91 |0D. _...;.p.....| +00000010 fa 74 d5 c1 5f 93 df 66 ee d0 84 04 79 50 9a 7c |.t.._..f....yP.|| +00000020 70 6c 36 d2 02 20 22 dd 27 7c b5 e5 a0 58 13 ac |pl6.. ".'|...X..| +00000030 9c 68 4b e0 b8 a1 a5 0d 3a 24 13 3c 1c fe 4f 68 |.hK.....:$.<..Oh| +00000040 08 71 cd e8 57 5b |.q..W[|" +"2019-09-24 00:25:07.477 UTC [cauthdsl] func2 -> DEBU a4a 0xc003cb3a30 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.477 UTC [cauthdsl] func1 -> DEBU a4b 0xc003cb3a30 gate 1569284707476705500 evaluation succeeds" +"2019-09-24 00:25:07.477 UTC [policies] Evaluate -> DEBU a4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.477 UTC [policies] Evaluate -> DEBU a4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.477 UTC [policies] Evaluate -> DEBU a4e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.477 UTC [policies] Evaluate -> DEBU a4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.477 UTC [gossip.comm] authenticateRemotePeer -> DEBU a50 Authenticated 172.18.0.8:34574" +"2019-09-24 00:25:07.477 UTC [gossip.comm] GossipStream -> DEBU a51 Servicing 172.18.0.8:34574" +"2019-09-24 00:25:07.477 UTC [gossip.comm] readFromStream -> DEBU a52 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +"2019-09-24 00:25:07.477 UTC [gossip.comm] writeToStream -> DEBU a53 Closing writing to stream" +"2019-09-24 00:25:07.477 UTC [gossip.comm] serviceConnection -> DEBU a54 Closing reading from stream" +"2019-09-24 00:25:07.477 UTC [gossip.comm] func2 -> DEBU a55 Client 172.18.0.8:34556 disconnected" +"2019-09-24 00:25:07.477 UTC [comm.grpc.server] 1 -> INFO a56 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:34556 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.5237619s +"2019-09-24 00:25:07.478 UTC [gossip.comm] serviceConnection -> DEBU a57 Closing reading from stream" +"2019-09-24 00:25:07.478 UTC [gossip.comm] func2 -> DEBU a58 Client 172.18.0.8:34574 disconnected" +"2019-09-24 00:25:07.478 UTC [comm.grpc.server] 1 -> INFO a59 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:17.413Z grpc.peer_address=172.18.0.8:34574 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=63.8145ms +"2019-09-24 00:25:07.478 UTC [gossip.comm] writeToStream -> DEBU a5a Closing writing to stream" +"2019-09-24 00:25:07.479 UTC [gossip.gossip] handleMessage -> DEBU a5b Entering, 172.18.0.6:43244 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:2696917409125458741 tag:EMPTY mem_req:F\266\2123\307\221DX\265\273\002 \030I\262j\000\365F\007\364\266,?\276\370\236j\014T\246V;\177\362\334\343\213\274\006\274\335:R" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.479 UTC [gossip.gossip] handleMessage -> DEBU a5c Exiting" +"2019-09-24 00:25:07.479 UTC [gossip.discovery] handleMsgFromComm -> DEBU a5d Got message: GossipMessage: nonce:2696917409125458741 tag:EMPTY mem_req:F\266\2123\307\221DX\265\273\002 \030I\262j\000\365F\007\364\266,?\276\370\236j\014T\246V;\177\362\334\343\213\274\006\274\335:R" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.479 UTC [gossip.gossip] ValidateAliveMsg -> DEBU a5e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:07.479 UTC [msp] DeserializeIdentity -> DEBU a5f Obtaining identity" +"2019-09-24 00:25:07.475 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a60 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.483 UTC [grpc] infof -> DEBU a61 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:07.497 UTC [comm.grpc.server] 1 -> INFO a62 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.497Z grpc.peer_address=172.18.0.5:49112 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=154.8µs +"2019-09-24 00:25:07.499 UTC [grpc] HandleSubConnStateChange -> DEBU a63 pickfirstBalancer: HandleSubConnStateChange: 0xc003c22120, READY" +"2019-09-24 00:25:07.500 UTC [grpc] infof -> DEBU a64 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:07.483 UTC [msp] DeserializeIdentity -> DEBU a65 Obtaining identity" +"2019-09-24 00:25:07.505 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.510 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a6a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.510 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a6b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.510 UTC [policies] Evaluate -> DEBU a6c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.510 UTC [policies] Evaluate -> DEBU a6d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.510 UTC [policies] Evaluate -> DEBU a6e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.510 UTC [cauthdsl] func1 -> DEBU a6f 0xc003d0f720 gate 1569284707510536000 evaluation starts" +"2019-09-24 00:25:07.510 UTC [cauthdsl] func2 -> DEBU a70 0xc003d0f720 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.510 UTC [cauthdsl] func2 -> DEBU a71 0xc003d0f720 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.510 UTC [cauthdsl] func2 -> DEBU a72 0xc003d0f720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.510 UTC [cauthdsl] func2 -> DEBU a73 0xc003d0f720 principal evaluation fails" +"2019-09-24 00:25:07.510 UTC [cauthdsl] func1 -> DEBU a74 0xc003d0f720 gate 1569284707510536000 evaluation fails" +"2019-09-24 00:25:07.510 UTC [policies] Evaluate -> DEBU a75 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.510 UTC [policies] Evaluate -> DEBU a76 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.511 UTC [policies] Evaluate -> DEBU a77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.511 UTC [cauthdsl] func1 -> DEBU a78 0xc003d0ff60 gate 1569284707511093500 evaluation starts" +"2019-09-24 00:25:07.511 UTC [cauthdsl] func2 -> DEBU a79 0xc003d0ff60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.511 UTC [cauthdsl] func2 -> DEBU a7a 0xc003d0ff60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.511 UTC [cauthdsl] func2 -> DEBU a7b 0xc003d0ff60 principal matched by identity 0" +"2019-09-24 00:25:07.511 UTC [msp.identity] Verify -> DEBU a7c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-09-24 00:25:07.511 UTC [msp.identity] Verify -> DEBU a7d Verify: sig = 00000000 30 45 02 21 00 e0 f6 d2 99 98 4d 2e 1a 4a 98 f7 |0E.!......M..J..| +00000010 29 be f2 16 df 2c 25 a1 d7 c3 8c 8d be 0c 9d d7 |)....,%.........| +00000020 64 2f ba 05 8b 02 20 79 55 ae ef e1 8e 0c 72 76 |d/.... yU.....rv| +00000030 ef 7f 67 a0 ff 57 a5 24 a1 a2 f5 6e ec c3 cf f9 |..g..W.$...n....| +00000040 9e ab bf de f0 87 79 |......y|" +"2019-09-24 00:25:07.511 UTC [cauthdsl] func2 -> DEBU a7e 0xc003d0ff60 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.511 UTC [cauthdsl] func1 -> DEBU a7f 0xc003d0ff60 gate 1569284707511093500 evaluation succeeds" +"2019-09-24 00:25:07.511 UTC [policies] Evaluate -> DEBU a80 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.511 UTC [policies] Evaluate -> DEBU a81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.511 UTC [policies] Evaluate -> DEBU a82 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.511 UTC [policies] Evaluate -> DEBU a83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.511 UTC [gossip.comm] authenticateRemotePeer -> DEBU a84 Authenticated 172.18.0.6:43264" +"2019-09-24 00:25:07.511 UTC [gossip.comm] GossipStream -> DEBU a85 Servicing 172.18.0.6:43264" +"2019-09-24 00:25:07.510 UTC [msp] GetDefaultSigningIdentity -> DEBU a69 Obtaining default signing identity" +"2019-09-24 00:25:07.511 UTC [msp.identity] Sign -> DEBU a86 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:07.511 UTC [msp.identity] Sign -> DEBU a87 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:07.511 UTC [gossip.comm] authenticateRemotePeer -> DEBU a88 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +"2019-09-24 00:25:07.511 UTC [gossip.comm] writeToStream -> DEBU a89 Closing writing to stream" +"2019-09-24 00:25:07.512 UTC [gossip.comm] serviceConnection -> DEBU a8a Closing reading from stream" +"2019-09-24 00:25:07.512 UTC [gossip.comm] func2 -> DEBU a8b Client 172.18.0.6:43244 disconnected" +"2019-09-24 00:25:07.512 UTC [comm.grpc.server] 1 -> INFO a8c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:43244 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.4658056s +"2019-09-24 00:25:07.503 UTC [msp] GetDefaultSigningIdentity -> DEBU a67 Obtaining default signing identity" +"2019-09-24 00:25:07.512 UTC [msp.identity] Sign -> DEBU a8d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:07.512 UTC [msp.identity] Sign -> DEBU a8e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:07.512 UTC [gossip.comm] authenticateRemotePeer -> DEBU a8f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:49112" +"2019-09-24 00:25:07.512 UTC [gossip.comm] authenticateRemotePeer -> DEBU a90 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49112" +"2019-09-24 00:25:07.513 UTC [msp.identity] Verify -> DEBU a91 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-09-24 00:25:07.513 UTC [msp.identity] Verify -> DEBU a92 Verify: sig = 00000000 30 44 02 20 0f 9a 83 90 08 63 e7 24 21 d7 bb a9 |0D. .....c.$!...| +00000010 ba 53 9d 85 64 f2 4f 92 af c0 71 69 d2 bd 90 d8 |.S..d.O...qi....| +00000020 03 8d c1 42 02 20 64 8d 54 cd 1d 49 c4 af 7e cd |...B. d.T..I..~.| +00000030 95 ef e8 de 0d 67 64 69 61 f3 5d c7 3b 2d 1b 86 |.....gdia.].;-..| +00000040 49 b7 8a 66 50 f9 |I..fP.|" +"2019-09-24 00:25:07.513 UTC [gossip.comm] authenticateRemotePeer -> DEBU a93 Authenticated 172.18.0.5:49112" +"2019-09-24 00:25:07.513 UTC [gossip.comm] GossipStream -> DEBU a94 Servicing 172.18.0.5:49112" +"2019-09-24 00:25:07.513 UTC [gossip.comm] serviceConnection -> DEBU a95 Closing reading from stream" +"2019-09-24 00:25:07.513 UTC [gossip.comm] func2 -> DEBU a96 Client 172.18.0.6:43264 disconnected" +"2019-09-24 00:25:07.513 UTC [comm.grpc.server] 1 -> INFO a97 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:25:17.448Z grpc.peer_address=172.18.0.6:43264 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=64.2558ms +"2019-09-24 00:25:07.513 UTC [gossip.comm] readFromStream -> DEBU a98 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-09-24 00:25:07.513 UTC [gossip.comm] writeToStream -> DEBU a99 Closing writing to stream" +"2019-09-24 00:25:07.514 UTC [grpc] HandleSubConnStateChange -> DEBU a9a pickfirstBalancer: HandleSubConnStateChange: 0xc003c42850, READY" +"2019-09-24 00:25:07.501 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a9b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a9c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU a9d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU a9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU a9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.515 UTC [cauthdsl] func1 -> DEBU aa0 0xc003d81670 gate 1569284707515322200 evaluation starts" +"2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aa1 0xc003d81670 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aa2 0xc003d81670 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aa3 0xc003d81670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aa4 0xc003d81670 principal evaluation fails" +"2019-09-24 00:25:07.515 UTC [cauthdsl] func1 -> DEBU aa5 0xc003d81670 gate 1569284707515322200 evaluation fails" +"2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU aa6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU aa7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.515 UTC [policies] Evaluate -> DEBU aa8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.515 UTC [cauthdsl] func1 -> DEBU aa9 0xc003d81eb0 gate 1569284707515865200 evaluation starts" +"2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aaa 0xc003d81eb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aab 0xc003d81eb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.515 UTC [cauthdsl] func2 -> DEBU aac 0xc003d81eb0 principal matched by identity 0" +"2019-09-24 00:25:07.544 UTC [msp] GetDefaultSigningIdentity -> DEBU aad Obtaining default signing identity" +"2019-09-24 00:25:07.544 UTC [msp.identity] Sign -> DEBU aae Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:07.545 UTC [msp.identity] Sign -> DEBU aaf Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:07.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU ab0 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051" +"2019-09-24 00:25:07.551 UTC [gossip.gossip] handleMessage -> DEBU ab1 Entering, 172.18.0.5:49112 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:14269517514587053870 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\030" signature:"0D\002 \017\020iL\331\033\006x\010\201\346\221!\216.\026V=\242NI_\301\357\316\030\364\373\220xX.\002 :\237Q\360)\242\343\256\374\373\375\267^\205\235T\276H\210R\253\222:\243VZ\305\343\013\201\230R" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.551 UTC [grpc] infof -> DEBU ab2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:07.552 UTC [gossip.comm] authenticateRemotePeer -> DEBU ab3 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:7051" +"2019-09-24 00:25:07.552 UTC [msp] DeserializeIdentity -> DEBU ab4 Obtaining identity" +"2019-09-24 00:25:07.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ab5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.572 UTC [gossip.comm] readFromStream -> DEBU ab6 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:25:07.572 UTC [gossip.comm] func2 -> DEBU ab7 Client 172.18.0.5:49112 disconnected" +"2019-09-24 00:25:07.572 UTC [comm.grpc.server] 1 -> INFO ab8 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:49112 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=68.6173ms +"2019-09-24 00:25:07.572 UTC [gossip.comm] authenticateRemotePeer -> DEBU ab9 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:7051" +"2019-09-24 00:25:07.573 UTC [msp.identity] Verify -> DEBU aba Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-09-24 00:25:07.573 UTC [msp.identity] Verify -> DEBU abb Verify: sig = 00000000 30 45 02 21 00 f8 d1 cf 95 7e ae e7 91 fc 78 39 |0E.!.....~....x9| +00000010 59 f8 92 0a cd e1 c2 32 85 94 6e 55 44 59 25 a4 |Y......2..nUDY%.| +00000020 cf 7d a3 d8 f1 02 20 0d 0f ec e1 29 32 39 83 8b |.}.... ....)29..| +00000030 a4 83 c0 0b a0 ce a2 7c 3b 70 a7 1d e7 a3 da df |.......|;p......| +00000040 9f f7 75 f1 43 8d cc |..u.C..|" +"2019-09-24 00:25:07.573 UTC [gossip.comm] authenticateRemotePeer -> DEBU abc Authenticated 172.18.0.5:7051" +"2019-09-24 00:25:07.573 UTC [gossip.comm] createConnection -> DEBU abd Exiting" +"2019-09-24 00:25:07.573 UTC [gossip.comm] sendToEndpoint -> DEBU abe Exiting" +"2019-09-24 00:25:07.574 UTC [grpc] infof -> DEBU abf transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:07.574 UTC [gossip.comm] writeToStream -> DEBU ac0 Closing writing to stream" +"2019-09-24 00:25:07.516 UTC [msp.identity] Verify -> DEBU ac1 Verify: digest = 00000000 f6 ea 57 3c 44 0b db 8c 31 93 68 68 59 30 99 4c |..W DEBU ac2 Verify: sig = 00000000 30 45 02 21 00 9e 15 45 ec 82 da e7 6d 70 23 40 |0E.!...E....mp#@| +00000010 86 96 e7 07 bc 4b dd aa 0b cc 3e 46 b6 8a 33 c7 |.....K....>F..3.| +00000020 91 44 58 b5 bb 02 20 18 49 b2 6a 00 f5 46 07 f4 |.DX... .I.j..F..| +00000030 b6 2c 3f be f8 9e 6a 0c 54 a6 56 3b 7f f2 dc e3 |.,?...j.T.V;....| +00000040 8b bc 06 bc dd 3a 52 |.....:R|" +"2019-09-24 00:25:07.574 UTC [cauthdsl] func2 -> DEBU ac3 0xc003d81eb0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.574 UTC [cauthdsl] func1 -> DEBU ac4 0xc003d81eb0 gate 1569284707515865200 evaluation succeeds" +"2019-09-24 00:25:07.574 UTC [policies] Evaluate -> DEBU ac5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.574 UTC [policies] Evaluate -> DEBU ac6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.574 UTC [policies] Evaluate -> DEBU ac7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.574 UTC [policies] Evaluate -> DEBU ac8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.574 UTC [gossip.discovery] handleAliveMessage -> DEBU ac9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:07.575 UTC [gossip.discovery] learnExistingMembers -> DEBU aca Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:07.575 UTC [gossip.discovery] learnExistingMembers -> DEBU acb updating membership: timestamp: " +"2019-09-24 00:25:07.575 UTC [gossip.discovery] learnExistingMembers -> DEBU acc Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:07.575 UTC [gossip.discovery] learnExistingMembers -> DEBU acd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:07.575 UTC [gossip.discovery] learnExistingMembers -> DEBU ace Exiting" +"2019-09-24 00:25:07.575 UTC [gossip.discovery] handleAliveMessage -> DEBU acf Exiting" +"2019-09-24 00:25:07.575 UTC [gossip.discovery] handleMsgFromComm -> DEBU ad0 Exiting" +"2019-09-24 00:25:07.575 UTC [gossip.discovery] handleMsgFromComm -> DEBU ad1 Got message: GossipMessage: nonce:14269517514587053870 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\030" signature:"0D\002 \017\020iL\331\033\006x\010\201\346\221!\216.\026V=\242NI_\301\357\316\030\364\373\220xX.\002 :\237Q\360)\242\343\256\374\373\375\267^\205\235T\276H\210R\253\222:\243VZ\305\343\013\201\230R" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.575 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ad2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:07.576 UTC [msp.identity] Verify -> DEBU ad3 Verify: digest = 00000000 e1 1b 1e 3c 6f 35 e5 18 ac 76 0e 92 83 36 45 71 |... DEBU ad4 Verify: sig = 00000000 30 44 02 20 0f 10 69 4c d9 1b 06 78 08 81 e6 91 |0D. ..iL...x....| +00000010 21 8e 2e 16 56 3d a2 4e 49 5f c1 ef ce 18 f4 fb |!...V=.NI_......| +00000020 90 78 58 2e 02 20 3a 9f 51 f0 29 a2 e3 ae fc fb |.xX.. :.Q.).....| +00000030 fd b7 5e 85 9d 54 be 48 88 52 ab 92 3a a3 56 5a |..^..T.H.R..:.VZ| +00000040 c5 e3 0b 81 98 52 |.....R|" +"2019-09-24 00:25:07.586 UTC [msp.identity] Verify -> DEBU ad5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:07.586 UTC [msp.identity] Verify -> DEBU ad6 Verify: sig = 00000000 30 44 02 20 07 27 3d 58 39 34 ae 52 37 22 2b ed |0D. .'=X94.R7"+.| +00000010 8a 26 6d 4e 1f 0a 08 8a 56 0d ad 31 66 53 1f e3 |.&mN....V..1fS..| +00000020 17 83 34 48 02 20 4e 7a 52 7f 51 ca 1a 0d 48 3d |..4H. NzR.Q...H=| +00000030 73 f3 8f 9c 8a 5b ef 01 f8 ef 7c 80 db 85 d7 77 |s....[....|....w| +00000040 45 86 6d e7 45 18 |E.m.E.|" +"2019-09-24 00:25:07.586 UTC [gossip.discovery] handleAliveMessage -> DEBU ad7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:07.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ad8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:07.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ad9 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:07.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ada Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:07.587 UTC [gossip.discovery] learnExistingMembers -> DEBU adb Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:07.587 UTC [gossip.discovery] learnExistingMembers -> DEBU adc Exiting" +"2019-09-24 00:25:07.587 UTC [gossip.discovery] handleAliveMessage -> DEBU add Exiting" +"2019-09-24 00:25:07.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU ade Exiting" +"2019-09-24 00:25:07.587 UTC [gossip.discovery] sendMemResponse -> DEBU adf Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:07.587 UTC [msp] DeserializeIdentity -> DEBU ae0 Obtaining identity" +"2019-09-24 00:25:07.587 UTC [msp] DeserializeIdentity -> DEBU ae1 Obtaining identity" +"2019-09-24 00:25:07.588 UTC [gossip.comm] Send -> DEBU ae2 Entering, sending GossipMessage: Channel: , nonce: 14269517514587053870, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:07.588 UTC [gossip.discovery] sendMemResponse -> DEBU ae3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\030" signature:"0D\002 \017\020iL\331\033\006x\010\201\346\221!\216.\026V=\242NI_\301\357\316\030\364\373\220xX.\002 :\237Q\360)\242\343\256\374\373\375\267^\205\235T\276H\210R\253\222:\243VZ\305\343\013\201\230R" secret_envelope: > alive: > " +"2019-09-24 00:25:07.588 UTC [gossip.comm] sendToEndpoint -> DEBU ae4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 14269517514587053870, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.588 UTC [gossip.comm] sendToEndpoint -> DEBU ae5 Exiting" +"2019-09-24 00:25:07.588 UTC [gossip.discovery] sendMemResponse -> DEBU ae6 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:07.588 UTC [msp] DeserializeIdentity -> DEBU ae7 Obtaining identity" +"2019-09-24 00:25:07.588 UTC [msp] DeserializeIdentity -> DEBU ae8 Obtaining identity" +"2019-09-24 00:25:07.588 UTC [msp] DeserializeIdentity -> DEBU ae9 Obtaining identity" +"2019-09-24 00:25:07.589 UTC [gossip.comm] Send -> DEBU aea Entering, sending GossipMessage: Channel: , nonce: 2696917409125458741, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:07.589 UTC [gossip.discovery] sendMemResponse -> DEBU aeb Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\030" signature:"0D\002 \017\020iL\331\033\006x\010\201\346\221!\216.\026V=\242NI_\301\357\316\030\364\373\220xX.\002 :\237Q\360)\242\343\256\374\373\375\267^\205\235T\276H\210R\253\222:\243VZ\305\343\013\201\230R" > alive:;\307\007\325\026k\243\270\000\3412\272\364\351\215X\214\340\361\"\374\331\261\003\303\352\226\335'" > alive:F\266\2123\307\221DX\265\273\002 \030I\262j\000\365F\007\364\266,?\276\370\236j\014T\246V;\177\362\334\343\213\274\006\274\335:R" > alive: " +"2019-09-24 00:25:07.589 UTC [gossip.comm] sendToEndpoint -> DEBU aec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 2696917409125458741, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.589 UTC [gossip.comm] createConnection -> DEBU aed Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:07.591 UTC [grpc] DialContext -> DEBU aee parsed scheme: """ +"2019-09-24 00:25:07.557 UTC [msp] DeserializeIdentity -> DEBU aef Obtaining identity" +"2019-09-24 00:25:07.606 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU af0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.607 UTC [msp] DeserializeIdentity -> DEBU af1 Obtaining identity" +"2019-09-24 00:25:07.613 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU af2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.622 UTC [gossip.pull] Hello -> DEBU af3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:07.622 UTC [gossip.comm] Send -> DEBU af4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:07.622 UTC [gossip.pull] Hello -> DEBU af5 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:07.622 UTC [gossip.comm] Send -> DEBU af6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:07.623 UTC [gossip.pull] Hello -> DEBU af7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:07.623 UTC [gossip.comm] Send -> DEBU af8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:07.623 UTC [gossip.comm] sendToEndpoint -> DEBU af9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.623 UTC [gossip.comm] sendToEndpoint -> DEBU afa Exiting" +"2019-09-24 00:25:07.623 UTC [gossip.comm] sendToEndpoint -> DEBU afb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.623 UTC [gossip.comm] createConnection -> DEBU afc Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:07.629 UTC [grpc] DialContext -> DEBU afd parsed scheme: """ +"2019-09-24 00:25:07.629 UTC [grpc] DialContext -> DEBU afe scheme "" not registered, fallback to default scheme" +"2019-09-24 00:25:07.630 UTC [grpc] watcher -> DEBU aff ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +"2019-09-24 00:25:07.630 UTC [grpc] switchBalancer -> DEBU b00 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:25:07.630 UTC [grpc] HandleSubConnStateChange -> DEBU b01 pickfirstBalancer: HandleSubConnStateChange: 0xc003e50290, CONNECTING" +"2019-09-24 00:25:07.631 UTC [gossip.comm] sendToEndpoint -> DEBU b02 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.632 UTC [gossip.gossip] handleMessage -> DEBU b03 Exiting" +"2019-09-24 00:25:07.592 UTC [grpc] DialContext -> DEBU b04 scheme "" not registered, fallback to default scheme" +"2019-09-24 00:25:07.645 UTC [grpc] watcher -> DEBU b07 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-09-24 00:25:07.645 UTC [grpc] switchBalancer -> DEBU b08 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:25:07.645 UTC [msp] GetDefaultSigningIdentity -> DEBU b09 Obtaining default signing identity" +"2019-09-24 00:25:07.645 UTC [grpc] HandleSubConnStateChange -> DEBU b0a pickfirstBalancer: HandleSubConnStateChange: 0xc003e50890, CONNECTING" +"2019-09-24 00:25:07.639 UTC [gossip.comm] func1 -> DEBU b05 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.645 UTC [msp.identity] Sign -> DEBU b0b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151015 " +"2019-09-24 00:25:07.645 UTC [msp.identity] Sign -> DEBU b0c Sign: digest: C335C6B5B5F9B706720B30AAB41C78DE0FECBA8131B9AED66365D9EECE16DA8C " +"2019-09-24 00:25:07.645 UTC [gossip.gossip] handleMessage -> DEBU b0d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.645 UTC [msp] GetDefaultSigningIdentity -> DEBU b0e Obtaining default signing identity" +"2019-09-24 00:25:07.645 UTC [gossip.pull] HandleMessage -> DEBU b0f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.645 UTC [msp.identity] Sign -> DEBU b10 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:07.645 UTC [msp.identity] Sign -> DEBU b11 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:07.645 UTC [gossip.gossip] handleMessage -> DEBU b12 Exiting" +"2019-09-24 00:25:07.645 UTC [gossip.comm] Send -> DEBU b13 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:07.645 UTC [msp] DeserializeIdentity -> DEBU b14 Obtaining identity" +"2019-09-24 00:25:07.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b06 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.646 UTC [gossip.comm] Send -> DEBU b15 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:07.646 UTC [msp] DeserializeIdentity -> DEBU b16 Obtaining identity" +"2019-09-24 00:25:07.646 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b17 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.646 UTC [gossip.comm] Send -> DEBU b19 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.646 UTC [gossip.comm] sendToEndpoint -> DEBU b1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.646 UTC [cauthdsl] func1 -> DEBU b1d 0xc003e51130 gate 1569284707646417500 evaluation starts" +"2019-09-24 00:25:07.646 UTC [cauthdsl] func2 -> DEBU b1e 0xc003e51130 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.646 UTC [gossip.comm] sendToEndpoint -> DEBU b1f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.646 UTC [cauthdsl] func2 -> DEBU b20 0xc003e51130 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.646 UTC [gossip.comm] sendToEndpoint -> DEBU b21 Exiting" +"2019-09-24 00:25:07.646 UTC [cauthdsl] func2 -> DEBU b22 0xc003e51130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.646 UTC [cauthdsl] func2 -> DEBU b23 0xc003e51130 principal evaluation fails" +"2019-09-24 00:25:07.646 UTC [cauthdsl] func1 -> DEBU b24 0xc003e51130 gate 1569284707646417500 evaluation fails" +"2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b25 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.647 UTC [gossip.comm] sendToEndpoint -> DEBU b27 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.646 UTC [policies] Evaluate -> DEBU b28 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.656 UTC [peer] buildTrustedRootsForChain -> DEBU b29 updating root CAs for channel [businesschannel]" +"2019-09-24 00:25:07.657 UTC [peer] buildTrustedRootsForChain -> DEBU b2a adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 00:25:07.658 UTC [peer] buildTrustedRootsForChain -> DEBU b2b adding app root CAs for MSP [Org1MSP]" +"2019-09-24 00:25:07.658 UTC [peer] buildTrustedRootsForChain -> DEBU b2c adding app root CAs for MSP [Org2MSP]" +"2019-09-24 00:25:07.663 UTC [committer.txvalidator] validateTx -> DEBU b2d config transaction received for chain businesschannel" +"2019-09-24 00:25:07.663 UTC [committer.txvalidator] validateTx -> DEBU b2e [businesschannel] validateTx completes for block 0xc0038b0a00 env 0xc00392c8c0 txn 0" +"2019-09-24 00:25:07.663 UTC [committer.txvalidator] Validate -> DEBU b2f got result for idx 0, code 0" +"2019-09-24 00:25:07.663 UTC [committer.txvalidator] Validate -> INFO b30 [businesschannel] Validated block [2] in 491ms" +"2019-09-24 00:25:07.663 UTC [gossip.privdata] listMissingPrivateData -> DEBU b31 Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 00:25:07.664 UTC [gossip.privdata] StoreBlock -> DEBU b32 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 00:25:07.664 UTC [committer] preCommit -> DEBU b33 Received configuration update, calling CSCC ConfigUpdate" +"2019-09-24 00:25:07.664 UTC [kvledger] CommitWithPvtData -> DEBU b34 [businesschannel] Validating state for block [2]" +"2019-09-24 00:25:07.664 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU b35 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 00:25:07.664 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU b36 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 00:25:07.664 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU b37 Validating new block with num trans = [1]" +"2019-09-24 00:25:07.664 UTC [gossip.comm] func1 -> DEBU b38 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.664 UTC [gossip.gossip] handleMessage -> DEBU b39 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.664 UTC [gossip.gossip] handleMessage -> DEBU b3a Exiting" +"2019-09-24 00:25:07.664 UTC [gossip.discovery] handleMsgFromComm -> DEBU b3b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.665 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b3c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:07.665 UTC [msp.identity] Verify -> DEBU b3d Verify: digest = 00000000 c3 35 c6 b5 b5 f9 b7 06 72 0b 30 aa b4 1c 78 de |.5......r.0...x.| +00000010 0f ec ba 81 31 b9 ae d6 63 65 d9 ee ce 16 da 8c |....1...ce......|" +"2019-09-24 00:25:07.665 UTC [msp.identity] Verify -> DEBU b3e Verify: sig = 00000000 30 45 02 21 00 cd 80 4d e9 ce 58 d1 a1 96 98 74 |0E.!...M..X....t| +00000010 44 46 72 c1 2c 2a 00 20 cd c4 48 8e 44 f9 a0 44 |DFr.,*. ..H.D..D| +00000020 66 0d a8 a4 58 02 20 43 ff 46 9b 0a e6 4a fc bb |f...X. C.F...J..| +00000030 db b3 2e 4d 8d 1f 38 e6 07 31 29 8b 94 fa 2e 59 |...M..8..1)....Y| +00000040 1f e7 0e 32 98 46 ad |...2.F.|" +"2019-09-24 00:25:07.665 UTC [msp.identity] Verify -> DEBU b3f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:07.665 UTC [msp.identity] Verify -> DEBU b40 Verify: sig = 00000000 30 44 02 20 36 70 83 78 83 e5 37 41 b6 9d 13 e1 |0D. 6p.x..7A....| +00000010 dd 84 55 50 92 30 92 b2 da a4 76 25 1d 15 0c 5c |..UP.0....v%...\| +00000020 c6 31 49 db 02 20 77 ce 4a 3f f7 6b d6 60 e3 08 |.1I.. w.J?.k.`..| +00000030 98 f7 db 0b 93 50 78 db 59 eb 6c d6 6b 08 32 61 |.....Px.Y.l.k.2a| +00000040 8a 16 d3 0b 85 9c |......|" +"2019-09-24 00:25:07.665 UTC [gossip.discovery] handleAliveMessage -> DEBU b41 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:07.665 UTC [gossip.discovery] isSentByMe -> DEBU b42 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:07.665 UTC [gossip.discovery] handleAliveMessage -> DEBU b43 Exiting" +"2019-09-24 00:25:07.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU b44 Exiting" +"2019-09-24 00:25:07.664 UTC [valimpl] ValidateAndPrepareBatch -> DEBU b45 ValidateAndPrepareBatch() for block number = [2]" +"2019-09-24 00:25:07.669 UTC [valimpl] ValidateAndPrepareBatch -> DEBU b46 preprocessing ProtoBlock..." +"2019-09-24 00:25:07.650 UTC [cauthdsl] func1 -> DEBU b47 0xc003e51970 gate 1569284707650950300 evaluation starts" +"2019-09-24 00:25:07.670 UTC [cauthdsl] func2 -> DEBU b48 0xc003e51970 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.670 UTC [cauthdsl] func2 -> DEBU b49 0xc003e51970 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.670 UTC [cauthdsl] func2 -> DEBU b4a 0xc003e51970 principal matched by identity 0" +"2019-09-24 00:25:07.670 UTC [valimpl] preprocessProtoBlock -> DEBU b4b txType=CONFIG" +"2019-09-24 00:25:07.670 UTC [msp.identity] Verify -> DEBU b4c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-09-24 00:25:07.670 UTC [msp.identity] Verify -> DEBU b4d Verify: sig = 00000000 30 44 02 20 08 b3 4d 15 b7 6d d7 68 21 06 50 ac |0D. ..M..m.h!.P.| +00000010 80 67 e4 7a d0 dc d0 46 7e ab 23 3b ec 35 89 dd |.g.z...F~.#;.5..| +00000020 50 60 38 14 02 20 0d cd f2 47 07 dc 29 40 c6 03 |P`8.. ...G..)@..| +00000030 7c 70 16 0b 4a fd 80 28 51 d1 06 32 83 60 52 ab ||p..J..(Q..2.`R.| +00000040 76 bb 04 9b 9a fe |v.....|" +"2019-09-24 00:25:07.670 UTC [valimpl] processNonEndorserTx -> DEBU b4e Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-09-24 00:25:07.670 UTC [cauthdsl] func2 -> DEBU b4f 0xc003e51970 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.670 UTC [cauthdsl] func1 -> DEBU b50 0xc003e51970 gate 1569284707650950300 evaluation succeeds" +"2019-09-24 00:25:07.670 UTC [policies] Evaluate -> DEBU b51 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.670 UTC [policies] Evaluate -> DEBU b52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.670 UTC [policies] Evaluate -> DEBU b53 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.670 UTC [policies] Evaluate -> DEBU b54 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.670 UTC [gossip.comm] authenticateRemotePeer -> DEBU b55 Authenticated 172.18.0.6:7051" +"2019-09-24 00:25:07.671 UTC [msp] DeserializeIdentity -> DEBU b56 Obtaining identity" +"2019-09-24 00:25:07.670 UTC [valimpl] processNonEndorserTx -> DEBU b57 Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-09-24 00:25:07.671 UTC [msp] DeserializeIdentity -> DEBU b58 Obtaining identity" +"2019-09-24 00:25:07.671 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU b59 constructing new tx simulator" +"2019-09-24 00:25:07.671 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU b5a constructing new tx simulator txid = []" +"2019-09-24 00:25:07.671 UTC [msp.identity] newIdentity -> DEBU b5b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.671 UTC [msp] GetDefaultSigningIdentity -> DEBU b5c Obtaining default signing identity" +"2019-09-24 00:25:07.671 UTC [msp.identity] Sign -> DEBU b5d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151016 " +"2019-09-24 00:25:07.671 UTC [msp.identity] Sign -> DEBU b5e Sign: digest: 65FBCB94AD0B30160C1EA43FD4FEEEBFE9348C7FEA0347474595EBE7730E2670 " +"2019-09-24 00:25:07.671 UTC [peer] GenerateSimulationResults -> DEBU b5f Processing CONFIG" +"2019-09-24 00:25:07.671 UTC [msp] GetDefaultSigningIdentity -> DEBU b60 Obtaining default signing identity" +"2019-09-24 00:25:07.672 UTC [msp.identity] Sign -> DEBU b61 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:07.672 UTC [msp.identity] Sign -> DEBU b62 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:07.672 UTC [msp] DeserializeIdentity -> DEBU b63 Obtaining identity" +"2019-09-24 00:25:07.672 UTC [gossip.comm] Send -> DEBU b65 Entering, sending GossipMessage: nonce:5232390643687232235 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:07.688 UTC [gossip.comm] sendToEndpoint -> DEBU b66 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:5232390643687232235 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.704 UTC [grpc] HandleSubConnStateChange -> DEBU b67 pickfirstBalancer: HandleSubConnStateChange: 0xc003e50290, READY" +"2019-09-24 00:25:07.708 UTC [grpc] infof -> DEBU b68 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:07.684 UTC [peer] processChannelConfigTx -> DEBU b64 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-09-24 00:25:07.708 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU b69 Simulation completed, getting simulation results" +"2019-09-24 00:25:07.709 UTC [lockbasedtxmgr] Done -> DEBU b6a Done with transaction simulation / query execution []" +"2019-09-24 00:25:07.709 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU b6b Block [2] Transaction index [0] TxId [] marked as valid by state validator" +"2019-09-24 00:25:07.709 UTC [valinternal] ApplyWriteSet -> DEBU b6c txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003e29a40)}" +"2019-09-24 00:25:07.709 UTC [valimpl] ValidateAndPrepareBatch -> DEBU b6d validating rwset..." +"2019-09-24 00:25:07.709 UTC [valimpl] ValidateAndPrepareBatch -> DEBU b6e postprocessing ProtoBlock..." +"2019-09-24 00:25:07.709 UTC [valimpl] ValidateAndPrepareBatch -> DEBU b6f ValidateAndPrepareBatch() complete" +"2019-09-24 00:25:07.709 UTC [kvledger] CommitWithPvtData -> DEBU b70 [businesschannel] Adding CommitHash to the block [2]" +"2019-09-24 00:25:07.709 UTC [kvledger] CommitWithPvtData -> DEBU b71 [businesschannel] Committing block [2] to storage" +"2019-09-24 00:25:07.709 UTC [ledgerstorage] CommitWithPvtData -> DEBU b72 Writing block [2] to pvt block store" +"2019-09-24 00:25:07.713 UTC [pvtdatastorage] Prepare -> DEBU b73 Saved 0 private data write sets for block [2]" +"2019-09-24 00:25:07.715 UTC [msp] GetDefaultSigningIdentity -> DEBU b74 Obtaining default signing identity" +"2019-09-24 00:25:07.715 UTC [msp.identity] Sign -> DEBU b75 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:07.715 UTC [gossip.comm] func1 -> DEBU b76 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.715 UTC [msp.identity] Sign -> DEBU b77 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:07.716 UTC [gossip.comm] authenticateRemotePeer -> DEBU b78 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +"2019-09-24 00:25:07.719 UTC [gossip.gossip] handleMessage -> DEBU b79 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.720 UTC [gossip.gossip] handleMessage -> DEBU b7a Exiting" +"2019-09-24 00:25:07.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU b7b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.728 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b7c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:07.729 UTC [msp.identity] Verify -> DEBU b7d Verify: digest = 00000000 a0 05 6e 11 9f cf f1 f8 66 9a 82 b2 d0 ec 41 9e |..n.....f.....A.| +00000010 f5 58 3d c2 6f a0 2f 34 90 eb e1 e1 4e 8e 3e 56 |.X=.o./4....N.>V|" +"2019-09-24 00:25:07.729 UTC [msp.identity] Verify -> DEBU b7e Verify: sig = 00000000 30 44 02 20 0b fe 72 44 33 c1 18 60 58 eb 5e d9 |0D. ..rD3..`X.^.| +00000010 cc 3c 86 27 97 7a 00 b7 2a 72 3e 1d 41 7e 4f 5d |.<.'.z..*r>.A~O]| +00000020 45 52 11 81 02 20 3c 00 4d 1f 11 62 23 8b 3e fe |ER... <.M..b#.>.| +00000030 ce 66 64 26 bf 2d 15 0a 55 03 af c9 ef da 27 8c |.fd&.-..U.....'.| +00000040 36 32 39 ce 48 10 |629.H.|" +"2019-09-24 00:25:07.729 UTC [gossip.discovery] handleAliveMessage -> DEBU b7f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.729 UTC [gossip.discovery] learnExistingMembers -> DEBU b80 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:07.729 UTC [gossip.discovery] learnExistingMembers -> DEBU b81 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:07.729 UTC [gossip.discovery] learnExistingMembers -> DEBU b82 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:07.729 UTC [gossip.discovery] learnExistingMembers -> DEBU b83 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:07.729 UTC [gossip.discovery] learnExistingMembers -> DEBU b84 Exiting" +"2019-09-24 00:25:07.729 UTC [gossip.discovery] handleAliveMessage -> DEBU b85 Exiting" +"2019-09-24 00:25:07.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU b86 Exiting" +"2019-09-24 00:25:07.730 UTC [grpc] infof -> DEBU b87 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:07.747 UTC [fsblkstorage] indexBlock -> DEBU b88 Indexing block [blockNum=2, blockHash=[]byte{0x4e, 0xd0, 0x49, 0x23, 0xb9, 0x3e, 0xc0, 0x5c, 0x31, 0x7d, 0x41, 0xd1, 0x41, 0x9e, 0x85, 0xa3, 0x3a, 0xc, 0xfa, 0x4b, 0xf1, 0xd7, 0x9c, 0x1, 0x39, 0x4c, 0x1f, 0xcb, 0x3c, 0x63, 0xa5, 0x0} txOffsets= +txId=be7e094f4e6114772d86c435c98fa93588deed90dd195d27ecfc6e306eba1cfc locPointer=offset=71, bytesLength=22742 +]" +"2019-09-24 00:25:07.748 UTC [fsblkstorage] indexBlock -> DEBU b8a Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22742] for tx ID: [be7e094f4e6114772d86c435c98fa93588deed90dd195d27ecfc6e306eba1cfc] to txid-index" +"2019-09-24 00:25:07.748 UTC [gossip.comm] authenticateRemotePeer -> DEBU b89 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:7051" +"2019-09-24 00:25:07.748 UTC [fsblkstorage] indexBlock -> DEBU b8b Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22742] for tx number:[0] ID: [be7e094f4e6114772d86c435c98fa93588deed90dd195d27ecfc6e306eba1cfc] to blockNumTranNum index" +"2019-09-24 00:25:07.748 UTC [msp] DeserializeIdentity -> DEBU b8c Obtaining identity" +"2019-09-24 00:25:07.748 UTC [msp] DeserializeIdentity -> DEBU b8d Obtaining identity" +"2019-09-24 00:25:07.748 UTC [msp.identity] newIdentity -> DEBU b8e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +-----END CERTIFICATE-----" +"2019-09-24 00:25:07.749 UTC [msp] Validate -> DEBU b8f MSP Org2MSP validating identity" +"2019-09-24 00:25:07.749 UTC [msp] getCertificationChain -> DEBU b90 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:07.752 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.755 UTC [msp] DeserializeIdentity -> DEBU b93 Obtaining identity" +"2019-09-24 00:25:07.756 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b94 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.757 UTC [msp] DeserializeIdentity -> DEBU b95 Obtaining identity" +"2019-09-24 00:25:07.758 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.758 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b97 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.758 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b98 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU b99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU b9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU b9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.758 UTC [cauthdsl] func1 -> DEBU b9c 0xc003d80910 gate 1569284707758522500 evaluation starts" +"2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU b9d 0xc003d80910 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU b9e 0xc003d80910 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU b9f 0xc003d80910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU ba0 0xc003d80910 principal evaluation fails" +"2019-09-24 00:25:07.758 UTC [cauthdsl] func1 -> DEBU ba1 0xc003d80910 gate 1569284707758522500 evaluation fails" +"2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU ba2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU ba3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.758 UTC [policies] Evaluate -> DEBU ba4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.758 UTC [cauthdsl] func1 -> DEBU ba5 0xc003d811d0 gate 1569284707758891700 evaluation starts" +"2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU ba6 0xc003d811d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.758 UTC [cauthdsl] func2 -> DEBU ba7 0xc003d811d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.759 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ba8 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:25:07.759 UTC [msp] Validate -> DEBU ba9 MSP Org2MSP validating identity" +"2019-09-24 00:25:07.759 UTC [msp] getCertificationChain -> DEBU baa MSP Org2MSP getting certification chain" +"2019-09-24 00:25:07.759 UTC [cauthdsl] func2 -> DEBU bab 0xc003d811d0 principal matched by identity 0" +"2019-09-24 00:25:07.759 UTC [msp.identity] Verify -> DEBU bac Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-09-24 00:25:07.759 UTC [msp.identity] Verify -> DEBU bad Verify: sig = 00000000 30 44 02 20 5d 2e 7a 36 b9 0a 65 ac eb 03 15 b8 |0D. ].z6..e.....| +00000010 89 ac df 26 0c e4 e9 96 e8 80 a2 7d 12 86 2e 08 |...&.......}....| +00000020 ef 20 4a b4 02 20 5a b5 ba 7f 6e 02 7e e8 04 f2 |. J.. Z...n.~...| +00000030 99 19 02 fc 49 11 1e fe 85 9f c8 29 7b 35 71 bb |....I......){5q.| +00000040 e0 3b 32 9c ab 0f |.;2...|" +"2019-09-24 00:25:07.759 UTC [cauthdsl] func2 -> DEBU bae 0xc003d811d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.759 UTC [cauthdsl] func1 -> DEBU baf 0xc003d811d0 gate 1569284707758891700 evaluation succeeds" +"2019-09-24 00:25:07.759 UTC [policies] Evaluate -> DEBU bb0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.759 UTC [policies] Evaluate -> DEBU bb1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.759 UTC [policies] Evaluate -> DEBU bb2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.759 UTC [policies] Evaluate -> DEBU bb3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.759 UTC [gossip.comm] authenticateRemotePeer -> DEBU bb4 Authenticated 172.18.0.8:7051" +"2019-09-24 00:25:07.759 UTC [gossip.comm] createConnection -> DEBU bb5 Exiting" +"2019-09-24 00:25:07.759 UTC [gossip.comm] sendToEndpoint -> DEBU bb6 Exiting" +"2019-09-24 00:25:07.760 UTC [grpc] HandleSubConnStateChange -> DEBU bb7 pickfirstBalancer: HandleSubConnStateChange: 0xc003e50890, READY" +"2019-09-24 00:25:07.760 UTC [msp] DeserializeIdentity -> DEBU bb8 Obtaining identity" +"2019-09-24 00:25:07.760 UTC [msp] DeserializeIdentity -> DEBU bb9 Obtaining identity" +"2019-09-24 00:25:07.760 UTC [msp] DeserializeIdentity -> DEBU bba Obtaining identity" +"2019-09-24 00:25:07.760 UTC [gossip.comm] Send -> DEBU bbb Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:07.761 UTC [msp] DeserializeIdentity -> DEBU bbc Obtaining identity" +"2019-09-24 00:25:07.761 UTC [gossip.comm] Send -> DEBU bbd Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:07.778 UTC [gossip.comm] sendToEndpoint -> DEBU bc2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.778 UTC [gossip.comm] sendToEndpoint -> DEBU bc3 Exiting" +"2019-09-24 00:25:07.766 UTC [gossip.comm] sendToEndpoint -> DEBU bbe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.752 UTC [fsblkstorage] updateCheckpoint -> DEBU b92 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71462], isChainEmpty=[false], lastBlockNumber=[2]" +"2019-09-24 00:25:07.778 UTC [pvtdatastorage] Commit -> DEBU bc4 Committing private data for block [2]" +"2019-09-24 00:25:07.766 UTC [gossip.comm] sendToEndpoint -> DEBU bbf Exiting" +"2019-09-24 00:25:07.776 UTC [msp] GetDefaultSigningIdentity -> DEBU bc0 Obtaining default signing identity" +"2019-09-24 00:25:07.778 UTC [msp.identity] Sign -> DEBU bc5 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:07.779 UTC [msp.identity] Sign -> DEBU bc6 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:07.779 UTC [gossip.comm] authenticateRemotePeer -> DEBU bc7 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +"2019-09-24 00:25:07.777 UTC [gossip.comm] func1 -> DEBU bc1 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.779 UTC [gossip.comm] func1 -> DEBU bc8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.779 UTC [gossip.gossip] handleMessage -> DEBU bc9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.779 UTC [gossip.pull] HandleMessage -> DEBU bca GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.779 UTC [gossip.gossip] handleMessage -> DEBU bcb Exiting" +"2019-09-24 00:25:07.779 UTC [gossip.gossip] handleMessage -> DEBU bcc Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.779 UTC [gossip.gossip] handleMessage -> DEBU bcd Exiting" +"2019-09-24 00:25:07.779 UTC [gossip.discovery] handleMsgFromComm -> DEBU bce Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.779 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bcf Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:07.780 UTC [msp.identity] Verify -> DEBU bd0 Verify: digest = 00000000 c3 35 c6 b5 b5 f9 b7 06 72 0b 30 aa b4 1c 78 de |.5......r.0...x.| +00000010 0f ec ba 81 31 b9 ae d6 63 65 d9 ee ce 16 da 8c |....1...ce......|" +"2019-09-24 00:25:07.780 UTC [msp.identity] Verify -> DEBU bd1 Verify: sig = 00000000 30 45 02 21 00 cd 80 4d e9 ce 58 d1 a1 96 98 74 |0E.!...M..X....t| +00000010 44 46 72 c1 2c 2a 00 20 cd c4 48 8e 44 f9 a0 44 |DFr.,*. ..H.D..D| +00000020 66 0d a8 a4 58 02 20 43 ff 46 9b 0a e6 4a fc bb |f...X. C.F...J..| +00000030 db b3 2e 4d 8d 1f 38 e6 07 31 29 8b 94 fa 2e 59 |...M..8..1)....Y| +00000040 1f e7 0e 32 98 46 ad |...2.F.|" +"2019-09-24 00:25:07.780 UTC [gossip.discovery] handleAliveMessage -> DEBU bd2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:07.780 UTC [gossip.discovery] isSentByMe -> DEBU bd3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:07.780 UTC [gossip.discovery] handleAliveMessage -> DEBU bd4 Exiting" +"2019-09-24 00:25:07.782 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bd5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:07.783 UTC [msp] DeserializeIdentity -> DEBU bd6 Obtaining identity" +"2019-09-24 00:25:07.783 UTC [msp] Validate -> DEBU bd7 MSP Org2MSP validating identity" +"2019-09-24 00:25:07.783 UTC [msp] getCertificationChain -> DEBU bd8 MSP Org2MSP getting certification chain" +"2019-09-24 00:25:07.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bd9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bda Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bdb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.784 UTC [policies] Evaluate -> DEBU bdc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.784 UTC [policies] Evaluate -> DEBU bdd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.784 UTC [policies] Evaluate -> DEBU bde == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.784 UTC [cauthdsl] func1 -> DEBU bdf 0xc0035918c0 gate 1569284707784340300 evaluation starts" +"2019-09-24 00:25:07.784 UTC [cauthdsl] func2 -> DEBU be0 0xc0035918c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.784 UTC [cauthdsl] func2 -> DEBU be1 0xc0035918c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.784 UTC [cauthdsl] func2 -> DEBU be2 0xc0035918c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.784 UTC [cauthdsl] func2 -> DEBU be3 0xc0035918c0 principal evaluation fails" +"2019-09-24 00:25:07.784 UTC [cauthdsl] func1 -> DEBU be4 0xc0035918c0 gate 1569284707784340300 evaluation fails" +"2019-09-24 00:25:07.784 UTC [policies] Evaluate -> DEBU be5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.785 UTC [policies] Evaluate -> DEBU be6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.785 UTC [policies] Evaluate -> DEBU be7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.785 UTC [cauthdsl] func1 -> DEBU be8 0xc0035d01e0 gate 1569284707785132800 evaluation starts" +"2019-09-24 00:25:07.785 UTC [cauthdsl] func2 -> DEBU be9 0xc0035d01e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.785 UTC [cauthdsl] func2 -> DEBU bea 0xc0035d01e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.785 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU beb Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:25:07.785 UTC [msp] Validate -> DEBU bec MSP Org2MSP validating identity" +"2019-09-24 00:25:07.785 UTC [msp] getCertificationChain -> DEBU bed MSP Org2MSP getting certification chain" +"2019-09-24 00:25:07.785 UTC [cauthdsl] func2 -> DEBU bee 0xc0035d01e0 principal matched by identity 0" +"2019-09-24 00:25:07.785 UTC [msp.identity] Verify -> DEBU bef Verify: digest = 00000000 cf d5 60 b7 3f 76 d5 4e 0c da 16 b9 5b 63 6d e3 |..`.?v.N....[cm.| +00000010 1d 36 2e 9c 6d 29 92 8d b9 99 fd dc c7 2d ae 8f |.6..m).......-..|" +"2019-09-24 00:25:07.785 UTC [msp.identity] Verify -> DEBU bf0 Verify: sig = 00000000 30 45 02 21 00 fb 83 e6 4d f4 66 f1 2e 66 f7 97 |0E.!....M.f..f..| +00000010 dc c8 0e 02 84 77 99 95 dd 30 fe 40 b1 6c cb 63 |.....w...0.@.l.c| +00000020 b8 f2 00 c5 9d 02 20 4b 49 c8 01 0d a2 35 28 ef |...... KI....5(.| +00000030 f9 e9 6a 4a 1e 3a df 48 12 4d 36 a3 a8 59 b5 1e |..jJ.:.H.M6..Y..| +00000040 c6 fb 9a f7 3c 9b 8f |....<..|" +"2019-09-24 00:25:07.785 UTC [cauthdsl] func2 -> DEBU bf1 0xc0035d01e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.785 UTC [cauthdsl] func1 -> DEBU bf2 0xc0035d01e0 gate 1569284707785132800 evaluation succeeds" +"2019-09-24 00:25:07.798 UTC [gossip.comm] authenticateRemotePeer -> DEBU bf3 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:7051" +"2019-09-24 00:25:07.798 UTC [msp] DeserializeIdentity -> DEBU bf4 Obtaining identity" +"2019-09-24 00:25:07.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bf5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.798 UTC [msp] DeserializeIdentity -> DEBU bf6 Obtaining identity" +"2019-09-24 00:25:07.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bf7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.798 UTC [msp] DeserializeIdentity -> DEBU bf8 Obtaining identity" +"2019-09-24 00:25:07.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bf9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.798 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bfa Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.798 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bfb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.798 UTC [policies] Evaluate -> DEBU bfc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.798 UTC [policies] Evaluate -> DEBU bfd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.798 UTC [policies] Evaluate -> DEBU bfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.798 UTC [cauthdsl] func1 -> DEBU bff 0xc0035f46f0 gate 1569284707798910700 evaluation starts" +"2019-09-24 00:25:07.798 UTC [cauthdsl] func2 -> DEBU c00 0xc0035f46f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c01 0xc0035f46f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c02 0xc0035f46f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c03 0xc0035f46f0 principal evaluation fails" +"2019-09-24 00:25:07.799 UTC [cauthdsl] func1 -> DEBU c04 0xc0035f46f0 gate 1569284707798910700 evaluation fails" +"2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.799 UTC [cauthdsl] func1 -> DEBU c08 0xc0035f4f30 gate 1569284707799279000 evaluation starts" +"2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c09 0xc0035f4f30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c0a 0xc0035f4f30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c0b 0xc0035f4f30 principal matched by identity 0" +"2019-09-24 00:25:07.799 UTC [msp.identity] Verify -> DEBU c0c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-09-24 00:25:07.799 UTC [msp.identity] Verify -> DEBU c0d Verify: sig = 00000000 30 44 02 20 77 ae 71 6a 87 f8 18 8a 80 ab c3 dd |0D. w.qj........| +00000010 87 c8 9a 9b 1e e3 ba 1d 40 5d 0a 28 b9 26 25 e5 |........@].(.&%.| +00000020 b2 62 d4 39 02 20 0f d7 1d b7 65 4f 3e 45 6e e5 |.b.9. ....eO>En.| +00000030 fc 8b 01 7b 76 8d 9b 4f 12 82 a5 15 01 27 89 54 |...{v..O.....'.T| +00000040 b5 b4 24 35 df 34 |..$5.4|" +"2019-09-24 00:25:07.799 UTC [cauthdsl] func2 -> DEBU c0e 0xc0035f4f30 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.799 UTC [cauthdsl] func1 -> DEBU c0f 0xc0035f4f30 gate 1569284707799279000 evaluation succeeds" +"2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c12 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.799 UTC [policies] Evaluate -> DEBU c13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.800 UTC [gossip.comm] authenticateRemotePeer -> DEBU c14 Authenticated 172.18.0.6:7051" +"2019-09-24 00:25:07.800 UTC [gossip.comm] createConnection -> DEBU c15 Exiting" +"2019-09-24 00:25:07.800 UTC [gossip.comm] sendToEndpoint -> DEBU c16 Exiting" +"2019-09-24 00:25:07.800 UTC [gossip.comm] sendToEndpoint -> DEBU c17 Exiting" +"2019-09-24 00:25:07.800 UTC [gossip.comm] sendToEndpoint -> DEBU c18 Exiting" +"2019-09-24 00:25:07.800 UTC [gossip.comm] sendToEndpoint -> DEBU c19 Exiting" +"2019-09-24 00:25:07.800 UTC [gossip.comm] sendToEndpoint -> DEBU c1a Exiting" +"2019-09-24 00:25:07.800 UTC [pvtdatastorage] Commit -> DEBU c1b Committed private data for block [2]" +"2019-09-24 00:25:07.800 UTC [kvledger] CommitWithPvtData -> DEBU c1c [businesschannel] Committing block [2] transactions to state database" +"2019-09-24 00:25:07.800 UTC [lockbasedtxmgr] Commit -> DEBU c1d lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 00:25:07.801 UTC [lockbasedtxmgr] Commit -> DEBU c1e Committing updates to state database" +"2019-09-24 00:25:07.801 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU c1f Building the expiry schedules based on the update batch" +"2019-09-24 00:25:07.801 UTC [lockbasedtxmgr] Commit -> DEBU c20 Write lock acquired for committing updates to state database" +"2019-09-24 00:25:07.801 UTC [stateleveldb] ApplyUpdates -> DEBU c21 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-09-24 00:25:07.807 UTC [comm.grpc.server] 1 -> INFO c22 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:25:09.806Z grpc.peer_address=172.18.0.6:43284 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=181.1µs +"2019-09-24 00:25:07.808 UTC [lockbasedtxmgr] Commit -> DEBU c23 Updates committed to state database and the write lock is released" +"2019-09-24 00:25:07.809 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU c24 Preparing potential purge list working-set for expiringAtBlk [3]" +"2019-09-24 00:25:07.809 UTC [leveldbhelper] GetIterator -> DEBU c25 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" +"2019-09-24 00:25:07.809 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU c26 No expiry entry found for expiringAtBlk [3]" +"2019-09-24 00:25:07.809 UTC [lockbasedtxmgr] func1 -> DEBU c27 launched the background routine for preparing keys to purge with the next block" +"2019-09-24 00:25:07.810 UTC [kvledger] CommitWithPvtData -> DEBU c28 [businesschannel] Committing block [2] transactions to history database" +"2019-09-24 00:25:07.810 UTC [historyleveldb] Commit -> DEBU c29 Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" +"2019-09-24 00:25:07.810 UTC [historyleveldb] Commit -> DEBU c2a Skipping transaction [0] since it is not an endorsement transaction" +"2019-09-24 00:25:07.815 UTC [historyleveldb] Commit -> DEBU c2b Channel [businesschannel]: Updates committed to history database for blockNo [2]" +"2019-09-24 00:25:07.815 UTC [kvledger] CommitWithPvtData -> INFO c2c [businesschannel] Committed block [2] with 1 transaction(s) in 150ms (state_validation=45ms block_and_pvtdata_commit=91ms state_commit=9ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +"2019-09-24 00:25:07.815 UTC [msp] GetDefaultSigningIdentity -> DEBU c2d Obtaining default signing identity" +"2019-09-24 00:25:07.815 UTC [msp.identity] Sign -> DEBU c2e Sign: plaintext: 18057A5E1214089096D4ACDE83CEE315...624D0F542C442AB5FE8C65C22A020803 " +"2019-09-24 00:25:07.815 UTC [msp.identity] Sign -> DEBU c2f Sign: digest: F1EC6BD0D04256418F2D98EB4BDD20C3F493BA47202BD645A992264D12232CFD " +"2019-09-24 00:25:07.815 UTC [gossip.state] commitBlock -> DEBU c30 [businesschannel] Committed block [2] with 1 transaction(s)" +"2019-09-24 00:25:07.815 UTC [msp] GetDefaultSigningIdentity -> DEBU c31 Obtaining default signing identity" +"2019-09-24 00:25:07.815 UTC [msp.identity] Sign -> DEBU c32 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:25:07.816 UTC [msp.identity] Sign -> DEBU c33 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:25:07.816 UTC [gossip.comm] authenticateRemotePeer -> DEBU c34 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43284" +"2019-09-24 00:25:07.816 UTC [gossip.comm] authenticateRemotePeer -> DEBU c35 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:43284" +"2019-09-24 00:25:07.816 UTC [msp] DeserializeIdentity -> DEBU c36 Obtaining identity" +"2019-09-24 00:25:07.785 UTC [policies] Evaluate -> DEBU c37 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.826 UTC [policies] Evaluate -> DEBU c38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.827 UTC [msp] DeserializeIdentity -> DEBU c3a Obtaining identity" +"2019-09-24 00:25:07.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.827 UTC [msp] DeserializeIdentity -> DEBU c3c Obtaining identity" +"2019-09-24 00:25:07.827 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c3d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c3e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c3f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.827 UTC [policies] Evaluate -> DEBU c40 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.827 UTC [policies] Evaluate -> DEBU c41 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.826 UTC [policies] Evaluate -> DEBU c42 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.827 UTC [policies] Evaluate -> DEBU c43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.827 UTC [policies] Evaluate -> DEBU c44 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.827 UTC [cauthdsl] func1 -> DEBU c45 0xc003725da0 gate 1569284707827899900 evaluation starts" +"2019-09-24 00:25:07.827 UTC [cauthdsl] func2 -> DEBU c46 0xc003725da0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.828 UTC [gossip.discovery] handleAliveMessage -> DEBU c47 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:07.828 UTC [cauthdsl] func2 -> DEBU c48 0xc003725da0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.828 UTC [cauthdsl] func2 -> DEBU c49 0xc003725da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.828 UTC [gossip.discovery] handleAliveMessage -> DEBU c4a endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1569284680017232100, 22 but got ts: inc_num:1569284680017232100 seq_num:17 " +"2019-09-24 00:25:07.828 UTC [gossip.discovery] handleAliveMessage -> DEBU c4c Exiting" +"2019-09-24 00:25:07.828 UTC [cauthdsl] func2 -> DEBU c4b 0xc003725da0 principal evaluation fails" +"2019-09-24 00:25:07.828 UTC [cauthdsl] func1 -> DEBU c4d 0xc003725da0 gate 1569284707827899900 evaluation fails" +"2019-09-24 00:25:07.828 UTC [gossip.discovery] handleMsgFromComm -> DEBU c4e Exiting" +"2019-09-24 00:25:07.828 UTC [policies] Evaluate -> DEBU c4f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.828 UTC [policies] Evaluate -> DEBU c50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.828 UTC [policies] Evaluate -> DEBU c51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.829 UTC [cauthdsl] func1 -> DEBU c52 0xc0037905e0 gate 1569284707829022800 evaluation starts" +"2019-09-24 00:25:07.829 UTC [cauthdsl] func2 -> DEBU c53 0xc0037905e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.829 UTC [cauthdsl] func2 -> DEBU c54 0xc0037905e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.829 UTC [cauthdsl] func2 -> DEBU c55 0xc0037905e0 principal matched by identity 0" +"2019-09-24 00:25:07.829 UTC [msp.identity] Verify -> DEBU c56 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-09-24 00:25:07.829 UTC [msp.identity] Verify -> DEBU c57 Verify: sig = 00000000 30 44 02 20 02 ed d1 c0 df 6d 42 c8 6f bf fd c9 |0D. .....mB.o...| +00000010 9a 9e 94 51 d8 d1 19 c4 51 90 3e c2 ad ff 82 4d |...Q....Q.>....M| +00000020 ff 4a 01 21 02 20 58 a4 9c b0 3d 7c 0f b2 de 3d |.J.!. X...=|...=| +00000030 7f 1b 57 22 36 11 a2 77 27 91 38 d0 68 b5 52 7e |..W"6..w'.8.h.R~| +00000040 aa 52 4a 7e 69 bd |.RJ~i.|" +"2019-09-24 00:25:07.829 UTC [cauthdsl] func2 -> DEBU c58 0xc0037905e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.829 UTC [cauthdsl] func1 -> DEBU c59 0xc0037905e0 gate 1569284707829022800 evaluation succeeds" +"2019-09-24 00:25:07.829 UTC [policies] Evaluate -> DEBU c5a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.829 UTC [policies] Evaluate -> DEBU c5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.829 UTC [policies] Evaluate -> DEBU c5c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.829 UTC [policies] Evaluate -> DEBU c5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.829 UTC [gossip.comm] authenticateRemotePeer -> DEBU c5e Authenticated 172.18.0.6:43284" +"2019-09-24 00:25:07.829 UTC [gossip.comm] GossipStream -> DEBU c5f Servicing 172.18.0.6:43284" +"2019-09-24 00:25:07.830 UTC [gossip.comm] serviceConnection -> DEBU c60 Closing reading from stream" +"2019-09-24 00:25:07.830 UTC [gossip.comm] writeToStream -> DEBU c61 Closing writing to stream" +"2019-09-24 00:25:07.832 UTC [grpc] infof -> DEBU c62 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:07.832 UTC [gossip.comm] readFromStream -> DEBU c63 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-09-24 00:25:07.832 UTC [gossip.gossip] handleMessage -> DEBU c64 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.832 UTC [gossip.gossip] handleMessage -> DEBU c65 Exiting" +"2019-09-24 00:25:07.832 UTC [gossip.gossip] handleMessage -> DEBU c66 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.832 UTC [gossip.discovery] handleMsgFromComm -> DEBU c67 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.832 UTC [gossip.discovery] handleMsgFromComm -> DEBU c68 Exiting" +"2019-09-24 00:25:07.832 UTC [gossip.discovery] handleMsgFromComm -> DEBU c69 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.832 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c6a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:07.833 UTC [msp.identity] Verify -> DEBU c6b Verify: digest = 00000000 c3 35 c6 b5 b5 f9 b7 06 72 0b 30 aa b4 1c 78 de |.5......r.0...x.| +00000010 0f ec ba 81 31 b9 ae d6 63 65 d9 ee ce 16 da 8c |....1...ce......|" +"2019-09-24 00:25:07.833 UTC [msp.identity] Verify -> DEBU c6c Verify: sig = 00000000 30 45 02 21 00 cd 80 4d e9 ce 58 d1 a1 96 98 74 |0E.!...M..X....t| +00000010 44 46 72 c1 2c 2a 00 20 cd c4 48 8e 44 f9 a0 44 |DFr.,*. ..H.D..D| +00000020 66 0d a8 a4 58 02 20 43 ff 46 9b 0a e6 4a fc bb |f...X. C.F...J..| +00000030 db b3 2e 4d 8d 1f 38 e6 07 31 29 8b 94 fa 2e 59 |...M..8..1)....Y| +00000040 1f e7 0e 32 98 46 ad |...2.F.|" +"2019-09-24 00:25:07.833 UTC [gossip.discovery] handleAliveMessage -> DEBU c6d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:07.833 UTC [gossip.discovery] isSentByMe -> DEBU c6e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:07.833 UTC [gossip.discovery] handleAliveMessage -> DEBU c6f Exiting" +"2019-09-24 00:25:07.833 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c70 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:07.833 UTC [msp] DeserializeIdentity -> DEBU c71 Obtaining identity" +"2019-09-24 00:25:07.833 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c73 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.833 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c74 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.833 UTC [policies] Evaluate -> DEBU c75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.834 UTC [policies] Evaluate -> DEBU c76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.834 UTC [policies] Evaluate -> DEBU c77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.834 UTC [cauthdsl] func1 -> DEBU c78 0xc0031cb550 gate 1569284707834094900 evaluation starts" +"2019-09-24 00:25:07.834 UTC [cauthdsl] func2 -> DEBU c79 0xc0031cb550 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.834 UTC [cauthdsl] func2 -> DEBU c7a 0xc0031cb550 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.834 UTC [cauthdsl] func2 -> DEBU c7b 0xc0031cb550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.834 UTC [cauthdsl] func2 -> DEBU c7c 0xc0031cb550 principal evaluation fails" +"2019-09-24 00:25:07.834 UTC [cauthdsl] func1 -> DEBU c7d 0xc0031cb550 gate 1569284707834094900 evaluation fails" +"2019-09-24 00:25:07.834 UTC [policies] Evaluate -> DEBU c7e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.834 UTC [policies] Evaluate -> DEBU c7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.834 UTC [policies] Evaluate -> DEBU c80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.834 UTC [cauthdsl] func1 -> DEBU c81 0xc0031cbd90 gate 1569284707834881000 evaluation starts" +"2019-09-24 00:25:07.834 UTC [cauthdsl] func2 -> DEBU c82 0xc0031cbd90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.835 UTC [cauthdsl] func2 -> DEBU c83 0xc0031cbd90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.835 UTC [cauthdsl] func2 -> DEBU c84 0xc0031cbd90 principal matched by identity 0" +"2019-09-24 00:25:07.835 UTC [msp.identity] Verify -> DEBU c85 Verify: digest = 00000000 fb cf 2d b5 f0 5f 32 79 86 85 7f 19 da 71 f3 7e |..-.._2y.....q.~| +00000010 17 4e 9f 80 1c a9 51 6b 04 ee f0 bb 24 18 bb 4d |.N....Qk....$..M|" +"2019-09-24 00:25:07.835 UTC [msp.identity] Verify -> DEBU c86 Verify: sig = 00000000 30 44 02 20 63 1c 61 02 af 88 41 44 e5 7e 46 0a |0D. c.a...AD.~F.| +00000010 03 d8 8f 72 20 93 ea b3 1d ac 7e ed 3a ba be d5 |...r .....~.:...| +00000020 52 66 e6 df 02 20 73 6e 1e 37 e8 42 d0 65 78 ed |Rf... sn.7.B.ex.| +00000030 57 81 31 66 63 de 0a bb 02 66 b6 4c 67 2f 2a c6 |W.1fc....f.Lg/*.| +00000040 5d 0b 38 71 75 d3 |].8qu.|" +"2019-09-24 00:25:07.835 UTC [cauthdsl] func2 -> DEBU c87 0xc0031cbd90 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.835 UTC [cauthdsl] func1 -> DEBU c88 0xc0031cbd90 gate 1569284707834881000 evaluation succeeds" +"2019-09-24 00:25:07.835 UTC [policies] Evaluate -> DEBU c89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.835 UTC [policies] Evaluate -> DEBU c8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.835 UTC [policies] Evaluate -> DEBU c8b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.835 UTC [policies] Evaluate -> DEBU c8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.835 UTC [gossip.discovery] handleAliveMessage -> DEBU c8d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.835 UTC [gossip.discovery] learnExistingMembers -> DEBU c8e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:07.836 UTC [gossip.discovery] learnExistingMembers -> DEBU c8f updating membership: timestamp: " +"2019-09-24 00:25:07.836 UTC [gossip.discovery] learnExistingMembers -> DEBU c90 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:07.836 UTC [gossip.discovery] learnExistingMembers -> DEBU c91 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:07.836 UTC [gossip.discovery] learnExistingMembers -> DEBU c92 Exiting" +"2019-09-24 00:25:07.836 UTC [gossip.discovery] handleAliveMessage -> DEBU c93 Exiting" +"2019-09-24 00:25:07.842 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c94 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:07.844 UTC [gossip.gossip] handleMessage -> DEBU c95 Exiting" +"2019-09-24 00:25:07.844 UTC [gossip.gossip] handleMessage -> DEBU c96 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 5232390643687232235, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.845 UTC [msp] DeserializeIdentity -> DEBU c97 Obtaining identity" +"2019-09-24 00:25:07.845 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c98 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c99 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c9a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.845 UTC [policies] Evaluate -> DEBU c9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.845 UTC [policies] Evaluate -> DEBU c9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.845 UTC [policies] Evaluate -> DEBU c9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.845 UTC [cauthdsl] func1 -> DEBU c9e 0xc0028fa1b0 gate 1569284707845926200 evaluation starts" +"2019-09-24 00:25:07.845 UTC [cauthdsl] func2 -> DEBU c9f 0xc0028fa1b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU ca0 0xc0028fa1b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU ca1 0xc0028fa1b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU ca2 0xc0028fa1b0 principal evaluation fails" +"2019-09-24 00:25:07.846 UTC [cauthdsl] func1 -> DEBU ca3 0xc0028fa1b0 gate 1569284707845926200 evaluation fails" +"2019-09-24 00:25:07.846 UTC [policies] Evaluate -> DEBU ca4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.846 UTC [policies] Evaluate -> DEBU ca5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.846 UTC [policies] Evaluate -> DEBU ca6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.846 UTC [cauthdsl] func1 -> DEBU ca7 0xc0028fa9f0 gate 1569284707846556300 evaluation starts" +"2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU ca8 0xc0028fa9f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU ca9 0xc0028fa9f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.846 UTC [cauthdsl] func2 -> DEBU caa 0xc0028fa9f0 principal matched by identity 0" +"2019-09-24 00:25:07.846 UTC [msp.identity] Verify -> DEBU cab Verify: digest = 00000000 cf d5 60 b7 3f 76 d5 4e 0c da 16 b9 5b 63 6d e3 |..`.?v.N....[cm.| +00000010 1d 36 2e 9c 6d 29 92 8d b9 99 fd dc c7 2d ae 8f |.6..m).......-..|" +"2019-09-24 00:25:07.846 UTC [msp.identity] Verify -> DEBU cac Verify: sig = 00000000 30 45 02 21 00 fb 83 e6 4d f4 66 f1 2e 66 f7 97 |0E.!....M.f..f..| +00000010 dc c8 0e 02 84 77 99 95 dd 30 fe 40 b1 6c cb 63 |.....w...0.@.l.c| +00000020 b8 f2 00 c5 9d 02 20 4b 49 c8 01 0d a2 35 28 ef |...... KI....5(.| +00000030 f9 e9 6a 4a 1e 3a df 48 12 4d 36 a3 a8 59 b5 1e |..jJ.:.H.M6..Y..| +00000040 c6 fb 9a f7 3c 9b 8f |....<..|" +"2019-09-24 00:25:07.847 UTC [cauthdsl] func2 -> DEBU cad 0xc0028fa9f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.847 UTC [cauthdsl] func1 -> DEBU cae 0xc0028fa9f0 gate 1569284707846556300 evaluation succeeds" +"2019-09-24 00:25:07.847 UTC [policies] Evaluate -> DEBU caf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.847 UTC [policies] Evaluate -> DEBU cb0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.847 UTC [policies] Evaluate -> DEBU cb1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.847 UTC [policies] Evaluate -> DEBU cb2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.847 UTC [gossip.discovery] handleAliveMessage -> DEBU cb3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:07.847 UTC [gossip.discovery] handleAliveMessage -> DEBU cb4 endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1569284680017232100, 22 but got ts: inc_num:1569284680017232100 seq_num:17 " +"2019-09-24 00:25:07.847 UTC [gossip.discovery] handleAliveMessage -> DEBU cb5 Exiting" +"2019-09-24 00:25:07.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU cb6 Exiting" +"2019-09-24 00:25:07.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU cb7 Got message: GossipMessage: Channel: , nonce: 5232390643687232235, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-09-24 00:25:07.848 UTC [gossip.gossip] ValidateAliveMsg -> DEBU cb8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:07.848 UTC [msp.identity] Verify -> DEBU cb9 Verify: digest = 00000000 65 fb cb 94 ad 0b 30 16 0c 1e a4 3f d4 fe ee bf |e.....0....?....| +00000010 e9 34 8c 7f ea 03 47 47 45 95 eb e7 73 0e 26 70 |.4....GGE...s.&p|" +"2019-09-24 00:25:07.848 UTC [msp.identity] Verify -> DEBU cba Verify: sig = 00000000 30 44 02 20 76 0b d9 d7 52 80 00 b7 09 6e ab fa |0D. v...R....n..| +00000010 90 c4 3b 59 5b b2 72 92 5b 69 7c 07 42 7e 10 eb |..;Y[.r.[i|.B~..| +00000020 00 85 85 d0 02 20 52 aa 53 0a dc 5f 4e e2 b5 90 |..... R.S.._N...| +00000030 35 45 cc c8 6f 08 16 d5 ab 20 f2 b3 18 b7 da 7c |5E..o.... .....|| +00000040 60 89 a6 77 08 8c |`..w..|" +"2019-09-24 00:25:07.848 UTC [gossip.discovery] handleAliveMessage -> DEBU cbb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.848 UTC [gossip.discovery] isSentByMe -> DEBU cbc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.848 UTC [gossip.discovery] handleAliveMessage -> DEBU cbd Exiting" +"2019-09-24 00:25:07.849 UTC [gossip.gossip] ValidateAliveMsg -> DEBU cbe Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:07.849 UTC [msp] DeserializeIdentity -> DEBU cbf Obtaining identity" +"2019-09-24 00:25:07.849 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cc0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cc1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cc2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.849 UTC [policies] Evaluate -> DEBU cc3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.850 UTC [policies] Evaluate -> DEBU cc4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.850 UTC [policies] Evaluate -> DEBU cc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.850 UTC [cauthdsl] func1 -> DEBU cc6 0xc00296f2f0 gate 1569284707850104300 evaluation starts" +"2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cc7 0xc00296f2f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cc8 0xc00296f2f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cc9 0xc00296f2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cca 0xc00296f2f0 principal evaluation fails" +"2019-09-24 00:25:07.850 UTC [cauthdsl] func1 -> DEBU ccb 0xc00296f2f0 gate 1569284707850104300 evaluation fails" +"2019-09-24 00:25:07.850 UTC [policies] Evaluate -> DEBU ccc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.850 UTC [policies] Evaluate -> DEBU ccd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.850 UTC [policies] Evaluate -> DEBU cce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.850 UTC [cauthdsl] func1 -> DEBU ccf 0xc00296fb40 gate 1569284707850709200 evaluation starts" +"2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cd0 0xc00296fb40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cd1 0xc00296fb40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.850 UTC [cauthdsl] func2 -> DEBU cd2 0xc00296fb40 principal matched by identity 0" +"2019-09-24 00:25:07.850 UTC [msp.identity] Verify -> DEBU cd3 Verify: digest = 00000000 fb cf 2d b5 f0 5f 32 79 86 85 7f 19 da 71 f3 7e |..-.._2y.....q.~| +00000010 17 4e 9f 80 1c a9 51 6b 04 ee f0 bb 24 18 bb 4d |.N....Qk....$..M|" +"2019-09-24 00:25:07.851 UTC [msp.identity] Verify -> DEBU cd4 Verify: sig = 00000000 30 44 02 20 63 1c 61 02 af 88 41 44 e5 7e 46 0a |0D. c.a...AD.~F.| +00000010 03 d8 8f 72 20 93 ea b3 1d ac 7e ed 3a ba be d5 |...r .....~.:...| +00000020 52 66 e6 df 02 20 73 6e 1e 37 e8 42 d0 65 78 ed |Rf... sn.7.B.ex.| +00000030 57 81 31 66 63 de 0a bb 02 66 b6 4c 67 2f 2a c6 |W.1fc....f.Lg/*.| +00000040 5d 0b 38 71 75 d3 |].8qu.|" +"2019-09-24 00:25:07.851 UTC [cauthdsl] func2 -> DEBU cd5 0xc00296fb40 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.851 UTC [cauthdsl] func1 -> DEBU cd6 0xc00296fb40 gate 1569284707850709200 evaluation succeeds" +"2019-09-24 00:25:07.851 UTC [policies] Evaluate -> DEBU cd7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.851 UTC [policies] Evaluate -> DEBU cd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.851 UTC [policies] Evaluate -> DEBU cd9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.851 UTC [policies] Evaluate -> DEBU cda == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.851 UTC [gossip.discovery] handleAliveMessage -> DEBU cdb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:07.851 UTC [gossip.discovery] handleAliveMessage -> DEBU cdc Exiting" +"2019-09-24 00:25:07.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU cdd Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:07.853 UTC [msp] DeserializeIdentity -> DEBU cde Obtaining identity" +"2019-09-24 00:25:07.853 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cdf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:07.853 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ce0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.853 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ce1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:07.853 UTC [policies] Evaluate -> DEBU ce2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:07.853 UTC [policies] Evaluate -> DEBU ce3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:07.853 UTC [policies] Evaluate -> DEBU ce4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:07.853 UTC [cauthdsl] func1 -> DEBU ce5 0xc002a27540 gate 1569284707853853700 evaluation starts" +"2019-09-24 00:25:07.853 UTC [cauthdsl] func2 -> DEBU ce6 0xc002a27540 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.853 UTC [cauthdsl] func2 -> DEBU ce7 0xc002a27540 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.853 UTC [cauthdsl] func2 -> DEBU ce8 0xc002a27540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:07.854 UTC [cauthdsl] func2 -> DEBU ce9 0xc002a27540 principal evaluation fails" +"2019-09-24 00:25:07.854 UTC [cauthdsl] func1 -> DEBU cea 0xc002a27540 gate 1569284707853853700 evaluation fails" +"2019-09-24 00:25:07.854 UTC [policies] Evaluate -> DEBU ceb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.854 UTC [policies] Evaluate -> DEBU cec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:07.854 UTC [policies] Evaluate -> DEBU ced == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:07.854 UTC [cauthdsl] func1 -> DEBU cee 0xc002a27de0 gate 1569284707854311600 evaluation starts" +"2019-09-24 00:25:07.854 UTC [cauthdsl] func2 -> DEBU cef 0xc002a27de0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:07.854 UTC [cauthdsl] func2 -> DEBU cf0 0xc002a27de0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:07.854 UTC [cauthdsl] func2 -> DEBU cf1 0xc002a27de0 principal matched by identity 0" +"2019-09-24 00:25:07.854 UTC [msp.identity] Verify -> DEBU cf2 Verify: digest = 00000000 cf d5 60 b7 3f 76 d5 4e 0c da 16 b9 5b 63 6d e3 |..`.?v.N....[cm.| +00000010 1d 36 2e 9c 6d 29 92 8d b9 99 fd dc c7 2d ae 8f |.6..m).......-..|" +"2019-09-24 00:25:07.854 UTC [msp.identity] Verify -> DEBU cf3 Verify: sig = 00000000 30 45 02 21 00 fb 83 e6 4d f4 66 f1 2e 66 f7 97 |0E.!....M.f..f..| +00000010 dc c8 0e 02 84 77 99 95 dd 30 fe 40 b1 6c cb 63 |.....w...0.@.l.c| +00000020 b8 f2 00 c5 9d 02 20 4b 49 c8 01 0d a2 35 28 ef |...... KI....5(.| +00000030 f9 e9 6a 4a 1e 3a df 48 12 4d 36 a3 a8 59 b5 1e |..jJ.:.H.M6..Y..| +00000040 c6 fb 9a f7 3c 9b 8f |....<..|" +"2019-09-24 00:25:07.855 UTC [cauthdsl] func2 -> DEBU cf4 0xc002a27de0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:07.855 UTC [cauthdsl] func1 -> DEBU cf5 0xc002a27de0 gate 1569284707854311600 evaluation succeeds" +"2019-09-24 00:25:07.855 UTC [policies] Evaluate -> DEBU cf6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.855 UTC [policies] Evaluate -> DEBU cf7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:07.855 UTC [policies] Evaluate -> DEBU cf8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:07.855 UTC [policies] Evaluate -> DEBU cf9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:07.855 UTC [gossip.discovery] handleAliveMessage -> DEBU cfa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:07.855 UTC [gossip.discovery] handleAliveMessage -> DEBU cfb endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1569284680017232100, 22 but got ts: inc_num:1569284680017232100 seq_num:17 " +"2019-09-24 00:25:07.857 UTC [gossip.gossip] handleMessage -> DEBU cfc Exiting" +"2019-09-24 00:25:07.855 UTC [gossip.discovery] handleAliveMessage -> DEBU cfd Exiting" +"2019-09-24 00:25:07.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU cfe Exiting" +"2019-09-24 00:25:07.995 UTC [gossip.gossip] handleMessage -> DEBU cff Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.000 UTC [gossip.pull] HandleMessage -> DEBU d00 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.000 UTC [msp] DeserializeIdentity -> DEBU d01 Obtaining identity" +"2019-09-24 00:25:08.000 UTC [msp] DeserializeIdentity -> DEBU d02 Obtaining identity" +"2019-09-24 00:25:08.001 UTC [gossip.pull] SendDigest -> DEBU d03 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:08.002 UTC [gossip.gossip] handleMessage -> DEBU d04 Exiting" +"2019-09-24 00:25:08.002 UTC [gossip.gossip] handleMessage -> DEBU d05 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.002 UTC [gossip.gossip] handleMessage -> DEBU d06 Exiting" +"2019-09-24 00:25:08.002 UTC [gossip.discovery] handleMsgFromComm -> DEBU d07 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.002 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d08 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:08.002 UTC [msp] DeserializeIdentity -> DEBU d09 Obtaining identity" +"2019-09-24 00:25:08.002 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:08.002 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d0b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.002 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d0c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.003 UTC [policies] Evaluate -> DEBU d0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:08.003 UTC [policies] Evaluate -> DEBU d0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:08.003 UTC [policies] Evaluate -> DEBU d0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:08.003 UTC [cauthdsl] func1 -> DEBU d10 0xc00031e310 gate 1569284708003268900 evaluation starts" +"2019-09-24 00:25:08.003 UTC [cauthdsl] func2 -> DEBU d11 0xc00031e310 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.003 UTC [cauthdsl] func2 -> DEBU d12 0xc00031e310 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.003 UTC [cauthdsl] func2 -> DEBU d13 0xc00031e310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:08.003 UTC [cauthdsl] func2 -> DEBU d14 0xc00031e310 principal evaluation fails" +"2019-09-24 00:25:08.003 UTC [cauthdsl] func1 -> DEBU d15 0xc00031e310 gate 1569284708003268900 evaluation fails" +"2019-09-24 00:25:08.003 UTC [policies] Evaluate -> DEBU d16 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.003 UTC [policies] Evaluate -> DEBU d17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.004 UTC [policies] Evaluate -> DEBU d18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:08.004 UTC [cauthdsl] func1 -> DEBU d19 0xc00031eba0 gate 1569284708004521100 evaluation starts" +"2019-09-24 00:25:08.004 UTC [cauthdsl] func2 -> DEBU d1a 0xc00031eba0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.004 UTC [cauthdsl] func2 -> DEBU d1b 0xc00031eba0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.004 UTC [cauthdsl] func2 -> DEBU d1c 0xc00031eba0 principal matched by identity 0" +"2019-09-24 00:25:08.004 UTC [msp.identity] Verify -> DEBU d1d Verify: digest = 00000000 02 c9 be 65 c4 e7 58 61 47 2c 55 8d 3c c1 4a b7 |...e..XaG,U.<.J.| +00000010 f3 40 78 78 81 88 a4 a4 cb ea 3c 86 24 b4 8f 22 |.@xx......<.$.."|" +"2019-09-24 00:25:08.004 UTC [msp.identity] Verify -> DEBU d1e Verify: sig = 00000000 30 45 02 21 00 a5 1e 1f e0 ed 9c b2 4b 31 a9 4d |0E.!........K1.M| +00000010 bd b6 ac 6b 19 e3 ae 32 ba 26 19 c3 be ed ad ce |...k...2.&......| +00000020 bc 29 f0 53 54 02 20 20 ff 60 1b 7a 7d 85 f9 ef |.).ST. .`.z}...| +00000030 7f 06 d6 96 e1 cd 6b ca 99 9e da 2d a1 03 99 d2 |......k....-....| +00000040 80 bf 5f 83 f6 04 d1 |.._....|" +"2019-09-24 00:25:08.005 UTC [cauthdsl] func2 -> DEBU d1f 0xc00031eba0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:08.005 UTC [cauthdsl] func1 -> DEBU d20 0xc00031eba0 gate 1569284708004521100 evaluation succeeds" +"2019-09-24 00:25:08.005 UTC [policies] Evaluate -> DEBU d21 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.005 UTC [policies] Evaluate -> DEBU d22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.006 UTC [policies] Evaluate -> DEBU d23 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:08.006 UTC [policies] Evaluate -> DEBU d24 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:08.006 UTC [gossip.discovery] handleAliveMessage -> DEBU d25 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:08.006 UTC [gossip.discovery] learnExistingMembers -> DEBU d26 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:08.006 UTC [gossip.discovery] learnExistingMembers -> DEBU d27 updating membership: timestamp: " +"2019-09-24 00:25:08.006 UTC [gossip.discovery] learnExistingMembers -> DEBU d28 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:08.006 UTC [gossip.discovery] learnExistingMembers -> DEBU d29 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:08.006 UTC [gossip.discovery] learnExistingMembers -> DEBU d2a Exiting" +"2019-09-24 00:25:08.006 UTC [gossip.discovery] handleAliveMessage -> DEBU d2b Exiting" +"2019-09-24 00:25:08.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU d2c Exiting" +"2019-09-24 00:25:08.006 UTC [gossip.discovery] sendMemResponse -> DEBU d2d Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:08.006 UTC [msp] DeserializeIdentity -> DEBU d2e Obtaining identity" +"2019-09-24 00:25:08.007 UTC [msp] DeserializeIdentity -> DEBU d2f Obtaining identity" +"2019-09-24 00:25:08.007 UTC [msp] DeserializeIdentity -> DEBU d30 Obtaining identity" +"2019-09-24 00:25:08.007 UTC [gossip.comm] Send -> DEBU d31 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:08.007 UTC [gossip.discovery] sendMemResponse -> DEBU d32 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\032" signature:"0D\002 \013\376rD3\301\030`X\353^\331\314<\206'\227z\000\267*r>\035A~O]ER\021\201\002 <\000M\037\021b#\213>\376\316fd&\277-\025\nU\003\257\311\357\332'\214629\316H\020" > alive: alive: alive: " +"2019-09-24 00:25:08.007 UTC [gossip.comm] sendToEndpoint -> DEBU d33 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.007 UTC [gossip.comm] sendToEndpoint -> DEBU d34 Exiting" +"2019-09-24 00:25:08.219 UTC [msp] DeserializeIdentity -> DEBU d35 Obtaining identity" +"2019-09-24 00:25:08.219 UTC [msp] DeserializeIdentity -> DEBU d36 Obtaining identity" +"2019-09-24 00:25:08.220 UTC [gossip.comm] Send -> DEBU d37 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d38 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d39 Exiting" +"2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d3a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d3b Exiting" +"2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d3c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.220 UTC [gossip.comm] sendToEndpoint -> DEBU d3d Exiting" +"2019-09-24 00:25:08.222 UTC [gossip.comm] func1 -> DEBU d3e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.223 UTC [gossip.gossip] handleMessage -> DEBU d3f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.223 UTC [msp.identity] Verify -> DEBU d40 Verify: digest = 00000000 01 c3 83 f1 15 d3 f7 90 10 55 d7 17 42 99 85 b9 |.........U..B...| +00000010 71 66 f1 68 5a e0 21 62 05 12 57 37 dd 26 b1 ab |qf.hZ.!b..W7.&..|" +"2019-09-24 00:25:08.223 UTC [msp.identity] Verify -> DEBU d41 Verify: sig = 00000000 30 44 02 20 66 11 5f 81 fb 7e 19 3a 27 09 3f 44 |0D. f._..~.:'.?D| +00000010 c8 f2 51 d0 96 f5 20 e3 a9 1a b8 da 4a 77 ca cb |..Q... .....Jw..| +00000020 f8 90 a1 58 02 20 41 53 30 55 18 a3 7d e6 ac 47 |...X. AS0U..}..G| +00000030 b3 17 48 1d 9d 73 6d 51 e1 46 9e 81 bb dd 43 e3 |..H..smQ.F....C.| +00000040 ca 46 2d 3f 0c cf |.F-?..|" +"2019-09-24 00:25:08.224 UTC [msp.identity] Verify -> DEBU d42 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:08.224 UTC [msp.identity] Verify -> DEBU d43 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:08.224 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d44 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.224 UTC [gossip.comm] func1 -> DEBU d45 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.224 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d46 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.224 UTC [policies] Evaluate -> DEBU d47 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:08.224 UTC [policies] Evaluate -> DEBU d48 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:08.224 UTC [policies] Evaluate -> DEBU d49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:08.224 UTC [msp] DeserializeIdentity -> DEBU d4a Obtaining identity" +"2019-09-24 00:25:08.224 UTC [msp.identity] newIdentity -> DEBU d4b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-09-24 00:25:08.225 UTC [cauthdsl] func1 -> DEBU d4c 0xc0001e6920 gate 1569284708225277400 evaluation starts" +"2019-09-24 00:25:08.225 UTC [cauthdsl] func2 -> DEBU d4d 0xc0001e6920 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.225 UTC [cauthdsl] func2 -> DEBU d4e 0xc0001e6920 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.225 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d4f Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 00:25:08.226 UTC [msp] Validate -> DEBU d50 MSP Org1MSP validating identity" +"2019-09-24 00:25:08.226 UTC [msp] getCertificationChain -> DEBU d51 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:08.226 UTC [cauthdsl] func2 -> DEBU d52 0xc0001e6920 principal matched by identity 0" +"2019-09-24 00:25:08.226 UTC [msp.identity] Verify -> DEBU d53 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:08.226 UTC [msp.identity] Verify -> DEBU d54 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:08.226 UTC [cauthdsl] func2 -> DEBU d55 0xc0001e6920 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:08.226 UTC [cauthdsl] func1 -> DEBU d56 0xc0001e6920 gate 1569284708225277400 evaluation succeeds" +"2019-09-24 00:25:08.226 UTC [policies] Evaluate -> DEBU d57 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.226 UTC [policies] Evaluate -> DEBU d58 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.226 UTC [policies] Evaluate -> DEBU d59 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:08.226 UTC [policies] Evaluate -> DEBU d5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:08.227 UTC [gossip.gossip] handleMessage -> DEBU d5b Exiting" +"2019-09-24 00:25:08.227 UTC [gossip.gossip] handleMessage -> DEBU d5c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.227 UTC [msp] DeserializeIdentity -> DEBU d5d Obtaining identity" +"2019-09-24 00:25:08.227 UTC [msp] DeserializeIdentity -> DEBU d5e Obtaining identity" +"2019-09-24 00:25:08.227 UTC [msp] DeserializeIdentity -> DEBU d5f Obtaining identity" +"2019-09-24 00:25:08.227 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d60 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:08.227 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d61 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.227 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d62 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.227 UTC [policies] Evaluate -> DEBU d63 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:08.227 UTC [policies] Evaluate -> DEBU d64 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:08.227 UTC [policies] Evaluate -> DEBU d65 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:08.227 UTC [cauthdsl] func1 -> DEBU d66 0xc0001f30f0 gate 1569284708227842100 evaluation starts" +"2019-09-24 00:25:08.227 UTC [cauthdsl] func2 -> DEBU d67 0xc0001f30f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.227 UTC [cauthdsl] func2 -> DEBU d68 0xc0001f30f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d69 0xc0001f30f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d6a 0xc0001f30f0 principal evaluation fails" +"2019-09-24 00:25:08.228 UTC [cauthdsl] func1 -> DEBU d6b 0xc0001f30f0 gate 1569284708227842100 evaluation fails" +"2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d6c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d6d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d6e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:08.228 UTC [cauthdsl] func1 -> DEBU d6f 0xc0001f3950 gate 1569284708228206500 evaluation starts" +"2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d70 0xc0001f3950 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d71 0xc0001f3950 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d72 0xc0001f3950 principal matched by identity 0" +"2019-09-24 00:25:08.228 UTC [msp.identity] Verify -> DEBU d73 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:08.228 UTC [msp.identity] Verify -> DEBU d74 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:08.228 UTC [cauthdsl] func2 -> DEBU d75 0xc0001f3950 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:08.228 UTC [cauthdsl] func1 -> DEBU d76 0xc0001f3950 gate 1569284708228206500 evaluation succeeds" +"2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d77 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d79 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d7a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:08.228 UTC [msp] DeserializeIdentity -> DEBU d7b Obtaining identity" +"2019-09-24 00:25:08.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d7c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d7d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.228 UTC [policies] Evaluate -> DEBU d7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func1 -> DEBU d81 0xc0001c4a30 gate 1569284708229062300 evaluation starts" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d82 0xc0001c4a30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d83 0xc0001c4a30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d84 0xc0001c4a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d85 0xc0001c4a30 principal evaluation fails" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func1 -> DEBU d86 0xc0001c4a30 gate 1569284708229062300 evaluation fails" +"2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d87 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func1 -> DEBU d8a 0xc0001c5290 gate 1569284708229349900 evaluation starts" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d8b 0xc0001c5290 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d8c 0xc0001c5290 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d8d 0xc0001c5290 principal matched by identity 0" +"2019-09-24 00:25:08.229 UTC [msp.identity] Verify -> DEBU d8e Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:08.229 UTC [msp.identity] Verify -> DEBU d8f Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func2 -> DEBU d90 0xc0001c5290 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:08.229 UTC [cauthdsl] func1 -> DEBU d91 0xc0001c5290 gate 1569284708229349900 evaluation succeeds" +"2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.229 UTC [policies] Evaluate -> DEBU d93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.230 UTC [policies] Evaluate -> DEBU d94 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:08.230 UTC [policies] Evaluate -> DEBU d95 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:08.230 UTC [gossip.gossip] handleMessage -> DEBU d96 Exiting" +"2019-09-24 00:25:08.230 UTC [gossip.gossip] handleMessage -> DEBU d97 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.230 UTC [msp] DeserializeIdentity -> DEBU d98 Obtaining identity" +"2019-09-24 00:25:08.230 UTC [msp] DeserializeIdentity -> DEBU d99 Obtaining identity" +"2019-09-24 00:25:08.230 UTC [msp] DeserializeIdentity -> DEBU d9a Obtaining identity" +"2019-09-24 00:25:08.230 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d9b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:08.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d9c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d9d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU d9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU d9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU da0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:08.231 UTC [cauthdsl] func1 -> DEBU da1 0xc0001b1370 gate 1569284708231198600 evaluation starts" +"2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU da2 0xc0001b1370 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU da3 0xc0001b1370 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU da4 0xc0001b1370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU da5 0xc0001b1370 principal evaluation fails" +"2019-09-24 00:25:08.231 UTC [cauthdsl] func1 -> DEBU da6 0xc0001b1370 gate 1569284708231198600 evaluation fails" +"2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU da7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU da8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.231 UTC [policies] Evaluate -> DEBU da9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:08.231 UTC [cauthdsl] func1 -> DEBU daa 0xc0001b1c10 gate 1569284708231648100 evaluation starts" +"2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU dab 0xc0001b1c10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.231 UTC [cauthdsl] func2 -> DEBU dac 0xc0001b1c10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.232 UTC [cauthdsl] func2 -> DEBU dad 0xc0001b1c10 principal matched by identity 0" +"2019-09-24 00:25:08.232 UTC [msp.identity] Verify -> DEBU dae Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:08.232 UTC [msp.identity] Verify -> DEBU daf Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:08.232 UTC [cauthdsl] func2 -> DEBU db0 0xc0001b1c10 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:08.232 UTC [cauthdsl] func1 -> DEBU db1 0xc0001b1c10 gate 1569284708231648100 evaluation succeeds" +"2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU db2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU db3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU db4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU db5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:08.232 UTC [msp] DeserializeIdentity -> DEBU db6 Obtaining identity" +"2019-09-24 00:25:08.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU db9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU dba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:08.232 UTC [policies] Evaluate -> DEBU dbb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:08.233 UTC [cauthdsl] func1 -> DEBU dbc 0xc00019acf0 gate 1569284708233025200 evaluation starts" +"2019-09-24 00:25:08.233 UTC [cauthdsl] func2 -> DEBU dbd 0xc00019acf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.233 UTC [cauthdsl] func2 -> DEBU dbe 0xc00019acf0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.233 UTC [cauthdsl] func2 -> DEBU dbf 0xc00019acf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:08.233 UTC [cauthdsl] func2 -> DEBU dc0 0xc00019acf0 principal evaluation fails" +"2019-09-24 00:25:08.233 UTC [cauthdsl] func1 -> DEBU dc1 0xc00019acf0 gate 1569284708233025200 evaluation fails" +"2019-09-24 00:25:08.233 UTC [policies] Evaluate -> DEBU dc2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.233 UTC [policies] Evaluate -> DEBU dc3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.233 UTC [policies] Evaluate -> DEBU dc4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:08.233 UTC [msp] DeserializeIdentity -> DEBU dc5 Obtaining identity" +"2019-09-24 00:25:08.233 UTC [msp] DeserializeIdentity -> DEBU dc6 Obtaining identity" +"2019-09-24 00:25:08.233 UTC [gossip.comm] Send -> DEBU dc7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +"2019-09-24 00:25:08.234 UTC [msp] DeserializeIdentity -> DEBU dc8 Obtaining identity" +"2019-09-24 00:25:08.234 UTC [msp] DeserializeIdentity -> DEBU dc9 Obtaining identity" +"2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dca Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dcb Exiting" +"2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dcc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dcd Exiting" +"2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 00:25:08.234 UTC [gossip.comm] sendToEndpoint -> DEBU dcf Exiting" +"2019-09-24 00:25:08.233 UTC [cauthdsl] func1 -> DEBU dd0 0xc00019b560 gate 1569284708233415200 evaluation starts" +"2019-09-24 00:25:08.263 UTC [msp] DeserializeIdentity -> DEBU dd1 Obtaining identity" +"2019-09-24 00:25:08.272 UTC [msp] DeserializeIdentity -> DEBU dd2 Obtaining identity" +"2019-09-24 00:25:08.272 UTC [gossip.pull] Hello -> DEBU dd3 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:08.273 UTC [msp] DeserializeIdentity -> DEBU dd4 Obtaining identity" +"2019-09-24 00:25:08.273 UTC [msp] DeserializeIdentity -> DEBU dd5 Obtaining identity" +"2019-09-24 00:25:08.273 UTC [gossip.comm] Send -> DEBU dd6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:08.273 UTC [gossip.comm] sendToEndpoint -> DEBU dd7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.273 UTC [gossip.comm] sendToEndpoint -> DEBU dd8 Exiting" +"2019-09-24 00:25:08.275 UTC [gossip.comm] func1 -> DEBU dd9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.242 UTC [cauthdsl] func2 -> DEBU dda 0xc00019b560 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.276 UTC [cauthdsl] func2 -> DEBU ddb 0xc00019b560 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.277 UTC [cauthdsl] func2 -> DEBU ddc 0xc00019b560 principal matched by identity 0" +"2019-09-24 00:25:08.277 UTC [msp.identity] Verify -> DEBU ddd Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:08.277 UTC [msp.identity] Verify -> DEBU dde Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:08.277 UTC [cauthdsl] func2 -> DEBU ddf 0xc00019b560 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:08.277 UTC [cauthdsl] func1 -> DEBU de0 0xc00019b560 gate 1569284708233415200 evaluation succeeds" +"2019-09-24 00:25:08.277 UTC [policies] Evaluate -> DEBU de1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.277 UTC [policies] Evaluate -> DEBU de2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.277 UTC [policies] Evaluate -> DEBU de3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:08.277 UTC [policies] Evaluate -> DEBU de4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:08.277 UTC [gossip.gossip] handleMessage -> DEBU de5 Exiting" +"2019-09-24 00:25:08.277 UTC [gossip.gossip] handleMessage -> DEBU de6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.277 UTC [gossip.pull] HandleMessage -> DEBU de7 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.277 UTC [gossip.gossip] handleMessage -> DEBU de8 Exiting" +"2019-09-24 00:25:08.623 UTC [gossip.pull] SendReq -> DEBU de9 Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051" +"2019-09-24 00:25:08.624 UTC [gossip.comm] Send -> DEBU dea Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:08.624 UTC [gossip.comm] sendToEndpoint -> DEBU deb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.624 UTC [gossip.comm] sendToEndpoint -> DEBU dec Exiting" +"2019-09-24 00:25:08.626 UTC [gossip.comm] func1 -> DEBU ded Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 5972158026555384508, Envelope: 957 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.626 UTC [gossip.gossip] handleMessage -> DEBU dee Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 5972158026555384508, Envelope: 957 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.626 UTC [msp] DeserializeIdentity -> DEBU def Obtaining identity" +"2019-09-24 00:25:08.626 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU df0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:08.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU df1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU df2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.627 UTC [policies] Evaluate -> DEBU df3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:08.627 UTC [policies] Evaluate -> DEBU df4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:08.628 UTC [policies] Evaluate -> DEBU df5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:08.628 UTC [cauthdsl] func1 -> DEBU df6 0xc000050df0 gate 1569284708628443000 evaluation starts" +"2019-09-24 00:25:08.628 UTC [cauthdsl] func2 -> DEBU df7 0xc000050df0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.628 UTC [cauthdsl] func2 -> DEBU df8 0xc000050df0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.628 UTC [cauthdsl] func2 -> DEBU df9 0xc000050df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:08.628 UTC [cauthdsl] func2 -> DEBU dfa 0xc000050df0 principal evaluation fails" +"2019-09-24 00:25:08.629 UTC [cauthdsl] func1 -> DEBU dfb 0xc000050df0 gate 1569284708628443000 evaluation fails" +"2019-09-24 00:25:08.629 UTC [policies] Evaluate -> DEBU dfc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.629 UTC [policies] Evaluate -> DEBU dfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.629 UTC [policies] Evaluate -> DEBU dfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:08.629 UTC [cauthdsl] func1 -> DEBU dff 0xc0002cc780 gate 1569284708629653300 evaluation starts" +"2019-09-24 00:25:08.629 UTC [cauthdsl] func2 -> DEBU e00 0xc0002cc780 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.629 UTC [cauthdsl] func2 -> DEBU e01 0xc0002cc780 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.629 UTC [cauthdsl] func2 -> DEBU e02 0xc0002cc780 principal matched by identity 0" +"2019-09-24 00:25:08.630 UTC [msp.identity] Verify -> DEBU e03 Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| +00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|" +"2019-09-24 00:25:08.630 UTC [msp.identity] Verify -> DEBU e04 Verify: sig = 00000000 30 45 02 21 00 fd dc ff cf c7 b6 3d 6b 38 fd 37 |0E.!.......=k8.7| +00000010 d1 a2 e1 76 15 71 2f 1b 1b a3 4e 1c b3 ee 2a b4 |...v.q/...N...*.| +00000020 63 28 20 3e c8 02 20 03 96 c3 91 fe a5 5e 17 eb |c( >.. ......^..| +00000030 54 6a 8d f2 6c 1a e6 45 a3 28 c3 8c 2b 9f 40 81 |Tj..l..E.(..+.@.| +00000040 f4 5f d3 ea 6a dc 3e |._..j.>|" +"2019-09-24 00:25:08.630 UTC [cauthdsl] func2 -> DEBU e05 0xc0002cc780 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:08.630 UTC [cauthdsl] func1 -> DEBU e06 0xc0002cc780 gate 1569284708629653300 evaluation succeeds" +"2019-09-24 00:25:08.630 UTC [policies] Evaluate -> DEBU e07 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.631 UTC [policies] Evaluate -> DEBU e08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.631 UTC [policies] Evaluate -> DEBU e09 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:08.631 UTC [policies] Evaluate -> DEBU e0a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:08.639 UTC [msp] DeserializeIdentity -> DEBU e0b Obtaining identity" +"2019-09-24 00:25:08.640 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:08.640 UTC [gossip.pull] HandleMessage -> DEBU e0d GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 5972158026555384508, Envelope: 957 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.640 UTC [msp] DeserializeIdentity -> DEBU e0e Obtaining identity" +"2019-09-24 00:25:08.641 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e0f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:08.641 UTC [msp] DeserializeIdentity -> DEBU e10 Obtaining identity" +"2019-09-24 00:25:08.641 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e11 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:08.642 UTC [gossip.gossip] func2 -> DEBU e12 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-09-24 00:25:08.642 UTC [gossip.pull] HandleMessage -> DEBU e13 Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 3" +"2019-09-24 00:25:08.642 UTC [gossip.gossip] handleMessage -> DEBU e14 Exiting" +"2019-09-24 00:25:08.692 UTC [gossip.comm] func1 -> DEBU e15 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.692 UTC [gossip.comm] func1 -> DEBU e16 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.693 UTC [gossip.gossip] handleMessage -> DEBU e17 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.693 UTC [gossip.gossip] handleMessage -> DEBU e18 Exiting" +"2019-09-24 00:25:08.693 UTC [gossip.gossip] handleMessage -> DEBU e19 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.693 UTC [gossip.pull] HandleMessage -> DEBU e1a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.693 UTC [msp] DeserializeIdentity -> DEBU e1b Obtaining identity" +"2019-09-24 00:25:08.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU e1c Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.694 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e1d Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:08.694 UTC [msp] DeserializeIdentity -> DEBU e1f Obtaining identity" +"2019-09-24 00:25:08.694 UTC [msp] DeserializeIdentity -> DEBU e1e Obtaining identity" +"2019-09-24 00:25:08.695 UTC [msp] DeserializeIdentity -> DEBU e20 Obtaining identity" +"2019-09-24 00:25:08.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e21 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:08.695 UTC [msp] DeserializeIdentity -> DEBU e22 Obtaining identity" +"2019-09-24 00:25:08.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e23 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e24 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:08.695 UTC [gossip.pull] SendDigest -> DEBU e25 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:08.695 UTC [policies] Evaluate -> DEBU e26 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:08.695 UTC [policies] Evaluate -> DEBU e27 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:08.695 UTC [gossip.gossip] handleMessage -> DEBU e28 Exiting" +"2019-09-24 00:25:08.695 UTC [policies] Evaluate -> DEBU e29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:08.695 UTC [cauthdsl] func1 -> DEBU e2a 0xc0004c6ce0 gate 1569284708695612200 evaluation starts" +"2019-09-24 00:25:08.695 UTC [cauthdsl] func2 -> DEBU e2b 0xc0004c6ce0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.695 UTC [cauthdsl] func2 -> DEBU e2c 0xc0004c6ce0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.695 UTC [cauthdsl] func2 -> DEBU e2d 0xc0004c6ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:08.695 UTC [cauthdsl] func2 -> DEBU e2e 0xc0004c6ce0 principal evaluation fails" +"2019-09-24 00:25:08.695 UTC [cauthdsl] func1 -> DEBU e2f 0xc0004c6ce0 gate 1569284708695612200 evaluation fails" +"2019-09-24 00:25:08.695 UTC [policies] Evaluate -> DEBU e30 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.695 UTC [policies] Evaluate -> DEBU e31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:08.696 UTC [policies] Evaluate -> DEBU e32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:08.696 UTC [cauthdsl] func1 -> DEBU e33 0xc0004c7520 gate 1569284708696657600 evaluation starts" +"2019-09-24 00:25:08.696 UTC [cauthdsl] func2 -> DEBU e34 0xc0004c7520 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:08.696 UTC [cauthdsl] func2 -> DEBU e35 0xc0004c7520 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:08.696 UTC [cauthdsl] func2 -> DEBU e36 0xc0004c7520 principal matched by identity 0" +"2019-09-24 00:25:08.697 UTC [msp.identity] Verify -> DEBU e37 Verify: digest = 00000000 ac d4 a6 66 26 ad ca cb 2e b0 31 3c 42 63 8b 5a |...f&.....1 DEBU e38 Verify: sig = 00000000 30 44 02 20 52 bf 8c fd 49 ce 29 dd 00 83 b7 bd |0D. R...I.).....| +00000010 39 21 b9 8f 6a b5 86 fb 6a ec cb ac 25 37 43 d6 |9!..j...j...%7C.| +00000020 11 70 7e a6 02 20 2a b1 c4 56 6f fc 08 59 6a 1d |.p~.. *..Vo..Yj.| +00000030 d0 4d 40 3d 98 6d b1 06 1f 68 84 81 a6 88 0f a6 |.M@=.m...h......| +00000040 9a 67 ac e6 51 a8 |.g..Q.|" +"2019-09-24 00:25:08.701 UTC [cauthdsl] func2 -> DEBU e39 0xc0004c7520 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:08.701 UTC [cauthdsl] func1 -> DEBU e3a 0xc0004c7520 gate 1569284708696657600 evaluation succeeds" +"2019-09-24 00:25:08.702 UTC [policies] Evaluate -> DEBU e3b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.702 UTC [policies] Evaluate -> DEBU e3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:08.702 UTC [policies] Evaluate -> DEBU e3d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:08.702 UTC [policies] Evaluate -> DEBU e3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:08.702 UTC [gossip.discovery] handleAliveMessage -> DEBU e3f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:08.702 UTC [gossip.discovery] learnExistingMembers -> DEBU e40 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:08.702 UTC [gossip.discovery] learnExistingMembers -> DEBU e41 updating membership: timestamp: " +"2019-09-24 00:25:08.703 UTC [gossip.discovery] learnExistingMembers -> DEBU e42 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:08.703 UTC [gossip.discovery] learnExistingMembers -> DEBU e43 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:08.703 UTC [gossip.discovery] learnExistingMembers -> DEBU e44 Exiting" +"2019-09-24 00:25:08.703 UTC [gossip.discovery] handleAliveMessage -> DEBU e45 Exiting" +"2019-09-24 00:25:08.705 UTC [gossip.discovery] sendMemResponse -> DEBU e46 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:08.705 UTC [msp] DeserializeIdentity -> DEBU e47 Obtaining identity" +"2019-09-24 00:25:08.707 UTC [msp] DeserializeIdentity -> DEBU e48 Obtaining identity" +"2019-09-24 00:25:08.707 UTC [msp] DeserializeIdentity -> DEBU e49 Obtaining identity" +"2019-09-24 00:25:08.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU e4a Exiting" +"2019-09-24 00:25:08.708 UTC [gossip.comm] Send -> DEBU e4b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:08.708 UTC [gossip.discovery] sendMemResponse -> DEBU e4c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\032" signature:"0D\002 \013\376rD3\301\030`X\353^\331\314<\206'\227z\000\267*r>\035A~O]ER\021\201\002 <\000M\037\021b#\213>\376\316fd&\277-\025\nU\003\257\311\357\332'\214629\316H\020" > alive: alive: alive: " +"2019-09-24 00:25:08.708 UTC [gossip.comm] sendToEndpoint -> DEBU e4d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.708 UTC [gossip.comm] sendToEndpoint -> DEBU e4e Exiting" +"2019-09-24 00:25:08.736 UTC [gossip.gossip] handleMessage -> DEBU e4f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 00:25:08.736 UTC [msp.identity] Verify -> DEBU e50 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:08.736 UTC [gossip.comm] func1 -> DEBU e51 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.736 UTC [msp.identity] Verify -> DEBU e52 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:08.736 UTC [gossip.comm] func1 -> DEBU e53 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 00:25:08.737 UTC [gossip.comm] func1 -> DEBU e54 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.737 UTC [msp] DeserializeIdentity -> DEBU e55 Obtaining identity" +"2019-09-24 00:25:08.737 UTC [gossip.gossip] handleMessage -> DEBU e56 Exiting" +"2019-09-24 00:25:08.737 UTC [gossip.gossip] handleMessage -> DEBU e57 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.737 UTC [msp] DeserializeIdentity -> DEBU e58 Obtaining identity" +"2019-09-24 00:25:08.737 UTC [msp] DeserializeIdentity -> DEBU e59 Obtaining identity" +"2019-09-24 00:25:08.737 UTC [gossip.gossip] handleMessage -> DEBU e5a Exiting" +"2019-09-24 00:25:08.737 UTC [gossip.gossip] handleMessage -> DEBU e5b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 00:25:08.738 UTC [msp.identity] Verify -> DEBU e5c Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:08.738 UTC [msp.identity] Verify -> DEBU e5d Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:08.738 UTC [gossip.gossip] handleMessage -> DEBU e5e Exiting" +"2019-09-24 00:25:08.738 UTC [gossip.gossip] handleMessage -> DEBU e5f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.738 UTC [gossip.pull] HandleMessage -> DEBU e60 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:08.744 UTC [gossip.pull] SendDigest -> DEBU e61 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:08.744 UTC [gossip.gossip] handleMessage -> DEBU e62 Exiting" +"2019-09-24 00:25:09.220 UTC [gossip.gossip] handleMessage -> DEBU e63 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:09.220 UTC [msp] DeserializeIdentity -> DEBU e64 Obtaining identity" +"2019-09-24 00:25:09.220 UTC [msp] DeserializeIdentity -> DEBU e65 Obtaining identity" +"2019-09-24 00:25:09.220 UTC [msp] DeserializeIdentity -> DEBU e66 Obtaining identity" +"2019-09-24 00:25:09.220 UTC [gossip.gossip] handleMessage -> DEBU e67 Exiting" +"2019-09-24 00:25:09.220 UTC [gossip.gossip] handleMessage -> DEBU e68 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 00:25:09.220 UTC [msp] DeserializeIdentity -> DEBU e69 Obtaining identity" +"2019-09-24 00:25:09.220 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:09.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e6b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:09.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e6c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:09.221 UTC [cauthdsl] func1 -> DEBU e70 0xc000487a60 gate 1569284709221173600 evaluation starts" +"2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e71 0xc000487a60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e72 0xc000487a60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e73 0xc000487a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e74 0xc000487a60 principal evaluation fails" +"2019-09-24 00:25:09.221 UTC [cauthdsl] func1 -> DEBU e75 0xc000487a60 gate 1569284709221173600 evaluation fails" +"2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e76 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:09.221 UTC [policies] Evaluate -> DEBU e78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:09.221 UTC [cauthdsl] func1 -> DEBU e79 0xc0003ba2a0 gate 1569284709221568300 evaluation starts" +"2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e7a 0xc0003ba2a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e7b 0xc0003ba2a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:09.221 UTC [cauthdsl] func2 -> DEBU e7c 0xc0003ba2a0 principal matched by identity 0" +"2019-09-24 00:25:09.235 UTC [gossip.comm] func1 -> DEBU e7d Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 00:25:09.248 UTC [msp.identity] Verify -> DEBU e7e Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:09.248 UTC [msp.identity] Verify -> DEBU e7f Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:09.249 UTC [cauthdsl] func2 -> DEBU e80 0xc0003ba2a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:09.250 UTC [cauthdsl] func1 -> DEBU e81 0xc0003ba2a0 gate 1569284709221568300 evaluation succeeds" +"2019-09-24 00:25:09.250 UTC [policies] Evaluate -> DEBU e82 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:09.250 UTC [policies] Evaluate -> DEBU e83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:09.250 UTC [policies] Evaluate -> DEBU e84 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:09.250 UTC [policies] Evaluate -> DEBU e85 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:09.250 UTC [msp] DeserializeIdentity -> DEBU e86 Obtaining identity" +"2019-09-24 00:25:09.250 UTC [gossip.gossip] handleMessage -> DEBU e87 Exiting" +"2019-09-24 00:25:09.250 UTC [gossip.gossip] handleMessage -> DEBU e88 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 00:25:09.250 UTC [msp] DeserializeIdentity -> DEBU e89 Obtaining identity" +"2019-09-24 00:25:09.250 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e8a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:09.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e8b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:09.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e8c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e8d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e8e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e8f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:09.251 UTC [cauthdsl] func1 -> DEBU e90 0xc0003bbdb0 gate 1569284709251128300 evaluation starts" +"2019-09-24 00:25:09.251 UTC [cauthdsl] func2 -> DEBU e91 0xc0003bbdb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:09.251 UTC [cauthdsl] func2 -> DEBU e92 0xc0003bbdb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:09.251 UTC [cauthdsl] func2 -> DEBU e93 0xc0003bbdb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:09.251 UTC [cauthdsl] func2 -> DEBU e94 0xc0003bbdb0 principal evaluation fails" +"2019-09-24 00:25:09.251 UTC [cauthdsl] func1 -> DEBU e95 0xc0003bbdb0 gate 1569284709251128300 evaluation fails" +"2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e96 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:09.251 UTC [policies] Evaluate -> DEBU e98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:09.251 UTC [cauthdsl] func1 -> DEBU e99 0xc0003d6a10 gate 1569284709251502700 evaluation starts" +"2019-09-24 00:25:09.257 UTC [cauthdsl] func2 -> DEBU e9a 0xc0003d6a10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:09.258 UTC [cauthdsl] func2 -> DEBU e9b 0xc0003d6a10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:09.258 UTC [cauthdsl] func2 -> DEBU e9c 0xc0003d6a10 principal matched by identity 0" +"2019-09-24 00:25:09.258 UTC [msp.identity] Verify -> DEBU e9d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:09.258 UTC [msp.identity] Verify -> DEBU e9e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:09.259 UTC [cauthdsl] func2 -> DEBU e9f 0xc0003d6a10 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:09.259 UTC [cauthdsl] func1 -> DEBU ea0 0xc0003d6a10 gate 1569284709251502700 evaluation succeeds" +"2019-09-24 00:25:09.259 UTC [policies] Evaluate -> DEBU ea1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:09.259 UTC [policies] Evaluate -> DEBU ea2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:09.259 UTC [policies] Evaluate -> DEBU ea3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:09.259 UTC [policies] Evaluate -> DEBU ea4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:09.259 UTC [msp] DeserializeIdentity -> DEBU ea5 Obtaining identity" +"2019-09-24 00:25:09.259 UTC [gossip.gossip] handleMessage -> DEBU ea6 Exiting" +"2019-09-24 00:25:09.609 UTC [msp] GetDefaultSigningIdentity -> DEBU ea7 Obtaining default signing identity" +"2019-09-24 00:25:09.610 UTC [msp.identity] Sign -> DEBU ea8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151017 " +"2019-09-24 00:25:09.610 UTC [msp.identity] Sign -> DEBU ea9 Sign: digest: B9A2E193535DBD040AD7B23ED6BBDB3C2E20E76C65A548A9F15E9B12133AC1DB " +"2019-09-24 00:25:09.610 UTC [msp] GetDefaultSigningIdentity -> DEBU eaa Obtaining default signing identity" +"2019-09-24 00:25:09.610 UTC [msp.identity] Sign -> DEBU eab Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:09.610 UTC [msp.identity] Sign -> DEBU eac Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:09.610 UTC [gossip.discovery] periodicalSendAlive -> DEBU ead Sleeping 5s" +"2019-09-24 00:25:09.617 UTC [msp] DeserializeIdentity -> DEBU eae Obtaining identity" +"2019-09-24 00:25:09.618 UTC [msp] DeserializeIdentity -> DEBU eaf Obtaining identity" +"2019-09-24 00:25:09.618 UTC [msp] DeserializeIdentity -> DEBU eb0 Obtaining identity" +"2019-09-24 00:25:09.619 UTC [gossip.comm] Send -> DEBU eb1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:09.619 UTC [msp] DeserializeIdentity -> DEBU eb2 Obtaining identity" +"2019-09-24 00:25:09.619 UTC [gossip.comm] Send -> DEBU eb3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:09.619 UTC [gossip.comm] Send -> DEBU eb4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:09.619 UTC [gossip.comm] sendToEndpoint -> DEBU eb5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:09.619 UTC [gossip.comm] sendToEndpoint -> DEBU eb6 Exiting" +"2019-09-24 00:25:09.620 UTC [gossip.comm] sendToEndpoint -> DEBU eb7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:09.620 UTC [gossip.comm] sendToEndpoint -> DEBU eb8 Exiting" +"2019-09-24 00:25:09.620 UTC [gossip.comm] sendToEndpoint -> DEBU eb9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:09.620 UTC [gossip.comm] sendToEndpoint -> DEBU eba Exiting" +"2019-09-24 00:25:09.692 UTC [gossip.comm] func1 -> DEBU ebb Got message: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 00:25:09.692 UTC [gossip.gossip] handleMessage -> DEBU ebc Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 00:25:09.692 UTC [gossip.pull] HandleMessage -> DEBU ebd GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 00:25:09.692 UTC [msp] DeserializeIdentity -> DEBU ebe Obtaining identity" +"2019-09-24 00:25:09.692 UTC [msp] DeserializeIdentity -> DEBU ebf Obtaining identity" +"2019-09-24 00:25:09.692 UTC [gossip.gossip] handleMessage -> DEBU ec0 Exiting" +"2019-09-24 00:25:09.692 UTC [gossip.pull] SendRes -> DEBU ec1 Sending 2 IDENTITY_MSG items to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:09.706 UTC [gossip.comm] func1 -> DEBU ec2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:09.706 UTC [gossip.gossip] handleMessage -> DEBU ec3 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:09.706 UTC [gossip.pull] HandleMessage -> DEBU ec4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:09.706 UTC [gossip.pull] SendDigest -> DEBU ec5 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:09.706 UTC [gossip.gossip] handleMessage -> DEBU ec6 Exiting" +"2019-09-24 00:25:09.730 UTC [gossip.comm] func1 -> DEBU ec7 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" secret_envelope:HC\344\240\354/\236\235\202\347\030~x,8\002 (\370\321\366\246\3500U\177.\201#\332O\232\010\010\204\006\362\207\224\270 \r_. \307\"\3551" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:09.730 UTC [gossip.gossip] handleMessage -> DEBU ec8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" secret_envelope:HC\344\240\354/\236\235\202\347\030~x,8\002 (\370\321\366\246\3500U\177.\201#\332O\232\010\010\204\006\362\207\224\270 \r_. \307\"\3551" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:09.731 UTC [gossip.gossip] handleMessage -> DEBU ec9 Exiting" +"2019-09-24 00:25:09.731 UTC [gossip.discovery] handleMsgFromComm -> DEBU eca Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" secret_envelope:HC\344\240\354/\236\235\202\347\030~x,8\002 (\370\321\366\246\3500U\177.\201#\332O\232\010\010\204\006\362\207\224\270 \r_. \307\"\3551" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:09.733 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ecb Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:09.736 UTC [msp.identity] Verify -> DEBU ecc Verify: digest = 00000000 57 61 06 dc fd 2b cc 9e c2 59 bf 13 9d 35 ee 7a |Wa...+...Y...5.z| +00000010 8c 6b 00 23 76 74 16 3d 45 be c5 c4 d5 8f 50 97 |.k.#vt.=E.....P.|" +"2019-09-24 00:25:09.736 UTC [msp.identity] Verify -> DEBU ecd Verify: sig = 00000000 30 45 02 21 00 bf 4f 20 51 64 71 44 a7 8f b6 31 |0E.!..O QdqD...1| +00000010 49 f5 b7 6c 5a 4f dc ce 01 02 8d 20 19 51 d3 9f |I..lZO..... .Q..| +00000020 40 4c e4 d7 1f 02 20 34 90 fb c6 ea d9 cf 20 ad |@L.... 4...... .| +00000030 37 4f 7e 50 96 9d 0d f4 0e 00 17 37 89 1e 7c 4a |7O~P.......7..|J| +00000040 b1 56 d3 1d b1 2b fd |.V...+.|" +"2019-09-24 00:25:09.736 UTC [msp.identity] Verify -> DEBU ece Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:09.736 UTC [msp.identity] Verify -> DEBU ecf Verify: sig = 00000000 30 45 02 21 00 bc d1 10 37 5b 15 bc 53 34 75 d9 |0E.!....7[..S4u.| +00000010 6b 8c d8 6f e8 3e 48 43 e4 a0 ec 2f 9e 9d 82 e7 |k..o.>HC.../....| +00000020 18 7e 78 2c 38 02 20 28 f8 d1 f6 a6 e8 30 55 7f |.~x,8. (.....0U.| +00000030 2e 81 23 da 4f 9a 08 08 84 06 f2 87 94 b8 20 0d |..#.O......... .| +00000040 5f 2e 20 c7 22 ed 31 |_. .".1|" +"2019-09-24 00:25:09.737 UTC [gossip.discovery] handleAliveMessage -> DEBU ed0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:09.737 UTC [gossip.discovery] learnExistingMembers -> DEBU ed1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:25:09.737 UTC [gossip.discovery] learnExistingMembers -> DEBU ed2 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:09.737 UTC [gossip.discovery] learnExistingMembers -> DEBU ed3 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:09.737 UTC [gossip.discovery] learnExistingMembers -> DEBU ed4 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:09.737 UTC [gossip.discovery] learnExistingMembers -> DEBU ed5 Exiting" +"2019-09-24 00:25:09.737 UTC [gossip.discovery] handleAliveMessage -> DEBU ed6 Exiting" +"2019-09-24 00:25:09.737 UTC [gossip.discovery] handleMsgFromComm -> DEBU ed7 Exiting" +"2019-09-24 00:25:09.737 UTC [gossip.discovery] sendMemResponse -> DEBU ed8 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:09.737 UTC [msp] DeserializeIdentity -> DEBU ed9 Obtaining identity" +"2019-09-24 00:25:09.737 UTC [msp] DeserializeIdentity -> DEBU eda Obtaining identity" +"2019-09-24 00:25:09.737 UTC [gossip.comm] Send -> DEBU edb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:09.737 UTC [gossip.discovery] sendMemResponse -> DEBU edc Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" secret_envelope:HC\344\240\354/\236\235\202\347\030~x,8\002 (\370\321\366\246\3500U\177.\201#\332O\232\010\010\204\006\362\207\224\270 \r_. \307\"\3551" > > alive: " +"2019-09-24 00:25:09.737 UTC [gossip.comm] sendToEndpoint -> DEBU edd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-09-24 00:25:09.737 UTC [gossip.comm] sendToEndpoint -> DEBU ede Exiting" +"2019-09-24 00:25:10.015 UTC [gossip.gossip] handleMessage -> DEBU edf Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:10.015 UTC [gossip.gossip] handleMessage -> DEBU ee0 Exiting" +"2019-09-24 00:25:10.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU ee1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:10.015 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ee2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:10.016 UTC [msp] DeserializeIdentity -> DEBU ee3 Obtaining identity" +"2019-09-24 00:25:10.016 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ee4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:10.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ee5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:10.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ee6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:10.016 UTC [policies] Evaluate -> DEBU ee7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:10.016 UTC [policies] Evaluate -> DEBU ee8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:10.016 UTC [policies] Evaluate -> DEBU ee9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:10.016 UTC [cauthdsl] func1 -> DEBU eea 0xc00256b210 gate 1569284710016876600 evaluation starts" +"2019-09-24 00:25:10.016 UTC [cauthdsl] func2 -> DEBU eeb 0xc00256b210 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:10.016 UTC [cauthdsl] func2 -> DEBU eec 0xc00256b210 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU eed 0xc00256b210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU eee 0xc00256b210 principal evaluation fails" +"2019-09-24 00:25:10.017 UTC [cauthdsl] func1 -> DEBU eef 0xc00256b210 gate 1569284710016876600 evaluation fails" +"2019-09-24 00:25:10.017 UTC [policies] Evaluate -> DEBU ef0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:10.017 UTC [policies] Evaluate -> DEBU ef1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:10.017 UTC [policies] Evaluate -> DEBU ef2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:10.017 UTC [cauthdsl] func1 -> DEBU ef3 0xc00256ba50 gate 1569284710017336700 evaluation starts" +"2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU ef4 0xc00256ba50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU ef5 0xc00256ba50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU ef6 0xc00256ba50 principal matched by identity 0" +"2019-09-24 00:25:10.017 UTC [msp.identity] Verify -> DEBU ef7 Verify: digest = 00000000 9e 72 d2 1a 5c f4 c7 a9 a6 cf 27 77 6b a2 88 df |.r..\.....'wk...| +00000010 83 21 b4 ad 75 00 f8 b8 2a 47 54 80 82 99 28 1c |.!..u...*GT...(.|" +"2019-09-24 00:25:10.017 UTC [msp.identity] Verify -> DEBU ef8 Verify: sig = 00000000 30 44 02 20 4a cf 3f 01 9a a5 7e 59 0c c1 38 3f |0D. J.?...~Y..8?| +00000010 d9 ae 02 a9 d0 ea 83 a5 40 7c ab 82 a2 7c fe 1b |........@|...|..| +00000020 19 86 40 da 02 20 04 dd ec 61 07 cf 34 14 54 fb |..@.. ...a..4.T.| +00000030 65 82 13 86 12 a0 ac cc c8 2a 94 1e c1 a8 15 0d |e........*......| +00000040 bd 27 4a df 8c 79 |.'J..y|" +"2019-09-24 00:25:10.017 UTC [cauthdsl] func2 -> DEBU ef9 0xc00256ba50 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:10.017 UTC [cauthdsl] func1 -> DEBU efa 0xc00256ba50 gate 1569284710017336700 evaluation succeeds" +"2019-09-24 00:25:10.018 UTC [policies] Evaluate -> DEBU efb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:10.018 UTC [policies] Evaluate -> DEBU efc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:10.018 UTC [policies] Evaluate -> DEBU efd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:10.018 UTC [policies] Evaluate -> DEBU efe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:10.018 UTC [gossip.discovery] handleAliveMessage -> DEBU eff Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:10.018 UTC [gossip.discovery] learnExistingMembers -> DEBU f00 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:10.018 UTC [gossip.discovery] learnExistingMembers -> DEBU f01 updating membership: timestamp: " +"2019-09-24 00:25:10.018 UTC [gossip.discovery] learnExistingMembers -> DEBU f02 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:10.018 UTC [gossip.discovery] learnExistingMembers -> DEBU f03 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:10.018 UTC [gossip.discovery] learnExistingMembers -> DEBU f04 Exiting" +"2019-09-24 00:25:10.018 UTC [gossip.discovery] handleAliveMessage -> DEBU f05 Exiting" +"2019-09-24 00:25:10.018 UTC [gossip.discovery] handleMsgFromComm -> DEBU f06 Exiting" +"2019-09-24 00:25:10.019 UTC [gossip.comm] func1 -> DEBU f07 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:10.019 UTC [gossip.gossip] handleMessage -> DEBU f08 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:10.019 UTC [gossip.gossip] handleMessage -> DEBU f09 Exiting" +"2019-09-24 00:25:10.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU f0a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:10.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU f0b Exiting" +"2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f0c Obtaining identity" +"2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f0d Obtaining identity" +"2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f0e Obtaining identity" +"2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f0f Obtaining identity" +"2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f10 Obtaining identity" +"2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f11 Obtaining identity" +"2019-09-24 00:25:10.020 UTC [msp] DeserializeIdentity -> DEBU f12 Obtaining identity" +"2019-09-24 00:25:10.021 UTC [gossip.comm] Send -> DEBU f13 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:10.021 UTC [msp] DeserializeIdentity -> DEBU f14 Obtaining identity" +"2019-09-24 00:25:10.021 UTC [gossip.comm] Send -> DEBU f15 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:10.021 UTC [gossip.comm] sendToEndpoint -> DEBU f16 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:10.021 UTC [gossip.comm] sendToEndpoint -> DEBU f17 Exiting" +"2019-09-24 00:25:10.021 UTC [gossip.comm] sendToEndpoint -> DEBU f18 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:10.021 UTC [gossip.comm] sendToEndpoint -> DEBU f19 Exiting" +"2019-09-24 00:25:10.149 UTC [gossip.comm] func1 -> DEBU f1a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:10.150 UTC [gossip.gossip] handleMessage -> DEBU f1b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:10.150 UTC [msp] DeserializeIdentity -> DEBU f1c Obtaining identity" +"2019-09-24 00:25:10.150 UTC [msp] DeserializeIdentity -> DEBU f1d Obtaining identity" +"2019-09-24 00:25:10.150 UTC [msp] DeserializeIdentity -> DEBU f1e Obtaining identity" +"2019-09-24 00:25:10.150 UTC [gossip.gossip] handleMessage -> DEBU f1f Exiting" +"2019-09-24 00:25:10.167 UTC [gossip.comm] func1 -> DEBU f20 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 00:25:10.168 UTC [gossip.gossip] handleMessage -> DEBU f21 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 00:25:10.168 UTC [msp] DeserializeIdentity -> DEBU f22 Obtaining identity" +"2019-09-24 00:25:10.168 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f23 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:10.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f24 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:10.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f25 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f26 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f27 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f28 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:10.168 UTC [cauthdsl] func1 -> DEBU f29 0xc0003e3de0 gate 1569284710168603700 evaluation starts" +"2019-09-24 00:25:10.168 UTC [cauthdsl] func2 -> DEBU f2a 0xc0003e3de0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:10.168 UTC [cauthdsl] func2 -> DEBU f2b 0xc0003e3de0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:10.168 UTC [cauthdsl] func2 -> DEBU f2c 0xc0003e3de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:10.168 UTC [cauthdsl] func2 -> DEBU f2d 0xc0003e3de0 principal evaluation fails" +"2019-09-24 00:25:10.168 UTC [cauthdsl] func1 -> DEBU f2e 0xc0003e3de0 gate 1569284710168603700 evaluation fails" +"2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f2f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f30 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:10.168 UTC [policies] Evaluate -> DEBU f31 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:10.168 UTC [cauthdsl] func1 -> DEBU f32 0xc002590640 gate 1569284710168944200 evaluation starts" +"2019-09-24 00:25:10.168 UTC [cauthdsl] func2 -> DEBU f33 0xc002590640 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:10.169 UTC [cauthdsl] func2 -> DEBU f34 0xc002590640 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:10.169 UTC [cauthdsl] func2 -> DEBU f35 0xc002590640 principal matched by identity 0" +"2019-09-24 00:25:10.169 UTC [msp.identity] Verify -> DEBU f36 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:10.169 UTC [msp.identity] Verify -> DEBU f37 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:10.169 UTC [cauthdsl] func2 -> DEBU f38 0xc002590640 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:10.169 UTC [cauthdsl] func1 -> DEBU f39 0xc002590640 gate 1569284710168944200 evaluation succeeds" +"2019-09-24 00:25:10.169 UTC [policies] Evaluate -> DEBU f3a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:10.169 UTC [policies] Evaluate -> DEBU f3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:10.169 UTC [policies] Evaluate -> DEBU f3c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:10.169 UTC [policies] Evaluate -> DEBU f3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:10.169 UTC [msp] DeserializeIdentity -> DEBU f3e Obtaining identity" +"2019-09-24 00:25:10.169 UTC [gossip.gossip] handleMessage -> DEBU f3f Exiting" +"2019-09-24 00:25:10.624 UTC [gossip.comm] func1 -> DEBU f40 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:10.625 UTC [gossip.gossip] handleMessage -> DEBU f41 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:10.625 UTC [gossip.gossip] handleMessage -> DEBU f42 Exiting" +"2019-09-24 00:25:10.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU f43 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:10.625 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f44 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:10.625 UTC [msp] DeserializeIdentity -> DEBU f45 Obtaining identity" +"2019-09-24 00:25:10.625 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:10.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f47 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:10.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f48 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:10.625 UTC [policies] Evaluate -> DEBU f49 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:10.625 UTC [policies] Evaluate -> DEBU f4a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:10.625 UTC [policies] Evaluate -> DEBU f4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:10.625 UTC [cauthdsl] func1 -> DEBU f4c 0xc0025a03e0 gate 1569284710625775200 evaluation starts" +"2019-09-24 00:25:10.625 UTC [cauthdsl] func2 -> DEBU f4d 0xc0025a03e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:10.625 UTC [cauthdsl] func2 -> DEBU f4e 0xc0025a03e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:10.625 UTC [cauthdsl] func2 -> DEBU f4f 0xc0025a03e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:10.626 UTC [cauthdsl] func2 -> DEBU f50 0xc0025a03e0 principal evaluation fails" +"2019-09-24 00:25:10.626 UTC [cauthdsl] func1 -> DEBU f51 0xc0025a03e0 gate 1569284710625775200 evaluation fails" +"2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f52 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:10.626 UTC [cauthdsl] func1 -> DEBU f55 0xc0025a0c20 gate 1569284710626152500 evaluation starts" +"2019-09-24 00:25:10.626 UTC [cauthdsl] func2 -> DEBU f56 0xc0025a0c20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:10.626 UTC [cauthdsl] func2 -> DEBU f57 0xc0025a0c20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:10.626 UTC [cauthdsl] func2 -> DEBU f58 0xc0025a0c20 principal matched by identity 0" +"2019-09-24 00:25:10.626 UTC [msp.identity] Verify -> DEBU f59 Verify: digest = 00000000 4b 48 73 60 fc b8 38 25 10 9a 45 58 35 93 28 11 |KHs`..8%..EX5.(.| +00000010 8b af 71 be 42 ba f0 91 79 2d 82 41 9d cf 87 7f |..q.B...y-.A....|" +"2019-09-24 00:25:10.626 UTC [msp.identity] Verify -> DEBU f5a Verify: sig = 00000000 30 45 02 21 00 8e f5 01 e5 2f 84 92 34 75 c7 fe |0E.!...../..4u..| +00000010 cf 27 c3 80 7f 44 af 19 6a 87 76 b9 97 0c a9 26 |.'...D..j.v....&| +00000020 38 1e 1e c3 e7 02 20 09 97 77 d3 8e 8f eb 3f 8e |8..... ..w....?.| +00000030 63 a0 03 81 19 3d 07 31 6c 91 b5 1a 86 00 f0 77 |c....=.1l......w| +00000040 dc f7 a6 bf 55 50 47 |....UPG|" +"2019-09-24 00:25:10.626 UTC [cauthdsl] func2 -> DEBU f5b 0xc0025a0c20 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:10.626 UTC [cauthdsl] func1 -> DEBU f5c 0xc0025a0c20 gate 1569284710626152500 evaluation succeeds" +"2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f5f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:10.626 UTC [policies] Evaluate -> DEBU f60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:10.626 UTC [gossip.discovery] handleAliveMessage -> DEBU f61 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:10.626 UTC [gossip.discovery] learnExistingMembers -> DEBU f62 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:10.626 UTC [gossip.discovery] learnExistingMembers -> DEBU f63 updating membership: timestamp: " +"2019-09-24 00:25:10.626 UTC [gossip.discovery] learnExistingMembers -> DEBU f64 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:10.627 UTC [gossip.discovery] learnExistingMembers -> DEBU f65 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:10.627 UTC [gossip.discovery] learnExistingMembers -> DEBU f66 Exiting" +"2019-09-24 00:25:10.627 UTC [gossip.discovery] handleAliveMessage -> DEBU f67 Exiting" +"2019-09-24 00:25:10.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU f68 Exiting" +"2019-09-24 00:25:10.629 UTC [msp] DeserializeIdentity -> DEBU f69 Obtaining identity" +"2019-09-24 00:25:10.629 UTC [msp] DeserializeIdentity -> DEBU f6a Obtaining identity" +"2019-09-24 00:25:10.631 UTC [msp] DeserializeIdentity -> DEBU f6b Obtaining identity" +"2019-09-24 00:25:10.631 UTC [msp] DeserializeIdentity -> DEBU f6c Obtaining identity" +"2019-09-24 00:25:10.631 UTC [msp] DeserializeIdentity -> DEBU f6d Obtaining identity" +"2019-09-24 00:25:10.631 UTC [msp] DeserializeIdentity -> DEBU f6e Obtaining identity" +"2019-09-24 00:25:10.632 UTC [msp] DeserializeIdentity -> DEBU f6f Obtaining identity" +"2019-09-24 00:25:10.632 UTC [gossip.comm] Send -> DEBU f70 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:10.632 UTC [msp] DeserializeIdentity -> DEBU f71 Obtaining identity" +"2019-09-24 00:25:10.632 UTC [gossip.comm] Send -> DEBU f72 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:10.632 UTC [gossip.comm] sendToEndpoint -> DEBU f73 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:10.632 UTC [gossip.comm] sendToEndpoint -> DEBU f74 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:10.632 UTC [gossip.comm] sendToEndpoint -> DEBU f76 Exiting" +"2019-09-24 00:25:10.632 UTC [gossip.comm] sendToEndpoint -> DEBU f75 Exiting" +"2019-09-24 00:25:10.641 UTC [gossip.gossip] handleMessage -> DEBU f77 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:10.641 UTC [gossip.gossip] handleMessage -> DEBU f78 Exiting" +"2019-09-24 00:25:10.641 UTC [gossip.discovery] handleMsgFromComm -> DEBU f79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:10.641 UTC [gossip.discovery] handleMsgFromComm -> DEBU f7a Exiting" +"2019-09-24 00:25:10.680 UTC [gossip.comm] func1 -> DEBU f7b Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 00:25:10.680 UTC [gossip.gossip] handleMessage -> DEBU f7c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 00:25:10.680 UTC [gossip.pull] HandleMessage -> DEBU f7d GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 00:25:10.680 UTC [gossip.gossip] handleMessage -> DEBU f7e Exiting" +"2019-09-24 00:25:10.680 UTC [gossip.pull] SendRes -> DEBU f7f Sending 1 IDENTITY_MSG items to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:11.588 UTC [gossip.pull] Hello -> DEBU f80 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:11.588 UTC [gossip.comm] Send -> DEBU f81 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:11.588 UTC [gossip.pull] Hello -> DEBU f82 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:11.588 UTC [gossip.comm] Send -> DEBU f83 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:11.588 UTC [gossip.pull] Hello -> DEBU f84 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:11.589 UTC [gossip.comm] Send -> DEBU f85 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f86 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f87 Exiting" +"2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f88 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f89 Exiting" +"2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f8a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.589 UTC [gossip.comm] sendToEndpoint -> DEBU f8b Exiting" +"2019-09-24 00:25:11.589 UTC [gossip.comm] func1 -> DEBU f8c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.590 UTC [gossip.gossip] handleMessage -> DEBU f8d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.590 UTC [gossip.pull] HandleMessage -> DEBU f8e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.590 UTC [gossip.gossip] handleMessage -> DEBU f8f Exiting" +"2019-09-24 00:25:11.590 UTC [gossip.gossip] handleMessage -> DEBU f90 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.591 UTC [gossip.comm] func1 -> DEBU f91 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.592 UTC [gossip.pull] HandleMessage -> DEBU f92 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.592 UTC [gossip.gossip] handleMessage -> DEBU f93 Exiting" +"2019-09-24 00:25:11.592 UTC [gossip.gossip] handleMessage -> DEBU f94 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.593 UTC [gossip.pull] HandleMessage -> DEBU f95 GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.593 UTC [gossip.gossip] handleMessage -> DEBU f96 Exiting" +"2019-09-24 00:25:11.611 UTC [msp] GetDefaultSigningIdentity -> DEBU f97 Obtaining default signing identity" +"2019-09-24 00:25:11.611 UTC [msp.identity] Sign -> DEBU f98 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151018 " +"2019-09-24 00:25:11.612 UTC [msp.identity] Sign -> DEBU f99 Sign: digest: F67F7C35E08E4704650CFFBF1E4D9CDA984C7869B74E50137FF90D908800971C " +"2019-09-24 00:25:11.612 UTC [msp] GetDefaultSigningIdentity -> DEBU f9a Obtaining default signing identity" +"2019-09-24 00:25:11.612 UTC [msp.identity] Sign -> DEBU f9b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:11.612 UTC [msp.identity] Sign -> DEBU f9c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:11.612 UTC [gossip.comm] Send -> DEBU f9d Entering, sending GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:11.612 UTC [msp] DeserializeIdentity -> DEBU f9e Obtaining identity" +"2019-09-24 00:25:11.613 UTC [gossip.comm] Send -> DEBU f9f Entering, sending GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:11.613 UTC [msp] DeserializeIdentity -> DEBU fa0 Obtaining identity" +"2019-09-24 00:25:11.613 UTC [gossip.comm] Send -> DEBU fa1 Entering, sending GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:11.613 UTC [gossip.comm] sendToEndpoint -> DEBU fa2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.613 UTC [gossip.comm] sendToEndpoint -> DEBU fa3 Exiting" +"2019-09-24 00:25:11.613 UTC [gossip.comm] sendToEndpoint -> DEBU fa4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.613 UTC [gossip.comm] sendToEndpoint -> DEBU fa5 Exiting" +"2019-09-24 00:25:11.614 UTC [gossip.comm] sendToEndpoint -> DEBU fa6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:G\263\032g\013\203\376\360.iP\237\205\204\026\002 \\}\000\353S\200*N\342~\234\276\214\207K\202'\367;\213uC\271\356\367\"\302\343hm?G" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.614 UTC [gossip.comm] sendToEndpoint -> DEBU fa7 Exiting" +"2019-09-24 00:25:11.617 UTC [gossip.gossip] handleMessage -> DEBU fa8 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.617 UTC [gossip.gossip] handleMessage -> DEBU fa9 Exiting" +"2019-09-24 00:25:11.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU faa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.618 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fab Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:11.619 UTC [gossip.comm] func1 -> DEBU fac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.619 UTC [gossip.gossip] handleMessage -> DEBU fad Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.619 UTC [msp.identity] Verify -> DEBU fae Verify: digest = 00000000 f6 7f 7c 35 e0 8e 47 04 65 0c ff bf 1e 4d 9c da |..|5..G.e....M..| +00000010 98 4c 78 69 b7 4e 50 13 7f f9 0d 90 88 00 97 1c |.Lxi.NP.........|" +"2019-09-24 00:25:11.620 UTC [msp.identity] Verify -> DEBU faf Verify: sig = 00000000 30 44 02 20 74 bf 0e b8 7e de 4e 2e 65 be 35 47 |0D. t...~.N.e.5G| +00000010 62 06 6d c0 3e 47 b3 1a 67 0b 83 fe f0 2e 69 50 |b.m.>G..g.....iP| +00000020 9f 85 84 16 02 20 5c 7d 00 eb 53 80 2a 4e e2 7e |..... \}..S.*N.~| +00000030 9c be 8c 87 4b 82 27 f7 3b 8b 75 43 b9 ee f7 22 |....K.'.;.uC..."| +00000040 c2 e3 68 6d 3f 47 |..hm?G|" +"2019-09-24 00:25:11.620 UTC [gossip.comm] func1 -> DEBU fb0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.621 UTC [gossip.discovery] handleAliveMessage -> DEBU fb1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:11.621 UTC [gossip.discovery] isSentByMe -> DEBU fb2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:11.621 UTC [gossip.discovery] handleAliveMessage -> DEBU fb3 Exiting" +"2019-09-24 00:25:11.621 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fb4 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:11.628 UTC [msp.identity] Verify -> DEBU fb5 Verify: digest = 00000000 57 61 06 dc fd 2b cc 9e c2 59 bf 13 9d 35 ee 7a |Wa...+...Y...5.z| +00000010 8c 6b 00 23 76 74 16 3d 45 be c5 c4 d5 8f 50 97 |.k.#vt.=E.....P.|" +"2019-09-24 00:25:11.628 UTC [msp.identity] Verify -> DEBU fb6 Verify: sig = 00000000 30 45 02 21 00 bf 4f 20 51 64 71 44 a7 8f b6 31 |0E.!..O QdqD...1| +00000010 49 f5 b7 6c 5a 4f dc ce 01 02 8d 20 19 51 d3 9f |I..lZO..... .Q..| +00000020 40 4c e4 d7 1f 02 20 34 90 fb c6 ea d9 cf 20 ad |@L.... 4...... .| +00000030 37 4f 7e 50 96 9d 0d f4 0e 00 17 37 89 1e 7c 4a |7O~P.......7..|J| +00000040 b1 56 d3 1d b1 2b fd |.V...+.|" +"2019-09-24 00:25:11.628 UTC [gossip.discovery] handleAliveMessage -> DEBU fb7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:11.628 UTC [gossip.discovery] handleAliveMessage -> DEBU fb8 Exiting" +"2019-09-24 00:25:11.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb9 Exiting" +"2019-09-24 00:25:11.629 UTC [gossip.gossip] handleMessage -> DEBU fba Exiting" +"2019-09-24 00:25:11.629 UTC [gossip.gossip] handleMessage -> DEBU fbb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU fbc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.629 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fbd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:11.630 UTC [msp.identity] Verify -> DEBU fbe Verify: digest = 00000000 f6 7f 7c 35 e0 8e 47 04 65 0c ff bf 1e 4d 9c da |..|5..G.e....M..| +00000010 98 4c 78 69 b7 4e 50 13 7f f9 0d 90 88 00 97 1c |.Lxi.NP.........|" +"2019-09-24 00:25:11.630 UTC [msp.identity] Verify -> DEBU fbf Verify: sig = 00000000 30 44 02 20 74 bf 0e b8 7e de 4e 2e 65 be 35 47 |0D. t...~.N.e.5G| +00000010 62 06 6d c0 3e 47 b3 1a 67 0b 83 fe f0 2e 69 50 |b.m.>G..g.....iP| +00000020 9f 85 84 16 02 20 5c 7d 00 eb 53 80 2a 4e e2 7e |..... \}..S.*N.~| +00000030 9c be 8c 87 4b 82 27 f7 3b 8b 75 43 b9 ee f7 22 |....K.'.;.uC..."| +00000040 c2 e3 68 6d 3f 47 |..hm?G|" +"2019-09-24 00:25:11.630 UTC [msp.identity] Verify -> DEBU fc0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:11.630 UTC [msp.identity] Verify -> DEBU fc1 Verify: sig = 00000000 30 44 02 20 12 60 f4 bf 4d 44 2e bb 38 fb 35 de |0D. .`..MD..8.5.| +00000010 f5 eb 21 e6 52 a4 a7 24 c7 82 c3 f5 af 2b d3 b9 |..!.R..$.....+..| +00000020 68 61 fa 20 02 20 24 08 ef b7 02 05 09 74 b7 86 |ha. . $......t..| +00000030 93 09 f3 65 9e 77 bb f3 fe 94 01 fd 71 c8 69 61 |...e.w......q.ia| +00000040 af 51 92 ed 78 37 |.Q..x7|" +"2019-09-24 00:25:11.630 UTC [gossip.discovery] handleAliveMessage -> DEBU fc2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:11.630 UTC [gossip.discovery] isSentByMe -> DEBU fc3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:11.631 UTC [gossip.discovery] handleAliveMessage -> DEBU fc4 Exiting" +"2019-09-24 00:25:11.631 UTC [gossip.discovery] handleMsgFromComm -> DEBU fc5 Exiting" +"2019-09-24 00:25:11.631 UTC [gossip.gossip] handleMessage -> DEBU fc6 Exiting" +"2019-09-24 00:25:11.631 UTC [gossip.discovery] handleMsgFromComm -> DEBU fc7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.631 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fc8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:11.632 UTC [msp.identity] Verify -> DEBU fc9 Verify: digest = 00000000 f6 7f 7c 35 e0 8e 47 04 65 0c ff bf 1e 4d 9c da |..|5..G.e....M..| +00000010 98 4c 78 69 b7 4e 50 13 7f f9 0d 90 88 00 97 1c |.Lxi.NP.........|" +"2019-09-24 00:25:11.632 UTC [msp.identity] Verify -> DEBU fca Verify: sig = 00000000 30 44 02 20 74 bf 0e b8 7e de 4e 2e 65 be 35 47 |0D. t...~.N.e.5G| +00000010 62 06 6d c0 3e 47 b3 1a 67 0b 83 fe f0 2e 69 50 |b.m.>G..g.....iP| +00000020 9f 85 84 16 02 20 5c 7d 00 eb 53 80 2a 4e e2 7e |..... \}..S.*N.~| +00000030 9c be 8c 87 4b 82 27 f7 3b 8b 75 43 b9 ee f7 22 |....K.'.;.uC..."| +00000040 c2 e3 68 6d 3f 47 |..hm?G|" +"2019-09-24 00:25:11.632 UTC [gossip.discovery] handleAliveMessage -> DEBU fcb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:11.632 UTC [gossip.discovery] isSentByMe -> DEBU fcc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:11.632 UTC [gossip.discovery] handleAliveMessage -> DEBU fcd Exiting" +"2019-09-24 00:25:11.632 UTC [gossip.discovery] handleMsgFromComm -> DEBU fce Exiting" +"2019-09-24 00:25:11.957 UTC [gossip.gossip] handleMessage -> DEBU fcf Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.957 UTC [gossip.pull] HandleMessage -> DEBU fd0 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.957 UTC [msp] DeserializeIdentity -> DEBU fd1 Obtaining identity" +"2019-09-24 00:25:11.957 UTC [msp] DeserializeIdentity -> DEBU fd2 Obtaining identity" +"2019-09-24 00:25:11.957 UTC [msp] DeserializeIdentity -> DEBU fd3 Obtaining identity" +"2019-09-24 00:25:11.957 UTC [msp] DeserializeIdentity -> DEBU fd4 Obtaining identity" +"2019-09-24 00:25:11.958 UTC [gossip.pull] SendDigest -> DEBU fd5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:11.958 UTC [gossip.gossip] handleMessage -> DEBU fd6 Exiting" +"2019-09-24 00:25:11.972 UTC [gossip.gossip] handleMessage -> DEBU fd7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.972 UTC [gossip.gossip] handleMessage -> DEBU fd8 Exiting" +"2019-09-24 00:25:11.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU fd9 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.972 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fda Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:11.972 UTC [msp] DeserializeIdentity -> DEBU fdb Obtaining identity" +"2019-09-24 00:25:11.973 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fdc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:11.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fdd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:11.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fde Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:11.973 UTC [policies] Evaluate -> DEBU fdf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:11.973 UTC [policies] Evaluate -> DEBU fe0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:11.973 UTC [policies] Evaluate -> DEBU fe1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:11.973 UTC [cauthdsl] func1 -> DEBU fe2 0xc002758b70 gate 1569284711973536400 evaluation starts" +"2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fe3 0xc002758b70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fe4 0xc002758b70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fe5 0xc002758b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fe6 0xc002758b70 principal evaluation fails" +"2019-09-24 00:25:11.974 UTC [cauthdsl] func1 -> DEBU fe7 0xc002758b70 gate 1569284711973536400 evaluation fails" +"2019-09-24 00:25:11.974 UTC [policies] Evaluate -> DEBU fe8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:11.974 UTC [policies] Evaluate -> DEBU fe9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:11.974 UTC [policies] Evaluate -> DEBU fea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:11.974 UTC [cauthdsl] func1 -> DEBU feb 0xc0027593b0 gate 1569284711974595300 evaluation starts" +"2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fec 0xc0027593b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fed 0xc0027593b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:11.974 UTC [cauthdsl] func2 -> DEBU fee 0xc0027593b0 principal matched by identity 0" +"2019-09-24 00:25:11.974 UTC [msp.identity] Verify -> DEBU fef Verify: digest = 00000000 19 49 48 11 29 aa b8 5b 6a d0 46 ec 68 7f 36 d3 |.IH.)..[j.F.h.6.| +00000010 7a e8 33 cc 39 18 05 cb 3a cf 88 f3 d4 b2 de 4b |z.3.9...:......K|" +"2019-09-24 00:25:11.975 UTC [msp.identity] Verify -> DEBU ff0 Verify: sig = 00000000 30 45 02 21 00 f3 f2 9e 59 25 f2 ee ad d2 b7 83 |0E.!....Y%......| +00000010 7a 80 c3 1a fd 60 c5 e0 5d 0d 27 d7 44 69 07 52 |z....`..].'.Di.R| +00000020 97 f4 4d c4 f7 02 20 23 07 7c bd a0 d8 80 ee 8c |..M... #.|......| +00000030 f9 bd 5d ba 66 06 dd b9 6e bc e4 2f 16 ee 40 7f |..].f...n../..@.| +00000040 6e 28 08 38 54 76 4d |n(.8TvM|" +"2019-09-24 00:25:11.975 UTC [cauthdsl] func2 -> DEBU ff1 0xc0027593b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:11.975 UTC [cauthdsl] func1 -> DEBU ff2 0xc0027593b0 gate 1569284711974595300 evaluation succeeds" +"2019-09-24 00:25:11.975 UTC [policies] Evaluate -> DEBU ff3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:11.975 UTC [policies] Evaluate -> DEBU ff4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:11.975 UTC [policies] Evaluate -> DEBU ff5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:11.975 UTC [policies] Evaluate -> DEBU ff6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:11.976 UTC [gossip.discovery] handleAliveMessage -> DEBU ff7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:11.976 UTC [gossip.discovery] learnExistingMembers -> DEBU ff8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:11.976 UTC [gossip.discovery] learnExistingMembers -> DEBU ff9 updating membership: timestamp: " +"2019-09-24 00:25:11.976 UTC [gossip.discovery] learnExistingMembers -> DEBU ffa Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:11.976 UTC [gossip.discovery] learnExistingMembers -> DEBU ffb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:11.983 UTC [gossip.discovery] learnExistingMembers -> DEBU ffc Exiting" +"2019-09-24 00:25:11.983 UTC [gossip.discovery] handleAliveMessage -> DEBU ffd Exiting" +"2019-09-24 00:25:11.983 UTC [gossip.discovery] sendMemResponse -> DEBU ffe Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:11.983 UTC [msp] DeserializeIdentity -> DEBU fff Obtaining identity" +"2019-09-24 00:25:11.983 UTC [msp] DeserializeIdentity -> DEBU 1000 Obtaining identity" +"2019-09-24 00:25:11.983 UTC [msp] DeserializeIdentity -> DEBU 1001 Obtaining identity" +"2019-09-24 00:25:11.983 UTC [gossip.comm] Send -> DEBU 1002 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:11.984 UTC [gossip.discovery] sendMemResponse -> DEBU 1003 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" > alive: alive: alive: " +"2019-09-24 00:25:11.984 UTC [gossip.comm] sendToEndpoint -> DEBU 1004 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:11.984 UTC [gossip.comm] sendToEndpoint -> DEBU 1005 Exiting" +"2019-09-24 00:25:11.983 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1006 Exiting" +"2019-09-24 00:25:12.184 UTC [msp] DeserializeIdentity -> DEBU 1007 Obtaining identity" +"2019-09-24 00:25:12.184 UTC [msp] DeserializeIdentity -> DEBU 1008 Obtaining identity" +"2019-09-24 00:25:12.184 UTC [gossip.comm] Send -> DEBU 1009 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:25:12.184 UTC [gossip.comm] sendToEndpoint -> DEBU 100a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.184 UTC [gossip.comm] sendToEndpoint -> DEBU 100b Exiting" +"2019-09-24 00:25:12.185 UTC [gossip.comm] sendToEndpoint -> DEBU 100c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.185 UTC [gossip.comm] sendToEndpoint -> DEBU 100d Exiting" +"2019-09-24 00:25:12.185 UTC [gossip.comm] sendToEndpoint -> DEBU 100e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.185 UTC [gossip.comm] sendToEndpoint -> DEBU 100f Exiting" +"2019-09-24 00:25:12.186 UTC [gossip.comm] func1 -> DEBU 1010 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 551 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.186 UTC [gossip.gossip] handleMessage -> DEBU 1011 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 551 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.187 UTC [msp.identity] Verify -> DEBU 1012 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:12.187 UTC [msp.identity] Verify -> DEBU 1013 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:12.187 UTC [msp.identity] Verify -> DEBU 1014 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:12.187 UTC [msp.identity] Verify -> DEBU 1015 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:12.187 UTC [msp] DeserializeIdentity -> DEBU 1016 Obtaining identity" +"2019-09-24 00:25:12.187 UTC [msp] DeserializeIdentity -> DEBU 1017 Obtaining identity" +"2019-09-24 00:25:12.188 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1018 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:12.188 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1019 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.188 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 101a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 101b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 101c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 101d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:12.188 UTC [cauthdsl] func1 -> DEBU 101e 0xc002a2e4d0 gate 1569284712188506100 evaluation starts" +"2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 101f 0xc002a2e4d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 1020 0xc002a2e4d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 1021 0xc002a2e4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 1022 0xc002a2e4d0 principal evaluation fails" +"2019-09-24 00:25:12.188 UTC [cauthdsl] func1 -> DEBU 1023 0xc002a2e4d0 gate 1569284712188506100 evaluation fails" +"2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 1024 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 1025 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.188 UTC [policies] Evaluate -> DEBU 1026 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:12.188 UTC [cauthdsl] func1 -> DEBU 1027 0xc002a2ee00 gate 1569284712188831900 evaluation starts" +"2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 1028 0xc002a2ee00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 1029 0xc002a2ee00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.188 UTC [cauthdsl] func2 -> DEBU 102a 0xc002a2ee00 principal matched by identity 0" +"2019-09-24 00:25:12.189 UTC [msp.identity] Verify -> DEBU 102b Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:12.189 UTC [msp.identity] Verify -> DEBU 102c Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:12.189 UTC [cauthdsl] func2 -> DEBU 102d 0xc002a2ee00 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:12.189 UTC [cauthdsl] func1 -> DEBU 102e 0xc002a2ee00 gate 1569284712188831900 evaluation succeeds" +"2019-09-24 00:25:12.189 UTC [policies] Evaluate -> DEBU 102f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.189 UTC [policies] Evaluate -> DEBU 1030 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.189 UTC [policies] Evaluate -> DEBU 1031 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:12.189 UTC [policies] Evaluate -> DEBU 1032 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:12.189 UTC [gossip.gossip] handleMessage -> DEBU 1033 Exiting" +"2019-09-24 00:25:12.189 UTC [gossip.gossip] handleMessage -> DEBU 1034 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.189 UTC [msp] DeserializeIdentity -> DEBU 1035 Obtaining identity" +"2019-09-24 00:25:12.189 UTC [msp] DeserializeIdentity -> DEBU 1036 Obtaining identity" +"2019-09-24 00:25:12.189 UTC [msp] DeserializeIdentity -> DEBU 1037 Obtaining identity" +"2019-09-24 00:25:12.190 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1038 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:12.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1039 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 103a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 103b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 103c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 103d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func1 -> DEBU 103e 0xc002aa49e0 gate 1569284712190369000 evaluation starts" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 103f 0xc002aa49e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 1040 0xc002aa49e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 1041 0xc002aa49e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 1042 0xc002aa49e0 principal evaluation fails" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func1 -> DEBU 1043 0xc002aa49e0 gate 1569284712190369000 evaluation fails" +"2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 1044 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 1045 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.190 UTC [policies] Evaluate -> DEBU 1046 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func1 -> DEBU 1047 0xc002aa5220 gate 1569284712190651300 evaluation starts" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 1048 0xc002aa5220 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 1049 0xc002aa5220 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 104a 0xc002aa5220 principal matched by identity 0" +"2019-09-24 00:25:12.190 UTC [msp.identity] Verify -> DEBU 104b Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:12.190 UTC [msp.identity] Verify -> DEBU 104c Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func2 -> DEBU 104d 0xc002aa5220 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:12.190 UTC [cauthdsl] func1 -> DEBU 104e 0xc002aa5220 gate 1569284712190651300 evaluation succeeds" +"2019-09-24 00:25:12.191 UTC [policies] Evaluate -> DEBU 104f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.191 UTC [policies] Evaluate -> DEBU 1050 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.191 UTC [policies] Evaluate -> DEBU 1051 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:12.191 UTC [policies] Evaluate -> DEBU 1052 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:12.195 UTC [msp.identity] Verify -> DEBU 1053 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:12.195 UTC [msp.identity] Verify -> DEBU 1054 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:12.196 UTC [msp.identity] Verify -> DEBU 1055 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:12.196 UTC [msp.identity] Verify -> DEBU 1056 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:12.196 UTC [msp] DeserializeIdentity -> DEBU 1057 Obtaining identity" +"2019-09-24 00:25:12.196 UTC [msp] DeserializeIdentity -> DEBU 1058 Obtaining identity" +"2019-09-24 00:25:12.196 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1059 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:12.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 105a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 105b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.196 UTC [policies] Evaluate -> DEBU 105c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:12.196 UTC [policies] Evaluate -> DEBU 105d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:12.196 UTC [policies] Evaluate -> DEBU 105e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:12.196 UTC [cauthdsl] func1 -> DEBU 105f 0xc002b479d0 gate 1569284712196783500 evaluation starts" +"2019-09-24 00:25:12.196 UTC [cauthdsl] func2 -> DEBU 1060 0xc002b479d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.196 UTC [cauthdsl] func2 -> DEBU 1061 0xc002b479d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.196 UTC [cauthdsl] func2 -> DEBU 1062 0xc002b479d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:12.196 UTC [cauthdsl] func2 -> DEBU 1063 0xc002b479d0 principal evaluation fails" +"2019-09-24 00:25:12.196 UTC [cauthdsl] func1 -> DEBU 1064 0xc002b479d0 gate 1569284712196783500 evaluation fails" +"2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1065 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1066 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1067 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:12.197 UTC [cauthdsl] func1 -> DEBU 1068 0xc002bda210 gate 1569284712197111900 evaluation starts" +"2019-09-24 00:25:12.197 UTC [cauthdsl] func2 -> DEBU 1069 0xc002bda210 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.197 UTC [cauthdsl] func2 -> DEBU 106a 0xc002bda210 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.197 UTC [cauthdsl] func2 -> DEBU 106b 0xc002bda210 principal matched by identity 0" +"2019-09-24 00:25:12.197 UTC [msp.identity] Verify -> DEBU 106c Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:12.197 UTC [msp.identity] Verify -> DEBU 106d Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:12.197 UTC [cauthdsl] func2 -> DEBU 106e 0xc002bda210 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:12.197 UTC [cauthdsl] func1 -> DEBU 106f 0xc002bda210 gate 1569284712197111900 evaluation succeeds" +"2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1070 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1071 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1072 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:12.197 UTC [policies] Evaluate -> DEBU 1073 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:12.197 UTC [gossip.gossip] handleMessage -> DEBU 1074 Exiting" +"2019-09-24 00:25:12.201 UTC [gossip.comm] func1 -> DEBU 1075 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.202 UTC [gossip.gossip] handleMessage -> DEBU 1076 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.202 UTC [msp] DeserializeIdentity -> DEBU 1077 Obtaining identity" +"2019-09-24 00:25:12.202 UTC [msp] DeserializeIdentity -> DEBU 1078 Obtaining identity" +"2019-09-24 00:25:12.202 UTC [msp] DeserializeIdentity -> DEBU 1079 Obtaining identity" +"2019-09-24 00:25:12.202 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 107a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:12.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 107b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 107c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.202 UTC [policies] Evaluate -> DEBU 107d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:12.202 UTC [policies] Evaluate -> DEBU 107e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:12.202 UTC [policies] Evaluate -> DEBU 107f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:12.202 UTC [cauthdsl] func1 -> DEBU 1080 0xc002bdbe90 gate 1569284712202694900 evaluation starts" +"2019-09-24 00:25:12.202 UTC [cauthdsl] func2 -> DEBU 1081 0xc002bdbe90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.202 UTC [cauthdsl] func2 -> DEBU 1082 0xc002bdbe90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.202 UTC [cauthdsl] func2 -> DEBU 1083 0xc002bdbe90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:12.202 UTC [cauthdsl] func2 -> DEBU 1084 0xc002bdbe90 principal evaluation fails" +"2019-09-24 00:25:12.202 UTC [cauthdsl] func1 -> DEBU 1085 0xc002bdbe90 gate 1569284712202694900 evaluation fails" +"2019-09-24 00:25:12.202 UTC [policies] Evaluate -> DEBU 1086 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.202 UTC [policies] Evaluate -> DEBU 1087 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.203 UTC [policies] Evaluate -> DEBU 1088 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:12.203 UTC [cauthdsl] func1 -> DEBU 1089 0xc002bea7e0 gate 1569284712203041800 evaluation starts" +"2019-09-24 00:25:12.203 UTC [cauthdsl] func2 -> DEBU 108a 0xc002bea7e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.203 UTC [cauthdsl] func2 -> DEBU 108b 0xc002bea7e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.203 UTC [cauthdsl] func2 -> DEBU 108c 0xc002bea7e0 principal matched by identity 0" +"2019-09-24 00:25:12.203 UTC [msp.identity] Verify -> DEBU 108d Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:12.203 UTC [msp.identity] Verify -> DEBU 108e Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:12.203 UTC [cauthdsl] func2 -> DEBU 108f 0xc002bea7e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:12.203 UTC [cauthdsl] func1 -> DEBU 1090 0xc002bea7e0 gate 1569284712203041800 evaluation succeeds" +"2019-09-24 00:25:12.203 UTC [policies] Evaluate -> DEBU 1091 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.203 UTC [policies] Evaluate -> DEBU 1092 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.203 UTC [policies] Evaluate -> DEBU 1093 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:12.203 UTC [policies] Evaluate -> DEBU 1094 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:12.203 UTC [msp.identity] Verify -> DEBU 1095 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:12.203 UTC [msp.identity] Verify -> DEBU 1096 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:12.204 UTC [msp] DeserializeIdentity -> DEBU 1097 Obtaining identity" +"2019-09-24 00:25:12.204 UTC [msp] DeserializeIdentity -> DEBU 1098 Obtaining identity" +"2019-09-24 00:25:12.210 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1099 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:12.210 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 109a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.210 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 109b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 109c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 109d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 109e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:12.210 UTC [cauthdsl] func1 -> DEBU 109f 0xc002c16710 gate 1569284712210323700 evaluation starts" +"2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10a0 0xc002c16710 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10a1 0xc002c16710 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10a2 0xc002c16710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10a3 0xc002c16710 principal evaluation fails" +"2019-09-24 00:25:12.210 UTC [cauthdsl] func1 -> DEBU 10a4 0xc002c16710 gate 1569284712210323700 evaluation fails" +"2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 10a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 10a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.210 UTC [policies] Evaluate -> DEBU 10a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:12.210 UTC [cauthdsl] func1 -> DEBU 10a8 0xc002c16f50 gate 1569284712210805300 evaluation starts" +"2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10a9 0xc002c16f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10aa 0xc002c16f50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.210 UTC [cauthdsl] func2 -> DEBU 10ab 0xc002c16f50 principal matched by identity 0" +"2019-09-24 00:25:12.211 UTC [msp.identity] Verify -> DEBU 10ac Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:12.211 UTC [msp.identity] Verify -> DEBU 10ad Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:12.213 UTC [cauthdsl] func2 -> DEBU 10ae 0xc002c16f50 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:12.213 UTC [cauthdsl] func1 -> DEBU 10af 0xc002c16f50 gate 1569284712210805300 evaluation succeeds" +"2019-09-24 00:25:12.213 UTC [policies] Evaluate -> DEBU 10b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.213 UTC [policies] Evaluate -> DEBU 10b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.213 UTC [policies] Evaluate -> DEBU 10b2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:12.213 UTC [policies] Evaluate -> DEBU 10b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:12.213 UTC [gossip.gossip] handleMessage -> DEBU 10b4 Exiting" +"2019-09-24 00:25:12.239 UTC [msp] DeserializeIdentity -> DEBU 10b5 Obtaining identity" +"2019-09-24 00:25:12.239 UTC [msp] DeserializeIdentity -> DEBU 10b6 Obtaining identity" +"2019-09-24 00:25:12.239 UTC [gossip.pull] Hello -> DEBU 10b7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:12.239 UTC [msp] DeserializeIdentity -> DEBU 10b8 Obtaining identity" +"2019-09-24 00:25:12.239 UTC [msp] DeserializeIdentity -> DEBU 10b9 Obtaining identity" +"2019-09-24 00:25:12.239 UTC [gossip.comm] Send -> DEBU 10ba Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:12.239 UTC [gossip.comm] sendToEndpoint -> DEBU 10bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.239 UTC [gossip.comm] sendToEndpoint -> DEBU 10bc Exiting" +"2019-09-24 00:25:12.241 UTC [gossip.comm] func1 -> DEBU 10bd Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.241 UTC [gossip.gossip] handleMessage -> DEBU 10be Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.241 UTC [gossip.pull] HandleMessage -> DEBU 10bf GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.241 UTC [gossip.gossip] handleMessage -> DEBU 10c0 Exiting" +"2019-09-24 00:25:12.273 UTC [gossip.election] waitForInterrupt -> DEBU 10c1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:12.273 UTC [gossip.election] IsLeader -> DEBU 10c2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:25:12.273 UTC [msp] GetDefaultSigningIdentity -> DEBU 10c3 Obtaining default signing identity" +"2019-09-24 00:25:12.273 UTC [msp.identity] Sign -> DEBU 10c4 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510041801 " +"2019-09-24 00:25:12.273 UTC [msp.identity] Sign -> DEBU 10c5 Sign: digest: F284D7C8A1BEBC1E64A8FE39ACD1741FE342C5383D0E18F17522AF39CB9E6E48 " +"2019-09-24 00:25:12.274 UTC [gossip.election] waitForInterrupt -> DEBU 10c6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10c7 Obtaining identity" +"2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10c8 Obtaining identity" +"2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10c9 Obtaining identity" +"2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10ca Obtaining identity" +"2019-09-24 00:25:12.276 UTC [gossip.comm] Send -> DEBU 10cb Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10cc Obtaining identity" +"2019-09-24 00:25:12.276 UTC [msp] DeserializeIdentity -> DEBU 10cd Obtaining identity" +"2019-09-24 00:25:12.277 UTC [gossip.comm] sendToEndpoint -> DEBU 10ce Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:25:12.277 UTC [gossip.comm] sendToEndpoint -> DEBU 10cf Exiting" +"2019-09-24 00:25:12.589 UTC [gossip.pull] SendReq -> DEBU 10d0 Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" +"2019-09-24 00:25:12.589 UTC [gossip.comm] Send -> DEBU 10d1 Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:12.589 UTC [gossip.comm] sendToEndpoint -> DEBU 10d2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.590 UTC [gossip.comm] sendToEndpoint -> DEBU 10d3 Exiting" +"2019-09-24 00:25:12.591 UTC [gossip.gossip] handleMessage -> DEBU 10d4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2496699800459247914, Envelope: 957 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.591 UTC [msp] DeserializeIdentity -> DEBU 10d5 Obtaining identity" +"2019-09-24 00:25:12.591 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10d6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:12.591 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10d7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.591 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10d8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.591 UTC [policies] Evaluate -> DEBU 10d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:12.591 UTC [policies] Evaluate -> DEBU 10da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:12.591 UTC [policies] Evaluate -> DEBU 10db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:12.591 UTC [cauthdsl] func1 -> DEBU 10dc 0xc003049ba0 gate 1569284712591643800 evaluation starts" +"2019-09-24 00:25:12.591 UTC [cauthdsl] func2 -> DEBU 10dd 0xc003049ba0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.591 UTC [cauthdsl] func2 -> DEBU 10de 0xc003049ba0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.592 UTC [cauthdsl] func2 -> DEBU 10df 0xc003049ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:12.592 UTC [cauthdsl] func2 -> DEBU 10e0 0xc003049ba0 principal evaluation fails" +"2019-09-24 00:25:12.592 UTC [cauthdsl] func1 -> DEBU 10e1 0xc003049ba0 gate 1569284712591643800 evaluation fails" +"2019-09-24 00:25:12.592 UTC [policies] Evaluate -> DEBU 10e2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.592 UTC [policies] Evaluate -> DEBU 10e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.592 UTC [policies] Evaluate -> DEBU 10e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:12.592 UTC [cauthdsl] func1 -> DEBU 10e5 0xc0030d83e0 gate 1569284712592494900 evaluation starts" +"2019-09-24 00:25:12.592 UTC [cauthdsl] func2 -> DEBU 10e6 0xc0030d83e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.592 UTC [cauthdsl] func2 -> DEBU 10e7 0xc0030d83e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.592 UTC [cauthdsl] func2 -> DEBU 10e8 0xc0030d83e0 principal matched by identity 0" +"2019-09-24 00:25:12.592 UTC [msp.identity] Verify -> DEBU 10e9 Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| +00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|" +"2019-09-24 00:25:12.592 UTC [msp.identity] Verify -> DEBU 10ea Verify: sig = 00000000 30 45 02 21 00 d8 3e a2 7e 93 d7 c6 50 21 87 90 |0E.!..>.~...P!..| +00000010 80 ef cf d7 1e a9 ec af 68 ad b0 be 61 dd f9 2a |........h...a..*| +00000020 79 9d 5a ed 8d 02 20 1f 36 68 e4 49 42 43 8e 6e |y.Z... .6h.IBC.n| +00000030 50 93 3d 32 cb 11 f3 43 c3 29 95 32 c5 e7 ec 2a |P.=2...C.).2...*| +00000040 2d 36 2e ee f5 df 11 |-6.....|" +"2019-09-24 00:25:12.593 UTC [cauthdsl] func2 -> DEBU 10eb 0xc0030d83e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:12.593 UTC [cauthdsl] func1 -> DEBU 10ec 0xc0030d83e0 gate 1569284712592494900 evaluation succeeds" +"2019-09-24 00:25:12.593 UTC [policies] Evaluate -> DEBU 10ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.593 UTC [policies] Evaluate -> DEBU 10ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.593 UTC [policies] Evaluate -> DEBU 10ef Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:12.593 UTC [policies] Evaluate -> DEBU 10f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:12.593 UTC [msp] DeserializeIdentity -> DEBU 10f1 Obtaining identity" +"2019-09-24 00:25:12.594 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:12.594 UTC [gossip.pull] HandleMessage -> DEBU 10f3 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2496699800459247914, Envelope: 957 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.594 UTC [msp] DeserializeIdentity -> DEBU 10f4 Obtaining identity" +"2019-09-24 00:25:12.594 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:12.594 UTC [msp] DeserializeIdentity -> DEBU 10f6 Obtaining identity" +"2019-09-24 00:25:12.595 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10f7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:12.595 UTC [gossip.gossip] func2 -> DEBU 10f8 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-09-24 00:25:12.595 UTC [gossip.pull] HandleMessage -> DEBU 10f9 Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 4" +"2019-09-24 00:25:12.596 UTC [gossip.gossip] handleMessage -> DEBU 10fa Exiting" +"2019-09-24 00:25:12.645 UTC [gossip.comm] func1 -> DEBU 10fb Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.646 UTC [gossip.gossip] handleMessage -> DEBU 10fc Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.646 UTC [gossip.gossip] handleMessage -> DEBU 10fd Exiting" +"2019-09-24 00:25:12.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10fe Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.646 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10ff Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:12.646 UTC [msp] DeserializeIdentity -> DEBU 1100 Obtaining identity" +"2019-09-24 00:25:12.647 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1101 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:12.647 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1102 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.647 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1103 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 1104 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 1105 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 1106 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:12.647 UTC [cauthdsl] func1 -> DEBU 1107 0xc0030ef900 gate 1569284712647388000 evaluation starts" +"2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 1108 0xc0030ef900 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 1109 0xc0030ef900 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 110a 0xc0030ef900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 110b 0xc0030ef900 principal evaluation fails" +"2019-09-24 00:25:12.647 UTC [cauthdsl] func1 -> DEBU 110c 0xc0030ef900 gate 1569284712647388000 evaluation fails" +"2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 110d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 110e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:12.647 UTC [policies] Evaluate -> DEBU 110f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:12.647 UTC [cauthdsl] func1 -> DEBU 1110 0xc003112140 gate 1569284712647696800 evaluation starts" +"2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 1111 0xc003112140 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 1112 0xc003112140 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:12.647 UTC [cauthdsl] func2 -> DEBU 1113 0xc003112140 principal matched by identity 0" +"2019-09-24 00:25:12.647 UTC [msp.identity] Verify -> DEBU 1114 Verify: digest = 00000000 cd 7b 68 02 88 eb 7f 8e 4c 83 28 22 fe 83 7e bd |.{h.....L.("..~.| +00000010 f5 3b 8c c1 40 f8 8a b0 54 91 0b b9 7b 0a 80 b2 |.;..@...T...{...|" +"2019-09-24 00:25:12.647 UTC [msp.identity] Verify -> DEBU 1115 Verify: sig = 00000000 30 45 02 21 00 94 ac b6 e1 2a 5b 03 b1 c2 df bf |0E.!.....*[.....| +00000010 dd 65 18 5b 65 34 63 d4 18 84 b6 d3 d9 a5 69 97 |.e.[e4c.......i.| +00000020 b8 ad a2 fe bd 02 20 50 d3 8f 51 db 6c 94 a3 03 |...... P..Q.l...| +00000030 d9 6f 32 a5 96 94 11 85 d3 bb d1 d6 b9 14 19 0a |.o2.............| +00000040 03 09 46 e9 77 5f 8a |..F.w_.|" +"2019-09-24 00:25:12.648 UTC [cauthdsl] func2 -> DEBU 1116 0xc003112140 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:12.648 UTC [cauthdsl] func1 -> DEBU 1117 0xc003112140 gate 1569284712647696800 evaluation succeeds" +"2019-09-24 00:25:12.648 UTC [policies] Evaluate -> DEBU 1118 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.648 UTC [policies] Evaluate -> DEBU 1119 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:12.648 UTC [policies] Evaluate -> DEBU 111a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:12.648 UTC [policies] Evaluate -> DEBU 111b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:12.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 111c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.650 UTC [gossip.comm] func1 -> DEBU 111e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.650 UTC [gossip.gossip] handleMessage -> DEBU 111f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.650 UTC [gossip.pull] HandleMessage -> DEBU 1120 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.650 UTC [msp] DeserializeIdentity -> DEBU 1121 Obtaining identity" +"2019-09-24 00:25:12.650 UTC [msp] DeserializeIdentity -> DEBU 1122 Obtaining identity" +"2019-09-24 00:25:12.650 UTC [msp] DeserializeIdentity -> DEBU 1123 Obtaining identity" +"2019-09-24 00:25:12.650 UTC [msp] DeserializeIdentity -> DEBU 1124 Obtaining identity" +"2019-09-24 00:25:12.651 UTC [msp] DeserializeIdentity -> DEBU 1125 Obtaining identity" +"2019-09-24 00:25:12.652 UTC [msp] DeserializeIdentity -> DEBU 1126 Obtaining identity" +"2019-09-24 00:25:12.652 UTC [gossip.pull] SendDigest -> DEBU 1127 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:12.652 UTC [gossip.gossip] handleMessage -> DEBU 1128 Exiting" +"2019-09-24 00:25:12.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 111d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:12.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 1129 updating membership: timestamp: " +"2019-09-24 00:25:12.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 112a Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:12.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 112b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:12.653 UTC [gossip.discovery] learnExistingMembers -> DEBU 112c Exiting" +"2019-09-24 00:25:12.653 UTC [gossip.discovery] handleAliveMessage -> DEBU 112d Exiting" +"2019-09-24 00:25:12.653 UTC [gossip.discovery] sendMemResponse -> DEBU 112e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:12.653 UTC [msp] DeserializeIdentity -> DEBU 112f Obtaining identity" +"2019-09-24 00:25:12.654 UTC [msp] DeserializeIdentity -> DEBU 1130 Obtaining identity" +"2019-09-24 00:25:12.654 UTC [msp] DeserializeIdentity -> DEBU 1131 Obtaining identity" +"2019-09-24 00:25:12.654 UTC [gossip.comm] Send -> DEBU 1132 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:12.654 UTC [gossip.discovery] sendMemResponse -> DEBU 1133 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\033" signature:"0E\002!\000\277O QdqD\247\217\2661I\365\267lZO\334\316\001\002\215 \031Q\323\237@L\344\327\037\002 4\220\373\306\352\331\317 \2557O~P\226\235\r\364\016\000\0277\211\036|J\261V\323\035\261+\375" > alive: alive: alive: " +"2019-09-24 00:25:12.654 UTC [gossip.comm] sendToEndpoint -> DEBU 1134 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.654 UTC [gossip.comm] sendToEndpoint -> DEBU 1135 Exiting" +"2019-09-24 00:25:12.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1136 Exiting" +"2019-09-24 00:25:12.685 UTC [gossip.comm] func1 -> DEBU 1137 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.685 UTC [gossip.comm] func1 -> DEBU 1138 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.685 UTC [gossip.gossip] handleMessage -> DEBU 1139 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.685 UTC [gossip.gossip] handleMessage -> DEBU 113a Exiting" +"2019-09-24 00:25:12.685 UTC [gossip.gossip] handleMessage -> DEBU 113b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.686 UTC [msp] DeserializeIdentity -> DEBU 113c Obtaining identity" +"2019-09-24 00:25:12.686 UTC [msp] DeserializeIdentity -> DEBU 113d Obtaining identity" +"2019-09-24 00:25:12.686 UTC [gossip.gossip] handleMessage -> DEBU 113e Exiting" +"2019-09-24 00:25:12.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 113f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.686 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1140 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:12.686 UTC [msp.identity] Verify -> DEBU 1141 Verify: digest = 00000000 31 e7 51 83 1b aa 56 6f 44 b9 12 14 3d 96 bd 97 |1.Q...VoD...=...| +00000010 79 fc b6 77 30 be 27 a8 59 56 54 9e fe e2 25 12 |y..w0.'.YVT...%.|" +"2019-09-24 00:25:12.686 UTC [msp.identity] Verify -> DEBU 1142 Verify: sig = 00000000 30 45 02 21 00 f4 81 89 e2 b7 aa b1 40 40 25 68 |0E.!........@@%h| +00000010 93 e7 34 fe d0 a1 14 75 10 9d e3 0c 39 cf f5 69 |..4....u....9..i| +00000020 0c 44 44 ce ec 02 20 5a bf 9c 64 96 5e 46 b3 ef |.DD... Z..d.^F..| +00000030 ef bf 80 d3 f7 30 32 b3 ca ce 69 fd e8 46 9a 07 |.....02...i..F..| +00000040 1e 40 26 c7 dd 53 a6 |.@&..S.|" +"2019-09-24 00:25:12.687 UTC [gossip.discovery] handleAliveMessage -> DEBU 1143 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 1144 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:12.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 1145 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:12.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 1146 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:12.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 1147 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:12.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 1148 Exiting" +"2019-09-24 00:25:12.687 UTC [gossip.discovery] handleAliveMessage -> DEBU 1149 Exiting" +"2019-09-24 00:25:12.687 UTC [gossip.discovery] handleMsgFromComm -> DEBU 114a Exiting" +"2019-09-24 00:25:12.689 UTC [msp] DeserializeIdentity -> DEBU 114b Obtaining identity" +"2019-09-24 00:25:12.690 UTC [msp] DeserializeIdentity -> DEBU 114c Obtaining identity" +"2019-09-24 00:25:12.690 UTC [msp] DeserializeIdentity -> DEBU 114d Obtaining identity" +"2019-09-24 00:25:12.690 UTC [gossip.comm] Send -> DEBU 114e Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:12.691 UTC [msp] DeserializeIdentity -> DEBU 114f Obtaining identity" +"2019-09-24 00:25:12.706 UTC [gossip.comm] Send -> DEBU 1150 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:12.706 UTC [gossip.comm] sendToEndpoint -> DEBU 1151 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.706 UTC [gossip.comm] sendToEndpoint -> DEBU 1152 Exiting" +"2019-09-24 00:25:12.706 UTC [gossip.comm] sendToEndpoint -> DEBU 1153 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.706 UTC [gossip.comm] sendToEndpoint -> DEBU 1154 Exiting" +"2019-09-24 00:25:12.708 UTC [gossip.gossip] handleMessage -> DEBU 1155 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.709 UTC [gossip.gossip] handleMessage -> DEBU 1156 Exiting" +"2019-09-24 00:25:12.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1157 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.720 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1158 Exiting" +"2019-09-24 00:25:12.721 UTC [gossip.comm] func1 -> DEBU 1159 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.723 UTC [gossip.gossip] handleMessage -> DEBU 115a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.724 UTC [gossip.pull] HandleMessage -> DEBU 115b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:12.724 UTC [gossip.pull] SendDigest -> DEBU 115c Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:12.724 UTC [gossip.gossip] handleMessage -> DEBU 115d Exiting" +"2019-09-24 00:25:12.724 UTC [gossip.comm] func1 -> DEBU 115e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.724 UTC [gossip.gossip] handleMessage -> DEBU 115f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.724 UTC [gossip.gossip] handleMessage -> DEBU 1160 Exiting" +"2019-09-24 00:25:12.725 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1161 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:12.725 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1162 Exiting" +"2019-09-24 00:25:13.179 UTC [gossip.gossip] handleMessage -> DEBU 1163 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:13.179 UTC [msp] DeserializeIdentity -> DEBU 1164 Obtaining identity" +"2019-09-24 00:25:13.179 UTC [msp] DeserializeIdentity -> DEBU 1165 Obtaining identity" +"2019-09-24 00:25:13.179 UTC [msp] DeserializeIdentity -> DEBU 1166 Obtaining identity" +"2019-09-24 00:25:13.179 UTC [gossip.gossip] handleMessage -> DEBU 1167 Exiting" +"2019-09-24 00:25:13.671 UTC [gossip.comm] func1 -> DEBU 1168 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:13.671 UTC [gossip.gossip] handleMessage -> DEBU 1169 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:13.671 UTC [gossip.pull] HandleMessage -> DEBU 116a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:13.671 UTC [gossip.pull] SendDigest -> DEBU 116b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:13.671 UTC [gossip.gossip] handleMessage -> DEBU 116c Exiting" +"2019-09-24 00:25:13.688 UTC [gossip.comm] func1 -> DEBU 116d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:13.688 UTC [gossip.gossip] handleMessage -> DEBU 116e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:13.688 UTC [gossip.gossip] handleMessage -> DEBU 116f Exiting" +"2019-09-24 00:25:13.688 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1170 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:13.689 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1171 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:13.689 UTC [msp.identity] Verify -> DEBU 1172 Verify: digest = 00000000 ff 13 c1 de 85 f4 6e 52 51 6e d6 0a a8 2c 1d 6e |......nRQn...,.n| +00000010 2c 29 a2 8d 1f 5b 45 14 3f 5c ba a2 32 54 49 d0 |,)...[E.?\..2TI.|" +"2019-09-24 00:25:13.689 UTC [msp.identity] Verify -> DEBU 1173 Verify: sig = 00000000 30 45 02 21 00 d3 6e e2 b3 04 c6 48 76 12 04 71 |0E.!..n....Hv..q| +00000010 5d bc 29 18 9f 9a 8a a2 e5 35 09 ec bc 11 00 88 |].)......5......| +00000020 c6 b3 b5 00 6d 02 20 3d 43 ab 18 b2 99 42 41 0a |....m. =C....BA.| +00000030 d6 91 af ca 03 94 c0 65 f0 42 86 bc 7d 10 45 86 |.......e.B..}.E.| +00000040 53 7e 1e 2f d7 f6 0e |S~./...|" +"2019-09-24 00:25:13.689 UTC [msp.identity] Verify -> DEBU 1174 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:13.689 UTC [msp.identity] Verify -> DEBU 1175 Verify: sig = 00000000 30 44 02 20 47 9e 87 a0 c5 ce 60 83 10 56 e6 b7 |0D. G.....`..V..| +00000010 06 e8 7e 57 39 29 cc 49 8c ba 6c 76 5c 44 91 43 |..~W9).I..lv\D.C| +00000020 4c 46 76 13 02 20 15 d1 f9 2e f4 d5 81 b7 b4 7b |LFv.. .........{| +00000030 00 ad ec 29 dc 9b 12 93 c3 ae ef 56 d8 21 37 71 |...).......V.!7q| +00000040 7b 5a 1a 97 6d c6 |{Z..m.|" +"2019-09-24 00:25:13.689 UTC [gossip.discovery] handleAliveMessage -> DEBU 1176 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:13.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 1177 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:13.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 1178 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:13.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 1179 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:13.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 117a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:13.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 117b Exiting" +"2019-09-24 00:25:13.689 UTC [gossip.discovery] handleAliveMessage -> DEBU 117c Exiting" +"2019-09-24 00:25:13.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 117d Exiting" +"2019-09-24 00:25:13.690 UTC [gossip.discovery] sendMemResponse -> DEBU 117e Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:13.690 UTC [msp] DeserializeIdentity -> DEBU 117f Obtaining identity" +"2019-09-24 00:25:13.690 UTC [msp] DeserializeIdentity -> DEBU 1180 Obtaining identity" +"2019-09-24 00:25:13.690 UTC [gossip.comm] Send -> DEBU 1181 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:13.690 UTC [gossip.discovery] sendMemResponse -> DEBU 1182 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" secret_envelope: > alive: " +"2019-09-24 00:25:13.690 UTC [gossip.comm] sendToEndpoint -> DEBU 1183 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:13.690 UTC [gossip.comm] sendToEndpoint -> DEBU 1184 Exiting" +"2019-09-24 00:25:13.714 UTC [endorser] ProcessProposal -> DEBU 1185 Entering: request from 172.18.0.9:50674" +"2019-09-24 00:25:13.714 UTC [protoutils] ValidateProposalMessage -> DEBU 1186 ValidateProposalMessage starts for signed proposal 0xc0026dd270" +"2019-09-24 00:25:13.714 UTC [protoutils] validateChannelHeader -> DEBU 1187 validateChannelHeader info: header type 3" +"2019-09-24 00:25:13.714 UTC [protoutils] checkSignatureFromCreator -> DEBU 1188 begin" +"2019-09-24 00:25:13.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 1189 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:25:13.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 118a creator is valid" +"2019-09-24 00:25:13.715 UTC [msp.identity] Verify -> DEBU 118b Verify: digest = 00000000 3b 9d 97 7b 94 27 f2 81 1b 7d 3f df e3 5a d5 a0 |;..{.'...}?..Z..| +00000010 24 f3 61 04 bf 1a e5 93 db 01 24 6e e5 d9 48 1b |$.a.......$n..H.|" +"2019-09-24 00:25:13.715 UTC [msp.identity] Verify -> DEBU 118c Verify: sig = 00000000 30 45 02 21 00 f5 52 83 d0 f8 41 37 9b a3 02 ac |0E.!..R...A7....| +00000010 12 8a 4c af 98 96 18 bd 86 81 68 da 6b 73 79 f3 |..L.......h.ksy.| +00000020 73 74 63 7c 04 02 20 76 7a 40 1a c9 10 e7 54 c1 |stc|.. vz@....T.| +00000030 e6 38 4a 6e bb 70 97 f4 5e 06 f8 0b 57 5b 5d 82 |.8Jn.p..^...W[].| +00000040 f5 ce 05 c0 dc fe 1c |.......|" +"2019-09-24 00:25:13.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 118d exits successfully" +"2019-09-24 00:25:13.715 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 118e validateChaincodeProposalMessage starts for proposal 0xc0004309a0, header 0xc0026dd680" +"2019-09-24 00:25:13.715 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 118f validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 00:25:13.715 UTC [endorser] preProcess -> DEBU 1190 [][4d1e320b] processing txid: 4d1e320b6c28f547581497d8ece9c0ca721f55df4ae7b77e8e6e0eb1a7794add" +"2019-09-24 00:25:13.715 UTC [endorser] SimulateProposal -> DEBU 1191 [][4d1e320b] Entry chaincode: name:"lscc" " +"2019-09-24 00:25:13.715 UTC [endorser] callChaincode -> INFO 1192 [][4d1e320b] Entry chaincode: name:"lscc" " +"2019-09-24 00:25:13.715 UTC [chaincode] Execute -> DEBU 1193 Entry" +"2019-09-24 00:25:13.717 UTC [msp.identity] Verify -> DEBU 1194 Verify: digest = 00000000 3b 9d 97 7b 94 27 f2 81 1b 7d 3f df e3 5a d5 a0 |;..{.'...}?..Z..| +00000010 24 f3 61 04 bf 1a e5 93 db 01 24 6e e5 d9 48 1b |$.a.......$n..H.|" +"2019-09-24 00:25:13.717 UTC [msp.identity] Verify -> DEBU 1195 Verify: sig = 00000000 30 45 02 21 00 f5 52 83 d0 f8 41 37 9b a3 02 ac |0E.!..R...A7....| +00000010 12 8a 4c af 98 96 18 bd 86 81 68 da 6b 73 79 f3 |..L.......h.ksy.| +00000020 73 74 63 7c 04 02 20 76 7a 40 1a c9 10 e7 54 c1 |stc|.. vz@....T.| +00000030 e6 38 4a 6e bb 70 97 f4 5e 06 f8 0b 57 5b 5d 82 |.8Jn.p..^...W[].| +00000040 f5 ce 05 c0 dc fe 1c |.......|" +"2019-09-24 00:25:13.718 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU 1196 Created metadata tar" +"2019-09-24 00:25:13.718 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU 1197 HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)}" +"2019-09-24 00:25:13.718 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU 1198 Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]" +"2019-09-24 00:25:13.718 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1199 constructing new query executor txid = [362bbcc0-c1c0-4a12-8edd-e4defeed28ea]" +"2019-09-24 00:25:13.718 UTC [stateleveldb] GetState -> DEBU 119a GetState(). ns=lscc, key=exp02" +"2019-09-24 00:25:13.718 UTC [lockbasedtxmgr] Done -> DEBU 119b Done with transaction simulation / query execution [362bbcc0-c1c0-4a12-8edd-e4defeed28ea]" +"2019-09-24 00:25:13.718 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU 119c Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts." +"2019-09-24 00:25:13.718 UTC [lscc] executeInstall -> INFO 119d Installed Chaincode [exp02] Version [1.0] to peer" +"2019-09-24 00:25:13.719 UTC [chaincode] handleMessage -> DEBU 119e [4d1e320b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:25:13.719 UTC [chaincode] Notify -> DEBU 119f [4d1e320b] notifying Txid:4d1e320b6c28f547581497d8ece9c0ca721f55df4ae7b77e8e6e0eb1a7794add, channelID:" +"2019-09-24 00:25:13.719 UTC [chaincode] Execute -> DEBU 11a0 Exit" +"2019-09-24 00:25:13.719 UTC [endorser] callChaincode -> INFO 11a1 [][4d1e320b] Exit chaincode: name:"lscc" (4ms)" +"2019-09-24 00:25:13.719 UTC [endorser] SimulateProposal -> DEBU 11a2 [][4d1e320b] Exit" +"2019-09-24 00:25:13.719 UTC [endorser] func1 -> DEBU 11a3 Exit: request from 172.18.0.9:50674" +"2019-09-24 00:25:13.719 UTC [comm.grpc.server] 1 -> INFO 11a4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50674 grpc.code=OK grpc.call_duration=5.143ms +"2019-09-24 00:25:13.725 UTC [grpc] infof -> DEBU 11a5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:13.726 UTC [grpc] warningf -> DEBU 11a6 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:50674: read: connection reset by peer" +"2019-09-24 00:25:13.726 UTC [grpc] infof -> DEBU 11a7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:25:14.115 UTC [gossip.comm] func1 -> DEBU 11a8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:14.115 UTC [gossip.gossip] handleMessage -> DEBU 11a9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:14.116 UTC [msp] DeserializeIdentity -> DEBU 11aa Obtaining identity" +"2019-09-24 00:25:14.116 UTC [msp] DeserializeIdentity -> DEBU 11ab Obtaining identity" +"2019-09-24 00:25:14.116 UTC [msp] DeserializeIdentity -> DEBU 11ac Obtaining identity" +"2019-09-24 00:25:14.116 UTC [gossip.gossip] handleMessage -> DEBU 11ad Exiting" +"2019-09-24 00:25:14.576 UTC [msp] GetDefaultSigningIdentity -> DEBU 11ae Obtaining default signing identity" +"2019-09-24 00:25:14.576 UTC [msp.identity] Sign -> DEBU 11af Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151019 " +"2019-09-24 00:25:14.576 UTC [msp.identity] Sign -> DEBU 11b0 Sign: digest: 6C8D40E36138785034A40F2D5712F65247A24F48E7D03FB6854DC914EC2C9ACD " +"2019-09-24 00:25:14.577 UTC [msp] GetDefaultSigningIdentity -> DEBU 11b1 Obtaining default signing identity" +"2019-09-24 00:25:14.577 UTC [msp.identity] Sign -> DEBU 11b2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:14.577 UTC [msp.identity] Sign -> DEBU 11b3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:14.577 UTC [gossip.discovery] periodicalSendAlive -> DEBU 11b4 Sleeping 5s" +"2019-09-24 00:25:14.582 UTC [msp] DeserializeIdentity -> DEBU 11b5 Obtaining identity" +"2019-09-24 00:25:14.582 UTC [msp] DeserializeIdentity -> DEBU 11b6 Obtaining identity" +"2019-09-24 00:25:14.582 UTC [msp] DeserializeIdentity -> DEBU 11b7 Obtaining identity" +"2019-09-24 00:25:14.582 UTC [gossip.comm] Send -> DEBU 11b8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:14.582 UTC [msp] DeserializeIdentity -> DEBU 11b9 Obtaining identity" +"2019-09-24 00:25:14.582 UTC [gossip.comm] Send -> DEBU 11ba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:14.582 UTC [gossip.comm] Send -> DEBU 11bb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:14.582 UTC [gossip.comm] sendToEndpoint -> DEBU 11bc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:14.582 UTC [gossip.comm] sendToEndpoint -> DEBU 11bd Exiting" +"2019-09-24 00:25:14.582 UTC [gossip.comm] sendToEndpoint -> DEBU 11be Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:14.582 UTC [gossip.comm] sendToEndpoint -> DEBU 11bf Exiting" +"2019-09-24 00:25:14.583 UTC [gossip.comm] sendToEndpoint -> DEBU 11c0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:14.583 UTC [gossip.comm] sendToEndpoint -> DEBU 11c1 Exiting" +"2019-09-24 00:25:14.991 UTC [gossip.gossip] handleMessage -> DEBU 11c2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:14.991 UTC [gossip.gossip] handleMessage -> DEBU 11c3 Exiting" +"2019-09-24 00:25:14.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11c4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:14.991 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11c5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:14.991 UTC [msp] DeserializeIdentity -> DEBU 11c6 Obtaining identity" +"2019-09-24 00:25:14.992 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:14.992 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:14.992 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:14.992 UTC [cauthdsl] func1 -> DEBU 11cd 0xc00320baf0 gate 1569284714992317800 evaluation starts" +"2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11ce 0xc00320baf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11cf 0xc00320baf0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11d0 0xc00320baf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11d1 0xc00320baf0 principal evaluation fails" +"2019-09-24 00:25:14.992 UTC [cauthdsl] func1 -> DEBU 11d2 0xc00320baf0 gate 1569284714992317800 evaluation fails" +"2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11d3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:14.992 UTC [policies] Evaluate -> DEBU 11d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:14.992 UTC [cauthdsl] func1 -> DEBU 11d6 0xc003296330 gate 1569284714992828900 evaluation starts" +"2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11d7 0xc003296330 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11d8 0xc003296330 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:14.992 UTC [cauthdsl] func2 -> DEBU 11d9 0xc003296330 principal matched by identity 0" +"2019-09-24 00:25:14.992 UTC [msp.identity] Verify -> DEBU 11da Verify: digest = 00000000 ca 5d 87 87 a9 8d a9 8f a0 a6 3a 87 7a ef 78 52 |.]........:.z.xR| +00000010 9e 7b 01 82 e6 a9 d8 fb 08 ac ac d8 91 c8 1e 77 |.{.............w|" +"2019-09-24 00:25:14.993 UTC [msp.identity] Verify -> DEBU 11db Verify: sig = 00000000 30 44 02 20 3f 72 1e 31 c6 60 7a ba 61 d3 83 d0 |0D. ?r.1.`z.a...| +00000010 c0 93 d7 79 06 b5 11 2d e5 d4 5e 24 47 a4 b9 3b |...y...-..^$G..;| +00000020 87 2e 8c 93 02 20 07 17 0b 21 7b 82 9d 26 e0 e8 |..... ...!{..&..| +00000030 7e 7c 99 5a 57 79 85 0a b7 ec 14 21 d3 5c e1 94 |~|.ZWy.....!.\..| +00000040 cf 2c 5e 7e e0 d2 |.,^~..|" +"2019-09-24 00:25:14.994 UTC [cauthdsl] func2 -> DEBU 11dc 0xc003296330 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:14.994 UTC [cauthdsl] func1 -> DEBU 11dd 0xc003296330 gate 1569284714992828900 evaluation succeeds" +"2019-09-24 00:25:15.003 UTC [policies] Evaluate -> DEBU 11df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:15.003 UTC [policies] Evaluate -> DEBU 11e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:15.002 UTC [gossip.comm] func1 -> DEBU 11de Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.003 UTC [gossip.gossip] handleMessage -> DEBU 11e1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.009 UTC [policies] Evaluate -> DEBU 11e2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:15.009 UTC [policies] Evaluate -> DEBU 11e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:15.009 UTC [gossip.discovery] handleAliveMessage -> DEBU 11e4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 11e5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:15.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 11e6 updating membership: timestamp: " +"2019-09-24 00:25:15.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 11e7 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:15.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 11e8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:15.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 11e9 Exiting" +"2019-09-24 00:25:15.009 UTC [gossip.discovery] handleAliveMessage -> DEBU 11ea Exiting" +"2019-09-24 00:25:15.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11eb Exiting" +"2019-09-24 00:25:15.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.010 UTC [gossip.gossip] handleMessage -> DEBU 11ed Exiting" +"2019-09-24 00:25:15.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ee Exiting" +"2019-09-24 00:25:15.020 UTC [gossip.comm] func1 -> DEBU 11ef Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.020 UTC [gossip.gossip] handleMessage -> DEBU 11f0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.020 UTC [gossip.gossip] handleMessage -> DEBU 11f1 Exiting" +"2019-09-24 00:25:15.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11f2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11f3 Exiting" +"2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f4 Obtaining identity" +"2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f5 Obtaining identity" +"2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f6 Obtaining identity" +"2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f7 Obtaining identity" +"2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f8 Obtaining identity" +"2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11f9 Obtaining identity" +"2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11fa Obtaining identity" +"2019-09-24 00:25:15.021 UTC [gossip.comm] Send -> DEBU 11fb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:15.021 UTC [msp] DeserializeIdentity -> DEBU 11fc Obtaining identity" +"2019-09-24 00:25:15.021 UTC [gossip.comm] Send -> DEBU 11fd Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:15.021 UTC [gossip.comm] sendToEndpoint -> DEBU 11fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.021 UTC [gossip.comm] sendToEndpoint -> DEBU 11ff Exiting" +"2019-09-24 00:25:15.022 UTC [gossip.comm] sendToEndpoint -> DEBU 1200 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.022 UTC [gossip.comm] sendToEndpoint -> DEBU 1201 Exiting" +"2019-09-24 00:25:15.597 UTC [gossip.pull] Hello -> DEBU 1202 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:15.598 UTC [gossip.comm] Send -> DEBU 1203 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:15.598 UTC [gossip.pull] Hello -> DEBU 1204 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:15.598 UTC [gossip.comm] Send -> DEBU 1205 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:15.598 UTC [gossip.pull] Hello -> DEBU 1206 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:15.598 UTC [gossip.comm] Send -> DEBU 1207 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 1208 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 1209 Exiting" +"2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 120a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 120b Exiting" +"2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 120c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.598 UTC [gossip.comm] sendToEndpoint -> DEBU 120d Exiting" +"2019-09-24 00:25:15.602 UTC [gossip.comm] func1 -> DEBU 120e Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.603 UTC [gossip.gossip] handleMessage -> DEBU 120f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.603 UTC [gossip.pull] HandleMessage -> DEBU 1210 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.603 UTC [gossip.gossip] handleMessage -> DEBU 1211 Exiting" +"2019-09-24 00:25:15.603 UTC [gossip.comm] func1 -> DEBU 1212 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.603 UTC [gossip.gossip] handleMessage -> DEBU 1213 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.603 UTC [gossip.pull] HandleMessage -> DEBU 1214 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.603 UTC [gossip.gossip] handleMessage -> DEBU 1215 Exiting" +"2019-09-24 00:25:15.604 UTC [gossip.gossip] handleMessage -> DEBU 1216 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.604 UTC [gossip.pull] HandleMessage -> DEBU 1217 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.604 UTC [gossip.gossip] handleMessage -> DEBU 1218 Exiting" +"2019-09-24 00:25:15.620 UTC [msp] GetDefaultSigningIdentity -> DEBU 1219 Obtaining default signing identity" +"2019-09-24 00:25:15.620 UTC [msp.identity] Sign -> DEBU 121a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101A " +"2019-09-24 00:25:15.620 UTC [msp.identity] Sign -> DEBU 121b Sign: digest: 1D0062C637380982BD27D65B4096CE84FECBBE536DB7DC6CF166AA08C8CC5712 " +"2019-09-24 00:25:15.621 UTC [msp] GetDefaultSigningIdentity -> DEBU 121c Obtaining default signing identity" +"2019-09-24 00:25:15.621 UTC [msp.identity] Sign -> DEBU 121d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:15.621 UTC [msp.identity] Sign -> DEBU 121e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:15.621 UTC [gossip.comm] Send -> DEBU 121f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:15.621 UTC [msp] DeserializeIdentity -> DEBU 1220 Obtaining identity" +"2019-09-24 00:25:15.621 UTC [gossip.comm] Send -> DEBU 1221 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:15.621 UTC [msp] DeserializeIdentity -> DEBU 1222 Obtaining identity" +"2019-09-24 00:25:15.621 UTC [gossip.comm] Send -> DEBU 1223 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1224 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1225 Exiting" +"2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1226 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1227 Exiting" +"2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1228 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.622 UTC [gossip.comm] sendToEndpoint -> DEBU 1229 Exiting" +"2019-09-24 00:25:15.624 UTC [gossip.comm] func1 -> DEBU 122a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.624 UTC [gossip.gossip] handleMessage -> DEBU 122b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.624 UTC [gossip.gossip] handleMessage -> DEBU 122c Exiting" +"2019-09-24 00:25:15.624 UTC [gossip.discovery] handleMsgFromComm -> DEBU 122d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.624 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 122e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:15.625 UTC [msp.identity] Verify -> DEBU 122f Verify: digest = 00000000 1d 00 62 c6 37 38 09 82 bd 27 d6 5b 40 96 ce 84 |..b.78...'.[@...| +00000010 fe cb be 53 6d b7 dc 6c f1 66 aa 08 c8 cc 57 12 |...Sm..l.f....W.|" +"2019-09-24 00:25:15.625 UTC [msp.identity] Verify -> DEBU 1230 Verify: sig = 00000000 30 45 02 21 00 91 c2 5e 0e 00 50 40 6a 32 a1 ca |0E.!...^..P@j2..| +00000010 b6 a1 b0 28 0b e7 fc 0a a2 0f c3 0c 12 5f e6 78 |...(........._.x| +00000020 be 41 21 eb 4c 02 20 16 d7 c6 49 2b 3c b8 9a d6 |.A!.L. ...I+<...| +00000030 fb bb 44 43 1d 45 d8 ca 01 4f 14 4b 87 08 45 1b |..DC.E...O.K..E.| +00000040 4d 4c ec 83 de 30 06 |ML...0.|" +"2019-09-24 00:25:15.625 UTC [msp.identity] Verify -> DEBU 1231 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:15.625 UTC [msp.identity] Verify -> DEBU 1232 Verify: sig = 00000000 30 45 02 21 00 ef 48 3c 39 1d 4f 9e ba 30 d8 47 |0E.!..H<9.O..0.G| +00000010 0d 4d 33 db db 53 c7 71 0a 02 7b cf 3d ef 7b e5 |.M3..S.q..{.=.{.| +00000020 a5 50 aa 20 cb 02 20 11 9d e4 fd d2 7d a8 c7 23 |.P. .. .....}..#| +00000030 e1 f0 eb 49 8b ca aa 03 39 a4 d9 6d 9e 62 6e 6b |...I....9..m.bnk| +00000040 e0 c5 2b 69 e7 d3 5a |..+i..Z|" +"2019-09-24 00:25:15.625 UTC [gossip.discovery] handleAliveMessage -> DEBU 1233 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:15.625 UTC [gossip.discovery] isSentByMe -> DEBU 1234 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:15.625 UTC [gossip.discovery] handleAliveMessage -> DEBU 1235 Exiting" +"2019-09-24 00:25:15.625 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1236 Exiting" +"2019-09-24 00:25:15.632 UTC [gossip.gossip] handleMessage -> DEBU 1237 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.632 UTC [gossip.gossip] handleMessage -> DEBU 1238 Exiting" +"2019-09-24 00:25:15.632 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1239 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.632 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 123a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:15.632 UTC [msp.identity] Verify -> DEBU 123b Verify: digest = 00000000 1d 00 62 c6 37 38 09 82 bd 27 d6 5b 40 96 ce 84 |..b.78...'.[@...| +00000010 fe cb be 53 6d b7 dc 6c f1 66 aa 08 c8 cc 57 12 |...Sm..l.f....W.|" +"2019-09-24 00:25:15.632 UTC [msp.identity] Verify -> DEBU 123c Verify: sig = 00000000 30 45 02 21 00 91 c2 5e 0e 00 50 40 6a 32 a1 ca |0E.!...^..P@j2..| +00000010 b6 a1 b0 28 0b e7 fc 0a a2 0f c3 0c 12 5f e6 78 |...(........._.x| +00000020 be 41 21 eb 4c 02 20 16 d7 c6 49 2b 3c b8 9a d6 |.A!.L. ...I+<...| +00000030 fb bb 44 43 1d 45 d8 ca 01 4f 14 4b 87 08 45 1b |..DC.E...O.K..E.| +00000040 4d 4c ec 83 de 30 06 |ML...0.|" +"2019-09-24 00:25:15.633 UTC [gossip.discovery] handleAliveMessage -> DEBU 123d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:15.633 UTC [gossip.discovery] isSentByMe -> DEBU 123e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:15.633 UTC [gossip.discovery] handleAliveMessage -> DEBU 123f Exiting" +"2019-09-24 00:25:15.633 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1240 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:15.633 UTC [msp] DeserializeIdentity -> DEBU 1241 Obtaining identity" +"2019-09-24 00:25:15.633 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1242 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:15.633 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1243 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:15.633 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1244 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:15.633 UTC [policies] Evaluate -> DEBU 1245 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:15.633 UTC [policies] Evaluate -> DEBU 1246 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:15.633 UTC [policies] Evaluate -> DEBU 1247 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:15.633 UTC [cauthdsl] func1 -> DEBU 1248 0xc0033412d0 gate 1569284715633748700 evaluation starts" +"2019-09-24 00:25:15.633 UTC [cauthdsl] func2 -> DEBU 1249 0xc0033412d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:15.633 UTC [cauthdsl] func2 -> DEBU 124a 0xc0033412d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:15.633 UTC [cauthdsl] func2 -> DEBU 124b 0xc0033412d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:15.634 UTC [cauthdsl] func2 -> DEBU 124c 0xc0033412d0 principal evaluation fails" +"2019-09-24 00:25:15.634 UTC [cauthdsl] func1 -> DEBU 124d 0xc0033412d0 gate 1569284715633748700 evaluation fails" +"2019-09-24 00:25:15.634 UTC [policies] Evaluate -> DEBU 124e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:15.634 UTC [policies] Evaluate -> DEBU 124f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:15.634 UTC [policies] Evaluate -> DEBU 1250 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:15.634 UTC [cauthdsl] func1 -> DEBU 1251 0xc003341b10 gate 1569284715634216900 evaluation starts" +"2019-09-24 00:25:15.634 UTC [cauthdsl] func2 -> DEBU 1252 0xc003341b10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:15.634 UTC [cauthdsl] func2 -> DEBU 1253 0xc003341b10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:15.634 UTC [cauthdsl] func2 -> DEBU 1254 0xc003341b10 principal matched by identity 0" +"2019-09-24 00:25:15.634 UTC [msp.identity] Verify -> DEBU 1255 Verify: digest = 00000000 cd 7b 68 02 88 eb 7f 8e 4c 83 28 22 fe 83 7e bd |.{h.....L.("..~.| +00000010 f5 3b 8c c1 40 f8 8a b0 54 91 0b b9 7b 0a 80 b2 |.;..@...T...{...|" +"2019-09-24 00:25:15.634 UTC [msp.identity] Verify -> DEBU 1256 Verify: sig = 00000000 30 45 02 21 00 94 ac b6 e1 2a 5b 03 b1 c2 df bf |0E.!.....*[.....| +00000010 dd 65 18 5b 65 34 63 d4 18 84 b6 d3 d9 a5 69 97 |.e.[e4c.......i.| +00000020 b8 ad a2 fe bd 02 20 50 d3 8f 51 db 6c 94 a3 03 |...... P..Q.l...| +00000030 d9 6f 32 a5 96 94 11 85 d3 bb d1 d6 b9 14 19 0a |.o2.............| +00000040 03 09 46 e9 77 5f 8a |..F.w_.|" +"2019-09-24 00:25:15.634 UTC [cauthdsl] func2 -> DEBU 1257 0xc003341b10 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:15.635 UTC [cauthdsl] func1 -> DEBU 1258 0xc003341b10 gate 1569284715634216900 evaluation succeeds" +"2019-09-24 00:25:15.635 UTC [policies] Evaluate -> DEBU 1259 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:15.635 UTC [policies] Evaluate -> DEBU 125a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:15.635 UTC [policies] Evaluate -> DEBU 125b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:15.635 UTC [policies] Evaluate -> DEBU 125c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:15.635 UTC [gossip.discovery] handleAliveMessage -> DEBU 125d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:15.635 UTC [gossip.discovery] handleAliveMessage -> DEBU 125e Exiting" +"2019-09-24 00:25:15.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 125f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:15.635 UTC [msp.identity] Verify -> DEBU 1260 Verify: digest = 00000000 ff 13 c1 de 85 f4 6e 52 51 6e d6 0a a8 2c 1d 6e |......nRQn...,.n| +00000010 2c 29 a2 8d 1f 5b 45 14 3f 5c ba a2 32 54 49 d0 |,)...[E.?\..2TI.|" +"2019-09-24 00:25:15.636 UTC [msp.identity] Verify -> DEBU 1261 Verify: sig = 00000000 30 45 02 21 00 d3 6e e2 b3 04 c6 48 76 12 04 71 |0E.!..n....Hv..q| +00000010 5d bc 29 18 9f 9a 8a a2 e5 35 09 ec bc 11 00 88 |].)......5......| +00000020 c6 b3 b5 00 6d 02 20 3d 43 ab 18 b2 99 42 41 0a |....m. =C....BA.| +00000030 d6 91 af ca 03 94 c0 65 f0 42 86 bc 7d 10 45 86 |.......e.B..}.E.| +00000040 53 7e 1e 2f d7 f6 0e |S~./...|" +"2019-09-24 00:25:15.636 UTC [gossip.discovery] handleAliveMessage -> DEBU 1262 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:15.636 UTC [gossip.discovery] handleAliveMessage -> DEBU 1263 Exiting" +"2019-09-24 00:25:15.636 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1264 Exiting" +"2019-09-24 00:25:15.637 UTC [gossip.comm] func1 -> DEBU 1265 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.637 UTC [gossip.gossip] handleMessage -> DEBU 1266 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.637 UTC [gossip.gossip] handleMessage -> DEBU 1267 Exiting" +"2019-09-24 00:25:15.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1268 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.638 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1269 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:15.638 UTC [msp.identity] Verify -> DEBU 126a Verify: digest = 00000000 1d 00 62 c6 37 38 09 82 bd 27 d6 5b 40 96 ce 84 |..b.78...'.[@...| +00000010 fe cb be 53 6d b7 dc 6c f1 66 aa 08 c8 cc 57 12 |...Sm..l.f....W.|" +"2019-09-24 00:25:15.638 UTC [msp.identity] Verify -> DEBU 126b Verify: sig = 00000000 30 45 02 21 00 91 c2 5e 0e 00 50 40 6a 32 a1 ca |0E.!...^..P@j2..| +00000010 b6 a1 b0 28 0b e7 fc 0a a2 0f c3 0c 12 5f e6 78 |...(........._.x| +00000020 be 41 21 eb 4c 02 20 16 d7 c6 49 2b 3c b8 9a d6 |.A!.L. ...I+<...| +00000030 fb bb 44 43 1d 45 d8 ca 01 4f 14 4b 87 08 45 1b |..DC.E...O.K..E.| +00000040 4d 4c ec 83 de 30 06 |ML...0.|" +"2019-09-24 00:25:15.639 UTC [gossip.discovery] handleAliveMessage -> DEBU 126c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:15.639 UTC [gossip.discovery] isSentByMe -> DEBU 126d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:15.639 UTC [gossip.discovery] handleAliveMessage -> DEBU 126e Exiting" +"2019-09-24 00:25:15.639 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 126f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:15.648 UTC [msp] DeserializeIdentity -> DEBU 1270 Obtaining identity" +"2019-09-24 00:25:15.649 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1271 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:15.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1272 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:15.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1273 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 1274 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 1275 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 1276 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:15.649 UTC [cauthdsl] func1 -> DEBU 1277 0xc0037a6fd0 gate 1569284715649351300 evaluation starts" +"2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 1278 0xc0037a6fd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 1279 0xc0037a6fd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 127a 0xc0037a6fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 127b 0xc0037a6fd0 principal evaluation fails" +"2019-09-24 00:25:15.649 UTC [cauthdsl] func1 -> DEBU 127c 0xc0037a6fd0 gate 1569284715649351300 evaluation fails" +"2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 127d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 127e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:15.649 UTC [policies] Evaluate -> DEBU 127f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:15.649 UTC [cauthdsl] func1 -> DEBU 1280 0xc0037a7820 gate 1569284715649678200 evaluation starts" +"2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 1281 0xc0037a7820 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 1283 0xc0037a7820 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:15.649 UTC [cauthdsl] func2 -> DEBU 1284 0xc0037a7820 principal matched by identity 0" +"2019-09-24 00:25:15.648 UTC [gossip.comm] func1 -> DEBU 1282 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.649 UTC [msp.identity] Verify -> DEBU 1285 Verify: digest = 00000000 75 9a 5a 1c 6f 13 65 e4 9e 0c c8 19 66 6a 08 18 |u.Z.o.e.....fj..| +00000010 2c 7d 7b 62 4b de f7 a8 d9 d1 9e 6a 69 bc fe fe |,}{bK......ji...|" +"2019-09-24 00:25:15.649 UTC [msp.identity] Verify -> DEBU 1286 Verify: sig = 00000000 30 44 02 20 18 ab 91 c4 cd 6f 82 96 04 1a 82 65 |0D. .....o.....e| +00000010 17 d2 20 33 8d ed 42 a6 81 93 ae 85 b7 78 d1 95 |.. 3..B......x..| +00000020 2a 7d 2f 5d 02 20 5a 07 fb 72 58 7f 36 3c 49 86 |*}/]. Z..rX.6 DEBU 1287 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.650 UTC [cauthdsl] func2 -> DEBU 1288 0xc0037a7820 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:15.650 UTC [cauthdsl] func1 -> DEBU 1289 0xc0037a7820 gate 1569284715649678200 evaluation succeeds" +"2019-09-24 00:25:15.650 UTC [policies] Evaluate -> DEBU 128a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:15.650 UTC [policies] Evaluate -> DEBU 128b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:15.650 UTC [policies] Evaluate -> DEBU 128c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:15.650 UTC [policies] Evaluate -> DEBU 128d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:15.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 128e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 128f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:15.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 1290 updating membership: timestamp: " +"2019-09-24 00:25:15.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 1291 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:15.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 1292 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:15.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 1293 Exiting" +"2019-09-24 00:25:15.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 1294 Exiting" +"2019-09-24 00:25:15.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1295 Exiting" +"2019-09-24 00:25:15.650 UTC [gossip.comm] func1 -> DEBU 1296 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1297 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.650 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1298 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:15.650 UTC [msp] DeserializeIdentity -> DEBU 1299 Obtaining identity" +"2019-09-24 00:25:15.651 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 129a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:15.651 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 129b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:15.663 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 129c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:15.663 UTC [policies] Evaluate -> DEBU 129d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:15.663 UTC [policies] Evaluate -> DEBU 129e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:15.663 UTC [policies] Evaluate -> DEBU 129f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:15.663 UTC [cauthdsl] func1 -> DEBU 12a0 0xc0037b9870 gate 1569284715663423900 evaluation starts" +"2019-09-24 00:25:15.663 UTC [cauthdsl] func2 -> DEBU 12a1 0xc0037b9870 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:15.663 UTC [cauthdsl] func2 -> DEBU 12a2 0xc0037b9870 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:15.663 UTC [cauthdsl] func2 -> DEBU 12a3 0xc0037b9870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:15.663 UTC [cauthdsl] func2 -> DEBU 12a4 0xc0037b9870 principal evaluation fails" +"2019-09-24 00:25:15.664 UTC [cauthdsl] func1 -> DEBU 12a5 0xc0037b9870 gate 1569284715663423900 evaluation fails" +"2019-09-24 00:25:15.664 UTC [policies] Evaluate -> DEBU 12a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:15.664 UTC [policies] Evaluate -> DEBU 12a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:15.664 UTC [policies] Evaluate -> DEBU 12a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:15.664 UTC [cauthdsl] func1 -> DEBU 12a9 0xc0037fa0b0 gate 1569284715664455600 evaluation starts" +"2019-09-24 00:25:15.664 UTC [cauthdsl] func2 -> DEBU 12aa 0xc0037fa0b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:15.664 UTC [cauthdsl] func2 -> DEBU 12ab 0xc0037fa0b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:15.664 UTC [cauthdsl] func2 -> DEBU 12ac 0xc0037fa0b0 principal matched by identity 0" +"2019-09-24 00:25:15.664 UTC [msp.identity] Verify -> DEBU 12ad Verify: digest = 00000000 75 9a 5a 1c 6f 13 65 e4 9e 0c c8 19 66 6a 08 18 |u.Z.o.e.....fj..| +00000010 2c 7d 7b 62 4b de f7 a8 d9 d1 9e 6a 69 bc fe fe |,}{bK......ji...|" +"2019-09-24 00:25:15.664 UTC [msp.identity] Verify -> DEBU 12ae Verify: sig = 00000000 30 44 02 20 18 ab 91 c4 cd 6f 82 96 04 1a 82 65 |0D. .....o.....e| +00000010 17 d2 20 33 8d ed 42 a6 81 93 ae 85 b7 78 d1 95 |.. 3..B......x..| +00000020 2a 7d 2f 5d 02 20 5a 07 fb 72 58 7f 36 3c 49 86 |*}/]. Z..rX.6 DEBU 12af 0xc0037fa0b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:15.664 UTC [cauthdsl] func1 -> DEBU 12b0 0xc0037fa0b0 gate 1569284715664455600 evaluation succeeds" +"2019-09-24 00:25:15.665 UTC [policies] Evaluate -> DEBU 12b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:15.665 UTC [policies] Evaluate -> DEBU 12b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:15.665 UTC [policies] Evaluate -> DEBU 12b3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:15.665 UTC [policies] Evaluate -> DEBU 12b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:15.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 12b5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 12b6 Exiting" +"2019-09-24 00:25:15.665 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12b7 Exiting" +"2019-09-24 00:25:15.665 UTC [gossip.gossip] handleMessage -> DEBU 12b8 Exiting" +"2019-09-24 00:25:15.665 UTC [gossip.gossip] handleMessage -> DEBU 12b9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.666 UTC [gossip.gossip] handleMessage -> DEBU 12ba Exiting" +"2019-09-24 00:25:15.666 UTC [gossip.gossip] handleMessage -> DEBU 12bb Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12bc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12bd Exiting" +"2019-09-24 00:25:15.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12be Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12bf Exiting" +"2019-09-24 00:25:15.666 UTC [gossip.gossip] handleMessage -> DEBU 12c0 Exiting" +"2019-09-24 00:25:15.668 UTC [msp] DeserializeIdentity -> DEBU 12c1 Obtaining identity" +"2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c2 Obtaining identity" +"2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c3 Obtaining identity" +"2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c4 Obtaining identity" +"2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c5 Obtaining identity" +"2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c6 Obtaining identity" +"2019-09-24 00:25:15.669 UTC [msp] DeserializeIdentity -> DEBU 12c7 Obtaining identity" +"2019-09-24 00:25:15.669 UTC [gossip.comm] Send -> DEBU 12c8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:15.670 UTC [msp] DeserializeIdentity -> DEBU 12c9 Obtaining identity" +"2019-09-24 00:25:15.676 UTC [msp] DeserializeIdentity -> DEBU 12ca Obtaining identity" +"2019-09-24 00:25:15.677 UTC [gossip.comm] Send -> DEBU 12cb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:15.688 UTC [gossip.comm] sendToEndpoint -> DEBU 12cc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.688 UTC [gossip.comm] sendToEndpoint -> DEBU 12cd Exiting" +"2019-09-24 00:25:15.689 UTC [gossip.comm] sendToEndpoint -> DEBU 12ce Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.689 UTC [gossip.comm] sendToEndpoint -> DEBU 12cf Exiting" +"2019-09-24 00:25:15.958 UTC [gossip.gossip] handleMessage -> DEBU 12d0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.958 UTC [gossip.pull] HandleMessage -> DEBU 12d1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d2 Obtaining identity" +"2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d3 Obtaining identity" +"2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d4 Obtaining identity" +"2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d5 Obtaining identity" +"2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d6 Obtaining identity" +"2019-09-24 00:25:15.958 UTC [msp] DeserializeIdentity -> DEBU 12d7 Obtaining identity" +"2019-09-24 00:25:15.958 UTC [gossip.pull] SendDigest -> DEBU 12d8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:15.958 UTC [gossip.gossip] handleMessage -> DEBU 12d9 Exiting" +"2019-09-24 00:25:15.971 UTC [gossip.gossip] handleMessage -> DEBU 12da Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.972 UTC [gossip.gossip] handleMessage -> DEBU 12db Exiting" +"2019-09-24 00:25:15.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12dc Got message: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.972 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 12dd Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:15.972 UTC [msp] DeserializeIdentity -> DEBU 12de Obtaining identity" +"2019-09-24 00:25:15.972 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:15.972 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12e0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:15.972 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12e1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:15.972 UTC [cauthdsl] func1 -> DEBU 12e5 0xc0038355d0 gate 1569284715972567800 evaluation starts" +"2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12e6 0xc0038355d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12e7 0xc0038355d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12e8 0xc0038355d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12e9 0xc0038355d0 principal evaluation fails" +"2019-09-24 00:25:15.972 UTC [cauthdsl] func1 -> DEBU 12ea 0xc0038355d0 gate 1569284715972567800 evaluation fails" +"2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12eb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:15.972 UTC [policies] Evaluate -> DEBU 12ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:15.972 UTC [cauthdsl] func1 -> DEBU 12ee 0xc003835e20 gate 1569284715972904800 evaluation starts" +"2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12ef 0xc003835e20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:15.972 UTC [cauthdsl] func2 -> DEBU 12f0 0xc003835e20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:15.973 UTC [cauthdsl] func2 -> DEBU 12f1 0xc003835e20 principal matched by identity 0" +"2019-09-24 00:25:15.973 UTC [msp.identity] Verify -> DEBU 12f2 Verify: digest = 00000000 c0 a2 c7 f3 29 34 1e 7e a3 e8 cc 14 e1 74 3f 79 |....)4.~.....t?y| +00000010 7a 26 e4 fa 20 24 d3 62 60 75 69 95 b0 14 53 c1 |z&.. $.b`ui...S.|" +"2019-09-24 00:25:15.973 UTC [msp.identity] Verify -> DEBU 12f3 Verify: sig = 00000000 30 44 02 20 7d 35 a7 c8 81 d1 aa f7 ec 07 60 53 |0D. }5........`S| +00000010 15 1b 7f 69 ee 05 07 75 b8 bf ac 63 fd 48 cc 89 |...i...u...c.H..| +00000020 36 d1 49 f2 02 20 70 49 01 99 e4 82 d8 de c1 ba |6.I.. pI........| +00000030 22 e5 3a 80 1d ba df 50 40 40 17 68 a2 17 b9 06 |".:....P@@.h....| +00000040 06 a5 bb c8 60 3e |....`>|" +"2019-09-24 00:25:15.973 UTC [cauthdsl] func2 -> DEBU 12f4 0xc003835e20 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:15.973 UTC [cauthdsl] func1 -> DEBU 12f5 0xc003835e20 gate 1569284715972904800 evaluation succeeds" +"2019-09-24 00:25:15.973 UTC [policies] Evaluate -> DEBU 12f6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:15.973 UTC [policies] Evaluate -> DEBU 12f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:15.973 UTC [policies] Evaluate -> DEBU 12f8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:15.973 UTC [policies] Evaluate -> DEBU 12f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:15.973 UTC [gossip.discovery] handleAliveMessage -> DEBU 12fa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:15.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 12fb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:15.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 12fc updating membership: timestamp: " +"2019-09-24 00:25:15.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 12fd Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:15.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 12fe Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:15.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 12ff Exiting" +"2019-09-24 00:25:15.973 UTC [gossip.discovery] handleAliveMessage -> DEBU 1300 Exiting" +"2019-09-24 00:25:15.973 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1301 Exiting" +"2019-09-24 00:25:15.973 UTC [gossip.discovery] sendMemResponse -> DEBU 1302 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:15.974 UTC [msp] DeserializeIdentity -> DEBU 1303 Obtaining identity" +"2019-09-24 00:25:15.974 UTC [msp] DeserializeIdentity -> DEBU 1304 Obtaining identity" +"2019-09-24 00:25:15.974 UTC [msp] DeserializeIdentity -> DEBU 1305 Obtaining identity" +"2019-09-24 00:25:15.974 UTC [gossip.comm] Send -> DEBU 1306 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:15.974 UTC [gossip.discovery] sendMemResponse -> DEBU 1307 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" > alive: alive:" > alive: " +"2019-09-24 00:25:15.974 UTC [gossip.comm] sendToEndpoint -> DEBU 1308 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:15.974 UTC [gossip.comm] sendToEndpoint -> DEBU 1309 Exiting" +"2019-09-24 00:25:16.190 UTC [msp] DeserializeIdentity -> DEBU 130a Obtaining identity" +"2019-09-24 00:25:16.190 UTC [msp] DeserializeIdentity -> DEBU 130b Obtaining identity" +"2019-09-24 00:25:16.190 UTC [gossip.comm] Send -> DEBU 130c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 130d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 130e Exiting" +"2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 130f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1310 Exiting" +"2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1311 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1312 Exiting" +"2019-09-24 00:25:16.195 UTC [gossip.comm] func1 -> DEBU 1313 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.202 UTC [gossip.gossip] handleMessage -> DEBU 1314 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.202 UTC [msp] DeserializeIdentity -> DEBU 1315 Obtaining identity" +"2019-09-24 00:25:16.202 UTC [msp] DeserializeIdentity -> DEBU 1316 Obtaining identity" +"2019-09-24 00:25:16.202 UTC [msp] DeserializeIdentity -> DEBU 1317 Obtaining identity" +"2019-09-24 00:25:16.202 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1318 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:16.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1319 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.202 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 131a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 131b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 131c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 131d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:16.203 UTC [cauthdsl] func1 -> DEBU 131e 0xc0039051b0 gate 1569284716203281800 evaluation starts" +"2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 131f 0xc0039051b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 1320 0xc0039051b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 1321 0xc0039051b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 1322 0xc0039051b0 principal evaluation fails" +"2019-09-24 00:25:16.203 UTC [cauthdsl] func1 -> DEBU 1323 0xc0039051b0 gate 1569284716203281800 evaluation fails" +"2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 1324 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 1325 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.203 UTC [policies] Evaluate -> DEBU 1326 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:16.203 UTC [cauthdsl] func1 -> DEBU 1327 0xc0039059f0 gate 1569284716203704200 evaluation starts" +"2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 1328 0xc0039059f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.203 UTC [cauthdsl] func2 -> DEBU 1329 0xc0039059f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.204 UTC [cauthdsl] func2 -> DEBU 132a 0xc0039059f0 principal matched by identity 0" +"2019-09-24 00:25:16.204 UTC [msp.identity] Verify -> DEBU 132b Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:16.204 UTC [msp.identity] Verify -> DEBU 132c Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:16.204 UTC [cauthdsl] func2 -> DEBU 132d 0xc0039059f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:16.204 UTC [cauthdsl] func1 -> DEBU 132e 0xc0039059f0 gate 1569284716203704200 evaluation succeeds" +"2019-09-24 00:25:16.204 UTC [policies] Evaluate -> DEBU 132f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.205 UTC [policies] Evaluate -> DEBU 1330 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.205 UTC [policies] Evaluate -> DEBU 1331 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:16.205 UTC [policies] Evaluate -> DEBU 1332 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:16.206 UTC [msp.identity] Verify -> DEBU 1333 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:16.206 UTC [msp.identity] Verify -> DEBU 1334 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:16.207 UTC [msp] DeserializeIdentity -> DEBU 1335 Obtaining identity" +"2019-09-24 00:25:16.207 UTC [msp] DeserializeIdentity -> DEBU 1336 Obtaining identity" +"2019-09-24 00:25:16.207 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1337 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:16.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1338 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1339 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.207 UTC [policies] Evaluate -> DEBU 133a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:16.207 UTC [policies] Evaluate -> DEBU 133b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:16.207 UTC [policies] Evaluate -> DEBU 133c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:16.208 UTC [cauthdsl] func1 -> DEBU 133d 0xc0039198f0 gate 1569284716208155300 evaluation starts" +"2019-09-24 00:25:16.208 UTC [cauthdsl] func2 -> DEBU 133e 0xc0039198f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.208 UTC [cauthdsl] func2 -> DEBU 133f 0xc0039198f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.208 UTC [cauthdsl] func2 -> DEBU 1340 0xc0039198f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:16.208 UTC [cauthdsl] func2 -> DEBU 1341 0xc0039198f0 principal evaluation fails" +"2019-09-24 00:25:16.208 UTC [cauthdsl] func1 -> DEBU 1342 0xc0039198f0 gate 1569284716208155300 evaluation fails" +"2019-09-24 00:25:16.208 UTC [policies] Evaluate -> DEBU 1343 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.225 UTC [policies] Evaluate -> DEBU 1344 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.225 UTC [policies] Evaluate -> DEBU 1345 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:16.225 UTC [cauthdsl] func1 -> DEBU 1346 0xc00393e130 gate 1569284716225687600 evaluation starts" +"2019-09-24 00:25:16.225 UTC [cauthdsl] func2 -> DEBU 1347 0xc00393e130 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.225 UTC [cauthdsl] func2 -> DEBU 1348 0xc00393e130 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.226 UTC [cauthdsl] func2 -> DEBU 1349 0xc00393e130 principal matched by identity 0" +"2019-09-24 00:25:16.226 UTC [msp.identity] Verify -> DEBU 134a Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:16.227 UTC [msp.identity] Verify -> DEBU 134b Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:16.228 UTC [cauthdsl] func2 -> DEBU 134c 0xc00393e130 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:16.228 UTC [cauthdsl] func1 -> DEBU 134d 0xc00393e130 gate 1569284716225687600 evaluation succeeds" +"2019-09-24 00:25:16.229 UTC [policies] Evaluate -> DEBU 134e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.229 UTC [policies] Evaluate -> DEBU 134f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.229 UTC [policies] Evaluate -> DEBU 1350 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:16.230 UTC [policies] Evaluate -> DEBU 1351 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:16.234 UTC [gossip.comm] func1 -> DEBU 1352 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 551 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.236 UTC [msp.identity] Verify -> DEBU 1353 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:16.256 UTC [msp.identity] Verify -> DEBU 1354 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:16.256 UTC [gossip.gossip] handleMessage -> DEBU 1355 Exiting" +"2019-09-24 00:25:16.257 UTC [gossip.gossip] handleMessage -> DEBU 1356 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.257 UTC [msp] DeserializeIdentity -> DEBU 1357 Obtaining identity" +"2019-09-24 00:25:16.257 UTC [msp] DeserializeIdentity -> DEBU 1358 Obtaining identity" +"2019-09-24 00:25:16.257 UTC [msp] DeserializeIdentity -> DEBU 1359 Obtaining identity" +"2019-09-24 00:25:16.257 UTC [msp] DeserializeIdentity -> DEBU 135a Obtaining identity" +"2019-09-24 00:25:16.257 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 135b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:16.257 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 135c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.257 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 135d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.257 UTC [msp] DeserializeIdentity -> DEBU 135e Obtaining identity" +"2019-09-24 00:25:16.257 UTC [policies] Evaluate -> DEBU 135f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:16.258 UTC [policies] Evaluate -> DEBU 1360 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:16.258 UTC [policies] Evaluate -> DEBU 1361 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:16.258 UTC [gossip.pull] Hello -> DEBU 1362 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func1 -> DEBU 1363 0xc003a14d00 gate 1569284716258093500 evaluation starts" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 1364 0xc003a14d00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 1365 0xc003a14d00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 1366 0xc003a14d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 1367 0xc003a14d00 principal evaluation fails" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func1 -> DEBU 1368 0xc003a14d00 gate 1569284716258093500 evaluation fails" +"2019-09-24 00:25:16.258 UTC [policies] Evaluate -> DEBU 1369 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.258 UTC [policies] Evaluate -> DEBU 136a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.258 UTC [policies] Evaluate -> DEBU 136b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func1 -> DEBU 136c 0xc003a15540 gate 1569284716258464700 evaluation starts" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 136d 0xc003a15540 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 136e 0xc003a15540 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 136f 0xc003a15540 principal matched by identity 0" +"2019-09-24 00:25:16.258 UTC [msp.identity] Verify -> DEBU 1370 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:16.258 UTC [msp.identity] Verify -> DEBU 1371 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func2 -> DEBU 1372 0xc003a15540 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:16.258 UTC [cauthdsl] func1 -> DEBU 1373 0xc003a15540 gate 1569284716258464700 evaluation succeeds" +"2019-09-24 00:25:16.259 UTC [policies] Evaluate -> DEBU 1374 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.259 UTC [policies] Evaluate -> DEBU 1375 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.259 UTC [policies] Evaluate -> DEBU 1376 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:16.259 UTC [policies] Evaluate -> DEBU 1377 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:16.259 UTC [msp.identity] Verify -> DEBU 1378 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:16.259 UTC [msp.identity] Verify -> DEBU 1379 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:16.259 UTC [msp.identity] Verify -> DEBU 137a Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:16.259 UTC [msp.identity] Verify -> DEBU 137b Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:16.260 UTC [msp] DeserializeIdentity -> DEBU 137c Obtaining identity" +"2019-09-24 00:25:16.260 UTC [msp] DeserializeIdentity -> DEBU 137d Obtaining identity" +"2019-09-24 00:25:16.260 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 137e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:16.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1380 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 1381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 1382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 1383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:16.260 UTC [cauthdsl] func1 -> DEBU 1384 0xc003a61b60 gate 1569284716260501100 evaluation starts" +"2019-09-24 00:25:16.260 UTC [cauthdsl] func2 -> DEBU 1385 0xc003a61b60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.260 UTC [cauthdsl] func2 -> DEBU 1386 0xc003a61b60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.260 UTC [cauthdsl] func2 -> DEBU 1387 0xc003a61b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:16.260 UTC [cauthdsl] func2 -> DEBU 1388 0xc003a61b60 principal evaluation fails" +"2019-09-24 00:25:16.260 UTC [cauthdsl] func1 -> DEBU 1389 0xc003a61b60 gate 1569284716260501100 evaluation fails" +"2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 138a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 138b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.260 UTC [policies] Evaluate -> DEBU 138c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:16.260 UTC [cauthdsl] func1 -> DEBU 138d 0xc003a743d0 gate 1569284716260893600 evaluation starts" +"2019-09-24 00:25:16.260 UTC [cauthdsl] func2 -> DEBU 138e 0xc003a743d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.261 UTC [cauthdsl] func2 -> DEBU 138f 0xc003a743d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.261 UTC [cauthdsl] func2 -> DEBU 1390 0xc003a743d0 principal matched by identity 0" +"2019-09-24 00:25:16.261 UTC [msp.identity] Verify -> DEBU 1391 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:16.274 UTC [msp.identity] Verify -> DEBU 1393 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:16.263 UTC [msp] DeserializeIdentity -> DEBU 1392 Obtaining identity" +"2019-09-24 00:25:16.278 UTC [msp] DeserializeIdentity -> DEBU 1394 Obtaining identity" +"2019-09-24 00:25:16.279 UTC [gossip.comm] Send -> DEBU 1395 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:16.279 UTC [gossip.comm] sendToEndpoint -> DEBU 1396 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.280 UTC [gossip.comm] sendToEndpoint -> DEBU 1397 Exiting" +"2019-09-24 00:25:16.287 UTC [gossip.comm] func1 -> DEBU 1398 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.314 UTC [cauthdsl] func2 -> DEBU 1399 0xc003a743d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:16.314 UTC [cauthdsl] func1 -> DEBU 139a 0xc003a743d0 gate 1569284716260893600 evaluation succeeds" +"2019-09-24 00:25:16.314 UTC [policies] Evaluate -> DEBU 139b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.315 UTC [policies] Evaluate -> DEBU 139c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.315 UTC [policies] Evaluate -> DEBU 139d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:16.315 UTC [policies] Evaluate -> DEBU 139e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:16.315 UTC [gossip.gossip] handleMessage -> DEBU 139f Exiting" +"2019-09-24 00:25:16.315 UTC [gossip.gossip] handleMessage -> DEBU 13a0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 551 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.316 UTC [msp.identity] Verify -> DEBU 13a1 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:16.316 UTC [msp.identity] Verify -> DEBU 13a2 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:16.316 UTC [msp.identity] Verify -> DEBU 13a3 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:16.316 UTC [msp.identity] Verify -> DEBU 13a4 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:16.317 UTC [msp] DeserializeIdentity -> DEBU 13a5 Obtaining identity" +"2019-09-24 00:25:16.317 UTC [msp] DeserializeIdentity -> DEBU 13a6 Obtaining identity" +"2019-09-24 00:25:16.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:16.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13a8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13a9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:16.318 UTC [cauthdsl] func1 -> DEBU 13ad 0xc003a89450 gate 1569284716318351000 evaluation starts" +"2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13ae 0xc003a89450 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13af 0xc003a89450 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13b0 0xc003a89450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13b1 0xc003a89450 principal evaluation fails" +"2019-09-24 00:25:16.318 UTC [cauthdsl] func1 -> DEBU 13b2 0xc003a89450 gate 1569284716318351000 evaluation fails" +"2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.318 UTC [policies] Evaluate -> DEBU 13b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:16.318 UTC [cauthdsl] func1 -> DEBU 13b6 0xc003a89dc0 gate 1569284716318673900 evaluation starts" +"2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13b7 0xc003a89dc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13b8 0xc003a89dc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.318 UTC [cauthdsl] func2 -> DEBU 13b9 0xc003a89dc0 principal matched by identity 0" +"2019-09-24 00:25:16.318 UTC [msp.identity] Verify -> DEBU 13ba Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:16.318 UTC [msp.identity] Verify -> DEBU 13bb Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:16.319 UTC [cauthdsl] func2 -> DEBU 13bc 0xc003a89dc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:16.319 UTC [cauthdsl] func1 -> DEBU 13bd 0xc003a89dc0 gate 1569284716318673900 evaluation succeeds" +"2019-09-24 00:25:16.319 UTC [policies] Evaluate -> DEBU 13be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.319 UTC [policies] Evaluate -> DEBU 13bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.319 UTC [policies] Evaluate -> DEBU 13c0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:16.319 UTC [policies] Evaluate -> DEBU 13c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:16.319 UTC [gossip.gossip] handleMessage -> DEBU 13c2 Exiting" +"2019-09-24 00:25:16.319 UTC [gossip.gossip] handleMessage -> DEBU 13c3 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.319 UTC [gossip.pull] HandleMessage -> DEBU 13c4 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.319 UTC [gossip.gossip] handleMessage -> DEBU 13c5 Exiting" +"2019-09-24 00:25:16.651 UTC [gossip.comm] func1 -> DEBU 13c6 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.651 UTC [gossip.gossip] handleMessage -> DEBU 13c7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.651 UTC [gossip.gossip] handleMessage -> DEBU 13c8 Exiting" +"2019-09-24 00:25:16.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13c9 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.651 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13ca Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:16.651 UTC [msp] DeserializeIdentity -> DEBU 13cb Obtaining identity" +"2019-09-24 00:25:16.651 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:16.651 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13cd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.651 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13ce Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:16.651 UTC [policies] Evaluate -> DEBU 13cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func1 -> DEBU 13d2 0xc003aa3e00 gate 1569284716652060700 evaluation starts" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13d3 0xc003aa3e00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13d4 0xc003aa3e00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13d5 0xc003aa3e00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13d6 0xc003aa3e00 principal evaluation fails" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func1 -> DEBU 13d7 0xc003aa3e00 gate 1569284716652060700 evaluation fails" +"2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func1 -> DEBU 13db 0xc003ac0770 gate 1569284716652342000 evaluation starts" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13dc 0xc003ac0770 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13dd 0xc003ac0770 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13de 0xc003ac0770 principal matched by identity 0" +"2019-09-24 00:25:16.652 UTC [msp.identity] Verify -> DEBU 13df Verify: digest = 00000000 8a d7 3f 3a 8d eb e3 c4 2e 78 77 f9 3d db 88 04 |..?:.....xw.=...| +00000010 bb 87 aa 8a 7b 07 b5 24 d0 ed 35 2b 80 c3 8b 08 |....{..$..5+....|" +"2019-09-24 00:25:16.652 UTC [msp.identity] Verify -> DEBU 13e0 Verify: sig = 00000000 30 45 02 21 00 d6 e6 c3 48 7a 09 90 e3 a3 ed ba |0E.!....Hz......| +00000010 30 e6 d2 9b 58 e1 bd ba 70 6d cb 0b 1c d2 4b ac |0...X...pm....K.| +00000020 d1 7b 90 f7 ba 02 20 0e 8d d0 96 d6 89 99 b8 51 |.{.... ........Q| +00000030 4c 3b 7e 0a 6d df fc 09 1d 78 11 d9 f3 57 61 3f |L;~.m....x...Wa?| +00000040 64 ed 89 86 71 bb de |d...q..|" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func2 -> DEBU 13e1 0xc003ac0770 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:16.652 UTC [cauthdsl] func1 -> DEBU 13e2 0xc003ac0770 gate 1569284716652342000 evaluation succeeds" +"2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13e5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:16.652 UTC [policies] Evaluate -> DEBU 13e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:16.652 UTC [gossip.discovery] handleAliveMessage -> DEBU 13e7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:16.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 13e8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:16.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 13e9 updating membership: timestamp: " +"2019-09-24 00:25:16.653 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ea Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:16.653 UTC [gossip.discovery] learnExistingMembers -> DEBU 13eb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:16.653 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ec Exiting" +"2019-09-24 00:25:16.653 UTC [gossip.discovery] handleAliveMessage -> DEBU 13ed Exiting" +"2019-09-24 00:25:16.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13ee Exiting" +"2019-09-24 00:25:16.653 UTC [gossip.discovery] sendMemResponse -> DEBU 13ef Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:16.653 UTC [msp] DeserializeIdentity -> DEBU 13f0 Obtaining identity" +"2019-09-24 00:25:16.653 UTC [msp] DeserializeIdentity -> DEBU 13f1 Obtaining identity" +"2019-09-24 00:25:16.653 UTC [msp] DeserializeIdentity -> DEBU 13f2 Obtaining identity" +"2019-09-24 00:25:16.653 UTC [gossip.comm] Send -> DEBU 13f3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:16.653 UTC [gossip.discovery] sendMemResponse -> DEBU 13f4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\035" signature:"0E\002!\000\323n\342\263\004\306Hv\022\004q]\274)\030\237\232\212\242\3455\t\354\274\021\000\210\306\263\265\000m\002 =C\253\030\262\231BA\n\326\221\257\312\003\224\300e\360B\206\274}\020E\206S~\036/\327\366\016" > alive: alive:" > alive: " +"2019-09-24 00:25:16.653 UTC [gossip.comm] sendToEndpoint -> DEBU 13f5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.653 UTC [gossip.comm] sendToEndpoint -> DEBU 13f6 Exiting" +"2019-09-24 00:25:16.662 UTC [gossip.comm] func1 -> DEBU 13f7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.662 UTC [gossip.gossip] handleMessage -> DEBU 13f8 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.662 UTC [gossip.pull] HandleMessage -> DEBU 13f9 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.662 UTC [msp] DeserializeIdentity -> DEBU 13fa Obtaining identity" +"2019-09-24 00:25:16.662 UTC [msp] DeserializeIdentity -> DEBU 13fb Obtaining identity" +"2019-09-24 00:25:16.662 UTC [msp] DeserializeIdentity -> DEBU 13fc Obtaining identity" +"2019-09-24 00:25:16.663 UTC [msp] DeserializeIdentity -> DEBU 13fd Obtaining identity" +"2019-09-24 00:25:16.663 UTC [msp] DeserializeIdentity -> DEBU 13fe Obtaining identity" +"2019-09-24 00:25:16.663 UTC [msp] DeserializeIdentity -> DEBU 13ff Obtaining identity" +"2019-09-24 00:25:16.663 UTC [gossip.pull] SendDigest -> DEBU 1400 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:16.663 UTC [gossip.gossip] handleMessage -> DEBU 1401 Exiting" +"2019-09-24 00:25:16.686 UTC [gossip.comm] func1 -> DEBU 1402 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.687 UTC [gossip.gossip] handleMessage -> DEBU 1403 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.687 UTC [msp] DeserializeIdentity -> DEBU 1404 Obtaining identity" +"2019-09-24 00:25:16.687 UTC [msp] DeserializeIdentity -> DEBU 1405 Obtaining identity" +"2019-09-24 00:25:16.687 UTC [gossip.gossip] handleMessage -> DEBU 1406 Exiting" +"2019-09-24 00:25:16.710 UTC [gossip.comm] func1 -> DEBU 1407 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.710 UTC [gossip.gossip] handleMessage -> DEBU 1408 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.710 UTC [gossip.pull] HandleMessage -> DEBU 1409 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:16.710 UTC [gossip.pull] SendDigest -> DEBU 140a Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:16.710 UTC [gossip.gossip] handleMessage -> DEBU 140b Exiting" +"2019-09-24 00:25:17.180 UTC [gossip.gossip] handleMessage -> DEBU 140c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:17.180 UTC [msp] DeserializeIdentity -> DEBU 140d Obtaining identity" +"2019-09-24 00:25:17.180 UTC [msp] DeserializeIdentity -> DEBU 140e Obtaining identity" +"2019-09-24 00:25:17.180 UTC [msp] DeserializeIdentity -> DEBU 140f Obtaining identity" +"2019-09-24 00:25:17.180 UTC [gossip.gossip] handleMessage -> DEBU 1410 Exiting" +"2019-09-24 00:25:17.275 UTC [gossip.election] waitForInterrupt -> DEBU 1411 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:17.275 UTC [gossip.election] IsLeader -> DEBU 1412 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:25:17.275 UTC [msp] GetDefaultSigningIdentity -> DEBU 1413 Obtaining default signing identity" +"2019-09-24 00:25:17.275 UTC [msp.identity] Sign -> DEBU 1414 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510051801 " +"2019-09-24 00:25:17.275 UTC [msp.identity] Sign -> DEBU 1415 Sign: digest: 27ADD916187E2745B9907F0FC6A73630D7748F5BB95D99A0B81888084EA1AB11 " +"2019-09-24 00:25:17.275 UTC [gossip.election] waitForInterrupt -> DEBU 1416 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 1417 Obtaining identity" +"2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 1418 Obtaining identity" +"2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 1419 Obtaining identity" +"2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 141a Obtaining identity" +"2019-09-24 00:25:17.284 UTC [gossip.comm] Send -> DEBU 141b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 141c Obtaining identity" +"2019-09-24 00:25:17.284 UTC [msp] DeserializeIdentity -> DEBU 141d Obtaining identity" +"2019-09-24 00:25:17.284 UTC [gossip.comm] sendToEndpoint -> DEBU 141e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:25:17.284 UTC [gossip.comm] sendToEndpoint -> DEBU 141f Exiting" +"2019-09-24 00:25:17.674 UTC [gossip.comm] func1 -> DEBU 1420 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:17.674 UTC [gossip.gossip] handleMessage -> DEBU 1421 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:17.674 UTC [gossip.pull] HandleMessage -> DEBU 1422 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:17.674 UTC [gossip.pull] SendDigest -> DEBU 1423 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:17.674 UTC [gossip.gossip] handleMessage -> DEBU 1424 Exiting" +"2019-09-24 00:25:17.691 UTC [gossip.comm] func1 -> DEBU 1425 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:17.691 UTC [gossip.gossip] handleMessage -> DEBU 1426 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:17.692 UTC [gossip.gossip] handleMessage -> DEBU 1427 Exiting" +"2019-09-24 00:25:17.692 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1428 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:17.692 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1429 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:17.692 UTC [msp.identity] Verify -> DEBU 142a Verify: digest = 00000000 cb f6 6a 97 b6 43 98 3c 2d d6 a3 3c e4 6f 7a 6b |..j..C.<-..<.ozk| +00000010 47 83 78 cc 62 df bb 95 33 c0 21 c1 02 44 88 11 |G.x.b...3.!..D..|" +"2019-09-24 00:25:17.692 UTC [msp.identity] Verify -> DEBU 142b Verify: sig = 00000000 30 45 02 21 00 ea 16 c1 57 02 b1 ac c6 08 b9 ee |0E.!....W.......| +00000010 91 26 f6 19 1c e3 98 1d 1a a8 b1 67 5b b9 1c a6 |.&.........g[...| +00000020 f0 96 1b 5f 4b 02 20 57 aa 28 a4 4a 22 c1 ec a5 |..._K. W.(.J"...| +00000030 92 2e 2b 33 8a 97 16 2a 41 f3 ba ab bb 4e 60 f7 |..+3...*A....N`.| +00000040 c0 03 a4 e9 97 d7 5e |......^|" +"2019-09-24 00:25:17.693 UTC [msp.identity] Verify -> DEBU 142c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:17.693 UTC [msp.identity] Verify -> DEBU 142d Verify: sig = 00000000 30 45 02 21 00 fb d2 29 6d af cf 80 13 72 bd 86 |0E.!...)m....r..| +00000010 af 1d f8 e7 d0 fa 33 1f 7e 72 1d b3 d4 57 6d e7 |......3.~r...Wm.| +00000020 47 6d 40 42 1a 02 20 37 85 19 ef 30 63 e2 03 68 |Gm@B.. 7...0c..h| +00000030 08 d3 54 c7 3f 48 42 f6 42 20 fb ed dc ff a3 4f |..T.?HB.B .....O| +00000040 f6 d3 e7 fa 2f 7f 68 |..../.h|" +"2019-09-24 00:25:17.694 UTC [gossip.discovery] handleAliveMessage -> DEBU 142e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:17.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 142f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:25:17.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1430 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:17.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1431 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:17.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1432 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:17.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1433 Exiting" +"2019-09-24 00:25:17.694 UTC [gossip.discovery] handleAliveMessage -> DEBU 1434 Exiting" +"2019-09-24 00:25:17.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1435 Exiting" +"2019-09-24 00:25:17.694 UTC [gossip.discovery] sendMemResponse -> DEBU 1436 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:17.694 UTC [msp] DeserializeIdentity -> DEBU 1437 Obtaining identity" +"2019-09-24 00:25:17.694 UTC [msp] DeserializeIdentity -> DEBU 1438 Obtaining identity" +"2019-09-24 00:25:17.694 UTC [gossip.comm] Send -> DEBU 1439 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:17.694 UTC [gossip.discovery] sendMemResponse -> DEBU 143a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" secret_envelope: > alive: " +"2019-09-24 00:25:17.695 UTC [gossip.comm] sendToEndpoint -> DEBU 143b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:17.695 UTC [gossip.comm] sendToEndpoint -> DEBU 143c Exiting" +"2019-09-24 00:25:17.701 UTC [gossip.comm] func1 -> DEBU 143d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:17.701 UTC [gossip.gossip] handleMessage -> DEBU 143e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:17.701 UTC [gossip.gossip] handleMessage -> DEBU 143f Exiting" +"2019-09-24 00:25:17.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1440 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:17.701 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1441 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:17.701 UTC [msp.identity] Verify -> DEBU 1442 Verify: digest = 00000000 6f 9c 4c 87 2a 4a e9 7a 62 6a fc 8a c3 94 d2 22 |o.L.*J.zbj....."| +00000010 d2 65 11 2e ad 16 03 e5 dc e3 fc 87 c6 fe 5a 23 |.e............Z#|" +"2019-09-24 00:25:17.701 UTC [msp.identity] Verify -> DEBU 1443 Verify: sig = 00000000 30 45 02 21 00 fe d6 2e 84 68 c2 8f 7b 67 36 f8 |0E.!.....h..{g6.| +00000010 b8 88 51 33 c4 bd fb 78 a8 8c b1 71 83 63 7d 4a |..Q3...x...q.c}J| +00000020 d7 95 8d 85 7c 02 20 0d 52 00 d5 c8 72 88 81 fd |....|. .R...r...| +00000030 0a 45 ca b4 f3 1f 11 0e 15 0c 31 50 7d b2 a1 1f |.E........1P}...| +00000040 be 73 ab 5c 3c 2a 9e |.s.\<*.|" +"2019-09-24 00:25:17.702 UTC [gossip.discovery] handleAliveMessage -> DEBU 1444 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:17.702 UTC [gossip.discovery] handleAliveMessage -> DEBU 1445 endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" lastAliveTS: 1569284677733382900, 31 but got ts: inc_num:1569284677733382900 seq_num:30 " +"2019-09-24 00:25:17.702 UTC [gossip.discovery] handleAliveMessage -> DEBU 1446 Exiting" +"2019-09-24 00:25:17.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1447 Exiting" +"2019-09-24 00:25:17.704 UTC [msp] DeserializeIdentity -> DEBU 1448 Obtaining identity" +"2019-09-24 00:25:17.704 UTC [msp] DeserializeIdentity -> DEBU 1449 Obtaining identity" +"2019-09-24 00:25:17.705 UTC [msp] DeserializeIdentity -> DEBU 144a Obtaining identity" +"2019-09-24 00:25:17.705 UTC [gossip.comm] Send -> DEBU 144b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:17.705 UTC [msp] DeserializeIdentity -> DEBU 144c Obtaining identity" +"2019-09-24 00:25:17.705 UTC [gossip.comm] Send -> DEBU 144d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:17.705 UTC [gossip.comm] sendToEndpoint -> DEBU 144e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:17.705 UTC [gossip.comm] sendToEndpoint -> DEBU 144f Exiting" +"2019-09-24 00:25:17.705 UTC [gossip.comm] sendToEndpoint -> DEBU 1450 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:17.705 UTC [gossip.comm] sendToEndpoint -> DEBU 1451 Exiting" +"2019-09-24 00:25:17.706 UTC [gossip.comm] func1 -> DEBU 1452 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:17.706 UTC [gossip.gossip] handleMessage -> DEBU 1453 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:17.706 UTC [gossip.gossip] handleMessage -> DEBU 1454 Exiting" +"2019-09-24 00:25:17.706 UTC [gossip.gossip] handleMessage -> DEBU 1455 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:17.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1456 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:17.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1457 Exiting" +"2019-09-24 00:25:17.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1458 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:17.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1459 Exiting" +"2019-09-24 00:25:17.706 UTC [gossip.gossip] handleMessage -> DEBU 145a Exiting" +"2019-09-24 00:25:18.112 UTC [gossip.comm] func1 -> DEBU 145b Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:18.112 UTC [gossip.gossip] handleMessage -> DEBU 145c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:18.112 UTC [msp] DeserializeIdentity -> DEBU 145d Obtaining identity" +"2019-09-24 00:25:18.112 UTC [msp] DeserializeIdentity -> DEBU 145e Obtaining identity" +"2019-09-24 00:25:18.113 UTC [msp] DeserializeIdentity -> DEBU 145f Obtaining identity" +"2019-09-24 00:25:18.113 UTC [gossip.gossip] handleMessage -> DEBU 1460 Exiting" +"2019-09-24 00:25:19.578 UTC [msp] GetDefaultSigningIdentity -> DEBU 1461 Obtaining default signing identity" +"2019-09-24 00:25:19.578 UTC [msp.identity] Sign -> DEBU 1462 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101B " +"2019-09-24 00:25:19.578 UTC [msp.identity] Sign -> DEBU 1463 Sign: digest: CF97C4BC73A64F3E28E55454106319178B975805CDEFE51338D72D7F86455B35 " +"2019-09-24 00:25:19.579 UTC [msp] GetDefaultSigningIdentity -> DEBU 1464 Obtaining default signing identity" +"2019-09-24 00:25:19.579 UTC [msp.identity] Sign -> DEBU 1465 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:19.579 UTC [msp.identity] Sign -> DEBU 1466 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:19.580 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1467 Sleeping 5s" +"2019-09-24 00:25:19.588 UTC [msp] DeserializeIdentity -> DEBU 1468 Obtaining identity" +"2019-09-24 00:25:19.588 UTC [msp] DeserializeIdentity -> DEBU 1469 Obtaining identity" +"2019-09-24 00:25:19.588 UTC [msp] DeserializeIdentity -> DEBU 146a Obtaining identity" +"2019-09-24 00:25:19.588 UTC [gossip.comm] Send -> DEBU 146b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:19.589 UTC [gossip.comm] Send -> DEBU 146c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:19.589 UTC [msp] DeserializeIdentity -> DEBU 146d Obtaining identity" +"2019-09-24 00:25:19.589 UTC [gossip.comm] Send -> DEBU 146e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:19.589 UTC [gossip.comm] sendToEndpoint -> DEBU 146f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:19.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1470 Exiting" +"2019-09-24 00:25:19.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1471 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:19.590 UTC [gossip.comm] sendToEndpoint -> DEBU 1472 Exiting" +"2019-09-24 00:25:19.590 UTC [gossip.comm] sendToEndpoint -> DEBU 1473 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:19.590 UTC [gossip.comm] sendToEndpoint -> DEBU 1474 Exiting" +"2019-09-24 00:25:19.599 UTC [gossip.pull] Hello -> DEBU 1475 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:19.599 UTC [gossip.comm] Send -> DEBU 1476 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:19.599 UTC [gossip.pull] Hello -> DEBU 1477 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:19.599 UTC [gossip.comm] Send -> DEBU 1478 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:19.602 UTC [gossip.pull] Hello -> DEBU 1479 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:19.602 UTC [gossip.comm] Send -> DEBU 147a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 147b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 147c Exiting" +"2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 147d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 147e Exiting" +"2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 147f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.603 UTC [gossip.comm] sendToEndpoint -> DEBU 1480 Exiting" +"2019-09-24 00:25:19.604 UTC [gossip.comm] func1 -> DEBU 1481 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.604 UTC [gossip.gossip] handleMessage -> DEBU 1482 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.605 UTC [gossip.pull] HandleMessage -> DEBU 1483 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.605 UTC [gossip.gossip] handleMessage -> DEBU 1484 Exiting" +"2019-09-24 00:25:19.610 UTC [gossip.comm] func1 -> DEBU 1485 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.610 UTC [gossip.gossip] handleMessage -> DEBU 1486 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.610 UTC [gossip.pull] HandleMessage -> DEBU 1487 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.610 UTC [gossip.gossip] handleMessage -> DEBU 1488 Exiting" +"2019-09-24 00:25:19.618 UTC [gossip.gossip] handleMessage -> DEBU 1489 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.621 UTC [gossip.pull] HandleMessage -> DEBU 148a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.622 UTC [gossip.gossip] handleMessage -> DEBU 148b Exiting" +"2019-09-24 00:25:19.622 UTC [msp] GetDefaultSigningIdentity -> DEBU 148c Obtaining default signing identity" +"2019-09-24 00:25:19.622 UTC [msp.identity] Sign -> DEBU 148d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101C " +"2019-09-24 00:25:19.622 UTC [msp.identity] Sign -> DEBU 148e Sign: digest: EA8364BE66517A45B36DA20A851B6A0F6280430F9169B1FB4F5290A05CC3F383 " +"2019-09-24 00:25:19.622 UTC [msp] GetDefaultSigningIdentity -> DEBU 148f Obtaining default signing identity" +"2019-09-24 00:25:19.622 UTC [msp.identity] Sign -> DEBU 1490 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:19.622 UTC [msp.identity] Sign -> DEBU 1491 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:19.622 UTC [msp] DeserializeIdentity -> DEBU 1492 Obtaining identity" +"2019-09-24 00:25:19.623 UTC [gossip.comm] Send -> DEBU 1493 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:19.623 UTC [msp] DeserializeIdentity -> DEBU 1494 Obtaining identity" +"2019-09-24 00:25:19.623 UTC [gossip.comm] Send -> DEBU 1495 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:19.623 UTC [gossip.comm] Send -> DEBU 1496 Entering, sending GossipMessage: tag:EMPTY mem_req:\205}\\D\251\252$\200\310\031\002 I\337X\273\017\221\307\370r]\311\023\331E\220\352\205m\362\3571\220\032R\316\000\221v;#`\344" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:19.623 UTC [gossip.comm] sendToEndpoint -> DEBU 1497 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.623 UTC [gossip.comm] sendToEndpoint -> DEBU 1498 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\205}\\D\251\252$\200\310\031\002 I\337X\273\017\221\307\370r]\311\023\331E\220\352\205m\362\3571\220\032R\316\000\221v;#`\344" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.623 UTC [gossip.comm] sendToEndpoint -> DEBU 1499 Exiting" +"2019-09-24 00:25:19.623 UTC [gossip.comm] sendToEndpoint -> DEBU 149a Exiting" +"2019-09-24 00:25:19.629 UTC [gossip.comm] func1 -> DEBU 149b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.629 UTC [gossip.gossip] handleMessage -> DEBU 149c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.629 UTC [gossip.gossip] handleMessage -> DEBU 149d Exiting" +"2019-09-24 00:25:19.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU 149e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.629 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 149f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:19.629 UTC [msp.identity] Verify -> DEBU 14a0 Verify: digest = 00000000 ea 83 64 be 66 51 7a 45 b3 6d a2 0a 85 1b 6a 0f |..d.fQzE.m....j.| +00000010 62 80 43 0f 91 69 b1 fb 4f 52 90 a0 5c c3 f3 83 |b.C..i..OR..\...|" +"2019-09-24 00:25:19.629 UTC [msp.identity] Verify -> DEBU 14a1 Verify: sig = 00000000 30 44 02 20 0a 64 0f e6 c9 46 e1 c5 65 34 c0 20 |0D. .d...F..e4. | +00000010 07 94 54 5d 3a 71 42 53 23 9a 96 f3 d2 2a f2 ed |..T]:qBS#....*..| +00000020 61 24 61 96 02 20 32 09 74 0a 4b 90 da fb fa 17 |a$a.. 2.t.K.....| +00000030 44 17 5a 0e 63 72 90 37 4c 8f 13 f3 66 4c 80 f6 |D.Z.cr.7L...fL..| +00000040 01 09 ec 39 9a d4 |...9..|" +"2019-09-24 00:25:19.630 UTC [msp.identity] Verify -> DEBU 14a2 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:19.630 UTC [msp.identity] Verify -> DEBU 14a3 Verify: sig = 00000000 30 45 02 21 00 d7 e4 b4 ef 59 02 0d 6d 12 f5 6a |0E.!.....Y..m..j| +00000010 de 8b 50 58 6b 9b f2 d7 a1 6a 3e 85 7d 5c 44 a9 |..PXk....j>.}\D.| +00000020 aa 24 80 c8 19 02 20 49 df 58 bb 0f 91 c7 f8 72 |.$.... I.X.....r| +00000030 5d c9 13 d9 45 90 ea 85 6d f2 ef 31 90 1a 52 ce |]...E...m..1..R.| +00000040 00 91 76 3b 23 60 e4 |..v;#`.|" +"2019-09-24 00:25:19.623 UTC [gossip.comm] sendToEndpoint -> DEBU 14a4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 14a5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:19.630 UTC [gossip.comm] sendToEndpoint -> DEBU 14a6 Exiting" +"2019-09-24 00:25:19.630 UTC [gossip.discovery] isSentByMe -> DEBU 14a7 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:19.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 14a8 Exiting" +"2019-09-24 00:25:19.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14a9 Exiting" +"2019-09-24 00:25:19.635 UTC [gossip.comm] func1 -> DEBU 14aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.636 UTC [gossip.gossip] handleMessage -> DEBU 14ab Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.636 UTC [gossip.gossip] handleMessage -> DEBU 14ac Exiting" +"2019-09-24 00:25:19.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.637 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14ae Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:19.642 UTC [msp.identity] Verify -> DEBU 14af Verify: digest = 00000000 ea 83 64 be 66 51 7a 45 b3 6d a2 0a 85 1b 6a 0f |..d.fQzE.m....j.| +00000010 62 80 43 0f 91 69 b1 fb 4f 52 90 a0 5c c3 f3 83 |b.C..i..OR..\...|" +"2019-09-24 00:25:19.642 UTC [msp.identity] Verify -> DEBU 14b0 Verify: sig = 00000000 30 44 02 20 0a 64 0f e6 c9 46 e1 c5 65 34 c0 20 |0D. .d...F..e4. | +00000010 07 94 54 5d 3a 71 42 53 23 9a 96 f3 d2 2a f2 ed |..T]:qBS#....*..| +00000020 61 24 61 96 02 20 32 09 74 0a 4b 90 da fb fa 17 |a$a.. 2.t.K.....| +00000030 44 17 5a 0e 63 72 90 37 4c 8f 13 f3 66 4c 80 f6 |D.Z.cr.7L...fL..| +00000040 01 09 ec 39 9a d4 |...9..|" +"2019-09-24 00:25:19.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 14b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:19.647 UTC [gossip.discovery] isSentByMe -> DEBU 14b2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:19.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 14b3 Exiting" +"2019-09-24 00:25:19.647 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14b4 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:19.647 UTC [gossip.gossip] handleMessage -> DEBU 14b5 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.647 UTC [msp] DeserializeIdentity -> DEBU 14b6 Obtaining identity" +"2019-09-24 00:25:19.648 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14b7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:19.648 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14b8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:19.648 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14b9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:19.648 UTC [policies] Evaluate -> DEBU 14ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:19.648 UTC [policies] Evaluate -> DEBU 14bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:19.648 UTC [policies] Evaluate -> DEBU 14bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:19.648 UTC [cauthdsl] func1 -> DEBU 14bd 0xc003c8d0c0 gate 1569284719648571100 evaluation starts" +"2019-09-24 00:25:19.648 UTC [cauthdsl] func2 -> DEBU 14be 0xc003c8d0c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:19.648 UTC [cauthdsl] func2 -> DEBU 14bf 0xc003c8d0c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:19.648 UTC [cauthdsl] func2 -> DEBU 14c0 0xc003c8d0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:19.648 UTC [cauthdsl] func2 -> DEBU 14c1 0xc003c8d0c0 principal evaluation fails" +"2019-09-24 00:25:19.649 UTC [cauthdsl] func1 -> DEBU 14c2 0xc003c8d0c0 gate 1569284719648571100 evaluation fails" +"2019-09-24 00:25:19.649 UTC [policies] Evaluate -> DEBU 14c3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:19.659 UTC [policies] Evaluate -> DEBU 14c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:19.659 UTC [policies] Evaluate -> DEBU 14c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:19.659 UTC [cauthdsl] func1 -> DEBU 14c6 0xc003c8d900 gate 1569284719659723000 evaluation starts" +"2019-09-24 00:25:19.659 UTC [cauthdsl] func2 -> DEBU 14c7 0xc003c8d900 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:19.660 UTC [cauthdsl] func2 -> DEBU 14c8 0xc003c8d900 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:19.660 UTC [cauthdsl] func2 -> DEBU 14c9 0xc003c8d900 principal matched by identity 0" +"2019-09-24 00:25:19.660 UTC [msp.identity] Verify -> DEBU 14ca Verify: digest = 00000000 c0 a2 c7 f3 29 34 1e 7e a3 e8 cc 14 e1 74 3f 79 |....)4.~.....t?y| +00000010 7a 26 e4 fa 20 24 d3 62 60 75 69 95 b0 14 53 c1 |z&.. $.b`ui...S.|" +"2019-09-24 00:25:19.660 UTC [msp.identity] Verify -> DEBU 14cb Verify: sig = 00000000 30 44 02 20 7d 35 a7 c8 81 d1 aa f7 ec 07 60 53 |0D. }5........`S| +00000010 15 1b 7f 69 ee 05 07 75 b8 bf ac 63 fd 48 cc 89 |...i...u...c.H..| +00000020 36 d1 49 f2 02 20 70 49 01 99 e4 82 d8 de c1 ba |6.I.. pI........| +00000030 22 e5 3a 80 1d ba df 50 40 40 17 68 a2 17 b9 06 |".:....P@@.h....| +00000040 06 a5 bb c8 60 3e |....`>|" +"2019-09-24 00:25:19.660 UTC [cauthdsl] func2 -> DEBU 14cc 0xc003c8d900 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:19.660 UTC [cauthdsl] func1 -> DEBU 14cd 0xc003c8d900 gate 1569284719659723000 evaluation succeeds" +"2019-09-24 00:25:19.660 UTC [policies] Evaluate -> DEBU 14ce Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:19.660 UTC [policies] Evaluate -> DEBU 14cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:19.660 UTC [policies] Evaluate -> DEBU 14d0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:19.660 UTC [policies] Evaluate -> DEBU 14d1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:19.661 UTC [gossip.discovery] handleAliveMessage -> DEBU 14d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:19.661 UTC [gossip.discovery] handleAliveMessage -> DEBU 14d3 Exiting" +"2019-09-24 00:25:19.664 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14d4 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:19.665 UTC [msp.identity] Verify -> DEBU 14d5 Verify: digest = 00000000 cb f6 6a 97 b6 43 98 3c 2d d6 a3 3c e4 6f 7a 6b |..j..C.<-..<.ozk| +00000010 47 83 78 cc 62 df bb 95 33 c0 21 c1 02 44 88 11 |G.x.b...3.!..D..|" +"2019-09-24 00:25:19.665 UTC [msp.identity] Verify -> DEBU 14d6 Verify: sig = 00000000 30 45 02 21 00 ea 16 c1 57 02 b1 ac c6 08 b9 ee |0E.!....W.......| +00000010 91 26 f6 19 1c e3 98 1d 1a a8 b1 67 5b b9 1c a6 |.&.........g[...| +00000020 f0 96 1b 5f 4b 02 20 57 aa 28 a4 4a 22 c1 ec a5 |..._K. W.(.J"...| +00000030 92 2e 2b 33 8a 97 16 2a 41 f3 ba ab bb 4e 60 f7 |..+3...*A....N`.| +00000040 c0 03 a4 e9 97 d7 5e |......^|" +"2019-09-24 00:25:19.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 14d7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:19.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 14d8 Exiting" +"2019-09-24 00:25:19.665 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d9 Exiting" +"2019-09-24 00:25:19.665 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.665 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14db Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:19.666 UTC [msp.identity] Verify -> DEBU 14dc Verify: digest = 00000000 ea 83 64 be 66 51 7a 45 b3 6d a2 0a 85 1b 6a 0f |..d.fQzE.m....j.| +00000010 62 80 43 0f 91 69 b1 fb 4f 52 90 a0 5c c3 f3 83 |b.C..i..OR..\...|" +"2019-09-24 00:25:19.666 UTC [msp.identity] Verify -> DEBU 14dd Verify: sig = 00000000 30 44 02 20 0a 64 0f e6 c9 46 e1 c5 65 34 c0 20 |0D. .d...F..e4. | +00000010 07 94 54 5d 3a 71 42 53 23 9a 96 f3 d2 2a f2 ed |..T]:qBS#....*..| +00000020 61 24 61 96 02 20 32 09 74 0a 4b 90 da fb fa 17 |a$a.. 2.t.K.....| +00000030 44 17 5a 0e 63 72 90 37 4c 8f 13 f3 66 4c 80 f6 |D.Z.cr.7L...fL..| +00000040 01 09 ec 39 9a d4 |...9..|" +"2019-09-24 00:25:19.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 14de Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:19.666 UTC [gossip.discovery] isSentByMe -> DEBU 14df Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:19.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 14e0 Exiting" +"2019-09-24 00:25:19.666 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14e1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:19.666 UTC [msp] DeserializeIdentity -> DEBU 14e2 Obtaining identity" +"2019-09-24 00:25:19.666 UTC [gossip.gossip] handleMessage -> DEBU 14e3 Exiting" +"2019-09-24 00:25:19.667 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14e4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:19.671 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14e5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:19.671 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14e6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:19.671 UTC [policies] Evaluate -> DEBU 14e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:19.671 UTC [policies] Evaluate -> DEBU 14e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:19.671 UTC [policies] Evaluate -> DEBU 14e9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:19.671 UTC [cauthdsl] func1 -> DEBU 14ea 0xc003d0eb20 gate 1569284719671951800 evaluation starts" +"2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14eb 0xc003d0eb20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14ec 0xc003d0eb20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14ed 0xc003d0eb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14ee 0xc003d0eb20 principal evaluation fails" +"2019-09-24 00:25:19.672 UTC [cauthdsl] func1 -> DEBU 14ef 0xc003d0eb20 gate 1569284719671951800 evaluation fails" +"2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14f0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:19.672 UTC [cauthdsl] func1 -> DEBU 14f3 0xc003d0f390 gate 1569284719672271400 evaluation starts" +"2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14f4 0xc003d0f390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14f5 0xc003d0f390 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14f6 0xc003d0f390 principal matched by identity 0" +"2019-09-24 00:25:19.672 UTC [msp.identity] Verify -> DEBU 14f7 Verify: digest = 00000000 8a d7 3f 3a 8d eb e3 c4 2e 78 77 f9 3d db 88 04 |..?:.....xw.=...| +00000010 bb 87 aa 8a 7b 07 b5 24 d0 ed 35 2b 80 c3 8b 08 |....{..$..5+....|" +"2019-09-24 00:25:19.672 UTC [msp.identity] Verify -> DEBU 14f8 Verify: sig = 00000000 30 45 02 21 00 d6 e6 c3 48 7a 09 90 e3 a3 ed ba |0E.!....Hz......| +00000010 30 e6 d2 9b 58 e1 bd ba 70 6d cb 0b 1c d2 4b ac |0...X...pm....K.| +00000020 d1 7b 90 f7 ba 02 20 0e 8d d0 96 d6 89 99 b8 51 |.{.... ........Q| +00000030 4c 3b 7e 0a 6d df fc 09 1d 78 11 d9 f3 57 61 3f |L;~.m....x...Wa?| +00000040 64 ed 89 86 71 bb de |d...q..|" +"2019-09-24 00:25:19.672 UTC [cauthdsl] func2 -> DEBU 14f9 0xc003d0f390 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:19.672 UTC [cauthdsl] func1 -> DEBU 14fa 0xc003d0f390 gate 1569284719672271400 evaluation succeeds" +"2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14fb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14fd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:19.672 UTC [policies] Evaluate -> DEBU 14fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:19.672 UTC [gossip.discovery] handleAliveMessage -> DEBU 14ff Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:19.672 UTC [gossip.discovery] handleAliveMessage -> DEBU 1500 Exiting" +"2019-09-24 00:25:19.673 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1501 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:19.673 UTC [msp.identity] Verify -> DEBU 1502 Verify: digest = 00000000 cb f6 6a 97 b6 43 98 3c 2d d6 a3 3c e4 6f 7a 6b |..j..C.<-..<.ozk| +00000010 47 83 78 cc 62 df bb 95 33 c0 21 c1 02 44 88 11 |G.x.b...3.!..D..|" +"2019-09-24 00:25:19.673 UTC [msp.identity] Verify -> DEBU 1503 Verify: sig = 00000000 30 45 02 21 00 ea 16 c1 57 02 b1 ac c6 08 b9 ee |0E.!....W.......| +00000010 91 26 f6 19 1c e3 98 1d 1a a8 b1 67 5b b9 1c a6 |.&.........g[...| +00000020 f0 96 1b 5f 4b 02 20 57 aa 28 a4 4a 22 c1 ec a5 |..._K. W.(.J"...| +00000030 92 2e 2b 33 8a 97 16 2a 41 f3 ba ab bb 4e 60 f7 |..+3...*A....N`.| +00000040 c0 03 a4 e9 97 d7 5e |......^|" +"2019-09-24 00:25:19.673 UTC [gossip.discovery] handleAliveMessage -> DEBU 1504 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:19.673 UTC [gossip.discovery] handleAliveMessage -> DEBU 1505 Exiting" +"2019-09-24 00:25:19.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1506 Exiting" +"2019-09-24 00:25:19.967 UTC [gossip.gossip] handleMessage -> DEBU 1507 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.967 UTC [gossip.pull] HandleMessage -> DEBU 1508 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.967 UTC [msp] DeserializeIdentity -> DEBU 1509 Obtaining identity" +"2019-09-24 00:25:19.975 UTC [msp] DeserializeIdentity -> DEBU 150a Obtaining identity" +"2019-09-24 00:25:19.975 UTC [msp] DeserializeIdentity -> DEBU 150b Obtaining identity" +"2019-09-24 00:25:19.975 UTC [msp] DeserializeIdentity -> DEBU 150c Obtaining identity" +"2019-09-24 00:25:19.975 UTC [msp] DeserializeIdentity -> DEBU 150d Obtaining identity" +"2019-09-24 00:25:19.975 UTC [msp] DeserializeIdentity -> DEBU 150e Obtaining identity" +"2019-09-24 00:25:19.975 UTC [gossip.pull] SendDigest -> DEBU 150f Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:19.975 UTC [gossip.gossip] handleMessage -> DEBU 1510 Exiting" +"2019-09-24 00:25:19.975 UTC [gossip.gossip] handleMessage -> DEBU 1511 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.976 UTC [gossip.gossip] handleMessage -> DEBU 1512 Exiting" +"2019-09-24 00:25:19.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1513 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.976 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1514 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:19.976 UTC [msp] DeserializeIdentity -> DEBU 1515 Obtaining identity" +"2019-09-24 00:25:19.976 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1516 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:19.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1517 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:19.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1518 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:19.976 UTC [policies] Evaluate -> DEBU 1519 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:19.976 UTC [policies] Evaluate -> DEBU 151a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:19.976 UTC [policies] Evaluate -> DEBU 151b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:19.976 UTC [cauthdsl] func1 -> DEBU 151c 0xc003d5c630 gate 1569284719976802900 evaluation starts" +"2019-09-24 00:25:19.976 UTC [cauthdsl] func2 -> DEBU 151d 0xc003d5c630 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:19.976 UTC [cauthdsl] func2 -> DEBU 151e 0xc003d5c630 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 151f 0xc003d5c630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 1520 0xc003d5c630 principal evaluation fails" +"2019-09-24 00:25:19.977 UTC [cauthdsl] func1 -> DEBU 1521 0xc003d5c630 gate 1569284719976802900 evaluation fails" +"2019-09-24 00:25:19.977 UTC [policies] Evaluate -> DEBU 1522 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:19.977 UTC [policies] Evaluate -> DEBU 1523 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:19.977 UTC [policies] Evaluate -> DEBU 1524 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:19.977 UTC [cauthdsl] func1 -> DEBU 1525 0xc003d5ce80 gate 1569284719977374900 evaluation starts" +"2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 1526 0xc003d5ce80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 1527 0xc003d5ce80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 1528 0xc003d5ce80 principal matched by identity 0" +"2019-09-24 00:25:19.977 UTC [msp.identity] Verify -> DEBU 1529 Verify: digest = 00000000 cc 86 df 7b 56 75 55 16 7f 00 f3 eb f8 e9 d1 ea |...{VuU.........| +00000010 3e 98 e4 50 94 2d 23 18 6f 8d 98 3f 25 6f cb 5e |>..P.-#.o..?%o.^|" +"2019-09-24 00:25:19.977 UTC [msp.identity] Verify -> DEBU 152a Verify: sig = 00000000 30 44 02 20 19 23 f2 02 a8 df 4e 56 a8 e9 79 d5 |0D. .#....NV..y.| +00000010 58 54 7e b8 4d ce b7 0d 8a 5e 5a 7b 16 01 f4 da |XT~.M....^Z{....| +00000020 3b 24 b2 a8 02 20 2c 5d 4d b0 23 e0 54 87 13 09 |;$... ,]M.#.T...| +00000030 b9 e7 4e 48 be 06 b0 6b a5 03 6d 7e 0b b7 bd 33 |..NH...k..m~...3| +00000040 cb 7f ba eb fc 37 |.....7|" +"2019-09-24 00:25:19.977 UTC [cauthdsl] func2 -> DEBU 152b 0xc003d5ce80 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:19.978 UTC [cauthdsl] func1 -> DEBU 152c 0xc003d5ce80 gate 1569284719977374900 evaluation succeeds" +"2019-09-24 00:25:19.978 UTC [policies] Evaluate -> DEBU 152d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:19.978 UTC [policies] Evaluate -> DEBU 152e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:19.978 UTC [policies] Evaluate -> DEBU 152f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:19.978 UTC [policies] Evaluate -> DEBU 1530 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:19.978 UTC [gossip.discovery] handleAliveMessage -> DEBU 1531 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:19.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 1532 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:19.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 1533 updating membership: timestamp: " +"2019-09-24 00:25:19.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 1534 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:19.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 1535 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:19.978 UTC [gossip.discovery] learnExistingMembers -> DEBU 1536 Exiting" +"2019-09-24 00:25:19.978 UTC [gossip.discovery] handleAliveMessage -> DEBU 1537 Exiting" +"2019-09-24 00:25:19.978 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1538 Exiting" +"2019-09-24 00:25:19.978 UTC [gossip.discovery] sendMemResponse -> DEBU 1539 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:19.979 UTC [msp] DeserializeIdentity -> DEBU 153a Obtaining identity" +"2019-09-24 00:25:19.979 UTC [msp] DeserializeIdentity -> DEBU 153b Obtaining identity" +"2019-09-24 00:25:19.979 UTC [msp] DeserializeIdentity -> DEBU 153c Obtaining identity" +"2019-09-24 00:25:19.979 UTC [gossip.comm] Send -> DEBU 153d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:19.979 UTC [gossip.discovery] sendMemResponse -> DEBU 153e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" > alive: alive: alive: " +"2019-09-24 00:25:19.979 UTC [gossip.comm] sendToEndpoint -> DEBU 153f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:25:19.979 UTC [gossip.comm] sendToEndpoint -> DEBU 1540 Exiting" +"2019-09-24 00:25:19.997 UTC [gossip.gossip] handleMessage -> DEBU 1541 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:19.998 UTC [gossip.gossip] handleMessage -> DEBU 1542 Exiting" +"2019-09-24 00:25:19.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1543 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:19.998 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1544 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:19.998 UTC [msp] DeserializeIdentity -> DEBU 1545 Obtaining identity" +"2019-09-24 00:25:19.998 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1546 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:19.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1547 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:19.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1548 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 1549 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 154a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 154b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:19.998 UTC [cauthdsl] func1 -> DEBU 154c 0xc003de39a0 gate 1569284719998576000 evaluation starts" +"2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 154d 0xc003de39a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 154e 0xc003de39a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 154f 0xc003de39a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 1550 0xc003de39a0 principal evaluation fails" +"2019-09-24 00:25:19.998 UTC [cauthdsl] func1 -> DEBU 1551 0xc003de39a0 gate 1569284719998576000 evaluation fails" +"2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 1552 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 1553 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:19.998 UTC [policies] Evaluate -> DEBU 1554 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:19.998 UTC [cauthdsl] func1 -> DEBU 1555 0xc003e061e0 gate 1569284719998884100 evaluation starts" +"2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 1556 0xc003e061e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 1557 0xc003e061e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:19.998 UTC [cauthdsl] func2 -> DEBU 1558 0xc003e061e0 principal matched by identity 0" +"2019-09-24 00:25:19.999 UTC [msp.identity] Verify -> DEBU 1559 Verify: digest = 00000000 2e f4 bc 3c e2 70 b6 97 56 47 ce 34 8d 1f 83 62 |...<.p..VG.4...b| +00000010 42 4e 4a d0 e3 4b 0a 15 b8 e2 b8 7f 16 c9 c3 19 |BNJ..K..........|" +"2019-09-24 00:25:19.999 UTC [msp.identity] Verify -> DEBU 155a Verify: sig = 00000000 30 45 02 21 00 c9 92 00 07 17 5b e9 dd a6 10 14 |0E.!......[.....| +00000010 72 ea a3 92 f7 d4 1f d8 c3 86 75 ff d8 f7 a8 97 |r.........u.....| +00000020 40 59 17 53 37 02 20 74 ad 35 b0 ed 31 f7 5e 7e |@Y.S7. t.5..1.^~| +00000030 97 52 f7 18 9f 64 10 d9 ba bf 50 40 cb b8 9b 76 |.R...d....P@...v| +00000040 ae e4 b5 d9 9b 27 83 |.....'.|" +"2019-09-24 00:25:19.999 UTC [cauthdsl] func2 -> DEBU 155b 0xc003e061e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:19.999 UTC [cauthdsl] func1 -> DEBU 155c 0xc003e061e0 gate 1569284719998884100 evaluation succeeds" +"2019-09-24 00:25:19.999 UTC [policies] Evaluate -> DEBU 155d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:19.999 UTC [policies] Evaluate -> DEBU 155e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:19.999 UTC [policies] Evaluate -> DEBU 155f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:19.999 UTC [policies] Evaluate -> DEBU 1560 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:19.999 UTC [gossip.discovery] handleAliveMessage -> DEBU 1561 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 1562 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 1563 updating membership: timestamp: " +"2019-09-24 00:25:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 1564 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 1565 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 1566 Exiting" +"2019-09-24 00:25:19.999 UTC [gossip.discovery] handleAliveMessage -> DEBU 1567 Exiting" +"2019-09-24 00:25:19.999 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1568 Exiting" +"2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 1569 Obtaining identity" +"2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 156a Obtaining identity" +"2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 156b Obtaining identity" +"2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 156c Obtaining identity" +"2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 156d Obtaining identity" +"2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 156e Obtaining identity" +"2019-09-24 00:25:20.004 UTC [gossip.comm] Send -> DEBU 156f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 1570 Obtaining identity" +"2019-09-24 00:25:20.004 UTC [msp] DeserializeIdentity -> DEBU 1571 Obtaining identity" +"2019-09-24 00:25:20.004 UTC [gossip.comm] Send -> DEBU 1572 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:20.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1573 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1574 Exiting" +"2019-09-24 00:25:20.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1575 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.005 UTC [gossip.comm] sendToEndpoint -> DEBU 1576 Exiting" +"2019-09-24 00:25:20.005 UTC [gossip.comm] func1 -> DEBU 1577 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.005 UTC [gossip.gossip] handleMessage -> DEBU 1578 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.006 UTC [gossip.gossip] handleMessage -> DEBU 1579 Exiting" +"2019-09-24 00:25:20.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU 157a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU 157b Exiting" +"2019-09-24 00:25:20.007 UTC [gossip.comm] func1 -> DEBU 157c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.007 UTC [gossip.gossip] handleMessage -> DEBU 157d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.007 UTC [gossip.gossip] handleMessage -> DEBU 157e Exiting" +"2019-09-24 00:25:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 157f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1580 Exiting" +"2019-09-24 00:25:20.187 UTC [msp] DeserializeIdentity -> DEBU 1581 Obtaining identity" +"2019-09-24 00:25:20.188 UTC [msp] DeserializeIdentity -> DEBU 1582 Obtaining identity" +"2019-09-24 00:25:20.188 UTC [gossip.comm] Send -> DEBU 1583 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1584 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1585 Exiting" +"2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1586 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1587 Exiting" +"2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1588 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.188 UTC [gossip.comm] sendToEndpoint -> DEBU 1589 Exiting" +"2019-09-24 00:25:20.189 UTC [gossip.comm] func1 -> DEBU 158a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.189 UTC [gossip.gossip] handleMessage -> DEBU 158b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.189 UTC [msp] DeserializeIdentity -> DEBU 158c Obtaining identity" +"2019-09-24 00:25:20.189 UTC [msp] DeserializeIdentity -> DEBU 158d Obtaining identity" +"2019-09-24 00:25:20.189 UTC [msp] DeserializeIdentity -> DEBU 158e Obtaining identity" +"2019-09-24 00:25:20.190 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 158f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:20.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1590 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1591 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 1592 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 1593 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 1594 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:20.190 UTC [cauthdsl] func1 -> DEBU 1595 0xc003e17960 gate 1569284720190301700 evaluation starts" +"2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 1596 0xc003e17960 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 1597 0xc003e17960 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 1598 0xc003e17960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 1599 0xc003e17960 principal evaluation fails" +"2019-09-24 00:25:20.190 UTC [cauthdsl] func1 -> DEBU 159a 0xc003e17960 gate 1569284720190301700 evaluation fails" +"2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 159b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 159c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.190 UTC [policies] Evaluate -> DEBU 159d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:20.190 UTC [cauthdsl] func1 -> DEBU 159e 0xc003e241a0 gate 1569284720190744700 evaluation starts" +"2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 159f 0xc003e241a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 15a0 0xc003e241a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.190 UTC [cauthdsl] func2 -> DEBU 15a1 0xc003e241a0 principal matched by identity 0" +"2019-09-24 00:25:20.190 UTC [msp.identity] Verify -> DEBU 15a2 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:20.190 UTC [msp.identity] Verify -> DEBU 15a3 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:20.191 UTC [cauthdsl] func2 -> DEBU 15a4 0xc003e241a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:20.193 UTC [gossip.comm] func1 -> DEBU 15a5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.195 UTC [cauthdsl] func1 -> DEBU 15a6 0xc003e241a0 gate 1569284720190744700 evaluation succeeds" +"2019-09-24 00:25:20.195 UTC [policies] Evaluate -> DEBU 15a7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.195 UTC [policies] Evaluate -> DEBU 15a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.195 UTC [policies] Evaluate -> DEBU 15a9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:20.195 UTC [policies] Evaluate -> DEBU 15aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:20.195 UTC [msp.identity] Verify -> DEBU 15ab Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:20.196 UTC [msp.identity] Verify -> DEBU 15ac Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:20.196 UTC [msp] DeserializeIdentity -> DEBU 15ad Obtaining identity" +"2019-09-24 00:25:20.196 UTC [msp] DeserializeIdentity -> DEBU 15ae Obtaining identity" +"2019-09-24 00:25:20.196 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:20.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15b0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15b1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.197 UTC [policies] Evaluate -> DEBU 15b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:20.197 UTC [policies] Evaluate -> DEBU 15b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:20.197 UTC [policies] Evaluate -> DEBU 15b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:20.197 UTC [cauthdsl] func1 -> DEBU 15b5 0xc003e400e0 gate 1569284720197325900 evaluation starts" +"2019-09-24 00:25:20.197 UTC [cauthdsl] func2 -> DEBU 15b6 0xc003e400e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.197 UTC [cauthdsl] func2 -> DEBU 15b7 0xc003e400e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.197 UTC [cauthdsl] func2 -> DEBU 15b8 0xc003e400e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:20.202 UTC [cauthdsl] func2 -> DEBU 15b9 0xc003e400e0 principal evaluation fails" +"2019-09-24 00:25:20.202 UTC [cauthdsl] func1 -> DEBU 15ba 0xc003e400e0 gate 1569284720197325900 evaluation fails" +"2019-09-24 00:25:20.202 UTC [policies] Evaluate -> DEBU 15bb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.202 UTC [policies] Evaluate -> DEBU 15bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.202 UTC [policies] Evaluate -> DEBU 15bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:20.202 UTC [cauthdsl] func1 -> DEBU 15be 0xc003e40920 gate 1569284720202607500 evaluation starts" +"2019-09-24 00:25:20.202 UTC [cauthdsl] func2 -> DEBU 15bf 0xc003e40920 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.203 UTC [cauthdsl] func2 -> DEBU 15c0 0xc003e40920 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.203 UTC [cauthdsl] func2 -> DEBU 15c1 0xc003e40920 principal matched by identity 0" +"2019-09-24 00:25:20.203 UTC [msp.identity] Verify -> DEBU 15c2 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:20.203 UTC [msp.identity] Verify -> DEBU 15c3 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:20.203 UTC [cauthdsl] func2 -> DEBU 15c4 0xc003e40920 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:20.203 UTC [cauthdsl] func1 -> DEBU 15c5 0xc003e40920 gate 1569284720202607500 evaluation succeeds" +"2019-09-24 00:25:20.203 UTC [policies] Evaluate -> DEBU 15c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.203 UTC [policies] Evaluate -> DEBU 15c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.203 UTC [policies] Evaluate -> DEBU 15c8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:20.204 UTC [policies] Evaluate -> DEBU 15c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:20.204 UTC [msp.identity] Verify -> DEBU 15ca Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:20.204 UTC [msp.identity] Verify -> DEBU 15cb Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:20.204 UTC [gossip.gossip] handleMessage -> DEBU 15cc Exiting" +"2019-09-24 00:25:20.204 UTC [gossip.gossip] handleMessage -> DEBU 15cd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.205 UTC [msp.identity] Verify -> DEBU 15ce Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:20.205 UTC [msp.identity] Verify -> DEBU 15cf Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:20.205 UTC [msp.identity] Verify -> DEBU 15d0 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:20.205 UTC [msp.identity] Verify -> DEBU 15d1 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:20.205 UTC [msp] DeserializeIdentity -> DEBU 15d2 Obtaining identity" +"2019-09-24 00:25:20.206 UTC [msp] DeserializeIdentity -> DEBU 15d3 Obtaining identity" +"2019-09-24 00:25:20.207 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15d4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:20.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15d5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15d6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.207 UTC [policies] Evaluate -> DEBU 15d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:20.207 UTC [policies] Evaluate -> DEBU 15d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:20.207 UTC [policies] Evaluate -> DEBU 15d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:20.207 UTC [cauthdsl] func1 -> DEBU 15da 0xc003e51c50 gate 1569284720207733900 evaluation starts" +"2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15db 0xc003e51c50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15dc 0xc003e51c50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15dd 0xc003e51c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15de 0xc003e51c50 principal evaluation fails" +"2019-09-24 00:25:20.215 UTC [cauthdsl] func1 -> DEBU 15df 0xc003e51c50 gate 1569284720207733900 evaluation fails" +"2019-09-24 00:25:20.215 UTC [policies] Evaluate -> DEBU 15e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.215 UTC [policies] Evaluate -> DEBU 15e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.215 UTC [policies] Evaluate -> DEBU 15e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:20.215 UTC [cauthdsl] func1 -> DEBU 15e3 0xc003e8c5a0 gate 1569284720215451700 evaluation starts" +"2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15e4 0xc003e8c5a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15e5 0xc003e8c5a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.215 UTC [cauthdsl] func2 -> DEBU 15e6 0xc003e8c5a0 principal matched by identity 0" +"2019-09-24 00:25:20.215 UTC [msp.identity] Verify -> DEBU 15e7 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:20.215 UTC [msp.identity] Verify -> DEBU 15e8 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:20.216 UTC [cauthdsl] func2 -> DEBU 15e9 0xc003e8c5a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:20.216 UTC [cauthdsl] func1 -> DEBU 15ea 0xc003e8c5a0 gate 1569284720215451700 evaluation succeeds" +"2019-09-24 00:25:20.219 UTC [policies] Evaluate -> DEBU 15eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.219 UTC [policies] Evaluate -> DEBU 15ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.219 UTC [policies] Evaluate -> DEBU 15ed Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:20.219 UTC [policies] Evaluate -> DEBU 15ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:20.219 UTC [msp] DeserializeIdentity -> DEBU 15ef Obtaining identity" +"2019-09-24 00:25:20.220 UTC [msp] DeserializeIdentity -> DEBU 15f0 Obtaining identity" +"2019-09-24 00:25:20.221 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15f1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:20.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15f2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15f3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.229 UTC [policies] Evaluate -> DEBU 15f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:20.229 UTC [policies] Evaluate -> DEBU 15f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:20.229 UTC [policies] Evaluate -> DEBU 15f6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:20.229 UTC [cauthdsl] func1 -> DEBU 15f7 0xc003e8dfb0 gate 1569284720229747700 evaluation starts" +"2019-09-24 00:25:20.229 UTC [cauthdsl] func2 -> DEBU 15f8 0xc003e8dfb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.230 UTC [cauthdsl] func2 -> DEBU 15f9 0xc003e8dfb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.230 UTC [cauthdsl] func2 -> DEBU 15fa 0xc003e8dfb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:20.230 UTC [cauthdsl] func2 -> DEBU 15fb 0xc003e8dfb0 principal evaluation fails" +"2019-09-24 00:25:20.230 UTC [cauthdsl] func1 -> DEBU 15fc 0xc003e8dfb0 gate 1569284720229747700 evaluation fails" +"2019-09-24 00:25:20.230 UTC [policies] Evaluate -> DEBU 15fd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.230 UTC [policies] Evaluate -> DEBU 15fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.230 UTC [policies] Evaluate -> DEBU 15ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:20.230 UTC [cauthdsl] func1 -> DEBU 1600 0xc003ed47f0 gate 1569284720230668900 evaluation starts" +"2019-09-24 00:25:20.230 UTC [cauthdsl] func2 -> DEBU 1601 0xc003ed47f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.231 UTC [cauthdsl] func2 -> DEBU 1602 0xc003ed47f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.231 UTC [cauthdsl] func2 -> DEBU 1603 0xc003ed47f0 principal matched by identity 0" +"2019-09-24 00:25:20.231 UTC [msp.identity] Verify -> DEBU 1604 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:20.231 UTC [msp.identity] Verify -> DEBU 1605 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:20.231 UTC [cauthdsl] func2 -> DEBU 1606 0xc003ed47f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:20.231 UTC [cauthdsl] func1 -> DEBU 1607 0xc003ed47f0 gate 1569284720230668900 evaluation succeeds" +"2019-09-24 00:25:20.231 UTC [policies] Evaluate -> DEBU 1608 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.231 UTC [policies] Evaluate -> DEBU 1609 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.231 UTC [policies] Evaluate -> DEBU 160a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:20.232 UTC [policies] Evaluate -> DEBU 160b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:20.232 UTC [gossip.gossip] handleMessage -> DEBU 160c Exiting" +"2019-09-24 00:25:20.232 UTC [gossip.gossip] handleMessage -> DEBU 160d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.232 UTC [msp] DeserializeIdentity -> DEBU 160e Obtaining identity" +"2019-09-24 00:25:20.232 UTC [msp] DeserializeIdentity -> DEBU 160f Obtaining identity" +"2019-09-24 00:25:20.232 UTC [msp] DeserializeIdentity -> DEBU 1610 Obtaining identity" +"2019-09-24 00:25:20.233 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1611 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:20.233 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1612 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.233 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1613 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.233 UTC [policies] Evaluate -> DEBU 1614 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:20.233 UTC [policies] Evaluate -> DEBU 1615 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:20.233 UTC [policies] Evaluate -> DEBU 1616 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:20.233 UTC [cauthdsl] func1 -> DEBU 1617 0xc003edc330 gate 1569284720233647700 evaluation starts" +"2019-09-24 00:25:20.233 UTC [cauthdsl] func2 -> DEBU 1618 0xc003edc330 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.233 UTC [cauthdsl] func2 -> DEBU 1619 0xc003edc330 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.233 UTC [cauthdsl] func2 -> DEBU 161a 0xc003edc330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:20.233 UTC [cauthdsl] func2 -> DEBU 161b 0xc003edc330 principal evaluation fails" +"2019-09-24 00:25:20.233 UTC [cauthdsl] func1 -> DEBU 161c 0xc003edc330 gate 1569284720233647700 evaluation fails" +"2019-09-24 00:25:20.233 UTC [policies] Evaluate -> DEBU 161d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.233 UTC [policies] Evaluate -> DEBU 161e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.234 UTC [policies] Evaluate -> DEBU 161f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:20.234 UTC [cauthdsl] func1 -> DEBU 1620 0xc003edcb80 gate 1569284720234103100 evaluation starts" +"2019-09-24 00:25:20.234 UTC [cauthdsl] func2 -> DEBU 1621 0xc003edcb80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.234 UTC [cauthdsl] func2 -> DEBU 1622 0xc003edcb80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.234 UTC [cauthdsl] func2 -> DEBU 1623 0xc003edcb80 principal matched by identity 0" +"2019-09-24 00:25:20.234 UTC [msp.identity] Verify -> DEBU 1624 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:20.234 UTC [msp.identity] Verify -> DEBU 1625 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:20.234 UTC [cauthdsl] func2 -> DEBU 1626 0xc003edcb80 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:20.234 UTC [cauthdsl] func1 -> DEBU 1627 0xc003edcb80 gate 1569284720234103100 evaluation succeeds" +"2019-09-24 00:25:20.234 UTC [policies] Evaluate -> DEBU 1628 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.234 UTC [policies] Evaluate -> DEBU 1629 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.234 UTC [policies] Evaluate -> DEBU 162a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:20.234 UTC [policies] Evaluate -> DEBU 162b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:20.235 UTC [msp.identity] Verify -> DEBU 162c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:20.235 UTC [msp.identity] Verify -> DEBU 162d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:20.235 UTC [msp.identity] Verify -> DEBU 162e Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:20.236 UTC [msp.identity] Verify -> DEBU 162f Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:20.242 UTC [msp] DeserializeIdentity -> DEBU 1630 Obtaining identity" +"2019-09-24 00:25:20.242 UTC [msp] DeserializeIdentity -> DEBU 1631 Obtaining identity" +"2019-09-24 00:25:20.242 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1632 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:20.242 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1633 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.242 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1634 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 1635 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 1636 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 1637 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:20.242 UTC [cauthdsl] func1 -> DEBU 1638 0xc003b78420 gate 1569284720242458200 evaluation starts" +"2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 1639 0xc003b78420 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 163a 0xc003b78420 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 163b 0xc003b78420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 163c 0xc003b78420 principal evaluation fails" +"2019-09-24 00:25:20.242 UTC [cauthdsl] func1 -> DEBU 163d 0xc003b78420 gate 1569284720242458200 evaluation fails" +"2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 163e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 163f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.242 UTC [policies] Evaluate -> DEBU 1640 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:20.242 UTC [cauthdsl] func1 -> DEBU 1641 0xc003b78c60 gate 1569284720242741400 evaluation starts" +"2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 1642 0xc003b78c60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 1643 0xc003b78c60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.242 UTC [cauthdsl] func2 -> DEBU 1644 0xc003b78c60 principal matched by identity 0" +"2019-09-24 00:25:20.242 UTC [msp.identity] Verify -> DEBU 1645 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:20.242 UTC [msp.identity] Verify -> DEBU 1646 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:20.243 UTC [cauthdsl] func2 -> DEBU 1647 0xc003b78c60 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:20.243 UTC [cauthdsl] func1 -> DEBU 1648 0xc003b78c60 gate 1569284720242741400 evaluation succeeds" +"2019-09-24 00:25:20.243 UTC [policies] Evaluate -> DEBU 1649 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.243 UTC [policies] Evaluate -> DEBU 164a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.243 UTC [policies] Evaluate -> DEBU 164b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:20.243 UTC [policies] Evaluate -> DEBU 164c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:20.243 UTC [gossip.gossip] handleMessage -> DEBU 164d Exiting" +"2019-09-24 00:25:20.280 UTC [msp] DeserializeIdentity -> DEBU 164e Obtaining identity" +"2019-09-24 00:25:20.280 UTC [msp] DeserializeIdentity -> DEBU 164f Obtaining identity" +"2019-09-24 00:25:20.280 UTC [gossip.pull] Hello -> DEBU 1650 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:20.280 UTC [msp] DeserializeIdentity -> DEBU 1651 Obtaining identity" +"2019-09-24 00:25:20.280 UTC [msp] DeserializeIdentity -> DEBU 1652 Obtaining identity" +"2019-09-24 00:25:20.280 UTC [gossip.comm] Send -> DEBU 1653 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:20.280 UTC [gossip.comm] sendToEndpoint -> DEBU 1654 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.280 UTC [gossip.comm] sendToEndpoint -> DEBU 1655 Exiting" +"2019-09-24 00:25:20.282 UTC [gossip.comm] func1 -> DEBU 1656 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.282 UTC [gossip.gossip] handleMessage -> DEBU 1657 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.283 UTC [gossip.pull] HandleMessage -> DEBU 1658 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.283 UTC [gossip.gossip] handleMessage -> DEBU 1659 Exiting" +"2019-09-24 00:25:20.628 UTC [gossip.comm] func1 -> DEBU 165a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.628 UTC [gossip.gossip] handleMessage -> DEBU 165b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.628 UTC [gossip.gossip] handleMessage -> DEBU 165c Exiting" +"2019-09-24 00:25:20.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 165d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.628 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 165e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:20.628 UTC [msp] DeserializeIdentity -> DEBU 165f Obtaining identity" +"2019-09-24 00:25:20.629 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1660 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:20.629 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1661 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.629 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1662 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 1663 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 1664 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 1665 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:20.629 UTC [cauthdsl] func1 -> DEBU 1666 0xc003c856c0 gate 1569284720629402300 evaluation starts" +"2019-09-24 00:25:20.629 UTC [cauthdsl] func2 -> DEBU 1667 0xc003c856c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.629 UTC [cauthdsl] func2 -> DEBU 1668 0xc003c856c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.629 UTC [cauthdsl] func2 -> DEBU 1669 0xc003c856c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:20.629 UTC [cauthdsl] func2 -> DEBU 166a 0xc003c856c0 principal evaluation fails" +"2019-09-24 00:25:20.629 UTC [cauthdsl] func1 -> DEBU 166b 0xc003c856c0 gate 1569284720629402300 evaluation fails" +"2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 166c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 166d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.629 UTC [policies] Evaluate -> DEBU 166e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:20.629 UTC [cauthdsl] func1 -> DEBU 166f 0xc003c85f00 gate 1569284720629941000 evaluation starts" +"2019-09-24 00:25:20.630 UTC [cauthdsl] func2 -> DEBU 1670 0xc003c85f00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.630 UTC [cauthdsl] func2 -> DEBU 1671 0xc003c85f00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.630 UTC [cauthdsl] func2 -> DEBU 1672 0xc003c85f00 principal matched by identity 0" +"2019-09-24 00:25:20.630 UTC [msp.identity] Verify -> DEBU 1673 Verify: digest = 00000000 14 2e 50 c2 c6 c6 27 33 17 01 0b 2a a3 c1 87 6a |..P...'3...*...j| +00000010 ad 61 78 15 02 11 d7 1f 31 f2 9a aa ed de 29 21 |.ax.....1.....)!|" +"2019-09-24 00:25:20.630 UTC [gossip.gossip] handleMessage -> DEBU 1674 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.630 UTC [msp.identity] Verify -> DEBU 1675 Verify: sig = 00000000 30 45 02 21 00 e2 41 73 6c 0e 73 bf 59 ae de 97 |0E.!..Asl.s.Y...| +00000010 ed 7f ca e1 98 0c cb 79 3f fe 05 27 73 04 27 76 |.......y?..'s.'v| +00000020 ac 3b ff 61 91 02 20 42 e8 01 61 bf 70 a3 be 6d |.;.a.. B..a.p..m| +00000030 46 26 4c b2 ba 9b 95 0a 25 36 19 7c f9 bc 06 85 |F&L.....%6.|....| +00000040 59 f5 e5 66 32 b9 12 |Y..f2..|" +"2019-09-24 00:25:20.631 UTC [cauthdsl] func2 -> DEBU 1676 0xc003c85f00 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:20.631 UTC [cauthdsl] func1 -> DEBU 1677 0xc003c85f00 gate 1569284720629941000 evaluation succeeds" +"2019-09-24 00:25:20.631 UTC [policies] Evaluate -> DEBU 1678 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.631 UTC [policies] Evaluate -> DEBU 1679 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.636 UTC [policies] Evaluate -> DEBU 167a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:20.636 UTC [policies] Evaluate -> DEBU 167b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:20.636 UTC [gossip.discovery] handleAliveMessage -> DEBU 167c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 167d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:20.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 167e updating membership: timestamp: " +"2019-09-24 00:25:20.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 167f Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:20.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 1680 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:20.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 1681 Exiting" +"2019-09-24 00:25:20.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 1682 Exiting" +"2019-09-24 00:25:20.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1683 Exiting" +"2019-09-24 00:25:20.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1684 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1685 Exiting" +"2019-09-24 00:25:20.637 UTC [msp] DeserializeIdentity -> DEBU 1686 Obtaining identity" +"2019-09-24 00:25:20.637 UTC [gossip.gossip] handleMessage -> DEBU 1687 Exiting" +"2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 1688 Obtaining identity" +"2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 1689 Obtaining identity" +"2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 168a Obtaining identity" +"2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 168b Obtaining identity" +"2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 168c Obtaining identity" +"2019-09-24 00:25:20.638 UTC [gossip.comm] Send -> DEBU 168d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:20.638 UTC [gossip.comm] func1 -> DEBU 168e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1690 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1691 Exiting" +"2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 168f Obtaining identity" +"2019-09-24 00:25:20.638 UTC [gossip.gossip] handleMessage -> DEBU 1692 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.638 UTC [msp] DeserializeIdentity -> DEBU 1693 Obtaining identity" +"2019-09-24 00:25:20.638 UTC [gossip.comm] Send -> DEBU 1694 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:20.638 UTC [gossip.gossip] handleMessage -> DEBU 1695 Exiting" +"2019-09-24 00:25:20.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1696 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1697 Exiting" +"2019-09-24 00:25:20.638 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1698 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1699 Exiting" +"2019-09-24 00:25:20.648 UTC [gossip.comm] func1 -> DEBU 169a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.648 UTC [gossip.gossip] handleMessage -> DEBU 169b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.648 UTC [gossip.gossip] handleMessage -> DEBU 169c Exiting" +"2019-09-24 00:25:20.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 169d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.649 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 169e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:20.649 UTC [msp] DeserializeIdentity -> DEBU 169f Obtaining identity" +"2019-09-24 00:25:20.649 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16a0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:20.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16a1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16a2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:20.649 UTC [policies] Evaluate -> DEBU 16a3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:20.649 UTC [policies] Evaluate -> DEBU 16a4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:20.649 UTC [policies] Evaluate -> DEBU 16a5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:20.649 UTC [cauthdsl] func1 -> DEBU 16a6 0xc00255b690 gate 1569284720649648700 evaluation starts" +"2019-09-24 00:25:20.649 UTC [cauthdsl] func2 -> DEBU 16a7 0xc00255b690 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.650 UTC [cauthdsl] func2 -> DEBU 16a8 0xc00255b690 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.650 UTC [cauthdsl] func2 -> DEBU 16a9 0xc00255b690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:20.650 UTC [cauthdsl] func2 -> DEBU 16aa 0xc00255b690 principal evaluation fails" +"2019-09-24 00:25:20.650 UTC [cauthdsl] func1 -> DEBU 16ab 0xc00255b690 gate 1569284720649648700 evaluation fails" +"2019-09-24 00:25:20.650 UTC [policies] Evaluate -> DEBU 16ac Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.650 UTC [policies] Evaluate -> DEBU 16ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:20.650 UTC [policies] Evaluate -> DEBU 16ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:20.650 UTC [cauthdsl] func1 -> DEBU 16af 0xc00255bed0 gate 1569284720650703600 evaluation starts" +"2019-09-24 00:25:20.653 UTC [cauthdsl] func2 -> DEBU 16b0 0xc00255bed0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.653 UTC [cauthdsl] func2 -> DEBU 16b1 0xc00255bed0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.653 UTC [cauthdsl] func2 -> DEBU 16b2 0xc00255bed0 principal matched by identity 0" +"2019-09-24 00:25:20.653 UTC [msp.identity] Verify -> DEBU 16b3 Verify: digest = 00000000 7b 27 9f 10 ca 64 de 30 f6 0d db 1f 0d b3 4a 47 |{'...d.0......JG| +00000010 07 63 97 6b 9b c7 0c 12 a2 ca ed f2 19 30 ff 5f |.c.k.........0._|" +"2019-09-24 00:25:20.653 UTC [msp.identity] Verify -> DEBU 16b4 Verify: sig = 00000000 30 45 02 21 00 88 3a 1b cb a7 2e 74 82 6e 06 a2 |0E.!..:....t.n..| +00000010 e3 e8 99 b1 33 fb 5d ec 50 ab 94 6a a9 4a ab c0 |....3.].P..j.J..| +00000020 aa 0f c1 65 9b 02 20 61 a6 1e 47 f9 d2 47 0b ce |...e.. a..G..G..| +00000030 b8 bc 82 2d 78 20 52 72 79 87 83 a4 aa 9d 6e 8a |...-x Rry.....n.| +00000040 b9 7d 36 e1 cb 5f dd |.}6.._.|" +"2019-09-24 00:25:20.653 UTC [cauthdsl] func2 -> DEBU 16b5 0xc00255bed0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:20.653 UTC [cauthdsl] func1 -> DEBU 16b6 0xc00255bed0 gate 1569284720650703600 evaluation succeeds" +"2019-09-24 00:25:20.653 UTC [policies] Evaluate -> DEBU 16b7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.654 UTC [policies] Evaluate -> DEBU 16b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:20.654 UTC [policies] Evaluate -> DEBU 16b9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:20.654 UTC [policies] Evaluate -> DEBU 16ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:20.654 UTC [gossip.discovery] handleAliveMessage -> DEBU 16bb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:20.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 16bc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:20.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 16bd updating membership: timestamp: " +"2019-09-24 00:25:20.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 16be Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:20.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 16bf Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:20.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 16c0 Exiting" +"2019-09-24 00:25:20.654 UTC [gossip.discovery] handleAliveMessage -> DEBU 16c1 Exiting" +"2019-09-24 00:25:20.654 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16c2 Exiting" +"2019-09-24 00:25:20.654 UTC [gossip.discovery] sendMemResponse -> DEBU 16c3 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:20.655 UTC [msp] DeserializeIdentity -> DEBU 16c4 Obtaining identity" +"2019-09-24 00:25:20.655 UTC [msp] DeserializeIdentity -> DEBU 16c5 Obtaining identity" +"2019-09-24 00:25:20.655 UTC [msp] DeserializeIdentity -> DEBU 16c6 Obtaining identity" +"2019-09-24 00:25:20.655 UTC [gossip.comm] Send -> DEBU 16c7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:20.655 UTC [gossip.discovery] sendMemResponse -> DEBU 16c8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\037" signature:"0E\002!\000\352\026\301W\002\261\254\306\010\271\356\221&\366\031\034\343\230\035\032\250\261g[\271\034\246\360\226\033_K\002 W\252(\244J\"\301\354\245\222.+3\212\227\026*A\363\272\253\273N`\367\300\003\244\351\227\327^" > alive: alive: alive: " +"2019-09-24 00:25:20.655 UTC [gossip.comm] sendToEndpoint -> DEBU 16c9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.658 UTC [gossip.comm] sendToEndpoint -> DEBU 16ca Exiting" +"2019-09-24 00:25:20.665 UTC [gossip.comm] func1 -> DEBU 16cb Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.665 UTC [gossip.gossip] handleMessage -> DEBU 16cc Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.665 UTC [gossip.pull] HandleMessage -> DEBU 16cd GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16ce Obtaining identity" +"2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16cf Obtaining identity" +"2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16d0 Obtaining identity" +"2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16d1 Obtaining identity" +"2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16d2 Obtaining identity" +"2019-09-24 00:25:20.665 UTC [msp] DeserializeIdentity -> DEBU 16d3 Obtaining identity" +"2019-09-24 00:25:20.665 UTC [gossip.pull] SendDigest -> DEBU 16d4 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:20.666 UTC [gossip.gossip] handleMessage -> DEBU 16d5 Exiting" +"2019-09-24 00:25:20.683 UTC [gossip.comm] func1 -> DEBU 16d6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.683 UTC [gossip.gossip] handleMessage -> DEBU 16d7 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.683 UTC [msp] DeserializeIdentity -> DEBU 16d8 Obtaining identity" +"2019-09-24 00:25:20.683 UTC [msp] DeserializeIdentity -> DEBU 16d9 Obtaining identity" +"2019-09-24 00:25:20.684 UTC [gossip.gossip] handleMessage -> DEBU 16da Exiting" +"2019-09-24 00:25:20.712 UTC [gossip.comm] func1 -> DEBU 16db Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.713 UTC [gossip.gossip] handleMessage -> DEBU 16dc Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.713 UTC [gossip.pull] HandleMessage -> DEBU 16dd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:20.715 UTC [gossip.pull] SendDigest -> DEBU 16de Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:20.716 UTC [gossip.gossip] handleMessage -> DEBU 16df Exiting" +"2019-09-24 00:25:20.896 UTC [endorser] ProcessProposal -> DEBU 16e0 Entering: request from 172.18.0.9:50708" +"2019-09-24 00:25:20.897 UTC [protoutils] ValidateProposalMessage -> DEBU 16e1 ValidateProposalMessage starts for signed proposal 0xc00311b680" +"2019-09-24 00:25:20.897 UTC [protoutils] validateChannelHeader -> DEBU 16e2 validateChannelHeader info: header type 3" +"2019-09-24 00:25:20.897 UTC [protoutils] checkSignatureFromCreator -> DEBU 16e3 begin" +"2019-09-24 00:25:20.897 UTC [msp] GetManagerForChain -> DEBU 16e4 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:25:20.897 UTC [msp] DeserializeIdentity -> DEBU 16e5 Obtaining identity" +"2019-09-24 00:25:20.897 UTC [msp.identity] newIdentity -> DEBU 16e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-09-24 00:25:20.897 UTC [protoutils] checkSignatureFromCreator -> DEBU 16e7 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:25:20.898 UTC [msp] Validate -> DEBU 16e8 MSP Org1MSP validating identity" +"2019-09-24 00:25:20.898 UTC [msp] getCertificationChain -> DEBU 16e9 MSP Org1MSP getting certification chain" +"2019-09-24 00:25:20.898 UTC [protoutils] checkSignatureFromCreator -> DEBU 16ea creator is valid" +"2019-09-24 00:25:20.898 UTC [msp.identity] Verify -> DEBU 16eb Verify: digest = 00000000 81 54 6e 71 4c 13 01 d2 b2 33 1b fe e2 ce a9 73 |.TnqL....3.....s| +00000010 cf 58 2a 85 1c c4 6b f0 75 56 c3 b7 90 68 82 56 |.X*...k.uV...h.V|" +"2019-09-24 00:25:20.898 UTC [msp.identity] Verify -> DEBU 16ec Verify: sig = 00000000 30 45 02 21 00 e9 fc 23 ef 06 c8 84 79 fe 17 bc |0E.!...#....y...| +00000010 08 fc b3 a8 14 bd 21 f6 4d a6 45 61 8b 8c c8 76 |......!.M.Ea...v| +00000020 4f 12 29 bf 92 02 20 12 96 e7 0c 01 cc a7 d4 1a |O.)... .........| +00000030 e4 da 30 95 de da 7a 5e ef 25 5b 73 57 60 95 36 |..0...z^.%[sW`.6| +00000040 8d 82 9e 5b 6f 1b e7 |...[o..|" +"2019-09-24 00:25:20.898 UTC [protoutils] checkSignatureFromCreator -> DEBU 16ed exits successfully" +"2019-09-24 00:25:20.898 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 16ee validateChaincodeProposalMessage starts for proposal 0xc002704770, header 0xc00311ba90" +"2019-09-24 00:25:20.898 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 16ef validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 00:25:20.898 UTC [endorser] preProcess -> DEBU 16f0 [businesschannel][220bb88b] processing txid: 220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7" +"2019-09-24 00:25:20.899 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 16f1 retrieveTransactionByID() - txId = [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7]" +"2019-09-24 00:25:20.899 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 16f2 constructing new tx simulator" +"2019-09-24 00:25:20.899 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 16f3 constructing new tx simulator txid = [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7]" +"2019-09-24 00:25:20.899 UTC [endorser] SimulateProposal -> DEBU 16f4 [businesschannel][220bb88b] Entry chaincode: name:"lscc" " +"2019-09-24 00:25:20.899 UTC [endorser] callChaincode -> INFO 16f5 [businesschannel][220bb88b] Entry chaincode: name:"lscc" " +"2019-09-24 00:25:20.899 UTC [chaincode] Execute -> DEBU 16f6 Entry" +"2019-09-24 00:25:20.899 UTC [chaincode] handleMessage -> DEBU 16f7 [220bb88b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:25:20.899 UTC [chaincode] HandleTransaction -> DEBU 16f8 [220bb88b] handling GET_STATE from chaincode" +"2019-09-24 00:25:20.899 UTC [chaincode] HandleGetState -> DEBU 16f9 [220bb88b] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-09-24 00:25:20.899 UTC [stateleveldb] GetState -> DEBU 16fa GetState(). ns=lscc, key=exp02" +"2019-09-24 00:25:20.899 UTC [chaincode] HandleGetState -> DEBU 16fb [220bb88b] No state associated with key: exp02. Sending RESPONSE with an empty payload" +"2019-09-24 00:25:20.899 UTC [chaincode] HandleTransaction -> DEBU 16fc [220bb88b] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:25:20.903 UTC [msp] GetManagerForChain -> DEBU 16fd Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:25:20.903 UTC [cauthdsl] func1 -> DEBU 16fe 0xc0033e8ce0 gate 1569284720903654700 evaluation starts" +"2019-09-24 00:25:20.903 UTC [cauthdsl] func2 -> DEBU 16ff 0xc0033e8ce0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:20.904 UTC [cauthdsl] func2 -> DEBU 1700 0xc0033e8ce0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:20.904 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1701 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-09-24 00:25:20.904 UTC [cauthdsl] func2 -> DEBU 1702 0xc0033e8ce0 principal matched by identity 0" +"2019-09-24 00:25:20.904 UTC [msp.identity] Verify -> DEBU 1703 Verify: digest = 00000000 81 54 6e 71 4c 13 01 d2 b2 33 1b fe e2 ce a9 73 |.TnqL....3.....s| +00000010 cf 58 2a 85 1c c4 6b f0 75 56 c3 b7 90 68 82 56 |.X*...k.uV...h.V|" +"2019-09-24 00:25:20.904 UTC [msp.identity] Verify -> DEBU 1704 Verify: sig = 00000000 30 45 02 21 00 e9 fc 23 ef 06 c8 84 79 fe 17 bc |0E.!...#....y...| +00000010 08 fc b3 a8 14 bd 21 f6 4d a6 45 61 8b 8c c8 76 |......!.M.Ea...v| +00000020 4f 12 29 bf 92 02 20 12 96 e7 0c 01 cc a7 d4 1a |O.)... .........| +00000030 e4 da 30 95 de da 7a 5e ef 25 5b 73 57 60 95 36 |..0...z^.%[sW`.6| +00000040 8d 82 9e 5b 6f 1b e7 |...[o..|" +"2019-09-24 00:25:20.905 UTC [cauthdsl] func2 -> DEBU 1705 0xc0033e8ce0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:20.905 UTC [cauthdsl] func2 -> DEBU 1706 0xc0033e8ce0 signed by 1 principal evaluation starts (used [true])" +"2019-09-24 00:25:20.905 UTC [cauthdsl] func2 -> DEBU 1707 0xc0033e8ce0 skipping identity 0 because it has already been used" +"2019-09-24 00:25:20.905 UTC [cauthdsl] func2 -> DEBU 1708 0xc0033e8ce0 principal evaluation fails" +"2019-09-24 00:25:20.905 UTC [cauthdsl] func1 -> DEBU 1709 0xc0033e8ce0 gate 1569284720903654700 evaluation succeeds" +"2019-09-24 00:25:20.906 UTC [chaincode] handleMessage -> DEBU 170a [220bb88b] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 00:25:20.906 UTC [chaincode] HandleTransaction -> DEBU 170b [220bb88b] handling PUT_STATE from chaincode" +"2019-09-24 00:25:20.906 UTC [chaincode] HandleTransaction -> DEBU 170c [220bb88b] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 00:25:20.906 UTC [lscc] putChaincodeCollectionData -> DEBU 170d No collection configuration specified" +"2019-09-24 00:25:20.907 UTC [chaincode] handleMessage -> DEBU 170e [220bb88b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:25:20.907 UTC [chaincode] Notify -> DEBU 170f [220bb88b] notifying Txid:220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7, channelID:businesschannel" +"2019-09-24 00:25:20.907 UTC [chaincode] Execute -> DEBU 1710 Exit" +"2019-09-24 00:25:20.908 UTC [chaincode] LaunchConfig -> DEBU 1711 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-09-24 00:25:20.908 UTC [chaincode] Start -> DEBU 1712 start container: exp02:1.0" +"2019-09-24 00:25:20.908 UTC [chaincode] Start -> DEBU 1713 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-09-24 00:25:20.909 UTC [chaincode] Start -> DEBU 1714 start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=exp02:1.0 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-09-24 00:25:20.909 UTC [container] lockContainer -> DEBU 1715 waiting for container(exp02-1.0) lock" +"2019-09-24 00:25:20.909 UTC [container] lockContainer -> DEBU 1716 got container (exp02-1.0) lock" +"2019-09-24 00:25:20.910 UTC [dockercontroller] stopInternal -> DEBU 1717 stopping container" id=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 00:25:20.930 UTC [dockercontroller] stopInternal -> DEBU 1718 stop container result" error="No such container: dev-peer0.org1.example.com-exp02-1.0" +"2019-09-24 00:25:20.930 UTC [dockercontroller] stopInternal -> DEBU 1719 killing container" id=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 00:25:20.963 UTC [dockercontroller] stopInternal -> DEBU 171a kill container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +"2019-09-24 00:25:20.963 UTC [dockercontroller] stopInternal -> DEBU 171b removing container" id=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 00:25:20.988 UTC [dockercontroller] stopInternal -> DEBU 171c remove container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +"2019-09-24 00:25:20.988 UTC [dockercontroller] createContainer -> DEBU 171d create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 00:25:20.988 UTC [dockercontroller] getDockerHostConfig -> DEBU 171e docker container hostconfig NetworkMode: hlf_net" +"2019-09-24 00:25:21.066 UTC [chaincode.platform] GenerateDockerfile -> DEBU 171f +FROM hyperledger/fabric-baseos:amd64-0.4.15 +ADD binpackage.tar /usr/local/bin +LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ + org.hyperledger.fabric.chaincode.id.version="1.0" \ + org.hyperledger.fabric.chaincode.type="GOLANG" \ + org.hyperledger.fabric.version="1.4.2" \ + org.hyperledger.fabric.base.version="0.4.15" +ENV CORE_CHAINCODE_BUILDLEVEL=1.4.2" +"2019-09-24 00:25:21.088 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 1720 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +"2019-09-24 00:25:21.089 UTC [chaincode.platform.util] DockerBuild -> DEBU 1721 Attempting build with image hyperledger/fabric-ccenv:latest" +"2019-09-24 00:25:21.183 UTC [gossip.gossip] handleMessage -> DEBU 1722 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:21.183 UTC [msp] DeserializeIdentity -> DEBU 1723 Obtaining identity" +"2019-09-24 00:25:21.183 UTC [msp] DeserializeIdentity -> DEBU 1724 Obtaining identity" +"2019-09-24 00:25:21.184 UTC [msp] DeserializeIdentity -> DEBU 1725 Obtaining identity" +"2019-09-24 00:25:21.184 UTC [gossip.gossip] handleMessage -> DEBU 1726 Exiting" +"2019-09-24 00:25:21.673 UTC [gossip.comm] func1 -> DEBU 1727 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:21.673 UTC [gossip.gossip] handleMessage -> DEBU 1728 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:21.674 UTC [gossip.pull] HandleMessage -> DEBU 1729 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:21.674 UTC [gossip.pull] SendDigest -> DEBU 172a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:21.674 UTC [gossip.gossip] handleMessage -> DEBU 172b Exiting" +"2019-09-24 00:25:21.691 UTC [gossip.comm] func1 -> DEBU 172c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020 " signature:"0D\002 ;\007\206\032J\240;D?\217\005s\246\274\366\226\226\317+\334\246\363\024i\002\326Y\225!\321\356\230\002 b\220\007\257\342,\310\217\257\274\300\335\001\347F\250\304\177\304\003\024E\232\241\265\213\375\034Z\333\267\300" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:21.692 UTC [gossip.gossip] handleMessage -> DEBU 172d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020 " signature:"0D\002 ;\007\206\032J\240;D?\217\005s\246\274\366\226\226\317+\334\246\363\024i\002\326Y\225!\321\356\230\002 b\220\007\257\342,\310\217\257\274\300\335\001\347F\250\304\177\304\003\024E\232\241\265\213\375\034Z\333\267\300" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:21.692 UTC [gossip.gossip] handleMessage -> DEBU 172e Exiting" +"2019-09-24 00:25:21.692 UTC [gossip.discovery] handleMsgFromComm -> DEBU 172f Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020 " signature:"0D\002 ;\007\206\032J\240;D?\217\005s\246\274\366\226\226\317+\334\246\363\024i\002\326Y\225!\321\356\230\002 b\220\007\257\342,\310\217\257\274\300\335\001\347F\250\304\177\304\003\024E\232\241\265\213\375\034Z\333\267\300" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:21.692 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1730 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:21.692 UTC [msp.identity] Verify -> DEBU 1731 Verify: digest = 00000000 bc 0a 41 b7 70 17 85 38 68 3d c5 a6 ad fb cb 0c |..A.p..8h=......| +00000010 c3 4a 60 54 1e 78 b1 85 0c 26 b6 a2 29 a2 3d c7 |.J`T.x...&..).=.|" +"2019-09-24 00:25:21.693 UTC [msp.identity] Verify -> DEBU 1732 Verify: sig = 00000000 30 44 02 20 3b 07 86 1a 4a a0 3b 44 3f 8f 05 73 |0D. ;...J.;D?..s| +00000010 a6 bc f6 96 96 cf 2b dc a6 f3 14 69 02 d6 59 95 |......+....i..Y.| +00000020 21 d1 ee 98 02 20 62 90 07 af e2 2c c8 8f af bc |!.... b....,....| +00000030 c0 dd 01 e7 46 a8 c4 7f c4 03 14 45 9a a1 b5 8b |....F......E....| +00000040 fd 1c 5a db b7 c0 |..Z...|" +"2019-09-24 00:25:21.693 UTC [msp.identity] Verify -> DEBU 1733 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:21.693 UTC [msp.identity] Verify -> DEBU 1734 Verify: sig = 00000000 30 44 02 20 5a 19 9b 93 36 51 70 8a 28 29 21 e4 |0D. Z...6Qp.()!.| +00000010 68 1a 8e b4 76 f0 a0 8a 50 a4 bc 4d 70 62 55 ab |h...v...P..MpbU.| +00000020 ce 3b 1f 24 02 20 1e 98 b9 ec 33 af d7 cb f8 57 |.;.$. ....3....W| +00000030 ce ab 43 a3 11 c0 e9 80 c9 e8 eb d7 08 f8 d8 5e |..C............^| +00000040 9d fd 6b 8c 32 f7 |..k.2.|" +"2019-09-24 00:25:21.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 1735 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:21.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 1736 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:21.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 1737 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:21.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1738 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:21.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 1739 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:21.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 173a Exiting" +"2019-09-24 00:25:21.694 UTC [gossip.discovery] handleAliveMessage -> DEBU 173b Exiting" +"2019-09-24 00:25:21.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 173c Exiting" +"2019-09-24 00:25:21.694 UTC [gossip.discovery] sendMemResponse -> DEBU 173d Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:21.694 UTC [msp] DeserializeIdentity -> DEBU 173e Obtaining identity" +"2019-09-24 00:25:21.694 UTC [msp] DeserializeIdentity -> DEBU 173f Obtaining identity" +"2019-09-24 00:25:21.694 UTC [gossip.comm] Send -> DEBU 1740 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:21.697 UTC [gossip.comm] sendToEndpoint -> DEBU 1741 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:21.698 UTC [gossip.comm] sendToEndpoint -> DEBU 1742 Exiting" +"2019-09-24 00:25:21.698 UTC [gossip.discovery] sendMemResponse -> DEBU 1743 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020 " signature:"0D\002 ;\007\206\032J\240;D?\217\005s\246\274\366\226\226\317+\334\246\363\024i\002\326Y\225!\321\356\230\002 b\220\007\257\342,\310\217\257\274\300\335\001\347F\250\304\177\304\003\024E\232\241\265\213\375\034Z\333\267\300" secret_envelope: > alive: " +"2019-09-24 00:25:22.114 UTC [gossip.comm] func1 -> DEBU 1744 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:22.114 UTC [gossip.gossip] handleMessage -> DEBU 1745 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:22.114 UTC [msp] DeserializeIdentity -> DEBU 1746 Obtaining identity" +"2019-09-24 00:25:22.115 UTC [msp] DeserializeIdentity -> DEBU 1747 Obtaining identity" +"2019-09-24 00:25:22.115 UTC [msp] DeserializeIdentity -> DEBU 1748 Obtaining identity" +"2019-09-24 00:25:22.115 UTC [gossip.gossip] handleMessage -> DEBU 1749 Exiting" +"2019-09-24 00:25:22.276 UTC [gossip.election] waitForInterrupt -> DEBU 174a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:22.276 UTC [gossip.election] IsLeader -> DEBU 174b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:25:22.276 UTC [msp] GetDefaultSigningIdentity -> DEBU 174c Obtaining default signing identity" +"2019-09-24 00:25:22.276 UTC [msp.identity] Sign -> DEBU 174d Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510061801 " +"2019-09-24 00:25:22.276 UTC [msp.identity] Sign -> DEBU 174e Sign: digest: A46BC04CFC8A183CA60690C75412DE299D4E3C6027DDE38FBCDDDE66D82E9DD5 " +"2019-09-24 00:25:22.276 UTC [gossip.election] waitForInterrupt -> DEBU 174f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:25:22.285 UTC [msp] DeserializeIdentity -> DEBU 1750 Obtaining identity" +"2019-09-24 00:25:22.285 UTC [msp] DeserializeIdentity -> DEBU 1751 Obtaining identity" +"2019-09-24 00:25:22.285 UTC [msp] DeserializeIdentity -> DEBU 1752 Obtaining identity" +"2019-09-24 00:25:22.286 UTC [msp] DeserializeIdentity -> DEBU 1753 Obtaining identity" +"2019-09-24 00:25:22.286 UTC [gossip.comm] Send -> DEBU 1754 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:22.286 UTC [msp] DeserializeIdentity -> DEBU 1755 Obtaining identity" +"2019-09-24 00:25:22.286 UTC [msp] DeserializeIdentity -> DEBU 1756 Obtaining identity" +"2019-09-24 00:25:22.286 UTC [gossip.comm] sendToEndpoint -> DEBU 1757 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.286 UTC [gossip.comm] sendToEndpoint -> DEBU 1758 Exiting" +"2019-09-24 00:25:22.678 UTC [gossip.comm] func1 -> DEBU 1759 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.678 UTC [gossip.gossip] handleMessage -> DEBU 175a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.678 UTC [gossip.gossip] handleMessage -> DEBU 175b Exiting" +"2019-09-24 00:25:22.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 175c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.678 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 175d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:22.678 UTC [msp.identity] Verify -> DEBU 175e Verify: digest = 00000000 2a 9f 4d a6 e9 7c 11 b7 87 4f be c2 ed fc ee 9c |*.M..|...O......| +00000010 a7 02 80 10 99 4c 72 9e 33 e9 cd f2 83 9e 6e 95 |.....Lr.3.....n.|" +"2019-09-24 00:25:22.678 UTC [msp.identity] Verify -> DEBU 175f Verify: sig = 00000000 30 45 02 21 00 9d cd 16 7f e4 e9 12 84 1f 01 e8 |0E.!............| +00000010 ad 08 e9 2d 5d 35 2c 13 30 53 e4 f2 a6 d6 53 76 |...-]5,.0S....Sv| +00000020 80 a1 de df ff 02 20 59 87 7c 69 85 eb ec 7c 6b |...... Y.|i...|k| +00000030 7c 56 9a 2d 8d be 8a 14 f6 f4 d1 30 04 b8 1c 03 ||V.-.......0....| +00000040 24 a8 cf 28 39 69 12 |$..(9i.|" +"2019-09-24 00:25:22.680 UTC [gossip.discovery] handleAliveMessage -> DEBU 1760 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1761 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:22.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1762 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:22.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1763 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:22.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1764 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:22.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1765 Exiting" +"2019-09-24 00:25:22.680 UTC [gossip.discovery] handleAliveMessage -> DEBU 1766 Exiting" +"2019-09-24 00:25:22.681 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1767 Exiting" +"2019-09-24 00:25:22.685 UTC [gossip.comm] func1 -> DEBU 1768 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.685 UTC [gossip.gossip] handleMessage -> DEBU 1769 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.685 UTC [gossip.gossip] handleMessage -> DEBU 176a Exiting" +"2019-09-24 00:25:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 176b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 176c Exiting" +"2019-09-24 00:25:22.686 UTC [msp] DeserializeIdentity -> DEBU 176d Obtaining identity" +"2019-09-24 00:25:22.686 UTC [msp] DeserializeIdentity -> DEBU 176e Obtaining identity" +"2019-09-24 00:25:22.686 UTC [msp] DeserializeIdentity -> DEBU 176f Obtaining identity" +"2019-09-24 00:25:22.686 UTC [gossip.comm] Send -> DEBU 1770 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:22.686 UTC [msp] DeserializeIdentity -> DEBU 1771 Obtaining identity" +"2019-09-24 00:25:22.686 UTC [gossip.comm] Send -> DEBU 1772 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:22.686 UTC [gossip.comm] sendToEndpoint -> DEBU 1773 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.686 UTC [gossip.comm] sendToEndpoint -> DEBU 1774 Exiting" +"2019-09-24 00:25:22.687 UTC [gossip.comm] sendToEndpoint -> DEBU 1775 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.687 UTC [gossip.comm] sendToEndpoint -> DEBU 1776 Exiting" +"2019-09-24 00:25:22.692 UTC [gossip.gossip] handleMessage -> DEBU 1777 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.692 UTC [gossip.gossip] handleMessage -> DEBU 1778 Exiting" +"2019-09-24 00:25:22.692 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1779 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:22.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 177a Exiting" +"2019-09-24 00:25:23.603 UTC [gossip.pull] Hello -> DEBU 177b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:23.603 UTC [gossip.comm] Send -> DEBU 177c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:23.603 UTC [gossip.pull] Hello -> DEBU 177d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:23.603 UTC [gossip.comm] Send -> DEBU 177e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:23.603 UTC [gossip.pull] Hello -> DEBU 177f Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:23.603 UTC [gossip.comm] Send -> DEBU 1780 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:23.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1781 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1782 Exiting" +"2019-09-24 00:25:23.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1783 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1784 Exiting" +"2019-09-24 00:25:23.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1785 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1786 Exiting" +"2019-09-24 00:25:23.606 UTC [gossip.comm] func1 -> DEBU 1787 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.606 UTC [gossip.gossip] handleMessage -> DEBU 1788 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.606 UTC [gossip.pull] HandleMessage -> DEBU 1789 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.606 UTC [gossip.gossip] handleMessage -> DEBU 178a Exiting" +"2019-09-24 00:25:23.608 UTC [gossip.comm] func1 -> DEBU 178b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.608 UTC [gossip.gossip] handleMessage -> DEBU 178c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.608 UTC [gossip.pull] HandleMessage -> DEBU 178d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.608 UTC [gossip.gossip] handleMessage -> DEBU 178e Exiting" +"2019-09-24 00:25:23.609 UTC [gossip.gossip] handleMessage -> DEBU 178f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.609 UTC [gossip.pull] HandleMessage -> DEBU 1790 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.609 UTC [gossip.gossip] handleMessage -> DEBU 1791 Exiting" +"2019-09-24 00:25:23.623 UTC [msp] GetDefaultSigningIdentity -> DEBU 1792 Obtaining default signing identity" +"2019-09-24 00:25:23.624 UTC [msp.identity] Sign -> DEBU 1793 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101D " +"2019-09-24 00:25:23.624 UTC [msp.identity] Sign -> DEBU 1794 Sign: digest: FDA2D8463471AC97E725208AD2107052F997547547CAAD795690399CD20E947D " +"2019-09-24 00:25:23.624 UTC [msp] GetDefaultSigningIdentity -> DEBU 1795 Obtaining default signing identity" +"2019-09-24 00:25:23.624 UTC [msp.identity] Sign -> DEBU 1796 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:23.624 UTC [msp.identity] Sign -> DEBU 1797 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:23.625 UTC [gossip.comm] Send -> DEBU 1798 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:23.625 UTC [msp] DeserializeIdentity -> DEBU 1799 Obtaining identity" +"2019-09-24 00:25:23.625 UTC [gossip.comm] Send -> DEBU 179a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:23.625 UTC [gossip.comm] sendToEndpoint -> DEBU 179b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.625 UTC [gossip.comm] sendToEndpoint -> DEBU 179d Exiting" +"2019-09-24 00:25:23.625 UTC [msp] DeserializeIdentity -> DEBU 179c Obtaining identity" +"2019-09-24 00:25:23.625 UTC [gossip.comm] Send -> DEBU 179e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:23.626 UTC [gossip.comm] sendToEndpoint -> DEBU 179f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.627 UTC [gossip.comm] sendToEndpoint -> DEBU 17a0 Exiting" +"2019-09-24 00:25:23.628 UTC [gossip.comm] sendToEndpoint -> DEBU 17a1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.628 UTC [gossip.comm] sendToEndpoint -> DEBU 17a2 Exiting" +"2019-09-24 00:25:23.628 UTC [gossip.comm] func1 -> DEBU 17a3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.628 UTC [gossip.gossip] handleMessage -> DEBU 17a4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.628 UTC [gossip.gossip] handleMessage -> DEBU 17a5 Exiting" +"2019-09-24 00:25:23.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.628 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17a7 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:23.629 UTC [msp.identity] Verify -> DEBU 17a8 Verify: digest = 00000000 fd a2 d8 46 34 71 ac 97 e7 25 20 8a d2 10 70 52 |...F4q...% ...pR| +00000010 f9 97 54 75 47 ca ad 79 56 90 39 9c d2 0e 94 7d |..TuG..yV.9....}|" +"2019-09-24 00:25:23.629 UTC [msp.identity] Verify -> DEBU 17a9 Verify: sig = 00000000 30 45 02 21 00 f9 37 c1 69 38 07 17 02 42 b8 01 |0E.!..7.i8...B..| +00000010 f6 ac 2b 96 f5 e3 02 c2 1b 89 5c 01 cc 87 31 19 |..+.......\...1.| +00000020 b5 c1 20 fd 37 02 20 4c 2f d6 fa 9e 7d 60 ab df |.. .7. L/...}`..| +00000030 b2 61 19 95 ba 46 8d 6f 56 c1 4c 7a 38 a9 ad 63 |.a...F.oV.Lz8..c| +00000040 cb 17 ee e8 79 1c 5d |....y.]|" +"2019-09-24 00:25:23.629 UTC [msp.identity] Verify -> DEBU 17aa Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:23.629 UTC [msp.identity] Verify -> DEBU 17ab Verify: sig = 00000000 30 44 02 20 33 7d f7 48 e4 54 5b 82 5e e0 58 10 |0D. 3}.H.T[.^.X.| +00000010 c9 1a c6 2f b4 e4 d4 d8 01 42 c2 6c 22 d3 26 33 |.../.....B.l".&3| +00000020 f5 16 0d 4b 02 20 74 0d 10 46 96 5f 13 63 36 90 |...K. t..F._.c6.| +00000030 de ed 78 ee f0 be a3 e9 36 fe ff 12 4d bd a0 2b |..x.....6...M..+| +00000040 e4 bb 56 88 6e c1 |..V.n.|" +"2019-09-24 00:25:23.629 UTC [gossip.comm] func1 -> DEBU 17ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 17ad Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:23.630 UTC [gossip.gossip] handleMessage -> DEBU 17ae Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.630 UTC [gossip.discovery] isSentByMe -> DEBU 17af Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:23.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 17b0 Exiting" +"2019-09-24 00:25:23.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17b1 Exiting" +"2019-09-24 00:25:23.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.630 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17b3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:23.634 UTC [gossip.gossip] handleMessage -> DEBU 17b4 Exiting" +"2019-09-24 00:25:23.637 UTC [msp.identity] Verify -> DEBU 17b5 Verify: digest = 00000000 fd a2 d8 46 34 71 ac 97 e7 25 20 8a d2 10 70 52 |...F4q...% ...pR| +00000010 f9 97 54 75 47 ca ad 79 56 90 39 9c d2 0e 94 7d |..TuG..yV.9....}|" +"2019-09-24 00:25:23.647 UTC [msp.identity] Verify -> DEBU 17b7 Verify: sig = 00000000 30 45 02 21 00 f9 37 c1 69 38 07 17 02 42 b8 01 |0E.!..7.i8...B..| +00000010 f6 ac 2b 96 f5 e3 02 c2 1b 89 5c 01 cc 87 31 19 |..+.......\...1.| +00000020 b5 c1 20 fd 37 02 20 4c 2f d6 fa 9e 7d 60 ab df |.. .7. L/...}`..| +00000030 b2 61 19 95 ba 46 8d 6f 56 c1 4c 7a 38 a9 ad 63 |.a...F.oV.Lz8..c| +00000040 cb 17 ee e8 79 1c 5d |....y.]|" +"2019-09-24 00:25:23.646 UTC [gossip.gossip] handleMessage -> DEBU 17b6 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 17b8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:23.648 UTC [gossip.discovery] isSentByMe -> DEBU 17b9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:23.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 17ba Exiting" +"2019-09-24 00:25:23.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17bb Exiting" +"2019-09-24 00:25:23.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.649 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17bd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:23.650 UTC [gossip.gossip] handleMessage -> DEBU 17be Exiting" +"2019-09-24 00:25:23.650 UTC [msp.identity] Verify -> DEBU 17bf Verify: digest = 00000000 fd a2 d8 46 34 71 ac 97 e7 25 20 8a d2 10 70 52 |...F4q...% ...pR| +00000010 f9 97 54 75 47 ca ad 79 56 90 39 9c d2 0e 94 7d |..TuG..yV.9....}|" +"2019-09-24 00:25:23.650 UTC [msp.identity] Verify -> DEBU 17c0 Verify: sig = 00000000 30 45 02 21 00 f9 37 c1 69 38 07 17 02 42 b8 01 |0E.!..7.i8...B..| +00000010 f6 ac 2b 96 f5 e3 02 c2 1b 89 5c 01 cc 87 31 19 |..+.......\...1.| +00000020 b5 c1 20 fd 37 02 20 4c 2f d6 fa 9e 7d 60 ab df |.. .7. L/...}`..| +00000030 b2 61 19 95 ba 46 8d 6f 56 c1 4c 7a 38 a9 ad 63 |.a...F.oV.Lz8..c| +00000040 cb 17 ee e8 79 1c 5d |....y.]|" +"2019-09-24 00:25:23.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 17c1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:23.657 UTC [gossip.discovery] isSentByMe -> DEBU 17c2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:23.657 UTC [gossip.discovery] handleAliveMessage -> DEBU 17c3 Exiting" +"2019-09-24 00:25:23.657 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17c4 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:23.657 UTC [msp] DeserializeIdentity -> DEBU 17c5 Obtaining identity" +"2019-09-24 00:25:23.658 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:23.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17c7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:23.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17c8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:23.658 UTC [cauthdsl] func1 -> DEBU 17cc 0xc0027b1ce0 gate 1569284723658269100 evaluation starts" +"2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17cd 0xc0027b1ce0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17ce 0xc0027b1ce0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17cf 0xc0027b1ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17d0 0xc0027b1ce0 principal evaluation fails" +"2019-09-24 00:25:23.658 UTC [cauthdsl] func1 -> DEBU 17d1 0xc0027b1ce0 gate 1569284723658269100 evaluation fails" +"2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17d2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:23.658 UTC [policies] Evaluate -> DEBU 17d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:23.658 UTC [cauthdsl] func1 -> DEBU 17d5 0xc0027e8520 gate 1569284723658677800 evaluation starts" +"2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17d6 0xc0027e8520 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17d7 0xc0027e8520 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:23.658 UTC [cauthdsl] func2 -> DEBU 17d8 0xc0027e8520 principal matched by identity 0" +"2019-09-24 00:25:23.658 UTC [msp.identity] Verify -> DEBU 17d9 Verify: digest = 00000000 7b 27 9f 10 ca 64 de 30 f6 0d db 1f 0d b3 4a 47 |{'...d.0......JG| +00000010 07 63 97 6b 9b c7 0c 12 a2 ca ed f2 19 30 ff 5f |.c.k.........0._|" +"2019-09-24 00:25:23.658 UTC [msp.identity] Verify -> DEBU 17da Verify: sig = 00000000 30 45 02 21 00 88 3a 1b cb a7 2e 74 82 6e 06 a2 |0E.!..:....t.n..| +00000010 e3 e8 99 b1 33 fb 5d ec 50 ab 94 6a a9 4a ab c0 |....3.].P..j.J..| +00000020 aa 0f c1 65 9b 02 20 61 a6 1e 47 f9 d2 47 0b ce |...e.. a..G..G..| +00000030 b8 bc 82 2d 78 20 52 72 79 87 83 a4 aa 9d 6e 8a |...-x Rry.....n.| +00000040 b9 7d 36 e1 cb 5f dd |.}6.._.|" +"2019-09-24 00:25:23.659 UTC [cauthdsl] func2 -> DEBU 17db 0xc0027e8520 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:23.659 UTC [cauthdsl] func1 -> DEBU 17dc 0xc0027e8520 gate 1569284723658677800 evaluation succeeds" +"2019-09-24 00:25:23.659 UTC [policies] Evaluate -> DEBU 17dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:23.659 UTC [policies] Evaluate -> DEBU 17de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:23.659 UTC [policies] Evaluate -> DEBU 17df Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:23.659 UTC [policies] Evaluate -> DEBU 17e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:23.659 UTC [gossip.discovery] handleAliveMessage -> DEBU 17e1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:23.659 UTC [gossip.discovery] handleAliveMessage -> DEBU 17e2 Exiting" +"2019-09-24 00:25:23.659 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e3 Exiting" +"2019-09-24 00:25:23.959 UTC [gossip.gossip] handleMessage -> DEBU 17e4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.959 UTC [gossip.pull] HandleMessage -> DEBU 17e5 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17e6 Obtaining identity" +"2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17e7 Obtaining identity" +"2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17e8 Obtaining identity" +"2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17e9 Obtaining identity" +"2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17ea Obtaining identity" +"2019-09-24 00:25:23.959 UTC [msp] DeserializeIdentity -> DEBU 17eb Obtaining identity" +"2019-09-24 00:25:23.959 UTC [gossip.pull] SendDigest -> DEBU 17ec Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:23.959 UTC [gossip.gossip] handleMessage -> DEBU 17ed Exiting" +"2019-09-24 00:25:23.971 UTC [gossip.gossip] handleMessage -> DEBU 17ee Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.971 UTC [gossip.gossip] handleMessage -> DEBU 17ef Exiting" +"2019-09-24 00:25:23.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f0 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.971 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17f1 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:23.971 UTC [msp] DeserializeIdentity -> DEBU 17f2 Obtaining identity" +"2019-09-24 00:25:23.971 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:23.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17f4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:23.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17f5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 17f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 17f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 17f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func1 -> DEBU 17f9 0xc002b74db0 gate 1569284723972131000 evaluation starts" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 17fa 0xc002b74db0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 17fb 0xc002b74db0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 17fc 0xc002b74db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 17fd 0xc002b74db0 principal evaluation fails" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func1 -> DEBU 17fe 0xc002b74db0 gate 1569284723972131000 evaluation fails" +"2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 17ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 1800 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 1801 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func1 -> DEBU 1802 0xc002b755f0 gate 1569284723972464500 evaluation starts" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 1803 0xc002b755f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 1804 0xc002b755f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 1805 0xc002b755f0 principal matched by identity 0" +"2019-09-24 00:25:23.972 UTC [msp.identity] Verify -> DEBU 1806 Verify: digest = 00000000 00 6e a2 29 2e 39 1e 44 52 20 63 59 17 c4 71 c9 |.n.).9.DR cY..q.| +00000010 e8 bf 8d 36 fb ff 7e 72 49 ca 50 c9 97 db 11 15 |...6..~rI.P.....|" +"2019-09-24 00:25:23.972 UTC [msp.identity] Verify -> DEBU 1807 Verify: sig = 00000000 30 44 02 20 7b 70 f7 e3 6f 32 6b eb f2 60 7e 6f |0D. {p..o2k..`~o| +00000010 db 16 ba 96 98 27 6e 81 0e 7d 67 f3 2e 96 66 68 |.....'n..}g...fh| +00000020 f0 a1 5e 90 02 20 14 42 a0 7f 2c f8 b0 e0 5c 72 |..^.. .B..,...\r| +00000030 82 8e 82 b7 87 be 6e 31 75 77 c0 97 eb 3d d3 f4 |......n1uw...=..| +00000040 39 34 77 d4 48 74 |94w.Ht|" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func2 -> DEBU 1808 0xc002b755f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:23.972 UTC [cauthdsl] func1 -> DEBU 1809 0xc002b755f0 gate 1569284723972464500 evaluation succeeds" +"2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 180a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 180b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:23.972 UTC [policies] Evaluate -> DEBU 180c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:23.973 UTC [policies] Evaluate -> DEBU 180d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:23.973 UTC [gossip.discovery] handleAliveMessage -> DEBU 180e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:23.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 180f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:23.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 1810 updating membership: timestamp: " +"2019-09-24 00:25:23.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 1811 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:23.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 1812 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:23.973 UTC [gossip.discovery] learnExistingMembers -> DEBU 1813 Exiting" +"2019-09-24 00:25:23.973 UTC [gossip.discovery] handleAliveMessage -> DEBU 1814 Exiting" +"2019-09-24 00:25:23.973 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1815 Exiting" +"2019-09-24 00:25:23.973 UTC [gossip.discovery] sendMemResponse -> DEBU 1816 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:23.973 UTC [msp] DeserializeIdentity -> DEBU 1817 Obtaining identity" +"2019-09-24 00:25:23.973 UTC [msp] DeserializeIdentity -> DEBU 1818 Obtaining identity" +"2019-09-24 00:25:23.979 UTC [msp] DeserializeIdentity -> DEBU 1819 Obtaining identity" +"2019-09-24 00:25:23.979 UTC [gossip.comm] Send -> DEBU 181a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:23.979 UTC [gossip.discovery] sendMemResponse -> DEBU 181b Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020!" signature:"0E\002!\000\235\315\026\177\344\351\022\204\037\001\350\255\010\351-]5,\0230S\344\362\246\326Sv\200\241\336\337\377\002 Y\207|i\205\353\354|k|V\232-\215\276\212\024\366\364\3210\004\270\034\003$\250\317(9i\022" > alive: alive: " +"2019-09-24 00:25:23.980 UTC [gossip.comm] sendToEndpoint -> DEBU 181c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:25:23.980 UTC [gossip.comm] sendToEndpoint -> DEBU 181d Exiting" +"2019-09-24 00:25:24.189 UTC [msp] DeserializeIdentity -> DEBU 181e Obtaining identity" +"2019-09-24 00:25:24.190 UTC [msp] DeserializeIdentity -> DEBU 181f Obtaining identity" +"2019-09-24 00:25:24.190 UTC [gossip.comm] Send -> DEBU 1820 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1821 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1822 Exiting" +"2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1823 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1824 Exiting" +"2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1825 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1826 Exiting" +"2019-09-24 00:25:24.192 UTC [gossip.comm] func1 -> DEBU 1827 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.192 UTC [gossip.gossip] handleMessage -> DEBU 1828 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.192 UTC [msp] DeserializeIdentity -> DEBU 1829 Obtaining identity" +"2019-09-24 00:25:24.192 UTC [msp] DeserializeIdentity -> DEBU 182a Obtaining identity" +"2019-09-24 00:25:24.192 UTC [msp] DeserializeIdentity -> DEBU 182b Obtaining identity" +"2019-09-24 00:25:24.192 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 182c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:24.192 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 182d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.192 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 182e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.192 UTC [policies] Evaluate -> DEBU 182f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:24.192 UTC [policies] Evaluate -> DEBU 1830 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:24.192 UTC [policies] Evaluate -> DEBU 1831 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:24.192 UTC [cauthdsl] func1 -> DEBU 1832 0xc0032a7130 gate 1569284724192928800 evaluation starts" +"2019-09-24 00:25:24.192 UTC [cauthdsl] func2 -> DEBU 1833 0xc0032a7130 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 1834 0xc0032a7130 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 1835 0xc0032a7130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 1836 0xc0032a7130 principal evaluation fails" +"2019-09-24 00:25:24.193 UTC [cauthdsl] func1 -> DEBU 1837 0xc0032a7130 gate 1569284724192928800 evaluation fails" +"2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 1838 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 1839 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 183a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:24.193 UTC [cauthdsl] func1 -> DEBU 183b 0xc0032a7970 gate 1569284724193253100 evaluation starts" +"2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 183c 0xc0032a7970 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 183d 0xc0032a7970 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 183e 0xc0032a7970 principal matched by identity 0" +"2019-09-24 00:25:24.193 UTC [msp.identity] Verify -> DEBU 183f Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:24.193 UTC [msp.identity] Verify -> DEBU 1840 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:24.193 UTC [cauthdsl] func2 -> DEBU 1841 0xc0032a7970 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:24.193 UTC [cauthdsl] func1 -> DEBU 1842 0xc0032a7970 gate 1569284724193253100 evaluation succeeds" +"2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 1843 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 1844 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.193 UTC [policies] Evaluate -> DEBU 1845 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:24.194 UTC [policies] Evaluate -> DEBU 1846 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:24.194 UTC [msp.identity] Verify -> DEBU 1847 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:24.194 UTC [msp.identity] Verify -> DEBU 1848 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:24.194 UTC [msp] DeserializeIdentity -> DEBU 1849 Obtaining identity" +"2019-09-24 00:25:24.194 UTC [msp] DeserializeIdentity -> DEBU 184a Obtaining identity" +"2019-09-24 00:25:24.194 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 184b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:24.194 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 184c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.194 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 184d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.194 UTC [policies] Evaluate -> DEBU 184e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:24.194 UTC [policies] Evaluate -> DEBU 184f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:24.194 UTC [policies] Evaluate -> DEBU 1850 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:24.194 UTC [cauthdsl] func1 -> DEBU 1851 0xc003813860 gate 1569284724194827300 evaluation starts" +"2019-09-24 00:25:24.194 UTC [cauthdsl] func2 -> DEBU 1852 0xc003813860 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.194 UTC [cauthdsl] func2 -> DEBU 1853 0xc003813860 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.194 UTC [cauthdsl] func2 -> DEBU 1854 0xc003813860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:24.195 UTC [cauthdsl] func2 -> DEBU 1855 0xc003813860 principal evaluation fails" +"2019-09-24 00:25:24.195 UTC [cauthdsl] func1 -> DEBU 1856 0xc003813860 gate 1569284724194827300 evaluation fails" +"2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1857 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1858 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1859 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:24.195 UTC [cauthdsl] func1 -> DEBU 185a 0xc003a540a0 gate 1569284724195353500 evaluation starts" +"2019-09-24 00:25:24.195 UTC [cauthdsl] func2 -> DEBU 185b 0xc003a540a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.195 UTC [cauthdsl] func2 -> DEBU 185c 0xc003a540a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.195 UTC [cauthdsl] func2 -> DEBU 185d 0xc003a540a0 principal matched by identity 0" +"2019-09-24 00:25:24.195 UTC [msp.identity] Verify -> DEBU 185e Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:24.195 UTC [msp.identity] Verify -> DEBU 185f Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:24.195 UTC [cauthdsl] func2 -> DEBU 1860 0xc003a540a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:24.195 UTC [cauthdsl] func1 -> DEBU 1861 0xc003a540a0 gate 1569284724195353500 evaluation succeeds" +"2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1862 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1863 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.195 UTC [policies] Evaluate -> DEBU 1864 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:24.196 UTC [policies] Evaluate -> DEBU 1865 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:24.197 UTC [msp.identity] Verify -> DEBU 1866 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:24.197 UTC [msp.identity] Verify -> DEBU 1867 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:24.198 UTC [gossip.gossip] handleMessage -> DEBU 1868 Exiting" +"2019-09-24 00:25:24.199 UTC [gossip.comm] func1 -> DEBU 1869 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.200 UTC [gossip.gossip] handleMessage -> DEBU 186a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.204 UTC [msp.identity] Verify -> DEBU 186b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:24.204 UTC [msp.identity] Verify -> DEBU 186c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:24.206 UTC [msp.identity] Verify -> DEBU 186d Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:24.206 UTC [msp.identity] Verify -> DEBU 186e Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:24.207 UTC [msp] DeserializeIdentity -> DEBU 186f Obtaining identity" +"2019-09-24 00:25:24.207 UTC [msp] DeserializeIdentity -> DEBU 1870 Obtaining identity" +"2019-09-24 00:25:24.207 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1871 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:24.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1872 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1873 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.207 UTC [policies] Evaluate -> DEBU 1874 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:24.207 UTC [policies] Evaluate -> DEBU 1875 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:24.208 UTC [policies] Evaluate -> DEBU 1876 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:24.208 UTC [cauthdsl] func1 -> DEBU 1877 0xc0033d3170 gate 1569284724208272400 evaluation starts" +"2019-09-24 00:25:24.208 UTC [cauthdsl] func2 -> DEBU 1878 0xc0033d3170 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.208 UTC [cauthdsl] func2 -> DEBU 1879 0xc0033d3170 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.208 UTC [cauthdsl] func2 -> DEBU 187a 0xc0033d3170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:24.208 UTC [cauthdsl] func2 -> DEBU 187b 0xc0033d3170 principal evaluation fails" +"2019-09-24 00:25:24.208 UTC [cauthdsl] func1 -> DEBU 187c 0xc0033d3170 gate 1569284724208272400 evaluation fails" +"2019-09-24 00:25:24.209 UTC [policies] Evaluate -> DEBU 187d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.209 UTC [policies] Evaluate -> DEBU 187e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.209 UTC [policies] Evaluate -> DEBU 187f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:24.209 UTC [cauthdsl] func1 -> DEBU 1880 0xc0033d39b0 gate 1569284724209437600 evaluation starts" +"2019-09-24 00:25:24.209 UTC [cauthdsl] func2 -> DEBU 1881 0xc0033d39b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.209 UTC [cauthdsl] func2 -> DEBU 1882 0xc0033d39b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.209 UTC [cauthdsl] func2 -> DEBU 1883 0xc0033d39b0 principal matched by identity 0" +"2019-09-24 00:25:24.209 UTC [msp.identity] Verify -> DEBU 1884 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:24.209 UTC [msp.identity] Verify -> DEBU 1885 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:24.210 UTC [cauthdsl] func2 -> DEBU 1886 0xc0033d39b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:24.210 UTC [cauthdsl] func1 -> DEBU 1887 0xc0033d39b0 gate 1569284724209437600 evaluation succeeds" +"2019-09-24 00:25:24.210 UTC [policies] Evaluate -> DEBU 1888 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.210 UTC [policies] Evaluate -> DEBU 1889 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.210 UTC [policies] Evaluate -> DEBU 188a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:24.210 UTC [policies] Evaluate -> DEBU 188b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:24.210 UTC [msp] DeserializeIdentity -> DEBU 188c Obtaining identity" +"2019-09-24 00:25:24.211 UTC [msp] DeserializeIdentity -> DEBU 188d Obtaining identity" +"2019-09-24 00:25:24.213 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 188e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:24.213 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 188f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.213 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1890 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 1891 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 1892 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 1893 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:24.213 UTC [cauthdsl] func1 -> DEBU 1894 0xc003685180 gate 1569284724213446300 evaluation starts" +"2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 1895 0xc003685180 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 1896 0xc003685180 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 1897 0xc003685180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 1898 0xc003685180 principal evaluation fails" +"2019-09-24 00:25:24.213 UTC [cauthdsl] func1 -> DEBU 1899 0xc003685180 gate 1569284724213446300 evaluation fails" +"2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 189a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 189b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.213 UTC [policies] Evaluate -> DEBU 189c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:24.213 UTC [cauthdsl] func1 -> DEBU 189d 0xc0036859c0 gate 1569284724213901600 evaluation starts" +"2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 189e 0xc0036859c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.213 UTC [cauthdsl] func2 -> DEBU 189f 0xc0036859c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.214 UTC [cauthdsl] func2 -> DEBU 18a0 0xc0036859c0 principal matched by identity 0" +"2019-09-24 00:25:24.214 UTC [msp.identity] Verify -> DEBU 18a1 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:24.214 UTC [msp.identity] Verify -> DEBU 18a2 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:24.214 UTC [cauthdsl] func2 -> DEBU 18a3 0xc0036859c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:24.214 UTC [cauthdsl] func1 -> DEBU 18a4 0xc0036859c0 gate 1569284724213901600 evaluation succeeds" +"2019-09-24 00:25:24.214 UTC [policies] Evaluate -> DEBU 18a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.214 UTC [policies] Evaluate -> DEBU 18a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.214 UTC [policies] Evaluate -> DEBU 18a7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:24.214 UTC [policies] Evaluate -> DEBU 18a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:24.214 UTC [gossip.gossip] handleMessage -> DEBU 18a9 Exiting" +"2019-09-24 00:25:24.214 UTC [gossip.gossip] handleMessage -> DEBU 18aa Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.214 UTC [msp] DeserializeIdentity -> DEBU 18ab Obtaining identity" +"2019-09-24 00:25:24.214 UTC [msp] DeserializeIdentity -> DEBU 18ac Obtaining identity" +"2019-09-24 00:25:24.214 UTC [msp] DeserializeIdentity -> DEBU 18ad Obtaining identity" +"2019-09-24 00:25:24.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18ae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:24.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18af Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18b0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.215 UTC [policies] Evaluate -> DEBU 18b1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:24.215 UTC [policies] Evaluate -> DEBU 18b2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:24.215 UTC [policies] Evaluate -> DEBU 18b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:24.215 UTC [cauthdsl] func1 -> DEBU 18b4 0xc0037194d0 gate 1569284724215641100 evaluation starts" +"2019-09-24 00:25:24.215 UTC [cauthdsl] func2 -> DEBU 18b5 0xc0037194d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.215 UTC [cauthdsl] func2 -> DEBU 18b6 0xc0037194d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.215 UTC [cauthdsl] func2 -> DEBU 18b7 0xc0037194d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:24.215 UTC [cauthdsl] func2 -> DEBU 18b8 0xc0037194d0 principal evaluation fails" +"2019-09-24 00:25:24.215 UTC [cauthdsl] func1 -> DEBU 18b9 0xc0037194d0 gate 1569284724215641100 evaluation fails" +"2019-09-24 00:25:24.216 UTC [policies] Evaluate -> DEBU 18ba Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.216 UTC [policies] Evaluate -> DEBU 18bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.216 UTC [policies] Evaluate -> DEBU 18bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:24.217 UTC [cauthdsl] func1 -> DEBU 18bd 0xc003719d10 gate 1569284724216820800 evaluation starts" +"2019-09-24 00:25:24.217 UTC [cauthdsl] func2 -> DEBU 18be 0xc003719d10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.217 UTC [cauthdsl] func2 -> DEBU 18bf 0xc003719d10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.217 UTC [cauthdsl] func2 -> DEBU 18c0 0xc003719d10 principal matched by identity 0" +"2019-09-24 00:25:24.217 UTC [msp.identity] Verify -> DEBU 18c1 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:24.217 UTC [msp.identity] Verify -> DEBU 18c2 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:24.217 UTC [cauthdsl] func2 -> DEBU 18c3 0xc003719d10 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:24.217 UTC [cauthdsl] func1 -> DEBU 18c4 0xc003719d10 gate 1569284724216820800 evaluation succeeds" +"2019-09-24 00:25:24.217 UTC [policies] Evaluate -> DEBU 18c5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.217 UTC [policies] Evaluate -> DEBU 18c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.217 UTC [policies] Evaluate -> DEBU 18c7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:24.217 UTC [policies] Evaluate -> DEBU 18c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:24.218 UTC [msp.identity] Verify -> DEBU 18c9 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:24.218 UTC [msp.identity] Verify -> DEBU 18ca Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:24.223 UTC [msp.identity] Verify -> DEBU 18cb Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:24.223 UTC [msp.identity] Verify -> DEBU 18cc Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:24.223 UTC [msp] DeserializeIdentity -> DEBU 18cd Obtaining identity" +"2019-09-24 00:25:24.224 UTC [msp] DeserializeIdentity -> DEBU 18ce Obtaining identity" +"2019-09-24 00:25:24.225 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18cf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:24.225 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18d0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.225 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18d1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.225 UTC [policies] Evaluate -> DEBU 18d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:24.225 UTC [policies] Evaluate -> DEBU 18d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:24.225 UTC [policies] Evaluate -> DEBU 18d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:24.225 UTC [cauthdsl] func1 -> DEBU 18d5 0xc00273e320 gate 1569284724225668000 evaluation starts" +"2019-09-24 00:25:24.225 UTC [cauthdsl] func2 -> DEBU 18d6 0xc00273e320 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.225 UTC [cauthdsl] func2 -> DEBU 18d7 0xc00273e320 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.225 UTC [cauthdsl] func2 -> DEBU 18d8 0xc00273e320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:24.225 UTC [cauthdsl] func2 -> DEBU 18d9 0xc00273e320 principal evaluation fails" +"2019-09-24 00:25:24.225 UTC [cauthdsl] func1 -> DEBU 18da 0xc00273e320 gate 1569284724225668000 evaluation fails" +"2019-09-24 00:25:24.226 UTC [policies] Evaluate -> DEBU 18db Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.226 UTC [policies] Evaluate -> DEBU 18dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.226 UTC [policies] Evaluate -> DEBU 18dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:24.226 UTC [cauthdsl] func1 -> DEBU 18de 0xc00273eb60 gate 1569284724226177800 evaluation starts" +"2019-09-24 00:25:24.226 UTC [cauthdsl] func2 -> DEBU 18df 0xc00273eb60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.226 UTC [cauthdsl] func2 -> DEBU 18e0 0xc00273eb60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.226 UTC [cauthdsl] func2 -> DEBU 18e1 0xc00273eb60 principal matched by identity 0" +"2019-09-24 00:25:24.226 UTC [msp.identity] Verify -> DEBU 18e2 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:24.226 UTC [msp.identity] Verify -> DEBU 18e3 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:24.226 UTC [cauthdsl] func2 -> DEBU 18e4 0xc00273eb60 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:24.226 UTC [cauthdsl] func1 -> DEBU 18e5 0xc00273eb60 gate 1569284724226177800 evaluation succeeds" +"2019-09-24 00:25:24.227 UTC [policies] Evaluate -> DEBU 18e6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.227 UTC [policies] Evaluate -> DEBU 18e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.227 UTC [policies] Evaluate -> DEBU 18e8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:24.227 UTC [policies] Evaluate -> DEBU 18e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:24.227 UTC [gossip.gossip] handleMessage -> DEBU 18ea Exiting" +"2019-09-24 00:25:24.281 UTC [msp] DeserializeIdentity -> DEBU 18eb Obtaining identity" +"2019-09-24 00:25:24.281 UTC [msp] DeserializeIdentity -> DEBU 18ec Obtaining identity" +"2019-09-24 00:25:24.281 UTC [gossip.pull] Hello -> DEBU 18ed Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:24.281 UTC [msp] DeserializeIdentity -> DEBU 18ee Obtaining identity" +"2019-09-24 00:25:24.281 UTC [msp] DeserializeIdentity -> DEBU 18ef Obtaining identity" +"2019-09-24 00:25:24.281 UTC [gossip.comm] Send -> DEBU 18f0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:24.282 UTC [gossip.comm] sendToEndpoint -> DEBU 18f1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.282 UTC [gossip.comm] sendToEndpoint -> DEBU 18f2 Exiting" +"2019-09-24 00:25:24.283 UTC [gossip.comm] func1 -> DEBU 18f3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.283 UTC [gossip.gossip] handleMessage -> DEBU 18f4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.284 UTC [gossip.pull] HandleMessage -> DEBU 18f5 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.284 UTC [gossip.gossip] handleMessage -> DEBU 18f6 Exiting" +"2019-09-24 00:25:24.580 UTC [msp] GetDefaultSigningIdentity -> DEBU 18f7 Obtaining default signing identity" +"2019-09-24 00:25:24.580 UTC [msp.identity] Sign -> DEBU 18f8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101E " +"2019-09-24 00:25:24.580 UTC [msp.identity] Sign -> DEBU 18f9 Sign: digest: 3AF1E38AA5CC19501C0DDD113D0A5C86D2F79DD0B21AAE8DE1B60335488B7AED " +"2019-09-24 00:25:24.581 UTC [msp] GetDefaultSigningIdentity -> DEBU 18fa Obtaining default signing identity" +"2019-09-24 00:25:24.581 UTC [msp.identity] Sign -> DEBU 18fb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:24.581 UTC [msp.identity] Sign -> DEBU 18fc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:24.581 UTC [gossip.discovery] periodicalSendAlive -> DEBU 18fd Sleeping 5s" +"2019-09-24 00:25:24.586 UTC [msp] DeserializeIdentity -> DEBU 18fe Obtaining identity" +"2019-09-24 00:25:24.586 UTC [msp] DeserializeIdentity -> DEBU 18ff Obtaining identity" +"2019-09-24 00:25:24.586 UTC [gossip.comm] Send -> DEBU 1900 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:24.586 UTC [msp] DeserializeIdentity -> DEBU 1901 Obtaining identity" +"2019-09-24 00:25:24.586 UTC [gossip.comm] Send -> DEBU 1902 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:24.586 UTC [msp] DeserializeIdentity -> DEBU 1903 Obtaining identity" +"2019-09-24 00:25:24.587 UTC [gossip.comm] Send -> DEBU 1904 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 1905 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 1906 Exiting" +"2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 1907 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 1908 Exiting" +"2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 1909 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:24.587 UTC [gossip.comm] sendToEndpoint -> DEBU 190a Exiting" +"2019-09-24 00:25:24.600 UTC [gossip.comm] func1 -> DEBU 190b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:24.600 UTC [gossip.gossip] handleMessage -> DEBU 190c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:24.600 UTC [gossip.gossip] handleMessage -> DEBU 190d Exiting" +"2019-09-24 00:25:24.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU 190e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:24.600 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 190f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:24.601 UTC [msp.identity] Verify -> DEBU 1910 Verify: digest = 00000000 3a f1 e3 8a a5 cc 19 50 1c 0d dd 11 3d 0a 5c 86 |:......P....=.\.| +00000010 d2 f7 9d d0 b2 1a ae 8d e1 b6 03 35 48 8b 7a ed |...........5H.z.|" +"2019-09-24 00:25:24.601 UTC [msp.identity] Verify -> DEBU 1911 Verify: sig = 00000000 30 45 02 21 00 f8 2f 5a 05 c4 d7 85 97 ca df 0a |0E.!../Z........| +00000010 7c f7 74 cd 2b ea 67 56 72 c8 21 8d af 9d 92 40 ||.t.+.gVr.!....@| +00000020 b6 29 6d 97 98 02 20 1a 4b 00 de c9 b7 32 11 6e |.)m... .K....2.n| +00000030 f9 49 5b a5 ba d9 c9 32 7b ea e2 9c c4 50 7b 47 |.I[....2{....P{G| +00000040 72 49 71 37 76 9d 08 |rIq7v..|" +"2019-09-24 00:25:24.601 UTC [gossip.discovery] isSentByMe -> DEBU 1912 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:24.601 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1913 Exiting" +"2019-09-24 00:25:24.649 UTC [gossip.comm] func1 -> DEBU 1914 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.649 UTC [gossip.gossip] handleMessage -> DEBU 1915 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.649 UTC [gossip.gossip] handleMessage -> DEBU 1916 Exiting" +"2019-09-24 00:25:24.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1917 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.649 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1918 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:24.649 UTC [msp] DeserializeIdentity -> DEBU 1919 Obtaining identity" +"2019-09-24 00:25:24.649 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 191a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:24.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 191b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.649 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 191c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.649 UTC [policies] Evaluate -> DEBU 191d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:24.649 UTC [policies] Evaluate -> DEBU 191e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:24.649 UTC [policies] Evaluate -> DEBU 191f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func1 -> DEBU 1920 0xc003493360 gate 1569284724649989300 evaluation starts" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 1921 0xc003493360 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 1922 0xc003493360 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 1923 0xc003493360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 1924 0xc003493360 principal evaluation fails" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func1 -> DEBU 1925 0xc003493360 gate 1569284724649989300 evaluation fails" +"2019-09-24 00:25:24.650 UTC [policies] Evaluate -> DEBU 1926 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.650 UTC [policies] Evaluate -> DEBU 1927 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.650 UTC [policies] Evaluate -> DEBU 1928 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func1 -> DEBU 1929 0xc003493ba0 gate 1569284724650393300 evaluation starts" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 192a 0xc003493ba0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 192b 0xc003493ba0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 192c 0xc003493ba0 principal matched by identity 0" +"2019-09-24 00:25:24.650 UTC [msp.identity] Verify -> DEBU 192d Verify: digest = 00000000 22 6f b3 69 dd 7a c5 5a 7d cf a2 07 ee d6 ba 7e |"o.i.z.Z}......~| +00000010 d3 97 09 99 39 30 ab 2d e6 1c 59 0e a4 57 10 18 |....90.-..Y..W..|" +"2019-09-24 00:25:24.650 UTC [msp.identity] Verify -> DEBU 192e Verify: sig = 00000000 30 44 02 20 37 57 d8 e5 1b 65 cb 50 7b 0d 77 35 |0D. 7W...e.P{.w5| +00000010 3a 49 26 21 84 f6 80 00 b5 fb b9 2e dc f8 b6 98 |:I&!............| +00000020 06 9e 42 a6 02 20 47 99 60 71 ec 7f 0e ba da 07 |..B.. G.`q......| +00000030 7a 4d c8 9a 04 80 e7 97 c9 9f 29 e2 5d 4c c9 90 |zM........).]L..| +00000040 ff c8 97 fb e3 c9 |......|" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func2 -> DEBU 192f 0xc003493ba0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:24.650 UTC [cauthdsl] func1 -> DEBU 1930 0xc003493ba0 gate 1569284724650393300 evaluation succeeds" +"2019-09-24 00:25:24.651 UTC [policies] Evaluate -> DEBU 1931 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.651 UTC [policies] Evaluate -> DEBU 1932 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.651 UTC [policies] Evaluate -> DEBU 1933 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:24.651 UTC [policies] Evaluate -> DEBU 1934 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:24.655 UTC [gossip.discovery] handleAliveMessage -> DEBU 1935 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:24.655 UTC [gossip.discovery] learnExistingMembers -> DEBU 1936 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:24.656 UTC [gossip.discovery] learnExistingMembers -> DEBU 1937 updating membership: timestamp: " +"2019-09-24 00:25:24.656 UTC [gossip.discovery] learnExistingMembers -> DEBU 1938 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:24.656 UTC [gossip.discovery] learnExistingMembers -> DEBU 1939 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:24.656 UTC [gossip.discovery] learnExistingMembers -> DEBU 193a Exiting" +"2019-09-24 00:25:24.657 UTC [gossip.discovery] handleAliveMessage -> DEBU 193b Exiting" +"2019-09-24 00:25:24.657 UTC [gossip.discovery] handleMsgFromComm -> DEBU 193c Exiting" +"2019-09-24 00:25:24.657 UTC [gossip.discovery] sendMemResponse -> DEBU 193d Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:24.657 UTC [msp] DeserializeIdentity -> DEBU 193e Obtaining identity" +"2019-09-24 00:25:24.658 UTC [msp] DeserializeIdentity -> DEBU 193f Obtaining identity" +"2019-09-24 00:25:24.659 UTC [msp] DeserializeIdentity -> DEBU 1940 Obtaining identity" +"2019-09-24 00:25:24.659 UTC [gossip.comm] Send -> DEBU 1941 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:24.660 UTC [gossip.discovery] sendMemResponse -> DEBU 1942 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020!" signature:"0E\002!\000\235\315\026\177\344\351\022\204\037\001\350\255\010\351-]5,\0230S\344\362\246\326Sv\200\241\336\337\377\002 Y\207|i\205\353\354|k|V\232-\215\276\212\024\366\364\3210\004\270\034\003$\250\317(9i\022" > alive: alive: " +"2019-09-24 00:25:24.660 UTC [gossip.comm] sendToEndpoint -> DEBU 1943 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.660 UTC [gossip.comm] sendToEndpoint -> DEBU 1944 Exiting" +"2019-09-24 00:25:24.667 UTC [gossip.comm] func1 -> DEBU 1945 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.667 UTC [gossip.gossip] handleMessage -> DEBU 1946 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.667 UTC [gossip.pull] HandleMessage -> DEBU 1947 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 1948 Obtaining identity" +"2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 1949 Obtaining identity" +"2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 194a Obtaining identity" +"2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 194b Obtaining identity" +"2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 194c Obtaining identity" +"2019-09-24 00:25:24.667 UTC [msp] DeserializeIdentity -> DEBU 194d Obtaining identity" +"2019-09-24 00:25:24.667 UTC [gossip.pull] SendDigest -> DEBU 194e Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:24.667 UTC [gossip.gossip] handleMessage -> DEBU 194f Exiting" +"2019-09-24 00:25:24.700 UTC [gossip.comm] func1 -> DEBU 1950 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.706 UTC [gossip.gossip] handleMessage -> DEBU 1951 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.706 UTC [msp] DeserializeIdentity -> DEBU 1952 Obtaining identity" +"2019-09-24 00:25:24.706 UTC [msp] DeserializeIdentity -> DEBU 1953 Obtaining identity" +"2019-09-24 00:25:24.706 UTC [gossip.gossip] handleMessage -> DEBU 1954 Exiting" +"2019-09-24 00:25:24.715 UTC [gossip.comm] func1 -> DEBU 1955 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.715 UTC [gossip.gossip] handleMessage -> DEBU 1956 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.716 UTC [gossip.pull] HandleMessage -> DEBU 1957 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:24.716 UTC [gossip.pull] SendDigest -> DEBU 1958 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:24.716 UTC [gossip.gossip] handleMessage -> DEBU 1959 Exiting" +"2019-09-24 00:25:24.995 UTC [gossip.gossip] handleMessage -> DEBU 195a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:24.995 UTC [gossip.gossip] handleMessage -> DEBU 195b Exiting" +"2019-09-24 00:25:24.995 UTC [gossip.discovery] handleMsgFromComm -> DEBU 195c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:24.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 195d Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:24.996 UTC [msp] DeserializeIdentity -> DEBU 195e Obtaining identity" +"2019-09-24 00:25:24.997 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 195f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:24.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1960 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1961 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:24.997 UTC [policies] Evaluate -> DEBU 1962 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:24.997 UTC [policies] Evaluate -> DEBU 1963 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:24.997 UTC [policies] Evaluate -> DEBU 1964 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:24.997 UTC [cauthdsl] func1 -> DEBU 1965 0xc002ae2640 gate 1569284724997281200 evaluation starts" +"2019-09-24 00:25:24.997 UTC [cauthdsl] func2 -> DEBU 1966 0xc002ae2640 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.997 UTC [cauthdsl] func2 -> DEBU 1967 0xc002ae2640 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.997 UTC [cauthdsl] func2 -> DEBU 1968 0xc002ae2640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:24.997 UTC [cauthdsl] func2 -> DEBU 1969 0xc002ae2640 principal evaluation fails" +"2019-09-24 00:25:24.997 UTC [cauthdsl] func1 -> DEBU 196a 0xc002ae2640 gate 1569284724997281200 evaluation fails" +"2019-09-24 00:25:24.997 UTC [policies] Evaluate -> DEBU 196b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.997 UTC [policies] Evaluate -> DEBU 196c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:24.998 UTC [policies] Evaluate -> DEBU 196d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:24.998 UTC [cauthdsl] func1 -> DEBU 196e 0xc002ae2e80 gate 1569284724998066000 evaluation starts" +"2019-09-24 00:25:24.998 UTC [cauthdsl] func2 -> DEBU 196f 0xc002ae2e80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:24.998 UTC [cauthdsl] func2 -> DEBU 1970 0xc002ae2e80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:24.998 UTC [cauthdsl] func2 -> DEBU 1971 0xc002ae2e80 principal matched by identity 0" +"2019-09-24 00:25:24.998 UTC [msp.identity] Verify -> DEBU 1972 Verify: digest = 00000000 9d 35 63 66 65 e1 97 71 15 56 f2 b9 97 f6 47 53 |.5cfe..q.V....GS| +00000010 eb b6 52 d4 fa 08 a9 2a de a3 80 df 99 70 ad 6b |..R....*.....p.k|" +"2019-09-24 00:25:24.998 UTC [msp.identity] Verify -> DEBU 1973 Verify: sig = 00000000 30 44 02 20 28 94 79 bc fd 49 dc b3 bc 94 b7 aa |0D. (.y..I......| +00000010 d6 e5 cf 89 64 b3 bd 38 4f 87 ca 82 57 1a 5c b5 |....d..8O...W.\.| +00000020 1d 4b 4a 2d 02 20 78 4d 97 2e c9 d6 85 a5 6d c8 |.KJ-. xM......m.| +00000030 bf 52 0c 4e 1e 9a 2b 92 fc 8a 70 ea e3 5a 91 31 |.R.N..+...p..Z.1| +00000040 d6 ee 79 13 a5 8d |..y...|" +"2019-09-24 00:25:24.998 UTC [cauthdsl] func2 -> DEBU 1974 0xc002ae2e80 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:24.998 UTC [cauthdsl] func1 -> DEBU 1975 0xc002ae2e80 gate 1569284724998066000 evaluation succeeds" +"2019-09-24 00:25:24.998 UTC [policies] Evaluate -> DEBU 1976 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.998 UTC [policies] Evaluate -> DEBU 1977 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:24.998 UTC [policies] Evaluate -> DEBU 1978 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:24.998 UTC [policies] Evaluate -> DEBU 1979 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:24.998 UTC [gossip.discovery] handleAliveMessage -> DEBU 197a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:24.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 197b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:24.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 197c updating membership: timestamp: " +"2019-09-24 00:25:24.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 197d Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:24.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 197e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:24.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 197f Exiting" +"2019-09-24 00:25:24.999 UTC [gossip.discovery] handleAliveMessage -> DEBU 1980 Exiting" +"2019-09-24 00:25:24.999 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1981 Exiting" +"2019-09-24 00:25:25.007 UTC [gossip.comm] func1 -> DEBU 1982 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:25.007 UTC [gossip.gossip] handleMessage -> DEBU 1983 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:25.007 UTC [gossip.gossip] handleMessage -> DEBU 1984 Exiting" +"2019-09-24 00:25:25.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1985 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:25.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1986 Exiting" +"2019-09-24 00:25:25.009 UTC [gossip.comm] func1 -> DEBU 1987 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:25.009 UTC [gossip.gossip] handleMessage -> DEBU 1988 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:25.009 UTC [gossip.gossip] handleMessage -> DEBU 1989 Exiting" +"2019-09-24 00:25:25.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 198a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:25.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 198b Exiting" +"2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 198c Obtaining identity" +"2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 198d Obtaining identity" +"2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 198e Obtaining identity" +"2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 198f Obtaining identity" +"2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 1990 Obtaining identity" +"2019-09-24 00:25:25.009 UTC [msp] DeserializeIdentity -> DEBU 1991 Obtaining identity" +"2019-09-24 00:25:25.010 UTC [msp] DeserializeIdentity -> DEBU 1992 Obtaining identity" +"2019-09-24 00:25:25.010 UTC [gossip.comm] Send -> DEBU 1993 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:25.010 UTC [msp] DeserializeIdentity -> DEBU 1994 Obtaining identity" +"2019-09-24 00:25:25.010 UTC [gossip.comm] Send -> DEBU 1995 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:25.010 UTC [gossip.comm] sendToEndpoint -> DEBU 1996 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:25.010 UTC [gossip.comm] sendToEndpoint -> DEBU 1997 Exiting" +"2019-09-24 00:25:25.010 UTC [gossip.comm] sendToEndpoint -> DEBU 1998 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:25.011 UTC [gossip.comm] sendToEndpoint -> DEBU 1999 Exiting" +"2019-09-24 00:25:25.177 UTC [gossip.gossip] handleMessage -> DEBU 199a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:25.177 UTC [msp] DeserializeIdentity -> DEBU 199b Obtaining identity" +"2019-09-24 00:25:25.177 UTC [msp] DeserializeIdentity -> DEBU 199c Obtaining identity" +"2019-09-24 00:25:25.177 UTC [msp] DeserializeIdentity -> DEBU 199d Obtaining identity" +"2019-09-24 00:25:25.177 UTC [gossip.gossip] handleMessage -> DEBU 199e Exiting" +"2019-09-24 00:25:25.635 UTC [gossip.comm] func1 -> DEBU 199f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:25.635 UTC [gossip.gossip] handleMessage -> DEBU 19a0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:25.635 UTC [gossip.gossip] handleMessage -> DEBU 19a1 Exiting" +"2019-09-24 00:25:25.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19a2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:25.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19a3 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:25.636 UTC [msp] DeserializeIdentity -> DEBU 19a4 Obtaining identity" +"2019-09-24 00:25:25.636 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19a5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:25.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:25.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:25.636 UTC [cauthdsl] func1 -> DEBU 19ab 0xc003e98a70 gate 1569284725636564900 evaluation starts" +"2019-09-24 00:25:25.636 UTC [cauthdsl] func2 -> DEBU 19ac 0xc003e98a70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:25.636 UTC [cauthdsl] func2 -> DEBU 19ad 0xc003e98a70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:25.636 UTC [cauthdsl] func2 -> DEBU 19ae 0xc003e98a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:25.636 UTC [cauthdsl] func2 -> DEBU 19af 0xc003e98a70 principal evaluation fails" +"2019-09-24 00:25:25.636 UTC [cauthdsl] func1 -> DEBU 19b0 0xc003e98a70 gate 1569284725636564900 evaluation fails" +"2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:25.636 UTC [policies] Evaluate -> DEBU 19b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:25.636 UTC [cauthdsl] func1 -> DEBU 19b4 0xc003e992b0 gate 1569284725636940100 evaluation starts" +"2019-09-24 00:25:25.636 UTC [cauthdsl] func2 -> DEBU 19b5 0xc003e992b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:25.637 UTC [cauthdsl] func2 -> DEBU 19b6 0xc003e992b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:25.637 UTC [cauthdsl] func2 -> DEBU 19b7 0xc003e992b0 principal matched by identity 0" +"2019-09-24 00:25:25.637 UTC [msp.identity] Verify -> DEBU 19b8 Verify: digest = 00000000 d0 65 75 c7 36 ed d7 8e 8a fb 36 15 c6 fb b4 f8 |.eu.6.....6.....| +00000010 45 78 81 db 93 57 45 db 3f ca 29 50 b1 a3 cd 52 |Ex...WE.?.)P...R|" +"2019-09-24 00:25:25.637 UTC [msp.identity] Verify -> DEBU 19b9 Verify: sig = 00000000 30 45 02 21 00 f9 57 71 92 0c 62 c1 ab ab 61 58 |0E.!..Wq..b...aX| +00000010 de 71 19 80 92 d9 73 77 73 3c df f5 0e df ca db |.q....sws<......| +00000020 97 38 d9 6e 79 02 20 22 b1 96 e4 21 12 88 15 3f |.8.ny. "...!...?| +00000030 c9 dd f2 8d 2d a1 1a 05 ad 18 22 a5 bf 0e 42 7e |....-....."...B~| +00000040 34 f9 f0 40 9f bb e9 |4..@...|" +"2019-09-24 00:25:25.637 UTC [cauthdsl] func2 -> DEBU 19ba 0xc003e992b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:25.637 UTC [cauthdsl] func1 -> DEBU 19bb 0xc003e992b0 gate 1569284725636940100 evaluation succeeds" +"2019-09-24 00:25:25.637 UTC [policies] Evaluate -> DEBU 19bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:25.637 UTC [policies] Evaluate -> DEBU 19bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:25.637 UTC [policies] Evaluate -> DEBU 19be Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:25.646 UTC [gossip.comm] func1 -> DEBU 19bf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:25.646 UTC [gossip.gossip] handleMessage -> DEBU 19c0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:25.637 UTC [policies] Evaluate -> DEBU 19c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:25.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:25.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:25.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c4 updating membership: timestamp: " +"2019-09-24 00:25:25.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c5 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:25.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:25.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c7 Exiting" +"2019-09-24 00:25:25.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c8 Exiting" +"2019-09-24 00:25:25.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19c9 Exiting" +"2019-09-24 00:25:25.648 UTC [gossip.gossip] handleMessage -> DEBU 19ca Exiting" +"2019-09-24 00:25:25.648 UTC [gossip.gossip] handleMessage -> DEBU 19cb Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:25.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19cc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:25.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19cd Exiting" +"2019-09-24 00:25:25.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19ce Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:25.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19d0 Exiting" +"2019-09-24 00:25:25.649 UTC [gossip.gossip] handleMessage -> DEBU 19cf Exiting" +"2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d1 Obtaining identity" +"2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d2 Obtaining identity" +"2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d3 Obtaining identity" +"2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d4 Obtaining identity" +"2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d5 Obtaining identity" +"2019-09-24 00:25:25.649 UTC [msp] DeserializeIdentity -> DEBU 19d6 Obtaining identity" +"2019-09-24 00:25:25.649 UTC [gossip.comm] Send -> DEBU 19d7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:25.650 UTC [msp] DeserializeIdentity -> DEBU 19d8 Obtaining identity" +"2019-09-24 00:25:25.650 UTC [gossip.comm] sendToEndpoint -> DEBU 19d9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:25.650 UTC [gossip.comm] sendToEndpoint -> DEBU 19da Exiting" +"2019-09-24 00:25:25.653 UTC [msp] DeserializeIdentity -> DEBU 19db Obtaining identity" +"2019-09-24 00:25:25.653 UTC [gossip.comm] Send -> DEBU 19dc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:25.653 UTC [gossip.comm] sendToEndpoint -> DEBU 19dd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:25.653 UTC [gossip.comm] sendToEndpoint -> DEBU 19de Exiting" +"2019-09-24 00:25:25.675 UTC [gossip.comm] func1 -> DEBU 19df Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:25.675 UTC [gossip.gossip] handleMessage -> DEBU 19e0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:25.675 UTC [gossip.pull] HandleMessage -> DEBU 19e1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:25.675 UTC [gossip.pull] SendDigest -> DEBU 19e2 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:25.675 UTC [gossip.gossip] handleMessage -> DEBU 19e3 Exiting" +"2019-09-24 00:25:25.694 UTC [gossip.comm] func1 -> DEBU 19e4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\"" signature:"0E\002!\000\247o_`m\035\313\306\370\275\177\377\347\253\rRT3\257\002^\207d\250\313C\212\255\024\t]\355\002 f\351\204\026\272S\001\326\010\242\237\266\275\353\332\211\022_\244\270\331`1\2543.h\215I\211\3162" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:25.694 UTC [gossip.gossip] handleMessage -> DEBU 19e5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\"" signature:"0E\002!\000\247o_`m\035\313\306\370\275\177\377\347\253\rRT3\257\002^\207d\250\313C\212\255\024\t]\355\002 f\351\204\026\272S\001\326\010\242\237\266\275\353\332\211\022_\244\270\331`1\2543.h\215I\211\3162" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:25.694 UTC [gossip.gossip] handleMessage -> DEBU 19e6 Exiting" +"2019-09-24 00:25:25.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19e7 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\"" signature:"0E\002!\000\247o_`m\035\313\306\370\275\177\377\347\253\rRT3\257\002^\207d\250\313C\212\255\024\t]\355\002 f\351\204\026\272S\001\326\010\242\237\266\275\353\332\211\022_\244\270\331`1\2543.h\215I\211\3162" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:25.694 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19e8 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:25.694 UTC [msp.identity] Verify -> DEBU 19e9 Verify: digest = 00000000 fc 07 cf 64 94 59 32 d5 ee 4c 18 6f 20 cb 21 2f |...d.Y2..L.o .!/| +00000010 39 ed 3e 0a 94 7e 6b 5e 5e c6 7e 0b 66 02 68 5d |9.>..~k^^.~.f.h]|" +"2019-09-24 00:25:25.694 UTC [msp.identity] Verify -> DEBU 19ea Verify: sig = 00000000 30 45 02 21 00 a7 6f 5f 60 6d 1d cb c6 f8 bd 7f |0E.!..o_`m......| +00000010 ff e7 ab 0d 52 54 33 af 02 5e 87 64 a8 cb 43 8a |....RT3..^.d..C.| +00000020 ad 14 09 5d ed 02 20 66 e9 84 16 ba 53 01 d6 08 |...].. f....S...| +00000030 a2 9f b6 bd eb da 89 12 5f a4 b8 d9 60 31 ac 33 |........_...`1.3| +00000040 2e 68 8d 49 89 ce 32 |.h.I..2|" +"2019-09-24 00:25:25.695 UTC [msp.identity] Verify -> DEBU 19eb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:25.695 UTC [msp.identity] Verify -> DEBU 19ec Verify: sig = 00000000 30 44 02 20 66 b3 3f 24 47 1c f7 23 7a 5a d6 51 |0D. f.?$G..#zZ.Q| +00000010 93 80 96 14 f7 fb 57 14 d2 8f 05 7f 92 65 44 72 |......W......eDr| +00000020 df 0e 36 4d 02 20 5c 2c c7 fc 1c 36 29 3a 74 b2 |..6M. \,...6):t.| +00000030 f4 bb ee 9a f2 26 9f ad 1e dc 2b 09 0a 71 39 74 |.....&....+..q9t| +00000040 9f ed 65 68 31 55 |..eh1U|" +"2019-09-24 00:25:25.695 UTC [gossip.discovery] handleAliveMessage -> DEBU 19ed Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:25.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ee Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:25.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 19ef updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:25.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 19f0 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:25.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 19f1 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:25.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 19f2 Exiting" +"2019-09-24 00:25:25.695 UTC [gossip.discovery] handleAliveMessage -> DEBU 19f3 Exiting" +"2019-09-24 00:25:25.695 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19f4 Exiting" +"2019-09-24 00:25:25.696 UTC [gossip.discovery] sendMemResponse -> DEBU 19f5 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:25.696 UTC [msp] DeserializeIdentity -> DEBU 19f6 Obtaining identity" +"2019-09-24 00:25:25.696 UTC [msp] DeserializeIdentity -> DEBU 19f7 Obtaining identity" +"2019-09-24 00:25:25.696 UTC [gossip.comm] Send -> DEBU 19f8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:25.696 UTC [gossip.discovery] sendMemResponse -> DEBU 19f9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\"" signature:"0E\002!\000\247o_`m\035\313\306\370\275\177\377\347\253\rRT3\257\002^\207d\250\313C\212\255\024\t]\355\002 f\351\204\026\272S\001\326\010\242\237\266\275\353\332\211\022_\244\270\331`1\2543.h\215I\211\3162" secret_envelope: > alive: " +"2019-09-24 00:25:25.696 UTC [gossip.comm] sendToEndpoint -> DEBU 19fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:25.696 UTC [gossip.comm] sendToEndpoint -> DEBU 19fb Exiting" +"2019-09-24 00:25:26.112 UTC [gossip.comm] func1 -> DEBU 19fc Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:26.112 UTC [gossip.gossip] handleMessage -> DEBU 19fd Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:26.112 UTC [msp] DeserializeIdentity -> DEBU 19fe Obtaining identity" +"2019-09-24 00:25:26.112 UTC [msp] DeserializeIdentity -> DEBU 19ff Obtaining identity" +"2019-09-24 00:25:26.112 UTC [msp] DeserializeIdentity -> DEBU 1a00 Obtaining identity" +"2019-09-24 00:25:26.112 UTC [gossip.gossip] handleMessage -> DEBU 1a01 Exiting" +"2019-09-24 00:25:27.277 UTC [gossip.election] waitForInterrupt -> DEBU 1a02 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:27.277 UTC [gossip.election] IsLeader -> DEBU 1a03 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:25:27.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a04 Obtaining default signing identity" +"2019-09-24 00:25:27.277 UTC [msp.identity] Sign -> DEBU 1a05 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510071801 " +"2019-09-24 00:25:27.277 UTC [msp.identity] Sign -> DEBU 1a06 Sign: digest: 0DCA41B51AD6E8639BBBADD5223D5C0221337E8B3A8EE737D5AA7EE8B52EB240 " +"2019-09-24 00:25:27.278 UTC [gossip.election] waitForInterrupt -> DEBU 1a07 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a08 Obtaining identity" +"2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a09 Obtaining identity" +"2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a0a Obtaining identity" +"2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a0b Obtaining identity" +"2019-09-24 00:25:27.279 UTC [gossip.comm] Send -> DEBU 1a0c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a0d Obtaining identity" +"2019-09-24 00:25:27.279 UTC [msp] DeserializeIdentity -> DEBU 1a0e Obtaining identity" +"2019-09-24 00:25:27.279 UTC [gossip.comm] sendToEndpoint -> DEBU 1a0f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:25:27.279 UTC [gossip.comm] sendToEndpoint -> DEBU 1a10 Exiting" +"2019-09-24 00:25:27.604 UTC [gossip.pull] Hello -> DEBU 1a11 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:27.604 UTC [gossip.comm] Send -> DEBU 1a12 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:27.604 UTC [gossip.pull] Hello -> DEBU 1a13 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:27.605 UTC [gossip.comm] Send -> DEBU 1a14 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:27.605 UTC [gossip.pull] Hello -> DEBU 1a15 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:27.605 UTC [gossip.comm] Send -> DEBU 1a16 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:27.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1a17 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1a19 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1a18 Exiting" +"2019-09-24 00:25:27.605 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1a Exiting" +"2019-09-24 00:25:27.606 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.606 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1c Exiting" +"2019-09-24 00:25:27.610 UTC [gossip.comm] func1 -> DEBU 1a1d Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.610 UTC [gossip.gossip] handleMessage -> DEBU 1a1e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.610 UTC [gossip.pull] HandleMessage -> DEBU 1a1f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.610 UTC [gossip.gossip] handleMessage -> DEBU 1a20 Exiting" +"2019-09-24 00:25:27.610 UTC [gossip.gossip] handleMessage -> DEBU 1a21 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.611 UTC [gossip.pull] HandleMessage -> DEBU 1a22 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.614 UTC [gossip.comm] func1 -> DEBU 1a23 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.614 UTC [gossip.gossip] handleMessage -> DEBU 1a24 Exiting" +"2019-09-24 00:25:27.614 UTC [gossip.gossip] handleMessage -> DEBU 1a25 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.614 UTC [gossip.pull] HandleMessage -> DEBU 1a26 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.614 UTC [gossip.gossip] handleMessage -> DEBU 1a27 Exiting" +"2019-09-24 00:25:27.626 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a28 Obtaining default signing identity" +"2019-09-24 00:25:27.626 UTC [msp.identity] Sign -> DEBU 1a29 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315101F " +"2019-09-24 00:25:27.626 UTC [msp.identity] Sign -> DEBU 1a2a Sign: digest: EC1C60448E796F3DDF1529F66D9191880E5AD1183CFE5E0C752081A1CF35B6F4 " +"2019-09-24 00:25:27.626 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a2b Obtaining default signing identity" +"2019-09-24 00:25:27.626 UTC [msp.identity] Sign -> DEBU 1a2c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:27.626 UTC [msp.identity] Sign -> DEBU 1a2d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:27.627 UTC [gossip.comm] Send -> DEBU 1a2e Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:27.627 UTC [msp] DeserializeIdentity -> DEBU 1a2f Obtaining identity" +"2019-09-24 00:25:27.627 UTC [gossip.comm] Send -> DEBU 1a30 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:27.627 UTC [msp] DeserializeIdentity -> DEBU 1a31 Obtaining identity" +"2019-09-24 00:25:27.627 UTC [gossip.comm] Send -> DEBU 1a32 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:27.627 UTC [gossip.comm] sendToEndpoint -> DEBU 1a33 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.627 UTC [gossip.comm] sendToEndpoint -> DEBU 1a34 Exiting" +"2019-09-24 00:25:27.627 UTC [gossip.comm] sendToEndpoint -> DEBU 1a35 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.628 UTC [gossip.comm] sendToEndpoint -> DEBU 1a36 Exiting" +"2019-09-24 00:25:27.631 UTC [gossip.comm] sendToEndpoint -> DEBU 1a37 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.631 UTC [gossip.comm] sendToEndpoint -> DEBU 1a38 Exiting" +"2019-09-24 00:25:27.635 UTC [gossip.gossip] handleMessage -> DEBU 1a39 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.635 UTC [gossip.gossip] handleMessage -> DEBU 1a3a Exiting" +"2019-09-24 00:25:27.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a3b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a3c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:27.636 UTC [msp.identity] Verify -> DEBU 1a3d Verify: digest = 00000000 ec 1c 60 44 8e 79 6f 3d df 15 29 f6 6d 91 91 88 |..`D.yo=..).m...| +00000010 0e 5a d1 18 3c fe 5e 0c 75 20 81 a1 cf 35 b6 f4 |.Z..<.^.u ...5..|" +"2019-09-24 00:25:27.636 UTC [msp.identity] Verify -> DEBU 1a3e Verify: sig = 00000000 30 44 02 20 54 9a 74 29 f4 09 fd b9 56 98 f5 d4 |0D. T.t)....V...| +00000010 1b cc 74 ee 4c 7c 5c 91 26 4e 61 0e 4d 31 7f 10 |..t.L|\.&Na.M1..| +00000020 d7 0f fc 7c 02 20 1c 51 d1 44 ab 47 65 24 0b 54 |...|. .Q.D.Ge$.T| +00000030 2f 5a 64 f2 90 e0 d0 27 97 e2 f0 05 57 ba 1a a4 |/Zd....'....W...| +00000040 39 05 b4 e5 63 d7 |9...c.|" +"2019-09-24 00:25:27.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a3f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.637 UTC [gossip.discovery] isSentByMe -> DEBU 1a40 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a41 Exiting" +"2019-09-24 00:25:27.637 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a42 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:27.643 UTC [gossip.comm] func1 -> DEBU 1a43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.644 UTC [gossip.gossip] handleMessage -> DEBU 1a44 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.645 UTC [msp.identity] Verify -> DEBU 1a45 Verify: digest = 00000000 fc 07 cf 64 94 59 32 d5 ee 4c 18 6f 20 cb 21 2f |...d.Y2..L.o .!/| +00000010 39 ed 3e 0a 94 7e 6b 5e 5e c6 7e 0b 66 02 68 5d |9.>..~k^^.~.f.h]|" +"2019-09-24 00:25:27.645 UTC [msp.identity] Verify -> DEBU 1a46 Verify: sig = 00000000 30 45 02 21 00 a7 6f 5f 60 6d 1d cb c6 f8 bd 7f |0E.!..o_`m......| +00000010 ff e7 ab 0d 52 54 33 af 02 5e 87 64 a8 cb 43 8a |....RT3..^.d..C.| +00000020 ad 14 09 5d ed 02 20 66 e9 84 16 ba 53 01 d6 08 |...].. f....S...| +00000030 a2 9f b6 bd eb da 89 12 5f a4 b8 d9 60 31 ac 33 |........_...`1.3| +00000040 2e 68 8d 49 89 ce 32 |.h.I..2|" +"2019-09-24 00:25:27.644 UTC [gossip.comm] func1 -> DEBU 1a47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.645 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a48 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:27.645 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a49 Exiting" +"2019-09-24 00:25:27.645 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a4a Exiting" +"2019-09-24 00:25:27.645 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.646 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a4c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:27.646 UTC [gossip.gossip] handleMessage -> DEBU 1a4d Exiting" +"2019-09-24 00:25:27.646 UTC [gossip.gossip] handleMessage -> DEBU 1a4e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.646 UTC [msp.identity] Verify -> DEBU 1a4f Verify: digest = 00000000 ec 1c 60 44 8e 79 6f 3d df 15 29 f6 6d 91 91 88 |..`D.yo=..).m...| +00000010 0e 5a d1 18 3c fe 5e 0c 75 20 81 a1 cf 35 b6 f4 |.Z..<.^.u ...5..|" +"2019-09-24 00:25:27.646 UTC [msp.identity] Verify -> DEBU 1a50 Verify: sig = 00000000 30 44 02 20 54 9a 74 29 f4 09 fd b9 56 98 f5 d4 |0D. T.t)....V...| +00000010 1b cc 74 ee 4c 7c 5c 91 26 4e 61 0e 4d 31 7f 10 |..t.L|\.&Na.M1..| +00000020 d7 0f fc 7c 02 20 1c 51 d1 44 ab 47 65 24 0b 54 |...|. .Q.D.Ge$.T| +00000030 2f 5a 64 f2 90 e0 d0 27 97 e2 f0 05 57 ba 1a a4 |/Zd....'....W...| +00000040 39 05 b4 e5 63 d7 |9...c.|" +"2019-09-24 00:25:27.647 UTC [msp.identity] Verify -> DEBU 1a51 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:27.647 UTC [msp.identity] Verify -> DEBU 1a52 Verify: sig = 00000000 30 45 02 21 00 86 3f 82 b8 ff 1c 8a e0 c1 97 7c |0E.!..?........|| +00000010 28 c2 65 c6 bf ac a1 a5 81 a3 f9 11 c0 e4 59 b9 |(.e...........Y.| +00000020 af 42 bf 2b b7 02 20 46 b8 0b 8a 00 09 82 57 a0 |.B.+.. F......W.| +00000030 18 10 e1 b2 fd aa f3 19 3b 59 e3 fd 07 90 3c fb |........;Y....<.| +00000040 03 bf 40 08 e9 e0 1a |..@....|" +"2019-09-24 00:25:27.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a53 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:27.647 UTC [gossip.discovery] isSentByMe -> DEBU 1a54 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:27.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a55 Exiting" +"2019-09-24 00:25:27.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a56 Exiting" +"2019-09-24 00:25:27.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a57 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.647 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a58 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:27.647 UTC [gossip.gossip] handleMessage -> DEBU 1a59 Exiting" +"2019-09-24 00:25:27.647 UTC [msp.identity] Verify -> DEBU 1a5a Verify: digest = 00000000 ec 1c 60 44 8e 79 6f 3d df 15 29 f6 6d 91 91 88 |..`D.yo=..).m...| +00000010 0e 5a d1 18 3c fe 5e 0c 75 20 81 a1 cf 35 b6 f4 |.Z..<.^.u ...5..|" +"2019-09-24 00:25:27.648 UTC [msp.identity] Verify -> DEBU 1a5b Verify: sig = 00000000 30 44 02 20 54 9a 74 29 f4 09 fd b9 56 98 f5 d4 |0D. T.t)....V...| +00000010 1b cc 74 ee 4c 7c 5c 91 26 4e 61 0e 4d 31 7f 10 |..t.L|\.&Na.M1..| +00000020 d7 0f fc 7c 02 20 1c 51 d1 44 ab 47 65 24 0b 54 |...|. .Q.D.Ge$.T| +00000030 2f 5a 64 f2 90 e0 d0 27 97 e2 f0 05 57 ba 1a a4 |/Zd....'....W...| +00000040 39 05 b4 e5 63 d7 |9...c.|" +"2019-09-24 00:25:27.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a5c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.648 UTC [gossip.discovery] isSentByMe -> DEBU 1a5d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a5e Exiting" +"2019-09-24 00:25:27.648 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a5f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:27.648 UTC [msp.identity] Verify -> DEBU 1a60 Verify: digest = 00000000 fc 07 cf 64 94 59 32 d5 ee 4c 18 6f 20 cb 21 2f |...d.Y2..L.o .!/| +00000010 39 ed 3e 0a 94 7e 6b 5e 5e c6 7e 0b 66 02 68 5d |9.>..~k^^.~.f.h]|" +"2019-09-24 00:25:27.648 UTC [msp.identity] Verify -> DEBU 1a61 Verify: sig = 00000000 30 45 02 21 00 a7 6f 5f 60 6d 1d cb c6 f8 bd 7f |0E.!..o_`m......| +00000010 ff e7 ab 0d 52 54 33 af 02 5e 87 64 a8 cb 43 8a |....RT3..^.d..C.| +00000020 ad 14 09 5d ed 02 20 66 e9 84 16 ba 53 01 d6 08 |...].. f....S...| +00000030 a2 9f b6 bd eb da 89 12 5f a4 b8 d9 60 31 ac 33 |........_...`1.3| +00000040 2e 68 8d 49 89 ce 32 |.h.I..2|" +"2019-09-24 00:25:27.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a62 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:27.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a63 Exiting" +"2019-09-24 00:25:27.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a64 Exiting" +"2019-09-24 00:25:27.699 UTC [gossip.comm] func1 -> DEBU 1a65 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.699 UTC [gossip.gossip] handleMessage -> DEBU 1a66 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.699 UTC [gossip.gossip] handleMessage -> DEBU 1a67 Exiting" +"2019-09-24 00:25:27.699 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a68 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.699 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a69 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:27.700 UTC [msp.identity] Verify -> DEBU 1a6a Verify: digest = 00000000 c5 5c c2 17 e7 67 d2 39 e1 82 b8 ef f4 cc d1 00 |.\...g.9........| +00000010 c5 6b 44 d1 5b 0a 52 05 5d 02 31 e2 f5 01 20 ac |.kD.[.R.].1... .|" +"2019-09-24 00:25:27.700 UTC [msp.identity] Verify -> DEBU 1a6b Verify: sig = 00000000 30 44 02 20 6f b6 1a 60 71 12 96 1d 19 ee bb 13 |0D. o..`q.......| +00000010 7c d5 d7 e6 6d 87 3e f1 37 e9 64 e9 62 dd c5 fc ||...m.>.7.d.b...| +00000020 69 ac 85 78 02 20 32 bf 01 04 39 4e 1e c6 a3 15 |i..x. 2...9N....| +00000030 9d 2f 3d e6 85 27 c2 0b 87 86 d9 d5 ab be dd d5 |./=..'..........| +00000040 78 04 4c 4e e5 26 |x.LN.&|" +"2019-09-24 00:25:27.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a6c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a6d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:27.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a6e updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:27.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a6f Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:27.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a70 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:27.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a71 Exiting" +"2019-09-24 00:25:27.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a72 Exiting" +"2019-09-24 00:25:27.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a73 Exiting" +"2019-09-24 00:25:27.711 UTC [gossip.gossip] handleMessage -> DEBU 1a74 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.711 UTC [msp] DeserializeIdentity -> DEBU 1a75 Obtaining identity" +"2019-09-24 00:25:27.711 UTC [gossip.gossip] handleMessage -> DEBU 1a76 Exiting" +"2019-09-24 00:25:27.711 UTC [msp] DeserializeIdentity -> DEBU 1a77 Obtaining identity" +"2019-09-24 00:25:27.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a78 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.711 UTC [msp] DeserializeIdentity -> DEBU 1a79 Obtaining identity" +"2019-09-24 00:25:27.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a7a Exiting" +"2019-09-24 00:25:27.711 UTC [gossip.comm] Send -> DEBU 1a7b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:27.711 UTC [msp] DeserializeIdentity -> DEBU 1a7c Obtaining identity" +"2019-09-24 00:25:27.711 UTC [gossip.comm] Send -> DEBU 1a7d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:27.711 UTC [gossip.comm] sendToEndpoint -> DEBU 1a7e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.711 UTC [gossip.comm] sendToEndpoint -> DEBU 1a7f Exiting" +"2019-09-24 00:25:27.712 UTC [gossip.comm] sendToEndpoint -> DEBU 1a80 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.712 UTC [gossip.comm] sendToEndpoint -> DEBU 1a81 Exiting" +"2019-09-24 00:25:27.714 UTC [gossip.comm] func1 -> DEBU 1a82 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.714 UTC [gossip.gossip] handleMessage -> DEBU 1a83 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.714 UTC [gossip.gossip] handleMessage -> DEBU 1a84 Exiting" +"2019-09-24 00:25:27.714 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a85 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:27.714 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a86 Exiting" +"2019-09-24 00:25:27.959 UTC [gossip.gossip] handleMessage -> DEBU 1a87 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.959 UTC [gossip.pull] HandleMessage -> DEBU 1a88 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a89 Obtaining identity" +"2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a8a Obtaining identity" +"2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a8b Obtaining identity" +"2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a8c Obtaining identity" +"2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a8d Obtaining identity" +"2019-09-24 00:25:27.960 UTC [msp] DeserializeIdentity -> DEBU 1a8e Obtaining identity" +"2019-09-24 00:25:27.960 UTC [gossip.pull] SendDigest -> DEBU 1a8f Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:27.960 UTC [gossip.gossip] handleMessage -> DEBU 1a90 Exiting" +"2019-09-24 00:25:27.971 UTC [gossip.gossip] handleMessage -> DEBU 1a91 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.971 UTC [gossip.gossip] handleMessage -> DEBU 1a92 Exiting" +"2019-09-24 00:25:27.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a93 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.971 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a94 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:27.971 UTC [msp] DeserializeIdentity -> DEBU 1a95 Obtaining identity" +"2019-09-24 00:25:27.971 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:27.972 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a97 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:27.972 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a98 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:27.972 UTC [policies] Evaluate -> DEBU 1a99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:27.972 UTC [policies] Evaluate -> DEBU 1a9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:27.972 UTC [policies] Evaluate -> DEBU 1a9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:27.972 UTC [cauthdsl] func1 -> DEBU 1a9c 0xc0036b52d0 gate 1569284727972446800 evaluation starts" +"2019-09-24 00:25:27.972 UTC [cauthdsl] func2 -> DEBU 1a9d 0xc0036b52d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:27.973 UTC [cauthdsl] func2 -> DEBU 1a9e 0xc0036b52d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:27.973 UTC [cauthdsl] func2 -> DEBU 1a9f 0xc0036b52d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:27.973 UTC [cauthdsl] func2 -> DEBU 1aa0 0xc0036b52d0 principal evaluation fails" +"2019-09-24 00:25:27.973 UTC [cauthdsl] func1 -> DEBU 1aa1 0xc0036b52d0 gate 1569284727972446800 evaluation fails" +"2019-09-24 00:25:27.973 UTC [policies] Evaluate -> DEBU 1aa2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:27.973 UTC [policies] Evaluate -> DEBU 1aa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:27.973 UTC [policies] Evaluate -> DEBU 1aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:27.973 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc0036b5b10 gate 1569284727973715200 evaluation starts" +"2019-09-24 00:25:27.973 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc0036b5b10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:27.973 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc0036b5b10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:27.974 UTC [cauthdsl] func2 -> DEBU 1aa8 0xc0036b5b10 principal matched by identity 0" +"2019-09-24 00:25:27.988 UTC [msp.identity] Verify -> DEBU 1aa9 Verify: digest = 00000000 2c ad ca 91 5c 5a 73 83 c0 f9 2f 31 fd 2b 09 6e |,...\Zs.../1.+.n| +00000010 7b 91 ff d4 cf 66 d4 5d a2 dd 2d cb 8f 58 2d 31 |{....f.]..-..X-1|" +"2019-09-24 00:25:27.988 UTC [msp.identity] Verify -> DEBU 1aaa Verify: sig = 00000000 30 45 02 21 00 d8 fb 12 1d be fa a6 8d a3 2d 13 |0E.!..........-.| +00000010 5f e6 34 4e 66 86 7f 6d 33 36 b4 15 eb 73 84 50 |_.4Nf..m36...s.P| +00000020 c5 d4 28 3c 96 02 20 01 13 cb b4 c3 ad 2c a4 6a |..(<.. ......,.j| +00000030 9b ef ea 75 ca 26 cf 89 de c9 5f ee 01 13 b7 d7 |...u.&...._.....| +00000040 af 41 cd ea 6c 14 0b |.A..l..|" +"2019-09-24 00:25:27.988 UTC [cauthdsl] func2 -> DEBU 1aab 0xc0036b5b10 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:27.988 UTC [cauthdsl] func1 -> DEBU 1aac 0xc0036b5b10 gate 1569284727973715200 evaluation succeeds" +"2019-09-24 00:25:27.988 UTC [policies] Evaluate -> DEBU 1aad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:27.988 UTC [policies] Evaluate -> DEBU 1aae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:27.988 UTC [policies] Evaluate -> DEBU 1aaf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:27.988 UTC [policies] Evaluate -> DEBU 1ab0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:27.989 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ab1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:27.989 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ab2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:27.989 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ab3 updating membership: timestamp: " +"2019-09-24 00:25:27.989 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ab4 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:27.989 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ab5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:27.989 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ab6 Exiting" +"2019-09-24 00:25:27.989 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ab7 Exiting" +"2019-09-24 00:25:27.990 UTC [gossip.discovery] sendMemResponse -> DEBU 1ab8 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:27.990 UTC [msp] DeserializeIdentity -> DEBU 1ab9 Obtaining identity" +"2019-09-24 00:25:27.990 UTC [msp] DeserializeIdentity -> DEBU 1aba Obtaining identity" +"2019-09-24 00:25:27.990 UTC [msp] DeserializeIdentity -> DEBU 1abb Obtaining identity" +"2019-09-24 00:25:27.991 UTC [gossip.comm] Send -> DEBU 1abc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:27.995 UTC [gossip.discovery] sendMemResponse -> DEBU 1abd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020#" signature:"0D\002 o\266\032`q\022\226\035\031\356\273\023|\325\327\346m\207>\3617\351d\351b\335\305\374i\254\205x\002 2\277\001\0049N\036\306\243\025\235/=\346\205'\302\013\207\206\331\325\253\276\335\325x\004LN\345&" > alive: alive: alive: " +"2019-09-24 00:25:27.995 UTC [gossip.comm] sendToEndpoint -> DEBU 1abe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:25:27.995 UTC [gossip.comm] sendToEndpoint -> DEBU 1abf Exiting" +"2019-09-24 00:25:27.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ac0 Exiting" +"2019-09-24 00:25:28.185 UTC [msp] DeserializeIdentity -> DEBU 1ac1 Obtaining identity" +"2019-09-24 00:25:28.186 UTC [msp] DeserializeIdentity -> DEBU 1ac2 Obtaining identity" +"2019-09-24 00:25:28.186 UTC [gossip.comm] Send -> DEBU 1ac3 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac5 Exiting" +"2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac7 Exiting" +"2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1ac9 Exiting" +"2019-09-24 00:25:28.188 UTC [gossip.gossip] handleMessage -> DEBU 1aca Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.188 UTC [msp] DeserializeIdentity -> DEBU 1acb Obtaining identity" +"2019-09-24 00:25:28.188 UTC [msp] DeserializeIdentity -> DEBU 1acc Obtaining identity" +"2019-09-24 00:25:28.188 UTC [msp] DeserializeIdentity -> DEBU 1acd Obtaining identity" +"2019-09-24 00:25:28.188 UTC [gossip.comm] func1 -> DEBU 1ace Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.188 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1acf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:28.188 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ad0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.188 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ad1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.188 UTC [policies] Evaluate -> DEBU 1ad2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:28.189 UTC [policies] Evaluate -> DEBU 1ad3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:28.189 UTC [policies] Evaluate -> DEBU 1ad4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:28.189 UTC [cauthdsl] func1 -> DEBU 1ad5 0xc00374fd00 gate 1569284728189232100 evaluation starts" +"2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ad6 0xc00374fd00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ad7 0xc00374fd00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ad8 0xc00374fd00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ad9 0xc00374fd00 principal evaluation fails" +"2019-09-24 00:25:28.189 UTC [cauthdsl] func1 -> DEBU 1ada 0xc00374fd00 gate 1569284728189232100 evaluation fails" +"2019-09-24 00:25:28.189 UTC [policies] Evaluate -> DEBU 1adb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.189 UTC [policies] Evaluate -> DEBU 1adc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.189 UTC [policies] Evaluate -> DEBU 1add == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:28.189 UTC [cauthdsl] func1 -> DEBU 1ade 0xc0038da540 gate 1569284728189712900 evaluation starts" +"2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1adf 0xc0038da540 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ae0 0xc0038da540 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.189 UTC [cauthdsl] func2 -> DEBU 1ae1 0xc0038da540 principal matched by identity 0" +"2019-09-24 00:25:28.190 UTC [msp.identity] Verify -> DEBU 1ae2 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:28.190 UTC [msp.identity] Verify -> DEBU 1ae3 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:28.190 UTC [cauthdsl] func2 -> DEBU 1ae4 0xc0038da540 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:28.190 UTC [cauthdsl] func1 -> DEBU 1ae5 0xc0038da540 gate 1569284728189712900 evaluation succeeds" +"2019-09-24 00:25:28.190 UTC [policies] Evaluate -> DEBU 1ae6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.190 UTC [policies] Evaluate -> DEBU 1ae7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.198 UTC [gossip.comm] func1 -> DEBU 1ae8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.191 UTC [policies] Evaluate -> DEBU 1ae9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:28.199 UTC [policies] Evaluate -> DEBU 1aea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:28.199 UTC [msp.identity] Verify -> DEBU 1aeb Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:28.199 UTC [msp.identity] Verify -> DEBU 1aec Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:28.199 UTC [msp.identity] Verify -> DEBU 1aed Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:28.200 UTC [msp.identity] Verify -> DEBU 1aee Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:28.200 UTC [msp] DeserializeIdentity -> DEBU 1aef Obtaining identity" +"2019-09-24 00:25:28.200 UTC [msp] DeserializeIdentity -> DEBU 1af0 Obtaining identity" +"2019-09-24 00:25:28.200 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1af1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:28.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1af2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1af3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.200 UTC [policies] Evaluate -> DEBU 1af4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:28.200 UTC [policies] Evaluate -> DEBU 1af5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:28.200 UTC [policies] Evaluate -> DEBU 1af6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:28.200 UTC [cauthdsl] func1 -> DEBU 1af7 0xc003c60b50 gate 1569284728200811400 evaluation starts" +"2019-09-24 00:25:28.200 UTC [cauthdsl] func2 -> DEBU 1af8 0xc003c60b50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.200 UTC [cauthdsl] func2 -> DEBU 1af9 0xc003c60b50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.200 UTC [cauthdsl] func2 -> DEBU 1afa 0xc003c60b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:28.201 UTC [cauthdsl] func2 -> DEBU 1afb 0xc003c60b50 principal evaluation fails" +"2019-09-24 00:25:28.201 UTC [cauthdsl] func1 -> DEBU 1afc 0xc003c60b50 gate 1569284728200811400 evaluation fails" +"2019-09-24 00:25:28.202 UTC [policies] Evaluate -> DEBU 1afd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.203 UTC [policies] Evaluate -> DEBU 1afe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.203 UTC [policies] Evaluate -> DEBU 1aff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:28.203 UTC [cauthdsl] func1 -> DEBU 1b00 0xc003c61390 gate 1569284728203206700 evaluation starts" +"2019-09-24 00:25:28.203 UTC [cauthdsl] func2 -> DEBU 1b01 0xc003c61390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.203 UTC [cauthdsl] func2 -> DEBU 1b02 0xc003c61390 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.203 UTC [cauthdsl] func2 -> DEBU 1b03 0xc003c61390 principal matched by identity 0" +"2019-09-24 00:25:28.203 UTC [msp.identity] Verify -> DEBU 1b04 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:28.203 UTC [msp.identity] Verify -> DEBU 1b05 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:28.204 UTC [cauthdsl] func2 -> DEBU 1b06 0xc003c61390 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:28.204 UTC [cauthdsl] func1 -> DEBU 1b07 0xc003c61390 gate 1569284728203206700 evaluation succeeds" +"2019-09-24 00:25:28.204 UTC [policies] Evaluate -> DEBU 1b08 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.204 UTC [policies] Evaluate -> DEBU 1b09 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.204 UTC [policies] Evaluate -> DEBU 1b0a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:28.204 UTC [policies] Evaluate -> DEBU 1b0b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:28.204 UTC [gossip.gossip] handleMessage -> DEBU 1b0c Exiting" +"2019-09-24 00:25:28.205 UTC [gossip.gossip] handleMessage -> DEBU 1b0d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.205 UTC [msp.identity] Verify -> DEBU 1b0e Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:28.205 UTC [msp.identity] Verify -> DEBU 1b0f Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:28.206 UTC [msp.identity] Verify -> DEBU 1b10 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:28.206 UTC [msp.identity] Verify -> DEBU 1b11 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:28.206 UTC [msp] DeserializeIdentity -> DEBU 1b12 Obtaining identity" +"2019-09-24 00:25:28.207 UTC [msp] DeserializeIdentity -> DEBU 1b13 Obtaining identity" +"2019-09-24 00:25:28.208 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:28.212 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b15 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.213 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b16 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.213 UTC [policies] Evaluate -> DEBU 1b17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:28.213 UTC [policies] Evaluate -> DEBU 1b18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:28.213 UTC [policies] Evaluate -> DEBU 1b19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:28.214 UTC [cauthdsl] func1 -> DEBU 1b1a 0xc003c71be0 gate 1569284728214085200 evaluation starts" +"2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b1b 0xc003c71be0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b1c 0xc003c71be0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b1d 0xc003c71be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b1e 0xc003c71be0 principal evaluation fails" +"2019-09-24 00:25:28.214 UTC [cauthdsl] func1 -> DEBU 1b1f 0xc003c71be0 gate 1569284728214085200 evaluation fails" +"2019-09-24 00:25:28.214 UTC [policies] Evaluate -> DEBU 1b20 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.214 UTC [policies] Evaluate -> DEBU 1b21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.214 UTC [policies] Evaluate -> DEBU 1b22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:28.214 UTC [cauthdsl] func1 -> DEBU 1b23 0xc003d08420 gate 1569284728214533000 evaluation starts" +"2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b24 0xc003d08420 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b25 0xc003d08420 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.214 UTC [cauthdsl] func2 -> DEBU 1b26 0xc003d08420 principal matched by identity 0" +"2019-09-24 00:25:28.214 UTC [msp.identity] Verify -> DEBU 1b27 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:28.214 UTC [msp.identity] Verify -> DEBU 1b28 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:28.215 UTC [cauthdsl] func2 -> DEBU 1b29 0xc003d08420 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:28.215 UTC [cauthdsl] func1 -> DEBU 1b2a 0xc003d08420 gate 1569284728214533000 evaluation succeeds" +"2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b2b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b2d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:28.215 UTC [msp] DeserializeIdentity -> DEBU 1b2f Obtaining identity" +"2019-09-24 00:25:28.215 UTC [msp] DeserializeIdentity -> DEBU 1b30 Obtaining identity" +"2019-09-24 00:25:28.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b31 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:28.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b32 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b33 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b34 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b35 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:28.215 UTC [policies] Evaluate -> DEBU 1b36 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func1 -> DEBU 1b37 0xc003d09bf0 gate 1569284728216016800 evaluation starts" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b38 0xc003d09bf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b39 0xc003d09bf0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b3a 0xc003d09bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b3b 0xc003d09bf0 principal evaluation fails" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func1 -> DEBU 1b3c 0xc003d09bf0 gate 1569284728216016800 evaluation fails" +"2019-09-24 00:25:28.216 UTC [policies] Evaluate -> DEBU 1b3d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.216 UTC [policies] Evaluate -> DEBU 1b3e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.216 UTC [policies] Evaluate -> DEBU 1b3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func1 -> DEBU 1b40 0xc000388430 gate 1569284728216502700 evaluation starts" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b41 0xc000388430 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b42 0xc000388430 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b43 0xc000388430 principal matched by identity 0" +"2019-09-24 00:25:28.216 UTC [msp.identity] Verify -> DEBU 1b44 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:28.216 UTC [msp.identity] Verify -> DEBU 1b45 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func2 -> DEBU 1b46 0xc000388430 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:28.216 UTC [cauthdsl] func1 -> DEBU 1b47 0xc000388430 gate 1569284728216502700 evaluation succeeds" +"2019-09-24 00:25:28.217 UTC [policies] Evaluate -> DEBU 1b48 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.217 UTC [policies] Evaluate -> DEBU 1b49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.217 UTC [policies] Evaluate -> DEBU 1b4a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:28.217 UTC [policies] Evaluate -> DEBU 1b4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:28.217 UTC [gossip.gossip] handleMessage -> DEBU 1b4c Exiting" +"2019-09-24 00:25:28.217 UTC [gossip.gossip] handleMessage -> DEBU 1b4d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.217 UTC [msp] DeserializeIdentity -> DEBU 1b4e Obtaining identity" +"2019-09-24 00:25:28.217 UTC [msp] DeserializeIdentity -> DEBU 1b4f Obtaining identity" +"2019-09-24 00:25:28.217 UTC [msp] DeserializeIdentity -> DEBU 1b50 Obtaining identity" +"2019-09-24 00:25:28.217 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b51 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:28.217 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b52 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.217 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b53 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b54 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b56 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:28.218 UTC [cauthdsl] func1 -> DEBU 1b57 0xc000389f40 gate 1569284728218349600 evaluation starts" +"2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b58 0xc000389f40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b59 0xc000389f40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b5a 0xc000389f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b5b 0xc000389f40 principal evaluation fails" +"2019-09-24 00:25:28.218 UTC [cauthdsl] func1 -> DEBU 1b5c 0xc000389f40 gate 1569284728218349600 evaluation fails" +"2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b5d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.218 UTC [policies] Evaluate -> DEBU 1b5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:28.218 UTC [cauthdsl] func1 -> DEBU 1b60 0xc002b8e780 gate 1569284728218641600 evaluation starts" +"2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b61 0xc002b8e780 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b62 0xc002b8e780 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.218 UTC [cauthdsl] func2 -> DEBU 1b63 0xc002b8e780 principal matched by identity 0" +"2019-09-24 00:25:28.218 UTC [msp.identity] Verify -> DEBU 1b64 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:28.218 UTC [msp.identity] Verify -> DEBU 1b65 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:28.219 UTC [cauthdsl] func2 -> DEBU 1b66 0xc002b8e780 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:28.219 UTC [cauthdsl] func1 -> DEBU 1b67 0xc002b8e780 gate 1569284728218641600 evaluation succeeds" +"2019-09-24 00:25:28.219 UTC [policies] Evaluate -> DEBU 1b68 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.219 UTC [policies] Evaluate -> DEBU 1b69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.220 UTC [policies] Evaluate -> DEBU 1b6a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:28.220 UTC [policies] Evaluate -> DEBU 1b6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:28.221 UTC [msp.identity] Verify -> DEBU 1b6c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:28.221 UTC [msp.identity] Verify -> DEBU 1b6d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:28.221 UTC [msp] DeserializeIdentity -> DEBU 1b6e Obtaining identity" +"2019-09-24 00:25:28.221 UTC [msp] DeserializeIdentity -> DEBU 1b6f Obtaining identity" +"2019-09-24 00:25:28.222 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b70 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:28.222 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b71 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.222 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b72 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.222 UTC [policies] Evaluate -> DEBU 1b73 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:28.222 UTC [policies] Evaluate -> DEBU 1b74 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:28.222 UTC [policies] Evaluate -> DEBU 1b75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:28.222 UTC [cauthdsl] func1 -> DEBU 1b76 0xc0034a8670 gate 1569284728222553400 evaluation starts" +"2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b77 0xc0034a8670 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b78 0xc0034a8670 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b79 0xc0034a8670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b7a 0xc0034a8670 principal evaluation fails" +"2019-09-24 00:25:28.223 UTC [cauthdsl] func1 -> DEBU 1b7b 0xc0034a8670 gate 1569284728222553400 evaluation fails" +"2019-09-24 00:25:28.223 UTC [policies] Evaluate -> DEBU 1b7c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.223 UTC [policies] Evaluate -> DEBU 1b7d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.223 UTC [policies] Evaluate -> DEBU 1b7e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:28.223 UTC [cauthdsl] func1 -> DEBU 1b7f 0xc0034a8eb0 gate 1569284728223540400 evaluation starts" +"2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b80 0xc0034a8eb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b81 0xc0034a8eb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.223 UTC [cauthdsl] func2 -> DEBU 1b82 0xc0034a8eb0 principal matched by identity 0" +"2019-09-24 00:25:28.223 UTC [msp.identity] Verify -> DEBU 1b83 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:28.224 UTC [msp.identity] Verify -> DEBU 1b84 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:28.229 UTC [cauthdsl] func2 -> DEBU 1b85 0xc0034a8eb0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:28.229 UTC [cauthdsl] func1 -> DEBU 1b86 0xc0034a8eb0 gate 1569284728223540400 evaluation succeeds" +"2019-09-24 00:25:28.229 UTC [policies] Evaluate -> DEBU 1b87 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.229 UTC [policies] Evaluate -> DEBU 1b88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.229 UTC [policies] Evaluate -> DEBU 1b89 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:28.229 UTC [policies] Evaluate -> DEBU 1b8a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:28.229 UTC [msp.identity] Verify -> DEBU 1b8b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:28.230 UTC [msp.identity] Verify -> DEBU 1b8c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:28.230 UTC [gossip.gossip] handleMessage -> DEBU 1b8d Exiting" +"2019-09-24 00:25:28.282 UTC [msp] DeserializeIdentity -> DEBU 1b8e Obtaining identity" +"2019-09-24 00:25:28.282 UTC [msp] DeserializeIdentity -> DEBU 1b8f Obtaining identity" +"2019-09-24 00:25:28.282 UTC [gossip.pull] Hello -> DEBU 1b90 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:28.282 UTC [msp] DeserializeIdentity -> DEBU 1b91 Obtaining identity" +"2019-09-24 00:25:28.283 UTC [msp] DeserializeIdentity -> DEBU 1b92 Obtaining identity" +"2019-09-24 00:25:28.283 UTC [gossip.comm] Send -> DEBU 1b93 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:28.283 UTC [gossip.comm] sendToEndpoint -> DEBU 1b94 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.283 UTC [gossip.comm] sendToEndpoint -> DEBU 1b95 Exiting" +"2019-09-24 00:25:28.285 UTC [gossip.comm] func1 -> DEBU 1b96 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.285 UTC [gossip.gossip] handleMessage -> DEBU 1b97 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.285 UTC [gossip.pull] HandleMessage -> DEBU 1b98 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.285 UTC [gossip.gossip] handleMessage -> DEBU 1b99 Exiting" +"2019-09-24 00:25:28.676 UTC [gossip.comm] func1 -> DEBU 1b9a Got message: GossipMessage: tag:EMPTY mem_req:a\247 \006\3408\253\252\216\037\337\035n\361\201G\211\352\255\231a\034\240u0V\221\002 ~?\376u\035\224\036\231\021\256\020\2305\250tV\306<\215\362\322u\031\226\266\023\020\000\210J\350\246" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.676 UTC [gossip.gossip] handleMessage -> DEBU 1b9b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:a\247 \006\3408\253\252\216\037\337\035n\361\201G\211\352\255\231a\034\240u0V\221\002 ~?\376u\035\224\036\231\021\256\020\2305\250tV\306<\215\362\322u\031\226\266\023\020\000\210J\350\246" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.676 UTC [gossip.gossip] handleMessage -> DEBU 1b9c Exiting" +"2019-09-24 00:25:28.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b9d Got message: GossipMessage: tag:EMPTY mem_req:a\247 \006\3408\253\252\216\037\337\035n\361\201G\211\352\255\231a\034\240u0V\221\002 ~?\376u\035\224\036\231\021\256\020\2305\250tV\306<\215\362\322u\031\226\266\023\020\000\210J\350\246" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.676 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b9e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:28.676 UTC [msp] DeserializeIdentity -> DEBU 1b9f Obtaining identity" +"2019-09-24 00:25:28.677 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ba0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:28.677 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ba1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.677 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ba2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:28.677 UTC [policies] Evaluate -> DEBU 1ba3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:28.677 UTC [policies] Evaluate -> DEBU 1ba4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:28.677 UTC [policies] Evaluate -> DEBU 1ba5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:28.677 UTC [cauthdsl] func1 -> DEBU 1ba6 0xc00358e040 gate 1569284728677954700 evaluation starts" +"2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1ba7 0xc00358e040 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1ba8 0xc00358e040 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1ba9 0xc00358e040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1baa 0xc00358e040 principal evaluation fails" +"2019-09-24 00:25:28.678 UTC [cauthdsl] func1 -> DEBU 1bab 0xc00358e040 gate 1569284728677954700 evaluation fails" +"2019-09-24 00:25:28.678 UTC [policies] Evaluate -> DEBU 1bac Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.678 UTC [policies] Evaluate -> DEBU 1bad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:28.678 UTC [policies] Evaluate -> DEBU 1bae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:28.678 UTC [cauthdsl] func1 -> DEBU 1baf 0xc00358e880 gate 1569284728678481700 evaluation starts" +"2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1bb0 0xc00358e880 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1bb1 0xc00358e880 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:28.678 UTC [cauthdsl] func2 -> DEBU 1bb2 0xc00358e880 principal matched by identity 0" +"2019-09-24 00:25:28.679 UTC [msp.identity] Verify -> DEBU 1bb3 Verify: digest = 00000000 3c 58 26 8e 1c 9e 53 ce 07 6a 07 cb 1c 9c df 45 | DEBU 1bb4 Verify: sig = 00000000 30 45 02 21 00 c6 e6 9c b9 3e 61 a7 20 06 e0 38 |0E.!.....>a. ..8| +00000010 ab aa 8e 1f df 1d 6e f1 81 47 89 ea ad 99 61 1c |......n..G....a.| +00000020 a0 75 30 56 91 02 20 7e 3f fe 75 1d 94 1e 99 11 |.u0V.. ~?.u.....| +00000030 ae 10 98 35 a8 74 56 c6 3c 8d f2 d2 75 19 96 b6 |...5.tV.<...u...| +00000040 13 10 00 88 4a e8 a6 |....J..|" +"2019-09-24 00:25:28.679 UTC [cauthdsl] func2 -> DEBU 1bb5 0xc00358e880 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:28.679 UTC [cauthdsl] func1 -> DEBU 1bb6 0xc00358e880 gate 1569284728678481700 evaluation succeeds" +"2019-09-24 00:25:28.679 UTC [policies] Evaluate -> DEBU 1bb7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.679 UTC [policies] Evaluate -> DEBU 1bb8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:28.679 UTC [policies] Evaluate -> DEBU 1bb9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:28.679 UTC [policies] Evaluate -> DEBU 1bba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:28.679 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bbb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:28.679 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:28.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbd updating membership: timestamp: " +"2019-09-24 00:25:28.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbe Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:28.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbf Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:28.680 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bc0 Exiting" +"2019-09-24 00:25:28.680 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bc1 Exiting" +"2019-09-24 00:25:28.680 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc2 Exiting" +"2019-09-24 00:25:28.680 UTC [gossip.discovery] sendMemResponse -> DEBU 1bc3 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:28.680 UTC [msp] DeserializeIdentity -> DEBU 1bc4 Obtaining identity" +"2019-09-24 00:25:28.680 UTC [msp] DeserializeIdentity -> DEBU 1bc5 Obtaining identity" +"2019-09-24 00:25:28.680 UTC [msp] DeserializeIdentity -> DEBU 1bc6 Obtaining identity" +"2019-09-24 00:25:28.680 UTC [gossip.comm] Send -> DEBU 1bc7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:28.681 UTC [gossip.discovery] sendMemResponse -> DEBU 1bc8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020#" signature:"0D\002 o\266\032`q\022\226\035\031\356\273\023|\325\327\346m\207>\3617\351d\351b\335\305\374i\254\205x\002 2\277\001\0049N\036\306\243\025\235/=\346\205'\302\013\207\206\331\325\253\276\335\325x\004LN\345&" > alive:a\247 \006\3408\253\252\216\037\337\035n\361\201G\211\352\255\231a\034\240u0V\221\002 ~?\376u\035\224\036\231\021\256\020\2305\250tV\306<\215\362\322u\031\226\266\023\020\000\210J\350\246" > alive: alive: " +"2019-09-24 00:25:28.681 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.696 UTC [gossip.comm] func1 -> DEBU 1bca Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.696 UTC [gossip.gossip] handleMessage -> DEBU 1bcb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.697 UTC [msp] DeserializeIdentity -> DEBU 1bcc Obtaining identity" +"2019-09-24 00:25:28.697 UTC [msp] DeserializeIdentity -> DEBU 1bcd Obtaining identity" +"2019-09-24 00:25:28.697 UTC [gossip.gossip] handleMessage -> DEBU 1bce Exiting" +"2019-09-24 00:25:28.681 UTC [gossip.comm] sendToEndpoint -> DEBU 1bcf Exiting" +"2019-09-24 00:25:28.713 UTC [gossip.comm] func1 -> DEBU 1bd0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.714 UTC [gossip.gossip] handleMessage -> DEBU 1bd1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.714 UTC [gossip.pull] HandleMessage -> DEBU 1bd2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd3 Obtaining identity" +"2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd4 Obtaining identity" +"2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd5 Obtaining identity" +"2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd6 Obtaining identity" +"2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd7 Obtaining identity" +"2019-09-24 00:25:28.714 UTC [msp] DeserializeIdentity -> DEBU 1bd8 Obtaining identity" +"2019-09-24 00:25:28.714 UTC [gossip.pull] SendDigest -> DEBU 1bd9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:28.714 UTC [gossip.gossip] handleMessage -> DEBU 1bda Exiting" +"2019-09-24 00:25:28.716 UTC [gossip.comm] func1 -> DEBU 1bdb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.716 UTC [gossip.gossip] handleMessage -> DEBU 1bdc Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.716 UTC [gossip.pull] HandleMessage -> DEBU 1bdd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:28.716 UTC [gossip.pull] SendDigest -> DEBU 1bde Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:28.716 UTC [gossip.gossip] handleMessage -> DEBU 1bdf Exiting" +"2019-09-24 00:25:29.180 UTC [gossip.gossip] handleMessage -> DEBU 1be0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:29.180 UTC [msp] DeserializeIdentity -> DEBU 1be1 Obtaining identity" +"2019-09-24 00:25:29.180 UTC [msp] DeserializeIdentity -> DEBU 1be2 Obtaining identity" +"2019-09-24 00:25:29.190 UTC [msp] DeserializeIdentity -> DEBU 1be3 Obtaining identity" +"2019-09-24 00:25:29.190 UTC [gossip.gossip] handleMessage -> DEBU 1be4 Exiting" +"2019-09-24 00:25:29.590 UTC [msp] GetDefaultSigningIdentity -> DEBU 1be5 Obtaining default signing identity" +"2019-09-24 00:25:29.590 UTC [msp.identity] Sign -> DEBU 1be6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151020 " +"2019-09-24 00:25:29.590 UTC [msp.identity] Sign -> DEBU 1be7 Sign: digest: B7DA4C38B4C848174DCFB1729D2595D63CF5CC25EB0CCEE145B0001FC677ADDC " +"2019-09-24 00:25:29.590 UTC [msp] GetDefaultSigningIdentity -> DEBU 1be8 Obtaining default signing identity" +"2019-09-24 00:25:29.590 UTC [msp.identity] Sign -> DEBU 1be9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:29.590 UTC [msp.identity] Sign -> DEBU 1bea Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:29.590 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1beb Sleeping 5s" +"2019-09-24 00:25:29.603 UTC [msp] DeserializeIdentity -> DEBU 1bec Obtaining identity" +"2019-09-24 00:25:29.603 UTC [msp] DeserializeIdentity -> DEBU 1bed Obtaining identity" +"2019-09-24 00:25:29.603 UTC [msp] DeserializeIdentity -> DEBU 1bee Obtaining identity" +"2019-09-24 00:25:29.603 UTC [gossip.comm] Send -> DEBU 1bef Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:29.603 UTC [msp] DeserializeIdentity -> DEBU 1bf0 Obtaining identity" +"2019-09-24 00:25:29.603 UTC [gossip.comm] Send -> DEBU 1bf1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:29.603 UTC [gossip.comm] Send -> DEBU 1bf2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:29.603 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:29.603 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf4 Exiting" +"2019-09-24 00:25:29.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:29.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf6 Exiting" +"2019-09-24 00:25:29.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:29.604 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf8 Exiting" +"2019-09-24 00:25:29.610 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 1bf9 Sleeping 25s" +"2019-09-24 00:25:29.629 UTC [gossip.comm] func1 -> DEBU 1bfa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:29.629 UTC [gossip.gossip] handleMessage -> DEBU 1bfb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:29.629 UTC [gossip.gossip] handleMessage -> DEBU 1bfc Exiting" +"2019-09-24 00:25:29.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bfd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:29.630 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bfe Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:29.630 UTC [msp.identity] Verify -> DEBU 1bff Verify: digest = 00000000 b7 da 4c 38 b4 c8 48 17 4d cf b1 72 9d 25 95 d6 |..L8..H.M..r.%..| +00000010 3c f5 cc 25 eb 0c ce e1 45 b0 00 1f c6 77 ad dc |<..%....E....w..|" +"2019-09-24 00:25:29.630 UTC [msp.identity] Verify -> DEBU 1c00 Verify: sig = 00000000 30 44 02 20 60 73 e9 38 12 44 91 7b ce f3 40 a9 |0D. `s.8.D.{..@.| +00000010 b1 f6 d4 35 6f 5b 20 6e dc 6c 9e 18 6d 87 f6 61 |...5o[ n.l..m..a| +00000020 0e 66 27 89 02 20 1b f2 ac cd da 04 4f b3 4a 05 |.f'.. ......O.J.| +00000030 a9 7c a7 7e 16 bc bb 1b 6f ac 3a 05 bc a7 0e 5a |.|.~....o.:....Z| +00000040 0e 15 f4 67 5e c6 |...g^.|" +"2019-09-24 00:25:29.630 UTC [gossip.discovery] isSentByMe -> DEBU 1c01 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:29.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c02 Exiting" +"2019-09-24 00:25:29.674 UTC [gossip.comm] func1 -> DEBU 1c03 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:29.674 UTC [gossip.gossip] handleMessage -> DEBU 1c04 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:29.674 UTC [gossip.pull] HandleMessage -> DEBU 1c05 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:29.674 UTC [gossip.pull] SendDigest -> DEBU 1c06 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:29.674 UTC [gossip.gossip] handleMessage -> DEBU 1c07 Exiting" +"2019-09-24 00:25:29.734 UTC [gossip.comm] func1 -> DEBU 1c08 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" secret_envelope:m\002 4\343I\374*44\013N)E,f\200l\002\357\322sz\023_Y\213E\n\374\315\274\007\255\374" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:29.734 UTC [gossip.gossip] handleMessage -> DEBU 1c09 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" secret_envelope:m\002 4\343I\374*44\013N)E,f\200l\002\357\322sz\023_Y\213E\n\374\315\274\007\255\374" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:29.734 UTC [gossip.gossip] handleMessage -> DEBU 1c0a Exiting" +"2019-09-24 00:25:29.734 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c0b Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" secret_envelope:m\002 4\343I\374*44\013N)E,f\200l\002\357\322sz\023_Y\213E\n\374\315\274\007\255\374" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:29.734 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c0c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:29.734 UTC [msp.identity] Verify -> DEBU 1c0d Verify: digest = 00000000 66 1a a0 ac ca 88 be b7 5f 35 d0 d9 2a 12 65 08 |f......._5..*.e.| +00000010 3d 7b f6 22 da 33 ea 24 60 08 9e b3 9d d2 c1 bc |={.".3.$`.......|" +"2019-09-24 00:25:29.734 UTC [msp.identity] Verify -> DEBU 1c0e Verify: sig = 00000000 30 45 02 21 00 be f8 88 e2 3d 0a 33 16 f5 ad 18 |0E.!.....=.3....| +00000010 77 6c ab b5 59 eb 1e 03 1e c5 a6 42 ef 8a 7b 3f |wl..Y......B..{?| +00000020 7f 07 f5 64 60 02 20 0d a3 44 23 68 da 71 ac 0e |...d`. ..D#h.q..| +00000030 4e 9d d0 52 fe 5d 16 4c a1 84 48 94 5a a7 3e fc |N..R.].L..H.Z.>.| +00000040 c2 83 7b 80 c6 5a 40 |..{..Z@|" +"2019-09-24 00:25:29.735 UTC [msp.identity] Verify -> DEBU 1c0f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:29.735 UTC [msp.identity] Verify -> DEBU 1c10 Verify: sig = 00000000 30 45 02 21 00 c8 52 2f 53 3b 4f a2 c0 08 2b 4d |0E.!..R/S;O...+M| +00000010 bb 40 d2 ce 15 74 0f 8a 2f 5c cf 96 37 4f e3 db |.@...t../\..7O..| +00000020 8d 70 11 3e 6d 02 20 34 e3 49 fc 2a 34 34 0b 4e |.p.>m. 4.I.*44.N| +00000030 29 45 2c 66 80 6c 02 ef d2 73 7a 13 5f 59 8b 45 |)E,f.l...sz._Y.E| +00000040 0a fc cd bc 07 ad fc |.......|" +"2019-09-24 00:25:29.735 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c11 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:29.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c12 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:25:29.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c13 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:29.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c14 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:29.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c15 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:29.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c16 Exiting" +"2019-09-24 00:25:29.735 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c17 Exiting" +"2019-09-24 00:25:29.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c18 Exiting" +"2019-09-24 00:25:29.735 UTC [gossip.discovery] sendMemResponse -> DEBU 1c19 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:29.735 UTC [msp] DeserializeIdentity -> DEBU 1c1a Obtaining identity" +"2019-09-24 00:25:29.736 UTC [msp] DeserializeIdentity -> DEBU 1c1b Obtaining identity" +"2019-09-24 00:25:29.736 UTC [gossip.comm] Send -> DEBU 1c1c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:29.736 UTC [gossip.discovery] sendMemResponse -> DEBU 1c1d Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" secret_envelope:m\002 4\343I\374*44\013N)E,f\200l\002\357\322sz\023_Y\213E\n\374\315\274\007\255\374" > > alive: " +"2019-09-24 00:25:29.736 UTC [gossip.comm] sendToEndpoint -> DEBU 1c1e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:29.736 UTC [gossip.comm] sendToEndpoint -> DEBU 1c1f Exiting" +"2019-09-24 00:25:29.998 UTC [gossip.gossip] handleMessage -> DEBU 1c20 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:29.998 UTC [gossip.gossip] handleMessage -> DEBU 1c21 Exiting" +"2019-09-24 00:25:29.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c22 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:29.998 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c23 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:29.998 UTC [msp] DeserializeIdentity -> DEBU 1c24 Obtaining identity" +"2019-09-24 00:25:29.999 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c25 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:29.999 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c26 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:29.999 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c27 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c28 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c29 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c2a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:29.999 UTC [cauthdsl] func1 -> DEBU 1c2b 0xc0027e34a0 gate 1569284729999319300 evaluation starts" +"2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c2c 0xc0027e34a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c2d 0xc0027e34a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c2e 0xc0027e34a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c2f 0xc0027e34a0 principal evaluation fails" +"2019-09-24 00:25:29.999 UTC [cauthdsl] func1 -> DEBU 1c30 0xc0027e34a0 gate 1569284729999319300 evaluation fails" +"2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c31 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c32 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:29.999 UTC [policies] Evaluate -> DEBU 1c33 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:29.999 UTC [cauthdsl] func1 -> DEBU 1c34 0xc0027e3ce0 gate 1569284729999796000 evaluation starts" +"2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c35 0xc0027e3ce0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:29.999 UTC [cauthdsl] func2 -> DEBU 1c36 0xc0027e3ce0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:30.000 UTC [cauthdsl] func2 -> DEBU 1c37 0xc0027e3ce0 principal matched by identity 0" +"2019-09-24 00:25:30.000 UTC [msp.identity] Verify -> DEBU 1c38 Verify: digest = 00000000 50 79 8a fd e1 cc 56 bf 31 03 ec 52 f7 c5 be eb |Py....V.1..R....| +00000010 42 b2 6d 16 c3 10 e0 db 66 a2 2d 9f ed 6d a2 f7 |B.m.....f.-..m..|" +"2019-09-24 00:25:30.000 UTC [msp.identity] Verify -> DEBU 1c39 Verify: sig = 00000000 30 45 02 21 00 ea b5 39 2a 82 98 d3 eb 53 a8 dd |0E.!...9*....S..| +00000010 2c 95 13 0d 5b 95 8b 68 22 1d f1 16 f5 c1 87 a8 |,...[..h".......| +00000020 a5 e3 3f 2f 81 02 20 3e b1 a4 46 53 d6 10 47 fb |..?/.. >..FS..G.| +00000030 b7 6a 28 c6 95 67 39 9f 80 b2 a1 22 b4 61 c7 b6 |.j(..g9....".a..| +00000040 d8 ed d1 33 8c 99 9a |...3...|" +"2019-09-24 00:25:30.000 UTC [cauthdsl] func2 -> DEBU 1c3a 0xc0027e3ce0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:30.000 UTC [cauthdsl] func1 -> DEBU 1c3b 0xc0027e3ce0 gate 1569284729999796000 evaluation succeeds" +"2019-09-24 00:25:30.000 UTC [policies] Evaluate -> DEBU 1c3c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:30.000 UTC [policies] Evaluate -> DEBU 1c3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:30.000 UTC [policies] Evaluate -> DEBU 1c3e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:30.001 UTC [policies] Evaluate -> DEBU 1c3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:30.009 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c40 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c41 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:30.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c42 updating membership: timestamp: " +"2019-09-24 00:25:30.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c43 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:30.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c44 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:30.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c45 Exiting" +"2019-09-24 00:25:30.010 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c46 Exiting" +"2019-09-24 00:25:30.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c47 Exiting" +"2019-09-24 00:25:30.022 UTC [msp] DeserializeIdentity -> DEBU 1c48 Obtaining identity" +"2019-09-24 00:25:30.022 UTC [msp] DeserializeIdentity -> DEBU 1c49 Obtaining identity" +"2019-09-24 00:25:30.025 UTC [msp] DeserializeIdentity -> DEBU 1c4a Obtaining identity" +"2019-09-24 00:25:30.026 UTC [msp] DeserializeIdentity -> DEBU 1c4b Obtaining identity" +"2019-09-24 00:25:30.026 UTC [msp] DeserializeIdentity -> DEBU 1c4c Obtaining identity" +"2019-09-24 00:25:30.026 UTC [msp] DeserializeIdentity -> DEBU 1c4d Obtaining identity" +"2019-09-24 00:25:30.026 UTC [msp] DeserializeIdentity -> DEBU 1c4e Obtaining identity" +"2019-09-24 00:25:30.027 UTC [gossip.comm] Send -> DEBU 1c4f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:30.027 UTC [msp] DeserializeIdentity -> DEBU 1c50 Obtaining identity" +"2019-09-24 00:25:30.027 UTC [gossip.comm] Send -> DEBU 1c51 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:30.027 UTC [gossip.comm] sendToEndpoint -> DEBU 1c52 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.027 UTC [gossip.comm] sendToEndpoint -> DEBU 1c53 Exiting" +"2019-09-24 00:25:30.027 UTC [gossip.comm] sendToEndpoint -> DEBU 1c54 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.027 UTC [gossip.comm] sendToEndpoint -> DEBU 1c55 Exiting" +"2019-09-24 00:25:30.029 UTC [gossip.comm] func1 -> DEBU 1c56 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.032 UTC [gossip.gossip] handleMessage -> DEBU 1c57 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.032 UTC [gossip.gossip] handleMessage -> DEBU 1c58 Exiting" +"2019-09-24 00:25:30.032 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c59 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.032 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c5a Exiting" +"2019-09-24 00:25:30.036 UTC [gossip.comm] func1 -> DEBU 1c5b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.037 UTC [gossip.gossip] handleMessage -> DEBU 1c5c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.037 UTC [gossip.gossip] handleMessage -> DEBU 1c5d Exiting" +"2019-09-24 00:25:30.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c5e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c5f Exiting" +"2019-09-24 00:25:30.128 UTC [gossip.comm] func1 -> DEBU 1c60 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:30.129 UTC [gossip.gossip] handleMessage -> DEBU 1c61 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:30.129 UTC [msp] DeserializeIdentity -> DEBU 1c62 Obtaining identity" +"2019-09-24 00:25:30.129 UTC [msp] DeserializeIdentity -> DEBU 1c63 Obtaining identity" +"2019-09-24 00:25:30.129 UTC [msp] DeserializeIdentity -> DEBU 1c64 Obtaining identity" +"2019-09-24 00:25:30.129 UTC [gossip.gossip] handleMessage -> DEBU 1c65 Exiting" +"2019-09-24 00:25:30.666 UTC [gossip.comm] func1 -> DEBU 1c66 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.671 UTC [gossip.gossip] handleMessage -> DEBU 1c67 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.671 UTC [gossip.gossip] handleMessage -> DEBU 1c68 Exiting" +"2019-09-24 00:25:30.675 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c69 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.675 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c6a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:30.676 UTC [msp] DeserializeIdentity -> DEBU 1c6b Obtaining identity" +"2019-09-24 00:25:30.676 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c6c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:30.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c6d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:30.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c6e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:30.676 UTC [policies] Evaluate -> DEBU 1c6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:30.676 UTC [policies] Evaluate -> DEBU 1c70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:30.676 UTC [policies] Evaluate -> DEBU 1c71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:30.676 UTC [cauthdsl] func1 -> DEBU 1c72 0xc0029b38c0 gate 1569284730676673600 evaluation starts" +"2019-09-24 00:25:30.676 UTC [cauthdsl] func2 -> DEBU 1c73 0xc0029b38c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:30.676 UTC [cauthdsl] func2 -> DEBU 1c74 0xc0029b38c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:30.676 UTC [cauthdsl] func2 -> DEBU 1c75 0xc0029b38c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:30.676 UTC [cauthdsl] func2 -> DEBU 1c76 0xc0029b38c0 principal evaluation fails" +"2019-09-24 00:25:30.676 UTC [cauthdsl] func1 -> DEBU 1c77 0xc0029b38c0 gate 1569284730676673600 evaluation fails" +"2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:30.677 UTC [cauthdsl] func1 -> DEBU 1c7b 0xc00343e100 gate 1569284730677155500 evaluation starts" +"2019-09-24 00:25:30.677 UTC [cauthdsl] func2 -> DEBU 1c7c 0xc00343e100 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:30.677 UTC [cauthdsl] func2 -> DEBU 1c7d 0xc00343e100 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:30.677 UTC [cauthdsl] func2 -> DEBU 1c7e 0xc00343e100 principal matched by identity 0" +"2019-09-24 00:25:30.677 UTC [msp.identity] Verify -> DEBU 1c7f Verify: digest = 00000000 1f 2c 71 80 38 14 a0 5e fd 63 93 df 5d ad 72 fd |.,q.8..^.c..].r.| +00000010 7b 79 79 4c e3 85 2c a9 3b 3d 0e d8 df 9c c7 a0 |{yyL..,.;=......|" +"2019-09-24 00:25:30.677 UTC [msp.identity] Verify -> DEBU 1c80 Verify: sig = 00000000 30 45 02 21 00 a3 2c 4b 99 73 c8 5f 9a 23 2e 9b |0E.!..,K.s._.#..| +00000010 58 74 e2 60 38 9d d0 85 b7 6a 68 5d 03 81 bf 3a |Xt.`8....jh]...:| +00000020 f6 18 ad 6b 24 02 20 4a 43 b7 61 1e cf 28 0c 4a |...k$. JC.a..(.J| +00000030 7f b5 10 31 b3 15 8c a8 fe e1 68 6b 33 47 9f d9 |...1......hk3G..| +00000040 35 3e 59 f2 f6 a1 56 |5>Y...V|" +"2019-09-24 00:25:30.677 UTC [cauthdsl] func2 -> DEBU 1c81 0xc00343e100 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:30.677 UTC [cauthdsl] func1 -> DEBU 1c82 0xc00343e100 gate 1569284730677155500 evaluation succeeds" +"2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:30.677 UTC [policies] Evaluate -> DEBU 1c85 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:30.678 UTC [policies] Evaluate -> DEBU 1c86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:30.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c87 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.678 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c88 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:30.678 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c89 updating membership: timestamp: " +"2019-09-24 00:25:30.678 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c8a Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:30.678 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c8b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:30.678 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c8c Exiting" +"2019-09-24 00:25:30.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c8d Exiting" +"2019-09-24 00:25:30.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c8e Exiting" +"2019-09-24 00:25:30.679 UTC [gossip.comm] func1 -> DEBU 1c8f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.679 UTC [gossip.gossip] handleMessage -> DEBU 1c90 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.679 UTC [gossip.gossip] handleMessage -> DEBU 1c91 Exiting" +"2019-09-24 00:25:30.679 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c92 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.679 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c93 Exiting" +"2019-09-24 00:25:30.691 UTC [msp] DeserializeIdentity -> DEBU 1c94 Obtaining identity" +"2019-09-24 00:25:30.691 UTC [msp] DeserializeIdentity -> DEBU 1c95 Obtaining identity" +"2019-09-24 00:25:30.691 UTC [msp] DeserializeIdentity -> DEBU 1c96 Obtaining identity" +"2019-09-24 00:25:30.692 UTC [msp] DeserializeIdentity -> DEBU 1c97 Obtaining identity" +"2019-09-24 00:25:30.692 UTC [msp] DeserializeIdentity -> DEBU 1c98 Obtaining identity" +"2019-09-24 00:25:30.692 UTC [msp] DeserializeIdentity -> DEBU 1c99 Obtaining identity" +"2019-09-24 00:25:30.692 UTC [gossip.comm] Send -> DEBU 1c9a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:30.692 UTC [msp] DeserializeIdentity -> DEBU 1c9b Obtaining identity" +"2019-09-24 00:25:30.692 UTC [msp] DeserializeIdentity -> DEBU 1c9c Obtaining identity" +"2019-09-24 00:25:30.693 UTC [gossip.comm] Send -> DEBU 1c9d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:30.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9f Exiting" +"2019-09-24 00:25:30.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca1 Exiting" +"2019-09-24 00:25:30.701 UTC [gossip.gossip] handleMessage -> DEBU 1ca2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.702 UTC [gossip.gossip] handleMessage -> DEBU 1ca3 Exiting" +"2019-09-24 00:25:30.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ca4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:30.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ca5 Exiting" +"2019-09-24 00:25:31.636 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ca6 Obtaining default signing identity" +"2019-09-24 00:25:31.636 UTC [msp.identity] Sign -> DEBU 1ca7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151021 " +"2019-09-24 00:25:31.636 UTC [msp.identity] Sign -> DEBU 1ca8 Sign: digest: 062B4BBD5E684F6D25B329A8AF60C4002F7355E15E8CDB826737F36564E75759 " +"2019-09-24 00:25:31.636 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ca9 Obtaining default signing identity" +"2019-09-24 00:25:31.636 UTC [msp.identity] Sign -> DEBU 1caa Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:31.636 UTC [msp.identity] Sign -> DEBU 1cab Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:31.637 UTC [gossip.comm] Send -> DEBU 1cac Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:31.637 UTC [msp] DeserializeIdentity -> DEBU 1cad Obtaining identity" +"2019-09-24 00:25:31.637 UTC [gossip.comm] Send -> DEBU 1cae Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:31.637 UTC [msp] DeserializeIdentity -> DEBU 1caf Obtaining identity" +"2019-09-24 00:25:31.637 UTC [gossip.comm] Send -> DEBU 1cb0 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:31.637 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb2 Exiting" +"2019-09-24 00:25:31.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb4 Exiting" +"2019-09-24 00:25:31.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1cb6 Exiting" +"2019-09-24 00:25:31.671 UTC [gossip.pull] Hello -> DEBU 1cb7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:31.671 UTC [gossip.comm] Send -> DEBU 1cb8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:31.671 UTC [gossip.pull] Hello -> DEBU 1cb9 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:31.671 UTC [gossip.comm] Send -> DEBU 1cba Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:31.671 UTC [gossip.pull] Hello -> DEBU 1cbb Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:31.671 UTC [gossip.comm] Send -> DEBU 1cbc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:31.671 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.671 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbe Exiting" +"2019-09-24 00:25:31.672 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.672 UTC [gossip.comm] sendToEndpoint -> DEBU 1cc0 Exiting" +"2019-09-24 00:25:31.672 UTC [gossip.comm] sendToEndpoint -> DEBU 1cc1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.672 UTC [gossip.comm] sendToEndpoint -> DEBU 1cc2 Exiting" +"2019-09-24 00:25:31.677 UTC [gossip.comm] func1 -> DEBU 1cc3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.677 UTC [gossip.comm] func1 -> DEBU 1cc4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.677 UTC [gossip.gossip] handleMessage -> DEBU 1cc5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.677 UTC [gossip.gossip] handleMessage -> DEBU 1cc6 Exiting" +"2019-09-24 00:25:31.677 UTC [gossip.gossip] handleMessage -> DEBU 1cc7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.677 UTC [gossip.pull] HandleMessage -> DEBU 1cc8 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.677 UTC [gossip.gossip] handleMessage -> DEBU 1cc9 Exiting" +"2019-09-24 00:25:31.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.677 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ccb Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:31.678 UTC [msp.identity] Verify -> DEBU 1ccc Verify: digest = 00000000 66 1a a0 ac ca 88 be b7 5f 35 d0 d9 2a 12 65 08 |f......._5..*.e.| +00000010 3d 7b f6 22 da 33 ea 24 60 08 9e b3 9d d2 c1 bc |={.".3.$`.......|" +"2019-09-24 00:25:31.678 UTC [msp.identity] Verify -> DEBU 1ccd Verify: sig = 00000000 30 45 02 21 00 be f8 88 e2 3d 0a 33 16 f5 ad 18 |0E.!.....=.3....| +00000010 77 6c ab b5 59 eb 1e 03 1e c5 a6 42 ef 8a 7b 3f |wl..Y......B..{?| +00000020 7f 07 f5 64 60 02 20 0d a3 44 23 68 da 71 ac 0e |...d`. ..D#h.q..| +00000030 4e 9d d0 52 fe 5d 16 4c a1 84 48 94 5a a7 3e fc |N..R.].L..H.Z.>.| +00000040 c2 83 7b 80 c6 5a 40 |..{..Z@|" +"2019-09-24 00:25:31.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cce Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:31.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ccf Exiting" +"2019-09-24 00:25:31.678 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cd0 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:31.678 UTC [msp.identity] Verify -> DEBU 1cd1 Verify: digest = 00000000 06 2b 4b bd 5e 68 4f 6d 25 b3 29 a8 af 60 c4 00 |.+K.^hOm%.)..`..| +00000010 2f 73 55 e1 5e 8c db 82 67 37 f3 65 64 e7 57 59 |/sU.^...g7.ed.WY|" +"2019-09-24 00:25:31.678 UTC [msp.identity] Verify -> DEBU 1cd2 Verify: sig = 00000000 30 45 02 21 00 b6 30 1f af 2d a0 a2 8c 9b f1 88 |0E.!..0..-......| +00000010 38 07 e8 61 4e 68 12 16 ad 08 eb eb 97 47 79 f8 |8..aNh.......Gy.| +00000020 b2 a4 d0 1b 13 02 20 1f 67 a7 2b d6 b8 00 12 9f |...... .g.+.....| +00000030 b2 91 bb 50 84 91 68 a7 69 f6 55 ef 16 75 c7 3b |...P..h.i.U..u.;| +00000040 60 d5 09 42 3d 9e a0 |`..B=..|" +"2019-09-24 00:25:31.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cd3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:31.678 UTC [gossip.discovery] isSentByMe -> DEBU 1cd4 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:31.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cd5 Exiting" +"2019-09-24 00:25:31.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cd6 Exiting" +"2019-09-24 00:25:31.678 UTC [gossip.comm] func1 -> DEBU 1cd7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.679 UTC [gossip.gossip] handleMessage -> DEBU 1cd8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.679 UTC [gossip.gossip] handleMessage -> DEBU 1cd9 Exiting" +"2019-09-24 00:25:31.679 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cda Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.679 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cdb Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:31.679 UTC [msp.identity] Verify -> DEBU 1cdc Verify: digest = 00000000 06 2b 4b bd 5e 68 4f 6d 25 b3 29 a8 af 60 c4 00 |.+K.^hOm%.)..`..| +00000010 2f 73 55 e1 5e 8c db 82 67 37 f3 65 64 e7 57 59 |/sU.^...g7.ed.WY|" +"2019-09-24 00:25:31.679 UTC [msp.identity] Verify -> DEBU 1cdd Verify: sig = 00000000 30 45 02 21 00 b6 30 1f af 2d a0 a2 8c 9b f1 88 |0E.!..0..-......| +00000010 38 07 e8 61 4e 68 12 16 ad 08 eb eb 97 47 79 f8 |8..aNh.......Gy.| +00000020 b2 a4 d0 1b 13 02 20 1f 67 a7 2b d6 b8 00 12 9f |...... .g.+.....| +00000030 b2 91 bb 50 84 91 68 a7 69 f6 55 ef 16 75 c7 3b |...P..h.i.U..u.;| +00000040 60 d5 09 42 3d 9e a0 |`..B=..|" +"2019-09-24 00:25:31.679 UTC [msp.identity] Verify -> DEBU 1cde Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:31.679 UTC [msp.identity] Verify -> DEBU 1cdf Verify: sig = 00000000 30 45 02 21 00 a3 fa 43 bd bb b6 e5 76 c5 05 ab |0E.!...C....v...| +00000010 c4 ae 64 24 a8 a1 df 4a ea 26 6c a5 b6 52 ea 90 |..d$...J.&l..R..| +00000020 b3 a8 d1 44 25 02 20 3d 69 ca 45 9a 65 bf cf c2 |...D%. =i.E.e...| +00000030 f2 29 ce 2b 58 65 0e 57 47 86 3d 6e cb ce 6a 37 |.).+Xe.WG.=n..j7| +00000040 2c a8 fe a9 7a 52 e3 |,...zR.|" +"2019-09-24 00:25:31.679 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ce0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:31.679 UTC [gossip.discovery] isSentByMe -> DEBU 1ce1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:31.679 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ce2 Exiting" +"2019-09-24 00:25:31.680 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ce3 Exiting" +"2019-09-24 00:25:31.709 UTC [gossip.gossip] handleMessage -> DEBU 1ce4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.709 UTC [gossip.pull] HandleMessage -> DEBU 1ce5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.709 UTC [gossip.gossip] handleMessage -> DEBU 1ce6 Exiting" +"2019-09-24 00:25:31.709 UTC [gossip.gossip] handleMessage -> DEBU 1ce7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.709 UTC [gossip.gossip] handleMessage -> DEBU 1ce8 Exiting" +"2019-09-24 00:25:31.709 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ce9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.710 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cea Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:31.710 UTC [msp.identity] Verify -> DEBU 1ceb Verify: digest = 00000000 06 2b 4b bd 5e 68 4f 6d 25 b3 29 a8 af 60 c4 00 |.+K.^hOm%.)..`..| +00000010 2f 73 55 e1 5e 8c db 82 67 37 f3 65 64 e7 57 59 |/sU.^...g7.ed.WY|" +"2019-09-24 00:25:31.710 UTC [gossip.comm] func1 -> DEBU 1cec Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.710 UTC [msp.identity] Verify -> DEBU 1ced Verify: sig = 00000000 30 45 02 21 00 b6 30 1f af 2d a0 a2 8c 9b f1 88 |0E.!..0..-......| +00000010 38 07 e8 61 4e 68 12 16 ad 08 eb eb 97 47 79 f8 |8..aNh.......Gy.| +00000020 b2 a4 d0 1b 13 02 20 1f 67 a7 2b d6 b8 00 12 9f |...... .g.+.....| +00000030 b2 91 bb 50 84 91 68 a7 69 f6 55 ef 16 75 c7 3b |...P..h.i.U..u.;| +00000040 60 d5 09 42 3d 9e a0 |`..B=..|" +"2019-09-24 00:25:31.710 UTC [gossip.gossip] handleMessage -> DEBU 1cee Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.711 UTC [gossip.pull] HandleMessage -> DEBU 1cf0 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.719 UTC [gossip.gossip] handleMessage -> DEBU 1cf1 Exiting" +"2019-09-24 00:25:31.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cef Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:31.719 UTC [gossip.discovery] isSentByMe -> DEBU 1cf2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:31.720 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cf3 Exiting" +"2019-09-24 00:25:31.720 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cf4 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:31.720 UTC [msp.identity] Verify -> DEBU 1cf5 Verify: digest = 00000000 66 1a a0 ac ca 88 be b7 5f 35 d0 d9 2a 12 65 08 |f......._5..*.e.| +00000010 3d 7b f6 22 da 33 ea 24 60 08 9e b3 9d d2 c1 bc |={.".3.$`.......|" +"2019-09-24 00:25:31.720 UTC [msp.identity] Verify -> DEBU 1cf6 Verify: sig = 00000000 30 45 02 21 00 be f8 88 e2 3d 0a 33 16 f5 ad 18 |0E.!.....=.3....| +00000010 77 6c ab b5 59 eb 1e 03 1e c5 a6 42 ef 8a 7b 3f |wl..Y......B..{?| +00000020 7f 07 f5 64 60 02 20 0d a3 44 23 68 da 71 ac 0e |...d`. ..D#h.q..| +00000030 4e 9d d0 52 fe 5d 16 4c a1 84 48 94 5a a7 3e fc |N..R.].L..H.Z.>.| +00000040 c2 83 7b 80 c6 5a 40 |..{..Z@|" +"2019-09-24 00:25:31.720 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cf7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:31.720 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cf8 Exiting" +"2019-09-24 00:25:31.720 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cf9 Exiting" +"2019-09-24 00:25:31.965 UTC [gossip.gossip] handleMessage -> DEBU 1cfa Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.965 UTC [gossip.pull] HandleMessage -> DEBU 1cfb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1cfc Obtaining identity" +"2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1cfd Obtaining identity" +"2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1cfe Obtaining identity" +"2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1cff Obtaining identity" +"2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1d00 Obtaining identity" +"2019-09-24 00:25:31.965 UTC [msp] DeserializeIdentity -> DEBU 1d01 Obtaining identity" +"2019-09-24 00:25:31.965 UTC [gossip.pull] SendDigest -> DEBU 1d02 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:31.965 UTC [gossip.gossip] handleMessage -> DEBU 1d03 Exiting" +"2019-09-24 00:25:31.985 UTC [gossip.gossip] handleMessage -> DEBU 1d04 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.985 UTC [gossip.gossip] handleMessage -> DEBU 1d05 Exiting" +"2019-09-24 00:25:31.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d06 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:31.986 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d07 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:31.986 UTC [msp] DeserializeIdentity -> DEBU 1d08 Obtaining identity" +"2019-09-24 00:25:31.986 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d09 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:31.986 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d0a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:31.986 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d0b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:31.986 UTC [policies] Evaluate -> DEBU 1d0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:31.986 UTC [policies] Evaluate -> DEBU 1d0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:31.995 UTC [policies] Evaluate -> DEBU 1d0e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:31.995 UTC [cauthdsl] func1 -> DEBU 1d0f 0xc0039bd570 gate 1569284731995465800 evaluation starts" +"2019-09-24 00:25:31.996 UTC [cauthdsl] func2 -> DEBU 1d10 0xc0039bd570 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:31.996 UTC [cauthdsl] func2 -> DEBU 1d11 0xc0039bd570 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.002 UTC [cauthdsl] func2 -> DEBU 1d12 0xc0039bd570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:32.002 UTC [cauthdsl] func2 -> DEBU 1d13 0xc0039bd570 principal evaluation fails" +"2019-09-24 00:25:32.002 UTC [cauthdsl] func1 -> DEBU 1d14 0xc0039bd570 gate 1569284731995465800 evaluation fails" +"2019-09-24 00:25:32.002 UTC [policies] Evaluate -> DEBU 1d15 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.002 UTC [policies] Evaluate -> DEBU 1d16 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.002 UTC [policies] Evaluate -> DEBU 1d17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:32.002 UTC [cauthdsl] func1 -> DEBU 1d18 0xc0039bddb0 gate 1569284732002476300 evaluation starts" +"2019-09-24 00:25:32.002 UTC [cauthdsl] func2 -> DEBU 1d19 0xc0039bddb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.002 UTC [cauthdsl] func2 -> DEBU 1d1a 0xc0039bddb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.002 UTC [cauthdsl] func2 -> DEBU 1d1b 0xc0039bddb0 principal matched by identity 0" +"2019-09-24 00:25:32.002 UTC [msp.identity] Verify -> DEBU 1d1c Verify: digest = 00000000 72 43 b4 4c 5f 8b c9 58 b2 a4 f6 62 ce 73 57 df |rC.L_..X...b.sW.| +00000010 65 3b e3 91 f3 c7 e0 3c 79 a5 55 b5 57 c6 86 97 |e;..... DEBU 1d1d Verify: sig = 00000000 30 44 02 20 08 7a 8d 18 f0 33 eb f5 13 ec c3 44 |0D. .z...3.....D| +00000010 27 d8 54 d5 cf 2f d5 41 dc 36 34 3b f6 7b 0e 04 |'.T../.A.64;.{..| +00000020 9a 0f d7 87 02 20 47 03 5b cc f6 b7 3b c9 a3 9c |..... G.[...;...| +00000030 7f 8b 46 eb 4c 06 af 99 c1 78 6e a0 4a ff 90 68 |..F.L....xn.J..h| +00000040 e2 18 9b c0 d3 fd |......|" +"2019-09-24 00:25:32.003 UTC [cauthdsl] func2 -> DEBU 1d1e 0xc0039bddb0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:32.003 UTC [cauthdsl] func1 -> DEBU 1d1f 0xc0039bddb0 gate 1569284732002476300 evaluation succeeds" +"2019-09-24 00:25:32.003 UTC [policies] Evaluate -> DEBU 1d20 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.003 UTC [policies] Evaluate -> DEBU 1d21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.003 UTC [policies] Evaluate -> DEBU 1d22 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:32.003 UTC [policies] Evaluate -> DEBU 1d23 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:32.003 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d24 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:32.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d25 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:32.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d26 updating membership: timestamp: " +"2019-09-24 00:25:32.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d27 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:32.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d28 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:32.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d29 Exiting" +"2019-09-24 00:25:32.003 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d2a Exiting" +"2019-09-24 00:25:32.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d2b Exiting" +"2019-09-24 00:25:32.004 UTC [gossip.discovery] sendMemResponse -> DEBU 1d2c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:32.004 UTC [msp] DeserializeIdentity -> DEBU 1d2d Obtaining identity" +"2019-09-24 00:25:32.004 UTC [msp] DeserializeIdentity -> DEBU 1d2e Obtaining identity" +"2019-09-24 00:25:32.004 UTC [msp] DeserializeIdentity -> DEBU 1d2f Obtaining identity" +"2019-09-24 00:25:32.004 UTC [gossip.comm] Send -> DEBU 1d30 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:32.004 UTC [gossip.discovery] sendMemResponse -> DEBU 1d31 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" > alive:Y\362\366\241V" > alive: " +"2019-09-24 00:25:32.004 UTC [gossip.comm] sendToEndpoint -> DEBU 1d32 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.004 UTC [gossip.comm] sendToEndpoint -> DEBU 1d33 Exiting" +"2019-09-24 00:25:32.184 UTC [msp] DeserializeIdentity -> DEBU 1d34 Obtaining identity" +"2019-09-24 00:25:32.184 UTC [msp] DeserializeIdentity -> DEBU 1d35 Obtaining identity" +"2019-09-24 00:25:32.185 UTC [gossip.comm] Send -> DEBU 1d36 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:25:32.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1d37 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1d38 Exiting" +"2019-09-24 00:25:32.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1d39 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1d3a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.186 UTC [gossip.comm] sendToEndpoint -> DEBU 1d3b Exiting" +"2019-09-24 00:25:32.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1d3c Exiting" +"2019-09-24 00:25:32.186 UTC [gossip.comm] func1 -> DEBU 1d3d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.187 UTC [gossip.gossip] handleMessage -> DEBU 1d3e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.188 UTC [msp.identity] Verify -> DEBU 1d3f Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:32.188 UTC [msp.identity] Verify -> DEBU 1d40 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:32.188 UTC [msp.identity] Verify -> DEBU 1d41 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:32.188 UTC [msp.identity] Verify -> DEBU 1d42 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:32.189 UTC [msp] DeserializeIdentity -> DEBU 1d43 Obtaining identity" +"2019-09-24 00:25:32.189 UTC [msp] DeserializeIdentity -> DEBU 1d44 Obtaining identity" +"2019-09-24 00:25:32.189 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d45 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:32.189 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d46 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.189 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d47 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.189 UTC [policies] Evaluate -> DEBU 1d48 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:32.189 UTC [policies] Evaluate -> DEBU 1d49 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:32.189 UTC [policies] Evaluate -> DEBU 1d4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:32.189 UTC [cauthdsl] func1 -> DEBU 1d4b 0xc003063de0 gate 1569284732189706900 evaluation starts" +"2019-09-24 00:25:32.189 UTC [cauthdsl] func2 -> DEBU 1d4c 0xc003063de0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.189 UTC [cauthdsl] func2 -> DEBU 1d4d 0xc003063de0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.189 UTC [cauthdsl] func2 -> DEBU 1d4e 0xc003063de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:32.189 UTC [cauthdsl] func2 -> DEBU 1d4f 0xc003063de0 principal evaluation fails" +"2019-09-24 00:25:32.189 UTC [cauthdsl] func1 -> DEBU 1d50 0xc003063de0 gate 1569284732189706900 evaluation fails" +"2019-09-24 00:25:32.190 UTC [policies] Evaluate -> DEBU 1d51 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.190 UTC [policies] Evaluate -> DEBU 1d52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.190 UTC [policies] Evaluate -> DEBU 1d53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:32.190 UTC [cauthdsl] func1 -> DEBU 1d54 0xc00307c620 gate 1569284732190170400 evaluation starts" +"2019-09-24 00:25:32.190 UTC [cauthdsl] func2 -> DEBU 1d55 0xc00307c620 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.190 UTC [cauthdsl] func2 -> DEBU 1d56 0xc00307c620 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.198 UTC [cauthdsl] func2 -> DEBU 1d58 0xc00307c620 principal matched by identity 0" +"2019-09-24 00:25:32.198 UTC [msp.identity] Verify -> DEBU 1d59 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:32.199 UTC [msp.identity] Verify -> DEBU 1d5a Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:32.199 UTC [cauthdsl] func2 -> DEBU 1d5b 0xc00307c620 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:32.199 UTC [cauthdsl] func1 -> DEBU 1d5c 0xc00307c620 gate 1569284732190170400 evaluation succeeds" +"2019-09-24 00:25:32.199 UTC [policies] Evaluate -> DEBU 1d5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.198 UTC [gossip.comm] func1 -> DEBU 1d57 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.199 UTC [policies] Evaluate -> DEBU 1d5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.199 UTC [policies] Evaluate -> DEBU 1d5f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:32.199 UTC [policies] Evaluate -> DEBU 1d60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:32.199 UTC [msp] DeserializeIdentity -> DEBU 1d61 Obtaining identity" +"2019-09-24 00:25:32.200 UTC [msp] DeserializeIdentity -> DEBU 1d62 Obtaining identity" +"2019-09-24 00:25:32.200 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d63 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:32.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d64 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d65 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.200 UTC [policies] Evaluate -> DEBU 1d66 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:32.200 UTC [policies] Evaluate -> DEBU 1d67 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:32.200 UTC [policies] Evaluate -> DEBU 1d68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:32.200 UTC [cauthdsl] func1 -> DEBU 1d69 0xc00307ddf0 gate 1569284732200855900 evaluation starts" +"2019-09-24 00:25:32.200 UTC [cauthdsl] func2 -> DEBU 1d6a 0xc00307ddf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.200 UTC [cauthdsl] func2 -> DEBU 1d6b 0xc00307ddf0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.200 UTC [cauthdsl] func2 -> DEBU 1d6c 0xc00307ddf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:32.201 UTC [cauthdsl] func2 -> DEBU 1d6d 0xc00307ddf0 principal evaluation fails" +"2019-09-24 00:25:32.201 UTC [cauthdsl] func1 -> DEBU 1d6e 0xc00307ddf0 gate 1569284732200855900 evaluation fails" +"2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d6f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:32.209 UTC [cauthdsl] func1 -> DEBU 1d72 0xc0028c4630 gate 1569284732209425400 evaluation starts" +"2019-09-24 00:25:32.209 UTC [cauthdsl] func2 -> DEBU 1d73 0xc0028c4630 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.209 UTC [cauthdsl] func2 -> DEBU 1d74 0xc0028c4630 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.209 UTC [cauthdsl] func2 -> DEBU 1d75 0xc0028c4630 principal matched by identity 0" +"2019-09-24 00:25:32.209 UTC [msp.identity] Verify -> DEBU 1d76 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:32.209 UTC [msp.identity] Verify -> DEBU 1d77 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:32.209 UTC [cauthdsl] func2 -> DEBU 1d78 0xc0028c4630 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:32.209 UTC [cauthdsl] func1 -> DEBU 1d79 0xc0028c4630 gate 1569284732209425400 evaluation succeeds" +"2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d7a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d7c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:32.209 UTC [policies] Evaluate -> DEBU 1d7d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:32.210 UTC [gossip.gossip] handleMessage -> DEBU 1d7e Exiting" +"2019-09-24 00:25:32.210 UTC [gossip.gossip] handleMessage -> DEBU 1d7f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.210 UTC [msp] DeserializeIdentity -> DEBU 1d80 Obtaining identity" +"2019-09-24 00:25:32.210 UTC [msp] DeserializeIdentity -> DEBU 1d81 Obtaining identity" +"2019-09-24 00:25:32.210 UTC [msp] DeserializeIdentity -> DEBU 1d82 Obtaining identity" +"2019-09-24 00:25:32.210 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d83 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:32.210 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d84 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.210 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d85 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.210 UTC [policies] Evaluate -> DEBU 1d86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:32.210 UTC [policies] Evaluate -> DEBU 1d87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:32.210 UTC [policies] Evaluate -> DEBU 1d88 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:32.210 UTC [cauthdsl] func1 -> DEBU 1d89 0xc0028d8140 gate 1569284732210692600 evaluation starts" +"2019-09-24 00:25:32.210 UTC [cauthdsl] func2 -> DEBU 1d8a 0xc0028d8140 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.210 UTC [cauthdsl] func2 -> DEBU 1d8b 0xc0028d8140 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.210 UTC [cauthdsl] func2 -> DEBU 1d8c 0xc0028d8140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:32.210 UTC [cauthdsl] func2 -> DEBU 1d8d 0xc0028d8140 principal evaluation fails" +"2019-09-24 00:25:32.210 UTC [cauthdsl] func1 -> DEBU 1d8e 0xc0028d8140 gate 1569284732210692600 evaluation fails" +"2019-09-24 00:25:32.210 UTC [policies] Evaluate -> DEBU 1d8f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.210 UTC [policies] Evaluate -> DEBU 1d90 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.211 UTC [policies] Evaluate -> DEBU 1d91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:32.211 UTC [cauthdsl] func1 -> DEBU 1d92 0xc0028d8980 gate 1569284732211082100 evaluation starts" +"2019-09-24 00:25:32.211 UTC [cauthdsl] func2 -> DEBU 1d93 0xc0028d8980 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.211 UTC [cauthdsl] func2 -> DEBU 1d94 0xc0028d8980 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.211 UTC [cauthdsl] func2 -> DEBU 1d95 0xc0028d8980 principal matched by identity 0" +"2019-09-24 00:25:32.211 UTC [msp.identity] Verify -> DEBU 1d96 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:32.211 UTC [msp.identity] Verify -> DEBU 1d97 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:32.219 UTC [cauthdsl] func2 -> DEBU 1d98 0xc0028d8980 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:32.219 UTC [cauthdsl] func1 -> DEBU 1d99 0xc0028d8980 gate 1569284732211082100 evaluation succeeds" +"2019-09-24 00:25:32.219 UTC [policies] Evaluate -> DEBU 1d9a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.219 UTC [policies] Evaluate -> DEBU 1d9b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.219 UTC [policies] Evaluate -> DEBU 1d9c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:32.219 UTC [policies] Evaluate -> DEBU 1d9d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:32.220 UTC [msp.identity] Verify -> DEBU 1d9e Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:32.220 UTC [msp.identity] Verify -> DEBU 1d9f Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:32.221 UTC [msp.identity] Verify -> DEBU 1da0 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:32.221 UTC [msp.identity] Verify -> DEBU 1da1 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:32.227 UTC [msp] DeserializeIdentity -> DEBU 1da2 Obtaining identity" +"2019-09-24 00:25:32.227 UTC [msp] DeserializeIdentity -> DEBU 1da3 Obtaining identity" +"2019-09-24 00:25:32.232 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1da4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:32.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1da5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.232 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1da6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.232 UTC [policies] Evaluate -> DEBU 1da7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:32.233 UTC [policies] Evaluate -> DEBU 1da8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:32.233 UTC [policies] Evaluate -> DEBU 1da9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:32.233 UTC [cauthdsl] func1 -> DEBU 1daa 0xc000358f90 gate 1569284732233392300 evaluation starts" +"2019-09-24 00:25:32.233 UTC [cauthdsl] func2 -> DEBU 1dab 0xc000358f90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.233 UTC [cauthdsl] func2 -> DEBU 1dac 0xc000358f90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.233 UTC [cauthdsl] func2 -> DEBU 1dad 0xc000358f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:32.233 UTC [cauthdsl] func2 -> DEBU 1dae 0xc000358f90 principal evaluation fails" +"2019-09-24 00:25:32.233 UTC [cauthdsl] func1 -> DEBU 1daf 0xc000358f90 gate 1569284732233392300 evaluation fails" +"2019-09-24 00:25:32.233 UTC [policies] Evaluate -> DEBU 1db0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.233 UTC [policies] Evaluate -> DEBU 1db1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.233 UTC [policies] Evaluate -> DEBU 1db2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:32.234 UTC [cauthdsl] func1 -> DEBU 1db3 0xc0003597d0 gate 1569284732234047900 evaluation starts" +"2019-09-24 00:25:32.234 UTC [cauthdsl] func2 -> DEBU 1db4 0xc0003597d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.234 UTC [cauthdsl] func2 -> DEBU 1db5 0xc0003597d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.234 UTC [cauthdsl] func2 -> DEBU 1db6 0xc0003597d0 principal matched by identity 0" +"2019-09-24 00:25:32.234 UTC [msp.identity] Verify -> DEBU 1db7 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:32.234 UTC [msp.identity] Verify -> DEBU 1db8 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:32.234 UTC [cauthdsl] func2 -> DEBU 1db9 0xc0003597d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:32.235 UTC [cauthdsl] func1 -> DEBU 1dba 0xc0003597d0 gate 1569284732234047900 evaluation succeeds" +"2019-09-24 00:25:32.235 UTC [policies] Evaluate -> DEBU 1dbb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.235 UTC [policies] Evaluate -> DEBU 1dbc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.235 UTC [policies] Evaluate -> DEBU 1dbd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:32.235 UTC [policies] Evaluate -> DEBU 1dbe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:32.236 UTC [gossip.gossip] handleMessage -> DEBU 1dbf Exiting" +"2019-09-24 00:25:32.236 UTC [gossip.gossip] handleMessage -> DEBU 1dc0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.236 UTC [msp] DeserializeIdentity -> DEBU 1dc1 Obtaining identity" +"2019-09-24 00:25:32.236 UTC [msp] DeserializeIdentity -> DEBU 1dc2 Obtaining identity" +"2019-09-24 00:25:32.247 UTC [msp] DeserializeIdentity -> DEBU 1dc3 Obtaining identity" +"2019-09-24 00:25:32.248 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1dc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:32.248 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dc5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.248 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dc6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func1 -> DEBU 1dca 0xc0003712e0 gate 1569284732248245800 evaluation starts" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dcb 0xc0003712e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dcc 0xc0003712e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dcd 0xc0003712e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dce 0xc0003712e0 principal evaluation fails" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func1 -> DEBU 1dcf 0xc0003712e0 gate 1569284732248245800 evaluation fails" +"2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1dd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func1 -> DEBU 1dd3 0xc000371b20 gate 1569284732248518400 evaluation starts" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dd4 0xc000371b20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dd5 0xc000371b20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dd6 0xc000371b20 principal matched by identity 0" +"2019-09-24 00:25:32.248 UTC [msp.identity] Verify -> DEBU 1dd7 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:32.248 UTC [msp.identity] Verify -> DEBU 1dd8 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func2 -> DEBU 1dd9 0xc000371b20 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:32.248 UTC [cauthdsl] func1 -> DEBU 1dda 0xc000371b20 gate 1569284732248518400 evaluation succeeds" +"2019-09-24 00:25:32.248 UTC [policies] Evaluate -> DEBU 1ddb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.249 UTC [policies] Evaluate -> DEBU 1ddc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.249 UTC [policies] Evaluate -> DEBU 1ddd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:32.249 UTC [policies] Evaluate -> DEBU 1dde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:32.249 UTC [msp.identity] Verify -> DEBU 1ddf Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:32.249 UTC [msp.identity] Verify -> DEBU 1de0 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:32.249 UTC [msp] DeserializeIdentity -> DEBU 1de1 Obtaining identity" +"2019-09-24 00:25:32.249 UTC [msp] DeserializeIdentity -> DEBU 1de2 Obtaining identity" +"2019-09-24 00:25:32.250 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1de3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:32.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1de6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1de7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1de8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:32.250 UTC [cauthdsl] func1 -> DEBU 1de9 0xc00298ba10 gate 1569284732250254100 evaluation starts" +"2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1dea 0xc00298ba10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1deb 0xc00298ba10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1dec 0xc00298ba10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1ded 0xc00298ba10 principal evaluation fails" +"2019-09-24 00:25:32.250 UTC [cauthdsl] func1 -> DEBU 1dee 0xc00298ba10 gate 1569284732250254100 evaluation fails" +"2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1def Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1df0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.250 UTC [policies] Evaluate -> DEBU 1df1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:32.250 UTC [cauthdsl] func1 -> DEBU 1df2 0xc002998250 gate 1569284732250623900 evaluation starts" +"2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1df3 0xc002998250 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1df4 0xc002998250 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.250 UTC [cauthdsl] func2 -> DEBU 1df5 0xc002998250 principal matched by identity 0" +"2019-09-24 00:25:32.250 UTC [msp.identity] Verify -> DEBU 1df6 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:32.250 UTC [msp.identity] Verify -> DEBU 1df7 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:32.251 UTC [cauthdsl] func2 -> DEBU 1df8 0xc002998250 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:32.251 UTC [cauthdsl] func1 -> DEBU 1df9 0xc002998250 gate 1569284732250623900 evaluation succeeds" +"2019-09-24 00:25:32.251 UTC [policies] Evaluate -> DEBU 1dfa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.251 UTC [policies] Evaluate -> DEBU 1dfb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.259 UTC [policies] Evaluate -> DEBU 1dfc Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:32.259 UTC [policies] Evaluate -> DEBU 1dfd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:32.259 UTC [msp.identity] Verify -> DEBU 1dfe Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:32.259 UTC [msp.identity] Verify -> DEBU 1dff Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:32.259 UTC [gossip.gossip] handleMessage -> DEBU 1e00 Exiting" +"2019-09-24 00:25:32.278 UTC [gossip.election] waitForInterrupt -> DEBU 1e01 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:32.278 UTC [gossip.election] IsLeader -> DEBU 1e02 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:25:32.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 1e03 Obtaining default signing identity" +"2019-09-24 00:25:32.278 UTC [msp.identity] Sign -> DEBU 1e04 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510081801 " +"2019-09-24 00:25:32.278 UTC [msp.identity] Sign -> DEBU 1e05 Sign: digest: C192D69D6678D7648547712111A482516FD92EC0628C47461371F5A16C6A7420 " +"2019-09-24 00:25:32.278 UTC [gossip.election] waitForInterrupt -> DEBU 1e06 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:25:32.279 UTC [msp] DeserializeIdentity -> DEBU 1e07 Obtaining identity" +"2019-09-24 00:25:32.279 UTC [msp] DeserializeIdentity -> DEBU 1e08 Obtaining identity" +"2019-09-24 00:25:32.279 UTC [msp] DeserializeIdentity -> DEBU 1e09 Obtaining identity" +"2019-09-24 00:25:32.279 UTC [msp] DeserializeIdentity -> DEBU 1e0a Obtaining identity" +"2019-09-24 00:25:32.279 UTC [gossip.comm] Send -> DEBU 1e0b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:32.279 UTC [msp] DeserializeIdentity -> DEBU 1e0c Obtaining identity" +"2019-09-24 00:25:32.280 UTC [msp] DeserializeIdentity -> DEBU 1e0d Obtaining identity" +"2019-09-24 00:25:32.280 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:25:32.280 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0f Exiting" +"2019-09-24 00:25:32.285 UTC [msp] DeserializeIdentity -> DEBU 1e10 Obtaining identity" +"2019-09-24 00:25:32.285 UTC [msp] DeserializeIdentity -> DEBU 1e11 Obtaining identity" +"2019-09-24 00:25:32.285 UTC [gossip.pull] Hello -> DEBU 1e12 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:32.285 UTC [msp] DeserializeIdentity -> DEBU 1e13 Obtaining identity" +"2019-09-24 00:25:32.285 UTC [msp] DeserializeIdentity -> DEBU 1e14 Obtaining identity" +"2019-09-24 00:25:32.285 UTC [gossip.comm] Send -> DEBU 1e15 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:32.285 UTC [gossip.comm] sendToEndpoint -> DEBU 1e16 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.285 UTC [gossip.comm] sendToEndpoint -> DEBU 1e17 Exiting" +"2019-09-24 00:25:32.288 UTC [gossip.comm] func1 -> DEBU 1e18 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.288 UTC [gossip.gossip] handleMessage -> DEBU 1e19 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.289 UTC [gossip.pull] HandleMessage -> DEBU 1e1a GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.290 UTC [gossip.gossip] handleMessage -> DEBU 1e1b Exiting" +"2019-09-24 00:25:32.699 UTC [gossip.comm] func1 -> DEBU 1e1c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.699 UTC [gossip.gossip] handleMessage -> DEBU 1e1d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.700 UTC [msp] DeserializeIdentity -> DEBU 1e1e Obtaining identity" +"2019-09-24 00:25:32.700 UTC [msp] DeserializeIdentity -> DEBU 1e1f Obtaining identity" +"2019-09-24 00:25:32.700 UTC [gossip.gossip] handleMessage -> DEBU 1e20 Exiting" +"2019-09-24 00:25:32.700 UTC [gossip.comm] func1 -> DEBU 1e21 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.700 UTC [gossip.gossip] handleMessage -> DEBU 1e22 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.700 UTC [gossip.gossip] handleMessage -> DEBU 1e23 Exiting" +"2019-09-24 00:25:32.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e24 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.705 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e25 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:32.705 UTC [msp] DeserializeIdentity -> DEBU 1e26 Obtaining identity" +"2019-09-24 00:25:32.705 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e27 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:32.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e28 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e29 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:32.705 UTC [policies] Evaluate -> DEBU 1e2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:32.705 UTC [policies] Evaluate -> DEBU 1e2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:32.706 UTC [policies] Evaluate -> DEBU 1e2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:32.706 UTC [cauthdsl] func1 -> DEBU 1e2d 0xc002a9d150 gate 1569284732706077400 evaluation starts" +"2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e2e 0xc002a9d150 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e2f 0xc002a9d150 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e30 0xc002a9d150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e31 0xc002a9d150 principal evaluation fails" +"2019-09-24 00:25:32.706 UTC [cauthdsl] func1 -> DEBU 1e32 0xc002a9d150 gate 1569284732706077400 evaluation fails" +"2019-09-24 00:25:32.706 UTC [policies] Evaluate -> DEBU 1e33 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.706 UTC [policies] Evaluate -> DEBU 1e34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:32.706 UTC [policies] Evaluate -> DEBU 1e35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:32.706 UTC [cauthdsl] func1 -> DEBU 1e36 0xc002a9d990 gate 1569284732706590800 evaluation starts" +"2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e37 0xc002a9d990 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e38 0xc002a9d990 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:32.706 UTC [cauthdsl] func2 -> DEBU 1e39 0xc002a9d990 principal matched by identity 0" +"2019-09-24 00:25:32.706 UTC [msp.identity] Verify -> DEBU 1e3a Verify: digest = 00000000 47 fc e8 ff 71 fb 40 9a a0 9b f9 e2 cf 61 17 5f |G...q.@......a._| +00000010 f5 18 a0 31 ac 72 89 04 e2 d3 80 92 49 88 ee 82 |...1.r......I...|" +"2019-09-24 00:25:32.706 UTC [msp.identity] Verify -> DEBU 1e3b Verify: sig = 00000000 30 45 02 21 00 96 69 44 d4 d9 3c f5 01 1a 95 88 |0E.!..iD..<.....| +00000010 dd 89 1e 88 03 8a 7d ef 71 ba 61 f4 9d 06 64 18 |......}.q.a...d.| +00000020 e4 4a 70 2b e8 02 20 0c 74 13 bc a0 42 11 11 17 |.Jp+.. .t...B...| +00000030 81 3a 63 d6 48 36 50 e1 55 9c 74 55 83 b5 0a 17 |.:c.H6P.U.tU....| +00000040 56 ff ef 4f 3b 63 b3 |V..O;c.|" +"2019-09-24 00:25:32.707 UTC [cauthdsl] func2 -> DEBU 1e3c 0xc002a9d990 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:32.707 UTC [cauthdsl] func1 -> DEBU 1e3d 0xc002a9d990 gate 1569284732706590800 evaluation succeeds" +"2019-09-24 00:25:32.707 UTC [policies] Evaluate -> DEBU 1e3e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.712 UTC [policies] Evaluate -> DEBU 1e3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:32.714 UTC [gossip.comm] func1 -> DEBU 1e40 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.714 UTC [gossip.gossip] handleMessage -> DEBU 1e41 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.712 UTC [policies] Evaluate -> DEBU 1e42 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:32.733 UTC [policies] Evaluate -> DEBU 1e43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:32.734 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e44 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e45 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:32.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e46 updating membership: timestamp: " +"2019-09-24 00:25:32.734 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e47 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:32.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e48 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:32.735 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e49 Exiting" +"2019-09-24 00:25:32.735 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e4a Exiting" +"2019-09-24 00:25:32.737 UTC [gossip.discovery] sendMemResponse -> DEBU 1e4b Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:32.738 UTC [msp] DeserializeIdentity -> DEBU 1e4c Obtaining identity" +"2019-09-24 00:25:32.738 UTC [msp] DeserializeIdentity -> DEBU 1e4d Obtaining identity" +"2019-09-24 00:25:32.738 UTC [msp] DeserializeIdentity -> DEBU 1e4e Obtaining identity" +"2019-09-24 00:25:32.738 UTC [gossip.comm] Send -> DEBU 1e4f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:32.738 UTC [gossip.discovery] sendMemResponse -> DEBU 1e50 Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020$" signature:"0E\002!\000\276\370\210\342=\n3\026\365\255\030wl\253\265Y\353\036\003\036\305\246B\357\212{?\177\007\365d`\002 \r\243D#h\332q\254\016N\235\320R\376]\026L\241\204H\224Z\247>\374\302\203{\200\306Z@" > alive: " +"2019-09-24 00:25:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 1e51 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 1e52 Exiting" +"2019-09-24 00:25:32.738 UTC [gossip.comm] func1 -> DEBU 1e53 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.737 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e54 Exiting" +"2019-09-24 00:25:32.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e55 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.805 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e56 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:32.806 UTC [msp.identity] Verify -> DEBU 1e57 Verify: digest = 00000000 93 3d 09 b1 ec 1e 30 e8 93 a9 ad cc 4b 5c 23 6d |.=....0.....K\#m| +00000010 a4 e7 f3 88 61 9f d9 3d 4e ef ac 2a 76 b3 b8 80 |....a..=N..*v...|" +"2019-09-24 00:25:32.806 UTC [msp.identity] Verify -> DEBU 1e58 Verify: sig = 00000000 30 45 02 21 00 de de 93 e3 a6 4d e9 79 20 52 01 |0E.!......M.y R.| +00000010 fb f8 a0 65 3e 33 71 10 71 db b9 65 d1 cb b2 cf |...e>3q.q..e....| +00000020 7a cf 8b 65 4a 02 20 1c 70 75 93 95 d4 6f d4 a7 |z..eJ. .pu...o..| +00000030 4e e4 fc e0 74 af 56 03 19 62 db 39 0e 9a e4 da |N...t.V..b.9....| +00000040 44 12 2c 51 26 62 d1 |D.,Q&b.|" +"2019-09-24 00:25:32.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e59 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e5a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:32.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e5b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:32.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e5c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:32.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e5d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:32.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e5e Exiting" +"2019-09-24 00:25:32.807 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e5f Exiting" +"2019-09-24 00:25:32.807 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e60 Exiting" +"2019-09-24 00:25:32.807 UTC [gossip.gossip] handleMessage -> DEBU 1e61 Exiting" +"2019-09-24 00:25:32.811 UTC [gossip.comm] func1 -> DEBU 1e62 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.819 UTC [msp] DeserializeIdentity -> DEBU 1e63 Obtaining identity" +"2019-09-24 00:25:32.825 UTC [msp] DeserializeIdentity -> DEBU 1e64 Obtaining identity" +"2019-09-24 00:25:32.825 UTC [msp] DeserializeIdentity -> DEBU 1e65 Obtaining identity" +"2019-09-24 00:25:32.826 UTC [gossip.comm] Send -> DEBU 1e66 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:32.826 UTC [msp] DeserializeIdentity -> DEBU 1e67 Obtaining identity" +"2019-09-24 00:25:32.826 UTC [gossip.comm] Send -> DEBU 1e68 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:32.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1e69 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.834 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6a Exiting" +"2019-09-24 00:25:32.844 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.844 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6c Exiting" +"2019-09-24 00:25:32.850 UTC [gossip.comm] func1 -> DEBU 1e6d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.850 UTC [gossip.gossip] handleMessage -> DEBU 1e6e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.850 UTC [gossip.pull] HandleMessage -> DEBU 1e6f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e70 Obtaining identity" +"2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e71 Obtaining identity" +"2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e72 Obtaining identity" +"2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e73 Obtaining identity" +"2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e74 Obtaining identity" +"2019-09-24 00:25:32.850 UTC [msp] DeserializeIdentity -> DEBU 1e75 Obtaining identity" +"2019-09-24 00:25:32.850 UTC [gossip.pull] SendDigest -> DEBU 1e76 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:32.850 UTC [gossip.gossip] handleMessage -> DEBU 1e77 Exiting" +"2019-09-24 00:25:32.854 UTC [gossip.gossip] handleMessage -> DEBU 1e78 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.858 UTC [gossip.gossip] handleMessage -> DEBU 1e79 Exiting" +"2019-09-24 00:25:32.858 UTC [gossip.gossip] handleMessage -> DEBU 1e7a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e7b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e7c Exiting" +"2019-09-24 00:25:32.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e7d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:32.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e7e Exiting" +"2019-09-24 00:25:32.859 UTC [gossip.gossip] handleMessage -> DEBU 1e7f Exiting" +"2019-09-24 00:25:32.860 UTC [gossip.gossip] handleMessage -> DEBU 1e80 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.860 UTC [gossip.pull] HandleMessage -> DEBU 1e81 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:32.860 UTC [gossip.pull] SendDigest -> DEBU 1e82 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:32.861 UTC [gossip.gossip] handleMessage -> DEBU 1e83 Exiting" +"2019-09-24 00:25:33.185 UTC [gossip.gossip] handleMessage -> DEBU 1e84 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:33.192 UTC [msp] DeserializeIdentity -> DEBU 1e85 Obtaining identity" +"2019-09-24 00:25:33.192 UTC [msp] DeserializeIdentity -> DEBU 1e86 Obtaining identity" +"2019-09-24 00:25:33.192 UTC [msp] DeserializeIdentity -> DEBU 1e87 Obtaining identity" +"2019-09-24 00:25:33.192 UTC [gossip.gossip] handleMessage -> DEBU 1e88 Exiting" +"2019-09-24 00:25:33.675 UTC [gossip.comm] func1 -> DEBU 1e89 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:33.675 UTC [gossip.gossip] handleMessage -> DEBU 1e8a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:33.675 UTC [gossip.pull] HandleMessage -> DEBU 1e8b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:33.675 UTC [gossip.pull] SendDigest -> DEBU 1e8c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:33.675 UTC [gossip.gossip] handleMessage -> DEBU 1e8d Exiting" +"2019-09-24 00:25:33.716 UTC [gossip.comm] func1 -> DEBU 1e8e Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:33.717 UTC [gossip.gossip] handleMessage -> DEBU 1e8f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:33.717 UTC [gossip.gossip] handleMessage -> DEBU 1e90 Exiting" +"2019-09-24 00:25:33.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e91 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:33.717 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e92 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:33.717 UTC [msp.identity] Verify -> DEBU 1e93 Verify: digest = 00000000 9f 64 6b da 54 f5 97 49 e2 29 0f 5a 79 91 55 17 |.dk.T..I.).Zy.U.| +00000010 f7 35 d2 95 bb 1a 2e cd 1c 08 a1 f4 36 65 f5 f2 |.5..........6e..|" +"2019-09-24 00:25:33.717 UTC [msp.identity] Verify -> DEBU 1e94 Verify: sig = 00000000 30 44 02 20 34 2a 44 d2 38 a7 bc 75 b9 b7 51 0b |0D. 4*D.8..u..Q.| +00000010 68 32 8a f1 8e 94 83 32 a9 d2 c9 c9 10 6b d1 1a |h2.....2.....k..| +00000020 1b 70 99 80 02 20 37 74 5f f8 42 40 00 d0 88 06 |.p... 7t_.B@....| +00000030 9a 38 33 7b e2 f3 dd 8c f4 d6 21 d6 3c 76 41 5d |.83{......!.o.|" +"2019-09-24 00:25:33.717 UTC [msp.identity] Verify -> DEBU 1e95 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:33.717 UTC [msp.identity] Verify -> DEBU 1e96 Verify: sig = 00000000 30 44 02 20 69 99 be d5 55 2a 34 77 a6 9e 29 40 |0D. i...U*4w..)@| +00000010 ac 38 69 17 a2 e4 b0 8d 17 67 a5 68 9b 3f fb 26 |.8i......g.h.?.&| +00000020 3f 43 c1 7b 02 20 2b 27 8d 31 02 f1 45 11 0d 22 |?C.{. +'.1..E.."| +00000030 27 57 4e 1f 5a 00 35 18 64 9f 64 b9 1c 7f c9 11 |'WN.Z.5.d.d.....| +00000040 fd fa 23 39 4a 1b |..#9J.|" +"2019-09-24 00:25:33.717 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e97 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:33.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e98 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:33.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e99 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:33.717 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e9a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:33.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e9b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:33.718 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e9c Exiting" +"2019-09-24 00:25:33.718 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e9d Exiting" +"2019-09-24 00:25:33.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e9e Exiting" +"2019-09-24 00:25:33.718 UTC [gossip.discovery] sendMemResponse -> DEBU 1e9f Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:33.718 UTC [msp] DeserializeIdentity -> DEBU 1ea0 Obtaining identity" +"2019-09-24 00:25:33.718 UTC [msp] DeserializeIdentity -> DEBU 1ea1 Obtaining identity" +"2019-09-24 00:25:33.718 UTC [gossip.comm] Send -> DEBU 1ea2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:33.718 UTC [gossip.discovery] sendMemResponse -> DEBU 1ea3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" secret_envelope: > alive: " +"2019-09-24 00:25:33.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:25:33.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1ea5 Exiting" +"2019-09-24 00:25:34.117 UTC [gossip.comm] func1 -> DEBU 1ea6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:34.117 UTC [gossip.gossip] handleMessage -> DEBU 1ea7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:34.117 UTC [msp] DeserializeIdentity -> DEBU 1ea8 Obtaining identity" +"2019-09-24 00:25:34.117 UTC [msp] DeserializeIdentity -> DEBU 1ea9 Obtaining identity" +"2019-09-24 00:25:34.117 UTC [msp] DeserializeIdentity -> DEBU 1eaa Obtaining identity" +"2019-09-24 00:25:34.117 UTC [gossip.gossip] handleMessage -> DEBU 1eab Exiting" +"2019-09-24 00:25:34.595 UTC [msp] GetDefaultSigningIdentity -> DEBU 1eac Obtaining default signing identity" +"2019-09-24 00:25:34.595 UTC [msp.identity] Sign -> DEBU 1ead Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151022 " +"2019-09-24 00:25:34.595 UTC [msp.identity] Sign -> DEBU 1eae Sign: digest: 03ED023C1D8346C5C8E54EDF05F278B8943E41BC13A2BEF3EA21C6969373116D " +"2019-09-24 00:25:34.597 UTC [msp] GetDefaultSigningIdentity -> DEBU 1eaf Obtaining default signing identity" +"2019-09-24 00:25:34.598 UTC [msp.identity] Sign -> DEBU 1eb0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:34.598 UTC [msp.identity] Sign -> DEBU 1eb1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:34.598 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1eb2 Sleeping 5s" +"2019-09-24 00:25:34.606 UTC [msp] DeserializeIdentity -> DEBU 1eb3 Obtaining identity" +"2019-09-24 00:25:34.606 UTC [msp] DeserializeIdentity -> DEBU 1eb4 Obtaining identity" +"2019-09-24 00:25:34.606 UTC [msp] DeserializeIdentity -> DEBU 1eb5 Obtaining identity" +"2019-09-24 00:25:34.606 UTC [gossip.comm] Send -> DEBU 1eb6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:34.607 UTC [msp] DeserializeIdentity -> DEBU 1eb7 Obtaining identity" +"2019-09-24 00:25:34.607 UTC [gossip.comm] Send -> DEBU 1eb8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:34.607 UTC [gossip.comm] Send -> DEBU 1eb9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:34.607 UTC [gossip.comm] sendToEndpoint -> DEBU 1eba Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:34.607 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebb Exiting" +"2019-09-24 00:25:34.608 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:34.608 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebd Exiting" +"2019-09-24 00:25:34.609 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:34.609 UTC [gossip.comm] sendToEndpoint -> DEBU 1ebf Exiting" +"2019-09-24 00:25:34.838 UTC [gossip.comm] func1 -> DEBU 1ec0 Got message: GossipMessage: nonce:7888817266797362290 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\021" signature:"0D\002 Wg\010OK\375\333\330\313\227 \375\375\372C\265'}\360\262{\305\354\327\006l;\n\226\204C\261\002 z\221S\276!*H\215\230\007R\210D\006\374\230\276\037\323\031\327\302\364\352\036\223\246z\254IR\211" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +"2019-09-24 00:25:34.838 UTC [gossip.gossip] handleMessage -> DEBU 1ec1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:7888817266797362290 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\021" signature:"0D\002 Wg\010OK\375\333\330\313\227 \375\375\372C\265'}\360\262{\305\354\327\006l;\n\226\204C\261\002 z\221S\276!*H\215\230\007R\210D\006\374\230\276\037\323\031\327\302\364\352\036\223\246z\254IR\211" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +"2019-09-24 00:25:34.838 UTC [gossip.gossip] handleMessage -> DEBU 1ec2 Exiting" +"2019-09-24 00:25:34.838 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ec3 Got message: GossipMessage: nonce:7888817266797362290 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020\021" signature:"0D\002 Wg\010OK\375\333\330\313\227 \375\375\372C\265'}\360\262{\305\354\327\006l;\n\226\204C\261\002 z\221S\276!*H\215\230\007R\210D\006\374\230\276\037\323\031\327\302\364\352\036\223\246z\254IR\211" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +"2019-09-24 00:25:34.838 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ec4 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:34.838 UTC [msp.identity] Verify -> DEBU 1ec5 Verify: digest = 00000000 dd b0 26 b6 95 7a 85 25 e5 4b 9e 9e 0b c1 38 a2 |..&..z.%.K....8.| +00000010 fc 97 86 e6 45 ed 66 bd b7 a3 11 3c 4b e1 56 58 |....E.f.... DEBU 1ec6 Verify: sig = 00000000 30 44 02 20 57 67 08 4f 4b fd db d8 cb 97 20 fd |0D. Wg.OK..... .| +00000010 fd fa 43 b5 27 7d f0 b2 7b c5 ec d7 06 6c 3b 0a |..C.'}..{....l;.| +00000020 96 84 43 b1 02 20 7a 91 53 be 21 2a 48 8d 98 07 |..C.. z.S.!*H...| +00000030 52 88 44 06 fc 98 be 1f d3 19 d7 c2 f4 ea 1e 93 |R.D.............| +00000040 a6 7a ac 49 52 89 |.z.IR.|" +"2019-09-24 00:25:34.839 UTC [msp.identity] Verify -> DEBU 1ec7 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:34.840 UTC [msp.identity] Verify -> DEBU 1ec8 Verify: sig = 00000000 30 45 02 21 00 a1 de 92 8f ee 24 31 6d fe 10 f9 |0E.!......$1m...| +00000010 c5 36 19 2e 8a 89 40 95 ba 37 96 6b 99 6c ff f8 |.6....@..7.k.l..| +00000020 ed a2 a7 7c 6f 02 20 48 4b e3 c0 61 83 61 15 0c |...|o. HK..a.a..| +00000030 0f 44 5e d3 cd ae 90 e5 64 18 54 4b c9 e3 99 e5 |.D^.....d.TK....| +00000040 94 99 d8 d6 03 6e c5 |.....n.|" +"2019-09-24 00:25:34.840 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ec9 Exiting" +"2019-09-24 00:25:34.840 UTC [gossip.discovery] sendMemResponse -> DEBU 1eca Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:34.840 UTC [msp] DeserializeIdentity -> DEBU 1ecb Obtaining identity" +"2019-09-24 00:25:34.840 UTC [msp] DeserializeIdentity -> DEBU 1ecc Obtaining identity" +"2019-09-24 00:25:34.840 UTC [gossip.comm] Send -> DEBU 1ecd Entering, sending GossipMessage: Channel: , nonce: 7888817266797362290, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:34.840 UTC [gossip.discovery] sendMemResponse -> DEBU 1ece Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" secret_envelope: > alive: " +"2019-09-24 00:25:34.840 UTC [gossip.comm] sendToEndpoint -> DEBU 1ecf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7888817266797362290, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes" +"2019-09-24 00:25:34.840 UTC [gossip.comm] sendToEndpoint -> DEBU 1ed0 Exiting" +"2019-09-24 00:25:35.017 UTC [gossip.gossip] handleMessage -> DEBU 1ed1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.017 UTC [gossip.gossip] handleMessage -> DEBU 1ed2 Exiting" +"2019-09-24 00:25:35.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ed3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.019 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ed4 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:35.019 UTC [msp] DeserializeIdentity -> DEBU 1ed5 Obtaining identity" +"2019-09-24 00:25:35.019 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ed6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:35.019 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ed7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:35.019 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ed8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:35.019 UTC [policies] Evaluate -> DEBU 1ed9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:35.019 UTC [policies] Evaluate -> DEBU 1eda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:35.020 UTC [policies] Evaluate -> DEBU 1edb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:35.020 UTC [cauthdsl] func1 -> DEBU 1edc 0xc002a0a7a0 gate 1569284735020642100 evaluation starts" +"2019-09-24 00:25:35.020 UTC [cauthdsl] func2 -> DEBU 1edd 0xc002a0a7a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:35.020 UTC [cauthdsl] func2 -> DEBU 1ede 0xc002a0a7a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:35.020 UTC [cauthdsl] func2 -> DEBU 1edf 0xc002a0a7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:35.021 UTC [cauthdsl] func2 -> DEBU 1ee0 0xc002a0a7a0 principal evaluation fails" +"2019-09-24 00:25:35.035 UTC [cauthdsl] func1 -> DEBU 1ee2 0xc002a0a7a0 gate 1569284735020642100 evaluation fails" +"2019-09-24 00:25:35.035 UTC [policies] Evaluate -> DEBU 1ee3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:35.035 UTC [policies] Evaluate -> DEBU 1ee4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:35.035 UTC [policies] Evaluate -> DEBU 1ee5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:35.035 UTC [cauthdsl] func1 -> DEBU 1ee6 0xc002a0afe0 gate 1569284735035429800 evaluation starts" +"2019-09-24 00:25:35.034 UTC [gossip.comm] func1 -> DEBU 1ee1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.035 UTC [cauthdsl] func2 -> DEBU 1ee7 0xc002a0afe0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:35.035 UTC [cauthdsl] func2 -> DEBU 1ee8 0xc002a0afe0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:35.035 UTC [cauthdsl] func2 -> DEBU 1ee9 0xc002a0afe0 principal matched by identity 0" +"2019-09-24 00:25:35.035 UTC [gossip.gossip] handleMessage -> DEBU 1eea Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.035 UTC [msp.identity] Verify -> DEBU 1eeb Verify: digest = 00000000 90 04 a7 1d f2 f3 f7 0d b3 5a 8b 36 59 85 ed ef |.........Z.6Y...| +00000010 d9 7d 9f 1e 6e a4 e8 b9 e8 6a a0 51 80 7f 7b 80 |.}..n....j.Q..{.|" +"2019-09-24 00:25:35.035 UTC [msp.identity] Verify -> DEBU 1eec Verify: sig = 00000000 30 44 02 20 50 e0 3b 74 e2 ab c9 20 ba 17 32 8e |0D. P.;t... ..2.| +00000010 35 d4 91 d9 0a 3a ac 42 78 1f 75 7c 4e de 20 1c |5....:.Bx.u|N. .| +00000020 bc 69 5b b3 02 20 69 37 2c c9 69 ef 37 47 ca e6 |.i[.. i7,.i.7G..| +00000030 df 07 d7 b5 91 48 dd f1 88 d9 37 7d 33 59 8c da |.....H....7}3Y..| +00000040 d2 27 f7 df f4 34 |.'...4|" +"2019-09-24 00:25:35.035 UTC [cauthdsl] func2 -> DEBU 1eed 0xc002a0afe0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:35.036 UTC [cauthdsl] func1 -> DEBU 1eee 0xc002a0afe0 gate 1569284735035429800 evaluation succeeds" +"2019-09-24 00:25:35.036 UTC [policies] Evaluate -> DEBU 1eef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:35.036 UTC [policies] Evaluate -> DEBU 1ef0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:35.036 UTC [policies] Evaluate -> DEBU 1ef1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:35.036 UTC [policies] Evaluate -> DEBU 1ef2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:35.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ef3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:35.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef5 updating membership: timestamp: " +"2019-09-24 00:25:35.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef6 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:35.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef7 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:35.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef8 Exiting" +"2019-09-24 00:25:35.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ef9 Exiting" +"2019-09-24 00:25:35.036 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1efa Exiting" +"2019-09-24 00:25:35.038 UTC [gossip.gossip] handleMessage -> DEBU 1efb Exiting" +"2019-09-24 00:25:35.038 UTC [gossip.comm] func1 -> DEBU 1efc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.038 UTC [gossip.gossip] handleMessage -> DEBU 1efd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1efe Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1eff Exiting" +"2019-09-24 00:25:35.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f00 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f01 Exiting" +"2019-09-24 00:25:35.038 UTC [gossip.gossip] handleMessage -> DEBU 1f02 Exiting" +"2019-09-24 00:25:35.045 UTC [msp] DeserializeIdentity -> DEBU 1f03 Obtaining identity" +"2019-09-24 00:25:35.045 UTC [msp] DeserializeIdentity -> DEBU 1f04 Obtaining identity" +"2019-09-24 00:25:35.045 UTC [msp] DeserializeIdentity -> DEBU 1f05 Obtaining identity" +"2019-09-24 00:25:35.046 UTC [msp] DeserializeIdentity -> DEBU 1f06 Obtaining identity" +"2019-09-24 00:25:35.046 UTC [msp] DeserializeIdentity -> DEBU 1f07 Obtaining identity" +"2019-09-24 00:25:35.046 UTC [msp] DeserializeIdentity -> DEBU 1f08 Obtaining identity" +"2019-09-24 00:25:35.046 UTC [msp] DeserializeIdentity -> DEBU 1f09 Obtaining identity" +"2019-09-24 00:25:35.046 UTC [gossip.comm] Send -> DEBU 1f0a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:35.046 UTC [msp] DeserializeIdentity -> DEBU 1f0b Obtaining identity" +"2019-09-24 00:25:35.046 UTC [gossip.comm] Send -> DEBU 1f0c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:35.046 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.046 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0e Exiting" +"2019-09-24 00:25:35.046 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.047 UTC [gossip.comm] sendToEndpoint -> DEBU 1f10 Exiting" +"2019-09-24 00:25:35.646 UTC [msp] GetDefaultSigningIdentity -> DEBU 1f11 Obtaining default signing identity" +"2019-09-24 00:25:35.646 UTC [msp.identity] Sign -> DEBU 1f12 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151023 " +"2019-09-24 00:25:35.646 UTC [msp.identity] Sign -> DEBU 1f13 Sign: digest: 9AB8DAF64C000295D47C3EDE1CDFA7ECEC9CB3C98FA4B1CD34D25C2B8F711CEE " +"2019-09-24 00:25:35.646 UTC [msp] GetDefaultSigningIdentity -> DEBU 1f14 Obtaining default signing identity" +"2019-09-24 00:25:35.647 UTC [msp.identity] Sign -> DEBU 1f15 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:35.647 UTC [msp.identity] Sign -> DEBU 1f16 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:35.647 UTC [gossip.comm] Send -> DEBU 1f17 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:35.648 UTC [msp] DeserializeIdentity -> DEBU 1f18 Obtaining identity" +"2019-09-24 00:25:35.648 UTC [gossip.comm] Send -> DEBU 1f19 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:35.649 UTC [msp] DeserializeIdentity -> DEBU 1f1a Obtaining identity" +"2019-09-24 00:25:35.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1c Exiting" +"2019-09-24 00:25:35.693 UTC [gossip.comm] Send -> DEBU 1f1d Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:35.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1f1f Exiting" +"2019-09-24 00:25:35.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1f20 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.695 UTC [gossip.comm] sendToEndpoint -> DEBU 1f21 Exiting" +"2019-09-24 00:25:35.697 UTC [gossip.comm] func1 -> DEBU 1f22 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.697 UTC [gossip.comm] func1 -> DEBU 1f23 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.697 UTC [gossip.gossip] handleMessage -> DEBU 1f24 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.697 UTC [gossip.gossip] handleMessage -> DEBU 1f25 Exiting" +"2019-09-24 00:25:35.698 UTC [gossip.gossip] handleMessage -> DEBU 1f26 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f27 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.698 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f28 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:35.698 UTC [msp] DeserializeIdentity -> DEBU 1f29 Obtaining identity" +"2019-09-24 00:25:35.703 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f2a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:35.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f2b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:35.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f2c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:35.704 UTC [cauthdsl] func1 -> DEBU 1f30 0xc0027feb40 gate 1569284735704306400 evaluation starts" +"2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f31 0xc0027feb40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f32 0xc0027feb40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f33 0xc0027feb40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f34 0xc0027feb40 principal evaluation fails" +"2019-09-24 00:25:35.704 UTC [cauthdsl] func1 -> DEBU 1f35 0xc0027feb40 gate 1569284735704306400 evaluation fails" +"2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f36 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:35.704 UTC [policies] Evaluate -> DEBU 1f38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:35.704 UTC [cauthdsl] func1 -> DEBU 1f39 0xc0027ff380 gate 1569284735704720900 evaluation starts" +"2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f3a 0xc0027ff380 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f3b 0xc0027ff380 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:35.704 UTC [cauthdsl] func2 -> DEBU 1f3c 0xc0027ff380 principal matched by identity 0" +"2019-09-24 00:25:35.705 UTC [msp.identity] Verify -> DEBU 1f3d Verify: digest = 00000000 ba 42 b4 71 77 83 b6 3c 05 b0 c5 15 ab 2c 44 83 |.B.qw..<.....,D.| +00000010 74 98 c4 77 b0 5d e1 33 79 a3 0b a8 30 aa 2e 43 |t..w.].3y...0..C|" +"2019-09-24 00:25:35.705 UTC [msp.identity] Verify -> DEBU 1f3e Verify: sig = 00000000 30 44 02 20 1d d7 b7 34 5d 06 b1 36 60 65 ee c1 |0D. ...4]..6`e..| +00000010 31 13 85 b2 31 10 85 35 75 5e b2 08 4f 71 1c 1c |1...1..5u^..Oq..| +00000020 e1 34 1b 30 02 20 35 ea bf 3c a6 ca c3 38 13 59 |.4.0. 5..<...8.Y| +00000030 df d4 f9 8a 8e 2a 0e 3e cf 09 cf e3 9a 3f 9d 2e |.....*.>.....?..| +00000040 c1 5b 66 3b 42 b1 |.[f;B.|" +"2019-09-24 00:25:35.705 UTC [cauthdsl] func2 -> DEBU 1f3f 0xc0027ff380 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:35.707 UTC [gossip.pull] Hello -> DEBU 1f40 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:35.707 UTC [gossip.comm] Send -> DEBU 1f41 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:35.707 UTC [gossip.pull] Hello -> DEBU 1f42 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:35.707 UTC [gossip.comm] Send -> DEBU 1f43 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:35.707 UTC [gossip.pull] Hello -> DEBU 1f44 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:35.707 UTC [gossip.comm] Send -> DEBU 1f45 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:35.707 UTC [gossip.comm] sendToEndpoint -> DEBU 1f46 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.707 UTC [gossip.comm] sendToEndpoint -> DEBU 1f47 Exiting" +"2019-09-24 00:25:35.707 UTC [gossip.comm] sendToEndpoint -> DEBU 1f48 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.707 UTC [gossip.comm] sendToEndpoint -> DEBU 1f49 Exiting" +"2019-09-24 00:25:35.707 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.708 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4b Exiting" +"2019-09-24 00:25:35.705 UTC [cauthdsl] func1 -> DEBU 1f4c 0xc0027ff380 gate 1569284735704720900 evaluation succeeds" +"2019-09-24 00:25:35.708 UTC [policies] Evaluate -> DEBU 1f4d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:35.708 UTC [gossip.comm] func1 -> DEBU 1f4e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.708 UTC [policies] Evaluate -> DEBU 1f4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:35.708 UTC [gossip.comm] func1 -> DEBU 1f50 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.708 UTC [policies] Evaluate -> DEBU 1f51 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:35.708 UTC [policies] Evaluate -> DEBU 1f52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:35.708 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f53 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f54 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:35.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f55 updating membership: timestamp: " +"2019-09-24 00:25:35.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f56 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:35.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f57 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:35.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f58 Exiting" +"2019-09-24 00:25:35.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f59 Exiting" +"2019-09-24 00:25:35.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f5a Exiting" +"2019-09-24 00:25:35.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.713 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f5c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:35.714 UTC [msp.identity] Verify -> DEBU 1f5d Verify: digest = 00000000 9a b8 da f6 4c 00 02 95 d4 7c 3e de 1c df a7 ec |....L....|>.....| +00000010 ec 9c b3 c9 8f a4 b1 cd 34 d2 5c 2b 8f 71 1c ee |........4.\+.q..|" +"2019-09-24 00:25:35.714 UTC [msp.identity] Verify -> DEBU 1f5e Verify: sig = 00000000 30 44 02 20 20 95 c3 47 47 f6 78 51 e0 09 42 8a |0D. ..GG.xQ..B.| +00000010 c2 99 c5 03 a0 1e d7 b0 fb af 63 ea 35 15 4d 6f |..........c.5.Mo| +00000020 8c f1 eb 60 02 20 41 75 4d 43 14 6f 73 60 68 69 |...`. AuMC.os`hi| +00000030 56 1d 3c b2 9a 10 80 69 a9 ff 34 d6 c9 9c a7 5e |V.<....i..4....^| +00000040 19 4d c9 d8 13 8d |.M....|" +"2019-09-24 00:25:35.714 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f5f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.714 UTC [gossip.discovery] isSentByMe -> DEBU 1f60 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.714 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f61 Exiting" +"2019-09-24 00:25:35.714 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f62 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:35.714 UTC [msp.identity] Verify -> DEBU 1f63 Verify: digest = 00000000 9f 64 6b da 54 f5 97 49 e2 29 0f 5a 79 91 55 17 |.dk.T..I.).Zy.U.| +00000010 f7 35 d2 95 bb 1a 2e cd 1c 08 a1 f4 36 65 f5 f2 |.5..........6e..|" +"2019-09-24 00:25:35.714 UTC [msp.identity] Verify -> DEBU 1f64 Verify: sig = 00000000 30 44 02 20 34 2a 44 d2 38 a7 bc 75 b9 b7 51 0b |0D. 4*D.8..u..Q.| +00000010 68 32 8a f1 8e 94 83 32 a9 d2 c9 c9 10 6b d1 1a |h2.....2.....k..| +00000020 1b 70 99 80 02 20 37 74 5f f8 42 40 00 d0 88 06 |.p... 7t_.B@....| +00000030 9a 38 33 7b e2 f3 dd 8c f4 d6 21 d6 3c 76 41 5d |.83{......!.o.|" +"2019-09-24 00:25:35.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f65 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f66 Exiting" +"2019-09-24 00:25:35.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f67 Exiting" +"2019-09-24 00:25:35.715 UTC [gossip.gossip] handleMessage -> DEBU 1f68 Exiting" +"2019-09-24 00:25:35.715 UTC [gossip.gossip] handleMessage -> DEBU 1f69 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.715 UTC [gossip.gossip] handleMessage -> DEBU 1f6a Exiting" +"2019-09-24 00:25:35.715 UTC [gossip.gossip] handleMessage -> DEBU 1f6b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.715 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f6d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:35.715 UTC [msp.identity] Verify -> DEBU 1f6e Verify: digest = 00000000 9a b8 da f6 4c 00 02 95 d4 7c 3e de 1c df a7 ec |....L....|>.....| +00000010 ec 9c b3 c9 8f a4 b1 cd 34 d2 5c 2b 8f 71 1c ee |........4.\+.q..|" +"2019-09-24 00:25:35.715 UTC [msp.identity] Verify -> DEBU 1f6f Verify: sig = 00000000 30 44 02 20 20 95 c3 47 47 f6 78 51 e0 09 42 8a |0D. ..GG.xQ..B.| +00000010 c2 99 c5 03 a0 1e d7 b0 fb af 63 ea 35 15 4d 6f |..........c.5.Mo| +00000020 8c f1 eb 60 02 20 41 75 4d 43 14 6f 73 60 68 69 |...`. AuMC.os`hi| +00000030 56 1d 3c b2 9a 10 80 69 a9 ff 34 d6 c9 9c a7 5e |V.<....i..4....^| +00000040 19 4d c9 d8 13 8d |.M....|" +"2019-09-24 00:25:35.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f70 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.715 UTC [gossip.discovery] isSentByMe -> DEBU 1f71 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.715 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f72 Exiting" +"2019-09-24 00:25:35.715 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f73 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:35.715 UTC [msp.identity] Verify -> DEBU 1f74 Verify: digest = 00000000 9f 64 6b da 54 f5 97 49 e2 29 0f 5a 79 91 55 17 |.dk.T..I.).Zy.U.| +00000010 f7 35 d2 95 bb 1a 2e cd 1c 08 a1 f4 36 65 f5 f2 |.5..........6e..|" +"2019-09-24 00:25:35.715 UTC [msp.identity] Verify -> DEBU 1f75 Verify: sig = 00000000 30 44 02 20 34 2a 44 d2 38 a7 bc 75 b9 b7 51 0b |0D. 4*D.8..u..Q.| +00000010 68 32 8a f1 8e 94 83 32 a9 d2 c9 c9 10 6b d1 1a |h2.....2.....k..| +00000020 1b 70 99 80 02 20 37 74 5f f8 42 40 00 d0 88 06 |.p... 7t_.B@....| +00000030 9a 38 33 7b e2 f3 dd 8c f4 d6 21 d6 3c 76 41 5d |.83{......!.o.|" +"2019-09-24 00:25:35.716 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f76 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.716 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f77 Exiting" +"2019-09-24 00:25:35.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f78 Exiting" +"2019-09-24 00:25:35.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f7a Exiting" +"2019-09-24 00:25:35.716 UTC [gossip.gossip] handleMessage -> DEBU 1f7b Exiting" +"2019-09-24 00:25:35.717 UTC [gossip.gossip] handleMessage -> DEBU 1f7c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.717 UTC [gossip.gossip] handleMessage -> DEBU 1f7d Exiting" +"2019-09-24 00:25:35.717 UTC [gossip.gossip] handleMessage -> DEBU 1f7e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f7f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.717 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f80 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:35.717 UTC [gossip.comm] func1 -> DEBU 1f81 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.717 UTC [msp.identity] Verify -> DEBU 1f82 Verify: digest = 00000000 9a b8 da f6 4c 00 02 95 d4 7c 3e de 1c df a7 ec |....L....|>.....| +00000010 ec 9c b3 c9 8f a4 b1 cd 34 d2 5c 2b 8f 71 1c ee |........4.\+.q..|" +"2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f83 Obtaining identity" +"2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f84 Obtaining identity" +"2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f85 Obtaining identity" +"2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f86 Obtaining identity" +"2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f87 Obtaining identity" +"2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f88 Obtaining identity" +"2019-09-24 00:25:35.725 UTC [gossip.comm] Send -> DEBU 1f89 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f8a Obtaining identity" +"2019-09-24 00:25:35.725 UTC [msp] DeserializeIdentity -> DEBU 1f8b Obtaining identity" +"2019-09-24 00:25:35.726 UTC [gossip.comm] Send -> DEBU 1f8c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:35.726 UTC [gossip.comm] sendToEndpoint -> DEBU 1f8d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.726 UTC [gossip.comm] sendToEndpoint -> DEBU 1f8e Exiting" +"2019-09-24 00:25:35.726 UTC [gossip.comm] sendToEndpoint -> DEBU 1f8f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.726 UTC [gossip.comm] sendToEndpoint -> DEBU 1f90 Exiting" +"2019-09-24 00:25:35.726 UTC [gossip.comm] func1 -> DEBU 1f91 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.717 UTC [msp.identity] Verify -> DEBU 1f92 Verify: sig = 00000000 30 44 02 20 20 95 c3 47 47 f6 78 51 e0 09 42 8a |0D. ..GG.xQ..B.| +00000010 c2 99 c5 03 a0 1e d7 b0 fb af 63 ea 35 15 4d 6f |..........c.5.Mo| +00000020 8c f1 eb 60 02 20 41 75 4d 43 14 6f 73 60 68 69 |...`. AuMC.os`hi| +00000030 56 1d 3c b2 9a 10 80 69 a9 ff 34 d6 c9 9c a7 5e |V.<....i..4....^| +00000040 19 4d c9 d8 13 8d |.M....|" +"2019-09-24 00:25:35.727 UTC [msp.identity] Verify -> DEBU 1f93 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:35.727 UTC [msp.identity] Verify -> DEBU 1f94 Verify: sig = 00000000 30 45 02 21 00 99 4f b8 11 21 56 4a 59 69 2f f6 |0E.!..O..!VJYi/.| +00000010 86 84 a6 71 1b 45 3b bf d6 5b fb 3f a5 b8 83 42 |...q.E;..[.?...B| +00000020 28 1e 85 6d ed 02 20 72 26 9f 7a 92 ba c8 29 31 |(..m.. r&.z...)1| +00000030 31 c8 bb d6 fd 91 1f 6c 53 96 b7 75 bf b7 e8 72 |1......lS..u...r| +00000040 24 bb ff 19 11 73 5b |$....s[|" +"2019-09-24 00:25:35.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f95 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:35.727 UTC [gossip.discovery] isSentByMe -> DEBU 1f96 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:35.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f97 Exiting" +"2019-09-24 00:25:35.727 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f98 Exiting" +"2019-09-24 00:25:35.727 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f99 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:35.727 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f9a Exiting" +"2019-09-24 00:25:35.727 UTC [gossip.gossip] handleMessage -> DEBU 1f9b Exiting" +"2019-09-24 00:25:35.727 UTC [gossip.gossip] handleMessage -> DEBU 1f9c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.728 UTC [gossip.pull] HandleMessage -> DEBU 1f9d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.728 UTC [gossip.gossip] handleMessage -> DEBU 1f9e Exiting" +"2019-09-24 00:25:35.728 UTC [gossip.gossip] handleMessage -> DEBU 1f9f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.728 UTC [gossip.pull] HandleMessage -> DEBU 1fa0 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.728 UTC [gossip.gossip] handleMessage -> DEBU 1fa1 Exiting" +"2019-09-24 00:25:35.728 UTC [gossip.gossip] handleMessage -> DEBU 1fa2 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.728 UTC [gossip.pull] HandleMessage -> DEBU 1fa3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.728 UTC [gossip.gossip] handleMessage -> DEBU 1fa4 Exiting" +"2019-09-24 00:25:35.970 UTC [gossip.gossip] handleMessage -> DEBU 1fa5 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.970 UTC [gossip.pull] HandleMessage -> DEBU 1fa6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1fa7 Obtaining identity" +"2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1fa8 Obtaining identity" +"2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1fa9 Obtaining identity" +"2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1faa Obtaining identity" +"2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1fab Obtaining identity" +"2019-09-24 00:25:35.970 UTC [msp] DeserializeIdentity -> DEBU 1fac Obtaining identity" +"2019-09-24 00:25:35.974 UTC [gossip.pull] SendDigest -> DEBU 1fad Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:35.974 UTC [gossip.gossip] handleMessage -> DEBU 1fae Exiting" +"2019-09-24 00:25:35.987 UTC [gossip.gossip] handleMessage -> DEBU 1faf Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.987 UTC [gossip.gossip] handleMessage -> DEBU 1fb0 Exiting" +"2019-09-24 00:25:35.987 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fb1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:35.988 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fb2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:35.988 UTC [msp] DeserializeIdentity -> DEBU 1fb3 Obtaining identity" +"2019-09-24 00:25:35.988 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fb4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:35.988 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:35.988 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fb6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:35.988 UTC [policies] Evaluate -> DEBU 1fb7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:35.988 UTC [policies] Evaluate -> DEBU 1fb8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:35.989 UTC [policies] Evaluate -> DEBU 1fb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:35.989 UTC [cauthdsl] func1 -> DEBU 1fba 0xc003632690 gate 1569284735989073600 evaluation starts" +"2019-09-24 00:25:35.989 UTC [cauthdsl] func2 -> DEBU 1fbb 0xc003632690 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:35.989 UTC [cauthdsl] func2 -> DEBU 1fbc 0xc003632690 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:35.989 UTC [cauthdsl] func2 -> DEBU 1fbd 0xc003632690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:35.989 UTC [cauthdsl] func2 -> DEBU 1fbe 0xc003632690 principal evaluation fails" +"2019-09-24 00:25:35.989 UTC [cauthdsl] func1 -> DEBU 1fbf 0xc003632690 gate 1569284735989073600 evaluation fails" +"2019-09-24 00:25:35.989 UTC [policies] Evaluate -> DEBU 1fc0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:35.989 UTC [policies] Evaluate -> DEBU 1fc1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:35.989 UTC [policies] Evaluate -> DEBU 1fc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:35.989 UTC [cauthdsl] func1 -> DEBU 1fc3 0xc003632ed0 gate 1569284735989630800 evaluation starts" +"2019-09-24 00:25:35.989 UTC [cauthdsl] func2 -> DEBU 1fc4 0xc003632ed0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.006 UTC [cauthdsl] func2 -> DEBU 1fc5 0xc003632ed0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.006 UTC [cauthdsl] func2 -> DEBU 1fc6 0xc003632ed0 principal matched by identity 0" +"2019-09-24 00:25:36.006 UTC [msp.identity] Verify -> DEBU 1fc7 Verify: digest = 00000000 95 9f cd d9 bd 4d 99 70 74 38 c3 1a b8 df 6e 71 |.....M.pt8....nq| +00000010 87 2f 53 f2 bc c9 95 03 5d d7 ee e7 05 d4 04 6d |./S.....]......m|" +"2019-09-24 00:25:36.006 UTC [msp.identity] Verify -> DEBU 1fc8 Verify: sig = 00000000 30 44 02 20 35 a4 ee 32 e9 bb 42 2f e3 d3 5b e3 |0D. 5..2..B/..[.| +00000010 31 16 a1 5b 3c b0 31 1a fe df 0d 08 64 ff b7 cf |1..[<.1.....d...| +00000020 1b f8 ce bb 02 20 31 58 97 2e 9f d3 30 a3 4e 99 |..... 1X....0.N.| +00000030 b6 19 96 73 4c 98 df 11 e2 fd ab 25 e5 8e 00 57 |...sL......%...W| +00000040 99 0e 80 0a e3 ac |......|" +"2019-09-24 00:25:36.007 UTC [cauthdsl] func2 -> DEBU 1fc9 0xc003632ed0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:36.007 UTC [cauthdsl] func1 -> DEBU 1fca 0xc003632ed0 gate 1569284735989630800 evaluation succeeds" +"2019-09-24 00:25:36.007 UTC [policies] Evaluate -> DEBU 1fcb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.007 UTC [policies] Evaluate -> DEBU 1fcc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.007 UTC [policies] Evaluate -> DEBU 1fcd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:36.007 UTC [policies] Evaluate -> DEBU 1fce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:36.007 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fcf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:36.007 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fd0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:36.007 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fd1 updating membership: timestamp: " +"2019-09-24 00:25:36.008 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fd2 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:36.008 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fd3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:36.008 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fd4 Exiting" +"2019-09-24 00:25:36.008 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fd5 Exiting" +"2019-09-24 00:25:36.008 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fd6 Exiting" +"2019-09-24 00:25:36.008 UTC [gossip.discovery] sendMemResponse -> DEBU 1fd7 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:36.008 UTC [msp] DeserializeIdentity -> DEBU 1fd8 Obtaining identity" +"2019-09-24 00:25:36.017 UTC [msp] DeserializeIdentity -> DEBU 1fd9 Obtaining identity" +"2019-09-24 00:25:36.017 UTC [msp] DeserializeIdentity -> DEBU 1fda Obtaining identity" +"2019-09-24 00:25:36.017 UTC [gossip.comm] Send -> DEBU 1fdb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:36.021 UTC [gossip.comm] sendToEndpoint -> DEBU 1fdc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.021 UTC [gossip.comm] sendToEndpoint -> DEBU 1fdd Exiting" +"2019-09-24 00:25:36.021 UTC [gossip.discovery] sendMemResponse -> DEBU 1fde Exiting, replying with alive:\317\t\317\343\232?\235.\301[f;B\261" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" > alive: " +"2019-09-24 00:25:36.207 UTC [msp] DeserializeIdentity -> DEBU 1fdf Obtaining identity" +"2019-09-24 00:25:36.207 UTC [msp] DeserializeIdentity -> DEBU 1fe0 Obtaining identity" +"2019-09-24 00:25:36.207 UTC [gossip.comm] Send -> DEBU 1fe1 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:25:36.207 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.207 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe3 Exiting" +"2019-09-24 00:25:36.208 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.208 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe5 Exiting" +"2019-09-24 00:25:36.208 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.208 UTC [gossip.comm] sendToEndpoint -> DEBU 1fe7 Exiting" +"2019-09-24 00:25:36.211 UTC [gossip.comm] func1 -> DEBU 1fe8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.211 UTC [gossip.gossip] handleMessage -> DEBU 1fe9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.212 UTC [msp.identity] Verify -> DEBU 1fea Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:36.212 UTC [msp.identity] Verify -> DEBU 1feb Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:36.212 UTC [msp.identity] Verify -> DEBU 1fec Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:36.212 UTC [msp.identity] Verify -> DEBU 1fed Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:36.213 UTC [msp] DeserializeIdentity -> DEBU 1fee Obtaining identity" +"2019-09-24 00:25:36.213 UTC [msp] DeserializeIdentity -> DEBU 1fef Obtaining identity" +"2019-09-24 00:25:36.214 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ff0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:36.214 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ff1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.214 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ff2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ff3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ff4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ff5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:36.214 UTC [cauthdsl] func1 -> DEBU 1ff6 0xc0040bc780 gate 1569284736214592000 evaluation starts" +"2019-09-24 00:25:36.214 UTC [cauthdsl] func2 -> DEBU 1ff7 0xc0040bc780 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.214 UTC [cauthdsl] func2 -> DEBU 1ff8 0xc0040bc780 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.214 UTC [cauthdsl] func2 -> DEBU 1ff9 0xc0040bc780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:36.214 UTC [cauthdsl] func2 -> DEBU 1ffa 0xc0040bc780 principal evaluation fails" +"2019-09-24 00:25:36.214 UTC [cauthdsl] func1 -> DEBU 1ffb 0xc0040bc780 gate 1569284736214592000 evaluation fails" +"2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ffc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ffd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.214 UTC [policies] Evaluate -> DEBU 1ffe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:36.215 UTC [cauthdsl] func1 -> DEBU 1fff 0xc0040bcfc0 gate 1569284736215023200 evaluation starts" +"2019-09-24 00:25:36.215 UTC [cauthdsl] func2 -> DEBU 2000 0xc0040bcfc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.215 UTC [cauthdsl] func2 -> DEBU 2001 0xc0040bcfc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.215 UTC [cauthdsl] func2 -> DEBU 2002 0xc0040bcfc0 principal matched by identity 0" +"2019-09-24 00:25:36.215 UTC [msp.identity] Verify -> DEBU 2003 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:36.215 UTC [msp.identity] Verify -> DEBU 2004 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:36.215 UTC [cauthdsl] func2 -> DEBU 2005 0xc0040bcfc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:36.215 UTC [cauthdsl] func1 -> DEBU 2006 0xc0040bcfc0 gate 1569284736215023200 evaluation succeeds" +"2019-09-24 00:25:36.215 UTC [policies] Evaluate -> DEBU 2007 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.215 UTC [policies] Evaluate -> DEBU 2008 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.215 UTC [policies] Evaluate -> DEBU 2009 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:36.215 UTC [policies] Evaluate -> DEBU 200a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:36.215 UTC [msp] DeserializeIdentity -> DEBU 200b Obtaining identity" +"2019-09-24 00:25:36.216 UTC [msp] DeserializeIdentity -> DEBU 200c Obtaining identity" +"2019-09-24 00:25:36.216 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 200d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:36.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 200e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 200f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.216 UTC [policies] Evaluate -> DEBU 2010 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:36.216 UTC [policies] Evaluate -> DEBU 2011 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:36.217 UTC [policies] Evaluate -> DEBU 2012 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:36.217 UTC [cauthdsl] func1 -> DEBU 2013 0xc0040ce790 gate 1569284736217309600 evaluation starts" +"2019-09-24 00:25:36.217 UTC [cauthdsl] func2 -> DEBU 2014 0xc0040ce790 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.217 UTC [cauthdsl] func2 -> DEBU 2015 0xc0040ce790 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.217 UTC [cauthdsl] func2 -> DEBU 2016 0xc0040ce790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:36.217 UTC [cauthdsl] func2 -> DEBU 2017 0xc0040ce790 principal evaluation fails" +"2019-09-24 00:25:36.217 UTC [cauthdsl] func1 -> DEBU 2018 0xc0040ce790 gate 1569284736217309600 evaluation fails" +"2019-09-24 00:25:36.231 UTC [policies] Evaluate -> DEBU 2019 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.232 UTC [policies] Evaluate -> DEBU 201a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.232 UTC [policies] Evaluate -> DEBU 201b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:36.232 UTC [cauthdsl] func1 -> DEBU 201c 0xc0040cefd0 gate 1569284736232174000 evaluation starts" +"2019-09-24 00:25:36.232 UTC [cauthdsl] func2 -> DEBU 201d 0xc0040cefd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.232 UTC [cauthdsl] func2 -> DEBU 201e 0xc0040cefd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.232 UTC [cauthdsl] func2 -> DEBU 201f 0xc0040cefd0 principal matched by identity 0" +"2019-09-24 00:25:36.232 UTC [msp.identity] Verify -> DEBU 2020 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:36.232 UTC [msp.identity] Verify -> DEBU 2021 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:36.233 UTC [cauthdsl] func2 -> DEBU 2022 0xc0040cefd0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:36.233 UTC [cauthdsl] func1 -> DEBU 2023 0xc0040cefd0 gate 1569284736232174000 evaluation succeeds" +"2019-09-24 00:25:36.233 UTC [policies] Evaluate -> DEBU 2024 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.233 UTC [policies] Evaluate -> DEBU 2025 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.233 UTC [policies] Evaluate -> DEBU 2026 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:36.233 UTC [policies] Evaluate -> DEBU 2027 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:36.233 UTC [gossip.gossip] handleMessage -> DEBU 2028 Exiting" +"2019-09-24 00:25:36.234 UTC [gossip.gossip] handleMessage -> DEBU 2029 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.242 UTC [msp] DeserializeIdentity -> DEBU 202a Obtaining identity" +"2019-09-24 00:25:36.242 UTC [msp] DeserializeIdentity -> DEBU 202b Obtaining identity" +"2019-09-24 00:25:36.243 UTC [msp] DeserializeIdentity -> DEBU 202c Obtaining identity" +"2019-09-24 00:25:36.243 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 202d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:36.243 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 202e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.243 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 202f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.243 UTC [policies] Evaluate -> DEBU 2030 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:36.243 UTC [policies] Evaluate -> DEBU 2031 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:36.244 UTC [policies] Evaluate -> DEBU 2032 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:36.244 UTC [cauthdsl] func1 -> DEBU 2033 0xc0040e0b10 gate 1569284736244190800 evaluation starts" +"2019-09-24 00:25:36.244 UTC [cauthdsl] func2 -> DEBU 2034 0xc0040e0b10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.251 UTC [gossip.comm] func1 -> DEBU 2035 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.249 UTC [cauthdsl] func2 -> DEBU 2036 0xc0040e0b10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.282 UTC [cauthdsl] func2 -> DEBU 2037 0xc0040e0b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:36.283 UTC [cauthdsl] func2 -> DEBU 2038 0xc0040e0b10 principal evaluation fails" +"2019-09-24 00:25:36.283 UTC [cauthdsl] func1 -> DEBU 2039 0xc0040e0b10 gate 1569284736244190800 evaluation fails" +"2019-09-24 00:25:36.283 UTC [policies] Evaluate -> DEBU 203a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.284 UTC [policies] Evaluate -> DEBU 203b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.284 UTC [policies] Evaluate -> DEBU 203c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:36.284 UTC [cauthdsl] func1 -> DEBU 203d 0xc0040e1350 gate 1569284736284765100 evaluation starts" +"2019-09-24 00:25:36.284 UTC [cauthdsl] func2 -> DEBU 203e 0xc0040e1350 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.286 UTC [msp] DeserializeIdentity -> DEBU 203f Obtaining identity" +"2019-09-24 00:25:36.286 UTC [msp] DeserializeIdentity -> DEBU 2040 Obtaining identity" +"2019-09-24 00:25:36.286 UTC [gossip.pull] Hello -> DEBU 2041 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:36.287 UTC [msp] DeserializeIdentity -> DEBU 2042 Obtaining identity" +"2019-09-24 00:25:36.287 UTC [msp] DeserializeIdentity -> DEBU 2043 Obtaining identity" +"2019-09-24 00:25:36.287 UTC [gossip.comm] Send -> DEBU 2044 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:36.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2045 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2046 Exiting" +"2019-09-24 00:25:36.289 UTC [gossip.comm] func1 -> DEBU 2047 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.285 UTC [cauthdsl] func2 -> DEBU 2048 0xc0040e1350 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.290 UTC [cauthdsl] func2 -> DEBU 2049 0xc0040e1350 principal matched by identity 0" +"2019-09-24 00:25:36.292 UTC [msp.identity] Verify -> DEBU 204a Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:36.292 UTC [msp.identity] Verify -> DEBU 204b Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:36.292 UTC [cauthdsl] func2 -> DEBU 204c 0xc0040e1350 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:36.293 UTC [cauthdsl] func1 -> DEBU 204d 0xc0040e1350 gate 1569284736284765100 evaluation succeeds" +"2019-09-24 00:25:36.293 UTC [policies] Evaluate -> DEBU 204e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.293 UTC [policies] Evaluate -> DEBU 204f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.298 UTC [policies] Evaluate -> DEBU 2050 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:36.298 UTC [policies] Evaluate -> DEBU 2051 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:36.299 UTC [msp.identity] Verify -> DEBU 2052 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:36.299 UTC [msp.identity] Verify -> DEBU 2053 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:36.300 UTC [msp.identity] Verify -> DEBU 2054 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:36.300 UTC [msp.identity] Verify -> DEBU 2055 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:36.330 UTC [msp] DeserializeIdentity -> DEBU 2056 Obtaining identity" +"2019-09-24 00:25:36.330 UTC [msp] DeserializeIdentity -> DEBU 2057 Obtaining identity" +"2019-09-24 00:25:36.330 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2058 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:36.330 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2059 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.330 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 205a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.330 UTC [policies] Evaluate -> DEBU 205b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:36.330 UTC [policies] Evaluate -> DEBU 205c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:36.330 UTC [policies] Evaluate -> DEBU 205d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:36.331 UTC [cauthdsl] func1 -> DEBU 205e 0xc004103960 gate 1569284736330994700 evaluation starts" +"2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 205f 0xc004103960 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 2060 0xc004103960 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 2061 0xc004103960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 2062 0xc004103960 principal evaluation fails" +"2019-09-24 00:25:36.331 UTC [cauthdsl] func1 -> DEBU 2063 0xc004103960 gate 1569284736330994700 evaluation fails" +"2019-09-24 00:25:36.331 UTC [policies] Evaluate -> DEBU 2064 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.331 UTC [policies] Evaluate -> DEBU 2065 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.331 UTC [policies] Evaluate -> DEBU 2066 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:36.331 UTC [cauthdsl] func1 -> DEBU 2067 0xc0041221a0 gate 1569284736331593700 evaluation starts" +"2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 2068 0xc0041221a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 2069 0xc0041221a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.331 UTC [cauthdsl] func2 -> DEBU 206a 0xc0041221a0 principal matched by identity 0" +"2019-09-24 00:25:36.331 UTC [msp.identity] Verify -> DEBU 206b Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:36.331 UTC [msp.identity] Verify -> DEBU 206c Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:36.332 UTC [cauthdsl] func2 -> DEBU 206d 0xc0041221a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:36.332 UTC [cauthdsl] func1 -> DEBU 206e 0xc0041221a0 gate 1569284736331593700 evaluation succeeds" +"2019-09-24 00:25:36.332 UTC [policies] Evaluate -> DEBU 206f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.332 UTC [policies] Evaluate -> DEBU 2070 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.332 UTC [policies] Evaluate -> DEBU 2071 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:36.332 UTC [policies] Evaluate -> DEBU 2072 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:36.332 UTC [gossip.gossip] handleMessage -> DEBU 2073 Exiting" +"2019-09-24 00:25:36.332 UTC [gossip.gossip] handleMessage -> DEBU 2074 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.332 UTC [msp] DeserializeIdentity -> DEBU 2075 Obtaining identity" +"2019-09-24 00:25:36.332 UTC [msp] DeserializeIdentity -> DEBU 2076 Obtaining identity" +"2019-09-24 00:25:36.332 UTC [msp] DeserializeIdentity -> DEBU 2077 Obtaining identity" +"2019-09-24 00:25:36.333 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2078 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:36.333 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2079 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.333 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 207a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.333 UTC [policies] Evaluate -> DEBU 207b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:36.334 UTC [policies] Evaluate -> DEBU 207c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:36.334 UTC [policies] Evaluate -> DEBU 207d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:36.334 UTC [cauthdsl] func1 -> DEBU 207e 0xc004123cb0 gate 1569284736334344500 evaluation starts" +"2019-09-24 00:25:36.334 UTC [cauthdsl] func2 -> DEBU 207f 0xc004123cb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.335 UTC [cauthdsl] func2 -> DEBU 2080 0xc004123cb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.335 UTC [cauthdsl] func2 -> DEBU 2081 0xc004123cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:36.336 UTC [cauthdsl] func2 -> DEBU 2082 0xc004123cb0 principal evaluation fails" +"2019-09-24 00:25:36.336 UTC [cauthdsl] func1 -> DEBU 2083 0xc004123cb0 gate 1569284736334344500 evaluation fails" +"2019-09-24 00:25:36.336 UTC [policies] Evaluate -> DEBU 2084 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.336 UTC [policies] Evaluate -> DEBU 2085 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.336 UTC [policies] Evaluate -> DEBU 2086 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:36.336 UTC [cauthdsl] func1 -> DEBU 2087 0xc0041364f0 gate 1569284736336635800 evaluation starts" +"2019-09-24 00:25:36.336 UTC [cauthdsl] func2 -> DEBU 2088 0xc0041364f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.336 UTC [cauthdsl] func2 -> DEBU 2089 0xc0041364f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.337 UTC [cauthdsl] func2 -> DEBU 208a 0xc0041364f0 principal matched by identity 0" +"2019-09-24 00:25:36.337 UTC [msp.identity] Verify -> DEBU 208b Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:36.337 UTC [msp.identity] Verify -> DEBU 208c Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:36.337 UTC [cauthdsl] func2 -> DEBU 208d 0xc0041364f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:36.337 UTC [cauthdsl] func1 -> DEBU 208e 0xc0041364f0 gate 1569284736336635800 evaluation succeeds" +"2019-09-24 00:25:36.337 UTC [policies] Evaluate -> DEBU 208f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.337 UTC [policies] Evaluate -> DEBU 2090 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.337 UTC [policies] Evaluate -> DEBU 2091 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:36.338 UTC [policies] Evaluate -> DEBU 2092 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:36.338 UTC [msp.identity] Verify -> DEBU 2093 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:36.338 UTC [msp.identity] Verify -> DEBU 2094 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:36.338 UTC [msp] DeserializeIdentity -> DEBU 2095 Obtaining identity" +"2019-09-24 00:25:36.338 UTC [msp] DeserializeIdentity -> DEBU 2096 Obtaining identity" +"2019-09-24 00:25:36.339 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2097 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:36.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2098 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2099 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.340 UTC [policies] Evaluate -> DEBU 209a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:36.340 UTC [policies] Evaluate -> DEBU 209b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:36.340 UTC [policies] Evaluate -> DEBU 209c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:36.340 UTC [cauthdsl] func1 -> DEBU 209d 0xc00414a3e0 gate 1569284736340424100 evaluation starts" +"2019-09-24 00:25:36.340 UTC [cauthdsl] func2 -> DEBU 209e 0xc00414a3e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.340 UTC [cauthdsl] func2 -> DEBU 209f 0xc00414a3e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.382 UTC [cauthdsl] func2 -> DEBU 20a0 0xc00414a3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:36.382 UTC [cauthdsl] func2 -> DEBU 20a1 0xc00414a3e0 principal evaluation fails" +"2019-09-24 00:25:36.382 UTC [cauthdsl] func1 -> DEBU 20a2 0xc00414a3e0 gate 1569284736340424100 evaluation fails" +"2019-09-24 00:25:36.382 UTC [policies] Evaluate -> DEBU 20a3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.382 UTC [policies] Evaluate -> DEBU 20a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.382 UTC [policies] Evaluate -> DEBU 20a5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:36.382 UTC [cauthdsl] func1 -> DEBU 20a6 0xc00414ac20 gate 1569284736382875800 evaluation starts" +"2019-09-24 00:25:36.382 UTC [cauthdsl] func2 -> DEBU 20a7 0xc00414ac20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.384 UTC [cauthdsl] func2 -> DEBU 20a8 0xc00414ac20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.384 UTC [cauthdsl] func2 -> DEBU 20a9 0xc00414ac20 principal matched by identity 0" +"2019-09-24 00:25:36.385 UTC [msp.identity] Verify -> DEBU 20aa Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:36.385 UTC [msp.identity] Verify -> DEBU 20ab Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:36.385 UTC [cauthdsl] func2 -> DEBU 20ac 0xc00414ac20 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:36.385 UTC [cauthdsl] func1 -> DEBU 20ad 0xc00414ac20 gate 1569284736382875800 evaluation succeeds" +"2019-09-24 00:25:36.386 UTC [policies] Evaluate -> DEBU 20ae Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.386 UTC [policies] Evaluate -> DEBU 20af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.386 UTC [policies] Evaluate -> DEBU 20b0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:36.386 UTC [policies] Evaluate -> DEBU 20b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:36.410 UTC [msp.identity] Verify -> DEBU 20b2 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:36.411 UTC [msp.identity] Verify -> DEBU 20b3 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:36.411 UTC [gossip.gossip] handleMessage -> DEBU 20b4 Exiting" +"2019-09-24 00:25:36.411 UTC [gossip.gossip] handleMessage -> DEBU 20b5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.411 UTC [gossip.pull] HandleMessage -> DEBU 20b6 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.411 UTC [gossip.gossip] handleMessage -> DEBU 20b7 Exiting" +"2019-09-24 00:25:36.695 UTC [gossip.comm] func1 -> DEBU 20b8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.696 UTC [gossip.gossip] handleMessage -> DEBU 20b9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.696 UTC [msp] DeserializeIdentity -> DEBU 20ba Obtaining identity" +"2019-09-24 00:25:36.697 UTC [msp] DeserializeIdentity -> DEBU 20bb Obtaining identity" +"2019-09-24 00:25:36.697 UTC [gossip.gossip] handleMessage -> DEBU 20bc Exiting" +"2019-09-24 00:25:36.719 UTC [gossip.comm] func1 -> DEBU 20bd Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.719 UTC [gossip.gossip] handleMessage -> DEBU 20be Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.719 UTC [gossip.gossip] handleMessage -> DEBU 20bf Exiting" +"2019-09-24 00:25:36.720 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20c0 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.720 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20c1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:36.720 UTC [msp] DeserializeIdentity -> DEBU 20c2 Obtaining identity" +"2019-09-24 00:25:36.720 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:36.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20c4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20c5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:36.720 UTC [cauthdsl] func1 -> DEBU 20c9 0xc0041685c0 gate 1569284736720471300 evaluation starts" +"2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20ca 0xc0041685c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20cb 0xc0041685c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20cc 0xc0041685c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20cd 0xc0041685c0 principal evaluation fails" +"2019-09-24 00:25:36.720 UTC [cauthdsl] func1 -> DEBU 20ce 0xc0041685c0 gate 1569284736720471300 evaluation fails" +"2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20cf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:36.720 UTC [policies] Evaluate -> DEBU 20d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:36.720 UTC [cauthdsl] func1 -> DEBU 20d2 0xc004168e00 gate 1569284736720818700 evaluation starts" +"2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20d3 0xc004168e00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20d4 0xc004168e00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:36.720 UTC [cauthdsl] func2 -> DEBU 20d5 0xc004168e00 principal matched by identity 0" +"2019-09-24 00:25:36.720 UTC [msp.identity] Verify -> DEBU 20d6 Verify: digest = 00000000 4a db 2c 8d 8d 21 5a 31 21 54 d6 e0 cd 22 a0 e9 |J.,..!Z1!T..."..| +00000010 e9 a3 bc 63 00 c8 a4 c6 d8 d9 8c b9 72 9b 7f e6 |...c........r...|" +"2019-09-24 00:25:36.721 UTC [msp.identity] Verify -> DEBU 20d7 Verify: sig = 00000000 30 44 02 20 68 f7 4e 05 c5 b9 75 32 63 23 6c d9 |0D. h.N...u2c#l.| +00000010 ce 62 c3 9a 2c 3a 55 f8 7e 79 61 c3 6e a6 8f c1 |.b..,:U.~ya.n...| +00000020 29 8f c2 62 02 20 40 33 d5 7d b2 ac 8e c2 04 95 |)..b. @3.}......| +00000030 9b 50 f0 c9 be 6e bd 53 c7 d4 22 2d ab d4 5e 7b |.P...n.S.."-..^{| +00000040 7d 96 a6 65 55 70 |}..eUp|" +"2019-09-24 00:25:36.721 UTC [cauthdsl] func2 -> DEBU 20d8 0xc004168e00 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:36.726 UTC [cauthdsl] func1 -> DEBU 20d9 0xc004168e00 gate 1569284736720818700 evaluation succeeds" +"2019-09-24 00:25:36.726 UTC [policies] Evaluate -> DEBU 20da Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.726 UTC [policies] Evaluate -> DEBU 20db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:36.726 UTC [policies] Evaluate -> DEBU 20dc Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:36.727 UTC [policies] Evaluate -> DEBU 20dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:36.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 20de Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:36.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 20df Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:36.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e0 updating membership: timestamp: " +"2019-09-24 00:25:36.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e1 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:36.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:36.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 20e3 Exiting" +"2019-09-24 00:25:36.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 20e4 Exiting" +"2019-09-24 00:25:36.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20e5 Exiting" +"2019-09-24 00:25:36.728 UTC [gossip.discovery] sendMemResponse -> DEBU 20e6 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:36.748 UTC [gossip.comm] func1 -> DEBU 20e7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.749 UTC [gossip.gossip] handleMessage -> DEBU 20e8 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.749 UTC [gossip.pull] HandleMessage -> DEBU 20e9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.749 UTC [msp] DeserializeIdentity -> DEBU 20ea Obtaining identity" +"2019-09-24 00:25:36.749 UTC [msp] DeserializeIdentity -> DEBU 20eb Obtaining identity" +"2019-09-24 00:25:36.749 UTC [msp] DeserializeIdentity -> DEBU 20ec Obtaining identity" +"2019-09-24 00:25:36.749 UTC [msp] DeserializeIdentity -> DEBU 20ed Obtaining identity" +"2019-09-24 00:25:36.749 UTC [msp] DeserializeIdentity -> DEBU 20ee Obtaining identity" +"2019-09-24 00:25:36.750 UTC [msp] DeserializeIdentity -> DEBU 20ef Obtaining identity" +"2019-09-24 00:25:36.750 UTC [gossip.pull] SendDigest -> DEBU 20f0 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:36.750 UTC [gossip.gossip] handleMessage -> DEBU 20f1 Exiting" +"2019-09-24 00:25:36.768 UTC [msp] DeserializeIdentity -> DEBU 20f2 Obtaining identity" +"2019-09-24 00:25:36.769 UTC [msp] DeserializeIdentity -> DEBU 20f3 Obtaining identity" +"2019-09-24 00:25:36.769 UTC [msp] DeserializeIdentity -> DEBU 20f4 Obtaining identity" +"2019-09-24 00:25:36.770 UTC [gossip.comm] Send -> DEBU 20f5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:36.776 UTC [gossip.discovery] sendMemResponse -> DEBU 20f6 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" > alive: alive: " +"2019-09-24 00:25:36.776 UTC [gossip.comm] sendToEndpoint -> DEBU 20f7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.776 UTC [gossip.comm] sendToEndpoint -> DEBU 20f8 Exiting" +"2019-09-24 00:25:36.791 UTC [gossip.comm] func1 -> DEBU 20f9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.791 UTC [gossip.gossip] handleMessage -> DEBU 20fa Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.792 UTC [gossip.pull] HandleMessage -> DEBU 20fb GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:36.792 UTC [gossip.pull] SendDigest -> DEBU 20fc Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:36.792 UTC [gossip.gossip] handleMessage -> DEBU 20fd Exiting" +"2019-09-24 00:25:37.178 UTC [gossip.gossip] handleMessage -> DEBU 20fe Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.178 UTC [msp] DeserializeIdentity -> DEBU 20ff Obtaining identity" +"2019-09-24 00:25:37.178 UTC [msp] DeserializeIdentity -> DEBU 2100 Obtaining identity" +"2019-09-24 00:25:37.178 UTC [msp] DeserializeIdentity -> DEBU 2101 Obtaining identity" +"2019-09-24 00:25:37.178 UTC [gossip.gossip] handleMessage -> DEBU 2102 Exiting" +"2019-09-24 00:25:37.283 UTC [gossip.election] waitForInterrupt -> DEBU 2103 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:37.283 UTC [gossip.election] IsLeader -> DEBU 2104 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:25:37.284 UTC [msp] GetDefaultSigningIdentity -> DEBU 2105 Obtaining default signing identity" +"2019-09-24 00:25:37.285 UTC [msp.identity] Sign -> DEBU 2106 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510091801 " +"2019-09-24 00:25:37.285 UTC [msp.identity] Sign -> DEBU 2107 Sign: digest: 7F5E5A479F4AFE2FB2B8DEC53B487966A12B58A30585EACA733F8C0C74E99C78 " +"2019-09-24 00:25:37.286 UTC [gossip.election] waitForInterrupt -> DEBU 2108 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:25:37.305 UTC [msp] DeserializeIdentity -> DEBU 2109 Obtaining identity" +"2019-09-24 00:25:37.322 UTC [msp] DeserializeIdentity -> DEBU 210a Obtaining identity" +"2019-09-24 00:25:37.322 UTC [msp] DeserializeIdentity -> DEBU 210b Obtaining identity" +"2019-09-24 00:25:37.322 UTC [msp] DeserializeIdentity -> DEBU 210c Obtaining identity" +"2019-09-24 00:25:37.322 UTC [gossip.comm] Send -> DEBU 210d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:37.322 UTC [msp] DeserializeIdentity -> DEBU 210e Obtaining identity" +"2019-09-24 00:25:37.323 UTC [msp] DeserializeIdentity -> DEBU 210f Obtaining identity" +"2019-09-24 00:25:37.360 UTC [gossip.comm] sendToEndpoint -> DEBU 2110 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:25:37.361 UTC [gossip.comm] sendToEndpoint -> DEBU 2111 Exiting" +"2019-09-24 00:25:37.458 UTC [gossip.comm] func1 -> DEBU 2112 Got message: GossipMessage: nonce:15690997039843866645 tag:EMPTY mem_req:\211\262\222\321\271\234\306f){\276\343w\251\322\221\305\030\014\002 si\375\000Q_ \373\357\303**\234fTw\334\373\316_\332\023\300\252:\263\375\267\271\343\rU" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.458 UTC [gossip.gossip] handleMessage -> DEBU 2113 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:15690997039843866645 tag:EMPTY mem_req:\211\262\222\321\271\234\306f){\276\343w\251\322\221\305\030\014\002 si\375\000Q_ \373\357\303**\234fTw\334\373\316_\332\023\300\252:\263\375\267\271\343\rU" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.458 UTC [gossip.gossip] handleMessage -> DEBU 2114 Exiting" +"2019-09-24 00:25:37.458 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2115 Got message: GossipMessage: nonce:15690997039843866645 tag:EMPTY mem_req:\211\262\222\321\271\234\306f){\276\343w\251\322\221\305\030\014\002 si\375\000Q_ \373\357\303**\234fTw\334\373\316_\332\023\300\252:\263\375\267\271\343\rU" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.458 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2116 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:37.458 UTC [msp] DeserializeIdentity -> DEBU 2117 Obtaining identity" +"2019-09-24 00:25:37.459 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2118 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:37.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2119 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:37.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 211a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:37.459 UTC [policies] Evaluate -> DEBU 211b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:37.459 UTC [policies] Evaluate -> DEBU 211c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:37.459 UTC [policies] Evaluate -> DEBU 211d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:37.459 UTC [cauthdsl] func1 -> DEBU 211e 0xc0041b90d0 gate 1569284737459715900 evaluation starts" +"2019-09-24 00:25:37.459 UTC [cauthdsl] func2 -> DEBU 211f 0xc0041b90d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:37.459 UTC [cauthdsl] func2 -> DEBU 2120 0xc0041b90d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:37.459 UTC [cauthdsl] func2 -> DEBU 2121 0xc0041b90d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:37.460 UTC [cauthdsl] func2 -> DEBU 2122 0xc0041b90d0 principal evaluation fails" +"2019-09-24 00:25:37.460 UTC [cauthdsl] func1 -> DEBU 2123 0xc0041b90d0 gate 1569284737459715900 evaluation fails" +"2019-09-24 00:25:37.460 UTC [policies] Evaluate -> DEBU 2124 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:37.460 UTC [policies] Evaluate -> DEBU 2125 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:37.460 UTC [policies] Evaluate -> DEBU 2126 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:37.460 UTC [cauthdsl] func1 -> DEBU 2127 0xc0041b9910 gate 1569284737460561300 evaluation starts" +"2019-09-24 00:25:37.460 UTC [cauthdsl] func2 -> DEBU 2128 0xc0041b9910 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:37.461 UTC [cauthdsl] func2 -> DEBU 2129 0xc0041b9910 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:37.461 UTC [cauthdsl] func2 -> DEBU 212a 0xc0041b9910 principal matched by identity 0" +"2019-09-24 00:25:37.461 UTC [msp.identity] Verify -> DEBU 212b Verify: digest = 00000000 fb 4d ac f6 b3 bc 8e c6 7f ec 13 28 75 1a 58 75 |.M.........(u.Xu| +00000010 02 df ad 05 0f 80 d4 e5 6b a0 7e 38 92 f6 cd 7b |........k.~8...{|" +"2019-09-24 00:25:37.464 UTC [msp.identity] Verify -> DEBU 212c Verify: sig = 00000000 30 44 02 20 35 db 7d cb de 3d 25 35 34 b2 44 13 |0D. 5.}..=%54.D.| +00000010 3e 89 b2 92 d1 b9 9c c6 66 29 7b be e3 77 a9 d2 |>.......f){..w..| +00000020 91 c5 18 0c 02 20 73 69 fd 00 51 5f 20 fb ef c3 |..... si..Q_ ...| +00000030 2a 2a 9c 66 54 77 dc fb ce 5f da 13 c0 aa 3a b3 |**.fTw..._....:.| +00000040 fd b7 b9 e3 0d 55 |.....U|" +"2019-09-24 00:25:37.465 UTC [cauthdsl] func2 -> DEBU 212d 0xc0041b9910 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:37.465 UTC [cauthdsl] func1 -> DEBU 212e 0xc0041b9910 gate 1569284737460561300 evaluation succeeds" +"2019-09-24 00:25:37.465 UTC [policies] Evaluate -> DEBU 212f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:37.465 UTC [policies] Evaluate -> DEBU 2130 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:37.465 UTC [policies] Evaluate -> DEBU 2131 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:37.465 UTC [policies] Evaluate -> DEBU 2132 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:37.465 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2133 Exiting" +"2019-09-24 00:25:37.465 UTC [gossip.discovery] sendMemResponse -> DEBU 2134 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:37.465 UTC [msp] DeserializeIdentity -> DEBU 2135 Obtaining identity" +"2019-09-24 00:25:37.466 UTC [msp] DeserializeIdentity -> DEBU 2136 Obtaining identity" +"2019-09-24 00:25:37.466 UTC [msp] DeserializeIdentity -> DEBU 2137 Obtaining identity" +"2019-09-24 00:25:37.466 UTC [gossip.comm] Send -> DEBU 2138 Entering, sending GossipMessage: Channel: , nonce: 15690997039843866645, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:37.466 UTC [gossip.discovery] sendMemResponse -> DEBU 2139 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020&" signature:"0D\002 4*D\3228\247\274u\271\267Q\013h2\212\361\216\224\2032\251\322\311\311\020k\321\032\033p\231\200\002 7t_\370B@\000\320\210\006\23283{\342\363\335\214\364\326!\326o\276" > alive: alive: alive: " +"2019-09-24 00:25:37.466 UTC [gossip.comm] sendToEndpoint -> DEBU 213a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15690997039843866645, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.467 UTC [gossip.comm] sendToEndpoint -> DEBU 213b Exiting" +"2019-09-24 00:25:37.690 UTC [gossip.comm] func1 -> DEBU 213c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:37.708 UTC [gossip.gossip] handleMessage -> DEBU 213d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:37.708 UTC [gossip.gossip] handleMessage -> DEBU 213e Exiting" +"2019-09-24 00:25:37.711 UTC [gossip.comm] func1 -> DEBU 213f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:37.711 UTC [gossip.gossip] handleMessage -> DEBU 2140 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:37.691 UTC [gossip.comm] func1 -> DEBU 2141 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.712 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2142 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:37.712 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2143 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:37.713 UTC [msp.identity] Verify -> DEBU 2144 Verify: digest = 00000000 43 2b 33 b0 39 43 45 85 44 b9 ee c0 f7 c8 89 99 |C+3.9CE.D.......| +00000010 dc f0 2b 36 87 2d 49 be 4d 92 c6 5b e7 20 39 24 |..+6.-I.M..[. 9$|" +"2019-09-24 00:25:37.713 UTC [msp.identity] Verify -> DEBU 2145 Verify: sig = 00000000 30 44 02 20 4d d2 37 91 3b 1c 8d d8 cd 3c 22 b9 |0D. M.7.;....<".| +00000010 7f ca c3 a7 03 2b c4 7e e9 af a0 95 96 4d 0f 3e |.....+.~.....M.>| +00000020 cf 5c 4e ba 02 20 4b f9 f6 9a e6 23 17 bc 5f f6 |.\N.. K....#.._.| +00000030 ad 83 4e 04 42 d4 b3 1b c2 85 fd 73 96 f8 08 33 |..N.B......s...3| +00000040 8e c9 1a f8 94 15 |......|" +"2019-09-24 00:25:37.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 2146 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:37.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 2147 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:37.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 2148 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:37.718 UTC [gossip.comm] func1 -> DEBU 2149 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 214a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:37.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 214b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:37.741 UTC [gossip.discovery] learnExistingMembers -> DEBU 214c Exiting" +"2019-09-24 00:25:37.741 UTC [gossip.discovery] handleAliveMessage -> DEBU 214d Exiting" +"2019-09-24 00:25:37.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 214e Exiting" +"2019-09-24 00:25:37.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 214f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:37.749 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2150 Exiting" +"2019-09-24 00:25:37.751 UTC [gossip.gossip] handleMessage -> DEBU 2151 Exiting" +"2019-09-24 00:25:37.751 UTC [msp] DeserializeIdentity -> DEBU 2152 Obtaining identity" +"2019-09-24 00:25:37.752 UTC [msp] DeserializeIdentity -> DEBU 2153 Obtaining identity" +"2019-09-24 00:25:37.752 UTC [msp] DeserializeIdentity -> DEBU 2155 Obtaining identity" +"2019-09-24 00:25:37.752 UTC [gossip.gossip] handleMessage -> DEBU 2154 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.752 UTC [gossip.comm] Send -> DEBU 2156 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:37.752 UTC [gossip.pull] HandleMessage -> DEBU 2157 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.752 UTC [msp] DeserializeIdentity -> DEBU 2158 Obtaining identity" +"2019-09-24 00:25:37.752 UTC [gossip.comm] Send -> DEBU 2159 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:37.752 UTC [gossip.pull] SendDigest -> DEBU 215a Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:37.753 UTC [gossip.comm] sendToEndpoint -> DEBU 215b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:37.753 UTC [gossip.comm] sendToEndpoint -> DEBU 215c Exiting" +"2019-09-24 00:25:37.753 UTC [gossip.comm] sendToEndpoint -> DEBU 215d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:37.753 UTC [gossip.comm] sendToEndpoint -> DEBU 215e Exiting" +"2019-09-24 00:25:37.753 UTC [gossip.gossip] handleMessage -> DEBU 215f Exiting" +"2019-09-24 00:25:37.764 UTC [gossip.gossip] handleMessage -> DEBU 2160 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.764 UTC [gossip.gossip] handleMessage -> DEBU 2161 Exiting" +"2019-09-24 00:25:37.764 UTC [gossip.gossip] handleMessage -> DEBU 2162 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:37.764 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2163 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.765 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2164 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:37.765 UTC [msp.identity] Verify -> DEBU 2165 Verify: digest = 00000000 29 ae 47 1e 93 34 3d ee 13 df c2 f8 91 23 d6 4e |).G..4=......#.N| +00000010 bd 9e 5e 75 59 c7 d2 6b 87 64 b3 28 24 5d f7 07 |..^uY..k.d.($]..|" +"2019-09-24 00:25:37.765 UTC [msp.identity] Verify -> DEBU 2166 Verify: sig = 00000000 30 45 02 21 00 f1 91 e1 30 1c b9 80 bc 8d 77 63 |0E.!....0.....wc| +00000010 8a f2 50 a0 02 17 75 0a eb 14 ae 1e ef 0d 01 0e |..P...u.........| +00000020 04 80 1b 51 dc 02 20 56 b1 d6 42 b7 bb 89 23 4c |...Q.. V..B...#L| +00000030 5c b8 73 6d c4 79 f9 4a 5f 15 6e 5a 9a e3 e3 9e |\.sm.y.J_.nZ....| +00000040 1f 09 a2 b8 bd ec c2 |.......|" +"2019-09-24 00:25:37.765 UTC [msp.identity] Verify -> DEBU 2167 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:37.765 UTC [msp.identity] Verify -> DEBU 2168 Verify: sig = 00000000 30 44 02 21 00 b7 57 77 2b b3 05 0a 83 f6 31 39 |0D.!..Ww+.....19| +00000010 75 b1 60 dd 37 5c 45 48 4e 74 3d 87 71 f0 e7 f1 |u.`.7\EHNt=.q...| +00000020 82 64 a4 6b 03 02 1f 3c 46 6a 7c 30 e9 74 61 ef |.d.k... DEBU 2169 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:37.766 UTC [gossip.discovery] learnExistingMembers -> DEBU 216a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:37.766 UTC [gossip.discovery] learnExistingMembers -> DEBU 216b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:37.766 UTC [gossip.discovery] learnExistingMembers -> DEBU 216c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:37.766 UTC [gossip.discovery] learnExistingMembers -> DEBU 216d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:37.766 UTC [gossip.discovery] learnExistingMembers -> DEBU 216e Exiting" +"2019-09-24 00:25:37.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 216f Exiting" +"2019-09-24 00:25:37.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2170 Exiting" +"2019-09-24 00:25:37.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2171 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:37.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2172 Exiting" +"2019-09-24 00:25:37.767 UTC [gossip.gossip] handleMessage -> DEBU 2173 Exiting" +"2019-09-24 00:25:37.767 UTC [gossip.discovery] sendMemResponse -> DEBU 2174 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:37.767 UTC [msp] DeserializeIdentity -> DEBU 2175 Obtaining identity" +"2019-09-24 00:25:37.767 UTC [msp] DeserializeIdentity -> DEBU 2176 Obtaining identity" +"2019-09-24 00:25:37.768 UTC [gossip.comm] Send -> DEBU 2177 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:37.768 UTC [gossip.discovery] sendMemResponse -> DEBU 2178 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" secret_envelope: > alive: " +"2019-09-24 00:25:37.768 UTC [gossip.comm] sendToEndpoint -> DEBU 2179 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:37.768 UTC [gossip.comm] sendToEndpoint -> DEBU 217a Exiting" +"2019-09-24 00:25:38.113 UTC [gossip.comm] func1 -> DEBU 217b Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:38.113 UTC [gossip.gossip] handleMessage -> DEBU 217c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:38.113 UTC [msp] DeserializeIdentity -> DEBU 217d Obtaining identity" +"2019-09-24 00:25:38.114 UTC [msp] DeserializeIdentity -> DEBU 217e Obtaining identity" +"2019-09-24 00:25:38.114 UTC [msp] DeserializeIdentity -> DEBU 217f Obtaining identity" +"2019-09-24 00:25:38.114 UTC [gossip.gossip] handleMessage -> DEBU 2180 Exiting" +"2019-09-24 00:25:39.640 UTC [msp] GetDefaultSigningIdentity -> DEBU 2181 Obtaining default signing identity" +"2019-09-24 00:25:39.640 UTC [msp.identity] Sign -> DEBU 2182 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151024 " +"2019-09-24 00:25:39.640 UTC [msp.identity] Sign -> DEBU 2183 Sign: digest: 1E7A907B59E785727106382F1B9662AB573DBD2AC4BAABFF48B08F5C2091C90C " +"2019-09-24 00:25:39.641 UTC [msp] GetDefaultSigningIdentity -> DEBU 2184 Obtaining default signing identity" +"2019-09-24 00:25:39.643 UTC [msp.identity] Sign -> DEBU 2185 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:39.643 UTC [msp.identity] Sign -> DEBU 2186 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:39.644 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2187 Sleeping 5s" +"2019-09-24 00:25:39.645 UTC [msp] DeserializeIdentity -> DEBU 2188 Obtaining identity" +"2019-09-24 00:25:39.645 UTC [msp] DeserializeIdentity -> DEBU 2189 Obtaining identity" +"2019-09-24 00:25:39.645 UTC [msp] DeserializeIdentity -> DEBU 218a Obtaining identity" +"2019-09-24 00:25:39.656 UTC [gossip.comm] Send -> DEBU 218b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:39.657 UTC [msp] DeserializeIdentity -> DEBU 218c Obtaining identity" +"2019-09-24 00:25:39.657 UTC [gossip.comm] Send -> DEBU 218d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:39.657 UTC [gossip.comm] Send -> DEBU 218e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:39.657 UTC [gossip.comm] sendToEndpoint -> DEBU 218f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:39.658 UTC [gossip.comm] sendToEndpoint -> DEBU 2190 Exiting" +"2019-09-24 00:25:39.658 UTC [gossip.comm] sendToEndpoint -> DEBU 2191 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:39.660 UTC [gossip.comm] sendToEndpoint -> DEBU 2193 Exiting" +"2019-09-24 00:25:39.660 UTC [gossip.comm] sendToEndpoint -> DEBU 2192 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:39.660 UTC [gossip.comm] sendToEndpoint -> DEBU 2194 Exiting" +"2019-09-24 00:25:39.709 UTC [gossip.pull] Hello -> DEBU 2195 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:39.709 UTC [gossip.comm] Send -> DEBU 2196 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:39.709 UTC [gossip.pull] Hello -> DEBU 2197 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:39.709 UTC [gossip.comm] Send -> DEBU 2198 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:39.709 UTC [gossip.pull] Hello -> DEBU 2199 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:39.709 UTC [gossip.comm] Send -> DEBU 219a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:39.709 UTC [gossip.comm] sendToEndpoint -> DEBU 219b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.710 UTC [gossip.comm] sendToEndpoint -> DEBU 219c Exiting" +"2019-09-24 00:25:39.710 UTC [msp] GetDefaultSigningIdentity -> DEBU 219d Obtaining default signing identity" +"2019-09-24 00:25:39.710 UTC [msp.identity] Sign -> DEBU 219e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151025 " +"2019-09-24 00:25:39.710 UTC [msp.identity] Sign -> DEBU 219f Sign: digest: 21A49982035FDE2CC0A520C734BF71257BFC818EA279ACCA571B0D30554874AD " +"2019-09-24 00:25:39.710 UTC [msp] GetDefaultSigningIdentity -> DEBU 21a0 Obtaining default signing identity" +"2019-09-24 00:25:39.710 UTC [msp.identity] Sign -> DEBU 21a1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:39.710 UTC [msp.identity] Sign -> DEBU 21a2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:39.711 UTC [gossip.comm] Send -> DEBU 21a3 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:39.711 UTC [msp] DeserializeIdentity -> DEBU 21a4 Obtaining identity" +"2019-09-24 00:25:39.711 UTC [gossip.comm] Send -> DEBU 21a5 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:39.711 UTC [msp] DeserializeIdentity -> DEBU 21a6 Obtaining identity" +"2019-09-24 00:25:39.711 UTC [gossip.comm] Send -> DEBU 21a7 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:39.715 UTC [gossip.comm] sendToEndpoint -> DEBU 21a8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21a9 Exiting" +"2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21aa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21ab Exiting" +"2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21ac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21ad Exiting" +"2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21ae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21af Exiting" +"2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21b0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.716 UTC [gossip.comm] sendToEndpoint -> DEBU 21b1 Exiting" +"2019-09-24 00:25:39.728 UTC [gossip.comm] func1 -> DEBU 21b2 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.730 UTC [gossip.comm] func1 -> DEBU 21b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.730 UTC [gossip.gossip] handleMessage -> DEBU 21b4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.731 UTC [gossip.pull] HandleMessage -> DEBU 21b5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.732 UTC [gossip.gossip] handleMessage -> DEBU 21b6 Exiting" +"2019-09-24 00:25:39.732 UTC [gossip.gossip] handleMessage -> DEBU 21b7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.733 UTC [gossip.gossip] handleMessage -> DEBU 21b8 Exiting" +"2019-09-24 00:25:39.735 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.736 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21ba Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:39.737 UTC [msp.identity] Verify -> DEBU 21bb Verify: digest = 00000000 29 ae 47 1e 93 34 3d ee 13 df c2 f8 91 23 d6 4e |).G..4=......#.N| +00000010 bd 9e 5e 75 59 c7 d2 6b 87 64 b3 28 24 5d f7 07 |..^uY..k.d.($]..|" +"2019-09-24 00:25:39.737 UTC [msp.identity] Verify -> DEBU 21bc Verify: sig = 00000000 30 45 02 21 00 f1 91 e1 30 1c b9 80 bc 8d 77 63 |0E.!....0.....wc| +00000010 8a f2 50 a0 02 17 75 0a eb 14 ae 1e ef 0d 01 0e |..P...u.........| +00000020 04 80 1b 51 dc 02 20 56 b1 d6 42 b7 bb 89 23 4c |...Q.. V..B...#L| +00000030 5c b8 73 6d c4 79 f9 4a 5f 15 6e 5a 9a e3 e3 9e |\.sm.y.J_.nZ....| +00000040 1f 09 a2 b8 bd ec c2 |.......|" +"2019-09-24 00:25:39.737 UTC [gossip.discovery] handleAliveMessage -> DEBU 21bd Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:39.737 UTC [gossip.discovery] handleAliveMessage -> DEBU 21be Exiting" +"2019-09-24 00:25:39.737 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21bf Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:39.737 UTC [msp.identity] Verify -> DEBU 21c0 Verify: digest = 00000000 21 a4 99 82 03 5f de 2c c0 a5 20 c7 34 bf 71 25 |!...._.,.. .4.q%| +00000010 7b fc 81 8e a2 79 ac ca 57 1b 0d 30 55 48 74 ad |{....y..W..0UHt.|" +"2019-09-24 00:25:39.737 UTC [msp.identity] Verify -> DEBU 21c1 Verify: sig = 00000000 30 44 02 20 4f 5b b2 e5 98 84 8f 6b 79 1f 60 49 |0D. O[.....ky.`I| +00000010 04 e3 50 21 19 4d 3d be b7 f3 9d fb 73 7f e2 93 |..P!.M=.....s...| +00000020 96 d6 cb a3 02 20 16 03 65 ee eb f6 b8 0c 83 58 |..... ..e......X| +00000030 b8 df 23 45 69 67 94 ef e6 ac 83 27 d3 00 14 f1 |..#Eig.....'....| +00000040 58 2f 50 d5 34 10 |X/P.4.|" +"2019-09-24 00:25:39.737 UTC [gossip.discovery] handleAliveMessage -> DEBU 21c2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:39.737 UTC [gossip.discovery] isSentByMe -> DEBU 21c3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:39.737 UTC [gossip.discovery] handleAliveMessage -> DEBU 21c4 Exiting" +"2019-09-24 00:25:39.737 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21c5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:39.738 UTC [msp] DeserializeIdentity -> DEBU 21c6 Obtaining identity" +"2019-09-24 00:25:39.738 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:39.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:39.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:39.738 UTC [policies] Evaluate -> DEBU 21ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:39.738 UTC [policies] Evaluate -> DEBU 21cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:39.738 UTC [policies] Evaluate -> DEBU 21cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:39.738 UTC [cauthdsl] func1 -> DEBU 21cd 0xc004261280 gate 1569284739738559700 evaluation starts" +"2019-09-24 00:25:39.738 UTC [cauthdsl] func2 -> DEBU 21ce 0xc004261280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:39.738 UTC [cauthdsl] func2 -> DEBU 21cf 0xc004261280 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:39.738 UTC [cauthdsl] func2 -> DEBU 21d0 0xc004261280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:39.738 UTC [cauthdsl] func2 -> DEBU 21d1 0xc004261280 principal evaluation fails" +"2019-09-24 00:25:39.750 UTC [gossip.gossip] handleMessage -> DEBU 21d2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.749 UTC [cauthdsl] func1 -> DEBU 21d3 0xc004261280 gate 1569284739738559700 evaluation fails" +"2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21d4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:39.757 UTC [cauthdsl] func1 -> DEBU 21d7 0xc004261ac0 gate 1569284739757312200 evaluation starts" +"2019-09-24 00:25:39.757 UTC [cauthdsl] func2 -> DEBU 21d8 0xc004261ac0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:39.757 UTC [cauthdsl] func2 -> DEBU 21d9 0xc004261ac0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:39.757 UTC [cauthdsl] func2 -> DEBU 21da 0xc004261ac0 principal matched by identity 0" +"2019-09-24 00:25:39.757 UTC [msp.identity] Verify -> DEBU 21db Verify: digest = 00000000 95 9f cd d9 bd 4d 99 70 74 38 c3 1a b8 df 6e 71 |.....M.pt8....nq| +00000010 87 2f 53 f2 bc c9 95 03 5d d7 ee e7 05 d4 04 6d |./S.....]......m|" +"2019-09-24 00:25:39.757 UTC [msp.identity] Verify -> DEBU 21dc Verify: sig = 00000000 30 44 02 20 35 a4 ee 32 e9 bb 42 2f e3 d3 5b e3 |0D. 5..2..B/..[.| +00000010 31 16 a1 5b 3c b0 31 1a fe df 0d 08 64 ff b7 cf |1..[<.1.....d...| +00000020 1b f8 ce bb 02 20 31 58 97 2e 9f d3 30 a3 4e 99 |..... 1X....0.N.| +00000030 b6 19 96 73 4c 98 df 11 e2 fd ab 25 e5 8e 00 57 |...sL......%...W| +00000040 99 0e 80 0a e3 ac |......|" +"2019-09-24 00:25:39.757 UTC [cauthdsl] func2 -> DEBU 21dd 0xc004261ac0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:39.757 UTC [cauthdsl] func1 -> DEBU 21de 0xc004261ac0 gate 1569284739757312200 evaluation succeeds" +"2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21e1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:39.757 UTC [policies] Evaluate -> DEBU 21e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:39.757 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:39.757 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e4 Exiting" +"2019-09-24 00:25:39.757 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21e5 Exiting" +"2019-09-24 00:25:39.758 UTC [gossip.comm] func1 -> DEBU 21e6 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.758 UTC [gossip.comm] func1 -> DEBU 21e7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.751 UTC [gossip.pull] HandleMessage -> DEBU 21e8 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.762 UTC [gossip.gossip] handleMessage -> DEBU 21e9 Exiting" +"2019-09-24 00:25:39.763 UTC [gossip.gossip] handleMessage -> DEBU 21ea Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.764 UTC [gossip.gossip] handleMessage -> DEBU 21eb Exiting" +"2019-09-24 00:25:39.764 UTC [gossip.gossip] handleMessage -> DEBU 21ec Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.764 UTC [gossip.pull] HandleMessage -> DEBU 21ed GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.764 UTC [gossip.gossip] handleMessage -> DEBU 21ee Exiting" +"2019-09-24 00:25:39.764 UTC [gossip.gossip] handleMessage -> DEBU 21ef Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.764 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21f0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.764 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21f1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:39.765 UTC [msp] DeserializeIdentity -> DEBU 21f2 Obtaining identity" +"2019-09-24 00:25:39.765 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:39.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21f4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:39.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21f5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 21f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 21f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 21f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:39.765 UTC [cauthdsl] func1 -> DEBU 21f9 0xc00424fc40 gate 1569284739765403800 evaluation starts" +"2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 21fa 0xc00424fc40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 21fb 0xc00424fc40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 21fc 0xc00424fc40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 21fd 0xc00424fc40 principal evaluation fails" +"2019-09-24 00:25:39.765 UTC [cauthdsl] func1 -> DEBU 21fe 0xc00424fc40 gate 1569284739765403800 evaluation fails" +"2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 21ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 2200 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:39.765 UTC [policies] Evaluate -> DEBU 2201 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:39.765 UTC [cauthdsl] func1 -> DEBU 2202 0xc004290480 gate 1569284739765732400 evaluation starts" +"2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 2203 0xc004290480 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 2204 0xc004290480 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:39.765 UTC [cauthdsl] func2 -> DEBU 2205 0xc004290480 principal matched by identity 0" +"2019-09-24 00:25:39.765 UTC [msp.identity] Verify -> DEBU 2206 Verify: digest = 00000000 4a db 2c 8d 8d 21 5a 31 21 54 d6 e0 cd 22 a0 e9 |J.,..!Z1!T..."..| +00000010 e9 a3 bc 63 00 c8 a4 c6 d8 d9 8c b9 72 9b 7f e6 |...c........r...|" +"2019-09-24 00:25:39.765 UTC [msp.identity] Verify -> DEBU 2207 Verify: sig = 00000000 30 44 02 20 68 f7 4e 05 c5 b9 75 32 63 23 6c d9 |0D. h.N...u2c#l.| +00000010 ce 62 c3 9a 2c 3a 55 f8 7e 79 61 c3 6e a6 8f c1 |.b..,:U.~ya.n...| +00000020 29 8f c2 62 02 20 40 33 d5 7d b2 ac 8e c2 04 95 |)..b. @3.}......| +00000030 9b 50 f0 c9 be 6e bd 53 c7 d4 22 2d ab d4 5e 7b |.P...n.S.."-..^{| +00000040 7d 96 a6 65 55 70 |}..eUp|" +"2019-09-24 00:25:39.766 UTC [cauthdsl] func2 -> DEBU 2208 0xc004290480 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:39.766 UTC [cauthdsl] func1 -> DEBU 2209 0xc004290480 gate 1569284739765732400 evaluation succeeds" +"2019-09-24 00:25:39.766 UTC [policies] Evaluate -> DEBU 220a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:39.766 UTC [policies] Evaluate -> DEBU 220b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:39.766 UTC [policies] Evaluate -> DEBU 220c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:39.766 UTC [policies] Evaluate -> DEBU 220d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:39.766 UTC [gossip.discovery] handleAliveMessage -> DEBU 220e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:39.766 UTC [gossip.discovery] handleAliveMessage -> DEBU 220f Exiting" +"2019-09-24 00:25:39.766 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2210 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:39.766 UTC [msp.identity] Verify -> DEBU 2211 Verify: digest = 00000000 29 ae 47 1e 93 34 3d ee 13 df c2 f8 91 23 d6 4e |).G..4=......#.N| +00000010 bd 9e 5e 75 59 c7 d2 6b 87 64 b3 28 24 5d f7 07 |..^uY..k.d.($]..|" +"2019-09-24 00:25:39.766 UTC [msp.identity] Verify -> DEBU 2212 Verify: sig = 00000000 30 45 02 21 00 f1 91 e1 30 1c b9 80 bc 8d 77 63 |0E.!....0.....wc| +00000010 8a f2 50 a0 02 17 75 0a eb 14 ae 1e ef 0d 01 0e |..P...u.........| +00000020 04 80 1b 51 dc 02 20 56 b1 d6 42 b7 bb 89 23 4c |...Q.. V..B...#L| +00000030 5c b8 73 6d c4 79 f9 4a 5f 15 6e 5a 9a e3 e3 9e |\.sm.y.J_.nZ....| +00000040 1f 09 a2 b8 bd ec c2 |.......|" +"2019-09-24 00:25:39.766 UTC [gossip.discovery] handleAliveMessage -> DEBU 2213 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:39.766 UTC [gossip.discovery] handleAliveMessage -> DEBU 2214 Exiting" +"2019-09-24 00:25:39.766 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2215 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:39.769 UTC [msp.identity] Verify -> DEBU 2216 Verify: digest = 00000000 21 a4 99 82 03 5f de 2c c0 a5 20 c7 34 bf 71 25 |!...._.,.. .4.q%| +00000010 7b fc 81 8e a2 79 ac ca 57 1b 0d 30 55 48 74 ad |{....y..W..0UHt.|" +"2019-09-24 00:25:39.770 UTC [msp.identity] Verify -> DEBU 2217 Verify: sig = 00000000 30 44 02 20 4f 5b b2 e5 98 84 8f 6b 79 1f 60 49 |0D. O[.....ky.`I| +00000010 04 e3 50 21 19 4d 3d be b7 f3 9d fb 73 7f e2 93 |..P!.M=.....s...| +00000020 96 d6 cb a3 02 20 16 03 65 ee eb f6 b8 0c 83 58 |..... ..e......X| +00000030 b8 df 23 45 69 67 94 ef e6 ac 83 27 d3 00 14 f1 |..#Eig.....'....| +00000040 58 2f 50 d5 34 10 |X/P.4.|" +"2019-09-24 00:25:39.776 UTC [gossip.discovery] handleAliveMessage -> DEBU 2218 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:39.776 UTC [gossip.discovery] isSentByMe -> DEBU 2219 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:39.776 UTC [gossip.discovery] handleAliveMessage -> DEBU 221a Exiting" +"2019-09-24 00:25:39.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 221b Exiting" +"2019-09-24 00:25:39.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 221c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.776 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 221d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:39.776 UTC [msp.identity] Verify -> DEBU 221e Verify: digest = 00000000 21 a4 99 82 03 5f de 2c c0 a5 20 c7 34 bf 71 25 |!...._.,.. .4.q%| +00000010 7b fc 81 8e a2 79 ac ca 57 1b 0d 30 55 48 74 ad |{....y..W..0UHt.|" +"2019-09-24 00:25:39.776 UTC [msp.identity] Verify -> DEBU 221f Verify: sig = 00000000 30 44 02 20 4f 5b b2 e5 98 84 8f 6b 79 1f 60 49 |0D. O[.....ky.`I| +00000010 04 e3 50 21 19 4d 3d be b7 f3 9d fb 73 7f e2 93 |..P!.M=.....s...| +00000020 96 d6 cb a3 02 20 16 03 65 ee eb f6 b8 0c 83 58 |..... ..e......X| +00000030 b8 df 23 45 69 67 94 ef e6 ac 83 27 d3 00 14 f1 |..#Eig.....'....| +00000040 58 2f 50 d5 34 10 |X/P.4.|" +"2019-09-24 00:25:39.777 UTC [msp.identity] Verify -> DEBU 2220 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:39.777 UTC [msp.identity] Verify -> DEBU 2221 Verify: sig = 00000000 30 45 02 21 00 cc 23 b6 6b a9 d8 76 4e 88 18 1e |0E.!..#.k..vN...| +00000010 21 43 0d 93 04 13 66 c3 6f dd 52 7d d1 b5 fd 3c |!C....f.o.R}...<| +00000020 96 0b 54 f9 af 02 20 44 45 88 fa 2d 84 8c d3 47 |..T... DE..-...G| +00000030 8a 45 d4 9e 69 ff f1 01 21 f0 30 15 5d 86 c9 7c |.E..i...!.0.]..|| +00000040 79 1a 19 26 81 bf 0a |y..&...|" +"2019-09-24 00:25:39.782 UTC [gossip.discovery] handleAliveMessage -> DEBU 2222 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:39.782 UTC [gossip.discovery] isSentByMe -> DEBU 2223 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:39.782 UTC [gossip.discovery] handleAliveMessage -> DEBU 2224 Exiting" +"2019-09-24 00:25:39.782 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2225 Exiting" +"2019-09-24 00:25:39.782 UTC [gossip.gossip] handleMessage -> DEBU 2226 Exiting" +"2019-09-24 00:25:39.970 UTC [gossip.gossip] handleMessage -> DEBU 2227 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.970 UTC [gossip.pull] HandleMessage -> DEBU 2228 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.970 UTC [msp] DeserializeIdentity -> DEBU 2229 Obtaining identity" +"2019-09-24 00:25:39.970 UTC [msp] DeserializeIdentity -> DEBU 222a Obtaining identity" +"2019-09-24 00:25:39.971 UTC [msp] DeserializeIdentity -> DEBU 222b Obtaining identity" +"2019-09-24 00:25:39.971 UTC [msp] DeserializeIdentity -> DEBU 222c Obtaining identity" +"2019-09-24 00:25:39.972 UTC [msp] DeserializeIdentity -> DEBU 222d Obtaining identity" +"2019-09-24 00:25:39.972 UTC [msp] DeserializeIdentity -> DEBU 222e Obtaining identity" +"2019-09-24 00:25:39.973 UTC [gossip.pull] SendDigest -> DEBU 222f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:39.973 UTC [gossip.gossip] handleMessage -> DEBU 2230 Exiting" +"2019-09-24 00:25:39.988 UTC [gossip.gossip] handleMessage -> DEBU 2231 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.988 UTC [gossip.gossip] handleMessage -> DEBU 2232 Exiting" +"2019-09-24 00:25:39.988 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2233 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:39.988 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2234 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:39.988 UTC [msp] DeserializeIdentity -> DEBU 2235 Obtaining identity" +"2019-09-24 00:25:39.989 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2236 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:39.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2237 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:39.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2238 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:39.989 UTC [policies] Evaluate -> DEBU 2239 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:39.989 UTC [policies] Evaluate -> DEBU 223a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:39.989 UTC [policies] Evaluate -> DEBU 223b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:39.989 UTC [cauthdsl] func1 -> DEBU 223c 0xc004275af0 gate 1569284739989895800 evaluation starts" +"2019-09-24 00:25:39.989 UTC [cauthdsl] func2 -> DEBU 223d 0xc004275af0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:39.989 UTC [cauthdsl] func2 -> DEBU 223e 0xc004275af0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:39.990 UTC [cauthdsl] func2 -> DEBU 223f 0xc004275af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:39.990 UTC [cauthdsl] func2 -> DEBU 2240 0xc004275af0 principal evaluation fails" +"2019-09-24 00:25:39.990 UTC [cauthdsl] func1 -> DEBU 2241 0xc004275af0 gate 1569284739989895800 evaluation fails" +"2019-09-24 00:25:39.990 UTC [policies] Evaluate -> DEBU 2242 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:39.990 UTC [policies] Evaluate -> DEBU 2243 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:39.990 UTC [policies] Evaluate -> DEBU 2244 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:39.990 UTC [cauthdsl] func1 -> DEBU 2245 0xc0042d0330 gate 1569284739990703500 evaluation starts" +"2019-09-24 00:25:39.990 UTC [cauthdsl] func2 -> DEBU 2246 0xc0042d0330 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:39.990 UTC [cauthdsl] func2 -> DEBU 2247 0xc0042d0330 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:39.991 UTC [cauthdsl] func2 -> DEBU 2248 0xc0042d0330 principal matched by identity 0" +"2019-09-24 00:25:40.005 UTC [msp.identity] Verify -> DEBU 2249 Verify: digest = 00000000 b5 a4 b6 8d 3a 73 9d 08 77 fe eb 0c 29 60 cf ef |....:s..w...)`..| +00000010 5a bd d1 62 c3 fb d3 92 1e 64 3d b5 46 28 4b a9 |Z..b.....d=.F(K.|" +"2019-09-24 00:25:40.005 UTC [msp.identity] Verify -> DEBU 224a Verify: sig = 00000000 30 44 02 20 52 bc 32 66 97 30 50 c4 b9 fd 24 b0 |0D. R.2f.0P...$.| +00000010 ec d0 39 bc b0 62 74 72 a0 60 a3 15 5e 36 59 d1 |..9..btr.`..^6Y.| +00000020 00 bc 0c 58 02 20 44 8e 76 dd 42 7c d2 24 0a 30 |...X. D.v.B|.$.0| +00000030 dd 38 4c 33 02 89 31 36 03 0d 99 3a 9e c1 f5 62 |.8L3..16...:...b| +00000040 6f f0 d6 85 c4 43 |o....C|" +"2019-09-24 00:25:40.005 UTC [cauthdsl] func2 -> DEBU 224b 0xc0042d0330 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:40.005 UTC [cauthdsl] func1 -> DEBU 224c 0xc0042d0330 gate 1569284739990703500 evaluation succeeds" +"2019-09-24 00:25:40.005 UTC [policies] Evaluate -> DEBU 224d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.005 UTC [policies] Evaluate -> DEBU 224e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.005 UTC [policies] Evaluate -> DEBU 224f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:40.005 UTC [policies] Evaluate -> DEBU 2250 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:40.005 UTC [gossip.discovery] handleAliveMessage -> DEBU 2251 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:40.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 2252 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:40.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 2253 updating membership: timestamp: " +"2019-09-24 00:25:40.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 2254 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:40.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 2255 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:40.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 2256 Exiting" +"2019-09-24 00:25:40.006 UTC [gossip.discovery] handleAliveMessage -> DEBU 2257 Exiting" +"2019-09-24 00:25:40.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2258 Exiting" +"2019-09-24 00:25:40.006 UTC [gossip.discovery] sendMemResponse -> DEBU 2259 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:40.006 UTC [msp] DeserializeIdentity -> DEBU 225a Obtaining identity" +"2019-09-24 00:25:40.006 UTC [msp] DeserializeIdentity -> DEBU 225b Obtaining identity" +"2019-09-24 00:25:40.006 UTC [msp] DeserializeIdentity -> DEBU 225c Obtaining identity" +"2019-09-24 00:25:40.007 UTC [gossip.comm] Send -> DEBU 225d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:40.019 UTC [gossip.comm] sendToEndpoint -> DEBU 225e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.019 UTC [gossip.comm] sendToEndpoint -> DEBU 225f Exiting" +"2019-09-24 00:25:40.019 UTC [gossip.gossip] handleMessage -> DEBU 2260 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:40.019 UTC [gossip.gossip] handleMessage -> DEBU 2261 Exiting" +"2019-09-24 00:25:40.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2262 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:40.020 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2263 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:40.020 UTC [msp] DeserializeIdentity -> DEBU 2264 Obtaining identity" +"2019-09-24 00:25:40.020 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2265 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:40.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2266 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2267 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.020 UTC [policies] Evaluate -> DEBU 2268 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:40.020 UTC [policies] Evaluate -> DEBU 2269 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:40.020 UTC [policies] Evaluate -> DEBU 226a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:40.020 UTC [cauthdsl] func1 -> DEBU 226b 0xc0042bb960 gate 1569284740020686100 evaluation starts" +"2019-09-24 00:25:40.020 UTC [cauthdsl] func2 -> DEBU 226c 0xc0042bb960 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.020 UTC [cauthdsl] func2 -> DEBU 226d 0xc0042bb960 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.020 UTC [cauthdsl] func2 -> DEBU 226e 0xc0042bb960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:40.020 UTC [cauthdsl] func2 -> DEBU 226f 0xc0042bb960 principal evaluation fails" +"2019-09-24 00:25:40.020 UTC [cauthdsl] func1 -> DEBU 2270 0xc0042bb960 gate 1569284740020686100 evaluation fails" +"2019-09-24 00:25:40.020 UTC [policies] Evaluate -> DEBU 2271 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.021 UTC [policies] Evaluate -> DEBU 2272 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.021 UTC [policies] Evaluate -> DEBU 2273 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:40.038 UTC [cauthdsl] func1 -> DEBU 2274 0xc0042f61a0 gate 1569284740037982500 evaluation starts" +"2019-09-24 00:25:40.038 UTC [cauthdsl] func2 -> DEBU 2275 0xc0042f61a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.038 UTC [cauthdsl] func2 -> DEBU 2276 0xc0042f61a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.038 UTC [cauthdsl] func2 -> DEBU 2277 0xc0042f61a0 principal matched by identity 0" +"2019-09-24 00:25:40.038 UTC [msp.identity] Verify -> DEBU 2278 Verify: digest = 00000000 ec df 0e eb 7a ff c7 35 78 2d 5e a5 3b 82 25 83 |....z..5x-^.;.%.| +00000010 e7 6f 4f 0a e6 42 5e 0b b8 19 fb a9 ba f4 a4 74 |.oO..B^........t|" +"2019-09-24 00:25:40.038 UTC [msp.identity] Verify -> DEBU 2279 Verify: sig = 00000000 30 44 02 20 1c 4f 50 d9 c4 6b 2d 3c eb 40 83 a4 |0D. .OP..k-<.@..| +00000010 c4 73 9e 7f 19 d6 f0 24 98 26 bc 3c 02 a7 8e 01 |.s.....$.&.<....| +00000020 43 6e bc e8 02 20 1d b8 e0 d3 af fc 6b d6 46 5e |Cn... ......k.F^| +00000030 ac 13 dc 13 01 5f 9c b5 8f ea a1 6d af 7b b9 d4 |....._.....m.{..| +00000040 73 12 4b 4e 75 50 |s.KNuP|" +"2019-09-24 00:25:40.038 UTC [cauthdsl] func2 -> DEBU 227a 0xc0042f61a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:40.039 UTC [cauthdsl] func1 -> DEBU 227b 0xc0042f61a0 gate 1569284740037982500 evaluation succeeds" +"2019-09-24 00:25:40.039 UTC [policies] Evaluate -> DEBU 227c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.039 UTC [policies] Evaluate -> DEBU 227d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.039 UTC [policies] Evaluate -> DEBU 227e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:40.039 UTC [policies] Evaluate -> DEBU 227f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:40.039 UTC [gossip.discovery] handleAliveMessage -> DEBU 2280 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:40.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 2281 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:40.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 2282 updating membership: timestamp: " +"2019-09-24 00:25:40.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 2283 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:40.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 2284 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:40.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 2285 Exiting" +"2019-09-24 00:25:40.040 UTC [gossip.discovery] handleAliveMessage -> DEBU 2286 Exiting" +"2019-09-24 00:25:40.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2287 Exiting" +"2019-09-24 00:25:40.056 UTC [msp] DeserializeIdentity -> DEBU 2288 Obtaining identity" +"2019-09-24 00:25:40.056 UTC [msp] DeserializeIdentity -> DEBU 2289 Obtaining identity" +"2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 228a Obtaining identity" +"2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 228b Obtaining identity" +"2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 228c Obtaining identity" +"2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 228d Obtaining identity" +"2019-09-24 00:25:40.065 UTC [gossip.comm] Send -> DEBU 228e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 228f Obtaining identity" +"2019-09-24 00:25:40.065 UTC [msp] DeserializeIdentity -> DEBU 2290 Obtaining identity" +"2019-09-24 00:25:40.065 UTC [gossip.comm] Send -> DEBU 2291 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:40.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2292 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:40.065 UTC [gossip.comm] sendToEndpoint -> DEBU 2293 Exiting" +"2019-09-24 00:25:40.066 UTC [gossip.comm] sendToEndpoint -> DEBU 2294 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:40.066 UTC [gossip.comm] sendToEndpoint -> DEBU 2295 Exiting" +"2019-09-24 00:25:40.068 UTC [gossip.comm] func1 -> DEBU 2296 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:40.068 UTC [gossip.gossip] handleMessage -> DEBU 2297 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:40.082 UTC [gossip.gossip] handleMessage -> DEBU 2298 Exiting" +"2019-09-24 00:25:40.082 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2299 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:40.088 UTC [gossip.comm] func1 -> DEBU 229a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:40.102 UTC [gossip.gossip] handleMessage -> DEBU 229c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:40.088 UTC [gossip.discovery] sendMemResponse -> DEBU 229b Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" > alive: DEBU 22c7 0xc0043444f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:40.190 UTC [cauthdsl] func1 -> DEBU 22c8 0xc0043444f0 gate 1569284740190083800 evaluation succeeds" +"2019-09-24 00:25:40.190 UTC [policies] Evaluate -> DEBU 22c9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.190 UTC [policies] Evaluate -> DEBU 22ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.190 UTC [policies] Evaluate -> DEBU 22cb Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:40.191 UTC [policies] Evaluate -> DEBU 22cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:40.191 UTC [msp] DeserializeIdentity -> DEBU 22cd Obtaining identity" +"2019-09-24 00:25:40.194 UTC [msp] DeserializeIdentity -> DEBU 22ce Obtaining identity" +"2019-09-24 00:25:40.195 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22cf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:40.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22d0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.204 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22d2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.204 UTC [policies] Evaluate -> DEBU 22d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:40.204 UTC [policies] Evaluate -> DEBU 22d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:40.204 UTC [policies] Evaluate -> DEBU 22d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:40.204 UTC [cauthdsl] func1 -> DEBU 22d6 0xc004345e40 gate 1569284740204517400 evaluation starts" +"2019-09-24 00:25:40.204 UTC [cauthdsl] func2 -> DEBU 22d7 0xc004345e40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.204 UTC [cauthdsl] func2 -> DEBU 22d8 0xc004345e40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.204 UTC [cauthdsl] func2 -> DEBU 22d9 0xc004345e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:40.204 UTC [cauthdsl] func2 -> DEBU 22da 0xc004345e40 principal evaluation fails" +"2019-09-24 00:25:40.204 UTC [cauthdsl] func1 -> DEBU 22db 0xc004345e40 gate 1569284740204517400 evaluation fails" +"2019-09-24 00:25:40.204 UTC [policies] Evaluate -> DEBU 22dc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:40.205 UTC [cauthdsl] func1 -> DEBU 22df 0xc004358680 gate 1569284740205119700 evaluation starts" +"2019-09-24 00:25:40.205 UTC [cauthdsl] func2 -> DEBU 22e0 0xc004358680 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.205 UTC [cauthdsl] func2 -> DEBU 22e1 0xc004358680 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.205 UTC [cauthdsl] func2 -> DEBU 22e2 0xc004358680 principal matched by identity 0" +"2019-09-24 00:25:40.205 UTC [msp.identity] Verify -> DEBU 22e3 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:40.205 UTC [msp.identity] Verify -> DEBU 22e4 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:40.205 UTC [cauthdsl] func2 -> DEBU 22e5 0xc004358680 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:40.205 UTC [cauthdsl] func1 -> DEBU 22e6 0xc004358680 gate 1569284740205119700 evaluation succeeds" +"2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22e7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22e9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:40.205 UTC [policies] Evaluate -> DEBU 22ea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:40.205 UTC [gossip.gossip] handleMessage -> DEBU 22eb Exiting" +"2019-09-24 00:25:40.205 UTC [gossip.gossip] handleMessage -> DEBU 22ec Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.206 UTC [msp] DeserializeIdentity -> DEBU 22ed Obtaining identity" +"2019-09-24 00:25:40.206 UTC [msp] DeserializeIdentity -> DEBU 22ee Obtaining identity" +"2019-09-24 00:25:40.206 UTC [msp] DeserializeIdentity -> DEBU 22ef Obtaining identity" +"2019-09-24 00:25:40.206 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22f0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:40.206 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.206 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.206 UTC [policies] Evaluate -> DEBU 22f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:40.206 UTC [policies] Evaluate -> DEBU 22f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:40.206 UTC [policies] Evaluate -> DEBU 22f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:40.206 UTC [cauthdsl] func1 -> DEBU 22f6 0xc004370190 gate 1569284740206925600 evaluation starts" +"2019-09-24 00:25:40.206 UTC [cauthdsl] func2 -> DEBU 22f7 0xc004370190 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 22f8 0xc004370190 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 22f9 0xc004370190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 22fa 0xc004370190 principal evaluation fails" +"2019-09-24 00:25:40.207 UTC [cauthdsl] func1 -> DEBU 22fb 0xc004370190 gate 1569284740206925600 evaluation fails" +"2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 22fc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 22fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 22fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:40.207 UTC [cauthdsl] func1 -> DEBU 22ff 0xc0043709d0 gate 1569284740207294900 evaluation starts" +"2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 2300 0xc0043709d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 2301 0xc0043709d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 2302 0xc0043709d0 principal matched by identity 0" +"2019-09-24 00:25:40.207 UTC [msp.identity] Verify -> DEBU 2303 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:40.207 UTC [msp.identity] Verify -> DEBU 2304 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:40.207 UTC [cauthdsl] func2 -> DEBU 2305 0xc0043709d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:40.207 UTC [cauthdsl] func1 -> DEBU 2306 0xc0043709d0 gate 1569284740207294900 evaluation succeeds" +"2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 2307 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 2308 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 2309 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:40.207 UTC [policies] Evaluate -> DEBU 230a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:40.208 UTC [msp.identity] Verify -> DEBU 230b Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:40.208 UTC [msp.identity] Verify -> DEBU 230c Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:40.208 UTC [msp.identity] Verify -> DEBU 230d Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:40.208 UTC [msp.identity] Verify -> DEBU 230e Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:40.208 UTC [msp] DeserializeIdentity -> DEBU 230f Obtaining identity" +"2019-09-24 00:25:40.203 UTC [gossip.comm] func1 -> DEBU 22d1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.223 UTC [msp] DeserializeIdentity -> DEBU 2310 Obtaining identity" +"2019-09-24 00:25:40.225 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2311 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:40.225 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2312 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.225 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2313 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.225 UTC [policies] Evaluate -> DEBU 2314 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:40.225 UTC [policies] Evaluate -> DEBU 2315 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:40.225 UTC [policies] Evaluate -> DEBU 2316 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:40.225 UTC [cauthdsl] func1 -> DEBU 2317 0xc004380fe0 gate 1569284740225564900 evaluation starts" +"2019-09-24 00:25:40.225 UTC [cauthdsl] func2 -> DEBU 2318 0xc004380fe0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.225 UTC [cauthdsl] func2 -> DEBU 2319 0xc004380fe0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.225 UTC [cauthdsl] func2 -> DEBU 231a 0xc004380fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:40.225 UTC [cauthdsl] func2 -> DEBU 231b 0xc004380fe0 principal evaluation fails" +"2019-09-24 00:25:40.225 UTC [cauthdsl] func1 -> DEBU 231c 0xc004380fe0 gate 1569284740225564900 evaluation fails" +"2019-09-24 00:25:40.225 UTC [policies] Evaluate -> DEBU 231d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.226 UTC [policies] Evaluate -> DEBU 231e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.226 UTC [policies] Evaluate -> DEBU 231f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:40.226 UTC [cauthdsl] func1 -> DEBU 2320 0xc004381820 gate 1569284740226162300 evaluation starts" +"2019-09-24 00:25:40.226 UTC [cauthdsl] func2 -> DEBU 2321 0xc004381820 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.226 UTC [cauthdsl] func2 -> DEBU 2322 0xc004381820 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.226 UTC [cauthdsl] func2 -> DEBU 2323 0xc004381820 principal matched by identity 0" +"2019-09-24 00:25:40.226 UTC [msp.identity] Verify -> DEBU 2324 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:40.226 UTC [msp.identity] Verify -> DEBU 2325 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:40.227 UTC [cauthdsl] func2 -> DEBU 2326 0xc004381820 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:40.227 UTC [cauthdsl] func1 -> DEBU 2327 0xc004381820 gate 1569284740226162300 evaluation succeeds" +"2019-09-24 00:25:40.227 UTC [policies] Evaluate -> DEBU 2328 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.227 UTC [policies] Evaluate -> DEBU 2329 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.228 UTC [policies] Evaluate -> DEBU 232a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:40.228 UTC [policies] Evaluate -> DEBU 232b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:40.228 UTC [gossip.gossip] handleMessage -> DEBU 232c Exiting" +"2019-09-24 00:25:40.228 UTC [gossip.gossip] handleMessage -> DEBU 232d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.229 UTC [msp] DeserializeIdentity -> DEBU 232e Obtaining identity" +"2019-09-24 00:25:40.229 UTC [msp] DeserializeIdentity -> DEBU 232f Obtaining identity" +"2019-09-24 00:25:40.230 UTC [msp] DeserializeIdentity -> DEBU 2330 Obtaining identity" +"2019-09-24 00:25:40.235 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2331 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:40.235 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2332 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.235 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2333 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.235 UTC [policies] Evaluate -> DEBU 2334 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:40.235 UTC [policies] Evaluate -> DEBU 2335 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:40.235 UTC [policies] Evaluate -> DEBU 2336 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:40.235 UTC [cauthdsl] func1 -> DEBU 2337 0xc004397330 gate 1569284740235682000 evaluation starts" +"2019-09-24 00:25:40.235 UTC [cauthdsl] func2 -> DEBU 2338 0xc004397330 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.235 UTC [cauthdsl] func2 -> DEBU 2339 0xc004397330 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.235 UTC [cauthdsl] func2 -> DEBU 233a 0xc004397330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:40.235 UTC [cauthdsl] func2 -> DEBU 233b 0xc004397330 principal evaluation fails" +"2019-09-24 00:25:40.235 UTC [cauthdsl] func1 -> DEBU 233c 0xc004397330 gate 1569284740235682000 evaluation fails" +"2019-09-24 00:25:40.235 UTC [policies] Evaluate -> DEBU 233d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.235 UTC [policies] Evaluate -> DEBU 233e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.236 UTC [policies] Evaluate -> DEBU 233f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:40.236 UTC [cauthdsl] func1 -> DEBU 2340 0xc004397b70 gate 1569284740236052600 evaluation starts" +"2019-09-24 00:25:40.236 UTC [cauthdsl] func2 -> DEBU 2341 0xc004397b70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.236 UTC [cauthdsl] func2 -> DEBU 2342 0xc004397b70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.236 UTC [cauthdsl] func2 -> DEBU 2343 0xc004397b70 principal matched by identity 0" +"2019-09-24 00:25:40.236 UTC [msp.identity] Verify -> DEBU 2344 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:40.236 UTC [msp.identity] Verify -> DEBU 2345 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:40.236 UTC [cauthdsl] func2 -> DEBU 2346 0xc004397b70 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:40.236 UTC [cauthdsl] func1 -> DEBU 2347 0xc004397b70 gate 1569284740236052600 evaluation succeeds" +"2019-09-24 00:25:40.236 UTC [policies] Evaluate -> DEBU 2348 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.236 UTC [policies] Evaluate -> DEBU 2349 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.236 UTC [policies] Evaluate -> DEBU 234a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:40.236 UTC [policies] Evaluate -> DEBU 234b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:40.236 UTC [msp.identity] Verify -> DEBU 234c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:40.236 UTC [msp.identity] Verify -> DEBU 234d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:40.237 UTC [msp] DeserializeIdentity -> DEBU 234e Obtaining identity" +"2019-09-24 00:25:40.237 UTC [msp] DeserializeIdentity -> DEBU 234f Obtaining identity" +"2019-09-24 00:25:40.237 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2350 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:40.237 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2351 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.237 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2352 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 2353 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 2354 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 2355 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:40.237 UTC [cauthdsl] func1 -> DEBU 2356 0xc0043b1a60 gate 1569284740237508400 evaluation starts" +"2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 2357 0xc0043b1a60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 2358 0xc0043b1a60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 2359 0xc0043b1a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 235a 0xc0043b1a60 principal evaluation fails" +"2019-09-24 00:25:40.237 UTC [cauthdsl] func1 -> DEBU 235b 0xc0043b1a60 gate 1569284740237508400 evaluation fails" +"2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 235c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 235d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.237 UTC [policies] Evaluate -> DEBU 235e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:40.237 UTC [cauthdsl] func1 -> DEBU 235f 0xc0043c02a0 gate 1569284740237898100 evaluation starts" +"2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 2360 0xc0043c02a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.237 UTC [cauthdsl] func2 -> DEBU 2361 0xc0043c02a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.238 UTC [cauthdsl] func2 -> DEBU 2362 0xc0043c02a0 principal matched by identity 0" +"2019-09-24 00:25:40.238 UTC [msp.identity] Verify -> DEBU 2363 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:40.238 UTC [msp.identity] Verify -> DEBU 2364 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:40.241 UTC [cauthdsl] func2 -> DEBU 2365 0xc0043c02a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:40.241 UTC [cauthdsl] func1 -> DEBU 2366 0xc0043c02a0 gate 1569284740237898100 evaluation succeeds" +"2019-09-24 00:25:40.241 UTC [policies] Evaluate -> DEBU 2367 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.241 UTC [policies] Evaluate -> DEBU 2368 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.241 UTC [policies] Evaluate -> DEBU 2369 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:40.242 UTC [policies] Evaluate -> DEBU 236a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:40.242 UTC [msp.identity] Verify -> DEBU 236b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:40.242 UTC [msp.identity] Verify -> DEBU 236c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:40.243 UTC [gossip.gossip] handleMessage -> DEBU 236d Exiting" +"2019-09-24 00:25:40.292 UTC [msp] DeserializeIdentity -> DEBU 236e Obtaining identity" +"2019-09-24 00:25:40.292 UTC [msp] DeserializeIdentity -> DEBU 236f Obtaining identity" +"2019-09-24 00:25:40.292 UTC [gossip.pull] Hello -> DEBU 2370 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:40.292 UTC [msp] DeserializeIdentity -> DEBU 2371 Obtaining identity" +"2019-09-24 00:25:40.293 UTC [msp] DeserializeIdentity -> DEBU 2372 Obtaining identity" +"2019-09-24 00:25:40.293 UTC [gossip.comm] Send -> DEBU 2373 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:40.294 UTC [gossip.comm] sendToEndpoint -> DEBU 2374 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.295 UTC [gossip.comm] sendToEndpoint -> DEBU 2375 Exiting" +"2019-09-24 00:25:40.296 UTC [gossip.comm] func1 -> DEBU 2376 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.296 UTC [gossip.gossip] handleMessage -> DEBU 2377 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.296 UTC [gossip.pull] HandleMessage -> DEBU 2378 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.296 UTC [gossip.gossip] handleMessage -> DEBU 2379 Exiting" +"2019-09-24 00:25:40.706 UTC [gossip.comm] func1 -> DEBU 237a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.711 UTC [gossip.comm] func1 -> DEBU 237b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:40.711 UTC [gossip.comm] func1 -> DEBU 237c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.711 UTC [gossip.gossip] handleMessage -> DEBU 237d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.711 UTC [gossip.gossip] handleMessage -> DEBU 237e Exiting" +"2019-09-24 00:25:40.712 UTC [gossip.gossip] handleMessage -> DEBU 237f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:40.712 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2380 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:40.712 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2381 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:40.712 UTC [msp] DeserializeIdentity -> DEBU 2382 Obtaining identity" +"2019-09-24 00:25:40.712 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2383 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:40.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2384 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2385 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 2386 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 2387 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 2388 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:40.712 UTC [cauthdsl] func1 -> DEBU 2389 0xc0043ea780 gate 1569284740712506800 evaluation starts" +"2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 238a 0xc0043ea780 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 238b 0xc0043ea780 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 238c 0xc0043ea780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 238d 0xc0043ea780 principal evaluation fails" +"2019-09-24 00:25:40.712 UTC [cauthdsl] func1 -> DEBU 238e 0xc0043ea780 gate 1569284740712506800 evaluation fails" +"2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 238f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 2390 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:40.712 UTC [policies] Evaluate -> DEBU 2391 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:40.712 UTC [cauthdsl] func1 -> DEBU 2392 0xc0043eafc0 gate 1569284740712810200 evaluation starts" +"2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 2393 0xc0043eafc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 2394 0xc0043eafc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.712 UTC [cauthdsl] func2 -> DEBU 2395 0xc0043eafc0 principal matched by identity 0" +"2019-09-24 00:25:40.712 UTC [msp.identity] Verify -> DEBU 2396 Verify: digest = 00000000 f8 6d c3 bb e3 d6 18 83 9b 5f 3e 08 e5 72 6b 60 |.m......._>..rk`| +00000010 b5 ec f0 28 02 c1 85 34 cf b1 30 de f7 3b 85 84 |...(...4..0..;..|" +"2019-09-24 00:25:40.712 UTC [msp.identity] Verify -> DEBU 2397 Verify: sig = 00000000 30 45 02 21 00 dc 79 43 ca 09 57 c1 ea 31 31 d8 |0E.!..yC..W..11.| +00000010 7f b0 41 57 14 bd 71 b7 de da 45 e3 5e 07 c8 a8 |..AW..q...E.^...| +00000020 19 ce 14 d5 92 02 20 6a b8 78 88 66 c8 fd 3a 9d |...... j.x.f..:.| +00000030 32 e1 21 cd 03 d9 4f 6f e9 e7 ff 2c cd f6 2c a3 |2.!...Oo...,..,.| +00000040 97 bd 85 09 f0 c4 ea |.......|" +"2019-09-24 00:25:40.713 UTC [cauthdsl] func2 -> DEBU 2398 0xc0043eafc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:40.713 UTC [cauthdsl] func1 -> DEBU 2399 0xc0043eafc0 gate 1569284740712810200 evaluation succeeds" +"2019-09-24 00:25:40.713 UTC [policies] Evaluate -> DEBU 239a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.713 UTC [policies] Evaluate -> DEBU 239b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:40.713 UTC [policies] Evaluate -> DEBU 239c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:40.713 UTC [policies] Evaluate -> DEBU 239d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:40.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 239e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:40.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 239f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:40.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 23a0 updating membership: timestamp: " +"2019-09-24 00:25:40.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 23a1 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:40.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 23a2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:40.713 UTC [gossip.discovery] learnExistingMembers -> DEBU 23a3 Exiting" +"2019-09-24 00:25:40.713 UTC [gossip.discovery] handleAliveMessage -> DEBU 23a4 Exiting" +"2019-09-24 00:25:40.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23a5 Exiting" +"2019-09-24 00:25:40.713 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23a6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:40.713 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 23a7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:40.713 UTC [msp] DeserializeIdentity -> DEBU 23a8 Obtaining identity" +"2019-09-24 00:25:40.713 UTC [gossip.discovery] sendMemResponse -> DEBU 23a9 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:40.713 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:40.713 UTC [msp] DeserializeIdentity -> DEBU 23ab Obtaining identity" +"2019-09-24 00:25:40.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23ac Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23ad Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:40.714 UTC [policies] Evaluate -> DEBU 23ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:40.714 UTC [msp] DeserializeIdentity -> DEBU 23af Obtaining identity" +"2019-09-24 00:25:40.714 UTC [policies] Evaluate -> DEBU 23b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:40.714 UTC [policies] Evaluate -> DEBU 23b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:40.714 UTC [msp] DeserializeIdentity -> DEBU 23b2 Obtaining identity" +"2019-09-24 00:25:40.714 UTC [cauthdsl] func1 -> DEBU 23b3 0xc0043fd000 gate 1569284740714224900 evaluation starts" +"2019-09-24 00:25:40.714 UTC [cauthdsl] func2 -> DEBU 23b4 0xc0043fd000 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:40.714 UTC [cauthdsl] func2 -> DEBU 23b5 0xc0043fd000 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:40.714 UTC [gossip.comm] Send -> DEBU 23b6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:40.714 UTC [cauthdsl] func2 -> DEBU 23b7 0xc0043fd000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:40.714 UTC [cauthdsl] func2 -> DEBU 23b8 0xc0043fd000 principal evaluation fails" +"2019-09-24 00:25:40.714 UTC [cauthdsl] func1 -> DEBU 23b9 0xc0043fd000 gate 1569284740714224900 evaluation fails" +"2019-09-24 00:25:40.714 UTC [gossip.discovery] sendMemResponse -> DEBU 23ba Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020(" signature:"0E\002!\000\361\221\3410\034\271\200\274\215wc\212\362P\240\002\027u\n\353\024\256\036\357\r\001\016\004\200\033Q\334\002 V\261\326B\267\273\211#L\\\270sm\304y\371J_\025nZ\232\343\343\236\037\t\242\270\275\354\302" > alive: alive: alive: DEBU 240e Verify: sig = 00000000 30 45 02 21 00 b5 ee fd ab fa 5a 1c cf 01 c3 ae |0E.!......Z.....| +00000010 fc 7c 89 29 23 70 16 e1 4e 12 88 d5 a3 01 21 db |.|.)#p..N.....!.| +00000020 9f 66 58 1c e1 02 20 16 d9 9c ae 69 0e c0 65 64 |.fX... ....i..ed| +00000030 09 9e a6 ee 71 af 9b 2e 51 2c 74 d2 86 5f 17 33 |....q...Q,t.._.3| +00000040 ac c8 79 05 ad 34 1c |..y..4.|" +"2019-09-24 00:25:41.798 UTC [gossip.discovery] handleAliveMessage -> DEBU 240f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:41.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 2410 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:25:41.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 2411 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:41.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 2412 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:41.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 2413 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:41.798 UTC [gossip.discovery] learnExistingMembers -> DEBU 2414 Exiting" +"2019-09-24 00:25:41.798 UTC [gossip.discovery] handleAliveMessage -> DEBU 2415 Exiting" +"2019-09-24 00:25:41.798 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2416 Exiting" +"2019-09-24 00:25:41.798 UTC [gossip.discovery] sendMemResponse -> DEBU 2417 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:41.799 UTC [msp] DeserializeIdentity -> DEBU 2418 Obtaining identity" +"2019-09-24 00:25:41.799 UTC [msp] DeserializeIdentity -> DEBU 2419 Obtaining identity" +"2019-09-24 00:25:41.799 UTC [gossip.comm] Send -> DEBU 241a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:41.799 UTC [gossip.discovery] sendMemResponse -> DEBU 241b Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020)" signature:"0D\002 W\2112\3269\202\272Y\311\313\300J\363\311\306P\217\346\353\\\366\354c\220Y\323\300\177\303xE\225\002 f\005)2\366R\232\007\300\377}z\0000;\332\261^\023\241hzV4\371\007\301\334\013\027\217\247" secret_envelope: > alive: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:43.683 UTC [msp] DeserializeIdentity -> DEBU 246c Obtaining identity" +"2019-09-24 00:25:43.683 UTC [gossip.comm] Send -> DEBU 246d Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:43.683 UTC [msp] DeserializeIdentity -> DEBU 246e Obtaining identity" +"2019-09-24 00:25:43.683 UTC [gossip.comm] Send -> DEBU 246f Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:43.683 UTC [gossip.comm] sendToEndpoint -> DEBU 2470 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.683 UTC [gossip.comm] sendToEndpoint -> DEBU 2471 Exiting" +"2019-09-24 00:25:43.683 UTC [gossip.comm] sendToEndpoint -> DEBU 2472 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.683 UTC [gossip.comm] sendToEndpoint -> DEBU 2473 Exiting" +"2019-09-24 00:25:43.684 UTC [gossip.comm] sendToEndpoint -> DEBU 2474 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.684 UTC [gossip.comm] sendToEndpoint -> DEBU 2475 Exiting" +"2019-09-24 00:25:43.692 UTC [gossip.comm] func1 -> DEBU 2476 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.692 UTC [gossip.comm] func1 -> DEBU 2477 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.692 UTC [gossip.gossip] handleMessage -> DEBU 2478 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.692 UTC [gossip.pull] HandleMessage -> DEBU 2479 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.692 UTC [gossip.gossip] handleMessage -> DEBU 247a Exiting" +"2019-09-24 00:25:43.692 UTC [gossip.gossip] handleMessage -> DEBU 247b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.692 UTC [gossip.gossip] handleMessage -> DEBU 247c Exiting" +"2019-09-24 00:25:43.692 UTC [gossip.discovery] handleMsgFromComm -> DEBU 247d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.693 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 247e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:43.693 UTC [msp.identity] Verify -> DEBU 247f Verify: digest = 00000000 45 1b 82 8e 93 b8 86 5b fb 88 a9 8e 14 11 21 16 |E......[......!.| +00000010 98 be 42 94 65 cb 2f ec b8 79 2b f1 94 9d 1a 25 |..B.e./..y+....%|" +"2019-09-24 00:25:43.693 UTC [msp.identity] Verify -> DEBU 2480 Verify: sig = 00000000 30 45 02 21 00 c6 1a 00 13 43 bf 3c 8b 45 52 7e |0E.!.....C.<.ER~| +00000010 16 6a 97 0a 5a d8 37 15 8a 2c 67 1d 45 ee 27 e7 |.j..Z.7..,g.E.'.| +00000020 05 3c c7 69 79 02 20 59 d1 07 50 e5 cb 8d 81 7e |.<.iy. Y..P....~| +00000030 ef 8c 91 6c 87 09 ce a4 38 1a 95 99 d3 51 5b 2b |...l....8....Q[+| +00000040 ff cb be aa 88 d5 4f |......O|" +"2019-09-24 00:25:43.693 UTC [msp.identity] Verify -> DEBU 2481 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:43.693 UTC [msp.identity] Verify -> DEBU 2482 Verify: sig = 00000000 30 45 02 21 00 ff ce 6e 50 c9 49 a4 6d 9e 47 eb |0E.!...nP.I.m.G.| +00000010 3c f3 0e 8b e8 f0 10 5d 7d 40 eb 19 d5 16 ad 98 |<......]}@......| +00000020 95 81 b8 45 72 02 20 33 0f 85 3c e0 7f 16 76 49 |...Er. 3..<...vI| +00000030 91 d9 71 de a5 9b de 61 c4 4b c5 9f 69 f9 7a b6 |..q....a.K..i.z.| +00000040 97 22 f3 23 19 23 a7 |.".#.#.|" +"2019-09-24 00:25:43.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 2483 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:43.693 UTC [gossip.discovery] isSentByMe -> DEBU 2484 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:43.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 2485 Exiting" +"2019-09-24 00:25:43.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2486 Exiting" +"2019-09-24 00:25:43.697 UTC [gossip.gossip] handleMessage -> DEBU 2487 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.697 UTC [gossip.pull] HandleMessage -> DEBU 2488 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.697 UTC [gossip.gossip] handleMessage -> DEBU 2489 Exiting" +"2019-09-24 00:25:43.697 UTC [gossip.gossip] handleMessage -> DEBU 248a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.697 UTC [gossip.gossip] handleMessage -> DEBU 248b Exiting" +"2019-09-24 00:25:43.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 248c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.697 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 248d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:43.697 UTC [msp.identity] Verify -> DEBU 248e Verify: digest = 00000000 45 1b 82 8e 93 b8 86 5b fb 88 a9 8e 14 11 21 16 |E......[......!.| +00000010 98 be 42 94 65 cb 2f ec b8 79 2b f1 94 9d 1a 25 |..B.e./..y+....%|" +"2019-09-24 00:25:43.697 UTC [msp.identity] Verify -> DEBU 248f Verify: sig = 00000000 30 45 02 21 00 c6 1a 00 13 43 bf 3c 8b 45 52 7e |0E.!.....C.<.ER~| +00000010 16 6a 97 0a 5a d8 37 15 8a 2c 67 1d 45 ee 27 e7 |.j..Z.7..,g.E.'.| +00000020 05 3c c7 69 79 02 20 59 d1 07 50 e5 cb 8d 81 7e |.<.iy. Y..P....~| +00000030 ef 8c 91 6c 87 09 ce a4 38 1a 95 99 d3 51 5b 2b |...l....8....Q[+| +00000040 ff cb be aa 88 d5 4f |......O|" +"2019-09-24 00:25:43.697 UTC [gossip.discovery] handleAliveMessage -> DEBU 2490 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:43.697 UTC [gossip.discovery] isSentByMe -> DEBU 2491 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:43.698 UTC [gossip.discovery] handleAliveMessage -> DEBU 2492 Exiting" +"2019-09-24 00:25:43.698 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2493 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:43.698 UTC [msp] DeserializeIdentity -> DEBU 2494 Obtaining identity" +"2019-09-24 00:25:43.698 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2495 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:43.698 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2496 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:43.698 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2497 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:43.698 UTC [policies] Evaluate -> DEBU 2498 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:43.698 UTC [policies] Evaluate -> DEBU 2499 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:43.698 UTC [policies] Evaluate -> DEBU 249a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:43.698 UTC [cauthdsl] func1 -> DEBU 249b 0xc0044e14d0 gate 1569284743698664500 evaluation starts" +"2019-09-24 00:25:43.698 UTC [cauthdsl] func2 -> DEBU 249c 0xc0044e14d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:43.698 UTC [cauthdsl] func2 -> DEBU 249d 0xc0044e14d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:43.699 UTC [cauthdsl] func2 -> DEBU 249e 0xc0044e14d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:43.700 UTC [cauthdsl] func2 -> DEBU 24a0 0xc0044e14d0 principal evaluation fails" +"2019-09-24 00:25:43.701 UTC [cauthdsl] func1 -> DEBU 24a1 0xc0044e14d0 gate 1569284743698664500 evaluation fails" +"2019-09-24 00:25:43.702 UTC [policies] Evaluate -> DEBU 24a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:43.702 UTC [policies] Evaluate -> DEBU 24a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:43.702 UTC [policies] Evaluate -> DEBU 24a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:43.702 UTC [cauthdsl] func1 -> DEBU 24a5 0xc0044e1d10 gate 1569284743702567100 evaluation starts" +"2019-09-24 00:25:43.702 UTC [cauthdsl] func2 -> DEBU 24a6 0xc0044e1d10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:43.702 UTC [cauthdsl] func2 -> DEBU 24a7 0xc0044e1d10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:43.703 UTC [cauthdsl] func2 -> DEBU 24a8 0xc0044e1d10 principal matched by identity 0" +"2019-09-24 00:25:43.703 UTC [msp.identity] Verify -> DEBU 24a9 Verify: digest = 00000000 f8 6d c3 bb e3 d6 18 83 9b 5f 3e 08 e5 72 6b 60 |.m......._>..rk`| +00000010 b5 ec f0 28 02 c1 85 34 cf b1 30 de f7 3b 85 84 |...(...4..0..;..|" +"2019-09-24 00:25:43.703 UTC [msp.identity] Verify -> DEBU 24aa Verify: sig = 00000000 30 45 02 21 00 dc 79 43 ca 09 57 c1 ea 31 31 d8 |0E.!..yC..W..11.| +00000010 7f b0 41 57 14 bd 71 b7 de da 45 e3 5e 07 c8 a8 |..AW..q...E.^...| +00000020 19 ce 14 d5 92 02 20 6a b8 78 88 66 c8 fd 3a 9d |...... j.x.f..:.| +00000030 32 e1 21 cd 03 d9 4f 6f e9 e7 ff 2c cd f6 2c a3 |2.!...Oo...,..,.| +00000040 97 bd 85 09 f0 c4 ea |.......|" +"2019-09-24 00:25:43.699 UTC [gossip.comm] func1 -> DEBU 249f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.704 UTC [gossip.gossip] handleMessage -> DEBU 24ab Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.704 UTC [cauthdsl] func2 -> DEBU 24ac 0xc0044e1d10 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:43.704 UTC [cauthdsl] func1 -> DEBU 24ad 0xc0044e1d10 gate 1569284743702567100 evaluation succeeds" +"2019-09-24 00:25:43.704 UTC [policies] Evaluate -> DEBU 24ae Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:43.704 UTC [policies] Evaluate -> DEBU 24af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:43.704 UTC [policies] Evaluate -> DEBU 24b0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:43.704 UTC [policies] Evaluate -> DEBU 24b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:43.704 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:43.704 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b3 Exiting" +"2019-09-24 00:25:43.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b4 Exiting" +"2019-09-24 00:25:43.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.705 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24b6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:43.705 UTC [gossip.gossip] handleMessage -> DEBU 24b7 Exiting" +"2019-09-24 00:25:43.705 UTC [msp.identity] Verify -> DEBU 24b8 Verify: digest = 00000000 45 1b 82 8e 93 b8 86 5b fb 88 a9 8e 14 11 21 16 |E......[......!.| +00000010 98 be 42 94 65 cb 2f ec b8 79 2b f1 94 9d 1a 25 |..B.e./..y+....%|" +"2019-09-24 00:25:43.705 UTC [msp.identity] Verify -> DEBU 24b9 Verify: sig = 00000000 30 45 02 21 00 c6 1a 00 13 43 bf 3c 8b 45 52 7e |0E.!.....C.<.ER~| +00000010 16 6a 97 0a 5a d8 37 15 8a 2c 67 1d 45 ee 27 e7 |.j..Z.7..,g.E.'.| +00000020 05 3c c7 69 79 02 20 59 d1 07 50 e5 cb 8d 81 7e |.<.iy. Y..P....~| +00000030 ef 8c 91 6c 87 09 ce a4 38 1a 95 99 d3 51 5b 2b |...l....8....Q[+| +00000040 ff cb be aa 88 d5 4f |......O|" +"2019-09-24 00:25:43.705 UTC [gossip.discovery] handleAliveMessage -> DEBU 24ba Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:43.705 UTC [gossip.discovery] isSentByMe -> DEBU 24bb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:43.705 UTC [gossip.discovery] handleAliveMessage -> DEBU 24bc Exiting" +"2019-09-24 00:25:43.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24bd Exiting" +"2019-09-24 00:25:43.935 UTC [gossip.gossip] handleMessage -> DEBU 24be Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.936 UTC [gossip.pull] HandleMessage -> DEBU 24bf GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c0 Obtaining identity" +"2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c1 Obtaining identity" +"2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c2 Obtaining identity" +"2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c3 Obtaining identity" +"2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c4 Obtaining identity" +"2019-09-24 00:25:43.936 UTC [msp] DeserializeIdentity -> DEBU 24c5 Obtaining identity" +"2019-09-24 00:25:43.936 UTC [gossip.pull] SendDigest -> DEBU 24c6 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:43.936 UTC [gossip.gossip] handleMessage -> DEBU 24c7 Exiting" +"2019-09-24 00:25:43.956 UTC [gossip.gossip] handleMessage -> DEBU 24c8 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.959 UTC [gossip.gossip] handleMessage -> DEBU 24c9 Exiting" +"2019-09-24 00:25:43.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24ca Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:43.959 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24cb Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:43.959 UTC [msp] DeserializeIdentity -> DEBU 24cc Obtaining identity" +"2019-09-24 00:25:43.959 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24cd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:43.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24ce Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:43.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24cf Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:43.959 UTC [policies] Evaluate -> DEBU 24d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:43.959 UTC [policies] Evaluate -> DEBU 24d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:43.959 UTC [policies] Evaluate -> DEBU 24d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:43.959 UTC [cauthdsl] func1 -> DEBU 24d3 0xc00450d150 gate 1569284743959873900 evaluation starts" +"2019-09-24 00:25:43.959 UTC [cauthdsl] func2 -> DEBU 24d4 0xc00450d150 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:43.959 UTC [cauthdsl] func2 -> DEBU 24d5 0xc00450d150 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24d6 0xc00450d150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24d7 0xc00450d150 principal evaluation fails" +"2019-09-24 00:25:43.960 UTC [cauthdsl] func1 -> DEBU 24d8 0xc00450d150 gate 1569284743959873900 evaluation fails" +"2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24d9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:43.960 UTC [cauthdsl] func1 -> DEBU 24dc 0xc00450d990 gate 1569284743960284500 evaluation starts" +"2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24dd 0xc00450d990 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24de 0xc00450d990 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24df 0xc00450d990 principal matched by identity 0" +"2019-09-24 00:25:43.960 UTC [msp.identity] Verify -> DEBU 24e0 Verify: digest = 00000000 db 86 45 bb 27 d4 f8 e4 06 39 11 36 9c c6 15 48 |..E.'....9.6...H| +00000010 b2 b8 59 61 c3 43 5d 4c 0a e3 09 0c b1 ba 9b b9 |..Ya.C]L........|" +"2019-09-24 00:25:43.960 UTC [msp.identity] Verify -> DEBU 24e1 Verify: sig = 00000000 30 44 02 20 09 48 76 a0 d1 8b 51 7b 6b fd 34 a2 |0D. .Hv...Q{k.4.| +00000010 22 53 bd 03 a9 9e 5b 70 0a 3c 1a de 26 e2 51 5d |"S....[p.<..&.Q]| +00000020 18 c5 e3 ba 02 20 49 e9 e3 09 6b 50 e0 8e 7f 4d |..... I...kP...M| +00000030 5f 73 97 62 b6 6d 4b 50 ea 90 ef d1 c5 04 f8 f8 |_s.b.mKP........| +00000040 92 a2 ef c9 76 c6 |....v.|" +"2019-09-24 00:25:43.960 UTC [cauthdsl] func2 -> DEBU 24e2 0xc00450d990 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:43.960 UTC [cauthdsl] func1 -> DEBU 24e3 0xc00450d990 gate 1569284743960284500 evaluation succeeds" +"2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24e4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24e6 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:43.960 UTC [policies] Evaluate -> DEBU 24e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:43.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 24e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:43.961 UTC [gossip.discovery] learnExistingMembers -> DEBU 24e9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:43.961 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ea updating membership: timestamp: " +"2019-09-24 00:25:43.961 UTC [gossip.discovery] learnExistingMembers -> DEBU 24eb Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:43.961 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ec Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:43.961 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ed Exiting" +"2019-09-24 00:25:43.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 24ee Exiting" +"2019-09-24 00:25:43.961 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24ef Exiting" +"2019-09-24 00:25:43.961 UTC [gossip.discovery] sendMemResponse -> DEBU 24f0 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:43.961 UTC [msp] DeserializeIdentity -> DEBU 24f1 Obtaining identity" +"2019-09-24 00:25:43.961 UTC [msp] DeserializeIdentity -> DEBU 24f2 Obtaining identity" +"2019-09-24 00:25:43.962 UTC [msp] DeserializeIdentity -> DEBU 24f3 Obtaining identity" +"2019-09-24 00:25:43.962 UTC [gossip.comm] Send -> DEBU 24f4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:43.962 UTC [gossip.discovery] sendMemResponse -> DEBU 24f5 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020*" signature:"0D\002 \013\177\263\3528\345\245\303\255|d?\330\343\326\364c\271\332CK08\032I2U(\357\023\270\010\002 N\215\236\033\223\267Z&\357#\303\370\310\364\"\253Z%\345\374Z\000\035\364\311\237U\335\313\027\005\260" > alive: alive: alive: DEBU 251a 0xc00453efe0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:44.157 UTC [cauthdsl] func1 -> DEBU 251b 0xc00453efe0 gate 1569284744156726600 evaluation succeeds" +"2019-09-24 00:25:44.157 UTC [policies] Evaluate -> DEBU 251c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.157 UTC [policies] Evaluate -> DEBU 251d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.157 UTC [policies] Evaluate -> DEBU 251e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:44.157 UTC [policies] Evaluate -> DEBU 251f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:44.157 UTC [msp.identity] Verify -> DEBU 2520 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:44.157 UTC [msp.identity] Verify -> DEBU 2521 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:44.158 UTC [msp.identity] Verify -> DEBU 2522 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:44.158 UTC [msp.identity] Verify -> DEBU 2523 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:44.158 UTC [msp] DeserializeIdentity -> DEBU 2524 Obtaining identity" +"2019-09-24 00:25:44.158 UTC [msp] DeserializeIdentity -> DEBU 2525 Obtaining identity" +"2019-09-24 00:25:44.158 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2526 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:44.158 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2527 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.158 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2528 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.158 UTC [policies] Evaluate -> DEBU 2529 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:44.158 UTC [policies] Evaluate -> DEBU 252a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:44.158 UTC [policies] Evaluate -> DEBU 252b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:44.158 UTC [cauthdsl] func1 -> DEBU 252c 0xc0045575f0 gate 1569284744158867900 evaluation starts" +"2019-09-24 00:25:44.158 UTC [cauthdsl] func2 -> DEBU 252d 0xc0045575f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.158 UTC [cauthdsl] func2 -> DEBU 252e 0xc0045575f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.158 UTC [cauthdsl] func2 -> DEBU 252f 0xc0045575f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:44.159 UTC [cauthdsl] func2 -> DEBU 2530 0xc0045575f0 principal evaluation fails" +"2019-09-24 00:25:44.159 UTC [cauthdsl] func1 -> DEBU 2531 0xc0045575f0 gate 1569284744158867900 evaluation fails" +"2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 2532 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 2533 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 2534 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:44.159 UTC [cauthdsl] func1 -> DEBU 2535 0xc004557e30 gate 1569284744159198600 evaluation starts" +"2019-09-24 00:25:44.159 UTC [cauthdsl] func2 -> DEBU 2536 0xc004557e30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.159 UTC [cauthdsl] func2 -> DEBU 2537 0xc004557e30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.159 UTC [cauthdsl] func2 -> DEBU 2538 0xc004557e30 principal matched by identity 0" +"2019-09-24 00:25:44.159 UTC [msp.identity] Verify -> DEBU 2539 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:44.159 UTC [msp.identity] Verify -> DEBU 253a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:44.159 UTC [cauthdsl] func2 -> DEBU 253b 0xc004557e30 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:44.159 UTC [cauthdsl] func1 -> DEBU 253c 0xc004557e30 gate 1569284744159198600 evaluation succeeds" +"2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 253d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 253e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 253f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:44.159 UTC [policies] Evaluate -> DEBU 2540 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:44.159 UTC [gossip.gossip] handleMessage -> DEBU 2541 Exiting" +"2019-09-24 00:25:44.159 UTC [gossip.comm] func1 -> DEBU 2542 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.160 UTC [gossip.gossip] handleMessage -> DEBU 2543 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.160 UTC [msp.identity] Verify -> DEBU 2544 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:44.160 UTC [msp.identity] Verify -> DEBU 2545 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:44.160 UTC [msp.identity] Verify -> DEBU 2546 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:44.160 UTC [msp.identity] Verify -> DEBU 2547 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:44.161 UTC [msp] DeserializeIdentity -> DEBU 2548 Obtaining identity" +"2019-09-24 00:25:44.161 UTC [msp] DeserializeIdentity -> DEBU 2549 Obtaining identity" +"2019-09-24 00:25:44.161 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 254a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:44.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 254b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 254c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.161 UTC [policies] Evaluate -> DEBU 254d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:44.161 UTC [policies] Evaluate -> DEBU 254e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:44.161 UTC [policies] Evaluate -> DEBU 254f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:44.161 UTC [cauthdsl] func1 -> DEBU 2550 0xc0045887e0 gate 1569284744161648400 evaluation starts" +"2019-09-24 00:25:44.161 UTC [cauthdsl] func2 -> DEBU 2551 0xc0045887e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.161 UTC [cauthdsl] func2 -> DEBU 2552 0xc0045887e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.161 UTC [cauthdsl] func2 -> DEBU 2553 0xc0045887e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:44.161 UTC [cauthdsl] func2 -> DEBU 2554 0xc0045887e0 principal evaluation fails" +"2019-09-24 00:25:44.161 UTC [cauthdsl] func1 -> DEBU 2555 0xc0045887e0 gate 1569284744161648400 evaluation fails" +"2019-09-24 00:25:44.161 UTC [policies] Evaluate -> DEBU 2556 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.161 UTC [policies] Evaluate -> DEBU 2557 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.162 UTC [policies] Evaluate -> DEBU 2558 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:44.162 UTC [cauthdsl] func1 -> DEBU 2559 0xc004589020 gate 1569284744162078900 evaluation starts" +"2019-09-24 00:25:44.162 UTC [cauthdsl] func2 -> DEBU 255a 0xc004589020 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.162 UTC [cauthdsl] func2 -> DEBU 255b 0xc004589020 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.162 UTC [cauthdsl] func2 -> DEBU 255c 0xc004589020 principal matched by identity 0" +"2019-09-24 00:25:44.162 UTC [msp.identity] Verify -> DEBU 255d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:44.162 UTC [msp.identity] Verify -> DEBU 255e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:44.162 UTC [cauthdsl] func2 -> DEBU 255f 0xc004589020 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:44.162 UTC [cauthdsl] func1 -> DEBU 2560 0xc004589020 gate 1569284744162078900 evaluation succeeds" +"2019-09-24 00:25:44.162 UTC [policies] Evaluate -> DEBU 2561 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.162 UTC [policies] Evaluate -> DEBU 2562 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.162 UTC [policies] Evaluate -> DEBU 2563 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:44.162 UTC [policies] Evaluate -> DEBU 2564 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:44.175 UTC [gossip.comm] func1 -> DEBU 2565 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.175 UTC [msp] DeserializeIdentity -> DEBU 2566 Obtaining identity" +"2019-09-24 00:25:44.176 UTC [msp] DeserializeIdentity -> DEBU 2567 Obtaining identity" +"2019-09-24 00:25:44.176 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2568 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:44.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2569 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 256a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.176 UTC [policies] Evaluate -> DEBU 256b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:44.176 UTC [policies] Evaluate -> DEBU 256c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:44.176 UTC [policies] Evaluate -> DEBU 256d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:44.176 UTC [cauthdsl] func1 -> DEBU 256e 0xc00459c7f0 gate 1569284744176897400 evaluation starts" +"2019-09-24 00:25:44.176 UTC [cauthdsl] func2 -> DEBU 256f 0xc00459c7f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 2570 0xc00459c7f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 2571 0xc00459c7f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 2572 0xc00459c7f0 principal evaluation fails" +"2019-09-24 00:25:44.177 UTC [cauthdsl] func1 -> DEBU 2573 0xc00459c7f0 gate 1569284744176897400 evaluation fails" +"2019-09-24 00:25:44.177 UTC [policies] Evaluate -> DEBU 2574 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.177 UTC [policies] Evaluate -> DEBU 2575 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.177 UTC [policies] Evaluate -> DEBU 2576 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:44.177 UTC [cauthdsl] func1 -> DEBU 2577 0xc00459d030 gate 1569284744177347500 evaluation starts" +"2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 2578 0xc00459d030 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 2579 0xc00459d030 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.177 UTC [cauthdsl] func2 -> DEBU 257a 0xc00459d030 principal matched by identity 0" +"2019-09-24 00:25:44.177 UTC [msp.identity] Verify -> DEBU 257b Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:44.178 UTC [msp.identity] Verify -> DEBU 257c Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:44.178 UTC [cauthdsl] func2 -> DEBU 257d 0xc00459d030 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:44.179 UTC [cauthdsl] func1 -> DEBU 257e 0xc00459d030 gate 1569284744177347500 evaluation succeeds" +"2019-09-24 00:25:44.179 UTC [policies] Evaluate -> DEBU 257f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.179 UTC [policies] Evaluate -> DEBU 2580 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.179 UTC [policies] Evaluate -> DEBU 2581 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:44.179 UTC [policies] Evaluate -> DEBU 2582 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:44.179 UTC [gossip.gossip] handleMessage -> DEBU 2583 Exiting" +"2019-09-24 00:25:44.179 UTC [gossip.gossip] handleMessage -> DEBU 2584 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.179 UTC [msp] DeserializeIdentity -> DEBU 2585 Obtaining identity" +"2019-09-24 00:25:44.180 UTC [msp] DeserializeIdentity -> DEBU 2586 Obtaining identity" +"2019-09-24 00:25:44.180 UTC [msp] DeserializeIdentity -> DEBU 2587 Obtaining identity" +"2019-09-24 00:25:44.181 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2588 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:44.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2589 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 258a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.181 UTC [policies] Evaluate -> DEBU 258b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:44.181 UTC [policies] Evaluate -> DEBU 258c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:44.181 UTC [policies] Evaluate -> DEBU 258d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:44.182 UTC [cauthdsl] func1 -> DEBU 258e 0xc0045b0b40 gate 1569284744182143000 evaluation starts" +"2019-09-24 00:25:44.182 UTC [cauthdsl] func2 -> DEBU 258f 0xc0045b0b40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.182 UTC [cauthdsl] func2 -> DEBU 2590 0xc0045b0b40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.182 UTC [cauthdsl] func2 -> DEBU 2591 0xc0045b0b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:44.182 UTC [cauthdsl] func2 -> DEBU 2592 0xc0045b0b40 principal evaluation fails" +"2019-09-24 00:25:44.182 UTC [cauthdsl] func1 -> DEBU 2593 0xc0045b0b40 gate 1569284744182143000 evaluation fails" +"2019-09-24 00:25:44.183 UTC [policies] Evaluate -> DEBU 2594 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.183 UTC [policies] Evaluate -> DEBU 2595 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.183 UTC [policies] Evaluate -> DEBU 2596 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:44.184 UTC [cauthdsl] func1 -> DEBU 2597 0xc0045b1380 gate 1569284744184134300 evaluation starts" +"2019-09-24 00:25:44.184 UTC [cauthdsl] func2 -> DEBU 2598 0xc0045b1380 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.184 UTC [cauthdsl] func2 -> DEBU 2599 0xc0045b1380 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.184 UTC [cauthdsl] func2 -> DEBU 259a 0xc0045b1380 principal matched by identity 0" +"2019-09-24 00:25:44.185 UTC [msp.identity] Verify -> DEBU 259b Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:44.185 UTC [msp.identity] Verify -> DEBU 259c Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:44.186 UTC [cauthdsl] func2 -> DEBU 259d 0xc0045b1380 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:44.186 UTC [cauthdsl] func1 -> DEBU 259e 0xc0045b1380 gate 1569284744184134300 evaluation succeeds" +"2019-09-24 00:25:44.187 UTC [policies] Evaluate -> DEBU 259f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.187 UTC [policies] Evaluate -> DEBU 25a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.187 UTC [policies] Evaluate -> DEBU 25a1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:44.187 UTC [policies] Evaluate -> DEBU 25a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:44.188 UTC [msp.identity] Verify -> DEBU 25a3 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:44.188 UTC [msp.identity] Verify -> DEBU 25a4 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:44.189 UTC [msp] DeserializeIdentity -> DEBU 25a5 Obtaining identity" +"2019-09-24 00:25:44.192 UTC [msp] DeserializeIdentity -> DEBU 25a6 Obtaining identity" +"2019-09-24 00:25:44.192 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:44.193 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25a8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.193 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25a9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.193 UTC [policies] Evaluate -> DEBU 25aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:44.193 UTC [policies] Evaluate -> DEBU 25ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:44.193 UTC [policies] Evaluate -> DEBU 25ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:44.194 UTC [cauthdsl] func1 -> DEBU 25ad 0xc0045c9270 gate 1569284744193865400 evaluation starts" +"2019-09-24 00:25:44.194 UTC [cauthdsl] func2 -> DEBU 25ae 0xc0045c9270 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.194 UTC [cauthdsl] func2 -> DEBU 25af 0xc0045c9270 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.194 UTC [cauthdsl] func2 -> DEBU 25b0 0xc0045c9270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:44.195 UTC [cauthdsl] func2 -> DEBU 25b1 0xc0045c9270 principal evaluation fails" +"2019-09-24 00:25:44.195 UTC [cauthdsl] func1 -> DEBU 25b2 0xc0045c9270 gate 1569284744193865400 evaluation fails" +"2019-09-24 00:25:44.195 UTC [policies] Evaluate -> DEBU 25b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.195 UTC [policies] Evaluate -> DEBU 25b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.195 UTC [policies] Evaluate -> DEBU 25b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:44.195 UTC [cauthdsl] func1 -> DEBU 25b6 0xc0045c9ab0 gate 1569284744195835300 evaluation starts" +"2019-09-24 00:25:44.195 UTC [cauthdsl] func2 -> DEBU 25b7 0xc0045c9ab0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.195 UTC [cauthdsl] func2 -> DEBU 25b8 0xc0045c9ab0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.195 UTC [cauthdsl] func2 -> DEBU 25b9 0xc0045c9ab0 principal matched by identity 0" +"2019-09-24 00:25:44.196 UTC [msp.identity] Verify -> DEBU 25ba Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:44.196 UTC [msp.identity] Verify -> DEBU 25bb Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:44.196 UTC [cauthdsl] func2 -> DEBU 25bc 0xc0045c9ab0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:44.196 UTC [cauthdsl] func1 -> DEBU 25bd 0xc0045c9ab0 gate 1569284744195835300 evaluation succeeds" +"2019-09-24 00:25:44.196 UTC [policies] Evaluate -> DEBU 25be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.196 UTC [policies] Evaluate -> DEBU 25bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.196 UTC [policies] Evaluate -> DEBU 25c0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:44.196 UTC [policies] Evaluate -> DEBU 25c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:44.196 UTC [msp.identity] Verify -> DEBU 25c2 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:44.196 UTC [msp.identity] Verify -> DEBU 25c3 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:44.197 UTC [gossip.gossip] handleMessage -> DEBU 25c4 Exiting" +"2019-09-24 00:25:44.262 UTC [msp] DeserializeIdentity -> DEBU 25c5 Obtaining identity" +"2019-09-24 00:25:44.262 UTC [msp] DeserializeIdentity -> DEBU 25c6 Obtaining identity" +"2019-09-24 00:25:44.262 UTC [gossip.pull] Hello -> DEBU 25c7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:44.264 UTC [msp] DeserializeIdentity -> DEBU 25c8 Obtaining identity" +"2019-09-24 00:25:44.264 UTC [msp] DeserializeIdentity -> DEBU 25c9 Obtaining identity" +"2019-09-24 00:25:44.265 UTC [gossip.comm] Send -> DEBU 25ca Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 25cb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 25cc Exiting" +"2019-09-24 00:25:44.275 UTC [gossip.comm] func1 -> DEBU 25cd Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.275 UTC [gossip.gossip] handleMessage -> DEBU 25ce Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.275 UTC [gossip.pull] HandleMessage -> DEBU 25cf GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.275 UTC [gossip.gossip] handleMessage -> DEBU 25d0 Exiting" +"2019-09-24 00:25:44.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 25d1 Obtaining default signing identity" +"2019-09-24 00:25:44.608 UTC [msp.identity] Sign -> DEBU 25d2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151027 " +"2019-09-24 00:25:44.608 UTC [msp.identity] Sign -> DEBU 25d3 Sign: digest: 89B587F588131632447AA836EF0FC948EDF3E31E434253A9367C8D26DB848E6C " +"2019-09-24 00:25:44.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 25d4 Obtaining default signing identity" +"2019-09-24 00:25:44.608 UTC [msp.identity] Sign -> DEBU 25d5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:44.608 UTC [msp.identity] Sign -> DEBU 25d6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:44.608 UTC [gossip.discovery] periodicalSendAlive -> DEBU 25d7 Sleeping 5s" +"2019-09-24 00:25:44.618 UTC [msp] DeserializeIdentity -> DEBU 25d8 Obtaining identity" +"2019-09-24 00:25:44.618 UTC [msp] DeserializeIdentity -> DEBU 25d9 Obtaining identity" +"2019-09-24 00:25:44.618 UTC [gossip.comm] Send -> DEBU 25da Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:44.618 UTC [msp] DeserializeIdentity -> DEBU 25db Obtaining identity" +"2019-09-24 00:25:44.619 UTC [gossip.comm] Send -> DEBU 25dc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:44.619 UTC [msp] DeserializeIdentity -> DEBU 25dd Obtaining identity" +"2019-09-24 00:25:44.619 UTC [gossip.comm] Send -> DEBU 25de Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:44.619 UTC [gossip.comm] sendToEndpoint -> DEBU 25df Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.619 UTC [gossip.comm] sendToEndpoint -> DEBU 25e0 Exiting" +"2019-09-24 00:25:44.620 UTC [gossip.comm] sendToEndpoint -> DEBU 25e1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.620 UTC [gossip.comm] sendToEndpoint -> DEBU 25e2 Exiting" +"2019-09-24 00:25:44.620 UTC [gossip.comm] sendToEndpoint -> DEBU 25e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.620 UTC [gossip.comm] sendToEndpoint -> DEBU 25e4 Exiting" +"2019-09-24 00:25:44.634 UTC [gossip.comm] func1 -> DEBU 25e5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.634 UTC [gossip.gossip] handleMessage -> DEBU 25e6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.634 UTC [gossip.gossip] handleMessage -> DEBU 25e7 Exiting" +"2019-09-24 00:25:44.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25e8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25e9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:44.635 UTC [msp.identity] Verify -> DEBU 25ea Verify: digest = 00000000 89 b5 87 f5 88 13 16 32 44 7a a8 36 ef 0f c9 48 |.......2Dz.6...H| +00000010 ed f3 e3 1e 43 42 53 a9 36 7c 8d 26 db 84 8e 6c |....CBS.6|.&...l|" +"2019-09-24 00:25:44.635 UTC [msp.identity] Verify -> DEBU 25eb Verify: sig = 00000000 30 44 02 20 2a 99 60 a1 bb 91 80 57 f7 3a c5 bc |0D. *.`....W.:..| +00000010 bc b1 94 a4 61 bb 8d df ba da 14 29 7e 06 ee a0 |....a......)~...| +00000020 34 34 90 8b 02 20 16 19 37 2c ad bf 5e a9 95 4d |44... ..7,..^..M| +00000030 81 67 09 3a b0 a0 cc e5 d7 f4 b7 8b f0 cf c1 36 |.g.:...........6| +00000040 be 19 28 44 37 f3 |..(D7.|" +"2019-09-24 00:25:44.636 UTC [gossip.discovery] isSentByMe -> DEBU 25ec Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.636 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25ed Exiting" +"2019-09-24 00:25:44.648 UTC [gossip.comm] func1 -> DEBU 25ee Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.648 UTC [gossip.gossip] handleMessage -> DEBU 25ef Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.649 UTC [msp] DeserializeIdentity -> DEBU 25f0 Obtaining identity" +"2019-09-24 00:25:44.649 UTC [msp] DeserializeIdentity -> DEBU 25f1 Obtaining identity" +"2019-09-24 00:25:44.649 UTC [gossip.gossip] handleMessage -> DEBU 25f2 Exiting" +"2019-09-24 00:25:44.690 UTC [gossip.comm] func1 -> DEBU 25f3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.690 UTC [gossip.gossip] handleMessage -> DEBU 25f4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25f5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.691 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25f6 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:44.691 UTC [msp] DeserializeIdentity -> DEBU 25f7 Obtaining identity" +"2019-09-24 00:25:44.691 UTC [gossip.gossip] handleMessage -> DEBU 25f8 Exiting" +"2019-09-24 00:25:44.691 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:44.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25fa Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25fb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.691 UTC [policies] Evaluate -> DEBU 25fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:44.691 UTC [policies] Evaluate -> DEBU 25fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:44.691 UTC [policies] Evaluate -> DEBU 25fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:44.691 UTC [cauthdsl] func1 -> DEBU 25ff 0xc004622730 gate 1569284744691971800 evaluation starts" +"2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 2600 0xc004622730 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 2601 0xc004622730 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 2602 0xc004622730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 2603 0xc004622730 principal evaluation fails" +"2019-09-24 00:25:44.692 UTC [cauthdsl] func1 -> DEBU 2604 0xc004622730 gate 1569284744691971800 evaluation fails" +"2019-09-24 00:25:44.692 UTC [policies] Evaluate -> DEBU 2605 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.692 UTC [policies] Evaluate -> DEBU 2606 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.692 UTC [policies] Evaluate -> DEBU 2607 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:44.692 UTC [cauthdsl] func1 -> DEBU 2608 0xc004622f70 gate 1569284744692544200 evaluation starts" +"2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 2609 0xc004622f70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 260a 0xc004622f70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 260b 0xc004622f70 principal matched by identity 0" +"2019-09-24 00:25:44.692 UTC [msp.identity] Verify -> DEBU 260c Verify: digest = 00000000 e7 db be cb e9 89 4c 15 9f 00 39 33 f5 a5 c3 df |......L...93....| +00000010 3b 4b d8 b8 05 5f 87 68 b6 11 3a 1b e0 16 15 87 |;K..._.h..:.....|" +"2019-09-24 00:25:44.692 UTC [msp.identity] Verify -> DEBU 260d Verify: sig = 00000000 30 45 02 21 00 c7 6e d2 1a 94 39 12 b7 57 c1 3a |0E.!..n...9..W.:| +00000010 d6 85 ac 08 2d de 69 c3 61 b7 19 e3 76 a4 ed 49 |....-.i.a...v..I| +00000020 a3 e2 67 6f e1 02 20 34 74 38 93 fd 3b 68 62 06 |..go.. 4t8..;hb.| +00000030 8b 94 c3 86 c4 08 8b 6d f4 92 fa 87 8a d0 fe 31 |.......m.......1| +00000040 82 d8 50 ee 7c 5c f4 |..P.|\.|" +"2019-09-24 00:25:44.692 UTC [cauthdsl] func2 -> DEBU 260e 0xc004622f70 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:44.693 UTC [cauthdsl] func1 -> DEBU 260f 0xc004622f70 gate 1569284744692544200 evaluation succeeds" +"2019-09-24 00:25:44.693 UTC [policies] Evaluate -> DEBU 2610 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.693 UTC [policies] Evaluate -> DEBU 2611 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.693 UTC [policies] Evaluate -> DEBU 2612 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:44.693 UTC [policies] Evaluate -> DEBU 2613 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:44.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 2614 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:44.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2615 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:44.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2616 updating membership: timestamp: " +"2019-09-24 00:25:44.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2617 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:44.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2618 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:44.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2619 Exiting" +"2019-09-24 00:25:44.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 261a Exiting" +"2019-09-24 00:25:44.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 261b Exiting" +"2019-09-24 00:25:44.694 UTC [gossip.discovery] sendMemResponse -> DEBU 261c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:44.694 UTC [msp] DeserializeIdentity -> DEBU 261d Obtaining identity" +"2019-09-24 00:25:44.694 UTC [msp] DeserializeIdentity -> DEBU 261e Obtaining identity" +"2019-09-24 00:25:44.697 UTC [msp] DeserializeIdentity -> DEBU 261f Obtaining identity" +"2019-09-24 00:25:44.697 UTC [gossip.comm] Send -> DEBU 2620 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:44.697 UTC [gossip.discovery] sendMemResponse -> DEBU 2621 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020*" signature:"0D\002 \013\177\263\3528\345\245\303\255|d?\330\343\326\364c\271\332CK08\032I2U(\357\023\270\010\002 N\215\236\033\223\267Z&\357#\303\370\310\364\"\253Z%\345\374Z\000\035\364\311\237U\335\313\027\005\260" > alive: alive: alive: " +"2019-09-24 00:25:44.698 UTC [gossip.comm] sendToEndpoint -> DEBU 2622 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.698 UTC [gossip.comm] sendToEndpoint -> DEBU 2623 Exiting" +"2019-09-24 00:25:44.717 UTC [gossip.comm] func1 -> DEBU 2624 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.718 UTC [gossip.gossip] handleMessage -> DEBU 2625 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.718 UTC [gossip.pull] HandleMessage -> DEBU 2626 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.718 UTC [msp] DeserializeIdentity -> DEBU 2627 Obtaining identity" +"2019-09-24 00:25:44.718 UTC [msp] DeserializeIdentity -> DEBU 2628 Obtaining identity" +"2019-09-24 00:25:44.719 UTC [msp] DeserializeIdentity -> DEBU 2629 Obtaining identity" +"2019-09-24 00:25:44.719 UTC [msp] DeserializeIdentity -> DEBU 262a Obtaining identity" +"2019-09-24 00:25:44.719 UTC [msp] DeserializeIdentity -> DEBU 262b Obtaining identity" +"2019-09-24 00:25:44.735 UTC [msp] DeserializeIdentity -> DEBU 262c Obtaining identity" +"2019-09-24 00:25:44.735 UTC [gossip.pull] SendDigest -> DEBU 262d Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:44.735 UTC [gossip.gossip] handleMessage -> DEBU 262e Exiting" +"2019-09-24 00:25:44.773 UTC [gossip.comm] func1 -> DEBU 262f Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.773 UTC [gossip.gossip] handleMessage -> DEBU 2630 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.773 UTC [gossip.pull] HandleMessage -> DEBU 2631 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:44.773 UTC [gossip.pull] SendDigest -> DEBU 2632 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:44.773 UTC [gossip.gossip] handleMessage -> DEBU 2633 Exiting" +"2019-09-24 00:25:44.972 UTC [gossip.gossip] handleMessage -> DEBU 2634 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.972 UTC [gossip.gossip] handleMessage -> DEBU 2635 Exiting" +"2019-09-24 00:25:44.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2636 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.973 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2637 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:44.973 UTC [msp] DeserializeIdentity -> DEBU 2638 Obtaining identity" +"2019-09-24 00:25:44.973 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2639 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:44.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 263a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 263b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:44.973 UTC [policies] Evaluate -> DEBU 263c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:44.973 UTC [policies] Evaluate -> DEBU 263d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:44.973 UTC [policies] Evaluate -> DEBU 263e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:44.973 UTC [cauthdsl] func1 -> DEBU 263f 0xc004609c60 gate 1569284744973878300 evaluation starts" +"2019-09-24 00:25:44.973 UTC [cauthdsl] func2 -> DEBU 2640 0xc004609c60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.974 UTC [cauthdsl] func2 -> DEBU 2641 0xc004609c60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.974 UTC [cauthdsl] func2 -> DEBU 2642 0xc004609c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:44.974 UTC [cauthdsl] func2 -> DEBU 2643 0xc004609c60 principal evaluation fails" +"2019-09-24 00:25:44.974 UTC [cauthdsl] func1 -> DEBU 2644 0xc004609c60 gate 1569284744973878300 evaluation fails" +"2019-09-24 00:25:44.974 UTC [policies] Evaluate -> DEBU 2645 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.974 UTC [policies] Evaluate -> DEBU 2646 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:44.974 UTC [policies] Evaluate -> DEBU 2647 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:44.974 UTC [cauthdsl] func1 -> DEBU 2648 0xc00465a4a0 gate 1569284744974945100 evaluation starts" +"2019-09-24 00:25:44.975 UTC [cauthdsl] func2 -> DEBU 2649 0xc00465a4a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:44.975 UTC [cauthdsl] func2 -> DEBU 264a 0xc00465a4a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:44.975 UTC [cauthdsl] func2 -> DEBU 264b 0xc00465a4a0 principal matched by identity 0" +"2019-09-24 00:25:44.975 UTC [msp.identity] Verify -> DEBU 264c Verify: digest = 00000000 9b 41 6e 6e 12 90 1b 45 7d 49 bb 61 22 35 de 2d |.Ann...E}I.a"5.-| +00000010 98 1b eb af 9f 6b fd bf 7b b4 c4 d5 cb 67 e9 a8 |.....k..{....g..|" +"2019-09-24 00:25:44.979 UTC [msp.identity] Verify -> DEBU 264d Verify: sig = 00000000 30 44 02 20 18 dc 75 20 f1 a0 e5 36 5f 35 57 1e |0D. ..u ...6_5W.| +00000010 0e 35 e7 4e ba b2 a2 04 cb 65 a4 10 56 4e 7f 77 |.5.N.....e..VN.w| +00000020 24 19 3f ed 02 20 0c f0 43 d6 b3 63 91 01 e4 b0 |$.?.. ..C..c....| +00000030 14 37 d4 94 93 38 d4 53 d6 2d 32 03 fa c0 62 e2 |.7...8.S.-2...b.| +00000040 38 81 a9 d5 4d 5d |8...M]|" +"2019-09-24 00:25:44.979 UTC [cauthdsl] func2 -> DEBU 264e 0xc00465a4a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:44.979 UTC [cauthdsl] func1 -> DEBU 264f 0xc00465a4a0 gate 1569284744974945100 evaluation succeeds" +"2019-09-24 00:25:44.979 UTC [policies] Evaluate -> DEBU 2650 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.979 UTC [policies] Evaluate -> DEBU 2651 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:44.979 UTC [policies] Evaluate -> DEBU 2652 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:44.979 UTC [policies] Evaluate -> DEBU 2653 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:44.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 2654 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2655 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:44.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2656 updating membership: timestamp: " +"2019-09-24 00:25:44.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2657 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:44.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2658 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:44.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2659 Exiting" +"2019-09-24 00:25:44.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 265a Exiting" +"2019-09-24 00:25:44.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 265b Exiting" +"2019-09-24 00:25:44.985 UTC [gossip.comm] func1 -> DEBU 265c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.985 UTC [gossip.gossip] handleMessage -> DEBU 265d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.985 UTC [gossip.gossip] handleMessage -> DEBU 265e Exiting" +"2019-09-24 00:25:44.985 UTC [gossip.discovery] handleMsgFromComm -> DEBU 265f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.985 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2660 Exiting" +"2019-09-24 00:25:44.985 UTC [gossip.comm] func1 -> DEBU 2661 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.985 UTC [gossip.gossip] handleMessage -> DEBU 2662 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.985 UTC [gossip.gossip] handleMessage -> DEBU 2663 Exiting" +"2019-09-24 00:25:44.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2664 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2665 Exiting" +"2019-09-24 00:25:44.986 UTC [msp] DeserializeIdentity -> DEBU 2666 Obtaining identity" +"2019-09-24 00:25:44.986 UTC [msp] DeserializeIdentity -> DEBU 2667 Obtaining identity" +"2019-09-24 00:25:44.986 UTC [msp] DeserializeIdentity -> DEBU 2668 Obtaining identity" +"2019-09-24 00:25:44.986 UTC [msp] DeserializeIdentity -> DEBU 2669 Obtaining identity" +"2019-09-24 00:25:44.987 UTC [msp] DeserializeIdentity -> DEBU 266a Obtaining identity" +"2019-09-24 00:25:44.987 UTC [msp] DeserializeIdentity -> DEBU 266b Obtaining identity" +"2019-09-24 00:25:44.987 UTC [msp] DeserializeIdentity -> DEBU 266c Obtaining identity" +"2019-09-24 00:25:44.987 UTC [gossip.comm] Send -> DEBU 266d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:44.987 UTC [msp] DeserializeIdentity -> DEBU 266e Obtaining identity" +"2019-09-24 00:25:44.988 UTC [gossip.comm] Send -> DEBU 266f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:44.989 UTC [gossip.comm] sendToEndpoint -> DEBU 2670 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.990 UTC [gossip.comm] sendToEndpoint -> DEBU 2671 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:44.990 UTC [gossip.comm] sendToEndpoint -> DEBU 2672 Exiting" +"2019-09-24 00:25:44.991 UTC [gossip.comm] sendToEndpoint -> DEBU 2673 Exiting" +"2019-09-24 00:25:45.144 UTC [gossip.gossip] handleMessage -> DEBU 2674 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:45.144 UTC [msp] DeserializeIdentity -> DEBU 2675 Obtaining identity" +"2019-09-24 00:25:45.144 UTC [msp] DeserializeIdentity -> DEBU 2676 Obtaining identity" +"2019-09-24 00:25:45.145 UTC [msp] DeserializeIdentity -> DEBU 2677 Obtaining identity" +"2019-09-24 00:25:45.145 UTC [gossip.gossip] handleMessage -> DEBU 2678 Exiting" +"2019-09-24 00:25:45.677 UTC [gossip.comm] func1 -> DEBU 2679 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:45.678 UTC [gossip.gossip] handleMessage -> DEBU 267a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:45.678 UTC [gossip.pull] HandleMessage -> DEBU 267b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:45.678 UTC [gossip.pull] SendDigest -> DEBU 267c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:45.678 UTC [gossip.gossip] handleMessage -> DEBU 267d Exiting" +"2019-09-24 00:25:45.707 UTC [gossip.comm] func1 -> DEBU 267e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:45.707 UTC [gossip.gossip] handleMessage -> DEBU 267f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:45.707 UTC [gossip.gossip] handleMessage -> DEBU 2680 Exiting" +"2019-09-24 00:25:45.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2681 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:45.708 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2682 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:45.708 UTC [msp] DeserializeIdentity -> DEBU 2683 Obtaining identity" +"2019-09-24 00:25:45.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2684 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:45.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2685 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:45.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2686 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:45.709 UTC [policies] Evaluate -> DEBU 2687 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:45.709 UTC [policies] Evaluate -> DEBU 2688 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:45.709 UTC [policies] Evaluate -> DEBU 2689 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:45.709 UTC [cauthdsl] func1 -> DEBU 268a 0xc00466fe50 gate 1569284745709849900 evaluation starts" +"2019-09-24 00:25:45.709 UTC [cauthdsl] func2 -> DEBU 268b 0xc00466fe50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:45.710 UTC [cauthdsl] func2 -> DEBU 268c 0xc00466fe50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:45.721 UTC [gossip.gossip] handleMessage -> DEBU 268d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:45.710 UTC [cauthdsl] func2 -> DEBU 268e 0xc00466fe50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:45.722 UTC [cauthdsl] func2 -> DEBU 268f 0xc00466fe50 principal evaluation fails" +"2019-09-24 00:25:45.722 UTC [cauthdsl] func1 -> DEBU 2690 0xc00466fe50 gate 1569284745709849900 evaluation fails" +"2019-09-24 00:25:45.723 UTC [policies] Evaluate -> DEBU 2691 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:45.723 UTC [policies] Evaluate -> DEBU 2692 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:45.723 UTC [policies] Evaluate -> DEBU 2693 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:45.723 UTC [cauthdsl] func1 -> DEBU 2694 0xc004694690 gate 1569284745723485400 evaluation starts" +"2019-09-24 00:25:45.723 UTC [cauthdsl] func2 -> DEBU 2695 0xc004694690 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:45.723 UTC [cauthdsl] func2 -> DEBU 2696 0xc004694690 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:45.723 UTC [cauthdsl] func2 -> DEBU 2697 0xc004694690 principal matched by identity 0" +"2019-09-24 00:25:45.723 UTC [msp.identity] Verify -> DEBU 2698 Verify: digest = 00000000 2a d7 20 89 20 a3 8e 02 89 54 df 03 53 43 e8 35 |*. . ....T..SC.5| +00000010 e6 45 0c 0e eb 7f fd 41 77 95 16 63 9b be 2a 47 |.E.....Aw..c..*G|" +"2019-09-24 00:25:45.723 UTC [msp.identity] Verify -> DEBU 2699 Verify: sig = 00000000 30 44 02 20 71 58 8e 78 76 1b 29 5b 91 44 49 19 |0D. qX.xv.)[.DI.| +00000010 2c 0b 58 0e 65 fa 2d 91 af ee 75 e0 74 22 4e 18 |,.X.e.-...u.t"N.| +00000020 73 70 ca dd 02 20 4a 49 8f 0a 65 91 5b 9e 32 7d |sp... JI..e.[.2}| +00000030 b0 66 77 2a 89 8d 90 13 98 06 e3 21 8b 95 56 4c |.fw*.......!..VL| +00000040 98 f8 04 dd 35 e8 |....5.|" +"2019-09-24 00:25:45.724 UTC [cauthdsl] func2 -> DEBU 269a 0xc004694690 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:45.724 UTC [cauthdsl] func1 -> DEBU 269b 0xc004694690 gate 1569284745723485400 evaluation succeeds" +"2019-09-24 00:25:45.724 UTC [policies] Evaluate -> DEBU 269c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:45.724 UTC [policies] Evaluate -> DEBU 269d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:45.724 UTC [policies] Evaluate -> DEBU 269e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:45.724 UTC [policies] Evaluate -> DEBU 269f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:45.724 UTC [gossip.discovery] handleAliveMessage -> DEBU 26a0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:45.724 UTC [gossip.discovery] learnExistingMembers -> DEBU 26a1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:45.743 UTC [gossip.comm] func1 -> DEBU 26a2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020+" signature:"0C\002 \020\336=d\001S\304*+gd\206O\206|\025>\\\344~\321\211\034F\000\215q\234\366B\213\260\002\037\022\244hv\264\330 > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:45.724 UTC [gossip.discovery] learnExistingMembers -> DEBU 26a3 updating membership: timestamp: " +"2019-09-24 00:25:45.744 UTC [gossip.discovery] learnExistingMembers -> DEBU 26a4 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:45.744 UTC [gossip.discovery] learnExistingMembers -> DEBU 26a5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:45.744 UTC [gossip.discovery] learnExistingMembers -> DEBU 26a6 Exiting" +"2019-09-24 00:25:45.744 UTC [gossip.discovery] handleAliveMessage -> DEBU 26a7 Exiting" +"2019-09-24 00:25:45.744 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26a8 Exiting" +"2019-09-24 00:25:45.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26a9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:45.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26aa Exiting" +"2019-09-24 00:25:45.745 UTC [gossip.gossip] handleMessage -> DEBU 26ab Exiting" +"2019-09-24 00:25:45.745 UTC [gossip.gossip] handleMessage -> DEBU 26ac Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020+" signature:"0C\002 \020\336=d\001S\304*+gd\206O\206|\025>\\\344~\321\211\034F\000\215q\234\366B\213\260\002\037\022\244hv\264\330 > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:45.745 UTC [gossip.gossip] handleMessage -> DEBU 26ad Exiting" +"2019-09-24 00:25:45.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26ae Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020+" signature:"0C\002 \020\336=d\001S\304*+gd\206O\206|\025>\\\344~\321\211\034F\000\215q\234\366B\213\260\002\037\022\244hv\264\330 > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:45.746 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26af Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:45.746 UTC [msp.identity] Verify -> DEBU 26b0 Verify: digest = 00000000 4f 03 c7 13 35 57 6f 58 02 91 12 d4 ee 7f 7b 74 |O...5WoX......{t| +00000010 de 9a 09 21 9d 05 e0 30 b5 b2 c0 46 9b 96 9b cf |...!...0...F....|" +"2019-09-24 00:25:45.746 UTC [msp.identity] Verify -> DEBU 26b1 Verify: sig = 00000000 30 43 02 20 10 de 3d 64 01 53 c4 2a 2b 67 64 86 |0C. ..=d.S.*+gd.| +00000010 4f 86 7c 15 3e 5c e4 7e d1 89 1c 46 00 8d 71 9c |O.|.>\.~...F..q.| +00000020 f6 42 8b b0 02 1f 12 a4 68 76 b4 d8 3c 52 7e 0a |.B......hv.. DEBU 26b2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:45.747 UTC [msp.identity] Verify -> DEBU 26b3 Verify: sig = 00000000 30 45 02 21 00 8c fc 44 af 56 a8 a9 21 45 59 8c |0E.!...D.V..!EY.| +00000010 c2 56 24 d9 08 4d 41 05 e8 cf 56 cf f0 96 44 f5 |.V$..MA...V...D.| +00000020 08 c5 1d 87 68 02 20 60 8a b6 d3 09 b8 84 bd 87 |....h. `........| +00000030 c1 22 74 e3 fe 0e f4 40 90 40 62 89 75 8b 9b ac |."t....@.@b.u...| +00000040 26 ca 1f 17 c2 8e 7f |&......|" +"2019-09-24 00:25:45.747 UTC [msp] DeserializeIdentity -> DEBU 26b4 Obtaining identity" +"2019-09-24 00:25:45.747 UTC [gossip.discovery] handleAliveMessage -> DEBU 26b5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:45.747 UTC [msp] DeserializeIdentity -> DEBU 26b6 Obtaining identity" +"2019-09-24 00:25:45.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 26b7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:25:45.747 UTC [msp] DeserializeIdentity -> DEBU 26b8 Obtaining identity" +"2019-09-24 00:25:45.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 26b9 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:45.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 26ba Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:45.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 26bb Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:45.750 UTC [msp] DeserializeIdentity -> DEBU 26bc Obtaining identity" +"2019-09-24 00:25:45.751 UTC [msp] DeserializeIdentity -> DEBU 26bd Obtaining identity" +"2019-09-24 00:25:45.751 UTC [msp] DeserializeIdentity -> DEBU 26be Obtaining identity" +"2019-09-24 00:25:45.751 UTC [msp] DeserializeIdentity -> DEBU 26bf Obtaining identity" +"2019-09-24 00:25:45.756 UTC [gossip.comm] Send -> DEBU 26c0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:45.756 UTC [msp] DeserializeIdentity -> DEBU 26c1 Obtaining identity" +"2019-09-24 00:25:45.756 UTC [gossip.comm] Send -> DEBU 26c2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:45.756 UTC [gossip.comm] sendToEndpoint -> DEBU 26c3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:45.756 UTC [gossip.comm] sendToEndpoint -> DEBU 26c4 Exiting" +"2019-09-24 00:25:45.757 UTC [gossip.comm] sendToEndpoint -> DEBU 26c5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:45.757 UTC [gossip.comm] sendToEndpoint -> DEBU 26c6 Exiting" +"2019-09-24 00:25:45.757 UTC [gossip.comm] func1 -> DEBU 26c7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:45.757 UTC [gossip.gossip] handleMessage -> DEBU 26c8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:45.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c9 Exiting" +"2019-09-24 00:25:45.757 UTC [gossip.discovery] handleAliveMessage -> DEBU 26ca Exiting" +"2019-09-24 00:25:45.757 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26cb Exiting" +"2019-09-24 00:25:45.758 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26cc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:45.758 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26cd Exiting" +"2019-09-24 00:25:45.758 UTC [gossip.gossip] handleMessage -> DEBU 26ce Exiting" +"2019-09-24 00:25:45.758 UTC [gossip.discovery] sendMemResponse -> DEBU 26cf Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:45.759 UTC [msp] DeserializeIdentity -> DEBU 26d0 Obtaining identity" +"2019-09-24 00:25:45.763 UTC [msp] DeserializeIdentity -> DEBU 26d1 Obtaining identity" +"2019-09-24 00:25:45.763 UTC [gossip.comm] Send -> DEBU 26d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:45.763 UTC [gossip.discovery] sendMemResponse -> DEBU 26d3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020+" signature:"0C\002 \020\336=d\001S\304*+gd\206O\206|\025>\\\344~\321\211\034F\000\215q\234\366B\213\260\002\037\022\244hv\264\330 > alive: " +"2019-09-24 00:25:45.763 UTC [gossip.comm] sendToEndpoint -> DEBU 26d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:25:45.763 UTC [gossip.comm] sendToEndpoint -> DEBU 26d5 Exiting" +"2019-09-24 00:25:46.078 UTC [gossip.comm] func1 -> DEBU 26d6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:46.078 UTC [gossip.gossip] handleMessage -> DEBU 26d7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:46.078 UTC [msp] DeserializeIdentity -> DEBU 26d8 Obtaining identity" +"2019-09-24 00:25:46.078 UTC [msp] DeserializeIdentity -> DEBU 26d9 Obtaining identity" +"2019-09-24 00:25:46.078 UTC [msp] DeserializeIdentity -> DEBU 26da Obtaining identity" +"2019-09-24 00:25:46.078 UTC [gossip.gossip] handleMessage -> DEBU 26db Exiting" +"2019-09-24 00:25:47.274 UTC [gossip.election] waitForInterrupt -> DEBU 26dc c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:47.274 UTC [gossip.election] IsLeader -> DEBU 26dd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:25:47.274 UTC [msp] GetDefaultSigningIdentity -> DEBU 26de Obtaining default signing identity" +"2019-09-24 00:25:47.274 UTC [msp.identity] Sign -> DEBU 26df Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315100B1801 " +"2019-09-24 00:25:47.275 UTC [msp.identity] Sign -> DEBU 26e0 Sign: digest: ED394AFE204F1F7D7155E5C9B74AF7776B2A9654A4B67EFF6F35C99FA2A0275E " +"2019-09-24 00:25:47.276 UTC [gossip.election] waitForInterrupt -> DEBU 26e1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:25:47.296 UTC [msp] DeserializeIdentity -> DEBU 26e2 Obtaining identity" +"2019-09-24 00:25:47.297 UTC [msp] DeserializeIdentity -> DEBU 26e3 Obtaining identity" +"2019-09-24 00:25:47.297 UTC [msp] DeserializeIdentity -> DEBU 26e4 Obtaining identity" +"2019-09-24 00:25:47.298 UTC [msp] DeserializeIdentity -> DEBU 26e5 Obtaining identity" +"2019-09-24 00:25:47.298 UTC [gossip.comm] Send -> DEBU 26e6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:47.298 UTC [gossip.comm] sendToEndpoint -> DEBU 26e7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.298 UTC [gossip.comm] sendToEndpoint -> DEBU 26e8 Exiting" +"2019-09-24 00:25:47.299 UTC [msp] DeserializeIdentity -> DEBU 26e9 Obtaining identity" +"2019-09-24 00:25:47.299 UTC [msp] DeserializeIdentity -> DEBU 26ea Obtaining identity" +"2019-09-24 00:25:47.662 UTC [gossip.comm] func1 -> DEBU 26eb Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.681 UTC [gossip.pull] Hello -> DEBU 26ec Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:47.702 UTC [gossip.comm] Send -> DEBU 26ee Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:47.702 UTC [gossip.pull] Hello -> DEBU 26ef Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:47.702 UTC [gossip.comm] Send -> DEBU 26f0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:47.702 UTC [gossip.pull] Hello -> DEBU 26f1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:47.702 UTC [gossip.comm] Send -> DEBU 26f2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:47.702 UTC [gossip.comm] sendToEndpoint -> DEBU 26f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.702 UTC [gossip.comm] sendToEndpoint -> DEBU 26f4 Exiting" +"2019-09-24 00:25:47.684 UTC [msp] GetDefaultSigningIdentity -> DEBU 26ed Obtaining default signing identity" +"2019-09-24 00:25:47.702 UTC [msp.identity] Sign -> DEBU 26f5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151028 " +"2019-09-24 00:25:47.703 UTC [msp.identity] Sign -> DEBU 26f6 Sign: digest: 5315E1AD23D3C20DD484F3DB79EF7584B5495FC0FB71798C09E0BCBA068BD124 " +"2019-09-24 00:25:47.703 UTC [msp] GetDefaultSigningIdentity -> DEBU 26f7 Obtaining default signing identity" +"2019-09-24 00:25:47.703 UTC [msp.identity] Sign -> DEBU 26f8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:47.703 UTC [msp.identity] Sign -> DEBU 26f9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:47.703 UTC [gossip.comm] Send -> DEBU 26fa Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:47.703 UTC [msp] DeserializeIdentity -> DEBU 26fb Obtaining identity" +"2019-09-24 00:25:47.703 UTC [gossip.comm] Send -> DEBU 26fc Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:47.703 UTC [msp] DeserializeIdentity -> DEBU 26fd Obtaining identity" +"2019-09-24 00:25:47.703 UTC [gossip.comm] Send -> DEBU 26fe Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:47.703 UTC [gossip.comm] sendToEndpoint -> DEBU 26ff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.703 UTC [gossip.comm] sendToEndpoint -> DEBU 2700 Exiting" +"2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2701 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2702 Exiting" +"2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2703 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2704 Exiting" +"2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2705 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.704 UTC [gossip.comm] sendToEndpoint -> DEBU 2706 Exiting" +"2019-09-24 00:25:47.705 UTC [gossip.gossip] handleMessage -> DEBU 2707 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.705 UTC [gossip.gossip] handleMessage -> DEBU 2708 Exiting" +"2019-09-24 00:25:47.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2709 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.705 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 270a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:47.706 UTC [msp.identity] Verify -> DEBU 270b Verify: digest = 00000000 29 8e 6b 78 71 2e 86 50 eb cd 96 2b 12 42 46 6f |).kxq..P...+.BFo| +00000010 7b ed ea 06 10 09 35 e8 d9 92 fa 56 88 ac 34 b4 |{.....5....V..4.|" +"2019-09-24 00:25:47.706 UTC [msp.identity] Verify -> DEBU 270c Verify: sig = 00000000 30 44 02 20 5f 9f 88 18 33 14 f8 eb 3f c7 36 98 |0D. _...3...?.6.| +00000010 dd ee 93 21 12 8c 40 3e e4 b9 ca 34 7a 7d b9 84 |...!..@>...4z}..| +00000020 5b a9 4c c6 02 20 2c 99 f4 60 16 0d c7 15 e5 dc |[.L.. ,..`......| +00000030 a8 d1 49 66 39 fb e7 77 53 aa a4 70 3d e1 eb f6 |..If9..wS..p=...| +00000040 bb b6 dd 82 7d 2b |....}+|" +"2019-09-24 00:25:47.706 UTC [gossip.comm] sendToEndpoint -> DEBU 270d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 270e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.706 UTC [gossip.comm] sendToEndpoint -> DEBU 270f Exiting" +"2019-09-24 00:25:47.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 2710 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:47.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 2711 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:47.706 UTC [gossip.comm] func1 -> DEBU 2712 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 2713 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:47.706 UTC [gossip.gossip] handleMessage -> DEBU 2714 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 2715 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:47.707 UTC [gossip.discovery] learnExistingMembers -> DEBU 2716 Exiting" +"2019-09-24 00:25:47.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 2717 Exiting" +"2019-09-24 00:25:47.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2718 Exiting" +"2019-09-24 00:25:47.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2719 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.707 UTC [msp] DeserializeIdentity -> DEBU 271a Obtaining identity" +"2019-09-24 00:25:47.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 271b Exiting" +"2019-09-24 00:25:47.707 UTC [gossip.gossip] handleMessage -> DEBU 271c Exiting" +"2019-09-24 00:25:47.707 UTC [msp] DeserializeIdentity -> DEBU 271d Obtaining identity" +"2019-09-24 00:25:47.707 UTC [msp] DeserializeIdentity -> DEBU 271e Obtaining identity" +"2019-09-24 00:25:47.707 UTC [gossip.comm] Send -> DEBU 271f Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:47.707 UTC [msp] DeserializeIdentity -> DEBU 2720 Obtaining identity" +"2019-09-24 00:25:47.707 UTC [gossip.comm] Send -> DEBU 2721 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 2722 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 2723 Exiting" +"2019-09-24 00:25:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 2724 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 2725 Exiting" +"2019-09-24 00:25:47.718 UTC [gossip.comm] func1 -> DEBU 2726 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.718 UTC [gossip.comm] func1 -> DEBU 2727 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.719 UTC [gossip.gossip] handleMessage -> DEBU 2728 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.719 UTC [gossip.pull] HandleMessage -> DEBU 2729 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.719 UTC [gossip.gossip] handleMessage -> DEBU 272a Exiting" +"2019-09-24 00:25:47.719 UTC [gossip.gossip] handleMessage -> DEBU 272b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.719 UTC [gossip.gossip] handleMessage -> DEBU 272c Exiting" +"2019-09-24 00:25:47.719 UTC [gossip.discovery] handleMsgFromComm -> DEBU 272d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.719 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 272e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:47.719 UTC [msp.identity] Verify -> DEBU 272f Verify: digest = 00000000 53 15 e1 ad 23 d3 c2 0d d4 84 f3 db 79 ef 75 84 |S...#.......y.u.| +00000010 b5 49 5f c0 fb 71 79 8c 09 e0 bc ba 06 8b d1 24 |.I_..qy........$|" +"2019-09-24 00:25:47.719 UTC [msp.identity] Verify -> DEBU 2730 Verify: sig = 00000000 30 45 02 21 00 ad ba 34 3c ee 91 12 2d a7 15 78 |0E.!...4<...-..x| +00000010 8e 31 cd 25 49 34 6d 6f 35 37 2e fc 82 f9 ae da |.1.%I4mo57......| +00000020 a5 31 d4 86 47 02 20 74 c9 94 9e f0 e6 e0 6a cd |.1..G. t......j.| +00000030 a3 d5 71 5f 57 c3 6f ee 6a a3 c1 17 59 a4 8e 14 |..q_W.o.j...Y...| +00000040 84 2b 13 eb ee b0 0f |.+.....|" +"2019-09-24 00:25:47.719 UTC [gossip.discovery] handleAliveMessage -> DEBU 2731 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:47.719 UTC [gossip.discovery] isSentByMe -> DEBU 2732 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:47.719 UTC [gossip.discovery] handleAliveMessage -> DEBU 2733 Exiting" +"2019-09-24 00:25:47.719 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2734 Exiting" +"2019-09-24 00:25:47.720 UTC [gossip.comm] func1 -> DEBU 2735 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.720 UTC [gossip.gossip] handleMessage -> DEBU 2736 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.720 UTC [gossip.pull] HandleMessage -> DEBU 2737 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.720 UTC [gossip.gossip] handleMessage -> DEBU 2738 Exiting" +"2019-09-24 00:25:47.728 UTC [gossip.comm] func1 -> DEBU 2739 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.728 UTC [gossip.gossip] handleMessage -> DEBU 273a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.728 UTC [gossip.gossip] handleMessage -> DEBU 273b Exiting" +"2019-09-24 00:25:47.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 273c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.729 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 273d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:47.729 UTC [msp.identity] Verify -> DEBU 273e Verify: digest = 00000000 53 15 e1 ad 23 d3 c2 0d d4 84 f3 db 79 ef 75 84 |S...#.......y.u.| +00000010 b5 49 5f c0 fb 71 79 8c 09 e0 bc ba 06 8b d1 24 |.I_..qy........$|" +"2019-09-24 00:25:47.729 UTC [msp.identity] Verify -> DEBU 273f Verify: sig = 00000000 30 45 02 21 00 ad ba 34 3c ee 91 12 2d a7 15 78 |0E.!...4<...-..x| +00000010 8e 31 cd 25 49 34 6d 6f 35 37 2e fc 82 f9 ae da |.1.%I4mo57......| +00000020 a5 31 d4 86 47 02 20 74 c9 94 9e f0 e6 e0 6a cd |.1..G. t......j.| +00000030 a3 d5 71 5f 57 c3 6f ee 6a a3 c1 17 59 a4 8e 14 |..q_W.o.j...Y...| +00000040 84 2b 13 eb ee b0 0f |.+.....|" +"2019-09-24 00:25:47.729 UTC [msp.identity] Verify -> DEBU 2740 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:47.729 UTC [msp.identity] Verify -> DEBU 2741 Verify: sig = 00000000 30 44 02 20 3a c2 a6 57 b8 47 72 eb 3d b8 93 4a |0D. :..W.Gr.=..J| +00000010 b6 82 aa 88 d5 13 00 72 a0 9a 6f ae c4 3b 51 f7 |.......r..o..;Q.| +00000020 d4 71 4a ed 02 20 3d 29 d5 5b 13 3f 49 e8 d9 17 |.qJ.. =).[.?I...| +00000030 8b 4d 47 20 c8 d8 57 5b cf 8b 6b e2 7e ab fb 63 |.MG ..W[..k.~..c| +00000040 5b 13 46 8c 79 96 |[.F.y.|" +"2019-09-24 00:25:47.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 2742 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:47.729 UTC [gossip.discovery] isSentByMe -> DEBU 2743 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:47.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 2744 Exiting" +"2019-09-24 00:25:47.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2745 Exiting" +"2019-09-24 00:25:47.737 UTC [gossip.gossip] handleMessage -> DEBU 2746 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.737 UTC [gossip.pull] HandleMessage -> DEBU 2747 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.737 UTC [gossip.gossip] handleMessage -> DEBU 2748 Exiting" +"2019-09-24 00:25:47.737 UTC [gossip.gossip] handleMessage -> DEBU 2749 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.737 UTC [gossip.gossip] handleMessage -> DEBU 274a Exiting" +"2019-09-24 00:25:47.738 UTC [gossip.discovery] handleMsgFromComm -> DEBU 274b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.738 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 274c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:47.738 UTC [msp.identity] Verify -> DEBU 274d Verify: digest = 00000000 53 15 e1 ad 23 d3 c2 0d d4 84 f3 db 79 ef 75 84 |S...#.......y.u.| +00000010 b5 49 5f c0 fb 71 79 8c 09 e0 bc ba 06 8b d1 24 |.I_..qy........$|" +"2019-09-24 00:25:47.738 UTC [msp.identity] Verify -> DEBU 274e Verify: sig = 00000000 30 45 02 21 00 ad ba 34 3c ee 91 12 2d a7 15 78 |0E.!...4<...-..x| +00000010 8e 31 cd 25 49 34 6d 6f 35 37 2e fc 82 f9 ae da |.1.%I4mo57......| +00000020 a5 31 d4 86 47 02 20 74 c9 94 9e f0 e6 e0 6a cd |.1..G. t......j.| +00000030 a3 d5 71 5f 57 c3 6f ee 6a a3 c1 17 59 a4 8e 14 |..q_W.o.j...Y...| +00000040 84 2b 13 eb ee b0 0f |.+.....|" +"2019-09-24 00:25:47.738 UTC [gossip.discovery] handleAliveMessage -> DEBU 274f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:47.738 UTC [gossip.discovery] isSentByMe -> DEBU 2750 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:47.738 UTC [gossip.discovery] handleAliveMessage -> DEBU 2751 Exiting" +"2019-09-24 00:25:47.738 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2752 Exiting" +"2019-09-24 00:25:47.745 UTC [gossip.gossip] handleMessage -> DEBU 2753 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.745 UTC [gossip.gossip] handleMessage -> DEBU 2754 Exiting" +"2019-09-24 00:25:47.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2755 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:47.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2756 Exiting" +"2019-09-24 00:25:47.936 UTC [gossip.gossip] handleMessage -> DEBU 2757 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.936 UTC [gossip.pull] HandleMessage -> DEBU 2758 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.936 UTC [msp] DeserializeIdentity -> DEBU 2759 Obtaining identity" +"2019-09-24 00:25:47.936 UTC [msp] DeserializeIdentity -> DEBU 275a Obtaining identity" +"2019-09-24 00:25:47.937 UTC [msp] DeserializeIdentity -> DEBU 275b Obtaining identity" +"2019-09-24 00:25:47.937 UTC [msp] DeserializeIdentity -> DEBU 275c Obtaining identity" +"2019-09-24 00:25:47.937 UTC [msp] DeserializeIdentity -> DEBU 275d Obtaining identity" +"2019-09-24 00:25:47.937 UTC [msp] DeserializeIdentity -> DEBU 275e Obtaining identity" +"2019-09-24 00:25:47.937 UTC [gossip.pull] SendDigest -> DEBU 275f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:47.945 UTC [gossip.gossip] handleMessage -> DEBU 2760 Exiting" +"2019-09-24 00:25:47.966 UTC [gossip.gossip] handleMessage -> DEBU 2761 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.966 UTC [gossip.gossip] handleMessage -> DEBU 2762 Exiting" +"2019-09-24 00:25:47.967 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2763 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.967 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2764 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:47.967 UTC [msp] DeserializeIdentity -> DEBU 2765 Obtaining identity" +"2019-09-24 00:25:47.967 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2766 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:47.967 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2767 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:47.967 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2768 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 2769 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 276a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 276b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:47.967 UTC [cauthdsl] func1 -> DEBU 276c 0xc00476a040 gate 1569284747967540000 evaluation starts" +"2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 276d 0xc00476a040 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 276e 0xc00476a040 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 276f 0xc00476a040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 2770 0xc00476a040 principal evaluation fails" +"2019-09-24 00:25:47.967 UTC [cauthdsl] func1 -> DEBU 2771 0xc00476a040 gate 1569284747967540000 evaluation fails" +"2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 2772 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 2773 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:47.967 UTC [policies] Evaluate -> DEBU 2774 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:47.967 UTC [cauthdsl] func1 -> DEBU 2775 0xc00476a880 gate 1569284747967821100 evaluation starts" +"2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 2776 0xc00476a880 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 2777 0xc00476a880 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:47.967 UTC [cauthdsl] func2 -> DEBU 2778 0xc00476a880 principal matched by identity 0" +"2019-09-24 00:25:47.967 UTC [msp.identity] Verify -> DEBU 2779 Verify: digest = 00000000 69 39 a5 ae 99 f5 e5 86 62 39 e6 60 20 2c 8e 99 |i9......b9.` ,..| +00000010 ff c2 7a df 9c e6 05 21 6a 4d 18 bd d2 5b 4b 81 |..z....!jM...[K.|" +"2019-09-24 00:25:47.968 UTC [msp.identity] Verify -> DEBU 277a Verify: sig = 00000000 30 45 02 21 00 a7 86 8d fb b6 c4 18 4f 82 af 0a |0E.!........O...| +00000010 3a dd 12 a8 0d 9a 1d 37 07 4f 6c 9a 9b 44 cc 68 |:......7.Ol..D.h| +00000020 1b cd 52 09 22 02 20 20 18 6b ba 08 5d e1 53 e8 |..R.". .k..].S.| +00000030 ad 22 aa 63 1f e4 bf 2c ce af a2 e4 aa 16 ef f4 |.".c...,........| +00000040 38 5a ed f8 88 8f b1 |8Z.....|" +"2019-09-24 00:25:47.968 UTC [cauthdsl] func2 -> DEBU 277b 0xc00476a880 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:47.968 UTC [cauthdsl] func1 -> DEBU 277c 0xc00476a880 gate 1569284747967821100 evaluation succeeds" +"2019-09-24 00:25:47.968 UTC [policies] Evaluate -> DEBU 277d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:47.968 UTC [policies] Evaluate -> DEBU 277e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:47.968 UTC [policies] Evaluate -> DEBU 277f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:47.968 UTC [policies] Evaluate -> DEBU 2780 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:47.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 2781 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:47.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 2782 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:47.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 2783 updating membership: timestamp: " +"2019-09-24 00:25:47.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 2784 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:47.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 2785 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:47.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 2786 Exiting" +"2019-09-24 00:25:47.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 2787 Exiting" +"2019-09-24 00:25:47.968 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2788 Exiting" +"2019-09-24 00:25:47.968 UTC [gossip.discovery] sendMemResponse -> DEBU 2789 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:47.968 UTC [msp] DeserializeIdentity -> DEBU 278a Obtaining identity" +"2019-09-24 00:25:47.968 UTC [msp] DeserializeIdentity -> DEBU 278b Obtaining identity" +"2019-09-24 00:25:47.968 UTC [msp] DeserializeIdentity -> DEBU 278c Obtaining identity" +"2019-09-24 00:25:47.968 UTC [gossip.comm] Send -> DEBU 278d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:47.969 UTC [gossip.discovery] sendMemResponse -> DEBU 278e Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020," signature:"0D\002 _\237\210\0303\024\370\353?\3076\230\335\356\223!\022\214@>\344\271\3124z}\271\204[\251L\306\002 ,\231\364`\026\r\307\025\345\334\250\321If9\373\347wS\252\244p=\341\353\366\273\266\335\202}+" > alive: alive: " +"2019-09-24 00:25:47.969 UTC [gossip.comm] sendToEndpoint -> DEBU 278f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:47.969 UTC [gossip.comm] sendToEndpoint -> DEBU 2790 Exiting" +"2019-09-24 00:25:48.147 UTC [msp] DeserializeIdentity -> DEBU 2791 Obtaining identity" +"2019-09-24 00:25:48.148 UTC [msp] DeserializeIdentity -> DEBU 2792 Obtaining identity" +"2019-09-24 00:25:48.148 UTC [gossip.comm] Send -> DEBU 2793 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:25:48.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2794 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2795 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2796 Exiting" +"2019-09-24 00:25:48.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2797 Exiting" +"2019-09-24 00:25:48.149 UTC [gossip.comm] sendToEndpoint -> DEBU 2798 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.149 UTC [gossip.comm] sendToEndpoint -> DEBU 2799 Exiting" +"2019-09-24 00:25:48.150 UTC [gossip.comm] func1 -> DEBU 279a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.150 UTC [gossip.gossip] handleMessage -> DEBU 279b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.150 UTC [gossip.comm] func1 -> DEBU 279c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.150 UTC [msp.identity] Verify -> DEBU 279d Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:48.150 UTC [msp.identity] Verify -> DEBU 279e Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:48.151 UTC [msp.identity] Verify -> DEBU 279f Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:48.151 UTC [msp.identity] Verify -> DEBU 27a0 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:48.151 UTC [msp] DeserializeIdentity -> DEBU 27a1 Obtaining identity" +"2019-09-24 00:25:48.151 UTC [msp] DeserializeIdentity -> DEBU 27a2 Obtaining identity" +"2019-09-24 00:25:48.151 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27a3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:48.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27a4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27a5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:48.151 UTC [cauthdsl] func1 -> DEBU 27a9 0xc0047ac8c0 gate 1569284748151647900 evaluation starts" +"2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27aa 0xc0047ac8c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27ab 0xc0047ac8c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27ac 0xc0047ac8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27ad 0xc0047ac8c0 principal evaluation fails" +"2019-09-24 00:25:48.151 UTC [cauthdsl] func1 -> DEBU 27ae 0xc0047ac8c0 gate 1569284748151647900 evaluation fails" +"2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27af Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.151 UTC [policies] Evaluate -> DEBU 27b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:48.151 UTC [cauthdsl] func1 -> DEBU 27b2 0xc0047ad100 gate 1569284748151922800 evaluation starts" +"2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27b3 0xc0047ad100 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.151 UTC [cauthdsl] func2 -> DEBU 27b4 0xc0047ad100 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.152 UTC [cauthdsl] func2 -> DEBU 27b5 0xc0047ad100 principal matched by identity 0" +"2019-09-24 00:25:48.152 UTC [msp.identity] Verify -> DEBU 27b6 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:48.152 UTC [msp.identity] Verify -> DEBU 27b7 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:48.152 UTC [cauthdsl] func2 -> DEBU 27b8 0xc0047ad100 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:48.152 UTC [cauthdsl] func1 -> DEBU 27b9 0xc0047ad100 gate 1569284748151922800 evaluation succeeds" +"2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27ba Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27bc Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27bd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:48.152 UTC [msp] DeserializeIdentity -> DEBU 27be Obtaining identity" +"2019-09-24 00:25:48.152 UTC [msp] DeserializeIdentity -> DEBU 27bf Obtaining identity" +"2019-09-24 00:25:48.152 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:48.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27c1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27c2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:48.152 UTC [policies] Evaluate -> DEBU 27c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:48.152 UTC [cauthdsl] func1 -> DEBU 27c6 0xc0047c28d0 gate 1569284748152932400 evaluation starts" +"2019-09-24 00:25:48.152 UTC [cauthdsl] func2 -> DEBU 27c7 0xc0047c28d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.152 UTC [cauthdsl] func2 -> DEBU 27c8 0xc0047c28d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27c9 0xc0047c28d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27ca 0xc0047c28d0 principal evaluation fails" +"2019-09-24 00:25:48.153 UTC [cauthdsl] func1 -> DEBU 27cb 0xc0047c28d0 gate 1569284748152932400 evaluation fails" +"2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:48.153 UTC [cauthdsl] func1 -> DEBU 27cf 0xc0047c3110 gate 1569284748153186100 evaluation starts" +"2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27d0 0xc0047c3110 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27d1 0xc0047c3110 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27d2 0xc0047c3110 principal matched by identity 0" +"2019-09-24 00:25:48.153 UTC [msp.identity] Verify -> DEBU 27d3 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:48.153 UTC [msp.identity] Verify -> DEBU 27d4 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:48.153 UTC [cauthdsl] func2 -> DEBU 27d5 0xc0047c3110 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:48.153 UTC [cauthdsl] func1 -> DEBU 27d6 0xc0047c3110 gate 1569284748153186100 evaluation succeeds" +"2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27d9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:48.153 UTC [policies] Evaluate -> DEBU 27da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:48.153 UTC [gossip.gossip] handleMessage -> DEBU 27db Exiting" +"2019-09-24 00:25:48.153 UTC [gossip.gossip] handleMessage -> DEBU 27dc Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.153 UTC [msp] DeserializeIdentity -> DEBU 27dd Obtaining identity" +"2019-09-24 00:25:48.153 UTC [msp] DeserializeIdentity -> DEBU 27de Obtaining identity" +"2019-09-24 00:25:48.154 UTC [msp] DeserializeIdentity -> DEBU 27df Obtaining identity" +"2019-09-24 00:25:48.154 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:48.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27e1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27e2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:48.154 UTC [cauthdsl] func1 -> DEBU 27e6 0xc0047d8c20 gate 1569284748154518800 evaluation starts" +"2019-09-24 00:25:48.154 UTC [cauthdsl] func2 -> DEBU 27e7 0xc0047d8c20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.154 UTC [cauthdsl] func2 -> DEBU 27e8 0xc0047d8c20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.154 UTC [cauthdsl] func2 -> DEBU 27e9 0xc0047d8c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:48.154 UTC [cauthdsl] func2 -> DEBU 27ea 0xc0047d8c20 principal evaluation fails" +"2019-09-24 00:25:48.154 UTC [cauthdsl] func1 -> DEBU 27eb 0xc0047d8c20 gate 1569284748154518800 evaluation fails" +"2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.154 UTC [policies] Evaluate -> DEBU 27ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:48.154 UTC [cauthdsl] func1 -> DEBU 27ef 0xc0047d9460 gate 1569284748154809600 evaluation starts" +"2019-09-24 00:25:48.154 UTC [cauthdsl] func2 -> DEBU 27f0 0xc0047d9460 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.164 UTC [cauthdsl] func2 -> DEBU 27f1 0xc0047d9460 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.165 UTC [cauthdsl] func2 -> DEBU 27f2 0xc0047d9460 principal matched by identity 0" +"2019-09-24 00:25:48.165 UTC [msp.identity] Verify -> DEBU 27f3 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:48.165 UTC [msp.identity] Verify -> DEBU 27f4 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:48.165 UTC [cauthdsl] func2 -> DEBU 27f5 0xc0047d9460 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:48.165 UTC [cauthdsl] func1 -> DEBU 27f6 0xc0047d9460 gate 1569284748154809600 evaluation succeeds" +"2019-09-24 00:25:48.165 UTC [policies] Evaluate -> DEBU 27f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.165 UTC [policies] Evaluate -> DEBU 27f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.165 UTC [policies] Evaluate -> DEBU 27f9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:48.165 UTC [policies] Evaluate -> DEBU 27fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:48.165 UTC [msp.identity] Verify -> DEBU 27fb Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:48.165 UTC [msp.identity] Verify -> DEBU 27fc Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:48.166 UTC [msp.identity] Verify -> DEBU 27fd Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:48.166 UTC [msp.identity] Verify -> DEBU 27fe Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:48.166 UTC [msp] DeserializeIdentity -> DEBU 27ff Obtaining identity" +"2019-09-24 00:25:48.166 UTC [msp] DeserializeIdentity -> DEBU 2800 Obtaining identity" +"2019-09-24 00:25:48.166 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2801 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:48.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2802 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2803 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.166 UTC [policies] Evaluate -> DEBU 2804 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:48.167 UTC [policies] Evaluate -> DEBU 2805 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:48.167 UTC [policies] Evaluate -> DEBU 2806 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:48.167 UTC [cauthdsl] func1 -> DEBU 2807 0xc0047e9a70 gate 1569284748167183700 evaluation starts" +"2019-09-24 00:25:48.167 UTC [cauthdsl] func2 -> DEBU 2808 0xc0047e9a70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.167 UTC [cauthdsl] func2 -> DEBU 2809 0xc0047e9a70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.167 UTC [cauthdsl] func2 -> DEBU 280a 0xc0047e9a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:48.167 UTC [cauthdsl] func2 -> DEBU 280b 0xc0047e9a70 principal evaluation fails" +"2019-09-24 00:25:48.168 UTC [cauthdsl] func1 -> DEBU 280c 0xc0047e9a70 gate 1569284748167183700 evaluation fails" +"2019-09-24 00:25:48.168 UTC [policies] Evaluate -> DEBU 280d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.168 UTC [policies] Evaluate -> DEBU 280e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.168 UTC [policies] Evaluate -> DEBU 280f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:48.168 UTC [cauthdsl] func1 -> DEBU 2810 0xc0047fe2b0 gate 1569284748168460900 evaluation starts" +"2019-09-24 00:25:48.168 UTC [cauthdsl] func2 -> DEBU 2811 0xc0047fe2b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.168 UTC [cauthdsl] func2 -> DEBU 2812 0xc0047fe2b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.168 UTC [cauthdsl] func2 -> DEBU 2813 0xc0047fe2b0 principal matched by identity 0" +"2019-09-24 00:25:48.168 UTC [msp.identity] Verify -> DEBU 2814 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:48.168 UTC [msp.identity] Verify -> DEBU 2815 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:48.168 UTC [cauthdsl] func2 -> DEBU 2816 0xc0047fe2b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:48.169 UTC [cauthdsl] func1 -> DEBU 2817 0xc0047fe2b0 gate 1569284748168460900 evaluation succeeds" +"2019-09-24 00:25:48.169 UTC [policies] Evaluate -> DEBU 2818 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.169 UTC [policies] Evaluate -> DEBU 2819 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.169 UTC [policies] Evaluate -> DEBU 281a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:48.169 UTC [policies] Evaluate -> DEBU 281b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:48.169 UTC [gossip.gossip] handleMessage -> DEBU 281c Exiting" +"2019-09-24 00:25:48.169 UTC [gossip.gossip] handleMessage -> DEBU 281d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.169 UTC [msp] DeserializeIdentity -> DEBU 281e Obtaining identity" +"2019-09-24 00:25:48.169 UTC [msp] DeserializeIdentity -> DEBU 281f Obtaining identity" +"2019-09-24 00:25:48.169 UTC [msp] DeserializeIdentity -> DEBU 2820 Obtaining identity" +"2019-09-24 00:25:48.181 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2821 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:48.181 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2822 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.182 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2823 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.182 UTC [policies] Evaluate -> DEBU 2824 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:48.182 UTC [policies] Evaluate -> DEBU 2825 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:48.182 UTC [policies] Evaluate -> DEBU 2826 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:48.182 UTC [cauthdsl] func1 -> DEBU 2827 0xc0047ffdc0 gate 1569284748182383100 evaluation starts" +"2019-09-24 00:25:48.182 UTC [cauthdsl] func2 -> DEBU 2828 0xc0047ffdc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.182 UTC [cauthdsl] func2 -> DEBU 2829 0xc0047ffdc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.182 UTC [cauthdsl] func2 -> DEBU 282a 0xc0047ffdc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:48.182 UTC [cauthdsl] func2 -> DEBU 282b 0xc0047ffdc0 principal evaluation fails" +"2019-09-24 00:25:48.182 UTC [cauthdsl] func1 -> DEBU 282c 0xc0047ffdc0 gate 1569284748182383100 evaluation fails" +"2019-09-24 00:25:48.182 UTC [policies] Evaluate -> DEBU 282d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.182 UTC [policies] Evaluate -> DEBU 282e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.183 UTC [policies] Evaluate -> DEBU 282f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:48.183 UTC [cauthdsl] func1 -> DEBU 2830 0xc004816600 gate 1569284748183090300 evaluation starts" +"2019-09-24 00:25:48.183 UTC [cauthdsl] func2 -> DEBU 2831 0xc004816600 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.183 UTC [cauthdsl] func2 -> DEBU 2832 0xc004816600 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.183 UTC [cauthdsl] func2 -> DEBU 2833 0xc004816600 principal matched by identity 0" +"2019-09-24 00:25:48.183 UTC [msp.identity] Verify -> DEBU 2834 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:48.183 UTC [msp.identity] Verify -> DEBU 2835 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:48.183 UTC [cauthdsl] func2 -> DEBU 2836 0xc004816600 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:48.183 UTC [cauthdsl] func1 -> DEBU 2837 0xc004816600 gate 1569284748183090300 evaluation succeeds" +"2019-09-24 00:25:48.183 UTC [policies] Evaluate -> DEBU 2838 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.184 UTC [policies] Evaluate -> DEBU 2839 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.184 UTC [policies] Evaluate -> DEBU 283a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:48.184 UTC [policies] Evaluate -> DEBU 283b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:48.184 UTC [msp.identity] Verify -> DEBU 283c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:48.189 UTC [msp.identity] Verify -> DEBU 283d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:48.189 UTC [msp] DeserializeIdentity -> DEBU 283e Obtaining identity" +"2019-09-24 00:25:48.190 UTC [msp] DeserializeIdentity -> DEBU 283f Obtaining identity" +"2019-09-24 00:25:48.190 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2840 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:48.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2841 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.190 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2842 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.190 UTC [policies] Evaluate -> DEBU 2843 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:48.190 UTC [policies] Evaluate -> DEBU 2844 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:48.190 UTC [policies] Evaluate -> DEBU 2845 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:48.190 UTC [cauthdsl] func1 -> DEBU 2846 0xc00482a4f0 gate 1569284748190839400 evaluation starts" +"2019-09-24 00:25:48.190 UTC [cauthdsl] func2 -> DEBU 2847 0xc00482a4f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.190 UTC [cauthdsl] func2 -> DEBU 2848 0xc00482a4f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.191 UTC [cauthdsl] func2 -> DEBU 2849 0xc00482a4f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:48.191 UTC [cauthdsl] func2 -> DEBU 284a 0xc00482a4f0 principal evaluation fails" +"2019-09-24 00:25:48.191 UTC [cauthdsl] func1 -> DEBU 284b 0xc00482a4f0 gate 1569284748190839400 evaluation fails" +"2019-09-24 00:25:48.191 UTC [policies] Evaluate -> DEBU 284c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.191 UTC [policies] Evaluate -> DEBU 284d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.191 UTC [policies] Evaluate -> DEBU 284e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:48.191 UTC [cauthdsl] func1 -> DEBU 284f 0xc00482ad30 gate 1569284748191448400 evaluation starts" +"2019-09-24 00:25:48.191 UTC [cauthdsl] func2 -> DEBU 2850 0xc00482ad30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.191 UTC [cauthdsl] func2 -> DEBU 2851 0xc00482ad30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.191 UTC [cauthdsl] func2 -> DEBU 2852 0xc00482ad30 principal matched by identity 0" +"2019-09-24 00:25:48.191 UTC [msp.identity] Verify -> DEBU 2853 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:48.196 UTC [msp.identity] Verify -> DEBU 2854 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:48.196 UTC [cauthdsl] func2 -> DEBU 2855 0xc00482ad30 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:48.196 UTC [cauthdsl] func1 -> DEBU 2856 0xc00482ad30 gate 1569284748191448400 evaluation succeeds" +"2019-09-24 00:25:48.196 UTC [policies] Evaluate -> DEBU 2857 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.197 UTC [policies] Evaluate -> DEBU 2858 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.197 UTC [policies] Evaluate -> DEBU 2859 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:48.197 UTC [policies] Evaluate -> DEBU 285a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:48.197 UTC [msp.identity] Verify -> DEBU 285b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:48.197 UTC [msp.identity] Verify -> DEBU 285c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:48.198 UTC [gossip.gossip] handleMessage -> DEBU 285d Exiting" +"2019-09-24 00:25:48.266 UTC [msp] DeserializeIdentity -> DEBU 285e Obtaining identity" +"2019-09-24 00:25:48.266 UTC [msp] DeserializeIdentity -> DEBU 285f Obtaining identity" +"2019-09-24 00:25:48.266 UTC [gossip.pull] Hello -> DEBU 2860 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:48.266 UTC [msp] DeserializeIdentity -> DEBU 2861 Obtaining identity" +"2019-09-24 00:25:48.266 UTC [msp] DeserializeIdentity -> DEBU 2862 Obtaining identity" +"2019-09-24 00:25:48.266 UTC [gossip.comm] Send -> DEBU 2863 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:48.266 UTC [gossip.comm] sendToEndpoint -> DEBU 2864 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.266 UTC [gossip.comm] sendToEndpoint -> DEBU 2865 Exiting" +"2019-09-24 00:25:48.275 UTC [gossip.comm] func1 -> DEBU 2866 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.275 UTC [gossip.gossip] handleMessage -> DEBU 2867 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.275 UTC [gossip.pull] HandleMessage -> DEBU 2868 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.275 UTC [gossip.gossip] handleMessage -> DEBU 2869 Exiting" +"2019-09-24 00:25:48.650 UTC [gossip.comm] func1 -> DEBU 286a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.650 UTC [gossip.gossip] handleMessage -> DEBU 286b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.650 UTC [msp] DeserializeIdentity -> DEBU 286c Obtaining identity" +"2019-09-24 00:25:48.651 UTC [msp] DeserializeIdentity -> DEBU 286d Obtaining identity" +"2019-09-24 00:25:48.651 UTC [gossip.gossip] handleMessage -> DEBU 286e Exiting" +"2019-09-24 00:25:48.686 UTC [gossip.comm] func1 -> DEBU 286f Got message: GossipMessage: tag:EMPTY mem_req:\276\017\354^\271(\375\317\263x\221\215\031\r\002 }\375\202\272\377V\313A)\025\343\373\234Ew9H\345I\210\037:\362rQe\276\331\262\341\305c" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.686 UTC [gossip.gossip] handleMessage -> DEBU 2870 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\276\017\354^\271(\375\317\263x\221\215\031\r\002 }\375\202\272\377V\313A)\025\343\373\234Ew9H\345I\210\037:\362rQe\276\331\262\341\305c" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.686 UTC [gossip.gossip] handleMessage -> DEBU 2871 Exiting" +"2019-09-24 00:25:48.687 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2872 Got message: GossipMessage: tag:EMPTY mem_req:\276\017\354^\271(\375\317\263x\221\215\031\r\002 }\375\202\272\377V\313A)\025\343\373\234Ew9H\345I\210\037:\362rQe\276\331\262\341\305c" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.687 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2873 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:48.687 UTC [msp] DeserializeIdentity -> DEBU 2874 Obtaining identity" +"2019-09-24 00:25:48.687 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2875 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:48.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2876 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2877 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:48.687 UTC [policies] Evaluate -> DEBU 2878 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:48.687 UTC [policies] Evaluate -> DEBU 2879 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:48.687 UTC [policies] Evaluate -> DEBU 287a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:48.687 UTC [cauthdsl] func1 -> DEBU 287b 0xc004841110 gate 1569284748687652600 evaluation starts" +"2019-09-24 00:25:48.687 UTC [cauthdsl] func2 -> DEBU 287c 0xc004841110 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.687 UTC [cauthdsl] func2 -> DEBU 287d 0xc004841110 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.687 UTC [cauthdsl] func2 -> DEBU 287e 0xc004841110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:48.687 UTC [cauthdsl] func2 -> DEBU 287f 0xc004841110 principal evaluation fails" +"2019-09-24 00:25:48.687 UTC [cauthdsl] func1 -> DEBU 2880 0xc004841110 gate 1569284748687652600 evaluation fails" +"2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 2881 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 2882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 2883 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:48.688 UTC [cauthdsl] func1 -> DEBU 2884 0xc004841950 gate 1569284748688136900 evaluation starts" +"2019-09-24 00:25:48.688 UTC [cauthdsl] func2 -> DEBU 2885 0xc004841950 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:48.688 UTC [cauthdsl] func2 -> DEBU 2886 0xc004841950 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:48.688 UTC [cauthdsl] func2 -> DEBU 2887 0xc004841950 principal matched by identity 0" +"2019-09-24 00:25:48.688 UTC [msp.identity] Verify -> DEBU 2888 Verify: digest = 00000000 4d c6 84 0d 24 9a 50 35 d6 87 bf 27 91 9e d0 93 |M...$.P5...'....| +00000010 f9 14 59 50 f0 ec c7 13 01 c7 f6 d6 6b 6d 90 14 |..YP........km..|" +"2019-09-24 00:25:48.688 UTC [msp.identity] Verify -> DEBU 2889 Verify: sig = 00000000 30 44 02 20 63 ae b4 f4 16 8f 13 aa 1d 71 c2 a0 |0D. c........q..| +00000010 32 20 d8 71 49 3e be 0f ec 5e b9 28 fd cf b3 78 |2 .qI>...^.(...x| +00000020 91 8d 19 0d 02 20 7d fd 82 ba ff 56 cb 41 29 15 |..... }....V.A).| +00000030 e3 fb 9c 45 77 39 48 e5 49 88 1f 3a f2 72 51 65 |...Ew9H.I..:.rQe| +00000040 be d9 b2 e1 c5 63 |.....c|" +"2019-09-24 00:25:48.688 UTC [cauthdsl] func2 -> DEBU 288a 0xc004841950 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:48.688 UTC [cauthdsl] func1 -> DEBU 288b 0xc004841950 gate 1569284748688136900 evaluation succeeds" +"2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 288c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 288d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 288e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:48.688 UTC [policies] Evaluate -> DEBU 288f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:48.688 UTC [gossip.discovery] handleAliveMessage -> DEBU 2890 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:48.688 UTC [gossip.discovery] learnExistingMembers -> DEBU 2891 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:48.688 UTC [gossip.discovery] learnExistingMembers -> DEBU 2892 updating membership: timestamp: " +"2019-09-24 00:25:48.688 UTC [gossip.discovery] learnExistingMembers -> DEBU 2893 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:48.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 2894 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:48.689 UTC [gossip.discovery] learnExistingMembers -> DEBU 2895 Exiting" +"2019-09-24 00:25:48.689 UTC [gossip.discovery] handleAliveMessage -> DEBU 2896 Exiting" +"2019-09-24 00:25:48.689 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2897 Exiting" +"2019-09-24 00:25:48.689 UTC [gossip.discovery] sendMemResponse -> DEBU 2898 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:48.689 UTC [msp] DeserializeIdentity -> DEBU 2899 Obtaining identity" +"2019-09-24 00:25:48.689 UTC [msp] DeserializeIdentity -> DEBU 289a Obtaining identity" +"2019-09-24 00:25:48.689 UTC [msp] DeserializeIdentity -> DEBU 289b Obtaining identity" +"2019-09-24 00:25:48.689 UTC [gossip.comm] Send -> DEBU 289c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:48.689 UTC [gossip.discovery] sendMemResponse -> DEBU 289d Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020," signature:"0D\002 _\237\210\0303\024\370\353?\3076\230\335\356\223!\022\214@>\344\271\3124z}\271\204[\251L\306\002 ,\231\364`\026\r\307\025\345\334\250\321If9\373\347wS\252\244p=\341\353\366\273\266\335\202}+" > alive:\276\017\354^\271(\375\317\263x\221\215\031\r\002 }\375\202\272\377V\313A)\025\343\373\234Ew9H\345I\210\037:\362rQe\276\331\262\341\305c" > alive: alive: " +"2019-09-24 00:25:48.689 UTC [gossip.comm] sendToEndpoint -> DEBU 289e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.689 UTC [gossip.comm] sendToEndpoint -> DEBU 289f Exiting" +"2019-09-24 00:25:48.717 UTC [gossip.comm] func1 -> DEBU 28a0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.717 UTC [gossip.gossip] handleMessage -> DEBU 28a1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.717 UTC [gossip.pull] HandleMessage -> DEBU 28a2 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.717 UTC [msp] DeserializeIdentity -> DEBU 28a3 Obtaining identity" +"2019-09-24 00:25:48.717 UTC [msp] DeserializeIdentity -> DEBU 28a4 Obtaining identity" +"2019-09-24 00:25:48.717 UTC [msp] DeserializeIdentity -> DEBU 28a5 Obtaining identity" +"2019-09-24 00:25:48.717 UTC [msp] DeserializeIdentity -> DEBU 28a6 Obtaining identity" +"2019-09-24 00:25:48.717 UTC [msp] DeserializeIdentity -> DEBU 28a7 Obtaining identity" +"2019-09-24 00:25:48.718 UTC [msp] DeserializeIdentity -> DEBU 28a8 Obtaining identity" +"2019-09-24 00:25:48.718 UTC [gossip.pull] SendDigest -> DEBU 28a9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:48.718 UTC [gossip.gossip] handleMessage -> DEBU 28aa Exiting" +"2019-09-24 00:25:48.773 UTC [gossip.comm] func1 -> DEBU 28ab Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.774 UTC [gossip.gossip] handleMessage -> DEBU 28ac Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.774 UTC [gossip.pull] HandleMessage -> DEBU 28ad GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:48.774 UTC [gossip.pull] SendDigest -> DEBU 28ae Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:48.774 UTC [gossip.gossip] handleMessage -> DEBU 28af Exiting" +"2019-09-24 00:25:49.156 UTC [gossip.gossip] handleMessage -> DEBU 28b0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:49.156 UTC [msp] DeserializeIdentity -> DEBU 28b1 Obtaining identity" +"2019-09-24 00:25:49.157 UTC [msp] DeserializeIdentity -> DEBU 28b2 Obtaining identity" +"2019-09-24 00:25:49.157 UTC [msp] DeserializeIdentity -> DEBU 28b3 Obtaining identity" +"2019-09-24 00:25:49.157 UTC [gossip.gossip] handleMessage -> DEBU 28b4 Exiting" +"2019-09-24 00:25:49.610 UTC [msp] GetDefaultSigningIdentity -> DEBU 28b5 Obtaining default signing identity" +"2019-09-24 00:25:49.610 UTC [msp.identity] Sign -> DEBU 28b6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151029 " +"2019-09-24 00:25:49.610 UTC [msp.identity] Sign -> DEBU 28b7 Sign: digest: E8A3E9941358E82A2DF1CC6F0E5C5A2E6C60885B48D5B2D2A20BB17D3C73FBCC " +"2019-09-24 00:25:49.610 UTC [msp] GetDefaultSigningIdentity -> DEBU 28b8 Obtaining default signing identity" +"2019-09-24 00:25:49.610 UTC [msp.identity] Sign -> DEBU 28b9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:49.610 UTC [msp.identity] Sign -> DEBU 28ba Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:49.611 UTC [gossip.discovery] periodicalSendAlive -> DEBU 28bb Sleeping 5s" +"2019-09-24 00:25:49.613 UTC [msp] DeserializeIdentity -> DEBU 28bc Obtaining identity" +"2019-09-24 00:25:49.614 UTC [msp] DeserializeIdentity -> DEBU 28bd Obtaining identity" +"2019-09-24 00:25:49.614 UTC [msp] DeserializeIdentity -> DEBU 28be Obtaining identity" +"2019-09-24 00:25:49.618 UTC [gossip.comm] Send -> DEBU 28bf Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:49.618 UTC [gossip.comm] Send -> DEBU 28c0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:49.618 UTC [msp] DeserializeIdentity -> DEBU 28c1 Obtaining identity" +"2019-09-24 00:25:49.618 UTC [gossip.comm] Send -> DEBU 28c2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:49.618 UTC [gossip.comm] sendToEndpoint -> DEBU 28c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.618 UTC [gossip.comm] sendToEndpoint -> DEBU 28c4 Exiting" +"2019-09-24 00:25:49.618 UTC [gossip.comm] sendToEndpoint -> DEBU 28c5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 28c6 Exiting" +"2019-09-24 00:25:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 28c7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 28c8 Exiting" +"2019-09-24 00:25:49.638 UTC [gossip.comm] func1 -> DEBU 28c9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.638 UTC [gossip.gossip] handleMessage -> DEBU 28ca Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.638 UTC [gossip.gossip] handleMessage -> DEBU 28cb Exiting" +"2019-09-24 00:25:49.638 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28cc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.638 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28cd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:49.638 UTC [msp.identity] Verify -> DEBU 28ce Verify: digest = 00000000 e8 a3 e9 94 13 58 e8 2a 2d f1 cc 6f 0e 5c 5a 2e |.....X.*-..o.\Z.| +00000010 6c 60 88 5b 48 d5 b2 d2 a2 0b b1 7d 3c 73 fb cc |l`.[H......} DEBU 28cf Verify: sig = 00000000 30 45 02 21 00 a2 fe 0e 1c 5c 82 07 94 df 3e 19 |0E.!.....\....>.| +00000010 1e d5 87 6a ee 16 32 82 c1 9b 0a 9c e8 82 ff 07 |...j..2.........| +00000020 e8 dc b8 d1 ba 02 20 7d 10 cc db 77 46 de 8b ba |...... }...wF...| +00000030 4c 45 14 00 4b 43 ab 2b b8 ec 09 34 4e 44 f1 f9 |LE..KC.+...4ND..| +00000040 15 6a bb a9 84 04 50 |.j....P|" +"2019-09-24 00:25:49.638 UTC [gossip.discovery] isSentByMe -> DEBU 28d0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.638 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d1 Exiting" +"2019-09-24 00:25:49.653 UTC [gossip.gossip] handleMessage -> DEBU 28d2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.653 UTC [gossip.gossip] handleMessage -> DEBU 28d3 Exiting" +"2019-09-24 00:25:49.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.653 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28d5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:49.653 UTC [msp.identity] Verify -> DEBU 28d6 Verify: digest = 00000000 e8 a3 e9 94 13 58 e8 2a 2d f1 cc 6f 0e 5c 5a 2e |.....X.*-..o.\Z.| +00000010 6c 60 88 5b 48 d5 b2 d2 a2 0b b1 7d 3c 73 fb cc |l`.[H......} DEBU 28d7 Verify: sig = 00000000 30 45 02 21 00 a2 fe 0e 1c 5c 82 07 94 df 3e 19 |0E.!.....\....>.| +00000010 1e d5 87 6a ee 16 32 82 c1 9b 0a 9c e8 82 ff 07 |...j..2.........| +00000020 e8 dc b8 d1 ba 02 20 7d 10 cc db 77 46 de 8b ba |...... }...wF...| +00000030 4c 45 14 00 4b 43 ab 2b b8 ec 09 34 4e 44 f1 f9 |LE..KC.+...4ND..| +00000040 15 6a bb a9 84 04 50 |.j....P|" +"2019-09-24 00:25:49.653 UTC [gossip.discovery] isSentByMe -> DEBU 28d8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d9 Exiting" +"2019-09-24 00:25:49.675 UTC [gossip.comm] func1 -> DEBU 28da Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:49.675 UTC [gossip.gossip] handleMessage -> DEBU 28db Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:49.675 UTC [gossip.pull] HandleMessage -> DEBU 28dc GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:49.675 UTC [gossip.pull] SendDigest -> DEBU 28dd Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:49.675 UTC [gossip.gossip] handleMessage -> DEBU 28de Exiting" +"2019-09-24 00:25:49.727 UTC [gossip.comm] func1 -> DEBU 28df Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020-" signature:"0E\002!\000\371\351\276\317S)$l\001F\213\332\360\035\023\221\31264dV\t\367\233i-\357yoN\325\222\002 [\372\007\010J\204\2171n-<{\241i\302\374\232\343\207\371\032Kgf\2321,\350\342\301\374\005" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:49.727 UTC [gossip.gossip] handleMessage -> DEBU 28e0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020-" signature:"0E\002!\000\371\351\276\317S)$l\001F\213\332\360\035\023\221\31264dV\t\367\233i-\357yoN\325\222\002 [\372\007\010J\204\2171n-<{\241i\302\374\232\343\207\371\032Kgf\2321,\350\342\301\374\005" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:49.728 UTC [gossip.gossip] handleMessage -> DEBU 28e1 Exiting" +"2019-09-24 00:25:49.728 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28e2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020-" signature:"0E\002!\000\371\351\276\317S)$l\001F\213\332\360\035\023\221\31264dV\t\367\233i-\357yoN\325\222\002 [\372\007\010J\204\2171n-<{\241i\302\374\232\343\207\371\032Kgf\2321,\350\342\301\374\005" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:49.728 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28e3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:49.728 UTC [msp.identity] Verify -> DEBU 28e4 Verify: digest = 00000000 ed fb 16 d4 43 af 88 8b ee 62 0b 75 a8 5f ba 06 |....C....b.u._..| +00000010 11 fe e3 77 6b ab 0c f2 b2 71 88 4e 6b 6a e1 ef |...wk....q.Nkj..|" +"2019-09-24 00:25:49.728 UTC [msp.identity] Verify -> DEBU 28e5 Verify: sig = 00000000 30 45 02 21 00 f9 e9 be cf 53 29 24 6c 01 46 8b |0E.!.....S)$l.F.| +00000010 da f0 1d 13 91 ca 36 34 64 56 09 f7 9b 69 2d ef |......64dV...i-.| +00000020 79 6f 4e d5 92 02 20 5b fa 07 08 4a 84 8f 31 6e |yoN... [...J..1n| +00000030 2d 3c 7b a1 69 c2 fc 9a e3 87 f9 1a 4b 67 66 9a |-<{.i.......Kgf.| +00000040 31 2c e8 e2 c1 fc 05 |1,.....|" +"2019-09-24 00:25:49.728 UTC [msp.identity] Verify -> DEBU 28e6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:49.728 UTC [msp.identity] Verify -> DEBU 28e7 Verify: sig = 00000000 30 44 02 20 7b e9 ab e8 e1 cf 31 3b e3 b7 42 e0 |0D. {.....1;..B.| +00000010 95 64 a2 51 95 b7 a2 80 2e 54 2b 27 f1 3b 14 0e |.d.Q.....T+'.;..| +00000020 ab 3c 7b fe 02 20 4d f8 d0 fa 11 18 a3 09 b1 fa |.<{.. M.........| +00000030 d8 3b c0 78 66 5b 27 f4 85 a8 00 50 3f 0d 6b c4 |.;.xf['....P?.k.| +00000040 89 71 ad 1a f6 59 |.q...Y|" +"2019-09-24 00:25:49.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 28e8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:49.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 28e9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:49.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 28ea updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:49.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 28eb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:49.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 28ec Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:49.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 28ed Exiting" +"2019-09-24 00:25:49.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 28ee Exiting" +"2019-09-24 00:25:49.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28ef Exiting" +"2019-09-24 00:25:49.729 UTC [gossip.discovery] sendMemResponse -> DEBU 28f0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:49.729 UTC [msp] DeserializeIdentity -> DEBU 28f1 Obtaining identity" +"2019-09-24 00:25:49.730 UTC [msp] DeserializeIdentity -> DEBU 28f2 Obtaining identity" +"2019-09-24 00:25:49.732 UTC [gossip.comm] Send -> DEBU 28f3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:49.733 UTC [gossip.comm] sendToEndpoint -> DEBU 28f4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:49.733 UTC [gossip.comm] sendToEndpoint -> DEBU 28f5 Exiting" +"2019-09-24 00:25:49.733 UTC [gossip.discovery] sendMemResponse -> DEBU 28f6 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020-" signature:"0E\002!\000\371\351\276\317S)$l\001F\213\332\360\035\023\221\31264dV\t\367\233i-\357yoN\325\222\002 [\372\007\010J\204\2171n-<{\241i\302\374\232\343\207\371\032Kgf\2321,\350\342\301\374\005" secret_envelope: > alive:\031\036\325\207j\356\0262\202\301\233\n\234\350\202\377\007\350\334\270\321\272\002 }\020\314\333wF\336\213\272LE\024\000KC\253+\270\354\t4ND\361\371\025j\273\251\204\004P" > " +"2019-09-24 00:25:49.976 UTC [gossip.gossip] handleMessage -> DEBU 28f7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.979 UTC [gossip.gossip] handleMessage -> DEBU 28f8 Exiting" +"2019-09-24 00:25:49.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28f9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.979 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28fa Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:49.979 UTC [msp] DeserializeIdentity -> DEBU 28fb Obtaining identity" +"2019-09-24 00:25:49.979 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:49.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28fd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:49.980 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28fe Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:49.980 UTC [policies] Evaluate -> DEBU 28ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:49.980 UTC [policies] Evaluate -> DEBU 2900 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:49.980 UTC [policies] Evaluate -> DEBU 2901 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:49.980 UTC [cauthdsl] func1 -> DEBU 2902 0xc0048d5300 gate 1569284749980348400 evaluation starts" +"2019-09-24 00:25:49.980 UTC [cauthdsl] func2 -> DEBU 2903 0xc0048d5300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:49.980 UTC [cauthdsl] func2 -> DEBU 2904 0xc0048d5300 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:49.980 UTC [cauthdsl] func2 -> DEBU 2905 0xc0048d5300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:49.980 UTC [cauthdsl] func2 -> DEBU 2906 0xc0048d5300 principal evaluation fails" +"2019-09-24 00:25:49.980 UTC [cauthdsl] func1 -> DEBU 2907 0xc0048d5300 gate 1569284749980348400 evaluation fails" +"2019-09-24 00:25:49.980 UTC [policies] Evaluate -> DEBU 2908 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:49.987 UTC [policies] Evaluate -> DEBU 290a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:49.987 UTC [policies] Evaluate -> DEBU 290b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:49.987 UTC [cauthdsl] func1 -> DEBU 290c 0xc0048d5b40 gate 1569284749987635100 evaluation starts" +"2019-09-24 00:25:49.987 UTC [cauthdsl] func2 -> DEBU 290d 0xc0048d5b40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:49.987 UTC [cauthdsl] func2 -> DEBU 290e 0xc0048d5b40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:49.987 UTC [cauthdsl] func2 -> DEBU 290f 0xc0048d5b40 principal matched by identity 0" +"2019-09-24 00:25:49.987 UTC [gossip.comm] func1 -> DEBU 2909 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.987 UTC [msp.identity] Verify -> DEBU 2910 Verify: digest = 00000000 0e 05 22 77 1a 6c 2d e5 f4 30 bc 77 d5 08 3f 0c |.."w.l-..0.w..?.| +00000010 8e 2b d5 b5 51 32 d9 64 51 a5 c5 c2 1f 46 3d b0 |.+..Q2.dQ....F=.|" +"2019-09-24 00:25:49.987 UTC [gossip.gossip] handleMessage -> DEBU 2911 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.987 UTC [msp.identity] Verify -> DEBU 2912 Verify: sig = 00000000 30 45 02 21 00 e0 22 96 30 31 2e 10 9e b2 79 4c |0E.!..".01....yL| +00000010 14 c7 e4 bb 7b bf 01 3c 72 ee ca ca 9b c3 99 75 |....{.. DEBU 2913 0xc0048d5b40 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:49.988 UTC [cauthdsl] func1 -> DEBU 2914 0xc0048d5b40 gate 1569284749987635100 evaluation succeeds" +"2019-09-24 00:25:49.988 UTC [policies] Evaluate -> DEBU 2915 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:49.988 UTC [policies] Evaluate -> DEBU 2916 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:49.988 UTC [policies] Evaluate -> DEBU 2917 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:49.988 UTC [policies] Evaluate -> DEBU 2918 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:49.988 UTC [gossip.discovery] handleAliveMessage -> DEBU 2919 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.988 UTC [gossip.discovery] learnExistingMembers -> DEBU 291a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:49.988 UTC [gossip.discovery] learnExistingMembers -> DEBU 291b updating membership: timestamp: " +"2019-09-24 00:25:49.988 UTC [gossip.discovery] learnExistingMembers -> DEBU 291c Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:49.988 UTC [gossip.discovery] learnExistingMembers -> DEBU 291d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:49.988 UTC [gossip.discovery] learnExistingMembers -> DEBU 291e Exiting" +"2019-09-24 00:25:49.989 UTC [gossip.discovery] handleAliveMessage -> DEBU 291f Exiting" +"2019-09-24 00:25:49.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2920 Exiting" +"2019-09-24 00:25:49.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2921 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2922 Exiting" +"2019-09-24 00:25:49.989 UTC [gossip.gossip] handleMessage -> DEBU 2923 Exiting" +"2019-09-24 00:25:49.989 UTC [msp] DeserializeIdentity -> DEBU 2924 Obtaining identity" +"2019-09-24 00:25:49.989 UTC [msp] DeserializeIdentity -> DEBU 2925 Obtaining identity" +"2019-09-24 00:25:49.989 UTC [msp] DeserializeIdentity -> DEBU 2926 Obtaining identity" +"2019-09-24 00:25:49.990 UTC [msp] DeserializeIdentity -> DEBU 2927 Obtaining identity" +"2019-09-24 00:25:49.990 UTC [msp] DeserializeIdentity -> DEBU 2928 Obtaining identity" +"2019-09-24 00:25:49.990 UTC [msp] DeserializeIdentity -> DEBU 2929 Obtaining identity" +"2019-09-24 00:25:49.990 UTC [gossip.comm] Send -> DEBU 292a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:49.990 UTC [msp] DeserializeIdentity -> DEBU 292b Obtaining identity" +"2019-09-24 00:25:49.990 UTC [msp] DeserializeIdentity -> DEBU 292c Obtaining identity" +"2019-09-24 00:25:49.990 UTC [gossip.comm] Send -> DEBU 292d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:49.990 UTC [gossip.comm] sendToEndpoint -> DEBU 292e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.994 UTC [gossip.comm] sendToEndpoint -> DEBU 2930 Exiting" +"2019-09-24 00:25:49.994 UTC [gossip.comm] func1 -> DEBU 292f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.994 UTC [gossip.comm] sendToEndpoint -> DEBU 2931 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.994 UTC [gossip.comm] sendToEndpoint -> DEBU 2932 Exiting" +"2019-09-24 00:25:49.994 UTC [gossip.gossip] handleMessage -> DEBU 2933 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.995 UTC [gossip.gossip] handleMessage -> DEBU 2934 Exiting" +"2019-09-24 00:25:49.995 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2935 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:49.995 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2936 Exiting" +"2019-09-24 00:25:50.075 UTC [gossip.comm] func1 -> DEBU 2937 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:50.075 UTC [gossip.gossip] handleMessage -> DEBU 2938 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:50.075 UTC [msp] DeserializeIdentity -> DEBU 2939 Obtaining identity" +"2019-09-24 00:25:50.075 UTC [msp] DeserializeIdentity -> DEBU 293a Obtaining identity" +"2019-09-24 00:25:50.075 UTC [msp] DeserializeIdentity -> DEBU 293b Obtaining identity" +"2019-09-24 00:25:50.075 UTC [gossip.gossip] handleMessage -> DEBU 293c Exiting" +"2019-09-24 00:25:50.694 UTC [gossip.comm] func1 -> DEBU 293d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:50.694 UTC [gossip.gossip] handleMessage -> DEBU 293e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:50.694 UTC [gossip.gossip] handleMessage -> DEBU 293f Exiting" +"2019-09-24 00:25:50.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2940 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:50.695 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2941 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:50.695 UTC [msp] DeserializeIdentity -> DEBU 2942 Obtaining identity" +"2019-09-24 00:25:50.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2943 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:50.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2944 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:50.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2945 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:50.695 UTC [policies] Evaluate -> DEBU 2946 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:50.695 UTC [policies] Evaluate -> DEBU 2947 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:50.695 UTC [policies] Evaluate -> DEBU 2948 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func1 -> DEBU 2949 0xc0049111d0 gate 1569284750696007800 evaluation starts" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 294a 0xc0049111d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 294b 0xc0049111d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 294c 0xc0049111d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 294d 0xc0049111d0 principal evaluation fails" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func1 -> DEBU 294e 0xc0049111d0 gate 1569284750696007800 evaluation fails" +"2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 294f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 2950 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 2951 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func1 -> DEBU 2952 0xc004911a10 gate 1569284750696436900 evaluation starts" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 2953 0xc004911a10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 2954 0xc004911a10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 2955 0xc004911a10 principal matched by identity 0" +"2019-09-24 00:25:50.696 UTC [msp.identity] Verify -> DEBU 2956 Verify: digest = 00000000 a7 0a c6 49 a8 92 13 01 db 2c 12 33 34 d3 88 12 |...I.....,.34...| +00000010 da 16 b4 3b 13 0c b4 73 35 12 79 e4 26 42 0a 7d |...;...s5.y.&B.}|" +"2019-09-24 00:25:50.696 UTC [msp.identity] Verify -> DEBU 2957 Verify: sig = 00000000 30 44 02 20 43 0a af 63 bb c0 4f d2 05 7e 72 2b |0D. C..c..O..~r+| +00000010 b4 12 76 cc eb 8d 39 9e e1 27 d8 23 1b 8d 26 62 |..v...9..'.#..&b| +00000020 7d 95 b7 c7 02 20 22 4b 67 29 e8 b2 8d 69 77 cb |}.... "Kg)...iw.| +00000030 62 cd e0 ad 41 4c bc 5e 93 de f6 47 ad b4 08 c2 |b...AL.^...G....| +00000040 8b 63 01 1d 50 32 |.c..P2|" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func2 -> DEBU 2958 0xc004911a10 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:50.696 UTC [cauthdsl] func1 -> DEBU 2959 0xc004911a10 gate 1569284750696436900 evaluation succeeds" +"2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 295a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 295b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:50.696 UTC [policies] Evaluate -> DEBU 295c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:50.697 UTC [policies] Evaluate -> DEBU 295d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:50.697 UTC [gossip.discovery] handleAliveMessage -> DEBU 295e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:50.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 295f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:50.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 2960 updating membership: timestamp: " +"2019-09-24 00:25:50.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 2961 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:50.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 2962 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:50.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 2963 Exiting" +"2019-09-24 00:25:50.697 UTC [gossip.discovery] handleAliveMessage -> DEBU 2964 Exiting" +"2019-09-24 00:25:50.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2965 Exiting" +"2019-09-24 00:25:50.702 UTC [msp] DeserializeIdentity -> DEBU 2966 Obtaining identity" +"2019-09-24 00:25:50.702 UTC [msp] DeserializeIdentity -> DEBU 2967 Obtaining identity" +"2019-09-24 00:25:50.702 UTC [msp] DeserializeIdentity -> DEBU 2968 Obtaining identity" +"2019-09-24 00:25:50.702 UTC [msp] DeserializeIdentity -> DEBU 2969 Obtaining identity" +"2019-09-24 00:25:50.703 UTC [msp] DeserializeIdentity -> DEBU 296a Obtaining identity" +"2019-09-24 00:25:50.703 UTC [msp] DeserializeIdentity -> DEBU 296b Obtaining identity" +"2019-09-24 00:25:50.703 UTC [msp] DeserializeIdentity -> DEBU 296c Obtaining identity" +"2019-09-24 00:25:50.703 UTC [gossip.comm] Send -> DEBU 296d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:50.703 UTC [msp] DeserializeIdentity -> DEBU 296e Obtaining identity" +"2019-09-24 00:25:50.703 UTC [gossip.comm] Send -> DEBU 296f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 2970 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 2971 Exiting" +"2019-09-24 00:25:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 2972 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 2973 Exiting" +"2019-09-24 00:25:50.714 UTC [gossip.gossip] handleMessage -> DEBU 2974 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:50.714 UTC [gossip.gossip] handleMessage -> DEBU 2975 Exiting" +"2019-09-24 00:25:50.714 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2976 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:50.714 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2977 Exiting" +"2019-09-24 00:25:50.724 UTC [gossip.comm] func1 -> DEBU 2978 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:50.724 UTC [gossip.gossip] handleMessage -> DEBU 2979 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:50.724 UTC [gossip.gossip] handleMessage -> DEBU 297a Exiting" +"2019-09-24 00:25:50.724 UTC [gossip.discovery] handleMsgFromComm -> DEBU 297b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:50.724 UTC [gossip.discovery] handleMsgFromComm -> DEBU 297c Exiting" +"2019-09-24 00:25:51.707 UTC [gossip.pull] Hello -> DEBU 297d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:51.708 UTC [gossip.comm] Send -> DEBU 297e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:51.708 UTC [gossip.pull] Hello -> DEBU 297f Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:51.708 UTC [gossip.comm] Send -> DEBU 2980 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:51.708 UTC [gossip.pull] Hello -> DEBU 2981 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:51.708 UTC [gossip.comm] Send -> DEBU 2982 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:51.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2983 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.708 UTC [gossip.comm] sendToEndpoint -> DEBU 2984 Exiting" +"2019-09-24 00:25:51.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2985 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2986 Exiting" +"2019-09-24 00:25:51.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2987 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2988 Exiting" +"2019-09-24 00:25:51.711 UTC [msp] GetDefaultSigningIdentity -> DEBU 2989 Obtaining default signing identity" +"2019-09-24 00:25:51.711 UTC [msp.identity] Sign -> DEBU 298a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102A " +"2019-09-24 00:25:51.711 UTC [msp.identity] Sign -> DEBU 298b Sign: digest: E40B62907C04858CC2D69CE2987AB20234BED471E14D9CD5B9B331B7666E0826 " +"2019-09-24 00:25:51.711 UTC [msp] GetDefaultSigningIdentity -> DEBU 298c Obtaining default signing identity" +"2019-09-24 00:25:51.711 UTC [msp.identity] Sign -> DEBU 298d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:51.711 UTC [msp.identity] Sign -> DEBU 298e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:51.711 UTC [gossip.comm] Send -> DEBU 298f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:51.711 UTC [msp] DeserializeIdentity -> DEBU 2990 Obtaining identity" +"2019-09-24 00:25:51.711 UTC [gossip.comm] Send -> DEBU 2991 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:51.712 UTC [msp] DeserializeIdentity -> DEBU 2992 Obtaining identity" +"2019-09-24 00:25:51.712 UTC [gossip.comm] Send -> DEBU 2993 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:51.712 UTC [gossip.comm] sendToEndpoint -> DEBU 2994 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.712 UTC [gossip.comm] sendToEndpoint -> DEBU 2995 Exiting" +"2019-09-24 00:25:51.712 UTC [gossip.comm] sendToEndpoint -> DEBU 2996 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.724 UTC [gossip.comm] sendToEndpoint -> DEBU 2997 Exiting" +"2019-09-24 00:25:51.724 UTC [gossip.comm] sendToEndpoint -> DEBU 2998 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.724 UTC [gossip.comm] sendToEndpoint -> DEBU 2999 Exiting" +"2019-09-24 00:25:51.724 UTC [gossip.comm] func1 -> DEBU 299a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.725 UTC [gossip.gossip] handleMessage -> DEBU 299b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.725 UTC [gossip.pull] HandleMessage -> DEBU 299c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.725 UTC [gossip.gossip] handleMessage -> DEBU 299d Exiting" +"2019-09-24 00:25:51.742 UTC [gossip.comm] func1 -> DEBU 299e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.742 UTC [gossip.gossip] handleMessage -> DEBU 299f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.742 UTC [gossip.gossip] handleMessage -> DEBU 29a0 Exiting" +"2019-09-24 00:25:51.742 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29a1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.744 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29a2 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:51.744 UTC [msp.identity] Verify -> DEBU 29a3 Verify: digest = 00000000 e4 0b 62 90 7c 04 85 8c c2 d6 9c e2 98 7a b2 02 |..b.|........z..| +00000010 34 be d4 71 e1 4d 9c d5 b9 b3 31 b7 66 6e 08 26 |4..q.M....1.fn.&|" +"2019-09-24 00:25:51.744 UTC [msp.identity] Verify -> DEBU 29a4 Verify: sig = 00000000 30 44 02 20 5d c8 9e b1 dd 96 8a e7 69 5c dd 3f |0D. ].......i\.?| +00000010 e7 56 5a fb 09 0e 1c 39 64 8e 70 d0 0a 33 b8 49 |.VZ....9d.p..3.I| +00000020 b9 a0 46 ad 02 20 52 93 a5 80 99 31 1a 07 e2 ed |..F.. R....1....| +00000030 cd e6 1d a0 a1 9b ba 96 ab 0a e7 56 78 2e 6a a7 |...........Vx.j.| +00000040 a7 ee 12 9d 51 87 |....Q.|" +"2019-09-24 00:25:51.744 UTC [msp.identity] Verify -> DEBU 29a5 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:51.744 UTC [msp.identity] Verify -> DEBU 29a6 Verify: sig = 00000000 30 45 02 21 00 a4 4d a3 fa 94 0f 00 58 72 00 44 |0E.!..M.....Xr.D| +00000010 c4 e5 bc da 59 ad 7f f1 b6 28 a8 aa 5c 3b 96 08 |....Y....(..\;..| +00000020 77 ae 64 1d 22 02 20 36 b7 a2 57 74 44 a2 25 35 |w.d.". 6..WtD.%5| +00000030 0c 88 40 20 6e c5 52 10 7c 39 bb 0c 69 05 c6 70 |..@ n.R.|9..i..p| +00000040 d5 21 7c 0b 2f 88 70 |.!|./.p|" +"2019-09-24 00:25:51.744 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:51.744 UTC [gossip.discovery] isSentByMe -> DEBU 29a8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:51.745 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a9 Exiting" +"2019-09-24 00:25:51.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29aa Exiting" +"2019-09-24 00:25:51.745 UTC [gossip.gossip] handleMessage -> DEBU 29ab Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.745 UTC [gossip.pull] HandleMessage -> DEBU 29ac GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.746 UTC [gossip.gossip] handleMessage -> DEBU 29ad Exiting" +"2019-09-24 00:25:51.746 UTC [gossip.gossip] handleMessage -> DEBU 29ae Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.746 UTC [gossip.gossip] handleMessage -> DEBU 29af Exiting" +"2019-09-24 00:25:51.748 UTC [gossip.comm] func1 -> DEBU 29b0 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.749 UTC [gossip.comm] func1 -> DEBU 29b1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.749 UTC [gossip.gossip] handleMessage -> DEBU 29b2 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.749 UTC [gossip.pull] HandleMessage -> DEBU 29b3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.749 UTC [gossip.gossip] handleMessage -> DEBU 29b4 Exiting" +"2019-09-24 00:25:51.749 UTC [gossip.gossip] handleMessage -> DEBU 29b5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29b6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.759 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29b7 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:51.760 UTC [msp.identity] Verify -> DEBU 29b8 Verify: digest = 00000000 ed fb 16 d4 43 af 88 8b ee 62 0b 75 a8 5f ba 06 |....C....b.u._..| +00000010 11 fe e3 77 6b ab 0c f2 b2 71 88 4e 6b 6a e1 ef |...wk....q.Nkj..|" +"2019-09-24 00:25:51.760 UTC [msp.identity] Verify -> DEBU 29b9 Verify: sig = 00000000 30 45 02 21 00 f9 e9 be cf 53 29 24 6c 01 46 8b |0E.!.....S)$l.F.| +00000010 da f0 1d 13 91 ca 36 34 64 56 09 f7 9b 69 2d ef |......64dV...i-.| +00000020 79 6f 4e d5 92 02 20 5b fa 07 08 4a 84 8f 31 6e |yoN... [...J..1n| +00000030 2d 3c 7b a1 69 c2 fc 9a e3 87 f9 1a 4b 67 66 9a |-<{.i.......Kgf.| +00000040 31 2c e8 e2 c1 fc 05 |1,.....|" +"2019-09-24 00:25:51.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 29ba Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:51.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 29bb Exiting" +"2019-09-24 00:25:51.760 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29bc Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:51.760 UTC [msp.identity] Verify -> DEBU 29bd Verify: digest = 00000000 e4 0b 62 90 7c 04 85 8c c2 d6 9c e2 98 7a b2 02 |..b.|........z..| +00000010 34 be d4 71 e1 4d 9c d5 b9 b3 31 b7 66 6e 08 26 |4..q.M....1.fn.&|" +"2019-09-24 00:25:51.760 UTC [msp.identity] Verify -> DEBU 29be Verify: sig = 00000000 30 44 02 20 5d c8 9e b1 dd 96 8a e7 69 5c dd 3f |0D. ].......i\.?| +00000010 e7 56 5a fb 09 0e 1c 39 64 8e 70 d0 0a 33 b8 49 |.VZ....9d.p..3.I| +00000020 b9 a0 46 ad 02 20 52 93 a5 80 99 31 1a 07 e2 ed |..F.. R....1....| +00000030 cd e6 1d a0 a1 9b ba 96 ab 0a e7 56 78 2e 6a a7 |...........Vx.j.| +00000040 a7 ee 12 9d 51 87 |....Q.|" +"2019-09-24 00:25:51.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 29bf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:51.761 UTC [gossip.discovery] isSentByMe -> DEBU 29c0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:51.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 29c1 Exiting" +"2019-09-24 00:25:51.761 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29c2 Exiting" +"2019-09-24 00:25:51.770 UTC [gossip.gossip] handleMessage -> DEBU 29c3 Exiting" +"2019-09-24 00:25:51.771 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29c4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.779 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29c5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:51.789 UTC [msp.identity] Verify -> DEBU 29c6 Verify: digest = 00000000 e4 0b 62 90 7c 04 85 8c c2 d6 9c e2 98 7a b2 02 |..b.|........z..| +00000010 34 be d4 71 e1 4d 9c d5 b9 b3 31 b7 66 6e 08 26 |4..q.M....1.fn.&|" +"2019-09-24 00:25:51.789 UTC [msp.identity] Verify -> DEBU 29c7 Verify: sig = 00000000 30 44 02 20 5d c8 9e b1 dd 96 8a e7 69 5c dd 3f |0D. ].......i\.?| +00000010 e7 56 5a fb 09 0e 1c 39 64 8e 70 d0 0a 33 b8 49 |.VZ....9d.p..3.I| +00000020 b9 a0 46 ad 02 20 52 93 a5 80 99 31 1a 07 e2 ed |..F.. R....1....| +00000030 cd e6 1d a0 a1 9b ba 96 ab 0a e7 56 78 2e 6a a7 |...........Vx.j.| +00000040 a7 ee 12 9d 51 87 |....Q.|" +"2019-09-24 00:25:51.791 UTC [gossip.discovery] handleAliveMessage -> DEBU 29c8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:51.791 UTC [gossip.discovery] isSentByMe -> DEBU 29c9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:51.795 UTC [gossip.discovery] handleAliveMessage -> DEBU 29ca Exiting" +"2019-09-24 00:25:51.795 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29cb Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:51.796 UTC [msp.identity] Verify -> DEBU 29cc Verify: digest = 00000000 ed fb 16 d4 43 af 88 8b ee 62 0b 75 a8 5f ba 06 |....C....b.u._..| +00000010 11 fe e3 77 6b ab 0c f2 b2 71 88 4e 6b 6a e1 ef |...wk....q.Nkj..|" +"2019-09-24 00:25:51.796 UTC [msp.identity] Verify -> DEBU 29cd Verify: sig = 00000000 30 45 02 21 00 f9 e9 be cf 53 29 24 6c 01 46 8b |0E.!.....S)$l.F.| +00000010 da f0 1d 13 91 ca 36 34 64 56 09 f7 9b 69 2d ef |......64dV...i-.| +00000020 79 6f 4e d5 92 02 20 5b fa 07 08 4a 84 8f 31 6e |yoN... [...J..1n| +00000030 2d 3c 7b a1 69 c2 fc 9a e3 87 f9 1a 4b 67 66 9a |-<{.i.......Kgf.| +00000040 31 2c e8 e2 c1 fc 05 |1,.....|" +"2019-09-24 00:25:51.797 UTC [gossip.discovery] handleAliveMessage -> DEBU 29ce Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:51.797 UTC [gossip.discovery] handleAliveMessage -> DEBU 29cf Exiting" +"2019-09-24 00:25:51.797 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29d0 Exiting" +"2019-09-24 00:25:51.949 UTC [gossip.gossip] handleMessage -> DEBU 29d1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.949 UTC [gossip.pull] HandleMessage -> DEBU 29d2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d3 Obtaining identity" +"2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d4 Obtaining identity" +"2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d5 Obtaining identity" +"2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d6 Obtaining identity" +"2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d7 Obtaining identity" +"2019-09-24 00:25:51.949 UTC [msp] DeserializeIdentity -> DEBU 29d8 Obtaining identity" +"2019-09-24 00:25:51.949 UTC [gossip.pull] SendDigest -> DEBU 29d9 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:51.949 UTC [gossip.gossip] handleMessage -> DEBU 29da Exiting" +"2019-09-24 00:25:51.962 UTC [gossip.gossip] handleMessage -> DEBU 29db Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.962 UTC [gossip.gossip] handleMessage -> DEBU 29dc Exiting" +"2019-09-24 00:25:51.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29dd Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.962 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29de Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:51.962 UTC [msp] DeserializeIdentity -> DEBU 29df Obtaining identity" +"2019-09-24 00:25:51.968 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:51.968 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29e1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:51.968 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29e2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:51.968 UTC [policies] Evaluate -> DEBU 29e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:51.968 UTC [policies] Evaluate -> DEBU 29e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func1 -> DEBU 29e6 0xc0049a1790 gate 1569284751969079300 evaluation starts" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29e7 0xc0049a1790 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29e8 0xc0049a1790 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29e9 0xc0049a1790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29ea 0xc0049a1790 principal evaluation fails" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func1 -> DEBU 29eb 0xc0049a1790 gate 1569284751969079300 evaluation fails" +"2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func1 -> DEBU 29ef 0xc0049a1fd0 gate 1569284751969430500 evaluation starts" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29f0 0xc0049a1fd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29f1 0xc0049a1fd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29f2 0xc0049a1fd0 principal matched by identity 0" +"2019-09-24 00:25:51.969 UTC [msp.identity] Verify -> DEBU 29f3 Verify: digest = 00000000 bb 3f a4 60 82 12 87 6d 75 69 59 29 9f 68 c8 cb |.?.`...muiY).h..| +00000010 7a 09 e2 ea bd ed 26 82 59 28 f3 cb f2 5b 3b 66 |z.....&.Y(...[;f|" +"2019-09-24 00:25:51.969 UTC [msp.identity] Verify -> DEBU 29f4 Verify: sig = 00000000 30 44 02 20 13 67 85 ba c5 21 2d 90 94 89 5e 20 |0D. .g...!-...^ | +00000010 07 90 a3 4d 8a f7 a0 19 52 90 9c 3f 32 20 61 70 |...M....R..?2 ap| +00000020 dc 32 5e cb 02 20 19 43 1f 57 36 06 dd 8e cc 59 |.2^.. .C.W6....Y| +00000030 ce 3b 60 34 e7 dc e5 fe 9c aa f6 7f 9a 61 6c 78 |.;`4.........alx| +00000040 99 37 fe 56 23 5e |.7.V#^|" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func2 -> DEBU 29f5 0xc0049a1fd0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:51.969 UTC [cauthdsl] func1 -> DEBU 29f6 0xc0049a1fd0 gate 1569284751969430500 evaluation succeeds" +"2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:51.969 UTC [policies] Evaluate -> DEBU 29f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:51.970 UTC [policies] Evaluate -> DEBU 29f9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:51.970 UTC [policies] Evaluate -> DEBU 29fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:51.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 29fb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:51.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 29fc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:51.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 29fd updating membership: timestamp: " +"2019-09-24 00:25:51.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 29fe Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:51.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 29ff Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:51.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 2a00 Exiting" +"2019-09-24 00:25:51.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a01 Exiting" +"2019-09-24 00:25:51.970 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a02 Exiting" +"2019-09-24 00:25:51.970 UTC [gossip.discovery] sendMemResponse -> DEBU 2a03 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:51.970 UTC [msp] DeserializeIdentity -> DEBU 2a04 Obtaining identity" +"2019-09-24 00:25:51.970 UTC [msp] DeserializeIdentity -> DEBU 2a05 Obtaining identity" +"2019-09-24 00:25:51.970 UTC [msp] DeserializeIdentity -> DEBU 2a06 Obtaining identity" +"2019-09-24 00:25:51.970 UTC [gossip.comm] Send -> DEBU 2a07 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:51.970 UTC [gossip.discovery] sendMemResponse -> DEBU 2a08 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020-" signature:"0E\002!\000\371\351\276\317S)$l\001F\213\332\360\035\023\221\31264dV\t\367\233i-\357yoN\325\222\002 [\372\007\010J\204\2171n-<{\241i\302\374\232\343\207\371\032Kgf\2321,\350\342\301\374\005" > alive: alive: alive:\031\036\325\207j\356\0262\202\301\233\n\234\350\202\377\007\350\334\270\321\272\002 }\020\314\333wF\336\213\272LE\024\000KC\253+\270\354\t4ND\361\371\025j\273\251\204\004P" > " +"2019-09-24 00:25:51.970 UTC [gossip.comm] sendToEndpoint -> DEBU 2a09 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:51.970 UTC [gossip.comm] sendToEndpoint -> DEBU 2a0a Exiting" +"2019-09-24 00:25:52.147 UTC [msp] DeserializeIdentity -> DEBU 2a0b Obtaining identity" +"2019-09-24 00:25:52.147 UTC [msp] DeserializeIdentity -> DEBU 2a0c Obtaining identity" +"2019-09-24 00:25:52.147 UTC [gossip.comm] Send -> DEBU 2a0d Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:25:52.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2a0e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2a0f Exiting" +"2019-09-24 00:25:52.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2a10 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2a11 Exiting" +"2019-09-24 00:25:52.148 UTC [gossip.comm] sendToEndpoint -> DEBU 2a12 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.149 UTC [gossip.comm] sendToEndpoint -> DEBU 2a13 Exiting" +"2019-09-24 00:25:52.155 UTC [gossip.comm] func1 -> DEBU 2a14 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.162 UTC [gossip.gossip] handleMessage -> DEBU 2a15 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.162 UTC [msp.identity] Verify -> DEBU 2a16 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:52.162 UTC [msp.identity] Verify -> DEBU 2a17 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:52.163 UTC [msp.identity] Verify -> DEBU 2a18 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:52.163 UTC [msp.identity] Verify -> DEBU 2a19 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:52.163 UTC [msp] DeserializeIdentity -> DEBU 2a1a Obtaining identity" +"2019-09-24 00:25:52.163 UTC [msp] DeserializeIdentity -> DEBU 2a1b Obtaining identity" +"2019-09-24 00:25:52.163 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a1c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:52.163 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a1d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.163 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a1e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.163 UTC [policies] Evaluate -> DEBU 2a1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:52.163 UTC [policies] Evaluate -> DEBU 2a20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:52.164 UTC [policies] Evaluate -> DEBU 2a21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:52.164 UTC [gossip.comm] func1 -> DEBU 2a22 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.164 UTC [cauthdsl] func1 -> DEBU 2a23 0xc0049d38a0 gate 1569284752164057000 evaluation starts" +"2019-09-24 00:25:52.164 UTC [cauthdsl] func2 -> DEBU 2a24 0xc0049d38a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.164 UTC [cauthdsl] func2 -> DEBU 2a25 0xc0049d38a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.164 UTC [cauthdsl] func2 -> DEBU 2a26 0xc0049d38a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:52.164 UTC [cauthdsl] func2 -> DEBU 2a27 0xc0049d38a0 principal evaluation fails" +"2019-09-24 00:25:52.164 UTC [cauthdsl] func1 -> DEBU 2a28 0xc0049d38a0 gate 1569284752164057000 evaluation fails" +"2019-09-24 00:25:52.164 UTC [policies] Evaluate -> DEBU 2a29 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.164 UTC [policies] Evaluate -> DEBU 2a2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.164 UTC [policies] Evaluate -> DEBU 2a2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:52.165 UTC [cauthdsl] func1 -> DEBU 2a2c 0xc0049ec0e0 gate 1569284752165833800 evaluation starts" +"2019-09-24 00:25:52.165 UTC [cauthdsl] func2 -> DEBU 2a2d 0xc0049ec0e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.165 UTC [cauthdsl] func2 -> DEBU 2a2e 0xc0049ec0e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.166 UTC [cauthdsl] func2 -> DEBU 2a2f 0xc0049ec0e0 principal matched by identity 0" +"2019-09-24 00:25:52.166 UTC [msp.identity] Verify -> DEBU 2a30 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:52.166 UTC [msp.identity] Verify -> DEBU 2a31 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:52.166 UTC [cauthdsl] func2 -> DEBU 2a32 0xc0049ec0e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:52.166 UTC [cauthdsl] func1 -> DEBU 2a33 0xc0049ec0e0 gate 1569284752165833800 evaluation succeeds" +"2019-09-24 00:25:52.166 UTC [policies] Evaluate -> DEBU 2a34 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.166 UTC [policies] Evaluate -> DEBU 2a35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.166 UTC [policies] Evaluate -> DEBU 2a36 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:52.166 UTC [policies] Evaluate -> DEBU 2a37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:52.166 UTC [msp] DeserializeIdentity -> DEBU 2a38 Obtaining identity" +"2019-09-24 00:25:52.167 UTC [msp] DeserializeIdentity -> DEBU 2a39 Obtaining identity" +"2019-09-24 00:25:52.168 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a3a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:52.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a3b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.168 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a3c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.168 UTC [policies] Evaluate -> DEBU 2a3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:52.168 UTC [policies] Evaluate -> DEBU 2a3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:52.169 UTC [policies] Evaluate -> DEBU 2a3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:52.172 UTC [cauthdsl] func1 -> DEBU 2a40 0xc0049ed8b0 gate 1569284752172311100 evaluation starts" +"2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a41 0xc0049ed8b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a42 0xc0049ed8b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a43 0xc0049ed8b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a44 0xc0049ed8b0 principal evaluation fails" +"2019-09-24 00:25:52.173 UTC [cauthdsl] func1 -> DEBU 2a45 0xc0049ed8b0 gate 1569284752172311100 evaluation fails" +"2019-09-24 00:25:52.173 UTC [policies] Evaluate -> DEBU 2a46 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.173 UTC [policies] Evaluate -> DEBU 2a47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.173 UTC [policies] Evaluate -> DEBU 2a48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:52.173 UTC [cauthdsl] func1 -> DEBU 2a49 0xc004a040f0 gate 1569284752173639100 evaluation starts" +"2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a4a 0xc004a040f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a4b 0xc004a040f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.173 UTC [cauthdsl] func2 -> DEBU 2a4c 0xc004a040f0 principal matched by identity 0" +"2019-09-24 00:25:52.173 UTC [msp.identity] Verify -> DEBU 2a4d Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:52.173 UTC [msp.identity] Verify -> DEBU 2a4e Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:52.174 UTC [cauthdsl] func2 -> DEBU 2a4f 0xc004a040f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:52.174 UTC [cauthdsl] func1 -> DEBU 2a50 0xc004a040f0 gate 1569284752173639100 evaluation succeeds" +"2019-09-24 00:25:52.174 UTC [policies] Evaluate -> DEBU 2a51 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.174 UTC [policies] Evaluate -> DEBU 2a52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.174 UTC [policies] Evaluate -> DEBU 2a53 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:52.174 UTC [policies] Evaluate -> DEBU 2a54 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:52.174 UTC [gossip.gossip] handleMessage -> DEBU 2a55 Exiting" +"2019-09-24 00:25:52.174 UTC [gossip.gossip] handleMessage -> DEBU 2a56 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.174 UTC [msp] DeserializeIdentity -> DEBU 2a57 Obtaining identity" +"2019-09-24 00:25:52.220 UTC [msp] DeserializeIdentity -> DEBU 2a58 Obtaining identity" +"2019-09-24 00:25:52.220 UTC [msp] DeserializeIdentity -> DEBU 2a59 Obtaining identity" +"2019-09-24 00:25:52.220 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a5a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:52.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a5b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.220 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a5c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.220 UTC [policies] Evaluate -> DEBU 2a5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:52.220 UTC [policies] Evaluate -> DEBU 2a5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:52.220 UTC [policies] Evaluate -> DEBU 2a5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:52.220 UTC [cauthdsl] func1 -> DEBU 2a60 0xc004a05c00 gate 1569284752220843300 evaluation starts" +"2019-09-24 00:25:52.220 UTC [cauthdsl] func2 -> DEBU 2a61 0xc004a05c00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.220 UTC [cauthdsl] func2 -> DEBU 2a62 0xc004a05c00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.220 UTC [cauthdsl] func2 -> DEBU 2a63 0xc004a05c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:52.221 UTC [cauthdsl] func2 -> DEBU 2a64 0xc004a05c00 principal evaluation fails" +"2019-09-24 00:25:52.221 UTC [cauthdsl] func1 -> DEBU 2a65 0xc004a05c00 gate 1569284752220843300 evaluation fails" +"2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a66 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:52.221 UTC [cauthdsl] func1 -> DEBU 2a69 0xc004a1c440 gate 1569284752221262100 evaluation starts" +"2019-09-24 00:25:52.221 UTC [cauthdsl] func2 -> DEBU 2a6a 0xc004a1c440 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.221 UTC [cauthdsl] func2 -> DEBU 2a6b 0xc004a1c440 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.221 UTC [cauthdsl] func2 -> DEBU 2a6c 0xc004a1c440 principal matched by identity 0" +"2019-09-24 00:25:52.221 UTC [msp.identity] Verify -> DEBU 2a6d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:52.221 UTC [msp.identity] Verify -> DEBU 2a6e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:52.221 UTC [cauthdsl] func2 -> DEBU 2a6f 0xc004a1c440 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:52.221 UTC [cauthdsl] func1 -> DEBU 2a70 0xc004a1c440 gate 1569284752221262100 evaluation succeeds" +"2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a71 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a72 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a73 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:52.221 UTC [policies] Evaluate -> DEBU 2a74 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:52.222 UTC [msp.identity] Verify -> DEBU 2a75 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:52.222 UTC [msp.identity] Verify -> DEBU 2a76 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:52.222 UTC [msp.identity] Verify -> DEBU 2a77 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:52.222 UTC [msp.identity] Verify -> DEBU 2a78 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:52.222 UTC [msp] DeserializeIdentity -> DEBU 2a79 Obtaining identity" +"2019-09-24 00:25:52.223 UTC [msp] DeserializeIdentity -> DEBU 2a7a Obtaining identity" +"2019-09-24 00:25:52.223 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a7b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:52.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a7c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a7d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.223 UTC [policies] Evaluate -> DEBU 2a7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:52.223 UTC [policies] Evaluate -> DEBU 2a7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:52.223 UTC [policies] Evaluate -> DEBU 2a80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:52.223 UTC [cauthdsl] func1 -> DEBU 2a81 0xc004a34a50 gate 1569284752223379600 evaluation starts" +"2019-09-24 00:25:52.223 UTC [cauthdsl] func2 -> DEBU 2a82 0xc004a34a50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.223 UTC [cauthdsl] func2 -> DEBU 2a83 0xc004a34a50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.223 UTC [cauthdsl] func2 -> DEBU 2a84 0xc004a34a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:52.223 UTC [cauthdsl] func2 -> DEBU 2a85 0xc004a34a50 principal evaluation fails" +"2019-09-24 00:25:52.223 UTC [cauthdsl] func1 -> DEBU 2a86 0xc004a34a50 gate 1569284752223379600 evaluation fails" +"2019-09-24 00:25:52.223 UTC [policies] Evaluate -> DEBU 2a87 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.224 UTC [policies] Evaluate -> DEBU 2a88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.224 UTC [policies] Evaluate -> DEBU 2a89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:52.224 UTC [cauthdsl] func1 -> DEBU 2a8a 0xc004a35290 gate 1569284752224820200 evaluation starts" +"2019-09-24 00:25:52.224 UTC [cauthdsl] func2 -> DEBU 2a8b 0xc004a35290 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.224 UTC [cauthdsl] func2 -> DEBU 2a8c 0xc004a35290 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.224 UTC [cauthdsl] func2 -> DEBU 2a8d 0xc004a35290 principal matched by identity 0" +"2019-09-24 00:25:52.225 UTC [msp.identity] Verify -> DEBU 2a8e Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:52.225 UTC [msp.identity] Verify -> DEBU 2a8f Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:52.226 UTC [cauthdsl] func2 -> DEBU 2a90 0xc004a35290 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:52.227 UTC [cauthdsl] func1 -> DEBU 2a91 0xc004a35290 gate 1569284752224820200 evaluation succeeds" +"2019-09-24 00:25:52.227 UTC [policies] Evaluate -> DEBU 2a92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.227 UTC [policies] Evaluate -> DEBU 2a93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.227 UTC [policies] Evaluate -> DEBU 2a94 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:52.227 UTC [policies] Evaluate -> DEBU 2a95 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:52.227 UTC [gossip.gossip] handleMessage -> DEBU 2a96 Exiting" +"2019-09-24 00:25:52.227 UTC [gossip.gossip] handleMessage -> DEBU 2a97 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.227 UTC [msp] DeserializeIdentity -> DEBU 2a98 Obtaining identity" +"2019-09-24 00:25:52.228 UTC [msp] DeserializeIdentity -> DEBU 2a99 Obtaining identity" +"2019-09-24 00:25:52.228 UTC [msp] DeserializeIdentity -> DEBU 2a9a Obtaining identity" +"2019-09-24 00:25:52.228 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a9b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:52.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a9c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.228 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a9d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.228 UTC [policies] Evaluate -> DEBU 2a9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:52.228 UTC [policies] Evaluate -> DEBU 2a9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:52.228 UTC [policies] Evaluate -> DEBU 2aa0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:52.228 UTC [cauthdsl] func1 -> DEBU 2aa1 0xc004a46da0 gate 1569284752228763700 evaluation starts" +"2019-09-24 00:25:52.228 UTC [cauthdsl] func2 -> DEBU 2aa2 0xc004a46da0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.228 UTC [cauthdsl] func2 -> DEBU 2aa3 0xc004a46da0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.229 UTC [cauthdsl] func2 -> DEBU 2aa4 0xc004a46da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:52.229 UTC [cauthdsl] func2 -> DEBU 2aa5 0xc004a46da0 principal evaluation fails" +"2019-09-24 00:25:52.229 UTC [cauthdsl] func1 -> DEBU 2aa6 0xc004a46da0 gate 1569284752228763700 evaluation fails" +"2019-09-24 00:25:52.233 UTC [policies] Evaluate -> DEBU 2aa7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.233 UTC [policies] Evaluate -> DEBU 2aa8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.261 UTC [policies] Evaluate -> DEBU 2aa9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:52.261 UTC [cauthdsl] func1 -> DEBU 2aaa 0xc004a475e0 gate 1569284752261661100 evaluation starts" +"2019-09-24 00:25:52.261 UTC [cauthdsl] func2 -> DEBU 2aab 0xc004a475e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.265 UTC [cauthdsl] func2 -> DEBU 2aac 0xc004a475e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.265 UTC [cauthdsl] func2 -> DEBU 2aad 0xc004a475e0 principal matched by identity 0" +"2019-09-24 00:25:52.265 UTC [msp.identity] Verify -> DEBU 2aae Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:52.265 UTC [msp.identity] Verify -> DEBU 2aaf Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:52.265 UTC [cauthdsl] func2 -> DEBU 2ab0 0xc004a475e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:52.265 UTC [cauthdsl] func1 -> DEBU 2ab1 0xc004a475e0 gate 1569284752261661100 evaluation succeeds" +"2019-09-24 00:25:52.265 UTC [policies] Evaluate -> DEBU 2ab2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.265 UTC [policies] Evaluate -> DEBU 2ab3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.265 UTC [policies] Evaluate -> DEBU 2ab4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:52.265 UTC [policies] Evaluate -> DEBU 2ab5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:52.266 UTC [msp.identity] Verify -> DEBU 2ab6 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:52.266 UTC [msp.identity] Verify -> DEBU 2ab7 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:52.266 UTC [msp] DeserializeIdentity -> DEBU 2ab8 Obtaining identity" +"2019-09-24 00:25:52.266 UTC [msp] DeserializeIdentity -> DEBU 2ab9 Obtaining identity" +"2019-09-24 00:25:52.285 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2aba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:52.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2abb Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2abc Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.286 UTC [policies] Evaluate -> DEBU 2abd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:52.286 UTC [policies] Evaluate -> DEBU 2abe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:52.286 UTC [policies] Evaluate -> DEBU 2abf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:52.286 UTC [cauthdsl] func1 -> DEBU 2ac0 0xc004a5b4d0 gate 1569284752286781300 evaluation starts" +"2019-09-24 00:25:52.286 UTC [cauthdsl] func2 -> DEBU 2ac1 0xc004a5b4d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.286 UTC [cauthdsl] func2 -> DEBU 2ac2 0xc004a5b4d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.289 UTC [gossip.election] waitForInterrupt -> DEBU 2ac3 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:52.295 UTC [gossip.election] IsLeader -> DEBU 2ac4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:25:52.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 2ac5 Obtaining default signing identity" +"2019-09-24 00:25:52.295 UTC [msp.identity] Sign -> DEBU 2ac6 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315100C1801 " +"2019-09-24 00:25:52.295 UTC [msp.identity] Sign -> DEBU 2ac7 Sign: digest: DBD68A8B8209DE8FF69F47F8D0DB9E91C14344794A4400A36A70B30C2BD0F89D " +"2019-09-24 00:25:52.296 UTC [gossip.election] waitForInterrupt -> DEBU 2ac8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:25:52.296 UTC [msp] DeserializeIdentity -> DEBU 2ac9 Obtaining identity" +"2019-09-24 00:25:52.296 UTC [msp] DeserializeIdentity -> DEBU 2aca Obtaining identity" +"2019-09-24 00:25:52.296 UTC [gossip.pull] Hello -> DEBU 2acb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:52.296 UTC [msp] DeserializeIdentity -> DEBU 2acc Obtaining identity" +"2019-09-24 00:25:52.296 UTC [msp] DeserializeIdentity -> DEBU 2acd Obtaining identity" +"2019-09-24 00:25:52.296 UTC [gossip.comm] Send -> DEBU 2ace Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:52.296 UTC [gossip.comm] sendToEndpoint -> DEBU 2acf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.296 UTC [gossip.comm] sendToEndpoint -> DEBU 2ad0 Exiting" +"2019-09-24 00:25:52.297 UTC [msp] DeserializeIdentity -> DEBU 2ad1 Obtaining identity" +"2019-09-24 00:25:52.297 UTC [msp] DeserializeIdentity -> DEBU 2ad2 Obtaining identity" +"2019-09-24 00:25:52.298 UTC [msp] DeserializeIdentity -> DEBU 2ad3 Obtaining identity" +"2019-09-24 00:25:52.298 UTC [msp] DeserializeIdentity -> DEBU 2ad4 Obtaining identity" +"2019-09-24 00:25:52.298 UTC [gossip.comm] Send -> DEBU 2ad5 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:52.298 UTC [msp] DeserializeIdentity -> DEBU 2ad6 Obtaining identity" +"2019-09-24 00:25:52.298 UTC [msp] DeserializeIdentity -> DEBU 2ad7 Obtaining identity" +"2019-09-24 00:25:52.313 UTC [cauthdsl] func2 -> DEBU 2ad8 0xc004a5b4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:52.313 UTC [cauthdsl] func2 -> DEBU 2ad9 0xc004a5b4d0 principal evaluation fails" +"2019-09-24 00:25:52.313 UTC [cauthdsl] func1 -> DEBU 2ada 0xc004a5b4d0 gate 1569284752286781300 evaluation fails" +"2019-09-24 00:25:52.313 UTC [policies] Evaluate -> DEBU 2adb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.313 UTC [policies] Evaluate -> DEBU 2adc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.313 UTC [policies] Evaluate -> DEBU 2add == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:52.313 UTC [cauthdsl] func1 -> DEBU 2ade 0xc004a5bd10 gate 1569284752313657100 evaluation starts" +"2019-09-24 00:25:52.313 UTC [cauthdsl] func2 -> DEBU 2adf 0xc004a5bd10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.313 UTC [cauthdsl] func2 -> DEBU 2ae0 0xc004a5bd10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.313 UTC [cauthdsl] func2 -> DEBU 2ae1 0xc004a5bd10 principal matched by identity 0" +"2019-09-24 00:25:52.313 UTC [msp.identity] Verify -> DEBU 2ae2 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:52.314 UTC [msp.identity] Verify -> DEBU 2ae3 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:52.314 UTC [cauthdsl] func2 -> DEBU 2ae4 0xc004a5bd10 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:52.314 UTC [cauthdsl] func1 -> DEBU 2ae5 0xc004a5bd10 gate 1569284752313657100 evaluation succeeds" +"2019-09-24 00:25:52.314 UTC [policies] Evaluate -> DEBU 2ae6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.314 UTC [policies] Evaluate -> DEBU 2ae7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.314 UTC [policies] Evaluate -> DEBU 2ae8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:52.314 UTC [policies] Evaluate -> DEBU 2ae9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:52.315 UTC [msp.identity] Verify -> DEBU 2aea Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:52.315 UTC [msp.identity] Verify -> DEBU 2aeb Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:52.315 UTC [gossip.gossip] handleMessage -> DEBU 2aec Exiting" +"2019-09-24 00:25:52.338 UTC [gossip.comm] func1 -> DEBU 2aed Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.339 UTC [gossip.gossip] handleMessage -> DEBU 2aee Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.340 UTC [gossip.pull] HandleMessage -> DEBU 2aef GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.340 UTC [gossip.gossip] handleMessage -> DEBU 2af0 Exiting" +"2019-09-24 00:25:52.356 UTC [gossip.comm] sendToEndpoint -> DEBU 2af1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:25:52.356 UTC [gossip.comm] sendToEndpoint -> DEBU 2af2 Exiting" +"2019-09-24 00:25:52.647 UTC [gossip.comm] func1 -> DEBU 2af3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.647 UTC [gossip.gossip] handleMessage -> DEBU 2af4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.647 UTC [msp] DeserializeIdentity -> DEBU 2af5 Obtaining identity" +"2019-09-24 00:25:52.648 UTC [msp] DeserializeIdentity -> DEBU 2af6 Obtaining identity" +"2019-09-24 00:25:52.648 UTC [gossip.gossip] handleMessage -> DEBU 2af7 Exiting" +"2019-09-24 00:25:52.703 UTC [gossip.comm] func1 -> DEBU 2af8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.703 UTC [gossip.gossip] handleMessage -> DEBU 2af9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.703 UTC [gossip.gossip] handleMessage -> DEBU 2afa Exiting" +"2019-09-24 00:25:52.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2afb Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.704 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2afc Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:52.704 UTC [msp.identity] Verify -> DEBU 2afd Verify: digest = 00000000 3d e4 21 eb cf b3 91 0f 6b 17 60 50 60 37 67 15 |=.!.....k.`P`7g.| +00000010 0a 36 a8 79 c1 b4 7f e5 9a c8 d3 79 15 58 0e 20 |.6.y.......y.X. |" +"2019-09-24 00:25:52.704 UTC [msp.identity] Verify -> DEBU 2afe Verify: sig = 00000000 30 44 02 20 7e d0 b8 2f 1a 7c a2 c1 17 b0 62 dd |0D. ~../.|....b.| +00000010 2e bc 76 ae 01 a3 ae 43 0a a0 94 27 0e ba 8c b3 |..v....C...'....| +00000020 cd f7 1c b5 02 20 7a 89 0d e6 df e2 26 2d 9d 2d |..... z.....&-.-| +00000030 a4 bc cc 2e 22 aa db c6 b1 b2 71 2b ee fa 8f 6f |....".....q+...o| +00000040 42 43 a2 26 b5 d2 |BC.&..|" +"2019-09-24 00:25:52.704 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aff Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.704 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b00 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:52.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b01 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:52.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b02 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:52.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b03 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:52.710 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b04 Exiting" +"2019-09-24 00:25:52.710 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b05 Exiting" +"2019-09-24 00:25:52.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b06 Exiting" +"2019-09-24 00:25:52.710 UTC [gossip.comm] func1 -> DEBU 2b07 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.710 UTC [gossip.gossip] handleMessage -> DEBU 2b08 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.710 UTC [gossip.gossip] handleMessage -> DEBU 2b09 Exiting" +"2019-09-24 00:25:52.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b0a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.710 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b0b Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:52.710 UTC [msp] DeserializeIdentity -> DEBU 2b0c Obtaining identity" +"2019-09-24 00:25:52.711 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b0d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:52.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b0e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b0f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:52.711 UTC [policies] Evaluate -> DEBU 2b10 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:52.711 UTC [policies] Evaluate -> DEBU 2b11 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:52.711 UTC [policies] Evaluate -> DEBU 2b12 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:52.711 UTC [cauthdsl] func1 -> DEBU 2b13 0xc004aa1e60 gate 1569284752711686600 evaluation starts" +"2019-09-24 00:25:52.711 UTC [cauthdsl] func2 -> DEBU 2b14 0xc004aa1e60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.711 UTC [cauthdsl] func2 -> DEBU 2b15 0xc004aa1e60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.711 UTC [cauthdsl] func2 -> DEBU 2b16 0xc004aa1e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:52.711 UTC [cauthdsl] func2 -> DEBU 2b17 0xc004aa1e60 principal evaluation fails" +"2019-09-24 00:25:52.711 UTC [cauthdsl] func1 -> DEBU 2b18 0xc004aa1e60 gate 1569284752711686600 evaluation fails" +"2019-09-24 00:25:52.711 UTC [policies] Evaluate -> DEBU 2b19 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.711 UTC [policies] Evaluate -> DEBU 2b1a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:52.712 UTC [policies] Evaluate -> DEBU 2b1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:52.712 UTC [cauthdsl] func1 -> DEBU 2b1c 0xc004ab66a0 gate 1569284752712055300 evaluation starts" +"2019-09-24 00:25:52.712 UTC [cauthdsl] func2 -> DEBU 2b1d 0xc004ab66a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:52.712 UTC [cauthdsl] func2 -> DEBU 2b1e 0xc004ab66a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:52.712 UTC [cauthdsl] func2 -> DEBU 2b1f 0xc004ab66a0 principal matched by identity 0" +"2019-09-24 00:25:52.712 UTC [msp.identity] Verify -> DEBU 2b20 Verify: digest = 00000000 fd b2 d7 cd 3e 00 13 4a 55 95 a4 8e f2 98 5b ef |....>..JU.....[.| +00000010 21 8c ec 91 c1 54 de c3 29 4d 3b 32 e8 7a a5 b4 |!....T..)M;2.z..|" +"2019-09-24 00:25:52.712 UTC [msp.identity] Verify -> DEBU 2b21 Verify: sig = 00000000 30 44 02 20 08 ba 5d 54 f5 99 e3 d1 cb 43 2e 54 |0D. ..]T.....C.T| +00000010 20 d2 dd ca 5b a8 1c 96 27 22 83 47 6c 6f 0d 05 | ...[...'".Glo..| +00000020 1e be b7 0e 02 20 65 15 3b 21 aa a0 85 b4 73 ba |..... e.;!....s.| +00000030 3c 15 c7 3d 7f 9b a2 47 f3 32 ba f3 9f d3 ea 1b |<..=...G.2......| +00000040 7a 85 7a ac a2 ba |z.z...|" +"2019-09-24 00:25:52.735 UTC [gossip.gossip] handleMessage -> DEBU 2b22 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.736 UTC [gossip.comm] func1 -> DEBU 2b23 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.736 UTC [msp] DeserializeIdentity -> DEBU 2b24 Obtaining identity" +"2019-09-24 00:25:52.736 UTC [msp] DeserializeIdentity -> DEBU 2b25 Obtaining identity" +"2019-09-24 00:25:52.739 UTC [msp] DeserializeIdentity -> DEBU 2b26 Obtaining identity" +"2019-09-24 00:25:52.739 UTC [gossip.comm] Send -> DEBU 2b27 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:52.739 UTC [msp] DeserializeIdentity -> DEBU 2b28 Obtaining identity" +"2019-09-24 00:25:52.739 UTC [gossip.comm] Send -> DEBU 2b29 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:52.740 UTC [gossip.comm] sendToEndpoint -> DEBU 2b2a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.740 UTC [gossip.comm] sendToEndpoint -> DEBU 2b2b Exiting" +"2019-09-24 00:25:52.741 UTC [gossip.comm] sendToEndpoint -> DEBU 2b2c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.741 UTC [gossip.comm] sendToEndpoint -> DEBU 2b2d Exiting" +"2019-09-24 00:25:52.741 UTC [cauthdsl] func2 -> DEBU 2b2e 0xc004ab66a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:52.773 UTC [gossip.comm] func1 -> DEBU 2b2f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.742 UTC [cauthdsl] func1 -> DEBU 2b30 0xc004ab66a0 gate 1569284752712055300 evaluation succeeds" +"2019-09-24 00:25:52.775 UTC [policies] Evaluate -> DEBU 2b31 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.775 UTC [policies] Evaluate -> DEBU 2b32 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:52.775 UTC [policies] Evaluate -> DEBU 2b33 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:52.775 UTC [policies] Evaluate -> DEBU 2b34 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:52.775 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b35 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b36 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b37 updating membership: timestamp: " +"2019-09-24 00:25:52.776 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b38 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:52.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b39 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:52.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b3a Exiting" +"2019-09-24 00:25:52.777 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b3b Exiting" +"2019-09-24 00:25:52.777 UTC [gossip.discovery] sendMemResponse -> DEBU 2b3c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:52.777 UTC [msp] DeserializeIdentity -> DEBU 2b3d Obtaining identity" +"2019-09-24 00:25:52.782 UTC [msp] DeserializeIdentity -> DEBU 2b3e Obtaining identity" +"2019-09-24 00:25:52.782 UTC [msp] DeserializeIdentity -> DEBU 2b3f Obtaining identity" +"2019-09-24 00:25:52.782 UTC [gossip.comm] Send -> DEBU 2b40 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:52.783 UTC [gossip.discovery] sendMemResponse -> DEBU 2b41 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020." signature:"0D\002 ~\320\270/\032|\242\301\027\260b\335.\274v\256\001\243\256C\n\240\224'\016\272\214\263\315\367\034\265\002 z\211\r\346\337\342&-\235-\244\274\314.\"\252\333\306\261\262q+\356\372\217oBC\242&\265\322" > alive: alive:\031\036\325\207j\356\0262\202\301\233\n\234\350\202\377\007\350\334\270\321\272\002 }\020\314\333wF\336\213\272LE\024\000KC\253+\270\354\t4ND\361\371\025j\273\251\204\004P" > " +"2019-09-24 00:25:52.783 UTC [gossip.comm] sendToEndpoint -> DEBU 2b42 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.783 UTC [gossip.comm] sendToEndpoint -> DEBU 2b43 Exiting" +"2019-09-24 00:25:52.786 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b44 Exiting" +"2019-09-24 00:25:52.787 UTC [gossip.gossip] handleMessage -> DEBU 2b45 Exiting" +"2019-09-24 00:25:52.787 UTC [gossip.gossip] handleMessage -> DEBU 2b46 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.787 UTC [gossip.pull] HandleMessage -> DEBU 2b47 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b48 Obtaining identity" +"2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b49 Obtaining identity" +"2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b4a Obtaining identity" +"2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b4b Obtaining identity" +"2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b4c Obtaining identity" +"2019-09-24 00:25:52.787 UTC [msp] DeserializeIdentity -> DEBU 2b4d Obtaining identity" +"2019-09-24 00:25:52.787 UTC [gossip.pull] SendDigest -> DEBU 2b4e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:52.787 UTC [gossip.gossip] handleMessage -> DEBU 2b4f Exiting" +"2019-09-24 00:25:52.787 UTC [gossip.gossip] handleMessage -> DEBU 2b50 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.786 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b51 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.791 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b52 Exiting" +"2019-09-24 00:25:52.792 UTC [gossip.gossip] handleMessage -> DEBU 2b53 Exiting" +"2019-09-24 00:25:52.793 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b54 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:52.793 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b55 Exiting" +"2019-09-24 00:25:52.818 UTC [gossip.comm] func1 -> DEBU 2b56 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.819 UTC [gossip.gossip] handleMessage -> DEBU 2b57 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.819 UTC [gossip.pull] HandleMessage -> DEBU 2b58 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:25:52.819 UTC [gossip.pull] SendDigest -> DEBU 2b59 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:52.820 UTC [gossip.gossip] handleMessage -> DEBU 2b5a Exiting" +"2019-09-24 00:25:53.143 UTC [gossip.gossip] handleMessage -> DEBU 2b5b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:53.143 UTC [msp] DeserializeIdentity -> DEBU 2b5c Obtaining identity" +"2019-09-24 00:25:53.144 UTC [msp] DeserializeIdentity -> DEBU 2b5d Obtaining identity" +"2019-09-24 00:25:53.144 UTC [msp] DeserializeIdentity -> DEBU 2b5e Obtaining identity" +"2019-09-24 00:25:53.144 UTC [gossip.gossip] handleMessage -> DEBU 2b5f Exiting" +"2019-09-24 00:25:53.678 UTC [gossip.comm] func1 -> DEBU 2b60 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:53.679 UTC [gossip.gossip] handleMessage -> DEBU 2b61 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:53.679 UTC [gossip.pull] HandleMessage -> DEBU 2b62 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:53.679 UTC [gossip.pull] SendDigest -> DEBU 2b63 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:53.679 UTC [gossip.gossip] handleMessage -> DEBU 2b64 Exiting" +"2019-09-24 00:25:53.736 UTC [gossip.comm] func1 -> DEBU 2b65 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" secret_envelope:" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:53.736 UTC [gossip.gossip] handleMessage -> DEBU 2b66 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" secret_envelope:" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:53.736 UTC [gossip.gossip] handleMessage -> DEBU 2b67 Exiting" +"2019-09-24 00:25:53.737 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b68 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" secret_envelope:" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:53.737 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b69 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:53.737 UTC [msp.identity] Verify -> DEBU 2b6a Verify: digest = 00000000 a4 e8 45 ea 9d 15 f3 98 5f 79 53 f6 bd 2c 40 42 |..E....._yS..,@B| +00000010 30 db b2 f7 32 0f 9d 37 cc 4d e2 71 5b bc b8 9b |0...2..7.M.q[...|" +"2019-09-24 00:25:53.750 UTC [msp.identity] Verify -> DEBU 2b6b Verify: sig = 00000000 30 45 02 21 00 87 94 bd 94 ef f5 e3 3d 5c 66 59 |0E.!........=\fY| +00000010 98 c1 e0 4e 9f 3a 5e f9 bb 67 0a e6 a2 e8 95 58 |...N.:^..g.....X| +00000020 e8 76 55 b9 da 02 20 7c 4e 66 0d e3 80 40 11 7b |.vU... |Nf...@.{| +00000030 ed 80 9c 65 6d 6d af 54 87 b9 6d a3 ce 33 75 df |...emm.T..m..3u.| +00000040 fa 72 a1 08 42 42 05 |.r..BB.|" +"2019-09-24 00:25:53.750 UTC [msp.identity] Verify -> DEBU 2b6c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:53.750 UTC [msp.identity] Verify -> DEBU 2b6d Verify: sig = 00000000 30 44 02 20 2a ab 89 4c d8 4c 9b b1 ef a6 49 e2 |0D. *..L.L....I.| +00000010 98 f4 35 36 1e 47 9f 47 e5 44 63 b9 11 fc ed 74 |..56.G.G.Dc....t| +00000020 9a c1 c8 0f 02 20 5f 31 0e f3 0d 04 22 a2 f2 47 |..... _1...."..G| +00000030 02 61 1e cb 64 34 b7 50 96 54 28 ee 2f 35 de 5d |.a..d4.P.T(./5.]| +00000040 14 e4 be df 0a 3e |.....>|" +"2019-09-24 00:25:53.752 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b6e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:53.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b6f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:53.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b70 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:53.754 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b71 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b72 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:53.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b73 Exiting" +"2019-09-24 00:25:53.785 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b74 Exiting" +"2019-09-24 00:25:53.785 UTC [gossip.discovery] sendMemResponse -> DEBU 2b75 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:53.785 UTC [msp] DeserializeIdentity -> DEBU 2b76 Obtaining identity" +"2019-09-24 00:25:53.785 UTC [msp] DeserializeIdentity -> DEBU 2b77 Obtaining identity" +"2019-09-24 00:25:53.785 UTC [gossip.comm] Send -> DEBU 2b78 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:53.786 UTC [gossip.discovery] sendMemResponse -> DEBU 2b79 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" secret_envelope:" > > alive:\031\036\325\207j\356\0262\202\301\233\n\234\350\202\377\007\350\334\270\321\272\002 }\020\314\333wF\336\213\272LE\024\000KC\253+\270\354\t4ND\361\371\025j\273\251\204\004P" > " +"2019-09-24 00:25:53.786 UTC [gossip.comm] sendToEndpoint -> DEBU 2b7a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:25:53.786 UTC [gossip.comm] sendToEndpoint -> DEBU 2b7b Exiting" +"2019-09-24 00:25:53.785 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b7c Exiting" +"2019-09-24 00:25:54.091 UTC [gossip.comm] func1 -> DEBU 2b7d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:54.091 UTC [gossip.gossip] handleMessage -> DEBU 2b7e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:54.091 UTC [msp] DeserializeIdentity -> DEBU 2b7f Obtaining identity" +"2019-09-24 00:25:54.092 UTC [msp] DeserializeIdentity -> DEBU 2b80 Obtaining identity" +"2019-09-24 00:25:54.092 UTC [msp] DeserializeIdentity -> DEBU 2b81 Obtaining identity" +"2019-09-24 00:25:54.093 UTC [gossip.gossip] handleMessage -> DEBU 2b82 Exiting" +"2019-09-24 00:25:54.580 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 2b83 Sleeping 25s" +"2019-09-24 00:25:54.616 UTC [msp] GetDefaultSigningIdentity -> DEBU 2b84 Obtaining default signing identity" +"2019-09-24 00:25:54.616 UTC [msp.identity] Sign -> DEBU 2b85 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102B " +"2019-09-24 00:25:54.616 UTC [msp.identity] Sign -> DEBU 2b86 Sign: digest: 7D95D65C53B77F54156C7442BBEC5CB5AAF17B8088BE39AC9E0BD8EBC84905FF " +"2019-09-24 00:25:54.616 UTC [msp] GetDefaultSigningIdentity -> DEBU 2b87 Obtaining default signing identity" +"2019-09-24 00:25:54.617 UTC [msp.identity] Sign -> DEBU 2b88 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:54.617 UTC [msp.identity] Sign -> DEBU 2b89 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:54.618 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2b8a Sleeping 5s" +"2019-09-24 00:25:54.632 UTC [msp] DeserializeIdentity -> DEBU 2b8b Obtaining identity" +"2019-09-24 00:25:54.633 UTC [msp] DeserializeIdentity -> DEBU 2b8c Obtaining identity" +"2019-09-24 00:25:54.633 UTC [gossip.comm] Send -> DEBU 2b8d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:54.633 UTC [msp] DeserializeIdentity -> DEBU 2b8e Obtaining identity" +"2019-09-24 00:25:54.634 UTC [gossip.comm] Send -> DEBU 2b8f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:54.636 UTC [msp] DeserializeIdentity -> DEBU 2b90 Obtaining identity" +"2019-09-24 00:25:54.637 UTC [gossip.comm] Send -> DEBU 2b91 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b92 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b93 Exiting" +"2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b94 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b95 Exiting" +"2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b96 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b97 Exiting" +"2019-09-24 00:25:54.977 UTC [gossip.gossip] handleMessage -> DEBU 2b98 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.977 UTC [gossip.gossip] handleMessage -> DEBU 2b99 Exiting" +"2019-09-24 00:25:54.977 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b9a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.977 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b9b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:54.977 UTC [msp] DeserializeIdentity -> DEBU 2b9c Obtaining identity" +"2019-09-24 00:25:54.977 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b9d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:54.977 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b9e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:54.977 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b9f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2ba0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2ba1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2ba2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:54.978 UTC [cauthdsl] func1 -> DEBU 2ba3 0xc004b3e5d0 gate 1569284754978125200 evaluation starts" +"2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2ba4 0xc004b3e5d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2ba5 0xc004b3e5d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2ba6 0xc004b3e5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2ba7 0xc004b3e5d0 principal evaluation fails" +"2019-09-24 00:25:54.978 UTC [cauthdsl] func1 -> DEBU 2ba8 0xc004b3e5d0 gate 1569284754978125200 evaluation fails" +"2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2ba9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2baa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:54.978 UTC [policies] Evaluate -> DEBU 2bab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:54.978 UTC [cauthdsl] func1 -> DEBU 2bac 0xc004b3ee10 gate 1569284754978631300 evaluation starts" +"2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2bad 0xc004b3ee10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2bae 0xc004b3ee10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:54.978 UTC [cauthdsl] func2 -> DEBU 2baf 0xc004b3ee10 principal matched by identity 0" +"2019-09-24 00:25:54.979 UTC [msp.identity] Verify -> DEBU 2bb0 Verify: digest = 00000000 4c 66 7c b2 e3 58 6d b7 cc 87 3b 05 44 43 ab d6 |Lf|..Xm...;.DC..| +00000010 b3 4b 9b f0 e2 25 80 11 4a de 14 96 45 63 65 ec |.K...%..J...Ece.|" +"2019-09-24 00:25:54.979 UTC [msp.identity] Verify -> DEBU 2bb1 Verify: sig = 00000000 30 45 02 21 00 bb f9 3d 3f 33 c0 75 13 80 62 0f |0E.!...=?3.u..b.| +00000010 b3 df 52 0b 4a 4c 7e 62 17 15 0d 50 34 e3 de ce |..R.JL~b...P4...| +00000020 d6 ff 7c 10 0e 02 20 05 49 3c 77 15 38 d2 b2 13 |..|... .I DEBU 2bb2 0xc004b3ee10 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:54.979 UTC [cauthdsl] func1 -> DEBU 2bb3 0xc004b3ee10 gate 1569284754978631300 evaluation succeeds" +"2019-09-24 00:25:54.979 UTC [policies] Evaluate -> DEBU 2bb4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:54.979 UTC [policies] Evaluate -> DEBU 2bb5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:54.979 UTC [policies] Evaluate -> DEBU 2bb6 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:54.979 UTC [policies] Evaluate -> DEBU 2bb7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:54.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bb8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bb9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:54.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bba updating membership: timestamp: " +"2019-09-24 00:25:54.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bbb Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:54.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bbc Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:54.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bbd Exiting" +"2019-09-24 00:25:54.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bbe Exiting" +"2019-09-24 00:25:54.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bbf Exiting" +"2019-09-24 00:25:54.984 UTC [msp] DeserializeIdentity -> DEBU 2bc0 Obtaining identity" +"2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc1 Obtaining identity" +"2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc2 Obtaining identity" +"2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc3 Obtaining identity" +"2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc4 Obtaining identity" +"2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc5 Obtaining identity" +"2019-09-24 00:25:54.987 UTC [gossip.comm] Send -> DEBU 2bc6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:54.987 UTC [gossip.comm] func1 -> DEBU 2bc7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.987 UTC [msp] DeserializeIdentity -> DEBU 2bc8 Obtaining identity" +"2019-09-24 00:25:54.988 UTC [msp] DeserializeIdentity -> DEBU 2bc9 Obtaining identity" +"2019-09-24 00:25:54.988 UTC [gossip.comm] Send -> DEBU 2bca Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:25:54.988 UTC [gossip.gossip] handleMessage -> DEBU 2bcb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.988 UTC [gossip.comm] sendToEndpoint -> DEBU 2bcc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.988 UTC [gossip.comm] sendToEndpoint -> DEBU 2bcd Exiting" +"2019-09-24 00:25:54.988 UTC [gossip.comm] sendToEndpoint -> DEBU 2bce Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.988 UTC [gossip.gossip] handleMessage -> DEBU 2bcf Exiting" +"2019-09-24 00:25:54.988 UTC [gossip.comm] sendToEndpoint -> DEBU 2bd0 Exiting" +"2019-09-24 00:25:54.989 UTC [gossip.comm] func1 -> DEBU 2bd1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.989 UTC [gossip.gossip] handleMessage -> DEBU 2bd2 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.988 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd4 Exiting" +"2019-09-24 00:25:54.992 UTC [gossip.gossip] handleMessage -> DEBU 2bd5 Exiting" +"2019-09-24 00:25:54.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:54.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bd7 Exiting" +"2019-09-24 00:25:55.691 UTC [gossip.comm] func1 -> DEBU 2bd8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.691 UTC [gossip.gossip] handleMessage -> DEBU 2bd9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.691 UTC [gossip.gossip] handleMessage -> DEBU 2bda Exiting" +"2019-09-24 00:25:55.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2bdb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.691 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2bdc Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:55.692 UTC [msp] DeserializeIdentity -> DEBU 2bdd Obtaining identity" +"2019-09-24 00:25:55.692 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bde Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:55.692 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bdf Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:55.692 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2be1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2be2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2be3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:55.692 UTC [cauthdsl] func1 -> DEBU 2be4 0xc004b70300 gate 1569284755692446000 evaluation starts" +"2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2be5 0xc004b70300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2be6 0xc004b70300 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2be7 0xc004b70300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2be8 0xc004b70300 principal evaluation fails" +"2019-09-24 00:25:55.692 UTC [cauthdsl] func1 -> DEBU 2be9 0xc004b70300 gate 1569284755692446000 evaluation fails" +"2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2bea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2beb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:55.692 UTC [policies] Evaluate -> DEBU 2bec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:55.692 UTC [cauthdsl] func1 -> DEBU 2bed 0xc004b70b40 gate 1569284755692801500 evaluation starts" +"2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2bee 0xc004b70b40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2bef 0xc004b70b40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:55.692 UTC [cauthdsl] func2 -> DEBU 2bf0 0xc004b70b40 principal matched by identity 0" +"2019-09-24 00:25:55.692 UTC [msp.identity] Verify -> DEBU 2bf1 Verify: digest = 00000000 43 7c b6 a0 d3 60 65 26 3f 41 83 51 0c ee 53 40 |C|...`e&?A.Q..S@| +00000010 4f 9c 45 65 a1 87 fd 98 74 29 51 7a ff 53 a2 80 |O.Ee....t)Qz.S..|" +"2019-09-24 00:25:55.693 UTC [msp.identity] Verify -> DEBU 2bf2 Verify: sig = 00000000 30 44 02 20 03 6e 51 fe 03 be 73 23 10 3b 5f 5b |0D. .nQ...s#.;_[| +00000010 d4 e1 76 78 fb e4 79 62 26 54 7a 4a c5 5d a1 48 |..vx..yb&TzJ.].H| +00000020 d0 d4 7b ed 02 20 21 b1 4c 66 c5 5d 3e b2 1a 35 |..{.. !.Lf.]>..5| +00000030 ff 31 5f dc 00 2a 5f 6e 04 ab 38 6a 3f e5 2c b3 |.1_..*_n..8j?.,.| +00000040 bd 45 28 ea d4 eb |.E(...|" +"2019-09-24 00:25:55.693 UTC [cauthdsl] func2 -> DEBU 2bf3 0xc004b70b40 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:55.693 UTC [cauthdsl] func1 -> DEBU 2bf4 0xc004b70b40 gate 1569284755692801500 evaluation succeeds" +"2019-09-24 00:25:55.693 UTC [policies] Evaluate -> DEBU 2bf5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:55.693 UTC [policies] Evaluate -> DEBU 2bf6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:55.693 UTC [policies] Evaluate -> DEBU 2bf7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:55.693 UTC [policies] Evaluate -> DEBU 2bf8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:55.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 2bf9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bfa Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:55.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bfb updating membership: timestamp: " +"2019-09-24 00:25:55.693 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bfc Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:55.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 2bfd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:55.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c00 Exiting" +"2019-09-24 00:25:55.701 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c01 Exiting" +"2019-09-24 00:25:55.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c02 Exiting" +"2019-09-24 00:25:55.700 UTC [gossip.gossip] handleMessage -> DEBU 2bfe Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.702 UTC [gossip.gossip] handleMessage -> DEBU 2c03 Exiting" +"2019-09-24 00:25:55.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c04 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c05 Exiting" +"2019-09-24 00:25:55.701 UTC [gossip.comm] func1 -> DEBU 2bff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.702 UTC [gossip.gossip] handleMessage -> DEBU 2c06 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.702 UTC [gossip.gossip] handleMessage -> DEBU 2c07 Exiting" +"2019-09-24 00:25:55.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c08 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c09 Exiting" +"2019-09-24 00:25:55.708 UTC [msp] DeserializeIdentity -> DEBU 2c0b Obtaining identity" +"2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c0c Obtaining identity" +"2019-09-24 00:25:55.708 UTC [gossip.pull] Hello -> DEBU 2c0a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c0d Obtaining identity" +"2019-09-24 00:25:55.709 UTC [gossip.comm] Send -> DEBU 2c0e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c0f Obtaining identity" +"2019-09-24 00:25:55.709 UTC [gossip.pull] Hello -> DEBU 2c10 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c11 Obtaining identity" +"2019-09-24 00:25:55.709 UTC [gossip.comm] Send -> DEBU 2c12 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c13 Obtaining identity" +"2019-09-24 00:25:55.709 UTC [gossip.pull] Hello -> DEBU 2c14 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c15 Obtaining identity" +"2019-09-24 00:25:55.709 UTC [gossip.comm] Send -> DEBU 2c16 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:55.709 UTC [gossip.comm] Send -> DEBU 2c17 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:55.709 UTC [msp] DeserializeIdentity -> DEBU 2c18 Obtaining identity" +"2019-09-24 00:25:55.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2c19 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2c1a Exiting" +"2019-09-24 00:25:55.709 UTC [gossip.comm] Send -> DEBU 2c1b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:55.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2c1c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c1d Exiting" +"2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c1e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c1f Exiting" +"2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c20 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c21 Exiting" +"2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2c23 Exiting" +"2019-09-24 00:25:55.730 UTC [gossip.comm] func1 -> DEBU 2c25 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.730 UTC [gossip.gossip] handleMessage -> DEBU 2c24 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.730 UTC [gossip.pull] HandleMessage -> DEBU 2c26 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.730 UTC [gossip.gossip] handleMessage -> DEBU 2c27 Exiting" +"2019-09-24 00:25:55.731 UTC [gossip.gossip] handleMessage -> DEBU 2c28 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.731 UTC [gossip.comm] func1 -> DEBU 2c29 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.731 UTC [gossip.pull] HandleMessage -> DEBU 2c2a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.731 UTC [gossip.gossip] handleMessage -> DEBU 2c2b Exiting" +"2019-09-24 00:25:55.731 UTC [gossip.gossip] handleMessage -> DEBU 2c2c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.731 UTC [gossip.pull] HandleMessage -> DEBU 2c2d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.731 UTC [gossip.gossip] handleMessage -> DEBU 2c2e Exiting" +"2019-09-24 00:25:55.733 UTC [msp] GetDefaultSigningIdentity -> DEBU 2c2f Obtaining default signing identity" +"2019-09-24 00:25:55.733 UTC [msp.identity] Sign -> DEBU 2c30 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102C " +"2019-09-24 00:25:55.733 UTC [msp.identity] Sign -> DEBU 2c31 Sign: digest: BDFBFAE08EA37776862CA67B6B459E61C39B88A92B6E50A609CC5BE06DC555FD " +"2019-09-24 00:25:55.733 UTC [msp] GetDefaultSigningIdentity -> DEBU 2c32 Obtaining default signing identity" +"2019-09-24 00:25:55.733 UTC [msp.identity] Sign -> DEBU 2c33 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:55.733 UTC [msp.identity] Sign -> DEBU 2c34 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:55.734 UTC [gossip.comm] Send -> DEBU 2c35 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:55.734 UTC [msp] DeserializeIdentity -> DEBU 2c36 Obtaining identity" +"2019-09-24 00:25:55.734 UTC [gossip.comm] Send -> DEBU 2c37 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:55.734 UTC [msp] DeserializeIdentity -> DEBU 2c38 Obtaining identity" +"2019-09-24 00:25:55.740 UTC [gossip.comm] Send -> DEBU 2c39 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:55.741 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.741 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3b Exiting" +"2019-09-24 00:25:55.742 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.742 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3d Exiting" +"2019-09-24 00:25:55.742 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.743 UTC [gossip.comm] sendToEndpoint -> DEBU 2c3f Exiting" +"2019-09-24 00:25:55.791 UTC [gossip.comm] func1 -> DEBU 2c40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.791 UTC [gossip.gossip] handleMessage -> DEBU 2c41 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.791 UTC [gossip.gossip] handleMessage -> DEBU 2c42 Exiting" +"2019-09-24 00:25:55.791 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.792 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c44 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:55.794 UTC [msp.identity] Verify -> DEBU 2c45 Verify: digest = 00000000 bd fb fa e0 8e a3 77 76 86 2c a6 7b 6b 45 9e 61 |......wv.,.{kE.a| +00000010 c3 9b 88 a9 2b 6e 50 a6 09 cc 5b e0 6d c5 55 fd |....+nP...[.m.U.|" +"2019-09-24 00:25:55.794 UTC [msp.identity] Verify -> DEBU 2c46 Verify: sig = 00000000 30 44 02 20 2b ac 5c 4f 51 30 bb e4 c1 36 84 92 |0D. +.\OQ0...6..| +00000010 52 02 a2 de 79 a5 9c b3 89 a9 b6 a9 d1 de 2e 0d |R...y...........| +00000020 9e b7 20 d3 02 20 74 9e 82 bb 68 e7 2b 2f 92 3a |.. .. t...h.+/.:| +00000030 08 9e 99 c2 9d cc e4 ec 5f 88 85 23 a7 de 1f 4c |........_..#...L| +00000040 33 85 b2 fb d4 f3 |3.....|" +"2019-09-24 00:25:55.908 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c47 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.909 UTC [gossip.discovery] isSentByMe -> DEBU 2c48 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c49 Exiting" +"2019-09-24 00:25:55.909 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c4a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:55.909 UTC [msp.identity] Verify -> DEBU 2c4b Verify: digest = 00000000 a4 e8 45 ea 9d 15 f3 98 5f 79 53 f6 bd 2c 40 42 |..E....._yS..,@B| +00000010 30 db b2 f7 32 0f 9d 37 cc 4d e2 71 5b bc b8 9b |0...2..7.M.q[...|" +"2019-09-24 00:25:55.909 UTC [msp.identity] Verify -> DEBU 2c4c Verify: sig = 00000000 30 45 02 21 00 87 94 bd 94 ef f5 e3 3d 5c 66 59 |0E.!........=\fY| +00000010 98 c1 e0 4e 9f 3a 5e f9 bb 67 0a e6 a2 e8 95 58 |...N.:^..g.....X| +00000020 e8 76 55 b9 da 02 20 7c 4e 66 0d e3 80 40 11 7b |.vU... |Nf...@.{| +00000030 ed 80 9c 65 6d 6d af 54 87 b9 6d a3 ce 33 75 df |...emm.T..m..3u.| +00000040 fa 72 a1 08 42 42 05 |.r..BB.|" +"2019-09-24 00:25:55.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c4d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:55.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c4e Exiting" +"2019-09-24 00:25:55.909 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c4f Exiting" +"2019-09-24 00:25:55.916 UTC [gossip.gossip] handleMessage -> DEBU 2c50 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.918 UTC [gossip.gossip] handleMessage -> DEBU 2c51 Exiting" +"2019-09-24 00:25:55.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.918 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c53 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:55.918 UTC [msp.identity] Verify -> DEBU 2c54 Verify: digest = 00000000 bd fb fa e0 8e a3 77 76 86 2c a6 7b 6b 45 9e 61 |......wv.,.{kE.a| +00000010 c3 9b 88 a9 2b 6e 50 a6 09 cc 5b e0 6d c5 55 fd |....+nP...[.m.U.|" +"2019-09-24 00:25:55.918 UTC [msp.identity] Verify -> DEBU 2c55 Verify: sig = 00000000 30 44 02 20 2b ac 5c 4f 51 30 bb e4 c1 36 84 92 |0D. +.\OQ0...6..| +00000010 52 02 a2 de 79 a5 9c b3 89 a9 b6 a9 d1 de 2e 0d |R...y...........| +00000020 9e b7 20 d3 02 20 74 9e 82 bb 68 e7 2b 2f 92 3a |.. .. t...h.+/.:| +00000030 08 9e 99 c2 9d cc e4 ec 5f 88 85 23 a7 de 1f 4c |........_..#...L| +00000040 33 85 b2 fb d4 f3 |3.....|" +"2019-09-24 00:25:55.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c56 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.919 UTC [gossip.discovery] isSentByMe -> DEBU 2c57 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c58 Exiting" +"2019-09-24 00:25:55.919 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c59 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:55.919 UTC [msp.identity] Verify -> DEBU 2c5a Verify: digest = 00000000 a4 e8 45 ea 9d 15 f3 98 5f 79 53 f6 bd 2c 40 42 |..E....._yS..,@B| +00000010 30 db b2 f7 32 0f 9d 37 cc 4d e2 71 5b bc b8 9b |0...2..7.M.q[...|" +"2019-09-24 00:25:55.919 UTC [msp.identity] Verify -> DEBU 2c5b Verify: sig = 00000000 30 45 02 21 00 87 94 bd 94 ef f5 e3 3d 5c 66 59 |0E.!........=\fY| +00000010 98 c1 e0 4e 9f 3a 5e f9 bb 67 0a e6 a2 e8 95 58 |...N.:^..g.....X| +00000020 e8 76 55 b9 da 02 20 7c 4e 66 0d e3 80 40 11 7b |.vU... |Nf...@.{| +00000030 ed 80 9c 65 6d 6d af 54 87 b9 6d a3 ce 33 75 df |...emm.T..m..3u.| +00000040 fa 72 a1 08 42 42 05 |.r..BB.|" +"2019-09-24 00:25:55.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c5c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:55.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c5d Exiting" +"2019-09-24 00:25:55.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c5e Exiting" +"2019-09-24 00:25:55.924 UTC [gossip.comm] func1 -> DEBU 2c5f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.924 UTC [gossip.gossip] handleMessage -> DEBU 2c60 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.924 UTC [gossip.gossip] handleMessage -> DEBU 2c61 Exiting" +"2019-09-24 00:25:55.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c63 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:55.924 UTC [msp.identity] Verify -> DEBU 2c64 Verify: digest = 00000000 bd fb fa e0 8e a3 77 76 86 2c a6 7b 6b 45 9e 61 |......wv.,.{kE.a| +00000010 c3 9b 88 a9 2b 6e 50 a6 09 cc 5b e0 6d c5 55 fd |....+nP...[.m.U.|" +"2019-09-24 00:25:55.924 UTC [msp.identity] Verify -> DEBU 2c65 Verify: sig = 00000000 30 44 02 20 2b ac 5c 4f 51 30 bb e4 c1 36 84 92 |0D. +.\OQ0...6..| +00000010 52 02 a2 de 79 a5 9c b3 89 a9 b6 a9 d1 de 2e 0d |R...y...........| +00000020 9e b7 20 d3 02 20 74 9e 82 bb 68 e7 2b 2f 92 3a |.. .. t...h.+/.:| +00000030 08 9e 99 c2 9d cc e4 ec 5f 88 85 23 a7 de 1f 4c |........_..#...L| +00000040 33 85 b2 fb d4 f3 |3.....|" +"2019-09-24 00:25:55.925 UTC [msp.identity] Verify -> DEBU 2c66 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:55.925 UTC [msp.identity] Verify -> DEBU 2c67 Verify: sig = 00000000 30 45 02 21 00 95 f9 84 94 57 88 c9 c4 dd e5 84 |0E.!.....W......| +00000010 a9 84 97 ce e1 43 aa df a4 c0 ea d8 91 57 5a 31 |.....C.......WZ1| +00000020 70 29 a5 dd aa 02 20 35 7d 66 06 ca b1 b0 92 2f |p).... 5}f...../| +00000030 36 c5 4a 8a 06 fa 7a 6b 85 13 18 e1 12 a1 2e d9 |6.J...zk........| +00000040 45 13 0a 3a 6a b9 f6 |E..:j..|" +"2019-09-24 00:25:55.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c68 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:55.929 UTC [gossip.discovery] isSentByMe -> DEBU 2c69 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:55.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c6a Exiting" +"2019-09-24 00:25:55.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c6b Exiting" +"2019-09-24 00:25:55.950 UTC [gossip.gossip] handleMessage -> DEBU 2c6c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.950 UTC [gossip.pull] HandleMessage -> DEBU 2c6d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c6e Obtaining identity" +"2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c6f Obtaining identity" +"2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c70 Obtaining identity" +"2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c71 Obtaining identity" +"2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c72 Obtaining identity" +"2019-09-24 00:25:55.950 UTC [msp] DeserializeIdentity -> DEBU 2c73 Obtaining identity" +"2019-09-24 00:25:55.950 UTC [gossip.pull] SendDigest -> DEBU 2c74 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:55.950 UTC [gossip.gossip] handleMessage -> DEBU 2c75 Exiting" +"2019-09-24 00:25:55.972 UTC [gossip.gossip] handleMessage -> DEBU 2c76 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.972 UTC [gossip.gossip] handleMessage -> DEBU 2c77 Exiting" +"2019-09-24 00:25:55.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c78 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.972 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c79 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:55.972 UTC [msp] DeserializeIdentity -> DEBU 2c7a Obtaining identity" +"2019-09-24 00:25:55.973 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c7b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:55.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c7c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:55.973 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c7d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:55.973 UTC [cauthdsl] func1 -> DEBU 2c81 0xc004c06c10 gate 1569284755973386600 evaluation starts" +"2019-09-24 00:25:55.973 UTC [cauthdsl] func2 -> DEBU 2c82 0xc004c06c10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:55.973 UTC [cauthdsl] func2 -> DEBU 2c83 0xc004c06c10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:55.973 UTC [cauthdsl] func2 -> DEBU 2c84 0xc004c06c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:55.973 UTC [cauthdsl] func2 -> DEBU 2c85 0xc004c06c10 principal evaluation fails" +"2019-09-24 00:25:55.973 UTC [cauthdsl] func1 -> DEBU 2c86 0xc004c06c10 gate 1569284755973386600 evaluation fails" +"2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c87 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:55.973 UTC [policies] Evaluate -> DEBU 2c89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:55.973 UTC [cauthdsl] func1 -> DEBU 2c8a 0xc004c07450 gate 1569284755973822900 evaluation starts" +"2019-09-24 00:25:55.973 UTC [cauthdsl] func2 -> DEBU 2c8b 0xc004c07450 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:55.974 UTC [cauthdsl] func2 -> DEBU 2c8c 0xc004c07450 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:55.974 UTC [cauthdsl] func2 -> DEBU 2c8d 0xc004c07450 principal matched by identity 0" +"2019-09-24 00:25:55.974 UTC [msp.identity] Verify -> DEBU 2c8e Verify: digest = 00000000 85 ea 17 dd 77 a1 ca e3 45 dc 76 20 67 f1 4b 72 |....w...E.v g.Kr| +00000010 b2 31 3e 97 63 e8 e6 e4 51 0b 8d 47 e5 48 be 28 |.1>.c...Q..G.H.(|" +"2019-09-24 00:25:55.974 UTC [msp.identity] Verify -> DEBU 2c8f Verify: sig = 00000000 30 44 02 20 08 2e 17 82 08 54 b1 09 9d 5c 85 d8 |0D. .....T...\..| +00000010 50 b9 5f fb 2c fb 38 9e f4 56 7c b4 b0 5c 16 a5 |P._.,.8..V|..\..| +00000020 48 ea 2d 51 02 20 69 2f 2b 3f 41 b5 dd 4e 19 4c |H.-Q. i/+?A..N.L| +00000030 f9 47 c1 6c 48 63 57 86 fa 84 83 4f b7 21 9a fd |.G.lHcW....O.!..| +00000040 27 6c cb 90 79 3c |'l..y<|" +"2019-09-24 00:25:55.980 UTC [cauthdsl] func2 -> DEBU 2c90 0xc004c07450 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:55.980 UTC [cauthdsl] func1 -> DEBU 2c91 0xc004c07450 gate 1569284755973822900 evaluation succeeds" +"2019-09-24 00:25:55.980 UTC [policies] Evaluate -> DEBU 2c92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:55.980 UTC [policies] Evaluate -> DEBU 2c93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:55.980 UTC [policies] Evaluate -> DEBU 2c94 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:55.980 UTC [policies] Evaluate -> DEBU 2c95 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:55.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c96 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:55.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c97 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:55.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c98 updating membership: timestamp: " +"2019-09-24 00:25:55.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c99 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:55.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c9a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:25:55.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c9b Exiting" +"2019-09-24 00:25:55.981 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c9c Exiting" +"2019-09-24 00:25:55.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c9d Exiting" +"2019-09-24 00:25:55.981 UTC [gossip.discovery] sendMemResponse -> DEBU 2c9e Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:55.981 UTC [msp] DeserializeIdentity -> DEBU 2c9f Obtaining identity" +"2019-09-24 00:25:55.981 UTC [msp] DeserializeIdentity -> DEBU 2ca0 Obtaining identity" +"2019-09-24 00:25:55.981 UTC [msp] DeserializeIdentity -> DEBU 2ca1 Obtaining identity" +"2019-09-24 00:25:55.981 UTC [gossip.comm] Send -> DEBU 2ca2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:55.981 UTC [gossip.discovery] sendMemResponse -> DEBU 2ca3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" > alive:\262\0325\3771_\334\000*_n\004\2538j?\345,\263\275E(\352\324\353" > alive: alive: " +"2019-09-24 00:25:55.986 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:55.986 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca5 Exiting" +"2019-09-24 00:25:56.151 UTC [msp] DeserializeIdentity -> DEBU 2ca6 Obtaining identity" +"2019-09-24 00:25:56.152 UTC [msp] DeserializeIdentity -> DEBU 2ca7 Obtaining identity" +"2019-09-24 00:25:56.152 UTC [gossip.comm] Send -> DEBU 2ca8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:25:56.152 UTC [gossip.comm] sendToEndpoint -> DEBU 2ca9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.152 UTC [gossip.comm] sendToEndpoint -> DEBU 2caa Exiting" +"2019-09-24 00:25:56.153 UTC [gossip.comm] sendToEndpoint -> DEBU 2cab Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.154 UTC [gossip.comm] sendToEndpoint -> DEBU 2cac Exiting" +"2019-09-24 00:25:56.159 UTC [gossip.comm] func1 -> DEBU 2cad Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.160 UTC [gossip.gossip] handleMessage -> DEBU 2cae Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.161 UTC [msp] DeserializeIdentity -> DEBU 2caf Obtaining identity" +"2019-09-24 00:25:56.163 UTC [msp] DeserializeIdentity -> DEBU 2cb0 Obtaining identity" +"2019-09-24 00:25:56.163 UTC [msp] DeserializeIdentity -> DEBU 2cb1 Obtaining identity" +"2019-09-24 00:25:56.164 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cb2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:56.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cb3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cb4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.164 UTC [policies] Evaluate -> DEBU 2cb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:56.164 UTC [policies] Evaluate -> DEBU 2cb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:56.164 UTC [policies] Evaluate -> DEBU 2cb7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:56.164 UTC [cauthdsl] func1 -> DEBU 2cb8 0xc004c38580 gate 1569284756164323200 evaluation starts" +"2019-09-24 00:25:56.164 UTC [cauthdsl] func2 -> DEBU 2cb9 0xc004c38580 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.164 UTC [cauthdsl] func2 -> DEBU 2cba 0xc004c38580 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.164 UTC [cauthdsl] func2 -> DEBU 2cbb 0xc004c38580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:56.169 UTC [cauthdsl] func2 -> DEBU 2cbc 0xc004c38580 principal evaluation fails" +"2019-09-24 00:25:56.169 UTC [cauthdsl] func1 -> DEBU 2cbd 0xc004c38580 gate 1569284756164323200 evaluation fails" +"2019-09-24 00:25:56.169 UTC [policies] Evaluate -> DEBU 2cbe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.169 UTC [policies] Evaluate -> DEBU 2cbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.170 UTC [policies] Evaluate -> DEBU 2cc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:56.170 UTC [cauthdsl] func1 -> DEBU 2cc1 0xc004c38dc0 gate 1569284756170298700 evaluation starts" +"2019-09-24 00:25:56.170 UTC [cauthdsl] func2 -> DEBU 2cc2 0xc004c38dc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.170 UTC [cauthdsl] func2 -> DEBU 2cc3 0xc004c38dc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.170 UTC [cauthdsl] func2 -> DEBU 2cc4 0xc004c38dc0 principal matched by identity 0" +"2019-09-24 00:25:56.170 UTC [msp.identity] Verify -> DEBU 2cc5 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:56.170 UTC [msp.identity] Verify -> DEBU 2cc6 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:56.170 UTC [cauthdsl] func2 -> DEBU 2cc7 0xc004c38dc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:56.170 UTC [cauthdsl] func1 -> DEBU 2cc8 0xc004c38dc0 gate 1569284756170298700 evaluation succeeds" +"2019-09-24 00:25:56.170 UTC [policies] Evaluate -> DEBU 2cc9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.170 UTC [policies] Evaluate -> DEBU 2cca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.170 UTC [policies] Evaluate -> DEBU 2ccb Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:56.170 UTC [policies] Evaluate -> DEBU 2ccc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:56.171 UTC [msp.identity] Verify -> DEBU 2ccd Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:56.171 UTC [msp.identity] Verify -> DEBU 2cce Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:56.172 UTC [msp] DeserializeIdentity -> DEBU 2ccf Obtaining identity" +"2019-09-24 00:25:56.172 UTC [msp] DeserializeIdentity -> DEBU 2cd0 Obtaining identity" +"2019-09-24 00:25:56.172 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cd1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:56.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cd5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.179 UTC [policies] Evaluate -> DEBU 2cd6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:56.179 UTC [policies] Evaluate -> DEBU 2cd7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:56.179 UTC [policies] Evaluate -> DEBU 2cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:56.179 UTC [cauthdsl] func1 -> DEBU 2cd9 0xc004c48cb0 gate 1569284756179736100 evaluation starts" +"2019-09-24 00:25:56.179 UTC [cauthdsl] func2 -> DEBU 2cda 0xc004c48cb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.179 UTC [cauthdsl] func2 -> DEBU 2cdb 0xc004c48cb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2cdc 0xc004c48cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2cdd 0xc004c48cb0 principal evaluation fails" +"2019-09-24 00:25:56.180 UTC [cauthdsl] func1 -> DEBU 2cde 0xc004c48cb0 gate 1569284756179736100 evaluation fails" +"2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2cdf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2ce0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2ce1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:56.180 UTC [cauthdsl] func1 -> DEBU 2ce2 0xc004c494f0 gate 1569284756180354000 evaluation starts" +"2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2ce3 0xc004c494f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2ce4 0xc004c494f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2ce5 0xc004c494f0 principal matched by identity 0" +"2019-09-24 00:25:56.180 UTC [msp.identity] Verify -> DEBU 2ce6 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:56.180 UTC [msp.identity] Verify -> DEBU 2ce7 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:56.180 UTC [cauthdsl] func2 -> DEBU 2ce8 0xc004c494f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:56.180 UTC [cauthdsl] func1 -> DEBU 2ce9 0xc004c494f0 gate 1569284756180354000 evaluation succeeds" +"2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2cea Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2ceb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2cec Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:56.180 UTC [policies] Evaluate -> DEBU 2ced == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:56.181 UTC [msp.identity] Verify -> DEBU 2cee Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:56.181 UTC [msp.identity] Verify -> DEBU 2cef Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:56.181 UTC [gossip.gossip] handleMessage -> DEBU 2cf0 Exiting" +"2019-09-24 00:25:56.173 UTC [gossip.comm] sendToEndpoint -> DEBU 2cd2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.181 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf1 Exiting" +"2019-09-24 00:25:56.173 UTC [gossip.comm] func1 -> DEBU 2cd3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.181 UTC [gossip.gossip] handleMessage -> DEBU 2cf2 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.181 UTC [msp.identity] Verify -> DEBU 2cf3 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:56.181 UTC [msp.identity] Verify -> DEBU 2cf4 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:56.182 UTC [msp.identity] Verify -> DEBU 2cf5 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:56.182 UTC [msp.identity] Verify -> DEBU 2cf6 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:56.182 UTC [msp] DeserializeIdentity -> DEBU 2cf7 Obtaining identity" +"2019-09-24 00:25:56.182 UTC [msp] DeserializeIdentity -> DEBU 2cf8 Obtaining identity" +"2019-09-24 00:25:56.182 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2cf9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:56.182 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cfa Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.182 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cfb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.182 UTC [policies] Evaluate -> DEBU 2cfc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:56.182 UTC [policies] Evaluate -> DEBU 2cfd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:56.182 UTC [policies] Evaluate -> DEBU 2cfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:56.182 UTC [cauthdsl] func1 -> DEBU 2cff 0xc004c7c5a0 gate 1569284756182772200 evaluation starts" +"2019-09-24 00:25:56.182 UTC [cauthdsl] func2 -> DEBU 2d00 0xc004c7c5a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.183 UTC [cauthdsl] func2 -> DEBU 2d01 0xc004c7c5a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.183 UTC [cauthdsl] func2 -> DEBU 2d02 0xc004c7c5a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:56.183 UTC [cauthdsl] func2 -> DEBU 2d03 0xc004c7c5a0 principal evaluation fails" +"2019-09-24 00:25:56.183 UTC [cauthdsl] func1 -> DEBU 2d04 0xc004c7c5a0 gate 1569284756182772200 evaluation fails" +"2019-09-24 00:25:56.183 UTC [policies] Evaluate -> DEBU 2d05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.183 UTC [policies] Evaluate -> DEBU 2d06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.183 UTC [policies] Evaluate -> DEBU 2d07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:56.183 UTC [cauthdsl] func1 -> DEBU 2d08 0xc004c7cde0 gate 1569284756183809200 evaluation starts" +"2019-09-24 00:25:56.184 UTC [cauthdsl] func2 -> DEBU 2d09 0xc004c7cde0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.184 UTC [cauthdsl] func2 -> DEBU 2d0a 0xc004c7cde0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.184 UTC [cauthdsl] func2 -> DEBU 2d0b 0xc004c7cde0 principal matched by identity 0" +"2019-09-24 00:25:56.201 UTC [msp.identity] Verify -> DEBU 2d0c Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:56.202 UTC [msp.identity] Verify -> DEBU 2d0d Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:56.202 UTC [cauthdsl] func2 -> DEBU 2d0e 0xc004c7cde0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:56.202 UTC [cauthdsl] func1 -> DEBU 2d0f 0xc004c7cde0 gate 1569284756183809200 evaluation succeeds" +"2019-09-24 00:25:56.205 UTC [policies] Evaluate -> DEBU 2d10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.207 UTC [policies] Evaluate -> DEBU 2d11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.207 UTC [policies] Evaluate -> DEBU 2d12 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:56.207 UTC [policies] Evaluate -> DEBU 2d13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:56.212 UTC [msp] DeserializeIdentity -> DEBU 2d14 Obtaining identity" +"2019-09-24 00:25:56.215 UTC [msp] DeserializeIdentity -> DEBU 2d15 Obtaining identity" +"2019-09-24 00:25:56.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:56.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d17 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d18 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.251 UTC [policies] Evaluate -> DEBU 2d19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:56.251 UTC [policies] Evaluate -> DEBU 2d1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:56.251 UTC [policies] Evaluate -> DEBU 2d1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:56.251 UTC [cauthdsl] func1 -> DEBU 2d1c 0xc004c905e0 gate 1569284756251338800 evaluation starts" +"2019-09-24 00:25:56.251 UTC [cauthdsl] func2 -> DEBU 2d1d 0xc004c905e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.251 UTC [cauthdsl] func2 -> DEBU 2d1e 0xc004c905e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.251 UTC [cauthdsl] func2 -> DEBU 2d1f 0xc004c905e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:56.251 UTC [cauthdsl] func2 -> DEBU 2d20 0xc004c905e0 principal evaluation fails" +"2019-09-24 00:25:56.252 UTC [cauthdsl] func1 -> DEBU 2d21 0xc004c905e0 gate 1569284756251338800 evaluation fails" +"2019-09-24 00:25:56.252 UTC [policies] Evaluate -> DEBU 2d22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.252 UTC [policies] Evaluate -> DEBU 2d23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.252 UTC [policies] Evaluate -> DEBU 2d24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:56.252 UTC [cauthdsl] func1 -> DEBU 2d25 0xc004c90e20 gate 1569284756252400100 evaluation starts" +"2019-09-24 00:25:56.255 UTC [cauthdsl] func2 -> DEBU 2d26 0xc004c90e20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.256 UTC [cauthdsl] func2 -> DEBU 2d27 0xc004c90e20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.256 UTC [cauthdsl] func2 -> DEBU 2d28 0xc004c90e20 principal matched by identity 0" +"2019-09-24 00:25:56.256 UTC [msp.identity] Verify -> DEBU 2d29 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:56.256 UTC [msp.identity] Verify -> DEBU 2d2a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:56.256 UTC [cauthdsl] func2 -> DEBU 2d2b 0xc004c90e20 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:56.258 UTC [cauthdsl] func1 -> DEBU 2d2c 0xc004c90e20 gate 1569284756252400100 evaluation succeeds" +"2019-09-24 00:25:56.258 UTC [policies] Evaluate -> DEBU 2d2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.258 UTC [policies] Evaluate -> DEBU 2d2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.258 UTC [policies] Evaluate -> DEBU 2d2f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:56.258 UTC [policies] Evaluate -> DEBU 2d30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:56.258 UTC [gossip.gossip] handleMessage -> DEBU 2d31 Exiting" +"2019-09-24 00:25:56.258 UTC [gossip.gossip] handleMessage -> DEBU 2d32 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.258 UTC [msp] DeserializeIdentity -> DEBU 2d33 Obtaining identity" +"2019-09-24 00:25:56.259 UTC [msp] DeserializeIdentity -> DEBU 2d34 Obtaining identity" +"2019-09-24 00:25:56.259 UTC [msp] DeserializeIdentity -> DEBU 2d35 Obtaining identity" +"2019-09-24 00:25:56.260 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d36 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:56.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d37 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.260 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d38 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.260 UTC [policies] Evaluate -> DEBU 2d39 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:56.260 UTC [policies] Evaluate -> DEBU 2d3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:56.260 UTC [policies] Evaluate -> DEBU 2d3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:56.260 UTC [cauthdsl] func1 -> DEBU 2d3c 0xc004ca4930 gate 1569284756260546600 evaluation starts" +"2019-09-24 00:25:56.260 UTC [cauthdsl] func2 -> DEBU 2d3d 0xc004ca4930 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.260 UTC [cauthdsl] func2 -> DEBU 2d3e 0xc004ca4930 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.260 UTC [cauthdsl] func2 -> DEBU 2d3f 0xc004ca4930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:56.260 UTC [cauthdsl] func2 -> DEBU 2d40 0xc004ca4930 principal evaluation fails" +"2019-09-24 00:25:56.260 UTC [cauthdsl] func1 -> DEBU 2d41 0xc004ca4930 gate 1569284756260546600 evaluation fails" +"2019-09-24 00:25:56.261 UTC [policies] Evaluate -> DEBU 2d42 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.261 UTC [policies] Evaluate -> DEBU 2d43 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.261 UTC [policies] Evaluate -> DEBU 2d44 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:56.261 UTC [cauthdsl] func1 -> DEBU 2d45 0xc004ca5170 gate 1569284756261322100 evaluation starts" +"2019-09-24 00:25:56.261 UTC [cauthdsl] func2 -> DEBU 2d46 0xc004ca5170 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.261 UTC [cauthdsl] func2 -> DEBU 2d47 0xc004ca5170 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.261 UTC [cauthdsl] func2 -> DEBU 2d48 0xc004ca5170 principal matched by identity 0" +"2019-09-24 00:25:56.261 UTC [msp.identity] Verify -> DEBU 2d49 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:25:56.261 UTC [msp.identity] Verify -> DEBU 2d4a Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:25:56.261 UTC [cauthdsl] func2 -> DEBU 2d4b 0xc004ca5170 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:56.261 UTC [cauthdsl] func1 -> DEBU 2d4c 0xc004ca5170 gate 1569284756261322100 evaluation succeeds" +"2019-09-24 00:25:56.262 UTC [policies] Evaluate -> DEBU 2d4d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.262 UTC [policies] Evaluate -> DEBU 2d4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.262 UTC [policies] Evaluate -> DEBU 2d4f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:56.262 UTC [policies] Evaluate -> DEBU 2d50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:56.262 UTC [msp.identity] Verify -> DEBU 2d51 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:25:56.262 UTC [msp.identity] Verify -> DEBU 2d52 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:25:56.262 UTC [msp.identity] Verify -> DEBU 2d53 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:25:56.262 UTC [msp.identity] Verify -> DEBU 2d54 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:25:56.264 UTC [gossip.privdata] run -> DEBU 2d55 Start reconcile missing private info" +"2019-09-24 00:25:56.264 UTC [leveldbhelper] GetIterator -> DEBU 2d56 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +"2019-09-24 00:25:56.264 UTC [gossip.privdata] reconcile -> DEBU 2d57 Reconciliation cycle finished successfully. no items to reconcile" +"2019-09-24 00:25:56.263 UTC [msp] DeserializeIdentity -> DEBU 2d58 Obtaining identity" +"2019-09-24 00:25:56.268 UTC [msp] DeserializeIdentity -> DEBU 2d59 Obtaining identity" +"2019-09-24 00:25:56.268 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d5a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:56.268 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d5b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.268 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d5c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.268 UTC [policies] Evaluate -> DEBU 2d5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:56.268 UTC [policies] Evaluate -> DEBU 2d5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:56.268 UTC [policies] Evaluate -> DEBU 2d5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:56.268 UTC [cauthdsl] func1 -> DEBU 2d60 0xc004cbf780 gate 1569284756268911900 evaluation starts" +"2019-09-24 00:25:56.268 UTC [cauthdsl] func2 -> DEBU 2d61 0xc004cbf780 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d62 0xc004cbf780 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d63 0xc004cbf780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d64 0xc004cbf780 principal evaluation fails" +"2019-09-24 00:25:56.269 UTC [cauthdsl] func1 -> DEBU 2d65 0xc004cbf780 gate 1569284756268911900 evaluation fails" +"2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d66 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:56.269 UTC [cauthdsl] func1 -> DEBU 2d69 0xc004cbffc0 gate 1569284756269247300 evaluation starts" +"2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d6a 0xc004cbffc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d6b 0xc004cbffc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d6c 0xc004cbffc0 principal matched by identity 0" +"2019-09-24 00:25:56.269 UTC [msp.identity] Verify -> DEBU 2d6d Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:25:56.269 UTC [msp.identity] Verify -> DEBU 2d6e Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:25:56.269 UTC [cauthdsl] func2 -> DEBU 2d6f 0xc004cbffc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:56.269 UTC [cauthdsl] func1 -> DEBU 2d70 0xc004cbffc0 gate 1569284756269247300 evaluation succeeds" +"2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d71 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d72 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d73 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:56.269 UTC [policies] Evaluate -> DEBU 2d74 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:56.270 UTC [gossip.gossip] handleMessage -> DEBU 2d75 Exiting" +"2019-09-24 00:25:56.297 UTC [msp] DeserializeIdentity -> DEBU 2d76 Obtaining identity" +"2019-09-24 00:25:56.298 UTC [msp] DeserializeIdentity -> DEBU 2d77 Obtaining identity" +"2019-09-24 00:25:56.298 UTC [gossip.pull] Hello -> DEBU 2d78 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:56.299 UTC [msp] DeserializeIdentity -> DEBU 2d79 Obtaining identity" +"2019-09-24 00:25:56.299 UTC [msp] DeserializeIdentity -> DEBU 2d7a Obtaining identity" +"2019-09-24 00:25:56.299 UTC [gossip.comm] Send -> DEBU 2d7b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:56.300 UTC [gossip.comm] sendToEndpoint -> DEBU 2d7c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.300 UTC [gossip.comm] sendToEndpoint -> DEBU 2d7d Exiting" +"2019-09-24 00:25:56.315 UTC [gossip.comm] func1 -> DEBU 2d7e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.315 UTC [gossip.gossip] handleMessage -> DEBU 2d7f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.316 UTC [gossip.pull] HandleMessage -> DEBU 2d80 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.316 UTC [gossip.gossip] handleMessage -> DEBU 2d81 Exiting" +"2019-09-24 00:25:56.653 UTC [gossip.comm] func1 -> DEBU 2d82 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.654 UTC [gossip.gossip] handleMessage -> DEBU 2d83 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.654 UTC [msp] DeserializeIdentity -> DEBU 2d84 Obtaining identity" +"2019-09-24 00:25:56.654 UTC [msp] DeserializeIdentity -> DEBU 2d85 Obtaining identity" +"2019-09-24 00:25:56.654 UTC [gossip.gossip] handleMessage -> DEBU 2d86 Exiting" +"2019-09-24 00:25:56.696 UTC [gossip.comm] func1 -> DEBU 2d87 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.697 UTC [gossip.gossip] handleMessage -> DEBU 2d88 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.697 UTC [gossip.gossip] handleMessage -> DEBU 2d89 Exiting" +"2019-09-24 00:25:56.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d8a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.697 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d8b Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:56.697 UTC [msp] DeserializeIdentity -> DEBU 2d8c Obtaining identity" +"2019-09-24 00:25:56.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d8d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:56.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d8e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d8f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:56.697 UTC [policies] Evaluate -> DEBU 2d90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:56.697 UTC [policies] Evaluate -> DEBU 2d91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:56.697 UTC [policies] Evaluate -> DEBU 2d92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:56.697 UTC [cauthdsl] func1 -> DEBU 2d93 0xc004cf7020 gate 1569284756697790900 evaluation starts" +"2019-09-24 00:25:56.697 UTC [cauthdsl] func2 -> DEBU 2d94 0xc004cf7020 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.697 UTC [cauthdsl] func2 -> DEBU 2d95 0xc004cf7020 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.697 UTC [cauthdsl] func2 -> DEBU 2d96 0xc004cf7020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:56.698 UTC [cauthdsl] func2 -> DEBU 2d97 0xc004cf7020 principal evaluation fails" +"2019-09-24 00:25:56.698 UTC [cauthdsl] func1 -> DEBU 2d98 0xc004cf7020 gate 1569284756697790900 evaluation fails" +"2019-09-24 00:25:56.698 UTC [policies] Evaluate -> DEBU 2d99 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.698 UTC [policies] Evaluate -> DEBU 2d9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:56.698 UTC [policies] Evaluate -> DEBU 2d9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:56.698 UTC [cauthdsl] func1 -> DEBU 2d9c 0xc004cf7860 gate 1569284756698309700 evaluation starts" +"2019-09-24 00:25:56.698 UTC [cauthdsl] func2 -> DEBU 2d9d 0xc004cf7860 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:56.698 UTC [cauthdsl] func2 -> DEBU 2d9e 0xc004cf7860 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:56.698 UTC [cauthdsl] func2 -> DEBU 2d9f 0xc004cf7860 principal matched by identity 0" +"2019-09-24 00:25:56.698 UTC [msp.identity] Verify -> DEBU 2da0 Verify: digest = 00000000 f0 3c 4b 80 f4 27 51 e3 4a 76 d1 55 5a 13 83 ee |. DEBU 2da1 Verify: sig = 00000000 30 44 02 20 07 20 62 0f 6f b3 71 fe a9 1f db 29 |0D. . b.o.q....)| +00000010 c8 24 69 df df 58 3a 1f 51 51 bd cb be 64 c4 e2 |.$i..X:.QQ...d..| +00000020 97 f7 bb 26 02 20 2c 39 21 ba 32 83 f4 30 fd 69 |...&. ,9!.2..0.i| +00000030 a5 a2 c7 cb e1 60 84 f4 a5 2c 09 de 17 fe 0b 0d |.....`...,......| +00000040 33 c0 48 95 0a bf |3.H...|" +"2019-09-24 00:25:56.698 UTC [cauthdsl] func2 -> DEBU 2da2 0xc004cf7860 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:56.698 UTC [cauthdsl] func1 -> DEBU 2da3 0xc004cf7860 gate 1569284756698309700 evaluation succeeds" +"2019-09-24 00:25:56.699 UTC [policies] Evaluate -> DEBU 2da4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.699 UTC [policies] Evaluate -> DEBU 2da5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:56.699 UTC [policies] Evaluate -> DEBU 2da6 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:56.699 UTC [policies] Evaluate -> DEBU 2da7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:56.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 2da8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:56.699 UTC [gossip.discovery] learnExistingMembers -> DEBU 2da9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:56.699 UTC [gossip.discovery] learnExistingMembers -> DEBU 2daa updating membership: timestamp: " +"2019-09-24 00:25:56.708 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dab Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:56.708 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dac Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:56.708 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dad Exiting" +"2019-09-24 00:25:56.708 UTC [gossip.discovery] handleAliveMessage -> DEBU 2dae Exiting" +"2019-09-24 00:25:56.709 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2daf Exiting" +"2019-09-24 00:25:56.709 UTC [gossip.discovery] sendMemResponse -> DEBU 2db0 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:25:56.709 UTC [msp] DeserializeIdentity -> DEBU 2db1 Obtaining identity" +"2019-09-24 00:25:56.709 UTC [msp] DeserializeIdentity -> DEBU 2db2 Obtaining identity" +"2019-09-24 00:25:56.709 UTC [msp] DeserializeIdentity -> DEBU 2db3 Obtaining identity" +"2019-09-24 00:25:56.709 UTC [gossip.comm] Send -> DEBU 2db4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:56.709 UTC [gossip.discovery] sendMemResponse -> DEBU 2db5 Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020/" signature:"0E\002!\000\207\224\275\224\357\365\343=\\fY\230\301\340N\237:^\371\273g\n\346\242\350\225X\350vU\271\332\002 |Nf\r\343\200@\021{\355\200\234emm\257T\207\271m\243\3163u\337\372r\241\010BB\005" > alive: " +"2019-09-24 00:25:56.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2db6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.709 UTC [gossip.comm] sendToEndpoint -> DEBU 2db7 Exiting" +"2019-09-24 00:25:56.746 UTC [gossip.comm] func1 -> DEBU 2db8 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.746 UTC [gossip.gossip] handleMessage -> DEBU 2db9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.747 UTC [gossip.pull] HandleMessage -> DEBU 2dba GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.747 UTC [msp] DeserializeIdentity -> DEBU 2dbb Obtaining identity" +"2019-09-24 00:25:56.747 UTC [msp] DeserializeIdentity -> DEBU 2dbc Obtaining identity" +"2019-09-24 00:25:56.747 UTC [msp] DeserializeIdentity -> DEBU 2dbd Obtaining identity" +"2019-09-24 00:25:56.747 UTC [msp] DeserializeIdentity -> DEBU 2dbe Obtaining identity" +"2019-09-24 00:25:56.747 UTC [msp] DeserializeIdentity -> DEBU 2dbf Obtaining identity" +"2019-09-24 00:25:56.748 UTC [msp] DeserializeIdentity -> DEBU 2dc0 Obtaining identity" +"2019-09-24 00:25:56.748 UTC [gossip.pull] SendDigest -> DEBU 2dc1 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:25:56.748 UTC [gossip.gossip] handleMessage -> DEBU 2dc2 Exiting" +"2019-09-24 00:25:56.836 UTC [gossip.comm] func1 -> DEBU 2dc3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.846 UTC [gossip.gossip] handleMessage -> DEBU 2dc4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.847 UTC [gossip.pull] HandleMessage -> DEBU 2dc5 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:25:56.847 UTC [gossip.pull] SendDigest -> DEBU 2dc6 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:56.847 UTC [gossip.gossip] handleMessage -> DEBU 2dc7 Exiting" +"2019-09-24 00:25:57.145 UTC [gossip.gossip] handleMessage -> DEBU 2dc8 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:57.145 UTC [msp] DeserializeIdentity -> DEBU 2dc9 Obtaining identity" +"2019-09-24 00:25:57.145 UTC [msp] DeserializeIdentity -> DEBU 2dca Obtaining identity" +"2019-09-24 00:25:57.145 UTC [msp] DeserializeIdentity -> DEBU 2dcb Obtaining identity" +"2019-09-24 00:25:57.145 UTC [gossip.gossip] handleMessage -> DEBU 2dcc Exiting" +"2019-09-24 00:25:57.325 UTC [gossip.election] waitForInterrupt -> DEBU 2dcd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:25:57.326 UTC [gossip.election] IsLeader -> DEBU 2dce c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:25:57.327 UTC [msp] GetDefaultSigningIdentity -> DEBU 2dcf Obtaining default signing identity" +"2019-09-24 00:25:57.327 UTC [msp.identity] Sign -> DEBU 2dd0 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315100D1801 " +"2019-09-24 00:25:57.327 UTC [msp.identity] Sign -> DEBU 2dd1 Sign: digest: 5D492FD2443058A7B6CF9EB35404A285B558EE3F77B318AB9C4BE883E455B9CD " +"2019-09-24 00:25:57.328 UTC [gossip.election] waitForInterrupt -> DEBU 2dd2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:25:57.346 UTC [msp] DeserializeIdentity -> DEBU 2dd3 Obtaining identity" +"2019-09-24 00:25:57.346 UTC [msp] DeserializeIdentity -> DEBU 2dd4 Obtaining identity" +"2019-09-24 00:25:57.347 UTC [msp] DeserializeIdentity -> DEBU 2dd5 Obtaining identity" +"2019-09-24 00:25:57.347 UTC [msp] DeserializeIdentity -> DEBU 2dd6 Obtaining identity" +"2019-09-24 00:25:57.347 UTC [gossip.comm] Send -> DEBU 2dd7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:57.347 UTC [msp] DeserializeIdentity -> DEBU 2dd8 Obtaining identity" +"2019-09-24 00:25:57.347 UTC [msp] DeserializeIdentity -> DEBU 2dd9 Obtaining identity" +"2019-09-24 00:25:57.348 UTC [gossip.comm] sendToEndpoint -> DEBU 2dda Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.348 UTC [gossip.comm] sendToEndpoint -> DEBU 2ddb Exiting" +"2019-09-24 00:25:57.680 UTC [gossip.comm] func1 -> DEBU 2ddc Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.681 UTC [gossip.gossip] handleMessage -> DEBU 2ddd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.681 UTC [gossip.gossip] handleMessage -> DEBU 2dde Exiting" +"2019-09-24 00:25:57.681 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ddf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.681 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2de0 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:57.681 UTC [msp.identity] Verify -> DEBU 2de1 Verify: digest = 00000000 db 9d 98 68 08 05 b3 ab 30 8a 4c 3c 3e b5 90 8b |...h....0.L<>...| +00000010 34 4d 48 8f b3 06 81 47 a1 e7 ad 62 0a bc b5 f6 |4MH....G...b....|" +"2019-09-24 00:25:57.681 UTC [msp.identity] Verify -> DEBU 2de2 Verify: sig = 00000000 30 44 02 20 2a 7e 04 b0 d4 e8 62 82 70 8b 6f 75 |0D. *~....b.p.ou| +00000010 4c 06 79 58 0b 05 b0 67 c6 91 29 12 9a 28 d3 fe |L.yX...g..)..(..| +00000020 c4 14 23 de 02 20 0a 72 8b 6b 46 48 16 26 97 75 |..#.. .r.kFH.&.u| +00000030 cd 75 95 fd 4b fe 90 55 b1 6f 88 c0 5b 1a 96 4d |.u..K..U.o..[..M| +00000040 b4 71 4c d2 26 c7 |.qL.&.|" +"2019-09-24 00:25:57.681 UTC [gossip.discovery] handleAliveMessage -> DEBU 2de3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.681 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:57.681 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:57.681 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:57.682 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:57.682 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de8 Exiting" +"2019-09-24 00:25:57.682 UTC [gossip.discovery] handleAliveMessage -> DEBU 2de9 Exiting" +"2019-09-24 00:25:57.682 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2dea Exiting" +"2019-09-24 00:25:57.682 UTC [gossip.comm] func1 -> DEBU 2deb Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:57.682 UTC [gossip.gossip] handleMessage -> DEBU 2dec Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:57.682 UTC [gossip.pull] HandleMessage -> DEBU 2ded GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:57.682 UTC [gossip.pull] SendDigest -> DEBU 2dee Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:25:57.682 UTC [gossip.gossip] handleMessage -> DEBU 2def Exiting" +"2019-09-24 00:25:57.696 UTC [msp] DeserializeIdentity -> DEBU 2df0 Obtaining identity" +"2019-09-24 00:25:57.696 UTC [msp] DeserializeIdentity -> DEBU 2df1 Obtaining identity" +"2019-09-24 00:25:57.696 UTC [gossip.gossip] handleMessage -> DEBU 2df2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.696 UTC [gossip.gossip] handleMessage -> DEBU 2df3 Exiting" +"2019-09-24 00:25:57.696 UTC [msp] DeserializeIdentity -> DEBU 2df4 Obtaining identity" +"2019-09-24 00:25:57.696 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2df5 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.696 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2df6 Exiting" +"2019-09-24 00:25:57.696 UTC [gossip.comm] Send -> DEBU 2df7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:57.696 UTC [msp] DeserializeIdentity -> DEBU 2df8 Obtaining identity" +"2019-09-24 00:25:57.696 UTC [gossip.comm] Send -> DEBU 2df9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:57.696 UTC [gossip.comm] sendToEndpoint -> DEBU 2dfa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.697 UTC [gossip.comm] sendToEndpoint -> DEBU 2dfb Exiting" +"2019-09-24 00:25:57.697 UTC [gossip.comm] sendToEndpoint -> DEBU 2dfc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.697 UTC [gossip.comm] sendToEndpoint -> DEBU 2dfd Exiting" +"2019-09-24 00:25:57.715 UTC [gossip.comm] func1 -> DEBU 2dfe Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.715 UTC [gossip.gossip] handleMessage -> DEBU 2dff Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.715 UTC [gossip.gossip] handleMessage -> DEBU 2e00 Exiting" +"2019-09-24 00:25:57.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e01 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:57.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e02 Exiting" +"2019-09-24 00:25:57.752 UTC [gossip.comm] func1 -> DEBU 2e03 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:57.752 UTC [gossip.gossip] handleMessage -> DEBU 2e04 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:57.752 UTC [gossip.gossip] handleMessage -> DEBU 2e05 Exiting" +"2019-09-24 00:25:57.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e06 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:25:57.752 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e07 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:57.752 UTC [msp.identity] Verify -> DEBU 2e08 Verify: digest = 00000000 46 4b a1 80 cb 54 af d2 11 34 2e fd 0f 4b 32 d2 |FK...T...4...K2.| +00000010 eb 5a 35 af a8 d5 37 7f 42 aa 39 a7 f3 e3 18 aa |.Z5...7.B.9.....|" +"2019-09-24 00:25:57.753 UTC [msp.identity] Verify -> DEBU 2e09 Verify: sig = 00000000 30 44 02 20 13 55 13 f2 31 f6 11 79 69 94 91 23 |0D. .U..1..yi..#| +00000010 a9 81 5d e6 32 23 5b f9 70 1d 00 04 12 1e 29 53 |..].2#[.p.....)S| +00000020 b2 8b 91 53 02 20 52 c9 7c 65 af 44 ca 76 71 28 |...S. R.|e.D.vq(| +00000030 43 c0 1b 78 6b 1a aa 3f ef 8f 4e e5 38 e8 fc 4c |C..xk..?..N.8..L| +00000040 03 7f 20 16 68 e0 |.. .h.|" +"2019-09-24 00:25:57.753 UTC [msp.identity] Verify -> DEBU 2e0a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:25:57.753 UTC [msp.identity] Verify -> DEBU 2e0b Verify: sig = 00000000 30 44 02 20 40 63 5b bf 57 57 c4 df 23 35 98 dd |0D. @c[.WW..#5..| +00000010 45 14 7b 75 7e 90 55 0c e8 54 b8 27 f7 b5 e7 b6 |E.{u~.U..T.'....| +00000020 c8 43 83 f0 02 20 15 5e 59 b7 2d 9a a1 d8 b8 7a |.C... .^Y.-....z| +00000030 a7 f7 3d 40 2b 33 ce 00 47 d2 5f 86 f1 00 0c a5 |..=@+3..G._.....| +00000040 b6 c8 7c df 4b 5d |..|.K]|" +"2019-09-24 00:25:57.754 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e0c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:25:57.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e0d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:25:57.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e0e updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:57.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e0f Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:25:57.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e10 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:57.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e11 Exiting" +"2019-09-24 00:25:57.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e12 Exiting" +"2019-09-24 00:25:57.761 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e13 Exiting" +"2019-09-24 00:25:57.761 UTC [gossip.discovery] sendMemResponse -> DEBU 2e14 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:25:57.762 UTC [msp] DeserializeIdentity -> DEBU 2e15 Obtaining identity" +"2019-09-24 00:25:57.762 UTC [msp] DeserializeIdentity -> DEBU 2e16 Obtaining identity" +"2019-09-24 00:25:57.762 UTC [gossip.comm] Send -> DEBU 2e17 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:57.762 UTC [gossip.discovery] sendMemResponse -> DEBU 2e19 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" secret_envelope: > alive: " +"2019-09-24 00:25:57.762 UTC [gossip.comm] sendToEndpoint -> DEBU 2e18 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:57.763 UTC [gossip.comm] sendToEndpoint -> DEBU 2e1a Exiting" +"2019-09-24 00:25:58.081 UTC [gossip.comm] func1 -> DEBU 2e1b Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:58.081 UTC [gossip.gossip] handleMessage -> DEBU 2e1c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:25:58.081 UTC [msp] DeserializeIdentity -> DEBU 2e1d Obtaining identity" +"2019-09-24 00:25:58.081 UTC [msp] DeserializeIdentity -> DEBU 2e1e Obtaining identity" +"2019-09-24 00:25:58.082 UTC [msp] DeserializeIdentity -> DEBU 2e1f Obtaining identity" +"2019-09-24 00:25:58.082 UTC [gossip.gossip] handleMessage -> DEBU 2e20 Exiting" +"2019-09-24 00:25:59.618 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e21 Obtaining default signing identity" +"2019-09-24 00:25:59.619 UTC [msp.identity] Sign -> DEBU 2e22 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102D " +"2019-09-24 00:25:59.619 UTC [msp.identity] Sign -> DEBU 2e23 Sign: digest: 37E67C8B1B66F11719C237F89F88A1ACB7FF399359BFD50BBB407816680A712B " +"2019-09-24 00:25:59.619 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e24 Obtaining default signing identity" +"2019-09-24 00:25:59.619 UTC [msp.identity] Sign -> DEBU 2e25 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:59.619 UTC [msp.identity] Sign -> DEBU 2e26 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:59.619 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2e27 Sleeping 5s" +"2019-09-24 00:25:59.625 UTC [msp] DeserializeIdentity -> DEBU 2e28 Obtaining identity" +"2019-09-24 00:25:59.625 UTC [msp] DeserializeIdentity -> DEBU 2e29 Obtaining identity" +"2019-09-24 00:25:59.626 UTC [msp] DeserializeIdentity -> DEBU 2e2a Obtaining identity" +"2019-09-24 00:25:59.626 UTC [gossip.comm] Send -> DEBU 2e2b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:59.626 UTC [gossip.comm] Send -> DEBU 2e2c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:59.627 UTC [msp] DeserializeIdentity -> DEBU 2e2d Obtaining identity" +"2019-09-24 00:25:59.627 UTC [gossip.comm] Send -> DEBU 2e2e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:25:59.627 UTC [gossip.comm] sendToEndpoint -> DEBU 2e2f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.627 UTC [gossip.comm] sendToEndpoint -> DEBU 2e30 Exiting" +"2019-09-24 00:25:59.627 UTC [gossip.comm] sendToEndpoint -> DEBU 2e31 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.627 UTC [gossip.comm] sendToEndpoint -> DEBU 2e32 Exiting" +"2019-09-24 00:25:59.628 UTC [gossip.comm] sendToEndpoint -> DEBU 2e33 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.629 UTC [gossip.comm] sendToEndpoint -> DEBU 2e34 Exiting" +"2019-09-24 00:25:59.709 UTC [gossip.pull] Hello -> DEBU 2e35 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:25:59.710 UTC [gossip.comm] Send -> DEBU 2e36 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:59.710 UTC [gossip.pull] Hello -> DEBU 2e37 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:25:59.710 UTC [gossip.comm] Send -> DEBU 2e38 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:59.710 UTC [gossip.pull] Hello -> DEBU 2e39 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:25:59.710 UTC [gossip.comm] Send -> DEBU 2e3a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:59.710 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.711 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3c Exiting" +"2019-09-24 00:25:59.711 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.711 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3e Exiting" +"2019-09-24 00:25:59.711 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.711 UTC [gossip.comm] sendToEndpoint -> DEBU 2e40 Exiting" +"2019-09-24 00:25:59.716 UTC [gossip.gossip] handleMessage -> DEBU 2e41 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.717 UTC [gossip.pull] HandleMessage -> DEBU 2e42 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.717 UTC [gossip.gossip] handleMessage -> DEBU 2e43 Exiting" +"2019-09-24 00:25:59.717 UTC [gossip.comm] func1 -> DEBU 2e44 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.717 UTC [gossip.gossip] handleMessage -> DEBU 2e45 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.717 UTC [gossip.pull] HandleMessage -> DEBU 2e46 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.717 UTC [gossip.gossip] handleMessage -> DEBU 2e47 Exiting" +"2019-09-24 00:25:59.724 UTC [gossip.comm] func1 -> DEBU 2e48 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.724 UTC [gossip.gossip] handleMessage -> DEBU 2e49 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.724 UTC [gossip.pull] HandleMessage -> DEBU 2e4a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.724 UTC [gossip.gossip] handleMessage -> DEBU 2e4b Exiting" +"2019-09-24 00:25:59.754 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e4c Obtaining default signing identity" +"2019-09-24 00:25:59.754 UTC [msp.identity] Sign -> DEBU 2e4d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102E " +"2019-09-24 00:25:59.754 UTC [msp.identity] Sign -> DEBU 2e4e Sign: digest: 67878D56978A5C483BDE9E0DB761F10D5B0A420BEF74FF25A2C095912C090C69 " +"2019-09-24 00:25:59.754 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e4f Obtaining default signing identity" +"2019-09-24 00:25:59.755 UTC [msp.identity] Sign -> DEBU 2e50 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:25:59.755 UTC [msp.identity] Sign -> DEBU 2e51 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:25:59.755 UTC [gossip.comm] Send -> DEBU 2e52 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:59.755 UTC [msp] DeserializeIdentity -> DEBU 2e53 Obtaining identity" +"2019-09-24 00:25:59.755 UTC [gossip.comm] Send -> DEBU 2e54 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:59.755 UTC [msp] DeserializeIdentity -> DEBU 2e55 Obtaining identity" +"2019-09-24 00:25:59.755 UTC [gossip.comm] Send -> DEBU 2e56 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:59.755 UTC [gossip.comm] sendToEndpoint -> DEBU 2e57 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.755 UTC [gossip.comm] sendToEndpoint -> DEBU 2e58 Exiting" +"2019-09-24 00:25:59.756 UTC [gossip.comm] sendToEndpoint -> DEBU 2e59 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.756 UTC [gossip.comm] sendToEndpoint -> DEBU 2e5a Exiting" +"2019-09-24 00:25:59.756 UTC [gossip.comm] sendToEndpoint -> DEBU 2e5b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.756 UTC [gossip.comm] sendToEndpoint -> DEBU 2e5c Exiting" +"2019-09-24 00:25:59.767 UTC [gossip.comm] func1 -> DEBU 2e5d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.767 UTC [gossip.gossip] handleMessage -> DEBU 2e5e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.767 UTC [gossip.gossip] handleMessage -> DEBU 2e5f Exiting" +"2019-09-24 00:25:59.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e60 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.767 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e61 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:59.767 UTC [msp.identity] Verify -> DEBU 2e62 Verify: digest = 00000000 67 87 8d 56 97 8a 5c 48 3b de 9e 0d b7 61 f1 0d |g..V..\H;....a..| +00000010 5b 0a 42 0b ef 74 ff 25 a2 c0 95 91 2c 09 0c 69 |[.B..t.%....,..i|" +"2019-09-24 00:25:59.768 UTC [msp.identity] Verify -> DEBU 2e63 Verify: sig = 00000000 30 44 02 20 27 5b 49 f4 a1 e1 28 7f c0 94 c5 d5 |0D. '[I...(.....| +00000010 99 8b 02 85 33 21 53 8f a2 4f ef f3 9f 6f f2 53 |....3!S..O...o.S| +00000020 8f 96 de 2c 02 20 1a 69 d6 dd f3 39 9a b5 47 fe |...,. .i...9..G.| +00000030 61 ee 3c 11 64 ce 6d 17 d8 22 b1 cf 14 27 f6 00 |a.<.d.m.."...'..| +00000040 f2 25 0c df 7e f8 |.%..~.|" +"2019-09-24 00:25:59.768 UTC [msp.identity] Verify -> DEBU 2e64 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:25:59.768 UTC [msp.identity] Verify -> DEBU 2e65 Verify: sig = 00000000 30 45 02 21 00 ff f7 9f cb 30 8b ad 2e 4d f2 d9 |0E.!.....0...M..| +00000010 90 52 f8 1b f0 7e 41 46 4a a7 09 2a 8e b1 0d 5d |.R...~AFJ..*...]| +00000020 73 bb d8 75 0e 02 20 38 ef 2b 38 38 11 42 e6 74 |s..u.. 8.+88.B.t| +00000030 35 00 98 19 f3 e8 64 2c 65 2f 31 3c 03 ca 14 f5 |5.....d,e/1<....| +00000040 a2 cf a4 47 7e 83 17 |...G~..|" +"2019-09-24 00:25:59.768 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e66 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:59.768 UTC [gossip.discovery] isSentByMe -> DEBU 2e67 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:25:59.768 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e68 Exiting" +"2019-09-24 00:25:59.768 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e69 Exiting" +"2019-09-24 00:25:59.768 UTC [gossip.gossip] handleMessage -> DEBU 2e6a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.768 UTC [gossip.gossip] handleMessage -> DEBU 2e6b Exiting" +"2019-09-24 00:25:59.768 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e6c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.768 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e6d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:59.769 UTC [msp.identity] Verify -> DEBU 2e6e Verify: digest = 00000000 67 87 8d 56 97 8a 5c 48 3b de 9e 0d b7 61 f1 0d |g..V..\H;....a..| +00000010 5b 0a 42 0b ef 74 ff 25 a2 c0 95 91 2c 09 0c 69 |[.B..t.%....,..i|" +"2019-09-24 00:25:59.769 UTC [msp.identity] Verify -> DEBU 2e6f Verify: sig = 00000000 30 44 02 20 27 5b 49 f4 a1 e1 28 7f c0 94 c5 d5 |0D. '[I...(.....| +00000010 99 8b 02 85 33 21 53 8f a2 4f ef f3 9f 6f f2 53 |....3!S..O...o.S| +00000020 8f 96 de 2c 02 20 1a 69 d6 dd f3 39 9a b5 47 fe |...,. .i...9..G.| +00000030 61 ee 3c 11 64 ce 6d 17 d8 22 b1 cf 14 27 f6 00 |a.<.d.m.."...'..| +00000040 f2 25 0c df 7e f8 |.%..~.|" +"2019-09-24 00:25:59.769 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e70 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.769 UTC [gossip.discovery] isSentByMe -> DEBU 2e71 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.769 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e72 Exiting" +"2019-09-24 00:25:59.769 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e73 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:25:59.769 UTC [msp] DeserializeIdentity -> DEBU 2e74 Obtaining identity" +"2019-09-24 00:25:59.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:59.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e76 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:59.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e77 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:59.769 UTC [policies] Evaluate -> DEBU 2e78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:59.769 UTC [policies] Evaluate -> DEBU 2e79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:59.769 UTC [policies] Evaluate -> DEBU 2e7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:59.769 UTC [cauthdsl] func1 -> DEBU 2e7b 0xc004ddd720 gate 1569284759769864500 evaluation starts" +"2019-09-24 00:25:59.769 UTC [cauthdsl] func2 -> DEBU 2e7c 0xc004ddd720 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:59.769 UTC [cauthdsl] func2 -> DEBU 2e7d 0xc004ddd720 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e7e 0xc004ddd720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e7f 0xc004ddd720 principal evaluation fails" +"2019-09-24 00:25:59.770 UTC [cauthdsl] func1 -> DEBU 2e80 0xc004ddd720 gate 1569284759769864500 evaluation fails" +"2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e81 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:59.770 UTC [cauthdsl] func1 -> DEBU 2e84 0xc004dddf60 gate 1569284759770249600 evaluation starts" +"2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e85 0xc004dddf60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e86 0xc004dddf60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e87 0xc004dddf60 principal matched by identity 0" +"2019-09-24 00:25:59.770 UTC [msp.identity] Verify -> DEBU 2e88 Verify: digest = 00000000 f0 3c 4b 80 f4 27 51 e3 4a 76 d1 55 5a 13 83 ee |. DEBU 2e89 Verify: sig = 00000000 30 44 02 20 07 20 62 0f 6f b3 71 fe a9 1f db 29 |0D. . b.o.q....)| +00000010 c8 24 69 df df 58 3a 1f 51 51 bd cb be 64 c4 e2 |.$i..X:.QQ...d..| +00000020 97 f7 bb 26 02 20 2c 39 21 ba 32 83 f4 30 fd 69 |...&. ,9!.2..0.i| +00000030 a5 a2 c7 cb e1 60 84 f4 a5 2c 09 de 17 fe 0b 0d |.....`...,......| +00000040 33 c0 48 95 0a bf |3.H...|" +"2019-09-24 00:25:59.770 UTC [cauthdsl] func2 -> DEBU 2e8a 0xc004dddf60 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:59.770 UTC [cauthdsl] func1 -> DEBU 2e8b 0xc004dddf60 gate 1569284759770249600 evaluation succeeds" +"2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e8e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:59.770 UTC [policies] Evaluate -> DEBU 2e8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:59.770 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e90 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.770 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e91 Exiting" +"2019-09-24 00:25:59.770 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e92 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:59.770 UTC [msp.identity] Verify -> DEBU 2e93 Verify: digest = 00000000 46 4b a1 80 cb 54 af d2 11 34 2e fd 0f 4b 32 d2 |FK...T...4...K2.| +00000010 eb 5a 35 af a8 d5 37 7f 42 aa 39 a7 f3 e3 18 aa |.Z5...7.B.9.....|" +"2019-09-24 00:25:59.770 UTC [msp.identity] Verify -> DEBU 2e94 Verify: sig = 00000000 30 44 02 20 13 55 13 f2 31 f6 11 79 69 94 91 23 |0D. .U..1..yi..#| +00000010 a9 81 5d e6 32 23 5b f9 70 1d 00 04 12 1e 29 53 |..].2#[.p.....)S| +00000020 b2 8b 91 53 02 20 52 c9 7c 65 af 44 ca 76 71 28 |...S. R.|e.D.vq(| +00000030 43 c0 1b 78 6b 1a aa 3f ef 8f 4e e5 38 e8 fc 4c |C..xk..?..N.8..L| +00000040 03 7f 20 16 68 e0 |.. .h.|" +"2019-09-24 00:25:59.771 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e95 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.771 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e96 Exiting" +"2019-09-24 00:25:59.771 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e97 Exiting" +"2019-09-24 00:25:59.771 UTC [gossip.comm] func1 -> DEBU 2e98 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.771 UTC [gossip.gossip] handleMessage -> DEBU 2e99 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.771 UTC [gossip.gossip] handleMessage -> DEBU 2e9a Exiting" +"2019-09-24 00:25:59.771 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e9b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.771 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e9c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:25:59.771 UTC [msp.identity] Verify -> DEBU 2e9d Verify: digest = 00000000 67 87 8d 56 97 8a 5c 48 3b de 9e 0d b7 61 f1 0d |g..V..\H;....a..| +00000010 5b 0a 42 0b ef 74 ff 25 a2 c0 95 91 2c 09 0c 69 |[.B..t.%....,..i|" +"2019-09-24 00:25:59.771 UTC [msp.identity] Verify -> DEBU 2e9e Verify: sig = 00000000 30 44 02 20 27 5b 49 f4 a1 e1 28 7f c0 94 c5 d5 |0D. '[I...(.....| +00000010 99 8b 02 85 33 21 53 8f a2 4f ef f3 9f 6f f2 53 |....3!S..O...o.S| +00000020 8f 96 de 2c 02 20 1a 69 d6 dd f3 39 9a b5 47 fe |...,. .i...9..G.| +00000030 61 ee 3c 11 64 ce 6d 17 d8 22 b1 cf 14 27 f6 00 |a.<.d.m.."...'..| +00000040 f2 25 0c df 7e f8 |.%..~.|" +"2019-09-24 00:25:59.771 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e9f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.771 UTC [gossip.discovery] isSentByMe -> DEBU 2ea0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.771 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ea1 Exiting" +"2019-09-24 00:25:59.771 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ea2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:59.771 UTC [msp] DeserializeIdentity -> DEBU 2ea3 Obtaining identity" +"2019-09-24 00:25:59.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ea4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:59.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ea5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:59.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ea6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2ea7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2ea8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2ea9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func1 -> DEBU 2eaa 0xc004e09390 gate 1569284759772163300 evaluation starts" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eab 0xc004e09390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eac 0xc004e09390 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2ead 0xc004e09390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eae 0xc004e09390 principal evaluation fails" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func1 -> DEBU 2eaf 0xc004e09390 gate 1569284759772163300 evaluation fails" +"2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2eb0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2eb1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:59.772 UTC [policies] Evaluate -> DEBU 2eb2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func1 -> DEBU 2eb3 0xc004e09bd0 gate 1569284759772585600 evaluation starts" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eb4 0xc004e09bd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eb5 0xc004e09bd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eb6 0xc004e09bd0 principal matched by identity 0" +"2019-09-24 00:25:59.772 UTC [msp.identity] Verify -> DEBU 2eb7 Verify: digest = 00000000 85 ea 17 dd 77 a1 ca e3 45 dc 76 20 67 f1 4b 72 |....w...E.v g.Kr| +00000010 b2 31 3e 97 63 e8 e6 e4 51 0b 8d 47 e5 48 be 28 |.1>.c...Q..G.H.(|" +"2019-09-24 00:25:59.772 UTC [msp.identity] Verify -> DEBU 2eb8 Verify: sig = 00000000 30 44 02 20 08 2e 17 82 08 54 b1 09 9d 5c 85 d8 |0D. .....T...\..| +00000010 50 b9 5f fb 2c fb 38 9e f4 56 7c b4 b0 5c 16 a5 |P._.,.8..V|..\..| +00000020 48 ea 2d 51 02 20 69 2f 2b 3f 41 b5 dd 4e 19 4c |H.-Q. i/+?A..N.L| +00000030 f9 47 c1 6c 48 63 57 86 fa 84 83 4f b7 21 9a fd |.G.lHcW....O.!..| +00000040 27 6c cb 90 79 3c |'l..y<|" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func2 -> DEBU 2eb9 0xc004e09bd0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:59.772 UTC [cauthdsl] func1 -> DEBU 2eba 0xc004e09bd0 gate 1569284759772585600 evaluation succeeds" +"2019-09-24 00:25:59.773 UTC [policies] Evaluate -> DEBU 2ebb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:59.773 UTC [policies] Evaluate -> DEBU 2ebc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:59.773 UTC [policies] Evaluate -> DEBU 2ebd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:59.773 UTC [policies] Evaluate -> DEBU 2ebe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:59.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ebf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ec0 Exiting" +"2019-09-24 00:25:59.773 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ec1 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:25:59.773 UTC [msp.identity] Verify -> DEBU 2ec2 Verify: digest = 00000000 46 4b a1 80 cb 54 af d2 11 34 2e fd 0f 4b 32 d2 |FK...T...4...K2.| +00000010 eb 5a 35 af a8 d5 37 7f 42 aa 39 a7 f3 e3 18 aa |.Z5...7.B.9.....|" +"2019-09-24 00:25:59.773 UTC [msp.identity] Verify -> DEBU 2ec3 Verify: sig = 00000000 30 44 02 20 13 55 13 f2 31 f6 11 79 69 94 91 23 |0D. .U..1..yi..#| +00000010 a9 81 5d e6 32 23 5b f9 70 1d 00 04 12 1e 29 53 |..].2#[.p.....)S| +00000020 b2 8b 91 53 02 20 52 c9 7c 65 af 44 ca 76 71 28 |...S. R.|e.D.vq(| +00000030 43 c0 1b 78 6b 1a aa 3f ef 8f 4e e5 38 e8 fc 4c |C..xk..?..N.8..L| +00000040 03 7f 20 16 68 e0 |.. .h.|" +"2019-09-24 00:25:59.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ec4 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ec5 Exiting" +"2019-09-24 00:25:59.773 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ec6 Exiting" +"2019-09-24 00:25:59.950 UTC [gossip.gossip] handleMessage -> DEBU 2ec7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.950 UTC [gossip.pull] HandleMessage -> DEBU 2ec8 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2ec9 Obtaining identity" +"2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2eca Obtaining identity" +"2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2ecb Obtaining identity" +"2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2ecc Obtaining identity" +"2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2ecd Obtaining identity" +"2019-09-24 00:25:59.950 UTC [msp] DeserializeIdentity -> DEBU 2ece Obtaining identity" +"2019-09-24 00:25:59.951 UTC [gossip.pull] SendDigest -> DEBU 2ecf Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:25:59.951 UTC [gossip.gossip] handleMessage -> DEBU 2ed0 Exiting" +"2019-09-24 00:25:59.975 UTC [gossip.gossip] handleMessage -> DEBU 2ed1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\020\362D\355\242\352\r\223\355\223\300\346\223\252\345\234\036\2031\007\002 j\36172(\200\242\324\221*k\"\022\3203\020\2510!]\316\234\272\234\323wj\203\202\276<\275" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.975 UTC [gossip.gossip] handleMessage -> DEBU 2ed2 Exiting" +"2019-09-24 00:25:59.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ed3 Got message: GossipMessage: tag:EMPTY mem_req:\020\362D\355\242\352\r\223\355\223\300\346\223\252\345\234\036\2031\007\002 j\36172(\200\242\324\221*k\"\022\3203\020\2510!]\316\234\272\234\323wj\203\202\276<\275" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ed4 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:59.975 UTC [msp] DeserializeIdentity -> DEBU 2ed5 Obtaining identity" +"2019-09-24 00:25:59.975 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ed6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:59.975 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ed7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:59.975 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ed8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:59.975 UTC [policies] Evaluate -> DEBU 2ed9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:59.975 UTC [policies] Evaluate -> DEBU 2eda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:59.975 UTC [policies] Evaluate -> DEBU 2edb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:59.975 UTC [cauthdsl] func1 -> DEBU 2edc 0xc004e3a390 gate 1569284759975873100 evaluation starts" +"2019-09-24 00:25:59.975 UTC [cauthdsl] func2 -> DEBU 2edd 0xc004e3a390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:59.975 UTC [cauthdsl] func2 -> DEBU 2ede 0xc004e3a390 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2edf 0xc004e3a390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2ee0 0xc004e3a390 principal evaluation fails" +"2019-09-24 00:25:59.976 UTC [cauthdsl] func1 -> DEBU 2ee1 0xc004e3a390 gate 1569284759975873100 evaluation fails" +"2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2ee2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2ee3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2ee4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:59.976 UTC [cauthdsl] func1 -> DEBU 2ee5 0xc004e3abd0 gate 1569284759976274100 evaluation starts" +"2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2ee6 0xc004e3abd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2ee7 0xc004e3abd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2ee8 0xc004e3abd0 principal matched by identity 0" +"2019-09-24 00:25:59.976 UTC [msp.identity] Verify -> DEBU 2ee9 Verify: digest = 00000000 cd 81 d3 27 c2 e2 ff 95 34 6b fc 0c c7 52 e4 c0 |...'....4k...R..| +00000010 f2 6b 64 cd df 4b db 3d 88 35 8c 67 51 ab e0 1c |.kd..K.=.5.gQ...|" +"2019-09-24 00:25:59.976 UTC [msp.identity] Verify -> DEBU 2eea Verify: sig = 00000000 30 44 02 20 34 95 97 6c 8a d5 67 43 bc f4 d3 3e |0D. 4..l..gC...>| +00000010 10 f2 44 ed a2 ea 0d 93 ed 93 c0 e6 93 aa e5 9c |..D.............| +00000020 1e 83 31 07 02 20 6a f1 37 32 28 80 a2 d4 91 2a |..1.. j.72(....*| +00000030 6b 22 12 d0 33 10 a9 30 21 5d ce 9c ba 9c d3 77 |k"..3..0!].....w| +00000040 6a 83 82 be 3c bd |j...<.|" +"2019-09-24 00:25:59.976 UTC [cauthdsl] func2 -> DEBU 2eeb 0xc004e3abd0 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:59.976 UTC [cauthdsl] func1 -> DEBU 2eec 0xc004e3abd0 gate 1569284759976274100 evaluation succeeds" +"2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2eed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2eee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2eef Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:59.976 UTC [policies] Evaluate -> DEBU 2ef0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:59.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ef1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:25:59.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ef2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:25:59.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ef3 updating membership: timestamp: " +"2019-09-24 00:25:59.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ef4 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:59.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ef5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:25:59.981 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ef6 Exiting" +"2019-09-24 00:25:59.981 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ef7 Exiting" +"2019-09-24 00:25:59.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ef8 Exiting" +"2019-09-24 00:25:59.981 UTC [gossip.discovery] sendMemResponse -> DEBU 2ef9 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:25:59.981 UTC [msp] DeserializeIdentity -> DEBU 2efa Obtaining identity" +"2019-09-24 00:25:59.981 UTC [msp] DeserializeIdentity -> DEBU 2efb Obtaining identity" +"2019-09-24 00:25:59.981 UTC [msp] DeserializeIdentity -> DEBU 2efc Obtaining identity" +"2019-09-24 00:25:59.981 UTC [gossip.comm] Send -> DEBU 2efd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:25:59.981 UTC [gossip.discovery] sendMemResponse -> DEBU 2efe Exiting, replying with alive:\020\362D\355\242\352\r\223\355\223\300\346\223\252\345\234\036\2031\007\002 j\36172(\200\242\324\221*k\"\022\3203\020\2510!]\316\234\272\234\323wj\203\202\276<\275" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" > alive: alive: " +"2019-09-24 00:25:59.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2eff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:25:59.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2f00 Exiting" +"2019-09-24 00:25:59.986 UTC [gossip.gossip] handleMessage -> DEBU 2f01 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:59.986 UTC [gossip.gossip] handleMessage -> DEBU 2f02 Exiting" +"2019-09-24 00:25:59.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f03 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:59.986 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f04 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:25:59.986 UTC [msp] DeserializeIdentity -> DEBU 2f05 Obtaining identity" +"2019-09-24 00:25:59.987 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:25:59.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f07 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:59.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f08 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:25:59.987 UTC [cauthdsl] func1 -> DEBU 2f0c 0xc004dadd00 gate 1569284759987288000 evaluation starts" +"2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f0d 0xc004dadd00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f0e 0xc004dadd00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f0f 0xc004dadd00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f10 0xc004dadd00 principal evaluation fails" +"2019-09-24 00:25:59.987 UTC [cauthdsl] func1 -> DEBU 2f11 0xc004dadd00 gate 1569284759987288000 evaluation fails" +"2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f12 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:25:59.987 UTC [policies] Evaluate -> DEBU 2f14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:25:59.987 UTC [cauthdsl] func1 -> DEBU 2f15 0xc004e6e540 gate 1569284759987664200 evaluation starts" +"2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f16 0xc004e6e540 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:25:59.987 UTC [cauthdsl] func2 -> DEBU 2f17 0xc004e6e540 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:25:59.993 UTC [cauthdsl] func2 -> DEBU 2f18 0xc004e6e540 principal matched by identity 0" +"2019-09-24 00:25:59.993 UTC [msp.identity] Verify -> DEBU 2f19 Verify: digest = 00000000 0e 31 1f 42 69 46 42 22 c3 4e 61 36 d5 09 c4 7f |.1.BiFB".Na6....| +00000010 81 dd 2f cb 91 d9 63 5c 0b 29 fe 00 d1 d4 a0 95 |../...c\.)......|" +"2019-09-24 00:25:59.993 UTC [msp.identity] Verify -> DEBU 2f1a Verify: sig = 00000000 30 45 02 21 00 bd ee 35 f4 a4 e4 23 04 28 2e f3 |0E.!...5...#.(..| +00000010 1f 3c 09 b5 14 98 d3 c2 55 1e c3 27 af 05 82 9b |.<......U..'....| +00000020 4e 82 80 7c 8e 02 20 4f b3 a7 a2 e6 f9 fb d3 d8 |N..|.. O........| +00000030 2f 9e d5 da 41 85 c8 04 e6 83 bf 8c a7 f7 55 94 |/...A.........U.| +00000040 30 3a ed b9 38 78 05 |0:..8x.|" +"2019-09-24 00:25:59.993 UTC [cauthdsl] func2 -> DEBU 2f1b 0xc004e6e540 principal evaluation succeeds for identity 0" +"2019-09-24 00:25:59.993 UTC [cauthdsl] func1 -> DEBU 2f1c 0xc004e6e540 gate 1569284759987664200 evaluation succeeds" +"2019-09-24 00:25:59.993 UTC [policies] Evaluate -> DEBU 2f1d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:59.993 UTC [policies] Evaluate -> DEBU 2f1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:25:59.993 UTC [policies] Evaluate -> DEBU 2f1f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:25:59.993 UTC [policies] Evaluate -> DEBU 2f20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:25:59.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f21 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:25:59.993 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f22 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:25:59.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f23 updating membership: timestamp: " +"2019-09-24 00:25:59.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f24 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:25:59.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f25 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:00.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f26 Exiting" +"2019-09-24 00:26:00.001 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f27 Exiting" +"2019-09-24 00:26:00.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f28 Exiting" +"2019-09-24 00:26:00.003 UTC [msp] DeserializeIdentity -> DEBU 2f29 Obtaining identity" +"2019-09-24 00:26:00.003 UTC [msp] DeserializeIdentity -> DEBU 2f2a Obtaining identity" +"2019-09-24 00:26:00.003 UTC [msp] DeserializeIdentity -> DEBU 2f2b Obtaining identity" +"2019-09-24 00:26:00.003 UTC [msp] DeserializeIdentity -> DEBU 2f2c Obtaining identity" +"2019-09-24 00:26:00.003 UTC [msp] DeserializeIdentity -> DEBU 2f2d Obtaining identity" +"2019-09-24 00:26:00.004 UTC [msp] DeserializeIdentity -> DEBU 2f2e Obtaining identity" +"2019-09-24 00:26:00.004 UTC [gossip.comm] Send -> DEBU 2f2f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:00.004 UTC [msp] DeserializeIdentity -> DEBU 2f30 Obtaining identity" +"2019-09-24 00:26:00.004 UTC [msp] DeserializeIdentity -> DEBU 2f31 Obtaining identity" +"2019-09-24 00:26:00.004 UTC [gossip.comm] Send -> DEBU 2f32 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:00.004 UTC [gossip.comm] sendToEndpoint -> DEBU 2f33 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:00.004 UTC [gossip.comm] sendToEndpoint -> DEBU 2f34 Exiting" +"2019-09-24 00:26:00.005 UTC [gossip.comm] sendToEndpoint -> DEBU 2f35 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:00.005 UTC [gossip.comm] sendToEndpoint -> DEBU 2f36 Exiting" +"2019-09-24 00:26:00.012 UTC [gossip.comm] func1 -> DEBU 2f37 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:00.014 UTC [gossip.comm] func1 -> DEBU 2f38 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:00.014 UTC [gossip.gossip] handleMessage -> DEBU 2f39 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:00.015 UTC [gossip.gossip] handleMessage -> DEBU 2f3a Exiting" +"2019-09-24 00:26:00.015 UTC [gossip.gossip] handleMessage -> DEBU 2f3b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:00.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f3c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:00.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f3d Exiting" +"2019-09-24 00:26:00.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f3e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:00.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f3f Exiting" +"2019-09-24 00:26:00.015 UTC [gossip.gossip] handleMessage -> DEBU 2f40 Exiting" +"2019-09-24 00:26:00.159 UTC [msp] DeserializeIdentity -> DEBU 2f41 Obtaining identity" +"2019-09-24 00:26:00.160 UTC [msp] DeserializeIdentity -> DEBU 2f42 Obtaining identity" +"2019-09-24 00:26:00.160 UTC [gossip.comm] Send -> DEBU 2f43 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f44 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f45 Exiting" +"2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f46 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f47 Exiting" +"2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f48 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.160 UTC [gossip.comm] sendToEndpoint -> DEBU 2f49 Exiting" +"2019-09-24 00:26:00.172 UTC [gossip.comm] func1 -> DEBU 2f4a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.173 UTC [gossip.gossip] handleMessage -> DEBU 2f4b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.173 UTC [msp] DeserializeIdentity -> DEBU 2f4c Obtaining identity" +"2019-09-24 00:26:00.173 UTC [msp] DeserializeIdentity -> DEBU 2f4d Obtaining identity" +"2019-09-24 00:26:00.173 UTC [msp] DeserializeIdentity -> DEBU 2f4e Obtaining identity" +"2019-09-24 00:26:00.173 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f4f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:00.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f50 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f51 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f52 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f53 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:00.173 UTC [cauthdsl] func1 -> DEBU 2f55 0xc003ffb1f0 gate 1569284760173528600 evaluation starts" +"2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f56 0xc003ffb1f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f57 0xc003ffb1f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f58 0xc003ffb1f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f59 0xc003ffb1f0 principal evaluation fails" +"2019-09-24 00:26:00.173 UTC [cauthdsl] func1 -> DEBU 2f5a 0xc003ffb1f0 gate 1569284760173528600 evaluation fails" +"2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f5b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.173 UTC [policies] Evaluate -> DEBU 2f5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:00.173 UTC [cauthdsl] func1 -> DEBU 2f5e 0xc003ffba30 gate 1569284760173785700 evaluation starts" +"2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f5f 0xc003ffba30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f60 0xc003ffba30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.173 UTC [cauthdsl] func2 -> DEBU 2f61 0xc003ffba30 principal matched by identity 0" +"2019-09-24 00:26:00.173 UTC [msp.identity] Verify -> DEBU 2f62 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:00.173 UTC [msp.identity] Verify -> DEBU 2f63 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:00.174 UTC [cauthdsl] func2 -> DEBU 2f64 0xc003ffba30 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:00.174 UTC [cauthdsl] func1 -> DEBU 2f65 0xc003ffba30 gate 1569284760173785700 evaluation succeeds" +"2019-09-24 00:26:00.174 UTC [policies] Evaluate -> DEBU 2f66 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.174 UTC [policies] Evaluate -> DEBU 2f67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.174 UTC [policies] Evaluate -> DEBU 2f68 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:00.174 UTC [policies] Evaluate -> DEBU 2f69 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:00.174 UTC [msp.identity] Verify -> DEBU 2f6a Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:00.174 UTC [msp.identity] Verify -> DEBU 2f6b Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:00.174 UTC [msp] DeserializeIdentity -> DEBU 2f6c Obtaining identity" +"2019-09-24 00:26:00.174 UTC [msp] DeserializeIdentity -> DEBU 2f6d Obtaining identity" +"2019-09-24 00:26:00.174 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:00.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f6f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f70 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.174 UTC [policies] Evaluate -> DEBU 2f71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:00.176 UTC [policies] Evaluate -> DEBU 2f72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:00.176 UTC [policies] Evaluate -> DEBU 2f73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:00.176 UTC [cauthdsl] func1 -> DEBU 2f74 0xc003f439d0 gate 1569284760176876400 evaluation starts" +"2019-09-24 00:26:00.177 UTC [cauthdsl] func2 -> DEBU 2f75 0xc003f439d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.177 UTC [cauthdsl] func2 -> DEBU 2f76 0xc003f439d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.177 UTC [cauthdsl] func2 -> DEBU 2f77 0xc003f439d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:00.177 UTC [cauthdsl] func2 -> DEBU 2f78 0xc003f439d0 principal evaluation fails" +"2019-09-24 00:26:00.177 UTC [cauthdsl] func1 -> DEBU 2f79 0xc003f439d0 gate 1569284760176876400 evaluation fails" +"2019-09-24 00:26:00.180 UTC [policies] Evaluate -> DEBU 2f7a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.180 UTC [policies] Evaluate -> DEBU 2f7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.180 UTC [policies] Evaluate -> DEBU 2f7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:00.181 UTC [cauthdsl] func1 -> DEBU 2f7d 0xc003f06300 gate 1569284760181130000 evaluation starts" +"2019-09-24 00:26:00.181 UTC [cauthdsl] func2 -> DEBU 2f7e 0xc003f06300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.181 UTC [cauthdsl] func2 -> DEBU 2f7f 0xc003f06300 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.181 UTC [cauthdsl] func2 -> DEBU 2f80 0xc003f06300 principal matched by identity 0" +"2019-09-24 00:26:00.181 UTC [msp.identity] Verify -> DEBU 2f81 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:00.182 UTC [msp.identity] Verify -> DEBU 2f82 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:00.182 UTC [cauthdsl] func2 -> DEBU 2f83 0xc003f06300 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:00.183 UTC [cauthdsl] func1 -> DEBU 2f84 0xc003f06300 gate 1569284760181130000 evaluation succeeds" +"2019-09-24 00:26:00.183 UTC [policies] Evaluate -> DEBU 2f85 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.183 UTC [policies] Evaluate -> DEBU 2f86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.183 UTC [policies] Evaluate -> DEBU 2f87 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:00.183 UTC [policies] Evaluate -> DEBU 2f88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:00.184 UTC [gossip.comm] func1 -> DEBU 2f89 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.186 UTC [msp.identity] Verify -> DEBU 2f8a Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:00.186 UTC [msp.identity] Verify -> DEBU 2f8b Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:00.186 UTC [gossip.gossip] handleMessage -> DEBU 2f8c Exiting" +"2019-09-24 00:26:00.186 UTC [gossip.gossip] handleMessage -> DEBU 2f8d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.186 UTC [msp] DeserializeIdentity -> DEBU 2f8e Obtaining identity" +"2019-09-24 00:26:00.186 UTC [msp] DeserializeIdentity -> DEBU 2f8f Obtaining identity" +"2019-09-24 00:26:00.186 UTC [msp] DeserializeIdentity -> DEBU 2f90 Obtaining identity" +"2019-09-24 00:26:00.187 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:00.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f92 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f93 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:00.187 UTC [cauthdsl] func1 -> DEBU 2f97 0xc003ed4540 gate 1569284760187323300 evaluation starts" +"2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2f98 0xc003ed4540 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2f99 0xc003ed4540 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2f9a 0xc003ed4540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2f9b 0xc003ed4540 principal evaluation fails" +"2019-09-24 00:26:00.187 UTC [cauthdsl] func1 -> DEBU 2f9c 0xc003ed4540 gate 1569284760187323300 evaluation fails" +"2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f9d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.187 UTC [policies] Evaluate -> DEBU 2f9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:00.187 UTC [cauthdsl] func1 -> DEBU 2fa0 0xc003ed4d80 gate 1569284760187732800 evaluation starts" +"2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2fa1 0xc003ed4d80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2fa2 0xc003ed4d80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.187 UTC [cauthdsl] func2 -> DEBU 2fa3 0xc003ed4d80 principal matched by identity 0" +"2019-09-24 00:26:00.187 UTC [msp.identity] Verify -> DEBU 2fa4 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:00.187 UTC [msp.identity] Verify -> DEBU 2fa5 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:00.188 UTC [cauthdsl] func2 -> DEBU 2fa6 0xc003ed4d80 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:00.188 UTC [cauthdsl] func1 -> DEBU 2fa7 0xc003ed4d80 gate 1569284760187732800 evaluation succeeds" +"2019-09-24 00:26:00.188 UTC [policies] Evaluate -> DEBU 2fa8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.188 UTC [policies] Evaluate -> DEBU 2fa9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.188 UTC [policies] Evaluate -> DEBU 2faa Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:00.188 UTC [policies] Evaluate -> DEBU 2fab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:00.188 UTC [msp.identity] Verify -> DEBU 2fac Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:00.188 UTC [msp.identity] Verify -> DEBU 2fad Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:00.189 UTC [msp.identity] Verify -> DEBU 2fae Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:00.189 UTC [msp.identity] Verify -> DEBU 2faf Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:00.189 UTC [msp] DeserializeIdentity -> DEBU 2fb0 Obtaining identity" +"2019-09-24 00:26:00.189 UTC [msp] DeserializeIdentity -> DEBU 2fb1 Obtaining identity" +"2019-09-24 00:26:00.189 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fb2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:00.189 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fb3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.189 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fb4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.189 UTC [policies] Evaluate -> DEBU 2fb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:00.189 UTC [policies] Evaluate -> DEBU 2fb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:00.189 UTC [policies] Evaluate -> DEBU 2fb7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:00.189 UTC [cauthdsl] func1 -> DEBU 2fb8 0xc003e8d610 gate 1569284760189754300 evaluation starts" +"2019-09-24 00:26:00.189 UTC [cauthdsl] func2 -> DEBU 2fb9 0xc003e8d610 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.193 UTC [cauthdsl] func2 -> DEBU 2fba 0xc003e8d610 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.194 UTC [cauthdsl] func2 -> DEBU 2fbb 0xc003e8d610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:00.194 UTC [cauthdsl] func2 -> DEBU 2fbc 0xc003e8d610 principal evaluation fails" +"2019-09-24 00:26:00.194 UTC [cauthdsl] func1 -> DEBU 2fbd 0xc003e8d610 gate 1569284760189754300 evaluation fails" +"2019-09-24 00:26:00.194 UTC [policies] Evaluate -> DEBU 2fbe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.195 UTC [policies] Evaluate -> DEBU 2fbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.195 UTC [policies] Evaluate -> DEBU 2fc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:00.195 UTC [cauthdsl] func1 -> DEBU 2fc1 0xc003e8de50 gate 1569284760195675200 evaluation starts" +"2019-09-24 00:26:00.196 UTC [cauthdsl] func2 -> DEBU 2fc2 0xc003e8de50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.196 UTC [cauthdsl] func2 -> DEBU 2fc3 0xc003e8de50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.196 UTC [cauthdsl] func2 -> DEBU 2fc4 0xc003e8de50 principal matched by identity 0" +"2019-09-24 00:26:00.196 UTC [msp.identity] Verify -> DEBU 2fc5 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:00.196 UTC [msp.identity] Verify -> DEBU 2fc6 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:00.197 UTC [cauthdsl] func2 -> DEBU 2fc7 0xc003e8de50 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:00.197 UTC [cauthdsl] func1 -> DEBU 2fc8 0xc003e8de50 gate 1569284760195675200 evaluation succeeds" +"2019-09-24 00:26:00.197 UTC [policies] Evaluate -> DEBU 2fc9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.197 UTC [policies] Evaluate -> DEBU 2fca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.198 UTC [policies] Evaluate -> DEBU 2fcb Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:00.198 UTC [policies] Evaluate -> DEBU 2fcc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:00.198 UTC [gossip.gossip] handleMessage -> DEBU 2fcd Exiting" +"2019-09-24 00:26:00.198 UTC [gossip.gossip] handleMessage -> DEBU 2fce Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.198 UTC [msp.identity] Verify -> DEBU 2fcf Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:00.198 UTC [msp.identity] Verify -> DEBU 2fd0 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:00.198 UTC [msp.identity] Verify -> DEBU 2fd1 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:00.198 UTC [msp.identity] Verify -> DEBU 2fd2 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:00.199 UTC [msp] DeserializeIdentity -> DEBU 2fd3 Obtaining identity" +"2019-09-24 00:26:00.199 UTC [msp] DeserializeIdentity -> DEBU 2fd4 Obtaining identity" +"2019-09-24 00:26:00.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fd5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:00.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fd6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fd7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fd8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fd9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fda == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func1 -> DEBU 2fdb 0xc003e407f0 gate 1569284760199315800 evaluation starts" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fdc 0xc003e407f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fdd 0xc003e407f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fde 0xc003e407f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fdf 0xc003e407f0 principal evaluation fails" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func1 -> DEBU 2fe0 0xc003e407f0 gate 1569284760199315800 evaluation fails" +"2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fe1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fe2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fe3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func1 -> DEBU 2fe4 0xc003e41030 gate 1569284760199564100 evaluation starts" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fe5 0xc003e41030 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fe6 0xc003e41030 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fe7 0xc003e41030 principal matched by identity 0" +"2019-09-24 00:26:00.199 UTC [msp.identity] Verify -> DEBU 2fe8 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:00.199 UTC [msp.identity] Verify -> DEBU 2fe9 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func2 -> DEBU 2fea 0xc003e41030 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:00.199 UTC [cauthdsl] func1 -> DEBU 2feb 0xc003e41030 gate 1569284760199564100 evaluation succeeds" +"2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.199 UTC [policies] Evaluate -> DEBU 2fee Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2fef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:00.200 UTC [msp] DeserializeIdentity -> DEBU 2ff0 Obtaining identity" +"2019-09-24 00:26:00.200 UTC [msp] DeserializeIdentity -> DEBU 2ff1 Obtaining identity" +"2019-09-24 00:26:00.200 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ff2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:00.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ff3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ff4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2ff5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2ff6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2ff7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func1 -> DEBU 2ff8 0xc003dacac0 gate 1569284760200363200 evaluation starts" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 2ff9 0xc003dacac0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 2ffa 0xc003dacac0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 2ffb 0xc003dacac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 2ffc 0xc003dacac0 principal evaluation fails" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func1 -> DEBU 2ffd 0xc003dacac0 gate 1569284760200363200 evaluation fails" +"2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2ffe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 2fff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 3000 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func1 -> DEBU 3001 0xc003dad300 gate 1569284760200601200 evaluation starts" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 3002 0xc003dad300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 3003 0xc003dad300 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 3004 0xc003dad300 principal matched by identity 0" +"2019-09-24 00:26:00.200 UTC [msp.identity] Verify -> DEBU 3005 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:00.200 UTC [msp.identity] Verify -> DEBU 3006 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func2 -> DEBU 3007 0xc003dad300 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:00.200 UTC [cauthdsl] func1 -> DEBU 3008 0xc003dad300 gate 1569284760200601200 evaluation succeeds" +"2019-09-24 00:26:00.200 UTC [policies] Evaluate -> DEBU 3009 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.201 UTC [policies] Evaluate -> DEBU 300a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.201 UTC [policies] Evaluate -> DEBU 300b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:00.201 UTC [policies] Evaluate -> DEBU 300c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:00.201 UTC [gossip.gossip] handleMessage -> DEBU 300d Exiting" +"2019-09-24 00:26:00.304 UTC [msp] DeserializeIdentity -> DEBU 300e Obtaining identity" +"2019-09-24 00:26:00.305 UTC [msp] DeserializeIdentity -> DEBU 300f Obtaining identity" +"2019-09-24 00:26:00.305 UTC [gossip.pull] Hello -> DEBU 3010 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:00.305 UTC [msp] DeserializeIdentity -> DEBU 3011 Obtaining identity" +"2019-09-24 00:26:00.305 UTC [msp] DeserializeIdentity -> DEBU 3012 Obtaining identity" +"2019-09-24 00:26:00.305 UTC [gossip.comm] Send -> DEBU 3013 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:00.306 UTC [gossip.comm] sendToEndpoint -> DEBU 3014 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.306 UTC [gossip.comm] sendToEndpoint -> DEBU 3015 Exiting" +"2019-09-24 00:26:00.317 UTC [gossip.comm] func1 -> DEBU 3016 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.317 UTC [gossip.gossip] handleMessage -> DEBU 3017 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.318 UTC [gossip.pull] HandleMessage -> DEBU 3018 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.318 UTC [gossip.gossip] handleMessage -> DEBU 3019 Exiting" +"2019-09-24 00:26:00.647 UTC [gossip.comm] func1 -> DEBU 301a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.647 UTC [gossip.gossip] handleMessage -> DEBU 301b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.647 UTC [msp] DeserializeIdentity -> DEBU 301c Obtaining identity" +"2019-09-24 00:26:00.647 UTC [msp] DeserializeIdentity -> DEBU 301d Obtaining identity" +"2019-09-24 00:26:00.647 UTC [gossip.gossip] handleMessage -> DEBU 301e Exiting" +"2019-09-24 00:26:00.703 UTC [gossip.comm] func1 -> DEBU 301f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.703 UTC [gossip.gossip] handleMessage -> DEBU 3020 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.703 UTC [gossip.gossip] handleMessage -> DEBU 3021 Exiting" +"2019-09-24 00:26:00.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3022 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.704 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3023 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:00.704 UTC [msp] DeserializeIdentity -> DEBU 3024 Obtaining identity" +"2019-09-24 00:26:00.704 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3025 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:00.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3026 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3027 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.705 UTC [policies] Evaluate -> DEBU 3028 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:00.705 UTC [policies] Evaluate -> DEBU 3029 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:00.705 UTC [policies] Evaluate -> DEBU 302a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:00.705 UTC [cauthdsl] func1 -> DEBU 302b 0xc003d3a6f0 gate 1569284760705342100 evaluation starts" +"2019-09-24 00:26:00.705 UTC [cauthdsl] func2 -> DEBU 302c 0xc003d3a6f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.705 UTC [cauthdsl] func2 -> DEBU 302d 0xc003d3a6f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.705 UTC [cauthdsl] func2 -> DEBU 302e 0xc003d3a6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:00.706 UTC [cauthdsl] func2 -> DEBU 302f 0xc003d3a6f0 principal evaluation fails" +"2019-09-24 00:26:00.720 UTC [cauthdsl] func1 -> DEBU 3033 0xc003d3a6f0 gate 1569284760705342100 evaluation fails" +"2019-09-24 00:26:00.720 UTC [policies] Evaluate -> DEBU 3034 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.720 UTC [policies] Evaluate -> DEBU 3035 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.720 UTC [policies] Evaluate -> DEBU 3036 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:00.720 UTC [cauthdsl] func1 -> DEBU 3037 0xc003d3af50 gate 1569284760720679200 evaluation starts" +"2019-09-24 00:26:00.720 UTC [cauthdsl] func2 -> DEBU 3038 0xc003d3af50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.720 UTC [cauthdsl] func2 -> DEBU 3039 0xc003d3af50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.720 UTC [cauthdsl] func2 -> DEBU 303a 0xc003d3af50 principal matched by identity 0" +"2019-09-24 00:26:00.720 UTC [msp.identity] Verify -> DEBU 303b Verify: digest = 00000000 c3 3a a3 2c fa 19 b7 75 21 af e2 6c 26 54 fa 72 |.:.,...u!..l&T.r| +00000010 47 c5 01 5d fb 53 ef 19 c5 3f 51 49 55 8d 5f a6 |G..].S...?QIU._.|" +"2019-09-24 00:26:00.720 UTC [msp.identity] Verify -> DEBU 303c Verify: sig = 00000000 30 44 02 20 7d 14 db 02 a6 7a 5b b4 e0 bc 7e 39 |0D. }....z[...~9| +00000010 cb 4d 93 2e 6d 3c 7d 3d a1 10 c8 1a bf be 4f b6 |.M..m<}=......O.| +00000020 85 69 b5 b7 02 20 3c f5 69 87 23 f9 ce b1 43 f3 |.i... <.i.#...C.| +00000030 d0 66 60 f0 ba ba 51 a8 67 7a d7 b0 9b 2b b9 98 |.f`...Q.gz...+..| +00000040 af 11 96 e0 2f 8a |..../.|" +"2019-09-24 00:26:00.721 UTC [cauthdsl] func2 -> DEBU 303d 0xc003d3af50 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:00.721 UTC [cauthdsl] func1 -> DEBU 303e 0xc003d3af50 gate 1569284760720679200 evaluation succeeds" +"2019-09-24 00:26:00.721 UTC [policies] Evaluate -> DEBU 303f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.721 UTC [policies] Evaluate -> DEBU 3040 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.722 UTC [policies] Evaluate -> DEBU 3041 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:00.722 UTC [policies] Evaluate -> DEBU 3042 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:00.722 UTC [gossip.discovery] handleAliveMessage -> DEBU 3043 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.722 UTC [gossip.discovery] learnExistingMembers -> DEBU 3044 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:00.722 UTC [gossip.discovery] learnExistingMembers -> DEBU 3045 updating membership: timestamp: " +"2019-09-24 00:26:00.722 UTC [gossip.discovery] learnExistingMembers -> DEBU 3046 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:00.722 UTC [gossip.discovery] learnExistingMembers -> DEBU 3047 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:00.723 UTC [gossip.discovery] learnExistingMembers -> DEBU 3048 Exiting" +"2019-09-24 00:26:00.723 UTC [gossip.discovery] handleAliveMessage -> DEBU 3049 Exiting" +"2019-09-24 00:26:00.723 UTC [gossip.discovery] handleMsgFromComm -> DEBU 304a Exiting" +"2019-09-24 00:26:00.709 UTC [gossip.comm] func1 -> DEBU 3030 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.715 UTC [gossip.gossip] handleMessage -> DEBU 3031 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.723 UTC [gossip.gossip] handleMessage -> DEBU 304b Exiting" +"2019-09-24 00:26:00.723 UTC [gossip.gossip] handleMessage -> DEBU 304c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.723 UTC [gossip.discovery] handleMsgFromComm -> DEBU 304d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.716 UTC [gossip.comm] func1 -> DEBU 3032 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.734 UTC [msp] DeserializeIdentity -> DEBU 304e Obtaining identity" +"2019-09-24 00:26:00.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 304f Exiting" +"2019-09-24 00:26:00.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3052 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3053 Exiting" +"2019-09-24 00:26:00.748 UTC [gossip.gossip] handleMessage -> DEBU 3054 Exiting" +"2019-09-24 00:26:00.748 UTC [gossip.gossip] handleMessage -> DEBU 3055 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.748 UTC [gossip.gossip] handleMessage -> DEBU 3056 Exiting" +"2019-09-24 00:26:00.748 UTC [gossip.comm] func1 -> DEBU 3050 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3057 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.748 UTC [gossip.gossip] handleMessage -> DEBU 3058 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.748 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3059 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:00.748 UTC [gossip.pull] HandleMessage -> DEBU 305a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.748 UTC [msp] DeserializeIdentity -> DEBU 305b Obtaining identity" +"2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 305c Obtaining identity" +"2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 305d Obtaining identity" +"2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 305e Obtaining identity" +"2019-09-24 00:26:00.749 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 305f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 3060 Obtaining identity" +"2019-09-24 00:26:00.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3061 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3062 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 3063 Obtaining identity" +"2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3064 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3065 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 3066 Obtaining identity" +"2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3067 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:00.749 UTC [cauthdsl] func1 -> DEBU 3068 0xc003d0fc00 gate 1569284760749346800 evaluation starts" +"2019-09-24 00:26:00.749 UTC [gossip.pull] SendDigest -> DEBU 3069 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 306a 0xc003d0fc00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.749 UTC [gossip.gossip] handleMessage -> DEBU 306b Exiting" +"2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 306c 0xc003d0fc00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.748 UTC [msp] DeserializeIdentity -> DEBU 3051 Obtaining identity" +"2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 306d 0xc003d0fc00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 306f 0xc003d0fc00 principal evaluation fails" +"2019-09-24 00:26:00.749 UTC [cauthdsl] func1 -> DEBU 3070 0xc003d0fc00 gate 1569284760749346800 evaluation fails" +"2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3071 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 306e Obtaining identity" +"2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3072 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:00.749 UTC [policies] Evaluate -> DEBU 3073 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:00.749 UTC [cauthdsl] func1 -> DEBU 3074 0xc003ce2440 gate 1569284760749838800 evaluation starts" +"2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 3075 Obtaining identity" +"2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 3076 0xc003ce2440 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 3077 0xc003ce2440 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:00.749 UTC [cauthdsl] func2 -> DEBU 3078 0xc003ce2440 principal matched by identity 0" +"2019-09-24 00:26:00.749 UTC [msp.identity] Verify -> DEBU 3079 Verify: digest = 00000000 da e3 e9 f4 4c 6f 1d d0 04 fa 0f 1e f9 31 cc 82 |....Lo.......1..| +00000010 7e 77 81 82 a3 52 83 cd ae 90 74 ac ec 9f cd c0 |~w...R....t.....|" +"2019-09-24 00:26:00.749 UTC [msp] DeserializeIdentity -> DEBU 307a Obtaining identity" +"2019-09-24 00:26:00.750 UTC [msp.identity] Verify -> DEBU 307b Verify: sig = 00000000 30 44 02 20 2c 89 28 2a 08 0a 94 7a cb c4 fa 34 |0D. ,.(*...z...4| +00000010 2a 64 8f 9b 37 c8 12 3a 17 5e d9 64 32 1d d4 a1 |*d..7..:.^.d2...| +00000020 a3 02 42 1f 02 20 23 16 96 4e 24 a5 72 1b 54 40 |..B.. #..N$.r.T@| +00000030 80 63 e0 ce 3d 4d 77 a0 83 97 3a 57 63 83 71 0b |.c..=Mw...:Wc.q.| +00000040 78 ae b7 6f 3a 46 |x..o:F|" +"2019-09-24 00:26:00.750 UTC [msp] DeserializeIdentity -> DEBU 307c Obtaining identity" +"2019-09-24 00:26:00.750 UTC [cauthdsl] func2 -> DEBU 307d 0xc003ce2440 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:00.750 UTC [cauthdsl] func1 -> DEBU 307e 0xc003ce2440 gate 1569284760749838800 evaluation succeeds" +"2019-09-24 00:26:00.750 UTC [policies] Evaluate -> DEBU 307f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.750 UTC [policies] Evaluate -> DEBU 3081 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:00.750 UTC [gossip.comm] Send -> DEBU 3080 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:00.750 UTC [policies] Evaluate -> DEBU 3082 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:00.750 UTC [policies] Evaluate -> DEBU 3083 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:00.750 UTC [msp] DeserializeIdentity -> DEBU 3084 Obtaining identity" +"2019-09-24 00:26:00.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 3085 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.750 UTC [msp] DeserializeIdentity -> DEBU 3086 Obtaining identity" +"2019-09-24 00:26:00.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 3087 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:00.750 UTC [gossip.comm] Send -> DEBU 3088 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:00.750 UTC [gossip.comm] sendToEndpoint -> DEBU 3089 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.750 UTC [gossip.comm] sendToEndpoint -> DEBU 308a Exiting" +"2019-09-24 00:26:00.750 UTC [gossip.comm] sendToEndpoint -> DEBU 308b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:00.750 UTC [gossip.comm] sendToEndpoint -> DEBU 308c Exiting" +"2019-09-24 00:26:00.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 308d updating membership: timestamp: " +"2019-09-24 00:26:00.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 308e Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:00.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 308f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:00.758 UTC [gossip.discovery] learnExistingMembers -> DEBU 3090 Exiting" +"2019-09-24 00:26:00.758 UTC [gossip.discovery] handleAliveMessage -> DEBU 3091 Exiting" +"2019-09-24 00:26:00.759 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3092 Exiting" +"2019-09-24 00:26:00.759 UTC [gossip.discovery] sendMemResponse -> DEBU 3093 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:00.759 UTC [msp] DeserializeIdentity -> DEBU 3094 Obtaining identity" +"2019-09-24 00:26:00.759 UTC [msp] DeserializeIdentity -> DEBU 3095 Obtaining identity" +"2019-09-24 00:26:00.759 UTC [msp] DeserializeIdentity -> DEBU 3096 Obtaining identity" +"2019-09-24 00:26:00.759 UTC [gossip.comm] Send -> DEBU 3097 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:00.760 UTC [gossip.discovery] sendMemResponse -> DEBU 3098 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0201" signature:"0D\002 \023U\023\3621\366\021yi\224\221#\251\201]\3462#[\371p\035\000\004\022\036)S\262\213\221S\002 R\311|e\257D\312vq(C\300\033xk\032\252?\357\217N\3458\350\374L\003\177 \026h\340" > alive: alive: alive: " +"2019-09-24 00:26:00.760 UTC [gossip.comm] sendToEndpoint -> DEBU 3099 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.760 UTC [gossip.comm] sendToEndpoint -> DEBU 309a Exiting" +"2019-09-24 00:26:00.849 UTC [gossip.comm] func1 -> DEBU 309b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.849 UTC [gossip.gossip] handleMessage -> DEBU 309c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.850 UTC [gossip.pull] HandleMessage -> DEBU 309d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:00.850 UTC [gossip.pull] SendDigest -> DEBU 309e Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:00.850 UTC [gossip.gossip] handleMessage -> DEBU 309f Exiting" +"2019-09-24 00:26:01.149 UTC [gossip.gossip] handleMessage -> DEBU 30a0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:01.149 UTC [msp] DeserializeIdentity -> DEBU 30a1 Obtaining identity" +"2019-09-24 00:26:01.149 UTC [msp] DeserializeIdentity -> DEBU 30a2 Obtaining identity" +"2019-09-24 00:26:01.150 UTC [msp] DeserializeIdentity -> DEBU 30a3 Obtaining identity" +"2019-09-24 00:26:01.150 UTC [gossip.gossip] handleMessage -> DEBU 30a4 Exiting" +"2019-09-24 00:26:01.685 UTC [gossip.comm] func1 -> DEBU 30a5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:01.685 UTC [gossip.gossip] handleMessage -> DEBU 30a6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:01.685 UTC [gossip.pull] HandleMessage -> DEBU 30a7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:01.685 UTC [gossip.pull] SendDigest -> DEBU 30a8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:01.685 UTC [gossip.gossip] handleMessage -> DEBU 30a9 Exiting" +"2019-09-24 00:26:01.758 UTC [gossip.comm] func1 -> DEBU 30aa Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0202" signature:"0D\002 \010\n\2729\357JK\347\350~\360(\272\260B\3661+o%F\031\313y\310\202\332\203XG0\245\002 F\306by\023\326\264a\372\374Ykj\227W\2560\022\344\350R\332\202\326y\033\3455Z\356\001\023" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:01.759 UTC [gossip.gossip] handleMessage -> DEBU 30ab Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0202" signature:"0D\002 \010\n\2729\357JK\347\350~\360(\272\260B\3661+o%F\031\313y\310\202\332\203XG0\245\002 F\306by\023\326\264a\372\374Ykj\227W\2560\022\344\350R\332\202\326y\033\3455Z\356\001\023" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:01.759 UTC [gossip.gossip] handleMessage -> DEBU 30ac Exiting" +"2019-09-24 00:26:01.759 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ad Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0202" signature:"0D\002 \010\n\2729\357JK\347\350~\360(\272\260B\3661+o%F\031\313y\310\202\332\203XG0\245\002 F\306by\023\326\264a\372\374Ykj\227W\2560\022\344\350R\332\202\326y\033\3455Z\356\001\023" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:01.759 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30ae Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:01.759 UTC [msp.identity] Verify -> DEBU 30af Verify: digest = 00000000 88 b4 e1 33 52 8c 5d 92 6c 0d 5d 81 93 7c 70 30 |...3R.].l.]..|p0| +00000010 fb cc 19 f6 b3 95 30 94 b7 31 fc 77 57 37 3b 1b |......0..1.wW7;.|" +"2019-09-24 00:26:01.759 UTC [msp.identity] Verify -> DEBU 30b0 Verify: sig = 00000000 30 44 02 20 08 0a ba 39 ef 4a 4b e7 e8 7e f0 28 |0D. ...9.JK..~.(| +00000010 ba b0 42 f6 31 2b 6f 25 46 19 cb 79 c8 82 da 83 |..B.1+o%F..y....| +00000020 58 47 30 a5 02 20 46 c6 62 79 13 d6 b4 61 fa fc |XG0.. F.by...a..| +00000030 59 6b 6a 97 57 ae 30 12 e4 e8 52 da 82 d6 79 1b |Ykj.W.0...R...y.| +00000040 e5 35 5a ee 01 13 |.5Z...|" +"2019-09-24 00:26:01.759 UTC [msp.identity] Verify -> DEBU 30b1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:01.759 UTC [msp.identity] Verify -> DEBU 30b2 Verify: sig = 00000000 30 44 02 20 5b 65 2f dc a7 fa d9 27 2e c1 45 11 |0D. [e/....'..E.| +00000010 7e 29 38 db 87 69 18 84 36 fb 7c f1 90 71 e5 cf |~)8..i..6.|..q..| +00000020 44 7e 0b 22 02 20 35 ca e0 4d 56 5b d0 be eb 75 |D~.". 5..MV[...u| +00000030 47 1c 25 13 99 5e df be 75 24 a6 10 19 34 da f0 |G.%..^..u$...4..| +00000040 78 fa 0b 53 c9 9f |x..S..|" +"2019-09-24 00:26:01.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 30b3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:01.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 30b4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:26:01.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 30b5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:01.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 30b6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:01.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 30b7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:01.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 30b8 Exiting" +"2019-09-24 00:26:01.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 30b9 Exiting" +"2019-09-24 00:26:01.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ba Exiting" +"2019-09-24 00:26:01.760 UTC [gossip.discovery] sendMemResponse -> DEBU 30bb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:01.760 UTC [msp] DeserializeIdentity -> DEBU 30bc Obtaining identity" +"2019-09-24 00:26:01.761 UTC [msp] DeserializeIdentity -> DEBU 30bd Obtaining identity" +"2019-09-24 00:26:01.761 UTC [gossip.comm] Send -> DEBU 30be Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:01.761 UTC [gossip.discovery] sendMemResponse -> DEBU 30bf Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0202" signature:"0D\002 \010\n\2729\357JK\347\350~\360(\272\260B\3661+o%F\031\313y\310\202\332\203XG0\245\002 F\306by\023\326\264a\372\374Ykj\227W\2560\022\344\350R\332\202\326y\033\3455Z\356\001\023" secret_envelope: > alive: " +"2019-09-24 00:26:01.761 UTC [gossip.comm] sendToEndpoint -> DEBU 30c0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:26:01.761 UTC [gossip.comm] sendToEndpoint -> DEBU 30c1 Exiting" +"2019-09-24 00:26:02.079 UTC [gossip.comm] func1 -> DEBU 30c2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:02.079 UTC [gossip.gossip] handleMessage -> DEBU 30c3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:02.079 UTC [msp] DeserializeIdentity -> DEBU 30c4 Obtaining identity" +"2019-09-24 00:26:02.079 UTC [msp] DeserializeIdentity -> DEBU 30c5 Obtaining identity" +"2019-09-24 00:26:02.079 UTC [msp] DeserializeIdentity -> DEBU 30c6 Obtaining identity" +"2019-09-24 00:26:02.080 UTC [gossip.gossip] handleMessage -> DEBU 30c7 Exiting" +"2019-09-24 00:26:02.328 UTC [gossip.election] waitForInterrupt -> DEBU 30c8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:02.328 UTC [gossip.election] IsLeader -> DEBU 30c9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:02.328 UTC [msp] GetDefaultSigningIdentity -> DEBU 30ca Obtaining default signing identity" +"2019-09-24 00:26:02.328 UTC [msp.identity] Sign -> DEBU 30cb Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315100E1801 " +"2019-09-24 00:26:02.328 UTC [msp.identity] Sign -> DEBU 30cc Sign: digest: EE5F537C8F7BCB3548FBA2FCA66168115B7E6D6E7417CD9DE4932F6CEA7B6AFB " +"2019-09-24 00:26:02.328 UTC [gossip.election] waitForInterrupt -> DEBU 30cd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:02.335 UTC [msp] DeserializeIdentity -> DEBU 30ce Obtaining identity" +"2019-09-24 00:26:02.336 UTC [msp] DeserializeIdentity -> DEBU 30cf Obtaining identity" +"2019-09-24 00:26:02.336 UTC [msp] DeserializeIdentity -> DEBU 30d0 Obtaining identity" +"2019-09-24 00:26:02.336 UTC [msp] DeserializeIdentity -> DEBU 30d1 Obtaining identity" +"2019-09-24 00:26:02.336 UTC [gossip.comm] Send -> DEBU 30d2 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:02.336 UTC [msp] DeserializeIdentity -> DEBU 30d3 Obtaining identity" +"2019-09-24 00:26:02.336 UTC [msp] DeserializeIdentity -> DEBU 30d4 Obtaining identity" +"2019-09-24 00:26:02.336 UTC [gossip.comm] sendToEndpoint -> DEBU 30d5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:26:02.336 UTC [gossip.comm] sendToEndpoint -> DEBU 30d6 Exiting" +"2019-09-24 00:26:02.684 UTC [gossip.comm] func1 -> DEBU 30d7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:02.684 UTC [gossip.gossip] handleMessage -> DEBU 30d8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:02.684 UTC [gossip.gossip] handleMessage -> DEBU 30d9 Exiting" +"2019-09-24 00:26:02.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30da Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:02.691 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30db Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:02.691 UTC [msp.identity] Verify -> DEBU 30dc Verify: digest = 00000000 f5 5d df 61 1c b3 37 0b 7f ae 79 e9 9a a4 50 de |.].a..7...y...P.| +00000010 40 54 ff dc f3 9e fd 9e 05 ea 25 05 05 b2 5f dc |@T........%..._.|" +"2019-09-24 00:26:02.691 UTC [msp.identity] Verify -> DEBU 30dd Verify: sig = 00000000 30 44 02 20 75 9d 99 e0 3e 21 30 70 ce 89 91 74 |0D. u...>!0p...t| +00000010 4b 1a 8c 55 f3 0b 1f 69 ad 29 20 ee 37 c7 60 c2 |K..U...i.) .7.`.| +00000020 85 03 fc 4c 02 20 09 96 38 71 07 2a 7e 77 f3 28 |...L. ..8q.*~w.(| +00000030 47 6b 44 62 22 18 fc e1 cd c8 8a 6f b5 d4 46 9c |GkDb"......o..F.| +00000040 35 d9 51 da fd cf |5.Q...|" +"2019-09-24 00:26:02.691 UTC [gossip.discovery] handleAliveMessage -> DEBU 30de Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:02.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 30df Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:02.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e0 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:02.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e1 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:02.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e2 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:02.691 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e3 Exiting" +"2019-09-24 00:26:02.691 UTC [gossip.discovery] handleAliveMessage -> DEBU 30e4 Exiting" +"2019-09-24 00:26:02.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30e5 Exiting" +"2019-09-24 00:26:02.693 UTC [gossip.gossip] handleMessage -> DEBU 30e6 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:02.693 UTC [gossip.gossip] handleMessage -> DEBU 30e7 Exiting" +"2019-09-24 00:26:02.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30e8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:02.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30e9 Exiting" +"2019-09-24 00:26:02.693 UTC [gossip.comm] func1 -> DEBU 30ea Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:02.693 UTC [gossip.gossip] handleMessage -> DEBU 30eb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:02.699 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ec Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:02.699 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ed Exiting" +"2019-09-24 00:26:02.699 UTC [gossip.gossip] handleMessage -> DEBU 30ee Exiting" +"2019-09-24 00:26:02.701 UTC [msp] DeserializeIdentity -> DEBU 30ef Obtaining identity" +"2019-09-24 00:26:02.701 UTC [msp] DeserializeIdentity -> DEBU 30f0 Obtaining identity" +"2019-09-24 00:26:02.701 UTC [msp] DeserializeIdentity -> DEBU 30f1 Obtaining identity" +"2019-09-24 00:26:02.701 UTC [gossip.comm] Send -> DEBU 30f2 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:02.701 UTC [msp] DeserializeIdentity -> DEBU 30f3 Obtaining identity" +"2019-09-24 00:26:02.701 UTC [gossip.comm] Send -> DEBU 30f4 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:02.701 UTC [gossip.comm] sendToEndpoint -> DEBU 30f5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:02.701 UTC [gossip.comm] sendToEndpoint -> DEBU 30f6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:02.701 UTC [gossip.comm] sendToEndpoint -> DEBU 30f7 Exiting" +"2019-09-24 00:26:02.701 UTC [gossip.comm] sendToEndpoint -> DEBU 30f8 Exiting" +"2019-09-24 00:26:03.711 UTC [gossip.pull] Hello -> DEBU 30f9 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:03.711 UTC [gossip.comm] Send -> DEBU 30fa Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:03.711 UTC [gossip.pull] Hello -> DEBU 30fb Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:03.711 UTC [gossip.comm] Send -> DEBU 30fc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:03.711 UTC [gossip.pull] Hello -> DEBU 30fd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:03.711 UTC [gossip.comm] Send -> DEBU 30fe Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 30ff Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 3100 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 3101 Exiting" +"2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 3102 Exiting" +"2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 3103 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 3104 Exiting" +"2019-09-24 00:26:03.712 UTC [gossip.gossip] handleMessage -> DEBU 3105 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.712 UTC [gossip.pull] HandleMessage -> DEBU 3106 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.712 UTC [gossip.gossip] handleMessage -> DEBU 3107 Exiting" +"2019-09-24 00:26:03.712 UTC [gossip.comm] func1 -> DEBU 3108 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.713 UTC [gossip.gossip] handleMessage -> DEBU 3109 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.713 UTC [gossip.pull] HandleMessage -> DEBU 310a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.713 UTC [gossip.gossip] handleMessage -> DEBU 310b Exiting" +"2019-09-24 00:26:03.713 UTC [gossip.comm] func1 -> DEBU 310c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.713 UTC [gossip.gossip] handleMessage -> DEBU 310d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.713 UTC [gossip.pull] HandleMessage -> DEBU 310e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.713 UTC [gossip.gossip] handleMessage -> DEBU 310f Exiting" +"2019-09-24 00:26:03.757 UTC [msp] GetDefaultSigningIdentity -> DEBU 3110 Obtaining default signing identity" +"2019-09-24 00:26:03.757 UTC [msp.identity] Sign -> DEBU 3111 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315102F " +"2019-09-24 00:26:03.757 UTC [msp.identity] Sign -> DEBU 3112 Sign: digest: 4E434998860597F8D97C2E5D8ADAB132D736BCBADF555A70F143F8117A8FD516 " +"2019-09-24 00:26:03.757 UTC [msp] GetDefaultSigningIdentity -> DEBU 3113 Obtaining default signing identity" +"2019-09-24 00:26:03.757 UTC [msp.identity] Sign -> DEBU 3114 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:03.757 UTC [msp.identity] Sign -> DEBU 3115 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:03.758 UTC [msp] DeserializeIdentity -> DEBU 3116 Obtaining identity" +"2019-09-24 00:26:03.758 UTC [gossip.comm] Send -> DEBU 3117 Entering, sending GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:03.758 UTC [gossip.comm] Send -> DEBU 3118 Entering, sending GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:03.758 UTC [msp] DeserializeIdentity -> DEBU 3119 Obtaining identity" +"2019-09-24 00:26:03.758 UTC [gossip.comm] Send -> DEBU 311a Entering, sending GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:03.758 UTC [gossip.comm] sendToEndpoint -> DEBU 311b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.758 UTC [gossip.comm] sendToEndpoint -> DEBU 311c Exiting" +"2019-09-24 00:26:03.758 UTC [gossip.comm] sendToEndpoint -> DEBU 311d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.759 UTC [gossip.comm] sendToEndpoint -> DEBU 311e Exiting" +"2019-09-24 00:26:03.759 UTC [gossip.comm] sendToEndpoint -> DEBU 311f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\037\330\254\002 \025\304\246\372\343\370\361\031\311h\022\345vd\214\315\236Y(\321\035\311\244\026+\324\030\000\342\016\365\034" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.759 UTC [gossip.comm] sendToEndpoint -> DEBU 3120 Exiting" +"2019-09-24 00:26:03.761 UTC [gossip.comm] func1 -> DEBU 3121 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.761 UTC [gossip.gossip] handleMessage -> DEBU 3122 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.761 UTC [gossip.gossip] handleMessage -> DEBU 3123 Exiting" +"2019-09-24 00:26:03.761 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3124 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.761 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3125 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:03.761 UTC [msp.identity] Verify -> DEBU 3126 Verify: digest = 00000000 4e 43 49 98 86 05 97 f8 d9 7c 2e 5d 8a da b1 32 |NCI......|.]...2| +00000010 d7 36 bc ba df 55 5a 70 f1 43 f8 11 7a 8f d5 16 |.6...UZp.C..z...|" +"2019-09-24 00:26:03.761 UTC [msp.identity] Verify -> DEBU 3127 Verify: sig = 00000000 30 45 02 21 00 93 f6 09 6b 6b 99 b9 b0 69 17 d9 |0E.!....kk...i..| +00000010 6d 24 bd bc 2e a6 77 46 5d 48 71 40 5c 72 6b a8 |m$....wF]Hq@\rk.| +00000020 c4 3e 1f d8 ac 02 20 15 c4 a6 fa e3 f8 f1 19 c9 |.>.... .........| +00000030 68 12 e5 76 64 8c cd 9e 59 28 d1 1d c9 a4 16 2b |h..vd...Y(.....+| +00000040 d4 18 00 e2 0e f5 1c |.......|" +"2019-09-24 00:26:03.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 3128 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:03.761 UTC [gossip.discovery] isSentByMe -> DEBU 3129 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:03.764 UTC [gossip.discovery] handleAliveMessage -> DEBU 312a Exiting" +"2019-09-24 00:26:03.764 UTC [gossip.discovery] handleMsgFromComm -> DEBU 312b Exiting" +"2019-09-24 00:26:03.764 UTC [gossip.gossip] handleMessage -> DEBU 312c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.764 UTC [gossip.gossip] handleMessage -> DEBU 312d Exiting" +"2019-09-24 00:26:03.764 UTC [gossip.discovery] handleMsgFromComm -> DEBU 312e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.765 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 312f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:03.765 UTC [msp.identity] Verify -> DEBU 3130 Verify: digest = 00000000 4e 43 49 98 86 05 97 f8 d9 7c 2e 5d 8a da b1 32 |NCI......|.]...2| +00000010 d7 36 bc ba df 55 5a 70 f1 43 f8 11 7a 8f d5 16 |.6...UZp.C..z...|" +"2019-09-24 00:26:03.765 UTC [msp.identity] Verify -> DEBU 3131 Verify: sig = 00000000 30 45 02 21 00 93 f6 09 6b 6b 99 b9 b0 69 17 d9 |0E.!....kk...i..| +00000010 6d 24 bd bc 2e a6 77 46 5d 48 71 40 5c 72 6b a8 |m$....wF]Hq@\rk.| +00000020 c4 3e 1f d8 ac 02 20 15 c4 a6 fa e3 f8 f1 19 c9 |.>.... .........| +00000030 68 12 e5 76 64 8c cd 9e 59 28 d1 1d c9 a4 16 2b |h..vd...Y(.....+| +00000040 d4 18 00 e2 0e f5 1c |.......|" +"2019-09-24 00:26:03.765 UTC [gossip.discovery] handleAliveMessage -> DEBU 3132 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:03.765 UTC [gossip.discovery] isSentByMe -> DEBU 3133 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:03.765 UTC [gossip.discovery] handleAliveMessage -> DEBU 3134 Exiting" +"2019-09-24 00:26:03.765 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3135 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:03.765 UTC [msp] DeserializeIdentity -> DEBU 3136 Obtaining identity" +"2019-09-24 00:26:03.765 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3137 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:03.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3138 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:03.766 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3139 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 313a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 313b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 313c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:03.766 UTC [cauthdsl] func1 -> DEBU 313d 0xc003adb430 gate 1569284763766173300 evaluation starts" +"2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 313e 0xc003adb430 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 313f 0xc003adb430 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 3140 0xc003adb430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 3141 0xc003adb430 principal evaluation fails" +"2019-09-24 00:26:03.766 UTC [cauthdsl] func1 -> DEBU 3142 0xc003adb430 gate 1569284763766173300 evaluation fails" +"2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 3143 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 3144 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:03.766 UTC [policies] Evaluate -> DEBU 3145 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:03.766 UTC [cauthdsl] func1 -> DEBU 3146 0xc003adbc70 gate 1569284763766596000 evaluation starts" +"2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 3147 0xc003adbc70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 3148 0xc003adbc70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 3149 0xc003adbc70 principal matched by identity 0" +"2019-09-24 00:26:03.766 UTC [msp.identity] Verify -> DEBU 314a Verify: digest = 00000000 da e3 e9 f4 4c 6f 1d d0 04 fa 0f 1e f9 31 cc 82 |....Lo.......1..| +00000010 7e 77 81 82 a3 52 83 cd ae 90 74 ac ec 9f cd c0 |~w...R....t.....|" +"2019-09-24 00:26:03.766 UTC [msp.identity] Verify -> DEBU 314b Verify: sig = 00000000 30 44 02 20 2c 89 28 2a 08 0a 94 7a cb c4 fa 34 |0D. ,.(*...z...4| +00000010 2a 64 8f 9b 37 c8 12 3a 17 5e d9 64 32 1d d4 a1 |*d..7..:.^.d2...| +00000020 a3 02 42 1f 02 20 23 16 96 4e 24 a5 72 1b 54 40 |..B.. #..N$.r.T@| +00000030 80 63 e0 ce 3d 4d 77 a0 83 97 3a 57 63 83 71 0b |.c..=Mw...:Wc.q.| +00000040 78 ae b7 6f 3a 46 |x..o:F|" +"2019-09-24 00:26:03.766 UTC [cauthdsl] func2 -> DEBU 314c 0xc003adbc70 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:03.767 UTC [cauthdsl] func1 -> DEBU 314d 0xc003adbc70 gate 1569284763766596000 evaluation succeeds" +"2019-09-24 00:26:03.767 UTC [policies] Evaluate -> DEBU 314e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:03.767 UTC [policies] Evaluate -> DEBU 314f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:03.767 UTC [policies] Evaluate -> DEBU 3150 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:03.767 UTC [policies] Evaluate -> DEBU 3151 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:03.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 3152 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:03.767 UTC [gossip.discovery] handleAliveMessage -> DEBU 3153 Exiting" +"2019-09-24 00:26:03.767 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3154 Exiting" +"2019-09-24 00:26:03.772 UTC [gossip.comm] func1 -> DEBU 3155 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.777 UTC [gossip.gossip] handleMessage -> DEBU 3156 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.777 UTC [gossip.gossip] handleMessage -> DEBU 3157 Exiting" +"2019-09-24 00:26:03.777 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3158 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.777 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3159 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:03.777 UTC [msp.identity] Verify -> DEBU 315a Verify: digest = 00000000 4e 43 49 98 86 05 97 f8 d9 7c 2e 5d 8a da b1 32 |NCI......|.]...2| +00000010 d7 36 bc ba df 55 5a 70 f1 43 f8 11 7a 8f d5 16 |.6...UZp.C..z...|" +"2019-09-24 00:26:03.777 UTC [msp.identity] Verify -> DEBU 315b Verify: sig = 00000000 30 45 02 21 00 93 f6 09 6b 6b 99 b9 b0 69 17 d9 |0E.!....kk...i..| +00000010 6d 24 bd bc 2e a6 77 46 5d 48 71 40 5c 72 6b a8 |m$....wF]Hq@\rk.| +00000020 c4 3e 1f d8 ac 02 20 15 c4 a6 fa e3 f8 f1 19 c9 |.>.... .........| +00000030 68 12 e5 76 64 8c cd 9e 59 28 d1 1d c9 a4 16 2b |h..vd...Y(.....+| +00000040 d4 18 00 e2 0e f5 1c |.......|" +"2019-09-24 00:26:03.777 UTC [msp.identity] Verify -> DEBU 315c Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:03.777 UTC [msp.identity] Verify -> DEBU 315d Verify: sig = 00000000 30 44 02 20 5e e2 42 91 6f 82 bb 94 db ea 54 bf |0D. ^.B.o.....T.| +00000010 8a 9b bc cf 6a 0d bf 00 b3 de 26 3c cb 2b d7 ee |....j.....&<.+..| +00000020 61 86 42 ad 02 20 01 bf 35 be 76 0d 4f aa 0d b6 |a.B.. ..5.v.O...| +00000030 09 bf 00 39 35 e2 dc 58 1b ef fb 7a 93 12 f0 1a |...95..X...z....| +00000040 83 f6 e2 b7 19 41 |.....A|" +"2019-09-24 00:26:03.777 UTC [gossip.discovery] handleAliveMessage -> DEBU 315e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:03.777 UTC [gossip.discovery] isSentByMe -> DEBU 315f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:03.777 UTC [gossip.discovery] handleAliveMessage -> DEBU 3160 Exiting" +"2019-09-24 00:26:03.777 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3161 Exiting" +"2019-09-24 00:26:03.950 UTC [gossip.gossip] handleMessage -> DEBU 3162 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.950 UTC [gossip.pull] HandleMessage -> DEBU 3163 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3164 Obtaining identity" +"2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3165 Obtaining identity" +"2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3166 Obtaining identity" +"2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3167 Obtaining identity" +"2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3168 Obtaining identity" +"2019-09-24 00:26:03.950 UTC [msp] DeserializeIdentity -> DEBU 3169 Obtaining identity" +"2019-09-24 00:26:03.950 UTC [gossip.pull] SendDigest -> DEBU 316a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:03.950 UTC [gossip.gossip] handleMessage -> DEBU 316b Exiting" +"2019-09-24 00:26:03.975 UTC [gossip.gossip] handleMessage -> DEBU 316c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.975 UTC [gossip.gossip] handleMessage -> DEBU 316d Exiting" +"2019-09-24 00:26:03.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 316e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 316f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:03.975 UTC [msp] DeserializeIdentity -> DEBU 3170 Obtaining identity" +"2019-09-24 00:26:03.975 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3171 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:03.975 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3172 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:03.975 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3173 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:03.975 UTC [policies] Evaluate -> DEBU 3174 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:03.975 UTC [policies] Evaluate -> DEBU 3175 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:03.975 UTC [policies] Evaluate -> DEBU 3176 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:03.975 UTC [cauthdsl] func1 -> DEBU 3177 0xc003aa3f70 gate 1569284763975919500 evaluation starts" +"2019-09-24 00:26:03.975 UTC [cauthdsl] func2 -> DEBU 3178 0xc003aa3f70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:03.975 UTC [cauthdsl] func2 -> DEBU 3179 0xc003aa3f70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 317a 0xc003aa3f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 317b 0xc003aa3f70 principal evaluation fails" +"2019-09-24 00:26:03.976 UTC [cauthdsl] func1 -> DEBU 317c 0xc003aa3f70 gate 1569284763975919500 evaluation fails" +"2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 317d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 317e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 317f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:03.976 UTC [cauthdsl] func1 -> DEBU 3180 0xc003a887e0 gate 1569284763976361500 evaluation starts" +"2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 3181 0xc003a887e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 3182 0xc003a887e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 3183 0xc003a887e0 principal matched by identity 0" +"2019-09-24 00:26:03.976 UTC [msp.identity] Verify -> DEBU 3184 Verify: digest = 00000000 6f 3d 24 be 83 d4 27 39 2a f1 88 29 6a 05 29 46 |o=$...'9*..)j.)F| +00000010 91 11 af 78 63 be eb fe f2 4c c4 8f 7a 3a 3f 4d |...xc....L..z:?M|" +"2019-09-24 00:26:03.976 UTC [msp.identity] Verify -> DEBU 3185 Verify: sig = 00000000 30 44 02 20 2d 43 1c cf fb 96 bf cb 46 5a 23 c4 |0D. -C......FZ#.| +00000010 79 6b 35 47 28 0b 78 11 44 30 ea 59 86 97 64 22 |yk5G(.x.D0.Y..d"| +00000020 6b 48 65 33 02 20 76 91 56 e9 72 eb 33 6f bd 99 |kHe3. v.V.r.3o..| +00000030 8f f1 d0 93 87 2b d8 f3 e9 49 f7 2d 0b c6 9d 7f |.....+...I.-....| +00000040 01 45 07 98 f4 87 |.E....|" +"2019-09-24 00:26:03.976 UTC [cauthdsl] func2 -> DEBU 3186 0xc003a887e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:03.976 UTC [cauthdsl] func1 -> DEBU 3187 0xc003a887e0 gate 1569284763976361500 evaluation succeeds" +"2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 3188 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 3189 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 318a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:03.976 UTC [policies] Evaluate -> DEBU 318b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:03.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 318c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:03.977 UTC [gossip.discovery] learnExistingMembers -> DEBU 318d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:03.977 UTC [gossip.discovery] learnExistingMembers -> DEBU 318e updating membership: timestamp: " +"2019-09-24 00:26:03.977 UTC [gossip.discovery] learnExistingMembers -> DEBU 318f Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:03.977 UTC [gossip.discovery] learnExistingMembers -> DEBU 3190 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:03.977 UTC [gossip.discovery] learnExistingMembers -> DEBU 3191 Exiting" +"2019-09-24 00:26:03.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 3192 Exiting" +"2019-09-24 00:26:03.977 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3193 Exiting" +"2019-09-24 00:26:03.977 UTC [gossip.discovery] sendMemResponse -> DEBU 3194 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:03.977 UTC [msp] DeserializeIdentity -> DEBU 3195 Obtaining identity" +"2019-09-24 00:26:03.977 UTC [msp] DeserializeIdentity -> DEBU 3196 Obtaining identity" +"2019-09-24 00:26:03.977 UTC [msp] DeserializeIdentity -> DEBU 3197 Obtaining identity" +"2019-09-24 00:26:03.977 UTC [gossip.comm] Send -> DEBU 3198 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:03.977 UTC [gossip.discovery] sendMemResponse -> DEBU 3199 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0203" signature:"0D\002 u\235\231\340>!0p\316\211\221tK\032\214U\363\013\037i\255) \3567\307`\302\205\003\374L\002 \t\2268q\007*~w\363(GkDb\"\030\374\341\315\310\212o\265\324F\2345\331Q\332\375\317" > alive: alive: alive: " +"2019-09-24 00:26:03.977 UTC [gossip.comm] sendToEndpoint -> DEBU 319a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:03.977 UTC [gossip.comm] sendToEndpoint -> DEBU 319b Exiting" +"2019-09-24 00:26:04.148 UTC [msp] DeserializeIdentity -> DEBU 319c Obtaining identity" +"2019-09-24 00:26:04.148 UTC [msp] DeserializeIdentity -> DEBU 319d Obtaining identity" +"2019-09-24 00:26:04.149 UTC [gossip.comm] Send -> DEBU 319e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 319f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 31a0 Exiting" +"2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 31a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 31a2 Exiting" +"2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 31a3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.149 UTC [gossip.comm] sendToEndpoint -> DEBU 31a4 Exiting" +"2019-09-24 00:26:04.154 UTC [gossip.gossip] handleMessage -> DEBU 31a5 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.154 UTC [msp] DeserializeIdentity -> DEBU 31a6 Obtaining identity" +"2019-09-24 00:26:04.154 UTC [msp] DeserializeIdentity -> DEBU 31a7 Obtaining identity" +"2019-09-24 00:26:04.155 UTC [msp] DeserializeIdentity -> DEBU 31a8 Obtaining identity" +"2019-09-24 00:26:04.155 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:04.155 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31aa Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.155 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31ab Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.155 UTC [policies] Evaluate -> DEBU 31ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:04.155 UTC [policies] Evaluate -> DEBU 31ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:04.155 UTC [policies] Evaluate -> DEBU 31ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:04.155 UTC [cauthdsl] func1 -> DEBU 31af 0xc003a756e0 gate 1569284764155647600 evaluation starts" +"2019-09-24 00:26:04.157 UTC [gossip.comm] func1 -> DEBU 31b0 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.157 UTC [gossip.comm] func1 -> DEBU 31b1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.159 UTC [cauthdsl] func2 -> DEBU 31b2 0xc003a756e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.159 UTC [cauthdsl] func2 -> DEBU 31b3 0xc003a756e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.159 UTC [cauthdsl] func2 -> DEBU 31b4 0xc003a756e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:04.159 UTC [cauthdsl] func2 -> DEBU 31b5 0xc003a756e0 principal evaluation fails" +"2019-09-24 00:26:04.159 UTC [cauthdsl] func1 -> DEBU 31b6 0xc003a756e0 gate 1569284764155647600 evaluation fails" +"2019-09-24 00:26:04.159 UTC [policies] Evaluate -> DEBU 31b7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.159 UTC [policies] Evaluate -> DEBU 31b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.159 UTC [policies] Evaluate -> DEBU 31b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:04.160 UTC [cauthdsl] func1 -> DEBU 31ba 0xc003a75f40 gate 1569284764160002300 evaluation starts" +"2019-09-24 00:26:04.160 UTC [cauthdsl] func2 -> DEBU 31bb 0xc003a75f40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.160 UTC [cauthdsl] func2 -> DEBU 31bc 0xc003a75f40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.160 UTC [cauthdsl] func2 -> DEBU 31bd 0xc003a75f40 principal matched by identity 0" +"2019-09-24 00:26:04.160 UTC [msp.identity] Verify -> DEBU 31be Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:04.160 UTC [msp.identity] Verify -> DEBU 31bf Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:04.160 UTC [cauthdsl] func2 -> DEBU 31c0 0xc003a75f40 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:04.160 UTC [cauthdsl] func1 -> DEBU 31c1 0xc003a75f40 gate 1569284764160002300 evaluation succeeds" +"2019-09-24 00:26:04.160 UTC [policies] Evaluate -> DEBU 31c2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.160 UTC [policies] Evaluate -> DEBU 31c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.160 UTC [policies] Evaluate -> DEBU 31c4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:04.160 UTC [policies] Evaluate -> DEBU 31c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:04.160 UTC [msp.identity] Verify -> DEBU 31c6 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:04.160 UTC [msp.identity] Verify -> DEBU 31c7 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:04.161 UTC [msp.identity] Verify -> DEBU 31c8 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:04.161 UTC [msp.identity] Verify -> DEBU 31c9 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:04.161 UTC [msp] DeserializeIdentity -> DEBU 31ca Obtaining identity" +"2019-09-24 00:26:04.161 UTC [msp] DeserializeIdentity -> DEBU 31cb Obtaining identity" +"2019-09-24 00:26:04.161 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:04.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31cd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31ce Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.161 UTC [policies] Evaluate -> DEBU 31cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:04.161 UTC [policies] Evaluate -> DEBU 31d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:04.161 UTC [policies] Evaluate -> DEBU 31d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:04.161 UTC [cauthdsl] func1 -> DEBU 31d2 0xc003842580 gate 1569284764161818700 evaluation starts" +"2019-09-24 00:26:04.161 UTC [cauthdsl] func2 -> DEBU 31d3 0xc003842580 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.161 UTC [cauthdsl] func2 -> DEBU 31d4 0xc003842580 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.161 UTC [cauthdsl] func2 -> DEBU 31d5 0xc003842580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:04.161 UTC [cauthdsl] func2 -> DEBU 31d6 0xc003842580 principal evaluation fails" +"2019-09-24 00:26:04.162 UTC [cauthdsl] func1 -> DEBU 31d7 0xc003842580 gate 1569284764161818700 evaluation fails" +"2019-09-24 00:26:04.162 UTC [policies] Evaluate -> DEBU 31d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.162 UTC [policies] Evaluate -> DEBU 31d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.162 UTC [policies] Evaluate -> DEBU 31da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:04.162 UTC [cauthdsl] func1 -> DEBU 31db 0xc003842dd0 gate 1569284764162227200 evaluation starts" +"2019-09-24 00:26:04.162 UTC [cauthdsl] func2 -> DEBU 31dc 0xc003842dd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.162 UTC [cauthdsl] func2 -> DEBU 31dd 0xc003842dd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.162 UTC [cauthdsl] func2 -> DEBU 31de 0xc003842dd0 principal matched by identity 0" +"2019-09-24 00:26:04.162 UTC [msp.identity] Verify -> DEBU 31df Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:04.162 UTC [msp.identity] Verify -> DEBU 31e0 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:04.162 UTC [cauthdsl] func2 -> DEBU 31e1 0xc003842dd0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:04.162 UTC [cauthdsl] func1 -> DEBU 31e2 0xc003842dd0 gate 1569284764162227200 evaluation succeeds" +"2019-09-24 00:26:04.163 UTC [policies] Evaluate -> DEBU 31e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.163 UTC [policies] Evaluate -> DEBU 31e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.163 UTC [policies] Evaluate -> DEBU 31e5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:04.163 UTC [policies] Evaluate -> DEBU 31e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:04.163 UTC [gossip.gossip] handleMessage -> DEBU 31e7 Exiting" +"2019-09-24 00:26:04.167 UTC [gossip.gossip] handleMessage -> DEBU 31e8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.170 UTC [msp.identity] Verify -> DEBU 31e9 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:04.170 UTC [msp.identity] Verify -> DEBU 31ea Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:04.172 UTC [msp.identity] Verify -> DEBU 31eb Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:04.173 UTC [msp.identity] Verify -> DEBU 31ec Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:04.174 UTC [msp] DeserializeIdentity -> DEBU 31ed Obtaining identity" +"2019-09-24 00:26:04.174 UTC [msp] DeserializeIdentity -> DEBU 31ee Obtaining identity" +"2019-09-24 00:26:04.175 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:04.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.175 UTC [policies] Evaluate -> DEBU 31f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:04.176 UTC [policies] Evaluate -> DEBU 31f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:04.177 UTC [policies] Evaluate -> DEBU 31f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:04.177 UTC [cauthdsl] func1 -> DEBU 31f5 0xc003835620 gate 1569284764177571400 evaluation starts" +"2019-09-24 00:26:04.177 UTC [cauthdsl] func2 -> DEBU 31f6 0xc003835620 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.177 UTC [cauthdsl] func2 -> DEBU 31f7 0xc003835620 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.178 UTC [cauthdsl] func2 -> DEBU 31f8 0xc003835620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:04.178 UTC [cauthdsl] func2 -> DEBU 31f9 0xc003835620 principal evaluation fails" +"2019-09-24 00:26:04.178 UTC [cauthdsl] func1 -> DEBU 31fa 0xc003835620 gate 1569284764177571400 evaluation fails" +"2019-09-24 00:26:04.178 UTC [policies] Evaluate -> DEBU 31fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.178 UTC [policies] Evaluate -> DEBU 31fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.178 UTC [policies] Evaluate -> DEBU 31fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:04.178 UTC [cauthdsl] func1 -> DEBU 31fe 0xc003835e70 gate 1569284764178544400 evaluation starts" +"2019-09-24 00:26:04.178 UTC [cauthdsl] func2 -> DEBU 31ff 0xc003835e70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.178 UTC [cauthdsl] func2 -> DEBU 3200 0xc003835e70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.178 UTC [cauthdsl] func2 -> DEBU 3201 0xc003835e70 principal matched by identity 0" +"2019-09-24 00:26:04.178 UTC [msp.identity] Verify -> DEBU 3202 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:04.178 UTC [msp.identity] Verify -> DEBU 3203 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:04.179 UTC [cauthdsl] func2 -> DEBU 3204 0xc003835e70 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:04.179 UTC [cauthdsl] func1 -> DEBU 3205 0xc003835e70 gate 1569284764178544400 evaluation succeeds" +"2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3206 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3207 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3208 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3209 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:04.179 UTC [msp] DeserializeIdentity -> DEBU 320a Obtaining identity" +"2019-09-24 00:26:04.179 UTC [msp] DeserializeIdentity -> DEBU 320b Obtaining identity" +"2019-09-24 00:26:04.179 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 320c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:04.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 320f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3210 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:04.179 UTC [policies] Evaluate -> DEBU 3211 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:04.180 UTC [cauthdsl] func1 -> DEBU 3212 0xc0037b9650 gate 1569284764180007400 evaluation starts" +"2019-09-24 00:26:04.180 UTC [cauthdsl] func2 -> DEBU 3213 0xc0037b9650 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.180 UTC [cauthdsl] func2 -> DEBU 3214 0xc0037b9650 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.180 UTC [cauthdsl] func2 -> DEBU 3215 0xc0037b9650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:04.183 UTC [cauthdsl] func2 -> DEBU 3216 0xc0037b9650 principal evaluation fails" +"2019-09-24 00:26:04.183 UTC [cauthdsl] func1 -> DEBU 3217 0xc0037b9650 gate 1569284764180007400 evaluation fails" +"2019-09-24 00:26:04.184 UTC [policies] Evaluate -> DEBU 3218 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.184 UTC [policies] Evaluate -> DEBU 3219 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.184 UTC [policies] Evaluate -> DEBU 321a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:04.184 UTC [cauthdsl] func1 -> DEBU 321b 0xc0037b9e90 gate 1569284764184113900 evaluation starts" +"2019-09-24 00:26:04.184 UTC [cauthdsl] func2 -> DEBU 321c 0xc0037b9e90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.184 UTC [cauthdsl] func2 -> DEBU 321d 0xc0037b9e90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.184 UTC [cauthdsl] func2 -> DEBU 321e 0xc0037b9e90 principal matched by identity 0" +"2019-09-24 00:26:04.184 UTC [msp.identity] Verify -> DEBU 321f Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:04.184 UTC [msp.identity] Verify -> DEBU 3220 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:04.184 UTC [cauthdsl] func2 -> DEBU 3221 0xc0037b9e90 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:04.184 UTC [cauthdsl] func1 -> DEBU 3222 0xc0037b9e90 gate 1569284764184113900 evaluation succeeds" +"2019-09-24 00:26:04.184 UTC [policies] Evaluate -> DEBU 3223 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.185 UTC [policies] Evaluate -> DEBU 3224 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.185 UTC [policies] Evaluate -> DEBU 3225 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:04.185 UTC [policies] Evaluate -> DEBU 3226 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:04.185 UTC [gossip.gossip] handleMessage -> DEBU 3227 Exiting" +"2019-09-24 00:26:04.185 UTC [gossip.gossip] handleMessage -> DEBU 3228 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.185 UTC [msp] DeserializeIdentity -> DEBU 3229 Obtaining identity" +"2019-09-24 00:26:04.185 UTC [msp] DeserializeIdentity -> DEBU 322a Obtaining identity" +"2019-09-24 00:26:04.185 UTC [msp] DeserializeIdentity -> DEBU 322b Obtaining identity" +"2019-09-24 00:26:04.187 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 322c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:04.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 322d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 322e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.188 UTC [policies] Evaluate -> DEBU 322f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:04.188 UTC [policies] Evaluate -> DEBU 3230 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:04.188 UTC [policies] Evaluate -> DEBU 3231 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:04.188 UTC [cauthdsl] func1 -> DEBU 3232 0xc0037a79b0 gate 1569284764188428600 evaluation starts" +"2019-09-24 00:26:04.188 UTC [cauthdsl] func2 -> DEBU 3233 0xc0037a79b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.189 UTC [cauthdsl] func2 -> DEBU 3234 0xc0037a79b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.189 UTC [cauthdsl] func2 -> DEBU 3235 0xc0037a79b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:04.189 UTC [cauthdsl] func2 -> DEBU 3236 0xc0037a79b0 principal evaluation fails" +"2019-09-24 00:26:04.189 UTC [cauthdsl] func1 -> DEBU 3237 0xc0037a79b0 gate 1569284764188428600 evaluation fails" +"2019-09-24 00:26:04.190 UTC [policies] Evaluate -> DEBU 3238 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.190 UTC [policies] Evaluate -> DEBU 3239 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.190 UTC [policies] Evaluate -> DEBU 323a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:04.191 UTC [cauthdsl] func1 -> DEBU 323b 0xc0037901f0 gate 1569284764191112200 evaluation starts" +"2019-09-24 00:26:04.191 UTC [cauthdsl] func2 -> DEBU 323c 0xc0037901f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.191 UTC [cauthdsl] func2 -> DEBU 323d 0xc0037901f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.191 UTC [cauthdsl] func2 -> DEBU 323e 0xc0037901f0 principal matched by identity 0" +"2019-09-24 00:26:04.192 UTC [msp.identity] Verify -> DEBU 323f Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:04.192 UTC [msp.identity] Verify -> DEBU 3240 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:04.192 UTC [cauthdsl] func2 -> DEBU 3241 0xc0037901f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:04.192 UTC [cauthdsl] func1 -> DEBU 3242 0xc0037901f0 gate 1569284764191112200 evaluation succeeds" +"2019-09-24 00:26:04.192 UTC [policies] Evaluate -> DEBU 3243 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.193 UTC [policies] Evaluate -> DEBU 3244 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.193 UTC [policies] Evaluate -> DEBU 3245 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:04.193 UTC [policies] Evaluate -> DEBU 3246 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:04.195 UTC [msp.identity] Verify -> DEBU 3247 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:04.195 UTC [msp.identity] Verify -> DEBU 3248 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:04.195 UTC [msp] DeserializeIdentity -> DEBU 3249 Obtaining identity" +"2019-09-24 00:26:04.195 UTC [msp] DeserializeIdentity -> DEBU 324a Obtaining identity" +"2019-09-24 00:26:04.196 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 324b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:04.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 324c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 324d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.196 UTC [policies] Evaluate -> DEBU 324e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:04.197 UTC [policies] Evaluate -> DEBU 324f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:04.198 UTC [policies] Evaluate -> DEBU 3250 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:04.198 UTC [cauthdsl] func1 -> DEBU 3251 0xc00355a1f0 gate 1569284764198327800 evaluation starts" +"2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 3252 0xc00355a1f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 3253 0xc00355a1f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 3254 0xc00355a1f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 3255 0xc00355a1f0 principal evaluation fails" +"2019-09-24 00:26:04.198 UTC [cauthdsl] func1 -> DEBU 3256 0xc00355a1f0 gate 1569284764198327800 evaluation fails" +"2019-09-24 00:26:04.198 UTC [policies] Evaluate -> DEBU 3257 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.198 UTC [policies] Evaluate -> DEBU 3258 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.198 UTC [policies] Evaluate -> DEBU 3259 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:04.198 UTC [cauthdsl] func1 -> DEBU 325a 0xc00355aa30 gate 1569284764198755600 evaluation starts" +"2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 325b 0xc00355aa30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 325c 0xc00355aa30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.198 UTC [cauthdsl] func2 -> DEBU 325d 0xc00355aa30 principal matched by identity 0" +"2019-09-24 00:26:04.198 UTC [msp.identity] Verify -> DEBU 325e Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:04.198 UTC [msp.identity] Verify -> DEBU 325f Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:04.202 UTC [cauthdsl] func2 -> DEBU 3260 0xc00355aa30 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:04.202 UTC [cauthdsl] func1 -> DEBU 3261 0xc00355aa30 gate 1569284764198755600 evaluation succeeds" +"2019-09-24 00:26:04.202 UTC [policies] Evaluate -> DEBU 3262 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.202 UTC [policies] Evaluate -> DEBU 3263 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.202 UTC [policies] Evaluate -> DEBU 3264 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:04.202 UTC [policies] Evaluate -> DEBU 3265 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:04.202 UTC [msp.identity] Verify -> DEBU 3266 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:04.202 UTC [msp.identity] Verify -> DEBU 3267 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:04.202 UTC [gossip.gossip] handleMessage -> DEBU 3268 Exiting" +"2019-09-24 00:26:04.306 UTC [msp] DeserializeIdentity -> DEBU 3269 Obtaining identity" +"2019-09-24 00:26:04.306 UTC [msp] DeserializeIdentity -> DEBU 326a Obtaining identity" +"2019-09-24 00:26:04.306 UTC [gossip.pull] Hello -> DEBU 326b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:04.306 UTC [msp] DeserializeIdentity -> DEBU 326c Obtaining identity" +"2019-09-24 00:26:04.306 UTC [msp] DeserializeIdentity -> DEBU 326d Obtaining identity" +"2019-09-24 00:26:04.306 UTC [gossip.comm] Send -> DEBU 326e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:04.306 UTC [gossip.comm] sendToEndpoint -> DEBU 326f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.306 UTC [gossip.comm] sendToEndpoint -> DEBU 3270 Exiting" +"2019-09-24 00:26:04.307 UTC [gossip.comm] func1 -> DEBU 3271 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.307 UTC [gossip.gossip] handleMessage -> DEBU 3272 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.307 UTC [gossip.pull] HandleMessage -> DEBU 3273 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.307 UTC [gossip.gossip] handleMessage -> DEBU 3274 Exiting" +"2019-09-24 00:26:04.620 UTC [msp] GetDefaultSigningIdentity -> DEBU 3275 Obtaining default signing identity" +"2019-09-24 00:26:04.620 UTC [msp.identity] Sign -> DEBU 3276 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151030 " +"2019-09-24 00:26:04.620 UTC [msp.identity] Sign -> DEBU 3277 Sign: digest: CB1B30F4243D64EFD27CDC37E5B0AE47FD3810F328278576147D7FAF38D1D9B2 " +"2019-09-24 00:26:04.620 UTC [msp] GetDefaultSigningIdentity -> DEBU 3278 Obtaining default signing identity" +"2019-09-24 00:26:04.620 UTC [msp.identity] Sign -> DEBU 3279 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:04.620 UTC [msp.identity] Sign -> DEBU 327a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:04.620 UTC [gossip.discovery] periodicalSendAlive -> DEBU 327b Sleeping 5s" +"2019-09-24 00:26:04.629 UTC [msp] DeserializeIdentity -> DEBU 327c Obtaining identity" +"2019-09-24 00:26:04.631 UTC [msp] DeserializeIdentity -> DEBU 327d Obtaining identity" +"2019-09-24 00:26:04.631 UTC [msp] DeserializeIdentity -> DEBU 327e Obtaining identity" +"2019-09-24 00:26:04.632 UTC [gossip.comm] Send -> DEBU 327f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:04.632 UTC [msp] DeserializeIdentity -> DEBU 3280 Obtaining identity" +"2019-09-24 00:26:04.632 UTC [gossip.comm] Send -> DEBU 3281 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:04.632 UTC [gossip.comm] Send -> DEBU 3282 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3283 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3284 Exiting" +"2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3285 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3286 Exiting" +"2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3287 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:04.632 UTC [gossip.comm] sendToEndpoint -> DEBU 3288 Exiting" +"2019-09-24 00:26:04.647 UTC [gossip.comm] func1 -> DEBU 3289 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.647 UTC [gossip.gossip] handleMessage -> DEBU 328a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.647 UTC [msp] DeserializeIdentity -> DEBU 328b Obtaining identity" +"2019-09-24 00:26:04.648 UTC [msp] DeserializeIdentity -> DEBU 328c Obtaining identity" +"2019-09-24 00:26:04.648 UTC [gossip.gossip] handleMessage -> DEBU 328d Exiting" +"2019-09-24 00:26:04.725 UTC [gossip.comm] func1 -> DEBU 328e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.725 UTC [gossip.gossip] handleMessage -> DEBU 328f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.725 UTC [gossip.gossip] handleMessage -> DEBU 3290 Exiting" +"2019-09-24 00:26:04.725 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3291 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.725 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3292 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:04.725 UTC [msp] DeserializeIdentity -> DEBU 3293 Obtaining identity" +"2019-09-24 00:26:04.725 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3294 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:04.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3295 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3296 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 3297 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 3298 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 3299 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:04.725 UTC [cauthdsl] func1 -> DEBU 329a 0xc003591240 gate 1569284764725714500 evaluation starts" +"2019-09-24 00:26:04.725 UTC [cauthdsl] func2 -> DEBU 329b 0xc003591240 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.725 UTC [cauthdsl] func2 -> DEBU 329c 0xc003591240 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.725 UTC [cauthdsl] func2 -> DEBU 329d 0xc003591240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:04.725 UTC [cauthdsl] func2 -> DEBU 329e 0xc003591240 principal evaluation fails" +"2019-09-24 00:26:04.725 UTC [cauthdsl] func1 -> DEBU 329f 0xc003591240 gate 1569284764725714500 evaluation fails" +"2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 32a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 32a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.725 UTC [policies] Evaluate -> DEBU 32a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:04.725 UTC [cauthdsl] func1 -> DEBU 32a3 0xc003591a80 gate 1569284764725977100 evaluation starts" +"2019-09-24 00:26:04.726 UTC [cauthdsl] func2 -> DEBU 32a4 0xc003591a80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.726 UTC [cauthdsl] func2 -> DEBU 32a5 0xc003591a80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.726 UTC [cauthdsl] func2 -> DEBU 32a6 0xc003591a80 principal matched by identity 0" +"2019-09-24 00:26:04.726 UTC [msp.identity] Verify -> DEBU 32a7 Verify: digest = 00000000 26 b9 fe 55 d5 80 04 fd 38 f6 fc c2 46 ab 3e e2 |&..U....8...F.>.| +00000010 fc 27 46 6d 0f d3 f2 f6 67 04 e0 f8 5f 8b d7 1e |.'Fm....g..._...|" +"2019-09-24 00:26:04.726 UTC [msp.identity] Verify -> DEBU 32a8 Verify: sig = 00000000 30 45 02 21 00 ce 0e 61 14 5b 27 17 2f 60 d5 d7 |0E.!...a.['./`..| +00000010 ba 5e 19 89 4a 53 6c 8b a7 39 37 8f f2 5c 12 25 |.^..JSl..97..\.%| +00000020 ad 44 85 b5 a8 02 20 79 81 a6 d6 a1 8d 08 f7 fb |.D.... y........| +00000030 42 69 10 4a 91 77 c8 90 de e4 47 65 4c 47 80 b2 |Bi.J.w....GeLG..| +00000040 06 67 1c 66 56 dc d3 |.g.fV..|" +"2019-09-24 00:26:04.726 UTC [cauthdsl] func2 -> DEBU 32a9 0xc003591a80 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:04.726 UTC [cauthdsl] func1 -> DEBU 32aa 0xc003591a80 gate 1569284764725977100 evaluation succeeds" +"2019-09-24 00:26:04.726 UTC [policies] Evaluate -> DEBU 32ab Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.726 UTC [policies] Evaluate -> DEBU 32ac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.726 UTC [policies] Evaluate -> DEBU 32ad Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:04.726 UTC [policies] Evaluate -> DEBU 32ae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:04.726 UTC [gossip.discovery] handleAliveMessage -> DEBU 32af Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:04.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 32b0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:04.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 32b1 updating membership: timestamp: " +"2019-09-24 00:26:04.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 32b2 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:04.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 32b3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:04.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 32b4 Exiting" +"2019-09-24 00:26:04.726 UTC [gossip.discovery] handleAliveMessage -> DEBU 32b5 Exiting" +"2019-09-24 00:26:04.726 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32b6 Exiting" +"2019-09-24 00:26:04.727 UTC [gossip.discovery] sendMemResponse -> DEBU 32b7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:04.727 UTC [msp] DeserializeIdentity -> DEBU 32b8 Obtaining identity" +"2019-09-24 00:26:04.727 UTC [msp] DeserializeIdentity -> DEBU 32b9 Obtaining identity" +"2019-09-24 00:26:04.727 UTC [msp] DeserializeIdentity -> DEBU 32ba Obtaining identity" +"2019-09-24 00:26:04.727 UTC [gossip.comm] Send -> DEBU 32bb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:04.727 UTC [gossip.discovery] sendMemResponse -> DEBU 32bc Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0203" signature:"0D\002 u\235\231\340>!0p\316\211\221tK\032\214U\363\013\037i\255) \3567\307`\302\205\003\374L\002 \t\2268q\007*~w\363(GkDb\"\030\374\341\315\310\212o\265\324F\2345\331Q\332\375\317" > alive: alive: alive: " +"2019-09-24 00:26:04.727 UTC [gossip.comm] sendToEndpoint -> DEBU 32bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.727 UTC [gossip.comm] sendToEndpoint -> DEBU 32be Exiting" +"2019-09-24 00:26:04.745 UTC [gossip.comm] func1 -> DEBU 32bf Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.745 UTC [gossip.gossip] handleMessage -> DEBU 32c0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.745 UTC [gossip.pull] HandleMessage -> DEBU 32c1 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.745 UTC [msp] DeserializeIdentity -> DEBU 32c2 Obtaining identity" +"2019-09-24 00:26:04.746 UTC [msp] DeserializeIdentity -> DEBU 32c3 Obtaining identity" +"2019-09-24 00:26:04.746 UTC [msp] DeserializeIdentity -> DEBU 32c4 Obtaining identity" +"2019-09-24 00:26:04.746 UTC [msp] DeserializeIdentity -> DEBU 32c5 Obtaining identity" +"2019-09-24 00:26:04.746 UTC [msp] DeserializeIdentity -> DEBU 32c6 Obtaining identity" +"2019-09-24 00:26:04.746 UTC [msp] DeserializeIdentity -> DEBU 32c7 Obtaining identity" +"2019-09-24 00:26:04.746 UTC [gossip.pull] SendDigest -> DEBU 32c8 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:04.746 UTC [gossip.gossip] handleMessage -> DEBU 32c9 Exiting" +"2019-09-24 00:26:04.841 UTC [gossip.comm] func1 -> DEBU 32ca Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.841 UTC [gossip.gossip] handleMessage -> DEBU 32cb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.841 UTC [gossip.pull] HandleMessage -> DEBU 32cc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:04.841 UTC [gossip.pull] SendDigest -> DEBU 32cd Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:04.841 UTC [gossip.gossip] handleMessage -> DEBU 32ce Exiting" +"2019-09-24 00:26:04.988 UTC [gossip.gossip] handleMessage -> DEBU 32cf Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:04.988 UTC [gossip.gossip] handleMessage -> DEBU 32d0 Exiting" +"2019-09-24 00:26:04.988 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32d1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:04.988 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32d2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:04.988 UTC [msp] DeserializeIdentity -> DEBU 32d3 Obtaining identity" +"2019-09-24 00:26:04.988 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32d4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:04.988 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.988 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:04.988 UTC [policies] Evaluate -> DEBU 32d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:04.988 UTC [policies] Evaluate -> DEBU 32d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:04.988 UTC [policies] Evaluate -> DEBU 32d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:04.989 UTC [cauthdsl] func1 -> DEBU 32da 0xc003341250 gate 1569284764988982600 evaluation starts" +"2019-09-24 00:26:04.989 UTC [cauthdsl] func2 -> DEBU 32db 0xc003341250 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.989 UTC [cauthdsl] func2 -> DEBU 32dc 0xc003341250 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.989 UTC [cauthdsl] func2 -> DEBU 32dd 0xc003341250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:04.989 UTC [cauthdsl] func2 -> DEBU 32de 0xc003341250 principal evaluation fails" +"2019-09-24 00:26:04.989 UTC [cauthdsl] func1 -> DEBU 32df 0xc003341250 gate 1569284764988982600 evaluation fails" +"2019-09-24 00:26:04.989 UTC [policies] Evaluate -> DEBU 32e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.989 UTC [policies] Evaluate -> DEBU 32e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:04.989 UTC [policies] Evaluate -> DEBU 32e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:04.989 UTC [cauthdsl] func1 -> DEBU 32e3 0xc003341a90 gate 1569284764989780400 evaluation starts" +"2019-09-24 00:26:04.990 UTC [cauthdsl] func2 -> DEBU 32e4 0xc003341a90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:04.990 UTC [cauthdsl] func2 -> DEBU 32e5 0xc003341a90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:04.990 UTC [cauthdsl] func2 -> DEBU 32e6 0xc003341a90 principal matched by identity 0" +"2019-09-24 00:26:04.990 UTC [msp.identity] Verify -> DEBU 32e7 Verify: digest = 00000000 4d d1 c3 85 f5 86 71 7d 4a b3 b2 ed f4 d4 fc 4a |M.....q}J......J| +00000010 2a cc 69 8c 54 f9 9b cf 2d 58 14 04 03 33 94 fa |*.i.T...-X...3..|" +"2019-09-24 00:26:04.990 UTC [msp.identity] Verify -> DEBU 32e8 Verify: sig = 00000000 30 45 02 21 00 9f d3 22 bf 19 8b 8f 10 af 5f 51 |0E.!..."......_Q| +00000010 bf 10 94 c3 05 11 c0 94 f3 6b ef d6 cf df 56 26 |.........k....V&| +00000020 80 83 a1 0b 77 02 20 78 10 36 f6 9a 20 54 75 6c |....w. x.6.. Tul| +00000030 96 ea 49 cb 33 86 13 39 d9 90 a3 0c d7 69 30 c2 |..I.3..9.....i0.| +00000040 ce ed d5 fd ec 46 7f |.....F.|" +"2019-09-24 00:26:04.990 UTC [cauthdsl] func2 -> DEBU 32e9 0xc003341a90 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:04.990 UTC [cauthdsl] func1 -> DEBU 32ea 0xc003341a90 gate 1569284764989780400 evaluation succeeds" +"2019-09-24 00:26:04.990 UTC [policies] Evaluate -> DEBU 32eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.990 UTC [policies] Evaluate -> DEBU 32ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:04.990 UTC [policies] Evaluate -> DEBU 32ed Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:04.990 UTC [policies] Evaluate -> DEBU 32ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:04.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 32ef Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:04.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:04.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f1 updating membership: timestamp: " +"2019-09-24 00:26:04.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f2 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:04.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:04.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f4 Exiting" +"2019-09-24 00:26:04.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f5 Exiting" +"2019-09-24 00:26:04.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32f6 Exiting" +"2019-09-24 00:26:05.009 UTC [gossip.comm] func1 -> DEBU 32f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:05.009 UTC [gossip.gossip] handleMessage -> DEBU 32f8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:05.009 UTC [gossip.gossip] handleMessage -> DEBU 32f9 Exiting" +"2019-09-24 00:26:05.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32fa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:05.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32fb Exiting" +"2019-09-24 00:26:05.010 UTC [gossip.comm] func1 -> DEBU 32fc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:05.010 UTC [gossip.gossip] handleMessage -> DEBU 32fd Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:05.010 UTC [gossip.gossip] handleMessage -> DEBU 32fe Exiting" +"2019-09-24 00:26:05.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32ff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:05.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3300 Exiting" +"2019-09-24 00:26:05.015 UTC [msp] DeserializeIdentity -> DEBU 3301 Obtaining identity" +"2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3302 Obtaining identity" +"2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3303 Obtaining identity" +"2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3304 Obtaining identity" +"2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3305 Obtaining identity" +"2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3306 Obtaining identity" +"2019-09-24 00:26:05.016 UTC [gossip.comm] Send -> DEBU 3307 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3308 Obtaining identity" +"2019-09-24 00:26:05.016 UTC [msp] DeserializeIdentity -> DEBU 3309 Obtaining identity" +"2019-09-24 00:26:05.017 UTC [gossip.comm] Send -> DEBU 330a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:05.017 UTC [gossip.comm] sendToEndpoint -> DEBU 330b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:05.017 UTC [gossip.comm] sendToEndpoint -> DEBU 330c Exiting" +"2019-09-24 00:26:05.017 UTC [gossip.comm] sendToEndpoint -> DEBU 330d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:05.017 UTC [gossip.comm] sendToEndpoint -> DEBU 330e Exiting" +"2019-09-24 00:26:05.140 UTC [gossip.gossip] handleMessage -> DEBU 330f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:05.140 UTC [msp] DeserializeIdentity -> DEBU 3310 Obtaining identity" +"2019-09-24 00:26:05.140 UTC [msp] DeserializeIdentity -> DEBU 3311 Obtaining identity" +"2019-09-24 00:26:05.141 UTC [msp] DeserializeIdentity -> DEBU 3312 Obtaining identity" +"2019-09-24 00:26:05.141 UTC [gossip.gossip] handleMessage -> DEBU 3313 Exiting" +"2019-09-24 00:26:05.689 UTC [gossip.comm] func1 -> DEBU 3314 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:05.689 UTC [gossip.gossip] handleMessage -> DEBU 3315 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:05.689 UTC [gossip.pull] HandleMessage -> DEBU 3316 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:05.689 UTC [gossip.pull] SendDigest -> DEBU 3317 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:05.689 UTC [gossip.gossip] handleMessage -> DEBU 3318 Exiting" +"2019-09-24 00:26:05.702 UTC [gossip.comm] func1 -> DEBU 3319 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:05.703 UTC [gossip.gossip] handleMessage -> DEBU 331a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:05.704 UTC [gossip.gossip] handleMessage -> DEBU 331b Exiting" +"2019-09-24 00:26:05.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 331c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:05.706 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 331d Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:05.708 UTC [msp] DeserializeIdentity -> DEBU 331e Obtaining identity" +"2019-09-24 00:26:05.711 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 331f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:05.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3320 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:05.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3321 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 3322 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 3323 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 3324 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:05.711 UTC [cauthdsl] func1 -> DEBU 3325 0xc0032b1510 gate 1569284765711424600 evaluation starts" +"2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3326 0xc0032b1510 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3327 0xc0032b1510 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3328 0xc0032b1510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3329 0xc0032b1510 principal evaluation fails" +"2019-09-24 00:26:05.711 UTC [cauthdsl] func1 -> DEBU 332a 0xc0032b1510 gate 1569284765711424600 evaluation fails" +"2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 332b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 332c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:05.711 UTC [policies] Evaluate -> DEBU 332d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:05.711 UTC [cauthdsl] func1 -> DEBU 332e 0xc0032b1da0 gate 1569284765711698400 evaluation starts" +"2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 332f 0xc0032b1da0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3330 0xc0032b1da0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:05.711 UTC [cauthdsl] func2 -> DEBU 3331 0xc0032b1da0 principal matched by identity 0" +"2019-09-24 00:26:05.711 UTC [msp.identity] Verify -> DEBU 3332 Verify: digest = 00000000 3b 51 3e dd 59 cf 04 a3 9f d2 e0 dd 85 f8 f4 d5 |;Q>.Y...........| +00000010 27 d7 63 0e 71 04 18 84 bb 50 24 55 6c d5 17 73 |'.c.q....P$Ul..s|" +"2019-09-24 00:26:05.711 UTC [msp.identity] Verify -> DEBU 3333 Verify: sig = 00000000 30 44 02 20 62 47 8b 3e 14 98 09 c5 b3 df 2d 97 |0D. bG.>......-.| +00000010 a5 f1 35 3e 54 3a b4 ed ab e0 49 e0 8b b3 c2 b1 |..5>T:....I.....| +00000020 b4 a1 52 dc 02 20 1f 81 1e ad 9c e8 32 ab ae c5 |..R.. ......2...| +00000030 1d 62 28 77 90 83 eb e4 0e 62 d1 f7 57 92 cc 29 |.b(w.....b..W..)| +00000040 c9 9b 18 81 5a b1 |....Z.|" +"2019-09-24 00:26:05.712 UTC [cauthdsl] func2 -> DEBU 3334 0xc0032b1da0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:05.712 UTC [cauthdsl] func1 -> DEBU 3335 0xc0032b1da0 gate 1569284765711698400 evaluation succeeds" +"2019-09-24 00:26:05.712 UTC [policies] Evaluate -> DEBU 3336 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:05.712 UTC [policies] Evaluate -> DEBU 3337 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:05.712 UTC [policies] Evaluate -> DEBU 3338 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:05.712 UTC [policies] Evaluate -> DEBU 3339 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:05.712 UTC [gossip.discovery] handleAliveMessage -> DEBU 333a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:05.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 333b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:05.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 333c updating membership: timestamp: " +"2019-09-24 00:26:05.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 333d Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:05.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 333e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:05.712 UTC [gossip.discovery] learnExistingMembers -> DEBU 333f Exiting" +"2019-09-24 00:26:05.712 UTC [gossip.discovery] handleAliveMessage -> DEBU 3340 Exiting" +"2019-09-24 00:26:05.712 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3341 Exiting" +"2019-09-24 00:26:05.721 UTC [msp] DeserializeIdentity -> DEBU 3342 Obtaining identity" +"2019-09-24 00:26:05.721 UTC [msp] DeserializeIdentity -> DEBU 3343 Obtaining identity" +"2019-09-24 00:26:05.721 UTC [msp] DeserializeIdentity -> DEBU 3344 Obtaining identity" +"2019-09-24 00:26:05.721 UTC [msp] DeserializeIdentity -> DEBU 3345 Obtaining identity" +"2019-09-24 00:26:05.722 UTC [msp] DeserializeIdentity -> DEBU 3346 Obtaining identity" +"2019-09-24 00:26:05.722 UTC [msp] DeserializeIdentity -> DEBU 3347 Obtaining identity" +"2019-09-24 00:26:05.722 UTC [msp] DeserializeIdentity -> DEBU 3348 Obtaining identity" +"2019-09-24 00:26:05.728 UTC [gossip.comm] Send -> DEBU 3349 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:05.729 UTC [msp] DeserializeIdentity -> DEBU 334a Obtaining identity" +"2019-09-24 00:26:05.729 UTC [gossip.comm] Send -> DEBU 334b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:05.729 UTC [gossip.comm] sendToEndpoint -> DEBU 334c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:05.730 UTC [gossip.comm] sendToEndpoint -> DEBU 334d Exiting" +"2019-09-24 00:26:05.730 UTC [gossip.comm] sendToEndpoint -> DEBU 334e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:05.730 UTC [gossip.comm] sendToEndpoint -> DEBU 334f Exiting" +"2019-09-24 00:26:05.744 UTC [gossip.comm] func1 -> DEBU 3350 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:05.744 UTC [gossip.gossip] handleMessage -> DEBU 3351 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:05.745 UTC [gossip.gossip] handleMessage -> DEBU 3352 Exiting" +"2019-09-24 00:26:05.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3353 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:05.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3354 Exiting" +"2019-09-24 00:26:05.746 UTC [gossip.gossip] handleMessage -> DEBU 3355 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:05.746 UTC [gossip.gossip] handleMessage -> DEBU 3356 Exiting" +"2019-09-24 00:26:05.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3357 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:05.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3358 Exiting" +"2019-09-24 00:26:05.794 UTC [gossip.comm] func1 -> DEBU 3359 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0204" signature:"0E\002!\000\315)5\014\0046d\310u\003\247\017\020LT\215\313'fJ\255\265\353u\312\312\230Wt\230d\323\002 4\347\017\263\246\311\026.&a\265Ob+8\203\225\030\343\356\003^\222!\207%\255R\245\220\006\013" secret_envelope:k\200\244\247\317\376@0p\207\001\316iE&\331\301\034\265\201\221\262q\357\\\324\310@\206\002 *\017v\007ISb\273\017\222:1Vxn%^\256\201\372\301\234c\255+{c\332\202%_\275" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:26:05.794 UTC [gossip.gossip] handleMessage -> DEBU 335a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0204" signature:"0E\002!\000\315)5\014\0046d\310u\003\247\017\020LT\215\313'fJ\255\265\353u\312\312\230Wt\230d\323\002 4\347\017\263\246\311\026.&a\265Ob+8\203\225\030\343\356\003^\222!\207%\255R\245\220\006\013" secret_envelope:k\200\244\247\317\376@0p\207\001\316iE&\331\301\034\265\201\221\262q\357\\\324\310@\206\002 *\017v\007ISb\273\017\222:1Vxn%^\256\201\372\301\234c\255+{c\332\202%_\275" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:26:05.794 UTC [gossip.gossip] handleMessage -> DEBU 335b Exiting" +"2019-09-24 00:26:05.794 UTC [gossip.discovery] handleMsgFromComm -> DEBU 335c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0204" signature:"0E\002!\000\315)5\014\0046d\310u\003\247\017\020LT\215\313'fJ\255\265\353u\312\312\230Wt\230d\323\002 4\347\017\263\246\311\026.&a\265Ob+8\203\225\030\343\356\003^\222!\207%\255R\245\220\006\013" secret_envelope:k\200\244\247\317\376@0p\207\001\316iE&\331\301\034\265\201\221\262q\357\\\324\310@\206\002 *\017v\007ISb\273\017\222:1Vxn%^\256\201\372\301\234c\255+{c\332\202%_\275" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:26:05.794 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 335d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:05.794 UTC [msp.identity] Verify -> DEBU 335e Verify: digest = 00000000 d5 d1 50 ff c3 1d d0 2e ea 05 5a a2 b5 9b 41 14 |..P.......Z...A.| +00000010 6e e0 c8 ab ed fd 94 8c d9 59 e0 3a b5 ff 13 29 |n........Y.:...)|" +"2019-09-24 00:26:05.795 UTC [msp.identity] Verify -> DEBU 335f Verify: sig = 00000000 30 45 02 21 00 cd 29 35 0c 04 36 64 c8 75 03 a7 |0E.!..)5..6d.u..| +00000010 0f 10 4c 54 8d cb 27 66 4a ad b5 eb 75 ca ca 98 |..LT..'fJ...u...| +00000020 57 74 98 64 d3 02 20 34 e7 0f b3 a6 c9 16 2e 26 |Wt.d.. 4.......&| +00000030 61 b5 4f 62 2b 38 83 95 18 e3 ee 03 5e 92 21 87 |a.Ob+8......^.!.| +00000040 25 ad 52 a5 90 06 0b |%.R....|" +"2019-09-24 00:26:05.795 UTC [msp.identity] Verify -> DEBU 3360 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:05.795 UTC [msp.identity] Verify -> DEBU 3361 Verify: sig = 00000000 30 45 02 21 00 ed 66 3e 6b 80 a4 a7 cf fe 40 30 |0E.!..f>k.....@0| +00000010 70 87 01 ce 69 45 26 d9 c1 1c b5 81 91 b2 71 ef |p...iE&.......q.| +00000020 5c d4 c8 40 86 02 20 2a 0f 76 07 49 53 62 bb 0f |\..@.. *.v.ISb..| +00000030 92 3a 31 56 78 6e 25 5e ae 81 fa c1 9c 63 ad 2b |.:1Vxn%^.....c.+| +00000040 7b 63 da 82 25 5f bd |{c..%_.|" +"2019-09-24 00:26:05.795 UTC [gossip.discovery] handleAliveMessage -> DEBU 3362 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:05.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 3363 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:26:05.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 3364 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:05.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 3365 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:05.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 3366 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:05.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 3367 Exiting" +"2019-09-24 00:26:05.795 UTC [gossip.discovery] handleAliveMessage -> DEBU 3368 Exiting" +"2019-09-24 00:26:05.796 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3369 Exiting" +"2019-09-24 00:26:05.796 UTC [gossip.discovery] sendMemResponse -> DEBU 336a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:05.796 UTC [msp] DeserializeIdentity -> DEBU 336b Obtaining identity" +"2019-09-24 00:26:05.796 UTC [msp] DeserializeIdentity -> DEBU 336c Obtaining identity" +"2019-09-24 00:26:05.796 UTC [gossip.comm] Send -> DEBU 336d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:05.798 UTC [gossip.discovery] sendMemResponse -> DEBU 336e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0204" signature:"0E\002!\000\315)5\014\0046d\310u\003\247\017\020LT\215\313'fJ\255\265\353u\312\312\230Wt\230d\323\002 4\347\017\263\246\311\026.&a\265Ob+8\203\225\030\343\356\003^\222!\207%\255R\245\220\006\013" secret_envelope:k\200\244\247\317\376@0p\207\001\316iE&\331\301\034\265\201\221\262q\357\\\324\310@\206\002 *\017v\007ISb\273\017\222:1Vxn%^\256\201\372\301\234c\255+{c\332\202%_\275" > > alive: " +"2019-09-24 00:26:05.798 UTC [gossip.comm] sendToEndpoint -> DEBU 336f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:05.798 UTC [gossip.comm] sendToEndpoint -> DEBU 3370 Exiting" +"2019-09-24 00:26:06.097 UTC [gossip.comm] func1 -> DEBU 3371 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:06.098 UTC [gossip.gossip] handleMessage -> DEBU 3372 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:06.098 UTC [msp] DeserializeIdentity -> DEBU 3373 Obtaining identity" +"2019-09-24 00:26:06.098 UTC [msp] DeserializeIdentity -> DEBU 3374 Obtaining identity" +"2019-09-24 00:26:06.098 UTC [msp] DeserializeIdentity -> DEBU 3375 Obtaining identity" +"2019-09-24 00:26:06.098 UTC [gossip.gossip] handleMessage -> DEBU 3376 Exiting" +"2019-09-24 00:26:07.329 UTC [gossip.election] waitForInterrupt -> DEBU 3377 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:07.329 UTC [gossip.election] IsLeader -> DEBU 3378 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:07.329 UTC [msp] GetDefaultSigningIdentity -> DEBU 3379 Obtaining default signing identity" +"2019-09-24 00:26:07.329 UTC [msp.identity] Sign -> DEBU 337a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315100F1801 " +"2019-09-24 00:26:07.329 UTC [msp.identity] Sign -> DEBU 337b Sign: digest: 4DE1E9467B74A9B429D911AC5762E260A720DC3CFFDD2714E8A448A22B5D264F " +"2019-09-24 00:26:07.329 UTC [gossip.election] waitForInterrupt -> DEBU 337c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:07.338 UTC [msp] DeserializeIdentity -> DEBU 337d Obtaining identity" +"2019-09-24 00:26:07.338 UTC [msp] DeserializeIdentity -> DEBU 337e Obtaining identity" +"2019-09-24 00:26:07.338 UTC [msp] DeserializeIdentity -> DEBU 337f Obtaining identity" +"2019-09-24 00:26:07.338 UTC [msp] DeserializeIdentity -> DEBU 3380 Obtaining identity" +"2019-09-24 00:26:07.338 UTC [gossip.comm] Send -> DEBU 3381 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:07.339 UTC [msp] DeserializeIdentity -> DEBU 3382 Obtaining identity" +"2019-09-24 00:26:07.339 UTC [msp] DeserializeIdentity -> DEBU 3383 Obtaining identity" +"2019-09-24 00:26:07.339 UTC [gossip.comm] sendToEndpoint -> DEBU 3384 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.339 UTC [gossip.comm] sendToEndpoint -> DEBU 3385 Exiting" +"2019-09-24 00:26:07.711 UTC [gossip.pull] Hello -> DEBU 3386 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:07.711 UTC [gossip.comm] Send -> DEBU 3387 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:07.712 UTC [gossip.pull] Hello -> DEBU 3388 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:07.712 UTC [gossip.comm] Send -> DEBU 3389 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:07.716 UTC [gossip.comm] sendToEndpoint -> DEBU 338a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.717 UTC [gossip.comm] sendToEndpoint -> DEBU 338b Exiting" +"2019-09-24 00:26:07.712 UTC [gossip.pull] Hello -> DEBU 338c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:07.719 UTC [gossip.comm] Send -> DEBU 338d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:07.720 UTC [gossip.comm] sendToEndpoint -> DEBU 338e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.720 UTC [gossip.comm] sendToEndpoint -> DEBU 338f Exiting" +"2019-09-24 00:26:07.720 UTC [gossip.comm] sendToEndpoint -> DEBU 3390 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.720 UTC [gossip.comm] sendToEndpoint -> DEBU 3391 Exiting" +"2019-09-24 00:26:07.725 UTC [gossip.comm] func1 -> DEBU 3392 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.725 UTC [gossip.gossip] handleMessage -> DEBU 3393 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.725 UTC [gossip.pull] HandleMessage -> DEBU 3394 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.725 UTC [gossip.gossip] handleMessage -> DEBU 3395 Exiting" +"2019-09-24 00:26:07.726 UTC [gossip.gossip] handleMessage -> DEBU 3396 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.726 UTC [gossip.pull] HandleMessage -> DEBU 3397 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.726 UTC [gossip.gossip] handleMessage -> DEBU 3398 Exiting" +"2019-09-24 00:26:07.746 UTC [gossip.comm] func1 -> DEBU 3399 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.746 UTC [gossip.comm] func1 -> DEBU 339a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.746 UTC [gossip.gossip] handleMessage -> DEBU 339b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.746 UTC [gossip.gossip] handleMessage -> DEBU 339c Exiting" +"2019-09-24 00:26:07.746 UTC [gossip.gossip] handleMessage -> DEBU 339d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.746 UTC [gossip.pull] HandleMessage -> DEBU 339e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.746 UTC [gossip.gossip] handleMessage -> DEBU 339f Exiting" +"2019-09-24 00:26:07.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33a0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.746 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33a1 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:07.747 UTC [msp.identity] Verify -> DEBU 33a2 Verify: digest = 00000000 af 57 21 df 7d 0d f0 e5 69 dc 0c d0 c2 f5 7c f3 |.W!.}...i.....|.| +00000010 7a 7f 71 7a 58 b0 46 38 bb 47 8d 52 d8 31 45 86 |z.qzX.F8.G.R.1E.|" +"2019-09-24 00:26:07.747 UTC [msp.identity] Verify -> DEBU 33a3 Verify: sig = 00000000 30 44 02 20 79 de 18 2c f0 54 b0 c0 71 10 0a 6d |0D. y..,.T..q..m| +00000010 22 3f 4a 66 f8 99 48 4e 3d 6d b5 c6 77 0c 7d 34 |"?Jf..HN=m..w.}4| +00000020 57 6e 25 fa 02 20 52 41 c9 4f ec 74 6b 05 ca c4 |Wn%.. RA.O.tk...| +00000030 00 4a b3 7c f6 73 22 be 4f d7 a8 d6 10 77 f4 89 |.J.|.s".O....w..| +00000040 cf 11 39 37 28 0f |..97(.|" +"2019-09-24 00:26:07.745 UTC [gossip.comm] func1 -> DEBU 33a4 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.748 UTC [gossip.gossip] handleMessage -> DEBU 33a5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 33a6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 33a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:07.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 33a8 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:07.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 33a9 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:07.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 33aa Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:07.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ab Exiting" +"2019-09-24 00:26:07.751 UTC [gossip.discovery] handleAliveMessage -> DEBU 33ac Exiting" +"2019-09-24 00:26:07.751 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33ad Exiting" +"2019-09-24 00:26:07.751 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33ae Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.751 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33af Exiting" +"2019-09-24 00:26:07.751 UTC [gossip.gossip] handleMessage -> DEBU 33b0 Exiting" +"2019-09-24 00:26:07.752 UTC [gossip.gossip] handleMessage -> DEBU 33b1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.752 UTC [gossip.gossip] handleMessage -> DEBU 33b2 Exiting" +"2019-09-24 00:26:07.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33b3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.756 UTC [msp] DeserializeIdentity -> DEBU 33b4 Obtaining identity" +"2019-09-24 00:26:07.756 UTC [msp] DeserializeIdentity -> DEBU 33b5 Obtaining identity" +"2019-09-24 00:26:07.757 UTC [msp] DeserializeIdentity -> DEBU 33b6 Obtaining identity" +"2019-09-24 00:26:07.757 UTC [gossip.comm] Send -> DEBU 33b7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:07.757 UTC [msp] DeserializeIdentity -> DEBU 33b8 Obtaining identity" +"2019-09-24 00:26:07.757 UTC [gossip.comm] Send -> DEBU 33b9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:07.757 UTC [gossip.comm] sendToEndpoint -> DEBU 33ba Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.757 UTC [gossip.comm] sendToEndpoint -> DEBU 33bb Exiting" +"2019-09-24 00:26:07.757 UTC [gossip.comm] sendToEndpoint -> DEBU 33bc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.757 UTC [gossip.comm] sendToEndpoint -> DEBU 33bd Exiting" +"2019-09-24 00:26:07.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33be Exiting" +"2019-09-24 00:26:07.772 UTC [msp] GetDefaultSigningIdentity -> DEBU 33bf Obtaining default signing identity" +"2019-09-24 00:26:07.773 UTC [msp.identity] Sign -> DEBU 33c0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151031 " +"2019-09-24 00:26:07.773 UTC [msp.identity] Sign -> DEBU 33c1 Sign: digest: 8EBFADE8E504E526AFD1F58F1198FC36C182E1F4E9317A9F37CF4967307CF12B " +"2019-09-24 00:26:07.773 UTC [msp] GetDefaultSigningIdentity -> DEBU 33c2 Obtaining default signing identity" +"2019-09-24 00:26:07.773 UTC [msp.identity] Sign -> DEBU 33c3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:07.773 UTC [msp.identity] Sign -> DEBU 33c4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:07.773 UTC [gossip.comm] Send -> DEBU 33c5 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:07.773 UTC [msp] DeserializeIdentity -> DEBU 33c6 Obtaining identity" +"2019-09-24 00:26:07.773 UTC [gossip.comm] Send -> DEBU 33c7 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:07.774 UTC [msp] DeserializeIdentity -> DEBU 33c8 Obtaining identity" +"2019-09-24 00:26:07.774 UTC [gossip.comm] Send -> DEBU 33c9 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:07.774 UTC [gossip.comm] sendToEndpoint -> DEBU 33ca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.784 UTC [gossip.comm] sendToEndpoint -> DEBU 33cb Exiting" +"2019-09-24 00:26:07.785 UTC [gossip.comm] sendToEndpoint -> DEBU 33cc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.785 UTC [gossip.comm] sendToEndpoint -> DEBU 33cd Exiting" +"2019-09-24 00:26:07.785 UTC [gossip.comm] sendToEndpoint -> DEBU 33ce Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.785 UTC [gossip.comm] sendToEndpoint -> DEBU 33cf Exiting" +"2019-09-24 00:26:07.805 UTC [gossip.comm] func1 -> DEBU 33d0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.805 UTC [gossip.gossip] handleMessage -> DEBU 33d1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.805 UTC [gossip.gossip] handleMessage -> DEBU 33d2 Exiting" +"2019-09-24 00:26:07.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33d3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.806 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33d4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:07.806 UTC [msp.identity] Verify -> DEBU 33d5 Verify: digest = 00000000 8e bf ad e8 e5 04 e5 26 af d1 f5 8f 11 98 fc 36 |.......&.......6| +00000010 c1 82 e1 f4 e9 31 7a 9f 37 cf 49 67 30 7c f1 2b |.....1z.7.Ig0|.+|" +"2019-09-24 00:26:07.806 UTC [msp.identity] Verify -> DEBU 33d6 Verify: sig = 00000000 30 44 02 20 60 57 80 25 0b 83 34 df 2b e6 c5 5c |0D. `W.%..4.+..\| +00000010 54 1d 6c 0b 39 a6 27 ca be 97 da ce e0 2c 92 69 |T.l.9.'......,.i| +00000020 cf 16 33 84 02 20 55 74 e3 d6 c9 9f e2 c5 3f f5 |..3.. Ut......?.| +00000030 cb 5f 9b b4 1c 04 b1 e0 2b 00 1c 9a 72 80 fa 12 |._......+...r...| +00000040 8a 5b 5f 45 0b 61 |.[_E.a|" +"2019-09-24 00:26:07.807 UTC [msp.identity] Verify -> DEBU 33d7 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:07.807 UTC [msp.identity] Verify -> DEBU 33d8 Verify: sig = 00000000 30 45 02 21 00 ea ae 09 a3 d9 e5 a1 42 0a 4c b2 |0E.!........B.L.| +00000010 7b e8 25 a0 76 b1 d7 2c 47 60 63 5b 2e f4 d1 df |{.%.v..,G`c[....| +00000020 a4 c1 0b f9 32 02 20 36 8b 63 94 7b 05 a2 6d 68 |....2. 6.c.{..mh| +00000030 ea 27 ce 95 d1 21 a5 0f 2b f4 71 ba b0 23 9e ba |.'...!..+.q..#..| +00000040 2c 6a ae 01 be 5d 3a |,j...]:|" +"2019-09-24 00:26:07.809 UTC [gossip.comm] func1 -> DEBU 33d9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.810 UTC [gossip.gossip] handleMessage -> DEBU 33da Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 33db Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:07.848 UTC [gossip.discovery] isSentByMe -> DEBU 33dc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:07.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 33dd Exiting" +"2019-09-24 00:26:07.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33de Exiting" +"2019-09-24 00:26:07.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.849 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33e0 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:07.849 UTC [msp.identity] Verify -> DEBU 33e1 Verify: digest = 00000000 8e bf ad e8 e5 04 e5 26 af d1 f5 8f 11 98 fc 36 |.......&.......6| +00000010 c1 82 e1 f4 e9 31 7a 9f 37 cf 49 67 30 7c f1 2b |.....1z.7.Ig0|.+|" +"2019-09-24 00:26:07.849 UTC [msp.identity] Verify -> DEBU 33e2 Verify: sig = 00000000 30 44 02 20 60 57 80 25 0b 83 34 df 2b e6 c5 5c |0D. `W.%..4.+..\| +00000010 54 1d 6c 0b 39 a6 27 ca be 97 da ce e0 2c 92 69 |T.l.9.'......,.i| +00000020 cf 16 33 84 02 20 55 74 e3 d6 c9 9f e2 c5 3f f5 |..3.. Ut......?.| +00000030 cb 5f 9b b4 1c 04 b1 e0 2b 00 1c 9a 72 80 fa 12 |._......+...r...| +00000040 8a 5b 5f 45 0b 61 |.[_E.a|" +"2019-09-24 00:26:07.850 UTC [gossip.gossip] handleMessage -> DEBU 33e3 Exiting" +"2019-09-24 00:26:07.850 UTC [gossip.gossip] handleMessage -> DEBU 33e4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.850 UTC [gossip.discovery] handleAliveMessage -> DEBU 33e5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.850 UTC [gossip.discovery] isSentByMe -> DEBU 33e6 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 33e7 Exiting" +"2019-09-24 00:26:07.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33e8 Exiting" +"2019-09-24 00:26:07.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33e9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33ea Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:07.851 UTC [msp.identity] Verify -> DEBU 33eb Verify: digest = 00000000 8e bf ad e8 e5 04 e5 26 af d1 f5 8f 11 98 fc 36 |.......&.......6| +00000010 c1 82 e1 f4 e9 31 7a 9f 37 cf 49 67 30 7c f1 2b |.....1z.7.Ig0|.+|" +"2019-09-24 00:26:07.851 UTC [msp.identity] Verify -> DEBU 33ec Verify: sig = 00000000 30 44 02 20 60 57 80 25 0b 83 34 df 2b e6 c5 5c |0D. `W.%..4.+..\| +00000010 54 1d 6c 0b 39 a6 27 ca be 97 da ce e0 2c 92 69 |T.l.9.'......,.i| +00000020 cf 16 33 84 02 20 55 74 e3 d6 c9 9f e2 c5 3f f5 |..3.. Ut......?.| +00000030 cb 5f 9b b4 1c 04 b1 e0 2b 00 1c 9a 72 80 fa 12 |._......+...r...| +00000040 8a 5b 5f 45 0b 61 |.[_E.a|" +"2019-09-24 00:26:07.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 33ed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.852 UTC [gossip.discovery] isSentByMe -> DEBU 33ee Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:07.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 33ef Exiting" +"2019-09-24 00:26:07.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33f0 Exiting" +"2019-09-24 00:26:07.852 UTC [gossip.gossip] handleMessage -> DEBU 33f1 Exiting" +"2019-09-24 00:26:07.955 UTC [gossip.gossip] handleMessage -> DEBU 33f2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.955 UTC [gossip.pull] HandleMessage -> DEBU 33f3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.955 UTC [msp] DeserializeIdentity -> DEBU 33f4 Obtaining identity" +"2019-09-24 00:26:07.955 UTC [msp] DeserializeIdentity -> DEBU 33f5 Obtaining identity" +"2019-09-24 00:26:07.955 UTC [msp] DeserializeIdentity -> DEBU 33f6 Obtaining identity" +"2019-09-24 00:26:07.956 UTC [msp] DeserializeIdentity -> DEBU 33f7 Obtaining identity" +"2019-09-24 00:26:07.956 UTC [msp] DeserializeIdentity -> DEBU 33f8 Obtaining identity" +"2019-09-24 00:26:07.956 UTC [msp] DeserializeIdentity -> DEBU 33f9 Obtaining identity" +"2019-09-24 00:26:07.956 UTC [gossip.pull] SendDigest -> DEBU 33fa Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:07.956 UTC [gossip.gossip] handleMessage -> DEBU 33fb Exiting" +"2019-09-24 00:26:07.999 UTC [gossip.gossip] handleMessage -> DEBU 33fc Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.999 UTC [gossip.gossip] handleMessage -> DEBU 33fd Exiting" +"2019-09-24 00:26:07.999 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33fe Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:07.999 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33ff Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:07.999 UTC [msp] DeserializeIdentity -> DEBU 3400 Obtaining identity" +"2019-09-24 00:26:07.999 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3401 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:07.999 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3402 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:07.999 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3403 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.000 UTC [policies] Evaluate -> DEBU 3404 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:08.000 UTC [policies] Evaluate -> DEBU 3405 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:08.000 UTC [policies] Evaluate -> DEBU 3406 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:08.000 UTC [cauthdsl] func1 -> DEBU 3407 0xc0030eeda0 gate 1569284768000267500 evaluation starts" +"2019-09-24 00:26:08.000 UTC [cauthdsl] func2 -> DEBU 3408 0xc0030eeda0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.000 UTC [cauthdsl] func2 -> DEBU 3409 0xc0030eeda0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.000 UTC [cauthdsl] func2 -> DEBU 340a 0xc0030eeda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:08.000 UTC [cauthdsl] func2 -> DEBU 340b 0xc0030eeda0 principal evaluation fails" +"2019-09-24 00:26:08.000 UTC [cauthdsl] func1 -> DEBU 340c 0xc0030eeda0 gate 1569284768000267500 evaluation fails" +"2019-09-24 00:26:08.004 UTC [policies] Evaluate -> DEBU 340d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.004 UTC [policies] Evaluate -> DEBU 340e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.005 UTC [policies] Evaluate -> DEBU 340f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:08.005 UTC [cauthdsl] func1 -> DEBU 3410 0xc0030ef5e0 gate 1569284768005142300 evaluation starts" +"2019-09-24 00:26:08.005 UTC [cauthdsl] func2 -> DEBU 3411 0xc0030ef5e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.005 UTC [cauthdsl] func2 -> DEBU 3412 0xc0030ef5e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.005 UTC [cauthdsl] func2 -> DEBU 3413 0xc0030ef5e0 principal matched by identity 0" +"2019-09-24 00:26:08.013 UTC [msp.identity] Verify -> DEBU 3414 Verify: digest = 00000000 6d 2d 5d 87 c0 86 57 94 fd 77 55 05 b2 ad 74 8a |m-]...W..wU...t.| +00000010 06 27 b3 c7 6b 41 b0 d2 a8 95 23 ae 5b 33 08 21 |.'..kA....#.[3.!|" +"2019-09-24 00:26:08.013 UTC [msp.identity] Verify -> DEBU 3415 Verify: sig = 00000000 30 44 02 20 13 32 9d d3 66 6c 33 18 32 ed 26 fc |0D. .2..fl3.2.&.| +00000010 33 0d 2b 44 3d 38 21 df 0e a6 05 69 4b 4d 50 bb |3.+D=8!....iKMP.| +00000020 d9 0c 97 c0 02 20 49 c3 89 1e b9 10 d3 e1 d6 4f |..... I........O| +00000030 ce dc 53 7e 65 a5 c3 fb 20 07 73 fb 69 ff 55 c2 |..S~e... .s.i.U.| +00000040 90 b1 b5 13 fc ab |......|" +"2019-09-24 00:26:08.015 UTC [cauthdsl] func2 -> DEBU 3416 0xc0030ef5e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:08.015 UTC [cauthdsl] func1 -> DEBU 3417 0xc0030ef5e0 gate 1569284768005142300 evaluation succeeds" +"2019-09-24 00:26:08.015 UTC [policies] Evaluate -> DEBU 3418 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.015 UTC [policies] Evaluate -> DEBU 3419 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.016 UTC [policies] Evaluate -> DEBU 341a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:08.016 UTC [policies] Evaluate -> DEBU 341b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:08.016 UTC [gossip.discovery] handleAliveMessage -> DEBU 341c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:08.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 341d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:08.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 341e updating membership: timestamp: " +"2019-09-24 00:26:08.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 341f Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:08.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 3420 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:08.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 3421 Exiting" +"2019-09-24 00:26:08.019 UTC [gossip.discovery] handleAliveMessage -> DEBU 3422 Exiting" +"2019-09-24 00:26:08.019 UTC [gossip.discovery] sendMemResponse -> DEBU 3423 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:08.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3424 Exiting" +"2019-09-24 00:26:08.019 UTC [msp] DeserializeIdentity -> DEBU 3425 Obtaining identity" +"2019-09-24 00:26:08.019 UTC [msp] DeserializeIdentity -> DEBU 3426 Obtaining identity" +"2019-09-24 00:26:08.019 UTC [msp] DeserializeIdentity -> DEBU 3427 Obtaining identity" +"2019-09-24 00:26:08.019 UTC [gossip.comm] Send -> DEBU 3428 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:08.020 UTC [gossip.discovery] sendMemResponse -> DEBU 3429 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0205" signature:"0D\002 y\336\030,\360T\260\300q\020\nm\"?Jf\370\231HN=m\265\306w\014}4Wn%\372\002 RA\311O\354tk\005\312\304\000J\263|\366s\"\276O\327\250\326\020w\364\211\317\02197(\017" > alive:\024\230\t\305\263\337-\227\245\3615>T:\264\355\253\340I\340\213\263\302\261\264\241R\334\002 \037\201\036\255\234\3502\253\256\305\035b(w\220\203\353\344\016b\321\367W\222\314)\311\233\030\201Z\261" > alive: alive: " +"2019-09-24 00:26:08.020 UTC [gossip.comm] sendToEndpoint -> DEBU 342a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.020 UTC [gossip.comm] sendToEndpoint -> DEBU 342b Exiting" +"2019-09-24 00:26:08.152 UTC [msp] DeserializeIdentity -> DEBU 342c Obtaining identity" +"2019-09-24 00:26:08.153 UTC [msp] DeserializeIdentity -> DEBU 342d Obtaining identity" +"2019-09-24 00:26:08.153 UTC [gossip.comm] Send -> DEBU 342e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 342f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3430 Exiting" +"2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3431 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3432 Exiting" +"2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3433 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.155 UTC [gossip.comm] sendToEndpoint -> DEBU 3434 Exiting" +"2019-09-24 00:26:08.161 UTC [gossip.comm] func1 -> DEBU 3435 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.161 UTC [gossip.gossip] handleMessage -> DEBU 3436 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.161 UTC [msp] DeserializeIdentity -> DEBU 3437 Obtaining identity" +"2019-09-24 00:26:08.161 UTC [msp] DeserializeIdentity -> DEBU 3438 Obtaining identity" +"2019-09-24 00:26:08.161 UTC [msp] DeserializeIdentity -> DEBU 3439 Obtaining identity" +"2019-09-24 00:26:08.161 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 343a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:08.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 343b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 343c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.161 UTC [policies] Evaluate -> DEBU 343d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:08.162 UTC [policies] Evaluate -> DEBU 343e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:08.162 UTC [policies] Evaluate -> DEBU 343f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:08.162 UTC [cauthdsl] func1 -> DEBU 3440 0xc0030d9910 gate 1569284768162124800 evaluation starts" +"2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 3441 0xc0030d9910 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 3442 0xc0030d9910 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 3443 0xc0030d9910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 3444 0xc0030d9910 principal evaluation fails" +"2019-09-24 00:26:08.162 UTC [cauthdsl] func1 -> DEBU 3445 0xc0030d9910 gate 1569284768162124800 evaluation fails" +"2019-09-24 00:26:08.162 UTC [policies] Evaluate -> DEBU 3446 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.162 UTC [policies] Evaluate -> DEBU 3447 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.162 UTC [policies] Evaluate -> DEBU 3448 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:08.162 UTC [cauthdsl] func1 -> DEBU 3449 0xc003048190 gate 1569284768162580800 evaluation starts" +"2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 344a 0xc003048190 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 344b 0xc003048190 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.162 UTC [cauthdsl] func2 -> DEBU 344c 0xc003048190 principal matched by identity 0" +"2019-09-24 00:26:08.162 UTC [msp.identity] Verify -> DEBU 344d Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:08.162 UTC [msp.identity] Verify -> DEBU 344e Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:08.163 UTC [cauthdsl] func2 -> DEBU 344f 0xc003048190 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:08.163 UTC [cauthdsl] func1 -> DEBU 3450 0xc003048190 gate 1569284768162580800 evaluation succeeds" +"2019-09-24 00:26:08.163 UTC [policies] Evaluate -> DEBU 3451 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.163 UTC [policies] Evaluate -> DEBU 3452 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.163 UTC [policies] Evaluate -> DEBU 3453 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:08.163 UTC [policies] Evaluate -> DEBU 3454 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:08.163 UTC [msp.identity] Verify -> DEBU 3455 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:08.163 UTC [msp.identity] Verify -> DEBU 3456 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:08.163 UTC [msp] DeserializeIdentity -> DEBU 3457 Obtaining identity" +"2019-09-24 00:26:08.164 UTC [msp] DeserializeIdentity -> DEBU 3458 Obtaining identity" +"2019-09-24 00:26:08.164 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3459 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:08.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 345a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 345b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.164 UTC [policies] Evaluate -> DEBU 345c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:08.164 UTC [policies] Evaluate -> DEBU 345d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:08.164 UTC [policies] Evaluate -> DEBU 345e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:08.164 UTC [cauthdsl] func1 -> DEBU 345f 0xc002c16080 gate 1569284768164457100 evaluation starts" +"2019-09-24 00:26:08.164 UTC [cauthdsl] func2 -> DEBU 3460 0xc002c16080 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.164 UTC [cauthdsl] func2 -> DEBU 3461 0xc002c16080 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.165 UTC [cauthdsl] func2 -> DEBU 3463 0xc002c16080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:08.165 UTC [cauthdsl] func2 -> DEBU 3464 0xc002c16080 principal evaluation fails" +"2019-09-24 00:26:08.165 UTC [cauthdsl] func1 -> DEBU 3465 0xc002c16080 gate 1569284768164457100 evaluation fails" +"2019-09-24 00:26:08.166 UTC [policies] Evaluate -> DEBU 3466 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.166 UTC [policies] Evaluate -> DEBU 3467 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.166 UTC [policies] Evaluate -> DEBU 3468 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:08.166 UTC [cauthdsl] func1 -> DEBU 3469 0xc002c16900 gate 1569284768166138400 evaluation starts" +"2019-09-24 00:26:08.166 UTC [cauthdsl] func2 -> DEBU 346a 0xc002c16900 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.166 UTC [cauthdsl] func2 -> DEBU 346b 0xc002c16900 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.165 UTC [gossip.comm] func1 -> DEBU 3462 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.166 UTC [cauthdsl] func2 -> DEBU 346c 0xc002c16900 principal matched by identity 0" +"2019-09-24 00:26:08.178 UTC [msp.identity] Verify -> DEBU 346d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:08.178 UTC [msp.identity] Verify -> DEBU 346e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:08.178 UTC [cauthdsl] func2 -> DEBU 346f 0xc002c16900 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:08.179 UTC [cauthdsl] func1 -> DEBU 3470 0xc002c16900 gate 1569284768166138400 evaluation succeeds" +"2019-09-24 00:26:08.179 UTC [policies] Evaluate -> DEBU 3471 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.179 UTC [policies] Evaluate -> DEBU 3472 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.179 UTC [policies] Evaluate -> DEBU 3473 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:08.179 UTC [policies] Evaluate -> DEBU 3474 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:08.179 UTC [msp.identity] Verify -> DEBU 3475 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:08.179 UTC [msp.identity] Verify -> DEBU 3476 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:08.179 UTC [gossip.gossip] handleMessage -> DEBU 3477 Exiting" +"2019-09-24 00:26:08.179 UTC [gossip.gossip] handleMessage -> DEBU 3478 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.179 UTC [msp] DeserializeIdentity -> DEBU 3479 Obtaining identity" +"2019-09-24 00:26:08.179 UTC [msp] DeserializeIdentity -> DEBU 347a Obtaining identity" +"2019-09-24 00:26:08.179 UTC [msp] DeserializeIdentity -> DEBU 347b Obtaining identity" +"2019-09-24 00:26:08.180 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 347c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:08.180 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 347d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.180 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 347e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.180 UTC [policies] Evaluate -> DEBU 347f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:08.180 UTC [policies] Evaluate -> DEBU 3480 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:08.180 UTC [policies] Evaluate -> DEBU 3481 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:08.180 UTC [cauthdsl] func1 -> DEBU 3482 0xc002beac90 gate 1569284768180889900 evaluation starts" +"2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 3483 0xc002beac90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 3484 0xc002beac90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 3485 0xc002beac90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 3486 0xc002beac90 principal evaluation fails" +"2019-09-24 00:26:08.181 UTC [cauthdsl] func1 -> DEBU 3487 0xc002beac90 gate 1569284768180889900 evaluation fails" +"2019-09-24 00:26:08.181 UTC [policies] Evaluate -> DEBU 3488 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.181 UTC [policies] Evaluate -> DEBU 3489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.181 UTC [policies] Evaluate -> DEBU 348a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:08.181 UTC [cauthdsl] func1 -> DEBU 348b 0xc002beb4d0 gate 1569284768181401900 evaluation starts" +"2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 348c 0xc002beb4d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 348d 0xc002beb4d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.181 UTC [cauthdsl] func2 -> DEBU 348e 0xc002beb4d0 principal matched by identity 0" +"2019-09-24 00:26:08.181 UTC [msp.identity] Verify -> DEBU 348f Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:08.182 UTC [msp.identity] Verify -> DEBU 3490 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:08.182 UTC [cauthdsl] func2 -> DEBU 3491 0xc002beb4d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:08.182 UTC [cauthdsl] func1 -> DEBU 3492 0xc002beb4d0 gate 1569284768181401900 evaluation succeeds" +"2019-09-24 00:26:08.182 UTC [policies] Evaluate -> DEBU 3493 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.182 UTC [policies] Evaluate -> DEBU 3494 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.182 UTC [policies] Evaluate -> DEBU 3495 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:08.182 UTC [policies] Evaluate -> DEBU 3496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:08.183 UTC [msp.identity] Verify -> DEBU 3497 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:08.183 UTC [msp.identity] Verify -> DEBU 3498 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:08.194 UTC [msp.identity] Verify -> DEBU 3499 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:08.194 UTC [msp.identity] Verify -> DEBU 349a Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:08.194 UTC [msp] DeserializeIdentity -> DEBU 349b Obtaining identity" +"2019-09-24 00:26:08.194 UTC [msp] DeserializeIdentity -> DEBU 349c Obtaining identity" +"2019-09-24 00:26:08.194 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 349d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:08.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 349e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 349f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:08.195 UTC [cauthdsl] func1 -> DEBU 34a3 0xc002bdbae0 gate 1569284768195238900 evaluation starts" +"2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34a4 0xc002bdbae0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34a5 0xc002bdbae0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34a6 0xc002bdbae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34a7 0xc002bdbae0 principal evaluation fails" +"2019-09-24 00:26:08.195 UTC [cauthdsl] func1 -> DEBU 34a8 0xc002bdbae0 gate 1569284768195238900 evaluation fails" +"2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.195 UTC [policies] Evaluate -> DEBU 34ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:08.195 UTC [cauthdsl] func1 -> DEBU 34ac 0xc002b46330 gate 1569284768195688400 evaluation starts" +"2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34ad 0xc002b46330 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34ae 0xc002b46330 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.195 UTC [cauthdsl] func2 -> DEBU 34af 0xc002b46330 principal matched by identity 0" +"2019-09-24 00:26:08.195 UTC [msp.identity] Verify -> DEBU 34b0 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:08.195 UTC [msp.identity] Verify -> DEBU 34b1 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:08.196 UTC [cauthdsl] func2 -> DEBU 34b2 0xc002b46330 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:08.196 UTC [cauthdsl] func1 -> DEBU 34b3 0xc002b46330 gate 1569284768195688400 evaluation succeeds" +"2019-09-24 00:26:08.196 UTC [policies] Evaluate -> DEBU 34b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.196 UTC [policies] Evaluate -> DEBU 34b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.196 UTC [policies] Evaluate -> DEBU 34b6 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:08.196 UTC [policies] Evaluate -> DEBU 34b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:08.196 UTC [gossip.gossip] handleMessage -> DEBU 34b8 Exiting" +"2019-09-24 00:26:08.197 UTC [gossip.gossip] handleMessage -> DEBU 34b9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.198 UTC [msp.identity] Verify -> DEBU 34ba Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:08.199 UTC [msp.identity] Verify -> DEBU 34bb Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:08.200 UTC [msp.identity] Verify -> DEBU 34bc Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:08.200 UTC [msp.identity] Verify -> DEBU 34bd Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:08.201 UTC [msp] DeserializeIdentity -> DEBU 34be Obtaining identity" +"2019-09-24 00:26:08.201 UTC [msp] DeserializeIdentity -> DEBU 34bf Obtaining identity" +"2019-09-24 00:26:08.223 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:08.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34c1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34c2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func1 -> DEBU 34c6 0xc002b1abc0 gate 1569284768223399600 evaluation starts" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34c7 0xc002b1abc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34c8 0xc002b1abc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34c9 0xc002b1abc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34ca 0xc002b1abc0 principal evaluation fails" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func1 -> DEBU 34cb 0xc002b1abc0 gate 1569284768223399600 evaluation fails" +"2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.223 UTC [policies] Evaluate -> DEBU 34ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func1 -> DEBU 34cf 0xc002b1b400 gate 1569284768223671600 evaluation starts" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34d0 0xc002b1b400 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34d1 0xc002b1b400 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34d2 0xc002b1b400 principal matched by identity 0" +"2019-09-24 00:26:08.223 UTC [msp.identity] Verify -> DEBU 34d3 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:08.223 UTC [msp.identity] Verify -> DEBU 34d4 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func2 -> DEBU 34d5 0xc002b1b400 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:08.223 UTC [cauthdsl] func1 -> DEBU 34d6 0xc002b1b400 gate 1569284768223671600 evaluation succeeds" +"2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34d9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:08.224 UTC [msp] DeserializeIdentity -> DEBU 34db Obtaining identity" +"2019-09-24 00:26:08.224 UTC [msp] DeserializeIdentity -> DEBU 34dc Obtaining identity" +"2019-09-24 00:26:08.224 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:08.224 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34de Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.224 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34df Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:08.224 UTC [cauthdsl] func1 -> DEBU 34e3 0xc002aa4c70 gate 1569284768224525500 evaluation starts" +"2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34e4 0xc002aa4c70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34e5 0xc002aa4c70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34e6 0xc002aa4c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34e7 0xc002aa4c70 principal evaluation fails" +"2019-09-24 00:26:08.224 UTC [cauthdsl] func1 -> DEBU 34e8 0xc002aa4c70 gate 1569284768224525500 evaluation fails" +"2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34e9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.224 UTC [policies] Evaluate -> DEBU 34eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:08.224 UTC [cauthdsl] func1 -> DEBU 34ec 0xc002aa54b0 gate 1569284768224887200 evaluation starts" +"2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34ed 0xc002aa54b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34ee 0xc002aa54b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.224 UTC [cauthdsl] func2 -> DEBU 34ef 0xc002aa54b0 principal matched by identity 0" +"2019-09-24 00:26:08.225 UTC [msp.identity] Verify -> DEBU 34f0 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:08.225 UTC [msp.identity] Verify -> DEBU 34f1 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:08.225 UTC [cauthdsl] func2 -> DEBU 34f2 0xc002aa54b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:08.225 UTC [cauthdsl] func1 -> DEBU 34f3 0xc002aa54b0 gate 1569284768224887200 evaluation succeeds" +"2019-09-24 00:26:08.225 UTC [policies] Evaluate -> DEBU 34f4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.225 UTC [policies] Evaluate -> DEBU 34f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.225 UTC [policies] Evaluate -> DEBU 34f6 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:08.225 UTC [policies] Evaluate -> DEBU 34f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:08.225 UTC [gossip.gossip] handleMessage -> DEBU 34f8 Exiting" +"2019-09-24 00:26:08.307 UTC [msp] DeserializeIdentity -> DEBU 34f9 Obtaining identity" +"2019-09-24 00:26:08.307 UTC [msp] DeserializeIdentity -> DEBU 34fa Obtaining identity" +"2019-09-24 00:26:08.307 UTC [gossip.pull] Hello -> DEBU 34fb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:08.307 UTC [msp] DeserializeIdentity -> DEBU 34fc Obtaining identity" +"2019-09-24 00:26:08.307 UTC [msp] DeserializeIdentity -> DEBU 34fd Obtaining identity" +"2019-09-24 00:26:08.307 UTC [gossip.comm] Send -> DEBU 34fe Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:08.307 UTC [gossip.comm] sendToEndpoint -> DEBU 34ff Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.307 UTC [gossip.comm] sendToEndpoint -> DEBU 3500 Exiting" +"2019-09-24 00:26:08.308 UTC [gossip.comm] func1 -> DEBU 3501 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.308 UTC [gossip.gossip] handleMessage -> DEBU 3502 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.308 UTC [gossip.pull] HandleMessage -> DEBU 3503 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.308 UTC [gossip.gossip] handleMessage -> DEBU 3504 Exiting" +"2019-09-24 00:26:08.646 UTC [gossip.comm] func1 -> DEBU 3505 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.646 UTC [gossip.gossip] handleMessage -> DEBU 3506 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.647 UTC [msp] DeserializeIdentity -> DEBU 3507 Obtaining identity" +"2019-09-24 00:26:08.647 UTC [msp] DeserializeIdentity -> DEBU 3508 Obtaining identity" +"2019-09-24 00:26:08.647 UTC [gossip.gossip] handleMessage -> DEBU 3509 Exiting" +"2019-09-24 00:26:08.725 UTC [gossip.comm] func1 -> DEBU 350a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.725 UTC [gossip.gossip] handleMessage -> DEBU 350b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.725 UTC [gossip.gossip] handleMessage -> DEBU 350c Exiting" +"2019-09-24 00:26:08.725 UTC [gossip.discovery] handleMsgFromComm -> DEBU 350d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.725 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 350e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:08.725 UTC [msp] DeserializeIdentity -> DEBU 350f Obtaining identity" +"2019-09-24 00:26:08.725 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3510 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:08.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3511 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3512 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:08.725 UTC [policies] Evaluate -> DEBU 3513 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 3514 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 3515 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func1 -> DEBU 3516 0xc002a2f830 gate 1569284768726079600 evaluation starts" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3517 0xc002a2f830 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3518 0xc002a2f830 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3519 0xc002a2f830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 351a 0xc002a2f830 principal evaluation fails" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func1 -> DEBU 351b 0xc002a2f830 gate 1569284768726079600 evaluation fails" +"2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 351c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 351d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 351e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func1 -> DEBU 351f 0xc002a26070 gate 1569284768726347400 evaluation starts" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3520 0xc002a26070 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3521 0xc002a26070 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3522 0xc002a26070 principal matched by identity 0" +"2019-09-24 00:26:08.726 UTC [msp.identity] Verify -> DEBU 3523 Verify: digest = 00000000 dc 13 fd 54 d9 fd 6f ba 30 cf 15 f2 9b 23 8b 6d |...T..o.0....#.m| +00000010 1a 60 26 68 1c 48 e7 a5 78 dc a0 4a c5 ba 69 52 |.`&h.H..x..J..iR|" +"2019-09-24 00:26:08.726 UTC [msp.identity] Verify -> DEBU 3524 Verify: sig = 00000000 30 44 02 20 7c 47 2c 82 27 7c a6 e4 4d 17 30 13 |0D. |G,.'|..M.0.| +00000010 df 16 6e 8a cf a9 d0 a9 08 cf 04 d9 ae c4 fc 49 |..n............I| +00000020 03 7b fa e9 02 20 79 8e f0 e9 ae c6 f7 01 5d 33 |.{... y.......]3| +00000030 40 29 94 af 7a 81 99 d3 50 82 45 87 22 1d 28 c4 |@)..z...P.E.".(.| +00000040 2f 2d 9b 83 e6 11 |/-....|" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func2 -> DEBU 3525 0xc002a26070 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:08.726 UTC [cauthdsl] func1 -> DEBU 3526 0xc002a26070 gate 1569284768726347400 evaluation succeeds" +"2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 3527 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 3528 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 3529 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:08.726 UTC [policies] Evaluate -> DEBU 352a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:08.726 UTC [gossip.discovery] handleAliveMessage -> DEBU 352b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:08.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 352c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:08.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 352d updating membership: timestamp: " +"2019-09-24 00:26:08.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 352e Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:08.726 UTC [gossip.discovery] learnExistingMembers -> DEBU 352f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:08.727 UTC [gossip.discovery] learnExistingMembers -> DEBU 3530 Exiting" +"2019-09-24 00:26:08.727 UTC [gossip.discovery] handleAliveMessage -> DEBU 3531 Exiting" +"2019-09-24 00:26:08.727 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3532 Exiting" +"2019-09-24 00:26:08.727 UTC [gossip.discovery] sendMemResponse -> DEBU 3533 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:08.727 UTC [msp] DeserializeIdentity -> DEBU 3534 Obtaining identity" +"2019-09-24 00:26:08.727 UTC [msp] DeserializeIdentity -> DEBU 3535 Obtaining identity" +"2019-09-24 00:26:08.727 UTC [msp] DeserializeIdentity -> DEBU 3536 Obtaining identity" +"2019-09-24 00:26:08.727 UTC [gossip.comm] Send -> DEBU 3537 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:08.727 UTC [gossip.discovery] sendMemResponse -> DEBU 3538 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0205" signature:"0D\002 y\336\030,\360T\260\300q\020\nm\"?Jf\370\231HN=m\265\306w\014}4Wn%\372\002 RA\311O\354tk\005\312\304\000J\263|\366s\"\276O\327\250\326\020w\364\211\317\02197(\017" > alive: alive: alive: " +"2019-09-24 00:26:08.727 UTC [gossip.comm] sendToEndpoint -> DEBU 3539 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.727 UTC [gossip.comm] sendToEndpoint -> DEBU 353a Exiting" +"2019-09-24 00:26:08.747 UTC [gossip.comm] func1 -> DEBU 353b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.747 UTC [gossip.gossip] handleMessage -> DEBU 353c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.747 UTC [gossip.pull] HandleMessage -> DEBU 353d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.747 UTC [msp] DeserializeIdentity -> DEBU 353e Obtaining identity" +"2019-09-24 00:26:08.747 UTC [msp] DeserializeIdentity -> DEBU 353f Obtaining identity" +"2019-09-24 00:26:08.747 UTC [msp] DeserializeIdentity -> DEBU 3540 Obtaining identity" +"2019-09-24 00:26:08.747 UTC [msp] DeserializeIdentity -> DEBU 3541 Obtaining identity" +"2019-09-24 00:26:08.747 UTC [msp] DeserializeIdentity -> DEBU 3542 Obtaining identity" +"2019-09-24 00:26:08.748 UTC [msp] DeserializeIdentity -> DEBU 3543 Obtaining identity" +"2019-09-24 00:26:08.748 UTC [gossip.pull] SendDigest -> DEBU 3544 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:08.748 UTC [gossip.gossip] handleMessage -> DEBU 3545 Exiting" +"2019-09-24 00:26:08.849 UTC [gossip.comm] func1 -> DEBU 3546 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.849 UTC [gossip.gossip] handleMessage -> DEBU 3547 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.849 UTC [gossip.pull] HandleMessage -> DEBU 3548 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:08.849 UTC [gossip.pull] SendDigest -> DEBU 3549 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:08.850 UTC [gossip.gossip] handleMessage -> DEBU 354a Exiting" +"2019-09-24 00:26:09.143 UTC [gossip.gossip] handleMessage -> DEBU 354b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:09.143 UTC [msp] DeserializeIdentity -> DEBU 354c Obtaining identity" +"2019-09-24 00:26:09.143 UTC [msp] DeserializeIdentity -> DEBU 354d Obtaining identity" +"2019-09-24 00:26:09.143 UTC [msp] DeserializeIdentity -> DEBU 354e Obtaining identity" +"2019-09-24 00:26:09.144 UTC [gossip.gossip] handleMessage -> DEBU 354f Exiting" +"2019-09-24 00:26:09.625 UTC [msp] GetDefaultSigningIdentity -> DEBU 3550 Obtaining default signing identity" +"2019-09-24 00:26:09.625 UTC [msp.identity] Sign -> DEBU 3551 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151032 " +"2019-09-24 00:26:09.625 UTC [msp.identity] Sign -> DEBU 3552 Sign: digest: 4EAC1F592D305E81128EDA2017A855A3501DD070D3D6087FAB2709EF1D750DC3 " +"2019-09-24 00:26:09.625 UTC [msp] GetDefaultSigningIdentity -> DEBU 3553 Obtaining default signing identity" +"2019-09-24 00:26:09.625 UTC [msp.identity] Sign -> DEBU 3554 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:09.625 UTC [msp.identity] Sign -> DEBU 3555 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:09.626 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3556 Sleeping 5s" +"2019-09-24 00:26:09.639 UTC [msp] DeserializeIdentity -> DEBU 3557 Obtaining identity" +"2019-09-24 00:26:09.639 UTC [msp] DeserializeIdentity -> DEBU 3558 Obtaining identity" +"2019-09-24 00:26:09.639 UTC [gossip.comm] Send -> DEBU 3559 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:09.639 UTC [msp] DeserializeIdentity -> DEBU 355a Obtaining identity" +"2019-09-24 00:26:09.639 UTC [gossip.comm] Send -> DEBU 355b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:09.639 UTC [msp] DeserializeIdentity -> DEBU 355c Obtaining identity" +"2019-09-24 00:26:09.639 UTC [gossip.comm] Send -> DEBU 355d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:09.639 UTC [gossip.comm] sendToEndpoint -> DEBU 355e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:09.639 UTC [gossip.comm] sendToEndpoint -> DEBU 355f Exiting" +"2019-09-24 00:26:09.640 UTC [gossip.comm] sendToEndpoint -> DEBU 3560 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:09.640 UTC [gossip.comm] sendToEndpoint -> DEBU 3561 Exiting" +"2019-09-24 00:26:09.640 UTC [gossip.comm] sendToEndpoint -> DEBU 3562 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:09.640 UTC [gossip.comm] sendToEndpoint -> DEBU 3563 Exiting" +"2019-09-24 00:26:09.667 UTC [gossip.comm] func1 -> DEBU 3564 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:09.667 UTC [gossip.gossip] handleMessage -> DEBU 3565 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:09.667 UTC [gossip.gossip] handleMessage -> DEBU 3566 Exiting" +"2019-09-24 00:26:09.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3567 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:09.667 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3568 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:09.667 UTC [msp.identity] Verify -> DEBU 3569 Verify: digest = 00000000 4e ac 1f 59 2d 30 5e 81 12 8e da 20 17 a8 55 a3 |N..Y-0^.... ..U.| +00000010 50 1d d0 70 d3 d6 08 7f ab 27 09 ef 1d 75 0d c3 |P..p.....'...u..|" +"2019-09-24 00:26:09.667 UTC [msp.identity] Verify -> DEBU 356a Verify: sig = 00000000 30 44 02 20 60 4f fb 6a f4 76 30 d1 83 9c e7 8e |0D. `O.j.v0.....| +00000010 1d 8f 20 79 a1 17 96 d4 ce 89 a8 dd 7d 82 6d 54 |.. y........}.mT| +00000020 7b 4e 90 e5 02 20 3a ed f8 38 1d 60 2b f2 bd 6a |{N... :..8.`+..j| +00000030 1f ca aa be 58 3b 28 a1 4e ec 42 1e de 0e a7 e7 |....X;(.N.B.....| +00000040 b5 5e 41 33 ee 92 |.^A3..|" +"2019-09-24 00:26:09.667 UTC [gossip.discovery] isSentByMe -> DEBU 356b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:09.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 356c Exiting" +"2019-09-24 00:26:09.688 UTC [gossip.comm] func1 -> DEBU 356d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:09.688 UTC [gossip.gossip] handleMessage -> DEBU 356e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:09.688 UTC [gossip.pull] HandleMessage -> DEBU 356f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:09.688 UTC [gossip.pull] SendDigest -> DEBU 3570 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:09.688 UTC [gossip.gossip] handleMessage -> DEBU 3571 Exiting" +"2019-09-24 00:26:09.775 UTC [gossip.comm] func1 -> DEBU 3572 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0206" signature:"0D\002 #\347\220Z4Y\3617\337\336\255v\365\242\215\236+\t\343\321\3359tDz5Dw\362n\013\316\002 \031r\364\001\333Fo\211Hm/\000\326J\346\0174\325\306\322\234\314D\034\230\243\246]\032\370\332\220" secret_envelope:\352\231r\033\276\234\340\32507\227\004\346\312f`\251\340u\257\221CIR\3404K\002 8\342\351\254\213\275]\rp\354R\0009\035\326\262\211n\370\314\204\250\230h/\373\360\251\346\262s\200" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:09.775 UTC [gossip.gossip] handleMessage -> DEBU 3573 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0206" signature:"0D\002 #\347\220Z4Y\3617\337\336\255v\365\242\215\236+\t\343\321\3359tDz5Dw\362n\013\316\002 \031r\364\001\333Fo\211Hm/\000\326J\346\0174\325\306\322\234\314D\034\230\243\246]\032\370\332\220" secret_envelope:\352\231r\033\276\234\340\32507\227\004\346\312f`\251\340u\257\221CIR\3404K\002 8\342\351\254\213\275]\rp\354R\0009\035\326\262\211n\370\314\204\250\230h/\373\360\251\346\262s\200" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:09.775 UTC [gossip.gossip] handleMessage -> DEBU 3574 Exiting" +"2019-09-24 00:26:09.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3575 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0206" signature:"0D\002 #\347\220Z4Y\3617\337\336\255v\365\242\215\236+\t\343\321\3359tDz5Dw\362n\013\316\002 \031r\364\001\333Fo\211Hm/\000\326J\346\0174\325\306\322\234\314D\034\230\243\246]\032\370\332\220" secret_envelope:\352\231r\033\276\234\340\32507\227\004\346\312f`\251\340u\257\221CIR\3404K\002 8\342\351\254\213\275]\rp\354R\0009\035\326\262\211n\370\314\204\250\230h/\373\360\251\346\262s\200" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:09.776 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3576 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:09.776 UTC [msp.identity] Verify -> DEBU 3577 Verify: digest = 00000000 ef bc d7 22 67 04 c6 9a 2a d1 84 51 bd 89 6b f0 |..."g...*..Q..k.| +00000010 7f df 95 cf 63 f7 0e 97 8c 24 eb 49 ff be c1 7d |....c....$.I...}|" +"2019-09-24 00:26:09.776 UTC [msp.identity] Verify -> DEBU 3578 Verify: sig = 00000000 30 44 02 20 23 e7 90 5a 34 59 f1 37 df de ad 76 |0D. #..Z4Y.7...v| +00000010 f5 a2 8d 9e 2b 09 e3 d1 dd 39 74 44 7a 35 44 77 |....+....9tDz5Dw| +00000020 f2 6e 0b ce 02 20 19 72 f4 01 db 46 6f 89 48 6d |.n... .r...Fo.Hm| +00000030 2f 00 d6 4a e6 0f 34 d5 c6 d2 9c cc 44 1c 98 a3 |/..J..4.....D...| +00000040 a6 5d 1a f8 da 90 |.]....|" +"2019-09-24 00:26:09.776 UTC [msp.identity] Verify -> DEBU 3579 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:09.776 UTC [msp.identity] Verify -> DEBU 357a Verify: sig = 00000000 30 44 02 20 0a 56 a7 23 3e ea 99 72 1b be 9c e0 |0D. .V.#>..r....| +00000010 d5 30 37 97 04 e6 ca 66 60 a9 e0 75 af 91 43 49 |.07....f`..u..CI| +00000020 52 e0 34 4b 02 20 38 e2 e9 ac 8b bd 5d 0d 70 ec |R.4K. 8.....].p.| +00000030 52 00 39 1d d6 b2 89 6e f8 cc 84 a8 98 68 2f fb |R.9....n.....h/.| +00000040 f0 a9 e6 b2 73 80 |....s.|" +"2019-09-24 00:26:09.776 UTC [gossip.discovery] handleAliveMessage -> DEBU 357b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:09.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 357c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:26:09.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 357d updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:09.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 357e Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:09.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 357f Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:09.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 3580 Exiting" +"2019-09-24 00:26:09.777 UTC [gossip.discovery] handleAliveMessage -> DEBU 3581 Exiting" +"2019-09-24 00:26:09.778 UTC [gossip.discovery] sendMemResponse -> DEBU 3582 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:09.779 UTC [msp] DeserializeIdentity -> DEBU 3583 Obtaining identity" +"2019-09-24 00:26:09.779 UTC [msp] DeserializeIdentity -> DEBU 3584 Obtaining identity" +"2019-09-24 00:26:09.779 UTC [gossip.comm] Send -> DEBU 3585 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:09.779 UTC [gossip.discovery] sendMemResponse -> DEBU 3586 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0206" signature:"0D\002 #\347\220Z4Y\3617\337\336\255v\365\242\215\236+\t\343\321\3359tDz5Dw\362n\013\316\002 \031r\364\001\333Fo\211Hm/\000\326J\346\0174\325\306\322\234\314D\034\230\243\246]\032\370\332\220" secret_envelope:\352\231r\033\276\234\340\32507\227\004\346\312f`\251\340u\257\221CIR\3404K\002 8\342\351\254\213\275]\rp\354R\0009\035\326\262\211n\370\314\204\250\230h/\373\360\251\346\262s\200" > > alive: " +"2019-09-24 00:26:09.779 UTC [gossip.comm] sendToEndpoint -> DEBU 3587 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:26:09.779 UTC [gossip.comm] sendToEndpoint -> DEBU 3588 Exiting" +"2019-09-24 00:26:09.777 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3589 Exiting" +"2019-09-24 00:26:09.989 UTC [gossip.gossip] handleMessage -> DEBU 358a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:09.989 UTC [gossip.gossip] handleMessage -> DEBU 358b Exiting" +"2019-09-24 00:26:09.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 358c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:09.989 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 358d Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:09.989 UTC [msp] DeserializeIdentity -> DEBU 358e Obtaining identity" +"2019-09-24 00:26:09.989 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 358f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:09.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3590 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:09.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3591 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:09.989 UTC [policies] Evaluate -> DEBU 3592 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:09.989 UTC [policies] Evaluate -> DEBU 3593 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:09.989 UTC [policies] Evaluate -> DEBU 3594 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:09.989 UTC [cauthdsl] func1 -> DEBU 3595 0xc0027587d0 gate 1569284769989957600 evaluation starts" +"2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 3596 0xc0027587d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 3597 0xc0027587d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 3598 0xc0027587d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 3599 0xc0027587d0 principal evaluation fails" +"2019-09-24 00:26:09.990 UTC [cauthdsl] func1 -> DEBU 359a 0xc0027587d0 gate 1569284769989957600 evaluation fails" +"2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 359b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 359c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 359d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:09.990 UTC [cauthdsl] func1 -> DEBU 359e 0xc002759010 gate 1569284769990316400 evaluation starts" +"2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 359f 0xc002759010 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 35a0 0xc002759010 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:09.990 UTC [cauthdsl] func2 -> DEBU 35a1 0xc002759010 principal matched by identity 0" +"2019-09-24 00:26:09.990 UTC [msp.identity] Verify -> DEBU 35a2 Verify: digest = 00000000 e7 56 99 ed ba c3 73 67 a7 6c a4 15 2a e5 df 56 |.V....sg.l..*..V| +00000010 6f cb 79 2c 8e 73 11 64 f5 e6 8c 1e 66 3e 2d 25 |o.y,.s.d....f>-%|" +"2019-09-24 00:26:09.990 UTC [msp.identity] Verify -> DEBU 35a3 Verify: sig = 00000000 30 45 02 21 00 b9 6f fa 74 58 e8 a4 4d db f9 45 |0E.!..o.tX..M..E| +00000010 0b fd 33 1f 51 32 b8 9a 7a 64 db 3c 64 ed 00 b1 |..3.Q2..zd. DEBU 35a4 0xc002759010 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:09.990 UTC [cauthdsl] func1 -> DEBU 35a5 0xc002759010 gate 1569284769990316400 evaluation succeeds" +"2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 35a6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 35a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 35a8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:09.990 UTC [policies] Evaluate -> DEBU 35a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:09.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 35aa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:09.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:09.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ac updating membership: timestamp: " +"2019-09-24 00:26:09.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ad Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:09.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ae Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:09.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 35af Exiting" +"2019-09-24 00:26:09.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 35b0 Exiting" +"2019-09-24 00:26:09.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35b1 Exiting" +"2019-09-24 00:26:09.996 UTC [msp] DeserializeIdentity -> DEBU 35b2 Obtaining identity" +"2019-09-24 00:26:09.996 UTC [msp] DeserializeIdentity -> DEBU 35b3 Obtaining identity" +"2019-09-24 00:26:09.996 UTC [msp] DeserializeIdentity -> DEBU 35b4 Obtaining identity" +"2019-09-24 00:26:09.996 UTC [msp] DeserializeIdentity -> DEBU 35b5 Obtaining identity" +"2019-09-24 00:26:09.996 UTC [gossip.comm] func1 -> DEBU 35b6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:09.996 UTC [msp] DeserializeIdentity -> DEBU 35b7 Obtaining identity" +"2019-09-24 00:26:09.997 UTC [msp] DeserializeIdentity -> DEBU 35b8 Obtaining identity" +"2019-09-24 00:26:09.997 UTC [gossip.gossip] handleMessage -> DEBU 35b9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:09.997 UTC [gossip.gossip] handleMessage -> DEBU 35ba Exiting" +"2019-09-24 00:26:09.997 UTC [msp] DeserializeIdentity -> DEBU 35bb Obtaining identity" +"2019-09-24 00:26:09.997 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35bc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:09.997 UTC [gossip.comm] Send -> DEBU 35bd Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:09.997 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35be Exiting" +"2019-09-24 00:26:09.997 UTC [msp] DeserializeIdentity -> DEBU 35bf Obtaining identity" +"2019-09-24 00:26:09.997 UTC [gossip.comm] Send -> DEBU 35c0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:09.997 UTC [gossip.comm] sendToEndpoint -> DEBU 35c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:09.997 UTC [gossip.comm] sendToEndpoint -> DEBU 35c2 Exiting" +"2019-09-24 00:26:09.997 UTC [gossip.comm] sendToEndpoint -> DEBU 35c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:09.998 UTC [gossip.comm] sendToEndpoint -> DEBU 35c4 Exiting" +"2019-09-24 00:26:10.007 UTC [gossip.comm] func1 -> DEBU 35c5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.007 UTC [gossip.gossip] handleMessage -> DEBU 35c6 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.007 UTC [gossip.gossip] handleMessage -> DEBU 35c7 Exiting" +"2019-09-24 00:26:10.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35c8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35c9 Exiting" +"2019-09-24 00:26:10.085 UTC [gossip.comm] func1 -> DEBU 35ca Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:10.085 UTC [gossip.gossip] handleMessage -> DEBU 35cb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:10.085 UTC [msp] DeserializeIdentity -> DEBU 35cc Obtaining identity" +"2019-09-24 00:26:10.085 UTC [msp] DeserializeIdentity -> DEBU 35cd Obtaining identity" +"2019-09-24 00:26:10.085 UTC [msp] DeserializeIdentity -> DEBU 35ce Obtaining identity" +"2019-09-24 00:26:10.085 UTC [gossip.gossip] handleMessage -> DEBU 35cf Exiting" +"2019-09-24 00:26:10.684 UTC [gossip.comm] func1 -> DEBU 35d0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.685 UTC [gossip.gossip] handleMessage -> DEBU 35d1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.685 UTC [gossip.gossip] handleMessage -> DEBU 35d2 Exiting" +"2019-09-24 00:26:10.685 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35d3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.685 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35d4 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:10.685 UTC [msp] DeserializeIdentity -> DEBU 35d5 Obtaining identity" +"2019-09-24 00:26:10.685 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35d6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:10.685 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35d7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:10.685 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35d8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:10.685 UTC [policies] Evaluate -> DEBU 35d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:10.685 UTC [policies] Evaluate -> DEBU 35da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:10.686 UTC [policies] Evaluate -> DEBU 35db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func1 -> DEBU 35dc 0xc0026621e0 gate 1569284770686068300 evaluation starts" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35dd 0xc0026621e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35de 0xc0026621e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35df 0xc0026621e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35e0 0xc0026621e0 principal evaluation fails" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func1 -> DEBU 35e1 0xc0026621e0 gate 1569284770686068300 evaluation fails" +"2019-09-24 00:26:10.686 UTC [policies] Evaluate -> DEBU 35e2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:10.686 UTC [policies] Evaluate -> DEBU 35e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:10.686 UTC [policies] Evaluate -> DEBU 35e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func1 -> DEBU 35e5 0xc002662b10 gate 1569284770686351300 evaluation starts" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35e6 0xc002662b10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35e7 0xc002662b10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35e8 0xc002662b10 principal matched by identity 0" +"2019-09-24 00:26:10.686 UTC [msp.identity] Verify -> DEBU 35e9 Verify: digest = 00000000 c1 48 ea 30 a0 2e 21 5b 9b c1 d8 1d 1c 42 11 7a |.H.0..![.....B.z| +00000010 3a 37 6f 3b 4e 8d bf 04 43 74 bf 87 48 1f 7c 69 |:7o;N...Ct..H.|i|" +"2019-09-24 00:26:10.686 UTC [msp.identity] Verify -> DEBU 35ea Verify: sig = 00000000 30 45 02 21 00 a8 c1 23 89 33 7d fb 94 8f 67 86 |0E.!...#.3}...g.| +00000010 c0 50 c0 ed 4c bb 15 51 0a 9c 4b d3 d0 5b 0b 2a |.P..L..Q..K..[.*| +00000020 90 ec 6c 52 01 02 20 37 59 6b d1 36 b7 06 7e c8 |..lR.. 7Yk.6..~.| +00000030 02 77 ed 94 6d 76 65 c1 63 51 14 39 11 e7 67 be |.w..mve.cQ.9..g.| +00000040 00 8f 10 73 26 5c 73 |...s&\s|" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func2 -> DEBU 35eb 0xc002662b10 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:10.686 UTC [cauthdsl] func1 -> DEBU 35ec 0xc002662b10 gate 1569284770686351300 evaluation succeeds" +"2019-09-24 00:26:10.690 UTC [policies] Evaluate -> DEBU 35ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:10.690 UTC [policies] Evaluate -> DEBU 35ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:10.690 UTC [policies] Evaluate -> DEBU 35ef Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:10.690 UTC [policies] Evaluate -> DEBU 35f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:10.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 35f1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:10.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f3 updating membership: timestamp: " +"2019-09-24 00:26:10.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f4 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:10.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:10.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f6 Exiting" +"2019-09-24 00:26:10.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 35f7 Exiting" +"2019-09-24 00:26:10.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35f8 Exiting" +"2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 35f9 Obtaining identity" +"2019-09-24 00:26:10.691 UTC [gossip.comm] func1 -> DEBU 35fa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 35fb Obtaining identity" +"2019-09-24 00:26:10.691 UTC [gossip.gossip] handleMessage -> DEBU 35fc Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.691 UTC [gossip.gossip] handleMessage -> DEBU 35fd Exiting" +"2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 35fe Obtaining identity" +"2019-09-24 00:26:10.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35ff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3600 Exiting" +"2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 3601 Obtaining identity" +"2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 3602 Obtaining identity" +"2019-09-24 00:26:10.691 UTC [gossip.gossip] handleMessage -> DEBU 3603 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 3604 Obtaining identity" +"2019-09-24 00:26:10.691 UTC [gossip.gossip] handleMessage -> DEBU 3605 Exiting" +"2019-09-24 00:26:10.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3606 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.691 UTC [gossip.comm] Send -> DEBU 3607 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:10.691 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3608 Exiting" +"2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 3609 Obtaining identity" +"2019-09-24 00:26:10.691 UTC [msp] DeserializeIdentity -> DEBU 360a Obtaining identity" +"2019-09-24 00:26:10.691 UTC [gossip.comm] Send -> DEBU 360b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:10.691 UTC [gossip.comm] sendToEndpoint -> DEBU 360c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.692 UTC [gossip.comm] sendToEndpoint -> DEBU 360d Exiting" +"2019-09-24 00:26:10.692 UTC [gossip.comm] sendToEndpoint -> DEBU 360e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:10.692 UTC [gossip.comm] sendToEndpoint -> DEBU 360f Exiting" +"2019-09-24 00:26:11.696 UTC [gossip.pull] Hello -> DEBU 3610 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:11.696 UTC [gossip.comm] Send -> DEBU 3611 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:11.696 UTC [gossip.pull] Hello -> DEBU 3612 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:11.696 UTC [gossip.comm] Send -> DEBU 3613 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:11.696 UTC [gossip.pull] Hello -> DEBU 3614 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:11.696 UTC [gossip.comm] Send -> DEBU 3615 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:11.696 UTC [gossip.comm] sendToEndpoint -> DEBU 3616 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.696 UTC [gossip.comm] sendToEndpoint -> DEBU 3617 Exiting" +"2019-09-24 00:26:11.697 UTC [gossip.comm] sendToEndpoint -> DEBU 3618 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.697 UTC [gossip.comm] sendToEndpoint -> DEBU 3619 Exiting" +"2019-09-24 00:26:11.697 UTC [gossip.comm] sendToEndpoint -> DEBU 361a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.697 UTC [gossip.comm] sendToEndpoint -> DEBU 361b Exiting" +"2019-09-24 00:26:11.699 UTC [gossip.comm] func1 -> DEBU 361c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.699 UTC [gossip.gossip] handleMessage -> DEBU 361d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.699 UTC [gossip.pull] HandleMessage -> DEBU 361e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.699 UTC [gossip.gossip] handleMessage -> DEBU 361f Exiting" +"2019-09-24 00:26:11.699 UTC [gossip.gossip] handleMessage -> DEBU 3620 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.699 UTC [gossip.pull] HandleMessage -> DEBU 3621 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.699 UTC [gossip.gossip] handleMessage -> DEBU 3622 Exiting" +"2019-09-24 00:26:11.700 UTC [gossip.comm] func1 -> DEBU 3623 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.700 UTC [gossip.gossip] handleMessage -> DEBU 3624 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.700 UTC [gossip.pull] HandleMessage -> DEBU 3625 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.700 UTC [gossip.gossip] handleMessage -> DEBU 3626 Exiting" +"2019-09-24 00:26:11.846 UTC [msp] GetDefaultSigningIdentity -> DEBU 3627 Obtaining default signing identity" +"2019-09-24 00:26:11.846 UTC [msp.identity] Sign -> DEBU 3628 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151033 " +"2019-09-24 00:26:11.846 UTC [msp.identity] Sign -> DEBU 3629 Sign: digest: 86B74A24314315E0531EB34E765326DB2B4C16368543722CD721ECD2507704FE " +"2019-09-24 00:26:11.846 UTC [msp] GetDefaultSigningIdentity -> DEBU 362a Obtaining default signing identity" +"2019-09-24 00:26:11.846 UTC [msp.identity] Sign -> DEBU 362b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:11.846 UTC [msp.identity] Sign -> DEBU 362c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:11.846 UTC [gossip.comm] Send -> DEBU 362d Entering, sending GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:11.847 UTC [msp] DeserializeIdentity -> DEBU 362e Obtaining identity" +"2019-09-24 00:26:11.847 UTC [gossip.comm] Send -> DEBU 362f Entering, sending GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:11.847 UTC [msp] DeserializeIdentity -> DEBU 3630 Obtaining identity" +"2019-09-24 00:26:11.847 UTC [gossip.comm] Send -> DEBU 3631 Entering, sending GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3632 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3633 Exiting" +"2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3634 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3635 Exiting" +"2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3636 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 \035\003P\017\266i\3544^\006wn\222\374\325C\210\264X!\343r\367\274W+\372\233\030\3646\323" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3637 Exiting" +"2019-09-24 00:26:11.850 UTC [gossip.comm] func1 -> DEBU 3638 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.851 UTC [gossip.gossip] handleMessage -> DEBU 3639 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.851 UTC [gossip.gossip] handleMessage -> DEBU 363a Exiting" +"2019-09-24 00:26:11.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 363b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 363c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:11.851 UTC [msp.identity] Verify -> DEBU 363d Verify: digest = 00000000 86 b7 4a 24 31 43 15 e0 53 1e b3 4e 76 53 26 db |..J$1C..S..NvS&.| +00000010 2b 4c 16 36 85 43 72 2c d7 21 ec d2 50 77 04 fe |+L.6.Cr,.!..Pw..|" +"2019-09-24 00:26:11.851 UTC [msp.identity] Verify -> DEBU 363e Verify: sig = 00000000 30 45 02 21 00 f6 19 27 e9 bb fd 4c 6c 3d fe a8 |0E.!...'...Ll=..| +00000010 0e 09 a6 0c 1d 7d 3a 03 eb 70 8f 64 91 2f b9 ad |.....}:..p.d./..| +00000020 39 c4 e0 eb 3e 02 20 1d 03 50 0f b6 69 ec 34 5e |9...>. ..P..i.4^| +00000030 06 77 6e 92 fc d5 43 88 b4 58 21 e3 72 f7 bc 57 |.wn...C..X!.r..W| +00000040 2b fa 9b 18 f4 36 d3 |+....6.|" +"2019-09-24 00:26:11.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 363f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:11.851 UTC [gossip.discovery] isSentByMe -> DEBU 3640 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:11.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 3641 Exiting" +"2019-09-24 00:26:11.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3642 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:11.851 UTC [msp.identity] Verify -> DEBU 3643 Verify: digest = 00000000 ef bc d7 22 67 04 c6 9a 2a d1 84 51 bd 89 6b f0 |..."g...*..Q..k.| +00000010 7f df 95 cf 63 f7 0e 97 8c 24 eb 49 ff be c1 7d |....c....$.I...}|" +"2019-09-24 00:26:11.851 UTC [msp.identity] Verify -> DEBU 3644 Verify: sig = 00000000 30 44 02 20 23 e7 90 5a 34 59 f1 37 df de ad 76 |0D. #..Z4Y.7...v| +00000010 f5 a2 8d 9e 2b 09 e3 d1 dd 39 74 44 7a 35 44 77 |....+....9tDz5Dw| +00000020 f2 6e 0b ce 02 20 19 72 f4 01 db 46 6f 89 48 6d |.n... .r...Fo.Hm| +00000030 2f 00 d6 4a e6 0f 34 d5 c6 d2 9c cc 44 1c 98 a3 |/..J..4.....D...| +00000040 a6 5d 1a f8 da 90 |.]....|" +"2019-09-24 00:26:11.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 3645 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:11.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 3646 Exiting" +"2019-09-24 00:26:11.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3647 Exiting" +"2019-09-24 00:26:11.851 UTC [gossip.comm] func1 -> DEBU 3648 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.851 UTC [gossip.gossip] handleMessage -> DEBU 3649 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.851 UTC [gossip.gossip] handleMessage -> DEBU 364a Exiting" +"2019-09-24 00:26:11.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 364b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.852 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 364c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:11.852 UTC [msp.identity] Verify -> DEBU 364d Verify: digest = 00000000 86 b7 4a 24 31 43 15 e0 53 1e b3 4e 76 53 26 db |..J$1C..S..NvS&.| +00000010 2b 4c 16 36 85 43 72 2c d7 21 ec d2 50 77 04 fe |+L.6.Cr,.!..Pw..|" +"2019-09-24 00:26:11.852 UTC [msp.identity] Verify -> DEBU 364e Verify: sig = 00000000 30 45 02 21 00 f6 19 27 e9 bb fd 4c 6c 3d fe a8 |0E.!...'...Ll=..| +00000010 0e 09 a6 0c 1d 7d 3a 03 eb 70 8f 64 91 2f b9 ad |.....}:..p.d./..| +00000020 39 c4 e0 eb 3e 02 20 1d 03 50 0f b6 69 ec 34 5e |9...>. ..P..i.4^| +00000030 06 77 6e 92 fc d5 43 88 b4 58 21 e3 72 f7 bc 57 |.wn...C..X!.r..W| +00000040 2b fa 9b 18 f4 36 d3 |+....6.|" +"2019-09-24 00:26:11.852 UTC [msp.identity] Verify -> DEBU 364f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:11.852 UTC [msp.identity] Verify -> DEBU 3650 Verify: sig = 00000000 30 45 02 21 00 97 9b e2 ca fc 9c 34 c0 8b 6a 2c |0E.!.......4..j,| +00000010 1e b0 1c 5d df b7 ed be 27 59 b5 a0 e1 34 5d 5b |...]....'Y...4][| +00000020 fd 9e fe 72 bb 02 20 33 0e 2d 5a 30 f4 c6 ce 00 |...r.. 3.-Z0....| +00000030 c5 bf b6 4b f5 08 0c c9 0e 83 8d 23 b3 c0 af c7 |...K.......#....| +00000040 c1 82 5f a6 fb 34 d7 |.._..4.|" +"2019-09-24 00:26:11.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 3651 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:11.852 UTC [gossip.discovery] isSentByMe -> DEBU 3652 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:11.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 3653 Exiting" +"2019-09-24 00:26:11.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3654 Exiting" +"2019-09-24 00:26:11.857 UTC [gossip.gossip] handleMessage -> DEBU 3655 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.857 UTC [gossip.gossip] handleMessage -> DEBU 3656 Exiting" +"2019-09-24 00:26:11.857 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3657 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:11.857 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3658 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:11.858 UTC [msp.identity] Verify -> DEBU 3659 Verify: digest = 00000000 ef bc d7 22 67 04 c6 9a 2a d1 84 51 bd 89 6b f0 |..."g...*..Q..k.| +00000010 7f df 95 cf 63 f7 0e 97 8c 24 eb 49 ff be c1 7d |....c....$.I...}|" +"2019-09-24 00:26:11.858 UTC [msp.identity] Verify -> DEBU 365a Verify: sig = 00000000 30 44 02 20 23 e7 90 5a 34 59 f1 37 df de ad 76 |0D. #..Z4Y.7...v| +00000010 f5 a2 8d 9e 2b 09 e3 d1 dd 39 74 44 7a 35 44 77 |....+....9tDz5Dw| +00000020 f2 6e 0b ce 02 20 19 72 f4 01 db 46 6f 89 48 6d |.n... .r...Fo.Hm| +00000030 2f 00 d6 4a e6 0f 34 d5 c6 d2 9c cc 44 1c 98 a3 |/..J..4.....D...| +00000040 a6 5d 1a f8 da 90 |.]....|" +"2019-09-24 00:26:11.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 365b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:11.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 365c Exiting" +"2019-09-24 00:26:11.858 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 365d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:11.858 UTC [msp.identity] Verify -> DEBU 365e Verify: digest = 00000000 86 b7 4a 24 31 43 15 e0 53 1e b3 4e 76 53 26 db |..J$1C..S..NvS&.| +00000010 2b 4c 16 36 85 43 72 2c d7 21 ec d2 50 77 04 fe |+L.6.Cr,.!..Pw..|" +"2019-09-24 00:26:11.858 UTC [msp.identity] Verify -> DEBU 365f Verify: sig = 00000000 30 45 02 21 00 f6 19 27 e9 bb fd 4c 6c 3d fe a8 |0E.!...'...Ll=..| +00000010 0e 09 a6 0c 1d 7d 3a 03 eb 70 8f 64 91 2f b9 ad |.....}:..p.d./..| +00000020 39 c4 e0 eb 3e 02 20 1d 03 50 0f b6 69 ec 34 5e |9...>. ..P..i.4^| +00000030 06 77 6e 92 fc d5 43 88 b4 58 21 e3 72 f7 bc 57 |.wn...C..X!.r..W| +00000040 2b fa 9b 18 f4 36 d3 |+....6.|" +"2019-09-24 00:26:11.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 3660 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:11.858 UTC [gossip.discovery] isSentByMe -> DEBU 3661 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:11.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 3662 Exiting" +"2019-09-24 00:26:11.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3663 Exiting" +"2019-09-24 00:26:12.008 UTC [gossip.gossip] handleMessage -> DEBU 3664 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.009 UTC [gossip.pull] HandleMessage -> DEBU 3665 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.009 UTC [msp] DeserializeIdentity -> DEBU 3666 Obtaining identity" +"2019-09-24 00:26:12.010 UTC [msp] DeserializeIdentity -> DEBU 3667 Obtaining identity" +"2019-09-24 00:26:12.010 UTC [msp] DeserializeIdentity -> DEBU 3668 Obtaining identity" +"2019-09-24 00:26:12.011 UTC [msp] DeserializeIdentity -> DEBU 3669 Obtaining identity" +"2019-09-24 00:26:12.011 UTC [msp] DeserializeIdentity -> DEBU 366a Obtaining identity" +"2019-09-24 00:26:12.011 UTC [msp] DeserializeIdentity -> DEBU 366b Obtaining identity" +"2019-09-24 00:26:12.012 UTC [gossip.pull] SendDigest -> DEBU 366c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:12.012 UTC [gossip.gossip] handleMessage -> DEBU 366d Exiting" +"2019-09-24 00:26:12.019 UTC [gossip.gossip] handleMessage -> DEBU 366e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.019 UTC [gossip.gossip] handleMessage -> DEBU 366f Exiting" +"2019-09-24 00:26:12.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3670 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.019 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3671 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:12.019 UTC [msp] DeserializeIdentity -> DEBU 3672 Obtaining identity" +"2019-09-24 00:26:12.020 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3673 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:12.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3674 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3675 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 3676 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 3677 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 3678 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:12.020 UTC [cauthdsl] func1 -> DEBU 3679 0xc002582140 gate 1569284772020363200 evaluation starts" +"2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 367a 0xc002582140 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 367b 0xc002582140 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 367c 0xc002582140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 367d 0xc002582140 principal evaluation fails" +"2019-09-24 00:26:12.020 UTC [cauthdsl] func1 -> DEBU 367e 0xc002582140 gate 1569284772020363200 evaluation fails" +"2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 367f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 3680 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.020 UTC [policies] Evaluate -> DEBU 3681 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:12.020 UTC [cauthdsl] func1 -> DEBU 3682 0xc0025829a0 gate 1569284772020781300 evaluation starts" +"2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 3683 0xc0025829a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 3684 0xc0025829a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.020 UTC [cauthdsl] func2 -> DEBU 3685 0xc0025829a0 principal matched by identity 0" +"2019-09-24 00:26:12.020 UTC [msp.identity] Verify -> DEBU 3686 Verify: digest = 00000000 e3 55 a2 72 7b 50 2e 86 bd 16 e2 4e c2 e6 70 48 |.U.r{P.....N..pH| +00000010 c9 46 12 24 2c a0 c2 e7 aa 6f da 49 9a de d8 04 |.F.$,....o.I....|" +"2019-09-24 00:26:12.021 UTC [msp.identity] Verify -> DEBU 3687 Verify: sig = 00000000 30 45 02 21 00 cb bb 98 19 75 43 f8 fb a5 d8 e1 |0E.!.....uC.....| +00000010 38 96 07 c9 b0 3d c2 9b ad 88 5b af 86 fc f1 0c |8....=....[.....| +00000020 02 f7 01 7a 12 02 20 06 b1 b3 24 19 66 92 4e 35 |...z.. ...$.f.N5| +00000030 80 8c 1f 1b 54 92 3c 22 4d 78 d7 10 9a 33 40 ac |....T.<"Mx...3@.| +00000040 7a 51 58 90 2e 9f b5 |zQX....|" +"2019-09-24 00:26:12.021 UTC [cauthdsl] func2 -> DEBU 3688 0xc0025829a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:12.021 UTC [cauthdsl] func1 -> DEBU 3689 0xc0025829a0 gate 1569284772020781300 evaluation succeeds" +"2019-09-24 00:26:12.021 UTC [policies] Evaluate -> DEBU 368a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.021 UTC [policies] Evaluate -> DEBU 368b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.021 UTC [policies] Evaluate -> DEBU 368c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:12.021 UTC [policies] Evaluate -> DEBU 368d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:12.021 UTC [gossip.discovery] handleAliveMessage -> DEBU 368e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.021 UTC [gossip.discovery] learnExistingMembers -> DEBU 368f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:12.021 UTC [gossip.discovery] learnExistingMembers -> DEBU 3690 updating membership: timestamp: " +"2019-09-24 00:26:12.021 UTC [gossip.discovery] learnExistingMembers -> DEBU 3691 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:12.021 UTC [gossip.discovery] learnExistingMembers -> DEBU 3692 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:12.021 UTC [gossip.discovery] learnExistingMembers -> DEBU 3693 Exiting" +"2019-09-24 00:26:12.021 UTC [gossip.discovery] handleAliveMessage -> DEBU 3694 Exiting" +"2019-09-24 00:26:12.022 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3695 Exiting" +"2019-09-24 00:26:12.022 UTC [gossip.discovery] sendMemResponse -> DEBU 3696 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:12.022 UTC [msp] DeserializeIdentity -> DEBU 3697 Obtaining identity" +"2019-09-24 00:26:12.022 UTC [msp] DeserializeIdentity -> DEBU 3698 Obtaining identity" +"2019-09-24 00:26:12.022 UTC [msp] DeserializeIdentity -> DEBU 3699 Obtaining identity" +"2019-09-24 00:26:12.022 UTC [gossip.comm] Send -> DEBU 369a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:12.022 UTC [gossip.comm] sendToEndpoint -> DEBU 369b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.022 UTC [gossip.comm] sendToEndpoint -> DEBU 369c Exiting" +"2019-09-24 00:26:12.023 UTC [gossip.discovery] sendMemResponse -> DEBU 369d Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0206" signature:"0D\002 #\347\220Z4Y\3617\337\336\255v\365\242\215\236+\t\343\321\3359tDz5Dw\362n\013\316\002 \031r\364\001\333Fo\211Hm/\000\326J\346\0174\325\306\322\234\314D\034\230\243\246]\032\370\332\220" > alive: alive: alive: " +"2019-09-24 00:26:12.115 UTC [msp] DeserializeIdentity -> DEBU 369e Obtaining identity" +"2019-09-24 00:26:12.115 UTC [msp] DeserializeIdentity -> DEBU 369f Obtaining identity" +"2019-09-24 00:26:12.115 UTC [gossip.comm] Send -> DEBU 36a0 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:12.115 UTC [gossip.comm] sendToEndpoint -> DEBU 36a1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.115 UTC [gossip.comm] sendToEndpoint -> DEBU 36a2 Exiting" +"2019-09-24 00:26:12.116 UTC [gossip.comm] sendToEndpoint -> DEBU 36a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.116 UTC [gossip.comm] sendToEndpoint -> DEBU 36a4 Exiting" +"2019-09-24 00:26:12.116 UTC [gossip.comm] sendToEndpoint -> DEBU 36a5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.116 UTC [gossip.comm] sendToEndpoint -> DEBU 36a6 Exiting" +"2019-09-24 00:26:12.118 UTC [gossip.gossip] handleMessage -> DEBU 36a7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.118 UTC [msp] DeserializeIdentity -> DEBU 36a8 Obtaining identity" +"2019-09-24 00:26:12.118 UTC [msp] DeserializeIdentity -> DEBU 36a9 Obtaining identity" +"2019-09-24 00:26:12.118 UTC [msp] DeserializeIdentity -> DEBU 36aa Obtaining identity" +"2019-09-24 00:26:12.118 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36ab Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:12.118 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ac Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.118 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ad Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.118 UTC [policies] Evaluate -> DEBU 36ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:12.118 UTC [policies] Evaluate -> DEBU 36af This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:12.118 UTC [policies] Evaluate -> DEBU 36b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:12.118 UTC [cauthdsl] func1 -> DEBU 36b1 0xc00256bc60 gate 1569284772118796000 evaluation starts" +"2019-09-24 00:26:12.118 UTC [cauthdsl] func2 -> DEBU 36b2 0xc00256bc60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.118 UTC [cauthdsl] func2 -> DEBU 36b3 0xc00256bc60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36b4 0xc00256bc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36b5 0xc00256bc60 principal evaluation fails" +"2019-09-24 00:26:12.119 UTC [cauthdsl] func1 -> DEBU 36b6 0xc00256bc60 gate 1569284772118796000 evaluation fails" +"2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36b7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:12.119 UTC [cauthdsl] func1 -> DEBU 36ba 0xc00252a4a0 gate 1569284772119300500 evaluation starts" +"2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36bb 0xc00252a4a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36bc 0xc00252a4a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36bd 0xc00252a4a0 principal matched by identity 0" +"2019-09-24 00:26:12.119 UTC [msp.identity] Verify -> DEBU 36be Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:12.119 UTC [msp.identity] Verify -> DEBU 36bf Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:12.119 UTC [cauthdsl] func2 -> DEBU 36c0 0xc00252a4a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:12.119 UTC [cauthdsl] func1 -> DEBU 36c1 0xc00252a4a0 gate 1569284772119300500 evaluation succeeds" +"2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36c2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36c4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:12.119 UTC [policies] Evaluate -> DEBU 36c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:12.120 UTC [msp.identity] Verify -> DEBU 36c6 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:12.120 UTC [msp.identity] Verify -> DEBU 36c7 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:12.120 UTC [msp.identity] Verify -> DEBU 36c8 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:12.120 UTC [msp.identity] Verify -> DEBU 36c9 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:12.120 UTC [gossip.comm] func1 -> DEBU 36ca Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.122 UTC [gossip.comm] func1 -> DEBU 36cb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.124 UTC [msp] DeserializeIdentity -> DEBU 36cc Obtaining identity" +"2019-09-24 00:26:12.124 UTC [msp] DeserializeIdentity -> DEBU 36cd Obtaining identity" +"2019-09-24 00:26:12.124 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36ce Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:12.124 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36cf Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.124 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36d0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.125 UTC [policies] Evaluate -> DEBU 36d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:12.125 UTC [policies] Evaluate -> DEBU 36d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:12.125 UTC [policies] Evaluate -> DEBU 36d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:12.125 UTC [cauthdsl] func1 -> DEBU 36d4 0xc0003e2cd0 gate 1569284772125142100 evaluation starts" +"2019-09-24 00:26:12.125 UTC [cauthdsl] func2 -> DEBU 36d5 0xc0003e2cd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.125 UTC [cauthdsl] func2 -> DEBU 36d6 0xc0003e2cd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.125 UTC [cauthdsl] func2 -> DEBU 36d7 0xc0003e2cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:12.126 UTC [cauthdsl] func2 -> DEBU 36d8 0xc0003e2cd0 principal evaluation fails" +"2019-09-24 00:26:12.126 UTC [cauthdsl] func1 -> DEBU 36d9 0xc0003e2cd0 gate 1569284772125142100 evaluation fails" +"2019-09-24 00:26:12.126 UTC [policies] Evaluate -> DEBU 36da Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.126 UTC [policies] Evaluate -> DEBU 36db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.126 UTC [policies] Evaluate -> DEBU 36dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:12.126 UTC [cauthdsl] func1 -> DEBU 36dd 0xc0003e3510 gate 1569284772126474100 evaluation starts" +"2019-09-24 00:26:12.126 UTC [cauthdsl] func2 -> DEBU 36de 0xc0003e3510 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.126 UTC [cauthdsl] func2 -> DEBU 36df 0xc0003e3510 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.126 UTC [cauthdsl] func2 -> DEBU 36e0 0xc0003e3510 principal matched by identity 0" +"2019-09-24 00:26:12.126 UTC [msp.identity] Verify -> DEBU 36e1 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:12.126 UTC [msp.identity] Verify -> DEBU 36e2 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:12.126 UTC [cauthdsl] func2 -> DEBU 36e3 0xc0003e3510 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:12.126 UTC [cauthdsl] func1 -> DEBU 36e4 0xc0003e3510 gate 1569284772126474100 evaluation succeeds" +"2019-09-24 00:26:12.133 UTC [policies] Evaluate -> DEBU 36e5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.133 UTC [policies] Evaluate -> DEBU 36e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36e7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36e8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:12.134 UTC [gossip.gossip] handleMessage -> DEBU 36e9 Exiting" +"2019-09-24 00:26:12.134 UTC [gossip.gossip] handleMessage -> DEBU 36ea Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.134 UTC [msp] DeserializeIdentity -> DEBU 36eb Obtaining identity" +"2019-09-24 00:26:12.134 UTC [msp] DeserializeIdentity -> DEBU 36ec Obtaining identity" +"2019-09-24 00:26:12.134 UTC [msp] DeserializeIdentity -> DEBU 36ed Obtaining identity" +"2019-09-24 00:26:12.134 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36ee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:12.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ef Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36f0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:12.134 UTC [cauthdsl] func1 -> DEBU 36f4 0xc0003d7470 gate 1569284772134709100 evaluation starts" +"2019-09-24 00:26:12.134 UTC [cauthdsl] func2 -> DEBU 36f5 0xc0003d7470 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.134 UTC [cauthdsl] func2 -> DEBU 36f6 0xc0003d7470 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.134 UTC [cauthdsl] func2 -> DEBU 36f7 0xc0003d7470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:12.134 UTC [cauthdsl] func2 -> DEBU 36f8 0xc0003d7470 principal evaluation fails" +"2019-09-24 00:26:12.134 UTC [cauthdsl] func1 -> DEBU 36f9 0xc0003d7470 gate 1569284772134709100 evaluation fails" +"2019-09-24 00:26:12.134 UTC [policies] Evaluate -> DEBU 36fa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 36fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 36fc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:12.135 UTC [cauthdsl] func1 -> DEBU 36fd 0xc0003d7cc0 gate 1569284772135106700 evaluation starts" +"2019-09-24 00:26:12.135 UTC [cauthdsl] func2 -> DEBU 36fe 0xc0003d7cc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.135 UTC [cauthdsl] func2 -> DEBU 36ff 0xc0003d7cc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.135 UTC [cauthdsl] func2 -> DEBU 3700 0xc0003d7cc0 principal matched by identity 0" +"2019-09-24 00:26:12.135 UTC [msp.identity] Verify -> DEBU 3701 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:12.135 UTC [msp.identity] Verify -> DEBU 3702 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:12.135 UTC [cauthdsl] func2 -> DEBU 3703 0xc0003d7cc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:12.135 UTC [cauthdsl] func1 -> DEBU 3704 0xc0003d7cc0 gate 1569284772135106700 evaluation succeeds" +"2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 3705 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 3706 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 3707 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:12.135 UTC [policies] Evaluate -> DEBU 3708 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:12.149 UTC [msp.identity] Verify -> DEBU 3709 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:12.149 UTC [msp.identity] Verify -> DEBU 370a Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:12.150 UTC [msp] DeserializeIdentity -> DEBU 370b Obtaining identity" +"2019-09-24 00:26:12.150 UTC [msp] DeserializeIdentity -> DEBU 370c Obtaining identity" +"2019-09-24 00:26:12.150 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 370d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:12.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 370e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 370f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3710 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3711 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3712 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func1 -> DEBU 3713 0xc0003bbd00 gate 1569284772150408700 evaluation starts" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 3714 0xc0003bbd00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 3715 0xc0003bbd00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 3716 0xc0003bbd00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 3717 0xc0003bbd00 principal evaluation fails" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func1 -> DEBU 3718 0xc0003bbd00 gate 1569284772150408700 evaluation fails" +"2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3719 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 371a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 371b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func1 -> DEBU 371c 0xc000486540 gate 1569284772150663100 evaluation starts" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 371d 0xc000486540 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 371e 0xc000486540 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 371f 0xc000486540 principal matched by identity 0" +"2019-09-24 00:26:12.150 UTC [msp.identity] Verify -> DEBU 3720 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:12.150 UTC [msp.identity] Verify -> DEBU 3721 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func2 -> DEBU 3722 0xc000486540 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:12.150 UTC [cauthdsl] func1 -> DEBU 3723 0xc000486540 gate 1569284772150663100 evaluation succeeds" +"2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3724 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.150 UTC [policies] Evaluate -> DEBU 3725 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.151 UTC [policies] Evaluate -> DEBU 3726 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:12.151 UTC [policies] Evaluate -> DEBU 3727 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 3728 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 3729 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:12.151 UTC [gossip.gossip] handleMessage -> DEBU 372a Exiting" +"2019-09-24 00:26:12.151 UTC [gossip.gossip] handleMessage -> DEBU 372b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 372c Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 372d Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 372e Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:12.151 UTC [msp.identity] Verify -> DEBU 372f Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:12.151 UTC [msp] DeserializeIdentity -> DEBU 3730 Obtaining identity" +"2019-09-24 00:26:12.152 UTC [msp] DeserializeIdentity -> DEBU 3731 Obtaining identity" +"2019-09-24 00:26:12.152 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3732 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:12.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3733 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3734 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 3735 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 3736 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 3737 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:12.152 UTC [cauthdsl] func1 -> DEBU 3738 0xc000193660 gate 1569284772152252600 evaluation starts" +"2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 3739 0xc000193660 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 373a 0xc000193660 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 373b 0xc000193660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 373c 0xc000193660 principal evaluation fails" +"2019-09-24 00:26:12.152 UTC [cauthdsl] func1 -> DEBU 373d 0xc000193660 gate 1569284772152252600 evaluation fails" +"2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 373e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 373f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.152 UTC [policies] Evaluate -> DEBU 3740 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:12.152 UTC [cauthdsl] func1 -> DEBU 3741 0xc000193ec0 gate 1569284772152513600 evaluation starts" +"2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 3742 0xc000193ec0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 3743 0xc000193ec0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.152 UTC [cauthdsl] func2 -> DEBU 3744 0xc000193ec0 principal matched by identity 0" +"2019-09-24 00:26:12.152 UTC [msp.identity] Verify -> DEBU 3745 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:12.178 UTC [msp.identity] Verify -> DEBU 3746 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:12.179 UTC [cauthdsl] func2 -> DEBU 3747 0xc000193ec0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:12.179 UTC [cauthdsl] func1 -> DEBU 3748 0xc000193ec0 gate 1569284772152513600 evaluation succeeds" +"2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 3749 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 374a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 374b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 374c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:12.179 UTC [msp] DeserializeIdentity -> DEBU 374d Obtaining identity" +"2019-09-24 00:26:12.179 UTC [msp] DeserializeIdentity -> DEBU 374e Obtaining identity" +"2019-09-24 00:26:12.179 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 374f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:12.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3750 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.179 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3751 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 3752 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:12.179 UTC [policies] Evaluate -> DEBU 3753 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:12.181 UTC [policies] Evaluate -> DEBU 3754 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:12.182 UTC [cauthdsl] func1 -> DEBU 3755 0xc000131810 gate 1569284772182290100 evaluation starts" +"2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3756 0xc000131810 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3757 0xc000131810 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3758 0xc000131810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3759 0xc000131810 principal evaluation fails" +"2019-09-24 00:26:12.182 UTC [cauthdsl] func1 -> DEBU 375a 0xc000131810 gate 1569284772182290100 evaluation fails" +"2019-09-24 00:26:12.182 UTC [policies] Evaluate -> DEBU 375b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.182 UTC [policies] Evaluate -> DEBU 375c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.182 UTC [policies] Evaluate -> DEBU 375d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:12.182 UTC [cauthdsl] func1 -> DEBU 375e 0xc0004c6050 gate 1569284772182740100 evaluation starts" +"2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 375f 0xc0004c6050 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3760 0xc0004c6050 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.182 UTC [cauthdsl] func2 -> DEBU 3761 0xc0004c6050 principal matched by identity 0" +"2019-09-24 00:26:12.182 UTC [msp.identity] Verify -> DEBU 3762 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:12.182 UTC [msp.identity] Verify -> DEBU 3763 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:12.184 UTC [cauthdsl] func2 -> DEBU 3764 0xc0004c6050 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:12.184 UTC [cauthdsl] func1 -> DEBU 3765 0xc0004c6050 gate 1569284772182740100 evaluation succeeds" +"2019-09-24 00:26:12.184 UTC [policies] Evaluate -> DEBU 3766 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.184 UTC [policies] Evaluate -> DEBU 3767 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.184 UTC [policies] Evaluate -> DEBU 3768 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:12.184 UTC [policies] Evaluate -> DEBU 3769 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:12.184 UTC [gossip.gossip] handleMessage -> DEBU 376a Exiting" +"2019-09-24 00:26:12.283 UTC [msp] DeserializeIdentity -> DEBU 376b Obtaining identity" +"2019-09-24 00:26:12.283 UTC [msp] DeserializeIdentity -> DEBU 376c Obtaining identity" +"2019-09-24 00:26:12.283 UTC [gossip.pull] Hello -> DEBU 376d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:12.283 UTC [msp] DeserializeIdentity -> DEBU 376e Obtaining identity" +"2019-09-24 00:26:12.283 UTC [msp] DeserializeIdentity -> DEBU 376f Obtaining identity" +"2019-09-24 00:26:12.283 UTC [gossip.comm] Send -> DEBU 3770 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:12.283 UTC [gossip.comm] sendToEndpoint -> DEBU 3771 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.283 UTC [gossip.comm] sendToEndpoint -> DEBU 3772 Exiting" +"2019-09-24 00:26:12.285 UTC [gossip.comm] func1 -> DEBU 3773 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.285 UTC [gossip.gossip] handleMessage -> DEBU 3774 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.285 UTC [gossip.pull] HandleMessage -> DEBU 3775 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.285 UTC [gossip.gossip] handleMessage -> DEBU 3776 Exiting" +"2019-09-24 00:26:12.299 UTC [gossip.election] waitForInterrupt -> DEBU 3777 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:12.299 UTC [gossip.election] IsLeader -> DEBU 3778 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:12.299 UTC [msp] GetDefaultSigningIdentity -> DEBU 3779 Obtaining default signing identity" +"2019-09-24 00:26:12.299 UTC [msp.identity] Sign -> DEBU 377a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510101801 " +"2019-09-24 00:26:12.299 UTC [msp.identity] Sign -> DEBU 377b Sign: digest: D2CEA75308506C63EF81731B0FAF8ED761C0AD65F46C50C8295210BDEA04D160 " +"2019-09-24 00:26:12.300 UTC [gossip.election] waitForInterrupt -> DEBU 377c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:12.305 UTC [msp] DeserializeIdentity -> DEBU 377d Obtaining identity" +"2019-09-24 00:26:12.306 UTC [msp] DeserializeIdentity -> DEBU 377e Obtaining identity" +"2019-09-24 00:26:12.306 UTC [msp] DeserializeIdentity -> DEBU 377f Obtaining identity" +"2019-09-24 00:26:12.306 UTC [msp] DeserializeIdentity -> DEBU 3780 Obtaining identity" +"2019-09-24 00:26:12.306 UTC [gossip.comm] Send -> DEBU 3781 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:12.306 UTC [msp] DeserializeIdentity -> DEBU 3782 Obtaining identity" +"2019-09-24 00:26:12.306 UTC [msp] DeserializeIdentity -> DEBU 3783 Obtaining identity" +"2019-09-24 00:26:12.306 UTC [gossip.comm] sendToEndpoint -> DEBU 3784 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:26:12.306 UTC [gossip.comm] sendToEndpoint -> DEBU 3785 Exiting" +"2019-09-24 00:26:12.620 UTC [gossip.comm] func1 -> DEBU 3786 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.621 UTC [gossip.gossip] handleMessage -> DEBU 3787 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.627 UTC [msp] DeserializeIdentity -> DEBU 3788 Obtaining identity" +"2019-09-24 00:26:12.628 UTC [msp] DeserializeIdentity -> DEBU 3789 Obtaining identity" +"2019-09-24 00:26:12.629 UTC [gossip.gossip] handleMessage -> DEBU 378a Exiting" +"2019-09-24 00:26:12.690 UTC [gossip.comm] func1 -> DEBU 378b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.690 UTC [gossip.gossip] handleMessage -> DEBU 378c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.690 UTC [gossip.gossip] handleMessage -> DEBU 378d Exiting" +"2019-09-24 00:26:12.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 378e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.690 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 378f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:12.692 UTC [msp.identity] Verify -> DEBU 3790 Verify: digest = 00000000 fb ff 06 c6 05 53 f1 39 66 02 1e af 5d c1 98 90 |.....S.9f...]...| +00000010 77 af 66 f1 55 e2 db 27 c5 9b ba 1d 59 10 e9 c8 |w.f.U..'....Y...|" +"2019-09-24 00:26:12.692 UTC [msp.identity] Verify -> DEBU 3791 Verify: sig = 00000000 30 45 02 21 00 c7 ec c1 5c 21 5c e0 83 ee aa 3b |0E.!....\!\....;| +00000010 99 33 25 3a e9 f4 fc 8d ae 11 52 e1 bb fc e4 54 |.3%:......R....T| +00000020 41 69 00 b0 c2 02 20 3e 27 50 eb 98 b3 1d bd fc |Ai.... >'P......| +00000030 66 bb 2b 12 2c ee 45 e0 27 8a 2c 02 22 9d ae e9 |f.+.,.E.'.,."...| +00000040 74 a2 19 47 d6 54 62 |t..G.Tb|" +"2019-09-24 00:26:12.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 3792 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.702 UTC [gossip.comm] func1 -> DEBU 3793 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.702 UTC [gossip.gossip] handleMessage -> DEBU 3794 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3795 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:12.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 3796 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:12.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 3797 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:12.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 3798 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:12.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 3799 Exiting" +"2019-09-24 00:26:12.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 379a Exiting" +"2019-09-24 00:26:12.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 379b Exiting" +"2019-09-24 00:26:12.710 UTC [msp] DeserializeIdentity -> DEBU 379c Obtaining identity" +"2019-09-24 00:26:12.712 UTC [msp] DeserializeIdentity -> DEBU 379d Obtaining identity" +"2019-09-24 00:26:12.714 UTC [msp] DeserializeIdentity -> DEBU 379e Obtaining identity" +"2019-09-24 00:26:12.727 UTC [gossip.comm] func1 -> DEBU 379f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.727 UTC [gossip.comm] func1 -> DEBU 37a0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.727 UTC [gossip.comm] Send -> DEBU 37a1 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:12.727 UTC [msp] DeserializeIdentity -> DEBU 37a2 Obtaining identity" +"2019-09-24 00:26:12.727 UTC [gossip.comm] Send -> DEBU 37a3 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:12.727 UTC [gossip.comm] sendToEndpoint -> DEBU 37a4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.727 UTC [gossip.comm] sendToEndpoint -> DEBU 37a5 Exiting" +"2019-09-24 00:26:12.727 UTC [gossip.comm] sendToEndpoint -> DEBU 37a6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.727 UTC [gossip.comm] sendToEndpoint -> DEBU 37a7 Exiting" +"2019-09-24 00:26:12.728 UTC [gossip.gossip] handleMessage -> DEBU 37a8 Exiting" +"2019-09-24 00:26:12.728 UTC [gossip.gossip] handleMessage -> DEBU 37a9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.728 UTC [gossip.pull] HandleMessage -> DEBU 37aa GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.728 UTC [msp] DeserializeIdentity -> DEBU 37ab Obtaining identity" +"2019-09-24 00:26:12.729 UTC [msp] DeserializeIdentity -> DEBU 37ac Obtaining identity" +"2019-09-24 00:26:12.729 UTC [msp] DeserializeIdentity -> DEBU 37ad Obtaining identity" +"2019-09-24 00:26:12.729 UTC [msp] DeserializeIdentity -> DEBU 37ae Obtaining identity" +"2019-09-24 00:26:12.730 UTC [msp] DeserializeIdentity -> DEBU 37af Obtaining identity" +"2019-09-24 00:26:12.730 UTC [msp] DeserializeIdentity -> DEBU 37b0 Obtaining identity" +"2019-09-24 00:26:12.730 UTC [gossip.pull] SendDigest -> DEBU 37b1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:12.730 UTC [gossip.gossip] handleMessage -> DEBU 37b2 Exiting" +"2019-09-24 00:26:12.730 UTC [gossip.gossip] handleMessage -> DEBU 37b3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.732 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37b4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.732 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37b5 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:12.732 UTC [msp] DeserializeIdentity -> DEBU 37b6 Obtaining identity" +"2019-09-24 00:26:12.732 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37b7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:12.732 UTC [cauthdsl] func1 -> DEBU 37bd 0xc0004fcd70 gate 1569284772732640200 evaluation starts" +"2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37be 0xc0004fcd70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37bf 0xc0004fcd70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37c0 0xc0004fcd70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37c1 0xc0004fcd70 principal evaluation fails" +"2019-09-24 00:26:12.732 UTC [cauthdsl] func1 -> DEBU 37c2 0xc0004fcd70 gate 1569284772732640200 evaluation fails" +"2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37c3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:12.732 UTC [policies] Evaluate -> DEBU 37c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:12.732 UTC [cauthdsl] func1 -> DEBU 37c6 0xc0004fd5b0 gate 1569284772732910500 evaluation starts" +"2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37c7 0xc0004fd5b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:12.732 UTC [cauthdsl] func2 -> DEBU 37c8 0xc0004fd5b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:12.733 UTC [cauthdsl] func2 -> DEBU 37c9 0xc0004fd5b0 principal matched by identity 0" +"2019-09-24 00:26:12.733 UTC [msp.identity] Verify -> DEBU 37ca Verify: digest = 00000000 96 10 60 22 aa db 3a 9c e7 c4 e8 e0 ef cd 1d fb |..`"..:.........| +00000010 a7 cd bc dd 6c 6f 38 50 d6 14 53 6e c2 de b0 9a |....lo8P..Sn....|" +"2019-09-24 00:26:12.733 UTC [msp.identity] Verify -> DEBU 37cb Verify: sig = 00000000 30 45 02 21 00 f8 d4 bb 4d 41 b6 61 7e c8 b1 06 |0E.!....MA.a~...| +00000010 e9 30 ee 10 a5 b5 1f 12 85 43 b4 ea 04 a9 a8 55 |.0.......C.....U| +00000020 e5 82 ba 1d 5f 02 20 23 93 27 cc b5 65 1a 9b f1 |...._. #.'..e...| +00000030 08 c4 ab 5f 2d 58 51 08 6b 54 f0 cf e2 1a 5e 57 |..._-XQ.kT....^W| +00000040 c0 78 ce 66 cf 75 9d |.x.f.u.|" +"2019-09-24 00:26:12.733 UTC [cauthdsl] func2 -> DEBU 37cc 0xc0004fd5b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:12.733 UTC [cauthdsl] func1 -> DEBU 37cd 0xc0004fd5b0 gate 1569284772732910500 evaluation succeeds" +"2019-09-24 00:26:12.733 UTC [policies] Evaluate -> DEBU 37ce Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.733 UTC [policies] Evaluate -> DEBU 37cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:12.733 UTC [policies] Evaluate -> DEBU 37d0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:12.733 UTC [policies] Evaluate -> DEBU 37d1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:12.733 UTC [gossip.discovery] handleAliveMessage -> DEBU 37d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:12.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d4 updating membership: timestamp: " +"2019-09-24 00:26:12.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d5 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:12.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:12.733 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d7 Exiting" +"2019-09-24 00:26:12.733 UTC [gossip.discovery] handleAliveMessage -> DEBU 37d8 Exiting" +"2019-09-24 00:26:12.733 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d9 Exiting" +"2019-09-24 00:26:12.733 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37da Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.733 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37db Exiting" +"2019-09-24 00:26:12.733 UTC [gossip.gossip] handleMessage -> DEBU 37dc Exiting" +"2019-09-24 00:26:12.733 UTC [gossip.gossip] handleMessage -> DEBU 37dd Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.733 UTC [gossip.gossip] handleMessage -> DEBU 37de Exiting" +"2019-09-24 00:26:12.733 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37df Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:12.734 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37e0 Exiting" +"2019-09-24 00:26:12.734 UTC [gossip.discovery] sendMemResponse -> DEBU 37e1 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:12.734 UTC [msp] DeserializeIdentity -> DEBU 37e2 Obtaining identity" +"2019-09-24 00:26:12.740 UTC [msp] DeserializeIdentity -> DEBU 37e3 Obtaining identity" +"2019-09-24 00:26:12.740 UTC [msp] DeserializeIdentity -> DEBU 37e4 Obtaining identity" +"2019-09-24 00:26:12.740 UTC [gossip.comm] Send -> DEBU 37e5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:12.741 UTC [gossip.discovery] sendMemResponse -> DEBU 37e6 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0207" signature:"0E\002!\000\307\354\301\\!\\\340\203\356\252;\2313%:\351\364\374\215\256\021R\341\273\374\344TAi\000\260\302\002 >'P\353\230\263\035\275\374f\273+\022,\356E\340'\212,\002\"\235\256\351t\242\031G\326Tb" > alive: alive: alive: " +"2019-09-24 00:26:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 37e7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 37e8 Exiting" +"2019-09-24 00:26:12.822 UTC [gossip.comm] func1 -> DEBU 37e9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.822 UTC [gossip.gossip] handleMessage -> DEBU 37ea Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.823 UTC [gossip.pull] HandleMessage -> DEBU 37eb GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:12.825 UTC [gossip.pull] SendDigest -> DEBU 37ec Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:12.825 UTC [gossip.gossip] handleMessage -> DEBU 37ed Exiting" +"2019-09-24 00:26:13.108 UTC [gossip.gossip] handleMessage -> DEBU 37ee Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:13.109 UTC [msp] DeserializeIdentity -> DEBU 37ef Obtaining identity" +"2019-09-24 00:26:13.110 UTC [msp] DeserializeIdentity -> DEBU 37f0 Obtaining identity" +"2019-09-24 00:26:13.110 UTC [msp] DeserializeIdentity -> DEBU 37f1 Obtaining identity" +"2019-09-24 00:26:13.110 UTC [gossip.gossip] handleMessage -> DEBU 37f2 Exiting" +"2019-09-24 00:26:13.657 UTC [gossip.comm] func1 -> DEBU 37f3 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:13.659 UTC [gossip.gossip] handleMessage -> DEBU 37f4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:13.659 UTC [gossip.pull] HandleMessage -> DEBU 37f5 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:13.659 UTC [gossip.pull] SendDigest -> DEBU 37f6 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:13.659 UTC [gossip.gossip] handleMessage -> DEBU 37f7 Exiting" +"2019-09-24 00:26:13.746 UTC [gossip.comm] func1 -> DEBU 37f8 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:13.746 UTC [gossip.gossip] handleMessage -> DEBU 37f9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:13.746 UTC [gossip.gossip] handleMessage -> DEBU 37fa Exiting" +"2019-09-24 00:26:13.746 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37fb Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:13.746 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37fc Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:13.747 UTC [msp.identity] Verify -> DEBU 37fd Verify: digest = 00000000 9f 47 9d 2b 1e f0 b0 d8 55 78 97 87 67 21 53 0c |.G.+....Ux..g!S.| +00000010 37 a8 c6 ea 9b eb a8 58 ec 30 a4 34 08 bc 5a 60 |7......X.0.4..Z`|" +"2019-09-24 00:26:13.747 UTC [msp.identity] Verify -> DEBU 37fe Verify: sig = 00000000 30 45 02 21 00 e3 b8 44 16 6c be ad 16 36 58 fa |0E.!...D.l...6X.| +00000010 97 35 a7 f8 21 f7 f4 0b 01 22 5e 7b ed f5 13 95 |.5..!...."^{....| +00000020 f4 f4 f7 cb ac 02 20 54 f7 87 fc 3e 18 29 76 d6 |...... T...>.)v.| +00000030 dc 1b 13 a8 a4 c1 4e c7 a0 00 9d 63 d4 3c 9e 55 |......N....c.<.U| +00000040 49 8d 63 08 3c 68 f1 |I.c. DEBU 37ff Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:13.749 UTC [msp.identity] Verify -> DEBU 3800 Verify: sig = 00000000 30 44 02 20 36 29 63 a9 61 bf f4 97 2e 7b dd 0a |0D. 6)c.a....{..| +00000010 d8 43 cc 61 43 4e 82 2d 2f ca f5 c2 dc 80 3f 9d |.C.aCN.-/.....?.| +00000020 94 de a0 8c 02 20 78 33 67 f7 3f c1 93 57 c0 ab |..... x3g.?..W..| +00000030 fb ca 51 57 43 f4 0f 9f 90 ee d5 ca 4f e6 87 26 |..QWC.......O..&| +00000040 8c d6 3c 33 ea b5 |..<3..|" +"2019-09-24 00:26:13.749 UTC [gossip.discovery] handleAliveMessage -> DEBU 3801 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:13.749 UTC [gossip.discovery] learnExistingMembers -> DEBU 3802 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:26:13.749 UTC [gossip.discovery] learnExistingMembers -> DEBU 3803 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:13.749 UTC [gossip.discovery] learnExistingMembers -> DEBU 3804 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:13.749 UTC [gossip.discovery] learnExistingMembers -> DEBU 3805 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:13.749 UTC [gossip.discovery] learnExistingMembers -> DEBU 3806 Exiting" +"2019-09-24 00:26:13.749 UTC [gossip.discovery] handleAliveMessage -> DEBU 3807 Exiting" +"2019-09-24 00:26:13.749 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3808 Exiting" +"2019-09-24 00:26:13.749 UTC [gossip.discovery] sendMemResponse -> DEBU 3809 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:13.749 UTC [msp] DeserializeIdentity -> DEBU 380a Obtaining identity" +"2019-09-24 00:26:13.750 UTC [msp] DeserializeIdentity -> DEBU 380b Obtaining identity" +"2019-09-24 00:26:13.750 UTC [gossip.comm] Send -> DEBU 380c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:13.750 UTC [gossip.discovery] sendMemResponse -> DEBU 380d Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 > alive: " +"2019-09-24 00:26:13.750 UTC [gossip.comm] sendToEndpoint -> DEBU 380e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:13.750 UTC [gossip.comm] sendToEndpoint -> DEBU 380f Exiting" +"2019-09-24 00:26:14.043 UTC [gossip.comm] func1 -> DEBU 3810 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:14.047 UTC [gossip.gossip] handleMessage -> DEBU 3811 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:14.047 UTC [msp] DeserializeIdentity -> DEBU 3812 Obtaining identity" +"2019-09-24 00:26:14.047 UTC [msp] DeserializeIdentity -> DEBU 3813 Obtaining identity" +"2019-09-24 00:26:14.047 UTC [msp] DeserializeIdentity -> DEBU 3814 Obtaining identity" +"2019-09-24 00:26:14.047 UTC [gossip.gossip] handleMessage -> DEBU 3815 Exiting" +"2019-09-24 00:26:14.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 3816 Obtaining default signing identity" +"2019-09-24 00:26:14.601 UTC [msp.identity] Sign -> DEBU 3817 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151034 " +"2019-09-24 00:26:14.601 UTC [msp.identity] Sign -> DEBU 3818 Sign: digest: FC31D8E0FCB25DDB45B82524B1FB066F457BBE3F798C820690A3263A3A86ACB5 " +"2019-09-24 00:26:14.601 UTC [msp] GetDefaultSigningIdentity -> DEBU 3819 Obtaining default signing identity" +"2019-09-24 00:26:14.602 UTC [msp.identity] Sign -> DEBU 381a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:14.602 UTC [msp.identity] Sign -> DEBU 381b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:14.602 UTC [gossip.discovery] periodicalSendAlive -> DEBU 381c Sleeping 5s" +"2019-09-24 00:26:14.602 UTC [msp] DeserializeIdentity -> DEBU 381d Obtaining identity" +"2019-09-24 00:26:14.602 UTC [msp] DeserializeIdentity -> DEBU 381e Obtaining identity" +"2019-09-24 00:26:14.602 UTC [msp] DeserializeIdentity -> DEBU 381f Obtaining identity" +"2019-09-24 00:26:14.602 UTC [gossip.comm] Send -> DEBU 3820 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:14.602 UTC [msp] DeserializeIdentity -> DEBU 3821 Obtaining identity" +"2019-09-24 00:26:14.602 UTC [gossip.comm] Send -> DEBU 3822 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:14.602 UTC [gossip.comm] Send -> DEBU 3823 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:14.602 UTC [gossip.comm] sendToEndpoint -> DEBU 3824 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:14.602 UTC [gossip.comm] sendToEndpoint -> DEBU 3825 Exiting" +"2019-09-24 00:26:14.602 UTC [gossip.comm] sendToEndpoint -> DEBU 3826 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:14.602 UTC [gossip.comm] sendToEndpoint -> DEBU 3827 Exiting" +"2019-09-24 00:26:14.607 UTC [gossip.comm] sendToEndpoint -> DEBU 3828 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:14.607 UTC [gossip.comm] sendToEndpoint -> DEBU 3829 Exiting" +"2019-09-24 00:26:14.958 UTC [gossip.gossip] handleMessage -> DEBU 382a Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:14.958 UTC [gossip.gossip] handleMessage -> DEBU 382b Exiting" +"2019-09-24 00:26:14.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 382c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:14.958 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 382d Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:14.959 UTC [msp] DeserializeIdentity -> DEBU 382e Obtaining identity" +"2019-09-24 00:26:14.959 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 382f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:14.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3830 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:14.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3831 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:14.959 UTC [policies] Evaluate -> DEBU 3832 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:14.959 UTC [policies] Evaluate -> DEBU 3833 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:14.959 UTC [policies] Evaluate -> DEBU 3834 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:14.959 UTC [cauthdsl] func1 -> DEBU 3835 0xc0001e6f90 gate 1569284774959484900 evaluation starts" +"2019-09-24 00:26:14.959 UTC [cauthdsl] func2 -> DEBU 3836 0xc0001e6f90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:14.959 UTC [cauthdsl] func2 -> DEBU 3837 0xc0001e6f90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:14.959 UTC [cauthdsl] func2 -> DEBU 3838 0xc0001e6f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:14.959 UTC [cauthdsl] func2 -> DEBU 3839 0xc0001e6f90 principal evaluation fails" +"2019-09-24 00:26:14.959 UTC [cauthdsl] func1 -> DEBU 383a 0xc0001e6f90 gate 1569284774959484900 evaluation fails" +"2019-09-24 00:26:14.962 UTC [gossip.comm] func1 -> DEBU 383b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:14.959 UTC [policies] Evaluate -> DEBU 383c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 383d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 383e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:14.968 UTC [cauthdsl] func1 -> DEBU 383f 0xc0001e77d0 gate 1569284774968319800 evaluation starts" +"2019-09-24 00:26:14.968 UTC [cauthdsl] func2 -> DEBU 3840 0xc0001e77d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:14.968 UTC [cauthdsl] func2 -> DEBU 3841 0xc0001e77d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:14.968 UTC [cauthdsl] func2 -> DEBU 3842 0xc0001e77d0 principal matched by identity 0" +"2019-09-24 00:26:14.968 UTC [msp.identity] Verify -> DEBU 3843 Verify: digest = 00000000 b3 a0 80 25 30 5d 3b 5f 95 a9 91 5d 85 72 29 27 |...%0];_...].r)'| +00000010 1a fa 1a 4e 3f 16 46 80 b4 5d 61 8e c2 0a 7e 5b |...N?.F..]a...~[|" +"2019-09-24 00:26:14.968 UTC [msp.identity] Verify -> DEBU 3844 Verify: sig = 00000000 30 44 02 20 46 17 a7 f1 a4 29 d8 0a 9e 53 5a ba |0D. F....)...SZ.| +00000010 24 6a 6d 3c bf 4e 29 6e 04 12 8c 40 24 1c a6 bd |$jm<.N)n...@$...| +00000020 6b 86 bc d1 02 20 34 a9 e0 51 4f 0b cc 03 a6 23 |k.... 4..QO....#| +00000030 f2 d6 9c 98 78 06 92 5c 99 ef 94 f6 75 40 4d 52 |....x..\....u@MR| +00000040 0e 9b 09 2c ab 90 |...,..|" +"2019-09-24 00:26:14.968 UTC [cauthdsl] func2 -> DEBU 3845 0xc0001e77d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:14.968 UTC [cauthdsl] func1 -> DEBU 3846 0xc0001e77d0 gate 1569284774968319800 evaluation succeeds" +"2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 3847 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 3848 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 3849 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:14.968 UTC [policies] Evaluate -> DEBU 384a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:14.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 384b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:14.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 384c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:14.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 384d updating membership: timestamp: " +"2019-09-24 00:26:14.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 384e Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:14.969 UTC [gossip.discovery] learnExistingMembers -> DEBU 384f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:14.969 UTC [gossip.discovery] learnExistingMembers -> DEBU 3850 Exiting" +"2019-09-24 00:26:14.969 UTC [gossip.discovery] handleAliveMessage -> DEBU 3851 Exiting" +"2019-09-24 00:26:14.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3852 Exiting" +"2019-09-24 00:26:14.969 UTC [gossip.gossip] handleMessage -> DEBU 3853 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:14.969 UTC [gossip.gossip] handleMessage -> DEBU 3854 Exiting" +"2019-09-24 00:26:14.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3855 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:14.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3856 Exiting" +"2019-09-24 00:26:14.974 UTC [gossip.comm] func1 -> DEBU 3857 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:14.974 UTC [gossip.gossip] handleMessage -> DEBU 3858 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:14.974 UTC [gossip.gossip] handleMessage -> DEBU 3859 Exiting" +"2019-09-24 00:26:14.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:14.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385b Exiting" +"2019-09-24 00:26:14.981 UTC [msp] DeserializeIdentity -> DEBU 385c Obtaining identity" +"2019-09-24 00:26:14.982 UTC [msp] DeserializeIdentity -> DEBU 385d Obtaining identity" +"2019-09-24 00:26:14.982 UTC [msp] DeserializeIdentity -> DEBU 385e Obtaining identity" +"2019-09-24 00:26:14.985 UTC [msp] DeserializeIdentity -> DEBU 385f Obtaining identity" +"2019-09-24 00:26:14.986 UTC [msp] DeserializeIdentity -> DEBU 3860 Obtaining identity" +"2019-09-24 00:26:14.986 UTC [msp] DeserializeIdentity -> DEBU 3861 Obtaining identity" +"2019-09-24 00:26:14.986 UTC [msp] DeserializeIdentity -> DEBU 3862 Obtaining identity" +"2019-09-24 00:26:14.986 UTC [gossip.comm] Send -> DEBU 3863 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:14.986 UTC [msp] DeserializeIdentity -> DEBU 3864 Obtaining identity" +"2019-09-24 00:26:14.986 UTC [gossip.comm] Send -> DEBU 3865 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:14.986 UTC [gossip.comm] sendToEndpoint -> DEBU 3866 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:14.986 UTC [gossip.comm] sendToEndpoint -> DEBU 3867 Exiting" +"2019-09-24 00:26:14.986 UTC [gossip.comm] sendToEndpoint -> DEBU 3868 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:14.986 UTC [gossip.comm] sendToEndpoint -> DEBU 3869 Exiting" +"2019-09-24 00:26:15.672 UTC [gossip.comm] func1 -> DEBU 386a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.672 UTC [gossip.gossip] handleMessage -> DEBU 386b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.672 UTC [gossip.gossip] handleMessage -> DEBU 386c Exiting" +"2019-09-24 00:26:15.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 386d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.672 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 386e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:15.672 UTC [msp] DeserializeIdentity -> DEBU 386f Obtaining identity" +"2019-09-24 00:26:15.673 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3870 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:15.673 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3871 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:15.673 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3872 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 3873 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 3874 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 3875 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func1 -> DEBU 3876 0xc0001f3850 gate 1569284775673318700 evaluation starts" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3877 0xc0001f3850 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3878 0xc0001f3850 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3879 0xc0001f3850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 387a 0xc0001f3850 principal evaluation fails" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func1 -> DEBU 387b 0xc0001f3850 gate 1569284775673318700 evaluation fails" +"2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 387c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 387d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 387e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func1 -> DEBU 387f 0xc00031e090 gate 1569284775673603200 evaluation starts" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3880 0xc00031e090 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3881 0xc00031e090 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3882 0xc00031e090 principal matched by identity 0" +"2019-09-24 00:26:15.673 UTC [msp.identity] Verify -> DEBU 3883 Verify: digest = 00000000 81 4e e1 4c 6a b2 48 4c f3 9e f6 69 25 37 e8 b6 |.N.Lj.HL...i%7..| +00000010 6e f1 9b 56 c1 d7 78 49 17 33 a8 62 23 9a 41 e1 |n..V..xI.3.b#.A.|" +"2019-09-24 00:26:15.673 UTC [msp.identity] Verify -> DEBU 3884 Verify: sig = 00000000 30 44 02 20 31 6e 64 19 73 13 50 1c 52 80 bd 23 |0D. 1nd.s.P.R..#| +00000010 90 2d 69 a5 c2 15 d6 c9 7e 7d 5a a3 42 04 88 fe |.-i.....~}Z.B...| +00000020 e1 c6 ba 70 02 20 6f 7c 36 8c c2 6f 16 99 f0 9b |...p. o|6..o....| +00000030 29 21 64 8d 9b 15 a0 a1 2d 0e 19 32 02 fb d4 4d |)!d.....-..2...M| +00000040 12 0c d1 ac ed c4 |......|" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func2 -> DEBU 3885 0xc00031e090 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:15.673 UTC [cauthdsl] func1 -> DEBU 3886 0xc00031e090 gate 1569284775673603200 evaluation succeeds" +"2019-09-24 00:26:15.673 UTC [policies] Evaluate -> DEBU 3887 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:15.674 UTC [policies] Evaluate -> DEBU 3888 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:15.674 UTC [policies] Evaluate -> DEBU 3889 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:15.674 UTC [policies] Evaluate -> DEBU 388a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:15.674 UTC [gossip.discovery] handleAliveMessage -> DEBU 388b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 388c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:15.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 388d updating membership: timestamp: " +"2019-09-24 00:26:15.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 388e Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:15.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 388f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:15.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 3890 Exiting" +"2019-09-24 00:26:15.674 UTC [gossip.discovery] handleAliveMessage -> DEBU 3891 Exiting" +"2019-09-24 00:26:15.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3892 Exiting" +"2019-09-24 00:26:15.674 UTC [gossip.comm] func1 -> DEBU 3893 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.674 UTC [gossip.gossip] handleMessage -> DEBU 3894 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.674 UTC [gossip.gossip] handleMessage -> DEBU 3895 Exiting" +"2019-09-24 00:26:15.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3896 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3897 Exiting" +"2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 3898 Obtaining identity" +"2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 3899 Obtaining identity" +"2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 389a Obtaining identity" +"2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 389b Obtaining identity" +"2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 389c Obtaining identity" +"2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 389d Obtaining identity" +"2019-09-24 00:26:15.686 UTC [gossip.comm] Send -> DEBU 389e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:15.686 UTC [msp] DeserializeIdentity -> DEBU 389f Obtaining identity" +"2019-09-24 00:26:15.687 UTC [msp] DeserializeIdentity -> DEBU 38a0 Obtaining identity" +"2019-09-24 00:26:15.687 UTC [gossip.comm] Send -> DEBU 38a1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:15.687 UTC [gossip.comm] sendToEndpoint -> DEBU 38a2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.687 UTC [gossip.comm] sendToEndpoint -> DEBU 38a3 Exiting" +"2019-09-24 00:26:15.687 UTC [gossip.comm] sendToEndpoint -> DEBU 38a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.687 UTC [gossip.comm] sendToEndpoint -> DEBU 38a5 Exiting" +"2019-09-24 00:26:15.690 UTC [gossip.gossip] handleMessage -> DEBU 38a6 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.690 UTC [gossip.gossip] handleMessage -> DEBU 38a7 Exiting" +"2019-09-24 00:26:15.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38a8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38a9 Exiting" +"2019-09-24 00:26:15.701 UTC [gossip.pull] Hello -> DEBU 38aa Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:15.702 UTC [gossip.comm] Send -> DEBU 38ab Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:15.703 UTC [gossip.pull] Hello -> DEBU 38ac Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:15.703 UTC [gossip.comm] Send -> DEBU 38ad Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:15.703 UTC [gossip.pull] Hello -> DEBU 38ae Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:15.703 UTC [gossip.comm] Send -> DEBU 38af Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b2 Exiting" +"2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b3 Exiting" +"2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.703 UTC [gossip.comm] sendToEndpoint -> DEBU 38b5 Exiting" +"2019-09-24 00:26:15.708 UTC [gossip.comm] func1 -> DEBU 38b6 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.708 UTC [gossip.gossip] handleMessage -> DEBU 38b7 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.708 UTC [gossip.pull] HandleMessage -> DEBU 38b8 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.708 UTC [gossip.gossip] handleMessage -> DEBU 38b9 Exiting" +"2019-09-24 00:26:15.708 UTC [gossip.comm] func1 -> DEBU 38ba Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.708 UTC [gossip.gossip] handleMessage -> DEBU 38bb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.708 UTC [gossip.pull] HandleMessage -> DEBU 38bc GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.709 UTC [gossip.gossip] handleMessage -> DEBU 38bd Exiting" +"2019-09-24 00:26:15.709 UTC [gossip.gossip] handleMessage -> DEBU 38be Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.709 UTC [gossip.pull] HandleMessage -> DEBU 38bf GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.709 UTC [gossip.gossip] handleMessage -> DEBU 38c0 Exiting" +"2019-09-24 00:26:15.853 UTC [msp] GetDefaultSigningIdentity -> DEBU 38c1 Obtaining default signing identity" +"2019-09-24 00:26:15.853 UTC [msp.identity] Sign -> DEBU 38c2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151035 " +"2019-09-24 00:26:15.853 UTC [msp.identity] Sign -> DEBU 38c3 Sign: digest: B8EE086DE181E3C3F687EB6FD42B8FAB810A418A3A56BBBB83E1118E94B42992 " +"2019-09-24 00:26:15.853 UTC [msp] GetDefaultSigningIdentity -> DEBU 38c4 Obtaining default signing identity" +"2019-09-24 00:26:15.853 UTC [msp.identity] Sign -> DEBU 38c5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:15.853 UTC [msp.identity] Sign -> DEBU 38c6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:15.853 UTC [msp] DeserializeIdentity -> DEBU 38c7 Obtaining identity" +"2019-09-24 00:26:15.853 UTC [gossip.comm] Send -> DEBU 38c8 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:15.853 UTC [msp] DeserializeIdentity -> DEBU 38c9 Obtaining identity" +"2019-09-24 00:26:15.853 UTC [gossip.comm] Send -> DEBU 38ca Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:15.854 UTC [gossip.comm] Send -> DEBU 38cb Entering, sending GossipMessage: tag:EMPTY mem_req:\344\333`Z\r\270\010K\002 8\334\270\271\2075R\212\326\\\251c\026\004%\003P\316\3411\326\315\321\035\244}\250\220\262\023\257\252" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38cc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\344\333`Z\r\270\010K\002 8\334\270\271\2075R\212\326\\\251c\026\004%\003P\316\3411\326\315\321\035\244}\250\220\262\023\257\252" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38cd Exiting" +"2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38ce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38cf Exiting" +"2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38d0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.854 UTC [gossip.comm] sendToEndpoint -> DEBU 38d1 Exiting" +"2019-09-24 00:26:15.855 UTC [gossip.gossip] handleMessage -> DEBU 38d2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.855 UTC [gossip.gossip] handleMessage -> DEBU 38d3 Exiting" +"2019-09-24 00:26:15.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.856 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38d5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:15.857 UTC [msp.identity] Verify -> DEBU 38d6 Verify: digest = 00000000 9f 47 9d 2b 1e f0 b0 d8 55 78 97 87 67 21 53 0c |.G.+....Ux..g!S.| +00000010 37 a8 c6 ea 9b eb a8 58 ec 30 a4 34 08 bc 5a 60 |7......X.0.4..Z`|" +"2019-09-24 00:26:15.857 UTC [gossip.comm] func1 -> DEBU 38d8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.857 UTC [gossip.gossip] handleMessage -> DEBU 38da Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.857 UTC [msp.identity] Verify -> DEBU 38d9 Verify: sig = 00000000 30 45 02 21 00 e3 b8 44 16 6c be ad 16 36 58 fa |0E.!...D.l...6X.| +00000010 97 35 a7 f8 21 f7 f4 0b 01 22 5e 7b ed f5 13 95 |.5..!...."^{....| +00000020 f4 f4 f7 cb ac 02 20 54 f7 87 fc 3e 18 29 76 d6 |...... T...>.)v.| +00000030 dc 1b 13 a8 a4 c1 4e c7 a0 00 9d 63 d4 3c 9e 55 |......N....c.<.U| +00000040 49 8d 63 08 3c 68 f1 |I.c. DEBU 38db Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:15.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 38dc Exiting" +"2019-09-24 00:26:15.859 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38dd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:15.859 UTC [msp.identity] Verify -> DEBU 38de Verify: digest = 00000000 b8 ee 08 6d e1 81 e3 c3 f6 87 eb 6f d4 2b 8f ab |...m.......o.+..| +00000010 81 0a 41 8a 3a 56 bb bb 83 e1 11 8e 94 b4 29 92 |..A.:V........).|" +"2019-09-24 00:26:15.860 UTC [msp.identity] Verify -> DEBU 38df Verify: sig = 00000000 30 44 02 20 08 df d1 9e 5c 63 c8 bb 79 70 5c 0d |0D. ....\c..yp\.| +00000010 5a ba 86 d4 20 bd f5 26 48 07 af c4 ca 81 22 5b |Z... ..&H....."[| +00000020 09 b1 72 c1 02 20 2d a0 3b 71 36 34 54 88 18 49 |..r.. -.;q64T..I| +00000030 f5 8f 75 81 39 73 45 4a 97 a4 47 56 1d a1 02 1e |..u.9sEJ..GV....| +00000040 36 d5 ac 99 99 e5 |6.....|" +"2019-09-24 00:26:15.860 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.857 UTC [gossip.comm] func1 -> DEBU 38d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.864 UTC [gossip.discovery] isSentByMe -> DEBU 38e1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.864 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e2 Exiting" +"2019-09-24 00:26:15.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38e3 Exiting" +"2019-09-24 00:26:15.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.864 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38e5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:15.864 UTC [msp.identity] Verify -> DEBU 38e6 Verify: digest = 00000000 b8 ee 08 6d e1 81 e3 c3 f6 87 eb 6f d4 2b 8f ab |...m.......o.+..| +00000010 81 0a 41 8a 3a 56 bb bb 83 e1 11 8e 94 b4 29 92 |..A.:V........).|" +"2019-09-24 00:26:15.864 UTC [msp.identity] Verify -> DEBU 38e7 Verify: sig = 00000000 30 44 02 20 08 df d1 9e 5c 63 c8 bb 79 70 5c 0d |0D. ....\c..yp\.| +00000010 5a ba 86 d4 20 bd f5 26 48 07 af c4 ca 81 22 5b |Z... ..&H....."[| +00000020 09 b1 72 c1 02 20 2d a0 3b 71 36 34 54 88 18 49 |..r.. -.;q64T..I| +00000030 f5 8f 75 81 39 73 45 4a 97 a4 47 56 1d a1 02 1e |..u.9sEJ..GV....| +00000040 36 d5 ac 99 99 e5 |6.....|" +"2019-09-24 00:26:15.864 UTC [msp.identity] Verify -> DEBU 38e8 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:15.864 UTC [msp.identity] Verify -> DEBU 38e9 Verify: sig = 00000000 30 44 02 20 22 bb b0 6a f0 f2 35 03 a9 54 a0 b6 |0D. "..j..5..T..| +00000010 34 48 87 76 14 43 7f 33 0f 0a f9 3e e4 db 60 5a |4H.v.C.3...>..`Z| +00000020 0d b8 08 4b 02 20 38 dc b8 b9 87 35 52 8a d6 5c |...K. 8....5R..\| +00000030 a9 63 16 04 25 03 50 ce e1 31 d6 cd d1 1d a4 7d |.c..%.P..1.....}| +00000040 a8 90 b2 13 af aa |......|" +"2019-09-24 00:26:15.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 38ea Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:15.865 UTC [gossip.discovery] isSentByMe -> DEBU 38eb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:15.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 38ec Exiting" +"2019-09-24 00:26:15.865 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ed Exiting" +"2019-09-24 00:26:15.865 UTC [gossip.gossip] handleMessage -> DEBU 38ee Exiting" +"2019-09-24 00:26:15.865 UTC [gossip.gossip] handleMessage -> DEBU 38ef Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.865 UTC [gossip.gossip] handleMessage -> DEBU 38f0 Exiting" +"2019-09-24 00:26:15.865 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38f1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.865 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38f2 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:15.865 UTC [msp.identity] Verify -> DEBU 38f3 Verify: digest = 00000000 b8 ee 08 6d e1 81 e3 c3 f6 87 eb 6f d4 2b 8f ab |...m.......o.+..| +00000010 81 0a 41 8a 3a 56 bb bb 83 e1 11 8e 94 b4 29 92 |..A.:V........).|" +"2019-09-24 00:26:15.865 UTC [msp.identity] Verify -> DEBU 38f4 Verify: sig = 00000000 30 44 02 20 08 df d1 9e 5c 63 c8 bb 79 70 5c 0d |0D. ....\c..yp\.| +00000010 5a ba 86 d4 20 bd f5 26 48 07 af c4 ca 81 22 5b |Z... ..&H....."[| +00000020 09 b1 72 c1 02 20 2d a0 3b 71 36 34 54 88 18 49 |..r.. -.;q64T..I| +00000030 f5 8f 75 81 39 73 45 4a 97 a4 47 56 1d a1 02 1e |..u.9sEJ..GV....| +00000040 36 d5 ac 99 99 e5 |6.....|" +"2019-09-24 00:26:15.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 38f5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.865 UTC [gossip.discovery] isSentByMe -> DEBU 38f6 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:15.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 38f7 Exiting" +"2019-09-24 00:26:15.866 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38f8 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:15.866 UTC [msp.identity] Verify -> DEBU 38f9 Verify: digest = 00000000 9f 47 9d 2b 1e f0 b0 d8 55 78 97 87 67 21 53 0c |.G.+....Ux..g!S.| +00000010 37 a8 c6 ea 9b eb a8 58 ec 30 a4 34 08 bc 5a 60 |7......X.0.4..Z`|" +"2019-09-24 00:26:15.866 UTC [msp.identity] Verify -> DEBU 38fa Verify: sig = 00000000 30 45 02 21 00 e3 b8 44 16 6c be ad 16 36 58 fa |0E.!...D.l...6X.| +00000010 97 35 a7 f8 21 f7 f4 0b 01 22 5e 7b ed f5 13 95 |.5..!...."^{....| +00000020 f4 f4 f7 cb ac 02 20 54 f7 87 fc 3e 18 29 76 d6 |...... T...>.)v.| +00000030 dc 1b 13 a8 a4 c1 4e c7 a0 00 9d 63 d4 3c 9e 55 |......N....c.<.U| +00000040 49 8d 63 08 3c 68 f1 |I.c. DEBU 38fb Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:15.866 UTC [gossip.discovery] handleAliveMessage -> DEBU 38fc Exiting" +"2019-09-24 00:26:15.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38fd Exiting" +"2019-09-24 00:26:15.925 UTC [gossip.gossip] handleMessage -> DEBU 38fe Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.925 UTC [gossip.pull] HandleMessage -> DEBU 38ff GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:15.925 UTC [msp] DeserializeIdentity -> DEBU 3900 Obtaining identity" +"2019-09-24 00:26:15.925 UTC [msp] DeserializeIdentity -> DEBU 3901 Obtaining identity" +"2019-09-24 00:26:15.926 UTC [msp] DeserializeIdentity -> DEBU 3902 Obtaining identity" +"2019-09-24 00:26:15.926 UTC [msp] DeserializeIdentity -> DEBU 3903 Obtaining identity" +"2019-09-24 00:26:15.926 UTC [msp] DeserializeIdentity -> DEBU 3904 Obtaining identity" +"2019-09-24 00:26:15.926 UTC [msp] DeserializeIdentity -> DEBU 3905 Obtaining identity" +"2019-09-24 00:26:15.926 UTC [gossip.pull] SendDigest -> DEBU 3906 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:15.927 UTC [gossip.gossip] handleMessage -> DEBU 3907 Exiting" +"2019-09-24 00:26:16.022 UTC [gossip.gossip] handleMessage -> DEBU 3908 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.022 UTC [gossip.gossip] handleMessage -> DEBU 3909 Exiting" +"2019-09-24 00:26:16.023 UTC [gossip.discovery] handleMsgFromComm -> DEBU 390a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.023 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 390b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:16.023 UTC [msp] DeserializeIdentity -> DEBU 390c Obtaining identity" +"2019-09-24 00:26:16.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 390d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:16.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 390e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 390f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.023 UTC [policies] Evaluate -> DEBU 3910 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:16.024 UTC [policies] Evaluate -> DEBU 3911 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:16.024 UTC [policies] Evaluate -> DEBU 3912 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:16.024 UTC [cauthdsl] func1 -> DEBU 3913 0xc0038944e0 gate 1569284776024230400 evaluation starts" +"2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 3914 0xc0038944e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 3915 0xc0038944e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 3916 0xc0038944e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 3917 0xc0038944e0 principal evaluation fails" +"2019-09-24 00:26:16.024 UTC [cauthdsl] func1 -> DEBU 3918 0xc0038944e0 gate 1569284776024230400 evaluation fails" +"2019-09-24 00:26:16.024 UTC [policies] Evaluate -> DEBU 3919 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.024 UTC [policies] Evaluate -> DEBU 391a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.024 UTC [policies] Evaluate -> DEBU 391b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:16.024 UTC [cauthdsl] func1 -> DEBU 391c 0xc003894d20 gate 1569284776024775000 evaluation starts" +"2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 391d 0xc003894d20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 391e 0xc003894d20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.024 UTC [cauthdsl] func2 -> DEBU 391f 0xc003894d20 principal matched by identity 0" +"2019-09-24 00:26:16.024 UTC [msp.identity] Verify -> DEBU 3920 Verify: digest = 00000000 15 02 4b ef d4 34 e7 0d a1 ef 12 4e 6d a3 29 1e |..K..4.....Nm.).| +00000010 d8 9d 6b b7 d5 4b d4 7e dd d3 b1 2e dc b1 62 b1 |..k..K.~......b.|" +"2019-09-24 00:26:16.025 UTC [msp.identity] Verify -> DEBU 3921 Verify: sig = 00000000 30 44 02 20 4b 9e 52 0e 7e ef 2d 53 98 ea fc 34 |0D. K.R.~.-S...4| +00000010 92 55 49 98 ca d8 de 90 58 5c cb 01 72 01 bc 0e |.UI.....X\..r...| +00000020 22 63 2d 19 02 20 56 9b 8e e5 54 ee c5 2b 93 6f |"c-.. V...T..+.o| +00000030 5d 4a ff 54 6d 64 e3 7f 07 41 25 ad 9d 34 ce fa |]J.Tmd...A%..4..| +00000040 ff e7 49 19 3d 91 |..I.=.|" +"2019-09-24 00:26:16.025 UTC [cauthdsl] func2 -> DEBU 3922 0xc003894d20 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:16.031 UTC [cauthdsl] func1 -> DEBU 3923 0xc003894d20 gate 1569284776024775000 evaluation succeeds" +"2019-09-24 00:26:16.031 UTC [policies] Evaluate -> DEBU 3924 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.031 UTC [policies] Evaluate -> DEBU 3925 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.031 UTC [policies] Evaluate -> DEBU 3926 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:16.032 UTC [policies] Evaluate -> DEBU 3927 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:16.032 UTC [gossip.discovery] handleAliveMessage -> DEBU 3928 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:16.035 UTC [gossip.discovery] learnExistingMembers -> DEBU 3929 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:16.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 392a updating membership: timestamp: " +"2019-09-24 00:26:16.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 392b Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:16.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 392c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:16.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 392d Exiting" +"2019-09-24 00:26:16.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 392e Exiting" +"2019-09-24 00:26:16.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 392f Exiting" +"2019-09-24 00:26:16.038 UTC [gossip.discovery] sendMemResponse -> DEBU 3930 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:16.038 UTC [msp] DeserializeIdentity -> DEBU 3931 Obtaining identity" +"2019-09-24 00:26:16.038 UTC [msp] DeserializeIdentity -> DEBU 3932 Obtaining identity" +"2019-09-24 00:26:16.038 UTC [msp] DeserializeIdentity -> DEBU 3933 Obtaining identity" +"2019-09-24 00:26:16.038 UTC [gossip.comm] Send -> DEBU 3934 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:16.039 UTC [gossip.discovery] sendMemResponse -> DEBU 3935 Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 alive: " +"2019-09-24 00:26:16.039 UTC [gossip.comm] sendToEndpoint -> DEBU 3936 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.039 UTC [gossip.comm] sendToEndpoint -> DEBU 3937 Exiting" +"2019-09-24 00:26:16.121 UTC [msp] DeserializeIdentity -> DEBU 3938 Obtaining identity" +"2019-09-24 00:26:16.122 UTC [msp] DeserializeIdentity -> DEBU 3939 Obtaining identity" +"2019-09-24 00:26:16.122 UTC [gossip.comm] Send -> DEBU 393a Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:16.122 UTC [gossip.comm] sendToEndpoint -> DEBU 393b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.122 UTC [gossip.comm] sendToEndpoint -> DEBU 393c Exiting" +"2019-09-24 00:26:16.123 UTC [gossip.comm] sendToEndpoint -> DEBU 393d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.123 UTC [gossip.comm] sendToEndpoint -> DEBU 393e Exiting" +"2019-09-24 00:26:16.123 UTC [gossip.comm] sendToEndpoint -> DEBU 393f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.123 UTC [gossip.comm] sendToEndpoint -> DEBU 3940 Exiting" +"2019-09-24 00:26:16.124 UTC [gossip.comm] func1 -> DEBU 3941 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.124 UTC [gossip.gossip] handleMessage -> DEBU 3942 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.125 UTC [msp.identity] Verify -> DEBU 3943 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:16.125 UTC [msp.identity] Verify -> DEBU 3944 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:16.125 UTC [gossip.comm] func1 -> DEBU 3945 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.125 UTC [msp.identity] Verify -> DEBU 3946 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:16.125 UTC [msp.identity] Verify -> DEBU 3947 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:16.125 UTC [msp] DeserializeIdentity -> DEBU 3948 Obtaining identity" +"2019-09-24 00:26:16.125 UTC [msp] DeserializeIdentity -> DEBU 3949 Obtaining identity" +"2019-09-24 00:26:16.129 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 394a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:16.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 394b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 394c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 394d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 394e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 394f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:16.129 UTC [cauthdsl] func1 -> DEBU 3950 0xc003352ea0 gate 1569284776129642300 evaluation starts" +"2019-09-24 00:26:16.129 UTC [cauthdsl] func2 -> DEBU 3951 0xc003352ea0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.129 UTC [cauthdsl] func2 -> DEBU 3952 0xc003352ea0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.129 UTC [cauthdsl] func2 -> DEBU 3953 0xc003352ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:16.129 UTC [cauthdsl] func2 -> DEBU 3954 0xc003352ea0 principal evaluation fails" +"2019-09-24 00:26:16.129 UTC [cauthdsl] func1 -> DEBU 3955 0xc003352ea0 gate 1569284776129642300 evaluation fails" +"2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 3956 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 3957 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.129 UTC [policies] Evaluate -> DEBU 3958 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:16.130 UTC [cauthdsl] func1 -> DEBU 3959 0xc0033536e0 gate 1569284776130010900 evaluation starts" +"2019-09-24 00:26:16.130 UTC [cauthdsl] func2 -> DEBU 395a 0xc0033536e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.130 UTC [cauthdsl] func2 -> DEBU 395b 0xc0033536e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.130 UTC [cauthdsl] func2 -> DEBU 395c 0xc0033536e0 principal matched by identity 0" +"2019-09-24 00:26:16.130 UTC [msp.identity] Verify -> DEBU 395d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:16.130 UTC [msp.identity] Verify -> DEBU 395e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:16.130 UTC [cauthdsl] func2 -> DEBU 395f 0xc0033536e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:16.130 UTC [cauthdsl] func1 -> DEBU 3960 0xc0033536e0 gate 1569284776130010900 evaluation succeeds" +"2019-09-24 00:26:16.130 UTC [policies] Evaluate -> DEBU 3961 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.130 UTC [policies] Evaluate -> DEBU 3962 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.130 UTC [policies] Evaluate -> DEBU 3963 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:16.130 UTC [policies] Evaluate -> DEBU 3964 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:16.130 UTC [msp] DeserializeIdentity -> DEBU 3965 Obtaining identity" +"2019-09-24 00:26:16.130 UTC [msp] DeserializeIdentity -> DEBU 3966 Obtaining identity" +"2019-09-24 00:26:16.130 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3967 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:16.130 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3968 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.130 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3969 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 396a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 396b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 396c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func1 -> DEBU 396d 0xc003c54eb0 gate 1569284776131081500 evaluation starts" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 396e 0xc003c54eb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 396f 0xc003c54eb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 3970 0xc003c54eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 3971 0xc003c54eb0 principal evaluation fails" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func1 -> DEBU 3972 0xc003c54eb0 gate 1569284776131081500 evaluation fails" +"2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 3973 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 3974 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 3975 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func1 -> DEBU 3976 0xc003c556f0 gate 1569284776131343900 evaluation starts" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 3977 0xc003c556f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 3978 0xc003c556f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 3979 0xc003c556f0 principal matched by identity 0" +"2019-09-24 00:26:16.131 UTC [msp.identity] Verify -> DEBU 397a Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:16.131 UTC [msp.identity] Verify -> DEBU 397b Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func2 -> DEBU 397c 0xc003c556f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:16.131 UTC [cauthdsl] func1 -> DEBU 397d 0xc003c556f0 gate 1569284776131343900 evaluation succeeds" +"2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 397e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 397f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 3980 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:16.131 UTC [policies] Evaluate -> DEBU 3981 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:16.131 UTC [gossip.gossip] handleMessage -> DEBU 3982 Exiting" +"2019-09-24 00:26:16.131 UTC [gossip.gossip] handleMessage -> DEBU 3983 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.131 UTC [msp] DeserializeIdentity -> DEBU 3984 Obtaining identity" +"2019-09-24 00:26:16.131 UTC [msp] DeserializeIdentity -> DEBU 3985 Obtaining identity" +"2019-09-24 00:26:16.131 UTC [msp] DeserializeIdentity -> DEBU 3986 Obtaining identity" +"2019-09-24 00:26:16.135 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3987 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:16.135 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3988 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.135 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3989 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 398a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 398b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 398c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:16.135 UTC [cauthdsl] func1 -> DEBU 398d 0xc0030d5230 gate 1569284776135504000 evaluation starts" +"2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 398e 0xc0030d5230 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 398f 0xc0030d5230 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 3990 0xc0030d5230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 3991 0xc0030d5230 principal evaluation fails" +"2019-09-24 00:26:16.135 UTC [cauthdsl] func1 -> DEBU 3992 0xc0030d5230 gate 1569284776135504000 evaluation fails" +"2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 3993 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 3994 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.135 UTC [policies] Evaluate -> DEBU 3995 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:16.135 UTC [cauthdsl] func1 -> DEBU 3996 0xc0030d5a70 gate 1569284776135878000 evaluation starts" +"2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 3997 0xc0030d5a70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 3998 0xc0030d5a70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.135 UTC [cauthdsl] func2 -> DEBU 3999 0xc0030d5a70 principal matched by identity 0" +"2019-09-24 00:26:16.136 UTC [msp.identity] Verify -> DEBU 399a Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:16.136 UTC [msp.identity] Verify -> DEBU 399b Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:16.136 UTC [cauthdsl] func2 -> DEBU 399c 0xc0030d5a70 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:16.136 UTC [cauthdsl] func1 -> DEBU 399d 0xc0030d5a70 gate 1569284776135878000 evaluation succeeds" +"2019-09-24 00:26:16.136 UTC [policies] Evaluate -> DEBU 399e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.136 UTC [policies] Evaluate -> DEBU 399f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.136 UTC [policies] Evaluate -> DEBU 39a0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:16.136 UTC [policies] Evaluate -> DEBU 39a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:16.137 UTC [msp.identity] Verify -> DEBU 39a2 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:16.137 UTC [msp.identity] Verify -> DEBU 39a3 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:16.137 UTC [msp.identity] Verify -> DEBU 39a4 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:16.137 UTC [msp.identity] Verify -> DEBU 39a5 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:16.137 UTC [msp] DeserializeIdentity -> DEBU 39a6 Obtaining identity" +"2019-09-24 00:26:16.137 UTC [msp] DeserializeIdentity -> DEBU 39a7 Obtaining identity" +"2019-09-24 00:26:16.137 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39a8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:16.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39a9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39aa Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:16.138 UTC [cauthdsl] func1 -> DEBU 39ae 0xc004aee0a0 gate 1569284776138207100 evaluation starts" +"2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39af 0xc004aee0a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39b0 0xc004aee0a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39b1 0xc004aee0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39b2 0xc004aee0a0 principal evaluation fails" +"2019-09-24 00:26:16.138 UTC [cauthdsl] func1 -> DEBU 39b3 0xc004aee0a0 gate 1569284776138207100 evaluation fails" +"2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39b4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.138 UTC [policies] Evaluate -> DEBU 39b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:16.138 UTC [cauthdsl] func1 -> DEBU 39b7 0xc004aee8e0 gate 1569284776138860900 evaluation starts" +"2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39b8 0xc004aee8e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.138 UTC [cauthdsl] func2 -> DEBU 39b9 0xc004aee8e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.139 UTC [cauthdsl] func2 -> DEBU 39ba 0xc004aee8e0 principal matched by identity 0" +"2019-09-24 00:26:16.139 UTC [msp.identity] Verify -> DEBU 39bb Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:16.139 UTC [msp.identity] Verify -> DEBU 39bc Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:16.139 UTC [cauthdsl] func2 -> DEBU 39bd 0xc004aee8e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:16.139 UTC [cauthdsl] func1 -> DEBU 39be 0xc004aee8e0 gate 1569284776138860900 evaluation succeeds" +"2019-09-24 00:26:16.139 UTC [policies] Evaluate -> DEBU 39bf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.139 UTC [policies] Evaluate -> DEBU 39c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.139 UTC [policies] Evaluate -> DEBU 39c1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:16.139 UTC [policies] Evaluate -> DEBU 39c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:16.139 UTC [gossip.gossip] handleMessage -> DEBU 39c3 Exiting" +"2019-09-24 00:26:16.140 UTC [gossip.gossip] handleMessage -> DEBU 39c4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.140 UTC [msp] DeserializeIdentity -> DEBU 39c5 Obtaining identity" +"2019-09-24 00:26:16.140 UTC [msp] DeserializeIdentity -> DEBU 39c6 Obtaining identity" +"2019-09-24 00:26:16.166 UTC [msp] DeserializeIdentity -> DEBU 39c7 Obtaining identity" +"2019-09-24 00:26:16.167 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39c8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:16.167 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39c9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.167 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39ca Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.167 UTC [policies] Evaluate -> DEBU 39cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:16.167 UTC [policies] Evaluate -> DEBU 39cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:16.167 UTC [policies] Evaluate -> DEBU 39cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:16.167 UTC [cauthdsl] func1 -> DEBU 39ce 0xc004b52400 gate 1569284776167964800 evaluation starts" +"2019-09-24 00:26:16.168 UTC [cauthdsl] func2 -> DEBU 39cf 0xc004b52400 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.168 UTC [cauthdsl] func2 -> DEBU 39d0 0xc004b52400 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.168 UTC [cauthdsl] func2 -> DEBU 39d1 0xc004b52400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:16.168 UTC [cauthdsl] func2 -> DEBU 39d2 0xc004b52400 principal evaluation fails" +"2019-09-24 00:26:16.168 UTC [cauthdsl] func1 -> DEBU 39d3 0xc004b52400 gate 1569284776167964800 evaluation fails" +"2019-09-24 00:26:16.168 UTC [policies] Evaluate -> DEBU 39d4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.168 UTC [policies] Evaluate -> DEBU 39d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.168 UTC [policies] Evaluate -> DEBU 39d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:16.168 UTC [cauthdsl] func1 -> DEBU 39d7 0xc004b52c40 gate 1569284776168650000 evaluation starts" +"2019-09-24 00:26:16.168 UTC [cauthdsl] func2 -> DEBU 39d8 0xc004b52c40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.169 UTC [cauthdsl] func2 -> DEBU 39d9 0xc004b52c40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.169 UTC [cauthdsl] func2 -> DEBU 39da 0xc004b52c40 principal matched by identity 0" +"2019-09-24 00:26:16.169 UTC [msp.identity] Verify -> DEBU 39db Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:16.169 UTC [msp.identity] Verify -> DEBU 39dc Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:16.169 UTC [cauthdsl] func2 -> DEBU 39dd 0xc004b52c40 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:16.169 UTC [cauthdsl] func1 -> DEBU 39de 0xc004b52c40 gate 1569284776168650000 evaluation succeeds" +"2019-09-24 00:26:16.169 UTC [policies] Evaluate -> DEBU 39df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.169 UTC [policies] Evaluate -> DEBU 39e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.170 UTC [policies] Evaluate -> DEBU 39e1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:16.170 UTC [policies] Evaluate -> DEBU 39e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:16.172 UTC [msp.identity] Verify -> DEBU 39e3 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:16.172 UTC [msp.identity] Verify -> DEBU 39e4 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:16.172 UTC [msp] DeserializeIdentity -> DEBU 39e5 Obtaining identity" +"2019-09-24 00:26:16.172 UTC [msp] DeserializeIdentity -> DEBU 39e6 Obtaining identity" +"2019-09-24 00:26:16.173 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:16.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39e8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39e9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:16.173 UTC [cauthdsl] func1 -> DEBU 39ed 0xc004c16b40 gate 1569284776173576900 evaluation starts" +"2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39ee 0xc004c16b40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39ef 0xc004c16b40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39f0 0xc004c16b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39f1 0xc004c16b40 principal evaluation fails" +"2019-09-24 00:26:16.173 UTC [cauthdsl] func1 -> DEBU 39f2 0xc004c16b40 gate 1569284776173576900 evaluation fails" +"2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.173 UTC [policies] Evaluate -> DEBU 39f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:16.173 UTC [cauthdsl] func1 -> DEBU 39f6 0xc004c17380 gate 1569284776173852800 evaluation starts" +"2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39f7 0xc004c17380 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39f8 0xc004c17380 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.173 UTC [cauthdsl] func2 -> DEBU 39f9 0xc004c17380 principal matched by identity 0" +"2019-09-24 00:26:16.173 UTC [msp.identity] Verify -> DEBU 39fa Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:16.174 UTC [msp.identity] Verify -> DEBU 39fb Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:16.174 UTC [cauthdsl] func2 -> DEBU 39fc 0xc004c17380 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:16.174 UTC [cauthdsl] func1 -> DEBU 39fd 0xc004c17380 gate 1569284776173852800 evaluation succeeds" +"2019-09-24 00:26:16.174 UTC [policies] Evaluate -> DEBU 39fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.174 UTC [policies] Evaluate -> DEBU 39ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.174 UTC [policies] Evaluate -> DEBU 3a00 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:16.174 UTC [policies] Evaluate -> DEBU 3a01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:16.174 UTC [msp.identity] Verify -> DEBU 3a02 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:16.174 UTC [msp.identity] Verify -> DEBU 3a03 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:16.174 UTC [gossip.gossip] handleMessage -> DEBU 3a04 Exiting" +"2019-09-24 00:26:16.283 UTC [msp] DeserializeIdentity -> DEBU 3a05 Obtaining identity" +"2019-09-24 00:26:16.284 UTC [msp] DeserializeIdentity -> DEBU 3a06 Obtaining identity" +"2019-09-24 00:26:16.284 UTC [gossip.pull] Hello -> DEBU 3a07 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:16.284 UTC [msp] DeserializeIdentity -> DEBU 3a08 Obtaining identity" +"2019-09-24 00:26:16.284 UTC [msp] DeserializeIdentity -> DEBU 3a09 Obtaining identity" +"2019-09-24 00:26:16.284 UTC [gossip.comm] Send -> DEBU 3a0a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:16.284 UTC [gossip.comm] sendToEndpoint -> DEBU 3a0b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.284 UTC [gossip.comm] sendToEndpoint -> DEBU 3a0c Exiting" +"2019-09-24 00:26:16.285 UTC [gossip.comm] func1 -> DEBU 3a0d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.285 UTC [gossip.gossip] handleMessage -> DEBU 3a0e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.285 UTC [gossip.pull] HandleMessage -> DEBU 3a0f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.285 UTC [gossip.gossip] handleMessage -> DEBU 3a10 Exiting" +"2019-09-24 00:26:16.615 UTC [gossip.comm] func1 -> DEBU 3a11 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.616 UTC [gossip.gossip] handleMessage -> DEBU 3a12 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.617 UTC [msp] DeserializeIdentity -> DEBU 3a13 Obtaining identity" +"2019-09-24 00:26:16.617 UTC [msp] DeserializeIdentity -> DEBU 3a14 Obtaining identity" +"2019-09-24 00:26:16.617 UTC [gossip.gossip] handleMessage -> DEBU 3a15 Exiting" +"2019-09-24 00:26:16.699 UTC [gossip.comm] func1 -> DEBU 3a16 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.699 UTC [gossip.gossip] handleMessage -> DEBU 3a17 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.699 UTC [gossip.gossip] handleMessage -> DEBU 3a18 Exiting" +"2019-09-24 00:26:16.699 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a19 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.699 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a1a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:16.699 UTC [msp] DeserializeIdentity -> DEBU 3a1b Obtaining identity" +"2019-09-24 00:26:16.699 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a1c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:16.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a1d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a1e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:16.699 UTC [policies] Evaluate -> DEBU 3a1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:16.699 UTC [policies] Evaluate -> DEBU 3a20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:16.699 UTC [policies] Evaluate -> DEBU 3a21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:16.699 UTC [cauthdsl] func1 -> DEBU 3a22 0xc004d23bf0 gate 1569284776699945600 evaluation starts" +"2019-09-24 00:26:16.699 UTC [cauthdsl] func2 -> DEBU 3a23 0xc004d23bf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a24 0xc004d23bf0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a25 0xc004d23bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a26 0xc004d23bf0 principal evaluation fails" +"2019-09-24 00:26:16.700 UTC [cauthdsl] func1 -> DEBU 3a27 0xc004d23bf0 gate 1569284776699945600 evaluation fails" +"2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a28 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a2a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:16.700 UTC [cauthdsl] func1 -> DEBU 3a2b 0xc004d36430 gate 1569284776700217500 evaluation starts" +"2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a2c 0xc004d36430 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a2d 0xc004d36430 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a2e 0xc004d36430 principal matched by identity 0" +"2019-09-24 00:26:16.700 UTC [msp.identity] Verify -> DEBU 3a2f Verify: digest = 00000000 a5 ea 15 a9 19 ba 39 bb 97 2a ab 5c b5 ce fe 71 |......9..*.\...q| +00000010 e4 1c 7f e0 83 31 eb b6 64 b5 45 bd 3b 81 df 62 |.....1..d.E.;..b|" +"2019-09-24 00:26:16.700 UTC [msp.identity] Verify -> DEBU 3a30 Verify: sig = 00000000 30 45 02 21 00 96 0e 2e 1d 0c 8d 46 75 21 d9 c3 |0E.!.......Fu!..| +00000010 ce 40 72 c2 bf 91 8c 7f 4b 78 6f 25 05 48 20 ba |.@r.....Kxo%.H .| +00000020 61 34 15 69 5e 02 20 36 d7 46 e2 4c 13 c9 df ae |a4.i^. 6.F.L....| +00000030 d6 9d 9b 2a f1 a5 a2 2b 8a a5 24 0c 35 cb 8e 04 |...*...+..$.5...| +00000040 87 c9 63 2f 60 08 11 |..c/`..|" +"2019-09-24 00:26:16.700 UTC [cauthdsl] func2 -> DEBU 3a31 0xc004d36430 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:16.700 UTC [cauthdsl] func1 -> DEBU 3a32 0xc004d36430 gate 1569284776700217500 evaluation succeeds" +"2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a33 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a35 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:16.700 UTC [policies] Evaluate -> DEBU 3a36 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:16.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a37 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:16.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a38 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:16.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a39 updating membership: timestamp: " +"2019-09-24 00:26:16.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a3a Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:16.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a3b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:16.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a3c Exiting" +"2019-09-24 00:26:16.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a3d Exiting" +"2019-09-24 00:26:16.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a3e Exiting" +"2019-09-24 00:26:16.700 UTC [gossip.discovery] sendMemResponse -> DEBU 3a3f Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:16.701 UTC [msp] DeserializeIdentity -> DEBU 3a40 Obtaining identity" +"2019-09-24 00:26:16.701 UTC [msp] DeserializeIdentity -> DEBU 3a41 Obtaining identity" +"2019-09-24 00:26:16.701 UTC [msp] DeserializeIdentity -> DEBU 3a42 Obtaining identity" +"2019-09-24 00:26:16.701 UTC [gossip.comm] Send -> DEBU 3a43 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:16.701 UTC [gossip.discovery] sendMemResponse -> DEBU 3a44 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\0208" signature:"0E\002!\000\343\270D\026l\276\255\0266X\372\2275\247\370!\367\364\013\001\"^{\355\365\023\225\364\364\367\313\254\002 T\367\207\374>\030)v\326\334\033\023\250\244\301N\307\240\000\235c\324<\236UI\215c\010 alive: alive: alive: " +"2019-09-24 00:26:16.701 UTC [gossip.comm] sendToEndpoint -> DEBU 3a45 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.701 UTC [gossip.comm] sendToEndpoint -> DEBU 3a46 Exiting" +"2019-09-24 00:26:16.720 UTC [gossip.comm] func1 -> DEBU 3a47 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.721 UTC [gossip.gossip] handleMessage -> DEBU 3a48 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.721 UTC [gossip.pull] HandleMessage -> DEBU 3a49 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4a Obtaining identity" +"2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4b Obtaining identity" +"2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4c Obtaining identity" +"2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4d Obtaining identity" +"2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4e Obtaining identity" +"2019-09-24 00:26:16.721 UTC [msp] DeserializeIdentity -> DEBU 3a4f Obtaining identity" +"2019-09-24 00:26:16.721 UTC [gossip.pull] SendDigest -> DEBU 3a50 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:16.721 UTC [gossip.gossip] handleMessage -> DEBU 3a51 Exiting" +"2019-09-24 00:26:16.820 UTC [gossip.comm] func1 -> DEBU 3a52 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.821 UTC [gossip.gossip] handleMessage -> DEBU 3a53 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.821 UTC [gossip.pull] HandleMessage -> DEBU 3a54 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:16.821 UTC [gossip.pull] SendDigest -> DEBU 3a55 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:16.821 UTC [gossip.gossip] handleMessage -> DEBU 3a56 Exiting" +"2019-09-24 00:26:17.113 UTC [gossip.gossip] handleMessage -> DEBU 3a57 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:17.113 UTC [msp] DeserializeIdentity -> DEBU 3a58 Obtaining identity" +"2019-09-24 00:26:17.113 UTC [msp] DeserializeIdentity -> DEBU 3a59 Obtaining identity" +"2019-09-24 00:26:17.113 UTC [msp] DeserializeIdentity -> DEBU 3a5a Obtaining identity" +"2019-09-24 00:26:17.113 UTC [gossip.gossip] handleMessage -> DEBU 3a5b Exiting" +"2019-09-24 00:26:17.314 UTC [gossip.election] waitForInterrupt -> DEBU 3a5c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:17.314 UTC [gossip.election] IsLeader -> DEBU 3a5d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:17.315 UTC [msp] GetDefaultSigningIdentity -> DEBU 3a5e Obtaining default signing identity" +"2019-09-24 00:26:17.315 UTC [msp.identity] Sign -> DEBU 3a5f Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510111801 " +"2019-09-24 00:26:17.315 UTC [msp.identity] Sign -> DEBU 3a60 Sign: digest: ACD1D0D93BE25799F39ADFECDAABD0580B4E8547A44FC6D67801D67265A37C8D " +"2019-09-24 00:26:17.315 UTC [gossip.election] waitForInterrupt -> DEBU 3a61 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:17.315 UTC [msp] DeserializeIdentity -> DEBU 3a62 Obtaining identity" +"2019-09-24 00:26:17.316 UTC [msp] DeserializeIdentity -> DEBU 3a63 Obtaining identity" +"2019-09-24 00:26:17.316 UTC [msp] DeserializeIdentity -> DEBU 3a64 Obtaining identity" +"2019-09-24 00:26:17.316 UTC [msp] DeserializeIdentity -> DEBU 3a65 Obtaining identity" +"2019-09-24 00:26:17.316 UTC [gossip.comm] Send -> DEBU 3a66 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:17.316 UTC [msp] DeserializeIdentity -> DEBU 3a67 Obtaining identity" +"2019-09-24 00:26:17.316 UTC [msp] DeserializeIdentity -> DEBU 3a68 Obtaining identity" +"2019-09-24 00:26:17.319 UTC [gossip.comm] sendToEndpoint -> DEBU 3a69 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.319 UTC [gossip.comm] sendToEndpoint -> DEBU 3a6a Exiting" +"2019-09-24 00:26:17.670 UTC [gossip.comm] func1 -> DEBU 3a6b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:17.670 UTC [gossip.gossip] handleMessage -> DEBU 3a6c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:17.670 UTC [gossip.pull] HandleMessage -> DEBU 3a6d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:17.670 UTC [gossip.pull] SendDigest -> DEBU 3a6e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:17.670 UTC [gossip.gossip] handleMessage -> DEBU 3a6f Exiting" +"2019-09-24 00:26:17.708 UTC [gossip.comm] func1 -> DEBU 3a70 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.708 UTC [gossip.gossip] handleMessage -> DEBU 3a71 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.708 UTC [gossip.gossip] handleMessage -> DEBU 3a72 Exiting" +"2019-09-24 00:26:17.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a73 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.708 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a74 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:17.708 UTC [msp.identity] Verify -> DEBU 3a75 Verify: digest = 00000000 09 d9 46 47 ef ca 26 fa 09 a9 eb e7 35 3e 35 4a |..FG..&.....5>5J| +00000010 1c ba 09 50 d1 85 41 fb a6 d4 62 32 87 b9 e2 03 |...P..A...b2....|" +"2019-09-24 00:26:17.708 UTC [msp.identity] Verify -> DEBU 3a76 Verify: sig = 00000000 30 44 02 20 14 95 fc d6 fe c1 7f 0a 3c 56 6d 69 |0D. ........ DEBU 3a77 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a78 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:17.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a79 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:17.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a7a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:17.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a7b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:17.709 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a7c Exiting" +"2019-09-24 00:26:17.709 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a7d Exiting" +"2019-09-24 00:26:17.709 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a7e Exiting" +"2019-09-24 00:26:17.717 UTC [gossip.comm] func1 -> DEBU 3a7f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.717 UTC [gossip.gossip] handleMessage -> DEBU 3a80 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.717 UTC [gossip.gossip] handleMessage -> DEBU 3a81 Exiting" +"2019-09-24 00:26:17.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a82 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a83 Exiting" +"2019-09-24 00:26:17.722 UTC [msp] DeserializeIdentity -> DEBU 3a84 Obtaining identity" +"2019-09-24 00:26:17.722 UTC [msp] DeserializeIdentity -> DEBU 3a85 Obtaining identity" +"2019-09-24 00:26:17.722 UTC [msp] DeserializeIdentity -> DEBU 3a86 Obtaining identity" +"2019-09-24 00:26:17.722 UTC [gossip.comm] Send -> DEBU 3a87 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:17.722 UTC [msp] DeserializeIdentity -> DEBU 3a88 Obtaining identity" +"2019-09-24 00:26:17.722 UTC [gossip.comm] Send -> DEBU 3a89 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:17.722 UTC [gossip.comm] sendToEndpoint -> DEBU 3a8a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.722 UTC [gossip.comm] sendToEndpoint -> DEBU 3a8b Exiting" +"2019-09-24 00:26:17.722 UTC [gossip.comm] sendToEndpoint -> DEBU 3a8c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.722 UTC [gossip.comm] sendToEndpoint -> DEBU 3a8d Exiting" +"2019-09-24 00:26:17.723 UTC [gossip.gossip] handleMessage -> DEBU 3a8e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.723 UTC [gossip.gossip] handleMessage -> DEBU 3a8f Exiting" +"2019-09-24 00:26:17.723 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a90 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:17.723 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a91 Exiting" +"2019-09-24 00:26:17.751 UTC [gossip.comm] func1 -> DEBU 3a92 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:17.751 UTC [gossip.gossip] handleMessage -> DEBU 3a93 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:17.751 UTC [gossip.gossip] handleMessage -> DEBU 3a94 Exiting" +"2019-09-24 00:26:17.751 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a95 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:17.751 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a96 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:17.751 UTC [msp.identity] Verify -> DEBU 3a97 Verify: digest = 00000000 fb 2a f3 eb 89 58 b6 80 c5 92 ef 78 95 d2 86 59 |.*...X.....x...Y| +00000010 01 86 e5 b0 3b 2c 10 2a de 30 26 94 86 c3 bb fe |....;,.*.0&.....|" +"2019-09-24 00:26:17.751 UTC [msp.identity] Verify -> DEBU 3a98 Verify: sig = 00000000 30 45 02 21 00 e1 49 bf 8a 2d ca 99 56 7e e5 d4 |0E.!..I..-..V~..| +00000010 8f 95 53 cd fc 42 5d 73 88 21 15 4c 42 47 24 be |..S..B]s.!.LBG$.| +00000020 47 5c 7f 12 26 02 20 63 58 7d 4e 43 13 aa cb 86 |G\..&. cX}NC....| +00000030 6b 7e 87 1d ef 18 96 44 67 f4 9b ff c1 73 be 77 |k~.....Dg....s.w| +00000040 fa e8 5e bb de 9b 0b |..^....|" +"2019-09-24 00:26:17.751 UTC [msp.identity] Verify -> DEBU 3a99 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:17.752 UTC [msp.identity] Verify -> DEBU 3a9a Verify: sig = 00000000 30 44 02 20 68 a5 af a6 e5 23 ac ad f3 49 02 70 |0D. h....#...I.p| +00000010 79 a6 0f 17 75 4f 51 2a ad e6 87 ce 8c ca 05 a9 |y...uOQ*........| +00000020 0f d0 25 2d 02 20 2d 54 7a 2d 29 49 3b 9f 54 22 |..%-. -Tz-)I;.T"| +00000030 78 54 52 3b a7 d4 e5 07 ef f9 c2 1c a6 40 7e 0f |xTR;.........@~.| +00000040 97 dc 1b 91 2e d8 |......|" +"2019-09-24 00:26:17.752 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a9b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:17.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:26:17.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9d updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:17.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9e Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:17.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9f Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:17.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aa0 Exiting" +"2019-09-24 00:26:17.752 UTC [gossip.discovery] handleAliveMessage -> DEBU 3aa1 Exiting" +"2019-09-24 00:26:17.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3aa2 Exiting" +"2019-09-24 00:26:17.753 UTC [gossip.discovery] sendMemResponse -> DEBU 3aa3 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:17.753 UTC [msp] DeserializeIdentity -> DEBU 3aa4 Obtaining identity" +"2019-09-24 00:26:17.753 UTC [msp] DeserializeIdentity -> DEBU 3aa5 Obtaining identity" +"2019-09-24 00:26:17.753 UTC [gossip.comm] Send -> DEBU 3aa6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:17.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3aa7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:17.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3aa8 Exiting" +"2019-09-24 00:26:17.753 UTC [gossip.discovery] sendMemResponse -> DEBU 3aa9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" secret_envelope: > alive: " +"2019-09-24 00:26:18.042 UTC [gossip.comm] func1 -> DEBU 3aaa Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:18.042 UTC [gossip.gossip] handleMessage -> DEBU 3aab Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:18.042 UTC [msp] DeserializeIdentity -> DEBU 3aac Obtaining identity" +"2019-09-24 00:26:18.043 UTC [msp] DeserializeIdentity -> DEBU 3aad Obtaining identity" +"2019-09-24 00:26:18.043 UTC [msp] DeserializeIdentity -> DEBU 3aae Obtaining identity" +"2019-09-24 00:26:18.043 UTC [gossip.gossip] handleMessage -> DEBU 3aaf Exiting" +"2019-09-24 00:26:19.548 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 3ab0 Sleeping 25s" +"2019-09-24 00:26:19.602 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ab1 Obtaining default signing identity" +"2019-09-24 00:26:19.602 UTC [msp.identity] Sign -> DEBU 3ab2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151036 " +"2019-09-24 00:26:19.602 UTC [msp.identity] Sign -> DEBU 3ab3 Sign: digest: 82DA5E294701F2327C8E6E635A9F28D7B5BA6DE3C0420427CCBE08BAD944DFE2 " +"2019-09-24 00:26:19.603 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ab4 Obtaining default signing identity" +"2019-09-24 00:26:19.603 UTC [msp.identity] Sign -> DEBU 3ab5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:19.603 UTC [msp.identity] Sign -> DEBU 3ab6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:19.603 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3ab7 Sleeping 5s" +"2019-09-24 00:26:19.612 UTC [msp] DeserializeIdentity -> DEBU 3ab8 Obtaining identity" +"2019-09-24 00:26:19.612 UTC [msp] DeserializeIdentity -> DEBU 3ab9 Obtaining identity" +"2019-09-24 00:26:19.613 UTC [gossip.comm] Send -> DEBU 3aba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:19.613 UTC [msp] DeserializeIdentity -> DEBU 3abb Obtaining identity" +"2019-09-24 00:26:19.613 UTC [gossip.comm] Send -> DEBU 3abc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:19.613 UTC [msp] DeserializeIdentity -> DEBU 3abd Obtaining identity" +"2019-09-24 00:26:19.613 UTC [gossip.comm] Send -> DEBU 3abe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:19.613 UTC [gossip.comm] sendToEndpoint -> DEBU 3abf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.613 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac0 Exiting" +"2019-09-24 00:26:19.614 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.614 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac2 Exiting" +"2019-09-24 00:26:19.614 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.614 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac4 Exiting" +"2019-09-24 00:26:19.707 UTC [gossip.pull] Hello -> DEBU 3ac5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:19.707 UTC [gossip.comm] Send -> DEBU 3ac6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:19.707 UTC [gossip.pull] Hello -> DEBU 3ac7 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:19.707 UTC [gossip.comm] Send -> DEBU 3ac8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:19.707 UTC [gossip.pull] Hello -> DEBU 3ac9 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:19.707 UTC [gossip.comm] Send -> DEBU 3aca Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3acb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3acc Exiting" +"2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3acd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3ace Exiting" +"2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3acf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3ad0 Exiting" +"2019-09-24 00:26:19.709 UTC [gossip.comm] func1 -> DEBU 3ad1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3ad2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.709 UTC [gossip.pull] HandleMessage -> DEBU 3ad3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.709 UTC [gossip.comm] func1 -> DEBU 3ad4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3ad5 Exiting" +"2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3ad6 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.709 UTC [gossip.pull] HandleMessage -> DEBU 3ad7 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3ad8 Exiting" +"2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3ad9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.709 UTC [gossip.pull] HandleMessage -> DEBU 3ada GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.709 UTC [gossip.gossip] handleMessage -> DEBU 3adb Exiting" +"2019-09-24 00:26:19.854 UTC [msp] GetDefaultSigningIdentity -> DEBU 3adc Obtaining default signing identity" +"2019-09-24 00:26:19.854 UTC [msp.identity] Sign -> DEBU 3add Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151037 " +"2019-09-24 00:26:19.854 UTC [msp.identity] Sign -> DEBU 3ade Sign: digest: 381B0F6517855C00328B8BECE96CEB8E0814028813696E07C9DC74C3260C831C " +"2019-09-24 00:26:19.854 UTC [msp] GetDefaultSigningIdentity -> DEBU 3adf Obtaining default signing identity" +"2019-09-24 00:26:19.854 UTC [msp.identity] Sign -> DEBU 3ae0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:19.854 UTC [msp.identity] Sign -> DEBU 3ae1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:19.855 UTC [gossip.comm] Send -> DEBU 3ae2 Entering, sending GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:19.855 UTC [msp] DeserializeIdentity -> DEBU 3ae3 Obtaining identity" +"2019-09-24 00:26:19.855 UTC [gossip.comm] Send -> DEBU 3ae4 Entering, sending GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:19.855 UTC [msp] DeserializeIdentity -> DEBU 3ae5 Obtaining identity" +"2019-09-24 00:26:19.855 UTC [gossip.comm] Send -> DEBU 3ae6 Entering, sending GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae8 Exiting" +"2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3ae9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3aea Exiting" +"2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3aeb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004h`E\377\202\355g\262\316\325\356\254 \341\301\3119L&\251\005\357o;7\032*\326\002 ?\333\323R\372%\377\306cn\235\353ee\353x\273\010\220\372j \332\026\206\030\343\213^\251;8" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.855 UTC [gossip.comm] sendToEndpoint -> DEBU 3aec Exiting" +"2019-09-24 00:26:19.857 UTC [gossip.comm] func1 -> DEBU 3aed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.858 UTC [gossip.gossip] handleMessage -> DEBU 3aee Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.858 UTC [gossip.gossip] handleMessage -> DEBU 3aef Exiting" +"2019-09-24 00:26:19.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3af0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.858 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3af1 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:19.858 UTC [msp.identity] Verify -> DEBU 3af2 Verify: digest = 00000000 38 1b 0f 65 17 85 5c 00 32 8b 8b ec e9 6c eb 8e |8..e..\.2....l..| +00000010 08 14 02 88 13 69 6e 07 c9 dc 74 c3 26 0c 83 1c |.....in...t.&...|" +"2019-09-24 00:26:19.858 UTC [msp.identity] Verify -> DEBU 3af3 Verify: sig = 00000000 30 45 02 21 00 a9 ab 3e 04 68 60 45 ff 82 ed 67 |0E.!...>.h`E...g| +00000010 b2 ce d5 ee ac 20 e1 c1 c9 39 4c 26 a9 05 ef 6f |..... ...9L&...o| +00000020 3b 37 1a 2a d6 02 20 3f db d3 52 fa 25 ff c6 63 |;7.*.. ?..R.%..c| +00000030 6e 9d eb 65 65 eb 78 bb 08 90 fa 6a 20 da 16 86 |n..ee.x....j ...| +00000040 18 e3 8b 5e a9 3b 38 |...^.;8|" +"2019-09-24 00:26:19.858 UTC [msp.identity] Verify -> DEBU 3af4 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:19.858 UTC [msp.identity] Verify -> DEBU 3af5 Verify: sig = 00000000 30 44 02 20 0d 03 a3 48 fe 48 24 16 a4 55 88 2f |0D. ...H.H$..U./| +00000010 5f 53 b2 6e 96 ac 0c ef 85 a7 13 77 65 de 92 c0 |_S.n.......we...| +00000020 b8 9e f3 44 02 20 19 ee 62 83 be 8e 6e a3 e4 1e |...D. ..b...n...| +00000030 1f 45 97 0f 24 ed 33 67 f7 aa 98 5a bb cf d0 37 |.E..$.3g...Z...7| +00000040 e7 f0 f0 f8 fd a7 |......|" +"2019-09-24 00:26:19.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 3af6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:19.858 UTC [gossip.discovery] isSentByMe -> DEBU 3af7 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:19.858 UTC [gossip.discovery] handleAliveMessage -> DEBU 3af8 Exiting" +"2019-09-24 00:26:19.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3af9 Exiting" +"2019-09-24 00:26:19.858 UTC [gossip.gossip] handleMessage -> DEBU 3afa Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.858 UTC [gossip.gossip] handleMessage -> DEBU 3afb Exiting" +"2019-09-24 00:26:19.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3afc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.858 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3afd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:19.859 UTC [msp.identity] Verify -> DEBU 3afe Verify: digest = 00000000 38 1b 0f 65 17 85 5c 00 32 8b 8b ec e9 6c eb 8e |8..e..\.2....l..| +00000010 08 14 02 88 13 69 6e 07 c9 dc 74 c3 26 0c 83 1c |.....in...t.&...|" +"2019-09-24 00:26:19.859 UTC [msp.identity] Verify -> DEBU 3aff Verify: sig = 00000000 30 45 02 21 00 a9 ab 3e 04 68 60 45 ff 82 ed 67 |0E.!...>.h`E...g| +00000010 b2 ce d5 ee ac 20 e1 c1 c9 39 4c 26 a9 05 ef 6f |..... ...9L&...o| +00000020 3b 37 1a 2a d6 02 20 3f db d3 52 fa 25 ff c6 63 |;7.*.. ?..R.%..c| +00000030 6e 9d eb 65 65 eb 78 bb 08 90 fa 6a 20 da 16 86 |n..ee.x....j ...| +00000040 18 e3 8b 5e a9 3b 38 |...^.;8|" +"2019-09-24 00:26:19.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b00 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.859 UTC [gossip.discovery] isSentByMe -> DEBU 3b01 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b02 Exiting" +"2019-09-24 00:26:19.859 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b03 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:19.859 UTC [msp] DeserializeIdentity -> DEBU 3b04 Obtaining identity" +"2019-09-24 00:26:19.859 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:19.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b06 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:19.859 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b07 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:19.859 UTC [policies] Evaluate -> DEBU 3b08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:19.859 UTC [policies] Evaluate -> DEBU 3b09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:19.859 UTC [policies] Evaluate -> DEBU 3b0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:19.859 UTC [cauthdsl] func1 -> DEBU 3b0b 0xc004de83a0 gate 1569284779859614200 evaluation starts" +"2019-09-24 00:26:19.859 UTC [cauthdsl] func2 -> DEBU 3b0c 0xc004de83a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:19.859 UTC [cauthdsl] func2 -> DEBU 3b0d 0xc004de83a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:19.859 UTC [cauthdsl] func2 -> DEBU 3b0e 0xc004de83a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:19.859 UTC [cauthdsl] func2 -> DEBU 3b0f 0xc004de83a0 principal evaluation fails" +"2019-09-24 00:26:19.860 UTC [gossip.comm] func1 -> DEBU 3b10 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.860 UTC [gossip.gossip] handleMessage -> DEBU 3b11 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.859 UTC [cauthdsl] func1 -> DEBU 3b12 0xc004de83a0 gate 1569284779859614200 evaluation fails" +"2019-09-24 00:26:19.860 UTC [policies] Evaluate -> DEBU 3b13 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:19.860 UTC [policies] Evaluate -> DEBU 3b14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:19.860 UTC [policies] Evaluate -> DEBU 3b15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:19.860 UTC [cauthdsl] func1 -> DEBU 3b16 0xc004de8be0 gate 1569284779860610200 evaluation starts" +"2019-09-24 00:26:19.860 UTC [cauthdsl] func2 -> DEBU 3b17 0xc004de8be0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:19.860 UTC [cauthdsl] func2 -> DEBU 3b18 0xc004de8be0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:19.860 UTC [cauthdsl] func2 -> DEBU 3b19 0xc004de8be0 principal matched by identity 0" +"2019-09-24 00:26:19.860 UTC [msp.identity] Verify -> DEBU 3b1a Verify: digest = 00000000 a5 ea 15 a9 19 ba 39 bb 97 2a ab 5c b5 ce fe 71 |......9..*.\...q| +00000010 e4 1c 7f e0 83 31 eb b6 64 b5 45 bd 3b 81 df 62 |.....1..d.E.;..b|" +"2019-09-24 00:26:19.860 UTC [msp.identity] Verify -> DEBU 3b1b Verify: sig = 00000000 30 45 02 21 00 96 0e 2e 1d 0c 8d 46 75 21 d9 c3 |0E.!.......Fu!..| +00000010 ce 40 72 c2 bf 91 8c 7f 4b 78 6f 25 05 48 20 ba |.@r.....Kxo%.H .| +00000020 61 34 15 69 5e 02 20 36 d7 46 e2 4c 13 c9 df ae |a4.i^. 6.F.L....| +00000030 d6 9d 9b 2a f1 a5 a2 2b 8a a5 24 0c 35 cb 8e 04 |...*...+..$.5...| +00000040 87 c9 63 2f 60 08 11 |..c/`..|" +"2019-09-24 00:26:19.861 UTC [cauthdsl] func2 -> DEBU 3b1c 0xc004de8be0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:19.861 UTC [cauthdsl] func1 -> DEBU 3b1d 0xc004de8be0 gate 1569284779860610200 evaluation succeeds" +"2019-09-24 00:26:19.861 UTC [policies] Evaluate -> DEBU 3b1e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:19.861 UTC [policies] Evaluate -> DEBU 3b1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:19.861 UTC [policies] Evaluate -> DEBU 3b20 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:19.861 UTC [policies] Evaluate -> DEBU 3b21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:19.861 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b22 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.861 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b23 Exiting" +"2019-09-24 00:26:19.861 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b24 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:19.861 UTC [msp.identity] Verify -> DEBU 3b25 Verify: digest = 00000000 fb 2a f3 eb 89 58 b6 80 c5 92 ef 78 95 d2 86 59 |.*...X.....x...Y| +00000010 01 86 e5 b0 3b 2c 10 2a de 30 26 94 86 c3 bb fe |....;,.*.0&.....|" +"2019-09-24 00:26:19.861 UTC [msp.identity] Verify -> DEBU 3b26 Verify: sig = 00000000 30 45 02 21 00 e1 49 bf 8a 2d ca 99 56 7e e5 d4 |0E.!..I..-..V~..| +00000010 8f 95 53 cd fc 42 5d 73 88 21 15 4c 42 47 24 be |..S..B]s.!.LBG$.| +00000020 47 5c 7f 12 26 02 20 63 58 7d 4e 43 13 aa cb 86 |G\..&. cX}NC....| +00000030 6b 7e 87 1d ef 18 96 44 67 f4 9b ff c1 73 be 77 |k~.....Dg....s.w| +00000040 fa e8 5e bb de 9b 0b |..^....|" +"2019-09-24 00:26:19.861 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b27 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b28 Exiting" +"2019-09-24 00:26:19.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b29 Exiting" +"2019-09-24 00:26:19.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b2a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.862 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b2b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:19.862 UTC [msp.identity] Verify -> DEBU 3b2c Verify: digest = 00000000 38 1b 0f 65 17 85 5c 00 32 8b 8b ec e9 6c eb 8e |8..e..\.2....l..| +00000010 08 14 02 88 13 69 6e 07 c9 dc 74 c3 26 0c 83 1c |.....in...t.&...|" +"2019-09-24 00:26:19.862 UTC [msp.identity] Verify -> DEBU 3b2d Verify: sig = 00000000 30 45 02 21 00 a9 ab 3e 04 68 60 45 ff 82 ed 67 |0E.!...>.h`E...g| +00000010 b2 ce d5 ee ac 20 e1 c1 c9 39 4c 26 a9 05 ef 6f |..... ...9L&...o| +00000020 3b 37 1a 2a d6 02 20 3f db d3 52 fa 25 ff c6 63 |;7.*.. ?..R.%..c| +00000030 6e 9d eb 65 65 eb 78 bb 08 90 fa 6a 20 da 16 86 |n..ee.x....j ...| +00000040 18 e3 8b 5e a9 3b 38 |...^.;8|" +"2019-09-24 00:26:19.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b2e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.862 UTC [gossip.discovery] isSentByMe -> DEBU 3b2f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b30 Exiting" +"2019-09-24 00:26:19.862 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b31 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:19.862 UTC [msp] DeserializeIdentity -> DEBU 3b32 Obtaining identity" +"2019-09-24 00:26:19.862 UTC [gossip.gossip] handleMessage -> DEBU 3b33 Exiting" +"2019-09-24 00:26:19.862 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b34 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:19.862 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b35 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:19.862 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b36 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:19.863 UTC [policies] Evaluate -> DEBU 3b37 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:19.863 UTC [policies] Evaluate -> DEBU 3b38 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:19.863 UTC [policies] Evaluate -> DEBU 3b39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:19.863 UTC [cauthdsl] func1 -> DEBU 3b3a 0xc004e41c90 gate 1569284779863187300 evaluation starts" +"2019-09-24 00:26:19.863 UTC [cauthdsl] func2 -> DEBU 3b3b 0xc004e41c90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:19.865 UTC [cauthdsl] func2 -> DEBU 3b3c 0xc004e41c90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:19.865 UTC [cauthdsl] func2 -> DEBU 3b3d 0xc004e41c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:19.865 UTC [cauthdsl] func2 -> DEBU 3b3e 0xc004e41c90 principal evaluation fails" +"2019-09-24 00:26:19.865 UTC [cauthdsl] func1 -> DEBU 3b3f 0xc004e41c90 gate 1569284779863187300 evaluation fails" +"2019-09-24 00:26:19.865 UTC [policies] Evaluate -> DEBU 3b40 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:19.865 UTC [policies] Evaluate -> DEBU 3b41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:19.865 UTC [policies] Evaluate -> DEBU 3b42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:19.866 UTC [cauthdsl] func1 -> DEBU 3b43 0xc0003a84d0 gate 1569284779865981400 evaluation starts" +"2019-09-24 00:26:19.866 UTC [cauthdsl] func2 -> DEBU 3b44 0xc0003a84d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:19.866 UTC [cauthdsl] func2 -> DEBU 3b45 0xc0003a84d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:19.866 UTC [cauthdsl] func2 -> DEBU 3b46 0xc0003a84d0 principal matched by identity 0" +"2019-09-24 00:26:19.866 UTC [msp.identity] Verify -> DEBU 3b47 Verify: digest = 00000000 15 02 4b ef d4 34 e7 0d a1 ef 12 4e 6d a3 29 1e |..K..4.....Nm.).| +00000010 d8 9d 6b b7 d5 4b d4 7e dd d3 b1 2e dc b1 62 b1 |..k..K.~......b.|" +"2019-09-24 00:26:19.866 UTC [msp.identity] Verify -> DEBU 3b48 Verify: sig = 00000000 30 44 02 20 4b 9e 52 0e 7e ef 2d 53 98 ea fc 34 |0D. K.R.~.-S...4| +00000010 92 55 49 98 ca d8 de 90 58 5c cb 01 72 01 bc 0e |.UI.....X\..r...| +00000020 22 63 2d 19 02 20 56 9b 8e e5 54 ee c5 2b 93 6f |"c-.. V...T..+.o| +00000030 5d 4a ff 54 6d 64 e3 7f 07 41 25 ad 9d 34 ce fa |]J.Tmd...A%..4..| +00000040 ff e7 49 19 3d 91 |..I.=.|" +"2019-09-24 00:26:19.867 UTC [cauthdsl] func2 -> DEBU 3b49 0xc0003a84d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:19.867 UTC [cauthdsl] func1 -> DEBU 3b4a 0xc0003a84d0 gate 1569284779865981400 evaluation succeeds" +"2019-09-24 00:26:19.867 UTC [policies] Evaluate -> DEBU 3b4b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:19.867 UTC [policies] Evaluate -> DEBU 3b4c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:19.867 UTC [policies] Evaluate -> DEBU 3b4d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:19.867 UTC [policies] Evaluate -> DEBU 3b4e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:19.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b4f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:19.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b50 Exiting" +"2019-09-24 00:26:19.867 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b51 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:19.868 UTC [msp.identity] Verify -> DEBU 3b52 Verify: digest = 00000000 fb 2a f3 eb 89 58 b6 80 c5 92 ef 78 95 d2 86 59 |.*...X.....x...Y| +00000010 01 86 e5 b0 3b 2c 10 2a de 30 26 94 86 c3 bb fe |....;,.*.0&.....|" +"2019-09-24 00:26:19.868 UTC [msp.identity] Verify -> DEBU 3b53 Verify: sig = 00000000 30 45 02 21 00 e1 49 bf 8a 2d ca 99 56 7e e5 d4 |0E.!..I..-..V~..| +00000010 8f 95 53 cd fc 42 5d 73 88 21 15 4c 42 47 24 be |..S..B]s.!.LBG$.| +00000020 47 5c 7f 12 26 02 20 63 58 7d 4e 43 13 aa cb 86 |G\..&. cX}NC....| +00000030 6b 7e 87 1d ef 18 96 44 67 f4 9b ff c1 73 be 77 |k~.....Dg....s.w| +00000040 fa e8 5e bb de 9b 0b |..^....|" +"2019-09-24 00:26:19.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b54 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b55 Exiting" +"2019-09-24 00:26:19.868 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b56 Exiting" +"2019-09-24 00:26:19.932 UTC [gossip.gossip] handleMessage -> DEBU 3b57 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.932 UTC [gossip.pull] HandleMessage -> DEBU 3b58 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b59 Obtaining identity" +"2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b5a Obtaining identity" +"2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b5b Obtaining identity" +"2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b5c Obtaining identity" +"2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b5d Obtaining identity" +"2019-09-24 00:26:19.932 UTC [msp] DeserializeIdentity -> DEBU 3b5e Obtaining identity" +"2019-09-24 00:26:19.932 UTC [gossip.pull] SendDigest -> DEBU 3b5f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:19.933 UTC [gossip.gossip] handleMessage -> DEBU 3b60 Exiting" +"2019-09-24 00:26:19.992 UTC [gossip.gossip] handleMessage -> DEBU 3b61 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.992 UTC [gossip.gossip] handleMessage -> DEBU 3b62 Exiting" +"2019-09-24 00:26:19.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b63 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:19.993 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b64 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:19.993 UTC [msp] DeserializeIdentity -> DEBU 3b65 Obtaining identity" +"2019-09-24 00:26:19.994 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:19.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b67 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:19.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b68 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:19.994 UTC [policies] Evaluate -> DEBU 3b69 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:19.995 UTC [policies] Evaluate -> DEBU 3b6a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:19.995 UTC [policies] Evaluate -> DEBU 3b6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:19.995 UTC [cauthdsl] func1 -> DEBU 3b6c 0xc004cf3f20 gate 1569284779995562700 evaluation starts" +"2019-09-24 00:26:19.995 UTC [cauthdsl] func2 -> DEBU 3b6d 0xc004cf3f20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:19.995 UTC [cauthdsl] func2 -> DEBU 3b6e 0xc004cf3f20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:19.996 UTC [cauthdsl] func2 -> DEBU 3b6f 0xc004cf3f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:19.996 UTC [cauthdsl] func2 -> DEBU 3b70 0xc004cf3f20 principal evaluation fails" +"2019-09-24 00:26:19.996 UTC [cauthdsl] func1 -> DEBU 3b71 0xc004cf3f20 gate 1569284779995562700 evaluation fails" +"2019-09-24 00:26:19.997 UTC [policies] Evaluate -> DEBU 3b72 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:19.997 UTC [policies] Evaluate -> DEBU 3b73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:19.997 UTC [policies] Evaluate -> DEBU 3b74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:19.997 UTC [cauthdsl] func1 -> DEBU 3b75 0xc002956760 gate 1569284779997892900 evaluation starts" +"2019-09-24 00:26:19.998 UTC [cauthdsl] func2 -> DEBU 3b76 0xc002956760 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:19.998 UTC [cauthdsl] func2 -> DEBU 3b77 0xc002956760 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:19.998 UTC [cauthdsl] func2 -> DEBU 3b78 0xc002956760 principal matched by identity 0" +"2019-09-24 00:26:19.998 UTC [msp.identity] Verify -> DEBU 3b79 Verify: digest = 00000000 b0 f4 d0 41 46 51 44 2d 71 43 6b b1 e8 c7 8b a8 |...AFQD-qCk.....| +00000010 f6 43 e2 a7 37 cb 3f 4a af 4a 3d 53 7f 5d 4d 6e |.C..7.?J.J=S.]Mn|" +"2019-09-24 00:26:19.999 UTC [msp.identity] Verify -> DEBU 3b7a Verify: sig = 00000000 30 45 02 21 00 97 0c a4 88 06 1a 93 2b e0 bc e2 |0E.!........+...| +00000010 02 ed 82 be 9b d1 f1 c6 26 44 cc 5d ed 40 55 81 |........&D.].@U.| +00000020 f5 1d aa 56 20 02 20 18 ac 0a 6e bb 66 43 a0 51 |...V . ...n.fC.Q| +00000030 d5 a4 75 95 80 46 4e 5f d1 86 cc bd 08 5d 2a cc |..u..FN_.....]*.| +00000040 e2 b1 37 ac d6 82 d8 |..7....|" +"2019-09-24 00:26:19.999 UTC [cauthdsl] func2 -> DEBU 3b7b 0xc002956760 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:19.999 UTC [cauthdsl] func1 -> DEBU 3b7c 0xc002956760 gate 1569284779997892900 evaluation succeeds" +"2019-09-24 00:26:20.000 UTC [policies] Evaluate -> DEBU 3b7d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.000 UTC [policies] Evaluate -> DEBU 3b7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.000 UTC [policies] Evaluate -> DEBU 3b7f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:20.006 UTC [gossip.comm] func1 -> DEBU 3b80 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:20.005 UTC [policies] Evaluate -> DEBU 3b81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:20.006 UTC [gossip.gossip] handleMessage -> DEBU 3b82 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:20.006 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b83 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:20.006 UTC [gossip.comm] func1 -> DEBU 3b84 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:20.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b85 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:20.006 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b86 updating membership: timestamp: " +"2019-09-24 00:26:20.007 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b87 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:20.007 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b88 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:20.007 UTC [gossip.discovery] learnExistingMembers -> DEBU 3b89 Exiting" +"2019-09-24 00:26:20.007 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b8a Exiting" +"2019-09-24 00:26:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b8b Exiting" +"2019-09-24 00:26:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b8c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b8d Exiting" +"2019-09-24 00:26:20.007 UTC [gossip.gossip] handleMessage -> DEBU 3b8e Exiting" +"2019-09-24 00:26:20.007 UTC [gossip.gossip] handleMessage -> DEBU 3b8f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:20.007 UTC [gossip.gossip] handleMessage -> DEBU 3b90 Exiting" +"2019-09-24 00:26:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b91 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:20.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b92 Exiting" +"2019-09-24 00:26:20.024 UTC [msp] DeserializeIdentity -> DEBU 3b93 Obtaining identity" +"2019-09-24 00:26:20.024 UTC [msp] DeserializeIdentity -> DEBU 3b94 Obtaining identity" +"2019-09-24 00:26:20.024 UTC [msp] DeserializeIdentity -> DEBU 3b95 Obtaining identity" +"2019-09-24 00:26:20.024 UTC [msp] DeserializeIdentity -> DEBU 3b96 Obtaining identity" +"2019-09-24 00:26:20.025 UTC [msp] DeserializeIdentity -> DEBU 3b97 Obtaining identity" +"2019-09-24 00:26:20.025 UTC [msp] DeserializeIdentity -> DEBU 3b98 Obtaining identity" +"2019-09-24 00:26:20.025 UTC [msp] DeserializeIdentity -> DEBU 3b99 Obtaining identity" +"2019-09-24 00:26:20.025 UTC [gossip.comm] Send -> DEBU 3b9a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:20.025 UTC [msp] DeserializeIdentity -> DEBU 3b9b Obtaining identity" +"2019-09-24 00:26:20.025 UTC [gossip.comm] Send -> DEBU 3b9c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:20.025 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:20.025 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9e Exiting" +"2019-09-24 00:26:20.025 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:20.025 UTC [gossip.comm] sendToEndpoint -> DEBU 3ba0 Exiting" +"2019-09-24 00:26:20.027 UTC [gossip.gossip] handleMessage -> DEBU 3ba1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.027 UTC [gossip.gossip] handleMessage -> DEBU 3ba2 Exiting" +"2019-09-24 00:26:20.027 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ba3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.027 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ba4 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:20.027 UTC [msp] DeserializeIdentity -> DEBU 3ba5 Obtaining identity" +"2019-09-24 00:26:20.028 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ba6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:20.028 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.028 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3ba9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3baa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3bab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:20.028 UTC [cauthdsl] func1 -> DEBU 3bac 0xc002627a80 gate 1569284780028458100 evaluation starts" +"2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3bad 0xc002627a80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3bae 0xc002627a80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3baf 0xc002627a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3bb0 0xc002627a80 principal evaluation fails" +"2019-09-24 00:26:20.028 UTC [cauthdsl] func1 -> DEBU 3bb1 0xc002627a80 gate 1569284780028458100 evaluation fails" +"2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3bb2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3bb3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.028 UTC [policies] Evaluate -> DEBU 3bb4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:20.028 UTC [cauthdsl] func1 -> DEBU 3bb5 0xc002c002c0 gate 1569284780028888100 evaluation starts" +"2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3bb6 0xc002c002c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.028 UTC [cauthdsl] func2 -> DEBU 3bb7 0xc002c002c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.029 UTC [cauthdsl] func2 -> DEBU 3bb8 0xc002c002c0 principal matched by identity 0" +"2019-09-24 00:26:20.029 UTC [msp.identity] Verify -> DEBU 3bb9 Verify: digest = 00000000 03 58 fc c9 3b 38 4f 8a 43 a9 97 43 8f 3d 13 89 |.X..;8O.C..C.=..| +00000010 22 9d 98 61 1a 30 20 06 49 77 8d bd cf bb a4 69 |"..a.0 .Iw.....i|" +"2019-09-24 00:26:20.029 UTC [msp.identity] Verify -> DEBU 3bba Verify: sig = 00000000 30 44 02 20 7b 77 7b 23 6b 9a 0d 47 96 19 ae ed |0D. {w{#k..G....| +00000010 35 44 e2 5b bc 08 30 73 23 46 f3 fb 26 30 40 1d |5D.[..0s#F..&0@.| +00000020 e7 8f a3 37 02 20 58 74 d1 3b 7c 60 13 68 47 12 |...7. Xt.;|`.hG.| +00000030 0c 83 88 cd be 0b b2 7a 07 75 c9 52 94 c3 ce 5d |.......z.u.R...]| +00000040 4c 6a 93 f6 5a bb |Lj..Z.|" +"2019-09-24 00:26:20.033 UTC [cauthdsl] func2 -> DEBU 3bbb 0xc002c002c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:20.037 UTC [cauthdsl] func1 -> DEBU 3bbc 0xc002c002c0 gate 1569284780028888100 evaluation succeeds" +"2019-09-24 00:26:20.037 UTC [policies] Evaluate -> DEBU 3bbd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.037 UTC [policies] Evaluate -> DEBU 3bbe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.037 UTC [policies] Evaluate -> DEBU 3bbf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:20.037 UTC [policies] Evaluate -> DEBU 3bc0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:20.037 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bc1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:20.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc3 updating membership: timestamp: " +"2019-09-24 00:26:20.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc4 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:20.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:20.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc6 Exiting" +"2019-09-24 00:26:20.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bc7 Exiting" +"2019-09-24 00:26:20.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bc8 Exiting" +"2019-09-24 00:26:20.038 UTC [gossip.discovery] sendMemResponse -> DEBU 3bc9 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:20.038 UTC [msp] DeserializeIdentity -> DEBU 3bca Obtaining identity" +"2019-09-24 00:26:20.038 UTC [msp] DeserializeIdentity -> DEBU 3bcb Obtaining identity" +"2019-09-24 00:26:20.038 UTC [msp] DeserializeIdentity -> DEBU 3bcc Obtaining identity" +"2019-09-24 00:26:20.038 UTC [gossip.comm] Send -> DEBU 3bcd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:20.038 UTC [gossip.comm] sendToEndpoint -> DEBU 3bce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.038 UTC [gossip.comm] sendToEndpoint -> DEBU 3bcf Exiting" +"2019-09-24 00:26:20.038 UTC [gossip.discovery] sendMemResponse -> DEBU 3bd0 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" > alive: alive: alive: " +"2019-09-24 00:26:20.115 UTC [msp] DeserializeIdentity -> DEBU 3bd1 Obtaining identity" +"2019-09-24 00:26:20.115 UTC [msp] DeserializeIdentity -> DEBU 3bd2 Obtaining identity" +"2019-09-24 00:26:20.119 UTC [gossip.comm] Send -> DEBU 3bd3 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd5 Exiting" +"2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd7 Exiting" +"2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.119 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd9 Exiting" +"2019-09-24 00:26:20.121 UTC [gossip.comm] func1 -> DEBU 3bda Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.121 UTC [gossip.gossip] handleMessage -> DEBU 3bdb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.121 UTC [msp.identity] Verify -> DEBU 3bdc Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:20.121 UTC [msp.identity] Verify -> DEBU 3bdd Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:20.121 UTC [msp.identity] Verify -> DEBU 3bde Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:20.122 UTC [msp.identity] Verify -> DEBU 3bdf Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:20.124 UTC [msp] DeserializeIdentity -> DEBU 3be0 Obtaining identity" +"2019-09-24 00:26:20.124 UTC [msp] DeserializeIdentity -> DEBU 3be1 Obtaining identity" +"2019-09-24 00:26:20.125 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3be2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:20.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3be5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3be6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3be7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:20.125 UTC [cauthdsl] func1 -> DEBU 3be8 0xc003295930 gate 1569284780125409900 evaluation starts" +"2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3be9 0xc003295930 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3bea 0xc003295930 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3beb 0xc003295930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3bec 0xc003295930 principal evaluation fails" +"2019-09-24 00:26:20.125 UTC [cauthdsl] func1 -> DEBU 3bed 0xc003295930 gate 1569284780125409900 evaluation fails" +"2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3bee Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3bef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.125 UTC [policies] Evaluate -> DEBU 3bf0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:20.125 UTC [cauthdsl] func1 -> DEBU 3bf1 0xc0035b0170 gate 1569284780125835100 evaluation starts" +"2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3bf2 0xc0035b0170 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.125 UTC [cauthdsl] func2 -> DEBU 3bf3 0xc0035b0170 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.126 UTC [cauthdsl] func2 -> DEBU 3bf4 0xc0035b0170 principal matched by identity 0" +"2019-09-24 00:26:20.126 UTC [msp.identity] Verify -> DEBU 3bf5 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:20.126 UTC [msp.identity] Verify -> DEBU 3bf6 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:20.126 UTC [cauthdsl] func2 -> DEBU 3bf7 0xc0035b0170 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:20.126 UTC [cauthdsl] func1 -> DEBU 3bf8 0xc0035b0170 gate 1569284780125835100 evaluation succeeds" +"2019-09-24 00:26:20.126 UTC [policies] Evaluate -> DEBU 3bf9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.126 UTC [policies] Evaluate -> DEBU 3bfa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.126 UTC [policies] Evaluate -> DEBU 3bfb Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:20.126 UTC [policies] Evaluate -> DEBU 3bfc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:20.126 UTC [msp] DeserializeIdentity -> DEBU 3bfd Obtaining identity" +"2019-09-24 00:26:20.126 UTC [msp] DeserializeIdentity -> DEBU 3bfe Obtaining identity" +"2019-09-24 00:26:20.126 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3bff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:20.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c00 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c01 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.126 UTC [policies] Evaluate -> DEBU 3c02 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:20.127 UTC [policies] Evaluate -> DEBU 3c03 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:20.127 UTC [policies] Evaluate -> DEBU 3c04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:20.127 UTC [cauthdsl] func1 -> DEBU 3c05 0xc0035b1940 gate 1569284780127111700 evaluation starts" +"2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c06 0xc0035b1940 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c07 0xc0035b1940 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c08 0xc0035b1940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c09 0xc0035b1940 principal evaluation fails" +"2019-09-24 00:26:20.127 UTC [cauthdsl] func1 -> DEBU 3c0a 0xc0035b1940 gate 1569284780127111700 evaluation fails" +"2019-09-24 00:26:20.127 UTC [policies] Evaluate -> DEBU 3c0b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.127 UTC [policies] Evaluate -> DEBU 3c0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.127 UTC [policies] Evaluate -> DEBU 3c0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:20.127 UTC [cauthdsl] func1 -> DEBU 3c0e 0xc00381e180 gate 1569284780127579200 evaluation starts" +"2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c0f 0xc00381e180 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c10 0xc00381e180 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c11 0xc00381e180 principal matched by identity 0" +"2019-09-24 00:26:20.127 UTC [msp.identity] Verify -> DEBU 3c12 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:20.127 UTC [msp.identity] Verify -> DEBU 3c13 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:20.127 UTC [cauthdsl] func2 -> DEBU 3c14 0xc00381e180 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:20.128 UTC [cauthdsl] func1 -> DEBU 3c15 0xc00381e180 gate 1569284780127579200 evaluation succeeds" +"2019-09-24 00:26:20.128 UTC [policies] Evaluate -> DEBU 3c16 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.128 UTC [policies] Evaluate -> DEBU 3c17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.128 UTC [policies] Evaluate -> DEBU 3c18 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:20.128 UTC [policies] Evaluate -> DEBU 3c19 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:20.128 UTC [gossip.gossip] handleMessage -> DEBU 3c1a Exiting" +"2019-09-24 00:26:20.134 UTC [gossip.gossip] handleMessage -> DEBU 3c1b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.134 UTC [msp] DeserializeIdentity -> DEBU 3c1c Obtaining identity" +"2019-09-24 00:26:20.134 UTC [msp] DeserializeIdentity -> DEBU 3c1d Obtaining identity" +"2019-09-24 00:26:20.134 UTC [msp] DeserializeIdentity -> DEBU 3c1e Obtaining identity" +"2019-09-24 00:26:20.134 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:20.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c20 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c21 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.134 UTC [policies] Evaluate -> DEBU 3c22 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:20.135 UTC [policies] Evaluate -> DEBU 3c23 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:20.135 UTC [policies] Evaluate -> DEBU 3c24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:20.135 UTC [cauthdsl] func1 -> DEBU 3c25 0xc00386ca90 gate 1569284780135091800 evaluation starts" +"2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c26 0xc00386ca90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c27 0xc00386ca90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c28 0xc00386ca90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c29 0xc00386ca90 principal evaluation fails" +"2019-09-24 00:26:20.135 UTC [cauthdsl] func1 -> DEBU 3c2a 0xc00386ca90 gate 1569284780135091800 evaluation fails" +"2019-09-24 00:26:20.135 UTC [policies] Evaluate -> DEBU 3c2b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.135 UTC [policies] Evaluate -> DEBU 3c2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.135 UTC [policies] Evaluate -> DEBU 3c2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:20.135 UTC [cauthdsl] func1 -> DEBU 3c2e 0xc00386d2d0 gate 1569284780135631000 evaluation starts" +"2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c2f 0xc00386d2d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c30 0xc00386d2d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.135 UTC [cauthdsl] func2 -> DEBU 3c31 0xc00386d2d0 principal matched by identity 0" +"2019-09-24 00:26:20.135 UTC [msp.identity] Verify -> DEBU 3c32 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:20.135 UTC [msp.identity] Verify -> DEBU 3c33 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:20.136 UTC [cauthdsl] func2 -> DEBU 3c34 0xc00386d2d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:20.136 UTC [cauthdsl] func1 -> DEBU 3c35 0xc00386d2d0 gate 1569284780135631000 evaluation succeeds" +"2019-09-24 00:26:20.136 UTC [policies] Evaluate -> DEBU 3c36 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.136 UTC [policies] Evaluate -> DEBU 3c37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.136 UTC [policies] Evaluate -> DEBU 3c38 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:20.136 UTC [policies] Evaluate -> DEBU 3c39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:20.136 UTC [msp.identity] Verify -> DEBU 3c3a Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:20.136 UTC [msp.identity] Verify -> DEBU 3c3b Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:20.137 UTC [msp.identity] Verify -> DEBU 3c3c Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:20.137 UTC [msp.identity] Verify -> DEBU 3c3d Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:20.137 UTC [msp] DeserializeIdentity -> DEBU 3c3e Obtaining identity" +"2019-09-24 00:26:20.137 UTC [msp] DeserializeIdentity -> DEBU 3c3f Obtaining identity" +"2019-09-24 00:26:20.137 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:20.138 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c41 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.138 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c42 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:20.138 UTC [cauthdsl] func1 -> DEBU 3c46 0xc0039898e0 gate 1569284780138299400 evaluation starts" +"2019-09-24 00:26:20.138 UTC [cauthdsl] func2 -> DEBU 3c47 0xc0039898e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.138 UTC [cauthdsl] func2 -> DEBU 3c48 0xc0039898e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.138 UTC [cauthdsl] func2 -> DEBU 3c49 0xc0039898e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:20.138 UTC [cauthdsl] func2 -> DEBU 3c4a 0xc0039898e0 principal evaluation fails" +"2019-09-24 00:26:20.138 UTC [cauthdsl] func1 -> DEBU 3c4b 0xc0039898e0 gate 1569284780138299400 evaluation fails" +"2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c4c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.138 UTC [policies] Evaluate -> DEBU 3c4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:20.138 UTC [cauthdsl] func1 -> DEBU 3c4f 0xc003b78120 gate 1569284780138827700 evaluation starts" +"2019-09-24 00:26:20.138 UTC [cauthdsl] func2 -> DEBU 3c50 0xc003b78120 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.139 UTC [cauthdsl] func2 -> DEBU 3c51 0xc003b78120 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.139 UTC [cauthdsl] func2 -> DEBU 3c52 0xc003b78120 principal matched by identity 0" +"2019-09-24 00:26:20.139 UTC [msp.identity] Verify -> DEBU 3c53 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:20.139 UTC [msp.identity] Verify -> DEBU 3c54 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:20.139 UTC [cauthdsl] func2 -> DEBU 3c55 0xc003b78120 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:20.139 UTC [cauthdsl] func1 -> DEBU 3c56 0xc003b78120 gate 1569284780138827700 evaluation succeeds" +"2019-09-24 00:26:20.139 UTC [policies] Evaluate -> DEBU 3c57 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.139 UTC [policies] Evaluate -> DEBU 3c58 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.139 UTC [policies] Evaluate -> DEBU 3c59 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:20.139 UTC [policies] Evaluate -> DEBU 3c5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:20.139 UTC [gossip.gossip] handleMessage -> DEBU 3c5b Exiting" +"2019-09-24 00:26:20.139 UTC [gossip.comm] func1 -> DEBU 3c5c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.140 UTC [gossip.gossip] handleMessage -> DEBU 3c5d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.140 UTC [msp] DeserializeIdentity -> DEBU 3c5e Obtaining identity" +"2019-09-24 00:26:20.140 UTC [msp] DeserializeIdentity -> DEBU 3c5f Obtaining identity" +"2019-09-24 00:26:20.140 UTC [msp] DeserializeIdentity -> DEBU 3c60 Obtaining identity" +"2019-09-24 00:26:20.140 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c61 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:20.140 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c62 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c63 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.141 UTC [policies] Evaluate -> DEBU 3c64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:20.141 UTC [policies] Evaluate -> DEBU 3c65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:20.141 UTC [policies] Evaluate -> DEBU 3c66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:20.141 UTC [cauthdsl] func1 -> DEBU 3c67 0xc003b79d90 gate 1569284780141281500 evaluation starts" +"2019-09-24 00:26:20.141 UTC [cauthdsl] func2 -> DEBU 3c68 0xc003b79d90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.141 UTC [cauthdsl] func2 -> DEBU 3c69 0xc003b79d90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.141 UTC [cauthdsl] func2 -> DEBU 3c6a 0xc003b79d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:20.141 UTC [cauthdsl] func2 -> DEBU 3c6b 0xc003b79d90 principal evaluation fails" +"2019-09-24 00:26:20.141 UTC [cauthdsl] func1 -> DEBU 3c6c 0xc003b79d90 gate 1569284780141281500 evaluation fails" +"2019-09-24 00:26:20.141 UTC [policies] Evaluate -> DEBU 3c6d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.141 UTC [policies] Evaluate -> DEBU 3c6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.163 UTC [policies] Evaluate -> DEBU 3c6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:20.163 UTC [cauthdsl] func1 -> DEBU 3c70 0xc003c525d0 gate 1569284780163824700 evaluation starts" +"2019-09-24 00:26:20.164 UTC [cauthdsl] func2 -> DEBU 3c71 0xc003c525d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.164 UTC [cauthdsl] func2 -> DEBU 3c72 0xc003c525d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.164 UTC [cauthdsl] func2 -> DEBU 3c73 0xc003c525d0 principal matched by identity 0" +"2019-09-24 00:26:20.164 UTC [msp.identity] Verify -> DEBU 3c74 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:20.164 UTC [msp.identity] Verify -> DEBU 3c75 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:20.165 UTC [cauthdsl] func2 -> DEBU 3c76 0xc003c525d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:20.165 UTC [cauthdsl] func1 -> DEBU 3c77 0xc003c525d0 gate 1569284780163824700 evaluation succeeds" +"2019-09-24 00:26:20.165 UTC [policies] Evaluate -> DEBU 3c78 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.165 UTC [policies] Evaluate -> DEBU 3c79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.165 UTC [policies] Evaluate -> DEBU 3c7a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:20.165 UTC [policies] Evaluate -> DEBU 3c7b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:20.166 UTC [msp.identity] Verify -> DEBU 3c7c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:20.172 UTC [msp.identity] Verify -> DEBU 3c7d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:20.183 UTC [msp] DeserializeIdentity -> DEBU 3c7e Obtaining identity" +"2019-09-24 00:26:20.184 UTC [msp] DeserializeIdentity -> DEBU 3c7f Obtaining identity" +"2019-09-24 00:26:20.184 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c80 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:20.184 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c81 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.184 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c82 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.184 UTC [policies] Evaluate -> DEBU 3c83 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:20.184 UTC [policies] Evaluate -> DEBU 3c84 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:20.184 UTC [policies] Evaluate -> DEBU 3c85 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:20.184 UTC [cauthdsl] func1 -> DEBU 3c86 0xc003e084c0 gate 1569284780184618400 evaluation starts" +"2019-09-24 00:26:20.184 UTC [cauthdsl] func2 -> DEBU 3c87 0xc003e084c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.184 UTC [cauthdsl] func2 -> DEBU 3c88 0xc003e084c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.184 UTC [cauthdsl] func2 -> DEBU 3c89 0xc003e084c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:20.184 UTC [cauthdsl] func2 -> DEBU 3c8a 0xc003e084c0 principal evaluation fails" +"2019-09-24 00:26:20.184 UTC [cauthdsl] func1 -> DEBU 3c8b 0xc003e084c0 gate 1569284780184618400 evaluation fails" +"2019-09-24 00:26:20.184 UTC [policies] Evaluate -> DEBU 3c8c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.184 UTC [policies] Evaluate -> DEBU 3c8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.199 UTC [policies] Evaluate -> DEBU 3c8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:20.199 UTC [cauthdsl] func1 -> DEBU 3c8f 0xc003e08d00 gate 1569284780199362300 evaluation starts" +"2019-09-24 00:26:20.199 UTC [cauthdsl] func2 -> DEBU 3c90 0xc003e08d00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.199 UTC [cauthdsl] func2 -> DEBU 3c91 0xc003e08d00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.199 UTC [cauthdsl] func2 -> DEBU 3c92 0xc003e08d00 principal matched by identity 0" +"2019-09-24 00:26:20.200 UTC [msp.identity] Verify -> DEBU 3c93 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:20.200 UTC [msp.identity] Verify -> DEBU 3c94 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:20.200 UTC [cauthdsl] func2 -> DEBU 3c95 0xc003e08d00 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:20.200 UTC [cauthdsl] func1 -> DEBU 3c96 0xc003e08d00 gate 1569284780199362300 evaluation succeeds" +"2019-09-24 00:26:20.200 UTC [policies] Evaluate -> DEBU 3c97 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.200 UTC [policies] Evaluate -> DEBU 3c98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.200 UTC [policies] Evaluate -> DEBU 3c99 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:20.200 UTC [policies] Evaluate -> DEBU 3c9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:20.201 UTC [msp.identity] Verify -> DEBU 3c9b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:20.201 UTC [msp.identity] Verify -> DEBU 3c9c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:20.201 UTC [gossip.gossip] handleMessage -> DEBU 3c9d Exiting" +"2019-09-24 00:26:20.285 UTC [msp] DeserializeIdentity -> DEBU 3c9e Obtaining identity" +"2019-09-24 00:26:20.285 UTC [msp] DeserializeIdentity -> DEBU 3c9f Obtaining identity" +"2019-09-24 00:26:20.285 UTC [gossip.pull] Hello -> DEBU 3ca0 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:20.285 UTC [msp] DeserializeIdentity -> DEBU 3ca1 Obtaining identity" +"2019-09-24 00:26:20.285 UTC [msp] DeserializeIdentity -> DEBU 3ca2 Obtaining identity" +"2019-09-24 00:26:20.285 UTC [gossip.comm] Send -> DEBU 3ca3 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:20.285 UTC [gossip.comm] sendToEndpoint -> DEBU 3ca4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.285 UTC [gossip.comm] sendToEndpoint -> DEBU 3ca5 Exiting" +"2019-09-24 00:26:20.287 UTC [gossip.comm] func1 -> DEBU 3ca6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.287 UTC [gossip.gossip] handleMessage -> DEBU 3ca7 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.287 UTC [gossip.pull] HandleMessage -> DEBU 3ca8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.287 UTC [gossip.gossip] handleMessage -> DEBU 3ca9 Exiting" +"2019-09-24 00:26:20.622 UTC [gossip.comm] func1 -> DEBU 3caa Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.622 UTC [gossip.gossip] handleMessage -> DEBU 3cab Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.622 UTC [msp] DeserializeIdentity -> DEBU 3cac Obtaining identity" +"2019-09-24 00:26:20.622 UTC [msp] DeserializeIdentity -> DEBU 3cad Obtaining identity" +"2019-09-24 00:26:20.622 UTC [gossip.gossip] handleMessage -> DEBU 3cae Exiting" +"2019-09-24 00:26:20.771 UTC [gossip.comm] func1 -> DEBU 3caf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.771 UTC [gossip.comm] func1 -> DEBU 3cb0 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.776 UTC [gossip.gossip] handleMessage -> DEBU 3cb1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.776 UTC [gossip.gossip] handleMessage -> DEBU 3cb2 Exiting" +"2019-09-24 00:26:20.776 UTC [gossip.gossip] handleMessage -> DEBU 3cb3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.776 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3cb5 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:20.776 UTC [msp] DeserializeIdentity -> DEBU 3cb6 Obtaining identity" +"2019-09-24 00:26:20.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cb7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cb8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cb9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.777 UTC [policies] Evaluate -> DEBU 3cba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:20.777 UTC [policies] Evaluate -> DEBU 3cbb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:20.777 UTC [policies] Evaluate -> DEBU 3cbc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:20.777 UTC [cauthdsl] func1 -> DEBU 3cbd 0xc004c25310 gate 1569284780777815300 evaluation starts" +"2019-09-24 00:26:20.777 UTC [cauthdsl] func2 -> DEBU 3cbe 0xc004c25310 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cbf 0xc004c25310 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cc0 0xc004c25310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cc1 0xc004c25310 principal evaluation fails" +"2019-09-24 00:26:20.778 UTC [cauthdsl] func1 -> DEBU 3cc2 0xc004c25310 gate 1569284780777815300 evaluation fails" +"2019-09-24 00:26:20.778 UTC [policies] Evaluate -> DEBU 3cc3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.778 UTC [policies] Evaluate -> DEBU 3cc4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.778 UTC [policies] Evaluate -> DEBU 3cc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:20.778 UTC [cauthdsl] func1 -> DEBU 3cc6 0xc004c25b50 gate 1569284780778275000 evaluation starts" +"2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cc7 0xc004c25b50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cc8 0xc004c25b50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3cc9 0xc004c25b50 principal matched by identity 0" +"2019-09-24 00:26:20.778 UTC [msp.identity] Verify -> DEBU 3cca Verify: digest = 00000000 cc f7 ab 59 c7 d8 c5 6c 65 25 ba 39 4a 0d 5b da |...Y...le%.9J.[.| +00000010 fd 51 59 23 4b 0e 3c 8f d2 b4 16 a2 af 85 d3 88 |.QY#K.<.........|" +"2019-09-24 00:26:20.778 UTC [msp.identity] Verify -> DEBU 3ccb Verify: sig = 00000000 30 44 02 20 5c f1 77 5a e0 5a d2 84 bb f3 64 cc |0D. \.wZ.Z....d.| +00000010 23 6e 72 d6 1e 7a 5f 27 8e fd 09 8f a2 7a 68 e1 |#nr..z_'.....zh.| +00000020 5f 00 25 00 02 20 32 ba 78 54 fe 29 0a 06 9e 0f |_.%.. 2.xT.)....| +00000030 c4 66 dd fa 17 8e 67 cf c5 59 37 c7 cb 43 50 3b |.f....g..Y7..CP;| +00000040 12 96 16 b5 c2 50 |.....P|" +"2019-09-24 00:26:20.778 UTC [cauthdsl] func2 -> DEBU 3ccc 0xc004c25b50 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:20.778 UTC [cauthdsl] func1 -> DEBU 3ccd 0xc004c25b50 gate 1569284780778275000 evaluation succeeds" +"2019-09-24 00:26:20.779 UTC [policies] Evaluate -> DEBU 3cce Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.779 UTC [policies] Evaluate -> DEBU 3ccf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.779 UTC [policies] Evaluate -> DEBU 3cd0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:20.779 UTC [policies] Evaluate -> DEBU 3cd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:20.779 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cd2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.779 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cd3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:20.779 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cd4 updating membership: timestamp: " +"2019-09-24 00:26:20.779 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cd5 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:20.779 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cd6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:20.779 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cd7 Exiting" +"2019-09-24 00:26:20.779 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cd8 Exiting" +"2019-09-24 00:26:20.779 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cd9 Exiting" +"2019-09-24 00:26:20.779 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cda Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.779 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3cdb Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:20.779 UTC [msp] DeserializeIdentity -> DEBU 3cdc Obtaining identity" +"2019-09-24 00:26:20.779 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cdd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:20.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cde Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cdf Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:20.799 UTC [policies] Evaluate -> DEBU 3ce3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:20.792 UTC [msp] DeserializeIdentity -> DEBU 3ce1 Obtaining identity" +"2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce4 Obtaining identity" +"2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce5 Obtaining identity" +"2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce6 Obtaining identity" +"2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce7 Obtaining identity" +"2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce8 Obtaining identity" +"2019-09-24 00:26:20.808 UTC [msp] DeserializeIdentity -> DEBU 3ce9 Obtaining identity" +"2019-09-24 00:26:20.799 UTC [gossip.comm] func1 -> DEBU 3ce2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.832 UTC [gossip.comm] Send -> DEBU 3cea Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:20.833 UTC [msp] DeserializeIdentity -> DEBU 3ceb Obtaining identity" +"2019-09-24 00:26:20.833 UTC [gossip.comm] Send -> DEBU 3cec Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:20.833 UTC [gossip.comm] sendToEndpoint -> DEBU 3ced Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.833 UTC [gossip.comm] sendToEndpoint -> DEBU 3cee Exiting" +"2019-09-24 00:26:20.833 UTC [gossip.comm] sendToEndpoint -> DEBU 3cef Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.833 UTC [gossip.comm] sendToEndpoint -> DEBU 3cf0 Exiting" +"2019-09-24 00:26:20.834 UTC [gossip.comm] func1 -> DEBU 3cf1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.834 UTC [gossip.comm] func1 -> DEBU 3cf2 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.791 UTC [gossip.gossip] handleMessage -> DEBU 3ce0 Exiting" +"2019-09-24 00:26:20.842 UTC [gossip.gossip] handleMessage -> DEBU 3cf3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.843 UTC [gossip.pull] HandleMessage -> DEBU 3cf4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.843 UTC [msp] DeserializeIdentity -> DEBU 3cf5 Obtaining identity" +"2019-09-24 00:26:20.845 UTC [msp] DeserializeIdentity -> DEBU 3cf6 Obtaining identity" +"2019-09-24 00:26:20.845 UTC [msp] DeserializeIdentity -> DEBU 3cf7 Obtaining identity" +"2019-09-24 00:26:20.846 UTC [msp] DeserializeIdentity -> DEBU 3cf8 Obtaining identity" +"2019-09-24 00:26:20.846 UTC [msp] DeserializeIdentity -> DEBU 3cf9 Obtaining identity" +"2019-09-24 00:26:20.846 UTC [msp] DeserializeIdentity -> DEBU 3cfa Obtaining identity" +"2019-09-24 00:26:20.846 UTC [gossip.pull] SendDigest -> DEBU 3cfb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:20.846 UTC [gossip.gossip] handleMessage -> DEBU 3cfc Exiting" +"2019-09-24 00:26:20.846 UTC [gossip.gossip] handleMessage -> DEBU 3cfd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.846 UTC [policies] Evaluate -> DEBU 3cfe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:20.846 UTC [policies] Evaluate -> DEBU 3cff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:20.846 UTC [cauthdsl] func1 -> DEBU 3d00 0xc00266e870 gate 1569284780846380600 evaluation starts" +"2019-09-24 00:26:20.846 UTC [cauthdsl] func2 -> DEBU 3d01 0xc00266e870 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.846 UTC [cauthdsl] func2 -> DEBU 3d02 0xc00266e870 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.850 UTC [cauthdsl] func2 -> DEBU 3d03 0xc00266e870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:20.851 UTC [cauthdsl] func2 -> DEBU 3d04 0xc00266e870 principal evaluation fails" +"2019-09-24 00:26:20.851 UTC [cauthdsl] func1 -> DEBU 3d05 0xc00266e870 gate 1569284780846380600 evaluation fails" +"2019-09-24 00:26:20.851 UTC [policies] Evaluate -> DEBU 3d06 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.852 UTC [policies] Evaluate -> DEBU 3d07 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:20.852 UTC [policies] Evaluate -> DEBU 3d08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:20.852 UTC [cauthdsl] func1 -> DEBU 3d09 0xc00266f0b0 gate 1569284780852910100 evaluation starts" +"2019-09-24 00:26:20.852 UTC [cauthdsl] func2 -> DEBU 3d0a 0xc00266f0b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:20.853 UTC [cauthdsl] func2 -> DEBU 3d0b 0xc00266f0b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:20.853 UTC [cauthdsl] func2 -> DEBU 3d0c 0xc00266f0b0 principal matched by identity 0" +"2019-09-24 00:26:20.853 UTC [msp.identity] Verify -> DEBU 3d0d Verify: digest = 00000000 1d c5 ab fc 18 82 3f 1e 81 fb d3 10 ca 7d ea 25 |......?......}.%| +00000010 f8 5d 47 ab 2a 2c 72 73 af 50 c0 9a de b4 db 9a |.]G.*,rs.P......|" +"2019-09-24 00:26:20.854 UTC [msp.identity] Verify -> DEBU 3d0e Verify: sig = 00000000 30 45 02 21 00 d6 ea d6 be 4c ec 40 ac 48 04 2f |0E.!.....L.@.H./| +00000010 ce eb eb 54 0d 69 6f 39 f1 67 f2 71 a8 9b 20 b3 |...T.io9.g.q.. .| +00000020 a1 0d b6 db 18 02 20 03 fe 0d 6f 09 f3 2e c0 7e |...... ...o....~| +00000030 1a 83 fb 11 99 43 e1 ef a8 cc 30 bc b0 1f 01 d4 |.....C....0.....| +00000040 70 19 0f 26 7d 22 82 |p..&}".|" +"2019-09-24 00:26:20.854 UTC [cauthdsl] func2 -> DEBU 3d0f 0xc00266f0b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:20.854 UTC [cauthdsl] func1 -> DEBU 3d10 0xc00266f0b0 gate 1569284780852910100 evaluation succeeds" +"2019-09-24 00:26:20.854 UTC [policies] Evaluate -> DEBU 3d11 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.854 UTC [policies] Evaluate -> DEBU 3d12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:20.854 UTC [policies] Evaluate -> DEBU 3d13 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:20.854 UTC [policies] Evaluate -> DEBU 3d14 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:20.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d15 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:20.854 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d16 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:20.854 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d17 updating membership: timestamp: " +"2019-09-24 00:26:20.854 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d18 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:20.854 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d19 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:20.854 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d1a Exiting" +"2019-09-24 00:26:20.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d1b Exiting" +"2019-09-24 00:26:20.854 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d1c Exiting" +"2019-09-24 00:26:20.854 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d1d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d1e Exiting" +"2019-09-24 00:26:20.855 UTC [gossip.gossip] handleMessage -> DEBU 3d1f Exiting" +"2019-09-24 00:26:20.855 UTC [gossip.gossip] handleMessage -> DEBU 3d20 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.855 UTC [gossip.pull] HandleMessage -> DEBU 3d21 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.855 UTC [gossip.pull] SendDigest -> DEBU 3d22 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:20.855 UTC [gossip.gossip] handleMessage -> DEBU 3d23 Exiting" +"2019-09-24 00:26:20.855 UTC [gossip.gossip] handleMessage -> DEBU 3d24 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.855 UTC [gossip.gossip] handleMessage -> DEBU 3d25 Exiting" +"2019-09-24 00:26:20.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d26 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:20.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d27 Exiting" +"2019-09-24 00:26:20.855 UTC [gossip.discovery] sendMemResponse -> DEBU 3d28 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:20.855 UTC [msp] DeserializeIdentity -> DEBU 3d29 Obtaining identity" +"2019-09-24 00:26:20.855 UTC [msp] DeserializeIdentity -> DEBU 3d2a Obtaining identity" +"2019-09-24 00:26:20.856 UTC [msp] DeserializeIdentity -> DEBU 3d2b Obtaining identity" +"2019-09-24 00:26:20.856 UTC [gossip.comm] Send -> DEBU 3d2c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:20.856 UTC [gossip.discovery] sendMemResponse -> DEBU 3d2d Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020:" signature:"0E\002!\000\341I\277\212-\312\231V~\345\324\217\225S\315\374B]s\210!\025LBG$\276G\\\177\022&\002 cX}NC\023\252\313\206k~\207\035\357\030\226Dg\364\233\377\301s\276w\372\350^\273\336\233\013" > alive: alive: alive: " +"2019-09-24 00:26:20.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3d2e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:20.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3d2f Exiting" +"2019-09-24 00:26:21.125 UTC [gossip.gossip] handleMessage -> DEBU 3d30 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:21.125 UTC [msp] DeserializeIdentity -> DEBU 3d31 Obtaining identity" +"2019-09-24 00:26:21.125 UTC [msp] DeserializeIdentity -> DEBU 3d32 Obtaining identity" +"2019-09-24 00:26:21.126 UTC [msp] DeserializeIdentity -> DEBU 3d33 Obtaining identity" +"2019-09-24 00:26:21.126 UTC [gossip.gossip] handleMessage -> DEBU 3d34 Exiting" +"2019-09-24 00:26:21.668 UTC [gossip.comm] func1 -> DEBU 3d35 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:21.669 UTC [gossip.gossip] handleMessage -> DEBU 3d36 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:21.669 UTC [gossip.pull] HandleMessage -> DEBU 3d37 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:21.669 UTC [gossip.pull] SendDigest -> DEBU 3d38 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:21.669 UTC [gossip.gossip] handleMessage -> DEBU 3d39 Exiting" +"2019-09-24 00:26:21.759 UTC [gossip.comm] func1 -> DEBU 3d3a Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020;" signature:"0D\002 [\255\022\177wbJ\357\217\345\205H3BE\n)'Y\3202\2038\215\005\000\346]\223\205\241N\002 \035\354Zm_\321$_m\375z\205K\266l8\2071H?m[\237\266\304\273\034\262\304\244m\022" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:21.760 UTC [gossip.gossip] handleMessage -> DEBU 3d3b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020;" signature:"0D\002 [\255\022\177wbJ\357\217\345\205H3BE\n)'Y\3202\2038\215\005\000\346]\223\205\241N\002 \035\354Zm_\321$_m\375z\205K\266l8\2071H?m[\237\266\304\273\034\262\304\244m\022" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:21.760 UTC [gossip.gossip] handleMessage -> DEBU 3d3c Exiting" +"2019-09-24 00:26:21.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d3d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020;" signature:"0D\002 [\255\022\177wbJ\357\217\345\205H3BE\n)'Y\3202\2038\215\005\000\346]\223\205\241N\002 \035\354Zm_\321$_m\375z\205K\266l8\2071H?m[\237\266\304\273\034\262\304\244m\022" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:21.760 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d3e Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:21.760 UTC [msp.identity] Verify -> DEBU 3d3f Verify: digest = 00000000 c8 17 4e ac 81 14 d1 e3 32 4d 82 37 0f b9 c6 df |..N.....2M.7....| +00000010 4a 06 fb 21 bf 51 b7 98 e4 2a c6 df 4e 1f 38 e2 |J..!.Q...*..N.8.|" +"2019-09-24 00:26:21.760 UTC [msp.identity] Verify -> DEBU 3d40 Verify: sig = 00000000 30 44 02 20 5b ad 12 7f 77 62 4a ef 8f e5 85 48 |0D. [...wbJ....H| +00000010 33 42 45 0a 29 27 59 d0 32 83 38 8d 05 00 e6 5d |3BE.)'Y.2.8....]| +00000020 93 85 a1 4e 02 20 1d ec 5a 6d 5f d1 24 5f 6d fd |...N. ..Zm_.$_m.| +00000030 7a 85 4b b6 6c 38 87 31 48 3f 6d 5b 9f b6 c4 bb |z.K.l8.1H?m[....| +00000040 1c b2 c4 a4 6d 12 |....m.|" +"2019-09-24 00:26:21.760 UTC [msp.identity] Verify -> DEBU 3d41 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:21.760 UTC [msp.identity] Verify -> DEBU 3d42 Verify: sig = 00000000 30 45 02 21 00 d7 30 46 82 9f f3 da 93 e1 39 d5 |0E.!..0F......9.| +00000010 99 22 36 69 7b cc 26 4b dc 0a 63 63 43 bd e2 38 |."6i{.&K..ccC..8| +00000020 b4 c6 34 f3 cd 02 20 24 57 7d f5 58 ee 9b a5 2f |..4... $W}.X.../| +00000030 b4 24 f0 ed a7 e6 f6 9a fe e7 58 ae 02 f6 f4 80 |.$........X.....| +00000040 39 5f 7e 47 6c a1 c4 |9_~Gl..|" +"2019-09-24 00:26:21.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d43 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d44 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:26:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d45 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d46 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:21.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d47 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:21.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d48 Exiting" +"2019-09-24 00:26:21.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d49 Exiting" +"2019-09-24 00:26:21.766 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d4a Exiting" +"2019-09-24 00:26:21.766 UTC [gossip.discovery] sendMemResponse -> DEBU 3d4b Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:21.766 UTC [msp] DeserializeIdentity -> DEBU 3d4c Obtaining identity" +"2019-09-24 00:26:21.766 UTC [msp] DeserializeIdentity -> DEBU 3d4d Obtaining identity" +"2019-09-24 00:26:21.766 UTC [gossip.comm] Send -> DEBU 3d4e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:21.766 UTC [gossip.discovery] sendMemResponse -> DEBU 3d4f Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020;" signature:"0D\002 [\255\022\177wbJ\357\217\345\205H3BE\n)'Y\3202\2038\215\005\000\346]\223\205\241N\002 \035\354Zm_\321$_m\375z\205K\266l8\2071H?m[\237\266\304\273\034\262\304\244m\022" secret_envelope: > alive: " +"2019-09-24 00:26:21.766 UTC [gossip.comm] sendToEndpoint -> DEBU 3d50 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:21.766 UTC [gossip.comm] sendToEndpoint -> DEBU 3d51 Exiting" +"2019-09-24 00:26:22.054 UTC [gossip.comm] func1 -> DEBU 3d52 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:22.054 UTC [gossip.gossip] handleMessage -> DEBU 3d53 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:22.054 UTC [msp] DeserializeIdentity -> DEBU 3d54 Obtaining identity" +"2019-09-24 00:26:22.054 UTC [msp] DeserializeIdentity -> DEBU 3d55 Obtaining identity" +"2019-09-24 00:26:22.054 UTC [msp] DeserializeIdentity -> DEBU 3d56 Obtaining identity" +"2019-09-24 00:26:22.054 UTC [gossip.gossip] handleMessage -> DEBU 3d57 Exiting" +"2019-09-24 00:26:22.317 UTC [gossip.election] waitForInterrupt -> DEBU 3d58 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:22.318 UTC [gossip.election] IsLeader -> DEBU 3d59 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:22.318 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d5a Obtaining default signing identity" +"2019-09-24 00:26:22.318 UTC [msp.identity] Sign -> DEBU 3d5b Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510121801 " +"2019-09-24 00:26:22.318 UTC [msp.identity] Sign -> DEBU 3d5c Sign: digest: BECA44B6E5DE6E46089D3D09F8FE0C78EDBD35DCF6001BB4E46F88670CC94AE2 " +"2019-09-24 00:26:22.319 UTC [gossip.election] waitForInterrupt -> DEBU 3d5d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d5e Obtaining identity" +"2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d5f Obtaining identity" +"2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d60 Obtaining identity" +"2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d61 Obtaining identity" +"2019-09-24 00:26:22.325 UTC [gossip.comm] Send -> DEBU 3d62 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d63 Obtaining identity" +"2019-09-24 00:26:22.325 UTC [msp] DeserializeIdentity -> DEBU 3d64 Obtaining identity" +"2019-09-24 00:26:22.325 UTC [gossip.comm] sendToEndpoint -> DEBU 3d65 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:26:22.325 UTC [gossip.comm] sendToEndpoint -> DEBU 3d66 Exiting" +"2019-09-24 00:26:22.728 UTC [gossip.comm] func1 -> DEBU 3d67 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:22.729 UTC [gossip.gossip] handleMessage -> DEBU 3d68 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:22.729 UTC [gossip.gossip] handleMessage -> DEBU 3d69 Exiting" +"2019-09-24 00:26:22.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d6a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:22.729 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d6b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:22.729 UTC [msp.identity] Verify -> DEBU 3d6c Verify: digest = 00000000 bb d7 1d fb 82 35 47 09 ce 42 9d 45 80 48 86 6a |.....5G..B.E.H.j| +00000010 05 a6 34 25 ce d9 38 aa e1 e6 69 35 74 7c 31 dc |..4%..8...i5t|1.|" +"2019-09-24 00:26:22.729 UTC [msp.identity] Verify -> DEBU 3d6d Verify: sig = 00000000 30 44 02 20 74 b7 6c 76 35 24 ed db 07 e9 f0 dc |0D. t.lv5$......| +00000010 45 1c 7a fb 2f 9e d4 27 6a f6 5f e2 37 d3 e7 c5 |E.z./..'j._.7...| +00000020 cc d1 7b 2d 02 20 11 e6 71 0b af d9 94 ae 9b 55 |..{-. ..q......U| +00000030 53 c8 18 25 6c 01 ee fa 98 78 1b f6 d2 ec 02 4a |S..%l....x.....J| +00000040 82 81 58 b1 75 34 |..X.u4|" +"2019-09-24 00:26:22.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d6e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:22.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d6f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:22.730 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d70 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:22.730 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d71 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:22.730 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d72 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:22.730 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d73 Exiting" +"2019-09-24 00:26:22.730 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d74 Exiting" +"2019-09-24 00:26:22.730 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d75 Exiting" +"2019-09-24 00:26:22.732 UTC [msp] DeserializeIdentity -> DEBU 3d76 Obtaining identity" +"2019-09-24 00:26:22.732 UTC [msp] DeserializeIdentity -> DEBU 3d77 Obtaining identity" +"2019-09-24 00:26:22.732 UTC [msp] DeserializeIdentity -> DEBU 3d78 Obtaining identity" +"2019-09-24 00:26:22.732 UTC [gossip.comm] Send -> DEBU 3d79 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:22.732 UTC [msp] DeserializeIdentity -> DEBU 3d7a Obtaining identity" +"2019-09-24 00:26:22.732 UTC [gossip.comm] Send -> DEBU 3d7b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:22.732 UTC [gossip.comm] sendToEndpoint -> DEBU 3d7c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:22.732 UTC [gossip.comm] sendToEndpoint -> DEBU 3d7d Exiting" +"2019-09-24 00:26:22.732 UTC [gossip.comm] sendToEndpoint -> DEBU 3d7e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:22.732 UTC [gossip.comm] sendToEndpoint -> DEBU 3d7f Exiting" +"2019-09-24 00:26:22.748 UTC [gossip.gossip] handleMessage -> DEBU 3d80 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:22.748 UTC [gossip.gossip] handleMessage -> DEBU 3d81 Exiting" +"2019-09-24 00:26:22.748 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d82 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:22.749 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d83 Exiting" +"2019-09-24 00:26:23.713 UTC [gossip.pull] Hello -> DEBU 3d84 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:23.714 UTC [gossip.comm] Send -> DEBU 3d85 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:23.714 UTC [gossip.pull] Hello -> DEBU 3d86 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:23.714 UTC [gossip.comm] Send -> DEBU 3d87 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:23.714 UTC [gossip.pull] Hello -> DEBU 3d88 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:23.714 UTC [gossip.comm] Send -> DEBU 3d89 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8b Exiting" +"2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8d Exiting" +"2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.714 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8f Exiting" +"2019-09-24 00:26:23.720 UTC [gossip.comm] func1 -> DEBU 3d90 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.720 UTC [gossip.gossip] handleMessage -> DEBU 3d91 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.720 UTC [gossip.comm] func1 -> DEBU 3d92 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.720 UTC [gossip.pull] HandleMessage -> DEBU 3d93 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.720 UTC [gossip.gossip] handleMessage -> DEBU 3d94 Exiting" +"2019-09-24 00:26:23.721 UTC [gossip.gossip] handleMessage -> DEBU 3d95 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.721 UTC [gossip.pull] HandleMessage -> DEBU 3d96 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.721 UTC [gossip.gossip] handleMessage -> DEBU 3d97 Exiting" +"2019-09-24 00:26:23.721 UTC [gossip.gossip] handleMessage -> DEBU 3d98 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.721 UTC [gossip.pull] HandleMessage -> DEBU 3d99 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.721 UTC [gossip.gossip] handleMessage -> DEBU 3d9a Exiting" +"2019-09-24 00:26:23.856 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d9b Obtaining default signing identity" +"2019-09-24 00:26:23.856 UTC [msp.identity] Sign -> DEBU 3d9c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151038 " +"2019-09-24 00:26:23.856 UTC [msp.identity] Sign -> DEBU 3d9d Sign: digest: B3246468FB0C4E61782ABD7762767D6AC1F81F62AC0FD04E88A1CECAFF0A393F " +"2019-09-24 00:26:23.857 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d9e Obtaining default signing identity" +"2019-09-24 00:26:23.857 UTC [msp.identity] Sign -> DEBU 3d9f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:23.857 UTC [msp.identity] Sign -> DEBU 3da0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:23.858 UTC [msp] DeserializeIdentity -> DEBU 3da1 Obtaining identity" +"2019-09-24 00:26:23.858 UTC [gossip.comm] Send -> DEBU 3da2 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:23.859 UTC [msp] DeserializeIdentity -> DEBU 3da3 Obtaining identity" +"2019-09-24 00:26:23.859 UTC [gossip.comm] Send -> DEBU 3da4 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:23.859 UTC [gossip.comm] Send -> DEBU 3da5 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:23.859 UTC [gossip.comm] sendToEndpoint -> DEBU 3da6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.859 UTC [gossip.comm] sendToEndpoint -> DEBU 3da7 Exiting" +"2019-09-24 00:26:23.859 UTC [gossip.comm] sendToEndpoint -> DEBU 3da8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.860 UTC [gossip.comm] sendToEndpoint -> DEBU 3da9 Exiting" +"2019-09-24 00:26:23.860 UTC [gossip.comm] sendToEndpoint -> DEBU 3daa Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.860 UTC [gossip.comm] sendToEndpoint -> DEBU 3dab Exiting" +"2019-09-24 00:26:23.863 UTC [gossip.comm] func1 -> DEBU 3dac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.863 UTC [gossip.gossip] handleMessage -> DEBU 3dad Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.863 UTC [gossip.gossip] handleMessage -> DEBU 3dae Exiting" +"2019-09-24 00:26:23.863 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3daf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.864 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3db0 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:23.864 UTC [msp.identity] Verify -> DEBU 3db1 Verify: digest = 00000000 b3 24 64 68 fb 0c 4e 61 78 2a bd 77 62 76 7d 6a |.$dh..Nax*.wbv}j| +00000010 c1 f8 1f 62 ac 0f d0 4e 88 a1 ce ca ff 0a 39 3f |...b...N......9?|" +"2019-09-24 00:26:23.864 UTC [msp.identity] Verify -> DEBU 3db2 Verify: sig = 00000000 30 44 02 20 16 94 b1 a2 e6 a8 a4 e8 d2 e3 9a e4 |0D. ............| +00000010 46 67 55 5b 3a 7a f6 b8 77 20 a1 15 2e 8a 63 46 |FgU[:z..w ....cF| +00000020 65 b4 f7 e2 02 20 6d ae af 21 cb b2 ac 16 da 04 |e.... m..!......| +00000030 8b f5 bc 12 f1 55 93 d6 ff 63 99 7b 29 24 f1 6e |.....U...c.{)$.n| +00000040 ef 07 97 26 f1 f0 |...&..|" +"2019-09-24 00:26:23.864 UTC [msp.identity] Verify -> DEBU 3db3 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:23.864 UTC [msp.identity] Verify -> DEBU 3db4 Verify: sig = 00000000 30 45 02 21 00 d7 43 ae 14 ef 8a 5a da b8 37 30 |0E.!..C....Z..70| +00000010 7f 8b ff 49 eb ba 80 7a c9 03 99 ff 63 16 50 de |...I...z....c.P.| +00000020 49 73 52 5c 80 02 20 4f ff df 9e ca c7 30 f6 b4 |IsR\.. O.....0..| +00000030 9f 36 de a3 9c 22 cc d7 ee c9 bf ce 6c fa f2 43 |.6..."......l..C| +00000040 0a 26 35 67 53 63 24 |.&5gSc$|" +"2019-09-24 00:26:23.864 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:23.864 UTC [gossip.discovery] isSentByMe -> DEBU 3db6 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:23.864 UTC [gossip.discovery] handleAliveMessage -> DEBU 3db7 Exiting" +"2019-09-24 00:26:23.865 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3db8 Exiting" +"2019-09-24 00:26:23.872 UTC [gossip.gossip] handleMessage -> DEBU 3db9 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.872 UTC [gossip.gossip] handleMessage -> DEBU 3dba Exiting" +"2019-09-24 00:26:23.873 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dbb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.873 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dbc Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:23.873 UTC [msp.identity] Verify -> DEBU 3dbd Verify: digest = 00000000 b3 24 64 68 fb 0c 4e 61 78 2a bd 77 62 76 7d 6a |.$dh..Nax*.wbv}j| +00000010 c1 f8 1f 62 ac 0f d0 4e 88 a1 ce ca ff 0a 39 3f |...b...N......9?|" +"2019-09-24 00:26:23.873 UTC [msp.identity] Verify -> DEBU 3dbe Verify: sig = 00000000 30 44 02 20 16 94 b1 a2 e6 a8 a4 e8 d2 e3 9a e4 |0D. ............| +00000010 46 67 55 5b 3a 7a f6 b8 77 20 a1 15 2e 8a 63 46 |FgU[:z..w ....cF| +00000020 65 b4 f7 e2 02 20 6d ae af 21 cb b2 ac 16 da 04 |e.... m..!......| +00000030 8b f5 bc 12 f1 55 93 d6 ff 63 99 7b 29 24 f1 6e |.....U...c.{)$.n| +00000040 ef 07 97 26 f1 f0 |...&..|" +"2019-09-24 00:26:23.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dbf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:23.874 UTC [gossip.discovery] isSentByMe -> DEBU 3dc0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:23.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc1 Exiting" +"2019-09-24 00:26:23.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dc2 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:23.874 UTC [msp] DeserializeIdentity -> DEBU 3dc3 Obtaining identity" +"2019-09-24 00:26:23.874 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3dc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:23.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dc5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:23.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dc6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:23.874 UTC [policies] Evaluate -> DEBU 3dc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:23.874 UTC [policies] Evaluate -> DEBU 3dc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:23.874 UTC [policies] Evaluate -> DEBU 3dc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:23.875 UTC [cauthdsl] func1 -> DEBU 3dca 0xc0037828c0 gate 1569284783874997200 evaluation starts" +"2019-09-24 00:26:23.875 UTC [cauthdsl] func2 -> DEBU 3dcb 0xc0037828c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:23.875 UTC [cauthdsl] func2 -> DEBU 3dcc 0xc0037828c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:23.875 UTC [cauthdsl] func2 -> DEBU 3dcd 0xc0037828c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:23.875 UTC [cauthdsl] func2 -> DEBU 3dce 0xc0037828c0 principal evaluation fails" +"2019-09-24 00:26:23.875 UTC [cauthdsl] func1 -> DEBU 3dcf 0xc0037828c0 gate 1569284783874997200 evaluation fails" +"2019-09-24 00:26:23.875 UTC [policies] Evaluate -> DEBU 3dd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:23.876 UTC [policies] Evaluate -> DEBU 3dd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:23.876 UTC [policies] Evaluate -> DEBU 3dd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:23.876 UTC [cauthdsl] func1 -> DEBU 3dd3 0xc003783100 gate 1569284783876305800 evaluation starts" +"2019-09-24 00:26:23.876 UTC [cauthdsl] func2 -> DEBU 3dd4 0xc003783100 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:23.876 UTC [cauthdsl] func2 -> DEBU 3dd5 0xc003783100 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:23.876 UTC [cauthdsl] func2 -> DEBU 3dd6 0xc003783100 principal matched by identity 0" +"2019-09-24 00:26:23.876 UTC [msp.identity] Verify -> DEBU 3dd7 Verify: digest = 00000000 1d c5 ab fc 18 82 3f 1e 81 fb d3 10 ca 7d ea 25 |......?......}.%| +00000010 f8 5d 47 ab 2a 2c 72 73 af 50 c0 9a de b4 db 9a |.]G.*,rs.P......|" +"2019-09-24 00:26:23.876 UTC [msp.identity] Verify -> DEBU 3dd8 Verify: sig = 00000000 30 45 02 21 00 d6 ea d6 be 4c ec 40 ac 48 04 2f |0E.!.....L.@.H./| +00000010 ce eb eb 54 0d 69 6f 39 f1 67 f2 71 a8 9b 20 b3 |...T.io9.g.q.. .| +00000020 a1 0d b6 db 18 02 20 03 fe 0d 6f 09 f3 2e c0 7e |...... ...o....~| +00000030 1a 83 fb 11 99 43 e1 ef a8 cc 30 bc b0 1f 01 d4 |.....C....0.....| +00000040 70 19 0f 26 7d 22 82 |p..&}".|" +"2019-09-24 00:26:23.876 UTC [cauthdsl] func2 -> DEBU 3dd9 0xc003783100 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:23.876 UTC [cauthdsl] func1 -> DEBU 3dda 0xc003783100 gate 1569284783876305800 evaluation succeeds" +"2019-09-24 00:26:23.876 UTC [policies] Evaluate -> DEBU 3ddb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:23.877 UTC [policies] Evaluate -> DEBU 3ddc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:23.877 UTC [policies] Evaluate -> DEBU 3ddd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:23.877 UTC [policies] Evaluate -> DEBU 3dde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:23.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ddf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:23.879 UTC [gossip.comm] func1 -> DEBU 3de0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.880 UTC [gossip.gossip] handleMessage -> DEBU 3de1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 3de2 Exiting" +"2019-09-24 00:26:23.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3de3 Exiting" +"2019-09-24 00:26:23.884 UTC [gossip.gossip] handleMessage -> DEBU 3de4 Exiting" +"2019-09-24 00:26:23.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3de5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.889 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3de6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:23.896 UTC [msp.identity] Verify -> DEBU 3de7 Verify: digest = 00000000 b3 24 64 68 fb 0c 4e 61 78 2a bd 77 62 76 7d 6a |.$dh..Nax*.wbv}j| +00000010 c1 f8 1f 62 ac 0f d0 4e 88 a1 ce ca ff 0a 39 3f |...b...N......9?|" +"2019-09-24 00:26:23.896 UTC [msp.identity] Verify -> DEBU 3de8 Verify: sig = 00000000 30 44 02 20 16 94 b1 a2 e6 a8 a4 e8 d2 e3 9a e4 |0D. ............| +00000010 46 67 55 5b 3a 7a f6 b8 77 20 a1 15 2e 8a 63 46 |FgU[:z..w ....cF| +00000020 65 b4 f7 e2 02 20 6d ae af 21 cb b2 ac 16 da 04 |e.... m..!......| +00000030 8b f5 bc 12 f1 55 93 d6 ff 63 99 7b 29 24 f1 6e |.....U...c.{)$.n| +00000040 ef 07 97 26 f1 f0 |...&..|" +"2019-09-24 00:26:23.896 UTC [gossip.discovery] handleAliveMessage -> DEBU 3de9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:23.896 UTC [gossip.discovery] isSentByMe -> DEBU 3dea Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:23.896 UTC [gossip.discovery] handleAliveMessage -> DEBU 3deb Exiting" +"2019-09-24 00:26:23.896 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dec Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:23.897 UTC [msp] DeserializeIdentity -> DEBU 3ded Obtaining identity" +"2019-09-24 00:26:23.897 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3dee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:23.897 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3def Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:23.897 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3df0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:23.897 UTC [policies] Evaluate -> DEBU 3df1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:23.897 UTC [policies] Evaluate -> DEBU 3df2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:23.897 UTC [policies] Evaluate -> DEBU 3df3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:23.897 UTC [cauthdsl] func1 -> DEBU 3df4 0xc00359df30 gate 1569284783897744400 evaluation starts" +"2019-09-24 00:26:23.897 UTC [cauthdsl] func2 -> DEBU 3df5 0xc00359df30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:23.897 UTC [cauthdsl] func2 -> DEBU 3df6 0xc00359df30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:23.897 UTC [cauthdsl] func2 -> DEBU 3df7 0xc00359df30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:23.897 UTC [cauthdsl] func2 -> DEBU 3df8 0xc00359df30 principal evaluation fails" +"2019-09-24 00:26:23.897 UTC [cauthdsl] func1 -> DEBU 3df9 0xc00359df30 gate 1569284783897744400 evaluation fails" +"2019-09-24 00:26:23.898 UTC [policies] Evaluate -> DEBU 3dfa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:23.898 UTC [policies] Evaluate -> DEBU 3dfb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:23.898 UTC [policies] Evaluate -> DEBU 3dfc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:23.903 UTC [cauthdsl] func1 -> DEBU 3dfd 0xc003b5a770 gate 1569284783903956200 evaluation starts" +"2019-09-24 00:26:23.904 UTC [cauthdsl] func2 -> DEBU 3dfe 0xc003b5a770 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:23.904 UTC [cauthdsl] func2 -> DEBU 3dff 0xc003b5a770 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:23.904 UTC [cauthdsl] func2 -> DEBU 3e00 0xc003b5a770 principal matched by identity 0" +"2019-09-24 00:26:23.904 UTC [msp.identity] Verify -> DEBU 3e01 Verify: digest = 00000000 03 58 fc c9 3b 38 4f 8a 43 a9 97 43 8f 3d 13 89 |.X..;8O.C..C.=..| +00000010 22 9d 98 61 1a 30 20 06 49 77 8d bd cf bb a4 69 |"..a.0 .Iw.....i|" +"2019-09-24 00:26:23.905 UTC [msp.identity] Verify -> DEBU 3e02 Verify: sig = 00000000 30 44 02 20 7b 77 7b 23 6b 9a 0d 47 96 19 ae ed |0D. {w{#k..G....| +00000010 35 44 e2 5b bc 08 30 73 23 46 f3 fb 26 30 40 1d |5D.[..0s#F..&0@.| +00000020 e7 8f a3 37 02 20 58 74 d1 3b 7c 60 13 68 47 12 |...7. Xt.;|`.hG.| +00000030 0c 83 88 cd be 0b b2 7a 07 75 c9 52 94 c3 ce 5d |.......z.u.R...]| +00000040 4c 6a 93 f6 5a bb |Lj..Z.|" +"2019-09-24 00:26:23.905 UTC [cauthdsl] func2 -> DEBU 3e03 0xc003b5a770 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:23.905 UTC [cauthdsl] func1 -> DEBU 3e04 0xc003b5a770 gate 1569284783903956200 evaluation succeeds" +"2019-09-24 00:26:23.905 UTC [policies] Evaluate -> DEBU 3e05 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:23.905 UTC [policies] Evaluate -> DEBU 3e06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:23.905 UTC [policies] Evaluate -> DEBU 3e07 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:23.905 UTC [policies] Evaluate -> DEBU 3e08 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:23.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e09 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:23.906 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e0a Exiting" +"2019-09-24 00:26:23.906 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e0b Exiting" +"2019-09-24 00:26:23.941 UTC [gossip.gossip] handleMessage -> DEBU 3e0c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.941 UTC [gossip.pull] HandleMessage -> DEBU 3e0d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e0e Obtaining identity" +"2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e0f Obtaining identity" +"2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e10 Obtaining identity" +"2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e11 Obtaining identity" +"2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e12 Obtaining identity" +"2019-09-24 00:26:23.941 UTC [msp] DeserializeIdentity -> DEBU 3e13 Obtaining identity" +"2019-09-24 00:26:23.941 UTC [gossip.pull] SendDigest -> DEBU 3e14 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:23.941 UTC [gossip.gossip] handleMessage -> DEBU 3e15 Exiting" +"2019-09-24 00:26:24.029 UTC [gossip.gossip] handleMessage -> DEBU 3e16 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.029 UTC [gossip.gossip] handleMessage -> DEBU 3e17 Exiting" +"2019-09-24 00:26:24.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e18 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.030 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e19 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:24.030 UTC [msp] DeserializeIdentity -> DEBU 3e1a Obtaining identity" +"2019-09-24 00:26:24.030 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:24.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e1c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e1d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.030 UTC [policies] Evaluate -> DEBU 3e1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:24.030 UTC [policies] Evaluate -> DEBU 3e1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:24.030 UTC [policies] Evaluate -> DEBU 3e20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:24.030 UTC [cauthdsl] func1 -> DEBU 3e21 0xc003fb1000 gate 1569284784030841100 evaluation starts" +"2019-09-24 00:26:24.030 UTC [cauthdsl] func2 -> DEBU 3e22 0xc003fb1000 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e23 0xc003fb1000 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e24 0xc003fb1000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e25 0xc003fb1000 principal evaluation fails" +"2019-09-24 00:26:24.031 UTC [cauthdsl] func1 -> DEBU 3e26 0xc003fb1000 gate 1569284784030841100 evaluation fails" +"2019-09-24 00:26:24.031 UTC [policies] Evaluate -> DEBU 3e27 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.031 UTC [policies] Evaluate -> DEBU 3e28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.031 UTC [policies] Evaluate -> DEBU 3e29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:24.031 UTC [cauthdsl] func1 -> DEBU 3e2a 0xc003fb1840 gate 1569284784031374900 evaluation starts" +"2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e2b 0xc003fb1840 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e2c 0xc003fb1840 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.031 UTC [cauthdsl] func2 -> DEBU 3e2d 0xc003fb1840 principal matched by identity 0" +"2019-09-24 00:26:24.031 UTC [msp.identity] Verify -> DEBU 3e2e Verify: digest = 00000000 80 f8 ba 4c cd 3c 94 e4 f4 6a 22 12 03 87 36 6b |...L.<...j"...6k| +00000010 85 02 43 6d dd 04 7c 73 7b 1a 9e 10 9f 2e 7f 4a |..Cm..|s{......J|" +"2019-09-24 00:26:24.031 UTC [msp.identity] Verify -> DEBU 3e2f Verify: sig = 00000000 30 44 02 20 0b ba 75 bc 2b b3 9a df 3a 99 5b e3 |0D. ..u.+...:.[.| +00000010 8b 22 51 be 5f 43 3a c4 ba 2f b0 db 85 99 8e c0 |."Q._C:../......| +00000020 72 9d 7f 1b 02 20 5e f0 65 aa 9c 22 b3 43 1c ec |r.... ^.e..".C..| +00000030 b9 98 33 89 a6 5a 1e ba 30 10 58 99 02 69 1f 16 |..3..Z..0.X..i..| +00000040 24 91 8f cd 61 4f |$...aO|" +"2019-09-24 00:26:24.039 UTC [cauthdsl] func2 -> DEBU 3e30 0xc003fb1840 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:24.039 UTC [cauthdsl] func1 -> DEBU 3e31 0xc003fb1840 gate 1569284784031374900 evaluation succeeds" +"2019-09-24 00:26:24.039 UTC [policies] Evaluate -> DEBU 3e32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.039 UTC [policies] Evaluate -> DEBU 3e33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.039 UTC [policies] Evaluate -> DEBU 3e34 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:24.039 UTC [policies] Evaluate -> DEBU 3e35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:24.040 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e36 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:24.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e37 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:24.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e38 updating membership: timestamp: " +"2019-09-24 00:26:24.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e39 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:24.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e3a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:24.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e3b Exiting" +"2019-09-24 00:26:24.040 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3c Exiting" +"2019-09-24 00:26:24.040 UTC [gossip.discovery] sendMemResponse -> DEBU 3e3d Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:24.040 UTC [msp] DeserializeIdentity -> DEBU 3e3e Obtaining identity" +"2019-09-24 00:26:24.041 UTC [msp] DeserializeIdentity -> DEBU 3e3f Obtaining identity" +"2019-09-24 00:26:24.041 UTC [msp] DeserializeIdentity -> DEBU 3e40 Obtaining identity" +"2019-09-24 00:26:24.041 UTC [gossip.comm] Send -> DEBU 3e41 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:24.041 UTC [gossip.discovery] sendMemResponse -> DEBU 3e42 Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020<" signature:"0D\002 t\267lv5$\355\333\007\351\360\334E\034z\373/\236\324'j\366_\3427\323\347\305\314\321{-\002 \021\346q\013\257\331\224\256\233US\310\030%l\001\356\372\230x\033\366\322\354\002J\202\201X\261u4" > alive: " +"2019-09-24 00:26:24.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3e43 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3e44 Exiting" +"2019-09-24 00:26:24.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e45 Exiting" +"2019-09-24 00:26:24.116 UTC [msp] DeserializeIdentity -> DEBU 3e46 Obtaining identity" +"2019-09-24 00:26:24.116 UTC [msp] DeserializeIdentity -> DEBU 3e47 Obtaining identity" +"2019-09-24 00:26:24.116 UTC [gossip.comm] Send -> DEBU 3e48 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e49 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4a Exiting" +"2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4c Exiting" +"2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.116 UTC [gossip.comm] sendToEndpoint -> DEBU 3e4e Exiting" +"2019-09-24 00:26:24.120 UTC [gossip.comm] func1 -> DEBU 3e4f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.120 UTC [gossip.gossip] handleMessage -> DEBU 3e50 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.120 UTC [msp.identity] Verify -> DEBU 3e51 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:24.120 UTC [msp.identity] Verify -> DEBU 3e52 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:24.120 UTC [msp.identity] Verify -> DEBU 3e53 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:24.121 UTC [msp.identity] Verify -> DEBU 3e54 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:24.121 UTC [msp] DeserializeIdentity -> DEBU 3e55 Obtaining identity" +"2019-09-24 00:26:24.121 UTC [msp] DeserializeIdentity -> DEBU 3e56 Obtaining identity" +"2019-09-24 00:26:24.121 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e57 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:24.130 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e58 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.130 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e59 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.130 UTC [policies] Evaluate -> DEBU 3e5a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:24.130 UTC [policies] Evaluate -> DEBU 3e5b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:24.130 UTC [policies] Evaluate -> DEBU 3e5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:24.130 UTC [cauthdsl] func1 -> DEBU 3e5d 0xc0027b4e90 gate 1569284784130791200 evaluation starts" +"2019-09-24 00:26:24.130 UTC [cauthdsl] func2 -> DEBU 3e5e 0xc0027b4e90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.130 UTC [cauthdsl] func2 -> DEBU 3e5f 0xc0027b4e90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.130 UTC [cauthdsl] func2 -> DEBU 3e60 0xc0027b4e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:24.131 UTC [cauthdsl] func2 -> DEBU 3e61 0xc0027b4e90 principal evaluation fails" +"2019-09-24 00:26:24.131 UTC [cauthdsl] func1 -> DEBU 3e62 0xc0027b4e90 gate 1569284784130791200 evaluation fails" +"2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e63 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e64 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e65 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:24.131 UTC [cauthdsl] func1 -> DEBU 3e66 0xc0027b56d0 gate 1569284784131262600 evaluation starts" +"2019-09-24 00:26:24.131 UTC [cauthdsl] func2 -> DEBU 3e67 0xc0027b56d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.131 UTC [cauthdsl] func2 -> DEBU 3e68 0xc0027b56d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.131 UTC [cauthdsl] func2 -> DEBU 3e69 0xc0027b56d0 principal matched by identity 0" +"2019-09-24 00:26:24.131 UTC [msp.identity] Verify -> DEBU 3e6a Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:24.131 UTC [msp.identity] Verify -> DEBU 3e6b Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:24.131 UTC [cauthdsl] func2 -> DEBU 3e6c 0xc0027b56d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:24.131 UTC [cauthdsl] func1 -> DEBU 3e6d 0xc0027b56d0 gate 1569284784131262600 evaluation succeeds" +"2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e6e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e70 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:24.131 UTC [policies] Evaluate -> DEBU 3e71 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:24.144 UTC [gossip.comm] func1 -> DEBU 3e72 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.132 UTC [msp] DeserializeIdentity -> DEBU 3e73 Obtaining identity" +"2019-09-24 00:26:24.152 UTC [msp] DeserializeIdentity -> DEBU 3e74 Obtaining identity" +"2019-09-24 00:26:24.153 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:24.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e76 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e77 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.154 UTC [policies] Evaluate -> DEBU 3e78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:24.154 UTC [policies] Evaluate -> DEBU 3e79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:24.154 UTC [policies] Evaluate -> DEBU 3e7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:24.154 UTC [cauthdsl] func1 -> DEBU 3e7b 0xc0027ecea0 gate 1569284784154468300 evaluation starts" +"2019-09-24 00:26:24.154 UTC [cauthdsl] func2 -> DEBU 3e7c 0xc0027ecea0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.154 UTC [cauthdsl] func2 -> DEBU 3e7d 0xc0027ecea0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.158 UTC [cauthdsl] func2 -> DEBU 3e7e 0xc0027ecea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:24.158 UTC [cauthdsl] func2 -> DEBU 3e7f 0xc0027ecea0 principal evaluation fails" +"2019-09-24 00:26:24.160 UTC [cauthdsl] func1 -> DEBU 3e80 0xc0027ecea0 gate 1569284784154468300 evaluation fails" +"2019-09-24 00:26:24.161 UTC [policies] Evaluate -> DEBU 3e81 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.162 UTC [policies] Evaluate -> DEBU 3e82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.162 UTC [policies] Evaluate -> DEBU 3e83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:24.163 UTC [cauthdsl] func1 -> DEBU 3e84 0xc0027ed6e0 gate 1569284784163189800 evaluation starts" +"2019-09-24 00:26:24.164 UTC [cauthdsl] func2 -> DEBU 3e85 0xc0027ed6e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.165 UTC [cauthdsl] func2 -> DEBU 3e86 0xc0027ed6e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.166 UTC [cauthdsl] func2 -> DEBU 3e87 0xc0027ed6e0 principal matched by identity 0" +"2019-09-24 00:26:24.166 UTC [msp.identity] Verify -> DEBU 3e88 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:24.168 UTC [msp.identity] Verify -> DEBU 3e89 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:24.169 UTC [cauthdsl] func2 -> DEBU 3e8a 0xc0027ed6e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:24.169 UTC [cauthdsl] func1 -> DEBU 3e8b 0xc0027ed6e0 gate 1569284784163189800 evaluation succeeds" +"2019-09-24 00:26:24.169 UTC [policies] Evaluate -> DEBU 3e8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.169 UTC [policies] Evaluate -> DEBU 3e8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.170 UTC [policies] Evaluate -> DEBU 3e8e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:24.170 UTC [policies] Evaluate -> DEBU 3e8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:24.170 UTC [gossip.gossip] handleMessage -> DEBU 3e90 Exiting" +"2019-09-24 00:26:24.170 UTC [gossip.gossip] handleMessage -> DEBU 3e91 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.170 UTC [msp] DeserializeIdentity -> DEBU 3e92 Obtaining identity" +"2019-09-24 00:26:24.170 UTC [msp] DeserializeIdentity -> DEBU 3e93 Obtaining identity" +"2019-09-24 00:26:24.180 UTC [msp] DeserializeIdentity -> DEBU 3e94 Obtaining identity" +"2019-09-24 00:26:24.187 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e95 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:24.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e96 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.187 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e97 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3e98 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3e99 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3e9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:24.187 UTC [cauthdsl] func1 -> DEBU 3e9b 0xc0033b51f0 gate 1569284784187422500 evaluation starts" +"2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3e9c 0xc0033b51f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3e9d 0xc0033b51f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3e9e 0xc0033b51f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3e9f 0xc0033b51f0 principal evaluation fails" +"2019-09-24 00:26:24.187 UTC [cauthdsl] func1 -> DEBU 3ea0 0xc0033b51f0 gate 1569284784187422500 evaluation fails" +"2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3ea1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3ea2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.187 UTC [policies] Evaluate -> DEBU 3ea3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:24.187 UTC [cauthdsl] func1 -> DEBU 3ea4 0xc0033b5a30 gate 1569284784187871300 evaluation starts" +"2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3ea5 0xc0033b5a30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.187 UTC [cauthdsl] func2 -> DEBU 3ea6 0xc0033b5a30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.188 UTC [cauthdsl] func2 -> DEBU 3ea7 0xc0033b5a30 principal matched by identity 0" +"2019-09-24 00:26:24.188 UTC [msp.identity] Verify -> DEBU 3ea8 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:24.188 UTC [msp.identity] Verify -> DEBU 3ea9 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:24.193 UTC [cauthdsl] func2 -> DEBU 3eaa 0xc0033b5a30 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:24.194 UTC [cauthdsl] func1 -> DEBU 3eab 0xc0033b5a30 gate 1569284784187871300 evaluation succeeds" +"2019-09-24 00:26:24.194 UTC [policies] Evaluate -> DEBU 3eac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.194 UTC [policies] Evaluate -> DEBU 3ead == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.194 UTC [policies] Evaluate -> DEBU 3eae Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:24.194 UTC [policies] Evaluate -> DEBU 3eaf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:24.195 UTC [msp.identity] Verify -> DEBU 3eb0 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:24.195 UTC [msp.identity] Verify -> DEBU 3eb1 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:24.196 UTC [msp.identity] Verify -> DEBU 3eb2 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:24.196 UTC [msp.identity] Verify -> DEBU 3eb3 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:24.196 UTC [msp] DeserializeIdentity -> DEBU 3eb4 Obtaining identity" +"2019-09-24 00:26:24.198 UTC [msp] DeserializeIdentity -> DEBU 3eb5 Obtaining identity" +"2019-09-24 00:26:24.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3eb6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:24.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3eb7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3eb8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.200 UTC [policies] Evaluate -> DEBU 3eb9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:24.207 UTC [policies] Evaluate -> DEBU 3eba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:24.207 UTC [policies] Evaluate -> DEBU 3ebb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:24.211 UTC [cauthdsl] func1 -> DEBU 3ebc 0xc003a4a040 gate 1569284784208046700 evaluation starts" +"2019-09-24 00:26:24.212 UTC [cauthdsl] func2 -> DEBU 3ebd 0xc003a4a040 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.212 UTC [cauthdsl] func2 -> DEBU 3ebe 0xc003a4a040 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.212 UTC [cauthdsl] func2 -> DEBU 3ebf 0xc003a4a040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:24.212 UTC [cauthdsl] func2 -> DEBU 3ec0 0xc003a4a040 principal evaluation fails" +"2019-09-24 00:26:24.212 UTC [cauthdsl] func1 -> DEBU 3ec1 0xc003a4a040 gate 1569284784208046700 evaluation fails" +"2019-09-24 00:26:24.212 UTC [policies] Evaluate -> DEBU 3ec2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.212 UTC [policies] Evaluate -> DEBU 3ec3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.212 UTC [policies] Evaluate -> DEBU 3ec4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:24.213 UTC [cauthdsl] func1 -> DEBU 3ec5 0xc003a4a880 gate 1569284784213077600 evaluation starts" +"2019-09-24 00:26:24.213 UTC [cauthdsl] func2 -> DEBU 3ec6 0xc003a4a880 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.213 UTC [cauthdsl] func2 -> DEBU 3ec7 0xc003a4a880 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.213 UTC [cauthdsl] func2 -> DEBU 3ec8 0xc003a4a880 principal matched by identity 0" +"2019-09-24 00:26:24.213 UTC [msp.identity] Verify -> DEBU 3ec9 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:24.213 UTC [msp.identity] Verify -> DEBU 3eca Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:24.213 UTC [cauthdsl] func2 -> DEBU 3ecb 0xc003a4a880 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:24.213 UTC [cauthdsl] func1 -> DEBU 3ecc 0xc003a4a880 gate 1569284784213077600 evaluation succeeds" +"2019-09-24 00:26:24.213 UTC [policies] Evaluate -> DEBU 3ecd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.213 UTC [policies] Evaluate -> DEBU 3ece == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.214 UTC [policies] Evaluate -> DEBU 3ecf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:24.214 UTC [policies] Evaluate -> DEBU 3ed0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:24.214 UTC [gossip.gossip] handleMessage -> DEBU 3ed1 Exiting" +"2019-09-24 00:26:24.214 UTC [gossip.gossip] handleMessage -> DEBU 3ed2 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.214 UTC [msp] DeserializeIdentity -> DEBU 3ed3 Obtaining identity" +"2019-09-24 00:26:24.214 UTC [msp] DeserializeIdentity -> DEBU 3ed4 Obtaining identity" +"2019-09-24 00:26:24.215 UTC [msp] DeserializeIdentity -> DEBU 3ed5 Obtaining identity" +"2019-09-24 00:26:24.216 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ed6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:24.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.216 UTC [policies] Evaluate -> DEBU 3ed9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:24.216 UTC [policies] Evaluate -> DEBU 3eda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:24.216 UTC [policies] Evaluate -> DEBU 3edb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:24.216 UTC [cauthdsl] func1 -> DEBU 3edc 0xc0046e4390 gate 1569284784216433800 evaluation starts" +"2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3edd 0xc0046e4390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3ede 0xc0046e4390 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3edf 0xc0046e4390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3ee0 0xc0046e4390 principal evaluation fails" +"2019-09-24 00:26:24.219 UTC [cauthdsl] func1 -> DEBU 3ee1 0xc0046e4390 gate 1569284784216433800 evaluation fails" +"2019-09-24 00:26:24.219 UTC [policies] Evaluate -> DEBU 3ee2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.219 UTC [policies] Evaluate -> DEBU 3ee3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.219 UTC [policies] Evaluate -> DEBU 3ee4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:24.219 UTC [cauthdsl] func1 -> DEBU 3ee5 0xc0046e4bd0 gate 1569284784219578200 evaluation starts" +"2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3ee6 0xc0046e4bd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3ee7 0xc0046e4bd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.219 UTC [cauthdsl] func2 -> DEBU 3ee8 0xc0046e4bd0 principal matched by identity 0" +"2019-09-24 00:26:24.219 UTC [msp.identity] Verify -> DEBU 3ee9 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:24.220 UTC [msp.identity] Verify -> DEBU 3eea Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:24.220 UTC [cauthdsl] func2 -> DEBU 3eeb 0xc0046e4bd0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:24.220 UTC [cauthdsl] func1 -> DEBU 3eec 0xc0046e4bd0 gate 1569284784219578200 evaluation succeeds" +"2019-09-24 00:26:24.220 UTC [policies] Evaluate -> DEBU 3eed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.220 UTC [policies] Evaluate -> DEBU 3eee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.221 UTC [policies] Evaluate -> DEBU 3eef Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:24.221 UTC [policies] Evaluate -> DEBU 3ef0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:24.222 UTC [msp.identity] Verify -> DEBU 3ef1 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:24.223 UTC [msp.identity] Verify -> DEBU 3ef2 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:24.223 UTC [msp] DeserializeIdentity -> DEBU 3ef3 Obtaining identity" +"2019-09-24 00:26:24.223 UTC [msp] DeserializeIdentity -> DEBU 3ef4 Obtaining identity" +"2019-09-24 00:26:24.227 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ef5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:24.227 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.227 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.227 UTC [policies] Evaluate -> DEBU 3ef8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:24.228 UTC [policies] Evaluate -> DEBU 3ef9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:24.228 UTC [policies] Evaluate -> DEBU 3efa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:24.228 UTC [cauthdsl] func1 -> DEBU 3efb 0xc004d00ac0 gate 1569284784228123400 evaluation starts" +"2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3efc 0xc004d00ac0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3efd 0xc004d00ac0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3efe 0xc004d00ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3eff 0xc004d00ac0 principal evaluation fails" +"2019-09-24 00:26:24.228 UTC [cauthdsl] func1 -> DEBU 3f00 0xc004d00ac0 gate 1569284784228123400 evaluation fails" +"2019-09-24 00:26:24.228 UTC [policies] Evaluate -> DEBU 3f01 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.228 UTC [policies] Evaluate -> DEBU 3f02 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.228 UTC [policies] Evaluate -> DEBU 3f03 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:24.228 UTC [cauthdsl] func1 -> DEBU 3f04 0xc004d01300 gate 1569284784228587900 evaluation starts" +"2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3f05 0xc004d01300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3f06 0xc004d01300 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.228 UTC [cauthdsl] func2 -> DEBU 3f07 0xc004d01300 principal matched by identity 0" +"2019-09-24 00:26:24.229 UTC [msp.identity] Verify -> DEBU 3f08 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:24.229 UTC [msp.identity] Verify -> DEBU 3f09 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:24.229 UTC [cauthdsl] func2 -> DEBU 3f0a 0xc004d01300 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:24.229 UTC [cauthdsl] func1 -> DEBU 3f0b 0xc004d01300 gate 1569284784228587900 evaluation succeeds" +"2019-09-24 00:26:24.229 UTC [policies] Evaluate -> DEBU 3f0c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.229 UTC [policies] Evaluate -> DEBU 3f0d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.229 UTC [policies] Evaluate -> DEBU 3f0e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:24.229 UTC [policies] Evaluate -> DEBU 3f0f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:24.229 UTC [msp.identity] Verify -> DEBU 3f10 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:24.229 UTC [msp.identity] Verify -> DEBU 3f11 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:24.230 UTC [gossip.gossip] handleMessage -> DEBU 3f12 Exiting" +"2019-09-24 00:26:24.286 UTC [msp] DeserializeIdentity -> DEBU 3f13 Obtaining identity" +"2019-09-24 00:26:24.296 UTC [msp] DeserializeIdentity -> DEBU 3f14 Obtaining identity" +"2019-09-24 00:26:24.296 UTC [gossip.pull] Hello -> DEBU 3f15 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:24.296 UTC [msp] DeserializeIdentity -> DEBU 3f16 Obtaining identity" +"2019-09-24 00:26:24.296 UTC [msp] DeserializeIdentity -> DEBU 3f17 Obtaining identity" +"2019-09-24 00:26:24.296 UTC [gossip.comm] Send -> DEBU 3f18 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 3f19 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 3f1a Exiting" +"2019-09-24 00:26:24.299 UTC [gossip.comm] func1 -> DEBU 3f1b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.299 UTC [gossip.gossip] handleMessage -> DEBU 3f1c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.299 UTC [gossip.pull] HandleMessage -> DEBU 3f1d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.299 UTC [gossip.gossip] handleMessage -> DEBU 3f1e Exiting" +"2019-09-24 00:26:24.603 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f1f Obtaining default signing identity" +"2019-09-24 00:26:24.604 UTC [msp.identity] Sign -> DEBU 3f20 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151039 " +"2019-09-24 00:26:24.604 UTC [msp.identity] Sign -> DEBU 3f21 Sign: digest: D2ED1D16CF82C5D9898CE2DF525579B6B2240550591F75BB06AD6E8AE95C137F " +"2019-09-24 00:26:24.604 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f22 Obtaining default signing identity" +"2019-09-24 00:26:24.604 UTC [msp.identity] Sign -> DEBU 3f23 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:24.604 UTC [msp.identity] Sign -> DEBU 3f24 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:24.604 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3f25 Sleeping 5s" +"2019-09-24 00:26:24.650 UTC [gossip.comm] func1 -> DEBU 3f26 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.651 UTC [gossip.gossip] handleMessage -> DEBU 3f27 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.651 UTC [msp] DeserializeIdentity -> DEBU 3f28 Obtaining identity" +"2019-09-24 00:26:24.651 UTC [msp] DeserializeIdentity -> DEBU 3f29 Obtaining identity" +"2019-09-24 00:26:24.651 UTC [gossip.gossip] handleMessage -> DEBU 3f2a Exiting" +"2019-09-24 00:26:24.702 UTC [msp] DeserializeIdentity -> DEBU 3f2b Obtaining identity" +"2019-09-24 00:26:24.703 UTC [msp] DeserializeIdentity -> DEBU 3f2c Obtaining identity" +"2019-09-24 00:26:24.703 UTC [msp] DeserializeIdentity -> DEBU 3f2d Obtaining identity" +"2019-09-24 00:26:24.703 UTC [gossip.comm] Send -> DEBU 3f2e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:24.703 UTC [msp] DeserializeIdentity -> DEBU 3f2f Obtaining identity" +"2019-09-24 00:26:24.703 UTC [gossip.comm] Send -> DEBU 3f30 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:24.704 UTC [gossip.comm] Send -> DEBU 3f31 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:24.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3f32 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:24.705 UTC [gossip.comm] sendToEndpoint -> DEBU 3f33 Exiting" +"2019-09-24 00:26:24.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3f34 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:24.707 UTC [gossip.comm] sendToEndpoint -> DEBU 3f35 Exiting" +"2019-09-24 00:26:24.708 UTC [gossip.comm] sendToEndpoint -> DEBU 3f36 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:24.708 UTC [gossip.comm] sendToEndpoint -> DEBU 3f37 Exiting" +"2019-09-24 00:26:24.789 UTC [gossip.comm] func1 -> DEBU 3f38 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.790 UTC [gossip.gossip] handleMessage -> DEBU 3f39 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.790 UTC [gossip.pull] HandleMessage -> DEBU 3f3a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.790 UTC [msp] DeserializeIdentity -> DEBU 3f3b Obtaining identity" +"2019-09-24 00:26:24.790 UTC [msp] DeserializeIdentity -> DEBU 3f3c Obtaining identity" +"2019-09-24 00:26:24.790 UTC [msp] DeserializeIdentity -> DEBU 3f3d Obtaining identity" +"2019-09-24 00:26:24.791 UTC [msp] DeserializeIdentity -> DEBU 3f3e Obtaining identity" +"2019-09-24 00:26:24.791 UTC [msp] DeserializeIdentity -> DEBU 3f3f Obtaining identity" +"2019-09-24 00:26:24.791 UTC [msp] DeserializeIdentity -> DEBU 3f40 Obtaining identity" +"2019-09-24 00:26:24.791 UTC [gossip.pull] SendDigest -> DEBU 3f41 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:24.791 UTC [gossip.gossip] handleMessage -> DEBU 3f42 Exiting" +"2019-09-24 00:26:24.815 UTC [gossip.comm] func1 -> DEBU 3f43 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.815 UTC [gossip.gossip] handleMessage -> DEBU 3f44 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.816 UTC [gossip.gossip] handleMessage -> DEBU 3f45 Exiting" +"2019-09-24 00:26:24.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f46 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.816 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f47 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:24.816 UTC [msp] DeserializeIdentity -> DEBU 3f48 Obtaining identity" +"2019-09-24 00:26:24.823 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f49 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:24.823 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f4a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.823 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f4b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f4c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f4d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:24.823 UTC [cauthdsl] func1 -> DEBU 3f4f 0xc0026fae50 gate 1569284784823514200 evaluation starts" +"2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f50 0xc0026fae50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f51 0xc0026fae50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f52 0xc0026fae50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f53 0xc0026fae50 principal evaluation fails" +"2019-09-24 00:26:24.823 UTC [cauthdsl] func1 -> DEBU 3f54 0xc0026fae50 gate 1569284784823514200 evaluation fails" +"2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f55 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.823 UTC [policies] Evaluate -> DEBU 3f57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:24.823 UTC [cauthdsl] func1 -> DEBU 3f58 0xc0026fb690 gate 1569284784823905000 evaluation starts" +"2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f59 0xc0026fb690 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.823 UTC [cauthdsl] func2 -> DEBU 3f5a 0xc0026fb690 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.824 UTC [cauthdsl] func2 -> DEBU 3f5b 0xc0026fb690 principal matched by identity 0" +"2019-09-24 00:26:24.824 UTC [msp.identity] Verify -> DEBU 3f5c Verify: digest = 00000000 04 dc 20 0e c2 f1 91 f5 42 b7 4e 9c 06 0a 88 d7 |.. .....B.N.....| +00000010 65 b5 10 0b 4d ea e4 db fc 92 2e 00 da 76 cc 5c |e...M........v.\|" +"2019-09-24 00:26:24.824 UTC [msp.identity] Verify -> DEBU 3f5d Verify: sig = 00000000 30 44 02 20 07 9a fe 04 6c 14 db 8e 5f 1a 2b 12 |0D. ....l..._.+.| +00000010 fd 50 be 3a 78 12 71 ec 5b f2 04 c9 36 92 0d f9 |.P.:x.q.[...6...| +00000020 dd 52 dc e5 02 20 61 73 10 66 e1 9c ca cb 80 70 |.R... as.f.....p| +00000030 88 c5 bf 06 64 f2 c1 ef 12 e7 9e bf cc 8f 09 6a |....d..........j| +00000040 1f c7 73 1b f8 17 |..s...|" +"2019-09-24 00:26:24.824 UTC [cauthdsl] func2 -> DEBU 3f5e 0xc0026fb690 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:24.824 UTC [cauthdsl] func1 -> DEBU 3f5f 0xc0026fb690 gate 1569284784823905000 evaluation succeeds" +"2019-09-24 00:26:24.824 UTC [policies] Evaluate -> DEBU 3f60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.824 UTC [policies] Evaluate -> DEBU 3f61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.824 UTC [policies] Evaluate -> DEBU 3f62 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:24.824 UTC [policies] Evaluate -> DEBU 3f63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:24.824 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f64 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:24.824 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f65 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:24.824 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f66 updating membership: timestamp: " +"2019-09-24 00:26:24.824 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f67 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:24.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f68 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:24.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f69 Exiting" +"2019-09-24 00:26:24.825 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f6a Exiting" +"2019-09-24 00:26:24.832 UTC [gossip.discovery] sendMemResponse -> DEBU 3f6b Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:24.832 UTC [msp] DeserializeIdentity -> DEBU 3f6c Obtaining identity" +"2019-09-24 00:26:24.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f6d Exiting" +"2019-09-24 00:26:24.848 UTC [gossip.comm] func1 -> DEBU 3f6e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.848 UTC [gossip.gossip] handleMessage -> DEBU 3f6f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.848 UTC [gossip.pull] HandleMessage -> DEBU 3f70 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.849 UTC [gossip.pull] SendDigest -> DEBU 3f71 Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:24.849 UTC [gossip.gossip] handleMessage -> DEBU 3f72 Exiting" +"2019-09-24 00:26:24.832 UTC [msp] DeserializeIdentity -> DEBU 3f73 Obtaining identity" +"2019-09-24 00:26:24.849 UTC [msp] DeserializeIdentity -> DEBU 3f74 Obtaining identity" +"2019-09-24 00:26:24.849 UTC [gossip.comm] Send -> DEBU 3f75 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:24.849 UTC [gossip.discovery] sendMemResponse -> DEBU 3f76 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020<" signature:"0D\002 t\267lv5$\355\333\007\351\360\334E\034z\373/\236\324'j\366_\3427\323\347\305\314\321{-\002 \021\346q\013\257\331\224\256\233US\310\030%l\001\356\372\230x\033\366\322\354\002J\202\201X\261u4" > alive: alive: " +"2019-09-24 00:26:24.849 UTC [gossip.comm] sendToEndpoint -> DEBU 3f77 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:24.849 UTC [gossip.comm] sendToEndpoint -> DEBU 3f78 Exiting" +"2019-09-24 00:26:24.979 UTC [gossip.gossip] handleMessage -> DEBU 3f79 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:24.981 UTC [gossip.gossip] handleMessage -> DEBU 3f7a Exiting" +"2019-09-24 00:26:24.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f7b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:24.981 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f7c Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:24.981 UTC [msp] DeserializeIdentity -> DEBU 3f7d Obtaining identity" +"2019-09-24 00:26:24.983 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:24.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f7f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f80 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:24.983 UTC [policies] Evaluate -> DEBU 3f81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:24.983 UTC [policies] Evaluate -> DEBU 3f82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:24.983 UTC [policies] Evaluate -> DEBU 3f83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:24.983 UTC [cauthdsl] func1 -> DEBU 3f84 0xc0033a1e90 gate 1569284784983735900 evaluation starts" +"2019-09-24 00:26:24.983 UTC [cauthdsl] func2 -> DEBU 3f85 0xc0033a1e90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.984 UTC [cauthdsl] func2 -> DEBU 3f86 0xc0033a1e90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.984 UTC [cauthdsl] func2 -> DEBU 3f87 0xc0033a1e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:24.984 UTC [cauthdsl] func2 -> DEBU 3f88 0xc0033a1e90 principal evaluation fails" +"2019-09-24 00:26:24.984 UTC [cauthdsl] func1 -> DEBU 3f89 0xc0033a1e90 gate 1569284784983735900 evaluation fails" +"2019-09-24 00:26:24.984 UTC [policies] Evaluate -> DEBU 3f8a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.984 UTC [policies] Evaluate -> DEBU 3f8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:24.984 UTC [policies] Evaluate -> DEBU 3f8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:24.984 UTC [cauthdsl] func1 -> DEBU 3f8d 0xc0036826d0 gate 1569284784984814200 evaluation starts" +"2019-09-24 00:26:24.984 UTC [cauthdsl] func2 -> DEBU 3f8e 0xc0036826d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:24.984 UTC [cauthdsl] func2 -> DEBU 3f8f 0xc0036826d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:24.985 UTC [cauthdsl] func2 -> DEBU 3f90 0xc0036826d0 principal matched by identity 0" +"2019-09-24 00:26:24.985 UTC [msp.identity] Verify -> DEBU 3f91 Verify: digest = 00000000 b9 59 57 b8 cd 8d 7b f4 96 ca 40 6d e9 73 85 6a |.YW...{...@m.s.j| +00000010 9e b2 67 a8 11 d0 0d e5 78 83 5d 3c d0 89 21 b2 |..g.....x.]<..!.|" +"2019-09-24 00:26:24.985 UTC [msp.identity] Verify -> DEBU 3f92 Verify: sig = 00000000 30 45 02 21 00 f5 b5 2b f6 d1 a8 e9 82 a8 a3 c8 |0E.!...+........| +00000010 35 6e f2 64 15 e2 3b df e0 b4 73 76 be f1 dc 5e |5n.d..;...sv...^| +00000020 36 1c 60 e6 0e 02 20 08 23 1a 32 55 23 d5 fb 3c |6.`... .#.2U#..<| +00000030 94 7f 26 0c 2f 79 38 38 9b d5 bd 5c fb 07 8c 9f |..&./y88...\....| +00000040 55 77 dc 60 ae 33 bd |Uw.`.3.|" +"2019-09-24 00:26:24.985 UTC [cauthdsl] func2 -> DEBU 3f93 0xc0036826d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:24.985 UTC [cauthdsl] func1 -> DEBU 3f94 0xc0036826d0 gate 1569284784984814200 evaluation succeeds" +"2019-09-24 00:26:24.985 UTC [policies] Evaluate -> DEBU 3f95 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.993 UTC [policies] Evaluate -> DEBU 3f96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:24.993 UTC [policies] Evaluate -> DEBU 3f97 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:24.993 UTC [policies] Evaluate -> DEBU 3f98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:24.993 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f99 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:24.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f9a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:24.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f9b updating membership: timestamp: " +"2019-09-24 00:26:24.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f9c Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:24.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f9d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:24.994 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f9e Exiting" +"2019-09-24 00:26:24.994 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f9f Exiting" +"2019-09-24 00:26:24.994 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fa0 Exiting" +"2019-09-24 00:26:25.009 UTC [gossip.comm] func1 -> DEBU 3fa1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:25.009 UTC [gossip.gossip] handleMessage -> DEBU 3fa2 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:25.009 UTC [gossip.gossip] handleMessage -> DEBU 3fa3 Exiting" +"2019-09-24 00:26:25.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fa4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:25.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fa5 Exiting" +"2019-09-24 00:26:25.009 UTC [msp] DeserializeIdentity -> DEBU 3fa6 Obtaining identity" +"2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3fa7 Obtaining identity" +"2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3fa8 Obtaining identity" +"2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3fa9 Obtaining identity" +"2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3faa Obtaining identity" +"2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3fab Obtaining identity" +"2019-09-24 00:26:25.010 UTC [gossip.comm] Send -> DEBU 3fac Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:25.010 UTC [msp] DeserializeIdentity -> DEBU 3fad Obtaining identity" +"2019-09-24 00:26:25.011 UTC [msp] DeserializeIdentity -> DEBU 3fae Obtaining identity" +"2019-09-24 00:26:25.011 UTC [gossip.comm] Send -> DEBU 3faf Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:25.011 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:25.011 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb1 Exiting" +"2019-09-24 00:26:25.015 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:25.015 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb3 Exiting" +"2019-09-24 00:26:25.183 UTC [gossip.gossip] handleMessage -> DEBU 3fb4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:25.183 UTC [msp] DeserializeIdentity -> DEBU 3fb5 Obtaining identity" +"2019-09-24 00:26:25.183 UTC [msp] DeserializeIdentity -> DEBU 3fb6 Obtaining identity" +"2019-09-24 00:26:25.183 UTC [msp] DeserializeIdentity -> DEBU 3fb7 Obtaining identity" +"2019-09-24 00:26:25.183 UTC [gossip.gossip] handleMessage -> DEBU 3fb8 Exiting" +"2019-09-24 00:26:25.671 UTC [gossip.comm] func1 -> DEBU 3fb9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:25.673 UTC [gossip.gossip] handleMessage -> DEBU 3fba Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:25.679 UTC [gossip.pull] HandleMessage -> DEBU 3fbb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:25.679 UTC [gossip.pull] SendDigest -> DEBU 3fbc Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:25.679 UTC [gossip.gossip] handleMessage -> DEBU 3fbd Exiting" +"2019-09-24 00:26:25.689 UTC [gossip.comm] func1 -> DEBU 3fbe Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:25.690 UTC [gossip.gossip] handleMessage -> DEBU 3fbf Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:25.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fc0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:25.694 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fc1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:25.694 UTC [msp] DeserializeIdentity -> DEBU 3fc2 Obtaining identity" +"2019-09-24 00:26:25.694 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fc3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:25.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fc4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:25.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fc5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:25.690 UTC [gossip.gossip] handleMessage -> DEBU 3fc7 Exiting" +"2019-09-24 00:26:25.695 UTC [policies] Evaluate -> DEBU 3fc6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:25.707 UTC [policies] Evaluate -> DEBU 3fc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:25.708 UTC [policies] Evaluate -> DEBU 3fc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:25.708 UTC [cauthdsl] func1 -> DEBU 3fca 0xc003f323e0 gate 1569284785708384000 evaluation starts" +"2019-09-24 00:26:25.709 UTC [cauthdsl] func2 -> DEBU 3fcb 0xc003f323e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:25.709 UTC [cauthdsl] func2 -> DEBU 3fcc 0xc003f323e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:25.709 UTC [cauthdsl] func2 -> DEBU 3fcd 0xc003f323e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:25.709 UTC [cauthdsl] func2 -> DEBU 3fce 0xc003f323e0 principal evaluation fails" +"2019-09-24 00:26:25.709 UTC [cauthdsl] func1 -> DEBU 3fcf 0xc003f323e0 gate 1569284785708384000 evaluation fails" +"2019-09-24 00:26:25.709 UTC [policies] Evaluate -> DEBU 3fd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:25.709 UTC [policies] Evaluate -> DEBU 3fd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:25.709 UTC [policies] Evaluate -> DEBU 3fd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:25.711 UTC [cauthdsl] func1 -> DEBU 3fd5 0xc003f32e40 gate 1569284785711368600 evaluation starts" +"2019-09-24 00:26:25.722 UTC [cauthdsl] func2 -> DEBU 3fd6 0xc003f32e40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:25.722 UTC [cauthdsl] func2 -> DEBU 3fd7 0xc003f32e40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:25.722 UTC [cauthdsl] func2 -> DEBU 3fd8 0xc003f32e40 principal matched by identity 0" +"2019-09-24 00:26:25.722 UTC [msp.identity] Verify -> DEBU 3fd9 Verify: digest = 00000000 40 ca a3 c4 f1 af cd b5 6b 0d 2c c3 20 52 00 aa |@.......k.,. R..| +00000010 f0 13 e1 bb 2d d0 6c dd 90 6c 8a a0 00 98 37 5e |....-.l..l....7^|" +"2019-09-24 00:26:25.722 UTC [msp.identity] Verify -> DEBU 3fda Verify: sig = 00000000 30 44 02 20 50 9d 10 dc 78 f9 ce 2a 95 e7 c9 15 |0D. P...x..*....| +00000010 01 6e 6a df 25 7c a3 b9 28 17 d1 46 80 14 72 58 |.nj.%|..(..F..rX| +00000020 23 4b 6c 9a 02 20 15 09 aa e9 45 56 be 96 be 4b |#Kl.. ....EV...K| +00000030 b3 48 63 55 77 4c 73 ce 5d 85 b3 82 ce 82 fd 0e |.HcUwLs.].......| +00000040 e0 a5 01 d4 9b 22 |....."|" +"2019-09-24 00:26:25.723 UTC [cauthdsl] func2 -> DEBU 3fdb 0xc003f32e40 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:25.724 UTC [cauthdsl] func1 -> DEBU 3fdc 0xc003f32e40 gate 1569284785711368600 evaluation succeeds" +"2019-09-24 00:26:25.724 UTC [policies] Evaluate -> DEBU 3fdd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:25.724 UTC [policies] Evaluate -> DEBU 3fde == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:25.725 UTC [policies] Evaluate -> DEBU 3fdf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:25.725 UTC [policies] Evaluate -> DEBU 3fe0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:25.710 UTC [gossip.gossip] handleMessage -> DEBU 3fd3 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:25.710 UTC [gossip.comm] func1 -> DEBU 3fd4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:25.822 UTC [gossip.comm] func1 -> DEBU 3fe1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020=" signature:"0D\002 |\020\024\241\377\222\326&\275I\240$\206\250\266E\300\254\262\033O\325\3734\316\230\331\311\254 z\014\002 \005\205\2010\354\020\003j\360\375\004\023v\246\264\014\372mXv\243\356\232*\325\205$\374\217cgY" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:25.837 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fe2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:25.839 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fe3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:25.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fe4 updating membership: timestamp: " +"2019-09-24 00:26:25.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fe5 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:25.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fe6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:25.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fe7 Exiting" +"2019-09-24 00:26:25.841 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fe8 Exiting" +"2019-09-24 00:26:25.841 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fe9 Exiting" +"2019-09-24 00:26:25.841 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fea Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:25.842 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3feb Exiting" +"2019-09-24 00:26:25.842 UTC [gossip.gossip] handleMessage -> DEBU 3fec Exiting" +"2019-09-24 00:26:25.842 UTC [gossip.gossip] handleMessage -> DEBU 3fed Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:25.843 UTC [gossip.gossip] handleMessage -> DEBU 3fee Exiting" +"2019-09-24 00:26:25.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fef Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:25.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ff0 Exiting" +"2019-09-24 00:26:25.851 UTC [gossip.gossip] handleMessage -> DEBU 3ff1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020=" signature:"0D\002 |\020\024\241\377\222\326&\275I\240$\206\250\266E\300\254\262\033O\325\3734\316\230\331\311\254 z\014\002 \005\205\2010\354\020\003j\360\375\004\023v\246\264\014\372mXv\243\356\232*\325\205$\374\217cgY" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:25.851 UTC [gossip.gossip] handleMessage -> DEBU 3ff2 Exiting" +"2019-09-24 00:26:25.854 UTC [msp] DeserializeIdentity -> DEBU 3ff3 Obtaining identity" +"2019-09-24 00:26:25.854 UTC [msp] DeserializeIdentity -> DEBU 3ff4 Obtaining identity" +"2019-09-24 00:26:25.855 UTC [msp] DeserializeIdentity -> DEBU 3ff5 Obtaining identity" +"2019-09-24 00:26:25.855 UTC [msp] DeserializeIdentity -> DEBU 3ff6 Obtaining identity" +"2019-09-24 00:26:25.855 UTC [msp] DeserializeIdentity -> DEBU 3ff7 Obtaining identity" +"2019-09-24 00:26:25.855 UTC [msp] DeserializeIdentity -> DEBU 3ff8 Obtaining identity" +"2019-09-24 00:26:25.855 UTC [msp] DeserializeIdentity -> DEBU 3ff9 Obtaining identity" +"2019-09-24 00:26:25.856 UTC [gossip.comm] Send -> DEBU 3ffa Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:25.856 UTC [msp] DeserializeIdentity -> DEBU 3ffb Obtaining identity" +"2019-09-24 00:26:25.856 UTC [gossip.comm] Send -> DEBU 3ffc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:25.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3ffd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:25.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3ffe Exiting" +"2019-09-24 00:26:25.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3fff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:25.857 UTC [gossip.comm] sendToEndpoint -> DEBU 4000 Exiting" +"2019-09-24 00:26:25.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4001 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020=" signature:"0D\002 |\020\024\241\377\222\326&\275I\240$\206\250\266E\300\254\262\033O\325\3734\316\230\331\311\254 z\014\002 \005\205\2010\354\020\003j\360\375\004\023v\246\264\014\372mXv\243\356\232*\325\205$\374\217cgY" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:25.864 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4002 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:25.869 UTC [msp.identity] Verify -> DEBU 4003 Verify: digest = 00000000 b6 5c 89 56 0f 93 8c e3 9c 51 c2 14 17 ac 40 55 |.\.V.....Q....@U| +00000010 3a af fa 32 5b 6e 71 dd 02 46 3c b4 bb 17 f1 55 |:..2[nq..F<....U|" +"2019-09-24 00:26:25.869 UTC [msp.identity] Verify -> DEBU 4004 Verify: sig = 00000000 30 44 02 20 7c 10 14 a1 ff 92 d6 26 bd 49 a0 24 |0D. |......&.I.$| +00000010 86 a8 b6 45 c0 ac b2 1b 4f d5 fb 34 ce 98 d9 c9 |...E....O..4....| +00000020 ac 20 7a 0c 02 20 05 85 81 30 ec 10 03 6a f0 fd |. z.. ...0...j..| +00000030 04 13 76 a6 b4 0c fa 6d 58 76 a3 ee 9a 2a d5 85 |..v....mXv...*..| +00000040 24 fc 8f 63 67 59 |$..cgY|" +"2019-09-24 00:26:25.880 UTC [msp.identity] Verify -> DEBU 4005 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:25.881 UTC [msp.identity] Verify -> DEBU 4006 Verify: sig = 00000000 30 44 02 20 62 07 91 33 43 a5 55 59 d6 0a 2e 52 |0D. b..3C.UY...R| +00000010 33 1b e8 61 32 00 a3 a7 af a0 c8 95 d6 59 d5 b0 |3..a2........Y..| +00000020 61 07 ef 31 02 20 56 9e 2b 12 c6 ba 41 f1 26 ee |a..1. V.+...A.&.| +00000030 0a b3 ce 10 7a d4 fa bf 3c 22 2f d5 a7 c8 a7 57 |....z...<"/....W| +00000040 d7 3a 76 1a 85 91 |.:v...|" +"2019-09-24 00:26:25.882 UTC [gossip.discovery] handleAliveMessage -> DEBU 4007 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:25.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 4008 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:26:25.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 4009 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:25.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 400a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:25.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 400b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:25.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 400c Exiting" +"2019-09-24 00:26:25.883 UTC [gossip.discovery] handleAliveMessage -> DEBU 400d Exiting" +"2019-09-24 00:26:25.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 400e Exiting" +"2019-09-24 00:26:25.884 UTC [gossip.discovery] sendMemResponse -> DEBU 400f Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:25.884 UTC [msp] DeserializeIdentity -> DEBU 4010 Obtaining identity" +"2019-09-24 00:26:25.884 UTC [msp] DeserializeIdentity -> DEBU 4011 Obtaining identity" +"2019-09-24 00:26:25.884 UTC [gossip.comm] Send -> DEBU 4012 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:25.884 UTC [gossip.discovery] sendMemResponse -> DEBU 4013 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020=" signature:"0D\002 |\020\024\241\377\222\326&\275I\240$\206\250\266E\300\254\262\033O\325\3734\316\230\331\311\254 z\014\002 \005\205\2010\354\020\003j\360\375\004\023v\246\264\014\372mXv\243\356\232*\325\205$\374\217cgY" secret_envelope: > alive: " +"2019-09-24 00:26:25.884 UTC [gossip.comm] sendToEndpoint -> DEBU 4014 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:26:25.885 UTC [gossip.comm] sendToEndpoint -> DEBU 4015 Exiting" +"2019-09-24 00:26:26.044 UTC [gossip.comm] func1 -> DEBU 4016 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:26.044 UTC [gossip.gossip] handleMessage -> DEBU 4017 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:26.044 UTC [msp] DeserializeIdentity -> DEBU 4018 Obtaining identity" +"2019-09-24 00:26:26.045 UTC [msp] DeserializeIdentity -> DEBU 4019 Obtaining identity" +"2019-09-24 00:26:26.045 UTC [msp] DeserializeIdentity -> DEBU 401a Obtaining identity" +"2019-09-24 00:26:26.045 UTC [gossip.gossip] handleMessage -> DEBU 401b Exiting" +"2019-09-24 00:26:27.330 UTC [gossip.election] waitForInterrupt -> DEBU 401c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:27.331 UTC [gossip.election] IsLeader -> DEBU 401d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:27.331 UTC [msp] GetDefaultSigningIdentity -> DEBU 401e Obtaining default signing identity" +"2019-09-24 00:26:27.331 UTC [msp.identity] Sign -> DEBU 401f Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510131801 " +"2019-09-24 00:26:27.331 UTC [msp.identity] Sign -> DEBU 4020 Sign: digest: 1188372527D82F57BDF3E9760AA6FFA24B435576F52B23E527A9970CA2EC9366 " +"2019-09-24 00:26:27.331 UTC [gossip.election] waitForInterrupt -> DEBU 4021 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:27.443 UTC [msp] DeserializeIdentity -> DEBU 4022 Obtaining identity" +"2019-09-24 00:26:27.444 UTC [msp] DeserializeIdentity -> DEBU 4023 Obtaining identity" +"2019-09-24 00:26:27.444 UTC [msp] DeserializeIdentity -> DEBU 4024 Obtaining identity" +"2019-09-24 00:26:27.719 UTC [gossip.pull] Hello -> DEBU 4025 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:27.719 UTC [gossip.comm] Send -> DEBU 4026 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:27.719 UTC [gossip.pull] Hello -> DEBU 4027 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:27.720 UTC [gossip.comm] Send -> DEBU 4028 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:27.721 UTC [gossip.pull] Hello -> DEBU 4029 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:27.721 UTC [gossip.comm] Send -> DEBU 402a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:27.722 UTC [gossip.comm] sendToEndpoint -> DEBU 402b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.724 UTC [gossip.comm] sendToEndpoint -> DEBU 402c Exiting" +"2019-09-24 00:26:27.726 UTC [gossip.comm] sendToEndpoint -> DEBU 402d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.726 UTC [gossip.comm] sendToEndpoint -> DEBU 402e Exiting" +"2019-09-24 00:26:27.732 UTC [gossip.comm] sendToEndpoint -> DEBU 402f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.736 UTC [gossip.comm] sendToEndpoint -> DEBU 4030 Exiting" +"2019-09-24 00:26:27.738 UTC [gossip.comm] func1 -> DEBU 4031 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:27.738 UTC [gossip.gossip] handleMessage -> DEBU 4032 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:27.738 UTC [gossip.gossip] handleMessage -> DEBU 4033 Exiting" +"2019-09-24 00:26:27.738 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4034 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:27.738 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4035 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:27.738 UTC [msp.identity] Verify -> DEBU 4036 Verify: digest = 00000000 71 55 c0 b4 f9 a4 cf 34 41 03 96 74 bd de bf 02 |qU.....4A..t....| +00000010 19 6d 0d b5 f1 91 4d 82 ff 04 c4 6f 88 9f 93 6e |.m....M....o...n|" +"2019-09-24 00:26:27.739 UTC [msp.identity] Verify -> DEBU 4037 Verify: sig = 00000000 30 44 02 20 34 7f 50 34 a3 d8 75 c6 e3 d8 86 6e |0D. 4.P4..u....n| +00000010 b5 e3 a6 8c 8e 28 3f 13 6a 08 b0 7d 86 65 7b fe |.....(?.j..}.e{.| +00000020 d7 dd 64 58 02 20 3f b6 c8 e3 7c eb e9 72 b7 85 |..dX. ?...|..r..| +00000030 bd 38 87 48 31 91 50 6b a5 41 1b 61 45 d2 5d c8 |.8.H1.Pk.A.aE.].| +00000040 90 b5 a2 6b e1 e0 |...k..|" +"2019-09-24 00:26:27.739 UTC [gossip.discovery] handleAliveMessage -> DEBU 4038 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:27.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 4039 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:27.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 403a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:27.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 403b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:27.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 403c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:27.739 UTC [gossip.discovery] learnExistingMembers -> DEBU 403d Exiting" +"2019-09-24 00:26:27.739 UTC [gossip.discovery] handleAliveMessage -> DEBU 403e Exiting" +"2019-09-24 00:26:27.740 UTC [gossip.comm] func1 -> DEBU 403f Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.740 UTC [gossip.gossip] handleMessage -> DEBU 4040 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.740 UTC [gossip.pull] HandleMessage -> DEBU 4041 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.740 UTC [gossip.gossip] handleMessage -> DEBU 4042 Exiting" +"2019-09-24 00:26:27.741 UTC [gossip.comm] func1 -> DEBU 4043 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.741 UTC [gossip.gossip] handleMessage -> DEBU 4044 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.744 UTC [gossip.pull] HandleMessage -> DEBU 4045 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.766 UTC [gossip.gossip] handleMessage -> DEBU 4046 Exiting" +"2019-09-24 00:26:27.769 UTC [gossip.comm] func1 -> DEBU 4047 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:27.769 UTC [gossip.gossip] handleMessage -> DEBU 4048 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:27.445 UTC [msp] DeserializeIdentity -> DEBU 4049 Obtaining identity" +"2019-09-24 00:26:27.770 UTC [gossip.comm] Send -> DEBU 404a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:27.771 UTC [gossip.comm] sendToEndpoint -> DEBU 404b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:26:27.771 UTC [gossip.comm] sendToEndpoint -> DEBU 404c Exiting" +"2019-09-24 00:26:27.772 UTC [msp] DeserializeIdentity -> DEBU 404d Obtaining identity" +"2019-09-24 00:26:27.772 UTC [msp] DeserializeIdentity -> DEBU 404e Obtaining identity" +"2019-09-24 00:26:27.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU 404f Exiting" +"2019-09-24 00:26:27.773 UTC [gossip.gossip] handleMessage -> DEBU 4050 Exiting" +"2019-09-24 00:26:27.775 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4051 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:27.777 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4052 Exiting" +"2019-09-24 00:26:27.783 UTC [msp] DeserializeIdentity -> DEBU 4053 Obtaining identity" +"2019-09-24 00:26:27.784 UTC [msp] DeserializeIdentity -> DEBU 4054 Obtaining identity" +"2019-09-24 00:26:27.784 UTC [msp] DeserializeIdentity -> DEBU 4055 Obtaining identity" +"2019-09-24 00:26:27.784 UTC [gossip.comm] Send -> DEBU 4056 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:27.784 UTC [msp] DeserializeIdentity -> DEBU 4057 Obtaining identity" +"2019-09-24 00:26:27.785 UTC [gossip.comm] Send -> DEBU 4058 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:27.785 UTC [gossip.comm] sendToEndpoint -> DEBU 4059 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:27.785 UTC [gossip.comm] sendToEndpoint -> DEBU 405a Exiting" +"2019-09-24 00:26:27.785 UTC [gossip.comm] sendToEndpoint -> DEBU 405b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:27.785 UTC [gossip.comm] sendToEndpoint -> DEBU 405c Exiting" +"2019-09-24 00:26:27.820 UTC [gossip.gossip] handleMessage -> DEBU 405d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.820 UTC [gossip.pull] HandleMessage -> DEBU 405e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.820 UTC [gossip.gossip] handleMessage -> DEBU 405f Exiting" +"2019-09-24 00:26:27.820 UTC [gossip.gossip] handleMessage -> DEBU 4060 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:27.821 UTC [gossip.gossip] handleMessage -> DEBU 4061 Exiting" +"2019-09-24 00:26:27.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4062 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:27.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4063 Exiting" +"2019-09-24 00:26:27.861 UTC [msp] GetDefaultSigningIdentity -> DEBU 4064 Obtaining default signing identity" +"2019-09-24 00:26:27.861 UTC [msp.identity] Sign -> DEBU 4065 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103A " +"2019-09-24 00:26:27.861 UTC [msp.identity] Sign -> DEBU 4066 Sign: digest: 6A4BDEE0CAE7DC74B60CDF9EF81CC7735776C5EB0390E97248B909E4FBD1BCEE " +"2019-09-24 00:26:27.861 UTC [msp] GetDefaultSigningIdentity -> DEBU 4067 Obtaining default signing identity" +"2019-09-24 00:26:27.861 UTC [msp.identity] Sign -> DEBU 4068 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:27.861 UTC [msp.identity] Sign -> DEBU 4069 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:27.861 UTC [msp] DeserializeIdentity -> DEBU 406a Obtaining identity" +"2019-09-24 00:26:27.861 UTC [gossip.comm] Send -> DEBU 406b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:27.862 UTC [gossip.comm] Send -> DEBU 406c Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:27.862 UTC [msp] DeserializeIdentity -> DEBU 406d Obtaining identity" +"2019-09-24 00:26:27.862 UTC [gossip.comm] Send -> DEBU 406e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:27.862 UTC [gossip.comm] sendToEndpoint -> DEBU 406f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4070 Exiting" +"2019-09-24 00:26:27.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4071 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4072 Exiting" +"2019-09-24 00:26:27.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4073 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4074 Exiting" +"2019-09-24 00:26:27.875 UTC [gossip.gossip] handleMessage -> DEBU 4075 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.875 UTC [gossip.gossip] handleMessage -> DEBU 4076 Exiting" +"2019-09-24 00:26:27.875 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4077 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.875 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4078 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:27.876 UTC [msp.identity] Verify -> DEBU 4079 Verify: digest = 00000000 6a 4b de e0 ca e7 dc 74 b6 0c df 9e f8 1c c7 73 |jK.....t.......s| +00000010 57 76 c5 eb 03 90 e9 72 48 b9 09 e4 fb d1 bc ee |Wv.....rH.......|" +"2019-09-24 00:26:27.876 UTC [msp.identity] Verify -> DEBU 407a Verify: sig = 00000000 30 45 02 21 00 be 2f 6f 02 c2 21 a2 36 39 64 c9 |0E.!../o..!.69d.| +00000010 96 8e 18 85 e6 fe ba d0 86 c5 1a ae 61 69 e0 62 |............ai.b| +00000020 54 be 38 84 84 02 20 21 91 f0 f5 0e 26 fe f1 41 |T.8... !....&..A| +00000030 31 61 78 e0 99 67 43 41 8f 43 33 fa 17 5b 04 6c |1ax..gCA.C3..[.l| +00000040 14 91 bd df 38 aa 84 |....8..|" +"2019-09-24 00:26:27.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 407b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:27.876 UTC [gossip.discovery] isSentByMe -> DEBU 407c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:27.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 407d Exiting" +"2019-09-24 00:26:27.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 407e Exiting" +"2019-09-24 00:26:27.876 UTC [gossip.comm] func1 -> DEBU 407f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.876 UTC [gossip.gossip] handleMessage -> DEBU 4080 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.876 UTC [gossip.gossip] handleMessage -> DEBU 4081 Exiting" +"2019-09-24 00:26:27.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4082 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.876 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4083 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:27.877 UTC [msp.identity] Verify -> DEBU 4084 Verify: digest = 00000000 6a 4b de e0 ca e7 dc 74 b6 0c df 9e f8 1c c7 73 |jK.....t.......s| +00000010 57 76 c5 eb 03 90 e9 72 48 b9 09 e4 fb d1 bc ee |Wv.....rH.......|" +"2019-09-24 00:26:27.877 UTC [msp.identity] Verify -> DEBU 4085 Verify: sig = 00000000 30 45 02 21 00 be 2f 6f 02 c2 21 a2 36 39 64 c9 |0E.!../o..!.69d.| +00000010 96 8e 18 85 e6 fe ba d0 86 c5 1a ae 61 69 e0 62 |............ai.b| +00000020 54 be 38 84 84 02 20 21 91 f0 f5 0e 26 fe f1 41 |T.8... !....&..A| +00000030 31 61 78 e0 99 67 43 41 8f 43 33 fa 17 5b 04 6c |1ax..gCA.C3..[.l| +00000040 14 91 bd df 38 aa 84 |....8..|" +"2019-09-24 00:26:27.879 UTC [msp.identity] Verify -> DEBU 4086 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:27.879 UTC [msp.identity] Verify -> DEBU 4087 Verify: sig = 00000000 30 45 02 21 00 84 ed 19 95 f2 90 12 0a 6d 30 df |0E.!.........m0.| +00000010 cb fb 2d 38 60 ae 42 df 8c f5 dd 90 13 f2 cb 44 |..-8`.B........D| +00000020 fc cb b5 57 a7 02 20 1b 60 f5 d9 50 06 3d 0b b4 |...W.. .`..P.=..| +00000030 4b f8 fa fe 7c 96 74 7b e3 3b d1 69 c1 45 ff 78 |K...|.t{.;.i.E.x| +00000040 00 bc 1b 92 67 b0 13 |....g..|" +"2019-09-24 00:26:27.880 UTC [gossip.discovery] handleAliveMessage -> DEBU 4088 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:27.880 UTC [gossip.discovery] isSentByMe -> DEBU 4089 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:27.880 UTC [gossip.discovery] handleAliveMessage -> DEBU 408a Exiting" +"2019-09-24 00:26:27.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 408b Exiting" +"2019-09-24 00:26:27.884 UTC [gossip.comm] func1 -> DEBU 408c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.884 UTC [gossip.gossip] handleMessage -> DEBU 408d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.884 UTC [gossip.gossip] handleMessage -> DEBU 408e Exiting" +"2019-09-24 00:26:27.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 408f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.885 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4090 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:27.885 UTC [msp.identity] Verify -> DEBU 4091 Verify: digest = 00000000 6a 4b de e0 ca e7 dc 74 b6 0c df 9e f8 1c c7 73 |jK.....t.......s| +00000010 57 76 c5 eb 03 90 e9 72 48 b9 09 e4 fb d1 bc ee |Wv.....rH.......|" +"2019-09-24 00:26:27.885 UTC [msp.identity] Verify -> DEBU 4092 Verify: sig = 00000000 30 45 02 21 00 be 2f 6f 02 c2 21 a2 36 39 64 c9 |0E.!../o..!.69d.| +00000010 96 8e 18 85 e6 fe ba d0 86 c5 1a ae 61 69 e0 62 |............ai.b| +00000020 54 be 38 84 84 02 20 21 91 f0 f5 0e 26 fe f1 41 |T.8... !....&..A| +00000030 31 61 78 e0 99 67 43 41 8f 43 33 fa 17 5b 04 6c |1ax..gCA.C3..[.l| +00000040 14 91 bd df 38 aa 84 |....8..|" +"2019-09-24 00:26:27.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 4093 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:27.894 UTC [gossip.discovery] isSentByMe -> DEBU 4094 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:27.894 UTC [gossip.discovery] handleAliveMessage -> DEBU 4095 Exiting" +"2019-09-24 00:26:27.894 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4096 Exiting" +"2019-09-24 00:26:27.943 UTC [gossip.gossip] handleMessage -> DEBU 4097 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.944 UTC [gossip.pull] HandleMessage -> DEBU 4098 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:27.944 UTC [msp] DeserializeIdentity -> DEBU 4099 Obtaining identity" +"2019-09-24 00:26:27.944 UTC [msp] DeserializeIdentity -> DEBU 409a Obtaining identity" +"2019-09-24 00:26:27.945 UTC [msp] DeserializeIdentity -> DEBU 409b Obtaining identity" +"2019-09-24 00:26:27.945 UTC [msp] DeserializeIdentity -> DEBU 409c Obtaining identity" +"2019-09-24 00:26:27.945 UTC [msp] DeserializeIdentity -> DEBU 409d Obtaining identity" +"2019-09-24 00:26:27.945 UTC [msp] DeserializeIdentity -> DEBU 409e Obtaining identity" +"2019-09-24 00:26:27.945 UTC [gossip.pull] SendDigest -> DEBU 409f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:27.948 UTC [gossip.gossip] handleMessage -> DEBU 40a0 Exiting" +"2019-09-24 00:26:28.039 UTC [gossip.gossip] handleMessage -> DEBU 40a1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.039 UTC [gossip.gossip] handleMessage -> DEBU 40a2 Exiting" +"2019-09-24 00:26:28.039 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40a3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.039 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 40a4 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:28.039 UTC [msp] DeserializeIdentity -> DEBU 40a5 Obtaining identity" +"2019-09-24 00:26:28.040 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:28.040 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40a7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.040 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40a8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:28.040 UTC [cauthdsl] func1 -> DEBU 40ac 0xc002745180 gate 1569284788040434000 evaluation starts" +"2019-09-24 00:26:28.040 UTC [cauthdsl] func2 -> DEBU 40ad 0xc002745180 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.040 UTC [cauthdsl] func2 -> DEBU 40ae 0xc002745180 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.040 UTC [cauthdsl] func2 -> DEBU 40af 0xc002745180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:28.040 UTC [cauthdsl] func2 -> DEBU 40b0 0xc002745180 principal evaluation fails" +"2019-09-24 00:26:28.040 UTC [cauthdsl] func1 -> DEBU 40b1 0xc002745180 gate 1569284788040434000 evaluation fails" +"2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.040 UTC [policies] Evaluate -> DEBU 40b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:28.041 UTC [cauthdsl] func1 -> DEBU 40b5 0xc0027459c0 gate 1569284788040987100 evaluation starts" +"2019-09-24 00:26:28.041 UTC [cauthdsl] func2 -> DEBU 40b6 0xc0027459c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.041 UTC [cauthdsl] func2 -> DEBU 40b7 0xc0027459c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.041 UTC [cauthdsl] func2 -> DEBU 40b8 0xc0027459c0 principal matched by identity 0" +"2019-09-24 00:26:28.041 UTC [msp.identity] Verify -> DEBU 40b9 Verify: digest = 00000000 0b f4 1b 0b 44 49 6a 68 75 6f b8 cc ad 0b 32 ef |....DIjhuo....2.| +00000010 86 61 23 cc 7f ea d1 b2 00 ed 79 ac dd 40 86 04 |.a#.......y..@..|" +"2019-09-24 00:26:28.041 UTC [msp.identity] Verify -> DEBU 40ba Verify: sig = 00000000 30 44 02 20 52 00 af b5 58 bc 20 e0 3f c3 c9 98 |0D. R...X. .?...| +00000010 07 0f b1 27 9c 90 35 68 55 9c 64 64 ad 23 57 a0 |...'..5hU.dd.#W.| +00000020 2d 4c 4a c9 02 20 4b b0 56 1f 18 e6 71 ca b2 37 |-LJ.. K.V...q..7| +00000030 03 4a ef 50 9d 21 0a 76 fb 80 6f ab c1 48 a9 71 |.J.P.!.v..o..H.q| +00000040 c5 95 34 6e 4c 79 |..4nLy|" +"2019-09-24 00:26:28.041 UTC [cauthdsl] func2 -> DEBU 40bb 0xc0027459c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:28.041 UTC [cauthdsl] func1 -> DEBU 40bc 0xc0027459c0 gate 1569284788040987100 evaluation succeeds" +"2019-09-24 00:26:28.041 UTC [policies] Evaluate -> DEBU 40bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.063 UTC [policies] Evaluate -> DEBU 40be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.063 UTC [policies] Evaluate -> DEBU 40bf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:28.063 UTC [policies] Evaluate -> DEBU 40c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:28.063 UTC [gossip.discovery] handleAliveMessage -> DEBU 40c1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:28.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 40c2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:28.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 40c3 updating membership: timestamp: " +"2019-09-24 00:26:28.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 40c4 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:28.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 40c5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:28.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 40c6 Exiting" +"2019-09-24 00:26:28.064 UTC [gossip.discovery] handleAliveMessage -> DEBU 40c7 Exiting" +"2019-09-24 00:26:28.065 UTC [gossip.discovery] sendMemResponse -> DEBU 40c8 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:28.065 UTC [msp] DeserializeIdentity -> DEBU 40c9 Obtaining identity" +"2019-09-24 00:26:28.065 UTC [msp] DeserializeIdentity -> DEBU 40ca Obtaining identity" +"2019-09-24 00:26:28.065 UTC [msp] DeserializeIdentity -> DEBU 40cb Obtaining identity" +"2019-09-24 00:26:28.065 UTC [gossip.comm] Send -> DEBU 40cc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:28.065 UTC [gossip.discovery] sendMemResponse -> DEBU 40cd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020>" signature:"0D\002 4\177P4\243\330u\306\343\330\206n\265\343\246\214\216(?\023j\010\260}\206e{\376\327\335dX\002 ?\266\310\343|\353\351r\267\205\2758\207H1\221Pk\245A\033aE\322]\310\220\265\242k\341\340" > alive: alive: alive: " +"2019-09-24 00:26:28.065 UTC [gossip.comm] sendToEndpoint -> DEBU 40ce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.065 UTC [gossip.comm] sendToEndpoint -> DEBU 40cf Exiting" +"2019-09-24 00:26:28.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40d0 Exiting" +"2019-09-24 00:26:28.115 UTC [msp] DeserializeIdentity -> DEBU 40d1 Obtaining identity" +"2019-09-24 00:26:28.116 UTC [msp] DeserializeIdentity -> DEBU 40d2 Obtaining identity" +"2019-09-24 00:26:28.116 UTC [gossip.comm] Send -> DEBU 40d3 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:28.116 UTC [gossip.comm] sendToEndpoint -> DEBU 40d4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.116 UTC [gossip.comm] sendToEndpoint -> DEBU 40d5 Exiting" +"2019-09-24 00:26:28.116 UTC [gossip.comm] sendToEndpoint -> DEBU 40d6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.116 UTC [gossip.comm] sendToEndpoint -> DEBU 40d7 Exiting" +"2019-09-24 00:26:28.117 UTC [gossip.comm] sendToEndpoint -> DEBU 40d8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.117 UTC [gossip.comm] sendToEndpoint -> DEBU 40d9 Exiting" +"2019-09-24 00:26:28.127 UTC [gossip.comm] func1 -> DEBU 40da Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.127 UTC [gossip.gossip] handleMessage -> DEBU 40db Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.128 UTC [msp] DeserializeIdentity -> DEBU 40dc Obtaining identity" +"2019-09-24 00:26:28.128 UTC [msp] DeserializeIdentity -> DEBU 40dd Obtaining identity" +"2019-09-24 00:26:28.128 UTC [msp] DeserializeIdentity -> DEBU 40de Obtaining identity" +"2019-09-24 00:26:28.128 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:28.128 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40e0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.128 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40e1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.128 UTC [policies] Evaluate -> DEBU 40e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:28.129 UTC [policies] Evaluate -> DEBU 40e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:28.129 UTC [policies] Evaluate -> DEBU 40e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:28.129 UTC [cauthdsl] func1 -> DEBU 40e6 0xc004b90f50 gate 1569284788129236400 evaluation starts" +"2019-09-24 00:26:28.129 UTC [cauthdsl] func2 -> DEBU 40e7 0xc004b90f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.129 UTC [cauthdsl] func2 -> DEBU 40e8 0xc004b90f50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.129 UTC [cauthdsl] func2 -> DEBU 40e9 0xc004b90f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:28.129 UTC [cauthdsl] func2 -> DEBU 40ea 0xc004b90f50 principal evaluation fails" +"2019-09-24 00:26:28.129 UTC [cauthdsl] func1 -> DEBU 40eb 0xc004b90f50 gate 1569284788129236400 evaluation fails" +"2019-09-24 00:26:28.129 UTC [policies] Evaluate -> DEBU 40ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.129 UTC [policies] Evaluate -> DEBU 40ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.129 UTC [policies] Evaluate -> DEBU 40ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:28.129 UTC [cauthdsl] func1 -> DEBU 40ef 0xc004b91790 gate 1569284788129771600 evaluation starts" +"2019-09-24 00:26:28.129 UTC [cauthdsl] func2 -> DEBU 40f0 0xc004b91790 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.129 UTC [gossip.comm] func1 -> DEBU 40e5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.130 UTC [cauthdsl] func2 -> DEBU 40f1 0xc004b91790 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.130 UTC [cauthdsl] func2 -> DEBU 40f2 0xc004b91790 principal matched by identity 0" +"2019-09-24 00:26:28.130 UTC [msp.identity] Verify -> DEBU 40f3 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:28.130 UTC [msp.identity] Verify -> DEBU 40f4 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:28.130 UTC [cauthdsl] func2 -> DEBU 40f5 0xc004b91790 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:28.131 UTC [cauthdsl] func1 -> DEBU 40f6 0xc004b91790 gate 1569284788129771600 evaluation succeeds" +"2019-09-24 00:26:28.131 UTC [policies] Evaluate -> DEBU 40f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.131 UTC [policies] Evaluate -> DEBU 40f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.131 UTC [policies] Evaluate -> DEBU 40f9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:28.131 UTC [policies] Evaluate -> DEBU 40fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:28.131 UTC [msp.identity] Verify -> DEBU 40fb Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:28.132 UTC [msp.identity] Verify -> DEBU 40fc Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:28.136 UTC [msp] DeserializeIdentity -> DEBU 40fd Obtaining identity" +"2019-09-24 00:26:28.136 UTC [msp] DeserializeIdentity -> DEBU 40fe Obtaining identity" +"2019-09-24 00:26:28.137 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40ff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:28.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4100 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4101 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.137 UTC [policies] Evaluate -> DEBU 4102 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:28.137 UTC [policies] Evaluate -> DEBU 4103 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:28.137 UTC [policies] Evaluate -> DEBU 4104 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:28.146 UTC [cauthdsl] func1 -> DEBU 4105 0xc004e15680 gate 1569284788145847400 evaluation starts" +"2019-09-24 00:26:28.148 UTC [cauthdsl] func2 -> DEBU 4106 0xc004e15680 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.149 UTC [cauthdsl] func2 -> DEBU 4107 0xc004e15680 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.149 UTC [cauthdsl] func2 -> DEBU 4108 0xc004e15680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:28.149 UTC [cauthdsl] func2 -> DEBU 4109 0xc004e15680 principal evaluation fails" +"2019-09-24 00:26:28.149 UTC [cauthdsl] func1 -> DEBU 410a 0xc004e15680 gate 1569284788145847400 evaluation fails" +"2019-09-24 00:26:28.149 UTC [policies] Evaluate -> DEBU 410b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.149 UTC [policies] Evaluate -> DEBU 410c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.150 UTC [policies] Evaluate -> DEBU 410d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:28.150 UTC [cauthdsl] func1 -> DEBU 410e 0xc004e15ec0 gate 1569284788150094500 evaluation starts" +"2019-09-24 00:26:28.150 UTC [cauthdsl] func2 -> DEBU 410f 0xc004e15ec0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.150 UTC [cauthdsl] func2 -> DEBU 4110 0xc004e15ec0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.151 UTC [cauthdsl] func2 -> DEBU 4111 0xc004e15ec0 principal matched by identity 0" +"2019-09-24 00:26:28.159 UTC [msp.identity] Verify -> DEBU 4112 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:28.159 UTC [msp.identity] Verify -> DEBU 4113 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:28.159 UTC [cauthdsl] func2 -> DEBU 4114 0xc004e15ec0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:28.162 UTC [cauthdsl] func1 -> DEBU 4115 0xc004e15ec0 gate 1569284788150094500 evaluation succeeds" +"2019-09-24 00:26:28.162 UTC [policies] Evaluate -> DEBU 4116 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.162 UTC [policies] Evaluate -> DEBU 4117 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.163 UTC [policies] Evaluate -> DEBU 4118 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:28.163 UTC [policies] Evaluate -> DEBU 4119 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:28.164 UTC [msp.identity] Verify -> DEBU 411a Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:28.169 UTC [msp.identity] Verify -> DEBU 411b Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:28.170 UTC [gossip.gossip] handleMessage -> DEBU 411c Exiting" +"2019-09-24 00:26:28.170 UTC [gossip.gossip] handleMessage -> DEBU 411d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.170 UTC [msp] DeserializeIdentity -> DEBU 411e Obtaining identity" +"2019-09-24 00:26:28.171 UTC [msp] DeserializeIdentity -> DEBU 411f Obtaining identity" +"2019-09-24 00:26:28.176 UTC [msp] DeserializeIdentity -> DEBU 4120 Obtaining identity" +"2019-09-24 00:26:28.177 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4121 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:28.177 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4122 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.177 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4123 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.177 UTC [policies] Evaluate -> DEBU 4124 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:28.189 UTC [policies] Evaluate -> DEBU 4125 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:28.189 UTC [policies] Evaluate -> DEBU 4126 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:28.189 UTC [cauthdsl] func1 -> DEBU 4127 0xc002aca0f0 gate 1569284788189851700 evaluation starts" +"2019-09-24 00:26:28.201 UTC [cauthdsl] func2 -> DEBU 4128 0xc002aca0f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.201 UTC [cauthdsl] func2 -> DEBU 4129 0xc002aca0f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.201 UTC [cauthdsl] func2 -> DEBU 412a 0xc002aca0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:28.201 UTC [cauthdsl] func2 -> DEBU 412b 0xc002aca0f0 principal evaluation fails" +"2019-09-24 00:26:28.201 UTC [cauthdsl] func1 -> DEBU 412c 0xc002aca0f0 gate 1569284788189851700 evaluation fails" +"2019-09-24 00:26:28.201 UTC [policies] Evaluate -> DEBU 412d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.201 UTC [policies] Evaluate -> DEBU 412e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.201 UTC [policies] Evaluate -> DEBU 412f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:28.202 UTC [cauthdsl] func1 -> DEBU 4130 0xc002aca930 gate 1569284788202006600 evaluation starts" +"2019-09-24 00:26:28.202 UTC [cauthdsl] func2 -> DEBU 4131 0xc002aca930 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.202 UTC [cauthdsl] func2 -> DEBU 4132 0xc002aca930 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.202 UTC [cauthdsl] func2 -> DEBU 4133 0xc002aca930 principal matched by identity 0" +"2019-09-24 00:26:28.202 UTC [msp.identity] Verify -> DEBU 4134 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:28.202 UTC [msp.identity] Verify -> DEBU 4135 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:28.202 UTC [cauthdsl] func2 -> DEBU 4136 0xc002aca930 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:28.202 UTC [cauthdsl] func1 -> DEBU 4137 0xc002aca930 gate 1569284788202006600 evaluation succeeds" +"2019-09-24 00:26:28.202 UTC [policies] Evaluate -> DEBU 4138 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.202 UTC [policies] Evaluate -> DEBU 4139 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.202 UTC [policies] Evaluate -> DEBU 413a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:28.202 UTC [policies] Evaluate -> DEBU 413b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:28.202 UTC [msp.identity] Verify -> DEBU 413c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:28.202 UTC [msp.identity] Verify -> DEBU 413d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:28.203 UTC [msp.identity] Verify -> DEBU 413e Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:28.203 UTC [msp.identity] Verify -> DEBU 413f Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:28.203 UTC [msp] DeserializeIdentity -> DEBU 4140 Obtaining identity" +"2019-09-24 00:26:28.203 UTC [msp] DeserializeIdentity -> DEBU 4141 Obtaining identity" +"2019-09-24 00:26:28.203 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4142 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:28.203 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4143 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.203 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4144 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.203 UTC [policies] Evaluate -> DEBU 4145 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:28.203 UTC [policies] Evaluate -> DEBU 4146 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:28.203 UTC [policies] Evaluate -> DEBU 4147 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:28.203 UTC [cauthdsl] func1 -> DEBU 4148 0xc002ae0f40 gate 1569284788203985000 evaluation starts" +"2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 4149 0xc002ae0f40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 414a 0xc002ae0f40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 414b 0xc002ae0f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 414c 0xc002ae0f40 principal evaluation fails" +"2019-09-24 00:26:28.204 UTC [cauthdsl] func1 -> DEBU 414d 0xc002ae0f40 gate 1569284788203985000 evaluation fails" +"2019-09-24 00:26:28.204 UTC [policies] Evaluate -> DEBU 414e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.204 UTC [policies] Evaluate -> DEBU 414f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.204 UTC [policies] Evaluate -> DEBU 4150 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:28.204 UTC [cauthdsl] func1 -> DEBU 4151 0xc002ae1780 gate 1569284788204466500 evaluation starts" +"2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 4152 0xc002ae1780 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 4153 0xc002ae1780 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.204 UTC [cauthdsl] func2 -> DEBU 4154 0xc002ae1780 principal matched by identity 0" +"2019-09-24 00:26:28.204 UTC [msp.identity] Verify -> DEBU 4155 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:28.204 UTC [msp.identity] Verify -> DEBU 4156 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:28.205 UTC [cauthdsl] func2 -> DEBU 4157 0xc002ae1780 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:28.205 UTC [cauthdsl] func1 -> DEBU 4158 0xc002ae1780 gate 1569284788204466500 evaluation succeeds" +"2019-09-24 00:26:28.205 UTC [policies] Evaluate -> DEBU 4159 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.205 UTC [policies] Evaluate -> DEBU 415a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.205 UTC [policies] Evaluate -> DEBU 415b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:28.205 UTC [policies] Evaluate -> DEBU 415c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:28.205 UTC [gossip.gossip] handleMessage -> DEBU 415d Exiting" +"2019-09-24 00:26:28.205 UTC [gossip.gossip] handleMessage -> DEBU 415e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.205 UTC [msp.identity] Verify -> DEBU 415f Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:28.205 UTC [msp.identity] Verify -> DEBU 4160 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:28.205 UTC [msp.identity] Verify -> DEBU 4161 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:28.205 UTC [msp.identity] Verify -> DEBU 4162 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:28.206 UTC [msp] DeserializeIdentity -> DEBU 4163 Obtaining identity" +"2019-09-24 00:26:28.206 UTC [msp] DeserializeIdentity -> DEBU 4164 Obtaining identity" +"2019-09-24 00:26:28.206 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4165 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:28.206 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4166 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.206 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4167 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.206 UTC [policies] Evaluate -> DEBU 4168 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:28.206 UTC [policies] Evaluate -> DEBU 4169 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:28.206 UTC [policies] Evaluate -> DEBU 416a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:28.206 UTC [cauthdsl] func1 -> DEBU 416b 0xc0034cbfd0 gate 1569284788206814600 evaluation starts" +"2019-09-24 00:26:28.206 UTC [cauthdsl] func2 -> DEBU 416c 0xc0034cbfd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.206 UTC [cauthdsl] func2 -> DEBU 416d 0xc0034cbfd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 416e 0xc0034cbfd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 416f 0xc0034cbfd0 principal evaluation fails" +"2019-09-24 00:26:28.207 UTC [cauthdsl] func1 -> DEBU 4170 0xc0034cbfd0 gate 1569284788206814600 evaluation fails" +"2019-09-24 00:26:28.207 UTC [policies] Evaluate -> DEBU 4171 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.207 UTC [policies] Evaluate -> DEBU 4172 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.207 UTC [policies] Evaluate -> DEBU 4173 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:28.207 UTC [cauthdsl] func1 -> DEBU 4174 0xc00373e810 gate 1569284788207248000 evaluation starts" +"2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 4175 0xc00373e810 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 4176 0xc00373e810 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 4177 0xc00373e810 principal matched by identity 0" +"2019-09-24 00:26:28.207 UTC [msp.identity] Verify -> DEBU 4178 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:28.207 UTC [msp.identity] Verify -> DEBU 4179 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:28.207 UTC [cauthdsl] func2 -> DEBU 417a 0xc00373e810 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:28.216 UTC [cauthdsl] func1 -> DEBU 417b 0xc00373e810 gate 1569284788207248000 evaluation succeeds" +"2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 417c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 417d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 417e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 417f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:28.216 UTC [msp] DeserializeIdentity -> DEBU 4180 Obtaining identity" +"2019-09-24 00:26:28.216 UTC [msp] DeserializeIdentity -> DEBU 4181 Obtaining identity" +"2019-09-24 00:26:28.216 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4182 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:28.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4183 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.216 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4184 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 4185 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 4186 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:28.216 UTC [policies] Evaluate -> DEBU 4187 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:28.217 UTC [cauthdsl] func1 -> DEBU 4188 0xc00373ffe0 gate 1569284788217011200 evaluation starts" +"2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 4189 0xc00373ffe0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 418a 0xc00373ffe0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 418b 0xc00373ffe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 418c 0xc00373ffe0 principal evaluation fails" +"2019-09-24 00:26:28.217 UTC [cauthdsl] func1 -> DEBU 418d 0xc00373ffe0 gate 1569284788217011200 evaluation fails" +"2019-09-24 00:26:28.217 UTC [policies] Evaluate -> DEBU 418e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.217 UTC [policies] Evaluate -> DEBU 418f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.217 UTC [policies] Evaluate -> DEBU 4190 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:28.217 UTC [cauthdsl] func1 -> DEBU 4191 0xc003bda820 gate 1569284788217405000 evaluation starts" +"2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 4192 0xc003bda820 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 4193 0xc003bda820 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.217 UTC [cauthdsl] func2 -> DEBU 4194 0xc003bda820 principal matched by identity 0" +"2019-09-24 00:26:28.217 UTC [msp.identity] Verify -> DEBU 4195 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:28.217 UTC [msp.identity] Verify -> DEBU 4196 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:28.218 UTC [cauthdsl] func2 -> DEBU 4197 0xc003bda820 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:28.218 UTC [cauthdsl] func1 -> DEBU 4198 0xc003bda820 gate 1569284788217405000 evaluation succeeds" +"2019-09-24 00:26:28.218 UTC [policies] Evaluate -> DEBU 4199 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.218 UTC [policies] Evaluate -> DEBU 419a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.218 UTC [policies] Evaluate -> DEBU 419b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:28.218 UTC [policies] Evaluate -> DEBU 419c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:28.218 UTC [gossip.gossip] handleMessage -> DEBU 419d Exiting" +"2019-09-24 00:26:28.296 UTC [msp] DeserializeIdentity -> DEBU 419e Obtaining identity" +"2019-09-24 00:26:28.297 UTC [msp] DeserializeIdentity -> DEBU 419f Obtaining identity" +"2019-09-24 00:26:28.297 UTC [gossip.pull] Hello -> DEBU 41a0 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:28.297 UTC [msp] DeserializeIdentity -> DEBU 41a1 Obtaining identity" +"2019-09-24 00:26:28.297 UTC [msp] DeserializeIdentity -> DEBU 41a2 Obtaining identity" +"2019-09-24 00:26:28.297 UTC [gossip.comm] Send -> DEBU 41a3 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:28.298 UTC [gossip.comm] sendToEndpoint -> DEBU 41a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.298 UTC [gossip.comm] sendToEndpoint -> DEBU 41a5 Exiting" +"2019-09-24 00:26:28.299 UTC [gossip.comm] func1 -> DEBU 41a6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.299 UTC [gossip.gossip] handleMessage -> DEBU 41a7 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.299 UTC [gossip.pull] HandleMessage -> DEBU 41a8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.299 UTC [gossip.gossip] handleMessage -> DEBU 41a9 Exiting" +"2019-09-24 00:26:28.614 UTC [gossip.comm] func1 -> DEBU 41aa Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.614 UTC [gossip.gossip] handleMessage -> DEBU 41ab Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.614 UTC [msp] DeserializeIdentity -> DEBU 41ac Obtaining identity" +"2019-09-24 00:26:28.614 UTC [msp] DeserializeIdentity -> DEBU 41ad Obtaining identity" +"2019-09-24 00:26:28.614 UTC [gossip.gossip] handleMessage -> DEBU 41ae Exiting" +"2019-09-24 00:26:28.772 UTC [gossip.comm] func1 -> DEBU 41af Got message: GossipMessage: tag:EMPTY mem_req:\025\353\306E.\245 S\2669\005\002 \004p\201\357K=\205\004\204JTp\235\247m'ss\335q\271\201\000\216op\353\226\003\212\021\210" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.773 UTC [gossip.gossip] handleMessage -> DEBU 41b0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\025\353\306E.\245 S\2669\005\002 \004p\201\357K=\205\004\204JTp\235\247m'ss\335q\271\201\000\216op\353\226\003\212\021\210" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.780 UTC [gossip.gossip] handleMessage -> DEBU 41b1 Exiting" +"2019-09-24 00:26:28.780 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41b2 Got message: GossipMessage: tag:EMPTY mem_req:\025\353\306E.\245 S\2669\005\002 \004p\201\357K=\205\004\204JTp\235\247m'ss\335q\271\201\000\216op\353\226\003\212\021\210" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.780 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41b3 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:28.780 UTC [msp] DeserializeIdentity -> DEBU 41b4 Obtaining identity" +"2019-09-24 00:26:28.781 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:28.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41b6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41b7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:28.781 UTC [cauthdsl] func1 -> DEBU 41bb 0xc003316e40 gate 1569284788781345700 evaluation starts" +"2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41bc 0xc003316e40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41bd 0xc003316e40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41be 0xc003316e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41bf 0xc003316e40 principal evaluation fails" +"2019-09-24 00:26:28.781 UTC [cauthdsl] func1 -> DEBU 41c0 0xc003316e40 gate 1569284788781345700 evaluation fails" +"2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:28.781 UTC [policies] Evaluate -> DEBU 41c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:28.781 UTC [cauthdsl] func1 -> DEBU 41c4 0xc003317680 gate 1569284788781752100 evaluation starts" +"2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41c5 0xc003317680 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41c6 0xc003317680 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:28.781 UTC [cauthdsl] func2 -> DEBU 41c7 0xc003317680 principal matched by identity 0" +"2019-09-24 00:26:28.781 UTC [msp.identity] Verify -> DEBU 41c8 Verify: digest = 00000000 ab 4b 3d 37 d3 49 1c 61 af a4 87 35 a4 0b 15 53 |.K=7.I.a...5...S| +00000010 b6 d8 35 49 ba fb 5e fe c3 a8 69 91 9a 2c 33 d2 |..5I..^...i..,3.|" +"2019-09-24 00:26:28.781 UTC [msp.identity] Verify -> DEBU 41c9 Verify: sig = 00000000 30 44 02 20 7e ad a8 53 69 ac b9 9c 6a ed fd 42 |0D. ~..Si...j..B| +00000010 21 79 ea e7 e1 50 85 33 3e 15 eb c6 45 2e a5 20 |!y...P.3>...E.. | +00000020 53 b6 39 05 02 20 04 70 81 ef 4b 3d 85 04 84 4a |S.9.. .p..K=...J| +00000030 54 70 9d a7 6d 27 73 73 dd 71 b9 81 00 8e 6f 70 |Tp..m'ss.q....op| +00000040 eb 96 03 8a 11 88 |......|" +"2019-09-24 00:26:28.782 UTC [cauthdsl] func2 -> DEBU 41ca 0xc003317680 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:28.782 UTC [cauthdsl] func1 -> DEBU 41cb 0xc003317680 gate 1569284788781752100 evaluation succeeds" +"2019-09-24 00:26:28.782 UTC [policies] Evaluate -> DEBU 41cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.787 UTC [policies] Evaluate -> DEBU 41cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:28.788 UTC [policies] Evaluate -> DEBU 41ce Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:28.788 UTC [policies] Evaluate -> DEBU 41cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:28.788 UTC [gossip.discovery] handleAliveMessage -> DEBU 41d0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:28.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 41d1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:28.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 41d2 updating membership: timestamp: " +"2019-09-24 00:26:28.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 41d3 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:28.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 41d4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:28.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 41d5 Exiting" +"2019-09-24 00:26:28.788 UTC [gossip.discovery] handleAliveMessage -> DEBU 41d6 Exiting" +"2019-09-24 00:26:28.788 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41d7 Exiting" +"2019-09-24 00:26:28.788 UTC [gossip.discovery] sendMemResponse -> DEBU 41d8 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:28.788 UTC [msp] DeserializeIdentity -> DEBU 41d9 Obtaining identity" +"2019-09-24 00:26:28.788 UTC [msp] DeserializeIdentity -> DEBU 41da Obtaining identity" +"2019-09-24 00:26:28.788 UTC [msp] DeserializeIdentity -> DEBU 41db Obtaining identity" +"2019-09-24 00:26:28.789 UTC [gossip.comm] Send -> DEBU 41dc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:28.789 UTC [gossip.discovery] sendMemResponse -> DEBU 41dd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020>" signature:"0D\002 4\177P4\243\330u\306\343\330\206n\265\343\246\214\216(?\023j\010\260}\206e{\376\327\335dX\002 ?\266\310\343|\353\351r\267\205\2758\207H1\221Pk\245A\033aE\322]\310\220\265\242k\341\340" > alive:\025\353\306E.\245 S\2669\005\002 \004p\201\357K=\205\004\204JTp\235\247m'ss\335q\271\201\000\216op\353\226\003\212\021\210" > alive: alive: " +"2019-09-24 00:26:28.789 UTC [gossip.comm] sendToEndpoint -> DEBU 41de Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.789 UTC [gossip.comm] sendToEndpoint -> DEBU 41df Exiting" +"2019-09-24 00:26:28.819 UTC [gossip.comm] func1 -> DEBU 41e0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.819 UTC [gossip.gossip] handleMessage -> DEBU 41e1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.819 UTC [gossip.pull] HandleMessage -> DEBU 41e2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.819 UTC [msp] DeserializeIdentity -> DEBU 41e3 Obtaining identity" +"2019-09-24 00:26:28.819 UTC [msp] DeserializeIdentity -> DEBU 41e4 Obtaining identity" +"2019-09-24 00:26:28.819 UTC [msp] DeserializeIdentity -> DEBU 41e5 Obtaining identity" +"2019-09-24 00:26:28.819 UTC [msp] DeserializeIdentity -> DEBU 41e6 Obtaining identity" +"2019-09-24 00:26:28.820 UTC [msp] DeserializeIdentity -> DEBU 41e7 Obtaining identity" +"2019-09-24 00:26:28.820 UTC [msp] DeserializeIdentity -> DEBU 41e8 Obtaining identity" +"2019-09-24 00:26:28.820 UTC [gossip.pull] SendDigest -> DEBU 41e9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:28.820 UTC [gossip.gossip] handleMessage -> DEBU 41ea Exiting" +"2019-09-24 00:26:28.845 UTC [gossip.comm] func1 -> DEBU 41eb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.845 UTC [gossip.gossip] handleMessage -> DEBU 41ec Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.845 UTC [gossip.pull] HandleMessage -> DEBU 41ed GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:28.845 UTC [gossip.pull] SendDigest -> DEBU 41ee Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:28.845 UTC [gossip.gossip] handleMessage -> DEBU 41ef Exiting" +"2019-09-24 00:26:29.120 UTC [gossip.gossip] handleMessage -> DEBU 41f0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:29.120 UTC [msp] DeserializeIdentity -> DEBU 41f1 Obtaining identity" +"2019-09-24 00:26:29.120 UTC [msp] DeserializeIdentity -> DEBU 41f2 Obtaining identity" +"2019-09-24 00:26:29.120 UTC [msp] DeserializeIdentity -> DEBU 41f3 Obtaining identity" +"2019-09-24 00:26:29.120 UTC [gossip.gossip] handleMessage -> DEBU 41f4 Exiting" +"2019-09-24 00:26:29.605 UTC [msp] GetDefaultSigningIdentity -> DEBU 41f5 Obtaining default signing identity" +"2019-09-24 00:26:29.605 UTC [msp.identity] Sign -> DEBU 41f6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103B " +"2019-09-24 00:26:29.606 UTC [msp.identity] Sign -> DEBU 41f7 Sign: digest: 742258FFC0F685D84ECC59928F46FC0E95D8A0D6887CF83C52514925FFEFA29A " +"2019-09-24 00:26:29.606 UTC [msp] GetDefaultSigningIdentity -> DEBU 41f8 Obtaining default signing identity" +"2019-09-24 00:26:29.606 UTC [msp.identity] Sign -> DEBU 41f9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:29.606 UTC [msp.identity] Sign -> DEBU 41fa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:29.607 UTC [gossip.discovery] periodicalSendAlive -> DEBU 41fb Sleeping 5s" +"2019-09-24 00:26:29.611 UTC [msp] DeserializeIdentity -> DEBU 41fc Obtaining identity" +"2019-09-24 00:26:29.611 UTC [msp] DeserializeIdentity -> DEBU 41fd Obtaining identity" +"2019-09-24 00:26:29.611 UTC [msp] DeserializeIdentity -> DEBU 41fe Obtaining identity" +"2019-09-24 00:26:29.614 UTC [gossip.comm] Send -> DEBU 41ff Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:29.614 UTC [msp] DeserializeIdentity -> DEBU 4200 Obtaining identity" +"2019-09-24 00:26:29.614 UTC [gossip.comm] Send -> DEBU 4201 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:29.614 UTC [gossip.comm] Send -> DEBU 4202 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:29.614 UTC [gossip.comm] sendToEndpoint -> DEBU 4203 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.614 UTC [gossip.comm] sendToEndpoint -> DEBU 4204 Exiting" +"2019-09-24 00:26:29.615 UTC [gossip.comm] sendToEndpoint -> DEBU 4205 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.615 UTC [gossip.comm] sendToEndpoint -> DEBU 4206 Exiting" +"2019-09-24 00:26:29.615 UTC [gossip.comm] sendToEndpoint -> DEBU 4207 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.615 UTC [gossip.comm] sendToEndpoint -> DEBU 4208 Exiting" +"2019-09-24 00:26:29.630 UTC [gossip.comm] func1 -> DEBU 4209 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.630 UTC [gossip.gossip] handleMessage -> DEBU 420a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.630 UTC [gossip.gossip] handleMessage -> DEBU 420b Exiting" +"2019-09-24 00:26:29.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 420c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.630 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 420d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:29.630 UTC [msp.identity] Verify -> DEBU 420e Verify: digest = 00000000 74 22 58 ff c0 f6 85 d8 4e cc 59 92 8f 46 fc 0e |t"X.....N.Y..F..| +00000010 95 d8 a0 d6 88 7c f8 3c 52 51 49 25 ff ef a2 9a |.....|. DEBU 420f Verify: sig = 00000000 30 45 02 21 00 e5 d5 46 15 1f 94 c1 a8 bd b6 b1 |0E.!...F........| +00000010 c4 a2 80 9a 9f a9 98 f2 8b 73 58 b8 33 f1 e4 1d |.........sX.3...| +00000020 e0 8b d3 27 03 02 20 53 04 77 88 f3 54 2c 92 a9 |...'.. S.w..T,..| +00000030 75 60 68 62 66 25 c7 db 60 67 8f 45 60 30 ca 95 |u`hbf%..`g.E`0..| +00000040 4a 29 8c 8a 95 1e 13 |J).....|" +"2019-09-24 00:26:29.631 UTC [gossip.discovery] isSentByMe -> DEBU 4210 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.631 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4211 Exiting" +"2019-09-24 00:26:29.635 UTC [gossip.gossip] handleMessage -> DEBU 4212 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.635 UTC [gossip.gossip] handleMessage -> DEBU 4213 Exiting" +"2019-09-24 00:26:29.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4214 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4215 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:29.635 UTC [msp.identity] Verify -> DEBU 4216 Verify: digest = 00000000 74 22 58 ff c0 f6 85 d8 4e cc 59 92 8f 46 fc 0e |t"X.....N.Y..F..| +00000010 95 d8 a0 d6 88 7c f8 3c 52 51 49 25 ff ef a2 9a |.....|. DEBU 4217 Verify: sig = 00000000 30 45 02 21 00 e5 d5 46 15 1f 94 c1 a8 bd b6 b1 |0E.!...F........| +00000010 c4 a2 80 9a 9f a9 98 f2 8b 73 58 b8 33 f1 e4 1d |.........sX.3...| +00000020 e0 8b d3 27 03 02 20 53 04 77 88 f3 54 2c 92 a9 |...'.. S.w..T,..| +00000030 75 60 68 62 66 25 c7 db 60 67 8f 45 60 30 ca 95 |u`hbf%..`g.E`0..| +00000040 4a 29 8c 8a 95 1e 13 |J).....|" +"2019-09-24 00:26:29.635 UTC [gossip.discovery] isSentByMe -> DEBU 4218 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4219 Exiting" +"2019-09-24 00:26:29.672 UTC [gossip.comm] func1 -> DEBU 421a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:29.672 UTC [gossip.gossip] handleMessage -> DEBU 421b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:29.672 UTC [gossip.pull] HandleMessage -> DEBU 421c GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:29.672 UTC [gossip.pull] SendDigest -> DEBU 421d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:29.672 UTC [gossip.gossip] handleMessage -> DEBU 421e Exiting" +"2019-09-24 00:26:29.788 UTC [gossip.comm] func1 -> DEBU 421f Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020?" signature:"0D\002 I\220\267\tH\256k\217\334\246}I)\353\3477\257\267\005\363G\251V\ngm\2579\351J\237\301\002 D\016\r\375@\310\241\325\241\305\307\362\025\220\375\272M\263\262KZ#T\330\374U5\245A#S2" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:29.788 UTC [gossip.gossip] handleMessage -> DEBU 4220 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020?" signature:"0D\002 I\220\267\tH\256k\217\334\246}I)\353\3477\257\267\005\363G\251V\ngm\2579\351J\237\301\002 D\016\r\375@\310\241\325\241\305\307\362\025\220\375\272M\263\262KZ#T\330\374U5\245A#S2" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:29.788 UTC [gossip.gossip] handleMessage -> DEBU 4221 Exiting" +"2019-09-24 00:26:29.788 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4222 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020?" signature:"0D\002 I\220\267\tH\256k\217\334\246}I)\353\3477\257\267\005\363G\251V\ngm\2579\351J\237\301\002 D\016\r\375@\310\241\325\241\305\307\362\025\220\375\272M\263\262KZ#T\330\374U5\245A#S2" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:29.788 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4223 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:29.788 UTC [msp.identity] Verify -> DEBU 4224 Verify: digest = 00000000 41 b2 9a b7 64 05 f4 dc 09 28 f8 50 19 b8 9e 64 |A...d....(.P...d| +00000010 f4 d7 18 49 bb 6b 11 53 ca 2c 96 22 1b 01 e9 50 |...I.k.S.,."...P|" +"2019-09-24 00:26:29.788 UTC [msp.identity] Verify -> DEBU 4225 Verify: sig = 00000000 30 44 02 20 49 90 b7 09 48 ae 6b 8f dc a6 7d 49 |0D. I...H.k...}I| +00000010 29 eb e7 37 af b7 05 f3 47 a9 56 0a 67 6d af 39 |)..7....G.V.gm.9| +00000020 e9 4a 9f c1 02 20 44 0e 0d fd 40 c8 a1 d5 a1 c5 |.J... D...@.....| +00000030 c7 f2 15 90 fd ba 4d b3 b2 4b 5a 23 54 d8 fc 55 |......M..KZ#T..U| +00000040 35 a5 41 23 53 32 |5.A#S2|" +"2019-09-24 00:26:29.789 UTC [msp.identity] Verify -> DEBU 4226 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:29.789 UTC [msp.identity] Verify -> DEBU 4227 Verify: sig = 00000000 30 45 02 21 00 bc 40 8d 81 46 7a 20 17 b8 f2 f1 |0E.!..@..Fz ....| +00000010 c7 e8 7b 79 17 5e 67 b8 34 1c 58 48 ae cf ac f3 |..{y.^g.4.XH....| +00000020 84 00 65 a3 d6 02 20 4f 00 c0 dc 44 62 06 84 ce |..e... O...Db...| +00000030 2f f4 18 63 c0 a8 7f 8f 58 5c 28 d0 e7 44 3a a9 |/..c....X\(..D:.| +00000040 a0 5e 0e 99 a7 74 d7 |.^...t.|" +"2019-09-24 00:26:29.789 UTC [gossip.discovery] handleAliveMessage -> DEBU 4228 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:29.789 UTC [gossip.discovery] learnExistingMembers -> DEBU 4229 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:26:29.789 UTC [gossip.discovery] learnExistingMembers -> DEBU 422a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:29.789 UTC [gossip.discovery] learnExistingMembers -> DEBU 422b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:29.789 UTC [gossip.discovery] learnExistingMembers -> DEBU 422c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:29.789 UTC [gossip.discovery] learnExistingMembers -> DEBU 422d Exiting" +"2019-09-24 00:26:29.789 UTC [gossip.discovery] handleAliveMessage -> DEBU 422e Exiting" +"2019-09-24 00:26:29.789 UTC [gossip.discovery] handleMsgFromComm -> DEBU 422f Exiting" +"2019-09-24 00:26:29.789 UTC [gossip.discovery] sendMemResponse -> DEBU 4230 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:29.789 UTC [msp] DeserializeIdentity -> DEBU 4231 Obtaining identity" +"2019-09-24 00:26:29.789 UTC [msp] DeserializeIdentity -> DEBU 4232 Obtaining identity" +"2019-09-24 00:26:29.790 UTC [gossip.comm] Send -> DEBU 4233 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:29.790 UTC [gossip.discovery] sendMemResponse -> DEBU 4234 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020?" signature:"0D\002 I\220\267\tH\256k\217\334\246}I)\353\3477\257\267\005\363G\251V\ngm\2579\351J\237\301\002 D\016\r\375@\310\241\325\241\305\307\362\025\220\375\272M\263\262KZ#T\330\374U5\245A#S2" secret_envelope: > alive: " +"2019-09-24 00:26:29.790 UTC [gossip.comm] sendToEndpoint -> DEBU 4235 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:29.790 UTC [gossip.comm] sendToEndpoint -> DEBU 4236 Exiting" +"2019-09-24 00:26:29.966 UTC [gossip.gossip] handleMessage -> DEBU 4237 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.966 UTC [gossip.gossip] handleMessage -> DEBU 4238 Exiting" +"2019-09-24 00:26:29.966 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4239 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.966 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 423a Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:29.967 UTC [msp] DeserializeIdentity -> DEBU 423b Obtaining identity" +"2019-09-24 00:26:29.967 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 423c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:29.967 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 423d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:29.967 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 423e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 423f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 4240 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 4241 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:29.967 UTC [cauthdsl] func1 -> DEBU 4242 0xc002bc5460 gate 1569284789967414400 evaluation starts" +"2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 4243 0xc002bc5460 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 4244 0xc002bc5460 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 4245 0xc002bc5460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 4246 0xc002bc5460 principal evaluation fails" +"2019-09-24 00:26:29.967 UTC [cauthdsl] func1 -> DEBU 4247 0xc002bc5460 gate 1569284789967414400 evaluation fails" +"2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 4248 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 4249 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:29.967 UTC [policies] Evaluate -> DEBU 424a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:29.967 UTC [cauthdsl] func1 -> DEBU 424b 0xc002bc5ca0 gate 1569284789967797400 evaluation starts" +"2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 424c 0xc002bc5ca0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 424d 0xc002bc5ca0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:29.967 UTC [cauthdsl] func2 -> DEBU 424e 0xc002bc5ca0 principal matched by identity 0" +"2019-09-24 00:26:29.967 UTC [msp.identity] Verify -> DEBU 424f Verify: digest = 00000000 ce 0d b6 e0 d7 6f 67 29 d2 0a 77 c7 cb 53 41 49 |.....og)..w..SAI| +00000010 ff 99 73 83 e8 fe a6 8d 89 98 3a d0 fc a5 40 77 |..s.......:...@w|" +"2019-09-24 00:26:29.967 UTC [msp.identity] Verify -> DEBU 4250 Verify: sig = 00000000 30 45 02 21 00 b2 77 7a 5c 78 f7 2b 51 59 9e 53 |0E.!..wz\x.+QY.S| +00000010 eb 7d 94 21 51 e4 20 89 58 8e db d7 7a 66 c8 60 |.}.!Q. .X...zf.`| +00000020 63 e2 0b 4b 00 02 20 6a cf 83 98 30 19 29 fa 96 |c..K.. j...0.)..| +00000030 81 3e 35 ee 98 3f c2 89 04 c9 32 63 ad 46 a5 ae |.>5..?....2c.F..| +00000040 08 85 3c aa 45 e6 b0 |..<.E..|" +"2019-09-24 00:26:29.968 UTC [cauthdsl] func2 -> DEBU 4251 0xc002bc5ca0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:29.968 UTC [cauthdsl] func1 -> DEBU 4252 0xc002bc5ca0 gate 1569284789967797400 evaluation succeeds" +"2019-09-24 00:26:29.968 UTC [policies] Evaluate -> DEBU 4253 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:29.968 UTC [policies] Evaluate -> DEBU 4254 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:29.968 UTC [policies] Evaluate -> DEBU 4255 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:29.968 UTC [policies] Evaluate -> DEBU 4256 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:29.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 4257 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4258 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:29.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4259 updating membership: timestamp: " +"2019-09-24 00:26:29.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 425a Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:29.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 425b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:29.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 425c Exiting" +"2019-09-24 00:26:29.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 425d Exiting" +"2019-09-24 00:26:29.968 UTC [gossip.discovery] handleMsgFromComm -> DEBU 425e Exiting" +"2019-09-24 00:26:29.968 UTC [gossip.comm] func1 -> DEBU 425f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.969 UTC [gossip.gossip] handleMessage -> DEBU 4260 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.969 UTC [gossip.gossip] handleMessage -> DEBU 4261 Exiting" +"2019-09-24 00:26:29.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4262 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4263 Exiting" +"2019-09-24 00:26:29.977 UTC [msp] DeserializeIdentity -> DEBU 4264 Obtaining identity" +"2019-09-24 00:26:29.977 UTC [msp] DeserializeIdentity -> DEBU 4265 Obtaining identity" +"2019-09-24 00:26:29.977 UTC [msp] DeserializeIdentity -> DEBU 4266 Obtaining identity" +"2019-09-24 00:26:29.980 UTC [msp] DeserializeIdentity -> DEBU 4267 Obtaining identity" +"2019-09-24 00:26:29.980 UTC [msp] DeserializeIdentity -> DEBU 4268 Obtaining identity" +"2019-09-24 00:26:29.980 UTC [msp] DeserializeIdentity -> DEBU 4269 Obtaining identity" +"2019-09-24 00:26:29.980 UTC [gossip.comm] Send -> DEBU 426a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:29.980 UTC [msp] DeserializeIdentity -> DEBU 426b Obtaining identity" +"2019-09-24 00:26:29.980 UTC [msp] DeserializeIdentity -> DEBU 426c Obtaining identity" +"2019-09-24 00:26:29.980 UTC [gossip.comm] Send -> DEBU 426d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:29.981 UTC [gossip.comm] sendToEndpoint -> DEBU 426e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.981 UTC [gossip.comm] sendToEndpoint -> DEBU 426f Exiting" +"2019-09-24 00:26:29.981 UTC [gossip.comm] sendToEndpoint -> DEBU 4270 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.981 UTC [gossip.comm] sendToEndpoint -> DEBU 4271 Exiting" +"2019-09-24 00:26:29.985 UTC [gossip.comm] func1 -> DEBU 4272 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.985 UTC [gossip.gossip] handleMessage -> DEBU 4273 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.986 UTC [gossip.gossip] handleMessage -> DEBU 4274 Exiting" +"2019-09-24 00:26:29.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4275 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:29.986 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4276 Exiting" +"2019-09-24 00:26:30.043 UTC [gossip.comm] func1 -> DEBU 4277 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:30.043 UTC [gossip.gossip] handleMessage -> DEBU 4278 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:30.043 UTC [msp] DeserializeIdentity -> DEBU 4279 Obtaining identity" +"2019-09-24 00:26:30.043 UTC [msp] DeserializeIdentity -> DEBU 427a Obtaining identity" +"2019-09-24 00:26:30.043 UTC [msp] DeserializeIdentity -> DEBU 427b Obtaining identity" +"2019-09-24 00:26:30.043 UTC [gossip.gossip] handleMessage -> DEBU 427c Exiting" +"2019-09-24 00:26:30.687 UTC [gossip.comm] func1 -> DEBU 427d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:30.687 UTC [gossip.gossip] handleMessage -> DEBU 427e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:30.687 UTC [gossip.gossip] handleMessage -> DEBU 427f Exiting" +"2019-09-24 00:26:30.688 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4280 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:30.688 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4281 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:30.688 UTC [msp] DeserializeIdentity -> DEBU 4282 Obtaining identity" +"2019-09-24 00:26:30.688 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4283 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:30.688 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4284 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:30.688 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4285 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 4286 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 4287 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 4288 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:30.688 UTC [cauthdsl] func1 -> DEBU 4289 0xc00366bee0 gate 1569284790688551900 evaluation starts" +"2019-09-24 00:26:30.688 UTC [cauthdsl] func2 -> DEBU 428a 0xc00366bee0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:30.688 UTC [cauthdsl] func2 -> DEBU 428b 0xc00366bee0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:30.688 UTC [cauthdsl] func2 -> DEBU 428c 0xc00366bee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:30.688 UTC [cauthdsl] func2 -> DEBU 428d 0xc00366bee0 principal evaluation fails" +"2019-09-24 00:26:30.688 UTC [cauthdsl] func1 -> DEBU 428e 0xc00366bee0 gate 1569284790688551900 evaluation fails" +"2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 428f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 4290 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:30.688 UTC [policies] Evaluate -> DEBU 4291 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:30.688 UTC [cauthdsl] func1 -> DEBU 4292 0xc0036b2720 gate 1569284790688924100 evaluation starts" +"2019-09-24 00:26:30.689 UTC [cauthdsl] func2 -> DEBU 4293 0xc0036b2720 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:30.689 UTC [cauthdsl] func2 -> DEBU 4294 0xc0036b2720 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:30.689 UTC [cauthdsl] func2 -> DEBU 4295 0xc0036b2720 principal matched by identity 0" +"2019-09-24 00:26:30.689 UTC [msp.identity] Verify -> DEBU 4296 Verify: digest = 00000000 e1 f1 8f 86 8e 32 0b 91 7f 9a 69 a7 fc 94 7d c1 |.....2....i...}.| +00000010 22 1e 84 1b f6 48 f9 b5 03 d1 04 06 4b 14 32 79 |"....H......K.2y|" +"2019-09-24 00:26:30.689 UTC [msp.identity] Verify -> DEBU 4297 Verify: sig = 00000000 30 45 02 21 00 9b 12 9b 30 a4 76 06 b7 6e 07 12 |0E.!....0.v..n..| +00000010 47 99 9b 16 15 bf 06 5c 7e f9 73 98 c6 f1 6c 99 |G......\~.s...l.| +00000020 98 f8 47 64 a5 02 20 6b c4 12 ab c3 66 10 b8 94 |..Gd.. k....f...| +00000030 4b 2d 16 4b 3e a9 d7 fd 25 0d 43 a1 c6 69 2c 6a |K-.K>...%.C..i,j| +00000040 13 57 e7 97 a1 a5 57 |.W....W|" +"2019-09-24 00:26:30.689 UTC [gossip.comm] func1 -> DEBU 4298 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:30.689 UTC [cauthdsl] func2 -> DEBU 4299 0xc0036b2720 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:30.689 UTC [gossip.gossip] handleMessage -> DEBU 429a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:30.689 UTC [cauthdsl] func1 -> DEBU 429b 0xc0036b2720 gate 1569284790688924100 evaluation succeeds" +"2019-09-24 00:26:30.689 UTC [policies] Evaluate -> DEBU 429c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:30.689 UTC [policies] Evaluate -> DEBU 429d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:30.689 UTC [policies] Evaluate -> DEBU 429e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:30.689 UTC [policies] Evaluate -> DEBU 429f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:30.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 42a0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:30.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 42a1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:30.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 42a2 updating membership: timestamp: " +"2019-09-24 00:26:30.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 42a3 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:30.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 42a4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:30.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 42a5 Exiting" +"2019-09-24 00:26:30.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 42a6 Exiting" +"2019-09-24 00:26:30.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a7 Exiting" +"2019-09-24 00:26:30.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:30.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a9 Exiting" +"2019-09-24 00:26:30.690 UTC [gossip.gossip] handleMessage -> DEBU 42aa Exiting" +"2019-09-24 00:26:30.695 UTC [msp] DeserializeIdentity -> DEBU 42ab Obtaining identity" +"2019-09-24 00:26:30.695 UTC [msp] DeserializeIdentity -> DEBU 42ac Obtaining identity" +"2019-09-24 00:26:30.695 UTC [msp] DeserializeIdentity -> DEBU 42ad Obtaining identity" +"2019-09-24 00:26:30.696 UTC [msp] DeserializeIdentity -> DEBU 42ae Obtaining identity" +"2019-09-24 00:26:30.696 UTC [msp] DeserializeIdentity -> DEBU 42af Obtaining identity" +"2019-09-24 00:26:30.696 UTC [msp] DeserializeIdentity -> DEBU 42b0 Obtaining identity" +"2019-09-24 00:26:30.696 UTC [gossip.comm] Send -> DEBU 42b1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:30.696 UTC [msp] DeserializeIdentity -> DEBU 42b2 Obtaining identity" +"2019-09-24 00:26:30.696 UTC [msp] DeserializeIdentity -> DEBU 42b3 Obtaining identity" +"2019-09-24 00:26:30.696 UTC [gossip.comm] Send -> DEBU 42b4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:30.696 UTC [gossip.comm] sendToEndpoint -> DEBU 42b5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:30.696 UTC [gossip.comm] sendToEndpoint -> DEBU 42b6 Exiting" +"2019-09-24 00:26:30.696 UTC [gossip.comm] sendToEndpoint -> DEBU 42b7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:30.696 UTC [gossip.comm] sendToEndpoint -> DEBU 42b8 Exiting" +"2019-09-24 00:26:30.697 UTC [gossip.gossip] handleMessage -> DEBU 42b9 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:30.697 UTC [gossip.gossip] handleMessage -> DEBU 42ba Exiting" +"2019-09-24 00:26:30.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42bb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:30.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42bc Exiting" +"2019-09-24 00:26:31.723 UTC [gossip.pull] Hello -> DEBU 42bd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:31.724 UTC [gossip.comm] Send -> DEBU 42be Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:31.724 UTC [gossip.pull] Hello -> DEBU 42bf Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:31.724 UTC [gossip.comm] Send -> DEBU 42c0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:31.724 UTC [gossip.pull] Hello -> DEBU 42c1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:31.724 UTC [gossip.comm] Send -> DEBU 42c2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c5 Exiting" +"2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c6 Exiting" +"2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.724 UTC [gossip.comm] sendToEndpoint -> DEBU 42c8 Exiting" +"2019-09-24 00:26:31.727 UTC [gossip.gossip] handleMessage -> DEBU 42c9 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.727 UTC [gossip.pull] HandleMessage -> DEBU 42ca GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.727 UTC [gossip.gossip] handleMessage -> DEBU 42cb Exiting" +"2019-09-24 00:26:31.727 UTC [gossip.comm] func1 -> DEBU 42cc Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.727 UTC [gossip.gossip] handleMessage -> DEBU 42cd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.727 UTC [gossip.pull] HandleMessage -> DEBU 42ce GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.727 UTC [gossip.gossip] handleMessage -> DEBU 42cf Exiting" +"2019-09-24 00:26:31.727 UTC [gossip.comm] func1 -> DEBU 42d0 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.728 UTC [gossip.gossip] handleMessage -> DEBU 42d1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.728 UTC [gossip.pull] HandleMessage -> DEBU 42d2 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.728 UTC [gossip.gossip] handleMessage -> DEBU 42d3 Exiting" +"2019-09-24 00:26:31.863 UTC [msp] GetDefaultSigningIdentity -> DEBU 42d4 Obtaining default signing identity" +"2019-09-24 00:26:31.863 UTC [msp.identity] Sign -> DEBU 42d5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103C " +"2019-09-24 00:26:31.863 UTC [msp.identity] Sign -> DEBU 42d6 Sign: digest: 4336717B03DD63794D98BCAF2EAD32DAB9392EE798CFC3480446B66C6DE361C4 " +"2019-09-24 00:26:31.863 UTC [msp] GetDefaultSigningIdentity -> DEBU 42d7 Obtaining default signing identity" +"2019-09-24 00:26:31.863 UTC [msp.identity] Sign -> DEBU 42d8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:31.863 UTC [msp.identity] Sign -> DEBU 42d9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:31.864 UTC [gossip.comm] Send -> DEBU 42da Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:31.864 UTC [msp] DeserializeIdentity -> DEBU 42db Obtaining identity" +"2019-09-24 00:26:31.864 UTC [gossip.comm] sendToEndpoint -> DEBU 42dc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.865 UTC [gossip.comm] sendToEndpoint -> DEBU 42de Exiting" +"2019-09-24 00:26:31.865 UTC [gossip.comm] Send -> DEBU 42dd Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:31.866 UTC [msp] DeserializeIdentity -> DEBU 42df Obtaining identity" +"2019-09-24 00:26:31.866 UTC [gossip.comm] Send -> DEBU 42e0 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:31.867 UTC [gossip.comm] sendToEndpoint -> DEBU 42e1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.867 UTC [gossip.comm] sendToEndpoint -> DEBU 42e2 Exiting" +"2019-09-24 00:26:31.868 UTC [gossip.comm] sendToEndpoint -> DEBU 42e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.868 UTC [gossip.comm] sendToEndpoint -> DEBU 42e4 Exiting" +"2019-09-24 00:26:31.872 UTC [gossip.comm] func1 -> DEBU 42e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.872 UTC [gossip.gossip] handleMessage -> DEBU 42e6 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.873 UTC [gossip.gossip] handleMessage -> DEBU 42e7 Exiting" +"2019-09-24 00:26:31.873 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42e8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.873 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 42e9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:31.874 UTC [msp.identity] Verify -> DEBU 42ea Verify: digest = 00000000 43 36 71 7b 03 dd 63 79 4d 98 bc af 2e ad 32 da |C6q{..cyM.....2.| +00000010 b9 39 2e e7 98 cf c3 48 04 46 b6 6c 6d e3 61 c4 |.9.....H.F.lm.a.|" +"2019-09-24 00:26:31.874 UTC [msp.identity] Verify -> DEBU 42eb Verify: sig = 00000000 30 45 02 21 00 8a dd 4a a7 45 02 95 42 dd 65 df |0E.!...J.E..B.e.| +00000010 11 9f 32 ce e2 0f c3 55 31 3c f1 82 cf 7b 6d df |..2....U1<...{m.| +00000020 08 9c 98 57 b2 02 20 3a 39 4d 1d e8 d0 f0 86 b6 |...W.. :9M......| +00000030 c9 7b bc 42 8f 95 8f 1f 25 2a e1 79 84 47 e3 4c |.{.B....%*.y.G.L| +00000040 80 cd 67 30 a7 c3 d8 |..g0...|" +"2019-09-24 00:26:31.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 42ec Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:31.874 UTC [gossip.discovery] isSentByMe -> DEBU 42ed Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:31.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 42ee Exiting" +"2019-09-24 00:26:31.875 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 42ef Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:31.875 UTC [msp.identity] Verify -> DEBU 42f0 Verify: digest = 00000000 41 b2 9a b7 64 05 f4 dc 09 28 f8 50 19 b8 9e 64 |A...d....(.P...d| +00000010 f4 d7 18 49 bb 6b 11 53 ca 2c 96 22 1b 01 e9 50 |...I.k.S.,."...P|" +"2019-09-24 00:26:31.875 UTC [msp.identity] Verify -> DEBU 42f1 Verify: sig = 00000000 30 44 02 20 49 90 b7 09 48 ae 6b 8f dc a6 7d 49 |0D. I...H.k...}I| +00000010 29 eb e7 37 af b7 05 f3 47 a9 56 0a 67 6d af 39 |)..7....G.V.gm.9| +00000020 e9 4a 9f c1 02 20 44 0e 0d fd 40 c8 a1 d5 a1 c5 |.J... D...@.....| +00000030 c7 f2 15 90 fd ba 4d b3 b2 4b 5a 23 54 d8 fc 55 |......M..KZ#T..U| +00000040 35 a5 41 23 53 32 |5.A#S2|" +"2019-09-24 00:26:31.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 42f2 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:31.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 42f3 Exiting" +"2019-09-24 00:26:31.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f4 Exiting" +"2019-09-24 00:26:31.877 UTC [gossip.comm] func1 -> DEBU 42f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.877 UTC [gossip.gossip] handleMessage -> DEBU 42f6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.877 UTC [gossip.gossip] handleMessage -> DEBU 42f7 Exiting" +"2019-09-24 00:26:31.877 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.877 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 42f9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:31.878 UTC [msp.identity] Verify -> DEBU 42fa Verify: digest = 00000000 43 36 71 7b 03 dd 63 79 4d 98 bc af 2e ad 32 da |C6q{..cyM.....2.| +00000010 b9 39 2e e7 98 cf c3 48 04 46 b6 6c 6d e3 61 c4 |.9.....H.F.lm.a.|" +"2019-09-24 00:26:31.878 UTC [msp.identity] Verify -> DEBU 42fb Verify: sig = 00000000 30 45 02 21 00 8a dd 4a a7 45 02 95 42 dd 65 df |0E.!...J.E..B.e.| +00000010 11 9f 32 ce e2 0f c3 55 31 3c f1 82 cf 7b 6d df |..2....U1<...{m.| +00000020 08 9c 98 57 b2 02 20 3a 39 4d 1d e8 d0 f0 86 b6 |...W.. :9M......| +00000030 c9 7b bc 42 8f 95 8f 1f 25 2a e1 79 84 47 e3 4c |.{.B....%*.y.G.L| +00000040 80 cd 67 30 a7 c3 d8 |..g0...|" +"2019-09-24 00:26:31.878 UTC [msp.identity] Verify -> DEBU 42fc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:31.878 UTC [msp.identity] Verify -> DEBU 42fd Verify: sig = 00000000 30 45 02 21 00 90 38 b5 0b ca b0 79 26 ff c9 af |0E.!..8....y&...| +00000010 83 84 f2 6f 6b 5c 39 c4 ed a0 76 62 f2 af 82 dc |...ok\9...vb....| +00000020 c0 bd d2 c0 d8 02 20 7a 59 aa 61 03 48 bb aa ff |...... zY.a.H...| +00000030 71 45 62 77 aa f4 8e bd 92 1a 52 fb 26 4a 7a a5 |qEbw......R.&Jz.| +00000040 d8 d5 8f 9d 60 94 1c |....`..|" +"2019-09-24 00:26:31.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 42fe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:31.879 UTC [gossip.discovery] isSentByMe -> DEBU 42ff Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:31.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 4300 Exiting" +"2019-09-24 00:26:31.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4301 Exiting" +"2019-09-24 00:26:31.882 UTC [gossip.gossip] handleMessage -> DEBU 4302 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.882 UTC [gossip.gossip] handleMessage -> DEBU 4303 Exiting" +"2019-09-24 00:26:31.883 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4304 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.885 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4305 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:31.885 UTC [msp.identity] Verify -> DEBU 4306 Verify: digest = 00000000 43 36 71 7b 03 dd 63 79 4d 98 bc af 2e ad 32 da |C6q{..cyM.....2.| +00000010 b9 39 2e e7 98 cf c3 48 04 46 b6 6c 6d e3 61 c4 |.9.....H.F.lm.a.|" +"2019-09-24 00:26:31.886 UTC [msp.identity] Verify -> DEBU 4307 Verify: sig = 00000000 30 45 02 21 00 8a dd 4a a7 45 02 95 42 dd 65 df |0E.!...J.E..B.e.| +00000010 11 9f 32 ce e2 0f c3 55 31 3c f1 82 cf 7b 6d df |..2....U1<...{m.| +00000020 08 9c 98 57 b2 02 20 3a 39 4d 1d e8 d0 f0 86 b6 |...W.. :9M......| +00000030 c9 7b bc 42 8f 95 8f 1f 25 2a e1 79 84 47 e3 4c |.{.B....%*.y.G.L| +00000040 80 cd 67 30 a7 c3 d8 |..g0...|" +"2019-09-24 00:26:31.887 UTC [gossip.discovery] handleAliveMessage -> DEBU 4308 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:31.887 UTC [gossip.discovery] isSentByMe -> DEBU 4309 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:31.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 430a Exiting" +"2019-09-24 00:26:31.889 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 430b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:31.889 UTC [msp.identity] Verify -> DEBU 430c Verify: digest = 00000000 41 b2 9a b7 64 05 f4 dc 09 28 f8 50 19 b8 9e 64 |A...d....(.P...d| +00000010 f4 d7 18 49 bb 6b 11 53 ca 2c 96 22 1b 01 e9 50 |...I.k.S.,."...P|" +"2019-09-24 00:26:31.890 UTC [msp.identity] Verify -> DEBU 430d Verify: sig = 00000000 30 44 02 20 49 90 b7 09 48 ae 6b 8f dc a6 7d 49 |0D. I...H.k...}I| +00000010 29 eb e7 37 af b7 05 f3 47 a9 56 0a 67 6d af 39 |)..7....G.V.gm.9| +00000020 e9 4a 9f c1 02 20 44 0e 0d fd 40 c8 a1 d5 a1 c5 |.J... D...@.....| +00000030 c7 f2 15 90 fd ba 4d b3 b2 4b 5a 23 54 d8 fc 55 |......M..KZ#T..U| +00000040 35 a5 41 23 53 32 |5.A#S2|" +"2019-09-24 00:26:31.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 430e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:31.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 430f Exiting" +"2019-09-24 00:26:31.891 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4310 Exiting" +"2019-09-24 00:26:31.956 UTC [gossip.gossip] handleMessage -> DEBU 4311 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.956 UTC [gossip.pull] HandleMessage -> DEBU 4312 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:31.956 UTC [msp] DeserializeIdentity -> DEBU 4313 Obtaining identity" +"2019-09-24 00:26:31.957 UTC [msp] DeserializeIdentity -> DEBU 4314 Obtaining identity" +"2019-09-24 00:26:31.957 UTC [msp] DeserializeIdentity -> DEBU 4315 Obtaining identity" +"2019-09-24 00:26:31.957 UTC [msp] DeserializeIdentity -> DEBU 4316 Obtaining identity" +"2019-09-24 00:26:31.957 UTC [msp] DeserializeIdentity -> DEBU 4317 Obtaining identity" +"2019-09-24 00:26:31.957 UTC [msp] DeserializeIdentity -> DEBU 4318 Obtaining identity" +"2019-09-24 00:26:31.957 UTC [gossip.pull] SendDigest -> DEBU 4319 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:31.957 UTC [gossip.gossip] handleMessage -> DEBU 431a Exiting" +"2019-09-24 00:26:32.036 UTC [gossip.gossip] handleMessage -> DEBU 431b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.036 UTC [gossip.gossip] handleMessage -> DEBU 431c Exiting" +"2019-09-24 00:26:32.036 UTC [gossip.discovery] handleMsgFromComm -> DEBU 431d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.036 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 431e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:32.036 UTC [msp] DeserializeIdentity -> DEBU 431f Obtaining identity" +"2019-09-24 00:26:32.037 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4320 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:32.037 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4321 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.037 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4322 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 4323 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 4324 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 4325 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:32.037 UTC [cauthdsl] func1 -> DEBU 4326 0xc002b82ea0 gate 1569284792037321400 evaluation starts" +"2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4327 0xc002b82ea0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4328 0xc002b82ea0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4329 0xc002b82ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 432a 0xc002b82ea0 principal evaluation fails" +"2019-09-24 00:26:32.037 UTC [cauthdsl] func1 -> DEBU 432b 0xc002b82ea0 gate 1569284792037321400 evaluation fails" +"2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 432c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 432d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.037 UTC [policies] Evaluate -> DEBU 432e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:32.037 UTC [cauthdsl] func1 -> DEBU 432f 0xc002b836e0 gate 1569284792037703600 evaluation starts" +"2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4330 0xc002b836e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4331 0xc002b836e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4332 0xc002b836e0 principal matched by identity 0" +"2019-09-24 00:26:32.037 UTC [msp.identity] Verify -> DEBU 4333 Verify: digest = 00000000 50 0a 7c 41 1c d8 60 ec c0 34 c4 02 bd 98 46 49 |P.|A..`..4....FI| +00000010 cd 24 29 91 96 d4 50 78 79 6e 2c ca 70 f3 71 88 |.$)...Pxyn,.p.q.|" +"2019-09-24 00:26:32.037 UTC [msp.identity] Verify -> DEBU 4334 Verify: sig = 00000000 30 44 02 20 54 ee b4 04 30 3a 42 d3 15 50 d9 d1 |0D. T...0:B..P..| +00000010 a2 cd 76 da 3a f0 1c 89 3f 2e f8 6e 82 d0 c1 e0 |..v.:...?..n....| +00000020 68 e0 18 15 02 20 37 62 d4 9e d1 7c 3c e2 81 9d |h.... 7b...|<...| +00000030 5a 6b e1 ca 63 5b 88 ab d9 f4 8b 27 f3 43 fe eb |Zk..c[.....'.C..| +00000040 d4 e4 02 b3 88 71 |.....q|" +"2019-09-24 00:26:32.037 UTC [cauthdsl] func2 -> DEBU 4335 0xc002b836e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:32.038 UTC [cauthdsl] func1 -> DEBU 4336 0xc002b836e0 gate 1569284792037703600 evaluation succeeds" +"2019-09-24 00:26:32.038 UTC [policies] Evaluate -> DEBU 4337 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.038 UTC [policies] Evaluate -> DEBU 4338 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.038 UTC [policies] Evaluate -> DEBU 4339 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:32.038 UTC [policies] Evaluate -> DEBU 433a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:32.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 433b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:32.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 433c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:32.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 433d updating membership: timestamp: " +"2019-09-24 00:26:32.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 433e Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:32.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 433f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:32.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 4340 Exiting" +"2019-09-24 00:26:32.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 4341 Exiting" +"2019-09-24 00:26:32.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4342 Exiting" +"2019-09-24 00:26:32.038 UTC [gossip.discovery] sendMemResponse -> DEBU 4343 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:32.038 UTC [msp] DeserializeIdentity -> DEBU 4344 Obtaining identity" +"2019-09-24 00:26:32.038 UTC [msp] DeserializeIdentity -> DEBU 4345 Obtaining identity" +"2019-09-24 00:26:32.038 UTC [msp] DeserializeIdentity -> DEBU 4346 Obtaining identity" +"2019-09-24 00:26:32.038 UTC [gossip.comm] Send -> DEBU 4347 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:32.038 UTC [gossip.discovery] sendMemResponse -> DEBU 4348 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020?" signature:"0D\002 I\220\267\tH\256k\217\334\246}I)\353\3477\257\267\005\363G\251V\ngm\2579\351J\237\301\002 D\016\r\375@\310\241\325\241\305\307\362\025\220\375\272M\263\262KZ#T\330\374U5\245A#S2" > alive:" signature:"0E\002!\000\233\022\2330\244v\006\267n\007\022G\231\233\026\025\277\006\\~\371s\230\306\361l\231\230\370Gd\245\002 k\304\022\253\303f\020\270\224K-\026K>\251\327\375%\rC\241\306i,j\023W\347\227\241\245W" > alive: " +"2019-09-24 00:26:32.038 UTC [gossip.comm] sendToEndpoint -> DEBU 4349 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.038 UTC [gossip.comm] sendToEndpoint -> DEBU 434a Exiting" +"2019-09-24 00:26:32.115 UTC [msp] DeserializeIdentity -> DEBU 434b Obtaining identity" +"2019-09-24 00:26:32.115 UTC [msp] DeserializeIdentity -> DEBU 434c Obtaining identity" +"2019-09-24 00:26:32.115 UTC [gossip.comm] Send -> DEBU 434d Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:32.115 UTC [gossip.comm] sendToEndpoint -> DEBU 434e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.116 UTC [gossip.comm] sendToEndpoint -> DEBU 434f Exiting" +"2019-09-24 00:26:32.116 UTC [gossip.comm] sendToEndpoint -> DEBU 4350 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.116 UTC [gossip.comm] sendToEndpoint -> DEBU 4351 Exiting" +"2019-09-24 00:26:32.116 UTC [gossip.comm] sendToEndpoint -> DEBU 4352 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.116 UTC [gossip.comm] sendToEndpoint -> DEBU 4353 Exiting" +"2019-09-24 00:26:32.117 UTC [gossip.gossip] handleMessage -> DEBU 4354 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.117 UTC [msp] DeserializeIdentity -> DEBU 4355 Obtaining identity" +"2019-09-24 00:26:32.117 UTC [msp] DeserializeIdentity -> DEBU 4356 Obtaining identity" +"2019-09-24 00:26:32.117 UTC [msp] DeserializeIdentity -> DEBU 4357 Obtaining identity" +"2019-09-24 00:26:32.117 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4358 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:32.117 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4359 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.117 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 435a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.117 UTC [policies] Evaluate -> DEBU 435b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:32.117 UTC [policies] Evaluate -> DEBU 435c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:32.117 UTC [policies] Evaluate -> DEBU 435d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:32.117 UTC [cauthdsl] func1 -> DEBU 435e 0xc003582880 gate 1569284792117833800 evaluation starts" +"2019-09-24 00:26:32.117 UTC [cauthdsl] func2 -> DEBU 435f 0xc003582880 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.117 UTC [cauthdsl] func2 -> DEBU 4360 0xc003582880 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.117 UTC [cauthdsl] func2 -> DEBU 4361 0xc003582880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:32.117 UTC [cauthdsl] func2 -> DEBU 4362 0xc003582880 principal evaluation fails" +"2019-09-24 00:26:32.117 UTC [cauthdsl] func1 -> DEBU 4363 0xc003582880 gate 1569284792117833800 evaluation fails" +"2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4364 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4366 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:32.118 UTC [gossip.comm] func1 -> DEBU 4367 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.118 UTC [cauthdsl] func1 -> DEBU 4368 0xc0035830c0 gate 1569284792118096400 evaluation starts" +"2019-09-24 00:26:32.118 UTC [cauthdsl] func2 -> DEBU 4369 0xc0035830c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.118 UTC [gossip.comm] func1 -> DEBU 436a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.118 UTC [cauthdsl] func2 -> DEBU 436b 0xc0035830c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.118 UTC [cauthdsl] func2 -> DEBU 436c 0xc0035830c0 principal matched by identity 0" +"2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 436d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 436e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:32.118 UTC [cauthdsl] func2 -> DEBU 436f 0xc0035830c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:32.118 UTC [cauthdsl] func1 -> DEBU 4370 0xc0035830c0 gate 1569284792118096400 evaluation succeeds" +"2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4371 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4372 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4373 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:32.118 UTC [policies] Evaluate -> DEBU 4374 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 4375 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 4376 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 4377 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:32.118 UTC [msp.identity] Verify -> DEBU 4378 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:32.119 UTC [msp] DeserializeIdentity -> DEBU 4379 Obtaining identity" +"2019-09-24 00:26:32.119 UTC [msp] DeserializeIdentity -> DEBU 437a Obtaining identity" +"2019-09-24 00:26:32.119 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 437b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:32.119 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 437c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.119 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 437d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 437e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 437f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 4380 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:32.119 UTC [cauthdsl] func1 -> DEBU 4381 0xc0040056d0 gate 1569284792119441100 evaluation starts" +"2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 4382 0xc0040056d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 4383 0xc0040056d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 4384 0xc0040056d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 4385 0xc0040056d0 principal evaluation fails" +"2019-09-24 00:26:32.119 UTC [cauthdsl] func1 -> DEBU 4386 0xc0040056d0 gate 1569284792119441100 evaluation fails" +"2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 4387 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 4388 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.119 UTC [policies] Evaluate -> DEBU 4389 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:32.119 UTC [cauthdsl] func1 -> DEBU 438a 0xc004005f10 gate 1569284792119780000 evaluation starts" +"2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 438b 0xc004005f10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 438c 0xc004005f10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.119 UTC [cauthdsl] func2 -> DEBU 438d 0xc004005f10 principal matched by identity 0" +"2019-09-24 00:26:32.120 UTC [msp.identity] Verify -> DEBU 438e Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:32.120 UTC [msp.identity] Verify -> DEBU 438f Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:32.120 UTC [cauthdsl] func2 -> DEBU 4390 0xc004005f10 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:32.120 UTC [cauthdsl] func1 -> DEBU 4391 0xc004005f10 gate 1569284792119780000 evaluation succeeds" +"2019-09-24 00:26:32.120 UTC [policies] Evaluate -> DEBU 4392 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.120 UTC [policies] Evaluate -> DEBU 4393 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.120 UTC [policies] Evaluate -> DEBU 4394 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:32.124 UTC [policies] Evaluate -> DEBU 4395 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:32.124 UTC [gossip.gossip] handleMessage -> DEBU 4396 Exiting" +"2019-09-24 00:26:32.124 UTC [gossip.gossip] handleMessage -> DEBU 4397 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.124 UTC [msp.identity] Verify -> DEBU 4398 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:32.124 UTC [msp.identity] Verify -> DEBU 4399 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:32.125 UTC [msp.identity] Verify -> DEBU 439a Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:32.125 UTC [msp.identity] Verify -> DEBU 439b Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:32.125 UTC [msp] DeserializeIdentity -> DEBU 439c Obtaining identity" +"2019-09-24 00:26:32.125 UTC [msp] DeserializeIdentity -> DEBU 439d Obtaining identity" +"2019-09-24 00:26:32.125 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 439e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:32.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 439f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43a0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:32.125 UTC [cauthdsl] func1 -> DEBU 43a4 0xc004b06760 gate 1569284792125677000 evaluation starts" +"2019-09-24 00:26:32.125 UTC [cauthdsl] func2 -> DEBU 43a5 0xc004b06760 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.125 UTC [cauthdsl] func2 -> DEBU 43a6 0xc004b06760 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.125 UTC [cauthdsl] func2 -> DEBU 43a7 0xc004b06760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:32.125 UTC [cauthdsl] func2 -> DEBU 43a8 0xc004b06760 principal evaluation fails" +"2019-09-24 00:26:32.125 UTC [cauthdsl] func1 -> DEBU 43a9 0xc004b06760 gate 1569284792125677000 evaluation fails" +"2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43aa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.125 UTC [policies] Evaluate -> DEBU 43ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:32.125 UTC [cauthdsl] func1 -> DEBU 43ad 0xc004b06fa0 gate 1569284792125936800 evaluation starts" +"2019-09-24 00:26:32.125 UTC [cauthdsl] func2 -> DEBU 43ae 0xc004b06fa0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43af 0xc004b06fa0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43b0 0xc004b06fa0 principal matched by identity 0" +"2019-09-24 00:26:32.126 UTC [msp.identity] Verify -> DEBU 43b1 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:32.126 UTC [msp.identity] Verify -> DEBU 43b2 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43b3 0xc004b06fa0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:32.126 UTC [cauthdsl] func1 -> DEBU 43b4 0xc004b06fa0 gate 1569284792125936800 evaluation succeeds" +"2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43b5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43b7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:32.126 UTC [msp] DeserializeIdentity -> DEBU 43b9 Obtaining identity" +"2019-09-24 00:26:32.126 UTC [msp] DeserializeIdentity -> DEBU 43ba Obtaining identity" +"2019-09-24 00:26:32.126 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43bb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:32.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43bc Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43bd Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:32.126 UTC [cauthdsl] func1 -> DEBU 43c1 0xc002734770 gate 1569284792126715100 evaluation starts" +"2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43c2 0xc002734770 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43c3 0xc002734770 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43c4 0xc002734770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:32.126 UTC [cauthdsl] func2 -> DEBU 43c5 0xc002734770 principal evaluation fails" +"2019-09-24 00:26:32.126 UTC [cauthdsl] func1 -> DEBU 43c6 0xc002734770 gate 1569284792126715100 evaluation fails" +"2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.126 UTC [policies] Evaluate -> DEBU 43c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:32.126 UTC [cauthdsl] func1 -> DEBU 43ca 0xc002734fb0 gate 1569284792126963000 evaluation starts" +"2019-09-24 00:26:32.127 UTC [cauthdsl] func2 -> DEBU 43cb 0xc002734fb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.127 UTC [cauthdsl] func2 -> DEBU 43cc 0xc002734fb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.127 UTC [cauthdsl] func2 -> DEBU 43cd 0xc002734fb0 principal matched by identity 0" +"2019-09-24 00:26:32.127 UTC [msp.identity] Verify -> DEBU 43ce Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:32.135 UTC [msp.identity] Verify -> DEBU 43cf Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:32.135 UTC [cauthdsl] func2 -> DEBU 43d0 0xc002734fb0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:32.136 UTC [cauthdsl] func1 -> DEBU 43d1 0xc002734fb0 gate 1569284792126963000 evaluation succeeds" +"2019-09-24 00:26:32.136 UTC [policies] Evaluate -> DEBU 43d2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.136 UTC [policies] Evaluate -> DEBU 43d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.136 UTC [policies] Evaluate -> DEBU 43d4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:32.136 UTC [policies] Evaluate -> DEBU 43d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:32.136 UTC [gossip.gossip] handleMessage -> DEBU 43d6 Exiting" +"2019-09-24 00:26:32.136 UTC [gossip.gossip] handleMessage -> DEBU 43d7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.136 UTC [msp] DeserializeIdentity -> DEBU 43d8 Obtaining identity" +"2019-09-24 00:26:32.136 UTC [msp] DeserializeIdentity -> DEBU 43d9 Obtaining identity" +"2019-09-24 00:26:32.136 UTC [msp] DeserializeIdentity -> DEBU 43da Obtaining identity" +"2019-09-24 00:26:32.136 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43db Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:32.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43dc Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43dd Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.137 UTC [policies] Evaluate -> DEBU 43de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:32.137 UTC [policies] Evaluate -> DEBU 43df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:32.137 UTC [policies] Evaluate -> DEBU 43e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:32.137 UTC [cauthdsl] func1 -> DEBU 43e1 0xc0027d6ac0 gate 1569284792137436500 evaluation starts" +"2019-09-24 00:26:32.137 UTC [cauthdsl] func2 -> DEBU 43e2 0xc0027d6ac0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.137 UTC [cauthdsl] func2 -> DEBU 43e3 0xc0027d6ac0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.137 UTC [cauthdsl] func2 -> DEBU 43e4 0xc0027d6ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:32.137 UTC [cauthdsl] func2 -> DEBU 43e5 0xc0027d6ac0 principal evaluation fails" +"2019-09-24 00:26:32.137 UTC [cauthdsl] func1 -> DEBU 43e6 0xc0027d6ac0 gate 1569284792137436500 evaluation fails" +"2019-09-24 00:26:32.137 UTC [policies] Evaluate -> DEBU 43e7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.137 UTC [policies] Evaluate -> DEBU 43e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.138 UTC [policies] Evaluate -> DEBU 43e9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:32.140 UTC [cauthdsl] func1 -> DEBU 43ea 0xc0027d7300 gate 1569284792138053300 evaluation starts" +"2019-09-24 00:26:32.140 UTC [cauthdsl] func2 -> DEBU 43eb 0xc0027d7300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.141 UTC [cauthdsl] func2 -> DEBU 43ec 0xc0027d7300 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.141 UTC [cauthdsl] func2 -> DEBU 43ed 0xc0027d7300 principal matched by identity 0" +"2019-09-24 00:26:32.141 UTC [msp.identity] Verify -> DEBU 43ee Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:32.141 UTC [msp.identity] Verify -> DEBU 43ef Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:32.142 UTC [cauthdsl] func2 -> DEBU 43f0 0xc0027d7300 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:32.142 UTC [cauthdsl] func1 -> DEBU 43f1 0xc0027d7300 gate 1569284792138053300 evaluation succeeds" +"2019-09-24 00:26:32.142 UTC [policies] Evaluate -> DEBU 43f2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.142 UTC [policies] Evaluate -> DEBU 43f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.143 UTC [policies] Evaluate -> DEBU 43f4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:32.144 UTC [policies] Evaluate -> DEBU 43f5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:32.159 UTC [msp.identity] Verify -> DEBU 43f6 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:32.159 UTC [msp.identity] Verify -> DEBU 43f7 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:32.159 UTC [msp] DeserializeIdentity -> DEBU 43f8 Obtaining identity" +"2019-09-24 00:26:32.159 UTC [msp] DeserializeIdentity -> DEBU 43f9 Obtaining identity" +"2019-09-24 00:26:32.159 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:32.159 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43fb Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.159 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43fc Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.159 UTC [policies] Evaluate -> DEBU 43fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:32.159 UTC [policies] Evaluate -> DEBU 43fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:32.159 UTC [policies] Evaluate -> DEBU 43ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:32.159 UTC [cauthdsl] func1 -> DEBU 4400 0xc0036f91f0 gate 1569284792159923300 evaluation starts" +"2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 4401 0xc0036f91f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 4402 0xc0036f91f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 4403 0xc0036f91f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 4404 0xc0036f91f0 principal evaluation fails" +"2019-09-24 00:26:32.160 UTC [cauthdsl] func1 -> DEBU 4405 0xc0036f91f0 gate 1569284792159923300 evaluation fails" +"2019-09-24 00:26:32.160 UTC [policies] Evaluate -> DEBU 4406 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.160 UTC [policies] Evaluate -> DEBU 4407 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.160 UTC [policies] Evaluate -> DEBU 4408 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:32.160 UTC [cauthdsl] func1 -> DEBU 4409 0xc0036f9a30 gate 1569284792160648200 evaluation starts" +"2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 440a 0xc0036f9a30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 440b 0xc0036f9a30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.160 UTC [cauthdsl] func2 -> DEBU 440c 0xc0036f9a30 principal matched by identity 0" +"2019-09-24 00:26:32.160 UTC [msp.identity] Verify -> DEBU 440d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:32.161 UTC [msp.identity] Verify -> DEBU 440e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:32.161 UTC [cauthdsl] func2 -> DEBU 440f 0xc0036f9a30 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:32.161 UTC [cauthdsl] func1 -> DEBU 4410 0xc0036f9a30 gate 1569284792160648200 evaluation succeeds" +"2019-09-24 00:26:32.161 UTC [policies] Evaluate -> DEBU 4411 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.161 UTC [policies] Evaluate -> DEBU 4412 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.161 UTC [policies] Evaluate -> DEBU 4413 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:32.161 UTC [policies] Evaluate -> DEBU 4414 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:32.161 UTC [msp.identity] Verify -> DEBU 4415 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:32.161 UTC [msp.identity] Verify -> DEBU 4416 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:32.162 UTC [gossip.gossip] handleMessage -> DEBU 4417 Exiting" +"2019-09-24 00:26:32.299 UTC [msp] DeserializeIdentity -> DEBU 4418 Obtaining identity" +"2019-09-24 00:26:32.300 UTC [msp] DeserializeIdentity -> DEBU 4419 Obtaining identity" +"2019-09-24 00:26:32.300 UTC [gossip.pull] Hello -> DEBU 441a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:32.300 UTC [msp] DeserializeIdentity -> DEBU 441b Obtaining identity" +"2019-09-24 00:26:32.300 UTC [msp] DeserializeIdentity -> DEBU 441c Obtaining identity" +"2019-09-24 00:26:32.301 UTC [gossip.comm] Send -> DEBU 441d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:32.301 UTC [gossip.comm] sendToEndpoint -> DEBU 441e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.301 UTC [gossip.comm] sendToEndpoint -> DEBU 441f Exiting" +"2019-09-24 00:26:32.302 UTC [gossip.comm] func1 -> DEBU 4420 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.302 UTC [gossip.gossip] handleMessage -> DEBU 4421 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.302 UTC [gossip.pull] HandleMessage -> DEBU 4422 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.302 UTC [gossip.gossip] handleMessage -> DEBU 4423 Exiting" +"2019-09-24 00:26:32.331 UTC [gossip.election] waitForInterrupt -> DEBU 4424 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:32.332 UTC [gossip.election] IsLeader -> DEBU 4425 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:32.332 UTC [msp] GetDefaultSigningIdentity -> DEBU 4426 Obtaining default signing identity" +"2019-09-24 00:26:32.332 UTC [msp.identity] Sign -> DEBU 4427 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510141801 " +"2019-09-24 00:26:32.332 UTC [msp.identity] Sign -> DEBU 4428 Sign: digest: C9DD537E46A1ED5A8305ED844DF39D23060093E092015F422B77CCFDF99BA21A " +"2019-09-24 00:26:32.332 UTC [gossip.election] waitForInterrupt -> DEBU 4429 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 442a Obtaining identity" +"2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 442b Obtaining identity" +"2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 442c Obtaining identity" +"2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 442d Obtaining identity" +"2019-09-24 00:26:32.332 UTC [gossip.comm] Send -> DEBU 442e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 442f Obtaining identity" +"2019-09-24 00:26:32.332 UTC [msp] DeserializeIdentity -> DEBU 4430 Obtaining identity" +"2019-09-24 00:26:32.333 UTC [gossip.comm] sendToEndpoint -> DEBU 4431 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.333 UTC [gossip.comm] sendToEndpoint -> DEBU 4432 Exiting" +"2019-09-24 00:26:32.619 UTC [gossip.comm] func1 -> DEBU 4433 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.619 UTC [gossip.gossip] handleMessage -> DEBU 4434 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.619 UTC [msp] DeserializeIdentity -> DEBU 4435 Obtaining identity" +"2019-09-24 00:26:32.619 UTC [msp] DeserializeIdentity -> DEBU 4436 Obtaining identity" +"2019-09-24 00:26:32.619 UTC [gossip.gossip] handleMessage -> DEBU 4437 Exiting" +"2019-09-24 00:26:32.728 UTC [gossip.comm] func1 -> DEBU 4438 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.728 UTC [gossip.gossip] handleMessage -> DEBU 4439 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.729 UTC [gossip.gossip] handleMessage -> DEBU 443a Exiting" +"2019-09-24 00:26:32.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 443b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.729 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 443c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:32.729 UTC [msp.identity] Verify -> DEBU 443d Verify: digest = 00000000 db 9c a9 b0 5f e2 bd cd cf 45 1b 1d 2d 48 f5 a7 |...._....E..-H..| +00000010 27 3e 66 84 7a b6 35 2e e8 06 90 8c b9 f9 b0 2e |'>f.z.5.........|" +"2019-09-24 00:26:32.729 UTC [msp.identity] Verify -> DEBU 443e Verify: sig = 00000000 30 45 02 21 00 be 0e 63 c4 8c 2b 76 06 92 50 41 |0E.!...c..+v..PA| +00000010 04 79 36 fa 0a 39 54 b4 ff 60 2f cb 1b 1b 15 b1 |.y6..9T..`/.....| +00000020 e4 bc 19 bb d8 02 20 45 c5 9b 9b 25 d5 c6 0c db |...... E...%....| +00000030 f6 75 e5 8d 42 78 dd 08 54 5b d7 5b 2e 38 01 62 |.u..Bx..T[.[.8.b| +00000040 1b 6f 14 2c 81 fe f5 |.o.,...|" +"2019-09-24 00:26:32.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 443f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4440 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:32.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4441 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:32.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4442 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:32.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4443 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:32.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4444 Exiting" +"2019-09-24 00:26:32.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 4445 Exiting" +"2019-09-24 00:26:32.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4446 Exiting" +"2019-09-24 00:26:32.731 UTC [gossip.comm] func1 -> DEBU 4447 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.731 UTC [gossip.gossip] handleMessage -> DEBU 4448 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.732 UTC [gossip.gossip] handleMessage -> DEBU 4449 Exiting" +"2019-09-24 00:26:32.732 UTC [gossip.discovery] handleMsgFromComm -> DEBU 444a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.732 UTC [gossip.discovery] handleMsgFromComm -> DEBU 444b Exiting" +"2019-09-24 00:26:32.737 UTC [msp] DeserializeIdentity -> DEBU 444c Obtaining identity" +"2019-09-24 00:26:32.737 UTC [msp] DeserializeIdentity -> DEBU 444d Obtaining identity" +"2019-09-24 00:26:32.738 UTC [msp] DeserializeIdentity -> DEBU 444e Obtaining identity" +"2019-09-24 00:26:32.738 UTC [gossip.comm] Send -> DEBU 444f Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:32.738 UTC [msp] DeserializeIdentity -> DEBU 4450 Obtaining identity" +"2019-09-24 00:26:32.738 UTC [gossip.comm] Send -> DEBU 4451 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 4452 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 4453 Exiting" +"2019-09-24 00:26:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 4454 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.738 UTC [gossip.comm] sendToEndpoint -> DEBU 4455 Exiting" +"2019-09-24 00:26:32.741 UTC [gossip.gossip] handleMessage -> DEBU 4456 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.741 UTC [gossip.gossip] handleMessage -> DEBU 4457 Exiting" +"2019-09-24 00:26:32.741 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4458 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.742 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4459 Exiting" +"2019-09-24 00:26:32.775 UTC [gossip.comm] func1 -> DEBU 445a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.775 UTC [gossip.gossip] handleMessage -> DEBU 445b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.776 UTC [gossip.gossip] handleMessage -> DEBU 445c Exiting" +"2019-09-24 00:26:32.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 445d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.776 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 445e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:32.776 UTC [msp] DeserializeIdentity -> DEBU 445f Obtaining identity" +"2019-09-24 00:26:32.776 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4460 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:32.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4461 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4462 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 4463 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 4464 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 4465 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:32.777 UTC [cauthdsl] func1 -> DEBU 4466 0xc003d203b0 gate 1569284792777121600 evaluation starts" +"2019-09-24 00:26:32.777 UTC [cauthdsl] func2 -> DEBU 4467 0xc003d203b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.777 UTC [cauthdsl] func2 -> DEBU 4468 0xc003d203b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.777 UTC [cauthdsl] func2 -> DEBU 4469 0xc003d203b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:32.777 UTC [cauthdsl] func2 -> DEBU 446a 0xc003d203b0 principal evaluation fails" +"2019-09-24 00:26:32.777 UTC [cauthdsl] func1 -> DEBU 446b 0xc003d203b0 gate 1569284792777121600 evaluation fails" +"2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 446c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 446d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:32.777 UTC [policies] Evaluate -> DEBU 446e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:32.777 UTC [cauthdsl] func1 -> DEBU 446f 0xc003d20bf0 gate 1569284792777470800 evaluation starts" +"2019-09-24 00:26:32.780 UTC [cauthdsl] func2 -> DEBU 4470 0xc003d20bf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:32.780 UTC [cauthdsl] func2 -> DEBU 4471 0xc003d20bf0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:32.780 UTC [cauthdsl] func2 -> DEBU 4472 0xc003d20bf0 principal matched by identity 0" +"2019-09-24 00:26:32.780 UTC [msp.identity] Verify -> DEBU 4473 Verify: digest = 00000000 89 cf 5a d9 3e c5 5a e3 c5 e7 74 db a6 ad 2b 23 |..Z.>.Z...t...+#| +00000010 4f 01 7f eb 08 67 24 0c c8 63 53 20 55 be 25 c6 |O....g$..cS U.%.|" +"2019-09-24 00:26:32.780 UTC [msp.identity] Verify -> DEBU 4474 Verify: sig = 00000000 30 45 02 21 00 8d f3 b6 ad ea 03 36 0a 45 42 fa |0E.!.......6.EB.| +00000010 18 90 eb ba d9 ad 7b ba 4e d3 06 c2 9a 07 c9 b8 |......{.N.......| +00000020 13 74 be ad 08 02 20 55 40 52 75 f6 87 64 87 cf |.t.... U@Ru..d..| +00000030 d8 98 e6 63 05 3b 32 6f f5 f6 e1 4d a9 85 00 1a |...c.;2o...M....| +00000040 5d d6 3c f0 5d 11 6f |].<.].o|" +"2019-09-24 00:26:32.780 UTC [cauthdsl] func2 -> DEBU 4475 0xc003d20bf0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:32.780 UTC [cauthdsl] func1 -> DEBU 4476 0xc003d20bf0 gate 1569284792777470800 evaluation succeeds" +"2019-09-24 00:26:32.780 UTC [policies] Evaluate -> DEBU 4477 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.783 UTC [policies] Evaluate -> DEBU 4478 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:32.783 UTC [policies] Evaluate -> DEBU 4479 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:32.783 UTC [policies] Evaluate -> DEBU 447a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:32.783 UTC [gossip.discovery] handleAliveMessage -> DEBU 447b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:32.783 UTC [gossip.discovery] learnExistingMembers -> DEBU 447c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:32.783 UTC [gossip.discovery] learnExistingMembers -> DEBU 447d updating membership: timestamp: " +"2019-09-24 00:26:32.783 UTC [gossip.discovery] learnExistingMembers -> DEBU 447e Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:32.783 UTC [gossip.discovery] learnExistingMembers -> DEBU 447f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:32.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 4480 Exiting" +"2019-09-24 00:26:32.784 UTC [gossip.discovery] handleAliveMessage -> DEBU 4481 Exiting" +"2019-09-24 00:26:32.784 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4482 Exiting" +"2019-09-24 00:26:32.784 UTC [gossip.discovery] sendMemResponse -> DEBU 4483 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:32.784 UTC [msp] DeserializeIdentity -> DEBU 4484 Obtaining identity" +"2019-09-24 00:26:32.784 UTC [msp] DeserializeIdentity -> DEBU 4485 Obtaining identity" +"2019-09-24 00:26:32.784 UTC [msp] DeserializeIdentity -> DEBU 4486 Obtaining identity" +"2019-09-24 00:26:32.784 UTC [gossip.comm] Send -> DEBU 4487 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:32.784 UTC [gossip.comm] sendToEndpoint -> DEBU 4488 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.784 UTC [gossip.comm] sendToEndpoint -> DEBU 4489 Exiting" +"2019-09-24 00:26:32.785 UTC [gossip.discovery] sendMemResponse -> DEBU 448a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020@" signature:"0E\002!\000\276\016c\304\214+v\006\222PA\004y6\372\n9T\264\377`/\313\033\033\025\261\344\274\031\273\330\002 E\305\233\233%\325\306\014\333\366u\345\215Bx\335\010T[\327[.8\001b\033o\024,\201\376\365" > alive: alive: alive: " +"2019-09-24 00:26:32.824 UTC [gossip.comm] func1 -> DEBU 448b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.824 UTC [gossip.gossip] handleMessage -> DEBU 448c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.825 UTC [gossip.pull] HandleMessage -> DEBU 448d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 448e Obtaining identity" +"2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 448f Obtaining identity" +"2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 4490 Obtaining identity" +"2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 4491 Obtaining identity" +"2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 4492 Obtaining identity" +"2019-09-24 00:26:32.825 UTC [msp] DeserializeIdentity -> DEBU 4493 Obtaining identity" +"2019-09-24 00:26:32.825 UTC [gossip.pull] SendDigest -> DEBU 4494 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:32.825 UTC [gossip.gossip] handleMessage -> DEBU 4495 Exiting" +"2019-09-24 00:26:32.871 UTC [gossip.comm] func1 -> DEBU 4496 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.871 UTC [gossip.gossip] handleMessage -> DEBU 4497 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.871 UTC [gossip.pull] HandleMessage -> DEBU 4498 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:32.871 UTC [gossip.pull] SendDigest -> DEBU 4499 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:32.872 UTC [gossip.gossip] handleMessage -> DEBU 449a Exiting" +"2019-09-24 00:26:33.112 UTC [gossip.gossip] handleMessage -> DEBU 449b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:33.112 UTC [msp] DeserializeIdentity -> DEBU 449c Obtaining identity" +"2019-09-24 00:26:33.112 UTC [msp] DeserializeIdentity -> DEBU 449d Obtaining identity" +"2019-09-24 00:26:33.112 UTC [msp] DeserializeIdentity -> DEBU 449e Obtaining identity" +"2019-09-24 00:26:33.112 UTC [gossip.gossip] handleMessage -> DEBU 449f Exiting" +"2019-09-24 00:26:33.672 UTC [gossip.comm] func1 -> DEBU 44a0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:33.672 UTC [gossip.gossip] handleMessage -> DEBU 44a1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:33.673 UTC [gossip.pull] HandleMessage -> DEBU 44a2 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:33.674 UTC [gossip.pull] SendDigest -> DEBU 44a3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:33.674 UTC [gossip.gossip] handleMessage -> DEBU 44a4 Exiting" +"2019-09-24 00:26:33.806 UTC [gossip.comm] func1 -> DEBU 44a5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" secret_envelope:\263*\340l\312\212'J\306%\333\036q\372\331x\303b\267D8\022\021\243S\013\355\344\331\341" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:33.806 UTC [gossip.gossip] handleMessage -> DEBU 44a6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" secret_envelope:\263*\340l\312\212'J\306%\333\036q\372\331x\303b\267D8\022\021\243S\013\355\344\331\341" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:33.806 UTC [gossip.gossip] handleMessage -> DEBU 44a7 Exiting" +"2019-09-24 00:26:33.807 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44a8 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" secret_envelope:\263*\340l\312\212'J\306%\333\036q\372\331x\303b\267D8\022\021\243S\013\355\344\331\341" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:33.807 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44a9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:33.807 UTC [msp.identity] Verify -> DEBU 44aa Verify: digest = 00000000 01 f7 2c dd a9 9c 86 ed ce 50 fd 46 4a 2b 20 06 |..,......P.FJ+ .| +00000010 9b 0d 3d e6 c5 91 e1 dc 2e 5c d2 fc 45 62 be 70 |..=......\..Eb.p|" +"2019-09-24 00:26:33.807 UTC [msp.identity] Verify -> DEBU 44ab Verify: sig = 00000000 30 44 02 20 48 27 b7 11 ce f9 a8 9e d6 f7 1f 9b |0D. H'..........| +00000010 9d 0f 49 fa ac 49 e7 5a eb 05 b8 ae 98 01 f5 3c |..I..I.Z.......<| +00000020 87 32 e4 22 02 20 13 ec de 91 ea 37 a0 51 c6 18 |.2.". .....7.Q..| +00000030 0d 64 7b 24 48 51 52 a2 0f 35 9a 8e 77 63 1e ea |.d{$HQR..5..wc..| +00000040 08 51 02 be e3 a2 |.Q....|" +"2019-09-24 00:26:33.807 UTC [msp.identity] Verify -> DEBU 44ac Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:33.807 UTC [msp.identity] Verify -> DEBU 44ad Verify: sig = 00000000 30 45 02 21 00 8d b9 fa 31 9f cf ba 36 13 96 68 |0E.!....1...6..h| +00000010 cd 2a 07 f3 5b a6 ff f1 c2 e7 ff be b1 80 71 7a |.*..[.........qz| +00000020 39 05 b4 a7 45 02 20 2e 3e b3 2a e0 6c ca 8a 27 |9...E. .>.*.l..'| +00000030 4a c6 25 db 1e 71 fa d9 78 c3 62 b7 44 38 12 11 |J.%..q..x.b.D8..| +00000040 a3 53 0b ed e4 d9 e1 |.S.....|" +"2019-09-24 00:26:33.807 UTC [gossip.discovery] handleAliveMessage -> DEBU 44ae Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:33.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 44af Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:26:33.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 44b0 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:33.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 44b1 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:33.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 44b2 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:33.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 44b3 Exiting" +"2019-09-24 00:26:33.807 UTC [gossip.discovery] handleAliveMessage -> DEBU 44b4 Exiting" +"2019-09-24 00:26:33.807 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44b5 Exiting" +"2019-09-24 00:26:33.807 UTC [gossip.discovery] sendMemResponse -> DEBU 44b6 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:33.807 UTC [msp] DeserializeIdentity -> DEBU 44b7 Obtaining identity" +"2019-09-24 00:26:33.807 UTC [msp] DeserializeIdentity -> DEBU 44b8 Obtaining identity" +"2019-09-24 00:26:33.808 UTC [gossip.comm] Send -> DEBU 44b9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:33.808 UTC [gossip.discovery] sendMemResponse -> DEBU 44ba Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" secret_envelope:\263*\340l\312\212'J\306%\333\036q\372\331x\303b\267D8\022\021\243S\013\355\344\331\341" > > alive: " +"2019-09-24 00:26:33.808 UTC [gossip.comm] sendToEndpoint -> DEBU 44bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:33.808 UTC [gossip.comm] sendToEndpoint -> DEBU 44bc Exiting" +"2019-09-24 00:26:34.043 UTC [gossip.comm] func1 -> DEBU 44bd Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:34.043 UTC [gossip.gossip] handleMessage -> DEBU 44be Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:34.043 UTC [msp] DeserializeIdentity -> DEBU 44bf Obtaining identity" +"2019-09-24 00:26:34.043 UTC [msp] DeserializeIdentity -> DEBU 44c0 Obtaining identity" +"2019-09-24 00:26:34.043 UTC [msp] DeserializeIdentity -> DEBU 44c1 Obtaining identity" +"2019-09-24 00:26:34.043 UTC [gossip.gossip] handleMessage -> DEBU 44c2 Exiting" +"2019-09-24 00:26:34.607 UTC [msp] GetDefaultSigningIdentity -> DEBU 44c3 Obtaining default signing identity" +"2019-09-24 00:26:34.607 UTC [msp.identity] Sign -> DEBU 44c4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103D " +"2019-09-24 00:26:34.607 UTC [msp.identity] Sign -> DEBU 44c5 Sign: digest: AD5D3DC0694D61255450EC920961F49D57BB2BA0A0F39D59894F580EC3A46E01 " +"2019-09-24 00:26:34.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 44c6 Obtaining default signing identity" +"2019-09-24 00:26:34.608 UTC [msp.identity] Sign -> DEBU 44c7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:34.608 UTC [msp.identity] Sign -> DEBU 44c8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:34.608 UTC [gossip.discovery] periodicalSendAlive -> DEBU 44c9 Sleeping 5s" +"2019-09-24 00:26:34.611 UTC [msp] DeserializeIdentity -> DEBU 44ca Obtaining identity" +"2019-09-24 00:26:34.612 UTC [msp] DeserializeIdentity -> DEBU 44cb Obtaining identity" +"2019-09-24 00:26:34.612 UTC [msp] DeserializeIdentity -> DEBU 44cc Obtaining identity" +"2019-09-24 00:26:34.612 UTC [gossip.comm] Send -> DEBU 44cd Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:34.612 UTC [gossip.comm] Send -> DEBU 44ce Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:34.612 UTC [msp] DeserializeIdentity -> DEBU 44cf Obtaining identity" +"2019-09-24 00:26:34.612 UTC [gossip.comm] Send -> DEBU 44d0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d2 Exiting" +"2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d4 Exiting" +"2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.612 UTC [gossip.comm] sendToEndpoint -> DEBU 44d6 Exiting" +"2019-09-24 00:26:34.974 UTC [gossip.gossip] handleMessage -> DEBU 44d7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.974 UTC [gossip.gossip] handleMessage -> DEBU 44d8 Exiting" +"2019-09-24 00:26:34.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44d9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44da Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:34.975 UTC [msp] DeserializeIdentity -> DEBU 44db Obtaining identity" +"2019-09-24 00:26:34.975 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:34.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44dd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:34.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44df Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:34.976 UTC [policies] Evaluate -> DEBU 44e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:34.976 UTC [gossip.comm] func1 -> DEBU 44de Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:34.978 UTC [gossip.gossip] handleMessage -> DEBU 44e2 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func1 -> DEBU 44e4 0xc003f5d0f0 gate 1569284794978344600 evaluation starts" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44e5 0xc003f5d0f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44e6 0xc003f5d0f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44e7 0xc003f5d0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44e8 0xc003f5d0f0 principal evaluation fails" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func1 -> DEBU 44e9 0xc003f5d0f0 gate 1569284794978344600 evaluation fails" +"2019-09-24 00:26:34.978 UTC [gossip.comm] func1 -> DEBU 44ea Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44eb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func1 -> DEBU 44ee 0xc003f5d930 gate 1569284794978596900 evaluation starts" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44ef 0xc003f5d930 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44f0 0xc003f5d930 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44f1 0xc003f5d930 principal matched by identity 0" +"2019-09-24 00:26:34.978 UTC [msp.identity] Verify -> DEBU 44f2 Verify: digest = 00000000 fc 55 0c 35 70 4d 80 a5 9e de 55 6f f2 49 19 8f |.U.5pM....Uo.I..| +00000010 32 83 5f 3e c0 01 b3 45 40 a8 c0 27 2a 6e 2d bf |2._>...E@..'*n-.|" +"2019-09-24 00:26:34.978 UTC [msp.identity] Verify -> DEBU 44f3 Verify: sig = 00000000 30 44 02 20 27 b5 fe 1e 72 7b f6 ff 7d 80 2d 86 |0D. '...r{..}.-.| +00000010 ae 03 ea 79 bb 0a ad bd 83 14 b1 54 fd 30 2c 69 |...y.......T.0,i| +00000020 ab 0b 6c f8 02 20 00 ca c1 70 28 1f 17 e9 2b ee |..l.. ...p(...+.| +00000030 7e f9 92 30 63 c2 d2 04 83 68 01 71 c0 21 6b 81 |~..0c....h.q.!k.| +00000040 48 d4 2b 33 46 2a |H.+3F*|" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func2 -> DEBU 44f4 0xc003f5d930 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:34.978 UTC [cauthdsl] func1 -> DEBU 44f5 0xc003f5d930 gate 1569284794978596900 evaluation succeeds" +"2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44f6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:34.978 UTC [policies] Evaluate -> DEBU 44f8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:34.979 UTC [policies] Evaluate -> DEBU 44f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:34.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 44fa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 44fb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:34.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 44fc updating membership: timestamp: " +"2019-09-24 00:26:34.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 44fd Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:34.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 44fe Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:34.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 44ff Exiting" +"2019-09-24 00:26:34.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 4500 Exiting" +"2019-09-24 00:26:34.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4501 Exiting" +"2019-09-24 00:26:34.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4502 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4503 Exiting" +"2019-09-24 00:26:34.979 UTC [gossip.gossip] handleMessage -> DEBU 4504 Exiting" +"2019-09-24 00:26:34.979 UTC [gossip.gossip] handleMessage -> DEBU 4505 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.979 UTC [gossip.gossip] handleMessage -> DEBU 4506 Exiting" +"2019-09-24 00:26:34.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4507 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4508 Exiting" +"2019-09-24 00:26:34.986 UTC [msp] DeserializeIdentity -> DEBU 4509 Obtaining identity" +"2019-09-24 00:26:34.988 UTC [msp] DeserializeIdentity -> DEBU 450a Obtaining identity" +"2019-09-24 00:26:34.988 UTC [msp] DeserializeIdentity -> DEBU 450b Obtaining identity" +"2019-09-24 00:26:34.988 UTC [msp] DeserializeIdentity -> DEBU 450c Obtaining identity" +"2019-09-24 00:26:34.988 UTC [msp] DeserializeIdentity -> DEBU 450d Obtaining identity" +"2019-09-24 00:26:34.989 UTC [msp] DeserializeIdentity -> DEBU 450e Obtaining identity" +"2019-09-24 00:26:34.989 UTC [msp] DeserializeIdentity -> DEBU 450f Obtaining identity" +"2019-09-24 00:26:34.989 UTC [gossip.comm] Send -> DEBU 4510 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:34.990 UTC [msp] DeserializeIdentity -> DEBU 4511 Obtaining identity" +"2019-09-24 00:26:34.990 UTC [gossip.comm] sendToEndpoint -> DEBU 4512 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.990 UTC [gossip.comm] sendToEndpoint -> DEBU 4513 Exiting" +"2019-09-24 00:26:34.990 UTC [gossip.comm] Send -> DEBU 4514 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:34.990 UTC [gossip.comm] sendToEndpoint -> DEBU 4515 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:34.990 UTC [gossip.comm] sendToEndpoint -> DEBU 4516 Exiting" +"2019-09-24 00:26:35.690 UTC [gossip.gossip] handleMessage -> DEBU 4517 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.690 UTC [gossip.gossip] handleMessage -> DEBU 4518 Exiting" +"2019-09-24 00:26:35.690 UTC [gossip.comm] func1 -> DEBU 4519 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.690 UTC [gossip.gossip] handleMessage -> DEBU 451a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 451b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.690 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 451c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:35.690 UTC [msp] DeserializeIdentity -> DEBU 451d Obtaining identity" +"2019-09-24 00:26:35.691 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 451e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:35.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 451f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:35.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4520 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:35.691 UTC [policies] Evaluate -> DEBU 4521 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:35.691 UTC [policies] Evaluate -> DEBU 4522 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:35.691 UTC [policies] Evaluate -> DEBU 4523 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:35.691 UTC [cauthdsl] func1 -> DEBU 4524 0xc004a5d750 gate 1569284795691960900 evaluation starts" +"2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 4525 0xc004a5d750 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 4526 0xc004a5d750 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 4527 0xc004a5d750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 4528 0xc004a5d750 principal evaluation fails" +"2019-09-24 00:26:35.692 UTC [cauthdsl] func1 -> DEBU 4529 0xc004a5d750 gate 1569284795691960900 evaluation fails" +"2019-09-24 00:26:35.692 UTC [policies] Evaluate -> DEBU 452a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:35.692 UTC [policies] Evaluate -> DEBU 452b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:35.692 UTC [policies] Evaluate -> DEBU 452c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:35.692 UTC [cauthdsl] func1 -> DEBU 452d 0xc004a5df90 gate 1569284795692697900 evaluation starts" +"2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 452e 0xc004a5df90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 452f 0xc004a5df90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:35.692 UTC [cauthdsl] func2 -> DEBU 4530 0xc004a5df90 principal matched by identity 0" +"2019-09-24 00:26:35.692 UTC [msp.identity] Verify -> DEBU 4531 Verify: digest = 00000000 5e b5 da 40 64 69 c9 08 85 ff d3 21 22 b2 d8 fb |^..@di.....!"...| +00000010 6a a6 bd 15 13 b9 5d f6 db b3 1c dd 84 22 ab 3a |j.....]......".:|" +"2019-09-24 00:26:35.692 UTC [msp.identity] Verify -> DEBU 4532 Verify: sig = 00000000 30 44 02 20 36 cd f8 df 9e ad fc 12 24 ec c4 2e |0D. 6.......$...| +00000010 34 91 79 c1 a6 de ed ce c3 d8 0a 40 b6 2c bf 51 |4.y........@.,.Q| +00000020 6e f8 73 77 02 20 52 af 05 38 15 50 85 5c 30 b3 |n.sw. R..8.P.\0.| +00000030 0e 44 bc da ad 50 eb 37 3b 8c 4d 95 d8 e4 1f 2b |.D...P.7;.M....+| +00000040 75 f3 74 d5 e9 10 |u.t...|" +"2019-09-24 00:26:35.694 UTC [cauthdsl] func2 -> DEBU 4533 0xc004a5df90 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:35.694 UTC [cauthdsl] func1 -> DEBU 4534 0xc004a5df90 gate 1569284795692697900 evaluation succeeds" +"2019-09-24 00:26:35.694 UTC [policies] Evaluate -> DEBU 4535 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:35.694 UTC [policies] Evaluate -> DEBU 4536 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:35.694 UTC [policies] Evaluate -> DEBU 4537 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:35.694 UTC [policies] Evaluate -> DEBU 4538 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:35.694 UTC [gossip.discovery] handleAliveMessage -> DEBU 4539 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 453a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:35.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 453b updating membership: timestamp: " +"2019-09-24 00:26:35.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 453c Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:35.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 453d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:35.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 453e Exiting" +"2019-09-24 00:26:35.694 UTC [gossip.discovery] handleAliveMessage -> DEBU 453f Exiting" +"2019-09-24 00:26:35.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4540 Exiting" +"2019-09-24 00:26:35.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4541 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.694 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4542 Exiting" +"2019-09-24 00:26:35.694 UTC [gossip.gossip] handleMessage -> DEBU 4543 Exiting" +"2019-09-24 00:26:35.704 UTC [msp] DeserializeIdentity -> DEBU 4544 Obtaining identity" +"2019-09-24 00:26:35.705 UTC [msp] DeserializeIdentity -> DEBU 4545 Obtaining identity" +"2019-09-24 00:26:35.705 UTC [msp] DeserializeIdentity -> DEBU 4546 Obtaining identity" +"2019-09-24 00:26:35.706 UTC [msp] DeserializeIdentity -> DEBU 4547 Obtaining identity" +"2019-09-24 00:26:35.706 UTC [msp] DeserializeIdentity -> DEBU 4548 Obtaining identity" +"2019-09-24 00:26:35.706 UTC [msp] DeserializeIdentity -> DEBU 4549 Obtaining identity" +"2019-09-24 00:26:35.707 UTC [msp] DeserializeIdentity -> DEBU 454a Obtaining identity" +"2019-09-24 00:26:35.709 UTC [gossip.comm] Send -> DEBU 454b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:35.710 UTC [msp] DeserializeIdentity -> DEBU 454c Obtaining identity" +"2019-09-24 00:26:35.712 UTC [gossip.comm] Send -> DEBU 454d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:35.712 UTC [gossip.comm] sendToEndpoint -> DEBU 454e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.712 UTC [gossip.comm] sendToEndpoint -> DEBU 454f Exiting" +"2019-09-24 00:26:35.713 UTC [gossip.comm] sendToEndpoint -> DEBU 4550 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.713 UTC [gossip.comm] sendToEndpoint -> DEBU 4551 Exiting" +"2019-09-24 00:26:35.713 UTC [gossip.comm] func1 -> DEBU 4552 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.713 UTC [gossip.gossip] handleMessage -> DEBU 4553 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.715 UTC [gossip.gossip] handleMessage -> DEBU 4554 Exiting" +"2019-09-24 00:26:35.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4555 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4556 Exiting" +"2019-09-24 00:26:35.725 UTC [gossip.pull] Hello -> DEBU 4557 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:35.727 UTC [gossip.comm] Send -> DEBU 4558 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:35.727 UTC [gossip.pull] Hello -> DEBU 4559 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:35.727 UTC [gossip.comm] Send -> DEBU 455a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:35.727 UTC [gossip.pull] Hello -> DEBU 455b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:35.727 UTC [gossip.comm] Send -> DEBU 455c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:35.727 UTC [gossip.comm] sendToEndpoint -> DEBU 455d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.727 UTC [gossip.comm] sendToEndpoint -> DEBU 455e Exiting" +"2019-09-24 00:26:35.728 UTC [gossip.comm] sendToEndpoint -> DEBU 455f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.728 UTC [gossip.comm] sendToEndpoint -> DEBU 4560 Exiting" +"2019-09-24 00:26:35.728 UTC [gossip.comm] sendToEndpoint -> DEBU 4561 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.728 UTC [gossip.comm] sendToEndpoint -> DEBU 4562 Exiting" +"2019-09-24 00:26:35.734 UTC [gossip.gossip] handleMessage -> DEBU 4563 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.734 UTC [gossip.pull] HandleMessage -> DEBU 4564 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.734 UTC [gossip.gossip] handleMessage -> DEBU 4565 Exiting" +"2019-09-24 00:26:35.734 UTC [gossip.comm] func1 -> DEBU 4566 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.734 UTC [gossip.gossip] handleMessage -> DEBU 4567 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.734 UTC [gossip.pull] HandleMessage -> DEBU 4568 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.735 UTC [gossip.gossip] handleMessage -> DEBU 4569 Exiting" +"2019-09-24 00:26:35.736 UTC [gossip.comm] func1 -> DEBU 456a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.736 UTC [gossip.gossip] handleMessage -> DEBU 456b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.736 UTC [gossip.pull] HandleMessage -> DEBU 456c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.736 UTC [gossip.gossip] handleMessage -> DEBU 456d Exiting" +"2019-09-24 00:26:35.868 UTC [msp] GetDefaultSigningIdentity -> DEBU 456e Obtaining default signing identity" +"2019-09-24 00:26:35.869 UTC [msp.identity] Sign -> DEBU 456f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103E " +"2019-09-24 00:26:35.869 UTC [msp.identity] Sign -> DEBU 4570 Sign: digest: 63E93A48508A6FEC0025660C7A04DB8A5FF0E2BBDAC74A6BA4DB1AC8A625B5F3 " +"2019-09-24 00:26:35.869 UTC [msp] GetDefaultSigningIdentity -> DEBU 4571 Obtaining default signing identity" +"2019-09-24 00:26:35.869 UTC [msp.identity] Sign -> DEBU 4572 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:35.870 UTC [msp.identity] Sign -> DEBU 4573 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:35.870 UTC [gossip.comm] Send -> DEBU 4574 Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:35.870 UTC [msp] DeserializeIdentity -> DEBU 4575 Obtaining identity" +"2019-09-24 00:26:35.870 UTC [gossip.comm] Send -> DEBU 4576 Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:35.870 UTC [msp] DeserializeIdentity -> DEBU 4577 Obtaining identity" +"2019-09-24 00:26:35.870 UTC [gossip.comm] Send -> DEBU 4578 Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 4579 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 457a Exiting" +"2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 457b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 457c Exiting" +"2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 457d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0D\002 \014\022\206N\223\342\202\315\032/\2463K'\300\031\000\032\037\341\232T\357\332\255\2026\000\2062\230\211\002 q\221\351\027L%JK\027c\3712\204\261\204-\202C\241I\005\273~\273\004\205\251\357\220\177\214\301" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.870 UTC [gossip.comm] sendToEndpoint -> DEBU 457e Exiting" +"2019-09-24 00:26:35.873 UTC [gossip.comm] func1 -> DEBU 457f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.873 UTC [gossip.gossip] handleMessage -> DEBU 4580 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.873 UTC [gossip.gossip] handleMessage -> DEBU 4581 Exiting" +"2019-09-24 00:26:35.873 UTC [gossip.comm] func1 -> DEBU 4582 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.873 UTC [gossip.gossip] handleMessage -> DEBU 4583 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.873 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4584 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.873 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4585 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:35.873 UTC [msp.identity] Verify -> DEBU 4586 Verify: digest = 00000000 63 e9 3a 48 50 8a 6f ec 00 25 66 0c 7a 04 db 8a |c.:HP.o..%f.z...| +00000010 5f f0 e2 bb da c7 4a 6b a4 db 1a c8 a6 25 b5 f3 |_.....Jk.....%..|" +"2019-09-24 00:26:35.873 UTC [msp.identity] Verify -> DEBU 4587 Verify: sig = 00000000 30 44 02 20 0c 12 86 4e 93 e2 82 cd 1a 2f a6 33 |0D. ...N...../.3| +00000010 4b 27 c0 19 00 1a 1f e1 9a 54 ef da ad 82 36 00 |K'.......T....6.| +00000020 86 32 98 89 02 20 71 91 e9 17 4c 25 4a 4b 17 63 |.2... q...L%JK.c| +00000030 f9 32 84 b1 84 2d 82 43 a1 49 05 bb 7e bb 04 85 |.2...-.C.I..~...| +00000040 a9 ef 90 7f 8c c1 |......|" +"2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 4588 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.874 UTC [gossip.discovery] isSentByMe -> DEBU 4589 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 458a Exiting" +"2019-09-24 00:26:35.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 458b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:35.874 UTC [msp.identity] Verify -> DEBU 458c Verify: digest = 00000000 01 f7 2c dd a9 9c 86 ed ce 50 fd 46 4a 2b 20 06 |..,......P.FJ+ .| +00000010 9b 0d 3d e6 c5 91 e1 dc 2e 5c d2 fc 45 62 be 70 |..=......\..Eb.p|" +"2019-09-24 00:26:35.874 UTC [msp.identity] Verify -> DEBU 458d Verify: sig = 00000000 30 44 02 20 48 27 b7 11 ce f9 a8 9e d6 f7 1f 9b |0D. H'..........| +00000010 9d 0f 49 fa ac 49 e7 5a eb 05 b8 ae 98 01 f5 3c |..I..I.Z.......<| +00000020 87 32 e4 22 02 20 13 ec de 91 ea 37 a0 51 c6 18 |.2.". .....7.Q..| +00000030 0d 64 7b 24 48 51 52 a2 0f 35 9a 8e 77 63 1e ea |.d{$HQR..5..wc..| +00000040 08 51 02 be e3 a2 |.Q....|" +"2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 458e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 458f Exiting" +"2019-09-24 00:26:35.874 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4590 Exiting" +"2019-09-24 00:26:35.874 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4591 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4592 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:35.874 UTC [gossip.gossip] handleMessage -> DEBU 4593 Exiting" +"2019-09-24 00:26:35.874 UTC [gossip.gossip] handleMessage -> DEBU 4595 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.874 UTC [msp.identity] Verify -> DEBU 4594 Verify: digest = 00000000 63 e9 3a 48 50 8a 6f ec 00 25 66 0c 7a 04 db 8a |c.:HP.o..%f.z...| +00000010 5f f0 e2 bb da c7 4a 6b a4 db 1a c8 a6 25 b5 f3 |_.....Jk.....%..|" +"2019-09-24 00:26:35.874 UTC [msp.identity] Verify -> DEBU 4596 Verify: sig = 00000000 30 44 02 20 0c 12 86 4e 93 e2 82 cd 1a 2f a6 33 |0D. ...N...../.3| +00000010 4b 27 c0 19 00 1a 1f e1 9a 54 ef da ad 82 36 00 |K'.......T....6.| +00000020 86 32 98 89 02 20 71 91 e9 17 4c 25 4a 4b 17 63 |.2... q...L%JK.c| +00000030 f9 32 84 b1 84 2d 82 43 a1 49 05 bb 7e bb 04 85 |.2...-.C.I..~...| +00000040 a9 ef 90 7f 8c c1 |......|" +"2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 4597 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.874 UTC [gossip.discovery] isSentByMe -> DEBU 4598 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 4599 Exiting" +"2019-09-24 00:26:35.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 459a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 459b Verify: digest = 00000000 01 f7 2c dd a9 9c 86 ed ce 50 fd 46 4a 2b 20 06 |..,......P.FJ+ .| +00000010 9b 0d 3d e6 c5 91 e1 dc 2e 5c d2 fc 45 62 be 70 |..=......\..Eb.p|" +"2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 459c Verify: sig = 00000000 30 44 02 20 48 27 b7 11 ce f9 a8 9e d6 f7 1f 9b |0D. H'..........| +00000010 9d 0f 49 fa ac 49 e7 5a eb 05 b8 ae 98 01 f5 3c |..I..I.Z.......<| +00000020 87 32 e4 22 02 20 13 ec de 91 ea 37 a0 51 c6 18 |.2.". .....7.Q..| +00000030 0d 64 7b 24 48 51 52 a2 0f 35 9a 8e 77 63 1e ea |.d{$HQR..5..wc..| +00000040 08 51 02 be e3 a2 |.Q....|" +"2019-09-24 00:26:35.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 459d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:35.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 459e Exiting" +"2019-09-24 00:26:35.875 UTC [gossip.discovery] handleMsgFromComm -> DEBU 459f Exiting" +"2019-09-24 00:26:35.875 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45a0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.875 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45a1 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 45a2 Verify: digest = 00000000 63 e9 3a 48 50 8a 6f ec 00 25 66 0c 7a 04 db 8a |c.:HP.o..%f.z...| +00000010 5f f0 e2 bb da c7 4a 6b a4 db 1a c8 a6 25 b5 f3 |_.....Jk.....%..|" +"2019-09-24 00:26:35.875 UTC [gossip.gossip] handleMessage -> DEBU 45a3 Exiting" +"2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 45a4 Verify: sig = 00000000 30 44 02 20 0c 12 86 4e 93 e2 82 cd 1a 2f a6 33 |0D. ...N...../.3| +00000010 4b 27 c0 19 00 1a 1f e1 9a 54 ef da ad 82 36 00 |K'.......T....6.| +00000020 86 32 98 89 02 20 71 91 e9 17 4c 25 4a 4b 17 63 |.2... q...L%JK.c| +00000030 f9 32 84 b1 84 2d 82 43 a1 49 05 bb 7e bb 04 85 |.2...-.C.I..~...| +00000040 a9 ef 90 7f 8c c1 |......|" +"2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 45a5 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:35.875 UTC [msp.identity] Verify -> DEBU 45a6 Verify: sig = 00000000 30 45 02 21 00 8e 99 3f 2a af 6c 85 40 0e fe 10 |0E.!...?*.l.@...| +00000010 08 9d 96 e4 74 7c e9 36 bb 07 24 47 a5 b8 90 bb |....t|.6..$G....| +00000020 50 fb 5c 01 ee 02 20 51 a8 cd 35 19 55 f8 51 57 |P.\... Q..5.U.QW| +00000030 f1 aa 35 31 e4 08 f5 ec 8f d4 a3 12 ad f2 74 be |..51..........t.| +00000040 96 92 6f a4 0c 42 52 |..o..BR|" +"2019-09-24 00:26:35.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 45a7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:35.875 UTC [gossip.discovery] isSentByMe -> DEBU 45a8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:35.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 45a9 Exiting" +"2019-09-24 00:26:35.875 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45aa Exiting" +"2019-09-24 00:26:35.961 UTC [gossip.gossip] handleMessage -> DEBU 45ab Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.961 UTC [gossip.pull] HandleMessage -> DEBU 45ac GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:35.961 UTC [msp] DeserializeIdentity -> DEBU 45ad Obtaining identity" +"2019-09-24 00:26:35.961 UTC [msp] DeserializeIdentity -> DEBU 45ae Obtaining identity" +"2019-09-24 00:26:35.962 UTC [msp] DeserializeIdentity -> DEBU 45af Obtaining identity" +"2019-09-24 00:26:35.962 UTC [msp] DeserializeIdentity -> DEBU 45b0 Obtaining identity" +"2019-09-24 00:26:35.962 UTC [msp] DeserializeIdentity -> DEBU 45b1 Obtaining identity" +"2019-09-24 00:26:35.962 UTC [msp] DeserializeIdentity -> DEBU 45b2 Obtaining identity" +"2019-09-24 00:26:35.962 UTC [gossip.pull] SendDigest -> DEBU 45b3 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:35.962 UTC [gossip.gossip] handleMessage -> DEBU 45b4 Exiting" +"2019-09-24 00:26:36.040 UTC [gossip.gossip] handleMessage -> DEBU 45b5 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.040 UTC [gossip.gossip] handleMessage -> DEBU 45b6 Exiting" +"2019-09-24 00:26:36.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.040 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45b8 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:36.040 UTC [msp] DeserializeIdentity -> DEBU 45b9 Obtaining identity" +"2019-09-24 00:26:36.041 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 45ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:36.041 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45bb Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.041 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45bc Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.041 UTC [policies] Evaluate -> DEBU 45bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:36.041 UTC [policies] Evaluate -> DEBU 45be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:36.041 UTC [policies] Evaluate -> DEBU 45bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:36.041 UTC [cauthdsl] func1 -> DEBU 45c0 0xc00385e610 gate 1569284796041705400 evaluation starts" +"2019-09-24 00:26:36.041 UTC [cauthdsl] func2 -> DEBU 45c1 0xc00385e610 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.041 UTC [cauthdsl] func2 -> DEBU 45c2 0xc00385e610 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.041 UTC [cauthdsl] func2 -> DEBU 45c3 0xc00385e610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:36.041 UTC [cauthdsl] func2 -> DEBU 45c4 0xc00385e610 principal evaluation fails" +"2019-09-24 00:26:36.041 UTC [cauthdsl] func1 -> DEBU 45c5 0xc00385e610 gate 1569284796041705400 evaluation fails" +"2019-09-24 00:26:36.041 UTC [policies] Evaluate -> DEBU 45c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.041 UTC [policies] Evaluate -> DEBU 45c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.042 UTC [policies] Evaluate -> DEBU 45c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:36.042 UTC [cauthdsl] func1 -> DEBU 45c9 0xc00385ee50 gate 1569284796042042500 evaluation starts" +"2019-09-24 00:26:36.042 UTC [cauthdsl] func2 -> DEBU 45ca 0xc00385ee50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.042 UTC [cauthdsl] func2 -> DEBU 45cb 0xc00385ee50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.042 UTC [cauthdsl] func2 -> DEBU 45cc 0xc00385ee50 principal matched by identity 0" +"2019-09-24 00:26:36.042 UTC [msp.identity] Verify -> DEBU 45cd Verify: digest = 00000000 4b ab 75 6b 60 22 fc 7a 4e 10 05 92 d2 7a 90 6c |K.uk`".zN....z.l| +00000010 5c 84 ad 99 96 87 cc 58 dc c9 2f 78 85 22 32 9a |\......X../x."2.|" +"2019-09-24 00:26:36.042 UTC [msp.identity] Verify -> DEBU 45ce Verify: sig = 00000000 30 44 02 20 5b c5 9d 89 69 30 6b d7 68 fa a2 2d |0D. [...i0k.h..-| +00000010 fc 9d 56 d6 f3 d7 5c d3 93 c8 20 a9 4a 35 7a cc |..V...\... .J5z.| +00000020 46 26 54 59 02 20 0c 86 89 7e 9b 9b 22 97 26 97 |F&TY. ...~..".&.| +00000030 7f ef 2a bd e1 94 9e 72 c1 83 68 35 05 77 09 9e |..*....r..h5.w..| +00000040 b0 0e 04 20 b1 f5 |... ..|" +"2019-09-24 00:26:36.042 UTC [cauthdsl] func2 -> DEBU 45cf 0xc00385ee50 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:36.042 UTC [cauthdsl] func1 -> DEBU 45d0 0xc00385ee50 gate 1569284796042042500 evaluation succeeds" +"2019-09-24 00:26:36.042 UTC [policies] Evaluate -> DEBU 45d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.042 UTC [policies] Evaluate -> DEBU 45d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.042 UTC [policies] Evaluate -> DEBU 45d3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:36.042 UTC [policies] Evaluate -> DEBU 45d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:36.042 UTC [gossip.discovery] handleAliveMessage -> DEBU 45d5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:36.042 UTC [gossip.discovery] learnExistingMembers -> DEBU 45d6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:36.042 UTC [gossip.discovery] learnExistingMembers -> DEBU 45d7 updating membership: timestamp: " +"2019-09-24 00:26:36.043 UTC [gossip.discovery] learnExistingMembers -> DEBU 45d8 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:36.043 UTC [gossip.discovery] learnExistingMembers -> DEBU 45d9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:36.043 UTC [gossip.discovery] learnExistingMembers -> DEBU 45da Exiting" +"2019-09-24 00:26:36.043 UTC [gossip.discovery] handleAliveMessage -> DEBU 45db Exiting" +"2019-09-24 00:26:36.043 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45dc Exiting" +"2019-09-24 00:26:36.043 UTC [gossip.discovery] sendMemResponse -> DEBU 45dd Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:36.044 UTC [msp] DeserializeIdentity -> DEBU 45de Obtaining identity" +"2019-09-24 00:26:36.044 UTC [msp] DeserializeIdentity -> DEBU 45df Obtaining identity" +"2019-09-24 00:26:36.044 UTC [msp] DeserializeIdentity -> DEBU 45e0 Obtaining identity" +"2019-09-24 00:26:36.044 UTC [gossip.comm] Send -> DEBU 45e1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:36.044 UTC [gossip.discovery] sendMemResponse -> DEBU 45e2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" > alive: alive: alive: " +"2019-09-24 00:26:36.044 UTC [gossip.comm] sendToEndpoint -> DEBU 45e3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.044 UTC [gossip.comm] sendToEndpoint -> DEBU 45e4 Exiting" +"2019-09-24 00:26:36.115 UTC [msp] DeserializeIdentity -> DEBU 45e5 Obtaining identity" +"2019-09-24 00:26:36.115 UTC [msp] DeserializeIdentity -> DEBU 45e6 Obtaining identity" +"2019-09-24 00:26:36.115 UTC [gossip.comm] Send -> DEBU 45e7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:36.115 UTC [gossip.comm] sendToEndpoint -> DEBU 45e8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.115 UTC [gossip.comm] sendToEndpoint -> DEBU 45e9 Exiting" +"2019-09-24 00:26:36.116 UTC [gossip.comm] sendToEndpoint -> DEBU 45ea Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.116 UTC [gossip.comm] sendToEndpoint -> DEBU 45eb Exiting" +"2019-09-24 00:26:36.116 UTC [gossip.comm] sendToEndpoint -> DEBU 45ec Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.116 UTC [gossip.comm] sendToEndpoint -> DEBU 45ed Exiting" +"2019-09-24 00:26:36.125 UTC [gossip.comm] func1 -> DEBU 45ee Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.125 UTC [gossip.gossip] handleMessage -> DEBU 45ef Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.125 UTC [msp] DeserializeIdentity -> DEBU 45f0 Obtaining identity" +"2019-09-24 00:26:36.125 UTC [msp] DeserializeIdentity -> DEBU 45f1 Obtaining identity" +"2019-09-24 00:26:36.125 UTC [msp] DeserializeIdentity -> DEBU 45f2 Obtaining identity" +"2019-09-24 00:26:36.125 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 45f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:36.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45f4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45f5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 45f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 45f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 45f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func1 -> DEBU 45f9 0xc003066390 gate 1569284796126185000 evaluation starts" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 45fa 0xc003066390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 45fb 0xc003066390 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 45fc 0xc003066390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 45fd 0xc003066390 principal evaluation fails" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func1 -> DEBU 45fe 0xc003066390 gate 1569284796126185000 evaluation fails" +"2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 45ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 4600 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 4601 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func1 -> DEBU 4602 0xc003066bd0 gate 1569284796126483400 evaluation starts" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 4603 0xc003066bd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 4604 0xc003066bd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 4605 0xc003066bd0 principal matched by identity 0" +"2019-09-24 00:26:36.126 UTC [msp.identity] Verify -> DEBU 4606 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:36.126 UTC [msp.identity] Verify -> DEBU 4607 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func2 -> DEBU 4608 0xc003066bd0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:36.126 UTC [cauthdsl] func1 -> DEBU 4609 0xc003066bd0 gate 1569284796126483400 evaluation succeeds" +"2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 460a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.126 UTC [policies] Evaluate -> DEBU 460b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.127 UTC [policies] Evaluate -> DEBU 460c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:36.127 UTC [policies] Evaluate -> DEBU 460d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:36.127 UTC [msp.identity] Verify -> DEBU 460e Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:36.127 UTC [msp.identity] Verify -> DEBU 460f Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:36.127 UTC [msp] DeserializeIdentity -> DEBU 4610 Obtaining identity" +"2019-09-24 00:26:36.127 UTC [msp] DeserializeIdentity -> DEBU 4611 Obtaining identity" +"2019-09-24 00:26:36.127 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4612 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:36.127 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4613 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.127 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4614 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.127 UTC [policies] Evaluate -> DEBU 4615 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:36.127 UTC [policies] Evaluate -> DEBU 4616 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:36.127 UTC [policies] Evaluate -> DEBU 4617 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:36.127 UTC [cauthdsl] func1 -> DEBU 4618 0xc003078ac0 gate 1569284796127957900 evaluation starts" +"2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 4619 0xc003078ac0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 461a 0xc003078ac0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 461b 0xc003078ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 461c 0xc003078ac0 principal evaluation fails" +"2019-09-24 00:26:36.128 UTC [cauthdsl] func1 -> DEBU 461d 0xc003078ac0 gate 1569284796127957900 evaluation fails" +"2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 461e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 461f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 4620 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:36.128 UTC [cauthdsl] func1 -> DEBU 4621 0xc003079300 gate 1569284796128312800 evaluation starts" +"2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 4622 0xc003079300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 4623 0xc003079300 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 4624 0xc003079300 principal matched by identity 0" +"2019-09-24 00:26:36.128 UTC [msp.identity] Verify -> DEBU 4625 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:36.128 UTC [msp.identity] Verify -> DEBU 4626 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:36.128 UTC [cauthdsl] func2 -> DEBU 4627 0xc003079300 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:36.128 UTC [cauthdsl] func1 -> DEBU 4628 0xc003079300 gate 1569284796128312800 evaluation succeeds" +"2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 4629 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 462a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 462b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:36.128 UTC [policies] Evaluate -> DEBU 462c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:36.128 UTC [msp.identity] Verify -> DEBU 462d Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:36.129 UTC [msp.identity] Verify -> DEBU 462e Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:36.129 UTC [gossip.gossip] handleMessage -> DEBU 462f Exiting" +"2019-09-24 00:26:36.129 UTC [gossip.gossip] handleMessage -> DEBU 4630 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.129 UTC [msp] DeserializeIdentity -> DEBU 4631 Obtaining identity" +"2019-09-24 00:26:36.129 UTC [msp] DeserializeIdentity -> DEBU 4632 Obtaining identity" +"2019-09-24 00:26:36.129 UTC [msp] DeserializeIdentity -> DEBU 4633 Obtaining identity" +"2019-09-24 00:26:36.129 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4634 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:36.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4635 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4636 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.129 UTC [policies] Evaluate -> DEBU 4637 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:36.129 UTC [policies] Evaluate -> DEBU 4638 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:36.129 UTC [policies] Evaluate -> DEBU 4639 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func1 -> DEBU 463a 0xc003255560 gate 1569284796130000900 evaluation starts" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 463b 0xc003255560 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 463c 0xc003255560 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 463d 0xc003255560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 463e 0xc003255560 principal evaluation fails" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func1 -> DEBU 463f 0xc003255560 gate 1569284796130000900 evaluation fails" +"2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 4640 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 4641 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 4642 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func1 -> DEBU 4643 0xc003255da0 gate 1569284796130322600 evaluation starts" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 4644 0xc003255da0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 4645 0xc003255da0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 4646 0xc003255da0 principal matched by identity 0" +"2019-09-24 00:26:36.130 UTC [msp.identity] Verify -> DEBU 4647 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:36.130 UTC [msp.identity] Verify -> DEBU 4648 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func2 -> DEBU 4649 0xc003255da0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:36.130 UTC [cauthdsl] func1 -> DEBU 464a 0xc003255da0 gate 1569284796130322600 evaluation succeeds" +"2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 464b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 464c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 464d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:36.130 UTC [policies] Evaluate -> DEBU 464e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:36.130 UTC [msp.identity] Verify -> DEBU 464f Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:36.131 UTC [msp.identity] Verify -> DEBU 4650 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:36.131 UTC [msp.identity] Verify -> DEBU 4651 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:36.131 UTC [msp.identity] Verify -> DEBU 4652 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:36.131 UTC [msp] DeserializeIdentity -> DEBU 4653 Obtaining identity" +"2019-09-24 00:26:36.131 UTC [msp] DeserializeIdentity -> DEBU 4654 Obtaining identity" +"2019-09-24 00:26:36.131 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4655 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:36.131 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4656 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.131 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4657 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.131 UTC [policies] Evaluate -> DEBU 4658 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:36.131 UTC [policies] Evaluate -> DEBU 4659 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:36.131 UTC [policies] Evaluate -> DEBU 465a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:36.131 UTC [cauthdsl] func1 -> DEBU 465b 0xc0028d43b0 gate 1569284796131915900 evaluation starts" +"2019-09-24 00:26:36.131 UTC [cauthdsl] func2 -> DEBU 465c 0xc0028d43b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.131 UTC [cauthdsl] func2 -> DEBU 465d 0xc0028d43b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.132 UTC [cauthdsl] func2 -> DEBU 465e 0xc0028d43b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:36.132 UTC [cauthdsl] func2 -> DEBU 465f 0xc0028d43b0 principal evaluation fails" +"2019-09-24 00:26:36.132 UTC [cauthdsl] func1 -> DEBU 4660 0xc0028d43b0 gate 1569284796131915900 evaluation fails" +"2019-09-24 00:26:36.156 UTC [policies] Evaluate -> DEBU 4661 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.156 UTC [gossip.comm] func1 -> DEBU 4662 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.156 UTC [policies] Evaluate -> DEBU 4663 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.156 UTC [policies] Evaluate -> DEBU 4664 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:36.156 UTC [cauthdsl] func1 -> DEBU 4665 0xc003846db0 gate 1569284796156924300 evaluation starts" +"2019-09-24 00:26:36.157 UTC [cauthdsl] func2 -> DEBU 4666 0xc003846db0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.157 UTC [cauthdsl] func2 -> DEBU 4667 0xc003846db0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.157 UTC [cauthdsl] func2 -> DEBU 4668 0xc003846db0 principal matched by identity 0" +"2019-09-24 00:26:36.157 UTC [msp.identity] Verify -> DEBU 4669 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:36.157 UTC [msp.identity] Verify -> DEBU 466a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:36.157 UTC [cauthdsl] func2 -> DEBU 466b 0xc003846db0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:36.157 UTC [cauthdsl] func1 -> DEBU 466c 0xc003846db0 gate 1569284796156924300 evaluation succeeds" +"2019-09-24 00:26:36.157 UTC [policies] Evaluate -> DEBU 466d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.157 UTC [policies] Evaluate -> DEBU 466e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.157 UTC [policies] Evaluate -> DEBU 466f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:36.157 UTC [policies] Evaluate -> DEBU 4670 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:36.157 UTC [gossip.gossip] handleMessage -> DEBU 4671 Exiting" +"2019-09-24 00:26:36.157 UTC [gossip.gossip] handleMessage -> DEBU 4672 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.157 UTC [msp.identity] Verify -> DEBU 4673 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:36.157 UTC [msp.identity] Verify -> DEBU 4674 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:36.158 UTC [msp.identity] Verify -> DEBU 4675 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:36.158 UTC [msp.identity] Verify -> DEBU 4676 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:36.158 UTC [msp] DeserializeIdentity -> DEBU 4677 Obtaining identity" +"2019-09-24 00:26:36.158 UTC [msp] DeserializeIdentity -> DEBU 4678 Obtaining identity" +"2019-09-24 00:26:36.158 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4679 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:36.158 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 467a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.158 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 467b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.158 UTC [policies] Evaluate -> DEBU 467c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:36.158 UTC [policies] Evaluate -> DEBU 467d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:36.158 UTC [policies] Evaluate -> DEBU 467e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:36.158 UTC [cauthdsl] func1 -> DEBU 467f 0xc004c43600 gate 1569284796158612200 evaluation starts" +"2019-09-24 00:26:36.158 UTC [cauthdsl] func2 -> DEBU 4680 0xc004c43600 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.158 UTC [cauthdsl] func2 -> DEBU 4681 0xc004c43600 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.158 UTC [cauthdsl] func2 -> DEBU 4682 0xc004c43600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:36.158 UTC [cauthdsl] func2 -> DEBU 4683 0xc004c43600 principal evaluation fails" +"2019-09-24 00:26:36.164 UTC [cauthdsl] func1 -> DEBU 4684 0xc004c43600 gate 1569284796158612200 evaluation fails" +"2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4685 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4686 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4687 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:36.164 UTC [cauthdsl] func1 -> DEBU 4688 0xc004c43e40 gate 1569284796164536700 evaluation starts" +"2019-09-24 00:26:36.164 UTC [cauthdsl] func2 -> DEBU 4689 0xc004c43e40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.164 UTC [cauthdsl] func2 -> DEBU 468a 0xc004c43e40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.164 UTC [cauthdsl] func2 -> DEBU 468b 0xc004c43e40 principal matched by identity 0" +"2019-09-24 00:26:36.164 UTC [msp.identity] Verify -> DEBU 468c Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:36.164 UTC [msp.identity] Verify -> DEBU 468d Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:36.164 UTC [cauthdsl] func2 -> DEBU 468e 0xc004c43e40 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:36.164 UTC [cauthdsl] func1 -> DEBU 468f 0xc004c43e40 gate 1569284796164536700 evaluation succeeds" +"2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4690 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4691 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4692 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:36.164 UTC [policies] Evaluate -> DEBU 4693 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:36.165 UTC [msp] DeserializeIdentity -> DEBU 4694 Obtaining identity" +"2019-09-24 00:26:36.165 UTC [msp] DeserializeIdentity -> DEBU 4695 Obtaining identity" +"2019-09-24 00:26:36.165 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4696 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:36.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4697 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4698 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 4699 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 469a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 469b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:36.165 UTC [cauthdsl] func1 -> DEBU 469c 0xc004c51610 gate 1569284796165514300 evaluation starts" +"2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 469d 0xc004c51610 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 469e 0xc004c51610 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 469f 0xc004c51610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 46a0 0xc004c51610 principal evaluation fails" +"2019-09-24 00:26:36.165 UTC [cauthdsl] func1 -> DEBU 46a1 0xc004c51610 gate 1569284796165514300 evaluation fails" +"2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 46a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 46a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.165 UTC [policies] Evaluate -> DEBU 46a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:36.165 UTC [cauthdsl] func1 -> DEBU 46a5 0xc004c51e50 gate 1569284796165787400 evaluation starts" +"2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 46a6 0xc004c51e50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 46a7 0xc004c51e50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.165 UTC [cauthdsl] func2 -> DEBU 46a8 0xc004c51e50 principal matched by identity 0" +"2019-09-24 00:26:36.165 UTC [msp.identity] Verify -> DEBU 46a9 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:36.165 UTC [msp.identity] Verify -> DEBU 46aa Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:36.166 UTC [cauthdsl] func2 -> DEBU 46ab 0xc004c51e50 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:36.166 UTC [cauthdsl] func1 -> DEBU 46ac 0xc004c51e50 gate 1569284796165787400 evaluation succeeds" +"2019-09-24 00:26:36.166 UTC [policies] Evaluate -> DEBU 46ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.166 UTC [policies] Evaluate -> DEBU 46ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.166 UTC [policies] Evaluate -> DEBU 46af Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:36.166 UTC [policies] Evaluate -> DEBU 46b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:36.166 UTC [gossip.gossip] handleMessage -> DEBU 46b1 Exiting" +"2019-09-24 00:26:36.302 UTC [msp] DeserializeIdentity -> DEBU 46b2 Obtaining identity" +"2019-09-24 00:26:36.302 UTC [msp] DeserializeIdentity -> DEBU 46b3 Obtaining identity" +"2019-09-24 00:26:36.302 UTC [gossip.pull] Hello -> DEBU 46b4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:36.302 UTC [msp] DeserializeIdentity -> DEBU 46b5 Obtaining identity" +"2019-09-24 00:26:36.302 UTC [msp] DeserializeIdentity -> DEBU 46b6 Obtaining identity" +"2019-09-24 00:26:36.302 UTC [gossip.comm] Send -> DEBU 46b7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:36.303 UTC [gossip.comm] sendToEndpoint -> DEBU 46b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.303 UTC [gossip.comm] sendToEndpoint -> DEBU 46b9 Exiting" +"2019-09-24 00:26:36.303 UTC [gossip.comm] func1 -> DEBU 46ba Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.304 UTC [gossip.gossip] handleMessage -> DEBU 46bb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.304 UTC [gossip.pull] HandleMessage -> DEBU 46bc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.304 UTC [gossip.gossip] handleMessage -> DEBU 46bd Exiting" +"2019-09-24 00:26:36.622 UTC [gossip.comm] func1 -> DEBU 46be Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.622 UTC [gossip.gossip] handleMessage -> DEBU 46bf Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.622 UTC [msp] DeserializeIdentity -> DEBU 46c0 Obtaining identity" +"2019-09-24 00:26:36.622 UTC [msp] DeserializeIdentity -> DEBU 46c1 Obtaining identity" +"2019-09-24 00:26:36.622 UTC [gossip.gossip] handleMessage -> DEBU 46c2 Exiting" +"2019-09-24 00:26:36.780 UTC [gossip.comm] func1 -> DEBU 46c3 Got message: GossipMessage: tag:EMPTY mem_req:\261\202\273H=,p\224\305~\013\351\370D9\220lE\253d\313\245\310\233\002 \001[A\201\253\002\no\353:\\\016\024A\312\350\336,\016\367\226\022a4|\t)y5!i\371" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.780 UTC [gossip.gossip] handleMessage -> DEBU 46c4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\261\202\273H=,p\224\305~\013\351\370D9\220lE\253d\313\245\310\233\002 \001[A\201\253\002\no\353:\\\016\024A\312\350\336,\016\367\226\022a4|\t)y5!i\371" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.780 UTC [gossip.gossip] handleMessage -> DEBU 46c5 Exiting" +"2019-09-24 00:26:36.780 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46c6 Got message: GossipMessage: tag:EMPTY mem_req:\261\202\273H=,p\224\305~\013\351\370D9\220lE\253d\313\245\310\233\002 \001[A\201\253\002\no\353:\\\016\024A\312\350\336,\016\367\226\022a4|\t)y5!i\371" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.780 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 46c7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:36.780 UTC [msp] DeserializeIdentity -> DEBU 46c8 Obtaining identity" +"2019-09-24 00:26:36.780 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:36.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46ca Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46cb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:36.780 UTC [policies] Evaluate -> DEBU 46cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func1 -> DEBU 46cf 0xc004484480 gate 1569284796781079100 evaluation starts" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46d0 0xc004484480 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46d1 0xc004484480 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46d2 0xc004484480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46d3 0xc004484480 principal evaluation fails" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func1 -> DEBU 46d4 0xc004484480 gate 1569284796781079100 evaluation fails" +"2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func1 -> DEBU 46d8 0xc004484cc0 gate 1569284796781405700 evaluation starts" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46d9 0xc004484cc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46da 0xc004484cc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46db 0xc004484cc0 principal matched by identity 0" +"2019-09-24 00:26:36.781 UTC [msp.identity] Verify -> DEBU 46dc Verify: digest = 00000000 fa b1 d5 ff 21 28 d9 81 f8 f2 f4 15 f7 b3 dd ff |....!(..........| +00000010 a9 e6 e4 fd 01 fc c4 24 c6 7e 15 27 a3 22 eb 3f |.......$.~.'.".?|" +"2019-09-24 00:26:36.781 UTC [msp.identity] Verify -> DEBU 46dd Verify: sig = 00000000 30 44 02 20 4f 59 5e 48 ea f5 1a 3e b1 82 bb 48 |0D. OY^H...>...H| +00000010 3d 2c 70 94 c5 7e 0b e9 f8 44 39 90 6c 45 ab 64 |=,p..~...D9.lE.d| +00000020 cb a5 c8 9b 02 20 01 5b 41 81 ab 02 0a 6f eb 3a |..... .[A....o.:| +00000030 5c 0e 14 41 ca e8 de 2c 0e f7 96 12 61 34 7c 09 |\..A...,....a4|.| +00000040 29 79 35 21 69 f9 |)y5!i.|" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func2 -> DEBU 46de 0xc004484cc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:36.781 UTC [cauthdsl] func1 -> DEBU 46df 0xc004484cc0 gate 1569284796781405700 evaluation succeeds" +"2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46e0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.781 UTC [policies] Evaluate -> DEBU 46e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:36.782 UTC [policies] Evaluate -> DEBU 46e2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:36.782 UTC [policies] Evaluate -> DEBU 46e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:36.787 UTC [gossip.discovery] handleAliveMessage -> DEBU 46e4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:36.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 46e5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:36.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 46e6 updating membership: timestamp: " +"2019-09-24 00:26:36.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 46e7 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:36.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 46e8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:36.788 UTC [gossip.discovery] learnExistingMembers -> DEBU 46e9 Exiting" +"2019-09-24 00:26:36.788 UTC [gossip.discovery] handleAliveMessage -> DEBU 46ea Exiting" +"2019-09-24 00:26:36.788 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46eb Exiting" +"2019-09-24 00:26:36.788 UTC [gossip.discovery] sendMemResponse -> DEBU 46ec Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:36.792 UTC [msp] DeserializeIdentity -> DEBU 46ed Obtaining identity" +"2019-09-24 00:26:36.792 UTC [msp] DeserializeIdentity -> DEBU 46ee Obtaining identity" +"2019-09-24 00:26:36.792 UTC [msp] DeserializeIdentity -> DEBU 46ef Obtaining identity" +"2019-09-24 00:26:36.792 UTC [gossip.comm] Send -> DEBU 46f0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:36.793 UTC [gossip.discovery] sendMemResponse -> DEBU 46f1 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020A" signature:"0D\002 H'\267\021\316\371\250\236\326\367\037\233\235\017I\372\254I\347Z\353\005\270\256\230\001\365<\2072\344\"\002 \023\354\336\221\3527\240Q\306\030\rd{$HQR\242\0175\232\216wc\036\352\010Q\002\276\343\242" > alive:\261\202\273H=,p\224\305~\013\351\370D9\220lE\253d\313\245\310\233\002 \001[A\201\253\002\no\353:\\\016\024A\312\350\336,\016\367\226\022a4|\t)y5!i\371" > alive: " +"2019-09-24 00:26:36.793 UTC [gossip.comm] sendToEndpoint -> DEBU 46f2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.793 UTC [gossip.comm] sendToEndpoint -> DEBU 46f3 Exiting" +"2019-09-24 00:26:36.827 UTC [gossip.comm] func1 -> DEBU 46f4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.828 UTC [gossip.gossip] handleMessage -> DEBU 46f5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.828 UTC [gossip.pull] HandleMessage -> DEBU 46f6 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46f7 Obtaining identity" +"2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46f8 Obtaining identity" +"2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46f9 Obtaining identity" +"2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46fa Obtaining identity" +"2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46fb Obtaining identity" +"2019-09-24 00:26:36.828 UTC [msp] DeserializeIdentity -> DEBU 46fc Obtaining identity" +"2019-09-24 00:26:36.828 UTC [gossip.pull] SendDigest -> DEBU 46fd Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:36.828 UTC [gossip.gossip] handleMessage -> DEBU 46fe Exiting" +"2019-09-24 00:26:36.871 UTC [gossip.comm] func1 -> DEBU 46ff Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.871 UTC [gossip.gossip] handleMessage -> DEBU 4700 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.872 UTC [gossip.pull] HandleMessage -> DEBU 4701 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:36.872 UTC [gossip.pull] SendDigest -> DEBU 4702 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:36.872 UTC [gossip.gossip] handleMessage -> DEBU 4703 Exiting" +"2019-09-24 00:26:37.107 UTC [gossip.gossip] handleMessage -> DEBU 4704 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:37.107 UTC [msp] DeserializeIdentity -> DEBU 4705 Obtaining identity" +"2019-09-24 00:26:37.107 UTC [msp] DeserializeIdentity -> DEBU 4706 Obtaining identity" +"2019-09-24 00:26:37.107 UTC [msp] DeserializeIdentity -> DEBU 4707 Obtaining identity" +"2019-09-24 00:26:37.107 UTC [gossip.gossip] handleMessage -> DEBU 4708 Exiting" +"2019-09-24 00:26:37.333 UTC [gossip.election] waitForInterrupt -> DEBU 4709 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:37.334 UTC [gossip.election] IsLeader -> DEBU 470a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:37.334 UTC [msp] GetDefaultSigningIdentity -> DEBU 470b Obtaining default signing identity" +"2019-09-24 00:26:37.336 UTC [msp.identity] Sign -> DEBU 470c Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510151801 " +"2019-09-24 00:26:37.336 UTC [msp.identity] Sign -> DEBU 470d Sign: digest: 94E2F5D4370D0E4E078E26F893C0EFA05210F1A71C0573FF6A1E88907ABDCE76 " +"2019-09-24 00:26:37.336 UTC [gossip.election] waitForInterrupt -> DEBU 470e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:37.336 UTC [msp] DeserializeIdentity -> DEBU 470f Obtaining identity" +"2019-09-24 00:26:37.337 UTC [msp] DeserializeIdentity -> DEBU 4710 Obtaining identity" +"2019-09-24 00:26:37.337 UTC [msp] DeserializeIdentity -> DEBU 4711 Obtaining identity" +"2019-09-24 00:26:37.337 UTC [msp] DeserializeIdentity -> DEBU 4712 Obtaining identity" +"2019-09-24 00:26:37.337 UTC [gossip.comm] Send -> DEBU 4713 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:37.337 UTC [msp] DeserializeIdentity -> DEBU 4714 Obtaining identity" +"2019-09-24 00:26:37.337 UTC [msp] DeserializeIdentity -> DEBU 4715 Obtaining identity" +"2019-09-24 00:26:37.337 UTC [gossip.comm] sendToEndpoint -> DEBU 4716 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.337 UTC [gossip.comm] sendToEndpoint -> DEBU 4717 Exiting" +"2019-09-24 00:26:37.672 UTC [gossip.comm] func1 -> DEBU 4718 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:37.672 UTC [gossip.gossip] handleMessage -> DEBU 4719 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:37.672 UTC [gossip.pull] HandleMessage -> DEBU 471a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:37.672 UTC [gossip.pull] SendDigest -> DEBU 471b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:37.672 UTC [gossip.gossip] handleMessage -> DEBU 471c Exiting" +"2019-09-24 00:26:37.728 UTC [gossip.comm] func1 -> DEBU 471d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.729 UTC [gossip.gossip] handleMessage -> DEBU 471e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.729 UTC [gossip.gossip] handleMessage -> DEBU 471f Exiting" +"2019-09-24 00:26:37.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4720 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.729 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4721 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:37.729 UTC [msp.identity] Verify -> DEBU 4722 Verify: digest = 00000000 fb b4 cf 40 4e 76 82 ee 77 ef 2a d7 98 fa 56 53 |...@Nv..w.*...VS| +00000010 28 e1 cd a5 d9 e0 3d d4 04 fd 16 53 21 94 b9 f0 |(.....=....S!...|" +"2019-09-24 00:26:37.729 UTC [msp.identity] Verify -> DEBU 4723 Verify: sig = 00000000 30 44 02 20 7d e0 91 69 0d bd e1 aa 9c 1e 15 83 |0D. }..i........| +00000010 9d 04 d4 f6 f4 88 18 d3 1e d4 6d 75 7b ba 23 b7 |..........mu{.#.| +00000020 21 18 b4 29 02 20 68 6a a2 9b bd 13 56 d9 87 4c |!..). hj....V..L| +00000030 4c 50 ce 06 e9 b6 91 53 39 59 38 75 5c a9 e6 d6 |LP.....S9Y8u\...| +00000040 fa f3 8b 05 c4 91 |......|" +"2019-09-24 00:26:37.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 4724 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4725 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:37.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4726 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:37.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4727 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:37.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4728 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:37.729 UTC [gossip.discovery] learnExistingMembers -> DEBU 4729 Exiting" +"2019-09-24 00:26:37.729 UTC [gossip.discovery] handleAliveMessage -> DEBU 472a Exiting" +"2019-09-24 00:26:37.729 UTC [gossip.discovery] handleMsgFromComm -> DEBU 472b Exiting" +"2019-09-24 00:26:37.736 UTC [gossip.comm] func1 -> DEBU 472c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.736 UTC [gossip.gossip] handleMessage -> DEBU 472d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.736 UTC [gossip.gossip] handleMessage -> DEBU 472e Exiting" +"2019-09-24 00:26:37.736 UTC [gossip.discovery] handleMsgFromComm -> DEBU 472f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.736 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4730 Exiting" +"2019-09-24 00:26:37.737 UTC [gossip.gossip] handleMessage -> DEBU 4731 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.737 UTC [gossip.gossip] handleMessage -> DEBU 4732 Exiting" +"2019-09-24 00:26:37.737 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4733 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.737 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4734 Exiting" +"2019-09-24 00:26:37.740 UTC [msp] DeserializeIdentity -> DEBU 4735 Obtaining identity" +"2019-09-24 00:26:37.740 UTC [msp] DeserializeIdentity -> DEBU 4736 Obtaining identity" +"2019-09-24 00:26:37.740 UTC [msp] DeserializeIdentity -> DEBU 4737 Obtaining identity" +"2019-09-24 00:26:37.740 UTC [gossip.comm] Send -> DEBU 4738 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:37.741 UTC [msp] DeserializeIdentity -> DEBU 4739 Obtaining identity" +"2019-09-24 00:26:37.741 UTC [gossip.comm] Send -> DEBU 473a Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:37.741 UTC [gossip.comm] sendToEndpoint -> DEBU 473b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.741 UTC [gossip.comm] sendToEndpoint -> DEBU 473c Exiting" +"2019-09-24 00:26:37.741 UTC [gossip.comm] sendToEndpoint -> DEBU 473d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:37.741 UTC [gossip.comm] sendToEndpoint -> DEBU 473e Exiting" +"2019-09-24 00:26:37.799 UTC [gossip.comm] func1 -> DEBU 473f Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:37.799 UTC [gossip.gossip] handleMessage -> DEBU 4740 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:37.799 UTC [gossip.gossip] handleMessage -> DEBU 4741 Exiting" +"2019-09-24 00:26:37.799 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4742 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:37.799 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4743 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:37.799 UTC [msp.identity] Verify -> DEBU 4744 Verify: digest = 00000000 69 e3 0b 77 ef 4d 95 77 ea 5c 32 df 9c 66 91 96 |i..w.M.w.\2..f..| +00000010 81 94 d8 e4 52 7a 7e b9 59 76 00 95 f1 38 2c f7 |....Rz~.Yv...8,.|" +"2019-09-24 00:26:37.799 UTC [msp.identity] Verify -> DEBU 4745 Verify: sig = 00000000 30 44 02 20 7d b4 80 2b e3 21 14 0a 91 c2 f9 a6 |0D. }..+.!......| +00000010 d4 e9 13 b3 2b 51 0b d3 9e 59 44 68 2c a1 24 3b |....+Q...YDh,.$;| +00000020 54 aa fc 62 02 20 0b c0 50 74 85 2e 79 78 34 c3 |T..b. ..Pt..yx4.| +00000030 26 c1 3e 6e e3 c7 62 8d e0 3b 17 3f b6 7c 5e dd |&.>n..b..;.?.|^.| +00000040 b0 a8 25 4b bd 3a |..%K.:|" +"2019-09-24 00:26:37.800 UTC [msp.identity] Verify -> DEBU 4746 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:37.800 UTC [msp.identity] Verify -> DEBU 4747 Verify: sig = 00000000 30 45 02 21 00 f9 7d 3c 26 01 9b 45 f2 54 8a 49 |0E.!..}<&..E.T.I| +00000010 9d ef ea fb e2 0b f3 29 c7 00 6c a1 9c 13 c0 22 |.......)..l...."| +00000020 19 a4 04 06 ee 02 20 46 82 e4 1c c3 d6 97 19 63 |...... F.......c| +00000030 a0 13 0e 67 cd d5 81 07 35 05 9b 64 4e c8 e3 77 |...g....5..dN..w| +00000040 5a 6c b2 2d c6 6d 6a |Zl.-.mj|" +"2019-09-24 00:26:37.800 UTC [gossip.discovery] handleAliveMessage -> DEBU 4748 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:37.800 UTC [gossip.discovery] learnExistingMembers -> DEBU 4749 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:26:37.800 UTC [gossip.discovery] learnExistingMembers -> DEBU 474a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:37.800 UTC [gossip.discovery] learnExistingMembers -> DEBU 474b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:37.800 UTC [gossip.discovery] learnExistingMembers -> DEBU 474c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:37.800 UTC [gossip.discovery] learnExistingMembers -> DEBU 474d Exiting" +"2019-09-24 00:26:37.800 UTC [gossip.discovery] handleAliveMessage -> DEBU 474e Exiting" +"2019-09-24 00:26:37.800 UTC [gossip.discovery] handleMsgFromComm -> DEBU 474f Exiting" +"2019-09-24 00:26:37.800 UTC [gossip.discovery] sendMemResponse -> DEBU 4750 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:37.800 UTC [msp] DeserializeIdentity -> DEBU 4751 Obtaining identity" +"2019-09-24 00:26:37.801 UTC [msp] DeserializeIdentity -> DEBU 4752 Obtaining identity" +"2019-09-24 00:26:37.801 UTC [gossip.comm] Send -> DEBU 4753 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:37.801 UTC [gossip.discovery] sendMemResponse -> DEBU 4754 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" secret_envelope: > alive: " +"2019-09-24 00:26:37.801 UTC [gossip.comm] sendToEndpoint -> DEBU 4755 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:37.801 UTC [gossip.comm] sendToEndpoint -> DEBU 4756 Exiting" +"2019-09-24 00:26:38.045 UTC [gossip.comm] func1 -> DEBU 4757 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:38.045 UTC [gossip.gossip] handleMessage -> DEBU 4758 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:38.045 UTC [msp] DeserializeIdentity -> DEBU 4759 Obtaining identity" +"2019-09-24 00:26:38.045 UTC [msp] DeserializeIdentity -> DEBU 475a Obtaining identity" +"2019-09-24 00:26:38.045 UTC [msp] DeserializeIdentity -> DEBU 475b Obtaining identity" +"2019-09-24 00:26:38.045 UTC [gossip.gossip] handleMessage -> DEBU 475c Exiting" +"2019-09-24 00:26:39.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 475d Obtaining default signing identity" +"2019-09-24 00:26:39.608 UTC [msp.identity] Sign -> DEBU 475e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315103F " +"2019-09-24 00:26:39.608 UTC [msp.identity] Sign -> DEBU 475f Sign: digest: 7C286A0785191A7506CC89B91F8142CB76B80DAF9712737412B20DB692E68BE1 " +"2019-09-24 00:26:39.608 UTC [msp] GetDefaultSigningIdentity -> DEBU 4760 Obtaining default signing identity" +"2019-09-24 00:26:39.609 UTC [msp.identity] Sign -> DEBU 4761 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:39.609 UTC [msp.identity] Sign -> DEBU 4762 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:39.609 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4763 Sleeping 5s" +"2019-09-24 00:26:39.618 UTC [msp] DeserializeIdentity -> DEBU 4764 Obtaining identity" +"2019-09-24 00:26:39.619 UTC [msp] DeserializeIdentity -> DEBU 4765 Obtaining identity" +"2019-09-24 00:26:39.619 UTC [msp] DeserializeIdentity -> DEBU 4766 Obtaining identity" +"2019-09-24 00:26:39.619 UTC [gossip.comm] Send -> DEBU 4767 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:39.619 UTC [msp] DeserializeIdentity -> DEBU 4768 Obtaining identity" +"2019-09-24 00:26:39.619 UTC [gossip.comm] Send -> DEBU 4769 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:39.620 UTC [gossip.comm] Send -> DEBU 476a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 476b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 476c Exiting" +"2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 476d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 476e Exiting" +"2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 476f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.620 UTC [gossip.comm] sendToEndpoint -> DEBU 4770 Exiting" +"2019-09-24 00:26:39.629 UTC [gossip.gossip] handleMessage -> DEBU 4771 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.629 UTC [gossip.gossip] handleMessage -> DEBU 4772 Exiting" +"2019-09-24 00:26:39.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4773 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.629 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4774 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:39.629 UTC [msp.identity] Verify -> DEBU 4775 Verify: digest = 00000000 7c 28 6a 07 85 19 1a 75 06 cc 89 b9 1f 81 42 cb ||(j....u......B.| +00000010 76 b8 0d af 97 12 73 74 12 b2 0d b6 92 e6 8b e1 |v.....st........|" +"2019-09-24 00:26:39.629 UTC [msp.identity] Verify -> DEBU 4776 Verify: sig = 00000000 30 44 02 20 18 9b 36 87 c7 ee 5f be 08 56 30 72 |0D. ..6..._..V0r| +00000010 ea e3 12 a0 3e c1 bf 96 9f 70 17 27 15 df de 2f |....>....p.'.../| +00000020 d8 43 a9 3f 02 20 26 d0 b6 29 1f d4 46 a5 3a 5c |.C.?. &..)..F.:\| +00000030 73 e0 5e 52 8d 63 e5 3f ff 5c 1e 0f c4 0b 92 e4 |s.^R.c.?.\......| +00000040 13 46 fc 75 44 e6 |.F.uD.|" +"2019-09-24 00:26:39.630 UTC [gossip.discovery] isSentByMe -> DEBU 4777 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4778 Exiting" +"2019-09-24 00:26:39.731 UTC [gossip.pull] Hello -> DEBU 4779 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:39.731 UTC [gossip.comm] Send -> DEBU 477a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:39.731 UTC [gossip.pull] Hello -> DEBU 477b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:39.731 UTC [gossip.comm] Send -> DEBU 477c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:39.731 UTC [gossip.pull] Hello -> DEBU 477d Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:39.731 UTC [gossip.comm] Send -> DEBU 477e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:39.731 UTC [gossip.comm] sendToEndpoint -> DEBU 477f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.731 UTC [gossip.comm] sendToEndpoint -> DEBU 4780 Exiting" +"2019-09-24 00:26:39.732 UTC [gossip.comm] sendToEndpoint -> DEBU 4781 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.733 UTC [gossip.comm] sendToEndpoint -> DEBU 4782 Exiting" +"2019-09-24 00:26:39.733 UTC [gossip.comm] sendToEndpoint -> DEBU 4783 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.733 UTC [gossip.comm] sendToEndpoint -> DEBU 4784 Exiting" +"2019-09-24 00:26:39.734 UTC [gossip.gossip] handleMessage -> DEBU 4785 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.734 UTC [gossip.pull] HandleMessage -> DEBU 4786 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.734 UTC [gossip.gossip] handleMessage -> DEBU 4787 Exiting" +"2019-09-24 00:26:39.734 UTC [gossip.comm] func1 -> DEBU 4788 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.734 UTC [gossip.gossip] handleMessage -> DEBU 4789 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.734 UTC [gossip.pull] HandleMessage -> DEBU 478a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.734 UTC [gossip.gossip] handleMessage -> DEBU 478b Exiting" +"2019-09-24 00:26:39.735 UTC [gossip.comm] func1 -> DEBU 478c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.735 UTC [gossip.gossip] handleMessage -> DEBU 478d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.735 UTC [gossip.pull] HandleMessage -> DEBU 478e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.735 UTC [gossip.gossip] handleMessage -> DEBU 478f Exiting" +"2019-09-24 00:26:39.870 UTC [msp] GetDefaultSigningIdentity -> DEBU 4790 Obtaining default signing identity" +"2019-09-24 00:26:39.870 UTC [msp.identity] Sign -> DEBU 4791 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151040 " +"2019-09-24 00:26:39.870 UTC [msp.identity] Sign -> DEBU 4792 Sign: digest: 8232A6F7C839936D1209AD87DDCEC4BB05386BD1AFC3C82C61053909D4CC6511 " +"2019-09-24 00:26:39.871 UTC [msp] GetDefaultSigningIdentity -> DEBU 4793 Obtaining default signing identity" +"2019-09-24 00:26:39.871 UTC [msp.identity] Sign -> DEBU 4794 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:39.871 UTC [msp.identity] Sign -> DEBU 4795 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:39.871 UTC [msp] DeserializeIdentity -> DEBU 4796 Obtaining identity" +"2019-09-24 00:26:39.871 UTC [gossip.comm] Send -> DEBU 4797 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:39.871 UTC [gossip.comm] Send -> DEBU 4798 Entering, sending GossipMessage: tag:EMPTY mem_req:BFI\244\346\005!:E\257\002 \033\265l\006\262\372s\004\306\"@\237\0369\222\210nS\007\217x\305\357'\305\247\245\361I\230\270\n" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:39.872 UTC [msp] DeserializeIdentity -> DEBU 4799 Obtaining identity" +"2019-09-24 00:26:39.872 UTC [gossip.comm] Send -> DEBU 479a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 479b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 479c Exiting" +"2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 479d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 479e Exiting" +"2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 479f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:BFI\244\346\005!:E\257\002 \033\265l\006\262\372s\004\306\"@\237\0369\222\210nS\007\217x\305\357'\305\247\245\361I\230\270\n" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.872 UTC [gossip.comm] sendToEndpoint -> DEBU 47a0 Exiting" +"2019-09-24 00:26:39.876 UTC [gossip.comm] func1 -> DEBU 47a1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.876 UTC [gossip.gossip] handleMessage -> DEBU 47a2 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.876 UTC [gossip.gossip] handleMessage -> DEBU 47a3 Exiting" +"2019-09-24 00:26:39.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.876 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47a5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:39.877 UTC [msp.identity] Verify -> DEBU 47a6 Verify: digest = 00000000 82 32 a6 f7 c8 39 93 6d 12 09 ad 87 dd ce c4 bb |.2...9.m........| +00000010 05 38 6b d1 af c3 c8 2c 61 05 39 09 d4 cc 65 11 |.8k....,a.9...e.|" +"2019-09-24 00:26:39.877 UTC [msp.identity] Verify -> DEBU 47a7 Verify: sig = 00000000 30 44 02 20 6c 4e b7 5d 74 c5 4c c2 c0 fc 9f b1 |0D. lN.]t.L.....| +00000010 e0 61 e3 c1 5b 39 38 e6 d3 50 83 3f 3c fa 30 03 |.a..[98..P.?<.0.| +00000020 49 36 35 98 02 20 14 02 ac a6 c6 f5 0d 61 4a 60 |I65.. .......aJ`| +00000030 d6 99 b5 f4 be e2 eb 7a 5d 8d 6f a6 b8 d0 c8 b5 |.......z].o.....| +00000040 36 66 31 cb 4e 10 |6f1.N.|" +"2019-09-24 00:26:39.877 UTC [msp.identity] Verify -> DEBU 47a8 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:39.877 UTC [msp.identity] Verify -> DEBU 47a9 Verify: sig = 00000000 30 45 02 21 00 d6 e1 ae c4 92 e2 17 e2 90 cb a5 |0E.!............| +00000010 af f5 c6 16 d8 4c fa 2c 18 47 3e 42 46 49 a4 e6 |.....L.,.G>BFI..| +00000020 05 21 3a 45 af 02 20 1b b5 6c 06 b2 fa 73 04 c6 |.!:E.. ..l...s..| +00000030 22 40 9f 1e 39 92 88 6e 53 07 8f 78 c5 ef 27 c5 |"@..9..nS..x..'.| +00000040 a7 a5 f1 49 98 b8 0a |...I...|" +"2019-09-24 00:26:39.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 47aa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:39.877 UTC [gossip.discovery] isSentByMe -> DEBU 47ab Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:39.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 47ac Exiting" +"2019-09-24 00:26:39.877 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47ad Exiting" +"2019-09-24 00:26:39.877 UTC [gossip.comm] func1 -> DEBU 47ae Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.877 UTC [gossip.gossip] handleMessage -> DEBU 47af Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47b0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.879 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47b1 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:39.879 UTC [msp.identity] Verify -> DEBU 47b2 Verify: digest = 00000000 69 e3 0b 77 ef 4d 95 77 ea 5c 32 df 9c 66 91 96 |i..w.M.w.\2..f..| +00000010 81 94 d8 e4 52 7a 7e b9 59 76 00 95 f1 38 2c f7 |....Rz~.Yv...8,.|" +"2019-09-24 00:26:39.879 UTC [msp.identity] Verify -> DEBU 47b3 Verify: sig = 00000000 30 44 02 20 7d b4 80 2b e3 21 14 0a 91 c2 f9 a6 |0D. }..+.!......| +00000010 d4 e9 13 b3 2b 51 0b d3 9e 59 44 68 2c a1 24 3b |....+Q...YDh,.$;| +00000020 54 aa fc 62 02 20 0b c0 50 74 85 2e 79 78 34 c3 |T..b. ..Pt..yx4.| +00000030 26 c1 3e 6e e3 c7 62 8d e0 3b 17 3f b6 7c 5e dd |&.>n..b..;.?.|^.| +00000040 b0 a8 25 4b bd 3a |..%K.:|" +"2019-09-24 00:26:39.877 UTC [gossip.gossip] handleMessage -> DEBU 47b4 Exiting" +"2019-09-24 00:26:39.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 47b5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 47b6 Exiting" +"2019-09-24 00:26:39.879 UTC [gossip.gossip] handleMessage -> DEBU 47b7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.879 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47b8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:39.879 UTC [msp.identity] Verify -> DEBU 47b9 Verify: digest = 00000000 82 32 a6 f7 c8 39 93 6d 12 09 ad 87 dd ce c4 bb |.2...9.m........| +00000010 05 38 6b d1 af c3 c8 2c 61 05 39 09 d4 cc 65 11 |.8k....,a.9...e.|" +"2019-09-24 00:26:39.879 UTC [msp.identity] Verify -> DEBU 47ba Verify: sig = 00000000 30 44 02 20 6c 4e b7 5d 74 c5 4c c2 c0 fc 9f b1 |0D. lN.]t.L.....| +00000010 e0 61 e3 c1 5b 39 38 e6 d3 50 83 3f 3c fa 30 03 |.a..[98..P.?<.0.| +00000020 49 36 35 98 02 20 14 02 ac a6 c6 f5 0d 61 4a 60 |I65.. .......aJ`| +00000030 d6 99 b5 f4 be e2 eb 7a 5d 8d 6f a6 b8 d0 c8 b5 |.......z].o.....| +00000040 36 66 31 cb 4e 10 |6f1.N.|" +"2019-09-24 00:26:39.880 UTC [gossip.discovery] handleAliveMessage -> DEBU 47bb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.880 UTC [gossip.discovery] isSentByMe -> DEBU 47bc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.880 UTC [gossip.discovery] handleAliveMessage -> DEBU 47bd Exiting" +"2019-09-24 00:26:39.880 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47be Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:39.880 UTC [msp] DeserializeIdentity -> DEBU 47bf Obtaining identity" +"2019-09-24 00:26:39.880 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:39.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47c1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:39.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47c2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:39.880 UTC [cauthdsl] func1 -> DEBU 47c6 0xc003461de0 gate 1569284799880457100 evaluation starts" +"2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47c7 0xc003461de0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47c8 0xc003461de0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47c9 0xc003461de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47ca 0xc003461de0 principal evaluation fails" +"2019-09-24 00:26:39.880 UTC [cauthdsl] func1 -> DEBU 47cb 0xc003461de0 gate 1569284799880457100 evaluation fails" +"2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:39.880 UTC [policies] Evaluate -> DEBU 47ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:39.880 UTC [cauthdsl] func1 -> DEBU 47cf 0xc003476620 gate 1569284799880712100 evaluation starts" +"2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47d0 0xc003476620 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47d1 0xc003476620 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47d2 0xc003476620 principal matched by identity 0" +"2019-09-24 00:26:39.880 UTC [msp.identity] Verify -> DEBU 47d3 Verify: digest = 00000000 4b ab 75 6b 60 22 fc 7a 4e 10 05 92 d2 7a 90 6c |K.uk`".zN....z.l| +00000010 5c 84 ad 99 96 87 cc 58 dc c9 2f 78 85 22 32 9a |\......X../x."2.|" +"2019-09-24 00:26:39.880 UTC [msp.identity] Verify -> DEBU 47d4 Verify: sig = 00000000 30 44 02 20 5b c5 9d 89 69 30 6b d7 68 fa a2 2d |0D. [...i0k.h..-| +00000010 fc 9d 56 d6 f3 d7 5c d3 93 c8 20 a9 4a 35 7a cc |..V...\... .J5z.| +00000020 46 26 54 59 02 20 0c 86 89 7e 9b 9b 22 97 26 97 |F&TY. ...~..".&.| +00000030 7f ef 2a bd e1 94 9e 72 c1 83 68 35 05 77 09 9e |..*....r..h5.w..| +00000040 b0 0e 04 20 b1 f5 |... ..|" +"2019-09-24 00:26:39.880 UTC [cauthdsl] func2 -> DEBU 47d5 0xc003476620 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:39.881 UTC [cauthdsl] func1 -> DEBU 47d6 0xc003476620 gate 1569284799880712100 evaluation succeeds" +"2019-09-24 00:26:39.881 UTC [policies] Evaluate -> DEBU 47d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:39.881 UTC [policies] Evaluate -> DEBU 47d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:39.881 UTC [policies] Evaluate -> DEBU 47d9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:39.881 UTC [policies] Evaluate -> DEBU 47da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:39.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 47db Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 47dc Exiting" +"2019-09-24 00:26:39.881 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47dd Exiting" +"2019-09-24 00:26:39.881 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47de Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.881 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47df Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:39.881 UTC [gossip.gossip] handleMessage -> DEBU 47e0 Exiting" +"2019-09-24 00:26:39.881 UTC [msp.identity] Verify -> DEBU 47e1 Verify: digest = 00000000 69 e3 0b 77 ef 4d 95 77 ea 5c 32 df 9c 66 91 96 |i..w.M.w.\2..f..| +00000010 81 94 d8 e4 52 7a 7e b9 59 76 00 95 f1 38 2c f7 |....Rz~.Yv...8,.|" +"2019-09-24 00:26:39.881 UTC [msp.identity] Verify -> DEBU 47e2 Verify: sig = 00000000 30 44 02 20 7d b4 80 2b e3 21 14 0a 91 c2 f9 a6 |0D. }..+.!......| +00000010 d4 e9 13 b3 2b 51 0b d3 9e 59 44 68 2c a1 24 3b |....+Q...YDh,.$;| +00000020 54 aa fc 62 02 20 0b c0 50 74 85 2e 79 78 34 c3 |T..b. ..Pt..yx4.| +00000030 26 c1 3e 6e e3 c7 62 8d e0 3b 17 3f b6 7c 5e dd |&.>n..b..;.?.|^.| +00000040 b0 a8 25 4b bd 3a |..%K.:|" +"2019-09-24 00:26:39.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 47e3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 47e4 Exiting" +"2019-09-24 00:26:39.881 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47e5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:39.881 UTC [msp.identity] Verify -> DEBU 47e6 Verify: digest = 00000000 82 32 a6 f7 c8 39 93 6d 12 09 ad 87 dd ce c4 bb |.2...9.m........| +00000010 05 38 6b d1 af c3 c8 2c 61 05 39 09 d4 cc 65 11 |.8k....,a.9...e.|" +"2019-09-24 00:26:39.882 UTC [msp.identity] Verify -> DEBU 47e7 Verify: sig = 00000000 30 44 02 20 6c 4e b7 5d 74 c5 4c c2 c0 fc 9f b1 |0D. lN.]t.L.....| +00000010 e0 61 e3 c1 5b 39 38 e6 d3 50 83 3f 3c fa 30 03 |.a..[98..P.?<.0.| +00000020 49 36 35 98 02 20 14 02 ac a6 c6 f5 0d 61 4a 60 |I65.. .......aJ`| +00000030 d6 99 b5 f4 be e2 eb 7a 5d 8d 6f a6 b8 d0 c8 b5 |.......z].o.....| +00000040 36 66 31 cb 4e 10 |6f1.N.|" +"2019-09-24 00:26:39.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 47e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.888 UTC [gossip.discovery] isSentByMe -> DEBU 47e9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 47ea Exiting" +"2019-09-24 00:26:39.888 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47eb Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:39.888 UTC [msp] DeserializeIdentity -> DEBU 47ec Obtaining identity" +"2019-09-24 00:26:39.888 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:39.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47ee Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:39.888 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47ef Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:39.888 UTC [policies] Evaluate -> DEBU 47f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:39.888 UTC [policies] Evaluate -> DEBU 47f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:39.888 UTC [policies] Evaluate -> DEBU 47f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:39.888 UTC [cauthdsl] func1 -> DEBU 47f3 0xc00034b6d0 gate 1569284799888756600 evaluation starts" +"2019-09-24 00:26:39.888 UTC [cauthdsl] func2 -> DEBU 47f4 0xc00034b6d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:39.888 UTC [cauthdsl] func2 -> DEBU 47f5 0xc00034b6d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:39.888 UTC [cauthdsl] func2 -> DEBU 47f6 0xc00034b6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:39.888 UTC [cauthdsl] func2 -> DEBU 47f7 0xc00034b6d0 principal evaluation fails" +"2019-09-24 00:26:39.888 UTC [cauthdsl] func1 -> DEBU 47f8 0xc00034b6d0 gate 1569284799888756600 evaluation fails" +"2019-09-24 00:26:39.888 UTC [policies] Evaluate -> DEBU 47f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:39.888 UTC [policies] Evaluate -> DEBU 47fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:39.889 UTC [policies] Evaluate -> DEBU 47fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:39.889 UTC [cauthdsl] func1 -> DEBU 47fc 0xc00034bf10 gate 1569284799889047500 evaluation starts" +"2019-09-24 00:26:39.889 UTC [cauthdsl] func2 -> DEBU 47fd 0xc00034bf10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:39.889 UTC [cauthdsl] func2 -> DEBU 47fe 0xc00034bf10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:39.889 UTC [cauthdsl] func2 -> DEBU 47ff 0xc00034bf10 principal matched by identity 0" +"2019-09-24 00:26:39.889 UTC [msp.identity] Verify -> DEBU 4800 Verify: digest = 00000000 fa b1 d5 ff 21 28 d9 81 f8 f2 f4 15 f7 b3 dd ff |....!(..........| +00000010 a9 e6 e4 fd 01 fc c4 24 c6 7e 15 27 a3 22 eb 3f |.......$.~.'.".?|" +"2019-09-24 00:26:39.889 UTC [msp.identity] Verify -> DEBU 4801 Verify: sig = 00000000 30 44 02 20 4f 59 5e 48 ea f5 1a 3e b1 82 bb 48 |0D. OY^H...>...H| +00000010 3d 2c 70 94 c5 7e 0b e9 f8 44 39 90 6c 45 ab 64 |=,p..~...D9.lE.d| +00000020 cb a5 c8 9b 02 20 01 5b 41 81 ab 02 0a 6f eb 3a |..... .[A....o.:| +00000030 5c 0e 14 41 ca e8 de 2c 0e f7 96 12 61 34 7c 09 |\..A...,....a4|.| +00000040 29 79 35 21 69 f9 |)y5!i.|" +"2019-09-24 00:26:39.889 UTC [cauthdsl] func2 -> DEBU 4802 0xc00034bf10 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:39.889 UTC [cauthdsl] func1 -> DEBU 4803 0xc00034bf10 gate 1569284799889047500 evaluation succeeds" +"2019-09-24 00:26:39.889 UTC [policies] Evaluate -> DEBU 4804 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:39.889 UTC [policies] Evaluate -> DEBU 4805 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:39.889 UTC [policies] Evaluate -> DEBU 4806 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:39.889 UTC [policies] Evaluate -> DEBU 4807 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:39.889 UTC [gossip.discovery] handleAliveMessage -> DEBU 4808 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.889 UTC [gossip.discovery] handleAliveMessage -> DEBU 4809 Exiting" +"2019-09-24 00:26:39.889 UTC [gossip.discovery] handleMsgFromComm -> DEBU 480a Exiting" +"2019-09-24 00:26:39.943 UTC [gossip.gossip] handleMessage -> DEBU 480b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.943 UTC [gossip.pull] HandleMessage -> DEBU 480c GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 480d Obtaining identity" +"2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 480e Obtaining identity" +"2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 480f Obtaining identity" +"2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 4810 Obtaining identity" +"2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 4811 Obtaining identity" +"2019-09-24 00:26:39.943 UTC [msp] DeserializeIdentity -> DEBU 4812 Obtaining identity" +"2019-09-24 00:26:39.943 UTC [gossip.pull] SendDigest -> DEBU 4813 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:39.943 UTC [gossip.gossip] handleMessage -> DEBU 4814 Exiting" +"2019-09-24 00:26:39.977 UTC [gossip.gossip] handleMessage -> DEBU 4815 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.978 UTC [gossip.gossip] handleMessage -> DEBU 4816 Exiting" +"2019-09-24 00:26:39.978 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4817 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.978 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4818 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:39.978 UTC [msp] DeserializeIdentity -> DEBU 4819 Obtaining identity" +"2019-09-24 00:26:39.978 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 481a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:39.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 481b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:39.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 481c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 481d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 481e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 481f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:39.978 UTC [cauthdsl] func1 -> DEBU 4820 0xc0029e2770 gate 1569284799978515400 evaluation starts" +"2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 4821 0xc0029e2770 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 4822 0xc0029e2770 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 4823 0xc0029e2770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 4824 0xc0029e2770 principal evaluation fails" +"2019-09-24 00:26:39.978 UTC [cauthdsl] func1 -> DEBU 4825 0xc0029e2770 gate 1569284799978515400 evaluation fails" +"2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 4826 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 4827 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:39.978 UTC [policies] Evaluate -> DEBU 4828 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:39.978 UTC [cauthdsl] func1 -> DEBU 4829 0xc0029e2fb0 gate 1569284799978819100 evaluation starts" +"2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 482a 0xc0029e2fb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 482b 0xc0029e2fb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:39.978 UTC [cauthdsl] func2 -> DEBU 482c 0xc0029e2fb0 principal matched by identity 0" +"2019-09-24 00:26:39.978 UTC [msp.identity] Verify -> DEBU 482d Verify: digest = 00000000 5a 43 5f 28 0f 82 dd 64 18 3f 4b e0 d8 36 4d ed |ZC_(...d.?K..6M.| +00000010 5a 27 87 ee 2b 42 19 56 5c 23 a5 88 a3 4e 43 ed |Z'..+B.V\#...NC.|" +"2019-09-24 00:26:39.978 UTC [msp.identity] Verify -> DEBU 482e Verify: sig = 00000000 30 44 02 20 18 1a 01 a6 62 f6 cb ce 27 bd b6 e0 |0D. ....b...'...| +00000010 8b 7c 44 e9 d9 81 eb 80 ed a4 fe 4b 72 5b 1f a7 |.|D........Kr[..| +00000020 12 1a ac 9c 02 20 4b a8 24 f7 e9 37 b2 a0 db 28 |..... K.$..7...(| +00000030 8a ff 15 db 56 f5 7d 9a ac af 5f ae 44 44 70 b1 |....V.}..._.DDp.| +00000040 e5 d2 42 e1 e5 92 |..B...|" +"2019-09-24 00:26:39.979 UTC [cauthdsl] func2 -> DEBU 482f 0xc0029e2fb0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:39.979 UTC [cauthdsl] func1 -> DEBU 4830 0xc0029e2fb0 gate 1569284799978819100 evaluation succeeds" +"2019-09-24 00:26:39.979 UTC [policies] Evaluate -> DEBU 4831 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:39.979 UTC [policies] Evaluate -> DEBU 4832 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:39.979 UTC [policies] Evaluate -> DEBU 4833 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:39.979 UTC [policies] Evaluate -> DEBU 4834 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:39.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 4835 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 4836 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:39.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 4837 updating membership: timestamp: " +"2019-09-24 00:26:39.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 4838 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:39.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 4839 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:39.979 UTC [gossip.discovery] learnExistingMembers -> DEBU 483a Exiting" +"2019-09-24 00:26:39.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 483b Exiting" +"2019-09-24 00:26:39.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 483c Exiting" +"2019-09-24 00:26:39.979 UTC [msp] DeserializeIdentity -> DEBU 483d Obtaining identity" +"2019-09-24 00:26:39.979 UTC [msp] DeserializeIdentity -> DEBU 483e Obtaining identity" +"2019-09-24 00:26:39.979 UTC [msp] DeserializeIdentity -> DEBU 483f Obtaining identity" +"2019-09-24 00:26:39.979 UTC [msp] DeserializeIdentity -> DEBU 4840 Obtaining identity" +"2019-09-24 00:26:39.980 UTC [msp] DeserializeIdentity -> DEBU 4841 Obtaining identity" +"2019-09-24 00:26:39.980 UTC [msp] DeserializeIdentity -> DEBU 4842 Obtaining identity" +"2019-09-24 00:26:39.980 UTC [msp] DeserializeIdentity -> DEBU 4843 Obtaining identity" +"2019-09-24 00:26:39.980 UTC [gossip.comm] Send -> DEBU 4844 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:39.980 UTC [msp] DeserializeIdentity -> DEBU 4845 Obtaining identity" +"2019-09-24 00:26:39.980 UTC [gossip.comm] Send -> DEBU 4846 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:39.980 UTC [gossip.comm] sendToEndpoint -> DEBU 4847 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.980 UTC [gossip.comm] sendToEndpoint -> DEBU 4848 Exiting" +"2019-09-24 00:26:39.980 UTC [gossip.comm] sendToEndpoint -> DEBU 4849 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.980 UTC [gossip.comm] sendToEndpoint -> DEBU 484a Exiting" +"2019-09-24 00:26:39.988 UTC [gossip.comm] func1 -> DEBU 484b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.988 UTC [gossip.gossip] handleMessage -> DEBU 484c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.988 UTC [gossip.gossip] handleMessage -> DEBU 484d Exiting" +"2019-09-24 00:26:39.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 484e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 484f Exiting" +"2019-09-24 00:26:39.989 UTC [gossip.comm] func1 -> DEBU 4850 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.989 UTC [gossip.gossip] handleMessage -> DEBU 4851 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.989 UTC [gossip.gossip] handleMessage -> DEBU 4852 Exiting" +"2019-09-24 00:26:39.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4853 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:39.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4854 Exiting" +"2019-09-24 00:26:40.044 UTC [gossip.gossip] handleMessage -> DEBU 4855 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.044 UTC [gossip.gossip] handleMessage -> DEBU 4856 Exiting" +"2019-09-24 00:26:40.044 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4857 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.044 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4858 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:40.044 UTC [msp] DeserializeIdentity -> DEBU 4859 Obtaining identity" +"2019-09-24 00:26:40.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 485a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:40.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 485b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 485c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 485d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 485e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 485f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func1 -> DEBU 4860 0xc004b220c0 gate 1569284800045299900 evaluation starts" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 4861 0xc004b220c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 4862 0xc004b220c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 4863 0xc004b220c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 4864 0xc004b220c0 principal evaluation fails" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func1 -> DEBU 4865 0xc004b220c0 gate 1569284800045299900 evaluation fails" +"2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4866 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4867 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func1 -> DEBU 4869 0xc004b22900 gate 1569284800045568000 evaluation starts" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 486a 0xc004b22900 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 486b 0xc004b22900 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 486c 0xc004b22900 principal matched by identity 0" +"2019-09-24 00:26:40.045 UTC [msp.identity] Verify -> DEBU 486d Verify: digest = 00000000 4e 6d b8 1b 23 95 85 25 3e a8 cc 0a 33 ea 4f 47 |Nm..#..%>...3.OG| +00000010 1b 6e a2 cf 5a 8e 12 90 31 7e a5 83 f9 bb c9 6e |.n..Z...1~.....n|" +"2019-09-24 00:26:40.045 UTC [msp.identity] Verify -> DEBU 486e Verify: sig = 00000000 30 45 02 21 00 8d f2 4a d8 f4 06 79 ac fb 76 b1 |0E.!...J...y..v.| +00000010 88 0a 89 61 71 2d a0 55 8d 6c d5 0c 20 68 08 8b |...aq-.U.l.. h..| +00000020 7e 4b b4 46 07 02 20 51 b3 28 20 68 62 23 47 fb |~K.F.. Q.( hb#G.| +00000030 3c a1 ae b9 bc ac 48 ea 03 f1 98 a8 7b 5b 7b b4 |<.....H.....{[{.| +00000040 f9 81 04 b8 5b 45 4e |....[EN|" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func2 -> DEBU 486f 0xc004b22900 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:40.045 UTC [cauthdsl] func1 -> DEBU 4870 0xc004b22900 gate 1569284800045568000 evaluation succeeds" +"2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4871 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4872 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4873 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:40.045 UTC [policies] Evaluate -> DEBU 4874 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:40.046 UTC [gossip.discovery] handleAliveMessage -> DEBU 4875 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 4876 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 4877 updating membership: timestamp: " +"2019-09-24 00:26:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 4878 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 4879 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 487a Exiting" +"2019-09-24 00:26:40.046 UTC [gossip.discovery] handleAliveMessage -> DEBU 487b Exiting" +"2019-09-24 00:26:40.046 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487c Exiting" +"2019-09-24 00:26:40.046 UTC [gossip.discovery] sendMemResponse -> DEBU 487d Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:40.046 UTC [msp] DeserializeIdentity -> DEBU 487e Obtaining identity" +"2019-09-24 00:26:40.046 UTC [msp] DeserializeIdentity -> DEBU 487f Obtaining identity" +"2019-09-24 00:26:40.046 UTC [msp] DeserializeIdentity -> DEBU 4880 Obtaining identity" +"2019-09-24 00:26:40.046 UTC [gossip.comm] Send -> DEBU 4881 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:40.046 UTC [gossip.discovery] sendMemResponse -> DEBU 4882 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" > alive:\261\202\273H=,p\224\305~\013\351\370D9\220lE\253d\313\245\310\233\002 \001[A\201\253\002\no\353:\\\016\024A\312\350\336,\016\367\226\022a4|\t)y5!i\371" > alive: alive:\301\277\226\237p\027'\025\337\336/\330C\251?\002 &\320\266)\037\324F\245:\\s\340^R\215c\345?\377\\\036\017\304\013\222\344\023F\374uD\346" > " +"2019-09-24 00:26:40.046 UTC [gossip.comm] sendToEndpoint -> DEBU 4883 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.046 UTC [gossip.comm] sendToEndpoint -> DEBU 4884 Exiting" +"2019-09-24 00:26:40.117 UTC [msp] DeserializeIdentity -> DEBU 4885 Obtaining identity" +"2019-09-24 00:26:40.117 UTC [msp] DeserializeIdentity -> DEBU 4886 Obtaining identity" +"2019-09-24 00:26:40.117 UTC [gossip.comm] Send -> DEBU 4887 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 4888 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 4889 Exiting" +"2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 488a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 488b Exiting" +"2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 488c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.117 UTC [gossip.comm] sendToEndpoint -> DEBU 488d Exiting" +"2019-09-24 00:26:40.122 UTC [gossip.comm] func1 -> DEBU 488e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.122 UTC [gossip.gossip] handleMessage -> DEBU 488f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.122 UTC [msp] DeserializeIdentity -> DEBU 4890 Obtaining identity" +"2019-09-24 00:26:40.123 UTC [msp] DeserializeIdentity -> DEBU 4891 Obtaining identity" +"2019-09-24 00:26:40.122 UTC [gossip.comm] func1 -> DEBU 4892 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.123 UTC [msp] DeserializeIdentity -> DEBU 4893 Obtaining identity" +"2019-09-24 00:26:40.123 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4894 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:40.123 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4895 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.124 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4896 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.124 UTC [policies] Evaluate -> DEBU 4897 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:40.124 UTC [policies] Evaluate -> DEBU 4898 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:40.124 UTC [policies] Evaluate -> DEBU 4899 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:40.124 UTC [cauthdsl] func1 -> DEBU 489a 0xc004b339d0 gate 1569284800124626100 evaluation starts" +"2019-09-24 00:26:40.124 UTC [cauthdsl] func2 -> DEBU 489b 0xc004b339d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.124 UTC [cauthdsl] func2 -> DEBU 489c 0xc004b339d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.124 UTC [cauthdsl] func2 -> DEBU 489d 0xc004b339d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:40.125 UTC [cauthdsl] func2 -> DEBU 489e 0xc004b339d0 principal evaluation fails" +"2019-09-24 00:26:40.125 UTC [cauthdsl] func1 -> DEBU 489f 0xc004b339d0 gate 1569284800124626100 evaluation fails" +"2019-09-24 00:26:40.125 UTC [policies] Evaluate -> DEBU 48a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.125 UTC [policies] Evaluate -> DEBU 48a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.125 UTC [policies] Evaluate -> DEBU 48a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:40.125 UTC [cauthdsl] func1 -> DEBU 48a3 0xc0034fa210 gate 1569284800125550400 evaluation starts" +"2019-09-24 00:26:40.131 UTC [cauthdsl] func2 -> DEBU 48a4 0xc0034fa210 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.131 UTC [cauthdsl] func2 -> DEBU 48a5 0xc0034fa210 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.131 UTC [cauthdsl] func2 -> DEBU 48a6 0xc0034fa210 principal matched by identity 0" +"2019-09-24 00:26:40.131 UTC [msp.identity] Verify -> DEBU 48a7 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:40.131 UTC [msp.identity] Verify -> DEBU 48a8 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:40.131 UTC [cauthdsl] func2 -> DEBU 48a9 0xc0034fa210 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:40.131 UTC [cauthdsl] func1 -> DEBU 48aa 0xc0034fa210 gate 1569284800125550400 evaluation succeeds" +"2019-09-24 00:26:40.131 UTC [policies] Evaluate -> DEBU 48ab Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.131 UTC [policies] Evaluate -> DEBU 48ac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.131 UTC [policies] Evaluate -> DEBU 48ad Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:40.131 UTC [policies] Evaluate -> DEBU 48ae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:40.132 UTC [msp.identity] Verify -> DEBU 48af Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:40.132 UTC [msp.identity] Verify -> DEBU 48b0 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:40.132 UTC [msp] DeserializeIdentity -> DEBU 48b1 Obtaining identity" +"2019-09-24 00:26:40.132 UTC [msp] DeserializeIdentity -> DEBU 48b2 Obtaining identity" +"2019-09-24 00:26:40.132 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48b3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:40.132 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48b4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.132 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48b5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.132 UTC [policies] Evaluate -> DEBU 48b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:40.132 UTC [policies] Evaluate -> DEBU 48b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:40.132 UTC [policies] Evaluate -> DEBU 48b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:40.132 UTC [cauthdsl] func1 -> DEBU 48b9 0xc003510100 gate 1569284800132983700 evaluation starts" +"2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48ba 0xc003510100 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48bb 0xc003510100 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48bc 0xc003510100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48bd 0xc003510100 principal evaluation fails" +"2019-09-24 00:26:40.133 UTC [cauthdsl] func1 -> DEBU 48be 0xc003510100 gate 1569284800132983700 evaluation fails" +"2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48bf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:40.133 UTC [cauthdsl] func1 -> DEBU 48c2 0xc003510940 gate 1569284800133247900 evaluation starts" +"2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48c3 0xc003510940 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48c4 0xc003510940 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48c5 0xc003510940 principal matched by identity 0" +"2019-09-24 00:26:40.133 UTC [msp.identity] Verify -> DEBU 48c6 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:40.133 UTC [msp.identity] Verify -> DEBU 48c7 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:40.133 UTC [cauthdsl] func2 -> DEBU 48c8 0xc003510940 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:40.133 UTC [cauthdsl] func1 -> DEBU 48c9 0xc003510940 gate 1569284800133247900 evaluation succeeds" +"2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48ca Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48cc Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:40.133 UTC [policies] Evaluate -> DEBU 48cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:40.133 UTC [msp.identity] Verify -> DEBU 48ce Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:40.133 UTC [msp.identity] Verify -> DEBU 48cf Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:40.134 UTC [gossip.gossip] handleMessage -> DEBU 48d0 Exiting" +"2019-09-24 00:26:40.134 UTC [gossip.gossip] handleMessage -> DEBU 48d1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.134 UTC [msp.identity] Verify -> DEBU 48d2 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:40.134 UTC [msp.identity] Verify -> DEBU 48d3 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:40.134 UTC [msp.identity] Verify -> DEBU 48d4 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:40.134 UTC [msp.identity] Verify -> DEBU 48d5 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:40.134 UTC [msp] DeserializeIdentity -> DEBU 48d6 Obtaining identity" +"2019-09-24 00:26:40.134 UTC [msp] DeserializeIdentity -> DEBU 48d7 Obtaining identity" +"2019-09-24 00:26:40.134 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48d8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:40.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48d9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48da Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:40.135 UTC [cauthdsl] func1 -> DEBU 48de 0xc0035218b0 gate 1569284800135089700 evaluation starts" +"2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48df 0xc0035218b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48e0 0xc0035218b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48e1 0xc0035218b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48e2 0xc0035218b0 principal evaluation fails" +"2019-09-24 00:26:40.135 UTC [cauthdsl] func1 -> DEBU 48e3 0xc0035218b0 gate 1569284800135089700 evaluation fails" +"2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48e4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.135 UTC [policies] Evaluate -> DEBU 48e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:40.135 UTC [cauthdsl] func1 -> DEBU 48e7 0xc002a800f0 gate 1569284800135341000 evaluation starts" +"2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48e8 0xc002a800f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.135 UTC [cauthdsl] func2 -> DEBU 48e9 0xc002a800f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.139 UTC [cauthdsl] func2 -> DEBU 48ea 0xc002a800f0 principal matched by identity 0" +"2019-09-24 00:26:40.139 UTC [msp.identity] Verify -> DEBU 48eb Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:40.139 UTC [msp.identity] Verify -> DEBU 48ec Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:40.139 UTC [cauthdsl] func2 -> DEBU 48ed 0xc002a800f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:40.139 UTC [cauthdsl] func1 -> DEBU 48ee 0xc002a800f0 gate 1569284800135341000 evaluation succeeds" +"2019-09-24 00:26:40.140 UTC [policies] Evaluate -> DEBU 48ef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.140 UTC [policies] Evaluate -> DEBU 48f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.140 UTC [policies] Evaluate -> DEBU 48f1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:40.140 UTC [policies] Evaluate -> DEBU 48f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:40.140 UTC [msp] DeserializeIdentity -> DEBU 48f3 Obtaining identity" +"2019-09-24 00:26:40.140 UTC [msp] DeserializeIdentity -> DEBU 48f4 Obtaining identity" +"2019-09-24 00:26:40.141 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:40.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48f6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48f7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.141 UTC [policies] Evaluate -> DEBU 48f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:40.141 UTC [policies] Evaluate -> DEBU 48f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:40.141 UTC [policies] Evaluate -> DEBU 48fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:40.141 UTC [cauthdsl] func1 -> DEBU 48fb 0xc002a818c0 gate 1569284800141610100 evaluation starts" +"2019-09-24 00:26:40.141 UTC [cauthdsl] func2 -> DEBU 48fc 0xc002a818c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.141 UTC [cauthdsl] func2 -> DEBU 48fd 0xc002a818c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.141 UTC [cauthdsl] func2 -> DEBU 48fe 0xc002a818c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:40.142 UTC [cauthdsl] func2 -> DEBU 48ff 0xc002a818c0 principal evaluation fails" +"2019-09-24 00:26:40.142 UTC [cauthdsl] func1 -> DEBU 4900 0xc002a818c0 gate 1569284800141610100 evaluation fails" +"2019-09-24 00:26:40.142 UTC [policies] Evaluate -> DEBU 4901 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.142 UTC [policies] Evaluate -> DEBU 4902 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.142 UTC [policies] Evaluate -> DEBU 4903 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:40.142 UTC [cauthdsl] func1 -> DEBU 4904 0xc002a90100 gate 1569284800142736200 evaluation starts" +"2019-09-24 00:26:40.142 UTC [cauthdsl] func2 -> DEBU 4905 0xc002a90100 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.143 UTC [cauthdsl] func2 -> DEBU 4906 0xc002a90100 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.143 UTC [cauthdsl] func2 -> DEBU 4907 0xc002a90100 principal matched by identity 0" +"2019-09-24 00:26:40.143 UTC [msp.identity] Verify -> DEBU 4908 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:40.143 UTC [msp.identity] Verify -> DEBU 4909 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:40.143 UTC [cauthdsl] func2 -> DEBU 490a 0xc002a90100 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:40.143 UTC [cauthdsl] func1 -> DEBU 490b 0xc002a90100 gate 1569284800142736200 evaluation succeeds" +"2019-09-24 00:26:40.143 UTC [policies] Evaluate -> DEBU 490c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.144 UTC [policies] Evaluate -> DEBU 490d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.144 UTC [policies] Evaluate -> DEBU 490e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:40.144 UTC [policies] Evaluate -> DEBU 490f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:40.144 UTC [gossip.gossip] handleMessage -> DEBU 4910 Exiting" +"2019-09-24 00:26:40.144 UTC [gossip.gossip] handleMessage -> DEBU 4911 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.144 UTC [msp] DeserializeIdentity -> DEBU 4912 Obtaining identity" +"2019-09-24 00:26:40.144 UTC [msp] DeserializeIdentity -> DEBU 4913 Obtaining identity" +"2019-09-24 00:26:40.145 UTC [msp] DeserializeIdentity -> DEBU 4914 Obtaining identity" +"2019-09-24 00:26:40.145 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4915 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:40.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4916 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4917 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 4918 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 4919 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 491a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:40.145 UTC [cauthdsl] func1 -> DEBU 491b 0xc002a91c10 gate 1569284800145487700 evaluation starts" +"2019-09-24 00:26:40.145 UTC [cauthdsl] func2 -> DEBU 491c 0xc002a91c10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.145 UTC [cauthdsl] func2 -> DEBU 491d 0xc002a91c10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.145 UTC [cauthdsl] func2 -> DEBU 491e 0xc002a91c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:40.145 UTC [cauthdsl] func2 -> DEBU 491f 0xc002a91c10 principal evaluation fails" +"2019-09-24 00:26:40.145 UTC [cauthdsl] func1 -> DEBU 4920 0xc002a91c10 gate 1569284800145487700 evaluation fails" +"2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 4921 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 4922 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.145 UTC [policies] Evaluate -> DEBU 4923 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:40.145 UTC [cauthdsl] func1 -> DEBU 4924 0xc002aa2450 gate 1569284800145972700 evaluation starts" +"2019-09-24 00:26:40.146 UTC [cauthdsl] func2 -> DEBU 4925 0xc002aa2450 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.146 UTC [cauthdsl] func2 -> DEBU 4926 0xc002aa2450 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.147 UTC [cauthdsl] func2 -> DEBU 4927 0xc002aa2450 principal matched by identity 0" +"2019-09-24 00:26:40.148 UTC [msp.identity] Verify -> DEBU 4928 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:40.148 UTC [msp.identity] Verify -> DEBU 4929 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:40.148 UTC [cauthdsl] func2 -> DEBU 492a 0xc002aa2450 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:40.148 UTC [cauthdsl] func1 -> DEBU 492b 0xc002aa2450 gate 1569284800145972700 evaluation succeeds" +"2019-09-24 00:26:40.148 UTC [policies] Evaluate -> DEBU 492c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.149 UTC [policies] Evaluate -> DEBU 492d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.149 UTC [policies] Evaluate -> DEBU 492e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:40.149 UTC [policies] Evaluate -> DEBU 492f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:40.149 UTC [msp.identity] Verify -> DEBU 4930 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:40.149 UTC [msp.identity] Verify -> DEBU 4931 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:40.150 UTC [msp.identity] Verify -> DEBU 4932 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:40.150 UTC [msp.identity] Verify -> DEBU 4933 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:40.150 UTC [msp] DeserializeIdentity -> DEBU 4934 Obtaining identity" +"2019-09-24 00:26:40.150 UTC [msp] DeserializeIdentity -> DEBU 4935 Obtaining identity" +"2019-09-24 00:26:40.150 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4936 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:40.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4937 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.150 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4938 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.150 UTC [policies] Evaluate -> DEBU 4939 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:40.150 UTC [policies] Evaluate -> DEBU 493a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:40.150 UTC [policies] Evaluate -> DEBU 493b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:40.150 UTC [cauthdsl] func1 -> DEBU 493c 0xc004c78a60 gate 1569284800150854800 evaluation starts" +"2019-09-24 00:26:40.150 UTC [cauthdsl] func2 -> DEBU 493d 0xc004c78a60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.150 UTC [cauthdsl] func2 -> DEBU 493e 0xc004c78a60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.150 UTC [cauthdsl] func2 -> DEBU 493f 0xc004c78a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:40.151 UTC [cauthdsl] func2 -> DEBU 4940 0xc004c78a60 principal evaluation fails" +"2019-09-24 00:26:40.151 UTC [cauthdsl] func1 -> DEBU 4941 0xc004c78a60 gate 1569284800150854800 evaluation fails" +"2019-09-24 00:26:40.151 UTC [policies] Evaluate -> DEBU 4942 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.151 UTC [policies] Evaluate -> DEBU 4943 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.153 UTC [policies] Evaluate -> DEBU 4944 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:40.153 UTC [cauthdsl] func1 -> DEBU 4945 0xc004c792a0 gate 1569284800153675400 evaluation starts" +"2019-09-24 00:26:40.153 UTC [cauthdsl] func2 -> DEBU 4946 0xc004c792a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.153 UTC [cauthdsl] func2 -> DEBU 4947 0xc004c792a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.153 UTC [cauthdsl] func2 -> DEBU 4948 0xc004c792a0 principal matched by identity 0" +"2019-09-24 00:26:40.153 UTC [msp.identity] Verify -> DEBU 4949 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:40.153 UTC [msp.identity] Verify -> DEBU 494a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:40.154 UTC [cauthdsl] func2 -> DEBU 494b 0xc004c792a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:40.154 UTC [cauthdsl] func1 -> DEBU 494c 0xc004c792a0 gate 1569284800153675400 evaluation succeeds" +"2019-09-24 00:26:40.154 UTC [policies] Evaluate -> DEBU 494d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.154 UTC [policies] Evaluate -> DEBU 494e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.154 UTC [policies] Evaluate -> DEBU 494f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:40.154 UTC [policies] Evaluate -> DEBU 4950 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:40.154 UTC [gossip.gossip] handleMessage -> DEBU 4951 Exiting" +"2019-09-24 00:26:40.269 UTC [msp] DeserializeIdentity -> DEBU 4952 Obtaining identity" +"2019-09-24 00:26:40.269 UTC [msp] DeserializeIdentity -> DEBU 4953 Obtaining identity" +"2019-09-24 00:26:40.269 UTC [gossip.pull] Hello -> DEBU 4954 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:40.269 UTC [msp] DeserializeIdentity -> DEBU 4955 Obtaining identity" +"2019-09-24 00:26:40.269 UTC [msp] DeserializeIdentity -> DEBU 4956 Obtaining identity" +"2019-09-24 00:26:40.269 UTC [gossip.comm] Send -> DEBU 4957 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:40.269 UTC [gossip.comm] sendToEndpoint -> DEBU 4958 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.270 UTC [gossip.comm] sendToEndpoint -> DEBU 4959 Exiting" +"2019-09-24 00:26:40.271 UTC [gossip.comm] func1 -> DEBU 495a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.271 UTC [gossip.gossip] handleMessage -> DEBU 495b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.272 UTC [gossip.pull] HandleMessage -> DEBU 495c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.272 UTC [gossip.gossip] handleMessage -> DEBU 495d Exiting" +"2019-09-24 00:26:40.592 UTC [gossip.comm] func1 -> DEBU 495e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.592 UTC [gossip.gossip] handleMessage -> DEBU 495f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.592 UTC [msp] DeserializeIdentity -> DEBU 4960 Obtaining identity" +"2019-09-24 00:26:40.592 UTC [msp] DeserializeIdentity -> DEBU 4961 Obtaining identity" +"2019-09-24 00:26:40.592 UTC [gossip.gossip] handleMessage -> DEBU 4962 Exiting" +"2019-09-24 00:26:40.659 UTC [gossip.comm] func1 -> DEBU 4963 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:40.659 UTC [gossip.gossip] handleMessage -> DEBU 4964 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:40.659 UTC [gossip.gossip] handleMessage -> DEBU 4965 Exiting" +"2019-09-24 00:26:40.660 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4966 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:40.660 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4967 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:40.660 UTC [msp] DeserializeIdentity -> DEBU 4968 Obtaining identity" +"2019-09-24 00:26:40.660 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4969 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:40.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 496a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 496b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.660 UTC [policies] Evaluate -> DEBU 496c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:40.660 UTC [policies] Evaluate -> DEBU 496d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:40.660 UTC [policies] Evaluate -> DEBU 496e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func1 -> DEBU 496f 0xc004a6c500 gate 1569284800660963900 evaluation starts" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 4970 0xc004a6c500 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 4971 0xc004a6c500 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 4972 0xc004a6c500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 4973 0xc004a6c500 principal evaluation fails" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func1 -> DEBU 4974 0xc004a6c500 gate 1569284800660963900 evaluation fails" +"2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4975 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4976 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4977 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func1 -> DEBU 4978 0xc004a6cd40 gate 1569284800661321200 evaluation starts" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 4979 0xc004a6cd40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 497a 0xc004a6cd40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 497b 0xc004a6cd40 principal matched by identity 0" +"2019-09-24 00:26:40.661 UTC [msp.identity] Verify -> DEBU 497c Verify: digest = 00000000 da a6 c4 fc 9a 2c cf 55 59 aa 1c 00 fd c8 6c ef |.....,.UY.....l.| +00000010 f4 79 67 5b 16 e9 49 ce f0 f6 fc 47 69 2a 8f 62 |.yg[..I....Gi*.b|" +"2019-09-24 00:26:40.661 UTC [msp.identity] Verify -> DEBU 497d Verify: sig = 00000000 30 44 02 20 57 82 dd c8 af d3 13 de 20 28 cc 16 |0D. W....... (..| +00000010 b0 b2 32 b6 0a 9b 65 fa 58 af 95 61 2b 3d ed 03 |..2...e.X..a+=..| +00000020 15 c8 8a 8d 02 20 04 71 fb 7c b8 2a 62 cb 4b 21 |..... .q.|.*b.K!| +00000030 02 67 90 ff fb 47 70 ce 0a 2b 0e e3 f8 2b 42 da |.g...Gp..+...+B.| +00000040 b5 21 c8 9d ae 12 |.!....|" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func2 -> DEBU 497e 0xc004a6cd40 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:40.661 UTC [cauthdsl] func1 -> DEBU 497f 0xc004a6cd40 gate 1569284800661321200 evaluation succeeds" +"2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4980 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4981 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4982 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:40.661 UTC [policies] Evaluate -> DEBU 4983 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:40.662 UTC [gossip.discovery] handleAliveMessage -> DEBU 4984 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:40.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 4985 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:40.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 4986 updating membership: timestamp: " +"2019-09-24 00:26:40.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 4987 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:40.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 4988 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:40.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 4989 Exiting" +"2019-09-24 00:26:40.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 498a Exiting" +"2019-09-24 00:26:40.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498b Exiting" +"2019-09-24 00:26:40.666 UTC [gossip.comm] func1 -> DEBU 498c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:40.667 UTC [gossip.gossip] handleMessage -> DEBU 498d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:40.667 UTC [gossip.gossip] handleMessage -> DEBU 498e Exiting" +"2019-09-24 00:26:40.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:40.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4990 Exiting" +"2019-09-24 00:26:40.668 UTC [msp] DeserializeIdentity -> DEBU 4991 Obtaining identity" +"2019-09-24 00:26:40.669 UTC [gossip.gossip] handleMessage -> DEBU 4992 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:40.669 UTC [gossip.gossip] handleMessage -> DEBU 4993 Exiting" +"2019-09-24 00:26:40.669 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4994 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:40.672 UTC [msp] DeserializeIdentity -> DEBU 4995 Obtaining identity" +"2019-09-24 00:26:40.673 UTC [msp] DeserializeIdentity -> DEBU 4996 Obtaining identity" +"2019-09-24 00:26:40.673 UTC [msp] DeserializeIdentity -> DEBU 4997 Obtaining identity" +"2019-09-24 00:26:40.674 UTC [msp] DeserializeIdentity -> DEBU 4998 Obtaining identity" +"2019-09-24 00:26:40.674 UTC [msp] DeserializeIdentity -> DEBU 4999 Obtaining identity" +"2019-09-24 00:26:40.674 UTC [msp] DeserializeIdentity -> DEBU 499a Obtaining identity" +"2019-09-24 00:26:40.674 UTC [gossip.comm] Send -> DEBU 499b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:40.674 UTC [msp] DeserializeIdentity -> DEBU 499c Obtaining identity" +"2019-09-24 00:26:40.674 UTC [gossip.comm] Send -> DEBU 499d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:40.674 UTC [gossip.comm] sendToEndpoint -> DEBU 499e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:40.674 UTC [gossip.comm] sendToEndpoint -> DEBU 499f Exiting" +"2019-09-24 00:26:40.674 UTC [gossip.comm] sendToEndpoint -> DEBU 49a0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:40.674 UTC [gossip.comm] sendToEndpoint -> DEBU 49a1 Exiting" +"2019-09-24 00:26:40.674 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49a2 Exiting" +"2019-09-24 00:26:40.749 UTC [gossip.comm] func1 -> DEBU 49a3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.750 UTC [gossip.gossip] handleMessage -> DEBU 49a4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.750 UTC [gossip.gossip] handleMessage -> DEBU 49a5 Exiting" +"2019-09-24 00:26:40.750 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49a6 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.750 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49a7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:40.751 UTC [msp] DeserializeIdentity -> DEBU 49a8 Obtaining identity" +"2019-09-24 00:26:40.751 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:40.751 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49aa Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.751 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49ab Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:40.751 UTC [policies] Evaluate -> DEBU 49ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:40.751 UTC [policies] Evaluate -> DEBU 49ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:40.751 UTC [policies] Evaluate -> DEBU 49ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:40.751 UTC [cauthdsl] func1 -> DEBU 49af 0xc004a7d9e0 gate 1569284800751925700 evaluation starts" +"2019-09-24 00:26:40.751 UTC [cauthdsl] func2 -> DEBU 49b0 0xc004a7d9e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49b1 0xc004a7d9e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49b2 0xc004a7d9e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49b3 0xc004a7d9e0 principal evaluation fails" +"2019-09-24 00:26:40.752 UTC [cauthdsl] func1 -> DEBU 49b4 0xc004a7d9e0 gate 1569284800751925700 evaluation fails" +"2019-09-24 00:26:40.752 UTC [policies] Evaluate -> DEBU 49b5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.752 UTC [policies] Evaluate -> DEBU 49b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:40.752 UTC [policies] Evaluate -> DEBU 49b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:40.752 UTC [cauthdsl] func1 -> DEBU 49b8 0xc004aaa220 gate 1569284800752538400 evaluation starts" +"2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49b9 0xc004aaa220 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49ba 0xc004aaa220 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49bb 0xc004aaa220 principal matched by identity 0" +"2019-09-24 00:26:40.752 UTC [msp.identity] Verify -> DEBU 49bc Verify: digest = 00000000 27 2d 47 ab be 8f 96 f7 4d ce 6f a2 18 e7 ea 0b |'-G.....M.o.....| +00000010 81 cf 71 77 76 ef ea ac 82 1b 43 3a 4b f9 c2 6c |..qwv.....C:K..l|" +"2019-09-24 00:26:40.752 UTC [msp.identity] Verify -> DEBU 49bd Verify: sig = 00000000 30 45 02 21 00 e2 78 de 35 08 9b 9a 7a a9 25 bc |0E.!..x.5...z.%.| +00000010 cc bb d8 f7 db ca 6c 07 1e aa 44 04 13 31 c4 dc |......l...D..1..| +00000020 37 6b 35 6f 08 02 20 04 8b 60 66 f7 5f f6 56 19 |7k5o.. ..`f._.V.| +00000030 0f ba be 0d 85 67 c3 91 33 7d 63 2b 4a 5d fb 28 |.....g..3}c+J].(| +00000040 eb a6 1d 54 2a 84 35 |...T*.5|" +"2019-09-24 00:26:40.752 UTC [cauthdsl] func2 -> DEBU 49be 0xc004aaa220 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:40.752 UTC [cauthdsl] func1 -> DEBU 49bf 0xc004aaa220 gate 1569284800752538400 evaluation succeeds" +"2019-09-24 00:26:40.752 UTC [policies] Evaluate -> DEBU 49c0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.752 UTC [policies] Evaluate -> DEBU 49c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:40.753 UTC [policies] Evaluate -> DEBU 49c2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:40.753 UTC [policies] Evaluate -> DEBU 49c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:40.753 UTC [gossip.discovery] handleAliveMessage -> DEBU 49c4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:40.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 49c5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:40.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 49c6 updating membership: timestamp: " +"2019-09-24 00:26:40.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 49c7 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:40.763 UTC [gossip.discovery] learnExistingMembers -> DEBU 49c8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:40.763 UTC [gossip.discovery] learnExistingMembers -> DEBU 49c9 Exiting" +"2019-09-24 00:26:40.763 UTC [gossip.discovery] handleAliveMessage -> DEBU 49ca Exiting" +"2019-09-24 00:26:40.763 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49cb Exiting" +"2019-09-24 00:26:40.764 UTC [gossip.discovery] sendMemResponse -> DEBU 49cc Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:40.764 UTC [msp] DeserializeIdentity -> DEBU 49cd Obtaining identity" +"2019-09-24 00:26:40.765 UTC [msp] DeserializeIdentity -> DEBU 49ce Obtaining identity" +"2019-09-24 00:26:40.766 UTC [msp] DeserializeIdentity -> DEBU 49cf Obtaining identity" +"2019-09-24 00:26:40.766 UTC [gossip.comm] Send -> DEBU 49d0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:40.768 UTC [gossip.discovery] sendMemResponse -> DEBU 49d1 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020C" signature:"0D\002 }\264\200+\343!\024\n\221\302\371\246\324\351\023\263+Q\013\323\236YDh,\241$;T\252\374b\002 \013\300Pt\205.yx4\303&\301>n\343\307b\215\340;\027?\266|^\335\260\250%K\275:" > alive: alive:\301\277\226\237p\027'\025\337\336/\330C\251?\002 &\320\266)\037\324F\245:\\s\340^R\215c\345?\377\\\036\017\304\013\222\344\023F\374uD\346" > " +"2019-09-24 00:26:40.768 UTC [gossip.comm] sendToEndpoint -> DEBU 49d2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.768 UTC [gossip.comm] sendToEndpoint -> DEBU 49d3 Exiting" +"2019-09-24 00:26:40.796 UTC [gossip.comm] func1 -> DEBU 49d4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.796 UTC [gossip.gossip] handleMessage -> DEBU 49d5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.796 UTC [gossip.pull] HandleMessage -> DEBU 49d6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.796 UTC [msp] DeserializeIdentity -> DEBU 49d7 Obtaining identity" +"2019-09-24 00:26:40.796 UTC [msp] DeserializeIdentity -> DEBU 49d8 Obtaining identity" +"2019-09-24 00:26:40.797 UTC [msp] DeserializeIdentity -> DEBU 49d9 Obtaining identity" +"2019-09-24 00:26:40.797 UTC [msp] DeserializeIdentity -> DEBU 49da Obtaining identity" +"2019-09-24 00:26:40.797 UTC [msp] DeserializeIdentity -> DEBU 49db Obtaining identity" +"2019-09-24 00:26:40.797 UTC [msp] DeserializeIdentity -> DEBU 49dc Obtaining identity" +"2019-09-24 00:26:40.797 UTC [gossip.pull] SendDigest -> DEBU 49dd Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:40.797 UTC [gossip.gossip] handleMessage -> DEBU 49de Exiting" +"2019-09-24 00:26:40.832 UTC [gossip.comm] func1 -> DEBU 49df Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.833 UTC [gossip.gossip] handleMessage -> DEBU 49e0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.833 UTC [gossip.pull] HandleMessage -> DEBU 49e1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:40.833 UTC [gossip.pull] SendDigest -> DEBU 49e2 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:40.833 UTC [gossip.gossip] handleMessage -> DEBU 49e3 Exiting" +"2019-09-24 00:26:41.076 UTC [gossip.gossip] handleMessage -> DEBU 49e4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:41.076 UTC [msp] DeserializeIdentity -> DEBU 49e5 Obtaining identity" +"2019-09-24 00:26:41.078 UTC [msp] DeserializeIdentity -> DEBU 49e6 Obtaining identity" +"2019-09-24 00:26:41.078 UTC [msp] DeserializeIdentity -> DEBU 49e7 Obtaining identity" +"2019-09-24 00:26:41.078 UTC [gossip.gossip] handleMessage -> DEBU 49e8 Exiting" +"2019-09-24 00:26:41.643 UTC [gossip.comm] func1 -> DEBU 49e9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:41.644 UTC [gossip.gossip] handleMessage -> DEBU 49ea Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:41.644 UTC [gossip.pull] HandleMessage -> DEBU 49eb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:41.644 UTC [gossip.pull] SendDigest -> DEBU 49ec Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:41.644 UTC [gossip.gossip] handleMessage -> DEBU 49ed Exiting" +"2019-09-24 00:26:41.771 UTC [gossip.comm] func1 -> DEBU 49ee Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020D" signature:"0D\002 \022\313\017\2733\314\327\1773+\251\236\313\370\355\343\234\343\343\354\362\367\361\236&\343\017:\214\206\363\372\002 \002\210\316\275\317\266\327\201\275q\273\n\027u\030x-@\377\357\034_P\204\236\3433\205\002\240\3279" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:41.771 UTC [gossip.gossip] handleMessage -> DEBU 49ef Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020D" signature:"0D\002 \022\313\017\2733\314\327\1773+\251\236\313\370\355\343\234\343\343\354\362\367\361\236&\343\017:\214\206\363\372\002 \002\210\316\275\317\266\327\201\275q\273\n\027u\030x-@\377\357\034_P\204\236\3433\205\002\240\3279" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:41.771 UTC [gossip.gossip] handleMessage -> DEBU 49f0 Exiting" +"2019-09-24 00:26:41.771 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49f1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020D" signature:"0D\002 \022\313\017\2733\314\327\1773+\251\236\313\370\355\343\234\343\343\354\362\367\361\236&\343\017:\214\206\363\372\002 \002\210\316\275\317\266\327\201\275q\273\n\027u\030x-@\377\357\034_P\204\236\3433\205\002\240\3279" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:41.771 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49f2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:41.771 UTC [msp.identity] Verify -> DEBU 49f3 Verify: digest = 00000000 9c a8 21 39 58 f2 80 27 4a db d8 48 bd d2 00 9c |..!9X..'J..H....| +00000010 f1 16 50 6c a3 7e 41 66 93 48 af 29 db 3a 16 96 |..Pl.~Af.H.).:..|" +"2019-09-24 00:26:41.771 UTC [msp.identity] Verify -> DEBU 49f4 Verify: sig = 00000000 30 44 02 20 12 cb 0f bb 33 cc d7 7f 33 2b a9 9e |0D. ....3...3+..| +00000010 cb f8 ed e3 9c e3 e3 ec f2 f7 f1 9e 26 e3 0f 3a |............&..:| +00000020 8c 86 f3 fa 02 20 02 88 ce bd cf b6 d7 81 bd 71 |..... .........q| +00000030 bb 0a 17 75 18 78 2d 40 ff ef 1c 5f 50 84 9e e3 |...u.x-@..._P...| +00000040 33 85 02 a0 d7 39 |3....9|" +"2019-09-24 00:26:41.771 UTC [msp.identity] Verify -> DEBU 49f5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:41.771 UTC [msp.identity] Verify -> DEBU 49f6 Verify: sig = 00000000 30 45 02 21 00 c9 21 e8 7f 7b f8 a2 ae 36 e8 e7 |0E.!..!..{...6..| +00000010 9b 36 86 52 c0 f4 74 b7 66 d6 49 16 cb ee 92 df |.6.R..t.f.I.....| +00000020 2d 0e a4 2a 53 02 20 2e 5c a5 3b b9 1f 56 fd 98 |-..*S. .\.;..V..| +00000030 81 31 01 4d 38 33 4f 3c da 58 8f e7 d4 b6 a8 c9 |.1.M83O<.X......| +00000040 ca 3c 1b e9 41 64 9e |.<..Ad.|" +"2019-09-24 00:26:41.772 UTC [gossip.discovery] handleAliveMessage -> DEBU 49f7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:41.772 UTC [gossip.discovery] learnExistingMembers -> DEBU 49f8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:26:41.772 UTC [gossip.discovery] learnExistingMembers -> DEBU 49f9 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:41.772 UTC [gossip.discovery] learnExistingMembers -> DEBU 49fa Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:41.772 UTC [gossip.discovery] learnExistingMembers -> DEBU 49fb Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:41.772 UTC [gossip.discovery] learnExistingMembers -> DEBU 49fc Exiting" +"2019-09-24 00:26:41.772 UTC [gossip.discovery] handleAliveMessage -> DEBU 49fd Exiting" +"2019-09-24 00:26:41.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49fe Exiting" +"2019-09-24 00:26:41.772 UTC [gossip.discovery] sendMemResponse -> DEBU 49ff Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:41.772 UTC [msp] DeserializeIdentity -> DEBU 4a00 Obtaining identity" +"2019-09-24 00:26:41.772 UTC [msp] DeserializeIdentity -> DEBU 4a01 Obtaining identity" +"2019-09-24 00:26:41.772 UTC [gossip.comm] Send -> DEBU 4a02 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:41.773 UTC [gossip.discovery] sendMemResponse -> DEBU 4a03 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020D" signature:"0D\002 \022\313\017\2733\314\327\1773+\251\236\313\370\355\343\234\343\343\354\362\367\361\236&\343\017:\214\206\363\372\002 \002\210\316\275\317\266\327\201\275q\273\n\027u\030x-@\377\357\034_P\204\236\3433\205\002\240\3279" secret_envelope: > alive:\301\277\226\237p\027'\025\337\336/\330C\251?\002 &\320\266)\037\324F\245:\\s\340^R\215c\345?\377\\\036\017\304\013\222\344\023F\374uD\346" > " +"2019-09-24 00:26:41.773 UTC [gossip.comm] sendToEndpoint -> DEBU 4a04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:41.773 UTC [gossip.comm] sendToEndpoint -> DEBU 4a05 Exiting" +"2019-09-24 00:26:42.008 UTC [gossip.comm] func1 -> DEBU 4a06 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:42.008 UTC [gossip.gossip] handleMessage -> DEBU 4a07 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:42.009 UTC [msp] DeserializeIdentity -> DEBU 4a08 Obtaining identity" +"2019-09-24 00:26:42.009 UTC [msp] DeserializeIdentity -> DEBU 4a09 Obtaining identity" +"2019-09-24 00:26:42.009 UTC [msp] DeserializeIdentity -> DEBU 4a0a Obtaining identity" +"2019-09-24 00:26:42.009 UTC [gossip.gossip] handleMessage -> DEBU 4a0b Exiting" +"2019-09-24 00:26:42.308 UTC [gossip.election] waitForInterrupt -> DEBU 4a0c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:42.308 UTC [gossip.election] IsLeader -> DEBU 4a0d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:42.308 UTC [msp] GetDefaultSigningIdentity -> DEBU 4a0e Obtaining default signing identity" +"2019-09-24 00:26:42.308 UTC [msp.identity] Sign -> DEBU 4a0f Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510161801 " +"2019-09-24 00:26:42.308 UTC [msp.identity] Sign -> DEBU 4a10 Sign: digest: DC12558297680A3FC7D81BA40F316A02C2121A94F3861D6EDDA34FB2061DA543 " +"2019-09-24 00:26:42.308 UTC [gossip.election] waitForInterrupt -> DEBU 4a11 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:42.308 UTC [msp] DeserializeIdentity -> DEBU 4a12 Obtaining identity" +"2019-09-24 00:26:42.308 UTC [msp] DeserializeIdentity -> DEBU 4a13 Obtaining identity" +"2019-09-24 00:26:42.308 UTC [msp] DeserializeIdentity -> DEBU 4a14 Obtaining identity" +"2019-09-24 00:26:42.308 UTC [msp] DeserializeIdentity -> DEBU 4a15 Obtaining identity" +"2019-09-24 00:26:42.309 UTC [gossip.comm] Send -> DEBU 4a16 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:42.309 UTC [msp] DeserializeIdentity -> DEBU 4a17 Obtaining identity" +"2019-09-24 00:26:42.309 UTC [msp] DeserializeIdentity -> DEBU 4a18 Obtaining identity" +"2019-09-24 00:26:42.309 UTC [gossip.comm] sendToEndpoint -> DEBU 4a19 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:26:42.309 UTC [gossip.comm] sendToEndpoint -> DEBU 4a1a Exiting" +"2019-09-24 00:26:42.689 UTC [gossip.comm] func1 -> DEBU 4a1b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:42.689 UTC [gossip.gossip] handleMessage -> DEBU 4a1c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:42.689 UTC [gossip.gossip] handleMessage -> DEBU 4a1d Exiting" +"2019-09-24 00:26:42.689 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a1e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:42.689 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a1f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:42.689 UTC [msp.identity] Verify -> DEBU 4a20 Verify: digest = 00000000 e1 8d dc 39 38 3a 08 39 f0 a3 12 1e f3 e8 63 00 |...98:.9......c.| +00000010 50 20 2b db 32 70 45 6d 58 52 b1 6c a0 a0 b7 59 |P +.2pEmXR.l...Y|" +"2019-09-24 00:26:42.689 UTC [msp.identity] Verify -> DEBU 4a21 Verify: sig = 00000000 30 45 02 21 00 cf 3c ff e1 8b a8 bd fb 05 28 64 |0E.!..<.......(d| +00000010 dd d6 25 62 1f bf d1 31 ba 04 72 90 67 0f c1 89 |..%b...1..r.g...| +00000020 9d 4b 4f 24 89 02 20 7e bc 57 26 44 c3 81 fe 5e |.KO$.. ~.W&D...^| +00000030 59 8b a0 ed c4 e9 8c 09 84 0e 30 db ef 4b e6 b0 |Y.........0..K..| +00000040 87 f5 c0 8d 00 55 11 |.....U.|" +"2019-09-24 00:26:42.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a22 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:42.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a23 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:42.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a24 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:42.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a25 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:42.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a26 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:42.690 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a27 Exiting" +"2019-09-24 00:26:42.690 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a28 Exiting" +"2019-09-24 00:26:42.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a29 Exiting" +"2019-09-24 00:26:42.690 UTC [msp] DeserializeIdentity -> DEBU 4a2a Obtaining identity" +"2019-09-24 00:26:42.690 UTC [msp] DeserializeIdentity -> DEBU 4a2b Obtaining identity" +"2019-09-24 00:26:42.690 UTC [msp] DeserializeIdentity -> DEBU 4a2c Obtaining identity" +"2019-09-24 00:26:42.690 UTC [gossip.comm] Send -> DEBU 4a2d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:42.690 UTC [msp] DeserializeIdentity -> DEBU 4a2e Obtaining identity" +"2019-09-24 00:26:42.690 UTC [gossip.comm] Send -> DEBU 4a2f Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:42.690 UTC [gossip.comm] sendToEndpoint -> DEBU 4a30 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:42.690 UTC [gossip.comm] sendToEndpoint -> DEBU 4a31 Exiting" +"2019-09-24 00:26:42.690 UTC [gossip.comm] sendToEndpoint -> DEBU 4a32 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:42.691 UTC [gossip.comm] sendToEndpoint -> DEBU 4a33 Exiting" +"2019-09-24 00:26:42.701 UTC [gossip.comm] func1 -> DEBU 4a34 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:42.701 UTC [gossip.gossip] handleMessage -> DEBU 4a35 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:42.701 UTC [gossip.gossip] handleMessage -> DEBU 4a36 Exiting" +"2019-09-24 00:26:42.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a37 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:42.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a38 Exiting" +"2019-09-24 00:26:43.697 UTC [gossip.pull] Hello -> DEBU 4a39 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:43.697 UTC [gossip.comm] Send -> DEBU 4a3a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:43.697 UTC [gossip.pull] Hello -> DEBU 4a3b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:43.697 UTC [gossip.comm] Send -> DEBU 4a3c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:43.698 UTC [gossip.pull] Hello -> DEBU 4a3d Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a3e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a3f Exiting" +"2019-09-24 00:26:43.698 UTC [gossip.comm] Send -> DEBU 4a40 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a41 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a42 Exiting" +"2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a43 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.698 UTC [gossip.comm] sendToEndpoint -> DEBU 4a44 Exiting" +"2019-09-24 00:26:43.703 UTC [gossip.comm] func1 -> DEBU 4a45 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.703 UTC [gossip.gossip] handleMessage -> DEBU 4a46 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.703 UTC [gossip.pull] HandleMessage -> DEBU 4a47 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.703 UTC [gossip.gossip] handleMessage -> DEBU 4a48 Exiting" +"2019-09-24 00:26:43.703 UTC [gossip.gossip] handleMessage -> DEBU 4a49 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.703 UTC [gossip.pull] HandleMessage -> DEBU 4a4a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.703 UTC [gossip.gossip] handleMessage -> DEBU 4a4b Exiting" +"2019-09-24 00:26:43.703 UTC [gossip.comm] func1 -> DEBU 4a4c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.704 UTC [gossip.gossip] handleMessage -> DEBU 4a4d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.704 UTC [gossip.pull] HandleMessage -> DEBU 4a4e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.704 UTC [gossip.gossip] handleMessage -> DEBU 4a4f Exiting" +"2019-09-24 00:26:43.838 UTC [msp] GetDefaultSigningIdentity -> DEBU 4a50 Obtaining default signing identity" +"2019-09-24 00:26:43.838 UTC [msp.identity] Sign -> DEBU 4a51 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151041 " +"2019-09-24 00:26:43.838 UTC [msp.identity] Sign -> DEBU 4a52 Sign: digest: B8D28E7491E690028C15EA9CFF6BC94CF827EEBD30BD59C78BA22113B7BCA584 " +"2019-09-24 00:26:43.838 UTC [msp] GetDefaultSigningIdentity -> DEBU 4a53 Obtaining default signing identity" +"2019-09-24 00:26:43.838 UTC [msp.identity] Sign -> DEBU 4a54 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:43.838 UTC [msp.identity] Sign -> DEBU 4a55 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:43.838 UTC [gossip.comm] Send -> DEBU 4a56 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:43.838 UTC [msp] DeserializeIdentity -> DEBU 4a57 Obtaining identity" +"2019-09-24 00:26:43.838 UTC [gossip.comm] Send -> DEBU 4a58 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:43.838 UTC [msp] DeserializeIdentity -> DEBU 4a59 Obtaining identity" +"2019-09-24 00:26:43.838 UTC [gossip.comm] sendToEndpoint -> DEBU 4a5a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.838 UTC [gossip.comm] Send -> DEBU 4a5b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:43.838 UTC [gossip.comm] sendToEndpoint -> DEBU 4a5c Exiting" +"2019-09-24 00:26:43.838 UTC [gossip.comm] sendToEndpoint -> DEBU 4a5d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.838 UTC [gossip.comm] sendToEndpoint -> DEBU 4a5e Exiting" +"2019-09-24 00:26:43.839 UTC [gossip.comm] sendToEndpoint -> DEBU 4a5f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.839 UTC [gossip.comm] sendToEndpoint -> DEBU 4a60 Exiting" +"2019-09-24 00:26:43.843 UTC [gossip.comm] func1 -> DEBU 4a61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.843 UTC [gossip.gossip] handleMessage -> DEBU 4a62 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.843 UTC [gossip.gossip] handleMessage -> DEBU 4a63 Exiting" +"2019-09-24 00:26:43.843 UTC [gossip.gossip] handleMessage -> DEBU 4a64 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a65 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a66 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:43.844 UTC [msp.identity] Verify -> DEBU 4a67 Verify: digest = 00000000 b8 d2 8e 74 91 e6 90 02 8c 15 ea 9c ff 6b c9 4c |...t.........k.L| +00000010 f8 27 ee bd 30 bd 59 c7 8b a2 21 13 b7 bc a5 84 |.'..0.Y...!.....|" +"2019-09-24 00:26:43.844 UTC [msp.identity] Verify -> DEBU 4a68 Verify: sig = 00000000 30 44 02 20 29 78 cb af da 63 2d 9d bc 7a 48 04 |0D. )x...c-..zH.| +00000010 64 87 da 90 98 e2 38 a9 85 bf e3 46 67 3c 15 40 |d.....8....Fg<.@| +00000020 0a ea 80 92 02 20 6d b6 50 6a c3 0c 56 25 38 d4 |..... m.Pj..V%8.| +00000030 e7 ed 57 22 1f b6 f7 7d 43 22 19 cc ff 46 3d b3 |..W"...}C"...F=.| +00000040 9e b9 73 b9 b7 c0 |..s...|" +"2019-09-24 00:26:43.844 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a69 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:43.844 UTC [gossip.discovery] isSentByMe -> DEBU 4a6a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:43.844 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a6b Exiting" +"2019-09-24 00:26:43.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a6c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:43.844 UTC [msp] DeserializeIdentity -> DEBU 4a6d Obtaining identity" +"2019-09-24 00:26:43.844 UTC [gossip.comm] func1 -> DEBU 4a6e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a6f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:43.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a70 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:43.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a71 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a73 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func1 -> DEBU 4a75 0xc0042d1990 gate 1569284803845111800 evaluation starts" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a76 0xc0042d1990 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a77 0xc0042d1990 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a78 0xc0042d1990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a79 0xc0042d1990 principal evaluation fails" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func1 -> DEBU 4a7a 0xc0042d1990 gate 1569284803845111800 evaluation fails" +"2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a7b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func1 -> DEBU 4a7e 0xc0042de1d0 gate 1569284803845408800 evaluation starts" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a7f 0xc0042de1d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a80 0xc0042de1d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a81 0xc0042de1d0 principal matched by identity 0" +"2019-09-24 00:26:43.845 UTC [msp.identity] Verify -> DEBU 4a82 Verify: digest = 00000000 27 2d 47 ab be 8f 96 f7 4d ce 6f a2 18 e7 ea 0b |'-G.....M.o.....| +00000010 81 cf 71 77 76 ef ea ac 82 1b 43 3a 4b f9 c2 6c |..qwv.....C:K..l|" +"2019-09-24 00:26:43.845 UTC [msp.identity] Verify -> DEBU 4a83 Verify: sig = 00000000 30 45 02 21 00 e2 78 de 35 08 9b 9a 7a a9 25 bc |0E.!..x.5...z.%.| +00000010 cc bb d8 f7 db ca 6c 07 1e aa 44 04 13 31 c4 dc |......l...D..1..| +00000020 37 6b 35 6f 08 02 20 04 8b 60 66 f7 5f f6 56 19 |7k5o.. ..`f._.V.| +00000030 0f ba be 0d 85 67 c3 91 33 7d 63 2b 4a 5d fb 28 |.....g..3}c+J].(| +00000040 eb a6 1d 54 2a 84 35 |...T*.5|" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func2 -> DEBU 4a84 0xc0042de1d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:43.845 UTC [cauthdsl] func1 -> DEBU 4a85 0xc0042de1d0 gate 1569284803845408800 evaluation succeeds" +"2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a88 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:43.845 UTC [policies] Evaluate -> DEBU 4a89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:43.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a8a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:43.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a8b Exiting" +"2019-09-24 00:26:43.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a8c Exiting" +"2019-09-24 00:26:43.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a8d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.846 UTC [gossip.gossip] handleMessage -> DEBU 4a8e Exiting" +"2019-09-24 00:26:43.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a8f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:43.846 UTC [gossip.gossip] handleMessage -> DEBU 4a90 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.846 UTC [msp.identity] Verify -> DEBU 4a91 Verify: digest = 00000000 b8 d2 8e 74 91 e6 90 02 8c 15 ea 9c ff 6b c9 4c |...t.........k.L| +00000010 f8 27 ee bd 30 bd 59 c7 8b a2 21 13 b7 bc a5 84 |.'..0.Y...!.....|" +"2019-09-24 00:26:43.846 UTC [msp.identity] Verify -> DEBU 4a92 Verify: sig = 00000000 30 44 02 20 29 78 cb af da 63 2d 9d bc 7a 48 04 |0D. )x...c-..zH.| +00000010 64 87 da 90 98 e2 38 a9 85 bf e3 46 67 3c 15 40 |d.....8....Fg<.@| +00000020 0a ea 80 92 02 20 6d b6 50 6a c3 0c 56 25 38 d4 |..... m.Pj..V%8.| +00000030 e7 ed 57 22 1f b6 f7 7d 43 22 19 cc ff 46 3d b3 |..W"...}C"...F=.| +00000040 9e b9 73 b9 b7 c0 |..s...|" +"2019-09-24 00:26:43.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a93 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:43.846 UTC [gossip.discovery] isSentByMe -> DEBU 4a94 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:43.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a95 Exiting" +"2019-09-24 00:26:43.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a96 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:43.847 UTC [msp] DeserializeIdentity -> DEBU 4a97 Obtaining identity" +"2019-09-24 00:26:43.847 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a98 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:43.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a99 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:43.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a9a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:43.847 UTC [policies] Evaluate -> DEBU 4a9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:43.847 UTC [policies] Evaluate -> DEBU 4a9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:43.853 UTC [policies] Evaluate -> DEBU 4a9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:43.853 UTC [cauthdsl] func1 -> DEBU 4a9e 0xc0042f68a0 gate 1569284803853435200 evaluation starts" +"2019-09-24 00:26:43.853 UTC [cauthdsl] func2 -> DEBU 4a9f 0xc0042f68a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:43.853 UTC [cauthdsl] func2 -> DEBU 4aa0 0xc0042f68a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:43.853 UTC [cauthdsl] func2 -> DEBU 4aa1 0xc0042f68a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:43.853 UTC [cauthdsl] func2 -> DEBU 4aa2 0xc0042f68a0 principal evaluation fails" +"2019-09-24 00:26:43.854 UTC [cauthdsl] func1 -> DEBU 4aa3 0xc0042f68a0 gate 1569284803853435200 evaluation fails" +"2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4aa4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4aa5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4aa6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:43.854 UTC [cauthdsl] func1 -> DEBU 4aa7 0xc0042f70e0 gate 1569284803854186600 evaluation starts" +"2019-09-24 00:26:43.854 UTC [cauthdsl] func2 -> DEBU 4aa8 0xc0042f70e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:43.854 UTC [cauthdsl] func2 -> DEBU 4aa9 0xc0042f70e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:43.854 UTC [cauthdsl] func2 -> DEBU 4aaa 0xc0042f70e0 principal matched by identity 0" +"2019-09-24 00:26:43.854 UTC [msp.identity] Verify -> DEBU 4aab Verify: digest = 00000000 4e 6d b8 1b 23 95 85 25 3e a8 cc 0a 33 ea 4f 47 |Nm..#..%>...3.OG| +00000010 1b 6e a2 cf 5a 8e 12 90 31 7e a5 83 f9 bb c9 6e |.n..Z...1~.....n|" +"2019-09-24 00:26:43.854 UTC [msp.identity] Verify -> DEBU 4aac Verify: sig = 00000000 30 45 02 21 00 8d f2 4a d8 f4 06 79 ac fb 76 b1 |0E.!...J...y..v.| +00000010 88 0a 89 61 71 2d a0 55 8d 6c d5 0c 20 68 08 8b |...aq-.U.l.. h..| +00000020 7e 4b b4 46 07 02 20 51 b3 28 20 68 62 23 47 fb |~K.F.. Q.( hb#G.| +00000030 3c a1 ae b9 bc ac 48 ea 03 f1 98 a8 7b 5b 7b b4 |<.....H.....{[{.| +00000040 f9 81 04 b8 5b 45 4e |....[EN|" +"2019-09-24 00:26:43.854 UTC [cauthdsl] func2 -> DEBU 4aad 0xc0042f70e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:43.854 UTC [cauthdsl] func1 -> DEBU 4aae 0xc0042f70e0 gate 1569284803854186600 evaluation succeeds" +"2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4aaf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4ab0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4ab1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:43.854 UTC [policies] Evaluate -> DEBU 4ab2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:43.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ab3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:43.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ab4 Exiting" +"2019-09-24 00:26:43.854 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ab5 Exiting" +"2019-09-24 00:26:43.854 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ab6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.855 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ab7 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:43.855 UTC [msp.identity] Verify -> DEBU 4ab8 Verify: digest = 00000000 b8 d2 8e 74 91 e6 90 02 8c 15 ea 9c ff 6b c9 4c |...t.........k.L| +00000010 f8 27 ee bd 30 bd 59 c7 8b a2 21 13 b7 bc a5 84 |.'..0.Y...!.....|" +"2019-09-24 00:26:43.855 UTC [msp.identity] Verify -> DEBU 4ab9 Verify: sig = 00000000 30 44 02 20 29 78 cb af da 63 2d 9d bc 7a 48 04 |0D. )x...c-..zH.| +00000010 64 87 da 90 98 e2 38 a9 85 bf e3 46 67 3c 15 40 |d.....8....Fg<.@| +00000020 0a ea 80 92 02 20 6d b6 50 6a c3 0c 56 25 38 d4 |..... m.Pj..V%8.| +00000030 e7 ed 57 22 1f b6 f7 7d 43 22 19 cc ff 46 3d b3 |..W"...}C"...F=.| +00000040 9e b9 73 b9 b7 c0 |..s...|" +"2019-09-24 00:26:43.855 UTC [gossip.gossip] handleMessage -> DEBU 4aba Exiting" +"2019-09-24 00:26:43.855 UTC [msp.identity] Verify -> DEBU 4abb Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:43.855 UTC [msp.identity] Verify -> DEBU 4abc Verify: sig = 00000000 30 44 02 20 2e 41 36 f4 89 18 da 71 5d e9 d8 93 |0D. .A6....q]...| +00000010 5d 25 d9 f0 69 45 64 29 f5 67 cd ee 3d 7d f2 6e |]%..iEd).g..=}.n| +00000020 6f 97 8d 54 02 20 46 c1 c2 c8 75 5b c4 ab 42 cc |o..T. F...u[..B.| +00000030 88 8a 1f e2 53 4b 25 a3 c4 43 bc 5f 80 5a 39 2d |....SK%..C._.Z9-| +00000040 05 29 03 18 78 0a |.)..x.|" +"2019-09-24 00:26:43.855 UTC [gossip.discovery] handleAliveMessage -> DEBU 4abd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:43.855 UTC [gossip.discovery] isSentByMe -> DEBU 4abe Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:43.855 UTC [gossip.discovery] handleAliveMessage -> DEBU 4abf Exiting" +"2019-09-24 00:26:43.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ac0 Exiting" +"2019-09-24 00:26:43.909 UTC [gossip.gossip] handleMessage -> DEBU 4ac1 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.911 UTC [gossip.pull] HandleMessage -> DEBU 4ac2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac3 Obtaining identity" +"2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac4 Obtaining identity" +"2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac5 Obtaining identity" +"2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac6 Obtaining identity" +"2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac7 Obtaining identity" +"2019-09-24 00:26:43.911 UTC [msp] DeserializeIdentity -> DEBU 4ac8 Obtaining identity" +"2019-09-24 00:26:43.911 UTC [gossip.pull] SendDigest -> DEBU 4ac9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:43.911 UTC [gossip.gossip] handleMessage -> DEBU 4aca Exiting" +"2019-09-24 00:26:44.013 UTC [gossip.gossip] handleMessage -> DEBU 4acb Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.013 UTC [gossip.gossip] handleMessage -> DEBU 4acc Exiting" +"2019-09-24 00:26:44.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4acd Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.016 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ace Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:44.016 UTC [msp] DeserializeIdentity -> DEBU 4acf Obtaining identity" +"2019-09-24 00:26:44.016 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ad0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:44.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ad1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ad2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.020 UTC [policies] Evaluate -> DEBU 4ad3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:44.020 UTC [policies] Evaluate -> DEBU 4ad4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:44.020 UTC [policies] Evaluate -> DEBU 4ad5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:44.020 UTC [cauthdsl] func1 -> DEBU 4ad6 0xc00281a310 gate 1569284804020902100 evaluation starts" +"2019-09-24 00:26:44.020 UTC [cauthdsl] func2 -> DEBU 4ad7 0xc00281a310 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.021 UTC [cauthdsl] func2 -> DEBU 4ad8 0xc00281a310 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.021 UTC [cauthdsl] func2 -> DEBU 4ad9 0xc00281a310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:44.022 UTC [cauthdsl] func2 -> DEBU 4ada 0xc00281a310 principal evaluation fails" +"2019-09-24 00:26:44.022 UTC [cauthdsl] func1 -> DEBU 4adb 0xc00281a310 gate 1569284804020902100 evaluation fails" +"2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4adc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4add == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4ade == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:44.022 UTC [cauthdsl] func1 -> DEBU 4adf 0xc00281ab50 gate 1569284804022288400 evaluation starts" +"2019-09-24 00:26:44.022 UTC [cauthdsl] func2 -> DEBU 4ae0 0xc00281ab50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.022 UTC [cauthdsl] func2 -> DEBU 4ae1 0xc00281ab50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.022 UTC [cauthdsl] func2 -> DEBU 4ae2 0xc00281ab50 principal matched by identity 0" +"2019-09-24 00:26:44.022 UTC [msp.identity] Verify -> DEBU 4ae3 Verify: digest = 00000000 b1 aa bb c7 67 a1 6d 08 eb 86 c8 9e b4 cc 75 5f |....g.m.......u_| +00000010 d1 1c bc 59 a9 de ea 7b 13 0b 0d a6 0a 65 e9 19 |...Y...{.....e..|" +"2019-09-24 00:26:44.022 UTC [msp.identity] Verify -> DEBU 4ae4 Verify: sig = 00000000 30 45 02 21 00 9a b8 0d ea 54 7d d8 fe d0 5e 72 |0E.!.....T}...^r| +00000010 10 0e 19 33 f1 8d 6d 99 44 78 86 05 a3 fe 7e d8 |...3..m.Dx....~.| +00000020 d3 59 ee 62 17 02 20 1b 37 dd 6f 3f 72 e0 99 e0 |.Y.b.. .7.o?r...| +00000030 08 42 09 30 9e 60 9b 77 e8 12 d4 17 66 9c 53 41 |.B.0.`.w....f.SA| +00000040 64 d2 05 d4 a1 df 21 |d.....!|" +"2019-09-24 00:26:44.022 UTC [cauthdsl] func2 -> DEBU 4ae5 0xc00281ab50 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:44.022 UTC [cauthdsl] func1 -> DEBU 4ae6 0xc00281ab50 gate 1569284804022288400 evaluation succeeds" +"2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4ae7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4ae8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4ae9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:44.022 UTC [policies] Evaluate -> DEBU 4aea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:44.023 UTC [gossip.discovery] handleAliveMessage -> DEBU 4aeb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:44.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aec Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:44.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aed updating membership: timestamp: " +"2019-09-24 00:26:44.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aee Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:44.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aef Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:44.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 4af0 Exiting" +"2019-09-24 00:26:44.023 UTC [gossip.discovery] handleAliveMessage -> DEBU 4af1 Exiting" +"2019-09-24 00:26:44.023 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4af2 Exiting" +"2019-09-24 00:26:44.023 UTC [gossip.discovery] sendMemResponse -> DEBU 4af3 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:44.023 UTC [msp] DeserializeIdentity -> DEBU 4af4 Obtaining identity" +"2019-09-24 00:26:44.023 UTC [msp] DeserializeIdentity -> DEBU 4af5 Obtaining identity" +"2019-09-24 00:26:44.023 UTC [msp] DeserializeIdentity -> DEBU 4af6 Obtaining identity" +"2019-09-24 00:26:44.023 UTC [gossip.comm] Send -> DEBU 4af7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:44.023 UTC [gossip.discovery] sendMemResponse -> DEBU 4af8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020E" signature:"0E\002!\000\317<\377\341\213\250\275\373\005(d\335\326%b\037\277\3211\272\004r\220g\017\301\211\235KO$\211\002 ~\274W&D\303\201\376^Y\213\240\355\304\351\214\t\204\0160\333\357K\346\260\207\365\300\215\000U\021" > alive: alive: alive:\301\277\226\237p\027'\025\337\336/\330C\251?\002 &\320\266)\037\324F\245:\\s\340^R\215c\345?\377\\\036\017\304\013\222\344\023F\374uD\346" > " +"2019-09-24 00:26:44.024 UTC [gossip.comm] sendToEndpoint -> DEBU 4af9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.024 UTC [gossip.comm] sendToEndpoint -> DEBU 4afa Exiting" +"2019-09-24 00:26:44.081 UTC [msp] DeserializeIdentity -> DEBU 4afb Obtaining identity" +"2019-09-24 00:26:44.082 UTC [msp] DeserializeIdentity -> DEBU 4afc Obtaining identity" +"2019-09-24 00:26:44.086 UTC [gossip.comm] Send -> DEBU 4afd Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4afe Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4aff Exiting" +"2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4b00 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4b01 Exiting" +"2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4b02 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.086 UTC [gossip.comm] sendToEndpoint -> DEBU 4b03 Exiting" +"2019-09-24 00:26:44.118 UTC [gossip.comm] func1 -> DEBU 4b04 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.118 UTC [gossip.gossip] handleMessage -> DEBU 4b05 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.119 UTC [msp.identity] Verify -> DEBU 4b06 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:44.119 UTC [msp.identity] Verify -> DEBU 4b07 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:44.120 UTC [msp.identity] Verify -> DEBU 4b08 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:44.120 UTC [msp.identity] Verify -> DEBU 4b09 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:44.120 UTC [msp] DeserializeIdentity -> DEBU 4b0a Obtaining identity" +"2019-09-24 00:26:44.120 UTC [msp] DeserializeIdentity -> DEBU 4b0b Obtaining identity" +"2019-09-24 00:26:44.123 UTC [gossip.comm] func1 -> DEBU 4b0c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.126 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b0d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:44.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b0e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.126 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b0f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.126 UTC [policies] Evaluate -> DEBU 4b10 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:44.126 UTC [policies] Evaluate -> DEBU 4b11 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:44.126 UTC [policies] Evaluate -> DEBU 4b12 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:44.127 UTC [cauthdsl] func1 -> DEBU 4b13 0xc002858420 gate 1569284804127053200 evaluation starts" +"2019-09-24 00:26:44.127 UTC [cauthdsl] func2 -> DEBU 4b14 0xc002858420 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.128 UTC [cauthdsl] func2 -> DEBU 4b15 0xc002858420 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.129 UTC [cauthdsl] func2 -> DEBU 4b16 0xc002858420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:44.129 UTC [cauthdsl] func2 -> DEBU 4b17 0xc002858420 principal evaluation fails" +"2019-09-24 00:26:44.130 UTC [cauthdsl] func1 -> DEBU 4b18 0xc002858420 gate 1569284804127053200 evaluation fails" +"2019-09-24 00:26:44.130 UTC [policies] Evaluate -> DEBU 4b19 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.130 UTC [policies] Evaluate -> DEBU 4b1a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.130 UTC [policies] Evaluate -> DEBU 4b1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:44.130 UTC [cauthdsl] func1 -> DEBU 4b1c 0xc002858c60 gate 1569284804130178300 evaluation starts" +"2019-09-24 00:26:44.130 UTC [cauthdsl] func2 -> DEBU 4b1d 0xc002858c60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.130 UTC [cauthdsl] func2 -> DEBU 4b1e 0xc002858c60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.130 UTC [cauthdsl] func2 -> DEBU 4b1f 0xc002858c60 principal matched by identity 0" +"2019-09-24 00:26:44.130 UTC [msp.identity] Verify -> DEBU 4b20 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:44.130 UTC [msp.identity] Verify -> DEBU 4b21 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:44.130 UTC [cauthdsl] func2 -> DEBU 4b22 0xc002858c60 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:44.130 UTC [cauthdsl] func1 -> DEBU 4b23 0xc002858c60 gate 1569284804130178300 evaluation succeeds" +"2019-09-24 00:26:44.131 UTC [policies] Evaluate -> DEBU 4b24 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.132 UTC [policies] Evaluate -> DEBU 4b25 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.132 UTC [policies] Evaluate -> DEBU 4b26 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:44.132 UTC [policies] Evaluate -> DEBU 4b27 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:44.133 UTC [msp] DeserializeIdentity -> DEBU 4b28 Obtaining identity" +"2019-09-24 00:26:44.133 UTC [msp] DeserializeIdentity -> DEBU 4b29 Obtaining identity" +"2019-09-24 00:26:44.133 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b2a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:44.133 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b2b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.133 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b2c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.133 UTC [policies] Evaluate -> DEBU 4b2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:44.133 UTC [policies] Evaluate -> DEBU 4b2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:44.133 UTC [policies] Evaluate -> DEBU 4b2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:44.133 UTC [cauthdsl] func1 -> DEBU 4b30 0xc002864430 gate 1569284804133869800 evaluation starts" +"2019-09-24 00:26:44.133 UTC [cauthdsl] func2 -> DEBU 4b31 0xc002864430 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.133 UTC [cauthdsl] func2 -> DEBU 4b32 0xc002864430 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b33 0xc002864430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b34 0xc002864430 principal evaluation fails" +"2019-09-24 00:26:44.134 UTC [cauthdsl] func1 -> DEBU 4b35 0xc002864430 gate 1569284804133869800 evaluation fails" +"2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b36 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:44.134 UTC [cauthdsl] func1 -> DEBU 4b39 0xc002864c70 gate 1569284804134230800 evaluation starts" +"2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b3a 0xc002864c70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b3b 0xc002864c70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b3c 0xc002864c70 principal matched by identity 0" +"2019-09-24 00:26:44.134 UTC [msp.identity] Verify -> DEBU 4b3d Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:44.134 UTC [msp.identity] Verify -> DEBU 4b3e Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:44.134 UTC [cauthdsl] func2 -> DEBU 4b3f 0xc002864c70 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:44.134 UTC [cauthdsl] func1 -> DEBU 4b40 0xc002864c70 gate 1569284804134230800 evaluation succeeds" +"2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b41 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b43 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:44.134 UTC [policies] Evaluate -> DEBU 4b44 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:44.134 UTC [gossip.gossip] handleMessage -> DEBU 4b45 Exiting" +"2019-09-24 00:26:44.135 UTC [gossip.gossip] handleMessage -> DEBU 4b46 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.135 UTC [msp] DeserializeIdentity -> DEBU 4b47 Obtaining identity" +"2019-09-24 00:26:44.135 UTC [msp] DeserializeIdentity -> DEBU 4b48 Obtaining identity" +"2019-09-24 00:26:44.135 UTC [msp] DeserializeIdentity -> DEBU 4b49 Obtaining identity" +"2019-09-24 00:26:44.135 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b4a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:44.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b4b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b4c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.136 UTC [policies] Evaluate -> DEBU 4b4d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:44.136 UTC [policies] Evaluate -> DEBU 4b4e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:44.137 UTC [policies] Evaluate -> DEBU 4b4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:44.137 UTC [cauthdsl] func1 -> DEBU 4b50 0xc0049e0780 gate 1569284804137331000 evaluation starts" +"2019-09-24 00:26:44.137 UTC [cauthdsl] func2 -> DEBU 4b51 0xc0049e0780 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.137 UTC [cauthdsl] func2 -> DEBU 4b52 0xc0049e0780 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.137 UTC [cauthdsl] func2 -> DEBU 4b53 0xc0049e0780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:44.137 UTC [cauthdsl] func2 -> DEBU 4b54 0xc0049e0780 principal evaluation fails" +"2019-09-24 00:26:44.138 UTC [cauthdsl] func1 -> DEBU 4b55 0xc0049e0780 gate 1569284804137331000 evaluation fails" +"2019-09-24 00:26:44.138 UTC [policies] Evaluate -> DEBU 4b56 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.138 UTC [policies] Evaluate -> DEBU 4b57 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.138 UTC [policies] Evaluate -> DEBU 4b58 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:44.138 UTC [cauthdsl] func1 -> DEBU 4b59 0xc0049e0fc0 gate 1569284804138773400 evaluation starts" +"2019-09-24 00:26:44.139 UTC [cauthdsl] func2 -> DEBU 4b5a 0xc0049e0fc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.139 UTC [cauthdsl] func2 -> DEBU 4b5b 0xc0049e0fc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.140 UTC [cauthdsl] func2 -> DEBU 4b5c 0xc0049e0fc0 principal matched by identity 0" +"2019-09-24 00:26:44.140 UTC [msp.identity] Verify -> DEBU 4b5d Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:44.140 UTC [msp.identity] Verify -> DEBU 4b5e Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:44.141 UTC [cauthdsl] func2 -> DEBU 4b5f 0xc0049e0fc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:44.141 UTC [cauthdsl] func1 -> DEBU 4b60 0xc0049e0fc0 gate 1569284804138773400 evaluation succeeds" +"2019-09-24 00:26:44.141 UTC [policies] Evaluate -> DEBU 4b61 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.141 UTC [policies] Evaluate -> DEBU 4b62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.141 UTC [policies] Evaluate -> DEBU 4b63 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:44.141 UTC [policies] Evaluate -> DEBU 4b64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:44.143 UTC [msp.identity] Verify -> DEBU 4b65 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:44.143 UTC [msp.identity] Verify -> DEBU 4b66 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:44.143 UTC [msp.identity] Verify -> DEBU 4b67 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:44.143 UTC [msp.identity] Verify -> DEBU 4b68 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:44.144 UTC [msp] DeserializeIdentity -> DEBU 4b69 Obtaining identity" +"2019-09-24 00:26:44.144 UTC [msp] DeserializeIdentity -> DEBU 4b6a Obtaining identity" +"2019-09-24 00:26:44.145 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b6b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:44.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b6c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b6d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.145 UTC [policies] Evaluate -> DEBU 4b6e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:44.145 UTC [policies] Evaluate -> DEBU 4b6f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:44.145 UTC [policies] Evaluate -> DEBU 4b70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:44.145 UTC [cauthdsl] func1 -> DEBU 4b71 0xc0049f55d0 gate 1569284804145359800 evaluation starts" +"2019-09-24 00:26:44.145 UTC [cauthdsl] func2 -> DEBU 4b72 0xc0049f55d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.146 UTC [cauthdsl] func2 -> DEBU 4b73 0xc0049f55d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.146 UTC [cauthdsl] func2 -> DEBU 4b74 0xc0049f55d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:44.146 UTC [cauthdsl] func2 -> DEBU 4b75 0xc0049f55d0 principal evaluation fails" +"2019-09-24 00:26:44.146 UTC [cauthdsl] func1 -> DEBU 4b76 0xc0049f55d0 gate 1569284804145359800 evaluation fails" +"2019-09-24 00:26:44.147 UTC [policies] Evaluate -> DEBU 4b77 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.147 UTC [policies] Evaluate -> DEBU 4b78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.147 UTC [policies] Evaluate -> DEBU 4b79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:44.148 UTC [cauthdsl] func1 -> DEBU 4b7a 0xc0049f5e10 gate 1569284804147986700 evaluation starts" +"2019-09-24 00:26:44.148 UTC [cauthdsl] func2 -> DEBU 4b7b 0xc0049f5e10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.148 UTC [cauthdsl] func2 -> DEBU 4b7c 0xc0049f5e10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.148 UTC [cauthdsl] func2 -> DEBU 4b7d 0xc0049f5e10 principal matched by identity 0" +"2019-09-24 00:26:44.148 UTC [msp.identity] Verify -> DEBU 4b7e Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:44.148 UTC [msp.identity] Verify -> DEBU 4b7f Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:44.148 UTC [cauthdsl] func2 -> DEBU 4b80 0xc0049f5e10 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:44.148 UTC [cauthdsl] func1 -> DEBU 4b81 0xc0049f5e10 gate 1569284804147986700 evaluation succeeds" +"2019-09-24 00:26:44.148 UTC [policies] Evaluate -> DEBU 4b82 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.148 UTC [policies] Evaluate -> DEBU 4b83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.148 UTC [policies] Evaluate -> DEBU 4b84 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:44.148 UTC [policies] Evaluate -> DEBU 4b85 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:44.148 UTC [gossip.gossip] handleMessage -> DEBU 4b86 Exiting" +"2019-09-24 00:26:44.148 UTC [gossip.gossip] handleMessage -> DEBU 4b87 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.148 UTC [msp] DeserializeIdentity -> DEBU 4b88 Obtaining identity" +"2019-09-24 00:26:44.148 UTC [msp] DeserializeIdentity -> DEBU 4b89 Obtaining identity" +"2019-09-24 00:26:44.148 UTC [msp] DeserializeIdentity -> DEBU 4b8a Obtaining identity" +"2019-09-24 00:26:44.148 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b8b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:44.149 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b8c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.149 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b8d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b90 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:44.149 UTC [cauthdsl] func1 -> DEBU 4b91 0xc004a0b920 gate 1569284804149146500 evaluation starts" +"2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b92 0xc004a0b920 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b93 0xc004a0b920 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b94 0xc004a0b920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b95 0xc004a0b920 principal evaluation fails" +"2019-09-24 00:26:44.149 UTC [cauthdsl] func1 -> DEBU 4b96 0xc004a0b920 gate 1569284804149146500 evaluation fails" +"2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b97 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.149 UTC [policies] Evaluate -> DEBU 4b99 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:44.149 UTC [cauthdsl] func1 -> DEBU 4b9a 0xc004a24160 gate 1569284804149735500 evaluation starts" +"2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b9b 0xc004a24160 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b9c 0xc004a24160 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4b9d 0xc004a24160 principal matched by identity 0" +"2019-09-24 00:26:44.149 UTC [msp.identity] Verify -> DEBU 4b9e Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:44.149 UTC [msp.identity] Verify -> DEBU 4b9f Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:44.149 UTC [cauthdsl] func2 -> DEBU 4ba0 0xc004a24160 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:44.150 UTC [cauthdsl] func1 -> DEBU 4ba1 0xc004a24160 gate 1569284804149735500 evaluation succeeds" +"2019-09-24 00:26:44.150 UTC [policies] Evaluate -> DEBU 4ba2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.150 UTC [policies] Evaluate -> DEBU 4ba3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.150 UTC [policies] Evaluate -> DEBU 4ba4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:44.150 UTC [policies] Evaluate -> DEBU 4ba5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:44.150 UTC [msp.identity] Verify -> DEBU 4ba6 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:44.150 UTC [msp.identity] Verify -> DEBU 4ba7 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:44.150 UTC [msp] DeserializeIdentity -> DEBU 4ba8 Obtaining identity" +"2019-09-24 00:26:44.150 UTC [msp] DeserializeIdentity -> DEBU 4ba9 Obtaining identity" +"2019-09-24 00:26:44.151 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4baa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:44.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bab Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bac Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4bad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4bae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4baf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:44.151 UTC [cauthdsl] func1 -> DEBU 4bb0 0xc004a38050 gate 1569284804151208200 evaluation starts" +"2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bb1 0xc004a38050 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bb2 0xc004a38050 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bb3 0xc004a38050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bb4 0xc004a38050 principal evaluation fails" +"2019-09-24 00:26:44.151 UTC [cauthdsl] func1 -> DEBU 4bb5 0xc004a38050 gate 1569284804151208200 evaluation fails" +"2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4bb6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4bb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.151 UTC [policies] Evaluate -> DEBU 4bb8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:44.151 UTC [cauthdsl] func1 -> DEBU 4bb9 0xc004a38890 gate 1569284804151738500 evaluation starts" +"2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bba 0xc004a38890 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bbb 0xc004a38890 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.151 UTC [cauthdsl] func2 -> DEBU 4bbc 0xc004a38890 principal matched by identity 0" +"2019-09-24 00:26:44.151 UTC [msp.identity] Verify -> DEBU 4bbd Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:44.151 UTC [msp.identity] Verify -> DEBU 4bbe Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:44.152 UTC [cauthdsl] func2 -> DEBU 4bbf 0xc004a38890 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:44.152 UTC [cauthdsl] func1 -> DEBU 4bc0 0xc004a38890 gate 1569284804151738500 evaluation succeeds" +"2019-09-24 00:26:44.152 UTC [policies] Evaluate -> DEBU 4bc1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.152 UTC [policies] Evaluate -> DEBU 4bc2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.152 UTC [policies] Evaluate -> DEBU 4bc3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:44.152 UTC [policies] Evaluate -> DEBU 4bc4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:44.152 UTC [msp.identity] Verify -> DEBU 4bc5 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:44.152 UTC [msp.identity] Verify -> DEBU 4bc6 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:44.152 UTC [gossip.gossip] handleMessage -> DEBU 4bc7 Exiting" +"2019-09-24 00:26:44.273 UTC [msp] DeserializeIdentity -> DEBU 4bc8 Obtaining identity" +"2019-09-24 00:26:44.274 UTC [msp] DeserializeIdentity -> DEBU 4bc9 Obtaining identity" +"2019-09-24 00:26:44.274 UTC [gossip.pull] Hello -> DEBU 4bca Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:44.274 UTC [msp] DeserializeIdentity -> DEBU 4bcb Obtaining identity" +"2019-09-24 00:26:44.274 UTC [msp] DeserializeIdentity -> DEBU 4bcc Obtaining identity" +"2019-09-24 00:26:44.274 UTC [gossip.comm] Send -> DEBU 4bcd Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:44.274 UTC [gossip.comm] sendToEndpoint -> DEBU 4bce Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.274 UTC [gossip.comm] sendToEndpoint -> DEBU 4bcf Exiting" +"2019-09-24 00:26:44.275 UTC [gossip.comm] func1 -> DEBU 4bd0 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.276 UTC [gossip.gossip] handleMessage -> DEBU 4bd1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.276 UTC [gossip.pull] HandleMessage -> DEBU 4bd2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.276 UTC [gossip.gossip] handleMessage -> DEBU 4bd3 Exiting" +"2019-09-24 00:26:44.514 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 4bd4 Sleeping 25s" +"2019-09-24 00:26:44.576 UTC [msp] GetDefaultSigningIdentity -> DEBU 4bd5 Obtaining default signing identity" +"2019-09-24 00:26:44.576 UTC [msp.identity] Sign -> DEBU 4bd6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151042 " +"2019-09-24 00:26:44.576 UTC [msp.identity] Sign -> DEBU 4bd7 Sign: digest: 2D964D7BCA69451BBBFE44317837151BF77A9F385B78CDEE7880261E02E77576 " +"2019-09-24 00:26:44.576 UTC [msp] GetDefaultSigningIdentity -> DEBU 4bd8 Obtaining default signing identity" +"2019-09-24 00:26:44.576 UTC [msp.identity] Sign -> DEBU 4bd9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:44.576 UTC [msp.identity] Sign -> DEBU 4bda Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:44.576 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4bdb Sleeping 5s" +"2019-09-24 00:26:44.584 UTC [gossip.comm] func1 -> DEBU 4bdc Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.584 UTC [gossip.gossip] handleMessage -> DEBU 4bdd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.584 UTC [msp] DeserializeIdentity -> DEBU 4bde Obtaining identity" +"2019-09-24 00:26:44.584 UTC [msp] DeserializeIdentity -> DEBU 4bdf Obtaining identity" +"2019-09-24 00:26:44.584 UTC [gossip.gossip] handleMessage -> DEBU 4be0 Exiting" +"2019-09-24 00:26:44.585 UTC [msp] DeserializeIdentity -> DEBU 4be1 Obtaining identity" +"2019-09-24 00:26:44.585 UTC [msp] DeserializeIdentity -> DEBU 4be2 Obtaining identity" +"2019-09-24 00:26:44.585 UTC [msp] DeserializeIdentity -> DEBU 4be3 Obtaining identity" +"2019-09-24 00:26:44.585 UTC [gossip.comm] Send -> DEBU 4be4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:44.585 UTC [gossip.comm] Send -> DEBU 4be5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:44.585 UTC [msp] DeserializeIdentity -> DEBU 4be6 Obtaining identity" +"2019-09-24 00:26:44.585 UTC [gossip.comm] Send -> DEBU 4be7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4be8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4be9 Exiting" +"2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4bea Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4beb Exiting" +"2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4bec Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4bed Exiting" +"2019-09-24 00:26:44.760 UTC [gossip.comm] func1 -> DEBU 4bee Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.762 UTC [gossip.gossip] handleMessage -> DEBU 4bef Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.764 UTC [gossip.gossip] handleMessage -> DEBU 4bf0 Exiting" +"2019-09-24 00:26:44.765 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bf1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.766 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4bf2 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:44.769 UTC [msp] DeserializeIdentity -> DEBU 4bf3 Obtaining identity" +"2019-09-24 00:26:44.770 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4bf4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:44.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bf5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bf6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.772 UTC [policies] Evaluate -> DEBU 4bf7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:44.772 UTC [policies] Evaluate -> DEBU 4bf8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:44.772 UTC [policies] Evaluate -> DEBU 4bf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:44.772 UTC [cauthdsl] func1 -> DEBU 4bfa 0xc00467a9d0 gate 1569284804772769500 evaluation starts" +"2019-09-24 00:26:44.773 UTC [cauthdsl] func2 -> DEBU 4bfb 0xc00467a9d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.773 UTC [cauthdsl] func2 -> DEBU 4bfc 0xc00467a9d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.773 UTC [cauthdsl] func2 -> DEBU 4bfd 0xc00467a9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:44.774 UTC [cauthdsl] func2 -> DEBU 4bfe 0xc00467a9d0 principal evaluation fails" +"2019-09-24 00:26:44.774 UTC [cauthdsl] func1 -> DEBU 4bff 0xc00467a9d0 gate 1569284804772769500 evaluation fails" +"2019-09-24 00:26:44.774 UTC [policies] Evaluate -> DEBU 4c00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.775 UTC [policies] Evaluate -> DEBU 4c01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.775 UTC [policies] Evaluate -> DEBU 4c02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:44.776 UTC [cauthdsl] func1 -> DEBU 4c03 0xc00467b210 gate 1569284804776129500 evaluation starts" +"2019-09-24 00:26:44.776 UTC [cauthdsl] func2 -> DEBU 4c04 0xc00467b210 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.777 UTC [cauthdsl] func2 -> DEBU 4c05 0xc00467b210 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.777 UTC [cauthdsl] func2 -> DEBU 4c06 0xc00467b210 principal matched by identity 0" +"2019-09-24 00:26:44.778 UTC [msp.identity] Verify -> DEBU 4c07 Verify: digest = 00000000 2c 42 54 25 a8 8d 09 0a 0c 52 82 c7 20 2e 03 b6 |,BT%.....R.. ...| +00000010 17 93 6c 67 68 7b c7 35 15 6f 77 94 31 81 ca a7 |..lgh{.5.ow.1...|" +"2019-09-24 00:26:44.778 UTC [msp.identity] Verify -> DEBU 4c08 Verify: sig = 00000000 30 44 02 20 40 a3 17 cb 2e a0 1c c8 15 96 74 e7 |0D. @.........t.| +00000010 21 23 2a 80 d6 3d 33 11 3f 73 21 b9 33 64 80 9a |!#*..=3.?s!.3d..| +00000020 5d a7 11 d6 02 20 5b 53 bc 67 5d c9 0f 91 5f 75 |].... [S.g]..._u| +00000030 71 a0 76 ae ed 14 d6 23 91 4b 8b d9 34 54 aa 48 |q.v....#.K..4T.H| +00000040 16 d8 f9 fd aa c5 |......|" +"2019-09-24 00:26:44.779 UTC [cauthdsl] func2 -> DEBU 4c09 0xc00467b210 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:44.779 UTC [cauthdsl] func1 -> DEBU 4c0a 0xc00467b210 gate 1569284804776129500 evaluation succeeds" +"2019-09-24 00:26:44.779 UTC [policies] Evaluate -> DEBU 4c0b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.780 UTC [policies] Evaluate -> DEBU 4c0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.780 UTC [policies] Evaluate -> DEBU 4c0d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:44.780 UTC [policies] Evaluate -> DEBU 4c0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:44.780 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c0f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c10 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:44.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c11 updating membership: timestamp: " +"2019-09-24 00:26:44.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c12 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:44.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c13 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:44.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c14 Exiting" +"2019-09-24 00:26:44.781 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c15 Exiting" +"2019-09-24 00:26:44.781 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c16 Exiting" +"2019-09-24 00:26:44.781 UTC [gossip.discovery] sendMemResponse -> DEBU 4c17 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:44.781 UTC [msp] DeserializeIdentity -> DEBU 4c18 Obtaining identity" +"2019-09-24 00:26:44.781 UTC [msp] DeserializeIdentity -> DEBU 4c19 Obtaining identity" +"2019-09-24 00:26:44.781 UTC [msp] DeserializeIdentity -> DEBU 4c1a Obtaining identity" +"2019-09-24 00:26:44.781 UTC [gossip.comm] Send -> DEBU 4c1b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:44.781 UTC [gossip.discovery] sendMemResponse -> DEBU 4c1c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020E" signature:"0E\002!\000\317<\377\341\213\250\275\373\005(d\335\326%b\037\277\3211\272\004r\220g\017\301\211\235KO$\211\002 ~\274W&D\303\201\376^Y\213\240\355\304\351\214\t\204\0160\333\357K\346\260\207\365\300\215\000U\021" > alive: alive: alive: " +"2019-09-24 00:26:44.781 UTC [gossip.comm] sendToEndpoint -> DEBU 4c1d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.781 UTC [gossip.comm] sendToEndpoint -> DEBU 4c1e Exiting" +"2019-09-24 00:26:44.794 UTC [gossip.comm] func1 -> DEBU 4c1f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.795 UTC [gossip.gossip] handleMessage -> DEBU 4c20 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.796 UTC [gossip.pull] HandleMessage -> DEBU 4c21 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.796 UTC [msp] DeserializeIdentity -> DEBU 4c22 Obtaining identity" +"2019-09-24 00:26:44.796 UTC [msp] DeserializeIdentity -> DEBU 4c23 Obtaining identity" +"2019-09-24 00:26:44.797 UTC [msp] DeserializeIdentity -> DEBU 4c24 Obtaining identity" +"2019-09-24 00:26:44.798 UTC [msp] DeserializeIdentity -> DEBU 4c25 Obtaining identity" +"2019-09-24 00:26:44.798 UTC [msp] DeserializeIdentity -> DEBU 4c26 Obtaining identity" +"2019-09-24 00:26:44.798 UTC [msp] DeserializeIdentity -> DEBU 4c27 Obtaining identity" +"2019-09-24 00:26:44.799 UTC [gossip.pull] SendDigest -> DEBU 4c28 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:44.799 UTC [gossip.gossip] handleMessage -> DEBU 4c29 Exiting" +"2019-09-24 00:26:44.832 UTC [gossip.comm] func1 -> DEBU 4c2a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.833 UTC [gossip.gossip] handleMessage -> DEBU 4c2b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.833 UTC [gossip.pull] HandleMessage -> DEBU 4c2c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:44.834 UTC [gossip.pull] SendDigest -> DEBU 4c2d Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:44.834 UTC [gossip.gossip] handleMessage -> DEBU 4c2e Exiting" +"2019-09-24 00:26:44.935 UTC [gossip.gossip] handleMessage -> DEBU 4c2f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.935 UTC [gossip.gossip] handleMessage -> DEBU 4c30 Exiting" +"2019-09-24 00:26:44.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c31 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c32 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:44.937 UTC [msp] DeserializeIdentity -> DEBU 4c33 Obtaining identity" +"2019-09-24 00:26:44.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c34 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:44.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c35 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c36 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:44.938 UTC [policies] Evaluate -> DEBU 4c37 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:44.938 UTC [policies] Evaluate -> DEBU 4c38 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:44.939 UTC [policies] Evaluate -> DEBU 4c3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:44.938 UTC [gossip.comm] func1 -> DEBU 4c39 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.940 UTC [gossip.gossip] handleMessage -> DEBU 4c3b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.939 UTC [cauthdsl] func1 -> DEBU 4c3c 0xc0046ae860 gate 1569284804939596200 evaluation starts" +"2019-09-24 00:26:44.940 UTC [cauthdsl] func2 -> DEBU 4c3d 0xc0046ae860 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.941 UTC [cauthdsl] func2 -> DEBU 4c3e 0xc0046ae860 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.941 UTC [cauthdsl] func2 -> DEBU 4c3f 0xc0046ae860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:44.942 UTC [cauthdsl] func2 -> DEBU 4c40 0xc0046ae860 principal evaluation fails" +"2019-09-24 00:26:44.942 UTC [cauthdsl] func1 -> DEBU 4c41 0xc0046ae860 gate 1569284804939596200 evaluation fails" +"2019-09-24 00:26:44.942 UTC [policies] Evaluate -> DEBU 4c42 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c43 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c44 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:44.943 UTC [cauthdsl] func1 -> DEBU 4c45 0xc0046af0a0 gate 1569284804943467800 evaluation starts" +"2019-09-24 00:26:44.943 UTC [cauthdsl] func2 -> DEBU 4c46 0xc0046af0a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:44.943 UTC [cauthdsl] func2 -> DEBU 4c47 0xc0046af0a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:44.943 UTC [cauthdsl] func2 -> DEBU 4c48 0xc0046af0a0 principal matched by identity 0" +"2019-09-24 00:26:44.943 UTC [msp.identity] Verify -> DEBU 4c49 Verify: digest = 00000000 ed 5b 8c 00 04 d4 e8 2b 83 b0 c1 24 07 26 cf 6d |.[.....+...$.&.m| +00000010 9c 58 18 3b 4d bd 6d 62 4a 93 08 97 4f b9 fe 59 |.X.;M.mbJ...O..Y|" +"2019-09-24 00:26:44.943 UTC [msp.identity] Verify -> DEBU 4c4a Verify: sig = 00000000 30 44 02 20 01 15 39 85 9a 70 12 48 de 78 e7 62 |0D. ..9..p.H.x.b| +00000010 b0 7e e6 4e ed cd 93 45 68 c5 5f 4a 39 08 ca 27 |.~.N...Eh._J9..'| +00000020 a1 08 03 80 02 20 4b 86 58 f4 25 be 67 40 12 5c |..... K.X.%.g@.\| +00000030 b7 32 d3 fe d2 45 08 e0 61 12 d0 8d 2e b0 88 84 |.2...E..a.......| +00000040 73 af 9d e5 ed 2a |s....*|" +"2019-09-24 00:26:44.943 UTC [cauthdsl] func2 -> DEBU 4c4b 0xc0046af0a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:44.943 UTC [cauthdsl] func1 -> DEBU 4c4c 0xc0046af0a0 gate 1569284804943467800 evaluation succeeds" +"2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c4d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c4f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:44.943 UTC [policies] Evaluate -> DEBU 4c50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:44.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c51 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c52 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:44.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c53 updating membership: timestamp: " +"2019-09-24 00:26:44.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c54 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:44.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c55 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:44.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c56 Exiting" +"2019-09-24 00:26:44.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c57 Exiting" +"2019-09-24 00:26:44.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c58 Exiting" +"2019-09-24 00:26:44.945 UTC [gossip.comm] func1 -> DEBU 4c59 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c5a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c5c Exiting" +"2019-09-24 00:26:44.946 UTC [gossip.gossip] handleMessage -> DEBU 4c5b Exiting" +"2019-09-24 00:26:44.947 UTC [gossip.gossip] handleMessage -> DEBU 4c5d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.948 UTC [gossip.gossip] handleMessage -> DEBU 4c5e Exiting" +"2019-09-24 00:26:44.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c5f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c60 Exiting" +"2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c61 Obtaining identity" +"2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c62 Obtaining identity" +"2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c63 Obtaining identity" +"2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c64 Obtaining identity" +"2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c65 Obtaining identity" +"2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c66 Obtaining identity" +"2019-09-24 00:26:44.950 UTC [gossip.comm] Send -> DEBU 4c67 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c68 Obtaining identity" +"2019-09-24 00:26:44.950 UTC [msp] DeserializeIdentity -> DEBU 4c69 Obtaining identity" +"2019-09-24 00:26:44.950 UTC [gossip.comm] Send -> DEBU 4c6a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:44.950 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.950 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6c Exiting" +"2019-09-24 00:26:44.950 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:44.951 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6e Exiting" +"2019-09-24 00:26:45.075 UTC [gossip.gossip] handleMessage -> DEBU 4c6f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:45.076 UTC [msp] DeserializeIdentity -> DEBU 4c70 Obtaining identity" +"2019-09-24 00:26:45.077 UTC [msp] DeserializeIdentity -> DEBU 4c71 Obtaining identity" +"2019-09-24 00:26:45.077 UTC [msp] DeserializeIdentity -> DEBU 4c72 Obtaining identity" +"2019-09-24 00:26:45.078 UTC [gossip.gossip] handleMessage -> DEBU 4c73 Exiting" +"2019-09-24 00:26:45.643 UTC [gossip.comm] func1 -> DEBU 4c74 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:45.643 UTC [gossip.gossip] handleMessage -> DEBU 4c75 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:45.643 UTC [gossip.pull] HandleMessage -> DEBU 4c76 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:45.643 UTC [gossip.pull] SendDigest -> DEBU 4c77 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:45.643 UTC [gossip.gossip] handleMessage -> DEBU 4c78 Exiting" +"2019-09-24 00:26:45.669 UTC [gossip.comm] func1 -> DEBU 4c79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:45.669 UTC [gossip.gossip] handleMessage -> DEBU 4c7a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:45.669 UTC [gossip.gossip] handleMessage -> DEBU 4c7b Exiting" +"2019-09-24 00:26:45.669 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c7c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:45.669 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c7d Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:45.669 UTC [msp] DeserializeIdentity -> DEBU 4c7e Obtaining identity" +"2019-09-24 00:26:45.669 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c7f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:45.669 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c80 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:45.669 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c81 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:45.669 UTC [policies] Evaluate -> DEBU 4c82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:45.669 UTC [policies] Evaluate -> DEBU 4c83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func1 -> DEBU 4c85 0xc0040d2930 gate 1569284805670027900 evaluation starts" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c86 0xc0040d2930 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c87 0xc0040d2930 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c88 0xc0040d2930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c89 0xc0040d2930 principal evaluation fails" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func1 -> DEBU 4c8a 0xc0040d2930 gate 1569284805670027900 evaluation fails" +"2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func1 -> DEBU 4c8e 0xc0040d3170 gate 1569284805670283000 evaluation starts" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c8f 0xc0040d3170 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c90 0xc0040d3170 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c91 0xc0040d3170 principal matched by identity 0" +"2019-09-24 00:26:45.670 UTC [msp.identity] Verify -> DEBU 4c92 Verify: digest = 00000000 20 07 94 b9 f2 f4 16 ad 6f b4 16 9a 57 93 3a 97 | .......o...W.:.| +00000010 11 c0 b8 b9 dd a0 4d 65 9e 33 d3 e2 23 f0 71 de |......Me.3..#.q.|" +"2019-09-24 00:26:45.670 UTC [msp.identity] Verify -> DEBU 4c93 Verify: sig = 00000000 30 45 02 21 00 87 30 8a 1b 3a 0b d0 75 1c 25 e7 |0E.!..0..:..u.%.| +00000010 5c 10 a6 64 2e 95 31 0f 9d d0 35 c2 8f 69 d5 37 |\..d..1...5..i.7| +00000020 da 5a e8 76 be 02 20 4c 11 db 1b b1 ea ac 6d 3a |.Z.v.. L......m:| +00000030 cf f5 a2 eb 9a a8 3e 37 a2 50 fc aa dd d0 f4 0c |......>7.P......| +00000040 d4 67 de 57 f3 84 07 |.g.W...|" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func2 -> DEBU 4c94 0xc0040d3170 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:45.670 UTC [cauthdsl] func1 -> DEBU 4c95 0xc0040d3170 gate 1569284805670283000 evaluation succeeds" +"2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c98 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:45.670 UTC [policies] Evaluate -> DEBU 4c99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:45.670 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c9a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:45.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c9b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:45.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c9c updating membership: timestamp: " +"2019-09-24 00:26:45.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c9d Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:45.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c9e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:45.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c9f Exiting" +"2019-09-24 00:26:45.671 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ca0 Exiting" +"2019-09-24 00:26:45.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ca1 Exiting" +"2019-09-24 00:26:45.671 UTC [gossip.comm] func1 -> DEBU 4ca2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:45.671 UTC [gossip.gossip] handleMessage -> DEBU 4ca3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:45.671 UTC [gossip.gossip] handleMessage -> DEBU 4ca4 Exiting" +"2019-09-24 00:26:45.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ca5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:45.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ca6 Exiting" +"2019-09-24 00:26:45.676 UTC [msp] DeserializeIdentity -> DEBU 4ca7 Obtaining identity" +"2019-09-24 00:26:45.677 UTC [gossip.gossip] handleMessage -> DEBU 4ca8 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:45.677 UTC [gossip.gossip] handleMessage -> DEBU 4ca9 Exiting" +"2019-09-24 00:26:45.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4caa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:45.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4cab Exiting" +"2019-09-24 00:26:45.677 UTC [msp] DeserializeIdentity -> DEBU 4cac Obtaining identity" +"2019-09-24 00:26:45.678 UTC [msp] DeserializeIdentity -> DEBU 4cad Obtaining identity" +"2019-09-24 00:26:45.678 UTC [msp] DeserializeIdentity -> DEBU 4cae Obtaining identity" +"2019-09-24 00:26:45.679 UTC [msp] DeserializeIdentity -> DEBU 4caf Obtaining identity" +"2019-09-24 00:26:45.679 UTC [msp] DeserializeIdentity -> DEBU 4cb0 Obtaining identity" +"2019-09-24 00:26:45.679 UTC [msp] DeserializeIdentity -> DEBU 4cb1 Obtaining identity" +"2019-09-24 00:26:45.680 UTC [gossip.comm] Send -> DEBU 4cb2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:45.680 UTC [msp] DeserializeIdentity -> DEBU 4cb3 Obtaining identity" +"2019-09-24 00:26:45.680 UTC [gossip.comm] sendToEndpoint -> DEBU 4cb4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:45.680 UTC [gossip.comm] sendToEndpoint -> DEBU 4cb5 Exiting" +"2019-09-24 00:26:45.680 UTC [msp] DeserializeIdentity -> DEBU 4cb6 Obtaining identity" +"2019-09-24 00:26:45.681 UTC [gossip.comm] Send -> DEBU 4cb7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:45.681 UTC [gossip.comm] sendToEndpoint -> DEBU 4cb8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:45.681 UTC [gossip.comm] sendToEndpoint -> DEBU 4cb9 Exiting" +"2019-09-24 00:26:45.773 UTC [gossip.comm] func1 -> DEBU 4cba Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020F" signature:"0D\002 \010$\335S\343\355\371=\300f\327\230R#\270\262\261\035!\317M\037(m\006\010\032\277\336\255\013\343\002 \n\245Q%5\363V\226\221\\\347?&\274f\237!]\373,G\254<\035\001E_C\234%$\331" secret_envelope:iU9\230awsG\263\"=\207\264\376\005\227D\275>x\002 4\313yg nt\010v\014\353\345`\226\201\354a\345r\272\202\331X\231\200(\333c\355+\013\026" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:45.773 UTC [gossip.gossip] handleMessage -> DEBU 4cbb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020F" signature:"0D\002 \010$\335S\343\355\371=\300f\327\230R#\270\262\261\035!\317M\037(m\006\010\032\277\336\255\013\343\002 \n\245Q%5\363V\226\221\\\347?&\274f\237!]\373,G\254<\035\001E_C\234%$\331" secret_envelope:iU9\230awsG\263\"=\207\264\376\005\227D\275>x\002 4\313yg nt\010v\014\353\345`\226\201\354a\345r\272\202\331X\231\200(\333c\355+\013\026" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:45.773 UTC [gossip.gossip] handleMessage -> DEBU 4cbc Exiting" +"2019-09-24 00:26:45.773 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4cbd Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020F" signature:"0D\002 \010$\335S\343\355\371=\300f\327\230R#\270\262\261\035!\317M\037(m\006\010\032\277\336\255\013\343\002 \n\245Q%5\363V\226\221\\\347?&\274f\237!]\373,G\254<\035\001E_C\234%$\331" secret_envelope:iU9\230awsG\263\"=\207\264\376\005\227D\275>x\002 4\313yg nt\010v\014\353\345`\226\201\354a\345r\272\202\331X\231\200(\333c\355+\013\026" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:45.773 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4cbe Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:45.773 UTC [msp.identity] Verify -> DEBU 4cbf Verify: digest = 00000000 6c 22 9c 14 62 a0 1c 6d e1 5d 42 a7 79 27 79 0c |l"..b..m.]B.y'y.| +00000010 66 51 4f e2 1f dd 10 57 28 45 a7 c1 05 1d af 7b |fQO....W(E.....{|" +"2019-09-24 00:26:45.773 UTC [msp.identity] Verify -> DEBU 4cc0 Verify: sig = 00000000 30 44 02 20 08 24 dd 53 e3 ed f9 3d c0 66 d7 98 |0D. .$.S...=.f..| +00000010 52 23 b8 b2 b1 1d 21 cf 4d 1f 28 6d 06 08 1a bf |R#....!.M.(m....| +00000020 de ad 0b e3 02 20 0a a5 51 25 35 f3 56 96 91 5c |..... ..Q%5.V..\| +00000030 e7 3f 26 bc 66 9f 21 5d fb 2c 47 ac 3c 1d 01 45 |.?&.f.!].,G.<..E| +00000040 5f 43 9c 25 24 d9 |_C.%$.|" +"2019-09-24 00:26:45.773 UTC [msp.identity] Verify -> DEBU 4cc1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:45.773 UTC [msp.identity] Verify -> DEBU 4cc2 Verify: sig = 00000000 30 45 02 21 00 f9 ef e8 65 9b 45 17 78 3b 92 aa |0E.!....e.E.x;..| +00000010 3e 69 55 39 98 61 77 73 47 b3 22 3d 87 b4 fe 05 |>iU9.awsG."=....| +00000020 97 44 bd 3e 78 02 20 34 cb 79 67 20 6e 74 08 76 |.D.>x. 4.yg nt.v| +00000030 0c eb e5 60 96 81 ec 61 e5 72 ba 82 d9 58 99 80 |...`...a.r...X..| +00000040 28 db 63 ed 2b 0b 16 |(.c.+..|" +"2019-09-24 00:26:45.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 4cc3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:45.773 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cc4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:26:45.773 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cc5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:45.773 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cc6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:45.773 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cc7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:45.773 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cc8 Exiting" +"2019-09-24 00:26:45.774 UTC [gossip.discovery] handleAliveMessage -> DEBU 4cc9 Exiting" +"2019-09-24 00:26:45.774 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4cca Exiting" +"2019-09-24 00:26:45.774 UTC [gossip.discovery] sendMemResponse -> DEBU 4ccb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:45.774 UTC [msp] DeserializeIdentity -> DEBU 4ccc Obtaining identity" +"2019-09-24 00:26:45.774 UTC [msp] DeserializeIdentity -> DEBU 4ccd Obtaining identity" +"2019-09-24 00:26:45.774 UTC [gossip.comm] Send -> DEBU 4cce Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:45.774 UTC [gossip.discovery] sendMemResponse -> DEBU 4ccf Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020F" signature:"0D\002 \010$\335S\343\355\371=\300f\327\230R#\270\262\261\035!\317M\037(m\006\010\032\277\336\255\013\343\002 \n\245Q%5\363V\226\221\\\347?&\274f\237!]\373,G\254<\035\001E_C\234%$\331" secret_envelope:iU9\230awsG\263\"=\207\264\376\005\227D\275>x\002 4\313yg nt\010v\014\353\345`\226\201\354a\345r\272\202\331X\231\200(\333c\355+\013\026" > > alive: " +"2019-09-24 00:26:45.774 UTC [gossip.comm] sendToEndpoint -> DEBU 4cd0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:45.774 UTC [gossip.comm] sendToEndpoint -> DEBU 4cd1 Exiting" +"2019-09-24 00:26:46.008 UTC [gossip.comm] func1 -> DEBU 4cd2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:46.008 UTC [gossip.gossip] handleMessage -> DEBU 4cd3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:46.008 UTC [msp] DeserializeIdentity -> DEBU 4cd4 Obtaining identity" +"2019-09-24 00:26:46.008 UTC [msp] DeserializeIdentity -> DEBU 4cd5 Obtaining identity" +"2019-09-24 00:26:46.008 UTC [msp] DeserializeIdentity -> DEBU 4cd6 Obtaining identity" +"2019-09-24 00:26:46.008 UTC [gossip.gossip] handleMessage -> DEBU 4cd7 Exiting" +"2019-09-24 00:26:47.309 UTC [gossip.election] waitForInterrupt -> DEBU 4cd8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:47.309 UTC [gossip.election] IsLeader -> DEBU 4cd9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:47.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 4cda Obtaining default signing identity" +"2019-09-24 00:26:47.309 UTC [msp.identity] Sign -> DEBU 4cdb Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510171801 " +"2019-09-24 00:26:47.309 UTC [msp.identity] Sign -> DEBU 4cdc Sign: digest: 6DCD5F4987FBC9F59CDB322C9AF92032BEFC49AA2C99874D739076A2975DFC8A " +"2019-09-24 00:26:47.309 UTC [gossip.election] waitForInterrupt -> DEBU 4cdd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:47.311 UTC [msp] DeserializeIdentity -> DEBU 4cde Obtaining identity" +"2019-09-24 00:26:47.311 UTC [msp] DeserializeIdentity -> DEBU 4cdf Obtaining identity" +"2019-09-24 00:26:47.311 UTC [msp] DeserializeIdentity -> DEBU 4ce0 Obtaining identity" +"2019-09-24 00:26:47.311 UTC [msp] DeserializeIdentity -> DEBU 4ce1 Obtaining identity" +"2019-09-24 00:26:47.312 UTC [gossip.comm] Send -> DEBU 4ce2 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:47.312 UTC [msp] DeserializeIdentity -> DEBU 4ce3 Obtaining identity" +"2019-09-24 00:26:47.312 UTC [msp] DeserializeIdentity -> DEBU 4ce4 Obtaining identity" +"2019-09-24 00:26:47.312 UTC [gossip.comm] sendToEndpoint -> DEBU 4ce5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.312 UTC [gossip.comm] sendToEndpoint -> DEBU 4ce6 Exiting" +"2019-09-24 00:26:47.697 UTC [gossip.comm] func1 -> DEBU 4ce7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.697 UTC [gossip.gossip] handleMessage -> DEBU 4ce8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.697 UTC [gossip.gossip] handleMessage -> DEBU 4ce9 Exiting" +"2019-09-24 00:26:47.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4cea Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.698 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ceb Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:47.698 UTC [msp.identity] Verify -> DEBU 4cec Verify: digest = 00000000 06 02 d8 90 d6 a5 d0 fe fb 12 05 45 3d ac f8 de |...........E=...| +00000010 8c db c6 e2 0e e6 6b 33 1b dc da 71 1d 3e a2 f0 |......k3...q.>..|" +"2019-09-24 00:26:47.698 UTC [msp.identity] Verify -> DEBU 4ced Verify: sig = 00000000 30 44 02 20 1b d6 24 47 60 21 cb 0a 72 fe 29 34 |0D. ..$G`!..r.)4| +00000010 c1 5d 01 a2 d9 a5 33 7f fe 18 f8 49 c4 0a ed 3b |.]....3....I...;| +00000020 12 4d f3 a8 02 20 5a 37 ed cb 84 48 29 e6 e9 f0 |.M... Z7...H)...| +00000030 e9 3e 98 d1 22 74 27 6d f7 e7 7e 95 f4 50 17 9e |.>.."t'm..~..P..| +00000040 23 42 9a 24 eb 53 |#B.$.S|" +"2019-09-24 00:26:47.698 UTC [gossip.discovery] handleAliveMessage -> DEBU 4cee Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cef Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:47.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cf0 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:47.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cf1 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:47.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cf2 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:47.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 4cf3 Exiting" +"2019-09-24 00:26:47.698 UTC [gossip.discovery] handleAliveMessage -> DEBU 4cf4 Exiting" +"2019-09-24 00:26:47.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4cf5 Exiting" +"2019-09-24 00:26:47.699 UTC [gossip.pull] Hello -> DEBU 4cf6 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:47.699 UTC [gossip.comm] Send -> DEBU 4cf7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:47.699 UTC [gossip.pull] Hello -> DEBU 4cf8 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:47.699 UTC [gossip.comm] Send -> DEBU 4cf9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:47.699 UTC [gossip.pull] Hello -> DEBU 4cfa Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:47.699 UTC [gossip.comm] Send -> DEBU 4cfb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4cfc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4cfd Exiting" +"2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4cfe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4cff Exiting" +"2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4d00 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4d01 Exiting" +"2019-09-24 00:26:47.700 UTC [gossip.comm] func1 -> DEBU 4d02 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.700 UTC [gossip.gossip] handleMessage -> DEBU 4d03 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.700 UTC [gossip.pull] HandleMessage -> DEBU 4d04 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.700 UTC [gossip.gossip] handleMessage -> DEBU 4d05 Exiting" +"2019-09-24 00:26:47.701 UTC [gossip.gossip] handleMessage -> DEBU 4d06 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.701 UTC [gossip.pull] HandleMessage -> DEBU 4d07 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.701 UTC [gossip.gossip] handleMessage -> DEBU 4d08 Exiting" +"2019-09-24 00:26:47.702 UTC [gossip.comm] func1 -> DEBU 4d09 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.702 UTC [gossip.gossip] handleMessage -> DEBU 4d0a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.702 UTC [gossip.pull] HandleMessage -> DEBU 4d0b GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.703 UTC [gossip.gossip] handleMessage -> DEBU 4d0c Exiting" +"2019-09-24 00:26:47.707 UTC [msp] DeserializeIdentity -> DEBU 4d0d Obtaining identity" +"2019-09-24 00:26:47.707 UTC [msp] DeserializeIdentity -> DEBU 4d0e Obtaining identity" +"2019-09-24 00:26:47.707 UTC [msp] DeserializeIdentity -> DEBU 4d0f Obtaining identity" +"2019-09-24 00:26:47.707 UTC [gossip.comm] Send -> DEBU 4d10 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:47.707 UTC [msp] DeserializeIdentity -> DEBU 4d11 Obtaining identity" +"2019-09-24 00:26:47.707 UTC [gossip.comm] Send -> DEBU 4d12 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 4d13 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 4d14 Exiting" +"2019-09-24 00:26:47.707 UTC [gossip.comm] sendToEndpoint -> DEBU 4d15 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.708 UTC [gossip.comm] sendToEndpoint -> DEBU 4d16 Exiting" +"2019-09-24 00:26:47.708 UTC [gossip.comm] func1 -> DEBU 4d17 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.708 UTC [gossip.gossip] handleMessage -> DEBU 4d18 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.708 UTC [gossip.gossip] handleMessage -> DEBU 4d19 Exiting" +"2019-09-24 00:26:47.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d1a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d1b Exiting" +"2019-09-24 00:26:47.710 UTC [gossip.gossip] handleMessage -> DEBU 4d1c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.711 UTC [gossip.gossip] handleMessage -> DEBU 4d1d Exiting" +"2019-09-24 00:26:47.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d1e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.712 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d1f Exiting" +"2019-09-24 00:26:47.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 4d20 Obtaining default signing identity" +"2019-09-24 00:26:47.839 UTC [msp.identity] Sign -> DEBU 4d21 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151043 " +"2019-09-24 00:26:47.839 UTC [msp.identity] Sign -> DEBU 4d22 Sign: digest: 9BB9F7D129E5852699DB5299BDA24F7A602EBBEED83E62481DFE3B1C67C8F1A4 " +"2019-09-24 00:26:47.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 4d23 Obtaining default signing identity" +"2019-09-24 00:26:47.839 UTC [msp.identity] Sign -> DEBU 4d24 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:47.839 UTC [msp.identity] Sign -> DEBU 4d25 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:47.839 UTC [gossip.comm] Send -> DEBU 4d26 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:47.839 UTC [msp] DeserializeIdentity -> DEBU 4d27 Obtaining identity" +"2019-09-24 00:26:47.839 UTC [gossip.comm] Send -> DEBU 4d28 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:47.840 UTC [msp] DeserializeIdentity -> DEBU 4d29 Obtaining identity" +"2019-09-24 00:26:47.840 UTC [gossip.comm] Send -> DEBU 4d2a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d2b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d2c Exiting" +"2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d2d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d2e Exiting" +"2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d2f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.840 UTC [gossip.comm] sendToEndpoint -> DEBU 4d30 Exiting" +"2019-09-24 00:26:47.842 UTC [gossip.comm] func1 -> DEBU 4d31 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.843 UTC [gossip.gossip] handleMessage -> DEBU 4d32 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.843 UTC [gossip.gossip] handleMessage -> DEBU 4d33 Exiting" +"2019-09-24 00:26:47.843 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d34 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.843 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d35 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:47.844 UTC [msp.identity] Verify -> DEBU 4d36 Verify: digest = 00000000 9b b9 f7 d1 29 e5 85 26 99 db 52 99 bd a2 4f 7a |....)..&..R...Oz| +00000010 60 2e bb ee d8 3e 62 48 1d fe 3b 1c 67 c8 f1 a4 |`....>bH..;.g...|" +"2019-09-24 00:26:47.844 UTC [msp.identity] Verify -> DEBU 4d37 Verify: sig = 00000000 30 44 02 20 09 06 34 90 59 a9 2b 1b c9 04 4c 6b |0D. ..4.Y.+...Lk| +00000010 c2 77 01 c2 65 3c d9 53 52 2c a9 1a 13 1c ee ed |.w..e<.SR,......| +00000020 10 52 4c f9 02 20 5c 24 5e d8 9b d9 cd 48 4b 00 |.RL.. \$^....HK.| +00000030 a4 2a d7 05 4c e5 d5 4a bb ca d5 ad 15 fe d2 85 |.*..L..J........| +00000040 82 f9 2b cf 19 18 |..+...|" +"2019-09-24 00:26:47.844 UTC [msp.identity] Verify -> DEBU 4d38 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:47.844 UTC [msp.identity] Verify -> DEBU 4d39 Verify: sig = 00000000 30 44 02 20 5e d0 22 c6 a9 86 c1 54 e0 07 54 51 |0D. ^."....T..TQ| +00000010 0c cf ae fb a4 75 5c 7e 58 db 57 41 e2 52 f8 88 |.....u\~X.WA.R..| +00000020 56 a9 a7 47 02 20 03 49 c7 44 f6 8b 97 1b f9 48 |V..G. .I.D.....H| +00000030 b3 2f 31 ed 8b 44 ea b1 58 db d7 2a 79 8c 37 32 |./1..D..X..*y.72| +00000040 71 13 97 a9 f0 29 |q....)|" +"2019-09-24 00:26:47.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d3a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:47.845 UTC [gossip.discovery] isSentByMe -> DEBU 4d3b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:47.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d3c Exiting" +"2019-09-24 00:26:47.845 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d3d Exiting" +"2019-09-24 00:26:47.847 UTC [gossip.gossip] handleMessage -> DEBU 4d3e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.847 UTC [gossip.gossip] handleMessage -> DEBU 4d3f Exiting" +"2019-09-24 00:26:47.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d41 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:47.847 UTC [msp.identity] Verify -> DEBU 4d42 Verify: digest = 00000000 9b b9 f7 d1 29 e5 85 26 99 db 52 99 bd a2 4f 7a |....)..&..R...Oz| +00000010 60 2e bb ee d8 3e 62 48 1d fe 3b 1c 67 c8 f1 a4 |`....>bH..;.g...|" +"2019-09-24 00:26:47.848 UTC [msp.identity] Verify -> DEBU 4d43 Verify: sig = 00000000 30 44 02 20 09 06 34 90 59 a9 2b 1b c9 04 4c 6b |0D. ..4.Y.+...Lk| +00000010 c2 77 01 c2 65 3c d9 53 52 2c a9 1a 13 1c ee ed |.w..e<.SR,......| +00000020 10 52 4c f9 02 20 5c 24 5e d8 9b d9 cd 48 4b 00 |.RL.. \$^....HK.| +00000030 a4 2a d7 05 4c e5 d5 4a bb ca d5 ad 15 fe d2 85 |.*..L..J........| +00000040 82 f9 2b cf 19 18 |..+...|" +"2019-09-24 00:26:47.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d44 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.848 UTC [gossip.discovery] isSentByMe -> DEBU 4d45 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d46 Exiting" +"2019-09-24 00:26:47.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d47 Exiting" +"2019-09-24 00:26:47.851 UTC [gossip.comm] func1 -> DEBU 4d48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.851 UTC [gossip.gossip] handleMessage -> DEBU 4d49 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.851 UTC [gossip.gossip] handleMessage -> DEBU 4d4a Exiting" +"2019-09-24 00:26:47.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d4c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:47.851 UTC [msp.identity] Verify -> DEBU 4d4d Verify: digest = 00000000 9b b9 f7 d1 29 e5 85 26 99 db 52 99 bd a2 4f 7a |....)..&..R...Oz| +00000010 60 2e bb ee d8 3e 62 48 1d fe 3b 1c 67 c8 f1 a4 |`....>bH..;.g...|" +"2019-09-24 00:26:47.851 UTC [msp.identity] Verify -> DEBU 4d4e Verify: sig = 00000000 30 44 02 20 09 06 34 90 59 a9 2b 1b c9 04 4c 6b |0D. ..4.Y.+...Lk| +00000010 c2 77 01 c2 65 3c d9 53 52 2c a9 1a 13 1c ee ed |.w..e<.SR,......| +00000020 10 52 4c f9 02 20 5c 24 5e d8 9b d9 cd 48 4b 00 |.RL.. \$^....HK.| +00000030 a4 2a d7 05 4c e5 d5 4a bb ca d5 ad 15 fe d2 85 |.*..L..J........| +00000040 82 f9 2b cf 19 18 |..+...|" +"2019-09-24 00:26:47.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d4f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.852 UTC [gossip.discovery] isSentByMe -> DEBU 4d50 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:47.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d51 Exiting" +"2019-09-24 00:26:47.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d52 Exiting" +"2019-09-24 00:26:47.909 UTC [gossip.gossip] handleMessage -> DEBU 4d53 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.909 UTC [gossip.pull] HandleMessage -> DEBU 4d54 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:47.910 UTC [msp] DeserializeIdentity -> DEBU 4d55 Obtaining identity" +"2019-09-24 00:26:47.910 UTC [msp] DeserializeIdentity -> DEBU 4d56 Obtaining identity" +"2019-09-24 00:26:47.911 UTC [msp] DeserializeIdentity -> DEBU 4d57 Obtaining identity" +"2019-09-24 00:26:47.912 UTC [msp] DeserializeIdentity -> DEBU 4d58 Obtaining identity" +"2019-09-24 00:26:47.912 UTC [msp] DeserializeIdentity -> DEBU 4d59 Obtaining identity" +"2019-09-24 00:26:47.913 UTC [msp] DeserializeIdentity -> DEBU 4d5a Obtaining identity" +"2019-09-24 00:26:47.913 UTC [gossip.pull] SendDigest -> DEBU 4d5b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:47.914 UTC [gossip.gossip] handleMessage -> DEBU 4d5c Exiting" +"2019-09-24 00:26:48.015 UTC [gossip.gossip] handleMessage -> DEBU 4d5d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.016 UTC [gossip.gossip] handleMessage -> DEBU 4d5e Exiting" +"2019-09-24 00:26:48.018 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d5f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.021 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d60 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:48.022 UTC [msp] DeserializeIdentity -> DEBU 4d61 Obtaining identity" +"2019-09-24 00:26:48.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:48.024 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d63 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.024 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d64 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.024 UTC [policies] Evaluate -> DEBU 4d65 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:48.025 UTC [policies] Evaluate -> DEBU 4d66 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:48.025 UTC [policies] Evaluate -> DEBU 4d67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:48.026 UTC [cauthdsl] func1 -> DEBU 4d68 0xc0041a13f0 gate 1569284808026375000 evaluation starts" +"2019-09-24 00:26:48.026 UTC [cauthdsl] func2 -> DEBU 4d69 0xc0041a13f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.027 UTC [cauthdsl] func2 -> DEBU 4d6a 0xc0041a13f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.027 UTC [cauthdsl] func2 -> DEBU 4d6b 0xc0041a13f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:48.027 UTC [cauthdsl] func2 -> DEBU 4d6c 0xc0041a13f0 principal evaluation fails" +"2019-09-24 00:26:48.028 UTC [cauthdsl] func1 -> DEBU 4d6d 0xc0041a13f0 gate 1569284808026375000 evaluation fails" +"2019-09-24 00:26:48.028 UTC [policies] Evaluate -> DEBU 4d6e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.032 UTC [policies] Evaluate -> DEBU 4d6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.033 UTC [policies] Evaluate -> DEBU 4d70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:48.042 UTC [cauthdsl] func1 -> DEBU 4d71 0xc0041ae300 gate 1569284808042306700 evaluation starts" +"2019-09-24 00:26:48.042 UTC [cauthdsl] func2 -> DEBU 4d72 0xc0041ae300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.043 UTC [cauthdsl] func2 -> DEBU 4d73 0xc0041ae300 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.043 UTC [cauthdsl] func2 -> DEBU 4d74 0xc0041ae300 principal matched by identity 0" +"2019-09-24 00:26:48.043 UTC [msp.identity] Verify -> DEBU 4d75 Verify: digest = 00000000 c3 b4 41 1c 49 12 98 53 92 8b 7a 89 16 73 9a 50 |..A.I..S..z..s.P| +00000010 80 74 61 68 b6 30 29 1c c4 5d fe 26 c3 06 92 ec |.tah.0)..].&....|" +"2019-09-24 00:26:48.043 UTC [msp.identity] Verify -> DEBU 4d76 Verify: sig = 00000000 30 44 02 20 60 6e 28 c7 43 6e 19 e2 40 06 ba bd |0D. `n(.Cn..@...| +00000010 24 f0 c8 6f 64 80 1d ed ed 28 e8 c0 3c 39 79 e8 |$..od....(..<9y.| +00000020 7f 25 98 f7 02 20 43 b7 3c 4f be 19 d7 39 a2 08 |.%... C. DEBU 4d77 0xc0041ae300 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:48.043 UTC [cauthdsl] func1 -> DEBU 4d78 0xc0041ae300 gate 1569284808042306700 evaluation succeeds" +"2019-09-24 00:26:48.043 UTC [policies] Evaluate -> DEBU 4d79 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.044 UTC [policies] Evaluate -> DEBU 4d7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.044 UTC [policies] Evaluate -> DEBU 4d7b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:48.044 UTC [policies] Evaluate -> DEBU 4d7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:48.044 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d7d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:48.044 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d7e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:48.044 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d7f updating membership: timestamp: " +"2019-09-24 00:26:48.045 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d80 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:48.045 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d81 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:48.045 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d82 Exiting" +"2019-09-24 00:26:48.045 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d83 Exiting" +"2019-09-24 00:26:48.046 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d84 Exiting" +"2019-09-24 00:26:48.046 UTC [gossip.discovery] sendMemResponse -> DEBU 4d85 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:48.047 UTC [msp] DeserializeIdentity -> DEBU 4d86 Obtaining identity" +"2019-09-24 00:26:48.047 UTC [msp] DeserializeIdentity -> DEBU 4d87 Obtaining identity" +"2019-09-24 00:26:48.047 UTC [msp] DeserializeIdentity -> DEBU 4d88 Obtaining identity" +"2019-09-24 00:26:48.047 UTC [gossip.comm] Send -> DEBU 4d89 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:48.048 UTC [gossip.comm] sendToEndpoint -> DEBU 4d8a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.048 UTC [gossip.comm] sendToEndpoint -> DEBU 4d8b Exiting" +"2019-09-24 00:26:48.051 UTC [gossip.discovery] sendMemResponse -> DEBU 4d8c Exiting, replying with alive:7\242P\374\252\335\320\364\014\324g\336W\363\204\007" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020G" signature:"0D\002 \033\326$G`!\313\nr\376)4\301]\001\242\331\2453\177\376\030\370I\304\n\355;\022M\363\250\002 Z7\355\313\204H)\346\351\360\351>\230\321\"t'm\367\347~\225\364P\027\236#B\232$\353S" > alive: " +"2019-09-24 00:26:48.081 UTC [msp] DeserializeIdentity -> DEBU 4d8d Obtaining identity" +"2019-09-24 00:26:48.082 UTC [msp] DeserializeIdentity -> DEBU 4d8e Obtaining identity" +"2019-09-24 00:26:48.083 UTC [gossip.comm] Send -> DEBU 4d8f Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:48.083 UTC [gossip.comm] sendToEndpoint -> DEBU 4d90 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.083 UTC [gossip.comm] sendToEndpoint -> DEBU 4d91 Exiting" +"2019-09-24 00:26:48.083 UTC [gossip.comm] sendToEndpoint -> DEBU 4d92 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.084 UTC [gossip.comm] sendToEndpoint -> DEBU 4d93 Exiting" +"2019-09-24 00:26:48.084 UTC [gossip.comm] sendToEndpoint -> DEBU 4d94 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.084 UTC [gossip.comm] sendToEndpoint -> DEBU 4d95 Exiting" +"2019-09-24 00:26:48.085 UTC [gossip.comm] func1 -> DEBU 4d96 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.086 UTC [gossip.gossip] handleMessage -> DEBU 4d97 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.086 UTC [msp] DeserializeIdentity -> DEBU 4d98 Obtaining identity" +"2019-09-24 00:26:48.087 UTC [msp] DeserializeIdentity -> DEBU 4d99 Obtaining identity" +"2019-09-24 00:26:48.088 UTC [msp] DeserializeIdentity -> DEBU 4d9a Obtaining identity" +"2019-09-24 00:26:48.088 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d9b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:48.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d9c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d9d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.088 UTC [policies] Evaluate -> DEBU 4d9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:48.088 UTC [policies] Evaluate -> DEBU 4d9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:48.088 UTC [policies] Evaluate -> DEBU 4da0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:48.089 UTC [cauthdsl] func1 -> DEBU 4da1 0xc0041d1770 gate 1569284808089166000 evaluation starts" +"2019-09-24 00:26:48.089 UTC [cauthdsl] func2 -> DEBU 4da2 0xc0041d1770 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.089 UTC [cauthdsl] func2 -> DEBU 4da3 0xc0041d1770 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.090 UTC [cauthdsl] func2 -> DEBU 4da4 0xc0041d1770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:48.090 UTC [cauthdsl] func2 -> DEBU 4da5 0xc0041d1770 principal evaluation fails" +"2019-09-24 00:26:48.090 UTC [cauthdsl] func1 -> DEBU 4da6 0xc0041d1770 gate 1569284808089166000 evaluation fails" +"2019-09-24 00:26:48.090 UTC [policies] Evaluate -> DEBU 4da7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.090 UTC [policies] Evaluate -> DEBU 4da8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.091 UTC [policies] Evaluate -> DEBU 4da9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:48.091 UTC [cauthdsl] func1 -> DEBU 4daa 0xc0041d1fb0 gate 1569284808091366300 evaluation starts" +"2019-09-24 00:26:48.091 UTC [cauthdsl] func2 -> DEBU 4dab 0xc0041d1fb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.091 UTC [cauthdsl] func2 -> DEBU 4dac 0xc0041d1fb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.092 UTC [cauthdsl] func2 -> DEBU 4dad 0xc0041d1fb0 principal matched by identity 0" +"2019-09-24 00:26:48.092 UTC [msp.identity] Verify -> DEBU 4dae Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:48.092 UTC [msp.identity] Verify -> DEBU 4daf Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:48.093 UTC [cauthdsl] func2 -> DEBU 4db0 0xc0041d1fb0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:48.093 UTC [cauthdsl] func1 -> DEBU 4db1 0xc0041d1fb0 gate 1569284808091366300 evaluation succeeds" +"2019-09-24 00:26:48.093 UTC [policies] Evaluate -> DEBU 4db2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.094 UTC [policies] Evaluate -> DEBU 4db4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.093 UTC [gossip.comm] func1 -> DEBU 4db3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.095 UTC [policies] Evaluate -> DEBU 4db5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:48.095 UTC [policies] Evaluate -> DEBU 4db6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:48.096 UTC [msp.identity] Verify -> DEBU 4db7 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:48.096 UTC [msp.identity] Verify -> DEBU 4db8 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:48.096 UTC [msp] DeserializeIdentity -> DEBU 4db9 Obtaining identity" +"2019-09-24 00:26:48.097 UTC [msp] DeserializeIdentity -> DEBU 4dba Obtaining identity" +"2019-09-24 00:26:48.097 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4dbb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:48.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dbc Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dbd Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.098 UTC [policies] Evaluate -> DEBU 4dbe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:48.098 UTC [policies] Evaluate -> DEBU 4dbf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:48.099 UTC [policies] Evaluate -> DEBU 4dc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:48.100 UTC [cauthdsl] func1 -> DEBU 4dc1 0xc0041ebea0 gate 1569284808099875500 evaluation starts" +"2019-09-24 00:26:48.100 UTC [cauthdsl] func2 -> DEBU 4dc2 0xc0041ebea0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.100 UTC [cauthdsl] func2 -> DEBU 4dc3 0xc0041ebea0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.101 UTC [cauthdsl] func2 -> DEBU 4dc4 0xc0041ebea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:48.101 UTC [cauthdsl] func2 -> DEBU 4dc5 0xc0041ebea0 principal evaluation fails" +"2019-09-24 00:26:48.101 UTC [cauthdsl] func1 -> DEBU 4dc6 0xc0041ebea0 gate 1569284808099875500 evaluation fails" +"2019-09-24 00:26:48.102 UTC [policies] Evaluate -> DEBU 4dc7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.102 UTC [policies] Evaluate -> DEBU 4dc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.103 UTC [policies] Evaluate -> DEBU 4dc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:48.103 UTC [cauthdsl] func1 -> DEBU 4dca 0xc0042046e0 gate 1569284808103448300 evaluation starts" +"2019-09-24 00:26:48.104 UTC [cauthdsl] func2 -> DEBU 4dcb 0xc0042046e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.104 UTC [cauthdsl] func2 -> DEBU 4dcc 0xc0042046e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.104 UTC [cauthdsl] func2 -> DEBU 4dcd 0xc0042046e0 principal matched by identity 0" +"2019-09-24 00:26:48.105 UTC [msp.identity] Verify -> DEBU 4dce Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:48.105 UTC [msp.identity] Verify -> DEBU 4dcf Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:48.106 UTC [cauthdsl] func2 -> DEBU 4dd0 0xc0042046e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:48.106 UTC [cauthdsl] func1 -> DEBU 4dd1 0xc0042046e0 gate 1569284808103448300 evaluation succeeds" +"2019-09-24 00:26:48.106 UTC [policies] Evaluate -> DEBU 4dd2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.108 UTC [policies] Evaluate -> DEBU 4dd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.108 UTC [policies] Evaluate -> DEBU 4dd4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:48.108 UTC [policies] Evaluate -> DEBU 4dd5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:48.109 UTC [msp.identity] Verify -> DEBU 4dd6 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:48.109 UTC [msp.identity] Verify -> DEBU 4dd7 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:48.109 UTC [gossip.gossip] handleMessage -> DEBU 4dd8 Exiting" +"2019-09-24 00:26:48.109 UTC [gossip.gossip] handleMessage -> DEBU 4dd9 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.109 UTC [msp] DeserializeIdentity -> DEBU 4dda Obtaining identity" +"2019-09-24 00:26:48.110 UTC [msp] DeserializeIdentity -> DEBU 4ddb Obtaining identity" +"2019-09-24 00:26:48.110 UTC [msp] DeserializeIdentity -> DEBU 4ddc Obtaining identity" +"2019-09-24 00:26:48.110 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ddd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:48.110 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dde Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.110 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ddf Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.110 UTC [policies] Evaluate -> DEBU 4de0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:48.111 UTC [policies] Evaluate -> DEBU 4de1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:48.111 UTC [policies] Evaluate -> DEBU 4de2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:48.111 UTC [cauthdsl] func1 -> DEBU 4de3 0xc00421e910 gate 1569284808111546800 evaluation starts" +"2019-09-24 00:26:48.111 UTC [cauthdsl] func2 -> DEBU 4de4 0xc00421e910 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.111 UTC [cauthdsl] func2 -> DEBU 4de5 0xc00421e910 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.111 UTC [cauthdsl] func2 -> DEBU 4de6 0xc00421e910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:48.112 UTC [cauthdsl] func2 -> DEBU 4de7 0xc00421e910 principal evaluation fails" +"2019-09-24 00:26:48.112 UTC [cauthdsl] func1 -> DEBU 4de8 0xc00421e910 gate 1569284808111546800 evaluation fails" +"2019-09-24 00:26:48.112 UTC [policies] Evaluate -> DEBU 4de9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.112 UTC [policies] Evaluate -> DEBU 4dea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.113 UTC [policies] Evaluate -> DEBU 4deb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:48.113 UTC [cauthdsl] func1 -> DEBU 4dec 0xc00421f150 gate 1569284808113166600 evaluation starts" +"2019-09-24 00:26:48.113 UTC [cauthdsl] func2 -> DEBU 4ded 0xc00421f150 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.113 UTC [cauthdsl] func2 -> DEBU 4dee 0xc00421f150 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.113 UTC [cauthdsl] func2 -> DEBU 4def 0xc00421f150 principal matched by identity 0" +"2019-09-24 00:26:48.114 UTC [msp.identity] Verify -> DEBU 4df0 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:48.114 UTC [msp.identity] Verify -> DEBU 4df1 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:48.115 UTC [cauthdsl] func2 -> DEBU 4df2 0xc00421f150 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:48.115 UTC [cauthdsl] func1 -> DEBU 4df3 0xc00421f150 gate 1569284808113166600 evaluation succeeds" +"2019-09-24 00:26:48.115 UTC [policies] Evaluate -> DEBU 4df4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.115 UTC [policies] Evaluate -> DEBU 4df5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.115 UTC [policies] Evaluate -> DEBU 4df6 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:48.115 UTC [policies] Evaluate -> DEBU 4df7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:48.116 UTC [msp.identity] Verify -> DEBU 4df8 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:48.116 UTC [msp.identity] Verify -> DEBU 4df9 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:48.117 UTC [msp.identity] Verify -> DEBU 4dfa Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:48.117 UTC [msp.identity] Verify -> DEBU 4dfb Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:48.117 UTC [msp] DeserializeIdentity -> DEBU 4dfc Obtaining identity" +"2019-09-24 00:26:48.117 UTC [msp] DeserializeIdentity -> DEBU 4dfd Obtaining identity" +"2019-09-24 00:26:48.117 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4dfe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:48.117 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dff Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.117 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e00 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.117 UTC [policies] Evaluate -> DEBU 4e01 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:48.117 UTC [policies] Evaluate -> DEBU 4e02 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:48.117 UTC [policies] Evaluate -> DEBU 4e03 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:48.118 UTC [cauthdsl] func1 -> DEBU 4e04 0xc00422b760 gate 1569284808118201200 evaluation starts" +"2019-09-24 00:26:48.118 UTC [cauthdsl] func2 -> DEBU 4e05 0xc00422b760 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.118 UTC [cauthdsl] func2 -> DEBU 4e06 0xc00422b760 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.118 UTC [cauthdsl] func2 -> DEBU 4e07 0xc00422b760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:48.119 UTC [cauthdsl] func2 -> DEBU 4e08 0xc00422b760 principal evaluation fails" +"2019-09-24 00:26:48.119 UTC [cauthdsl] func1 -> DEBU 4e09 0xc00422b760 gate 1569284808118201200 evaluation fails" +"2019-09-24 00:26:48.120 UTC [policies] Evaluate -> DEBU 4e0a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.120 UTC [policies] Evaluate -> DEBU 4e0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.120 UTC [policies] Evaluate -> DEBU 4e0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:48.120 UTC [cauthdsl] func1 -> DEBU 4e0d 0xc00422bfa0 gate 1569284808120391400 evaluation starts" +"2019-09-24 00:26:48.120 UTC [cauthdsl] func2 -> DEBU 4e0e 0xc00422bfa0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.120 UTC [cauthdsl] func2 -> DEBU 4e0f 0xc00422bfa0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.120 UTC [cauthdsl] func2 -> DEBU 4e10 0xc00422bfa0 principal matched by identity 0" +"2019-09-24 00:26:48.120 UTC [msp.identity] Verify -> DEBU 4e11 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:48.120 UTC [msp.identity] Verify -> DEBU 4e12 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:48.120 UTC [cauthdsl] func2 -> DEBU 4e13 0xc00422bfa0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:48.120 UTC [cauthdsl] func1 -> DEBU 4e14 0xc00422bfa0 gate 1569284808120391400 evaluation succeeds" +"2019-09-24 00:26:48.120 UTC [policies] Evaluate -> DEBU 4e15 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.120 UTC [policies] Evaluate -> DEBU 4e16 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.121 UTC [policies] Evaluate -> DEBU 4e17 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:48.121 UTC [policies] Evaluate -> DEBU 4e18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:48.121 UTC [gossip.gossip] handleMessage -> DEBU 4e19 Exiting" +"2019-09-24 00:26:48.121 UTC [gossip.gossip] handleMessage -> DEBU 4e1a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.121 UTC [msp.identity] Verify -> DEBU 4e1b Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:48.122 UTC [msp.identity] Verify -> DEBU 4e1c Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:48.123 UTC [msp.identity] Verify -> DEBU 4e1d Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:48.123 UTC [msp.identity] Verify -> DEBU 4e1e Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:48.124 UTC [msp] DeserializeIdentity -> DEBU 4e1f Obtaining identity" +"2019-09-24 00:26:48.124 UTC [msp] DeserializeIdentity -> DEBU 4e20 Obtaining identity" +"2019-09-24 00:26:48.125 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e21 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:48.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e22 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.125 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e23 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.126 UTC [policies] Evaluate -> DEBU 4e24 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:48.126 UTC [policies] Evaluate -> DEBU 4e25 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:48.126 UTC [policies] Evaluate -> DEBU 4e26 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:48.126 UTC [cauthdsl] func1 -> DEBU 4e27 0xc00425e7f0 gate 1569284808126621800 evaluation starts" +"2019-09-24 00:26:48.126 UTC [cauthdsl] func2 -> DEBU 4e28 0xc00425e7f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.127 UTC [cauthdsl] func2 -> DEBU 4e29 0xc00425e7f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.128 UTC [cauthdsl] func2 -> DEBU 4e2a 0xc00425e7f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:48.128 UTC [cauthdsl] func2 -> DEBU 4e2b 0xc00425e7f0 principal evaluation fails" +"2019-09-24 00:26:48.128 UTC [cauthdsl] func1 -> DEBU 4e2c 0xc00425e7f0 gate 1569284808126621800 evaluation fails" +"2019-09-24 00:26:48.128 UTC [policies] Evaluate -> DEBU 4e2d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.129 UTC [policies] Evaluate -> DEBU 4e2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.129 UTC [policies] Evaluate -> DEBU 4e2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:48.129 UTC [cauthdsl] func1 -> DEBU 4e30 0xc00425f030 gate 1569284808129830900 evaluation starts" +"2019-09-24 00:26:48.129 UTC [cauthdsl] func2 -> DEBU 4e31 0xc00425f030 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.129 UTC [cauthdsl] func2 -> DEBU 4e32 0xc00425f030 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.130 UTC [cauthdsl] func2 -> DEBU 4e33 0xc00425f030 principal matched by identity 0" +"2019-09-24 00:26:48.130 UTC [msp.identity] Verify -> DEBU 4e34 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:48.131 UTC [msp.identity] Verify -> DEBU 4e35 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:48.131 UTC [cauthdsl] func2 -> DEBU 4e36 0xc00425f030 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:48.131 UTC [cauthdsl] func1 -> DEBU 4e37 0xc00425f030 gate 1569284808129830900 evaluation succeeds" +"2019-09-24 00:26:48.131 UTC [policies] Evaluate -> DEBU 4e38 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.132 UTC [policies] Evaluate -> DEBU 4e39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.132 UTC [policies] Evaluate -> DEBU 4e3a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:48.132 UTC [policies] Evaluate -> DEBU 4e3b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:48.133 UTC [msp] DeserializeIdentity -> DEBU 4e3c Obtaining identity" +"2019-09-24 00:26:48.133 UTC [msp] DeserializeIdentity -> DEBU 4e3d Obtaining identity" +"2019-09-24 00:26:48.133 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e3e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:48.133 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e3f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.134 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e40 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.134 UTC [policies] Evaluate -> DEBU 4e41 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:48.134 UTC [policies] Evaluate -> DEBU 4e42 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:48.134 UTC [policies] Evaluate -> DEBU 4e43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:48.135 UTC [cauthdsl] func1 -> DEBU 4e44 0xc004272800 gate 1569284808135319900 evaluation starts" +"2019-09-24 00:26:48.135 UTC [cauthdsl] func2 -> DEBU 4e45 0xc004272800 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.136 UTC [cauthdsl] func2 -> DEBU 4e46 0xc004272800 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.136 UTC [cauthdsl] func2 -> DEBU 4e47 0xc004272800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:48.137 UTC [cauthdsl] func2 -> DEBU 4e48 0xc004272800 principal evaluation fails" +"2019-09-24 00:26:48.137 UTC [cauthdsl] func1 -> DEBU 4e49 0xc004272800 gate 1569284808135319900 evaluation fails" +"2019-09-24 00:26:48.137 UTC [policies] Evaluate -> DEBU 4e4a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.137 UTC [policies] Evaluate -> DEBU 4e4b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.137 UTC [policies] Evaluate -> DEBU 4e4c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:48.138 UTC [cauthdsl] func1 -> DEBU 4e4d 0xc004273040 gate 1569284808138036900 evaluation starts" +"2019-09-24 00:26:48.138 UTC [cauthdsl] func2 -> DEBU 4e4e 0xc004273040 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.138 UTC [cauthdsl] func2 -> DEBU 4e4f 0xc004273040 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.138 UTC [cauthdsl] func2 -> DEBU 4e50 0xc004273040 principal matched by identity 0" +"2019-09-24 00:26:48.139 UTC [msp.identity] Verify -> DEBU 4e51 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:48.140 UTC [msp.identity] Verify -> DEBU 4e52 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:48.140 UTC [cauthdsl] func2 -> DEBU 4e53 0xc004273040 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:48.140 UTC [cauthdsl] func1 -> DEBU 4e54 0xc004273040 gate 1569284808138036900 evaluation succeeds" +"2019-09-24 00:26:48.141 UTC [policies] Evaluate -> DEBU 4e55 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.141 UTC [policies] Evaluate -> DEBU 4e56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.141 UTC [policies] Evaluate -> DEBU 4e57 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:48.141 UTC [policies] Evaluate -> DEBU 4e58 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:48.141 UTC [gossip.gossip] handleMessage -> DEBU 4e59 Exiting" +"2019-09-24 00:26:48.275 UTC [msp] DeserializeIdentity -> DEBU 4e5a Obtaining identity" +"2019-09-24 00:26:48.275 UTC [msp] DeserializeIdentity -> DEBU 4e5b Obtaining identity" +"2019-09-24 00:26:48.277 UTC [gossip.pull] Hello -> DEBU 4e5c Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:48.277 UTC [msp] DeserializeIdentity -> DEBU 4e5d Obtaining identity" +"2019-09-24 00:26:48.277 UTC [msp] DeserializeIdentity -> DEBU 4e5e Obtaining identity" +"2019-09-24 00:26:48.278 UTC [gossip.comm] Send -> DEBU 4e5f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:48.278 UTC [gossip.comm] sendToEndpoint -> DEBU 4e60 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.278 UTC [gossip.comm] sendToEndpoint -> DEBU 4e61 Exiting" +"2019-09-24 00:26:48.280 UTC [gossip.comm] func1 -> DEBU 4e62 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.280 UTC [gossip.gossip] handleMessage -> DEBU 4e63 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.280 UTC [gossip.pull] HandleMessage -> DEBU 4e64 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.282 UTC [gossip.gossip] handleMessage -> DEBU 4e65 Exiting" +"2019-09-24 00:26:48.582 UTC [gossip.comm] func1 -> DEBU 4e66 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.582 UTC [gossip.gossip] handleMessage -> DEBU 4e67 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.582 UTC [msp] DeserializeIdentity -> DEBU 4e68 Obtaining identity" +"2019-09-24 00:26:48.582 UTC [msp] DeserializeIdentity -> DEBU 4e69 Obtaining identity" +"2019-09-24 00:26:48.583 UTC [gossip.gossip] handleMessage -> DEBU 4e6a Exiting" +"2019-09-24 00:26:48.761 UTC [gossip.comm] func1 -> DEBU 4e6b Got message: GossipMessage: tag:EMPTY mem_req:\200g\202\302J\220\374\201\220\333\r\345\376;s\244\021\240\3401\367\267\002\033\302\036\271!\246\002 a\036\322NM+\270:\351gS\340\026\374,\210.\235\312(\374Q\000:\274\241\343\337\275/0\257" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.761 UTC [gossip.gossip] handleMessage -> DEBU 4e6c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\200g\202\302J\220\374\201\220\333\r\345\376;s\244\021\240\3401\367\267\002\033\302\036\271!\246\002 a\036\322NM+\270:\351gS\340\026\374,\210.\235\312(\374Q\000:\274\241\343\337\275/0\257" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.764 UTC [gossip.gossip] handleMessage -> DEBU 4e6d Exiting" +"2019-09-24 00:26:48.764 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e6e Got message: GossipMessage: tag:EMPTY mem_req:\200g\202\302J\220\374\201\220\333\r\345\376;s\244\021\240\3401\367\267\002\033\302\036\271!\246\002 a\036\322NM+\270:\351gS\340\026\374,\210.\235\312(\374Q\000:\274\241\343\337\275/0\257" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.764 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e6f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:48.765 UTC [msp] DeserializeIdentity -> DEBU 4e70 Obtaining identity" +"2019-09-24 00:26:48.765 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e71 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:48.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e72 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.766 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e73 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:48.767 UTC [policies] Evaluate -> DEBU 4e74 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:48.767 UTC [policies] Evaluate -> DEBU 4e75 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:48.767 UTC [policies] Evaluate -> DEBU 4e76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:48.768 UTC [cauthdsl] func1 -> DEBU 4e77 0xc004287bd0 gate 1569284808768140400 evaluation starts" +"2019-09-24 00:26:48.768 UTC [cauthdsl] func2 -> DEBU 4e78 0xc004287bd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.768 UTC [cauthdsl] func2 -> DEBU 4e79 0xc004287bd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.769 UTC [cauthdsl] func2 -> DEBU 4e7a 0xc004287bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:48.769 UTC [cauthdsl] func2 -> DEBU 4e7b 0xc004287bd0 principal evaluation fails" +"2019-09-24 00:26:48.769 UTC [cauthdsl] func1 -> DEBU 4e7c 0xc004287bd0 gate 1569284808768140400 evaluation fails" +"2019-09-24 00:26:48.769 UTC [policies] Evaluate -> DEBU 4e7d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.770 UTC [policies] Evaluate -> DEBU 4e7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:48.770 UTC [policies] Evaluate -> DEBU 4e7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:48.771 UTC [cauthdsl] func1 -> DEBU 4e80 0xc004702410 gate 1569284808771391700 evaluation starts" +"2019-09-24 00:26:48.771 UTC [cauthdsl] func2 -> DEBU 4e81 0xc004702410 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:48.772 UTC [cauthdsl] func2 -> DEBU 4e82 0xc004702410 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:48.772 UTC [cauthdsl] func2 -> DEBU 4e83 0xc004702410 principal matched by identity 0" +"2019-09-24 00:26:48.773 UTC [msp.identity] Verify -> DEBU 4e84 Verify: digest = 00000000 9c 0e 84 91 a3 84 f4 70 80 3f 5d 73 6c 11 06 b5 |.......p.?]sl...| +00000010 5f e3 54 85 52 c1 dd ed c3 37 1d f9 f5 d0 a9 9a |_.T.R....7......|" +"2019-09-24 00:26:48.773 UTC [msp.identity] Verify -> DEBU 4e85 Verify: sig = 00000000 30 44 02 20 57 34 3e 80 67 82 c2 4a 90 fc 81 90 |0D. W4>.g..J....| +00000010 db 0d e5 fe 3b 73 a4 11 a0 e0 31 f7 b7 02 1b c2 |....;s....1.....| +00000020 1e b9 21 a6 02 20 61 1e d2 4e 4d 2b b8 3a e9 67 |..!.. a..NM+.:.g| +00000030 53 e0 16 fc 2c 88 2e 9d ca 28 fc 51 00 3a bc a1 |S...,....(.Q.:..| +00000040 e3 df bd 2f 30 af |.../0.|" +"2019-09-24 00:26:48.774 UTC [cauthdsl] func2 -> DEBU 4e86 0xc004702410 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:48.774 UTC [cauthdsl] func1 -> DEBU 4e87 0xc004702410 gate 1569284808771391700 evaluation succeeds" +"2019-09-24 00:26:48.774 UTC [policies] Evaluate -> DEBU 4e88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.775 UTC [policies] Evaluate -> DEBU 4e89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:48.776 UTC [policies] Evaluate -> DEBU 4e8a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:48.776 UTC [policies] Evaluate -> DEBU 4e8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:48.776 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e8c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:48.776 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e8d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:48.777 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e8e updating membership: timestamp: " +"2019-09-24 00:26:48.778 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e8f Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:48.778 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e90 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:48.778 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e91 Exiting" +"2019-09-24 00:26:48.779 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e92 Exiting" +"2019-09-24 00:26:48.779 UTC [gossip.discovery] sendMemResponse -> DEBU 4e93 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:48.779 UTC [msp] DeserializeIdentity -> DEBU 4e94 Obtaining identity" +"2019-09-24 00:26:48.780 UTC [msp] DeserializeIdentity -> DEBU 4e95 Obtaining identity" +"2019-09-24 00:26:48.780 UTC [msp] DeserializeIdentity -> DEBU 4e96 Obtaining identity" +"2019-09-24 00:26:48.780 UTC [gossip.comm] Send -> DEBU 4e97 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:48.781 UTC [gossip.discovery] sendMemResponse -> DEBU 4e98 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020G" signature:"0D\002 \033\326$G`!\313\nr\376)4\301]\001\242\331\2453\177\376\030\370I\304\n\355;\022M\363\250\002 Z7\355\313\204H)\346\351\360\351>\230\321\"t'm\367\347~\225\364P\027\236#B\232$\353S" > alive:\200g\202\302J\220\374\201\220\333\r\345\376;s\244\021\240\3401\367\267\002\033\302\036\271!\246\002 a\036\322NM+\270:\351gS\340\026\374,\210.\235\312(\374Q\000:\274\241\343\337\275/0\257" > alive: alive: " +"2019-09-24 00:26:48.781 UTC [gossip.comm] sendToEndpoint -> DEBU 4e99 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.781 UTC [gossip.comm] sendToEndpoint -> DEBU 4e9a Exiting" +"2019-09-24 00:26:48.779 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e9b Exiting" +"2019-09-24 00:26:48.796 UTC [gossip.comm] func1 -> DEBU 4e9c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.796 UTC [gossip.gossip] handleMessage -> DEBU 4e9d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.796 UTC [gossip.pull] HandleMessage -> DEBU 4e9e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.796 UTC [msp] DeserializeIdentity -> DEBU 4e9f Obtaining identity" +"2019-09-24 00:26:48.797 UTC [msp] DeserializeIdentity -> DEBU 4ea0 Obtaining identity" +"2019-09-24 00:26:48.797 UTC [msp] DeserializeIdentity -> DEBU 4ea1 Obtaining identity" +"2019-09-24 00:26:48.797 UTC [msp] DeserializeIdentity -> DEBU 4ea2 Obtaining identity" +"2019-09-24 00:26:48.797 UTC [msp] DeserializeIdentity -> DEBU 4ea3 Obtaining identity" +"2019-09-24 00:26:48.797 UTC [msp] DeserializeIdentity -> DEBU 4ea4 Obtaining identity" +"2019-09-24 00:26:48.798 UTC [gossip.pull] SendDigest -> DEBU 4ea5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:48.798 UTC [gossip.gossip] handleMessage -> DEBU 4ea6 Exiting" +"2019-09-24 00:26:48.834 UTC [gossip.comm] func1 -> DEBU 4ea7 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.834 UTC [gossip.gossip] handleMessage -> DEBU 4ea8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.835 UTC [gossip.pull] HandleMessage -> DEBU 4ea9 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:48.835 UTC [gossip.pull] SendDigest -> DEBU 4eaa Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:48.835 UTC [gossip.gossip] handleMessage -> DEBU 4eab Exiting" +"2019-09-24 00:26:49.073 UTC [gossip.gossip] handleMessage -> DEBU 4eac Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:49.073 UTC [msp] DeserializeIdentity -> DEBU 4ead Obtaining identity" +"2019-09-24 00:26:49.074 UTC [msp] DeserializeIdentity -> DEBU 4eae Obtaining identity" +"2019-09-24 00:26:49.075 UTC [msp] DeserializeIdentity -> DEBU 4eaf Obtaining identity" +"2019-09-24 00:26:49.075 UTC [gossip.gossip] handleMessage -> DEBU 4eb0 Exiting" +"2019-09-24 00:26:49.578 UTC [msp] GetDefaultSigningIdentity -> DEBU 4eb1 Obtaining default signing identity" +"2019-09-24 00:26:49.578 UTC [msp.identity] Sign -> DEBU 4eb2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151044 " +"2019-09-24 00:26:49.578 UTC [msp.identity] Sign -> DEBU 4eb3 Sign: digest: 82DFFC1FEBBD5C75E08E3E49AC1E63B070B2E335D1197BFF30DB2F52A5BCAC64 " +"2019-09-24 00:26:49.578 UTC [msp] GetDefaultSigningIdentity -> DEBU 4eb4 Obtaining default signing identity" +"2019-09-24 00:26:49.578 UTC [msp.identity] Sign -> DEBU 4eb5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:49.579 UTC [msp.identity] Sign -> DEBU 4eb6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:49.579 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4eb7 Sleeping 5s" +"2019-09-24 00:26:49.580 UTC [msp] DeserializeIdentity -> DEBU 4eb8 Obtaining identity" +"2019-09-24 00:26:49.580 UTC [msp] DeserializeIdentity -> DEBU 4eb9 Obtaining identity" +"2019-09-24 00:26:49.581 UTC [gossip.comm] Send -> DEBU 4eba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:49.581 UTC [msp] DeserializeIdentity -> DEBU 4ebb Obtaining identity" +"2019-09-24 00:26:49.581 UTC [gossip.comm] Send -> DEBU 4ebc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:49.584 UTC [msp] DeserializeIdentity -> DEBU 4ebd Obtaining identity" +"2019-09-24 00:26:49.585 UTC [gossip.comm] Send -> DEBU 4ebe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ebf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ec1 Exiting" +"2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ec0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ec2 Exiting" +"2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ec3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.585 UTC [gossip.comm] sendToEndpoint -> DEBU 4ec4 Exiting" +"2019-09-24 00:26:49.646 UTC [gossip.comm] func1 -> DEBU 4ec5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:49.646 UTC [gossip.gossip] handleMessage -> DEBU 4ec6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:49.646 UTC [gossip.pull] HandleMessage -> DEBU 4ec7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:49.647 UTC [gossip.pull] SendDigest -> DEBU 4ec8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:49.648 UTC [gossip.gossip] handleMessage -> DEBU 4ec9 Exiting" +"2019-09-24 00:26:49.775 UTC [gossip.comm] func1 -> DEBU 4eca Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020H" signature:"0E\002!\000\257\207~\026\327F|\260\021\214\304^S\224?z\265\323\327\032\0105+\203\353\353J\331\256\367I\010\002 \032\020\355\270}\265\361RB5)\371\200\221\362\257pp\220\277\t\022\"h\263\245\017r\234\377\266\026" secret_envelope:\260\267\312I\227%\022\177\020\000@&\245r\026\331\344A\005\tk\332+C)\317\234e\302\243\305" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:26:49.775 UTC [gossip.gossip] handleMessage -> DEBU 4ecb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020H" signature:"0E\002!\000\257\207~\026\327F|\260\021\214\304^S\224?z\265\323\327\032\0105+\203\353\353J\331\256\367I\010\002 \032\020\355\270}\265\361RB5)\371\200\221\362\257pp\220\277\t\022\"h\263\245\017r\234\377\266\026" secret_envelope:\260\267\312I\227%\022\177\020\000@&\245r\026\331\344A\005\tk\332+C)\317\234e\302\243\305" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:26:49.776 UTC [gossip.gossip] handleMessage -> DEBU 4ecc Exiting" +"2019-09-24 00:26:49.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ecd Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020H" signature:"0E\002!\000\257\207~\026\327F|\260\021\214\304^S\224?z\265\323\327\032\0105+\203\353\353J\331\256\367I\010\002 \032\020\355\270}\265\361RB5)\371\200\221\362\257pp\220\277\t\022\"h\263\245\017r\234\377\266\026" secret_envelope:\260\267\312I\227%\022\177\020\000@&\245r\026\331\344A\005\tk\332+C)\317\234e\302\243\305" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:26:49.776 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ece Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:49.777 UTC [msp.identity] Verify -> DEBU 4ecf Verify: digest = 00000000 7b 8e fe 82 29 24 31 c1 03 cc 5a 99 d7 ad 1e 75 |{...)$1...Z....u| +00000010 34 d2 69 3f b4 dd 47 8e d8 81 70 5c 79 e3 d6 4c |4.i?..G...p\y..L|" +"2019-09-24 00:26:49.778 UTC [msp.identity] Verify -> DEBU 4ed0 Verify: sig = 00000000 30 45 02 21 00 af 87 7e 16 d7 46 7c b0 11 8c c4 |0E.!...~..F|....| +00000010 5e 53 94 3f 7a b5 d3 d7 1a 08 35 2b 83 eb eb 4a |^S.?z.....5+...J| +00000020 d9 ae f7 49 08 02 20 1a 10 ed b8 7d b5 f1 52 42 |...I.. ....}..RB| +00000030 35 29 f9 80 91 f2 af 70 70 90 bf 09 12 22 68 b3 |5).....pp...."h.| +00000040 a5 0f 72 9c ff b6 16 |..r....|" +"2019-09-24 00:26:49.779 UTC [msp.identity] Verify -> DEBU 4ed1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:49.779 UTC [msp.identity] Verify -> DEBU 4ed2 Verify: sig = 00000000 30 45 02 21 00 d4 9c 3f 80 0e 60 71 ae 1e d1 65 |0E.!...?..`q...e| +00000010 bf 47 a5 53 8b 8f bf 22 7b eb 08 79 7a f4 56 c4 |.G.S..."{..yz.V.| +00000020 8b 16 42 9d 0d 02 20 3e b0 b7 ca 49 97 25 12 7f |..B... >...I.%..| +00000030 10 00 40 26 a5 72 16 d9 e4 41 05 09 6b da 2b 43 |..@&.r...A..k.+C| +00000040 29 cf 9c 65 c2 a3 c5 |)..e...|" +"2019-09-24 00:26:49.780 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ed3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:49.780 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ed4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:26:49.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ed5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:49.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ed6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:49.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ed7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:49.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ed8 Exiting" +"2019-09-24 00:26:49.782 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ed9 Exiting" +"2019-09-24 00:26:49.782 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4eda Exiting" +"2019-09-24 00:26:49.783 UTC [gossip.discovery] sendMemResponse -> DEBU 4edb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:49.783 UTC [msp] DeserializeIdentity -> DEBU 4edc Obtaining identity" +"2019-09-24 00:26:49.783 UTC [msp] DeserializeIdentity -> DEBU 4edd Obtaining identity" +"2019-09-24 00:26:49.784 UTC [gossip.comm] Send -> DEBU 4ede Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:49.785 UTC [gossip.comm] sendToEndpoint -> DEBU 4ee0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:49.785 UTC [gossip.comm] sendToEndpoint -> DEBU 4ee1 Exiting" +"2019-09-24 00:26:49.785 UTC [gossip.discovery] sendMemResponse -> DEBU 4edf Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020H" signature:"0E\002!\000\257\207~\026\327F|\260\021\214\304^S\224?z\265\323\327\032\0105+\203\353\353J\331\256\367I\010\002 \032\020\355\270}\265\361RB5)\371\200\221\362\257pp\220\277\t\022\"h\263\245\017r\234\377\266\026" secret_envelope:\260\267\312I\227%\022\177\020\000@&\245r\026\331\344A\005\tk\332+C)\317\234e\302\243\305" > > alive: " +"2019-09-24 00:26:49.940 UTC [gossip.gossip] handleMessage -> DEBU 4ee2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.941 UTC [gossip.gossip] handleMessage -> DEBU 4ee3 Exiting" +"2019-09-24 00:26:49.941 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ee4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.941 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ee5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:49.941 UTC [msp] DeserializeIdentity -> DEBU 4ee6 Obtaining identity" +"2019-09-24 00:26:49.941 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ee7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:49.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ee8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:49.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ee9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:49.942 UTC [policies] Evaluate -> DEBU 4eea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:49.942 UTC [policies] Evaluate -> DEBU 4eeb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:49.942 UTC [policies] Evaluate -> DEBU 4eec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:49.942 UTC [cauthdsl] func1 -> DEBU 4eed 0xc004763620 gate 1569284809942356300 evaluation starts" +"2019-09-24 00:26:49.942 UTC [cauthdsl] func2 -> DEBU 4eee 0xc004763620 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:49.942 UTC [cauthdsl] func2 -> DEBU 4eef 0xc004763620 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:49.942 UTC [cauthdsl] func2 -> DEBU 4ef0 0xc004763620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:49.942 UTC [cauthdsl] func2 -> DEBU 4ef1 0xc004763620 principal evaluation fails" +"2019-09-24 00:26:49.942 UTC [cauthdsl] func1 -> DEBU 4ef2 0xc004763620 gate 1569284809942356300 evaluation fails" +"2019-09-24 00:26:49.943 UTC [policies] Evaluate -> DEBU 4ef3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:49.943 UTC [policies] Evaluate -> DEBU 4ef4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:49.943 UTC [policies] Evaluate -> DEBU 4ef5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:49.943 UTC [cauthdsl] func1 -> DEBU 4ef6 0xc004763e60 gate 1569284809943368200 evaluation starts" +"2019-09-24 00:26:49.943 UTC [cauthdsl] func2 -> DEBU 4ef7 0xc004763e60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:49.943 UTC [cauthdsl] func2 -> DEBU 4ef8 0xc004763e60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:49.943 UTC [cauthdsl] func2 -> DEBU 4ef9 0xc004763e60 principal matched by identity 0" +"2019-09-24 00:26:49.943 UTC [msp.identity] Verify -> DEBU 4efa Verify: digest = 00000000 50 a1 12 d4 b8 20 a2 da e1 58 ad 0b 52 91 41 c8 |P.... ...X..R.A.| +00000010 a2 46 3d 23 76 23 3d e0 ba 80 6c c1 ea 7f a5 86 |.F=#v#=...l.....|" +"2019-09-24 00:26:49.943 UTC [msp.identity] Verify -> DEBU 4efb Verify: sig = 00000000 30 44 02 20 50 14 18 07 3d 88 ea 09 37 65 d3 f6 |0D. P...=...7e..| +00000010 1d 9c d5 4e 3b d4 dc 4d 39 9c fe 37 74 17 1d 93 |...N;..M9..7t...| +00000020 3b 66 82 4e 02 20 37 36 41 d5 68 c5 bb aa 3c 2a |;f.N. 76A.h...<*| +00000030 ae e5 7e 10 df c4 ea 8b bb 0c 32 7c 52 ba 07 40 |..~.......2|R..@| +00000040 f2 57 c4 79 08 00 |.W.y..|" +"2019-09-24 00:26:49.944 UTC [cauthdsl] func2 -> DEBU 4efc 0xc004763e60 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:49.944 UTC [cauthdsl] func1 -> DEBU 4efd 0xc004763e60 gate 1569284809943368200 evaluation succeeds" +"2019-09-24 00:26:49.944 UTC [policies] Evaluate -> DEBU 4efe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:49.944 UTC [policies] Evaluate -> DEBU 4eff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:49.944 UTC [policies] Evaluate -> DEBU 4f00 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:49.944 UTC [policies] Evaluate -> DEBU 4f01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:49.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f02 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f03 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:49.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f04 updating membership: timestamp: " +"2019-09-24 00:26:49.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f05 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:49.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f06 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:49.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f07 Exiting" +"2019-09-24 00:26:49.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f08 Exiting" +"2019-09-24 00:26:49.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f09 Exiting" +"2019-09-24 00:26:49.949 UTC [msp] DeserializeIdentity -> DEBU 4f0a Obtaining identity" +"2019-09-24 00:26:49.949 UTC [msp] DeserializeIdentity -> DEBU 4f0b Obtaining identity" +"2019-09-24 00:26:49.950 UTC [msp] DeserializeIdentity -> DEBU 4f0c Obtaining identity" +"2019-09-24 00:26:49.950 UTC [msp] DeserializeIdentity -> DEBU 4f0d Obtaining identity" +"2019-09-24 00:26:49.951 UTC [msp] DeserializeIdentity -> DEBU 4f0e Obtaining identity" +"2019-09-24 00:26:49.951 UTC [msp] DeserializeIdentity -> DEBU 4f0f Obtaining identity" +"2019-09-24 00:26:49.951 UTC [msp] DeserializeIdentity -> DEBU 4f10 Obtaining identity" +"2019-09-24 00:26:49.951 UTC [gossip.comm] Send -> DEBU 4f11 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:49.952 UTC [msp] DeserializeIdentity -> DEBU 4f12 Obtaining identity" +"2019-09-24 00:26:49.953 UTC [gossip.comm] Send -> DEBU 4f13 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:49.953 UTC [gossip.comm] sendToEndpoint -> DEBU 4f14 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.953 UTC [gossip.comm] sendToEndpoint -> DEBU 4f15 Exiting" +"2019-09-24 00:26:49.954 UTC [gossip.comm] sendToEndpoint -> DEBU 4f16 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.954 UTC [gossip.comm] sendToEndpoint -> DEBU 4f17 Exiting" +"2019-09-24 00:26:49.955 UTC [gossip.comm] func1 -> DEBU 4f18 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.955 UTC [gossip.gossip] handleMessage -> DEBU 4f19 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.955 UTC [gossip.gossip] handleMessage -> DEBU 4f1a Exiting" +"2019-09-24 00:26:49.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f1b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f1c Exiting" +"2019-09-24 00:26:49.957 UTC [gossip.comm] func1 -> DEBU 4f1d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.957 UTC [gossip.gossip] handleMessage -> DEBU 4f1e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.959 UTC [gossip.gossip] handleMessage -> DEBU 4f1f Exiting" +"2019-09-24 00:26:49.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f20 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:49.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f21 Exiting" +"2019-09-24 00:26:50.009 UTC [gossip.comm] func1 -> DEBU 4f22 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:50.009 UTC [gossip.gossip] handleMessage -> DEBU 4f23 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:50.009 UTC [msp] DeserializeIdentity -> DEBU 4f24 Obtaining identity" +"2019-09-24 00:26:50.010 UTC [msp] DeserializeIdentity -> DEBU 4f25 Obtaining identity" +"2019-09-24 00:26:50.011 UTC [msp] DeserializeIdentity -> DEBU 4f26 Obtaining identity" +"2019-09-24 00:26:50.012 UTC [gossip.gossip] handleMessage -> DEBU 4f27 Exiting" +"2019-09-24 00:26:50.671 UTC [gossip.comm] func1 -> DEBU 4f28 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:50.671 UTC [gossip.gossip] handleMessage -> DEBU 4f29 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:50.671 UTC [gossip.gossip] handleMessage -> DEBU 4f2a Exiting" +"2019-09-24 00:26:50.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f2b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:50.673 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4f2c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:50.673 UTC [msp] DeserializeIdentity -> DEBU 4f2d Obtaining identity" +"2019-09-24 00:26:50.674 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f2e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:50.674 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f2f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:50.674 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f30 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:50.674 UTC [policies] Evaluate -> DEBU 4f31 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:50.675 UTC [policies] Evaluate -> DEBU 4f32 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:50.676 UTC [policies] Evaluate -> DEBU 4f33 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:50.676 UTC [cauthdsl] func1 -> DEBU 4f34 0xc004795c30 gate 1569284810676153400 evaluation starts" +"2019-09-24 00:26:50.677 UTC [cauthdsl] func2 -> DEBU 4f35 0xc004795c30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:50.677 UTC [cauthdsl] func2 -> DEBU 4f36 0xc004795c30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:50.678 UTC [cauthdsl] func2 -> DEBU 4f37 0xc004795c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:50.678 UTC [cauthdsl] func2 -> DEBU 4f38 0xc004795c30 principal evaluation fails" +"2019-09-24 00:26:50.678 UTC [cauthdsl] func1 -> DEBU 4f39 0xc004795c30 gate 1569284810676153400 evaluation fails" +"2019-09-24 00:26:50.679 UTC [policies] Evaluate -> DEBU 4f3a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:50.680 UTC [policies] Evaluate -> DEBU 4f3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:50.681 UTC [policies] Evaluate -> DEBU 4f3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:50.681 UTC [cauthdsl] func1 -> DEBU 4f3d 0xc0047b4470 gate 1569284810681277800 evaluation starts" +"2019-09-24 00:26:50.681 UTC [cauthdsl] func2 -> DEBU 4f3e 0xc0047b4470 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:50.681 UTC [cauthdsl] func2 -> DEBU 4f3f 0xc0047b4470 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:50.682 UTC [cauthdsl] func2 -> DEBU 4f40 0xc0047b4470 principal matched by identity 0" +"2019-09-24 00:26:50.682 UTC [msp.identity] Verify -> DEBU 4f41 Verify: digest = 00000000 5a 44 38 bc 43 ed 91 3e a0 23 4a e1 52 c5 40 37 |ZD8.C..>.#J.R.@7| +00000010 33 b8 29 fd 03 76 72 a7 f8 2d 92 e5 95 19 f7 2d |3.)..vr..-.....-|" +"2019-09-24 00:26:50.682 UTC [msp.identity] Verify -> DEBU 4f42 Verify: sig = 00000000 30 45 02 21 00 fb 2a a2 79 1e 10 d1 72 42 1a fc |0E.!..*.y...rB..| +00000010 80 84 e8 49 35 f6 28 b0 11 26 67 c6 85 5b c6 8f |...I5.(..&g..[..| +00000020 43 69 10 f2 53 02 20 2f c5 44 89 80 10 aa 4d 4e |Ci..S. /.D....MN| +00000030 eb 64 ed 52 50 25 7d 7d 50 40 89 9c cf d1 be 25 |.d.RP%}}P@.....%| +00000040 a8 64 7b 25 f6 f1 1d |.d{%...|" +"2019-09-24 00:26:50.683 UTC [cauthdsl] func2 -> DEBU 4f43 0xc0047b4470 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:50.683 UTC [cauthdsl] func1 -> DEBU 4f44 0xc0047b4470 gate 1569284810681277800 evaluation succeeds" +"2019-09-24 00:26:50.683 UTC [policies] Evaluate -> DEBU 4f45 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:50.683 UTC [policies] Evaluate -> DEBU 4f46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:50.684 UTC [policies] Evaluate -> DEBU 4f47 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:50.684 UTC [policies] Evaluate -> DEBU 4f48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:50.684 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f49 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:50.685 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f4a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:50.685 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f4b updating membership: timestamp: " +"2019-09-24 00:26:50.686 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f4c Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:50.686 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f4d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:50.687 UTC [gossip.discovery] learnExistingMembers -> DEBU 4f4e Exiting" +"2019-09-24 00:26:50.687 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f4f Exiting" +"2019-09-24 00:26:50.688 UTC [gossip.comm] func1 -> DEBU 4f50 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:50.688 UTC [gossip.gossip] handleMessage -> DEBU 4f51 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:50.688 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f52 Exiting" +"2019-09-24 00:26:50.690 UTC [gossip.gossip] handleMessage -> DEBU 4f53 Exiting" +"2019-09-24 00:26:50.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f54 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:50.690 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f55 Exiting" +"2019-09-24 00:26:50.693 UTC [gossip.gossip] handleMessage -> DEBU 4f56 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:50.693 UTC [gossip.gossip] handleMessage -> DEBU 4f57 Exiting" +"2019-09-24 00:26:50.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f58 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:50.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f59 Exiting" +"2019-09-24 00:26:50.698 UTC [msp] DeserializeIdentity -> DEBU 4f5a Obtaining identity" +"2019-09-24 00:26:50.698 UTC [msp] DeserializeIdentity -> DEBU 4f5b Obtaining identity" +"2019-09-24 00:26:50.699 UTC [msp] DeserializeIdentity -> DEBU 4f5c Obtaining identity" +"2019-09-24 00:26:50.699 UTC [msp] DeserializeIdentity -> DEBU 4f5d Obtaining identity" +"2019-09-24 00:26:50.699 UTC [msp] DeserializeIdentity -> DEBU 4f5e Obtaining identity" +"2019-09-24 00:26:50.699 UTC [msp] DeserializeIdentity -> DEBU 4f5f Obtaining identity" +"2019-09-24 00:26:50.699 UTC [msp] DeserializeIdentity -> DEBU 4f60 Obtaining identity" +"2019-09-24 00:26:50.700 UTC [gossip.comm] Send -> DEBU 4f61 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:50.700 UTC [msp] DeserializeIdentity -> DEBU 4f62 Obtaining identity" +"2019-09-24 00:26:50.701 UTC [gossip.comm] Send -> DEBU 4f63 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:50.702 UTC [gossip.comm] sendToEndpoint -> DEBU 4f64 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:50.702 UTC [gossip.comm] sendToEndpoint -> DEBU 4f65 Exiting" +"2019-09-24 00:26:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 4f66 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:50.703 UTC [gossip.comm] sendToEndpoint -> DEBU 4f67 Exiting" +"2019-09-24 00:26:51.474 UTC [chaincode.platform.util] DockerBuild -> DEBU 4f68 Build output is # examples/chaincode/go/chaincode_example02 +/tmp/go-link-949351753/000001.o: In function `pluginOpen': +/workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-949351753/000021.o: In function `mygetgrouplist': +/workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-949351753/000020.o: In function `mygetgrgid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-949351753/000020.o: In function `mygetgrnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-949351753/000020.o: In function `mygetpwnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-949351753/000020.o: In function `mygetpwuid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-949351753/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': +/tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking" +"2019-09-24 00:26:51.700 UTC [gossip.pull] Hello -> DEBU 4f69 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:51.700 UTC [gossip.comm] Send -> DEBU 4f6a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:51.700 UTC [gossip.pull] Hello -> DEBU 4f6b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:51.700 UTC [gossip.comm] Send -> DEBU 4f6c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:51.701 UTC [gossip.pull] Hello -> DEBU 4f6d Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:51.701 UTC [gossip.comm] Send -> DEBU 4f6e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f6f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f70 Exiting" +"2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f71 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f72 Exiting" +"2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f73 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.701 UTC [gossip.comm] sendToEndpoint -> DEBU 4f74 Exiting" +"2019-09-24 00:26:51.703 UTC [gossip.comm] func1 -> DEBU 4f75 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.703 UTC [gossip.gossip] handleMessage -> DEBU 4f76 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.703 UTC [gossip.pull] HandleMessage -> DEBU 4f77 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.703 UTC [gossip.gossip] handleMessage -> DEBU 4f78 Exiting" +"2019-09-24 00:26:51.704 UTC [gossip.comm] func1 -> DEBU 4f79 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.704 UTC [gossip.gossip] handleMessage -> DEBU 4f7a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.704 UTC [gossip.pull] HandleMessage -> DEBU 4f7b GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.704 UTC [gossip.gossip] handleMessage -> DEBU 4f7c Exiting" +"2019-09-24 00:26:51.705 UTC [gossip.gossip] handleMessage -> DEBU 4f7d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.705 UTC [gossip.pull] HandleMessage -> DEBU 4f7e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.705 UTC [gossip.gossip] handleMessage -> DEBU 4f7f Exiting" +"2019-09-24 00:26:51.842 UTC [msp] GetDefaultSigningIdentity -> DEBU 4f80 Obtaining default signing identity" +"2019-09-24 00:26:51.842 UTC [msp.identity] Sign -> DEBU 4f81 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151045 " +"2019-09-24 00:26:51.842 UTC [msp.identity] Sign -> DEBU 4f82 Sign: digest: C0290D3BACA55E2E94D24D78B44AEEC3C19C16159E6F5F743132DA9298AC17B8 " +"2019-09-24 00:26:51.842 UTC [msp] GetDefaultSigningIdentity -> DEBU 4f83 Obtaining default signing identity" +"2019-09-24 00:26:51.842 UTC [msp.identity] Sign -> DEBU 4f84 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:51.842 UTC [msp.identity] Sign -> DEBU 4f85 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:51.843 UTC [gossip.comm] Send -> DEBU 4f86 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:51.843 UTC [msp] DeserializeIdentity -> DEBU 4f87 Obtaining identity" +"2019-09-24 00:26:51.843 UTC [gossip.comm] Send -> DEBU 4f88 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:51.843 UTC [msp] DeserializeIdentity -> DEBU 4f89 Obtaining identity" +"2019-09-24 00:26:51.843 UTC [gossip.comm] Send -> DEBU 4f8a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:51.843 UTC [gossip.comm] sendToEndpoint -> DEBU 4f8b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.843 UTC [gossip.comm] sendToEndpoint -> DEBU 4f8c Exiting" +"2019-09-24 00:26:51.845 UTC [gossip.comm] sendToEndpoint -> DEBU 4f8d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.845 UTC [gossip.comm] sendToEndpoint -> DEBU 4f8e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.846 UTC [gossip.comm] sendToEndpoint -> DEBU 4f90 Exiting" +"2019-09-24 00:26:51.845 UTC [gossip.gossip] handleMessage -> DEBU 4f8f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.846 UTC [gossip.gossip] handleMessage -> DEBU 4f91 Exiting" +"2019-09-24 00:26:51.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4f93 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:51.846 UTC [msp.identity] Verify -> DEBU 4f94 Verify: digest = 00000000 7b 8e fe 82 29 24 31 c1 03 cc 5a 99 d7 ad 1e 75 |{...)$1...Z....u| +00000010 34 d2 69 3f b4 dd 47 8e d8 81 70 5c 79 e3 d6 4c |4.i?..G...p\y..L|" +"2019-09-24 00:26:51.846 UTC [msp.identity] Verify -> DEBU 4f95 Verify: sig = 00000000 30 45 02 21 00 af 87 7e 16 d7 46 7c b0 11 8c c4 |0E.!...~..F|....| +00000010 5e 53 94 3f 7a b5 d3 d7 1a 08 35 2b 83 eb eb 4a |^S.?z.....5+...J| +00000020 d9 ae f7 49 08 02 20 1a 10 ed b8 7d b5 f1 52 42 |...I.. ....}..RB| +00000030 35 29 f9 80 91 f2 af 70 70 90 bf 09 12 22 68 b3 |5).....pp...."h.| +00000040 a5 0f 72 9c ff b6 16 |..r....|" +"2019-09-24 00:26:51.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f96 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:51.846 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f97 Exiting" +"2019-09-24 00:26:51.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4f98 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:51.847 UTC [msp.identity] Verify -> DEBU 4f99 Verify: digest = 00000000 c0 29 0d 3b ac a5 5e 2e 94 d2 4d 78 b4 4a ee c3 |.).;..^...Mx.J..| +00000010 c1 9c 16 15 9e 6f 5f 74 31 32 da 92 98 ac 17 b8 |.....o_t12......|" +"2019-09-24 00:26:51.847 UTC [msp.identity] Verify -> DEBU 4f9a Verify: sig = 00000000 30 44 02 20 76 ae 47 5d 19 45 82 62 55 6c be a4 |0D. v.G].E.bUl..| +00000010 3a 7e 59 2e 25 d9 2b 8d 8e 73 34 16 00 c4 72 28 |:~Y.%.+..s4...r(| +00000020 66 e5 56 c1 02 20 2b 22 b6 66 48 8e c2 1f 59 b5 |f.V.. +".fH...Y.| +00000030 52 4c 61 3d de 04 f9 4b 78 b0 63 64 de 56 bb a2 |RLa=...Kx.cd.V..| +00000040 c9 2c d7 d0 54 36 |.,..T6|" +"2019-09-24 00:26:51.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f9b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:51.847 UTC [gossip.discovery] isSentByMe -> DEBU 4f9c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:51.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f9d Exiting" +"2019-09-24 00:26:51.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f9e Exiting" +"2019-09-24 00:26:51.850 UTC [gossip.comm] func1 -> DEBU 4f9f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.850 UTC [gossip.gossip] handleMessage -> DEBU 4fa0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.851 UTC [gossip.gossip] handleMessage -> DEBU 4fa1 Exiting" +"2019-09-24 00:26:51.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fa2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4fa3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:51.851 UTC [msp.identity] Verify -> DEBU 4fa4 Verify: digest = 00000000 c0 29 0d 3b ac a5 5e 2e 94 d2 4d 78 b4 4a ee c3 |.).;..^...Mx.J..| +00000010 c1 9c 16 15 9e 6f 5f 74 31 32 da 92 98 ac 17 b8 |.....o_t12......|" +"2019-09-24 00:26:51.851 UTC [msp.identity] Verify -> DEBU 4fa5 Verify: sig = 00000000 30 44 02 20 76 ae 47 5d 19 45 82 62 55 6c be a4 |0D. v.G].E.bUl..| +00000010 3a 7e 59 2e 25 d9 2b 8d 8e 73 34 16 00 c4 72 28 |:~Y.%.+..s4...r(| +00000020 66 e5 56 c1 02 20 2b 22 b6 66 48 8e c2 1f 59 b5 |f.V.. +".fH...Y.| +00000030 52 4c 61 3d de 04 f9 4b 78 b0 63 64 de 56 bb a2 |RLa=...Kx.cd.V..| +00000040 c9 2c d7 d0 54 36 |.,..T6|" +"2019-09-24 00:26:51.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fa6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:51.851 UTC [gossip.discovery] isSentByMe -> DEBU 4fa7 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:51.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fa8 Exiting" +"2019-09-24 00:26:51.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4fa9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:51.851 UTC [msp.identity] Verify -> DEBU 4faa Verify: digest = 00000000 7b 8e fe 82 29 24 31 c1 03 cc 5a 99 d7 ad 1e 75 |{...)$1...Z....u| +00000010 34 d2 69 3f b4 dd 47 8e d8 81 70 5c 79 e3 d6 4c |4.i?..G...p\y..L|" +"2019-09-24 00:26:51.851 UTC [msp.identity] Verify -> DEBU 4fab Verify: sig = 00000000 30 45 02 21 00 af 87 7e 16 d7 46 7c b0 11 8c c4 |0E.!...~..F|....| +00000010 5e 53 94 3f 7a b5 d3 d7 1a 08 35 2b 83 eb eb 4a |^S.?z.....5+...J| +00000020 d9 ae f7 49 08 02 20 1a 10 ed b8 7d b5 f1 52 42 |...I.. ....}..RB| +00000030 35 29 f9 80 91 f2 af 70 70 90 bf 09 12 22 68 b3 |5).....pp...."h.| +00000040 a5 0f 72 9c ff b6 16 |..r....|" +"2019-09-24 00:26:51.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fac Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:51.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fad Exiting" +"2019-09-24 00:26:51.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fae Exiting" +"2019-09-24 00:26:51.854 UTC [gossip.comm] sendToEndpoint -> DEBU 4faf Exiting" +"2019-09-24 00:26:51.856 UTC [gossip.comm] func1 -> DEBU 4fb0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.856 UTC [gossip.gossip] handleMessage -> DEBU 4fb1 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.856 UTC [gossip.gossip] handleMessage -> DEBU 4fb2 Exiting" +"2019-09-24 00:26:51.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fb3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.857 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4fb4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:51.857 UTC [msp.identity] Verify -> DEBU 4fb5 Verify: digest = 00000000 c0 29 0d 3b ac a5 5e 2e 94 d2 4d 78 b4 4a ee c3 |.).;..^...Mx.J..| +00000010 c1 9c 16 15 9e 6f 5f 74 31 32 da 92 98 ac 17 b8 |.....o_t12......|" +"2019-09-24 00:26:51.857 UTC [msp.identity] Verify -> DEBU 4fb6 Verify: sig = 00000000 30 44 02 20 76 ae 47 5d 19 45 82 62 55 6c be a4 |0D. v.G].E.bUl..| +00000010 3a 7e 59 2e 25 d9 2b 8d 8e 73 34 16 00 c4 72 28 |:~Y.%.+..s4...r(| +00000020 66 e5 56 c1 02 20 2b 22 b6 66 48 8e c2 1f 59 b5 |f.V.. +".fH...Y.| +00000030 52 4c 61 3d de 04 f9 4b 78 b0 63 64 de 56 bb a2 |RLa=...Kx.cd.V..| +00000040 c9 2c d7 d0 54 36 |.,..T6|" +"2019-09-24 00:26:51.857 UTC [msp.identity] Verify -> DEBU 4fb7 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:51.858 UTC [msp.identity] Verify -> DEBU 4fb8 Verify: sig = 00000000 30 45 02 21 00 91 7b 8b 1f 0c 08 35 90 cd 82 06 |0E.!..{....5....| +00000010 b8 47 fb ee 0c 48 03 ed 12 9a a3 23 ee 19 fc 1a |.G...H.....#....| +00000020 a2 94 d3 05 1f 02 20 67 f1 91 03 4b c7 ee fb 6a |...... g...K...j| +00000030 58 35 6c 35 8e 89 4b 14 c0 d5 46 18 2f 96 e8 9b |X5l5..K...F./...| +00000040 6b aa fe 88 68 86 5b |k...h.[|" +"2019-09-24 00:26:51.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fb9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:51.862 UTC [gossip.discovery] isSentByMe -> DEBU 4fba Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:51.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fbb Exiting" +"2019-09-24 00:26:51.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fbc Exiting" +"2019-09-24 00:26:51.915 UTC [gossip.gossip] handleMessage -> DEBU 4fbd Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.916 UTC [gossip.pull] HandleMessage -> DEBU 4fbe GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:51.916 UTC [msp] DeserializeIdentity -> DEBU 4fbf Obtaining identity" +"2019-09-24 00:26:51.916 UTC [msp] DeserializeIdentity -> DEBU 4fc0 Obtaining identity" +"2019-09-24 00:26:51.916 UTC [msp] DeserializeIdentity -> DEBU 4fc1 Obtaining identity" +"2019-09-24 00:26:51.917 UTC [msp] DeserializeIdentity -> DEBU 4fc2 Obtaining identity" +"2019-09-24 00:26:51.917 UTC [msp] DeserializeIdentity -> DEBU 4fc3 Obtaining identity" +"2019-09-24 00:26:51.917 UTC [msp] DeserializeIdentity -> DEBU 4fc4 Obtaining identity" +"2019-09-24 00:26:51.918 UTC [gossip.pull] SendDigest -> DEBU 4fc5 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:51.918 UTC [gossip.gossip] handleMessage -> DEBU 4fc6 Exiting" +"2019-09-24 00:26:52.015 UTC [gossip.gossip] handleMessage -> DEBU 4fc7 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.015 UTC [gossip.gossip] handleMessage -> DEBU 4fc8 Exiting" +"2019-09-24 00:26:52.016 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fc9 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.016 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4fca Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:52.016 UTC [msp] DeserializeIdentity -> DEBU 4fcb Obtaining identity" +"2019-09-24 00:26:52.016 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4fcc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:52.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4fcd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4fce Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fcf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fd0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fd1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:52.016 UTC [cauthdsl] func1 -> DEBU 4fd2 0xc0033e90d0 gate 1569284812016435700 evaluation starts" +"2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fd3 0xc0033e90d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fd4 0xc0033e90d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fd5 0xc0033e90d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fd6 0xc0033e90d0 principal evaluation fails" +"2019-09-24 00:26:52.016 UTC [cauthdsl] func1 -> DEBU 4fd7 0xc0033e90d0 gate 1569284812016435700 evaluation fails" +"2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fd8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fd9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.016 UTC [policies] Evaluate -> DEBU 4fda == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:52.016 UTC [cauthdsl] func1 -> DEBU 4fdb 0xc0033e9930 gate 1569284812016725300 evaluation starts" +"2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fdc 0xc0033e9930 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fdd 0xc0033e9930 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.016 UTC [cauthdsl] func2 -> DEBU 4fde 0xc0033e9930 principal matched by identity 0" +"2019-09-24 00:26:52.016 UTC [msp.identity] Verify -> DEBU 4fdf Verify: digest = 00000000 fa 7d 7a 07 82 19 0c 74 71 2c c4 14 13 59 9a c8 |.}z....tq,...Y..| +00000010 cc f5 49 13 dc da c3 20 b5 24 63 c6 91 88 12 9b |..I.... .$c.....|" +"2019-09-24 00:26:52.016 UTC [msp.identity] Verify -> DEBU 4fe0 Verify: sig = 00000000 30 44 02 20 06 dc 1a be 74 8b 1e f2 6c b7 89 9c |0D. ....t...l...| +00000010 1a 64 08 8c 88 66 4c 22 eb 01 91 d1 7c fe 54 6d |.d...fL"....|.Tm| +00000020 24 53 bb 49 02 20 53 96 84 d7 8c 58 36 88 ca 02 |$S.I. S....X6...| +00000030 22 5a 42 fb 41 8d 90 45 bf af c4 d0 15 36 a1 e0 |"ZB.A..E.....6..| +00000040 b5 e9 39 65 77 7c |..9ew||" +"2019-09-24 00:26:52.017 UTC [cauthdsl] func2 -> DEBU 4fe1 0xc0033e9930 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:52.017 UTC [cauthdsl] func1 -> DEBU 4fe2 0xc0033e9930 gate 1569284812016725300 evaluation succeeds" +"2019-09-24 00:26:52.017 UTC [policies] Evaluate -> DEBU 4fe3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.017 UTC [policies] Evaluate -> DEBU 4fe4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.017 UTC [policies] Evaluate -> DEBU 4fe5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:52.017 UTC [policies] Evaluate -> DEBU 4fe6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:52.017 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fe7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 4fe8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:52.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 4fe9 updating membership: timestamp: " +"2019-09-24 00:26:52.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 4fea Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:52.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 4feb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:52.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 4fec Exiting" +"2019-09-24 00:26:52.017 UTC [gossip.discovery] handleAliveMessage -> DEBU 4fed Exiting" +"2019-09-24 00:26:52.017 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4fee Exiting" +"2019-09-24 00:26:52.017 UTC [gossip.discovery] sendMemResponse -> DEBU 4fef Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:52.017 UTC [msp] DeserializeIdentity -> DEBU 4ff0 Obtaining identity" +"2019-09-24 00:26:52.017 UTC [msp] DeserializeIdentity -> DEBU 4ff1 Obtaining identity" +"2019-09-24 00:26:52.018 UTC [msp] DeserializeIdentity -> DEBU 4ff2 Obtaining identity" +"2019-09-24 00:26:52.018 UTC [gossip.comm] Send -> DEBU 4ff3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:52.018 UTC [gossip.discovery] sendMemResponse -> DEBU 4ff4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020H" signature:"0E\002!\000\257\207~\026\327F|\260\021\214\304^S\224?z\265\323\327\032\0105+\203\353\353J\331\256\367I\010\002 \032\020\355\270}\265\361RB5)\371\200\221\362\257pp\220\277\t\022\"h\263\245\017r\234\377\266\026" > alive: alive: alive: " +"2019-09-24 00:26:52.018 UTC [gossip.comm] sendToEndpoint -> DEBU 4ff5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.018 UTC [gossip.comm] sendToEndpoint -> DEBU 4ff6 Exiting" +"2019-09-24 00:26:52.081 UTC [msp] DeserializeIdentity -> DEBU 4ff7 Obtaining identity" +"2019-09-24 00:26:52.081 UTC [msp] DeserializeIdentity -> DEBU 4ff8 Obtaining identity" +"2019-09-24 00:26:52.081 UTC [gossip.comm] Send -> DEBU 4ff9 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4ffa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4ffb Exiting" +"2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4ffc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4ffd Exiting" +"2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4ffe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4fff Exiting" +"2019-09-24 00:26:52.082 UTC [gossip.comm] func1 -> DEBU 5000 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.082 UTC [gossip.gossip] handleMessage -> DEBU 5001 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.082 UTC [msp.identity] Verify -> DEBU 5002 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:52.082 UTC [msp.identity] Verify -> DEBU 5003 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:52.083 UTC [msp.identity] Verify -> DEBU 5004 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:52.083 UTC [msp.identity] Verify -> DEBU 5005 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:52.083 UTC [msp] DeserializeIdentity -> DEBU 5006 Obtaining identity" +"2019-09-24 00:26:52.083 UTC [msp] DeserializeIdentity -> DEBU 5007 Obtaining identity" +"2019-09-24 00:26:52.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5008 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:52.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5009 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 500a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.083 UTC [policies] Evaluate -> DEBU 500b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:52.083 UTC [policies] Evaluate -> DEBU 500c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:52.083 UTC [policies] Evaluate -> DEBU 500d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:52.083 UTC [cauthdsl] func1 -> DEBU 500e 0xc002b216b0 gate 1569284812083899800 evaluation starts" +"2019-09-24 00:26:52.083 UTC [cauthdsl] func2 -> DEBU 500f 0xc002b216b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.083 UTC [cauthdsl] func2 -> DEBU 5010 0xc002b216b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.083 UTC [cauthdsl] func2 -> DEBU 5011 0xc002b216b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:52.084 UTC [cauthdsl] func2 -> DEBU 5012 0xc002b216b0 principal evaluation fails" +"2019-09-24 00:26:52.084 UTC [cauthdsl] func1 -> DEBU 5013 0xc002b216b0 gate 1569284812083899800 evaluation fails" +"2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5014 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5015 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5016 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:52.084 UTC [cauthdsl] func1 -> DEBU 5017 0xc002b21f00 gate 1569284812084155500 evaluation starts" +"2019-09-24 00:26:52.084 UTC [cauthdsl] func2 -> DEBU 5018 0xc002b21f00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.084 UTC [cauthdsl] func2 -> DEBU 5019 0xc002b21f00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.084 UTC [cauthdsl] func2 -> DEBU 501a 0xc002b21f00 principal matched by identity 0" +"2019-09-24 00:26:52.084 UTC [msp.identity] Verify -> DEBU 501b Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:52.084 UTC [msp.identity] Verify -> DEBU 501c Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:52.084 UTC [cauthdsl] func2 -> DEBU 501d 0xc002b21f00 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:52.084 UTC [cauthdsl] func1 -> DEBU 501e 0xc002b21f00 gate 1569284812084155500 evaluation succeeds" +"2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 501f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5020 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5021 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:52.084 UTC [policies] Evaluate -> DEBU 5022 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:52.084 UTC [msp] DeserializeIdentity -> DEBU 5023 Obtaining identity" +"2019-09-24 00:26:52.084 UTC [msp] DeserializeIdentity -> DEBU 5024 Obtaining identity" +"2019-09-24 00:26:52.084 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5025 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:52.085 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5026 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.085 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5027 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 5028 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 5029 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 502a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:52.085 UTC [cauthdsl] func1 -> DEBU 502b 0xc00288f6d0 gate 1569284812085232100 evaluation starts" +"2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 502c 0xc00288f6d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 502d 0xc00288f6d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 502e 0xc00288f6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 502f 0xc00288f6d0 principal evaluation fails" +"2019-09-24 00:26:52.085 UTC [cauthdsl] func1 -> DEBU 5030 0xc00288f6d0 gate 1569284812085232100 evaluation fails" +"2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 5031 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 5032 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.085 UTC [policies] Evaluate -> DEBU 5033 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:52.085 UTC [cauthdsl] func1 -> DEBU 5034 0xc00031e000 gate 1569284812085628900 evaluation starts" +"2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 5035 0xc00031e000 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 5036 0xc00031e000 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.085 UTC [cauthdsl] func2 -> DEBU 5037 0xc00031e000 principal matched by identity 0" +"2019-09-24 00:26:52.085 UTC [msp.identity] Verify -> DEBU 5038 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:52.085 UTC [msp.identity] Verify -> DEBU 5039 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:52.086 UTC [cauthdsl] func2 -> DEBU 503a 0xc00031e000 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:52.086 UTC [cauthdsl] func1 -> DEBU 503b 0xc00031e000 gate 1569284812085628900 evaluation succeeds" +"2019-09-24 00:26:52.086 UTC [policies] Evaluate -> DEBU 503c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.086 UTC [policies] Evaluate -> DEBU 503d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.086 UTC [policies] Evaluate -> DEBU 503e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:52.086 UTC [policies] Evaluate -> DEBU 503f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:52.086 UTC [gossip.gossip] handleMessage -> DEBU 5040 Exiting" +"2019-09-24 00:26:52.086 UTC [gossip.gossip] handleMessage -> DEBU 5041 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.086 UTC [msp] DeserializeIdentity -> DEBU 5042 Obtaining identity" +"2019-09-24 00:26:52.086 UTC [msp] DeserializeIdentity -> DEBU 5043 Obtaining identity" +"2019-09-24 00:26:52.086 UTC [msp] DeserializeIdentity -> DEBU 5044 Obtaining identity" +"2019-09-24 00:26:52.087 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5045 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:52.087 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5046 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.087 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5047 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.087 UTC [policies] Evaluate -> DEBU 5048 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:52.087 UTC [policies] Evaluate -> DEBU 5049 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:52.087 UTC [policies] Evaluate -> DEBU 504a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:52.087 UTC [cauthdsl] func1 -> DEBU 504b 0xc00031fc90 gate 1569284812087689200 evaluation starts" +"2019-09-24 00:26:52.087 UTC [cauthdsl] func2 -> DEBU 504c 0xc00031fc90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.087 UTC [cauthdsl] func2 -> DEBU 504d 0xc00031fc90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.087 UTC [cauthdsl] func2 -> DEBU 504e 0xc00031fc90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:52.088 UTC [cauthdsl] func2 -> DEBU 504f 0xc00031fc90 principal evaluation fails" +"2019-09-24 00:26:52.088 UTC [cauthdsl] func1 -> DEBU 5050 0xc00031fc90 gate 1569284812087689200 evaluation fails" +"2019-09-24 00:26:52.088 UTC [policies] Evaluate -> DEBU 5051 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.088 UTC [policies] Evaluate -> DEBU 5052 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.088 UTC [policies] Evaluate -> DEBU 5053 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:52.088 UTC [cauthdsl] func1 -> DEBU 5054 0xc00029a500 gate 1569284812088371000 evaluation starts" +"2019-09-24 00:26:52.088 UTC [cauthdsl] func2 -> DEBU 5055 0xc00029a500 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.088 UTC [cauthdsl] func2 -> DEBU 5056 0xc00029a500 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.088 UTC [cauthdsl] func2 -> DEBU 5057 0xc00029a500 principal matched by identity 0" +"2019-09-24 00:26:52.088 UTC [msp.identity] Verify -> DEBU 5058 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:52.088 UTC [msp.identity] Verify -> DEBU 5059 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:52.088 UTC [cauthdsl] func2 -> DEBU 505a 0xc00029a500 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:52.088 UTC [cauthdsl] func1 -> DEBU 505b 0xc00029a500 gate 1569284812088371000 evaluation succeeds" +"2019-09-24 00:26:52.089 UTC [policies] Evaluate -> DEBU 505c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.089 UTC [policies] Evaluate -> DEBU 505d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.089 UTC [policies] Evaluate -> DEBU 505e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:52.089 UTC [policies] Evaluate -> DEBU 505f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:52.089 UTC [msp.identity] Verify -> DEBU 5060 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:52.089 UTC [msp.identity] Verify -> DEBU 5061 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:52.089 UTC [msp.identity] Verify -> DEBU 5062 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:52.089 UTC [msp.identity] Verify -> DEBU 5063 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:52.089 UTC [msp] DeserializeIdentity -> DEBU 5064 Obtaining identity" +"2019-09-24 00:26:52.089 UTC [msp] DeserializeIdentity -> DEBU 5065 Obtaining identity" +"2019-09-24 00:26:52.090 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5066 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:52.090 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5067 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.090 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5068 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 5069 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 506a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 506b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:52.090 UTC [cauthdsl] func1 -> DEBU 506c 0xc0001e6d40 gate 1569284812090359400 evaluation starts" +"2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 506d 0xc0001e6d40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 506e 0xc0001e6d40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 506f 0xc0001e6d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 5070 0xc0001e6d40 principal evaluation fails" +"2019-09-24 00:26:52.090 UTC [cauthdsl] func1 -> DEBU 5071 0xc0001e6d40 gate 1569284812090359400 evaluation fails" +"2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 5072 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 5073 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.090 UTC [policies] Evaluate -> DEBU 5074 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:52.090 UTC [cauthdsl] func1 -> DEBU 5075 0xc0001e7650 gate 1569284812090734800 evaluation starts" +"2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 5076 0xc0001e7650 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 5077 0xc0001e7650 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.090 UTC [cauthdsl] func2 -> DEBU 5078 0xc0001e7650 principal matched by identity 0" +"2019-09-24 00:26:52.090 UTC [msp.identity] Verify -> DEBU 5079 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:52.090 UTC [msp.identity] Verify -> DEBU 507a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:52.091 UTC [cauthdsl] func2 -> DEBU 507b 0xc0001e7650 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:52.091 UTC [cauthdsl] func1 -> DEBU 507c 0xc0001e7650 gate 1569284812090734800 evaluation succeeds" +"2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 507d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 507e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 507f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 5080 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:52.091 UTC [gossip.gossip] handleMessage -> DEBU 5081 Exiting" +"2019-09-24 00:26:52.091 UTC [gossip.comm] func1 -> DEBU 5082 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.091 UTC [gossip.gossip] handleMessage -> DEBU 5083 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.091 UTC [msp] DeserializeIdentity -> DEBU 5084 Obtaining identity" +"2019-09-24 00:26:52.091 UTC [msp] DeserializeIdentity -> DEBU 5085 Obtaining identity" +"2019-09-24 00:26:52.091 UTC [msp] DeserializeIdentity -> DEBU 5086 Obtaining identity" +"2019-09-24 00:26:52.091 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5087 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:52.091 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5088 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.091 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5089 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 508a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 508b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:52.091 UTC [policies] Evaluate -> DEBU 508c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func1 -> DEBU 508d 0xc0001f3300 gate 1569284812092007200 evaluation starts" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 508e 0xc0001f3300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 508f 0xc0001f3300 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 5090 0xc0001f3300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 5091 0xc0001f3300 principal evaluation fails" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func1 -> DEBU 5092 0xc0001f3300 gate 1569284812092007200 evaluation fails" +"2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 5093 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 5094 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 5095 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func1 -> DEBU 5096 0xc0001f3b50 gate 1569284812092378800 evaluation starts" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 5097 0xc0001f3b50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 5098 0xc0001f3b50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 5099 0xc0001f3b50 principal matched by identity 0" +"2019-09-24 00:26:52.092 UTC [msp.identity] Verify -> DEBU 509a Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:52.092 UTC [msp.identity] Verify -> DEBU 509b Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func2 -> DEBU 509c 0xc0001f3b50 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:52.092 UTC [cauthdsl] func1 -> DEBU 509d 0xc0001f3b50 gate 1569284812092378800 evaluation succeeds" +"2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 509e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 509f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 50a0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:52.092 UTC [policies] Evaluate -> DEBU 50a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:52.093 UTC [msp.identity] Verify -> DEBU 50a2 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:52.093 UTC [msp.identity] Verify -> DEBU 50a3 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:52.093 UTC [msp] DeserializeIdentity -> DEBU 50a4 Obtaining identity" +"2019-09-24 00:26:52.093 UTC [msp] DeserializeIdentity -> DEBU 50a5 Obtaining identity" +"2019-09-24 00:26:52.093 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 50a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:52.093 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 50a7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.093 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 50a8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.093 UTC [policies] Evaluate -> DEBU 50a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:52.093 UTC [policies] Evaluate -> DEBU 50aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:52.093 UTC [policies] Evaluate -> DEBU 50ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:52.093 UTC [cauthdsl] func1 -> DEBU 50ac 0xc0001c5be0 gate 1569284812093797800 evaluation starts" +"2019-09-24 00:26:52.093 UTC [cauthdsl] func2 -> DEBU 50ad 0xc0001c5be0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.093 UTC [cauthdsl] func2 -> DEBU 50ae 0xc0001c5be0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.093 UTC [cauthdsl] func2 -> DEBU 50af 0xc0001c5be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:52.093 UTC [cauthdsl] func2 -> DEBU 50b0 0xc0001c5be0 principal evaluation fails" +"2019-09-24 00:26:52.093 UTC [cauthdsl] func1 -> DEBU 50b1 0xc0001c5be0 gate 1569284812093797800 evaluation fails" +"2019-09-24 00:26:52.093 UTC [policies] Evaluate -> DEBU 50b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.093 UTC [policies] Evaluate -> DEBU 50b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.094 UTC [policies] Evaluate -> DEBU 50b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:52.094 UTC [cauthdsl] func1 -> DEBU 50b5 0xc0001b0610 gate 1569284812094047000 evaluation starts" +"2019-09-24 00:26:52.094 UTC [cauthdsl] func2 -> DEBU 50b6 0xc0001b0610 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.094 UTC [cauthdsl] func2 -> DEBU 50b7 0xc0001b0610 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.094 UTC [cauthdsl] func2 -> DEBU 50b8 0xc0001b0610 principal matched by identity 0" +"2019-09-24 00:26:52.094 UTC [msp.identity] Verify -> DEBU 50b9 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:52.094 UTC [msp.identity] Verify -> DEBU 50ba Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:52.094 UTC [cauthdsl] func2 -> DEBU 50bb 0xc0001b0610 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:52.094 UTC [cauthdsl] func1 -> DEBU 50bc 0xc0001b0610 gate 1569284812094047000 evaluation succeeds" +"2019-09-24 00:26:52.094 UTC [policies] Evaluate -> DEBU 50bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.094 UTC [policies] Evaluate -> DEBU 50be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.094 UTC [policies] Evaluate -> DEBU 50bf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:52.094 UTC [policies] Evaluate -> DEBU 50c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:52.094 UTC [msp.identity] Verify -> DEBU 50c1 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:52.094 UTC [msp.identity] Verify -> DEBU 50c2 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:52.094 UTC [gossip.gossip] handleMessage -> DEBU 50c3 Exiting" +"2019-09-24 00:26:52.280 UTC [msp] DeserializeIdentity -> DEBU 50c4 Obtaining identity" +"2019-09-24 00:26:52.280 UTC [msp] DeserializeIdentity -> DEBU 50c5 Obtaining identity" +"2019-09-24 00:26:52.280 UTC [gossip.pull] Hello -> DEBU 50c6 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:52.280 UTC [msp] DeserializeIdentity -> DEBU 50c7 Obtaining identity" +"2019-09-24 00:26:52.280 UTC [msp] DeserializeIdentity -> DEBU 50c8 Obtaining identity" +"2019-09-24 00:26:52.280 UTC [gossip.comm] Send -> DEBU 50c9 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:52.280 UTC [gossip.comm] sendToEndpoint -> DEBU 50ca Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.280 UTC [gossip.comm] sendToEndpoint -> DEBU 50cb Exiting" +"2019-09-24 00:26:52.281 UTC [gossip.comm] func1 -> DEBU 50cc Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.281 UTC [gossip.gossip] handleMessage -> DEBU 50cd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.281 UTC [gossip.pull] HandleMessage -> DEBU 50ce GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.281 UTC [gossip.gossip] handleMessage -> DEBU 50cf Exiting" +"2019-09-24 00:26:52.309 UTC [gossip.election] waitForInterrupt -> DEBU 50d0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:52.309 UTC [gossip.election] IsLeader -> DEBU 50d1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:52.310 UTC [msp] GetDefaultSigningIdentity -> DEBU 50d2 Obtaining default signing identity" +"2019-09-24 00:26:52.310 UTC [msp.identity] Sign -> DEBU 50d3 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510181801 " +"2019-09-24 00:26:52.310 UTC [msp.identity] Sign -> DEBU 50d4 Sign: digest: 1615B43C94C0C450E8B0ED3E0241E888DA16D6BEEB1B3B1D6BA600A1A75B1576 " +"2019-09-24 00:26:52.310 UTC [gossip.election] waitForInterrupt -> DEBU 50d5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50d6 Obtaining identity" +"2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50d7 Obtaining identity" +"2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50d8 Obtaining identity" +"2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50d9 Obtaining identity" +"2019-09-24 00:26:52.317 UTC [gossip.comm] Send -> DEBU 50da Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50db Obtaining identity" +"2019-09-24 00:26:52.317 UTC [msp] DeserializeIdentity -> DEBU 50dc Obtaining identity" +"2019-09-24 00:26:52.317 UTC [gossip.comm] sendToEndpoint -> DEBU 50dd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:26:52.317 UTC [gossip.comm] sendToEndpoint -> DEBU 50de Exiting" +"2019-09-24 00:26:52.583 UTC [gossip.comm] func1 -> DEBU 50df Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.583 UTC [gossip.gossip] handleMessage -> DEBU 50e0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.584 UTC [msp] DeserializeIdentity -> DEBU 50e1 Obtaining identity" +"2019-09-24 00:26:52.584 UTC [msp] DeserializeIdentity -> DEBU 50e2 Obtaining identity" +"2019-09-24 00:26:52.584 UTC [gossip.gossip] handleMessage -> DEBU 50e3 Exiting" +"2019-09-24 00:26:52.704 UTC [gossip.comm] func1 -> DEBU 50e4 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.704 UTC [gossip.gossip] handleMessage -> DEBU 50e5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.704 UTC [gossip.gossip] handleMessage -> DEBU 50e6 Exiting" +"2019-09-24 00:26:52.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50e7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.704 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 50e8 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:52.704 UTC [msp.identity] Verify -> DEBU 50e9 Verify: digest = 00000000 6f 27 fb bc 60 7d f4 67 77 ab ba 9a 89 ba 48 99 |o'..`}.gw.....H.| +00000010 32 77 0f af ea 71 5b 2f 0f ba f4 f2 85 1d 16 f7 |2w...q[/........|" +"2019-09-24 00:26:52.704 UTC [msp.identity] Verify -> DEBU 50ea Verify: sig = 00000000 30 44 02 20 4e 3a 95 7f d3 a8 63 3d 35 bc 59 85 |0D. N:....c=5.Y.| +00000010 8e 1a 17 59 c1 7c f9 38 84 95 54 2e ce a3 cf 74 |...Y.|.8..T....t| +00000020 68 31 a6 c1 02 20 5b 20 79 1a ca 5e a1 1a 62 a9 |h1... [ y..^..b.| +00000030 af 68 d6 eb b9 2b a4 a7 1f e3 5d 09 b4 5d 4e 0a |.h...+....]..]N.| +00000040 cb d7 1d ac 47 74 |....Gt|" +"2019-09-24 00:26:52.704 UTC [gossip.discovery] handleAliveMessage -> DEBU 50eb Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.704 UTC [gossip.discovery] learnExistingMembers -> DEBU 50ec Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:52.704 UTC [gossip.discovery] learnExistingMembers -> DEBU 50ed updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:52.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 50ee Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:52.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 50ef Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:52.705 UTC [gossip.discovery] learnExistingMembers -> DEBU 50f0 Exiting" +"2019-09-24 00:26:52.705 UTC [gossip.discovery] handleAliveMessage -> DEBU 50f1 Exiting" +"2019-09-24 00:26:52.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50f2 Exiting" +"2019-09-24 00:26:52.705 UTC [msp] DeserializeIdentity -> DEBU 50f3 Obtaining identity" +"2019-09-24 00:26:52.705 UTC [msp] DeserializeIdentity -> DEBU 50f4 Obtaining identity" +"2019-09-24 00:26:52.705 UTC [msp] DeserializeIdentity -> DEBU 50f5 Obtaining identity" +"2019-09-24 00:26:52.705 UTC [gossip.comm] Send -> DEBU 50f6 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:52.705 UTC [msp] DeserializeIdentity -> DEBU 50f7 Obtaining identity" +"2019-09-24 00:26:52.705 UTC [gossip.comm] Send -> DEBU 50f8 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:52.706 UTC [gossip.comm] sendToEndpoint -> DEBU 50f9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.706 UTC [gossip.comm] sendToEndpoint -> DEBU 50fa Exiting" +"2019-09-24 00:26:52.706 UTC [gossip.comm] sendToEndpoint -> DEBU 50fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.706 UTC [gossip.comm] sendToEndpoint -> DEBU 50fc Exiting" +"2019-09-24 00:26:52.708 UTC [gossip.comm] func1 -> DEBU 50fd Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.708 UTC [gossip.gossip] handleMessage -> DEBU 50fe Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.708 UTC [gossip.gossip] handleMessage -> DEBU 50ff Exiting" +"2019-09-24 00:26:52.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5100 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.708 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5101 Exiting" +"2019-09-24 00:26:52.710 UTC [gossip.gossip] handleMessage -> DEBU 5102 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.710 UTC [gossip.gossip] handleMessage -> DEBU 5103 Exiting" +"2019-09-24 00:26:52.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5104 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5105 Exiting" +"2019-09-24 00:26:52.766 UTC [gossip.comm] func1 -> DEBU 5106 Got message: GossipMessage: tag:EMPTY mem_req:\362\310@6\347U&=\n\006h$\224\206%\223\322-\235\002 kDJ\020\301\3473\372U\223\212\313\272s\027oe\\Gid\311\031\254]N\261\373\016%;\000" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.766 UTC [gossip.gossip] handleMessage -> DEBU 5107 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\362\310@6\347U&=\n\006h$\224\206%\223\322-\235\002 kDJ\020\301\3473\372U\223\212\313\272s\027oe\\Gid\311\031\254]N\261\373\016%;\000" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.766 UTC [gossip.gossip] handleMessage -> DEBU 5108 Exiting" +"2019-09-24 00:26:52.766 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5109 Got message: GossipMessage: tag:EMPTY mem_req:\362\310@6\347U&=\n\006h$\224\206%\223\322-\235\002 kDJ\020\301\3473\372U\223\212\313\272s\027oe\\Gid\311\031\254]N\261\373\016%;\000" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.766 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 510a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:52.766 UTC [msp] DeserializeIdentity -> DEBU 510b Obtaining identity" +"2019-09-24 00:26:52.767 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 510c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:52.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 510d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 510e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:52.767 UTC [policies] Evaluate -> DEBU 510f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:52.767 UTC [policies] Evaluate -> DEBU 5110 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:52.767 UTC [policies] Evaluate -> DEBU 5111 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:52.767 UTC [cauthdsl] func1 -> DEBU 5112 0xc000249f30 gate 1569284812767904800 evaluation starts" +"2019-09-24 00:26:52.768 UTC [cauthdsl] func2 -> DEBU 5113 0xc000249f30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.768 UTC [cauthdsl] func2 -> DEBU 5114 0xc000249f30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.768 UTC [cauthdsl] func2 -> DEBU 5115 0xc000249f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:52.768 UTC [cauthdsl] func2 -> DEBU 5116 0xc000249f30 principal evaluation fails" +"2019-09-24 00:26:52.769 UTC [cauthdsl] func1 -> DEBU 5117 0xc000249f30 gate 1569284812767904800 evaluation fails" +"2019-09-24 00:26:52.769 UTC [policies] Evaluate -> DEBU 5118 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.769 UTC [policies] Evaluate -> DEBU 5119 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:52.770 UTC [policies] Evaluate -> DEBU 511a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:52.770 UTC [cauthdsl] func1 -> DEBU 511b 0xc0002cc400 gate 1569284812770125000 evaluation starts" +"2019-09-24 00:26:52.770 UTC [cauthdsl] func2 -> DEBU 511c 0xc0002cc400 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:52.770 UTC [cauthdsl] func2 -> DEBU 511d 0xc0002cc400 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:52.770 UTC [cauthdsl] func2 -> DEBU 511e 0xc0002cc400 principal matched by identity 0" +"2019-09-24 00:26:52.771 UTC [msp.identity] Verify -> DEBU 511f Verify: digest = 00000000 e5 af 62 a8 39 20 67 f3 ae c0 8e d3 be 28 03 71 |..b.9 g......(.q| +00000010 fa 14 59 00 bc b6 50 47 f4 1e cc b4 08 98 cf 70 |..Y...PG.......p|" +"2019-09-24 00:26:52.771 UTC [msp.identity] Verify -> DEBU 5120 Verify: sig = 00000000 30 44 02 20 3d fd 60 53 6f 4f 94 7e 48 28 07 7b |0D. =.`SoO.~H(.{| +00000010 3e f2 c8 40 36 e7 55 26 3d 0a 06 68 24 94 86 25 |>..@6.U&=..h$..%| +00000020 93 d2 2d 9d 02 20 6b 44 4a 10 c1 e7 33 fa 55 93 |..-.. kDJ...3.U.| +00000030 8a cb ba 73 17 6f 65 5c 47 69 64 c9 19 ac 5d 4e |...s.oe\Gid...]N| +00000040 b1 fb 0e 25 3b 00 |...%;.|" +"2019-09-24 00:26:52.772 UTC [cauthdsl] func2 -> DEBU 5121 0xc0002cc400 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:52.772 UTC [cauthdsl] func1 -> DEBU 5122 0xc0002cc400 gate 1569284812770125000 evaluation succeeds" +"2019-09-24 00:26:52.772 UTC [policies] Evaluate -> DEBU 5123 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.772 UTC [policies] Evaluate -> DEBU 5124 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:52.773 UTC [policies] Evaluate -> DEBU 5125 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:52.773 UTC [policies] Evaluate -> DEBU 5126 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:52.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 5127 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:52.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5128 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 5129 updating membership: timestamp: " +"2019-09-24 00:26:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 512a Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 512b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:52.775 UTC [gossip.discovery] learnExistingMembers -> DEBU 512c Exiting" +"2019-09-24 00:26:52.775 UTC [gossip.discovery] handleAliveMessage -> DEBU 512d Exiting" +"2019-09-24 00:26:52.775 UTC [gossip.discovery] handleMsgFromComm -> DEBU 512e Exiting" +"2019-09-24 00:26:52.776 UTC [gossip.discovery] sendMemResponse -> DEBU 512f Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:52.776 UTC [msp] DeserializeIdentity -> DEBU 5130 Obtaining identity" +"2019-09-24 00:26:52.777 UTC [msp] DeserializeIdentity -> DEBU 5131 Obtaining identity" +"2019-09-24 00:26:52.777 UTC [msp] DeserializeIdentity -> DEBU 5132 Obtaining identity" +"2019-09-24 00:26:52.777 UTC [gossip.comm] Send -> DEBU 5133 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:52.778 UTC [gossip.discovery] sendMemResponse -> DEBU 5134 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020I" signature:"0D\002 N:\225\177\323\250c=5\274Y\205\216\032\027Y\301|\3718\204\225T.\316\243\317th1\246\301\002 [ y\032\312^\241\032b\251\257h\326\353\271+\244\247\037\343]\t\264]N\n\313\327\035\254Gt" > alive:\362\310@6\347U&=\n\006h$\224\206%\223\322-\235\002 kDJ\020\301\3473\372U\223\212\313\272s\027oe\\Gid\311\031\254]N\261\373\016%;\000" > alive: alive: " +"2019-09-24 00:26:52.778 UTC [gossip.comm] sendToEndpoint -> DEBU 5135 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.778 UTC [gossip.comm] sendToEndpoint -> DEBU 5136 Exiting" +"2019-09-24 00:26:52.795 UTC [gossip.comm] func1 -> DEBU 5137 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.795 UTC [gossip.gossip] handleMessage -> DEBU 5138 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.795 UTC [gossip.pull] HandleMessage -> DEBU 5139 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513a Obtaining identity" +"2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513b Obtaining identity" +"2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513c Obtaining identity" +"2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513d Obtaining identity" +"2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513e Obtaining identity" +"2019-09-24 00:26:52.795 UTC [msp] DeserializeIdentity -> DEBU 513f Obtaining identity" +"2019-09-24 00:26:52.795 UTC [gossip.pull] SendDigest -> DEBU 5140 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:52.795 UTC [gossip.gossip] handleMessage -> DEBU 5141 Exiting" +"2019-09-24 00:26:52.835 UTC [gossip.comm] func1 -> DEBU 5142 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.835 UTC [gossip.gossip] handleMessage -> DEBU 5143 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.835 UTC [gossip.pull] HandleMessage -> DEBU 5144 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:52.835 UTC [gossip.pull] SendDigest -> DEBU 5145 Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:52.836 UTC [gossip.gossip] handleMessage -> DEBU 5146 Exiting" +"2019-09-24 00:26:53.072 UTC [gossip.gossip] handleMessage -> DEBU 5147 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:53.073 UTC [msp] DeserializeIdentity -> DEBU 5148 Obtaining identity" +"2019-09-24 00:26:53.073 UTC [msp] DeserializeIdentity -> DEBU 5149 Obtaining identity" +"2019-09-24 00:26:53.073 UTC [msp] DeserializeIdentity -> DEBU 514a Obtaining identity" +"2019-09-24 00:26:53.074 UTC [gossip.gossip] handleMessage -> DEBU 514b Exiting" +"2019-09-24 00:26:53.648 UTC [gossip.comm] func1 -> DEBU 514c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:53.649 UTC [gossip.gossip] handleMessage -> DEBU 514d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:53.649 UTC [gossip.pull] HandleMessage -> DEBU 514e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:53.650 UTC [gossip.pull] SendDigest -> DEBU 514f Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:53.650 UTC [gossip.gossip] handleMessage -> DEBU 5150 Exiting" +"2019-09-24 00:26:53.780 UTC [gossip.comm] func1 -> DEBU 5151 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" secret_envelope:`\007\022\243#\247=K\002 Yh\2267 ^((\371w\226\002\373\201\006\024\336\311uz\242\324h\231\304\303l\351\254\222\275\225" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:53.782 UTC [gossip.gossip] handleMessage -> DEBU 5152 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" secret_envelope:`\007\022\243#\247=K\002 Yh\2267 ^((\371w\226\002\373\201\006\024\336\311uz\242\324h\231\304\303l\351\254\222\275\225" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:53.782 UTC [gossip.gossip] handleMessage -> DEBU 5153 Exiting" +"2019-09-24 00:26:53.783 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5154 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" secret_envelope:`\007\022\243#\247=K\002 Yh\2267 ^((\371w\226\002\373\201\006\024\336\311uz\242\324h\231\304\303l\351\254\222\275\225" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:53.783 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5155 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:53.783 UTC [msp.identity] Verify -> DEBU 5156 Verify: digest = 00000000 9c fb 93 3f 47 ab 77 72 f6 dd 4e 54 8f a8 61 02 |...?G.wr..NT..a.| +00000010 cf c0 ad 10 26 2c 3e 3b d3 fb b9 12 66 d1 92 d3 |....&,>;....f...|" +"2019-09-24 00:26:53.783 UTC [msp.identity] Verify -> DEBU 5157 Verify: sig = 00000000 30 44 02 20 72 63 22 5a bc 4e 15 17 1a 8c cc b7 |0D. rc"Z.N......| +00000010 61 3e 97 04 37 7d 2a 5d 0d a7 7a 3d 9d b6 59 3e |a>..7}*]..z=..Y>| +00000020 4e 59 f0 74 02 20 04 c8 d2 24 1c 99 70 73 bb 9f |NY.t. ...$..ps..| +00000030 0c f8 da fc 68 16 8a 66 1c 2b 23 ca 5e a8 be 2a |....h..f.+#.^..*| +00000040 c5 99 28 25 e1 55 |..(%.U|" +"2019-09-24 00:26:53.783 UTC [msp.identity] Verify -> DEBU 5158 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:53.783 UTC [msp.identity] Verify -> DEBU 5159 Verify: sig = 00000000 30 44 02 20 54 d8 13 50 59 47 68 d8 e3 71 39 9c |0D. T..PYGh..q9.| +00000010 9d d3 8b d4 8e f9 f9 ca 96 4c 70 3e 60 07 12 a3 |.........Lp>`...| +00000020 23 a7 3d 4b 02 20 59 68 96 37 20 5e 28 28 f9 77 |#.=K. Yh.7 ^((.w| +00000030 96 02 fb 81 06 14 de c9 75 7a a2 d4 68 99 c4 c3 |........uz..h...| +00000040 6c e9 ac 92 bd 95 |l.....|" +"2019-09-24 00:26:53.784 UTC [gossip.discovery] handleAliveMessage -> DEBU 515a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 515b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:26:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 515c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 515d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 515e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:53.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 515f Exiting" +"2019-09-24 00:26:53.784 UTC [gossip.discovery] handleAliveMessage -> DEBU 5160 Exiting" +"2019-09-24 00:26:53.785 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5161 Exiting" +"2019-09-24 00:26:53.785 UTC [gossip.discovery] sendMemResponse -> DEBU 5162 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:53.786 UTC [msp] DeserializeIdentity -> DEBU 5163 Obtaining identity" +"2019-09-24 00:26:53.786 UTC [msp] DeserializeIdentity -> DEBU 5164 Obtaining identity" +"2019-09-24 00:26:53.786 UTC [gossip.comm] Send -> DEBU 5165 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:53.787 UTC [gossip.discovery] sendMemResponse -> DEBU 5166 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" secret_envelope:`\007\022\243#\247=K\002 Yh\2267 ^((\371w\226\002\373\201\006\024\336\311uz\242\324h\231\304\303l\351\254\222\275\225" > > alive: " +"2019-09-24 00:26:53.787 UTC [gossip.comm] sendToEndpoint -> DEBU 5167 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:26:53.788 UTC [gossip.comm] sendToEndpoint -> DEBU 5168 Exiting" +"2019-09-24 00:26:54.011 UTC [gossip.comm] func1 -> DEBU 5169 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:54.011 UTC [gossip.gossip] handleMessage -> DEBU 516a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:54.012 UTC [msp] DeserializeIdentity -> DEBU 516b Obtaining identity" +"2019-09-24 00:26:54.013 UTC [msp] DeserializeIdentity -> DEBU 516c Obtaining identity" +"2019-09-24 00:26:54.013 UTC [msp] DeserializeIdentity -> DEBU 516d Obtaining identity" +"2019-09-24 00:26:54.013 UTC [gossip.gossip] handleMessage -> DEBU 516e Exiting" +"2019-09-24 00:26:54.582 UTC [msp] GetDefaultSigningIdentity -> DEBU 516f Obtaining default signing identity" +"2019-09-24 00:26:54.582 UTC [msp.identity] Sign -> DEBU 5170 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151046 " +"2019-09-24 00:26:54.582 UTC [msp.identity] Sign -> DEBU 5171 Sign: digest: 1AAB37099D0A1D0BB17701E34F5A7CCD7A28C2D1BDC9807C665185EF21515C8A " +"2019-09-24 00:26:54.583 UTC [msp] GetDefaultSigningIdentity -> DEBU 5172 Obtaining default signing identity" +"2019-09-24 00:26:54.583 UTC [msp.identity] Sign -> DEBU 5173 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:54.583 UTC [msp.identity] Sign -> DEBU 5174 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:54.583 UTC [gossip.discovery] periodicalSendAlive -> DEBU 5175 Sleeping 5s" +"2019-09-24 00:26:54.592 UTC [msp] DeserializeIdentity -> DEBU 5176 Obtaining identity" +"2019-09-24 00:26:54.593 UTC [msp] DeserializeIdentity -> DEBU 5177 Obtaining identity" +"2019-09-24 00:26:54.595 UTC [msp] DeserializeIdentity -> DEBU 5178 Obtaining identity" +"2019-09-24 00:26:54.596 UTC [gossip.comm] Send -> DEBU 5179 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:54.596 UTC [gossip.comm] Send -> DEBU 517a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:54.597 UTC [msp] DeserializeIdentity -> DEBU 517b Obtaining identity" +"2019-09-24 00:26:54.597 UTC [gossip.comm] Send -> DEBU 517c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:54.598 UTC [gossip.comm] sendToEndpoint -> DEBU 517d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.598 UTC [gossip.comm] sendToEndpoint -> DEBU 517e Exiting" +"2019-09-24 00:26:54.598 UTC [gossip.comm] sendToEndpoint -> DEBU 517f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.599 UTC [gossip.comm] sendToEndpoint -> DEBU 5180 Exiting" +"2019-09-24 00:26:54.599 UTC [gossip.comm] sendToEndpoint -> DEBU 5181 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.599 UTC [gossip.comm] sendToEndpoint -> DEBU 5182 Exiting" +"2019-09-24 00:26:54.941 UTC [gossip.gossip] handleMessage -> DEBU 5183 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.942 UTC [gossip.gossip] handleMessage -> DEBU 5184 Exiting" +"2019-09-24 00:26:54.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5185 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.942 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5186 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:54.943 UTC [msp] DeserializeIdentity -> DEBU 5187 Obtaining identity" +"2019-09-24 00:26:54.944 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5188 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:54.944 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5189 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:54.945 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 518a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:54.946 UTC [policies] Evaluate -> DEBU 518b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:54.946 UTC [gossip.comm] func1 -> DEBU 518c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.948 UTC [gossip.gossip] handleMessage -> DEBU 518d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.948 UTC [gossip.comm] func1 -> DEBU 518e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.946 UTC [policies] Evaluate -> DEBU 518f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:54.949 UTC [policies] Evaluate -> DEBU 5190 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:54.949 UTC [cauthdsl] func1 -> DEBU 5191 0xc000193920 gate 1569284814949918400 evaluation starts" +"2019-09-24 00:26:54.950 UTC [cauthdsl] func2 -> DEBU 5192 0xc000193920 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:54.950 UTC [cauthdsl] func2 -> DEBU 5193 0xc000193920 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:54.950 UTC [cauthdsl] func2 -> DEBU 5194 0xc000193920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:54.950 UTC [cauthdsl] func2 -> DEBU 5195 0xc000193920 principal evaluation fails" +"2019-09-24 00:26:54.951 UTC [cauthdsl] func1 -> DEBU 5196 0xc000193920 gate 1569284814949918400 evaluation fails" +"2019-09-24 00:26:54.951 UTC [policies] Evaluate -> DEBU 5197 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:54.951 UTC [policies] Evaluate -> DEBU 5198 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:54.951 UTC [policies] Evaluate -> DEBU 5199 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:54.952 UTC [cauthdsl] func1 -> DEBU 519a 0xc0003ba180 gate 1569284814952159600 evaluation starts" +"2019-09-24 00:26:54.952 UTC [cauthdsl] func2 -> DEBU 519b 0xc0003ba180 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:54.952 UTC [cauthdsl] func2 -> DEBU 519c 0xc0003ba180 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:54.952 UTC [cauthdsl] func2 -> DEBU 519d 0xc0003ba180 principal matched by identity 0" +"2019-09-24 00:26:54.953 UTC [msp.identity] Verify -> DEBU 519e Verify: digest = 00000000 b0 ea 87 35 e6 c1 63 64 4d 70 40 f9 37 d9 4a 8a |...5..cdMp@.7.J.| +00000010 91 47 df da cf 21 c8 5a 94 93 2b b9 dc d4 c2 02 |.G...!.Z..+.....|" +"2019-09-24 00:26:54.953 UTC [msp.identity] Verify -> DEBU 519f Verify: sig = 00000000 30 44 02 20 1c 61 36 bf bf d6 e7 a9 a0 72 9e bd |0D. .a6......r..| +00000010 d8 a2 d7 59 56 99 66 ff b8 d6 7c f4 23 32 70 ef |...YV.f...|.#2p.| +00000020 ef d2 87 4a 02 20 12 03 92 8f 67 a2 9c d0 d4 32 |...J. ....g....2| +00000030 e8 cf 99 ae 4f 71 4e 4e 3b 0c 80 20 c4 5d 3b 69 |....OqNN;.. .];i| +00000040 f7 31 cd 9f fb a2 |.1....|" +"2019-09-24 00:26:54.953 UTC [cauthdsl] func2 -> DEBU 51a0 0xc0003ba180 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:54.954 UTC [cauthdsl] func1 -> DEBU 51a1 0xc0003ba180 gate 1569284814952159600 evaluation succeeds" +"2019-09-24 00:26:54.954 UTC [policies] Evaluate -> DEBU 51a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:54.954 UTC [policies] Evaluate -> DEBU 51a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:54.954 UTC [policies] Evaluate -> DEBU 51a4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:54.954 UTC [policies] Evaluate -> DEBU 51a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:54.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 51a6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 51a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:54.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 51a8 updating membership: timestamp: " +"2019-09-24 00:26:54.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 51a9 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:54.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 51aa Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:54.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 51ab Exiting" +"2019-09-24 00:26:54.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 51ac Exiting" +"2019-09-24 00:26:54.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51ad Exiting" +"2019-09-24 00:26:54.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51ae Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.956 UTC [gossip.gossip] handleMessage -> DEBU 51af Exiting" +"2019-09-24 00:26:54.957 UTC [gossip.gossip] handleMessage -> DEBU 51b0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51b1 Exiting" +"2019-09-24 00:26:54.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51b2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.957 UTC [gossip.gossip] handleMessage -> DEBU 51b3 Exiting" +"2019-09-24 00:26:54.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51b4 Exiting" +"2019-09-24 00:26:54.958 UTC [msp] DeserializeIdentity -> DEBU 51b5 Obtaining identity" +"2019-09-24 00:26:54.958 UTC [msp] DeserializeIdentity -> DEBU 51b6 Obtaining identity" +"2019-09-24 00:26:54.958 UTC [msp] DeserializeIdentity -> DEBU 51b7 Obtaining identity" +"2019-09-24 00:26:54.958 UTC [msp] DeserializeIdentity -> DEBU 51b8 Obtaining identity" +"2019-09-24 00:26:54.958 UTC [msp] DeserializeIdentity -> DEBU 51b9 Obtaining identity" +"2019-09-24 00:26:54.959 UTC [msp] DeserializeIdentity -> DEBU 51ba Obtaining identity" +"2019-09-24 00:26:54.959 UTC [msp] DeserializeIdentity -> DEBU 51bb Obtaining identity" +"2019-09-24 00:26:54.959 UTC [gossip.comm] Send -> DEBU 51bc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:54.959 UTC [msp] DeserializeIdentity -> DEBU 51bd Obtaining identity" +"2019-09-24 00:26:54.959 UTC [gossip.comm] Send -> DEBU 51be Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:26:54.960 UTC [gossip.comm] sendToEndpoint -> DEBU 51bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.960 UTC [gossip.comm] sendToEndpoint -> DEBU 51c0 Exiting" +"2019-09-24 00:26:54.960 UTC [gossip.comm] sendToEndpoint -> DEBU 51c1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:54.960 UTC [gossip.comm] sendToEndpoint -> DEBU 51c2 Exiting" +"2019-09-24 00:26:55.663 UTC [gossip.comm] func1 -> DEBU 51c3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.663 UTC [gossip.gossip] handleMessage -> DEBU 51c4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.663 UTC [gossip.gossip] handleMessage -> DEBU 51c5 Exiting" +"2019-09-24 00:26:55.663 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51c6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.663 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 51c7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:55.663 UTC [msp] DeserializeIdentity -> DEBU 51c8 Obtaining identity" +"2019-09-24 00:26:55.664 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 51c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:55.664 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 51ca Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:55.664 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 51cb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:55.664 UTC [cauthdsl] func1 -> DEBU 51cf 0xc000487fb0 gate 1569284815664631900 evaluation starts" +"2019-09-24 00:26:55.664 UTC [cauthdsl] func2 -> DEBU 51d0 0xc000487fb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:55.664 UTC [cauthdsl] func2 -> DEBU 51d1 0xc000487fb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:55.664 UTC [cauthdsl] func2 -> DEBU 51d2 0xc000487fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:55.664 UTC [cauthdsl] func2 -> DEBU 51d3 0xc000487fb0 principal evaluation fails" +"2019-09-24 00:26:55.664 UTC [cauthdsl] func1 -> DEBU 51d4 0xc000487fb0 gate 1569284815664631900 evaluation fails" +"2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:55.664 UTC [policies] Evaluate -> DEBU 51d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:55.665 UTC [cauthdsl] func1 -> DEBU 51d8 0xc0003e2870 gate 1569284815665008600 evaluation starts" +"2019-09-24 00:26:55.665 UTC [cauthdsl] func2 -> DEBU 51d9 0xc0003e2870 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:55.665 UTC [cauthdsl] func2 -> DEBU 51da 0xc0003e2870 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:55.665 UTC [cauthdsl] func2 -> DEBU 51db 0xc0003e2870 principal matched by identity 0" +"2019-09-24 00:26:55.665 UTC [msp.identity] Verify -> DEBU 51dc Verify: digest = 00000000 c6 2a 3c e2 7d f3 ec ab ce 49 78 01 30 e0 ec 51 |.*<.}....Ix.0..Q| +00000010 af 16 87 1c 0c e1 e2 67 55 68 57 fe 90 c7 4b 19 |.......gUhW...K.|" +"2019-09-24 00:26:55.665 UTC [msp.identity] Verify -> DEBU 51dd Verify: sig = 00000000 30 45 02 21 00 f0 58 08 79 c2 ac b7 a3 d6 61 33 |0E.!..X.y.....a3| +00000010 09 33 49 55 b8 7f 2c cb 8a c1 a9 13 d9 8b 76 da |.3IU..,.......v.| +00000020 be 86 af 70 bf 02 20 58 29 a2 3c e8 2d 9f 82 9e |...p.. X).<.-...| +00000030 6e 46 9f a5 ca 83 e6 2a e3 44 94 93 da 44 83 35 |nF.....*.D...D.5| +00000040 9e 22 35 cc 65 48 ea |."5.eH.|" +"2019-09-24 00:26:55.665 UTC [cauthdsl] func2 -> DEBU 51de 0xc0003e2870 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:55.665 UTC [cauthdsl] func1 -> DEBU 51df 0xc0003e2870 gate 1569284815665008600 evaluation succeeds" +"2019-09-24 00:26:55.665 UTC [policies] Evaluate -> DEBU 51e0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:55.665 UTC [policies] Evaluate -> DEBU 51e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:55.665 UTC [policies] Evaluate -> DEBU 51e2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:55.665 UTC [policies] Evaluate -> DEBU 51e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:55.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 51e4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 51e5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:55.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 51e6 updating membership: timestamp: " +"2019-09-24 00:26:55.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 51e7 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:55.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 51e8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:55.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 51e9 Exiting" +"2019-09-24 00:26:55.665 UTC [gossip.discovery] handleAliveMessage -> DEBU 51ea Exiting" +"2019-09-24 00:26:55.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51eb Exiting" +"2019-09-24 00:26:55.672 UTC [msp] DeserializeIdentity -> DEBU 51ec Obtaining identity" +"2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51ed Obtaining identity" +"2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51ee Obtaining identity" +"2019-09-24 00:26:55.672 UTC [gossip.gossip] handleMessage -> DEBU 51ef Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51f0 Obtaining identity" +"2019-09-24 00:26:55.673 UTC [gossip.gossip] handleMessage -> DEBU 51f1 Exiting" +"2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51f2 Obtaining identity" +"2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51f3 Obtaining identity" +"2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51f4 Obtaining identity" +"2019-09-24 00:26:55.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51f5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.673 UTC [gossip.comm] Send -> DEBU 51f6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:55.673 UTC [msp] DeserializeIdentity -> DEBU 51f8 Obtaining identity" +"2019-09-24 00:26:55.673 UTC [gossip.comm] Send -> DEBU 51f9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:55.673 UTC [gossip.comm] sendToEndpoint -> DEBU 51fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.673 UTC [gossip.comm] sendToEndpoint -> DEBU 51fb Exiting" +"2019-09-24 00:26:55.674 UTC [gossip.comm] sendToEndpoint -> DEBU 51fc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.674 UTC [gossip.comm] sendToEndpoint -> DEBU 51fd Exiting" +"2019-09-24 00:26:55.674 UTC [gossip.comm] func1 -> DEBU 51fe Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.674 UTC [gossip.gossip] handleMessage -> DEBU 51ff Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51f7 Exiting" +"2019-09-24 00:26:55.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5200 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5201 Exiting" +"2019-09-24 00:26:55.676 UTC [gossip.gossip] handleMessage -> DEBU 5202 Exiting" +"2019-09-24 00:26:55.702 UTC [gossip.pull] Hello -> DEBU 5203 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:55.703 UTC [gossip.comm] Send -> DEBU 5204 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:55.703 UTC [gossip.pull] Hello -> DEBU 5205 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:55.703 UTC [gossip.comm] sendToEndpoint -> DEBU 5206 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.703 UTC [gossip.comm] sendToEndpoint -> DEBU 5207 Exiting" +"2019-09-24 00:26:55.703 UTC [gossip.comm] Send -> DEBU 5208 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:55.704 UTC [gossip.comm] sendToEndpoint -> DEBU 5209 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.704 UTC [gossip.comm] sendToEndpoint -> DEBU 520a Exiting" +"2019-09-24 00:26:55.703 UTC [gossip.pull] Hello -> DEBU 520b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:55.706 UTC [gossip.comm] Send -> DEBU 520c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:55.707 UTC [gossip.comm] sendToEndpoint -> DEBU 520d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.707 UTC [gossip.comm] sendToEndpoint -> DEBU 520e Exiting" +"2019-09-24 00:26:55.707 UTC [gossip.gossip] handleMessage -> DEBU 520f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.708 UTC [gossip.comm] func1 -> DEBU 5211 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.709 UTC [gossip.pull] HandleMessage -> DEBU 5212 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.710 UTC [gossip.gossip] handleMessage -> DEBU 5213 Exiting" +"2019-09-24 00:26:55.711 UTC [gossip.gossip] handleMessage -> DEBU 5214 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.708 UTC [gossip.comm] func1 -> DEBU 5210 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.711 UTC [gossip.pull] HandleMessage -> DEBU 5215 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.712 UTC [gossip.gossip] handleMessage -> DEBU 5216 Exiting" +"2019-09-24 00:26:55.712 UTC [gossip.gossip] handleMessage -> DEBU 5217 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.713 UTC [gossip.pull] HandleMessage -> DEBU 5218 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.713 UTC [gossip.gossip] handleMessage -> DEBU 5219 Exiting" +"2019-09-24 00:26:55.843 UTC [msp] GetDefaultSigningIdentity -> DEBU 521a Obtaining default signing identity" +"2019-09-24 00:26:55.844 UTC [msp.identity] Sign -> DEBU 521b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151047 " +"2019-09-24 00:26:55.844 UTC [msp.identity] Sign -> DEBU 521c Sign: digest: 480219121EAB97BC6A2364CCBE3A02E1337B2D54658674B0B96BAEE26C51C08F " +"2019-09-24 00:26:55.844 UTC [msp] GetDefaultSigningIdentity -> DEBU 521d Obtaining default signing identity" +"2019-09-24 00:26:55.844 UTC [msp.identity] Sign -> DEBU 521e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:55.844 UTC [msp.identity] Sign -> DEBU 521f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:55.844 UTC [gossip.comm] Send -> DEBU 5220 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:55.844 UTC [msp] DeserializeIdentity -> DEBU 5221 Obtaining identity" +"2019-09-24 00:26:55.844 UTC [gossip.comm] Send -> DEBU 5222 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:55.844 UTC [msp] DeserializeIdentity -> DEBU 5223 Obtaining identity" +"2019-09-24 00:26:55.844 UTC [gossip.comm] Send -> DEBU 5224 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 5225 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 5226 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 5227 Exiting" +"2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 5228 Exiting" +"2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 5229 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.844 UTC [gossip.comm] sendToEndpoint -> DEBU 522a Exiting" +"2019-09-24 00:26:55.846 UTC [gossip.comm] func1 -> DEBU 522b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.846 UTC [gossip.comm] func1 -> DEBU 522c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.846 UTC [gossip.gossip] handleMessage -> DEBU 522d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.846 UTC [gossip.gossip] handleMessage -> DEBU 522e Exiting" +"2019-09-24 00:26:55.846 UTC [gossip.gossip] handleMessage -> DEBU 522f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5230 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5231 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:55.846 UTC [msp.identity] Verify -> DEBU 5232 Verify: digest = 00000000 48 02 19 12 1e ab 97 bc 6a 23 64 cc be 3a 02 e1 |H.......j#d..:..| +00000010 33 7b 2d 54 65 86 74 b0 b9 6b ae e2 6c 51 c0 8f |3{-Te.t..k..lQ..|" +"2019-09-24 00:26:55.846 UTC [msp.identity] Verify -> DEBU 5233 Verify: sig = 00000000 30 45 02 21 00 f5 8c bf 09 6e b7 dd 5f ac de f6 |0E.!.....n.._...| +00000010 79 7e 1b 49 35 3a 5f 02 ab ad fe 68 4f c5 f7 90 |y~.I5:_....hO...| +00000020 70 22 42 e0 82 02 20 40 33 12 f7 24 3d 9a 9a 18 |p"B... @3..$=...| +00000030 14 70 d3 f7 78 6c a5 4a 37 74 2c 59 99 98 de 44 |.p..xl.J7t,Y...D| +00000040 02 28 00 04 b6 7b 1d |.(...{.|" +"2019-09-24 00:26:55.846 UTC [msp.identity] Verify -> DEBU 5234 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:55.846 UTC [msp.identity] Verify -> DEBU 5235 Verify: sig = 00000000 30 45 02 21 00 a4 dc 2f 6f 6d a2 df 0a f9 1c a1 |0E.!.../om......| +00000010 6d e5 80 e4 5f 74 99 50 2c 7a 32 79 6e ae 7b 46 |m..._t.P,z2yn.{F| +00000020 fa 24 a3 bb 57 02 20 4b 7a 9e 75 a8 15 99 ff a5 |.$..W. Kz.u.....| +00000030 00 64 da e0 18 6b a4 b0 46 a9 16 7c c0 68 d6 3d |.d...k..F..|.h.=| +00000040 a3 71 fe d4 22 e0 bd |.q.."..|" +"2019-09-24 00:26:55.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 5236 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:55.847 UTC [gossip.discovery] isSentByMe -> DEBU 5237 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:55.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 5238 Exiting" +"2019-09-24 00:26:55.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5239 Exiting" +"2019-09-24 00:26:55.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 523a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 523b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:55.847 UTC [msp.identity] Verify -> DEBU 523c Verify: digest = 00000000 48 02 19 12 1e ab 97 bc 6a 23 64 cc be 3a 02 e1 |H.......j#d..:..| +00000010 33 7b 2d 54 65 86 74 b0 b9 6b ae e2 6c 51 c0 8f |3{-Te.t..k..lQ..|" +"2019-09-24 00:26:55.847 UTC [msp.identity] Verify -> DEBU 523d Verify: sig = 00000000 30 45 02 21 00 f5 8c bf 09 6e b7 dd 5f ac de f6 |0E.!.....n.._...| +00000010 79 7e 1b 49 35 3a 5f 02 ab ad fe 68 4f c5 f7 90 |y~.I5:_....hO...| +00000020 70 22 42 e0 82 02 20 40 33 12 f7 24 3d 9a 9a 18 |p"B... @3..$=...| +00000030 14 70 d3 f7 78 6c a5 4a 37 74 2c 59 99 98 de 44 |.p..xl.J7t,Y...D| +00000040 02 28 00 04 b6 7b 1d |.(...{.|" +"2019-09-24 00:26:55.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 523e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.847 UTC [gossip.discovery] isSentByMe -> DEBU 523f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.847 UTC [gossip.discovery] handleAliveMessage -> DEBU 5240 Exiting" +"2019-09-24 00:26:55.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5241 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:55.851 UTC [msp.identity] Verify -> DEBU 5242 Verify: digest = 00000000 9c fb 93 3f 47 ab 77 72 f6 dd 4e 54 8f a8 61 02 |...?G.wr..NT..a.| +00000010 cf c0 ad 10 26 2c 3e 3b d3 fb b9 12 66 d1 92 d3 |....&,>;....f...|" +"2019-09-24 00:26:55.851 UTC [msp.identity] Verify -> DEBU 5243 Verify: sig = 00000000 30 44 02 20 72 63 22 5a bc 4e 15 17 1a 8c cc b7 |0D. rc"Z.N......| +00000010 61 3e 97 04 37 7d 2a 5d 0d a7 7a 3d 9d b6 59 3e |a>..7}*]..z=..Y>| +00000020 4e 59 f0 74 02 20 04 c8 d2 24 1c 99 70 73 bb 9f |NY.t. ...$..ps..| +00000030 0c f8 da fc 68 16 8a 66 1c 2b 23 ca 5e a8 be 2a |....h..f.+#.^..*| +00000040 c5 99 28 25 e1 55 |..(%.U|" +"2019-09-24 00:26:55.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 5244 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:55.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 5245 Exiting" +"2019-09-24 00:26:55.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5246 Exiting" +"2019-09-24 00:26:55.852 UTC [gossip.gossip] handleMessage -> DEBU 5247 Exiting" +"2019-09-24 00:26:55.853 UTC [gossip.gossip] handleMessage -> DEBU 5248 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.853 UTC [gossip.gossip] handleMessage -> DEBU 5249 Exiting" +"2019-09-24 00:26:55.853 UTC [gossip.discovery] handleMsgFromComm -> DEBU 524a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.853 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 524b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:55.853 UTC [msp.identity] Verify -> DEBU 524c Verify: digest = 00000000 48 02 19 12 1e ab 97 bc 6a 23 64 cc be 3a 02 e1 |H.......j#d..:..| +00000010 33 7b 2d 54 65 86 74 b0 b9 6b ae e2 6c 51 c0 8f |3{-Te.t..k..lQ..|" +"2019-09-24 00:26:55.853 UTC [msp.identity] Verify -> DEBU 524d Verify: sig = 00000000 30 45 02 21 00 f5 8c bf 09 6e b7 dd 5f ac de f6 |0E.!.....n.._...| +00000010 79 7e 1b 49 35 3a 5f 02 ab ad fe 68 4f c5 f7 90 |y~.I5:_....hO...| +00000020 70 22 42 e0 82 02 20 40 33 12 f7 24 3d 9a 9a 18 |p"B... @3..$=...| +00000030 14 70 d3 f7 78 6c a5 4a 37 74 2c 59 99 98 de 44 |.p..xl.J7t,Y...D| +00000040 02 28 00 04 b6 7b 1d |.(...{.|" +"2019-09-24 00:26:55.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 524e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.854 UTC [gossip.discovery] isSentByMe -> DEBU 524f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:55.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 5250 Exiting" +"2019-09-24 00:26:55.854 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5251 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:55.854 UTC [msp.identity] Verify -> DEBU 5252 Verify: digest = 00000000 9c fb 93 3f 47 ab 77 72 f6 dd 4e 54 8f a8 61 02 |...?G.wr..NT..a.| +00000010 cf c0 ad 10 26 2c 3e 3b d3 fb b9 12 66 d1 92 d3 |....&,>;....f...|" +"2019-09-24 00:26:55.854 UTC [msp.identity] Verify -> DEBU 5253 Verify: sig = 00000000 30 44 02 20 72 63 22 5a bc 4e 15 17 1a 8c cc b7 |0D. rc"Z.N......| +00000010 61 3e 97 04 37 7d 2a 5d 0d a7 7a 3d 9d b6 59 3e |a>..7}*]..z=..Y>| +00000020 4e 59 f0 74 02 20 04 c8 d2 24 1c 99 70 73 bb 9f |NY.t. ...$..ps..| +00000030 0c f8 da fc 68 16 8a 66 1c 2b 23 ca 5e a8 be 2a |....h..f.+#.^..*| +00000040 c5 99 28 25 e1 55 |..(%.U|" +"2019-09-24 00:26:55.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 5254 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:55.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 5255 Exiting" +"2019-09-24 00:26:55.854 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5256 Exiting" +"2019-09-24 00:26:55.910 UTC [gossip.gossip] handleMessage -> DEBU 5257 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.910 UTC [gossip.pull] HandleMessage -> DEBU 5258 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 5259 Obtaining identity" +"2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 525a Obtaining identity" +"2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 525b Obtaining identity" +"2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 525c Obtaining identity" +"2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 525d Obtaining identity" +"2019-09-24 00:26:55.910 UTC [msp] DeserializeIdentity -> DEBU 525e Obtaining identity" +"2019-09-24 00:26:55.910 UTC [gossip.pull] SendDigest -> DEBU 525f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:55.910 UTC [gossip.gossip] handleMessage -> DEBU 5260 Exiting" +"2019-09-24 00:26:56.018 UTC [gossip.gossip] handleMessage -> DEBU 5261 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.019 UTC [gossip.gossip] handleMessage -> DEBU 5262 Exiting" +"2019-09-24 00:26:56.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5263 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.019 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5264 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:56.019 UTC [msp] DeserializeIdentity -> DEBU 5265 Obtaining identity" +"2019-09-24 00:26:56.020 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5266 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:56.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5267 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5268 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.020 UTC [policies] Evaluate -> DEBU 5269 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:56.021 UTC [policies] Evaluate -> DEBU 526a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:56.021 UTC [policies] Evaluate -> DEBU 526b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:56.022 UTC [cauthdsl] func1 -> DEBU 526c 0xc0025b0bf0 gate 1569284816022137600 evaluation starts" +"2019-09-24 00:26:56.022 UTC [cauthdsl] func2 -> DEBU 526d 0xc0025b0bf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.023 UTC [cauthdsl] func2 -> DEBU 526e 0xc0025b0bf0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.023 UTC [cauthdsl] func2 -> DEBU 526f 0xc0025b0bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:56.023 UTC [cauthdsl] func2 -> DEBU 5270 0xc0025b0bf0 principal evaluation fails" +"2019-09-24 00:26:56.024 UTC [cauthdsl] func1 -> DEBU 5271 0xc0025b0bf0 gate 1569284816022137600 evaluation fails" +"2019-09-24 00:26:56.024 UTC [policies] Evaluate -> DEBU 5272 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.025 UTC [policies] Evaluate -> DEBU 5273 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.025 UTC [policies] Evaluate -> DEBU 5274 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:56.025 UTC [cauthdsl] func1 -> DEBU 5275 0xc0025b1430 gate 1569284816025965200 evaluation starts" +"2019-09-24 00:26:56.026 UTC [cauthdsl] func2 -> DEBU 5276 0xc0025b1430 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.026 UTC [cauthdsl] func2 -> DEBU 5277 0xc0025b1430 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.026 UTC [cauthdsl] func2 -> DEBU 5278 0xc0025b1430 principal matched by identity 0" +"2019-09-24 00:26:56.026 UTC [msp.identity] Verify -> DEBU 5279 Verify: digest = 00000000 72 e1 88 9c 25 89 8b 20 bf e7 d1 f5 e1 33 cc c6 |r...%.. .....3..| +00000010 db 65 54 00 27 22 5e 48 5b 06 9e 06 a7 50 55 b3 |.eT.'"^H[....PU.|" +"2019-09-24 00:26:56.027 UTC [msp.identity] Verify -> DEBU 527a Verify: sig = 00000000 30 44 02 20 58 e0 29 7b f2 d5 15 99 da 3b 91 bb |0D. X.){.....;..| +00000010 e8 3d 99 b1 78 a5 f4 0c 72 62 97 25 48 d0 a2 5a |.=..x...rb.%H..Z| +00000020 75 fc 06 aa 02 20 08 99 a5 8d 7e 33 e1 f7 b2 4d |u.... ....~3...M| +00000030 6a 25 ac 11 8f 99 fe ad 9a 4a 91 28 fe d8 cb 84 |j%.......J.(....| +00000040 47 b7 e5 81 fa 62 |G....b|" +"2019-09-24 00:26:56.029 UTC [cauthdsl] func2 -> DEBU 527b 0xc0025b1430 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:56.030 UTC [cauthdsl] func1 -> DEBU 527c 0xc0025b1430 gate 1569284816025965200 evaluation succeeds" +"2019-09-24 00:26:56.030 UTC [policies] Evaluate -> DEBU 527d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.032 UTC [policies] Evaluate -> DEBU 527e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.046 UTC [policies] Evaluate -> DEBU 527f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:56.047 UTC [policies] Evaluate -> DEBU 5280 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:56.047 UTC [gossip.discovery] handleAliveMessage -> DEBU 5281 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:56.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 5282 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:26:56.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 5283 updating membership: timestamp: " +"2019-09-24 00:26:56.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 5284 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:56.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 5285 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:56.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 5286 Exiting" +"2019-09-24 00:26:56.050 UTC [gossip.discovery] handleAliveMessage -> DEBU 5287 Exiting" +"2019-09-24 00:26:56.050 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5288 Exiting" +"2019-09-24 00:26:56.050 UTC [gossip.discovery] sendMemResponse -> DEBU 5289 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:26:56.051 UTC [msp] DeserializeIdentity -> DEBU 528a Obtaining identity" +"2019-09-24 00:26:56.051 UTC [msp] DeserializeIdentity -> DEBU 528b Obtaining identity" +"2019-09-24 00:26:56.051 UTC [msp] DeserializeIdentity -> DEBU 528c Obtaining identity" +"2019-09-24 00:26:56.051 UTC [gossip.comm] Send -> DEBU 528d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:56.051 UTC [gossip.discovery] sendMemResponse -> DEBU 528e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" > alive: alive: alive: " +"2019-09-24 00:26:56.051 UTC [gossip.comm] sendToEndpoint -> DEBU 528f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.051 UTC [gossip.comm] sendToEndpoint -> DEBU 5290 Exiting" +"2019-09-24 00:26:56.082 UTC [msp] DeserializeIdentity -> DEBU 5291 Obtaining identity" +"2019-09-24 00:26:56.082 UTC [msp] DeserializeIdentity -> DEBU 5292 Obtaining identity" +"2019-09-24 00:26:56.082 UTC [gossip.comm] Send -> DEBU 5293 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:26:56.082 UTC [gossip.comm] sendToEndpoint -> DEBU 5294 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.082 UTC [gossip.comm] sendToEndpoint -> DEBU 5295 Exiting" +"2019-09-24 00:26:56.083 UTC [gossip.comm] sendToEndpoint -> DEBU 5296 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.083 UTC [gossip.comm] sendToEndpoint -> DEBU 5298 Exiting" +"2019-09-24 00:26:56.083 UTC [gossip.comm] sendToEndpoint -> DEBU 5297 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.085 UTC [gossip.comm] func1 -> DEBU 5299 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.086 UTC [gossip.gossip] handleMessage -> DEBU 529b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.086 UTC [msp] DeserializeIdentity -> DEBU 529c Obtaining identity" +"2019-09-24 00:26:56.086 UTC [msp] DeserializeIdentity -> DEBU 529d Obtaining identity" +"2019-09-24 00:26:56.086 UTC [msp] DeserializeIdentity -> DEBU 529e Obtaining identity" +"2019-09-24 00:26:56.086 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 529f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:56.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52a0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52a1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.086 UTC [policies] Evaluate -> DEBU 52a2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:56.086 UTC [policies] Evaluate -> DEBU 52a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:56.086 UTC [policies] Evaluate -> DEBU 52a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func1 -> DEBU 52a5 0xc00261ceb0 gate 1569284816087026900 evaluation starts" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52a6 0xc00261ceb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52a7 0xc00261ceb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52a8 0xc00261ceb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52a9 0xc00261ceb0 principal evaluation fails" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func1 -> DEBU 52aa 0xc00261ceb0 gate 1569284816087026900 evaluation fails" +"2019-09-24 00:26:56.087 UTC [policies] Evaluate -> DEBU 52ab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.087 UTC [policies] Evaluate -> DEBU 52ac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.087 UTC [policies] Evaluate -> DEBU 52ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func1 -> DEBU 52ae 0xc00261d830 gate 1569284816087536000 evaluation starts" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52af 0xc00261d830 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52b0 0xc00261d830 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52b1 0xc00261d830 principal matched by identity 0" +"2019-09-24 00:26:56.087 UTC [msp.identity] Verify -> DEBU 52b2 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:56.087 UTC [msp.identity] Verify -> DEBU 52b3 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func2 -> DEBU 52b4 0xc00261d830 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:56.087 UTC [cauthdsl] func1 -> DEBU 52b5 0xc00261d830 gate 1569284816087536000 evaluation succeeds" +"2019-09-24 00:26:56.087 UTC [policies] Evaluate -> DEBU 52b6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.088 UTC [policies] Evaluate -> DEBU 52b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.088 UTC [policies] Evaluate -> DEBU 52b8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:56.088 UTC [policies] Evaluate -> DEBU 52b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:56.088 UTC [msp.identity] Verify -> DEBU 52ba Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:56.088 UTC [msp.identity] Verify -> DEBU 52bb Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:56.088 UTC [msp] DeserializeIdentity -> DEBU 52bc Obtaining identity" +"2019-09-24 00:26:56.088 UTC [msp] DeserializeIdentity -> DEBU 52bd Obtaining identity" +"2019-09-24 00:26:56.088 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 52be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:56.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52bf Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52c0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.088 UTC [policies] Evaluate -> DEBU 52c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:56.088 UTC [policies] Evaluate -> DEBU 52c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:56.089 UTC [policies] Evaluate -> DEBU 52c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:56.089 UTC [cauthdsl] func1 -> DEBU 52c4 0xc002635930 gate 1569284816089064400 evaluation starts" +"2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52c5 0xc002635930 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52c6 0xc002635930 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52c7 0xc002635930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52c8 0xc002635930 principal evaluation fails" +"2019-09-24 00:26:56.089 UTC [cauthdsl] func1 -> DEBU 52c9 0xc002635930 gate 1569284816089064400 evaluation fails" +"2019-09-24 00:26:56.089 UTC [policies] Evaluate -> DEBU 52ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.089 UTC [policies] Evaluate -> DEBU 52cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.089 UTC [policies] Evaluate -> DEBU 52cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:56.089 UTC [cauthdsl] func1 -> DEBU 52cd 0xc002662170 gate 1569284816089449800 evaluation starts" +"2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52ce 0xc002662170 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52cf 0xc002662170 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.089 UTC [cauthdsl] func2 -> DEBU 52d0 0xc002662170 principal matched by identity 0" +"2019-09-24 00:26:56.089 UTC [msp.identity] Verify -> DEBU 52d1 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:56.089 UTC [msp.identity] Verify -> DEBU 52d2 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:56.090 UTC [cauthdsl] func2 -> DEBU 52d3 0xc002662170 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:56.090 UTC [cauthdsl] func1 -> DEBU 52d4 0xc002662170 gate 1569284816089449800 evaluation succeeds" +"2019-09-24 00:26:56.090 UTC [policies] Evaluate -> DEBU 52d5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.091 UTC [policies] Evaluate -> DEBU 52d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.091 UTC [policies] Evaluate -> DEBU 52d7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:56.091 UTC [policies] Evaluate -> DEBU 52d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:56.091 UTC [msp.identity] Verify -> DEBU 52d9 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:56.091 UTC [msp.identity] Verify -> DEBU 52da Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:56.091 UTC [gossip.gossip] handleMessage -> DEBU 52db Exiting" +"2019-09-24 00:26:56.086 UTC [gossip.comm] sendToEndpoint -> DEBU 529a Exiting" +"2019-09-24 00:26:56.092 UTC [gossip.comm] func1 -> DEBU 52dc Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.092 UTC [gossip.gossip] handleMessage -> DEBU 52dd Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.097 UTC [msp.identity] Verify -> DEBU 52de Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:56.097 UTC [msp.identity] Verify -> DEBU 52df Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:56.097 UTC [msp.identity] Verify -> DEBU 52e0 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:56.097 UTC [msp.identity] Verify -> DEBU 52e1 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:56.098 UTC [msp] DeserializeIdentity -> DEBU 52e2 Obtaining identity" +"2019-09-24 00:26:56.098 UTC [msp] DeserializeIdentity -> DEBU 52e3 Obtaining identity" +"2019-09-24 00:26:56.098 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 52e4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:56.098 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52e5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.098 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 52e6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52e9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:56.098 UTC [cauthdsl] func1 -> DEBU 52ea 0xc0026d8e50 gate 1569284816098466800 evaluation starts" +"2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52eb 0xc0026d8e50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52ec 0xc0026d8e50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52ed 0xc0026d8e50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52ee 0xc0026d8e50 principal evaluation fails" +"2019-09-24 00:26:56.098 UTC [cauthdsl] func1 -> DEBU 52ef 0xc0026d8e50 gate 1569284816098466800 evaluation fails" +"2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52f0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.098 UTC [policies] Evaluate -> DEBU 52f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:56.098 UTC [cauthdsl] func1 -> DEBU 52f3 0xc0026d96e0 gate 1569284816098751200 evaluation starts" +"2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52f4 0xc0026d96e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52f5 0xc0026d96e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.098 UTC [cauthdsl] func2 -> DEBU 52f6 0xc0026d96e0 principal matched by identity 0" +"2019-09-24 00:26:56.098 UTC [msp.identity] Verify -> DEBU 52f7 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:56.098 UTC [msp.identity] Verify -> DEBU 52f8 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 52f9 0xc0026d96e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:56.099 UTC [cauthdsl] func1 -> DEBU 52fa 0xc0026d96e0 gate 1569284816098751200 evaluation succeeds" +"2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 52fb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 52fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 52fd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 52fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:56.099 UTC [msp] DeserializeIdentity -> DEBU 52ff Obtaining identity" +"2019-09-24 00:26:56.099 UTC [msp] DeserializeIdentity -> DEBU 5300 Obtaining identity" +"2019-09-24 00:26:56.099 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5301 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:56.099 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5302 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.099 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5303 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 5304 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 5305 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 5306 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:56.099 UTC [cauthdsl] func1 -> DEBU 5307 0xc002758f20 gate 1569284816099673000 evaluation starts" +"2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 5308 0xc002758f20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 5309 0xc002758f20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 530a 0xc002758f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 530b 0xc002758f20 principal evaluation fails" +"2019-09-24 00:26:56.099 UTC [cauthdsl] func1 -> DEBU 530c 0xc002758f20 gate 1569284816099673000 evaluation fails" +"2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 530d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 530e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.099 UTC [policies] Evaluate -> DEBU 530f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:56.099 UTC [cauthdsl] func1 -> DEBU 5310 0xc002759760 gate 1569284816099949100 evaluation starts" +"2019-09-24 00:26:56.099 UTC [cauthdsl] func2 -> DEBU 5311 0xc002759760 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.100 UTC [cauthdsl] func2 -> DEBU 5312 0xc002759760 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.100 UTC [cauthdsl] func2 -> DEBU 5313 0xc002759760 principal matched by identity 0" +"2019-09-24 00:26:56.100 UTC [msp.identity] Verify -> DEBU 5314 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:56.100 UTC [msp.identity] Verify -> DEBU 5315 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:56.100 UTC [cauthdsl] func2 -> DEBU 5316 0xc002759760 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:56.100 UTC [cauthdsl] func1 -> DEBU 5317 0xc002759760 gate 1569284816099949100 evaluation succeeds" +"2019-09-24 00:26:56.100 UTC [policies] Evaluate -> DEBU 5318 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.100 UTC [policies] Evaluate -> DEBU 5319 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.100 UTC [policies] Evaluate -> DEBU 531a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:56.100 UTC [policies] Evaluate -> DEBU 531b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:56.100 UTC [gossip.gossip] handleMessage -> DEBU 531c Exiting" +"2019-09-24 00:26:56.100 UTC [gossip.gossip] handleMessage -> DEBU 531d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.101 UTC [msp] DeserializeIdentity -> DEBU 531e Obtaining identity" +"2019-09-24 00:26:56.101 UTC [msp] DeserializeIdentity -> DEBU 531f Obtaining identity" +"2019-09-24 00:26:56.101 UTC [msp] DeserializeIdentity -> DEBU 5320 Obtaining identity" +"2019-09-24 00:26:56.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5321 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:56.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5322 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5323 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 5324 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 5325 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 5326 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func1 -> DEBU 5327 0xc0027c72b0 gate 1569284816101370000 evaluation starts" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5328 0xc0027c72b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5329 0xc0027c72b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 532a 0xc0027c72b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 532b 0xc0027c72b0 principal evaluation fails" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func1 -> DEBU 532c 0xc0027c72b0 gate 1569284816101370000 evaluation fails" +"2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 532d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 532e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 532f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func1 -> DEBU 5330 0xc0027c7b00 gate 1569284816101607700 evaluation starts" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5331 0xc0027c7b00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5332 0xc0027c7b00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5333 0xc0027c7b00 principal matched by identity 0" +"2019-09-24 00:26:56.101 UTC [msp.identity] Verify -> DEBU 5334 Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:26:56.101 UTC [msp.identity] Verify -> DEBU 5335 Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func2 -> DEBU 5336 0xc0027c7b00 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:56.101 UTC [cauthdsl] func1 -> DEBU 5337 0xc0027c7b00 gate 1569284816101607700 evaluation succeeds" +"2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 5338 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 5339 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 533a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:56.101 UTC [policies] Evaluate -> DEBU 533b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:56.102 UTC [msp.identity] Verify -> DEBU 533c Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:26:56.102 UTC [msp.identity] Verify -> DEBU 533d Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:26:56.102 UTC [msp.identity] Verify -> DEBU 533e Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:26:56.102 UTC [msp.identity] Verify -> DEBU 533f Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:26:56.106 UTC [msp] DeserializeIdentity -> DEBU 5340 Obtaining identity" +"2019-09-24 00:26:56.107 UTC [msp] DeserializeIdentity -> DEBU 5341 Obtaining identity" +"2019-09-24 00:26:56.107 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5342 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:56.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5343 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5344 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 5345 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 5346 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 5347 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:56.107 UTC [cauthdsl] func1 -> DEBU 5348 0xc0028fa1d0 gate 1569284816107297100 evaluation starts" +"2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 5349 0xc0028fa1d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 534a 0xc0028fa1d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 534b 0xc0028fa1d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 534c 0xc0028fa1d0 principal evaluation fails" +"2019-09-24 00:26:56.107 UTC [cauthdsl] func1 -> DEBU 534d 0xc0028fa1d0 gate 1569284816107297100 evaluation fails" +"2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 534e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 534f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.107 UTC [policies] Evaluate -> DEBU 5350 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:56.107 UTC [cauthdsl] func1 -> DEBU 5351 0xc0028faa10 gate 1569284816107747100 evaluation starts" +"2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 5352 0xc0028faa10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 5353 0xc0028faa10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 5354 0xc0028faa10 principal matched by identity 0" +"2019-09-24 00:26:56.107 UTC [msp.identity] Verify -> DEBU 5355 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:26:56.107 UTC [msp.identity] Verify -> DEBU 5356 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:26:56.107 UTC [cauthdsl] func2 -> DEBU 5357 0xc0028faa10 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:56.108 UTC [cauthdsl] func1 -> DEBU 5358 0xc0028faa10 gate 1569284816107747100 evaluation succeeds" +"2019-09-24 00:26:56.108 UTC [policies] Evaluate -> DEBU 5359 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.108 UTC [policies] Evaluate -> DEBU 535a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.108 UTC [policies] Evaluate -> DEBU 535b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:56.108 UTC [policies] Evaluate -> DEBU 535c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:56.108 UTC [gossip.gossip] handleMessage -> DEBU 535d Exiting" +"2019-09-24 00:26:56.124 UTC [dockercontroller] deployImage -> DEBU 535e Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4" +"2019-09-24 00:26:56.124 UTC [dockercontroller] createContainer -> DEBU 535f create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 00:26:56.124 UTC [dockercontroller] getDockerHostConfig -> DEBU 5360 docker container hostconfig NetworkMode: hlf_net" +"2019-09-24 00:26:56.198 UTC [gossip.privdata] run -> DEBU 5361 Start reconcile missing private info" +"2019-09-24 00:26:56.198 UTC [leveldbhelper] GetIterator -> DEBU 5362 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +"2019-09-24 00:26:56.198 UTC [gossip.privdata] reconcile -> DEBU 5363 Reconciliation cycle finished successfully. no items to reconcile" +"2019-09-24 00:26:56.217 UTC [dockercontroller] createContainer -> DEBU 5364 created container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 00:26:56.282 UTC [msp] DeserializeIdentity -> DEBU 5365 Obtaining identity" +"2019-09-24 00:26:56.282 UTC [msp] DeserializeIdentity -> DEBU 5366 Obtaining identity" +"2019-09-24 00:26:56.282 UTC [gossip.pull] Hello -> DEBU 5367 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:56.282 UTC [msp] DeserializeIdentity -> DEBU 5368 Obtaining identity" +"2019-09-24 00:26:56.283 UTC [msp] DeserializeIdentity -> DEBU 5369 Obtaining identity" +"2019-09-24 00:26:56.283 UTC [gossip.comm] Send -> DEBU 536a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 536b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 536c Exiting" +"2019-09-24 00:26:56.285 UTC [gossip.comm] func1 -> DEBU 536d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.285 UTC [gossip.gossip] handleMessage -> DEBU 536e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.285 UTC [gossip.pull] HandleMessage -> DEBU 536f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.285 UTC [gossip.gossip] handleMessage -> DEBU 5370 Exiting" +"2019-09-24 00:26:56.579 UTC [gossip.comm] func1 -> DEBU 5371 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.579 UTC [gossip.gossip] handleMessage -> DEBU 5372 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.579 UTC [msp] DeserializeIdentity -> DEBU 5373 Obtaining identity" +"2019-09-24 00:26:56.579 UTC [msp] DeserializeIdentity -> DEBU 5374 Obtaining identity" +"2019-09-24 00:26:56.579 UTC [gossip.gossip] handleMessage -> DEBU 5375 Exiting" +"2019-09-24 00:26:56.772 UTC [gossip.comm] func1 -> DEBU 5376 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.773 UTC [gossip.gossip] handleMessage -> DEBU 5377 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.774 UTC [gossip.gossip] handleMessage -> DEBU 5378 Exiting" +"2019-09-24 00:26:56.776 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5379 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.777 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 537a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:56.778 UTC [msp] DeserializeIdentity -> DEBU 537b Obtaining identity" +"2019-09-24 00:26:56.779 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 537c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:56.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 537d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 537e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:56.779 UTC [policies] Evaluate -> DEBU 537f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:56.779 UTC [policies] Evaluate -> DEBU 5380 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:56.780 UTC [policies] Evaluate -> DEBU 5381 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:56.780 UTC [cauthdsl] func1 -> DEBU 5382 0xc002aa4d20 gate 1569284816780192100 evaluation starts" +"2019-09-24 00:26:56.780 UTC [cauthdsl] func2 -> DEBU 5383 0xc002aa4d20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.780 UTC [cauthdsl] func2 -> DEBU 5384 0xc002aa4d20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.780 UTC [cauthdsl] func2 -> DEBU 5385 0xc002aa4d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:56.780 UTC [cauthdsl] func2 -> DEBU 5386 0xc002aa4d20 principal evaluation fails" +"2019-09-24 00:26:56.780 UTC [cauthdsl] func1 -> DEBU 5387 0xc002aa4d20 gate 1569284816780192100 evaluation fails" +"2019-09-24 00:26:56.780 UTC [policies] Evaluate -> DEBU 5388 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.780 UTC [policies] Evaluate -> DEBU 5389 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:56.780 UTC [policies] Evaluate -> DEBU 538a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:56.781 UTC [cauthdsl] func1 -> DEBU 538b 0xc002aa5560 gate 1569284816781257500 evaluation starts" +"2019-09-24 00:26:56.781 UTC [cauthdsl] func2 -> DEBU 538c 0xc002aa5560 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:56.781 UTC [cauthdsl] func2 -> DEBU 538d 0xc002aa5560 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:56.781 UTC [cauthdsl] func2 -> DEBU 538e 0xc002aa5560 principal matched by identity 0" +"2019-09-24 00:26:56.781 UTC [msp.identity] Verify -> DEBU 538f Verify: digest = 00000000 d6 ac 34 f6 6a 63 e1 ea 4a 28 fa 89 28 0c 32 c3 |..4.jc..J(..(.2.| +00000010 77 0c 7b 38 ae 8a 97 6c 39 95 9d 2b 4a a1 f5 98 |w.{8...l9..+J...|" +"2019-09-24 00:26:56.781 UTC [msp.identity] Verify -> DEBU 5390 Verify: sig = 00000000 30 45 02 21 00 9a 81 a4 93 16 50 c1 43 79 7d a8 |0E.!......P.Cy}.| +00000010 f4 00 82 34 42 9c 8b 74 31 ef 2f 3f cc c9 ab 14 |...4B..t1./?....| +00000020 65 25 3a 17 51 02 20 4b ee 35 be 4f 7e 2d de 76 |e%:.Q. K.5.O~-.v| +00000030 9d fe 43 fe a3 6e ee a8 a3 95 d9 9a b8 07 b9 0d |..C..n..........| +00000040 dd b1 e6 27 af 88 e1 |...'...|" +"2019-09-24 00:26:56.781 UTC [cauthdsl] func2 -> DEBU 5391 0xc002aa5560 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:56.781 UTC [cauthdsl] func1 -> DEBU 5392 0xc002aa5560 gate 1569284816781257500 evaluation succeeds" +"2019-09-24 00:26:56.781 UTC [policies] Evaluate -> DEBU 5393 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.781 UTC [policies] Evaluate -> DEBU 5394 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:56.781 UTC [policies] Evaluate -> DEBU 5395 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:56.781 UTC [policies] Evaluate -> DEBU 5396 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:56.781 UTC [gossip.discovery] handleAliveMessage -> DEBU 5397 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:56.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5398 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:56.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5399 updating membership: timestamp: " +"2019-09-24 00:26:56.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 539a Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:56.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 539b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:56.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 539c Exiting" +"2019-09-24 00:26:56.781 UTC [gossip.discovery] handleAliveMessage -> DEBU 539d Exiting" +"2019-09-24 00:26:56.781 UTC [gossip.discovery] handleMsgFromComm -> DEBU 539e Exiting" +"2019-09-24 00:26:56.782 UTC [gossip.discovery] sendMemResponse -> DEBU 539f Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:26:56.782 UTC [msp] DeserializeIdentity -> DEBU 53a0 Obtaining identity" +"2019-09-24 00:26:56.782 UTC [msp] DeserializeIdentity -> DEBU 53a1 Obtaining identity" +"2019-09-24 00:26:56.782 UTC [msp] DeserializeIdentity -> DEBU 53a2 Obtaining identity" +"2019-09-24 00:26:56.782 UTC [gossip.comm] Send -> DEBU 53a3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:56.782 UTC [gossip.discovery] sendMemResponse -> DEBU 53a4 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020J" signature:"0D\002 rc\"Z\274N\025\027\032\214\314\267a>\227\0047}*]\r\247z=\235\266Y>NY\360t\002 \004\310\322$\034\231ps\273\237\014\370\332\374h\026\212f\034+#\312^\250\276*\305\231(%\341U" > alive: alive: " +"2019-09-24 00:26:56.782 UTC [gossip.comm] sendToEndpoint -> DEBU 53a5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.782 UTC [gossip.comm] sendToEndpoint -> DEBU 53a6 Exiting" +"2019-09-24 00:26:56.816 UTC [gossip.comm] func1 -> DEBU 53a7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.816 UTC [gossip.gossip] handleMessage -> DEBU 53a8 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.816 UTC [gossip.pull] HandleMessage -> DEBU 53a9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53aa Obtaining identity" +"2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53ab Obtaining identity" +"2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53ac Obtaining identity" +"2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53ad Obtaining identity" +"2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53ae Obtaining identity" +"2019-09-24 00:26:56.817 UTC [msp] DeserializeIdentity -> DEBU 53af Obtaining identity" +"2019-09-24 00:26:56.818 UTC [gossip.pull] SendDigest -> DEBU 53b0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:26:56.818 UTC [gossip.gossip] handleMessage -> DEBU 53b1 Exiting" +"2019-09-24 00:26:56.836 UTC [gossip.comm] func1 -> DEBU 53b2 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.837 UTC [gossip.gossip] handleMessage -> DEBU 53b3 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.838 UTC [gossip.pull] HandleMessage -> DEBU 53b4 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:26:56.838 UTC [gossip.pull] SendDigest -> DEBU 53b5 Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:56.839 UTC [gossip.gossip] handleMessage -> DEBU 53b6 Exiting" +"2019-09-24 00:26:57.000 UTC [dockercontroller] Start -> DEBU 53b7 Started container dev-peer0.org1.example.com-exp02-1.0" +"2019-09-24 00:26:57.000 UTC [container] unlockContainer -> DEBU 53b8 container lock deleted(exp02-1.0)" +"2019-09-24 00:26:57.000 UTC [container] lockContainer -> DEBU 53b9 waiting for container(exp02-1.0) lock" +"2019-09-24 00:26:57.000 UTC [container] lockContainer -> DEBU 53ba got container (exp02-1.0) lock" +"2019-09-24 00:26:57.000 UTC [container] unlockContainer -> DEBU 53bb container lock deleted(exp02-1.0)" +"2019-09-24 00:26:57.042 UTC [chaincode.accesscontrol] authenticate -> DEBU 53bc Chaincode exp02:1.0 's authentication is authorized" +"2019-09-24 00:26:57.042 UTC [chaincode] handleMessage -> DEBU 53bd [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-09-24 00:26:57.042 UTC [chaincode] HandleRegister -> DEBU 53be Received REGISTER in state created" +"2019-09-24 00:26:57.043 UTC [chaincode] Register -> DEBU 53bf registered handler complete for chaincode exp02:1.0" +"2019-09-24 00:26:57.043 UTC [chaincode] HandleRegister -> DEBU 53c0 Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED" +"2019-09-24 00:26:57.044 UTC [chaincode] HandleRegister -> DEBU 53c1 Changed state to established for name:"exp02:1.0" " +"2019-09-24 00:26:57.044 UTC [chaincode] sendReady -> DEBU 53c2 sending READY for chaincode name:"exp02:1.0" " +"2019-09-24 00:26:57.044 UTC [chaincode] sendReady -> DEBU 53c3 Changed to state ready for chaincode name:"exp02:1.0" " +"2019-09-24 00:26:57.045 UTC [chaincode] Launch -> DEBU 53c4 launch complete" +"2019-09-24 00:26:57.045 UTC [chaincode] Execute -> DEBU 53c5 Entry" +"2019-09-24 00:26:57.047 UTC [chaincode] handleMessage -> DEBU 53c6 [220bb88b] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 00:26:57.047 UTC [chaincode] HandleTransaction -> DEBU 53c7 [220bb88b] handling PUT_STATE from chaincode" +"2019-09-24 00:26:57.047 UTC [chaincode] HandleTransaction -> DEBU 53c8 [220bb88b] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 00:26:57.048 UTC [chaincode] handleMessage -> DEBU 53c9 [220bb88b] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 00:26:57.048 UTC [chaincode] HandleTransaction -> DEBU 53ca [220bb88b] handling PUT_STATE from chaincode" +"2019-09-24 00:26:57.048 UTC [chaincode] HandleTransaction -> DEBU 53cb [220bb88b] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 00:26:57.049 UTC [chaincode] handleMessage -> DEBU 53cc [220bb88b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:26:57.049 UTC [chaincode] Notify -> DEBU 53cd [220bb88b] notifying Txid:220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7, channelID:businesschannel" +"2019-09-24 00:26:57.050 UTC [chaincode] Execute -> DEBU 53ce Exit" +"2019-09-24 00:26:57.050 UTC [endorser] callChaincode -> INFO 53cf [businesschannel][220bb88b] Exit chaincode: name:"lscc" (96255ms)" +"2019-09-24 00:26:57.051 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 53d0 Simulation completed, getting simulation results" +"2019-09-24 00:26:57.051 UTC [lockbasedtxmgr] Done -> DEBU 53d1 Done with transaction simulation / query execution [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7]" +"2019-09-24 00:26:57.052 UTC [endorser] SimulateProposal -> DEBU 53d2 [businesschannel][220bb88b] Exit" +"2019-09-24 00:26:57.052 UTC [endorser] endorseProposal -> DEBU 53d3 [businesschannel][220bb88b] Entry chaincode: name:"lscc" " +"2019-09-24 00:26:57.052 UTC [endorser] endorseProposal -> DEBU 53d4 [businesschannel][220bb88b] escc for chaincode name:"lscc" is escc" +"2019-09-24 00:26:57.053 UTC [endorser] EndorseWithPlugin -> DEBU 53d5 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7, chaincode: lscc}" +"2019-09-24 00:26:57.053 UTC [msp.identity] Sign -> DEBU 53d6 Sign: plaintext: 0A201D646C7BFA107780D56BFD3DC443...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:26:57.053 UTC [msp.identity] Sign -> DEBU 53d7 Sign: digest: 2CEE09FB208174EF40B4EEE835E150E7CB240B6A6008824807409B521EA70105 " +"2019-09-24 00:26:57.054 UTC [endorser] EndorseWithPlugin -> DEBU 53d8 Exiting {plugin: escc, channel: businesschannel, tx: 220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7, chaincode: lscc}" +"2019-09-24 00:26:57.054 UTC [endorser] endorseProposal -> DEBU 53d9 [businesschannel][220bb88b] Exit" +"2019-09-24 00:26:57.054 UTC [lockbasedtxmgr] Done -> DEBU 53da Done with transaction simulation / query execution [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7]" +"2019-09-24 00:26:57.054 UTC [endorser] func1 -> DEBU 53db Exit: request from 172.18.0.9:50708" +"2019-09-24 00:26:57.055 UTC [comm.grpc.server] 1 -> INFO 53dc unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50708 grpc.code=OK grpc.call_duration=1m36.2623753s +"2019-09-24 00:26:57.077 UTC [gossip.gossip] handleMessage -> DEBU 53dd Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:57.078 UTC [msp] DeserializeIdentity -> DEBU 53de Obtaining identity" +"2019-09-24 00:26:57.078 UTC [msp] DeserializeIdentity -> DEBU 53df Obtaining identity" +"2019-09-24 00:26:57.078 UTC [msp] DeserializeIdentity -> DEBU 53e0 Obtaining identity" +"2019-09-24 00:26:57.078 UTC [gossip.gossip] handleMessage -> DEBU 53e1 Exiting" +"2019-09-24 00:26:57.084 UTC [grpc] infof -> DEBU 53e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:26:57.084 UTC [grpc] infof -> DEBU 53e3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:26:57.317 UTC [gossip.election] waitForInterrupt -> DEBU 53e4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:26:57.317 UTC [gossip.election] IsLeader -> DEBU 53e5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:26:57.317 UTC [msp] GetDefaultSigningIdentity -> DEBU 53e6 Obtaining default signing identity" +"2019-09-24 00:26:57.317 UTC [msp.identity] Sign -> DEBU 53e7 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE31510191801 " +"2019-09-24 00:26:57.317 UTC [msp.identity] Sign -> DEBU 53e8 Sign: digest: 2BB2B87ED1763097B2AD90185C58581E361DF282E4AD5C79639CAFFA98A4AD42 " +"2019-09-24 00:26:57.318 UTC [gossip.election] waitForInterrupt -> DEBU 53e9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53ea Obtaining identity" +"2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53eb Obtaining identity" +"2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53ec Obtaining identity" +"2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53ed Obtaining identity" +"2019-09-24 00:26:57.318 UTC [gossip.comm] Send -> DEBU 53ee Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53ef Obtaining identity" +"2019-09-24 00:26:57.318 UTC [msp] DeserializeIdentity -> DEBU 53f0 Obtaining identity" +"2019-09-24 00:26:57.318 UTC [gossip.comm] sendToEndpoint -> DEBU 53f1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.318 UTC [gossip.comm] sendToEndpoint -> DEBU 53f2 Exiting" +"2019-09-24 00:26:57.540 UTC [endorser] ProcessProposal -> DEBU 53f3 Entering: request from 172.18.0.9:50974" +"2019-09-24 00:26:57.540 UTC [protoutils] ValidateProposalMessage -> DEBU 53f4 ValidateProposalMessage starts for signed proposal 0xc0026a0b90" +"2019-09-24 00:26:57.540 UTC [protoutils] validateChannelHeader -> DEBU 53f5 validateChannelHeader info: header type 3" +"2019-09-24 00:26:57.540 UTC [protoutils] checkSignatureFromCreator -> DEBU 53f6 begin" +"2019-09-24 00:26:57.540 UTC [msp] GetManagerForChain -> DEBU 53f7 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:26:57.540 UTC [protoutils] checkSignatureFromCreator -> DEBU 53f8 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:26:57.540 UTC [protoutils] checkSignatureFromCreator -> DEBU 53f9 creator is valid" +"2019-09-24 00:26:57.540 UTC [msp.identity] Verify -> DEBU 53fa Verify: digest = 00000000 84 59 30 15 5f af 51 20 ac c4 be 85 62 e9 6d f6 |.Y0._.Q ....b.m.| +00000010 97 76 43 78 8a 2c 12 8b 80 9b 10 cd 36 95 f1 5f |.vCx.,......6.._|" +"2019-09-24 00:26:57.540 UTC [msp.identity] Verify -> DEBU 53fb Verify: sig = 00000000 30 44 02 20 23 d9 91 cd a9 ce bc da 8c 34 4f df |0D. #........4O.| +00000010 98 7d df 92 3a 59 86 47 bb 94 c3 d5 80 82 54 d7 |.}..:Y.G......T.| +00000020 9d b8 30 b3 02 20 22 a9 57 27 9a 1a 98 cb 15 fa |..0.. ".W'......| +00000030 63 c7 9a 86 cf a4 70 c7 6e be fa c2 d7 51 83 73 |c.....p.n....Q.s| +00000040 db 91 a6 99 d8 a9 |......|" +"2019-09-24 00:26:57.540 UTC [protoutils] checkSignatureFromCreator -> DEBU 53fc exits successfully" +"2019-09-24 00:26:57.541 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 53fd validateChaincodeProposalMessage starts for proposal 0xc000122e00, header 0xc0026a0fa0" +"2019-09-24 00:26:57.541 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 53fe validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 00:26:57.541 UTC [endorser] preProcess -> DEBU 53ff [businesschannel][ca869c6c] processing txid: ca869c6cb6f4054405f4af660e94edba709b8feb686f61621cd843688f3c7b55" +"2019-09-24 00:26:57.541 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5400 retrieveTransactionByID() - txId = [ca869c6cb6f4054405f4af660e94edba709b8feb686f61621cd843688f3c7b55]" +"2019-09-24 00:26:57.541 UTC [aclmgmt] CheckACL -> DEBU 5401 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 00:26:57.541 UTC [aclmgmt] CheckACL -> DEBU 5402 acl check(/Channel/Application/Writers)" +"2019-09-24 00:26:57.541 UTC [policies] Evaluate -> DEBU 5403 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:26:57.541 UTC [policies] Evaluate -> DEBU 5404 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:57.541 UTC [policies] Evaluate -> DEBU 5405 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:26:57.541 UTC [cauthdsl] func1 -> DEBU 5406 0xc002c176e0 gate 1569284817541441500 evaluation starts" +"2019-09-24 00:26:57.541 UTC [cauthdsl] func2 -> DEBU 5407 0xc002c176e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:57.541 UTC [cauthdsl] func2 -> DEBU 5408 0xc002c176e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:57.541 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5409 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 00:26:57.541 UTC [msp] Validate -> DEBU 540a MSP Org1MSP validating identity" +"2019-09-24 00:26:57.541 UTC [msp] getCertificationChain -> DEBU 540b MSP Org1MSP getting certification chain" +"2019-09-24 00:26:57.541 UTC [cauthdsl] func2 -> DEBU 540c 0xc002c176e0 principal matched by identity 0" +"2019-09-24 00:26:57.541 UTC [msp.identity] Verify -> DEBU 540d Verify: digest = 00000000 84 59 30 15 5f af 51 20 ac c4 be 85 62 e9 6d f6 |.Y0._.Q ....b.m.| +00000010 97 76 43 78 8a 2c 12 8b 80 9b 10 cd 36 95 f1 5f |.vCx.,......6.._|" +"2019-09-24 00:26:57.541 UTC [msp.identity] Verify -> DEBU 540e Verify: sig = 00000000 30 44 02 20 23 d9 91 cd a9 ce bc da 8c 34 4f df |0D. #........4O.| +00000010 98 7d df 92 3a 59 86 47 bb 94 c3 d5 80 82 54 d7 |.}..:Y.G......T.| +00000020 9d b8 30 b3 02 20 22 a9 57 27 9a 1a 98 cb 15 fa |..0.. ".W'......| +00000030 63 c7 9a 86 cf a4 70 c7 6e be fa c2 d7 51 83 73 |c.....p.n....Q.s| +00000040 db 91 a6 99 d8 a9 |......|" +"2019-09-24 00:26:57.542 UTC [cauthdsl] func2 -> DEBU 540f 0xc002c176e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:57.542 UTC [cauthdsl] func1 -> DEBU 5410 0xc002c176e0 gate 1569284817541441500 evaluation succeeds" +"2019-09-24 00:26:57.542 UTC [policies] Evaluate -> DEBU 5411 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:26:57.542 UTC [policies] Evaluate -> DEBU 5412 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:26:57.542 UTC [policies] Evaluate -> DEBU 5413 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:26:57.542 UTC [policies] Evaluate -> DEBU 5414 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:26:57.542 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5415 constructing new tx simulator" +"2019-09-24 00:26:57.542 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5416 constructing new tx simulator txid = [ca869c6cb6f4054405f4af660e94edba709b8feb686f61621cd843688f3c7b55]" +"2019-09-24 00:26:57.542 UTC [endorser] SimulateProposal -> DEBU 5417 [businesschannel][ca869c6c] Entry chaincode: name:"exp02" " +"2019-09-24 00:26:57.542 UTC [stateleveldb] GetState -> DEBU 5418 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:26:57.542 UTC [endorser] SimulateProposal -> DEBU 5419 [businesschannel][ca869c6c] Exit" +"2019-09-24 00:26:57.542 UTC [lockbasedtxmgr] Done -> DEBU 541a Done with transaction simulation / query execution [ca869c6cb6f4054405f4af660e94edba709b8feb686f61621cd843688f3c7b55]" +"2019-09-24 00:26:57.542 UTC [endorser] func1 -> DEBU 541b Exit: request from 172.18.0.9:50974" +"2019-09-24 00:26:57.542 UTC [comm.grpc.server] 1 -> INFO 541c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50974 grpc.code=OK grpc.call_duration=2.4216ms +"2019-09-24 00:26:57.546 UTC [grpc] infof -> DEBU 541e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:26:57.546 UTC [grpc] infof -> DEBU 541d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:26:57.647 UTC [gossip.comm] func1 -> DEBU 541f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:57.648 UTC [gossip.gossip] handleMessage -> DEBU 5420 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:57.648 UTC [gossip.pull] HandleMessage -> DEBU 5421 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:57.649 UTC [gossip.pull] SendDigest -> DEBU 5422 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:26:57.649 UTC [gossip.gossip] handleMessage -> DEBU 5423 Exiting" +"2019-09-24 00:26:57.700 UTC [gossip.comm] func1 -> DEBU 5424 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.700 UTC [gossip.gossip] handleMessage -> DEBU 5425 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.701 UTC [gossip.gossip] handleMessage -> DEBU 5426 Exiting" +"2019-09-24 00:26:57.701 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5427 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.701 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5428 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:57.701 UTC [msp.identity] Verify -> DEBU 5429 Verify: digest = 00000000 48 30 82 ad dc dc 87 52 6e 62 c3 4c 9c 1c f3 a6 |H0.....Rnb.L....| +00000010 c0 1c 44 11 d3 60 57 35 40 2f df 81 cc 34 49 05 |..D..`W5@/...4I.|" +"2019-09-24 00:26:57.702 UTC [msp.identity] Verify -> DEBU 542a Verify: sig = 00000000 30 45 02 21 00 fb c8 ad d8 e4 d0 03 bc 49 9a 37 |0E.!.........I.7| +00000010 5d b3 a9 70 22 3e e6 a9 c1 20 e6 7a 02 d3 98 c6 |]..p">... .z....| +00000020 0f a2 97 c4 1c 02 20 4b 7e 7e 61 fa ec 6a ba 1c |...... K~~a..j..| +00000030 82 0b ae f0 d9 21 55 f3 7c 24 f1 5b fa df 89 d3 |.....!U.|$.[....| +00000040 b3 ca 39 b7 94 0a b0 |..9....|" +"2019-09-24 00:26:57.702 UTC [gossip.discovery] handleAliveMessage -> DEBU 542b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 542c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:57.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 542d updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:57.702 UTC [gossip.discovery] learnExistingMembers -> DEBU 542e Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:57.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 542f Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:57.703 UTC [gossip.discovery] learnExistingMembers -> DEBU 5430 Exiting" +"2019-09-24 00:26:57.703 UTC [gossip.discovery] handleAliveMessage -> DEBU 5431 Exiting" +"2019-09-24 00:26:57.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5432 Exiting" +"2019-09-24 00:26:57.708 UTC [msp] DeserializeIdentity -> DEBU 5433 Obtaining identity" +"2019-09-24 00:26:57.708 UTC [msp] DeserializeIdentity -> DEBU 5434 Obtaining identity" +"2019-09-24 00:26:57.710 UTC [msp] DeserializeIdentity -> DEBU 5435 Obtaining identity" +"2019-09-24 00:26:57.710 UTC [gossip.comm] Send -> DEBU 5436 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:57.710 UTC [msp] DeserializeIdentity -> DEBU 5437 Obtaining identity" +"2019-09-24 00:26:57.711 UTC [gossip.comm] Send -> DEBU 5438 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:57.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5439 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.712 UTC [gossip.comm] sendToEndpoint -> DEBU 543a Exiting" +"2019-09-24 00:26:57.713 UTC [gossip.comm] sendToEndpoint -> DEBU 543b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.713 UTC [gossip.comm] sendToEndpoint -> DEBU 543c Exiting" +"2019-09-24 00:26:57.715 UTC [gossip.comm] func1 -> DEBU 543d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.715 UTC [gossip.gossip] handleMessage -> DEBU 543e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.715 UTC [gossip.gossip] handleMessage -> DEBU 543f Exiting" +"2019-09-24 00:26:57.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5440 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.716 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5441 Exiting" +"2019-09-24 00:26:57.717 UTC [gossip.gossip] handleMessage -> DEBU 5442 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.717 UTC [gossip.gossip] handleMessage -> DEBU 5443 Exiting" +"2019-09-24 00:26:57.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5444 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:57.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5445 Exiting" +"2019-09-24 00:26:57.778 UTC [gossip.comm] func1 -> DEBU 5446 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" secret_envelope:\246u\344\224\356>\345{\016\002 f\327\244c\020\266\210\301U4\260\207{\243\232gG\246\272\020\302\246\227\320\202\211\263\371\367@\307M" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:57.785 UTC [gossip.gossip] handleMessage -> DEBU 5447 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" secret_envelope:\246u\344\224\356>\345{\016\002 f\327\244c\020\266\210\301U4\260\207{\243\232gG\246\272\020\302\246\227\320\202\211\263\371\367@\307M" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:57.785 UTC [gossip.gossip] handleMessage -> DEBU 5448 Exiting" +"2019-09-24 00:26:57.786 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5449 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" secret_envelope:\246u\344\224\356>\345{\016\002 f\327\244c\020\266\210\301U4\260\207{\243\232gG\246\272\020\302\246\227\320\202\211\263\371\367@\307M" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:26:57.786 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 544a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:57.786 UTC [msp.identity] Verify -> DEBU 544b Verify: digest = 00000000 bc 4b da 1a 0e 27 33 ce bb 7e af 9d 12 c8 7b 2a |.K...'3..~....{*| +00000010 37 ab 75 ef bb 5a a7 5e 73 7c 57 a1 70 a8 43 2f |7.u..Z.^s|W.p.C/|" +"2019-09-24 00:26:57.786 UTC [msp.identity] Verify -> DEBU 544c Verify: sig = 00000000 30 44 02 20 3b b3 e7 b7 d9 9f 2b e6 6a 20 3a 67 |0D. ;.....+.j :g| +00000010 35 37 22 c8 83 d8 85 68 c7 46 2d 42 a6 80 b7 81 |57"....h.F-B....| +00000020 82 20 4c ab 02 20 72 45 31 63 ed 86 e9 d4 a4 ad |. L.. rE1c......| +00000030 93 bf 57 d8 19 d2 b0 60 f2 fd ef 5b 03 38 a2 2f |..W....`...[.8./| +00000040 ba 4d 73 d5 1c 47 |.Ms..G|" +"2019-09-24 00:26:57.787 UTC [msp.identity] Verify -> DEBU 544d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:26:57.787 UTC [msp.identity] Verify -> DEBU 544e Verify: sig = 00000000 30 44 02 20 7a 6c 61 44 89 e4 0f e7 68 78 61 f0 |0D. zlaD....hxa.| +00000010 fa 38 7e a6 d3 2a 8c 64 d4 35 3e a6 75 e4 94 ee |.8~..*.d.5>.u...| +00000020 3e e5 7b 0e 02 20 66 d7 a4 63 10 b6 88 c1 55 34 |>.{.. f..c....U4| +00000030 b0 87 7b a3 9a 67 47 a6 ba 10 c2 a6 97 d0 82 89 |..{..gG.........| +00000040 b3 f9 f7 40 c7 4d |...@.M|" +"2019-09-24 00:26:57.787 UTC [gossip.discovery] handleAliveMessage -> DEBU 544f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:26:57.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 5450 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:26:57.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 5451 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:57.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 5452 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:26:57.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 5453 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:26:57.787 UTC [gossip.discovery] learnExistingMembers -> DEBU 5454 Exiting" +"2019-09-24 00:26:57.788 UTC [gossip.discovery] handleAliveMessage -> DEBU 5455 Exiting" +"2019-09-24 00:26:57.788 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5456 Exiting" +"2019-09-24 00:26:57.788 UTC [gossip.discovery] sendMemResponse -> DEBU 5457 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:26:57.788 UTC [msp] DeserializeIdentity -> DEBU 5458 Obtaining identity" +"2019-09-24 00:26:57.788 UTC [msp] DeserializeIdentity -> DEBU 5459 Obtaining identity" +"2019-09-24 00:26:57.788 UTC [gossip.comm] Send -> DEBU 545a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:57.788 UTC [gossip.comm] sendToEndpoint -> DEBU 545b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:26:57.788 UTC [gossip.discovery] sendMemResponse -> DEBU 545c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" secret_envelope:\246u\344\224\356>\345{\016\002 f\327\244c\020\266\210\301U4\260\207{\243\232gG\246\272\020\302\246\227\320\202\211\263\371\367@\307M" > > alive: " +"2019-09-24 00:26:57.788 UTC [gossip.comm] sendToEndpoint -> DEBU 545d Exiting" +"2019-09-24 00:26:58.016 UTC [gossip.comm] func1 -> DEBU 545e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:58.017 UTC [gossip.gossip] handleMessage -> DEBU 545f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:26:58.017 UTC [msp] DeserializeIdentity -> DEBU 5460 Obtaining identity" +"2019-09-24 00:26:58.018 UTC [msp] DeserializeIdentity -> DEBU 5461 Obtaining identity" +"2019-09-24 00:26:58.018 UTC [msp] DeserializeIdentity -> DEBU 5462 Obtaining identity" +"2019-09-24 00:26:58.019 UTC [gossip.gossip] handleMessage -> DEBU 5463 Exiting" +"2019-09-24 00:26:59.102 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5464 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:59.102 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5465 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:59.102 UTC [policies] Evaluate -> DEBU 5466 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 00:26:59.102 UTC [policies] Evaluate -> DEBU 5467 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:59.103 UTC [policies] Evaluate -> DEBU 5468 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:26:59.103 UTC [msp] DeserializeIdentity -> DEBU 5469 Obtaining identity" +"2019-09-24 00:26:59.103 UTC [msp.identity] newIdentity -> DEBU 546a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO +CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM +SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q +1A== +-----END CERTIFICATE-----" +"2019-09-24 00:26:59.103 UTC [cauthdsl] func1 -> DEBU 546b 0xc0030d96c0 gate 1569284819103520600 evaluation starts" +"2019-09-24 00:26:59.103 UTC [cauthdsl] func2 -> DEBU 546c 0xc0030d96c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.103 UTC [cauthdsl] func2 -> DEBU 546d 0xc0030d96c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:59.103 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 546e Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 00:26:59.103 UTC [msp] Validate -> DEBU 546f MSP OrdererMSP validating identity" +"2019-09-24 00:26:59.103 UTC [cauthdsl] func2 -> DEBU 5470 0xc0030d96c0 principal matched by identity 0" +"2019-09-24 00:26:59.103 UTC [msp.identity] Verify -> DEBU 5471 Verify: digest = 00000000 b3 da e8 26 80 74 2d 43 69 dd ba a6 4f 9b 0d 49 |...&.t-Ci...O..I| +00000010 bd 94 8c 19 c3 64 5f 92 08 1e ae 90 b0 18 bc 36 |.....d_........6|" +"2019-09-24 00:26:59.103 UTC [msp.identity] Verify -> DEBU 5472 Verify: sig = 00000000 30 45 02 21 00 83 90 56 b0 7e 63 97 17 5f 29 ef |0E.!...V.~c.._).| +00000010 1d 20 72 54 11 84 05 8c 5f e3 87 69 5b de 1f 41 |. rT...._..i[..A| +00000020 01 f7 3c 42 1b 02 20 60 bd 94 cd fc 96 88 15 1e |.. DEBU 5473 0xc0030d96c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:59.103 UTC [cauthdsl] func1 -> DEBU 5474 0xc0030d96c0 gate 1569284819103520600 evaluation succeeds" +"2019-09-24 00:26:59.104 UTC [policies] Evaluate -> DEBU 5475 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:26:59.104 UTC [policies] Evaluate -> DEBU 5476 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:26:59.104 UTC [policies] Evaluate -> DEBU 5477 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:26:59.104 UTC [policies] Evaluate -> DEBU 5478 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:26:59.104 UTC [blocksProvider] DeliverBlocks -> DEBU 5479 [businesschannel] Adding payload to local buffer, blockNum = [3]" +"2019-09-24 00:26:59.104 UTC [gossip.state] addPayload -> DEBU 547a [businesschannel] Adding payload to local buffer, blockNum = [3]" +"2019-09-24 00:26:59.104 UTC [gossip.state] addPayload -> DEBU 547b Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 00:26:59.104 UTC [blocksProvider] DeliverBlocks -> DEBU 547c [businesschannel] Gossiping block [3], peers number [3]" +"2019-09-24 00:26:59.104 UTC [gossip.channel] AddToMsgStore -> DEBU 547d Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4545 bytes, seq: 3}, Envelope: 4575 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 00:26:59.104 UTC [gossip.pull] Add -> DEBU 547e Added 3, total items: 3" +"2019-09-24 00:26:59.104 UTC [gossip.state] deliverPayloads -> DEBU 547f [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" +"2019-09-24 00:26:59.104 UTC [gossip.state] deliverPayloads -> DEBU 5480 [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" +"2019-09-24 00:26:59.104 UTC [gossip.privdata] StoreBlock -> INFO 5481 [businesschannel] Received block [3] from buffer" +"2019-09-24 00:26:59.104 UTC [gossip.privdata] StoreBlock -> DEBU 5482 [businesschannel] Validating block [3]" +"2019-09-24 00:26:59.104 UTC [committer.txvalidator] Validate -> DEBU 5483 [businesschannel] START Block Validation for block [3]" +"2019-09-24 00:26:59.104 UTC [committer.txvalidator] Validate -> DEBU 5484 expecting 1 block validation responses" +"2019-09-24 00:26:59.104 UTC [committer.txvalidator] validateTx -> DEBU 5485 [businesschannel] validateTx starts for block 0xc003206040 env 0xc002877270 txn 0" +"2019-09-24 00:26:59.104 UTC [protoutils] ValidateTransaction -> DEBU 5486 ValidateTransactionEnvelope starts for envelope 0xc002877270" +"2019-09-24 00:26:59.104 UTC [protoutils] ValidateTransaction -> DEBU 5487 Header is channel_header:"\010\003\032\014\010\360\304\245\354\005\020\270\307\203\253\003\"\017businesschannel*@220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030`\305\355d\317\353I\ttw\211\364\014\316.\033\021\213\237\021\004\356EN" " +"2019-09-24 00:26:59.104 UTC [protoutils] validateChannelHeader -> DEBU 5488 validateChannelHeader info: header type 3" +"2019-09-24 00:26:59.104 UTC [protoutils] checkSignatureFromCreator -> DEBU 5489 begin" +"2019-09-24 00:26:59.104 UTC [msp] GetManagerForChain -> DEBU 548a Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:26:59.104 UTC [protoutils] checkSignatureFromCreator -> DEBU 548b creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:26:59.104 UTC [protoutils] checkSignatureFromCreator -> DEBU 548c creator is valid" +"2019-09-24 00:26:59.104 UTC [msp.identity] Verify -> DEBU 548d Verify: digest = 00000000 15 f0 bf 5c dd b9 06 29 48 24 cd a2 db 84 36 74 |...\...)H$....6t| +00000010 4e b5 b9 83 45 11 38 fa 11 fe 61 65 4d e9 c7 c4 |N...E.8...aeM...|" +"2019-09-24 00:26:59.105 UTC [msp.identity] Verify -> DEBU 548e Verify: sig = 00000000 30 44 02 20 7a d3 96 7d 8e 27 11 63 1c 26 14 b5 |0D. z..}.'.c.&..| +00000010 bf 60 cc 45 a5 c4 dd 1e c0 d1 0a aa ff 65 1f 43 |.`.E.........e.C| +00000020 37 33 9a 86 02 20 4c 92 f4 c4 95 34 9c a1 db 0b |73... L....4....| +00000030 dc d5 2d 9d 34 9d 82 d2 a6 5d c9 ca b1 e9 2d a3 |..-.4....]....-.| +00000040 39 03 67 3b 57 25 |9.g;W%|" +"2019-09-24 00:26:59.105 UTC [protoutils] checkSignatureFromCreator -> DEBU 548f exits successfully" +"2019-09-24 00:26:59.105 UTC [protoutils] validateEndorserTransaction -> DEBU 5490 validateEndorserTransaction starts for data 0xc0030faa80, header channel_header:"\010\003\032\014\010\360\304\245\354\005\020\270\307\203\253\003\"\017businesschannel*@220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030`\305\355d\317\353I\ttw\211\364\014\316.\033\021\213\237\021\004\356EN" " +"2019-09-24 00:26:59.105 UTC [protoutils] validateEndorserTransaction -> DEBU 5491 validateEndorserTransaction info: there are 1 actions" +"2019-09-24 00:26:59.105 UTC [protoutils] validateEndorserTransaction -> DEBU 5492 validateEndorserTransaction info: signature header is valid" +"2019-09-24 00:26:59.105 UTC [protoutils] ValidateTransaction -> DEBU 5493 ValidateTransactionEnvelope returns err %!s()" +"2019-09-24 00:26:59.105 UTC [committer.txvalidator] validateTx -> DEBU 5494 Transaction is for channel businesschannel" +"2019-09-24 00:26:59.105 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5495 retrieveTransactionByID() - txId = [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7]" +"2019-09-24 00:26:59.105 UTC [committer.txvalidator] validateTx -> DEBU 5496 Validating transaction vscc tx validate" +"2019-09-24 00:26:59.105 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 5497 [businesschannel] VSCCValidateTx starts for bytes 0xc0030fd000" +"2019-09-24 00:26:59.105 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 5498 Validating Tx 220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" +"2019-09-24 00:26:59.105 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5499 constructing new query executor txid = [5a79080d-5440-4242-bae2-5ba7353ec07c]" +"2019-09-24 00:26:59.105 UTC [lockbasedtxmgr] Done -> DEBU 549a Done with transaction simulation / query execution [5a79080d-5440-4242-bae2-5ba7353ec07c]" +"2019-09-24 00:26:59.105 UTC [msp] DeserializeIdentity -> DEBU 549b Obtaining identity" +"2019-09-24 00:26:59.105 UTC [msp.identity] newIdentity -> DEBU 549c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE-----" +"2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 549d Obtaining identity" +"2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 549e Obtaining identity" +"2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 549f Obtaining identity" +"2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 54a0 Obtaining identity" +"2019-09-24 00:26:59.109 UTC [gossip.comm] Send -> DEBU 54a1 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4545 bytes, seq: 3}, Envelope: 4575 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 54a2 Obtaining identity" +"2019-09-24 00:26:59.109 UTC [msp] DeserializeIdentity -> DEBU 54a3 Obtaining identity" +"2019-09-24 00:26:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 54a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4545 bytes, seq: 3}, Envelope: 4575 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.109 UTC [gossip.comm] sendToEndpoint -> DEBU 54a5 Exiting" +"2019-09-24 00:26:59.115 UTC [cauthdsl] func1 -> DEBU 54a6 0xc003112f90 gate 1569284819115229000 evaluation starts" +"2019-09-24 00:26:59.115 UTC [cauthdsl] func2 -> DEBU 54a7 0xc003112f90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.115 UTC [cauthdsl] func2 -> DEBU 54a8 0xc003112f90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:59.115 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 54a9 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 00:26:59.116 UTC [msp] Validate -> DEBU 54aa MSP Org1MSP validating identity" +"2019-09-24 00:26:59.116 UTC [msp] getCertificationChain -> DEBU 54ab MSP Org1MSP getting certification chain" +"2019-09-24 00:26:59.117 UTC [cauthdsl] func2 -> DEBU 54ac 0xc003112f90 principal matched by identity 0" +"2019-09-24 00:26:59.117 UTC [msp.identity] Verify -> DEBU 54ad Verify: digest = 00000000 2c ee 09 fb 20 81 74 ef 40 b4 ee e8 35 e1 50 e7 |,... .t.@...5.P.| +00000010 cb 24 0b 6a 60 08 82 48 07 40 9b 52 1e a7 01 05 |.$.j`..H.@.R....|" +"2019-09-24 00:26:59.117 UTC [msp.identity] Verify -> DEBU 54ae Verify: sig = 00000000 30 45 02 21 00 9c e1 44 44 b6 e6 52 bd 97 bc 03 |0E.!...DD..R....| +00000010 44 ca ab d5 f7 a2 87 61 5c b2 cf a5 a9 87 bc 01 |D......a\.......| +00000020 17 c7 60 96 b2 02 20 12 a6 a9 c9 a3 94 54 1f 9b |..`... ......T..| +00000030 41 e0 d7 ff fa d0 51 4c 53 d6 bd 9d 58 1b fe ca |A.....QLS...X...| +00000040 e2 9a 38 b4 84 20 a8 |..8.. .|" +"2019-09-24 00:26:59.118 UTC [cauthdsl] func2 -> DEBU 54af 0xc003112f90 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:59.119 UTC [cauthdsl] func2 -> DEBU 54b0 0xc003112f90 signed by 1 principal evaluation starts (used [true])" +"2019-09-24 00:26:59.119 UTC [cauthdsl] func2 -> DEBU 54b1 0xc003112f90 skipping identity 0 because it has already been used" +"2019-09-24 00:26:59.119 UTC [cauthdsl] func2 -> DEBU 54b2 0xc003112f90 principal evaluation fails" +"2019-09-24 00:26:59.119 UTC [cauthdsl] func1 -> DEBU 54b3 0xc003112f90 gate 1569284819115229000 evaluation succeeds" +"2019-09-24 00:26:59.120 UTC [vscc] Validate -> DEBU 54b4 VSCC info: doing special validation for LSCC" +"2019-09-24 00:26:59.120 UTC [vscc] ValidateLSCCInvocation -> DEBU 54b5 VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +"2019-09-24 00:26:59.121 UTC [vscc] ValidateLSCCInvocation -> DEBU 54b6 VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +"2019-09-24 00:26:59.121 UTC [vscc] ValidateLSCCInvocation -> DEBU 54b7 Namespace exp02" +"2019-09-24 00:26:59.121 UTC [vscc] ValidateLSCCInvocation -> DEBU 54b8 Namespace lscc" +"2019-09-24 00:26:59.122 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 54b9 constructing new query executor txid = [c5e3085d-4181-43e6-a067-e35861e40531]" +"2019-09-24 00:26:59.123 UTC [stateleveldb] GetState -> DEBU 54ba GetState(). ns=lscc, key=exp02" +"2019-09-24 00:26:59.123 UTC [lockbasedtxmgr] Done -> DEBU 54bb Done with transaction simulation / query execution [c5e3085d-4181-43e6-a067-e35861e40531]" +"2019-09-24 00:26:59.123 UTC [vscc] ValidateLSCCInvocation -> DEBU 54bc Validating deploy for cc exp02 version 1.0" +"2019-09-24 00:26:59.123 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 54bd constructing new query executor txid = [ad7e0ec9-d589-4502-8dbd-1e10a3554733]" +"2019-09-24 00:26:59.124 UTC [stateleveldb] GetState -> DEBU 54be GetState(). ns=lscc, key=exp02~collection" +"2019-09-24 00:26:59.125 UTC [lockbasedtxmgr] Done -> DEBU 54bf Done with transaction simulation / query execution [ad7e0ec9-d589-4502-8dbd-1e10a3554733]" +"2019-09-24 00:26:59.125 UTC [cauthdsl] func1 -> DEBU 54c0 0xc003131450 gate 1569284819125638800 evaluation starts" +"2019-09-24 00:26:59.125 UTC [cauthdsl] func2 -> DEBU 54c1 0xc003131450 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.126 UTC [cauthdsl] func2 -> DEBU 54c2 0xc003131450 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:59.126 UTC [cauthdsl] func2 -> DEBU 54c3 0xc003131450 principal matched by identity 0" +"2019-09-24 00:26:59.127 UTC [msp.identity] Verify -> DEBU 54c4 Verify: digest = 00000000 15 f0 bf 5c dd b9 06 29 48 24 cd a2 db 84 36 74 |...\...)H$....6t| +00000010 4e b5 b9 83 45 11 38 fa 11 fe 61 65 4d e9 c7 c4 |N...E.8...aeM...|" +"2019-09-24 00:26:59.128 UTC [msp.identity] Verify -> DEBU 54c5 Verify: sig = 00000000 30 44 02 20 7a d3 96 7d 8e 27 11 63 1c 26 14 b5 |0D. z..}.'.c.&..| +00000010 bf 60 cc 45 a5 c4 dd 1e c0 d1 0a aa ff 65 1f 43 |.`.E.........e.C| +00000020 37 33 9a 86 02 20 4c 92 f4 c4 95 34 9c a1 db 0b |73... L....4....| +00000030 dc d5 2d 9d 34 9d 82 d2 a6 5d c9 ca b1 e9 2d a3 |..-.4....]....-.| +00000040 39 03 67 3b 57 25 |9.g;W%|" +"2019-09-24 00:26:59.128 UTC [cauthdsl] func2 -> DEBU 54c6 0xc003131450 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:59.130 UTC [cauthdsl] func2 -> DEBU 54c7 0xc003131450 signed by 1 principal evaluation starts (used [true])" +"2019-09-24 00:26:59.130 UTC [cauthdsl] func2 -> DEBU 54c8 0xc003131450 skipping identity 0 because it has already been used" +"2019-09-24 00:26:59.130 UTC [cauthdsl] func2 -> DEBU 54c9 0xc003131450 principal evaluation fails" +"2019-09-24 00:26:59.131 UTC [cauthdsl] func1 -> DEBU 54ca 0xc003131450 gate 1569284819125638800 evaluation succeeds" +"2019-09-24 00:26:59.131 UTC [vscc] Validate -> DEBU 54cb block 3, namespace: lscc, tx 0 validation results is: " +"2019-09-24 00:26:59.131 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 54cc Transaction 220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7 appears to be valid" +"2019-09-24 00:26:59.132 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 54cd [businesschannel] VSCCValidateTx completes env bytes 0xc0030fd000" +"2019-09-24 00:26:59.132 UTC [committer.txvalidator] validateTx -> DEBU 54ce [businesschannel] validateTx completes for block 0xc003206040 env 0xc002877270 txn 0" +"2019-09-24 00:26:59.132 UTC [committer.txvalidator] Validate -> DEBU 54cf got result for idx 0, code 0" +"2019-09-24 00:26:59.133 UTC [committer.txvalidator] Validate -> INFO 54d0 [businesschannel] Validated block [3] in 29ms" +"2019-09-24 00:26:59.134 UTC [gossip.privdata] listMissingPrivateData -> DEBU 54d1 Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 00:26:59.134 UTC [gossip.privdata] StoreBlock -> DEBU 54d2 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 00:26:59.135 UTC [kvledger] CommitWithPvtData -> DEBU 54d3 [businesschannel] Validating state for block [3]" +"2019-09-24 00:26:59.135 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 54d4 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 00:26:59.136 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 54d5 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 00:26:59.136 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 54d6 Validating new block with num trans = [1]" +"2019-09-24 00:26:59.136 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 54d7 ValidateAndPrepareBatch() for block number = [3]" +"2019-09-24 00:26:59.137 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 54d8 preprocessing ProtoBlock..." +"2019-09-24 00:26:59.137 UTC [valimpl] preprocessProtoBlock -> DEBU 54d9 txType=ENDORSER_TRANSACTION" +"2019-09-24 00:26:59.138 UTC [stateleveldb] GetState -> DEBU 54da GetState(). ns=lscc, key=exp02" +"2019-09-24 00:26:59.139 UTC [statebasedval] validateKVRead -> DEBU 54db Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-09-24 00:26:59.139 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 54dc Block [3] Transaction index [0] TxId [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7] marked as valid by state validator" +"2019-09-24 00:26:59.139 UTC [valinternal] ApplyWriteSet -> DEBU 54dd txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003207a00), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003207a40), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc003207a80)}" +"2019-09-24 00:26:59.140 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 54de validating rwset..." +"2019-09-24 00:26:59.140 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 54df postprocessing ProtoBlock..." +"2019-09-24 00:26:59.141 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 54e0 ValidateAndPrepareBatch() complete" +"2019-09-24 00:26:59.141 UTC [cceventmgmt] HandleStateUpdates -> DEBU 54e1 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc002900aa0)}}" +"2019-09-24 00:26:59.141 UTC [cceventmgmt] HandleStateUpdates -> INFO 54e2 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +"2019-09-24 00:26:59.142 UTC [stateleveldb] GetState -> DEBU 54e3 GetState(). ns=lscc, key=exp02~collection" +"2019-09-24 00:26:59.142 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 54e4 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +"2019-09-24 00:26:59.143 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU 54e5 Created metadata tar" +"2019-09-24 00:26:59.144 UTC [discovery.lifecycle] HandleChaincodeDeploy -> DEBU 54e6 Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}" +"2019-09-24 00:26:59.144 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 54e7 Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +"2019-09-24 00:26:59.145 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 54e8 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})}" +"2019-09-24 00:26:59.145 UTC [stateleveldb] GetState -> DEBU 54e9 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:26:59.146 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 54ea Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 205 43 158 117 226 166 116 102 194 42 212 5 125 161 50 224 142 64 59 162 160 27 245 157 217 195 25 80 186 189 209 254 2 32 126 155 150 99 124 249 156 64 139 91 202 156 219 247 52 205 187 204 55 94 183 166 15 108 209 135 89 253 84 105 50 8]} 0x1523f10}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002a222d0 0xc0028f6fc0 {{0 0} 0 0 0 0} {false}})]}" +"2019-09-24 00:26:59.146 UTC [stateleveldb] GetState -> DEBU 54eb GetState(). ns=lscc, key=exp02~collection" +"2019-09-24 00:26:59.147 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 54ec Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc0002c0b60})}" +"2019-09-24 00:26:59.147 UTC [kvledger] CommitWithPvtData -> DEBU 54ed [businesschannel] Adding CommitHash to the block [3]" +"2019-09-24 00:26:59.147 UTC [kvledger] CommitWithPvtData -> DEBU 54ee [businesschannel] Committing block [3] to storage" +"2019-09-24 00:26:59.147 UTC [ledgerstorage] CommitWithPvtData -> DEBU 54ef Writing block [3] to pvt block store" +"2019-09-24 00:26:59.149 UTC [pvtdatastorage] Prepare -> DEBU 54f0 Saved 0 private data write sets for block [3]" +"2019-09-24 00:26:59.151 UTC [fsblkstorage] indexBlock -> DEBU 54f1 Indexing block [blockNum=3, blockHash=[]byte{0x4a, 0x1f, 0x9f, 0xdf, 0xb8, 0xd6, 0xb4, 0xc9, 0xe9, 0xdf, 0x1, 0x15, 0xf0, 0x70, 0xf5, 0xce, 0xa4, 0xda, 0xbc, 0x48, 0x8d, 0x5e, 0xb5, 0x2, 0x42, 0x64, 0xc9, 0x8a, 0x87, 0x31, 0x17, 0x5e} txOffsets= +txId=220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7 locPointer=offset=70, bytesLength=3524 +]" +"2019-09-24 00:26:59.151 UTC [fsblkstorage] indexBlock -> DEBU 54f2 Adding txLoc [fileSuffixNum=0, offset=71532, bytesLength=3524] for tx ID: [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7] to txid-index" +"2019-09-24 00:26:59.152 UTC [fsblkstorage] indexBlock -> DEBU 54f3 Adding txLoc [fileSuffixNum=0, offset=71532, bytesLength=3524] for tx number:[0] ID: [220bb88b1493ed8a7e679519ab2403bde4d6879adba07ce25610efb09b55cbf7] to blockNumTranNum index" +"2019-09-24 00:26:59.153 UTC [fsblkstorage] updateCheckpoint -> DEBU 54f4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76029], isChainEmpty=[false], lastBlockNumber=[3]" +"2019-09-24 00:26:59.153 UTC [pvtdatastorage] Commit -> DEBU 54f5 Committing private data for block [3]" +"2019-09-24 00:26:59.154 UTC [pvtdatastorage] Commit -> DEBU 54f6 Committed private data for block [3]" +"2019-09-24 00:26:59.155 UTC [kvledger] CommitWithPvtData -> DEBU 54f7 [businesschannel] Committing block [3] transactions to state database" +"2019-09-24 00:26:59.155 UTC [lockbasedtxmgr] Commit -> DEBU 54f8 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 00:26:59.155 UTC [lockbasedtxmgr] Commit -> DEBU 54f9 Committing updates to state database" +"2019-09-24 00:26:59.155 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 54fa Building the expiry schedules based on the update batch" +"2019-09-24 00:26:59.155 UTC [lockbasedtxmgr] Commit -> DEBU 54fb Write lock acquired for committing updates to state database" +"2019-09-24 00:26:59.155 UTC [stateleveldb] ApplyUpdates -> DEBU 54fc Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-09-24 00:26:59.156 UTC [stateleveldb] ApplyUpdates -> DEBU 54fd Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-09-24 00:26:59.156 UTC [stateleveldb] ApplyUpdates -> DEBU 54fe Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}]" +"2019-09-24 00:26:59.157 UTC [lockbasedtxmgr] Commit -> DEBU 54ff Updates committed to state database and the write lock is released" +"2019-09-24 00:26:59.157 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5500 Preparing potential purge list working-set for expiringAtBlk [4]" +"2019-09-24 00:26:59.158 UTC [leveldbhelper] GetIterator -> DEBU 5503 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" +"2019-09-24 00:26:59.158 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5501 constructing new query executor txid = [eb6e9761-ab12-4dc7-8b5f-59e722931d13]" +"2019-09-24 00:26:59.158 UTC [discovery.lifecycle] queryChaincodeDefinitions -> DEBU 5504 Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]" +"2019-09-24 00:26:59.158 UTC [stateleveldb] GetState -> DEBU 5505 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:26:59.159 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 5506 Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}]" +"2019-09-24 00:26:59.159 UTC [lockbasedtxmgr] Done -> DEBU 5507 Done with transaction simulation / query execution [eb6e9761-ab12-4dc7-8b5f-59e722931d13]" +"2019-09-24 00:26:59.159 UTC [discovery.lifecycle] processPendingUpdate -> DEBU 5508 Updating channel businesschannel with [name:"exp02" version:"1.0" ]" +"2019-09-24 00:26:59.159 UTC [msp] GetDefaultSigningIdentity -> DEBU 5509 Obtaining default signing identity" +"2019-09-24 00:26:59.159 UTC [msp.identity] Sign -> DEBU 550a Sign: plaintext: 18057A6C1214089096D4ACDE83CEE315...08031A0C0A0565787030321203312E30 " +"2019-09-24 00:26:59.159 UTC [msp.identity] Sign -> DEBU 550b Sign: digest: F5FEDC31C929159FE962EE75FBEED4CF774DF23360B8FAE9CFD21D8C9AC63230 " +"2019-09-24 00:26:59.160 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 550c Listeners for channel businesschannel invoked" +"2019-09-24 00:26:59.158 UTC [lockbasedtxmgr] func1 -> DEBU 5502 launched the background routine for preparing keys to purge with the next block" +"2019-09-24 00:26:59.160 UTC [kvledger] CommitWithPvtData -> DEBU 550d [businesschannel] Committing block [3] transactions to history database" +"2019-09-24 00:26:59.160 UTC [historyleveldb] Commit -> DEBU 550e Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" +"2019-09-24 00:26:59.158 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 550f No expiry entry found for expiringAtBlk [4]" +"2019-09-24 00:26:59.162 UTC [historyleveldb] Commit -> DEBU 5510 Channel [businesschannel]: Updates committed to history database for blockNo [3]" +"2019-09-24 00:26:59.162 UTC [kvledger] CommitWithPvtData -> INFO 5511 [businesschannel] Committed block [3] with 1 transaction(s) in 27ms (state_validation=11ms block_and_pvtdata_commit=7ms state_commit=5ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +"2019-09-24 00:26:59.162 UTC [msp] GetDefaultSigningIdentity -> DEBU 5512 Obtaining default signing identity" +"2019-09-24 00:26:59.163 UTC [msp.identity] Sign -> DEBU 5513 Sign: plaintext: 18057A6C1214089096D4ACDE83CEE315...08041A0C0A0565787030321203312E30 " +"2019-09-24 00:26:59.163 UTC [msp.identity] Sign -> DEBU 5514 Sign: digest: F2C6D9C5A2537E4360844BCD73DBDDBCB5FDB085493D4E005AEDFCC6DC58C2D1 " +"2019-09-24 00:26:59.163 UTC [gossip.state] commitBlock -> DEBU 5515 [businesschannel] Committed block [3] with 1 transaction(s)" +"2019-09-24 00:26:59.583 UTC [msp] GetDefaultSigningIdentity -> DEBU 5516 Obtaining default signing identity" +"2019-09-24 00:26:59.584 UTC [msp.identity] Sign -> DEBU 5517 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151048 " +"2019-09-24 00:26:59.584 UTC [msp.identity] Sign -> DEBU 5518 Sign: digest: BD59A898D2539C262D6629D39373F5B0FDA20554820D677084FFCF57DFD7FF2C " +"2019-09-24 00:26:59.585 UTC [msp] GetDefaultSigningIdentity -> DEBU 5519 Obtaining default signing identity" +"2019-09-24 00:26:59.586 UTC [msp.identity] Sign -> DEBU 551a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:59.586 UTC [msp.identity] Sign -> DEBU 551b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:59.586 UTC [gossip.discovery] periodicalSendAlive -> DEBU 551c Sleeping 5s" +"2019-09-24 00:26:59.589 UTC [msp] DeserializeIdentity -> DEBU 551d Obtaining identity" +"2019-09-24 00:26:59.590 UTC [msp] DeserializeIdentity -> DEBU 551e Obtaining identity" +"2019-09-24 00:26:59.590 UTC [msp] DeserializeIdentity -> DEBU 551f Obtaining identity" +"2019-09-24 00:26:59.590 UTC [gossip.comm] Send -> DEBU 5520 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:59.591 UTC [msp] DeserializeIdentity -> DEBU 5521 Obtaining identity" +"2019-09-24 00:26:59.591 UTC [gossip.comm] Send -> DEBU 5522 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:59.591 UTC [gossip.comm] Send -> DEBU 5523 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:59.592 UTC [gossip.comm] sendToEndpoint -> DEBU 5524 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.592 UTC [gossip.comm] sendToEndpoint -> DEBU 5525 Exiting" +"2019-09-24 00:26:59.592 UTC [gossip.comm] sendToEndpoint -> DEBU 5526 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.593 UTC [gossip.comm] sendToEndpoint -> DEBU 5527 Exiting" +"2019-09-24 00:26:59.593 UTC [gossip.comm] sendToEndpoint -> DEBU 5528 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.593 UTC [gossip.comm] sendToEndpoint -> DEBU 5529 Exiting" +"2019-09-24 00:26:59.707 UTC [gossip.pull] Hello -> DEBU 552a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:26:59.708 UTC [gossip.comm] Send -> DEBU 552b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:59.708 UTC [gossip.pull] Hello -> DEBU 552c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:26:59.708 UTC [gossip.comm] Send -> DEBU 552d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:59.708 UTC [gossip.pull] Hello -> DEBU 552e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:26:59.708 UTC [gossip.comm] Send -> DEBU 552f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:59.708 UTC [gossip.comm] sendToEndpoint -> DEBU 5530 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.709 UTC [gossip.comm] sendToEndpoint -> DEBU 5531 Exiting" +"2019-09-24 00:26:59.709 UTC [gossip.comm] sendToEndpoint -> DEBU 5532 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.709 UTC [gossip.comm] sendToEndpoint -> DEBU 5533 Exiting" +"2019-09-24 00:26:59.709 UTC [gossip.comm] sendToEndpoint -> DEBU 5534 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.710 UTC [gossip.comm] sendToEndpoint -> DEBU 5535 Exiting" +"2019-09-24 00:26:59.711 UTC [gossip.comm] func1 -> DEBU 5536 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.711 UTC [gossip.gossip] handleMessage -> DEBU 5537 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.711 UTC [gossip.pull] HandleMessage -> DEBU 5538 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.712 UTC [gossip.gossip] handleMessage -> DEBU 5539 Exiting" +"2019-09-24 00:26:59.712 UTC [gossip.comm] func1 -> DEBU 553a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.712 UTC [gossip.gossip] handleMessage -> DEBU 553b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.712 UTC [gossip.pull] HandleMessage -> DEBU 553c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.712 UTC [gossip.gossip] handleMessage -> DEBU 553d Exiting" +"2019-09-24 00:26:59.713 UTC [gossip.gossip] handleMessage -> DEBU 553e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.713 UTC [gossip.pull] HandleMessage -> DEBU 553f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.713 UTC [gossip.gossip] handleMessage -> DEBU 5540 Exiting" +"2019-09-24 00:26:59.717 UTC [endorser] ProcessProposal -> DEBU 5541 Entering: request from 172.18.0.9:50978" +"2019-09-24 00:26:59.718 UTC [protoutils] ValidateProposalMessage -> DEBU 5542 ValidateProposalMessage starts for signed proposal 0xc0029740a0" +"2019-09-24 00:26:59.718 UTC [protoutils] validateChannelHeader -> DEBU 5543 validateChannelHeader info: header type 3" +"2019-09-24 00:26:59.719 UTC [protoutils] checkSignatureFromCreator -> DEBU 5544 begin" +"2019-09-24 00:26:59.719 UTC [msp] GetManagerForChain -> DEBU 5545 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:26:59.719 UTC [protoutils] checkSignatureFromCreator -> DEBU 5546 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:26:59.719 UTC [protoutils] checkSignatureFromCreator -> DEBU 5547 creator is valid" +"2019-09-24 00:26:59.719 UTC [msp.identity] Verify -> DEBU 5548 Verify: digest = 00000000 3b 02 66 ee c6 9d a6 20 78 77 ac bd 12 0c 4a 62 |;.f.... xw....Jb| +00000010 02 9b 83 92 88 ff 16 96 f1 92 b5 c2 3e 4d a3 b9 |............>M..|" +"2019-09-24 00:26:59.720 UTC [msp.identity] Verify -> DEBU 5549 Verify: sig = 00000000 30 44 02 20 0a 42 b0 54 64 b8 b6 42 d4 3b 1b 30 |0D. .B.Td..B.;.0| +00000010 2b 3c d6 51 46 60 cc 08 9d f3 f6 2d 06 44 80 1e |+<.QF`.....-.D..| +00000020 4f 33 f1 30 02 20 0a 84 84 ed db 1a 71 76 1d 00 |O3.0. ......qv..| +00000030 a2 13 f1 fb ae 7a 2f 6c dd 47 32 ed 8f 62 c9 55 |.....z/l.G2..b.U| +00000040 4c a5 9c ca 9f 8d |L.....|" +"2019-09-24 00:26:59.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 554a exits successfully" +"2019-09-24 00:26:59.720 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 554b validateChaincodeProposalMessage starts for proposal 0xc002705ea0, header 0xc002974550" +"2019-09-24 00:26:59.720 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 554c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 00:26:59.720 UTC [endorser] preProcess -> DEBU 554d [businesschannel][8f136052] processing txid: 8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072" +"2019-09-24 00:26:59.721 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 554e retrieveTransactionByID() - txId = [8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072]" +"2019-09-24 00:26:59.721 UTC [aclmgmt] CheckACL -> DEBU 554f acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 00:26:59.721 UTC [aclmgmt] CheckACL -> DEBU 5550 acl check(/Channel/Application/Writers)" +"2019-09-24 00:26:59.721 UTC [policies] Evaluate -> DEBU 5551 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:26:59.721 UTC [policies] Evaluate -> DEBU 5552 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:59.722 UTC [policies] Evaluate -> DEBU 5553 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:26:59.722 UTC [cauthdsl] func1 -> DEBU 5554 0xc003296b30 gate 1569284819722172200 evaluation starts" +"2019-09-24 00:26:59.722 UTC [cauthdsl] func2 -> DEBU 5555 0xc003296b30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.722 UTC [cauthdsl] func2 -> DEBU 5556 0xc003296b30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:59.722 UTC [cauthdsl] func2 -> DEBU 5557 0xc003296b30 principal matched by identity 0" +"2019-09-24 00:26:59.722 UTC [msp.identity] Verify -> DEBU 5558 Verify: digest = 00000000 3b 02 66 ee c6 9d a6 20 78 77 ac bd 12 0c 4a 62 |;.f.... xw....Jb| +00000010 02 9b 83 92 88 ff 16 96 f1 92 b5 c2 3e 4d a3 b9 |............>M..|" +"2019-09-24 00:26:59.723 UTC [msp.identity] Verify -> DEBU 5559 Verify: sig = 00000000 30 44 02 20 0a 42 b0 54 64 b8 b6 42 d4 3b 1b 30 |0D. .B.Td..B.;.0| +00000010 2b 3c d6 51 46 60 cc 08 9d f3 f6 2d 06 44 80 1e |+<.QF`.....-.D..| +00000020 4f 33 f1 30 02 20 0a 84 84 ed db 1a 71 76 1d 00 |O3.0. ......qv..| +00000030 a2 13 f1 fb ae 7a 2f 6c dd 47 32 ed 8f 62 c9 55 |.....z/l.G2..b.U| +00000040 4c a5 9c ca 9f 8d |L.....|" +"2019-09-24 00:26:59.723 UTC [cauthdsl] func2 -> DEBU 555a 0xc003296b30 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:59.723 UTC [cauthdsl] func1 -> DEBU 555b 0xc003296b30 gate 1569284819722172200 evaluation succeeds" +"2019-09-24 00:26:59.723 UTC [policies] Evaluate -> DEBU 555c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:26:59.724 UTC [policies] Evaluate -> DEBU 555d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:26:59.724 UTC [policies] Evaluate -> DEBU 555e Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:26:59.724 UTC [policies] Evaluate -> DEBU 555f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:26:59.724 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5560 constructing new tx simulator" +"2019-09-24 00:26:59.725 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5561 constructing new tx simulator txid = [8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072]" +"2019-09-24 00:26:59.725 UTC [endorser] SimulateProposal -> DEBU 5562 [businesschannel][8f136052] Entry chaincode: name:"exp02" " +"2019-09-24 00:26:59.725 UTC [stateleveldb] GetState -> DEBU 5563 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:26:59.726 UTC [ccprovider] GetChaincodeData -> DEBU 5564 Getting chaincode data for from cache" +"2019-09-24 00:26:59.727 UTC [endorser] callChaincode -> INFO 5565 [businesschannel][8f136052] Entry chaincode: name:"exp02" " +"2019-09-24 00:26:59.728 UTC [chaincode] Execute -> DEBU 5566 Entry" +"2019-09-24 00:26:59.729 UTC [chaincode] handleMessage -> DEBU 5567 [8f136052] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:26:59.729 UTC [chaincode] HandleTransaction -> DEBU 5568 [8f136052] handling GET_STATE from chaincode" +"2019-09-24 00:26:59.729 UTC [chaincode] HandleGetState -> DEBU 5569 [8f136052] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 00:26:59.730 UTC [stateleveldb] GetState -> DEBU 556a GetState(). ns=exp02, key=a" +"2019-09-24 00:26:59.730 UTC [chaincode] HandleTransaction -> DEBU 556b [8f136052] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:26:59.730 UTC [chaincode] handleMessage -> DEBU 556c [8f136052] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:26:59.731 UTC [chaincode] Notify -> DEBU 556d [8f136052] notifying Txid:8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072, channelID:businesschannel" +"2019-09-24 00:26:59.731 UTC [chaincode] Execute -> DEBU 556e Exit" +"2019-09-24 00:26:59.731 UTC [endorser] callChaincode -> INFO 556f [businesschannel][8f136052] Exit chaincode: name:"exp02" (3ms)" +"2019-09-24 00:26:59.731 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5570 Simulation completed, getting simulation results" +"2019-09-24 00:26:59.731 UTC [lockbasedtxmgr] Done -> DEBU 5571 Done with transaction simulation / query execution [8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072]" +"2019-09-24 00:26:59.731 UTC [endorser] SimulateProposal -> DEBU 5572 [businesschannel][8f136052] Exit" +"2019-09-24 00:26:59.732 UTC [endorser] endorseProposal -> DEBU 5573 [businesschannel][8f136052] Entry chaincode: name:"exp02" " +"2019-09-24 00:26:59.732 UTC [endorser] endorseProposal -> DEBU 5574 [businesschannel][8f136052] escc for chaincode name:"exp02" is escc" +"2019-09-24 00:26:59.732 UTC [endorser] EndorseWithPlugin -> DEBU 5575 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072, chaincode: exp02}" +"2019-09-24 00:26:59.732 UTC [msp.identity] Sign -> DEBU 5576 Sign: plaintext: 0A20CCC2C0B7640EC66E628140E3198F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:26:59.732 UTC [msp.identity] Sign -> DEBU 5577 Sign: digest: 5EEDCEB720A495755E3C19BC26CF37727DB02358225CCB17B605ED9DE27CFD5B " +"2019-09-24 00:26:59.733 UTC [endorser] EndorseWithPlugin -> DEBU 5578 Exiting {plugin: escc, channel: businesschannel, tx: 8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072, chaincode: exp02}" +"2019-09-24 00:26:59.733 UTC [endorser] endorseProposal -> DEBU 5579 [businesschannel][8f136052] Exit" +"2019-09-24 00:26:59.733 UTC [lockbasedtxmgr] Done -> DEBU 557a Done with transaction simulation / query execution [8f136052d84258da61cfc3644782fba1da22334983dc0adfd300f860bfebb072]" +"2019-09-24 00:26:59.733 UTC [endorser] func1 -> DEBU 557b Exit: request from 172.18.0.9:50978" +"2019-09-24 00:26:59.734 UTC [comm.grpc.server] 1 -> INFO 557c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50978 grpc.code=OK grpc.call_duration=16.4175ms +"2019-09-24 00:26:59.737 UTC [grpc] infof -> DEBU 557d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:26:59.737 UTC [grpc] infof -> DEBU 557e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:26:59.845 UTC [msp] GetDefaultSigningIdentity -> DEBU 557f Obtaining default signing identity" +"2019-09-24 00:26:59.845 UTC [msp.identity] Sign -> DEBU 5580 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151049 " +"2019-09-24 00:26:59.845 UTC [msp.identity] Sign -> DEBU 5581 Sign: digest: 71D2230F3638FEC95FB125487C4DB245839D26BE02585EBD0E7D2C613EACBF1C " +"2019-09-24 00:26:59.845 UTC [msp] GetDefaultSigningIdentity -> DEBU 5582 Obtaining default signing identity" +"2019-09-24 00:26:59.846 UTC [msp.identity] Sign -> DEBU 5583 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:26:59.846 UTC [msp.identity] Sign -> DEBU 5584 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:26:59.846 UTC [gossip.comm] Send -> DEBU 5585 Entering, sending GossipMessage: tag:EMPTY mem_req:0cza&\034\314\221\377\211\316\304\210P\002 \032\363\317\355\276:\357\366\252\r\272\276\r0\037P\366\302\025\377A\325\373\017W\016\031vi\371\305\325" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:59.846 UTC [msp] DeserializeIdentity -> DEBU 5586 Obtaining identity" +"2019-09-24 00:26:59.847 UTC [gossip.comm] Send -> DEBU 5587 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:59.847 UTC [msp] DeserializeIdentity -> DEBU 5588 Obtaining identity" +"2019-09-24 00:26:59.847 UTC [gossip.comm] Send -> DEBU 5589 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:26:59.850 UTC [gossip.comm] sendToEndpoint -> DEBU 558a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.850 UTC [gossip.comm] sendToEndpoint -> DEBU 558b Exiting" +"2019-09-24 00:26:59.851 UTC [gossip.comm] sendToEndpoint -> DEBU 558c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:0cza&\034\314\221\377\211\316\304\210P\002 \032\363\317\355\276:\357\366\252\r\272\276\r0\037P\366\302\025\377A\325\373\017W\016\031vi\371\305\325" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.851 UTC [gossip.comm] sendToEndpoint -> DEBU 558d Exiting" +"2019-09-24 00:26:59.851 UTC [gossip.comm] sendToEndpoint -> DEBU 558e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.852 UTC [gossip.comm] sendToEndpoint -> DEBU 558f Exiting" +"2019-09-24 00:26:59.854 UTC [gossip.comm] func1 -> DEBU 5590 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.855 UTC [gossip.gossip] handleMessage -> DEBU 5591 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.855 UTC [gossip.gossip] handleMessage -> DEBU 5592 Exiting" +"2019-09-24 00:26:59.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5593 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.855 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5594 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:59.856 UTC [msp.identity] Verify -> DEBU 5595 Verify: digest = 00000000 71 d2 23 0f 36 38 fe c9 5f b1 25 48 7c 4d b2 45 |q.#.68.._.%H|M.E| +00000010 83 9d 26 be 02 58 5e bd 0e 7d 2c 61 3e ac bf 1c |..&..X^..},a>...|" +"2019-09-24 00:26:59.856 UTC [msp.identity] Verify -> DEBU 5596 Verify: sig = 00000000 30 44 02 20 56 55 80 bc ed 0b 6e ee 84 e4 69 66 |0D. VU....n...if| +00000010 e2 98 8b c6 af d6 7b b6 b2 e1 d1 08 c6 47 ad ec |......{......G..| +00000020 d7 72 f6 e3 02 20 40 69 0c bc e5 44 59 cc 64 04 |.r... @i...DY.d.| +00000030 61 11 da 04 97 7e 47 d2 04 06 a0 db 8e dd 4b 11 |a....~G.......K.| +00000040 ff 55 9a 9a 25 b0 |.U..%.|" +"2019-09-24 00:26:59.856 UTC [msp.identity] Verify -> DEBU 5597 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:26:59.856 UTC [msp.identity] Verify -> DEBU 5598 Verify: sig = 00000000 30 45 02 21 00 b8 f6 f8 35 68 1e 5d 47 b0 0b 82 |0E.!....5h.]G...| +00000010 b5 bd 8a 1e c0 c5 3e 30 63 7a 61 26 1c cc 91 ff |......>0cza&....| +00000020 89 ce c4 88 50 02 20 1a f3 cf ed be 3a ef f6 aa |....P. .....:...| +00000030 0d ba be 0d 30 1f 50 f6 c2 15 ff 41 d5 fb 0f 57 |....0.P....A...W| +00000040 0e 19 76 69 f9 c5 d5 |..vi...|" +"2019-09-24 00:26:59.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 5599 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:59.857 UTC [gossip.discovery] isSentByMe -> DEBU 559a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:26:59.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 559b Exiting" +"2019-09-24 00:26:59.857 UTC [gossip.discovery] handleMsgFromComm -> DEBU 559c Exiting" +"2019-09-24 00:26:59.858 UTC [gossip.comm] func1 -> DEBU 559d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.858 UTC [gossip.gossip] handleMessage -> DEBU 559e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.858 UTC [gossip.gossip] handleMessage -> DEBU 559f Exiting" +"2019-09-24 00:26:59.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55a0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.858 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55a1 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:59.859 UTC [msp.identity] Verify -> DEBU 55a2 Verify: digest = 00000000 71 d2 23 0f 36 38 fe c9 5f b1 25 48 7c 4d b2 45 |q.#.68.._.%H|M.E| +00000010 83 9d 26 be 02 58 5e bd 0e 7d 2c 61 3e ac bf 1c |..&..X^..},a>...|" +"2019-09-24 00:26:59.859 UTC [msp.identity] Verify -> DEBU 55a3 Verify: sig = 00000000 30 44 02 20 56 55 80 bc ed 0b 6e ee 84 e4 69 66 |0D. VU....n...if| +00000010 e2 98 8b c6 af d6 7b b6 b2 e1 d1 08 c6 47 ad ec |......{......G..| +00000020 d7 72 f6 e3 02 20 40 69 0c bc e5 44 59 cc 64 04 |.r... @i...DY.d.| +00000030 61 11 da 04 97 7e 47 d2 04 06 a0 db 8e dd 4b 11 |a....~G.......K.| +00000040 ff 55 9a 9a 25 b0 |.U..%.|" +"2019-09-24 00:26:59.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 55a4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:59.859 UTC [gossip.discovery] isSentByMe -> DEBU 55a5 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:59.860 UTC [gossip.discovery] handleAliveMessage -> DEBU 55a6 Exiting" +"2019-09-24 00:26:59.860 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55a7 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:59.860 UTC [msp] DeserializeIdentity -> DEBU 55a8 Obtaining identity" +"2019-09-24 00:26:59.860 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 55a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:59.861 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 55aa Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:59.861 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 55ab Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:59.861 UTC [policies] Evaluate -> DEBU 55ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:59.861 UTC [policies] Evaluate -> DEBU 55ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:59.862 UTC [policies] Evaluate -> DEBU 55ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:59.862 UTC [cauthdsl] func1 -> DEBU 55af 0xc003388870 gate 1569284819862437500 evaluation starts" +"2019-09-24 00:26:59.862 UTC [cauthdsl] func2 -> DEBU 55b0 0xc003388870 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.863 UTC [cauthdsl] func2 -> DEBU 55b1 0xc003388870 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:59.863 UTC [cauthdsl] func2 -> DEBU 55b2 0xc003388870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:59.863 UTC [cauthdsl] func2 -> DEBU 55b3 0xc003388870 principal evaluation fails" +"2019-09-24 00:26:59.863 UTC [cauthdsl] func1 -> DEBU 55b4 0xc003388870 gate 1569284819862437500 evaluation fails" +"2019-09-24 00:26:59.863 UTC [policies] Evaluate -> DEBU 55b5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:59.864 UTC [policies] Evaluate -> DEBU 55b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:59.864 UTC [policies] Evaluate -> DEBU 55b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:59.864 UTC [cauthdsl] func1 -> DEBU 55b8 0xc0033890b0 gate 1569284819864741200 evaluation starts" +"2019-09-24 00:26:59.864 UTC [cauthdsl] func2 -> DEBU 55b9 0xc0033890b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.865 UTC [cauthdsl] func2 -> DEBU 55ba 0xc0033890b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:59.865 UTC [cauthdsl] func2 -> DEBU 55bb 0xc0033890b0 principal matched by identity 0" +"2019-09-24 00:26:59.865 UTC [msp.identity] Verify -> DEBU 55bc Verify: digest = 00000000 72 e1 88 9c 25 89 8b 20 bf e7 d1 f5 e1 33 cc c6 |r...%.. .....3..| +00000010 db 65 54 00 27 22 5e 48 5b 06 9e 06 a7 50 55 b3 |.eT.'"^H[....PU.|" +"2019-09-24 00:26:59.865 UTC [msp.identity] Verify -> DEBU 55bd Verify: sig = 00000000 30 44 02 20 58 e0 29 7b f2 d5 15 99 da 3b 91 bb |0D. X.){.....;..| +00000010 e8 3d 99 b1 78 a5 f4 0c 72 62 97 25 48 d0 a2 5a |.=..x...rb.%H..Z| +00000020 75 fc 06 aa 02 20 08 99 a5 8d 7e 33 e1 f7 b2 4d |u.... ....~3...M| +00000030 6a 25 ac 11 8f 99 fe ad 9a 4a 91 28 fe d8 cb 84 |j%.......J.(....| +00000040 47 b7 e5 81 fa 62 |G....b|" +"2019-09-24 00:26:59.866 UTC [cauthdsl] func2 -> DEBU 55be 0xc0033890b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:59.866 UTC [cauthdsl] func1 -> DEBU 55bf 0xc0033890b0 gate 1569284819864741200 evaluation succeeds" +"2019-09-24 00:26:59.866 UTC [policies] Evaluate -> DEBU 55c0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:59.866 UTC [policies] Evaluate -> DEBU 55c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:59.866 UTC [policies] Evaluate -> DEBU 55c2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:59.867 UTC [policies] Evaluate -> DEBU 55c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:59.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 55c4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:59.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 55c5 Exiting" +"2019-09-24 00:26:59.867 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55c6 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:59.867 UTC [msp.identity] Verify -> DEBU 55c7 Verify: digest = 00000000 bc 4b da 1a 0e 27 33 ce bb 7e af 9d 12 c8 7b 2a |.K...'3..~....{*| +00000010 37 ab 75 ef bb 5a a7 5e 73 7c 57 a1 70 a8 43 2f |7.u..Z.^s|W.p.C/|" +"2019-09-24 00:26:59.867 UTC [msp.identity] Verify -> DEBU 55c8 Verify: sig = 00000000 30 44 02 20 3b b3 e7 b7 d9 9f 2b e6 6a 20 3a 67 |0D. ;.....+.j :g| +00000010 35 37 22 c8 83 d8 85 68 c7 46 2d 42 a6 80 b7 81 |57"....h.F-B....| +00000020 82 20 4c ab 02 20 72 45 31 63 ed 86 e9 d4 a4 ad |. L.. rE1c......| +00000030 93 bf 57 d8 19 d2 b0 60 f2 fd ef 5b 03 38 a2 2f |..W....`...[.8./| +00000040 ba 4d 73 d5 1c 47 |.Ms..G|" +"2019-09-24 00:26:59.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 55c9 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:59.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 55ca Exiting" +"2019-09-24 00:26:59.867 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55cb Exiting" +"2019-09-24 00:26:59.867 UTC [gossip.gossip] handleMessage -> DEBU 55cc Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.867 UTC [gossip.gossip] handleMessage -> DEBU 55cd Exiting" +"2019-09-24 00:26:59.867 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55ce Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.867 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55cf Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:26:59.867 UTC [msp.identity] Verify -> DEBU 55d0 Verify: digest = 00000000 71 d2 23 0f 36 38 fe c9 5f b1 25 48 7c 4d b2 45 |q.#.68.._.%H|M.E| +00000010 83 9d 26 be 02 58 5e bd 0e 7d 2c 61 3e ac bf 1c |..&..X^..},a>...|" +"2019-09-24 00:26:59.867 UTC [msp.identity] Verify -> DEBU 55d1 Verify: sig = 00000000 30 44 02 20 56 55 80 bc ed 0b 6e ee 84 e4 69 66 |0D. VU....n...if| +00000010 e2 98 8b c6 af d6 7b b6 b2 e1 d1 08 c6 47 ad ec |......{......G..| +00000020 d7 72 f6 e3 02 20 40 69 0c bc e5 44 59 cc 64 04 |.r... @i...DY.d.| +00000030 61 11 da 04 97 7e 47 d2 04 06 a0 db 8e dd 4b 11 |a....~G.......K.| +00000040 ff 55 9a 9a 25 b0 |.U..%.|" +"2019-09-24 00:26:59.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 55d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:59.868 UTC [gossip.discovery] isSentByMe -> DEBU 55d3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:59.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 55d4 Exiting" +"2019-09-24 00:26:59.868 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55d5 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:26:59.868 UTC [msp] DeserializeIdentity -> DEBU 55d6 Obtaining identity" +"2019-09-24 00:26:59.868 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 55d7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:59.868 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 55d8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:59.868 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 55d9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:59.868 UTC [cauthdsl] func1 -> DEBU 55dd 0xc0035d0480 gate 1569284819868479100 evaluation starts" +"2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55de 0xc0035d0480 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55df 0xc0035d0480 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55e0 0xc0035d0480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55e1 0xc0035d0480 principal evaluation fails" +"2019-09-24 00:26:59.868 UTC [cauthdsl] func1 -> DEBU 55e2 0xc0035d0480 gate 1569284819868479100 evaluation fails" +"2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55e3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:59.868 UTC [policies] Evaluate -> DEBU 55e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:59.868 UTC [cauthdsl] func1 -> DEBU 55e6 0xc0035d0cf0 gate 1569284819868731200 evaluation starts" +"2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55e7 0xc0035d0cf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55e8 0xc0035d0cf0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55e9 0xc0035d0cf0 principal matched by identity 0" +"2019-09-24 00:26:59.868 UTC [msp.identity] Verify -> DEBU 55ea Verify: digest = 00000000 d6 ac 34 f6 6a 63 e1 ea 4a 28 fa 89 28 0c 32 c3 |..4.jc..J(..(.2.| +00000010 77 0c 7b 38 ae 8a 97 6c 39 95 9d 2b 4a a1 f5 98 |w.{8...l9..+J...|" +"2019-09-24 00:26:59.868 UTC [msp.identity] Verify -> DEBU 55eb Verify: sig = 00000000 30 45 02 21 00 9a 81 a4 93 16 50 c1 43 79 7d a8 |0E.!......P.Cy}.| +00000010 f4 00 82 34 42 9c 8b 74 31 ef 2f 3f cc c9 ab 14 |...4B..t1./?....| +00000020 65 25 3a 17 51 02 20 4b ee 35 be 4f 7e 2d de 76 |e%:.Q. K.5.O~-.v| +00000030 9d fe 43 fe a3 6e ee a8 a3 95 d9 9a b8 07 b9 0d |..C..n..........| +00000040 dd b1 e6 27 af 88 e1 |...'...|" +"2019-09-24 00:26:59.868 UTC [cauthdsl] func2 -> DEBU 55ec 0xc0035d0cf0 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:59.869 UTC [cauthdsl] func1 -> DEBU 55ed 0xc0035d0cf0 gate 1569284819868731200 evaluation succeeds" +"2019-09-24 00:26:59.869 UTC [policies] Evaluate -> DEBU 55ee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:59.869 UTC [policies] Evaluate -> DEBU 55ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:59.869 UTC [policies] Evaluate -> DEBU 55f0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:59.869 UTC [policies] Evaluate -> DEBU 55f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:59.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 55f2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 55f3 Exiting" +"2019-09-24 00:26:59.869 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 55f4 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:26:59.869 UTC [msp.identity] Verify -> DEBU 55f5 Verify: digest = 00000000 bc 4b da 1a 0e 27 33 ce bb 7e af 9d 12 c8 7b 2a |.K...'3..~....{*| +00000010 37 ab 75 ef bb 5a a7 5e 73 7c 57 a1 70 a8 43 2f |7.u..Z.^s|W.p.C/|" +"2019-09-24 00:26:59.869 UTC [msp.identity] Verify -> DEBU 55f6 Verify: sig = 00000000 30 44 02 20 3b b3 e7 b7 d9 9f 2b e6 6a 20 3a 67 |0D. ;.....+.j :g| +00000010 35 37 22 c8 83 d8 85 68 c7 46 2d 42 a6 80 b7 81 |57"....h.F-B....| +00000020 82 20 4c ab 02 20 72 45 31 63 ed 86 e9 d4 a4 ad |. L.. rE1c......| +00000030 93 bf 57 d8 19 d2 b0 60 f2 fd ef 5b 03 38 a2 2f |..W....`...[.8./| +00000040 ba 4d 73 d5 1c 47 |.Ms..G|" +"2019-09-24 00:26:59.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 55f7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:26:59.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 55f8 Exiting" +"2019-09-24 00:26:59.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55f9 Exiting" +"2019-09-24 00:26:59.914 UTC [gossip.gossip] handleMessage -> DEBU 55fa Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.914 UTC [gossip.pull] HandleMessage -> DEBU 55fb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:26:59.915 UTC [msp] DeserializeIdentity -> DEBU 55fc Obtaining identity" +"2019-09-24 00:26:59.916 UTC [msp] DeserializeIdentity -> DEBU 55fd Obtaining identity" +"2019-09-24 00:26:59.916 UTC [msp] DeserializeIdentity -> DEBU 55fe Obtaining identity" +"2019-09-24 00:26:59.917 UTC [msp] DeserializeIdentity -> DEBU 55ff Obtaining identity" +"2019-09-24 00:26:59.917 UTC [msp] DeserializeIdentity -> DEBU 5600 Obtaining identity" +"2019-09-24 00:26:59.918 UTC [msp] DeserializeIdentity -> DEBU 5601 Obtaining identity" +"2019-09-24 00:26:59.918 UTC [gossip.pull] SendDigest -> DEBU 5602 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:26:59.918 UTC [gossip.gossip] handleMessage -> DEBU 5603 Exiting" +"2019-09-24 00:26:59.921 UTC [endorser] ProcessProposal -> DEBU 5604 Entering: request from 172.18.0.9:50982" +"2019-09-24 00:26:59.922 UTC [protoutils] ValidateProposalMessage -> DEBU 5605 ValidateProposalMessage starts for signed proposal 0xc0029d9a90" +"2019-09-24 00:26:59.922 UTC [protoutils] validateChannelHeader -> DEBU 5606 validateChannelHeader info: header type 3" +"2019-09-24 00:26:59.923 UTC [protoutils] checkSignatureFromCreator -> DEBU 5607 begin" +"2019-09-24 00:26:59.923 UTC [msp] GetManagerForChain -> DEBU 5608 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:26:59.923 UTC [protoutils] checkSignatureFromCreator -> DEBU 5609 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:26:59.924 UTC [protoutils] checkSignatureFromCreator -> DEBU 560a creator is valid" +"2019-09-24 00:26:59.924 UTC [msp.identity] Verify -> DEBU 560b Verify: digest = 00000000 ef 06 a8 2b 35 7a 60 e7 5a d6 c5 0a 06 6a ea 25 |...+5z`.Z....j.%| +00000010 eb dd d2 77 69 71 95 ad e7 59 e9 29 97 49 9a 65 |...wiq...Y.).I.e|" +"2019-09-24 00:26:59.924 UTC [msp.identity] Verify -> DEBU 560c Verify: sig = 00000000 30 45 02 21 00 fc 53 4e 0d 71 d5 6e 8c aa 26 c5 |0E.!..SN.q.n..&.| +00000010 a9 d6 c8 30 dd eb f9 8e c0 ac 3a 7d d6 56 ec c0 |...0......:}.V..| +00000020 5a a8 71 31 ee 02 20 69 02 39 ba 6d 9a da 6a a3 |Z.q1.. i.9.m..j.| +00000030 4f f4 cc e8 43 89 5e a1 e8 e4 ca 41 49 e5 17 e6 |O...C.^....AI...| +00000040 7a 4a 73 de 2d a7 b5 |zJs.-..|" +"2019-09-24 00:26:59.925 UTC [protoutils] checkSignatureFromCreator -> DEBU 560d exits successfully" +"2019-09-24 00:26:59.925 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 560e validateChaincodeProposalMessage starts for proposal 0xc0029c2cb0, header 0xc0029d9ea0" +"2019-09-24 00:26:59.926 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 560f validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 00:26:59.926 UTC [endorser] preProcess -> DEBU 5610 [businesschannel][b4f910bc] processing txid: b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38" +"2019-09-24 00:26:59.926 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5611 retrieveTransactionByID() - txId = [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38]" +"2019-09-24 00:26:59.927 UTC [aclmgmt] CheckACL -> DEBU 5612 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 00:26:59.927 UTC [aclmgmt] CheckACL -> DEBU 5613 acl check(/Channel/Application/Writers)" +"2019-09-24 00:26:59.927 UTC [policies] Evaluate -> DEBU 5614 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:26:59.927 UTC [policies] Evaluate -> DEBU 5615 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:59.928 UTC [policies] Evaluate -> DEBU 5616 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:26:59.928 UTC [cauthdsl] func1 -> DEBU 5617 0xc00355bf00 gate 1569284819928312300 evaluation starts" +"2019-09-24 00:26:59.928 UTC [cauthdsl] func2 -> DEBU 5618 0xc00355bf00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.928 UTC [cauthdsl] func2 -> DEBU 5619 0xc00355bf00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:59.928 UTC [cauthdsl] func2 -> DEBU 561a 0xc00355bf00 principal matched by identity 0" +"2019-09-24 00:26:59.929 UTC [msp.identity] Verify -> DEBU 561b Verify: digest = 00000000 ef 06 a8 2b 35 7a 60 e7 5a d6 c5 0a 06 6a ea 25 |...+5z`.Z....j.%| +00000010 eb dd d2 77 69 71 95 ad e7 59 e9 29 97 49 9a 65 |...wiq...Y.).I.e|" +"2019-09-24 00:26:59.929 UTC [msp.identity] Verify -> DEBU 561c Verify: sig = 00000000 30 45 02 21 00 fc 53 4e 0d 71 d5 6e 8c aa 26 c5 |0E.!..SN.q.n..&.| +00000010 a9 d6 c8 30 dd eb f9 8e c0 ac 3a 7d d6 56 ec c0 |...0......:}.V..| +00000020 5a a8 71 31 ee 02 20 69 02 39 ba 6d 9a da 6a a3 |Z.q1.. i.9.m..j.| +00000030 4f f4 cc e8 43 89 5e a1 e8 e4 ca 41 49 e5 17 e6 |O...C.^....AI...| +00000040 7a 4a 73 de 2d a7 b5 |zJs.-..|" +"2019-09-24 00:26:59.929 UTC [cauthdsl] func2 -> DEBU 561d 0xc00355bf00 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:59.930 UTC [cauthdsl] func1 -> DEBU 561e 0xc00355bf00 gate 1569284819928312300 evaluation succeeds" +"2019-09-24 00:26:59.930 UTC [policies] Evaluate -> DEBU 561f Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:26:59.930 UTC [policies] Evaluate -> DEBU 5620 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:26:59.930 UTC [policies] Evaluate -> DEBU 5621 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:26:59.930 UTC [policies] Evaluate -> DEBU 5622 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:26:59.931 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5623 constructing new tx simulator" +"2019-09-24 00:26:59.931 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5624 constructing new tx simulator txid = [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38]" +"2019-09-24 00:26:59.931 UTC [endorser] SimulateProposal -> DEBU 5625 [businesschannel][b4f910bc] Entry chaincode: name:"exp02" " +"2019-09-24 00:26:59.932 UTC [stateleveldb] GetState -> DEBU 5626 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:26:59.932 UTC [ccprovider] GetChaincodeData -> DEBU 5627 Getting chaincode data for from cache" +"2019-09-24 00:26:59.932 UTC [endorser] callChaincode -> INFO 5628 [businesschannel][b4f910bc] Entry chaincode: name:"exp02" " +"2019-09-24 00:26:59.933 UTC [chaincode] Execute -> DEBU 5629 Entry" +"2019-09-24 00:26:59.934 UTC [chaincode] handleMessage -> DEBU 562a [b4f910bc] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:26:59.934 UTC [chaincode] HandleTransaction -> DEBU 562b [b4f910bc] handling GET_STATE from chaincode" +"2019-09-24 00:26:59.935 UTC [chaincode] HandleGetState -> DEBU 562c [b4f910bc] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 00:26:59.935 UTC [stateleveldb] GetState -> DEBU 562d GetState(). ns=exp02, key=a" +"2019-09-24 00:26:59.935 UTC [chaincode] HandleTransaction -> DEBU 562e [b4f910bc] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:26:59.936 UTC [chaincode] handleMessage -> DEBU 562f [b4f910bc] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:26:59.936 UTC [chaincode] HandleTransaction -> DEBU 5630 [b4f910bc] handling GET_STATE from chaincode" +"2019-09-24 00:26:59.937 UTC [chaincode] HandleGetState -> DEBU 5631 [b4f910bc] getting state for chaincode exp02, key b, channel businesschannel" +"2019-09-24 00:26:59.937 UTC [stateleveldb] GetState -> DEBU 5632 GetState(). ns=exp02, key=b" +"2019-09-24 00:26:59.937 UTC [chaincode] HandleTransaction -> DEBU 5633 [b4f910bc] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:26:59.938 UTC [chaincode] handleMessage -> DEBU 5634 [b4f910bc] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 00:26:59.938 UTC [chaincode] HandleTransaction -> DEBU 5635 [b4f910bc] handling PUT_STATE from chaincode" +"2019-09-24 00:26:59.938 UTC [chaincode] HandleTransaction -> DEBU 5636 [b4f910bc] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 00:26:59.939 UTC [chaincode] handleMessage -> DEBU 5637 [b4f910bc] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 00:26:59.939 UTC [chaincode] HandleTransaction -> DEBU 5638 [b4f910bc] handling PUT_STATE from chaincode" +"2019-09-24 00:26:59.940 UTC [chaincode] HandleTransaction -> DEBU 5639 [b4f910bc] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 00:26:59.940 UTC [chaincode] handleMessage -> DEBU 563a [b4f910bc] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:26:59.941 UTC [chaincode] Notify -> DEBU 563b [b4f910bc] notifying Txid:b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38, channelID:businesschannel" +"2019-09-24 00:26:59.941 UTC [chaincode] Execute -> DEBU 563c Exit" +"2019-09-24 00:26:59.941 UTC [endorser] callChaincode -> INFO 563d [businesschannel][b4f910bc] Exit chaincode: name:"exp02" (9ms)" +"2019-09-24 00:26:59.941 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 563e Simulation completed, getting simulation results" +"2019-09-24 00:26:59.942 UTC [lockbasedtxmgr] Done -> DEBU 563f Done with transaction simulation / query execution [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38]" +"2019-09-24 00:26:59.942 UTC [endorser] SimulateProposal -> DEBU 5640 [businesschannel][b4f910bc] Exit" +"2019-09-24 00:26:59.942 UTC [endorser] endorseProposal -> DEBU 5641 [businesschannel][b4f910bc] Entry chaincode: name:"exp02" " +"2019-09-24 00:26:59.945 UTC [endorser] endorseProposal -> DEBU 5642 [businesschannel][b4f910bc] escc for chaincode name:"exp02" is escc" +"2019-09-24 00:26:59.945 UTC [endorser] EndorseWithPlugin -> DEBU 5643 Entering endorsement for {plugin: escc, channel: businesschannel, tx: b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38, chaincode: exp02}" +"2019-09-24 00:26:59.946 UTC [msp.identity] Sign -> DEBU 5644 Sign: plaintext: 0A201C8725A0356A84A3C2DE4E22261F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:26:59.946 UTC [msp.identity] Sign -> DEBU 5645 Sign: digest: AF26F2E72D96E2791DD11AADF44D9552FBDD8AF446FA438E23788EA33A7E977D " +"2019-09-24 00:26:59.946 UTC [endorser] EndorseWithPlugin -> DEBU 5646 Exiting {plugin: escc, channel: businesschannel, tx: b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38, chaincode: exp02}" +"2019-09-24 00:26:59.947 UTC [endorser] endorseProposal -> DEBU 5647 [businesschannel][b4f910bc] Exit" +"2019-09-24 00:26:59.947 UTC [lockbasedtxmgr] Done -> DEBU 5648 Done with transaction simulation / query execution [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38]" +"2019-09-24 00:26:59.947 UTC [endorser] func1 -> DEBU 5649 Exit: request from 172.18.0.9:50982" +"2019-09-24 00:26:59.947 UTC [comm.grpc.server] 1 -> INFO 564a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50982 grpc.code=OK grpc.call_duration=26.5192ms +"2019-09-24 00:26:59.949 UTC [gossip.comm] func1 -> DEBU 564b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.950 UTC [gossip.gossip] handleMessage -> DEBU 564c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.950 UTC [gossip.gossip] handleMessage -> DEBU 564d Exiting" +"2019-09-24 00:26:59.951 UTC [gossip.discovery] handleMsgFromComm -> DEBU 564e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 564f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:26:59.951 UTC [msp] DeserializeIdentity -> DEBU 5650 Obtaining identity" +"2019-09-24 00:26:59.952 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5651 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:26:59.952 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5652 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:59.953 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5653 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 5654 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 5655 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:26:59.954 UTC [policies] Evaluate -> DEBU 5656 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:26:59.955 UTC [cauthdsl] func1 -> DEBU 5657 0xc0037a7c10 gate 1569284819955403700 evaluation starts" +"2019-09-24 00:26:59.955 UTC [cauthdsl] func2 -> DEBU 5658 0xc0037a7c10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.955 UTC [cauthdsl] func2 -> DEBU 5659 0xc0037a7c10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:59.956 UTC [cauthdsl] func2 -> DEBU 565a 0xc0037a7c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:26:59.956 UTC [cauthdsl] func2 -> DEBU 565b 0xc0037a7c10 principal evaluation fails" +"2019-09-24 00:26:59.957 UTC [cauthdsl] func1 -> DEBU 565c 0xc0037a7c10 gate 1569284819955403700 evaluation fails" +"2019-09-24 00:26:59.957 UTC [policies] Evaluate -> DEBU 565d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:59.957 UTC [policies] Evaluate -> DEBU 565e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:26:59.957 UTC [policies] Evaluate -> DEBU 565f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:26:59.957 UTC [cauthdsl] func1 -> DEBU 5660 0xc0037b8460 gate 1569284819957831700 evaluation starts" +"2019-09-24 00:26:59.958 UTC [cauthdsl] func2 -> DEBU 5661 0xc0037b8460 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:26:59.958 UTC [cauthdsl] func2 -> DEBU 5662 0xc0037b8460 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:26:59.958 UTC [cauthdsl] func2 -> DEBU 5663 0xc0037b8460 principal matched by identity 0" +"2019-09-24 00:26:59.958 UTC [msp.identity] Verify -> DEBU 5664 Verify: digest = 00000000 25 dc b1 5f e7 2b 75 72 23 ad e9 8d 43 f8 5d 84 |%.._.+ur#...C.].| +00000010 c3 f0 58 f8 5f 64 c9 29 01 db fc 2e da 5a 41 3d |..X._d.).....ZA=|" +"2019-09-24 00:26:59.958 UTC [msp.identity] Verify -> DEBU 5665 Verify: sig = 00000000 30 45 02 21 00 a2 37 f2 b1 21 30 dc 4f f0 82 bf |0E.!..7..!0.O...| +00000010 61 0c b9 57 ba 76 bb 50 bf 6e 27 84 65 71 43 a7 |a..W.v.P.n'.eqC.| +00000020 2d a9 ca 4e 42 02 20 04 13 40 81 23 db 56 b5 90 |-..NB. ..@.#.V..| +00000030 de 2d 8b ca d4 dd 76 cb f9 f5 e8 75 22 d1 01 5e |.-....v....u"..^| +00000040 d9 9e 21 61 99 e4 a0 |..!a...|" +"2019-09-24 00:26:59.960 UTC [cauthdsl] func2 -> DEBU 5666 0xc0037b8460 principal evaluation succeeds for identity 0" +"2019-09-24 00:26:59.961 UTC [cauthdsl] func1 -> DEBU 5667 0xc0037b8460 gate 1569284819957831700 evaluation succeeds" +"2019-09-24 00:26:59.964 UTC [policies] Evaluate -> DEBU 5668 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:59.965 UTC [policies] Evaluate -> DEBU 5669 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:26:59.966 UTC [policies] Evaluate -> DEBU 566a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:26:59.967 UTC [policies] Evaluate -> DEBU 566b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:26:59.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 566c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.969 UTC [gossip.discovery] learnExistingMembers -> DEBU 566d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:26:59.969 UTC [gossip.discovery] learnExistingMembers -> DEBU 566e updating membership: timestamp: " +"2019-09-24 00:26:59.969 UTC [gossip.discovery] learnExistingMembers -> DEBU 566f Updating aliveness data: membership: timestamp: " +"2019-09-24 00:26:59.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 5670 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:26:59.970 UTC [gossip.discovery] learnExistingMembers -> DEBU 5671 Exiting" +"2019-09-24 00:26:59.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 5672 Exiting" +"2019-09-24 00:26:59.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5673 Exiting" +"2019-09-24 00:26:59.971 UTC [gossip.gossip] handleMessage -> DEBU 5674 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.972 UTC [gossip.gossip] handleMessage -> DEBU 5675 Exiting" +"2019-09-24 00:26:59.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5676 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5677 Exiting" +"2019-09-24 00:26:59.973 UTC [gossip.comm] func1 -> DEBU 5678 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.973 UTC [gossip.gossip] handleMessage -> DEBU 5679 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.974 UTC [gossip.gossip] handleMessage -> DEBU 567a Exiting" +"2019-09-24 00:26:59.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 567b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 567c Exiting" +"2019-09-24 00:26:59.975 UTC [msp] DeserializeIdentity -> DEBU 567d Obtaining identity" +"2019-09-24 00:26:59.975 UTC [msp] DeserializeIdentity -> DEBU 567e Obtaining identity" +"2019-09-24 00:26:59.975 UTC [msp] DeserializeIdentity -> DEBU 567f Obtaining identity" +"2019-09-24 00:26:59.977 UTC [msp] DeserializeIdentity -> DEBU 5680 Obtaining identity" +"2019-09-24 00:26:59.978 UTC [msp] DeserializeIdentity -> DEBU 5681 Obtaining identity" +"2019-09-24 00:26:59.979 UTC [msp] DeserializeIdentity -> DEBU 5682 Obtaining identity" +"2019-09-24 00:26:59.980 UTC [msp] DeserializeIdentity -> DEBU 5683 Obtaining identity" +"2019-09-24 00:26:59.981 UTC [gossip.comm] Send -> DEBU 5684 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:59.982 UTC [msp] DeserializeIdentity -> DEBU 5685 Obtaining identity" +"2019-09-24 00:26:59.982 UTC [msp] DeserializeIdentity -> DEBU 5686 Obtaining identity" +"2019-09-24 00:26:59.983 UTC [gossip.comm] Send -> DEBU 5687 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:26:59.983 UTC [gossip.comm] sendToEndpoint -> DEBU 5688 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.983 UTC [gossip.comm] sendToEndpoint -> DEBU 5689 Exiting" +"2019-09-24 00:26:59.984 UTC [gossip.comm] sendToEndpoint -> DEBU 568a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:26:59.984 UTC [gossip.comm] sendToEndpoint -> DEBU 568b Exiting" +"2019-09-24 00:26:59.986 UTC [grpc] infof -> DEBU 568c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:26:59.987 UTC [grpc] infof -> DEBU 568d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:00.020 UTC [gossip.gossip] handleMessage -> DEBU 568e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.020 UTC [gossip.gossip] handleMessage -> DEBU 568f Exiting" +"2019-09-24 00:27:00.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5690 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.020 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5691 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:00.021 UTC [msp] DeserializeIdentity -> DEBU 5692 Obtaining identity" +"2019-09-24 00:27:00.021 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5693 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:00.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5694 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5695 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.021 UTC [policies] Evaluate -> DEBU 5696 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.021 UTC [policies] Evaluate -> DEBU 5697 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.021 UTC [policies] Evaluate -> DEBU 5698 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.021 UTC [cauthdsl] func1 -> DEBU 5699 0xc0038421a0 gate 1569284820021913500 evaluation starts" +"2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 569a 0xc0038421a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 569b 0xc0038421a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 569c 0xc0038421a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 569d 0xc0038421a0 principal evaluation fails" +"2019-09-24 00:27:00.022 UTC [cauthdsl] func1 -> DEBU 569e 0xc0038421a0 gate 1569284820021913500 evaluation fails" +"2019-09-24 00:27:00.022 UTC [policies] Evaluate -> DEBU 569f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.022 UTC [policies] Evaluate -> DEBU 56a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.022 UTC [policies] Evaluate -> DEBU 56a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:00.022 UTC [cauthdsl] func1 -> DEBU 56a2 0xc0038429f0 gate 1569284820022604900 evaluation starts" +"2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 56a3 0xc0038429f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 56a4 0xc0038429f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.022 UTC [cauthdsl] func2 -> DEBU 56a5 0xc0038429f0 principal matched by identity 0" +"2019-09-24 00:27:00.023 UTC [msp.identity] Verify -> DEBU 56a6 Verify: digest = 00000000 4b ac 2c fe c6 af c3 f1 2c 25 65 11 6a cb 80 34 |K.,.....,%e.j..4| +00000010 d0 17 b0 49 0a 9d 01 58 c3 eb fd 45 c3 f3 66 f0 |...I...X...E..f.|" +"2019-09-24 00:27:00.023 UTC [msp.identity] Verify -> DEBU 56a7 Verify: sig = 00000000 30 44 02 20 7d 21 7c e8 e8 7f 5e 2f db c9 7a 04 |0D. }!|...^/..z.| +00000010 b1 01 6e 4d 17 af cb fe d0 a0 fb 02 4e a2 03 f6 |..nM........N...| +00000020 29 a1 12 ea 02 20 3c 8b 0e f6 4e e9 03 b0 8a e7 |).... <...N.....| +00000030 84 a9 87 f8 59 79 17 b0 63 23 3a 30 5d 66 e3 47 |....Yy..c#:0]f.G| +00000040 1e 2b 6f 20 d5 a9 |.+o ..|" +"2019-09-24 00:27:00.023 UTC [cauthdsl] func2 -> DEBU 56a8 0xc0038429f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.023 UTC [cauthdsl] func1 -> DEBU 56a9 0xc0038429f0 gate 1569284820022604900 evaluation succeeds" +"2019-09-24 00:27:00.023 UTC [policies] Evaluate -> DEBU 56aa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.023 UTC [policies] Evaluate -> DEBU 56ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.023 UTC [policies] Evaluate -> DEBU 56ac Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.024 UTC [policies] Evaluate -> DEBU 56ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.024 UTC [gossip.discovery] handleAliveMessage -> DEBU 56ae Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:00.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 56af Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:00.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b0 updating membership: timestamp: " +"2019-09-24 00:27:00.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b1 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:00.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:00.025 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b3 Exiting" +"2019-09-24 00:27:00.025 UTC [gossip.discovery] handleAliveMessage -> DEBU 56b4 Exiting" +"2019-09-24 00:27:00.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 56b5 Exiting" +"2019-09-24 00:27:00.025 UTC [gossip.discovery] sendMemResponse -> DEBU 56b6 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:27:00.025 UTC [msp] DeserializeIdentity -> DEBU 56b7 Obtaining identity" +"2019-09-24 00:27:00.026 UTC [msp] DeserializeIdentity -> DEBU 56b8 Obtaining identity" +"2019-09-24 00:27:00.026 UTC [msp] DeserializeIdentity -> DEBU 56b9 Obtaining identity" +"2019-09-24 00:27:00.026 UTC [gossip.comm] Send -> DEBU 56ba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:00.026 UTC [gossip.comm] sendToEndpoint -> DEBU 56bb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.026 UTC [gossip.comm] sendToEndpoint -> DEBU 56bc Exiting" +"2019-09-24 00:27:00.028 UTC [gossip.discovery] sendMemResponse -> DEBU 56bd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" > alive: alive: alive: " +"2019-09-24 00:27:00.080 UTC [msp] DeserializeIdentity -> DEBU 56be Obtaining identity" +"2019-09-24 00:27:00.081 UTC [msp] DeserializeIdentity -> DEBU 56bf Obtaining identity" +"2019-09-24 00:27:00.081 UTC [gossip.comm] Send -> DEBU 56c0 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:27:00.081 UTC [gossip.comm] sendToEndpoint -> DEBU 56c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.081 UTC [gossip.comm] sendToEndpoint -> DEBU 56c4 Exiting" +"2019-09-24 00:27:00.081 UTC [gossip.comm] sendToEndpoint -> DEBU 56c2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.083 UTC [gossip.comm] sendToEndpoint -> DEBU 56c6 Exiting" +"2019-09-24 00:27:00.081 UTC [gossip.comm] sendToEndpoint -> DEBU 56c3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.083 UTC [gossip.comm] func1 -> DEBU 56c5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.084 UTC [gossip.comm] sendToEndpoint -> DEBU 56c7 Exiting" +"2019-09-24 00:27:00.085 UTC [gossip.comm] func1 -> DEBU 56c8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.084 UTC [gossip.gossip] handleMessage -> DEBU 56c9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.086 UTC [msp.identity] Verify -> DEBU 56ca Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:27:00.087 UTC [msp.identity] Verify -> DEBU 56cb Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:27:00.087 UTC [msp] DeserializeIdentity -> DEBU 56cc Obtaining identity" +"2019-09-24 00:27:00.087 UTC [msp] DeserializeIdentity -> DEBU 56cd Obtaining identity" +"2019-09-24 00:27:00.088 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 56ce Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:00.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56cf Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.088 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56d1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.089 UTC [policies] Evaluate -> DEBU 56d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.089 UTC [policies] Evaluate -> DEBU 56d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.088 UTC [msp] DeserializeIdentity -> DEBU 56d0 Obtaining identity" +"2019-09-24 00:27:00.090 UTC [policies] Evaluate -> DEBU 56d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.090 UTC [cauthdsl] func1 -> DEBU 56d6 0xc003a15b20 gate 1569284820090587600 evaluation starts" +"2019-09-24 00:27:00.090 UTC [msp] DeserializeIdentity -> DEBU 56d5 Obtaining identity" +"2019-09-24 00:27:00.090 UTC [cauthdsl] func2 -> DEBU 56d7 0xc003a15b20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.091 UTC [cauthdsl] func2 -> DEBU 56d9 0xc003a15b20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.091 UTC [cauthdsl] func2 -> DEBU 56da 0xc003a15b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.091 UTC [cauthdsl] func2 -> DEBU 56db 0xc003a15b20 principal evaluation fails" +"2019-09-24 00:27:00.090 UTC [gossip.comm] Send -> DEBU 56d8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +"2019-09-24 00:27:00.091 UTC [msp] DeserializeIdentity -> DEBU 56dd Obtaining identity" +"2019-09-24 00:27:00.091 UTC [cauthdsl] func1 -> DEBU 56dc 0xc003a15b20 gate 1569284820090587600 evaluation fails" +"2019-09-24 00:27:00.092 UTC [gossip.comm] sendToEndpoint -> DEBU 56df Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.092 UTC [gossip.comm] sendToEndpoint -> DEBU 56e1 Exiting" +"2019-09-24 00:27:00.092 UTC [gossip.comm] sendToEndpoint -> DEBU 56e2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.093 UTC [gossip.comm] sendToEndpoint -> DEBU 56e4 Exiting" +"2019-09-24 00:27:00.092 UTC [policies] Evaluate -> DEBU 56e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.093 UTC [policies] Evaluate -> DEBU 56e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.093 UTC [policies] Evaluate -> DEBU 56e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:00.094 UTC [cauthdsl] func1 -> DEBU 56e7 0xc003a615a0 gate 1569284820094071900 evaluation starts" +"2019-09-24 00:27:00.092 UTC [msp] DeserializeIdentity -> DEBU 56de Obtaining identity" +"2019-09-24 00:27:00.093 UTC [gossip.comm] sendToEndpoint -> DEBU 56e3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.095 UTC [gossip.comm] sendToEndpoint -> DEBU 56e8 Exiting" +"2019-09-24 00:27:00.095 UTC [cauthdsl] func2 -> DEBU 56e9 0xc003a615a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.096 UTC [cauthdsl] func2 -> DEBU 56ea 0xc003a615a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.096 UTC [cauthdsl] func2 -> DEBU 56eb 0xc003a615a0 principal matched by identity 0" +"2019-09-24 00:27:00.096 UTC [msp.identity] Verify -> DEBU 56ec Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:27:00.096 UTC [msp.identity] Verify -> DEBU 56ed Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:27:00.096 UTC [cauthdsl] func2 -> DEBU 56ee 0xc003a615a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.097 UTC [cauthdsl] func1 -> DEBU 56ef 0xc003a615a0 gate 1569284820094071900 evaluation succeeds" +"2019-09-24 00:27:00.097 UTC [policies] Evaluate -> DEBU 56f0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.098 UTC [policies] Evaluate -> DEBU 56f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.098 UTC [policies] Evaluate -> DEBU 56f2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.098 UTC [policies] Evaluate -> DEBU 56f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.098 UTC [msp] DeserializeIdentity -> DEBU 56f4 Obtaining identity" +"2019-09-24 00:27:00.105 UTC [msp] DeserializeIdentity -> DEBU 56f5 Obtaining identity" +"2019-09-24 00:27:00.106 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 56f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:00.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56f7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56f8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.107 UTC [policies] Evaluate -> DEBU 56f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.109 UTC [policies] Evaluate -> DEBU 56fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.110 UTC [policies] Evaluate -> DEBU 56fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.110 UTC [cauthdsl] func1 -> DEBU 56fc 0xc003a88dd0 gate 1569284820110654000 evaluation starts" +"2019-09-24 00:27:00.111 UTC [cauthdsl] func2 -> DEBU 56fd 0xc003a88dd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.111 UTC [cauthdsl] func2 -> DEBU 56fe 0xc003a88dd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.111 UTC [cauthdsl] func2 -> DEBU 56ff 0xc003a88dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.111 UTC [cauthdsl] func2 -> DEBU 5700 0xc003a88dd0 principal evaluation fails" +"2019-09-24 00:27:00.111 UTC [cauthdsl] func1 -> DEBU 5701 0xc003a88dd0 gate 1569284820110654000 evaluation fails" +"2019-09-24 00:27:00.112 UTC [policies] Evaluate -> DEBU 5702 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.112 UTC [policies] Evaluate -> DEBU 5703 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.112 UTC [policies] Evaluate -> DEBU 5704 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:00.112 UTC [cauthdsl] func1 -> DEBU 5705 0xc003a89750 gate 1569284820112435300 evaluation starts" +"2019-09-24 00:27:00.112 UTC [cauthdsl] func2 -> DEBU 5706 0xc003a89750 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.112 UTC [cauthdsl] func2 -> DEBU 5707 0xc003a89750 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.113 UTC [cauthdsl] func2 -> DEBU 5708 0xc003a89750 principal matched by identity 0" +"2019-09-24 00:27:00.113 UTC [msp.identity] Verify -> DEBU 5709 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:27:00.113 UTC [msp.identity] Verify -> DEBU 570a Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:27:00.113 UTC [cauthdsl] func2 -> DEBU 570b 0xc003a89750 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.113 UTC [cauthdsl] func1 -> DEBU 570c 0xc003a89750 gate 1569284820112435300 evaluation succeeds" +"2019-09-24 00:27:00.114 UTC [policies] Evaluate -> DEBU 570d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.114 UTC [policies] Evaluate -> DEBU 570e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.114 UTC [policies] Evaluate -> DEBU 570f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.114 UTC [policies] Evaluate -> DEBU 5710 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.114 UTC [msp.identity] Verify -> DEBU 5711 Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +"2019-09-24 00:27:00.114 UTC [msp.identity] Verify -> DEBU 5712 Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +00000040 48 4c 21 8e e5 c8 |HL!...|" +"2019-09-24 00:27:00.115 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5713 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.115 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5714 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.115 UTC [policies] Evaluate -> DEBU 5715 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.115 UTC [policies] Evaluate -> DEBU 5716 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.115 UTC [policies] Evaluate -> DEBU 5717 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.115 UTC [cauthdsl] func1 -> DEBU 5718 0xc003aa2f70 gate 1569284820115909900 evaluation starts" +"2019-09-24 00:27:00.116 UTC [cauthdsl] func2 -> DEBU 5719 0xc003aa2f70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.116 UTC [cauthdsl] func2 -> DEBU 571a 0xc003aa2f70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.116 UTC [cauthdsl] func2 -> DEBU 571b 0xc003aa2f70 principal matched by identity 0" +"2019-09-24 00:27:00.116 UTC [msp.identity] Verify -> DEBU 571c Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +"2019-09-24 00:27:00.116 UTC [msp.identity] Verify -> DEBU 571d Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +00000040 48 4c 21 8e e5 c8 |HL!...|" +"2019-09-24 00:27:00.116 UTC [cauthdsl] func2 -> DEBU 571e 0xc003aa2f70 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.116 UTC [cauthdsl] func1 -> DEBU 571f 0xc003aa2f70 gate 1569284820115909900 evaluation succeeds" +"2019-09-24 00:27:00.116 UTC [policies] Evaluate -> DEBU 5720 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.117 UTC [policies] Evaluate -> DEBU 5721 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.117 UTC [policies] Evaluate -> DEBU 5722 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.117 UTC [policies] Evaluate -> DEBU 5723 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.117 UTC [gossip.gossip] handleMessage -> DEBU 5724 Exiting" +"2019-09-24 00:27:00.117 UTC [gossip.gossip] handleMessage -> DEBU 5725 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.117 UTC [msp] DeserializeIdentity -> DEBU 5726 Obtaining identity" +"2019-09-24 00:27:00.118 UTC [msp.identity] Verify -> DEBU 5727 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:27:00.118 UTC [msp.identity] Verify -> DEBU 5728 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:27:00.119 UTC [msp.identity] Verify -> DEBU 5729 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:27:00.119 UTC [msp.identity] Verify -> DEBU 572a Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:27:00.119 UTC [msp] DeserializeIdentity -> DEBU 572b Obtaining identity" +"2019-09-24 00:27:00.120 UTC [msp] DeserializeIdentity -> DEBU 572c Obtaining identity" +"2019-09-24 00:27:00.120 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 572d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:00.120 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 572e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.120 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 572f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.121 UTC [policies] Evaluate -> DEBU 5730 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.121 UTC [policies] Evaluate -> DEBU 5731 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.121 UTC [policies] Evaluate -> DEBU 5732 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.122 UTC [cauthdsl] func1 -> DEBU 5733 0xc003ac1b50 gate 1569284820122075300 evaluation starts" +"2019-09-24 00:27:00.122 UTC [cauthdsl] func2 -> DEBU 5734 0xc003ac1b50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.122 UTC [cauthdsl] func2 -> DEBU 5735 0xc003ac1b50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.123 UTC [cauthdsl] func2 -> DEBU 5736 0xc003ac1b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.123 UTC [cauthdsl] func2 -> DEBU 5737 0xc003ac1b50 principal evaluation fails" +"2019-09-24 00:27:00.123 UTC [cauthdsl] func1 -> DEBU 5738 0xc003ac1b50 gate 1569284820122075300 evaluation fails" +"2019-09-24 00:27:00.123 UTC [policies] Evaluate -> DEBU 5739 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.123 UTC [policies] Evaluate -> DEBU 573a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.124 UTC [policies] Evaluate -> DEBU 573b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:00.124 UTC [cauthdsl] func1 -> DEBU 573c 0xc003ada390 gate 1569284820124479000 evaluation starts" +"2019-09-24 00:27:00.124 UTC [cauthdsl] func2 -> DEBU 573d 0xc003ada390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.124 UTC [cauthdsl] func2 -> DEBU 573e 0xc003ada390 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.124 UTC [cauthdsl] func2 -> DEBU 573f 0xc003ada390 principal matched by identity 0" +"2019-09-24 00:27:00.125 UTC [msp.identity] Verify -> DEBU 5740 Verify: digest = 00000000 54 a8 95 20 84 5e d3 6e 8e 46 36 a4 0d f2 08 1a |T.. .^.n.F6.....| +00000010 af 21 28 dd 29 2f 7d 67 a7 ec b2 a7 0e 93 47 8d |.!(.)/}g......G.|" +"2019-09-24 00:27:00.125 UTC [msp.identity] Verify -> DEBU 5741 Verify: sig = 00000000 30 44 02 20 46 c9 4c 9b 63 c0 45 f8 74 0d f7 8f |0D. F.L.c.E.t...| +00000010 9e 2b bf 06 10 4b 88 8f df 6d 49 f3 37 f3 d0 ce |.+...K...mI.7...| +00000020 13 47 30 13 02 20 2d f9 15 37 08 5a e4 19 9c 0f |.G0.. -..7.Z....| +00000030 84 8b ed 9c ef c2 c7 7e 01 6d c2 b3 37 70 ca fd |.......~.m..7p..| +00000040 b4 c6 3d ac cd 3e |..=..>|" +"2019-09-24 00:27:00.125 UTC [cauthdsl] func2 -> DEBU 5742 0xc003ada390 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.125 UTC [cauthdsl] func1 -> DEBU 5743 0xc003ada390 gate 1569284820124479000 evaluation succeeds" +"2019-09-24 00:27:00.125 UTC [policies] Evaluate -> DEBU 5744 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.126 UTC [policies] Evaluate -> DEBU 5745 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.126 UTC [policies] Evaluate -> DEBU 5746 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.126 UTC [policies] Evaluate -> DEBU 5747 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.126 UTC [msp] DeserializeIdentity -> DEBU 5748 Obtaining identity" +"2019-09-24 00:27:00.127 UTC [msp] DeserializeIdentity -> DEBU 5749 Obtaining identity" +"2019-09-24 00:27:00.127 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 574a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:00.128 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 574b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.128 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 574c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.128 UTC [policies] Evaluate -> DEBU 574d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.129 UTC [policies] Evaluate -> DEBU 574e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.129 UTC [policies] Evaluate -> DEBU 574f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.129 UTC [cauthdsl] func1 -> DEBU 5750 0xc003adbba0 gate 1569284820129770400 evaluation starts" +"2019-09-24 00:27:00.130 UTC [cauthdsl] func2 -> DEBU 5751 0xc003adbba0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.131 UTC [cauthdsl] func2 -> DEBU 5752 0xc003adbba0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.131 UTC [cauthdsl] func2 -> DEBU 5753 0xc003adbba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.132 UTC [cauthdsl] func2 -> DEBU 5754 0xc003adbba0 principal evaluation fails" +"2019-09-24 00:27:00.132 UTC [cauthdsl] func1 -> DEBU 5755 0xc003adbba0 gate 1569284820129770400 evaluation fails" +"2019-09-24 00:27:00.133 UTC [policies] Evaluate -> DEBU 5756 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.133 UTC [policies] Evaluate -> DEBU 5757 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.133 UTC [policies] Evaluate -> DEBU 5758 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:00.133 UTC [cauthdsl] func1 -> DEBU 5759 0xc003aec3f0 gate 1569284820133813000 evaluation starts" +"2019-09-24 00:27:00.133 UTC [cauthdsl] func2 -> DEBU 575a 0xc003aec3f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.133 UTC [cauthdsl] func2 -> DEBU 575b 0xc003aec3f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.134 UTC [cauthdsl] func2 -> DEBU 575c 0xc003aec3f0 principal matched by identity 0" +"2019-09-24 00:27:00.134 UTC [msp.identity] Verify -> DEBU 575d Verify: digest = 00000000 ae 5f 75 8f b8 79 6b 9c 07 89 8e 59 2a 45 63 02 |._u..yk....Y*Ec.| +00000010 9e fc 44 09 6f e3 0b 6b b2 c4 8a 32 fa ae 08 15 |..D.o..k...2....|" +"2019-09-24 00:27:00.135 UTC [msp.identity] Verify -> DEBU 575e Verify: sig = 00000000 30 45 02 21 00 ac 0a c9 b4 53 a1 27 c0 f2 00 68 |0E.!.....S.'...h| +00000010 68 7e a0 00 2f 93 e7 0a a6 e3 81 a9 d3 f9 eb dd |h~../...........| +00000020 97 89 ec 5c e7 02 20 31 be f8 03 6d 39 fd 83 02 |...\.. 1...m9...| +00000030 cb d4 46 a1 d2 8c a1 1c c9 91 16 4b 12 36 36 c1 |..F........K.66.| +00000040 62 ad 3f 03 5c 91 fb |b.?.\..|" +"2019-09-24 00:27:00.135 UTC [cauthdsl] func2 -> DEBU 575f 0xc003aec3f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.135 UTC [cauthdsl] func1 -> DEBU 5760 0xc003aec3f0 gate 1569284820133813000 evaluation succeeds" +"2019-09-24 00:27:00.135 UTC [policies] Evaluate -> DEBU 5761 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.135 UTC [policies] Evaluate -> DEBU 5762 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.136 UTC [policies] Evaluate -> DEBU 5763 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.136 UTC [policies] Evaluate -> DEBU 5764 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.136 UTC [msp] DeserializeIdentity -> DEBU 5765 Obtaining identity" +"2019-09-24 00:27:00.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5766 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5767 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.136 UTC [policies] Evaluate -> DEBU 5768 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.137 UTC [policies] Evaluate -> DEBU 5769 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.137 UTC [policies] Evaluate -> DEBU 576a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.137 UTC [cauthdsl] func1 -> DEBU 576b 0xc003aed4d0 gate 1569284820137310600 evaluation starts" +"2019-09-24 00:27:00.137 UTC [cauthdsl] func2 -> DEBU 576c 0xc003aed4d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.137 UTC [cauthdsl] func2 -> DEBU 576d 0xc003aed4d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.138 UTC [cauthdsl] func2 -> DEBU 576e 0xc003aed4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.139 UTC [cauthdsl] func2 -> DEBU 576f 0xc003aed4d0 principal evaluation fails" +"2019-09-24 00:27:00.139 UTC [cauthdsl] func1 -> DEBU 5770 0xc003aed4d0 gate 1569284820137310600 evaluation fails" +"2019-09-24 00:27:00.139 UTC [policies] Evaluate -> DEBU 5771 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.139 UTC [policies] Evaluate -> DEBU 5772 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.139 UTC [policies] Evaluate -> DEBU 5773 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:00.139 UTC [cauthdsl] func1 -> DEBU 5774 0xc003aedd10 gate 1569284820139695500 evaluation starts" +"2019-09-24 00:27:00.139 UTC [cauthdsl] func2 -> DEBU 5775 0xc003aedd10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.139 UTC [cauthdsl] func2 -> DEBU 5776 0xc003aedd10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.140 UTC [cauthdsl] func2 -> DEBU 5777 0xc003aedd10 principal matched by identity 0" +"2019-09-24 00:27:00.140 UTC [msp.identity] Verify -> DEBU 5778 Verify: digest = 00000000 ae 5f 75 8f b8 79 6b 9c 07 89 8e 59 2a 45 63 02 |._u..yk....Y*Ec.| +00000010 9e fc 44 09 6f e3 0b 6b b2 c4 8a 32 fa ae 08 15 |..D.o..k...2....|" +"2019-09-24 00:27:00.140 UTC [msp.identity] Verify -> DEBU 5779 Verify: sig = 00000000 30 45 02 21 00 ac 0a c9 b4 53 a1 27 c0 f2 00 68 |0E.!.....S.'...h| +00000010 68 7e a0 00 2f 93 e7 0a a6 e3 81 a9 d3 f9 eb dd |h~../...........| +00000020 97 89 ec 5c e7 02 20 31 be f8 03 6d 39 fd 83 02 |...\.. 1...m9...| +00000030 cb d4 46 a1 d2 8c a1 1c c9 91 16 4b 12 36 36 c1 |..F........K.66.| +00000040 62 ad 3f 03 5c 91 fb |b.?.\..|" +"2019-09-24 00:27:00.141 UTC [cauthdsl] func2 -> DEBU 577a 0xc003aedd10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.141 UTC [cauthdsl] func1 -> DEBU 577b 0xc003aedd10 gate 1569284820139695500 evaluation succeeds" +"2019-09-24 00:27:00.141 UTC [policies] Evaluate -> DEBU 577c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.141 UTC [policies] Evaluate -> DEBU 577d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.141 UTC [policies] Evaluate -> DEBU 577e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.141 UTC [policies] Evaluate -> DEBU 577f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.142 UTC [gossip.gossip] handleMessage -> DEBU 5780 Exiting" +"2019-09-24 00:27:00.142 UTC [gossip.gossip] handleMessage -> DEBU 5781 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.142 UTC [msp] DeserializeIdentity -> DEBU 5782 Obtaining identity" +"2019-09-24 00:27:00.143 UTC [msp.identity] Verify -> DEBU 5783 Verify: digest = 00000000 f1 ec 6b d0 d0 42 56 41 8f 2d 98 eb 4b dd 20 c3 |..k..BVA.-..K. .| +00000010 f4 93 ba 47 20 2b d6 45 a9 92 26 4d 12 23 2c fd |...G +.E..&M.#,.|" +"2019-09-24 00:27:00.143 UTC [msp.identity] Verify -> DEBU 5784 Verify: sig = 00000000 30 45 02 21 00 9f 8d e9 b2 21 3c d2 08 b2 d9 59 |0E.!.....!<....Y| +00000010 e9 ac 71 75 e3 36 8c 52 7a 29 ca 6f 2d 37 85 b9 |..qu.6.Rz).o-7..| +00000020 0d 8c af a1 d8 02 20 08 48 e6 7f 29 15 61 ba f1 |...... .H..).a..| +00000030 a3 a9 63 01 bb 09 08 87 bc a7 92 c2 fc da 15 ab |..c.............| +00000040 c9 76 8f 54 b1 9f f3 |.v.T...|" +"2019-09-24 00:27:00.144 UTC [msp] DeserializeIdentity -> DEBU 5785 Obtaining identity" +"2019-09-24 00:27:00.144 UTC [msp] DeserializeIdentity -> DEBU 5786 Obtaining identity" +"2019-09-24 00:27:00.145 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5787 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:00.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5788 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.145 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5789 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.145 UTC [policies] Evaluate -> DEBU 578a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.145 UTC [policies] Evaluate -> DEBU 578b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.145 UTC [policies] Evaluate -> DEBU 578c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.145 UTC [cauthdsl] func1 -> DEBU 578d 0xc003b43f50 gate 1569284820145620500 evaluation starts" +"2019-09-24 00:27:00.145 UTC [cauthdsl] func2 -> DEBU 578e 0xc003b43f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.146 UTC [cauthdsl] func2 -> DEBU 578f 0xc003b43f50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.146 UTC [cauthdsl] func2 -> DEBU 5790 0xc003b43f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.146 UTC [cauthdsl] func2 -> DEBU 5791 0xc003b43f50 principal evaluation fails" +"2019-09-24 00:27:00.146 UTC [cauthdsl] func1 -> DEBU 5792 0xc003b43f50 gate 1569284820145620500 evaluation fails" +"2019-09-24 00:27:00.146 UTC [policies] Evaluate -> DEBU 5793 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.146 UTC [policies] Evaluate -> DEBU 5794 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.146 UTC [policies] Evaluate -> DEBU 5795 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:00.147 UTC [cauthdsl] func1 -> DEBU 5796 0xc003b6e7a0 gate 1569284820147001800 evaluation starts" +"2019-09-24 00:27:00.147 UTC [cauthdsl] func2 -> DEBU 5797 0xc003b6e7a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.147 UTC [cauthdsl] func2 -> DEBU 5798 0xc003b6e7a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.147 UTC [cauthdsl] func2 -> DEBU 5799 0xc003b6e7a0 principal matched by identity 0" +"2019-09-24 00:27:00.147 UTC [msp.identity] Verify -> DEBU 579a Verify: digest = 00000000 31 e1 08 13 9b 6f 1b bb 15 c8 86 2c b1 4f 7f c8 |1....o.....,.O..| +00000010 73 e7 db 16 79 4b a3 a5 f2 7c e4 bb 66 d2 77 b2 |s...yK...|..f.w.|" +"2019-09-24 00:27:00.147 UTC [msp.identity] Verify -> DEBU 579b Verify: sig = 00000000 30 45 02 21 00 d3 25 21 ba 6b 47 e3 3c 36 96 50 |0E.!..%!.kG.<6.P| +00000010 b9 b7 8f 6c 69 87 6d 80 d8 2b ef 99 86 fa 73 8b |...li.m..+....s.| +00000020 0c 8d 06 ac 46 02 20 0c 0a a5 75 cb 7d bf 11 5c |....F. ...u.}..\| +00000030 6a ec 27 49 fc 90 de ad ca 89 ff f6 c5 e6 b2 a0 |j.'I............| +00000040 f0 1c 4a 86 ed 55 d5 |..J..U.|" +"2019-09-24 00:27:00.148 UTC [cauthdsl] func2 -> DEBU 579c 0xc003b6e7a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.148 UTC [cauthdsl] func1 -> DEBU 579d 0xc003b6e7a0 gate 1569284820147001800 evaluation succeeds" +"2019-09-24 00:27:00.148 UTC [policies] Evaluate -> DEBU 579e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.148 UTC [policies] Evaluate -> DEBU 579f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.148 UTC [policies] Evaluate -> DEBU 57a0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.148 UTC [policies] Evaluate -> DEBU 57a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.149 UTC [msp.identity] Verify -> DEBU 57a2 Verify: digest = 00000000 17 c3 cd 2d e8 5a 40 f4 52 16 bd 3b c6 09 df 0c |...-.Z@.R..;....| +00000010 2d c8 6b 6a 51 b4 a7 f4 6a 82 b4 6f 82 a2 69 e5 |-.kjQ...j..o..i.|" +"2019-09-24 00:27:00.149 UTC [msp.identity] Verify -> DEBU 57a3 Verify: sig = 00000000 30 45 02 21 00 9d cc 0a 89 00 80 49 a0 52 37 87 |0E.!.......I.R7.| +00000010 3c ee 3b 44 08 fb eb 54 dd 19 c2 46 79 a1 8f 11 |<.;D...T...Fy...| +00000020 16 7d 78 12 89 02 20 56 b1 4c 8d 74 1e be a3 fc |.}x... V.L.t....| +00000030 46 7f 96 be d5 a5 f0 fe 9b 55 12 2c e1 cb 43 33 |F........U.,..C3| +00000040 da 50 ba 4a e0 97 94 |.P.J...|" +"2019-09-24 00:27:00.150 UTC [msp] DeserializeIdentity -> DEBU 57a4 Obtaining identity" +"2019-09-24 00:27:00.150 UTC [msp] DeserializeIdentity -> DEBU 57a5 Obtaining identity" +"2019-09-24 00:27:00.151 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 57a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:00.151 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 57a7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 57a8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.152 UTC [policies] Evaluate -> DEBU 57a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.153 UTC [policies] Evaluate -> DEBU 57aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.153 UTC [policies] Evaluate -> DEBU 57ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.155 UTC [cauthdsl] func1 -> DEBU 57ac 0xc003b726d0 gate 1569284820155018200 evaluation starts" +"2019-09-24 00:27:00.155 UTC [cauthdsl] func2 -> DEBU 57ad 0xc003b726d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.155 UTC [cauthdsl] func2 -> DEBU 57ae 0xc003b726d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.156 UTC [cauthdsl] func2 -> DEBU 57af 0xc003b726d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.156 UTC [cauthdsl] func2 -> DEBU 57b0 0xc003b726d0 principal evaluation fails" +"2019-09-24 00:27:00.156 UTC [cauthdsl] func1 -> DEBU 57b1 0xc003b726d0 gate 1569284820155018200 evaluation fails" +"2019-09-24 00:27:00.157 UTC [policies] Evaluate -> DEBU 57b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.157 UTC [policies] Evaluate -> DEBU 57b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.157 UTC [policies] Evaluate -> DEBU 57b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:00.157 UTC [cauthdsl] func1 -> DEBU 57b5 0xc003b72f10 gate 1569284820157164000 evaluation starts" +"2019-09-24 00:27:00.157 UTC [cauthdsl] func2 -> DEBU 57b6 0xc003b72f10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.158 UTC [cauthdsl] func2 -> DEBU 57b7 0xc003b72f10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.158 UTC [cauthdsl] func2 -> DEBU 57b8 0xc003b72f10 principal matched by identity 0" +"2019-09-24 00:27:00.159 UTC [msp.identity] Verify -> DEBU 57b9 Verify: digest = 00000000 98 18 01 21 90 b9 27 a0 6e 99 35 bf 62 79 02 ff |...!..'.n.5.by..| +00000010 10 6e c8 51 84 1c ad 30 db 0f ba 96 ce de c4 39 |.n.Q...0.......9|" +"2019-09-24 00:27:00.160 UTC [msp.identity] Verify -> DEBU 57ba Verify: sig = 00000000 30 44 02 20 60 16 7e 53 50 33 ef 00 be 62 71 de |0D. `.~SP3...bq.| +00000010 d8 8d 4b b6 fe 20 fc 62 69 8f b9 25 e5 1a 95 27 |..K.. .bi..%...'| +00000020 b8 88 a5 e2 02 20 30 ab 51 ca 0d 92 81 93 8f 0b |..... 0.Q.......| +00000030 3b 56 ae 2a d8 56 2c 43 44 ed 48 a1 55 81 f9 a2 |;V.*.V,CD.H.U...| +00000040 df 6a 98 44 02 fb |.j.D..|" +"2019-09-24 00:27:00.160 UTC [cauthdsl] func2 -> DEBU 57bb 0xc003b72f10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.160 UTC [cauthdsl] func1 -> DEBU 57bc 0xc003b72f10 gate 1569284820157164000 evaluation succeeds" +"2019-09-24 00:27:00.160 UTC [policies] Evaluate -> DEBU 57bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.160 UTC [policies] Evaluate -> DEBU 57be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.160 UTC [policies] Evaluate -> DEBU 57bf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.160 UTC [endorser] ProcessProposal -> DEBU 57c0 Entering: request from 172.18.0.9:50988" +"2019-09-24 00:27:00.160 UTC [policies] Evaluate -> DEBU 57c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.161 UTC [msp] DeserializeIdentity -> DEBU 57c2 Obtaining identity" +"2019-09-24 00:27:00.162 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 57c3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.162 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 57c4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.162 UTC [policies] Evaluate -> DEBU 57c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.162 UTC [policies] Evaluate -> DEBU 57c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.163 UTC [policies] Evaluate -> DEBU 57c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.163 UTC [cauthdsl] func1 -> DEBU 57c8 0xc003c22000 gate 1569284820163195600 evaluation starts" +"2019-09-24 00:27:00.163 UTC [cauthdsl] func2 -> DEBU 57c9 0xc003c22000 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.163 UTC [cauthdsl] func2 -> DEBU 57ca 0xc003c22000 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.163 UTC [cauthdsl] func2 -> DEBU 57cb 0xc003c22000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.164 UTC [cauthdsl] func2 -> DEBU 57cc 0xc003c22000 principal evaluation fails" +"2019-09-24 00:27:00.164 UTC [cauthdsl] func1 -> DEBU 57cd 0xc003c22000 gate 1569284820163195600 evaluation fails" +"2019-09-24 00:27:00.164 UTC [policies] Evaluate -> DEBU 57ce Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.164 UTC [policies] Evaluate -> DEBU 57cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.164 UTC [policies] Evaluate -> DEBU 57d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:00.165 UTC [cauthdsl] func1 -> DEBU 57d1 0xc003c22840 gate 1569284820164987900 evaluation starts" +"2019-09-24 00:27:00.165 UTC [cauthdsl] func2 -> DEBU 57d2 0xc003c22840 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.165 UTC [cauthdsl] func2 -> DEBU 57d3 0xc003c22840 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.165 UTC [cauthdsl] func2 -> DEBU 57d4 0xc003c22840 principal matched by identity 0" +"2019-09-24 00:27:00.165 UTC [msp.identity] Verify -> DEBU 57d5 Verify: digest = 00000000 98 18 01 21 90 b9 27 a0 6e 99 35 bf 62 79 02 ff |...!..'.n.5.by..| +00000010 10 6e c8 51 84 1c ad 30 db 0f ba 96 ce de c4 39 |.n.Q...0.......9|" +"2019-09-24 00:27:00.165 UTC [msp.identity] Verify -> DEBU 57d6 Verify: sig = 00000000 30 44 02 20 60 16 7e 53 50 33 ef 00 be 62 71 de |0D. `.~SP3...bq.| +00000010 d8 8d 4b b6 fe 20 fc 62 69 8f b9 25 e5 1a 95 27 |..K.. .bi..%...'| +00000020 b8 88 a5 e2 02 20 30 ab 51 ca 0d 92 81 93 8f 0b |..... 0.Q.......| +00000030 3b 56 ae 2a d8 56 2c 43 44 ed 48 a1 55 81 f9 a2 |;V.*.V,CD.H.U...| +00000040 df 6a 98 44 02 fb |.j.D..|" +"2019-09-24 00:27:00.166 UTC [cauthdsl] func2 -> DEBU 57d7 0xc003c22840 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.166 UTC [cauthdsl] func1 -> DEBU 57d8 0xc003c22840 gate 1569284820164987900 evaluation succeeds" +"2019-09-24 00:27:00.166 UTC [policies] Evaluate -> DEBU 57d9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.166 UTC [policies] Evaluate -> DEBU 57da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.166 UTC [policies] Evaluate -> DEBU 57db Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.167 UTC [policies] Evaluate -> DEBU 57dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.167 UTC [gossip.gossip] handleMessage -> DEBU 57dd Exiting" +"2019-09-24 00:27:00.161 UTC [protoutils] ValidateProposalMessage -> DEBU 57de ValidateProposalMessage starts for signed proposal 0xc002b99400" +"2019-09-24 00:27:00.168 UTC [protoutils] validateChannelHeader -> DEBU 57df validateChannelHeader info: header type 3" +"2019-09-24 00:27:00.168 UTC [protoutils] checkSignatureFromCreator -> DEBU 57e0 begin" +"2019-09-24 00:27:00.168 UTC [msp] GetManagerForChain -> DEBU 57e1 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:00.168 UTC [msp] DeserializeIdentity -> DEBU 57e2 Obtaining identity" +"2019-09-24 00:27:00.169 UTC [msp.identity] newIdentity -> DEBU 57e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:00.169 UTC [protoutils] checkSignatureFromCreator -> DEBU 57e4 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-09-24 00:27:00.169 UTC [msp] Validate -> DEBU 57e5 MSP Org2MSP validating identity" +"2019-09-24 00:27:00.170 UTC [msp] getCertificationChain -> DEBU 57e6 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:00.170 UTC [protoutils] checkSignatureFromCreator -> DEBU 57e7 creator is valid" +"2019-09-24 00:27:00.170 UTC [msp.identity] Verify -> DEBU 57e8 Verify: digest = 00000000 a9 16 ff a7 dd c6 cb f8 75 91 d8 04 f1 aa ce 07 |........u.......| +00000010 aa e1 95 ec 21 3d c9 1d 37 17 57 02 aa 05 31 be |....!=..7.W...1.|" +"2019-09-24 00:27:00.171 UTC [msp.identity] Verify -> DEBU 57e9 Verify: sig = 00000000 30 45 02 21 00 d1 fb fc 55 14 69 d1 10 1e 3e bc |0E.!....U.i...>.| +00000010 ef 93 be 16 a5 8a 87 9c ab 20 7f 4a 69 3a 67 ca |......... .Ji:g.| +00000020 83 82 6e e1 a0 02 20 76 76 32 0c c5 99 f2 47 d4 |..n... vv2....G.| +00000030 ba a2 70 a1 1d d8 c3 28 d8 3c 55 79 32 7b a6 1a |..p....(. DEBU 57ea exits successfully" +"2019-09-24 00:27:00.171 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 57eb validateChaincodeProposalMessage starts for proposal 0xc0027c1b90, header 0xc002b99810" +"2019-09-24 00:27:00.172 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 57ec validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 00:27:00.172 UTC [endorser] preProcess -> DEBU 57ed [businesschannel][c31ed041] processing txid: c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df" +"2019-09-24 00:27:00.172 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 57ee retrieveTransactionByID() - txId = [c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df]" +"2019-09-24 00:27:00.172 UTC [aclmgmt] CheckACL -> DEBU 57ef acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 00:27:00.173 UTC [aclmgmt] CheckACL -> DEBU 57f0 acl check(/Channel/Application/Writers)" +"2019-09-24 00:27:00.173 UTC [policies] Evaluate -> DEBU 57f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:27:00.173 UTC [policies] Evaluate -> DEBU 57f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.173 UTC [policies] Evaluate -> DEBU 57f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:27:00.174 UTC [cauthdsl] func1 -> DEBU 57f4 0xc003c42ba0 gate 1569284820174022600 evaluation starts" +"2019-09-24 00:27:00.174 UTC [cauthdsl] func2 -> DEBU 57f5 0xc003c42ba0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.174 UTC [cauthdsl] func2 -> DEBU 57f6 0xc003c42ba0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.174 UTC [cauthdsl] func2 -> DEBU 57f7 0xc003c42ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.174 UTC [cauthdsl] func2 -> DEBU 57f8 0xc003c42ba0 principal evaluation fails" +"2019-09-24 00:27:00.174 UTC [cauthdsl] func1 -> DEBU 57f9 0xc003c42ba0 gate 1569284820174022600 evaluation fails" +"2019-09-24 00:27:00.175 UTC [policies] Evaluate -> DEBU 57fa Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:00.175 UTC [policies] Evaluate -> DEBU 57fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:00.175 UTC [policies] Evaluate -> DEBU 57fc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 00:27:00.175 UTC [cauthdsl] func1 -> DEBU 57fd 0xc003c43400 gate 1569284820175754100 evaluation starts" +"2019-09-24 00:27:00.176 UTC [cauthdsl] func2 -> DEBU 57fe 0xc003c43400 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.176 UTC [cauthdsl] func2 -> DEBU 57ff 0xc003c43400 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.176 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5800 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:27:00.176 UTC [msp] Validate -> DEBU 5801 MSP Org2MSP validating identity" +"2019-09-24 00:27:00.176 UTC [msp] getCertificationChain -> DEBU 5802 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:00.177 UTC [cauthdsl] func2 -> DEBU 5803 0xc003c43400 principal matched by identity 0" +"2019-09-24 00:27:00.177 UTC [msp.identity] Verify -> DEBU 5804 Verify: digest = 00000000 a9 16 ff a7 dd c6 cb f8 75 91 d8 04 f1 aa ce 07 |........u.......| +00000010 aa e1 95 ec 21 3d c9 1d 37 17 57 02 aa 05 31 be |....!=..7.W...1.|" +"2019-09-24 00:27:00.177 UTC [msp.identity] Verify -> DEBU 5805 Verify: sig = 00000000 30 45 02 21 00 d1 fb fc 55 14 69 d1 10 1e 3e bc |0E.!....U.i...>.| +00000010 ef 93 be 16 a5 8a 87 9c ab 20 7f 4a 69 3a 67 ca |......... .Ji:g.| +00000020 83 82 6e e1 a0 02 20 76 76 32 0c c5 99 f2 47 d4 |..n... vv2....G.| +00000030 ba a2 70 a1 1d d8 c3 28 d8 3c 55 79 32 7b a6 1a |..p....(. DEBU 5806 0xc003c43400 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.178 UTC [cauthdsl] func1 -> DEBU 5807 0xc003c43400 gate 1569284820175754100 evaluation succeeds" +"2019-09-24 00:27:00.178 UTC [policies] Evaluate -> DEBU 5808 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:00.178 UTC [policies] Evaluate -> DEBU 5809 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:00.178 UTC [policies] Evaluate -> DEBU 580a Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:27:00.178 UTC [policies] Evaluate -> DEBU 580b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:27:00.178 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 580c constructing new tx simulator" +"2019-09-24 00:27:00.179 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 580d constructing new tx simulator txid = [c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df]" +"2019-09-24 00:27:00.179 UTC [endorser] SimulateProposal -> DEBU 580e [businesschannel][c31ed041] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:00.179 UTC [stateleveldb] GetState -> DEBU 580f GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:00.179 UTC [ccprovider] GetChaincodeData -> DEBU 5810 Getting chaincode data for from cache" +"2019-09-24 00:27:00.179 UTC [endorser] callChaincode -> INFO 5811 [businesschannel][c31ed041] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:00.180 UTC [chaincode] Execute -> DEBU 5812 Entry" +"2019-09-24 00:27:00.180 UTC [chaincode] handleMessage -> DEBU 5813 [c31ed041] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:27:00.180 UTC [chaincode] HandleTransaction -> DEBU 5814 [c31ed041] handling GET_STATE from chaincode" +"2019-09-24 00:27:00.181 UTC [chaincode] HandleGetState -> DEBU 5815 [c31ed041] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 00:27:00.181 UTC [stateleveldb] GetState -> DEBU 5816 GetState(). ns=exp02, key=a" +"2019-09-24 00:27:00.181 UTC [chaincode] HandleTransaction -> DEBU 5817 [c31ed041] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:27:00.182 UTC [chaincode] handleMessage -> DEBU 5818 [c31ed041] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:00.182 UTC [chaincode] Notify -> DEBU 5819 [c31ed041] notifying Txid:c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df, channelID:businesschannel" +"2019-09-24 00:27:00.182 UTC [chaincode] Execute -> DEBU 581a Exit" +"2019-09-24 00:27:00.182 UTC [endorser] callChaincode -> INFO 581b [businesschannel][c31ed041] Exit chaincode: name:"exp02" (3ms)" +"2019-09-24 00:27:00.182 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 581c Simulation completed, getting simulation results" +"2019-09-24 00:27:00.183 UTC [lockbasedtxmgr] Done -> DEBU 581d Done with transaction simulation / query execution [c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df]" +"2019-09-24 00:27:00.183 UTC [endorser] SimulateProposal -> DEBU 581e [businesschannel][c31ed041] Exit" +"2019-09-24 00:27:00.183 UTC [endorser] endorseProposal -> DEBU 581f [businesschannel][c31ed041] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:00.183 UTC [endorser] endorseProposal -> DEBU 5820 [businesschannel][c31ed041] escc for chaincode name:"exp02" is escc" +"2019-09-24 00:27:00.183 UTC [endorser] EndorseWithPlugin -> DEBU 5821 Entering endorsement for {plugin: escc, channel: businesschannel, tx: c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df, chaincode: exp02}" +"2019-09-24 00:27:00.183 UTC [msp.identity] Sign -> DEBU 5822 Sign: plaintext: 0A20E83ACF118B69344F54B8862B6246...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:00.183 UTC [msp.identity] Sign -> DEBU 5823 Sign: digest: 99BF12EC3BAEAD51CC36092C229AE8D2FCC2917A2E091F6049B26F185B7C69EC " +"2019-09-24 00:27:00.183 UTC [endorser] EndorseWithPlugin -> DEBU 5824 Exiting {plugin: escc, channel: businesschannel, tx: c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df, chaincode: exp02}" +"2019-09-24 00:27:00.183 UTC [endorser] endorseProposal -> DEBU 5825 [businesschannel][c31ed041] Exit" +"2019-09-24 00:27:00.183 UTC [lockbasedtxmgr] Done -> DEBU 5826 Done with transaction simulation / query execution [c31ed041cc67b400f2fc80cea1f45adc1e3ac84ada776cab990f7f9e10c952df]" +"2019-09-24 00:27:00.183 UTC [endorser] func1 -> DEBU 5827 Exit: request from 172.18.0.9:50988" +"2019-09-24 00:27:00.183 UTC [comm.grpc.server] 1 -> INFO 5828 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50988 grpc.code=OK grpc.call_duration=23.7261ms +"2019-09-24 00:27:00.187 UTC [grpc] infof -> DEBU 5829 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:00.187 UTC [grpc] infof -> DEBU 582a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:00.285 UTC [msp] DeserializeIdentity -> DEBU 582b Obtaining identity" +"2019-09-24 00:27:00.285 UTC [msp] DeserializeIdentity -> DEBU 582c Obtaining identity" +"2019-09-24 00:27:00.286 UTC [gossip.pull] Hello -> DEBU 582d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:00.286 UTC [msp] DeserializeIdentity -> DEBU 582e Obtaining identity" +"2019-09-24 00:27:00.287 UTC [msp] DeserializeIdentity -> DEBU 582f Obtaining identity" +"2019-09-24 00:27:00.287 UTC [gossip.comm] Send -> DEBU 5830 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:00.288 UTC [gossip.comm] sendToEndpoint -> DEBU 5831 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.289 UTC [gossip.comm] sendToEndpoint -> DEBU 5832 Exiting" +"2019-09-24 00:27:00.291 UTC [gossip.comm] func1 -> DEBU 5833 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.292 UTC [gossip.gossip] handleMessage -> DEBU 5834 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.292 UTC [gossip.pull] HandleMessage -> DEBU 5835 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.292 UTC [gossip.gossip] handleMessage -> DEBU 5836 Exiting" +"2019-09-24 00:27:00.580 UTC [gossip.comm] func1 -> DEBU 5837 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.580 UTC [gossip.gossip] handleMessage -> DEBU 5838 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.580 UTC [msp] DeserializeIdentity -> DEBU 5839 Obtaining identity" +"2019-09-24 00:27:00.581 UTC [msp] DeserializeIdentity -> DEBU 583a Obtaining identity" +"2019-09-24 00:27:00.581 UTC [gossip.gossip] handleMessage -> DEBU 583b Exiting" +"2019-09-24 00:27:00.589 UTC [gossip.comm] func1 -> DEBU 583c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:00.590 UTC [gossip.comm] func1 -> DEBU 583d Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:00.591 UTC [gossip.gossip] handleMessage -> DEBU 583e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:00.592 UTC [msp.identity] Verify -> DEBU 583f Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +"2019-09-24 00:27:00.592 UTC [msp.identity] Verify -> DEBU 5840 Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +00000040 48 4c 21 8e e5 c8 |HL!...|" +"2019-09-24 00:27:00.592 UTC [msp] DeserializeIdentity -> DEBU 5841 Obtaining identity" +"2019-09-24 00:27:00.592 UTC [gossip.gossip] handleMessage -> DEBU 5842 Exiting" +"2019-09-24 00:27:00.593 UTC [gossip.gossip] handleMessage -> DEBU 5843 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:00.593 UTC [msp.identity] Verify -> DEBU 5844 Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +"2019-09-24 00:27:00.593 UTC [msp.identity] Verify -> DEBU 5845 Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +00000040 48 4c 21 8e e5 c8 |HL!...|" +"2019-09-24 00:27:00.594 UTC [gossip.gossip] handleMessage -> DEBU 5846 Exiting" +"2019-09-24 00:27:00.594 UTC [gossip.gossip] handleMessage -> DEBU 5847 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:00.594 UTC [msp.identity] Verify -> DEBU 5848 Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +"2019-09-24 00:27:00.594 UTC [msp.identity] Verify -> DEBU 5849 Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +00000040 48 4c 21 8e e5 c8 |HL!...|" +"2019-09-24 00:27:00.594 UTC [msp] DeserializeIdentity -> DEBU 584a Obtaining identity" +"2019-09-24 00:27:00.595 UTC [gossip.gossip] handleMessage -> DEBU 584b Exiting" +"2019-09-24 00:27:00.675 UTC [gossip.comm] func1 -> DEBU 584c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.676 UTC [gossip.gossip] handleMessage -> DEBU 584d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.677 UTC [gossip.gossip] handleMessage -> DEBU 584e Exiting" +"2019-09-24 00:27:00.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 584f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.678 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5850 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:00.678 UTC [msp] DeserializeIdentity -> DEBU 5851 Obtaining identity" +"2019-09-24 00:27:00.679 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5852 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:00.679 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5853 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.679 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5854 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.680 UTC [policies] Evaluate -> DEBU 5855 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.680 UTC [policies] Evaluate -> DEBU 5856 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.681 UTC [policies] Evaluate -> DEBU 5857 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.681 UTC [cauthdsl] func1 -> DEBU 5858 0xc003d3b440 gate 1569284820681861900 evaluation starts" +"2019-09-24 00:27:00.682 UTC [cauthdsl] func2 -> DEBU 5859 0xc003d3b440 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.682 UTC [cauthdsl] func2 -> DEBU 585a 0xc003d3b440 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.682 UTC [cauthdsl] func2 -> DEBU 585b 0xc003d3b440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.683 UTC [cauthdsl] func2 -> DEBU 585c 0xc003d3b440 principal evaluation fails" +"2019-09-24 00:27:00.683 UTC [cauthdsl] func1 -> DEBU 585d 0xc003d3b440 gate 1569284820681861900 evaluation fails" +"2019-09-24 00:27:00.685 UTC [gossip.gossip] handleMessage -> DEBU 585e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.686 UTC [gossip.comm] func1 -> DEBU 585f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.687 UTC [policies] Evaluate -> DEBU 5860 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.688 UTC [policies] Evaluate -> DEBU 5861 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.689 UTC [policies] Evaluate -> DEBU 5862 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:00.689 UTC [cauthdsl] func1 -> DEBU 5863 0xc003d3bc80 gate 1569284820689516000 evaluation starts" +"2019-09-24 00:27:00.689 UTC [cauthdsl] func2 -> DEBU 5864 0xc003d3bc80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.690 UTC [cauthdsl] func2 -> DEBU 5865 0xc003d3bc80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.690 UTC [cauthdsl] func2 -> DEBU 5866 0xc003d3bc80 principal matched by identity 0" +"2019-09-24 00:27:00.690 UTC [msp.identity] Verify -> DEBU 5867 Verify: digest = 00000000 b6 61 2d 97 a1 68 01 48 b9 dc a4 01 52 97 3f 0b |.a-..h.H....R.?.| +00000010 7e 53 26 ff 10 53 77 0b 45 6c 22 31 ce ca 8a 87 |~S&..Sw.El"1....|" +"2019-09-24 00:27:00.691 UTC [msp.identity] Verify -> DEBU 5868 Verify: sig = 00000000 30 45 02 21 00 f5 22 ab 0b b4 55 ae b8 e5 d1 27 |0E.!.."...U....'| +00000010 6d e1 c3 89 b3 cc bd 79 43 1e 43 ff f5 ed 31 b1 |m......yC.C...1.| +00000020 44 97 3c 1d a7 02 20 6e 18 70 86 f4 86 7d 78 0a |D.<... n.p...}x.| +00000030 ee 07 cb 1b f3 f1 99 28 32 12 75 c4 d9 2b b9 97 |.......(2.u..+..| +00000040 47 d2 8e 3e cd 95 72 |G..>..r|" +"2019-09-24 00:27:00.691 UTC [cauthdsl] func2 -> DEBU 5869 0xc003d3bc80 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.692 UTC [cauthdsl] func1 -> DEBU 586a 0xc003d3bc80 gate 1569284820689516000 evaluation succeeds" +"2019-09-24 00:27:00.692 UTC [policies] Evaluate -> DEBU 586b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.692 UTC [policies] Evaluate -> DEBU 586c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.692 UTC [policies] Evaluate -> DEBU 586d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.693 UTC [policies] Evaluate -> DEBU 586e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.693 UTC [gossip.discovery] handleAliveMessage -> DEBU 586f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 5870 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:00.694 UTC [gossip.discovery] learnExistingMembers -> DEBU 5871 updating membership: timestamp: " +"2019-09-24 00:27:00.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 5872 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:00.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 5873 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:00.695 UTC [gossip.discovery] learnExistingMembers -> DEBU 5874 Exiting" +"2019-09-24 00:27:00.696 UTC [gossip.discovery] handleAliveMessage -> DEBU 5875 Exiting" +"2019-09-24 00:27:00.696 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5876 Exiting" +"2019-09-24 00:27:00.696 UTC [gossip.gossip] handleMessage -> DEBU 5877 Exiting" +"2019-09-24 00:27:00.697 UTC [gossip.gossip] handleMessage -> DEBU 5878 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.696 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5879 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.697 UTC [gossip.discovery] handleMsgFromComm -> DEBU 587a Exiting" +"2019-09-24 00:27:00.698 UTC [gossip.gossip] handleMessage -> DEBU 587b Exiting" +"2019-09-24 00:27:00.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 587c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 587d Exiting" +"2019-09-24 00:27:00.702 UTC [msp] DeserializeIdentity -> DEBU 587e Obtaining identity" +"2019-09-24 00:27:00.703 UTC [msp] DeserializeIdentity -> DEBU 587f Obtaining identity" +"2019-09-24 00:27:00.703 UTC [msp] DeserializeIdentity -> DEBU 5880 Obtaining identity" +"2019-09-24 00:27:00.704 UTC [msp] DeserializeIdentity -> DEBU 5881 Obtaining identity" +"2019-09-24 00:27:00.704 UTC [msp] DeserializeIdentity -> DEBU 5882 Obtaining identity" +"2019-09-24 00:27:00.705 UTC [msp] DeserializeIdentity -> DEBU 5883 Obtaining identity" +"2019-09-24 00:27:00.705 UTC [msp] DeserializeIdentity -> DEBU 5884 Obtaining identity" +"2019-09-24 00:27:00.706 UTC [gossip.comm] Send -> DEBU 5885 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:00.706 UTC [msp] DeserializeIdentity -> DEBU 5886 Obtaining identity" +"2019-09-24 00:27:00.706 UTC [gossip.comm] Send -> DEBU 5887 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:00.707 UTC [gossip.comm] sendToEndpoint -> DEBU 5888 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.707 UTC [gossip.comm] sendToEndpoint -> DEBU 5889 Exiting" +"2019-09-24 00:27:00.707 UTC [gossip.comm] sendToEndpoint -> DEBU 588a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.707 UTC [gossip.comm] sendToEndpoint -> DEBU 588b Exiting" +"2019-09-24 00:27:00.770 UTC [gossip.comm] func1 -> DEBU 588c Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.772 UTC [gossip.gossip] handleMessage -> DEBU 588d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU 588e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.772 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 588f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:00.773 UTC [msp] DeserializeIdentity -> DEBU 5890 Obtaining identity" +"2019-09-24 00:27:00.773 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5891 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:00.774 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5892 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.774 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5893 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:00.774 UTC [policies] Evaluate -> DEBU 5894 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:00.775 UTC [policies] Evaluate -> DEBU 5895 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:00.775 UTC [policies] Evaluate -> DEBU 5896 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:00.776 UTC [cauthdsl] func1 -> DEBU 5897 0xc003e40bf0 gate 1569284820776080000 evaluation starts" +"2019-09-24 00:27:00.777 UTC [cauthdsl] func2 -> DEBU 5898 0xc003e40bf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.777 UTC [cauthdsl] func2 -> DEBU 5899 0xc003e40bf0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.777 UTC [cauthdsl] func2 -> DEBU 589a 0xc003e40bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:00.778 UTC [cauthdsl] func2 -> DEBU 589b 0xc003e40bf0 principal evaluation fails" +"2019-09-24 00:27:00.778 UTC [cauthdsl] func1 -> DEBU 589c 0xc003e40bf0 gate 1569284820776080000 evaluation fails" +"2019-09-24 00:27:00.778 UTC [policies] Evaluate -> DEBU 589d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.779 UTC [policies] Evaluate -> DEBU 589e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:00.779 UTC [policies] Evaluate -> DEBU 589f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:00.779 UTC [cauthdsl] func1 -> DEBU 58a0 0xc003e41550 gate 1569284820779627900 evaluation starts" +"2019-09-24 00:27:00.779 UTC [cauthdsl] func2 -> DEBU 58a1 0xc003e41550 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:00.779 UTC [cauthdsl] func2 -> DEBU 58a2 0xc003e41550 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:00.779 UTC [cauthdsl] func2 -> DEBU 58a3 0xc003e41550 principal matched by identity 0" +"2019-09-24 00:27:00.780 UTC [msp.identity] Verify -> DEBU 58a4 Verify: digest = 00000000 60 85 20 4c ad 4c d5 cc c4 1d b2 1a aa 3b 37 90 |`. L.L.......;7.| +00000010 56 9c 46 fd e3 99 f3 9c d4 a2 02 8e 1b ef 41 c3 |V.F...........A.|" +"2019-09-24 00:27:00.780 UTC [msp.identity] Verify -> DEBU 58a5 Verify: sig = 00000000 30 45 02 21 00 df e6 30 ae e4 87 a0 60 98 b5 0c |0E.!...0....`...| +00000010 dc e3 89 bc 6b b5 1e 0c b6 e2 3b 33 c2 5a 80 ce |....k.....;3.Z..| +00000020 ce 26 66 75 39 02 20 4f e6 c9 16 d5 d4 e4 ba 1a |.&fu9. O........| +00000030 f5 5c cc 91 74 90 5e 46 6b 3c e5 60 09 0e 53 51 |.\..t.^Fk<.`..SQ| +00000040 95 aa ea 16 61 99 b4 |....a..|" +"2019-09-24 00:27:00.780 UTC [cauthdsl] func2 -> DEBU 58a6 0xc003e41550 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:00.780 UTC [cauthdsl] func1 -> DEBU 58a7 0xc003e41550 gate 1569284820779627900 evaluation succeeds" +"2019-09-24 00:27:00.781 UTC [policies] Evaluate -> DEBU 58a8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.781 UTC [policies] Evaluate -> DEBU 58a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:00.782 UTC [policies] Evaluate -> DEBU 58aa Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:00.782 UTC [policies] Evaluate -> DEBU 58ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:00.782 UTC [gossip.discovery] handleAliveMessage -> DEBU 58ac Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:00.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 58ad Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:00.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 58ae updating membership: timestamp: " +"2019-09-24 00:27:00.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 58af Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:00.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 58b0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:00.782 UTC [gossip.discovery] learnExistingMembers -> DEBU 58b1 Exiting" +"2019-09-24 00:27:00.782 UTC [gossip.discovery] handleAliveMessage -> DEBU 58b2 Exiting" +"2019-09-24 00:27:00.782 UTC [gossip.discovery] handleMsgFromComm -> DEBU 58b3 Exiting" +"2019-09-24 00:27:00.782 UTC [gossip.discovery] sendMemResponse -> DEBU 58b4 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:27:00.782 UTC [msp] DeserializeIdentity -> DEBU 58b5 Obtaining identity" +"2019-09-24 00:27:00.782 UTC [msp] DeserializeIdentity -> DEBU 58b6 Obtaining identity" +"2019-09-24 00:27:00.782 UTC [msp] DeserializeIdentity -> DEBU 58b7 Obtaining identity" +"2019-09-24 00:27:00.782 UTC [gossip.comm] Send -> DEBU 58b8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:00.782 UTC [gossip.discovery] sendMemResponse -> DEBU 58b9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020L" signature:"0D\002 ;\263\347\267\331\237+\346j :g57\"\310\203\330\205h\307F-B\246\200\267\201\202 L\253\002 rE1c\355\206\351\324\244\255\223\277W\330\031\322\260`\362\375\357[\0038\242/\272Ms\325\034G" > alive: alive: alive: " +"2019-09-24 00:27:00.783 UTC [gossip.comm] sendToEndpoint -> DEBU 58ba Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.783 UTC [gossip.comm] sendToEndpoint -> DEBU 58bb Exiting" +"2019-09-24 00:27:00.772 UTC [gossip.gossip] handleMessage -> DEBU 58bc Exiting" +"2019-09-24 00:27:00.817 UTC [gossip.comm] func1 -> DEBU 58bd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.817 UTC [gossip.gossip] handleMessage -> DEBU 58be Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.817 UTC [gossip.pull] HandleMessage -> DEBU 58bf GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.817 UTC [msp] DeserializeIdentity -> DEBU 58c0 Obtaining identity" +"2019-09-24 00:27:00.817 UTC [msp] DeserializeIdentity -> DEBU 58c1 Obtaining identity" +"2019-09-24 00:27:00.817 UTC [msp] DeserializeIdentity -> DEBU 58c2 Obtaining identity" +"2019-09-24 00:27:00.818 UTC [msp] DeserializeIdentity -> DEBU 58c3 Obtaining identity" +"2019-09-24 00:27:00.818 UTC [msp] DeserializeIdentity -> DEBU 58c4 Obtaining identity" +"2019-09-24 00:27:00.818 UTC [msp] DeserializeIdentity -> DEBU 58c5 Obtaining identity" +"2019-09-24 00:27:00.818 UTC [gossip.pull] SendDigest -> DEBU 58c6 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:27:00.818 UTC [gossip.gossip] handleMessage -> DEBU 58c7 Exiting" +"2019-09-24 00:27:00.838 UTC [gossip.comm] func1 -> DEBU 58c8 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.838 UTC [gossip.gossip] handleMessage -> DEBU 58c9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.838 UTC [gossip.pull] HandleMessage -> DEBU 58ca GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:00.838 UTC [gossip.pull] SendDigest -> DEBU 58cb Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:00.839 UTC [gossip.gossip] handleMessage -> DEBU 58cc Exiting" +"2019-09-24 00:27:01.073 UTC [gossip.gossip] handleMessage -> DEBU 58cd Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:01.073 UTC [msp] DeserializeIdentity -> DEBU 58ce Obtaining identity" +"2019-09-24 00:27:01.073 UTC [msp] DeserializeIdentity -> DEBU 58cf Obtaining identity" +"2019-09-24 00:27:01.073 UTC [msp] DeserializeIdentity -> DEBU 58d0 Obtaining identity" +"2019-09-24 00:27:01.074 UTC [gossip.gossip] handleMessage -> DEBU 58d1 Exiting" +"2019-09-24 00:27:01.082 UTC [gossip.gossip] handleMessage -> DEBU 58d2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:01.083 UTC [msp] DeserializeIdentity -> DEBU 58d3 Obtaining identity" +"2019-09-24 00:27:01.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 58d4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:01.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 58d5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:01.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 58d6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:01.084 UTC [policies] Evaluate -> DEBU 58d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:01.084 UTC [policies] Evaluate -> DEBU 58d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:01.085 UTC [policies] Evaluate -> DEBU 58d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:01.085 UTC [cauthdsl] func1 -> DEBU 58da 0xc003e8d130 gate 1569284821085298800 evaluation starts" +"2019-09-24 00:27:01.085 UTC [cauthdsl] func2 -> DEBU 58db 0xc003e8d130 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:01.085 UTC [cauthdsl] func2 -> DEBU 58dc 0xc003e8d130 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:01.085 UTC [cauthdsl] func2 -> DEBU 58dd 0xc003e8d130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:01.086 UTC [cauthdsl] func2 -> DEBU 58de 0xc003e8d130 principal evaluation fails" +"2019-09-24 00:27:01.086 UTC [cauthdsl] func1 -> DEBU 58df 0xc003e8d130 gate 1569284821085298800 evaluation fails" +"2019-09-24 00:27:01.086 UTC [policies] Evaluate -> DEBU 58e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:01.087 UTC [policies] Evaluate -> DEBU 58e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:01.087 UTC [policies] Evaluate -> DEBU 58e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:01.087 UTC [cauthdsl] func1 -> DEBU 58e3 0xc003e8d970 gate 1569284821087619800 evaluation starts" +"2019-09-24 00:27:01.087 UTC [cauthdsl] func2 -> DEBU 58e4 0xc003e8d970 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:01.088 UTC [cauthdsl] func2 -> DEBU 58e5 0xc003e8d970 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:01.088 UTC [cauthdsl] func2 -> DEBU 58e6 0xc003e8d970 principal matched by identity 0" +"2019-09-24 00:27:01.088 UTC [msp.identity] Verify -> DEBU 58e7 Verify: digest = 00000000 ae 5f 75 8f b8 79 6b 9c 07 89 8e 59 2a 45 63 02 |._u..yk....Y*Ec.| +00000010 9e fc 44 09 6f e3 0b 6b b2 c4 8a 32 fa ae 08 15 |..D.o..k...2....|" +"2019-09-24 00:27:01.088 UTC [msp.identity] Verify -> DEBU 58e8 Verify: sig = 00000000 30 45 02 21 00 ac 0a c9 b4 53 a1 27 c0 f2 00 68 |0E.!.....S.'...h| +00000010 68 7e a0 00 2f 93 e7 0a a6 e3 81 a9 d3 f9 eb dd |h~../...........| +00000020 97 89 ec 5c e7 02 20 31 be f8 03 6d 39 fd 83 02 |...\.. 1...m9...| +00000030 cb d4 46 a1 d2 8c a1 1c c9 91 16 4b 12 36 36 c1 |..F........K.66.| +00000040 62 ad 3f 03 5c 91 fb |b.?.\..|" +"2019-09-24 00:27:01.089 UTC [cauthdsl] func2 -> DEBU 58e9 0xc003e8d970 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:01.089 UTC [cauthdsl] func1 -> DEBU 58ea 0xc003e8d970 gate 1569284821087619800 evaluation succeeds" +"2019-09-24 00:27:01.089 UTC [policies] Evaluate -> DEBU 58eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:01.090 UTC [policies] Evaluate -> DEBU 58ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:01.092 UTC [policies] Evaluate -> DEBU 58ee Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:01.092 UTC [policies] Evaluate -> DEBU 58ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:01.091 UTC [gossip.comm] func1 -> DEBU 58ed Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:01.092 UTC [msp] DeserializeIdentity -> DEBU 58f0 Obtaining identity" +"2019-09-24 00:27:01.093 UTC [gossip.gossip] handleMessage -> DEBU 58f1 Exiting" +"2019-09-24 00:27:01.093 UTC [gossip.gossip] handleMessage -> DEBU 58f2 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:01.093 UTC [msp] DeserializeIdentity -> DEBU 58f3 Obtaining identity" +"2019-09-24 00:27:01.094 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 58f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:01.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 58f5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:01.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 58f6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:01.094 UTC [policies] Evaluate -> DEBU 58f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:01.094 UTC [policies] Evaluate -> DEBU 58f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:01.095 UTC [policies] Evaluate -> DEBU 58f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:01.095 UTC [cauthdsl] func1 -> DEBU 58fa 0xc003ed5340 gate 1569284821095438700 evaluation starts" +"2019-09-24 00:27:01.095 UTC [cauthdsl] func2 -> DEBU 58fb 0xc003ed5340 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:01.095 UTC [cauthdsl] func2 -> DEBU 58fc 0xc003ed5340 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:01.096 UTC [cauthdsl] func2 -> DEBU 58fd 0xc003ed5340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:01.096 UTC [cauthdsl] func2 -> DEBU 58fe 0xc003ed5340 principal evaluation fails" +"2019-09-24 00:27:01.096 UTC [cauthdsl] func1 -> DEBU 58ff 0xc003ed5340 gate 1569284821095438700 evaluation fails" +"2019-09-24 00:27:01.096 UTC [policies] Evaluate -> DEBU 5900 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:01.097 UTC [policies] Evaluate -> DEBU 5901 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:01.097 UTC [policies] Evaluate -> DEBU 5902 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:01.097 UTC [cauthdsl] func1 -> DEBU 5903 0xc003ed5b80 gate 1569284821097780000 evaluation starts" +"2019-09-24 00:27:01.098 UTC [cauthdsl] func2 -> DEBU 5904 0xc003ed5b80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:01.098 UTC [cauthdsl] func2 -> DEBU 5905 0xc003ed5b80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:01.098 UTC [cauthdsl] func2 -> DEBU 5906 0xc003ed5b80 principal matched by identity 0" +"2019-09-24 00:27:01.098 UTC [msp.identity] Verify -> DEBU 5907 Verify: digest = 00000000 ae 5f 75 8f b8 79 6b 9c 07 89 8e 59 2a 45 63 02 |._u..yk....Y*Ec.| +00000010 9e fc 44 09 6f e3 0b 6b b2 c4 8a 32 fa ae 08 15 |..D.o..k...2....|" +"2019-09-24 00:27:01.099 UTC [msp.identity] Verify -> DEBU 5908 Verify: sig = 00000000 30 45 02 21 00 ac 0a c9 b4 53 a1 27 c0 f2 00 68 |0E.!.....S.'...h| +00000010 68 7e a0 00 2f 93 e7 0a a6 e3 81 a9 d3 f9 eb dd |h~../...........| +00000020 97 89 ec 5c e7 02 20 31 be f8 03 6d 39 fd 83 02 |...\.. 1...m9...| +00000030 cb d4 46 a1 d2 8c a1 1c c9 91 16 4b 12 36 36 c1 |..F........K.66.| +00000040 62 ad 3f 03 5c 91 fb |b.?.\..|" +"2019-09-24 00:27:01.099 UTC [cauthdsl] func2 -> DEBU 5909 0xc003ed5b80 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:01.099 UTC [cauthdsl] func1 -> DEBU 590a 0xc003ed5b80 gate 1569284821097780000 evaluation succeeds" +"2019-09-24 00:27:01.100 UTC [policies] Evaluate -> DEBU 590b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:01.100 UTC [policies] Evaluate -> DEBU 590c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:01.100 UTC [policies] Evaluate -> DEBU 590d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:01.100 UTC [policies] Evaluate -> DEBU 590e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:01.101 UTC [msp] DeserializeIdentity -> DEBU 590f Obtaining identity" +"2019-09-24 00:27:01.101 UTC [gossip.gossip] handleMessage -> DEBU 5910 Exiting" +"2019-09-24 00:27:01.648 UTC [gossip.comm] func1 -> DEBU 5911 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:01.648 UTC [gossip.gossip] handleMessage -> DEBU 5912 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:01.648 UTC [gossip.pull] HandleMessage -> DEBU 5913 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:01.648 UTC [gossip.pull] SendDigest -> DEBU 5914 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:01.648 UTC [gossip.gossip] handleMessage -> DEBU 5915 Exiting" +"2019-09-24 00:27:01.779 UTC [gossip.comm] func1 -> DEBU 5916 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020M" signature:"0E\002!\000\333\314\310\027Aj\272\317\372\254\234\026\354UY\246\232\315/\224\004\354J\002Ov\264\340Ex\213$\002 jq44\236\217}\"\337\204?\026\356\3523rd\234\223,\377\300p\n)\255\227\373\204\246 ?" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:01.779 UTC [gossip.gossip] handleMessage -> DEBU 5917 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020M" signature:"0E\002!\000\333\314\310\027Aj\272\317\372\254\234\026\354UY\246\232\315/\224\004\354J\002Ov\264\340Ex\213$\002 jq44\236\217}\"\337\204?\026\356\3523rd\234\223,\377\300p\n)\255\227\373\204\246 ?" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:01.780 UTC [gossip.gossip] handleMessage -> DEBU 5918 Exiting" +"2019-09-24 00:27:01.780 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5919 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020M" signature:"0E\002!\000\333\314\310\027Aj\272\317\372\254\234\026\354UY\246\232\315/\224\004\354J\002Ov\264\340Ex\213$\002 jq44\236\217}\"\337\204?\026\356\3523rd\234\223,\377\300p\n)\255\227\373\204\246 ?" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:01.780 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 591a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:01.780 UTC [msp.identity] Verify -> DEBU 591b Verify: digest = 00000000 52 5e e8 ef 5a 00 8e 80 16 a3 56 11 66 44 d6 ae |R^..Z.....V.fD..| +00000010 cb 5b c3 a6 29 9a c5 0e 88 d4 a1 db 09 30 50 bd |.[..)........0P.|" +"2019-09-24 00:27:01.780 UTC [msp.identity] Verify -> DEBU 591c Verify: sig = 00000000 30 45 02 21 00 db cc c8 17 41 6a ba cf fa ac 9c |0E.!.....Aj.....| +00000010 16 ec 55 59 a6 9a cd 2f 94 04 ec 4a 02 4f 76 b4 |..UY.../...J.Ov.| +00000020 e0 45 78 8b 24 02 20 6a 71 34 34 9e 8f 7d 22 df |.Ex.$. jq44..}".| +00000030 84 3f 16 ee ea 33 72 64 9c 93 2c ff c0 70 0a 29 |.?...3rd..,..p.)| +00000040 ad 97 fb 84 a6 20 3f |..... ?|" +"2019-09-24 00:27:01.780 UTC [msp.identity] Verify -> DEBU 591d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:27:01.780 UTC [msp.identity] Verify -> DEBU 591e Verify: sig = 00000000 30 44 02 20 06 1a 8e bf b0 9d c5 16 e9 dd 8f 69 |0D. ...........i| +00000010 92 48 c3 a2 18 dc 9e 82 a5 84 ef 8f 91 b7 3a e9 |.H............:.| +00000020 fd 31 6e 49 02 20 04 af 74 5a 06 d2 92 ef f6 b3 |.1nI. ..tZ......| +00000030 dc 31 33 e3 bf 48 b7 32 6c 2e 4f 7c d1 1d 59 d9 |.13..H.2l.O|..Y.| +00000040 d9 2e 14 de 4a e5 |....J.|" +"2019-09-24 00:27:01.781 UTC [gossip.discovery] handleAliveMessage -> DEBU 591f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:01.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5920 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:27:01.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5921 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:01.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5922 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:01.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5923 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:01.781 UTC [gossip.discovery] learnExistingMembers -> DEBU 5924 Exiting" +"2019-09-24 00:27:01.781 UTC [gossip.discovery] handleAliveMessage -> DEBU 5925 Exiting" +"2019-09-24 00:27:01.781 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5926 Exiting" +"2019-09-24 00:27:01.781 UTC [gossip.discovery] sendMemResponse -> DEBU 5927 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:27:01.781 UTC [msp] DeserializeIdentity -> DEBU 5928 Obtaining identity" +"2019-09-24 00:27:01.782 UTC [msp] DeserializeIdentity -> DEBU 5929 Obtaining identity" +"2019-09-24 00:27:01.782 UTC [gossip.comm] Send -> DEBU 592a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:01.782 UTC [gossip.discovery] sendMemResponse -> DEBU 592b Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020M" signature:"0E\002!\000\333\314\310\027Aj\272\317\372\254\234\026\354UY\246\232\315/\224\004\354J\002Ov\264\340Ex\213$\002 jq44\236\217}\"\337\204?\026\356\3523rd\234\223,\377\300p\n)\255\227\373\204\246 ?" secret_envelope: > alive: " +"2019-09-24 00:27:01.782 UTC [gossip.comm] sendToEndpoint -> DEBU 592c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:01.782 UTC [gossip.comm] sendToEndpoint -> DEBU 592d Exiting" +"2019-09-24 00:27:01.969 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 592e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:01.969 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 592f Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 5930 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 5931 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 5932 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:27:01.969 UTC [cauthdsl] func1 -> DEBU 5933 0xc003ffb280 gate 1569284821969444700 evaluation starts" +"2019-09-24 00:27:01.969 UTC [cauthdsl] func2 -> DEBU 5934 0xc003ffb280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:01.969 UTC [cauthdsl] func2 -> DEBU 5935 0xc003ffb280 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:01.969 UTC [cauthdsl] func2 -> DEBU 5936 0xc003ffb280 principal matched by identity 0" +"2019-09-24 00:27:01.969 UTC [msp.identity] Verify -> DEBU 5937 Verify: digest = 00000000 78 f1 d4 d1 6c 57 c7 cc fa 1a 26 a0 7e 6a 0d 78 |x...lW....&.~j.x| +00000010 a6 61 4a 6c ab d5 46 7c 82 11 65 0f 5f 6c 29 f4 |.aJl..F|..e._l).|" +"2019-09-24 00:27:01.969 UTC [msp.identity] Verify -> DEBU 5938 Verify: sig = 00000000 30 45 02 21 00 e8 ab a5 25 ce 41 b2 3a 59 69 db |0E.!....%.A.:Yi.| +00000010 aa 88 ff 07 29 d5 72 8a b7 2a 3f b6 5c 53 71 78 |....).r..*?.\Sqx| +00000020 8a db ec 5b ed 02 20 3a 27 cc 87 f6 f4 51 d2 9f |...[.. :'....Q..| +00000030 00 fa 8a 4d 74 86 73 78 16 cc 93 e0 57 ed 07 fa |...Mt.sx....W...| +00000040 d3 94 5e 90 41 ac 19 |..^.A..|" +"2019-09-24 00:27:01.969 UTC [cauthdsl] func2 -> DEBU 5939 0xc003ffb280 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:01.969 UTC [cauthdsl] func1 -> DEBU 593a 0xc003ffb280 gate 1569284821969444700 evaluation succeeds" +"2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 593b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 593c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 593d Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:27:01.969 UTC [policies] Evaluate -> DEBU 593e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:27:01.970 UTC [blocksProvider] DeliverBlocks -> DEBU 593f [businesschannel] Adding payload to local buffer, blockNum = [4]" +"2019-09-24 00:27:01.970 UTC [gossip.state] addPayload -> DEBU 5940 [businesschannel] Adding payload to local buffer, blockNum = [4]" +"2019-09-24 00:27:01.970 UTC [gossip.state] addPayload -> DEBU 5941 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 00:27:01.970 UTC [blocksProvider] DeliverBlocks -> DEBU 5942 [businesschannel] Gossiping block [4], peers number [3]" +"2019-09-24 00:27:01.970 UTC [gossip.channel] AddToMsgStore -> DEBU 5943 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 00:27:01.970 UTC [gossip.pull] Add -> DEBU 5944 Added 4, total items: 4" +"2019-09-24 00:27:01.970 UTC [gossip.state] deliverPayloads -> DEBU 5945 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" +"2019-09-24 00:27:01.970 UTC [gossip.state] deliverPayloads -> DEBU 5946 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" +"2019-09-24 00:27:01.970 UTC [gossip.privdata] StoreBlock -> INFO 5947 [businesschannel] Received block [4] from buffer" +"2019-09-24 00:27:01.970 UTC [gossip.privdata] StoreBlock -> DEBU 5948 [businesschannel] Validating block [4]" +"2019-09-24 00:27:01.970 UTC [committer.txvalidator] Validate -> DEBU 5949 [businesschannel] START Block Validation for block [4]" +"2019-09-24 00:27:01.970 UTC [committer.txvalidator] Validate -> DEBU 594a expecting 1 block validation responses" +"2019-09-24 00:27:01.970 UTC [committer.txvalidator] validateTx -> DEBU 594b [businesschannel] validateTx starts for block 0xc0035267c0 env 0xc0032bfcc0 txn 0" +"2019-09-24 00:27:01.970 UTC [protoutils] ValidateTransaction -> DEBU 594c ValidateTransactionEnvelope starts for envelope 0xc0032bfcc0" +"2019-09-24 00:27:01.970 UTC [protoutils] ValidateTransaction -> DEBU 594d Header is channel_header:"\010\003\032\014\010\323\305\245\354\005\020\340\261\206\267\003\"\017businesschannel*@b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030_[\036)h\276\317\357\023\246\301\021r\331\327\234\203V\020-\3440\300\324" " +"2019-09-24 00:27:01.970 UTC [protoutils] validateChannelHeader -> DEBU 594e validateChannelHeader info: header type 3" +"2019-09-24 00:27:01.970 UTC [protoutils] checkSignatureFromCreator -> DEBU 594f begin" +"2019-09-24 00:27:01.970 UTC [msp] GetManagerForChain -> DEBU 5950 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:01.971 UTC [protoutils] checkSignatureFromCreator -> DEBU 5951 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:01.971 UTC [protoutils] checkSignatureFromCreator -> DEBU 5952 creator is valid" +"2019-09-24 00:27:01.971 UTC [msp.identity] Verify -> DEBU 5953 Verify: digest = 00000000 e0 75 77 75 d9 9f 3d 58 7f 7b 89 c8 6c 7c 3d 87 |.uwu..=X.{..l|=.| +00000010 ee 69 47 6d 9c a9 fa 5f bc e7 15 da c1 e9 1a c6 |.iGm..._........|" +"2019-09-24 00:27:01.971 UTC [msp.identity] Verify -> DEBU 5954 Verify: sig = 00000000 30 45 02 21 00 98 10 68 fe 99 12 3f 4d 85 bc f1 |0E.!...h...?M...| +00000010 1b 9f e9 28 a4 4f 34 bb 37 96 5f d9 5a 8f 4e 20 |...(.O4.7._.Z.N | +00000020 22 14 25 a1 e5 02 20 74 c4 77 b3 85 f3 88 2a 22 |".%... t.w....*"| +00000030 5a ce 19 dd a5 f9 ac a0 25 e5 a3 14 ab 4c 22 45 |Z.......%....L"E| +00000040 49 0f e8 05 47 5a 62 |I...GZb|" +"2019-09-24 00:27:01.971 UTC [protoutils] checkSignatureFromCreator -> DEBU 5955 exits successfully" +"2019-09-24 00:27:01.971 UTC [protoutils] validateEndorserTransaction -> DEBU 5956 validateEndorserTransaction starts for data 0xc00395b800, header channel_header:"\010\003\032\014\010\323\305\245\354\005\020\340\261\206\267\003\"\017businesschannel*@b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030_[\036)h\276\317\357\023\246\301\021r\331\327\234\203V\020-\3440\300\324" " +"2019-09-24 00:27:01.971 UTC [protoutils] validateEndorserTransaction -> DEBU 5957 validateEndorserTransaction info: there are 1 actions" +"2019-09-24 00:27:01.971 UTC [protoutils] validateEndorserTransaction -> DEBU 5958 validateEndorserTransaction info: signature header is valid" +"2019-09-24 00:27:01.971 UTC [protoutils] ValidateTransaction -> DEBU 5959 ValidateTransactionEnvelope returns err %!s()" +"2019-09-24 00:27:01.971 UTC [committer.txvalidator] validateTx -> DEBU 595a Transaction is for channel businesschannel" +"2019-09-24 00:27:01.971 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 595b retrieveTransactionByID() - txId = [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38]" +"2019-09-24 00:27:01.971 UTC [committer.txvalidator] validateTx -> DEBU 595c Validating transaction vscc tx validate" +"2019-09-24 00:27:01.971 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 595d [businesschannel] VSCCValidateTx starts for bytes 0xc0001f8800" +"2019-09-24 00:27:01.971 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 595e constructing new query executor txid = [040cd155-c264-497a-881b-7d4d5cc32402]" +"2019-09-24 00:27:01.972 UTC [stateleveldb] GetState -> DEBU 595f GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:01.972 UTC [lockbasedtxmgr] Done -> DEBU 5960 Done with transaction simulation / query execution [040cd155-c264-497a-881b-7d4d5cc32402]" +"2019-09-24 00:27:01.972 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 5961 Validating Tx b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" +"2019-09-24 00:27:01.972 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5962 constructing new query executor txid = [6d7bdd87-9432-47cd-8e77-92973ea35111]" +"2019-09-24 00:27:01.972 UTC [lockbasedtxmgr] Done -> DEBU 5963 Done with transaction simulation / query execution [6d7bdd87-9432-47cd-8e77-92973ea35111]" +"2019-09-24 00:27:01.972 UTC [cauthdsl] func1 -> DEBU 5964 0xc0040e4390 gate 1569284821972339200 evaluation starts" +"2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 5965 0xc0040e4390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 5966 0xc0040e4390 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 5967 0xc0040e4390 principal matched by identity 0" +"2019-09-24 00:27:01.972 UTC [msp.identity] Verify -> DEBU 5968 Verify: digest = 00000000 af 26 f2 e7 2d 96 e2 79 1d d1 1a ad f4 4d 95 52 |.&..-..y.....M.R| +00000010 fb dd 8a f4 46 fa 43 8e 23 78 8e a3 3a 7e 97 7d |....F.C.#x..:~.}|" +"2019-09-24 00:27:01.972 UTC [msp.identity] Verify -> DEBU 5969 Verify: sig = 00000000 30 44 02 20 6d f1 0a c0 f0 c7 82 7a 3e 77 a8 b5 |0D. m......z>w..| +00000010 41 37 10 63 eb 4f 01 d6 52 4c 68 34 3e 50 12 fa |A7.c.O..RLh4>P..| +00000020 86 61 75 51 02 20 53 04 98 cc 6d 30 ac c0 89 bc |.auQ. S...m0....| +00000030 77 62 9e d5 af 55 a9 0b 03 09 b4 db 1b dd 48 f6 |wb...U........H.| +00000040 7f 27 6b 7a c6 2e |.'kz..|" +"2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 596a 0xc0040e4390 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 596b 0xc0040e4390 signed by 1 principal evaluation starts (used [true])" +"2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 596c 0xc0040e4390 skipping identity 0 because it has already been used" +"2019-09-24 00:27:01.972 UTC [cauthdsl] func2 -> DEBU 596d 0xc0040e4390 principal evaluation fails" +"2019-09-24 00:27:01.972 UTC [cauthdsl] func1 -> DEBU 596e 0xc0040e4390 gate 1569284821972339200 evaluation succeeds" +"2019-09-24 00:27:01.972 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 596f constructing new query executor txid = [a7d33318-3cbd-4be8-ab26-c19c40b3707e]" +"2019-09-24 00:27:01.972 UTC [lockbasedtxmgr] Done -> DEBU 5970 Done with transaction simulation / query execution [a7d33318-3cbd-4be8-ab26-c19c40b3707e]" +"2019-09-24 00:27:01.972 UTC [vscc] Validate -> DEBU 5971 block 4, namespace: exp02, tx 0 validation results is: " +"2019-09-24 00:27:01.973 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 5972 Transaction b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38 appears to be valid" +"2019-09-24 00:27:01.973 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 5973 [businesschannel] VSCCValidateTx completes env bytes 0xc0001f8800" +"2019-09-24 00:27:01.973 UTC [committer.txvalidator] validateTx -> DEBU 5974 [businesschannel] validateTx completes for block 0xc0035267c0 env 0xc0032bfcc0 txn 0" +"2019-09-24 00:27:01.973 UTC [committer.txvalidator] Validate -> DEBU 5975 got result for idx 0, code 0" +"2019-09-24 00:27:01.973 UTC [committer.txvalidator] Validate -> INFO 5976 [businesschannel] Validated block [4] in 2ms" +"2019-09-24 00:27:01.973 UTC [gossip.privdata] listMissingPrivateData -> DEBU 5977 Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 00:27:01.973 UTC [gossip.privdata] StoreBlock -> DEBU 5978 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 00:27:01.973 UTC [kvledger] CommitWithPvtData -> DEBU 5979 [businesschannel] Validating state for block [4]" +"2019-09-24 00:27:01.973 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 597a Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 00:27:01.973 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 597b lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 00:27:01.973 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 597c Validating new block with num trans = [1]" +"2019-09-24 00:27:01.973 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 597d ValidateAndPrepareBatch() for block number = [4]" +"2019-09-24 00:27:01.973 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 597e preprocessing ProtoBlock..." +"2019-09-24 00:27:01.973 UTC [valimpl] preprocessProtoBlock -> DEBU 597f txType=ENDORSER_TRANSACTION" +"2019-09-24 00:27:01.973 UTC [stateleveldb] GetState -> DEBU 5980 GetState(). ns=exp02, key=a" +"2019-09-24 00:27:01.973 UTC [statebasedval] validateKVRead -> DEBU 5981 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-09-24 00:27:01.973 UTC [stateleveldb] GetState -> DEBU 5982 GetState(). ns=exp02, key=b" +"2019-09-24 00:27:01.973 UTC [statebasedval] validateKVRead -> DEBU 5983 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-09-24 00:27:01.973 UTC [stateleveldb] GetState -> DEBU 5984 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:01.974 UTC [statebasedval] validateKVRead -> DEBU 5985 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-09-24 00:27:01.974 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 5986 Block [4] Transaction index [0] TxId [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38] marked as valid by state validator" +"2019-09-24 00:27:01.974 UTC [valinternal] ApplyWriteSet -> DEBU 5987 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0035278c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003527900)}" +"2019-09-24 00:27:01.974 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5988 validating rwset..." +"2019-09-24 00:27:01.974 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5989 postprocessing ProtoBlock..." +"2019-09-24 00:27:01.974 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 598a ValidateAndPrepareBatch() complete" +"2019-09-24 00:27:01.974 UTC [kvledger] CommitWithPvtData -> DEBU 598b [businesschannel] Adding CommitHash to the block [4]" +"2019-09-24 00:27:01.974 UTC [kvledger] CommitWithPvtData -> DEBU 598c [businesschannel] Committing block [4] to storage" +"2019-09-24 00:27:01.974 UTC [ledgerstorage] CommitWithPvtData -> DEBU 598d Writing block [4] to pvt block store" +"2019-09-24 00:27:01.980 UTC [msp] DeserializeIdentity -> DEBU 598e Obtaining identity" +"2019-09-24 00:27:01.980 UTC [msp] DeserializeIdentity -> DEBU 598f Obtaining identity" +"2019-09-24 00:27:01.980 UTC [msp] DeserializeIdentity -> DEBU 5990 Obtaining identity" +"2019-09-24 00:27:01.980 UTC [msp] DeserializeIdentity -> DEBU 5991 Obtaining identity" +"2019-09-24 00:27:01.981 UTC [gossip.comm] Send -> DEBU 5992 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:01.981 UTC [msp] DeserializeIdentity -> DEBU 5993 Obtaining identity" +"2019-09-24 00:27:01.982 UTC [msp] DeserializeIdentity -> DEBU 5994 Obtaining identity" +"2019-09-24 00:27:01.987 UTC [gossip.comm] sendToEndpoint -> DEBU 5995 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes" +"2019-09-24 00:27:01.987 UTC [gossip.comm] sendToEndpoint -> DEBU 5996 Exiting" +"2019-09-24 00:27:01.998 UTC [pvtdatastorage] Prepare -> DEBU 5997 Saved 0 private data write sets for block [4]" +"2019-09-24 00:27:02.003 UTC [fsblkstorage] indexBlock -> DEBU 5998 Indexing block [blockNum=4, blockHash=[]byte{0x30, 0xba, 0xc, 0xce, 0x16, 0x44, 0x9b, 0xd3, 0x8e, 0x60, 0x58, 0x49, 0x7d, 0x70, 0x47, 0x86, 0x3f, 0xe5, 0x5c, 0x6c, 0xee, 0xce, 0x96, 0x74, 0xe4, 0x15, 0x6b, 0xdc, 0x92, 0x57, 0x14, 0x77} txOffsets= +txId=b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38 locPointer=offset=70, bytesLength=2985 +]" +"2019-09-24 00:27:02.003 UTC [fsblkstorage] indexBlock -> DEBU 5999 Adding txLoc [fileSuffixNum=0, offset=76099, bytesLength=2985] for tx ID: [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38] to txid-index" +"2019-09-24 00:27:02.003 UTC [fsblkstorage] indexBlock -> DEBU 599a Adding txLoc [fileSuffixNum=0, offset=76099, bytesLength=2985] for tx number:[0] ID: [b4f910bc180969c4993d3a73861d016fefb1f746916a897e9fa844e2f2156d38] to blockNumTranNum index" +"2019-09-24 00:27:02.005 UTC [fsblkstorage] updateCheckpoint -> DEBU 599b Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80057], isChainEmpty=[false], lastBlockNumber=[4]" +"2019-09-24 00:27:02.005 UTC [pvtdatastorage] Commit -> DEBU 599c Committing private data for block [4]" +"2019-09-24 00:27:02.010 UTC [gossip.comm] func1 -> DEBU 599d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:02.010 UTC [gossip.gossip] handleMessage -> DEBU 599e Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:02.010 UTC [msp] DeserializeIdentity -> DEBU 599f Obtaining identity" +"2019-09-24 00:27:02.014 UTC [msp] DeserializeIdentity -> DEBU 59a0 Obtaining identity" +"2019-09-24 00:27:02.014 UTC [msp] DeserializeIdentity -> DEBU 59a1 Obtaining identity" +"2019-09-24 00:27:02.014 UTC [gossip.gossip] handleMessage -> DEBU 59a2 Exiting" +"2019-09-24 00:27:02.015 UTC [gossip.comm] func1 -> DEBU 59a3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.015 UTC [gossip.gossip] handleMessage -> DEBU 59a4 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.016 UTC [msp] DeserializeIdentity -> DEBU 59a5 Obtaining identity" +"2019-09-24 00:27:02.016 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 59a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:02.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 59a7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:02.016 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 59a8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:02.016 UTC [policies] Evaluate -> DEBU 59a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:02.016 UTC [policies] Evaluate -> DEBU 59aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:02.016 UTC [policies] Evaluate -> DEBU 59ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:02.017 UTC [cauthdsl] func1 -> DEBU 59ac 0xc0047623c0 gate 1569284822017006200 evaluation starts" +"2019-09-24 00:27:02.017 UTC [cauthdsl] func2 -> DEBU 59ad 0xc0047623c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:02.017 UTC [cauthdsl] func2 -> DEBU 59ae 0xc0047623c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:02.017 UTC [cauthdsl] func2 -> DEBU 59af 0xc0047623c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:02.017 UTC [cauthdsl] func2 -> DEBU 59b0 0xc0047623c0 principal evaluation fails" +"2019-09-24 00:27:02.017 UTC [cauthdsl] func1 -> DEBU 59b1 0xc0047623c0 gate 1569284822017006200 evaluation fails" +"2019-09-24 00:27:02.017 UTC [policies] Evaluate -> DEBU 59b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:02.018 UTC [policies] Evaluate -> DEBU 59b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:02.018 UTC [policies] Evaluate -> DEBU 59b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:02.018 UTC [cauthdsl] func1 -> DEBU 59b5 0xc004762c10 gate 1569284822018315900 evaluation starts" +"2019-09-24 00:27:02.018 UTC [cauthdsl] func2 -> DEBU 59b6 0xc004762c10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:02.018 UTC [cauthdsl] func2 -> DEBU 59b7 0xc004762c10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:02.018 UTC [cauthdsl] func2 -> DEBU 59b8 0xc004762c10 principal matched by identity 0" +"2019-09-24 00:27:02.019 UTC [msp.identity] Verify -> DEBU 59b9 Verify: digest = 00000000 98 18 01 21 90 b9 27 a0 6e 99 35 bf 62 79 02 ff |...!..'.n.5.by..| +00000010 10 6e c8 51 84 1c ad 30 db 0f ba 96 ce de c4 39 |.n.Q...0.......9|" +"2019-09-24 00:27:02.019 UTC [msp.identity] Verify -> DEBU 59ba Verify: sig = 00000000 30 44 02 20 60 16 7e 53 50 33 ef 00 be 62 71 de |0D. `.~SP3...bq.| +00000010 d8 8d 4b b6 fe 20 fc 62 69 8f b9 25 e5 1a 95 27 |..K.. .bi..%...'| +00000020 b8 88 a5 e2 02 20 30 ab 51 ca 0d 92 81 93 8f 0b |..... 0.Q.......| +00000030 3b 56 ae 2a d8 56 2c 43 44 ed 48 a1 55 81 f9 a2 |;V.*.V,CD.H.U...| +00000040 df 6a 98 44 02 fb |.j.D..|" +"2019-09-24 00:27:02.019 UTC [cauthdsl] func2 -> DEBU 59bb 0xc004762c10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:02.019 UTC [cauthdsl] func1 -> DEBU 59bc 0xc004762c10 gate 1569284822018315900 evaluation succeeds" +"2019-09-24 00:27:02.019 UTC [policies] Evaluate -> DEBU 59bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:02.019 UTC [policies] Evaluate -> DEBU 59be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:02.019 UTC [policies] Evaluate -> DEBU 59bf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:02.020 UTC [policies] Evaluate -> DEBU 59c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:02.020 UTC [msp] DeserializeIdentity -> DEBU 59c1 Obtaining identity" +"2019-09-24 00:27:02.020 UTC [gossip.gossip] handleMessage -> DEBU 59c2 Exiting" +"2019-09-24 00:27:02.020 UTC [pvtdatastorage] Commit -> DEBU 59c3 Committed private data for block [4]" +"2019-09-24 00:27:02.021 UTC [kvledger] CommitWithPvtData -> DEBU 59c4 [businesschannel] Committing block [4] transactions to state database" +"2019-09-24 00:27:02.021 UTC [lockbasedtxmgr] Commit -> DEBU 59c5 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 00:27:02.021 UTC [lockbasedtxmgr] Commit -> DEBU 59c6 Committing updates to state database" +"2019-09-24 00:27:02.022 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 59c7 Building the expiry schedules based on the update batch" +"2019-09-24 00:27:02.022 UTC [lockbasedtxmgr] Commit -> DEBU 59c8 Write lock acquired for committing updates to state database" +"2019-09-24 00:27:02.022 UTC [stateleveldb] ApplyUpdates -> DEBU 59c9 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-09-24 00:27:02.022 UTC [stateleveldb] ApplyUpdates -> DEBU 59ca Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-09-24 00:27:02.024 UTC [lockbasedtxmgr] Commit -> DEBU 59cb Updates committed to state database and the write lock is released" +"2019-09-24 00:27:02.024 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 59cc Preparing potential purge list working-set for expiringAtBlk [5]" +"2019-09-24 00:27:02.025 UTC [lockbasedtxmgr] func1 -> DEBU 59cd launched the background routine for preparing keys to purge with the next block" +"2019-09-24 00:27:02.025 UTC [kvledger] CommitWithPvtData -> DEBU 59ce [businesschannel] Committing block [4] transactions to history database" +"2019-09-24 00:27:02.025 UTC [historyleveldb] Commit -> DEBU 59cf Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" +"2019-09-24 00:27:02.024 UTC [leveldbhelper] GetIterator -> DEBU 59d0 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" +"2019-09-24 00:27:02.026 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 59d1 No expiry entry found for expiringAtBlk [5]" +"2019-09-24 00:27:02.027 UTC [historyleveldb] Commit -> DEBU 59d2 Channel [businesschannel]: Updates committed to history database for blockNo [4]" +"2019-09-24 00:27:02.027 UTC [kvledger] CommitWithPvtData -> INFO 59d3 [businesschannel] Committed block [4] with 1 transaction(s) in 53ms (state_validation=0ms block_and_pvtdata_commit=46ms state_commit=4ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +"2019-09-24 00:27:02.027 UTC [msp] GetDefaultSigningIdentity -> DEBU 59d4 Obtaining default signing identity" +"2019-09-24 00:27:02.027 UTC [msp.identity] Sign -> DEBU 59d5 Sign: plaintext: 18057A6C1214089096D4ACDE83CEE315...08051A0C0A0565787030321203312E30 " +"2019-09-24 00:27:02.027 UTC [msp.identity] Sign -> DEBU 59d6 Sign: digest: 5A486AEAE16973FD556EC74B6B7EF27846448DA7DA23ABC56AE4B2770C18F5CD " +"2019-09-24 00:27:02.028 UTC [gossip.state] commitBlock -> DEBU 59d7 [businesschannel] Committed block [4] with 1 transaction(s)" +"2019-09-24 00:27:02.318 UTC [gossip.election] waitForInterrupt -> DEBU 59d8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:27:02.318 UTC [gossip.election] IsLeader -> DEBU 59d9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:27:02.318 UTC [msp] GetDefaultSigningIdentity -> DEBU 59da Obtaining default signing identity" +"2019-09-24 00:27:02.318 UTC [msp.identity] Sign -> DEBU 59db Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101A1801 " +"2019-09-24 00:27:02.318 UTC [msp.identity] Sign -> DEBU 59dc Sign: digest: 08B0FE26CBD258C6A6DC0E46B7D663E7D463CC6052EFB2B6C68679AB0DFFA2BF " +"2019-09-24 00:27:02.319 UTC [gossip.election] waitForInterrupt -> DEBU 59dd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:27:02.326 UTC [msp] DeserializeIdentity -> DEBU 59de Obtaining identity" +"2019-09-24 00:27:02.326 UTC [msp] DeserializeIdentity -> DEBU 59df Obtaining identity" +"2019-09-24 00:27:02.326 UTC [msp] DeserializeIdentity -> DEBU 59e0 Obtaining identity" +"2019-09-24 00:27:02.327 UTC [msp] DeserializeIdentity -> DEBU 59e1 Obtaining identity" +"2019-09-24 00:27:02.327 UTC [gossip.comm] Send -> DEBU 59e2 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:02.327 UTC [msp] DeserializeIdentity -> DEBU 59e3 Obtaining identity" +"2019-09-24 00:27:02.327 UTC [msp] DeserializeIdentity -> DEBU 59e4 Obtaining identity" +"2019-09-24 00:27:02.328 UTC [gossip.comm] sendToEndpoint -> DEBU 59e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.328 UTC [gossip.comm] sendToEndpoint -> DEBU 59e6 Exiting" +"2019-09-24 00:27:02.331 UTC [endorser] ProcessProposal -> DEBU 59e7 Entering: request from 172.18.0.9:50992" +"2019-09-24 00:27:02.331 UTC [protoutils] ValidateProposalMessage -> DEBU 59e8 ValidateProposalMessage starts for signed proposal 0xc003442190" +"2019-09-24 00:27:02.331 UTC [protoutils] validateChannelHeader -> DEBU 59e9 validateChannelHeader info: header type 3" +"2019-09-24 00:27:02.331 UTC [protoutils] checkSignatureFromCreator -> DEBU 59ea begin" +"2019-09-24 00:27:02.332 UTC [msp] GetManagerForChain -> DEBU 59eb Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:02.332 UTC [protoutils] checkSignatureFromCreator -> DEBU 59ec creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-09-24 00:27:02.332 UTC [protoutils] checkSignatureFromCreator -> DEBU 59ed creator is valid" +"2019-09-24 00:27:02.332 UTC [msp.identity] Verify -> DEBU 59ee Verify: digest = 00000000 80 27 06 dd 6c 4c 5f 9f 30 ae 10 90 75 ee 3c 14 |.'..lL_.0...u.<.| +00000010 47 1a 3b d5 39 e0 cb cd 7a bd 0f 21 9a 2f a2 2b |G.;.9...z..!./.+|" +"2019-09-24 00:27:02.332 UTC [msp.identity] Verify -> DEBU 59ef Verify: sig = 00000000 30 44 02 20 24 bc 62 63 89 6a f2 25 7d 5b 58 05 |0D. $.bc.j.%}[X.| +00000010 0e ba 2d 84 39 91 e3 33 99 e8 00 2e 7b ba 32 5e |..-.9..3....{.2^| +00000020 14 58 56 e4 02 20 37 29 c9 1b 87 17 02 6e ad 8e |.XV.. 7).....n..| +00000030 99 12 03 d2 39 c2 5e 01 5f ef 14 eb 99 65 88 99 |....9.^._....e..| +00000040 d7 3a 8b 5e 2c a6 |.:.^,.|" +"2019-09-24 00:27:02.333 UTC [protoutils] checkSignatureFromCreator -> DEBU 59f0 exits successfully" +"2019-09-24 00:27:02.333 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 59f1 validateChaincodeProposalMessage starts for proposal 0xc002ad73b0, header 0xc0034425a0" +"2019-09-24 00:27:02.333 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 59f2 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 00:27:02.333 UTC [endorser] preProcess -> DEBU 59f3 [businesschannel][ce74632e] processing txid: ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898" +"2019-09-24 00:27:02.333 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 59f4 retrieveTransactionByID() - txId = [ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898]" +"2019-09-24 00:27:02.333 UTC [aclmgmt] CheckACL -> DEBU 59f5 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 00:27:02.333 UTC [aclmgmt] CheckACL -> DEBU 59f6 acl check(/Channel/Application/Writers)" +"2019-09-24 00:27:02.334 UTC [policies] Evaluate -> DEBU 59f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:27:02.334 UTC [policies] Evaluate -> DEBU 59f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:02.334 UTC [policies] Evaluate -> DEBU 59f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:27:02.334 UTC [cauthdsl] func1 -> DEBU 59fa 0xc0047b58f0 gate 1569284822334334500 evaluation starts" +"2019-09-24 00:27:02.334 UTC [cauthdsl] func2 -> DEBU 59fb 0xc0047b58f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:02.334 UTC [cauthdsl] func2 -> DEBU 59fc 0xc0047b58f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:02.334 UTC [cauthdsl] func2 -> DEBU 59fd 0xc0047b58f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:02.334 UTC [cauthdsl] func2 -> DEBU 59fe 0xc0047b58f0 principal evaluation fails" +"2019-09-24 00:27:02.334 UTC [cauthdsl] func1 -> DEBU 59ff 0xc0047b58f0 gate 1569284822334334500 evaluation fails" +"2019-09-24 00:27:02.334 UTC [policies] Evaluate -> DEBU 5a00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:02.335 UTC [policies] Evaluate -> DEBU 5a01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:02.335 UTC [policies] Evaluate -> DEBU 5a02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 00:27:02.335 UTC [cauthdsl] func1 -> DEBU 5a03 0xc004776130 gate 1569284822335797300 evaluation starts" +"2019-09-24 00:27:02.335 UTC [cauthdsl] func2 -> DEBU 5a04 0xc004776130 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:02.335 UTC [cauthdsl] func2 -> DEBU 5a05 0xc004776130 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:02.335 UTC [cauthdsl] func2 -> DEBU 5a06 0xc004776130 principal matched by identity 0" +"2019-09-24 00:27:02.336 UTC [msp.identity] Verify -> DEBU 5a07 Verify: digest = 00000000 80 27 06 dd 6c 4c 5f 9f 30 ae 10 90 75 ee 3c 14 |.'..lL_.0...u.<.| +00000010 47 1a 3b d5 39 e0 cb cd 7a bd 0f 21 9a 2f a2 2b |G.;.9...z..!./.+|" +"2019-09-24 00:27:02.336 UTC [msp.identity] Verify -> DEBU 5a08 Verify: sig = 00000000 30 44 02 20 24 bc 62 63 89 6a f2 25 7d 5b 58 05 |0D. $.bc.j.%}[X.| +00000010 0e ba 2d 84 39 91 e3 33 99 e8 00 2e 7b ba 32 5e |..-.9..3....{.2^| +00000020 14 58 56 e4 02 20 37 29 c9 1b 87 17 02 6e ad 8e |.XV.. 7).....n..| +00000030 99 12 03 d2 39 c2 5e 01 5f ef 14 eb 99 65 88 99 |....9.^._....e..| +00000040 d7 3a 8b 5e 2c a6 |.:.^,.|" +"2019-09-24 00:27:02.336 UTC [cauthdsl] func2 -> DEBU 5a09 0xc004776130 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:02.336 UTC [cauthdsl] func1 -> DEBU 5a0a 0xc004776130 gate 1569284822335797300 evaluation succeeds" +"2019-09-24 00:27:02.336 UTC [policies] Evaluate -> DEBU 5a0b Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:02.336 UTC [policies] Evaluate -> DEBU 5a0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:02.336 UTC [policies] Evaluate -> DEBU 5a0d Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:27:02.336 UTC [policies] Evaluate -> DEBU 5a0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:27:02.336 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5a0f constructing new tx simulator" +"2019-09-24 00:27:02.337 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5a10 constructing new tx simulator txid = [ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898]" +"2019-09-24 00:27:02.337 UTC [endorser] SimulateProposal -> DEBU 5a11 [businesschannel][ce74632e] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:02.337 UTC [stateleveldb] GetState -> DEBU 5a12 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:02.337 UTC [ccprovider] GetChaincodeData -> DEBU 5a13 Getting chaincode data for from cache" +"2019-09-24 00:27:02.337 UTC [endorser] callChaincode -> INFO 5a14 [businesschannel][ce74632e] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:02.338 UTC [chaincode] Execute -> DEBU 5a15 Entry" +"2019-09-24 00:27:02.339 UTC [chaincode] handleMessage -> DEBU 5a16 [ce74632e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:27:02.339 UTC [chaincode] HandleTransaction -> DEBU 5a17 [ce74632e] handling GET_STATE from chaincode" +"2019-09-24 00:27:02.339 UTC [chaincode] HandleGetState -> DEBU 5a18 [ce74632e] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 00:27:02.339 UTC [stateleveldb] GetState -> DEBU 5a19 GetState(). ns=exp02, key=a" +"2019-09-24 00:27:02.340 UTC [chaincode] HandleTransaction -> DEBU 5a1a [ce74632e] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:27:02.340 UTC [chaincode] handleMessage -> DEBU 5a1b [ce74632e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:02.340 UTC [chaincode] Notify -> DEBU 5a1c [ce74632e] notifying Txid:ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898, channelID:businesschannel" +"2019-09-24 00:27:02.340 UTC [chaincode] Execute -> DEBU 5a1d Exit" +"2019-09-24 00:27:02.341 UTC [endorser] callChaincode -> INFO 5a1e [businesschannel][ce74632e] Exit chaincode: name:"exp02" (3ms)" +"2019-09-24 00:27:02.341 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5a1f Simulation completed, getting simulation results" +"2019-09-24 00:27:02.341 UTC [lockbasedtxmgr] Done -> DEBU 5a20 Done with transaction simulation / query execution [ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898]" +"2019-09-24 00:27:02.341 UTC [endorser] SimulateProposal -> DEBU 5a21 [businesschannel][ce74632e] Exit" +"2019-09-24 00:27:02.341 UTC [endorser] endorseProposal -> DEBU 5a22 [businesschannel][ce74632e] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:02.341 UTC [endorser] endorseProposal -> DEBU 5a23 [businesschannel][ce74632e] escc for chaincode name:"exp02" is escc" +"2019-09-24 00:27:02.342 UTC [endorser] EndorseWithPlugin -> DEBU 5a24 Entering endorsement for {plugin: escc, channel: businesschannel, tx: ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898, chaincode: exp02}" +"2019-09-24 00:27:02.342 UTC [msp.identity] Sign -> DEBU 5a25 Sign: plaintext: 0A20175B4258AE4F4B1C20FFA9CCDA5A...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:02.342 UTC [msp.identity] Sign -> DEBU 5a26 Sign: digest: E93FC150D0B986399A4DBD1B1E5F4A5861FF33D31270A6BA961973224B60282C " +"2019-09-24 00:27:02.342 UTC [endorser] EndorseWithPlugin -> DEBU 5a27 Exiting {plugin: escc, channel: businesschannel, tx: ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898, chaincode: exp02}" +"2019-09-24 00:27:02.342 UTC [endorser] endorseProposal -> DEBU 5a28 [businesschannel][ce74632e] Exit" +"2019-09-24 00:27:02.342 UTC [lockbasedtxmgr] Done -> DEBU 5a29 Done with transaction simulation / query execution [ce74632e4b56041b48418a32911ee0fcab54dfdfe3e0244fe48e7097ccaa4898]" +"2019-09-24 00:27:02.343 UTC [endorser] func1 -> DEBU 5a2a Exit: request from 172.18.0.9:50992" +"2019-09-24 00:27:02.343 UTC [comm.grpc.server] 1 -> INFO 5a2b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50992 grpc.code=OK grpc.call_duration=11.6953ms +"2019-09-24 00:27:02.346 UTC [grpc] infof -> DEBU 5a2c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:02.346 UTC [grpc] infof -> DEBU 5a2d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:02.492 UTC [endorser] ProcessProposal -> DEBU 5a2e Entering: request from 172.18.0.9:50996" +"2019-09-24 00:27:02.492 UTC [protoutils] ValidateProposalMessage -> DEBU 5a2f ValidateProposalMessage starts for signed proposal 0xc003373310" +"2019-09-24 00:27:02.492 UTC [protoutils] validateChannelHeader -> DEBU 5a30 validateChannelHeader info: header type 3" +"2019-09-24 00:27:02.492 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a31 begin" +"2019-09-24 00:27:02.492 UTC [msp] GetManagerForChain -> DEBU 5a32 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:02.492 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a33 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-09-24 00:27:02.492 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a34 creator is valid" +"2019-09-24 00:27:02.492 UTC [msp.identity] Verify -> DEBU 5a35 Verify: digest = 00000000 0e 44 be b9 be 21 1c 19 e8 51 40 ec 00 0f 8c 5d |.D...!...Q@....]| +00000010 48 15 d0 99 dd 04 15 26 51 5c ba 05 69 09 d9 de |H......&Q\..i...|" +"2019-09-24 00:27:02.493 UTC [msp.identity] Verify -> DEBU 5a36 Verify: sig = 00000000 30 44 02 20 5b 0f 66 e8 2e e8 41 17 69 bc 19 f6 |0D. [.f...A.i...| +00000010 14 43 a5 18 9c 20 4f a2 70 1e f2 25 24 71 4b ac |.C... O.p..%$qK.| +00000020 92 de 40 3f 02 20 4a fa 5c 36 ad df 7f 99 5e c1 |..@?. J.\6....^.| +00000030 9a 7d a4 8d e2 09 29 ec 4a bd 55 8f 7a 1b 2b e8 |.}....).J.U.z.+.| +00000040 7a 57 19 b1 0f eb |zW....|" +"2019-09-24 00:27:02.493 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a37 exits successfully" +"2019-09-24 00:27:02.493 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5a38 validateChaincodeProposalMessage starts for proposal 0xc002a61500, header 0xc003373720" +"2019-09-24 00:27:02.493 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5a39 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 00:27:02.494 UTC [endorser] preProcess -> DEBU 5a3a [businesschannel][315f3dfc] processing txid: 315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0" +"2019-09-24 00:27:02.494 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5a3b retrieveTransactionByID() - txId = [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0]" +"2019-09-24 00:27:02.494 UTC [aclmgmt] CheckACL -> DEBU 5a3c acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 00:27:02.494 UTC [aclmgmt] CheckACL -> DEBU 5a3d acl check(/Channel/Application/Writers)" +"2019-09-24 00:27:02.494 UTC [policies] Evaluate -> DEBU 5a3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:27:02.494 UTC [policies] Evaluate -> DEBU 5a3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:02.494 UTC [policies] Evaluate -> DEBU 5a40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:27:02.494 UTC [cauthdsl] func1 -> DEBU 5a41 0xc0047c9f10 gate 1569284822494655000 evaluation starts" +"2019-09-24 00:27:02.494 UTC [cauthdsl] func2 -> DEBU 5a42 0xc0047c9f10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:02.494 UTC [cauthdsl] func2 -> DEBU 5a43 0xc0047c9f10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:02.495 UTC [cauthdsl] func2 -> DEBU 5a44 0xc0047c9f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:02.495 UTC [cauthdsl] func2 -> DEBU 5a45 0xc0047c9f10 principal evaluation fails" +"2019-09-24 00:27:02.495 UTC [cauthdsl] func1 -> DEBU 5a46 0xc0047c9f10 gate 1569284822494655000 evaluation fails" +"2019-09-24 00:27:02.495 UTC [policies] Evaluate -> DEBU 5a47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:02.495 UTC [policies] Evaluate -> DEBU 5a48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:02.495 UTC [policies] Evaluate -> DEBU 5a49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 00:27:02.496 UTC [cauthdsl] func1 -> DEBU 5a4a 0xc0046f6750 gate 1569284822496012400 evaluation starts" +"2019-09-24 00:27:02.496 UTC [cauthdsl] func2 -> DEBU 5a4b 0xc0046f6750 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:02.496 UTC [cauthdsl] func2 -> DEBU 5a4c 0xc0046f6750 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:02.496 UTC [cauthdsl] func2 -> DEBU 5a4d 0xc0046f6750 principal matched by identity 0" +"2019-09-24 00:27:02.496 UTC [msp.identity] Verify -> DEBU 5a4e Verify: digest = 00000000 0e 44 be b9 be 21 1c 19 e8 51 40 ec 00 0f 8c 5d |.D...!...Q@....]| +00000010 48 15 d0 99 dd 04 15 26 51 5c ba 05 69 09 d9 de |H......&Q\..i...|" +"2019-09-24 00:27:02.496 UTC [msp.identity] Verify -> DEBU 5a4f Verify: sig = 00000000 30 44 02 20 5b 0f 66 e8 2e e8 41 17 69 bc 19 f6 |0D. [.f...A.i...| +00000010 14 43 a5 18 9c 20 4f a2 70 1e f2 25 24 71 4b ac |.C... O.p..%$qK.| +00000020 92 de 40 3f 02 20 4a fa 5c 36 ad df 7f 99 5e c1 |..@?. J.\6....^.| +00000030 9a 7d a4 8d e2 09 29 ec 4a bd 55 8f 7a 1b 2b e8 |.}....).J.U.z.+.| +00000040 7a 57 19 b1 0f eb |zW....|" +"2019-09-24 00:27:02.497 UTC [cauthdsl] func2 -> DEBU 5a50 0xc0046f6750 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:02.497 UTC [cauthdsl] func1 -> DEBU 5a51 0xc0046f6750 gate 1569284822496012400 evaluation succeeds" +"2019-09-24 00:27:02.497 UTC [policies] Evaluate -> DEBU 5a52 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:02.497 UTC [policies] Evaluate -> DEBU 5a53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:02.497 UTC [policies] Evaluate -> DEBU 5a54 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:27:02.497 UTC [policies] Evaluate -> DEBU 5a55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:27:02.498 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5a56 constructing new tx simulator" +"2019-09-24 00:27:02.498 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5a57 constructing new tx simulator txid = [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0]" +"2019-09-24 00:27:02.498 UTC [endorser] SimulateProposal -> DEBU 5a58 [businesschannel][315f3dfc] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:02.498 UTC [stateleveldb] GetState -> DEBU 5a59 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:02.499 UTC [ccprovider] GetChaincodeData -> DEBU 5a5a Getting chaincode data for from cache" +"2019-09-24 00:27:02.499 UTC [endorser] callChaincode -> INFO 5a5b [businesschannel][315f3dfc] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:02.499 UTC [chaincode] Execute -> DEBU 5a5c Entry" +"2019-09-24 00:27:02.501 UTC [chaincode] handleMessage -> DEBU 5a5d [315f3dfc] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:27:02.501 UTC [chaincode] HandleTransaction -> DEBU 5a5e [315f3dfc] handling GET_STATE from chaincode" +"2019-09-24 00:27:02.501 UTC [chaincode] HandleGetState -> DEBU 5a5f [315f3dfc] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 00:27:02.501 UTC [stateleveldb] GetState -> DEBU 5a60 GetState(). ns=exp02, key=a" +"2019-09-24 00:27:02.502 UTC [chaincode] HandleTransaction -> DEBU 5a61 [315f3dfc] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:27:02.502 UTC [chaincode] handleMessage -> DEBU 5a62 [315f3dfc] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:27:02.502 UTC [chaincode] HandleTransaction -> DEBU 5a63 [315f3dfc] handling GET_STATE from chaincode" +"2019-09-24 00:27:02.502 UTC [chaincode] HandleGetState -> DEBU 5a64 [315f3dfc] getting state for chaincode exp02, key b, channel businesschannel" +"2019-09-24 00:27:02.502 UTC [stateleveldb] GetState -> DEBU 5a65 GetState(). ns=exp02, key=b" +"2019-09-24 00:27:02.503 UTC [chaincode] HandleTransaction -> DEBU 5a66 [315f3dfc] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:27:02.504 UTC [chaincode] handleMessage -> DEBU 5a67 [315f3dfc] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 00:27:02.504 UTC [chaincode] HandleTransaction -> DEBU 5a68 [315f3dfc] handling PUT_STATE from chaincode" +"2019-09-24 00:27:02.504 UTC [chaincode] HandleTransaction -> DEBU 5a69 [315f3dfc] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 00:27:02.505 UTC [chaincode] handleMessage -> DEBU 5a6a [315f3dfc] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 00:27:02.506 UTC [chaincode] HandleTransaction -> DEBU 5a6b [315f3dfc] handling PUT_STATE from chaincode" +"2019-09-24 00:27:02.506 UTC [chaincode] HandleTransaction -> DEBU 5a6c [315f3dfc] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 00:27:02.506 UTC [chaincode] handleMessage -> DEBU 5a6d [315f3dfc] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:02.507 UTC [chaincode] Notify -> DEBU 5a6e [315f3dfc] notifying Txid:315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0, channelID:businesschannel" +"2019-09-24 00:27:02.507 UTC [chaincode] Execute -> DEBU 5a6f Exit" +"2019-09-24 00:27:02.507 UTC [endorser] callChaincode -> INFO 5a70 [businesschannel][315f3dfc] Exit chaincode: name:"exp02" (8ms)" +"2019-09-24 00:27:02.507 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5a71 Simulation completed, getting simulation results" +"2019-09-24 00:27:02.507 UTC [lockbasedtxmgr] Done -> DEBU 5a72 Done with transaction simulation / query execution [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0]" +"2019-09-24 00:27:02.507 UTC [endorser] SimulateProposal -> DEBU 5a73 [businesschannel][315f3dfc] Exit" +"2019-09-24 00:27:02.507 UTC [endorser] endorseProposal -> DEBU 5a74 [businesschannel][315f3dfc] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:02.508 UTC [endorser] endorseProposal -> DEBU 5a75 [businesschannel][315f3dfc] escc for chaincode name:"exp02" is escc" +"2019-09-24 00:27:02.508 UTC [endorser] EndorseWithPlugin -> DEBU 5a76 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0, chaincode: exp02}" +"2019-09-24 00:27:02.508 UTC [msp.identity] Sign -> DEBU 5a77 Sign: plaintext: 0A203EDB6AA316A1F56D10A12B8A8439...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:02.508 UTC [msp.identity] Sign -> DEBU 5a78 Sign: digest: EDCE66C59D539583155CF8D944F25BCE04B7C3DB70A9B18A713FD37B845E7981 " +"2019-09-24 00:27:02.508 UTC [endorser] EndorseWithPlugin -> DEBU 5a79 Exiting {plugin: escc, channel: businesschannel, tx: 315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0, chaincode: exp02}" +"2019-09-24 00:27:02.508 UTC [endorser] endorseProposal -> DEBU 5a7a [businesschannel][315f3dfc] Exit" +"2019-09-24 00:27:02.509 UTC [lockbasedtxmgr] Done -> DEBU 5a7b Done with transaction simulation / query execution [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0]" +"2019-09-24 00:27:02.509 UTC [endorser] func1 -> DEBU 5a7c Exit: request from 172.18.0.9:50996" +"2019-09-24 00:27:02.509 UTC [comm.grpc.server] 1 -> INFO 5a7d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50996 grpc.code=OK grpc.call_duration=17.9591ms +"2019-09-24 00:27:02.529 UTC [grpc] warningf -> DEBU 5a7e transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:50996: read: connection reset by peer" +"2019-09-24 00:27:02.531 UTC [grpc] infof -> DEBU 5a7f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:02.533 UTC [grpc] infof -> DEBU 5a80 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:02.687 UTC [endorser] ProcessProposal -> DEBU 5a81 Entering: request from 172.18.0.9:51002" +"2019-09-24 00:27:02.687 UTC [protoutils] ValidateProposalMessage -> DEBU 5a82 ValidateProposalMessage starts for signed proposal 0xc0034e0be0" +"2019-09-24 00:27:02.687 UTC [protoutils] validateChannelHeader -> DEBU 5a83 validateChannelHeader info: header type 3" +"2019-09-24 00:27:02.687 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a84 begin" +"2019-09-24 00:27:02.687 UTC [msp] GetManagerForChain -> DEBU 5a85 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:02.687 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a86 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:02.687 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a87 creator is valid" +"2019-09-24 00:27:02.688 UTC [msp.identity] Verify -> DEBU 5a88 Verify: digest = 00000000 2b 07 54 4f e3 a9 ec 1b ee 63 4a 65 87 17 81 86 |+.TO.....cJe....| +00000010 dd 5e 16 6e da ba 46 3a f2 79 09 7f e8 e6 3f 88 |.^.n..F:.y....?.|" +"2019-09-24 00:27:02.688 UTC [msp.identity] Verify -> DEBU 5a89 Verify: sig = 00000000 30 45 02 21 00 a2 57 d9 3c a8 66 b1 2b fa 0a 4d |0E.!..W.<.f.+..M| +00000010 46 c3 6f c9 5d 01 6d 4f e8 90 52 6f 25 1a f1 ef |F.o.].mO..Ro%...| +00000020 ab 47 0f 64 cc 02 20 36 98 78 81 da 03 9b 95 c0 |.G.d.. 6.x......| +00000030 5d 78 c5 e3 2a f0 6e f3 6a d7 ae 5f f1 fd 7f a3 |]x..*.n.j.._....| +00000040 e4 b3 83 c6 79 11 41 |....y.A|" +"2019-09-24 00:27:02.688 UTC [protoutils] checkSignatureFromCreator -> DEBU 5a8a exits successfully" +"2019-09-24 00:27:02.688 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5a8b validateChaincodeProposalMessage starts for proposal 0xc002a61960, header 0xc0034e1040" +"2019-09-24 00:27:02.688 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5a8c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 00:27:02.688 UTC [endorser] preProcess -> DEBU 5a8d [businesschannel][86d08c77] processing txid: 86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d" +"2019-09-24 00:27:02.688 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5a8e retrieveTransactionByID() - txId = [86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d]" +"2019-09-24 00:27:02.688 UTC [aclmgmt] CheckACL -> DEBU 5a8f acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 00:27:02.688 UTC [aclmgmt] CheckACL -> DEBU 5a90 acl check(/Channel/Application/Writers)" +"2019-09-24 00:27:02.689 UTC [policies] Evaluate -> DEBU 5a91 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:27:02.689 UTC [policies] Evaluate -> DEBU 5a92 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:02.689 UTC [policies] Evaluate -> DEBU 5a93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:27:02.689 UTC [cauthdsl] func1 -> DEBU 5a94 0xc004bc3160 gate 1569284822689505900 evaluation starts" +"2019-09-24 00:27:02.689 UTC [cauthdsl] func2 -> DEBU 5a95 0xc004bc3160 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:02.689 UTC [cauthdsl] func2 -> DEBU 5a96 0xc004bc3160 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:02.690 UTC [cauthdsl] func2 -> DEBU 5a97 0xc004bc3160 principal matched by identity 0" +"2019-09-24 00:27:02.690 UTC [msp.identity] Verify -> DEBU 5a98 Verify: digest = 00000000 2b 07 54 4f e3 a9 ec 1b ee 63 4a 65 87 17 81 86 |+.TO.....cJe....| +00000010 dd 5e 16 6e da ba 46 3a f2 79 09 7f e8 e6 3f 88 |.^.n..F:.y....?.|" +"2019-09-24 00:27:02.690 UTC [msp.identity] Verify -> DEBU 5a99 Verify: sig = 00000000 30 45 02 21 00 a2 57 d9 3c a8 66 b1 2b fa 0a 4d |0E.!..W.<.f.+..M| +00000010 46 c3 6f c9 5d 01 6d 4f e8 90 52 6f 25 1a f1 ef |F.o.].mO..Ro%...| +00000020 ab 47 0f 64 cc 02 20 36 98 78 81 da 03 9b 95 c0 |.G.d.. 6.x......| +00000030 5d 78 c5 e3 2a f0 6e f3 6a d7 ae 5f f1 fd 7f a3 |]x..*.n.j.._....| +00000040 e4 b3 83 c6 79 11 41 |....y.A|" +"2019-09-24 00:27:02.692 UTC [cauthdsl] func2 -> DEBU 5a9a 0xc004bc3160 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:02.692 UTC [cauthdsl] func1 -> DEBU 5a9b 0xc004bc3160 gate 1569284822689505900 evaluation succeeds" +"2019-09-24 00:27:02.692 UTC [policies] Evaluate -> DEBU 5a9c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:02.692 UTC [policies] Evaluate -> DEBU 5a9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:02.692 UTC [policies] Evaluate -> DEBU 5a9e Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:27:02.692 UTC [policies] Evaluate -> DEBU 5a9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:27:02.693 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5aa0 constructing new tx simulator" +"2019-09-24 00:27:02.693 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5aa1 constructing new tx simulator txid = [86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d]" +"2019-09-24 00:27:02.693 UTC [endorser] SimulateProposal -> DEBU 5aa2 [businesschannel][86d08c77] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:02.693 UTC [stateleveldb] GetState -> DEBU 5aa3 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:02.693 UTC [ccprovider] GetChaincodeData -> DEBU 5aa4 Getting chaincode data for from cache" +"2019-09-24 00:27:02.693 UTC [endorser] callChaincode -> INFO 5aa5 [businesschannel][86d08c77] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:02.693 UTC [chaincode] Execute -> DEBU 5aa6 Entry" +"2019-09-24 00:27:02.697 UTC [chaincode] handleMessage -> DEBU 5aa7 [86d08c77] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:27:02.697 UTC [gossip.comm] func1 -> DEBU 5aa8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.698 UTC [gossip.gossip] handleMessage -> DEBU 5aa9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.698 UTC [gossip.gossip] handleMessage -> DEBU 5aaa Exiting" +"2019-09-24 00:27:02.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5aab Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.699 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5aac Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:02.699 UTC [msp.identity] Verify -> DEBU 5aad Verify: digest = 00000000 f6 74 bd 69 dc 62 2a 2e 2a 52 bc de e8 50 41 ca |.t.i.b*.*R...PA.| +00000010 bf 7e 06 cc 7a 56 af 4a fb 57 5f 25 c4 16 0a b9 |.~..zV.J.W_%....|" +"2019-09-24 00:27:02.699 UTC [msp.identity] Verify -> DEBU 5aae Verify: sig = 00000000 30 44 02 20 78 d8 01 84 1d 1f 06 6a 15 97 b4 96 |0D. x......j....| +00000010 54 49 90 1a 3d c7 67 3e 8c 35 07 97 f5 e0 6a 2f |TI..=.g>.5....j/| +00000020 ca 41 c7 b4 02 20 6d cb 39 55 6f 9b a6 5a 76 be |.A... m.9Uo..Zv.| +00000030 dc a2 5a 1b d0 55 a9 63 5a 96 4b 4b b4 8c 85 37 |..Z..U.cZ.KK...7| +00000040 7a 7d f3 89 80 33 |z}...3|" +"2019-09-24 00:27:02.700 UTC [gossip.discovery] handleAliveMessage -> DEBU 5aaf Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ab0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:02.700 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ab1 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:02.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ab2 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:02.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ab3 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:02.701 UTC [gossip.discovery] learnExistingMembers -> DEBU 5ab4 Exiting" +"2019-09-24 00:27:02.701 UTC [gossip.discovery] handleAliveMessage -> DEBU 5ab5 Exiting" +"2019-09-24 00:27:02.702 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5ab6 Exiting" +"2019-09-24 00:27:02.702 UTC [chaincode] HandleTransaction -> DEBU 5ab7 [86d08c77] handling GET_STATE from chaincode" +"2019-09-24 00:27:02.703 UTC [gossip.gossip] handleMessage -> DEBU 5ab8 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.703 UTC [gossip.gossip] handleMessage -> DEBU 5aba Exiting" +"2019-09-24 00:27:02.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5abb Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5abc Exiting" +"2019-09-24 00:27:02.703 UTC [chaincode] HandleGetState -> DEBU 5ab9 [86d08c77] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 00:27:02.703 UTC [stateleveldb] GetState -> DEBU 5abd GetState(). ns=exp02, key=a" +"2019-09-24 00:27:02.703 UTC [chaincode] HandleTransaction -> DEBU 5abe [86d08c77] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:27:02.704 UTC [msp] DeserializeIdentity -> DEBU 5abf Obtaining identity" +"2019-09-24 00:27:02.704 UTC [msp] DeserializeIdentity -> DEBU 5ac0 Obtaining identity" +"2019-09-24 00:27:02.704 UTC [msp] DeserializeIdentity -> DEBU 5ac1 Obtaining identity" +"2019-09-24 00:27:02.705 UTC [gossip.comm] Send -> DEBU 5ac2 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:02.705 UTC [msp] DeserializeIdentity -> DEBU 5ac3 Obtaining identity" +"2019-09-24 00:27:02.705 UTC [gossip.comm] Send -> DEBU 5ac4 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:02.706 UTC [chaincode] handleMessage -> DEBU 5ac5 [86d08c77] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:02.706 UTC [chaincode] Notify -> DEBU 5ac6 [86d08c77] notifying Txid:86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d, channelID:businesschannel" +"2019-09-24 00:27:02.706 UTC [chaincode] Execute -> DEBU 5ac7 Exit" +"2019-09-24 00:27:02.706 UTC [endorser] callChaincode -> INFO 5ac8 [businesschannel][86d08c77] Exit chaincode: name:"exp02" (13ms)" +"2019-09-24 00:27:02.707 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5ac9 Simulation completed, getting simulation results" +"2019-09-24 00:27:02.707 UTC [lockbasedtxmgr] Done -> DEBU 5aca Done with transaction simulation / query execution [86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d]" +"2019-09-24 00:27:02.707 UTC [endorser] SimulateProposal -> DEBU 5acb [businesschannel][86d08c77] Exit" +"2019-09-24 00:27:02.708 UTC [endorser] endorseProposal -> DEBU 5acc [businesschannel][86d08c77] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:02.708 UTC [endorser] endorseProposal -> DEBU 5acd [businesschannel][86d08c77] escc for chaincode name:"exp02" is escc" +"2019-09-24 00:27:02.708 UTC [endorser] EndorseWithPlugin -> DEBU 5acf Entering endorsement for {plugin: escc, channel: businesschannel, tx: 86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d, chaincode: exp02}" +"2019-09-24 00:27:02.708 UTC [gossip.comm] sendToEndpoint -> DEBU 5ad0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.709 UTC [gossip.comm] sendToEndpoint -> DEBU 5ad1 Exiting" +"2019-09-24 00:27:02.708 UTC [msp.identity] Sign -> DEBU 5ad2 Sign: plaintext: 0A20A9AB3C0B5F4D70DC7F511B39B76A...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:02.709 UTC [msp.identity] Sign -> DEBU 5ad3 Sign: digest: EF27CDA1E108F10C17E4E0399F54D90936678447F330EE3D4EC9D4F23B416FBF " +"2019-09-24 00:27:02.709 UTC [endorser] EndorseWithPlugin -> DEBU 5ad4 Exiting {plugin: escc, channel: businesschannel, tx: 86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d, chaincode: exp02}" +"2019-09-24 00:27:02.710 UTC [endorser] endorseProposal -> DEBU 5ad5 [businesschannel][86d08c77] Exit" +"2019-09-24 00:27:02.710 UTC [lockbasedtxmgr] Done -> DEBU 5ad6 Done with transaction simulation / query execution [86d08c774fdff81a92280ba13724f57c66a6a2ee8177900d861a6b3700261f9d]" +"2019-09-24 00:27:02.710 UTC [endorser] func1 -> DEBU 5ad8 Exit: request from 172.18.0.9:51002" +"2019-09-24 00:27:02.710 UTC [gossip.comm] func1 -> DEBU 5ad7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.710 UTC [gossip.gossip] handleMessage -> DEBU 5ada Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.711 UTC [gossip.gossip] handleMessage -> DEBU 5adb Exiting" +"2019-09-24 00:27:02.706 UTC [gossip.comm] sendToEndpoint -> DEBU 5ace Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5adc Exiting" +"2019-09-24 00:27:02.710 UTC [comm.grpc.server] 1 -> INFO 5ad9 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51002 grpc.code=OK grpc.call_duration=23.7212ms +"2019-09-24 00:27:02.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5add Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:02.711 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5ade Exiting" +"2019-09-24 00:27:02.715 UTC [grpc] infof -> DEBU 5ae0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:02.715 UTC [grpc] infof -> DEBU 5adf transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:03.710 UTC [gossip.pull] Hello -> DEBU 5ae1 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:03.710 UTC [gossip.comm] Send -> DEBU 5ae2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:03.710 UTC [gossip.pull] Hello -> DEBU 5ae3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:27:03.711 UTC [gossip.comm] Send -> DEBU 5ae4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:03.711 UTC [gossip.pull] Hello -> DEBU 5ae5 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:27:03.711 UTC [gossip.comm] Send -> DEBU 5ae6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5ae7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5ae8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5ae9 Exiting" +"2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5aea Exiting" +"2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5aeb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.711 UTC [gossip.comm] sendToEndpoint -> DEBU 5aec Exiting" +"2019-09-24 00:27:03.713 UTC [gossip.comm] func1 -> DEBU 5aed Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.713 UTC [gossip.gossip] handleMessage -> DEBU 5aee Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.714 UTC [gossip.pull] HandleMessage -> DEBU 5aef GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.714 UTC [gossip.gossip] handleMessage -> DEBU 5af0 Exiting" +"2019-09-24 00:27:03.714 UTC [gossip.comm] func1 -> DEBU 5af1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.714 UTC [gossip.gossip] handleMessage -> DEBU 5af2 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.714 UTC [gossip.pull] HandleMessage -> DEBU 5af3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.714 UTC [gossip.gossip] handleMessage -> DEBU 5af4 Exiting" +"2019-09-24 00:27:03.714 UTC [gossip.gossip] handleMessage -> DEBU 5af5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.714 UTC [gossip.pull] HandleMessage -> DEBU 5af6 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.714 UTC [gossip.gossip] handleMessage -> DEBU 5af7 Exiting" +"2019-09-24 00:27:03.849 UTC [msp] GetDefaultSigningIdentity -> DEBU 5af8 Obtaining default signing identity" +"2019-09-24 00:27:03.850 UTC [msp.identity] Sign -> DEBU 5af9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104A " +"2019-09-24 00:27:03.850 UTC [msp.identity] Sign -> DEBU 5afa Sign: digest: 414DC89A2CEF25A4CA4B27D68FB13397CBBC979020616A10AAB80990C04B7A15 " +"2019-09-24 00:27:03.851 UTC [msp] GetDefaultSigningIdentity -> DEBU 5afb Obtaining default signing identity" +"2019-09-24 00:27:03.851 UTC [msp.identity] Sign -> DEBU 5afc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:03.852 UTC [msp.identity] Sign -> DEBU 5afd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:03.852 UTC [msp] DeserializeIdentity -> DEBU 5afe Obtaining identity" +"2019-09-24 00:27:03.853 UTC [gossip.comm] Send -> DEBU 5aff Entering, sending GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:03.853 UTC [msp] DeserializeIdentity -> DEBU 5b00 Obtaining identity" +"2019-09-24 00:27:03.854 UTC [gossip.comm] Send -> DEBU 5b01 Entering, sending GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:03.854 UTC [gossip.comm] sendToEndpoint -> DEBU 5b02 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.855 UTC [gossip.comm] sendToEndpoint -> DEBU 5b04 Exiting" +"2019-09-24 00:27:03.855 UTC [gossip.comm] sendToEndpoint -> DEBU 5b05 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.855 UTC [gossip.comm] sendToEndpoint -> DEBU 5b06 Exiting" +"2019-09-24 00:27:03.854 UTC [gossip.comm] Send -> DEBU 5b03 Entering, sending GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:03.857 UTC [gossip.gossip] handleMessage -> DEBU 5b07 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.858 UTC [gossip.gossip] handleMessage -> DEBU 5b08 Exiting" +"2019-09-24 00:27:03.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b09 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.858 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b0a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:03.859 UTC [msp] DeserializeIdentity -> DEBU 5b0b Obtaining identity" +"2019-09-24 00:27:03.859 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5b0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:03.860 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b0d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:03.860 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b0e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:03.860 UTC [policies] Evaluate -> DEBU 5b0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:03.861 UTC [policies] Evaluate -> DEBU 5b10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:03.861 UTC [policies] Evaluate -> DEBU 5b11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:03.861 UTC [cauthdsl] func1 -> DEBU 5b12 0xc003dc5fe0 gate 1569284823861967500 evaluation starts" +"2019-09-24 00:27:03.862 UTC [cauthdsl] func2 -> DEBU 5b13 0xc003dc5fe0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:03.862 UTC [cauthdsl] func2 -> DEBU 5b14 0xc003dc5fe0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:03.862 UTC [cauthdsl] func2 -> DEBU 5b15 0xc003dc5fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:03.863 UTC [cauthdsl] func2 -> DEBU 5b16 0xc003dc5fe0 principal evaluation fails" +"2019-09-24 00:27:03.863 UTC [cauthdsl] func1 -> DEBU 5b17 0xc003dc5fe0 gate 1569284823861967500 evaluation fails" +"2019-09-24 00:27:03.863 UTC [policies] Evaluate -> DEBU 5b18 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:03.863 UTC [policies] Evaluate -> DEBU 5b19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:03.864 UTC [policies] Evaluate -> DEBU 5b1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:03.863 UTC [gossip.comm] sendToEndpoint -> DEBU 5b1b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\326\353\240\263\234[\014j\371\244[\260hX\004\247b\340cL\002 m\026\315i\010\312=\326V0[\354\332+\302\261\261\332\325\004\277\202\375?'G\\\033\225\013\364\035" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.864 UTC [gossip.comm] sendToEndpoint -> DEBU 5b1e Exiting" +"2019-09-24 00:27:03.864 UTC [cauthdsl] func1 -> DEBU 5b1c 0xc003fdc820 gate 1569284823864176800 evaluation starts" +"2019-09-24 00:27:03.864 UTC [gossip.comm] func1 -> DEBU 5b1d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.866 UTC [gossip.gossip] handleMessage -> DEBU 5b1f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.867 UTC [gossip.comm] func1 -> DEBU 5b20 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.866 UTC [cauthdsl] func2 -> DEBU 5b21 0xc003fdc820 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:03.868 UTC [cauthdsl] func2 -> DEBU 5b22 0xc003fdc820 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:03.868 UTC [cauthdsl] func2 -> DEBU 5b23 0xc003fdc820 principal matched by identity 0" +"2019-09-24 00:27:03.868 UTC [msp.identity] Verify -> DEBU 5b24 Verify: digest = 00000000 60 85 20 4c ad 4c d5 cc c4 1d b2 1a aa 3b 37 90 |`. L.L.......;7.| +00000010 56 9c 46 fd e3 99 f3 9c d4 a2 02 8e 1b ef 41 c3 |V.F...........A.|" +"2019-09-24 00:27:03.868 UTC [msp.identity] Verify -> DEBU 5b25 Verify: sig = 00000000 30 45 02 21 00 df e6 30 ae e4 87 a0 60 98 b5 0c |0E.!...0....`...| +00000010 dc e3 89 bc 6b b5 1e 0c b6 e2 3b 33 c2 5a 80 ce |....k.....;3.Z..| +00000020 ce 26 66 75 39 02 20 4f e6 c9 16 d5 d4 e4 ba 1a |.&fu9. O........| +00000030 f5 5c cc 91 74 90 5e 46 6b 3c e5 60 09 0e 53 51 |.\..t.^Fk<.`..SQ| +00000040 95 aa ea 16 61 99 b4 |....a..|" +"2019-09-24 00:27:03.869 UTC [cauthdsl] func2 -> DEBU 5b26 0xc003fdc820 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:03.869 UTC [cauthdsl] func1 -> DEBU 5b27 0xc003fdc820 gate 1569284823864176800 evaluation succeeds" +"2019-09-24 00:27:03.869 UTC [policies] Evaluate -> DEBU 5b28 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:03.869 UTC [policies] Evaluate -> DEBU 5b29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:03.869 UTC [policies] Evaluate -> DEBU 5b2a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:03.869 UTC [policies] Evaluate -> DEBU 5b2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:03.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b2c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:03.869 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b2d Exiting" +"2019-09-24 00:27:03.870 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b2e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:03.870 UTC [msp.identity] Verify -> DEBU 5b2f Verify: digest = 00000000 41 4d c8 9a 2c ef 25 a4 ca 4b 27 d6 8f b1 33 97 |AM..,.%..K'...3.| +00000010 cb bc 97 90 20 61 6a 10 aa b8 09 90 c0 4b 7a 15 |.... aj......Kz.|" +"2019-09-24 00:27:03.870 UTC [msp.identity] Verify -> DEBU 5b30 Verify: sig = 00000000 30 45 02 21 00 81 42 6e 98 b1 59 27 cf 36 f1 f4 |0E.!..Bn..Y'.6..| +00000010 3e d6 eb a0 b3 9c 5b 0c 6a f9 a4 5b b0 68 58 04 |>.....[.j..[.hX.| +00000020 a7 62 e0 63 4c 02 20 6d 16 cd 69 08 ca 3d d6 56 |.b.cL. m..i..=.V| +00000030 30 5b ec da 2b c2 b1 b1 da d5 04 bf 82 fd 3f 27 |0[..+.........?'| +00000040 47 5c 1b 95 0b f4 1d |G\.....|" +"2019-09-24 00:27:03.871 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b31 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:03.871 UTC [gossip.discovery] isSentByMe -> DEBU 5b32 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:03.871 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b33 Exiting" +"2019-09-24 00:27:03.872 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b34 Exiting" +"2019-09-24 00:27:03.872 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b35 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.872 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b36 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:03.872 UTC [gossip.gossip] handleMessage -> DEBU 5b37 Exiting" +"2019-09-24 00:27:03.872 UTC [gossip.gossip] handleMessage -> DEBU 5b38 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.872 UTC [msp.identity] Verify -> DEBU 5b39 Verify: digest = 00000000 41 4d c8 9a 2c ef 25 a4 ca 4b 27 d6 8f b1 33 97 |AM..,.%..K'...3.| +00000010 cb bc 97 90 20 61 6a 10 aa b8 09 90 c0 4b 7a 15 |.... aj......Kz.|" +"2019-09-24 00:27:03.873 UTC [msp.identity] Verify -> DEBU 5b3a Verify: sig = 00000000 30 45 02 21 00 81 42 6e 98 b1 59 27 cf 36 f1 f4 |0E.!..Bn..Y'.6..| +00000010 3e d6 eb a0 b3 9c 5b 0c 6a f9 a4 5b b0 68 58 04 |>.....[.j..[.hX.| +00000020 a7 62 e0 63 4c 02 20 6d 16 cd 69 08 ca 3d d6 56 |.b.cL. m..i..=.V| +00000030 30 5b ec da 2b c2 b1 b1 da d5 04 bf 82 fd 3f 27 |0[..+.........?'| +00000040 47 5c 1b 95 0b f4 1d |G\.....|" +"2019-09-24 00:27:03.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b3b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:03.873 UTC [gossip.discovery] isSentByMe -> DEBU 5b3c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:03.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b3d Exiting" +"2019-09-24 00:27:03.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b3e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:03.874 UTC [msp] DeserializeIdentity -> DEBU 5b3f Obtaining identity" +"2019-09-24 00:27:03.874 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5b40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:03.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b41 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:03.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b42 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:03.875 UTC [policies] Evaluate -> DEBU 5b43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:03.875 UTC [policies] Evaluate -> DEBU 5b44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:03.875 UTC [policies] Evaluate -> DEBU 5b45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:03.875 UTC [cauthdsl] func1 -> DEBU 5b46 0xc0027f9410 gate 1569284823875643200 evaluation starts" +"2019-09-24 00:27:03.875 UTC [cauthdsl] func2 -> DEBU 5b47 0xc0027f9410 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:03.875 UTC [cauthdsl] func2 -> DEBU 5b48 0xc0027f9410 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:03.876 UTC [cauthdsl] func2 -> DEBU 5b49 0xc0027f9410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:03.876 UTC [cauthdsl] func2 -> DEBU 5b4a 0xc0027f9410 principal evaluation fails" +"2019-09-24 00:27:03.876 UTC [cauthdsl] func1 -> DEBU 5b4b 0xc0027f9410 gate 1569284823875643200 evaluation fails" +"2019-09-24 00:27:03.876 UTC [policies] Evaluate -> DEBU 5b4c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:03.876 UTC [policies] Evaluate -> DEBU 5b4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:03.876 UTC [policies] Evaluate -> DEBU 5b4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:03.877 UTC [cauthdsl] func1 -> DEBU 5b4f 0xc0027f9c50 gate 1569284823877133400 evaluation starts" +"2019-09-24 00:27:03.877 UTC [cauthdsl] func2 -> DEBU 5b50 0xc0027f9c50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:03.877 UTC [cauthdsl] func2 -> DEBU 5b51 0xc0027f9c50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:03.877 UTC [cauthdsl] func2 -> DEBU 5b52 0xc0027f9c50 principal matched by identity 0" +"2019-09-24 00:27:03.878 UTC [msp.identity] Verify -> DEBU 5b53 Verify: digest = 00000000 4b ac 2c fe c6 af c3 f1 2c 25 65 11 6a cb 80 34 |K.,.....,%e.j..4| +00000010 d0 17 b0 49 0a 9d 01 58 c3 eb fd 45 c3 f3 66 f0 |...I...X...E..f.|" +"2019-09-24 00:27:03.878 UTC [msp.identity] Verify -> DEBU 5b54 Verify: sig = 00000000 30 44 02 20 7d 21 7c e8 e8 7f 5e 2f db c9 7a 04 |0D. }!|...^/..z.| +00000010 b1 01 6e 4d 17 af cb fe d0 a0 fb 02 4e a2 03 f6 |..nM........N...| +00000020 29 a1 12 ea 02 20 3c 8b 0e f6 4e e9 03 b0 8a e7 |).... <...N.....| +00000030 84 a9 87 f8 59 79 17 b0 63 23 3a 30 5d 66 e3 47 |....Yy..c#:0]f.G| +00000040 1e 2b 6f 20 d5 a9 |.+o ..|" +"2019-09-24 00:27:03.878 UTC [cauthdsl] func2 -> DEBU 5b55 0xc0027f9c50 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:03.878 UTC [cauthdsl] func1 -> DEBU 5b56 0xc0027f9c50 gate 1569284823877133400 evaluation succeeds" +"2019-09-24 00:27:03.879 UTC [policies] Evaluate -> DEBU 5b57 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:03.879 UTC [policies] Evaluate -> DEBU 5b58 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:03.879 UTC [policies] Evaluate -> DEBU 5b59 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:03.879 UTC [policies] Evaluate -> DEBU 5b5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:03.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b5b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:03.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b5c Exiting" +"2019-09-24 00:27:03.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b5d Exiting" +"2019-09-24 00:27:03.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b5e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.880 UTC [gossip.gossip] handleMessage -> DEBU 5b5f Exiting" +"2019-09-24 00:27:03.880 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b60 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:03.881 UTC [msp.identity] Verify -> DEBU 5b61 Verify: digest = 00000000 41 4d c8 9a 2c ef 25 a4 ca 4b 27 d6 8f b1 33 97 |AM..,.%..K'...3.| +00000010 cb bc 97 90 20 61 6a 10 aa b8 09 90 c0 4b 7a 15 |.... aj......Kz.|" +"2019-09-24 00:27:03.881 UTC [msp.identity] Verify -> DEBU 5b62 Verify: sig = 00000000 30 45 02 21 00 81 42 6e 98 b1 59 27 cf 36 f1 f4 |0E.!..Bn..Y'.6..| +00000010 3e d6 eb a0 b3 9c 5b 0c 6a f9 a4 5b b0 68 58 04 |>.....[.j..[.hX.| +00000020 a7 62 e0 63 4c 02 20 6d 16 cd 69 08 ca 3d d6 56 |.b.cL. m..i..=.V| +00000030 30 5b ec da 2b c2 b1 b1 da d5 04 bf 82 fd 3f 27 |0[..+.........?'| +00000040 47 5c 1b 95 0b f4 1d |G\.....|" +"2019-09-24 00:27:03.881 UTC [msp.identity] Verify -> DEBU 5b63 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:27:03.881 UTC [msp.identity] Verify -> DEBU 5b64 Verify: sig = 00000000 30 44 02 20 4d 33 f1 58 fe 10 2f ef a7 b4 70 d6 |0D. M3.X../...p.| +00000010 9f 1f 82 8e 6f 6b 08 a1 7e 74 c5 c4 69 b6 83 87 |....ok..~t..i...| +00000020 a2 4b 94 e6 02 20 42 b4 28 11 82 17 e3 81 1d 6b |.K... B.(......k| +00000030 25 da fe 18 75 09 6b bb fd 9b 66 fe 11 f1 9a b4 |%...u.k...f.....| +00000040 b9 c0 8a d5 a7 64 |.....d|" +"2019-09-24 00:27:03.882 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b65 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:03.882 UTC [gossip.discovery] isSentByMe -> DEBU 5b66 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:03.883 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b67 Exiting" +"2019-09-24 00:27:03.883 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b68 Exiting" +"2019-09-24 00:27:03.912 UTC [gossip.gossip] handleMessage -> DEBU 5b69 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.912 UTC [gossip.pull] HandleMessage -> DEBU 5b6a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:03.912 UTC [msp] DeserializeIdentity -> DEBU 5b6b Obtaining identity" +"2019-09-24 00:27:03.912 UTC [msp] DeserializeIdentity -> DEBU 5b6c Obtaining identity" +"2019-09-24 00:27:03.913 UTC [msp] DeserializeIdentity -> DEBU 5b6d Obtaining identity" +"2019-09-24 00:27:03.914 UTC [msp] DeserializeIdentity -> DEBU 5b6e Obtaining identity" +"2019-09-24 00:27:03.914 UTC [msp] DeserializeIdentity -> DEBU 5b6f Obtaining identity" +"2019-09-24 00:27:03.915 UTC [msp] DeserializeIdentity -> DEBU 5b70 Obtaining identity" +"2019-09-24 00:27:03.915 UTC [gossip.pull] SendDigest -> DEBU 5b71 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:27:03.915 UTC [gossip.gossip] handleMessage -> DEBU 5b72 Exiting" +"2019-09-24 00:27:04.020 UTC [gossip.gossip] handleMessage -> DEBU 5b73 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.021 UTC [gossip.gossip] handleMessage -> DEBU 5b74 Exiting" +"2019-09-24 00:27:04.021 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b75 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.021 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5b76 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:04.022 UTC [msp] DeserializeIdentity -> DEBU 5b77 Obtaining identity" +"2019-09-24 00:27:04.022 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5b78 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:04.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b79 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5b7a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.023 UTC [policies] Evaluate -> DEBU 5b7b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.023 UTC [policies] Evaluate -> DEBU 5b7c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.024 UTC [policies] Evaluate -> DEBU 5b7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.024 UTC [cauthdsl] func1 -> DEBU 5b7e 0xc003357850 gate 1569284824024691700 evaluation starts" +"2019-09-24 00:27:04.025 UTC [cauthdsl] func2 -> DEBU 5b7f 0xc003357850 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.025 UTC [cauthdsl] func2 -> DEBU 5b80 0xc003357850 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.025 UTC [cauthdsl] func2 -> DEBU 5b81 0xc003357850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:04.025 UTC [cauthdsl] func2 -> DEBU 5b82 0xc003357850 principal evaluation fails" +"2019-09-24 00:27:04.026 UTC [cauthdsl] func1 -> DEBU 5b83 0xc003357850 gate 1569284824024691700 evaluation fails" +"2019-09-24 00:27:04.028 UTC [policies] Evaluate -> DEBU 5b84 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.028 UTC [policies] Evaluate -> DEBU 5b85 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.028 UTC [policies] Evaluate -> DEBU 5b86 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:04.029 UTC [cauthdsl] func1 -> DEBU 5b87 0xc00337a090 gate 1569284824029092700 evaluation starts" +"2019-09-24 00:27:04.029 UTC [cauthdsl] func2 -> DEBU 5b88 0xc00337a090 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.029 UTC [cauthdsl] func2 -> DEBU 5b89 0xc00337a090 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.029 UTC [cauthdsl] func2 -> DEBU 5b8a 0xc00337a090 principal matched by identity 0" +"2019-09-24 00:27:04.030 UTC [msp.identity] Verify -> DEBU 5b8b Verify: digest = 00000000 8f 9a ec a2 f4 2f 49 57 4c 28 4a 94 b1 08 f0 0f |...../IWL(J.....| +00000010 93 45 61 e4 56 17 ad a8 e0 3f 20 7d 8a 15 f1 53 |.Ea.V....? }...S|" +"2019-09-24 00:27:04.030 UTC [msp.identity] Verify -> DEBU 5b8c Verify: sig = 00000000 30 44 02 20 72 db 57 3d 3a 26 10 9c 72 43 10 97 |0D. r.W=:&..rC..| +00000010 04 6f 96 26 9b de b7 26 03 64 0f 51 97 e3 38 ff |.o.&...&.d.Q..8.| +00000020 21 a4 2d 9d 02 20 6b 16 bc bc 7e fd ef 6e e8 4f |!.-.. k...~..n.O| +00000030 70 9d 94 9a 90 e7 cb 9c 35 d2 f9 9d ba 13 39 af |p.......5.....9.| +00000040 6f 69 71 f2 19 8f |oiq...|" +"2019-09-24 00:27:04.030 UTC [cauthdsl] func2 -> DEBU 5b8d 0xc00337a090 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.031 UTC [cauthdsl] func1 -> DEBU 5b8e 0xc00337a090 gate 1569284824029092700 evaluation succeeds" +"2019-09-24 00:27:04.031 UTC [policies] Evaluate -> DEBU 5b8f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.031 UTC [policies] Evaluate -> DEBU 5b90 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.031 UTC [policies] Evaluate -> DEBU 5b91 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.032 UTC [policies] Evaluate -> DEBU 5b92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.032 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b93 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:04.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 5b94 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:04.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 5b95 updating membership: timestamp: " +"2019-09-24 00:27:04.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 5b96 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:04.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 5b97 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:04.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 5b98 Exiting" +"2019-09-24 00:27:04.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 5b99 Exiting" +"2019-09-24 00:27:04.036 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5b9a Exiting" +"2019-09-24 00:27:04.037 UTC [gossip.discovery] sendMemResponse -> DEBU 5b9b Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:27:04.037 UTC [msp] DeserializeIdentity -> DEBU 5b9c Obtaining identity" +"2019-09-24 00:27:04.037 UTC [msp] DeserializeIdentity -> DEBU 5b9d Obtaining identity" +"2019-09-24 00:27:04.037 UTC [msp] DeserializeIdentity -> DEBU 5b9e Obtaining identity" +"2019-09-24 00:27:04.037 UTC [gossip.comm] Send -> DEBU 5b9f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:04.037 UTC [gossip.discovery] sendMemResponse -> DEBU 5ba0 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020N" signature:"0D\002 x\330\001\204\035\037\006j\025\227\264\226TI\220\032=\307g>\2145\007\227\365\340j/\312A\307\264\002 m\3139Uo\233\246Zv\276\334\242Z\033\320U\251cZ\226KK\264\214\2057z}\363\211\2003" > alive: alive: alive: " +"2019-09-24 00:27:04.038 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.038 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba2 Exiting" +"2019-09-24 00:27:04.082 UTC [msp] DeserializeIdentity -> DEBU 5ba3 Obtaining identity" +"2019-09-24 00:27:04.083 UTC [msp] DeserializeIdentity -> DEBU 5ba4 Obtaining identity" +"2019-09-24 00:27:04.083 UTC [gossip.comm] Send -> DEBU 5ba5 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:27:04.084 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.084 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba7 Exiting" +"2019-09-24 00:27:04.086 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.086 UTC [gossip.comm] sendToEndpoint -> DEBU 5ba9 Exiting" +"2019-09-24 00:27:04.087 UTC [gossip.comm] sendToEndpoint -> DEBU 5baa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.087 UTC [gossip.comm] sendToEndpoint -> DEBU 5bac Exiting" +"2019-09-24 00:27:04.087 UTC [gossip.gossip] handleMessage -> DEBU 5bab Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.089 UTC [msp] DeserializeIdentity -> DEBU 5bb0 Obtaining identity" +"2019-09-24 00:27:04.088 UTC [gossip.comm] func1 -> DEBU 5bad Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.089 UTC [gossip.comm] func1 -> DEBU 5bae Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.089 UTC [msp] DeserializeIdentity -> DEBU 5baf Obtaining identity" +"2019-09-24 00:27:04.090 UTC [msp] DeserializeIdentity -> DEBU 5bb1 Obtaining identity" +"2019-09-24 00:27:04.090 UTC [gossip.comm] Send -> DEBU 5bb2 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +"2019-09-24 00:27:04.090 UTC [msp] DeserializeIdentity -> DEBU 5bb3 Obtaining identity" +"2019-09-24 00:27:04.090 UTC [msp] DeserializeIdentity -> DEBU 5bb4 Obtaining identity" +"2019-09-24 00:27:04.090 UTC [gossip.comm] sendToEndpoint -> DEBU 5bb5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.090 UTC [gossip.comm] sendToEndpoint -> DEBU 5bb6 Exiting" +"2019-09-24 00:27:04.091 UTC [gossip.comm] sendToEndpoint -> DEBU 5bb7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.091 UTC [gossip.comm] sendToEndpoint -> DEBU 5bb8 Exiting" +"2019-09-24 00:27:04.091 UTC [gossip.comm] sendToEndpoint -> DEBU 5bb9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.091 UTC [gossip.comm] sendToEndpoint -> DEBU 5bba Exiting" +"2019-09-24 00:27:04.091 UTC [msp.identity] Verify -> DEBU 5bbb Verify: digest = 00000000 f2 c6 d9 c5 a2 53 7e 43 60 84 4b cd 73 db dd bc |.....S~C`.K.s...| +00000010 b5 fd b0 85 49 3d 4e 00 5a ed fc c6 dc 58 c2 d1 |....I=N.Z....X..|" +"2019-09-24 00:27:04.092 UTC [msp.identity] Verify -> DEBU 5bbc Verify: sig = 00000000 30 45 02 21 00 92 04 7e be d9 04 92 ea e3 c3 83 |0E.!...~........| +00000010 9c a2 31 99 77 85 d5 10 bf 2b db 57 3d 5f 14 6c |..1.w....+.W=_.l| +00000020 ed 19 f6 70 94 02 20 36 a4 48 62 4a 86 71 d5 2e |...p.. 6.HbJ.q..| +00000030 d4 7f bb be 8c c1 bf fd 4c 2b 42 95 f6 51 83 17 |........L+B..Q..| +00000040 54 92 ca e1 7b 70 35 |T...{p5|" +"2019-09-24 00:27:04.093 UTC [msp.identity] Verify -> DEBU 5bbd Verify: digest = 00000000 27 36 61 3d 09 03 97 9c ba 30 92 a7 3c 84 01 5c |'6a=.....0..<..\| +00000010 1f 78 5b 6f 1e a7 91 6c 83 c8 dc f0 b5 29 75 14 |.x[o...l.....)u.|" +"2019-09-24 00:27:04.093 UTC [msp.identity] Verify -> DEBU 5bbe Verify: sig = 00000000 30 44 02 20 7b f8 bf 24 8e c0 4f c9 d8 13 a6 83 |0D. {..$..O.....| +00000010 ff a8 1a c9 2b bc 97 af f5 3b 7c 3b 40 63 50 7a |....+....;|;@cPz| +00000020 ad 7c 26 07 02 20 03 46 a2 67 88 4d f6 4a ae 28 |.|&.. .F.g.M.J.(| +00000030 ca 20 8c 1d 8c 50 2f b5 51 9c 0e be 76 53 b2 42 |. ...P/.Q...vS.B| +00000040 48 4c 21 8e e5 c8 |HL!...|" +"2019-09-24 00:27:04.094 UTC [msp] DeserializeIdentity -> DEBU 5bbf Obtaining identity" +"2019-09-24 00:27:04.094 UTC [msp] DeserializeIdentity -> DEBU 5bc0 Obtaining identity" +"2019-09-24 00:27:04.095 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5bc1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:04.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5bc2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.096 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5bc3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.096 UTC [policies] Evaluate -> DEBU 5bc4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.096 UTC [policies] Evaluate -> DEBU 5bc5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.097 UTC [policies] Evaluate -> DEBU 5bc6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.097 UTC [cauthdsl] func1 -> DEBU 5bc7 0xc003c4e2b0 gate 1569284824097934100 evaluation starts" +"2019-09-24 00:27:04.098 UTC [cauthdsl] func2 -> DEBU 5bc8 0xc003c4e2b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.099 UTC [cauthdsl] func2 -> DEBU 5bc9 0xc003c4e2b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.099 UTC [cauthdsl] func2 -> DEBU 5bca 0xc003c4e2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:04.099 UTC [cauthdsl] func2 -> DEBU 5bcb 0xc003c4e2b0 principal evaluation fails" +"2019-09-24 00:27:04.100 UTC [cauthdsl] func1 -> DEBU 5bcc 0xc003c4e2b0 gate 1569284824097934100 evaluation fails" +"2019-09-24 00:27:04.100 UTC [policies] Evaluate -> DEBU 5bcd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.100 UTC [policies] Evaluate -> DEBU 5bce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.100 UTC [policies] Evaluate -> DEBU 5bcf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:04.101 UTC [cauthdsl] func1 -> DEBU 5bd0 0xc003c4eaf0 gate 1569284824101135500 evaluation starts" +"2019-09-24 00:27:04.101 UTC [cauthdsl] func2 -> DEBU 5bd1 0xc003c4eaf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.101 UTC [cauthdsl] func2 -> DEBU 5bd2 0xc003c4eaf0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.102 UTC [cauthdsl] func2 -> DEBU 5bd3 0xc003c4eaf0 principal matched by identity 0" +"2019-09-24 00:27:04.102 UTC [msp.identity] Verify -> DEBU 5bd4 Verify: digest = 00000000 98 18 01 21 90 b9 27 a0 6e 99 35 bf 62 79 02 ff |...!..'.n.5.by..| +00000010 10 6e c8 51 84 1c ad 30 db 0f ba 96 ce de c4 39 |.n.Q...0.......9|" +"2019-09-24 00:27:04.102 UTC [msp.identity] Verify -> DEBU 5bd5 Verify: sig = 00000000 30 44 02 20 60 16 7e 53 50 33 ef 00 be 62 71 de |0D. `.~SP3...bq.| +00000010 d8 8d 4b b6 fe 20 fc 62 69 8f b9 25 e5 1a 95 27 |..K.. .bi..%...'| +00000020 b8 88 a5 e2 02 20 30 ab 51 ca 0d 92 81 93 8f 0b |..... 0.Q.......| +00000030 3b 56 ae 2a d8 56 2c 43 44 ed 48 a1 55 81 f9 a2 |;V.*.V,CD.H.U...| +00000040 df 6a 98 44 02 fb |.j.D..|" +"2019-09-24 00:27:04.102 UTC [cauthdsl] func2 -> DEBU 5bd6 0xc003c4eaf0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.103 UTC [cauthdsl] func1 -> DEBU 5bd7 0xc003c4eaf0 gate 1569284824101135500 evaluation succeeds" +"2019-09-24 00:27:04.103 UTC [policies] Evaluate -> DEBU 5bd8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.103 UTC [policies] Evaluate -> DEBU 5bd9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.104 UTC [policies] Evaluate -> DEBU 5bda Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.104 UTC [policies] Evaluate -> DEBU 5bdb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.105 UTC [msp] DeserializeIdentity -> DEBU 5bdc Obtaining identity" +"2019-09-24 00:27:04.105 UTC [msp] DeserializeIdentity -> DEBU 5bdd Obtaining identity" +"2019-09-24 00:27:04.106 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5bde Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:04.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5bdf Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5be0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.106 UTC [policies] Evaluate -> DEBU 5be1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.107 UTC [policies] Evaluate -> DEBU 5be2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.107 UTC [policies] Evaluate -> DEBU 5be3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.107 UTC [cauthdsl] func1 -> DEBU 5be4 0xc003dea2c0 gate 1569284824107585800 evaluation starts" +"2019-09-24 00:27:04.107 UTC [cauthdsl] func2 -> DEBU 5be5 0xc003dea2c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.108 UTC [cauthdsl] func2 -> DEBU 5be6 0xc003dea2c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.108 UTC [cauthdsl] func2 -> DEBU 5be7 0xc003dea2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:04.108 UTC [cauthdsl] func2 -> DEBU 5be8 0xc003dea2c0 principal evaluation fails" +"2019-09-24 00:27:04.108 UTC [cauthdsl] func1 -> DEBU 5be9 0xc003dea2c0 gate 1569284824107585800 evaluation fails" +"2019-09-24 00:27:04.108 UTC [policies] Evaluate -> DEBU 5bea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.109 UTC [policies] Evaluate -> DEBU 5beb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.109 UTC [policies] Evaluate -> DEBU 5bec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:04.109 UTC [cauthdsl] func1 -> DEBU 5bed 0xc003deab00 gate 1569284824109566500 evaluation starts" +"2019-09-24 00:27:04.109 UTC [cauthdsl] func2 -> DEBU 5bee 0xc003deab00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.109 UTC [cauthdsl] func2 -> DEBU 5bef 0xc003deab00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.110 UTC [cauthdsl] func2 -> DEBU 5bf0 0xc003deab00 principal matched by identity 0" +"2019-09-24 00:27:04.110 UTC [msp.identity] Verify -> DEBU 5bf1 Verify: digest = 00000000 b7 0d 4a 43 01 b1 24 4e 5f f6 31 6c 75 2e 04 da |..JC..$N_.1lu...| +00000010 be 2f 20 25 e3 19 5f 7c c0 92 13 ea 49 b5 b0 ec |./ %.._|....I...|" +"2019-09-24 00:27:04.110 UTC [msp.identity] Verify -> DEBU 5bf2 Verify: sig = 00000000 30 44 02 20 1d 6d 60 4c 50 0d 21 47 e4 37 6e 23 |0D. .m`LP.!G.7n#| +00000010 f5 01 7c 06 de 61 d2 f9 8d eb 76 a1 56 86 05 18 |..|..a....v.V...| +00000020 5b da 55 47 02 20 10 a8 07 81 b6 df a4 7a 5f ba |[.UG. .......z_.| +00000030 7d a8 33 01 a7 71 1a 8d 4a ac 7b 70 73 ba 8c aa |}.3..q..J.{ps...| +00000040 a6 22 89 49 78 19 |.".Ix.|" +"2019-09-24 00:27:04.111 UTC [cauthdsl] func2 -> DEBU 5bf3 0xc003deab00 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.111 UTC [cauthdsl] func1 -> DEBU 5bf4 0xc003deab00 gate 1569284824109566500 evaluation succeeds" +"2019-09-24 00:27:04.111 UTC [policies] Evaluate -> DEBU 5bf5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.111 UTC [policies] Evaluate -> DEBU 5bf6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.111 UTC [policies] Evaluate -> DEBU 5bf7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.112 UTC [policies] Evaluate -> DEBU 5bf8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.112 UTC [msp] DeserializeIdentity -> DEBU 5bf9 Obtaining identity" +"2019-09-24 00:27:04.112 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5bfa Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.112 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5bfb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.113 UTC [policies] Evaluate -> DEBU 5bfc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.113 UTC [policies] Evaluate -> DEBU 5bfd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.113 UTC [policies] Evaluate -> DEBU 5bfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.113 UTC [cauthdsl] func1 -> DEBU 5bff 0xc003debbe0 gate 1569284824113605800 evaluation starts" +"2019-09-24 00:27:04.113 UTC [cauthdsl] func2 -> DEBU 5c00 0xc003debbe0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.113 UTC [cauthdsl] func2 -> DEBU 5c01 0xc003debbe0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.114 UTC [cauthdsl] func2 -> DEBU 5c02 0xc003debbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:04.114 UTC [cauthdsl] func2 -> DEBU 5c03 0xc003debbe0 principal evaluation fails" +"2019-09-24 00:27:04.115 UTC [cauthdsl] func1 -> DEBU 5c04 0xc003debbe0 gate 1569284824113605800 evaluation fails" +"2019-09-24 00:27:04.115 UTC [policies] Evaluate -> DEBU 5c05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.115 UTC [policies] Evaluate -> DEBU 5c06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.116 UTC [policies] Evaluate -> DEBU 5c07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:04.116 UTC [cauthdsl] func1 -> DEBU 5c08 0xc003fae420 gate 1569284824116296200 evaluation starts" +"2019-09-24 00:27:04.116 UTC [cauthdsl] func2 -> DEBU 5c09 0xc003fae420 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.116 UTC [cauthdsl] func2 -> DEBU 5c0a 0xc003fae420 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.117 UTC [cauthdsl] func2 -> DEBU 5c0b 0xc003fae420 principal matched by identity 0" +"2019-09-24 00:27:04.117 UTC [msp.identity] Verify -> DEBU 5c0c Verify: digest = 00000000 b7 0d 4a 43 01 b1 24 4e 5f f6 31 6c 75 2e 04 da |..JC..$N_.1lu...| +00000010 be 2f 20 25 e3 19 5f 7c c0 92 13 ea 49 b5 b0 ec |./ %.._|....I...|" +"2019-09-24 00:27:04.117 UTC [msp.identity] Verify -> DEBU 5c0d Verify: sig = 00000000 30 44 02 20 1d 6d 60 4c 50 0d 21 47 e4 37 6e 23 |0D. .m`LP.!G.7n#| +00000010 f5 01 7c 06 de 61 d2 f9 8d eb 76 a1 56 86 05 18 |..|..a....v.V...| +00000020 5b da 55 47 02 20 10 a8 07 81 b6 df a4 7a 5f ba |[.UG. .......z_.| +00000030 7d a8 33 01 a7 71 1a 8d 4a ac 7b 70 73 ba 8c aa |}.3..q..J.{ps...| +00000040 a6 22 89 49 78 19 |.".Ix.|" +"2019-09-24 00:27:04.118 UTC [cauthdsl] func2 -> DEBU 5c0e 0xc003fae420 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.118 UTC [cauthdsl] func1 -> DEBU 5c0f 0xc003fae420 gate 1569284824116296200 evaluation succeeds" +"2019-09-24 00:27:04.118 UTC [policies] Evaluate -> DEBU 5c10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.118 UTC [policies] Evaluate -> DEBU 5c11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.119 UTC [policies] Evaluate -> DEBU 5c12 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.119 UTC [policies] Evaluate -> DEBU 5c13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.119 UTC [gossip.gossip] handleMessage -> DEBU 5c14 Exiting" +"2019-09-24 00:27:04.120 UTC [gossip.gossip] handleMessage -> DEBU 5c15 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.120 UTC [msp.identity] Verify -> DEBU 5c16 Verify: digest = 00000000 f2 c6 d9 c5 a2 53 7e 43 60 84 4b cd 73 db dd bc |.....S~C`.K.s...| +00000010 b5 fd b0 85 49 3d 4e 00 5a ed fc c6 dc 58 c2 d1 |....I=N.Z....X..|" +"2019-09-24 00:27:04.120 UTC [msp.identity] Verify -> DEBU 5c17 Verify: sig = 00000000 30 45 02 21 00 92 04 7e be d9 04 92 ea e3 c3 83 |0E.!...~........| +00000010 9c a2 31 99 77 85 d5 10 bf 2b db 57 3d 5f 14 6c |..1.w....+.W=_.l| +00000020 ed 19 f6 70 94 02 20 36 a4 48 62 4a 86 71 d5 2e |...p.. 6.HbJ.q..| +00000030 d4 7f bb be 8c c1 bf fd 4c 2b 42 95 f6 51 83 17 |........L+B..Q..| +00000040 54 92 ca e1 7b 70 35 |T...{p5|" +"2019-09-24 00:27:04.121 UTC [msp] DeserializeIdentity -> DEBU 5c18 Obtaining identity" +"2019-09-24 00:27:04.121 UTC [msp] DeserializeIdentity -> DEBU 5c19 Obtaining identity" +"2019-09-24 00:27:04.121 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5c1a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:04.121 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c1b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.121 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c1c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.122 UTC [policies] Evaluate -> DEBU 5c1d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.122 UTC [policies] Evaluate -> DEBU 5c1e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.122 UTC [policies] Evaluate -> DEBU 5c1f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.122 UTC [cauthdsl] func1 -> DEBU 5c20 0xc003fc4550 gate 1569284824122720500 evaluation starts" +"2019-09-24 00:27:04.122 UTC [cauthdsl] func2 -> DEBU 5c21 0xc003fc4550 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.123 UTC [cauthdsl] func2 -> DEBU 5c22 0xc003fc4550 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.123 UTC [cauthdsl] func2 -> DEBU 5c23 0xc003fc4550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:04.123 UTC [cauthdsl] func2 -> DEBU 5c24 0xc003fc4550 principal evaluation fails" +"2019-09-24 00:27:04.123 UTC [cauthdsl] func1 -> DEBU 5c25 0xc003fc4550 gate 1569284824122720500 evaluation fails" +"2019-09-24 00:27:04.124 UTC [policies] Evaluate -> DEBU 5c26 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.124 UTC [policies] Evaluate -> DEBU 5c27 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.124 UTC [policies] Evaluate -> DEBU 5c28 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:04.125 UTC [cauthdsl] func1 -> DEBU 5c29 0xc003fc4d90 gate 1569284824125355500 evaluation starts" +"2019-09-24 00:27:04.125 UTC [cauthdsl] func2 -> DEBU 5c2a 0xc003fc4d90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.125 UTC [cauthdsl] func2 -> DEBU 5c2b 0xc003fc4d90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.125 UTC [cauthdsl] func2 -> DEBU 5c2c 0xc003fc4d90 principal matched by identity 0" +"2019-09-24 00:27:04.126 UTC [msp.identity] Verify -> DEBU 5c2d Verify: digest = 00000000 98 18 01 21 90 b9 27 a0 6e 99 35 bf 62 79 02 ff |...!..'.n.5.by..| +00000010 10 6e c8 51 84 1c ad 30 db 0f ba 96 ce de c4 39 |.n.Q...0.......9|" +"2019-09-24 00:27:04.126 UTC [msp.identity] Verify -> DEBU 5c2e Verify: sig = 00000000 30 44 02 20 60 16 7e 53 50 33 ef 00 be 62 71 de |0D. `.~SP3...bq.| +00000010 d8 8d 4b b6 fe 20 fc 62 69 8f b9 25 e5 1a 95 27 |..K.. .bi..%...'| +00000020 b8 88 a5 e2 02 20 30 ab 51 ca 0d 92 81 93 8f 0b |..... 0.Q.......| +00000030 3b 56 ae 2a d8 56 2c 43 44 ed 48 a1 55 81 f9 a2 |;V.*.V,CD.H.U...| +00000040 df 6a 98 44 02 fb |.j.D..|" +"2019-09-24 00:27:04.127 UTC [cauthdsl] func2 -> DEBU 5c2f 0xc003fc4d90 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.127 UTC [cauthdsl] func1 -> DEBU 5c30 0xc003fc4d90 gate 1569284824125355500 evaluation succeeds" +"2019-09-24 00:27:04.127 UTC [policies] Evaluate -> DEBU 5c31 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.127 UTC [policies] Evaluate -> DEBU 5c32 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.127 UTC [policies] Evaluate -> DEBU 5c33 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.128 UTC [policies] Evaluate -> DEBU 5c34 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.128 UTC [msp] DeserializeIdentity -> DEBU 5c35 Obtaining identity" +"2019-09-24 00:27:04.128 UTC [msp] DeserializeIdentity -> DEBU 5c36 Obtaining identity" +"2019-09-24 00:27:04.129 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5c37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:04.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c38 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.129 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c39 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.129 UTC [policies] Evaluate -> DEBU 5c3a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.130 UTC [policies] Evaluate -> DEBU 5c3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.130 UTC [policies] Evaluate -> DEBU 5c3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.130 UTC [cauthdsl] func1 -> DEBU 5c3d 0xc0047a8560 gate 1569284824130562000 evaluation starts" +"2019-09-24 00:27:04.130 UTC [cauthdsl] func2 -> DEBU 5c3e 0xc0047a8560 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.130 UTC [cauthdsl] func2 -> DEBU 5c3f 0xc0047a8560 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.131 UTC [cauthdsl] func2 -> DEBU 5c40 0xc0047a8560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:04.131 UTC [cauthdsl] func2 -> DEBU 5c41 0xc0047a8560 principal evaluation fails" +"2019-09-24 00:27:04.131 UTC [cauthdsl] func1 -> DEBU 5c42 0xc0047a8560 gate 1569284824130562000 evaluation fails" +"2019-09-24 00:27:04.131 UTC [policies] Evaluate -> DEBU 5c43 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.131 UTC [policies] Evaluate -> DEBU 5c44 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.132 UTC [policies] Evaluate -> DEBU 5c45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:04.132 UTC [cauthdsl] func1 -> DEBU 5c46 0xc0047a8da0 gate 1569284824132323300 evaluation starts" +"2019-09-24 00:27:04.132 UTC [cauthdsl] func2 -> DEBU 5c47 0xc0047a8da0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.132 UTC [cauthdsl] func2 -> DEBU 5c48 0xc0047a8da0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.132 UTC [cauthdsl] func2 -> DEBU 5c49 0xc0047a8da0 principal matched by identity 0" +"2019-09-24 00:27:04.133 UTC [msp.identity] Verify -> DEBU 5c4a Verify: digest = 00000000 ae 5f 75 8f b8 79 6b 9c 07 89 8e 59 2a 45 63 02 |._u..yk....Y*Ec.| +00000010 9e fc 44 09 6f e3 0b 6b b2 c4 8a 32 fa ae 08 15 |..D.o..k...2....|" +"2019-09-24 00:27:04.133 UTC [msp.identity] Verify -> DEBU 5c4b Verify: sig = 00000000 30 45 02 21 00 ac 0a c9 b4 53 a1 27 c0 f2 00 68 |0E.!.....S.'...h| +00000010 68 7e a0 00 2f 93 e7 0a a6 e3 81 a9 d3 f9 eb dd |h~../...........| +00000020 97 89 ec 5c e7 02 20 31 be f8 03 6d 39 fd 83 02 |...\.. 1...m9...| +00000030 cb d4 46 a1 d2 8c a1 1c c9 91 16 4b 12 36 36 c1 |..F........K.66.| +00000040 62 ad 3f 03 5c 91 fb |b.?.\..|" +"2019-09-24 00:27:04.133 UTC [cauthdsl] func2 -> DEBU 5c4c 0xc0047a8da0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.133 UTC [cauthdsl] func1 -> DEBU 5c4d 0xc0047a8da0 gate 1569284824132323300 evaluation succeeds" +"2019-09-24 00:27:04.134 UTC [policies] Evaluate -> DEBU 5c4e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.134 UTC [policies] Evaluate -> DEBU 5c4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.134 UTC [policies] Evaluate -> DEBU 5c50 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.134 UTC [policies] Evaluate -> DEBU 5c51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.135 UTC [msp.identity] Verify -> DEBU 5c52 Verify: digest = 00000000 85 34 d6 40 67 ea 72 1d 10 3b be 6d 04 cc ae c8 |.4.@g.r..;.m....| +00000010 6e 72 58 38 b2 f1 d0 a0 ec 17 3e f5 83 c1 ca 51 |nrX8......>....Q|" +"2019-09-24 00:27:04.135 UTC [msp.identity] Verify -> DEBU 5c53 Verify: sig = 00000000 30 44 02 20 42 a3 bf 0d bd ec 74 58 00 bc 0d 89 |0D. B.....tX....| +00000010 88 2d df ff 19 ea bf ce b1 fa 08 47 fe 1b 59 37 |.-.........G..Y7| +00000020 d8 7b e3 db 02 20 2f 8c 5d 78 d1 dd 89 53 e2 5a |.{... /.]x...S.Z| +00000030 5f bb 7a c8 db fd 11 56 a7 ee 13 44 33 8b 02 27 |_.z....V...D3..'| +00000040 81 c2 11 ba 3d e1 |....=.|" +"2019-09-24 00:27:04.135 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c54 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.136 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c55 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.136 UTC [policies] Evaluate -> DEBU 5c56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.136 UTC [policies] Evaluate -> DEBU 5c57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.136 UTC [policies] Evaluate -> DEBU 5c58 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.136 UTC [cauthdsl] func1 -> DEBU 5c59 0xc004c0c4a0 gate 1569284824136843200 evaluation starts" +"2019-09-24 00:27:04.137 UTC [cauthdsl] func2 -> DEBU 5c5a 0xc004c0c4a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.137 UTC [cauthdsl] func2 -> DEBU 5c5b 0xc004c0c4a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.137 UTC [cauthdsl] func2 -> DEBU 5c5c 0xc004c0c4a0 principal matched by identity 0" +"2019-09-24 00:27:04.137 UTC [msp.identity] Verify -> DEBU 5c5d Verify: digest = 00000000 85 34 d6 40 67 ea 72 1d 10 3b be 6d 04 cc ae c8 |.4.@g.r..;.m....| +00000010 6e 72 58 38 b2 f1 d0 a0 ec 17 3e f5 83 c1 ca 51 |nrX8......>....Q|" +"2019-09-24 00:27:04.137 UTC [msp.identity] Verify -> DEBU 5c5e Verify: sig = 00000000 30 44 02 20 42 a3 bf 0d bd ec 74 58 00 bc 0d 89 |0D. B.....tX....| +00000010 88 2d df ff 19 ea bf ce b1 fa 08 47 fe 1b 59 37 |.-.........G..Y7| +00000020 d8 7b e3 db 02 20 2f 8c 5d 78 d1 dd 89 53 e2 5a |.{... /.]x...S.Z| +00000030 5f bb 7a c8 db fd 11 56 a7 ee 13 44 33 8b 02 27 |_.z....V...D3..'| +00000040 81 c2 11 ba 3d e1 |....=.|" +"2019-09-24 00:27:04.138 UTC [cauthdsl] func2 -> DEBU 5c5f 0xc004c0c4a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.138 UTC [cauthdsl] func1 -> DEBU 5c60 0xc004c0c4a0 gate 1569284824136843200 evaluation succeeds" +"2019-09-24 00:27:04.138 UTC [policies] Evaluate -> DEBU 5c61 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.138 UTC [policies] Evaluate -> DEBU 5c62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.139 UTC [policies] Evaluate -> DEBU 5c63 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.139 UTC [policies] Evaluate -> DEBU 5c64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.139 UTC [gossip.gossip] handleMessage -> DEBU 5c65 Exiting" +"2019-09-24 00:27:04.139 UTC [gossip.gossip] handleMessage -> DEBU 5c66 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.139 UTC [msp] DeserializeIdentity -> DEBU 5c67 Obtaining identity" +"2019-09-24 00:27:04.140 UTC [msp.identity] Verify -> DEBU 5c68 Verify: digest = 00000000 f2 c6 d9 c5 a2 53 7e 43 60 84 4b cd 73 db dd bc |.....S~C`.K.s...| +00000010 b5 fd b0 85 49 3d 4e 00 5a ed fc c6 dc 58 c2 d1 |....I=N.Z....X..|" +"2019-09-24 00:27:04.140 UTC [msp.identity] Verify -> DEBU 5c69 Verify: sig = 00000000 30 45 02 21 00 92 04 7e be d9 04 92 ea e3 c3 83 |0E.!...~........| +00000010 9c a2 31 99 77 85 d5 10 bf 2b db 57 3d 5f 14 6c |..1.w....+.W=_.l| +00000020 ed 19 f6 70 94 02 20 36 a4 48 62 4a 86 71 d5 2e |...p.. 6.HbJ.q..| +00000030 d4 7f bb be 8c c1 bf fd 4c 2b 42 95 f6 51 83 17 |........L+B..Q..| +00000040 54 92 ca e1 7b 70 35 |T...{p5|" +"2019-09-24 00:27:04.140 UTC [msp.identity] Verify -> DEBU 5c6a Verify: digest = 00000000 85 34 d6 40 67 ea 72 1d 10 3b be 6d 04 cc ae c8 |.4.@g.r..;.m....| +00000010 6e 72 58 38 b2 f1 d0 a0 ec 17 3e f5 83 c1 ca 51 |nrX8......>....Q|" +"2019-09-24 00:27:04.140 UTC [msp.identity] Verify -> DEBU 5c6b Verify: sig = 00000000 30 44 02 20 42 a3 bf 0d bd ec 74 58 00 bc 0d 89 |0D. B.....tX....| +00000010 88 2d df ff 19 ea bf ce b1 fa 08 47 fe 1b 59 37 |.-.........G..Y7| +00000020 d8 7b e3 db 02 20 2f 8c 5d 78 d1 dd 89 53 e2 5a |.{... /.]x...S.Z| +00000030 5f bb 7a c8 db fd 11 56 a7 ee 13 44 33 8b 02 27 |_.z....V...D3..'| +00000040 81 c2 11 ba 3d e1 |....=.|" +"2019-09-24 00:27:04.140 UTC [msp] DeserializeIdentity -> DEBU 5c6c Obtaining identity" +"2019-09-24 00:27:04.140 UTC [msp] DeserializeIdentity -> DEBU 5c6d Obtaining identity" +"2019-09-24 00:27:04.140 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5c6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:04.140 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c6f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.140 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c70 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.140 UTC [policies] Evaluate -> DEBU 5c71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.140 UTC [policies] Evaluate -> DEBU 5c72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.140 UTC [policies] Evaluate -> DEBU 5c73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.140 UTC [cauthdsl] func1 -> DEBU 5c74 0xc000398df0 gate 1569284824140803200 evaluation starts" +"2019-09-24 00:27:04.140 UTC [cauthdsl] func2 -> DEBU 5c75 0xc000398df0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.140 UTC [cauthdsl] func2 -> DEBU 5c76 0xc000398df0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.140 UTC [cauthdsl] func2 -> DEBU 5c77 0xc000398df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:04.140 UTC [cauthdsl] func2 -> DEBU 5c78 0xc000398df0 principal evaluation fails" +"2019-09-24 00:27:04.140 UTC [cauthdsl] func1 -> DEBU 5c79 0xc000398df0 gate 1569284824140803200 evaluation fails" +"2019-09-24 00:27:04.140 UTC [policies] Evaluate -> DEBU 5c7a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func1 -> DEBU 5c7d 0xc000399630 gate 1569284824141053000 evaluation starts" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c7e 0xc000399630 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c7f 0xc000399630 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c80 0xc000399630 principal matched by identity 0" +"2019-09-24 00:27:04.141 UTC [msp.identity] Verify -> DEBU 5c81 Verify: digest = 00000000 67 2d ba 2b 43 54 21 87 64 25 50 48 06 88 a5 ba |g-.+CT!.d%PH....| +00000010 28 54 ab 2c b9 73 fc 17 0a 6e ca 81 a2 66 d5 f0 |(T.,.s...n...f..|" +"2019-09-24 00:27:04.141 UTC [msp.identity] Verify -> DEBU 5c82 Verify: sig = 00000000 30 44 02 20 61 33 2a eb ac 0c ab c8 3d 66 b0 25 |0D. a3*.....=f.%| +00000010 b4 4b c1 a0 a2 48 06 30 13 0e b9 c9 fd 99 65 b8 |.K...H.0......e.| +00000020 68 17 f2 ab 02 20 1b be 5b 6d 48 e8 d0 78 98 98 |h.... ..[mH..x..| +00000030 31 2d 53 8f 2d 36 22 36 2e 9e ae 27 31 ca 30 e9 |1-S.-6"6...'1.0.| +00000040 7a f1 de b8 0f 0b |z.....|" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c83 0xc000399630 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func1 -> DEBU 5c84 0xc000399630 gate 1569284824141053000 evaluation succeeds" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c85 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c87 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.141 UTC [msp] DeserializeIdentity -> DEBU 5c89 Obtaining identity" +"2019-09-24 00:27:04.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c8a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c8b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c8c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c8d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func1 -> DEBU 5c8f 0xc00259c710 gate 1569284824141651100 evaluation starts" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c90 0xc00259c710 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c91 0xc00259c710 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c92 0xc00259c710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c93 0xc00259c710 principal evaluation fails" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func1 -> DEBU 5c94 0xc00259c710 gate 1569284824141651100 evaluation fails" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c95 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.141 UTC [policies] Evaluate -> DEBU 5c97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func1 -> DEBU 5c98 0xc00259cf50 gate 1569284824141901700 evaluation starts" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c99 0xc00259cf50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c9a 0xc00259cf50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.141 UTC [cauthdsl] func2 -> DEBU 5c9b 0xc00259cf50 principal matched by identity 0" +"2019-09-24 00:27:04.142 UTC [msp.identity] Verify -> DEBU 5c9c Verify: digest = 00000000 67 2d ba 2b 43 54 21 87 64 25 50 48 06 88 a5 ba |g-.+CT!.d%PH....| +00000010 28 54 ab 2c b9 73 fc 17 0a 6e ca 81 a2 66 d5 f0 |(T.,.s...n...f..|" +"2019-09-24 00:27:04.142 UTC [msp.identity] Verify -> DEBU 5c9d Verify: sig = 00000000 30 44 02 20 61 33 2a eb ac 0c ab c8 3d 66 b0 25 |0D. a3*.....=f.%| +00000010 b4 4b c1 a0 a2 48 06 30 13 0e b9 c9 fd 99 65 b8 |.K...H.0......e.| +00000020 68 17 f2 ab 02 20 1b be 5b 6d 48 e8 d0 78 98 98 |h.... ..[mH..x..| +00000030 31 2d 53 8f 2d 36 22 36 2e 9e ae 27 31 ca 30 e9 |1-S.-6"6...'1.0.| +00000040 7a f1 de b8 0f 0b |z.....|" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5c9e 0xc00259cf50 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func1 -> DEBU 5c9f 0xc00259cf50 gate 1569284824141901700 evaluation succeeds" +"2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5ca0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5ca1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5ca2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5ca3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.142 UTC [msp] DeserializeIdentity -> DEBU 5ca4 Obtaining identity" +"2019-09-24 00:27:04.142 UTC [msp] DeserializeIdentity -> DEBU 5ca5 Obtaining identity" +"2019-09-24 00:27:04.142 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5ca6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:04.142 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5ca7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.142 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5ca8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5ca9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5caa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5cab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func1 -> DEBU 5cac 0xc0027e6720 gate 1569284824142644100 evaluation starts" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cad 0xc0027e6720 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cae 0xc0027e6720 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5caf 0xc0027e6720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cb0 0xc0027e6720 principal evaluation fails" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func1 -> DEBU 5cb1 0xc0027e6720 gate 1569284824142644100 evaluation fails" +"2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5cb2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5cb3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.142 UTC [policies] Evaluate -> DEBU 5cb4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func1 -> DEBU 5cb5 0xc0027e6f60 gate 1569284824142889300 evaluation starts" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cb6 0xc0027e6f60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cb7 0xc0027e6f60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.142 UTC [cauthdsl] func2 -> DEBU 5cb8 0xc0027e6f60 principal matched by identity 0" +"2019-09-24 00:27:04.143 UTC [msp.identity] Verify -> DEBU 5cb9 Verify: digest = 00000000 b7 0d 4a 43 01 b1 24 4e 5f f6 31 6c 75 2e 04 da |..JC..$N_.1lu...| +00000010 be 2f 20 25 e3 19 5f 7c c0 92 13 ea 49 b5 b0 ec |./ %.._|....I...|" +"2019-09-24 00:27:04.143 UTC [msp.identity] Verify -> DEBU 5cba Verify: sig = 00000000 30 44 02 20 1d 6d 60 4c 50 0d 21 47 e4 37 6e 23 |0D. .m`LP.!G.7n#| +00000010 f5 01 7c 06 de 61 d2 f9 8d eb 76 a1 56 86 05 18 |..|..a....v.V...| +00000020 5b da 55 47 02 20 10 a8 07 81 b6 df a4 7a 5f ba |[.UG. .......z_.| +00000030 7d a8 33 01 a7 71 1a 8d 4a ac 7b 70 73 ba 8c aa |}.3..q..J.{ps...| +00000040 a6 22 89 49 78 19 |.".Ix.|" +"2019-09-24 00:27:04.143 UTC [cauthdsl] func2 -> DEBU 5cbb 0xc0027e6f60 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.143 UTC [cauthdsl] func1 -> DEBU 5cbc 0xc0027e6f60 gate 1569284824142889300 evaluation succeeds" +"2019-09-24 00:27:04.143 UTC [policies] Evaluate -> DEBU 5cbd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.143 UTC [policies] Evaluate -> DEBU 5cbe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.143 UTC [policies] Evaluate -> DEBU 5cbf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.143 UTC [policies] Evaluate -> DEBU 5cc0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.143 UTC [gossip.gossip] handleMessage -> DEBU 5cc1 Exiting" +"2019-09-24 00:27:04.290 UTC [msp] DeserializeIdentity -> DEBU 5cc2 Obtaining identity" +"2019-09-24 00:27:04.290 UTC [msp] DeserializeIdentity -> DEBU 5cc3 Obtaining identity" +"2019-09-24 00:27:04.291 UTC [gossip.pull] Hello -> DEBU 5cc4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:04.291 UTC [msp] DeserializeIdentity -> DEBU 5cc5 Obtaining identity" +"2019-09-24 00:27:04.292 UTC [msp] DeserializeIdentity -> DEBU 5cc6 Obtaining identity" +"2019-09-24 00:27:04.292 UTC [gossip.comm] Send -> DEBU 5cc7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:04.292 UTC [gossip.comm] sendToEndpoint -> DEBU 5cc8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.293 UTC [gossip.comm] sendToEndpoint -> DEBU 5cc9 Exiting" +"2019-09-24 00:27:04.294 UTC [gossip.comm] func1 -> DEBU 5cca Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.294 UTC [gossip.gossip] handleMessage -> DEBU 5ccb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.295 UTC [gossip.pull] HandleMessage -> DEBU 5ccc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.295 UTC [gossip.gossip] handleMessage -> DEBU 5ccd Exiting" +"2019-09-24 00:27:04.544 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5cce Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.544 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 5ccf Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.544 UTC [policies] Evaluate -> DEBU 5cd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 00:27:04.544 UTC [policies] Evaluate -> DEBU 5cd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.544 UTC [policies] Evaluate -> DEBU 5cd2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:27:04.544 UTC [cauthdsl] func1 -> DEBU 5cd3 0xc002b6ee10 gate 1569284824544593900 evaluation starts" +"2019-09-24 00:27:04.544 UTC [cauthdsl] func2 -> DEBU 5cd4 0xc002b6ee10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.544 UTC [cauthdsl] func2 -> DEBU 5cd5 0xc002b6ee10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.544 UTC [cauthdsl] func2 -> DEBU 5cd6 0xc002b6ee10 principal matched by identity 0" +"2019-09-24 00:27:04.545 UTC [msp.identity] Verify -> DEBU 5cd7 Verify: digest = 00000000 d4 73 3d fc 79 2a 2b 5e e8 ca 95 26 14 67 a3 b6 |.s=.y*+^...&.g..| +00000010 eb b8 d3 b5 41 5d 12 f3 9d b8 79 a4 78 57 84 b4 |....A]....y.xW..|" +"2019-09-24 00:27:04.545 UTC [msp.identity] Verify -> DEBU 5cd8 Verify: sig = 00000000 30 45 02 21 00 b2 aa e6 75 3f 34 ce b6 6b 43 2e |0E.!....u?4..kC.| +00000010 94 47 b3 9f 04 6d f8 28 2f 85 76 ba ae c0 22 2c |.G...m.(/.v...",| +00000020 c0 8e 56 2a a6 02 20 6c 37 ef 4f 42 4f 56 f9 24 |..V*.. l7.OBOV.$| +00000030 e6 1e 21 f8 32 65 16 46 3f 6e 9c 9a db d0 a0 b1 |..!.2e.F?n......| +00000040 47 ab d7 59 a0 28 21 |G..Y.(!|" +"2019-09-24 00:27:04.545 UTC [cauthdsl] func2 -> DEBU 5cd9 0xc002b6ee10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.545 UTC [cauthdsl] func1 -> DEBU 5cda 0xc002b6ee10 gate 1569284824544593900 evaluation succeeds" +"2019-09-24 00:27:04.545 UTC [policies] Evaluate -> DEBU 5cdb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:04.545 UTC [policies] Evaluate -> DEBU 5cdc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:04.545 UTC [policies] Evaluate -> DEBU 5cdd Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:27:04.545 UTC [policies] Evaluate -> DEBU 5cde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:27:04.545 UTC [blocksProvider] DeliverBlocks -> DEBU 5cdf [businesschannel] Adding payload to local buffer, blockNum = [5]" +"2019-09-24 00:27:04.546 UTC [gossip.state] addPayload -> DEBU 5ce0 [businesschannel] Adding payload to local buffer, blockNum = [5]" +"2019-09-24 00:27:04.546 UTC [gossip.state] addPayload -> DEBU 5ce1 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 00:27:04.546 UTC [blocksProvider] DeliverBlocks -> DEBU 5ce2 [businesschannel] Gossiping block [5], peers number [3]" +"2019-09-24 00:27:04.546 UTC [gossip.channel] AddToMsgStore -> DEBU 5ce3 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 5}, Envelope: 4036 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 00:27:04.546 UTC [gossip.pull] Add -> DEBU 5ce4 Added 5, total items: 5" +"2019-09-24 00:27:04.546 UTC [gossip.state] deliverPayloads -> DEBU 5ce5 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" +"2019-09-24 00:27:04.546 UTC [gossip.state] deliverPayloads -> DEBU 5ce6 [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" +"2019-09-24 00:27:04.546 UTC [gossip.privdata] StoreBlock -> INFO 5ce7 [businesschannel] Received block [5] from buffer" +"2019-09-24 00:27:04.547 UTC [gossip.privdata] StoreBlock -> DEBU 5ce8 [businesschannel] Validating block [5]" +"2019-09-24 00:27:04.547 UTC [committer.txvalidator] Validate -> DEBU 5ce9 [businesschannel] START Block Validation for block [5]" +"2019-09-24 00:27:04.547 UTC [committer.txvalidator] Validate -> DEBU 5cea expecting 1 block validation responses" +"2019-09-24 00:27:04.547 UTC [committer.txvalidator] validateTx -> DEBU 5ceb [businesschannel] validateTx starts for block 0xc003559a40 env 0xc0037e1720 txn 0" +"2019-09-24 00:27:04.548 UTC [protoutils] ValidateTransaction -> DEBU 5cec ValidateTransactionEnvelope starts for envelope 0xc0037e1720" +"2019-09-24 00:27:04.548 UTC [protoutils] ValidateTransaction -> DEBU 5ced Header is channel_header:"\010\003\032\014\010\326\305\245\354\005\020\374\361\251\352\001\"\017businesschannel*@315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\361L\027|\265\266fls\342\256\205\260\360\006I]\312\365A\236\367\325\214" " +"2019-09-24 00:27:04.548 UTC [protoutils] validateChannelHeader -> DEBU 5cee validateChannelHeader info: header type 3" +"2019-09-24 00:27:04.548 UTC [protoutils] checkSignatureFromCreator -> DEBU 5cef begin" +"2019-09-24 00:27:04.548 UTC [msp] GetManagerForChain -> DEBU 5cf0 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:04.548 UTC [protoutils] checkSignatureFromCreator -> DEBU 5cf1 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-09-24 00:27:04.549 UTC [protoutils] checkSignatureFromCreator -> DEBU 5cf2 creator is valid" +"2019-09-24 00:27:04.549 UTC [msp.identity] Verify -> DEBU 5cf3 Verify: digest = 00000000 fc be 8d 27 f2 77 89 7c 99 cc 04 4a 85 f8 8d 65 |...'.w.|...J...e| +00000010 2a 53 4d f7 97 3d b1 11 dc 3d 62 61 a9 f1 4e 09 |*SM..=...=ba..N.|" +"2019-09-24 00:27:04.549 UTC [msp.identity] Verify -> DEBU 5cf4 Verify: sig = 00000000 30 45 02 21 00 f7 0b fd 05 a4 5e 7c 76 e3 68 36 |0E.!......^|v.h6| +00000010 9b e8 3b 60 20 a4 c6 aa c5 1c 7f 38 32 4c a8 0e |..;` ......82L..| +00000020 0a c1 65 d7 de 02 20 33 73 0f 80 ff 95 92 a0 ee |..e... 3s.......| +00000030 0a 53 bc 4b 12 a0 42 40 b9 b9 b3 1d ba ea 5c 46 |.S.K..B@......\F| +00000040 0f 1e 77 3f ef 13 c6 |..w?...|" +"2019-09-24 00:27:04.550 UTC [protoutils] checkSignatureFromCreator -> DEBU 5cf5 exits successfully" +"2019-09-24 00:27:04.550 UTC [protoutils] validateEndorserTransaction -> DEBU 5cf6 validateEndorserTransaction starts for data 0xc003c0d000, header channel_header:"\010\003\032\014\010\326\305\245\354\005\020\374\361\251\352\001\"\017businesschannel*@315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\361L\027|\265\266fls\342\256\205\260\360\006I]\312\365A\236\367\325\214" " +"2019-09-24 00:27:04.550 UTC [protoutils] validateEndorserTransaction -> DEBU 5cf7 validateEndorserTransaction info: there are 1 actions" +"2019-09-24 00:27:04.550 UTC [protoutils] validateEndorserTransaction -> DEBU 5cf8 validateEndorserTransaction info: signature header is valid" +"2019-09-24 00:27:04.550 UTC [protoutils] ValidateTransaction -> DEBU 5cf9 ValidateTransactionEnvelope returns err %!s()" +"2019-09-24 00:27:04.552 UTC [committer.txvalidator] validateTx -> DEBU 5cfb Transaction is for channel businesschannel" +"2019-09-24 00:27:04.552 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5cfc retrieveTransactionByID() - txId = [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0]" +"2019-09-24 00:27:04.552 UTC [committer.txvalidator] validateTx -> DEBU 5cfd Validating transaction vscc tx validate" +"2019-09-24 00:27:04.552 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 5cfe [businesschannel] VSCCValidateTx starts for bytes 0xc004113400" +"2019-09-24 00:27:04.552 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5cff constructing new query executor txid = [2ff84693-5f50-42bf-9b6e-dee29c390ae1]" +"2019-09-24 00:27:04.554 UTC [stateleveldb] GetState -> DEBU 5d00 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:04.554 UTC [lockbasedtxmgr] Done -> DEBU 5d01 Done with transaction simulation / query execution [2ff84693-5f50-42bf-9b6e-dee29c390ae1]" +"2019-09-24 00:27:04.554 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 5d02 Validating Tx 315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" +"2019-09-24 00:27:04.555 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5d03 constructing new query executor txid = [f4b3903f-ed02-4585-a8b2-3a119af01b62]" +"2019-09-24 00:27:04.555 UTC [lockbasedtxmgr] Done -> DEBU 5d04 Done with transaction simulation / query execution [f4b3903f-ed02-4585-a8b2-3a119af01b62]" +"2019-09-24 00:27:04.555 UTC [cauthdsl] func1 -> DEBU 5d05 0xc0030cfef0 gate 1569284824555355100 evaluation starts" +"2019-09-24 00:27:04.555 UTC [cauthdsl] func2 -> DEBU 5d06 0xc0030cfef0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.555 UTC [cauthdsl] func2 -> DEBU 5d07 0xc0030cfef0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.555 UTC [cauthdsl] func2 -> DEBU 5d08 0xc0030cfef0 principal matched by identity 0" +"2019-09-24 00:27:04.555 UTC [msp.identity] Verify -> DEBU 5d09 Verify: digest = 00000000 ed ce 66 c5 9d 53 95 83 15 5c f8 d9 44 f2 5b ce |..f..S...\..D.[.| +00000010 04 b7 c3 db 70 a9 b1 8a 71 3f d3 7b 84 5e 79 81 |....p...q?.{.^y.|" +"2019-09-24 00:27:04.555 UTC [msp.identity] Verify -> DEBU 5d0a Verify: sig = 00000000 30 44 02 20 33 74 98 58 ba c1 23 d2 62 d9 b8 95 |0D. 3t.X..#.b...| +00000010 ad ae 59 cb 7e 3c 9b c8 36 9a ad 0d 3c b0 84 91 |..Y.~<..6...<...| +00000020 f5 6b 0a a9 02 20 05 8f 71 3d df 46 9b fd 7c 01 |.k... ..q=.F..|.| +00000030 48 73 88 23 9c f3 12 9d 5d 9f ff d4 cf c0 eb b6 |Hs.#....].......| +00000040 43 19 3a 30 6c cb |C.:0l.|" +"2019-09-24 00:27:04.556 UTC [cauthdsl] func2 -> DEBU 5d0b 0xc0030cfef0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.556 UTC [cauthdsl] func2 -> DEBU 5d0c 0xc0030cfef0 signed by 1 principal evaluation starts (used [true])" +"2019-09-24 00:27:04.556 UTC [cauthdsl] func2 -> DEBU 5d0d 0xc0030cfef0 skipping identity 0 because it has already been used" +"2019-09-24 00:27:04.556 UTC [cauthdsl] func2 -> DEBU 5d0e 0xc0030cfef0 principal evaluation fails" +"2019-09-24 00:27:04.556 UTC [cauthdsl] func1 -> DEBU 5d0f 0xc0030cfef0 gate 1569284824555355100 evaluation succeeds" +"2019-09-24 00:27:04.556 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 5d10 constructing new query executor txid = [a2104488-70d6-4986-87fa-9709b1cac1d3]" +"2019-09-24 00:27:04.556 UTC [lockbasedtxmgr] Done -> DEBU 5d11 Done with transaction simulation / query execution [a2104488-70d6-4986-87fa-9709b1cac1d3]" +"2019-09-24 00:27:04.552 UTC [msp] DeserializeIdentity -> DEBU 5cfa Obtaining identity" +"2019-09-24 00:27:04.556 UTC [msp] DeserializeIdentity -> DEBU 5d13 Obtaining identity" +"2019-09-24 00:27:04.557 UTC [msp] DeserializeIdentity -> DEBU 5d14 Obtaining identity" +"2019-09-24 00:27:04.557 UTC [msp] DeserializeIdentity -> DEBU 5d15 Obtaining identity" +"2019-09-24 00:27:04.556 UTC [vscc] Validate -> DEBU 5d12 block 5, namespace: exp02, tx 0 validation results is: " +"2019-09-24 00:27:04.558 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 5d16 Transaction 315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0 appears to be valid" +"2019-09-24 00:27:04.558 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 5d17 [businesschannel] VSCCValidateTx completes env bytes 0xc004113400" +"2019-09-24 00:27:04.558 UTC [committer.txvalidator] validateTx -> DEBU 5d18 [businesschannel] validateTx completes for block 0xc003559a40 env 0xc0037e1720 txn 0" +"2019-09-24 00:27:04.558 UTC [committer.txvalidator] Validate -> DEBU 5d19 got result for idx 0, code 0" +"2019-09-24 00:27:04.558 UTC [committer.txvalidator] Validate -> INFO 5d1a [businesschannel] Validated block [5] in 11ms" +"2019-09-24 00:27:04.559 UTC [gossip.privdata] listMissingPrivateData -> DEBU 5d1b Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 00:27:04.559 UTC [gossip.privdata] StoreBlock -> DEBU 5d1c [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 00:27:04.559 UTC [kvledger] CommitWithPvtData -> DEBU 5d1d [businesschannel] Validating state for block [5]" +"2019-09-24 00:27:04.560 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5d1e Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 00:27:04.560 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5d1f lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 00:27:04.560 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5d20 Validating new block with num trans = [1]" +"2019-09-24 00:27:04.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5d21 ValidateAndPrepareBatch() for block number = [5]" +"2019-09-24 00:27:04.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5d22 preprocessing ProtoBlock..." +"2019-09-24 00:27:04.560 UTC [valimpl] preprocessProtoBlock -> DEBU 5d23 txType=ENDORSER_TRANSACTION" +"2019-09-24 00:27:04.560 UTC [stateleveldb] GetState -> DEBU 5d24 GetState(). ns=exp02, key=a" +"2019-09-24 00:27:04.560 UTC [statebasedval] validateKVRead -> DEBU 5d25 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +"2019-09-24 00:27:04.560 UTC [stateleveldb] GetState -> DEBU 5d26 GetState(). ns=exp02, key=b" +"2019-09-24 00:27:04.560 UTC [statebasedval] validateKVRead -> DEBU 5d27 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +"2019-09-24 00:27:04.560 UTC [stateleveldb] GetState -> DEBU 5d28 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:04.560 UTC [statebasedval] validateKVRead -> DEBU 5d29 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-09-24 00:27:04.560 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 5d2a Block [5] Transaction index [0] TxId [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0] marked as valid by state validator" +"2019-09-24 00:27:04.560 UTC [valinternal] ApplyWriteSet -> DEBU 5d2b txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0038f0a00), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0038f0a40)}" +"2019-09-24 00:27:04.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5d2c validating rwset..." +"2019-09-24 00:27:04.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5d2d postprocessing ProtoBlock..." +"2019-09-24 00:27:04.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5d2e ValidateAndPrepareBatch() complete" +"2019-09-24 00:27:04.560 UTC [kvledger] CommitWithPvtData -> DEBU 5d2f [businesschannel] Adding CommitHash to the block [5]" +"2019-09-24 00:27:04.560 UTC [kvledger] CommitWithPvtData -> DEBU 5d30 [businesschannel] Committing block [5] to storage" +"2019-09-24 00:27:04.560 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5d31 Writing block [5] to pvt block store" +"2019-09-24 00:27:04.561 UTC [gossip.comm] Send -> DEBU 5d32 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 5}, Envelope: 4036 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:04.561 UTC [msp] DeserializeIdentity -> DEBU 5d33 Obtaining identity" +"2019-09-24 00:27:04.561 UTC [msp] DeserializeIdentity -> DEBU 5d34 Obtaining identity" +"2019-09-24 00:27:04.561 UTC [gossip.comm] sendToEndpoint -> DEBU 5d35 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 5}, Envelope: 4036 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.561 UTC [gossip.comm] sendToEndpoint -> DEBU 5d36 Exiting" +"2019-09-24 00:27:04.568 UTC [pvtdatastorage] Prepare -> DEBU 5d37 Saved 0 private data write sets for block [5]" +"2019-09-24 00:27:04.578 UTC [fsblkstorage] indexBlock -> DEBU 5d38 Indexing block [blockNum=5, blockHash=[]byte{0x7d, 0x35, 0x9, 0x46, 0xf2, 0x7d, 0x8b, 0xf0, 0x5f, 0x8e, 0xd9, 0xe3, 0x87, 0xa0, 0x69, 0x5, 0xf1, 0x81, 0xfa, 0x34, 0xce, 0x83, 0x96, 0x8, 0x2e, 0xb2, 0x87, 0x9e, 0x15, 0xec, 0x79, 0xc3} txOffsets= +txId=315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0 locPointer=offset=70, bytesLength=2985 +]" +"2019-09-24 00:27:04.581 UTC [fsblkstorage] indexBlock -> DEBU 5d39 Adding txLoc [fileSuffixNum=0, offset=80127, bytesLength=2985] for tx ID: [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0] to txid-index" +"2019-09-24 00:27:04.581 UTC [fsblkstorage] indexBlock -> DEBU 5d3a Adding txLoc [fileSuffixNum=0, offset=80127, bytesLength=2985] for tx number:[0] ID: [315f3dfce6e2287e4d011b2f4c579c922f6e02dd0cad86216201215104ae74f0] to blockNumTranNum index" +"2019-09-24 00:27:04.583 UTC [gossip.comm] func1 -> DEBU 5d3b Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.585 UTC [gossip.gossip] handleMessage -> DEBU 5d3c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.585 UTC [msp] DeserializeIdentity -> DEBU 5d3d Obtaining identity" +"2019-09-24 00:27:04.586 UTC [msp] DeserializeIdentity -> DEBU 5d3f Obtaining identity" +"2019-09-24 00:27:04.586 UTC [gossip.gossip] handleMessage -> DEBU 5d40 Exiting" +"2019-09-24 00:27:04.585 UTC [fsblkstorage] updateCheckpoint -> DEBU 5d3e Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84085], isChainEmpty=[false], lastBlockNumber=[5]" +"2019-09-24 00:27:04.587 UTC [pvtdatastorage] Commit -> DEBU 5d41 Committing private data for block [5]" +"2019-09-24 00:27:04.588 UTC [gossip.comm] func1 -> DEBU 5d42 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:04.588 UTC [gossip.gossip] handleMessage -> DEBU 5d43 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:04.588 UTC [msp.identity] Verify -> DEBU 5d44 Verify: digest = 00000000 85 34 d6 40 67 ea 72 1d 10 3b be 6d 04 cc ae c8 |.4.@g.r..;.m....| +00000010 6e 72 58 38 b2 f1 d0 a0 ec 17 3e f5 83 c1 ca 51 |nrX8......>....Q|" +"2019-09-24 00:27:04.589 UTC [msp.identity] Verify -> DEBU 5d45 Verify: sig = 00000000 30 44 02 20 42 a3 bf 0d bd ec 74 58 00 bc 0d 89 |0D. B.....tX....| +00000010 88 2d df ff 19 ea bf ce b1 fa 08 47 fe 1b 59 37 |.-.........G..Y7| +00000020 d8 7b e3 db 02 20 2f 8c 5d 78 d1 dd 89 53 e2 5a |.{... /.]x...S.Z| +00000030 5f bb 7a c8 db fd 11 56 a7 ee 13 44 33 8b 02 27 |_.z....V...D3..'| +00000040 81 c2 11 ba 3d e1 |....=.|" +"2019-09-24 00:27:04.590 UTC [gossip.gossip] handleMessage -> DEBU 5d46 Exiting" +"2019-09-24 00:27:04.590 UTC [pvtdatastorage] Commit -> DEBU 5d47 Committed private data for block [5]" +"2019-09-24 00:27:04.590 UTC [kvledger] CommitWithPvtData -> DEBU 5d48 [businesschannel] Committing block [5] transactions to state database" +"2019-09-24 00:27:04.591 UTC [lockbasedtxmgr] Commit -> DEBU 5d49 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 00:27:04.592 UTC [lockbasedtxmgr] Commit -> DEBU 5d4a Committing updates to state database" +"2019-09-24 00:27:04.592 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5d4b Building the expiry schedules based on the update batch" +"2019-09-24 00:27:04.592 UTC [lockbasedtxmgr] Commit -> DEBU 5d4c Write lock acquired for committing updates to state database" +"2019-09-24 00:27:04.592 UTC [gossip.gossip] handleMessage -> DEBU 5d4e Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:04.593 UTC [msp.identity] Verify -> DEBU 5d50 Verify: digest = 00000000 85 34 d6 40 67 ea 72 1d 10 3b be 6d 04 cc ae c8 |.4.@g.r..;.m....| +00000010 6e 72 58 38 b2 f1 d0 a0 ec 17 3e f5 83 c1 ca 51 |nrX8......>....Q|" +"2019-09-24 00:27:04.593 UTC [msp.identity] Verify -> DEBU 5d51 Verify: sig = 00000000 30 44 02 20 42 a3 bf 0d bd ec 74 58 00 bc 0d 89 |0D. B.....tX....| +00000010 88 2d df ff 19 ea bf ce b1 fa 08 47 fe 1b 59 37 |.-.........G..Y7| +00000020 d8 7b e3 db 02 20 2f 8c 5d 78 d1 dd 89 53 e2 5a |.{... /.]x...S.Z| +00000030 5f bb 7a c8 db fd 11 56 a7 ee 13 44 33 8b 02 27 |_.z....V...D3..'| +00000040 81 c2 11 ba 3d e1 |....=.|" +"2019-09-24 00:27:04.592 UTC [stateleveldb] ApplyUpdates -> DEBU 5d4f Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-09-24 00:27:04.595 UTC [stateleveldb] ApplyUpdates -> DEBU 5d53 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-09-24 00:27:04.592 UTC [msp] GetDefaultSigningIdentity -> DEBU 5d4d Obtaining default signing identity" +"2019-09-24 00:27:04.596 UTC [msp.identity] Sign -> DEBU 5d54 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104B " +"2019-09-24 00:27:04.596 UTC [msp.identity] Sign -> DEBU 5d55 Sign: digest: EC3B23D7E20E4325E42CA960FE0CE5C8C8EA96254480A358B03F9F43C710DAF6 " +"2019-09-24 00:27:04.596 UTC [msp] GetDefaultSigningIdentity -> DEBU 5d56 Obtaining default signing identity" +"2019-09-24 00:27:04.597 UTC [msp.identity] Sign -> DEBU 5d57 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:04.597 UTC [msp.identity] Sign -> DEBU 5d58 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:04.598 UTC [gossip.discovery] periodicalSendAlive -> DEBU 5d59 Sleeping 5s" +"2019-09-24 00:27:04.598 UTC [lockbasedtxmgr] Commit -> DEBU 5d5a Updates committed to state database and the write lock is released" +"2019-09-24 00:27:04.598 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5d5b Preparing potential purge list working-set for expiringAtBlk [6]" +"2019-09-24 00:27:04.598 UTC [msp] DeserializeIdentity -> DEBU 5d5c Obtaining identity" +"2019-09-24 00:27:04.598 UTC [leveldbhelper] GetIterator -> DEBU 5d5d Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" +"2019-09-24 00:27:04.599 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5d5e No expiry entry found for expiringAtBlk [6]" +"2019-09-24 00:27:04.599 UTC [msp] DeserializeIdentity -> DEBU 5d5f Obtaining identity" +"2019-09-24 00:27:04.599 UTC [lockbasedtxmgr] func1 -> DEBU 5d60 launched the background routine for preparing keys to purge with the next block" +"2019-09-24 00:27:04.599 UTC [kvledger] CommitWithPvtData -> DEBU 5d61 [businesschannel] Committing block [5] transactions to history database" +"2019-09-24 00:27:04.600 UTC [historyleveldb] Commit -> DEBU 5d63 Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" +"2019-09-24 00:27:04.599 UTC [gossip.comm] Send -> DEBU 5d62 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:04.600 UTC [msp] DeserializeIdentity -> DEBU 5d64 Obtaining identity" +"2019-09-24 00:27:04.600 UTC [gossip.comm] Send -> DEBU 5d65 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:04.601 UTC [msp] DeserializeIdentity -> DEBU 5d66 Obtaining identity" +"2019-09-24 00:27:04.601 UTC [gossip.comm] Send -> DEBU 5d67 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:04.602 UTC [gossip.comm] sendToEndpoint -> DEBU 5d68 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.602 UTC [gossip.comm] sendToEndpoint -> DEBU 5d6a Exiting" +"2019-09-24 00:27:04.602 UTC [gossip.comm] sendToEndpoint -> DEBU 5d6b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.602 UTC [gossip.comm] sendToEndpoint -> DEBU 5d6c Exiting" +"2019-09-24 00:27:04.595 UTC [msp] DeserializeIdentity -> DEBU 5d52 Obtaining identity" +"2019-09-24 00:27:04.602 UTC [gossip.gossip] handleMessage -> DEBU 5d6d Exiting" +"2019-09-24 00:27:04.602 UTC [historyleveldb] Commit -> DEBU 5d69 Channel [businesschannel]: Updates committed to history database for blockNo [5]" +"2019-09-24 00:27:04.602 UTC [kvledger] CommitWithPvtData -> INFO 5d6f [businesschannel] Committed block [5] with 1 transaction(s) in 43ms (state_validation=0ms block_and_pvtdata_commit=29ms state_commit=8ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +"2019-09-24 00:27:04.603 UTC [msp] GetDefaultSigningIdentity -> DEBU 5d70 Obtaining default signing identity" +"2019-09-24 00:27:04.603 UTC [msp.identity] Sign -> DEBU 5d71 Sign: plaintext: 18057A6C1214089096D4ACDE83CEE315...08061A0C0A0565787030321203312E30 " +"2019-09-24 00:27:04.604 UTC [msp.identity] Sign -> DEBU 5d72 Sign: digest: D7769BF2CD78E41422E1483EE1C3F075AEABE38984003CA20CB8827213EDDFB2 " +"2019-09-24 00:27:04.604 UTC [gossip.state] commitBlock -> DEBU 5d73 [businesschannel] Committed block [5] with 1 transaction(s)" +"2019-09-24 00:27:04.602 UTC [gossip.comm] sendToEndpoint -> DEBU 5d6e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.604 UTC [gossip.comm] sendToEndpoint -> DEBU 5d74 Exiting" +"2019-09-24 00:27:04.768 UTC [gossip.comm] func1 -> DEBU 5d75 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.768 UTC [gossip.gossip] handleMessage -> DEBU 5d76 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.768 UTC [gossip.gossip] handleMessage -> DEBU 5d77 Exiting" +"2019-09-24 00:27:04.768 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5d78 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.769 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5d79 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:04.769 UTC [msp] DeserializeIdentity -> DEBU 5d7a Obtaining identity" +"2019-09-24 00:27:04.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5d7b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:04.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5d7c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5d7d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.769 UTC [policies] Evaluate -> DEBU 5d7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.769 UTC [policies] Evaluate -> DEBU 5d7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.769 UTC [policies] Evaluate -> DEBU 5d80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.770 UTC [cauthdsl] func1 -> DEBU 5d81 0xc0041002b0 gate 1569284824770088600 evaluation starts" +"2019-09-24 00:27:04.770 UTC [cauthdsl] func2 -> DEBU 5d82 0xc0041002b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.770 UTC [cauthdsl] func2 -> DEBU 5d83 0xc0041002b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.770 UTC [cauthdsl] func2 -> DEBU 5d84 0xc0041002b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:04.771 UTC [cauthdsl] func2 -> DEBU 5d85 0xc0041002b0 principal evaluation fails" +"2019-09-24 00:27:04.771 UTC [cauthdsl] func1 -> DEBU 5d86 0xc0041002b0 gate 1569284824770088600 evaluation fails" +"2019-09-24 00:27:04.771 UTC [policies] Evaluate -> DEBU 5d87 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.771 UTC [policies] Evaluate -> DEBU 5d88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.771 UTC [policies] Evaluate -> DEBU 5d89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:04.771 UTC [cauthdsl] func1 -> DEBU 5d8a 0xc004100af0 gate 1569284824771587400 evaluation starts" +"2019-09-24 00:27:04.771 UTC [cauthdsl] func2 -> DEBU 5d8b 0xc004100af0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.772 UTC [cauthdsl] func2 -> DEBU 5d8c 0xc004100af0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.772 UTC [cauthdsl] func2 -> DEBU 5d8d 0xc004100af0 principal matched by identity 0" +"2019-09-24 00:27:04.772 UTC [msp.identity] Verify -> DEBU 5d8e Verify: digest = 00000000 a9 25 c4 e0 3b 99 2c 11 f0 33 72 f3 49 a6 0c ee |.%..;.,..3r.I...| +00000010 3c 6f 30 32 48 c3 a4 dc c5 63 30 bf 0c bb 09 9a | DEBU 5d8f Verify: sig = 00000000 30 44 02 20 37 f6 71 11 70 ac 50 7b 4c 64 f9 15 |0D. 7.q.p.P{Ld..| +00000010 6e 2a 4b 40 f4 ce fc d7 2d 30 5f c2 b9 92 22 bc |n*K@....-0_...".| +00000020 c1 2f 02 94 02 20 62 17 6a d3 12 7a 20 69 e3 75 |./... b.j..z i.u| +00000030 74 f7 48 b1 09 31 af d3 c3 7f 86 00 19 37 a8 14 |t.H..1.......7..| +00000040 b3 a0 35 47 5e 7e |..5G^~|" +"2019-09-24 00:27:04.773 UTC [cauthdsl] func2 -> DEBU 5d90 0xc004100af0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.773 UTC [cauthdsl] func1 -> DEBU 5d91 0xc004100af0 gate 1569284824771587400 evaluation succeeds" +"2019-09-24 00:27:04.773 UTC [policies] Evaluate -> DEBU 5d92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.773 UTC [policies] Evaluate -> DEBU 5d93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.773 UTC [policies] Evaluate -> DEBU 5d94 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.773 UTC [policies] Evaluate -> DEBU 5d95 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.773 UTC [gossip.discovery] handleAliveMessage -> DEBU 5d96 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:04.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5d97 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:04.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5d98 updating membership: timestamp: " +"2019-09-24 00:27:04.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5d99 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:04.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5d9a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:04.774 UTC [gossip.discovery] learnExistingMembers -> DEBU 5d9b Exiting" +"2019-09-24 00:27:04.774 UTC [gossip.discovery] handleAliveMessage -> DEBU 5d9c Exiting" +"2019-09-24 00:27:04.774 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5d9d Exiting" +"2019-09-24 00:27:04.775 UTC [gossip.discovery] sendMemResponse -> DEBU 5d9e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:27:04.775 UTC [msp] DeserializeIdentity -> DEBU 5d9f Obtaining identity" +"2019-09-24 00:27:04.776 UTC [msp] DeserializeIdentity -> DEBU 5da0 Obtaining identity" +"2019-09-24 00:27:04.776 UTC [msp] DeserializeIdentity -> DEBU 5da1 Obtaining identity" +"2019-09-24 00:27:04.776 UTC [gossip.comm] Send -> DEBU 5da2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:04.778 UTC [gossip.discovery] sendMemResponse -> DEBU 5da3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020N" signature:"0D\002 x\330\001\204\035\037\006j\025\227\264\226TI\220\032=\307g>\2145\007\227\365\340j/\312A\307\264\002 m\3139Uo\233\246Zv\276\334\242Z\033\320U\251cZ\226KK\264\214\2057z}\363\211\2003" > alive: alive: alive: " +"2019-09-24 00:27:04.778 UTC [gossip.comm] sendToEndpoint -> DEBU 5da4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.778 UTC [gossip.comm] sendToEndpoint -> DEBU 5da5 Exiting" +"2019-09-24 00:27:04.817 UTC [gossip.comm] func1 -> DEBU 5da6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.819 UTC [gossip.gossip] handleMessage -> DEBU 5da7 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.819 UTC [gossip.pull] HandleMessage -> DEBU 5da8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.820 UTC [msp] DeserializeIdentity -> DEBU 5da9 Obtaining identity" +"2019-09-24 00:27:04.820 UTC [msp] DeserializeIdentity -> DEBU 5daa Obtaining identity" +"2019-09-24 00:27:04.820 UTC [msp] DeserializeIdentity -> DEBU 5dab Obtaining identity" +"2019-09-24 00:27:04.821 UTC [msp] DeserializeIdentity -> DEBU 5dac Obtaining identity" +"2019-09-24 00:27:04.821 UTC [msp] DeserializeIdentity -> DEBU 5dad Obtaining identity" +"2019-09-24 00:27:04.821 UTC [msp] DeserializeIdentity -> DEBU 5dae Obtaining identity" +"2019-09-24 00:27:04.822 UTC [gossip.pull] SendDigest -> DEBU 5daf Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:27:04.822 UTC [gossip.gossip] handleMessage -> DEBU 5db0 Exiting" +"2019-09-24 00:27:04.838 UTC [gossip.comm] func1 -> DEBU 5db1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.838 UTC [gossip.gossip] handleMessage -> DEBU 5db2 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.838 UTC [gossip.pull] HandleMessage -> DEBU 5db3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:04.839 UTC [gossip.pull] SendDigest -> DEBU 5db4 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:04.839 UTC [gossip.gossip] handleMessage -> DEBU 5db5 Exiting" +"2019-09-24 00:27:04.898 UTC [endorser] ProcessProposal -> DEBU 5db6 Entering: request from 172.18.0.9:51006" +"2019-09-24 00:27:04.898 UTC [protoutils] ValidateProposalMessage -> DEBU 5db7 ValidateProposalMessage starts for signed proposal 0xc0038a2730" +"2019-09-24 00:27:04.898 UTC [protoutils] validateChannelHeader -> DEBU 5db8 validateChannelHeader info: header type 3" +"2019-09-24 00:27:04.899 UTC [protoutils] checkSignatureFromCreator -> DEBU 5db9 begin" +"2019-09-24 00:27:04.899 UTC [msp] GetManagerForChain -> DEBU 5dba Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:04.899 UTC [protoutils] checkSignatureFromCreator -> DEBU 5dbb creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:04.899 UTC [protoutils] checkSignatureFromCreator -> DEBU 5dbc creator is valid" +"2019-09-24 00:27:04.900 UTC [msp.identity] Verify -> DEBU 5dbd Verify: digest = 00000000 25 23 13 4c 9f f3 dc 59 34 a3 4f 64 8e 43 e6 59 |%#.L...Y4.Od.C.Y| +00000010 45 a1 7b 15 2d c6 44 af 16 4b e2 98 f3 3f ec ed |E.{.-.D..K...?..|" +"2019-09-24 00:27:04.900 UTC [msp.identity] Verify -> DEBU 5dbe Verify: sig = 00000000 30 45 02 21 00 d8 99 38 ea 22 5d 19 23 f5 88 58 |0E.!...8."].#..X| +00000010 46 2d 92 8b 9e f6 55 48 cf 98 23 55 08 c6 68 14 |F-....UH..#U..h.| +00000020 37 f6 f5 8e 4f 02 20 25 e3 56 0a 93 1b 03 03 5d |7...O. %.V.....]| +00000030 61 ed 8e 84 b2 2b 79 a8 cc 16 35 de 0e 95 c0 36 |a....+y...5....6| +00000040 a6 3c 0d 8b b9 86 9a |.<.....|" +"2019-09-24 00:27:04.900 UTC [protoutils] checkSignatureFromCreator -> DEBU 5dbf exits successfully" +"2019-09-24 00:27:04.901 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5dc0 validateChaincodeProposalMessage starts for proposal 0xc002b3d570, header 0xc0038a2b90" +"2019-09-24 00:27:04.901 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5dc1 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 00:27:04.901 UTC [endorser] preProcess -> DEBU 5dc2 [businesschannel][0c3f7bfd] processing txid: 0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60" +"2019-09-24 00:27:04.901 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5dc3 retrieveTransactionByID() - txId = [0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60]" +"2019-09-24 00:27:04.901 UTC [aclmgmt] CheckACL -> DEBU 5dc4 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 00:27:04.902 UTC [aclmgmt] CheckACL -> DEBU 5dc5 acl check(/Channel/Application/Writers)" +"2019-09-24 00:27:04.902 UTC [policies] Evaluate -> DEBU 5dc6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 00:27:04.902 UTC [policies] Evaluate -> DEBU 5dc7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.902 UTC [policies] Evaluate -> DEBU 5dc8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 00:27:04.903 UTC [cauthdsl] func1 -> DEBU 5dc9 0xc002982e10 gate 1569284824903270500 evaluation starts" +"2019-09-24 00:27:04.903 UTC [cauthdsl] func2 -> DEBU 5dca 0xc002982e10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.904 UTC [cauthdsl] func2 -> DEBU 5dcb 0xc002982e10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.904 UTC [cauthdsl] func2 -> DEBU 5dcc 0xc002982e10 principal matched by identity 0" +"2019-09-24 00:27:04.904 UTC [msp.identity] Verify -> DEBU 5dcd Verify: digest = 00000000 25 23 13 4c 9f f3 dc 59 34 a3 4f 64 8e 43 e6 59 |%#.L...Y4.Od.C.Y| +00000010 45 a1 7b 15 2d c6 44 af 16 4b e2 98 f3 3f ec ed |E.{.-.D..K...?..|" +"2019-09-24 00:27:04.904 UTC [msp.identity] Verify -> DEBU 5dce Verify: sig = 00000000 30 45 02 21 00 d8 99 38 ea 22 5d 19 23 f5 88 58 |0E.!...8."].#..X| +00000010 46 2d 92 8b 9e f6 55 48 cf 98 23 55 08 c6 68 14 |F-....UH..#U..h.| +00000020 37 f6 f5 8e 4f 02 20 25 e3 56 0a 93 1b 03 03 5d |7...O. %.V.....]| +00000030 61 ed 8e 84 b2 2b 79 a8 cc 16 35 de 0e 95 c0 36 |a....+y...5....6| +00000040 a6 3c 0d 8b b9 86 9a |.<.....|" +"2019-09-24 00:27:04.905 UTC [cauthdsl] func2 -> DEBU 5dcf 0xc002982e10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.905 UTC [cauthdsl] func1 -> DEBU 5dd0 0xc002982e10 gate 1569284824903270500 evaluation succeeds" +"2019-09-24 00:27:04.905 UTC [policies] Evaluate -> DEBU 5dd1 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:04.905 UTC [policies] Evaluate -> DEBU 5dd2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:04.906 UTC [policies] Evaluate -> DEBU 5dd3 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 00:27:04.906 UTC [policies] Evaluate -> DEBU 5dd4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 00:27:04.906 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5dd5 constructing new tx simulator" +"2019-09-24 00:27:04.906 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5dd6 constructing new tx simulator txid = [0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60]" +"2019-09-24 00:27:04.907 UTC [endorser] SimulateProposal -> DEBU 5dd7 [businesschannel][0c3f7bfd] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:04.907 UTC [stateleveldb] GetState -> DEBU 5dd8 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:04.907 UTC [ccprovider] GetChaincodeData -> DEBU 5dd9 Getting chaincode data for from cache" +"2019-09-24 00:27:04.907 UTC [endorser] callChaincode -> INFO 5dda [businesschannel][0c3f7bfd] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:04.907 UTC [chaincode] Execute -> DEBU 5ddb Entry" +"2019-09-24 00:27:04.908 UTC [chaincode] handleMessage -> DEBU 5ddc [0c3f7bfd] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:27:04.908 UTC [chaincode] HandleTransaction -> DEBU 5ddd [0c3f7bfd] handling GET_STATE from chaincode" +"2019-09-24 00:27:04.909 UTC [chaincode] HandleGetState -> DEBU 5dde [0c3f7bfd] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 00:27:04.909 UTC [stateleveldb] GetState -> DEBU 5ddf GetState(). ns=exp02, key=a" +"2019-09-24 00:27:04.909 UTC [chaincode] HandleTransaction -> DEBU 5de0 [0c3f7bfd] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:27:04.910 UTC [chaincode] handleMessage -> DEBU 5de1 [0c3f7bfd] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:04.910 UTC [chaincode] Notify -> DEBU 5de2 [0c3f7bfd] notifying Txid:0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60, channelID:businesschannel" +"2019-09-24 00:27:04.910 UTC [chaincode] Execute -> DEBU 5de3 Exit" +"2019-09-24 00:27:04.910 UTC [endorser] callChaincode -> INFO 5de4 [businesschannel][0c3f7bfd] Exit chaincode: name:"exp02" (3ms)" +"2019-09-24 00:27:04.910 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5de5 Simulation completed, getting simulation results" +"2019-09-24 00:27:04.910 UTC [lockbasedtxmgr] Done -> DEBU 5de6 Done with transaction simulation / query execution [0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60]" +"2019-09-24 00:27:04.910 UTC [endorser] SimulateProposal -> DEBU 5de7 [businesschannel][0c3f7bfd] Exit" +"2019-09-24 00:27:04.910 UTC [endorser] endorseProposal -> DEBU 5de8 [businesschannel][0c3f7bfd] Entry chaincode: name:"exp02" " +"2019-09-24 00:27:04.910 UTC [endorser] endorseProposal -> DEBU 5de9 [businesschannel][0c3f7bfd] escc for chaincode name:"exp02" is escc" +"2019-09-24 00:27:04.910 UTC [endorser] EndorseWithPlugin -> DEBU 5dea Entering endorsement for {plugin: escc, channel: businesschannel, tx: 0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60, chaincode: exp02}" +"2019-09-24 00:27:04.910 UTC [msp.identity] Sign -> DEBU 5deb Sign: plaintext: 0A20356A3CDA5ACE4CE4C843D25A9A61...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:04.910 UTC [msp.identity] Sign -> DEBU 5dec Sign: digest: 542DD5B78BBEF575D8A8C25452FB346EA8CF7B5B5FA8265B7A185B955AF95B5C " +"2019-09-24 00:27:04.910 UTC [endorser] EndorseWithPlugin -> DEBU 5ded Exiting {plugin: escc, channel: businesschannel, tx: 0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60, chaincode: exp02}" +"2019-09-24 00:27:04.910 UTC [endorser] endorseProposal -> DEBU 5dee [businesschannel][0c3f7bfd] Exit" +"2019-09-24 00:27:04.910 UTC [lockbasedtxmgr] Done -> DEBU 5def Done with transaction simulation / query execution [0c3f7bfd08e915ea88efe9ef075fa188909aef8f55a0e3d3fe7ee31ddffc5f60]" +"2019-09-24 00:27:04.910 UTC [endorser] func1 -> DEBU 5df0 Exit: request from 172.18.0.9:51006" +"2019-09-24 00:27:04.910 UTC [comm.grpc.server] 1 -> INFO 5df1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51006 grpc.code=OK grpc.call_duration=12.7369ms +"2019-09-24 00:27:04.913 UTC [grpc] infof -> DEBU 5df2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:04.914 UTC [grpc] infof -> DEBU 5df3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:04.947 UTC [gossip.gossip] handleMessage -> DEBU 5df4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.947 UTC [gossip.gossip] handleMessage -> DEBU 5df5 Exiting" +"2019-09-24 00:27:04.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5df6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5df7 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:04.947 UTC [msp] DeserializeIdentity -> DEBU 5df8 Obtaining identity" +"2019-09-24 00:27:04.947 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5df9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:04.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5dfa Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5dfb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:04.947 UTC [policies] Evaluate -> DEBU 5dfc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:04.947 UTC [policies] Evaluate -> DEBU 5dfd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:04.947 UTC [policies] Evaluate -> DEBU 5dfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:04.947 UTC [cauthdsl] func1 -> DEBU 5dff 0xc002acb640 gate 1569284824947969500 evaluation starts" +"2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e00 0xc002acb640 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e01 0xc002acb640 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e02 0xc002acb640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e03 0xc002acb640 principal evaluation fails" +"2019-09-24 00:27:04.948 UTC [cauthdsl] func1 -> DEBU 5e04 0xc002acb640 gate 1569284824947969500 evaluation fails" +"2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:04.948 UTC [cauthdsl] func1 -> DEBU 5e08 0xc002acbe80 gate 1569284824948356600 evaluation starts" +"2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e09 0xc002acbe80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e0a 0xc002acbe80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e0b 0xc002acbe80 principal matched by identity 0" +"2019-09-24 00:27:04.948 UTC [msp.identity] Verify -> DEBU 5e0c Verify: digest = 00000000 ea bd e0 80 51 e5 e0 b6 b1 7b 05 73 b7 09 90 73 |....Q....{.s...s| +00000010 f6 b0 b0 92 5f 1b 11 e9 52 d9 5a 74 29 3c f8 fe |...._...R.Zt)<..|" +"2019-09-24 00:27:04.948 UTC [msp.identity] Verify -> DEBU 5e0d Verify: sig = 00000000 30 45 02 21 00 ff 6c fe 98 22 8e 96 e0 a8 91 93 |0E.!..l.."......| +00000010 2f 4a 7b 57 49 a0 ae 6b 6a 27 6e 67 f4 aa b9 44 |/J{WI..kj'ng...D| +00000020 13 72 8e 95 90 02 20 19 62 6c c5 54 03 02 eb 3a |.r.... .bl.T...:| +00000030 46 72 f6 fc 4a 9a e2 8c d3 5a 2b 52 8d 2e 6b cf |Fr..J....Z+R..k.| +00000040 74 f2 5b c1 b4 90 96 |t.[....|" +"2019-09-24 00:27:04.948 UTC [cauthdsl] func2 -> DEBU 5e0e 0xc002acbe80 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:04.948 UTC [cauthdsl] func1 -> DEBU 5e0f 0xc002acbe80 gate 1569284824948356600 evaluation succeeds" +"2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e12 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:04.948 UTC [policies] Evaluate -> DEBU 5e13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:04.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 5e14 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 5e15 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:04.951 UTC [gossip.discovery] learnExistingMembers -> DEBU 5e16 updating membership: timestamp: " +"2019-09-24 00:27:04.951 UTC [gossip.discovery] learnExistingMembers -> DEBU 5e17 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:04.952 UTC [gossip.discovery] learnExistingMembers -> DEBU 5e18 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:04.952 UTC [gossip.discovery] learnExistingMembers -> DEBU 5e19 Exiting" +"2019-09-24 00:27:04.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 5e1a Exiting" +"2019-09-24 00:27:04.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e1b Exiting" +"2019-09-24 00:27:04.954 UTC [gossip.comm] func1 -> DEBU 5e1c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.954 UTC [gossip.gossip] handleMessage -> DEBU 5e1d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.954 UTC [gossip.gossip] handleMessage -> DEBU 5e1e Exiting" +"2019-09-24 00:27:04.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e1f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e20 Exiting" +"2019-09-24 00:27:04.957 UTC [gossip.comm] func1 -> DEBU 5e21 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.957 UTC [gossip.gossip] handleMessage -> DEBU 5e22 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.957 UTC [gossip.gossip] handleMessage -> DEBU 5e23 Exiting" +"2019-09-24 00:27:04.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e24 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e25 Exiting" +"2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e26 Obtaining identity" +"2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e27 Obtaining identity" +"2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e28 Obtaining identity" +"2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e29 Obtaining identity" +"2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e2a Obtaining identity" +"2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e2b Obtaining identity" +"2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e2c Obtaining identity" +"2019-09-24 00:27:04.960 UTC [gossip.comm] Send -> DEBU 5e2d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:04.960 UTC [msp] DeserializeIdentity -> DEBU 5e2e Obtaining identity" +"2019-09-24 00:27:04.960 UTC [gossip.comm] Send -> DEBU 5e2f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:04.961 UTC [gossip.comm] sendToEndpoint -> DEBU 5e30 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.961 UTC [gossip.comm] sendToEndpoint -> DEBU 5e31 Exiting" +"2019-09-24 00:27:04.961 UTC [gossip.comm] sendToEndpoint -> DEBU 5e32 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:04.961 UTC [gossip.comm] sendToEndpoint -> DEBU 5e33 Exiting" +"2019-09-24 00:27:05.080 UTC [gossip.gossip] handleMessage -> DEBU 5e34 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:05.080 UTC [msp] DeserializeIdentity -> DEBU 5e35 Obtaining identity" +"2019-09-24 00:27:05.080 UTC [msp] DeserializeIdentity -> DEBU 5e36 Obtaining identity" +"2019-09-24 00:27:05.080 UTC [msp] DeserializeIdentity -> DEBU 5e37 Obtaining identity" +"2019-09-24 00:27:05.081 UTC [gossip.gossip] handleMessage -> DEBU 5e38 Exiting" +"2019-09-24 00:27:05.081 UTC [gossip.gossip] handleMessage -> DEBU 5e39 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.081 UTC [msp] DeserializeIdentity -> DEBU 5e3a Obtaining identity" +"2019-09-24 00:27:05.081 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5e3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:05.081 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e3c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:05.081 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e3d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:05.081 UTC [cauthdsl] func1 -> DEBU 5e41 0xc003738710 gate 1569284825081538200 evaluation starts" +"2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e42 0xc003738710 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e43 0xc003738710 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e44 0xc003738710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e45 0xc003738710 principal evaluation fails" +"2019-09-24 00:27:05.081 UTC [cauthdsl] func1 -> DEBU 5e46 0xc003738710 gate 1569284825081538200 evaluation fails" +"2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.081 UTC [policies] Evaluate -> DEBU 5e49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:05.081 UTC [cauthdsl] func1 -> DEBU 5e4a 0xc003738f50 gate 1569284825081864200 evaluation starts" +"2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e4b 0xc003738f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.081 UTC [cauthdsl] func2 -> DEBU 5e4c 0xc003738f50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e4d 0xc003738f50 principal matched by identity 0" +"2019-09-24 00:27:05.082 UTC [msp.identity] Verify -> DEBU 5e4e Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:05.082 UTC [msp.identity] Verify -> DEBU 5e4f Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e50 0xc003738f50 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:05.082 UTC [cauthdsl] func1 -> DEBU 5e51 0xc003738f50 gate 1569284825081864200 evaluation succeeds" +"2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e52 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e55 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:05.082 UTC [gossip.comm] func1 -> DEBU 5e54 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e56 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:05.082 UTC [msp] DeserializeIdentity -> DEBU 5e57 Obtaining identity" +"2019-09-24 00:27:05.082 UTC [msp] DeserializeIdentity -> DEBU 5e58 Obtaining identity" +"2019-09-24 00:27:05.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e59 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:05.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e5a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e5c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:05.082 UTC [cauthdsl] func1 -> DEBU 5e5e 0xc003bda130 gate 1569284825082786800 evaluation starts" +"2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e5f 0xc003bda130 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e60 0xc003bda130 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e61 0xc003bda130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:05.082 UTC [cauthdsl] func2 -> DEBU 5e62 0xc003bda130 principal evaluation fails" +"2019-09-24 00:27:05.082 UTC [cauthdsl] func1 -> DEBU 5e63 0xc003bda130 gate 1569284825082786800 evaluation fails" +"2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e64 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.082 UTC [policies] Evaluate -> DEBU 5e65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:05.083 UTC [cauthdsl] func1 -> DEBU 5e67 0xc003bda970 gate 1569284825083028600 evaluation starts" +"2019-09-24 00:27:05.083 UTC [cauthdsl] func2 -> DEBU 5e68 0xc003bda970 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.083 UTC [cauthdsl] func2 -> DEBU 5e69 0xc003bda970 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.083 UTC [cauthdsl] func2 -> DEBU 5e6a 0xc003bda970 principal matched by identity 0" +"2019-09-24 00:27:05.083 UTC [msp.identity] Verify -> DEBU 5e6b Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:05.083 UTC [msp.identity] Verify -> DEBU 5e6c Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:05.083 UTC [cauthdsl] func2 -> DEBU 5e6d 0xc003bda970 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:05.083 UTC [cauthdsl] func1 -> DEBU 5e6e 0xc003bda970 gate 1569284825083028600 evaluation succeeds" +"2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e6f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e71 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e72 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:05.083 UTC [gossip.gossip] handleMessage -> DEBU 5e73 Exiting" +"2019-09-24 00:27:05.083 UTC [gossip.gossip] handleMessage -> DEBU 5e74 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.083 UTC [msp] DeserializeIdentity -> DEBU 5e75 Obtaining identity" +"2019-09-24 00:27:05.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5e76 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:05.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e77 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:05.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e78 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e79 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e7a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:05.083 UTC [policies] Evaluate -> DEBU 5e7b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:05.083 UTC [cauthdsl] func1 -> DEBU 5e7c 0xc003e9c240 gate 1569284825083865900 evaluation starts" +"2019-09-24 00:27:05.084 UTC [cauthdsl] func2 -> DEBU 5e7d 0xc003e9c240 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.084 UTC [cauthdsl] func2 -> DEBU 5e7e 0xc003e9c240 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.084 UTC [cauthdsl] func2 -> DEBU 5e7f 0xc003e9c240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:05.084 UTC [cauthdsl] func2 -> DEBU 5e80 0xc003e9c240 principal evaluation fails" +"2019-09-24 00:27:05.084 UTC [cauthdsl] func1 -> DEBU 5e81 0xc003e9c240 gate 1569284825083865900 evaluation fails" +"2019-09-24 00:27:05.084 UTC [policies] Evaluate -> DEBU 5e82 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.084 UTC [policies] Evaluate -> DEBU 5e83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.085 UTC [policies] Evaluate -> DEBU 5e84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:05.085 UTC [cauthdsl] func1 -> DEBU 5e85 0xc003e9ca80 gate 1569284825085256700 evaluation starts" +"2019-09-24 00:27:05.085 UTC [cauthdsl] func2 -> DEBU 5e86 0xc003e9ca80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.085 UTC [cauthdsl] func2 -> DEBU 5e87 0xc003e9ca80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.085 UTC [cauthdsl] func2 -> DEBU 5e88 0xc003e9ca80 principal matched by identity 0" +"2019-09-24 00:27:05.085 UTC [msp.identity] Verify -> DEBU 5e89 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:05.085 UTC [msp.identity] Verify -> DEBU 5e8a Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:05.086 UTC [cauthdsl] func2 -> DEBU 5e8b 0xc003e9ca80 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:05.088 UTC [cauthdsl] func1 -> DEBU 5e8c 0xc003e9ca80 gate 1569284825085256700 evaluation succeeds" +"2019-09-24 00:27:05.089 UTC [policies] Evaluate -> DEBU 5e8d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:05.089 UTC [policies] Evaluate -> DEBU 5e8e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:05.089 UTC [policies] Evaluate -> DEBU 5e8f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:05.090 UTC [policies] Evaluate -> DEBU 5e90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:05.090 UTC [gossip.gossip] handleMessage -> DEBU 5e91 Exiting" +"2019-09-24 00:27:05.093 UTC [msp] DeserializeIdentity -> DEBU 5e92 Obtaining identity" +"2019-09-24 00:27:05.094 UTC [msp] DeserializeIdentity -> DEBU 5e93 Obtaining identity" +"2019-09-24 00:27:05.096 UTC [gossip.comm] func1 -> DEBU 5e94 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.097 UTC [gossip.gossip] handleMessage -> DEBU 5e95 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.097 UTC [msp] DeserializeIdentity -> DEBU 5e96 Obtaining identity" +"2019-09-24 00:27:05.095 UTC [gossip.comm] Send -> DEBU 5e97 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers" +"2019-09-24 00:27:05.097 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5e98 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:05.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e99 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:05.097 UTC [msp] DeserializeIdentity -> DEBU 5e9a Obtaining identity" +"2019-09-24 00:27:05.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5e9b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:05.097 UTC [policies] Evaluate -> DEBU 5e9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:05.097 UTC [msp] DeserializeIdentity -> DEBU 5e9d Obtaining identity" +"2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5e9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func1 -> DEBU 5ea0 0xc00473a300 gate 1569284825098063900 evaluation starts" +"2019-09-24 00:27:05.098 UTC [gossip.comm] sendToEndpoint -> DEBU 5ea1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5ea2 0xc00473a300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.098 UTC [gossip.comm] sendToEndpoint -> DEBU 5ea3 Exiting" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5ea4 0xc00473a300 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5ea5 0xc00473a300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5ea6 0xc00473a300 principal evaluation fails" +"2019-09-24 00:27:05.098 UTC [gossip.comm] sendToEndpoint -> DEBU 5ea7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func1 -> DEBU 5ea8 0xc00473a300 gate 1569284825098063900 evaluation fails" +"2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5ea9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.098 UTC [gossip.comm] sendToEndpoint -> DEBU 5eaa Exiting" +"2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func1 -> DEBU 5ead 0xc00473ab40 gate 1569284825098308400 evaluation starts" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5eae 0xc00473ab40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5eaf 0xc00473ab40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5eb0 0xc00473ab40 principal matched by identity 0" +"2019-09-24 00:27:05.098 UTC [msp.identity] Verify -> DEBU 5eb1 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:05.098 UTC [msp.identity] Verify -> DEBU 5eb2 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func2 -> DEBU 5eb3 0xc00473ab40 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:05.098 UTC [cauthdsl] func1 -> DEBU 5eb4 0xc00473ab40 gate 1569284825098308400 evaluation succeeds" +"2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eb5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eb7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:05.098 UTC [policies] Evaluate -> DEBU 5eb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:05.098 UTC [msp] DeserializeIdentity -> DEBU 5eb9 Obtaining identity" +"2019-09-24 00:27:05.098 UTC [gossip.gossip] handleMessage -> DEBU 5eba Exiting" +"2019-09-24 00:27:05.347 UTC [endorser] ProcessProposal -> DEBU 5ebb Entering: request from 172.18.0.9:51010" +"2019-09-24 00:27:05.347 UTC [protoutils] ValidateProposalMessage -> DEBU 5ebc ValidateProposalMessage starts for signed proposal 0xc003a2c0f0" +"2019-09-24 00:27:05.348 UTC [protoutils] validateChannelHeader -> DEBU 5ebd validateChannelHeader info: header type 3" +"2019-09-24 00:27:05.352 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ebe begin" +"2019-09-24 00:27:05.352 UTC [msp] GetManagerForChain -> DEBU 5ebf Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:05.352 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ec0 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:05.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ec1 creator is valid" +"2019-09-24 00:27:05.353 UTC [msp.identity] Verify -> DEBU 5ec2 Verify: digest = 00000000 12 ef 31 0a bd f0 df 09 a3 ed 3d 0c 86 00 74 8b |..1.......=...t.| +00000010 f8 cb 44 27 54 4e 7a 24 80 d1 1e 23 78 e9 4d 7e |..D'TNz$...#x.M~|" +"2019-09-24 00:27:05.353 UTC [msp.identity] Verify -> DEBU 5ec3 Verify: sig = 00000000 30 44 02 20 70 71 0c a6 fe a3 78 83 02 8f 6e aa |0D. pq....x...n.| +00000010 bd fb ed de e8 ff c4 f1 4b 2b cd 9c 1f 55 a8 c4 |........K+...U..| +00000020 eb 50 3c b6 02 20 19 c2 f0 57 83 b6 58 cb 2d 5b |.P<.. ...W..X.-[| +00000030 ec b1 75 71 4b 9f 55 30 e3 b3 d5 5f 11 78 29 f3 |..uqK.U0..._.x).| +00000040 2f c8 ec a0 77 f9 |/...w.|" +"2019-09-24 00:27:05.354 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ec4 exits successfully" +"2019-09-24 00:27:05.354 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5ec5 validateChaincodeProposalMessage starts for proposal 0xc002c1dea0, header 0xc003a2c500" +"2019-09-24 00:27:05.354 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5ec6 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 00:27:05.355 UTC [endorser] preProcess -> DEBU 5ec7 [businesschannel][8a1d5010] processing txid: 8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08" +"2019-09-24 00:27:05.355 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5ec8 retrieveTransactionByID() - txId = [8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08]" +"2019-09-24 00:27:05.356 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5ec9 constructing new tx simulator" +"2019-09-24 00:27:05.356 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5eca constructing new tx simulator txid = [8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08]" +"2019-09-24 00:27:05.357 UTC [endorser] SimulateProposal -> DEBU 5ecb [businesschannel][8a1d5010] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.357 UTC [endorser] callChaincode -> INFO 5ecc [businesschannel][8a1d5010] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.357 UTC [chaincode] Execute -> DEBU 5ecd Entry" +"2019-09-24 00:27:05.358 UTC [aclmgmt] CheckACL -> DEBU 5ece acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists" +"2019-09-24 00:27:05.358 UTC [aclmgmt] CheckACL -> DEBU 5ecf acl check(/Channel/Application/Readers)" +"2019-09-24 00:27:05.358 UTC [policies] Evaluate -> DEBU 5ed0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:05.359 UTC [policies] Evaluate -> DEBU 5ed1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:05.359 UTC [policies] Evaluate -> DEBU 5ed2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:05.359 UTC [cauthdsl] func1 -> DEBU 5ed3 0xc003977730 gate 1569284825359567300 evaluation starts" +"2019-09-24 00:27:05.359 UTC [cauthdsl] func2 -> DEBU 5ed4 0xc003977730 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.360 UTC [cauthdsl] func2 -> DEBU 5ed5 0xc003977730 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.360 UTC [cauthdsl] func2 -> DEBU 5ed6 0xc003977730 principal matched by identity 0" +"2019-09-24 00:27:05.360 UTC [msp.identity] Verify -> DEBU 5ed7 Verify: digest = 00000000 12 ef 31 0a bd f0 df 09 a3 ed 3d 0c 86 00 74 8b |..1.......=...t.| +00000010 f8 cb 44 27 54 4e 7a 24 80 d1 1e 23 78 e9 4d 7e |..D'TNz$...#x.M~|" +"2019-09-24 00:27:05.360 UTC [msp.identity] Verify -> DEBU 5ed8 Verify: sig = 00000000 30 44 02 20 70 71 0c a6 fe a3 78 83 02 8f 6e aa |0D. pq....x...n.| +00000010 bd fb ed de e8 ff c4 f1 4b 2b cd 9c 1f 55 a8 c4 |........K+...U..| +00000020 eb 50 3c b6 02 20 19 c2 f0 57 83 b6 58 cb 2d 5b |.P<.. ...W..X.-[| +00000030 ec b1 75 71 4b 9f 55 30 e3 b3 d5 5f 11 78 29 f3 |..uqK.U0..._.x).| +00000040 2f c8 ec a0 77 f9 |/...w.|" +"2019-09-24 00:27:05.361 UTC [cauthdsl] func2 -> DEBU 5ed9 0xc003977730 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:05.361 UTC [cauthdsl] func1 -> DEBU 5eda 0xc003977730 gate 1569284825359567300 evaluation succeeds" +"2019-09-24 00:27:05.361 UTC [policies] Evaluate -> DEBU 5edb Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.361 UTC [policies] Evaluate -> DEBU 5edc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.362 UTC [policies] Evaluate -> DEBU 5edd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:05.362 UTC [policies] Evaluate -> DEBU 5ede == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:05.362 UTC [chaincode] handleMessage -> DEBU 5edf [8a1d5010] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:27:05.362 UTC [chaincode] HandleTransaction -> DEBU 5ee0 [8a1d5010] handling GET_STATE from chaincode" +"2019-09-24 00:27:05.363 UTC [chaincode] HandleGetState -> DEBU 5ee1 [8a1d5010] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-09-24 00:27:05.363 UTC [stateleveldb] GetState -> DEBU 5ee2 GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:05.363 UTC [chaincode] HandleTransaction -> DEBU 5ee3 [8a1d5010] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:27:05.363 UTC [chaincode] handleMessage -> DEBU 5ee4 [8a1d5010] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:05.363 UTC [chaincode] Notify -> DEBU 5ee5 [8a1d5010] notifying Txid:8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08, channelID:businesschannel" +"2019-09-24 00:27:05.364 UTC [chaincode] Execute -> DEBU 5ee6 Exit" +"2019-09-24 00:27:05.364 UTC [endorser] callChaincode -> INFO 5ee7 [businesschannel][8a1d5010] Exit chaincode: name:"lscc" (7ms)" +"2019-09-24 00:27:05.364 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5ee8 Simulation completed, getting simulation results" +"2019-09-24 00:27:05.364 UTC [lockbasedtxmgr] Done -> DEBU 5ee9 Done with transaction simulation / query execution [8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08]" +"2019-09-24 00:27:05.364 UTC [endorser] SimulateProposal -> DEBU 5eea [businesschannel][8a1d5010] Exit" +"2019-09-24 00:27:05.364 UTC [endorser] endorseProposal -> DEBU 5eeb [businesschannel][8a1d5010] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.364 UTC [endorser] endorseProposal -> DEBU 5eec [businesschannel][8a1d5010] escc for chaincode name:"lscc" is escc" +"2019-09-24 00:27:05.364 UTC [endorser] EndorseWithPlugin -> DEBU 5eed Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08, chaincode: lscc}" +"2019-09-24 00:27:05.364 UTC [msp.identity] Sign -> DEBU 5eee Sign: plaintext: 0A20E0C4A307CDF51704E9535E1EA0CF...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:05.364 UTC [msp.identity] Sign -> DEBU 5eef Sign: digest: 6BF0A2DE278161577A358F7C2155D228EEAEEB436520123D1B9D8FB0F9297045 " +"2019-09-24 00:27:05.364 UTC [endorser] EndorseWithPlugin -> DEBU 5ef0 Exiting {plugin: escc, channel: businesschannel, tx: 8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08, chaincode: lscc}" +"2019-09-24 00:27:05.364 UTC [endorser] endorseProposal -> DEBU 5ef1 [businesschannel][8a1d5010] Exit" +"2019-09-24 00:27:05.364 UTC [lockbasedtxmgr] Done -> DEBU 5ef2 Done with transaction simulation / query execution [8a1d50106bb8ac6350738a45f3fd7954796536999907cbd0d97e8aae7d020f08]" +"2019-09-24 00:27:05.364 UTC [endorser] func1 -> DEBU 5ef3 Exit: request from 172.18.0.9:51010" +"2019-09-24 00:27:05.364 UTC [comm.grpc.server] 1 -> INFO 5ef4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51010 grpc.code=OK grpc.call_duration=17.7159ms +"2019-09-24 00:27:05.368 UTC [grpc] infof -> DEBU 5ef5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:05.369 UTC [grpc] infof -> DEBU 5ef6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:05.497 UTC [endorser] ProcessProposal -> DEBU 5ef7 Entering: request from 172.18.0.9:51014" +"2019-09-24 00:27:05.497 UTC [protoutils] ValidateProposalMessage -> DEBU 5ef8 ValidateProposalMessage starts for signed proposal 0xc003a2cff0" +"2019-09-24 00:27:05.497 UTC [protoutils] validateChannelHeader -> DEBU 5ef9 validateChannelHeader info: header type 3" +"2019-09-24 00:27:05.498 UTC [protoutils] checkSignatureFromCreator -> DEBU 5efa begin" +"2019-09-24 00:27:05.498 UTC [msp] GetManagerForChain -> DEBU 5efb Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:05.498 UTC [protoutils] checkSignatureFromCreator -> DEBU 5efc creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:05.499 UTC [protoutils] checkSignatureFromCreator -> DEBU 5efd creator is valid" +"2019-09-24 00:27:05.499 UTC [msp.identity] Verify -> DEBU 5efe Verify: digest = 00000000 c5 52 14 68 37 fa 9c bb a2 ac 7e d4 aa 85 3a f3 |.R.h7.....~...:.| +00000010 7c 65 8c 87 50 db 08 45 96 df f7 05 1e 85 c1 c8 ||e..P..E........|" +"2019-09-24 00:27:05.499 UTC [msp.identity] Verify -> DEBU 5eff Verify: sig = 00000000 30 44 02 20 61 24 d2 8e 83 fd 2a de e2 1b 13 38 |0D. a$....*....8| +00000010 4a 4e 34 89 d5 06 91 78 ad 52 a1 dc 0a 9b a0 d1 |JN4....x.R......| +00000020 18 55 7c d0 02 20 1c 92 4c b0 60 6f f3 37 b2 4c |.U|.. ..L.`o.7.L| +00000030 5e 09 25 b0 26 ab 6b 5c 80 b4 54 5b cc 47 a6 68 |^.%.&.k\..T[.G.h| +00000040 50 10 62 f6 2d 97 |P.b.-.|" +"2019-09-24 00:27:05.500 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f00 exits successfully" +"2019-09-24 00:27:05.500 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5f01 validateChaincodeProposalMessage starts for proposal 0xc003142310, header 0xc003a2d400" +"2019-09-24 00:27:05.500 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5f02 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 00:27:05.501 UTC [endorser] preProcess -> DEBU 5f03 [businesschannel][77581583] processing txid: 77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f" +"2019-09-24 00:27:05.501 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5f04 retrieveTransactionByID() - txId = [77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f]" +"2019-09-24 00:27:05.501 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5f05 constructing new tx simulator" +"2019-09-24 00:27:05.502 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5f06 constructing new tx simulator txid = [77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f]" +"2019-09-24 00:27:05.502 UTC [endorser] SimulateProposal -> DEBU 5f07 [businesschannel][77581583] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.502 UTC [endorser] callChaincode -> INFO 5f08 [businesschannel][77581583] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.502 UTC [chaincode] Execute -> DEBU 5f09 Entry" +"2019-09-24 00:27:05.503 UTC [aclmgmt] CheckACL -> DEBU 5f0a acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec" +"2019-09-24 00:27:05.503 UTC [aclmgmt] CheckACL -> DEBU 5f0b acl check(/Channel/Application/Readers)" +"2019-09-24 00:27:05.503 UTC [policies] Evaluate -> DEBU 5f0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:05.503 UTC [policies] Evaluate -> DEBU 5f0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:05.504 UTC [policies] Evaluate -> DEBU 5f0e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:05.504 UTC [cauthdsl] func1 -> DEBU 5f0f 0xc00354a830 gate 1569284825504320400 evaluation starts" +"2019-09-24 00:27:05.504 UTC [cauthdsl] func2 -> DEBU 5f10 0xc00354a830 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.504 UTC [cauthdsl] func2 -> DEBU 5f11 0xc00354a830 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.504 UTC [cauthdsl] func2 -> DEBU 5f12 0xc00354a830 principal matched by identity 0" +"2019-09-24 00:27:05.505 UTC [msp.identity] Verify -> DEBU 5f13 Verify: digest = 00000000 c5 52 14 68 37 fa 9c bb a2 ac 7e d4 aa 85 3a f3 |.R.h7.....~...:.| +00000010 7c 65 8c 87 50 db 08 45 96 df f7 05 1e 85 c1 c8 ||e..P..E........|" +"2019-09-24 00:27:05.505 UTC [msp.identity] Verify -> DEBU 5f14 Verify: sig = 00000000 30 44 02 20 61 24 d2 8e 83 fd 2a de e2 1b 13 38 |0D. a$....*....8| +00000010 4a 4e 34 89 d5 06 91 78 ad 52 a1 dc 0a 9b a0 d1 |JN4....x.R......| +00000020 18 55 7c d0 02 20 1c 92 4c b0 60 6f f3 37 b2 4c |.U|.. ..L.`o.7.L| +00000030 5e 09 25 b0 26 ab 6b 5c 80 b4 54 5b cc 47 a6 68 |^.%.&.k\..T[.G.h| +00000040 50 10 62 f6 2d 97 |P.b.-.|" +"2019-09-24 00:27:05.506 UTC [cauthdsl] func2 -> DEBU 5f15 0xc00354a830 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:05.506 UTC [cauthdsl] func1 -> DEBU 5f16 0xc00354a830 gate 1569284825504320400 evaluation succeeds" +"2019-09-24 00:27:05.506 UTC [policies] Evaluate -> DEBU 5f17 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.506 UTC [policies] Evaluate -> DEBU 5f18 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.507 UTC [policies] Evaluate -> DEBU 5f19 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:05.507 UTC [policies] Evaluate -> DEBU 5f1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:05.507 UTC [chaincode] handleMessage -> DEBU 5f1b [77581583] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:27:05.508 UTC [chaincode] HandleTransaction -> DEBU 5f1c [77581583] handling GET_STATE from chaincode" +"2019-09-24 00:27:05.508 UTC [chaincode] HandleGetState -> DEBU 5f1d [77581583] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-09-24 00:27:05.508 UTC [stateleveldb] GetState -> DEBU 5f1e GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:05.509 UTC [chaincode] HandleTransaction -> DEBU 5f1f [77581583] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:27:05.509 UTC [chaincode] handleMessage -> DEBU 5f20 [77581583] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:05.510 UTC [chaincode] Notify -> DEBU 5f21 [77581583] notifying Txid:77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f, channelID:businesschannel" +"2019-09-24 00:27:05.510 UTC [chaincode] Execute -> DEBU 5f22 Exit" +"2019-09-24 00:27:05.510 UTC [endorser] callChaincode -> INFO 5f23 [businesschannel][77581583] Exit chaincode: name:"lscc" (8ms)" +"2019-09-24 00:27:05.510 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5f24 Simulation completed, getting simulation results" +"2019-09-24 00:27:05.511 UTC [lockbasedtxmgr] Done -> DEBU 5f25 Done with transaction simulation / query execution [77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f]" +"2019-09-24 00:27:05.511 UTC [endorser] SimulateProposal -> DEBU 5f26 [businesschannel][77581583] Exit" +"2019-09-24 00:27:05.511 UTC [endorser] endorseProposal -> DEBU 5f27 [businesschannel][77581583] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.511 UTC [endorser] endorseProposal -> DEBU 5f28 [businesschannel][77581583] escc for chaincode name:"lscc" is escc" +"2019-09-24 00:27:05.512 UTC [endorser] EndorseWithPlugin -> DEBU 5f29 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f, chaincode: lscc}" +"2019-09-24 00:27:05.512 UTC [msp.identity] Sign -> DEBU 5f2a Sign: plaintext: 0A20D6CA34E6BA89360DBD902C042961...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:05.512 UTC [msp.identity] Sign -> DEBU 5f2b Sign: digest: 32504F3A4148B4B687821DF604E0FAA33D45EDF3140570CD406C39FC86D17A53 " +"2019-09-24 00:27:05.512 UTC [endorser] EndorseWithPlugin -> DEBU 5f2c Exiting {plugin: escc, channel: businesschannel, tx: 77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f, chaincode: lscc}" +"2019-09-24 00:27:05.512 UTC [endorser] endorseProposal -> DEBU 5f2d [businesschannel][77581583] Exit" +"2019-09-24 00:27:05.512 UTC [lockbasedtxmgr] Done -> DEBU 5f2e Done with transaction simulation / query execution [77581583114c8360f3154f1f2269e505094680b3e697a8b36ed4582100a4d60f]" +"2019-09-24 00:27:05.512 UTC [endorser] func1 -> DEBU 5f2f Exit: request from 172.18.0.9:51014" +"2019-09-24 00:27:05.512 UTC [comm.grpc.server] 1 -> INFO 5f30 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51014 grpc.code=OK grpc.call_duration=15.8111ms +"2019-09-24 00:27:05.515 UTC [grpc] infof -> DEBU 5f31 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:05.516 UTC [grpc] infof -> DEBU 5f32 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:05.648 UTC [gossip.comm] func1 -> DEBU 5f33 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:05.649 UTC [gossip.gossip] handleMessage -> DEBU 5f34 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:05.649 UTC [gossip.pull] HandleMessage -> DEBU 5f35 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:05.650 UTC [gossip.pull] SendDigest -> DEBU 5f36 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:05.650 UTC [gossip.gossip] handleMessage -> DEBU 5f37 Exiting" +"2019-09-24 00:27:05.670 UTC [gossip.comm] func1 -> DEBU 5f38 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.671 UTC [gossip.gossip] handleMessage -> DEBU 5f39 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.671 UTC [gossip.gossip] handleMessage -> DEBU 5f3a Exiting" +"2019-09-24 00:27:05.671 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f3b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.672 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5f3c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:05.672 UTC [msp] DeserializeIdentity -> DEBU 5f3d Obtaining identity" +"2019-09-24 00:27:05.676 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5f3e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:05.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5f3f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:05.677 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5f40 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:05.680 UTC [policies] Evaluate -> DEBU 5f41 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:05.680 UTC [policies] Evaluate -> DEBU 5f42 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:05.680 UTC [policies] Evaluate -> DEBU 5f43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:05.681 UTC [cauthdsl] func1 -> DEBU 5f44 0xc0036bae20 gate 1569284825681329500 evaluation starts" +"2019-09-24 00:27:05.681 UTC [cauthdsl] func2 -> DEBU 5f45 0xc0036bae20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.682 UTC [cauthdsl] func2 -> DEBU 5f46 0xc0036bae20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.682 UTC [cauthdsl] func2 -> DEBU 5f47 0xc0036bae20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:05.683 UTC [cauthdsl] func2 -> DEBU 5f48 0xc0036bae20 principal evaluation fails" +"2019-09-24 00:27:05.683 UTC [cauthdsl] func1 -> DEBU 5f49 0xc0036bae20 gate 1569284825681329500 evaluation fails" +"2019-09-24 00:27:05.683 UTC [policies] Evaluate -> DEBU 5f4a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.686 UTC [gossip.gossip] handleMessage -> DEBU 5f4b Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.686 UTC [gossip.comm] func1 -> DEBU 5f4c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.689 UTC [policies] Evaluate -> DEBU 5f4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.690 UTC [policies] Evaluate -> DEBU 5f4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:05.690 UTC [cauthdsl] func1 -> DEBU 5f4f 0xc0036bb660 gate 1569284825690398900 evaluation starts" +"2019-09-24 00:27:05.690 UTC [cauthdsl] func2 -> DEBU 5f50 0xc0036bb660 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.691 UTC [cauthdsl] func2 -> DEBU 5f51 0xc0036bb660 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.691 UTC [cauthdsl] func2 -> DEBU 5f52 0xc0036bb660 principal matched by identity 0" +"2019-09-24 00:27:05.692 UTC [msp.identity] Verify -> DEBU 5f53 Verify: digest = 00000000 9d 15 d9 e1 46 7b dd 77 ea 8a 53 da e5 72 a7 78 |....F{.w..S..r.x| +00000010 d9 8c b6 69 df 1e d5 dc 63 c0 b9 72 25 f1 cb 0d |...i....c..r%...|" +"2019-09-24 00:27:05.692 UTC [msp.identity] Verify -> DEBU 5f54 Verify: sig = 00000000 30 44 02 20 6c 31 cd 83 95 5e f1 e8 14 3c 5a be |0D. l1...^... DEBU 5f55 0xc0036bb660 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:05.693 UTC [cauthdsl] func1 -> DEBU 5f56 0xc0036bb660 gate 1569284825690398900 evaluation succeeds" +"2019-09-24 00:27:05.694 UTC [policies] Evaluate -> DEBU 5f57 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:05.694 UTC [policies] Evaluate -> DEBU 5f58 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:05.695 UTC [policies] Evaluate -> DEBU 5f59 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:05.696 UTC [policies] Evaluate -> DEBU 5f5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:05.696 UTC [gossip.discovery] handleAliveMessage -> DEBU 5f5b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.697 UTC [gossip.discovery] learnExistingMembers -> DEBU 5f5c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:05.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 5f5d updating membership: timestamp: " +"2019-09-24 00:27:05.698 UTC [gossip.discovery] learnExistingMembers -> DEBU 5f5e Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:05.699 UTC [gossip.discovery] learnExistingMembers -> DEBU 5f5f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:05.699 UTC [gossip.discovery] learnExistingMembers -> DEBU 5f60 Exiting" +"2019-09-24 00:27:05.699 UTC [gossip.discovery] handleAliveMessage -> DEBU 5f61 Exiting" +"2019-09-24 00:27:05.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f62 Exiting" +"2019-09-24 00:27:05.700 UTC [gossip.gossip] handleMessage -> DEBU 5f63 Exiting" +"2019-09-24 00:27:05.701 UTC [gossip.gossip] handleMessage -> DEBU 5f64 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.700 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f65 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.703 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f66 Exiting" +"2019-09-24 00:27:05.704 UTC [gossip.gossip] handleMessage -> DEBU 5f67 Exiting" +"2019-09-24 00:27:05.704 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f68 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5f69 Exiting" +"2019-09-24 00:27:05.706 UTC [msp] DeserializeIdentity -> DEBU 5f6a Obtaining identity" +"2019-09-24 00:27:05.707 UTC [msp] DeserializeIdentity -> DEBU 5f6b Obtaining identity" +"2019-09-24 00:27:05.709 UTC [msp] DeserializeIdentity -> DEBU 5f6c Obtaining identity" +"2019-09-24 00:27:05.710 UTC [msp] DeserializeIdentity -> DEBU 5f6d Obtaining identity" +"2019-09-24 00:27:05.710 UTC [msp] DeserializeIdentity -> DEBU 5f6e Obtaining identity" +"2019-09-24 00:27:05.711 UTC [msp] DeserializeIdentity -> DEBU 5f6f Obtaining identity" +"2019-09-24 00:27:05.712 UTC [gossip.comm] Send -> DEBU 5f70 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:05.712 UTC [msp] DeserializeIdentity -> DEBU 5f71 Obtaining identity" +"2019-09-24 00:27:05.713 UTC [msp] DeserializeIdentity -> DEBU 5f72 Obtaining identity" +"2019-09-24 00:27:05.713 UTC [gossip.comm] Send -> DEBU 5f73 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:05.714 UTC [gossip.comm] sendToEndpoint -> DEBU 5f74 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.714 UTC [gossip.comm] sendToEndpoint -> DEBU 5f75 Exiting" +"2019-09-24 00:27:05.715 UTC [gossip.comm] sendToEndpoint -> DEBU 5f76 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:05.715 UTC [gossip.comm] sendToEndpoint -> DEBU 5f77 Exiting" +"2019-09-24 00:27:05.724 UTC [endorser] ProcessProposal -> DEBU 5f78 Entering: request from 172.18.0.9:51018" +"2019-09-24 00:27:05.724 UTC [protoutils] ValidateProposalMessage -> DEBU 5f79 ValidateProposalMessage starts for signed proposal 0xc003af2550" +"2019-09-24 00:27:05.724 UTC [protoutils] validateChannelHeader -> DEBU 5f7a validateChannelHeader info: header type 3" +"2019-09-24 00:27:05.724 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f7b begin" +"2019-09-24 00:27:05.724 UTC [msp] GetManagerForChain -> DEBU 5f7c Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:05.725 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f7d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:05.725 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f7e creator is valid" +"2019-09-24 00:27:05.725 UTC [msp.identity] Verify -> DEBU 5f7f Verify: digest = 00000000 b5 6c 7a 4c 8c f4 42 9a 03 f4 d0 e4 cc 0b d2 92 |.lzL..B.........| +00000010 a2 ee 9b 0b b1 e7 3f f7 8d ba cc 85 65 95 5e 00 |......?.....e.^.|" +"2019-09-24 00:27:05.725 UTC [msp.identity] Verify -> DEBU 5f80 Verify: sig = 00000000 30 45 02 21 00 97 15 e8 44 f3 ce 71 33 49 d2 82 |0E.!....D..q3I..| +00000010 51 ef bb a4 53 c3 01 3a 44 d6 20 a9 5f f1 75 00 |Q...S..:D. ._.u.| +00000020 f1 99 54 5b 2c 02 20 32 54 c5 d0 d3 93 a9 d5 b4 |..T[,. 2T.......| +00000030 5c 36 57 8a f0 82 61 b2 34 10 c9 f9 ef 46 5f 5f |\6W...a.4....F__| +00000040 59 ea 66 c2 7b 32 55 |Y.f.{2U|" +"2019-09-24 00:27:05.725 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f81 exits successfully" +"2019-09-24 00:27:05.725 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5f82 validateChaincodeProposalMessage starts for proposal 0xc0031429a0, header 0xc003af2960" +"2019-09-24 00:27:05.725 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5f83 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 00:27:05.725 UTC [endorser] preProcess -> DEBU 5f84 [businesschannel][1bc9b8d3] processing txid: 1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40" +"2019-09-24 00:27:05.726 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5f85 retrieveTransactionByID() - txId = [1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40]" +"2019-09-24 00:27:05.726 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5f86 constructing new tx simulator" +"2019-09-24 00:27:05.726 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5f87 constructing new tx simulator txid = [1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40]" +"2019-09-24 00:27:05.726 UTC [endorser] SimulateProposal -> DEBU 5f88 [businesschannel][1bc9b8d3] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.726 UTC [endorser] callChaincode -> INFO 5f89 [businesschannel][1bc9b8d3] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.726 UTC [chaincode] Execute -> DEBU 5f8a Entry" +"2019-09-24 00:27:05.726 UTC [aclmgmt] CheckACL -> DEBU 5f8b acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData" +"2019-09-24 00:27:05.727 UTC [aclmgmt] CheckACL -> DEBU 5f8c acl check(/Channel/Application/Readers)" +"2019-09-24 00:27:05.727 UTC [policies] Evaluate -> DEBU 5f8d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:05.727 UTC [policies] Evaluate -> DEBU 5f8e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:05.727 UTC [policies] Evaluate -> DEBU 5f8f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:05.727 UTC [cauthdsl] func1 -> DEBU 5f90 0xc004130ff0 gate 1569284825727518600 evaluation starts" +"2019-09-24 00:27:05.727 UTC [cauthdsl] func2 -> DEBU 5f91 0xc004130ff0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:05.727 UTC [cauthdsl] func2 -> DEBU 5f92 0xc004130ff0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:05.727 UTC [cauthdsl] func2 -> DEBU 5f93 0xc004130ff0 principal matched by identity 0" +"2019-09-24 00:27:05.728 UTC [msp.identity] Verify -> DEBU 5f94 Verify: digest = 00000000 b5 6c 7a 4c 8c f4 42 9a 03 f4 d0 e4 cc 0b d2 92 |.lzL..B.........| +00000010 a2 ee 9b 0b b1 e7 3f f7 8d ba cc 85 65 95 5e 00 |......?.....e.^.|" +"2019-09-24 00:27:05.728 UTC [msp.identity] Verify -> DEBU 5f95 Verify: sig = 00000000 30 45 02 21 00 97 15 e8 44 f3 ce 71 33 49 d2 82 |0E.!....D..q3I..| +00000010 51 ef bb a4 53 c3 01 3a 44 d6 20 a9 5f f1 75 00 |Q...S..:D. ._.u.| +00000020 f1 99 54 5b 2c 02 20 32 54 c5 d0 d3 93 a9 d5 b4 |..T[,. 2T.......| +00000030 5c 36 57 8a f0 82 61 b2 34 10 c9 f9 ef 46 5f 5f |\6W...a.4....F__| +00000040 59 ea 66 c2 7b 32 55 |Y.f.{2U|" +"2019-09-24 00:27:05.728 UTC [cauthdsl] func2 -> DEBU 5f96 0xc004130ff0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:05.728 UTC [cauthdsl] func1 -> DEBU 5f97 0xc004130ff0 gate 1569284825727518600 evaluation succeeds" +"2019-09-24 00:27:05.728 UTC [policies] Evaluate -> DEBU 5f98 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.728 UTC [policies] Evaluate -> DEBU 5f99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:05.728 UTC [policies] Evaluate -> DEBU 5f9a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:05.729 UTC [policies] Evaluate -> DEBU 5f9b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:05.729 UTC [chaincode] handleMessage -> DEBU 5f9c [1bc9b8d3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 00:27:05.729 UTC [chaincode] HandleTransaction -> DEBU 5f9d [1bc9b8d3] handling GET_STATE from chaincode" +"2019-09-24 00:27:05.729 UTC [chaincode] HandleGetState -> DEBU 5f9e [1bc9b8d3] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-09-24 00:27:05.729 UTC [stateleveldb] GetState -> DEBU 5f9f GetState(). ns=lscc, key=exp02" +"2019-09-24 00:27:05.730 UTC [chaincode] HandleTransaction -> DEBU 5fa0 [1bc9b8d3] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 00:27:05.730 UTC [chaincode] handleMessage -> DEBU 5fa1 [1bc9b8d3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:05.730 UTC [chaincode] Notify -> DEBU 5fa2 [1bc9b8d3] notifying Txid:1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40, channelID:businesschannel" +"2019-09-24 00:27:05.730 UTC [chaincode] Execute -> DEBU 5fa3 Exit" +"2019-09-24 00:27:05.730 UTC [endorser] callChaincode -> INFO 5fa4 [businesschannel][1bc9b8d3] Exit chaincode: name:"lscc" (4ms)" +"2019-09-24 00:27:05.731 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5fa5 Simulation completed, getting simulation results" +"2019-09-24 00:27:05.731 UTC [lockbasedtxmgr] Done -> DEBU 5fa6 Done with transaction simulation / query execution [1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40]" +"2019-09-24 00:27:05.731 UTC [endorser] SimulateProposal -> DEBU 5fa7 [businesschannel][1bc9b8d3] Exit" +"2019-09-24 00:27:05.731 UTC [endorser] endorseProposal -> DEBU 5fa8 [businesschannel][1bc9b8d3] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.731 UTC [endorser] endorseProposal -> DEBU 5fa9 [businesschannel][1bc9b8d3] escc for chaincode name:"lscc" is escc" +"2019-09-24 00:27:05.732 UTC [endorser] EndorseWithPlugin -> DEBU 5faa Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40, chaincode: lscc}" +"2019-09-24 00:27:05.732 UTC [msp.identity] Sign -> DEBU 5fab Sign: plaintext: 0A202EB4FEE0237A6A63E2C6C4ACBA25...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:05.732 UTC [msp.identity] Sign -> DEBU 5fac Sign: digest: 67889439FC8495BFE8370A5F802BD6559B61E2CD2C768706BAC8CAD7E6BB7EE7 " +"2019-09-24 00:27:05.733 UTC [endorser] EndorseWithPlugin -> DEBU 5fad Exiting {plugin: escc, channel: businesschannel, tx: 1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40, chaincode: lscc}" +"2019-09-24 00:27:05.733 UTC [endorser] endorseProposal -> DEBU 5fae [businesschannel][1bc9b8d3] Exit" +"2019-09-24 00:27:05.733 UTC [lockbasedtxmgr] Done -> DEBU 5faf Done with transaction simulation / query execution [1bc9b8d3f2ccf0529c33bb8e9728f53b41423ad61f818863998e99dd82238a40]" +"2019-09-24 00:27:05.733 UTC [endorser] func1 -> DEBU 5fb0 Exit: request from 172.18.0.9:51018" +"2019-09-24 00:27:05.733 UTC [comm.grpc.server] 1 -> INFO 5fb1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51018 grpc.code=OK grpc.call_duration=8.8885ms +"2019-09-24 00:27:05.736 UTC [grpc] infof -> DEBU 5fb2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:05.736 UTC [grpc] infof -> DEBU 5fb3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:05.783 UTC [gossip.comm] func1 -> DEBU 5fb4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020O" signature:"0E\002!\000\345\263\277\327\276\237e\310k\002\3237#\243\270i2!\374\320\030G\354\261\362\344\246\367k\356\300\260\002 R\372:\332\207\002 f\263i-\277\222k\207\303\005\311,\351\337\3460\315OXI\214\277c\214;^\007\2035\244\2322" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:05.783 UTC [gossip.gossip] handleMessage -> DEBU 5fb5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020O" signature:"0E\002!\000\345\263\277\327\276\237e\310k\002\3237#\243\270i2!\374\320\030G\354\261\362\344\246\367k\356\300\260\002 R\372:\332\207\002 f\263i-\277\222k\207\303\005\311,\351\337\3460\315OXI\214\277c\214;^\007\2035\244\2322" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:05.783 UTC [gossip.gossip] handleMessage -> DEBU 5fb6 Exiting" +"2019-09-24 00:27:05.783 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5fb7 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020O" signature:"0E\002!\000\345\263\277\327\276\237e\310k\002\3237#\243\270i2!\374\320\030G\354\261\362\344\246\367k\356\300\260\002 R\372:\332\207\002 f\263i-\277\222k\207\303\005\311,\351\337\3460\315OXI\214\277c\214;^\007\2035\244\2322" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:05.783 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5fb8 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:05.784 UTC [msp.identity] Verify -> DEBU 5fb9 Verify: digest = 00000000 1e 68 67 d7 40 22 c1 50 39 7c 9f 1a 6b e4 37 f6 |.hg.@".P9|..k.7.| +00000010 6c 3b db 59 b7 e6 9c fd d2 27 ea 61 c6 92 23 a7 |l;.Y.....'.a..#.|" +"2019-09-24 00:27:05.784 UTC [msp.identity] Verify -> DEBU 5fba Verify: sig = 00000000 30 45 02 21 00 e5 b3 bf d7 be 9f 65 c8 6b 02 d3 |0E.!.......e.k..| +00000010 37 23 a3 b8 69 32 21 fc d0 18 47 ec b1 f2 e4 a6 |7#..i2!...G.....| +00000020 f7 6b ee c0 b0 02 20 52 3c 41 6d 58 e3 79 9f 49 |.k.... R DEBU 5fbb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:27:05.784 UTC [msp.identity] Verify -> DEBU 5fbc Verify: sig = 00000000 30 44 02 20 0d 5c af b8 50 94 cb e9 02 29 80 b9 |0D. .\..P....)..| +00000010 e5 00 da 4e 70 cd 93 05 1c 70 3b 65 91 aa d4 3e |...Np....p;e...>| +00000020 fa 3a da 87 02 20 66 b3 69 2d bf 92 6b 87 c3 05 |.:... f.i-..k...| +00000030 c9 2c e9 df e6 30 cd 4f 58 49 8c bf 63 8c 3b 5e |.,...0.OXI..c.;^| +00000040 07 83 35 a4 9a 32 |..5..2|" +"2019-09-24 00:27:05.785 UTC [gossip.discovery] handleAliveMessage -> DEBU 5fbd Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:05.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 5fbe Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:27:05.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 5fbf updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:05.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 5fc0 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:05.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 5fc1 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:05.785 UTC [gossip.discovery] learnExistingMembers -> DEBU 5fc2 Exiting" +"2019-09-24 00:27:05.786 UTC [gossip.discovery] handleAliveMessage -> DEBU 5fc3 Exiting" +"2019-09-24 00:27:05.786 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5fc4 Exiting" +"2019-09-24 00:27:05.786 UTC [gossip.discovery] sendMemResponse -> DEBU 5fc5 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:27:05.786 UTC [msp] DeserializeIdentity -> DEBU 5fc6 Obtaining identity" +"2019-09-24 00:27:05.786 UTC [msp] DeserializeIdentity -> DEBU 5fc7 Obtaining identity" +"2019-09-24 00:27:05.786 UTC [gossip.comm] Send -> DEBU 5fc8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:05.786 UTC [gossip.discovery] sendMemResponse -> DEBU 5fc9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020O" signature:"0E\002!\000\345\263\277\327\276\237e\310k\002\3237#\243\270i2!\374\320\030G\354\261\362\344\246\367k\356\300\260\002 R\372:\332\207\002 f\263i-\277\222k\207\303\005\311,\351\337\3460\315OXI\214\277c\214;^\007\2035\244\2322" > > alive: " +"2019-09-24 00:27:05.786 UTC [gossip.comm] sendToEndpoint -> DEBU 5fca Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:05.786 UTC [gossip.comm] sendToEndpoint -> DEBU 5fcb Exiting" +"2019-09-24 00:27:05.888 UTC [endorser] ProcessProposal -> DEBU 5fcc Entering: request from 172.18.0.9:51022" +"2019-09-24 00:27:05.888 UTC [protoutils] ValidateProposalMessage -> DEBU 5fcd ValidateProposalMessage starts for signed proposal 0xc003af39f0" +"2019-09-24 00:27:05.888 UTC [protoutils] validateChannelHeader -> DEBU 5fce validateChannelHeader info: header type 3" +"2019-09-24 00:27:05.888 UTC [protoutils] checkSignatureFromCreator -> DEBU 5fcf begin" +"2019-09-24 00:27:05.888 UTC [msp] GetManagerForChain -> DEBU 5fd0 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:05.888 UTC [protoutils] checkSignatureFromCreator -> DEBU 5fd1 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:05.888 UTC [protoutils] checkSignatureFromCreator -> DEBU 5fd2 creator is valid" +"2019-09-24 00:27:05.888 UTC [msp.identity] Verify -> DEBU 5fd3 Verify: digest = 00000000 12 d9 52 d7 e9 d4 06 8e 8d c1 aa 20 73 d1 48 b0 |..R........ s.H.| +00000010 87 9b 80 f9 09 4e bc 5e d0 98 82 2b 17 b3 59 7c |.....N.^...+..Y||" +"2019-09-24 00:27:05.888 UTC [msp.identity] Verify -> DEBU 5fd4 Verify: sig = 00000000 30 45 02 21 00 e9 2e 61 5b 6c ca 28 92 ca 96 1d |0E.!...a[l.(....| +00000010 41 23 22 87 5f 95 26 97 41 9c 10 31 e9 22 58 f4 |A#"._.&.A..1."X.| +00000020 a9 56 bf 4c 0d 02 20 04 b0 e9 5b dd ab 3a 1d f5 |.V.L.. ...[..:..| +00000030 d9 30 32 52 3c 64 3c d4 ae 11 4e 35 43 5f bd 65 |.02R DEBU 5fd5 exits successfully" +"2019-09-24 00:27:05.889 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5fd6 validateChaincodeProposalMessage starts for proposal 0xc003142e70, header 0xc003af3e00" +"2019-09-24 00:27:05.889 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5fd7 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 00:27:05.889 UTC [endorser] preProcess -> DEBU 5fd8 [businesschannel][7279768c] processing txid: 7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b" +"2019-09-24 00:27:05.889 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 5fd9 retrieveTransactionByID() - txId = [7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b]" +"2019-09-24 00:27:05.889 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5fda constructing new tx simulator" +"2019-09-24 00:27:05.889 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5fdb constructing new tx simulator txid = [7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b]" +"2019-09-24 00:27:05.889 UTC [endorser] SimulateProposal -> DEBU 5fdc [businesschannel][7279768c] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.889 UTC [endorser] callChaincode -> INFO 5fdd [businesschannel][7279768c] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.889 UTC [chaincode] Execute -> DEBU 5fde Entry" +"2019-09-24 00:27:05.890 UTC [msp.identity] Verify -> DEBU 5fdf Verify: digest = 00000000 12 d9 52 d7 e9 d4 06 8e 8d c1 aa 20 73 d1 48 b0 |..R........ s.H.| +00000010 87 9b 80 f9 09 4e bc 5e d0 98 82 2b 17 b3 59 7c |.....N.^...+..Y||" +"2019-09-24 00:27:05.890 UTC [msp.identity] Verify -> DEBU 5fe0 Verify: sig = 00000000 30 45 02 21 00 e9 2e 61 5b 6c ca 28 92 ca 96 1d |0E.!...a[l.(....| +00000010 41 23 22 87 5f 95 26 97 41 9c 10 31 e9 22 58 f4 |A#"._.&.A..1."X.| +00000020 a9 56 bf 4c 0d 02 20 04 b0 e9 5b dd ab 3a 1d f5 |.V.L.. ...[..:..| +00000030 d9 30 32 52 3c 64 3c d4 ae 11 4e 35 43 5f bd 65 |.02R DEBU 5fe1 [7279768c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:05.891 UTC [chaincode] Notify -> DEBU 5fe2 [7279768c] notifying Txid:7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b, channelID:businesschannel" +"2019-09-24 00:27:05.891 UTC [chaincode] Execute -> DEBU 5fe3 Exit" +"2019-09-24 00:27:05.891 UTC [endorser] callChaincode -> INFO 5fe4 [businesschannel][7279768c] Exit chaincode: name:"lscc" (2ms)" +"2019-09-24 00:27:05.891 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5fe5 Simulation completed, getting simulation results" +"2019-09-24 00:27:05.891 UTC [lockbasedtxmgr] Done -> DEBU 5fe6 Done with transaction simulation / query execution [7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b]" +"2019-09-24 00:27:05.891 UTC [endorser] SimulateProposal -> DEBU 5fe7 [businesschannel][7279768c] Exit" +"2019-09-24 00:27:05.891 UTC [endorser] endorseProposal -> DEBU 5fe8 [businesschannel][7279768c] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:05.892 UTC [endorser] endorseProposal -> DEBU 5fe9 [businesschannel][7279768c] escc for chaincode name:"lscc" is escc" +"2019-09-24 00:27:05.892 UTC [endorser] EndorseWithPlugin -> DEBU 5fea Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b, chaincode: lscc}" +"2019-09-24 00:27:05.892 UTC [msp.identity] Sign -> DEBU 5feb Sign: plaintext: 0A2075BE2E4A1181DFA20984E7BB841B...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:05.892 UTC [msp.identity] Sign -> DEBU 5fec Sign: digest: 723BE81DCCB4D44C037093B047A56ECDE3F61E69B563F6BA8F483F6F0E0CE0BC " +"2019-09-24 00:27:05.892 UTC [endorser] EndorseWithPlugin -> DEBU 5fed Exiting {plugin: escc, channel: businesschannel, tx: 7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b, chaincode: lscc}" +"2019-09-24 00:27:05.893 UTC [endorser] endorseProposal -> DEBU 5fee [businesschannel][7279768c] Exit" +"2019-09-24 00:27:05.893 UTC [lockbasedtxmgr] Done -> DEBU 5fef Done with transaction simulation / query execution [7279768c29901977940bf4b98f6f88cabd2beafa85a331cd7c2f64e59b9df63b]" +"2019-09-24 00:27:05.893 UTC [endorser] func1 -> DEBU 5ff0 Exit: request from 172.18.0.9:51022" +"2019-09-24 00:27:05.893 UTC [comm.grpc.server] 1 -> INFO 5ff1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51022 grpc.code=OK grpc.call_duration=5.7508ms +"2019-09-24 00:27:05.900 UTC [grpc] infof -> DEBU 5ff2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:05.901 UTC [grpc] infof -> DEBU 5ff3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:06.008 UTC [gossip.comm] func1 -> DEBU 5ff4 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:06.008 UTC [gossip.gossip] handleMessage -> DEBU 5ff5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:06.008 UTC [msp] DeserializeIdentity -> DEBU 5ff6 Obtaining identity" +"2019-09-24 00:27:06.008 UTC [msp] DeserializeIdentity -> DEBU 5ff7 Obtaining identity" +"2019-09-24 00:27:06.008 UTC [msp] DeserializeIdentity -> DEBU 5ff8 Obtaining identity" +"2019-09-24 00:27:06.008 UTC [gossip.gossip] handleMessage -> DEBU 5ff9 Exiting" +"2019-09-24 00:27:06.017 UTC [gossip.comm] func1 -> DEBU 5ffa Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:06.018 UTC [gossip.gossip] handleMessage -> DEBU 5ffb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:06.018 UTC [msp] DeserializeIdentity -> DEBU 5ffc Obtaining identity" +"2019-09-24 00:27:06.018 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5ffd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:06.018 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5ffe Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:06.018 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5fff Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:06.018 UTC [policies] Evaluate -> DEBU 6000 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:06.019 UTC [policies] Evaluate -> DEBU 6001 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:06.019 UTC [policies] Evaluate -> DEBU 6002 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:06.019 UTC [cauthdsl] func1 -> DEBU 6003 0xc0040182f0 gate 1569284826019307900 evaluation starts" +"2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 6004 0xc0040182f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 6005 0xc0040182f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 6006 0xc0040182f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 6007 0xc0040182f0 principal evaluation fails" +"2019-09-24 00:27:06.019 UTC [cauthdsl] func1 -> DEBU 6008 0xc0040182f0 gate 1569284826019307900 evaluation fails" +"2019-09-24 00:27:06.019 UTC [policies] Evaluate -> DEBU 6009 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:06.019 UTC [policies] Evaluate -> DEBU 600a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:06.019 UTC [policies] Evaluate -> DEBU 600b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:06.019 UTC [cauthdsl] func1 -> DEBU 600c 0xc004018b30 gate 1569284826019805300 evaluation starts" +"2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 600d 0xc004018b30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 600e 0xc004018b30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:06.019 UTC [cauthdsl] func2 -> DEBU 600f 0xc004018b30 principal matched by identity 0" +"2019-09-24 00:27:06.019 UTC [msp.identity] Verify -> DEBU 6010 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:06.019 UTC [msp.identity] Verify -> DEBU 6011 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6012 0xc004018b30 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func1 -> DEBU 6013 0xc004018b30 gate 1569284826019805300 evaluation succeeds" +"2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6014 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6015 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6016 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6017 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:06.020 UTC [msp] DeserializeIdentity -> DEBU 6018 Obtaining identity" +"2019-09-24 00:27:06.020 UTC [msp] DeserializeIdentity -> DEBU 6019 Obtaining identity" +"2019-09-24 00:27:06.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 601a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:06.020 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 601b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 601c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 601d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 601e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func1 -> DEBU 601f 0xc004019d10 gate 1569284826020516800 evaluation starts" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6020 0xc004019d10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6021 0xc004019d10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6022 0xc004019d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6023 0xc004019d10 principal evaluation fails" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func1 -> DEBU 6024 0xc004019d10 gate 1569284826020516800 evaluation fails" +"2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6025 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6026 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:06.020 UTC [policies] Evaluate -> DEBU 6027 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func1 -> DEBU 6028 0xc00425e550 gate 1569284826020796500 evaluation starts" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 6029 0xc00425e550 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 602a 0xc00425e550 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:06.020 UTC [cauthdsl] func2 -> DEBU 602b 0xc00425e550 principal matched by identity 0" +"2019-09-24 00:27:06.020 UTC [msp.identity] Verify -> DEBU 602c Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:06.020 UTC [msp.identity] Verify -> DEBU 602d Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:06.021 UTC [cauthdsl] func2 -> DEBU 602e 0xc00425e550 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:06.021 UTC [cauthdsl] func1 -> DEBU 602f 0xc00425e550 gate 1569284826020796500 evaluation succeeds" +"2019-09-24 00:27:06.021 UTC [policies] Evaluate -> DEBU 6030 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:06.021 UTC [policies] Evaluate -> DEBU 6031 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:06.021 UTC [policies] Evaluate -> DEBU 6032 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:06.021 UTC [policies] Evaluate -> DEBU 6033 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:06.021 UTC [gossip.gossip] handleMessage -> DEBU 6034 Exiting" +"2019-09-24 00:27:06.027 UTC [msp] DeserializeIdentity -> DEBU 6035 Obtaining identity" +"2019-09-24 00:27:06.027 UTC [msp] DeserializeIdentity -> DEBU 6036 Obtaining identity" +"2019-09-24 00:27:06.028 UTC [gossip.comm] Send -> DEBU 6037 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers" +"2019-09-24 00:27:06.028 UTC [msp] DeserializeIdentity -> DEBU 6038 Obtaining identity" +"2019-09-24 00:27:06.028 UTC [msp] DeserializeIdentity -> DEBU 6039 Obtaining identity" +"2019-09-24 00:27:06.028 UTC [gossip.comm] sendToEndpoint -> DEBU 603a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:06.028 UTC [gossip.comm] sendToEndpoint -> DEBU 603b Exiting" +"2019-09-24 00:27:06.029 UTC [gossip.comm] sendToEndpoint -> DEBU 603c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:06.029 UTC [gossip.comm] sendToEndpoint -> DEBU 603d Exiting" +"2019-09-24 00:27:06.060 UTC [endorser] ProcessProposal -> DEBU 603e Entering: request from 172.18.0.9:51026" +"2019-09-24 00:27:06.060 UTC [protoutils] ValidateProposalMessage -> DEBU 603f ValidateProposalMessage starts for signed proposal 0xc003c3e550" +"2019-09-24 00:27:06.060 UTC [protoutils] validateChannelHeader -> DEBU 6040 validateChannelHeader info: header type 3" +"2019-09-24 00:27:06.060 UTC [protoutils] checkSignatureFromCreator -> DEBU 6041 begin" +"2019-09-24 00:27:06.060 UTC [msp] GetManagerForChain -> DEBU 6042 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:06.060 UTC [protoutils] checkSignatureFromCreator -> DEBU 6043 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:06.060 UTC [protoutils] checkSignatureFromCreator -> DEBU 6044 creator is valid" +"2019-09-24 00:27:06.061 UTC [msp.identity] Verify -> DEBU 6045 Verify: digest = 00000000 e6 da f8 74 b3 07 fd 97 30 f0 21 04 c8 21 d7 2d |...t....0.!..!.-| +00000010 cd b2 73 50 de a1 86 aa d1 09 1c 8b 68 ca 18 95 |..sP........h...|" +"2019-09-24 00:27:06.061 UTC [msp.identity] Verify -> DEBU 6046 Verify: sig = 00000000 30 45 02 21 00 fa 01 41 73 3d 4f 18 43 5c a8 4d |0E.!...As=O.C\.M| +00000010 26 15 6a 03 d2 22 7f 63 b4 52 f4 d7 21 be 63 26 |&.j..".c.R..!.c&| +00000020 ac 89 2e 67 33 02 20 37 ab e2 c6 ad 9d ae 15 7d |...g3. 7.......}| +00000030 30 d3 29 39 53 12 cb 5e d2 49 92 8d a8 db 2c 18 |0.)9S..^.I....,.| +00000040 8a 90 c8 22 b7 d7 ba |..."...|" +"2019-09-24 00:27:06.061 UTC [protoutils] checkSignatureFromCreator -> DEBU 6047 exits successfully" +"2019-09-24 00:27:06.061 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6048 validateChaincodeProposalMessage starts for proposal 0xc0031432d0, header 0xc003c3ea00" +"2019-09-24 00:27:06.061 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6049 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 00:27:06.061 UTC [endorser] preProcess -> DEBU 604a [businesschannel][5d80e13a] processing txid: 5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3" +"2019-09-24 00:27:06.061 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 604b retrieveTransactionByID() - txId = [5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3]" +"2019-09-24 00:27:06.061 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 604c constructing new tx simulator" +"2019-09-24 00:27:06.061 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 604d constructing new tx simulator txid = [5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3]" +"2019-09-24 00:27:06.061 UTC [endorser] SimulateProposal -> DEBU 604e [businesschannel][5d80e13a] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:06.062 UTC [endorser] callChaincode -> INFO 604f [businesschannel][5d80e13a] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:06.062 UTC [chaincode] Execute -> DEBU 6050 Entry" +"2019-09-24 00:27:06.062 UTC [aclmgmt] CheckACL -> DEBU 6051 acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes" +"2019-09-24 00:27:06.062 UTC [aclmgmt] CheckACL -> DEBU 6052 acl check(/Channel/Application/Readers)" +"2019-09-24 00:27:06.062 UTC [policies] Evaluate -> DEBU 6053 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:06.062 UTC [policies] Evaluate -> DEBU 6054 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:06.062 UTC [policies] Evaluate -> DEBU 6055 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:06.062 UTC [cauthdsl] func1 -> DEBU 6056 0xc0027df380 gate 1569284826062922800 evaluation starts" +"2019-09-24 00:27:06.063 UTC [cauthdsl] func2 -> DEBU 6057 0xc0027df380 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:06.063 UTC [cauthdsl] func2 -> DEBU 6058 0xc0027df380 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:06.063 UTC [cauthdsl] func2 -> DEBU 6059 0xc0027df380 principal matched by identity 0" +"2019-09-24 00:27:06.063 UTC [msp.identity] Verify -> DEBU 605a Verify: digest = 00000000 e6 da f8 74 b3 07 fd 97 30 f0 21 04 c8 21 d7 2d |...t....0.!..!.-| +00000010 cd b2 73 50 de a1 86 aa d1 09 1c 8b 68 ca 18 95 |..sP........h...|" +"2019-09-24 00:27:06.063 UTC [msp.identity] Verify -> DEBU 605b Verify: sig = 00000000 30 45 02 21 00 fa 01 41 73 3d 4f 18 43 5c a8 4d |0E.!...As=O.C\.M| +00000010 26 15 6a 03 d2 22 7f 63 b4 52 f4 d7 21 be 63 26 |&.j..".c.R..!.c&| +00000020 ac 89 2e 67 33 02 20 37 ab e2 c6 ad 9d ae 15 7d |...g3. 7.......}| +00000030 30 d3 29 39 53 12 cb 5e d2 49 92 8d a8 db 2c 18 |0.)9S..^.I....,.| +00000040 8a 90 c8 22 b7 d7 ba |..."...|" +"2019-09-24 00:27:06.063 UTC [cauthdsl] func2 -> DEBU 605c 0xc0027df380 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:06.063 UTC [cauthdsl] func1 -> DEBU 605d 0xc0027df380 gate 1569284826062922800 evaluation succeeds" +"2019-09-24 00:27:06.063 UTC [policies] Evaluate -> DEBU 605e Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:06.064 UTC [policies] Evaluate -> DEBU 605f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:06.064 UTC [policies] Evaluate -> DEBU 6060 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:06.064 UTC [policies] Evaluate -> DEBU 6061 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:06.064 UTC [chaincode] handleMessage -> DEBU 6062 [5d80e13a] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready" +"2019-09-24 00:27:06.064 UTC [chaincode] HandleTransaction -> DEBU 6063 [5d80e13a] handling GET_STATE_BY_RANGE from chaincode" +"2019-09-24 00:27:06.065 UTC [leveldbhelper] GetIterator -> DEBU 6064 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}]" +"2019-09-24 00:27:06.065 UTC [rwsetutil] AddResult -> DEBU 6065 Adding a result" +"2019-09-24 00:27:06.065 UTC [chaincode] HandleGetStateByRange -> DEBU 6066 Got keys and values. Sending RESPONSE" +"2019-09-24 00:27:06.065 UTC [chaincode] HandleTransaction -> DEBU 6067 [5d80e13a] Completed GET_STATE_BY_RANGE. Sending RESPONSE" +"2019-09-24 00:27:06.066 UTC [chaincode] handleMessage -> DEBU 6068 [5d80e13a] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready" +"2019-09-24 00:27:06.066 UTC [chaincode] HandleTransaction -> DEBU 6069 [5d80e13a] handling QUERY_STATE_CLOSE from chaincode" +"2019-09-24 00:27:06.066 UTC [chaincode] HandleTransaction -> DEBU 606a [5d80e13a] Completed QUERY_STATE_CLOSE. Sending RESPONSE" +"2019-09-24 00:27:06.066 UTC [chaincode] handleMessage -> DEBU 606b [5d80e13a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:06.066 UTC [chaincode] Notify -> DEBU 606c [5d80e13a] notifying Txid:5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3, channelID:businesschannel" +"2019-09-24 00:27:06.066 UTC [chaincode] Execute -> DEBU 606d Exit" +"2019-09-24 00:27:06.066 UTC [endorser] callChaincode -> INFO 606e [businesschannel][5d80e13a] Exit chaincode: name:"lscc" (4ms)" +"2019-09-24 00:27:06.066 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 606f Simulation completed, getting simulation results" +"2019-09-24 00:27:06.066 UTC [lockbasedtxmgr] Done -> DEBU 6070 Done with transaction simulation / query execution [5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3]" +"2019-09-24 00:27:06.066 UTC [endorser] SimulateProposal -> DEBU 6071 [businesschannel][5d80e13a] Exit" +"2019-09-24 00:27:06.066 UTC [endorser] endorseProposal -> DEBU 6072 [businesschannel][5d80e13a] Entry chaincode: name:"lscc" " +"2019-09-24 00:27:06.067 UTC [endorser] endorseProposal -> DEBU 6073 [businesschannel][5d80e13a] escc for chaincode name:"lscc" is escc" +"2019-09-24 00:27:06.067 UTC [endorser] EndorseWithPlugin -> DEBU 6074 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3, chaincode: lscc}" +"2019-09-24 00:27:06.067 UTC [msp.identity] Sign -> DEBU 6075 Sign: plaintext: 0A20829349F171313F5A2865B452A536...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:06.067 UTC [msp.identity] Sign -> DEBU 6076 Sign: digest: BBBCF440C1C00FA3DDD231A6DC9F065C4327A8700613BB2E6BFB198470BCF9AF " +"2019-09-24 00:27:06.067 UTC [endorser] EndorseWithPlugin -> DEBU 6077 Exiting {plugin: escc, channel: businesschannel, tx: 5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3, chaincode: lscc}" +"2019-09-24 00:27:06.067 UTC [endorser] endorseProposal -> DEBU 6078 [businesschannel][5d80e13a] Exit" +"2019-09-24 00:27:06.067 UTC [lockbasedtxmgr] Done -> DEBU 6079 Done with transaction simulation / query execution [5d80e13a906a8d43b8488e94427550be5f11e3b1be118b5683b7fa2cf6ea1fc3]" +"2019-09-24 00:27:06.067 UTC [endorser] func1 -> DEBU 607a Exit: request from 172.18.0.9:51026" +"2019-09-24 00:27:06.068 UTC [comm.grpc.server] 1 -> INFO 607b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51026 grpc.code=OK grpc.call_duration=7.9885ms +"2019-09-24 00:27:06.071 UTC [grpc] infof -> DEBU 607c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:06.071 UTC [grpc] infof -> DEBU 607d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:06.433 UTC [endorser] ProcessProposal -> DEBU 607e Entering: request from 172.18.0.9:51030" +"2019-09-24 00:27:06.434 UTC [protoutils] ValidateProposalMessage -> DEBU 607f ValidateProposalMessage starts for signed proposal 0xc003d6cbe0" +"2019-09-24 00:27:06.434 UTC [protoutils] validateChannelHeader -> DEBU 6080 validateChannelHeader info: header type 3" +"2019-09-24 00:27:06.434 UTC [protoutils] checkSignatureFromCreator -> DEBU 6081 begin" +"2019-09-24 00:27:06.435 UTC [msp] GetManagerForChain -> DEBU 6082 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:06.435 UTC [protoutils] checkSignatureFromCreator -> DEBU 6083 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:06.435 UTC [protoutils] checkSignatureFromCreator -> DEBU 6084 creator is valid" +"2019-09-24 00:27:06.436 UTC [msp.identity] Verify -> DEBU 6085 Verify: digest = 00000000 0c 96 31 0c d6 3b 15 61 d7 75 94 a5 36 ab bb a5 |..1..;.a.u..6...| +00000010 af 7b ae 39 f8 fa 09 29 cf 89 68 64 00 86 e0 3f |.{.9...)..hd...?|" +"2019-09-24 00:27:06.436 UTC [msp.identity] Verify -> DEBU 6086 Verify: sig = 00000000 30 45 02 21 00 f7 22 56 34 46 26 2c 59 9f 27 24 |0E.!.."V4F&,Y.'$| +00000010 b0 64 c1 59 9c c1 d0 d7 13 21 3a 23 fb 2b 48 1d |.d.Y.....!:#.+H.| +00000020 1a 4f 1b a0 8b 02 20 5f 3c a5 8e 08 5c 17 9b 74 |.O.... _<...\..t| +00000030 8e 96 74 fe fa 10 6c 0b 20 d0 82 23 aa a3 3c 4f |..t...l. ..#.. DEBU 6087 exits successfully" +"2019-09-24 00:27:06.437 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6088 validateChaincodeProposalMessage starts for proposal 0xc00338c380, header 0xc003d6d090" +"2019-09-24 00:27:06.437 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6089 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-09-24 00:27:06.437 UTC [endorser] preProcess -> DEBU 608a [businesschannel][39d3b48b] processing txid: 39d3b48b777b98f85a10a18bf26ddf6d1b2ed8539854875ba6a579cd45cfa205" +"2019-09-24 00:27:06.438 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 608b retrieveTransactionByID() - txId = [39d3b48b777b98f85a10a18bf26ddf6d1b2ed8539854875ba6a579cd45cfa205]" +"2019-09-24 00:27:06.438 UTC [endorser] SimulateProposal -> DEBU 608c [businesschannel][39d3b48b] Entry chaincode: name:"qscc" " +"2019-09-24 00:27:06.438 UTC [endorser] callChaincode -> INFO 608d [businesschannel][39d3b48b] Entry chaincode: name:"qscc" " +"2019-09-24 00:27:06.439 UTC [chaincode] Execute -> DEBU 608e Entry" +"2019-09-24 00:27:06.439 UTC [qscc] Invoke -> DEBU 608f Invoke function: GetChainInfo on chain: businesschannel" +"2019-09-24 00:27:06.439 UTC [aclmgmt] CheckACL -> DEBU 6090 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-09-24 00:27:06.439 UTC [aclmgmt] CheckACL -> DEBU 6091 acl check(/Channel/Application/Readers)" +"2019-09-24 00:27:06.439 UTC [policies] Evaluate -> DEBU 6092 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:06.439 UTC [policies] Evaluate -> DEBU 6093 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:06.439 UTC [policies] Evaluate -> DEBU 6094 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:06.439 UTC [cauthdsl] func1 -> DEBU 6095 0xc003ba4640 gate 1569284826439783100 evaluation starts" +"2019-09-24 00:27:06.439 UTC [cauthdsl] func2 -> DEBU 6096 0xc003ba4640 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:06.439 UTC [cauthdsl] func2 -> DEBU 6097 0xc003ba4640 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:06.439 UTC [cauthdsl] func2 -> DEBU 6098 0xc003ba4640 principal matched by identity 0" +"2019-09-24 00:27:06.439 UTC [msp.identity] Verify -> DEBU 6099 Verify: digest = 00000000 0c 96 31 0c d6 3b 15 61 d7 75 94 a5 36 ab bb a5 |..1..;.a.u..6...| +00000010 af 7b ae 39 f8 fa 09 29 cf 89 68 64 00 86 e0 3f |.{.9...)..hd...?|" +"2019-09-24 00:27:06.439 UTC [msp.identity] Verify -> DEBU 609a Verify: sig = 00000000 30 45 02 21 00 f7 22 56 34 46 26 2c 59 9f 27 24 |0E.!.."V4F&,Y.'$| +00000010 b0 64 c1 59 9c c1 d0 d7 13 21 3a 23 fb 2b 48 1d |.d.Y.....!:#.+H.| +00000020 1a 4f 1b a0 8b 02 20 5f 3c a5 8e 08 5c 17 9b 74 |.O.... _<...\..t| +00000030 8e 96 74 fe fa 10 6c 0b 20 d0 82 23 aa a3 3c 4f |..t...l. ..#.. DEBU 609b 0xc003ba4640 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:06.440 UTC [cauthdsl] func1 -> DEBU 609c 0xc003ba4640 gate 1569284826439783100 evaluation succeeds" +"2019-09-24 00:27:06.440 UTC [policies] Evaluate -> DEBU 609d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:06.440 UTC [policies] Evaluate -> DEBU 609e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:06.440 UTC [policies] Evaluate -> DEBU 609f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:06.440 UTC [policies] Evaluate -> DEBU 60a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:06.440 UTC [chaincode] handleMessage -> DEBU 60a1 [39d3b48b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:06.440 UTC [chaincode] Notify -> DEBU 60a2 [39d3b48b] notifying Txid:39d3b48b777b98f85a10a18bf26ddf6d1b2ed8539854875ba6a579cd45cfa205, channelID:businesschannel" +"2019-09-24 00:27:06.440 UTC [chaincode] Execute -> DEBU 60a3 Exit" +"2019-09-24 00:27:06.440 UTC [endorser] callChaincode -> INFO 60a4 [businesschannel][39d3b48b] Exit chaincode: name:"qscc" (1ms)" +"2019-09-24 00:27:06.440 UTC [endorser] SimulateProposal -> DEBU 60a5 [businesschannel][39d3b48b] Exit" +"2019-09-24 00:27:06.440 UTC [endorser] endorseProposal -> DEBU 60a6 [businesschannel][39d3b48b] Entry chaincode: name:"qscc" " +"2019-09-24 00:27:06.440 UTC [endorser] endorseProposal -> DEBU 60a7 [businesschannel][39d3b48b] escc for chaincode name:"qscc" is escc" +"2019-09-24 00:27:06.440 UTC [endorser] EndorseWithPlugin -> DEBU 60a8 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 39d3b48b777b98f85a10a18bf26ddf6d1b2ed8539854875ba6a579cd45cfa205, chaincode: qscc}" +"2019-09-24 00:27:06.440 UTC [msp.identity] Sign -> DEBU 60a9 Sign: plaintext: 0A201416272DA959D41C2720528DCBC8...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:06.440 UTC [msp.identity] Sign -> DEBU 60aa Sign: digest: 6E85B9F04AA0F9A5677AE03555332F12BDA879A7F662730688679A1BA5BCBB0E " +"2019-09-24 00:27:06.440 UTC [endorser] EndorseWithPlugin -> DEBU 60ab Exiting {plugin: escc, channel: businesschannel, tx: 39d3b48b777b98f85a10a18bf26ddf6d1b2ed8539854875ba6a579cd45cfa205, chaincode: qscc}" +"2019-09-24 00:27:06.440 UTC [endorser] endorseProposal -> DEBU 60ac [businesschannel][39d3b48b] Exit" +"2019-09-24 00:27:06.440 UTC [endorser] func1 -> DEBU 60ad Exit: request from 172.18.0.9:51030" +"2019-09-24 00:27:06.440 UTC [comm.grpc.server] 1 -> INFO 60ae unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51030 grpc.code=OK grpc.call_duration=7.2429ms +"2019-09-24 00:27:06.444 UTC [grpc] infof -> DEBU 60af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:06.444 UTC [grpc] warningf -> DEBU 60b0 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:51030: read: connection reset by peer" +"2019-09-24 00:27:06.445 UTC [grpc] infof -> DEBU 60b1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:06.595 UTC [endorser] ProcessProposal -> DEBU 60b2 Entering: request from 172.18.0.9:51034" +"2019-09-24 00:27:06.595 UTC [protoutils] ValidateProposalMessage -> DEBU 60b3 ValidateProposalMessage starts for signed proposal 0xc003d6d7c0" +"2019-09-24 00:27:06.595 UTC [protoutils] validateChannelHeader -> DEBU 60b4 validateChannelHeader info: header type 3" +"2019-09-24 00:27:06.595 UTC [protoutils] checkSignatureFromCreator -> DEBU 60b5 begin" +"2019-09-24 00:27:06.595 UTC [msp] GetManagerForChain -> DEBU 60b6 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:06.595 UTC [protoutils] checkSignatureFromCreator -> DEBU 60b7 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:06.595 UTC [protoutils] checkSignatureFromCreator -> DEBU 60b8 creator is valid" +"2019-09-24 00:27:06.595 UTC [msp.identity] Verify -> DEBU 60b9 Verify: digest = 00000000 ac a7 2a eb d0 af 89 a3 c6 23 98 d0 de f0 39 22 |..*......#....9"| +00000010 a3 19 27 89 fb a7 70 37 e4 aa 7b 01 67 bc f4 89 |..'...p7..{.g...|" +"2019-09-24 00:27:06.595 UTC [msp.identity] Verify -> DEBU 60ba Verify: sig = 00000000 30 44 02 20 19 09 50 49 64 b9 11 80 a5 7f 56 d7 |0D. ..PId.....V.| +00000010 f0 6b 57 d1 00 37 e6 2f 3e 58 bd 70 92 d0 69 56 |.kW..7./>X.p..iV| +00000020 26 86 c6 06 02 20 2e 07 63 ba 2b 78 00 25 42 aa |&.... ..c.+x.%B.| +00000030 3c 83 68 1f e3 4e 79 d5 86 99 8a 4b d5 f3 72 ad |<.h..Ny....K..r.| +00000040 7b e1 a9 33 4d 51 |{..3MQ|" +"2019-09-24 00:27:06.595 UTC [protoutils] checkSignatureFromCreator -> DEBU 60bb exits successfully" +"2019-09-24 00:27:06.595 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 60bc validateChaincodeProposalMessage starts for proposal 0xc00338c690, header 0xc003d6dbd0" +"2019-09-24 00:27:06.595 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 60bd validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-09-24 00:27:06.595 UTC [endorser] preProcess -> DEBU 60be [businesschannel][7bbb2e7f] processing txid: 7bbb2e7fbc2cd6dfaf46a60fc72b422798afe54cef7fa652b1f7e8cbd92f40ba" +"2019-09-24 00:27:06.595 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 60bf retrieveTransactionByID() - txId = [7bbb2e7fbc2cd6dfaf46a60fc72b422798afe54cef7fa652b1f7e8cbd92f40ba]" +"2019-09-24 00:27:06.596 UTC [endorser] SimulateProposal -> DEBU 60c0 [businesschannel][7bbb2e7f] Entry chaincode: name:"qscc" " +"2019-09-24 00:27:06.596 UTC [endorser] callChaincode -> INFO 60c1 [businesschannel][7bbb2e7f] Entry chaincode: name:"qscc" " +"2019-09-24 00:27:06.596 UTC [chaincode] Execute -> DEBU 60c2 Entry" +"2019-09-24 00:27:06.596 UTC [qscc] Invoke -> DEBU 60c3 Invoke function: GetBlockByNumber on chain: businesschannel" +"2019-09-24 00:27:06.596 UTC [aclmgmt] CheckACL -> DEBU 60c4 acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" +"2019-09-24 00:27:06.596 UTC [aclmgmt] CheckACL -> DEBU 60c5 acl check(/Channel/Application/Readers)" +"2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:06.596 UTC [cauthdsl] func1 -> DEBU 60c9 0xc003f73a90 gate 1569284826596436400 evaluation starts" +"2019-09-24 00:27:06.596 UTC [cauthdsl] func2 -> DEBU 60ca 0xc003f73a90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:06.596 UTC [cauthdsl] func2 -> DEBU 60cb 0xc003f73a90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:06.596 UTC [cauthdsl] func2 -> DEBU 60cc 0xc003f73a90 principal matched by identity 0" +"2019-09-24 00:27:06.596 UTC [msp.identity] Verify -> DEBU 60cd Verify: digest = 00000000 ac a7 2a eb d0 af 89 a3 c6 23 98 d0 de f0 39 22 |..*......#....9"| +00000010 a3 19 27 89 fb a7 70 37 e4 aa 7b 01 67 bc f4 89 |..'...p7..{.g...|" +"2019-09-24 00:27:06.596 UTC [msp.identity] Verify -> DEBU 60ce Verify: sig = 00000000 30 44 02 20 19 09 50 49 64 b9 11 80 a5 7f 56 d7 |0D. ..PId.....V.| +00000010 f0 6b 57 d1 00 37 e6 2f 3e 58 bd 70 92 d0 69 56 |.kW..7./>X.p..iV| +00000020 26 86 c6 06 02 20 2e 07 63 ba 2b 78 00 25 42 aa |&.... ..c.+x.%B.| +00000030 3c 83 68 1f e3 4e 79 d5 86 99 8a 4b d5 f3 72 ad |<.h..Ny....K..r.| +00000040 7b e1 a9 33 4d 51 |{..3MQ|" +"2019-09-24 00:27:06.596 UTC [cauthdsl] func2 -> DEBU 60cf 0xc003f73a90 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:06.596 UTC [cauthdsl] func1 -> DEBU 60d0 0xc003f73a90 gate 1569284826596436400 evaluation succeeds" +"2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60d1 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60d3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:06.596 UTC [policies] Evaluate -> DEBU 60d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:06.596 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 60d5 retrieveBlockByNumber() - blockNum = [2]" +"2019-09-24 00:27:06.596 UTC [fsblkstorage] newBlockfileStream -> DEBU 60d6 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47677]" +"2019-09-24 00:27:06.596 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 60d7 Remaining bytes=[36408], Going to peek [8] bytes" +"2019-09-24 00:27:06.597 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 60d8 Returning blockbytes - length=[23782], placementInfo={fileNum=[0], startOffset=[47677], bytesOffset=[47680]}" +"2019-09-24 00:27:06.597 UTC [chaincode] handleMessage -> DEBU 60d9 [7bbb2e7f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:06.597 UTC [chaincode] Notify -> DEBU 60da [7bbb2e7f] notifying Txid:7bbb2e7fbc2cd6dfaf46a60fc72b422798afe54cef7fa652b1f7e8cbd92f40ba, channelID:businesschannel" +"2019-09-24 00:27:06.597 UTC [chaincode] Execute -> DEBU 60db Exit" +"2019-09-24 00:27:06.597 UTC [endorser] callChaincode -> INFO 60dc [businesschannel][7bbb2e7f] Exit chaincode: name:"qscc" (1ms)" +"2019-09-24 00:27:06.597 UTC [endorser] SimulateProposal -> DEBU 60dd [businesschannel][7bbb2e7f] Exit" +"2019-09-24 00:27:06.597 UTC [endorser] endorseProposal -> DEBU 60de [businesschannel][7bbb2e7f] Entry chaincode: name:"qscc" " +"2019-09-24 00:27:06.597 UTC [endorser] endorseProposal -> DEBU 60df [businesschannel][7bbb2e7f] escc for chaincode name:"qscc" is escc" +"2019-09-24 00:27:06.597 UTC [endorser] EndorseWithPlugin -> DEBU 60e0 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7bbb2e7fbc2cd6dfaf46a60fc72b422798afe54cef7fa652b1f7e8cbd92f40ba, chaincode: qscc}" +"2019-09-24 00:27:06.597 UTC [msp.identity] Sign -> DEBU 60e1 Sign: plaintext: 0A20E975A26AF2DBD2588FEE9BB826F4...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:06.597 UTC [msp.identity] Sign -> DEBU 60e2 Sign: digest: 036F1A0C7F140E137DB0FE8402C258203181C4340B85D79C2E2948C36DF8FDDD " +"2019-09-24 00:27:06.597 UTC [endorser] EndorseWithPlugin -> DEBU 60e3 Exiting {plugin: escc, channel: businesschannel, tx: 7bbb2e7fbc2cd6dfaf46a60fc72b422798afe54cef7fa652b1f7e8cbd92f40ba, chaincode: qscc}" +"2019-09-24 00:27:06.597 UTC [endorser] endorseProposal -> DEBU 60e4 [businesschannel][7bbb2e7f] Exit" +"2019-09-24 00:27:06.597 UTC [endorser] func1 -> DEBU 60e5 Exit: request from 172.18.0.9:51034" +"2019-09-24 00:27:06.597 UTC [comm.grpc.server] 1 -> INFO 60e6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51034 grpc.code=OK grpc.call_duration=2.81ms +"2019-09-24 00:27:06.601 UTC [grpc] infof -> DEBU 60e7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:06.601 UTC [grpc] infof -> DEBU 60e8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:07.022 UTC [endorser] ProcessProposal -> DEBU 60e9 Entering: request from 172.18.0.9:51038" +"2019-09-24 00:27:07.022 UTC [protoutils] ValidateProposalMessage -> DEBU 60ea ValidateProposalMessage starts for signed proposal 0xc003e4e280" +"2019-09-24 00:27:07.023 UTC [protoutils] validateChannelHeader -> DEBU 60eb validateChannelHeader info: header type 3" +"2019-09-24 00:27:07.023 UTC [protoutils] checkSignatureFromCreator -> DEBU 60ec begin" +"2019-09-24 00:27:07.024 UTC [msp] GetManagerForChain -> DEBU 60ed Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:07.024 UTC [protoutils] checkSignatureFromCreator -> DEBU 60ee creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:07.024 UTC [protoutils] checkSignatureFromCreator -> DEBU 60ef creator is valid" +"2019-09-24 00:27:07.024 UTC [msp.identity] Verify -> DEBU 60f0 Verify: digest = 00000000 70 e4 68 5a 6c 25 31 0d 35 d5 4f 8c 14 1a ae 5f |p.hZl%1.5.O...._| +00000010 38 35 c4 92 f3 94 7c b9 5e 69 1f ae 38 59 cb 8f |85....|.^i..8Y..|" +"2019-09-24 00:27:07.024 UTC [msp.identity] Verify -> DEBU 60f1 Verify: sig = 00000000 30 44 02 20 75 71 13 1c 22 65 ef a5 6a 5e c6 0b |0D. uq.."e..j^..| +00000010 74 80 f6 8e 19 33 39 70 1c fd 17 ce 9f 0a a2 53 |t....39p.......S| +00000020 a7 db a1 ef 02 20 42 02 6a 05 96 40 fe a3 ac 44 |..... B.j..@...D| +00000030 dd 2b 17 3d d0 fd ee 43 7e 8c 9b 25 d8 92 c8 7d |.+.=...C~..%...}| +00000040 96 c6 0b 19 fb 49 |.....I|" +"2019-09-24 00:27:07.025 UTC [protoutils] checkSignatureFromCreator -> DEBU 60f2 exits successfully" +"2019-09-24 00:27:07.025 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 60f3 validateChaincodeProposalMessage starts for proposal 0xc0031f7c70, header 0xc003e4e6e0" +"2019-09-24 00:27:07.025 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 60f4 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-09-24 00:27:07.026 UTC [endorser] preProcess -> DEBU 60f5 [businesschannel][c51abd18] processing txid: c51abd1857c515c8620b861a38768ba2a0355d91bfcba5f3ce1302af7b95e936" +"2019-09-24 00:27:07.026 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 60f6 retrieveTransactionByID() - txId = [c51abd1857c515c8620b861a38768ba2a0355d91bfcba5f3ce1302af7b95e936]" +"2019-09-24 00:27:07.026 UTC [endorser] SimulateProposal -> DEBU 60f7 [businesschannel][c51abd18] Entry chaincode: name:"cscc" " +"2019-09-24 00:27:07.026 UTC [endorser] callChaincode -> INFO 60f8 [businesschannel][c51abd18] Entry chaincode: name:"cscc" " +"2019-09-24 00:27:07.027 UTC [chaincode] Execute -> DEBU 60f9 Entry" +"2019-09-24 00:27:07.027 UTC [cscc] Invoke -> DEBU 60fa Invoke function: GetConfigBlock" +"2019-09-24 00:27:07.027 UTC [aclmgmt] CheckACL -> DEBU 60fb acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +"2019-09-24 00:27:07.028 UTC [aclmgmt] CheckACL -> DEBU 60fc acl check(/Channel/Application/Readers)" +"2019-09-24 00:27:07.028 UTC [policies] Evaluate -> DEBU 60fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:07.028 UTC [policies] Evaluate -> DEBU 60fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:07.028 UTC [policies] Evaluate -> DEBU 60ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:07.028 UTC [cauthdsl] func1 -> DEBU 6100 0xc0041cc190 gate 1569284827028854100 evaluation starts" +"2019-09-24 00:27:07.029 UTC [cauthdsl] func2 -> DEBU 6101 0xc0041cc190 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:07.029 UTC [cauthdsl] func2 -> DEBU 6102 0xc0041cc190 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:07.029 UTC [cauthdsl] func2 -> DEBU 6103 0xc0041cc190 principal matched by identity 0" +"2019-09-24 00:27:07.029 UTC [msp.identity] Verify -> DEBU 6104 Verify: digest = 00000000 70 e4 68 5a 6c 25 31 0d 35 d5 4f 8c 14 1a ae 5f |p.hZl%1.5.O...._| +00000010 38 35 c4 92 f3 94 7c b9 5e 69 1f ae 38 59 cb 8f |85....|.^i..8Y..|" +"2019-09-24 00:27:07.030 UTC [msp.identity] Verify -> DEBU 6105 Verify: sig = 00000000 30 44 02 20 75 71 13 1c 22 65 ef a5 6a 5e c6 0b |0D. uq.."e..j^..| +00000010 74 80 f6 8e 19 33 39 70 1c fd 17 ce 9f 0a a2 53 |t....39p.......S| +00000020 a7 db a1 ef 02 20 42 02 6a 05 96 40 fe a3 ac 44 |..... B.j..@...D| +00000030 dd 2b 17 3d d0 fd ee 43 7e 8c 9b 25 d8 92 c8 7d |.+.=...C~..%...}| +00000040 96 c6 0b 19 fb 49 |.....I|" +"2019-09-24 00:27:07.030 UTC [cauthdsl] func2 -> DEBU 6106 0xc0041cc190 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:07.030 UTC [cauthdsl] func1 -> DEBU 6107 0xc0041cc190 gate 1569284827028854100 evaluation succeeds" +"2019-09-24 00:27:07.030 UTC [policies] Evaluate -> DEBU 6108 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:07.031 UTC [policies] Evaluate -> DEBU 6109 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:07.031 UTC [policies] Evaluate -> DEBU 610a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:07.032 UTC [policies] Evaluate -> DEBU 610b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:07.032 UTC [chaincode] handleMessage -> DEBU 610c [c51abd18] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:07.032 UTC [chaincode] Notify -> DEBU 610d [c51abd18] notifying Txid:c51abd1857c515c8620b861a38768ba2a0355d91bfcba5f3ce1302af7b95e936, channelID:businesschannel" +"2019-09-24 00:27:07.033 UTC [chaincode] Execute -> DEBU 610e Exit" +"2019-09-24 00:27:07.033 UTC [endorser] callChaincode -> INFO 610f [businesschannel][c51abd18] Exit chaincode: name:"cscc" (6ms)" +"2019-09-24 00:27:07.036 UTC [endorser] SimulateProposal -> DEBU 6110 [businesschannel][c51abd18] Exit" +"2019-09-24 00:27:07.037 UTC [endorser] endorseProposal -> DEBU 6111 [businesschannel][c51abd18] Entry chaincode: name:"cscc" " +"2019-09-24 00:27:07.037 UTC [endorser] endorseProposal -> DEBU 6112 [businesschannel][c51abd18] escc for chaincode name:"cscc" is escc" +"2019-09-24 00:27:07.038 UTC [endorser] EndorseWithPlugin -> DEBU 6113 Entering endorsement for {plugin: escc, channel: businesschannel, tx: c51abd1857c515c8620b861a38768ba2a0355d91bfcba5f3ce1302af7b95e936, chaincode: cscc}" +"2019-09-24 00:27:07.038 UTC [msp.identity] Sign -> DEBU 6114 Sign: plaintext: 0A20C85A4F9366C60AA414EBEED8F2EA...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:07.039 UTC [msp.identity] Sign -> DEBU 6115 Sign: digest: 0B3E7AD993E2ACCC6AFFADD248BF84853FD69640F87AC03F0F056D610DAA3478 " +"2019-09-24 00:27:07.039 UTC [endorser] EndorseWithPlugin -> DEBU 6116 Exiting {plugin: escc, channel: businesschannel, tx: c51abd1857c515c8620b861a38768ba2a0355d91bfcba5f3ce1302af7b95e936, chaincode: cscc}" +"2019-09-24 00:27:07.039 UTC [endorser] endorseProposal -> DEBU 6117 [businesschannel][c51abd18] Exit" +"2019-09-24 00:27:07.039 UTC [endorser] func1 -> DEBU 6118 Exit: request from 172.18.0.9:51038" +"2019-09-24 00:27:07.040 UTC [comm.grpc.server] 1 -> INFO 6119 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51038 grpc.code=OK grpc.call_duration=17.9787ms +"2019-09-24 00:27:07.044 UTC [grpc] infof -> DEBU 611a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:07.044 UTC [grpc] infof -> DEBU 611b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:07.189 UTC [endorser] ProcessProposal -> DEBU 611c Entering: request from 172.18.0.9:51042" +"2019-09-24 00:27:07.189 UTC [protoutils] ValidateProposalMessage -> DEBU 611d ValidateProposalMessage starts for signed proposal 0xc003e4f720" +"2019-09-24 00:27:07.189 UTC [protoutils] validateChannelHeader -> DEBU 611e validateChannelHeader info: header type 3" +"2019-09-24 00:27:07.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 611f begin" +"2019-09-24 00:27:07.189 UTC [msp] GetManagerForChain -> DEBU 6120 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:07.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 6121 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:07.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 6122 creator is valid" +"2019-09-24 00:27:07.189 UTC [msp.identity] Verify -> DEBU 6123 Verify: digest = 00000000 8d c9 3f 87 d1 c4 af f4 3a 99 0b a6 11 9d dd b9 |..?.....:.......| +00000010 59 df a5 7a 25 fc 1b f1 ff 9c ad b6 cc 45 22 9f |Y..z%........E".|" +"2019-09-24 00:27:07.189 UTC [msp.identity] Verify -> DEBU 6124 Verify: sig = 00000000 30 44 02 20 4f a1 34 4c 38 06 7c ab 51 60 57 d7 |0D. O.4L8.|.Q`W.| +00000010 2a 2a fd 7f 6f 14 15 da 01 cd d4 79 a8 74 84 28 |**..o......y.t.(| +00000020 80 33 bb b5 02 20 0d 20 06 46 a0 c6 04 a6 ae 87 |.3... . .F......| +00000030 3d c2 53 00 5e a4 af d6 2f 7c 34 92 50 e6 7b 2a |=.S.^.../|4.P.{*| +00000040 ea b9 8f 17 85 28 |.....(|" +"2019-09-24 00:27:07.189 UTC [protoutils] checkSignatureFromCreator -> DEBU 6125 exits successfully" +"2019-09-24 00:27:07.189 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6126 validateChaincodeProposalMessage starts for proposal 0xc0034520e0, header 0xc003e4fb30" +"2019-09-24 00:27:07.189 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 6127 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-09-24 00:27:07.189 UTC [endorser] preProcess -> DEBU 6128 [businesschannel][28dcc04d] processing txid: 28dcc04db088ac939061358ea690098cb0788900b042503acc1e8d8ecbf884a8" +"2019-09-24 00:27:07.189 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 6129 retrieveTransactionByID() - txId = [28dcc04db088ac939061358ea690098cb0788900b042503acc1e8d8ecbf884a8]" +"2019-09-24 00:27:07.189 UTC [endorser] SimulateProposal -> DEBU 612a [businesschannel][28dcc04d] Entry chaincode: name:"cscc" " +"2019-09-24 00:27:07.189 UTC [endorser] callChaincode -> INFO 612b [businesschannel][28dcc04d] Entry chaincode: name:"cscc" " +"2019-09-24 00:27:07.190 UTC [chaincode] Execute -> DEBU 612c Entry" +"2019-09-24 00:27:07.190 UTC [cscc] Invoke -> DEBU 612d Invoke function: GetChannels" +"2019-09-24 00:27:07.190 UTC [msp.identity] Verify -> DEBU 612e Verify: digest = 00000000 8d c9 3f 87 d1 c4 af f4 3a 99 0b a6 11 9d dd b9 |..?.....:.......| +00000010 59 df a5 7a 25 fc 1b f1 ff 9c ad b6 cc 45 22 9f |Y..z%........E".|" +"2019-09-24 00:27:07.190 UTC [msp.identity] Verify -> DEBU 612f Verify: sig = 00000000 30 44 02 20 4f a1 34 4c 38 06 7c ab 51 60 57 d7 |0D. O.4L8.|.Q`W.| +00000010 2a 2a fd 7f 6f 14 15 da 01 cd d4 79 a8 74 84 28 |**..o......y.t.(| +00000020 80 33 bb b5 02 20 0d 20 06 46 a0 c6 04 a6 ae 87 |.3... . .F......| +00000030 3d c2 53 00 5e a4 af d6 2f 7c 34 92 50 e6 7b 2a |=.S.^.../|4.P.{*| +00000040 ea b9 8f 17 85 28 |.....(|" +"2019-09-24 00:27:07.190 UTC [chaincode] handleMessage -> DEBU 6130 [28dcc04d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:07.190 UTC [chaincode] Notify -> DEBU 6131 [28dcc04d] notifying Txid:28dcc04db088ac939061358ea690098cb0788900b042503acc1e8d8ecbf884a8, channelID:businesschannel" +"2019-09-24 00:27:07.190 UTC [chaincode] Execute -> DEBU 6132 Exit" +"2019-09-24 00:27:07.190 UTC [endorser] callChaincode -> INFO 6133 [businesschannel][28dcc04d] Exit chaincode: name:"cscc" (0ms)" +"2019-09-24 00:27:07.190 UTC [endorser] SimulateProposal -> DEBU 6134 [businesschannel][28dcc04d] Exit" +"2019-09-24 00:27:07.190 UTC [endorser] endorseProposal -> DEBU 6135 [businesschannel][28dcc04d] Entry chaincode: name:"cscc" " +"2019-09-24 00:27:07.190 UTC [endorser] endorseProposal -> DEBU 6136 [businesschannel][28dcc04d] escc for chaincode name:"cscc" is escc" +"2019-09-24 00:27:07.190 UTC [endorser] EndorseWithPlugin -> DEBU 6137 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 28dcc04db088ac939061358ea690098cb0788900b042503acc1e8d8ecbf884a8, chaincode: cscc}" +"2019-09-24 00:27:07.190 UTC [msp.identity] Sign -> DEBU 6138 Sign: plaintext: 0A20A5C0E5E90AD6B350C843E57A4FF7...455254494649434154452D2D2D2D2D0A " +"2019-09-24 00:27:07.190 UTC [msp.identity] Sign -> DEBU 6139 Sign: digest: A695DD73E199F816C78ABAFC4F65A8D53B334878ECBF28A490B935696B786C8F " +"2019-09-24 00:27:07.190 UTC [endorser] EndorseWithPlugin -> DEBU 613a Exiting {plugin: escc, channel: businesschannel, tx: 28dcc04db088ac939061358ea690098cb0788900b042503acc1e8d8ecbf884a8, chaincode: cscc}" +"2019-09-24 00:27:07.190 UTC [endorser] endorseProposal -> DEBU 613b [businesschannel][28dcc04d] Exit" +"2019-09-24 00:27:07.190 UTC [endorser] func1 -> DEBU 613c Exit: request from 172.18.0.9:51042" +"2019-09-24 00:27:07.191 UTC [comm.grpc.server] 1 -> INFO 613d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51042 grpc.code=OK grpc.call_duration=2.0036ms +"2019-09-24 00:27:07.194 UTC [grpc] infof -> DEBU 613e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:07.194 UTC [grpc] infof -> DEBU 613f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:07.319 UTC [gossip.election] waitForInterrupt -> DEBU 6140 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:27:07.319 UTC [gossip.election] IsLeader -> DEBU 6141 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:27:07.319 UTC [msp] GetDefaultSigningIdentity -> DEBU 6142 Obtaining default signing identity" +"2019-09-24 00:27:07.319 UTC [msp.identity] Sign -> DEBU 6143 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101B1801 " +"2019-09-24 00:27:07.319 UTC [msp.identity] Sign -> DEBU 6144 Sign: digest: 1B57FFDE8A0149E1BA263E678640685A2D514FF1532A65404676BD64FFA482E9 " +"2019-09-24 00:27:07.319 UTC [gossip.election] waitForInterrupt -> DEBU 6145 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:27:07.327 UTC [msp] DeserializeIdentity -> DEBU 6146 Obtaining identity" +"2019-09-24 00:27:07.327 UTC [msp] DeserializeIdentity -> DEBU 6147 Obtaining identity" +"2019-09-24 00:27:07.327 UTC [msp] DeserializeIdentity -> DEBU 6148 Obtaining identity" +"2019-09-24 00:27:07.327 UTC [msp] DeserializeIdentity -> DEBU 6149 Obtaining identity" +"2019-09-24 00:27:07.327 UTC [gossip.comm] Send -> DEBU 614a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 69 bytes to 1 peers" +"2019-09-24 00:27:07.328 UTC [msp] DeserializeIdentity -> DEBU 614b Obtaining identity" +"2019-09-24 00:27:07.328 UTC [msp] DeserializeIdentity -> DEBU 614c Obtaining identity" +"2019-09-24 00:27:07.328 UTC [gossip.comm] sendToEndpoint -> DEBU 614d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 69 bytes" +"2019-09-24 00:27:07.328 UTC [gossip.comm] sendToEndpoint -> DEBU 614e Exiting" +"2019-09-24 00:27:07.704 UTC [gossip.comm] func1 -> DEBU 614f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.704 UTC [gossip.gossip] handleMessage -> DEBU 6150 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.704 UTC [gossip.gossip] handleMessage -> DEBU 6151 Exiting" +"2019-09-24 00:27:07.705 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6152 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.705 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6153 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:07.705 UTC [msp.identity] Verify -> DEBU 6154 Verify: digest = 00000000 a1 bd 1d 40 93 47 08 1d 41 a7 e5 fe e9 d9 d6 dd |...@.G..A.......| +00000010 da ee a2 ce b8 08 6f e5 40 84 ac df 17 09 7a c6 |......o.@.....z.|" +"2019-09-24 00:27:07.705 UTC [msp.identity] Verify -> DEBU 6155 Verify: sig = 00000000 30 45 02 21 00 8d e6 23 36 f9 63 19 9e a5 33 02 |0E.!...#6.c...3.| +00000010 1e 0e 95 bf 87 97 28 1a f3 7b 36 9c 05 64 8c c1 |......(..{6..d..| +00000020 ef 76 df 57 e9 02 20 18 f4 62 f4 2a c5 61 f7 cf |.v.W.. ..b.*.a..| +00000030 c1 95 43 6f d0 26 10 5a 15 7c e5 79 f7 3a c6 04 |..Co.&.Z.|.y.:..| +00000040 3b 2b 5b 46 23 e2 70 |;+[F#.p|" +"2019-09-24 00:27:07.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 6156 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 6157 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:07.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 6158 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:07.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 6159 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:07.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 615a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:07.706 UTC [gossip.discovery] learnExistingMembers -> DEBU 615b Exiting" +"2019-09-24 00:27:07.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 615c Exiting" +"2019-09-24 00:27:07.706 UTC [gossip.discovery] handleMsgFromComm -> DEBU 615d Exiting" +"2019-09-24 00:27:07.712 UTC [gossip.pull] Hello -> DEBU 615e Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:07.712 UTC [gossip.comm] Send -> DEBU 615f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:07.712 UTC [gossip.pull] Hello -> DEBU 6160 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:27:07.712 UTC [gossip.comm] Send -> DEBU 6161 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:07.712 UTC [gossip.pull] Hello -> DEBU 6162 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:27:07.712 UTC [gossip.comm] Send -> DEBU 6163 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:07.712 UTC [gossip.comm] sendToEndpoint -> DEBU 6164 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.712 UTC [gossip.comm] sendToEndpoint -> DEBU 6165 Exiting" +"2019-09-24 00:27:07.713 UTC [gossip.comm] sendToEndpoint -> DEBU 6166 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.713 UTC [gossip.comm] sendToEndpoint -> DEBU 6167 Exiting" +"2019-09-24 00:27:07.713 UTC [gossip.comm] sendToEndpoint -> DEBU 6168 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.713 UTC [gossip.comm] sendToEndpoint -> DEBU 6169 Exiting" +"2019-09-24 00:27:07.713 UTC [msp] DeserializeIdentity -> DEBU 616a Obtaining identity" +"2019-09-24 00:27:07.713 UTC [msp] DeserializeIdentity -> DEBU 616b Obtaining identity" +"2019-09-24 00:27:07.713 UTC [msp] DeserializeIdentity -> DEBU 616c Obtaining identity" +"2019-09-24 00:27:07.714 UTC [gossip.comm] Send -> DEBU 616d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:07.714 UTC [msp] DeserializeIdentity -> DEBU 616e Obtaining identity" +"2019-09-24 00:27:07.714 UTC [gossip.comm] Send -> DEBU 616f Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:07.714 UTC [gossip.comm] sendToEndpoint -> DEBU 6170 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.714 UTC [gossip.comm] sendToEndpoint -> DEBU 6171 Exiting" +"2019-09-24 00:27:07.714 UTC [gossip.comm] sendToEndpoint -> DEBU 6172 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.714 UTC [gossip.comm] sendToEndpoint -> DEBU 6173 Exiting" +"2019-09-24 00:27:07.716 UTC [gossip.comm] func1 -> DEBU 6174 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.716 UTC [gossip.comm] func1 -> DEBU 6175 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.716 UTC [gossip.gossip] handleMessage -> DEBU 6176 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.717 UTC [gossip.gossip] handleMessage -> DEBU 6177 Exiting" +"2019-09-24 00:27:07.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6178 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.717 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6179 Exiting" +"2019-09-24 00:27:07.718 UTC [gossip.gossip] handleMessage -> DEBU 617a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.718 UTC [gossip.pull] HandleMessage -> DEBU 617b GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.718 UTC [gossip.gossip] handleMessage -> DEBU 617c Exiting" +"2019-09-24 00:27:07.722 UTC [gossip.gossip] handleMessage -> DEBU 617d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.722 UTC [gossip.pull] HandleMessage -> DEBU 617e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.722 UTC [gossip.gossip] handleMessage -> DEBU 617f Exiting" +"2019-09-24 00:27:07.724 UTC [gossip.gossip] handleMessage -> DEBU 6180 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.724 UTC [gossip.gossip] handleMessage -> DEBU 6181 Exiting" +"2019-09-24 00:27:07.724 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6182 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.724 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6183 Exiting" +"2019-09-24 00:27:07.724 UTC [gossip.comm] func1 -> DEBU 6184 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.724 UTC [gossip.gossip] handleMessage -> DEBU 6185 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.724 UTC [gossip.pull] HandleMessage -> DEBU 6186 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.724 UTC [gossip.gossip] handleMessage -> DEBU 6187 Exiting" +"2019-09-24 00:27:07.858 UTC [msp] GetDefaultSigningIdentity -> DEBU 6188 Obtaining default signing identity" +"2019-09-24 00:27:07.858 UTC [msp.identity] Sign -> DEBU 6189 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104C " +"2019-09-24 00:27:07.858 UTC [msp.identity] Sign -> DEBU 618a Sign: digest: 9FE2FBFD5BB764F11A3F0EA7D18C404E73BC83FDB1466A6B5284F6D90234028D " +"2019-09-24 00:27:07.858 UTC [msp] GetDefaultSigningIdentity -> DEBU 618b Obtaining default signing identity" +"2019-09-24 00:27:07.858 UTC [msp.identity] Sign -> DEBU 618c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:07.858 UTC [msp.identity] Sign -> DEBU 618d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:07.858 UTC [gossip.comm] Send -> DEBU 618e Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:07.859 UTC [msp] DeserializeIdentity -> DEBU 618f Obtaining identity" +"2019-09-24 00:27:07.859 UTC [gossip.comm] Send -> DEBU 6190 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:07.859 UTC [msp] DeserializeIdentity -> DEBU 6191 Obtaining identity" +"2019-09-24 00:27:07.859 UTC [gossip.comm] Send -> DEBU 6192 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6193 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6194 Exiting" +"2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6195 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6196 Exiting" +"2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6197 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.859 UTC [gossip.comm] sendToEndpoint -> DEBU 6198 Exiting" +"2019-09-24 00:27:07.861 UTC [gossip.comm] func1 -> DEBU 6199 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.861 UTC [gossip.gossip] handleMessage -> DEBU 619a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.861 UTC [gossip.gossip] handleMessage -> DEBU 619b Exiting" +"2019-09-24 00:27:07.861 UTC [gossip.discovery] handleMsgFromComm -> DEBU 619c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.861 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 619d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:07.861 UTC [msp.identity] Verify -> DEBU 619e Verify: digest = 00000000 9f e2 fb fd 5b b7 64 f1 1a 3f 0e a7 d1 8c 40 4e |....[.d..?....@N| +00000010 73 bc 83 fd b1 46 6a 6b 52 84 f6 d9 02 34 02 8d |s....FjkR....4..|" +"2019-09-24 00:27:07.861 UTC [msp.identity] Verify -> DEBU 619f Verify: sig = 00000000 30 45 02 21 00 d7 ef 68 c8 5c cc b3 19 02 1e dc |0E.!...h.\......| +00000010 5e 62 7c 73 4b be ad 24 e9 9d a4 46 39 70 e9 fe |^b|sK..$...F9p..| +00000020 7a df 08 b4 e3 02 20 12 8e 39 67 70 13 38 2b 4b |z..... ..9gp.8+K| +00000030 6f 71 7c f6 ee d1 b7 5c b7 d8 0b a6 1c 05 77 ff |oq|....\......w.| +00000040 ce f8 57 cc df e3 bd |..W....|" +"2019-09-24 00:27:07.862 UTC [msp.identity] Verify -> DEBU 61a0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:27:07.862 UTC [msp.identity] Verify -> DEBU 61a1 Verify: sig = 00000000 30 45 02 21 00 d2 e1 e9 48 a9 91 be 7c 8c 49 1f |0E.!....H...|.I.| +00000010 77 39 1e b8 57 69 fa c9 80 7d b0 72 94 f8 fc 2c |w9..Wi...}.r...,| +00000020 53 73 66 90 6d 02 20 67 64 5d 65 09 d2 81 86 44 |Ssf.m. gd]e....D| +00000030 2c 7e e4 06 00 38 4c d8 c0 c5 33 6f d1 30 fb f9 |,~...8L...3o.0..| +00000040 64 78 16 e9 e8 ba 23 |dx....#|" +"2019-09-24 00:27:07.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 61a2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:27:07.862 UTC [gossip.discovery] isSentByMe -> DEBU 61a3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:27:07.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 61a4 Exiting" +"2019-09-24 00:27:07.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61a5 Exiting" +"2019-09-24 00:27:07.863 UTC [gossip.gossip] handleMessage -> DEBU 61a6 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.864 UTC [gossip.gossip] handleMessage -> DEBU 61a7 Exiting" +"2019-09-24 00:27:07.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61a8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.864 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 61a9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:07.864 UTC [msp.identity] Verify -> DEBU 61aa Verify: digest = 00000000 9f e2 fb fd 5b b7 64 f1 1a 3f 0e a7 d1 8c 40 4e |....[.d..?....@N| +00000010 73 bc 83 fd b1 46 6a 6b 52 84 f6 d9 02 34 02 8d |s....FjkR....4..|" +"2019-09-24 00:27:07.864 UTC [msp.identity] Verify -> DEBU 61ab Verify: sig = 00000000 30 45 02 21 00 d7 ef 68 c8 5c cc b3 19 02 1e dc |0E.!...h.\......| +00000010 5e 62 7c 73 4b be ad 24 e9 9d a4 46 39 70 e9 fe |^b|sK..$...F9p..| +00000020 7a df 08 b4 e3 02 20 12 8e 39 67 70 13 38 2b 4b |z..... ..9gp.8+K| +00000030 6f 71 7c f6 ee d1 b7 5c b7 d8 0b a6 1c 05 77 ff |oq|....\......w.| +00000040 ce f8 57 cc df e3 bd |..W....|" +"2019-09-24 00:27:07.864 UTC [gossip.discovery] handleAliveMessage -> DEBU 61ac Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.864 UTC [gossip.discovery] isSentByMe -> DEBU 61ad Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.864 UTC [gossip.discovery] handleAliveMessage -> DEBU 61ae Exiting" +"2019-09-24 00:27:07.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61af Exiting" +"2019-09-24 00:27:07.865 UTC [gossip.comm] func1 -> DEBU 61b0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.865 UTC [gossip.gossip] handleMessage -> DEBU 61b1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.865 UTC [gossip.gossip] handleMessage -> DEBU 61b2 Exiting" +"2019-09-24 00:27:07.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.866 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 61b4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:07.866 UTC [msp.identity] Verify -> DEBU 61b5 Verify: digest = 00000000 9f e2 fb fd 5b b7 64 f1 1a 3f 0e a7 d1 8c 40 4e |....[.d..?....@N| +00000010 73 bc 83 fd b1 46 6a 6b 52 84 f6 d9 02 34 02 8d |s....FjkR....4..|" +"2019-09-24 00:27:07.866 UTC [msp.identity] Verify -> DEBU 61b6 Verify: sig = 00000000 30 45 02 21 00 d7 ef 68 c8 5c cc b3 19 02 1e dc |0E.!...h.\......| +00000010 5e 62 7c 73 4b be ad 24 e9 9d a4 46 39 70 e9 fe |^b|sK..$...F9p..| +00000020 7a df 08 b4 e3 02 20 12 8e 39 67 70 13 38 2b 4b |z..... ..9gp.8+K| +00000030 6f 71 7c f6 ee d1 b7 5c b7 d8 0b a6 1c 05 77 ff |oq|....\......w.| +00000040 ce f8 57 cc df e3 bd |..W....|" +"2019-09-24 00:27:07.866 UTC [gossip.discovery] handleAliveMessage -> DEBU 61b7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.866 UTC [gossip.discovery] isSentByMe -> DEBU 61b8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:07.866 UTC [gossip.discovery] handleAliveMessage -> DEBU 61b9 Exiting" +"2019-09-24 00:27:07.866 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61ba Exiting" +"2019-09-24 00:27:07.912 UTC [gossip.gossip] handleMessage -> DEBU 61bb Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.912 UTC [gossip.pull] HandleMessage -> DEBU 61bc GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61bd Obtaining identity" +"2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61be Obtaining identity" +"2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61bf Obtaining identity" +"2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61c0 Obtaining identity" +"2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61c1 Obtaining identity" +"2019-09-24 00:27:07.913 UTC [msp] DeserializeIdentity -> DEBU 61c2 Obtaining identity" +"2019-09-24 00:27:07.913 UTC [gossip.pull] SendDigest -> DEBU 61c3 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:27:07.913 UTC [gossip.gossip] handleMessage -> DEBU 61c4 Exiting" +"2019-09-24 00:27:08.021 UTC [gossip.gossip] handleMessage -> DEBU 61c5 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.021 UTC [gossip.gossip] handleMessage -> DEBU 61c6 Exiting" +"2019-09-24 00:27:08.021 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61c7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.021 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 61c8 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:08.021 UTC [msp] DeserializeIdentity -> DEBU 61c9 Obtaining identity" +"2019-09-24 00:27:08.022 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 61ca Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:08.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 61cb Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 61cc Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.022 UTC [cauthdsl] func1 -> DEBU 61d0 0xc002909a40 gate 1569284828022435200 evaluation starts" +"2019-09-24 00:27:08.022 UTC [cauthdsl] func2 -> DEBU 61d1 0xc002909a40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.022 UTC [cauthdsl] func2 -> DEBU 61d2 0xc002909a40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.022 UTC [cauthdsl] func2 -> DEBU 61d3 0xc002909a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:08.022 UTC [cauthdsl] func2 -> DEBU 61d4 0xc002909a40 principal evaluation fails" +"2019-09-24 00:27:08.022 UTC [cauthdsl] func1 -> DEBU 61d5 0xc002909a40 gate 1569284828022435200 evaluation fails" +"2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61d6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.022 UTC [policies] Evaluate -> DEBU 61d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.022 UTC [cauthdsl] func1 -> DEBU 61d9 0xc003096280 gate 1569284828022939500 evaluation starts" +"2019-09-24 00:27:08.023 UTC [cauthdsl] func2 -> DEBU 61da 0xc003096280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.023 UTC [cauthdsl] func2 -> DEBU 61db 0xc003096280 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.023 UTC [cauthdsl] func2 -> DEBU 61dc 0xc003096280 principal matched by identity 0" +"2019-09-24 00:27:08.023 UTC [msp.identity] Verify -> DEBU 61dd Verify: digest = 00000000 e3 9b df 83 d5 dd 80 a4 24 2a 92 e6 90 05 40 35 |........$*....@5| +00000010 56 c6 fd b8 1e e4 93 ce b9 79 7d 7b 04 64 82 dc |V........y}{.d..|" +"2019-09-24 00:27:08.023 UTC [msp.identity] Verify -> DEBU 61de Verify: sig = 00000000 30 44 02 20 2b b3 d2 5b d4 35 8e 00 e1 3f 9c b6 |0D. +..[.5...?..| +00000010 bb 1e f8 01 e6 61 b8 4d fb 4b cf f0 72 b2 27 58 |.....a.M.K..r.'X| +00000020 5c 59 86 7e 02 20 12 08 a3 61 41 63 6b c2 b4 75 |\Y.~. ...aAck..u| +00000030 d9 8e 36 67 a9 17 5c 7c f7 a4 f7 7b bb 04 67 19 |..6g..\|...{..g.| +00000040 38 0e f2 58 30 ff |8..X0.|" +"2019-09-24 00:27:08.023 UTC [cauthdsl] func2 -> DEBU 61df 0xc003096280 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.023 UTC [cauthdsl] func1 -> DEBU 61e0 0xc003096280 gate 1569284828022939500 evaluation succeeds" +"2019-09-24 00:27:08.023 UTC [policies] Evaluate -> DEBU 61e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.023 UTC [policies] Evaluate -> DEBU 61e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.023 UTC [policies] Evaluate -> DEBU 61e3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:08.023 UTC [policies] Evaluate -> DEBU 61e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.023 UTC [gossip.discovery] handleAliveMessage -> DEBU 61e5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:08.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 61e6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:08.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 61e7 updating membership: timestamp: " +"2019-09-24 00:27:08.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 61e8 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:08.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 61e9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:08.023 UTC [gossip.discovery] learnExistingMembers -> DEBU 61ea Exiting" +"2019-09-24 00:27:08.023 UTC [gossip.discovery] handleAliveMessage -> DEBU 61eb Exiting" +"2019-09-24 00:27:08.023 UTC [gossip.discovery] handleMsgFromComm -> DEBU 61ec Exiting" +"2019-09-24 00:27:08.023 UTC [gossip.discovery] sendMemResponse -> DEBU 61ed Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:27:08.024 UTC [msp] DeserializeIdentity -> DEBU 61ee Obtaining identity" +"2019-09-24 00:27:08.024 UTC [msp] DeserializeIdentity -> DEBU 61ef Obtaining identity" +"2019-09-24 00:27:08.024 UTC [msp] DeserializeIdentity -> DEBU 61f0 Obtaining identity" +"2019-09-24 00:27:08.024 UTC [gossip.comm] Send -> DEBU 61f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:08.024 UTC [gossip.discovery] sendMemResponse -> DEBU 61f2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020P" signature:"0E\002!\000\215\346#6\371c\031\236\2453\002\036\016\225\277\207\227(\032\363{6\234\005d\214\301\357v\337W\351\002 \030\364b\364*\305a\367\317\301\225Co\320&\020Z\025|\345y\367:\306\004;+[F#\342p" > alive: alive: alive: " +"2019-09-24 00:27:08.024 UTC [gossip.comm] sendToEndpoint -> DEBU 61f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.024 UTC [gossip.comm] sendToEndpoint -> DEBU 61f4 Exiting" +"2019-09-24 00:27:08.080 UTC [msp] DeserializeIdentity -> DEBU 61f5 Obtaining identity" +"2019-09-24 00:27:08.080 UTC [msp] DeserializeIdentity -> DEBU 61f6 Obtaining identity" +"2019-09-24 00:27:08.081 UTC [gossip.comm] Send -> DEBU 61f7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61f8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61f9 Exiting" +"2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61fb Exiting" +"2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61fc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.081 UTC [gossip.comm] sendToEndpoint -> DEBU 61fd Exiting" +"2019-09-24 00:27:08.082 UTC [gossip.comm] func1 -> DEBU 61fe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.082 UTC [gossip.gossip] handleMessage -> DEBU 61ff Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.082 UTC [msp] DeserializeIdentity -> DEBU 6200 Obtaining identity" +"2019-09-24 00:27:08.082 UTC [msp] DeserializeIdentity -> DEBU 6201 Obtaining identity" +"2019-09-24 00:27:08.083 UTC [msp] DeserializeIdentity -> DEBU 6202 Obtaining identity" +"2019-09-24 00:27:08.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6203 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:08.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6204 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6205 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 6206 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 6207 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 6208 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.083 UTC [cauthdsl] func1 -> DEBU 6209 0xc0030b2e10 gate 1569284828083489500 evaluation starts" +"2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 620a 0xc0030b2e10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 620b 0xc0030b2e10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 620c 0xc0030b2e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 620d 0xc0030b2e10 principal evaluation fails" +"2019-09-24 00:27:08.083 UTC [cauthdsl] func1 -> DEBU 620e 0xc0030b2e10 gate 1569284828083489500 evaluation fails" +"2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 620f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 6210 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.083 UTC [policies] Evaluate -> DEBU 6211 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.083 UTC [cauthdsl] func1 -> DEBU 6212 0xc0030b3650 gate 1569284828083798400 evaluation starts" +"2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 6213 0xc0030b3650 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 6214 0xc0030b3650 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.083 UTC [cauthdsl] func2 -> DEBU 6215 0xc0030b3650 principal matched by identity 0" +"2019-09-24 00:27:08.083 UTC [msp.identity] Verify -> DEBU 6216 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:08.083 UTC [msp.identity] Verify -> DEBU 6217 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:08.084 UTC [cauthdsl] func2 -> DEBU 6218 0xc0030b3650 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.084 UTC [cauthdsl] func1 -> DEBU 6219 0xc0030b3650 gate 1569284828083798400 evaluation succeeds" +"2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 621a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 621b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 621c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 621d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.084 UTC [msp] DeserializeIdentity -> DEBU 621e Obtaining identity" +"2019-09-24 00:27:08.084 UTC [msp] DeserializeIdentity -> DEBU 621f Obtaining identity" +"2019-09-24 00:27:08.084 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6220 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:08.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6221 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6222 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 6223 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 6224 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.084 UTC [policies] Evaluate -> DEBU 6225 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.084 UTC [cauthdsl] func1 -> DEBU 6226 0xc002846e20 gate 1569284828084777000 evaluation starts" +"2019-09-24 00:27:08.084 UTC [cauthdsl] func2 -> DEBU 6227 0xc002846e20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.084 UTC [cauthdsl] func2 -> DEBU 6228 0xc002846e20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.084 UTC [cauthdsl] func2 -> DEBU 6229 0xc002846e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:08.085 UTC [cauthdsl] func2 -> DEBU 622a 0xc002846e20 principal evaluation fails" +"2019-09-24 00:27:08.085 UTC [cauthdsl] func1 -> DEBU 622b 0xc002846e20 gate 1569284828084777000 evaluation fails" +"2019-09-24 00:27:08.085 UTC [policies] Evaluate -> DEBU 622c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.085 UTC [policies] Evaluate -> DEBU 622d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.085 UTC [policies] Evaluate -> DEBU 622e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.086 UTC [cauthdsl] func1 -> DEBU 622f 0xc002847660 gate 1569284828086093500 evaluation starts" +"2019-09-24 00:27:08.086 UTC [cauthdsl] func2 -> DEBU 6230 0xc002847660 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.086 UTC [cauthdsl] func2 -> DEBU 6231 0xc002847660 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.088 UTC [cauthdsl] func2 -> DEBU 6232 0xc002847660 principal matched by identity 0" +"2019-09-24 00:27:08.088 UTC [msp.identity] Verify -> DEBU 6233 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:08.088 UTC [msp.identity] Verify -> DEBU 6234 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:08.089 UTC [cauthdsl] func2 -> DEBU 6235 0xc002847660 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.090 UTC [cauthdsl] func1 -> DEBU 6236 0xc002847660 gate 1569284828086093500 evaluation succeeds" +"2019-09-24 00:27:08.090 UTC [policies] Evaluate -> DEBU 6237 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.090 UTC [policies] Evaluate -> DEBU 6238 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.090 UTC [policies] Evaluate -> DEBU 6239 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:08.091 UTC [policies] Evaluate -> DEBU 623a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.091 UTC [msp.identity] Verify -> DEBU 623b Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +"2019-09-24 00:27:08.091 UTC [msp.identity] Verify -> DEBU 623c Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +"2019-09-24 00:27:08.087 UTC [msp] DeserializeIdentity -> DEBU 623d Obtaining identity" +"2019-09-24 00:27:08.092 UTC [msp.identity] Verify -> DEBU 623e Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:08.092 UTC [msp.identity] Verify -> DEBU 623f Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:08.093 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6240 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.093 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6241 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.093 UTC [policies] Evaluate -> DEBU 6243 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.092 UTC [msp] DeserializeIdentity -> DEBU 6242 Obtaining identity" +"2019-09-24 00:27:08.094 UTC [gossip.comm] Send -> DEBU 6244 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +"2019-09-24 00:27:08.094 UTC [msp] DeserializeIdentity -> DEBU 6245 Obtaining identity" +"2019-09-24 00:27:08.095 UTC [msp] DeserializeIdentity -> DEBU 6246 Obtaining identity" +"2019-09-24 00:27:08.095 UTC [gossip.comm] sendToEndpoint -> DEBU 6247 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:08.095 UTC [gossip.comm] sendToEndpoint -> DEBU 6248 Exiting" +"2019-09-24 00:27:08.095 UTC [gossip.comm] sendToEndpoint -> DEBU 6249 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:08.095 UTC [gossip.comm] sendToEndpoint -> DEBU 624a Exiting" +"2019-09-24 00:27:08.096 UTC [gossip.comm] sendToEndpoint -> DEBU 624b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 00:27:08.096 UTC [gossip.comm] sendToEndpoint -> DEBU 624c Exiting" +"2019-09-24 00:27:08.097 UTC [gossip.comm] func1 -> DEBU 624d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.098 UTC [policies] Evaluate -> DEBU 624e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.098 UTC [policies] Evaluate -> DEBU 624f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.098 UTC [cauthdsl] func1 -> DEBU 6250 0xc0030aead0 gate 1569284828098893100 evaluation starts" +"2019-09-24 00:27:08.099 UTC [cauthdsl] func2 -> DEBU 6251 0xc0030aead0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.099 UTC [cauthdsl] func2 -> DEBU 6252 0xc0030aead0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.099 UTC [cauthdsl] func2 -> DEBU 6253 0xc0030aead0 principal matched by identity 0" +"2019-09-24 00:27:08.099 UTC [msp.identity] Verify -> DEBU 6254 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:08.099 UTC [msp.identity] Verify -> DEBU 6255 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:08.100 UTC [cauthdsl] func2 -> DEBU 6256 0xc0030aead0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.100 UTC [cauthdsl] func1 -> DEBU 6257 0xc0030aead0 gate 1569284828098893100 evaluation succeeds" +"2019-09-24 00:27:08.100 UTC [policies] Evaluate -> DEBU 6258 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.101 UTC [policies] Evaluate -> DEBU 6259 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.101 UTC [policies] Evaluate -> DEBU 625a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:08.101 UTC [policies] Evaluate -> DEBU 625b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.101 UTC [gossip.gossip] handleMessage -> DEBU 625c Exiting" +"2019-09-24 00:27:08.101 UTC [gossip.gossip] handleMessage -> DEBU 625d Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.101 UTC [msp] DeserializeIdentity -> DEBU 625e Obtaining identity" +"2019-09-24 00:27:08.102 UTC [msp] DeserializeIdentity -> DEBU 625f Obtaining identity" +"2019-09-24 00:27:08.102 UTC [msp] DeserializeIdentity -> DEBU 6260 Obtaining identity" +"2019-09-24 00:27:08.103 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6261 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:08.103 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6262 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.103 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6263 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.103 UTC [policies] Evaluate -> DEBU 6264 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.104 UTC [policies] Evaluate -> DEBU 6265 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.104 UTC [policies] Evaluate -> DEBU 6266 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.104 UTC [cauthdsl] func1 -> DEBU 6267 0xc0034705e0 gate 1569284828104307600 evaluation starts" +"2019-09-24 00:27:08.104 UTC [cauthdsl] func2 -> DEBU 6268 0xc0034705e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.104 UTC [cauthdsl] func2 -> DEBU 6269 0xc0034705e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.104 UTC [cauthdsl] func2 -> DEBU 626a 0xc0034705e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:08.104 UTC [cauthdsl] func2 -> DEBU 626b 0xc0034705e0 principal evaluation fails" +"2019-09-24 00:27:08.104 UTC [cauthdsl] func1 -> DEBU 626c 0xc0034705e0 gate 1569284828104307600 evaluation fails" +"2019-09-24 00:27:08.105 UTC [policies] Evaluate -> DEBU 626d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.105 UTC [policies] Evaluate -> DEBU 626e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.105 UTC [policies] Evaluate -> DEBU 626f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.105 UTC [cauthdsl] func1 -> DEBU 6270 0xc003470e20 gate 1569284828105472500 evaluation starts" +"2019-09-24 00:27:08.105 UTC [cauthdsl] func2 -> DEBU 6271 0xc003470e20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.105 UTC [cauthdsl] func2 -> DEBU 6272 0xc003470e20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.106 UTC [cauthdsl] func2 -> DEBU 6273 0xc003470e20 principal matched by identity 0" +"2019-09-24 00:27:08.106 UTC [msp.identity] Verify -> DEBU 6274 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:08.106 UTC [msp.identity] Verify -> DEBU 6275 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:08.106 UTC [cauthdsl] func2 -> DEBU 6276 0xc003470e20 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.107 UTC [cauthdsl] func1 -> DEBU 6277 0xc003470e20 gate 1569284828105472500 evaluation succeeds" +"2019-09-24 00:27:08.107 UTC [policies] Evaluate -> DEBU 6278 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.107 UTC [policies] Evaluate -> DEBU 6279 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.107 UTC [policies] Evaluate -> DEBU 627a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:08.107 UTC [policies] Evaluate -> DEBU 627b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.108 UTC [msp] DeserializeIdentity -> DEBU 627c Obtaining identity" +"2019-09-24 00:27:08.108 UTC [msp] DeserializeIdentity -> DEBU 627d Obtaining identity" +"2019-09-24 00:27:08.108 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 627e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:08.108 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 627f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.108 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6280 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.108 UTC [policies] Evaluate -> DEBU 6281 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.108 UTC [policies] Evaluate -> DEBU 6282 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.108 UTC [policies] Evaluate -> DEBU 6283 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.109 UTC [cauthdsl] func1 -> DEBU 6284 0xc0041465f0 gate 1569284828109004000 evaluation starts" +"2019-09-24 00:27:08.109 UTC [cauthdsl] func2 -> DEBU 6285 0xc0041465f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.109 UTC [cauthdsl] func2 -> DEBU 6286 0xc0041465f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.109 UTC [cauthdsl] func2 -> DEBU 6287 0xc0041465f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:08.109 UTC [cauthdsl] func2 -> DEBU 6288 0xc0041465f0 principal evaluation fails" +"2019-09-24 00:27:08.109 UTC [cauthdsl] func1 -> DEBU 6289 0xc0041465f0 gate 1569284828109004000 evaluation fails" +"2019-09-24 00:27:08.109 UTC [policies] Evaluate -> DEBU 628a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.109 UTC [policies] Evaluate -> DEBU 628b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.110 UTC [policies] Evaluate -> DEBU 628c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.110 UTC [cauthdsl] func1 -> DEBU 628d 0xc004146e30 gate 1569284828110074800 evaluation starts" +"2019-09-24 00:27:08.110 UTC [cauthdsl] func2 -> DEBU 628e 0xc004146e30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.110 UTC [cauthdsl] func2 -> DEBU 628f 0xc004146e30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.110 UTC [cauthdsl] func2 -> DEBU 6290 0xc004146e30 principal matched by identity 0" +"2019-09-24 00:27:08.110 UTC [msp.identity] Verify -> DEBU 6291 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:08.110 UTC [msp.identity] Verify -> DEBU 6292 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:08.110 UTC [cauthdsl] func2 -> DEBU 6293 0xc004146e30 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.110 UTC [cauthdsl] func1 -> DEBU 6294 0xc004146e30 gate 1569284828110074800 evaluation succeeds" +"2019-09-24 00:27:08.111 UTC [policies] Evaluate -> DEBU 6295 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.111 UTC [policies] Evaluate -> DEBU 6296 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.111 UTC [policies] Evaluate -> DEBU 6297 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:08.111 UTC [policies] Evaluate -> DEBU 6298 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.111 UTC [msp.identity] Verify -> DEBU 6299 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:08.111 UTC [msp.identity] Verify -> DEBU 629a Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:08.111 UTC [msp.identity] Verify -> DEBU 629b Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +"2019-09-24 00:27:08.111 UTC [msp.identity] Verify -> DEBU 629c Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +"2019-09-24 00:27:08.112 UTC [gossip.gossip] handleMessage -> DEBU 629d Exiting" +"2019-09-24 00:27:08.112 UTC [gossip.gossip] handleMessage -> DEBU 629e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.112 UTC [msp.identity] Verify -> DEBU 629f Verify: digest = 00000000 5a 48 6a ea e1 69 73 fd 55 6e c7 4b 6b 7e f2 78 |ZHj..is.Un.Kk~.x| +00000010 46 44 8d a7 da 23 ab c5 6a e4 b2 77 0c 18 f5 cd |FD...#..j..w....|" +"2019-09-24 00:27:08.112 UTC [msp.identity] Verify -> DEBU 62a0 Verify: sig = 00000000 30 45 02 21 00 80 34 3b 63 c1 3d 6f fc 09 a0 38 |0E.!..4;c.=o...8| +00000010 56 54 ac 0e 32 98 54 60 41 30 82 f8 63 69 ff b2 |VT..2.T`A0..ci..| +00000020 3d 2a fe 96 5a 02 20 3f 1b 99 08 4b 70 87 5d 39 |=*..Z. ?...Kp.]9| +00000030 26 d1 f9 ee a1 38 66 3c ab b6 c5 19 cf 40 3b 7d |&....8f<.....@;}| +00000040 b1 3d c2 0c 5d 12 fe |.=..]..|" +"2019-09-24 00:27:08.113 UTC [msp.identity] Verify -> DEBU 62a1 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:08.113 UTC [msp.identity] Verify -> DEBU 62a2 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:08.113 UTC [msp] DeserializeIdentity -> DEBU 62a3 Obtaining identity" +"2019-09-24 00:27:08.113 UTC [msp] DeserializeIdentity -> DEBU 62a4 Obtaining identity" +"2019-09-24 00:27:08.113 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62a5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:08.113 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62a6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.114 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62a7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.114 UTC [cauthdsl] func1 -> DEBU 62ab 0xc0003464c0 gate 1569284828114153000 evaluation starts" +"2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62ac 0xc0003464c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62ad 0xc0003464c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62ae 0xc0003464c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62af 0xc0003464c0 principal evaluation fails" +"2019-09-24 00:27:08.114 UTC [cauthdsl] func1 -> DEBU 62b0 0xc0003464c0 gate 1569284828114153000 evaluation fails" +"2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.114 UTC [policies] Evaluate -> DEBU 62b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.114 UTC [cauthdsl] func1 -> DEBU 62b4 0xc000346d00 gate 1569284828114771000 evaluation starts" +"2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62b5 0xc000346d00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62b6 0xc000346d00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.114 UTC [cauthdsl] func2 -> DEBU 62b7 0xc000346d00 principal matched by identity 0" +"2019-09-24 00:27:08.114 UTC [msp.identity] Verify -> DEBU 62b8 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:08.115 UTC [msp.identity] Verify -> DEBU 62b9 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:08.115 UTC [cauthdsl] func2 -> DEBU 62ba 0xc000346d00 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.115 UTC [cauthdsl] func1 -> DEBU 62bb 0xc000346d00 gate 1569284828114771000 evaluation succeeds" +"2019-09-24 00:27:08.115 UTC [policies] Evaluate -> DEBU 62bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.115 UTC [policies] Evaluate -> DEBU 62bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.115 UTC [policies] Evaluate -> DEBU 62be Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:08.115 UTC [policies] Evaluate -> DEBU 62bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.115 UTC [msp] DeserializeIdentity -> DEBU 62c0 Obtaining identity" +"2019-09-24 00:27:08.115 UTC [msp] DeserializeIdentity -> DEBU 62c1 Obtaining identity" +"2019-09-24 00:27:08.116 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:08.116 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62c3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.116 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62c4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.116 UTC [policies] Evaluate -> DEBU 62c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.117 UTC [policies] Evaluate -> DEBU 62c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.117 UTC [policies] Evaluate -> DEBU 62c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.117 UTC [cauthdsl] func1 -> DEBU 62c8 0xc0003564d0 gate 1569284828117528900 evaluation starts" +"2019-09-24 00:27:08.117 UTC [cauthdsl] func2 -> DEBU 62c9 0xc0003564d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.118 UTC [cauthdsl] func2 -> DEBU 62ca 0xc0003564d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.118 UTC [cauthdsl] func2 -> DEBU 62cb 0xc0003564d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:08.118 UTC [cauthdsl] func2 -> DEBU 62cc 0xc0003564d0 principal evaluation fails" +"2019-09-24 00:27:08.118 UTC [cauthdsl] func1 -> DEBU 62cd 0xc0003564d0 gate 1569284828117528900 evaluation fails" +"2019-09-24 00:27:08.118 UTC [policies] Evaluate -> DEBU 62ce Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.118 UTC [policies] Evaluate -> DEBU 62cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.118 UTC [policies] Evaluate -> DEBU 62d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.118 UTC [cauthdsl] func1 -> DEBU 62d1 0xc000356d10 gate 1569284828118874800 evaluation starts" +"2019-09-24 00:27:08.119 UTC [cauthdsl] func2 -> DEBU 62d2 0xc000356d10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.119 UTC [cauthdsl] func2 -> DEBU 62d3 0xc000356d10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.119 UTC [cauthdsl] func2 -> DEBU 62d4 0xc000356d10 principal matched by identity 0" +"2019-09-24 00:27:08.119 UTC [msp.identity] Verify -> DEBU 62d5 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:08.120 UTC [msp.identity] Verify -> DEBU 62d6 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:08.120 UTC [cauthdsl] func2 -> DEBU 62d7 0xc000356d10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.120 UTC [cauthdsl] func1 -> DEBU 62d8 0xc000356d10 gate 1569284828118874800 evaluation succeeds" +"2019-09-24 00:27:08.120 UTC [policies] Evaluate -> DEBU 62d9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.120 UTC [policies] Evaluate -> DEBU 62da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.120 UTC [policies] Evaluate -> DEBU 62db Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:08.120 UTC [policies] Evaluate -> DEBU 62dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.120 UTC [gossip.gossip] handleMessage -> DEBU 62dd Exiting" +"2019-09-24 00:27:08.293 UTC [msp] DeserializeIdentity -> DEBU 62de Obtaining identity" +"2019-09-24 00:27:08.293 UTC [msp] DeserializeIdentity -> DEBU 62df Obtaining identity" +"2019-09-24 00:27:08.293 UTC [gossip.pull] Hello -> DEBU 62e0 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:08.294 UTC [msp] DeserializeIdentity -> DEBU 62e1 Obtaining identity" +"2019-09-24 00:27:08.294 UTC [msp] DeserializeIdentity -> DEBU 62e2 Obtaining identity" +"2019-09-24 00:27:08.295 UTC [gossip.comm] Send -> DEBU 62e3 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:08.295 UTC [gossip.comm] sendToEndpoint -> DEBU 62e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.295 UTC [gossip.comm] sendToEndpoint -> DEBU 62e5 Exiting" +"2019-09-24 00:27:08.296 UTC [gossip.comm] func1 -> DEBU 62e6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.296 UTC [gossip.gossip] handleMessage -> DEBU 62e7 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.297 UTC [gossip.pull] HandleMessage -> DEBU 62e8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.297 UTC [gossip.gossip] handleMessage -> DEBU 62e9 Exiting" +"2019-09-24 00:27:08.582 UTC [gossip.comm] func1 -> DEBU 62ea Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.583 UTC [gossip.gossip] handleMessage -> DEBU 62eb Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.583 UTC [msp] DeserializeIdentity -> DEBU 62ec Obtaining identity" +"2019-09-24 00:27:08.583 UTC [msp] DeserializeIdentity -> DEBU 62ed Obtaining identity" +"2019-09-24 00:27:08.584 UTC [gossip.gossip] handleMessage -> DEBU 62ee Exiting" +"2019-09-24 00:27:08.598 UTC [gossip.comm] func1 -> DEBU 62ef Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:08.598 UTC [gossip.gossip] handleMessage -> DEBU 62f0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:08.598 UTC [msp.identity] Verify -> DEBU 62f1 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:08.599 UTC [msp.identity] Verify -> DEBU 62f2 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:08.599 UTC [gossip.gossip] handleMessage -> DEBU 62f3 Exiting" +"2019-09-24 00:27:08.771 UTC [gossip.comm] func1 -> DEBU 62f4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.771 UTC [gossip.gossip] handleMessage -> DEBU 62f5 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.772 UTC [gossip.gossip] handleMessage -> DEBU 62f6 Exiting" +"2019-09-24 00:27:08.772 UTC [gossip.discovery] handleMsgFromComm -> DEBU 62f7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.773 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 62f8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:08.774 UTC [msp] DeserializeIdentity -> DEBU 62f9 Obtaining identity" +"2019-09-24 00:27:08.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 62fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:08.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62fb Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62fc Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:08.779 UTC [policies] Evaluate -> DEBU 62fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:08.779 UTC [policies] Evaluate -> DEBU 62fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:08.779 UTC [policies] Evaluate -> DEBU 62ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:08.780 UTC [cauthdsl] func1 -> DEBU 6300 0xc0029ec600 gate 1569284828780313800 evaluation starts" +"2019-09-24 00:27:08.780 UTC [cauthdsl] func2 -> DEBU 6301 0xc0029ec600 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.782 UTC [cauthdsl] func2 -> DEBU 6302 0xc0029ec600 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.782 UTC [cauthdsl] func2 -> DEBU 6303 0xc0029ec600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:08.783 UTC [cauthdsl] func2 -> DEBU 6304 0xc0029ec600 principal evaluation fails" +"2019-09-24 00:27:08.784 UTC [cauthdsl] func1 -> DEBU 6305 0xc0029ec600 gate 1569284828780313800 evaluation fails" +"2019-09-24 00:27:08.785 UTC [policies] Evaluate -> DEBU 6306 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.786 UTC [policies] Evaluate -> DEBU 6307 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:08.786 UTC [policies] Evaluate -> DEBU 6308 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:08.787 UTC [cauthdsl] func1 -> DEBU 6309 0xc0029ece40 gate 1569284828787049800 evaluation starts" +"2019-09-24 00:27:08.787 UTC [cauthdsl] func2 -> DEBU 630a 0xc0029ece40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:08.787 UTC [cauthdsl] func2 -> DEBU 630b 0xc0029ece40 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:08.788 UTC [cauthdsl] func2 -> DEBU 630c 0xc0029ece40 principal matched by identity 0" +"2019-09-24 00:27:08.788 UTC [msp.identity] Verify -> DEBU 630d Verify: digest = 00000000 48 f9 4b 02 cc bd b2 90 26 79 12 03 cf a7 13 99 |H.K.....&y......| +00000010 e2 b5 c3 2b d2 89 74 4d 7f a5 6d c6 b5 5a 3b 1e |...+..tM..m..Z;.|" +"2019-09-24 00:27:08.789 UTC [msp.identity] Verify -> DEBU 630e Verify: sig = 00000000 30 44 02 20 54 37 66 29 1a 30 58 9d 01 d2 77 a4 |0D. T7f).0X...w.| +00000010 5c fe 1f ef 96 45 f3 14 f7 65 3d 57 87 26 00 b1 |\....E...e=W.&..| +00000020 c7 f2 4b 35 02 20 5a 8f 70 72 67 24 69 fe b8 77 |..K5. Z.prg$i..w| +00000030 e6 c5 d7 3c c1 75 8e 4d 63 d2 6c 7b c2 fd 0b 7f |...<.u.Mc.l{....| +00000040 9e f6 c0 9d d9 83 |......|" +"2019-09-24 00:27:08.789 UTC [cauthdsl] func2 -> DEBU 630f 0xc0029ece40 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:08.789 UTC [cauthdsl] func1 -> DEBU 6310 0xc0029ece40 gate 1569284828787049800 evaluation succeeds" +"2019-09-24 00:27:08.790 UTC [policies] Evaluate -> DEBU 6311 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.791 UTC [policies] Evaluate -> DEBU 6312 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:08.792 UTC [policies] Evaluate -> DEBU 6313 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:08.793 UTC [policies] Evaluate -> DEBU 6314 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:08.793 UTC [gossip.discovery] handleAliveMessage -> DEBU 6315 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:08.794 UTC [gossip.discovery] learnExistingMembers -> DEBU 6316 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:08.794 UTC [gossip.discovery] learnExistingMembers -> DEBU 6317 updating membership: timestamp: " +"2019-09-24 00:27:08.794 UTC [gossip.discovery] learnExistingMembers -> DEBU 6318 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:08.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 6319 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:08.795 UTC [gossip.discovery] learnExistingMembers -> DEBU 631a Exiting" +"2019-09-24 00:27:08.795 UTC [gossip.discovery] handleAliveMessage -> DEBU 631b Exiting" +"2019-09-24 00:27:08.795 UTC [gossip.discovery] handleMsgFromComm -> DEBU 631c Exiting" +"2019-09-24 00:27:08.795 UTC [gossip.discovery] sendMemResponse -> DEBU 631d Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:27:08.796 UTC [msp] DeserializeIdentity -> DEBU 631e Obtaining identity" +"2019-09-24 00:27:08.796 UTC [msp] DeserializeIdentity -> DEBU 631f Obtaining identity" +"2019-09-24 00:27:08.796 UTC [msp] DeserializeIdentity -> DEBU 6320 Obtaining identity" +"2019-09-24 00:27:08.796 UTC [gossip.comm] Send -> DEBU 6321 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:08.796 UTC [gossip.discovery] sendMemResponse -> DEBU 6322 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020P" signature:"0E\002!\000\215\346#6\371c\031\236\2453\002\036\016\225\277\207\227(\032\363{6\234\005d\214\301\357v\337W\351\002 \030\364b\364*\305a\367\317\301\225Co\320&\020Z\025|\345y\367:\306\004;+[F#\342p" > alive: alive: alive: " +"2019-09-24 00:27:08.796 UTC [gossip.comm] sendToEndpoint -> DEBU 6323 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.796 UTC [gossip.comm] sendToEndpoint -> DEBU 6324 Exiting" +"2019-09-24 00:27:08.817 UTC [gossip.comm] func1 -> DEBU 6325 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.817 UTC [gossip.gossip] handleMessage -> DEBU 6326 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.818 UTC [gossip.pull] HandleMessage -> DEBU 6327 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.818 UTC [msp] DeserializeIdentity -> DEBU 6328 Obtaining identity" +"2019-09-24 00:27:08.818 UTC [msp] DeserializeIdentity -> DEBU 6329 Obtaining identity" +"2019-09-24 00:27:08.818 UTC [msp] DeserializeIdentity -> DEBU 632a Obtaining identity" +"2019-09-24 00:27:08.819 UTC [msp] DeserializeIdentity -> DEBU 632b Obtaining identity" +"2019-09-24 00:27:08.819 UTC [msp] DeserializeIdentity -> DEBU 632c Obtaining identity" +"2019-09-24 00:27:08.819 UTC [msp] DeserializeIdentity -> DEBU 632d Obtaining identity" +"2019-09-24 00:27:08.819 UTC [gossip.pull] SendDigest -> DEBU 632e Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:27:08.819 UTC [gossip.gossip] handleMessage -> DEBU 632f Exiting" +"2019-09-24 00:27:08.839 UTC [gossip.comm] func1 -> DEBU 6330 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.839 UTC [gossip.gossip] handleMessage -> DEBU 6331 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.839 UTC [gossip.pull] HandleMessage -> DEBU 6332 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:08.839 UTC [gossip.pull] SendDigest -> DEBU 6333 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:08.839 UTC [gossip.gossip] handleMessage -> DEBU 6334 Exiting" +"2019-09-24 00:27:09.073 UTC [gossip.gossip] handleMessage -> DEBU 6335 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:09.073 UTC [msp] DeserializeIdentity -> DEBU 6336 Obtaining identity" +"2019-09-24 00:27:09.073 UTC [msp] DeserializeIdentity -> DEBU 6337 Obtaining identity" +"2019-09-24 00:27:09.073 UTC [msp] DeserializeIdentity -> DEBU 6338 Obtaining identity" +"2019-09-24 00:27:09.073 UTC [gossip.gossip] handleMessage -> DEBU 6339 Exiting" +"2019-09-24 00:27:09.514 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 633a Sleeping 25s" +"2019-09-24 00:27:09.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 633b Obtaining default signing identity" +"2019-09-24 00:27:09.599 UTC [msp.identity] Sign -> DEBU 633c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104D " +"2019-09-24 00:27:09.599 UTC [msp.identity] Sign -> DEBU 633d Sign: digest: 34B6EC2CED652B88A625950B20E893A2D1D75D60CA8A08CBF8B90B812230F40E " +"2019-09-24 00:27:09.599 UTC [msp] GetDefaultSigningIdentity -> DEBU 633e Obtaining default signing identity" +"2019-09-24 00:27:09.599 UTC [msp.identity] Sign -> DEBU 633f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:09.599 UTC [msp.identity] Sign -> DEBU 6340 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:09.599 UTC [gossip.discovery] periodicalSendAlive -> DEBU 6341 Sleeping 5s" +"2019-09-24 00:27:09.600 UTC [msp] DeserializeIdentity -> DEBU 6342 Obtaining identity" +"2019-09-24 00:27:09.601 UTC [msp] DeserializeIdentity -> DEBU 6343 Obtaining identity" +"2019-09-24 00:27:09.601 UTC [msp] DeserializeIdentity -> DEBU 6344 Obtaining identity" +"2019-09-24 00:27:09.601 UTC [gossip.comm] Send -> DEBU 6345 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:09.602 UTC [gossip.comm] Send -> DEBU 6346 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:09.602 UTC [gossip.comm] sendToEndpoint -> DEBU 6347 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.603 UTC [gossip.comm] sendToEndpoint -> DEBU 6349 Exiting" +"2019-09-24 00:27:09.603 UTC [msp] DeserializeIdentity -> DEBU 6348 Obtaining identity" +"2019-09-24 00:27:09.603 UTC [gossip.comm] Send -> DEBU 634a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:09.603 UTC [gossip.comm] sendToEndpoint -> DEBU 634b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.603 UTC [gossip.comm] sendToEndpoint -> DEBU 634c Exiting" +"2019-09-24 00:27:09.604 UTC [gossip.comm] sendToEndpoint -> DEBU 634d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.604 UTC [gossip.comm] sendToEndpoint -> DEBU 634e Exiting" +"2019-09-24 00:27:09.648 UTC [gossip.comm] func1 -> DEBU 634f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:09.648 UTC [gossip.gossip] handleMessage -> DEBU 6350 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:09.649 UTC [gossip.pull] HandleMessage -> DEBU 6351 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:09.649 UTC [gossip.pull] SendDigest -> DEBU 6352 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:09.649 UTC [gossip.gossip] handleMessage -> DEBU 6353 Exiting" +"2019-09-24 00:27:09.783 UTC [gossip.comm] func1 -> DEBU 6354 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020Q" signature:"0D\002 Q\221^\301\352O\272\230\216h)\367,\200\333\305VK\233\300\265\225\355@I\337H\320U\203XS\002 )\253:Z\2541\"m\326=\360\020S\261\355l#+l\361\330{A2\251\244/\305\323\214\022>" secret_envelope:\2351(#" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:09.783 UTC [gossip.gossip] handleMessage -> DEBU 6355 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020Q" signature:"0D\002 Q\221^\301\352O\272\230\216h)\367,\200\333\305VK\233\300\265\225\355@I\337H\320U\203XS\002 )\253:Z\2541\"m\326=\360\020S\261\355l#+l\361\330{A2\251\244/\305\323\214\022>" secret_envelope:\2351(#" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:09.783 UTC [gossip.gossip] handleMessage -> DEBU 6356 Exiting" +"2019-09-24 00:27:09.783 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6357 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020Q" signature:"0D\002 Q\221^\301\352O\272\230\216h)\367,\200\333\305VK\233\300\265\225\355@I\337H\320U\203XS\002 )\253:Z\2541\"m\326=\360\020S\261\355l#+l\361\330{A2\251\244/\305\323\214\022>" secret_envelope:\2351(#" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:09.783 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6358 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:09.783 UTC [msp.identity] Verify -> DEBU 6359 Verify: digest = 00000000 8a 64 36 3c e8 c1 47 41 0c 0c 34 14 1e 9a d2 b5 |.d6<..GA..4.....| +00000010 34 07 a9 c0 03 d2 58 1c e8 9d 35 8a 7c ca d5 18 |4.....X...5.|...|" +"2019-09-24 00:27:09.783 UTC [msp.identity] Verify -> DEBU 635a Verify: sig = 00000000 30 44 02 20 51 91 5e c1 ea 4f ba 98 8e 68 29 f7 |0D. Q.^..O...h).| +00000010 2c 80 db c5 56 4b 9b c0 b5 95 ed 40 49 df 48 d0 |,...VK.....@I.H.| +00000020 55 83 58 53 02 20 29 ab 3a 5a ac 31 22 6d d6 3d |U.XS. ).:Z.1"m.=| +00000030 f0 10 53 b1 ed 6c 23 2b 6c f1 d8 7b 41 32 a9 a4 |..S..l#+l..{A2..| +00000040 2f c5 d3 8c 12 3e |/....>|" +"2019-09-24 00:27:09.784 UTC [msp.identity] Verify -> DEBU 635b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:27:09.784 UTC [msp.identity] Verify -> DEBU 635c Verify: sig = 00000000 30 45 02 21 00 b0 df 5f 42 ff 23 e7 17 06 6e 4f |0E.!..._B.#...nO| +00000010 cc 71 fc 0a de 9a 6f 5c 43 03 43 d1 82 e5 4d 5d |.q....o\C.C...M]| +00000020 e1 f8 da 0d fc 02 20 13 20 c9 4c 98 1b a5 55 7a |...... . .L...Uz| +00000030 27 43 7a 29 f0 57 e2 0d 30 23 40 ea 1e 88 80 46 |'Cz).W..0#@....F| +00000040 d7 26 3e 9d 31 28 23 |.&>.1(#|" +"2019-09-24 00:27:09.784 UTC [gossip.discovery] handleAliveMessage -> DEBU 635d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:27:09.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 635e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:27:09.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 635f updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:09.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 6360 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:09.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 6361 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:09.784 UTC [gossip.discovery] learnExistingMembers -> DEBU 6362 Exiting" +"2019-09-24 00:27:09.784 UTC [gossip.discovery] handleAliveMessage -> DEBU 6363 Exiting" +"2019-09-24 00:27:09.784 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6364 Exiting" +"2019-09-24 00:27:09.784 UTC [gossip.discovery] sendMemResponse -> DEBU 6365 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:27:09.784 UTC [msp] DeserializeIdentity -> DEBU 6366 Obtaining identity" +"2019-09-24 00:27:09.784 UTC [msp] DeserializeIdentity -> DEBU 6367 Obtaining identity" +"2019-09-24 00:27:09.784 UTC [gossip.comm] Send -> DEBU 6368 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:09.784 UTC [gossip.discovery] sendMemResponse -> DEBU 6369 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020Q" signature:"0D\002 Q\221^\301\352O\272\230\216h)\367,\200\333\305VK\233\300\265\225\355@I\337H\320U\203XS\002 )\253:Z\2541\"m\326=\360\020S\261\355l#+l\361\330{A2\251\244/\305\323\214\022>" secret_envelope:\2351(#" > > alive: " +"2019-09-24 00:27:09.784 UTC [gossip.comm] sendToEndpoint -> DEBU 636a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:27:09.784 UTC [gossip.comm] sendToEndpoint -> DEBU 636b Exiting" +"2019-09-24 00:27:09.942 UTC [gossip.gossip] handleMessage -> DEBU 636c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.942 UTC [gossip.gossip] handleMessage -> DEBU 636d Exiting" +"2019-09-24 00:27:09.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 636e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.942 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 636f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:09.942 UTC [msp] DeserializeIdentity -> DEBU 6370 Obtaining identity" +"2019-09-24 00:27:09.942 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6371 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:09.943 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6372 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:09.943 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6373 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:09.943 UTC [policies] Evaluate -> DEBU 6374 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:09.943 UTC [policies] Evaluate -> DEBU 6375 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:09.943 UTC [policies] Evaluate -> DEBU 6376 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:09.943 UTC [cauthdsl] func1 -> DEBU 6377 0xc002813bc0 gate 1569284829943524600 evaluation starts" +"2019-09-24 00:27:09.943 UTC [cauthdsl] func2 -> DEBU 6378 0xc002813bc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:09.943 UTC [cauthdsl] func2 -> DEBU 6379 0xc002813bc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:09.943 UTC [cauthdsl] func2 -> DEBU 637a 0xc002813bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:09.943 UTC [cauthdsl] func2 -> DEBU 637b 0xc002813bc0 principal evaluation fails" +"2019-09-24 00:27:09.943 UTC [cauthdsl] func1 -> DEBU 637c 0xc002813bc0 gate 1569284829943524600 evaluation fails" +"2019-09-24 00:27:09.943 UTC [policies] Evaluate -> DEBU 637d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 637e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 637f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:09.944 UTC [cauthdsl] func1 -> DEBU 6380 0xc00282a400 gate 1569284829944121400 evaluation starts" +"2019-09-24 00:27:09.944 UTC [cauthdsl] func2 -> DEBU 6381 0xc00282a400 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:09.944 UTC [cauthdsl] func2 -> DEBU 6382 0xc00282a400 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:09.944 UTC [cauthdsl] func2 -> DEBU 6383 0xc00282a400 principal matched by identity 0" +"2019-09-24 00:27:09.944 UTC [msp.identity] Verify -> DEBU 6384 Verify: digest = 00000000 f1 d4 c1 ef fa 66 49 6a 44 69 7d 7b e1 83 1a bd |.....fIjDi}{....| +00000010 2b 18 06 90 8c 69 aa 9c e9 54 3b 70 fc e6 74 10 |+....i...T;p..t.|" +"2019-09-24 00:27:09.944 UTC [msp.identity] Verify -> DEBU 6385 Verify: sig = 00000000 30 44 02 20 23 27 c0 0d 95 79 56 c6 a2 c6 46 18 |0D. #'...yV...F.| +00000010 4d 97 66 fd 89 fa 4b 1d ac 19 d3 9e ec 7e 55 93 |M.f...K......~U.| +00000020 eb bd 09 88 02 20 76 00 58 1d 8a 68 e1 80 6d c2 |..... v.X..h..m.| +00000030 65 54 a0 33 81 e9 46 96 7e be f5 15 47 85 3e a8 |eT.3..F.~...G.>.| +00000040 84 2d 46 04 b4 9f |.-F...|" +"2019-09-24 00:27:09.944 UTC [cauthdsl] func2 -> DEBU 6386 0xc00282a400 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:09.944 UTC [cauthdsl] func1 -> DEBU 6387 0xc00282a400 gate 1569284829944121400 evaluation succeeds" +"2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 6388 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 6389 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 638a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:09.944 UTC [policies] Evaluate -> DEBU 638b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:09.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 638c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 638d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:09.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 638e updating membership: timestamp: " +"2019-09-24 00:27:09.944 UTC [gossip.discovery] learnExistingMembers -> DEBU 638f Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:09.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 6390 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:09.945 UTC [gossip.discovery] learnExistingMembers -> DEBU 6391 Exiting" +"2019-09-24 00:27:09.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 6392 Exiting" +"2019-09-24 00:27:09.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6393 Exiting" +"2019-09-24 00:27:09.946 UTC [msp] DeserializeIdentity -> DEBU 6394 Obtaining identity" +"2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 6395 Obtaining identity" +"2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 6396 Obtaining identity" +"2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 6397 Obtaining identity" +"2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 6398 Obtaining identity" +"2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 6399 Obtaining identity" +"2019-09-24 00:27:09.948 UTC [gossip.comm] Send -> DEBU 639a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 639b Obtaining identity" +"2019-09-24 00:27:09.948 UTC [msp] DeserializeIdentity -> DEBU 639c Obtaining identity" +"2019-09-24 00:27:09.948 UTC [gossip.comm] Send -> DEBU 639d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:09.948 UTC [gossip.comm] sendToEndpoint -> DEBU 639e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.949 UTC [gossip.comm] sendToEndpoint -> DEBU 639f Exiting" +"2019-09-24 00:27:09.949 UTC [gossip.comm] sendToEndpoint -> DEBU 63a0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.949 UTC [gossip.comm] sendToEndpoint -> DEBU 63a1 Exiting" +"2019-09-24 00:27:09.949 UTC [gossip.comm] func1 -> DEBU 63a2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.949 UTC [gossip.gossip] handleMessage -> DEBU 63a3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.949 UTC [gossip.gossip] handleMessage -> DEBU 63a4 Exiting" +"2019-09-24 00:27:09.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63a5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63a6 Exiting" +"2019-09-24 00:27:09.952 UTC [gossip.comm] func1 -> DEBU 63a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.953 UTC [gossip.gossip] handleMessage -> DEBU 63a8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.953 UTC [gossip.gossip] handleMessage -> DEBU 63a9 Exiting" +"2019-09-24 00:27:09.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63aa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:09.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63ab Exiting" +"2019-09-24 00:27:10.008 UTC [gossip.comm] func1 -> DEBU 63ac Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:10.008 UTC [gossip.gossip] handleMessage -> DEBU 63ad Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:10.008 UTC [msp] DeserializeIdentity -> DEBU 63ae Obtaining identity" +"2019-09-24 00:27:10.008 UTC [msp] DeserializeIdentity -> DEBU 63af Obtaining identity" +"2019-09-24 00:27:10.008 UTC [msp] DeserializeIdentity -> DEBU 63b0 Obtaining identity" +"2019-09-24 00:27:10.008 UTC [gossip.gossip] handleMessage -> DEBU 63b1 Exiting" +"2019-09-24 00:27:10.644 UTC [gossip.comm] func1 -> DEBU 63b2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:10.644 UTC [gossip.gossip] handleMessage -> DEBU 63b3 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:10.644 UTC [gossip.gossip] handleMessage -> DEBU 63b4 Exiting" +"2019-09-24 00:27:10.642 UTC [gossip.comm] func1 -> DEBU 63b5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:10.644 UTC [gossip.gossip] handleMessage -> DEBU 63b6 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:10.644 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:10.645 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 63b8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:10.645 UTC [msp] DeserializeIdentity -> DEBU 63b9 Obtaining identity" +"2019-09-24 00:27:10.645 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 63ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:10.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 63bb Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:10.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 63bc Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:10.646 UTC [policies] Evaluate -> DEBU 63bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:10.646 UTC [policies] Evaluate -> DEBU 63be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:10.646 UTC [policies] Evaluate -> DEBU 63bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:10.646 UTC [cauthdsl] func1 -> DEBU 63c0 0xc00351c640 gate 1569284830646407800 evaluation starts" +"2019-09-24 00:27:10.646 UTC [cauthdsl] func2 -> DEBU 63c1 0xc00351c640 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:10.646 UTC [cauthdsl] func2 -> DEBU 63c2 0xc00351c640 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:10.646 UTC [cauthdsl] func2 -> DEBU 63c3 0xc00351c640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:10.646 UTC [cauthdsl] func2 -> DEBU 63c4 0xc00351c640 principal evaluation fails" +"2019-09-24 00:27:10.646 UTC [cauthdsl] func1 -> DEBU 63c5 0xc00351c640 gate 1569284830646407800 evaluation fails" +"2019-09-24 00:27:10.647 UTC [policies] Evaluate -> DEBU 63c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:10.647 UTC [policies] Evaluate -> DEBU 63c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:10.647 UTC [policies] Evaluate -> DEBU 63c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:10.647 UTC [cauthdsl] func1 -> DEBU 63c9 0xc00351ce80 gate 1569284830647381700 evaluation starts" +"2019-09-24 00:27:10.647 UTC [cauthdsl] func2 -> DEBU 63ca 0xc00351ce80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:10.647 UTC [cauthdsl] func2 -> DEBU 63cb 0xc00351ce80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:10.647 UTC [cauthdsl] func2 -> DEBU 63cc 0xc00351ce80 principal matched by identity 0" +"2019-09-24 00:27:10.647 UTC [msp.identity] Verify -> DEBU 63cd Verify: digest = 00000000 47 68 29 65 b0 89 1e 78 af 6a 76 ac 7b f3 6e 9e |Gh)e...x.jv.{.n.| +00000010 28 09 72 59 d7 83 1c 6e 6c bb e6 7d d7 a6 93 7d |(.rY...nl..}...}|" +"2019-09-24 00:27:10.647 UTC [msp.identity] Verify -> DEBU 63ce Verify: sig = 00000000 30 45 02 21 00 ee a5 19 17 59 87 a3 ec 42 58 5f |0E.!.....Y...BX_| +00000010 8d 74 db 89 1f cc 91 79 94 da 0d a1 75 83 e9 94 |.t.....y....u...| +00000020 17 0a 00 ec ea 02 20 03 fa b7 f0 1f cb c8 e9 34 |...... ........4| +00000030 62 6c a7 db 50 38 e3 9a 42 a6 26 43 3f d7 6c a7 |bl..P8..B.&C?.l.| +00000040 4b 3c 8f 1b 96 f8 0a |K<.....|" +"2019-09-24 00:27:10.648 UTC [cauthdsl] func2 -> DEBU 63cf 0xc00351ce80 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:10.648 UTC [cauthdsl] func1 -> DEBU 63d0 0xc00351ce80 gate 1569284830647381700 evaluation succeeds" +"2019-09-24 00:27:10.648 UTC [policies] Evaluate -> DEBU 63d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:10.648 UTC [policies] Evaluate -> DEBU 63d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:10.648 UTC [policies] Evaluate -> DEBU 63d3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:10.649 UTC [policies] Evaluate -> DEBU 63d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:10.649 UTC [gossip.discovery] handleAliveMessage -> DEBU 63d5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:10.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 63d6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:10.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 63d7 updating membership: timestamp: " +"2019-09-24 00:27:10.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 63d8 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:10.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 63d9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:10.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 63da Exiting" +"2019-09-24 00:27:10.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 63db Exiting" +"2019-09-24 00:27:10.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63dc Exiting" +"2019-09-24 00:27:10.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63dd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:10.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63de Exiting" +"2019-09-24 00:27:10.650 UTC [gossip.gossip] handleMessage -> DEBU 63df Exiting" +"2019-09-24 00:27:10.650 UTC [gossip.gossip] handleMessage -> DEBU 63e0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:10.650 UTC [gossip.gossip] handleMessage -> DEBU 63e1 Exiting" +"2019-09-24 00:27:10.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63e2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:10.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 63e3 Exiting" +"2019-09-24 00:27:10.659 UTC [msp] DeserializeIdentity -> DEBU 63e4 Obtaining identity" +"2019-09-24 00:27:10.660 UTC [msp] DeserializeIdentity -> DEBU 63e5 Obtaining identity" +"2019-09-24 00:27:10.660 UTC [msp] DeserializeIdentity -> DEBU 63e6 Obtaining identity" +"2019-09-24 00:27:10.660 UTC [msp] DeserializeIdentity -> DEBU 63e7 Obtaining identity" +"2019-09-24 00:27:10.660 UTC [msp] DeserializeIdentity -> DEBU 63e8 Obtaining identity" +"2019-09-24 00:27:10.660 UTC [msp] DeserializeIdentity -> DEBU 63e9 Obtaining identity" +"2019-09-24 00:27:10.661 UTC [msp] DeserializeIdentity -> DEBU 63ea Obtaining identity" +"2019-09-24 00:27:10.661 UTC [gossip.comm] Send -> DEBU 63eb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:10.662 UTC [msp] DeserializeIdentity -> DEBU 63ec Obtaining identity" +"2019-09-24 00:27:10.662 UTC [msp] DeserializeIdentity -> DEBU 63ed Obtaining identity" +"2019-09-24 00:27:10.662 UTC [gossip.comm] Send -> DEBU 63ee Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:10.663 UTC [gossip.comm] sendToEndpoint -> DEBU 63ef Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:10.663 UTC [gossip.comm] sendToEndpoint -> DEBU 63f0 Exiting" +"2019-09-24 00:27:10.664 UTC [gossip.comm] sendToEndpoint -> DEBU 63f1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:10.664 UTC [gossip.comm] sendToEndpoint -> DEBU 63f2 Exiting" +"2019-09-24 00:27:11.679 UTC [gossip.pull] Hello -> DEBU 63f3 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:27:11.680 UTC [gossip.comm] Send -> DEBU 63f4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:11.680 UTC [gossip.pull] Hello -> DEBU 63f5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:11.681 UTC [gossip.comm] Send -> DEBU 63f7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:11.680 UTC [gossip.comm] sendToEndpoint -> DEBU 63f6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.681 UTC [gossip.comm] sendToEndpoint -> DEBU 63f8 Exiting" +"2019-09-24 00:27:11.682 UTC [gossip.pull] Hello -> DEBU 63f9 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:27:11.683 UTC [gossip.comm] Send -> DEBU 63fb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:11.683 UTC [gossip.gossip] handleMessage -> DEBU 63fc Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.683 UTC [gossip.pull] HandleMessage -> DEBU 63fd GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.683 UTC [gossip.gossip] handleMessage -> DEBU 63fe Exiting" +"2019-09-24 00:27:11.682 UTC [gossip.comm] sendToEndpoint -> DEBU 63fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.684 UTC [gossip.comm] sendToEndpoint -> DEBU 63ff Exiting" +"2019-09-24 00:27:11.683 UTC [gossip.comm] sendToEndpoint -> DEBU 6400 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.684 UTC [gossip.comm] sendToEndpoint -> DEBU 6401 Exiting" +"2019-09-24 00:27:11.685 UTC [gossip.comm] func1 -> DEBU 6402 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.685 UTC [gossip.gossip] handleMessage -> DEBU 6403 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.686 UTC [gossip.pull] HandleMessage -> DEBU 6404 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.686 UTC [gossip.gossip] handleMessage -> DEBU 6405 Exiting" +"2019-09-24 00:27:11.687 UTC [gossip.comm] func1 -> DEBU 6406 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.687 UTC [gossip.gossip] handleMessage -> DEBU 6407 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.687 UTC [gossip.pull] HandleMessage -> DEBU 6408 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.688 UTC [gossip.gossip] handleMessage -> DEBU 6409 Exiting" +"2019-09-24 00:27:11.825 UTC [msp] GetDefaultSigningIdentity -> DEBU 640a Obtaining default signing identity" +"2019-09-24 00:27:11.825 UTC [msp.identity] Sign -> DEBU 640b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104E " +"2019-09-24 00:27:11.825 UTC [msp.identity] Sign -> DEBU 640c Sign: digest: B75630994BA4ACE8E431309043D963F0ED8D8E9498B8586DEBDEF3D230275EF0 " +"2019-09-24 00:27:11.826 UTC [msp] GetDefaultSigningIdentity -> DEBU 640d Obtaining default signing identity" +"2019-09-24 00:27:11.826 UTC [msp.identity] Sign -> DEBU 640e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:11.826 UTC [msp.identity] Sign -> DEBU 640f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:11.827 UTC [msp] DeserializeIdentity -> DEBU 6410 Obtaining identity" +"2019-09-24 00:27:11.827 UTC [gossip.comm] Send -> DEBU 6411 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:11.828 UTC [gossip.comm] Send -> DEBU 6412 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:11.828 UTC [msp] DeserializeIdentity -> DEBU 6414 Obtaining identity" +"2019-09-24 00:27:11.828 UTC [gossip.comm] sendToEndpoint -> DEBU 6415 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.828 UTC [gossip.comm] sendToEndpoint -> DEBU 6416 Exiting" +"2019-09-24 00:27:11.828 UTC [gossip.comm] Send -> DEBU 6417 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:11.830 UTC [gossip.comm] sendToEndpoint -> DEBU 6418 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.828 UTC [gossip.comm] sendToEndpoint -> DEBU 6413 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.831 UTC [gossip.comm] func1 -> DEBU 6419 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.832 UTC [gossip.gossip] handleMessage -> DEBU 641c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.832 UTC [gossip.gossip] handleMessage -> DEBU 641d Exiting" +"2019-09-24 00:27:11.832 UTC [gossip.discovery] handleMsgFromComm -> DEBU 641e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.832 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 641f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:11.832 UTC [msp.identity] Verify -> DEBU 6420 Verify: digest = 00000000 b7 56 30 99 4b a4 ac e8 e4 31 30 90 43 d9 63 f0 |.V0.K....10.C.c.| +00000010 ed 8d 8e 94 98 b8 58 6d eb de f3 d2 30 27 5e f0 |......Xm....0'^.|" +"2019-09-24 00:27:11.832 UTC [msp.identity] Verify -> DEBU 6421 Verify: sig = 00000000 30 44 02 20 10 3a c2 73 c2 5c f4 ea fe 49 d8 ed |0D. .:.s.\...I..| +00000010 a6 6c 95 dc 9f 4a 7d b6 7a 2e bf 8e 47 21 1b bd |.l...J}.z...G!..| +00000020 e8 60 f9 e9 02 20 46 bf 9b 08 42 db 29 f6 39 3a |.`... F...B.).9:| +00000030 b6 43 1e b4 82 74 65 64 db 3a da d2 47 47 f8 02 |.C...ted.:..GG..| +00000040 5b 65 88 4a 4c 98 |[e.JL.|" +"2019-09-24 00:27:11.832 UTC [msp.identity] Verify -> DEBU 6422 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:27:11.832 UTC [msp.identity] Verify -> DEBU 6423 Verify: sig = 00000000 30 44 02 20 40 28 89 fe 28 a0 2f f6 d1 7b 93 6d |0D. @(..(./..{.m| +00000010 57 05 e6 98 18 c6 01 70 fe da 0b db ae f5 b8 5d |W......p.......]| +00000020 0d 21 f8 c9 02 20 29 43 4b ec e3 67 5a e2 df 28 |.!... )CK..gZ..(| +00000030 df 8a 0e fe 58 8a 35 7e 1f 69 39 7f c9 c3 66 d6 |....X.5~.i9...f.| +00000040 fe 4f 45 fc 2e bb |.OE...|" +"2019-09-24 00:27:11.833 UTC [gossip.discovery] handleAliveMessage -> DEBU 6424 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:11.833 UTC [gossip.discovery] isSentByMe -> DEBU 6425 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:11.833 UTC [gossip.discovery] handleAliveMessage -> DEBU 6426 Exiting" +"2019-09-24 00:27:11.833 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6427 Exiting" +"2019-09-24 00:27:11.831 UTC [gossip.comm] sendToEndpoint -> DEBU 641a Exiting" +"2019-09-24 00:27:11.831 UTC [gossip.comm] sendToEndpoint -> DEBU 641b Exiting" +"2019-09-24 00:27:11.834 UTC [gossip.gossip] handleMessage -> DEBU 6428 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.834 UTC [gossip.gossip] handleMessage -> DEBU 6429 Exiting" +"2019-09-24 00:27:11.834 UTC [gossip.discovery] handleMsgFromComm -> DEBU 642a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.834 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 642b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:11.835 UTC [msp.identity] Verify -> DEBU 642c Verify: digest = 00000000 b7 56 30 99 4b a4 ac e8 e4 31 30 90 43 d9 63 f0 |.V0.K....10.C.c.| +00000010 ed 8d 8e 94 98 b8 58 6d eb de f3 d2 30 27 5e f0 |......Xm....0'^.|" +"2019-09-24 00:27:11.835 UTC [msp.identity] Verify -> DEBU 642d Verify: sig = 00000000 30 44 02 20 10 3a c2 73 c2 5c f4 ea fe 49 d8 ed |0D. .:.s.\...I..| +00000010 a6 6c 95 dc 9f 4a 7d b6 7a 2e bf 8e 47 21 1b bd |.l...J}.z...G!..| +00000020 e8 60 f9 e9 02 20 46 bf 9b 08 42 db 29 f6 39 3a |.`... F...B.).9:| +00000030 b6 43 1e b4 82 74 65 64 db 3a da d2 47 47 f8 02 |.C...ted.:..GG..| +00000040 5b 65 88 4a 4c 98 |[e.JL.|" +"2019-09-24 00:27:11.835 UTC [gossip.discovery] handleAliveMessage -> DEBU 642e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:11.835 UTC [gossip.discovery] isSentByMe -> DEBU 642f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:11.835 UTC [gossip.discovery] handleAliveMessage -> DEBU 6430 Exiting" +"2019-09-24 00:27:11.836 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6431 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:11.836 UTC [msp.identity] Verify -> DEBU 6432 Verify: digest = 00000000 8a 64 36 3c e8 c1 47 41 0c 0c 34 14 1e 9a d2 b5 |.d6<..GA..4.....| +00000010 34 07 a9 c0 03 d2 58 1c e8 9d 35 8a 7c ca d5 18 |4.....X...5.|...|" +"2019-09-24 00:27:11.836 UTC [msp.identity] Verify -> DEBU 6433 Verify: sig = 00000000 30 44 02 20 51 91 5e c1 ea 4f ba 98 8e 68 29 f7 |0D. Q.^..O...h).| +00000010 2c 80 db c5 56 4b 9b c0 b5 95 ed 40 49 df 48 d0 |,...VK.....@I.H.| +00000020 55 83 58 53 02 20 29 ab 3a 5a ac 31 22 6d d6 3d |U.XS. ).:Z.1"m.=| +00000030 f0 10 53 b1 ed 6c 23 2b 6c f1 d8 7b 41 32 a9 a4 |..S..l#+l..{A2..| +00000040 2f c5 d3 8c 12 3e |/....>|" +"2019-09-24 00:27:11.836 UTC [gossip.discovery] handleAliveMessage -> DEBU 6434 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:11.836 UTC [gossip.discovery] handleAliveMessage -> DEBU 6435 Exiting" +"2019-09-24 00:27:11.836 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6436 Exiting" +"2019-09-24 00:27:11.837 UTC [gossip.comm] func1 -> DEBU 6437 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.837 UTC [gossip.gossip] handleMessage -> DEBU 6438 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.837 UTC [gossip.gossip] handleMessage -> DEBU 6439 Exiting" +"2019-09-24 00:27:11.837 UTC [gossip.discovery] handleMsgFromComm -> DEBU 643a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.837 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 643b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:11.837 UTC [msp.identity] Verify -> DEBU 643c Verify: digest = 00000000 b7 56 30 99 4b a4 ac e8 e4 31 30 90 43 d9 63 f0 |.V0.K....10.C.c.| +00000010 ed 8d 8e 94 98 b8 58 6d eb de f3 d2 30 27 5e f0 |......Xm....0'^.|" +"2019-09-24 00:27:11.838 UTC [msp.identity] Verify -> DEBU 643d Verify: sig = 00000000 30 44 02 20 10 3a c2 73 c2 5c f4 ea fe 49 d8 ed |0D. .:.s.\...I..| +00000010 a6 6c 95 dc 9f 4a 7d b6 7a 2e bf 8e 47 21 1b bd |.l...J}.z...G!..| +00000020 e8 60 f9 e9 02 20 46 bf 9b 08 42 db 29 f6 39 3a |.`... F...B.).9:| +00000030 b6 43 1e b4 82 74 65 64 db 3a da d2 47 47 f8 02 |.C...ted.:..GG..| +00000040 5b 65 88 4a 4c 98 |[e.JL.|" +"2019-09-24 00:27:11.838 UTC [gossip.discovery] handleAliveMessage -> DEBU 643e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:11.838 UTC [gossip.discovery] isSentByMe -> DEBU 643f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:11.838 UTC [gossip.discovery] handleAliveMessage -> DEBU 6440 Exiting" +"2019-09-24 00:27:11.839 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6441 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:11.839 UTC [msp.identity] Verify -> DEBU 6442 Verify: digest = 00000000 8a 64 36 3c e8 c1 47 41 0c 0c 34 14 1e 9a d2 b5 |.d6<..GA..4.....| +00000010 34 07 a9 c0 03 d2 58 1c e8 9d 35 8a 7c ca d5 18 |4.....X...5.|...|" +"2019-09-24 00:27:11.839 UTC [msp.identity] Verify -> DEBU 6443 Verify: sig = 00000000 30 44 02 20 51 91 5e c1 ea 4f ba 98 8e 68 29 f7 |0D. Q.^..O...h).| +00000010 2c 80 db c5 56 4b 9b c0 b5 95 ed 40 49 df 48 d0 |,...VK.....@I.H.| +00000020 55 83 58 53 02 20 29 ab 3a 5a ac 31 22 6d d6 3d |U.XS. ).:Z.1"m.=| +00000030 f0 10 53 b1 ed 6c 23 2b 6c f1 d8 7b 41 32 a9 a4 |..S..l#+l..{A2..| +00000040 2f c5 d3 8c 12 3e |/....>|" +"2019-09-24 00:27:11.840 UTC [gossip.discovery] handleAliveMessage -> DEBU 6444 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:11.840 UTC [gossip.discovery] handleAliveMessage -> DEBU 6445 Exiting" +"2019-09-24 00:27:11.840 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6446 Exiting" +"2019-09-24 00:27:11.882 UTC [gossip.gossip] handleMessage -> DEBU 6447 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.883 UTC [gossip.pull] HandleMessage -> DEBU 6448 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.883 UTC [msp] DeserializeIdentity -> DEBU 6449 Obtaining identity" +"2019-09-24 00:27:11.884 UTC [msp] DeserializeIdentity -> DEBU 644a Obtaining identity" +"2019-09-24 00:27:11.884 UTC [msp] DeserializeIdentity -> DEBU 644b Obtaining identity" +"2019-09-24 00:27:11.884 UTC [msp] DeserializeIdentity -> DEBU 644c Obtaining identity" +"2019-09-24 00:27:11.885 UTC [msp] DeserializeIdentity -> DEBU 644d Obtaining identity" +"2019-09-24 00:27:11.885 UTC [msp] DeserializeIdentity -> DEBU 644e Obtaining identity" +"2019-09-24 00:27:11.886 UTC [gossip.pull] SendDigest -> DEBU 644f Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:27:11.886 UTC [gossip.gossip] handleMessage -> DEBU 6450 Exiting" +"2019-09-24 00:27:11.988 UTC [gossip.gossip] handleMessage -> DEBU 6451 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.988 UTC [gossip.gossip] handleMessage -> DEBU 6452 Exiting" +"2019-09-24 00:27:11.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6453 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.989 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6454 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:11.989 UTC [msp] DeserializeIdentity -> DEBU 6455 Obtaining identity" +"2019-09-24 00:27:11.989 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6456 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:11.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6457 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:11.989 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6458 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:11.989 UTC [policies] Evaluate -> DEBU 6459 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:11.989 UTC [policies] Evaluate -> DEBU 645a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:11.989 UTC [policies] Evaluate -> DEBU 645b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:11.989 UTC [cauthdsl] func1 -> DEBU 645c 0xc004243e90 gate 1569284831989770200 evaluation starts" +"2019-09-24 00:27:11.989 UTC [cauthdsl] func2 -> DEBU 645d 0xc004243e90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:11.989 UTC [cauthdsl] func2 -> DEBU 645e 0xc004243e90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:11.989 UTC [cauthdsl] func2 -> DEBU 645f 0xc004243e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:11.990 UTC [cauthdsl] func2 -> DEBU 6460 0xc004243e90 principal evaluation fails" +"2019-09-24 00:27:11.990 UTC [cauthdsl] func1 -> DEBU 6461 0xc004243e90 gate 1569284831989770200 evaluation fails" +"2019-09-24 00:27:11.990 UTC [policies] Evaluate -> DEBU 6462 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:11.990 UTC [policies] Evaluate -> DEBU 6463 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:11.990 UTC [policies] Evaluate -> DEBU 6464 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:11.990 UTC [cauthdsl] func1 -> DEBU 6465 0xc002a766d0 gate 1569284831990341000 evaluation starts" +"2019-09-24 00:27:11.990 UTC [cauthdsl] func2 -> DEBU 6466 0xc002a766d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:11.990 UTC [cauthdsl] func2 -> DEBU 6467 0xc002a766d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:11.990 UTC [cauthdsl] func2 -> DEBU 6468 0xc002a766d0 principal matched by identity 0" +"2019-09-24 00:27:11.990 UTC [msp.identity] Verify -> DEBU 6469 Verify: digest = 00000000 61 1d 9f 1c 65 fc a7 43 a0 50 89 a9 6c 72 3c d0 |a...e..C.P..lr<.| +00000010 5a a9 5a ec c9 49 29 35 b5 2e ae 69 aa fd f7 db |Z.Z..I)5...i....|" +"2019-09-24 00:27:11.990 UTC [msp.identity] Verify -> DEBU 646a Verify: sig = 00000000 30 44 02 20 71 44 12 8a 2e 8e 44 bf 4b d1 70 7e |0D. qD....D.K.p~| +00000010 d6 7d 1e 40 98 c9 97 76 0c 22 a8 a4 1a 02 e6 4f |.}.@...v.".....O| +00000020 bf 9e 1d 28 02 20 11 44 ae 72 32 60 a7 37 10 92 |...(. .D.r2`.7..| +00000030 c4 53 2f d6 af 2a fc 45 15 24 52 21 6f 93 2a 41 |.S/..*.E.$R!o.*A| +00000040 87 07 27 96 28 09 |..'.(.|" +"2019-09-24 00:27:11.990 UTC [cauthdsl] func2 -> DEBU 646b 0xc002a766d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:11.990 UTC [cauthdsl] func1 -> DEBU 646c 0xc002a766d0 gate 1569284831990341000 evaluation succeeds" +"2019-09-24 00:27:11.991 UTC [policies] Evaluate -> DEBU 646d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:11.991 UTC [policies] Evaluate -> DEBU 646e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:11.991 UTC [policies] Evaluate -> DEBU 646f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:11.991 UTC [policies] Evaluate -> DEBU 6470 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:11.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 6471 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:11.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 6472 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:11.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 6473 updating membership: timestamp: " +"2019-09-24 00:27:11.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 6474 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:11.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 6475 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:11.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 6476 Exiting" +"2019-09-24 00:27:11.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 6477 Exiting" +"2019-09-24 00:27:11.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6478 Exiting" +"2019-09-24 00:27:11.992 UTC [gossip.discovery] sendMemResponse -> DEBU 6479 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:27:11.992 UTC [msp] DeserializeIdentity -> DEBU 647a Obtaining identity" +"2019-09-24 00:27:11.992 UTC [msp] DeserializeIdentity -> DEBU 647b Obtaining identity" +"2019-09-24 00:27:11.992 UTC [msp] DeserializeIdentity -> DEBU 647c Obtaining identity" +"2019-09-24 00:27:11.992 UTC [gossip.comm] Send -> DEBU 647d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:11.992 UTC [gossip.discovery] sendMemResponse -> DEBU 647e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020Q" signature:"0D\002 Q\221^\301\352O\272\230\216h)\367,\200\333\305VK\233\300\265\225\355@I\337H\320U\203XS\002 )\253:Z\2541\"m\326=\360\020S\261\355l#+l\361\330{A2\251\244/\305\323\214\022>" > alive: alive: alive: " +"2019-09-24 00:27:11.993 UTC [gossip.comm] sendToEndpoint -> DEBU 647f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:11.993 UTC [gossip.comm] sendToEndpoint -> DEBU 6480 Exiting" +"2019-09-24 00:27:12.046 UTC [msp] DeserializeIdentity -> DEBU 6481 Obtaining identity" +"2019-09-24 00:27:12.046 UTC [msp] DeserializeIdentity -> DEBU 6482 Obtaining identity" +"2019-09-24 00:27:12.047 UTC [gossip.comm] Send -> DEBU 6483 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:27:12.047 UTC [gossip.comm] sendToEndpoint -> DEBU 6484 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.047 UTC [gossip.comm] sendToEndpoint -> DEBU 6485 Exiting" +"2019-09-24 00:27:12.047 UTC [gossip.comm] sendToEndpoint -> DEBU 6486 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.047 UTC [gossip.comm] sendToEndpoint -> DEBU 6487 Exiting" +"2019-09-24 00:27:12.048 UTC [gossip.comm] sendToEndpoint -> DEBU 6488 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.048 UTC [gossip.comm] sendToEndpoint -> DEBU 6489 Exiting" +"2019-09-24 00:27:12.049 UTC [gossip.comm] func1 -> DEBU 648a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.050 UTC [gossip.gossip] handleMessage -> DEBU 648b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.051 UTC [msp] DeserializeIdentity -> DEBU 648c Obtaining identity" +"2019-09-24 00:27:12.051 UTC [msp] DeserializeIdentity -> DEBU 648d Obtaining identity" +"2019-09-24 00:27:12.051 UTC [msp] DeserializeIdentity -> DEBU 648e Obtaining identity" +"2019-09-24 00:27:12.052 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 648f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:12.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6490 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6491 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.052 UTC [policies] Evaluate -> DEBU 6492 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:12.052 UTC [policies] Evaluate -> DEBU 6493 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:12.052 UTC [policies] Evaluate -> DEBU 6494 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:12.052 UTC [cauthdsl] func1 -> DEBU 6495 0xc002a93520 gate 1569284832052924100 evaluation starts" +"2019-09-24 00:27:12.053 UTC [cauthdsl] func2 -> DEBU 6496 0xc002a93520 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.053 UTC [cauthdsl] func2 -> DEBU 6497 0xc002a93520 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.053 UTC [cauthdsl] func2 -> DEBU 6498 0xc002a93520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:12.053 UTC [cauthdsl] func2 -> DEBU 6499 0xc002a93520 principal evaluation fails" +"2019-09-24 00:27:12.053 UTC [cauthdsl] func1 -> DEBU 649a 0xc002a93520 gate 1569284832052924100 evaluation fails" +"2019-09-24 00:27:12.053 UTC [policies] Evaluate -> DEBU 649b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.054 UTC [policies] Evaluate -> DEBU 649c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.054 UTC [policies] Evaluate -> DEBU 649e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:12.055 UTC [cauthdsl] func1 -> DEBU 649f 0xc002a93d60 gate 1569284832055167300 evaluation starts" +"2019-09-24 00:27:12.055 UTC [cauthdsl] func2 -> DEBU 64a0 0xc002a93d60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.055 UTC [cauthdsl] func2 -> DEBU 64a1 0xc002a93d60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.055 UTC [cauthdsl] func2 -> DEBU 64a2 0xc002a93d60 principal matched by identity 0" +"2019-09-24 00:27:12.055 UTC [msp.identity] Verify -> DEBU 64a3 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:12.055 UTC [msp.identity] Verify -> DEBU 64a4 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:12.054 UTC [gossip.comm] func1 -> DEBU 649d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.057 UTC [cauthdsl] func2 -> DEBU 64a5 0xc002a93d60 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:12.057 UTC [cauthdsl] func1 -> DEBU 64a6 0xc002a93d60 gate 1569284832055167300 evaluation succeeds" +"2019-09-24 00:27:12.057 UTC [policies] Evaluate -> DEBU 64a7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.057 UTC [policies] Evaluate -> DEBU 64a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.057 UTC [policies] Evaluate -> DEBU 64a9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:12.057 UTC [policies] Evaluate -> DEBU 64aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:12.057 UTC [msp] DeserializeIdentity -> DEBU 64ab Obtaining identity" +"2019-09-24 00:27:12.058 UTC [msp] DeserializeIdentity -> DEBU 64ac Obtaining identity" +"2019-09-24 00:27:12.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 64ad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:12.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64ae Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64af Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.059 UTC [policies] Evaluate -> DEBU 64b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:12.059 UTC [policies] Evaluate -> DEBU 64b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:12.059 UTC [policies] Evaluate -> DEBU 64b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:12.059 UTC [cauthdsl] func1 -> DEBU 64b3 0xc004181530 gate 1569284832059850700 evaluation starts" +"2019-09-24 00:27:12.060 UTC [cauthdsl] func2 -> DEBU 64b4 0xc004181530 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.060 UTC [cauthdsl] func2 -> DEBU 64b5 0xc004181530 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.060 UTC [cauthdsl] func2 -> DEBU 64b6 0xc004181530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:12.060 UTC [cauthdsl] func2 -> DEBU 64b7 0xc004181530 principal evaluation fails" +"2019-09-24 00:27:12.060 UTC [cauthdsl] func1 -> DEBU 64b8 0xc004181530 gate 1569284832059850700 evaluation fails" +"2019-09-24 00:27:12.060 UTC [policies] Evaluate -> DEBU 64b9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.061 UTC [policies] Evaluate -> DEBU 64ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.061 UTC [policies] Evaluate -> DEBU 64bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:12.061 UTC [cauthdsl] func1 -> DEBU 64bc 0xc004181d70 gate 1569284832061374300 evaluation starts" +"2019-09-24 00:27:12.061 UTC [cauthdsl] func2 -> DEBU 64bd 0xc004181d70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.061 UTC [cauthdsl] func2 -> DEBU 64be 0xc004181d70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.061 UTC [cauthdsl] func2 -> DEBU 64bf 0xc004181d70 principal matched by identity 0" +"2019-09-24 00:27:12.062 UTC [msp.identity] Verify -> DEBU 64c0 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:12.062 UTC [msp.identity] Verify -> DEBU 64c1 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:12.062 UTC [cauthdsl] func2 -> DEBU 64c2 0xc004181d70 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:12.062 UTC [cauthdsl] func1 -> DEBU 64c3 0xc004181d70 gate 1569284832061374300 evaluation succeeds" +"2019-09-24 00:27:12.062 UTC [policies] Evaluate -> DEBU 64c4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.062 UTC [policies] Evaluate -> DEBU 64c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.063 UTC [policies] Evaluate -> DEBU 64c6 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:12.063 UTC [policies] Evaluate -> DEBU 64c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:12.063 UTC [msp.identity] Verify -> DEBU 64c8 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +"2019-09-24 00:27:12.063 UTC [msp.identity] Verify -> DEBU 64c9 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +"2019-09-24 00:27:12.064 UTC [msp.identity] Verify -> DEBU 64ca Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:12.064 UTC [msp.identity] Verify -> DEBU 64cb Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:12.065 UTC [gossip.gossip] handleMessage -> DEBU 64cc Exiting" +"2019-09-24 00:27:12.065 UTC [gossip.gossip] handleMessage -> DEBU 64cd Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.065 UTC [msp] DeserializeIdentity -> DEBU 64ce Obtaining identity" +"2019-09-24 00:27:12.066 UTC [msp] DeserializeIdentity -> DEBU 64cf Obtaining identity" +"2019-09-24 00:27:12.066 UTC [msp] DeserializeIdentity -> DEBU 64d0 Obtaining identity" +"2019-09-24 00:27:12.066 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 64d1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:12.067 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64d2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.067 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64d3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.067 UTC [policies] Evaluate -> DEBU 64d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:12.067 UTC [policies] Evaluate -> DEBU 64d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:12.067 UTC [policies] Evaluate -> DEBU 64d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:12.068 UTC [cauthdsl] func1 -> DEBU 64d7 0xc0041b26c0 gate 1569284832068098600 evaluation starts" +"2019-09-24 00:27:12.068 UTC [cauthdsl] func2 -> DEBU 64d8 0xc0041b26c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.068 UTC [cauthdsl] func2 -> DEBU 64d9 0xc0041b26c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.069 UTC [cauthdsl] func2 -> DEBU 64da 0xc0041b26c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:12.069 UTC [cauthdsl] func2 -> DEBU 64db 0xc0041b26c0 principal evaluation fails" +"2019-09-24 00:27:12.069 UTC [cauthdsl] func1 -> DEBU 64dc 0xc0041b26c0 gate 1569284832068098600 evaluation fails" +"2019-09-24 00:27:12.069 UTC [policies] Evaluate -> DEBU 64dd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.070 UTC [policies] Evaluate -> DEBU 64de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.070 UTC [policies] Evaluate -> DEBU 64df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:12.070 UTC [cauthdsl] func1 -> DEBU 64e0 0xc0041b2f00 gate 1569284832070499300 evaluation starts" +"2019-09-24 00:27:12.070 UTC [cauthdsl] func2 -> DEBU 64e1 0xc0041b2f00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.071 UTC [cauthdsl] func2 -> DEBU 64e2 0xc0041b2f00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.071 UTC [cauthdsl] func2 -> DEBU 64e3 0xc0041b2f00 principal matched by identity 0" +"2019-09-24 00:27:12.071 UTC [msp.identity] Verify -> DEBU 64e4 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:12.071 UTC [msp.identity] Verify -> DEBU 64e5 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:12.072 UTC [cauthdsl] func2 -> DEBU 64e6 0xc0041b2f00 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:12.072 UTC [cauthdsl] func1 -> DEBU 64e7 0xc0041b2f00 gate 1569284832070499300 evaluation succeeds" +"2019-09-24 00:27:12.073 UTC [policies] Evaluate -> DEBU 64e8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.073 UTC [policies] Evaluate -> DEBU 64e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.073 UTC [policies] Evaluate -> DEBU 64ea Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:12.073 UTC [policies] Evaluate -> DEBU 64eb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:12.073 UTC [msp] DeserializeIdentity -> DEBU 64ec Obtaining identity" +"2019-09-24 00:27:12.074 UTC [msp] DeserializeIdentity -> DEBU 64ed Obtaining identity" +"2019-09-24 00:27:12.074 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 64ee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:12.075 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64ef Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.075 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64f0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.075 UTC [policies] Evaluate -> DEBU 64f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:12.075 UTC [policies] Evaluate -> DEBU 64f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:12.075 UTC [policies] Evaluate -> DEBU 64f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:12.076 UTC [cauthdsl] func1 -> DEBU 64f4 0xc0047d66d0 gate 1569284832076027500 evaluation starts" +"2019-09-24 00:27:12.076 UTC [cauthdsl] func2 -> DEBU 64f5 0xc0047d66d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.076 UTC [cauthdsl] func2 -> DEBU 64f6 0xc0047d66d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.076 UTC [cauthdsl] func2 -> DEBU 64f7 0xc0047d66d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:12.076 UTC [cauthdsl] func2 -> DEBU 64f8 0xc0047d66d0 principal evaluation fails" +"2019-09-24 00:27:12.076 UTC [cauthdsl] func1 -> DEBU 64f9 0xc0047d66d0 gate 1569284832076027500 evaluation fails" +"2019-09-24 00:27:12.077 UTC [policies] Evaluate -> DEBU 64fa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.077 UTC [policies] Evaluate -> DEBU 64fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.077 UTC [policies] Evaluate -> DEBU 64fc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:12.077 UTC [cauthdsl] func1 -> DEBU 64fd 0xc0047d6f10 gate 1569284832077464300 evaluation starts" +"2019-09-24 00:27:12.077 UTC [cauthdsl] func2 -> DEBU 64fe 0xc0047d6f10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.077 UTC [cauthdsl] func2 -> DEBU 64ff 0xc0047d6f10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.077 UTC [cauthdsl] func2 -> DEBU 6500 0xc0047d6f10 principal matched by identity 0" +"2019-09-24 00:27:12.078 UTC [msp.identity] Verify -> DEBU 6501 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:12.078 UTC [msp.identity] Verify -> DEBU 6502 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:12.078 UTC [cauthdsl] func2 -> DEBU 6503 0xc0047d6f10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:12.078 UTC [cauthdsl] func1 -> DEBU 6504 0xc0047d6f10 gate 1569284832077464300 evaluation succeeds" +"2019-09-24 00:27:12.079 UTC [policies] Evaluate -> DEBU 6505 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.079 UTC [policies] Evaluate -> DEBU 6506 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.079 UTC [policies] Evaluate -> DEBU 6507 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:12.080 UTC [policies] Evaluate -> DEBU 6508 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:12.080 UTC [msp.identity] Verify -> DEBU 6509 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:12.080 UTC [msp.identity] Verify -> DEBU 650a Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:12.080 UTC [msp.identity] Verify -> DEBU 650b Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +"2019-09-24 00:27:12.081 UTC [msp.identity] Verify -> DEBU 650c Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +"2019-09-24 00:27:12.081 UTC [gossip.gossip] handleMessage -> DEBU 650d Exiting" +"2019-09-24 00:27:12.081 UTC [gossip.gossip] handleMessage -> DEBU 650e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.082 UTC [msp.identity] Verify -> DEBU 650f Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:12.082 UTC [msp.identity] Verify -> DEBU 6510 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:12.082 UTC [msp] DeserializeIdentity -> DEBU 6511 Obtaining identity" +"2019-09-24 00:27:12.082 UTC [msp] DeserializeIdentity -> DEBU 6512 Obtaining identity" +"2019-09-24 00:27:12.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6513 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:12.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6514 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.083 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6515 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.083 UTC [policies] Evaluate -> DEBU 6516 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:12.083 UTC [policies] Evaluate -> DEBU 6517 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:12.083 UTC [policies] Evaluate -> DEBU 6518 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:12.084 UTC [cauthdsl] func1 -> DEBU 6519 0xc0047e9e80 gate 1569284832084024100 evaluation starts" +"2019-09-24 00:27:12.084 UTC [cauthdsl] func2 -> DEBU 651a 0xc0047e9e80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.084 UTC [cauthdsl] func2 -> DEBU 651b 0xc0047e9e80 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.084 UTC [cauthdsl] func2 -> DEBU 651c 0xc0047e9e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:12.084 UTC [cauthdsl] func2 -> DEBU 651d 0xc0047e9e80 principal evaluation fails" +"2019-09-24 00:27:12.084 UTC [cauthdsl] func1 -> DEBU 651e 0xc0047e9e80 gate 1569284832084024100 evaluation fails" +"2019-09-24 00:27:12.084 UTC [policies] Evaluate -> DEBU 651f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.084 UTC [policies] Evaluate -> DEBU 6520 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.084 UTC [policies] Evaluate -> DEBU 6521 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:12.084 UTC [cauthdsl] func1 -> DEBU 6522 0xc0048026c0 gate 1569284832084869100 evaluation starts" +"2019-09-24 00:27:12.085 UTC [cauthdsl] func2 -> DEBU 6523 0xc0048026c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.085 UTC [cauthdsl] func2 -> DEBU 6524 0xc0048026c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.085 UTC [cauthdsl] func2 -> DEBU 6525 0xc0048026c0 principal matched by identity 0" +"2019-09-24 00:27:12.085 UTC [msp.identity] Verify -> DEBU 6526 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:12.085 UTC [msp.identity] Verify -> DEBU 6527 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:12.086 UTC [cauthdsl] func2 -> DEBU 6528 0xc0048026c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:12.086 UTC [cauthdsl] func1 -> DEBU 6529 0xc0048026c0 gate 1569284832084869100 evaluation succeeds" +"2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 652a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 652b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 652c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 652d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:12.086 UTC [msp] DeserializeIdentity -> DEBU 652e Obtaining identity" +"2019-09-24 00:27:12.086 UTC [msp] DeserializeIdentity -> DEBU 652f Obtaining identity" +"2019-09-24 00:27:12.086 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6530 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:12.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6531 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6532 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 6533 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 6534 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:12.086 UTC [policies] Evaluate -> DEBU 6535 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:12.086 UTC [cauthdsl] func1 -> DEBU 6536 0xc004803e90 gate 1569284832086978900 evaluation starts" +"2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6537 0xc004803e90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6538 0xc004803e90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6539 0xc004803e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 653a 0xc004803e90 principal evaluation fails" +"2019-09-24 00:27:12.087 UTC [cauthdsl] func1 -> DEBU 653b 0xc004803e90 gate 1569284832086978900 evaluation fails" +"2019-09-24 00:27:12.087 UTC [policies] Evaluate -> DEBU 653c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.087 UTC [policies] Evaluate -> DEBU 653d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.087 UTC [policies] Evaluate -> DEBU 653e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:12.087 UTC [cauthdsl] func1 -> DEBU 653f 0xc0048146d0 gate 1569284832087450400 evaluation starts" +"2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6540 0xc0048146d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6541 0xc0048146d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.087 UTC [cauthdsl] func2 -> DEBU 6542 0xc0048146d0 principal matched by identity 0" +"2019-09-24 00:27:12.087 UTC [msp.identity] Verify -> DEBU 6543 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:12.087 UTC [msp.identity] Verify -> DEBU 6544 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:12.089 UTC [cauthdsl] func2 -> DEBU 6545 0xc0048146d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:12.089 UTC [cauthdsl] func1 -> DEBU 6546 0xc0048146d0 gate 1569284832087450400 evaluation succeeds" +"2019-09-24 00:27:12.089 UTC [policies] Evaluate -> DEBU 6547 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.089 UTC [policies] Evaluate -> DEBU 6548 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.089 UTC [policies] Evaluate -> DEBU 6549 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:12.089 UTC [policies] Evaluate -> DEBU 654a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:12.089 UTC [msp.identity] Verify -> DEBU 654b Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +"2019-09-24 00:27:12.090 UTC [msp.identity] Verify -> DEBU 654c Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +"2019-09-24 00:27:12.090 UTC [gossip.gossip] handleMessage -> DEBU 654d Exiting" +"2019-09-24 00:27:12.261 UTC [msp] DeserializeIdentity -> DEBU 654e Obtaining identity" +"2019-09-24 00:27:12.261 UTC [msp] DeserializeIdentity -> DEBU 654f Obtaining identity" +"2019-09-24 00:27:12.261 UTC [gossip.pull] Hello -> DEBU 6550 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:12.261 UTC [msp] DeserializeIdentity -> DEBU 6551 Obtaining identity" +"2019-09-24 00:27:12.261 UTC [msp] DeserializeIdentity -> DEBU 6552 Obtaining identity" +"2019-09-24 00:27:12.261 UTC [gossip.comm] Send -> DEBU 6553 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:12.261 UTC [gossip.comm] sendToEndpoint -> DEBU 6554 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.261 UTC [gossip.comm] sendToEndpoint -> DEBU 6555 Exiting" +"2019-09-24 00:27:12.262 UTC [gossip.comm] func1 -> DEBU 6556 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.262 UTC [gossip.gossip] handleMessage -> DEBU 6557 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.263 UTC [gossip.pull] HandleMessage -> DEBU 6558 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.263 UTC [gossip.gossip] handleMessage -> DEBU 6559 Exiting" +"2019-09-24 00:27:12.285 UTC [gossip.election] waitForInterrupt -> DEBU 655a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:27:12.286 UTC [gossip.election] IsLeader -> DEBU 655b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:27:12.286 UTC [msp] GetDefaultSigningIdentity -> DEBU 655c Obtaining default signing identity" +"2019-09-24 00:27:12.286 UTC [msp.identity] Sign -> DEBU 655d Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101C1801 " +"2019-09-24 00:27:12.286 UTC [msp.identity] Sign -> DEBU 655e Sign: digest: 9868611D40303B67649F761B80823A3B7301606E604C93A87C1CCFA048A9C2DB " +"2019-09-24 00:27:12.287 UTC [gossip.election] waitForInterrupt -> DEBU 655f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:27:12.287 UTC [msp] DeserializeIdentity -> DEBU 6560 Obtaining identity" +"2019-09-24 00:27:12.288 UTC [msp] DeserializeIdentity -> DEBU 6561 Obtaining identity" +"2019-09-24 00:27:12.288 UTC [msp] DeserializeIdentity -> DEBU 6562 Obtaining identity" +"2019-09-24 00:27:12.288 UTC [msp] DeserializeIdentity -> DEBU 6563 Obtaining identity" +"2019-09-24 00:27:12.289 UTC [gossip.comm] Send -> DEBU 6564 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:12.289 UTC [msp] DeserializeIdentity -> DEBU 6565 Obtaining identity" +"2019-09-24 00:27:12.289 UTC [msp] DeserializeIdentity -> DEBU 6566 Obtaining identity" +"2019-09-24 00:27:12.290 UTC [gossip.comm] sendToEndpoint -> DEBU 6567 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:27:12.290 UTC [gossip.comm] sendToEndpoint -> DEBU 6568 Exiting" +"2019-09-24 00:27:12.548 UTC [gossip.comm] func1 -> DEBU 6569 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.548 UTC [gossip.gossip] handleMessage -> DEBU 656a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.548 UTC [msp] DeserializeIdentity -> DEBU 656b Obtaining identity" +"2019-09-24 00:27:12.549 UTC [msp] DeserializeIdentity -> DEBU 656c Obtaining identity" +"2019-09-24 00:27:12.549 UTC [gossip.gossip] handleMessage -> DEBU 656d Exiting" +"2019-09-24 00:27:12.672 UTC [gossip.comm] func1 -> DEBU 656e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:12.672 UTC [gossip.gossip] handleMessage -> DEBU 656f Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:12.672 UTC [gossip.gossip] handleMessage -> DEBU 6570 Exiting" +"2019-09-24 00:27:12.672 UTC [gossip.gossip] handleMessage -> DEBU 6571 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:12.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6572 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:12.672 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6573 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:12.672 UTC [gossip.comm] func1 -> DEBU 6574 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:12.672 UTC [msp.identity] Verify -> DEBU 6575 Verify: digest = 00000000 67 53 7e 18 b6 18 83 89 ac d4 ab 4a 20 71 2f 36 |gS~........J q/6| +00000010 2b db 4e a9 34 cd 08 48 9c dc 03 97 16 3f 53 d9 |+.N.4..H.....?S.|" +"2019-09-24 00:27:12.672 UTC [msp.identity] Verify -> DEBU 6576 Verify: sig = 00000000 30 44 02 20 1e 78 4f 71 07 4e 84 30 76 44 7d 6d |0D. .xOq.N.0vD}m| +00000010 e9 51 03 e5 36 e5 f9 c6 ac ad 8d 32 cf d8 b8 ec |.Q..6......2....| +00000020 c1 62 47 ad 02 20 20 6f 07 0b 1f 17 3d 11 0d 8f |.bG.. o....=...| +00000030 69 ba f9 6b 8c e3 d1 88 d9 64 0c d9 4c 8f cc e6 |i..k.....d..L...| +00000040 80 63 d1 e3 77 36 |.c..w6|" +"2019-09-24 00:27:12.673 UTC [gossip.discovery] handleAliveMessage -> DEBU 6577 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:12.673 UTC [gossip.discovery] learnExistingMembers -> DEBU 6578 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:12.673 UTC [gossip.discovery] learnExistingMembers -> DEBU 6579 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:12.673 UTC [gossip.discovery] learnExistingMembers -> DEBU 657a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:12.673 UTC [gossip.discovery] learnExistingMembers -> DEBU 657b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:12.673 UTC [gossip.discovery] learnExistingMembers -> DEBU 657c Exiting" +"2019-09-24 00:27:12.673 UTC [gossip.discovery] handleAliveMessage -> DEBU 657d Exiting" +"2019-09-24 00:27:12.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 657e Exiting" +"2019-09-24 00:27:12.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 657f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:12.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6580 Exiting" +"2019-09-24 00:27:12.673 UTC [gossip.gossip] handleMessage -> DEBU 6581 Exiting" +"2019-09-24 00:27:12.673 UTC [gossip.gossip] handleMessage -> DEBU 6582 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:12.673 UTC [gossip.gossip] handleMessage -> DEBU 6583 Exiting" +"2019-09-24 00:27:12.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6584 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:12.673 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6585 Exiting" +"2019-09-24 00:27:12.683 UTC [msp] DeserializeIdentity -> DEBU 6586 Obtaining identity" +"2019-09-24 00:27:12.683 UTC [msp] DeserializeIdentity -> DEBU 6587 Obtaining identity" +"2019-09-24 00:27:12.684 UTC [gossip.comm] Send -> DEBU 6588 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:12.684 UTC [msp] DeserializeIdentity -> DEBU 6589 Obtaining identity" +"2019-09-24 00:27:12.684 UTC [gossip.comm] Send -> DEBU 658a Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:12.684 UTC [gossip.comm] sendToEndpoint -> DEBU 658b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:12.684 UTC [gossip.comm] sendToEndpoint -> DEBU 658c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:12.684 UTC [gossip.comm] sendToEndpoint -> DEBU 658d Exiting" +"2019-09-24 00:27:12.684 UTC [gossip.comm] sendToEndpoint -> DEBU 658e Exiting" +"2019-09-24 00:27:12.738 UTC [gossip.comm] func1 -> DEBU 658f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.738 UTC [gossip.gossip] handleMessage -> DEBU 6590 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.738 UTC [gossip.gossip] handleMessage -> DEBU 6591 Exiting" +"2019-09-24 00:27:12.739 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6592 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.739 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6593 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:12.739 UTC [msp] DeserializeIdentity -> DEBU 6594 Obtaining identity" +"2019-09-24 00:27:12.739 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6595 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:12.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6596 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6597 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 6598 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 6599 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 659a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:12.739 UTC [cauthdsl] func1 -> DEBU 659b 0xc004e7cde0 gate 1569284832739518800 evaluation starts" +"2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 659c 0xc004e7cde0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 659d 0xc004e7cde0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 659e 0xc004e7cde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 659f 0xc004e7cde0 principal evaluation fails" +"2019-09-24 00:27:12.739 UTC [cauthdsl] func1 -> DEBU 65a0 0xc004e7cde0 gate 1569284832739518800 evaluation fails" +"2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 65a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 65a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:12.739 UTC [policies] Evaluate -> DEBU 65a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:12.739 UTC [cauthdsl] func1 -> DEBU 65a4 0xc004e7d620 gate 1569284832739889600 evaluation starts" +"2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 65a5 0xc004e7d620 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:12.739 UTC [cauthdsl] func2 -> DEBU 65a6 0xc004e7d620 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:12.740 UTC [cauthdsl] func2 -> DEBU 65a7 0xc004e7d620 principal matched by identity 0" +"2019-09-24 00:27:12.740 UTC [msp.identity] Verify -> DEBU 65a8 Verify: digest = 00000000 d7 c6 9a d1 a8 ab c0 7e e3 d6 e2 4e 6b 98 e0 f3 |.......~...Nk...| +00000010 2a 88 d6 1c 78 0b 2c f6 f5 17 08 7a 38 21 3d d4 |*...x.,....z8!=.|" +"2019-09-24 00:27:12.740 UTC [msp.identity] Verify -> DEBU 65a9 Verify: sig = 00000000 30 45 02 21 00 c6 4a 7c 88 04 a0 85 5b 1e 7c 7e |0E.!..J|....[.|~| +00000010 5d e3 60 fa 6a b1 e5 14 c5 34 8c 78 9d 76 08 2f |].`.j....4.x.v./| +00000020 c1 f1 41 ec 71 02 20 10 ed 3a eb b1 fb 6b a6 37 |..A.q. ..:...k.7| +00000030 48 b7 9b e3 d0 30 2e 60 d4 48 e8 fe 83 4c 1b 7c |H....0.`.H...L.|| +00000040 75 3f bf 0f 0c 71 0f |u?...q.|" +"2019-09-24 00:27:12.740 UTC [cauthdsl] func2 -> DEBU 65aa 0xc004e7d620 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:12.740 UTC [cauthdsl] func1 -> DEBU 65ab 0xc004e7d620 gate 1569284832739889600 evaluation succeeds" +"2019-09-24 00:27:12.740 UTC [policies] Evaluate -> DEBU 65ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.740 UTC [policies] Evaluate -> DEBU 65ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:12.740 UTC [policies] Evaluate -> DEBU 65ae Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:12.740 UTC [policies] Evaluate -> DEBU 65af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:12.740 UTC [gossip.discovery] handleAliveMessage -> DEBU 65b0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:12.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 65b1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:12.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 65b2 updating membership: timestamp: " +"2019-09-24 00:27:12.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 65b3 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:12.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 65b4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:12.740 UTC [gossip.discovery] learnExistingMembers -> DEBU 65b5 Exiting" +"2019-09-24 00:27:12.740 UTC [gossip.discovery] handleAliveMessage -> DEBU 65b6 Exiting" +"2019-09-24 00:27:12.740 UTC [gossip.discovery] handleMsgFromComm -> DEBU 65b7 Exiting" +"2019-09-24 00:27:12.740 UTC [gossip.discovery] sendMemResponse -> DEBU 65b8 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:27:12.740 UTC [msp] DeserializeIdentity -> DEBU 65b9 Obtaining identity" +"2019-09-24 00:27:12.741 UTC [msp] DeserializeIdentity -> DEBU 65ba Obtaining identity" +"2019-09-24 00:27:12.741 UTC [msp] DeserializeIdentity -> DEBU 65bb Obtaining identity" +"2019-09-24 00:27:12.741 UTC [gossip.comm] Send -> DEBU 65bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:12.741 UTC [gossip.discovery] sendMemResponse -> DEBU 65bd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020R" signature:"0D\002 \036xOq\007N\2040vD}m\351Q\003\3456\345\371\306\254\255\2152\317\330\270\354\301bG\255\002 o\007\013\037\027=\021\r\217i\272\371k\214\343\321\210\331d\014\331L\217\314\346\200c\321\343w6" > alive: alive: alive: " +"2019-09-24 00:27:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 65be Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 65bf Exiting" +"2019-09-24 00:27:12.784 UTC [gossip.comm] func1 -> DEBU 65c0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.784 UTC [gossip.gossip] handleMessage -> DEBU 65c1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.784 UTC [gossip.pull] HandleMessage -> DEBU 65c2 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.784 UTC [msp] DeserializeIdentity -> DEBU 65c3 Obtaining identity" +"2019-09-24 00:27:12.784 UTC [msp] DeserializeIdentity -> DEBU 65c4 Obtaining identity" +"2019-09-24 00:27:12.785 UTC [msp] DeserializeIdentity -> DEBU 65c5 Obtaining identity" +"2019-09-24 00:27:12.785 UTC [msp] DeserializeIdentity -> DEBU 65c6 Obtaining identity" +"2019-09-24 00:27:12.785 UTC [msp] DeserializeIdentity -> DEBU 65c7 Obtaining identity" +"2019-09-24 00:27:12.785 UTC [msp] DeserializeIdentity -> DEBU 65c8 Obtaining identity" +"2019-09-24 00:27:12.785 UTC [gossip.pull] SendDigest -> DEBU 65c9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:27:12.785 UTC [gossip.gossip] handleMessage -> DEBU 65ca Exiting" +"2019-09-24 00:27:12.805 UTC [gossip.comm] func1 -> DEBU 65cb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.805 UTC [gossip.gossip] handleMessage -> DEBU 65cc Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.805 UTC [gossip.pull] HandleMessage -> DEBU 65cd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes" +"2019-09-24 00:27:12.805 UTC [gossip.pull] SendDigest -> DEBU 65ce Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:12.805 UTC [gossip.gossip] handleMessage -> DEBU 65cf Exiting" +"2019-09-24 00:27:13.038 UTC [gossip.gossip] handleMessage -> DEBU 65d0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:13.039 UTC [msp] DeserializeIdentity -> DEBU 65d1 Obtaining identity" +"2019-09-24 00:27:13.040 UTC [msp] DeserializeIdentity -> DEBU 65d2 Obtaining identity" +"2019-09-24 00:27:13.040 UTC [msp] DeserializeIdentity -> DEBU 65d3 Obtaining identity" +"2019-09-24 00:27:13.040 UTC [gossip.gossip] handleMessage -> DEBU 65d4 Exiting" +"2019-09-24 00:27:13.614 UTC [gossip.comm] func1 -> DEBU 65d5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:13.615 UTC [gossip.gossip] handleMessage -> DEBU 65d6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:13.615 UTC [gossip.pull] HandleMessage -> DEBU 65d7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:13.617 UTC [gossip.pull] SendDigest -> DEBU 65d8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:13.617 UTC [gossip.gossip] handleMessage -> DEBU 65d9 Exiting" +"2019-09-24 00:27:13.754 UTC [gossip.comm] func1 -> DEBU 65da Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:13.755 UTC [gossip.gossip] handleMessage -> DEBU 65db Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:13.755 UTC [gossip.gossip] handleMessage -> DEBU 65dc Exiting" +"2019-09-24 00:27:13.755 UTC [gossip.discovery] handleMsgFromComm -> DEBU 65dd Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:13.756 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 65de Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:13.756 UTC [msp.identity] Verify -> DEBU 65df Verify: digest = 00000000 4a 30 e0 bb a7 a4 b9 08 d7 60 b0 1c b1 15 57 78 |J0.......`....Wx| +00000010 aa b3 08 84 e6 68 10 8e cf 49 b5 7b 44 b8 ee 5d |.....h...I.{D..]|" +"2019-09-24 00:27:13.757 UTC [msp.identity] Verify -> DEBU 65e0 Verify: sig = 00000000 30 44 02 20 3b 5b 6d 73 0c c3 63 f5 4b 71 e0 31 |0D. ;[ms..c.Kq.1| +00000010 67 ce 08 68 39 f3 20 70 cb 5e de 40 08 4f 28 5b |g..h9. p.^.@.O([| +00000020 19 18 13 97 02 20 7b 34 a8 30 5d 62 ae a9 18 35 |..... {4.0]b...5| +00000030 f7 82 05 01 79 8c 0e 74 67 61 e4 48 a1 51 91 06 |....y..tga.H.Q..| +00000040 b4 c8 93 33 31 c4 |...31.|" +"2019-09-24 00:27:13.758 UTC [msp.identity] Verify -> DEBU 65e1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:27:13.758 UTC [msp.identity] Verify -> DEBU 65e2 Verify: sig = 00000000 30 45 02 21 00 ac 4e 5f e1 dd 6c bf 62 b5 d5 c5 |0E.!..N_..l.b...| +00000010 cf 29 4b fc 93 e0 c8 f5 a5 84 87 77 a9 5f 1c e0 |.)K........w._..| +00000020 35 71 c8 52 6b 02 20 54 f6 08 fb 25 2d fb 25 35 |5q.Rk. T...%-.%5| +00000030 31 b6 d6 65 b4 56 98 b2 20 78 e5 e7 4e 06 a3 41 |1..e.V.. x..N..A| +00000040 1d 00 f1 46 38 db fa |...F8..|" +"2019-09-24 00:27:13.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 65e3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:27:13.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 65e4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:27:13.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 65e5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:13.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 65e6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:13.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 65e7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:13.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 65e8 Exiting" +"2019-09-24 00:27:13.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 65e9 Exiting" +"2019-09-24 00:27:13.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU 65ea Exiting" +"2019-09-24 00:27:13.760 UTC [gossip.discovery] sendMemResponse -> DEBU 65eb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:27:13.760 UTC [msp] DeserializeIdentity -> DEBU 65ec Obtaining identity" +"2019-09-24 00:27:13.760 UTC [msp] DeserializeIdentity -> DEBU 65ed Obtaining identity" +"2019-09-24 00:27:13.761 UTC [gossip.comm] Send -> DEBU 65ee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:13.761 UTC [gossip.discovery] sendMemResponse -> DEBU 65ef Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" secret_envelope: > alive: " +"2019-09-24 00:27:13.761 UTC [gossip.comm] sendToEndpoint -> DEBU 65f0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 00:27:13.761 UTC [gossip.comm] sendToEndpoint -> DEBU 65f1 Exiting" +"2019-09-24 00:27:13.976 UTC [gossip.comm] func1 -> DEBU 65f2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:13.976 UTC [gossip.gossip] handleMessage -> DEBU 65f3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:13.976 UTC [msp] DeserializeIdentity -> DEBU 65f4 Obtaining identity" +"2019-09-24 00:27:13.976 UTC [msp] DeserializeIdentity -> DEBU 65f5 Obtaining identity" +"2019-09-24 00:27:13.976 UTC [msp] DeserializeIdentity -> DEBU 65f6 Obtaining identity" +"2019-09-24 00:27:13.976 UTC [gossip.gossip] handleMessage -> DEBU 65f7 Exiting" +"2019-09-24 00:27:14.566 UTC [msp] GetDefaultSigningIdentity -> DEBU 65f8 Obtaining default signing identity" +"2019-09-24 00:27:14.566 UTC [msp.identity] Sign -> DEBU 65f9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315104F " +"2019-09-24 00:27:14.566 UTC [msp.identity] Sign -> DEBU 65fa Sign: digest: DC5B9B185289E524521D816FFE2E7413F367DF8B09833899163A9AF122482F20 " +"2019-09-24 00:27:14.566 UTC [msp] GetDefaultSigningIdentity -> DEBU 65fb Obtaining default signing identity" +"2019-09-24 00:27:14.566 UTC [msp.identity] Sign -> DEBU 65fc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:14.566 UTC [msp.identity] Sign -> DEBU 65fd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:14.566 UTC [gossip.discovery] periodicalSendAlive -> DEBU 65fe Sleeping 5s" +"2019-09-24 00:27:14.571 UTC [msp] DeserializeIdentity -> DEBU 65ff Obtaining identity" +"2019-09-24 00:27:14.571 UTC [msp] DeserializeIdentity -> DEBU 6600 Obtaining identity" +"2019-09-24 00:27:14.571 UTC [gossip.comm] Send -> DEBU 6601 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:14.571 UTC [msp] DeserializeIdentity -> DEBU 6602 Obtaining identity" +"2019-09-24 00:27:14.571 UTC [gossip.comm] Send -> DEBU 6603 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:14.571 UTC [msp] DeserializeIdentity -> DEBU 6604 Obtaining identity" +"2019-09-24 00:27:14.571 UTC [gossip.comm] Send -> DEBU 6605 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 6606 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 6607 Exiting" +"2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 6608 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 6609 Exiting" +"2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 660a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:14.572 UTC [gossip.comm] sendToEndpoint -> DEBU 660b Exiting" +"2019-09-24 00:27:14.907 UTC [gossip.gossip] handleMessage -> DEBU 660c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:14.907 UTC [gossip.gossip] handleMessage -> DEBU 660d Exiting" +"2019-09-24 00:27:14.907 UTC [gossip.discovery] handleMsgFromComm -> DEBU 660e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:14.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 660f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:14.907 UTC [msp] DeserializeIdentity -> DEBU 6610 Obtaining identity" +"2019-09-24 00:27:14.908 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6611 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:14.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6612 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:14.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6613 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 6614 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 6615 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 6616 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:14.908 UTC [cauthdsl] func1 -> DEBU 6617 0xc00361e4d0 gate 1569284834908459300 evaluation starts" +"2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 6618 0xc00361e4d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 6619 0xc00361e4d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 661a 0xc00361e4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 661b 0xc00361e4d0 principal evaluation fails" +"2019-09-24 00:27:14.908 UTC [cauthdsl] func1 -> DEBU 661c 0xc00361e4d0 gate 1569284834908459300 evaluation fails" +"2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 661d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 661e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:14.908 UTC [policies] Evaluate -> DEBU 661f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:14.908 UTC [cauthdsl] func1 -> DEBU 6620 0xc00361ed10 gate 1569284834908842800 evaluation starts" +"2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 6621 0xc00361ed10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 6622 0xc00361ed10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:14.908 UTC [cauthdsl] func2 -> DEBU 6623 0xc00361ed10 principal matched by identity 0" +"2019-09-24 00:27:14.909 UTC [msp.identity] Verify -> DEBU 6624 Verify: digest = 00000000 72 45 61 db 38 91 dd 6a 19 b8 3a bf 18 86 79 37 |rEa.8..j..:...y7| +00000010 dd 1f 26 44 65 1c 01 1a f7 7e 95 98 da 78 d4 0f |..&De....~...x..|" +"2019-09-24 00:27:14.909 UTC [msp.identity] Verify -> DEBU 6625 Verify: sig = 00000000 30 44 02 20 02 25 8b 4c 0d d8 fb 9d 81 3d 7c 4a |0D. .%.L.....=|J| +00000010 e6 ed 7f 5e b4 2b fd 8b 67 2b ee ea f4 63 68 b6 |...^.+..g+...ch.| +00000020 6d 86 88 54 02 20 06 d0 83 73 90 06 2c de 95 98 |m..T. ...s..,...| +00000030 23 b9 a6 2f b0 9e ab c2 5b 14 81 c3 d0 ff a4 6f |#../....[......o| +00000040 ff fe 15 82 8b 37 |.....7|" +"2019-09-24 00:27:14.909 UTC [cauthdsl] func2 -> DEBU 6626 0xc00361ed10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:14.909 UTC [cauthdsl] func1 -> DEBU 6627 0xc00361ed10 gate 1569284834908842800 evaluation succeeds" +"2019-09-24 00:27:14.909 UTC [policies] Evaluate -> DEBU 6628 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:14.909 UTC [policies] Evaluate -> DEBU 6629 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:14.909 UTC [policies] Evaluate -> DEBU 662a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:14.909 UTC [policies] Evaluate -> DEBU 662b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:14.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 662c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:14.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 662d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:14.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 662e updating membership: timestamp: " +"2019-09-24 00:27:14.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 662f Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:14.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 6630 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:14.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 6631 Exiting" +"2019-09-24 00:27:14.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 6632 Exiting" +"2019-09-24 00:27:14.910 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6633 Exiting" +"2019-09-24 00:27:14.911 UTC [msp] DeserializeIdentity -> DEBU 6634 Obtaining identity" +"2019-09-24 00:27:14.912 UTC [msp] DeserializeIdentity -> DEBU 6635 Obtaining identity" +"2019-09-24 00:27:14.912 UTC [msp] DeserializeIdentity -> DEBU 6636 Obtaining identity" +"2019-09-24 00:27:14.912 UTC [msp] DeserializeIdentity -> DEBU 6637 Obtaining identity" +"2019-09-24 00:27:14.912 UTC [msp] DeserializeIdentity -> DEBU 6638 Obtaining identity" +"2019-09-24 00:27:14.912 UTC [msp] DeserializeIdentity -> DEBU 6639 Obtaining identity" +"2019-09-24 00:27:14.913 UTC [gossip.comm] Send -> DEBU 663a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:14.913 UTC [msp] DeserializeIdentity -> DEBU 663b Obtaining identity" +"2019-09-24 00:27:14.913 UTC [msp] DeserializeIdentity -> DEBU 663c Obtaining identity" +"2019-09-24 00:27:14.913 UTC [gossip.comm] Send -> DEBU 663d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:14.913 UTC [gossip.comm] sendToEndpoint -> DEBU 663e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:14.913 UTC [gossip.comm] sendToEndpoint -> DEBU 663f Exiting" +"2019-09-24 00:27:14.913 UTC [gossip.comm] sendToEndpoint -> DEBU 6640 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:14.913 UTC [gossip.comm] sendToEndpoint -> DEBU 6641 Exiting" +"2019-09-24 00:27:14.917 UTC [gossip.comm] func1 -> DEBU 6642 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:14.917 UTC [gossip.gossip] handleMessage -> DEBU 6643 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:14.917 UTC [gossip.gossip] handleMessage -> DEBU 6644 Exiting" +"2019-09-24 00:27:14.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6645 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:14.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6646 Exiting" +"2019-09-24 00:27:14.918 UTC [gossip.comm] func1 -> DEBU 6647 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:14.918 UTC [gossip.gossip] handleMessage -> DEBU 6648 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:14.919 UTC [gossip.gossip] handleMessage -> DEBU 6649 Exiting" +"2019-09-24 00:27:14.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 664a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:14.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 664b Exiting" +"2019-09-24 00:27:15.636 UTC [gossip.comm] func1 -> DEBU 664c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.636 UTC [gossip.gossip] handleMessage -> DEBU 664d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.636 UTC [gossip.gossip] handleMessage -> DEBU 664e Exiting" +"2019-09-24 00:27:15.636 UTC [gossip.discovery] handleMsgFromComm -> DEBU 664f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.636 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6650 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:15.636 UTC [msp] DeserializeIdentity -> DEBU 6651 Obtaining identity" +"2019-09-24 00:27:15.637 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6652 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:15.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6653 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:15.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6654 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 6655 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 6656 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 6657 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:15.637 UTC [cauthdsl] func1 -> DEBU 6658 0xc0036545f0 gate 1569284835637436400 evaluation starts" +"2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 6659 0xc0036545f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 665a 0xc0036545f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 665b 0xc0036545f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 665c 0xc0036545f0 principal evaluation fails" +"2019-09-24 00:27:15.637 UTC [cauthdsl] func1 -> DEBU 665d 0xc0036545f0 gate 1569284835637436400 evaluation fails" +"2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 665e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 665f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:15.637 UTC [policies] Evaluate -> DEBU 6660 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:15.637 UTC [cauthdsl] func1 -> DEBU 6661 0xc003654e30 gate 1569284835637866600 evaluation starts" +"2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 6662 0xc003654e30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:15.637 UTC [cauthdsl] func2 -> DEBU 6663 0xc003654e30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:15.638 UTC [cauthdsl] func2 -> DEBU 6664 0xc003654e30 principal matched by identity 0" +"2019-09-24 00:27:15.638 UTC [msp.identity] Verify -> DEBU 6665 Verify: digest = 00000000 88 39 86 c6 a6 1b 4c d3 1f 3d de 6e 96 ed d9 fc |.9....L..=.n....| +00000010 25 19 86 71 38 e7 09 1d 16 9e 95 7e 4b c2 26 44 |%..q8......~K.&D|" +"2019-09-24 00:27:15.638 UTC [msp.identity] Verify -> DEBU 6666 Verify: sig = 00000000 30 45 02 21 00 e5 11 97 3a 20 e7 fd 52 08 13 ba |0E.!....: ..R...| +00000010 dd 0a 45 77 5b 2d 97 ee 6f 27 3c c4 49 71 53 dc |..Ew[-..o'<.IqS.| +00000020 51 80 aa e5 c0 02 20 56 10 be c7 2a 2b 6f a9 bc |Q..... V...*+o..| +00000030 c2 f7 8a 51 13 a2 ab 91 eb f4 95 1b 5c e4 73 93 |...Q........\.s.| +00000040 a7 93 da 5a 27 5f b6 |...Z'_.|" +"2019-09-24 00:27:15.638 UTC [cauthdsl] func2 -> DEBU 6667 0xc003654e30 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:15.638 UTC [cauthdsl] func1 -> DEBU 6668 0xc003654e30 gate 1569284835637866600 evaluation succeeds" +"2019-09-24 00:27:15.638 UTC [policies] Evaluate -> DEBU 6669 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:15.638 UTC [policies] Evaluate -> DEBU 666a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:15.638 UTC [policies] Evaluate -> DEBU 666b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:15.638 UTC [policies] Evaluate -> DEBU 666c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:15.638 UTC [gossip.discovery] handleAliveMessage -> DEBU 666d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 666e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:15.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 666f updating membership: timestamp: " +"2019-09-24 00:27:15.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 6670 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:15.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 6671 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:15.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 6672 Exiting" +"2019-09-24 00:27:15.638 UTC [gossip.discovery] handleAliveMessage -> DEBU 6673 Exiting" +"2019-09-24 00:27:15.638 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6674 Exiting" +"2019-09-24 00:27:15.643 UTC [msp] DeserializeIdentity -> DEBU 6675 Obtaining identity" +"2019-09-24 00:27:15.645 UTC [msp] DeserializeIdentity -> DEBU 6678 Obtaining identity" +"2019-09-24 00:27:15.644 UTC [gossip.gossip] handleMessage -> DEBU 6676 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.646 UTC [gossip.gossip] handleMessage -> DEBU 6679 Exiting" +"2019-09-24 00:27:15.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 667a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 667b Exiting" +"2019-09-24 00:27:15.644 UTC [gossip.comm] func1 -> DEBU 6677 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.647 UTC [gossip.gossip] handleMessage -> DEBU 667c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.648 UTC [gossip.gossip] handleMessage -> DEBU 667d Exiting" +"2019-09-24 00:27:15.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 667e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 667f Exiting" +"2019-09-24 00:27:15.645 UTC [msp] DeserializeIdentity -> DEBU 6680 Obtaining identity" +"2019-09-24 00:27:15.649 UTC [msp] DeserializeIdentity -> DEBU 6681 Obtaining identity" +"2019-09-24 00:27:15.650 UTC [msp] DeserializeIdentity -> DEBU 6682 Obtaining identity" +"2019-09-24 00:27:15.650 UTC [msp] DeserializeIdentity -> DEBU 6683 Obtaining identity" +"2019-09-24 00:27:15.651 UTC [msp] DeserializeIdentity -> DEBU 6684 Obtaining identity" +"2019-09-24 00:27:15.651 UTC [gossip.comm] Send -> DEBU 6685 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:15.651 UTC [msp] DeserializeIdentity -> DEBU 6686 Obtaining identity" +"2019-09-24 00:27:15.652 UTC [gossip.comm] sendToEndpoint -> DEBU 6687 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.653 UTC [gossip.comm] sendToEndpoint -> DEBU 6688 Exiting" +"2019-09-24 00:27:15.654 UTC [gossip.comm] Send -> DEBU 6689 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:15.654 UTC [gossip.comm] sendToEndpoint -> DEBU 668a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.655 UTC [gossip.comm] sendToEndpoint -> DEBU 668b Exiting" +"2019-09-24 00:27:15.684 UTC [gossip.pull] Hello -> DEBU 668c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:15.684 UTC [gossip.comm] Send -> DEBU 668d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:15.686 UTC [gossip.pull] Hello -> DEBU 668e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:27:15.686 UTC [gossip.comm] Send -> DEBU 668f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:15.686 UTC [gossip.pull] Hello -> DEBU 6690 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:27:15.688 UTC [gossip.comm] Send -> DEBU 6691 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:15.688 UTC [gossip.comm] sendToEndpoint -> DEBU 6692 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.689 UTC [gossip.comm] sendToEndpoint -> DEBU 6695 Exiting" +"2019-09-24 00:27:15.688 UTC [gossip.comm] sendToEndpoint -> DEBU 6693 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.690 UTC [gossip.comm] sendToEndpoint -> DEBU 6696 Exiting" +"2019-09-24 00:27:15.688 UTC [gossip.comm] sendToEndpoint -> DEBU 6694 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.691 UTC [gossip.comm] sendToEndpoint -> DEBU 6697 Exiting" +"2019-09-24 00:27:15.693 UTC [gossip.comm] func1 -> DEBU 6698 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.693 UTC [gossip.gossip] handleMessage -> DEBU 6699 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.694 UTC [gossip.pull] HandleMessage -> DEBU 669a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.694 UTC [gossip.gossip] handleMessage -> DEBU 669b Exiting" +"2019-09-24 00:27:15.694 UTC [gossip.gossip] handleMessage -> DEBU 669c Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.694 UTC [gossip.pull] HandleMessage -> DEBU 669d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.694 UTC [gossip.gossip] handleMessage -> DEBU 669e Exiting" +"2019-09-24 00:27:15.695 UTC [gossip.comm] func1 -> DEBU 669f Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.695 UTC [gossip.gossip] handleMessage -> DEBU 66a0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.696 UTC [gossip.pull] HandleMessage -> DEBU 66a1 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.696 UTC [gossip.gossip] handleMessage -> DEBU 66a2 Exiting" +"2019-09-24 00:27:15.831 UTC [msp] GetDefaultSigningIdentity -> DEBU 66a3 Obtaining default signing identity" +"2019-09-24 00:27:15.831 UTC [msp.identity] Sign -> DEBU 66a4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151050 " +"2019-09-24 00:27:15.831 UTC [msp.identity] Sign -> DEBU 66a5 Sign: digest: 063171702962DACAED290160D77D50336BE45BCDB8951B5318B04AC8148F05D7 " +"2019-09-24 00:27:15.831 UTC [msp] GetDefaultSigningIdentity -> DEBU 66a6 Obtaining default signing identity" +"2019-09-24 00:27:15.831 UTC [msp.identity] Sign -> DEBU 66a7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:15.831 UTC [msp.identity] Sign -> DEBU 66a8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:15.832 UTC [gossip.comm] Send -> DEBU 66a9 Entering, sending GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:15.832 UTC [msp] DeserializeIdentity -> DEBU 66aa Obtaining identity" +"2019-09-24 00:27:15.833 UTC [gossip.comm] Send -> DEBU 66ab Entering, sending GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:15.833 UTC [msp] DeserializeIdentity -> DEBU 66ac Obtaining identity" +"2019-09-24 00:27:15.833 UTC [gossip.comm] Send -> DEBU 66ad Entering, sending GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:15.833 UTC [gossip.comm] sendToEndpoint -> DEBU 66ae Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.834 UTC [gossip.comm] sendToEndpoint -> DEBU 66af Exiting" +"2019-09-24 00:27:15.834 UTC [gossip.comm] sendToEndpoint -> DEBU 66b0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.834 UTC [gossip.comm] sendToEndpoint -> DEBU 66b1 Exiting" +"2019-09-24 00:27:15.834 UTC [gossip.comm] sendToEndpoint -> DEBU 66b2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277\263n\350\014\371\314\333A\037S\337\337\233)\250\263T\237Z^\314:i\240Z\270\023\002 `\243\332\340}\320(\354V\3348y\310O\205\204\227M\304\254Pt\214\350c\220\366.\314z\234\204" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.834 UTC [gossip.comm] sendToEndpoint -> DEBU 66b3 Exiting" +"2019-09-24 00:27:15.848 UTC [gossip.comm] func1 -> DEBU 66b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.848 UTC [gossip.gossip] handleMessage -> DEBU 66b5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.849 UTC [gossip.gossip] handleMessage -> DEBU 66b6 Exiting" +"2019-09-24 00:27:15.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.850 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66b8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:15.851 UTC [msp.identity] Verify -> DEBU 66b9 Verify: digest = 00000000 06 31 71 70 29 62 da ca ed 29 01 60 d7 7d 50 33 |.1qp)b...).`.}P3| +00000010 6b e4 5b cd b8 95 1b 53 18 b0 4a c8 14 8f 05 d7 |k.[....S..J.....|" +"2019-09-24 00:27:15.851 UTC [msp.identity] Verify -> DEBU 66ba Verify: sig = 00000000 30 45 02 21 00 e6 bb e2 3e bf b3 6e e8 0c f9 cc |0E.!....>..n....| +00000010 db 41 1f 53 df df 9b 29 a8 b3 54 9f 5a 5e cc 3a |.A.S...)..T.Z^.:| +00000020 69 a0 5a b8 13 02 20 60 a3 da e0 7d d0 28 ec 56 |i.Z... `...}.(.V| +00000030 dc 38 79 c8 4f 85 84 97 4d c4 ac 50 74 8c e8 63 |.8y.O...M..Pt..c| +00000040 90 f6 2e cc 7a 9c 84 |....z..|" +"2019-09-24 00:27:15.853 UTC [msp.identity] Verify -> DEBU 66bb Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 00:27:15.854 UTC [gossip.comm] func1 -> DEBU 66bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.854 UTC [gossip.gossip] handleMessage -> DEBU 66bd Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.853 UTC [msp.identity] Verify -> DEBU 66be Verify: sig = 00000000 30 45 02 21 00 cd 73 83 0c e0 0d 7e 01 2c 07 5f |0E.!..s....~.,._| +00000010 f4 ee c3 59 74 8f f4 5b 44 cd 89 e8 86 87 cf bf |...Yt..[D.......| +00000020 d3 a8 8a 37 ef 02 20 12 42 aa b7 0d d2 2d 0b c8 |...7.. .B....-..| +00000030 5b 05 3c aa 18 cf 74 d3 49 33 1b bb e4 44 51 09 |[.<...t.I3...DQ.| +00000040 d6 2b c0 c5 d4 47 b7 |.+...G.|" +"2019-09-24 00:27:15.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 66bf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:27:15.856 UTC [gossip.discovery] isSentByMe -> DEBU 66c0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:27:15.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 66c1 Exiting" +"2019-09-24 00:27:15.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66c2 Exiting" +"2019-09-24 00:27:15.856 UTC [gossip.gossip] handleMessage -> DEBU 66c3 Exiting" +"2019-09-24 00:27:15.857 UTC [gossip.gossip] handleMessage -> DEBU 66c4 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66c5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.857 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66c6 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:15.858 UTC [msp.identity] Verify -> DEBU 66c7 Verify: digest = 00000000 4a 30 e0 bb a7 a4 b9 08 d7 60 b0 1c b1 15 57 78 |J0.......`....Wx| +00000010 aa b3 08 84 e6 68 10 8e cf 49 b5 7b 44 b8 ee 5d |.....h...I.{D..]|" +"2019-09-24 00:27:15.858 UTC [msp.identity] Verify -> DEBU 66c8 Verify: sig = 00000000 30 44 02 20 3b 5b 6d 73 0c c3 63 f5 4b 71 e0 31 |0D. ;[ms..c.Kq.1| +00000010 67 ce 08 68 39 f3 20 70 cb 5e de 40 08 4f 28 5b |g..h9. p.^.@.O([| +00000020 19 18 13 97 02 20 7b 34 a8 30 5d 62 ae a9 18 35 |..... {4.0]b...5| +00000030 f7 82 05 01 79 8c 0e 74 67 61 e4 48 a1 51 91 06 |....y..tga.H.Q..| +00000040 b4 c8 93 33 31 c4 |...31.|" +"2019-09-24 00:27:15.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 66c9 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:15.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 66ca Exiting" +"2019-09-24 00:27:15.860 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66cb Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:15.861 UTC [msp.identity] Verify -> DEBU 66cc Verify: digest = 00000000 06 31 71 70 29 62 da ca ed 29 01 60 d7 7d 50 33 |.1qp)b...).`.}P3| +00000010 6b e4 5b cd b8 95 1b 53 18 b0 4a c8 14 8f 05 d7 |k.[....S..J.....|" +"2019-09-24 00:27:15.861 UTC [msp.identity] Verify -> DEBU 66cd Verify: sig = 00000000 30 45 02 21 00 e6 bb e2 3e bf b3 6e e8 0c f9 cc |0E.!....>..n....| +00000010 db 41 1f 53 df df 9b 29 a8 b3 54 9f 5a 5e cc 3a |.A.S...)..T.Z^.:| +00000020 69 a0 5a b8 13 02 20 60 a3 da e0 7d d0 28 ec 56 |i.Z... `...}.(.V| +00000030 dc 38 79 c8 4f 85 84 97 4d c4 ac 50 74 8c e8 63 |.8y.O...M..Pt..c| +00000040 90 f6 2e cc 7a 9c 84 |....z..|" +"2019-09-24 00:27:15.862 UTC [gossip.discovery] handleAliveMessage -> DEBU 66ce Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.862 UTC [gossip.discovery] isSentByMe -> DEBU 66cf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.863 UTC [gossip.discovery] handleAliveMessage -> DEBU 66d0 Exiting" +"2019-09-24 00:27:15.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66d1 Exiting" +"2019-09-24 00:27:15.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.864 UTC [gossip.gossip] handleMessage -> DEBU 66d3 Exiting" +"2019-09-24 00:27:15.865 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66d4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:15.866 UTC [msp.identity] Verify -> DEBU 66d5 Verify: digest = 00000000 06 31 71 70 29 62 da ca ed 29 01 60 d7 7d 50 33 |.1qp)b...).`.}P3| +00000010 6b e4 5b cd b8 95 1b 53 18 b0 4a c8 14 8f 05 d7 |k.[....S..J.....|" +"2019-09-24 00:27:15.866 UTC [msp.identity] Verify -> DEBU 66d6 Verify: sig = 00000000 30 45 02 21 00 e6 bb e2 3e bf b3 6e e8 0c f9 cc |0E.!....>..n....| +00000010 db 41 1f 53 df df 9b 29 a8 b3 54 9f 5a 5e cc 3a |.A.S...)..T.Z^.:| +00000020 69 a0 5a b8 13 02 20 60 a3 da e0 7d d0 28 ec 56 |i.Z... `...}.(.V| +00000030 dc 38 79 c8 4f 85 84 97 4d c4 ac 50 74 8c e8 63 |.8y.O...M..Pt..c| +00000040 90 f6 2e cc 7a 9c 84 |....z..|" +"2019-09-24 00:27:15.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 66d7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.867 UTC [gossip.discovery] isSentByMe -> DEBU 66d8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:15.867 UTC [gossip.discovery] handleAliveMessage -> DEBU 66d9 Exiting" +"2019-09-24 00:27:15.868 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66da Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:15.869 UTC [msp.identity] Verify -> DEBU 66db Verify: digest = 00000000 4a 30 e0 bb a7 a4 b9 08 d7 60 b0 1c b1 15 57 78 |J0.......`....Wx| +00000010 aa b3 08 84 e6 68 10 8e cf 49 b5 7b 44 b8 ee 5d |.....h...I.{D..]|" +"2019-09-24 00:27:15.870 UTC [msp.identity] Verify -> DEBU 66dc Verify: sig = 00000000 30 44 02 20 3b 5b 6d 73 0c c3 63 f5 4b 71 e0 31 |0D. ;[ms..c.Kq.1| +00000010 67 ce 08 68 39 f3 20 70 cb 5e de 40 08 4f 28 5b |g..h9. p.^.@.O([| +00000020 19 18 13 97 02 20 7b 34 a8 30 5d 62 ae a9 18 35 |..... {4.0]b...5| +00000030 f7 82 05 01 79 8c 0e 74 67 61 e4 48 a1 51 91 06 |....y..tga.H.Q..| +00000040 b4 c8 93 33 31 c4 |...31.|" +"2019-09-24 00:27:15.871 UTC [gossip.discovery] handleAliveMessage -> DEBU 66dd Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:15.871 UTC [gossip.discovery] handleAliveMessage -> DEBU 66de Exiting" +"2019-09-24 00:27:15.872 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66df Exiting" +"2019-09-24 00:27:15.881 UTC [gossip.gossip] handleMessage -> DEBU 66e0 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.881 UTC [gossip.pull] HandleMessage -> DEBU 66e1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.882 UTC [msp] DeserializeIdentity -> DEBU 66e2 Obtaining identity" +"2019-09-24 00:27:15.882 UTC [msp] DeserializeIdentity -> DEBU 66e3 Obtaining identity" +"2019-09-24 00:27:15.883 UTC [msp] DeserializeIdentity -> DEBU 66e4 Obtaining identity" +"2019-09-24 00:27:15.883 UTC [msp] DeserializeIdentity -> DEBU 66e5 Obtaining identity" +"2019-09-24 00:27:15.883 UTC [msp] DeserializeIdentity -> DEBU 66e6 Obtaining identity" +"2019-09-24 00:27:15.884 UTC [msp] DeserializeIdentity -> DEBU 66e7 Obtaining identity" +"2019-09-24 00:27:15.884 UTC [gossip.pull] SendDigest -> DEBU 66e8 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:27:15.885 UTC [gossip.gossip] handleMessage -> DEBU 66e9 Exiting" +"2019-09-24 00:27:15.989 UTC [gossip.gossip] handleMessage -> DEBU 66ea Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.989 UTC [gossip.gossip] handleMessage -> DEBU 66eb Exiting" +"2019-09-24 00:27:15.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66ec Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:15.990 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 66ed Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:15.992 UTC [msp] DeserializeIdentity -> DEBU 66ee Obtaining identity" +"2019-09-24 00:27:15.995 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 66ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:15.995 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 66f0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:15.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 66f1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:15.998 UTC [policies] Evaluate -> DEBU 66f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:15.998 UTC [policies] Evaluate -> DEBU 66f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:15.998 UTC [policies] Evaluate -> DEBU 66f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:16.004 UTC [cauthdsl] func1 -> DEBU 66f5 0xc004acf380 gate 1569284836004494700 evaluation starts" +"2019-09-24 00:27:16.004 UTC [cauthdsl] func2 -> DEBU 66f6 0xc004acf380 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.004 UTC [cauthdsl] func2 -> DEBU 66f7 0xc004acf380 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.005 UTC [cauthdsl] func2 -> DEBU 66f8 0xc004acf380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:16.005 UTC [cauthdsl] func2 -> DEBU 66f9 0xc004acf380 principal evaluation fails" +"2019-09-24 00:27:16.005 UTC [cauthdsl] func1 -> DEBU 66fa 0xc004acf380 gate 1569284836004494700 evaluation fails" +"2019-09-24 00:27:16.006 UTC [policies] Evaluate -> DEBU 66fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.006 UTC [policies] Evaluate -> DEBU 66fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.008 UTC [policies] Evaluate -> DEBU 66fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:16.008 UTC [cauthdsl] func1 -> DEBU 66fe 0xc004acfbc0 gate 1569284836008380800 evaluation starts" +"2019-09-24 00:27:16.008 UTC [cauthdsl] func2 -> DEBU 66ff 0xc004acfbc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.008 UTC [cauthdsl] func2 -> DEBU 6700 0xc004acfbc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.008 UTC [cauthdsl] func2 -> DEBU 6701 0xc004acfbc0 principal matched by identity 0" +"2019-09-24 00:27:16.008 UTC [msp.identity] Verify -> DEBU 6702 Verify: digest = 00000000 66 ce 27 f9 48 4d ad eb 61 54 a3 e4 99 22 be c2 |f.'.HM..aT..."..| +00000010 2c f4 1a b0 14 57 34 a6 9b 1f 2f 29 dc 39 a6 28 |,....W4.../).9.(|" +"2019-09-24 00:27:16.008 UTC [msp.identity] Verify -> DEBU 6703 Verify: sig = 00000000 30 44 02 20 4e d6 f6 48 83 5b 09 83 e5 6b bb ed |0D. N..H.[...k..| +00000010 cf 30 72 43 c0 4a 49 1a 0d 65 b3 4b 29 80 1f 00 |.0rC.JI..e.K)...| +00000020 23 af 10 32 02 20 6c fe ac 4c 50 4f a3 31 0f 6f |#..2. l..LPO.1.o| +00000030 b0 17 47 1a b1 10 ce 7f 61 d6 eb fd 9f 27 37 6f |..G.....a....'7o| +00000040 2b 86 38 50 bf d1 |+.8P..|" +"2019-09-24 00:27:16.008 UTC [cauthdsl] func2 -> DEBU 6704 0xc004acfbc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:16.009 UTC [cauthdsl] func1 -> DEBU 6705 0xc004acfbc0 gate 1569284836008380800 evaluation succeeds" +"2019-09-24 00:27:16.009 UTC [policies] Evaluate -> DEBU 6706 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.009 UTC [policies] Evaluate -> DEBU 6707 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.009 UTC [policies] Evaluate -> DEBU 6708 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:16.009 UTC [policies] Evaluate -> DEBU 6709 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:16.009 UTC [gossip.discovery] handleAliveMessage -> DEBU 670a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:16.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 670b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:16.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 670c updating membership: timestamp: " +"2019-09-24 00:27:16.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 670d Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:16.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 670e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:16.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 670f Exiting" +"2019-09-24 00:27:16.010 UTC [gossip.discovery] handleAliveMessage -> DEBU 6710 Exiting" +"2019-09-24 00:27:16.010 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6711 Exiting" +"2019-09-24 00:27:16.010 UTC [gossip.discovery] sendMemResponse -> DEBU 6712 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:27:16.010 UTC [msp] DeserializeIdentity -> DEBU 6713 Obtaining identity" +"2019-09-24 00:27:16.010 UTC [msp] DeserializeIdentity -> DEBU 6714 Obtaining identity" +"2019-09-24 00:27:16.010 UTC [msp] DeserializeIdentity -> DEBU 6715 Obtaining identity" +"2019-09-24 00:27:16.010 UTC [gossip.comm] Send -> DEBU 6716 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:16.010 UTC [gossip.discovery] sendMemResponse -> DEBU 6717 Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" > alive: alive: " +"2019-09-24 00:27:16.010 UTC [gossip.comm] sendToEndpoint -> DEBU 6718 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.011 UTC [gossip.comm] sendToEndpoint -> DEBU 6719 Exiting" +"2019-09-24 00:27:16.047 UTC [msp] DeserializeIdentity -> DEBU 671a Obtaining identity" +"2019-09-24 00:27:16.047 UTC [msp] DeserializeIdentity -> DEBU 671b Obtaining identity" +"2019-09-24 00:27:16.048 UTC [gossip.comm] Send -> DEBU 671c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:27:16.048 UTC [gossip.comm] sendToEndpoint -> DEBU 671d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.048 UTC [gossip.comm] sendToEndpoint -> DEBU 671e Exiting" +"2019-09-24 00:27:16.050 UTC [gossip.comm] sendToEndpoint -> DEBU 671f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.050 UTC [gossip.comm] sendToEndpoint -> DEBU 6720 Exiting" +"2019-09-24 00:27:16.050 UTC [gossip.comm] sendToEndpoint -> DEBU 6721 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.051 UTC [gossip.comm] sendToEndpoint -> DEBU 6722 Exiting" +"2019-09-24 00:27:16.053 UTC [gossip.comm] func1 -> DEBU 6723 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.053 UTC [gossip.gossip] handleMessage -> DEBU 6724 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.054 UTC [msp.identity] Verify -> DEBU 6725 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:16.055 UTC [msp.identity] Verify -> DEBU 6726 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:16.055 UTC [msp] DeserializeIdentity -> DEBU 6727 Obtaining identity" +"2019-09-24 00:27:16.056 UTC [msp] DeserializeIdentity -> DEBU 6728 Obtaining identity" +"2019-09-24 00:27:16.056 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6729 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:16.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 672a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 672b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.057 UTC [policies] Evaluate -> DEBU 672c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:16.057 UTC [policies] Evaluate -> DEBU 672d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:16.057 UTC [policies] Evaluate -> DEBU 672e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:16.058 UTC [cauthdsl] func1 -> DEBU 672f 0xc004b09750 gate 1569284836058288300 evaluation starts" +"2019-09-24 00:27:16.059 UTC [cauthdsl] func2 -> DEBU 6730 0xc004b09750 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.059 UTC [cauthdsl] func2 -> DEBU 6731 0xc004b09750 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.060 UTC [cauthdsl] func2 -> DEBU 6732 0xc004b09750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:16.060 UTC [cauthdsl] func2 -> DEBU 6733 0xc004b09750 principal evaluation fails" +"2019-09-24 00:27:16.060 UTC [gossip.comm] func1 -> DEBU 6734 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.060 UTC [cauthdsl] func1 -> DEBU 6735 0xc004b09750 gate 1569284836058288300 evaluation fails" +"2019-09-24 00:27:16.062 UTC [policies] Evaluate -> DEBU 6736 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.062 UTC [policies] Evaluate -> DEBU 6737 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.063 UTC [policies] Evaluate -> DEBU 6738 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:16.063 UTC [cauthdsl] func1 -> DEBU 6739 0xc004b09f90 gate 1569284836063755200 evaluation starts" +"2019-09-24 00:27:16.063 UTC [cauthdsl] func2 -> DEBU 673a 0xc004b09f90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.063 UTC [cauthdsl] func2 -> DEBU 673b 0xc004b09f90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.064 UTC [cauthdsl] func2 -> DEBU 673c 0xc004b09f90 principal matched by identity 0" +"2019-09-24 00:27:16.064 UTC [msp.identity] Verify -> DEBU 673d Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:16.065 UTC [msp.identity] Verify -> DEBU 673e Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:16.065 UTC [cauthdsl] func2 -> DEBU 673f 0xc004b09f90 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:16.065 UTC [cauthdsl] func1 -> DEBU 6740 0xc004b09f90 gate 1569284836063755200 evaluation succeeds" +"2019-09-24 00:27:16.066 UTC [policies] Evaluate -> DEBU 6741 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.066 UTC [policies] Evaluate -> DEBU 6742 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.066 UTC [policies] Evaluate -> DEBU 6743 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:16.066 UTC [policies] Evaluate -> DEBU 6744 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:16.067 UTC [msp] DeserializeIdentity -> DEBU 6745 Obtaining identity" +"2019-09-24 00:27:16.067 UTC [msp] DeserializeIdentity -> DEBU 6746 Obtaining identity" +"2019-09-24 00:27:16.068 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6747 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:16.068 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6748 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.068 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6749 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.068 UTC [policies] Evaluate -> DEBU 674a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:16.068 UTC [policies] Evaluate -> DEBU 674b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:16.069 UTC [policies] Evaluate -> DEBU 674c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:16.069 UTC [cauthdsl] func1 -> DEBU 674d 0xc004b25760 gate 1569284836069620100 evaluation starts" +"2019-09-24 00:27:16.069 UTC [cauthdsl] func2 -> DEBU 674e 0xc004b25760 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.069 UTC [cauthdsl] func2 -> DEBU 674f 0xc004b25760 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.070 UTC [cauthdsl] func2 -> DEBU 6750 0xc004b25760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:16.070 UTC [cauthdsl] func2 -> DEBU 6751 0xc004b25760 principal evaluation fails" +"2019-09-24 00:27:16.071 UTC [cauthdsl] func1 -> DEBU 6752 0xc004b25760 gate 1569284836069620100 evaluation fails" +"2019-09-24 00:27:16.071 UTC [policies] Evaluate -> DEBU 6753 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.071 UTC [policies] Evaluate -> DEBU 6754 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.071 UTC [policies] Evaluate -> DEBU 6755 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:16.072 UTC [cauthdsl] func1 -> DEBU 6756 0xc004b25fa0 gate 1569284836072281100 evaluation starts" +"2019-09-24 00:27:16.072 UTC [cauthdsl] func2 -> DEBU 6757 0xc004b25fa0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.073 UTC [cauthdsl] func2 -> DEBU 6758 0xc004b25fa0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.073 UTC [cauthdsl] func2 -> DEBU 6759 0xc004b25fa0 principal matched by identity 0" +"2019-09-24 00:27:16.073 UTC [msp.identity] Verify -> DEBU 675a Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:16.074 UTC [msp.identity] Verify -> DEBU 675b Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:16.074 UTC [cauthdsl] func2 -> DEBU 675c 0xc004b25fa0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:16.074 UTC [cauthdsl] func1 -> DEBU 675d 0xc004b25fa0 gate 1569284836072281100 evaluation succeeds" +"2019-09-24 00:27:16.074 UTC [policies] Evaluate -> DEBU 675e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.074 UTC [policies] Evaluate -> DEBU 675f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.075 UTC [policies] Evaluate -> DEBU 6760 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:16.075 UTC [policies] Evaluate -> DEBU 6761 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:16.075 UTC [msp.identity] Verify -> DEBU 6762 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +"2019-09-24 00:27:16.075 UTC [msp.identity] Verify -> DEBU 6763 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +"2019-09-24 00:27:16.075 UTC [gossip.gossip] handleMessage -> DEBU 6764 Exiting" +"2019-09-24 00:27:16.076 UTC [gossip.gossip] handleMessage -> DEBU 6765 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.076 UTC [msp] DeserializeIdentity -> DEBU 6766 Obtaining identity" +"2019-09-24 00:27:16.076 UTC [msp] DeserializeIdentity -> DEBU 6767 Obtaining identity" +"2019-09-24 00:27:16.076 UTC [msp] DeserializeIdentity -> DEBU 6768 Obtaining identity" +"2019-09-24 00:27:16.077 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6769 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:16.077 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 676a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.077 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 676b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.077 UTC [policies] Evaluate -> DEBU 676c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:16.077 UTC [policies] Evaluate -> DEBU 676d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:16.077 UTC [policies] Evaluate -> DEBU 676e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:16.077 UTC [cauthdsl] func1 -> DEBU 676f 0xc004b501d0 gate 1569284836077760400 evaluation starts" +"2019-09-24 00:27:16.078 UTC [cauthdsl] func2 -> DEBU 6770 0xc004b501d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.078 UTC [cauthdsl] func2 -> DEBU 6771 0xc004b501d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.078 UTC [cauthdsl] func2 -> DEBU 6772 0xc004b501d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:16.078 UTC [cauthdsl] func2 -> DEBU 6773 0xc004b501d0 principal evaluation fails" +"2019-09-24 00:27:16.078 UTC [cauthdsl] func1 -> DEBU 6774 0xc004b501d0 gate 1569284836077760400 evaluation fails" +"2019-09-24 00:27:16.078 UTC [policies] Evaluate -> DEBU 6775 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.078 UTC [policies] Evaluate -> DEBU 6776 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.078 UTC [policies] Evaluate -> DEBU 6777 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:16.079 UTC [cauthdsl] func1 -> DEBU 6778 0xc004b50a10 gate 1569284836079054200 evaluation starts" +"2019-09-24 00:27:16.079 UTC [cauthdsl] func2 -> DEBU 6779 0xc004b50a10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.079 UTC [cauthdsl] func2 -> DEBU 677a 0xc004b50a10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.079 UTC [cauthdsl] func2 -> DEBU 677b 0xc004b50a10 principal matched by identity 0" +"2019-09-24 00:27:16.079 UTC [msp.identity] Verify -> DEBU 677c Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:16.079 UTC [msp.identity] Verify -> DEBU 677d Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:16.079 UTC [cauthdsl] func2 -> DEBU 677e 0xc004b50a10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:16.080 UTC [cauthdsl] func1 -> DEBU 677f 0xc004b50a10 gate 1569284836079054200 evaluation succeeds" +"2019-09-24 00:27:16.080 UTC [policies] Evaluate -> DEBU 6780 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.080 UTC [policies] Evaluate -> DEBU 6781 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.080 UTC [policies] Evaluate -> DEBU 6782 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:16.080 UTC [policies] Evaluate -> DEBU 6783 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:16.081 UTC [msp] DeserializeIdentity -> DEBU 6784 Obtaining identity" +"2019-09-24 00:27:16.081 UTC [msp] DeserializeIdentity -> DEBU 6785 Obtaining identity" +"2019-09-24 00:27:16.082 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6786 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:16.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6787 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6788 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.082 UTC [policies] Evaluate -> DEBU 6789 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:16.082 UTC [policies] Evaluate -> DEBU 678a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:16.082 UTC [policies] Evaluate -> DEBU 678b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:16.083 UTC [cauthdsl] func1 -> DEBU 678c 0xc004b661e0 gate 1569284836083406200 evaluation starts" +"2019-09-24 00:27:16.083 UTC [cauthdsl] func2 -> DEBU 678d 0xc004b661e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.083 UTC [cauthdsl] func2 -> DEBU 678e 0xc004b661e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.084 UTC [cauthdsl] func2 -> DEBU 678f 0xc004b661e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:16.084 UTC [cauthdsl] func2 -> DEBU 6790 0xc004b661e0 principal evaluation fails" +"2019-09-24 00:27:16.084 UTC [cauthdsl] func1 -> DEBU 6791 0xc004b661e0 gate 1569284836083406200 evaluation fails" +"2019-09-24 00:27:16.084 UTC [policies] Evaluate -> DEBU 6792 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.084 UTC [policies] Evaluate -> DEBU 6793 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.084 UTC [policies] Evaluate -> DEBU 6794 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:16.084 UTC [cauthdsl] func1 -> DEBU 6795 0xc004b66a20 gate 1569284836084901100 evaluation starts" +"2019-09-24 00:27:16.085 UTC [cauthdsl] func2 -> DEBU 6796 0xc004b66a20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.085 UTC [cauthdsl] func2 -> DEBU 6797 0xc004b66a20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.085 UTC [cauthdsl] func2 -> DEBU 6798 0xc004b66a20 principal matched by identity 0" +"2019-09-24 00:27:16.085 UTC [msp.identity] Verify -> DEBU 6799 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:16.086 UTC [msp.identity] Verify -> DEBU 679a Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:16.086 UTC [cauthdsl] func2 -> DEBU 679b 0xc004b66a20 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:16.086 UTC [cauthdsl] func1 -> DEBU 679c 0xc004b66a20 gate 1569284836084901100 evaluation succeeds" +"2019-09-24 00:27:16.086 UTC [policies] Evaluate -> DEBU 679d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.086 UTC [policies] Evaluate -> DEBU 679e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.087 UTC [policies] Evaluate -> DEBU 679f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:16.087 UTC [policies] Evaluate -> DEBU 67a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:16.088 UTC [msp.identity] Verify -> DEBU 67a1 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +"2019-09-24 00:27:16.088 UTC [msp.identity] Verify -> DEBU 67a2 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +"2019-09-24 00:27:16.088 UTC [msp.identity] Verify -> DEBU 67a3 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:16.088 UTC [msp.identity] Verify -> DEBU 67a4 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:16.089 UTC [gossip.gossip] handleMessage -> DEBU 67a5 Exiting" +"2019-09-24 00:27:16.089 UTC [gossip.gossip] handleMessage -> DEBU 67a6 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.089 UTC [msp] DeserializeIdentity -> DEBU 67a7 Obtaining identity" +"2019-09-24 00:27:16.089 UTC [msp] DeserializeIdentity -> DEBU 67a8 Obtaining identity" +"2019-09-24 00:27:16.090 UTC [msp] DeserializeIdentity -> DEBU 67a9 Obtaining identity" +"2019-09-24 00:27:16.090 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 67aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:16.090 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 67ab Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.090 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 67ac Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.090 UTC [policies] Evaluate -> DEBU 67ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:16.090 UTC [policies] Evaluate -> DEBU 67ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:16.091 UTC [policies] Evaluate -> DEBU 67af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:16.091 UTC [cauthdsl] func1 -> DEBU 67b0 0xc004b77370 gate 1569284836091383000 evaluation starts" +"2019-09-24 00:27:16.091 UTC [cauthdsl] func2 -> DEBU 67b1 0xc004b77370 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.091 UTC [cauthdsl] func2 -> DEBU 67b2 0xc004b77370 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.091 UTC [cauthdsl] func2 -> DEBU 67b3 0xc004b77370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:16.091 UTC [cauthdsl] func2 -> DEBU 67b4 0xc004b77370 principal evaluation fails" +"2019-09-24 00:27:16.091 UTC [cauthdsl] func1 -> DEBU 67b5 0xc004b77370 gate 1569284836091383000 evaluation fails" +"2019-09-24 00:27:16.092 UTC [policies] Evaluate -> DEBU 67b6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.092 UTC [policies] Evaluate -> DEBU 67b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.092 UTC [policies] Evaluate -> DEBU 67b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:16.092 UTC [cauthdsl] func1 -> DEBU 67b9 0xc004b77bb0 gate 1569284836092629100 evaluation starts" +"2019-09-24 00:27:16.092 UTC [cauthdsl] func2 -> DEBU 67ba 0xc004b77bb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.093 UTC [cauthdsl] func2 -> DEBU 67bb 0xc004b77bb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.093 UTC [cauthdsl] func2 -> DEBU 67bc 0xc004b77bb0 principal matched by identity 0" +"2019-09-24 00:27:16.093 UTC [msp.identity] Verify -> DEBU 67bd Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:16.093 UTC [msp.identity] Verify -> DEBU 67be Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:16.094 UTC [cauthdsl] func2 -> DEBU 67bf 0xc004b77bb0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:16.094 UTC [cauthdsl] func1 -> DEBU 67c0 0xc004b77bb0 gate 1569284836092629100 evaluation succeeds" +"2019-09-24 00:27:16.095 UTC [policies] Evaluate -> DEBU 67c1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.095 UTC [policies] Evaluate -> DEBU 67c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.096 UTC [policies] Evaluate -> DEBU 67c3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:16.096 UTC [policies] Evaluate -> DEBU 67c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:16.096 UTC [msp] DeserializeIdentity -> DEBU 67c5 Obtaining identity" +"2019-09-24 00:27:16.096 UTC [msp] DeserializeIdentity -> DEBU 67c6 Obtaining identity" +"2019-09-24 00:27:16.097 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 67c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:16.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 67c8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.097 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 67c9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:16.097 UTC [cauthdsl] func1 -> DEBU 67cd 0xc004b93380 gate 1569284836097261300 evaluation starts" +"2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67ce 0xc004b93380 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67cf 0xc004b93380 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67d0 0xc004b93380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67d1 0xc004b93380 principal evaluation fails" +"2019-09-24 00:27:16.097 UTC [cauthdsl] func1 -> DEBU 67d2 0xc004b93380 gate 1569284836097261300 evaluation fails" +"2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67d3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.097 UTC [policies] Evaluate -> DEBU 67d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:16.097 UTC [cauthdsl] func1 -> DEBU 67d6 0xc004b93bc0 gate 1569284836097794000 evaluation starts" +"2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67d7 0xc004b93bc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.097 UTC [cauthdsl] func2 -> DEBU 67d8 0xc004b93bc0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.098 UTC [cauthdsl] func2 -> DEBU 67d9 0xc004b93bc0 principal matched by identity 0" +"2019-09-24 00:27:16.098 UTC [msp.identity] Verify -> DEBU 67da Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:16.098 UTC [msp.identity] Verify -> DEBU 67db Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:16.099 UTC [cauthdsl] func2 -> DEBU 67dc 0xc004b93bc0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:16.099 UTC [cauthdsl] func1 -> DEBU 67dd 0xc004b93bc0 gate 1569284836097794000 evaluation succeeds" +"2019-09-24 00:27:16.099 UTC [policies] Evaluate -> DEBU 67de Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.099 UTC [policies] Evaluate -> DEBU 67df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.099 UTC [policies] Evaluate -> DEBU 67e0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:16.100 UTC [policies] Evaluate -> DEBU 67e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:16.100 UTC [msp.identity] Verify -> DEBU 67e2 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:16.100 UTC [msp.identity] Verify -> DEBU 67e3 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:16.101 UTC [msp.identity] Verify -> DEBU 67e4 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +"2019-09-24 00:27:16.101 UTC [msp.identity] Verify -> DEBU 67e5 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +"2019-09-24 00:27:16.101 UTC [gossip.gossip] handleMessage -> DEBU 67e6 Exiting" +"2019-09-24 00:27:16.294 UTC [msp] DeserializeIdentity -> DEBU 67e7 Obtaining identity" +"2019-09-24 00:27:16.295 UTC [msp] DeserializeIdentity -> DEBU 67e8 Obtaining identity" +"2019-09-24 00:27:16.295 UTC [gossip.pull] Hello -> DEBU 67e9 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:16.296 UTC [msp] DeserializeIdentity -> DEBU 67ea Obtaining identity" +"2019-09-24 00:27:16.296 UTC [msp] DeserializeIdentity -> DEBU 67eb Obtaining identity" +"2019-09-24 00:27:16.296 UTC [gossip.comm] Send -> DEBU 67ec Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:16.297 UTC [gossip.comm] sendToEndpoint -> DEBU 67ed Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.297 UTC [gossip.comm] sendToEndpoint -> DEBU 67ee Exiting" +"2019-09-24 00:27:16.299 UTC [gossip.comm] func1 -> DEBU 67ef Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.299 UTC [gossip.gossip] handleMessage -> DEBU 67f0 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.299 UTC [gossip.pull] HandleMessage -> DEBU 67f1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.300 UTC [gossip.gossip] handleMessage -> DEBU 67f2 Exiting" +"2019-09-24 00:27:16.548 UTC [gossip.comm] func1 -> DEBU 67f3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.548 UTC [gossip.gossip] handleMessage -> DEBU 67f4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.548 UTC [msp] DeserializeIdentity -> DEBU 67f5 Obtaining identity" +"2019-09-24 00:27:16.548 UTC [msp] DeserializeIdentity -> DEBU 67f6 Obtaining identity" +"2019-09-24 00:27:16.549 UTC [gossip.gossip] handleMessage -> DEBU 67f7 Exiting" +"2019-09-24 00:27:16.740 UTC [gossip.comm] func1 -> DEBU 67f8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.741 UTC [gossip.gossip] handleMessage -> DEBU 67f9 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.741 UTC [gossip.gossip] handleMessage -> DEBU 67fa Exiting" +"2019-09-24 00:27:16.741 UTC [gossip.discovery] handleMsgFromComm -> DEBU 67fb Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.741 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 67fc Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:16.741 UTC [msp] DeserializeIdentity -> DEBU 67fd Obtaining identity" +"2019-09-24 00:27:16.742 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 67fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:16.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 67ff Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6800 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:16.743 UTC [policies] Evaluate -> DEBU 6801 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:16.743 UTC [policies] Evaluate -> DEBU 6802 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:16.743 UTC [policies] Evaluate -> DEBU 6803 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:16.743 UTC [cauthdsl] func1 -> DEBU 6804 0xc004c486c0 gate 1569284836743836000 evaluation starts" +"2019-09-24 00:27:16.743 UTC [cauthdsl] func2 -> DEBU 6805 0xc004c486c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.743 UTC [cauthdsl] func2 -> DEBU 6806 0xc004c486c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.744 UTC [cauthdsl] func2 -> DEBU 6807 0xc004c486c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:16.744 UTC [cauthdsl] func2 -> DEBU 6808 0xc004c486c0 principal evaluation fails" +"2019-09-24 00:27:16.744 UTC [cauthdsl] func1 -> DEBU 6809 0xc004c486c0 gate 1569284836743836000 evaluation fails" +"2019-09-24 00:27:16.744 UTC [policies] Evaluate -> DEBU 680a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.744 UTC [policies] Evaluate -> DEBU 680b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:16.744 UTC [policies] Evaluate -> DEBU 680c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:16.744 UTC [cauthdsl] func1 -> DEBU 680d 0xc004c48f00 gate 1569284836744235900 evaluation starts" +"2019-09-24 00:27:16.744 UTC [cauthdsl] func2 -> DEBU 680e 0xc004c48f00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:16.744 UTC [cauthdsl] func2 -> DEBU 680f 0xc004c48f00 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:16.745 UTC [cauthdsl] func2 -> DEBU 6810 0xc004c48f00 principal matched by identity 0" +"2019-09-24 00:27:16.745 UTC [msp.identity] Verify -> DEBU 6811 Verify: digest = 00000000 50 21 22 66 79 10 db 29 f6 d2 57 80 95 58 6e 4b |P!"fy..)..W..XnK| +00000010 10 65 59 0b 43 58 50 da 05 11 30 16 2a e0 26 e8 |.eY.CXP...0.*.&.|" +"2019-09-24 00:27:16.745 UTC [msp.identity] Verify -> DEBU 6812 Verify: sig = 00000000 30 44 02 20 70 ef ba 11 04 19 51 9d 44 91 bc e1 |0D. p.....Q.D...| +00000010 8e 9b 38 9f 86 7e bf 28 3b 1f 61 28 1c 47 ac e1 |..8..~.(;.a(.G..| +00000020 2f 09 e5 6f 02 20 58 cf 24 30 4b 6e b0 8b 66 f6 |/..o. X.$0Kn..f.| +00000030 fc 62 cc 0c 38 f5 01 91 e9 f4 a4 59 c2 5a 43 fe |.b..8......Y.ZC.| +00000040 31 4d ac d7 25 2e |1M..%.|" +"2019-09-24 00:27:16.745 UTC [cauthdsl] func2 -> DEBU 6813 0xc004c48f00 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:16.745 UTC [cauthdsl] func1 -> DEBU 6814 0xc004c48f00 gate 1569284836744235900 evaluation succeeds" +"2019-09-24 00:27:16.746 UTC [policies] Evaluate -> DEBU 6815 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.746 UTC [policies] Evaluate -> DEBU 6816 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:16.746 UTC [policies] Evaluate -> DEBU 6817 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:16.746 UTC [policies] Evaluate -> DEBU 6818 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:16.746 UTC [gossip.discovery] handleAliveMessage -> DEBU 6819 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:16.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 681a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:16.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 681b updating membership: timestamp: " +"2019-09-24 00:27:16.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 681c Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:16.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 681d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:16.747 UTC [gossip.discovery] learnExistingMembers -> DEBU 681e Exiting" +"2019-09-24 00:27:16.747 UTC [gossip.discovery] handleAliveMessage -> DEBU 681f Exiting" +"2019-09-24 00:27:16.747 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6820 Exiting" +"2019-09-24 00:27:16.748 UTC [gossip.discovery] sendMemResponse -> DEBU 6821 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:27:16.748 UTC [msp] DeserializeIdentity -> DEBU 6822 Obtaining identity" +"2019-09-24 00:27:16.748 UTC [msp] DeserializeIdentity -> DEBU 6823 Obtaining identity" +"2019-09-24 00:27:16.748 UTC [msp] DeserializeIdentity -> DEBU 6824 Obtaining identity" +"2019-09-24 00:27:16.748 UTC [gossip.comm] Send -> DEBU 6825 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:16.748 UTC [gossip.comm] sendToEndpoint -> DEBU 6826 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.748 UTC [gossip.comm] sendToEndpoint -> DEBU 6827 Exiting" +"2019-09-24 00:27:16.748 UTC [gossip.discovery] sendMemResponse -> DEBU 6828 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020S" signature:"0D\002 ;[ms\014\303c\365Kq\3401g\316\010h9\363 p\313^\336@\010O([\031\030\023\227\002 {4\2500]b\256\251\0305\367\202\005\001y\214\016tga\344H\241Q\221\006\264\310\22331\304" > alive: alive: alive: " +"2019-09-24 00:27:16.785 UTC [gossip.comm] func1 -> DEBU 6829 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.785 UTC [gossip.gossip] handleMessage -> DEBU 682a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.785 UTC [gossip.pull] HandleMessage -> DEBU 682b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.785 UTC [msp] DeserializeIdentity -> DEBU 682c Obtaining identity" +"2019-09-24 00:27:16.786 UTC [msp] DeserializeIdentity -> DEBU 682d Obtaining identity" +"2019-09-24 00:27:16.786 UTC [msp] DeserializeIdentity -> DEBU 682e Obtaining identity" +"2019-09-24 00:27:16.786 UTC [msp] DeserializeIdentity -> DEBU 682f Obtaining identity" +"2019-09-24 00:27:16.786 UTC [msp] DeserializeIdentity -> DEBU 6830 Obtaining identity" +"2019-09-24 00:27:16.787 UTC [msp] DeserializeIdentity -> DEBU 6831 Obtaining identity" +"2019-09-24 00:27:16.787 UTC [gossip.pull] SendDigest -> DEBU 6832 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:27:16.787 UTC [gossip.gossip] handleMessage -> DEBU 6833 Exiting" +"2019-09-24 00:27:16.806 UTC [gossip.comm] func1 -> DEBU 6834 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.806 UTC [gossip.gossip] handleMessage -> DEBU 6835 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.806 UTC [gossip.pull] HandleMessage -> DEBU 6836 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:16.807 UTC [gossip.pull] SendDigest -> DEBU 6837 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:16.807 UTC [gossip.gossip] handleMessage -> DEBU 6838 Exiting" +"2019-09-24 00:27:17.043 UTC [gossip.gossip] handleMessage -> DEBU 6839 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:17.044 UTC [msp] DeserializeIdentity -> DEBU 683a Obtaining identity" +"2019-09-24 00:27:17.044 UTC [msp] DeserializeIdentity -> DEBU 683b Obtaining identity" +"2019-09-24 00:27:17.044 UTC [msp] DeserializeIdentity -> DEBU 683c Obtaining identity" +"2019-09-24 00:27:17.045 UTC [gossip.gossip] handleMessage -> DEBU 683d Exiting" +"2019-09-24 00:27:17.290 UTC [gossip.election] waitForInterrupt -> DEBU 683e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:27:17.290 UTC [gossip.election] IsLeader -> DEBU 683f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:27:17.291 UTC [msp] GetDefaultSigningIdentity -> DEBU 6840 Obtaining default signing identity" +"2019-09-24 00:27:17.291 UTC [msp.identity] Sign -> DEBU 6841 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101D1801 " +"2019-09-24 00:27:17.291 UTC [msp.identity] Sign -> DEBU 6842 Sign: digest: F629988202B88AC569C6B096F653527E80B378B6992A2A29B849880621E4478B " +"2019-09-24 00:27:17.291 UTC [gossip.election] waitForInterrupt -> DEBU 6843 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 6844 Obtaining identity" +"2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 6845 Obtaining identity" +"2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 6846 Obtaining identity" +"2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 6847 Obtaining identity" +"2019-09-24 00:27:17.291 UTC [gossip.comm] Send -> DEBU 6848 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 6849 Obtaining identity" +"2019-09-24 00:27:17.291 UTC [msp] DeserializeIdentity -> DEBU 684a Obtaining identity" +"2019-09-24 00:27:17.291 UTC [gossip.comm] sendToEndpoint -> DEBU 684b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:27:17.291 UTC [gossip.comm] sendToEndpoint -> DEBU 684c Exiting" +"2019-09-24 00:27:17.615 UTC [gossip.comm] func1 -> DEBU 684d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:17.615 UTC [gossip.gossip] handleMessage -> DEBU 684e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:17.615 UTC [gossip.pull] HandleMessage -> DEBU 684f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:17.616 UTC [gossip.pull] SendDigest -> DEBU 6850 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:17.617 UTC [gossip.gossip] handleMessage -> DEBU 6851 Exiting" +"2019-09-24 00:27:17.665 UTC [gossip.comm] func1 -> DEBU 6852 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:17.665 UTC [gossip.gossip] handleMessage -> DEBU 6853 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:17.665 UTC [gossip.gossip] handleMessage -> DEBU 6854 Exiting" +"2019-09-24 00:27:17.665 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6855 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:17.665 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6856 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:17.666 UTC [msp.identity] Verify -> DEBU 6857 Verify: digest = 00000000 49 cc ab 3c e5 30 96 18 5d 54 5a 9d 0a e9 43 22 |I..<.0..]TZ...C"| +00000010 1e 41 8e ed 95 6b 81 3c 93 75 17 7b 31 af 9f 0d |.A...k.<.u.{1...|" +"2019-09-24 00:27:17.666 UTC [msp.identity] Verify -> DEBU 6858 Verify: sig = 00000000 30 45 02 21 00 dd 6d 49 c5 ea 7a 05 5f f8 fc c7 |0E.!..mI..z._...| +00000010 c8 ea cd ef ad ad e7 e7 b6 ca e2 e9 40 57 24 e4 |............@W$.| +00000020 7b a4 de 48 ba 02 20 31 53 94 c8 c9 68 4e d0 85 |{..H.. 1S...hN..| +00000030 70 d7 8e 37 83 d0 5f a2 4e 8c 09 e9 8d a0 f2 09 |p..7.._.N.......| +00000040 b8 b9 ea 6c 88 1f 4d |...l..M|" +"2019-09-24 00:27:17.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 6859 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:17.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 685a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:17.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 685b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:17.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 685c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:17.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 685d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:17.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 685e Exiting" +"2019-09-24 00:27:17.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 685f Exiting" +"2019-09-24 00:27:17.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6860 Exiting" +"2019-09-24 00:27:17.667 UTC [gossip.gossip] handleMessage -> DEBU 6861 Entering, 172.18.0.6:43284 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:17.667 UTC [gossip.gossip] handleMessage -> DEBU 6862 Exiting" +"2019-09-24 00:27:17.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6863 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:17.667 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6864 Exiting" +"2019-09-24 00:27:17.675 UTC [msp] DeserializeIdentity -> DEBU 6865 Obtaining identity" +"2019-09-24 00:27:17.675 UTC [msp] DeserializeIdentity -> DEBU 6866 Obtaining identity" +"2019-09-24 00:27:17.675 UTC [msp] DeserializeIdentity -> DEBU 6867 Obtaining identity" +"2019-09-24 00:27:17.675 UTC [gossip.comm] Send -> DEBU 6868 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:17.676 UTC [msp] DeserializeIdentity -> DEBU 6869 Obtaining identity" +"2019-09-24 00:27:17.676 UTC [gossip.comm] Send -> DEBU 686a Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:17.676 UTC [gossip.comm] sendToEndpoint -> DEBU 686b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:17.676 UTC [gossip.comm] sendToEndpoint -> DEBU 686c Exiting" +"2019-09-24 00:27:17.676 UTC [gossip.comm] sendToEndpoint -> DEBU 686d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:17.676 UTC [gossip.comm] sendToEndpoint -> DEBU 686e Exiting" +"2019-09-24 00:27:17.678 UTC [gossip.comm] func1 -> DEBU 686f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:17.678 UTC [gossip.gossip] handleMessage -> DEBU 6870 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:17.678 UTC [gossip.gossip] handleMessage -> DEBU 6871 Exiting" +"2019-09-24 00:27:17.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6872 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:17.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6873 Exiting" +"2019-09-24 00:27:17.749 UTC [gossip.comm] func1 -> DEBU 6874 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:17.749 UTC [gossip.gossip] handleMessage -> DEBU 6875 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:17.749 UTC [gossip.gossip] handleMessage -> DEBU 6876 Exiting" +"2019-09-24 00:27:17.749 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6877 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:17.749 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6878 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:17.749 UTC [msp.identity] Verify -> DEBU 6879 Verify: digest = 00000000 3b 6e 18 85 73 f9 5b 5f 95 c3 13 13 b7 8e 6d c6 |;n..s.[_......m.| +00000010 26 f4 2f a0 e8 8b af 5a c8 0b 66 dc 97 6e 10 a1 |&./....Z..f..n..|" +"2019-09-24 00:27:17.749 UTC [msp.identity] Verify -> DEBU 687a Verify: sig = 00000000 30 44 02 20 5e 1e e9 f7 1b ce f4 b4 50 95 66 cf |0D. ^.......P.f.| +00000010 7f f5 20 84 98 a4 83 43 a3 6f 91 13 a8 08 88 a9 |.. ....C.o......| +00000020 18 c6 ea f7 02 20 71 8c 55 9c 49 a4 cb 96 1a 36 |..... q.U.I....6| +00000030 12 6f 38 2f 1d 42 79 59 03 fd 4f f7 f7 35 74 0a |.o8/.ByY..O..5t.| +00000040 9d 7c 02 39 29 03 |.|.9).|" +"2019-09-24 00:27:17.750 UTC [msp.identity] Verify -> DEBU 687b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 00:27:17.750 UTC [msp.identity] Verify -> DEBU 687c Verify: sig = 00000000 30 45 02 21 00 d4 03 c9 17 86 a5 31 14 0b 40 41 |0E.!.......1..@A| +00000010 9b e2 7c bd 69 27 01 c2 5e b2 5d 73 ee 70 b5 81 |..|.i'..^.]s.p..| +00000020 83 f8 c9 af 2b 02 20 01 da 1d f8 10 1c db c0 5c |....+. ........\| +00000030 76 a0 49 de e7 50 89 ca 0b 2f cb 8f bc eb 18 d2 |v.I..P.../......| +00000040 00 8e fa 44 73 c7 21 |...Ds.!|" +"2019-09-24 00:27:17.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 687d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:27:17.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 687e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 00:27:17.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 687f updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:17.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 6880 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:17.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 6881 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:17.750 UTC [gossip.discovery] learnExistingMembers -> DEBU 6882 Exiting" +"2019-09-24 00:27:17.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 6883 Exiting" +"2019-09-24 00:27:17.750 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6884 Exiting" +"2019-09-24 00:27:17.750 UTC [gossip.discovery] sendMemResponse -> DEBU 6885 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:27:17.750 UTC [msp] DeserializeIdentity -> DEBU 6886 Obtaining identity" +"2019-09-24 00:27:17.750 UTC [msp] DeserializeIdentity -> DEBU 6887 Obtaining identity" +"2019-09-24 00:27:17.750 UTC [gossip.comm] Send -> DEBU 6888 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:17.750 UTC [gossip.discovery] sendMemResponse -> DEBU 6889 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" secret_envelope: > alive: " +"2019-09-24 00:27:17.750 UTC [gossip.comm] sendToEndpoint -> DEBU 688a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:17.750 UTC [gossip.comm] sendToEndpoint -> DEBU 688b Exiting" +"2019-09-24 00:27:17.974 UTC [gossip.comm] func1 -> DEBU 688c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:17.975 UTC [gossip.gossip] handleMessage -> DEBU 688d Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:17.975 UTC [msp] DeserializeIdentity -> DEBU 688e Obtaining identity" +"2019-09-24 00:27:17.975 UTC [msp] DeserializeIdentity -> DEBU 688f Obtaining identity" +"2019-09-24 00:27:17.975 UTC [msp] DeserializeIdentity -> DEBU 6890 Obtaining identity" +"2019-09-24 00:27:17.975 UTC [gossip.gossip] handleMessage -> DEBU 6891 Exiting" +"2019-09-24 00:27:19.463 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 6892 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.463 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 6893 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.463 UTC [policies] Evaluate -> DEBU 6894 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 00:27:19.464 UTC [policies] Evaluate -> DEBU 6895 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.464 UTC [policies] Evaluate -> DEBU 6896 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 00:27:19.464 UTC [cauthdsl] func1 -> DEBU 6897 0xc004d36450 gate 1569284839464661300 evaluation starts" +"2019-09-24 00:27:19.464 UTC [cauthdsl] func2 -> DEBU 6898 0xc004d36450 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.465 UTC [cauthdsl] func2 -> DEBU 6899 0xc004d36450 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.465 UTC [cauthdsl] func2 -> DEBU 689a 0xc004d36450 principal matched by identity 0" +"2019-09-24 00:27:19.465 UTC [msp.identity] Verify -> DEBU 689b Verify: digest = 00000000 c2 67 ad 69 30 97 e6 51 22 6b 4b c4 b0 08 22 c9 |.g.i0..Q"kK...".| +00000010 9e ee 8d 45 cd c3 0f d4 ec 3f bb b6 1f 2d 59 a6 |...E.....?...-Y.|" +"2019-09-24 00:27:19.465 UTC [msp.identity] Verify -> DEBU 689c Verify: sig = 00000000 30 44 02 20 6c 3a 2e 94 a1 ff be 68 3a 24 ea e2 |0D. l:.....h:$..| +00000010 9c 98 64 bb 2e f9 7e 1a 75 97 b4 3e d6 87 b3 fb |..d...~.u..>....| +00000020 e7 3d ad 09 02 20 6f 8d ec d6 4e 32 62 cd 64 f1 |.=... o...N2b.d.| +00000030 b3 4f 10 13 dd 32 9d fa a8 dd ec aa 8b 37 58 8c |.O...2.......7X.| +00000040 65 5d 45 88 07 5a |e]E..Z|" +"2019-09-24 00:27:19.465 UTC [cauthdsl] func2 -> DEBU 689d 0xc004d36450 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.465 UTC [cauthdsl] func1 -> DEBU 689e 0xc004d36450 gate 1569284839464661300 evaluation succeeds" +"2019-09-24 00:27:19.465 UTC [policies] Evaluate -> DEBU 689f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:19.465 UTC [policies] Evaluate -> DEBU 68a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:19.465 UTC [policies] Evaluate -> DEBU 68a1 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:27:19.466 UTC [policies] Evaluate -> DEBU 68a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 00:27:19.466 UTC [blocksProvider] DeliverBlocks -> DEBU 68a3 [businesschannel] Adding payload to local buffer, blockNum = [6]" +"2019-09-24 00:27:19.466 UTC [gossip.state] addPayload -> DEBU 68a4 [businesschannel] Adding payload to local buffer, blockNum = [6]" +"2019-09-24 00:27:19.466 UTC [gossip.state] addPayload -> DEBU 68a5 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 00:27:19.466 UTC [blocksProvider] DeliverBlocks -> DEBU 68a6 [businesschannel] Gossiping block [6], peers number [3]" +"2019-09-24 00:27:19.467 UTC [gossip.channel] AddToMsgStore -> DEBU 68a7 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34898 bytes, seq: 6}, Envelope: 34931 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 00:27:19.467 UTC [gossip.pull] Add -> DEBU 68a9 Added 6, total items: 6" +"2019-09-24 00:27:19.466 UTC [gossip.state] deliverPayloads -> DEBU 68a8 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" +"2019-09-24 00:27:19.467 UTC [gossip.state] deliverPayloads -> DEBU 68aa [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" +"2019-09-24 00:27:19.467 UTC [gossip.privdata] StoreBlock -> INFO 68ab [businesschannel] Received block [6] from buffer" +"2019-09-24 00:27:19.467 UTC [gossip.privdata] StoreBlock -> DEBU 68ac [businesschannel] Validating block [6]" +"2019-09-24 00:27:19.468 UTC [committer.txvalidator] Validate -> DEBU 68ad [businesschannel] START Block Validation for block [6]" +"2019-09-24 00:27:19.468 UTC [committer.txvalidator] Validate -> DEBU 68ae expecting 1 block validation responses" +"2019-09-24 00:27:19.468 UTC [committer.txvalidator] validateTx -> DEBU 68af [businesschannel] validateTx starts for block 0xc0025fdac0 env 0xc004c89680 txn 0" +"2019-09-24 00:27:19.468 UTC [protoutils] ValidateTransaction -> DEBU 68b0 ValidateTransactionEnvelope starts for envelope 0xc004c89680" +"2019-09-24 00:27:19.468 UTC [protoutils] ValidateTransaction -> DEBU 68b1 Header is channel_header:"\010\001\032\006\010\347\305\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\300\316\334\361G_L\000<\211\036?B\332\225\341\273\255X\347\031\237fk" " +"2019-09-24 00:27:19.468 UTC [protoutils] validateChannelHeader -> DEBU 68b2 validateChannelHeader info: header type 1" +"2019-09-24 00:27:19.468 UTC [protoutils] checkSignatureFromCreator -> DEBU 68b3 begin" +"2019-09-24 00:27:19.469 UTC [msp] GetManagerForChain -> DEBU 68b4 Returning existing manager for channel 'businesschannel'" +"2019-09-24 00:27:19.469 UTC [msp] DeserializeIdentity -> DEBU 68b5 Obtaining identity" +"2019-09-24 00:27:19.469 UTC [msp.identity] newIdentity -> DEBU 68b6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.470 UTC [protoutils] checkSignatureFromCreator -> DEBU 68b7 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-09-24 00:27:19.470 UTC [msp] Validate -> DEBU 68b8 MSP OrdererMSP validating identity" +"2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68b9 Obtaining identity" +"2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68ba Obtaining identity" +"2019-09-24 00:27:19.470 UTC [protoutils] checkSignatureFromCreator -> DEBU 68bb creator is valid" +"2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68bc Obtaining identity" +"2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68bd Obtaining identity" +"2019-09-24 00:27:19.470 UTC [msp.identity] Verify -> DEBU 68be Verify: digest = 00000000 a1 4f 26 24 5c 60 61 cd 27 a8 84 08 72 6e 75 9a |.O&$\`a.'...rnu.| +00000010 cd f4 0a 72 bb a2 45 42 72 8c 08 7e 71 e7 c7 3d |...r..EBr..~q..=|" +"2019-09-24 00:27:19.470 UTC [msp.identity] Verify -> DEBU 68bf Verify: sig = 00000000 30 45 02 21 00 be 77 61 11 1c 31 7b 61 9b bf e1 |0E.!..wa..1{a...| +00000010 aa 50 c3 32 1f a8 e6 f4 32 fd a2 0e 40 09 a2 92 |.P.2....2...@...| +00000020 69 66 73 16 58 02 20 69 a4 df 24 de 15 ff 27 59 |ifs.X. i..$...'Y| +00000030 84 0c ff 42 07 92 94 a9 95 18 98 aa 50 21 03 cb |...B........P!..| +00000040 d1 d1 df 9a 80 67 53 |.....gS|" +"2019-09-24 00:27:19.470 UTC [gossip.comm] Send -> DEBU 68c0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34898 bytes, seq: 6}, Envelope: 34931 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68c1 Obtaining identity" +"2019-09-24 00:27:19.470 UTC [protoutils] checkSignatureFromCreator -> DEBU 68c2 exits successfully" +"2019-09-24 00:27:19.470 UTC [msp] DeserializeIdentity -> DEBU 68c3 Obtaining identity" +"2019-09-24 00:27:19.470 UTC [protoutils] validateConfigTransaction -> DEBU 68c4 validateConfigTransaction starts for data 0xc004d60000, header channel_header:"\010\001\032\006\010\347\305\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\300\316\334\361G_L\000<\211\036?B\332\225\341\273\255X\347\031\237fk" " +"2019-09-24 00:27:19.470 UTC [committer.txvalidator] validateTx -> DEBU 68c5 Transaction is for channel businesschannel" +"2019-09-24 00:27:19.470 UTC [gossip.comm] sendToEndpoint -> DEBU 68c6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34898 bytes, seq: 6}, Envelope: 34931 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.470 UTC [gossip.comm] sendToEndpoint -> DEBU 68c7 Exiting" +"2019-09-24 00:27:19.471 UTC [common.configtx] addToMap -> DEBU 68c8 Adding to config map: [Group] /Channel" +"2019-09-24 00:27:19.471 UTC [common.configtx] addToMap -> DEBU 68c9 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:27:19.479 UTC [common.configtx] addToMap -> DEBU 68ca Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:27:19.479 UTC [common.configtx] addToMap -> DEBU 68cb Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68cc Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68cd Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68ce Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68cf Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d0 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d1 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d2 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d3 Adding to config map: [Group] /Channel" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d4 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d5 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d7 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d8 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68d9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 00:27:19.480 UTC [common.configtx] addToMap -> DEBU 68da Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:19.481 UTC [common.configtx] addToMap -> DEBU 68db Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 00:27:19.481 UTC [common.configtx] addToMap -> DEBU 68dc Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 00:27:19.481 UTC [common.configtx] addToMap -> DEBU 68dd Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:27:19.481 UTC [common.configtx] addToMap -> DEBU 68de Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:27:19.482 UTC [common.configtx] addToMap -> DEBU 68df Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:27:19.482 UTC [common.configtx] addToMap -> DEBU 68e0 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:27:19.483 UTC [common.configtx] addToMap -> DEBU 68e1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:27:19.483 UTC [common.configtx] addToMap -> DEBU 68e2 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:27:19.484 UTC [common.configtx] addToMap -> DEBU 68e3 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:27:19.484 UTC [common.configtx] verifyDeltaSet -> DEBU 68e4 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-09-24 00:27:19.484 UTC [common.configtx] verifyDeltaSet -> DEBU 68e5 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 00:27:19.484 UTC [common.configtx] verifyDeltaSet -> DEBU 68e6 Processing change to key: [Group] /Channel/Application" +"2019-09-24 00:27:19.485 UTC [common.configtx] policyForItem -> DEBU 68e7 Getting policy for item Application with mod_policy Admins" +"2019-09-24 00:27:19.485 UTC [policies] Manager -> DEBU 68e8 Manager Channel looking up path []" +"2019-09-24 00:27:19.485 UTC [policies] Manager -> DEBU 68e9 Manager Channel has managers Orderer" +"2019-09-24 00:27:19.485 UTC [policies] Manager -> DEBU 68ea Manager Channel has managers Application" +"2019-09-24 00:27:19.486 UTC [policies] Manager -> DEBU 68eb Manager Channel looking up path [Application]" +"2019-09-24 00:27:19.487 UTC [policies] Manager -> DEBU 68ec Manager Channel has managers Orderer" +"2019-09-24 00:27:19.487 UTC [policies] Manager -> DEBU 68ed Manager Channel has managers Application" +"2019-09-24 00:27:19.487 UTC [policies] Manager -> DEBU 68ee Manager Channel/Application looking up path []" +"2019-09-24 00:27:19.487 UTC [policies] Manager -> DEBU 68ef Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:27:19.487 UTC [policies] Manager -> DEBU 68f0 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:27:19.488 UTC [policies] Evaluate -> DEBU 68f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-09-24 00:27:19.488 UTC [policies] Evaluate -> DEBU 68f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.488 UTC [policies] Evaluate -> DEBU 68f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 00:27:19.488 UTC [cauthdsl] deduplicate -> WARN 68f4 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-09-24 00:27:19.489 UTC [cauthdsl] func1 -> DEBU 68f5 0xc004338240 gate 1569284839488988500 evaluation starts" +"2019-09-24 00:27:19.489 UTC [cauthdsl] func2 -> DEBU 68f6 0xc004338240 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 00:27:19.489 UTC [cauthdsl] func2 -> DEBU 68f7 0xc004338240 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.490 UTC [cauthdsl] func2 -> DEBU 68f8 0xc004338240 principal matched by identity 0" +"2019-09-24 00:27:19.490 UTC [msp.identity] Verify -> DEBU 68f9 Verify: digest = 00000000 48 77 a9 76 ae c6 d0 00 08 e1 87 61 5a 35 3b 84 |Hw.v.......aZ5;.| +00000010 16 95 5c 0b c0 a8 fc c1 cf 92 2d eb 73 05 3b 4a |..\.......-.s.;J|" +"2019-09-24 00:27:19.490 UTC [msp.identity] Verify -> DEBU 68fa Verify: sig = 00000000 30 44 02 20 4c 82 9e d8 a1 76 a3 a3 75 1d 20 c9 |0D. L....v..u. .| +00000010 3e 86 10 3b d1 1d 25 b5 e5 d4 bc e4 42 6b 38 bd |>..;..%.....Bk8.| +00000020 f6 ad d6 81 02 20 68 bc f4 5b 2d ee d1 96 32 c3 |..... h..[-...2.| +00000030 97 14 67 8c 23 1e 47 0f c7 05 3b 29 c9 13 7b 07 |..g.#.G...;)..{.| +00000040 8f a7 92 fd d1 08 |......|" +"2019-09-24 00:27:19.491 UTC [cauthdsl] func2 -> DEBU 68fb 0xc004338240 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.491 UTC [cauthdsl] func1 -> DEBU 68fc 0xc004338240 gate 1569284839488988500 evaluation succeeds" +"2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 68fd Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 68fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:27:19.491 UTC [policies] Evaluate -> DEBU 68ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 00:27:19.491 UTC [cauthdsl] deduplicate -> WARN 6900 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-09-24 00:27:19.492 UTC [cauthdsl] func1 -> DEBU 6901 0xc004338870 gate 1569284839492186500 evaluation starts" +"2019-09-24 00:27:19.492 UTC [cauthdsl] func2 -> DEBU 6902 0xc004338870 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 00:27:19.492 UTC [cauthdsl] func2 -> DEBU 6903 0xc004338870 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.492 UTC [cauthdsl] func2 -> DEBU 6904 0xc004338870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 00:27:19.495 UTC [cauthdsl] func2 -> DEBU 6905 0xc004338870 processing identity 1 with bytes of 114c6c0" +"2019-09-24 00:27:19.496 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6906 Checking if identity satisfies ADMIN role for Org2MSP" +"2019-09-24 00:27:19.498 UTC [cauthdsl] func2 -> DEBU 6907 0xc004338870 principal matched by identity 1" +"2019-09-24 00:27:19.498 UTC [msp.identity] Verify -> DEBU 6908 Verify: digest = 00000000 b9 ca 25 b9 18 4b 4c cb f9 ed 69 2e e4 b0 01 32 |..%..KL...i....2| +00000010 7e d5 0e 8f db 9c d1 12 47 66 47 e2 f9 42 f2 92 |~.......GfG..B..|" +"2019-09-24 00:27:19.499 UTC [msp.identity] Verify -> DEBU 6909 Verify: sig = 00000000 30 44 02 20 6f 93 cb 0e 30 b4 01 2a 3e 5c 70 08 |0D. o...0..*>\p.| +00000010 f4 b3 a7 c6 8d d3 d2 16 33 9b 93 be 91 8a 0e 0a |........3.......| +00000020 14 03 96 82 02 20 25 f6 18 45 c0 ea 93 0a be f5 |..... %..E......| +00000030 1d 09 80 60 65 19 94 68 46 86 00 e0 07 4b 6c 2e |...`e..hF....Kl.| +00000040 99 b4 f8 c0 85 d3 |......|" +"2019-09-24 00:27:19.503 UTC [cauthdsl] func2 -> DEBU 690a 0xc004338870 principal evaluation succeeds for identity 1" +"2019-09-24 00:27:19.506 UTC [cauthdsl] func1 -> DEBU 690b 0xc004338870 gate 1569284839492186500 evaluation succeeds" +"2019-09-24 00:27:19.509 UTC [policies] Evaluate -> DEBU 690c Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:27:19.509 UTC [policies] Evaluate -> DEBU 690d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:27:19.513 UTC [policies] Evaluate -> DEBU 690e Signature set satisfies policy /Channel/Application/Admins" +"2019-09-24 00:27:19.513 UTC [policies] Evaluate -> DEBU 690f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-09-24 00:27:19.513 UTC [common.configtx] verifyDeltaSet -> DEBU 6910 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 00:27:19.514 UTC [common.configtx] verifyDeltaSet -> DEBU 6911 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 00:27:19.514 UTC [common.configtx] verifyDeltaSet -> DEBU 6912 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:19.514 UTC [common.configtx] verifyDeltaSet -> DEBU 6913 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 00:27:19.520 UTC [common.configtx] recurseConfigMap -> DEBU 6914 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.520 UTC [common.configtx] recurseConfigMap -> DEBU 6915 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.523 UTC [common.configtx] recurseConfigMap -> DEBU 6916 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.524 UTC [common.configtx] recurseConfigMap -> DEBU 6917 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.526 UTC [common.configtx] recurseConfigMap -> DEBU 6918 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.529 UTC [common.configtx] recurseConfigMap -> DEBU 6919 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.529 UTC [common.configtx] recurseConfigMap -> DEBU 691a Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.529 UTC [common.configtx] recurseConfigMap -> DEBU 691b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.530 UTC [comm.grpc.server] 1 -> INFO 691c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.53Z grpc.peer_address=172.18.0.5:49542 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=206.4µs +"2019-09-24 00:27:19.534 UTC [msp] GetDefaultSigningIdentity -> DEBU 691d Obtaining default signing identity" +"2019-09-24 00:27:19.535 UTC [msp.identity] Sign -> DEBU 691e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:27:19.535 UTC [msp.identity] Sign -> DEBU 6920 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:27:19.535 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6921 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:49542" +"2019-09-24 00:27:19.535 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6922 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49542" +"2019-09-24 00:27:19.536 UTC [msp.identity] Verify -> DEBU 6923 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-09-24 00:27:19.534 UTC [common.configtx] recurseConfigMap -> DEBU 691f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.536 UTC [msp.identity] Verify -> DEBU 6924 Verify: sig = 00000000 30 44 02 20 0d 3a a3 aa 84 53 7f bb a5 f5 77 23 |0D. .:...S....w#| +00000010 a7 cb 7d 21 48 c4 aa 68 2c fc 70 98 9c 49 01 54 |..}!H..h,.p..I.T| +00000020 43 97 57 49 02 20 50 7d 30 1e fb d1 10 5d 88 f6 |C.WI. P}0....]..| +00000030 34 3f 02 4c a1 fc bd 48 c5 48 e8 52 03 d6 e7 90 |4?.L...H.H.R....| +00000040 0e ca f9 33 01 2c |...3.,|" +"2019-09-24 00:27:19.537 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6926 Authenticated 172.18.0.5:49542" +"2019-09-24 00:27:19.537 UTC [gossip.comm] GossipStream -> DEBU 6927 Servicing 172.18.0.5:49542" +"2019-09-24 00:27:19.536 UTC [common.configtx] recurseConfigMap -> DEBU 6925 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.537 UTC [common.configtx] recurseConfigMap -> DEBU 6928 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.537 UTC [common.configtx] recurseConfigMap -> DEBU 6929 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.538 UTC [common.configtx] recurseConfigMap -> DEBU 692a Setting policy for key LifecycleEndorsement to " +"2019-09-24 00:27:19.538 UTC [common.configtx] recurseConfigMap -> DEBU 692b Setting policy for key Readers to " +"2019-09-24 00:27:19.538 UTC [common.configtx] recurseConfigMap -> DEBU 692c Setting policy for key Writers to " +"2019-09-24 00:27:19.538 UTC [common.configtx] recurseConfigMap -> DEBU 692d Setting policy for key Admins to " +"2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 692e Setting policy for key Endorsement to " +"2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 692f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 6930 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 6931 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 6932 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.539 UTC [common.configtx] recurseConfigMap -> DEBU 6933 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.540 UTC [common.configtx] recurseConfigMap -> DEBU 6934 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.540 UTC [common.configtx] recurseConfigMap -> DEBU 6935 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.540 UTC [common.configtx] recurseConfigMap -> DEBU 6936 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.540 UTC [common.configtx] recurseConfigMap -> DEBU 6937 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.540 UTC [common.configtx] recurseConfigMap -> DEBU 6938 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 00:27:19.540 UTC [common.channelconfig] NewStandardValues -> DEBU 6939 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 00:27:19.541 UTC [common.channelconfig] initializeProtosStruct -> DEBU 693a Processing field: HashingAlgorithm" +"2019-09-24 00:27:19.541 UTC [common.channelconfig] initializeProtosStruct -> DEBU 693b Processing field: BlockDataHashingStructure" +"2019-09-24 00:27:19.541 UTC [common.channelconfig] initializeProtosStruct -> DEBU 693c Processing field: OrdererAddresses" +"2019-09-24 00:27:19.541 UTC [common.channelconfig] initializeProtosStruct -> DEBU 693d Processing field: Consortium" +"2019-09-24 00:27:19.541 UTC [common.channelconfig] initializeProtosStruct -> DEBU 693e Processing field: Capabilities" +"2019-09-24 00:27:19.541 UTC [gossip.comm] serviceConnection -> DEBU 693f Closing reading from stream" +"2019-09-24 00:27:19.542 UTC [gossip.comm] writeToStream -> DEBU 6942 Closing writing to stream" +"2019-09-24 00:27:19.541 UTC [grpc] infof -> DEBU 6940 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.542 UTC [gossip.comm] readFromStream -> DEBU 6941 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +"2019-09-24 00:27:19.543 UTC [common.channelconfig] NewStandardValues -> DEBU 6943 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 00:27:19.543 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6944 Processing field: ConsensusType" +"2019-09-24 00:27:19.543 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6945 Processing field: BatchSize" +"2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6946 Processing field: BatchTimeout" +"2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6947 Processing field: KafkaBrokers" +"2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6948 Processing field: ChannelRestrictions" +"2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6949 Processing field: Capabilities" +"2019-09-24 00:27:19.544 UTC [common.channelconfig] NewStandardValues -> DEBU 694a Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 694b Processing field: Endpoints" +"2019-09-24 00:27:19.544 UTC [common.channelconfig] NewStandardValues -> DEBU 694c Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.544 UTC [common.channelconfig] initializeProtosStruct -> DEBU 694d Processing field: MSP" +"2019-09-24 00:27:19.544 UTC [common.channelconfig] validateMSP -> DEBU 694e Setting up MSP for org OrdererOrg" +"2019-09-24 00:27:19.545 UTC [msp] newBccspMsp -> DEBU 694f Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.545 UTC [msp] New -> DEBU 6950 Creating Cache-MSP instance" +"2019-09-24 00:27:19.545 UTC [msp] Setup -> DEBU 6951 Setting up MSP instance OrdererMSP" +"2019-09-24 00:27:19.545 UTC [msp.identity] newIdentity -> DEBU 6952 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.546 UTC [msp.identity] newIdentity -> DEBU 6953 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-09-24 00:27:19.546 UTC [msp] Validate -> DEBU 6954 MSP OrdererMSP validating identity" +"2019-09-24 00:27:19.548 UTC [common.channelconfig] NewStandardValues -> DEBU 6955 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 00:27:19.548 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6956 Processing field: ACLs" +"2019-09-24 00:27:19.548 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6957 Processing field: Capabilities" +"2019-09-24 00:27:19.548 UTC [common.channelconfig] NewStandardValues -> DEBU 6958 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.548 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6959 Processing field: AnchorPeers" +"2019-09-24 00:27:19.548 UTC [common.channelconfig] NewStandardValues -> DEBU 695a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.548 UTC [common.channelconfig] initializeProtosStruct -> DEBU 695b Processing field: MSP" +"2019-09-24 00:27:19.549 UTC [gossip.comm] readFromStream -> DEBU 695c Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:19.549 UTC [gossip.comm] func2 -> DEBU 695d Client 172.18.0.5:49542 disconnected" +"2019-09-24 00:27:19.549 UTC [comm.grpc.server] 1 -> INFO 695e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:27:29.534Z grpc.peer_address=172.18.0.5:49542 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.6181ms +"2019-09-24 00:27:19.549 UTC [common.channelconfig] Validate -> DEBU 695f Anchor peers for org Org3MSP are " +"2019-09-24 00:27:19.549 UTC [gossip.comm] writeToStream -> DEBU 6961 Closing writing to stream" +"2019-09-24 00:27:19.549 UTC [common.channelconfig] validateMSP -> DEBU 6962 Setting up MSP for org Org3MSP" +"2019-09-24 00:27:19.549 UTC [msp] newBccspMsp -> DEBU 6963 Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.549 UTC [grpc] infof -> DEBU 6960 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.549 UTC [msp] New -> DEBU 6964 Creating Cache-MSP instance" +"2019-09-24 00:27:19.550 UTC [msp] Setup -> DEBU 6965 Setting up MSP instance Org3MSP" +"2019-09-24 00:27:19.550 UTC [msp.identity] newIdentity -> DEBU 6966 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -18325,7 +32575,7 @@ rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.322 UTC [msp.identity] newIdentity -> DEBU 3b17 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:27:19.553 UTC [msp.identity] newIdentity -> DEBU 6967 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -18339,21 +32589,21 @@ HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= -----END CERTIFICATE-----" -"2019-07-20 02:40:45.324 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b18 Checking if identity satisfies role [CLIENT] for Org3MSP" -"2019-07-20 02:40:45.324 UTC [msp] Validate -> DEBU 3b19 MSP Org3MSP validating identity" -"2019-07-20 02:40:45.324 UTC [msp] getCertificationChain -> DEBU 3b1a MSP Org3MSP getting certification chain" -"2019-07-20 02:40:45.325 UTC [msp] hasOURole -> DEBU 3b1b MSP Org3MSP checking if the identity is a client" -"2019-07-20 02:40:45.325 UTC [msp] getCertificationChain -> DEBU 3b1c MSP Org3MSP getting certification chain" -"2019-07-20 02:40:45.325 UTC [common.channelconfig] NewStandardValues -> DEBU 3b1d Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.325 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b1e Processing field: AnchorPeers" -"2019-07-20 02:40:45.325 UTC [common.channelconfig] NewStandardValues -> DEBU 3b1f Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.325 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b20 Processing field: MSP" -"2019-07-20 02:40:45.325 UTC [common.channelconfig] Validate -> DEBU 3b21 Anchor peers for org Org1MSP are anchor_peers: " -"2019-07-20 02:40:45.326 UTC [common.channelconfig] validateMSP -> DEBU 3b22 Setting up MSP for org Org1MSP" -"2019-07-20 02:40:45.334 UTC [msp] newBccspMsp -> DEBU 3b23 Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.334 UTC [msp] New -> DEBU 3b24 Creating Cache-MSP instance" -"2019-07-20 02:40:45.335 UTC [msp] Setup -> DEBU 3b25 Setting up MSP instance Org1MSP" -"2019-07-20 02:40:45.337 UTC [msp.identity] newIdentity -> DEBU 3b26 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:27:19.554 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6968 Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-09-24 00:27:19.555 UTC [msp] Validate -> DEBU 6969 MSP Org3MSP validating identity" +"2019-09-24 00:27:19.556 UTC [msp] getCertificationChain -> DEBU 696a MSP Org3MSP getting certification chain" +"2019-09-24 00:27:19.562 UTC [msp] hasOURole -> DEBU 696b MSP Org3MSP checking if the identity is a client" +"2019-09-24 00:27:19.562 UTC [msp] getCertificationChain -> DEBU 696c MSP Org3MSP getting certification chain" +"2019-09-24 00:27:19.562 UTC [common.channelconfig] NewStandardValues -> DEBU 696d Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 696e Processing field: AnchorPeers" +"2019-09-24 00:27:19.563 UTC [common.channelconfig] NewStandardValues -> DEBU 696f Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6970 Processing field: MSP" +"2019-09-24 00:27:19.563 UTC [common.channelconfig] Validate -> DEBU 6971 Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 00:27:19.564 UTC [common.channelconfig] validateMSP -> DEBU 6972 Setting up MSP for org Org1MSP" +"2019-09-24 00:27:19.564 UTC [msp] newBccspMsp -> DEBU 6973 Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.565 UTC [msp] New -> DEBU 6974 Creating Cache-MSP instance" +"2019-09-24 00:27:19.565 UTC [msp] Setup -> DEBU 6975 Setting up MSP instance Org1MSP" +"2019-09-24 00:27:19.565 UTC [msp.identity] newIdentity -> DEBU 6976 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -18368,7 +32618,7 @@ a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 N0qzbu085qQXfAXf7yy4VoSHr1A6 -----END CERTIFICATE-----" -"2019-07-20 02:40:45.339 UTC [msp.identity] newIdentity -> DEBU 3b27 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:27:19.566 UTC [msp.identity] newIdentity -> DEBU 6977 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -18382,21 +32632,46 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.341 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b28 Checking if identity satisfies role [CLIENT] for Org1MSP" -"2019-07-20 02:40:45.341 UTC [msp] Validate -> DEBU 3b29 MSP Org1MSP validating identity" -"2019-07-20 02:40:45.343 UTC [msp] getCertificationChain -> DEBU 3b2a MSP Org1MSP getting certification chain" -"2019-07-20 02:40:45.345 UTC [msp] hasOURole -> DEBU 3b2b MSP Org1MSP checking if the identity is a client" -"2019-07-20 02:40:45.345 UTC [msp] getCertificationChain -> DEBU 3b2c MSP Org1MSP getting certification chain" -"2019-07-20 02:40:45.346 UTC [common.channelconfig] NewStandardValues -> DEBU 3b2d Initializing protos for *channelconfig.ApplicationOrgProtos" -"2019-07-20 02:40:45.346 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b2e Processing field: AnchorPeers" -"2019-07-20 02:40:45.347 UTC [common.channelconfig] NewStandardValues -> DEBU 3b2f Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b30 Processing field: MSP" -"2019-07-20 02:40:45.348 UTC [common.channelconfig] Validate -> DEBU 3b31 Anchor peers for org Org2MSP are anchor_peers: " -"2019-07-20 02:40:45.348 UTC [common.channelconfig] validateMSP -> DEBU 3b32 Setting up MSP for org Org2MSP" -"2019-07-20 02:40:45.348 UTC [msp] newBccspMsp -> DEBU 3b33 Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.349 UTC [msp] New -> DEBU 3b34 Creating Cache-MSP instance" -"2019-07-20 02:40:45.350 UTC [msp] Setup -> DEBU 3b35 Setting up MSP instance Org2MSP" -"2019-07-20 02:40:45.352 UTC [msp.identity] newIdentity -> DEBU 3b36 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:27:19.566 UTC [msp] GetDefaultSigningIdentity -> DEBU 6978 Obtaining default signing identity" +"2019-09-24 00:27:19.566 UTC [msp.identity] Sign -> DEBU 6979 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151051 " +"2019-09-24 00:27:19.566 UTC [msp.identity] Sign -> DEBU 697a Sign: digest: E55189DBF6E36C206CDDA03E8A16C65F9BA2B1BE5AFC4DF7931EF55022282744 " +"2019-09-24 00:27:19.567 UTC [msp] GetDefaultSigningIdentity -> DEBU 697b Obtaining default signing identity" +"2019-09-24 00:27:19.567 UTC [msp.identity] Sign -> DEBU 697c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:19.567 UTC [msp.identity] Sign -> DEBU 697d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:19.567 UTC [gossip.discovery] periodicalSendAlive -> DEBU 697e Sleeping 5s" +"2019-09-24 00:27:19.568 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 697f Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-09-24 00:27:19.568 UTC [msp] Validate -> DEBU 6980 MSP Org1MSP validating identity" +"2019-09-24 00:27:19.568 UTC [msp] getCertificationChain -> DEBU 6981 MSP Org1MSP getting certification chain" +"2019-09-24 00:27:19.568 UTC [msp] hasOURole -> DEBU 6982 MSP Org1MSP checking if the identity is a client" +"2019-09-24 00:27:19.569 UTC [msp] getCertificationChain -> DEBU 6983 MSP Org1MSP getting certification chain" +"2019-09-24 00:27:19.569 UTC [common.channelconfig] NewStandardValues -> DEBU 6984 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 00:27:19.569 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6985 Processing field: AnchorPeers" +"2019-09-24 00:27:19.569 UTC [common.channelconfig] NewStandardValues -> DEBU 6986 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 00:27:19.569 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6987 Processing field: MSP" +"2019-09-24 00:27:19.570 UTC [common.channelconfig] Validate -> DEBU 6988 Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 00:27:19.572 UTC [common.channelconfig] validateMSP -> DEBU 698a Setting up MSP for org Org2MSP" +"2019-09-24 00:27:19.573 UTC [msp] newBccspMsp -> DEBU 698b Creating BCCSP-based MSP instance" +"2019-09-24 00:27:19.572 UTC [msp] DeserializeIdentity -> DEBU 6989 Obtaining identity" +"2019-09-24 00:27:19.573 UTC [msp] DeserializeIdentity -> DEBU 698c Obtaining identity" +"2019-09-24 00:27:19.573 UTC [msp] DeserializeIdentity -> DEBU 698d Obtaining identity" +"2019-09-24 00:27:19.574 UTC [gossip.comm] Send -> DEBU 698e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:19.574 UTC [msp] DeserializeIdentity -> DEBU 698f Obtaining identity" +"2019-09-24 00:27:19.574 UTC [gossip.comm] Send -> DEBU 6990 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:19.575 UTC [gossip.comm] Send -> DEBU 6991 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:19.575 UTC [gossip.comm] sendToEndpoint -> DEBU 6992 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.575 UTC [gossip.comm] createConnection -> DEBU 6993 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:19.581 UTC [grpc] DialContext -> DEBU 6994 parsed scheme: """ +"2019-09-24 00:27:19.581 UTC [grpc] DialContext -> DEBU 6995 scheme "" not registered, fallback to default scheme" +"2019-09-24 00:27:19.582 UTC [grpc] watcher -> DEBU 6996 ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +"2019-09-24 00:27:19.582 UTC [grpc] switchBalancer -> DEBU 6997 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:27:19.582 UTC [grpc] HandleSubConnStateChange -> DEBU 6998 pickfirstBalancer: HandleSubConnStateChange: 0xc00445dc30, CONNECTING" +"2019-09-24 00:27:19.583 UTC [gossip.comm] sendToEndpoint -> DEBU 6999 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.583 UTC [gossip.comm] sendToEndpoint -> DEBU 699a Exiting" +"2019-09-24 00:27:19.583 UTC [gossip.comm] sendToEndpoint -> DEBU 699b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.583 UTC [gossip.comm] sendToEndpoint -> DEBU 699c Exiting" +"2019-09-24 00:27:19.573 UTC [msp] New -> DEBU 699d Creating Cache-MSP instance" +"2019-09-24 00:27:19.585 UTC [msp] Setup -> DEBU 699e Setting up MSP instance Org2MSP" +"2019-09-24 00:27:19.585 UTC [msp.identity] newIdentity -> DEBU 699f Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -18411,7 +32686,7 @@ fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.352 UTC [msp.identity] newIdentity -> DEBU 3b37 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:27:19.586 UTC [msp.identity] newIdentity -> DEBU 69a0 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -18425,543 +32700,445 @@ VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== -----END CERTIFICATE-----" -"2019-07-20 02:40:45.354 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b38 Checking if identity satisfies role [CLIENT] for Org2MSP" -"2019-07-20 02:40:45.354 UTC [msp] Validate -> DEBU 3b39 MSP Org2MSP validating identity" -"2019-07-20 02:40:45.354 UTC [comm.grpc.server] 1 -> INFO 3b3a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.353Z grpc.peer_address=172.18.0.6:34152 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=525.1µs -"2019-07-20 02:40:45.355 UTC [msp] getCertificationChain -> DEBU 3b3b MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.357 UTC [msp] hasOURole -> DEBU 3b3c MSP Org2MSP checking if the identity is a client" -"2019-07-20 02:40:45.357 UTC [msp] getCertificationChain -> DEBU 3b3d MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.357 UTC [common.channelconfig] NewStandardValues -> DEBU 3b3e Initializing protos for *channelconfig.OrdererProtos" -"2019-07-20 02:40:45.358 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b3f Processing field: ConsensusType" -"2019-07-20 02:40:45.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b41 Processing field: BatchSize" -"2019-07-20 02:40:45.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b42 Processing field: BatchTimeout" -"2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b43 Processing field: KafkaBrokers" -"2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b44 Processing field: ChannelRestrictions" -"2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b45 Processing field: Capabilities" -"2019-07-20 02:40:45.360 UTC [common.channelconfig] NewStandardValues -> DEBU 3b46 Initializing protos for *channelconfig.OrdererOrgProtos" -"2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b47 Processing field: Endpoints" -"2019-07-20 02:40:45.358 UTC [comm.grpc.server] 1 -> INFO 3b40 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.355Z grpc.peer_address=172.18.0.7:59100 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.6µs -"2019-07-20 02:40:45.361 UTC [common.channelconfig] NewStandardValues -> DEBU 3b48 Initializing protos for *channelconfig.OrganizationProtos" -"2019-07-20 02:40:45.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b49 Processing field: MSP" -"2019-07-20 02:40:45.361 UTC [common.channelconfig] validateMSP -> DEBU 3b4a Setting up MSP for org OrdererOrg" -"2019-07-20 02:40:45.361 UTC [msp] newBccspMsp -> DEBU 3b4b Creating BCCSP-based MSP instance" -"2019-07-20 02:40:45.361 UTC [msp] New -> DEBU 3b4c Creating Cache-MSP instance" -"2019-07-20 02:40:45.362 UTC [msp] Setup -> DEBU 3b4d Setting up MSP instance OrdererMSP" -"2019-07-20 02:40:45.362 UTC [msp.identity] newIdentity -> DEBU 3b4e Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv -bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 -XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr -MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw -DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh -b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk -t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U ------END CERTIFICATE-----" -"2019-07-20 02:40:45.363 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b4f Obtaining default signing identity" -"2019-07-20 02:40:45.364 UTC [msp.identity] Sign -> DEBU 3b51 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:40:45.365 UTC [msp.identity] Sign -> DEBU 3b52 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:40:45.366 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b53 Obtaining default signing identity" -"2019-07-20 02:40:45.367 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b54 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:34152" -"2019-07-20 02:40:45.367 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b55 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:34152" -"2019-07-20 02:40:45.367 UTC [msp.identity] Verify -> DEBU 3b56 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +"2019-09-24 00:27:19.586 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 69a1 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-09-24 00:27:19.586 UTC [msp] Validate -> DEBU 69a2 MSP Org2MSP validating identity" +"2019-09-24 00:27:19.586 UTC [msp] getCertificationChain -> DEBU 69a3 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.587 UTC [msp] hasOURole -> DEBU 69a4 MSP Org2MSP checking if the identity is a client" +"2019-09-24 00:27:19.587 UTC [msp] getCertificationChain -> DEBU 69a5 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.587 UTC [msp] Setup -> DEBU 69a6 Setting up the MSP manager (4 msps)" +"2019-09-24 00:27:19.587 UTC [msp] Setup -> DEBU 69a7 MSP manager setup complete, setup 4 msps" +"2019-09-24 00:27:19.587 UTC [policies] NewManagerImpl -> DEBU 69a8 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.587 UTC [policies] NewManagerImpl -> DEBU 69a9 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.587 UTC [policies] NewManagerImpl -> DEBU 69aa Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69ab Proposed new policy Admins for Channel/Orderer" +"2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69ac Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69ad Proposed new policy Readers for Channel/Orderer" +"2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69ae Proposed new policy Writers for Channel/Orderer" +"2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69af Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69b0 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.588 UTC [policies] NewManagerImpl -> DEBU 69b1 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b2 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b3 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b4 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b5 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b6 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-09-24 00:27:19.589 UTC [policies] NewManagerImpl -> DEBU 69b7 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.590 UTC [policies] NewManagerImpl -> DEBU 69b8 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.590 UTC [policies] NewManagerImpl -> DEBU 69b9 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.590 UTC [policies] NewManagerImpl -> DEBU 69ba Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69bb Proposed new policy Writers for Channel/Application" +"2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69bc Proposed new policy Admins for Channel/Application" +"2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69bd Proposed new policy Endorsement for Channel/Application" +"2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69be Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69bf Proposed new policy Readers for Channel/Application" +"2019-09-24 00:27:19.591 UTC [policies] NewManagerImpl -> DEBU 69c0 Proposed new policy Writers for Channel" +"2019-09-24 00:27:19.594 UTC [policies] NewManagerImpl -> DEBU 69c1 Proposed new policy Admins for Channel" +"2019-09-24 00:27:19.594 UTC [policies] NewManagerImpl -> DEBU 69c2 Proposed new policy Readers for Channel" +"2019-09-24 00:27:19.594 UTC [common.configtx] addToMap -> DEBU 69c3 Adding to config map: [Group] /Channel" +"2019-09-24 00:27:19.594 UTC [common.configtx] addToMap -> DEBU 69c4 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 00:27:19.595 UTC [common.configtx] addToMap -> DEBU 69c5 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 00:27:19.595 UTC [common.configtx] addToMap -> DEBU 69c6 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 00:27:19.595 UTC [common.configtx] addToMap -> DEBU 69c7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 00:27:19.595 UTC [common.configtx] addToMap -> DEBU 69c8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 00:27:19.596 UTC [common.configtx] addToMap -> DEBU 69c9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 00:27:19.596 UTC [common.configtx] addToMap -> DEBU 69ca Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 00:27:19.597 UTC [common.configtx] addToMap -> DEBU 69cb Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 00:27:19.598 UTC [common.configtx] addToMap -> DEBU 69cc Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 00:27:19.598 UTC [common.configtx] addToMap -> DEBU 69cd Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 00:27:19.598 UTC [common.configtx] addToMap -> DEBU 69ce Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 00:27:19.598 UTC [common.configtx] addToMap -> DEBU 69cf Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 00:27:19.599 UTC [common.configtx] addToMap -> DEBU 69d0 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 00:27:19.599 UTC [common.configtx] addToMap -> DEBU 69d1 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 00:27:19.599 UTC [common.configtx] addToMap -> DEBU 69d2 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 00:27:19.600 UTC [common.configtx] addToMap -> DEBU 69d3 Adding to config map: [Group] /Channel/Application" +"2019-09-24 00:27:19.600 UTC [common.configtx] addToMap -> DEBU 69d4 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 00:27:19.601 UTC [common.configtx] addToMap -> DEBU 69d5 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 00:27:19.601 UTC [common.configtx] addToMap -> DEBU 69d6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 00:27:19.601 UTC [common.configtx] addToMap -> DEBU 69d7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 00:27:19.601 UTC [common.configtx] addToMap -> DEBU 69d8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:19.601 UTC [gossip.comm] func1 -> DEBU 69d9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.615 UTC [gossip.gossip] handleMessage -> DEBU 69db Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.615 UTC [gossip.gossip] handleMessage -> DEBU 69dc Exiting" +"2019-09-24 00:27:19.615 UTC [common.configtx] addToMap -> DEBU 69dd Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 00:27:19.616 UTC [gossip.discovery] handleMsgFromComm -> DEBU 69de Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.616 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 69df Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:19.616 UTC [common.configtx] addToMap -> DEBU 69e0 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 00:27:19.617 UTC [msp.identity] Verify -> DEBU 69e1 Verify: digest = 00000000 e5 51 89 db f6 e3 6c 20 6c dd a0 3e 8a 16 c6 5f |.Q....l l..>..._| +00000010 9b a2 b1 be 5a fc 4d f7 93 1e f5 50 22 28 27 44 |....Z.M....P"('D|" +"2019-09-24 00:27:19.617 UTC [msp.identity] Verify -> DEBU 69e2 Verify: sig = 00000000 30 45 02 21 00 9f cd 26 45 12 4f e0 0a 80 c2 c2 |0E.!...&E.O.....| +00000010 2f e2 0a c3 fc 37 47 49 51 bf 9c b6 52 10 86 e1 |/....7GIQ...R...| +00000020 7a 59 09 0d 3c 02 20 5a a6 5d a0 67 8f af 96 b4 |zY..<. Z.].g....| +00000030 24 f5 c0 15 c9 00 80 2a 29 be 45 b0 22 ac 33 2c |$......*).E.".3,| +00000040 b7 ac 38 24 09 0b 5f |..8$.._|" +"2019-09-24 00:27:19.617 UTC [gossip.discovery] isSentByMe -> DEBU 69e3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.617 UTC [common.configtx] addToMap -> DEBU 69e4 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 00:27:19.618 UTC [common.configtx] addToMap -> DEBU 69e6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 00:27:19.618 UTC [common.configtx] addToMap -> DEBU 69e7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 00:27:19.617 UTC [gossip.discovery] handleMsgFromComm -> DEBU 69e5 Exiting" +"2019-09-24 00:27:19.614 UTC [grpc] HandleSubConnStateChange -> DEBU 69da pickfirstBalancer: HandleSubConnStateChange: 0xc00445dc30, READY" +"2019-09-24 00:27:19.619 UTC [common.configtx] addToMap -> DEBU 69e8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 00:27:19.619 UTC [common.configtx] addToMap -> DEBU 69e9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 00:27:19.619 UTC [common.configtx] addToMap -> DEBU 69ea Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.619 UTC [common.configtx] addToMap -> DEBU 69eb Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 00:27:19.619 UTC [common.configtx] addToMap -> DEBU 69ec Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 00:27:19.620 UTC [common.configtx] addToMap -> DEBU 69ed Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 00:27:19.621 UTC [common.configtx] addToMap -> DEBU 69ee Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 00:27:19.621 UTC [common.configtx] addToMap -> DEBU 69ef Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.621 UTC [common.configtx] addToMap -> DEBU 69f0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 00:27:19.622 UTC [common.configtx] addToMap -> DEBU 69f1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 00:27:19.623 UTC [common.configtx] addToMap -> DEBU 69f2 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 00:27:19.623 UTC [common.configtx] addToMap -> DEBU 69f3 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 00:27:19.623 UTC [common.configtx] addToMap -> DEBU 69f4 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 00:27:19.624 UTC [common.configtx] addToMap -> DEBU 69f5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 00:27:19.624 UTC [common.configtx] addToMap -> DEBU 69f6 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 00:27:19.625 UTC [common.configtx] addToMap -> DEBU 69f7 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 00:27:19.625 UTC [common.configtx] addToMap -> DEBU 69f8 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 00:27:19.626 UTC [common.configtx] addToMap -> DEBU 69f9 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 00:27:19.626 UTC [common.configtx] addToMap -> DEBU 69fa Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 00:27:19.626 UTC [common.configtx] addToMap -> DEBU 69fb Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 00:27:19.626 UTC [common.configtx] addToMap -> DEBU 69fc Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 00:27:19.627 UTC [common.configtx] addToMap -> DEBU 69fd Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 00:27:19.627 UTC [common.configtx] addToMap -> DEBU 69fe Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 00:27:19.627 UTC [common.configtx] addToMap -> DEBU 69ff Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 00:27:19.628 UTC [common.configtx] addToMap -> DEBU 6a00 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 00:27:19.628 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a01 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 00:27:19.628 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a02 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 00:27:19.628 UTC [policies] Manager -> DEBU 6a03 Manager Channel looking up path [Application]" +"2019-09-24 00:27:19.628 UTC [policies] Manager -> DEBU 6a04 Manager Channel has managers Orderer" +"2019-09-24 00:27:19.629 UTC [policies] Manager -> DEBU 6a05 Manager Channel has managers Application" +"2019-09-24 00:27:19.629 UTC [policies] Manager -> DEBU 6a06 Manager Channel/Application looking up path []" +"2019-09-24 00:27:19.629 UTC [policies] Manager -> DEBU 6a07 Manager Channel/Application has managers Org3MSP" +"2019-09-24 00:27:19.629 UTC [policies] Manager -> DEBU 6a08 Manager Channel/Application has managers Org1MSP" +"2019-09-24 00:27:19.629 UTC [policies] Manager -> DEBU 6a09 Manager Channel/Application has managers Org2MSP" +"2019-09-24 00:27:19.630 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a0a As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 00:27:19.630 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a0b As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 00:27:19.630 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a0c As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 00:27:19.631 UTC [policies] Manager -> DEBU 6a0d Manager Channel looking up path [Orderer]" +"2019-09-24 00:27:19.631 UTC [policies] Manager -> DEBU 6a0e Manager Channel has managers Orderer" +"2019-09-24 00:27:19.632 UTC [policies] Manager -> DEBU 6a0f Manager Channel has managers Application" +"2019-09-24 00:27:19.632 UTC [policies] Manager -> DEBU 6a10 Manager Channel/Orderer looking up path []" +"2019-09-24 00:27:19.632 UTC [policies] Manager -> DEBU 6a11 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 00:27:19.633 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a12 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 00:27:19.633 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a13 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 00:27:19.634 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a14 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 00:27:19.634 UTC [common.channelconfig] LogSanityChecks -> DEBU 6a15 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 00:27:19.634 UTC [common.capabilities] Supported -> DEBU 6a16 Application capability V1_4_2 is supported and is enabled" +"2019-09-24 00:27:19.635 UTC [common.capabilities] Supported -> DEBU 6a17 Channel capability V1_4_2 is supported and is enabled" +"2019-09-24 00:27:19.636 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6a18 Processing new config for channel businesschannel" +"2019-09-24 00:27:19.636 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6a19 Calling out because config was updated for channel businesschannel" +"2019-09-24 00:27:19.637 UTC [gossip.service] updateAnchors -> DEBU 6a1a Org3MSP anchor peers: []" +"2019-09-24 00:27:19.637 UTC [gossip.service] updateAnchors -> DEBU 6a1b Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-09-24 00:27:19.637 UTC [gossip.service] updateAnchors -> DEBU 6a1c Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +"2019-09-24 00:27:19.637 UTC [gossip.service] updateAnchors -> DEBU 6a1d Creating state provider for chainID businesschannel" +"2019-09-24 00:27:19.638 UTC [msp] DeserializeIdentity -> DEBU 6a1e Obtaining identity" +"2019-09-24 00:27:19.638 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a1f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.639 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a20 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.639 UTC [policies] Evaluate -> DEBU 6a21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.639 UTC [policies] Evaluate -> DEBU 6a22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.640 UTC [policies] Evaluate -> DEBU 6a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:19.640 UTC [cauthdsl] func1 -> DEBU 6a24 0xc004531f90 gate 1569284839640982100 evaluation starts" +"2019-09-24 00:27:19.641 UTC [cauthdsl] func2 -> DEBU 6a25 0xc004531f90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.642 UTC [cauthdsl] func2 -> DEBU 6a27 0xc004531f90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.642 UTC [cauthdsl] func2 -> DEBU 6a28 0xc004531f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:19.642 UTC [cauthdsl] func2 -> DEBU 6a29 0xc004531f90 principal evaluation fails" +"2019-09-24 00:27:19.643 UTC [cauthdsl] func1 -> DEBU 6a2a 0xc004531f90 gate 1569284839640982100 evaluation fails" +"2019-09-24 00:27:19.643 UTC [policies] Evaluate -> DEBU 6a2b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.643 UTC [policies] Evaluate -> DEBU 6a2c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.643 UTC [policies] Evaluate -> DEBU 6a2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.643 UTC [cauthdsl] func1 -> DEBU 6a2e 0xc0045407d0 gate 1569284839643822600 evaluation starts" +"2019-09-24 00:27:19.642 UTC [msp] GetDefaultSigningIdentity -> DEBU 6a26 Obtaining default signing identity" +"2019-09-24 00:27:19.644 UTC [cauthdsl] func2 -> DEBU 6a2f 0xc0045407d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.644 UTC [cauthdsl] func2 -> DEBU 6a31 0xc0045407d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.644 UTC [cauthdsl] func2 -> DEBU 6a32 0xc0045407d0 principal matched by identity 0" +"2019-09-24 00:27:19.644 UTC [msp.identity] Verify -> DEBU 6a33 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:19.644 UTC [msp.identity] Sign -> DEBU 6a30 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:27:19.644 UTC [msp.identity] Sign -> DEBU 6a34 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:27:19.645 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a35 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051" +"2019-09-24 00:27:19.645 UTC [msp.identity] Verify -> DEBU 6a36 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:19.646 UTC [cauthdsl] func2 -> DEBU 6a37 0xc0045407d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.646 UTC [cauthdsl] func1 -> DEBU 6a38 0xc0045407d0 gate 1569284839643822600 evaluation succeeds" +"2019-09-24 00:27:19.646 UTC [policies] Evaluate -> DEBU 6a39 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.646 UTC [policies] Evaluate -> DEBU 6a3a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.646 UTC [policies] Evaluate -> DEBU 6a3b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.646 UTC [policies] Evaluate -> DEBU 6a3c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.646 UTC [msp] DeserializeIdentity -> DEBU 6a3d Obtaining identity" +"2019-09-24 00:27:19.646 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a3e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.647 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a3f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.647 UTC [policies] Evaluate -> DEBU 6a40 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.647 UTC [policies] Evaluate -> DEBU 6a41 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.647 UTC [policies] Evaluate -> DEBU 6a42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:19.647 UTC [cauthdsl] func1 -> DEBU 6a43 0xc004550bb0 gate 1569284839647767600 evaluation starts" +"2019-09-24 00:27:19.648 UTC [cauthdsl] func2 -> DEBU 6a44 0xc004550bb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.648 UTC [cauthdsl] func2 -> DEBU 6a45 0xc004550bb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.648 UTC [cauthdsl] func2 -> DEBU 6a46 0xc004550bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:19.648 UTC [cauthdsl] func2 -> DEBU 6a47 0xc004550bb0 principal evaluation fails" +"2019-09-24 00:27:19.648 UTC [cauthdsl] func1 -> DEBU 6a48 0xc004550bb0 gate 1569284839647767600 evaluation fails" +"2019-09-24 00:27:19.649 UTC [policies] Evaluate -> DEBU 6a49 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.649 UTC [policies] Evaluate -> DEBU 6a4a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.649 UTC [policies] Evaluate -> DEBU 6a4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.650 UTC [cauthdsl] func1 -> DEBU 6a4c 0xc0045513f0 gate 1569284839649246300 evaluation starts" +"2019-09-24 00:27:19.650 UTC [cauthdsl] func2 -> DEBU 6a4d 0xc0045513f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.650 UTC [cauthdsl] func2 -> DEBU 6a4e 0xc0045513f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.650 UTC [cauthdsl] func2 -> DEBU 6a4f 0xc0045513f0 principal matched by identity 0" +"2019-09-24 00:27:19.650 UTC [msp.identity] Verify -> DEBU 6a50 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:19.651 UTC [msp.identity] Verify -> DEBU 6a51 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:19.652 UTC [cauthdsl] func2 -> DEBU 6a52 0xc0045513f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.656 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a53 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:7051" +"2019-09-24 00:27:19.657 UTC [msp.identity] Verify -> DEBU 6a54 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" -"2019-07-20 02:40:45.368 UTC [msp.identity] Verify -> DEBU 3b57 Verify: sig = 00000000 30 44 02 20 1f f0 4d a2 e6 96 82 59 a5 ec 6b 9c |0D. ..M....Y..k.| -00000010 34 89 fa 02 72 ee 06 88 36 da 46 9c ed 01 62 f5 |4...r...6.F...b.| -00000020 8f e5 fd 27 02 20 09 db aa f3 d2 09 14 81 36 40 |...'. ........6@| -00000030 8c 02 70 d7 6f cd 16 82 bf b9 5b 96 a1 b3 45 a8 |..p.o.....[...E.| -00000040 12 28 f0 7b 8d 41 |.(.{.A|" -"2019-07-20 02:40:45.366 UTC [msp.identity] Sign -> DEBU 3b58 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:40:45.368 UTC [msp.identity] Sign -> DEBU 3b59 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:40:45.369 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b5a Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:59100" -"2019-07-20 02:40:45.370 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b5b Authenticated 172.18.0.6:34152" -"2019-07-20 02:40:45.370 UTC [gossip.comm] GossipStream -> DEBU 3b5c Servicing 172.18.0.6:34152" -"2019-07-20 02:40:45.364 UTC [msp.identity] newIdentity -> DEBU 3b50 Creating identity instance for cert -----BEGIN CERTIFICATE----- -MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw -CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy -YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w -bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE -BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz -Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI -zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn -Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG -A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW -tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa -0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== ------END CERTIFICATE-----" -"2019-07-20 02:40:45.373 UTC [msp] Validate -> DEBU 3b5d MSP OrdererMSP validating identity" -"2019-07-20 02:40:45.373 UTC [msp] Setup -> DEBU 3b5e Setting up the MSP manager (4 msps)" -"2019-07-20 02:40:45.373 UTC [msp] Setup -> DEBU 3b5f MSP manager setup complete, setup 4 msps" -"2019-07-20 02:40:45.373 UTC [policies] NewManagerImpl -> DEBU 3b60 Proposed new policy Readers for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b61 Proposed new policy Writers for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b62 Proposed new policy Admins for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b63 Proposed new policy Endorsement for Channel/Application/Org1MSP" -"2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b64 Proposed new policy Admins for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b65 Proposed new policy Endorsement for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b66 Proposed new policy Readers for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b67 Proposed new policy Writers for Channel/Application/Org2MSP" -"2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b68 Proposed new policy Admins for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b69 Proposed new policy Endorsement for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6a Proposed new policy Readers for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6b Proposed new policy Writers for Channel/Application/Org3MSP" -"2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6c Proposed new policy Readers for Channel/Application" -"2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6d Proposed new policy Writers for Channel/Application" -"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b6e Proposed new policy Admins for Channel/Application" -"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b6f Proposed new policy Endorsement for Channel/Application" -"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b70 Proposed new policy LifecycleEndorsement for Channel/Application" -"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b71 Proposed new policy Writers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b72 Proposed new policy Admins for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b73 Proposed new policy Readers for Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b74 Proposed new policy Readers for Channel/Orderer" -"2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b75 Proposed new policy Writers for Channel/Orderer" -"2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b76 Proposed new policy Admins for Channel/Orderer" -"2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b77 Proposed new policy BlockValidation for Channel/Orderer" -"2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b78 Proposed new policy Writers for Channel" -"2019-07-20 02:40:45.379 UTC [policies] NewManagerImpl -> DEBU 3b79 Proposed new policy Admins for Channel" -"2019-07-20 02:40:45.379 UTC [policies] NewManagerImpl -> DEBU 3b7a Proposed new policy Readers for Channel" -"2019-07-20 02:40:45.379 UTC [common.configtx] addToMap -> DEBU 3b7b Adding to config map: [Group] /Channel" -"2019-07-20 02:40:45.379 UTC [common.configtx] addToMap -> DEBU 3b7c Adding to config map: [Group] /Channel/Application" -"2019-07-20 02:40:45.380 UTC [common.configtx] addToMap -> DEBU 3b7d Adding to config map: [Group] /Channel/Application/Org3MSP" -"2019-07-20 02:40:45.380 UTC [common.configtx] addToMap -> DEBU 3b7e Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" -"2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b7f Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" -"2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b80 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" -"2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b81 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b82 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" -"2019-07-20 02:40:45.386 UTC [common.configtx] addToMap -> DEBU 3b83 Adding to config map: [Group] /Channel/Application/Org1MSP" -"2019-07-20 02:40:45.386 UTC [common.configtx] addToMap -> DEBU 3b84 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" -"2019-07-20 02:40:45.387 UTC [common.configtx] addToMap -> DEBU 3b85 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" -"2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b87 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" -"2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b88 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" -"2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b89 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" -"2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8b Adding to config map: [Group] /Channel/Application/Org2MSP" -"2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8c Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" -"2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" -"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b8e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" -"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b8f Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" -"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b90 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b91 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" -"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b92 Adding to config map: [Value] /Channel/Application/ACLs" -"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b93 Adding to config map: [Value] /Channel/Application/Capabilities" -"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b94 Adding to config map: [Policy] /Channel/Application/Readers" -"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b95 Adding to config map: [Policy] /Channel/Application/Writers" -"2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b96 Adding to config map: [Policy] /Channel/Application/Admins" -"2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b97 Adding to config map: [Policy] /Channel/Application/Endorsement" -"2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b98 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" -"2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b99 Adding to config map: [Group] /Channel/Orderer" -"2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b9a Adding to config map: [Group] /Channel/Orderer/OrdererOrg" -"2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9b Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" -"2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" -"2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" -"2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" -"2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba0 Adding to config map: [Value] /Channel/Orderer/Capabilities" -"2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" -"2019-07-20 02:40:45.395 UTC [gossip.comm] func1 -> DEBU 3ba2 Got message: GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.372 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b86 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:59100" -"2019-07-20 02:40:45.396 UTC [gossip.gossip] handleMessage -> DEBU 3ba4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.396 UTC [gossip.gossip] handleMessage -> DEBU 3ba6 Exiting" -"2019-07-20 02:40:45.396 UTC [grpc] infof -> DEBU 3ba7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:45.395 UTC [comm.grpc.server] 1 -> INFO 3b9f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.391Z grpc.peer_address=172.18.0.8:60470 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=406.8µs -"2019-07-20 02:40:45.397 UTC [gossip.gossip] handleMessage -> DEBU 3ba8 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:5951314385057450676 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ba9 Got message: GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.396 UTC [msp] DeserializeIdentity -> DEBU 3ba5 Obtaining identity" -"2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba3 Adding to config map: [Value] /Channel/Orderer/BatchSize" -"2019-07-20 02:40:45.398 UTC [common.configtx] addToMap -> DEBU 3bab Adding to config map: [Value] /Channel/Orderer/BatchTimeout" -"2019-07-20 02:40:45.398 UTC [common.configtx] addToMap -> DEBU 3bac Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" -"2019-07-20 02:40:45.399 UTC [common.configtx] addToMap -> DEBU 3bad Adding to config map: [Policy] /Channel/Orderer/BlockValidation" -"2019-07-20 02:40:45.399 UTC [common.configtx] addToMap -> DEBU 3bae Adding to config map: [Policy] /Channel/Orderer/Readers" -"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3baf Adding to config map: [Policy] /Channel/Orderer/Writers" -"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb0 Adding to config map: [Policy] /Channel/Orderer/Admins" -"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb1 Adding to config map: [Value] /Channel/HashingAlgorithm" -"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb2 Adding to config map: [Value] /Channel/BlockDataHashingStructure" -"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb3 Adding to config map: [Value] /Channel/OrdererAddresses" -"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb4 Adding to config map: [Value] /Channel/Consortium" -"2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb5 Adding to config map: [Value] /Channel/Capabilities" -"2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb6 Adding to config map: [Policy] /Channel/Writers" -"2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb7 Adding to config map: [Policy] /Channel/Admins" -"2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb8 Adding to config map: [Policy] /Channel/Readers" -"2019-07-20 02:40:45.401 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bb9 As expected, current configuration has policy '/Channel/Readers'" -"2019-07-20 02:40:45.402 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bba As expected, current configuration has policy '/Channel/Writers'" -"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbb Manager Channel looking up path [Application]" -"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbc Manager Channel has managers Application" -"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbd Manager Channel has managers Orderer" -"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbe Manager Channel/Application looking up path []" -"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbf Manager Channel/Application has managers Org1MSP" -"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bc0 Manager Channel/Application has managers Org2MSP" -"2019-07-20 02:40:45.403 UTC [policies] Manager -> DEBU 3bc1 Manager Channel/Application has managers Org3MSP" -"2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc2 As expected, current configuration has policy '/Channel/Application/Readers'" -"2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc3 As expected, current configuration has policy '/Channel/Application/Writers'" -"2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc4 As expected, current configuration has policy '/Channel/Application/Admins'" -"2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc5 Manager Channel looking up path [Orderer]" -"2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc6 Manager Channel has managers Application" -"2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc7 Manager Channel has managers Orderer" -"2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc8 Manager Channel/Orderer looking up path []" -"2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc9 Manager Channel/Orderer has managers OrdererOrg" -"2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bca As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" -"2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcb As expected, current configuration has policy '/Channel/Orderer/Admins'" -"2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcc As expected, current configuration has policy '/Channel/Orderer/Writers'" -"2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcd As expected, current configuration has policy '/Channel/Orderer/Readers'" -"2019-07-20 02:40:45.405 UTC [common.capabilities] Supported -> DEBU 3bce Application capability V1_4_2 is supported and is enabled" -"2019-07-20 02:40:45.405 UTC [common.capabilities] Supported -> DEBU 3bcf Channel capability V1_4_2 is supported and is enabled" -"2019-07-20 02:40:45.405 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3bd0 Processing new config for channel businesschannel" -"2019-07-20 02:40:45.405 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3bd1 Calling out because config was updated for channel businesschannel" -"2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd2 Org3MSP anchor peers: []" -"2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd3 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" -"2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd4 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" -"2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd5 Creating state provider for chainID businesschannel" -"2019-07-20 02:40:45.405 UTC [msp] DeserializeIdentity -> DEBU 3bd6 Obtaining identity" -"2019-07-20 02:40:45.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bd7 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bd8 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bd9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.406 UTC [cauthdsl] func1 -> DEBU 3bdc 0xc003d6ac20 gate 1563590445406453400 evaluation starts" -"2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bdd 0xc003d6ac20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bde 0xc003d6ac20 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bdf 0xc003d6ac20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3be0 0xc003d6ac20 principal evaluation fails" -"2019-07-20 02:40:45.406 UTC [cauthdsl] func1 -> DEBU 3be1 0xc003d6ac20 gate 1563590445406453400 evaluation fails" -"2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.407 UTC [cauthdsl] func1 -> DEBU 3be5 0xc003d6b460 gate 1563590445407305700 evaluation starts" -"2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be6 0xc003d6b460 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be7 0xc003d6b460 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be8 0xc003d6b460 principal matched by identity 0" -"2019-07-20 02:40:45.407 UTC [msp.identity] Verify -> DEBU 3be9 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:45.407 UTC [msp.identity] Verify -> DEBU 3bea Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3beb 0xc003d6b460 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.407 UTC [cauthdsl] func1 -> DEBU 3bec 0xc003d6b460 gate 1563590445407305700 evaluation succeeds" -"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bef Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.408 UTC [msp] DeserializeIdentity -> DEBU 3bf1 Obtaining identity" -"2019-07-20 02:40:45.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bf2 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bf3 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.408 UTC [cauthdsl] func1 -> DEBU 3bf7 0xc003da0540 gate 1563590445408927800 evaluation starts" -"2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bf8 0xc003da0540 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bf9 0xc003da0540 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bfa 0xc003da0540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bfb 0xc003da0540 principal evaluation fails" -"2019-07-20 02:40:45.409 UTC [cauthdsl] func1 -> DEBU 3bfc 0xc003da0540 gate 1563590445408927800 evaluation fails" -"2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bfd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bfe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.410 UTC [cauthdsl] func1 -> DEBU 3c00 0xc003da0d80 gate 1563590445409998800 evaluation starts" -"2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c01 0xc003da0d80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c02 0xc003da0d80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c03 0xc003da0d80 principal matched by identity 0" -"2019-07-20 02:40:45.410 UTC [msp.identity] Verify -> DEBU 3c04 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:45.411 UTC [msp.identity] Verify -> DEBU 3c05 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:45.411 UTC [cauthdsl] func2 -> DEBU 3c06 0xc003da0d80 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.411 UTC [cauthdsl] func1 -> DEBU 3c07 0xc003da0d80 gate 1563590445409998800 evaluation succeeds" -"2019-07-20 02:40:45.411 UTC [policies] Evaluate -> DEBU 3c08 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c09 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.411 UTC [msp] DeserializeIdentity -> DEBU 3c0a Obtaining identity" -"2019-07-20 02:40:45.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.412 UTC [msp] DeserializeIdentity -> DEBU 3c0d Obtaining identity" -"2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.412 UTC [msp] GetDefaultSigningIdentity -> DEBU 3c0f Obtaining default signing identity" -"2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c10 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c12 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.412 UTC [msp.identity] Sign -> DEBU 3c11 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:40:45.413 UTC [msp.identity] Sign -> DEBU 3c14 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:40:45.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c15 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60470" -"2019-07-20 02:40:45.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c16 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60470" -"2019-07-20 02:40:45.413 UTC [msp] DeserializeIdentity -> DEBU 3c17 Obtaining identity" -"2019-07-20 02:40:45.413 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c18 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.414 UTC [msp] DeserializeIdentity -> DEBU 3c19 Obtaining identity" -"2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.414 UTC [msp] DeserializeIdentity -> DEBU 3c1b Obtaining identity" -"2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1d Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1e Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.414 UTC [policies] Evaluate -> DEBU 3c1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.415 UTC [policies] Evaluate -> DEBU 3c20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.415 UTC [policies] Evaluate -> DEBU 3c21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.415 UTC [cauthdsl] func1 -> DEBU 3c22 0xc0032cb6a0 gate 1563590445415359700 evaluation starts" -"2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c23 0xc0032cb6a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c24 0xc0032cb6a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c25 0xc0032cb6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c26 0xc0032cb6a0 principal evaluation fails" -"2019-07-20 02:40:45.415 UTC [cauthdsl] func1 -> DEBU 3c27 0xc0032cb6a0 gate 1563590445415359700 evaluation fails" -"2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c28 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c2a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.416 UTC [cauthdsl] func1 -> DEBU 3c2b 0xc0032cbee0 gate 1563590445416337000 evaluation starts" -"2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2c 0xc0032cbee0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2d 0xc0032cbee0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2e 0xc0032cbee0 principal matched by identity 0" -"2019-07-20 02:40:45.416 UTC [msp.identity] Verify -> DEBU 3c2f Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +"2019-09-24 00:27:19.658 UTC [msp.identity] Verify -> DEBU 6a55 Verify: sig = 00000000 30 45 02 21 00 95 eb ae e0 bf 29 40 8b 9d e3 db |0E.!......)@....| +00000010 f9 a3 54 95 6a cc 11 d7 aa 3f f7 cc c0 ae 9e 03 |..T.j....?......| +00000020 6b fe 75 e5 22 02 20 0e bd 8d 31 9c ef 23 8b 5c |k.u.". ...1..#.\| +00000030 b0 51 99 bd eb 2e 79 f5 bb e7 d2 d5 e4 af 00 13 |.Q....y.........| +00000040 4f 30 97 b3 b3 9c 9d |O0.....|" +"2019-09-24 00:27:19.658 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a56 Authenticated 172.18.0.5:7051" +"2019-09-24 00:27:19.659 UTC [gossip.comm] createConnection -> DEBU 6a57 Exiting" +"2019-09-24 00:27:19.659 UTC [gossip.comm] sendToEndpoint -> DEBU 6a58 Exiting" +"2019-09-24 00:27:19.652 UTC [cauthdsl] func1 -> DEBU 6a59 0xc0045513f0 gate 1569284839649246300 evaluation succeeds" +"2019-09-24 00:27:19.671 UTC [policies] Evaluate -> DEBU 6a5a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.671 UTC [policies] Evaluate -> DEBU 6a5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.671 UTC [policies] Evaluate -> DEBU 6a5c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.672 UTC [policies] Evaluate -> DEBU 6a5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.673 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a5e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.674 UTC [comm.grpc.server] 1 -> INFO 6a5f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.674Z grpc.peer_address=172.18.0.6:43708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=101.8µs +"2019-09-24 00:27:19.675 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a60 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.676 UTC [policies] Evaluate -> DEBU 6a61 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.677 UTC [policies] Evaluate -> DEBU 6a62 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.678 UTC [msp] GetDefaultSigningIdentity -> DEBU 6a63 Obtaining default signing identity" +"2019-09-24 00:27:19.678 UTC [msp.identity] Sign -> DEBU 6a64 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:27:19.679 UTC [msp.identity] Sign -> DEBU 6a65 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:27:19.679 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a66 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43708" +"2019-09-24 00:27:19.679 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a67 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:43708" +"2019-09-24 00:27:19.680 UTC [msp] DeserializeIdentity -> DEBU 6a68 Obtaining identity" +"2019-09-24 00:27:19.680 UTC [policies] Evaluate -> DEBU 6a69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:19.680 UTC [cauthdsl] func1 -> DEBU 6a6b 0xc0045a43d0 gate 1569284839680950000 evaluation starts" +"2019-09-24 00:27:19.681 UTC [cauthdsl] func2 -> DEBU 6a6c 0xc0045a43d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.682 UTC [cauthdsl] func2 -> DEBU 6a6d 0xc0045a43d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.682 UTC [cauthdsl] func2 -> DEBU 6a6e 0xc0045a43d0 principal matched by identity 0" +"2019-09-24 00:27:19.680 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6a6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.682 UTC [msp] DeserializeIdentity -> DEBU 6a6f Obtaining identity" +"2019-09-24 00:27:19.683 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6a70 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.683 UTC [msp] DeserializeIdentity -> DEBU 6a71 Obtaining identity" +"2019-09-24 00:27:19.683 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6a72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.683 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a73 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6a74 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.684 UTC [policies] Evaluate -> DEBU 6a75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.684 UTC [policies] Evaluate -> DEBU 6a76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.684 UTC [policies] Evaluate -> DEBU 6a77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:19.684 UTC [cauthdsl] func1 -> DEBU 6a78 0xc0045c4cd0 gate 1569284839684584800 evaluation starts" +"2019-09-24 00:27:19.684 UTC [cauthdsl] func2 -> DEBU 6a79 0xc0045c4cd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.684 UTC [cauthdsl] func2 -> DEBU 6a7a 0xc0045c4cd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.685 UTC [cauthdsl] func2 -> DEBU 6a7b 0xc0045c4cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 00:27:19.685 UTC [cauthdsl] func2 -> DEBU 6a7c 0xc0045c4cd0 principal evaluation fails" +"2019-09-24 00:27:19.685 UTC [cauthdsl] func1 -> DEBU 6a7d 0xc0045c4cd0 gate 1569284839684584800 evaluation fails" +"2019-09-24 00:27:19.685 UTC [policies] Evaluate -> DEBU 6a7e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.685 UTC [policies] Evaluate -> DEBU 6a7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.685 UTC [policies] Evaluate -> DEBU 6a80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.686 UTC [cauthdsl] func1 -> DEBU 6a81 0xc0045c5510 gate 1569284839686067600 evaluation starts" +"2019-09-24 00:27:19.686 UTC [cauthdsl] func2 -> DEBU 6a82 0xc0045c5510 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.686 UTC [cauthdsl] func2 -> DEBU 6a83 0xc0045c5510 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.686 UTC [cauthdsl] func2 -> DEBU 6a84 0xc0045c5510 principal matched by identity 0" +"2019-09-24 00:27:19.686 UTC [msp.identity] Verify -> DEBU 6a85 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:40:45.416 UTC [msp.identity] Verify -> DEBU 3c30 Verify: sig = 00000000 30 44 02 20 70 77 0e 41 05 b8 58 44 c5 ef d4 1d |0D. pw.A..XD....| -00000010 4b f0 23 2e 27 24 6e 26 fd 6a 3f e0 b6 46 1c c4 |K.#.'$n&.j?..F..| -00000020 28 04 83 d7 02 20 17 2f 47 a5 c0 02 2e 97 66 9c |(.... ./G.....f.| -00000030 8c 3f d5 3f 6a 11 42 3b 76 cb 41 89 39 f1 3d 56 |.?.?j.B;v.A.9.=V| -00000040 64 af ca 3d fb 2f |d..=./|" -"2019-07-20 02:40:45.417 UTC [cauthdsl] func2 -> DEBU 3c31 0xc0032cbee0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.417 UTC [cauthdsl] func1 -> DEBU 3c32 0xc0032cbee0 gate 1563590445416337000 evaluation succeeds" -"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c33 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c35 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c36 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.417 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c37 Authenticated 172.18.0.8:60470" -"2019-07-20 02:40:45.417 UTC [gossip.comm] GossipStream -> DEBU 3c38 Servicing 172.18.0.8:60470" -"2019-07-20 02:40:45.411 UTC [policies] Evaluate -> DEBU 3c0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c39 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c3b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c3c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.418 UTC [policies] Evaluate -> DEBU 3c3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.418 UTC [cauthdsl] func1 -> DEBU 3c40 0xc000551290 gate 1563590445418202500 evaluation starts" -"2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c41 0xc000551290 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c42 0xc000551290 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c43 0xc000551290 principal matched by identity 0" -"2019-07-20 02:40:45.418 UTC [msp.identity] Verify -> DEBU 3c44 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:45.418 UTC [msp.identity] Verify -> DEBU 3c45 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c46 0xc000551290 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.419 UTC [cauthdsl] func1 -> DEBU 3c47 0xc000551290 gate 1563590445418202500 evaluation succeeds" -"2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c48 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c4a Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.419 UTC [gossip.gossip] JoinChan -> INFO 3c4c Joining gossip network of channel businesschannel with 3 organizations" -"2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4d No configured anchor peers of Org3MSP for channel businesschannel to learn about" -"2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" -"2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4f Anchor peer with same endpoint, skipping connecting to myself" -"2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c50 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" -"2019-07-20 02:40:45.420 UTC [gossip.discovery] Connect -> DEBU 3c51 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " -"2019-07-20 02:40:45.420 UTC [gossip.discovery] Connect -> DEBU 3c52 Exiting" -"2019-07-20 02:40:45.420 UTC [gossip.service] updateEndpoints -> DEBU 3c53 Updating endpoints for chainID%!(EXTRA string=businesschannel)" -"2019-07-20 02:40:45.421 UTC [msp] DeserializeIdentity -> DEBU 3c54 Obtaining identity" -"2019-07-20 02:40:45.421 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c55 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.421 UTC [msp] DeserializeIdentity -> DEBU 3c56 Obtaining identity" -"2019-07-20 02:40:45.421 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c57 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.421 UTC [peer] updateTrustedRoots -> DEBU 3c58 Updating trusted root authorities for channel businesschannel" -"2019-07-20 02:40:45.413 UTC [policies] Evaluate -> DEBU 3c13 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.422 UTC [policies] Evaluate -> DEBU 3c59 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.422 UTC [policies] Evaluate -> DEBU 3c5a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.422 UTC [cauthdsl] func1 -> DEBU 3c5b 0xc003a9dac0 gate 1563590445422859400 evaluation starts" -"2019-07-20 02:40:45.422 UTC [cauthdsl] func2 -> DEBU 3c5c 0xc003a9dac0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.422 UTC [cauthdsl] func2 -> DEBU 3c5d 0xc003a9dac0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c5e 0xc003a9dac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c5f 0xc003a9dac0 principal evaluation fails" -"2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c60 0xc003a9dac0 gate 1563590445422859400 evaluation fails" -"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c61 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c64 0xc0032d0300 gate 1563590445423362000 evaluation starts" -"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c65 0xc0032d0300 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c66 0xc0032d0300 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c67 0xc0032d0300 principal matched by identity 0" -"2019-07-20 02:40:45.423 UTC [msp.identity] Verify -> DEBU 3c68 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| -00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-07-20 02:40:45.423 UTC [msp.identity] Verify -> DEBU 3c69 Verify: sig = 00000000 30 44 02 20 5a 4b 1c 6b e9 16 61 35 b6 6b cd 1d |0D. ZK.k..a5.k..| -00000010 f8 85 de a9 54 4b da a8 5f a0 5a 65 5c a9 53 be |....TK.._.Ze\.S.| -00000020 87 46 2f 03 02 20 76 56 31 1e 7d 54 8b 82 2d da |.F/.. vV1.}T..-.| -00000030 06 aa ad f2 74 96 12 2b 00 a1 68 56 61 66 27 b1 |....t..+..hVaf'.| -00000040 51 92 4a 15 68 d0 |Q.J.h.|" -"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c6a 0xc0032d0300 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c6b 0xc0032d0300 gate 1563590445423362000 evaluation succeeds" -"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.423 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c70 Authenticated 172.18.0.7:59100" -"2019-07-20 02:40:45.424 UTC [gossip.comm] GossipStream -> DEBU 3c71 Servicing 172.18.0.7:59100" -"2019-07-20 02:40:45.424 UTC [gossip.comm] writeToStream -> DEBU 3c72 Closing writing to stream" -"2019-07-20 02:40:45.424 UTC [gossip.comm] serviceConnection -> DEBU 3c73 Closing reading from stream" -"2019-07-20 02:40:45.424 UTC [gossip.comm] readFromStream -> DEBU 3c74 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" -"2019-07-20 02:40:45.424 UTC [gossip.comm] readFromStream -> DEBU 3c75 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:45.424 UTC [gossip.comm] func2 -> DEBU 3c76 Client 172.18.0.7:59100 disconnected" -"2019-07-20 02:40:45.424 UTC [comm.grpc.server] 1 -> INFO 3c77 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.366Z grpc.peer_address=172.18.0.7:59100 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=58.3508ms -"2019-07-20 02:40:45.425 UTC [gossip.comm] writeToStream -> DEBU 3c78 Closing writing to stream" -"2019-07-20 02:40:45.425 UTC [grpc] infof -> DEBU 3c79 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:45.425 UTC [gossip.comm] serviceConnection -> DEBU 3c7a Closing reading from stream" -"2019-07-20 02:40:45.425 UTC [gossip.comm] writeToStream -> DEBU 3c7b Closing writing to stream" -"2019-07-20 02:40:45.425 UTC [grpc] infof -> DEBU 3c7c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:45.427 UTC [gossip.comm] readFromStream -> DEBU 3c7d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" -"2019-07-20 02:40:45.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3baa Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:45.427 UTC [msp] DeserializeIdentity -> DEBU 3c7e Obtaining identity" -"2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c7f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c80 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c81 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.427 UTC [cauthdsl] func1 -> DEBU 3c85 0xc0034ee7d0 gate 1563590445427855200 evaluation starts" -"2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c86 0xc0034ee7d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c87 0xc0034ee7d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c88 0xc0034ee7d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c89 0xc0034ee7d0 principal evaluation fails" -"2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c8a 0xc0034ee7d0 gate 1563590445427855200 evaluation fails" -"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c8e 0xc0034ef010 gate 1563590445428220700 evaluation starts" -"2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c8f 0xc0034ef010 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c90 0xc0034ef010 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c91 0xc0034ef010 principal matched by identity 0" -"2019-07-20 02:40:45.428 UTC [msp.identity] Verify -> DEBU 3c92 Verify: digest = 00000000 8f ba 57 98 80 8e 2d cd 89 5d 87 b8 08 40 04 45 |..W...-..]...@.E| -00000010 78 ea c3 c0 14 9d af c2 08 bb cc 89 77 3f 3e 87 |x...........w?>.|" -"2019-07-20 02:40:45.428 UTC [msp.identity] Verify -> DEBU 3c93 Verify: sig = 00000000 30 45 02 21 00 b5 76 2d 76 60 fc fc 11 01 07 f8 |0E.!..v-v`......| -00000010 62 01 ec d0 14 36 32 55 bd 89 34 ea 51 78 34 96 |b....62U..4.Qx4.| -00000020 95 73 af b0 af 02 20 62 91 f1 ac ad d6 15 2d eb |.s.... b......-.| -00000030 5e d8 69 b6 4a 07 4f f2 0e 52 a8 48 de 81 5b 79 |^.i.J.O..R.H..[y| -00000040 8a df fb b1 35 84 93 |....5..|" -"2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c94 0xc0034ef010 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c95 0xc0034ef010 gate 1563590445428220700 evaluation succeeds" -"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c98 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.428 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c9a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9c updating membership: timestamp: " -"2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9d Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:45.429 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:45.429 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9f Exiting" -"2019-07-20 02:40:45.429 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ca0 Exiting" -"2019-07-20 02:40:45.429 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca1 Exiting" -"2019-07-20 02:40:45.429 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca2 Got message: GossipMessage: nonce:5951314385057450676 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.429 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ca3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca4 Verify: digest = 00000000 76 c3 3d 3b 53 91 f2 46 7d 87 85 b3 04 32 54 3a |v.=;S..F}....2T:| -00000010 55 f4 c9 e1 39 02 10 ec 22 19 f9 fa 73 85 d3 3b |U...9..."...s..;|" -"2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca5 Verify: sig = 00000000 30 45 02 21 00 c2 6e 44 87 e3 45 1a 99 99 6f 73 |0E.!..nD..E...os| -00000010 58 ca 2f 2d 9b 3d 74 9e 37 b8 5a 8b 4c fd b4 9c |X./-.=t.7.Z.L...| -00000020 ea d9 1a 17 e2 02 20 4f 44 4d a2 54 18 1b df 01 |...... ODM.T....| -00000030 34 52 da 63 e7 ff af 66 75 f0 af c2 c1 fc 05 3b |4R.c...fu......;| -00000040 bf d9 c4 e8 12 c3 65 |......e|" -"2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca7 Verify: sig = 00000000 30 45 02 21 00 d3 7f 31 bd 6b fd 66 e1 af e4 66 |0E.!...1.k.f...f| -00000010 e3 a5 67 bc dc c8 e0 e8 a1 ae 66 4e c4 e2 59 08 |..g.......fN..Y.| -00000020 4f 5d b5 b4 ec 02 20 11 e0 84 4f 9f 54 96 a0 2d |O].... ...O.T..-| -00000030 cc 52 79 6d bf 62 c4 04 cd 88 93 a2 ed 36 ca f9 |.Rym.b.......6..| -00000040 bd b0 f4 e1 9d 56 e1 |.....V.|" -"2019-07-20 02:40:45.429 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ca8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ca9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3caa updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cab Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cac Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cad Exiting" -"2019-07-20 02:40:45.430 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cae Exiting" -"2019-07-20 02:40:45.430 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3caf Exiting" -"2019-07-20 02:40:45.430 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:45.430 UTC [msp] DeserializeIdentity -> DEBU 3cb1 Obtaining identity" -"2019-07-20 02:40:45.430 UTC [msp] DeserializeIdentity -> DEBU 3cb2 Obtaining identity" -"2019-07-20 02:40:45.432 UTC [gossip.comm] Send -> DEBU 3cb3 Entering, sending GossipMessage: Channel: , nonce: 5951314385057450676, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:45.432 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > alive:9\232\322V\2358\311\017}\365J" > " -"2019-07-20 02:40:45.433 UTC [gossip.comm] sendToEndpoint -> DEBU 3cb5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5951314385057450676, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.433 UTC [gossip.comm] sendToEndpoint -> DEBU 3cb6 Exiting" -"2019-07-20 02:40:45.434 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:45.434 UTC [msp] DeserializeIdentity -> DEBU 3cb8 Obtaining identity" -"2019-07-20 02:40:45.435 UTC [msp] DeserializeIdentity -> DEBU 3cb9 Obtaining identity" -"2019-07-20 02:40:45.435 UTC [msp] DeserializeIdentity -> DEBU 3cba Obtaining identity" -"2019-07-20 02:40:45.435 UTC [gossip.comm] Send -> DEBU 3cbb Entering, sending GossipMessage: Channel: , nonce: 4698240984573701261, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:45.436 UTC [gossip.discovery] sendMemResponse -> DEBU 3cbc Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" > alive: alive:9\232\322V\2358\311\017}\365J" > " -"2019-07-20 02:40:45.436 UTC [gossip.comm] sendToEndpoint -> DEBU 3cbd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 4698240984573701261, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.436 UTC [gossip.comm] createConnection -> DEBU 3cbe Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:45.441 UTC [grpc] DialContext -> DEBU 3cbf parsed scheme: """ -"2019-07-20 02:40:45.441 UTC [grpc] DialContext -> DEBU 3cc0 scheme "" not registered, fallback to default scheme" -"2019-07-20 02:40:45.442 UTC [grpc] watcher -> DEBU 3cc1 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" -"2019-07-20 02:40:45.442 UTC [grpc] switchBalancer -> DEBU 3cc2 ClientConn switching balancer to "pick_first"" -"2019-07-20 02:40:45.442 UTC [grpc] HandleSubConnStateChange -> DEBU 3cc3 pickfirstBalancer: HandleSubConnStateChange: 0xc003fc60a0, CONNECTING" -"2019-07-20 02:40:45.443 UTC [gossip.gossip] handleMessage -> DEBU 3cc4 Exiting" -"2019-07-20 02:40:45.445 UTC [gossip.comm] readFromStream -> DEBU 3cc5 Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:45.445 UTC [gossip.comm] func2 -> DEBU 3cc6 Client 172.18.0.8:60470 disconnected" -"2019-07-20 02:40:45.445 UTC [comm.grpc.server] 1 -> INFO 3cc7 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.411Z grpc.peer_address=172.18.0.8:60470 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5484ms -"2019-07-20 02:40:45.446 UTC [grpc] infof -> DEBU 3cc8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:45.446 UTC [gossip.comm] writeToStream -> DEBU 3cc9 Closing writing to stream" -"2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3cca updating root CAs for channel [businesschannel]" -"2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccb adding app root CAs for MSP [Org3MSP]" -"2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccc adding app root CAs for MSP [Org1MSP]" -"2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccd adding app root CAs for MSP [Org2MSP]" -"2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3cce adding orderer root CAs for MSP [OrdererMSP]" -"2019-07-20 02:40:45.456 UTC [committer.txvalidator] validateTx -> DEBU 3ccf config transaction received for chain businesschannel" -"2019-07-20 02:40:45.456 UTC [committer.txvalidator] validateTx -> DEBU 3cd1 [businesschannel] validateTx completes for block 0xc000695640 env 0xc003781400 txn 0" -"2019-07-20 02:40:45.457 UTC [committer.txvalidator] Validate -> DEBU 3cd2 got result for idx 0, code 0" -"2019-07-20 02:40:45.457 UTC [committer.txvalidator] Validate -> INFO 3cd3 [businesschannel] Validated block [6] in 260ms" -"2019-07-20 02:40:45.457 UTC [gossip.privdata] listMissingPrivateData -> DEBU 3cd4 Retrieving private write sets for 0 transactions from transient store" -"2019-07-20 02:40:45.457 UTC [gossip.privdata] StoreBlock -> DEBU 3cd5 [businesschannel] No missing collection private write sets to fetch from remote peers" -"2019-07-20 02:40:45.457 UTC [committer] preCommit -> DEBU 3cd6 Received configuration update, calling CSCC ConfigUpdate" -"2019-07-20 02:40:45.457 UTC [kvledger] CommitWithPvtData -> DEBU 3cd7 [businesschannel] Validating state for block [6]" -"2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cd8 Waiting for purge mgr to finish the background job of computing expirying keys for the block" -"2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cd9 lock acquired on oldBlockCommit for validating read set version against the committed version" -"2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cda Validating new block with num trans = [1]" -"2019-07-20 02:40:45.458 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cdb ValidateAndPrepareBatch() for block number = [6]" -"2019-07-20 02:40:45.458 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cdc preprocessing ProtoBlock..." -"2019-07-20 02:40:45.459 UTC [valimpl] preprocessProtoBlock -> DEBU 3cdd txType=CONFIG" -"2019-07-20 02:40:45.459 UTC [valimpl] processNonEndorserTx -> DEBU 3cde Performing custom processing for transaction [txid=], [txType=CONFIG]" -"2019-07-20 02:40:45.459 UTC [valimpl] processNonEndorserTx -> DEBU 3cdf Processor for custom tx processing:&peer.configtxProcessor{}" -"2019-07-20 02:40:45.459 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3ce0 constructing new tx simulator" -"2019-07-20 02:40:45.459 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3ce1 constructing new tx simulator txid = []" -"2019-07-20 02:40:45.459 UTC [peer] GenerateSimulationResults -> DEBU 3ce2 Processing CONFIG" -"2019-07-20 02:40:45.460 UTC [grpc] DialContext -> DEBU 3ce3 parsed scheme: """ -"2019-07-20 02:40:45.460 UTC [grpc] DialContext -> DEBU 3ce4 scheme "" not registered, fallback to default scheme" -"2019-07-20 02:40:45.460 UTC [peer] processChannelConfigTx -> DEBU 3ce5 channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " -"2019-07-20 02:40:45.460 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3ce7 Simulation completed, getting simulation results" -"2019-07-20 02:40:45.460 UTC [lockbasedtxmgr] Done -> DEBU 3ce8 Done with transaction simulation / query execution []" -"2019-07-20 02:40:45.461 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 3ce9 Block [6] Transaction index [0] TxId [] marked as valid by state validator" -"2019-07-20 02:40:45.461 UTC [valinternal] ApplyWriteSet -> DEBU 3cea txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003517ac0)}" -"2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3ceb validating rwset..." -"2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cec postprocessing ProtoBlock..." -"2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3ced ValidateAndPrepareBatch() complete" -"2019-07-20 02:40:45.461 UTC [kvledger] CommitWithPvtData -> DEBU 3cee [businesschannel] Adding CommitHash to the block [6]" -"2019-07-20 02:40:45.462 UTC [kvledger] CommitWithPvtData -> DEBU 3cef [businesschannel] Committing block [6] to storage" -"2019-07-20 02:40:45.462 UTC [ledgerstorage] CommitWithPvtData -> DEBU 3cf0 Writing block [6] to pvt block store" -"2019-07-20 02:40:45.463 UTC [pvtdatastorage] Prepare -> DEBU 3cf1 Saved 0 private data write sets for block [6]" -"2019-07-20 02:40:45.464 UTC [comm.grpc.server] 1 -> INFO 3cf2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.463Z grpc.peer_address=172.18.0.8:60474 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=321.1µs -"2019-07-20 02:40:45.456 UTC [grpc] HandleSubConnStateChange -> DEBU 3cd0 pickfirstBalancer: HandleSubConnStateChange: 0xc003fc60a0, READY" -"2019-07-20 02:40:45.466 UTC [fsblkstorage] indexBlock -> DEBU 3cf3 Indexing block [blockNum=6, blockHash=[]byte{0xf5, 0xb0, 0x11, 0x46, 0x4, 0x5a, 0x37, 0x6e, 0xe5, 0x9b, 0x7a, 0xb0, 0xf2, 0xf9, 0xaf, 0x42, 0x15, 0x9e, 0x7f, 0x29, 0x6f, 0xe6, 0x3, 0xf4, 0x56, 0x9b, 0xb6, 0x31, 0xa7, 0x9, 0xf1, 0x78} txOffsets= -txId=e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38 locPointer=offset=71, bytesLength=33874 +"2019-09-24 00:27:19.686 UTC [msp.identity] Verify -> DEBU 6a86 Verify: sig = 00000000 30 45 02 21 00 da 15 ea d7 7a ff 72 02 b2 d6 13 |0E.!.....z.r....| +00000010 de 7c 82 18 27 04 de 68 17 c1 45 1a 7c da 3e 5c |.|..'..h..E.|.>\| +00000020 ec b7 84 e4 06 02 20 46 6a 4b c9 51 a3 c4 37 fe |...... FjK.Q..7.| +00000030 2b 46 6c 7d b1 64 e5 9c 4e 17 53 b8 85 a7 56 79 |+Fl}.d..N.S...Vy| +00000040 0e 8b ad 3a 13 b7 78 |...:..x|" +"2019-09-24 00:27:19.687 UTC [cauthdsl] func2 -> DEBU 6a87 0xc0045c5510 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.687 UTC [cauthdsl] func1 -> DEBU 6a88 0xc0045c5510 gate 1569284839686067600 evaluation succeeds" +"2019-09-24 00:27:19.687 UTC [policies] Evaluate -> DEBU 6a89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.687 UTC [policies] Evaluate -> DEBU 6a8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.687 UTC [policies] Evaluate -> DEBU 6a8b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.688 UTC [policies] Evaluate -> DEBU 6a8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.688 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6a8e Authenticated 172.18.0.6:43708" +"2019-09-24 00:27:19.689 UTC [gossip.comm] GossipStream -> DEBU 6a8f Servicing 172.18.0.6:43708" +"2019-09-24 00:27:19.689 UTC [gossip.comm] serviceConnection -> DEBU 6a90 Closing reading from stream" +"2019-09-24 00:27:19.682 UTC [msp.identity] Verify -> DEBU 6a8c Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:19.689 UTC [gossip.comm] func2 -> DEBU 6a91 Client 172.18.0.6:43284 disconnected" +"2019-09-24 00:27:19.690 UTC [comm.grpc.server] 1 -> INFO 6a94 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:43284 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2m12.0474976s +"2019-09-24 00:27:19.689 UTC [gossip.comm] writeToStream -> DEBU 6a93 Closing writing to stream" +"2019-09-24 00:27:19.689 UTC [msp.identity] Verify -> DEBU 6a92 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:19.691 UTC [cauthdsl] func2 -> DEBU 6a95 0xc0045a43d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.692 UTC [cauthdsl] func1 -> DEBU 6a98 0xc0045a43d0 gate 1569284839680950000 evaluation succeeds" +"2019-09-24 00:27:19.692 UTC [policies] Evaluate -> DEBU 6a99 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.692 UTC [policies] Evaluate -> DEBU 6a9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:19.692 UTC [policies] Evaluate -> DEBU 6a9b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.693 UTC [policies] Evaluate -> DEBU 6a9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.693 UTC [gossip.gossip] JoinChan -> INFO 6a9d Joining gossip network of channel businesschannel with 3 organizations" +"2019-09-24 00:27:19.693 UTC [gossip.gossip] learnAnchorPeers -> INFO 6a9e No configured anchor peers of Org3MSP for channel businesschannel to learn about" +"2019-09-24 00:27:19.693 UTC [gossip.gossip] learnAnchorPeers -> INFO 6a9f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-09-24 00:27:19.694 UTC [gossip.gossip] learnAnchorPeers -> INFO 6aa0 Anchor peer with same endpoint, skipping connecting to myself" +"2019-09-24 00:27:19.694 UTC [gossip.gossip] learnAnchorPeers -> INFO 6aa1 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-09-24 00:27:19.694 UTC [gossip.discovery] Connect -> DEBU 6aa2 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +"2019-09-24 00:27:19.694 UTC [gossip.discovery] Connect -> DEBU 6aa3 Exiting" +"2019-09-24 00:27:19.695 UTC [gossip.service] updateEndpoints -> DEBU 6aa4 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-09-24 00:27:19.695 UTC [msp] DeserializeIdentity -> DEBU 6aa5 Obtaining identity" +"2019-09-24 00:27:19.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6aa6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.696 UTC [msp] DeserializeIdentity -> DEBU 6aa7 Obtaining identity" +"2019-09-24 00:27:19.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6aa8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.697 UTC [peer] updateTrustedRoots -> DEBU 6aa9 Updating trusted root authorities for channel businesschannel" +"2019-09-24 00:27:19.697 UTC [gossip.pull] Hello -> DEBU 6aaa Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:19.698 UTC [gossip.comm] Send -> DEBU 6aab Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:19.698 UTC [gossip.pull] Hello -> DEBU 6aac Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:27:19.698 UTC [gossip.comm] Send -> DEBU 6aad Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:19.699 UTC [gossip.pull] Hello -> DEBU 6aae Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:27:19.699 UTC [gossip.comm] Send -> DEBU 6aaf Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:19.699 UTC [gossip.comm] sendToEndpoint -> DEBU 6ab0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.700 UTC [gossip.comm] createConnection -> DEBU 6ab1 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:27:19.712 UTC [grpc] DialContext -> DEBU 6ab2 parsed scheme: """ +"2019-09-24 00:27:19.715 UTC [grpc] DialContext -> DEBU 6ab3 scheme "" not registered, fallback to default scheme" +"2019-09-24 00:27:19.716 UTC [grpc] watcher -> DEBU 6ab4 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-09-24 00:27:19.718 UTC [grpc] switchBalancer -> DEBU 6ab5 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:27:19.718 UTC [grpc] HandleSubConnStateChange -> DEBU 6ab6 pickfirstBalancer: HandleSubConnStateChange: 0xc004614a80, CONNECTING" +"2019-09-24 00:27:19.722 UTC [peer] buildTrustedRootsForChain -> DEBU 6ab7 updating root CAs for channel [businesschannel]" +"2019-09-24 00:27:19.722 UTC [peer] buildTrustedRootsForChain -> DEBU 6ab8 adding app root CAs for MSP [Org3MSP]" +"2019-09-24 00:27:19.723 UTC [peer] buildTrustedRootsForChain -> DEBU 6ab9 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 00:27:19.723 UTC [peer] buildTrustedRootsForChain -> DEBU 6aba adding app root CAs for MSP [Org2MSP]" +"2019-09-24 00:27:19.724 UTC [peer] buildTrustedRootsForChain -> DEBU 6abb adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 00:27:19.726 UTC [committer.txvalidator] validateTx -> DEBU 6abc config transaction received for chain businesschannel" +"2019-09-24 00:27:19.726 UTC [committer.txvalidator] validateTx -> DEBU 6abd [businesschannel] validateTx completes for block 0xc0025fdac0 env 0xc004c89680 txn 0" +"2019-09-24 00:27:19.727 UTC [committer.txvalidator] Validate -> DEBU 6abe got result for idx 0, code 0" +"2019-09-24 00:27:19.727 UTC [committer.txvalidator] Validate -> INFO 6abf [businesschannel] Validated block [6] in 259ms" +"2019-09-24 00:27:19.727 UTC [gossip.privdata] listMissingPrivateData -> DEBU 6ac0 Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 00:27:19.731 UTC [gossip.privdata] StoreBlock -> DEBU 6ac1 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 00:27:19.731 UTC [committer] preCommit -> DEBU 6ac2 Received configuration update, calling CSCC ConfigUpdate" +"2019-09-24 00:27:19.732 UTC [kvledger] CommitWithPvtData -> DEBU 6ac3 [businesschannel] Validating state for block [6]" +"2019-09-24 00:27:19.737 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 6ac7 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 00:27:19.737 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 6ac8 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 00:27:19.737 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 6ac9 Validating new block with num trans = [1]" +"2019-09-24 00:27:19.737 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 6aca ValidateAndPrepareBatch() for block number = [6]" +"2019-09-24 00:27:19.737 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 6acb preprocessing ProtoBlock..." +"2019-09-24 00:27:19.738 UTC [valimpl] preprocessProtoBlock -> DEBU 6acc txType=CONFIG" +"2019-09-24 00:27:19.738 UTC [valimpl] processNonEndorserTx -> DEBU 6acd Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-09-24 00:27:19.738 UTC [valimpl] processNonEndorserTx -> DEBU 6ace Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-09-24 00:27:19.738 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 6acf constructing new tx simulator" +"2019-09-24 00:27:19.738 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 6ad0 constructing new tx simulator txid = []" +"2019-09-24 00:27:19.738 UTC [peer] GenerateSimulationResults -> DEBU 6ad1 Processing CONFIG" +"2019-09-24 00:27:19.739 UTC [grpc] infof -> DEBU 6ad2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.740 UTC [peer] processChannelConfigTx -> DEBU 6ad3 channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-09-24 00:27:19.740 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 6ad4 Simulation completed, getting simulation results" +"2019-09-24 00:27:19.736 UTC [gossip.comm] sendToEndpoint -> DEBU 6ac4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.741 UTC [gossip.comm] sendToEndpoint -> DEBU 6ad5 Exiting" +"2019-09-24 00:27:19.691 UTC [gossip.comm] serviceConnection -> DEBU 6a96 Closing reading from stream" +"2019-09-24 00:27:19.741 UTC [gossip.comm] func2 -> DEBU 6ad6 Client 172.18.0.6:43708 disconnected" +"2019-09-24 00:27:19.741 UTC [comm.grpc.server] 1 -> INFO 6ad7 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:27:29.676Z grpc.peer_address=172.18.0.6:43708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=63.2377ms +"2019-09-24 00:27:19.743 UTC [grpc] DialContext -> DEBU 6ad8 parsed scheme: """ +"2019-09-24 00:27:19.743 UTC [grpc] DialContext -> DEBU 6adb scheme "" not registered, fallback to default scheme" +"2019-09-24 00:27:19.743 UTC [lockbasedtxmgr] Done -> DEBU 6ad9 Done with transaction simulation / query execution []" +"2019-09-24 00:27:19.744 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 6adc Block [6] Transaction index [0] TxId [] marked as valid by state validator" +"2019-09-24 00:27:19.744 UTC [valinternal] ApplyWriteSet -> DEBU 6add txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0043cdd00)}" +"2019-09-24 00:27:19.744 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 6ade validating rwset..." +"2019-09-24 00:27:19.744 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 6adf postprocessing ProtoBlock..." +"2019-09-24 00:27:19.745 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 6ae0 ValidateAndPrepareBatch() complete" +"2019-09-24 00:27:19.745 UTC [kvledger] CommitWithPvtData -> DEBU 6ae1 [businesschannel] Adding CommitHash to the block [6]" +"2019-09-24 00:27:19.745 UTC [kvledger] CommitWithPvtData -> DEBU 6ae2 [businesschannel] Committing block [6] to storage" +"2019-09-24 00:27:19.745 UTC [ledgerstorage] CommitWithPvtData -> DEBU 6ae3 Writing block [6] to pvt block store" +"2019-09-24 00:27:19.745 UTC [grpc] watcher -> DEBU 6ae4 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-09-24 00:27:19.746 UTC [grpc] switchBalancer -> DEBU 6ae5 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:27:19.746 UTC [grpc] HandleSubConnStateChange -> DEBU 6ae6 pickfirstBalancer: HandleSubConnStateChange: 0xc004f9f340, CONNECTING" +"2019-09-24 00:27:19.747 UTC [pvtdatastorage] Prepare -> DEBU 6ae7 Saved 0 private data write sets for block [6]" +"2019-09-24 00:27:19.755 UTC [fsblkstorage] indexBlock -> DEBU 6ae8 Indexing block [blockNum=6, blockHash=[]byte{0xdc, 0x84, 0x65, 0x18, 0xe3, 0xc4, 0x6b, 0x5f, 0x9e, 0xf2, 0x8f, 0xdd, 0x75, 0x8a, 0x58, 0xc2, 0xd7, 0x72, 0xdd, 0x0, 0xe9, 0x74, 0x6e, 0x75, 0x79, 0xca, 0xe6, 0xc4, 0x97, 0x98, 0x63, 0x3e} txOffsets= +txId=82a4197750a6c2e6027683be3495c6368937bcbe60f9626d8b78cceca622c16c locPointer=offset=71, bytesLength=33877 ]" -"2019-07-20 02:40:45.467 UTC [fsblkstorage] indexBlock -> DEBU 3cf4 Adding txLoc [fileSuffixNum=0, offset=84150, bytesLength=33874] for tx ID: [e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38] to txid-index" -"2019-07-20 02:40:45.467 UTC [fsblkstorage] indexBlock -> DEBU 3cf5 Adding txLoc [fileSuffixNum=0, offset=84150, bytesLength=33874] for tx number:[0] ID: [e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38] to blockNumTranNum index" -"2019-07-20 02:40:45.468 UTC [msp] GetDefaultSigningIdentity -> DEBU 3cf6 Obtaining default signing identity" -"2019-07-20 02:40:45.469 UTC [fsblkstorage] updateCheckpoint -> DEBU 3cf7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[118997], isChainEmpty=[false], lastBlockNumber=[6]" -"2019-07-20 02:40:45.469 UTC [msp.identity] Sign -> DEBU 3cf8 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:40:45.469 UTC [msp.identity] Sign -> DEBU 3cfa Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:40:45.470 UTC [msp] GetDefaultSigningIdentity -> DEBU 3cfb Obtaining default signing identity" -"2019-07-20 02:40:45.470 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3cfc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:7051" -"2019-07-20 02:40:45.460 UTC [grpc] watcher -> DEBU 3ce6 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -"2019-07-20 02:40:45.470 UTC [grpc] switchBalancer -> DEBU 3cfe ClientConn switching balancer to "pick_first"" -"2019-07-20 02:40:45.471 UTC [grpc] HandleSubConnStateChange -> DEBU 3cff pickfirstBalancer: HandleSubConnStateChange: 0xc002f03a40, CONNECTING" -"2019-07-20 02:40:45.469 UTC [pvtdatastorage] Commit -> DEBU 3cf9 Committing private data for block [6]" -"2019-07-20 02:40:45.470 UTC [msp.identity] Sign -> DEBU 3cfd Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:40:45.474 UTC [msp.identity] Sign -> DEBU 3d00 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:40:45.477 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d02 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:60474" -"2019-07-20 02:40:45.478 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d03 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60474" -"2019-07-20 02:40:45.478 UTC [msp] DeserializeIdentity -> DEBU 3d04 Obtaining identity" -"2019-07-20 02:40:45.478 UTC [msp] DeserializeIdentity -> DEBU 3d05 Obtaining identity" -"2019-07-20 02:40:45.478 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d06 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:7051" -"2019-07-20 02:40:45.481 UTC [msp] DeserializeIdentity -> DEBU 3d08 Obtaining identity" -"2019-07-20 02:40:45.481 UTC [msp] DeserializeIdentity -> DEBU 3d09 Obtaining identity" -"2019-07-20 02:40:45.483 UTC [msp.identity] newIdentity -> DEBU 3d0a Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:27:19.755 UTC [fsblkstorage] indexBlock -> DEBU 6ae9 Adding txLoc [fileSuffixNum=0, offset=84156, bytesLength=33877] for tx ID: [82a4197750a6c2e6027683be3495c6368937bcbe60f9626d8b78cceca622c16c] to txid-index" +"2019-09-24 00:27:19.756 UTC [fsblkstorage] indexBlock -> DEBU 6aea Adding txLoc [fileSuffixNum=0, offset=84156, bytesLength=33877] for tx number:[0] ID: [82a4197750a6c2e6027683be3495c6368937bcbe60f9626d8b78cceca622c16c] to blockNumTranNum index" +"2019-09-24 00:27:19.756 UTC [comm.grpc.server] 1 -> INFO 6aeb unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.747Z grpc.peer_address=172.18.0.5:49550 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=273.4µs +"2019-09-24 00:27:19.758 UTC [fsblkstorage] updateCheckpoint -> DEBU 6aec Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[119005], isChainEmpty=[false], lastBlockNumber=[6]" +"2019-09-24 00:27:19.758 UTC [pvtdatastorage] Commit -> DEBU 6aed Committing private data for block [6]" +"2019-09-24 00:27:19.765 UTC [pvtdatastorage] Commit -> DEBU 6aee Committed private data for block [6]" +"2019-09-24 00:27:19.766 UTC [kvledger] CommitWithPvtData -> DEBU 6aef [businesschannel] Committing block [6] transactions to state database" +"2019-09-24 00:27:19.766 UTC [lockbasedtxmgr] Commit -> DEBU 6af0 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 00:27:19.766 UTC [lockbasedtxmgr] Commit -> DEBU 6af1 Committing updates to state database" +"2019-09-24 00:27:19.766 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 6af2 Building the expiry schedules based on the update batch" +"2019-09-24 00:27:19.766 UTC [lockbasedtxmgr] Commit -> DEBU 6af3 Write lock acquired for committing updates to state database" +"2019-09-24 00:27:19.766 UTC [stateleveldb] ApplyUpdates -> DEBU 6af4 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-09-24 00:27:19.768 UTC [lockbasedtxmgr] Commit -> DEBU 6af5 Updates committed to state database and the write lock is released" +"2019-09-24 00:27:19.768 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 6af6 Preparing potential purge list working-set for expiringAtBlk [7]" +"2019-09-24 00:27:19.768 UTC [leveldbhelper] GetIterator -> DEBU 6af7 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" +"2019-09-24 00:27:19.768 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 6af8 No expiry entry found for expiringAtBlk [7]" +"2019-09-24 00:27:19.769 UTC [lockbasedtxmgr] func1 -> DEBU 6af9 launched the background routine for preparing keys to purge with the next block" +"2019-09-24 00:27:19.769 UTC [kvledger] CommitWithPvtData -> DEBU 6afa [businesschannel] Committing block [6] transactions to history database" +"2019-09-24 00:27:19.769 UTC [historyleveldb] Commit -> DEBU 6afb Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" +"2019-09-24 00:27:19.769 UTC [historyleveldb] Commit -> DEBU 6afc Skipping transaction [0] since it is not an endorsement transaction" +"2019-09-24 00:27:19.771 UTC [historyleveldb] Commit -> DEBU 6afd Channel [businesschannel]: Updates committed to history database for blockNo [6]" +"2019-09-24 00:27:19.771 UTC [kvledger] CommitWithPvtData -> INFO 6afe [businesschannel] Committed block [6] with 1 transaction(s) in 38ms (state_validation=12ms block_and_pvtdata_commit=20ms state_commit=3ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +"2019-09-24 00:27:19.771 UTC [msp] GetDefaultSigningIdentity -> DEBU 6aff Obtaining default signing identity" +"2019-09-24 00:27:19.771 UTC [msp.identity] Sign -> DEBU 6b00 Sign: plaintext: 18057A6C1214089096D4ACDE83CEE315...08071A0C0A0565787030321203312E30 " +"2019-09-24 00:27:19.771 UTC [msp.identity] Sign -> DEBU 6b01 Sign: digest: ACEDEC46F0B6097A2D753575B56EC934A56BAC979FDF348A84C98BAF1BE5CD8E " +"2019-09-24 00:27:19.771 UTC [gossip.state] commitBlock -> DEBU 6b02 [businesschannel] Committed block [6] with 1 transaction(s)" +"2019-09-24 00:27:19.737 UTC [gossip.comm] readFromStream -> DEBU 6ac6 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-09-24 00:27:19.736 UTC [gossip.comm] sendToEndpoint -> DEBU 6ac5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.772 UTC [gossip.comm] sendToEndpoint -> DEBU 6b03 Exiting" +"2019-09-24 00:27:19.691 UTC [gossip.comm] readFromStream -> DEBU 6a97 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-09-24 00:27:19.743 UTC [gossip.comm] writeToStream -> DEBU 6ada Closing writing to stream" +"2019-09-24 00:27:19.775 UTC [grpc] HandleSubConnStateChange -> DEBU 6b04 pickfirstBalancer: HandleSubConnStateChange: 0xc004f9f340, READY" +"2019-09-24 00:27:19.776 UTC [grpc] HandleSubConnStateChange -> DEBU 6b05 pickfirstBalancer: HandleSubConnStateChange: 0xc004614a80, READY" +"2019-09-24 00:27:19.778 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b06 Obtaining default signing identity" +"2019-09-24 00:27:19.778 UTC [msp.identity] Sign -> DEBU 6b07 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:27:19.778 UTC [msp.identity] Sign -> DEBU 6b08 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:27:19.779 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b09 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:49550" +"2019-09-24 00:27:19.779 UTC [gossip.comm] func1 -> DEBU 6b0a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.779 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b0b Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:49550" +"2019-09-24 00:27:19.779 UTC [gossip.gossip] handleMessage -> DEBU 6b0c Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.780 UTC [gossip.pull] HandleMessage -> DEBU 6b0d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.780 UTC [gossip.gossip] handleMessage -> DEBU 6b0e Exiting" +"2019-09-24 00:27:19.780 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b0f Obtaining default signing identity" +"2019-09-24 00:27:19.781 UTC [msp.identity] Sign -> DEBU 6b10 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:27:19.781 UTC [msp.identity] Sign -> DEBU 6b11 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:27:19.781 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b12 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +"2019-09-24 00:27:19.781 UTC [gossip.comm] func1 -> DEBU 6b13 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.782 UTC [gossip.gossip] handleMessage -> DEBU 6b14 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.782 UTC [gossip.pull] HandleMessage -> DEBU 6b15 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.783 UTC [msp.identity] Verify -> DEBU 6b16 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-09-24 00:27:19.783 UTC [msp.identity] Verify -> DEBU 6b17 Verify: sig = 00000000 30 44 02 20 1f c7 03 6b 7c 3b 71 fa ca bf 22 39 |0D. ...k|;q..."9| +00000010 a6 c4 37 9f a7 bc 48 bb 63 a2 5c d0 19 25 f0 2e |..7...H.c.\..%..| +00000020 ed 36 d3 f6 02 20 12 91 43 02 8f 5a 2f ac 1f 7e |.6... ..C..Z/..~| +00000030 ae 02 6d f9 c8 a1 63 e2 64 b9 dd 34 21 d2 f1 ce |..m...c.d..4!...| +00000040 c6 90 9a 6f dd ab |...o..|" +"2019-09-24 00:27:19.784 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b18 Authenticated 172.18.0.5:49550" +"2019-09-24 00:27:19.784 UTC [gossip.comm] GossipStream -> DEBU 6b19 Servicing 172.18.0.5:49550" +"2019-09-24 00:27:19.785 UTC [gossip.comm] writeToStream -> DEBU 6b1a Closing writing to stream" +"2019-09-24 00:27:19.785 UTC [gossip.comm] serviceConnection -> DEBU 6b1b Closing reading from stream" +"2019-09-24 00:27:19.787 UTC [gossip.comm] readFromStream -> DEBU 6b1c a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +"2019-09-24 00:27:19.787 UTC [grpc] infof -> DEBU 6b1d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.787 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b1e Obtaining default signing identity" +"2019-09-24 00:27:19.788 UTC [msp.identity] Sign -> DEBU 6b1f Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:27:19.788 UTC [msp.identity] Sign -> DEBU 6b20 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:27:19.788 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b21 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051" +"2019-09-24 00:27:19.788 UTC [grpc] infof -> DEBU 6b22 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.788 UTC [gossip.gossip] handleMessage -> DEBU 6b23 Exiting" +"2019-09-24 00:27:19.788 UTC [gossip.comm] readFromStream -> DEBU 6b24 Got error, aborting: EOF" +"2019-09-24 00:27:19.789 UTC [comm.grpc.server] 1 -> INFO 6b25 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T00:27:21.789Z grpc.peer_address=172.18.0.8:35024 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=86.2µs +"2019-09-24 00:27:19.789 UTC [gossip.comm] func2 -> DEBU 6b26 Client 172.18.0.5:49550 disconnected" +"2019-09-24 00:27:19.790 UTC [comm.grpc.server] 1 -> INFO 6b27 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:49550 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=11.9635ms +"2019-09-24 00:27:19.790 UTC [gossip.comm] writeToStream -> DEBU 6b28 Closing writing to stream" +"2019-09-24 00:27:19.792 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b29 Obtaining default signing identity" +"2019-09-24 00:27:19.792 UTC [msp.identity] Sign -> DEBU 6b2a Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:27:19.792 UTC [msp.identity] Sign -> DEBU 6b2b Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:27:19.793 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b2c Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:35024" +"2019-09-24 00:27:19.793 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b2d Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:35024" +"2019-09-24 00:27:19.793 UTC [msp] DeserializeIdentity -> DEBU 6b2e Obtaining identity" +"2019-09-24 00:27:19.793 UTC [msp] DeserializeIdentity -> DEBU 6b2f Obtaining identity" +"2019-09-24 00:27:19.794 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b30 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:7051" +"2019-09-24 00:27:19.794 UTC [msp] DeserializeIdentity -> DEBU 6b31 Obtaining identity" +"2019-09-24 00:27:19.795 UTC [msp.identity] newIdentity -> DEBU 6b32 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -18975,7 +33152,9 @@ BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ -----END CERTIFICATE-----" -"2019-07-20 02:40:45.479 UTC [msp.identity] newIdentity -> DEBU 3d07 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:27:19.794 UTC [msp] DeserializeIdentity -> DEBU 6b33 Obtaining identity" +"2019-09-24 00:27:19.796 UTC [msp] Validate -> DEBU 6b34 MSP Org2MSP validating identity" +"2019-09-24 00:27:19.796 UTC [msp.identity] newIdentity -> DEBU 6b35 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -18989,1214 +33168,816 @@ BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL -----END CERTIFICATE-----" -"2019-07-20 02:40:45.475 UTC [pvtdatastorage] Commit -> DEBU 3d01 Committed private data for block [6]" -"2019-07-20 02:40:45.484 UTC [grpc] HandleSubConnStateChange -> DEBU 3d0b pickfirstBalancer: HandleSubConnStateChange: 0xc002f03a40, READY" -"2019-07-20 02:40:45.486 UTC [msp] Validate -> DEBU 3d0c MSP Org2MSP validating identity" -"2019-07-20 02:40:45.487 UTC [msp] getCertificationChain -> DEBU 3d0e MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.487 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d0f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.487 UTC [msp] DeserializeIdentity -> DEBU 3d10 Obtaining identity" -"2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d11 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.488 UTC [msp] DeserializeIdentity -> DEBU 3d12 Obtaining identity" -"2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d13 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d15 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d16 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.489 UTC [policies] Evaluate -> DEBU 3d17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.490 UTC [policies] Evaluate -> DEBU 3d18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.491 UTC [policies] Evaluate -> DEBU 3d1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:45.491 UTC [cauthdsl] func1 -> DEBU 3d1b 0xc003ef7610 gate 1563590445491328500 evaluation starts" -"2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1c 0xc003ef7610 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1d 0xc003ef7610 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1e 0xc003ef7610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1f 0xc003ef7610 principal evaluation fails" -"2019-07-20 02:40:45.492 UTC [cauthdsl] func1 -> DEBU 3d20 0xc003ef7610 gate 1563590445491328500 evaluation fails" -"2019-07-20 02:40:45.492 UTC [policies] Evaluate -> DEBU 3d21 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.490 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d19 Obtaining default signing identity" -"2019-07-20 02:40:45.488 UTC [msp] Validate -> DEBU 3d14 MSP Org2MSP validating identity" -"2019-07-20 02:40:45.486 UTC [kvledger] CommitWithPvtData -> DEBU 3d0d [businesschannel] Committing block [6] transactions to state database" -"2019-07-20 02:40:45.492 UTC [policies] Evaluate -> DEBU 3d22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.493 UTC [policies] Evaluate -> DEBU 3d26 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.492 UTC [msp.identity] Sign -> DEBU 3d23 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:40:45.494 UTC [msp.identity] Sign -> DEBU 3d27 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:40:45.494 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d28 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" -"2019-07-20 02:40:45.494 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d29 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -"2019-07-20 02:40:45.494 UTC [msp] DeserializeIdentity -> DEBU 3d2a Obtaining identity" -"2019-07-20 02:40:45.494 UTC [cauthdsl] func1 -> DEBU 3d2b 0xc003ee11e0 gate 1563590445493562900 evaluation starts" -"2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d2c 0xc003ee11e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d2d 0xc003ee11e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.495 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d2e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.495 UTC [msp] DeserializeIdentity -> DEBU 3d2f Obtaining identity" -"2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d30 0xc003ee11e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.496 UTC [cauthdsl] func2 -> DEBU 3d31 0xc003ee11e0 principal evaluation fails" -"2019-07-20 02:40:45.496 UTC [cauthdsl] func1 -> DEBU 3d32 0xc003ee11e0 gate 1563590445493562900 evaluation fails" -"2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.496 UTC [msp] DeserializeIdentity -> DEBU 3d34 Obtaining identity" -"2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d35 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d38 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d39 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.497 UTC [cauthdsl] func1 -> DEBU 3d3c 0xc003ee1a40 gate 1563590445497309900 evaluation starts" -"2019-07-20 02:40:45.497 UTC [cauthdsl] func2 -> DEBU 3d3d 0xc003ee1a40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.497 UTC [cauthdsl] func2 -> DEBU 3d3e 0xc003ee1a40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.498 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d3f Checking if identity satisfies MEMBER role for Org2MSP" -"2019-07-20 02:40:45.498 UTC [msp] Validate -> DEBU 3d40 MSP Org2MSP validating identity" -"2019-07-20 02:40:45.499 UTC [msp] getCertificationChain -> DEBU 3d41 MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.500 UTC [cauthdsl] func2 -> DEBU 3d42 0xc003ee1a40 principal matched by identity 0" -"2019-07-20 02:40:45.500 UTC [msp.identity] Verify -> DEBU 3d43 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +"2019-09-24 00:27:19.797 UTC [msp] Validate -> DEBU 6b36 MSP Org2MSP validating identity" +"2019-09-24 00:27:19.797 UTC [msp] getCertificationChain -> DEBU 6b37 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b38 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.798 UTC [msp] DeserializeIdentity -> DEBU 6b39 Obtaining identity" +"2019-09-24 00:27:19.798 UTC [msp] getCertificationChain -> DEBU 6b3a MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.799 UTC [msp] DeserializeIdentity -> DEBU 6b3c Obtaining identity" +"2019-09-24 00:27:19.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b3d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.799 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b3e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.799 UTC [msp] DeserializeIdentity -> DEBU 6b3f Obtaining identity" +"2019-09-24 00:27:19.799 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b41 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.799 UTC [msp] DeserializeIdentity -> DEBU 6b42 Obtaining identity" +"2019-09-24 00:27:19.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b43 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.800 UTC [policies] Evaluate -> DEBU 6b44 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.800 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b45 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b47 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.802 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b48 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.803 UTC [gossip.comm] func1 -> DEBU 6b49 Got message: GossipMessage: nonce:3586135780412397846 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.803 UTC [gossip.gossip] handleMessage -> DEBU 6b4a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:3586135780412397846 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.803 UTC [policies] Evaluate -> DEBU 6b4b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.803 UTC [policies] Evaluate -> DEBU 6b4c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.803 UTC [policies] Evaluate -> DEBU 6b4d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.803 UTC [cauthdsl] func1 -> DEBU 6b4e 0xc0048c3cd0 gate 1569284839803761200 evaluation starts" +"2019-09-24 00:27:19.803 UTC [gossip.gossip] handleMessage -> DEBU 6b4f Exiting" +"2019-09-24 00:27:19.803 UTC [cauthdsl] func2 -> DEBU 6b50 0xc0048c3cd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.804 UTC [cauthdsl] func2 -> DEBU 6b51 0xc0048c3cd0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.804 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6b52 Got message: GossipMessage: nonce:3586135780412397846 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.804 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6b53 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:19.804 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6b54 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:27:19.804 UTC [msp] Validate -> DEBU 6b55 MSP Org2MSP validating identity" +"2019-09-24 00:27:19.804 UTC [msp] DeserializeIdentity -> DEBU 6b56 Obtaining identity" +"2019-09-24 00:27:19.805 UTC [msp] getCertificationChain -> DEBU 6b57 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.805 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b58 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.805 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b59 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.805 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b5a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.805 UTC [policies] Evaluate -> DEBU 6b5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.806 UTC [policies] Evaluate -> DEBU 6b5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.806 UTC [policies] Evaluate -> DEBU 6b5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.806 UTC [cauthdsl] func1 -> DEBU 6b5f 0xc0048e5350 gate 1569284839806179900 evaluation starts" +"2019-09-24 00:27:19.806 UTC [grpc] infof -> DEBU 6b60 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.806 UTC [cauthdsl] func2 -> DEBU 6b61 0xc0048e5350 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.806 UTC [cauthdsl] func2 -> DEBU 6b62 0xc0048e5350 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.807 UTC [grpc] infof -> DEBU 6b63 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.807 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b64 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:7051" +"2019-09-24 00:27:19.807 UTC [msp] DeserializeIdentity -> DEBU 6b65 Obtaining identity" +"2019-09-24 00:27:19.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.808 UTC [msp] DeserializeIdentity -> DEBU 6b67 Obtaining identity" +"2019-09-24 00:27:19.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.808 UTC [msp] DeserializeIdentity -> DEBU 6b69 Obtaining identity" +"2019-09-24 00:27:19.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6b6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.809 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b6b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.809 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6b6c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.809 UTC [policies] Evaluate -> DEBU 6b6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.809 UTC [policies] Evaluate -> DEBU 6b6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.809 UTC [policies] Evaluate -> DEBU 6b6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.809 UTC [cauthdsl] func1 -> DEBU 6b70 0xc00490e050 gate 1569284839809531500 evaluation starts" +"2019-09-24 00:27:19.809 UTC [cauthdsl] func2 -> DEBU 6b71 0xc00490e050 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.809 UTC [cauthdsl] func2 -> DEBU 6b72 0xc00490e050 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.809 UTC [cauthdsl] func2 -> DEBU 6b73 0xc00490e050 principal matched by identity 0" +"2019-09-24 00:27:19.809 UTC [msp.identity] Verify -> DEBU 6b74 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:40:45.500 UTC [msp.identity] Verify -> DEBU 3d44 Verify: sig = 00000000 30 45 02 21 00 cc 72 66 4d f3 aa 62 27 67 82 1d |0E.!..rfM..b'g..| -00000010 99 71 b4 0e 9c a8 af 3e a8 79 15 1c 73 cb bc 67 |.q.....>.y..s..g| -00000020 49 75 71 2b e8 02 20 29 70 7a 3d c2 2f 23 ba 52 |Iuq+.. )pz=./#.R| -00000030 bf 65 fd 50 14 83 46 01 8a f7 ef fd a3 c3 3a 36 |.e.P..F.......:6| -00000040 c9 40 0f 81 41 8b 00 |.@..A..|" -"2019-07-20 02:40:45.500 UTC [grpc] infof -> DEBU 3d45 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:45.492 UTC [lockbasedtxmgr] Commit -> DEBU 3d25 lock acquired on oldBlockCommit for committing regular updates to state database" -"2019-07-20 02:40:45.501 UTC [lockbasedtxmgr] Commit -> DEBU 3d46 Committing updates to state database" -"2019-07-20 02:40:45.501 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 3d47 Building the expiry schedules based on the update batch" -"2019-07-20 02:40:45.501 UTC [lockbasedtxmgr] Commit -> DEBU 3d48 Write lock acquired for committing updates to state database" -"2019-07-20 02:40:45.501 UTC [stateleveldb] ApplyUpdates -> DEBU 3d49 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" -"2019-07-20 02:40:45.501 UTC [cauthdsl] func2 -> DEBU 3d4a 0xc003ee1a40 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.502 UTC [cauthdsl] func1 -> DEBU 3d4b 0xc003ee1a40 gate 1563590445497309900 evaluation succeeds" -"2019-07-20 02:40:45.502 UTC [policies] Evaluate -> DEBU 3d4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.502 UTC [policies] Evaluate -> DEBU 3d4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.503 UTC [policies] Evaluate -> DEBU 3d4e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.503 UTC [lockbasedtxmgr] Commit -> DEBU 3d4f Updates committed to state database and the write lock is released" -"2019-07-20 02:40:45.503 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3d50 Preparing potential purge list working-set for expiringAtBlk [7]" -"2019-07-20 02:40:45.503 UTC [leveldbhelper] GetIterator -> DEBU 3d51 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" -"2019-07-20 02:40:45.504 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3d52 No expiry entry found for expiringAtBlk [7]" -"2019-07-20 02:40:45.504 UTC [lockbasedtxmgr] func1 -> DEBU 3d53 launched the background routine for preparing keys to purge with the next block" -"2019-07-20 02:40:45.504 UTC [kvledger] CommitWithPvtData -> DEBU 3d54 [businesschannel] Committing block [6] transactions to history database" -"2019-07-20 02:40:45.504 UTC [historyleveldb] Commit -> DEBU 3d55 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" -"2019-07-20 02:40:45.504 UTC [historyleveldb] Commit -> DEBU 3d56 Skipping transaction [0] since it is not an endorsement transaction" -"2019-07-20 02:40:45.503 UTC [policies] Evaluate -> DEBU 3d57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.506 UTC [historyleveldb] Commit -> DEBU 3d58 Channel [businesschannel]: Updates committed to history database for blockNo [6]" -"2019-07-20 02:40:45.506 UTC [kvledger] CommitWithPvtData -> INFO 3d59 [businesschannel] Committed block [6] with 1 transaction(s) in 48ms (state_validation=4ms block_and_pvtdata_commit=24ms state_commit=17ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" -"2019-07-20 02:40:45.506 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d5a Obtaining default signing identity" -"2019-07-20 02:40:45.506 UTC [msp.identity] Sign -> DEBU 3d5b Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08071A0C0A0565787030321203312E30 " -"2019-07-20 02:40:45.507 UTC [msp.identity] Sign -> DEBU 3d5c Sign: digest: 3413AB16E454D4D11A5CF1F1C30B239DD040FF9B6C404041B3848980D2DF491C " -"2019-07-20 02:40:45.497 UTC [policies] Evaluate -> DEBU 3d3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.507 UTC [policies] Evaluate -> DEBU 3d5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.507 UTC [gossip.state] commitBlock -> DEBU 3d5e [businesschannel] Committed block [6] with 1 transaction(s)" -"2019-07-20 02:40:45.492 UTC [msp] getCertificationChain -> DEBU 3d24 MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.507 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d60 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.508 UTC [msp] DeserializeIdentity -> DEBU 3d61 Obtaining identity" -"2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.508 UTC [msp] DeserializeIdentity -> DEBU 3d63 Obtaining identity" -"2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d64 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d65 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d66 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.508 UTC [policies] Evaluate -> DEBU 3d67 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d68 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:45.509 UTC [cauthdsl] func1 -> DEBU 3d6a 0xc0030083a0 gate 1563590445509237900 evaluation starts" -"2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6b 0xc0030083a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6c 0xc0030083a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6d 0xc0030083a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6e 0xc0030083a0 principal evaluation fails" -"2019-07-20 02:40:45.509 UTC [cauthdsl] func1 -> DEBU 3d6f 0xc0030083a0 gate 1563590445509237900 evaluation fails" -"2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d70 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d72 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d73 0xc003008c00 gate 1563590445510074100 evaluation starts" -"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d74 0xc003008c00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d75 0xc003008c00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d76 0xc003008c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d77 0xc003008c00 principal evaluation fails" -"2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d78 0xc003008c00 gate 1563590445510074100 evaluation fails" -"2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d79 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d7b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d7c 0xc003009460 gate 1563590445510800100 evaluation starts" -"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d7d 0xc003009460 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d7e 0xc003009460 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.511 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d7f Checking if identity satisfies MEMBER role for Org2MSP" -"2019-07-20 02:40:45.511 UTC [msp] Validate -> DEBU 3d80 MSP Org2MSP validating identity" -"2019-07-20 02:40:45.511 UTC [msp] getCertificationChain -> DEBU 3d81 MSP Org2MSP getting certification chain" -"2019-07-20 02:40:45.511 UTC [cauthdsl] func2 -> DEBU 3d82 0xc003009460 principal matched by identity 0" -"2019-07-20 02:40:45.511 UTC [msp.identity] Verify -> DEBU 3d83 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +"2019-09-24 00:27:19.809 UTC [msp.identity] Verify -> DEBU 6b75 Verify: sig = 00000000 30 45 02 21 00 b1 90 58 f7 87 f1 97 08 2a 66 66 |0E.!...X.....*ff| +00000010 54 d2 83 c0 03 5f a9 4a 09 93 ee 6c 45 e5 d6 b3 |T...._.J...lE...| +00000020 75 5f 7a 3a 3d 02 20 05 ac 2a 73 50 ab b6 17 55 |u_z:=. ..*sP...U| +00000030 30 bb 25 46 06 f1 78 b1 6f 2f a6 98 c3 e5 a4 75 |0.%F..x.o/.....u| +00000040 f7 f8 81 36 8c 0a c8 |...6...|" +"2019-09-24 00:27:19.810 UTC [cauthdsl] func2 -> DEBU 6b76 0xc00490e050 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.810 UTC [cauthdsl] func1 -> DEBU 6b77 0xc00490e050 gate 1569284839809531500 evaluation succeeds" +"2019-09-24 00:27:19.810 UTC [policies] Evaluate -> DEBU 6b78 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.810 UTC [policies] Evaluate -> DEBU 6b79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.810 UTC [policies] Evaluate -> DEBU 6b7a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.810 UTC [policies] Evaluate -> DEBU 6b7b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.811 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6b7c Authenticated 172.18.0.6:7051" +"2019-09-24 00:27:19.811 UTC [gossip.comm] createConnection -> DEBU 6b7d Exiting" +"2019-09-24 00:27:19.811 UTC [gossip.comm] sendToEndpoint -> DEBU 6b7e Exiting" +"2019-09-24 00:27:19.811 UTC [gossip.comm] func1 -> WARN 6b7f peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +"2019-09-24 00:27:19.811 UTC [grpc] infof -> DEBU 6b80 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.812 UTC [gossip.discovery] expireDeadMembers -> WARN 6b81 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +"2019-09-24 00:27:19.812 UTC [gossip.discovery] expireDeadMembers -> WARN 6b82 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +"2019-09-24 00:27:19.812 UTC [gossip.comm] CloseConn -> DEBU 6b83 Closing connection for , PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:27:19.812 UTC [gossip.discovery] expireDeadMembers -> WARN 6b84 Exiting" +"2019-09-24 00:27:19.812 UTC [gossip.comm] serviceConnection -> DEBU 6b85 Closing reading from stream" +"2019-09-24 00:27:19.812 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6b86 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 00:27:19.805 UTC [cauthdsl] func2 -> DEBU 6b5c 0xc0048c3cd0 principal matched by identity 0" +"2019-09-24 00:27:19.800 UTC [policies] Evaluate -> DEBU 6b46 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.813 UTC [msp] Validate -> DEBU 6b87 MSP Org2MSP validating identity" +"2019-09-24 00:27:19.815 UTC [policies] Evaluate -> DEBU 6b88 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.816 UTC [msp] getCertificationChain -> DEBU 6b89 MSP Org2MSP getting certification chain" +"2019-09-24 00:27:19.817 UTC [cauthdsl] func2 -> DEBU 6b8b 0xc0048e5350 principal matched by identity 0" +"2019-09-24 00:27:19.817 UTC [msp.identity] Verify -> DEBU 6b8c Verify: digest = 00000000 9b 33 ed 8a 9c 60 3f 6f 7a 2d 10 a7 93 c4 9d b0 |.3...`?oz-......| +00000010 61 42 af e8 01 5c 4a b1 aa c0 ae d6 1d ec 00 62 |aB...\J........b|" +"2019-09-24 00:27:19.817 UTC [msp.identity] Verify -> DEBU 6b8d Verify: sig = 00000000 30 45 02 21 00 ff 40 e4 be e8 90 e4 c0 99 24 21 |0E.!..@.......$!| +00000010 d9 cf 8f 0e ca e7 7c 8a d2 02 0f 97 cb 04 db fb |......|.........| +00000020 ac 5d 20 a9 60 02 20 64 2f cf a3 27 3d 8a a1 88 |.] .`. d/..'=...| +00000030 17 6d 15 ec ad 16 6b 5d 77 19 4c 04 99 26 d0 cc |.m....k]w.L..&..| +00000040 6d 4c d5 38 b7 e6 b5 |mL.8...|" +"2019-09-24 00:27:19.817 UTC [cauthdsl] func2 -> DEBU 6b8e 0xc0048e5350 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.818 UTC [cauthdsl] func1 -> DEBU 6b8f 0xc0048e5350 gate 1569284839806179900 evaluation succeeds" +"2019-09-24 00:27:19.818 UTC [policies] Evaluate -> DEBU 6b90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.818 UTC [policies] Evaluate -> DEBU 6b91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.818 UTC [policies] Evaluate -> DEBU 6b92 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.818 UTC [policies] Evaluate -> DEBU 6b93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.819 UTC [gossip.discovery] handleAliveMessage -> DEBU 6b94 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.819 UTC [gossip.discovery] learnExistingMembers -> DEBU 6b95 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:19.819 UTC [gossip.discovery] learnExistingMembers -> DEBU 6b96 updating membership: timestamp: " +"2019-09-24 00:27:19.819 UTC [gossip.discovery] learnExistingMembers -> DEBU 6b97 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:19.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 6b98 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:19.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 6b99 Exiting" +"2019-09-24 00:27:19.820 UTC [gossip.discovery] handleAliveMessage -> DEBU 6b9a Exiting" +"2019-09-24 00:27:19.820 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6b9b Exiting" +"2019-09-24 00:27:19.820 UTC [gossip.discovery] sendMemResponse -> DEBU 6b9c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:27:19.820 UTC [msp] DeserializeIdentity -> DEBU 6b9d Obtaining identity" +"2019-09-24 00:27:19.821 UTC [msp] DeserializeIdentity -> DEBU 6b9e Obtaining identity" +"2019-09-24 00:27:19.821 UTC [msp] DeserializeIdentity -> DEBU 6b9f Obtaining identity" +"2019-09-24 00:27:19.821 UTC [gossip.comm] Send -> DEBU 6ba0 Entering, sending GossipMessage: Channel: , nonce: 3586135780412397846, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:19.821 UTC [gossip.discovery] sendMemResponse -> DEBU 6ba1 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" > alive: alive: dead: " +"2019-09-24 00:27:19.821 UTC [gossip.comm] sendToEndpoint -> DEBU 6ba2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3586135780412397846, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 657 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.822 UTC [gossip.comm] sendToEndpoint -> DEBU 6ba3 Exiting" +"2019-09-24 00:27:19.816 UTC [cauthdsl] func1 -> DEBU 6b8a 0xc00490f740 gate 1569284839816708300 evaluation starts" +"2019-09-24 00:27:19.822 UTC [cauthdsl] func2 -> DEBU 6ba4 0xc00490f740 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.822 UTC [cauthdsl] func2 -> DEBU 6ba5 0xc00490f740 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.822 UTC [cauthdsl] func2 -> DEBU 6ba6 0xc00490f740 principal matched by identity 0" +"2019-09-24 00:27:19.823 UTC [msp.identity] Verify -> DEBU 6ba7 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" -"2019-07-20 02:40:45.511 UTC [msp.identity] Verify -> DEBU 3d84 Verify: sig = 00000000 30 44 02 20 70 4f 30 67 42 46 82 f2 1b 9c a8 81 |0D. pO0gBF......| -00000010 11 8c 1f 81 39 d0 51 f4 ae c4 c7 b9 f0 8a 1d d7 |....9.Q.........| -00000020 b9 02 2d ca 02 20 05 6c ed 25 61 84 a2 6d fd d3 |..-.. .l.%a..m..| -00000030 91 b9 b4 96 f9 d6 b6 9d 33 c7 e6 9f ea ed d9 f4 |........3.......| -00000040 67 d9 13 e9 43 de |g...C.|" -"2019-07-20 02:40:45.512 UTC [cauthdsl] func2 -> DEBU 3d85 0xc003009460 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.512 UTC [cauthdsl] func1 -> DEBU 3d86 0xc003009460 gate 1563590445510800100 evaluation succeeds" -"2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d87 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d89 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d8a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.512 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d8b Authenticated 172.18.0.7:7051" -"2019-07-20 02:40:45.512 UTC [gossip.comm] createConnection -> DEBU 3d8c Exiting" -"2019-07-20 02:40:45.512 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8d Exiting" -"2019-07-20 02:40:45.507 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d5f Authenticated 172.18.0.8:60474" -"2019-07-20 02:40:45.513 UTC [gossip.comm] GossipStream -> DEBU 3d8e Servicing 172.18.0.8:60474" -"2019-07-20 02:40:45.513 UTC [gossip.comm] readFromStream -> DEBU 3d8f Got error, aborting: rpc error: code = Canceled desc = context canceled" -"2019-07-20 02:40:45.513 UTC [gossip.comm] func2 -> DEBU 3d90 Client 172.18.0.8:60474 disconnected" -"2019-07-20 02:40:45.513 UTC [comm.grpc.server] 1 -> INFO 3d91 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60474 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.5281ms -"2019-07-20 02:40:45.513 UTC [gossip.gossip] handleMessage -> DEBU 3d92 Entering, 172.18.0.8:60474 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:1447606720863157574 tag:EMPTY mem_req:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > > , Envelope: 176 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.514 UTC [gossip.gossip] handleMessage -> DEBU 3d94 Exiting" -"2019-07-20 02:40:45.514 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d95 Got message: GossipMessage: nonce:1447606720863157574 tag:EMPTY mem_req:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > > , Envelope: 176 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.514 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d96 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:45.514 UTC [msp] DeserializeIdentity -> DEBU 3d97 Obtaining identity" -"2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d98 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d99 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d9a Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:45.515 UTC [cauthdsl] func1 -> DEBU 3d9e 0xc003f25a40 gate 1563590445515383000 evaluation starts" -"2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3d9f 0xc003f25a40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da0 0xc003f25a40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da1 0xc003f25a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da2 0xc003f25a40 principal evaluation fails" -"2019-07-20 02:40:45.516 UTC [cauthdsl] func1 -> DEBU 3da3 0xc003f25a40 gate 1563590445515383000 evaluation fails" -"2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da4 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.517 UTC [cauthdsl] func1 -> DEBU 3da7 0xc003f36280 gate 1563590445516956200 evaluation starts" -"2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3da8 0xc003f36280 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3da9 0xc003f36280 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3daa 0xc003f36280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3dab 0xc003f36280 principal evaluation fails" -"2019-07-20 02:40:45.518 UTC [cauthdsl] func1 -> DEBU 3dac 0xc003f36280 gate 1563590445516956200 evaluation fails" -"2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3dad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3dae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3daf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.518 UTC [cauthdsl] func1 -> DEBU 3db0 0xc003f36ac0 gate 1563590445518968000 evaluation starts" -"2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db1 0xc003f36ac0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db2 0xc003f36ac0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db3 0xc003f36ac0 principal matched by identity 0" -"2019-07-20 02:40:45.519 UTC [msp.identity] Verify -> DEBU 3db4 Verify: digest = 00000000 a5 36 9f 8b 2f a8 4d c1 63 6e 58 db 08 90 2e f7 |.6../.M.cnX.....| -00000010 10 64 1f a4 b2 1b e8 16 22 90 1f ef f7 e1 28 f5 |.d......".....(.|" -"2019-07-20 02:40:45.520 UTC [msp.identity] Verify -> DEBU 3db5 Verify: sig = 00000000 30 45 02 21 00 f8 58 21 d0 7b 04 cb b7 9d 1e 37 |0E.!..X!.{.....7| -00000010 a0 e6 f5 fd 5f eb 98 b0 61 6a 78 ff 57 e0 45 23 |...._...ajx.W.E#| -00000020 1e 3e d0 b2 15 02 20 65 75 64 99 d9 d0 01 28 ab |.>.... eud....(.| -00000030 4c 04 4e bb 5e e6 cc 5d 00 0c 2d 71 1e 01 f4 71 |L.N.^..]..-q...q| -00000040 83 c7 79 dd 2c 1a 7f |..y.,..|" -"2019-07-20 02:40:45.520 UTC [cauthdsl] func2 -> DEBU 3db6 0xc003f36ac0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.520 UTC [cauthdsl] func1 -> DEBU 3db7 0xc003f36ac0 gate 1563590445518968000 evaluation succeeds" -"2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3db8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3dba Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3dbb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.521 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dbc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbe updating membership: timestamp: " -"2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbf Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:45.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dc0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:45.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dc1 Exiting" -"2019-07-20 02:40:45.522 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc2 Exiting" -"2019-07-20 02:40:45.523 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dc3 Exiting" -"2019-07-20 02:40:45.523 UTC [gossip.discovery] sendMemResponse -> DEBU 3dc4 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:45.523 UTC [msp] DeserializeIdentity -> DEBU 3dc5 Obtaining identity" -"2019-07-20 02:40:45.523 UTC [msp] DeserializeIdentity -> DEBU 3dc6 Obtaining identity" -"2019-07-20 02:40:45.524 UTC [msp] DeserializeIdentity -> DEBU 3dc7 Obtaining identity" -"2019-07-20 02:40:45.524 UTC [gossip.comm] Send -> DEBU 3dc8 Entering, sending GossipMessage: Channel: , nonce: 1447606720863157574, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:45.524 UTC [gossip.discovery] sendMemResponse -> DEBU 3dc9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" > alive:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > alive: alive:9\232\322V\2358\311\017}\365J" > " -"2019-07-20 02:40:45.524 UTC [gossip.comm] sendToEndpoint -> DEBU 3dca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1447606720863157574, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.524 UTC [gossip.comm] createConnection -> DEBU 3dcb Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:45.526 UTC [gossip.comm] writeToStream -> DEBU 3dcc Closing writing to stream" -"2019-07-20 02:40:45.507 UTC [policies] Evaluate -> DEBU 3d93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dcd 0xc003e8cbe0 gate 1563590445526119800 evaluation starts" -"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dce 0xc003e8cbe0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dcf 0xc003e8cbe0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd0 0xc003e8cbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd1 0xc003e8cbe0 principal evaluation fails" -"2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dd2 0xc003e8cbe0 gate 1563590445526119800 evaluation fails" -"2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd3 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dd6 0xc003e8d420 gate 1563590445526559500 evaluation starts" -"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd7 0xc003e8d420 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd8 0xc003e8d420 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd9 0xc003e8d420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dda 0xc003e8d420 principal evaluation fails" -"2019-07-20 02:40:45.527 UTC [cauthdsl] func1 -> DEBU 3ddb 0xc003e8d420 gate 1563590445526559500 evaluation fails" -"2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3ddc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3ddd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3dde == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.527 UTC [cauthdsl] func1 -> DEBU 3ddf 0xc003e8dc60 gate 1563590445527196500 evaluation starts" -"2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de0 0xc003e8dc60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de1 0xc003e8dc60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de2 0xc003e8dc60 principal matched by identity 0" -"2019-07-20 02:40:45.527 UTC [grpc] DialContext -> DEBU 3de3 parsed scheme: """ -"2019-07-20 02:40:45.527 UTC [msp.identity] Verify -> DEBU 3de4 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +"2019-09-24 00:27:19.823 UTC [msp.identity] Verify -> DEBU 6ba8 Verify: sig = 00000000 30 45 02 21 00 8b c0 5f 66 35 30 e0 00 6e 05 19 |0E.!..._f50..n..| +00000010 cb bb 7b cc 7c 13 4c 91 af df b4 99 c1 5b 9a 09 |..{.|.L......[..| +00000020 5a 2f 35 9d 91 02 20 52 55 e9 e6 2f 0e e3 d6 0c |Z/5... RU../....| +00000030 80 b4 65 30 5d b0 40 23 7f 5c 44 3c cd 52 27 be |..e0].@#.\D<.R'.| +00000040 e4 9a b0 16 2d bb b8 |....-..|" +"2019-09-24 00:27:19.823 UTC [cauthdsl] func2 -> DEBU 6ba9 0xc00490f740 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.823 UTC [cauthdsl] func1 -> DEBU 6baa 0xc00490f740 gate 1569284839816708300 evaluation succeeds" +"2019-09-24 00:27:19.823 UTC [policies] Evaluate -> DEBU 6bab Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.823 UTC [policies] Evaluate -> DEBU 6bac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.823 UTC [policies] Evaluate -> DEBU 6bad Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.824 UTC [policies] Evaluate -> DEBU 6bae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.824 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6baf Authenticated 172.18.0.8:35024" +"2019-09-24 00:27:19.824 UTC [gossip.comm] GossipStream -> DEBU 6bb0 Servicing 172.18.0.8:35024" +"2019-09-24 00:27:19.824 UTC [gossip.comm] serviceConnection -> DEBU 6bb1 Closing reading from stream" +"2019-09-24 00:27:19.824 UTC [gossip.comm] writeToStream -> DEBU 6bb2 Closing writing to stream" +"2019-09-24 00:27:19.825 UTC [gossip.comm] readFromStream -> DEBU 6bb3 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +"2019-09-24 00:27:19.825 UTC [gossip.comm] readFromStream -> DEBU 6bb4 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 00:27:19.825 UTC [gossip.comm] func2 -> DEBU 6bb5 Client 172.18.0.8:35024 disconnected" +"2019-09-24 00:27:19.825 UTC [comm.grpc.server] 1 -> INFO 6bb6 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T00:27:29.791Z grpc.peer_address=172.18.0.8:35024 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.2236ms +"2019-09-24 00:27:19.825 UTC [gossip.comm] writeToStream -> DEBU 6bb7 Closing writing to stream" +"2019-09-24 00:27:19.814 UTC [msp.identity] Verify -> DEBU 6bb8 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:40:45.527 UTC [msp.identity] Verify -> DEBU 3de5 Verify: sig = 00000000 30 44 02 20 15 44 8b 82 00 ab 3b 37 3d 6f 79 e0 |0D. .D....;7=oy.| -00000010 81 20 9b 49 c9 2e 8a 26 7d b6 61 35 f9 29 00 7c |. .I...&}.a5.).|| -00000020 b2 ba a1 71 02 20 42 34 7a 79 64 3c 4b 12 a3 a5 |...q. B4zyd DEBU 3de6 0xc003e8dc60 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.528 UTC [cauthdsl] func1 -> DEBU 3de7 0xc003e8dc60 gate 1563590445527196500 evaluation succeeds" -"2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3de8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3de9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3dea Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3deb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.528 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3dec Authenticated 172.18.0.8:7051" -"2019-07-20 02:40:45.528 UTC [msp] DeserializeIdentity -> DEBU 3ded Obtaining identity" -"2019-07-20 02:40:45.528 UTC [msp] GetDefaultSigningIdentity -> DEBU 3dee Obtaining default signing identity" -"2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3def Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915102F " -"2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3df0 Sign: digest: FF22BF917C50A5A69FE384EC283EBBAB43EA18EC2DAE339B6AE8BFEA098F946E " -"2019-07-20 02:40:45.528 UTC [msp] GetDefaultSigningIdentity -> DEBU 3df1 Obtaining default signing identity" -"2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3df2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:45.529 UTC [msp.identity] Sign -> DEBU 3df3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:45.529 UTC [msp] DeserializeIdentity -> DEBU 3df4 Obtaining identity" -"2019-07-20 02:40:45.529 UTC [gossip.comm] Send -> DEBU 3df5 Entering, sending GossipMessage: nonce:276503936147127162 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:45.529 UTC [gossip.comm] sendToEndpoint -> DEBU 3df6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:276503936147127162 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.530 UTC [grpc] infof -> DEBU 3df7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:45.527 UTC [grpc] DialContext -> DEBU 3df8 scheme "" not registered, fallback to default scheme" -"2019-07-20 02:40:45.530 UTC [grpc] watcher -> DEBU 3df9 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" -"2019-07-20 02:40:45.530 UTC [grpc] switchBalancer -> DEBU 3dfa ClientConn switching balancer to "pick_first"" -"2019-07-20 02:40:45.531 UTC [grpc] HandleSubConnStateChange -> DEBU 3dfb pickfirstBalancer: HandleSubConnStateChange: 0xc000610130, CONNECTING" -"2019-07-20 02:40:45.542 UTC [grpc] HandleSubConnStateChange -> DEBU 3dfc pickfirstBalancer: HandleSubConnStateChange: 0xc000610130, READY" -"2019-07-20 02:40:45.544 UTC [msp] GetDefaultSigningIdentity -> DEBU 3dfd Obtaining default signing identity" -"2019-07-20 02:40:45.544 UTC [msp.identity] Sign -> DEBU 3dfe Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " -"2019-07-20 02:40:45.545 UTC [msp.identity] Sign -> DEBU 3dff Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " -"2019-07-20 02:40:45.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e00 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" -"2019-07-20 02:40:45.547 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e01 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" -"2019-07-20 02:40:45.547 UTC [msp] DeserializeIdentity -> DEBU 3e02 Obtaining identity" -"2019-07-20 02:40:45.547 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e03 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.551 UTC [msp] DeserializeIdentity -> DEBU 3e04 Obtaining identity" -"2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.552 UTC [msp] DeserializeIdentity -> DEBU 3e06 Obtaining identity" -"2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e07 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e08 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e09 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:45.552 UTC [cauthdsl] func1 -> DEBU 3e0d 0xc0006e0230 gate 1563590445552375400 evaluation starts" -"2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e0e 0xc0006e0230 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e0f 0xc0006e0230 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e10 0xc0006e0230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e11 0xc0006e0230 principal evaluation fails" -"2019-07-20 02:40:45.552 UTC [cauthdsl] func1 -> DEBU 3e12 0xc0006e0230 gate 1563590445552375400 evaluation fails" -"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e13 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e16 0xc0006e0a70 gate 1563590445553036600 evaluation starts" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e17 0xc0006e0a70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e18 0xc0006e0a70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e19 0xc0006e0a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e1a 0xc0006e0a70 principal evaluation fails" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e1b 0xc0006e0a70 gate 1563590445553036600 evaluation fails" -"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e1f 0xc0006e12b0 gate 1563590445553401800 evaluation starts" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e20 0xc0006e12b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e21 0xc0006e12b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e22 0xc0006e12b0 principal matched by identity 0" -"2019-07-20 02:40:45.553 UTC [msp.identity] Verify -> DEBU 3e23 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| -00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" -"2019-07-20 02:40:45.553 UTC [msp.identity] Verify -> DEBU 3e24 Verify: sig = 00000000 30 45 02 21 00 f5 da 01 a3 70 51 a3 33 5f 1a f2 |0E.!.....pQ.3_..| -00000010 ac 08 fc d6 ef 1b 74 df ba ed 57 50 ae 50 ea 05 |......t...WP.P..| -00000020 8a bc 1b 00 2e 02 20 4d 26 16 73 50 ac 0e 33 ce |...... M&.sP..3.| -00000030 54 53 f1 34 5a c6 ca ff 8a 55 a6 11 48 4c 2d ef |TS.4Z....U..HL-.| -00000040 36 54 a9 63 7a a6 da |6T.cz..|" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e25 0xc0006e12b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e26 0xc0006e12b0 gate 1563590445553401800 evaluation succeeds" -"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e27 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e29 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e2a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.554 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e2b Authenticated 172.18.0.8:7051" -"2019-07-20 02:40:45.554 UTC [gossip.comm] createConnection -> DEBU 3e2c Exiting" -"2019-07-20 02:40:45.554 UTC [gossip.comm] sendToEndpoint -> DEBU 3e2d Exiting" -"2019-07-20 02:40:45.554 UTC [gossip.comm] sendToEndpoint -> DEBU 3e2e Exiting" -"2019-07-20 02:40:45.557 UTC [gossip.comm] func1 -> DEBU 3e2f Got message: GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.557 UTC [gossip.gossip] handleMessage -> DEBU 3e30 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.557 UTC [gossip.gossip] handleMessage -> DEBU 3e31 Exiting" -"2019-07-20 02:40:45.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e32 Got message: GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" -"2019-07-20 02:40:45.558 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e33 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:45.558 UTC [msp.identity] Verify -> DEBU 3e34 Verify: digest = 00000000 76 c3 3d 3b 53 91 f2 46 7d 87 85 b3 04 32 54 3a |v.=;S..F}....2T:| -00000010 55 f4 c9 e1 39 02 10 ec 22 19 f9 fa 73 85 d3 3b |U...9..."...s..;|" -"2019-07-20 02:40:45.558 UTC [msp.identity] Verify -> DEBU 3e35 Verify: sig = 00000000 30 45 02 21 00 c2 6e 44 87 e3 45 1a 99 99 6f 73 |0E.!..nD..E...os| -00000010 58 ca 2f 2d 9b 3d 74 9e 37 b8 5a 8b 4c fd b4 9c |X./-.=t.7.Z.L...| -00000020 ea d9 1a 17 e2 02 20 4f 44 4d a2 54 18 1b df 01 |...... ODM.T....| -00000030 34 52 da 63 e7 ff af 66 75 f0 af c2 c1 fc 05 3b |4R.c...fu......;| -00000040 bf d9 c4 e8 12 c3 65 |......e|" -"2019-07-20 02:40:45.558 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e36 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:45.558 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e37 Exiting" -"2019-07-20 02:40:45.559 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e38 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:45.559 UTC [msp.identity] Verify -> DEBU 3e39 Verify: digest = 00000000 ff 22 bf 91 7c 50 a5 a6 9f e3 84 ec 28 3e bb ab |."..|P......(>..| -00000010 43 ea 18 ec 2d ae 33 9b 6a e8 bf ea 09 8f 94 6e |C...-.3.j......n|" -"2019-07-20 02:40:45.559 UTC [msp.identity] Verify -> DEBU 3e3a Verify: sig = 00000000 30 45 02 21 00 f5 f5 83 7b ac 43 de e2 2f bf 91 |0E.!....{.C../..| -00000010 a4 b7 be 7d 67 36 c7 16 82 ca 9c 37 61 1d f8 f1 |...}g6.....7a...| -00000020 33 04 07 23 a5 02 20 47 34 61 9f b8 48 46 3b cb |3..#.. G4a..HF;.| -00000030 ad b1 a0 42 7d 88 7a 23 7f d1 1a 87 24 7f 6d 6e |...B}.z#....$.mn| -00000040 e6 e3 c3 b9 9a c7 b5 |.......|" -"2019-07-20 02:40:45.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:45.559 UTC [gossip.discovery] isSentByMe -> DEBU 3e3c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:45.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3d Exiting" -"2019-07-20 02:40:45.559 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e3e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:45.559 UTC [msp] DeserializeIdentity -> DEBU 3e3f Obtaining identity" -"2019-07-20 02:40:45.559 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:45.560 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e41 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.560 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e42 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:45.560 UTC [cauthdsl] func1 -> DEBU 3e46 0xc000702730 gate 1563590445560383100 evaluation starts" -"2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e47 0xc000702730 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e48 0xc000702730 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e49 0xc000702730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e4a 0xc000702730 principal evaluation fails" -"2019-07-20 02:40:45.560 UTC [cauthdsl] func1 -> DEBU 3e4b 0xc000702730 gate 1563590445560383100 evaluation fails" -"2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e4c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e4f 0xc000702f70 gate 1563590445561132700 evaluation starts" -"2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e50 0xc000702f70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e51 0xc000702f70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e52 0xc000702f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e53 0xc000702f70 principal evaluation fails" -"2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e54 0xc000702f70 gate 1563590445561132700 evaluation fails" -"2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e55 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e58 0xc0007037b0 gate 1563590445561877900 evaluation starts" -"2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e59 0xc0007037b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5a 0xc0007037b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5b 0xc0007037b0 principal matched by identity 0" -"2019-07-20 02:40:45.562 UTC [msp.identity] Verify -> DEBU 3e5c Verify: digest = 00000000 8f ba 57 98 80 8e 2d cd 89 5d 87 b8 08 40 04 45 |..W...-..]...@.E| -00000010 78 ea c3 c0 14 9d af c2 08 bb cc 89 77 3f 3e 87 |x...........w?>.|" -"2019-07-20 02:40:45.562 UTC [msp.identity] Verify -> DEBU 3e5d Verify: sig = 00000000 30 45 02 21 00 b5 76 2d 76 60 fc fc 11 01 07 f8 |0E.!..v-v`......| -00000010 62 01 ec d0 14 36 32 55 bd 89 34 ea 51 78 34 96 |b....62U..4.Qx4.| -00000020 95 73 af b0 af 02 20 62 91 f1 ac ad d6 15 2d eb |.s.... b......-.| -00000030 5e d8 69 b6 4a 07 4f f2 0e 52 a8 48 de 81 5b 79 |^.i.J.O..R.H..[y| -00000040 8a df fb b1 35 84 93 |....5..|" -"2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5e 0xc0007037b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:45.562 UTC [cauthdsl] func1 -> DEBU 3e5f 0xc0007037b0 gate 1563590445561877900 evaluation succeeds" -"2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e62 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:45.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e64 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:45.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e65 Exiting" -"2019-07-20 02:40:45.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e66 Exiting" -"2019-07-20 02:40:46.978 UTC [gossip.election] waitForInterrupt -> DEBU 3e67 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:46.978 UTC [gossip.election] IsLeader -> DEBU 3e68 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:46.978 UTC [msp] GetDefaultSigningIdentity -> DEBU 3e69 Obtaining default signing identity" -"2019-07-20 02:40:46.979 UTC [msp.identity] Sign -> DEBU 3e6a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100E1801 " -"2019-07-20 02:40:46.979 UTC [msp.identity] Sign -> DEBU 3e6b Sign: digest: C94717FA5498C76CBFD070F87C29A8E58419A2CDB66B3A48BC32D35A9FA13C03 " -"2019-07-20 02:40:46.979 UTC [gossip.election] waitForInterrupt -> DEBU 3e6c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6d Obtaining identity" -"2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6e Obtaining identity" -"2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6f Obtaining identity" -"2019-07-20 02:40:46.981 UTC [msp] DeserializeIdentity -> DEBU 3e70 Obtaining identity" -"2019-07-20 02:40:46.981 UTC [gossip.comm] Send -> DEBU 3e71 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:46.981 UTC [msp] DeserializeIdentity -> DEBU 3e72 Obtaining identity" -"2019-07-20 02:40:46.982 UTC [gossip.comm] sendToEndpoint -> DEBU 3e73 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" -"2019-07-20 02:40:46.982 UTC [gossip.comm] sendToEndpoint -> DEBU 3e74 Exiting" -"2019-07-20 02:40:46.982 UTC [msp] DeserializeIdentity -> DEBU 3e75 Obtaining identity" -"2019-07-20 02:40:46.997 UTC [gossip.comm] func1 -> DEBU 3e76 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:46.997 UTC [gossip.gossip] handleMessage -> DEBU 3e77 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:46.997 UTC [gossip.gossip] handleMessage -> DEBU 3e78 Exiting" -"2019-07-20 02:40:46.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:46.999 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e7a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:46.999 UTC [msp] DeserializeIdentity -> DEBU 3e7b Obtaining identity" -"2019-07-20 02:40:47.000 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e7c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:47.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7d Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:47.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7e Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:47.001 UTC [policies] Evaluate -> DEBU 3e7f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:47.001 UTC [policies] Evaluate -> DEBU 3e80 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:47.002 UTC [policies] Evaluate -> DEBU 3e81 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:47.004 UTC [cauthdsl] func1 -> DEBU 3e82 0xc0006efa40 gate 1563590447004336100 evaluation starts" -"2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e83 0xc0006efa40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e84 0xc0006efa40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e85 0xc0006efa40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:47.005 UTC [cauthdsl] func2 -> DEBU 3e86 0xc0006efa40 principal evaluation fails" -"2019-07-20 02:40:47.005 UTC [gossip.gossip] handleMessage -> DEBU 3e87 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.005 UTC [cauthdsl] func1 -> DEBU 3e88 0xc0006efa40 gate 1563590447004336100 evaluation fails" -"2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e89 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:47.006 UTC [cauthdsl] func1 -> DEBU 3e8c 0xc000763130 gate 1563590447006150600 evaluation starts" -"2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8d 0xc000763130 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8e 0xc000763130 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8f 0xc000763130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e90 0xc000763130 principal evaluation fails" -"2019-07-20 02:40:47.006 UTC [cauthdsl] func1 -> DEBU 3e91 0xc000763130 gate 1563590447006150600 evaluation fails" -"2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e92 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:47.007 UTC [cauthdsl] func1 -> DEBU 3e95 0xc000763970 gate 1563590447007816600 evaluation starts" -"2019-07-20 02:40:47.007 UTC [cauthdsl] func2 -> DEBU 3e96 0xc000763970 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:47.008 UTC [cauthdsl] func2 -> DEBU 3e97 0xc000763970 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:47.008 UTC [cauthdsl] func2 -> DEBU 3e98 0xc000763970 principal matched by identity 0" -"2019-07-20 02:40:47.008 UTC [msp.identity] Verify -> DEBU 3e99 Verify: digest = 00000000 cf 94 cc bf 56 cf f7 61 c6 08 be 0a 5a fa 83 fe |....V..a....Z...| -00000010 db 51 21 ae 39 c6 6a 65 af 46 59 ec aa 84 2e 99 |.Q!.9.je.FY.....|" -"2019-07-20 02:40:47.008 UTC [msp.identity] Verify -> DEBU 3e9a Verify: sig = 00000000 30 44 02 20 30 58 3e 03 05 1c 60 f6 aa 1e 0d 5d |0D. 0X>...`....]| -00000010 02 6e 70 7d 5a f5 63 2c 5e dd e7 33 47 95 09 69 |.np}Z.c,^..3G..i| -00000020 dd ad 21 4e 02 20 0b 55 36 0d b2 9c 17 0a b6 ea |..!N. .U6.......| -00000030 1e 76 ba b8 be ad dd 38 9d 50 bc 4a 85 a5 09 b7 |.v.....8.P.J....| -00000040 6a e6 a6 64 bd 14 |j..d..|" -"2019-07-20 02:40:47.009 UTC [cauthdsl] func2 -> DEBU 3e9b 0xc000763970 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:47.009 UTC [cauthdsl] func1 -> DEBU 3e9c 0xc000763970 gate 1563590447007816600 evaluation succeeds" -"2019-07-20 02:40:47.009 UTC [policies] Evaluate -> DEBU 3e9d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:47.009 UTC [policies] Evaluate -> DEBU 3e9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:47.010 UTC [policies] Evaluate -> DEBU 3e9f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:47.010 UTC [policies] Evaluate -> DEBU 3ea0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:47.010 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ea1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea3 updating membership: timestamp: " -"2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea4 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea6 Exiting" -"2019-07-20 02:40:47.012 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ea7 Exiting" -"2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ea8 Exiting" -"2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ea9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.012 UTC [gossip.gossip] handleMessage -> DEBU 3eaa Exiting" -"2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eab Exiting" -"2019-07-20 02:40:47.016 UTC [msp] DeserializeIdentity -> DEBU 3eac Obtaining identity" -"2019-07-20 02:40:47.016 UTC [msp] DeserializeIdentity -> DEBU 3ead Obtaining identity" -"2019-07-20 02:40:47.017 UTC [msp] DeserializeIdentity -> DEBU 3eae Obtaining identity" -"2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eaf Obtaining identity" -"2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eb0 Obtaining identity" -"2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eb1 Obtaining identity" -"2019-07-20 02:40:47.019 UTC [gossip.comm] Send -> DEBU 3eb2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:47.019 UTC [msp] DeserializeIdentity -> DEBU 3eb3 Obtaining identity" -"2019-07-20 02:40:47.019 UTC [msp] DeserializeIdentity -> DEBU 3eb4 Obtaining identity" -"2019-07-20 02:40:47.019 UTC [gossip.comm] Send -> DEBU 3eb5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb7 Exiting" -"2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.020 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb9 Exiting" -"2019-07-20 02:40:47.193 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 3eba Sleeping 25s" -"2019-07-20 02:40:47.287 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ebb Obtaining default signing identity" -"2019-07-20 02:40:47.287 UTC [msp.identity] Sign -> DEBU 3ebc Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151030 " -"2019-07-20 02:40:47.287 UTC [msp.identity] Sign -> DEBU 3ebd Sign: digest: F4B2374751D92F8187A330159D35521A45201DE2EE917285D294724B2D5FFEE1 " -"2019-07-20 02:40:47.288 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ebe Obtaining default signing identity" -"2019-07-20 02:40:47.288 UTC [msp.identity] Sign -> DEBU 3ebf Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:47.288 UTC [msp.identity] Sign -> DEBU 3ec0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:47.289 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3ec1 Sleeping 5s" -"2019-07-20 02:40:47.297 UTC [msp] DeserializeIdentity -> DEBU 3ec2 Obtaining identity" -"2019-07-20 02:40:47.297 UTC [msp] DeserializeIdentity -> DEBU 3ec3 Obtaining identity" -"2019-07-20 02:40:47.298 UTC [msp] DeserializeIdentity -> DEBU 3ec4 Obtaining identity" -"2019-07-20 02:40:47.298 UTC [gossip.comm] Send -> DEBU 3ec5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:47.298 UTC [msp] DeserializeIdentity -> DEBU 3ec6 Obtaining identity" -"2019-07-20 02:40:47.299 UTC [gossip.comm] sendToEndpoint -> DEBU 3ec7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.299 UTC [gossip.comm] sendToEndpoint -> DEBU 3ec9 Exiting" -"2019-07-20 02:40:47.299 UTC [gossip.comm] Send -> DEBU 3ec8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:47.299 UTC [gossip.comm] Send -> DEBU 3eca Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecc Exiting" -"2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.301 UTC [gossip.comm] sendToEndpoint -> DEBU 3ece Exiting" -"2019-07-20 02:40:47.330 UTC [gossip.gossip] handleMessage -> DEBU 3ecf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:47.330 UTC [gossip.gossip] handleMessage -> DEBU 3ed0 Exiting" -"2019-07-20 02:40:47.330 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ed1 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:47.330 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ed2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:47.331 UTC [msp.identity] Verify -> DEBU 3ed3 Verify: digest = 00000000 c0 8b 97 e5 b3 08 ab 1c 23 62 0d 3c a8 64 f1 4f |........#b.<.d.O| -00000010 12 44 bf 7c 3a 44 dc 2a b4 02 fc ce 31 ca 47 78 |.D.|:D.*....1.Gx|" -"2019-07-20 02:40:47.331 UTC [msp.identity] Verify -> DEBU 3ed4 Verify: sig = 00000000 30 45 02 21 00 ea 77 67 83 45 6e 40 a5 3c ac d6 |0E.!..wg.En@.<..| -00000010 74 2c ee 43 4d 48 2f bc 87 08 96 11 2e d9 2c b5 |t,.CMH/.......,.| -00000020 5c 64 72 27 41 02 20 78 2d 65 40 1b b7 cd 24 1d |\dr'A. x-e@...$.| -00000030 0d 4d bb 00 af be 5f 94 8e 7d 97 15 9a d8 5a fb |.M...._..}....Z.| -00000040 97 81 74 60 73 de 2a |..t`s.*|" -"2019-07-20 02:40:47.332 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ed5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed7 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed8 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:47.333 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed9 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:47.333 UTC [gossip.discovery] learnExistingMembers -> DEBU 3eda Exiting" -"2019-07-20 02:40:47.333 UTC [gossip.discovery] handleAliveMessage -> DEBU 3edb Exiting" -"2019-07-20 02:40:47.333 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3edc Exiting" -"2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3edd Obtaining identity" -"2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3ede Obtaining identity" -"2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3edf Obtaining identity" -"2019-07-20 02:40:47.336 UTC [gossip.comm] Send -> DEBU 3ee0 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:47.336 UTC [msp] DeserializeIdentity -> DEBU 3ee1 Obtaining identity" -"2019-07-20 02:40:47.336 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:47.336 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee3 Exiting" -"2019-07-20 02:40:47.336 UTC [gossip.comm] Send -> DEBU 3ee4 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:47.337 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:47.337 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee6 Exiting" -"2019-07-20 02:40:47.342 UTC [gossip.comm] func1 -> DEBU 3ee7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:47.342 UTC [gossip.gossip] handleMessage -> DEBU 3ee8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:47.343 UTC [gossip.gossip] handleMessage -> DEBU 3ee9 Exiting" -"2019-07-20 02:40:47.343 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eea Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:47.343 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eeb Exiting" -"2019-07-20 02:40:47.531 UTC [gossip.comm] func1 -> DEBU 3eec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.531 UTC [gossip.gossip] handleMessage -> DEBU 3eed Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.532 UTC [gossip.gossip] handleMessage -> DEBU 3eee Exiting" -"2019-07-20 02:40:47.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eef Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.533 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ef0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:47.533 UTC [msp] DeserializeIdentity -> DEBU 3ef1 Obtaining identity" -"2019-07-20 02:40:47.533 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ef2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:47.533 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:47.534 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:47.534 UTC [cauthdsl] func1 -> DEBU 3ef8 0xc003843490 gate 1563590447534529400 evaluation starts" -"2019-07-20 02:40:47.534 UTC [cauthdsl] func2 -> DEBU 3ef9 0xc003843490 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:47.534 UTC [cauthdsl] func2 -> DEBU 3efa 0xc003843490 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:47.535 UTC [cauthdsl] func2 -> DEBU 3efb 0xc003843490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:47.535 UTC [cauthdsl] func2 -> DEBU 3efc 0xc003843490 principal evaluation fails" -"2019-07-20 02:40:47.535 UTC [cauthdsl] func1 -> DEBU 3efd 0xc003843490 gate 1563590447534529400 evaluation fails" -"2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3efe Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3eff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3f00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:47.536 UTC [cauthdsl] func1 -> DEBU 3f01 0xc003843cd0 gate 1563590447536109800 evaluation starts" -"2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f02 0xc003843cd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f03 0xc003843cd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f04 0xc003843cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f05 0xc003843cd0 principal evaluation fails" -"2019-07-20 02:40:47.536 UTC [cauthdsl] func1 -> DEBU 3f06 0xc003843cd0 gate 1563590447536109800 evaluation fails" -"2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f07 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:47.537 UTC [cauthdsl] func1 -> DEBU 3f0a 0xc00385a510 gate 1563590447537724800 evaluation starts" -"2019-07-20 02:40:47.537 UTC [cauthdsl] func2 -> DEBU 3f0b 0xc00385a510 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:47.538 UTC [cauthdsl] func2 -> DEBU 3f0c 0xc00385a510 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:47.538 UTC [cauthdsl] func2 -> DEBU 3f0d 0xc00385a510 principal matched by identity 0" -"2019-07-20 02:40:47.538 UTC [msp.identity] Verify -> DEBU 3f0e Verify: digest = 00000000 c3 1f 8e d6 f3 6b b3 b6 11 47 45 89 17 35 18 ff |.....k...GE..5..| -00000010 b2 3c 16 4b 3a d5 5c 86 f6 fe 41 f9 81 5b f0 40 |.<.K:.\...A..[.@|" -"2019-07-20 02:40:47.538 UTC [msp.identity] Verify -> DEBU 3f0f Verify: sig = 00000000 30 44 02 20 10 e7 1b 40 4b be ad e9 7d bc 6c c1 |0D. ...@K...}.l.| -00000010 9e 54 22 95 87 7e fb f0 54 70 a1 5a 24 c4 49 b6 |.T"..~..Tp.Z$.I.| -00000020 87 78 b9 d0 02 20 4c be d5 bc 5a ee 8a a8 17 87 |.x... L...Z.....| -00000030 49 61 f7 ce 43 29 b0 e8 04 28 8c 6e b9 03 73 a0 |Ia..C)...(.n..s.| -00000040 51 42 95 aa 64 92 |QB..d.|" -"2019-07-20 02:40:47.539 UTC [cauthdsl] func2 -> DEBU 3f10 0xc00385a510 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:47.539 UTC [cauthdsl] func1 -> DEBU 3f11 0xc00385a510 gate 1563590447537724800 evaluation succeeds" -"2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f12 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f14 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:47.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f16 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f17 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f18 updating membership: timestamp: " -"2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f19 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f1a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f1b Exiting" -"2019-07-20 02:40:47.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f1c Exiting" -"2019-07-20 02:40:47.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f1d Exiting" -"2019-07-20 02:40:47.542 UTC [gossip.comm] func1 -> DEBU 3f1e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.542 UTC [gossip.gossip] handleMessage -> DEBU 3f1f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.543 UTC [gossip.gossip] handleMessage -> DEBU 3f20 Exiting" -"2019-07-20 02:40:47.543 UTC [gossip.gossip] handleMessage -> DEBU 3f21 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f22 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f23 Exiting" -"2019-07-20 02:40:47.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f24 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f25 Exiting" -"2019-07-20 02:40:47.544 UTC [gossip.gossip] handleMessage -> DEBU 3f26 Exiting" -"2019-07-20 02:40:47.544 UTC [msp] DeserializeIdentity -> DEBU 3f27 Obtaining identity" -"2019-07-20 02:40:47.544 UTC [msp] DeserializeIdentity -> DEBU 3f28 Obtaining identity" -"2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f29 Obtaining identity" -"2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2a Obtaining identity" -"2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2b Obtaining identity" -"2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2c Obtaining identity" -"2019-07-20 02:40:47.546 UTC [gossip.comm] Send -> DEBU 3f2d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:47.546 UTC [msp] DeserializeIdentity -> DEBU 3f2e Obtaining identity" -"2019-07-20 02:40:47.546 UTC [msp] DeserializeIdentity -> DEBU 3f2f Obtaining identity" -"2019-07-20 02:40:47.546 UTC [gossip.comm] Send -> DEBU 3f30 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f31 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f32 Exiting" -"2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f33 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f34 Exiting" -"2019-07-20 02:40:47.938 UTC [gossip.comm] func1 -> DEBU 3f35 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:47.938 UTC [gossip.gossip] handleMessage -> DEBU 3f36 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:47.939 UTC [gossip.gossip] handleMessage -> DEBU 3f37 Exiting" -"2019-07-20 02:40:47.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f38 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:47.940 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f39 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:47.940 UTC [msp] DeserializeIdentity -> DEBU 3f3a Obtaining identity" -"2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f3c Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f3d Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:47.941 UTC [policies] Evaluate -> DEBU 3f3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:47.941 UTC [policies] Evaluate -> DEBU 3f3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:47.942 UTC [policies] Evaluate -> DEBU 3f40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:47.942 UTC [cauthdsl] func1 -> DEBU 3f41 0xc0028e6010 gate 1563590447942285300 evaluation starts" -"2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f42 0xc0028e6010 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f43 0xc0028e6010 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f44 0xc0028e6010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f45 0xc0028e6010 principal evaluation fails" -"2019-07-20 02:40:47.942 UTC [cauthdsl] func1 -> DEBU 3f46 0xc0028e6010 gate 1563590447942285300 evaluation fails" -"2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f47 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:47.943 UTC [cauthdsl] func1 -> DEBU 3f4a 0xc0028e6850 gate 1563590447943384400 evaluation starts" -"2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4b 0xc0028e6850 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4c 0xc0028e6850 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4d 0xc0028e6850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4e 0xc0028e6850 principal evaluation fails" -"2019-07-20 02:40:47.944 UTC [cauthdsl] func1 -> DEBU 3f4f 0xc0028e6850 gate 1563590447943384400 evaluation fails" -"2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f50 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:47.944 UTC [cauthdsl] func1 -> DEBU 3f53 0xc0028e7090 gate 1563590447944666000 evaluation starts" -"2019-07-20 02:40:47.944 UTC [cauthdsl] func2 -> DEBU 3f54 0xc0028e7090 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f55 0xc0028e7090 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f56 0xc0028e7090 principal matched by identity 0" -"2019-07-20 02:40:47.945 UTC [msp.identity] Verify -> DEBU 3f57 Verify: digest = 00000000 82 8a 0c 02 a6 b9 8e b3 5c 66 69 6a d5 56 b4 cc |........\fij.V..| -00000010 7f 8a 2d 1a 82 cc 05 33 81 44 35 ec 18 70 32 e1 |..-....3.D5..p2.|" -"2019-07-20 02:40:47.945 UTC [msp.identity] Verify -> DEBU 3f58 Verify: sig = 00000000 30 45 02 21 00 c4 f6 b1 01 4b 6e f7 8e fd 08 a1 |0E.!.....Kn.....| -00000010 ee 32 9f 30 af b8 48 d7 f8 ba 7c 96 af 8e b9 be |.2.0..H...|.....| -00000020 88 dc fa 86 27 02 20 1e 73 d4 0f e3 81 8b e9 c5 |....'. .s.......| -00000030 c5 b7 4c 20 fb 94 a9 c4 93 fe a8 36 38 c9 2b 14 |..L .......68.+.| -00000040 d3 ec c6 8c 3d c1 4c |....=.L|" -"2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f59 0xc0028e7090 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:47.945 UTC [cauthdsl] func1 -> DEBU 3f5a 0xc0028e7090 gate 1563590447944666000 evaluation succeeds" -"2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5d Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:47.947 UTC [policies] Evaluate -> DEBU 3f5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:47.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f5f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f60 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f61 updating membership: timestamp: " -"2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f62 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f63 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f64 Exiting" -"2019-07-20 02:40:47.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f65 Exiting" -"2019-07-20 02:40:47.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f66 Exiting" -"2019-07-20 02:40:47.948 UTC [gossip.discovery] sendMemResponse -> DEBU 3f67 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f68 Obtaining identity" -"2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f69 Obtaining identity" -"2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f6a Obtaining identity" -"2019-07-20 02:40:47.948 UTC [gossip.comm] Send -> DEBU 3f6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:47.948 UTC [gossip.discovery] sendMemResponse -> DEBU 3f6c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0207" signature:"0E\002!\000\352wg\203En@\245<\254\326t,\356CMH/\274\207\010\226\021.\331,\265\\dr'A\002 x-e@\033\267\315$\035\rM\273\000\257\276_\224\216}\227\025\232\330Z\373\227\201t`s\336*" > alive: alive: alive: " -"2019-07-20 02:40:47.954 UTC [gossip.comm] sendToEndpoint -> DEBU 3f6d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:47.955 UTC [gossip.comm] sendToEndpoint -> DEBU 3f6e Exiting" -"2019-07-20 02:40:47.956 UTC [gossip.comm] func1 -> DEBU 3f6f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:47.956 UTC [gossip.gossip] handleMessage -> DEBU 3f70 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:47.956 UTC [gossip.pull] HandleMessage -> DEBU 3f71 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f72 Obtaining identity" -"2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f73 Obtaining identity" -"2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f74 Obtaining identity" -"2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f75 Obtaining identity" -"2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f76 Obtaining identity" -"2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f77 Obtaining identity" -"2019-07-20 02:40:47.959 UTC [gossip.pull] SendDigest -> DEBU 3f78 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:47.959 UTC [gossip.gossip] handleMessage -> DEBU 3f79 Exiting" -"2019-07-20 02:40:48.235 UTC [gossip.pull] Hello -> DEBU 3f7a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:48.235 UTC [gossip.comm] Send -> DEBU 3f7b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:48.236 UTC [gossip.pull] Hello -> DEBU 3f7c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:48.236 UTC [gossip.comm] Send -> DEBU 3f7d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:48.236 UTC [gossip.pull] Hello -> DEBU 3f7e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:48.236 UTC [gossip.comm] Send -> DEBU 3f7f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f80 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f81 Exiting" -"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f83 Exiting" -"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f84 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f85 Exiting" -"2019-07-20 02:40:48.238 UTC [gossip.comm] func1 -> DEBU 3f86 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.239 UTC [gossip.gossip] handleMessage -> DEBU 3f87 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.240 UTC [gossip.pull] HandleMessage -> DEBU 3f88 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.241 UTC [gossip.gossip] handleMessage -> DEBU 3f8a Exiting" -"2019-07-20 02:40:48.240 UTC [gossip.comm] func1 -> DEBU 3f89 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.242 UTC [gossip.gossip] handleMessage -> DEBU 3f8b Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.242 UTC [gossip.pull] HandleMessage -> DEBU 3f8c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.242 UTC [gossip.gossip] handleMessage -> DEBU 3f8d Exiting" -"2019-07-20 02:40:48.243 UTC [gossip.gossip] handleMessage -> DEBU 3f8e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.243 UTC [gossip.pull] HandleMessage -> DEBU 3f8f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.243 UTC [gossip.gossip] handleMessage -> DEBU 3f90 Exiting" -"2019-07-20 02:40:48.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f91 Obtaining default signing identity" -"2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f92 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151031 " -"2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f93 Sign: digest: 4F74B096134B36ADCB78D9C03AE46F229A5A99113888D4169E87246C9DD09824 " -"2019-07-20 02:40:48.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f94 Obtaining default signing identity" -"2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f95 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:48.279 UTC [msp.identity] Sign -> DEBU 3f96 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:48.279 UTC [gossip.comm] Send -> DEBU 3f97 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:48.279 UTC [msp] DeserializeIdentity -> DEBU 3f98 Obtaining identity" -"2019-07-20 02:40:48.279 UTC [gossip.comm] Send -> DEBU 3f99 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:48.279 UTC [msp] DeserializeIdentity -> DEBU 3f9a Obtaining identity" -"2019-07-20 02:40:48.280 UTC [gossip.comm] Send -> DEBU 3f9b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:48.280 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.280 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9d Exiting" -"2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9f Exiting" -"2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa1 Exiting" -"2019-07-20 02:40:48.284 UTC [gossip.comm] func1 -> DEBU 3fa2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.284 UTC [gossip.gossip] handleMessage -> DEBU 3fa3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.284 UTC [gossip.gossip] handleMessage -> DEBU 3fa4 Exiting" -"2019-07-20 02:40:48.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fa6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:48.285 UTC [gossip.comm] func1 -> DEBU 3fa7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.285 UTC [gossip.gossip] handleMessage -> DEBU 3fa8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.285 UTC [msp.identity] Verify -> DEBU 3fa9 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| -00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" -"2019-07-20 02:40:48.287 UTC [msp.identity] Verify -> DEBU 3faa Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| -00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| -00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| -00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| -00000040 b5 ce 5b 25 de 56 |..[%.V|" -"2019-07-20 02:40:48.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fab Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:48.287 UTC [gossip.discovery] isSentByMe -> DEBU 3fac Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:48.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fad Exiting" -"2019-07-20 02:40:48.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fae Exiting" -"2019-07-20 02:40:48.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3faf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.287 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fb0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:48.287 UTC [msp] DeserializeIdentity -> DEBU 3fb1 Obtaining identity" -"2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fb2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fb3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fb4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fb8 0xc00404e2b0 gate 1563590448288246900 evaluation starts" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fb9 0xc00404e2b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fba 0xc00404e2b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fbb 0xc00404e2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fbc 0xc00404e2b0 principal evaluation fails" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fbd 0xc00404e2b0 gate 1563590448288246900 evaluation fails" -"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fbe Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fc1 0xc00404eaf0 gate 1563590448288608400 evaluation starts" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc2 0xc00404eaf0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc3 0xc00404eaf0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc4 0xc00404eaf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc5 0xc00404eaf0 principal evaluation fails" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fc6 0xc00404eaf0 gate 1563590448288608400 evaluation fails" -"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fca 0xc00404f330 gate 1563590448288892800 evaluation starts" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fcb 0xc00404f330 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fcc 0xc00404f330 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.289 UTC [cauthdsl] func2 -> DEBU 3fcd 0xc00404f330 principal matched by identity 0" -"2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fce Verify: digest = 00000000 82 8a 0c 02 a6 b9 8e b3 5c 66 69 6a d5 56 b4 cc |........\fij.V..| -00000010 7f 8a 2d 1a 82 cc 05 33 81 44 35 ec 18 70 32 e1 |..-....3.D5..p2.|" -"2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fcf Verify: sig = 00000000 30 45 02 21 00 c4 f6 b1 01 4b 6e f7 8e fd 08 a1 |0E.!.....Kn.....| -00000010 ee 32 9f 30 af b8 48 d7 f8 ba 7c 96 af 8e b9 be |.2.0..H...|.....| -00000020 88 dc fa 86 27 02 20 1e 73 d4 0f e3 81 8b e9 c5 |....'. .s.......| -00000030 c5 b7 4c 20 fb 94 a9 c4 93 fe a8 36 38 c9 2b 14 |..L .......68.+.| -00000040 d3 ec c6 8c 3d c1 4c |....=.L|" -"2019-07-20 02:40:48.289 UTC [cauthdsl] func2 -> DEBU 3fd0 0xc00404f330 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.289 UTC [cauthdsl] func1 -> DEBU 3fd1 0xc00404f330 gate 1563590448288892800 evaluation succeeds" -"2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd4 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fd6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fd7 Exiting" -"2019-07-20 02:40:48.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fd8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fd9 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| -00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" -"2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fda Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| -00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| -00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| -00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| -00000040 b5 ce 5b 25 de 56 |..[%.V|" -"2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fdb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:48.289 UTC [gossip.discovery] isSentByMe -> DEBU 3fdc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:48.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fdd Exiting" -"2019-07-20 02:40:48.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fde Exiting" -"2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fdf Exiting" -"2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fe0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fe1 Exiting" -"2019-07-20 02:40:48.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fe2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.290 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fe3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe4 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| -00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" -"2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe5 Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| -00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| -00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| -00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| -00000040 b5 ce 5b 25 de 56 |..[%.V|" -"2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-09-24 00:27:19.826 UTC [msp.identity] Verify -> DEBU 6bba Verify: sig = 00000000 30 45 02 21 00 b3 ac 54 d4 e8 2d 92 15 43 6f af |0E.!...T..-..Co.| +00000010 bb eb c5 99 3e ec 69 f5 f8 a0 1a a2 9b f5 cf c5 |....>.i.........| +00000020 6c 26 b5 80 88 02 20 25 e8 85 e0 d2 8d bc 1d f8 |l&.... %........| +00000030 e1 31 ce 6c 67 ca 53 5d 40 dc ca ec 08 fc df c0 |.1.lg.S]@.......| +00000040 93 89 e4 51 6a 64 2d |...Qjd-|" +"2019-09-24 00:27:19.826 UTC [cauthdsl] func2 -> DEBU 6bbb 0xc0048c3cd0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.826 UTC [cauthdsl] func1 -> DEBU 6bbc 0xc0048c3cd0 gate 1569284839803761200 evaluation succeeds" +"2019-09-24 00:27:19.826 UTC [policies] Evaluate -> DEBU 6bbd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.826 UTC [grpc] infof -> DEBU 6bb9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.827 UTC [policies] Evaluate -> DEBU 6bbe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.827 UTC [policies] Evaluate -> DEBU 6bbf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.827 UTC [policies] Evaluate -> DEBU 6bc0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.827 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bc1 Authenticated 172.18.0.6:7051" +"2019-09-24 00:27:19.827 UTC [msp] DeserializeIdentity -> DEBU 6bc2 Obtaining identity" +"2019-09-24 00:27:19.828 UTC [grpc] infof -> DEBU 6bc3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:19.828 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bc4 Obtaining default signing identity" +"2019-09-24 00:27:19.828 UTC [msp.identity] Sign -> DEBU 6bc5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151056 " +"2019-09-24 00:27:19.828 UTC [msp.identity] Sign -> DEBU 6bc6 Sign: digest: 6C171F712E785F8BD7FD7879D3F6A94980502578649531D7863CC4025538F795 " +"2019-09-24 00:27:19.828 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bc7 Obtaining default signing identity" +"2019-09-24 00:27:19.829 UTC [msp.identity] Sign -> DEBU 6bc8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:19.829 UTC [msp.identity] Sign -> DEBU 6bc9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:19.829 UTC [msp] DeserializeIdentity -> DEBU 6bca Obtaining identity" +"2019-09-24 00:27:19.829 UTC [gossip.comm] Send -> DEBU 6bcb Entering, sending GossipMessage: nonce:2811498400957997343 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:19.830 UTC [gossip.comm] sendToEndpoint -> DEBU 6bcc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:2811498400957997343 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.830 UTC [gossip.comm] createConnection -> DEBU 6bcd Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:27:19.831 UTC [grpc] DialContext -> DEBU 6bce parsed scheme: """ +"2019-09-24 00:27:19.831 UTC [grpc] DialContext -> DEBU 6bcf scheme "" not registered, fallback to default scheme" +"2019-09-24 00:27:19.831 UTC [grpc] watcher -> DEBU 6bd0 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-09-24 00:27:19.831 UTC [grpc] switchBalancer -> DEBU 6bd1 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:27:19.831 UTC [grpc] HandleSubConnStateChange -> DEBU 6bd2 pickfirstBalancer: HandleSubConnStateChange: 0xc00495e730, CONNECTING" +"2019-09-24 00:27:19.833 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bd3 Obtaining default signing identity" +"2019-09-24 00:27:19.834 UTC [msp.identity] Sign -> DEBU 6bd4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151057 " +"2019-09-24 00:27:19.834 UTC [msp.identity] Sign -> DEBU 6bd5 Sign: digest: C82D35B52336760D6B6BC6F992AF1DFF1FACA433E359FB2D619CA704FE628EBF " +"2019-09-24 00:27:19.834 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bd6 Obtaining default signing identity" +"2019-09-24 00:27:19.834 UTC [msp.identity] Sign -> DEBU 6bd7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:19.834 UTC [msp.identity] Sign -> DEBU 6bd8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:19.834 UTC [gossip.comm] Send -> DEBU 6bd9 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:19.835 UTC [msp] DeserializeIdentity -> DEBU 6bda Obtaining identity" +"2019-09-24 00:27:19.835 UTC [gossip.comm] Send -> DEBU 6bdb Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:19.835 UTC [gossip.comm] sendToEndpoint -> DEBU 6bdc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.835 UTC [gossip.comm] createConnection -> DEBU 6bdd Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:27:19.837 UTC [grpc] DialContext -> DEBU 6bde parsed scheme: """ +"2019-09-24 00:27:19.837 UTC [grpc] DialContext -> DEBU 6bdf scheme "" not registered, fallback to default scheme" +"2019-09-24 00:27:19.838 UTC [grpc] watcher -> DEBU 6be0 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +"2019-09-24 00:27:19.838 UTC [grpc] switchBalancer -> DEBU 6be1 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:27:19.838 UTC [grpc] HandleSubConnStateChange -> DEBU 6be2 pickfirstBalancer: HandleSubConnStateChange: 0xc004992f50, CONNECTING" +"2019-09-24 00:27:19.838 UTC [gossip.comm] sendToEndpoint -> DEBU 6be3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.839 UTC [gossip.comm] createConnection -> DEBU 6be4 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:19.840 UTC [grpc] DialContext -> DEBU 6be5 parsed scheme: """ +"2019-09-24 00:27:19.840 UTC [grpc] DialContext -> DEBU 6be6 scheme "" not registered, fallback to default scheme" +"2019-09-24 00:27:19.840 UTC [grpc] watcher -> DEBU 6be7 ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +"2019-09-24 00:27:19.840 UTC [grpc] switchBalancer -> DEBU 6be8 ClientConn switching balancer to "pick_first"" +"2019-09-24 00:27:19.841 UTC [grpc] HandleSubConnStateChange -> DEBU 6be9 pickfirstBalancer: HandleSubConnStateChange: 0xc0049bcdd0, CONNECTING" +"2019-09-24 00:27:19.844 UTC [grpc] HandleSubConnStateChange -> DEBU 6bea pickfirstBalancer: HandleSubConnStateChange: 0xc00495e730, READY" +"2019-09-24 00:27:19.846 UTC [grpc] HandleSubConnStateChange -> DEBU 6beb pickfirstBalancer: HandleSubConnStateChange: 0xc0049bcdd0, READY" +"2019-09-24 00:27:19.846 UTC [grpc] HandleSubConnStateChange -> DEBU 6bec pickfirstBalancer: HandleSubConnStateChange: 0xc004992f50, READY" +"2019-09-24 00:27:19.848 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bed Obtaining default signing identity" +"2019-09-24 00:27:19.848 UTC [msp.identity] Sign -> DEBU 6bee Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:27:19.848 UTC [msp.identity] Sign -> DEBU 6bef Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:27:19.849 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bf0 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051" +"2019-09-24 00:27:19.850 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bf1 Obtaining default signing identity" +"2019-09-24 00:27:19.850 UTC [msp.identity] Sign -> DEBU 6bf2 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:27:19.850 UTC [msp.identity] Sign -> DEBU 6bf3 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:27:19.851 UTC [msp] GetDefaultSigningIdentity -> DEBU 6bf4 Obtaining default signing identity" +"2019-09-24 00:27:19.851 UTC [msp.identity] Sign -> DEBU 6bf5 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-09-24 00:27:19.851 UTC [msp.identity] Sign -> DEBU 6bf6 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-09-24 00:27:19.851 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bf7 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +"2019-09-24 00:27:19.851 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bf8 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +"2019-09-24 00:27:19.852 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bf9 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.5:7051" +"2019-09-24 00:27:19.853 UTC [msp.identity] Verify -> DEBU 6bfa Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-09-24 00:27:19.853 UTC [msp.identity] Verify -> DEBU 6bfb Verify: sig = 00000000 30 44 02 20 43 e9 96 e6 0e e9 59 1c 75 10 40 c7 |0D. C.....Y.u.@.| +00000010 4d 9d 9f 41 84 e3 81 49 1d b7 1a 47 c7 0d f5 53 |M..A...I...G...S| +00000020 0f 47 bd a3 02 20 13 6d 5c 3d d3 d9 7e 57 fb 20 |.G... .m\=..~W. | +00000030 58 0a 9f e3 36 ec e3 ef 54 28 2c c8 59 84 ad 71 |X...6...T(,.Y..q| +00000040 6b 0a 4f 21 80 45 |k.O!.E|" +"2019-09-24 00:27:19.853 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6bfc Authenticated 172.18.0.5:7051" +"2019-09-24 00:27:19.853 UTC [gossip.comm] createConnection -> DEBU 6bfd Exiting" +"2019-09-24 00:27:19.854 UTC [gossip.comm] sendToEndpoint -> DEBU 6bfe Exiting" +"2019-09-24 00:27:19.855 UTC [gossip.comm] func1 -> DEBU 6bff Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.855 UTC [gossip.gossip] handleMessage -> DEBU 6c00 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.855 UTC [gossip.gossip] handleMessage -> DEBU 6c02 Exiting" +"2019-09-24 00:27:19.855 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6c01 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.8:7051" +"2019-09-24 00:27:19.856 UTC [msp] DeserializeIdentity -> DEBU 6c03 Obtaining identity" +"2019-09-24 00:27:19.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.856 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c05 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:19.856 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.856 UTC [msp] DeserializeIdentity -> DEBU 6c07 Obtaining identity" +"2019-09-24 00:27:19.856 UTC [msp.identity] Verify -> DEBU 6c08 Verify: digest = 00000000 c8 2d 35 b5 23 36 76 0d 6b 6b c6 f9 92 af 1d ff |.-5.#6v.kk......| +00000010 1f ac a4 33 e3 59 fb 2d 61 9c a7 04 fe 62 8e bf |...3.Y.-a....b..|" +"2019-09-24 00:27:19.856 UTC [msp.identity] Verify -> DEBU 6c09 Verify: sig = 00000000 30 45 02 21 00 e2 96 fa d2 de fb 21 81 06 a0 03 |0E.!.......!....| +00000010 fe a8 9a 24 52 39 3d f3 f9 d4 9d 6f 73 33 e8 86 |...$R9=....os3..| +00000020 d0 84 c8 66 8a 02 20 12 4d 21 3a 39 71 7a 05 4d |...f.. .M!:9qz.M| +00000030 43 a3 90 de fd 1b cd 3b 4a 13 23 8d 34 da 8b 46 |C......;J.#.4..F| +00000040 a2 1d bd a1 38 60 5e |....8`^|" +"2019-09-24 00:27:19.857 UTC [msp.identity] Verify -> DEBU 6c0b Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe7 Verify: sig = 00000000 30 45 02 21 00 9d b8 1e 88 45 28 58 1c 6b 97 a2 |0E.!.....E(X.k..| -00000010 07 40 cd 30 8f cc 13 2b 52 fc bd 7f ba 82 f6 b7 |.@.0...+R.......| -00000020 ca ea e8 ff fa 02 20 07 e1 9b b7 a0 ea a7 91 cd |...... .........| -00000030 9f 46 66 da 28 f8 65 b3 65 1b 15 fe f4 a6 ca 62 |.Ff.(.e.e......b| -00000040 66 3d 21 b8 a0 da 43 |f=!...C|" -"2019-07-20 02:40:48.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fe8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:48.294 UTC [gossip.discovery] isSentByMe -> DEBU 3fe9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:48.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fea Exiting" -"2019-07-20 02:40:48.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3feb Exiting" -"2019-07-20 02:40:48.336 UTC [gossip.gossip] handleMessage -> DEBU 3fec Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.336 UTC [gossip.pull] HandleMessage -> DEBU 3fed GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.336 UTC [gossip.pull] SendDigest -> DEBU 3fee Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:48.337 UTC [gossip.gossip] handleMessage -> DEBU 3fef Exiting" -"2019-07-20 02:40:48.360 UTC [gossip.gossip] handleMessage -> DEBU 3ff0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.360 UTC [gossip.gossip] handleMessage -> DEBU 3ff1 Exiting" -"2019-07-20 02:40:48.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ff2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ff3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:48.362 UTC [msp.identity] Verify -> DEBU 3ff4 Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| -00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" -"2019-07-20 02:40:48.362 UTC [msp.identity] Verify -> DEBU 3ff5 Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| -00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| -00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| -00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| -00000040 78 fb 75 ea c1 36 cc |x.u..6.|" -"2019-07-20 02:40:48.364 UTC [msp.identity] Verify -> DEBU 3ff6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| -00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:48.364 UTC [msp.identity] Verify -> DEBU 3ff7 Verify: sig = 00000000 30 45 02 21 00 94 e0 00 3e 3a 01 b1 51 f0 f7 8e |0E.!....>:..Q...| -00000010 46 3d 0d 48 fc 27 cc fe f3 27 d5 5c 95 64 3f 93 |F=.H.'...'.\.d?.| -00000020 65 f5 57 cf 0e 02 20 7a 1d 11 1d 3a 13 18 73 b8 |e.W... z...:..s.| -00000030 58 0a c3 bd f3 fc dd 75 f0 16 fb b4 20 62 90 70 |X......u.... b.p| -00000040 2b fa 22 1d f8 89 78 |+."...x|" -"2019-07-20 02:40:48.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ff8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffa updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffc Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffd Exiting" -"2019-07-20 02:40:48.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ffe Exiting" -"2019-07-20 02:40:48.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fff Exiting" -"2019-07-20 02:40:48.366 UTC [gossip.discovery] sendMemResponse -> DEBU 4000 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:48.366 UTC [msp] DeserializeIdentity -> DEBU 4001 Obtaining identity" -"2019-07-20 02:40:48.366 UTC [msp] DeserializeIdentity -> DEBU 4002 Obtaining identity" -"2019-07-20 02:40:48.367 UTC [gossip.comm] Send -> DEBU 4003 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:48.367 UTC [gossip.discovery] sendMemResponse -> DEBU 4004 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > alive: " -"2019-07-20 02:40:48.367 UTC [gossip.comm] sendToEndpoint -> DEBU 4005 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.367 UTC [gossip.comm] sendToEndpoint -> DEBU 4006 Exiting" -"2019-07-20 02:40:48.581 UTC [gossip.comm] func1 -> DEBU 4007 Got message: GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.581 UTC [gossip.gossip] handleMessage -> DEBU 4008 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.581 UTC [gossip.gossip] handleMessage -> DEBU 4009 Exiting" -"2019-07-20 02:40:48.581 UTC [gossip.discovery] handleMsgFromComm -> DEBU 400a Got message: GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.581 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 400b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:48.581 UTC [msp] DeserializeIdentity -> DEBU 400c Obtaining identity" -"2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 400d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400e Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400f Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4010 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4011 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4012 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4013 0xc0040758f0 gate 1563590448582349900 evaluation starts" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4014 0xc0040758f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4015 0xc0040758f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4016 0xc0040758f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4017 0xc0040758f0 principal evaluation fails" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4018 0xc0040758f0 gate 1563590448582349900 evaluation fails" -"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4019 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 401a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 401b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 401c 0xc0040ae130 gate 1563590448582767000 evaluation starts" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401d 0xc0040ae130 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401e 0xc0040ae130 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401f 0xc0040ae130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4020 0xc0040ae130 principal evaluation fails" -"2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4021 0xc0040ae130 gate 1563590448582767000 evaluation fails" -"2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4022 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4023 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4024 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.583 UTC [cauthdsl] func1 -> DEBU 4025 0xc0040ae970 gate 1563590448583184400 evaluation starts" -"2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4026 0xc0040ae970 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4027 0xc0040ae970 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4028 0xc0040ae970 principal matched by identity 0" -"2019-07-20 02:40:48.583 UTC [msp.identity] Verify -> DEBU 4029 Verify: digest = 00000000 c8 4a ac 4f 71 b3 e4 bd 69 2d bb e2 b3 7b 75 dc |.J.Oq...i-...{u.| -00000010 48 0d 1e cf 11 6d 74 d5 b2 c3 cb b7 9b a1 47 43 |H....mt.......GC|" -"2019-07-20 02:40:48.583 UTC [msp.identity] Verify -> DEBU 402a Verify: sig = 00000000 30 45 02 21 00 b8 46 89 61 0a 7f 6e 80 cd cd 78 |0E.!..F.a..n...x| -00000010 c4 0f 6b 13 9a 5f 51 fc 0f 48 3b 47 47 6a 34 ea |..k.._Q..H;GGj4.| -00000020 c9 87 9f 2b 44 02 20 07 f5 8d a1 90 91 28 70 9a |...+D. ......(p.| -00000030 c7 d4 e1 19 a0 0f 1a f1 78 05 1e 8a 3a 1c 3e 8a |........x...:.>.| -00000040 6c 39 6d f0 af 9f 8c |l9m....|" -"2019-07-20 02:40:48.589 UTC [cauthdsl] func2 -> DEBU 402b 0xc0040ae970 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.589 UTC [cauthdsl] func1 -> DEBU 402c 0xc0040ae970 gate 1563590448583184400 evaluation succeeds" -"2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 4030 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4031 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4032 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4033 updating membership: timestamp: " -"2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4034 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4035 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4036 Exiting" -"2019-07-20 02:40:48.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4037 Exiting" -"2019-07-20 02:40:48.589 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4038 Exiting" -"2019-07-20 02:40:48.590 UTC [gossip.discovery] sendMemResponse -> DEBU 4039 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403a Obtaining identity" -"2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403b Obtaining identity" -"2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403c Obtaining identity" -"2019-07-20 02:40:48.590 UTC [gossip.comm] Send -> DEBU 403d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:48.590 UTC [gossip.discovery] sendMemResponse -> DEBU 403e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" > alive:\212l9m\360\257\237\214" > alive: alive: " -"2019-07-20 02:40:48.590 UTC [gossip.comm] sendToEndpoint -> DEBU 403f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.590 UTC [gossip.comm] sendToEndpoint -> DEBU 4040 Exiting" -"2019-07-20 02:40:48.598 UTC [gossip.comm] func1 -> DEBU 4041 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.598 UTC [gossip.gossip] handleMessage -> DEBU 4042 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.598 UTC [gossip.pull] HandleMessage -> DEBU 4043 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4044 Obtaining identity" -"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4045 Obtaining identity" -"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4046 Obtaining identity" -"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4047 Obtaining identity" -"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4048 Obtaining identity" -"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4049 Obtaining identity" -"2019-07-20 02:40:48.598 UTC [gossip.pull] SendDigest -> DEBU 404a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:48.599 UTC [gossip.gossip] handleMessage -> DEBU 404b Exiting" -"2019-07-20 02:40:48.682 UTC [msp] DeserializeIdentity -> DEBU 404c Obtaining identity" -"2019-07-20 02:40:48.682 UTC [msp] DeserializeIdentity -> DEBU 404d Obtaining identity" -"2019-07-20 02:40:48.682 UTC [gossip.comm] Send -> DEBU 404e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 404f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4050 Exiting" -"2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4051 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4052 Exiting" -"2019-07-20 02:40:48.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4053 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4054 Exiting" -"2019-07-20 02:40:48.686 UTC [gossip.comm] func1 -> DEBU 4055 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.686 UTC [gossip.gossip] handleMessage -> DEBU 4056 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.686 UTC [msp] DeserializeIdentity -> DEBU 4057 Obtaining identity" -"2019-07-20 02:40:48.691 UTC [msp.identity] Verify -> DEBU 4058 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:48.691 UTC [msp.identity] Verify -> DEBU 4059 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:48.693 UTC [msp.identity] Verify -> DEBU 405a Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:48.693 UTC [msp.identity] Verify -> DEBU 405b Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:48.694 UTC [msp] DeserializeIdentity -> DEBU 405c Obtaining identity" -"2019-07-20 02:40:48.695 UTC [msp] DeserializeIdentity -> DEBU 405d Obtaining identity" -"2019-07-20 02:40:48.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 405e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:48.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 405f Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.698 UTC [gossip.comm] func1 -> DEBU 4060 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.698 UTC [msp] DeserializeIdentity -> DEBU 4061 Obtaining identity" -"2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4062 Obtaining identity" -"2019-07-20 02:40:48.699 UTC [gossip.comm] Send -> DEBU 4063 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers" -"2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4064 Obtaining identity" -"2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4065 Obtaining identity" -"2019-07-20 02:40:48.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4066 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4067 Exiting" -"2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4068 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4069 Exiting" -"2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 406a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" -"2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 406b Exiting" -"2019-07-20 02:40:48.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 406c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.700 UTC [policies] Evaluate -> DEBU 406d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.700 UTC [policies] Evaluate -> DEBU 406e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.701 UTC [policies] Evaluate -> DEBU 406f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.701 UTC [cauthdsl] func1 -> DEBU 4070 0xc0040e7a20 gate 1563590448701695400 evaluation starts" -"2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4071 0xc0040e7a20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4072 0xc0040e7a20 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4073 0xc0040e7a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4074 0xc0040e7a20 principal evaluation fails" -"2019-07-20 02:40:48.701 UTC [cauthdsl] func1 -> DEBU 4075 0xc0040e7a20 gate 1563590448701695400 evaluation fails" -"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4076 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4077 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4078 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4079 0xc0040fe260 gate 1563590448702099200 evaluation starts" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407a 0xc0040fe260 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407b 0xc0040fe260 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407c 0xc0040fe260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407d 0xc0040fe260 principal evaluation fails" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 407e 0xc0040fe260 gate 1563590448702099200 evaluation fails" -"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 407f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4080 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4081 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4082 0xc0040feaa0 gate 1563590448702416400 evaluation starts" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4083 0xc0040feaa0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4084 0xc0040feaa0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4085 0xc0040feaa0 principal matched by identity 0" -"2019-07-20 02:40:48.702 UTC [msp.identity] Verify -> DEBU 4086 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:48.702 UTC [msp.identity] Verify -> DEBU 4087 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4088 0xc0040feaa0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4089 0xc0040feaa0 gate 1563590448702416400 evaluation succeeds" -"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:48.703 UTC [policies] Evaluate -> DEBU 408d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.703 UTC [msp] DeserializeIdentity -> DEBU 408e Obtaining identity" -"2019-07-20 02:40:48.706 UTC [msp] DeserializeIdentity -> DEBU 408f Obtaining identity" -"2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4090 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4091 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4092 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4093 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4094 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4095 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.707 UTC [cauthdsl] func1 -> DEBU 4096 0xc004112270 gate 1563590448707849800 evaluation starts" -"2019-07-20 02:40:48.707 UTC [cauthdsl] func2 -> DEBU 4097 0xc004112270 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 4098 0xc004112270 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 4099 0xc004112270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 409a 0xc004112270 principal evaluation fails" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 409b 0xc004112270 gate 1563590448707849800 evaluation fails" -"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 409f 0xc004112ab0 gate 1563590448708285200 evaluation starts" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a0 0xc004112ab0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a1 0xc004112ab0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a2 0xc004112ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a3 0xc004112ab0 principal evaluation fails" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 40a4 0xc004112ab0 gate 1563590448708285200 evaluation fails" -"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 40a8 0xc0041132f0 gate 1563590448708639300 evaluation starts" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a9 0xc0041132f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40aa 0xc0041132f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40ab 0xc0041132f0 principal matched by identity 0" -"2019-07-20 02:40:48.708 UTC [msp.identity] Verify -> DEBU 40ac Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:40:48.708 UTC [msp.identity] Verify -> DEBU 40ad Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:40:48.721 UTC [cauthdsl] func2 -> DEBU 40ae 0xc0041132f0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.721 UTC [cauthdsl] func1 -> DEBU 40af 0xc0041132f0 gate 1563590448708639300 evaluation succeeds" -"2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b2 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.721 UTC [msp] DeserializeIdentity -> DEBU 40b4 Obtaining identity" -"2019-07-20 02:40:48.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40b5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40b6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.722 UTC [policies] Evaluate -> DEBU 40b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.722 UTC [policies] Evaluate -> DEBU 40b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40ba 0xc0041283d0 gate 1563590448723144800 evaluation starts" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bb 0xc0041283d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bc 0xc0041283d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bd 0xc0041283d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40be 0xc0041283d0 principal evaluation fails" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40bf 0xc0041283d0 gate 1563590448723144800 evaluation fails" -"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40c3 0xc004128c10 gate 1563590448723461300 evaluation starts" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c4 0xc004128c10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c5 0xc004128c10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c6 0xc004128c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c7 0xc004128c10 principal evaluation fails" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40c8 0xc004128c10 gate 1563590448723461300 evaluation fails" -"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40cc 0xc004129450 gate 1563590448723726100 evaluation starts" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40cd 0xc004129450 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40ce 0xc004129450 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40cf 0xc004129450 principal matched by identity 0" -"2019-07-20 02:40:48.723 UTC [msp.identity] Verify -> DEBU 40d0 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:40:48.723 UTC [msp.identity] Verify -> DEBU 40d1 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:40:48.724 UTC [cauthdsl] func2 -> DEBU 40d2 0xc004129450 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.724 UTC [cauthdsl] func1 -> DEBU 40d3 0xc004129450 gate 1563590448723726100 evaluation succeeds" -"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d6 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.724 UTC [gossip.gossip] handleMessage -> DEBU 40d8 Exiting" -"2019-07-20 02:40:48.724 UTC [gossip.gossip] handleMessage -> DEBU 40d9 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.724 UTC [msp.identity] Verify -> DEBU 40da Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:48.724 UTC [msp.identity] Verify -> DEBU 40db Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:48.724 UTC [msp] DeserializeIdentity -> DEBU 40dc Obtaining identity" -"2019-07-20 02:40:48.724 UTC [msp] DeserializeIdentity -> DEBU 40dd Obtaining identity" -"2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40df Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40e0 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.724 UTC [cauthdsl] func1 -> DEBU 40e4 0xc004133580 gate 1563590448724944600 evaluation starts" -"2019-07-20 02:40:48.724 UTC [cauthdsl] func2 -> DEBU 40e5 0xc004133580 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.725 UTC [cauthdsl] func2 -> DEBU 40e6 0xc004133580 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.726 UTC [cauthdsl] func2 -> DEBU 40e7 0xc004133580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:48.726 UTC [cauthdsl] func2 -> DEBU 40e8 0xc004133580 principal evaluation fails" -"2019-07-20 02:40:48.727 UTC [cauthdsl] func1 -> DEBU 40e9 0xc004133580 gate 1563590448724944600 evaluation fails" -"2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40ea Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.727 UTC [cauthdsl] func1 -> DEBU 40ed 0xc004133dc0 gate 1563590448727397200 evaluation starts" -"2019-07-20 02:40:48.727 UTC [cauthdsl] func2 -> DEBU 40ee 0xc004133dc0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40ef 0xc004133dc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40f0 0xc004133dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40f1 0xc004133dc0 principal evaluation fails" -"2019-07-20 02:40:48.728 UTC [cauthdsl] func1 -> DEBU 40f2 0xc004133dc0 gate 1563590448727397200 evaluation fails" -"2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.729 UTC [cauthdsl] func1 -> DEBU 40f6 0xc004150600 gate 1563590448728648400 evaluation starts" -"2019-07-20 02:40:48.729 UTC [cauthdsl] func2 -> DEBU 40f7 0xc004150600 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.731 UTC [cauthdsl] func2 -> DEBU 40f8 0xc004150600 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.732 UTC [cauthdsl] func2 -> DEBU 40f9 0xc004150600 principal matched by identity 0" -"2019-07-20 02:40:48.732 UTC [msp.identity] Verify -> DEBU 40fa Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| -00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" -"2019-07-20 02:40:48.732 UTC [msp.identity] Verify -> DEBU 40fb Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| -00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| -00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| -00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| -00000040 c6 3a 0c 54 03 2f |.:.T./|" -"2019-07-20 02:40:48.732 UTC [cauthdsl] func2 -> DEBU 40fc 0xc004150600 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.732 UTC [cauthdsl] func1 -> DEBU 40fd 0xc004150600 gate 1563590448728648400 evaluation succeeds" -"2019-07-20 02:40:48.732 UTC [policies] Evaluate -> DEBU 40fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 40ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4100 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4101 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.733 UTC [msp] DeserializeIdentity -> DEBU 4102 Obtaining identity" -"2019-07-20 02:40:48.733 UTC [msp] DeserializeIdentity -> DEBU 4103 Obtaining identity" -"2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4104 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4105 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4106 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4107 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4108 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4109 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.733 UTC [cauthdsl] func1 -> DEBU 410a 0xc004151dd0 gate 1563590448733828600 evaluation starts" -"2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410b 0xc004151dd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410c 0xc004151dd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410d 0xc004151dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410e 0xc004151dd0 principal evaluation fails" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 410f 0xc004151dd0 gate 1563590448733828600 evaluation fails" -"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4110 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4111 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4112 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4113 0xc004162610 gate 1563590448734115800 evaluation starts" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4114 0xc004162610 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4115 0xc004162610 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4116 0xc004162610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4117 0xc004162610 principal evaluation fails" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4118 0xc004162610 gate 1563590448734115800 evaluation fails" -"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4119 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 411a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 411b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 411c 0xc004162e50 gate 1563590448734427300 evaluation starts" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411d 0xc004162e50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411e 0xc004162e50 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411f 0xc004162e50 principal matched by identity 0" -"2019-07-20 02:40:48.734 UTC [msp.identity] Verify -> DEBU 4120 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:48.734 UTC [msp.identity] Verify -> DEBU 4121 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4122 0xc004162e50 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4123 0xc004162e50 gate 1563590448734427300 evaluation succeeds" -"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4124 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4125 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4126 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4127 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.735 UTC [msp.identity] Verify -> DEBU 4128 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:40:48.735 UTC [msp.identity] Verify -> DEBU 4129 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:40:48.735 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412a Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.735 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412b Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.735 UTC [msp] DeserializeIdentity -> DEBU 412f Obtaining identity" -"2019-07-20 02:40:48.735 UTC [msp.identity] newIdentity -> DEBU 4130 Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:27:19.857 UTC [msp.identity] Verify -> DEBU 6c0c Verify: sig = 00000000 30 44 02 20 16 6c 15 d6 70 75 70 67 f0 1f 64 0a |0D. .l..pupg..d.| +00000010 d6 5c a8 e1 44 dc b3 92 c1 7e 5a 60 97 4e ec 33 |.\..D....~Z`.N.3| +00000020 cb 6e f3 65 02 20 71 cb 12 8c 78 c6 77 6e e3 c5 |.n.e. q...x.wn..| +00000030 9c 71 8b b7 18 10 cf 61 59 62 b7 7d ef b8 0b 46 |.q.....aYb.}...F| +00000040 c2 94 ce 79 f8 05 |...y..|" +"2019-09-24 00:27:19.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c0d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:19.857 UTC [gossip.discovery] isSentByMe -> DEBU 6c0e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:19.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c0f Exiting" +"2019-09-24 00:27:19.858 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c10 Exiting" +"2019-09-24 00:27:19.857 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.858 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6c11 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.6:7051" +"2019-09-24 00:27:19.858 UTC [msp] DeserializeIdentity -> DEBU 6c12 Obtaining identity" +"2019-09-24 00:27:19.858 UTC [msp] DeserializeIdentity -> DEBU 6c13 Obtaining identity" +"2019-09-24 00:27:19.858 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.858 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c15 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.858 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c16 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.859 UTC [policies] Evaluate -> DEBU 6c17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.859 UTC [policies] Evaluate -> DEBU 6c18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.859 UTC [policies] Evaluate -> DEBU 6c1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.859 UTC [cauthdsl] func1 -> DEBU 6c1b 0xc0050b6ae0 gate 1569284839859439500 evaluation starts" +"2019-09-24 00:27:19.859 UTC [cauthdsl] func2 -> DEBU 6c1c 0xc0050b6ae0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.859 UTC [cauthdsl] func2 -> DEBU 6c1d 0xc0050b6ae0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.860 UTC [cauthdsl] func2 -> DEBU 6c1e 0xc0050b6ae0 principal matched by identity 0" +"2019-09-24 00:27:19.860 UTC [msp.identity] Verify -> DEBU 6c1f Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-09-24 00:27:19.860 UTC [msp.identity] Verify -> DEBU 6c20 Verify: sig = 00000000 30 44 02 20 6b 42 17 e0 43 32 d0 51 5c 50 1a 2f |0D. kB..C2.Q\P./| +00000010 b1 a2 c1 aa cc 24 48 1a 08 44 97 64 c9 fe b1 72 |.....$H..D.d...r| +00000020 96 db 58 f5 02 20 2e 32 e7 7a 62 7c 80 4d c3 3a |..X.. .2.zb|.M.:| +00000030 c9 e2 53 09 90 80 ce d1 ce 5d 78 22 db bb 59 ca |..S......]x"..Y.| +00000040 d4 66 db 61 bd 20 |.f.a. |" +"2019-09-24 00:27:19.861 UTC [cauthdsl] func2 -> DEBU 6c21 0xc0050b6ae0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.861 UTC [cauthdsl] func1 -> DEBU 6c22 0xc0050b6ae0 gate 1569284839859439500 evaluation succeeds" +"2019-09-24 00:27:19.861 UTC [policies] Evaluate -> DEBU 6c23 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.861 UTC [policies] Evaluate -> DEBU 6c24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.861 UTC [policies] Evaluate -> DEBU 6c25 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.861 UTC [policies] Evaluate -> DEBU 6c26 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.861 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6c27 Authenticated 172.18.0.8:7051" +"2019-09-24 00:27:19.862 UTC [gossip.comm] createConnection -> DEBU 6c28 Exiting" +"2019-09-24 00:27:19.862 UTC [gossip.comm] sendToEndpoint -> DEBU 6c29 Exiting" +"2019-09-24 00:27:19.858 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c19 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.862 UTC [msp] DeserializeIdentity -> DEBU 6c2a Obtaining identity" +"2019-09-24 00:27:19.863 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c2b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.863 UTC [msp] DeserializeIdentity -> DEBU 6c2c Obtaining identity" +"2019-09-24 00:27:19.863 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c2d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.863 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c2e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.864 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c2f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.864 UTC [policies] Evaluate -> DEBU 6c30 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.864 UTC [policies] Evaluate -> DEBU 6c31 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.864 UTC [policies] Evaluate -> DEBU 6c32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.864 UTC [cauthdsl] func1 -> DEBU 6c33 0xc0050d2b60 gate 1569284839864716900 evaluation starts" +"2019-09-24 00:27:19.864 UTC [cauthdsl] func2 -> DEBU 6c34 0xc0050d2b60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.865 UTC [cauthdsl] func2 -> DEBU 6c35 0xc0050d2b60 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.865 UTC [cauthdsl] func2 -> DEBU 6c36 0xc0050d2b60 principal matched by identity 0" +"2019-09-24 00:27:19.865 UTC [msp.identity] Verify -> DEBU 6c37 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-09-24 00:27:19.865 UTC [msp.identity] Verify -> DEBU 6c38 Verify: sig = 00000000 30 44 02 20 5a 07 89 7f 52 9c ec 38 2b 71 60 26 |0D. Z...R..8+q`&| +00000010 b6 e1 a6 21 a8 02 78 44 fc 3a 6c 5f 61 cc 72 ea |...!..xD.:l_a.r.| +00000020 a7 ad e6 8f 02 20 61 50 ea 63 79 76 18 38 7f 5f |..... aP.cyv.8._| +00000030 98 b0 ac 91 16 06 30 99 16 a2 51 3d b0 a6 35 69 |......0...Q=..5i| +00000040 fc af ae 69 54 04 |...iT.|" +"2019-09-24 00:27:19.865 UTC [cauthdsl] func2 -> DEBU 6c39 0xc0050d2b60 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.866 UTC [cauthdsl] func1 -> DEBU 6c3a 0xc0050d2b60 gate 1569284839864716900 evaluation succeeds" +"2019-09-24 00:27:19.866 UTC [policies] Evaluate -> DEBU 6c3b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.866 UTC [policies] Evaluate -> DEBU 6c3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.866 UTC [policies] Evaluate -> DEBU 6c3d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.866 UTC [policies] Evaluate -> DEBU 6c3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.866 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6c3f Authenticated 172.18.0.6:7051" +"2019-09-24 00:27:19.867 UTC [gossip.comm] createConnection -> DEBU 6c40 Exiting" +"2019-09-24 00:27:19.867 UTC [gossip.comm] sendToEndpoint -> DEBU 6c41 Exiting" +"2019-09-24 00:27:19.867 UTC [gossip.comm] func1 -> DEBU 6c42 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.868 UTC [gossip.gossip] handleMessage -> DEBU 6c43 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.868 UTC [gossip.comm] func1 -> DEBU 6c44 Got message: GossipMessage: Channel: , nonce: 2811498400957997343, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.868 UTC [gossip.gossip] handleMessage -> DEBU 6c45 Exiting" +"2019-09-24 00:27:19.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.869 UTC [gossip.gossip] handleMessage -> DEBU 6c47 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 2811498400957997343, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.869 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c48 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:19.870 UTC [msp] DeserializeIdentity -> DEBU 6c49 Obtaining identity" +"2019-09-24 00:27:19.870 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c4a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.870 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c4b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.870 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c4c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.871 UTC [policies] Evaluate -> DEBU 6c4d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.871 UTC [policies] Evaluate -> DEBU 6c4e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.871 UTC [policies] Evaluate -> DEBU 6c4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.871 UTC [cauthdsl] func1 -> DEBU 6c50 0xc0050e61a0 gate 1569284839871432700 evaluation starts" +"2019-09-24 00:27:19.871 UTC [cauthdsl] func2 -> DEBU 6c51 0xc0050e61a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.871 UTC [cauthdsl] func2 -> DEBU 6c52 0xc0050e61a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.871 UTC [cauthdsl] func2 -> DEBU 6c53 0xc0050e61a0 principal matched by identity 0" +"2019-09-24 00:27:19.872 UTC [msp.identity] Verify -> DEBU 6c54 Verify: digest = 00000000 66 ce 27 f9 48 4d ad eb 61 54 a3 e4 99 22 be c2 |f.'.HM..aT..."..| +00000010 2c f4 1a b0 14 57 34 a6 9b 1f 2f 29 dc 39 a6 28 |,....W4.../).9.(|" +"2019-09-24 00:27:19.872 UTC [msp.identity] Verify -> DEBU 6c55 Verify: sig = 00000000 30 44 02 20 4e d6 f6 48 83 5b 09 83 e5 6b bb ed |0D. N..H.[...k..| +00000010 cf 30 72 43 c0 4a 49 1a 0d 65 b3 4b 29 80 1f 00 |.0rC.JI..e.K)...| +00000020 23 af 10 32 02 20 6c fe ac 4c 50 4f a3 31 0f 6f |#..2. l..LPO.1.o| +00000030 b0 17 47 1a b1 10 ce 7f 61 d6 eb fd 9f 27 37 6f |..G.....a....'7o| +00000040 2b 86 38 50 bf d1 |+.8P..|" +"2019-09-24 00:27:19.872 UTC [cauthdsl] func2 -> DEBU 6c56 0xc0050e61a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.873 UTC [cauthdsl] func1 -> DEBU 6c57 0xc0050e61a0 gate 1569284839871432700 evaluation succeeds" +"2019-09-24 00:27:19.873 UTC [policies] Evaluate -> DEBU 6c58 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.873 UTC [policies] Evaluate -> DEBU 6c59 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.873 UTC [policies] Evaluate -> DEBU 6c5a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.873 UTC [policies] Evaluate -> DEBU 6c5b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c5c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:19.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c5d Exiting" +"2019-09-24 00:27:19.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c5e Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:19.874 UTC [msp.identity] Verify -> DEBU 6c5f Verify: digest = 00000000 3b 6e 18 85 73 f9 5b 5f 95 c3 13 13 b7 8e 6d c6 |;n..s.[_......m.| +00000010 26 f4 2f a0 e8 8b af 5a c8 0b 66 dc 97 6e 10 a1 |&./....Z..f..n..|" +"2019-09-24 00:27:19.874 UTC [msp.identity] Verify -> DEBU 6c60 Verify: sig = 00000000 30 44 02 20 5e 1e e9 f7 1b ce f4 b4 50 95 66 cf |0D. ^.......P.f.| +00000010 7f f5 20 84 98 a4 83 43 a3 6f 91 13 a8 08 88 a9 |.. ....C.o......| +00000020 18 c6 ea f7 02 20 71 8c 55 9c 49 a4 cb 96 1a 36 |..... q.U.I....6| +00000030 12 6f 38 2f 1d 42 79 59 03 fd 4f f7 f7 35 74 0a |.o8/.ByY..O..5t.| +00000040 9d 7c 02 39 29 03 |.|.9).|" +"2019-09-24 00:27:19.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c61 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:19.874 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c62 Exiting" +"2019-09-24 00:27:19.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c63 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:19.875 UTC [msp.identity] Verify -> DEBU 6c64 Verify: digest = 00000000 c8 2d 35 b5 23 36 76 0d 6b 6b c6 f9 92 af 1d ff |.-5.#6v.kk......| +00000010 1f ac a4 33 e3 59 fb 2d 61 9c a7 04 fe 62 8e bf |...3.Y.-a....b..|" +"2019-09-24 00:27:19.875 UTC [msp.identity] Verify -> DEBU 6c65 Verify: sig = 00000000 30 45 02 21 00 e2 96 fa d2 de fb 21 81 06 a0 03 |0E.!.......!....| +00000010 fe a8 9a 24 52 39 3d f3 f9 d4 9d 6f 73 33 e8 86 |...$R9=....os3..| +00000020 d0 84 c8 66 8a 02 20 12 4d 21 3a 39 71 7a 05 4d |...f.. .M!:9qz.M| +00000030 43 a3 90 de fd 1b cd 3b 4a 13 23 8d 34 da 8b 46 |C......;J.#.4..F| +00000040 a2 1d bd a1 38 60 5e |....8`^|" +"2019-09-24 00:27:19.875 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c66 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.876 UTC [gossip.discovery] isSentByMe -> DEBU 6c67 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c68 Exiting" +"2019-09-24 00:27:19.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c69 Exiting" +"2019-09-24 00:27:19.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c6a Got message: GossipMessage: Channel: , nonce: 2811498400957997343, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.876 UTC [gossip.gossip] handleMessage -> DEBU 6c6b Exiting" +"2019-09-24 00:27:19.876 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c6c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:19.876 UTC [msp.identity] Verify -> DEBU 6c6d Verify: digest = 00000000 3b 6e 18 85 73 f9 5b 5f 95 c3 13 13 b7 8e 6d c6 |;n..s.[_......m.| +00000010 26 f4 2f a0 e8 8b af 5a c8 0b 66 dc 97 6e 10 a1 |&./....Z..f..n..|" +"2019-09-24 00:27:19.877 UTC [msp.identity] Verify -> DEBU 6c6e Verify: sig = 00000000 30 44 02 20 5e 1e e9 f7 1b ce f4 b4 50 95 66 cf |0D. ^.......P.f.| +00000010 7f f5 20 84 98 a4 83 43 a3 6f 91 13 a8 08 88 a9 |.. ....C.o......| +00000020 18 c6 ea f7 02 20 71 8c 55 9c 49 a4 cb 96 1a 36 |..... q.U.I....6| +00000030 12 6f 38 2f 1d 42 79 59 03 fd 4f f7 f7 35 74 0a |.o8/.ByY..O..5t.| +00000040 9d 7c 02 39 29 03 |.|.9).|" +"2019-09-24 00:27:19.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c6f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:19.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c70 Exiting" +"2019-09-24 00:27:19.877 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c71 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:19.877 UTC [msp.identity] Verify -> DEBU 6c72 Verify: digest = 00000000 6c 17 1f 71 2e 78 5f 8b d7 fd 78 79 d3 f6 a9 49 |l..q.x_...xy...I| +00000010 80 50 25 78 64 95 31 d7 86 3c c4 02 55 38 f7 95 |.P%xd.1..<..U8..|" +"2019-09-24 00:27:19.877 UTC [msp.identity] Verify -> DEBU 6c73 Verify: sig = 00000000 30 44 02 20 60 73 a7 d3 7a a1 59 99 98 f5 18 58 |0D. `s..z.Y....X| +00000010 75 e7 b3 d0 6d 61 2e da f0 cc 76 52 b0 56 be 08 |u...ma....vR.V..| +00000020 0b cc 77 6a 02 20 48 85 ac 4d a9 64 c2 2e e4 c4 |..wj. H..M.d....| +00000030 d0 80 35 78 51 62 c2 f5 90 ce b9 38 30 25 fe 6e |..5xQb.....80%.n| +00000040 08 3b 1f c7 84 57 |.;...W|" +"2019-09-24 00:27:19.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c74 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:19.877 UTC [gossip.discovery] isSentByMe -> DEBU 6c75 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:19.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c76 Exiting" +"2019-09-24 00:27:19.877 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6c77 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:19.877 UTC [msp] DeserializeIdentity -> DEBU 6c78 Obtaining identity" +"2019-09-24 00:27:19.877 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6c79 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.877 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c7a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.877 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6c7b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.877 UTC [policies] Evaluate -> DEBU 6c7c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.877 UTC [policies] Evaluate -> DEBU 6c7d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.877 UTC [policies] Evaluate -> DEBU 6c7e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.878 UTC [cauthdsl] func1 -> DEBU 6c7f 0xc00511a740 gate 1569284839877992200 evaluation starts" +"2019-09-24 00:27:19.878 UTC [cauthdsl] func2 -> DEBU 6c80 0xc00511a740 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.878 UTC [cauthdsl] func2 -> DEBU 6c81 0xc00511a740 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.878 UTC [cauthdsl] func2 -> DEBU 6c82 0xc00511a740 principal matched by identity 0" +"2019-09-24 00:27:19.878 UTC [msp.identity] Verify -> DEBU 6c83 Verify: digest = 00000000 4b 03 6b 9a 50 b5 a8 00 f1 a2 80 7a 36 cb e7 ce |K.k.P......z6...| +00000010 f5 90 cd 58 c9 e9 6b 0d 41 a3 e0 47 53 72 71 fa |...X..k.A..GSrq.|" +"2019-09-24 00:27:19.878 UTC [msp.identity] Verify -> DEBU 6c84 Verify: sig = 00000000 30 45 02 21 00 8c d4 5b 9f 5a e8 b6 6e ab 54 86 |0E.!...[.Z..n.T.| +00000010 45 84 92 b1 a5 40 d5 40 02 8d b9 2e 2d 25 6f 82 |E....@.@....-%o.| +00000020 7a fa 77 af c7 02 20 4b 32 66 85 a0 d4 2f 47 d0 |z.w... K2f.../G.| +00000030 54 de 6c 1d 94 5e 13 67 65 6f 42 55 c8 18 32 c2 |T.l..^.geoBU..2.| +00000040 15 50 50 07 82 09 3e |.PP...>|" +"2019-09-24 00:27:19.878 UTC [cauthdsl] func2 -> DEBU 6c85 0xc00511a740 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.878 UTC [cauthdsl] func1 -> DEBU 6c86 0xc00511a740 gate 1569284839877992200 evaluation succeeds" +"2019-09-24 00:27:19.878 UTC [policies] Evaluate -> DEBU 6c87 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.878 UTC [policies] Evaluate -> DEBU 6c88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.878 UTC [policies] Evaluate -> DEBU 6c89 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.878 UTC [policies] Evaluate -> DEBU 6c8a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c8b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c8c endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" lastAliveTS: 1569284680646799100, 90 but got ts: inc_num:1569284680646799100 seq_num:89 " +"2019-09-24 00:27:19.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 6c8d Exiting" +"2019-09-24 00:27:19.878 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c8e Exiting" +"2019-09-24 00:27:19.881 UTC [gossip.comm] func1 -> DEBU 6c8f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.882 UTC [gossip.gossip] handleMessage -> DEBU 6c90 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.883 UTC [gossip.pull] HandleMessage -> DEBU 6c91 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.883 UTC [msp] DeserializeIdentity -> DEBU 6c92 Obtaining identity" +"2019-09-24 00:27:19.883 UTC [msp] DeserializeIdentity -> DEBU 6c93 Obtaining identity" +"2019-09-24 00:27:19.884 UTC [msp] DeserializeIdentity -> DEBU 6c94 Obtaining identity" +"2019-09-24 00:27:19.885 UTC [msp] DeserializeIdentity -> DEBU 6c95 Obtaining identity" +"2019-09-24 00:27:19.885 UTC [msp] DeserializeIdentity -> DEBU 6c96 Obtaining identity" +"2019-09-24 00:27:19.886 UTC [msp] DeserializeIdentity -> DEBU 6c97 Obtaining identity" +"2019-09-24 00:27:19.886 UTC [gossip.pull] SendDigest -> DEBU 6c98 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:27:19.886 UTC [gossip.gossip] handleMessage -> DEBU 6c99 Exiting" +"2019-09-24 00:27:19.912 UTC [gossip.comm] func1 -> DEBU 6c9a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.913 UTC [gossip.gossip] handleMessage -> DEBU 6c9b Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.914 UTC [gossip.gossip] handleMessage -> DEBU 6c9c Exiting" +"2019-09-24 00:27:19.916 UTC [gossip.comm] func1 -> DEBU 6c9d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.917 UTC [gossip.gossip] handleMessage -> DEBU 6c9f Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6c9e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6ca0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:19.919 UTC [msp] DeserializeIdentity -> DEBU 6ca1 Obtaining identity" +"2019-09-24 00:27:19.919 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6ca2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ca3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ca4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.920 UTC [policies] Evaluate -> DEBU 6ca5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.921 UTC [policies] Evaluate -> DEBU 6ca6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.921 UTC [policies] Evaluate -> DEBU 6ca7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.921 UTC [cauthdsl] func1 -> DEBU 6ca8 0xc00512f250 gate 1569284839921670100 evaluation starts" +"2019-09-24 00:27:19.922 UTC [cauthdsl] func2 -> DEBU 6ca9 0xc00512f250 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.922 UTC [cauthdsl] func2 -> DEBU 6caa 0xc00512f250 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.922 UTC [cauthdsl] func2 -> DEBU 6cab 0xc00512f250 principal matched by identity 0" +"2019-09-24 00:27:19.923 UTC [msp.identity] Verify -> DEBU 6cac Verify: digest = 00000000 98 8f 25 8b e3 5a 85 d0 a7 ef 5c bd c9 31 d5 ee |..%..Z....\..1..| +00000010 e2 36 a1 db 87 1f 45 9f 66 b0 46 f0 84 9a 3f 68 |.6....E.f.F...?h|" +"2019-09-24 00:27:19.923 UTC [msp.identity] Verify -> DEBU 6cad Verify: sig = 00000000 30 45 02 21 00 d8 72 0f 07 bb d9 69 93 4e 3e a9 |0E.!..r....i.N>.| +00000010 8d a1 7a 4b 1d ac 82 51 6c fc fc 0c f7 3f ac 4b |..zK...Ql....?.K| +00000020 3a 2c 36 11 98 02 20 0f 50 59 12 d6 e3 5e 9e 39 |:,6... .PY...^.9| +00000030 e8 a6 37 08 9f 2a 64 29 b5 84 dd 19 90 c0 67 08 |..7..*d)......g.| +00000040 08 1d 60 aa 0e f1 92 |..`....|" +"2019-09-24 00:27:19.924 UTC [cauthdsl] func2 -> DEBU 6cae 0xc00512f250 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.924 UTC [cauthdsl] func1 -> DEBU 6caf 0xc00512f250 gate 1569284839921670100 evaluation succeeds" +"2019-09-24 00:27:19.924 UTC [policies] Evaluate -> DEBU 6cb0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.925 UTC [policies] Evaluate -> DEBU 6cb1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.926 UTC [policies] Evaluate -> DEBU 6cb2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.926 UTC [policies] Evaluate -> DEBU 6cb3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.926 UTC [gossip.discovery] handleAliveMessage -> DEBU 6cb4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.926 UTC [gossip.discovery] resurrectMember -> DEBU 6cb5 Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes t: {1569284680017232100 87 {} [] 0}" +"2019-09-24 00:27:19.927 UTC [gossip.discovery] resurrectMember -> DEBU 6cb6 Exiting" +"2019-09-24 00:27:19.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 6cb7 Exiting" +"2019-09-24 00:27:19.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cb8 Exiting" +"2019-09-24 00:27:19.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cb9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cba Exiting" +"2019-09-24 00:27:19.930 UTC [gossip.gossip] handleMessage -> DEBU 6cbb Exiting" +"2019-09-24 00:27:19.933 UTC [msp] DeserializeIdentity -> DEBU 6cbc Obtaining identity" +"2019-09-24 00:27:19.934 UTC [msp] DeserializeIdentity -> DEBU 6cbd Obtaining identity" +"2019-09-24 00:27:19.934 UTC [gossip.comm] func1 -> DEBU 6cbe Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.934 UTC [msp] DeserializeIdentity -> DEBU 6cbf Obtaining identity" +"2019-09-24 00:27:19.934 UTC [gossip.gossip] handleMessage -> DEBU 6cc0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.934 UTC [gossip.gossip] handleMessage -> DEBU 6cc1 Exiting" +"2019-09-24 00:27:19.934 UTC [msp] DeserializeIdentity -> DEBU 6cc2 Obtaining identity" +"2019-09-24 00:27:19.935 UTC [msp] DeserializeIdentity -> DEBU 6cc3 Obtaining identity" +"2019-09-24 00:27:19.935 UTC [msp] DeserializeIdentity -> DEBU 6cc4 Obtaining identity" +"2019-09-24 00:27:19.935 UTC [gossip.comm] Send -> DEBU 6cc6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:19.935 UTC [msp] DeserializeIdentity -> DEBU 6cc7 Obtaining identity" +"2019-09-24 00:27:19.936 UTC [msp] DeserializeIdentity -> DEBU 6cc8 Obtaining identity" +"2019-09-24 00:27:19.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cc5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.936 UTC [gossip.comm] Send -> DEBU 6cca Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:19.936 UTC [gossip.comm] sendToEndpoint -> DEBU 6ccb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.936 UTC [gossip.comm] sendToEndpoint -> DEBU 6ccc Exiting" +"2019-09-24 00:27:19.936 UTC [gossip.comm] sendToEndpoint -> DEBU 6ccd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cc9 Exiting" +"2019-09-24 00:27:19.937 UTC [gossip.comm] sendToEndpoint -> DEBU 6cce Exiting" +"2019-09-24 00:27:19.992 UTC [gossip.comm] func1 -> DEBU 6ccf Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.993 UTC [gossip.gossip] handleMessage -> DEBU 6cd0 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cd1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:19.993 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6cd2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:19.994 UTC [msp] DeserializeIdentity -> DEBU 6cd3 Obtaining identity" +"2019-09-24 00:27:19.994 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6cd4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:19.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6cd5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.994 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6cd6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:19.995 UTC [policies] Evaluate -> DEBU 6cd7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:19.995 UTC [policies] Evaluate -> DEBU 6cd8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:19.995 UTC [policies] Evaluate -> DEBU 6cd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:19.996 UTC [cauthdsl] func1 -> DEBU 6cda 0xc00514d7c0 gate 1569284839996087400 evaluation starts" +"2019-09-24 00:27:19.996 UTC [cauthdsl] func2 -> DEBU 6cdb 0xc00514d7c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:19.996 UTC [cauthdsl] func2 -> DEBU 6cdc 0xc00514d7c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:19.996 UTC [cauthdsl] func2 -> DEBU 6cdd 0xc00514d7c0 principal matched by identity 0" +"2019-09-24 00:27:19.997 UTC [msp.identity] Verify -> DEBU 6cde Verify: digest = 00000000 30 9d 24 5a 67 49 98 bd 15 e2 81 43 15 40 6e 56 |0.$ZgI.....C.@nV| +00000010 3a 47 00 65 f9 aa ed a3 a0 96 84 ad 03 5c 64 8c |:G.e.........\d.|" +"2019-09-24 00:27:19.997 UTC [msp.identity] Verify -> DEBU 6cdf Verify: sig = 00000000 30 45 02 21 00 b6 c2 ed 69 38 4a 2b d6 78 bb b3 |0E.!....i8J+.x..| +00000010 81 3f 1d 7e db 6d 02 c3 be c3 30 c8 f2 2e b7 d4 |.?.~.m....0.....| +00000020 1a bd 0d c2 75 02 20 6b ea 07 39 ca 87 e3 7e 10 |....u. k..9...~.| +00000030 9a 23 a1 3d ff d1 ea f5 5a 6d a9 6e 79 37 39 4f |.#.=....Zm.ny79O| +00000040 6e d0 43 77 cc ef 94 |n.Cw...|" +"2019-09-24 00:27:19.998 UTC [cauthdsl] func2 -> DEBU 6ce0 0xc00514d7c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:19.998 UTC [cauthdsl] func1 -> DEBU 6ce1 0xc00514d7c0 gate 1569284839996087400 evaluation succeeds" +"2019-09-24 00:27:19.998 UTC [policies] Evaluate -> DEBU 6ce2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.998 UTC [policies] Evaluate -> DEBU 6ce3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:19.999 UTC [policies] Evaluate -> DEBU 6ce4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:19.999 UTC [policies] Evaluate -> DEBU 6ce5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:19.999 UTC [gossip.discovery] handleAliveMessage -> DEBU 6ce6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:19.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ce7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:20.000 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ce8 updating membership: timestamp: " +"2019-09-24 00:27:20.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ce9 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:20.002 UTC [gossip.discovery] learnExistingMembers -> DEBU 6cea Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:20.003 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ceb Exiting" +"2019-09-24 00:27:19.993 UTC [gossip.gossip] handleMessage -> DEBU 6cec Exiting" +"2019-09-24 00:27:20.003 UTC [gossip.discovery] handleAliveMessage -> DEBU 6ced Exiting" +"2019-09-24 00:27:20.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6cee Exiting" +"2019-09-24 00:27:20.004 UTC [gossip.discovery] sendMemResponse -> DEBU 6cef Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:27:20.004 UTC [msp] DeserializeIdentity -> DEBU 6cf0 Obtaining identity" +"2019-09-24 00:27:20.005 UTC [msp] DeserializeIdentity -> DEBU 6cf1 Obtaining identity" +"2019-09-24 00:27:20.005 UTC [msp] DeserializeIdentity -> DEBU 6cf2 Obtaining identity" +"2019-09-24 00:27:20.005 UTC [gossip.comm] Send -> DEBU 6cf3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:20.006 UTC [gossip.discovery] sendMemResponse -> DEBU 6cf4 Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" > alive: " +"2019-09-24 00:27:20.006 UTC [gossip.comm] sendToEndpoint -> DEBU 6cf5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.006 UTC [gossip.comm] sendToEndpoint -> DEBU 6cf6 Exiting" +"2019-09-24 00:27:20.051 UTC [msp] DeserializeIdentity -> DEBU 6cf7 Obtaining identity" +"2019-09-24 00:27:20.051 UTC [msp] DeserializeIdentity -> DEBU 6cf8 Obtaining identity" +"2019-09-24 00:27:20.053 UTC [gossip.comm] Send -> DEBU 6cf9 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:27:20.053 UTC [gossip.comm] sendToEndpoint -> DEBU 6cfa Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.053 UTC [gossip.comm] sendToEndpoint -> DEBU 6cfb Exiting" +"2019-09-24 00:27:20.053 UTC [gossip.comm] sendToEndpoint -> DEBU 6cfc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.054 UTC [gossip.comm] sendToEndpoint -> DEBU 6cfd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.054 UTC [gossip.comm] sendToEndpoint -> DEBU 6cff Exiting" +"2019-09-24 00:27:20.054 UTC [gossip.comm] sendToEndpoint -> DEBU 6cfe Exiting" +"2019-09-24 00:27:20.056 UTC [gossip.comm] func1 -> DEBU 6d00 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.056 UTC [gossip.gossip] handleMessage -> DEBU 6d01 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.056 UTC [msp] DeserializeIdentity -> DEBU 6d02 Obtaining identity" +"2019-09-24 00:27:20.057 UTC [msp] DeserializeIdentity -> DEBU 6d03 Obtaining identity" +"2019-09-24 00:27:20.057 UTC [gossip.comm] func1 -> DEBU 6d04 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.058 UTC [gossip.comm] func1 -> DEBU 6d05 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.058 UTC [msp] DeserializeIdentity -> DEBU 6d06 Obtaining identity" +"2019-09-24 00:27:20.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6d07 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:20.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d08 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d09 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.060 UTC [policies] Evaluate -> DEBU 6d0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:20.060 UTC [policies] Evaluate -> DEBU 6d0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:20.061 UTC [policies] Evaluate -> DEBU 6d0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:20.061 UTC [cauthdsl] func1 -> DEBU 6d0d 0xc005193080 gate 1569284840061306000 evaluation starts" +"2019-09-24 00:27:20.062 UTC [cauthdsl] func2 -> DEBU 6d0e 0xc005193080 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.062 UTC [cauthdsl] func2 -> DEBU 6d0f 0xc005193080 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.062 UTC [cauthdsl] func2 -> DEBU 6d10 0xc005193080 principal matched by identity 0" +"2019-09-24 00:27:20.063 UTC [msp.identity] Verify -> DEBU 6d12 Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:20.063 UTC [msp.identity] Verify -> DEBU 6d13 Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:20.062 UTC [msp] DeserializeIdentity -> DEBU 6d11 Obtaining identity" +"2019-09-24 00:27:20.063 UTC [msp] DeserializeIdentity -> DEBU 6d14 Obtaining identity" +"2019-09-24 00:27:20.064 UTC [cauthdsl] func2 -> DEBU 6d15 0xc005193080 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:20.064 UTC [cauthdsl] func1 -> DEBU 6d17 0xc005193080 gate 1569284840061306000 evaluation succeeds" +"2019-09-24 00:27:20.064 UTC [policies] Evaluate -> DEBU 6d18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.064 UTC [policies] Evaluate -> DEBU 6d19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.064 UTC [policies] Evaluate -> DEBU 6d1a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:20.065 UTC [policies] Evaluate -> DEBU 6d1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:20.064 UTC [gossip.comm] Send -> DEBU 6d16 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers" +"2019-09-24 00:27:20.065 UTC [msp.identity] Verify -> DEBU 6d1c Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:20.065 UTC [msp] DeserializeIdentity -> DEBU 6d1d Obtaining identity" +"2019-09-24 00:27:20.066 UTC [msp] DeserializeIdentity -> DEBU 6d1e Obtaining identity" +"2019-09-24 00:27:20.066 UTC [gossip.comm] sendToEndpoint -> DEBU 6d1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.066 UTC [gossip.comm] sendToEndpoint -> DEBU 6d21 Exiting" +"2019-09-24 00:27:20.066 UTC [msp.identity] Verify -> DEBU 6d20 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:20.067 UTC [msp.identity] Verify -> DEBU 6d23 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +"2019-09-24 00:27:20.067 UTC [msp.identity] Verify -> DEBU 6d24 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +"2019-09-24 00:27:20.068 UTC [msp] DeserializeIdentity -> DEBU 6d25 Obtaining identity" +"2019-09-24 00:27:20.068 UTC [msp] DeserializeIdentity -> DEBU 6d26 Obtaining identity" +"2019-09-24 00:27:20.069 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6d27 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:20.069 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d28 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.069 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d29 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.069 UTC [policies] Evaluate -> DEBU 6d2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:20.069 UTC [policies] Evaluate -> DEBU 6d2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:20.069 UTC [policies] Evaluate -> DEBU 6d2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:20.069 UTC [cauthdsl] func1 -> DEBU 6d2d 0xc0051bec20 gate 1569284840069800000 evaluation starts" +"2019-09-24 00:27:20.069 UTC [cauthdsl] func2 -> DEBU 6d2e 0xc0051bec20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.070 UTC [cauthdsl] func2 -> DEBU 6d30 0xc0051bec20 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.070 UTC [gossip.comm] sendToEndpoint -> DEBU 6d2f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.070 UTC [gossip.comm] sendToEndpoint -> DEBU 6d31 Exiting" +"2019-09-24 00:27:20.070 UTC [cauthdsl] func2 -> DEBU 6d32 0xc0051bec20 principal matched by identity 0" +"2019-09-24 00:27:20.070 UTC [msp.identity] Verify -> DEBU 6d33 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +"2019-09-24 00:27:20.071 UTC [msp.identity] Verify -> DEBU 6d34 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +00000040 01 32 48 48 f4 8a |.2HH..|" +"2019-09-24 00:27:20.067 UTC [gossip.comm] sendToEndpoint -> DEBU 6d22 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.071 UTC [cauthdsl] func2 -> DEBU 6d35 0xc0051bec20 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:20.072 UTC [cauthdsl] func1 -> DEBU 6d37 0xc0051bec20 gate 1569284840069800000 evaluation succeeds" +"2019-09-24 00:27:20.073 UTC [policies] Evaluate -> DEBU 6d38 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.073 UTC [policies] Evaluate -> DEBU 6d39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.073 UTC [policies] Evaluate -> DEBU 6d3a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:20.073 UTC [policies] Evaluate -> DEBU 6d3b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:20.072 UTC [gossip.comm] sendToEndpoint -> DEBU 6d36 Exiting" +"2019-09-24 00:27:20.074 UTC [msp] DeserializeIdentity -> DEBU 6d3c Obtaining identity" +"2019-09-24 00:27:20.075 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d3d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.075 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d3e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.075 UTC [policies] Evaluate -> DEBU 6d3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:20.076 UTC [policies] Evaluate -> DEBU 6d40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:20.076 UTC [policies] Evaluate -> DEBU 6d41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:20.076 UTC [cauthdsl] func1 -> DEBU 6d42 0xc0051b13f0 gate 1569284840076524800 evaluation starts" +"2019-09-24 00:27:20.076 UTC [cauthdsl] func2 -> DEBU 6d43 0xc0051b13f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.077 UTC [cauthdsl] func2 -> DEBU 6d44 0xc0051b13f0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.077 UTC [cauthdsl] func2 -> DEBU 6d45 0xc0051b13f0 principal matched by identity 0" +"2019-09-24 00:27:20.077 UTC [msp.identity] Verify -> DEBU 6d46 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +"2019-09-24 00:27:20.078 UTC [msp.identity] Verify -> DEBU 6d47 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +00000040 01 32 48 48 f4 8a |.2HH..|" +"2019-09-24 00:27:20.079 UTC [cauthdsl] func2 -> DEBU 6d48 0xc0051b13f0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:20.079 UTC [cauthdsl] func1 -> DEBU 6d49 0xc0051b13f0 gate 1569284840076524800 evaluation succeeds" +"2019-09-24 00:27:20.079 UTC [policies] Evaluate -> DEBU 6d4a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.079 UTC [policies] Evaluate -> DEBU 6d4b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.080 UTC [policies] Evaluate -> DEBU 6d4c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:20.080 UTC [policies] Evaluate -> DEBU 6d4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:20.080 UTC [gossip.gossip] handleMessage -> DEBU 6d4e Exiting" +"2019-09-24 00:27:20.080 UTC [gossip.gossip] handleMessage -> DEBU 6d4f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.080 UTC [msp] DeserializeIdentity -> DEBU 6d50 Obtaining identity" +"2019-09-24 00:27:20.081 UTC [msp] DeserializeIdentity -> DEBU 6d51 Obtaining identity" +"2019-09-24 00:27:20.081 UTC [msp] DeserializeIdentity -> DEBU 6d52 Obtaining identity" +"2019-09-24 00:27:20.083 UTC [gossip.comm] func1 -> DEBU 6d53 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.083 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6d54 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:20.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d55 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d56 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.084 UTC [policies] Evaluate -> DEBU 6d57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:20.084 UTC [policies] Evaluate -> DEBU 6d58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:20.084 UTC [policies] Evaluate -> DEBU 6d59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:20.085 UTC [cauthdsl] func1 -> DEBU 6d5a 0xc0051bf5a0 gate 1569284840085066300 evaluation starts" +"2019-09-24 00:27:20.085 UTC [cauthdsl] func2 -> DEBU 6d5b 0xc0051bf5a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.085 UTC [cauthdsl] func2 -> DEBU 6d5c 0xc0051bf5a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.085 UTC [cauthdsl] func2 -> DEBU 6d5d 0xc0051bf5a0 principal matched by identity 0" +"2019-09-24 00:27:20.085 UTC [msp.identity] Verify -> DEBU 6d5e Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:20.086 UTC [msp.identity] Verify -> DEBU 6d5f Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:20.086 UTC [cauthdsl] func2 -> DEBU 6d60 0xc0051bf5a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:20.086 UTC [cauthdsl] func1 -> DEBU 6d61 0xc0051bf5a0 gate 1569284840085066300 evaluation succeeds" +"2019-09-24 00:27:20.086 UTC [policies] Evaluate -> DEBU 6d62 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.086 UTC [policies] Evaluate -> DEBU 6d63 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.086 UTC [policies] Evaluate -> DEBU 6d64 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:20.087 UTC [policies] Evaluate -> DEBU 6d65 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:20.087 UTC [msp.identity] Verify -> DEBU 6d66 Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +"2019-09-24 00:27:20.087 UTC [msp.identity] Verify -> DEBU 6d67 Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +"2019-09-24 00:27:20.087 UTC [msp.identity] Verify -> DEBU 6d68 Verify: digest = 00000000 2f 3a 5d 6a 07 dc 8f 8c f4 d3 3e 03 a1 84 58 ed |/:]j......>...X.| +00000010 ca a1 e1 63 b1 88 b2 d8 5e 96 61 92 d7 4e 23 7e |...c....^.a..N#~|" +"2019-09-24 00:27:20.088 UTC [msp.identity] Verify -> DEBU 6d69 Verify: sig = 00000000 30 44 02 20 10 63 8b 29 02 11 b2 b0 a1 3b d6 39 |0D. .c.).....;.9| +00000010 55 c1 38 a9 9c b5 e8 e4 5c 15 7c 40 0a 50 f6 ab |U.8.....\.|@.P..| +00000020 62 b5 69 61 02 20 3c 3c 94 fd 54 4d 19 eb 78 b1 |b.ia. <<..TM..x.| +00000030 86 bc bc 1f 04 92 1d de 9c fc 0f e8 22 1f 05 ff |............"...| +00000040 c0 b7 9a 5a 79 46 |...ZyF|" +"2019-09-24 00:27:20.088 UTC [msp] DeserializeIdentity -> DEBU 6d6a Obtaining identity" +"2019-09-24 00:27:20.088 UTC [msp] DeserializeIdentity -> DEBU 6d6b Obtaining identity" +"2019-09-24 00:27:20.088 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6d6c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:20.089 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d6d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.089 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d6e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.089 UTC [policies] Evaluate -> DEBU 6d6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:20.089 UTC [policies] Evaluate -> DEBU 6d70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:20.090 UTC [policies] Evaluate -> DEBU 6d71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:20.090 UTC [cauthdsl] func1 -> DEBU 6d72 0xc0051ebbb0 gate 1569284840090367100 evaluation starts" +"2019-09-24 00:27:20.090 UTC [cauthdsl] func2 -> DEBU 6d73 0xc0051ebbb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.090 UTC [cauthdsl] func2 -> DEBU 6d74 0xc0051ebbb0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.091 UTC [cauthdsl] func2 -> DEBU 6d75 0xc0051ebbb0 principal matched by identity 0" +"2019-09-24 00:27:20.091 UTC [msp.identity] Verify -> DEBU 6d76 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +"2019-09-24 00:27:20.091 UTC [msp.identity] Verify -> DEBU 6d77 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +00000040 15 da b4 89 d2 86 |......|" +"2019-09-24 00:27:20.092 UTC [cauthdsl] func2 -> DEBU 6d78 0xc0051ebbb0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:20.092 UTC [cauthdsl] func1 -> DEBU 6d79 0xc0051ebbb0 gate 1569284840090367100 evaluation succeeds" +"2019-09-24 00:27:20.092 UTC [policies] Evaluate -> DEBU 6d7a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.092 UTC [policies] Evaluate -> DEBU 6d7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.093 UTC [policies] Evaluate -> DEBU 6d7c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:20.093 UTC [policies] Evaluate -> DEBU 6d7d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:20.093 UTC [msp] DeserializeIdentity -> DEBU 6d7e Obtaining identity" +"2019-09-24 00:27:20.093 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d7f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d80 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.094 UTC [policies] Evaluate -> DEBU 6d81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:20.094 UTC [policies] Evaluate -> DEBU 6d82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:20.094 UTC [policies] Evaluate -> DEBU 6d83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:20.095 UTC [cauthdsl] func1 -> DEBU 6d84 0xc005204c90 gate 1569284840095037100 evaluation starts" +"2019-09-24 00:27:20.095 UTC [cauthdsl] func2 -> DEBU 6d85 0xc005204c90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.095 UTC [cauthdsl] func2 -> DEBU 6d86 0xc005204c90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.095 UTC [cauthdsl] func2 -> DEBU 6d87 0xc005204c90 principal matched by identity 0" +"2019-09-24 00:27:20.095 UTC [msp.identity] Verify -> DEBU 6d88 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +"2019-09-24 00:27:20.096 UTC [msp.identity] Verify -> DEBU 6d89 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +00000040 15 da b4 89 d2 86 |......|" +"2019-09-24 00:27:20.096 UTC [cauthdsl] func2 -> DEBU 6d8a 0xc005204c90 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:20.096 UTC [cauthdsl] func1 -> DEBU 6d8b 0xc005204c90 gate 1569284840095037100 evaluation succeeds" +"2019-09-24 00:27:20.096 UTC [policies] Evaluate -> DEBU 6d8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.096 UTC [policies] Evaluate -> DEBU 6d8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.097 UTC [policies] Evaluate -> DEBU 6d8e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:20.097 UTC [policies] Evaluate -> DEBU 6d8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:20.097 UTC [gossip.gossip] handleMessage -> DEBU 6d90 Exiting" +"2019-09-24 00:27:20.097 UTC [gossip.gossip] handleMessage -> DEBU 6d91 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.097 UTC [msp] DeserializeIdentity -> DEBU 6d92 Obtaining identity" +"2019-09-24 00:27:20.098 UTC [msp] DeserializeIdentity -> DEBU 6d93 Obtaining identity" +"2019-09-24 00:27:20.098 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6d94 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:20.098 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d95 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.098 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d96 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.098 UTC [policies] Evaluate -> DEBU 6d97 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:20.098 UTC [policies] Evaluate -> DEBU 6d98 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:20.099 UTC [policies] Evaluate -> DEBU 6d99 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:20.099 UTC [cauthdsl] func1 -> DEBU 6d9a 0xc0052186a0 gate 1569284840099080200 evaluation starts" +"2019-09-24 00:27:20.099 UTC [cauthdsl] func2 -> DEBU 6d9b 0xc0052186a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.099 UTC [cauthdsl] func2 -> DEBU 6d9c 0xc0052186a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.099 UTC [cauthdsl] func2 -> DEBU 6d9d 0xc0052186a0 principal matched by identity 0" +"2019-09-24 00:27:20.099 UTC [msp.identity] Verify -> DEBU 6d9e Verify: digest = 00000000 4a e2 12 c4 bb 00 29 5a bd 78 d9 6a 0a f8 c4 43 |J.....)Z.x.j...C| +00000010 95 1f 7b 48 c3 dc 12 32 18 35 0b 06 51 b7 e4 92 |..{H...2.5..Q...|" +"2019-09-24 00:27:20.099 UTC [msp.identity] Verify -> DEBU 6d9f Verify: sig = 00000000 30 44 02 20 0e f5 cf 44 b0 74 f1 08 87 50 f5 db |0D. ...D.t...P..| +00000010 51 38 9b 51 f8 ef e8 e0 84 99 91 5d dc 77 4c ad |Q8.Q.......].wL.| +00000020 03 ce 4d ba 02 20 21 65 c3 86 aa 51 51 37 fb 6a |..M.. !e...QQ7.j| +00000030 a8 86 6e e4 bf c0 24 fb e2 32 c5 79 0d ee 8a 34 |..n...$..2.y...4| +00000040 13 39 e6 a7 a2 13 |.9....|" +"2019-09-24 00:27:20.100 UTC [cauthdsl] func2 -> DEBU 6da0 0xc0052186a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:20.100 UTC [cauthdsl] func1 -> DEBU 6da1 0xc0052186a0 gate 1569284840099080200 evaluation succeeds" +"2019-09-24 00:27:20.100 UTC [policies] Evaluate -> DEBU 6da2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.100 UTC [policies] Evaluate -> DEBU 6da3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.100 UTC [policies] Evaluate -> DEBU 6da4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:20.100 UTC [policies] Evaluate -> DEBU 6da5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:20.100 UTC [msp] DeserializeIdentity -> DEBU 6da6 Obtaining identity" +"2019-09-24 00:27:20.101 UTC [msp] DeserializeIdentity -> DEBU 6da7 Obtaining identity" +"2019-09-24 00:27:20.101 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6da8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:20.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6da9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6daa Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.101 UTC [policies] Evaluate -> DEBU 6dab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:20.101 UTC [policies] Evaluate -> DEBU 6dac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:20.101 UTC [policies] Evaluate -> DEBU 6dad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:20.102 UTC [cauthdsl] func1 -> DEBU 6dae 0xc005219e70 gate 1569284840101942700 evaluation starts" +"2019-09-24 00:27:20.102 UTC [cauthdsl] func2 -> DEBU 6daf 0xc005219e70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.102 UTC [cauthdsl] func2 -> DEBU 6db0 0xc005219e70 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.102 UTC [cauthdsl] func2 -> DEBU 6db1 0xc005219e70 principal matched by identity 0" +"2019-09-24 00:27:20.102 UTC [msp.identity] Verify -> DEBU 6db2 Verify: digest = 00000000 39 e4 24 48 f1 ad 27 9f e9 c3 6c 7d 46 36 a2 0a |9.$H..'...l}F6..| +00000010 47 ee 0d 3c 60 9f e9 7c 73 77 c9 9b e3 2c 08 7b |G..<`..|sw...,.{|" +"2019-09-24 00:27:20.102 UTC [msp.identity] Verify -> DEBU 6db3 Verify: sig = 00000000 30 44 02 20 35 ea 81 5b 04 17 ed bf 8d f4 04 4a |0D. 5..[.......J| +00000010 c0 4c 4e 58 5b 7c bd 43 ed f4 77 da 41 cb ee 78 |.LNX[|.C..w.A..x| +00000020 ba 68 24 de 02 20 04 ba dd bb f0 ae f1 88 94 0d |.h$.. ..........| +00000030 f0 e4 2f 98 63 e1 2b b4 04 ac 34 00 47 db af fb |../.c.+...4.G...| +00000040 64 b0 a4 4b e9 a8 |d..K..|" +"2019-09-24 00:27:20.102 UTC [cauthdsl] func2 -> DEBU 6db4 0xc005219e70 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:20.102 UTC [cauthdsl] func1 -> DEBU 6db5 0xc005219e70 gate 1569284840101942700 evaluation succeeds" +"2019-09-24 00:27:20.103 UTC [policies] Evaluate -> DEBU 6db6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.103 UTC [policies] Evaluate -> DEBU 6db7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.103 UTC [policies] Evaluate -> DEBU 6db8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:20.103 UTC [policies] Evaluate -> DEBU 6db9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:20.104 UTC [msp.identity] Verify -> DEBU 6dba Verify: digest = 00000000 d7 76 9b f2 cd 78 e4 14 22 e1 48 3e e1 c3 f0 75 |.v...x..".H>...u| +00000010 ae ab e3 89 84 00 3c a2 0c b8 82 72 13 ed df b2 |......<....r....|" +"2019-09-24 00:27:20.104 UTC [msp.identity] Verify -> DEBU 6dbb Verify: sig = 00000000 30 45 02 21 00 e5 fa 34 cc 56 ca f8 c3 d6 60 6e |0E.!...4.V....`n| +00000010 0c 91 17 69 5a 59 c9 0a 9e dd 8f c0 53 36 69 04 |...iZY......S6i.| +00000020 8e 11 9c c5 fa 02 20 25 78 25 9c f4 ae bd c1 66 |...... %x%.....f| +00000030 e9 79 a5 6c b6 05 89 0c 31 4f 2a 2f dc f7 3b 4c |.y.l....1O*/..;L| +00000040 ea d7 b4 ca 2a 7f 7b |....*.{|" +"2019-09-24 00:27:20.104 UTC [msp.identity] Verify -> DEBU 6dbc Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +"2019-09-24 00:27:20.105 UTC [msp.identity] Verify -> DEBU 6dbd Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +00000040 f9 8f 71 f2 6e 18 |..q.n.|" +"2019-09-24 00:27:20.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6dbe Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6dbf Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.106 UTC [policies] Evaluate -> DEBU 6dc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:20.106 UTC [policies] Evaluate -> DEBU 6dc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:20.106 UTC [policies] Evaluate -> DEBU 6dc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:20.106 UTC [msp] DeserializeIdentity -> DEBU 6dc3 Obtaining identity" +"2019-09-24 00:27:20.107 UTC [msp.identity] newIdentity -> DEBU 6dc4 Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu @@ -20210,2589 +33991,1799 @@ BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== -----END CERTIFICATE-----" -"2019-07-20 02:40:48.735 UTC [cauthdsl] func1 -> DEBU 4131 0xc004172550 gate 1563590448735661200 evaluation starts" -"2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4132 0xc004172550 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4133 0xc004172550 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4134 0xc004172550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" -"2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4135 0xc004172550 principal evaluation fails" -"2019-07-20 02:40:48.738 UTC [cauthdsl] func1 -> DEBU 4136 0xc004172550 gate 1563590448735661200 evaluation fails" -"2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4137 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4138 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4139 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.738 UTC [cauthdsl] func1 -> DEBU 413a 0xc0041736d0 gate 1563590448738604100 evaluation starts" -"2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 413b 0xc0041736d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 413c 0xc0041736d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.738 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 413d Checking if identity satisfies MEMBER role for Org1MSP" -"2019-07-20 02:40:48.738 UTC [msp] Validate -> DEBU 413e MSP Org1MSP validating identity" -"2019-07-20 02:40:48.738 UTC [msp] getCertificationChain -> DEBU 413f MSP Org1MSP getting certification chain" -"2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 4140 0xc0041736d0 principal matched by identity 0" -"2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 4141 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 4142 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:40:48.739 UTC [cauthdsl] func2 -> DEBU 4143 0xc0041736d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.739 UTC [cauthdsl] func1 -> DEBU 4144 0xc0041736d0 gate 1563590448738604100 evaluation succeeds" -"2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4145 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4146 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4147 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4148 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.739 UTC [gossip.gossip] handleMessage -> DEBU 4149 Exiting" -"2019-07-20 02:40:48.739 UTC [gossip.gossip] handleMessage -> DEBU 414a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.739 UTC [msp] DeserializeIdentity -> DEBU 414b Obtaining identity" -"2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 414c Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| -00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" -"2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 414d Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| -00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| -00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| -00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| -00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" -"2019-07-20 02:40:48.740 UTC [msp.identity] Verify -> DEBU 414e Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| -00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" -"2019-07-20 02:40:48.740 UTC [msp.identity] Verify -> DEBU 414f Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| -00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| -00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| -00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| -00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" -"2019-07-20 02:40:48.740 UTC [msp] DeserializeIdentity -> DEBU 4150 Obtaining identity" -"2019-07-20 02:40:48.740 UTC [msp] DeserializeIdentity -> DEBU 4151 Obtaining identity" -"2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4152 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4153 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4154 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4155 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4156 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4157 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 4158 0xc0041a23a0 gate 1563590448740710900 evaluation starts" -"2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 4159 0xc0041a23a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415a 0xc0041a23a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415b 0xc0041a23a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415c 0xc0041a23a0 principal evaluation fails" -"2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 415d 0xc0041a23a0 gate 1563590448740710900 evaluation fails" -"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 415e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 415f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4160 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 4161 0xc0041a2be0 gate 1563590448740959800 evaluation starts" -"2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 4162 0xc0041a2be0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4163 0xc0041a2be0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4164 0xc0041a2be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4165 0xc0041a2be0 principal evaluation fails" -"2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 4166 0xc0041a2be0 gate 1563590448740959800 evaluation fails" -"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4167 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4168 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4169 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 416a 0xc0041a3420 gate 1563590448741207600 evaluation starts" -"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416b 0xc0041a3420 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416c 0xc0041a3420 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416d 0xc0041a3420 principal matched by identity 0" -"2019-07-20 02:40:48.741 UTC [msp.identity] Verify -> DEBU 416e Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| -00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" -"2019-07-20 02:40:48.741 UTC [msp.identity] Verify -> DEBU 416f Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| -00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| -00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| -00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| -00000040 5d 44 00 4b 5c 2a |]D.K\*|" -"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4170 0xc0041a3420 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 4171 0xc0041a3420 gate 1563590448741207600 evaluation succeeds" -"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4172 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4173 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4174 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4175 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.741 UTC [msp] DeserializeIdentity -> DEBU 4176 Obtaining identity" -"2019-07-20 02:40:48.741 UTC [msp] DeserializeIdentity -> DEBU 4177 Obtaining identity" -"2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4178 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4179 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 417a Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 417e 0xc0041b2bf0 gate 1563590448742219200 evaluation starts" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 417f 0xc0041b2bf0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4180 0xc0041b2bf0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4181 0xc0041b2bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4182 0xc0041b2bf0 principal evaluation fails" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4183 0xc0041b2bf0 gate 1563590448742219200 evaluation fails" -"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4184 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4185 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4186 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4187 0xc0041b3430 gate 1563590448742640000 evaluation starts" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4188 0xc0041b3430 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4189 0xc0041b3430 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 418a 0xc0041b3430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 418b 0xc0041b3430 principal evaluation fails" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 418c 0xc0041b3430 gate 1563590448742640000 evaluation fails" -"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4190 0xc0041b3c70 gate 1563590448742879200 evaluation starts" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4191 0xc0041b3c70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4192 0xc0041b3c70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4193 0xc0041b3c70 principal matched by identity 0" -"2019-07-20 02:40:48.743 UTC [msp.identity] Verify -> DEBU 4194 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:40:48.743 UTC [msp.identity] Verify -> DEBU 4195 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 4196 0xc0041b3c70 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 4197 0xc0041b3c70 gate 1563590448742879200 evaluation succeeds" -"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 4198 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 4199 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419a Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.744 UTC [msp] DeserializeIdentity -> DEBU 419c Obtaining identity" -"2019-07-20 02:40:48.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 419d Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 419e Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41a2 0xc0041c6d50 gate 1563590448744544700 evaluation starts" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a3 0xc0041c6d50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a4 0xc0041c6d50 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a5 0xc0041c6d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a6 0xc0041c6d50 principal evaluation fails" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41a7 0xc0041c6d50 gate 1563590448744544700 evaluation fails" -"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41ab 0xc0041c7590 gate 1563590448744793600 evaluation starts" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ac 0xc0041c7590 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ad 0xc0041c7590 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ae 0xc0041c7590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41af 0xc0041c7590 principal evaluation fails" -"2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41b0 0xc0041c7590 gate 1563590448744793600 evaluation fails" -"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.745 UTC [policies] Evaluate -> DEBU 41b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:48.745 UTC [policies] Evaluate -> DEBU 41b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:48.745 UTC [cauthdsl] func1 -> DEBU 41b4 0xc0041c7dd0 gate 1563590448745079700 evaluation starts" -"2019-07-20 02:40:48.745 UTC [cauthdsl] func2 -> DEBU 41b5 0xc0041c7dd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:48.746 UTC [cauthdsl] func2 -> DEBU 41b6 0xc0041c7dd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:48.746 UTC [cauthdsl] func2 -> DEBU 41b7 0xc0041c7dd0 principal matched by identity 0" -"2019-07-20 02:40:48.746 UTC [msp.identity] Verify -> DEBU 41b8 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:40:48.747 UTC [msp.identity] Verify -> DEBU 41b9 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:40:48.747 UTC [cauthdsl] func2 -> DEBU 41ba 0xc0041c7dd0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:48.747 UTC [cauthdsl] func1 -> DEBU 41bb 0xc0041c7dd0 gate 1563590448745079700 evaluation succeeds" -"2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41be Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:48.747 UTC [gossip.gossip] handleMessage -> DEBU 41c0 Exiting" -"2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c1 Obtaining identity" -"2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c2 Obtaining identity" -"2019-07-20 02:40:48.755 UTC [gossip.pull] Hello -> DEBU 41c3 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c4 Obtaining identity" -"2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c5 Obtaining identity" -"2019-07-20 02:40:48.756 UTC [gossip.comm] Send -> DEBU 41c6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:48.756 UTC [gossip.comm] sendToEndpoint -> DEBU 41c7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.756 UTC [gossip.comm] sendToEndpoint -> DEBU 41c8 Exiting" -"2019-07-20 02:40:48.757 UTC [gossip.gossip] handleMessage -> DEBU 41c9 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.758 UTC [gossip.pull] HandleMessage -> DEBU 41ca GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.758 UTC [gossip.gossip] handleMessage -> DEBU 41cb Exiting" -"2019-07-20 02:40:48.842 UTC [gossip.gossip] handleMessage -> DEBU 41cc Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.844 UTC [msp] DeserializeIdentity -> DEBU 41cd Obtaining identity" -"2019-07-20 02:40:48.844 UTC [msp] DeserializeIdentity -> DEBU 41ce Obtaining identity" -"2019-07-20 02:40:48.850 UTC [gossip.gossip] handleMessage -> DEBU 41cf Exiting" -"2019-07-20 02:40:48.850 UTC [gossip.gossip] handleMessage -> DEBU 41d0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:48.852 UTC [gossip.comm] func1 -> DEBU 41d1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:48.853 UTC [msp.identity] Verify -> DEBU 41d2 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:40:48.853 UTC [msp.identity] Verify -> DEBU 41d3 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:40:48.855 UTC [gossip.gossip] handleMessage -> DEBU 41d4 Exiting" -"2019-07-20 02:40:48.855 UTC [gossip.gossip] handleMessage -> DEBU 41d5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:48.856 UTC [msp.identity] Verify -> DEBU 41d6 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:40:48.856 UTC [msp.identity] Verify -> DEBU 41d7 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:40:48.857 UTC [msp] DeserializeIdentity -> DEBU 41d8 Obtaining identity" -"2019-07-20 02:40:48.857 UTC [gossip.gossip] handleMessage -> DEBU 41d9 Exiting" -"2019-07-20 02:40:48.859 UTC [gossip.comm] func1 -> DEBU 41da Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:48.861 UTC [gossip.gossip] handleMessage -> DEBU 41db Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:48.861 UTC [msp.identity] Verify -> DEBU 41dc Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:40:48.861 UTC [msp.identity] Verify -> DEBU 41dd Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:40:48.862 UTC [msp] DeserializeIdentity -> DEBU 41de Obtaining identity" -"2019-07-20 02:40:48.862 UTC [gossip.gossip] handleMessage -> DEBU 41df Exiting" -"2019-07-20 02:40:48.899 UTC [gossip.gossip] handleMessage -> DEBU 41e0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.900 UTC [gossip.pull] HandleMessage -> DEBU 41e1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:48.901 UTC [gossip.pull] SendDigest -> DEBU 41e2 Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:48.901 UTC [gossip.gossip] handleMessage -> DEBU 41e3 Exiting" -"2019-07-20 02:40:49.008 UTC [gossip.comm] func1 -> DEBU 41e4 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:49.009 UTC [gossip.gossip] handleMessage -> DEBU 41e5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:49.009 UTC [msp] DeserializeIdentity -> DEBU 41e6 Obtaining identity" -"2019-07-20 02:40:49.010 UTC [msp] DeserializeIdentity -> DEBU 41e7 Obtaining identity" -"2019-07-20 02:40:49.010 UTC [msp] DeserializeIdentity -> DEBU 41e8 Obtaining identity" -"2019-07-20 02:40:49.010 UTC [gossip.gossip] handleMessage -> DEBU 41e9 Exiting" -"2019-07-20 02:40:49.013 UTC [gossip.comm] func1 -> DEBU 41ea Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:49.013 UTC [gossip.gossip] handleMessage -> DEBU 41eb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:49.014 UTC [msp] DeserializeIdentity -> DEBU 41ec Obtaining identity" -"2019-07-20 02:40:49.014 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:49.014 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ee Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:49.015 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ef Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:49.015 UTC [cauthdsl] func1 -> DEBU 41f3 0xc00421c6e0 gate 1563590449015768400 evaluation starts" -"2019-07-20 02:40:49.015 UTC [cauthdsl] func2 -> DEBU 41f4 0xc00421c6e0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f5 0xc00421c6e0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f6 0xc00421c6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f7 0xc00421c6e0 principal evaluation fails" -"2019-07-20 02:40:49.016 UTC [cauthdsl] func1 -> DEBU 41f8 0xc00421c6e0 gate 1563590449015768400 evaluation fails" -"2019-07-20 02:40:49.016 UTC [policies] Evaluate -> DEBU 41f9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.017 UTC [policies] Evaluate -> DEBU 41fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.017 UTC [policies] Evaluate -> DEBU 41fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:49.017 UTC [cauthdsl] func1 -> DEBU 41fc 0xc00421cf20 gate 1563590449017318300 evaluation starts" -"2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41fd 0xc00421cf20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41fe 0xc00421cf20 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41ff 0xc00421cf20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 4200 0xc00421cf20 principal evaluation fails" -"2019-07-20 02:40:49.018 UTC [cauthdsl] func1 -> DEBU 4201 0xc00421cf20 gate 1563590449017318300 evaluation fails" -"2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4202 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4203 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4204 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:49.018 UTC [cauthdsl] func1 -> DEBU 4205 0xc00421d760 gate 1563590449018686100 evaluation starts" -"2019-07-20 02:40:49.018 UTC [cauthdsl] func2 -> DEBU 4206 0xc00421d760 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.019 UTC [cauthdsl] func2 -> DEBU 4207 0xc00421d760 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:49.019 UTC [cauthdsl] func2 -> DEBU 4208 0xc00421d760 principal matched by identity 0" -"2019-07-20 02:40:49.019 UTC [msp.identity] Verify -> DEBU 4209 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:40:49.019 UTC [msp.identity] Verify -> DEBU 420a Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:40:49.020 UTC [cauthdsl] func2 -> DEBU 420b 0xc00421d760 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:49.020 UTC [cauthdsl] func1 -> DEBU 420c 0xc00421d760 gate 1563590449018686100 evaluation succeeds" -"2019-07-20 02:40:49.020 UTC [policies] Evaluate -> DEBU 420d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.020 UTC [policies] Evaluate -> DEBU 420e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.021 UTC [policies] Evaluate -> DEBU 420f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:49.021 UTC [policies] Evaluate -> DEBU 4210 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:49.021 UTC [msp] DeserializeIdentity -> DEBU 4211 Obtaining identity" -"2019-07-20 02:40:49.021 UTC [gossip.gossip] handleMessage -> DEBU 4212 Exiting" -"2019-07-20 02:40:49.022 UTC [gossip.comm] func1 -> DEBU 4213 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:49.022 UTC [gossip.gossip] handleMessage -> DEBU 4214 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:49.022 UTC [msp] DeserializeIdentity -> DEBU 4215 Obtaining identity" -"2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4216 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4217 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4218 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 4219 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 421a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 421b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:49.023 UTC [cauthdsl] func1 -> DEBU 421c 0xc00422d230 gate 1563590449023690300 evaluation starts" -"2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421d 0xc00422d230 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421e 0xc00422d230 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421f 0xc00422d230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4220 0xc00422d230 principal evaluation fails" -"2019-07-20 02:40:49.024 UTC [cauthdsl] func1 -> DEBU 4221 0xc00422d230 gate 1563590449023690300 evaluation fails" -"2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4222 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4223 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4224 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:49.024 UTC [cauthdsl] func1 -> DEBU 4225 0xc00422da70 gate 1563590449024695200 evaluation starts" -"2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4226 0xc00422da70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4227 0xc00422da70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4228 0xc00422da70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4229 0xc00422da70 principal evaluation fails" -"2019-07-20 02:40:49.025 UTC [cauthdsl] func1 -> DEBU 422a 0xc00422da70 gate 1563590449024695200 evaluation fails" -"2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:49.025 UTC [cauthdsl] func1 -> DEBU 422e 0xc0042442b0 gate 1563590449025626500 evaluation starts" -"2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 422f 0xc0042442b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4230 0xc0042442b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4231 0xc0042442b0 principal matched by identity 0" -"2019-07-20 02:40:49.026 UTC [msp.identity] Verify -> DEBU 4232 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:40:49.026 UTC [msp.identity] Verify -> DEBU 4233 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:40:49.027 UTC [cauthdsl] func2 -> DEBU 4234 0xc0042442b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:49.027 UTC [cauthdsl] func1 -> DEBU 4235 0xc0042442b0 gate 1563590449025626500 evaluation succeeds" -"2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4236 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4237 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4238 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4239 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:49.027 UTC [msp] DeserializeIdentity -> DEBU 423a Obtaining identity" -"2019-07-20 02:40:49.027 UTC [gossip.gossip] handleMessage -> DEBU 423b Exiting" -"2019-07-20 02:40:49.146 UTC [gossip.comm] func1 -> DEBU 423c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:49.147 UTC [gossip.gossip] handleMessage -> DEBU 423d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:49.147 UTC [msp] DeserializeIdentity -> DEBU 423e Obtaining identity" -"2019-07-20 02:40:49.148 UTC [msp] DeserializeIdentity -> DEBU 423f Obtaining identity" -"2019-07-20 02:40:49.148 UTC [msp] DeserializeIdentity -> DEBU 4240 Obtaining identity" -"2019-07-20 02:40:49.148 UTC [gossip.gossip] handleMessage -> DEBU 4241 Exiting" -"2019-07-20 02:40:49.159 UTC [gossip.comm] func1 -> DEBU 4242 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:49.159 UTC [gossip.gossip] handleMessage -> DEBU 4243 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" -"2019-07-20 02:40:49.160 UTC [msp] DeserializeIdentity -> DEBU 4244 Obtaining identity" -"2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4245 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4246 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4247 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 4248 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 4249 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 424a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:49.162 UTC [cauthdsl] func1 -> DEBU 424b 0xc004245d80 gate 1563590449162855900 evaluation starts" -"2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424c 0xc004245d80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424d 0xc004245d80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424e 0xc004245d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:49.164 UTC [cauthdsl] func2 -> DEBU 424f 0xc004245d80 principal evaluation fails" -"2019-07-20 02:40:49.164 UTC [cauthdsl] func1 -> DEBU 4250 0xc004245d80 gate 1563590449162855900 evaluation fails" -"2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4251 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4252 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4253 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:49.165 UTC [cauthdsl] func1 -> DEBU 4254 0xc00426a5c0 gate 1563590449165223100 evaluation starts" -"2019-07-20 02:40:49.165 UTC [cauthdsl] func2 -> DEBU 4255 0xc00426a5c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4256 0xc00426a5c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4257 0xc00426a5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4258 0xc00426a5c0 principal evaluation fails" -"2019-07-20 02:40:49.166 UTC [cauthdsl] func1 -> DEBU 4259 0xc00426a5c0 gate 1563590449165223100 evaluation fails" -"2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:49.168 UTC [cauthdsl] func1 -> DEBU 425d 0xc00426ae00 gate 1563590449168326000 evaluation starts" -"2019-07-20 02:40:49.168 UTC [cauthdsl] func2 -> DEBU 425e 0xc00426ae00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:49.168 UTC [cauthdsl] func2 -> DEBU 425f 0xc00426ae00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:49.169 UTC [cauthdsl] func2 -> DEBU 4260 0xc00426ae00 principal matched by identity 0" -"2019-07-20 02:40:49.169 UTC [msp.identity] Verify -> DEBU 4261 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:40:49.169 UTC [msp.identity] Verify -> DEBU 4262 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:40:49.170 UTC [cauthdsl] func2 -> DEBU 4263 0xc00426ae00 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:49.170 UTC [cauthdsl] func1 -> DEBU 4264 0xc00426ae00 gate 1563590449168326000 evaluation succeeds" -"2019-07-20 02:40:49.170 UTC [policies] Evaluate -> DEBU 4265 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4266 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4267 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4268 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:49.172 UTC [msp] DeserializeIdentity -> DEBU 4269 Obtaining identity" -"2019-07-20 02:40:49.172 UTC [gossip.gossip] handleMessage -> DEBU 426a Exiting" -"2019-07-20 02:40:51.933 UTC [gossip.comm] func1 -> DEBU 426b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:51.933 UTC [gossip.gossip] handleMessage -> DEBU 426c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:51.933 UTC [gossip.gossip] handleMessage -> DEBU 426d Exiting" -"2019-07-20 02:40:51.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU 426e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:51.934 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 426f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:51.934 UTC [msp] DeserializeIdentity -> DEBU 4270 Obtaining identity" -"2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4271 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4272 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4273 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4274 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4275 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4276 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:51.934 UTC [cauthdsl] func1 -> DEBU 4277 0xc0042881f0 gate 1563590451934376800 evaluation starts" -"2019-07-20 02:40:51.934 UTC [cauthdsl] func2 -> DEBU 4278 0xc0042881f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:51.934 UTC [cauthdsl] func2 -> DEBU 4279 0xc0042881f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:51.938 UTC [cauthdsl] func2 -> DEBU 427a 0xc0042881f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:51.938 UTC [cauthdsl] func2 -> DEBU 427b 0xc0042881f0 principal evaluation fails" -"2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 427c 0xc0042881f0 gate 1563590451934376800 evaluation fails" -"2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 4280 0xc004288a30 gate 1563590451939377300 evaluation starts" -"2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4281 0xc004288a30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4282 0xc004288a30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4283 0xc004288a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4284 0xc004288a30 principal evaluation fails" -"2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 4285 0xc004288a30 gate 1563590451939377300 evaluation fails" -"2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 4286 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 4287 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:51.940 UTC [policies] Evaluate -> DEBU 4288 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:51.940 UTC [cauthdsl] func1 -> DEBU 4289 0xc004289270 gate 1563590451940033300 evaluation starts" -"2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428a 0xc004289270 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428b 0xc004289270 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428c 0xc004289270 principal matched by identity 0" -"2019-07-20 02:40:51.940 UTC [msp.identity] Verify -> DEBU 428d Verify: digest = 00000000 fe b5 10 6f 4b 6c 86 45 a2 e0 2d f2 5e ee 45 a8 |...oKl.E..-.^.E.| -00000010 c3 67 ab 53 5c a7 f3 35 ea 66 82 2a c9 1a b1 e5 |.g.S\..5.f.*....|" -"2019-07-20 02:40:51.940 UTC [msp.identity] Verify -> DEBU 428e Verify: sig = 00000000 30 44 02 20 49 3a 0d e2 dd 57 ea c9 f8 6c bb 8b |0D. I:...W...l..| -00000010 b0 df f7 01 71 8e b4 67 e0 85 ba cc 62 62 0c 00 |....q..g....bb..| -00000020 bf 58 f7 72 02 20 10 4b 5b d0 1d 18 dd 6e 7f 09 |.X.r. .K[....n..| -00000030 a8 5a 2d a2 67 fa a0 ce a3 55 74 79 9f 76 b9 86 |.Z-.g....Uty.v..| -00000040 0d f5 5a 69 c7 57 |..Zi.W|" -"2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428f 0xc004289270 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:51.940 UTC [cauthdsl] func1 -> DEBU 4290 0xc004289270 gate 1563590451940033300 evaluation succeeds" -"2019-07-20 02:40:51.940 UTC [policies] Evaluate -> DEBU 4291 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4292 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4293 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4294 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:51.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 4295 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4296 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4297 updating membership: timestamp: " -"2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4298 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4299 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 429a Exiting" -"2019-07-20 02:40:51.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 429b Exiting" -"2019-07-20 02:40:51.948 UTC [gossip.discovery] sendMemResponse -> DEBU 429c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429d Obtaining identity" -"2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429e Obtaining identity" -"2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429f Obtaining identity" -"2019-07-20 02:40:51.949 UTC [gossip.comm] Send -> DEBU 42a0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:51.949 UTC [gossip.discovery] sendMemResponse -> DEBU 42a1 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" > alive:\212l9m\360\257\237\214" > alive: alive: " -"2019-07-20 02:40:51.949 UTC [gossip.comm] sendToEndpoint -> DEBU 42a2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:51.949 UTC [gossip.comm] sendToEndpoint -> DEBU 42a3 Exiting" -"2019-07-20 02:40:51.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a4 Exiting" -"2019-07-20 02:40:51.951 UTC [gossip.comm] func1 -> DEBU 42a5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:51.951 UTC [gossip.gossip] handleMessage -> DEBU 42a6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:51.952 UTC [gossip.pull] HandleMessage -> DEBU 42a7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42a8 Obtaining identity" -"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42a9 Obtaining identity" -"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42aa Obtaining identity" -"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ab Obtaining identity" -"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ac Obtaining identity" -"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ad Obtaining identity" -"2019-07-20 02:40:51.952 UTC [gossip.pull] SendDigest -> DEBU 42ae Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:51.952 UTC [gossip.gossip] handleMessage -> DEBU 42af Exiting" -"2019-07-20 02:40:51.980 UTC [gossip.election] waitForInterrupt -> DEBU 42b0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:51.980 UTC [gossip.election] IsLeader -> DEBU 42b1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:51.980 UTC [msp] GetDefaultSigningIdentity -> DEBU 42b2 Obtaining default signing identity" -"2019-07-20 02:40:51.980 UTC [msp.identity] Sign -> DEBU 42b3 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100F1801 " -"2019-07-20 02:40:51.980 UTC [msp.identity] Sign -> DEBU 42b4 Sign: digest: 856682469DC7D1E9347963F414AE0038209189ADEBB806E700FC601EF802B0D4 " -"2019-07-20 02:40:51.980 UTC [gossip.election] waitForInterrupt -> DEBU 42b5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b6 Obtaining identity" -"2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b7 Obtaining identity" -"2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b8 Obtaining identity" -"2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42b9 Obtaining identity" -"2019-07-20 02:40:51.984 UTC [gossip.comm] Send -> DEBU 42ba Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42bb Obtaining identity" -"2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42bc Obtaining identity" -"2019-07-20 02:40:51.984 UTC [gossip.comm] sendToEndpoint -> DEBU 42bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" -"2019-07-20 02:40:51.984 UTC [gossip.comm] sendToEndpoint -> DEBU 42be Exiting" -"2019-07-20 02:40:51.992 UTC [gossip.gossip] handleMessage -> DEBU 42bf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:51.992 UTC [gossip.gossip] handleMessage -> DEBU 42c0 Exiting" -"2019-07-20 02:40:51.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42c1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:51.992 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 42c2 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:51.992 UTC [msp] DeserializeIdentity -> DEBU 42c3 Obtaining identity" -"2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c5 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c6 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:51.993 UTC [cauthdsl] func1 -> DEBU 42ca 0xc0042c8620 gate 1563590451993384600 evaluation starts" -"2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cb 0xc0042c8620 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cc 0xc0042c8620 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cd 0xc0042c8620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42ce 0xc0042c8620 principal evaluation fails" -"2019-07-20 02:40:51.995 UTC [cauthdsl] func1 -> DEBU 42cf 0xc0042c8620 gate 1563590451993384600 evaluation fails" -"2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:51.995 UTC [cauthdsl] func1 -> DEBU 42d3 0xc0042c8e60 gate 1563590451995584800 evaluation starts" -"2019-07-20 02:40:51.995 UTC [cauthdsl] func2 -> DEBU 42d4 0xc0042c8e60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:51.995 UTC [cauthdsl] func2 -> DEBU 42d5 0xc0042c8e60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42d6 0xc0042c8e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42d7 0xc0042c8e60 principal evaluation fails" -"2019-07-20 02:40:51.996 UTC [cauthdsl] func1 -> DEBU 42d8 0xc0042c8e60 gate 1563590451995584800 evaluation fails" -"2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42d9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:51.996 UTC [cauthdsl] func1 -> DEBU 42dc 0xc0042c96a0 gate 1563590451996956400 evaluation starts" -"2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42dd 0xc0042c96a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42de 0xc0042c96a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42df 0xc0042c96a0 principal matched by identity 0" -"2019-07-20 02:40:51.997 UTC [msp.identity] Verify -> DEBU 42e0 Verify: digest = 00000000 07 65 f8 b1 46 c6 71 bc 91 63 50 c6 61 e6 b3 0b |.e..F.q..cP.a...| -00000010 a3 db 09 f6 ea e5 83 3f 51 8b 3e fc 4c 29 55 92 |.......?Q.>.L)U.|" -"2019-07-20 02:40:51.997 UTC [msp.identity] Verify -> DEBU 42e1 Verify: sig = 00000000 30 45 02 21 00 d4 75 c4 4b 1d b3 ed 99 a8 76 08 |0E.!..u.K.....v.| -00000010 1a 73 87 c0 4c f3 1d d3 80 c8 f5 bd 83 b8 96 64 |.s..L..........d| -00000020 b0 85 bf 62 5c 02 20 64 c7 e6 be ea c5 6b ca bf |...b\. d.....k..| -00000030 bc f6 48 a6 f1 ce a6 12 ff 4f 6b 90 22 f4 d5 2b |..H......Ok."..+| -00000040 f8 91 6e 2e f1 09 c8 |..n....|" -"2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42e2 0xc0042c96a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:51.997 UTC [cauthdsl] func1 -> DEBU 42e3 0xc0042c96a0 gate 1563590451996956400 evaluation succeeds" -"2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e6 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:51.997 UTC [gossip.discovery] handleAliveMessage -> DEBU 42e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42e9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ea updating membership: timestamp: " -"2019-07-20 02:40:51.998 UTC [gossip.comm] func1 -> DEBU 42eb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:51.998 UTC [gossip.gossip] handleMessage -> DEBU 42ec Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:51.999 UTC [gossip.comm] func1 -> DEBU 42ed Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ee Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:52.000 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ef Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:52.000 UTC [gossip.discovery] learnExistingMembers -> DEBU 42f0 Exiting" -"2019-07-20 02:40:52.000 UTC [gossip.discovery] handleAliveMessage -> DEBU 42f1 Exiting" -"2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f2 Exiting" -"2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.001 UTC [gossip.gossip] handleMessage -> DEBU 42f4 Exiting" -"2019-07-20 02:40:52.001 UTC [gossip.gossip] handleMessage -> DEBU 42f5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f6 Exiting" -"2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.002 UTC [gossip.gossip] handleMessage -> DEBU 42f8 Exiting" -"2019-07-20 02:40:52.002 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f9 Exiting" -"2019-07-20 02:40:52.009 UTC [msp] DeserializeIdentity -> DEBU 42fa Obtaining identity" -"2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fb Obtaining identity" -"2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fc Obtaining identity" -"2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fd Obtaining identity" -"2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 42fe Obtaining identity" -"2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 42ff Obtaining identity" -"2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 4300 Obtaining identity" -"2019-07-20 02:40:52.012 UTC [gossip.comm] Send -> DEBU 4301 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:52.012 UTC [msp] DeserializeIdentity -> DEBU 4302 Obtaining identity" -"2019-07-20 02:40:52.012 UTC [gossip.comm] sendToEndpoint -> DEBU 4303 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.012 UTC [gossip.comm] sendToEndpoint -> DEBU 4304 Exiting" -"2019-07-20 02:40:52.012 UTC [msp] DeserializeIdentity -> DEBU 4305 Obtaining identity" -"2019-07-20 02:40:52.013 UTC [gossip.comm] Send -> DEBU 4306 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:52.014 UTC [gossip.comm] sendToEndpoint -> DEBU 4307 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.014 UTC [gossip.comm] sendToEndpoint -> DEBU 4308 Exiting" -"2019-07-20 02:40:52.237 UTC [gossip.pull] Hello -> DEBU 4309 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:52.242 UTC [gossip.pull] Hello -> DEBU 430b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:52.242 UTC [gossip.pull] Hello -> DEBU 430d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:52.242 UTC [gossip.comm] sendToEndpoint -> DEBU 430f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4310 Exiting" -"2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4311 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4312 Exiting" -"2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4313 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4314 Exiting" -"2019-07-20 02:40:52.246 UTC [gossip.gossip] handleMessage -> DEBU 4315 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.246 UTC [gossip.pull] HandleMessage -> DEBU 4316 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.246 UTC [gossip.gossip] handleMessage -> DEBU 4317 Exiting" -"2019-07-20 02:40:52.246 UTC [gossip.comm] func1 -> DEBU 4318 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.249 UTC [gossip.gossip] handleMessage -> DEBU 4319 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.249 UTC [gossip.pull] HandleMessage -> DEBU 431a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.249 UTC [gossip.gossip] handleMessage -> DEBU 431b Exiting" -"2019-07-20 02:40:52.251 UTC [gossip.comm] func1 -> DEBU 431c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.251 UTC [gossip.gossip] handleMessage -> DEBU 431d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.251 UTC [gossip.pull] HandleMessage -> DEBU 431e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.251 UTC [gossip.gossip] handleMessage -> DEBU 431f Exiting" -"2019-07-20 02:40:52.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 4320 Obtaining default signing identity" -"2019-07-20 02:40:52.280 UTC [msp.identity] Sign -> DEBU 4321 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151032 " -"2019-07-20 02:40:52.280 UTC [msp.identity] Sign -> DEBU 4322 Sign: digest: 9C399936F2F49BE9EE217CAB54B263EC9A942EB44DBB2EC94B19A5389E400421 " -"2019-07-20 02:40:52.281 UTC [msp] GetDefaultSigningIdentity -> DEBU 4323 Obtaining default signing identity" -"2019-07-20 02:40:52.281 UTC [msp.identity] Sign -> DEBU 4324 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:52.281 UTC [msp.identity] Sign -> DEBU 4325 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 4326 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:52.281 UTC [msp] DeserializeIdentity -> DEBU 4327 Obtaining identity" -"2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 4328 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:52.281 UTC [msp] DeserializeIdentity -> DEBU 4329 Obtaining identity" -"2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 432a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:52.281 UTC [gossip.comm] sendToEndpoint -> DEBU 432b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.281 UTC [gossip.comm] sendToEndpoint -> DEBU 432c Exiting" -"2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432e Exiting" -"2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 4330 Exiting" -"2019-07-20 02:40:52.284 UTC [gossip.comm] func1 -> DEBU 4331 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4332 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4333 Exiting" -"2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4334 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4335 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4336 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:52.286 UTC [gossip.comm] func1 -> DEBU 4337 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.287 UTC [msp.identity] Verify -> DEBU 4338 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| -00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" -"2019-07-20 02:40:52.287 UTC [msp.identity] Verify -> DEBU 4339 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| -00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| -00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| -00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| -00000040 ca ca 4e 05 58 db b7 |..N.X..|" -"2019-07-20 02:40:52.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 433a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.287 UTC [gossip.discovery] isSentByMe -> DEBU 433b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 433c Exiting" -"2019-07-20 02:40:52.287 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 433d Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:52.288 UTC [msp] DeserializeIdentity -> DEBU 433e Obtaining identity" -"2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 433f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4340 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4341 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4342 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4343 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4344 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:52.288 UTC [cauthdsl] func1 -> DEBU 4345 0xc00432a3d0 gate 1563590452288537200 evaluation starts" -"2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4346 0xc00432a3d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4347 0xc00432a3d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4348 0xc00432a3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4349 0xc00432a3d0 principal evaluation fails" -"2019-07-20 02:40:52.288 UTC [cauthdsl] func1 -> DEBU 434a 0xc00432a3d0 gate 1563590452288537200 evaluation fails" -"2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 434b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 434c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 434d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:52.289 UTC [cauthdsl] func1 -> DEBU 434e 0xc00432ac10 gate 1563590452289139200 evaluation starts" -"2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 434f 0xc00432ac10 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4350 0xc00432ac10 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4351 0xc00432ac10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4352 0xc00432ac10 principal evaluation fails" -"2019-07-20 02:40:52.289 UTC [cauthdsl] func1 -> DEBU 4353 0xc00432ac10 gate 1563590452289139200 evaluation fails" -"2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4354 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4355 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4356 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:52.290 UTC [cauthdsl] func1 -> DEBU 4357 0xc00432b450 gate 1563590452290015700 evaluation starts" -"2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 4358 0xc00432b450 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 4359 0xc00432b450 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 435a 0xc00432b450 principal matched by identity 0" -"2019-07-20 02:40:52.294 UTC [msp.identity] Verify -> DEBU 435b Verify: digest = 00000000 c8 4a ac 4f 71 b3 e4 bd 69 2d bb e2 b3 7b 75 dc |.J.Oq...i-...{u.| -00000010 48 0d 1e cf 11 6d 74 d5 b2 c3 cb b7 9b a1 47 43 |H....mt.......GC|" -"2019-07-20 02:40:52.294 UTC [msp.identity] Verify -> DEBU 435c Verify: sig = 00000000 30 45 02 21 00 b8 46 89 61 0a 7f 6e 80 cd cd 78 |0E.!..F.a..n...x| -00000010 c4 0f 6b 13 9a 5f 51 fc 0f 48 3b 47 47 6a 34 ea |..k.._Q..H;GGj4.| -00000020 c9 87 9f 2b 44 02 20 07 f5 8d a1 90 91 28 70 9a |...+D. ......(p.| -00000030 c7 d4 e1 19 a0 0f 1a f1 78 05 1e 8a 3a 1c 3e 8a |........x...:.>.| -00000040 6c 39 6d f0 af 9f 8c |l9m....|" -"2019-07-20 02:40:52.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 435d Obtaining default signing identity" -"2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 435e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151033 " -"2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 435f Sign: digest: 56A37E8BD80FA015C713558FB7A1BEA1925B1592315D72A856BE5481C7611A3C " -"2019-07-20 02:40:52.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 4360 Obtaining default signing identity" -"2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 4361 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 4362 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:52.295 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4363 Sleeping 5s" -"2019-07-20 02:40:52.295 UTC [cauthdsl] func2 -> DEBU 4364 0xc00432b450 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:52.296 UTC [cauthdsl] func1 -> DEBU 4365 0xc00432b450 gate 1563590452290015700 evaluation succeeds" -"2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4366 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4367 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 4368 Obtaining identity" -"2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 4369 Obtaining identity" -"2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 436a Obtaining identity" -"2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:52.297 UTC [msp] DeserializeIdentity -> DEBU 436d Obtaining identity" -"2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 436f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4370 Exiting" -"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4371 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4372 Exiting" -"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4373 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4374 Exiting" -"2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4375 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:52.303 UTC [policies] Evaluate -> DEBU 4376 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:52.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 4377 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 4378 Exiting" -"2019-07-20 02:40:52.307 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4379 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:52.308 UTC [msp.identity] Verify -> DEBU 437a Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| -00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" -"2019-07-20 02:40:52.308 UTC [msp.identity] Verify -> DEBU 437b Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| -00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| -00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| -00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| -00000040 78 fb 75 ea c1 36 cc |x.u..6.|" -"2019-07-20 02:40:52.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 437c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 437d Exiting" -"2019-07-20 02:40:52.308 UTC [gossip.discovery] handleMsgFromComm -> DEBU 437e Exiting" -"2019-07-20 02:40:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU 437f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4380 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:52.309 UTC [gossip.gossip] handleMessage -> DEBU 4381 Exiting" -"2019-07-20 02:40:52.309 UTC [gossip.gossip] handleMessage -> DEBU 4382 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.309 UTC [msp.identity] Verify -> DEBU 4383 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| -00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" -"2019-07-20 02:40:52.309 UTC [msp.identity] Verify -> DEBU 4384 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| -00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| -00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| -00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| -00000040 ca ca 4e 05 58 db b7 |..N.X..|" -"2019-07-20 02:40:52.310 UTC [msp.identity] Verify -> DEBU 4385 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| -00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:52.310 UTC [msp.identity] Verify -> DEBU 4386 Verify: sig = 00000000 30 45 02 21 00 ac e9 d3 31 c4 59 f7 8f ee 15 fd |0E.!....1.Y.....| -00000010 b8 35 b1 54 7e ca e3 c1 6f b0 7c f1 ca 95 16 93 |.5.T~...o.|.....| -00000020 0d 42 7c 4b b6 02 20 5a 8c 15 17 d8 aa 34 2b 40 |.B|K.. Z.....4+@| -00000030 bf 17 cc fb 27 00 a9 b8 a7 2c c2 90 68 f0 48 93 |....'....,..h.H.| -00000040 6f fc 6c b0 0f fb 9e |o.l....|" -"2019-07-20 02:40:52.310 UTC [gossip.discovery] handleAliveMessage -> DEBU 4387 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:52.310 UTC [gossip.discovery] isSentByMe -> DEBU 4388 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 4389 Exiting" -"2019-07-20 02:40:52.311 UTC [gossip.discovery] handleMsgFromComm -> DEBU 438a Exiting" -"2019-07-20 02:40:52.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 438b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 438c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:52.312 UTC [msp.identity] Verify -> DEBU 438d Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| -00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" -"2019-07-20 02:40:52.313 UTC [msp.identity] Verify -> DEBU 438e Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| -00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| -00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| -00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| -00000040 78 fb 75 ea c1 36 cc |x.u..6.|" -"2019-07-20 02:40:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU 438f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.314 UTC [gossip.gossip] handleMessage -> DEBU 4390 Exiting" -"2019-07-20 02:40:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU 4391 Exiting" -"2019-07-20 02:40:52.320 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4392 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:52.321 UTC [msp.identity] Verify -> DEBU 4393 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| -00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" -"2019-07-20 02:40:52.321 UTC [msp.identity] Verify -> DEBU 4394 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| -00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| -00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| -00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| -00000040 ca ca 4e 05 58 db b7 |..N.X..|" -"2019-07-20 02:40:52.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 4395 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.323 UTC [gossip.discovery] isSentByMe -> DEBU 4396 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 4397 Exiting" -"2019-07-20 02:40:52.324 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4398 Exiting" -"2019-07-20 02:40:52.340 UTC [gossip.gossip] handleMessage -> DEBU 4399 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.341 UTC [gossip.pull] HandleMessage -> DEBU 439a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.341 UTC [gossip.pull] SendDigest -> DEBU 439b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439c Exiting" -"2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439e Exiting" -"2019-07-20 02:40:52.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 439f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43a0 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:52.341 UTC [msp.identity] Verify -> DEBU 43a1 Verify: digest = 00000000 93 a9 43 89 ee 0d 68 00 49 2b fd 2d 56 38 2f d9 |..C...h.I+.-V8/.| -00000010 60 a6 e5 51 a4 21 d6 e7 3d 91 2b 47 dd 19 5f b9 |`..Q.!..=.+G.._.|" -"2019-07-20 02:40:52.341 UTC [msp.identity] Verify -> DEBU 43a2 Verify: sig = 00000000 30 45 02 21 00 d8 78 12 32 3a 72 01 c6 8e c3 5b |0E.!..x.2:r....[| -00000010 49 22 72 f1 b7 94 1f 40 54 b7 4d 71 54 dd eb c3 |I"r....@T.MqT...| -00000020 83 16 b9 03 67 02 20 45 12 b8 8f 7f e7 b1 3b 32 |....g. E......;2| -00000030 d2 3e fd cb 57 4a 00 2d de d8 c1 a0 c0 eb 52 12 |.>..WJ.-......R.| -00000040 c3 b9 f7 69 80 1a c3 |...i...|" -"2019-07-20 02:40:52.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 43a3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a8 Exiting" -"2019-07-20 02:40:52.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 43a9 Exiting" -"2019-07-20 02:40:52.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43aa Exiting" -"2019-07-20 02:40:52.349 UTC [gossip.comm] func1 -> DEBU 43ab Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.349 UTC [gossip.gossip] handleMessage -> DEBU 43ac Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.349 UTC [gossip.gossip] handleMessage -> DEBU 43ad Exiting" -"2019-07-20 02:40:52.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43ae Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43af Exiting" -"2019-07-20 02:40:52.349 UTC [gossip.comm] func1 -> DEBU 43b0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.350 UTC [gossip.gossip] handleMessage -> DEBU 43b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.350 UTC [gossip.gossip] handleMessage -> DEBU 43b2 Exiting" -"2019-07-20 02:40:52.350 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43b3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.350 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43b4 Exiting" -"2019-07-20 02:40:52.350 UTC [msp] DeserializeIdentity -> DEBU 43b5 Obtaining identity" -"2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b6 Obtaining identity" -"2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b7 Obtaining identity" -"2019-07-20 02:40:52.351 UTC [gossip.comm] Send -> DEBU 43b8 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b9 Obtaining identity" -"2019-07-20 02:40:52.351 UTC [gossip.comm] Send -> DEBU 43ba Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bc Exiting" -"2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43be Exiting" -"2019-07-20 02:40:52.365 UTC [gossip.gossip] handleMessage -> DEBU 43bf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.365 UTC [gossip.gossip] handleMessage -> DEBU 43c0 Exiting" -"2019-07-20 02:40:52.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43c1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > > , Envelope: 272 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43c2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c3 Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| -00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" -"2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c4 Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| -00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| -00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| -00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| -00000040 86 01 4f b2 60 e9 82 |..O.`..|" -"2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-09-24 00:27:20.107 UTC [cauthdsl] func1 -> DEBU 6dc5 0xc005233c90 gate 1569284840107329800 evaluation starts" +"2019-09-24 00:27:20.107 UTC [cauthdsl] func2 -> DEBU 6dc6 0xc005233c90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.107 UTC [cauthdsl] func2 -> DEBU 6dc7 0xc005233c90 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.107 UTC [cauthdsl] func2 -> DEBU 6dc8 0xc005233c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 00:27:20.107 UTC [cauthdsl] func2 -> DEBU 6dc9 0xc005233c90 principal evaluation fails" +"2019-09-24 00:27:20.107 UTC [cauthdsl] func1 -> DEBU 6dca 0xc005233c90 gate 1569284840107329800 evaluation fails" +"2019-09-24 00:27:20.108 UTC [policies] Evaluate -> DEBU 6dcb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.108 UTC [policies] Evaluate -> DEBU 6dcc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.108 UTC [policies] Evaluate -> DEBU 6dcd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:20.108 UTC [cauthdsl] func1 -> DEBU 6dce 0xc005246e10 gate 1569284840108687800 evaluation starts" +"2019-09-24 00:27:20.108 UTC [cauthdsl] func2 -> DEBU 6dcf 0xc005246e10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.108 UTC [cauthdsl] func2 -> DEBU 6dd0 0xc005246e10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.109 UTC [cauthdsl] func2 -> DEBU 6dd1 0xc005246e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +"2019-09-24 00:27:20.109 UTC [cauthdsl] func2 -> DEBU 6dd2 0xc005246e10 principal evaluation fails" +"2019-09-24 00:27:20.109 UTC [cauthdsl] func1 -> DEBU 6dd3 0xc005246e10 gate 1569284840108687800 evaluation fails" +"2019-09-24 00:27:20.109 UTC [policies] Evaluate -> DEBU 6dd4 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:20.109 UTC [policies] Evaluate -> DEBU 6dd5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:20.109 UTC [policies] Evaluate -> DEBU 6dd6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:20.109 UTC [cauthdsl] func1 -> DEBU 6dd7 0xc005247670 gate 1569284840109831200 evaluation starts" +"2019-09-24 00:27:20.109 UTC [cauthdsl] func2 -> DEBU 6dd8 0xc005247670 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.110 UTC [cauthdsl] func2 -> DEBU 6dd9 0xc005247670 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.110 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6dda Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 00:27:20.110 UTC [msp] Validate -> DEBU 6ddb MSP Org1MSP validating identity" +"2019-09-24 00:27:20.110 UTC [msp] getCertificationChain -> DEBU 6ddc MSP Org1MSP getting certification chain" +"2019-09-24 00:27:20.110 UTC [cauthdsl] func2 -> DEBU 6ddd 0xc005247670 principal matched by identity 0" +"2019-09-24 00:27:20.111 UTC [msp.identity] Verify -> DEBU 6dde Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +"2019-09-24 00:27:20.111 UTC [msp.identity] Verify -> DEBU 6ddf Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +00000040 f9 8f 71 f2 6e 18 |..q.n.|" +"2019-09-24 00:27:20.111 UTC [cauthdsl] func2 -> DEBU 6de0 0xc005247670 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:20.112 UTC [cauthdsl] func1 -> DEBU 6de1 0xc005247670 gate 1569284840109831200 evaluation succeeds" +"2019-09-24 00:27:20.112 UTC [policies] Evaluate -> DEBU 6de2 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:20.112 UTC [policies] Evaluate -> DEBU 6de3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:20.112 UTC [policies] Evaluate -> DEBU 6de4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:20.112 UTC [policies] Evaluate -> DEBU 6de5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:20.113 UTC [gossip.gossip] handleMessage -> DEBU 6de6 Exiting" +"2019-09-24 00:27:20.113 UTC [gossip.gossip] handleMessage -> DEBU 6de7 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.113 UTC [msp.identity] Verify -> DEBU 6de8 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +"2019-09-24 00:27:20.113 UTC [msp.identity] Verify -> DEBU 6de9 Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +00000040 54 87 75 e6 8e 00 |T.u...|" +"2019-09-24 00:27:20.114 UTC [msp] DeserializeIdentity -> DEBU 6dea Obtaining identity" +"2019-09-24 00:27:20.114 UTC [gossip.gossip] handleMessage -> DEBU 6deb Exiting" +"2019-09-24 00:27:20.297 UTC [msp] DeserializeIdentity -> DEBU 6dec Obtaining identity" +"2019-09-24 00:27:20.297 UTC [msp] DeserializeIdentity -> DEBU 6ded Obtaining identity" +"2019-09-24 00:27:20.298 UTC [gossip.pull] Hello -> DEBU 6dee Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:20.298 UTC [msp] DeserializeIdentity -> DEBU 6def Obtaining identity" +"2019-09-24 00:27:20.299 UTC [msp] DeserializeIdentity -> DEBU 6df0 Obtaining identity" +"2019-09-24 00:27:20.299 UTC [gossip.comm] Send -> DEBU 6df1 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:20.299 UTC [gossip.comm] sendToEndpoint -> DEBU 6df2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.299 UTC [gossip.comm] sendToEndpoint -> DEBU 6df3 Exiting" +"2019-09-24 00:27:20.301 UTC [gossip.comm] func1 -> DEBU 6df4 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.301 UTC [gossip.gossip] handleMessage -> DEBU 6df5 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.302 UTC [gossip.pull] HandleMessage -> DEBU 6df6 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.302 UTC [gossip.gossip] handleMessage -> DEBU 6df7 Exiting" +"2019-09-24 00:27:20.545 UTC [gossip.comm] func1 -> DEBU 6df8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.546 UTC [gossip.gossip] handleMessage -> DEBU 6df9 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.546 UTC [msp] DeserializeIdentity -> DEBU 6dfa Obtaining identity" +"2019-09-24 00:27:20.547 UTC [msp] DeserializeIdentity -> DEBU 6dfb Obtaining identity" +"2019-09-24 00:27:20.547 UTC [gossip.gossip] handleMessage -> DEBU 6dfc Exiting" +"2019-09-24 00:27:20.557 UTC [gossip.comm] func1 -> DEBU 6dfd Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.557 UTC [gossip.gossip] handleMessage -> DEBU 6dfe Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.557 UTC [msp.identity] Verify -> DEBU 6dff Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +"2019-09-24 00:27:20.557 UTC [msp.identity] Verify -> DEBU 6e00 Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +00000040 f9 8f 71 f2 6e 18 |..q.n.|" +"2019-09-24 00:27:20.558 UTC [gossip.gossip] handleMessage -> DEBU 6e01 Exiting" +"2019-09-24 00:27:20.560 UTC [gossip.comm] func1 -> DEBU 6e02 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.560 UTC [gossip.gossip] handleMessage -> DEBU 6e03 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.561 UTC [msp.identity] Verify -> DEBU 6e04 Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +"2019-09-24 00:27:20.561 UTC [msp.identity] Verify -> DEBU 6e05 Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +00000040 f9 8f 71 f2 6e 18 |..q.n.|" +"2019-09-24 00:27:20.561 UTC [msp] DeserializeIdentity -> DEBU 6e06 Obtaining identity" +"2019-09-24 00:27:20.562 UTC [gossip.gossip] handleMessage -> DEBU 6e07 Exiting" +"2019-09-24 00:27:20.567 UTC [gossip.comm] func1 -> DEBU 6e08 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.567 UTC [gossip.gossip] handleMessage -> DEBU 6e09 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.568 UTC [msp.identity] Verify -> DEBU 6e0a Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +"2019-09-24 00:27:20.568 UTC [msp.identity] Verify -> DEBU 6e0b Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +00000040 f9 8f 71 f2 6e 18 |..q.n.|" +"2019-09-24 00:27:20.569 UTC [msp] DeserializeIdentity -> DEBU 6e0c Obtaining identity" +"2019-09-24 00:27:20.569 UTC [gossip.gossip] handleMessage -> DEBU 6e0d Exiting" +"2019-09-24 00:27:20.644 UTC [gossip.comm] func1 -> DEBU 6e0e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.644 UTC [gossip.gossip] handleMessage -> DEBU 6e0f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.644 UTC [gossip.gossip] handleMessage -> DEBU 6e10 Exiting" +"2019-09-24 00:27:20.645 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e11 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.645 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6e12 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:20.645 UTC [msp] DeserializeIdentity -> DEBU 6e13 Obtaining identity" +"2019-09-24 00:27:20.645 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6e14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:20.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e15 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e16 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.646 UTC [policies] Evaluate -> DEBU 6e17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:20.646 UTC [policies] Evaluate -> DEBU 6e18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:20.646 UTC [policies] Evaluate -> DEBU 6e19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:20.646 UTC [cauthdsl] func1 -> DEBU 6e1a 0xc0052a44a0 gate 1569284840646876100 evaluation starts" +"2019-09-24 00:27:20.648 UTC [cauthdsl] func2 -> DEBU 6e1b 0xc0052a44a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.648 UTC [cauthdsl] func2 -> DEBU 6e1c 0xc0052a44a0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.648 UTC [cauthdsl] func2 -> DEBU 6e1d 0xc0052a44a0 principal matched by identity 0" +"2019-09-24 00:27:20.648 UTC [msp.identity] Verify -> DEBU 6e1e Verify: digest = 00000000 9d a8 2f ec 3b e2 03 e8 c7 51 1e ae 0d 40 82 d7 |../.;....Q...@..| +00000010 5d d7 39 3c 30 14 47 9e 66 84 f8 b5 46 3d dc 09 |].9<0.G.f...F=..|" +"2019-09-24 00:27:20.648 UTC [msp.identity] Verify -> DEBU 6e1f Verify: sig = 00000000 30 45 02 21 00 f7 20 17 ed aa 59 3e 61 89 54 27 |0E.!.. ...Y>a.T'| +00000010 18 f6 d1 21 78 a0 1d 1a 23 df 54 f9 1f a1 d1 32 |...!x...#.T....2| +00000020 5b 0f ad cb 31 02 20 27 41 05 17 94 89 de cf 00 |[...1. 'A.......| +00000030 c3 78 cb 2c 58 f4 33 d0 b9 d9 04 e0 5e 5f e8 d0 |.x.,X.3.....^_..| +00000040 9b 9d ae 2e 3d ec 4c |....=.L|" +"2019-09-24 00:27:20.649 UTC [cauthdsl] func2 -> DEBU 6e20 0xc0052a44a0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:20.649 UTC [cauthdsl] func1 -> DEBU 6e21 0xc0052a44a0 gate 1569284840646876100 evaluation succeeds" +"2019-09-24 00:27:20.649 UTC [policies] Evaluate -> DEBU 6e22 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.649 UTC [policies] Evaluate -> DEBU 6e23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.649 UTC [policies] Evaluate -> DEBU 6e24 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:20.649 UTC [policies] Evaluate -> DEBU 6e25 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:20.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 6e26 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e27 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:20.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e28 updating membership: timestamp: " +"2019-09-24 00:27:20.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e2a Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:20.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e2b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:20.651 UTC [gossip.comm] func1 -> DEBU 6e29 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e2d Exiting" +"2019-09-24 00:27:20.652 UTC [gossip.gossip] handleMessage -> DEBU 6e2c Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.652 UTC [gossip.discovery] handleAliveMessage -> DEBU 6e2e Exiting" +"2019-09-24 00:27:20.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e2f Exiting" +"2019-09-24 00:27:20.653 UTC [gossip.gossip] handleMessage -> DEBU 6e30 Exiting" +"2019-09-24 00:27:20.653 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e31 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e32 Obtaining identity" +"2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e33 Obtaining identity" +"2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e34 Obtaining identity" +"2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e35 Obtaining identity" +"2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e36 Obtaining identity" +"2019-09-24 00:27:20.654 UTC [msp] DeserializeIdentity -> DEBU 6e37 Obtaining identity" +"2019-09-24 00:27:20.655 UTC [gossip.comm] Send -> DEBU 6e38 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:20.655 UTC [msp] DeserializeIdentity -> DEBU 6e39 Obtaining identity" +"2019-09-24 00:27:20.656 UTC [msp] DeserializeIdentity -> DEBU 6e3a Obtaining identity" +"2019-09-24 00:27:20.656 UTC [gossip.comm] Send -> DEBU 6e3b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:20.656 UTC [gossip.comm] sendToEndpoint -> DEBU 6e3c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.657 UTC [gossip.comm] sendToEndpoint -> DEBU 6e3d Exiting" +"2019-09-24 00:27:20.657 UTC [gossip.comm] sendToEndpoint -> DEBU 6e3e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.657 UTC [gossip.comm] sendToEndpoint -> DEBU 6e3f Exiting" +"2019-09-24 00:27:20.654 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e40 Exiting" +"2019-09-24 00:27:20.660 UTC [gossip.comm] func1 -> DEBU 6e41 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.660 UTC [gossip.gossip] handleMessage -> DEBU 6e42 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.660 UTC [gossip.gossip] handleMessage -> DEBU 6e43 Exiting" +"2019-09-24 00:27:20.660 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e44 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:20.660 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e45 Exiting" +"2019-09-24 00:27:20.741 UTC [gossip.comm] func1 -> DEBU 6e46 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.742 UTC [gossip.gossip] handleMessage -> DEBU 6e47 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.742 UTC [gossip.gossip] handleMessage -> DEBU 6e48 Exiting" +"2019-09-24 00:27:20.743 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e49 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.743 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6e4a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:20.744 UTC [msp] DeserializeIdentity -> DEBU 6e4b Obtaining identity" +"2019-09-24 00:27:20.744 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6e4c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:20.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e4d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e4e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:20.746 UTC [policies] Evaluate -> DEBU 6e4f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:20.746 UTC [policies] Evaluate -> DEBU 6e50 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:20.746 UTC [policies] Evaluate -> DEBU 6e51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:20.747 UTC [cauthdsl] func1 -> DEBU 6e52 0xc0052c5920 gate 1569284840747494300 evaluation starts" +"2019-09-24 00:27:20.747 UTC [cauthdsl] func2 -> DEBU 6e53 0xc0052c5920 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:20.748 UTC [cauthdsl] func2 -> DEBU 6e54 0xc0052c5920 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:20.748 UTC [cauthdsl] func2 -> DEBU 6e55 0xc0052c5920 principal matched by identity 0" +"2019-09-24 00:27:20.748 UTC [msp.identity] Verify -> DEBU 6e56 Verify: digest = 00000000 25 da 91 3c 0a df 00 04 fd bf 16 3d 22 5a 52 b8 |%..<.......="ZR.| +00000010 3a 79 59 6a 5d 5e 30 37 7d ee b5 d3 0c 88 17 1e |:yYj]^07}.......|" +"2019-09-24 00:27:20.749 UTC [msp.identity] Verify -> DEBU 6e57 Verify: sig = 00000000 30 44 02 20 45 38 d3 83 00 69 cc d0 e4 f0 b9 7a |0D. E8...i.....z| +00000010 6f aa c3 5a 42 e5 08 22 4b 34 17 f1 cd 3d 7d be |o..ZB.."K4...=}.| +00000020 2c c5 a2 f3 02 20 08 4e 28 dd 82 b6 4c 3a 71 e4 |,.... .N(...L:q.| +00000030 11 a9 61 34 29 c7 e0 45 de 27 a8 17 8d ff 1b 95 |..a4)..E.'......| +00000040 f3 35 0a 05 4f cf |.5..O.|" +"2019-09-24 00:27:20.749 UTC [cauthdsl] func2 -> DEBU 6e58 0xc0052c5920 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:20.749 UTC [cauthdsl] func1 -> DEBU 6e59 0xc0052c5920 gate 1569284840747494300 evaluation succeeds" +"2019-09-24 00:27:20.749 UTC [policies] Evaluate -> DEBU 6e5a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.750 UTC [policies] Evaluate -> DEBU 6e5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:20.750 UTC [policies] Evaluate -> DEBU 6e5c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:20.750 UTC [policies] Evaluate -> DEBU 6e5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:20.750 UTC [gossip.discovery] handleAliveMessage -> DEBU 6e5e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:20.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e5f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:20.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e60 updating membership: timestamp: " +"2019-09-24 00:27:20.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e61 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:20.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e62 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:20.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 6e63 Exiting" +"2019-09-24 00:27:20.752 UTC [gossip.discovery] handleAliveMessage -> DEBU 6e64 Exiting" +"2019-09-24 00:27:20.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6e65 Exiting" +"2019-09-24 00:27:20.752 UTC [gossip.discovery] sendMemResponse -> DEBU 6e66 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:27:20.753 UTC [msp] DeserializeIdentity -> DEBU 6e67 Obtaining identity" +"2019-09-24 00:27:20.754 UTC [msp] DeserializeIdentity -> DEBU 6e68 Obtaining identity" +"2019-09-24 00:27:20.754 UTC [msp] DeserializeIdentity -> DEBU 6e69 Obtaining identity" +"2019-09-24 00:27:20.754 UTC [gossip.comm] Send -> DEBU 6e6a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:20.755 UTC [gossip.comm] sendToEndpoint -> DEBU 6e6b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.755 UTC [gossip.comm] sendToEndpoint -> DEBU 6e6d Exiting" +"2019-09-24 00:27:20.755 UTC [gossip.discovery] sendMemResponse -> DEBU 6e6c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020U" signature:"0D\002 ^\036\351\367\033\316\364\264P\225f\317\177\365 \204\230\244\203C\243o\221\023\250\010\210\251\030\306\352\367\002 q\214U\234I\244\313\226\0326\022o8/\035ByY\003\375O\367\3675t\n\235|\0029)\003" > alive: alive: alive: " +"2019-09-24 00:27:20.786 UTC [gossip.comm] func1 -> DEBU 6e6e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.787 UTC [gossip.gossip] handleMessage -> DEBU 6e6f Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.788 UTC [gossip.pull] HandleMessage -> DEBU 6e70 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.789 UTC [msp] DeserializeIdentity -> DEBU 6e71 Obtaining identity" +"2019-09-24 00:27:20.789 UTC [msp] DeserializeIdentity -> DEBU 6e72 Obtaining identity" +"2019-09-24 00:27:20.789 UTC [msp] DeserializeIdentity -> DEBU 6e73 Obtaining identity" +"2019-09-24 00:27:20.790 UTC [msp] DeserializeIdentity -> DEBU 6e74 Obtaining identity" +"2019-09-24 00:27:20.790 UTC [msp] DeserializeIdentity -> DEBU 6e75 Obtaining identity" +"2019-09-24 00:27:20.791 UTC [msp] DeserializeIdentity -> DEBU 6e76 Obtaining identity" +"2019-09-24 00:27:20.791 UTC [gossip.pull] SendDigest -> DEBU 6e77 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:27:20.792 UTC [gossip.gossip] handleMessage -> DEBU 6e78 Exiting" +"2019-09-24 00:27:20.807 UTC [gossip.comm] func1 -> DEBU 6e79 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.808 UTC [gossip.gossip] handleMessage -> DEBU 6e7a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.809 UTC [gossip.pull] HandleMessage -> DEBU 6e7b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:20.809 UTC [gossip.pull] SendDigest -> DEBU 6e7c Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:20.809 UTC [gossip.gossip] handleMessage -> DEBU 6e7d Exiting" +"2019-09-24 00:27:21.040 UTC [gossip.comm] func1 -> DEBU 6e7e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:21.040 UTC [gossip.gossip] handleMessage -> DEBU 6e7f Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:21.040 UTC [msp] DeserializeIdentity -> DEBU 6e80 Obtaining identity" +"2019-09-24 00:27:21.041 UTC [msp] DeserializeIdentity -> DEBU 6e81 Obtaining identity" +"2019-09-24 00:27:21.041 UTC [msp] DeserializeIdentity -> DEBU 6e82 Obtaining identity" +"2019-09-24 00:27:21.042 UTC [gossip.gossip] handleMessage -> DEBU 6e83 Exiting" +"2019-09-24 00:27:21.049 UTC [gossip.comm] func1 -> DEBU 6e84 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:21.049 UTC [gossip.gossip] handleMessage -> DEBU 6e85 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:21.050 UTC [msp] DeserializeIdentity -> DEBU 6e86 Obtaining identity" +"2019-09-24 00:27:21.050 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6e87 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:21.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e88 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:21.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e89 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:21.051 UTC [policies] Evaluate -> DEBU 6e8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:21.051 UTC [policies] Evaluate -> DEBU 6e8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:21.051 UTC [policies] Evaluate -> DEBU 6e8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:21.051 UTC [cauthdsl] func1 -> DEBU 6e8d 0xc0052b3260 gate 1569284841051431400 evaluation starts" +"2019-09-24 00:27:21.051 UTC [cauthdsl] func2 -> DEBU 6e8e 0xc0052b3260 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:21.051 UTC [cauthdsl] func2 -> DEBU 6e8f 0xc0052b3260 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:21.051 UTC [cauthdsl] func2 -> DEBU 6e90 0xc0052b3260 principal matched by identity 0" +"2019-09-24 00:27:21.052 UTC [msp.identity] Verify -> DEBU 6e91 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +"2019-09-24 00:27:21.052 UTC [msp.identity] Verify -> DEBU 6e92 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +00000040 01 32 48 48 f4 8a |.2HH..|" +"2019-09-24 00:27:21.052 UTC [cauthdsl] func2 -> DEBU 6e93 0xc0052b3260 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:21.052 UTC [cauthdsl] func1 -> DEBU 6e94 0xc0052b3260 gate 1569284841051431400 evaluation succeeds" +"2019-09-24 00:27:21.052 UTC [policies] Evaluate -> DEBU 6e95 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:21.052 UTC [policies] Evaluate -> DEBU 6e96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:21.053 UTC [policies] Evaluate -> DEBU 6e97 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:21.053 UTC [policies] Evaluate -> DEBU 6e98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:21.053 UTC [msp] DeserializeIdentity -> DEBU 6e99 Obtaining identity" +"2019-09-24 00:27:21.053 UTC [gossip.gossip] handleMessage -> DEBU 6e9a Exiting" +"2019-09-24 00:27:21.056 UTC [gossip.comm] func1 -> DEBU 6e9b Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:21.056 UTC [gossip.gossip] handleMessage -> DEBU 6e9c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:21.056 UTC [msp] DeserializeIdentity -> DEBU 6e9d Obtaining identity" +"2019-09-24 00:27:21.056 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6e9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:21.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6e9f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:21.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ea0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:21.057 UTC [policies] Evaluate -> DEBU 6ea1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:21.057 UTC [policies] Evaluate -> DEBU 6ea2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:21.057 UTC [policies] Evaluate -> DEBU 6ea3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:21.057 UTC [cauthdsl] func1 -> DEBU 6ea4 0xc0052ef690 gate 1569284841057890900 evaluation starts" +"2019-09-24 00:27:21.057 UTC [cauthdsl] func2 -> DEBU 6ea5 0xc0052ef690 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:21.058 UTC [cauthdsl] func2 -> DEBU 6ea6 0xc0052ef690 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:21.058 UTC [cauthdsl] func2 -> DEBU 6ea7 0xc0052ef690 principal matched by identity 0" +"2019-09-24 00:27:21.058 UTC [msp.identity] Verify -> DEBU 6ea8 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +"2019-09-24 00:27:21.058 UTC [msp.identity] Verify -> DEBU 6ea9 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +00000040 01 32 48 48 f4 8a |.2HH..|" +"2019-09-24 00:27:21.058 UTC [cauthdsl] func2 -> DEBU 6eaa 0xc0052ef690 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:21.059 UTC [cauthdsl] func1 -> DEBU 6eab 0xc0052ef690 gate 1569284841057890900 evaluation succeeds" +"2019-09-24 00:27:21.059 UTC [policies] Evaluate -> DEBU 6eac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:21.059 UTC [policies] Evaluate -> DEBU 6ead == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:21.059 UTC [policies] Evaluate -> DEBU 6eae Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:21.059 UTC [policies] Evaluate -> DEBU 6eaf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:21.059 UTC [msp] DeserializeIdentity -> DEBU 6eb0 Obtaining identity" +"2019-09-24 00:27:21.059 UTC [gossip.gossip] handleMessage -> DEBU 6eb1 Exiting" +"2019-09-24 00:27:21.617 UTC [gossip.comm] func1 -> DEBU 6eb2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:21.617 UTC [gossip.gossip] handleMessage -> DEBU 6eb3 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:21.617 UTC [gossip.pull] HandleMessage -> DEBU 6eb4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:21.617 UTC [gossip.pull] SendDigest -> DEBU 6eb5 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:21.618 UTC [gossip.gossip] handleMessage -> DEBU 6eb6 Exiting" +"2019-09-24 00:27:21.752 UTC [gossip.comm] func1 -> DEBU 6eb7 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020]" signature:"0E\002!\000\361\271L+\277\324\000^z\203\216\263\325\265\223D\256\377-\232\364\302\3740\211ED\203l\220\204\356`\346\r\350\002 U\n\355At\366h\252\277\005\322\3031?\202\305r.\376\356\017\032@\357o\270\265)\027\370\332\305" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:21.753 UTC [gossip.gossip] handleMessage -> DEBU 6eb8 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020]" signature:"0E\002!\000\361\271L+\277\324\000^z\203\216\263\325\265\223D\256\377-\232\364\302\3740\211ED\203l\220\204\356`\346\r\350\002 U\n\355At\366h\252\277\005\322\3031?\202\305r.\376\356\017\032@\357o\270\265)\027\370\332\305" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:21.755 UTC [gossip.gossip] handleMessage -> DEBU 6eb9 Exiting" +"2019-09-24 00:27:21.755 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6eba Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020]" signature:"0E\002!\000\361\271L+\277\324\000^z\203\216\263\325\265\223D\256\377-\232\364\302\3740\211ED\203l\220\204\356`\346\r\350\002 U\n\355At\366h\252\277\005\322\3031?\202\305r.\376\356\017\032@\357o\270\265)\027\370\332\305" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:21.756 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6ebb Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:21.757 UTC [msp.identity] Verify -> DEBU 6ebc Verify: digest = 00000000 05 75 d0 5e bf e6 37 85 00 58 92 da 25 2d a2 3b |.u.^..7..X..%-.;| +00000010 ba ae 49 ae da 15 dd 2a aa 98 8b 0b 3f 86 de 4f |..I....*....?..O|" +"2019-09-24 00:27:21.757 UTC [msp.identity] Verify -> DEBU 6ebd Verify: sig = 00000000 30 45 02 21 00 f1 b9 4c 2b bf d4 00 5e 7a 83 8e |0E.!...L+...^z..| +00000010 b3 d5 b5 93 44 ae ff 2d 9a f4 c2 fc 30 89 45 44 |....D..-....0.ED| +00000020 83 6c 90 3c 72 02 20 12 57 25 95 c2 24 c8 af 55 |.l. DEBU 6ebe Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:52.366 UTC [msp.identity] Verify -> DEBU 43c6 Verify: sig = 00000000 30 45 02 21 00 fc 90 ff 73 60 f4 91 6a f6 d9 05 |0E.!....s`..j...| -00000010 be ba 76 e7 61 fe 1c 20 09 c2 f2 59 7e 3f 03 fc |..v.a.. ...Y~?..| -00000020 3f 34 b3 11 5c 02 20 70 8d ab 3f a6 3f 02 0f d4 |?4..\. p..?.?...| -00000030 f2 e8 6e 66 09 5b 59 5e 0a d8 84 09 03 5f 30 41 |..nf.[Y^....._0A| -00000040 cd d0 97 4d 87 3e 7b |...M.>{|" -"2019-07-20 02:40:52.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 43c7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43c8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" -"2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43c9 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43ca Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43cb Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43cc Exiting" -"2019-07-20 02:40:52.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 43cd Exiting" -"2019-07-20 02:40:52.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43ce Exiting" -"2019-07-20 02:40:52.367 UTC [gossip.discovery] sendMemResponse -> DEBU 43cf Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:52.367 UTC [msp] DeserializeIdentity -> DEBU 43d0 Obtaining identity" -"2019-07-20 02:40:52.367 UTC [msp] DeserializeIdentity -> DEBU 43d1 Obtaining identity" -"2019-07-20 02:40:52.367 UTC [gossip.comm] Send -> DEBU 43d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:52.368 UTC [gossip.discovery] sendMemResponse -> DEBU 43d3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > alive: " -"2019-07-20 02:40:52.368 UTC [gossip.comm] sendToEndpoint -> DEBU 43d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.368 UTC [gossip.comm] sendToEndpoint -> DEBU 43d5 Exiting" -"2019-07-20 02:40:52.531 UTC [gossip.comm] func1 -> DEBU 43d6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.531 UTC [gossip.gossip] handleMessage -> DEBU 43d7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.531 UTC [gossip.gossip] handleMessage -> DEBU 43d8 Exiting" -"2019-07-20 02:40:52.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43d9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43da Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:52.532 UTC [msp] DeserializeIdentity -> DEBU 43db Obtaining identity" -"2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43dd Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43de Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43e2 0xc0043ca7a0 gate 1563590452532372000 evaluation starts" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e3 0xc0043ca7a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e4 0xc0043ca7a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e5 0xc0043ca7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e6 0xc0043ca7a0 principal evaluation fails" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43e7 0xc0043ca7a0 gate 1563590452532372000 evaluation fails" -"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43eb 0xc0043cafe0 gate 1563590452532767400 evaluation starts" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ec 0xc0043cafe0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ed 0xc0043cafe0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ee 0xc0043cafe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ef 0xc0043cafe0 principal evaluation fails" -"2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43f0 0xc0043cafe0 gate 1563590452532767400 evaluation fails" -"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:52.533 UTC [cauthdsl] func1 -> DEBU 43f4 0xc0043cb820 gate 1563590452533072400 evaluation starts" -"2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f5 0xc0043cb820 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f6 0xc0043cb820 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f7 0xc0043cb820 principal matched by identity 0" -"2019-07-20 02:40:52.533 UTC [msp.identity] Verify -> DEBU 43f8 Verify: digest = 00000000 51 64 1f 03 f0 44 db ad 52 2d e9 8b 79 01 5f fe |Qd...D..R-..y._.| -00000010 2e 1a 82 e8 77 5d 22 1d 38 4e 11 32 9b 23 38 50 |....w]".8N.2.#8P|" -"2019-07-20 02:40:52.533 UTC [msp.identity] Verify -> DEBU 43f9 Verify: sig = 00000000 30 45 02 21 00 f8 2b 92 2d c8 e1 19 63 85 e4 03 |0E.!..+.-...c...| -00000010 5d c3 86 3d 87 46 73 64 82 8d 98 40 32 96 93 e0 |]..=.Fsd...@2...| -00000020 86 5e 77 4a 3e 02 20 0f ab df 7f 75 cf 31 34 a3 |.^wJ>. ....u.14.| -00000030 7e 0a d3 af d1 87 2e d8 cf cb b4 45 ef 91 da 84 |~..........E....| -00000040 b8 69 c9 aa 31 63 c4 |.i..1c.|" -"2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43fa 0xc0043cb820 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:52.533 UTC [cauthdsl] func1 -> DEBU 43fb 0xc0043cb820 gate 1563590452533072400 evaluation succeeds" -"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fe Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:52.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 4400 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4401 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4402 updating membership: timestamp: " -"2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4403 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4404 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4405 Exiting" -"2019-07-20 02:40:52.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 4406 Exiting" -"2019-07-20 02:40:52.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4407 Exiting" -"2019-07-20 02:40:52.535 UTC [gossip.gossip] handleMessage -> DEBU 4408 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.535 UTC [gossip.gossip] handleMessage -> DEBU 4409 Exiting" -"2019-07-20 02:40:52.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 440a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 440b Exiting" -"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440c Obtaining identity" -"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440d Obtaining identity" -"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440e Obtaining identity" -"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440f Obtaining identity" -"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4410 Obtaining identity" -"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4411 Obtaining identity" -"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4412 Obtaining identity" -"2019-07-20 02:40:52.537 UTC [gossip.comm] Send -> DEBU 4413 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4414 Obtaining identity" -"2019-07-20 02:40:52.537 UTC [gossip.comm] Send -> DEBU 4415 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4416 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4417 Exiting" -"2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4418 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4419 Exiting" -"2019-07-20 02:40:52.541 UTC [gossip.comm] func1 -> DEBU 441a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.542 UTC [gossip.gossip] handleMessage -> DEBU 441b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.542 UTC [gossip.gossip] handleMessage -> DEBU 441c Exiting" -"2019-07-20 02:40:52.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 441d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 441e Exiting" -"2019-07-20 02:40:52.585 UTC [gossip.comm] func1 -> DEBU 441f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.585 UTC [gossip.gossip] handleMessage -> DEBU 4420 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.585 UTC [gossip.gossip] handleMessage -> DEBU 4421 Exiting" -"2019-07-20 02:40:52.585 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4422 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.586 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4423 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:52.586 UTC [msp] DeserializeIdentity -> DEBU 4424 Obtaining identity" -"2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4425 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4426 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4427 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 4428 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 4429 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 442a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:52.586 UTC [cauthdsl] func1 -> DEBU 442b 0xc0043e5df0 gate 1563590452586824100 evaluation starts" -"2019-07-20 02:40:52.586 UTC [cauthdsl] func2 -> DEBU 442c 0xc0043e5df0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.586 UTC [cauthdsl] func2 -> DEBU 442d 0xc0043e5df0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 442e 0xc0043e5df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 442f 0xc0043e5df0 principal evaluation fails" -"2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4430 0xc0043e5df0 gate 1563590452586824100 evaluation fails" -"2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4431 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4432 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4433 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4434 0xc004400630 gate 1563590452587606200 evaluation starts" -"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4435 0xc004400630 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4436 0xc004400630 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4437 0xc004400630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4438 0xc004400630 principal evaluation fails" -"2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4439 0xc004400630 gate 1563590452587606200 evaluation fails" -"2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:52.588 UTC [cauthdsl] func1 -> DEBU 443d 0xc004400e70 gate 1563590452588208500 evaluation starts" -"2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 443e 0xc004400e70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 443f 0xc004400e70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 4440 0xc004400e70 principal matched by identity 0" -"2019-07-20 02:40:52.588 UTC [msp.identity] Verify -> DEBU 4441 Verify: digest = 00000000 9a 1e bd 6e 4d 65 01 2b 0c 69 d4 f8 79 8e 47 2d |...nMe.+.i..y.G-| -00000010 67 a0 bb 40 a7 4d 60 c7 d5 35 13 31 3e 16 da af |g..@.M`..5.1>...|" -"2019-07-20 02:40:52.588 UTC [msp.identity] Verify -> DEBU 4442 Verify: sig = 00000000 30 45 02 21 00 d5 bd 52 0f c0 50 6b 79 25 a6 97 |0E.!...R..Pky%..| -00000010 f1 c1 c0 f4 2f b3 3f bb 20 13 bd 5f b3 af da 64 |..../.?. .._...d| -00000020 eb 1f 26 29 a8 02 20 22 eb 33 0a 47 da 64 fd 25 |..&).. ".3.G.d.%| -00000030 10 45 23 aa 2b 5d 25 46 be 86 f8 f9 4b 2b 50 01 |.E#.+]%F....K+P.| -00000040 c2 21 d5 57 32 f2 73 |.!.W2.s|" -"2019-07-20 02:40:52.589 UTC [cauthdsl] func2 -> DEBU 4443 0xc004400e70 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:52.589 UTC [cauthdsl] func1 -> DEBU 4444 0xc004400e70 gate 1563590452588208500 evaluation succeeds" -"2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4445 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4446 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4447 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4448 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:52.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4449 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444b updating membership: timestamp: " -"2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444c Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444e Exiting" -"2019-07-20 02:40:52.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 444f Exiting" -"2019-07-20 02:40:52.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4450 Exiting" -"2019-07-20 02:40:52.591 UTC [gossip.discovery] sendMemResponse -> DEBU 4451 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:52.591 UTC [msp] DeserializeIdentity -> DEBU 4452 Obtaining identity" -"2019-07-20 02:40:52.592 UTC [msp] DeserializeIdentity -> DEBU 4453 Obtaining identity" -"2019-07-20 02:40:52.592 UTC [msp] DeserializeIdentity -> DEBU 4454 Obtaining identity" -"2019-07-20 02:40:52.592 UTC [gossip.comm] Send -> DEBU 4455 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:52.593 UTC [gossip.discovery] sendMemResponse -> DEBU 4456 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" > alive: alive: alive: " -"2019-07-20 02:40:52.593 UTC [gossip.comm] sendToEndpoint -> DEBU 4457 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.593 UTC [gossip.comm] sendToEndpoint -> DEBU 4458 Exiting" -"2019-07-20 02:40:52.595 UTC [gossip.comm] func1 -> DEBU 4459 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.595 UTC [gossip.gossip] handleMessage -> DEBU 445a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.595 UTC [gossip.pull] HandleMessage -> DEBU 445b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445c Obtaining identity" -"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445d Obtaining identity" -"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445e Obtaining identity" -"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445f Obtaining identity" -"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 4460 Obtaining identity" -"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 4461 Obtaining identity" -"2019-07-20 02:40:52.595 UTC [gossip.pull] SendDigest -> DEBU 4462 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:52.595 UTC [gossip.gossip] handleMessage -> DEBU 4463 Exiting" -"2019-07-20 02:40:52.682 UTC [msp] DeserializeIdentity -> DEBU 4464 Obtaining identity" -"2019-07-20 02:40:52.683 UTC [msp] DeserializeIdentity -> DEBU 4465 Obtaining identity" -"2019-07-20 02:40:52.683 UTC [gossip.comm] Send -> DEBU 4466 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:52.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4467 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4468 Exiting" -"2019-07-20 02:40:52.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4469 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.684 UTC [gossip.comm] sendToEndpoint -> DEBU 446a Exiting" -"2019-07-20 02:40:52.685 UTC [gossip.comm] sendToEndpoint -> DEBU 446b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.685 UTC [gossip.comm] func1 -> DEBU 446c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.685 UTC [gossip.gossip] handleMessage -> DEBU 446d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 446e Obtaining identity" -"2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 446f Obtaining identity" -"2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 4470 Obtaining identity" -"2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4471 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4472 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4473 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4474 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4475 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:52.685 UTC [gossip.comm] sendToEndpoint -> DEBU 4476 Exiting" -"2019-07-20 02:40:52.687 UTC [gossip.comm] func1 -> DEBU 4477 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4478 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:52.693 UTC [cauthdsl] func1 -> DEBU 4479 0xc00442b6a0 gate 1563590452693436200 evaluation starts" -"2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447a 0xc00442b6a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447b 0xc00442b6a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447c 0xc00442b6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447d 0xc00442b6a0 principal evaluation fails" -"2019-07-20 02:40:52.693 UTC [cauthdsl] func1 -> DEBU 447e 0xc00442b6a0 gate 1563590452693436200 evaluation fails" -"2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 447f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 4480 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 4481 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:52.694 UTC [cauthdsl] func1 -> DEBU 4482 0xc00442bee0 gate 1563590452694203000 evaluation starts" -"2019-07-20 02:40:52.694 UTC [cauthdsl] func2 -> DEBU 4483 0xc00442bee0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4484 0xc00442bee0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4485 0xc00442bee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4486 0xc00442bee0 principal evaluation fails" -"2019-07-20 02:40:52.696 UTC [cauthdsl] func1 -> DEBU 4487 0xc00442bee0 gate 1563590452694203000 evaluation fails" -"2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 4488 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 4489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 448a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:52.696 UTC [cauthdsl] func1 -> DEBU 448b 0xc004448720 gate 1563590452696747100 evaluation starts" -"2019-07-20 02:40:52.696 UTC [cauthdsl] func2 -> DEBU 448c 0xc004448720 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.696 UTC [cauthdsl] func2 -> DEBU 448d 0xc004448720 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.697 UTC [cauthdsl] func2 -> DEBU 448e 0xc004448720 principal matched by identity 0" -"2019-07-20 02:40:52.697 UTC [msp.identity] Verify -> DEBU 448f Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:40:52.697 UTC [msp.identity] Verify -> DEBU 4490 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:40:52.697 UTC [cauthdsl] func2 -> DEBU 4491 0xc004448720 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:52.697 UTC [cauthdsl] func1 -> DEBU 4492 0xc004448720 gate 1563590452696747100 evaluation succeeds" -"2019-07-20 02:40:52.697 UTC [policies] Evaluate -> DEBU 4493 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4494 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4495 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:52.698 UTC [msp.identity] Verify -> DEBU 4497 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -"2019-07-20 02:40:52.698 UTC [msp.identity] Verify -> DEBU 4498 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -00000040 04 ec df 98 3f 3b |....?;|" -"2019-07-20 02:40:52.699 UTC [msp.identity] Verify -> DEBU 4499 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:40:52.699 UTC [msp.identity] Verify -> DEBU 449a Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:40:52.699 UTC [msp] DeserializeIdentity -> DEBU 449b Obtaining identity" -"2019-07-20 02:40:52.699 UTC [msp] DeserializeIdentity -> DEBU 449c Obtaining identity" -"2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 449d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 449e Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 449f Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:52.700 UTC [cauthdsl] func1 -> DEBU 44a3 0xc00445cd30 gate 1563590452700818900 evaluation starts" -"2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a4 0xc00445cd30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a5 0xc00445cd30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a6 0xc00445cd30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a7 0xc00445cd30 principal evaluation fails" -"2019-07-20 02:40:52.701 UTC [cauthdsl] func1 -> DEBU 44a8 0xc00445cd30 gate 1563590452700818900 evaluation fails" -"2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44a9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:52.702 UTC [cauthdsl] func1 -> DEBU 44ac 0xc00445d570 gate 1563590452702591600 evaluation starts" -"2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44ad 0xc00445d570 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44ae 0xc00445d570 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44af 0xc00445d570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:52.703 UTC [cauthdsl] func2 -> DEBU 44b0 0xc00445d570 principal evaluation fails" -"2019-07-20 02:40:52.703 UTC [cauthdsl] func1 -> DEBU 44b1 0xc00445d570 gate 1563590452702591600 evaluation fails" -"2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:52.703 UTC [cauthdsl] func1 -> DEBU 44b5 0xc00445ddb0 gate 1563590452703782000 evaluation starts" -"2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b6 0xc00445ddb0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b7 0xc00445ddb0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b8 0xc00445ddb0 principal matched by identity 0" -"2019-07-20 02:40:52.704 UTC [msp.identity] Verify -> DEBU 44b9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:40:52.704 UTC [msp.identity] Verify -> DEBU 44ba Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:40:52.705 UTC [cauthdsl] func2 -> DEBU 44bb 0xc00445ddb0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:52.705 UTC [cauthdsl] func1 -> DEBU 44bc 0xc00445ddb0 gate 1563590452703782000 evaluation succeeds" -"2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44bf Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:52.705 UTC [gossip.gossip] handleMessage -> DEBU 44c1 Exiting" -"2019-07-20 02:40:52.705 UTC [gossip.gossip] handleMessage -> DEBU 44c2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c3 Obtaining identity" -"2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c4 Obtaining identity" -"2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c5 Obtaining identity" -"2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c7 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c8 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.707 UTC [policies] Evaluate -> DEBU 44c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:52.708 UTC [policies] Evaluate -> DEBU 44ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:52.708 UTC [policies] Evaluate -> DEBU 44cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:52.708 UTC [cauthdsl] func1 -> DEBU 44cc 0xc0044738c0 gate 1563590452708236700 evaluation starts" -"2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44cd 0xc0044738c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44ce 0xc0044738c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44cf 0xc0044738c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44d0 0xc0044738c0 principal evaluation fails" -"2019-07-20 02:40:52.708 UTC [cauthdsl] func1 -> DEBU 44d1 0xc0044738c0 gate 1563590452708236700 evaluation fails" -"2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:52.709 UTC [cauthdsl] func1 -> DEBU 44d5 0xc004486100 gate 1563590452709247200 evaluation starts" -"2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d6 0xc004486100 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d7 0xc004486100 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d8 0xc004486100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d9 0xc004486100 principal evaluation fails" -"2019-07-20 02:40:52.709 UTC [cauthdsl] func1 -> DEBU 44da 0xc004486100 gate 1563590452709247200 evaluation fails" -"2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44db Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.710 UTC [policies] Evaluate -> DEBU 44dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.710 UTC [policies] Evaluate -> DEBU 44dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:52.710 UTC [cauthdsl] func1 -> DEBU 44de 0xc004486940 gate 1563590452710265500 evaluation starts" -"2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44df 0xc004486940 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44e0 0xc004486940 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44e1 0xc004486940 principal matched by identity 0" -"2019-07-20 02:40:52.711 UTC [msp.identity] Verify -> DEBU 44e2 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:40:52.712 UTC [msp.identity] Verify -> DEBU 44e3 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:40:52.712 UTC [cauthdsl] func2 -> DEBU 44e4 0xc004486940 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:52.713 UTC [cauthdsl] func1 -> DEBU 44e5 0xc004486940 gate 1563590452710265500 evaluation succeeds" -"2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e8 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:52.714 UTC [msp.identity] Verify -> DEBU 44ea Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -"2019-07-20 02:40:52.714 UTC [msp.identity] Verify -> DEBU 44eb Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -00000040 04 ec df 98 3f 3b |....?;|" -"2019-07-20 02:40:52.715 UTC [msp.identity] Verify -> DEBU 44ec Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:40:52.715 UTC [msp.identity] Verify -> DEBU 44ed Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:40:52.715 UTC [msp] DeserializeIdentity -> DEBU 44ee Obtaining identity" -"2019-07-20 02:40:52.715 UTC [msp] DeserializeIdentity -> DEBU 44ef Obtaining identity" -"2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44f0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44f1 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44f2 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:52.716 UTC [cauthdsl] func1 -> DEBU 44f6 0xc004496f50 gate 1563590452716433600 evaluation starts" -"2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f7 0xc004496f50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f8 0xc004496f50 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f9 0xc004496f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 44fa 0xc004496f50 principal evaluation fails" -"2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 44fb 0xc004496f50 gate 1563590452716433600 evaluation fails" -"2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fc Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 44ff 0xc004497790 gate 1563590452717497000 evaluation starts" -"2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4500 0xc004497790 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4501 0xc004497790 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4502 0xc004497790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4503 0xc004497790 principal evaluation fails" -"2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 4504 0xc004497790 gate 1563590452717497000 evaluation fails" -"2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4505 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4506 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:52.718 UTC [cauthdsl] func1 -> DEBU 4508 0xc004497fd0 gate 1563590452718293100 evaluation starts" -"2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 4509 0xc004497fd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 450a 0xc004497fd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 450b 0xc004497fd0 principal matched by identity 0" -"2019-07-20 02:40:52.718 UTC [msp.identity] Verify -> DEBU 450c Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:40:52.718 UTC [msp.identity] Verify -> DEBU 450d Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:40:52.719 UTC [cauthdsl] func2 -> DEBU 450e 0xc004497fd0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:52.719 UTC [cauthdsl] func1 -> DEBU 450f 0xc004497fd0 gate 1563590452718293100 evaluation succeeds" -"2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4510 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4511 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4512 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4513 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:52.719 UTC [gossip.gossip] handleMessage -> DEBU 4514 Exiting" -"2019-07-20 02:40:52.719 UTC [gossip.gossip] handleMessage -> DEBU 4515 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4516 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4517 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4518 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -"2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4519 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -00000040 04 ec df 98 3f 3b |....?;|" -"2019-07-20 02:40:52.721 UTC [msp] DeserializeIdentity -> DEBU 451a Obtaining identity" -"2019-07-20 02:40:52.721 UTC [msp] DeserializeIdentity -> DEBU 451b Obtaining identity" -"2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 451c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 451d Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 451e Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 451f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 4520 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 4521 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:52.722 UTC [cauthdsl] func1 -> DEBU 4522 0xc0044c2820 gate 1563590452722251500 evaluation starts" -"2019-07-20 02:40:52.722 UTC [cauthdsl] func2 -> DEBU 4523 0xc0044c2820 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.722 UTC [cauthdsl] func2 -> DEBU 4524 0xc0044c2820 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 4525 0xc0044c2820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 4526 0xc0044c2820 principal evaluation fails" -"2019-07-20 02:40:52.723 UTC [cauthdsl] func1 -> DEBU 4527 0xc0044c2820 gate 1563590452722251500 evaluation fails" -"2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 4528 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 4529 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 452a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:52.723 UTC [cauthdsl] func1 -> DEBU 452b 0xc0044c3060 gate 1563590452723773300 evaluation starts" -"2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 452c 0xc0044c3060 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452d 0xc0044c3060 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452e 0xc0044c3060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452f 0xc0044c3060 principal evaluation fails" -"2019-07-20 02:40:52.724 UTC [cauthdsl] func1 -> DEBU 4530 0xc0044c3060 gate 1563590452723773300 evaluation fails" -"2019-07-20 02:40:52.724 UTC [policies] Evaluate -> DEBU 4531 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.725 UTC [policies] Evaluate -> DEBU 4532 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.725 UTC [policies] Evaluate -> DEBU 4533 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:52.725 UTC [cauthdsl] func1 -> DEBU 4534 0xc0044c38a0 gate 1563590452725580700 evaluation starts" -"2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4535 0xc0044c38a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4536 0xc0044c38a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4537 0xc0044c38a0 principal matched by identity 0" -"2019-07-20 02:40:52.726 UTC [msp.identity] Verify -> DEBU 4538 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:40:52.726 UTC [msp.identity] Verify -> DEBU 4539 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:40:52.727 UTC [cauthdsl] func2 -> DEBU 453a 0xc0044c38a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:52.727 UTC [cauthdsl] func1 -> DEBU 453b 0xc0044c38a0 gate 1563590452725580700 evaluation succeeds" -"2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453e Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:52.727 UTC [msp] DeserializeIdentity -> DEBU 4540 Obtaining identity" -"2019-07-20 02:40:52.728 UTC [msp] DeserializeIdentity -> DEBU 4541 Obtaining identity" -"2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4542 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4543 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4544 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4545 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4546 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4547 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:52.729 UTC [cauthdsl] func1 -> DEBU 4548 0xc0044d5070 gate 1563590452729448900 evaluation starts" -"2019-07-20 02:40:52.729 UTC [cauthdsl] func2 -> DEBU 4549 0xc0044d5070 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.729 UTC [cauthdsl] func2 -> DEBU 454a 0xc0044d5070 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 454b 0xc0044d5070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 454c 0xc0044d5070 principal evaluation fails" -"2019-07-20 02:40:52.730 UTC [cauthdsl] func1 -> DEBU 454d 0xc0044d5070 gate 1563590452729448900 evaluation fails" -"2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 454e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 454f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 4550 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:52.730 UTC [cauthdsl] func1 -> DEBU 4551 0xc0044d58b0 gate 1563590452730738200 evaluation starts" -"2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 4552 0xc0044d58b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 4553 0xc0044d58b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 4554 0xc0044d58b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 4555 0xc0044d58b0 principal evaluation fails" -"2019-07-20 02:40:52.731 UTC [cauthdsl] func1 -> DEBU 4556 0xc0044d58b0 gate 1563590452730738200 evaluation fails" -"2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4557 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4558 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4559 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:52.731 UTC [cauthdsl] func1 -> DEBU 455a 0xc0044ee0f0 gate 1563590452731709400 evaluation starts" -"2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 455b 0xc0044ee0f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 455c 0xc0044ee0f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:52.732 UTC [cauthdsl] func2 -> DEBU 455d 0xc0044ee0f0 principal matched by identity 0" -"2019-07-20 02:40:52.732 UTC [msp.identity] Verify -> DEBU 455e Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:40:52.733 UTC [msp.identity] Verify -> DEBU 455f Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:40:52.733 UTC [cauthdsl] func2 -> DEBU 4560 0xc0044ee0f0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:52.733 UTC [cauthdsl] func1 -> DEBU 4561 0xc0044ee0f0 gate 1563590452731709400 evaluation succeeds" -"2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4562 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4563 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4564 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4565 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:52.734 UTC [gossip.gossip] handleMessage -> DEBU 4566 Exiting" -"2019-07-20 02:40:52.758 UTC [msp] DeserializeIdentity -> DEBU 4567 Obtaining identity" -"2019-07-20 02:40:52.758 UTC [msp] DeserializeIdentity -> DEBU 4568 Obtaining identity" -"2019-07-20 02:40:52.758 UTC [gossip.pull] Hello -> DEBU 4569 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:52.759 UTC [msp] DeserializeIdentity -> DEBU 456a Obtaining identity" -"2019-07-20 02:40:52.759 UTC [msp] DeserializeIdentity -> DEBU 456b Obtaining identity" -"2019-07-20 02:40:52.759 UTC [gossip.comm] Send -> DEBU 456c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU 456d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU 456e Exiting" -"2019-07-20 02:40:52.760 UTC [gossip.gossip] handleMessage -> DEBU 456f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.760 UTC [gossip.pull] HandleMessage -> DEBU 4570 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.760 UTC [gossip.gossip] handleMessage -> DEBU 4571 Exiting" -"2019-07-20 02:40:52.843 UTC [gossip.gossip] handleMessage -> DEBU 4572 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.844 UTC [msp] DeserializeIdentity -> DEBU 4573 Obtaining identity" -"2019-07-20 02:40:52.845 UTC [msp] DeserializeIdentity -> DEBU 4574 Obtaining identity" -"2019-07-20 02:40:52.845 UTC [gossip.gossip] handleMessage -> DEBU 4575 Exiting" -"2019-07-20 02:40:52.900 UTC [gossip.gossip] handleMessage -> DEBU 4576 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.901 UTC [gossip.pull] HandleMessage -> DEBU 4577 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:52.901 UTC [gossip.pull] SendDigest -> DEBU 4578 Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:52.901 UTC [gossip.gossip] handleMessage -> DEBU 4579 Exiting" -"2019-07-20 02:40:53.012 UTC [gossip.comm] func1 -> DEBU 457a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:53.013 UTC [gossip.gossip] handleMessage -> DEBU 457b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:53.014 UTC [msp] DeserializeIdentity -> DEBU 457c Obtaining identity" -"2019-07-20 02:40:53.014 UTC [msp] DeserializeIdentity -> DEBU 457d Obtaining identity" -"2019-07-20 02:40:53.015 UTC [msp] DeserializeIdentity -> DEBU 457e Obtaining identity" -"2019-07-20 02:40:53.015 UTC [gossip.gossip] handleMessage -> DEBU 457f Exiting" -"2019-07-20 02:40:53.148 UTC [gossip.comm] func1 -> DEBU 4580 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:53.148 UTC [gossip.gossip] handleMessage -> DEBU 4581 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:53.148 UTC [msp] DeserializeIdentity -> DEBU 4582 Obtaining identity" -"2019-07-20 02:40:53.151 UTC [msp] DeserializeIdentity -> DEBU 4583 Obtaining identity" -"2019-07-20 02:40:53.152 UTC [msp] DeserializeIdentity -> DEBU 4584 Obtaining identity" -"2019-07-20 02:40:53.152 UTC [gossip.gossip] handleMessage -> DEBU 4585 Exiting" -"2019-07-20 02:40:55.938 UTC [gossip.comm] func1 -> DEBU 4586 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:55.939 UTC [gossip.gossip] handleMessage -> DEBU 4587 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:55.939 UTC [gossip.gossip] handleMessage -> DEBU 4588 Exiting" -"2019-07-20 02:40:55.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4589 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:55.940 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 458a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:55.940 UTC [msp] DeserializeIdentity -> DEBU 458b Obtaining identity" -"2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 458c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458d Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458e Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 458f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4590 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4591 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 4592 0xc004507d60 gate 1563590455940519200 evaluation starts" -"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4593 0xc004507d60 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4594 0xc004507d60 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4595 0xc004507d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4596 0xc004507d60 principal evaluation fails" -"2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 4597 0xc004507d60 gate 1563590455940519200 evaluation fails" -"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4598 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4599 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 459a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 459b 0xc0045225a0 gate 1563590455940934400 evaluation starts" -"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 459c 0xc0045225a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 459d 0xc0045225a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 459e 0xc0045225a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 459f 0xc0045225a0 principal evaluation fails" -"2019-07-20 02:40:55.941 UTC [cauthdsl] func1 -> DEBU 45a0 0xc0045225a0 gate 1563590455940934400 evaluation fails" -"2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:55.941 UTC [cauthdsl] func1 -> DEBU 45a4 0xc004522de0 gate 1563590455941246400 evaluation starts" -"2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 45a5 0xc004522de0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 45a6 0xc004522de0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:55.949 UTC [cauthdsl] func2 -> DEBU 45a7 0xc004522de0 principal matched by identity 0" -"2019-07-20 02:40:55.949 UTC [msp.identity] Verify -> DEBU 45a8 Verify: digest = 00000000 c5 3f e7 ed 5d ed 6b e6 c4 00 af 76 54 a4 0a bb |.?..].k....vT...| -00000010 0a d6 d0 46 33 68 dd 86 70 ea 9c b2 9f 47 91 8e |...F3h..p....G..|" -"2019-07-20 02:40:55.949 UTC [msp.identity] Verify -> DEBU 45a9 Verify: sig = 00000000 30 44 02 20 1f 2c ce 2e 2c 51 39 50 93 9d 7d 62 |0D. .,..,Q9P..}b| -00000010 24 00 9f bc 38 2d 8d 77 fd 62 36 7b db 0f 42 4d |$...8-.w.b6{..BM| -00000020 2d 3a 7c c6 02 20 28 3a 69 09 76 b3 4d d9 24 2b |-:|.. (:i.v.M.$+| -00000030 ce 3b 98 e5 98 83 99 79 8e 0e ae 37 b5 6c 88 07 |.;.....y...7.l..| -00000040 94 ae 7c fe f6 e1 |..|...|" -"2019-07-20 02:40:55.949 UTC [cauthdsl] func2 -> DEBU 45aa 0xc004522de0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:55.949 UTC [cauthdsl] func1 -> DEBU 45ab 0xc004522de0 gate 1563590455941246400 evaluation succeeds" -"2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ae Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:55.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b2 updating membership: timestamp: " -"2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b3 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:55.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:55.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b5 Exiting" -"2019-07-20 02:40:55.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b6 Exiting" -"2019-07-20 02:40:55.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b7 Exiting" -"2019-07-20 02:40:55.950 UTC [gossip.discovery] sendMemResponse -> DEBU 45b8 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45b9 Obtaining identity" -"2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45ba Obtaining identity" -"2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45bb Obtaining identity" -"2019-07-20 02:40:55.950 UTC [gossip.comm] Send -> DEBU 45bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:55.950 UTC [gossip.comm] sendToEndpoint -> DEBU 45bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:55.950 UTC [gossip.comm] sendToEndpoint -> DEBU 45be Exiting" -"2019-07-20 02:40:55.951 UTC [gossip.discovery] sendMemResponse -> DEBU 45bf Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" > alive: alive: alive: " -"2019-07-20 02:40:55.956 UTC [gossip.comm] func1 -> DEBU 45c0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:55.956 UTC [gossip.gossip] handleMessage -> DEBU 45c1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:55.956 UTC [gossip.pull] HandleMessage -> DEBU 45c2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c3 Obtaining identity" -"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c4 Obtaining identity" -"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c5 Obtaining identity" -"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c6 Obtaining identity" -"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c7 Obtaining identity" -"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c8 Obtaining identity" -"2019-07-20 02:40:55.957 UTC [gossip.pull] SendDigest -> DEBU 45c9 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:55.957 UTC [gossip.gossip] handleMessage -> DEBU 45ca Exiting" -"2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cb Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45cc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cd Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45ce Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cf Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45d0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d3 Exiting" -"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d4 Exiting" -"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d6 Exiting" -"2019-07-20 02:40:56.244 UTC [gossip.comm] func1 -> DEBU 45d7 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.244 UTC [gossip.gossip] handleMessage -> DEBU 45d8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.244 UTC [gossip.pull] HandleMessage -> DEBU 45d9 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.244 UTC [gossip.gossip] handleMessage -> DEBU 45da Exiting" -"2019-07-20 02:40:56.245 UTC [gossip.comm] func1 -> DEBU 45db Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.245 UTC [gossip.gossip] handleMessage -> DEBU 45dc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.245 UTC [gossip.pull] HandleMessage -> DEBU 45dd GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.245 UTC [gossip.gossip] handleMessage -> DEBU 45de Exiting" -"2019-07-20 02:40:56.246 UTC [gossip.gossip] handleMessage -> DEBU 45df Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.246 UTC [gossip.pull] HandleMessage -> DEBU 45e0 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.246 UTC [gossip.gossip] handleMessage -> DEBU 45e1 Exiting" -"2019-07-20 02:40:56.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 45e2 Obtaining default signing identity" -"2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e3 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151034 " -"2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e4 Sign: digest: B72C93CD94D2623F267EB63F6E6CA421F900643012C818FE189705252CFDEF4B " -"2019-07-20 02:40:56.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 45e5 Obtaining default signing identity" -"2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45e8 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:56.282 UTC [msp] DeserializeIdentity -> DEBU 45e9 Obtaining identity" -"2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45ea Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:56.282 UTC [msp] DeserializeIdentity -> DEBU 45eb Obtaining identity" -"2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45ec Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ed Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ef Exiting" -"2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45f0 Exiting" -"2019-07-20 02:40:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 45f1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 45f2 Exiting" -"2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f3 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f4 Exiting" -"2019-07-20 02:40:56.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45f6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:56.284 UTC [gossip.comm] func1 -> DEBU 45f7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.285 UTC [gossip.comm] func1 -> DEBU 45f9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fa Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| -00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" -"2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fb Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| -00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| -00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| -00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| -00000040 c9 d4 ba fc 26 f5 21 |....&.!|" -"2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-09-24 00:27:21.759 UTC [msp.identity] Verify -> DEBU 6ebf Verify: sig = 00000000 30 44 02 20 0c 72 6e 8a b9 66 85 45 65 e5 6d 8a |0D. .rn..f.Ee.m.| +00000010 9c 9f 5d e2 10 a1 b4 93 1f 51 42 4c a8 3e 84 ee |..]......QBL.>..| +00000020 60 e6 0d e8 02 20 55 0a ed 41 74 f6 68 aa bf 05 |`.... U..At.h...| +00000030 d2 c3 31 3f 82 c5 72 2e fe ee 0f 1a 40 ef 6f b8 |..1?..r.....@.o.| +00000040 b5 29 17 f8 da c5 |.)....|" +"2019-09-24 00:27:21.759 UTC [gossip.discovery] handleAliveMessage -> DEBU 6ec0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ec1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:27:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ec2 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:21.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ec3 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:21.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ec4 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:21.761 UTC [gossip.discovery] learnExistingMembers -> DEBU 6ec5 Exiting" +"2019-09-24 00:27:21.761 UTC [gossip.discovery] handleAliveMessage -> DEBU 6ec6 Exiting" +"2019-09-24 00:27:21.761 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6ec7 Exiting" +"2019-09-24 00:27:21.761 UTC [gossip.discovery] sendMemResponse -> DEBU 6ec8 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:27:21.761 UTC [msp] DeserializeIdentity -> DEBU 6ec9 Obtaining identity" +"2019-09-24 00:27:21.761 UTC [msp] DeserializeIdentity -> DEBU 6eca Obtaining identity" +"2019-09-24 00:27:21.761 UTC [gossip.comm] Send -> DEBU 6ecb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:21.762 UTC [gossip.discovery] sendMemResponse -> DEBU 6ecc Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020]" signature:"0E\002!\000\361\271L+\277\324\000^z\203\216\263\325\265\223D\256\377-\232\364\302\3740\211ED\203l\220\204\356`\346\r\350\002 U\n\355At\366h\252\277\005\322\3031?\202\305r.\376\356\017\032@\357o\270\265)\027\370\332\305" > > alive: " +"2019-09-24 00:27:21.762 UTC [gossip.comm] sendToEndpoint -> DEBU 6ecd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:21.762 UTC [gossip.comm] sendToEndpoint -> DEBU 6ece Exiting" +"2019-09-24 00:27:21.976 UTC [gossip.comm] func1 -> DEBU 6ecf Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:21.976 UTC [gossip.gossip] handleMessage -> DEBU 6ed0 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:21.978 UTC [msp] DeserializeIdentity -> DEBU 6ed1 Obtaining identity" +"2019-09-24 00:27:21.978 UTC [msp] DeserializeIdentity -> DEBU 6ed2 Obtaining identity" +"2019-09-24 00:27:21.978 UTC [msp] DeserializeIdentity -> DEBU 6ed3 Obtaining identity" +"2019-09-24 00:27:21.978 UTC [gossip.gossip] handleMessage -> DEBU 6ed4 Exiting" +"2019-09-24 00:27:21.986 UTC [gossip.comm] func1 -> DEBU 6ed5 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:21.987 UTC [gossip.gossip] handleMessage -> DEBU 6ed6 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 00:27:21.987 UTC [msp] DeserializeIdentity -> DEBU 6ed7 Obtaining identity" +"2019-09-24 00:27:21.987 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6ed8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:21.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ed9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:21.987 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6eda Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:21.987 UTC [policies] Evaluate -> DEBU 6edb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:21.987 UTC [policies] Evaluate -> DEBU 6edc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:21.988 UTC [policies] Evaluate -> DEBU 6edd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:21.988 UTC [cauthdsl] func1 -> DEBU 6ede 0xc005352070 gate 1569284841988132300 evaluation starts" +"2019-09-24 00:27:21.988 UTC [cauthdsl] func2 -> DEBU 6edf 0xc005352070 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:21.988 UTC [cauthdsl] func2 -> DEBU 6ee0 0xc005352070 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:21.988 UTC [cauthdsl] func2 -> DEBU 6ee1 0xc005352070 principal matched by identity 0" +"2019-09-24 00:27:21.988 UTC [msp.identity] Verify -> DEBU 6ee2 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +"2019-09-24 00:27:21.988 UTC [msp.identity] Verify -> DEBU 6ee3 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +00000040 15 da b4 89 d2 86 |......|" +"2019-09-24 00:27:21.989 UTC [cauthdsl] func2 -> DEBU 6ee4 0xc005352070 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:21.989 UTC [cauthdsl] func1 -> DEBU 6ee5 0xc005352070 gate 1569284841988132300 evaluation succeeds" +"2019-09-24 00:27:21.989 UTC [policies] Evaluate -> DEBU 6ee6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:21.989 UTC [policies] Evaluate -> DEBU 6ee7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:21.989 UTC [policies] Evaluate -> DEBU 6ee8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:21.989 UTC [policies] Evaluate -> DEBU 6ee9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:21.989 UTC [msp] DeserializeIdentity -> DEBU 6eea Obtaining identity" +"2019-09-24 00:27:21.989 UTC [gossip.gossip] handleMessage -> DEBU 6eeb Exiting" +"2019-09-24 00:27:22.291 UTC [gossip.election] waitForInterrupt -> DEBU 6eec c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:27:22.292 UTC [gossip.election] IsLeader -> DEBU 6eed c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:27:22.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 6eee Obtaining default signing identity" +"2019-09-24 00:27:22.293 UTC [msp.identity] Sign -> DEBU 6eef Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101E1801 " +"2019-09-24 00:27:22.294 UTC [msp.identity] Sign -> DEBU 6ef0 Sign: digest: 2B28382C4F64C5E00443530CAEA01CE53D96983ABEC0A0E31439F8218DA906F1 " +"2019-09-24 00:27:22.294 UTC [gossip.election] waitForInterrupt -> DEBU 6ef1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:27:22.295 UTC [msp] DeserializeIdentity -> DEBU 6ef2 Obtaining identity" +"2019-09-24 00:27:22.295 UTC [msp] DeserializeIdentity -> DEBU 6ef3 Obtaining identity" +"2019-09-24 00:27:22.295 UTC [msp] DeserializeIdentity -> DEBU 6ef4 Obtaining identity" +"2019-09-24 00:27:22.296 UTC [msp] DeserializeIdentity -> DEBU 6ef5 Obtaining identity" +"2019-09-24 00:27:22.296 UTC [gossip.comm] Send -> DEBU 6ef6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:22.296 UTC [msp] DeserializeIdentity -> DEBU 6ef7 Obtaining identity" +"2019-09-24 00:27:22.297 UTC [msp] DeserializeIdentity -> DEBU 6ef8 Obtaining identity" +"2019-09-24 00:27:22.297 UTC [gossip.comm] sendToEndpoint -> DEBU 6ef9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.297 UTC [gossip.comm] sendToEndpoint -> DEBU 6efa Exiting" +"2019-09-24 00:27:22.671 UTC [gossip.comm] func1 -> DEBU 6efb Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.671 UTC [gossip.gossip] handleMessage -> DEBU 6efc Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.672 UTC [gossip.gossip] handleMessage -> DEBU 6efd Exiting" +"2019-09-24 00:27:22.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6efe Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.672 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6eff Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:22.673 UTC [msp.identity] Verify -> DEBU 6f00 Verify: digest = 00000000 19 fb 40 d7 de 6c 44 81 9a 5f e1 55 30 2f 94 14 |..@..lD.._.U0/..| +00000010 5b 8d 95 59 6f 02 5f 52 b7 98 da 05 69 4c d7 ce |[..Yo._R....iL..|" +"2019-09-24 00:27:22.674 UTC [msp.identity] Verify -> DEBU 6f01 Verify: sig = 00000000 30 44 02 20 27 ca b6 52 a2 d5 f5 e4 b0 88 44 bd |0D. '..R......D.| +00000010 e7 10 ae 22 58 9f 81 5d c4 76 ec e8 41 1e 9f d4 |..."X..].v..A...| +00000020 52 38 10 e1 02 20 6d 2a 24 11 13 53 c0 bd c2 b0 |R8... m*$..S....| +00000030 f2 57 8e 39 04 72 19 92 cc 00 e6 c6 20 c4 f5 54 |.W.9.r...... ..T| +00000040 f0 06 00 31 ad 2b |...1.+|" +"2019-09-24 00:27:22.675 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f02 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 6f03 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:22.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 6f04 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:22.676 UTC [gossip.discovery] learnExistingMembers -> DEBU 6f05 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:22.676 UTC [gossip.discovery] learnExistingMembers -> DEBU 6f06 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:22.677 UTC [gossip.discovery] learnExistingMembers -> DEBU 6f07 Exiting" +"2019-09-24 00:27:22.677 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f08 Exiting" +"2019-09-24 00:27:22.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f09 Exiting" +"2019-09-24 00:27:22.680 UTC [msp] DeserializeIdentity -> DEBU 6f0a Obtaining identity" +"2019-09-24 00:27:22.680 UTC [msp] DeserializeIdentity -> DEBU 6f0b Obtaining identity" +"2019-09-24 00:27:22.681 UTC [msp] DeserializeIdentity -> DEBU 6f0c Obtaining identity" +"2019-09-24 00:27:22.682 UTC [gossip.comm] Send -> DEBU 6f0d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:22.682 UTC [msp] DeserializeIdentity -> DEBU 6f0e Obtaining identity" +"2019-09-24 00:27:22.682 UTC [gossip.comm] Send -> DEBU 6f0f Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:22.683 UTC [gossip.comm] sendToEndpoint -> DEBU 6f10 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.683 UTC [gossip.comm] sendToEndpoint -> DEBU 6f11 Exiting" +"2019-09-24 00:27:22.684 UTC [gossip.comm] sendToEndpoint -> DEBU 6f12 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.684 UTC [gossip.comm] sendToEndpoint -> DEBU 6f13 Exiting" +"2019-09-24 00:27:22.685 UTC [gossip.comm] func1 -> DEBU 6f14 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.685 UTC [gossip.gossip] handleMessage -> DEBU 6f16 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.685 UTC [gossip.gossip] handleMessage -> DEBU 6f17 Exiting" +"2019-09-24 00:27:22.685 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f18 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f19 Exiting" +"2019-09-24 00:27:22.685 UTC [gossip.comm] func1 -> DEBU 6f15 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.686 UTC [gossip.gossip] handleMessage -> DEBU 6f1a Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.686 UTC [gossip.gossip] handleMessage -> DEBU 6f1b Exiting" +"2019-09-24 00:27:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f1c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:22.686 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f1d Exiting" +"2019-09-24 00:27:23.700 UTC [gossip.pull] Hello -> DEBU 6f1e Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:23.700 UTC [gossip.comm] Send -> DEBU 6f1f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:23.700 UTC [gossip.pull] Hello -> DEBU 6f20 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:27:23.701 UTC [gossip.comm] Send -> DEBU 6f21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:23.701 UTC [gossip.pull] Hello -> DEBU 6f22 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:27:23.701 UTC [gossip.comm] Send -> DEBU 6f23 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:23.701 UTC [gossip.comm] sendToEndpoint -> DEBU 6f24 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.701 UTC [gossip.comm] sendToEndpoint -> DEBU 6f25 Exiting" +"2019-09-24 00:27:23.702 UTC [gossip.comm] sendToEndpoint -> DEBU 6f26 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.702 UTC [gossip.comm] sendToEndpoint -> DEBU 6f27 Exiting" +"2019-09-24 00:27:23.702 UTC [gossip.comm] sendToEndpoint -> DEBU 6f28 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.702 UTC [gossip.comm] sendToEndpoint -> DEBU 6f29 Exiting" +"2019-09-24 00:27:23.704 UTC [gossip.comm] func1 -> DEBU 6f2a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.704 UTC [gossip.comm] func1 -> DEBU 6f2c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.704 UTC [gossip.gossip] handleMessage -> DEBU 6f2d Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.705 UTC [gossip.pull] HandleMessage -> DEBU 6f2e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.704 UTC [gossip.comm] func1 -> DEBU 6f2b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.706 UTC [gossip.gossip] handleMessage -> DEBU 6f2f Exiting" +"2019-09-24 00:27:23.707 UTC [gossip.gossip] handleMessage -> DEBU 6f30 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.707 UTC [gossip.pull] HandleMessage -> DEBU 6f31 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.708 UTC [gossip.gossip] handleMessage -> DEBU 6f32 Exiting" +"2019-09-24 00:27:23.709 UTC [gossip.gossip] handleMessage -> DEBU 6f33 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.709 UTC [gossip.pull] HandleMessage -> DEBU 6f34 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.709 UTC [gossip.gossip] handleMessage -> DEBU 6f35 Exiting" +"2019-09-24 00:27:23.836 UTC [msp] GetDefaultSigningIdentity -> DEBU 6f36 Obtaining default signing identity" +"2019-09-24 00:27:23.836 UTC [msp.identity] Sign -> DEBU 6f37 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151058 " +"2019-09-24 00:27:23.836 UTC [msp.identity] Sign -> DEBU 6f38 Sign: digest: F9A7A0E08E4A7694D9A40D4CB45631827FB63CF57D2C2D9DB559AD129454772A " +"2019-09-24 00:27:23.836 UTC [msp] GetDefaultSigningIdentity -> DEBU 6f39 Obtaining default signing identity" +"2019-09-24 00:27:23.836 UTC [msp.identity] Sign -> DEBU 6f3a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:23.837 UTC [msp.identity] Sign -> DEBU 6f3b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:23.837 UTC [msp] DeserializeIdentity -> DEBU 6f3c Obtaining identity" +"2019-09-24 00:27:23.837 UTC [gossip.comm] Send -> DEBU 6f3d Entering, sending GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:23.837 UTC [gossip.comm] Send -> DEBU 6f3e Entering, sending GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:23.837 UTC [msp] DeserializeIdentity -> DEBU 6f3f Obtaining identity" +"2019-09-24 00:27:23.837 UTC [gossip.comm] Send -> DEBU 6f40 Entering, sending GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:23.837 UTC [gossip.comm] sendToEndpoint -> DEBU 6f41 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.837 UTC [gossip.comm] sendToEndpoint -> DEBU 6f42 Exiting" +"2019-09-24 00:27:23.837 UTC [gossip.comm] sendToEndpoint -> DEBU 6f43 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.838 UTC [gossip.comm] sendToEndpoint -> DEBU 6f44 Exiting" +"2019-09-24 00:27:23.837 UTC [gossip.comm] sendToEndpoint -> DEBU 6f45 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.838 UTC [gossip.comm] sendToEndpoint -> DEBU 6f46 Exiting" +"2019-09-24 00:27:23.840 UTC [gossip.comm] func1 -> DEBU 6f47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.840 UTC [gossip.gossip] handleMessage -> DEBU 6f48 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.840 UTC [gossip.gossip] handleMessage -> DEBU 6f49 Exiting" +"2019-09-24 00:27:23.840 UTC [gossip.comm] func1 -> DEBU 6f4a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.841 UTC [gossip.gossip] handleMessage -> DEBU 6f4d Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.840 UTC [gossip.comm] func1 -> DEBU 6f4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.841 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.842 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6f4e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:23.842 UTC [msp.identity] Verify -> DEBU 6f4f Verify: digest = 00000000 f9 a7 a0 e0 8e 4a 76 94 d9 a4 0d 4c b4 56 31 82 |.....Jv....L.V1.| +00000010 7f b6 3c f5 7d 2c 2d 9d b5 59 ad 12 94 54 77 2a |..<.},-..Y...Tw*|" +"2019-09-24 00:27:23.843 UTC [msp.identity] Verify -> DEBU 6f50 Verify: sig = 00000000 30 45 02 21 00 89 20 34 a2 4f 07 e2 37 15 4f 0e |0E.!.. 4.O..7.O.| +00000010 6f 76 b1 f2 1e 8c 28 0f 13 e5 a1 d1 7f a4 c1 a0 |ov....(.........| +00000020 57 dc 6d d7 0e 02 20 30 40 e3 7c 35 c7 ce d1 09 |W.m... 0@.|5....| +00000030 53 76 69 32 4b 12 f5 52 7d ea 87 b1 c5 34 4f 33 |Svi2K..R}....4O3| +00000040 a5 c4 15 0b 2d c6 3e |....-.>|" +"2019-09-24 00:27:23.843 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f51 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:23.843 UTC [gossip.discovery] isSentByMe -> DEBU 6f52 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:23.844 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f53 Exiting" +"2019-09-24 00:27:23.844 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6f54 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:23.844 UTC [msp] DeserializeIdentity -> DEBU 6f55 Obtaining identity" +"2019-09-24 00:27:23.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6f56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:23.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6f57 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:23.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6f58 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:23.845 UTC [policies] Evaluate -> DEBU 6f59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:23.846 UTC [policies] Evaluate -> DEBU 6f5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.846 UTC [policies] Evaluate -> DEBU 6f5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:23.846 UTC [cauthdsl] func1 -> DEBU 6f5c 0xc0053d98b0 gate 1569284843846588500 evaluation starts" +"2019-09-24 00:27:23.846 UTC [cauthdsl] func2 -> DEBU 6f5d 0xc0053d98b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.847 UTC [cauthdsl] func2 -> DEBU 6f5e 0xc0053d98b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:23.847 UTC [cauthdsl] func2 -> DEBU 6f5f 0xc0053d98b0 principal matched by identity 0" +"2019-09-24 00:27:23.847 UTC [msp.identity] Verify -> DEBU 6f60 Verify: digest = 00000000 25 da 91 3c 0a df 00 04 fd bf 16 3d 22 5a 52 b8 |%..<.......="ZR.| +00000010 3a 79 59 6a 5d 5e 30 37 7d ee b5 d3 0c 88 17 1e |:yYj]^07}.......|" +"2019-09-24 00:27:23.847 UTC [msp.identity] Verify -> DEBU 6f61 Verify: sig = 00000000 30 44 02 20 45 38 d3 83 00 69 cc d0 e4 f0 b9 7a |0D. E8...i.....z| +00000010 6f aa c3 5a 42 e5 08 22 4b 34 17 f1 cd 3d 7d be |o..ZB.."K4...=}.| +00000020 2c c5 a2 f3 02 20 08 4e 28 dd 82 b6 4c 3a 71 e4 |,.... .N(...L:q.| +00000030 11 a9 61 34 29 c7 e0 45 de 27 a8 17 8d ff 1b 95 |..a4)..E.'......| +00000040 f3 35 0a 05 4f cf |.5..O.|" +"2019-09-24 00:27:23.848 UTC [cauthdsl] func2 -> DEBU 6f62 0xc0053d98b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:23.848 UTC [cauthdsl] func1 -> DEBU 6f63 0xc0053d98b0 gate 1569284843846588500 evaluation succeeds" +"2019-09-24 00:27:23.848 UTC [policies] Evaluate -> DEBU 6f64 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.849 UTC [policies] Evaluate -> DEBU 6f65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.849 UTC [policies] Evaluate -> DEBU 6f66 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:23.849 UTC [policies] Evaluate -> DEBU 6f67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:23.849 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f68 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:23.850 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f69 Exiting" +"2019-09-24 00:27:23.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f6a Exiting" +"2019-09-24 00:27:23.850 UTC [gossip.gossip] handleMessage -> DEBU 6f6b Exiting" +"2019-09-24 00:27:23.850 UTC [gossip.gossip] handleMessage -> DEBU 6f6c Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f6d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.851 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6f6e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:23.851 UTC [msp.identity] Verify -> DEBU 6f6f Verify: digest = 00000000 f9 a7 a0 e0 8e 4a 76 94 d9 a4 0d 4c b4 56 31 82 |.....Jv....L.V1.| +00000010 7f b6 3c f5 7d 2c 2d 9d b5 59 ad 12 94 54 77 2a |..<.},-..Y...Tw*|" +"2019-09-24 00:27:23.851 UTC [msp.identity] Verify -> DEBU 6f70 Verify: sig = 00000000 30 45 02 21 00 89 20 34 a2 4f 07 e2 37 15 4f 0e |0E.!.. 4.O..7.O.| +00000010 6f 76 b1 f2 1e 8c 28 0f 13 e5 a1 d1 7f a4 c1 a0 |ov....(.........| +00000020 57 dc 6d d7 0e 02 20 30 40 e3 7c 35 c7 ce d1 09 |W.m... 0@.|5....| +00000030 53 76 69 32 4b 12 f5 52 7d ea 87 b1 c5 34 4f 33 |Svi2K..R}....4O3| +00000040 a5 c4 15 0b 2d c6 3e |....-.>|" +"2019-09-24 00:27:23.851 UTC [msp.identity] Verify -> DEBU 6f71 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fd Verify: sig = 00000000 30 44 02 20 5c 6a c8 38 0b 2a 2d ca 3c df 1a 6e |0D. \j.8.*-.<..n| -00000010 b0 94 b2 07 cd 05 94 39 12 2c d3 e9 7d 61 6e 59 |.......9.,..}anY| -00000020 29 d8 a4 18 02 20 21 f4 05 d6 78 ec d3 77 33 89 |).... !...x..w3.| -00000030 2f db cb 10 5c 45 02 7a 54 8b a2 e1 5d 1d 4a 91 |/...\E.zT...].J.| -00000040 83 99 84 4f f2 07 |...O..|" -"2019-07-20 02:40:56.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 45fe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:56.285 UTC [gossip.discovery] isSentByMe -> DEBU 45ff Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:56.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 4600 Exiting" -"2019-07-20 02:40:56.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4601 Exiting" -"2019-07-20 02:40:56.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4602 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.286 UTC [gossip.gossip] handleMessage -> DEBU 4603 Exiting" -"2019-07-20 02:40:56.286 UTC [gossip.gossip] handleMessage -> DEBU 4604 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4605 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:56.286 UTC [msp.identity] Verify -> DEBU 4606 Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| -00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" -"2019-07-20 02:40:56.286 UTC [msp.identity] Verify -> DEBU 4607 Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| -00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| -00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| -00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| -00000040 c9 d4 ba fc 26 f5 21 |....&.!|" -"2019-07-20 02:40:56.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 4608 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.286 UTC [gossip.discovery] isSentByMe -> DEBU 4609 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 460a Exiting" -"2019-07-20 02:40:56.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 460b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:56.286 UTC [msp] DeserializeIdentity -> DEBU 460c Obtaining identity" -"2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 460d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 460e Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 460f Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.286 UTC [policies] Evaluate -> DEBU 4610 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4611 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4612 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4613 0xc004590b20 gate 1563590456287229700 evaluation starts" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4614 0xc004590b20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4615 0xc004590b20 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4616 0xc004590b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4617 0xc004590b20 principal evaluation fails" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4618 0xc004590b20 gate 1563590456287229700 evaluation fails" -"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4619 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 461a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 461b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 461c 0xc004591360 gate 1563590456287552100 evaluation starts" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461d 0xc004591360 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461e 0xc004591360 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461f 0xc004591360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4620 0xc004591360 principal evaluation fails" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4621 0xc004591360 gate 1563590456287552100 evaluation fails" -"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4622 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4623 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4624 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4625 0xc004591ba0 gate 1563590456287800000 evaluation starts" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4626 0xc004591ba0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4627 0xc004591ba0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4628 0xc004591ba0 principal matched by identity 0" -"2019-07-20 02:40:56.287 UTC [msp.identity] Verify -> DEBU 4629 Verify: digest = 00000000 9a 1e bd 6e 4d 65 01 2b 0c 69 d4 f8 79 8e 47 2d |...nMe.+.i..y.G-| -00000010 67 a0 bb 40 a7 4d 60 c7 d5 35 13 31 3e 16 da af |g..@.M`..5.1>...|" -"2019-07-20 02:40:56.287 UTC [msp.identity] Verify -> DEBU 462a Verify: sig = 00000000 30 45 02 21 00 d5 bd 52 0f c0 50 6b 79 25 a6 97 |0E.!...R..Pky%..| -00000010 f1 c1 c0 f4 2f b3 3f bb 20 13 bd 5f b3 af da 64 |..../.?. .._...d| -00000020 eb 1f 26 29 a8 02 20 22 eb 33 0a 47 da 64 fd 25 |..&).. ".3.G.d.%| -00000030 10 45 23 aa 2b 5d 25 46 be 86 f8 f9 4b 2b 50 01 |.E#.+]%F....K+P.| -00000040 c2 21 d5 57 32 f2 73 |.!.W2.s|" -"2019-07-20 02:40:56.288 UTC [cauthdsl] func2 -> DEBU 462b 0xc004591ba0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:56.288 UTC [cauthdsl] func1 -> DEBU 462c 0xc004591ba0 gate 1563590456287800000 evaluation succeeds" -"2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 4630 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4631 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4632 Exiting" -"2019-07-20 02:40:56.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4633 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 4634 Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| -00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" -"2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 4635 Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| -00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| -00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| -00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| -00000040 86 01 4f b2 60 e9 82 |..O.`..|" -"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4636 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4637 Exiting" -"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4638 Exiting" -"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4639 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.288 UTC [gossip.gossip] handleMessage -> DEBU 463a Exiting" -"2019-07-20 02:40:56.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 463b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 463c Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| -00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" -"2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 463d Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| -00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| -00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| -00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| -00000040 86 01 4f b2 60 e9 82 |..O.`..|" -"2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 463e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 463f Exiting" -"2019-07-20 02:40:56.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4640 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:40:56.289 UTC [msp.identity] Verify -> DEBU 4641 Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| -00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" -"2019-07-20 02:40:56.289 UTC [msp.identity] Verify -> DEBU 4642 Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| -00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| -00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| -00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| -00000040 c9 d4 ba fc 26 f5 21 |....&.!|" -"2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 4643 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.289 UTC [gossip.discovery] isSentByMe -> DEBU 4644 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 4645 Exiting" -"2019-07-20 02:40:56.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4646 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:56.289 UTC [msp] DeserializeIdentity -> DEBU 4647 Obtaining identity" -"2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4648 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4649 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 464a Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 464e 0xc0045c1640 gate 1563590456289653200 evaluation starts" -"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 464f 0xc0045c1640 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4650 0xc0045c1640 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4651 0xc0045c1640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4652 0xc0045c1640 principal evaluation fails" -"2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 4653 0xc0045c1640 gate 1563590456289653200 evaluation fails" -"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4654 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4656 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 4657 0xc0045c1e80 gate 1563590456289889200 evaluation starts" -"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4658 0xc0045c1e80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4659 0xc0045c1e80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 465a 0xc0045c1e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 465b 0xc0045c1e80 principal evaluation fails" -"2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 465c 0xc0045c1e80 gate 1563590456289889200 evaluation fails" -"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 4660 0xc0045d46c0 gate 1563590456290124200 evaluation starts" -"2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4661 0xc0045d46c0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4662 0xc0045d46c0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4663 0xc0045d46c0 principal matched by identity 0" -"2019-07-20 02:40:56.290 UTC [msp.identity] Verify -> DEBU 4664 Verify: digest = 00000000 c5 3f e7 ed 5d ed 6b e6 c4 00 af 76 54 a4 0a bb |.?..].k....vT...| -00000010 0a d6 d0 46 33 68 dd 86 70 ea 9c b2 9f 47 91 8e |...F3h..p....G..|" -"2019-07-20 02:40:56.290 UTC [msp.identity] Verify -> DEBU 4665 Verify: sig = 00000000 30 44 02 20 1f 2c ce 2e 2c 51 39 50 93 9d 7d 62 |0D. .,..,Q9P..}b| -00000010 24 00 9f bc 38 2d 8d 77 fd 62 36 7b db 0f 42 4d |$...8-.w.b6{..BM| -00000020 2d 3a 7c c6 02 20 28 3a 69 09 76 b3 4d d9 24 2b |-:|.. (:i.v.M.$+| -00000030 ce 3b 98 e5 98 83 99 79 8e 0e ae 37 b5 6c 88 07 |.;.....y...7.l..| -00000040 94 ae 7c fe f6 e1 |..|...|" -"2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4666 0xc0045d46c0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 4667 0xc0045d46c0 gate 1563590456290124200 evaluation succeeds" -"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 4668 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 4669 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 466a Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 466b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:56.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 466c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:56.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 466d Exiting" -"2019-07-20 02:40:56.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 466e Exiting" -"2019-07-20 02:40:56.345 UTC [gossip.gossip] handleMessage -> DEBU 466f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.345 UTC [gossip.pull] HandleMessage -> DEBU 4670 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.346 UTC [gossip.pull] SendDigest -> DEBU 4671 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:56.346 UTC [gossip.gossip] handleMessage -> DEBU 4672 Exiting" -"2019-07-20 02:40:56.361 UTC [gossip.gossip] handleMessage -> DEBU 4673 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.361 UTC [gossip.gossip] handleMessage -> DEBU 4674 Exiting" -"2019-07-20 02:40:56.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4675 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4676 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4677 Verify: digest = 00000000 fa ab 73 5c f5 93 a1 b9 90 e2 8f 60 be 96 af ac |..s\.......`....| -00000010 0d 2e 82 19 75 db 5f 9a 3a 3f ba 59 fb 42 f7 78 |....u._.:?.Y.B.x|" -"2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4678 Verify: sig = 00000000 30 45 02 21 00 ff 22 db 53 30 ca 08 2d 4b 6e bc |0E.!..".S0..-Kn.| -00000010 cb e8 e4 ed f2 a2 7e 51 f5 f2 33 63 30 39 09 9b |......~Q..3c09..| -00000020 93 47 20 9f 79 02 20 60 f1 a2 2b f8 d8 d2 5c d7 |.G .y. `..+...\.| -00000030 d5 d5 e1 34 23 fd 9b 89 ea 22 f6 60 17 b7 ce 85 |...4#....".`....| -00000040 78 ba 3e 8b aa b9 d9 |x.>....|" -"2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4679 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-09-24 00:27:23.851 UTC [msp.identity] Verify -> DEBU 6f72 Verify: sig = 00000000 30 43 02 1f 66 9a 84 23 dd c8 96 e6 07 3f bc 0e |0C..f..#.....?..| +00000010 ac 26 e5 ca 93 52 9f 38 2f b6 9b 2d 50 52 97 c9 |.&...R.8/..-PR..| +00000020 fe e6 50 02 20 3d 05 b9 86 74 8e d1 c9 b7 db 7e |..P. =...t.....~| +00000030 38 14 26 cf be f0 5c ee 62 12 4c b4 17 51 32 dd |8.&...\.b.L..Q2.| +00000040 33 39 4b 95 f1 |39K..|" +"2019-09-24 00:27:23.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f73 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes" +"2019-09-24 00:27:23.851 UTC [gossip.discovery] isSentByMe -> DEBU 6f74 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes" +"2019-09-24 00:27:23.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f75 Exiting" +"2019-09-24 00:27:23.851 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f76 Exiting" +"2019-09-24 00:27:23.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f77 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.852 UTC [gossip.gossip] handleMessage -> DEBU 6f78 Exiting" +"2019-09-24 00:27:23.852 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6f79 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:23.853 UTC [msp.identity] Verify -> DEBU 6f7a Verify: digest = 00000000 f9 a7 a0 e0 8e 4a 76 94 d9 a4 0d 4c b4 56 31 82 |.....Jv....L.V1.| +00000010 7f b6 3c f5 7d 2c 2d 9d b5 59 ad 12 94 54 77 2a |..<.},-..Y...Tw*|" +"2019-09-24 00:27:23.853 UTC [msp.identity] Verify -> DEBU 6f7b Verify: sig = 00000000 30 45 02 21 00 89 20 34 a2 4f 07 e2 37 15 4f 0e |0E.!.. 4.O..7.O.| +00000010 6f 76 b1 f2 1e 8c 28 0f 13 e5 a1 d1 7f a4 c1 a0 |ov....(.........| +00000020 57 dc 6d d7 0e 02 20 30 40 e3 7c 35 c7 ce d1 09 |W.m... 0@.|5....| +00000030 53 76 69 32 4b 12 f5 52 7d ea 87 b1 c5 34 4f 33 |Svi2K..R}....4O3| +00000040 a5 c4 15 0b 2d c6 3e |....-.>|" +"2019-09-24 00:27:23.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f7c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:23.854 UTC [gossip.discovery] isSentByMe -> DEBU 6f7d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:23.854 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f7e Exiting" +"2019-09-24 00:27:23.855 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6f7f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:23.855 UTC [msp] DeserializeIdentity -> DEBU 6f80 Obtaining identity" +"2019-09-24 00:27:23.855 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6f81 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:23.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6f82 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:23.855 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6f83 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f84 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f85 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f86 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:23.855 UTC [cauthdsl] func1 -> DEBU 6f87 0xc0054053e0 gate 1569284843855517800 evaluation starts" +"2019-09-24 00:27:23.855 UTC [cauthdsl] func2 -> DEBU 6f88 0xc0054053e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.855 UTC [cauthdsl] func2 -> DEBU 6f89 0xc0054053e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:23.855 UTC [cauthdsl] func2 -> DEBU 6f8a 0xc0054053e0 principal matched by identity 0" +"2019-09-24 00:27:23.855 UTC [msp.identity] Verify -> DEBU 6f8b Verify: digest = 00000000 30 9d 24 5a 67 49 98 bd 15 e2 81 43 15 40 6e 56 |0.$ZgI.....C.@nV| +00000010 3a 47 00 65 f9 aa ed a3 a0 96 84 ad 03 5c 64 8c |:G.e.........\d.|" +"2019-09-24 00:27:23.855 UTC [msp.identity] Verify -> DEBU 6f8c Verify: sig = 00000000 30 45 02 21 00 b6 c2 ed 69 38 4a 2b d6 78 bb b3 |0E.!....i8J+.x..| +00000010 81 3f 1d 7e db 6d 02 c3 be c3 30 c8 f2 2e b7 d4 |.?.~.m....0.....| +00000020 1a bd 0d c2 75 02 20 6b ea 07 39 ca 87 e3 7e 10 |....u. k..9...~.| +00000030 9a 23 a1 3d ff d1 ea f5 5a 6d a9 6e 79 37 39 4f |.#.=....Zm.ny79O| +00000040 6e d0 43 77 cc ef 94 |n.Cw...|" +"2019-09-24 00:27:23.855 UTC [cauthdsl] func2 -> DEBU 6f8d 0xc0054053e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:23.855 UTC [cauthdsl] func1 -> DEBU 6f8e 0xc0054053e0 gate 1569284843855517800 evaluation succeeds" +"2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f8f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f90 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f91 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:23.855 UTC [policies] Evaluate -> DEBU 6f92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:23.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f93 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:23.856 UTC [gossip.discovery] handleAliveMessage -> DEBU 6f94 Exiting" +"2019-09-24 00:27:23.856 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6f95 Exiting" +"2019-09-24 00:27:23.882 UTC [gossip.comm] func1 -> DEBU 6f96 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.884 UTC [gossip.gossip] handleMessage -> DEBU 6f97 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.886 UTC [gossip.pull] HandleMessage -> DEBU 6f98 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.887 UTC [msp] DeserializeIdentity -> DEBU 6f99 Obtaining identity" +"2019-09-24 00:27:23.888 UTC [msp] DeserializeIdentity -> DEBU 6f9a Obtaining identity" +"2019-09-24 00:27:23.888 UTC [msp] DeserializeIdentity -> DEBU 6f9b Obtaining identity" +"2019-09-24 00:27:23.888 UTC [msp] DeserializeIdentity -> DEBU 6f9c Obtaining identity" +"2019-09-24 00:27:23.889 UTC [msp] DeserializeIdentity -> DEBU 6f9d Obtaining identity" +"2019-09-24 00:27:23.889 UTC [msp] DeserializeIdentity -> DEBU 6f9e Obtaining identity" +"2019-09-24 00:27:23.889 UTC [gossip.pull] SendDigest -> DEBU 6f9f Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:27:23.889 UTC [gossip.gossip] handleMessage -> DEBU 6fa0 Exiting" +"2019-09-24 00:27:23.992 UTC [gossip.comm] func1 -> DEBU 6fa1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.992 UTC [gossip.gossip] handleMessage -> DEBU 6fa2 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.994 UTC [gossip.gossip] handleMessage -> DEBU 6fa3 Exiting" +"2019-09-24 00:27:23.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6fa4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:23.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 6fa5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:23.997 UTC [msp] DeserializeIdentity -> DEBU 6fa6 Obtaining identity" +"2019-09-24 00:27:23.997 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fa7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:23.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6fa8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:23.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6fa9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:23.997 UTC [policies] Evaluate -> DEBU 6faa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:23.997 UTC [policies] Evaluate -> DEBU 6fab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:23.997 UTC [policies] Evaluate -> DEBU 6fac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:23.997 UTC [cauthdsl] func1 -> DEBU 6fad 0xc005419d30 gate 1569284843997926100 evaluation starts" +"2019-09-24 00:27:23.997 UTC [cauthdsl] func2 -> DEBU 6fae 0xc005419d30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:23.998 UTC [cauthdsl] func2 -> DEBU 6faf 0xc005419d30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:23.998 UTC [cauthdsl] func2 -> DEBU 6fb0 0xc005419d30 principal matched by identity 0" +"2019-09-24 00:27:23.998 UTC [msp.identity] Verify -> DEBU 6fb1 Verify: digest = 00000000 2b 9f 63 53 9d 2a cc 2a ae 19 73 6c e1 d6 69 1c |+.cS.*.*..sl..i.| +00000010 3c 08 3d db 6d 35 b8 89 31 6b bd 6d f7 ac d1 7e |<.=.m5..1k.m...~|" +"2019-09-24 00:27:23.998 UTC [msp.identity] Verify -> DEBU 6fb2 Verify: sig = 00000000 30 44 02 20 26 cc 72 29 80 04 98 24 ef eb 12 a9 |0D. &.r)...$....| +00000010 ee c2 0f 05 fa d5 d2 30 dc 7e 11 69 7f f1 8c 8b |.......0.~.i....| +00000020 8a 29 8b 3a 02 20 12 c8 e5 27 0b 49 d9 47 0c 3a |.).:. ...'.I.G.:| +00000030 82 17 2a 5a 86 de 9e fc 7f e1 23 10 d8 3d ee e7 |..*Z......#..=..| +00000040 84 5e ea 54 7c c6 |.^.T|.|" +"2019-09-24 00:27:23.998 UTC [cauthdsl] func2 -> DEBU 6fb3 0xc005419d30 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:23.998 UTC [cauthdsl] func1 -> DEBU 6fb4 0xc005419d30 gate 1569284843997926100 evaluation succeeds" +"2019-09-24 00:27:23.998 UTC [policies] Evaluate -> DEBU 6fb5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.998 UTC [policies] Evaluate -> DEBU 6fb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:23.998 UTC [policies] Evaluate -> DEBU 6fb7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:23.998 UTC [policies] Evaluate -> DEBU 6fb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.000 UTC [gossip.discovery] handleAliveMessage -> DEBU 6fb9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6fba Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:24.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6fbb updating membership: timestamp: " +"2019-09-24 00:27:24.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6fbc Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:24.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6fbd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:24.001 UTC [gossip.discovery] learnExistingMembers -> DEBU 6fbe Exiting" +"2019-09-24 00:27:24.001 UTC [gossip.discovery] handleAliveMessage -> DEBU 6fbf Exiting" +"2019-09-24 00:27:24.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 6fc0 Exiting" +"2019-09-24 00:27:24.001 UTC [gossip.discovery] sendMemResponse -> DEBU 6fc1 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:27:24.001 UTC [msp] DeserializeIdentity -> DEBU 6fc2 Obtaining identity" +"2019-09-24 00:27:24.002 UTC [msp] DeserializeIdentity -> DEBU 6fc3 Obtaining identity" +"2019-09-24 00:27:24.002 UTC [msp] DeserializeIdentity -> DEBU 6fc4 Obtaining identity" +"2019-09-24 00:27:24.002 UTC [gossip.comm] Send -> DEBU 6fc5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:24.002 UTC [gossip.discovery] sendMemResponse -> DEBU 6fc6 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020^" signature:"0D\002 '\312\266R\242\325\365\344\260\210D\275\347\020\256\"X\237\201]\304v\354\350A\036\237\324R8\020\341\002 m*$\021\023S\300\275\302\260\362W\2169\004r\031\222\314\000\346\306 \304\365T\360\006\0001\255+" > alive: alive: alive: " +"2019-09-24 00:27:24.002 UTC [gossip.comm] sendToEndpoint -> DEBU 6fc7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.003 UTC [gossip.comm] sendToEndpoint -> DEBU 6fc8 Exiting" +"2019-09-24 00:27:24.045 UTC [msp] DeserializeIdentity -> DEBU 6fc9 Obtaining identity" +"2019-09-24 00:27:24.046 UTC [msp] DeserializeIdentity -> DEBU 6fca Obtaining identity" +"2019-09-24 00:27:24.046 UTC [gossip.comm] Send -> DEBU 6fcb Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fcc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fcd Exiting" +"2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fce Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fcf Exiting" +"2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fd0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.046 UTC [gossip.comm] sendToEndpoint -> DEBU 6fd1 Exiting" +"2019-09-24 00:27:24.047 UTC [gossip.comm] func1 -> DEBU 6fd2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.047 UTC [gossip.gossip] handleMessage -> DEBU 6fd3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.047 UTC [msp] DeserializeIdentity -> DEBU 6fd4 Obtaining identity" +"2019-09-24 00:27:24.048 UTC [msp] DeserializeIdentity -> DEBU 6fd5 Obtaining identity" +"2019-09-24 00:27:24.048 UTC [msp] DeserializeIdentity -> DEBU 6fd6 Obtaining identity" +"2019-09-24 00:27:24.049 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fd7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:24.049 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6fd8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.049 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6fd9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.049 UTC [policies] Evaluate -> DEBU 6fda == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.049 UTC [policies] Evaluate -> DEBU 6fdb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.049 UTC [policies] Evaluate -> DEBU 6fdc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.049 UTC [cauthdsl] func1 -> DEBU 6fdd 0xc0054535d0 gate 1569284844049940500 evaluation starts" +"2019-09-24 00:27:24.050 UTC [cauthdsl] func2 -> DEBU 6fde 0xc0054535d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.050 UTC [cauthdsl] func2 -> DEBU 6fdf 0xc0054535d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:24.050 UTC [cauthdsl] func2 -> DEBU 6fe0 0xc0054535d0 principal matched by identity 0" +"2019-09-24 00:27:24.050 UTC [msp.identity] Verify -> DEBU 6fe1 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +"2019-09-24 00:27:24.050 UTC [msp.identity] Verify -> DEBU 6fe2 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +00000040 15 da b4 89 d2 86 |......|" +"2019-09-24 00:27:24.050 UTC [cauthdsl] func2 -> DEBU 6fe3 0xc0054535d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.050 UTC [cauthdsl] func1 -> DEBU 6fe4 0xc0054535d0 gate 1569284844049940500 evaluation succeeds" +"2019-09-24 00:27:24.050 UTC [policies] Evaluate -> DEBU 6fe5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.051 UTC [policies] Evaluate -> DEBU 6fe6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.051 UTC [policies] Evaluate -> DEBU 6fe7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:24.051 UTC [policies] Evaluate -> DEBU 6fe8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.051 UTC [msp.identity] Verify -> DEBU 6fe9 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +"2019-09-24 00:27:24.051 UTC [msp.identity] Verify -> DEBU 6fea Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +00000040 54 87 75 e6 8e 00 |T.u...|" +"2019-09-24 00:27:24.051 UTC [gossip.comm] func1 -> DEBU 6feb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.052 UTC [gossip.comm] func1 -> DEBU 6fed Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.051 UTC [msp.identity] Verify -> DEBU 6fec Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +"2019-09-24 00:27:24.052 UTC [msp.identity] Verify -> DEBU 6fee Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +00000040 f9 8f 71 f2 6e 18 |..q.n.|" +"2019-09-24 00:27:24.053 UTC [msp] DeserializeIdentity -> DEBU 6fef Obtaining identity" +"2019-09-24 00:27:24.053 UTC [msp] DeserializeIdentity -> DEBU 6ff0 Obtaining identity" +"2019-09-24 00:27:24.053 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6ff1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:24.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ff2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ff3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.054 UTC [policies] Evaluate -> DEBU 6ff4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.055 UTC [policies] Evaluate -> DEBU 6ff5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.055 UTC [policies] Evaluate -> DEBU 6ff6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.055 UTC [cauthdsl] func1 -> DEBU 6ff7 0xc00548a550 gate 1569284844055610300 evaluation starts" +"2019-09-24 00:27:24.055 UTC [cauthdsl] func2 -> DEBU 6ff8 0xc00548a550 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.056 UTC [cauthdsl] func2 -> DEBU 6ff9 0xc00548a550 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:24.056 UTC [cauthdsl] func2 -> DEBU 6ffa 0xc00548a550 principal matched by identity 0" +"2019-09-24 00:27:24.056 UTC [msp.identity] Verify -> DEBU 6ffb Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +"2019-09-24 00:27:24.056 UTC [msp.identity] Verify -> DEBU 6ffc Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +00000040 01 32 48 48 f4 8a |.2HH..|" +"2019-09-24 00:27:24.057 UTC [cauthdsl] func2 -> DEBU 6ffd 0xc00548a550 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.057 UTC [cauthdsl] func1 -> DEBU 6ffe 0xc00548a550 gate 1569284844055610300 evaluation succeeds" +"2019-09-24 00:27:24.057 UTC [policies] Evaluate -> DEBU 6fff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.057 UTC [policies] Evaluate -> DEBU 7000 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.058 UTC [policies] Evaluate -> DEBU 7001 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:24.058 UTC [policies] Evaluate -> DEBU 7002 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.058 UTC [gossip.gossip] handleMessage -> DEBU 7003 Exiting" +"2019-09-24 00:27:24.058 UTC [gossip.gossip] handleMessage -> DEBU 7004 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.059 UTC [msp] DeserializeIdentity -> DEBU 7005 Obtaining identity" +"2019-09-24 00:27:24.059 UTC [msp] DeserializeIdentity -> DEBU 7006 Obtaining identity" +"2019-09-24 00:27:24.059 UTC [msp] DeserializeIdentity -> DEBU 7007 Obtaining identity" +"2019-09-24 00:27:24.060 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7008 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:24.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7009 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 700a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.060 UTC [policies] Evaluate -> DEBU 700b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.061 UTC [policies] Evaluate -> DEBU 700c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.061 UTC [policies] Evaluate -> DEBU 700d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.061 UTC [cauthdsl] func1 -> DEBU 700e 0xc00549a060 gate 1569284844061852100 evaluation starts" +"2019-09-24 00:27:24.062 UTC [cauthdsl] func2 -> DEBU 700f 0xc00549a060 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.062 UTC [cauthdsl] func2 -> DEBU 7010 0xc00549a060 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:24.062 UTC [cauthdsl] func2 -> DEBU 7011 0xc00549a060 principal matched by identity 0" +"2019-09-24 00:27:24.062 UTC [msp.identity] Verify -> DEBU 7012 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +"2019-09-24 00:27:24.062 UTC [msp.identity] Verify -> DEBU 7013 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +00000040 01 32 48 48 f4 8a |.2HH..|" +"2019-09-24 00:27:24.062 UTC [cauthdsl] func2 -> DEBU 7014 0xc00549a060 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.062 UTC [cauthdsl] func1 -> DEBU 7015 0xc00549a060 gate 1569284844061852100 evaluation succeeds" +"2019-09-24 00:27:24.062 UTC [policies] Evaluate -> DEBU 7016 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.062 UTC [policies] Evaluate -> DEBU 7017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.062 UTC [policies] Evaluate -> DEBU 7018 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:24.062 UTC [policies] Evaluate -> DEBU 7019 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 701a Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +"2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 701b Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +00000040 54 87 75 e6 8e 00 |T.u...|" +"2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 701c Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +"2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 701d Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +00000040 f9 8f 71 f2 6e 18 |..q.n.|" +"2019-09-24 00:27:24.063 UTC [msp] DeserializeIdentity -> DEBU 701e Obtaining identity" +"2019-09-24 00:27:24.063 UTC [msp] DeserializeIdentity -> DEBU 701f Obtaining identity" +"2019-09-24 00:27:24.063 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7020 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:24.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7021 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7022 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.063 UTC [policies] Evaluate -> DEBU 7023 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.063 UTC [policies] Evaluate -> DEBU 7024 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.063 UTC [policies] Evaluate -> DEBU 7025 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.063 UTC [cauthdsl] func1 -> DEBU 7026 0xc0054b4670 gate 1569284844063838800 evaluation starts" +"2019-09-24 00:27:24.063 UTC [cauthdsl] func2 -> DEBU 7027 0xc0054b4670 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.063 UTC [cauthdsl] func2 -> DEBU 7028 0xc0054b4670 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:24.063 UTC [cauthdsl] func2 -> DEBU 7029 0xc0054b4670 principal matched by identity 0" +"2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 702a Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +"2019-09-24 00:27:24.063 UTC [msp.identity] Verify -> DEBU 702b Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +00000040 15 da b4 89 d2 86 |......|" +"2019-09-24 00:27:24.064 UTC [cauthdsl] func2 -> DEBU 702c 0xc0054b4670 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.064 UTC [cauthdsl] func1 -> DEBU 702d 0xc0054b4670 gate 1569284844063838800 evaluation succeeds" +"2019-09-24 00:27:24.064 UTC [policies] Evaluate -> DEBU 702e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.064 UTC [policies] Evaluate -> DEBU 702f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.064 UTC [policies] Evaluate -> DEBU 7030 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:24.064 UTC [policies] Evaluate -> DEBU 7031 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.064 UTC [gossip.gossip] handleMessage -> DEBU 7032 Exiting" +"2019-09-24 00:27:24.064 UTC [gossip.gossip] handleMessage -> DEBU 7033 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.064 UTC [msp.identity] Verify -> DEBU 7034 Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +"2019-09-24 00:27:24.064 UTC [msp.identity] Verify -> DEBU 7035 Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +00000040 f9 8f 71 f2 6e 18 |..q.n.|" +"2019-09-24 00:27:24.064 UTC [msp.identity] Verify -> DEBU 7036 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +"2019-09-24 00:27:24.064 UTC [msp.identity] Verify -> DEBU 7037 Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +00000040 54 87 75 e6 8e 00 |T.u...|" +"2019-09-24 00:27:24.064 UTC [msp] DeserializeIdentity -> DEBU 7038 Obtaining identity" +"2019-09-24 00:27:24.064 UTC [msp] DeserializeIdentity -> DEBU 7039 Obtaining identity" +"2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 703a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 703b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 703c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 703d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 703e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 703f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.065 UTC [cauthdsl] func1 -> DEBU 7040 0xc0054c6ec0 gate 1569284844065207700 evaluation starts" +"2019-09-24 00:27:24.065 UTC [cauthdsl] func2 -> DEBU 7041 0xc0054c6ec0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.065 UTC [cauthdsl] func2 -> DEBU 7042 0xc0054c6ec0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:24.065 UTC [cauthdsl] func2 -> DEBU 7043 0xc0054c6ec0 principal matched by identity 0" +"2019-09-24 00:27:24.065 UTC [msp.identity] Verify -> DEBU 7044 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +"2019-09-24 00:27:24.065 UTC [msp.identity] Verify -> DEBU 7045 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +00000040 15 da b4 89 d2 86 |......|" +"2019-09-24 00:27:24.065 UTC [cauthdsl] func2 -> DEBU 7046 0xc0054c6ec0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.065 UTC [cauthdsl] func1 -> DEBU 7047 0xc0054c6ec0 gate 1569284844065207700 evaluation succeeds" +"2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 7048 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 7049 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 704a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 704b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.065 UTC [msp] DeserializeIdentity -> DEBU 704c Obtaining identity" +"2019-09-24 00:27:24.065 UTC [msp] DeserializeIdentity -> DEBU 704d Obtaining identity" +"2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 704e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 704f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7050 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.065 UTC [policies] Evaluate -> DEBU 7051 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 7052 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 7053 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.066 UTC [cauthdsl] func1 -> DEBU 7054 0xc0054e0690 gate 1569284844066064600 evaluation starts" +"2019-09-24 00:27:24.066 UTC [cauthdsl] func2 -> DEBU 7055 0xc0054e0690 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.066 UTC [cauthdsl] func2 -> DEBU 7056 0xc0054e0690 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:24.066 UTC [cauthdsl] func2 -> DEBU 7057 0xc0054e0690 principal matched by identity 0" +"2019-09-24 00:27:24.066 UTC [msp.identity] Verify -> DEBU 7058 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +"2019-09-24 00:27:24.066 UTC [msp.identity] Verify -> DEBU 7059 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +00000040 01 32 48 48 f4 8a |.2HH..|" +"2019-09-24 00:27:24.066 UTC [cauthdsl] func2 -> DEBU 705a 0xc0054e0690 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.066 UTC [cauthdsl] func1 -> DEBU 705b 0xc0054e0690 gate 1569284844066064600 evaluation succeeds" +"2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 705c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 705d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 705e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:24.066 UTC [policies] Evaluate -> DEBU 705f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.066 UTC [gossip.gossip] handleMessage -> DEBU 7060 Exiting" +"2019-09-24 00:27:24.300 UTC [msp] DeserializeIdentity -> DEBU 7061 Obtaining identity" +"2019-09-24 00:27:24.300 UTC [msp] DeserializeIdentity -> DEBU 7062 Obtaining identity" +"2019-09-24 00:27:24.301 UTC [gossip.pull] Hello -> DEBU 7063 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:24.301 UTC [msp] DeserializeIdentity -> DEBU 7064 Obtaining identity" +"2019-09-24 00:27:24.301 UTC [msp] DeserializeIdentity -> DEBU 7065 Obtaining identity" +"2019-09-24 00:27:24.302 UTC [gossip.comm] Send -> DEBU 7066 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:24.302 UTC [gossip.comm] sendToEndpoint -> DEBU 7067 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.302 UTC [gossip.comm] sendToEndpoint -> DEBU 7068 Exiting" +"2019-09-24 00:27:24.303 UTC [gossip.comm] func1 -> DEBU 7069 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.303 UTC [gossip.gossip] handleMessage -> DEBU 706a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.303 UTC [gossip.pull] HandleMessage -> DEBU 706b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.303 UTC [gossip.gossip] handleMessage -> DEBU 706c Exiting" +"2019-09-24 00:27:24.544 UTC [gossip.comm] func1 -> DEBU 706d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.545 UTC [gossip.gossip] handleMessage -> DEBU 706e Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.545 UTC [msp] DeserializeIdentity -> DEBU 706f Obtaining identity" +"2019-09-24 00:27:24.545 UTC [msp] DeserializeIdentity -> DEBU 7070 Obtaining identity" +"2019-09-24 00:27:24.545 UTC [gossip.gossip] handleMessage -> DEBU 7071 Exiting" +"2019-09-24 00:27:24.568 UTC [msp] GetDefaultSigningIdentity -> DEBU 7072 Obtaining default signing identity" +"2019-09-24 00:27:24.568 UTC [msp.identity] Sign -> DEBU 7073 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE3151059 " +"2019-09-24 00:27:24.568 UTC [msp.identity] Sign -> DEBU 7074 Sign: digest: 675049EC181F889800B1B6FA32004FBC371BD799D695FA7F47EF4A509EE51C61 " +"2019-09-24 00:27:24.568 UTC [msp] GetDefaultSigningIdentity -> DEBU 7075 Obtaining default signing identity" +"2019-09-24 00:27:24.568 UTC [msp.identity] Sign -> DEBU 7076 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:24.568 UTC [msp.identity] Sign -> DEBU 7077 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:24.568 UTC [gossip.discovery] periodicalSendAlive -> DEBU 7078 Sleeping 5s" +"2019-09-24 00:27:24.574 UTC [msp] DeserializeIdentity -> DEBU 7079 Obtaining identity" +"2019-09-24 00:27:24.575 UTC [msp] DeserializeIdentity -> DEBU 707a Obtaining identity" +"2019-09-24 00:27:24.575 UTC [gossip.comm] Send -> DEBU 707b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:24.576 UTC [msp] DeserializeIdentity -> DEBU 707c Obtaining identity" +"2019-09-24 00:27:24.576 UTC [gossip.comm] sendToEndpoint -> DEBU 707d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:24.576 UTC [gossip.comm] sendToEndpoint -> DEBU 707e Exiting" +"2019-09-24 00:27:24.577 UTC [gossip.comm] Send -> DEBU 707f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:24.577 UTC [msp] DeserializeIdentity -> DEBU 7080 Obtaining identity" +"2019-09-24 00:27:24.577 UTC [gossip.comm] sendToEndpoint -> DEBU 7081 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.578 UTC [gossip.comm] sendToEndpoint -> DEBU 7082 Exiting" +"2019-09-24 00:27:24.578 UTC [gossip.comm] Send -> DEBU 7083 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:24.580 UTC [gossip.comm] sendToEndpoint -> DEBU 7084 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.580 UTC [gossip.comm] sendToEndpoint -> DEBU 7085 Exiting" +"2019-09-24 00:27:24.741 UTC [gossip.comm] func1 -> DEBU 7086 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.741 UTC [gossip.gossip] handleMessage -> DEBU 7087 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.741 UTC [gossip.gossip] handleMessage -> DEBU 7088 Exiting" +"2019-09-24 00:27:24.742 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7089 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.742 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 708a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:24.743 UTC [msp] DeserializeIdentity -> DEBU 708b Obtaining identity" +"2019-09-24 00:27:24.743 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 708c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:24.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 708d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 708e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.744 UTC [policies] Evaluate -> DEBU 708f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.747 UTC [policies] Evaluate -> DEBU 7090 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.747 UTC [policies] Evaluate -> DEBU 7091 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.747 UTC [cauthdsl] func1 -> DEBU 7092 0xc0054f5c50 gate 1569284844747692100 evaluation starts" +"2019-09-24 00:27:24.747 UTC [cauthdsl] func2 -> DEBU 7093 0xc0054f5c50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.748 UTC [cauthdsl] func2 -> DEBU 7094 0xc0054f5c50 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:24.748 UTC [cauthdsl] func2 -> DEBU 7095 0xc0054f5c50 principal matched by identity 0" +"2019-09-24 00:27:24.748 UTC [msp.identity] Verify -> DEBU 7096 Verify: digest = 00000000 05 23 93 96 33 fc b2 48 b3 d2 39 9b 5f 2c 66 24 |.#..3..H..9._,f$| +00000010 c1 e7 3a 15 11 53 53 a4 fe 16 72 66 bd 7a 0c 94 |..:..SS...rf.z..|" +"2019-09-24 00:27:24.749 UTC [msp.identity] Verify -> DEBU 7097 Verify: sig = 00000000 30 45 02 21 00 be 89 67 35 d2 fa 72 30 24 cf 69 |0E.!...g5..r0$.i| +00000010 d3 85 5b ca cf 13 b4 ed c1 23 fe 8c a2 9c 1b 6b |..[......#.....k| +00000020 ca 6f 68 dc 41 02 20 47 13 09 cb d5 96 84 8b 07 |.oh.A. G........| +00000030 a3 78 ad 98 bd 98 d4 99 31 9a 26 a3 3f 6f 6a 75 |.x......1.&.?oju| +00000040 ab ab bc 5f 4c 68 f7 |..._Lh.|" +"2019-09-24 00:27:24.749 UTC [cauthdsl] func2 -> DEBU 7098 0xc0054f5c50 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.750 UTC [cauthdsl] func1 -> DEBU 7099 0xc0054f5c50 gate 1569284844747692100 evaluation succeeds" +"2019-09-24 00:27:24.750 UTC [policies] Evaluate -> DEBU 709a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.750 UTC [policies] Evaluate -> DEBU 709b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.750 UTC [policies] Evaluate -> DEBU 709c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:24.750 UTC [policies] Evaluate -> DEBU 709d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.751 UTC [gossip.discovery] handleAliveMessage -> DEBU 709e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:24.751 UTC [gossip.discovery] learnExistingMembers -> DEBU 709f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:24.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 70a0 updating membership: timestamp: " +"2019-09-24 00:27:24.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 70a1 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:24.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 70a2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:24.752 UTC [gossip.discovery] learnExistingMembers -> DEBU 70a3 Exiting" +"2019-09-24 00:27:24.753 UTC [gossip.discovery] handleAliveMessage -> DEBU 70a4 Exiting" +"2019-09-24 00:27:24.753 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70a5 Exiting" +"2019-09-24 00:27:24.754 UTC [gossip.discovery] sendMemResponse -> DEBU 70a6 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:27:24.754 UTC [msp] DeserializeIdentity -> DEBU 70a7 Obtaining identity" +"2019-09-24 00:27:24.754 UTC [msp] DeserializeIdentity -> DEBU 70a8 Obtaining identity" +"2019-09-24 00:27:24.754 UTC [msp] DeserializeIdentity -> DEBU 70a9 Obtaining identity" +"2019-09-24 00:27:24.754 UTC [gossip.comm] Send -> DEBU 70aa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:24.755 UTC [gossip.discovery] sendMemResponse -> DEBU 70ab Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020^" signature:"0D\002 '\312\266R\242\325\365\344\260\210D\275\347\020\256\"X\237\201]\304v\354\350A\036\237\324R8\020\341\002 m*$\021\023S\300\275\302\260\362W\2169\004r\031\222\314\000\346\306 \304\365T\360\006\0001\255+" > alive: alive: alive:\257\"\3775I\247UX\263=\220\317-\252\356\276\362" > " +"2019-09-24 00:27:24.755 UTC [gossip.comm] sendToEndpoint -> DEBU 70ac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.755 UTC [gossip.comm] sendToEndpoint -> DEBU 70ad Exiting" +"2019-09-24 00:27:24.788 UTC [gossip.comm] func1 -> DEBU 70ae Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.789 UTC [gossip.gossip] handleMessage -> DEBU 70af Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.789 UTC [gossip.pull] HandleMessage -> DEBU 70b0 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.789 UTC [msp] DeserializeIdentity -> DEBU 70b1 Obtaining identity" +"2019-09-24 00:27:24.789 UTC [msp] DeserializeIdentity -> DEBU 70b2 Obtaining identity" +"2019-09-24 00:27:24.790 UTC [msp] DeserializeIdentity -> DEBU 70b3 Obtaining identity" +"2019-09-24 00:27:24.790 UTC [msp] DeserializeIdentity -> DEBU 70b4 Obtaining identity" +"2019-09-24 00:27:24.790 UTC [msp] DeserializeIdentity -> DEBU 70b5 Obtaining identity" +"2019-09-24 00:27:24.790 UTC [msp] DeserializeIdentity -> DEBU 70b6 Obtaining identity" +"2019-09-24 00:27:24.790 UTC [gossip.pull] SendDigest -> DEBU 70b7 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:27:24.790 UTC [gossip.gossip] handleMessage -> DEBU 70b8 Exiting" +"2019-09-24 00:27:24.809 UTC [gossip.comm] func1 -> DEBU 70b9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.809 UTC [gossip.gossip] handleMessage -> DEBU 70ba Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.810 UTC [gossip.pull] HandleMessage -> DEBU 70bb GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:24.810 UTC [gossip.pull] SendDigest -> DEBU 70bc Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:24.810 UTC [gossip.gossip] handleMessage -> DEBU 70bd Exiting" +"2019-09-24 00:27:24.912 UTC [gossip.comm] func1 -> DEBU 70be Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.912 UTC [gossip.gossip] handleMessage -> DEBU 70bf Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.913 UTC [gossip.gossip] handleMessage -> DEBU 70c0 Exiting" +"2019-09-24 00:27:24.913 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70c1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.914 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 70c2 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:24.914 UTC [msp] DeserializeIdentity -> DEBU 70c3 Obtaining identity" +"2019-09-24 00:27:24.914 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:24.914 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70c5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.914 UTC [gossip.comm] func1 -> DEBU 70c6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.914 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70c7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:24.914 UTC [policies] Evaluate -> DEBU 70c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:24.914 UTC [policies] Evaluate -> DEBU 70c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:24.914 UTC [gossip.gossip] handleMessage -> DEBU 70ca Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.914 UTC [policies] Evaluate -> DEBU 70cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:24.915 UTC [cauthdsl] func1 -> DEBU 70cc 0xc005548870 gate 1569284844915077600 evaluation starts" +"2019-09-24 00:27:24.915 UTC [cauthdsl] func2 -> DEBU 70cd 0xc005548870 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:24.915 UTC [cauthdsl] func2 -> DEBU 70ce 0xc005548870 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:24.915 UTC [cauthdsl] func2 -> DEBU 70cf 0xc005548870 principal matched by identity 0" +"2019-09-24 00:27:24.915 UTC [msp.identity] Verify -> DEBU 70d0 Verify: digest = 00000000 fc 89 84 ab 89 04 58 c5 e2 e0 89 0b 20 b4 4c 86 |......X..... .L.| +00000010 de 86 75 9c 37 64 35 59 99 37 60 18 a2 91 5f b3 |..u.7d5Y.7`..._.|" +"2019-09-24 00:27:24.915 UTC [msp.identity] Verify -> DEBU 70d1 Verify: sig = 00000000 30 44 02 20 62 72 2d 46 b6 4c a1 5f 44 73 da 0d |0D. br-F.L._Ds..| +00000010 89 2b 81 b4 71 06 00 ce 07 56 5b 40 4f 88 ca 28 |.+..q....V[@O..(| +00000020 32 e7 ce ca 02 20 66 e2 d2 7b ad 65 f6 97 c8 20 |2.... f..{.e... | +00000030 a7 2c cd 89 97 40 62 3f 2c 58 86 c3 a5 36 da 76 |.,...@b?,X...6.v| +00000040 90 bf 6f 56 55 39 |..oVU9|" +"2019-09-24 00:27:24.916 UTC [cauthdsl] func2 -> DEBU 70d2 0xc005548870 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:24.916 UTC [cauthdsl] func1 -> DEBU 70d3 0xc005548870 gate 1569284844915077600 evaluation succeeds" +"2019-09-24 00:27:24.916 UTC [policies] Evaluate -> DEBU 70d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.916 UTC [policies] Evaluate -> DEBU 70d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:24.916 UTC [policies] Evaluate -> DEBU 70d6 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:24.916 UTC [policies] Evaluate -> DEBU 70d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:24.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 70d8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.916 UTC [gossip.discovery] learnExistingMembers -> DEBU 70d9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:24.916 UTC [gossip.discovery] learnExistingMembers -> DEBU 70da updating membership: timestamp: " +"2019-09-24 00:27:24.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 70dc Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:24.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 70dd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:24.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 70de Exiting" +"2019-09-24 00:27:24.918 UTC [gossip.comm] func1 -> DEBU 70db Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 70df Exiting" +"2019-09-24 00:27:24.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70e0 Exiting" +"2019-09-24 00:27:24.919 UTC [gossip.gossip] handleMessage -> DEBU 70e1 Exiting" +"2019-09-24 00:27:24.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70e2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70e4 Exiting" +"2019-09-24 00:27:24.920 UTC [gossip.gossip] handleMessage -> DEBU 70e3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.921 UTC [gossip.gossip] handleMessage -> DEBU 70e5 Exiting" +"2019-09-24 00:27:24.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70e6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 70e7 Exiting" +"2019-09-24 00:27:24.922 UTC [msp] DeserializeIdentity -> DEBU 70e8 Obtaining identity" +"2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70e9 Obtaining identity" +"2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70ea Obtaining identity" +"2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70eb Obtaining identity" +"2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70ec Obtaining identity" +"2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70ed Obtaining identity" +"2019-09-24 00:27:24.923 UTC [msp] DeserializeIdentity -> DEBU 70ee Obtaining identity" +"2019-09-24 00:27:24.924 UTC [gossip.comm] Send -> DEBU 70ef Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:24.924 UTC [msp] DeserializeIdentity -> DEBU 70f0 Obtaining identity" +"2019-09-24 00:27:24.924 UTC [msp] DeserializeIdentity -> DEBU 70f1 Obtaining identity" +"2019-09-24 00:27:24.924 UTC [gossip.comm] Send -> DEBU 70f2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:24.924 UTC [gossip.comm] sendToEndpoint -> DEBU 70f3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.924 UTC [gossip.comm] sendToEndpoint -> DEBU 70f4 Exiting" +"2019-09-24 00:27:24.925 UTC [gossip.comm] sendToEndpoint -> DEBU 70f5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:24.925 UTC [gossip.comm] sendToEndpoint -> DEBU 70f6 Exiting" +"2019-09-24 00:27:25.038 UTC [gossip.comm] func1 -> DEBU 70f7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:25.038 UTC [gossip.gossip] handleMessage -> DEBU 70f8 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:25.038 UTC [msp] DeserializeIdentity -> DEBU 70f9 Obtaining identity" +"2019-09-24 00:27:25.039 UTC [msp] DeserializeIdentity -> DEBU 70fa Obtaining identity" +"2019-09-24 00:27:25.039 UTC [msp] DeserializeIdentity -> DEBU 70fb Obtaining identity" +"2019-09-24 00:27:25.039 UTC [gossip.gossip] handleMessage -> DEBU 70fc Exiting" +"2019-09-24 00:27:25.620 UTC [gossip.comm] func1 -> DEBU 70fd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:25.620 UTC [gossip.gossip] handleMessage -> DEBU 70fe Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:25.620 UTC [gossip.pull] HandleMessage -> DEBU 70ff GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:25.621 UTC [gossip.pull] SendDigest -> DEBU 7100 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:25.621 UTC [gossip.gossip] handleMessage -> DEBU 7101 Exiting" +"2019-09-24 00:27:25.635 UTC [gossip.comm] func1 -> DEBU 7102 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.635 UTC [gossip.gossip] handleMessage -> DEBU 7103 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.635 UTC [gossip.gossip] handleMessage -> DEBU 7104 Exiting" +"2019-09-24 00:27:25.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7105 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7106 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:25.635 UTC [msp] DeserializeIdentity -> DEBU 7107 Obtaining identity" +"2019-09-24 00:27:25.635 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7108 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:25.635 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7109 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:25.635 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 710a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:25.635 UTC [policies] Evaluate -> DEBU 710b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:25.635 UTC [policies] Evaluate -> DEBU 710c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:25.635 UTC [policies] Evaluate -> DEBU 710d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:25.635 UTC [cauthdsl] func1 -> DEBU 710e 0xc005580140 gate 1569284845635652200 evaluation starts" +"2019-09-24 00:27:25.635 UTC [cauthdsl] func2 -> DEBU 710f 0xc005580140 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:25.635 UTC [cauthdsl] func2 -> DEBU 7110 0xc005580140 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:25.635 UTC [cauthdsl] func2 -> DEBU 7111 0xc005580140 principal matched by identity 0" +"2019-09-24 00:27:25.635 UTC [msp.identity] Verify -> DEBU 7112 Verify: digest = 00000000 bd a4 25 81 86 0e fd 3f d0 b6 65 a1 34 c5 39 81 |..%....?..e.4.9.| +00000010 06 ec 81 25 33 2f ff 39 8a d6 93 ad b0 53 f8 55 |...%3/.9.....S.U|" +"2019-09-24 00:27:25.635 UTC [msp.identity] Verify -> DEBU 7113 Verify: sig = 00000000 30 44 02 20 29 76 09 93 dd 06 e5 59 84 6c b8 74 |0D. )v.....Y.l.t| +00000010 e4 f6 4a bd 44 20 b1 8c 14 6a 8b e2 7b 86 7a 3a |..J.D ...j..{.z:| +00000020 c7 28 73 95 02 20 20 b4 c3 90 7a 64 26 c8 78 7f |.(s.. ...zd&.x.| +00000030 6b 14 2e df 49 13 84 c4 f7 ea 72 80 31 c0 6b 9c |k...I.....r.1.k.| +00000040 73 87 0d 42 81 c5 |s..B..|" +"2019-09-24 00:27:25.636 UTC [cauthdsl] func2 -> DEBU 7114 0xc005580140 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:25.636 UTC [cauthdsl] func1 -> DEBU 7115 0xc005580140 gate 1569284845635652200 evaluation succeeds" +"2019-09-24 00:27:25.636 UTC [policies] Evaluate -> DEBU 7116 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:25.636 UTC [policies] Evaluate -> DEBU 7117 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:25.636 UTC [policies] Evaluate -> DEBU 7118 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:25.636 UTC [policies] Evaluate -> DEBU 7119 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:25.636 UTC [gossip.discovery] handleAliveMessage -> DEBU 711a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 711b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:25.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 711c updating membership: timestamp: " +"2019-09-24 00:27:25.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 711d Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:25.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 711e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:25.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 711f Exiting" +"2019-09-24 00:27:25.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 7120 Exiting" +"2019-09-24 00:27:25.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7121 Exiting" +"2019-09-24 00:27:25.640 UTC [gossip.comm] func1 -> DEBU 7122 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.640 UTC [gossip.gossip] handleMessage -> DEBU 7123 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.640 UTC [gossip.gossip] handleMessage -> DEBU 7124 Exiting" +"2019-09-24 00:27:25.640 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7125 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.640 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7126 Exiting" +"2019-09-24 00:27:25.642 UTC [gossip.comm] func1 -> DEBU 7127 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.643 UTC [gossip.gossip] handleMessage -> DEBU 7128 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.643 UTC [gossip.gossip] handleMessage -> DEBU 7129 Exiting" +"2019-09-24 00:27:25.643 UTC [gossip.discovery] handleMsgFromComm -> DEBU 712a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.643 UTC [gossip.discovery] handleMsgFromComm -> DEBU 712b Exiting" +"2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 712c Obtaining identity" +"2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 712d Obtaining identity" +"2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 712e Obtaining identity" +"2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 712f Obtaining identity" +"2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 7130 Obtaining identity" +"2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 7131 Obtaining identity" +"2019-09-24 00:27:25.644 UTC [msp] DeserializeIdentity -> DEBU 7132 Obtaining identity" +"2019-09-24 00:27:25.645 UTC [gossip.comm] Send -> DEBU 7133 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:25.645 UTC [msp] DeserializeIdentity -> DEBU 7134 Obtaining identity" +"2019-09-24 00:27:25.646 UTC [gossip.comm] Send -> DEBU 7136 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 00:27:25.646 UTC [gossip.comm] sendToEndpoint -> DEBU 7135 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.646 UTC [gossip.comm] sendToEndpoint -> DEBU 7137 Exiting" +"2019-09-24 00:27:25.646 UTC [gossip.comm] sendToEndpoint -> DEBU 7138 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:25.646 UTC [gossip.comm] sendToEndpoint -> DEBU 7139 Exiting" +"2019-09-24 00:27:25.752 UTC [gossip.comm] func1 -> DEBU 713a Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020_" signature:"0D\002 _\205)P\310e\327\262\235\240S\253p\232U4=\243\352\302pH\341\017\223\335H\367g,T3\002 o\313C\347\031P;t-'z\216\321\255\033![.\3219\000\276\001\256\022\327A\354\221\316\347y" secret_envelope:K\214K\303\311O\232\016\325\316\023\365ALCJ*" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:27:25.752 UTC [gossip.gossip] handleMessage -> DEBU 713b Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020_" signature:"0D\002 _\205)P\310e\327\262\235\240S\253p\232U4=\243\352\302pH\341\017\223\335H\367g,T3\002 o\313C\347\031P;t-'z\216\321\255\033![.\3219\000\276\001\256\022\327A\354\221\316\347y" secret_envelope:K\214K\303\311O\232\016\325\316\023\365ALCJ*" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:27:25.752 UTC [gossip.gossip] handleMessage -> DEBU 713c Exiting" +"2019-09-24 00:27:25.752 UTC [gossip.discovery] handleMsgFromComm -> DEBU 713d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020_" signature:"0D\002 _\205)P\310e\327\262\235\240S\253p\232U4=\243\352\302pH\341\017\223\335H\367g,T3\002 o\313C\347\031P;t-'z\216\321\255\033![.\3219\000\276\001\256\022\327A\354\221\316\347y" secret_envelope:K\214K\303\311O\232\016\325\316\023\365ALCJ*" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 00:27:25.752 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 713e Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:25.752 UTC [msp.identity] Verify -> DEBU 713f Verify: digest = 00000000 40 64 e4 0c bd 01 ba f8 b3 bc a1 bc 7f 6a 19 46 |@d...........j.F| +00000010 ca 70 d0 5e 0c 52 a3 0e 44 67 9e 07 09 54 99 bd |.p.^.R..Dg...T..|" +"2019-09-24 00:27:25.752 UTC [msp.identity] Verify -> DEBU 7140 Verify: sig = 00000000 30 44 02 20 5f 85 29 50 c8 65 d7 b2 9d a0 53 ab |0D. _.)P.e....S.| +00000010 70 9a 55 34 3d a3 ea c2 70 48 e1 0f 93 dd 48 f7 |p.U4=...pH....H.| +00000020 67 2c 54 33 02 20 6f cb 43 e7 19 50 3b 74 2d 27 |g,T3. o.C..P;t-'| +00000030 7a 8e d1 ad 1b 21 5b 2e d1 39 00 be 01 ae 12 d7 |z....![..9......| +00000040 41 ec 91 ce e7 79 |A....y|" +"2019-09-24 00:27:25.753 UTC [msp.identity] Verify -> DEBU 7141 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 467a Verify: sig = 00000000 30 44 02 20 05 cf 79 80 3d 45 b3 f7 3d 3b 60 b3 |0D. ..y.=E..=;`.| -00000010 72 86 c7 75 d4 53 ad 9f 97 86 aa 64 6e 5e 0e 1c |r..u.S.....dn^..| -00000020 a9 90 49 4d 02 20 22 09 d5 04 3f d4 c0 cb b6 62 |..IM. "...?....b| -00000030 cf f5 e6 ae 38 be b6 98 b7 11 56 d2 42 e8 68 ac |....8.....V.B.h.| -00000040 3a d7 07 37 b7 c6 |:..7..|" -"2019-07-20 02:40:56.361 UTC [gossip.discovery] handleAliveMessage -> DEBU 467b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:40:56.361 UTC [gossip.discovery] learnExistingMembers -> DEBU 467c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:40:56.361 UTC [gossip.discovery] learnExistingMembers -> DEBU 467d updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 467e Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 467f Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 4680 Exiting" -"2019-07-20 02:40:56.362 UTC [gossip.discovery] handleAliveMessage -> DEBU 4681 Exiting" -"2019-07-20 02:40:56.362 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4682 Exiting" -"2019-07-20 02:40:56.362 UTC [gossip.discovery] sendMemResponse -> DEBU 4683 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:40:56.362 UTC [msp] DeserializeIdentity -> DEBU 4684 Obtaining identity" -"2019-07-20 02:40:56.362 UTC [msp] DeserializeIdentity -> DEBU 4685 Obtaining identity" -"2019-07-20 02:40:56.362 UTC [gossip.comm] Send -> DEBU 4686 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:56.362 UTC [gossip.discovery] sendMemResponse -> DEBU 4687 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > alive: " -"2019-07-20 02:40:56.362 UTC [gossip.comm] sendToEndpoint -> DEBU 4688 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.362 UTC [gossip.comm] sendToEndpoint -> DEBU 4689 Exiting" -"2019-07-20 02:40:56.584 UTC [gossip.comm] func1 -> DEBU 468a Got message: GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.585 UTC [gossip.gossip] handleMessage -> DEBU 468b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.585 UTC [gossip.gossip] handleMessage -> DEBU 468c Exiting" -"2019-07-20 02:40:56.585 UTC [gossip.discovery] handleMsgFromComm -> DEBU 468d Got message: GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.585 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 468e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:56.585 UTC [msp] DeserializeIdentity -> DEBU 468f Obtaining identity" -"2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4690 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4691 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4692 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4693 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4694 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4695 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:56.585 UTC [cauthdsl] func1 -> DEBU 4696 0xc00460a820 gate 1563590456585620000 evaluation starts" -"2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4697 0xc00460a820 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4698 0xc00460a820 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4699 0xc00460a820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 469a 0xc00460a820 principal evaluation fails" -"2019-07-20 02:40:56.585 UTC [cauthdsl] func1 -> DEBU 469b 0xc00460a820 gate 1563590456585620000 evaluation fails" -"2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:56.586 UTC [cauthdsl] func1 -> DEBU 469f 0xc00460b060 gate 1563590456586257100 evaluation starts" -"2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a0 0xc00460b060 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a1 0xc00460b060 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a2 0xc00460b060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a3 0xc00460b060 principal evaluation fails" -"2019-07-20 02:40:56.586 UTC [cauthdsl] func1 -> DEBU 46a4 0xc00460b060 gate 1563590456586257100 evaluation fails" -"2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 46a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 46a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.587 UTC [policies] Evaluate -> DEBU 46a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:56.587 UTC [cauthdsl] func1 -> DEBU 46a8 0xc00460b8a0 gate 1563590456587959800 evaluation starts" -"2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46a9 0xc00460b8a0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46aa 0xc00460b8a0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46ab 0xc00460b8a0 principal matched by identity 0" -"2019-07-20 02:40:56.590 UTC [msp.identity] Verify -> DEBU 46ac Verify: digest = 00000000 1d ed 21 e4 a5 0c 7e 85 37 55 19 44 7f 43 9b 42 |..!...~.7U.D.C.B| -00000010 a3 96 63 da 16 62 19 0e 1c 46 2f 31 f2 3a 5a 12 |..c..b...F/1.:Z.|" -"2019-07-20 02:40:56.590 UTC [msp.identity] Verify -> DEBU 46ad Verify: sig = 00000000 30 44 02 20 4d 93 9d d4 48 e7 d0 dc ac 30 00 94 |0D. M...H....0..| -00000010 97 3e ac 27 2a 5e a5 d6 36 4b f1 ef cf 66 ad df |.>.'*^..6K...f..| -00000020 a5 36 c3 47 02 20 76 dd 44 92 0c 6c a8 3b 8a d8 |.6.G. v.D..l.;..| -00000030 83 a0 dd 52 97 2f cd 8b ab 36 c9 1f 2b e8 45 15 |...R./...6..+.E.| -00000040 bd e8 1f 15 3d e7 |....=.|" -"2019-07-20 02:40:56.591 UTC [cauthdsl] func2 -> DEBU 46ae 0xc00460b8a0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:56.591 UTC [cauthdsl] func1 -> DEBU 46af 0xc00460b8a0 gate 1563590456587959800 evaluation succeeds" -"2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b2 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:56.591 UTC [gossip.discovery] handleAliveMessage -> DEBU 46b4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b6 updating membership: timestamp: " -"2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b7 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b9 Exiting" -"2019-07-20 02:40:56.594 UTC [gossip.discovery] handleAliveMessage -> DEBU 46ba Exiting" -"2019-07-20 02:40:56.595 UTC [gossip.discovery] sendMemResponse -> DEBU 46bc Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46bd Obtaining identity" -"2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46be Obtaining identity" -"2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46bf Obtaining identity" -"2019-07-20 02:40:56.595 UTC [gossip.comm] Send -> DEBU 46c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:56.595 UTC [gossip.discovery] sendMemResponse -> DEBU 46c1 Exiting, replying with alive:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" > alive: " -"2019-07-20 02:40:56.595 UTC [gossip.comm] sendToEndpoint -> DEBU 46c2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.595 UTC [gossip.comm] sendToEndpoint -> DEBU 46c3 Exiting" -"2019-07-20 02:40:56.598 UTC [gossip.comm] func1 -> DEBU 46c4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.598 UTC [gossip.gossip] handleMessage -> DEBU 46c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.598 UTC [gossip.pull] HandleMessage -> DEBU 46c6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c7 Obtaining identity" -"2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c8 Obtaining identity" -"2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c9 Obtaining identity" -"2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46ca Obtaining identity" -"2019-07-20 02:40:56.599 UTC [msp] DeserializeIdentity -> DEBU 46cb Obtaining identity" -"2019-07-20 02:40:56.599 UTC [msp] DeserializeIdentity -> DEBU 46cc Obtaining identity" -"2019-07-20 02:40:56.599 UTC [gossip.pull] SendDigest -> DEBU 46cd Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:40:56.599 UTC [gossip.gossip] handleMessage -> DEBU 46ce Exiting" -"2019-07-20 02:40:56.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46bb Exiting" -"2019-07-20 02:40:56.682 UTC [msp] DeserializeIdentity -> DEBU 46cf Obtaining identity" -"2019-07-20 02:40:56.682 UTC [msp] DeserializeIdentity -> DEBU 46d0 Obtaining identity" -"2019-07-20 02:40:56.682 UTC [gossip.comm] Send -> DEBU 46d1 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:40:56.682 UTC [gossip.comm] sendToEndpoint -> DEBU 46d2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.682 UTC [gossip.comm] sendToEndpoint -> DEBU 46d3 Exiting" -"2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d5 Exiting" -"2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d7 Exiting" -"2019-07-20 02:40:56.685 UTC [gossip.comm] func1 -> DEBU 46d8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.686 UTC [gossip.gossip] handleMessage -> DEBU 46d9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46da Obtaining identity" -"2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46db Obtaining identity" -"2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46dc Obtaining identity" -"2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46de Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46df Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:56.686 UTC [cauthdsl] func1 -> DEBU 46e3 0xc00461bbc0 gate 1563590456686774400 evaluation starts" -"2019-07-20 02:40:56.686 UTC [cauthdsl] func2 -> DEBU 46e4 0xc00461bbc0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e5 0xc00461bbc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e6 0xc00461bbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e7 0xc00461bbc0 principal evaluation fails" -"2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46e8 0xc00461bbc0 gate 1563590456686774400 evaluation fails" -"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46e9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46ec 0xc00464a400 gate 1563590456687367200 evaluation starts" -"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ed 0xc00464a400 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ee 0xc00464a400 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ef 0xc00464a400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46f0 0xc00464a400 principal evaluation fails" -"2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46f1 0xc00464a400 gate 1563590456687367200 evaluation fails" -"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:56.688 UTC [cauthdsl] func1 -> DEBU 46f5 0xc00464ac40 gate 1563590456687994900 evaluation starts" -"2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f6 0xc00464ac40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f7 0xc00464ac40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f8 0xc00464ac40 principal matched by identity 0" -"2019-07-20 02:40:56.696 UTC [msp.identity] Verify -> DEBU 46f9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:40:56.696 UTC [msp.identity] Verify -> DEBU 46fa Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:40:56.696 UTC [cauthdsl] func2 -> DEBU 46fb 0xc00464ac40 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:56.696 UTC [cauthdsl] func1 -> DEBU 46fc 0xc00464ac40 gate 1563590456687994900 evaluation succeeds" -"2019-07-20 02:40:56.696 UTC [policies] Evaluate -> DEBU 46fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 46fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 46ff Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 4700 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:56.697 UTC [msp.identity] Verify -> DEBU 4701 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -"2019-07-20 02:40:56.697 UTC [msp.identity] Verify -> DEBU 4702 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -00000040 04 ec df 98 3f 3b |....?;|" -"2019-07-20 02:40:56.698 UTC [msp.identity] Verify -> DEBU 4703 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:40:56.698 UTC [msp.identity] Verify -> DEBU 4704 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:40:56.699 UTC [msp] DeserializeIdentity -> DEBU 4705 Obtaining identity" -"2019-07-20 02:40:56.699 UTC [gossip.comm] func1 -> DEBU 4706 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.699 UTC [msp] DeserializeIdentity -> DEBU 4707 Obtaining identity" -"2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4708 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4709 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 470a Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.700 UTC [policies] Evaluate -> DEBU 470b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 470c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 470d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:56.701 UTC [cauthdsl] func1 -> DEBU 470e 0xc004661250 gate 1563590456701197200 evaluation starts" -"2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 470f 0xc004661250 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4710 0xc004661250 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4711 0xc004661250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4712 0xc004661250 principal evaluation fails" -"2019-07-20 02:40:56.701 UTC [cauthdsl] func1 -> DEBU 4713 0xc004661250 gate 1563590456701197200 evaluation fails" -"2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4714 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4715 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4716 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4717 0xc004661a90 gate 1563590456702044300 evaluation starts" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4718 0xc004661a90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4719 0xc004661a90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 471a 0xc004661a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 471b 0xc004661a90 principal evaluation fails" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 471c 0xc004661a90 gate 1563590456702044300 evaluation fails" -"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4720 0xc0046782d0 gate 1563590456702330000 evaluation starts" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4721 0xc0046782d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4722 0xc0046782d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4723 0xc0046782d0 principal matched by identity 0" -"2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 4724 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 4725 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4726 0xc0046782d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4727 0xc0046782d0 gate 1563590456702330000 evaluation succeeds" -"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 4728 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 4729 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 472a Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 472b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:56.702 UTC [gossip.gossip] handleMessage -> DEBU 472c Exiting" -"2019-07-20 02:40:56.702 UTC [gossip.gossip] handleMessage -> DEBU 472d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 472e Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 472f Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 4730 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -"2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 4731 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -00000040 04 ec df 98 3f 3b |....?;|" -"2019-07-20 02:40:56.703 UTC [msp] DeserializeIdentity -> DEBU 4732 Obtaining identity" -"2019-07-20 02:40:56.703 UTC [msp] DeserializeIdentity -> DEBU 4733 Obtaining identity" -"2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4734 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4735 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4736 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4737 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4738 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4739 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 473a 0xc00468cb20 gate 1563590456703708200 evaluation starts" -"2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473b 0xc00468cb20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473c 0xc00468cb20 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473d 0xc00468cb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473e 0xc00468cb20 principal evaluation fails" -"2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 473f 0xc00468cb20 gate 1563590456703708200 evaluation fails" -"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4740 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4741 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4742 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 4743 0xc00468d360 gate 1563590456703960000 evaluation starts" -"2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 4744 0xc00468d360 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4745 0xc00468d360 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4746 0xc00468d360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4747 0xc00468d360 principal evaluation fails" -"2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4748 0xc00468d360 gate 1563590456703960000 evaluation fails" -"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4749 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 474a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 474b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 474c 0xc00468dba0 gate 1563590456704206600 evaluation starts" -"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474d 0xc00468dba0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474e 0xc00468dba0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474f 0xc00468dba0 principal matched by identity 0" -"2019-07-20 02:40:56.704 UTC [msp.identity] Verify -> DEBU 4750 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:40:56.704 UTC [msp.identity] Verify -> DEBU 4751 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4752 0xc00468dba0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4753 0xc00468dba0 gate 1563590456704206600 evaluation succeeds" -"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4754 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4755 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4756 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4757 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:56.704 UTC [msp] DeserializeIdentity -> DEBU 4758 Obtaining identity" -"2019-07-20 02:40:56.704 UTC [msp] DeserializeIdentity -> DEBU 4759 Obtaining identity" -"2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 475a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 475b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 475c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4760 0xc0046a1370 gate 1563590456704980700 evaluation starts" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4761 0xc0046a1370 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4762 0xc0046a1370 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4763 0xc0046a1370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4764 0xc0046a1370 principal evaluation fails" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4765 0xc0046a1370 gate 1563590456704980700 evaluation fails" -"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4766 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4767 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4768 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4769 0xc0046a1bb0 gate 1563590456705230500 evaluation starts" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476a 0xc0046a1bb0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476b 0xc0046a1bb0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476c 0xc0046a1bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476d 0xc0046a1bb0 principal evaluation fails" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 476e 0xc0046a1bb0 gate 1563590456705230500 evaluation fails" -"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 476f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4770 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4771 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4772 0xc0046ae3f0 gate 1563590456705481100 evaluation starts" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4773 0xc0046ae3f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4774 0xc0046ae3f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4775 0xc0046ae3f0 principal matched by identity 0" -"2019-07-20 02:40:56.705 UTC [msp.identity] Verify -> DEBU 4776 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:40:56.705 UTC [msp.identity] Verify -> DEBU 4777 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:40:56.709 UTC [cauthdsl] func2 -> DEBU 4778 0xc0046ae3f0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:56.709 UTC [cauthdsl] func1 -> DEBU 4779 0xc0046ae3f0 gate 1563590456705481100 evaluation succeeds" -"2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:56.709 UTC [gossip.gossip] handleMessage -> DEBU 477e Exiting" -"2019-07-20 02:40:56.709 UTC [gossip.gossip] handleMessage -> DEBU 477f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4780 Obtaining identity" -"2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4781 Obtaining identity" -"2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4782 Obtaining identity" -"2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4783 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4784 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4785 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4786 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4787 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4788 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:56.710 UTC [cauthdsl] func1 -> DEBU 4789 0xc0046aff00 gate 1563590456710676900 evaluation starts" -"2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478a 0xc0046aff00 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478b 0xc0046aff00 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478c 0xc0046aff00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478d 0xc0046aff00 principal evaluation fails" -"2019-07-20 02:40:56.710 UTC [cauthdsl] func1 -> DEBU 478e 0xc0046aff00 gate 1563590456710676900 evaluation fails" -"2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 478f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4790 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4791 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 4792 0xc0046ce740 gate 1563590456711223700 evaluation starts" -"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4793 0xc0046ce740 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4794 0xc0046ce740 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4795 0xc0046ce740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4796 0xc0046ce740 principal evaluation fails" -"2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 4797 0xc0046ce740 gate 1563590456711223700 evaluation fails" -"2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4798 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4799 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 479a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 479b 0xc0046cef80 gate 1563590456711529900 evaluation starts" -"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479c 0xc0046cef80 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479d 0xc0046cef80 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479e 0xc0046cef80 principal matched by identity 0" -"2019-07-20 02:40:56.711 UTC [msp.identity] Verify -> DEBU 479f Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:40:56.711 UTC [msp.identity] Verify -> DEBU 47a0 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:40:56.713 UTC [cauthdsl] func2 -> DEBU 47a1 0xc0046cef80 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:56.713 UTC [cauthdsl] func1 -> DEBU 47a2 0xc0046cef80 gate 1563590456711529900 evaluation succeeds" -"2019-07-20 02:40:56.715 UTC [policies] Evaluate -> DEBU 47a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.715 UTC [policies] Evaluate -> DEBU 47a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.723 UTC [policies] Evaluate -> DEBU 47a5 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:56.723 UTC [policies] Evaluate -> DEBU 47a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:56.726 UTC [msp.identity] Verify -> DEBU 47a7 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -"2019-07-20 02:40:56.727 UTC [msp.identity] Verify -> DEBU 47a8 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -00000040 04 ec df 98 3f 3b |....?;|" -"2019-07-20 02:40:56.730 UTC [msp.identity] Verify -> DEBU 47a9 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:40:56.730 UTC [msp.identity] Verify -> DEBU 47aa Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:40:56.730 UTC [msp] DeserializeIdentity -> DEBU 47ab Obtaining identity" -"2019-07-20 02:40:56.730 UTC [msp] DeserializeIdentity -> DEBU 47ac Obtaining identity" -"2019-07-20 02:40:56.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47ad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:56.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47ae Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47af Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47b3 0xc0046df590 gate 1563590456731249300 evaluation starts" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b4 0xc0046df590 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b5 0xc0046df590 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b6 0xc0046df590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b7 0xc0046df590 principal evaluation fails" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47b8 0xc0046df590 gate 1563590456731249300 evaluation fails" -"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47bc 0xc0046dfdd0 gate 1563590456731619200 evaluation starts" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47bd 0xc0046dfdd0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47be 0xc0046dfdd0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47bf 0xc0046dfdd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47c0 0xc0046dfdd0 principal evaluation fails" -"2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47c1 0xc0046dfdd0 gate 1563590456731619200 evaluation fails" -"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:56.732 UTC [cauthdsl] func1 -> DEBU 47c5 0xc0046f2610 gate 1563590456732071400 evaluation starts" -"2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c6 0xc0046f2610 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c7 0xc0046f2610 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c8 0xc0046f2610 principal matched by identity 0" -"2019-07-20 02:40:56.732 UTC [msp.identity] Verify -> DEBU 47c9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:40:56.732 UTC [msp.identity] Verify -> DEBU 47ca Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47cb 0xc0046f2610 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:56.732 UTC [cauthdsl] func1 -> DEBU 47cc 0xc0046f2610 gate 1563590456732071400 evaluation succeeds" -"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47cf Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:56.732 UTC [gossip.gossip] handleMessage -> DEBU 47d1 Exiting" -"2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d2 Obtaining identity" -"2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d3 Obtaining identity" -"2019-07-20 02:40:56.760 UTC [gossip.pull] Hello -> DEBU 47d4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d5 Obtaining identity" -"2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d6 Obtaining identity" -"2019-07-20 02:40:56.760 UTC [gossip.comm] Send -> DEBU 47d7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:56.760 UTC [gossip.comm] sendToEndpoint -> DEBU 47d8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.760 UTC [gossip.comm] sendToEndpoint -> DEBU 47d9 Exiting" -"2019-07-20 02:40:56.761 UTC [gossip.gossip] handleMessage -> DEBU 47da Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.761 UTC [gossip.pull] HandleMessage -> DEBU 47db GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.761 UTC [gossip.gossip] handleMessage -> DEBU 47dc Exiting" -"2019-07-20 02:40:56.843 UTC [gossip.gossip] handleMessage -> DEBU 47dd Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.843 UTC [msp] DeserializeIdentity -> DEBU 47de Obtaining identity" -"2019-07-20 02:40:56.843 UTC [msp] DeserializeIdentity -> DEBU 47df Obtaining identity" -"2019-07-20 02:40:56.843 UTC [gossip.gossip] handleMessage -> DEBU 47e0 Exiting" -"2019-07-20 02:40:56.904 UTC [gossip.gossip] handleMessage -> DEBU 47e1 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.904 UTC [gossip.pull] HandleMessage -> DEBU 47e2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" -"2019-07-20 02:40:56.905 UTC [gossip.pull] SendDigest -> DEBU 47e3 Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:40:56.905 UTC [gossip.gossip] handleMessage -> DEBU 47e4 Exiting" -"2019-07-20 02:40:56.981 UTC [gossip.election] waitForInterrupt -> DEBU 47e5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" -"2019-07-20 02:40:56.981 UTC [gossip.election] IsLeader -> DEBU 47e6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" -"2019-07-20 02:40:56.981 UTC [msp] GetDefaultSigningIdentity -> DEBU 47e7 Obtaining default signing identity" -"2019-07-20 02:40:56.981 UTC [msp.identity] Sign -> DEBU 47e8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510101801 " -"2019-07-20 02:40:56.981 UTC [msp.identity] Sign -> DEBU 47e9 Sign: digest: 06C4339B219403DF3CB6A5301108973FE10B0835912113BBA8296AE34A98D8D2 " -"2019-07-20 02:40:56.981 UTC [gossip.election] waitForInterrupt -> DEBU 47ea c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" -"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47eb Obtaining identity" -"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ec Obtaining identity" -"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ed Obtaining identity" -"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ee Obtaining identity" -"2019-07-20 02:40:56.989 UTC [gossip.comm] Send -> DEBU 47ef Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47f0 Obtaining identity" -"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47f1 Obtaining identity" -"2019-07-20 02:40:56.989 UTC [gossip.comm] sendToEndpoint -> DEBU 47f2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.989 UTC [gossip.comm] sendToEndpoint -> DEBU 47f3 Exiting" -"2019-07-20 02:40:56.991 UTC [gossip.comm] func1 -> DEBU 47f4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.991 UTC [gossip.gossip] handleMessage -> DEBU 47f5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.991 UTC [gossip.gossip] handleMessage -> DEBU 47f6 Exiting" -"2019-07-20 02:40:56.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.991 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47f8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:56.991 UTC [msp] DeserializeIdentity -> DEBU 47f9 Obtaining identity" -"2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47fb Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47fc Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4800 0xc00472cd70 gate 1563590456991667300 evaluation starts" -"2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4801 0xc00472cd70 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4802 0xc00472cd70 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4803 0xc00472cd70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4804 0xc00472cd70 principal evaluation fails" -"2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4805 0xc00472cd70 gate 1563590456991667300 evaluation fails" -"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4806 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4807 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4808 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4809 0xc00472d5b0 gate 1563590456991920000 evaluation starts" -"2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 480a 0xc00472d5b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480b 0xc00472d5b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480c 0xc00472d5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480d 0xc00472d5b0 principal evaluation fails" -"2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 480e 0xc00472d5b0 gate 1563590456991920000 evaluation fails" -"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 480f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 4810 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 4811 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 4812 0xc00472ddf0 gate 1563590456992222000 evaluation starts" -"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4813 0xc00472ddf0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4814 0xc00472ddf0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4815 0xc00472ddf0 principal matched by identity 0" -"2019-07-20 02:40:56.992 UTC [msp.identity] Verify -> DEBU 4816 Verify: digest = 00000000 24 c2 3a 95 db af e0 b6 1a 56 e0 d9 cb e0 f4 e9 |$.:......V......| -00000010 d8 5d bc 2a b8 63 83 cd f7 6d 37 bd 16 5a ce e6 |.].*.c...m7..Z..|" -"2019-07-20 02:40:56.992 UTC [msp.identity] Verify -> DEBU 4817 Verify: sig = 00000000 30 45 02 21 00 9f 2c 9a 33 cd 0c 2d d4 a0 d5 3f |0E.!..,.3..-...?| -00000010 bd 17 1a e4 90 6c 53 57 eb 17 0f 56 6a 55 09 7d |.....lSW...VjU.}| -00000020 80 a3 61 17 c7 02 20 37 51 77 a5 ff 73 35 7a b2 |..a... 7Qw..s5z.| -00000030 68 c7 98 54 cd d1 2b 90 81 54 fb 85 98 87 a5 f2 |h..T..+..T......| -00000040 cd bb fa 10 81 05 77 |......w|" -"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4818 0xc00472ddf0 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 4819 0xc00472ddf0 gate 1563590456992222000 evaluation succeeds" -"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:56.992 UTC [gossip.discovery] handleAliveMessage -> DEBU 481e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 481f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4820 updating membership: timestamp: " -"2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4821 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4822 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4823 Exiting" -"2019-07-20 02:40:56.992 UTC [gossip.discovery] handleAliveMessage -> DEBU 4824 Exiting" -"2019-07-20 02:40:56.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4825 Exiting" -"2019-07-20 02:40:56.993 UTC [gossip.comm] func1 -> DEBU 4826 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.993 UTC [gossip.gossip] handleMessage -> DEBU 4827 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.993 UTC [gossip.gossip] handleMessage -> DEBU 4828 Exiting" -"2019-07-20 02:40:56.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4829 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482a Exiting" -"2019-07-20 02:40:56.996 UTC [gossip.gossip] handleMessage -> DEBU 482b Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.996 UTC [gossip.gossip] handleMessage -> DEBU 482c Exiting" -"2019-07-20 02:40:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482e Exiting" -"2019-07-20 02:40:57.005 UTC [msp] DeserializeIdentity -> DEBU 482f Obtaining identity" -"2019-07-20 02:40:57.005 UTC [msp] DeserializeIdentity -> DEBU 4830 Obtaining identity" -"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4831 Obtaining identity" -"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4832 Obtaining identity" -"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4833 Obtaining identity" -"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4834 Obtaining identity" -"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4835 Obtaining identity" -"2019-07-20 02:40:57.006 UTC [gossip.comm] Send -> DEBU 4836 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4837 Obtaining identity" -"2019-07-20 02:40:57.006 UTC [gossip.comm] Send -> DEBU 4838 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:57.006 UTC [gossip.comm] sendToEndpoint -> DEBU 4839 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.006 UTC [gossip.comm] sendToEndpoint -> DEBU 483a Exiting" -"2019-07-20 02:40:57.007 UTC [gossip.comm] sendToEndpoint -> DEBU 483b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.007 UTC [gossip.comm] sendToEndpoint -> DEBU 483c Exiting" -"2019-07-20 02:40:57.007 UTC [gossip.comm] func1 -> DEBU 483d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:57.007 UTC [gossip.gossip] handleMessage -> DEBU 483e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:57.007 UTC [msp] DeserializeIdentity -> DEBU 483f Obtaining identity" -"2019-07-20 02:40:57.008 UTC [msp] DeserializeIdentity -> DEBU 4840 Obtaining identity" -"2019-07-20 02:40:57.008 UTC [msp] DeserializeIdentity -> DEBU 4841 Obtaining identity" -"2019-07-20 02:40:57.008 UTC [gossip.gossip] handleMessage -> DEBU 4842 Exiting" -"2019-07-20 02:40:57.148 UTC [gossip.comm] func1 -> DEBU 4843 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:57.148 UTC [gossip.gossip] handleMessage -> DEBU 4844 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:40:57.148 UTC [msp] DeserializeIdentity -> DEBU 4845 Obtaining identity" -"2019-07-20 02:40:57.148 UTC [msp] DeserializeIdentity -> DEBU 4846 Obtaining identity" -"2019-07-20 02:40:57.149 UTC [msp] DeserializeIdentity -> DEBU 4847 Obtaining identity" -"2019-07-20 02:40:57.149 UTC [gossip.gossip] handleMessage -> DEBU 4848 Exiting" -"2019-07-20 02:40:57.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 4849 Obtaining default signing identity" -"2019-07-20 02:40:57.295 UTC [msp.identity] Sign -> DEBU 484a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151035 " -"2019-07-20 02:40:57.295 UTC [msp.identity] Sign -> DEBU 484b Sign: digest: 1E2D2864C190B8E158F6625B3CCF586244BD30D9DA5BCDDC88828153AA686637 " -"2019-07-20 02:40:57.296 UTC [msp] GetDefaultSigningIdentity -> DEBU 484c Obtaining default signing identity" -"2019-07-20 02:40:57.296 UTC [msp.identity] Sign -> DEBU 484d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:40:57.296 UTC [msp.identity] Sign -> DEBU 484e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:40:57.296 UTC [gossip.discovery] periodicalSendAlive -> DEBU 484f Sleeping 5s" -"2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4850 Obtaining identity" -"2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4851 Obtaining identity" -"2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4852 Obtaining identity" -"2019-07-20 02:40:57.298 UTC [gossip.comm] Send -> DEBU 4853 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:57.299 UTC [gossip.comm] Send -> DEBU 4854 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:57.299 UTC [msp] DeserializeIdentity -> DEBU 4855 Obtaining identity" -"2019-07-20 02:40:57.299 UTC [gossip.comm] Send -> DEBU 4856 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4857 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4858 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4859 Exiting" -"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485a Exiting" -"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485c Exiting" -"2019-07-20 02:40:57.340 UTC [gossip.gossip] handleMessage -> DEBU 485d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.341 UTC [gossip.gossip] handleMessage -> DEBU 485e Exiting" -"2019-07-20 02:40:57.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 485f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4860 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:40:57.341 UTC [msp.identity] Verify -> DEBU 4861 Verify: digest = 00000000 c3 88 5c 67 b0 0f 5e a2 52 b8 70 38 4f b8 a6 3f |..\g..^.R.p8O..?| -00000010 1c f1 17 3b e4 ce 70 11 db 63 69 c2 e6 f3 fd 92 |...;..p..ci.....|" -"2019-07-20 02:40:57.341 UTC [msp.identity] Verify -> DEBU 4862 Verify: sig = 00000000 30 44 02 20 23 3b 13 fe 9d 99 21 bc 0c 23 34 17 |0D. #;....!..#4.| -00000010 28 43 4c ac c7 86 67 da 5d 8d 0e df 86 63 45 39 |(CL...g.]....cE9| -00000020 a2 0c f1 62 02 20 14 37 bb cd c4 a6 e3 db c2 fb |...b. .7........| -00000030 83 74 aa 46 79 ea 11 39 8c 26 f0 ae 92 61 7a 50 |.t.Fy..9.&...azP| -00000040 90 9b 5c 1c e4 cf |..\...|" -"2019-07-20 02:40:57.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 4863 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4864 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4865 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4866 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4867 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4868 Exiting" -"2019-07-20 02:40:57.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 4869 Exiting" -"2019-07-20 02:40:57.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 486a Exiting" -"2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486b Obtaining identity" -"2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486c Obtaining identity" -"2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486d Obtaining identity" -"2019-07-20 02:40:57.342 UTC [gossip.comm] Send -> DEBU 486e Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486f Obtaining identity" -"2019-07-20 02:40:57.342 UTC [gossip.comm] Send -> DEBU 4870 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" -"2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4871 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4872 Exiting" -"2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4873 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4874 Exiting" -"2019-07-20 02:40:57.344 UTC [gossip.comm] func1 -> DEBU 4875 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.344 UTC [gossip.gossip] handleMessage -> DEBU 4876 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.344 UTC [gossip.gossip] handleMessage -> DEBU 4877 Exiting" -"2019-07-20 02:40:57.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4878 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4879 Exiting" -"2019-07-20 02:40:57.351 UTC [gossip.comm] func1 -> DEBU 487a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.351 UTC [gossip.gossip] handleMessage -> DEBU 487b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.351 UTC [gossip.gossip] handleMessage -> DEBU 487c Exiting" -"2019-07-20 02:40:57.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:40:57.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487e Exiting" -"2019-07-20 02:40:57.531 UTC [gossip.comm] func1 -> DEBU 487f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.531 UTC [gossip.gossip] handleMessage -> DEBU 4880 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.531 UTC [gossip.gossip] handleMessage -> DEBU 4881 Exiting" -"2019-07-20 02:40:57.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4882 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.531 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4883 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:40:57.531 UTC [msp] DeserializeIdentity -> DEBU 4884 Obtaining identity" -"2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4885 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4886 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4887 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 4888 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 4889 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 488a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:57.531 UTC [cauthdsl] func1 -> DEBU 488b 0xc0047a8300 gate 1563590457531851900 evaluation starts" -"2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488c 0xc0047a8300 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488d 0xc0047a8300 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488e 0xc0047a8300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 488f 0xc0047a8300 principal evaluation fails" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4890 0xc0047a8300 gate 1563590457531851900 evaluation fails" -"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4891 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4892 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4893 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4894 0xc0047a8b40 gate 1563590457532213900 evaluation starts" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4895 0xc0047a8b40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4896 0xc0047a8b40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4897 0xc0047a8b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4898 0xc0047a8b40 principal evaluation fails" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4899 0xc0047a8b40 gate 1563590457532213900 evaluation fails" -"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 489d 0xc0047a9380 gate 1563590457532574200 evaluation starts" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 489e 0xc0047a9380 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 489f 0xc0047a9380 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 48a0 0xc0047a9380 principal matched by identity 0" -"2019-07-20 02:40:57.532 UTC [msp.identity] Verify -> DEBU 48a1 Verify: digest = 00000000 89 c9 04 02 9b 9c e1 a8 91 bf b0 ae 1d b1 4c a7 |..............L.| -00000010 b7 fd 2f 57 37 90 00 08 24 ef 7e 37 1d 53 21 e4 |../W7...$.~7.S!.|" -"2019-07-20 02:40:57.532 UTC [msp.identity] Verify -> DEBU 48a2 Verify: sig = 00000000 30 45 02 21 00 86 03 13 83 09 3d 22 96 40 5c 07 |0E.!......=".@\.| -00000010 cc fd a6 78 83 0e d3 6e 4f 96 fc cb ae 90 52 9b |...x...nO.....R.| -00000020 09 c5 70 0c 88 02 20 21 f0 da 32 e3 1b 9b e1 ed |..p... !..2.....| -00000030 72 5c 8d 98 c8 4d e5 c3 2b 1f d7 c1 cc 62 e5 7c |r\...M..+....b.|| -00000040 e2 18 3a 40 39 24 2d |..:@9$-|" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 48a3 0xc0047a9380 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 48a4 0xc0047a9380 gate 1563590457532574200 evaluation succeeds" -"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 48a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a7 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:57.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48aa Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ab updating membership: timestamp: " -"2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ac Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ad Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ae Exiting" -"2019-07-20 02:40:57.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 48af Exiting" -"2019-07-20 02:40:57.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b0 Exiting" -"2019-07-20 02:40:57.539 UTC [gossip.comm] func1 -> DEBU 48b1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b3 Exiting" -"2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b5 Exiting" -"2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b6 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b7 Exiting" -"2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b9 Exiting" -"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48ba Obtaining identity" -"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bb Obtaining identity" -"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bc Obtaining identity" -"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bd Obtaining identity" -"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48be Obtaining identity" -"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bf Obtaining identity" -"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48c0 Obtaining identity" -"2019-07-20 02:40:57.540 UTC [gossip.comm] Send -> DEBU 48c1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48c2 Obtaining identity" -"2019-07-20 02:40:57.540 UTC [gossip.comm] Send -> DEBU 48c3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" -"2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c5 Exiting" -"2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c7 Exiting" -"2019-07-20 02:40:59.496 UTC [endorser] ProcessProposal -> DEBU 48c8 Entering: request from 172.18.0.9:58510" -"2019-07-20 02:40:59.496 UTC [protoutils] ValidateProposalMessage -> DEBU 48c9 ValidateProposalMessage starts for signed proposal 0xc0047f0050" -"2019-07-20 02:40:59.497 UTC [protoutils] validateChannelHeader -> DEBU 48ca validateChannelHeader info: header type 3" -"2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cb begin" -"2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cc creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cd creator is valid" -"2019-07-20 02:40:59.497 UTC [msp.identity] Verify -> DEBU 48ce Verify: digest = 00000000 1d 45 9b 93 2d f4 42 d9 52 ca e9 c8 9e 51 27 36 |.E..-.B.R....Q'6| -00000010 cd f7 d8 94 97 25 64 91 6f 72 f7 c9 d6 ae 5f 3e |.....%d.or...._>|" -"2019-07-20 02:40:59.497 UTC [msp.identity] Verify -> DEBU 48cf Verify: sig = 00000000 30 44 02 20 66 25 c2 bc 03 5b ff 4f 00 30 71 1e |0D. f%...[.O.0q.| -00000010 c2 eb 94 fc 77 b4 95 bb 5c 93 ac c2 53 1f 52 56 |....w...\...S.RV| -00000020 b2 17 a1 61 02 20 7d bc 19 2d 75 66 3c 06 ba 93 |...a. }..-uf<...| -00000030 a0 cc 2e b8 39 5f 5b 16 cc 4b 12 e8 be a0 a9 26 |....9_[..K.....&| -00000040 29 90 0c e3 52 6f |)...Ro|" -"2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48d0 exits successfully" -"2019-07-20 02:40:59.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 48d1 validateChaincodeProposalMessage starts for proposal 0xc0033408c0, header 0xc0047f0460" -"2019-07-20 02:40:59.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 48d2 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " -"2019-07-20 02:40:59.498 UTC [endorser] preProcess -> DEBU 48d3 [][01686455] processing txid: 0168645584149d7d35248ee1e1fa711483c01ad64ac198ad4f760d6114fd0cf9" -"2019-07-20 02:40:59.498 UTC [endorser] SimulateProposal -> DEBU 48d4 [][01686455] Entry chaincode: name:"cscc" " -"2019-07-20 02:40:59.498 UTC [endorser] callChaincode -> INFO 48d5 [][01686455] Entry chaincode: name:"cscc" " -"2019-07-20 02:40:59.498 UTC [chaincode] Execute -> DEBU 48d6 Entry" -"2019-07-20 02:40:59.498 UTC [cscc] Invoke -> DEBU 48d7 Invoke function: GetChannels" -"2019-07-20 02:40:59.498 UTC [msp.identity] Verify -> DEBU 48d8 Verify: digest = 00000000 1d 45 9b 93 2d f4 42 d9 52 ca e9 c8 9e 51 27 36 |.E..-.B.R....Q'6| -00000010 cd f7 d8 94 97 25 64 91 6f 72 f7 c9 d6 ae 5f 3e |.....%d.or...._>|" -"2019-07-20 02:40:59.499 UTC [msp.identity] Verify -> DEBU 48d9 Verify: sig = 00000000 30 44 02 20 66 25 c2 bc 03 5b ff 4f 00 30 71 1e |0D. f%...[.O.0q.| -00000010 c2 eb 94 fc 77 b4 95 bb 5c 93 ac c2 53 1f 52 56 |....w...\...S.RV| -00000020 b2 17 a1 61 02 20 7d bc 19 2d 75 66 3c 06 ba 93 |...a. }..-uf<...| -00000030 a0 cc 2e b8 39 5f 5b 16 cc 4b 12 e8 be a0 a9 26 |....9_[..K.....&| -00000040 29 90 0c e3 52 6f |)...Ro|" -"2019-07-20 02:40:59.499 UTC [chaincode] handleMessage -> DEBU 48da [01686455] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:40:59.500 UTC [chaincode] Notify -> DEBU 48db [01686455] notifying Txid:0168645584149d7d35248ee1e1fa711483c01ad64ac198ad4f760d6114fd0cf9, channelID:" -"2019-07-20 02:40:59.500 UTC [chaincode] Execute -> DEBU 48dc Exit" -"2019-07-20 02:40:59.500 UTC [endorser] callChaincode -> INFO 48dd [][01686455] Exit chaincode: name:"cscc" (2ms)" -"2019-07-20 02:40:59.500 UTC [endorser] SimulateProposal -> DEBU 48de [][01686455] Exit" -"2019-07-20 02:40:59.501 UTC [endorser] func1 -> DEBU 48df Exit: request from 172.18.0.9:58510" -"2019-07-20 02:40:59.501 UTC [comm.grpc.server] 1 -> INFO 48e0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58510 grpc.code=OK grpc.call_duration=5.3749ms -"2019-07-20 02:40:59.508 UTC [grpc] warningf -> DEBU 48e1 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58510: read: connection reset by peer" -"2019-07-20 02:40:59.509 UTC [grpc] infof -> DEBU 48e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:40:59.944 UTC [gossip.comm] func1 -> DEBU 48e3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:59.945 UTC [gossip.gossip] handleMessage -> DEBU 48e4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:59.945 UTC [gossip.gossip] handleMessage -> DEBU 48e5 Exiting" -"2019-07-20 02:40:59.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48e6 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" -"2019-07-20 02:40:59.945 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48e7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:40:59.945 UTC [msp] DeserializeIdentity -> DEBU 48e8 Obtaining identity" -"2019-07-20 02:40:59.946 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48e9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:40:59.946 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48ea Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:59.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48eb Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:40:59.947 UTC [policies] Evaluate -> DEBU 48ec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:40:59.947 UTC [policies] Evaluate -> DEBU 48ed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:40:59.948 UTC [policies] Evaluate -> DEBU 48ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:40:59.948 UTC [cauthdsl] func1 -> DEBU 48ef 0xc00480cab0 gate 1563590459948105600 evaluation starts" -"2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f0 0xc00480cab0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f1 0xc00480cab0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f2 0xc00480cab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f3 0xc00480cab0 principal evaluation fails" -"2019-07-20 02:40:59.949 UTC [cauthdsl] func1 -> DEBU 48f4 0xc00480cab0 gate 1563590459948105600 evaluation fails" -"2019-07-20 02:40:59.949 UTC [policies] Evaluate -> DEBU 48f5 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:59.949 UTC [policies] Evaluate -> DEBU 48f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:40:59.950 UTC [policies] Evaluate -> DEBU 48f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:40:59.950 UTC [cauthdsl] func1 -> DEBU 48f8 0xc00480d2f0 gate 1563590459950225200 evaluation starts" -"2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48f9 0xc00480d2f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48fa 0xc00480d2f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48fb 0xc00480d2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:40:59.951 UTC [cauthdsl] func2 -> DEBU 48fc 0xc00480d2f0 principal evaluation fails" -"2019-07-20 02:40:59.951 UTC [cauthdsl] func1 -> DEBU 48fd 0xc00480d2f0 gate 1563590459950225200 evaluation fails" -"2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 48fe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 48ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 4900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:40:59.952 UTC [cauthdsl] func1 -> DEBU 4901 0xc00480db30 gate 1563590459952843400 evaluation starts" -"2019-07-20 02:40:59.952 UTC [cauthdsl] func2 -> DEBU 4902 0xc00480db30 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:40:59.953 UTC [cauthdsl] func2 -> DEBU 4903 0xc00480db30 processing identity 0 with bytes of 114b950" -"2019-07-20 02:40:59.953 UTC [cauthdsl] func2 -> DEBU 4904 0xc00480db30 principal matched by identity 0" -"2019-07-20 02:40:59.953 UTC [msp.identity] Verify -> DEBU 4905 Verify: digest = 00000000 28 db d2 b9 19 9f d2 cc b1 64 01 a7 ae 30 da 0d |(........d...0..| -00000010 dc 14 c1 d3 3b 3e a7 c7 ba db 5d 59 ac 03 a5 7a |....;>....]Y...z|" -"2019-07-20 02:40:59.955 UTC [msp.identity] Verify -> DEBU 4906 Verify: sig = 00000000 30 45 02 21 00 fa 62 e3 aa a8 f9 4f 17 a3 b4 bb |0E.!..b....O....| -00000010 35 04 41 6c fc 6e c1 e6 4a 0b c5 4a a8 db e6 39 |5.Al.n..J..J...9| -00000020 20 b7 db 0a c7 02 20 24 0d af 40 40 54 ee 1f 82 | ..... $..@@T...| -00000030 ce c3 f1 b3 4a 8d 48 6e d9 56 43 68 20 4f d2 ca |....J.Hn.VCh O..| -00000040 6a 9a bd 38 f0 c1 06 |j..8...|" -"2019-07-20 02:40:59.956 UTC [cauthdsl] func2 -> DEBU 4907 0xc00480db30 principal evaluation succeeds for identity 0" -"2019-07-20 02:40:59.956 UTC [cauthdsl] func1 -> DEBU 4908 0xc00480db30 gate 1563590459952843400 evaluation succeeds" -"2019-07-20 02:40:59.956 UTC [policies] Evaluate -> DEBU 4909 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:59.956 UTC [policies] Evaluate -> DEBU 490a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:40:59.957 UTC [policies] Evaluate -> DEBU 490b Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:40:59.957 UTC [policies] Evaluate -> DEBU 490c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:40:59.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 490d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:40:59.958 UTC [gossip.discovery] learnExistingMembers -> DEBU 490e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" -"2019-07-20 02:40:59.959 UTC [gossip.comm] func1 -> DEBU 490f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4910 updating membership: timestamp: " -"2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4912 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4913 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4914 Exiting" -"2019-07-20 02:40:59.960 UTC [gossip.gossip] handleMessage -> DEBU 4911 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:59.961 UTC [gossip.pull] HandleMessage -> DEBU 4915 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:40:59.960 UTC [gossip.discovery] handleAliveMessage -> DEBU 4916 Exiting" -"2019-07-20 02:40:59.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4918 Exiting" -"2019-07-20 02:40:59.961 UTC [msp] DeserializeIdentity -> DEBU 4917 Obtaining identity" -"2019-07-20 02:40:59.964 UTC [gossip.discovery] sendMemResponse -> DEBU 4919 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " -"2019-07-20 02:40:59.967 UTC [msp] DeserializeIdentity -> DEBU 491a Obtaining identity" -"2019-07-20 02:40:59.968 UTC [msp] DeserializeIdentity -> DEBU 491b Obtaining identity" -"2019-07-20 02:40:59.968 UTC [msp] DeserializeIdentity -> DEBU 491c Obtaining identity" -"2019-07-20 02:40:59.969 UTC [gossip.comm] Send -> DEBU 491d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:40:59.969 UTC [gossip.discovery] sendMemResponse -> DEBU 491e Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020<" signature:"0D\002 #;\023\376\235\231!\274\014#4\027(CL\254\307\206g\332]\215\016\337\206cE9\242\014\361b\002 \0247\273\315\304\246\343\333\302\373\203t\252Fy\352\0219\214&\360\256\222azP\220\233\\\034\344\317" > alive: alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " -"2019-07-20 02:40:59.969 UTC [gossip.comm] sendToEndpoint -> DEBU 491f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:40:59.969 UTC [gossip.comm] sendToEndpoint -> DEBU 4920 Exiting" -"2019-07-20 02:40:59.966 UTC [msp] DeserializeIdentity -> DEBU 4921 Obtaining identity" -"2019-07-20 02:40:59.980 UTC [msp] DeserializeIdentity -> DEBU 4922 Obtaining identity" -"2019-07-20 02:40:59.980 UTC [msp] DeserializeIdentity -> DEBU 4923 Obtaining identity" -"2019-07-20 02:40:59.981 UTC [msp] DeserializeIdentity -> DEBU 4924 Obtaining identity" -"2019-07-20 02:40:59.981 UTC [msp] DeserializeIdentity -> DEBU 4925 Obtaining identity" -"2019-07-20 02:40:59.981 UTC [gossip.pull] SendDigest -> DEBU 4926 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" -"2019-07-20 02:40:59.982 UTC [gossip.gossip] handleMessage -> DEBU 4927 Exiting" -"2019-07-20 02:41:00.245 UTC [gossip.pull] Hello -> DEBU 4928 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 4929 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:41:00.246 UTC [gossip.pull] Hello -> DEBU 492a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" -"2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 492b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:41:00.246 UTC [gossip.pull] Hello -> DEBU 492c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" -"2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 492d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 492e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 492f Exiting" -"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4930 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4931 Exiting" -"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4932 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4933 Exiting" -"2019-07-20 02:41:00.255 UTC [gossip.comm] func1 -> DEBU 4934 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.255 UTC [gossip.gossip] handleMessage -> DEBU 4935 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.255 UTC [gossip.pull] HandleMessage -> DEBU 4936 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.255 UTC [gossip.gossip] handleMessage -> DEBU 4937 Exiting" -"2019-07-20 02:41:00.258 UTC [gossip.gossip] handleMessage -> DEBU 4938 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.258 UTC [gossip.pull] HandleMessage -> DEBU 4939 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.258 UTC [gossip.gossip] handleMessage -> DEBU 493a Exiting" -"2019-07-20 02:41:00.259 UTC [gossip.comm] func1 -> DEBU 493b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.262 UTC [gossip.gossip] handleMessage -> DEBU 493c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.263 UTC [gossip.pull] HandleMessage -> DEBU 493d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.263 UTC [gossip.gossip] handleMessage -> DEBU 493e Exiting" -"2019-07-20 02:41:00.283 UTC [msp] GetDefaultSigningIdentity -> DEBU 493f Obtaining default signing identity" -"2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4940 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151036 " -"2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4941 Sign: digest: C2615889418FFCA163D06A93ADDC2E02FFD4AC5E6620C5DE7FC1307F4AC429DB " -"2019-07-20 02:41:00.283 UTC [msp] GetDefaultSigningIdentity -> DEBU 4942 Obtaining default signing identity" -"2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4943 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " -"2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4944 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " -"2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4945 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:41:00.284 UTC [msp] DeserializeIdentity -> DEBU 4946 Obtaining identity" -"2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4947 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:41:00.284 UTC [msp] DeserializeIdentity -> DEBU 4948 Obtaining identity" -"2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4949 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494b Exiting" -"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494d Exiting" -"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494f Exiting" -"2019-07-20 02:41:00.292 UTC [gossip.comm] func1 -> DEBU 4950 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.292 UTC [gossip.gossip] handleMessage -> DEBU 4951 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.292 UTC [gossip.gossip] handleMessage -> DEBU 4952 Exiting" -"2019-07-20 02:41:00.292 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4953 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.292 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4954 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:41:00.292 UTC [msp.identity] Verify -> DEBU 4955 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| -00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" -"2019-07-20 02:41:00.292 UTC [msp.identity] Verify -> DEBU 4956 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| -00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| -00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| -00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| -00000040 b0 e0 30 43 5c f1 |..0C\.|" -"2019-07-20 02:41:00.292 UTC [gossip.discovery] handleAliveMessage -> DEBU 4957 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:41:00.292 UTC [gossip.discovery] isSentByMe -> DEBU 4958 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:41:00.292 UTC [gossip.discovery] handleAliveMessage -> DEBU 4959 Exiting" -"2019-07-20 02:41:00.292 UTC [gossip.discovery] handleMsgFromComm -> DEBU 495a Exiting" -"2019-07-20 02:41:00.293 UTC [gossip.comm] func1 -> DEBU 495b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 495c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 495d Exiting" -"2019-07-20 02:41:00.293 UTC [gossip.discovery] handleMsgFromComm -> DEBU 495e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.293 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 495f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:41:00.293 UTC [msp.identity] Verify -> DEBU 4960 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| -00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" -"2019-07-20 02:41:00.293 UTC [msp.identity] Verify -> DEBU 4961 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| -00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| -00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| -00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| -00000040 b0 e0 30 43 5c f1 |..0C\.|" -"2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 4962 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 4963 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:41:00.294 UTC [gossip.discovery] isSentByMe -> DEBU 4964 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:41:00.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 4965 Exiting" -"2019-07-20 02:41:00.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4966 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" -"2019-07-20 02:41:00.294 UTC [msp] DeserializeIdentity -> DEBU 4967 Obtaining identity" -"2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4968 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4969 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 496a Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 496e 0xc004879410 gate 1563590460294665100 evaluation starts" -"2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 496f 0xc004879410 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4970 0xc004879410 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4971 0xc004879410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4972 0xc004879410 principal evaluation fails" -"2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 4973 0xc004879410 gate 1563590460294665100 evaluation fails" -"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4974 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4975 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4976 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 4977 0xc004879c50 gate 1563590460294955900 evaluation starts" -"2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4978 0xc004879c50 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4979 0xc004879c50 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 497a 0xc004879c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 497b 0xc004879c50 principal evaluation fails" -"2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 497c 0xc004879c50 gate 1563590460294955900 evaluation fails" -"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 4980 0xc004890490 gate 1563590460295191000 evaluation starts" -"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4981 0xc004890490 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4982 0xc004890490 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4983 0xc004890490 principal matched by identity 0" -"2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4984 Verify: digest = 00000000 28 db d2 b9 19 9f d2 cc b1 64 01 a7 ae 30 da 0d |(........d...0..| -00000010 dc 14 c1 d3 3b 3e a7 c7 ba db 5d 59 ac 03 a5 7a |....;>....]Y...z|" -"2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4985 Verify: sig = 00000000 30 45 02 21 00 fa 62 e3 aa a8 f9 4f 17 a3 b4 bb |0E.!..b....O....| -00000010 35 04 41 6c fc 6e c1 e6 4a 0b c5 4a a8 db e6 39 |5.Al.n..J..J...9| -00000020 20 b7 db 0a c7 02 20 24 0d af 40 40 54 ee 1f 82 | ..... $..@@T...| -00000030 ce c3 f1 b3 4a 8d 48 6e d9 56 43 68 20 4f d2 ca |....J.Hn.VCh O..| -00000040 6a 9a bd 38 f0 c1 06 |j..8...|" -"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4986 0xc004890490 principal evaluation succeeds for identity 0" -"2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 4987 0xc004890490 gate 1563590460295191000 evaluation succeeds" -"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 4988 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 4989 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 498a Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 498b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:41:00.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 498c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" -"2019-07-20 02:41:00.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 498d Exiting" -"2019-07-20 02:41:00.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498e Exiting" -"2019-07-20 02:41:00.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.295 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4990 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" -"2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4991 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| -00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" -"2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4992 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| -00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| -00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| -00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| -00000040 b0 e0 30 43 5c f1 |..0C\.|" -"2019-07-20 02:41:00.296 UTC [msp.identity] Verify -> DEBU 4993 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +"2019-09-24 00:27:25.753 UTC [msp.identity] Verify -> DEBU 7142 Verify: sig = 00000000 30 44 02 20 69 5f 4d 68 08 95 d6 81 69 ea b6 38 |0D. i_Mh....i..8| +00000010 9e 09 c2 73 5d 64 74 c4 78 04 9c 9e 87 b8 bb 4b |...s]dt.x......K| +00000020 b2 e2 80 2a 02 20 15 cc 68 2d 90 14 73 a2 a9 f0 |...*. ..h-..s...| +00000030 b9 01 99 0f 3e 4b 8c 4b c3 c9 4f 9a 0e d5 ce 13 |....>K.K..O.....| +00000040 f5 41 4c 43 4a 2a |.ALCJ*|" +"2019-09-24 00:27:25.753 UTC [gossip.discovery] handleAliveMessage -> DEBU 7143 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:25.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 7144 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:27:25.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 7145 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:25.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 7146 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:25.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 7147 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:25.753 UTC [gossip.discovery] learnExistingMembers -> DEBU 7148 Exiting" +"2019-09-24 00:27:25.753 UTC [gossip.discovery] handleAliveMessage -> DEBU 7149 Exiting" +"2019-09-24 00:27:25.753 UTC [gossip.discovery] handleMsgFromComm -> DEBU 714a Exiting" +"2019-09-24 00:27:25.753 UTC [gossip.discovery] sendMemResponse -> DEBU 714b Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:27:25.754 UTC [msp] DeserializeIdentity -> DEBU 714c Obtaining identity" +"2019-09-24 00:27:25.754 UTC [msp] DeserializeIdentity -> DEBU 714d Obtaining identity" +"2019-09-24 00:27:25.754 UTC [gossip.comm] Send -> DEBU 714e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:25.754 UTC [gossip.discovery] sendMemResponse -> DEBU 714f Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020_" signature:"0D\002 _\205)P\310e\327\262\235\240S\253p\232U4=\243\352\302pH\341\017\223\335H\367g,T3\002 o\313C\347\031P;t-'z\216\321\255\033![.\3219\000\276\001\256\022\327A\354\221\316\347y" secret_envelope:K\214K\303\311O\232\016\325\316\023\365ALCJ*" > > alive:\257\"\3775I\247UX\263=\220\317-\252\356\276\362" > " +"2019-09-24 00:27:25.754 UTC [gossip.comm] sendToEndpoint -> DEBU 7150 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 00:27:25.754 UTC [gossip.comm] sendToEndpoint -> DEBU 7151 Exiting" +"2019-09-24 00:27:25.974 UTC [gossip.comm] func1 -> DEBU 7152 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:25.974 UTC [gossip.gossip] handleMessage -> DEBU 7153 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:25.974 UTC [msp] DeserializeIdentity -> DEBU 7154 Obtaining identity" +"2019-09-24 00:27:25.975 UTC [msp] DeserializeIdentity -> DEBU 7155 Obtaining identity" +"2019-09-24 00:27:25.975 UTC [msp] DeserializeIdentity -> DEBU 7156 Obtaining identity" +"2019-09-24 00:27:25.975 UTC [gossip.gossip] handleMessage -> DEBU 7157 Exiting" +"2019-09-24 00:27:27.296 UTC [gossip.election] waitForInterrupt -> DEBU 7158 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-09-24 00:27:27.297 UTC [gossip.election] IsLeader -> DEBU 7159 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-09-24 00:27:27.297 UTC [msp] GetDefaultSigningIdentity -> DEBU 715a Obtaining default signing identity" +"2019-09-24 00:27:27.298 UTC [msp.identity] Sign -> DEBU 715b Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4A5F9D0DE83CEE315101F1801 " +"2019-09-24 00:27:27.298 UTC [msp.identity] Sign -> DEBU 715c Sign: digest: 952945BEBD99AA0CCEC8CDDC4F1DDF495BAEEAC9A44A7363937D85659B86BC43 " +"2019-09-24 00:27:27.299 UTC [gossip.election] waitForInterrupt -> DEBU 715d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-09-24 00:27:27.310 UTC [msp] DeserializeIdentity -> DEBU 715e Obtaining identity" +"2019-09-24 00:27:27.311 UTC [msp] DeserializeIdentity -> DEBU 715f Obtaining identity" +"2019-09-24 00:27:27.311 UTC [msp] DeserializeIdentity -> DEBU 7160 Obtaining identity" +"2019-09-24 00:27:27.312 UTC [msp] DeserializeIdentity -> DEBU 7161 Obtaining identity" +"2019-09-24 00:27:27.312 UTC [gossip.comm] Send -> DEBU 7162 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:27.313 UTC [msp] DeserializeIdentity -> DEBU 7163 Obtaining identity" +"2019-09-24 00:27:27.313 UTC [msp] DeserializeIdentity -> DEBU 7164 Obtaining identity" +"2019-09-24 00:27:27.314 UTC [gossip.comm] sendToEndpoint -> DEBU 7165 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.316 UTC [gossip.comm] sendToEndpoint -> DEBU 7166 Exiting" +"2019-09-24 00:27:27.667 UTC [gossip.comm] func1 -> DEBU 7167 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.668 UTC [gossip.gossip] handleMessage -> DEBU 7168 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.668 UTC [gossip.gossip] handleMessage -> DEBU 7169 Exiting" +"2019-09-24 00:27:27.669 UTC [gossip.discovery] handleMsgFromComm -> DEBU 716a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.669 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 716b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:27.670 UTC [msp.identity] Verify -> DEBU 716c Verify: digest = 00000000 bd c5 4a 88 93 a1 8c 55 58 4d 38 70 ff e5 23 0d |..J....UXM8p..#.| +00000010 0e d3 a4 8f e4 24 3f 22 ed d8 1f 71 09 86 eb 10 |.....$?"...q....|" +"2019-09-24 00:27:27.671 UTC [msp.identity] Verify -> DEBU 716d Verify: sig = 00000000 30 45 02 21 00 c2 a2 90 de bf df de b6 15 37 4b |0E.!..........7K| +00000010 42 0f 02 59 14 ae 14 01 53 74 a1 39 dd 6d 3b 1e |B..Y....St.9.m;.| +00000020 54 6e 7e 24 76 02 20 0b b6 32 6e b1 26 c2 f3 88 |Tn~$v. ..2n.&...| +00000030 53 de 55 3d 07 b2 ae 8e ef 36 c9 22 31 65 b6 80 |S.U=.....6."1e..| +00000040 c6 14 0c 15 7c 5a 4c |....|ZL|" +"2019-09-24 00:27:27.671 UTC [gossip.discovery] handleAliveMessage -> DEBU 716e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 716f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:27.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 7170 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:27.671 UTC [gossip.discovery] learnExistingMembers -> DEBU 7171 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:27.672 UTC [gossip.discovery] learnExistingMembers -> DEBU 7172 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:27.672 UTC [gossip.discovery] learnExistingMembers -> DEBU 7173 Exiting" +"2019-09-24 00:27:27.672 UTC [gossip.discovery] handleAliveMessage -> DEBU 7174 Exiting" +"2019-09-24 00:27:27.672 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7175 Exiting" +"2019-09-24 00:27:27.677 UTC [msp] DeserializeIdentity -> DEBU 7176 Obtaining identity" +"2019-09-24 00:27:27.678 UTC [msp] DeserializeIdentity -> DEBU 7177 Obtaining identity" +"2019-09-24 00:27:27.680 UTC [gossip.comm] func1 -> DEBU 7178 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.680 UTC [gossip.gossip] handleMessage -> DEBU 7179 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.680 UTC [gossip.gossip] handleMessage -> DEBU 717a Exiting" +"2019-09-24 00:27:27.680 UTC [msp] DeserializeIdentity -> DEBU 717b Obtaining identity" +"2019-09-24 00:27:27.681 UTC [gossip.comm] Send -> DEBU 717d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:27.681 UTC [gossip.discovery] handleMsgFromComm -> DEBU 717c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.681 UTC [gossip.discovery] handleMsgFromComm -> DEBU 717f Exiting" +"2019-09-24 00:27:27.681 UTC [msp] DeserializeIdentity -> DEBU 717e Obtaining identity" +"2019-09-24 00:27:27.681 UTC [gossip.comm] sendToEndpoint -> DEBU 7180 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.682 UTC [gossip.comm] sendToEndpoint -> DEBU 7181 Exiting" +"2019-09-24 00:27:27.681 UTC [gossip.comm] Send -> DEBU 7182 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:27.682 UTC [gossip.comm] sendToEndpoint -> DEBU 7183 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.682 UTC [gossip.comm] sendToEndpoint -> DEBU 7184 Exiting" +"2019-09-24 00:27:27.684 UTC [gossip.comm] func1 -> DEBU 7185 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.684 UTC [gossip.gossip] handleMessage -> DEBU 7186 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.684 UTC [gossip.gossip] handleMessage -> DEBU 7187 Exiting" +"2019-09-24 00:27:27.684 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7188 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:27.684 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7189 Exiting" +"2019-09-24 00:27:27.702 UTC [gossip.pull] Hello -> DEBU 718a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:27.702 UTC [gossip.comm] Send -> DEBU 718b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:27.702 UTC [gossip.pull] Hello -> DEBU 718c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 00:27:27.703 UTC [gossip.comm] sendToEndpoint -> DEBU 718d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.703 UTC [gossip.comm] sendToEndpoint -> DEBU 718e Exiting" +"2019-09-24 00:27:27.703 UTC [gossip.comm] Send -> DEBU 718f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:27.704 UTC [gossip.pull] Hello -> DEBU 7190 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 00:27:27.704 UTC [gossip.comm] Send -> DEBU 7191 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:27.705 UTC [gossip.comm] sendToEndpoint -> DEBU 7192 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.705 UTC [gossip.comm] sendToEndpoint -> DEBU 7193 Exiting" +"2019-09-24 00:27:27.705 UTC [gossip.comm] func1 -> DEBU 7194 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.705 UTC [gossip.gossip] handleMessage -> DEBU 7195 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.706 UTC [gossip.comm] sendToEndpoint -> DEBU 7196 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.706 UTC [gossip.pull] HandleMessage -> DEBU 7197 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.706 UTC [gossip.comm] sendToEndpoint -> DEBU 7198 Exiting" +"2019-09-24 00:27:27.706 UTC [gossip.gossip] handleMessage -> DEBU 7199 Exiting" +"2019-09-24 00:27:27.708 UTC [gossip.comm] func1 -> DEBU 719a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.708 UTC [gossip.gossip] handleMessage -> DEBU 719b Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.709 UTC [gossip.pull] HandleMessage -> DEBU 719c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.709 UTC [gossip.gossip] handleMessage -> DEBU 719d Exiting" +"2019-09-24 00:27:27.711 UTC [gossip.comm] func1 -> DEBU 719e Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.711 UTC [gossip.gossip] handleMessage -> DEBU 719f Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.711 UTC [gossip.pull] HandleMessage -> DEBU 71a0 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.711 UTC [gossip.gossip] handleMessage -> DEBU 71a1 Exiting" +"2019-09-24 00:27:27.838 UTC [msp] GetDefaultSigningIdentity -> DEBU 71a2 Obtaining default signing identity" +"2019-09-24 00:27:27.838 UTC [msp.identity] Sign -> DEBU 71a3 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315105A " +"2019-09-24 00:27:27.838 UTC [msp.identity] Sign -> DEBU 71a4 Sign: digest: A93BF3CD187AEB6BD9FB5F8F68F7AB43734889217639056FFEF54A4F952097B7 " +"2019-09-24 00:27:27.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 71a5 Obtaining default signing identity" +"2019-09-24 00:27:27.839 UTC [msp.identity] Sign -> DEBU 71a6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:27.839 UTC [msp.identity] Sign -> DEBU 71a7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:27.840 UTC [gossip.comm] Send -> DEBU 71a8 Entering, sending GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:27.841 UTC [gossip.comm] sendToEndpoint -> DEBU 71a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.841 UTC [msp] DeserializeIdentity -> DEBU 71aa Obtaining identity" +"2019-09-24 00:27:27.841 UTC [gossip.comm] sendToEndpoint -> DEBU 71ab Exiting" +"2019-09-24 00:27:27.841 UTC [gossip.comm] Send -> DEBU 71ac Entering, sending GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:27.841 UTC [msp] DeserializeIdentity -> DEBU 71ad Obtaining identity" +"2019-09-24 00:27:27.841 UTC [gossip.comm] Send -> DEBU 71ae Entering, sending GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:27.842 UTC [gossip.comm] sendToEndpoint -> DEBU 71af Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.842 UTC [gossip.comm] sendToEndpoint -> DEBU 71b0 Exiting" +"2019-09-24 00:27:27.842 UTC [gossip.comm] sendToEndpoint -> DEBU 71b1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\217*S\200\322\255\346\250\254\306\375mJ\321\312\205\201\020s\333\257?\271\357X\233\376\031\310\335[\002 F\263\344+\252\001\325\337)\307M\357\243D\r\371\347\251?\231\001\210o\\V\342\nj\371\200r_" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.842 UTC [gossip.comm] sendToEndpoint -> DEBU 71b2 Exiting" +"2019-09-24 00:27:27.843 UTC [gossip.comm] func1 -> DEBU 71b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.843 UTC [gossip.gossip] handleMessage -> DEBU 71b4 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.843 UTC [gossip.gossip] handleMessage -> DEBU 71b5 Exiting" +"2019-09-24 00:27:27.843 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71b6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.843 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 71b7 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:27.843 UTC [msp.identity] Verify -> DEBU 71b8 Verify: digest = 00000000 a9 3b f3 cd 18 7a eb 6b d9 fb 5f 8f 68 f7 ab 43 |.;...z.k.._.h..C| +00000010 73 48 89 21 76 39 05 6f fe f5 4a 4f 95 20 97 b7 |sH.!v9.o..JO. ..|" +"2019-09-24 00:27:27.843 UTC [msp.identity] Verify -> DEBU 71b9 Verify: sig = 00000000 30 44 02 20 3e 8f 2a 53 80 d2 ad e6 a8 ac c6 fd |0D. >.*S........| +00000010 6d 4a d1 ca 85 81 10 73 db af 3f b9 ef 58 9b fe |mJ.....s..?..X..| +00000020 19 c8 dd 5b 02 20 46 b3 e4 2b aa 01 d5 df 29 c7 |...[. F..+....).| +00000030 4d ef a3 44 0d f9 e7 a9 3f 99 01 88 6f 5c 56 e2 |M..D....?...o\V.| +00000040 0a 6a f9 80 72 5f |.j..r_|" +"2019-09-24 00:27:27.843 UTC [msp.identity] Verify -> DEBU 71ba Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" -"2019-07-20 02:41:00.296 UTC [msp.identity] Verify -> DEBU 4994 Verify: sig = 00000000 30 45 02 21 00 96 b2 43 41 a9 5b 49 00 12 c7 01 |0E.!...CA.[I....| -00000010 b1 b7 69 8f b6 4f de 87 6c 57 3f 98 4e 50 c9 96 |..i..O..lW?.NP..| -00000020 eb 26 5a db a8 02 20 2b 85 b1 b6 cc de 66 6b 9f |.&Z... +.....fk.| -00000030 6e 8b 01 5a 5d 0e aa 9c 3b e4 40 5f 72 d9 5c c6 |n..Z]...;.@_r.\.| -00000040 29 e1 37 c9 f7 62 16 |).7..b.|" -"2019-07-20 02:41:00.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 4995 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:41:00.296 UTC [gossip.discovery] isSentByMe -> DEBU 4996 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" -"2019-07-20 02:41:00.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 4997 Exiting" -"2019-07-20 02:41:00.296 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4998 Exiting" -"2019-07-20 02:41:00.296 UTC [gossip.gossip] handleMessage -> DEBU 4999 Exiting" -"2019-07-20 02:41:00.339 UTC [gossip.gossip] handleMessage -> DEBU 499a Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.339 UTC [gossip.pull] HandleMessage -> DEBU 499b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.340 UTC [gossip.pull] SendDigest -> DEBU 499c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:41:00.340 UTC [gossip.gossip] handleMessage -> DEBU 499d Exiting" -"2019-07-20 02:41:00.365 UTC [gossip.gossip] handleMessage -> DEBU 499e Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.365 UTC [gossip.gossip] handleMessage -> DEBU 499f Exiting" -"2019-07-20 02:41:00.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49a0 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.367 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49a1 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" -"2019-07-20 02:41:00.367 UTC [msp.identity] Verify -> DEBU 49a2 Verify: digest = 00000000 49 51 52 bd 11 4a b8 a3 53 97 cd 73 97 50 47 c7 |IQR..J..S..s.PG.| -00000010 f7 19 ff 3e 5b 7b 6b b2 51 fb 37 eb 30 f0 1e 28 |...>[{k.Q.7.0..(|" -"2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a3 Verify: sig = 00000000 30 44 02 20 73 e9 4b 88 b7 1d 12 fa 3f c9 c6 07 |0D. s.K.....?...| -00000010 77 4f 29 fc 49 b3 4d 94 aa c1 fe 5a 7f e4 9b c9 |wO).I.M....Z....| -00000020 e7 5a 6f 77 02 20 02 9d c8 ed 33 b4 b0 96 38 17 |.Zow. ....3...8.| -00000030 c8 44 99 10 24 6b b7 b4 19 af f3 64 79 0a 93 b6 |.D..$k.....dy...| -00000040 3d cd a7 65 1a 5b |=..e.[|" -"2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +"2019-09-24 00:27:27.843 UTC [msp.identity] Verify -> DEBU 71bb Verify: sig = 00000000 30 45 02 21 00 a1 71 7d d4 b2 0d 07 ce d0 90 e0 |0E.!..q}........| +00000010 a7 1b 91 f3 5a 4c b9 ef 60 8d 3c 5a d1 bc 51 09 |....ZL..`. DEBU 71bc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:27:27.843 UTC [gossip.discovery] isSentByMe -> DEBU 71bd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 00:27:27.843 UTC [gossip.discovery] handleAliveMessage -> DEBU 71be Exiting" +"2019-09-24 00:27:27.843 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71bf Exiting" +"2019-09-24 00:27:27.845 UTC [gossip.comm] func1 -> DEBU 71c0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.845 UTC [gossip.gossip] handleMessage -> DEBU 71c1 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.845 UTC [gossip.gossip] handleMessage -> DEBU 71c2 Exiting" +"2019-09-24 00:27:27.845 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71c3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.845 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 71c4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:27.845 UTC [msp.identity] Verify -> DEBU 71c5 Verify: digest = 00000000 a9 3b f3 cd 18 7a eb 6b d9 fb 5f 8f 68 f7 ab 43 |.;...z.k.._.h..C| +00000010 73 48 89 21 76 39 05 6f fe f5 4a 4f 95 20 97 b7 |sH.!v9.o..JO. ..|" +"2019-09-24 00:27:27.845 UTC [msp.identity] Verify -> DEBU 71c6 Verify: sig = 00000000 30 44 02 20 3e 8f 2a 53 80 d2 ad e6 a8 ac c6 fd |0D. >.*S........| +00000010 6d 4a d1 ca 85 81 10 73 db af 3f b9 ef 58 9b fe |mJ.....s..?..X..| +00000020 19 c8 dd 5b 02 20 46 b3 e4 2b aa 01 d5 df 29 c7 |...[. F..+....).| +00000030 4d ef a3 44 0d f9 e7 a9 3f 99 01 88 6f 5c 56 e2 |M..D....?...o\V.| +00000040 0a 6a f9 80 72 5f |.j..r_|" +"2019-09-24 00:27:27.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 71c7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:27.845 UTC [gossip.discovery] isSentByMe -> DEBU 71c8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:27.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 71c9 Exiting" +"2019-09-24 00:27:27.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71ca Exiting" +"2019-09-24 00:27:27.846 UTC [gossip.comm] func1 -> DEBU 71cb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.846 UTC [gossip.gossip] handleMessage -> DEBU 71cc Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.847 UTC [gossip.gossip] handleMessage -> DEBU 71cd Exiting" +"2019-09-24 00:27:27.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71ce Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.847 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 71cf Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-09-24 00:27:27.847 UTC [msp.identity] Verify -> DEBU 71d0 Verify: digest = 00000000 a9 3b f3 cd 18 7a eb 6b d9 fb 5f 8f 68 f7 ab 43 |.;...z.k.._.h..C| +00000010 73 48 89 21 76 39 05 6f fe f5 4a 4f 95 20 97 b7 |sH.!v9.o..JO. ..|" +"2019-09-24 00:27:27.847 UTC [msp.identity] Verify -> DEBU 71d1 Verify: sig = 00000000 30 44 02 20 3e 8f 2a 53 80 d2 ad e6 a8 ac c6 fd |0D. >.*S........| +00000010 6d 4a d1 ca 85 81 10 73 db af 3f b9 ef 58 9b fe |mJ.....s..?..X..| +00000020 19 c8 dd 5b 02 20 46 b3 e4 2b aa 01 d5 df 29 c7 |...[. F..+....).| +00000030 4d ef a3 44 0d f9 e7 a9 3f 99 01 88 6f 5c 56 e2 |M..D....?...o\V.| +00000040 0a 6a f9 80 72 5f |.j..r_|" +"2019-09-24 00:27:27.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 71d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:27.848 UTC [gossip.discovery] isSentByMe -> DEBU 71d3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:27.848 UTC [gossip.discovery] handleAliveMessage -> DEBU 71d4 Exiting" +"2019-09-24 00:27:27.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71d5 Exiting" +"2019-09-24 00:27:27.884 UTC [gossip.comm] func1 -> DEBU 71d6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.884 UTC [gossip.gossip] handleMessage -> DEBU 71d7 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.884 UTC [gossip.pull] HandleMessage -> DEBU 71d8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.886 UTC [msp] DeserializeIdentity -> DEBU 71d9 Obtaining identity" +"2019-09-24 00:27:27.886 UTC [msp] DeserializeIdentity -> DEBU 71da Obtaining identity" +"2019-09-24 00:27:27.887 UTC [msp] DeserializeIdentity -> DEBU 71db Obtaining identity" +"2019-09-24 00:27:27.887 UTC [msp] DeserializeIdentity -> DEBU 71dc Obtaining identity" +"2019-09-24 00:27:27.888 UTC [msp] DeserializeIdentity -> DEBU 71dd Obtaining identity" +"2019-09-24 00:27:27.888 UTC [msp] DeserializeIdentity -> DEBU 71de Obtaining identity" +"2019-09-24 00:27:27.888 UTC [gossip.pull] SendDigest -> DEBU 71df Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-09-24 00:27:27.889 UTC [gossip.gossip] handleMessage -> DEBU 71e0 Exiting" +"2019-09-24 00:27:27.996 UTC [gossip.comm] func1 -> DEBU 71e1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.996 UTC [gossip.gossip] handleMessage -> DEBU 71e2 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.997 UTC [gossip.gossip] handleMessage -> DEBU 71e3 Exiting" +"2019-09-24 00:27:27.997 UTC [gossip.discovery] handleMsgFromComm -> DEBU 71e4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 00:27:27.997 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 71e5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:27.997 UTC [msp] DeserializeIdentity -> DEBU 71e6 Obtaining identity" +"2019-09-24 00:27:27.998 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 71e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:27.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 71e8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:27.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 71e9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:27.998 UTC [policies] Evaluate -> DEBU 71ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:27.999 UTC [policies] Evaluate -> DEBU 71eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:27.999 UTC [policies] Evaluate -> DEBU 71ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:28.000 UTC [cauthdsl] func1 -> DEBU 71ed 0xc0056515d0 gate 1569284848000560100 evaluation starts" +"2019-09-24 00:27:28.001 UTC [cauthdsl] func2 -> DEBU 71ee 0xc0056515d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:28.003 UTC [cauthdsl] func2 -> DEBU 71ef 0xc0056515d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:28.004 UTC [cauthdsl] func2 -> DEBU 71f0 0xc0056515d0 principal matched by identity 0" +"2019-09-24 00:27:28.004 UTC [msp.identity] Verify -> DEBU 71f1 Verify: digest = 00000000 a8 72 35 a8 ca 5a 52 f0 ea 12 3b 17 3f 70 6e cb |.r5..ZR...;.?pn.| +00000010 6f 80 26 75 b3 85 cd 83 88 1b fe 87 3e 7b b9 ac |o.&u........>{..|" +"2019-09-24 00:27:28.005 UTC [msp.identity] Verify -> DEBU 71f2 Verify: sig = 00000000 30 45 02 21 00 a2 9a 44 77 8b 69 f6 34 b3 24 23 |0E.!...Dw.i.4.$#| +00000010 d7 4c ce 13 a8 31 30 1d 6c 49 db 37 76 4a 6b d3 |.L...10.lI.7vJk.| +00000020 05 67 1b 43 64 02 20 2c 5f c7 fa 67 2b 8f c3 31 |.g.Cd. ,_..g+..1| +00000030 82 61 fc 89 3d b5 63 f6 77 a6 d5 84 93 4b 59 74 |.a..=.c.w....KYt| +00000040 30 cb 9a 1a 39 10 3d |0...9.=|" +"2019-09-24 00:27:28.006 UTC [cauthdsl] func2 -> DEBU 71f3 0xc0056515d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:28.006 UTC [cauthdsl] func1 -> DEBU 71f4 0xc0056515d0 gate 1569284848000560100 evaluation succeeds" +"2019-09-24 00:27:28.006 UTC [policies] Evaluate -> DEBU 71f5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.007 UTC [policies] Evaluate -> DEBU 71f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.007 UTC [policies] Evaluate -> DEBU 71f7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:28.007 UTC [policies] Evaluate -> DEBU 71f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:28.008 UTC [gossip.discovery] handleAliveMessage -> DEBU 71f9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:28.008 UTC [gossip.discovery] learnExistingMembers -> DEBU 71fa Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:28.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 71fb updating membership: timestamp: " +"2019-09-24 00:27:28.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 71fc Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:28.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 71fd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:28.009 UTC [gossip.discovery] learnExistingMembers -> DEBU 71fe Exiting" +"2019-09-24 00:27:28.009 UTC [gossip.discovery] handleAliveMessage -> DEBU 71ff Exiting" +"2019-09-24 00:27:28.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7200 Exiting" +"2019-09-24 00:27:28.009 UTC [gossip.discovery] sendMemResponse -> DEBU 7201 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-09-24 00:27:28.010 UTC [msp] DeserializeIdentity -> DEBU 7202 Obtaining identity" +"2019-09-24 00:27:28.011 UTC [msp] DeserializeIdentity -> DEBU 7203 Obtaining identity" +"2019-09-24 00:27:28.011 UTC [msp] DeserializeIdentity -> DEBU 7204 Obtaining identity" +"2019-09-24 00:27:28.011 UTC [gossip.comm] Send -> DEBU 7205 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:28.012 UTC [gossip.comm] sendToEndpoint -> DEBU 7206 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.012 UTC [gossip.comm] sendToEndpoint -> DEBU 7207 Exiting" +"2019-09-24 00:27:28.012 UTC [gossip.discovery] sendMemResponse -> DEBU 7208 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020`" signature:"0E\002!\000\302\242\220\336\277\337\336\266\0257KB\017\002Y\024\256\024\001St\2419\335m;\036Tn~$v\002 \013\2662n\261&\302\363\210S\336U=\007\262\256\216\3576\311\"1e\266\200\306\024\014\025|ZL" > alive: alive: alive:\257\"\3775I\247UX\263=\220\317-\252\356\276\362" > " +"2019-09-24 00:27:28.045 UTC [msp] DeserializeIdentity -> DEBU 7209 Obtaining identity" +"2019-09-24 00:27:28.046 UTC [msp] DeserializeIdentity -> DEBU 720a Obtaining identity" +"2019-09-24 00:27:28.046 UTC [gossip.comm] Send -> DEBU 720b Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 720c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 720d Exiting" +"2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 720e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 720f Exiting" +"2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 7210 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 7211 Exiting" +"2019-09-24 00:27:28.047 UTC [gossip.comm] func1 -> DEBU 7212 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.047 UTC [gossip.gossip] handleMessage -> DEBU 7213 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.047 UTC [msp] DeserializeIdentity -> DEBU 7214 Obtaining identity" +"2019-09-24 00:27:28.047 UTC [msp] DeserializeIdentity -> DEBU 7215 Obtaining identity" +"2019-09-24 00:27:28.047 UTC [msp] DeserializeIdentity -> DEBU 7216 Obtaining identity" +"2019-09-24 00:27:28.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7217 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:28.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7218 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7219 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.047 UTC [policies] Evaluate -> DEBU 721a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:28.047 UTC [policies] Evaluate -> DEBU 721b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:28.047 UTC [policies] Evaluate -> DEBU 721c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:28.047 UTC [cauthdsl] func1 -> DEBU 721d 0xc005696120 gate 1569284848047852100 evaluation starts" +"2019-09-24 00:27:28.047 UTC [cauthdsl] func2 -> DEBU 721e 0xc005696120 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:28.047 UTC [cauthdsl] func2 -> DEBU 721f 0xc005696120 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:28.047 UTC [cauthdsl] func2 -> DEBU 7220 0xc005696120 principal matched by identity 0" +"2019-09-24 00:27:28.047 UTC [msp.identity] Verify -> DEBU 7221 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +"2019-09-24 00:27:28.048 UTC [msp.identity] Verify -> DEBU 7222 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +00000040 15 da b4 89 d2 86 |......|" +"2019-09-24 00:27:28.048 UTC [cauthdsl] func2 -> DEBU 7223 0xc005696120 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:28.048 UTC [cauthdsl] func1 -> DEBU 7224 0xc005696120 gate 1569284848047852100 evaluation succeeds" +"2019-09-24 00:27:28.048 UTC [policies] Evaluate -> DEBU 7225 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.048 UTC [policies] Evaluate -> DEBU 7226 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.048 UTC [policies] Evaluate -> DEBU 7227 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:28.048 UTC [policies] Evaluate -> DEBU 7228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:28.048 UTC [msp.identity] Verify -> DEBU 7229 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +"2019-09-24 00:27:28.048 UTC [msp.identity] Verify -> DEBU 722a Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +00000040 54 87 75 e6 8e 00 |T.u...|" +"2019-09-24 00:27:28.048 UTC [msp.identity] Verify -> DEBU 722b Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +"2019-09-24 00:27:28.048 UTC [msp.identity] Verify -> DEBU 722c Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +00000040 f9 8f 71 f2 6e 18 |..q.n.|" +"2019-09-24 00:27:28.048 UTC [msp] DeserializeIdentity -> DEBU 722d Obtaining identity" +"2019-09-24 00:27:28.049 UTC [msp] DeserializeIdentity -> DEBU 722e Obtaining identity" +"2019-09-24 00:27:28.049 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 722f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:28.049 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7230 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.049 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7231 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 7232 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 7233 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 7234 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:28.049 UTC [cauthdsl] func1 -> DEBU 7235 0xc0056b0730 gate 1569284848049377700 evaluation starts" +"2019-09-24 00:27:28.049 UTC [cauthdsl] func2 -> DEBU 7236 0xc0056b0730 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:28.049 UTC [cauthdsl] func2 -> DEBU 7237 0xc0056b0730 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:28.049 UTC [cauthdsl] func2 -> DEBU 7238 0xc0056b0730 principal matched by identity 0" +"2019-09-24 00:27:28.049 UTC [msp.identity] Verify -> DEBU 7239 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +"2019-09-24 00:27:28.049 UTC [msp.identity] Verify -> DEBU 723a Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +00000040 01 32 48 48 f4 8a |.2HH..|" +"2019-09-24 00:27:28.049 UTC [cauthdsl] func2 -> DEBU 723b 0xc0056b0730 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:28.049 UTC [cauthdsl] func1 -> DEBU 723c 0xc0056b0730 gate 1569284848049377700 evaluation succeeds" +"2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 723d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 723e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 723f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:28.049 UTC [policies] Evaluate -> DEBU 7240 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:28.049 UTC [gossip.gossip] handleMessage -> DEBU 7241 Exiting" +"2019-09-24 00:27:28.050 UTC [gossip.comm] func1 -> DEBU 7242 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.050 UTC [gossip.gossip] handleMessage -> DEBU 7243 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.050 UTC [gossip.comm] func1 -> DEBU 7244 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.050 UTC [msp.identity] Verify -> DEBU 7245 Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +"2019-09-24 00:27:28.050 UTC [msp.identity] Verify -> DEBU 7246 Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +00000040 f9 8f 71 f2 6e 18 |..q.n.|" +"2019-09-24 00:27:28.051 UTC [msp.identity] Verify -> DEBU 7247 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +"2019-09-24 00:27:28.051 UTC [msp.identity] Verify -> DEBU 7248 Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +00000040 54 87 75 e6 8e 00 |T.u...|" +"2019-09-24 00:27:28.051 UTC [msp] DeserializeIdentity -> DEBU 7249 Obtaining identity" +"2019-09-24 00:27:28.051 UTC [msp] DeserializeIdentity -> DEBU 724a Obtaining identity" +"2019-09-24 00:27:28.051 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 724b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:28.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 724c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 724d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.051 UTC [policies] Evaluate -> DEBU 724e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:28.051 UTC [policies] Evaluate -> DEBU 724f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:28.051 UTC [policies] Evaluate -> DEBU 7250 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:28.051 UTC [cauthdsl] func1 -> DEBU 7251 0xc0056c10e0 gate 1569284848051969200 evaluation starts" +"2019-09-24 00:27:28.052 UTC [cauthdsl] func2 -> DEBU 7252 0xc0056c10e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:28.052 UTC [cauthdsl] func2 -> DEBU 7253 0xc0056c10e0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:28.052 UTC [cauthdsl] func2 -> DEBU 7254 0xc0056c10e0 principal matched by identity 0" +"2019-09-24 00:27:28.052 UTC [msp.identity] Verify -> DEBU 7255 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +"2019-09-24 00:27:28.052 UTC [msp.identity] Verify -> DEBU 7256 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +00000040 15 da b4 89 d2 86 |......|" +"2019-09-24 00:27:28.052 UTC [cauthdsl] func2 -> DEBU 7257 0xc0056c10e0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:28.052 UTC [cauthdsl] func1 -> DEBU 7258 0xc0056c10e0 gate 1569284848051969200 evaluation succeeds" +"2019-09-24 00:27:28.052 UTC [policies] Evaluate -> DEBU 7259 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.052 UTC [policies] Evaluate -> DEBU 725a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.052 UTC [policies] Evaluate -> DEBU 725b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:28.052 UTC [policies] Evaluate -> DEBU 725c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:28.052 UTC [msp] DeserializeIdentity -> DEBU 725d Obtaining identity" +"2019-09-24 00:27:28.052 UTC [msp] DeserializeIdentity -> DEBU 725e Obtaining identity" +"2019-09-24 00:27:28.054 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 725f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:28.055 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7260 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.055 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7261 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 7262 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 7263 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 7264 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:28.055 UTC [cauthdsl] func1 -> DEBU 7265 0xc0056de8b0 gate 1569284848055224000 evaluation starts" +"2019-09-24 00:27:28.055 UTC [cauthdsl] func2 -> DEBU 7266 0xc0056de8b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:28.055 UTC [cauthdsl] func2 -> DEBU 7267 0xc0056de8b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:28.055 UTC [cauthdsl] func2 -> DEBU 7268 0xc0056de8b0 principal matched by identity 0" +"2019-09-24 00:27:28.055 UTC [msp.identity] Verify -> DEBU 7269 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +"2019-09-24 00:27:28.055 UTC [msp.identity] Verify -> DEBU 726a Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +00000040 01 32 48 48 f4 8a |.2HH..|" +"2019-09-24 00:27:28.055 UTC [cauthdsl] func2 -> DEBU 726b 0xc0056de8b0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:28.055 UTC [cauthdsl] func1 -> DEBU 726c 0xc0056de8b0 gate 1569284848055224000 evaluation succeeds" +"2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 726d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 726e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.055 UTC [policies] Evaluate -> DEBU 726f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:28.056 UTC [policies] Evaluate -> DEBU 7270 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:28.056 UTC [gossip.gossip] handleMessage -> DEBU 7271 Exiting" +"2019-09-24 00:27:28.056 UTC [gossip.gossip] handleMessage -> DEBU 7272 Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.056 UTC [msp] DeserializeIdentity -> DEBU 7273 Obtaining identity" +"2019-09-24 00:27:28.056 UTC [msp] DeserializeIdentity -> DEBU 7274 Obtaining identity" +"2019-09-24 00:27:28.056 UTC [msp] DeserializeIdentity -> DEBU 7275 Obtaining identity" +"2019-09-24 00:27:28.056 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7276 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:28.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7277 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7278 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.056 UTC [policies] Evaluate -> DEBU 7279 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:28.056 UTC [policies] Evaluate -> DEBU 727a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:28.056 UTC [policies] Evaluate -> DEBU 727b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:28.056 UTC [cauthdsl] func1 -> DEBU 727c 0xc0056f43c0 gate 1569284848056605300 evaluation starts" +"2019-09-24 00:27:28.056 UTC [cauthdsl] func2 -> DEBU 727d 0xc0056f43c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:28.056 UTC [cauthdsl] func2 -> DEBU 727e 0xc0056f43c0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:28.056 UTC [cauthdsl] func2 -> DEBU 727f 0xc0056f43c0 principal matched by identity 0" +"2019-09-24 00:27:28.056 UTC [msp.identity] Verify -> DEBU 7280 Verify: digest = 00000000 07 30 07 a8 ee f8 b0 1f 84 83 29 fe a4 e1 e6 ff |.0........).....| +00000010 1c a5 66 61 0f be 0e 86 b8 b3 3b 80 10 d8 97 85 |..fa......;.....|" +"2019-09-24 00:27:28.056 UTC [msp.identity] Verify -> DEBU 7281 Verify: sig = 00000000 30 44 02 20 2f 58 41 29 4f f6 73 64 61 ce 7f 16 |0D. /XA)O.sda...| +00000010 c6 de cc 03 28 78 0b a6 17 87 73 33 2e 62 32 51 |....(x....s3.b2Q| +00000020 c3 03 ac 53 02 20 39 b1 8d 3b d1 dc 37 1f 70 ef |...S. 9..;..7.p.| +00000030 27 d3 07 20 3a 5c 55 60 45 1d 2b d2 a0 83 e9 dd |'.. :\U`E.+.....| +00000040 01 32 48 48 f4 8a |.2HH..|" +"2019-09-24 00:27:28.056 UTC [cauthdsl] func2 -> DEBU 7282 0xc0056f43c0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:28.056 UTC [cauthdsl] func1 -> DEBU 7283 0xc0056f43c0 gate 1569284848056605300 evaluation succeeds" +"2019-09-24 00:27:28.056 UTC [policies] Evaluate -> DEBU 7284 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.057 UTC [policies] Evaluate -> DEBU 7285 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.057 UTC [policies] Evaluate -> DEBU 7286 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:28.057 UTC [policies] Evaluate -> DEBU 7287 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:28.057 UTC [msp.identity] Verify -> DEBU 7288 Verify: digest = 00000000 ac ed ec 46 f0 b6 09 7a 2d 75 35 75 b5 6e c9 34 |...F...z-u5u.n.4| +00000010 a5 6b ac 97 9f df 34 8a 84 c9 8b af 1b e5 cd 8e |.k....4.........|" +"2019-09-24 00:27:28.057 UTC [msp.identity] Verify -> DEBU 7289 Verify: sig = 00000000 30 44 02 20 13 86 d0 e5 c3 31 df e7 1b b0 1c 4e |0D. .....1.....N| +00000010 67 3a 26 54 e8 62 c1 a3 52 69 26 0d 60 b2 f2 2a |g:&T.b..Ri&.`..*| +00000020 3d 19 38 d4 02 20 31 df 74 df 72 0e a7 4c 64 d2 |=.8.. 1.t.r..Ld.| +00000030 18 a7 bd 80 f8 eb c4 26 2f fd 4b f4 9d e6 8a 60 |.......&/.K....`| +00000040 54 87 75 e6 8e 00 |T.u...|" +"2019-09-24 00:27:28.057 UTC [msp.identity] Verify -> DEBU 728a Verify: digest = 00000000 3b 03 6b b6 56 66 82 3b 93 ba 6e 5d b3 37 c4 9b |;.k.Vf.;..n].7..| +00000010 d3 2b 78 e4 2c 6a 1a 43 03 f6 42 26 16 63 a8 c0 |.+x.,j.C..B&.c..|" +"2019-09-24 00:27:28.057 UTC [msp.identity] Verify -> DEBU 728b Verify: sig = 00000000 30 44 02 20 55 01 dd 72 5d df 2f ef 2c 12 5b 0b |0D. U..r]./.,.[.| +00000010 97 78 71 ed 9e 81 4a 46 79 c7 35 5f b3 7c 7f 95 |.xq...JFy.5_.|..| +00000020 70 a6 1c 30 02 20 30 12 16 d7 3c ec 22 31 45 cd |p..0. 0...<."1E.| +00000030 1e 48 eb 8e c4 23 bc 9a d6 42 80 f6 54 d5 cd ff |.H...#...B..T...| +00000040 f9 8f 71 f2 6e 18 |..q.n.|" +"2019-09-24 00:27:28.057 UTC [msp] DeserializeIdentity -> DEBU 728c Obtaining identity" +"2019-09-24 00:27:28.057 UTC [msp] DeserializeIdentity -> DEBU 728d Obtaining identity" +"2019-09-24 00:27:28.057 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 728e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:28.058 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 728f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.058 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7290 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 7291 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 7292 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 7293 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:28.058 UTC [cauthdsl] func1 -> DEBU 7294 0xc0057109d0 gate 1569284848058307400 evaluation starts" +"2019-09-24 00:27:28.058 UTC [cauthdsl] func2 -> DEBU 7295 0xc0057109d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:28.058 UTC [cauthdsl] func2 -> DEBU 7296 0xc0057109d0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:28.058 UTC [cauthdsl] func2 -> DEBU 7297 0xc0057109d0 principal matched by identity 0" +"2019-09-24 00:27:28.058 UTC [msp.identity] Verify -> DEBU 7298 Verify: digest = 00000000 cd 3d 0d a5 a6 58 33 96 41 16 46 28 02 a4 c1 e7 |.=...X3.A.F(....| +00000010 60 d5 ed 12 64 f8 08 67 8d 16 e2 53 8a 13 97 b7 |`...d..g...S....|" +"2019-09-24 00:27:28.058 UTC [msp.identity] Verify -> DEBU 7299 Verify: sig = 00000000 30 44 02 20 14 38 89 1d 07 04 f6 46 2a 97 48 cd |0D. .8.....F*.H.| +00000010 24 70 8d 3a e5 a5 67 54 d2 9c 1f 8b 8e 31 e0 c6 |$p.:..gT.....1..| +00000020 a8 91 85 b1 02 20 30 37 2c 59 2f 0f 0b 29 37 aa |..... 07,Y/..)7.| +00000030 9a 27 b2 2b e6 0f b0 c9 e5 8b b7 23 f6 12 6c 7c |.'.+.......#..l|| +00000040 15 da b4 89 d2 86 |......|" +"2019-09-24 00:27:28.058 UTC [cauthdsl] func2 -> DEBU 729a 0xc0057109d0 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:28.058 UTC [cauthdsl] func1 -> DEBU 729b 0xc0057109d0 gate 1569284848058307400 evaluation succeeds" +"2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 729c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 729d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.058 UTC [policies] Evaluate -> DEBU 729e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:28.059 UTC [policies] Evaluate -> DEBU 729f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:28.059 UTC [gossip.gossip] handleMessage -> DEBU 72a0 Exiting" +"2019-09-24 00:27:28.303 UTC [msp] DeserializeIdentity -> DEBU 72a1 Obtaining identity" +"2019-09-24 00:27:28.303 UTC [msp] DeserializeIdentity -> DEBU 72a2 Obtaining identity" +"2019-09-24 00:27:28.303 UTC [gossip.pull] Hello -> DEBU 72a3 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 00:27:28.303 UTC [msp] DeserializeIdentity -> DEBU 72a4 Obtaining identity" +"2019-09-24 00:27:28.303 UTC [msp] DeserializeIdentity -> DEBU 72a5 Obtaining identity" +"2019-09-24 00:27:28.303 UTC [gossip.comm] Send -> DEBU 72a6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 72a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 72a8 Exiting" +"2019-09-24 00:27:28.304 UTC [gossip.comm] func1 -> DEBU 72a9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.305 UTC [gossip.gossip] handleMessage -> DEBU 72aa Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.305 UTC [gossip.pull] HandleMessage -> DEBU 72ab GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.305 UTC [gossip.gossip] handleMessage -> DEBU 72ac Exiting" +"2019-09-24 00:27:28.547 UTC [gossip.comm] func1 -> DEBU 72ad Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.547 UTC [gossip.gossip] handleMessage -> DEBU 72ae Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.547 UTC [msp] DeserializeIdentity -> DEBU 72af Obtaining identity" +"2019-09-24 00:27:28.547 UTC [msp] DeserializeIdentity -> DEBU 72b0 Obtaining identity" +"2019-09-24 00:27:28.547 UTC [gossip.gossip] handleMessage -> DEBU 72b1 Exiting" +"2019-09-24 00:27:28.745 UTC [gossip.comm] func1 -> DEBU 72b2 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.745 UTC [gossip.gossip] handleMessage -> DEBU 72b3 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.745 UTC [gossip.gossip] handleMessage -> DEBU 72b4 Exiting" +"2019-09-24 00:27:28.745 UTC [gossip.discovery] handleMsgFromComm -> DEBU 72b5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.745 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 72b6 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:28.745 UTC [msp] DeserializeIdentity -> DEBU 72b7 Obtaining identity" +"2019-09-24 00:27:28.745 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 72b8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:28.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 72b9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 72ba Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:28.746 UTC [cauthdsl] func1 -> DEBU 72be 0xc005729040 gate 1569284848746085400 evaluation starts" +"2019-09-24 00:27:28.746 UTC [cauthdsl] func2 -> DEBU 72bf 0xc005729040 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:28.746 UTC [cauthdsl] func2 -> DEBU 72c0 0xc005729040 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:28.746 UTC [cauthdsl] func2 -> DEBU 72c1 0xc005729040 principal matched by identity 0" +"2019-09-24 00:27:28.746 UTC [msp.identity] Verify -> DEBU 72c2 Verify: digest = 00000000 ca 3b 45 67 f0 52 b9 11 f0 02 b2 77 0b 01 4b aa |.;Eg.R.....w..K.| +00000010 cc 54 bd 27 09 c9 a7 48 e0 2c da 26 b6 05 d0 92 |.T.'...H.,.&....|" +"2019-09-24 00:27:28.746 UTC [msp.identity] Verify -> DEBU 72c3 Verify: sig = 00000000 30 44 02 20 53 c0 c8 24 ea 6f a8 19 7e b1 04 36 |0D. S..$.o..~..6| +00000010 26 ae c0 96 2a 83 45 30 7a ec 3f 5e 93 96 28 32 |&...*.E0z.?^..(2| +00000020 ae 3f 42 bd 02 20 58 f0 9e 2a 63 5b e0 cd d0 09 |.?B.. X..*c[....| +00000030 ab 97 5b da c3 8e fa f2 b4 af 6e 47 82 0b b7 9e |..[.......nG....| +00000040 f9 4c fc 33 5e 86 |.L.3^.|" +"2019-09-24 00:27:28.746 UTC [cauthdsl] func2 -> DEBU 72c4 0xc005729040 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:28.746 UTC [cauthdsl] func1 -> DEBU 72c5 0xc005729040 gate 1569284848746085400 evaluation succeeds" +"2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72c8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:28.746 UTC [policies] Evaluate -> DEBU 72c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:28.746 UTC [gossip.discovery] handleAliveMessage -> DEBU 72ca Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 00:27:28.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 72cb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 00:27:28.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 72cc updating membership: timestamp: " +"2019-09-24 00:27:28.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 72cd Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:28.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 72ce Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:28.746 UTC [gossip.discovery] learnExistingMembers -> DEBU 72cf Exiting" +"2019-09-24 00:27:28.747 UTC [gossip.discovery] handleAliveMessage -> DEBU 72d0 Exiting" +"2019-09-24 00:27:28.747 UTC [gossip.discovery] handleMsgFromComm -> DEBU 72d1 Exiting" +"2019-09-24 00:27:28.747 UTC [gossip.discovery] sendMemResponse -> DEBU 72d2 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-09-24 00:27:28.747 UTC [msp] DeserializeIdentity -> DEBU 72d3 Obtaining identity" +"2019-09-24 00:27:28.747 UTC [msp] DeserializeIdentity -> DEBU 72d4 Obtaining identity" +"2019-09-24 00:27:28.747 UTC [msp] DeserializeIdentity -> DEBU 72d5 Obtaining identity" +"2019-09-24 00:27:28.747 UTC [gossip.comm] Send -> DEBU 72d6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:28.747 UTC [gossip.discovery] sendMemResponse -> DEBU 72d7 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020`" signature:"0E\002!\000\302\242\220\336\277\337\336\266\0257KB\017\002Y\024\256\024\001St\2419\335m;\036Tn~$v\002 \013\2662n\261&\302\363\210S\336U=\007\262\256\216\3576\311\"1e\266\200\306\024\014\025|ZL" > alive: alive: alive:\257\"\3775I\247UX\263=\220\317-\252\356\276\362" > " +"2019-09-24 00:27:28.747 UTC [gossip.comm] sendToEndpoint -> DEBU 72d8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.747 UTC [gossip.comm] sendToEndpoint -> DEBU 72d9 Exiting" +"2019-09-24 00:27:28.789 UTC [gossip.comm] func1 -> DEBU 72da Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.789 UTC [gossip.gossip] handleMessage -> DEBU 72db Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.789 UTC [gossip.pull] HandleMessage -> DEBU 72dc GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.789 UTC [msp] DeserializeIdentity -> DEBU 72dd Obtaining identity" +"2019-09-24 00:27:28.790 UTC [msp] DeserializeIdentity -> DEBU 72de Obtaining identity" +"2019-09-24 00:27:28.790 UTC [msp] DeserializeIdentity -> DEBU 72df Obtaining identity" +"2019-09-24 00:27:28.790 UTC [msp] DeserializeIdentity -> DEBU 72e0 Obtaining identity" +"2019-09-24 00:27:28.790 UTC [msp] DeserializeIdentity -> DEBU 72e1 Obtaining identity" +"2019-09-24 00:27:28.790 UTC [msp] DeserializeIdentity -> DEBU 72e2 Obtaining identity" +"2019-09-24 00:27:28.790 UTC [gossip.pull] SendDigest -> DEBU 72e3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-09-24 00:27:28.790 UTC [gossip.gossip] handleMessage -> DEBU 72e4 Exiting" +"2019-09-24 00:27:28.809 UTC [gossip.comm] func1 -> DEBU 72e5 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.809 UTC [gossip.gossip] handleMessage -> DEBU 72e6 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.809 UTC [gossip.pull] HandleMessage -> DEBU 72e7 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 00:27:28.809 UTC [gossip.pull] SendDigest -> DEBU 72e8 Sending BLOCK_MSG digest: [2 3 4 5 6 1] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:28.809 UTC [gossip.gossip] handleMessage -> DEBU 72e9 Exiting" +"2019-09-24 00:27:29.040 UTC [gossip.comm] func1 -> DEBU 72ea Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:29.040 UTC [gossip.gossip] handleMessage -> DEBU 72eb Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:29.041 UTC [msp] DeserializeIdentity -> DEBU 72ec Obtaining identity" +"2019-09-24 00:27:29.041 UTC [msp] DeserializeIdentity -> DEBU 72ed Obtaining identity" +"2019-09-24 00:27:29.041 UTC [msp] DeserializeIdentity -> DEBU 72ee Obtaining identity" +"2019-09-24 00:27:29.042 UTC [gossip.gossip] handleMessage -> DEBU 72ef Exiting" +"2019-09-24 00:27:29.569 UTC [msp] GetDefaultSigningIdentity -> DEBU 72f0 Obtaining default signing identity" +"2019-09-24 00:27:29.569 UTC [msp.identity] Sign -> DEBU 72f1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08B4FED9C7A083CEE315105B " +"2019-09-24 00:27:29.569 UTC [msp.identity] Sign -> DEBU 72f2 Sign: digest: 246CBF0204752DB8B61C1674206C6806AA66B12E156BF10B03B0FC29FD259986 " +"2019-09-24 00:27:29.569 UTC [msp] GetDefaultSigningIdentity -> DEBU 72f3 Obtaining default signing identity" +"2019-09-24 00:27:29.569 UTC [msp.identity] Sign -> DEBU 72f4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 00:27:29.569 UTC [msp.identity] Sign -> DEBU 72f5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 00:27:29.569 UTC [gossip.discovery] periodicalSendAlive -> DEBU 72f6 Sleeping 5s" +"2019-09-24 00:27:29.575 UTC [msp] DeserializeIdentity -> DEBU 72f7 Obtaining identity" +"2019-09-24 00:27:29.575 UTC [msp] DeserializeIdentity -> DEBU 72f8 Obtaining identity" +"2019-09-24 00:27:29.575 UTC [msp] DeserializeIdentity -> DEBU 72f9 Obtaining identity" +"2019-09-24 00:27:29.575 UTC [gossip.comm] Send -> DEBU 72fa Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:29.575 UTC [msp] DeserializeIdentity -> DEBU 72fb Obtaining identity" +"2019-09-24 00:27:29.575 UTC [gossip.comm] Send -> DEBU 72fc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 72fd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.575 UTC [gossip.comm] Send -> DEBU 72fe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 72ff Exiting" +"2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 7300 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 7301 Exiting" +"2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 7302 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.575 UTC [gossip.comm] sendToEndpoint -> DEBU 7303 Exiting" +"2019-09-24 00:27:29.622 UTC [gossip.comm] func1 -> DEBU 7304 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:29.622 UTC [gossip.gossip] handleMessage -> DEBU 7305 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:29.622 UTC [gossip.pull] HandleMessage -> DEBU 7306 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 00:27:29.622 UTC [gossip.pull] SendDigest -> DEBU 7307 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-09-24 00:27:29.622 UTC [gossip.gossip] handleMessage -> DEBU 7308 Exiting" +"2019-09-24 00:27:29.754 UTC [gossip.comm] func1 -> DEBU 7309 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020a" signature:"0E\002!\000\237\253\013\0055\211\276\350c|\n4\331b\231\t\363\255\325Q\t\355\377\0230h3}\374\203\227x\002 Gi!\367\033d\035K'\242\006\225y\341\271\261G\235\331{\254\234\217\034\343y\343 \341\204\301\332" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:29.756 UTC [gossip.gossip] handleMessage -> DEBU 730a Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020a" signature:"0E\002!\000\237\253\013\0055\211\276\350c|\n4\331b\231\t\363\255\325Q\t\355\377\0230h3}\374\203\227x\002 Gi!\367\033d\035K'\242\006\225y\341\271\261G\235\331{\254\234\217\034\343y\343 \341\204\301\332" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:29.756 UTC [gossip.gossip] handleMessage -> DEBU 730b Exiting" +"2019-09-24 00:27:29.757 UTC [gossip.discovery] handleMsgFromComm -> DEBU 730c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020a" signature:"0E\002!\000\237\253\013\0055\211\276\350c|\n4\331b\231\t\363\255\325Q\t\355\377\0230h3}\374\203\227x\002 Gi!\367\033d\035K'\242\006\225y\341\271\261G\235\331{\254\234\217\034\343y\343 \341\204\301\332" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 00:27:29.757 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 730d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-09-24 00:27:29.757 UTC [msp.identity] Verify -> DEBU 730e Verify: digest = 00000000 64 f9 5c 29 ef f3 91 dd 90 0c be 43 70 6b a2 41 |d.\).......Cpk.A| +00000010 98 d4 12 12 16 fa 7b 6a 24 df 68 ab d7 8f 06 f7 |......{j$.h.....|" +"2019-09-24 00:27:29.757 UTC [msp.identity] Verify -> DEBU 730f Verify: sig = 00000000 30 45 02 21 00 9f ab 0b 05 35 89 be e8 63 7c 0a |0E.!.....5...c|.| +00000010 34 d9 62 99 09 f3 ad d5 51 09 ed ff 13 30 68 33 |4.b.....Q....0h3| +00000020 7d fc 83 97 78 02 20 47 69 21 f7 1b 64 1d 4b 27 |}...x. Gi!..d.K'| +00000030 a2 06 95 79 e1 b9 b1 47 9d d9 7b ac 9c 8f 1c e3 |...y...G..{.....| +00000040 79 e3 20 e1 84 c1 da |y. ....|" +"2019-09-24 00:27:29.758 UTC [msp.identity] Verify -> DEBU 7310 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" -"2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a5 Verify: sig = 00000000 30 44 02 20 76 c6 50 b4 a8 c9 a5 a4 5b 7b a9 51 |0D. v.P.....[{.Q| -00000010 94 dc 4e 9c 23 55 71 69 22 82 7f cf 78 9a 1b 78 |..N.#Uqi"...x..x| -00000020 68 ed 47 62 02 20 50 c6 26 68 cd d4 03 08 49 58 |h.Gb. P.&h....IX| -00000030 f2 d2 42 4f 35 7b 20 5a c9 11 20 5b 1c da bb ab |..BO5{ Z.. [....| -00000040 bc 02 fc 5a 8f 1c |...Z..|" -"2019-07-20 02:41:00.369 UTC [gossip.discovery] handleAliveMessage -> DEBU 49a6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" -"2019-07-20 02:41:00.369 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" -"2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a8 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a9 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " -"2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49aa Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" -"2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49ab Exiting" -"2019-07-20 02:41:00.371 UTC [gossip.discovery] handleAliveMessage -> DEBU 49ac Exiting" -"2019-07-20 02:41:00.371 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49ad Exiting" -"2019-07-20 02:41:00.371 UTC [gossip.discovery] sendMemResponse -> DEBU 49ae Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " -"2019-07-20 02:41:00.371 UTC [msp] DeserializeIdentity -> DEBU 49af Obtaining identity" -"2019-07-20 02:41:00.371 UTC [msp] DeserializeIdentity -> DEBU 49b0 Obtaining identity" -"2019-07-20 02:41:00.372 UTC [gossip.comm] Send -> DEBU 49b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:41:00.372 UTC [gossip.discovery] sendMemResponse -> DEBU 49b2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " -"2019-07-20 02:41:00.372 UTC [gossip.comm] sendToEndpoint -> DEBU 49b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.373 UTC [gossip.comm] sendToEndpoint -> DEBU 49b4 Exiting" -"2019-07-20 02:41:00.454 UTC [endorser] ProcessProposal -> DEBU 49b5 Entering: request from 172.18.0.9:58518" -"2019-07-20 02:41:00.454 UTC [protoutils] ValidateProposalMessage -> DEBU 49b6 ValidateProposalMessage starts for signed proposal 0xc00489c6e0" -"2019-07-20 02:41:00.454 UTC [protoutils] validateChannelHeader -> DEBU 49b7 validateChannelHeader info: header type 3" -"2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49b8 begin" -"2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49b9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" -"2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49ba creator is valid" -"2019-07-20 02:41:00.454 UTC [msp.identity] Verify -> DEBU 49bb Verify: digest = 00000000 85 00 2b dd e9 4c 92 74 a3 7b 02 7e d0 3c 36 7b |..+..L.t.{.~.<6{| -00000010 7d 25 c4 4a c0 db cf b0 65 6e fd 0c cf 78 58 8c |}%.J....en...xX.|" -"2019-07-20 02:41:00.454 UTC [msp.identity] Verify -> DEBU 49bc Verify: sig = 00000000 30 45 02 21 00 9a 0f 58 7d c4 e9 ca 5d 48 78 ad |0E.!...X}...]Hx.| -00000010 55 bf ca 8c 70 23 b2 5d 03 22 41 5e cf e8 fb f1 |U...p#.]."A^....| -00000020 66 a9 4c 17 a7 02 20 33 19 b7 28 e3 af ad dc 21 |f.L... 3..(....!| -00000030 68 a6 a7 71 52 4a ed 03 4a 60 6a ad 1a fb 30 1d |h..qRJ..J`j...0.| -00000040 04 80 97 3f 92 44 a1 |...?.D.|" -"2019-07-20 02:41:00.455 UTC [protoutils] checkSignatureFromCreator -> DEBU 49bd exits successfully" -"2019-07-20 02:41:00.455 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 49be validateChaincodeProposalMessage starts for proposal 0xc003acee70, header 0xc00489caf0" -"2019-07-20 02:41:00.455 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 49bf validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " -"2019-07-20 02:41:00.455 UTC [endorser] preProcess -> DEBU 49c0 [][889970b1] processing txid: 889970b1dd55c6d7693a11bcb651af613bd7efe1575aa44d9c9631b5ded063c7" -"2019-07-20 02:41:00.455 UTC [endorser] SimulateProposal -> DEBU 49c1 [][889970b1] Entry chaincode: name:"qscc" " -"2019-07-20 02:41:00.455 UTC [endorser] callChaincode -> INFO 49c2 [][889970b1] Entry chaincode: name:"qscc" " -"2019-07-20 02:41:00.455 UTC [chaincode] Execute -> DEBU 49c3 Entry" -"2019-07-20 02:41:00.455 UTC [qscc] Invoke -> DEBU 49c4 Invoke function: GetChainInfo on chain: businesschannel" -"2019-07-20 02:41:00.455 UTC [aclmgmt] CheckACL -> DEBU 49c5 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" -"2019-07-20 02:41:00.455 UTC [aclmgmt] CheckACL -> DEBU 49c6 acl check(/Channel/Application/Readers)" -"2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:41:00.455 UTC [msp] DeserializeIdentity -> DEBU 49ca Obtaining identity" -"2019-07-20 02:41:00.455 UTC [msp.identity] newIdentity -> DEBU 49cb Creating identity instance for cert -----BEGIN CERTIFICATE----- +"2019-09-24 00:27:29.758 UTC [msp.identity] Verify -> DEBU 7311 Verify: sig = 00000000 30 44 02 20 05 ac 53 33 c0 a6 b0 77 e8 e7 83 cd |0D. ..S3...w....| +00000010 92 b4 3b 6a 49 5c b6 48 91 8a c8 bc 85 5a 07 da |..;jI\.H.....Z..| +00000020 41 6b b4 e7 02 20 44 88 f9 d5 57 7d f1 a2 7c 56 |Ak... D...W}..|V| +00000030 aa 08 b1 67 d0 b1 09 7f 73 fc c2 cb da 1f 8f 1e |...g....s.......| +00000040 6f 7b 31 14 6a 78 |o{1.jx|" +"2019-09-24 00:27:29.759 UTC [gossip.discovery] handleAliveMessage -> DEBU 7312 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 00:27:29.759 UTC [gossip.discovery] learnExistingMembers -> DEBU 7313 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 00:27:29.759 UTC [gossip.discovery] learnExistingMembers -> DEBU 7314 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:29.759 UTC [gossip.discovery] learnExistingMembers -> DEBU 7315 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-09-24 00:27:29.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 7316 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:29.760 UTC [gossip.discovery] learnExistingMembers -> DEBU 7317 Exiting" +"2019-09-24 00:27:29.760 UTC [gossip.discovery] handleAliveMessage -> DEBU 7318 Exiting" +"2019-09-24 00:27:29.760 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7319 Exiting" +"2019-09-24 00:27:29.761 UTC [gossip.discovery] sendMemResponse -> DEBU 731a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-09-24 00:27:29.761 UTC [msp] DeserializeIdentity -> DEBU 731b Obtaining identity" +"2019-09-24 00:27:29.761 UTC [msp] DeserializeIdentity -> DEBU 731c Obtaining identity" +"2019-09-24 00:27:29.762 UTC [gossip.comm] Send -> DEBU 731d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 00:27:29.762 UTC [gossip.discovery] sendMemResponse -> DEBU 731e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\364\365\213\276\231\203\316\343\025\020a" signature:"0E\002!\000\237\253\013\0055\211\276\350c|\n4\331b\231\t\363\255\325Q\t\355\377\0230h3}\374\203\227x\002 Gi!\367\033d\035K'\242\006\225y\341\271\261G\235\331{\254\234\217\034\343y\343 \341\204\301\332" secret_envelope: > alive: " +"2019-09-24 00:27:29.762 UTC [gossip.comm] sendToEndpoint -> DEBU 731f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 00:27:29.763 UTC [gossip.comm] sendToEndpoint -> DEBU 7320 Exiting" +"2019-09-24 00:27:29.781 UTC [endorser] ProcessProposal -> DEBU 7321 Entering: request from 172.18.0.9:51132" +"2019-09-24 00:27:29.781 UTC [protoutils] ValidateProposalMessage -> DEBU 7322 ValidateProposalMessage starts for signed proposal 0xc00567b5e0" +"2019-09-24 00:27:29.781 UTC [protoutils] validateChannelHeader -> DEBU 7323 validateChannelHeader info: header type 3" +"2019-09-24 00:27:29.782 UTC [protoutils] checkSignatureFromCreator -> DEBU 7324 begin" +"2019-09-24 00:27:29.782 UTC [protoutils] checkSignatureFromCreator -> DEBU 7325 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:29.782 UTC [protoutils] checkSignatureFromCreator -> DEBU 7326 creator is valid" +"2019-09-24 00:27:29.782 UTC [msp.identity] Verify -> DEBU 7327 Verify: digest = 00000000 5e 36 9a c9 17 49 04 74 47 08 8a 16 58 ee 27 40 |^6...I.tG...X.'@| +00000010 bd c2 86 17 e7 ed dc d3 56 81 59 c2 55 0a cf 38 |........V.Y.U..8|" +"2019-09-24 00:27:29.783 UTC [msp.identity] Verify -> DEBU 7328 Verify: sig = 00000000 30 45 02 21 00 a8 8d 4b 63 9d 5f 95 d0 2b 0c 0a |0E.!...Kc._..+..| +00000010 a1 b8 4d 1a a5 a6 1d 49 bd 2f c3 47 1b 9a bd 06 |..M....I./.G....| +00000020 66 87 6a fc 78 02 20 21 03 37 a3 04 f9 ce 4a d4 |f.j.x. !.7....J.| +00000030 77 da 8f d0 bd 94 e8 f7 6f c1 3a d5 a6 01 c2 13 |w.......o.:.....| +00000040 69 f9 17 b7 2a 99 3f |i...*.?|" +"2019-09-24 00:27:29.783 UTC [protoutils] checkSignatureFromCreator -> DEBU 7329 exits successfully" +"2019-09-24 00:27:29.783 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 732a validateChaincodeProposalMessage starts for proposal 0xc00567c690, header 0xc00567b9f0" +"2019-09-24 00:27:29.784 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 732b validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-09-24 00:27:29.784 UTC [endorser] preProcess -> DEBU 732c [][a745125c] processing txid: a745125c0c61d19c7b88be7588ace89ac7666966956f3b51976cf7672914e13e" +"2019-09-24 00:27:29.784 UTC [endorser] SimulateProposal -> DEBU 732d [][a745125c] Entry chaincode: name:"cscc" " +"2019-09-24 00:27:29.784 UTC [endorser] callChaincode -> INFO 732e [][a745125c] Entry chaincode: name:"cscc" " +"2019-09-24 00:27:29.784 UTC [chaincode] Execute -> DEBU 732f Entry" +"2019-09-24 00:27:29.785 UTC [cscc] Invoke -> DEBU 7330 Invoke function: GetChannels" +"2019-09-24 00:27:29.785 UTC [msp.identity] Verify -> DEBU 7331 Verify: digest = 00000000 5e 36 9a c9 17 49 04 74 47 08 8a 16 58 ee 27 40 |^6...I.tG...X.'@| +00000010 bd c2 86 17 e7 ed dc d3 56 81 59 c2 55 0a cf 38 |........V.Y.U..8|" +"2019-09-24 00:27:29.785 UTC [msp.identity] Verify -> DEBU 7332 Verify: sig = 00000000 30 45 02 21 00 a8 8d 4b 63 9d 5f 95 d0 2b 0c 0a |0E.!...Kc._..+..| +00000010 a1 b8 4d 1a a5 a6 1d 49 bd 2f c3 47 1b 9a bd 06 |..M....I./.G....| +00000020 66 87 6a fc 78 02 20 21 03 37 a3 04 f9 ce 4a d4 |f.j.x. !.7....J.| +00000030 77 da 8f d0 bd 94 e8 f7 6f c1 3a d5 a6 01 c2 13 |w.......o.:.....| +00000040 69 f9 17 b7 2a 99 3f |i...*.?|" +"2019-09-24 00:27:29.786 UTC [chaincode] handleMessage -> DEBU 7333 [a745125c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:29.786 UTC [chaincode] Notify -> DEBU 7334 [a745125c] notifying Txid:a745125c0c61d19c7b88be7588ace89ac7666966956f3b51976cf7672914e13e, channelID:" +"2019-09-24 00:27:29.786 UTC [chaincode] Execute -> DEBU 7335 Exit" +"2019-09-24 00:27:29.786 UTC [endorser] callChaincode -> INFO 7336 [][a745125c] Exit chaincode: name:"cscc" (2ms)" +"2019-09-24 00:27:29.786 UTC [endorser] SimulateProposal -> DEBU 7337 [][a745125c] Exit" +"2019-09-24 00:27:29.787 UTC [endorser] func1 -> DEBU 7338 Exit: request from 172.18.0.9:51132" +"2019-09-24 00:27:29.787 UTC [comm.grpc.server] 1 -> INFO 7339 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51132 grpc.code=OK grpc.call_duration=6.2531ms +"2019-09-24 00:27:29.790 UTC [grpc] infof -> DEBU 733a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:29.917 UTC [gossip.comm] func1 -> DEBU 733b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.918 UTC [gossip.gossip] handleMessage -> DEBU 733c Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.918 UTC [gossip.gossip] handleMessage -> DEBU 733d Exiting" +"2019-09-24 00:27:29.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 733e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.920 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 733f Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-09-24 00:27:29.920 UTC [msp] DeserializeIdentity -> DEBU 7340 Obtaining identity" +"2019-09-24 00:27:29.921 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7341 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:29.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7342 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:29.922 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7343 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:29.922 UTC [policies] Evaluate -> DEBU 7344 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:29.922 UTC [policies] Evaluate -> DEBU 7345 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:29.922 UTC [policies] Evaluate -> DEBU 7346 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:29.923 UTC [gossip.comm] func1 -> DEBU 7347 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.923 UTC [gossip.gossip] handleMessage -> DEBU 7348 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.924 UTC [cauthdsl] func1 -> DEBU 7349 0xc0057d8550 gate 1569284849924416200 evaluation starts" +"2019-09-24 00:27:29.924 UTC [cauthdsl] func2 -> DEBU 734a 0xc0057d8550 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:29.925 UTC [cauthdsl] func2 -> DEBU 734b 0xc0057d8550 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:29.925 UTC [cauthdsl] func2 -> DEBU 734c 0xc0057d8550 principal matched by identity 0" +"2019-09-24 00:27:29.926 UTC [msp.identity] Verify -> DEBU 734d Verify: digest = 00000000 6e e4 6e 3e 07 68 46 7a 0a ad 12 32 a1 99 8e b8 |n.n>.hFz...2....| +00000010 d7 9b c4 ae f9 68 dd d0 76 69 41 d0 b8 d1 94 2d |.....h..viA....-|" +"2019-09-24 00:27:29.926 UTC [msp.identity] Verify -> DEBU 734e Verify: sig = 00000000 30 45 02 21 00 80 da 9e ac 23 12 bf 8f 17 4b d0 |0E.!.....#....K.| +00000010 96 41 fc 3b 20 0d c7 8a 8b ab 1e 3c d8 da 80 53 |.A.; ......<...S| +00000020 ac 64 25 a7 b1 02 20 0c 99 62 aa 5a f6 35 2d 96 |.d%... ..b.Z.5-.| +00000030 02 20 39 f7 95 e2 ad 8b 6e a3 ef cc ae 9b 4c 44 |. 9.....n.....LD| +00000040 47 3a 07 02 c7 0f d3 |G:.....|" +"2019-09-24 00:27:29.927 UTC [cauthdsl] func2 -> DEBU 734f 0xc0057d8550 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:29.927 UTC [cauthdsl] func1 -> DEBU 7350 0xc0057d8550 gate 1569284849924416200 evaluation succeeds" +"2019-09-24 00:27:29.927 UTC [policies] Evaluate -> DEBU 7351 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:29.927 UTC [policies] Evaluate -> DEBU 7352 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:29.927 UTC [policies] Evaluate -> DEBU 7353 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:29.928 UTC [policies] Evaluate -> DEBU 7354 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:29.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 7355 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 7356 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:29.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 7357 updating membership: timestamp: " +"2019-09-24 00:27:29.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 7358 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:29.930 UTC [gossip.comm] func1 -> DEBU 7359 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 735a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 00:27:29.930 UTC [gossip.discovery] learnExistingMembers -> DEBU 735b Exiting" +"2019-09-24 00:27:29.930 UTC [gossip.discovery] handleAliveMessage -> DEBU 735c Exiting" +"2019-09-24 00:27:29.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 735d Exiting" +"2019-09-24 00:27:29.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 735e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 735f Exiting" +"2019-09-24 00:27:29.931 UTC [gossip.gossip] handleMessage -> DEBU 7360 Exiting" +"2019-09-24 00:27:29.931 UTC [gossip.gossip] handleMessage -> DEBU 7361 Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.931 UTC [gossip.gossip] handleMessage -> DEBU 7362 Exiting" +"2019-09-24 00:27:29.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7363 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7364 Exiting" +"2019-09-24 00:27:29.933 UTC [msp] DeserializeIdentity -> DEBU 7365 Obtaining identity" +"2019-09-24 00:27:29.933 UTC [msp] DeserializeIdentity -> DEBU 7366 Obtaining identity" +"2019-09-24 00:27:29.933 UTC [msp] DeserializeIdentity -> DEBU 7367 Obtaining identity" +"2019-09-24 00:27:29.933 UTC [msp] DeserializeIdentity -> DEBU 7368 Obtaining identity" +"2019-09-24 00:27:29.933 UTC [msp] DeserializeIdentity -> DEBU 7369 Obtaining identity" +"2019-09-24 00:27:29.934 UTC [msp] DeserializeIdentity -> DEBU 736a Obtaining identity" +"2019-09-24 00:27:29.934 UTC [msp] DeserializeIdentity -> DEBU 736b Obtaining identity" +"2019-09-24 00:27:29.934 UTC [gossip.comm] Send -> DEBU 736c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:29.934 UTC [msp] DeserializeIdentity -> DEBU 736d Obtaining identity" +"2019-09-24 00:27:29.934 UTC [gossip.comm] Send -> DEBU 736e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:29.935 UTC [gossip.comm] sendToEndpoint -> DEBU 736f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.935 UTC [gossip.comm] sendToEndpoint -> DEBU 7370 Exiting" +"2019-09-24 00:27:29.935 UTC [gossip.comm] sendToEndpoint -> DEBU 7371 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:29.937 UTC [gossip.comm] sendToEndpoint -> DEBU 7372 Exiting" +"2019-09-24 00:27:29.974 UTC [gossip.comm] func1 -> DEBU 7373 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:29.974 UTC [gossip.gossip] handleMessage -> DEBU 7374 Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 00:27:29.974 UTC [msp] DeserializeIdentity -> DEBU 7375 Obtaining identity" +"2019-09-24 00:27:29.975 UTC [msp] DeserializeIdentity -> DEBU 7376 Obtaining identity" +"2019-09-24 00:27:29.975 UTC [msp] DeserializeIdentity -> DEBU 7377 Obtaining identity" +"2019-09-24 00:27:29.975 UTC [gossip.gossip] handleMessage -> DEBU 7378 Exiting" +"2019-09-24 00:27:30.559 UTC [endorser] ProcessProposal -> DEBU 7379 Entering: request from 172.18.0.9:51140" +"2019-09-24 00:27:30.559 UTC [protoutils] ValidateProposalMessage -> DEBU 737a ValidateProposalMessage starts for signed proposal 0xc0057d0c30" +"2019-09-24 00:27:30.560 UTC [protoutils] validateChannelHeader -> DEBU 737b validateChannelHeader info: header type 3" +"2019-09-24 00:27:30.560 UTC [protoutils] checkSignatureFromCreator -> DEBU 737c begin" +"2019-09-24 00:27:30.560 UTC [protoutils] checkSignatureFromCreator -> DEBU 737d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-09-24 00:27:30.560 UTC [protoutils] checkSignatureFromCreator -> DEBU 737e creator is valid" +"2019-09-24 00:27:30.560 UTC [msp.identity] Verify -> DEBU 737f Verify: digest = 00000000 4d dd ea c6 54 8d b9 1a 3c 52 21 dd ca 7e 55 29 |M...T... DEBU 7380 Verify: sig = 00000000 30 45 02 21 00 cd 7a 60 dd 34 18 1a fc ec 25 28 |0E.!..z`.4....%(| +00000010 63 45 c3 c5 e6 db fd b5 d5 f8 a9 b7 88 d0 75 c7 |cE............u.| +00000020 96 56 50 3a 75 02 20 7c 59 d0 9c f7 a8 cc 6c 2c |.VP:u. |Y.....l,| +00000030 c3 27 40 ee ef a6 3b c6 36 1c 5f ee da fb 40 36 |.'@...;.6._...@6| +00000040 0e 78 6b ad d3 65 f2 |.xk..e.|" +"2019-09-24 00:27:30.560 UTC [protoutils] checkSignatureFromCreator -> DEBU 7381 exits successfully" +"2019-09-24 00:27:30.560 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 7382 validateChaincodeProposalMessage starts for proposal 0xc00567ccb0, header 0xc0057d1040" +"2019-09-24 00:27:30.561 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 7383 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-09-24 00:27:30.561 UTC [endorser] preProcess -> DEBU 7384 [][cb32f5b6] processing txid: cb32f5b671558f944ff7e6d05111908a27f6db687869e59f5b7d22afa5f9b9f0" +"2019-09-24 00:27:30.561 UTC [endorser] SimulateProposal -> DEBU 7385 [][cb32f5b6] Entry chaincode: name:"qscc" " +"2019-09-24 00:27:30.561 UTC [endorser] callChaincode -> INFO 7386 [][cb32f5b6] Entry chaincode: name:"qscc" " +"2019-09-24 00:27:30.561 UTC [chaincode] Execute -> DEBU 7387 Entry" +"2019-09-24 00:27:30.561 UTC [qscc] Invoke -> DEBU 7388 Invoke function: GetChainInfo on chain: businesschannel" +"2019-09-24 00:27:30.561 UTC [aclmgmt] CheckACL -> DEBU 7389 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-09-24 00:27:30.562 UTC [aclmgmt] CheckACL -> DEBU 738a acl check(/Channel/Application/Readers)" +"2019-09-24 00:27:30.562 UTC [policies] Evaluate -> DEBU 738b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:30.562 UTC [policies] Evaluate -> DEBU 738c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:30.562 UTC [policies] Evaluate -> DEBU 738d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:30.562 UTC [msp] DeserializeIdentity -> DEBU 738e Obtaining identity" +"2019-09-24 00:27:30.563 UTC [msp.identity] newIdentity -> DEBU 738f Creating identity instance for cert -----BEGIN CERTIFICATE----- MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh @@ -22806,464 +35797,111 @@ VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== -----END CERTIFICATE-----" -"2019-07-20 02:41:00.455 UTC [cauthdsl] func1 -> DEBU 49cc 0xc0048f4830 gate 1563590460455929300 evaluation starts" -"2019-07-20 02:41:00.455 UTC [cauthdsl] func2 -> DEBU 49cd 0xc0048f4830 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49ce 0xc0048f4830 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49cf 0xc0048f4830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" -"2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d0 0xc0048f4830 principal evaluation fails" -"2019-07-20 02:41:00.456 UTC [cauthdsl] func1 -> DEBU 49d1 0xc0048f4830 gate 1563590460455929300 evaluation fails" -"2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:41:00.456 UTC [cauthdsl] func1 -> DEBU 49d5 0xc0048f59b0 gate 1563590460456331400 evaluation starts" -"2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d6 0xc0048f59b0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d7 0xc0048f59b0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.456 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 49d8 Checking if identity satisfies MEMBER role for Org1MSP" -"2019-07-20 02:41:00.456 UTC [msp] Validate -> DEBU 49d9 MSP Org1MSP validating identity" -"2019-07-20 02:41:00.456 UTC [msp] getCertificationChain -> DEBU 49da MSP Org1MSP getting certification chain" -"2019-07-20 02:41:00.458 UTC [cauthdsl] func2 -> DEBU 49db 0xc0048f59b0 principal matched by identity 0" -"2019-07-20 02:41:00.458 UTC [msp.identity] Verify -> DEBU 49dc Verify: digest = 00000000 85 00 2b dd e9 4c 92 74 a3 7b 02 7e d0 3c 36 7b |..+..L.t.{.~.<6{| -00000010 7d 25 c4 4a c0 db cf b0 65 6e fd 0c cf 78 58 8c |}%.J....en...xX.|" -"2019-07-20 02:41:00.458 UTC [msp.identity] Verify -> DEBU 49dd Verify: sig = 00000000 30 45 02 21 00 9a 0f 58 7d c4 e9 ca 5d 48 78 ad |0E.!...X}...]Hx.| -00000010 55 bf ca 8c 70 23 b2 5d 03 22 41 5e cf e8 fb f1 |U...p#.]."A^....| -00000020 66 a9 4c 17 a7 02 20 33 19 b7 28 e3 af ad dc 21 |f.L... 3..(....!| -00000030 68 a6 a7 71 52 4a ed 03 4a 60 6a ad 1a fb 30 1d |h..qRJ..J`j...0.| -00000040 04 80 97 3f 92 44 a1 |...?.D.|" -"2019-07-20 02:41:00.459 UTC [cauthdsl] func2 -> DEBU 49de 0xc0048f59b0 principal evaluation succeeds for identity 0" -"2019-07-20 02:41:00.459 UTC [cauthdsl] func1 -> DEBU 49df 0xc0048f59b0 gate 1563590460456331400 evaluation succeeds" -"2019-07-20 02:41:00.460 UTC [policies] Evaluate -> DEBU 49e0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e2 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:41:00.461 UTC [chaincode] handleMessage -> DEBU 49e4 [889970b1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" -"2019-07-20 02:41:00.461 UTC [chaincode] Notify -> DEBU 49e5 [889970b1] notifying Txid:889970b1dd55c6d7693a11bcb651af613bd7efe1575aa44d9c9631b5ded063c7, channelID:" -"2019-07-20 02:41:00.461 UTC [chaincode] Execute -> DEBU 49e6 Exit" -"2019-07-20 02:41:00.462 UTC [endorser] callChaincode -> INFO 49e7 [][889970b1] Exit chaincode: name:"qscc" (7ms)" -"2019-07-20 02:41:00.462 UTC [endorser] SimulateProposal -> DEBU 49e8 [][889970b1] Exit" -"2019-07-20 02:41:00.462 UTC [endorser] func1 -> DEBU 49e9 Exit: request from 172.18.0.9:58518" -"2019-07-20 02:41:00.462 UTC [comm.grpc.server] 1 -> INFO 49ea unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58518 grpc.code=OK grpc.call_duration=8.4046ms -"2019-07-20 02:41:00.466 UTC [grpc] infof -> DEBU 49eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" -"2019-07-20 02:41:00.588 UTC [gossip.comm] func1 -> DEBU 49ec Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.588 UTC [gossip.gossip] handleMessage -> DEBU 49ed Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.588 UTC [gossip.gossip] handleMessage -> DEBU 49ee Exiting" -"2019-07-20 02:41:00.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49ef Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.589 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49f0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" -"2019-07-20 02:41:00.590 UTC [msp] DeserializeIdentity -> DEBU 49f1 Obtaining identity" -"2019-07-20 02:41:00.600 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:41:00.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49f3 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49f4 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.601 UTC [policies] Evaluate -> DEBU 49f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:41:00.601 UTC [policies] Evaluate -> DEBU 49f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:41:00.602 UTC [policies] Evaluate -> DEBU 49f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:41:00.601 UTC [gossip.comm] func1 -> DEBU 49f7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.602 UTC [gossip.gossip] handleMessage -> DEBU 49f9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.603 UTC [gossip.pull] HandleMessage -> DEBU 49fa GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.603 UTC [msp] DeserializeIdentity -> DEBU 49fb Obtaining identity" -"2019-07-20 02:41:00.605 UTC [msp] DeserializeIdentity -> DEBU 49fc Obtaining identity" -"2019-07-20 02:41:00.612 UTC [msp] DeserializeIdentity -> DEBU 49fd Obtaining identity" -"2019-07-20 02:41:00.579 UTC [msp] DeserializeIdentity -> DEBU 49fe Obtaining identity" -"2019-07-20 02:41:00.580 UTC [msp] DeserializeIdentity -> DEBU 49ff Obtaining identity" -"2019-07-20 02:41:00.580 UTC [msp] DeserializeIdentity -> DEBU 4a00 Obtaining identity" -"2019-07-20 02:41:00.581 UTC [gossip.pull] SendDigest -> DEBU 4a01 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" -"2019-07-20 02:41:00.581 UTC [gossip.gossip] handleMessage -> DEBU 4a02 Exiting" -"2019-07-20 02:41:00.582 UTC [cauthdsl] func1 -> DEBU 4a03 0xc0048e5110 gate 1563590460582117800 evaluation starts" -"2019-07-20 02:41:00.582 UTC [cauthdsl] func2 -> DEBU 4a04 0xc0048e5110 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.584 UTC [cauthdsl] func2 -> DEBU 4a05 0xc0048e5110 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.584 UTC [cauthdsl] func2 -> DEBU 4a06 0xc0048e5110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:41:00.585 UTC [cauthdsl] func2 -> DEBU 4a07 0xc0048e5110 principal evaluation fails" -"2019-07-20 02:41:00.585 UTC [cauthdsl] func1 -> DEBU 4a08 0xc0048e5110 gate 1563590460582117800 evaluation fails" -"2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a09 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a0a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:41:00.586 UTC [cauthdsl] func1 -> DEBU 4a0c 0xc0048e5950 gate 1563590460585973400 evaluation starts" -"2019-07-20 02:41:00.586 UTC [cauthdsl] func2 -> DEBU 4a0d 0xc0048e5950 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.587 UTC [cauthdsl] func2 -> DEBU 4a0e 0xc0048e5950 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.587 UTC [cauthdsl] func2 -> DEBU 4a0f 0xc0048e5950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:41:00.588 UTC [cauthdsl] func2 -> DEBU 4a10 0xc0048e5950 principal evaluation fails" -"2019-07-20 02:41:00.588 UTC [cauthdsl] func1 -> DEBU 4a11 0xc0048e5950 gate 1563590460585973400 evaluation fails" -"2019-07-20 02:41:00.588 UTC [policies] Evaluate -> DEBU 4a12 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.588 UTC [policies] Evaluate -> DEBU 4a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.589 UTC [policies] Evaluate -> DEBU 4a14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:41:00.589 UTC [cauthdsl] func1 -> DEBU 4a15 0xc00493c190 gate 1563590460589535900 evaluation starts" -"2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a16 0xc00493c190 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a17 0xc00493c190 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a18 0xc00493c190 principal matched by identity 0" -"2019-07-20 02:41:00.590 UTC [msp.identity] Verify -> DEBU 4a19 Verify: digest = 00000000 1d c4 48 eb 09 63 c9 43 1e 9c 1f 98 2a 93 3c 43 |..H..c.C....*. DEBU 4a1a Verify: sig = 00000000 30 44 02 20 6b ea f9 b0 bf 96 e2 a2 ef b3 af aa |0D. k...........| -00000010 cc 76 8c a9 97 a4 50 c7 b8 ea 41 9c 8a 4f b9 76 |.v....P...A..O.v| -00000020 a4 2f dd 96 02 20 1d aa 85 90 7f 83 96 e4 68 d9 |./... ........h.| -00000030 f7 20 c0 66 07 0f b2 7e 51 5f 88 b8 87 e4 29 17 |. .f...~Q_....).| -00000040 d9 96 73 42 71 fb |..sBq.|" -"2019-07-20 02:41:00.591 UTC [cauthdsl] func2 -> DEBU 4a1b 0xc00493c190 principal evaluation succeeds for identity 0" -"2019-07-20 02:41:00.591 UTC [cauthdsl] func1 -> DEBU 4a1c 0xc00493c190 gate 1563590460589535900 evaluation succeeds" -"2019-07-20 02:41:00.591 UTC [policies] Evaluate -> DEBU 4a1d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.591 UTC [policies] Evaluate -> DEBU 4a1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.592 UTC [policies] Evaluate -> DEBU 4a1f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:41:00.592 UTC [policies] Evaluate -> DEBU 4a20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:41:00.592 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a21 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" -"2019-07-20 02:41:00.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a22 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" -"2019-07-20 02:41:00.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a23 updating membership: timestamp: " -"2019-07-20 02:41:00.593 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a24 Updating aliveness data: membership: timestamp: " -"2019-07-20 02:41:00.593 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a25 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" -"2019-07-20 02:41:00.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a26 Exiting" -"2019-07-20 02:41:00.596 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a27 Exiting" -"2019-07-20 02:41:00.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a28 Exiting" -"2019-07-20 02:41:00.596 UTC [gossip.discovery] sendMemResponse -> DEBU 4a29 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " -"2019-07-20 02:41:00.597 UTC [msp] DeserializeIdentity -> DEBU 4a2a Obtaining identity" -"2019-07-20 02:41:00.597 UTC [msp] DeserializeIdentity -> DEBU 4a2b Obtaining identity" -"2019-07-20 02:41:00.598 UTC [msp] DeserializeIdentity -> DEBU 4a2c Obtaining identity" -"2019-07-20 02:41:00.598 UTC [gossip.comm] Send -> DEBU 4a2d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:41:00.598 UTC [gossip.discovery] sendMemResponse -> DEBU 4a2e Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" > alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " -"2019-07-20 02:41:00.598 UTC [gossip.comm] sendToEndpoint -> DEBU 4a2f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.598 UTC [gossip.comm] sendToEndpoint -> DEBU 4a30 Exiting" -"2019-07-20 02:41:00.648 UTC [msp] DeserializeIdentity -> DEBU 4a31 Obtaining identity" -"2019-07-20 02:41:00.648 UTC [msp] DeserializeIdentity -> DEBU 4a32 Obtaining identity" -"2019-07-20 02:41:00.648 UTC [gossip.comm] Send -> DEBU 4a33 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" -"2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a34 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a35 Exiting" -"2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a36 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a37 Exiting" -"2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a38 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.650 UTC [gossip.comm] sendToEndpoint -> DEBU 4a39 Exiting" -"2019-07-20 02:41:00.651 UTC [gossip.comm] func1 -> DEBU 4a3a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.651 UTC [gossip.gossip] handleMessage -> DEBU 4a3b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.651 UTC [msp] DeserializeIdentity -> DEBU 4a3c Obtaining identity" -"2019-07-20 02:41:00.651 UTC [msp] DeserializeIdentity -> DEBU 4a3d Obtaining identity" -"2019-07-20 02:41:00.652 UTC [msp] DeserializeIdentity -> DEBU 4a3e Obtaining identity" -"2019-07-20 02:41:00.653 UTC [gossip.comm] func1 -> DEBU 4a3f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.653 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:41:00.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a41 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a42 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.659 UTC [policies] Evaluate -> DEBU 4a43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:41:00.659 UTC [policies] Evaluate -> DEBU 4a44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:41:00.660 UTC [policies] Evaluate -> DEBU 4a45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:41:00.660 UTC [cauthdsl] func1 -> DEBU 4a46 0xc004962cc0 gate 1563590460660063900 evaluation starts" -"2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a47 0xc004962cc0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a48 0xc004962cc0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a49 0xc004962cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a4a 0xc004962cc0 principal evaluation fails" -"2019-07-20 02:41:00.660 UTC [cauthdsl] func1 -> DEBU 4a4b 0xc004962cc0 gate 1563590460660063900 evaluation fails" -"2019-07-20 02:41:00.660 UTC [policies] Evaluate -> DEBU 4a4c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.661 UTC [policies] Evaluate -> DEBU 4a4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.661 UTC [policies] Evaluate -> DEBU 4a4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:41:00.662 UTC [cauthdsl] func1 -> DEBU 4a4f 0xc004963500 gate 1563590460662627300 evaluation starts" -"2019-07-20 02:41:00.662 UTC [cauthdsl] func2 -> DEBU 4a50 0xc004963500 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a51 0xc004963500 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a52 0xc004963500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a53 0xc004963500 principal evaluation fails" -"2019-07-20 02:41:00.663 UTC [cauthdsl] func1 -> DEBU 4a54 0xc004963500 gate 1563590460662627300 evaluation fails" -"2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a55 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:41:00.663 UTC [cauthdsl] func1 -> DEBU 4a58 0xc004963d40 gate 1563590460663562700 evaluation starts" -"2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a59 0xc004963d40 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.664 UTC [cauthdsl] func2 -> DEBU 4a5a 0xc004963d40 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.665 UTC [cauthdsl] func2 -> DEBU 4a5b 0xc004963d40 principal matched by identity 0" -"2019-07-20 02:41:00.666 UTC [msp.identity] Verify -> DEBU 4a5c Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:41:00.667 UTC [msp.identity] Verify -> DEBU 4a5d Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:41:00.668 UTC [cauthdsl] func2 -> DEBU 4a5e 0xc004963d40 principal evaluation succeeds for identity 0" -"2019-07-20 02:41:00.668 UTC [cauthdsl] func1 -> DEBU 4a5f 0xc004963d40 gate 1563590460663562700 evaluation succeeds" -"2019-07-20 02:41:00.668 UTC [policies] Evaluate -> DEBU 4a60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.669 UTC [policies] Evaluate -> DEBU 4a61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.669 UTC [policies] Evaluate -> DEBU 4a62 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:41:00.670 UTC [policies] Evaluate -> DEBU 4a63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:41:00.678 UTC [msp.identity] Verify -> DEBU 4a64 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -"2019-07-20 02:41:00.679 UTC [msp.identity] Verify -> DEBU 4a65 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -00000040 04 ec df 98 3f 3b |....?;|" -"2019-07-20 02:41:00.685 UTC [msp.identity] Verify -> DEBU 4a66 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:41:00.685 UTC [msp.identity] Verify -> DEBU 4a67 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:41:00.692 UTC [msp] DeserializeIdentity -> DEBU 4a68 Obtaining identity" -"2019-07-20 02:41:00.694 UTC [msp] DeserializeIdentity -> DEBU 4a69 Obtaining identity" -"2019-07-20 02:41:00.694 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:41:00.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a6b Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a6c Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:41:00.695 UTC [cauthdsl] func1 -> DEBU 4a70 0xc00498a350 gate 1563590460695543200 evaluation starts" -"2019-07-20 02:41:00.695 UTC [cauthdsl] func2 -> DEBU 4a71 0xc00498a350 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.695 UTC [cauthdsl] func2 -> DEBU 4a72 0xc00498a350 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.696 UTC [cauthdsl] func2 -> DEBU 4a73 0xc00498a350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:41:00.696 UTC [cauthdsl] func2 -> DEBU 4a74 0xc00498a350 principal evaluation fails" -"2019-07-20 02:41:00.696 UTC [cauthdsl] func1 -> DEBU 4a75 0xc00498a350 gate 1563590460695543200 evaluation fails" -"2019-07-20 02:41:00.696 UTC [policies] Evaluate -> DEBU 4a76 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.697 UTC [policies] Evaluate -> DEBU 4a77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.697 UTC [policies] Evaluate -> DEBU 4a78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:41:00.697 UTC [cauthdsl] func1 -> DEBU 4a79 0xc00498ab90 gate 1563590460697495500 evaluation starts" -"2019-07-20 02:41:00.697 UTC [cauthdsl] func2 -> DEBU 4a7a 0xc00498ab90 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7b 0xc00498ab90 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7c 0xc00498ab90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7d 0xc00498ab90 principal evaluation fails" -"2019-07-20 02:41:00.698 UTC [cauthdsl] func1 -> DEBU 4a7e 0xc00498ab90 gate 1563590460697495500 evaluation fails" -"2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a7f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a81 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:41:00.699 UTC [cauthdsl] func1 -> DEBU 4a82 0xc00498b3d0 gate 1563590460699017400 evaluation starts" -"2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a83 0xc00498b3d0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a84 0xc00498b3d0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a85 0xc00498b3d0 principal matched by identity 0" -"2019-07-20 02:41:00.702 UTC [msp.identity] Verify -> DEBU 4a86 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:41:00.702 UTC [msp.identity] Verify -> DEBU 4a87 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:41:00.702 UTC [cauthdsl] func2 -> DEBU 4a88 0xc00498b3d0 principal evaluation succeeds for identity 0" -"2019-07-20 02:41:00.703 UTC [cauthdsl] func1 -> DEBU 4a89 0xc00498b3d0 gate 1563590460699017400 evaluation succeeds" -"2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8c Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:41:00.704 UTC [policies] Evaluate -> DEBU 4a8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:41:00.704 UTC [gossip.gossip] handleMessage -> DEBU 4a8e Exiting" -"2019-07-20 02:41:00.705 UTC [gossip.gossip] handleMessage -> DEBU 4a8f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.705 UTC [msp.identity] Verify -> DEBU 4a90 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:41:00.705 UTC [msp.identity] Verify -> DEBU 4a91 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:41:00.706 UTC [msp.identity] Verify -> DEBU 4a92 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -"2019-07-20 02:41:00.706 UTC [msp.identity] Verify -> DEBU 4a93 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -00000040 04 ec df 98 3f 3b |....?;|" -"2019-07-20 02:41:00.706 UTC [msp] DeserializeIdentity -> DEBU 4a94 Obtaining identity" -"2019-07-20 02:41:00.706 UTC [msp] DeserializeIdentity -> DEBU 4a95 Obtaining identity" -"2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a97 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a98 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.712 UTC [policies] Evaluate -> DEBU 4a99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:41:00.713 UTC [policies] Evaluate -> DEBU 4a9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:41:00.713 UTC [policies] Evaluate -> DEBU 4a9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:41:00.713 UTC [cauthdsl] func1 -> DEBU 4a9c 0xc004999c20 gate 1563590460713243100 evaluation starts" -"2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9d 0xc004999c20 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9e 0xc004999c20 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9f 0xc004999c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:41:00.714 UTC [cauthdsl] func2 -> DEBU 4aa0 0xc004999c20 principal evaluation fails" -"2019-07-20 02:41:00.714 UTC [cauthdsl] func1 -> DEBU 4aa1 0xc004999c20 gate 1563590460713243100 evaluation fails" -"2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:41:00.714 UTC [cauthdsl] func1 -> DEBU 4aa5 0xc0049b8460 gate 1563590460714843000 evaluation starts" -"2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa6 0xc0049b8460 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa7 0xc0049b8460 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa8 0xc0049b8460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa9 0xc0049b8460 principal evaluation fails" -"2019-07-20 02:41:00.719 UTC [cauthdsl] func1 -> DEBU 4aaa 0xc0049b8460 gate 1563590460714843000 evaluation fails" -"2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:41:00.721 UTC [cauthdsl] func1 -> DEBU 4aae 0xc0049b8ca0 gate 1563590460720093200 evaluation starts" -"2019-07-20 02:41:00.721 UTC [cauthdsl] func2 -> DEBU 4aaf 0xc0049b8ca0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.722 UTC [cauthdsl] func2 -> DEBU 4ab0 0xc0049b8ca0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.723 UTC [cauthdsl] func2 -> DEBU 4ab1 0xc0049b8ca0 principal matched by identity 0" -"2019-07-20 02:41:00.723 UTC [msp.identity] Verify -> DEBU 4ab2 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:41:00.723 UTC [msp.identity] Verify -> DEBU 4ab3 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:41:00.723 UTC [cauthdsl] func2 -> DEBU 4ab4 0xc0049b8ca0 principal evaluation succeeds for identity 0" -"2019-07-20 02:41:00.723 UTC [cauthdsl] func1 -> DEBU 4ab5 0xc0049b8ca0 gate 1563590460720093200 evaluation succeeds" -"2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab8 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:41:00.724 UTC [msp] DeserializeIdentity -> DEBU 4aba Obtaining identity" -"2019-07-20 02:41:00.724 UTC [msp] DeserializeIdentity -> DEBU 4abb Obtaining identity" -"2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4abc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4abd Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4abe Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4abf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:41:00.725 UTC [policies] Evaluate -> DEBU 4ac0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:41:00.725 UTC [policies] Evaluate -> DEBU 4ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:41:00.725 UTC [cauthdsl] func1 -> DEBU 4ac2 0xc0049ce470 gate 1563590460725231100 evaluation starts" -"2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac3 0xc0049ce470 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac4 0xc0049ce470 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac5 0xc0049ce470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac6 0xc0049ce470 principal evaluation fails" -"2019-07-20 02:41:00.726 UTC [cauthdsl] func1 -> DEBU 4ac7 0xc0049ce470 gate 1563590460725231100 evaluation fails" -"2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4ac8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4ac9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4aca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:41:00.727 UTC [msp] DeserializeIdentity -> DEBU 4acb Obtaining identity" -"2019-07-20 02:41:00.727 UTC [cauthdsl] func1 -> DEBU 4acc 0xc0049cecb0 gate 1563590460727922600 evaluation starts" -"2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4acd 0xc0049cecb0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ace 0xc0049cecb0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4acf 0xc0049cecb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad0 Obtaining identity" -"2019-07-20 02:41:00.728 UTC [gossip.pull] Hello -> DEBU 4ad1 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" -"2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ad2 0xc0049cecb0 principal evaluation fails" -"2019-07-20 02:41:00.728 UTC [cauthdsl] func1 -> DEBU 4ad3 0xc0049cecb0 gate 1563590460727922600 evaluation fails" -"2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad6 Obtaining identity" -"2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:41:00.728 UTC [cauthdsl] func1 -> DEBU 4ad8 0xc0049cf4f0 gate 1563590460728919200 evaluation starts" -"2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad9 Obtaining identity" -"2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ada 0xc0049cf4f0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4adb 0xc0049cf4f0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.729 UTC [gossip.comm] Send -> DEBU 4adc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" -"2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4add 0xc0049cf4f0 principal matched by identity 0" -"2019-07-20 02:41:00.729 UTC [msp.identity] Verify -> DEBU 4ade Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:41:00.729 UTC [msp.identity] Verify -> DEBU 4adf Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:41:00.729 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.729 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae1 Exiting" -"2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4ae2 0xc0049cf4f0 principal evaluation succeeds for identity 0" -"2019-07-20 02:41:00.729 UTC [cauthdsl] func1 -> DEBU 4ae3 0xc0049cf4f0 gate 1563590460728919200 evaluation succeeds" -"2019-07-20 02:41:00.729 UTC [policies] Evaluate -> DEBU 4ae4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae6 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:41:00.732 UTC [gossip.gossip] handleMessage -> DEBU 4ae8 Exiting" -"2019-07-20 02:41:00.732 UTC [gossip.gossip] handleMessage -> DEBU 4ae9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aea Obtaining identity" -"2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aeb Obtaining identity" -"2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aec Obtaining identity" -"2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4aed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4aee Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4aef Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.733 UTC [policies] Evaluate -> DEBU 4af0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:41:00.734 UTC [policies] Evaluate -> DEBU 4af1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:41:00.734 UTC [policies] Evaluate -> DEBU 4af2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:41:00.734 UTC [cauthdsl] func1 -> DEBU 4af3 0xc0049e5000 gate 1563590460734350400 evaluation starts" -"2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af4 0xc0049e5000 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af5 0xc0049e5000 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af6 0xc0049e5000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af7 0xc0049e5000 principal evaluation fails" -"2019-07-20 02:41:00.735 UTC [cauthdsl] func1 -> DEBU 4af8 0xc0049e5000 gate 1563590460734350400 evaluation fails" -"2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4af9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4afa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:41:00.735 UTC [cauthdsl] func1 -> DEBU 4afc 0xc0049e5840 gate 1563590460735722000 evaluation starts" -"2019-07-20 02:41:00.735 UTC [cauthdsl] func2 -> DEBU 4afd 0xc0049e5840 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4afe 0xc0049e5840 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4aff 0xc0049e5840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4b00 0xc0049e5840 principal evaluation fails" -"2019-07-20 02:41:00.736 UTC [cauthdsl] func1 -> DEBU 4b01 0xc0049e5840 gate 1563590460735722000 evaluation fails" -"2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:41:00.736 UTC [cauthdsl] func1 -> DEBU 4b05 0xc0049fc080 gate 1563590460736931300 evaluation starts" -"2019-07-20 02:41:00.738 UTC [cauthdsl] func2 -> DEBU 4b06 0xc0049fc080 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.739 UTC [cauthdsl] func2 -> DEBU 4b07 0xc0049fc080 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.740 UTC [cauthdsl] func2 -> DEBU 4b08 0xc0049fc080 principal matched by identity 0" -"2019-07-20 02:41:00.740 UTC [msp.identity] Verify -> DEBU 4b09 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| -00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" -"2019-07-20 02:41:00.740 UTC [msp.identity] Verify -> DEBU 4b0a Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| -00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| -00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| -00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| -00000040 8e 09 3a 87 1b a2 bc |..:....|" -"2019-07-20 02:41:00.740 UTC [cauthdsl] func2 -> DEBU 4b0b 0xc0049fc080 principal evaluation succeeds for identity 0" -"2019-07-20 02:41:00.740 UTC [cauthdsl] func1 -> DEBU 4b0c 0xc0049fc080 gate 1563590460736931300 evaluation succeeds" -"2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0f Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b11 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| -00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" -"2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b12 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| -00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| -00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| -00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| -00000040 04 ec df 98 3f 3b |....?;|" -"2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b13 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| -00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" -"2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b14 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| -00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| -00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| -00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| -00000040 c7 35 cf f0 e4 88 ab |.5.....|" -"2019-07-20 02:41:00.748 UTC [msp] DeserializeIdentity -> DEBU 4b15 Obtaining identity" -"2019-07-20 02:41:00.748 UTC [msp] DeserializeIdentity -> DEBU 4b16 Obtaining identity" -"2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b17 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" -"2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b18 Got policy manager for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b19 Got reader policy for channel [businesschannel] with flag [true]" -"2019-07-20 02:41:00.750 UTC [policies] Evaluate -> DEBU 4b1a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" -"2019-07-20 02:41:00.750 UTC [policies] Evaluate -> DEBU 4b1b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" -"2019-07-20 02:41:00.751 UTC [policies] Evaluate -> DEBU 4b1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" -"2019-07-20 02:41:00.751 UTC [cauthdsl] func1 -> DEBU 4b1d 0xc004a1c690 gate 1563590460751179500 evaluation starts" -"2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b1e 0xc004a1c690 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b1f 0xc004a1c690 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b20 0xc004a1c690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" -"2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b21 0xc004a1c690 principal evaluation fails" -"2019-07-20 02:41:00.751 UTC [cauthdsl] func1 -> DEBU 4b22 0xc004a1c690 gate 1563590460751179500 evaluation fails" -"2019-07-20 02:41:00.751 UTC [policies] Evaluate -> DEBU 4b23 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.752 UTC [policies] Evaluate -> DEBU 4b24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" -"2019-07-20 02:41:00.752 UTC [policies] Evaluate -> DEBU 4b25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" -"2019-07-20 02:41:00.752 UTC [cauthdsl] func1 -> DEBU 4b26 0xc004a1ced0 gate 1563590460752470400 evaluation starts" -"2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b27 0xc004a1ced0 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b28 0xc004a1ced0 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b29 0xc004a1ced0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" -"2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b2a 0xc004a1ced0 principal evaluation fails" -"2019-07-20 02:41:00.753 UTC [cauthdsl] func1 -> DEBU 4b2b 0xc004a1ced0 gate 1563590460752470400 evaluation fails" -"2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" -"2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" -"2019-07-20 02:41:00.753 UTC [cauthdsl] func1 -> DEBU 4b2f 0xc004a1d710 gate 1563590460753743500 evaluation starts" -"2019-07-20 02:41:00.753 UTC [cauthdsl] func2 -> DEBU 4b30 0xc004a1d710 signed by 0 principal evaluation starts (used [false])" -"2019-07-20 02:41:00.753 UTC [cauthdsl] func2 -> DEBU 4b31 0xc004a1d710 processing identity 0 with bytes of 114b950" -"2019-07-20 02:41:00.754 UTC [cauthdsl] func2 -> DEBU 4b32 0xc004a1d710 principal matched by identity 0" -"2019-07-20 02:41:00.754 UTC [msp.identity] Verify -> DEBU 4b33 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| -00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" -"2019-07-20 02:41:00.754 UTC [msp.identity] Verify -> DEBU 4b34 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| -00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| -00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| -00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| -00000040 96 55 42 a1 79 77 18 |.UB.yw.|" -"2019-07-20 02:41:00.756 UTC [cauthdsl] func2 -> DEBU 4b35 0xc004a1d710 principal evaluation succeeds for identity 0" -"2019-07-20 02:41:00.756 UTC [cauthdsl] func1 -> DEBU 4b36 0xc004a1d710 gate 1563590460753743500 evaluation succeeds" -"2019-07-20 02:41:00.756 UTC [policies] Evaluate -> DEBU 4b37 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.757 UTC [policies] Evaluate -> DEBU 4b38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" -"2019-07-20 02:41:00.757 UTC [policies] Evaluate -> DEBU 4b39 Signature set satisfies policy /Channel/Application/Readers" -"2019-07-20 02:41:00.758 UTC [policies] Evaluate -> DEBU 4b3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" -"2019-07-20 02:41:00.758 UTC [gossip.gossip] handleMessage -> DEBU 4b3b Exiting" -"2019-07-20 02:41:00.758 UTC [gossip.gossip] handleMessage -> DEBU 4b3c Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.758 UTC [gossip.pull] HandleMessage -> DEBU 4b3d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.759 UTC [gossip.gossip] handleMessage -> DEBU 4b3e Exiting" -"2019-07-20 02:41:00.808 UTC [gossip.gossip] handleMessage -> DEBU 4b3f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.810 UTC [msp] DeserializeIdentity -> DEBU 4b40 Obtaining identity" -"2019-07-20 02:41:00.810 UTC [msp] DeserializeIdentity -> DEBU 4b41 Obtaining identity" -"2019-07-20 02:41:00.811 UTC [gossip.gossip] handleMessage -> DEBU 4b42 Exiting" -"2019-07-20 02:41:00.870 UTC [gossip.gossip] handleMessage -> DEBU 4b43 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.870 UTC [gossip.pull] HandleMessage -> DEBU 4b44 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.870 UTC [gossip.pull] SendDigest -> DEBU 4b45 Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" -"2019-07-20 02:41:00.870 UTC [gossip.gossip] handleMessage -> DEBU 4b46 Exiting" -"2019-07-20 02:41:00.973 UTC [gossip.comm] func1 -> DEBU 4b47 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.973 UTC [gossip.gossip] handleMessage -> DEBU 4b48 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b49 Obtaining identity" -"2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b4a Obtaining identity" -"2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b4b Obtaining identity" -"2019-07-20 02:41:00.974 UTC [gossip.gossip] handleMessage -> DEBU 4b4c Exiting" -"2019-07-20 02:41:01.112 UTC [gossip.comm] func1 -> DEBU 4b4d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:41:01.112 UTC [gossip.gossip] handleMessage -> DEBU 4b4e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" -"2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b4f Obtaining identity" -"2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b50 Obtaining identity" -"2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b51 Obtaining identity" -"2019-07-20 02:41:01.114 UTC [gossip.gossip] handleMessage -> DEBU 4b52 Exiting" +"2019-09-24 00:27:30.563 UTC [cauthdsl] func1 -> DEBU 7390 0xc005846130 gate 1569284850563914100 evaluation starts" +"2019-09-24 00:27:30.563 UTC [cauthdsl] func2 -> DEBU 7391 0xc005846130 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:30.564 UTC [cauthdsl] func2 -> DEBU 7392 0xc005846130 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:30.564 UTC [cauthdsl] func2 -> DEBU 7393 0xc005846130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 00:27:30.564 UTC [cauthdsl] func2 -> DEBU 7394 0xc005846130 principal evaluation fails" +"2019-09-24 00:27:30.564 UTC [cauthdsl] func1 -> DEBU 7395 0xc005846130 gate 1569284850563914100 evaluation fails" +"2019-09-24 00:27:30.564 UTC [policies] Evaluate -> DEBU 7396 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:30.564 UTC [policies] Evaluate -> DEBU 7397 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:30.564 UTC [policies] Evaluate -> DEBU 7398 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 00:27:30.564 UTC [cauthdsl] func1 -> DEBU 7399 0xc0058472b0 gate 1569284850564939300 evaluation starts" +"2019-09-24 00:27:30.565 UTC [cauthdsl] func2 -> DEBU 739a 0xc0058472b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:30.565 UTC [cauthdsl] func2 -> DEBU 739b 0xc0058472b0 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:30.565 UTC [cauthdsl] func2 -> DEBU 739c 0xc0058472b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +"2019-09-24 00:27:30.565 UTC [cauthdsl] func2 -> DEBU 739d 0xc0058472b0 principal evaluation fails" +"2019-09-24 00:27:30.565 UTC [cauthdsl] func1 -> DEBU 739e 0xc0058472b0 gate 1569284850564939300 evaluation fails" +"2019-09-24 00:27:30.565 UTC [policies] Evaluate -> DEBU 739f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:30.566 UTC [policies] Evaluate -> DEBU 73a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 00:27:30.566 UTC [policies] Evaluate -> DEBU 73a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 00:27:30.566 UTC [cauthdsl] func1 -> DEBU 73a2 0xc005847b10 gate 1569284850566103100 evaluation starts" +"2019-09-24 00:27:30.566 UTC [cauthdsl] func2 -> DEBU 73a3 0xc005847b10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:30.566 UTC [cauthdsl] func2 -> DEBU 73a4 0xc005847b10 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:30.566 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 73a5 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 00:27:30.566 UTC [msp] Validate -> DEBU 73a6 MSP Org1MSP validating identity" +"2019-09-24 00:27:30.566 UTC [msp] getCertificationChain -> DEBU 73a7 MSP Org1MSP getting certification chain" +"2019-09-24 00:27:30.566 UTC [cauthdsl] func2 -> DEBU 73a8 0xc005847b10 principal matched by identity 0" +"2019-09-24 00:27:30.567 UTC [msp.identity] Verify -> DEBU 73a9 Verify: digest = 00000000 4d dd ea c6 54 8d b9 1a 3c 52 21 dd ca 7e 55 29 |M...T... DEBU 73aa Verify: sig = 00000000 30 45 02 21 00 cd 7a 60 dd 34 18 1a fc ec 25 28 |0E.!..z`.4....%(| +00000010 63 45 c3 c5 e6 db fd b5 d5 f8 a9 b7 88 d0 75 c7 |cE............u.| +00000020 96 56 50 3a 75 02 20 7c 59 d0 9c f7 a8 cc 6c 2c |.VP:u. |Y.....l,| +00000030 c3 27 40 ee ef a6 3b c6 36 1c 5f ee da fb 40 36 |.'@...;.6._...@6| +00000040 0e 78 6b ad d3 65 f2 |.xk..e.|" +"2019-09-24 00:27:30.567 UTC [cauthdsl] func2 -> DEBU 73ab 0xc005847b10 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:30.567 UTC [cauthdsl] func1 -> DEBU 73ac 0xc005847b10 gate 1569284850566103100 evaluation succeeds" +"2019-09-24 00:27:30.567 UTC [policies] Evaluate -> DEBU 73ad Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:30.567 UTC [policies] Evaluate -> DEBU 73ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 00:27:30.567 UTC [policies] Evaluate -> DEBU 73af Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:30.567 UTC [policies] Evaluate -> DEBU 73b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:30.568 UTC [chaincode] handleMessage -> DEBU 73b1 [cb32f5b6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 00:27:30.568 UTC [chaincode] Notify -> DEBU 73b2 [cb32f5b6] notifying Txid:cb32f5b671558f944ff7e6d05111908a27f6db687869e59f5b7d22afa5f9b9f0, channelID:" +"2019-09-24 00:27:30.568 UTC [chaincode] Execute -> DEBU 73b3 Exit" +"2019-09-24 00:27:30.568 UTC [endorser] callChaincode -> INFO 73b4 [][cb32f5b6] Exit chaincode: name:"qscc" (7ms)" +"2019-09-24 00:27:30.568 UTC [endorser] SimulateProposal -> DEBU 73b5 [][cb32f5b6] Exit" +"2019-09-24 00:27:30.568 UTC [endorser] func1 -> DEBU 73b6 Exit: request from 172.18.0.9:51140" +"2019-09-24 00:27:30.568 UTC [comm.grpc.server] 1 -> INFO 73b7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:51140 grpc.code=OK grpc.call_duration=9.6435ms +"2019-09-24 00:27:30.573 UTC [grpc] warningf -> DEBU 73b8 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:51140: read: connection reset by peer" +"2019-09-24 00:27:30.573 UTC [grpc] infof -> DEBU 73b9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 00:27:30.641 UTC [gossip.comm] func1 -> DEBU 73ba Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.641 UTC [gossip.gossip] handleMessage -> DEBU 73bb Entering, 172.18.0.8:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.641 UTC [gossip.gossip] handleMessage -> DEBU 73bc Exiting" +"2019-09-24 00:27:30.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73bd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.642 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 73be Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-09-24 00:27:30.642 UTC [msp] DeserializeIdentity -> DEBU 73bf Obtaining identity" +"2019-09-24 00:27:30.643 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 73c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 00:27:30.643 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 73c1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:30.643 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 73c2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 00:27:30.643 UTC [policies] Evaluate -> DEBU 73c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 00:27:30.644 UTC [policies] Evaluate -> DEBU 73c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 00:27:30.644 UTC [policies] Evaluate -> DEBU 73c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 00:27:30.644 UTC [cauthdsl] func1 -> DEBU 73c6 0xc005809a30 gate 1569284850644568800 evaluation starts" +"2019-09-24 00:27:30.645 UTC [cauthdsl] func2 -> DEBU 73c7 0xc005809a30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 00:27:30.645 UTC [cauthdsl] func2 -> DEBU 73c8 0xc005809a30 processing identity 0 with bytes of 114c6c0" +"2019-09-24 00:27:30.645 UTC [cauthdsl] func2 -> DEBU 73c9 0xc005809a30 principal matched by identity 0" +"2019-09-24 00:27:30.645 UTC [msp.identity] Verify -> DEBU 73ca Verify: digest = 00000000 d9 79 08 0d 9e 48 2f d9 39 c2 44 08 10 bc 06 1f |.y...H/.9.D.....| +00000010 56 0d 01 42 57 1a 70 88 18 df 77 48 fc 28 70 60 |V..BW.p...wH.(p`|" +"2019-09-24 00:27:30.646 UTC [msp.identity] Verify -> DEBU 73cb Verify: sig = 00000000 30 45 02 21 00 a0 cf c2 06 cf 8f b6 69 05 68 71 |0E.!........i.hq| +00000010 b1 fe 86 e2 40 ca 0f cc 2f d5 0d 11 11 a2 98 e4 |....@.../.......| +00000020 64 5c 06 ba d0 02 20 4c 5d 91 6f 98 7c 3e 9a af |d\.... L].o.|>..| +00000030 a9 a2 38 4c df 3a 73 82 72 78 94 25 a6 58 e9 a3 |..8L.:s.rx.%.X..| +00000040 c2 ca 23 4a b2 5e 64 |..#J.^d|" +"2019-09-24 00:27:30.646 UTC [cauthdsl] func2 -> DEBU 73cc 0xc005809a30 principal evaluation succeeds for identity 0" +"2019-09-24 00:27:30.646 UTC [cauthdsl] func1 -> DEBU 73cd 0xc005809a30 gate 1569284850644568800 evaluation succeeds" +"2019-09-24 00:27:30.646 UTC [policies] Evaluate -> DEBU 73ce Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:30.647 UTC [policies] Evaluate -> DEBU 73cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 00:27:30.647 UTC [policies] Evaluate -> DEBU 73d0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 00:27:30.647 UTC [policies] Evaluate -> DEBU 73d1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 00:27:30.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 73d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 73d3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 00:27:30.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 73d4 updating membership: timestamp: " +"2019-09-24 00:27:30.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 73d6 Updating aliveness data: membership: timestamp: " +"2019-09-24 00:27:30.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 73d7 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 00:27:30.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 73d8 Exiting" +"2019-09-24 00:27:30.649 UTC [gossip.discovery] handleAliveMessage -> DEBU 73d9 Exiting" +"2019-09-24 00:27:30.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73da Exiting" +"2019-09-24 00:27:30.648 UTC [gossip.comm] func1 -> DEBU 73d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.649 UTC [gossip.gossip] handleMessage -> DEBU 73db Entering, 172.18.0.6:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.649 UTC [gossip.gossip] handleMessage -> DEBU 73dc Exiting" +"2019-09-24 00:27:30.651 UTC [gossip.comm] func1 -> DEBU 73dd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.651 UTC [gossip.gossip] handleMessage -> DEBU 73de Entering, 172.18.0.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73df Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73e0 Exiting" +"2019-09-24 00:27:30.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73e1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 73e2 Exiting" +"2019-09-24 00:27:30.652 UTC [gossip.gossip] handleMessage -> DEBU 73e3 Exiting" +"2019-09-24 00:27:30.656 UTC [msp] DeserializeIdentity -> DEBU 73e4 Obtaining identity" +"2019-09-24 00:27:30.656 UTC [msp] DeserializeIdentity -> DEBU 73e5 Obtaining identity" +"2019-09-24 00:27:30.656 UTC [msp] DeserializeIdentity -> DEBU 73e6 Obtaining identity" +"2019-09-24 00:27:30.657 UTC [msp] DeserializeIdentity -> DEBU 73e7 Obtaining identity" +"2019-09-24 00:27:30.657 UTC [msp] DeserializeIdentity -> DEBU 73e8 Obtaining identity" +"2019-09-24 00:27:30.657 UTC [msp] DeserializeIdentity -> DEBU 73e9 Obtaining identity" +"2019-09-24 00:27:30.658 UTC [msp] DeserializeIdentity -> DEBU 73ea Obtaining identity" +"2019-09-24 00:27:30.658 UTC [gossip.comm] Send -> DEBU 73eb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:30.658 UTC [msp] DeserializeIdentity -> DEBU 73ec Obtaining identity" +"2019-09-24 00:27:30.659 UTC [gossip.comm] sendToEndpoint -> DEBU 73ed Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.659 UTC [gossip.comm] sendToEndpoint -> DEBU 73ee Exiting" +"2019-09-24 00:27:30.659 UTC [gossip.comm] Send -> DEBU 73ef Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 00:27:30.659 UTC [gossip.comm] sendToEndpoint -> DEBU 73f0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 00:27:30.659 UTC [gossip.comm] sendToEndpoint -> DEBU 73f1 Exiting" diff --git a/hyperledger_fabric/v1.4.2/scripts/variables.sh b/hyperledger_fabric/v1.4.2/scripts/variables.sh index f3edea61..0311236b 100644 --- a/hyperledger_fabric/v1.4.2/scripts/variables.sh +++ b/hyperledger_fabric/v1.4.2/scripts/variables.sh @@ -8,10 +8,10 @@ ARCH=amd64 BASE_IMG_TAG=0.4.15 # For fabric images, including peer, orderer, ca -FABRIC_IMG_TAG=latest +FABRIC_IMG_TAG=1.4.2 # Keep the same as in core.yaml, will tag ccenv with this value -PROJECT_VERSION=2.0.0 +PROJECT_VERSION=1.4.2 # Name of app channel, need to align with the gen_artifacts.sh SYS_CHANNEL="testchainid"